From a86e347f322f66fd638083b79ae55520786eab69 Mon Sep 17 00:00:00 2001 From: topscoder <86197446+topscoder@users.noreply.github.com> Date: Mon, 13 May 2024 10:23:09 +0200 Subject: [PATCH] Regenerated cve-less templates. Closes #21 --- README.md | 16 ++--- ...ator-5be710df65d6bc92f524c90909df2f99.yaml | 58 +++++++++++++++++++ ...ener-17c0f8c5353b51c76be9ea996254e492.yaml | 58 +++++++++++++++++++ ...ener-cbd2f40afcea324b1b6628d63c264b5b.yaml | 58 +++++++++++++++++++ ...lery-e9ae08724abba099d4b3758d3e5c0730.yaml | 58 +++++++++++++++++++ ...lash-205a1fbb250b5543ad54712c5ab85794.yaml | 58 +++++++++++++++++++ ...tion-5d3b862e6e4baaf71b24925f067433ca.yaml | 58 +++++++++++++++++++ ...tion-ced1428c6198f92ade552b4de59a878b.yaml | 58 +++++++++++++++++++ ...king-22fe25cfef73eeb94b97da8f9108cc4a.yaml | 58 +++++++++++++++++++ ...list-3884d9a5a5a83b7a3dc7015b6e93594e.yaml | 58 +++++++++++++++++++ ...list-63b258c691616cbc41ef567bfa0329d4.yaml | 58 +++++++++++++++++++ ...chat-93f5b1d9d41a68948272932dc6addd39.yaml | 58 +++++++++++++++++++ ...ress-5b8ac2585d2f3bb3221568e060310933.yaml | 58 +++++++++++++++++++ ...ress-d83585e94da6387ed15cb2d62de561eb.yaml | 58 +++++++++++++++++++ ...ress-df1a5321125f83ce7c8f5507c7f81133.yaml | 58 +++++++++++++++++++ ...orms-0bb8bade373073a31c7eae43154f4462.yaml | 58 +++++++++++++++++++ ...orms-3a92cf2d3b454c13398f20f7a203cccd.yaml | 58 +++++++++++++++++++ ...hare-862c51605ec18beb1576064976f304a2.yaml | 58 +++++++++++++++++++ ...ayer-98fa09468510e4f3d608da204df8d702.yaml | 58 +++++++++++++++++++ ...tons-50d503ecab241e54444834a8beaebf25.yaml | 58 +++++++++++++++++++ ...tons-a6ea9efcd2b00d833f3dd3cae90d9348.yaml | 58 +++++++++++++++++++ ...show-32bdd04e0affc46dfffa9d8a81425f9b.yaml | 58 +++++++++++++++++++ ...show-6009aafd4759ca9a9de1f0b928158a27.yaml | 58 +++++++++++++++++++ ...show-c5c3a05f327c9f5ee9273cd2dd422a24.yaml | 58 +++++++++++++++++++ ...tore-8030149fcea03a9895d089120ebb4064.yaml | 58 +++++++++++++++++++ ...tore-942a0a0ff8bd16dd5a3f3bf1e155403a.yaml | 58 +++++++++++++++++++ ...ield-9dec9c9b266000df591dc3dcef1e7d84.yaml | 58 +++++++++++++++++++ ...tion-7c268109bdc7dc29465b157c5422cae8.yaml | 58 +++++++++++++++++++ ...tion-bd56b3adb9677e584285e6d539545e56.yaml | 58 +++++++++++++++++++ ...ewer-b160f2225fa61e39751381696b9f32c3.yaml | 58 +++++++++++++++++++ ...ewer-de737cfbceda5a83bf3527f7e7cd5395.yaml | 58 +++++++++++++++++++ ...kies-2f1a45c352b73e0646091d728f0d1831.yaml | 58 +++++++++++++++++++ ...usel-8727745b12483495d5142bd68893d94d.yaml | 58 +++++++++++++++++++ ...lite-2c9be73a62038f3d8273efbfe3ddeeff.yaml | 58 +++++++++++++++++++ ...lite-6970693f733e5a846cb7f76630b73d22.yaml | 58 +++++++++++++++++++ ...lite-f6e79c74546c68ce5cae314ffc286a54.yaml | 58 +++++++++++++++++++ ...ewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tats-ea643024832757f9f2006e750b2fb2aa.yaml | 58 +++++++++++++++++++ ...rint-d5d38bc96ea3d80c250cd1535165fc1d.yaml | 58 +++++++++++++++++++ ...rint-f6f5e5b83dd05b47087018ab93dc70c8.yaml | 58 +++++++++++++++++++ ...lite-e32ba6270a5c504833f090f97c5f6929.yaml | 58 +++++++++++++++++++ ...dget-1c97daee437b7051f2d3a3601380f79a.yaml | 58 +++++++++++++++++++ ...izer-af2ae774d22378ee0a69d1768e15e475.yaml | 58 +++++++++++++++++++ ...ager-5abfc4a3a7a8a78baed36252f32bd2c8.yaml | 58 +++++++++++++++++++ ...ager-ab1f48347ef68d08de8af611ca6f7153.yaml | 58 +++++++++++++++++++ ...tion-1c59c6071776e5fed814157ec36f53bd.yaml | 58 +++++++++++++++++++ ...tion-64f66ce5bf8a7c60ba469ac77d7c053d.yaml | 58 +++++++++++++++++++ ...tion-80092ae62e91070a929addb38cf05eeb.yaml | 58 +++++++++++++++++++ ...tion-dc23dda4be9febbbe1e1b634c133ec2a.yaml | 58 +++++++++++++++++++ ...tion-e8f10c1130d647962cf4e7ae1be8e563.yaml | 58 +++++++++++++++++++ ...-301-1455eb1db51304e088780d96a4de0388.yaml | 58 +++++++++++++++++++ ...-301-30cdceb24c9fb6269d5ab38dde655939.yaml | 58 +++++++++++++++++++ ...-301-77ebf1c20a9fe589cfb00388461b5ac7.yaml | 58 +++++++++++++++++++ ...-301-cb580b1f1380796b4c9c6b8e0a7f576c.yaml | 58 +++++++++++++++++++ ...-301-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...-301-e5012481eb3358496d9e8266284a0c72.yaml | 58 +++++++++++++++++++ ...tart-540d765197d5d77b942283129699e946.yaml | 58 +++++++++++++++++++ ...like-af8b6c1405ca4fecbb6348cbb779bff6.yaml | 58 +++++++++++++++++++ ...404s-fb3335fd014953747fe67771d5c2fe67.yaml | 58 +++++++++++++++++++ ...orms-2d4f6a1b39a4cc9b06569630fa151900.yaml | 58 +++++++++++++++++++ ...oser-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...nect-01a4732a49ff7a9ef4ebc45204cbcc4f.yaml | 58 +++++++++++++++++++ ...nnel-067c415d5e57c3f7bf3c32e31e7bfdc9.yaml | 58 +++++++++++++++++++ ...nnel-078909fc07244cccae3451c5f9a6996f.yaml | 58 +++++++++++++++++++ ...nnel-aa9afd9a4b3e913533a4ca30d7c2f62e.yaml | 58 +++++++++++++++++++ ...form-4d5bd93e0c27080244733cb180f3f8d5.yaml | 58 +++++++++++++++++++ ...roid-535595f4b0854a5ba3ef769bc0a6d8a1.yaml | 58 +++++++++++++++++++ ...-bar-d7e6e52fbc5100c15dd93975c02af422.yaml | 58 +++++++++++++++++++ ...core-2ade9cd6a231682261bc318b1ed04cfb.yaml | 58 +++++++++++++++++++ ...-pro-747c4bd1125204cefd447ba68faf21f5.yaml | 58 +++++++++++++++++++ ...orms-44494ddc52293f35d4e91f03bc8a3bb3.yaml | 58 +++++++++++++++++++ ...taff-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...d-wp-7a6dd13ed18a2e45d6c2f734b970d2e6.yaml | 58 +++++++++++++++++++ ...load-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...load-b935aac9392ea74d48c16c20e8b0b995.yaml | 58 +++++++++++++++++++ ...olio-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...olio-69bbdafafddf73eabec5b44d29b3cf8b.yaml | 58 +++++++++++++++++++ ...olio-b935aac9392ea74d48c16c20e8b0b995.yaml | 58 +++++++++++++++++++ ...ider-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...ider-ae8b89aaa7a588f83d4c4781cadfd7d8.yaml | 58 +++++++++++++++++++ ...ider-b935aac9392ea74d48c16c20e8b0b995.yaml | 58 +++++++++++++++++++ ...ator-1003d8c4cbec4c692768d02c2deb833d.yaml | 58 +++++++++++++++++++ ...ator-96d45953f77055903959c32a94c71bbf.yaml | 58 +++++++++++++++++++ ...ator-abc87888690b19dcb77925a4c30ad407.yaml | 58 +++++++++++++++++++ ...ials-6d0e53ee77e3c1fef450b5cd709f1ad9.yaml | 58 +++++++++++++++++++ ...aawp-339dac9db5bc9d83f9bdf6846ab3c955.yaml | 58 +++++++++++++++++++ ...aawp-39d46e34c8d82019270861865807cb95.yaml | 58 +++++++++++++++++++ ...avel-5b4876c37f7fd35309718a01d65b18f0.yaml | 58 +++++++++++++++++++ ...lite-414da17bdb4a780711966608cd7b68aa.yaml | 58 +++++++++++++++++++ ...tool-d05a6b8d7f246d51e5c6639ab5b124d6.yaml | 58 +++++++++++++++++++ ...hout-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...safe-5f5e581ab08c36f61f1784ceff23dfca.yaml | 58 +++++++++++++++++++ ...-box-0b3e32c5343e2d92c6dd937071e516b1.yaml | 58 +++++++++++++++++++ ...thor-c3b408a5f882549523fb91707173e697.yaml | 58 +++++++++++++++++++ ...3000-d71809a4e98fe91e7030122fe36364ba.yaml | 58 +++++++++++++++++++ ...3000-e7894ec8416d5b9bca834efe054366ef.yaml | 58 +++++++++++++++++++ ...t-me-a5ad111bbf24e4213c2e76334a25e047.yaml | 58 +++++++++++++++++++ ...tals-e3ba97fb48a1eae9c0640e6703a15a7c.yaml | 58 +++++++++++++++++++ ...vacy-08a30537532865cd761666366968e42d.yaml | 58 +++++++++++++++++++ ...vacy-b38c5781d2a93e3491c104d301bd4d0b.yaml | 58 +++++++++++++++++++ ...iews-bcec64a9217ef083d681e74eb6ceccde.yaml | 58 +++++++++++++++++++ ...test-32bb442297758f740a582a38fb271291.yaml | 58 +++++++++++++++++++ ...nter-2583c8c1dd1479446cbf085c6134c883.yaml | 58 +++++++++++++++++++ ...demy-2f3fe53a50f6ba1e34fffa48d4d3ffac.yaml | 58 +++++++++++++++++++ ...demy-74f803f6a35ab9fee5ff5f4a7905da8e.yaml | 58 +++++++++++++++++++ ...demy-9f9b469ed3c99cc2601f251ee6ef9e63.yaml | 58 +++++++++++++++++++ ...ages-2f9298ab3f6a9cf7ac470aa68de57def.yaml | 58 +++++++++++++++++++ ...ages-498e3e358d7cb9235d23b7fd787ad310.yaml | 58 +++++++++++++++++++ ...ages-779279c30a67e49a16a563a554fb708b.yaml | 58 +++++++++++++++++++ ...ages-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml | 58 +++++++++++++++++++ ...ages-adc8f09209828ecd25d3a9013f76dba0.yaml | 58 +++++++++++++++++++ ...ages-c05da70d5ed77ea30636d59ab804aaa2.yaml | 58 +++++++++++++++++++ ...ages-c7b7a15003ffbb80a100eb159e64a8bf.yaml | 58 +++++++++++++++++++ ...ages-d0f1f9dc5f8553a777fe29b0dbac4733.yaml | 58 +++++++++++++++++++ ...word-ba769ee3b56a07d054d82d24eca8d984.yaml | 58 +++++++++++++++++++ ...eder-5321d52c0d483f1a186be60c117d7779.yaml | 58 +++++++++++++++++++ ...rter-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...rter-87857021bf0d6b4f9e9f9a7926fd73da.yaml | 58 +++++++++++++++++++ ...rter-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...rter-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...ally-dbc81bf016cd5e5e4c2433dc1422c4ba.yaml | 58 +++++++++++++++++++ ...ally-ec586f38da217e272f237a09e0ca477d.yaml | 58 +++++++++++++++++++ ...sibe-d4ff7ccda72ef3d478471c54ece0f540.yaml | 58 +++++++++++++++++++ ...lity-2d14f404d420f837153fea14d49aa1f8.yaml | 58 +++++++++++++++++++ ...lity-7dc4797d3de860817ed6ac2d09e72ea4.yaml | 58 +++++++++++++++++++ ...lity-c41141bd67c49cd259895cd7c78b521d.yaml | 58 +++++++++++++++++++ ...cker-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tton-a26164aedf80b474ee438ebcd8be6953.yaml | 58 +++++++++++++++++++ ...dget-7e7c2d3094ebf66ce262024cc34ea145.yaml | 58 +++++++++++++++++++ ...post-0259b7e0abb7a82246638a669050bc8a.yaml | 58 +++++++++++++++++++ ...post-ba2dfbd8bd85affc67a7972c0b9842d4.yaml | 58 +++++++++++++++++++ ...-pro-2e117974c1e793e439ba4ca717328fe2.yaml | 58 +++++++++++++++++++ ...post-8c06a8350a61d118d6e045c1630ddff6.yaml | 58 +++++++++++++++++++ ...cons-3129a6f1429e82e60a76e088cdf26794.yaml | 58 +++++++++++++++++++ ...cons-38223592e03cdebd88e125b4e466dd20.yaml | 58 +++++++++++++++++++ ...cons-c6ab36823a7ccb132d76b57507e4ea5c.yaml | 58 +++++++++++++++++++ ...feed-543905e5a70999b20f996a2b4d8c92c1.yaml | 58 +++++++++++++++++++ ...stem-e2e327ed0c82906cdc72ee6a3da6e38d.yaml | 58 +++++++++++++++++++ ...ider-124a6a229ba4bdf103aa1881e7bf0b04.yaml | 58 +++++++++++++++++++ ...ider-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...dion-eb55b372b5c3928eeddbd79bc1b91ebd.yaml | 58 +++++++++++++++++++ ...odes-3091ac7532eaab098f714acca62716d7.yaml | 58 +++++++++++++++++++ ...ider-9ea3c82ee3ff18eecbc44a826a19457f.yaml | 58 +++++++++++++++++++ ...ions-0a2080d70a92fba8a8847abac6eea304.yaml | 58 +++++++++++++++++++ ...ions-1948bb7537e0374279551e8dbc2dad83.yaml | 58 +++++++++++++++++++ ...ions-375db66af2081253ff533757f9dca92a.yaml | 58 +++++++++++++++++++ ...ions-eb03f1b5d95ef0a7d7a29907029d610c.yaml | 58 +++++++++++++++++++ ...faqs-1b12a289a671c54e3c29dcf0a118316b.yaml | 58 +++++++++++++++++++ ...faqs-3b610f84d98a5bc8d0e6aaa3b08f5054.yaml | 58 +++++++++++++++++++ ...faqs-4032a78ffdb0269b83ac44db0e50cdc3.yaml | 58 +++++++++++++++++++ ...faqs-49cb459f51b461767e5a15017db69d79.yaml | 58 +++++++++++++++++++ ...faqs-4ef1f0520c09d9782f1be91688816f9a.yaml | 58 +++++++++++++++++++ ...faqs-4f4db8cd21765548f8ac243b07d65419.yaml | 58 +++++++++++++++++++ ...faqs-6e7fd75d5000c1a779cde51d0f7b0d94.yaml | 58 +++++++++++++++++++ ...faqs-73da8bcc97724050406ff5bdd6471c84.yaml | 58 +++++++++++++++++++ ...faqs-805e4862296df1b32dd279bbfd5412a7.yaml | 58 +++++++++++++++++++ ...faqs-ce7addd0eabe078cf96d1fb6e8d32578.yaml | 58 +++++++++++++++++++ ...s-wp-5600898416ea4451dceafd9acde6424d.yaml | 58 +++++++++++++++++++ ...s-wp-cdf9a047d5c0c62c170cfb4f220b5807.yaml | 58 +++++++++++++++++++ ...erce-b870ae481ac77b6b40f8ab9a7e8f35ed.yaml | 58 +++++++++++++++++++ ...ates-35886a1535b89d1815cbc273329902f1.yaml | 58 +++++++++++++++++++ ...tion-5c23a6c70aea6e2ef9477919b8442851.yaml | 58 +++++++++++++++++++ ...eide-66b82cf9b546b0dbf96942572438d94e.yaml | 58 +++++++++++++++++++ ...arch-a4fd26323192935dbbcbf3b0527f2fd4.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nded-386512462e991dca6695af0141e48ca0.yaml | 58 +++++++++++++++++++ ...nded-dea0414e4a9baf8defc1d9528b3ab197.yaml | 58 +++++++++++++++++++ ...duct-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...itor-f830b550290522c771fc5d5f581ec239.yaml | 58 +++++++++++++++++++ ...play-72069309fe30eff95916a5572e194ede.yaml | 58 +++++++++++++++++++ ...ment-358ece292f0da9494f24c3c3237a7bf7.yaml | 58 +++++++++++++++++++ ...ment-48759f93c52619bbac694a4e94eca96c.yaml | 58 +++++++++++++++++++ ...ment-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...d-on-a5f89ffe6e75548da5bcc9b8bd527e66.yaml | 58 +++++++++++++++++++ ...e-go-e066b94b3267fad45f35322be08f0f07.yaml | 58 +++++++++++++++++++ ...port-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...elds-c99833151ca554dccf2540548a5b3a40.yaml | 58 +++++++++++++++++++ ...-api-1e33553896157651d598bc5cf39ab65c.yaml | 58 +++++++++++++++++++ ...laid-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ages-4ba662d6b707785ba4b6d4f4f14b8096.yaml | 58 +++++++++++++++++++ ...erce-3ec6520097de3a68210e828e99c83fad.yaml | 58 +++++++++++++++++++ ...obot-0f23eed689a75af60a6352d8c9b0e5a6.yaml | 58 +++++++++++++++++++ ...tion-a7284d3f83c86c028a5b0cebbf2cf2ad.yaml | 58 +++++++++++++++++++ ...erce-511e748ac6289331b63ef5c4ea73256a.yaml | 58 +++++++++++++++++++ ...erce-e8ed3a408ffed7b696f1556afff0400c.yaml | 58 +++++++++++++++++++ ...orms-0bd5595821e6e021ded7947ef04d5401.yaml | 58 +++++++++++++++++++ ...orms-7126916cd15b71eb21f56467461f8ab1.yaml | 58 +++++++++++++++++++ ...orms-910b5f5663169fdea4f0325e6cf734a0.yaml | 58 +++++++++++++++++++ ...mand-a4ef61682da896a77f77c008966e7b92.yaml | 58 +++++++++++++++++++ ...mand-adf2d29be020721f57ebc8e5c323f1bc.yaml | 58 +++++++++++++++++++ ...help-98bfd8505d63ab414ff4e674e40520aa.yaml | 58 +++++++++++++++++++ ...inwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-2764a8f5acae96c89d7440a05722c172.yaml | 58 +++++++++++++++++++ ...ress-f8b3cfa96a6263fb75e4e2e3d0d2b588.yaml | 58 +++++++++++++++++++ ...ypub-3492aa2f8ff8d594f214ebc3c0f6df74.yaml | 58 +++++++++++++++++++ ...ypub-3d9f543216228e07e8805addbdc60815.yaml | 58 +++++++++++++++++++ ...ypub-e408b7193fb2b136537798455a49df5e.yaml | 58 +++++++++++++++++++ ...ypub-ec1e17ee6b9dff2a9b24906383f33988.yaml | 58 +++++++++++++++++++ ...ypub-f60eec61fd032c9a9193cb04ba124ce1.yaml | 58 +++++++++++++++++++ ...time-a43196491819b1394c39bdcafa720fd3.yaml | 58 +++++++++++++++++++ ...time-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...orms-a7783b6874a69305b48413041df4fc03.yaml | 58 +++++++++++++++++++ ...dget-1ccff55ca83ceb7924ebbc45fc9187e7.yaml | 58 +++++++++++++++++++ ...dget-6c3ed40b4545418647bb281d1735150e.yaml | 58 +++++++++++++++++++ ...dget-e91f78a4d7f529b6160e3f85bc787127.yaml | 58 +++++++++++++++++++ ...ling-240aa2bc102d76090c9b42a8f66071ad.yaml | 58 +++++++++++++++++++ ...ling-9c2165239aea161f40d7ad21814e157b.yaml | 58 +++++++++++++++++++ ...ctor-33e33b7e60f5bb1cbc3c1d66bbc57d88.yaml | 58 +++++++++++++++++++ ...tons-ced2fa1255261a6b95f5e5c089baa7a6.yaml | 58 +++++++++++++++++++ ...tion-55f4a1b139d90fca33a89ff564faba6b.yaml | 58 +++++++++++++++++++ ...rter-05c7f4b1ec789bf87edb2e9f58b5a516.yaml | 58 +++++++++++++++++++ ...rter-05dc7f00a65d6d066b60c74e22d18787.yaml | 58 +++++++++++++++++++ ...rter-085734e6e575cc721d044070dab37117.yaml | 58 +++++++++++++++++++ ...rter-2021111b9f6ef5ab3859ee3ee5bee180.yaml | 58 +++++++++++++++++++ ...rter-79f632cd97a0ebb6e16d846a092aa9f0.yaml | 58 +++++++++++++++++++ ...rter-b3d92b780aa6d9d512b427a6e681192d.yaml | 58 +++++++++++++++++++ ...rter-c5d0a251b677b3b951be5050c3700b32.yaml | 58 +++++++++++++++++++ ...rter-e2189a48266beb6940ada2c357f2ecea.yaml | 58 +++++++++++++++++++ ...rter-e9f3d7aebb0ed7cd4a6a52dea34e70b2.yaml | 58 +++++++++++++++++++ ...rter-fc176b7bb57291a7a6cb64680552a9c1.yaml | 58 +++++++++++++++++++ ...-pro-085734e6e575cc721d044070dab37117.yaml | 58 +++++++++++++++++++ ...-pro-408292faf542bf83787cacdb065a1b67.yaml | 58 +++++++++++++++++++ ...ctor-21d21ac863b5d217214b983983ea0861.yaml | 58 +++++++++++++++++++ ...ctor-5b5ec9fb47af5349a4069a8334bed873.yaml | 58 +++++++++++++++++++ ...ctor-f2687a211e25f95aa3e0981921986366.yaml | 58 +++++++++++++++++++ ...ster-8ed4f4b4804b54524ede760d18b29fad.yaml | 58 +++++++++++++++++++ ...trol-fd9bc570df9e6e1f10861293d27d4049.yaml | 58 +++++++++++++++++++ ...pper-62dc43c109e10a4fb2083be6c80b9766.yaml | 58 +++++++++++++++++++ ...dget-4889575a9366ba976f9903b70e5fb359.yaml | 58 +++++++++++++++++++ ...dget-7559c037fdee829f7bf9775d464accd0.yaml | 58 +++++++++++++++++++ ...roll-0e52d08abcfaa24832dc556c46587054.yaml | 58 +++++++++++++++++++ ...rgpd-a8caff9400eec85f908551f99981c4c5.yaml | 58 +++++++++++++++++++ ...ages-092d91aed0440af0f2ea67a8f6a61ea3.yaml | 58 +++++++++++++++++++ ...ages-2cea449c252db115bc0ec944ee102d56.yaml | 58 +++++++++++++++++++ ...ages-c12c2c5f48822779a17dfa51b8772537.yaml | 58 +++++++++++++++++++ ...bweb-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...ters-0c9c5d7d8c587d19d97cdd4ed72a25ce.yaml | 58 +++++++++++++++++++ ...ters-3a2ca32819bf69f7c166bffc53191044.yaml | 58 +++++++++++++++++++ ...ters-7d55795955a6759ccf7bacae2a8fb7d5.yaml | 58 +++++++++++++++++++ ...ters-d3a3435dfd803c8984d494bbdacab67a.yaml | 58 +++++++++++++++++++ ...ages-b90fc576a88f2023fbf4be0c7e221753.yaml | 58 +++++++++++++++++++ ...ages-f95a4bd79444a6bb4c86f62647865224.yaml | 58 +++++++++++++++++++ ...ents-5f015fc98ebe61708b30f8e106c0dca9.yaml | 58 +++++++++++++++++++ ...lass-e958f1600aa0e32635d67ccd172b77c5.yaml | 58 +++++++++++++++++++ ...erce-073e94466d93432fc20ff7757afbfb89.yaml | 58 +++++++++++++++++++ ...dule-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml | 58 +++++++++++++++++++ ...ders-a517abb9ae98faf810f5cc111ea3cf8c.yaml | 58 +++++++++++++++++++ ...ders-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...book-0445d2e77118d710e79ad9b8b4807a1f.yaml | 58 +++++++++++++++++++ ...book-3329f436b3e9299453177bb21ca6d4b2.yaml | 58 +++++++++++++++++++ ...erce-a100f718edfa547990462b4c8b9cca8f.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-b9bdab270fe39bf9e158152b28713054.yaml | 58 +++++++++++++++++++ ...erce-d334f4c5640d489b36128befbb9349ee.yaml | 58 +++++++++++++++++++ ...rver-373c3d1e9d0bf3f43f2574269f041f82.yaml | 58 +++++++++++++++++++ ...post-d831e3189dd50ede75f49828d65ef488.yaml | 58 +++++++++++++++++++ ...gram-446660b2783c8caadc3d9d08f86fa99d.yaml | 58 +++++++++++++++++++ ...book-3bc3a29ed4f22f4e728217981dd51f12.yaml | 58 +++++++++++++++++++ ...book-8ffb6f085ca0e1f89a621d273438f0fc.yaml | 58 +++++++++++++++++++ ...book-c58905f34c05ba2fa6edde7c71c05f27.yaml | 58 +++++++++++++++++++ ...atar-fd5d00c088aafb595097efbcaff18f66.yaml | 58 +++++++++++++++++++ ...rker-5c12b38e55523c2abb1229db17d7b69c.yaml | 58 +++++++++++++++++++ ...rker-93ed6654d55bf39f7e0ea24a9224f858.yaml | 58 +++++++++++++++++++ ...tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ages-64cea71514683366dc6b4c2ffb6a6e72.yaml | 58 +++++++++++++++++++ ...menu-0f70db17156622f62eb6b0301d900f5d.yaml | 58 +++++++++++++++++++ ...menu-340c0c43c74f3a05736fcc7f14255c5c.yaml | 58 +++++++++++++++++++ ...menu-57689f801f3390e9106eb400e17d855b.yaml | 58 +++++++++++++++++++ ...menu-57c77fb954904b0b546e721dabd7febb.yaml | 58 +++++++++++++++++++ ...menu-ab5a0a3bb4872aa99cbafa75e82578af.yaml | 58 +++++++++++++++++++ ...menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...menu-d407a9e1907a7ef46afd85eee39e3c29.yaml | 58 +++++++++++++++++++ ...menu-f9cdd85e870155975fbf07ebd6c11543.yaml | 58 +++++++++++++++++++ ...hare-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...tons-b831673e867a40d3a440f96a21bff239.yaml | 58 +++++++++++++++++++ ...itle-e650ec648b3137d2000a4e41f6b87363.yaml | 58 +++++++++++++++++++ ...tivo-71268622d169b66d5da459dba61f1b1c.yaml | 58 +++++++++++++++++++ ...orwc-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...ixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-any-3ade8e2913488ed45de5178c94ddcdcc.yaml | 58 +++++++++++++++++++ ...-any-6b33e64acf4e555f0136d2c33ebedb80.yaml | 58 +++++++++++++++++++ ...-any-ae230608473cfc56a303443ba2385f1d.yaml | 58 +++++++++++++++++++ ...tton-2e36e1fd5443dd09871a6501069bddbb.yaml | 58 +++++++++++++++++++ ...erce-1f532de1970706b80de4de5a54d3380e.yaml | 58 +++++++++++++++++++ ...edly-9327431607715dc8ad5049b0a62ebe4f.yaml | 58 +++++++++++++++++++ ...n-wp-0eddba28d26b374b7f8490ca46c51c29.yaml | 58 +++++++++++++++++++ ...ixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...role-473bd673aad6ebbb1666b1cd91242034.yaml | 58 +++++++++++++++++++ ...page-7c19600be6bfdb748bd3e60c37bbe32a.yaml | 58 +++++++++++++++++++ ...2fav-d039001c0af8cb5076be473a89522a72.yaml | 58 +++++++++++++++++++ ...cker-1e7ddc6e347b7dc14fdbf28e9726a2fd.yaml | 58 +++++++++++++++++++ ...ndio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...tats-a3cdd5fc08475bf0155bcdf233d6ccac.yaml | 58 +++++++++++++++++++ ...very-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...ager-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...erce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...mber-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...lder-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...erce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...erce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...erce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...erce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...erce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...erce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...unts-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...kers-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 58 +++++++++++++++++++ ...ager-8e787a46ad14cecfaea14ee098f61614.yaml | 58 +++++++++++++++++++ ...erce-cd60ae6d86175a2b0663a7f4bb146125.yaml | 58 +++++++++++++++++++ ...erce-f25ce468da2d85a66509b9e029e6fac8.yaml | 58 +++++++++++++++++++ ...lder-0ef3f8bd25033cd91b4d106c69c8559b.yaml | 58 +++++++++++++++++++ ...lder-0fb47ccc27ee413d414cd8b0ba979166.yaml | 58 +++++++++++++++++++ ...lder-19c52dd7e875a0e50693de27a767788f.yaml | 58 +++++++++++++++++++ ...lder-214593575ac1d3e95584c0521e8c5928.yaml | 58 +++++++++++++++++++ ...lder-3546c72d408f5a6ead5d764bba6d4ef6.yaml | 58 +++++++++++++++++++ ...lder-54120e3f5fb914e9169ba2eee6152b5b.yaml | 58 +++++++++++++++++++ ...lder-5934e1315f8774ec64137d0af59055a1.yaml | 58 +++++++++++++++++++ ...lder-68cc06979ff8bb95723bb04a557ffaae.yaml | 58 +++++++++++++++++++ ...lder-8305b529a6785da6470d8457740ff920.yaml | 58 +++++++++++++++++++ ...lder-9260b43e6ac9e5101461f0e5b3ca5c55.yaml | 58 +++++++++++++++++++ ...lder-966b2e78a79b5d63896247b963e8d55a.yaml | 58 +++++++++++++++++++ ...lder-974e69c005824474ea421d11c0a2e8fa.yaml | 58 +++++++++++++++++++ ...lder-b1bb95f8c4ff39f12ce42050633fe6ba.yaml | 58 +++++++++++++++++++ ...lder-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lder-c1b63cc136f48f5f3766e7772bec95ad.yaml | 58 +++++++++++++++++++ ...lder-ce4e21b72cfe20823efba4862db87109.yaml | 58 +++++++++++++++++++ ...lder-ea8fafa1914b33a7541d6d71c9272dbd.yaml | 58 +++++++++++++++++++ ...lder-f95a6103756f27e103bcf366ca12c670.yaml | 58 +++++++++++++++++++ ...lder-fbb7a174a49a3b47cc8ab51df927085f.yaml | 58 +++++++++++++++++++ ...rary-1b768170ce1555d79635fdd71ff99339.yaml | 58 +++++++++++++++++++ ...lder-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-0a02674a461ee92c9bdab38333dc64d2.yaml | 58 +++++++++++++++++++ ...ntor-3c3007d2c808c5107195ff3e0b9f940c.yaml | 58 +++++++++++++++++++ ...ntor-435e5a4b20bcaf9d0c9ffb3797d6604e.yaml | 58 +++++++++++++++++++ ...ntor-6b0cd31bdd2edf441adfecb677828dc9.yaml | 58 +++++++++++++++++++ ...ntor-7278c1d5f51388c1851434ad959c1788.yaml | 58 +++++++++++++++++++ ...ntor-a2edba0b6f9194a358b22756bbd79a75.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-c2bef3c139a7a3ae094de8e562cf6429.yaml | 58 +++++++++++++++++++ ...ntor-c4f6d0a939cffb23c47ad426a3f0d45f.yaml | 58 +++++++++++++++++++ ...ntor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ntor-e5a323ffcfde2fc677ad46470b3d50f7.yaml | 58 +++++++++++++++++++ ...ntor-f08da3e42125c87db99ab45bab5c3734.yaml | 58 +++++++++++++++++++ ...ntor-f7fd1f97dac21964944e06746d183317.yaml | 58 +++++++++++++++++++ ...ntor-fc5e0217c3dc9969d4594ab0394109b5.yaml | 58 +++++++++++++++++++ ...oser-43cb177771740873ed7f858ac79c4db6.yaml | 58 +++++++++++++++++++ ...oser-92680d6145a8b866d3fbe1493fdcbbd3.yaml | 58 +++++++++++++++++++ ...oser-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oser-eb66f71390c85b359c35c7747a93043f.yaml | 58 +++++++++++++++++++ ...-api-60d12634c1b8de8d81af0efb8a90411b.yaml | 58 +++++++++++++++++++ ...tion-bc6751aa5110381a68bfe443bb0b5c6b.yaml | 58 +++++++++++++++++++ ...this-400e484570b51dd745ebe0689024ac48.yaml | 58 +++++++++++++++++++ ...this-4df8f94a1b3a10a0e93c979447a9e37d.yaml | 58 +++++++++++++++++++ ...this-63618d1b2772f81d989c25189b57727a.yaml | 58 +++++++++++++++++++ ...this-f458b6b7d201e75465fa11d780919cd8.yaml | 58 +++++++++++++++++++ ...oxly-3bb7ea48eda3e0c286b8f4154d1c722a.yaml | 58 +++++++++++++++++++ ...oxly-55491e6388a9facf7c82130d1d7c03fc.yaml | 58 +++++++++++++++++++ ...oxly-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dget-b022913a2c1b91275126aaf3b57a5b27.yaml | 58 +++++++++++++++++++ ...ider-baea03495f30d429cbcc479e7010d90b.yaml | 58 +++++++++++++++++++ ...team-b4bab111be528a55d6c4bef04962870e.yaml | 58 +++++++++++++++++++ ...team-ddd0e9486fe68ad8ba91d2369f80747b.yaml | 58 +++++++++++++++++++ ...erce-5b3434af05805f54d95301c9d2bfe97f.yaml | 58 +++++++++++++++++++ ...-bar-7fb9197171618e79a095c113a75de482.yaml | 58 +++++++++++++++++++ ...trol-11e3031fc351fbc9a833e9b97e46b6a6.yaml | 58 +++++++++++++++++++ ...ntry-065bc0a5eb0849b7c6a410326eca6499.yaml | 58 +++++++++++++++++++ ...-pro-2cf825b0502a2430e12833bc820c6234.yaml | 58 +++++++++++++++++++ ...-pro-9a1ea12529e15f0a017ce8f0e47401f6.yaml | 58 +++++++++++++++++++ ...s-mu-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...ogin-8e89a9166eb8a31b3f0788c884713593.yaml | 58 +++++++++++++++++++ ...ogin-a3f7dace6308a168799f4b5efdcbf0fc.yaml | 58 +++++++++++++++++++ ...itor-923aa4370429c541e105a9a0e073bc36.yaml | 58 +++++++++++++++++++ ...form-86177d3d57734b384c40bd47dc22f497.yaml | 58 +++++++++++++++++++ ...form-ca4f90158895ba65bf2d705fcea04dfc.yaml | 58 +++++++++++++++++++ ...-log-df593141a2030e92d8b8a063fe09a284.yaml | 58 +++++++++++++++++++ ...nded-7c54d0c02ff88e8b029dfc7540d8d088.yaml | 58 +++++++++++++++++++ ...nded-9639beb38d5d1c45bea1fc0af8299ea1.yaml | 58 +++++++++++++++++++ ...nded-de7a5d3d23cd7a255b8c43340d197b1b.yaml | 58 +++++++++++++++++++ ...menu-e411bd798191f2720fc8b5639b6efe9d.yaml | 58 +++++++++++++++++++ ...itor-b38b7cc5414ae950246e64e87c33ee56.yaml | 58 +++++++++++++++++++ ...tion-87b8cc0c2911555903ef563ff0be512f.yaml | 58 +++++++++++++++++++ ...team-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...team-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...eiro-b56b643a394756ad5a6e6d10ca73e89c.yaml | 58 +++++++++++++++++++ ...work-49f7af60a7d6ca8e6785ad7873768f2a.yaml | 58 +++++++++++++++++++ ...ider-a7d2f24ba1d738c469db3701e7d249a6.yaml | 58 +++++++++++++++++++ ...nded-86ca53e4f7322bd713f7a0d173845e67.yaml | 58 +++++++++++++++++++ ...rm-7-1b189d1d5eea3b43d17277dc35a1184f.yaml | 58 +++++++++++++++++++ ...rm-7-1c83a92e446554fa5dca6a3142ee08a1.yaml | 58 +++++++++++++++++++ ...rm-7-338378bbb7402de89fbb870142f8402e.yaml | 58 +++++++++++++++++++ ...rm-7-6038d8499b4a66981281a09913dec32b.yaml | 58 +++++++++++++++++++ ...rm-7-7ad427989216bf7651898fa8b21eefdc.yaml | 58 +++++++++++++++++++ ...ents-66e2a6cfa3da10d668341e96b2f32949.yaml | 58 +++++++++++++++++++ ...lumn-00453bee0b2389611473722a70457a0b.yaml | 58 +++++++++++++++++++ ...lumn-d5cca6b6b2563223e79910114117f74a.yaml | 58 +++++++++++++++++++ ...iner-3b8ab0bd7f7bcc6cdb534f9d784854fc.yaml | 58 +++++++++++++++++++ ...iner-50ccd5d0a1c5b6dd13714f3e3f3f4b8d.yaml | 58 +++++++++++++++++++ ...nify-01ec13470a183f703d9497a5409e83a8.yaml | 58 +++++++++++++++++++ ...nify-41758ee37f85a4ada05dbd855bba9b0b.yaml | 58 +++++++++++++++++++ ...nify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nify-bc021f50f994b63de0e089ca7983044c.yaml | 58 +++++++++++++++++++ ...mize-98258e7e3672ebda27bdfc41933c5290.yaml | 58 +++++++++++++++++++ ...mize-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml | 58 +++++++++++++++++++ ...or-z-e6db47c78eec7cdfa79fc10eb791885d.yaml | 58 +++++++++++++++++++ ...line-8605679482008c33234e96d6513ed206.yaml | 58 +++++++++++++++++++ ...npad-70956e63e550605d8f25a09facb07794.yaml | 58 +++++++++++++++++++ ...lugg-9a9ae078aa8492b142c833f71cc23292.yaml | 58 +++++++++++++++++++ ...tate-1978bcad197f3b110297309bda97f32a.yaml | 58 +++++++++++++++++++ ...tate-1f31d20eb76428666b511698c9ea1c7e.yaml | 58 +++++++++++++++++++ ...tate-404d802e6aee5b15a871049b9ffff69a.yaml | 58 +++++++++++++++++++ ...tate-a74fb6f00e03de1d4dc066ebae34f69d.yaml | 58 +++++++++++++++++++ ...tate-b24e50f88d059b7df802d8ab2740b6f0.yaml | 58 +++++++++++++++++++ ...tate-d07cf22ef8f576e671dbb7b3eafdf13a.yaml | 58 +++++++++++++++++++ ...tate-d9b7905c602159e1d431254ae8993ca0.yaml | 58 +++++++++++++++++++ ...tate-f5d87ece59db37936b3fb9bdb05376cd.yaml | 58 +++++++++++++++++++ ...-box-6a26301f5fd7c4d97e54e67c3224031f.yaml | 58 +++++++++++++++++++ ...rcom-b6c1a6adb8481fecb3d92549d2f5a5bd.yaml | 58 +++++++++++++++++++ ...rcom-f9c63ff99c5edff8a5bfda2b8b7db0d0.yaml | 58 +++++++++++++++++++ ...r-wp-32ccd5e0c657d764432d8a2599e1ffbc.yaml | 58 +++++++++++++++++++ ...r-wp-97317cfba5a4e1ac31624c57d27d0191.yaml | 58 +++++++++++++++++++ ...tion-d53d7fc7db0d940484e982ea2d1a452b.yaml | 58 +++++++++++++++++++ ...dmin-2edbd29eb6775e076f4926bb495fbd5f.yaml | 58 +++++++++++++++++++ ...ager-bc55ea7b509124d1a77831d4400c5030.yaml | 58 +++++++++++++++++++ ...nity-76eba8cd8a4e862710149dc77a310969.yaml | 58 +++++++++++++++++++ ...ring-a06b9dcd1c61939b7e3171c0fcf7e2b0.yaml | 58 +++++++++++++++++++ ...luxe-e6b40723167a263b6dd92aa26e882342.yaml | 58 +++++++++++++++++++ ...ugin-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml | 58 +++++++++++++++++++ ...ugin-b0dd2a8da30a77a184664b44d16f014b.yaml | 58 +++++++++++++++++++ ...-b30-3fb8a6560a10a77149304b3038078ed0.yaml | 58 +++++++++++++++++++ ...erve-0be4b8a6e8c5523e50c4255a6c88e58b.yaml | 58 +++++++++++++++++++ ...acer-26120d11811fdddc12c0808afc461d28.yaml | 58 +++++++++++++++++++ ...ager-024bbec9ead04ec628d8ff702c3aabae.yaml | 58 +++++++++++++++++++ ...ager-0f106f68230dd3847df5cac404354f2e.yaml | 58 +++++++++++++++++++ ...ager-b07982a67f16a7148433f4d658429720.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-c848309da304f217f6ed4776631e8c6d.yaml | 58 +++++++++++++++++++ ...arch-223f6e5ecb381f112c575b56d5d37f09.yaml | 58 +++++++++++++++++++ ...arch-65722f234323ee23193cc280e3922176.yaml | 58 +++++++++++++++++++ ...arch-e5f9122605f16ebf468dfc1c8cf77f37.yaml | 58 +++++++++++++++++++ ...tics-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-0254425f076f9a4e04894c3c01bc9caf.yaml | 58 +++++++++++++++++++ ...ager-1591ae4acd002a80b846e658ca20b8b2.yaml | 58 +++++++++++++++++++ ...ager-1c25b9d9b10bd77a049e735bb0a8965a.yaml | 58 +++++++++++++++++++ ...ager-1cbbbacebab6eafbabdd1ea3e6ed8c33.yaml | 58 +++++++++++++++++++ ...ager-2239ca03e49ffeb792ff8f7c625fd4da.yaml | 58 +++++++++++++++++++ ...ager-22c3c4fbb2c94545987b2da04e166d40.yaml | 58 +++++++++++++++++++ ...ager-304412fedec296474e9a664baa039b40.yaml | 58 +++++++++++++++++++ ...ager-3b7a2e7b6f89f58e23d11ffebc1efd41.yaml | 58 +++++++++++++++++++ ...ager-7d84c9a9ee6bf717c602d3a38e459b86.yaml | 58 +++++++++++++++++++ ...ager-86962de7248a9bc1e25d4d3ee2951f2c.yaml | 58 +++++++++++++++++++ ...ager-aa18fa16264ca0049a45d96495a5cf8a.yaml | 58 +++++++++++++++++++ ...arch-b5af9134a0dd9c46b02e9a0fe6e4c234.yaml | 58 +++++++++++++++++++ ...-ads-0ce7e54d96c7e37996c0287c3e487a8b.yaml | 58 +++++++++++++++++++ ...-ads-1cb900b8a90233cac04a7870b7e3d8b4.yaml | 58 +++++++++++++++++++ ...-ads-83e91dab60d5a445ab0bd5d25903d462.yaml | 58 +++++++++++++++++++ ...-ads-e81a4620e336feb8f24131c8ad7dbdcc.yaml | 58 +++++++++++++++++++ ...ader-e6b2b9642eaa28f30036533185d6907f.yaml | 58 +++++++++++++++++++ ...ndar-02c5d62eb1659f29fbc55dae8e4463de.yaml | 58 +++++++++++++++++++ ...ndar-26d3ea26eccb41307c119c75a4db08cf.yaml | 58 +++++++++++++++++++ ...ndar-66bcdef39a721f6e9228bf986823abfb.yaml | 58 +++++++++++++++++++ ...ndar-88053ac7586fc02cd2a372b5e620460b.yaml | 58 +++++++++++++++++++ ...ndar-a9aa77a954191266292b06f87ea42806.yaml | 58 +++++++++++++++++++ ...ndar-d4656841565576de3042f9c9b59d5ada.yaml | 58 +++++++++++++++++++ ...ndar-e81bb0ad426b5246d688d9a7f2eaddcb.yaml | 58 +++++++++++++++++++ ...ndar-ee1cda86ab18e381ca4e90653a705f3b.yaml | 58 +++++++++++++++++++ ...late-850462c19f63654938faf5f00514f8c4.yaml | 58 +++++++++++++++++++ ...late-eaf398ea01fd7dda89f0e980c07588c4.yaml | 58 +++++++++++++++++++ ...7-db-09b9a87909e1abd2b1771c596b468a9f.yaml | 58 +++++++++++++++++++ ...7-db-0ac820af26b82917a9384c67560e13a6.yaml | 58 +++++++++++++++++++ ...7-db-4039c397e350c84a436243d9a4f3eab1.yaml | 58 +++++++++++++++++++ ...7-db-cf64bc2fcdc70126dfb7b9884847888f.yaml | 58 +++++++++++++++++++ ...-pro-7909b368603f8e81e96e69064ab1be28.yaml | 58 +++++++++++++++++++ ...-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-pro-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...free-bf87097eab97d5618311a5d6293581ee.yaml | 58 +++++++++++++++++++ ...ager-330ef9633d0984d1501cc01b4833593f.yaml | 58 +++++++++++++++++++ ...ager-9b156b803761678f004bbe691278814c.yaml | 58 +++++++++++++++++++ ...-pro-9b156b803761678f004bbe691278814c.yaml | 58 +++++++++++++++++++ ...cher-22846449cdda1461ad8961f070d0c8f7.yaml | 58 +++++++++++++++++++ ...elds-27283408ce212ababfa6ab6738bcc33b.yaml | 58 +++++++++++++++++++ ...elds-3a746fc902e2b6559213043452550064.yaml | 58 +++++++++++++++++++ ...elds-5ab0380f0225cb3f813fd2faf9e0804b.yaml | 58 +++++++++++++++++++ ...elds-62768c2e4740e3e20150e0c67af690b3.yaml | 58 +++++++++++++++++++ ...elds-728081d1e4f34c41ac0cf5df180e962c.yaml | 58 +++++++++++++++++++ ...elds-72b80dd4bc94210ab9dd3b1876e438ee.yaml | 58 +++++++++++++++++++ ...elds-73ae88fd78bf0becac09b57aa5f8c767.yaml | 58 +++++++++++++++++++ ...elds-74d01cddad4cc8a47fb2dbd74bd23ca7.yaml | 58 +++++++++++++++++++ ...elds-a5138dbd3ab5f7be9499c9facaa915f6.yaml | 58 +++++++++++++++++++ ...elds-a56a7a539382d6f88ae2afe6cc65c72c.yaml | 58 +++++++++++++++++++ ...elds-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml | 58 +++++++++++++++++++ ...elds-d907690c5c767a972864a779d8ced723.yaml | 58 +++++++++++++++++++ ...elds-db2d8a1251fb5f78024e34146e92e4d0.yaml | 58 +++++++++++++++++++ ...elds-ebdf981fa373e4823561a65bb577a1a2.yaml | 58 +++++++++++++++++++ ...-pro-195a4f0d8d0765a9379e79abc595005a.yaml | 58 +++++++++++++++++++ ...-pro-3a746fc902e2b6559213043452550064.yaml | 58 +++++++++++++++++++ ...-pro-877a1559edb434fbb6761e8bcd1aaf40.yaml | 58 +++++++++++++++++++ ...-pro-a5138dbd3ab5f7be9499c9facaa915f6.yaml | 58 +++++++++++++++++++ ...-pro-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml | 58 +++++++++++++++++++ ...-pro-d907690c5c767a972864a779d8ced723.yaml | 58 +++++++++++++++++++ ...-pro-db2d8a1251fb5f78024e34146e92e4d0.yaml | 58 +++++++++++++++++++ ...-pro-ebdf981fa373e4823561a65bb577a1a2.yaml | 58 +++++++++++++++++++ ...ield-f0cdadcff316feb53fd77aca416bb2f6.yaml | 58 +++++++++++++++++++ ...aner-317c2d6753e5308f0908f9dfb1cd475a.yaml | 58 +++++++++++++++++++ ...aner-655a7a3d142e2b2810e2cbdce0fda49a.yaml | 58 +++++++++++++++++++ ...aner-662b0d4e06b53c4127af628452071119.yaml | 58 +++++++++++++++++++ ...aner-672e25f5e31f63e7bd1671bc45955d6f.yaml | 58 +++++++++++++++++++ ...aner-6bf8881666d7b800c84c385bcfdc33c4.yaml | 58 +++++++++++++++++++ ...aner-f22c4e2a2ebc3ea71e41c368cf894811.yaml | 58 +++++++++++++++++++ ...acer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ayer-9d0309e800290fb37ba28ab13061e40e.yaml | 58 +++++++++++++++++++ ...ayer-e75a2e4fcc95441946c7906f7e8c8fdf.yaml | 58 +++++++++++++++++++ ...erce-13af69fc3b4639d4eee1c5f8765f3113.yaml | 58 +++++++++++++++++++ ...erce-221eba2ef4992774b45479de6031a5d3.yaml | 58 +++++++++++++++++++ ...erce-2b7649bf0d1b33f22a628883cdb8312a.yaml | 58 +++++++++++++++++++ ...erce-37fc83c506180cf381ac5dfbd233eafb.yaml | 58 +++++++++++++++++++ ...erce-69850835aba43cc07b9062e15e01dfd5.yaml | 58 +++++++++++++++++++ ...erce-739c3b6a5da1b82e1034ec2752c5a42f.yaml | 58 +++++++++++++++++++ ...erce-9036eb8b1e0f76afba77e37799b01f92.yaml | 58 +++++++++++++++++++ ...erce-aa979abd3b3cb9b7bb1cd2ef795b502b.yaml | 58 +++++++++++++++++++ ...erce-bb5f8ff13ce89043a17957f4917820c9.yaml | 58 +++++++++++++++++++ ...erce-bcf8e746293c2a8c7e07a4dcb5e63f07.yaml | 58 +++++++++++++++++++ ...erce-fc8048569d06ebc90ac21a7212b76518.yaml | 58 +++++++++++++++++++ ...dget-04f6cc7c3ad39880573726a5f936d0a4.yaml | 58 +++++++++++++++++++ ...ingo-608028938d46bc393127dab9f8a1b9fb.yaml | 58 +++++++++++++++++++ ...lite-18a7728320d1ae3570e8bc349a822d19.yaml | 58 +++++++++++++++++++ ...lite-f9f9f8843b8a77c541ca723acfae2e44.yaml | 58 +++++++++++++++++++ ...tion-78c3981cb87a9d312796397fd5fb8a1d.yaml | 58 +++++++++++++++++++ ...tion-796ca63acc83e02954fe943ab729646a.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-cc61e989c9930149472e4334372ea609.yaml | 58 +++++++++++++++++++ ...orms-019da25ecceb2c42293b8bf9c83a7180.yaml | 58 +++++++++++++++++++ ...orms-8f7e0f2cdbd50435173e1262f75f15c5.yaml | 58 +++++++++++++++++++ ...erce-7e6cf0a72223b6dafdbb68257635237d.yaml | 58 +++++++++++++++++++ ...rame-4d70d402016d1f4b86f60918b22119da.yaml | 58 +++++++++++++++++++ ...rame-5ef4900200b4415e3b14a42418354f64.yaml | 58 +++++++++++++++++++ ...rame-750d46ec675a067e58f6ca5aa716c8bb.yaml | 58 +++++++++++++++++++ ...rame-7af7b97a823a315642996f534f0bd2be.yaml | 58 +++++++++++++++++++ ...rame-8cb4e5d28c572c7b2415f308b23aba3c.yaml | 58 +++++++++++++++++++ ...emap-d3419d10a1c15957810bab79025cae18.yaml | 58 +++++++++++++++++++ ...port-21d84dd234ad676a469c1b281a9da497.yaml | 58 +++++++++++++++++++ ...erce-4a9af0a7a0f9267c64d43cbcc0f6e60e.yaml | 58 +++++++++++++++++++ ...erce-53dce218cb6cdf713c943d61cbe1c885.yaml | 58 +++++++++++++++++++ ...erce-58a489f667854b233fd61745ace5a1a4.yaml | 58 +++++++++++++++++++ ...erce-bf4905bcfa1e978b4bbdcf9e3f9b15d3.yaml | 58 +++++++++++++++++++ ...erce-eb7c2afb91d54b1e8be36c66e317f588.yaml | 58 +++++++++++++++++++ ...dget-95d0775d6527d5eae5d7126ad333b363.yaml | 58 +++++++++++++++++++ ...-mod-b02147be7bebef844df5583704a48a3c.yaml | 58 +++++++++++++++++++ ...tcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tcha-cbb68fdfa6e0c8d1d1dcc60eddde34f0.yaml | 58 +++++++++++++++++++ ...nter-51ed12a9f2c55cf6d27dee66a25ab3d5.yaml | 58 +++++++++++++++++++ ...nter-6868a3f667554717afcb5780d663774e.yaml | 58 +++++++++++++++++++ ...nter-6b14dff49fec7b24e0d17d0c9fb34f3e.yaml | 58 +++++++++++++++++++ ...nter-9c6b12242aa8d580a35fa22bad685fff.yaml | 58 +++++++++++++++++++ ...nter-a606eb221eb05ffe5dadb8dd25fec864.yaml | 58 +++++++++++++++++++ ...nter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nter-fb290f4001663ab9b3572ec6c32d0eb5.yaml | 58 +++++++++++++++++++ ...pups-b8a8e0d0fe8b5ab801f2a60f0e606d3c.yaml | 58 +++++++++++++++++++ ...lock-504571f3f4f99ae23a7efdf0aa6a64d7.yaml | 58 +++++++++++++++++++ ...list-dd776d5a9d71139420b6706ccdb1e25f.yaml | 58 +++++++++++++++++++ ...ager-0a56d3b69d6caf51fb2e7fd016d073ab.yaml | 58 +++++++++++++++++++ ...erce-949ecf55eab79c7524cfdba1c2344ca4.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...quiz-1044e73f9f4c90a4318631b027811f47.yaml | 58 +++++++++++++++++++ ...quiz-84ca5039f02eeb82650dbead88aee202.yaml | 58 +++++++++++++++++++ ...osts-aedd5bdd6732fba44f64193c96bef864.yaml | 58 +++++++++++++++++++ ...osts-afd12d5545489eccaee099aa3bb1c0d7.yaml | 58 +++++++++++++++++++ ...mons-564170441cb69873b0d861ef3dcdaa9e.yaml | 58 +++++++++++++++++++ ...mons-88167a3eb5eaecbe4676b38334e8f643.yaml | 58 +++++++++++++++++++ ...ntor-afe32fcbbc30cab4f3e35a08cf6d7b9b.yaml | 58 +++++++++++++++++++ ...dget-0bc66019a5442f087e2da571324acbb0.yaml | 58 +++++++++++++++++++ ...dget-eec11cac81b9e7efcb35b893f28148cb.yaml | 58 +++++++++++++++++++ ...dget-f8ef60664eb207643cf086f83584b3db.yaml | 58 +++++++++++++++++++ ...ader-501a1f4c716dcfc5dbf27f3bb41b2666.yaml | 58 +++++++++++++++++++ ...arch-5b7332c185aca9ac9b78f6d0d022fb37.yaml | 58 +++++++++++++++++++ ...arch-8206819943af063a893fdd6fd4e9d3b8.yaml | 58 +++++++++++++++++++ ...arch-8e1ec5e631a2487f0c22f50d8172463a.yaml | 58 +++++++++++++++++++ ...arch-bafdacae26c88640cb6e30b25ba66a73.yaml | 58 +++++++++++++++++++ ...umns-46e70ce2d5b65ea57e5b89cf696f0367.yaml | 58 +++++++++++++++++++ ...eset-2bd2ae0db95f304cf533ef5905d6a487.yaml | 58 +++++++++++++++++++ ...ader-7e2d3043b2f8338719c38cc2aa7f1e6b.yaml | 58 +++++++++++++++++++ ...ader-9c4b4d0de92603aa8d882131c97bd1c6.yaml | 58 +++++++++++++++++++ ...tion-843692451d0aaf769ef716bbf02853d2.yaml | 58 +++++++++++++++++++ ...tion-f6df4debeaba888aeb7941d246864164.yaml | 58 +++++++++++++++++++ ...gine-d882520450a9e95c908e1ad71ca03592.yaml | 58 +++++++++++++++++++ ...nion-2a375b974a759f200b634b44a398013f.yaml | 58 +++++++++++++++++++ ...easy-c0f8f6f17ac93058fc835ead77535268.yaml | 58 +++++++++++++++++++ ...ucts-9960c486a0af8a01fba712be84f42610.yaml | 58 +++++++++++++++++++ ...erce-5e2a21e34446161fac44e66bf2f9139e.yaml | 58 +++++++++++++++++++ ...erce-6dc63a693616ad13933a53bb0a4503d9.yaml | 58 +++++++++++++++++++ ...inks-a7668a1f316cb3a4a10463e8f1f4e787.yaml | 58 +++++++++++++++++++ ...ower-49603be4fe7e1b0e01494ff562e4811f.yaml | 58 +++++++++++++++++++ ...-pro-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...tion-5b09bbfafab13caa853913e46666c79b.yaml | 58 +++++++++++++++++++ ...rter-4e7b022945e1e84a41ab0b83bedcfe7a.yaml | 58 +++++++++++++++++++ ...rter-66e9bc6784c94720522599f8e4bbc15e.yaml | 58 +++++++++++++++++++ ...rter-67b32c2b2aa638ff335d272cd6273e53.yaml | 58 +++++++++++++++++++ ...rter-6af7c3d9958b5f30ac2537a2fdf59735.yaml | 58 +++++++++++++++++++ ...rter-b20121a47df1b1b276886f5bf24ee99b.yaml | 58 +++++++++++++++++++ ...rter-c364b3be5ae879c7f6b82ff2d4ab8d09.yaml | 58 +++++++++++++++++++ ...rter-fb9e76e2a53a99a1061be745850fe380.yaml | 58 +++++++++++++++++++ ...ocks-29fccdeb7b52e0d6f66d4f325a03df63.yaml | 58 +++++++++++++++++++ ...ager-0664d46ebb4d5beec24f857df0859063.yaml | 58 +++++++++++++++++++ ...ager-0b8752438dda7aa69e32a586e9110978.yaml | 58 +++++++++++++++++++ ...ager-32ee9eb90ef2a155ebbafe7c599b04ea.yaml | 58 +++++++++++++++++++ ...ager-33941d22287915d817c6ffb3567c4ed8.yaml | 58 +++++++++++++++++++ ...ager-5c818a45f2a9dcd466f195a8752dd840.yaml | 58 +++++++++++++++++++ ...ager-6e35e7842129d49b737d83e066ce8d1a.yaml | 58 +++++++++++++++++++ ...ager-9029119eb68fd27e882d54dbd4a742cd.yaml | 58 +++++++++++++++++++ ...ager-a17b58f6876bd5740a12242958831995.yaml | 58 +++++++++++++++++++ ...ager-c3402d8baeb272f8f57711f60b17c812.yaml | 58 +++++++++++++++++++ ...ager-d32b9642e142675d1efb9d9aa59869ca.yaml | 58 +++++++++++++++++++ ...ager-e1c03f1ab3bdbb028e55c2429bbfb1ad.yaml | 58 +++++++++++++++++++ ...ager-faf4e22f4322606f876df1073bff3e6f.yaml | 58 +++++++++++++++++++ ...tewp-3205ac6df5d6745a5d1c210179723168.yaml | 58 +++++++++++++++++++ ...tewp-9d0741a170ac5d20bebb10f83abadeaa.yaml | 58 +++++++++++++++++++ ...erce-33feebd0ce1f9bfb560414c22acd0fc5.yaml | 58 +++++++++++++++++++ ...erce-936cb1425d1afce350e246d7f6629f3f.yaml | 58 +++++++++++++++++++ ...dmin-0fe1889336697580123eb1971e124832.yaml | 58 +++++++++++++++++++ ...dmin-866cca38d2ecb21a9fd2aaaa55245cfd.yaml | 58 +++++++++++++++++++ ...dmin-958209cd1cdd4ea5cb260b87d6b618da.yaml | 58 +++++++++++++++++++ ...dmin-b0c570c63a16100d4cac08a03560c9a1.yaml | 58 +++++++++++++++++++ ...dmin-c65dc1c886e5406e004d2361f156725f.yaml | 58 +++++++++++++++++++ ...gate-6748230cb5270a84b852b5bff3631f4d.yaml | 58 +++++++++++++++++++ ...gate-97022dfbeffcbfe3aa12e117163569a4.yaml | 58 +++++++++++++++++++ ...gate-fd92bd6a6db4c23807c2430ed1f93f72.yaml | 58 +++++++++++++++++++ ...tion-a5b4dc34f38723a5d47abbf10322cc89.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rify-ad680440946c8285b654e4b8c5916390.yaml | 58 +++++++++++++++++++ ...ties-246a1b75793883d17dc885e0bfc6e4bc.yaml | 58 +++++++++++++++++++ ...ator-589dfcdba354fa240bd819df50a6a8aa.yaml | 58 +++++++++++++++++++ ...ator-944ac31152268777f0456da5b0f72ab2.yaml | 58 +++++++++++++++++++ ...ator-9a7bc6474013942cb9ad4b06ba961bd0.yaml | 58 +++++++++++++++++++ ...ator-9bc085475e51bc522ac86c43319af153.yaml | 58 +++++++++++++++++++ ...ator-dff478252e53a4d48eba850e27632073.yaml | 58 +++++++++++++++++++ ...tion-6c437d39b10b5c27652f2e2c65e1a8bd.yaml | 58 +++++++++++++++++++ ...tion-dbfd1d48ef4c46203463363bfd6d7743.yaml | 58 +++++++++++++++++++ ...0web-3a0831746763e4cc6e13a3b507a11959.yaml | 58 +++++++++++++++++++ ...t-us-4cb7b1b325a065f19e4694c97bc6e095.yaml | 58 +++++++++++++++++++ ...tant-36f9c2eff3f6b6336f95cca8929b8fac.yaml | 58 +++++++++++++++++++ ...gine-3184746777b9e1e2355cf98fc7ddb576.yaml | 58 +++++++++++++++++++ ...gine-780696e15f2e9c20283c58547979c77d.yaml | 58 +++++++++++++++++++ ...gine-be2a7ea44bcbe05b9601da197fe2fcd4.yaml | 58 +++++++++++++++++++ ...gine-e074a411b9f033a38afc60d73e72553d.yaml | 58 +++++++++++++++++++ ...gine-f6ef0668f114bdc3d35c493842c984d6.yaml | 58 +++++++++++++++++++ ...ator-9eed014edec42d5cd4860053e291ce89.yaml | 58 +++++++++++++++++++ ...eeds-bec7b3aa816a59f17fd4e32834f42e90.yaml | 58 +++++++++++++++++++ ...iter-77df5424b8737ee4b8f9f9f20e1fee34.yaml | 58 +++++++++++++++++++ ...gpt3-9466631ad739782449cdf9fdc36419ff.yaml | 58 +++++++++++++++++++ ...lite-395ce3ec44ad4bf8f5ea06caea1ca7c5.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...port-11ae27bab87a7fcaf72c7e008d486310.yaml | 58 +++++++++++++++++++ ...ndar-2689d661f3ccd51f254bc58895e1f11d.yaml | 58 +++++++++++++++++++ ...ogin-f3c89d2a491437ada76310350bb04447.yaml | 58 +++++++++++++++++++ ...cker-61e6a79f794c5261dca1b1de62bb1bb1.yaml | 58 +++++++++++++++++++ ...osts-81e36fcfaba8f47f8b0cb1d0a7f67af8.yaml | 58 +++++++++++++++++++ ...osts-de3ad2c14ae092820725df486681b852.yaml | 58 +++++++++++++++++++ ...more-0d10f95dc02c34323ca2661d596c206b.yaml | 58 +++++++++++++++++++ ...more-1e202ba9a2d031ffbc5309780a3c635a.yaml | 58 +++++++++++++++++++ ...more-28696fa61d6f901911f226ee59d9bc21.yaml | 58 +++++++++++++++++++ ...more-492664286a6eb9d8fced88f47715604a.yaml | 58 +++++++++++++++++++ ...more-4f9a7c8d29cfd4a2c0b16e09a2e378ae.yaml | 58 +++++++++++++++++++ ...more-581efb108579060acb9ef33538e40085.yaml | 58 +++++++++++++++++++ ...more-638d34b4766f8e2a63bed27bf53ab9d8.yaml | 58 +++++++++++++++++++ ...more-8d9637ff6f7495cd146495e0fed931b5.yaml | 58 +++++++++++++++++++ ...hing-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...hing-d42480a2d6aa4bbbab085fa708ce9549.yaml | 58 +++++++++++++++++++ ...more-d42fbc843251d5f50991be5b8b42b3d6.yaml | 58 +++++++++++++++++++ ...more-dd9fbf3b8166974e70c88fa52bb178a3.yaml | 58 +++++++++++++++++++ ...more-ed883dae9c66c1836affaf918e96286d.yaml | 58 +++++++++++++++++++ ...opup-d5f5796dec9da2bb7306be7b46162089.yaml | 58 +++++++++++++++++++ ...tion-2a977820226e88678497823102fe2796.yaml | 58 +++++++++++++++++++ ...post-f5f9272c971083b586bc76b67b0f159d.yaml | 58 +++++++++++++++++++ ...osts-84109abe067d4816d7c462f3484f1a25.yaml | 58 +++++++++++++++++++ ...erce-6a2b5867f4b2cb8b9df53b8ba2dbfdc3.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-d03e7c1b36748ce86c160cf6fe252332.yaml | 58 +++++++++++++++++++ ...lite-150da04fe1b2c2f3039470b8ad6b53ba.yaml | 58 +++++++++++++++++++ ...lite-83c0864a3df9b4d7703e76d7c2b55658.yaml | 58 +++++++++++++++++++ ...lite-a9cc73f9037d9cdf674a96fc1a0c0e0f.yaml | 58 +++++++++++++++++++ ...lite-d1c4ab98e28efbbf6dc7bca15dda3762.yaml | 58 +++++++++++++++++++ ...lite-ee8c565da649725aad8c04a309fabb54.yaml | 58 +++++++++++++++++++ ...-pro-50dadf64810a03dde8b1e065c3742494.yaml | 58 +++++++++++++++++++ ...-pro-a0309fc6dada5d85650b4762bb282066.yaml | 58 +++++++++++++++++++ ...-pro-a896492161d6d4522e22315d9827d81b.yaml | 58 +++++++++++++++++++ ...-pro-e17e90463e6889aa07cbb8b7927771be.yaml | 58 +++++++++++++++++++ ...ator-08f39736bf86d4909fd35daa9e56d865.yaml | 58 +++++++++++++++++++ ...ator-13897edd701bcc92c64dc07394d89d44.yaml | 58 +++++++++++++++++++ ...uild-4fe952dc4f33b2225826338b2a3f9203.yaml | 58 +++++++++++++++++++ ...load-4a0db472e405a72a7a0d1d796c76bfbb.yaml | 58 +++++++++++++++++++ ...smet-0b8de7e6634f1364f8cfc6fe68a06736.yaml | 58 +++++++++++++++++++ ...smet-cff9e4a18682397642168ab27f023202.yaml | 58 +++++++++++++++++++ ...cies-7d62761bf9e985cd9ec96ef45ca051b2.yaml | 58 +++++++++++++++++++ ...line-1a93903cd8703be96d5ab3384ff96410.yaml | 58 +++++++++++++++++++ ...line-5dcbe902f6c095827d48543a0e5195b8.yaml | 58 +++++++++++++++++++ ...line-6838ce604685d145899a0da7953c236d.yaml | 58 +++++++++++++++++++ ...line-79d3f2b9565b075a8be7591881880990.yaml | 58 +++++++++++++++++++ ...line-c50e397cbcec3a24df13ba5f0440e5c0.yaml | 58 +++++++++++++++++++ ...line-dce5f7b0fd01a31b21d6138c4476ff92.yaml | 58 +++++++++++++++++++ ...tbox-20745ffeb0a850e3593a6c35ba6844e0.yaml | 58 +++++++++++++++++++ ...tbox-3d269a7750029141d9d3783312ca3377.yaml | 58 +++++++++++++++++++ ...tbox-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...post-47f5d0213d6a55b30c759752f9fa351e.yaml | 58 +++++++++++++++++++ ...lect-58928e38edbab233a84020a472a44caa.yaml | 58 +++++++++++++++++++ ...ipay-32ce162d5a195b7dc3b119d3f49907dd.yaml | 58 +++++++++++++++++++ ...ipay-e94f4c2cbdc244ce8cd5d182c9382536.yaml | 58 +++++++++++++++++++ ...ubot-515bfb8e519273db685ebdf46ba27554.yaml | 58 +++++++++++++++++++ ...page-bef2b57812116d5514b05222293f3067.yaml | 58 +++++++++++++++++++ ...page-4c92870ff7a0f182a44699dda7bffd35.yaml | 58 +++++++++++++++++++ ...page-7172bda31ad3e76ec8fc3741d1b4007c.yaml | 58 +++++++++++++++++++ ...ocks-9c898a5aa67433abd50514e4cc3473b7.yaml | 58 +++++++++++++++++++ ...ntor-561149d23bc984dc77ee30065a13dd2f.yaml | 58 +++++++++++++++++++ ...ntor-9aa94eb00cf28342fe9feedacb199d11.yaml | 58 +++++++++++++++++++ ...oups-a9400ef3239db6bee40d5b6dffb3e748.yaml | 58 +++++++++++++++++++ ...erce-c0d39693f384de620acf92b953f594c5.yaml | 58 +++++++++++++++++++ ...erce-f5e8e2f7e4d09169e169fd3e043e479c.yaml | 58 +++++++++++++++++++ ...ndar-4cc48166ebcc92ad5083e1d92ba64cf5.yaml | 58 +++++++++++++++++++ ...ndar-9e62074ce42abae7e7fbef8d4e799261.yaml | 58 +++++++++++++++++++ ...ndar-a2ffb630ad37eb7dbee79aab63fdf2fa.yaml | 58 +++++++++++++++++++ ...ndar-d860722788c4c74050a19c2504b094da.yaml | 58 +++++++++++++++++++ ...dget-ab9e9f1fd2829128e3bb4bce435b5cf7.yaml | 58 +++++++++++++++++++ ...icon-1d838507fd655633d89fdd3f677085f8.yaml | 58 +++++++++++++++++++ ...icon-adf6fd1cec72a101892ceb2db93bece6.yaml | 58 +++++++++++++++++++ ...odes-154de88e6cddd165b6ff204a5922a0ba.yaml | 58 +++++++++++++++++++ ...odes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...odes-bbd2aa17be72216554254e2d8e755d19.yaml | 58 +++++++++++++++++++ ...tion-3222e9d54de5c7b5bf110a40b9d38190.yaml | 58 +++++++++++++++++++ ...tion-c5b1505c51ef599dd7a272165d502dfb.yaml | 58 +++++++++++++++++++ ...pets-2c9c135fa647599d064a59e1f5f46c79.yaml | 58 +++++++++++++++++++ ...pets-4e93731af3497ed66d721b94ba1ecb7d.yaml | 58 +++++++++++++++++++ ...pack-1d7ad2d4f9699d8aaf4ebf33922949a2.yaml | 58 +++++++++++++++++++ ...pack-332ad697947dfbdebeb9b4731490be30.yaml | 58 +++++++++++++++++++ ...pack-3e5491f9c256bb6627d2d89120b86cd4.yaml | 58 +++++++++++++++++++ ...pack-52b9b171189fecca507b9059a4e2fc92.yaml | 58 +++++++++++++++++++ ...pack-56c4db12334add5dab088d2ed97db3d6.yaml | 58 +++++++++++++++++++ ...pack-6810465a01d1f9a2f5b95f9fe91e406a.yaml | 58 +++++++++++++++++++ ...pack-6b8b57f1101c92df559274dfef436538.yaml | 58 +++++++++++++++++++ ...pack-814d85e88dab797899057f8e016cf74f.yaml | 58 +++++++++++++++++++ ...pack-996209252b43de8bc510aae02fc9d00b.yaml | 58 +++++++++++++++++++ ...pack-9c814d5a9ddaae393720aa3fbf301f85.yaml | 58 +++++++++++++++++++ ...pack-9cda1ab1353fbdf5592281281da13bfe.yaml | 58 +++++++++++++++++++ ...pack-a64ce08453bed39084d8a2cea93a9117.yaml | 58 +++++++++++++++++++ ...pack-bc257f9f7078df85b51c2e5181af811d.yaml | 58 +++++++++++++++++++ ...pack-c08b2158511f440bda6243887c732dc7.yaml | 58 +++++++++++++++++++ ...pack-d92c57db44864e6e406520d1e97fd01f.yaml | 58 +++++++++++++++++++ ...pack-d9419931966f7a4ced3c49a3cc9a6932.yaml | 58 +++++++++++++++++++ ...pack-f0ea860f14b0b0ca566ac38e74715e9c.yaml | 58 +++++++++++++++++++ ...pack-f74b8b0e3c6cf42f9c7d68f58857b310.yaml | 58 +++++++++++++++++++ ...-pro-ed79806268ad8e12ebf6df82f872530a.yaml | 58 +++++++++++++++++++ ...lite-05ed6188e517a3d4fdb915f7f3265319.yaml | 58 +++++++++++++++++++ ...lery-411b1116f71957083ea7a80c47e56945.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-bcb990d5b998ea9f0d9516d80108b489.yaml | 58 +++++++++++++++++++ ...lery-cae2253667a3a6e475a01cd76266d7d9.yaml | 58 +++++++++++++++++++ ...lery-d6f77b9c72ad2f48ab3f2230e6326337.yaml | 58 +++++++++++++++++++ ...ster-7851eebfd119dbcb64d57949b00c8e79.yaml | 58 +++++++++++++++++++ ...tion-4e8189c76d0d644714db52904b337d1a.yaml | 58 +++++++++++++++++++ ...tion-7757d5b35907f5f49944633dfa8351f2.yaml | 58 +++++++++++++++++++ ...tion-7dd77db31c1f92ec3dedef1e96c01885.yaml | 58 +++++++++++++++++++ ...tion-8f4400345c9597af11e729ad184f888d.yaml | 58 +++++++++++++++++++ ...tion-b0e3894c13ad13c0cec750095d3f0495.yaml | 58 +++++++++++++++++++ ...tion-b422384e41850357dd97dbccb4c496f5.yaml | 58 +++++++++++++++++++ ...tion-baaba4f56b4f175e80057b4999371a96.yaml | 58 +++++++++++++++++++ ...sion-9c485cf198874e1abdd12011232fd4df.yaml | 58 +++++++++++++++++++ ...sion-9c485cf198874e1abdd12011232fd4df.yaml | 58 +++++++++++++++++++ ...tion-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml | 58 +++++++++++++++++++ ...tion-f07ffeeb51734bb9713522e8c30b9042.yaml | 58 +++++++++++++++++++ ...sion-9c485cf198874e1abdd12011232fd4df.yaml | 58 +++++++++++++++++++ ...sion-9c485cf198874e1abdd12011232fd4df.yaml | 58 +++++++++++++++++++ ...wall-034278da31b37bb4154e8c34cebfdbb9.yaml | 58 +++++++++++++++++++ ...wall-1b948ed195be07fe30ccbe1a13374b86.yaml | 58 +++++++++++++++++++ ...wall-1ff113267284bee6f1d42d303e8be7d2.yaml | 58 +++++++++++++++++++ ...wall-261df4cac42862f9e31db7a040ca080c.yaml | 58 +++++++++++++++++++ ...wall-44ac07d5baafaaec1fde2cca5e220010.yaml | 58 +++++++++++++++++++ ...wall-5ac539645eb63c949c47fcaeea5bb661.yaml | 58 +++++++++++++++++++ ...wall-5d289d7e578bce569fb34678a49e0c92.yaml | 58 +++++++++++++++++++ ...wall-63844d0bc7bddede485d089be95f74bf.yaml | 58 +++++++++++++++++++ ...wall-7195efc84ea5b8977b30b3313bab7ab8.yaml | 58 +++++++++++++++++++ ...wall-7567c31561b747bfa0cbc91d7005334d.yaml | 58 +++++++++++++++++++ ...wall-797698582c82d4b61a2a10f67de975cd.yaml | 58 +++++++++++++++++++ ...wall-7e555f0e951cd13fa43e01d838261f04.yaml | 58 +++++++++++++++++++ ...wall-873b15a500e300080bf17fdd62b04ccc.yaml | 58 +++++++++++++++++++ ...wall-8a165e6adde141141ce45b5b63a01ed2.yaml | 58 +++++++++++++++++++ ...wall-8a8f73a13c6d3fc3aaf61bd1592c30a0.yaml | 58 +++++++++++++++++++ ...wall-a314db2bc927095a45456b220d0f28ec.yaml | 58 +++++++++++++++++++ ...wall-bb860d80b94ca7ade5a2893713f833b5.yaml | 58 +++++++++++++++++++ ...wall-c313a41c23d690edbe2cdbf35c825a0d.yaml | 58 +++++++++++++++++++ ...wall-c43c8e4dbb43df481e0c6cf7578539a9.yaml | 58 +++++++++++++++++++ ...wall-cc351f4beec6cba9fc81f542a275a440.yaml | 58 +++++++++++++++++++ ...wall-cf8c3aa457289ad6466208862da0c244.yaml | 58 +++++++++++++++++++ ...wall-d66601db34445c53f772431589140096.yaml | 58 +++++++++++++++++++ ...wall-d6e02747846dc962e1ab5d119bbf94ea.yaml | 58 +++++++++++++++++++ ...wall-df24bb44c8ea32f14d2d1f45017493e8.yaml | 58 +++++++++++++++++++ ...wall-e1b9583cb78e016115d982acbd157618.yaml | 58 +++++++++++++++++++ ...wall-ff26968664379c67bbd03960f230d505.yaml | 58 +++++++++++++++++++ ...nger-64408a501c37fbcf42b9db6bc5338336.yaml | 58 +++++++++++++++++++ ...lery-bc135ea3b74553b0fd14eafbe49bca73.yaml | 58 +++++++++++++++++++ ...lery-e6b6d80807708af0a37d88bb4f8862c7.yaml | 58 +++++++++++++++++++ ...usel-a4f443048ee610edd9a8b4b6992abbfc.yaml | 58 +++++++++++++++++++ ...lkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ages-ab57e6fe4cbafa10ab5f9c2c276102ac.yaml | 58 +++++++++++++++++++ ...-svg-3108293e567a66e53a5d8bbabea561b6.yaml | 58 +++++++++++++++++++ ...ugin-31dc7219db80b05f4214d90d08edeba8.yaml | 58 +++++++++++++++++++ ...ugin-3da0a6229596dce00028400fe8617c2b.yaml | 58 +++++++++++++++++++ ...ugin-a8f44d7ac88d056c42286ff4fcb52be6.yaml | 58 +++++++++++++++++++ ...erce-046fbaec2a225aa81dc9d68e003387fa.yaml | 58 +++++++++++++++++++ ...mail-794ee578d2fea0d37b812494538880ef.yaml | 58 +++++++++++++++++++ ...mail-a800af3f915adeb03a4c49e2c0c22f5f.yaml | 58 +++++++++++++++++++ ...mail-cc81d0e6c8cdea1ef8a5bdab3d5fd485.yaml | 58 +++++++++++++++++++ ...dget-7358f712002614260dfd68c7ec8f6f4a.yaml | 58 +++++++++++++++++++ ...tion-090eaec5db6a3b5e9520804055acdec3.yaml | 58 +++++++++++++++++++ ...gram-23db8271ff8255b01a17c8a3f5ed7743.yaml | 58 +++++++++++++++++++ ...gram-87c10838d1b8a43254afbf05b7f964c2.yaml | 58 +++++++++++++++++++ ...gram-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...gram-b1149dab4397624c406a542663f9d6f1.yaml | 58 +++++++++++++++++++ ...rest-56be40d6cceb101df1647cdc9530b1ac.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-d805d4a834d45dbc023ff957c63ddbf7.yaml | 58 +++++++++++++++++++ ...lter-c55830103f810a3363d3fb305910a1b3.yaml | 58 +++++++++++++++++++ ...nect-62fcd76831b1e2041b5f8a95a5780c32.yaml | 58 +++++++++++++++++++ ...t-ai-39af102f2f1fef516b0141731bd29ae6.yaml | 58 +++++++++++++++++++ ...hers-d9ed7ea48d292aeb09b5a69dca626c8b.yaml | 58 +++++++++++++++++++ ...izer-aff79341750b1cf6ce299e2e5a87675c.yaml | 58 +++++++++++++++++++ ...inks-2e0473e7d7a7731e63b2d6908a232799.yaml | 58 +++++++++++++++++++ ...inks-511039b32ead609323c267e9b1ba2e48.yaml | 58 +++++++++++++++++++ ...inks-9d2a99598a00b93d061f40c1f9bcc177.yaml | 58 +++++++++++++++++++ ...inks-179da13f00bd0c1a7dc169b4d93d8c60.yaml | 58 +++++++++++++++++++ ...link-e8c6c87a94f00d5eab313cc9a401818b.yaml | 58 +++++++++++++++++++ ...ugin-604db2886f0075f3ac3cb7f4356d58ef.yaml | 58 +++++++++++++++++++ ...ront-13e3b44160360e3746c78b8d29452ac0.yaml | 58 +++++++++++++++++++ ...nify-0b5a4c4a0addd6f794e40840ce70fde3.yaml | 58 +++++++++++++++++++ ...nify-ac651fc6ec7fb9810b883366b31dc14b.yaml | 58 +++++++++++++++++++ ...onjs-b196a1a5480d68e35f21f441524da412.yaml | 58 +++++++++++++++++++ ...dmin-20e17109f21cb297758d197e8d1110d1.yaml | 58 +++++++++++++++++++ ...maps-f4919b10c6f7c2a14e1c7d5b8a3f99cb.yaml | 58 +++++++++++++++++++ ...king-1dec4b557f1e0bf62d3ecb5bf357937d.yaml | 58 +++++++++++++++++++ ...king-1e74f382f78739ad9a39f07eff336537.yaml | 58 +++++++++++++++++++ ...king-21e094c4609ed338d0c6ca8ad2e72ecf.yaml | 58 +++++++++++++++++++ ...king-2578d12fdea00971e02ae66b1e0d46ce.yaml | 58 +++++++++++++++++++ ...king-2bddc689f5d338bc55ee33baa5dff25d.yaml | 58 +++++++++++++++++++ ...king-54e594fa48b562cc05ac1592828d94dd.yaml | 58 +++++++++++++++++++ ...king-7aade2b2966b32522e64422bd2ebd245.yaml | 58 +++++++++++++++++++ ...king-9f5c66adfa528be5333386be21bb61b4.yaml | 58 +++++++++++++++++++ ...king-b59499e53223c5a8b455880f0f73a4d1.yaml | 58 +++++++++++++++++++ ...king-bb8040f6049d728dd727ac789ea87332.yaml | 58 +++++++++++++++++++ ...king-d7b2973ce1bce5f224e9a3aa96df9db7.yaml | 58 +++++++++++++++++++ ...king-e3aba66b1c44c2a68545f2079a474dc7.yaml | 58 +++++++++++++++++++ ...king-fe66c51cf4d5dab04c1eb481e6c9c787.yaml | 58 +++++++++++++++++++ ...e-re-041f22e2f532a722c98f76a160bb194f.yaml | 58 +++++++++++++++++++ ...e-re-e0853825d6dfb06bad466ce63aac12b9.yaml | 58 +++++++++++++++++++ ...erta-f5cc690dc04197cd95b8aba840195297.yaml | 58 +++++++++++++++++++ ...ente-810fcfbd5671347d9b568db97f356d26.yaml | 58 +++++++++++++++++++ ...ente-cd1cf1735f71561e3ab5315052ee03d0.yaml | 58 +++++++++++++++++++ ...ions-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...plus-d58e16875ccf06b26ad1bd06e93be82c.yaml | 58 +++++++++++++++++++ ...lbox-5f6a8d3b6e89855777270ac51874a97a.yaml | 58 +++++++++++++++++++ ...lbox-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...p-wp-b9058f95d651f92a27bde9c074bdcdbe.yaml | 58 +++++++++++++++++++ ...ster-d3d77cd29222cddd45d79ddfc8341b95.yaml | 58 +++++++++++++++++++ ...list-65248f15aa94ab7dabcc81cdc7d86180.yaml | 58 +++++++++++++++++++ ...dget-957e4d84091168909dcf10979c3f829e.yaml | 58 +++++++++++++++++++ ...sers-3b7bdb3a8404e199e1deb34a5f3502a4.yaml | 58 +++++++++++++++++++ ...sers-5ff51e8e3d70f359c04a37d7bd2f99bd.yaml | 58 +++++++++++++++++++ ...post-95db80ffd1d934591e0e0a483a99236e.yaml | 58 +++++++++++++++++++ ...humb-96de88df50c13b090e6e70188ce8bb28.yaml | 58 +++++++++++++++++++ ...book-054cd3c24ebffa75be93ee2056e1824c.yaml | 58 +++++++++++++++++++ ...book-9da08dd717e53fc804ec0889b3c45692.yaml | 58 +++++++++++++++++++ ...ewer-16ea15328c267590894ffee4442a84eb.yaml | 58 +++++++++++++++++++ ...ates-28932f902044dea62ee1c6a2f1f7a4c4.yaml | 58 +++++++++++++++++++ ...-cat-7d46d3a81ec6bb63cad62cde0afab07a.yaml | 58 +++++++++++++++++++ ...-cat-e08a52f680b625be47e9beebec7b3154.yaml | 58 +++++++++++++++++++ ...nter-1896039bad385dbb49f9bb374ae0e749.yaml | 58 +++++++++++++++++++ ...r-wp-5b728c0f0ab67d66edeb4ee534a33e19.yaml | 58 +++++++++++++++++++ ...ghts-13226ec92f273d612bf06ab3bca22c10.yaml | 58 +++++++++++++++++++ ...cker-8f9bc8ffd93a472c3d732de50d85129c.yaml | 58 +++++++++++++++++++ ...ndex-843f515046670d7a382e75e7e4f584c1.yaml | 58 +++++++++++++++++++ ...ular-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ngwp-389af4405b0ad50159ccf3ce376f93d6.yaml | 58 +++++++++++++++++++ ...ngwp-4ca7a80c9a74f97dd3daf1874e8c0993.yaml | 58 +++++++++++++++++++ ...tcha-94cc1c5140ee3a2bfeb91a422867b0fc.yaml | 58 +++++++++++++++++++ ...hing-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...hing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...e-it-5cb88706cc3e4d4bdffd38343a9f038a.yaml | 58 +++++++++++++++++++ ...e-it-61c977fb1adb33ac70d098207834a351.yaml | 58 +++++++++++++++++++ ...e-it-6786cc650f667a015a2cad75459e0a89.yaml | 58 +++++++++++++++++++ ...e-it-9d4c7c94456d7936525f7973a9574896.yaml | 58 +++++++++++++++++++ ...ters-4187eb8bb2c5fe78d6c93246f1bd60b8.yaml | 58 +++++++++++++++++++ ...menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...line-b8a793584d2186fb4e0aa8046771e551.yaml | 58 +++++++++++++++++++ ...ters-cf48a696f82d0831c89a84db8271161e.yaml | 58 +++++++++++++++++++ ...fect-8a6899bd3b3c6951efcee5344ca06fff.yaml | 58 +++++++++++++++++++ ...ters-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nces-0f95c70ffc4866d8a15e485bb0d699dd.yaml | 58 +++++++++++++++++++ ...oard-05ea715911776cce9345bba9207f2978.yaml | 58 +++++++++++++++++++ ...oard-4e902ac20277ef72a0ba4b9fef3685d6.yaml | 58 +++++++++++++++++++ ...ekit-59df5359f3dd97e1bd86b18fcb289b4e.yaml | 58 +++++++++++++++++++ ...ncer-e3632f2772b0c1ed9b46e568946ebc5c.yaml | 58 +++++++++++++++++++ ...tent-e64c3828b87ac23a870624916c783fb0.yaml | 58 +++++++++++++++++++ ...ugin-36cd8a02716876f0db4708fd488996f4.yaml | 58 +++++++++++++++++++ ...ugin-8094d83bdd6a783dc479a31b16dcc2d7.yaml | 58 +++++++++++++++++++ ...ugin-a0dc813b81ea3eaaf35abcdfd0e51d08.yaml | 58 +++++++++++++++++++ ...ugin-c3d1c94528da88057c08634021981f55.yaml | 58 +++++++++++++++++++ ...ugin-c888a527d839638dab34ddfabb9982e5.yaml | 58 +++++++++++++++++++ ...ugin-d4f178ca51b9a3854e944ff01429b4d0.yaml | 58 +++++++++++++++++++ ...ugin-f8694c41fb21641e443ef7de9264487a.yaml | 58 +++++++++++++++++++ ...ugin-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml | 58 +++++++++++++++++++ ...tion-0c71e628227c3366ba2ba3d967bd6786.yaml | 58 +++++++++++++++++++ ...tion-0e6f7731fa395b27ed01a77e157db879.yaml | 58 +++++++++++++++++++ ...gize-ba0f1a7c1e75b12eba4e62626fd27944.yaml | 58 +++++++++++++++++++ ...rism-77af612ec3dcbb3822b11616df7c8557.yaml | 58 +++++++++++++++++++ ...spam-41cd3278684cd2fa92e7808b44952638.yaml | 58 +++++++++++++++++++ ...spam-6dd6322d887c160ebd9dfa555a077a3f.yaml | 58 +++++++++++++++++++ ...cker-1198314be1810779166a4e03d8729a10.yaml | 58 +++++++++++++++++++ ...cker-52d5b418dd2173338819829d8805e340.yaml | 58 +++++++++++++++++++ ...cker-6e0c5ff8c6831d302f08813c9570b138.yaml | 58 +++++++++++++++++++ ...cker-ee14c893825237703550266d1fea00de.yaml | 58 +++++++++++++++++++ ...-bee-a7e9b1b256d670c7c0f18ffa58157054.yaml | 58 +++++++++++++++++++ ...irus-a436748e8c0a814be61fc5b51906b1d1.yaml | 58 +++++++++++++++++++ ...hive-498bbeebfd7d1067e2db21072dfc82ff.yaml | 58 +++++++++++++++++++ ...hive-633a7d922fc914b18ddc7d21035ab39d.yaml | 58 +++++++++++++++++++ ...hive-c19853d6227a07842c1d1043daa343e2.yaml | 58 +++++++++++++++++++ ...name-3bc0607c56016206aa45fc2de8e660d1.yaml | 58 +++++++++++++++++++ ...opup-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...opup-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ment-186957a6ecba5765a080f5c6c5b39bcb.yaml | 58 +++++++++++++++++++ ...ment-b59e16af89b52cabb8769776994f8e59.yaml | 58 +++++++++++++++++++ ...ment-d22c70f9ec92b7d76f2eae20313e8d32.yaml | 58 +++++++++++++++++++ ...ment-ee36904a88935929b3b15a0e036819ac.yaml | 58 +++++++++++++++++++ ...font-01e8465418f355e76abbd3d29a83c487.yaml | 58 +++++++++++++++++++ ...dget-acdadfe8e1df89f0c7d26ae29b23fa05.yaml | 58 +++++++++++++++++++ ...yvar-180f313b58923b98a121e2e279750680.yaml | 58 +++++++++++++++++++ ...ntor-953d7c74a5cb5d227016dedae23e3cfa.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mbed-881cc93528fb94be5fa214f77b12a3dc.yaml | 58 +++++++++++++++++++ ...tori-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...nial-e046ac5677cd6d59abd3c0371d7c020d.yaml | 58 +++++++++++++++++++ ...nial-ea71ac2a34dc7248e02bdf91d9e86e30.yaml | 58 +++++++++++++++++++ ...menu-415cf9b2f7bbb0e22dd8557e0a6ae54d.yaml | 58 +++++++++++++++++++ ...lite-55621d6fc615b8d4a345ef4a0a4b8e73.yaml | 58 +++++++++++++++++++ ...lite-dd1e137c703afe40250d4d373711d33b.yaml | 58 +++++++++++++++++++ ...arat-7c5c2b955a800f0567ad6425eb1a8e69.yaml | 58 +++++++++++++++++++ ...ment-00968ba3e8c09884c42e4fbfc8959579.yaml | 58 +++++++++++++++++++ ...chat-da0d789e3ff0c2c8ea9e944c14348b70.yaml | 58 +++++++++++++++++++ ...auth-fee563db4bd1e05c4270644fa9c809a1.yaml | 58 +++++++++++++++++++ ...2018-d02235de5f3ca7c1b60ff50591414693.yaml | 58 +++++++++++++++++++ ...-org-13ae41c5ac5351326da940b1b17232ba.yaml | 58 +++++++++++++++++++ ...maps-63bf92bd556ddc7e31ce5d5810bb1772.yaml | 58 +++++++++++++++++++ ...ctor-19171308e9a97bd1af9a42e88ced211e.yaml | 58 +++++++++++++++++++ ...ctor-eade6cf258216cda6b355deeb5801b73.yaml | 58 +++++++++++++++++++ ...meow-2d245ed13c0df226645514583b167c2e.yaml | 58 +++++++++++++++++++ ...ions-07d84b9abdb8923fa8bed12fef2c739c.yaml | 58 +++++++++++++++++++ ...ions-2c1fdb69500dc831bd46062ddc0d2b02.yaml | 58 +++++++++++++++++++ ...ions-783d77b98a5b328f4a28ee2d5345a1f8.yaml | 58 +++++++++++++++++++ ...ions-7c93e57058800cc97d4580d0e8797ab3.yaml | 58 +++++++++++++++++++ ...-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lder-41d7dedc3e3a9c3e6b69d336c29a1195.yaml | 58 +++++++++++++++++++ ...lder-e5e1ea362452a736ee3e514dade0c3d9.yaml | 58 +++++++++++++++++++ ...erts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...line-5543057e7022cfec9b8ae11fa6f72d5e.yaml | 58 +++++++++++++++++++ ...line-79807fbebc743d8cb1249f7ab347cb5d.yaml | 58 +++++++++++++++++++ ...line-acf9697c1a09f246be4d3f2a957b0449.yaml | 58 +++++++++++++++++++ ...site-989829020debf8c57aef5b384fb5a34d.yaml | 58 +++++++++++++++++++ ...ndar-08426323208aa24ee3404d3b3ddfff01.yaml | 58 +++++++++++++++++++ ...ndar-08a6dbc5d307f61c67e7655c763c44e3.yaml | 58 +++++++++++++++++++ ...ndar-297cb3aa5bbfd9cc7b8af82349a82915.yaml | 58 +++++++++++++++++++ ...ndar-35c4ece0623f219b885fb4f9c4a8296b.yaml | 58 +++++++++++++++++++ ...ndar-5da504c8dee91299e78459069ad88795.yaml | 58 +++++++++++++++++++ ...ndar-6dd0e2469be8342859a9ccb068065a86.yaml | 58 +++++++++++++++++++ ...ndar-771c97465f47602bb9d8eaea8019fba4.yaml | 58 +++++++++++++++++++ ...ndar-945428d4546aafa998fc04a10d10dbe9.yaml | 58 +++++++++++++++++++ ...ndar-9ab71be11dbcb0181c89ee507de51f30.yaml | 58 +++++++++++++++++++ ...ndar-e90b932522d2fa559539fe55a84e18ea.yaml | 58 +++++++++++++++++++ ...ndar-1c7dc157fa96adfd05a4bca562cbd9a9.yaml | 58 +++++++++++++++++++ ...ndar-a44ebccf5ee05a1c5c4e60f95c997bb4.yaml | 58 +++++++++++++++++++ ...ndar-ddf4f66c18523a137871577fe704ba77.yaml | 58 +++++++++++++++++++ ...king-236c93e0abdcaccaa98b96d0eb756aaf.yaml | 58 +++++++++++++++++++ ...king-49498beeab40d799abe54105f37dda52.yaml | 58 +++++++++++++++++++ ...king-8140e129d8e838ad592a5c184c1cf2c6.yaml | 58 +++++++++++++++++++ ...king-93e983f709a0a8202ff094d785febb7b.yaml | 58 +++++++++++++++++++ ...king-aa161d7417ea73aa3cb2b51c21fd83db.yaml | 58 +++++++++++++++++++ ...king-b36315e23ade129c61fb07a902fc54b7.yaml | 58 +++++++++++++++++++ ...king-bb0044840289e8306c7f62e7542e65ad.yaml | 58 +++++++++++++++++++ ...king-e18c42540e73da21df0e80ed6910311c.yaml | 58 +++++++++++++++++++ ...king-f0cf91bed602f178255f06e47ead86ab.yaml | 58 +++++++++++++++++++ ...ents-8afefefadde8900ab97df32e69f71d32.yaml | 58 +++++++++++++++++++ ...sser-2f1276a08770749aab26a12f9e94025f.yaml | 58 +++++++++++++++++++ ...sser-36235d6783de2113be1f6010065b9add.yaml | 58 +++++++++++++++++++ ...sser-3f24de62c55c69c367431f554a182adc.yaml | 58 +++++++++++++++++++ ...sser-ee0a89e3e23a3a50f6d12be73524e3c6.yaml | 58 +++++++++++++++++++ ...nner-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...lery-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...site-b0a5bbc946df09d6c3b0cc9fe2eebc81.yaml | 58 +++++++++++++++++++ ...pack-6d5aea08d890e341921e43e6b4a849e2.yaml | 58 +++++++++++++++++++ ...ctus-34166a606544203d0a234746ff259ddd.yaml | 58 +++++++++++++++++++ ...ctus-5efe3bb103834ebca4e7ce81f7b0fd92.yaml | 58 +++++++++++++++++++ ...font-81f4538f2765df23f8b4f561b33039aa.yaml | 58 +++++++++++++++++++ ...dget-e83ff3d04c646c58cf810db301109219.yaml | 58 +++++++++++++++++++ ...ates-1c50317ba4f62105b747a16f1bd9f458.yaml | 58 +++++++++++++++++++ ...ates-63705f2cf5933c3d0b8cb680facff791.yaml | 58 +++++++++++++++++++ ...ates-8185273926919177675b90d12fcb9ed0.yaml | 58 +++++++++++++++++++ ...ates-97ba3b63c769d26efcad34ad353deecd.yaml | 58 +++++++++++++++++++ ...-faq-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml | 58 +++++++++++++++++++ ...odes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml | 58 +++++++++++++++++++ ...odes-2638501c4f697eb3fd2442b86e278a44.yaml | 58 +++++++++++++++++++ ...orms-2a8ab0eb9e4b0b2a994e3256b1961375.yaml | 58 +++++++++++++++++++ ...orms-3e021672a349a4fa909b6c3fa423b85d.yaml | 58 +++++++++++++++++++ ...orms-7071343c33e807accfdddf119ab9779f.yaml | 58 +++++++++++++++++++ ...orms-a0061c960a93fff2adc1360d0d280001.yaml | 58 +++++++++++++++++++ ...orms-a84b96611f097506467644350038a82b.yaml | 58 +++++++++++++++++++ ...lder-021b10291895f49c72c52c95a60965eb.yaml | 58 +++++++++++++++++++ ...lder-2b5549b3c83c7777a1b6e0311c345bd4.yaml | 58 +++++++++++++++++++ ...lder-74c47f2edddbb589b4230d596bf5f1e4.yaml | 58 +++++++++++++++++++ ...lder-934adbeaa90ed24edd97e3a659c47938.yaml | 58 +++++++++++++++++++ ...lder-b525a1e6aebd5326b1ab0e97e084de90.yaml | 58 +++++++++++++++++++ ...lder-b8f70793547b459fbbb5874a8a3de62b.yaml | 58 +++++++++++++++++++ ...lder-bab973a9aab141bdb4381de471b4752a.yaml | 58 +++++++++++++++++++ ...lder-d033cc97f1c7c8d9b5f748a688df721f.yaml | 58 +++++++++++++++++++ ...iner-e26e58963c45719b3e25492ec26bb785.yaml | 58 +++++++++++++++++++ ...ctor-09c79ac5dfe7a7e2777e5c3067dc8b55.yaml | 58 +++++++++++++++++++ ...ctor-38ba390551110addf63f2acef704b878.yaml | 58 +++++++++++++++++++ ...ctor-82cf044c6b5c43e07d092f3e03e58313.yaml | 58 +++++++++++++++++++ ...tbox-80735d78d7816d8ea105bb7f1037c875.yaml | 58 +++++++++++++++++++ ...quiz-104becea74a63a5fb9c4e033385ae9cb.yaml | 58 +++++++++++++++++++ ...quiz-3587db01a7a28244ee4173daa03a691b.yaml | 58 +++++++++++++++++++ ...quiz-6f4ecb36b96c9dd745bf20e36b1a7043.yaml | 58 +++++++++++++++++++ ...quiz-83e77c7536580dfcf15705797ee936c4.yaml | 58 +++++++++++++++++++ ...quiz-9cc53a2c7c51eb8cc900a2d7b01bfc6a.yaml | 58 +++++++++++++++++++ ...quiz-a088cd6d5872bf40384c1e2afa0283ab.yaml | 58 +++++++++++++++++++ ...quiz-f630977977a8e3f3533623f6c0f7c890.yaml | 58 +++++++++++++++++++ ...itor-2b16886725a873c1bee4cefe26c49349.yaml | 58 +++++++++++++++++++ ...mber-3ca2d382a221d380504a5d9703316520.yaml | 58 +++++++++++++++++++ ...mber-744209b23a7e6299f52186bba738be87.yaml | 58 +++++++++++++++++++ ...ship-0786d35a357f001d251a3bbf5eef2d35.yaml | 58 +++++++++++++++++++ ...ship-12b01b43b57b8f272157206cf06dc3ef.yaml | 58 +++++++++++++++++++ ...ship-2c4f92f87bb9ef6f0a1e7c033135ace0.yaml | 58 +++++++++++++++++++ ...ship-41830c974de1f3419028654a94a429d1.yaml | 58 +++++++++++++++++++ ...ship-4c834bc5fa8008630a55b72e056da47e.yaml | 58 +++++++++++++++++++ ...ship-52377d1fb17ba651463be55fa1b78765.yaml | 58 +++++++++++++++++++ ...ship-6cb8297a956ab7d71fae8eaf17eed227.yaml | 58 +++++++++++++++++++ ...ship-77d3a7baf2067b9573aef8e72c5d2033.yaml | 58 +++++++++++++++++++ ...ship-928dd303af6c4624ef6e7653fba246d7.yaml | 58 +++++++++++++++++++ ...ship-9650322438fb16b52c4432ecc521bf68.yaml | 58 +++++++++++++++++++ ...ship-9b5e7b374f6bba66c7565c0c933eb6f5.yaml | 58 +++++++++++++++++++ ...ship-a85248fb3ba2da0688167185e0c87249.yaml | 58 +++++++++++++++++++ ...ship-ab42ec9d60829884112a87fe093b6c61.yaml | 58 +++++++++++++++++++ ...ship-cb6fa6f6958986304e8bc18c130022ba.yaml | 58 +++++++++++++++++++ ...ship-df79548a0cacba87c7dd01e5f2d614e3.yaml | 58 +++++++++++++++++++ ...ship-e36fdcdf09b5a64eac64f879dc48947d.yaml | 58 +++++++++++++++++++ ...ship-f134a30b8e43bd6402d66fadc73e7004.yaml | 58 +++++++++++++++++++ ...ship-fe13beada39d84f2847878b7d4da45e8.yaml | 58 +++++++++++++++++++ ...able-79efca326c7a11854304313bbb2dcff3.yaml | 58 +++++++++++++++++++ ...able-a7def05240ca9e7abb72b7c9c9771694.yaml | 58 +++++++++++++++++++ ...pups-a719159263b63e2be06c98fecd13de77.yaml | 58 +++++++++++++++++++ ...code-6866d09139386202bbed5983be370086.yaml | 58 +++++++++++++++++++ ...tion-47deea3f06e73d1d92fa8e2918f9b61e.yaml | 58 +++++++++++++++++++ ...ibot-a33517bbb57428ced1cfd6968a2c3a6b.yaml | 58 +++++++++++++++++++ ...ibot-a516963ffdc1c41b00bc8d54c0948a03.yaml | 58 +++++++++++++++++++ ...tics-727442235b3241daec9b8505f42a54a7.yaml | 58 +++++++++++++++++++ ...tory-6ee3ff55725bf2e5894fc0e814f92fd5.yaml | 58 +++++++++++++++++++ ...edux-bab2d740e6550ac0744f9a04322bcfe9.yaml | 58 +++++++++++++++++++ ...2pdf-32331c436a25ac1de1bf5da05cd58308.yaml | 58 +++++++++++++++++++ ...2pdf-bc30f477415f000a25c8cf2e28a66988.yaml | 58 +++++++++++++++++++ ...dget-ab0a99467dd011ce171b426da9ac5ab8.yaml | 58 +++++++++++++++++++ ...ache-44de9a2461187be18ff94240ec7b0927.yaml | 58 +++++++++++++++++++ ...-log-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml | 58 +++++++++++++++++++ ...-log-70da5885a2f28e43c5e9331e1fdeb92b.yaml | 58 +++++++++++++++++++ ...-log-7e4338ffecef779ba0a29a7607305ac9.yaml | 58 +++++++++++++++++++ ...-log-8bb2281b07179f11fd172e832ab240af.yaml | 58 +++++++++++++++++++ ...-log-be27c4b6992c035b340ec769cdb51351.yaml | 58 +++++++++++++++++++ ...-log-d4d7a04a467c657c90f622b79da37f85.yaml | 58 +++++++++++++++++++ ...-log-e186fa859c9eb38cc8ef0cb73e6a43b4.yaml | 58 +++++++++++++++++++ ...-log-e2708e282bb00df5e2bc3a4493f5868c.yaml | 58 +++++++++++++++++++ ...ages-d1f3834e2f95aaed2e601e83a20e5d59.yaml | 58 +++++++++++++++++++ ...iles-6b99b25706bc10b6938889b6d61c2c79.yaml | 58 +++++++++++++++++++ ...iles-f31b01af0e36d70ece981a2da79389f8.yaml | 58 +++++++++++++++++++ ...orum-253ae1868772845aa5a363aeb4a8d859.yaml | 58 +++++++++++++++++++ ...orum-488a5177633c5d61ff8bef1899fcdb13.yaml | 58 +++++++++++++++++++ ...orum-536f8f709fcfc0e34ccf2b79f3c436d7.yaml | 58 +++++++++++++++++++ ...orum-6584898d6200cc68ea0f9c1ee82648c2.yaml | 58 +++++++++++++++++++ ...orum-9f49ea16b14f6c2511df8453564cbeeb.yaml | 58 +++++++++++++++++++ ...orum-d214d99e51223f558d7540a78be5f43a.yaml | 58 +++++++++++++++++++ ...orum-d9dc418339bf1c25423bb7e18f222c8e.yaml | 58 +++++++++++++++++++ ...orum-eb11a26c1af4959f22b43b7df59cd527.yaml | 58 +++++++++++++++++++ ...xtra-c4ac8ff1dfd268623baae850718c4ab2.yaml | 58 +++++++++++++++++++ ...ense-3ee736065c571005f3aa44af407146c3.yaml | 58 +++++++++++++++++++ ...mber-caf355595af5171fa75c6b8b0c04dfb1.yaml | 58 +++++++++++++++++++ ...ator-2dc16b0147ac9503c18f0e957af766f8.yaml | 58 +++++++++++++++++++ ...rter-5012da2be4de20cb472aea0abf71670b.yaml | 58 +++++++++++++++++++ ...rter-615972550ac1ea7b975135922dc13fb0.yaml | 58 +++++++++++++++++++ ...rter-f96d2d362df935e9372a6bebea47626c.yaml | 58 +++++++++++++++++++ ...rter-cb307b5a36222abf7cd21b8d59667e63.yaml | 58 +++++++++++++++++++ ...ager-0e47f60cc879dad43442c621e6d5bb62.yaml | 58 +++++++++++++++++++ ...tant-aa77d870ecb6d6f531eb842d8f66fa4d.yaml | 58 +++++++++++++++++++ ...tant-c365c40f61838d38a40469cd2e67b28b.yaml | 58 +++++++++++++++++++ ...ddon-1ab112c9db0961813049d1b450f4b178.yaml | 58 +++++++++++++++++++ ...ddon-349353b08ad0d6204581635fb97a9527.yaml | 58 +++++++++++++++++++ ...edit-3e0d971821f286a488f83631df3f9e8f.yaml | 58 +++++++++++++++++++ ...port-d974f8d1ecb932f30e0efce7f2789451.yaml | 58 +++++++++++++++++++ ...ites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml | 58 +++++++++++++++++++ ...ites-53fb886a588d15854380c3b94bdeab19.yaml | 58 +++++++++++++++++++ ...ites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml | 58 +++++++++++++++++++ ...ites-53fb886a588d15854380c3b94bdeab19.yaml | 58 +++++++++++++++++++ ...ites-9449b2c65db0c3fbbcb51d4c753869a4.yaml | 58 +++++++++++++++++++ ...ites-b7edfb498be50e4270697b56ff65997c.yaml | 58 +++++++++++++++++++ ...ites-dfeeecb3cd427fc07ce343314d55c42c.yaml | 58 +++++++++++++++++++ ...ites-ead0c2fc6bfbbdd6a858fbe0610f5c02.yaml | 58 +++++++++++++++++++ ...ript-1487ac20915c63a985fc090bb178b2a8.yaml | 58 +++++++++++++++++++ ...ript-3a24ca5d79101db2344acd5815fa20cf.yaml | 58 +++++++++++++++++++ ...tion-70c6c7a80871c323a0d41da757459072.yaml | 58 +++++++++++++++++++ ...tion-79139d2e0a7eb5022bea3408ba7847f1.yaml | 58 +++++++++++++++++++ ...tion-b5350d73ee034ae7067ab3d2b696ae06.yaml | 58 +++++++++++++++++++ ...ions-98d9cd4d13fec25657ca94210605c694.yaml | 58 +++++++++++++++++++ ...base-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...chat-f021a9b99ee30b184dab1f6f57a36751.yaml | 58 +++++++++++++++++++ ...ager-b68d1df69fccd4a3fd0f7eef890ed158.yaml | 58 +++++++++++++++++++ ...ager-c52de35daf5b13bbf0e8777d574ea5fc.yaml | 58 +++++++++++++++++++ ...xtra-76e71bc12b464dcb30907399a9d0eccf.yaml | 58 +++++++++++++++++++ ...ugin-47d9c553f76b1db5bf988e755d7f727b.yaml | 58 +++++++++++++++++++ ...ayer-9585db3736e35b2828063fe3229af0e9.yaml | 58 +++++++++++++++++++ ...udio-d78d8916b5f5bd711472247cd8557306.yaml | 58 +++++++++++++++++++ ...hant-07cf727b65166fc33c537ed10a4a1542.yaml | 58 +++++++++++++++++++ ...hant-40a88180b6759feac8abef362a1880e9.yaml | 58 +++++++++++++++++++ ...ayer-c346700edac77f8ba964672619183f58.yaml | 58 +++++++++++++++++++ ...mate-4a822bfcb4b13bd5154ea0a206a03b5b.yaml | 58 +++++++++++++++++++ ...cord-d64db224cd3df0f0072f2a058012253c.yaml | 58 +++++++++++++++++++ ...tube-bb4857408fb36340cc11efff0d796ba5.yaml | 58 +++++++++++++++++++ ...lity-5d2387c9183cf43d10d61fd017f20663.yaml | 58 +++++++++++++++++++ ...uth0-03670bf85bbf904a0e4e7a4b5e5a3b85.yaml | 58 +++++++++++++++++++ ...uth0-2b0533cd6930889b564dac0001232de1.yaml | 58 +++++++++++++++++++ ...uth0-4c3165a51cada8ffcfc130121958fc36.yaml | 58 +++++++++++++++++++ ...uth0-6bd4ae57c5ef629c5bc1d004189d96b3.yaml | 58 +++++++++++++++++++ ...uth0-74d2043a574ab69cbbb11dda595211e3.yaml | 58 +++++++++++++++++++ ...uth0-90a41beee5735837ff7592583a00d291.yaml | 58 +++++++++++++++++++ ...ator-ec741bccccea1c86002394aeac45c0a7.yaml | 58 +++++++++++++++++++ ...ldap-bdd4b664f15822a6a49a236c18fe020b.yaml | 58 +++++++++++++++++++ ...ldap-cc2cca093f03fe71d2f989bb7299a3fb.yaml | 58 +++++++++++++++++++ ...tars-2ba7e464285026388de6685dba844dbc.yaml | 58 +++++++++++++++++++ ...-box-6674d09f375c0a0c6100b633268f7e7c.yaml | 58 +++++++++++++++++++ ...chat-e0ff0dcaa5f28679cfbec1f0cc721e5e.yaml | 58 +++++++++++++++++++ ...izer-0dee3aeb64244e66a13f4201e38521ac.yaml | 58 +++++++++++++++++++ ...list-f4f27ef7b51870c2ee29ac141ca3d041.yaml | 58 +++++++++++++++++++ ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...osts-558370c6db6c7d4d1eb32adfed3a020b.yaml | 58 +++++++++++++++++++ ...here-9438e07daceade026bfabee5db9fec5f.yaml | 58 +++++++++++++++++++ ...-bar-1243017811fac8a9f67c1c02c6c11406.yaml | 58 +++++++++++++++++++ ...urls-0886361daf0aecc3d4f4d311809f8748.yaml | 58 +++++++++++++++++++ ...aded-ea1f016fc610b9737d2a2631fc4d6d33.yaml | 58 +++++++++++++++++++ ...ings-8b6ee3af1a9508cfbedefd1fe07951b6.yaml | 58 +++++++++++++++++++ ...ager-c35094b437e27c460747dae02d21159c.yaml | 58 +++++++++++++++++++ ...tion-3503792f93b778d8b203c79791005536.yaml | 58 +++++++++++++++++++ ...tion-cbd733c7ebdd096e6d282497c4c8eb45.yaml | 58 +++++++++++++++++++ ...ster-8a80eb46c7edc3e736e43babb9e6251b.yaml | 58 +++++++++++++++++++ ...-tag-5181665927ed9da562e36af3ea3ec2fb.yaml | 58 +++++++++++++++++++ ...nail-272755bdeeb1adc01a4352f800652c09.yaml | 58 +++++++++++++++++++ ...nail-4a832155afe3b99c1f4d2882162139df.yaml | 58 +++++++++++++++++++ ...nail-eb2326275a758827f7cb2f8622cad6ce.yaml | 58 +++++++++++++++++++ ...ster-d78cf00c59cb04a1784e89b4d96527fd.yaml | 58 +++++++++++++++++++ ...osts-0853f27900d9d1d4cc0e56f1b61fc316.yaml | 58 +++++++++++++++++++ ...page-176d59252e2a1ced83fc8440cad1b0f5.yaml | 58 +++++++++++++++++++ ...load-9eab813e12b4ac048e7bde30bc6ba691.yaml | 58 +++++++++++++++++++ ...ator-ef92930a59c0704397081e4543f7586d.yaml | 58 +++++++++++++++++++ ...plus-1fdd6fa4d9b258037503dfcfecd3a543.yaml | 58 +++++++++++++++++++ ...ages-7deebe50bd92a2450bb0ab52d4fabce8.yaml | 58 +++++++++++++++++++ ...ages-e720f99baaecf49f6cf9a7d54ee9d187.yaml | 58 +++++++++++++++++++ ...rter-be7901b9f5b68d7364c4afedf93335bf.yaml | 58 +++++++++++++++++++ ...rm-7-4113301795a9f6abc828e53db152bc61.yaml | 58 +++++++++++++++++++ ...inks-ad0620cb04a8c4743efa183697178556.yaml | 58 +++++++++++++++++++ ...itor-3a906cc64f922d280ee100fae46edd10.yaml | 58 +++++++++++++++++++ ...ewoo-4dae001d6d6e08996c09e2836f10b44d.yaml | 58 +++++++++++++++++++ ...ewoo-62fe87d4141e78303e17a76d693266f0.yaml | 58 +++++++++++++++++++ ...ewoo-ccfc84b5a73050c155c0bdabcf1ece75.yaml | 58 +++++++++++++++++++ ...ewoo-d7fca3e11b3b0863de2f43ab6c4390c1.yaml | 58 +++++++++++++++++++ ...nger-61bee7d86e2db9bfd0c620f9695ac8f0.yaml | 58 +++++++++++++++++++ ...ting-b320e1c5f0dacab6b03f963021265f72.yaml | 58 +++++++++++++++++++ ...-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tact-8ce996cc6b76d039a08ff1d01926c151.yaml | 58 +++++++++++++++++++ ...ries-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...cher-3117c9f6ca4b5d0c58f750cb4d3a545e.yaml | 58 +++++++++++++++++++ ...lery-41e70074e724b3d58c82d2325b25db5e.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...osts-0a33d637c29ba75c2b509bcefbd3461e.yaml | 58 +++++++++++++++++++ ...orwp-8115d47111d8823e88df213c3ae2493b.yaml | 58 +++++++++++++++++++ ...orwp-bb200d907df69c9c4fcee1658bb3b23d.yaml | 58 +++++++++++++++++++ ...orwp-ecd15bc5f3de0e81bd280c25d15be5a4.yaml | 58 +++++++++++++++++++ ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mize-4cdab5a4c9d1ef359c9ea3e65c6cdb07.yaml | 58 +++++++++++++++++++ ...mize-6be16d4dc7a3396a4e2044185bf46f84.yaml | 58 +++++++++++++++++++ ...mize-75251abfce703752327c7069170783ae.yaml | 58 +++++++++++++++++++ ...mize-80c50d46e1edaea1d21acc931b61620b.yaml | 58 +++++++++++++++++++ ...mize-967efd081266df53c7d5c10295955cd0.yaml | 58 +++++++++++++++++++ ...mize-9b6d789ab9054bec8f3668e533e7af06.yaml | 58 +++++++++++++++++++ ...mize-a168ad5542ffc3cded569dbf621954d3.yaml | 58 +++++++++++++++++++ ...mize-c98cc11ba230cb93eea39872b453bb99.yaml | 58 +++++++++++++++++++ ...mize-dac1811f2f42b2f9bf0fce4cd043df4e.yaml | 58 +++++++++++++++++++ ...-gwa-1baba58fdf15d4d0a7d4d7886ec16e9b.yaml | 58 +++++++++++++++++++ ...-gwa-d0a082141e820d78d2c62d7167bca620.yaml | 58 +++++++++++++++++++ ...-net-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tter-1f6e5011b7adf7858fca1938316d62fe.yaml | 58 +++++++++++++++++++ ...tter-73081b1f6f4e13a9e6e969eba5e746fc.yaml | 58 +++++++++++++++++++ ...tter-f9078038dec7d199edb0413f76661495.yaml | 58 +++++++++++++++++++ ...ress-4914e87d81ced1cde016cf120e762a4b.yaml | 58 +++++++++++++++++++ ...ents-700e36ec39fe3e8c88c494279e29f4d3.yaml | 58 +++++++++++++++++++ ...ents-730a6fdf4be6bb50ac42ce16cbcc6d77.yaml | 58 +++++++++++++++++++ ...ents-7c56383fa31fa34806b79179038f9c39.yaml | 58 +++++++++++++++++++ ...ents-7cb2639ce12fe262360726f38fcd9d92.yaml | 58 +++++++++++++++++++ ...ents-9eb8fddd5a9f0696ed91d545e4dd965c.yaml | 58 +++++++++++++++++++ ...ents-a06dc2822d205c30829a39942b5c0aee.yaml | 58 +++++++++++++++++++ ...ents-a3c60d763b55ba109d8e7ef5cc4b73cf.yaml | 58 +++++++++++++++++++ ...ents-c1fa4ca90d68aef3b1e407c4bbb8f6e9.yaml | 58 +++++++++++++++++++ ...ents-ce1baa6ffb742e3e4c86c030e2aaf287.yaml | 58 +++++++++++++++++++ ...ents-d5f51941abb9e332fec6da6716857cba.yaml | 58 +++++++++++++++++++ ...ents-d69e955ab6caeeb527fcd68ff48fdaa2.yaml | 58 +++++++++++++++++++ ...ents-d7661df8620c7b906e4301d69849100f.yaml | 58 +++++++++++++++++++ ...ents-efcaa0147762fa54393728f49e9affeb.yaml | 58 +++++++++++++++++++ ...olio-bd574799289bf82115af4f7319ebe51c.yaml | 58 +++++++++++++++++++ ...shop-e3bcf24a15914a9cc834e70ea4b9adc8.yaml | 58 +++++++++++++++++++ ...r-wp-1c7bd7b413a535860c5a3694b104e04c.yaml | 58 +++++++++++++++++++ ...ndar-1fa01304932da158500562eabc5ce5d0.yaml | 58 +++++++++++++++++++ ...ndar-3850f9fd40f943ca2e9ea3445b1f1e23.yaml | 58 +++++++++++++++++++ ...ndar-562eae7f881850beb009ee88869dd234.yaml | 58 +++++++++++++++++++ ...alex-00e15cae549764aa48f28dd7ae0bb1cd.yaml | 58 +++++++++++++++++++ ...alex-9bcf1b21f2afb149521c1b2b2eae8a87.yaml | 58 +++++++++++++++++++ ...lite-d11978412fa07cd9d2358fa468a9d42e.yaml | 58 +++++++++++++++++++ ...at-3-417e197336cd9f9a0d5cd9505aacac7b.yaml | 58 +++++++++++++++++++ ...avcp-28b0382bdb3605846c741b0b29e57d1e.yaml | 58 +++++++++++++++++++ ...load-3231c8774c4d66bff9d3f46fb317e754.yaml | 58 +++++++++++++++++++ ...orms-2837065b3a48acc8f4f2b3e0459274f1.yaml | 58 +++++++++++++++++++ ...ndar-f27c37237edad62fdf365ba901d07da8.yaml | 58 +++++++++++++++++++ ...dget-16c74e447f178d9a81be3266e07ecdda.yaml | 58 +++++++++++++++++++ ...dget-cbc652a67aafb71a7a53197a032b3a41.yaml | 58 +++++++++++++++++++ ...olio-18b2efc80a79b2c683b250abf8605dd3.yaml | 58 +++++++++++++++++++ ...olio-d959830a068b86235ba87177aa38047a.yaml | 58 +++++++++++++++++++ ...olio-dd607130eb4cdf70c195f7eed039edc6.yaml | 58 +++++++++++++++++++ ...olio-ff6624786e8e60814d172183c9a7bf5f.yaml | 58 +++++++++++++++++++ ...-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...port-1dd9869669e4a7c4f20b2235d2df68c5.yaml | 58 +++++++++++++++++++ ...port-1f2a06a643f40ca267bd342499fdc692.yaml | 58 +++++++++++++++++++ ...port-266ba42edca3ad9aefeac2a819615d83.yaml | 58 +++++++++++++++++++ ...port-41afc2537de7dc4ac1f3ebf67c718802.yaml | 58 +++++++++++++++++++ ...port-44e9c5f94ff15d80337fbc26acc2f9ad.yaml | 58 +++++++++++++++++++ ...port-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...port-4d46668ff9f00851738b6095ebac210e.yaml | 58 +++++++++++++++++++ ...port-57028c13cec1060b66617f5f07c85c6f.yaml | 58 +++++++++++++++++++ ...port-8712cc1632e225c594b19df34ae596ee.yaml | 58 +++++++++++++++++++ ...port-89ce07ac930dc51991979cb98280bbb8.yaml | 58 +++++++++++++++++++ ...port-938da0cde8319acbc8cd634349637fad.yaml | 58 +++++++++++++++++++ ...port-95ed715a05e3d26da6f74ccbd6ab85ad.yaml | 58 +++++++++++++++++++ ...port-b26029d3fea40b72701a527b04841a5f.yaml | 58 +++++++++++++++++++ ...port-b6e9ca61c7913b93778f0505c3d8b45b.yaml | 58 +++++++++++++++++++ ...port-d27639e06760fb0c9830c5a72e87ab5f.yaml | 58 +++++++++++++++++++ ...port-d4c78d8203546198e179a467ececd0d8.yaml | 58 +++++++++++++++++++ ...port-de2f88d15a1b5aecd6a16f406646e9a9.yaml | 58 +++++++++++++++++++ ...port-e5141ff592bd9997e23b1aad269872cc.yaml | 58 +++++++++++++++++++ ...port-e5b491b44226f62122b1d1d362aae078.yaml | 58 +++++++++++++++++++ ...port-f3efba04fcdce6cec3efa7cec92aedc6.yaml | 58 +++++++++++++++++++ ...ther-24dc0fb35229c989c41ed2754572ea29.yaml | 58 +++++++++++++++++++ ...ther-906c7d163a05db6b1db16532f52ba291.yaml | 58 +++++++++++++++++++ ...feed-8c4a0974b3df67f7339b8c6388934e6e.yaml | 58 +++++++++++++++++++ ...feed-b0fddc41ffe057bf823e73bc28d298ac.yaml | 58 +++++++++++++++++++ ...dmin-69ff1cf9c2667131344592beac8a2eff.yaml | 58 +++++++++++++++++++ ...ebox-6b7b2b04e942b5d2f162bf42039d4c12.yaml | 58 +++++++++++++++++++ ...ebox-90c4cbfb7712449319d9759e0ded5087.yaml | 58 +++++++++++++++++++ ...ebox-a5bc98329e35c128c91f3ce8a71c6a41.yaml | 58 +++++++++++++++++++ ...ebox-c5dca15da955e97b5160cc77880cc971.yaml | 58 +++++++++++++++++++ ...-box-248e31ef2c55014a53d3afdb1f6ae07b.yaml | 58 +++++++++++++++++++ ...-box-4f73bdbdeaed18569d9edce85c2c628c.yaml | 58 +++++++++++++++++++ ...-box-5174039d89c7d18d794fb10cf1a282f0.yaml | 58 +++++++++++++++++++ ...-box-5d4640c4264ffacd4152e50de3f3f317.yaml | 58 +++++++++++++++++++ ...-box-5f0f062620e3c5241de7c7fa9457553a.yaml | 58 +++++++++++++++++++ ...-box-74192cf75d7a306906b056f839712e82.yaml | 58 +++++++++++++++++++ ...-box-8198c675532e8f307d66f6e19540bf63.yaml | 58 +++++++++++++++++++ ...-box-838e3be64c22dc1203b2c46a22794d70.yaml | 58 +++++++++++++++++++ ...-box-c01322d993d29040f70fca990f38339c.yaml | 58 +++++++++++++++++++ ...-box-c5104058a36ba87cb65f65ec0059bc5e.yaml | 58 +++++++++++++++++++ ...-box-ffda73ee0ac47c439700ae8ebfad208d.yaml | 58 +++++++++++++++++++ ...ider-46069454c6ba944e642bfecf69aa0fc3.yaml | 58 +++++++++++++++++++ ...ider-e3798772f56ed41206446ba8085ca086.yaml | 58 +++++++++++++++++++ ...oads-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ider-f176e53a42ca2011d6f5c8a03ade6f30.yaml | 58 +++++++++++++++++++ ...erce-5676c8d193c6c7c7c19f827a6027fe03.yaml | 58 +++++++++++++++++++ ...erce-eef58a96354df2086d4576efe4313ff1.yaml | 58 +++++++++++++++++++ ...hing-08de41cb2b0c0b28a5deead53bb308d8.yaml | 58 +++++++++++++++++++ ...hing-32308cb2a86eba1af06f28c633448e1e.yaml | 58 +++++++++++++++++++ ...hing-4012f134749539452de47052e41b95bf.yaml | 58 +++++++++++++++++++ ...hing-e548c20619f1bf8ad1418368ebd16e42.yaml | 58 +++++++++++++++++++ ...free-a65ff3a4b26159a2c4e25124ed20b089.yaml | 58 +++++++++++++++++++ ...dget-9a6e06a6f52e0f7856e09ef8ac51eff2.yaml | 58 +++++++++++++++++++ ...erce-c6eded4721823fad177e3bbf3127c4c2.yaml | 58 +++++++++++++++++++ ...tton-0adc72a8beddf445761ccd2b42cda0f5.yaml | 58 +++++++++++++++++++ ...gner-8a00d4110806870e5118fa117a1c5da6.yaml | 58 +++++++++++++++++++ ...ckup-31705d92f5b0540e46103bf0e8f5290e.yaml | 58 +++++++++++++++++++ ...ckup-506d872307a475af76e6ae5402a1e474.yaml | 58 +++++++++++++++++++ ...ckup-892437eb68b329dd17b3be2557272f56.yaml | 58 +++++++++++++++++++ ...ckup-8bb122c471113121afc3ab2c199c2c7d.yaml | 58 +++++++++++++++++++ ...ckup-8eae7ffaabe0ed4cfdd5b1537b7b4d67.yaml | 58 +++++++++++++++++++ ...ckup-9458fe34c744167704f938702ae6ca24.yaml | 58 +++++++++++++++++++ ...ckup-9b7d6017f1a72f048acef7512ee0eb68.yaml | 58 +++++++++++++++++++ ...r-wp-90dcee7cddc408bda7d7da416498432f.yaml | 58 +++++++++++++++++++ ...ckup-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...ckup-5143c97c48d7dbc931ae167f87839db5.yaml | 58 +++++++++++++++++++ ...ckup-62786f2608f27a539a0474c4d2ebfa59.yaml | 58 +++++++++++++++++++ ...ckup-69b19f14e2d5ec73b6d0b29b5ce933ea.yaml | 58 +++++++++++++++++++ ...ckup-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...ckup-87fc5ec6b1d8ce88fa24b6d37dc7769d.yaml | 58 +++++++++++++++++++ ...ckup-a95d754905d3f53fb57a0e2d890050ed.yaml | 58 +++++++++++++++++++ ...ckup-bafe57d5b57ae88c67b8e813c789e809.yaml | 58 +++++++++++++++++++ ...ckup-c2f123eeeab4951b42a1cc8fc1528dc5.yaml | 58 +++++++++++++++++++ ...ckup-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...ckup-d0b7defb1dd587ee6e11e3b384bd4e57.yaml | 58 +++++++++++++++++++ ...ckup-dc13d87f49a5c107f5d523c7a6538ca9.yaml | 58 +++++++++++++++++++ ...ckup-e15cd5eb900eec690c6bd9ba7205617d.yaml | 58 +++++++++++++++++++ ...bolt-e92ff64cb5237b7fef80c551a995240d.yaml | 58 +++++++++++++++++++ ...stic-d7479b175a0668ffbe5af726e8c140b2.yaml | 58 +++++++++++++++++++ ...ckup-e30a273c4e2ac5b93368dcb61feeb896.yaml | 58 +++++++++++++++++++ ...ckup-ec758abe67d8493d911d656fdfa690f2.yaml | 58 +++++++++++++++++++ ...uler-2042c2ccb1432ca181653532b126746f.yaml | 58 +++++++++++++++++++ ...uler-897959e22c40ecc199bf5dc5042856a0.yaml | 58 +++++++++++++++++++ ...p-wd-38b12fb47f5d220861d665c3785bcfc8.yaml | 58 +++++++++++++++++++ ...uddy-141ab8478a476872f09ca6589d710d31.yaml | 58 +++++++++++++++++++ ...uddy-2a4553829059c88ea2966fb66da7e42a.yaml | 58 +++++++++++++++++++ ...uddy-4644df3f89f37fce826cc2d06ead9821.yaml | 58 +++++++++++++++++++ ...uddy-928b2ae49df36c8a8c06f8fa9afee383.yaml | 58 +++++++++++++++++++ ...uddy-a43e4c1368e5181d1a16d6caef32b605.yaml | 58 +++++++++++++++++++ ...uddy-bb9a3765668a45566332d836d123f363.yaml | 58 +++++++++++++++++++ ...uply-471be969472b8d0ef26e1ed1be3ca7b8.yaml | 58 +++++++++++++++++++ ...uply-6cad3fdbb1d6f65f827e62fa999a9d63.yaml | 58 +++++++++++++++++++ ...uply-ea428ee30f7eac0893dba990c7647b20.yaml | 58 +++++++++++++++++++ ...ress-d55df6ea0549bd5bc1a28b66aeed72e9.yaml | 58 +++++++++++++++++++ ...ress-f5711bcfafc45228fc0a872f3e3fae05.yaml | 58 +++++++++++++++++++ ...ress-ff88c3f150fa8c25d9c92672f9b00beb.yaml | 58 +++++++++++++++++++ ...wpup-1298f4a06721cabe055b21858243d155.yaml | 58 +++++++++++++++++++ ...wpup-2bca208b2748ce062cd1cca09cfae994.yaml | 58 +++++++++++++++++++ ...wpup-356feecea26ff4c40d9fa77a244963ee.yaml | 58 +++++++++++++++++++ ...wpup-58ee338d74c3490fd7f800caad932984.yaml | 58 +++++++++++++++++++ ...wpup-86bb89c01ac64d331e5e9e535a06cf97.yaml | 58 +++++++++++++++++++ ...wpup-e260f5dd85134184a7b4e8005c4f1616.yaml | 58 +++++++++++++++++++ ...wpup-eaf4d65714ae3e70ffdd0fc233476145.yaml | 58 +++++++++++++++++++ ...core-0e249eccad21574e2f41d6b727c12756.yaml | 58 +++++++++++++++++++ ...vior-0638cf0d113b279b6ab4547692f6759f.yaml | 58 +++++++++++++++++++ ...geos-6a3c999f177d3f3a9005f7b86b4e26cb.yaml | 58 +++++++++++++++++++ ...geos-8e5d590ef949dabd3bb7265d663cdfbb.yaml | 58 +++++++++++++++++++ ...geos-948fbb4659b9489d63a6dcbbe5ab82b2.yaml | 58 +++++++++++++++++++ ...geos-99d724e78c6e3ca9e817c7ab41561c22.yaml | 58 +++++++++++++++++++ ...geos-d8de339d3ac4f62207036cc196c6166a.yaml | 58 +++++++++++++++++++ ...geos-e1ab43eefd1268f41af50d790136abb5.yaml | 58 +++++++++++++++++++ ...geos-ee566a4e5dfcb43b5aa7224c7fc505bf.yaml | 58 +++++++++++++++++++ ...geos-ef94b2f85f2ba20fe6f83fee3d6d311f.yaml | 58 +++++++++++++++++++ ...ight-56e63bf99909025ae251d6417333b36f.yaml | 58 +++++++++++++++++++ ...link-9c6d171f6c42d066e20b0847cb9e2d62.yaml | 58 +++++++++++++++++++ ...ator-d91574fca4b237a59bfef53213c75bb6.yaml | 58 +++++++++++++++++++ ...ator-ee80f8c937a77ba9a3b8602ebbefd769.yaml | 58 +++++++++++++++++++ ...umns-414a4199455e61f63d4f1a06e321a38b.yaml | 58 +++++++++++++++++++ ...sers-137251846c7319666c4983642238e856.yaml | 58 +++++++++++++++++++ ...ways-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ways-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...llat-226ccdc58627d396ab167a357486235f.yaml | 58 +++++++++++++++++++ ...cler-b587c5b6b45c195ebb12bd5f55ed780d.yaml | 58 +++++++++++++++++++ ...ader-434911a5447ed5d05a669b67b9efd816.yaml | 58 +++++++++++++++++++ ...ader-f7325cb69c59d2a2951bb8ec98779e8d.yaml | 58 +++++++++++++++++++ ...erce-0167f45d0f324e4791bf42a58fe0f3d4.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-fccced4c8f4a5e0806978ddedbe57a10.yaml | 58 +++++++++++++++++++ ...rlid-55df23e4f01ef0022903c3f40bc900ce.yaml | 58 +++++++++++++++++++ ...rman-1bdbe0eed23754132ebb7324a7cbafe1.yaml | 58 +++++++++++++++++++ ...rman-acb1c7356c04fc668153a6e512559aa7.yaml | 58 +++++++++++++++++++ ...cart-c2aa0d5f18c95dfed2e602c88c079b1b.yaml | 58 +++++++++++++++++++ ...ders-3fe433fa04cbd74a4139a79417d6ceaa.yaml | 58 +++++++++++++++++++ ...ders-40a18728cfe568ff4c836d2215f1bab4.yaml | 58 +++++++++++++++++++ ...ders-6598da95314501b73bd8f49d12607cda.yaml | 58 +++++++++++++++++++ ...ders-762974517202b3d8e87994dd1daef458.yaml | 58 +++++++++++++++++++ ...ders-91fab9aed123b89a5ffac035c0489ae7.yaml | 58 +++++++++++++++++++ ...ders-c1bec35c5489d7d12ae6b841d923b29e.yaml | 58 +++++++++++++++++++ ...ders-ea61aaf0b841c4447233caa711d245e0.yaml | 58 +++++++++++++++++++ ...ress-a5afc25e9a9bba6762e73f63456f868e.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-fdf5e229c491f2ee061576794ec1d5c1.yaml | 58 +++++++++++++++++++ ...-map-b5b7bc46aa5c73951c7934c79faf05ff.yaml | 58 +++++++++++++++++++ ...ider-6df2df1f538663a4b281d00b01155047.yaml | 58 +++++++++++++++++++ ...ider-8d331ddadf2ec92c698925fb701e1625.yaml | 58 +++++++++++++++++++ ...ider-9ea1bb5d162409cd77ba612423f2f166.yaml | 58 +++++++++++++++++++ ...-cat-5fc1378196caf660cea9b35242972f9a.yaml | 58 +++++++++++++++++++ ...menu-4d7cf09bd61a740d1d041e4a547bb223.yaml | 58 +++++++++++++++++++ ...ount-689bba03a0123069bb521d413df5bf54.yaml | 58 +++++++++++++++++++ ...ards-42392b45ae66f65286752e395147b8a3.yaml | 58 +++++++++++++++++++ ...ddon-1c74e3df9173084b9bb7ea805c234e58.yaml | 58 +++++++++++++++++++ ...ddon-463ccdd827fdb7cc231455301d2f674b.yaml | 58 +++++++++++++++++++ ...ddon-8495527ac09a59599c4f06adeea443c8.yaml | 58 +++++++++++++++++++ ...only-de02ae500f9a57c33a0ee01cf27ee98f.yaml | 58 +++++++++++++++++++ ...pics-2d66a242a2a2a1cad4298e09bf72f7ae.yaml | 58 +++++++++++++++++++ ...pics-7d2d77fb555165867755ecf651af34c0.yaml | 58 +++++++++++++++++++ ...pack-a8af060628ffa49f9121f24c1f544243.yaml | 58 +++++++++++++++++++ ...pack-b166ccca1e33f4281f58142489d93a0e.yaml | 58 +++++++++++++++++++ ...lkit-1c16449f8bc6ec80daa181529883284c.yaml | 58 +++++++++++++++++++ ...lkit-f0f195114e43b21943298311709b9cdf.yaml | 58 +++++++++++++++++++ ...ting-40b2967e127caf7495ebfc36b3279860.yaml | 58 +++++++++++++++++++ ...ress-1f87f7a2adf09634e0df0bd21922373b.yaml | 58 +++++++++++++++++++ ...ress-4cbf85b774e16b710e92618758678558.yaml | 58 +++++++++++++++++++ ...ress-50e1ba859aba6574e04bc19be7d2a72d.yaml | 58 +++++++++++++++++++ ...ress-a08c651ad045a182d61e4a734b04e24d.yaml | 58 +++++++++++++++++++ ...ress-c2aad2cd7c74971784609bd3b7e968af.yaml | 58 +++++++++++++++++++ ...ages-8b2df19f52d17e59f7bf267a5a7cd929.yaml | 58 +++++++++++++++++++ ...pics-e9ae76ec6425c2521c80399f801c780e.yaml | 58 +++++++++++++++++++ ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...hise-c3364a727b0ebaebc84adf04bc03aa05.yaml | 58 +++++++++++++++++++ ...opup-47cb3cea5c7ee929fdb9a30f97cd8b93.yaml | 58 +++++++++++++++++++ ...opup-cf929e621e4b1d597c324db37b74c90e.yaml | 58 +++++++++++++++++++ ...iler-3b3faa72335204be9fd1e5395bb7377e.yaml | 58 +++++++++++++++++++ ...-woo-e37de4c1f7c016da27e52bf7ca80605e.yaml | 58 +++++++++++++++++++ ...ages-b81dbbcc402e93364fc6c79f5c55b224.yaml | 58 +++++++++++++++++++ ...hang-613e6d1f73b0e9a2cfb432bf7b65549d.yaml | 58 +++++++++++++++++++ ...odes-e46e0878d80b0d8d4416a50916ac9925.yaml | 58 +++++++++++++++++++ ...rter-1c1e9e2dd7e363e8e9eb9d15d5f2b60e.yaml | 58 +++++++++++++++++++ ...pack-c32e665e9be4b817092efeaf96853d74.yaml | 58 +++++++++++++++++++ ...lite-46bd5e871ffddefa69b74900fbbdea14.yaml | 58 +++++++++++++++++++ ...lite-7e6a3b2c412bc3d13ddc87f480a49f5e.yaml | 58 +++++++++++++++++++ ...lite-88c402ced2fc7c5811d5e082ac94297b.yaml | 58 +++++++++++++++++++ ...lite-91833325e07473e81e8f172735b05fa1.yaml | 58 +++++++++++++++++++ ...lite-a5718896caa8539c5806c104b13a2ecf.yaml | 58 +++++++++++++++++++ ...lite-e0e7d7ae87e3b7c89bbdeabc1a752e7d.yaml | 58 +++++++++++++++++++ ...lite-e5cbcd667f6374a7cacb1531a9b3233c.yaml | 58 +++++++++++++++++++ ...lite-f4f911fdf61cb94da9a5aa199fbba441.yaml | 58 +++++++++++++++++++ ...lite-332edd099b0a24d5cedbd6ff5e1c921f.yaml | 58 +++++++++++++++++++ ...lite-4475ed600e0c7aee761684483f573ae1.yaml | 58 +++++++++++++++++++ ...lite-4856ea4fa23608af898ff19809065029.yaml | 58 +++++++++++++++++++ ...lite-58cf3685b6d061649f14b9a15a1de69b.yaml | 58 +++++++++++++++++++ ...lite-7c8990ed736a3cb5113e28a3af38b444.yaml | 58 +++++++++++++++++++ ...lite-889847d33809b1d03070e688df75ac6b.yaml | 58 +++++++++++++++++++ ...lite-b5d8ae30fccbde3a30e869d152e37902.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-c0add8aac27f340c1c289e5c63a1598d.yaml | 58 +++++++++++++++++++ ...lite-dea28b24d7e53b89e98cd471b0652d7a.yaml | 58 +++++++++++++++++++ ...eset-1a189dbfcf27a170ebf674465bd67d58.yaml | 58 +++++++++++++++++++ ...iant-7d6d3ed82fbce25bd8d4d72adc5dbb85.yaml | 58 +++++++++++++++++++ ...iant-89d00060ada213715ac2f4cc10816ef2.yaml | 58 +++++++++++++++++++ ...lery-5866d53824f6a21c318e64067df5b3af.yaml | 58 +++++++++++++++++++ ...sent-2f0c52f572204949d9dfa707ba4715b5.yaml | 58 +++++++++++++++++++ ...sent-4f0dd73da2c5ab7153159044ff19606c.yaml | 58 +++++++++++++++++++ ...sent-e17b32fc1c537aa75c208693d7d1b8f0.yaml | 58 +++++++++++++++++++ ...sion-03b179e5beb399c252262dca2e1c2a47.yaml | 58 +++++++++++++++++++ ...sion-31a5f54f51f59ec02334f6066d4afc3a.yaml | 58 +++++++++++++++++++ ...sion-3deace4984f0c809f54b31e2e6aaea40.yaml | 58 +++++++++++++++++++ ...sion-49f8c3ec41639ad41107106a61b3b652.yaml | 58 +++++++++++++++++++ ...sion-4a6425bd134427fc325c845997202a57.yaml | 58 +++++++++++++++++++ ...sion-73d0b7fc0e78937e14e64656fc0eec81.yaml | 58 +++++++++++++++++++ ...sion-811048b3ad2eacb5c29f4e0546b22dd5.yaml | 58 +++++++++++++++++++ ...sion-a0f8dbe86bd25cb76ecd0536100264a1.yaml | 58 +++++++++++++++++++ ...sion-a11c0611909385052cd0aaeced3bbff4.yaml | 58 +++++++++++++++++++ ...sion-a48a705bfc66279fa96d49ee01ec64a4.yaml | 58 +++++++++++++++++++ ...sion-a4b84494f2ca0459161168fd007453cd.yaml | 58 +++++++++++++++++++ ...sion-ac5ea49d172b7aeae239859f4682fe56.yaml | 58 +++++++++++++++++++ ...sion-b00000526bce4d638ca8288e0858fb40.yaml | 58 +++++++++++++++++++ ...sion-c20cb20ff14b1ed9f84a7525784a41bc.yaml | 58 +++++++++++++++++++ ...sion-dd8649decc08f39c4790db22c44b5be7.yaml | 58 +++++++++++++++++++ ...sion-e9ae67bcdb286ec58db8997d8a78829a.yaml | 58 +++++++++++++++++++ ...emer-b957cb5f454b449f583a6eef42317102.yaml | 58 +++++++++++++++++++ ...emer-c8a7f0039447f90c8cdf2d5bac0144d4.yaml | 58 +++++++++++++++++++ ...stom-1b89b5eb4288496d851956ba01f7ee38.yaml | 58 +++++++++++++++++++ ...king-362ca4d6e33d614fc53fac12799f63e4.yaml | 58 +++++++++++++++++++ ...king-843511a1c7a253d8815f1011e5416ca7.yaml | 58 +++++++++++++++++++ ...mini-56db8ce4b9ff6871db6cca64bbbcf0dc.yaml | 58 +++++++++++++++++++ ...ress-7d84dd587f6a41715457eb91e2b1b3ae.yaml | 58 +++++++++++++++++++ ...ider-c52273b2cf56d5474ff79f10bc5133f6.yaml | 58 +++++++++++++++++++ ...fter-9868c860ce207929896c4fa67bae9575.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...menu-a2e597896da84d8e5ead12576f9d50bb.yaml | 58 +++++++++++++++++++ ...lite-f47f4e7914a77fceef2cac004cb55a1b.yaml | 58 +++++++++++++++++++ ...ings-4b7af90d1d419a64b595cd9c1418239a.yaml | 58 +++++++++++++++++++ ...free-b518bec195877c390c9c609530bbaa4b.yaml | 58 +++++++++++++++++++ ...isto-6c6dcf20e63f7dc387f2f85722e8901c.yaml | 58 +++++++++++++++++++ ...feed-339c653ee99c338c15ef4d1eade1d929.yaml | 58 +++++++++++++++++++ ...feed-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ooks-2a2a7cb185c86a125aeb5500ccc53d3d.yaml | 58 +++++++++++++++++++ ...inks-237b2843475a8f4f4f800677c6af1b8b.yaml | 58 +++++++++++++++++++ ...weet-88dbd900cde513bacf9820ea94c0e8ec.yaml | 58 +++++++++++++++++++ ...weet-d23e433446769426d4aae17f6fe2a04a.yaml | 58 +++++++++++++++++++ ...weet-d6f0e617de1a3c82f777a89829211e90.yaml | 58 +++++++++++++++++++ ...ents-7585bdd855a3ce213df577df1a0cf7c5.yaml | 58 +++++++++++++++++++ ...ents-cca7855a039dbac1182b0b2fae34c3b0.yaml | 58 +++++++++++++++++++ ...sion-fdec0718eabbae53872d03fa70d141a9.yaml | 58 +++++++++++++++++++ ...dons-267d7435385a9582ef7c8199e8931303.yaml | 58 +++++++++++++++++++ ...dons-9167001bdde424000d6bf79c1d596a20.yaml | 58 +++++++++++++++++++ ...dons-b4d70a86acec874506b4ab2dcb06e399.yaml | 58 +++++++++++++++++++ ...dons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dons-c71bf414dec349bec3e4220e85ee81e5.yaml | 58 +++++++++++++++++++ ...pack-bf3890ad3455b3c44beacb3bebc6b11a.yaml | 58 +++++++++++++++++++ ...some-1c7d78d4a78d0f2d3396fece72367d31.yaml | 58 +++++++++++++++++++ ...some-367b17bcc7fd153764ffbb7e174fed0a.yaml | 58 +++++++++++++++++++ ...some-415ed972729f96565976948d92875199.yaml | 58 +++++++++++++++++++ ...some-e128c0c0167442ae481665888471e921.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-txt-0e514fdd87f87b672172ceb862e2efda.yaml | 58 +++++++++++++++++++ ...-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-txt-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...dget-e9bfeb55edc6f8bed127152a2312d037.yaml | 58 +++++++++++++++++++ ...arch-1bccfaa95263e0cba6cdbff0fea9a636.yaml | 58 +++++++++++++++++++ ...arch-283fafa85d866a9f95a9b66cbfa775a5.yaml | 58 +++++++++++++++++++ ...arch-44c47555058dcc87f8d2d8e62dfb89fe.yaml | 58 +++++++++++++++++++ ...arch-53aca78c2b71aacc822f7508e26b8d8c.yaml | 58 +++++++++++++++++++ ...arch-6cd471916f03102419bfc2ce43f76e09.yaml | 58 +++++++++++++++++++ ...arch-d7962457b9f0fe1cda7fdf789451b9d7.yaml | 58 +++++++++++++++++++ ...lace-116a3711d1ab72d436ec5c35678ceddf.yaml | 58 +++++++++++++++++++ ...lace-3d5b724b4980f24cb96bdfad9d38ad3d.yaml | 58 +++++++++++++++++++ ...-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml | 58 +++++++++++++++++++ ...ring-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rity-0997b0e1fcb7c16b9cb4f5f402cc298d.yaml | 58 +++++++++++++++++++ ...rity-39b1d1f60ebd078d2064f8fc42a6a86d.yaml | 58 +++++++++++++++++++ ...rity-45704500e2fe99541d5fde0dba82eb44.yaml | 58 +++++++++++++++++++ ...rity-57328511425c4e523d0fbcd1b2df1e0b.yaml | 58 +++++++++++++++++++ ...rity-5914e98b8f19f72e002d683195cf84b7.yaml | 58 +++++++++++++++++++ ...rity-607c512f0481cf565f88f66597dbe101.yaml | 58 +++++++++++++++++++ ...rity-8a1c6c8c0e2f1e2277e0443f4946d572.yaml | 58 +++++++++++++++++++ ...rity-968e9dd9430c57e6055a517f19a3f88f.yaml | 58 +++++++++++++++++++ ...rity-98d2f4e2c6a41f3ef336107b39e46630.yaml | 58 +++++++++++++++++++ ...rity-a5079326b62d5c755b0860e79f56c774.yaml | 58 +++++++++++++++++++ ...rity-b5b87b7676de117a8342f94f403bc1ce.yaml | 58 +++++++++++++++++++ ...rity-bc0054c93edc82fecefb873208e2d77c.yaml | 58 +++++++++++++++++++ ...rity-cc701acb3e47b30801109dacbba292b7.yaml | 58 +++++++++++++++++++ ...rity-d3827d64e2bdf966f3d9c111c132ea14.yaml | 58 +++++++++++++++++++ ...rity-d859b6b56bcc909202cbeb832d5a6748.yaml | 58 +++++++++++++++++++ ...rity-d99359e94988cec585163990a9f996b0.yaml | 58 +++++++++++++++++++ ...rity-ed72aeba76ce6c9e43fa074b4806ae70.yaml | 58 +++++++++++++++++++ ...rity-f3ca166a2636d3e3f94a1bc3eb68152a.yaml | 58 +++++++++++++++++++ ...docs-757fc98134d873ee7c2bce4cfa1cf695.yaml | 58 +++++++++++++++++++ ...docs-808772ef0715e55e48845eb09fe27708.yaml | 58 +++++++++++++++++++ ...inks-7f5e21acda03d1d7fde69a880719d61b.yaml | 58 +++++++++++++++++++ ...inks-f079e6954da62257f11ff80bfdb93326.yaml | 58 +++++++++++++++++++ ...ptin-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...nder-0e6fd2b1537d8a018f72311524eaf46b.yaml | 58 +++++++++++++++++++ ...nder-23eb31c668264c3c5aee5b4814654a30.yaml | 58 +++++++++++++++++++ ...nder-33bf8f8eb63499d2436cf7f9e5a448fa.yaml | 58 +++++++++++++++++++ ...nder-3c224c321d9ba7c36132b340a7d491de.yaml | 58 +++++++++++++++++++ ...nder-4270b682ebfb5d58e498fa26615a2af8.yaml | 58 +++++++++++++++++++ ...nder-53f4d866310c8c093dd280b48d69df62.yaml | 58 +++++++++++++++++++ ...nder-85e7a548980a393d1ae0ce58883c267a.yaml | 58 +++++++++++++++++++ ...nder-a324da45179a3a5384dabaa9a7992990.yaml | 58 +++++++++++++++++++ ...nder-a4456a392889d99a207556dae46d468a.yaml | 58 +++++++++++++++++++ ...nder-a749224e64254fa4b744badbc098456b.yaml | 58 +++++++++++++++++++ ...nder-a99d654d3052252ef402e0749a9ce566.yaml | 58 +++++++++++++++++++ ...nder-b4b2a249b6f5481511775013e7ebd58b.yaml | 58 +++++++++++++++++++ ...nder-b82f68ac873a5cd389e13e2f431350c2.yaml | 58 +++++++++++++++++++ ...nder-ee5009aa999f8729af055978227a592d.yaml | 58 +++++++++++++++++++ ...nder-f39e8e9f12f06ce6e02dc29ac3b8f718.yaml | 58 +++++++++++++++++++ ...nder-fa4a6ca6cb5f0ed29a506220c9fcc52b.yaml | 58 +++++++++++++++++++ ...nces-9e36b0cf17e47fe4192107564b677097.yaml | 58 +++++++++++++++++++ ...html-94f4e4e5606b83b8d91c368a5ee77e4b.yaml | 58 +++++++++++++++++++ ...edia-4f0f10f376030e01ed907ee127ea7f81.yaml | 58 +++++++++++++++++++ ...tton-985f213479d8daa64d5f4a16ef20cb10.yaml | 58 +++++++++++++++++++ ...tton-c390ab25927b32a9c95c398ffd819321.yaml | 58 +++++++++++++++++++ ...erce-a40fe25194e0ab57cda985c21cea16d8.yaml | 58 +++++++++++++++++++ ...tact-307decab8c86de849610b37252ca6e15.yaml | 58 +++++++++++++++++++ ...tact-61a7db517f3679fdc65455e830f0b650.yaml | 58 +++++++++++++++++++ ...ingo-cfe50efdb1ba541e0424c762743e3772.yaml | 58 +++++++++++++++++++ ...-tag-bc281b421f8fff950362929962ab0019.yaml | 58 +++++++++++++++++++ ...erce-cf14923d0b22ebbc7d1094e134b296e1.yaml | 58 +++++++++++++++++++ ...eder-028571cd7473a719693f2daa6ec95f68.yaml | 58 +++++++++++++++++++ ...dget-c350cdbcabbf0c6c2cbe275725809f83.yaml | 58 +++++++++++++++++++ ...sist-2a0968e3dc51c0d6442ac11d19f9e211.yaml | 58 +++++++++++++++++++ ...sist-5ca89842f69cd4e87dbd74d08645e3d9.yaml | 58 +++++++++++++++++++ ...form-9d1eaa00002183482a2bac30ce7a0865.yaml | 58 +++++++++++++++++++ ...form-ec6c4566c5b89e861708c86d4c662f99.yaml | 58 +++++++++++++++++++ ...form-fc27afcbd3ffc5123db575382c98ea40.yaml | 58 +++++++++++++++++++ ...ucet-1ad3a36baf4c9ef732b67d8d092f21e4.yaml | 58 +++++++++++++++++++ ...ship-4952fa6645076ab711fade644ad856a2.yaml | 58 +++++++++++++++++++ ...ship-a18213c9c980e2ab86f946c3cc789f65.yaml | 58 +++++++++++++++++++ ...erce-bb0ef31fb16bd70576b63c47a36e1c9e.yaml | 58 +++++++++++++++++++ ...-web-d5a1c9a6ee7e97f923697ab3631f023c.yaml | 58 +++++++++++++++++++ ...rary-84478af058257dde74ad587387b8e0c5.yaml | 58 +++++++++++++++++++ ...load-2a10558db0160ae54882e46d43e98878.yaml | 58 +++++++++++++++++++ ...bots-d6d7d32a1720382a929420a5407cae07.yaml | 58 +++++++++++++++++++ ...ress-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...ress-8ba5840f6e2c5e47c69ce5e7a4b52e4d.yaml | 58 +++++++++++++++++++ ...ress-bc595712854b7922ce7b557c9cf5ef0e.yaml | 58 +++++++++++++++++++ ...ator-2817b00f145ff05ea405982ca6e4d8ab.yaml | 58 +++++++++++++++++++ ...some-69676cf2f0074a9838e0f912aa1e46f1.yaml | 58 +++++++++++++++++++ ...ions-009566ddcb125b1bb12196db82871dc9.yaml | 58 +++++++++++++++++++ ...ions-3b363f50f63e2252e93a4eaf65f7fc9e.yaml | 58 +++++++++++++++++++ ...ions-b24d1d3e12abe16b131b78c39c76f1e6.yaml | 58 +++++++++++++++++++ ...spam-a9d78c30300919411b59e3816f76e46c.yaml | 58 +++++++++++++++++++ ...ider-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ates-5d7f25544963dc4081c5c5f1f1e89a49.yaml | 58 +++++++++++++++++++ ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ogin-c30d74ab3c1dc1a9e7b14ed816c12f35.yaml | 58 +++++++++++++++++++ ...hina-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ster-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ents-6e2bb03aadc9f84e5afdbf209dfee08d.yaml | 58 +++++++++++++++++++ ...ents-8a9e3a258561fd11df73e03998dab8aa.yaml | 58 +++++++++++++++++++ ...ocks-3d078edbe634b7f5d57ec87a78fa8d02.yaml | 58 +++++++++++++++++++ ...pare-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nion-10dffc5e6c324ec1dc8ebf67decddde7.yaml | 58 +++++++++++++++++++ ...nion-388e6ad87200512eea2e328c413a87c2.yaml | 58 +++++++++++++++++++ ...nion-487e89618ab2c9b35b3c1576f9f20c5d.yaml | 58 +++++++++++++++++++ ...nion-56a40035beb7c39c52fc3da1e76c20df.yaml | 58 +++++++++++++++++++ ...nion-a84b51b86b24a12fc85c3fc5e41345c9.yaml | 58 +++++++++++++++++++ ...nion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...page-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...gner-bbf6652d4e763c9a7fafd94f884696c2.yaml | 58 +++++++++++++++++++ ...dget-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...dget-c371054500c25911223fb4e88ae17274.yaml | 58 +++++++++++++++++++ ...pack-940c3e462fa88340681bbbfe05c2ceb9.yaml | 58 +++++++++++++++++++ ...pack-95eff066a45135b12edbc92f481f5d74.yaml | 58 +++++++++++++++++++ ...pack-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lter-0fe998643673fbc89bdce1d6f1c4acbf.yaml | 58 +++++++++++++++++++ ...tton-5dd5fb8b74d5846a17aa6d905d9963d8.yaml | 58 +++++++++++++++++++ ...blog-97602b372ac2dff313ee6b7601be8c2a.yaml | 58 +++++++++++++++++++ ...blog-e95a6a45d70dd7149f957cc2dea209d3.yaml | 58 +++++++++++++++++++ ...ight-2091e63be6d7dbb4cc291d8c18478150.yaml | 58 +++++++++++++++++++ ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cial-0e2341ee2d418b0b91267b97433b22e1.yaml | 58 +++++++++++++++++++ ...cial-21019b02ab939e1588f34c6a653e9f06.yaml | 58 +++++++++++++++++++ ...cial-3fd3ad86b8b959b5f946903b7447c084.yaml | 58 +++++++++++++++++++ ...cial-5b5598cebbb5b08b875d9ea03d9a72bc.yaml | 58 +++++++++++++++++++ ...cial-73117910b29a1c368fce71745504290c.yaml | 58 +++++++++++++++++++ ...cial-763aed0421435f4023b6ace21a8f066e.yaml | 58 +++++++++++++++++++ ...cial-98ef59566a56f0d321854bb5454562cb.yaml | 58 +++++++++++++++++++ ...cial-993cbe7cdb99fa0d1ec6b5c0bf18769e.yaml | 58 +++++++++++++++++++ ...cial-bd94973d379cdc38fafbad6fbe8d2f5c.yaml | 58 +++++++++++++++++++ ...cial-cefe6e830adb746b2199d03b92e9b0d3.yaml | 58 +++++++++++++++++++ ...cial-edba2b974302ba40bc2fe3d88269ff10.yaml | 58 +++++++++++++++++++ ...cial-f25219e94e90ee9c8edfde6f7652a267.yaml | 58 +++++++++++++++++++ ...rter-86bf587683902d78762ff4957c96a94c.yaml | 58 +++++++++++++++++++ ...-fun-d0c3cc2d1f4d2b123e52708c762c0240.yaml | 58 +++++++++++++++++++ ...nner-6ccf09aa4f6f92564c1ba185250a9b6d.yaml | 58 +++++++++++++++++++ ...ckup-81a6f5ecaf1c598cd2e1db2f58c01ff9.yaml | 58 +++++++++++++++++++ ...loom-a2b478ab05dc0dd0616e45e762ef893a.yaml | 58 +++++++++++++++++++ ...loom-a6745ab870958e9a36acad5aaba242da.yaml | 58 +++++++++++++++++++ ...aker-d5a23abb517a497649fa5fae9ebed1d6.yaml | 58 +++++++++++++++++++ ...tter-9c222eb6bd53905ec6dff84bf0b52c03.yaml | 58 +++++++++++++++++++ ...dmin-2eb580b3f81928dc01b4da13b3317526.yaml | 58 +++++++++++++++++++ ...tics-5427934b8eab07d0d5e4f82f464ce7f4.yaml | 58 +++++++++++++++++++ ...dget-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml | 58 +++++++++++++++++++ ...ator-7485636761a29a7581b6c5a9a59a849c.yaml | 58 +++++++++++++++++++ ...ator-89c277020720d7e5b4106e25f34686a0.yaml | 58 +++++++++++++++++++ ...ator-3e4297109cfe1e3292757dea8d3ced9f.yaml | 58 +++++++++++++++++++ ...ator-08456b78a7e27d7a315067ad64f8b5ca.yaml | 58 +++++++++++++++++++ ...code-0d15cc8e701957684f6f3b30c5023ccf.yaml | 58 +++++++++++++++++++ ...ials-aec5b406433b53e4f92df5e66d0bb478.yaml | 58 +++++++++++++++++++ ...bnfw-659d041771a16c5c0a237cb39f903338.yaml | 58 +++++++++++++++++++ ...bnfw-8eba613f6cf1178ae1e4bc455157c83a.yaml | 58 +++++++++++++++++++ ...erce-9c98e07f9de6c1ac362dea3f4f9b98af.yaml | 58 +++++++++++++++++++ ...tson-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sion-6d4992572a9f9bd5311ba2254f8b32c1.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-de9c08ef64270e7677f62d388e0cc26e.yaml | 58 +++++++++++++++++++ ...lder-005e163e7b395198e1ed48634c687240.yaml | 58 +++++++++++++++++++ ...lder-1c83761e8850a90348fc378dc1547a09.yaml | 58 +++++++++++++++++++ ...lder-2109981df34c3c3e10e9a3ff3ab51437.yaml | 58 +++++++++++++++++++ ...lder-48cb8d5c20069dd21ff6f85ee4f57b84.yaml | 58 +++++++++++++++++++ ...lder-5289bbf92c9bdc3c3c0e4f0086563240.yaml | 58 +++++++++++++++++++ ...lder-5b50680d973f4b29013f914d7a1b34f3.yaml | 58 +++++++++++++++++++ ...lder-7f9f186670238d7e784b2f81e1301181.yaml | 58 +++++++++++++++++++ ...lder-7fcbda1cfae66ee74a18ccdfe4753dbb.yaml | 58 +++++++++++++++++++ ...lder-8b94055b335b8fd181b35e0e5b73b692.yaml | 58 +++++++++++++++++++ ...lder-8e1e2ed917edbc0807da4afd84ddc7ed.yaml | 58 +++++++++++++++++++ ...lder-9f377f95856b4156effc9e05a81da19a.yaml | 58 +++++++++++++++++++ ...lder-b332e32a470aff42684e131c72a2c94a.yaml | 58 +++++++++++++++++++ ...lder-dd7568e4d3ea5ea32920ba4a6563336b.yaml | 58 +++++++++++++++++++ ...lder-e2f4a51da7010a4270e848488a346f79.yaml | 58 +++++++++++++++++++ ...lite-263cb8027fbba6881585c49ec8985e2c.yaml | 58 +++++++++++++++++++ ...lite-d090aa5f37413bd2a82801bde518653e.yaml | 58 +++++++++++++++++++ ...ckup-a66a38c6ab7f828962843ef151472f92.yaml | 58 +++++++++++++++++++ ...ckup-faa8cb9cb5e4fa47467175ce98c14091.yaml | 58 +++++++++++++++++++ ...-seo-cbd6f11a9e82c5a5f837c5dd0976e92e.yaml | 58 +++++++++++++++++++ ...-seo-facd15a60590ce98592dd0da5f942c33.yaml | 58 +++++++++++++++++++ ...-woo-d1a09c4c8a10014e2eab3f97a79ce973.yaml | 58 +++++++++++++++++++ ...essx-fa751f89fc374e558e8d01ea059343f2.yaml | 58 +++++++++++++++++++ ...line-edbb23e6d1dd3c6d3b98a72a827de16d.yaml | 58 +++++++++++++++++++ ...ices-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oked-42e35e0cb682e934fb2b734db4cdfce2.yaml | 58 +++++++++++++++++++ ...oked-fb0b66127fc8d6704716bac309ccc3a7.yaml | 58 +++++++++++++++++++ ...king-279486597ac6d210058519567f6297ca.yaml | 58 +++++++++++++++++++ ...king-2f651d26ae436687bdff9a8abab4a173.yaml | 58 +++++++++++++++++++ ...king-64d2238bd20222d178f28431616be0e3.yaml | 58 +++++++++++++++++++ ...king-6a265db2a9121f4da4875337b8e6751f.yaml | 58 +++++++++++++++++++ ...king-74317d53fd76ca3a1801e928aa95e907.yaml | 58 +++++++++++++++++++ ...king-871ce8145600084845b667e836bf190e.yaml | 58 +++++++++++++++++++ ...king-882a83d7e6d94e3f6111d1f0063b43d9.yaml | 58 +++++++++++++++++++ ...king-a720a32e95724b99f716e58fddc9c585.yaml | 58 +++++++++++++++++++ ...ties-362486302d19ffc4bedbec14216dc7ba.yaml | 58 +++++++++++++++++++ ...erce-de725b70e5d07ce131e255467578f038.yaml | 58 +++++++++++++++++++ ...king-b3c2fa102dc78b18cc1d35e379c8dc7a.yaml | 58 +++++++++++++++++++ ...ndar-0cfb154efea7a6cd97d79b7c9bd11b19.yaml | 58 +++++++++++++++++++ ...ndar-52b3904a98bc3991ae688cb27d9acbe7.yaml | 58 +++++++++++++++++++ ...ndar-6a9d80e8fa30f682db502c67279e3ece.yaml | 58 +++++++++++++++++++ ...ndar-78f758aca2b7adcaf11ee6e697616163.yaml | 58 +++++++++++++++++++ ...ndar-86234e029258ca45a99eefee2aff4d20.yaml | 58 +++++++++++++++++++ ...ndar-88138db1d1aea177c6151b845da287ff.yaml | 58 +++++++++++++++++++ ...ndar-88cc9361682247d3851fe23cf11de139.yaml | 58 +++++++++++++++++++ ...ndar-aacd8cf9b8bd0dfbb9f05d6cc01da96f.yaml | 58 +++++++++++++++++++ ...ndar-c3498fe08662af21fd3da077be763084.yaml | 58 +++++++++++++++++++ ...form-2c05a2f96b41f067812b952900469965.yaml | 58 +++++++++++++++++++ ...form-5e09860a3e9bed6cd5fc9927ca9a87b8.yaml | 58 +++++++++++++++++++ ...form-66b0b9e68fee422256033ff3686e7914.yaml | 58 +++++++++++++++++++ ...form-8e9a2657d58363938f72aae51c6cd0a3.yaml | 58 +++++++++++++++++++ ...form-ce69ee3276348a391868ff2589e7f8b7.yaml | 58 +++++++++++++++++++ ...form-ea7f2b8cee8445bfd3a6af9dd8ec1877.yaml | 58 +++++++++++++++++++ ...ndar-d11c386e86541e81dcae4e94a2860a10.yaml | 58 +++++++++++++++++++ ...ndar-e44a87677c68a494baa8ed72b523a10f.yaml | 58 +++++++++++++++++++ ...king-e064d299c84a7a932db5e1b086223b4a.yaml | 58 +++++++++++++++++++ ...king-e9dd2b4943d62b4d4eacb38332a5b454.yaml | 58 +++++++++++++++++++ ...king-eb4b31f33272ec5c989c730f7ccb3d9f.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-701997e59be83cd9ba4ad233278f4aaf.yaml | 58 +++++++++++++++++++ ...ager-ffbb08b3382f9c076d19dfa65caa3e3a.yaml | 58 +++++++++++++++++++ ...kage-6104fab3d6323129ecb2671e037b46ea.yaml | 58 +++++++++++++++++++ ...kage-64d367b3cacb5cf8c295e6ccc3504c04.yaml | 58 +++++++++++++++++++ ...kage-6b73dfda9277bb390c84251b69303827.yaml | 58 +++++++++++++++++++ ...kage-bea3389dfa395e208890fd90e5f6c66b.yaml | 58 +++++++++++++++++++ ...kage-eb4f476f66236ca8f6047b9846303766.yaml | 58 +++++++++++++++++++ ...-sms-167d9672411be44feb72a5175fd0987c.yaml | 58 +++++++++++++++++++ ...-sms-a5d93553709e3d7ff537bf5a7307a899.yaml | 58 +++++++++++++++++++ ...stem-044e0b800aae833468f672b3d52648b9.yaml | 58 +++++++++++++++++++ ...stem-18e973bad98be5b94dffe02819323b60.yaml | 58 +++++++++++++++++++ ...stem-1cab2d59082ad51ce28485e5e2656cc9.yaml | 58 +++++++++++++++++++ ...stem-38e29be67779459d45a16e8dcf062abc.yaml | 58 +++++++++++++++++++ ...stem-47ded31f222bc2d2f0264df68174ce6d.yaml | 58 +++++++++++++++++++ ...stem-7983ddc66df9d17c37dd89bbc4e4f416.yaml | 58 +++++++++++++++++++ ...stem-b9395679d8a85b69727aeef7e08a5667.yaml | 58 +++++++++++++++++++ ...-pro-437e935b70b10e1a496119f3d8fbac5b.yaml | 58 +++++++++++++++++++ ...-pro-5b1c2add49d2a47b01ab11a65c17a099.yaml | 58 +++++++++++++++++++ ...-pro-7075591051dde0bd8bf5f75302619dd9.yaml | 58 +++++++++++++++++++ ...-pro-770cacdb7e6dbbed594d0162d09eaa1e.yaml | 58 +++++++++++++++++++ ...-pro-946e2c8cf66089d544e720fc4e253df1.yaml | 58 +++++++++++++++++++ ...-pro-a730585b1aab8262e7f092340f9d0036.yaml | 58 +++++++++++++++++++ ...-pro-afe05343ac8d22a01c8645d538528ad3.yaml | 58 +++++++++++++++++++ ...-pro-b37c04c35cc1fc9903c14f0d3df33b2d.yaml | 58 +++++++++++++++++++ ...-pro-cec3580e3bef11008dce66e6706b0fc0.yaml | 58 +++++++++++++++++++ ...ator-792631ba5cdfc566598ea26dfe895270.yaml | 58 +++++++++++++++++++ ...lper-97d71a5a3da44a42d764845b5a062c1f.yaml | 58 +++++++++++++++++++ ...king-31c57dd6605d62ca0d6cd98ec04a3787.yaml | 58 +++++++++++++++++++ ...king-631d4cb99a459c16e4abfaa250ae1a0d.yaml | 58 +++++++++++++++++++ ...king-65f544c282d9d1cc0fbf1f6438a4d682.yaml | 58 +++++++++++++++++++ ...king-6afeb2ce393f64d78e2ee60294c65cf9.yaml | 58 +++++++++++++++++++ ...king-7012d2201a7455c1e6a2f89c3d28d2a8.yaml | 58 +++++++++++++++++++ ...king-7693fcc00d13cef3033e8801e5f162a4.yaml | 58 +++++++++++++++++++ ...king-8e84c6d55a38a50c9e90b28855791a03.yaml | 58 +++++++++++++++++++ ...king-939a2361df462af629884dcbb9b0b778.yaml | 58 +++++++++++++++++++ ...king-97d20ad28c50ce54c99b6663434336ca.yaml | 58 +++++++++++++++++++ ...okit-11aab719a7f95d840a71a26506348060.yaml | 58 +++++++++++++++++++ ...okit-3617ec07999a872e306f9b352b63ebdd.yaml | 58 +++++++++++++++++++ ...okit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...okit-bc903096388fe8f2ee39329af87a5f0b.yaml | 58 +++++++++++++++++++ ...tool-1609915cce06136e2f0af7da1d5a5d40.yaml | 58 +++++++++++++++++++ ...tool-5e7a34d7ec594c161e3b32965c332df1.yaml | 58 +++++++++++++++++++ ...tool-8001bfb6e3adcf1d41f5f6700841da72.yaml | 58 +++++++++++++++++++ ...tool-818af94ff212e6efa6d6c820fd265294.yaml | 58 +++++++++++++++++++ ...tool-8558d7a24f00d0b4c6ef650bca69a892.yaml | 58 +++++++++++++++++++ ...tool-9ae477d5648cc901734eab0eec621bd2.yaml | 58 +++++++++++++++++++ ...tool-9fa7c4fbd0089213898129a94fb855e3.yaml | 58 +++++++++++++++++++ ...kify-2b409575c7974f5c970ac5bf63b20b84.yaml | 58 +++++++++++++++++++ ...pers-01ed1eb8aac2e68ae5c276ba61ed6aed.yaml | 58 +++++++++++++++++++ ...helf-0e3f0bd6a580d466d037adb8757f5f4f.yaml | 58 +++++++++++++++++++ ...helf-6ab8d1e005858a4b8a6347eda74e7ac7.yaml | 58 +++++++++++++++++++ ...ookx-a1af99e36ad926e6fbfffb28e9e0b399.yaml | 58 +++++++++++++++++++ ...ions-aa0b3a997f2af2400ed5816a52c96615.yaml | 58 +++++++++++++++++++ ...erce-2594adb9a7b091439405e835629ab066.yaml | 58 +++++++++++++++++++ ...erce-2b5138240155c353b3e1835e93054ec3.yaml | 58 +++++++++++++++++++ ...erce-58678de90c143fa9b35140b23ca7ba6c.yaml | 58 +++++++++++++++++++ ...erce-882bdd3fdb6681642f156a22924c9a36.yaml | 58 +++++++++++++++++++ ...erce-a64fce4b936462ae9966af0a7b1ddcf3.yaml | 58 +++++++++++++++++++ ...erce-bd1638a89aa7173589958124d15f2afb.yaml | 58 +++++++++++++++++++ ...erce-da8ac31a9cff4acdc3e67efcf5be4751.yaml | 58 +++++++++++++++++++ ...erce-ed8996a111dbc40e1e02c2318552499b.yaml | 58 +++++++++++++++++++ ...sion-1f9b8670b25d19d8fd0aa7ae1c76967d.yaml | 58 +++++++++++++++++++ ...ntor-37d5b7622ee837d13b79238620e127af.yaml | 58 +++++++++++++++++++ ...erce-0927d29209569b3fa6ca414e42a83816.yaml | 58 +++++++++++++++++++ ...erce-127ab045dd12eca20b1f05cdaef8b291.yaml | 58 +++++++++++++++++++ ...erce-1fe649382158471b98650df856d70fee.yaml | 58 +++++++++++++++++++ ...erce-2594adb9a7b091439405e835629ab066.yaml | 58 +++++++++++++++++++ ...erce-3ae6c1779315005d2af44a96ee77af2d.yaml | 58 +++++++++++++++++++ ...erce-58678de90c143fa9b35140b23ca7ba6c.yaml | 58 +++++++++++++++++++ ...erce-672dfc933502a4edaa8116764ba522b6.yaml | 58 +++++++++++++++++++ ...erce-882bdd3fdb6681642f156a22924c9a36.yaml | 58 +++++++++++++++++++ ...erce-f91c2602522656e11d82af368c387634.yaml | 58 +++++++++++++++++++ ...lder-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...lder-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...lder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...odes-0063be3832ab01645d83916172a49901.yaml | 58 +++++++++++++++++++ ...odes-1c682460ea1b975e2214df2ecfd2a316.yaml | 58 +++++++++++++++++++ ...odes-3cdf082bedfada27b24599e0f1cfd2ca.yaml | 58 +++++++++++++++++++ ...odes-4162fc0aa9f89a19a3b0d9a16f341e8b.yaml | 58 +++++++++++++++++++ ...odes-548b1bf05be2eb1395c8483d4525a9fd.yaml | 58 +++++++++++++++++++ ...odes-56e13ca8937773de3612c03bb63c62f7.yaml | 58 +++++++++++++++++++ ...odes-5baab614c3a64c60d1e33947fef5d35a.yaml | 58 +++++++++++++++++++ ...odes-9fb1ec0e705e68a81b6b6afdf66e55e5.yaml | 58 +++++++++++++++++++ ...odes-b9a97b0935a5ed2529aec7b450e17238.yaml | 58 +++++++++++++++++++ ...odes-dac296fb931bf261709dca85eb4e38f9.yaml | 58 +++++++++++++++++++ ...odes-ee646c363ad3189cf7438d75312013e3.yaml | 58 +++++++++++++++++++ ...odes-f8952c598fe28f01e932d940cff08de2.yaml | 58 +++++++++++++++++++ ...-bar-0355d1e8eb46bcc87e42a81e780a30de.yaml | 58 +++++++++++++++++++ ...-bar-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...less-2504b2285582e1e86e6e013779bb055f.yaml | 58 +++++++++++++++++++ ...lter-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...hare-0c3c59a360a5bdbf267be8b305e5b01c.yaml | 58 +++++++++++++++++++ ...hare-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...ages-27610b5571a30e556b64bf5b8d096808.yaml | 58 +++++++++++++++++++ ...ages-453a8422f88d4cb86f0bfdbbb1968f0b.yaml | 58 +++++++++++++++++++ ...ages-83e4f665f1af2e601634717e68062856.yaml | 58 +++++++++++++++++++ ...ages-aa4a0e71714152916ddf88945c46dfa0.yaml | 58 +++++++++++++++++++ ...ages-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ages-b9ebb0412655a1be395c1fd4d44393e3.yaml | 58 +++++++++++++++++++ ...ages-bcaba1132a8ac1a695b97d03ca9be0db.yaml | 58 +++++++++++++++++++ ...ages-c908fd3552b679e573e25a7e48dd7e10.yaml | 58 +++++++++++++++++++ ...ages-cf8da83f0f83eb1a574fe335e5527411.yaml | 58 +++++++++++++++++++ ...ages-e17bce1a8a59b23cca6c3786e7d0e9d3.yaml | 58 +++++++++++++++++++ ...k-in-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...type-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...lery-6cdf919648d82bb79f7fd259426a9e61.yaml | 58 +++++++++++++++++++ ...ents-2954406cfff461fdbbd41cca0f0b5dbf.yaml | 58 +++++++++++++++++++ ...ents-377c33087f53eb5bcffb99a599fdc127.yaml | 58 +++++++++++++++++++ ...ents-37fef8959e103795e5217ab4860bd85a.yaml | 58 +++++++++++++++++++ ...ents-3a30cbb34610b918136a671069241bbf.yaml | 58 +++++++++++++++++++ ...tion-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...arch-7be20794431b31f1b6e43bd0f8a27ca0.yaml | 58 +++++++++++++++++++ ...arch-8abf5a60713230c7b3ea5764184f876d.yaml | 58 +++++++++++++++++++ ...xtra-1c0f40dcfb4caae9a4327cd7172a7b18.yaml | 58 +++++++++++++++++++ ...nect-93264bce58bf86815d047dde89423fc8.yaml | 58 +++++++++++++++++++ ...lkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...iews-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...list-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...erio-25ee6eba4f05265a07353f4c20de2e87.yaml | 58 +++++++++++++++++++ ...eway-3dc139e568d48b3719f09d74e5c6ac5a.yaml | 58 +++++++++++++++++++ ...ugin-421b45189c95e21b02ed0def677eee30.yaml | 58 +++++++++++++++++++ ...ling-5394ed5bbbdcf7b65cff8921a9a68e7e.yaml | 58 +++++++++++++++++++ ...ling-7c37f00fa8e3ffb07ac6ec246eebe54b.yaml | 58 +++++++++++++++++++ ...ages-296dca83f7d30b213a3d42f8baefd9aa.yaml | 58 +++++++++++++++++++ ...lder-05453cda2259f2ed6f2379bbfd9d67f2.yaml | 58 +++++++++++++++++++ ...erce-3bc18921bc6f3f90e04d9001cf0b809e.yaml | 58 +++++++++++++++++++ ...erce-558e7a9aa7fa3c2ac2fdb51e4f62875d.yaml | 58 +++++++++++++++++++ ...erce-825f1e0aa5ff97544f2d8803cf6504ca.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...lder-997d1000e8574991f2c13cb7aa2ef7b7.yaml | 58 +++++++++++++++++++ ...lder-9cb937babec24c7a5f1e798bac3533ef.yaml | 58 +++++++++++++++++++ ...late-ce76e5efada5037a3e4a2325d3d70d7f.yaml | 58 +++++++++++++++++++ ...rumb-27fbae7541522bd11e17939b8913ef50.yaml | 58 +++++++++++++++++++ ...avxt-32e0114d44072a3612b1116316fc4009.yaml | 58 +++++++++++++++++++ ...mple-8507164d3055217cb96ce83c182ad6aa.yaml | 58 +++++++++++++++++++ ...menu-49ba2e496df198082592a83af2dd4d61.yaml | 58 +++++++++++++++++++ ...menu-d4f39f41edde6809c1e3f1995c35c774.yaml | 58 +++++++++++++++++++ ...code-47b99e01cae37cb070ef3a81700bf8b1.yaml | 58 +++++++++++++++++++ ...ance-b2885ea30200f7cd94ec6f28c25609a5.yaml | 58 +++++++++++++++++++ ...ance-f5d920633ee9565486368ab785adab3b.yaml | 58 +++++++++++++++++++ ...eeze-310b89b29fc26cf3b3da141667d5a42b.yaml | 58 +++++++++++++++++++ ...eeze-59a7cb3ce7ab42429819a5af71285080.yaml | 58 +++++++++++++++++++ ...eeze-d2df0429a7a8c5673deb89d4cce4e2fc.yaml | 58 +++++++++++++++++++ ...orms-f47477188afe1a9a9b869f9c5c6fafbb.yaml | 58 +++++++++++++++++++ ...orge-08c2f711dab885b1524ebbd7b0782f00.yaml | 58 +++++++++++++++++++ ...orge-20d94fa7cbaa795926bd10e9c360bcb7.yaml | 58 +++++++++++++++++++ ...orge-fe10205699bf88a71e4460031e80e0cf.yaml | 58 +++++++++++++++++++ ...core-3b4f016c7ae4d3dd29540472e7fdd513.yaml | 58 +++++++++++++++++++ ...rizy-223fd164cbed0be2e156fefd83517bf1.yaml | 58 +++++++++++++++++++ ...rizy-22707a3d55e78cedf2f7dfb41d94bfbd.yaml | 58 +++++++++++++++++++ ...rizy-2731966af274d5e5b3eb099c6bdc40aa.yaml | 58 +++++++++++++++++++ ...rizy-2ea9b11139987a1bb9095ad4e4be45bc.yaml | 58 +++++++++++++++++++ ...rizy-44eea350bc1338780b2a377c7a4acfdc.yaml | 58 +++++++++++++++++++ ...rizy-475d1ffae41ddc61dae5fe3b295751d5.yaml | 58 +++++++++++++++++++ ...rizy-4f15003c85cf67398b6ba79713bb96a7.yaml | 58 +++++++++++++++++++ ...rizy-51d48891356faa4b5ee750ea40af7e8d.yaml | 58 +++++++++++++++++++ ...rizy-7310ba3269deb60929ca945cac8767e0.yaml | 58 +++++++++++++++++++ ...rizy-7d6d564d16561c7bab08d495e46b51fb.yaml | 58 +++++++++++++++++++ ...rizy-827a8d5ffa28fd47c13e94e0a15edf68.yaml | 58 +++++++++++++++++++ ...rizy-9ac7de23b3d67dbdcd278f6e1494759d.yaml | 58 +++++++++++++++++++ ...rizy-a5ce2d4f9e1b1bb323f57b01146d769b.yaml | 58 +++++++++++++++++++ ...rizy-a6227d9d923140efcf18978d7c277e53.yaml | 58 +++++++++++++++++++ ...cker-2c732f7d3e8ac28c93dbfa9cd10c3d81.yaml | 58 +++++++++++++++++++ ...cker-3120d6067a3e5e251eec4212f4e5aeb5.yaml | 58 +++++++++++++++++++ ...cker-4673047ca29ad4630d7b8bb30f727df8.yaml | 58 +++++++++++++++++++ ...cker-4787aca2f4649ac09a5532468944b982.yaml | 58 +++++++++++++++++++ ...cker-64556376243051c6c3bc87690377ce32.yaml | 58 +++++++++++++++++++ ...cker-a9a979661add0df60253539d4415e8c1.yaml | 58 +++++++++++++++++++ ...cker-bada82132f6cbfd33d5760be8742a9cb.yaml | 58 +++++++++++++++++++ ...cker-e1d1d0387e0e80a55061f8f78f966bcd.yaml | 58 +++++++++++++++++++ ...tube-e58df3f9e159a90a2b75adb9058879da.yaml | 58 +++++++++++++++++++ ...nder-ae16dab4cf6e57b86cebb9a4da6eafa8.yaml | 58 +++++++++++++++++++ ...ager-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml | 58 +++++++++++++++++++ ...ager-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml | 58 +++++++++++++++++++ ...ager-47bfe206cfaf86d87b1c99f3c44195fd.yaml | 58 +++++++++++++++++++ ...ager-4d4a758d5270914e8644a21140cebd3a.yaml | 58 +++++++++++++++++++ ...nder-48dead1c8e1154d67ccc9e390d285269.yaml | 58 +++++++++++++++++++ ...nder-99e41ed657ab27362dc617dd94edb65f.yaml | 58 +++++++++++++++++++ ...hots-e8da5022574661b62f1a47c50584d384.yaml | 58 +++++++++++++++++++ ...olor-b6c60215d191e78bbb1469004f73341c.yaml | 58 +++++++++++++++++++ ...tion-48e518f6131232316ecd7bce4c25cf68.yaml | 58 +++++++++++++++++++ ...bank-dbb7d441461d213063eb891cf460c431.yaml | 58 +++++++++++++++++++ ...mate-c6a7ed723d2b968d4f9df70823302086.yaml | 58 +++++++++++++++++++ ...-pro-bfcbe695fa101c3e16c8d87ef093b6cf.yaml | 58 +++++++++++++++++++ ...list-ad738a9e4dada70c7860d495c6a31281.yaml | 58 +++++++++++++++++++ ...list-9d98910f079017bb745e5dfdd7b3a383.yaml | 58 +++++++++++++++++++ ...list-e0096662f4021341254048a6332cbd3c.yaml | 58 +++++++++++++++++++ ...ager-127715120e5f598c6f6d3ae7380f9898.yaml | 58 +++++++++++++++++++ ...ager-3a7bd82599c0011e05818b715925a7ed.yaml | 58 +++++++++++++++++++ ...ager-a6117f5c5b129c85596c75822f81da17.yaml | 58 +++++++++++++++++++ ...ager-f85f5bca86f0fe8e61b822a458c1b11f.yaml | 58 +++++++++++++++++++ ...uite-596c399ca77f6898f5eb2e3e553223f2.yaml | 58 +++++++++++++++++++ ...menu-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...menu-7343e5b259d4e1cfb4df95c545aa69f5.yaml | 58 +++++++++++++++++++ ...dges-0b4ca30f3ad4ec80ff7de93b32a4ae21.yaml | 58 +++++++++++++++++++ ...edia-1cf8853774794c9a185058bff3041a9d.yaml | 58 +++++++++++++++++++ ...form-122921564a68def720b196881ac65cfb.yaml | 58 +++++++++++++++++++ ...orms-004b4a4b5a4f50cb7e2b7f31cbe37f6d.yaml | 58 +++++++++++++++++++ ...orms-04719c2aa85ce103d2b347cbc1de6bf9.yaml | 58 +++++++++++++++++++ ...orms-3c4ad527262d00d607d5c7466a5e3a23.yaml | 58 +++++++++++++++++++ ...orms-4f1bcfb6c80585124e17859286f212d2.yaml | 58 +++++++++++++++++++ ...orms-5a3c975faaff05174a403394f594d251.yaml | 58 +++++++++++++++++++ ...orms-6410ce52f11ad48713df208e717c6bdf.yaml | 58 +++++++++++++++++++ ...orms-6c9eb31202fa41d32a09d5fd559fe8f5.yaml | 58 +++++++++++++++++++ ...-acf-6f39f76c23209b8f553defb1d25caa0d.yaml | 58 +++++++++++++++++++ ...orms-b917e284e5115c137684e2852a491ab5.yaml | 58 +++++++++++++++++++ ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...orms-c0fe1fee8a4f48d20fef6e8a451cadaa.yaml | 58 +++++++++++++++++++ ...orms-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...orms-e466bc3583e942d1065171a722796cc7.yaml | 58 +++++++++++++++++++ ...ypin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...elds-cff8c4e5924684eb6753231ae69511fb.yaml | 58 +++++++++++++++++++ ...bers-aa1e46c69c06ec911dde69a16f67cb87.yaml | 58 +++++++++++++++++++ ...view-3d4fe5743b4cfd3fb11de9a33d55f7f3.yaml | 58 +++++++++++++++++++ ...meet-848807325cc6df7207551325cd628ce9.yaml | 58 +++++++++++++++++++ ...ress-08cd70ed7dd5c5c6156967f8c0e81815.yaml | 58 +++++++++++++++++++ ...ress-13a0f9bc92fbfe82f8148720984ec395.yaml | 58 +++++++++++++++++++ ...ress-172545cfbc947ee677d3a8bdac5e5224.yaml | 58 +++++++++++++++++++ ...ress-1d7f1035caa311db84f335e8b5f7ce3c.yaml | 58 +++++++++++++++++++ ...ress-1f93d822784f1c50c03c1335049e7dfa.yaml | 58 +++++++++++++++++++ ...ress-376f3b7be651ac6251ca8825ec683915.yaml | 58 +++++++++++++++++++ ...ress-430f35a9a91f48c97c43930a9ef1c8e0.yaml | 58 +++++++++++++++++++ ...ress-533ee8fa484df21d792f06431e1c5c50.yaml | 58 +++++++++++++++++++ ...ress-5fe17c2fd9a91ee4cda8ff9e79dd3204.yaml | 58 +++++++++++++++++++ ...ress-863062f7cb6b2bf7365f623cc8d292ad.yaml | 58 +++++++++++++++++++ ...ress-88c5b961644bad4c49d63ba50954d1ef.yaml | 58 +++++++++++++++++++ ...ress-9a2cdadfd3bcbd9bf749adf6574068df.yaml | 58 +++++++++++++++++++ ...plus-5f432c656be335dcd6d93a860c52a8ba.yaml | 58 +++++++++++++++++++ ...ress-af97e64423b75225062fc5e60d8e5fa3.yaml | 58 +++++++++++++++++++ ...ress-b60bae014d152f2a394bd09bd7490303.yaml | 58 +++++++++++++++++++ ...ress-c109037c5bd54b61559d2af24279cf52.yaml | 58 +++++++++++++++++++ ...ress-c3337fb47eeb04c822819fd17c433268.yaml | 58 +++++++++++++++++++ ...ress-c4124b2dee30c6d41a48f0a55354e6b6.yaml | 58 +++++++++++++++++++ ...ress-cfcbf4a057a79e8a98be0e1376a14728.yaml | 58 +++++++++++++++++++ ...-pro-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...ress-d0fd9cc44e353f2e6039b73677016f83.yaml | 58 +++++++++++++++++++ ...docs-8dce3163a90bed75fd5b9e557a28f3b3.yaml | 58 +++++++++++++++++++ ...uest-a103c2e3cc97ab522767ac0230b22480.yaml | 58 +++++++++++++++++++ ...ress-f3ed5f14a02e2bdcce7190205d484a67.yaml | 58 +++++++++++++++++++ ...arch-ed89c8160fc54a5150ed5e4f427981e4.yaml | 58 +++++++++++++++++++ ...htag-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...edia-098044594b04ab841c349ed64a192c47.yaml | 58 +++++++++++++++++++ ...edia-143b187563c9f2554688db0c6157a5d5.yaml | 58 +++++++++++++++++++ ...edia-5185077331b584e736df6ae601c45310.yaml | 58 +++++++++++++++++++ ...edia-58b37148ce0bdaa5522c3559b2f37ff0.yaml | 58 +++++++++++++++++++ ...edia-85898493501c4d75829911d4553b254e.yaml | 58 +++++++++++++++++++ ...edia-8b2a21b8747d982584ad7e24dffd2d64.yaml | 58 +++++++++++++++++++ ...edia-aeff462ac51a8748cbda344eafd679be.yaml | 58 +++++++++++++++++++ ...edia-af05e39beae4ccc85b4b7733a1dfc389.yaml | 58 +++++++++++++++++++ ...edia-c87d935ed7b249bf9a1f11f3472af3e0.yaml | 58 +++++++++++++++++++ ...edia-d489286ed41649bac6a4b978b2c38ed0.yaml | 58 +++++++++++++++++++ ...edia-dc0051edab31221e49ae9364dcda380b.yaml | 58 +++++++++++++++++++ ...post-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...type-5299c25ee2ef36af65c119614434bd1d.yaml | 58 +++++++++++++++++++ ...ream-f5631d6e08f23256931384659c340b7c.yaml | 58 +++++++++++++++++++ ...post-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rary-16a4534effaaeb1466ec5e74fc661c70.yaml | 58 +++++++++++++++++++ ...line-02a886272dd2cdcd86a1f09e85f56770.yaml | 58 +++++++++++++++++++ ...line-26189f152df8893b52731b2bdd16e94e.yaml | 58 +++++++++++++++++++ ...line-af6a1540ae3f6f386fc5dcefbac66cbb.yaml | 58 +++++++++++++++++++ ...tact-ffaa84c2ddc8dc8e320dfb0fae85b11d.yaml | 58 +++++++++++++++++++ ...ager-f87c4c6d53b29231a0f57635f4d257a4.yaml | 58 +++++++++++++++++++ ...r-wp-262146db4fdf9dc0247b51f04e7c7b5d.yaml | 58 +++++++++++++++++++ ...erce-b71f43cf539320adcdf753a5632e031f.yaml | 58 +++++++++++++++++++ ...erce-f361db7993b168bd9190093a1decfa83.yaml | 58 +++++++++++++++++++ ...orwc-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...load-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rter-c38ba88828239a3fc9d444831fba05d4.yaml | 58 +++++++++++++++++++ ...ange-09f74f7b9db91816c6e2bc32700d99d5.yaml | 58 +++++++++++++++++++ ...move-5508f1f637e90aba06cb7afdc5129513.yaml | 58 +++++++++++++++++++ ...ator-c3fa207f4b7e44a252f8db84f79dbd3d.yaml | 58 +++++++++++++++++++ ...ange-29b5be50bbb53513769398d4dbd36872.yaml | 58 +++++++++++++++++++ ...lete-24cf0801a4963f154c38e24267fc828d.yaml | 58 +++++++++++++++++++ ...mail-66ff52bda667dbc0abbc88dbfecf89ff.yaml | 58 +++++++++++++++++++ ...mail-aa16febdbc946ef586052ff28c269ebe.yaml | 58 +++++++++++++++++++ ...tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tles-d1e689eb00e15a822c5a4bc69f8d4926.yaml | 58 +++++++++++++++++++ ...tles-e79dfaa6d6a126465f94617b43a94699.yaml | 58 +++++++++++++++++++ ...heet-4f2b194ecb7432206d5e63b6f9923644.yaml | 58 +++++++++++++++++++ ...heet-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...itor-10360815e5a20aeed5671b4b975451a1.yaml | 58 +++++++++++++++++++ ...itor-4d37b5938e435e55d1b784b692eb0059.yaml | 58 +++++++++++++++++++ ...itor-78b9d1af7b3a60f9f86a06190eb42653.yaml | 58 +++++++++++++++++++ ...itor-89b2790236539e015ae4e5bc957d832c.yaml | 58 +++++++++++++++++++ ...itor-8a1c3cab2f9b4de5abbed7eadb500759.yaml | 58 +++++++++++++++++++ ...itor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml | 58 +++++++++++++++++++ ...itor-c2e59525aa8afa93502c3fb0824f336b.yaml | 58 +++++++++++++++++++ ...itor-e34822239e7a06946c13777f1af5a66d.yaml | 58 +++++++++++++++++++ ...itor-fb0e4f9dfbe427b130769e6af2734cfc.yaml | 58 +++++++++++++++++++ ...oast-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...bute-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...fish-aab8828fbd21352e7bbaf9cbf0ad1810.yaml | 58 +++++++++++++++++++ ...fish-cf39fd16fb8f788c8db751f0dadfb29c.yaml | 58 +++++++++++++++++++ ...fish-eff805b4d7ec1d79e32d68ca80330ad6.yaml | 58 +++++++++++++++++++ ...ator-8f6754331835c0e520f1fdc12e539318.yaml | 58 +++++++++++++++++++ ...edia-bb9fce36721cf5452da89d5517df1cbd.yaml | 58 +++++++++++++++++++ ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ents-0716e418df849204967cfc79352f5ba7.yaml | 58 +++++++++++++++++++ ...ents-246b8b56564018f48400096509996111.yaml | 58 +++++++++++++++++++ ...ents-5eb89c28ff961004bce910abdba4c1a6.yaml | 58 +++++++++++++++++++ ...ents-a1b8f44a7ac7bccab5a1c94f60d1251a.yaml | 58 +++++++++++++++++++ ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rity-05b396118a681cd132367b6e58e8468f.yaml | 58 +++++++++++++++++++ ...rity-123845e838da3a6daa580f3b2ed445cb.yaml | 58 +++++++++++++++++++ ...rity-2269359ddd46edefa6d111262722719c.yaml | 58 +++++++++++++++++++ ...rity-42f3a7532bbf8a08643a30303225bc1a.yaml | 58 +++++++++++++++++++ ...rity-5dceb192e7c190761b3c97b152cbfe74.yaml | 58 +++++++++++++++++++ ...rity-69678c7361dde97e99f926d45953a3db.yaml | 58 +++++++++++++++++++ ...rity-80f01f8956a520ccda68d02885c8eaae.yaml | 58 +++++++++++++++++++ ...rity-8d9d8e003ce03da674f1adc87ce55135.yaml | 58 +++++++++++++++++++ ...rity-a2ffed6de9ed93ebd568a9a5d4586523.yaml | 58 +++++++++++++++++++ ...rity-ae058acace8503cc8d5660ee1d5bf68e.yaml | 58 +++++++++++++++++++ ...rity-cad2b6b8af5079972fa1531cce991f4d.yaml | 58 +++++++++++++++++++ ...ycdn-c7b13d17993dc7e235bed80189f9bc22.yaml | 58 +++++++++++++++++++ ...-pro-106e6826f0718372efc6e503171c8663.yaml | 58 +++++++++++++++++++ ...tics-106e6826f0718372efc6e503171c8663.yaml | 58 +++++++++++++++++++ ...tics-a36b6c8064388eb19a8195201a1f8d8d.yaml | 58 +++++++++++++++++++ ...tics-fd93b73cf46336153d1b2692824ed6b3.yaml | 58 +++++++++++++++++++ ...tion-2954a20fc20c80e75db1c146dc2ce5bb.yaml | 58 +++++++++++++++++++ ...tion-dec87833cedb03a8980db3616c32b95d.yaml | 58 +++++++++++++++++++ ...-100-5e4c1e870696b3efcdbf85ce990788dc.yaml | 58 +++++++++++++++++++ ...-100-7fc47d45293f896fc846aa4ca502d2b2.yaml | 58 +++++++++++++++++++ ...-100-8c18151f3e9775aa380622b4246d4bad.yaml | 58 +++++++++++++++++++ ...-100-95fc25676cc1a333e3b3171b175734a4.yaml | 58 +++++++++++++++++++ ...ugin-167e61af371a8f35ae376105d3215900.yaml | 58 +++++++++++++++++++ ...ugin-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml | 58 +++++++++++++++++++ ...ugin-3950561f5b69ad2aadeaa54bf293ca85.yaml | 58 +++++++++++++++++++ ...ugin-3fa1d19f6ab4b3b413035e0d19283cea.yaml | 58 +++++++++++++++++++ ...ugin-6896fd40fd840eb45a889008aea0c67e.yaml | 58 +++++++++++++++++++ ...ugin-70e9f9d703b7871b412f99e0b65bc826.yaml | 58 +++++++++++++++++++ ...ugin-c7ee5314e18860cb525cd22fac24dbf3.yaml | 58 +++++++++++++++++++ ...ugin-f1a649593702eb632f6f553b9ae25e5a.yaml | 58 +++++++++++++++++++ ...ator-b0f7eacb55c0790170a8a4009593c548.yaml | 58 +++++++++++++++++++ ...ager-24e7ccbee7ca416ae56183733be3750e.yaml | 58 +++++++++++++++++++ ...file-828427f0b9437525d7829a16b68575dc.yaml | 58 +++++++++++++++++++ ...tton-3e24dfff2b5771f43f4fe5ad4a241e28.yaml | 58 +++++++++++++++++++ ...tton-63f1bf4087d9427b6d24f67f8ffe6d66.yaml | 58 +++++++++++++++++++ ...t-vr-978cbd8cd586092e7c39e28ce0b70684.yaml | 58 +++++++++++++++++++ ...tion-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...tion-0ad7f5a9c3342b7aeba5a03db14c71d0.yaml | 58 +++++++++++++++++++ ...tion-0ea9d75794d2c7486ec9098022942b0a.yaml | 58 +++++++++++++++++++ ...tion-42e2e881f29393c821ce6d432bf2a46a.yaml | 58 +++++++++++++++++++ ...tion-82603c2847e2ca1ee15bc23d829fbc4a.yaml | 58 +++++++++++++++++++ ...tion-913a26462c41f8def73f8a9767771136.yaml | 58 +++++++++++++++++++ ...tion-fb1c9dec29fbcdf7eb9112a479b097f2.yaml | 58 +++++++++++++++++++ ...tton-456677c70a49bc1c088cafa5c6ef9da9.yaml | 58 +++++++++++++++++++ ...tton-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dget-b4d222d7f6fbba49026992c33a4f820f.yaml | 58 +++++++++++++++++++ ...ns-x-f3522c3cb0ccfb1220b311f9a238555b.yaml | 58 +++++++++++++++++++ ...ffee-0caf8903231ef8666af5245315083b74.yaml | 58 +++++++++++++++++++ ...ffee-514e5589e35f6de5b251e63d9ba1561e.yaml | 58 +++++++++++++++++++ ...ffee-9c9be48d36983f46c1dafc5a934e6547.yaml | 58 +++++++++++++++++++ ...ffee-e74780b7e51cbe82d58b11a6033838ff.yaml | 58 +++++++++++++++++++ ...ting-469ce07115e491efc4cb1c8371dce59b.yaml | 58 +++++++++++++++++++ ...ager-1fb9c20f2dc722c53163029233b7680b.yaml | 58 +++++++++++++++++++ ...maps-e5558e0a5f22ef3f76543aa9614d9789.yaml | 58 +++++++++++++++++++ ...tcha-2fe5526a4726214454b149388de7772d.yaml | 58 +++++++++++++++++++ ...osts-5c14fa33e85650f1c6cb1512fa1848c3.yaml | 58 +++++++++++++++++++ ...tics-1758588699ac13a0da770bd7cd456b77.yaml | 58 +++++++++++++++++++ ...maps-f5ede402fdf5293b860276b605ce4e8f.yaml | 58 +++++++++++++++++++ ...osts-2af654d4e68b70fada0ba70d7ef43915.yaml | 58 +++++++++++++++++++ ...edin-b2f000587e20cf237a45ef2d6036a9a0.yaml | 58 +++++++++++++++++++ ...rest-e64b2928f117109f88452f28d939f5ac.yaml | 58 +++++++++++++++++++ ...osts-baca13b0bce150bcaf2ee5c05eb2cc1d.yaml | 58 +++++++++++++++++++ ...smtp-6356cf8af8f87c1115ab1b364de5897a.yaml | 58 +++++++++++++++++++ ...ials-11832d8ff71b77f5c5443c834508a4b9.yaml | 58 +++++++++++++++++++ ...r-wp-629a86e61ae281b9190188a5f16e6d8f.yaml | 58 +++++++++++++++++++ ...time-9473021a502a63a62049e1b92de7e47f.yaml | 58 +++++++++++++++++++ ...time-cd5b979265c6693d84b238525b6e2413.yaml | 58 +++++++++++++++++++ ...core-192e415b611335b3538e5f2af9fbc394.yaml | 58 +++++++++++++++++++ ...ator-850cdc2bb11e2c84c49d36aadc35f92a.yaml | 58 +++++++++++++++++++ ...grid-e859444e797e41b8d664b82e23a899ba.yaml | 58 +++++++++++++++++++ ...ages-0c97fc31b35102d21ddbee9abbb4d9fd.yaml | 58 +++++++++++++++++++ ...ages-182ea68949b1ee6faae255d4de23157d.yaml | 58 +++++++++++++++++++ ...addy-b41c7809a15dd29e69a83cb3726570dc.yaml | 58 +++++++++++++++++++ ...lite-dddec61512fe66c6bc2775d423f59680.yaml | 58 +++++++++++++++++++ ...form-139d1504f66cd87031fd329a5f49ab94.yaml | 58 +++++++++++++++++++ ...form-13cb55c1f508982488cee2289cc6f8a4.yaml | 58 +++++++++++++++++++ ...form-447e8d03dfe04fdb92ac705bfa6b054a.yaml | 58 +++++++++++++++++++ ...form-4b4ac88975e8590a6a5fd0cf4302a336.yaml | 58 +++++++++++++++++++ ...form-4c3327ab228513e0bba5f6564699d19d.yaml | 58 +++++++++++++++++++ ...form-83141551066454cfa3570b7b645030aa.yaml | 58 +++++++++++++++++++ ...form-a09cb353956813c158f3eacbd53365c2.yaml | 58 +++++++++++++++++++ ...form-a7620f303af6467e51bdd4f84801b80c.yaml | 58 +++++++++++++++++++ ...form-b6900545e2e4c40eddb286d1788c8880.yaml | 58 +++++++++++++++++++ ...form-d066e564c9d177f69ad8edb9aa85d9a0.yaml | 58 +++++++++++++++++++ ...lder-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...tors-bf9560c62dd0208ea0e7d6c1046859e5.yaml | 58 +++++++++++++++++++ ...orms-768674b25e725613816286a9dc3c4233.yaml | 58 +++++++++++++++++++ ...orms-7c34573376626471f92815a30e26e5cb.yaml | 58 +++++++++++++++++++ ...orms-b4c4ff584d962e0bfb58568b73a5ecd3.yaml | 58 +++++++++++++++++++ ...orms-cc7f0854e90c58e6d36843a97af2d437.yaml | 58 +++++++++++++++++++ ...orms-dd0b75b6278e9d9ace01e3d0f5ed462a.yaml | 58 +++++++++++++++++++ ...orms-de09ecc40e8ef125eed740508fee8b16.yaml | 58 +++++++++++++++++++ ...-pro-af5db143583f026b4ec13d0e53264642.yaml | 58 +++++++++++++++++++ ...ager-b88cf8c0086678b4179593db6bed64e7.yaml | 58 +++++++++++++++++++ ...ndar-05d1ff035c1fc3b076e51a7b5c7af2a9.yaml | 58 +++++++++++++++++++ ...ndar-2ac1b11dfdd4d8aec9aef19739eee675.yaml | 58 +++++++++++++++++++ ...ndar-610a8079730189f1c51d4e425058e93f.yaml | 58 +++++++++++++++++++ ...ndar-8b25a4024805d97b0bbe39b2b083bd09.yaml | 58 +++++++++++++++++++ ...king-b0ee79ee6bfacccc5c859ba67a33f0de.yaml | 58 +++++++++++++++++++ ...vent-09740a555ab133389f0f6571fce0ae84.yaml | 58 +++++++++++++++++++ ...vent-cee3839418561c0992d928e881decc00.yaml | 58 +++++++++++++++++++ ...ugin-27b6ebe3ed4381bb3c55ec596f477456.yaml | 58 +++++++++++++++++++ ...tion-7ca52430035acd6a97700e0a1293791e.yaml | 58 +++++++++++++++++++ ...tion-be21de51738bde44b4ff85eb79707aec.yaml | 58 +++++++++++++++++++ ...tion-cc489789b5cb387a9c3918987d9c41fb.yaml | 58 +++++++++++++++++++ ...ista-dc0d3deddd939ceb7da2b7a2e45dc103.yaml | 58 +++++++++++++++++++ ...tton-f1b22b19f1452ccdd593cc23416c662b.yaml | 58 +++++++++++++++++++ ...mate-cfbef64f1e1fba4c3a45a9c3c672157f.yaml | 58 +++++++++++++++++++ ...-bar-2ea25ed58e645deebc4c9ee26219463e.yaml | 58 +++++++++++++++++++ ...king-1c049cc07d2d3d3aff9e887e6aede6d7.yaml | 58 +++++++++++++++++++ ...king-4e96ec415742df4383d4f15264a5ba1f.yaml | 58 +++++++++++++++++++ ...show-010b13dab325ad4db18460bf37133fe2.yaml | 58 +++++++++++++++++++ ...r-wp-c8dbdfc73ab33e8afe0f3263d7ef0673.yaml | 58 +++++++++++++++++++ ...lder-a735151e1a4f287ab4567ad75cce9a30.yaml | 58 +++++++++++++++++++ ...lder-fdb6580a9b4fe182559a2e3ed6c65f0e.yaml | 58 +++++++++++++++++++ ...ptix-1b1736563be4cd48928200e2f20f46f4.yaml | 58 +++++++++++++++++++ ...ptix-6821f0debd453e2dc059a8ca2d3fede9.yaml | 58 +++++++++++++++++++ ...tory-aefc22c7a60a7d5e0b05b0ef2a479b2b.yaml | 58 +++++++++++++++++++ ...erce-5b5a80245567937203123aecaa90cc27.yaml | 58 +++++++++++++++++++ ...form-f979531e448b7af410cfe697c4a56a83.yaml | 58 +++++++++++++++++++ ...anto-01407881ecb8410d18cf22fb6eadefa6.yaml | 58 +++++++++++++++++++ ...anto-3a9821f8d5cc2355d8fbcd9465b098d5.yaml | 58 +++++++++++++++++++ ...anto-5bb05314b65c718b289ec510721af0ea.yaml | 58 +++++++++++++++++++ ...anto-5f3e8a4fee8c983cab0188c7dcf05d7b.yaml | 58 +++++++++++++++++++ ...anto-62aaab2000dfd7cd8870403602e59565.yaml | 58 +++++++++++++++++++ ...anto-63e4f5d4e15b76376a440d71c38d9660.yaml | 58 +++++++++++++++++++ ...anva-e04c0229e8744dd1a1d90594b9aeb97f.yaml | 58 +++++++++++++++++++ ...ight-07f4ebdf99bc6bc543918be1a478a57b.yaml | 58 +++++++++++++++++++ ...ight-85fcd9779448a368c2c74d702cd2f30d.yaml | 58 +++++++++++++++++++ ...capa-aacd4552800caf4d2cb49989fbc6ad61.yaml | 58 +++++++++++++++++++ ...-pro-90e136f1c49e3c12cb6162b882a23711.yaml | 58 +++++++++++++++++++ ...nced-7230e34e5bb18f402b20042366cbe3fb.yaml | 58 +++++++++++++++++++ ...nced-90e136f1c49e3c12cb6162b882a23711.yaml | 58 +++++++++++++++++++ ...nced-df1f9aa06bdcfa30c9c48b598c66ff46.yaml | 58 +++++++++++++++++++ ...nced-ffa44387e06e48e98303b52781d92b69.yaml | 58 +++++++++++++++++++ ...ider-c23ce008dc2473271851552ad5775c2c.yaml | 58 +++++++++++++++++++ ...form-84e047e46e28d58fa1b7c6a8e2da02e0.yaml | 58 +++++++++++++++++++ ...form-d6b551c8eebbc07aebd60fb21b086030.yaml | 58 +++++++++++++++++++ ...tcha-06e4153293e52f8c9043f9af68520509.yaml | 58 +++++++++++++++++++ ...tcha-37bc6be0c6a9c157c75ceed9ddf9d26e.yaml | 58 +++++++++++++++++++ ...-bws-eadf748bcfc719d5710c4f372c6fc3a8.yaml | 58 +++++++++++++++++++ ...-bws-f2483f1e9fa6d9c3c1a5e1dc23e31a6f.yaml | 58 +++++++++++++++++++ ...tcha-c4ac4eb73c727fb730c8ebeb8d318861.yaml | 58 +++++++++++++++++++ ...tion-31a8072de701550e4edcf2604b9e23bf.yaml | 58 +++++++++++++++++++ ...tion-870cf9f4b157c60e42faef24d8dd195e.yaml | 58 +++++++++++++++++++ ...rm-7-1aaed89497f863004f63bac937997897.yaml | 58 +++++++++++++++++++ ...thai-0b74c8fb0ed5d80d8d86412fe0ecefe0.yaml | 58 +++++++++++++++++++ ...repo-e23766eb69c1e01b61ceb05404bdb9f5.yaml | 58 +++++++++++++++++++ ...-all-1772bca649ab5b99b71eb70af7333d0b.yaml | 58 +++++++++++++++++++ ...tion-8a7e1f1e76c1a5624370361e3f4014b1.yaml | 58 +++++++++++++++++++ ...tion-cf2f1acbf24407737a2ea0faf858d6e4.yaml | 58 +++++++++++++++++++ .../car-e6c806cffb708ac14203b6a177746aad.yaml | 58 +++++++++++++++++++ ...ntal-3827b6d062237203be17d7460bdfff1d.yaml | 58 +++++++++++++++++++ ...ntal-840d0f5e27379db8cc72bc8207e84fc7.yaml | 58 +++++++++++++++++++ ...stem-ed300225e14e2bc5b42ef0d162dd4c0e.yaml | 58 +++++++++++++++++++ ...acle-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...aler-6b187667244750832b7e539032f73d81.yaml | 58 +++++++++++++++++++ ...aler-87691ec7eeba77afd606ae3cf92f6d8b.yaml | 58 +++++++++++++++++++ ...gate-24f679f9f324edb55cd9d46a91aafdf6.yaml | 58 +++++++++++++++++++ ...erce-94b5a2833af1ffbcffb385277b832bff.yaml | 58 +++++++++++++++++++ ...loud-27fde2e6c4a806f7a102ac0a7cda9a14.yaml | 58 +++++++++++++++++++ ...loud-65f120a185fc7462303fec7b1afa9585.yaml | 58 +++++++++++++++++++ ...arch-b8b3a3fbd66ce4f7e79e6dafb76c83ed.yaml | 58 +++++++++++++++++++ ...-box-9ad733bd3bff15d00b8cf7407f8d01f4.yaml | 58 +++++++++++++++++++ ...poll-51e3e4afb8caf590d3f3c081b5b24b7d.yaml | 58 +++++++++++++++++++ ...poll-94d04ee1ef58708b41d6145bfcae5eba.yaml | 58 +++++++++++++++++++ ...poll-eb36c7e115c0d22d7762853e6f5759cf.yaml | 58 +++++++++++++++++++ ...erfy-1af02924d8ed846b859206c9bcd93941.yaml | 58 +++++++++++++++++++ ...erfy-b6b5ac51737dc25240c45d0d6e3809e0.yaml | 58 +++++++++++++++++++ ...imit-cc17c22adecd59067c0b764ef4c8f084.yaml | 58 +++++++++++++++++++ ...hing-894cd49c8916bb82c60619f3c2cf8165.yaml | 58 +++++++++++++++++++ ...l-ck-3a426a819fa4af21ed44f2fbb809eae0.yaml | 58 +++++++++++++++++++ ...ider-24a3397fbf299aff4ecd7a231ef53936.yaml | 58 +++++++++++++++++++ ...ider-630df0c98158fef2598199d5ff83a48f.yaml | 58 +++++++++++++++++++ ...rrot-d0bff2c3c4777b0c5230adf64beddf0b.yaml | 58 +++++++++++++++++++ ...ript-67c6ac36101695384c180d0d88713f05.yaml | 58 +++++++++++++++++++ ...lift-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...lift-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...lift-e8d0684b467b2dbd613cfc306a1e44bc.yaml | 58 +++++++++++++++++++ ...erce-691ef5f746f46ce4f71b48e893324dcb.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...erce-f86a366b83ee22a3c8a02c83ac209077.yaml | 58 +++++++++++++++++++ ...tion-b1456c2b0a44366db809a824b44e5c5b.yaml | 58 +++++++++++++++++++ ...lite-06ef746af3d0592e05a038c507873a93.yaml | 58 +++++++++++++++++++ ...lite-412eb3ff2c6b3450ae105bf1638dee64.yaml | 58 +++++++++++++++++++ ...lite-67c99f9c8f327331a1d82c5ff5d685e7.yaml | 58 +++++++++++++++++++ ...lite-70045bd7c712e66fb897584cd45830ed.yaml | 58 +++++++++++++++++++ ...lite-73c7b664803cc72f6ed74c19b2560471.yaml | 58 +++++++++++++++++++ ...lite-e1efc7cab467c2f5bb9e0770c86a7f44.yaml | 58 +++++++++++++++++++ ...lows-2031b341cdd31868784b73bf44a323dc.yaml | 58 +++++++++++++++++++ ...lows-2af5d7487ceb106d0bc29f7a8108e53c.yaml | 58 +++++++++++++++++++ ...lows-9051aa7c81fdec9135cd53a28b43a964.yaml | 58 +++++++++++++++++++ ...lows-c62d1469eaee8b9fee97540c3f237340.yaml | 58 +++++++++++++++++++ ...lows-ef918f495b11d984490181ededbf81f0.yaml | 58 +++++++++++++++++++ ...-pro-5f1b3c571aefdb13a941afd0f6a1e2f0.yaml | 58 +++++++++++++++++++ ...-pro-90187049563f57856c792eeb068a786a.yaml | 58 +++++++++++++++++++ ...-url-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tcha-7feee71659763988d044dea046c00a68.yaml | 58 +++++++++++++++++++ ...pops-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...guru-484f6782156958a3ab27ac5661456a24.yaml | 58 +++++++++++++++++++ ...omer-652b592a23d9d8ef3233d28a405d4909.yaml | 58 +++++++++++++++++++ ...hang-755b5e97b09ddabb36f708e4895b834c.yaml | 58 +++++++++++++++++++ ...blog-1319960b548fb4b068018632e6f16db7.yaml | 58 +++++++++++++++++++ ...blog-1e67f5ab14ff0db89bd5b743da99072c.yaml | 58 +++++++++++++++++++ ...blog-457555c66db611fbfa678adc71e787e6.yaml | 58 +++++++++++++++++++ ...alog-ba6ce63fd5cf470afef6a6aae7117079.yaml | 58 +++++++++++++++++++ ...rtal-0444dd694cfe16cd55e5d0cab9135b80.yaml | 58 +++++++++++++++++++ ...rtal-719aecac015dde0f14f4cf5400965308.yaml | 58 +++++++++++++++++++ ...rumb-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...rumb-4ba0680f325fbd064afe994053bfe704.yaml | 58 +++++++++++++++++++ ...cher-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...lery-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...-ids-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...port-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...roll-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...dget-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...-bar-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...menu-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...port-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...port-b60d38a6f27b4184d7cf8b134a701e36.yaml | 58 +++++++++++++++++++ ...port-ede5967c43f0c429d90aef07bf32832d.yaml | 58 +++++++++++++++++++ ...tion-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...ools-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...ools-c59a23b4a74b5a776a9442e033941d2d.yaml | 58 +++++++++++++++++++ ...desk-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...lery-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...erce-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...rify-2f5fc8a76419fe6bea249f884a02d85d.yaml | 58 +++++++++++++++++++ ...rify-5151b196e7969f448d1e0346e210bd82.yaml | 58 +++++++++++++++++++ ...rify-5f87f741e48b627a6080cd7b2aa94d46.yaml | 58 +++++++++++++++++++ ...rify-714c67b8b7c104cb121813dc61b2219b.yaml | 58 +++++++++++++++++++ ...rify-aca00b4de03dae498ba9e363cc7669df.yaml | 58 +++++++++++++++++++ ...rify-b283da624a496380d695ed4b3e4a8065.yaml | 58 +++++++++++++++++++ ...rify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rify-bf5e4013e055d945f3801300e58d2936.yaml | 58 +++++++++++++++++++ ...rify-c408e44047c03520c426eb804c18a88a.yaml | 58 +++++++++++++++++++ ...rify-dd16da990120154a69703f2e9dcba084.yaml | 58 +++++++++++++++++++ ...rify-f9749bdc11799874266b6a084bbe85ae.yaml | 58 +++++++++++++++++++ ...lery-f90056d9800bc9f38b8a269e9be583b2.yaml | 58 +++++++++++++++++++ ...page-a4aa366f217005e74322ff2bf7a0e182.yaml | 58 +++++++++++++++++++ ...cons-76db9edf1640ca25c16598ce97e68f02.yaml | 58 +++++++++++++++++++ ...dget-4f664c5f9a6ed3cf0ca52dbb21a8c73c.yaml | 58 +++++++++++++++++++ ...dget-86c2efd6cd386af606e7ebf660f34040.yaml | 58 +++++++++++++++++++ ...tags-37be0ad02414c3e78dc60922e377602e.yaml | 58 +++++++++++++++++++ ...tags-44b23b8882e9805e87909dc573565952.yaml | 58 +++++++++++++++++++ ...menu-0ff74c47b60a2c36a0f0a3f6185c5446.yaml | 58 +++++++++++++++++++ ...menu-299c560ce9cc99513d88a13d89852030.yaml | 58 +++++++++++++++++++ ...menu-4f38551b81bcc12b9f18d5f308341508.yaml | 58 +++++++++++++++++++ ...xton-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rter-6ab6a237cf19832f12a2229f950a0a08.yaml | 58 +++++++++++++++++++ ...ager-20bdedbec4b7794610e6cc496e884cca.yaml | 58 +++++++++++++++++++ ...emap-3af00e1da087fccdad50b389a0a1a76d.yaml | 58 +++++++++++++++++++ ...emap-4965c11c4afc77625d19c06034b78a11.yaml | 58 +++++++++++++++++++ ...tion-a3872c1aa8a56f8dfa0964ede1e7d0e0.yaml | 58 +++++++++++++++++++ ...mark-4eab0b03120e29e0608c25e79fc1f7b1.yaml | 58 +++++++++++++++++++ ...mark-7ba99274f1f38a4d9ad4fdbd6398ca72.yaml | 58 +++++++++++++++++++ ...mark-c8761ad8d517d60679bd97ecd8a6c050.yaml | 58 +++++++++++++++++++ ...mark-de7d8d5a0d1dee1ddf8eeecb2547d31f.yaml | 58 +++++++++++++++++++ ...ator-3049339e7a57ef7848a40fe1f1e47b95.yaml | 58 +++++++++++++++++++ ...ages-16f9ec159f7aada4bb87cabf3c4d9411.yaml | 58 +++++++++++++++++++ ...soon-61f33b76950c42b803451a29637fa07c.yaml | 58 +++++++++++++++++++ ...onmy-bc617b508aff51ac43ff170f5e7c19e9.yaml | 58 +++++++++++++++++++ ...vote-0c5cfe7358bda15b692d66201e48f291.yaml | 58 +++++++++++++++++++ ...-seo-0a5cc290bf065b9d61dd8d6424548f9c.yaml | 58 +++++++++++++++++++ ...-seo-5acab9ad0ccb5e44fc932f6fa0ba244a.yaml | 58 +++++++++++++++++++ ...-seo-7a3d9d99e440e4df9bd78305e509f883.yaml | 58 +++++++++++++++++++ ...-seo-901981c5d4aab63f7790ceb08b75d467.yaml | 58 +++++++++++++++++++ ...-seo-ad7b2ab497c839e3400fd7b625d4fc3c.yaml | 58 +++++++++++++++++++ ...ngua-26a1c70f5188aa0c3366f60965527dcc.yaml | 58 +++++++++++++++++++ ...ugin-51cc9e8778ef47abd167df4053287906.yaml | 58 +++++++++++++++++++ ...ugin-682168a7f6b8d8c54e16ca072c08d0b8.yaml | 58 +++++++++++++++++++ ...ugin-9cb312dcf3076a957034e2392391c1c1.yaml | 58 +++++++++++++++++++ ...ugin-dc2ceae7a9d01dd85dd05b54d27673ad.yaml | 58 +++++++++++++++++++ ...aign-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...spam-e8894e8512ac5d54a44ce89e1645ca1f.yaml | 58 +++++++++++++++++++ ...elds-5f06348f7bb36613ac049dfd554c46bc.yaml | 58 +++++++++++++++++++ ...elds-c2bf3837de0efe09eb976b0292e9ae9c.yaml | 58 +++++++++++++++++++ ...tact-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...tact-d8e7f6cb9c19a44c84604c82e55187be.yaml | 58 +++++++++++++++++++ ...ping-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...izer-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...base-406a8beae5e2073e89eddace606a906a.yaml | 58 +++++++++++++++++++ ...tcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-779ca838360ffafbdcec116be7a4214b.yaml | 58 +++++++++++++++++++ ...load-d3779debb6d6eb8ad0d25988128d76ec.yaml | 58 +++++++++++++++++++ ...-map-2da90a041f7dbd6259f3200e335d184b.yaml | 58 +++++++++++++++++++ ...ctor-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml | 58 +++++++++++++++++++ ...ctor-3ba45c08f1c81a3b4f346669dc635f8c.yaml | 58 +++++++++++++++++++ ...-pro-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...spot-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...spot-78d1a3ea4011830cf6a4045c4e76d9c4.yaml | 58 +++++++++++++++++++ ...soft-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...htly-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...tcha-4e7be8550ac4c225de3b247432067648.yaml | 58 +++++++++++++++++++ ...tcha-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml | 58 +++++++++++++++++++ ...view-a6d4da7080e5e33e606a2bdd628cb1b5.yaml | 58 +++++++++++++++++++ ...himp-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...page-1adae250456b8ff3c36bf7b47cd9ad26.yaml | 58 +++++++++++++++++++ ...orce-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...orce-f6809789bc3db192511a7eb7008b1a2b.yaml | 58 +++++++++++++++++++ ...lite-457136e7a482f19e1fb7eda420cd0512.yaml | 58 +++++++++++++++++++ ...yler-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-0a3c0452d5847fbc8bf97c2978948097.yaml | 58 +++++++++++++++++++ ...ntor-f7129e84ad88621ffd1e743ea53941ad.yaml | 58 +++++++++++++++++++ ...desk-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...zoho-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...zoho-1e95da79eb44567d35aa35ba90fa7af9.yaml | 58 +++++++++++++++++++ ...zoho-22168446272a333f9aeaf32a63eb65ac.yaml | 58 +++++++++++++++++++ ...zoho-2fe05eeb0f074422838b91d061a270ed.yaml | 58 +++++++++++++++++++ ...orms-8e029958bdc3ff72cf62f3277afe0ddc.yaml | 58 +++++++++++++++++++ ...orms-ad9f5965c16c8246b424703d21435589.yaml | 58 +++++++++++++++++++ ...rms2-0a7e50f278580c630584ee885abf7fbb.yaml | 58 +++++++++++++++++++ ...rms2-435be2da19b4391be47c1eff3c320bfa.yaml | 58 +++++++++++++++++++ ...rms2-6e2fc253c488c9fb6b9867ac9b52ef35.yaml | 58 +++++++++++++++++++ ...rms2-746dbfeca03bdbf3d2fc4d83e4a0ed40.yaml | 58 +++++++++++++++++++ ...rms2-84b6699e5f738c5aa2a22a553abe9531.yaml | 58 +++++++++++++++++++ ...rms2-8564fd78eda1e5e95c5755fd00c36fad.yaml | 58 +++++++++++++++++++ ...rms2-9a7daf03bb65349e79adecac5d21db12.yaml | 58 +++++++++++++++++++ ...rms2-b4c6a4aeabe2851a3af8facd90e9e06e.yaml | 58 +++++++++++++++++++ ...rms2-c746c9817b7b9a6f45f694a27b37baa9.yaml | 58 +++++++++++++++++++ ...rms2-f8d3e5b9686014f5cd0d4b3b339a644d.yaml | 58 +++++++++++++++++++ ...rms2-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml | 58 +++++++++++++++++++ ...mode-16302374c3729c860ad18fd6cf163b27.yaml | 58 +++++++++++++++++++ ...mode-ba2f4df1d4ab7f80e3d41245c7258128.yaml | 58 +++++++++++++++++++ ...quiz-160920c3b93078e89551079e7b5eaf71.yaml | 58 +++++++++++++++++++ ...quiz-18bb670f149f3ce453ab41abb0ba94e6.yaml | 58 +++++++++++++++++++ ...quiz-1a479aba51042862bdb0c5caaca911dd.yaml | 58 +++++++++++++++++++ ...quiz-2d3408ffedaf3db88a6330ec42f826f9.yaml | 58 +++++++++++++++++++ ...quiz-3202568d0ef30adfbc4903b533249872.yaml | 58 +++++++++++++++++++ ...quiz-328d39d28a95cf7b4841489a8ffe5709.yaml | 58 +++++++++++++++++++ ...quiz-36a32b4cb0e29bcda79b2aacf4de5bad.yaml | 58 +++++++++++++++++++ ...quiz-465e906926b7ad2f7695941c2d2f3545.yaml | 58 +++++++++++++++++++ ...quiz-4932bcd4df2882e039a7b09a90097299.yaml | 58 +++++++++++++++++++ ...quiz-4a26e6944326e51fbc6f1bb093dd580e.yaml | 58 +++++++++++++++++++ ...quiz-4acb85f5976a533776dda534630f7468.yaml | 58 +++++++++++++++++++ ...quiz-53813c475afa70818392401295ac8091.yaml | 58 +++++++++++++++++++ ...quiz-5ad18bbfeb4c12a137de8b17b7553a5c.yaml | 58 +++++++++++++++++++ ...quiz-65db5904362ad316155a2ed2c78eb032.yaml | 58 +++++++++++++++++++ ...quiz-7943d082ee4cf7c0ecdfc0080489be58.yaml | 58 +++++++++++++++++++ ...quiz-95b04656752bb123878499817b8956fb.yaml | 58 +++++++++++++++++++ ...quiz-b648d871623ad477887d3a2ad417ce75.yaml | 58 +++++++++++++++++++ ...quiz-bb66f4ac76af234c75b6841b7c13994a.yaml | 58 +++++++++++++++++++ ...quiz-c2f2835d90a3f3c6d22ed640d7b5a35a.yaml | 58 +++++++++++++++++++ ...quiz-d0976f5c2f9eb3654eb8c7ee13a935fb.yaml | 58 +++++++++++++++++++ ...tory-285685ddf3c4cea5af33e325a30ef210.yaml | 58 +++++++++++++++++++ ...leon-6c023e252025477e682e7148561b6604.yaml | 58 +++++++++++++++++++ ...-css-6e87e05f951d4532dd6f6de3b88ad77d.yaml | 58 +++++++++++++++++++ ...itle-85ca7cedd2597831c97a27e7d00fa427.yaml | 58 +++++++++++++++++++ ...logo-dc6848daf0e6078b7f345f206891b945.yaml | 58 +++++++++++++++++++ ...imit-37d8f4614be006df7ea5c5c8ccf22b6a.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...efix-ca722f2c2467f4f9c95321209d16faa6.yaml | 58 +++++++++++++++++++ ...ions-b3c283ecfc25af9f10f9c937f229f24c.yaml | 58 +++++++++++++++++++ ...itle-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...text-a483253d605901e000058299d42af1c9.yaml | 58 +++++++++++++++++++ ...ogin-4490549b2215d97aa7dcad6a865e6752.yaml | 58 +++++++++++++++++++ ...ogin-5385baa6493f36fd557c3aebaffd13c8.yaml | 58 +++++++++++++++++++ ...able-2242cb39ce05f115de2cf4c2d7f707ea.yaml | 58 +++++++++++++++++++ ...able-3ebd40bb61580d15dfcd12d2fb7e83aa.yaml | 58 +++++++++++++++++++ ...able-6af09e3fae008ebc46d2a7e390514583.yaml | 58 +++++++++++++++++++ ...able-6feaa562e8c22b0716b934987c7ecb18.yaml | 58 +++++++++++++++++++ ...able-8a3943e3e4b63a520dbb0168b24f856a.yaml | 58 +++++++++++++++++++ ...able-f4e452921028a365c12034905b529473.yaml | 58 +++++++++++++++++++ ...lder-08b024925f5d1dcafa4385a333501904.yaml | 58 +++++++++++++++++++ ...lder-9c920cf674baacb0579f3b1f4946e20e.yaml | 58 +++++++++++++++++++ ...-bee-66589665af0b647ad01185928e32cee5.yaml | 58 +++++++++++++++++++ ...bble-036e41317f960475dab82c492d364c11.yaml | 58 +++++++++++++++++++ ...bble-9273f5ba0fae5fff2a4a50e2ed96c406.yaml | 58 +++++++++++++++++++ ...bble-f0274c328c4fa319248646b0f1fefd1a.yaml | 58 +++++++++++++++++++ ...help-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...tbot-196434d911f0f2030523284b9ab4ed7d.yaml | 58 +++++++++++++++++++ ...tbot-2b374eb61066305fce645375b473ec81.yaml | 58 +++++++++++++++++++ ...tbot-43f628ea46bf1b19a83b42111a34194e.yaml | 58 +++++++++++++++++++ ...tbot-45a7d47baac99a733e5ee7898a52f7c4.yaml | 58 +++++++++++++++++++ ...tbot-4b541be8b8519e80f2cec24d1b2f8ef6.yaml | 58 +++++++++++++++++++ ...tbot-584e49f9f9bb47c562f3e0a8463d6240.yaml | 58 +++++++++++++++++++ ...tbot-5d770457008ba85c2ccd6a7b3ee7247f.yaml | 58 +++++++++++++++++++ ...tbot-5eba30f00f0fc37dca7e730267948bfb.yaml | 58 +++++++++++++++++++ ...tbot-5ef5a5a8c6cb4692922673fc79eb4970.yaml | 58 +++++++++++++++++++ ...tbot-67e61488b97755fd204f3e38d91bbcf2.yaml | 58 +++++++++++++++++++ ...tbot-711d5e4371b5307e83aafa75e094a16d.yaml | 58 +++++++++++++++++++ ...tbot-8142bc3541567011d52df62ad2e24883.yaml | 58 +++++++++++++++++++ ...tbot-94f813d00f5c832ee527c5c3251318bb.yaml | 58 +++++++++++++++++++ ...tbot-96bcbe0539bed3ce58849487848c2a2e.yaml | 58 +++++++++++++++++++ ...tbot-9f74a97e65247db4961da7465a48826a.yaml | 58 +++++++++++++++++++ ...tbot-a8d129ffa611a0e2860f9a0cb3ae87ba.yaml | 58 +++++++++++++++++++ ...tbot-b0f34e3010de519cd369f7b9dbab99cd.yaml | 58 +++++++++++++++++++ ...tbot-c8b00e3a8ae7ee111daecc90a5a50970.yaml | 58 +++++++++++++++++++ ...tgpt-916951fd750c41452dbc03c332006408.yaml | 58 +++++++++++++++++++ ...tbot-d3213062fc9b1a2c7b785c61361d34fc.yaml | 58 +++++++++++++++++++ ...tbot-dacff2143dd0506c8bdad1a273f67459.yaml | 58 +++++++++++++++++++ ...tbot-e91e697ef1f971cda16c40acfd5a2dfb.yaml | 58 +++++++++++++++++++ ...tbot-f715c92150b63b8634910eb743badf7e.yaml | 58 +++++++++++++++++++ ...tbot-fb85a7124dad283264113a73b1162be4.yaml | 58 +++++++++++++++++++ ...haty-07056c447bdab5ad6a1bdd36170bd91a.yaml | 58 +++++++++++++++++++ ...haty-1afdb113a8eb638275401757c0567e46.yaml | 58 +++++++++++++++++++ ...haty-54240ff4b4cecbac0ff14d99813212f2.yaml | 58 +++++++++++++++++++ ...haty-63f126067f4ae4bb5668663357185275.yaml | 58 +++++++++++++++++++ ...haty-6fb60bc9485708489fdd72c16e1fb82c.yaml | 58 +++++++++++++++++++ ...haty-6ffb854c265938eec5a761ac2ea74cda.yaml | 58 +++++++++++++++++++ ...haty-a21592f489772d448729c01eea1a3d4d.yaml | 58 +++++++++++++++++++ ...haty-d2f186fae58d1b5afd77fc5306fc26bf.yaml | 58 +++++++++++++++++++ ...stem-b40844c1e763e67ca14e58da5d8219ab.yaml | 58 +++++++++++++++++++ ...mail-212007d229cb11caf3b5098b0d076057.yaml | 58 +++++++++++++++++++ ...mail-57441a6bd13b11b69e9f1629f83e2faa.yaml | 58 +++++++++++++++++++ ...mail-88a3c1a86120c49f8c7acdd40fc0ba9b.yaml | 58 +++++++++++++++++++ ...mail-a582597ac626e8033a80d456beb664e8.yaml | 58 +++++++++++++++++++ ...mail-d739207b5203bbaf9071af23095dbb99.yaml | 58 +++++++++++++++++++ ...king-a9bc73625028a7b9d27c51cb883237c9.yaml | 58 +++++++++++++++++++ ...list-d4f973711f83e484b1ab150d8a07fcda.yaml | 58 +++++++++++++++++++ ...erce-d46c47231d5f7c1d21cefa0fd0efa427.yaml | 58 +++++++++++++++++++ ...erce-d9b04ea1292b41be830780f6e6d01550.yaml | 58 +++++++++++++++++++ ...ypal-8648ead24f8ede303ab8621f146c3147.yaml | 58 +++++++++++++++++++ ...s-wp-1e6a2a2317e6c0646d9912b475c2283c.yaml | 58 +++++++++++++++++++ ...s-wp-d54d63e5f680e91069c2712ba5d24580.yaml | 58 +++++++++++++++++++ ...s-wp-e80edd6c2880294918a0f04214b9aef1.yaml | 58 +++++++++++++++++++ ...-woo-15e030858694c0a02fa97544922bfe88.yaml | 58 +++++++++++++++++++ ...ugin-028198ae17f77e0fafdf84b4c3a51484.yaml | 58 +++++++++++++++++++ ...ator-e12bf2fb09ed5e271c0d21b336dc261a.yaml | 58 +++++++++++++++++++ ...ator-ed864fc86a7fe870d57e87a3dcd3af49.yaml | 58 +++++++++++++++++++ ...cial-29ab94320ed945dea921e0756254429b.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ider-b9df60ed6459d260336415d2d308e184.yaml | 58 +++++++++++++++++++ ...ctor-8ecff4070b265868b558d6084036a925.yaml | 58 +++++++++++++++++++ ...ctor-98c26ef05457073952420479d08234d0.yaml | 58 +++++++++++++++++++ ...ctor-a6450bbcf1d391d632396e4291c55731.yaml | 58 +++++++++++++++++++ ...ings-d9f5e61a49fbbfbd69a5c0f7460c4648.yaml | 58 +++++++++++++++++++ ...orms-0f50287e721edfee647a952371440e59.yaml | 58 +++++++++++++++++++ ...ndar-32fc78061d3eb7ab5ce33b0356499170.yaml | 58 +++++++++++++++++++ ...dmin-211d17907ac598fe9fa7fe583c9712b5.yaml | 58 +++++++++++++++++++ ...dmin-2552c36873674cea120ccc38e69f7427.yaml | 58 +++++++++++++++++++ ...dmin-5730fd190ef48d8c13b621a11b022d51.yaml | 58 +++++++++++++++++++ ...dmin-5b5631c6755ba3e58cfcfbe9ec90f71c.yaml | 58 +++++++++++++++++++ ...dmin-5e04848eef304ee1fb47854040c71b18.yaml | 58 +++++++++++++++++++ ...dmin-62fad85c6fa5b7fb3d8634d94c62f43f.yaml | 58 +++++++++++++++++++ ...dmin-85e68d609db8f93e17b14e0a7511b5c8.yaml | 58 +++++++++++++++++++ ...dmin-8c1d8b54955c02df9ba77ea482839214.yaml | 58 +++++++++++++++++++ ...dmin-be26aafc9c00248210b5b5ec8b8d8831.yaml | 58 +++++++++++++++++++ ...dmin-c1356627585be8298fc5154daa83bb1f.yaml | 58 +++++++++++++++++++ ...dmin-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml | 58 +++++++++++++++++++ ...dmin-d0a63c61f1af91f397e1af950dda23c4.yaml | 58 +++++++++++++++++++ ...dmin-dada2db55c799a5508c295a160b1fcaf.yaml | 58 +++++++++++++++++++ ...dmin-dd67ce4e359afe3a28fa3105db87a235.yaml | 58 +++++++++++++++++++ ...ment-a6893186307907fca26272a54fd950bf.yaml | 58 +++++++++++++++++++ ...tent-3e8d1d694647ed5b6d6bc051900f98be.yaml | 58 +++++++++++++++++++ ...ator-b77d972bfa12e86d544c2057da2d9c61.yaml | 58 +++++++++++++++++++ ...ager-6b907b5178535d26ea12591112bdce4d.yaml | 58 +++++++++++++++++++ ...dget-f5f3c9e8239bc353d0388304ee46c783.yaml | 58 +++++++++++++++++++ ...tbox-42e55306470e6d1ac0240deaf313219c.yaml | 58 +++++++++++++++++++ ...tbox-93dba1cadeafcd73215feec69fcf5f63.yaml | 58 +++++++++++++++++++ ...tbox-ef03a122b111711054e748e01eb53a23.yaml | 58 +++++++++++++++++++ ...lery-ae8255f2994549b36706bb9a56ad3c0f.yaml | 58 +++++++++++++++++++ ...tory-cbb621b3a6e8313b4fce0a47ef22d371.yaml | 58 +++++++++++++++++++ ...tory-da4e2303d14d4ccfc14a24b1a1b01b04.yaml | 58 +++++++++++++++++++ ...pace-d8f2805c892cce30b8ee704118111dfd.yaml | 58 +++++++++++++++++++ ...load-4e81e30f96ac2459f5d1b33071468659.yaml | 58 +++++++++++++++++++ ...icrm-7c25c077af82ab884cd08d532650e9f1.yaml | 58 +++++++++++++++++++ ...ress-e7b1c96e657c95612bee61206db60673.yaml | 58 +++++++++++++++++++ ...tton-f34bb308bdc8bf0abc4007f19af318c1.yaml | 58 +++++++++++++++++++ ...ddon-cbd9c033d999d7b582bab8aeab6cd501.yaml | 58 +++++++++++++++++++ ...gets-0d765d8e5ca0f1a3232d36cbff05684c.yaml | 58 +++++++++++++++++++ ...core-94f85d394521a13053659cf48cf14634.yaml | 58 +++++++++++++++++++ ...ting-095d7ac917f72e37e9bb35fbb61b06e5.yaml | 58 +++++++++++++++++++ ...ting-4133059c81c533e7538f4a29d7f3ad01.yaml | 58 +++++++++++++++++++ ...ting-94f85d394521a13053659cf48cf14634.yaml | 58 +++++++++++++++++++ ...ting-e39757704ab66d7ab58f6ee33ac96e65.yaml | 58 +++++++++++++++++++ ...ting-f4bbfecaa3b9697ac9c466359f202f2b.yaml | 58 +++++++++++++++++++ ...-pro-3bf83b01db180da0cd7fc6578f1451d0.yaml | 58 +++++++++++++++++++ ...-pro-94f85d394521a13053659cf48cf14634.yaml | 58 +++++++++++++++++++ ...tore-94f85d394521a13053659cf48cf14634.yaml | 58 +++++++++++++++++++ ...ieds-f47e6eae64c804173012f23d96ac47f1.yaml | 58 +++++++++++++++++++ ...olas-9b88069f10fdb904873358d79983304f.yaml | 58 +++++++++++++++++++ ...olas-f5690c4ae22224ef33491e3a8f293f4d.yaml | 58 +++++++++++++++++++ ...tact-800e55dd995f58ca489269cf15bde8aa.yaml | 58 +++++++++++++++++++ ...ogin-1603de092dffce494eb91c592d08f004.yaml | 58 +++++++++++++++++++ ...ogin-5ac185ae82fe98b391f7b0249d150337.yaml | 58 +++++++++++++++++++ ...ogin-ac790c964325ea0370bae2df48218a78.yaml | 58 +++++++++++++++++++ ...ogin-b85e6f076cf78bc83dad21e66d70a2d9.yaml | 58 +++++++++++++++++++ ...cons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tect-212daaad6857839ca091cc2dcc90e7c8.yaml | 58 +++++++++++++++++++ ...tect-4459115a144ee37cdfb4079325938d4b.yaml | 58 +++++++++++++++++++ ...tect-6ffa9b277924d8aa648b0bee9bf4b06d.yaml | 58 +++++++++++++++++++ ...tect-a8def04824c95aa61e5602395bc3c9b4.yaml | 58 +++++++++++++++++++ ...tect-ab9f6d0139ba1f196a65f817d6af329b.yaml | 58 +++++++++++++++++++ ...tect-bf15f8f75324665dbab0a976954762a4.yaml | 58 +++++++++++++++++++ ...tect-cde99dbef0431b3a59324e5afac3b480.yaml | 58 +++++++++++++++++++ ...tect-d289b479a5c784ed3d240622792b7f9a.yaml | 58 +++++++++++++++++++ ...tect-de9d4da93fc4bb5251225efa35d16a3e.yaml | 58 +++++++++++++++++++ ...tect-efa9a2b8677e473b07061cec22c03e03.yaml | 58 +++++++++++++++++++ ...arfy-0f9dc26252e942e8e9d25b0caef515cf.yaml | 58 +++++++++++++++++++ ...erce-b4be168069ffc18f5624f70fb3431825.yaml | 58 +++++++++++++++++++ ...rkio-c0684cce94d057969c2bd8df09557f34.yaml | 58 +++++++++++++++++++ ...otes-38c76ee17f970b2f9f7455a9aafdaf8f.yaml | 58 +++++++++++++++++++ ...lopd-72faeb48932ddf0ca0fa007188dbfbf8.yaml | 58 +++++++++++++++++++ ...tons-7abc665e21c65fbf0435b861d32be85d.yaml | 58 +++++++++++++++++++ ...sapp-902cce6bbff4fff8307b6fb241b9a8f3.yaml | 58 +++++++++++++++++++ ...sapp-a875d85b1acd34789210b1b8be6e7c70.yaml | 58 +++++++++++++++++++ ...-top-07e8e438f9983a0ea397db3cccfb2a0b.yaml | 58 +++++++++++++++++++ ...-top-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...-top-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...weet-83ab7ae2d1f6873a9d18c0bfa8619354.yaml | 58 +++++++++++++++++++ ...weet-935ebeacc0c73d89223e844fd2aaeaeb.yaml | 58 +++++++++++++++++++ ...weet-b512f326cf614df599ebd00014aea201.yaml | 58 +++++++++++++++++++ ...dget-55592f88afc85caec6c62b369547bd3e.yaml | 58 +++++++++++++++++++ ...dget-b1bcff9d2efb787a948b3f8018f345ae.yaml | 58 +++++++++++++++++++ ...tion-002091a126b1a7dfb25af78b55c0c684.yaml | 58 +++++++++++++++++++ ...tion-006e48b094cc72cebf7417cf47b157bd.yaml | 58 +++++++++++++++++++ ...ugin-41d06e1c542cc99b348ba7db58f2c892.yaml | 58 +++++++++++++++++++ ...ugin-45e600351b047339fd78ec95bb2976bd.yaml | 58 +++++++++++++++++++ ...volt-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nels-6402d67cbcfcbc43cbb160f004d8a96c.yaml | 58 +++++++++++++++++++ ...nels-b375402f4d94456be8a455efbe0b59a8.yaml | 58 +++++++++++++++++++ ...ugin-52312cb9d61651d5626cb5f7632011c0.yaml | 58 +++++++++++++++++++ ...icky-8edea37489d7d07897482f68884c7200.yaml | 58 +++++++++++++++++++ ...cker-da7f33487455bd9ca64c5f5b0b3257c0.yaml | 58 +++++++++++++++++++ ...dash-0f5e9e59b2ad6fbf734b7cc14c76890d.yaml | 58 +++++++++++++++++++ ...dash-1ed96ac73f1ecde8fe792ec7cdde085c.yaml | 58 +++++++++++++++++++ ...dash-c20c39f747c7f70cb8ab495d6417a431.yaml | 58 +++++++++++++++++++ ...rtal-67cb2c3e35f22a85706bb01a35436ed6.yaml | 58 +++++++++++++++++++ ...rtal-73ba9c23c0821b68df8f36806d87a69d.yaml | 58 +++++++++++++++++++ ...ogin-0b15ae4e67ed167e4179722b43d42dc7.yaml | 58 +++++++++++++++++++ ...core-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...form-cc0d4514b7c79b3cb4d1496328155c24.yaml | 58 +++++++++++++++++++ ...lipr-e96b7ac8a29e8b231c1f7265734f9442.yaml | 58 +++++++++++++++++++ ...rmer-675c723533131f486896f65ba6a33288.yaml | 58 +++++++++++++++++++ ...mail-8f88ca251b34c3f9441215db0d0eb986.yaml | 58 +++++++++++++++++++ ...rtal-0541b61acd6f59d8dbe0825e7d0780e4.yaml | 58 +++++++++++++++++++ ...rtal-300b9d97cc08f164b31a4377dbab9d4c.yaml | 58 +++++++++++++++++++ ...rtal-5b61cdb6d6ba8def275e2059b874af65.yaml | 58 +++++++++++++++++++ ...rtal-7e6ed21add5029121985af000727b133.yaml | 58 +++++++++++++++++++ ...rtal-ad4c52a60f74c08cbf0949e67b843c74.yaml | 58 +++++++++++++++++++ ...rtal-df02e428fa69a24d16a3d7cce97f1bcc.yaml | 58 +++++++++++++++++++ ...tion-167d9672411be44feb72a5175fd0987c.yaml | 58 +++++++++++++++++++ ...menu-bb2e17c35167609647005349850505d1.yaml | 58 +++++++++++++++++++ ...core-0e249eccad21574e2f41d6b727c12756.yaml | 58 +++++++++++++++++++ ...ager-9f8e06f58bb3d62fb41a0d24a3483a49.yaml | 58 +++++++++++++++++++ ...lare-54a71a6006d636e1097ee6d46e6ecfe6.yaml | 58 +++++++++++++++++++ ...lare-82dd6e10056d4e2acdde095ee3c87000.yaml | 58 +++++++++++++++++++ ...sync-31b36ec0444d32e3c3a9acc4186c5727.yaml | 58 +++++++++++++++++++ ...ders-0f96dcc46121deff356e0d1a5d840b39.yaml | 58 +++++++++++++++++++ ...ders-3211ecfd0817984e803716532365c05f.yaml | 58 +++++++++++++++++++ ...ders-e55440d3ef9cff783b9861081230c8c6.yaml | 58 +++++++++++++++++++ ...ware-3e4694078ceef16f755ef9eb324edfcb.yaml | 58 +++++++++++++++++++ ...-lms-9424f0d1add83019568a32a2d432a588.yaml | 58 +++++++++++++++++++ ...-lms-f070e8d35eccf1703741e9fc7f61600d.yaml | 58 +++++++++++++++++++ ...nger-1c07181abecff4187bed7fdcd8d1afe4.yaml | 58 +++++++++++++++++++ ...nger-5c3ee68d8799e2236b3bc1333dfd2f35.yaml | 58 +++++++++++++++++++ ...wers-2ace3607ba6999f91533535a3a2816d7.yaml | 58 +++++++++++++++++++ ...ager-0892bb5b73a2988ec7694336ad4f4900.yaml | 58 +++++++++++++++++++ ...ager-16f2bcb5cfa3d079c1a300d23d7f7166.yaml | 58 +++++++++++++++++++ ...ager-4ad8dd096306cdfdd3b295e2def3a2c7.yaml | 58 +++++++++++++++++++ ...ager-5fc74cc66f5330c5bc45fdae1ec9ced1.yaml | 58 +++++++++++++++++++ ...ager-60df52935f4401dddac85a54784a5e69.yaml | 58 +++++++++++++++++++ ...ager-846117b538ab9ba30f69a12efe0f9e57.yaml | 58 +++++++++++++++++++ ...ager-aa2a9b71c269086e8f022720378d80bb.yaml | 58 +++++++++++++++++++ ...ager-bd35c16b70884879b92d89ef15ca63e5.yaml | 58 +++++++++++++++++++ ...ager-ecc77de29f842207c628b7046d3e4a17.yaml | 58 +++++++++++++++++++ ...lace-420882c95451d067f82426e7b79441c3.yaml | 58 +++++++++++++++++++ ...lace-514273203d780a9cda87e275d81e2d5f.yaml | 58 +++++++++++++++++++ ...ners-9a8cd1490d53fe02691b7245088ba1a4.yaml | 58 +++++++++++++++++++ ...ners-ad88df41b076143465006e1296e02fd7.yaml | 58 +++++++++++++++++++ ...-pro-53024ed5f0e18aa66d4ebe04f4f0eace.yaml | 58 +++++++++++++++++++ ...ager-d10884d848b4b49b542895ed8b750487.yaml | 58 +++++++++++++++++++ ...-pro-d10884d848b4b49b542895ed8b750487.yaml | 58 +++++++++++++++++++ ...cmb2-8c74a48bb6b992ea1d77056b8703ebf9.yaml | 58 +++++++++++++++++++ ...ance-166fef08e9b74456a644f0a9d21fb872.yaml | 58 +++++++++++++++++++ ...ance-4532b4dbcf2e547347daa5207db523f5.yaml | 58 +++++++++++++++++++ ...ance-8ec76f6766e0fda899f0bc8eebfb4339.yaml | 58 +++++++++++++++++++ ...ance-8ee98246eb8d1e952fa8185b436e76db.yaml | 58 +++++++++++++++++++ ...ance-a905768098fb049d17090a5880f96add.yaml | 58 +++++++++++++++++++ ...ient-1aebd68acb64b20280f49bb62f1d7be6.yaml | 58 +++++++++++++++++++ ...ient-5e8b0e22556acc1ddd3b390056ee15b3.yaml | 58 +++++++++++++++++++ ...ress-a3fcccf439bdac9208ecc47d006e929e.yaml | 58 +++++++++++++++++++ ...view-664f9708c952ef16850b76782a119235.yaml | 58 +++++++++++++++++++ ...view-72fe0a438fb0e3368285665d2037073e.yaml | 58 +++++++++++++++++++ ...view-ad3b6e67373c173a68de7fe25df960c3.yaml | 58 +++++++++++++++++++ ...ress-549edad2ce245fbc28f77db9aee80ff6.yaml | 58 +++++++++++++++++++ ...plus-5fd18b55135c9269021a77a72c48b74a.yaml | 58 +++++++++++++++++++ ...blic-a60a30a5dd8e8a555825a7d98c57da43.yaml | 58 +++++++++++++++++++ ...blic-baef1d0e01440a39ac30bd5826a2469a.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-c148c7298cbf640c64f29d57d3ad5df1.yaml | 58 +++++++++++++++++++ ...erce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ocks-4086933ae9a93ef9f0adb45c61ef5080.yaml | 58 +++++++++++++++++++ ...ocks-fdd365ece4b9b292b937aee693d1c5a6.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...pets-2a2cec7651f5442eb2c1435c40fb232d.yaml | 58 +++++++++++++++++++ ...pets-39bc2edd346e28405d70531e51a8164a.yaml | 58 +++++++++++++++++++ ...pets-495cf5fc28b98b14d2a1a7c5bb6e683a.yaml | 58 +++++++++++++++++++ ...pets-aa298dcdd541921aa6e5a62400773be6.yaml | 58 +++++++++++++++++++ ...pets-aceeb583ba4064a9ac66804525abc9eb.yaml | 58 +++++++++++++++++++ ...nded-429616022004f10edfb6da5df655ced8.yaml | 58 +++++++++++++++++++ ...nded-989eb9c3cbf3a8a65b24266fa6fa3458.yaml | 58 +++++++++++++++++++ ...nded-e82db8a28efe18641f3e717f9b09b84e.yaml | 58 +++++++++++++++++++ ...orer-6a2386cdcd3910d335805b9ddf952385.yaml | 58 +++++++++++++++++++ ...lite-d5eb243a63ca847d2586e41fb57f6f14.yaml | 58 +++++++++++++++++++ ...gets-4f0e3223d5ea7b01c767c6e564ea2ada.yaml | 58 +++++++++++++++++++ ...gets-5a9c4861ed09ce785a6f69836ddbac67.yaml | 58 +++++++++++++++++++ ...-map-1123677072a0d47589707f79eb0e7e54.yaml | 58 +++++++++++++++++++ ...-map-d5c941a5e08fc52cf3fcc7e08e2232da.yaml | 58 +++++++++++++++++++ ...umns-1b44920a5aedb519e7cd543d04a01fe4.yaml | 58 +++++++++++++++++++ ...umns-2cf825b0502a2430e12833bc820c6234.yaml | 58 +++++++++++++++++++ ...umns-9a1ea12529e15f0a017ce8f0e47401f6.yaml | 58 +++++++++++++++++++ ...tion-4f6e39e80416a527c850a1165c7ace82.yaml | 58 +++++++++++++++++++ ...tion-ddc63b74125a60840010b54470ac437e.yaml | 58 +++++++++++++++++++ ...itor-3030bade61470958bdc416b0e2c89b83.yaml | 58 +++++++++++++++++++ ...dmin-e0006b9b22f8ac4f0ab20b6b14560c09.yaml | 58 +++++++++++++++++++ ...view-9a51dd537aff6d05f9d6a7c50a359270.yaml | 58 +++++++++++++++++++ ...ales-0a55644b51a5df02f2cc7d960c48224c.yaml | 58 +++++++++++++++++++ ...lder-01e0b89afcfee7ee0b87257825f06c59.yaml | 58 +++++++++++++++++++ ...lder-06110f65fe21eb76cccfd39d7f91d25b.yaml | 58 +++++++++++++++++++ ...lder-21f9461e5270818af4357d314ab90f57.yaml | 58 +++++++++++++++++++ ...lder-29c3e0ef4de33c7a54c9e5adeed782a1.yaml | 58 +++++++++++++++++++ ...lder-3bb3b1b877c8539475d5edd92db3636e.yaml | 58 +++++++++++++++++++ ...lder-411de6e419140a33390e4cf84e25eb26.yaml | 58 +++++++++++++++++++ ...lder-461ccdb0bda3c12c709b07472ce088e7.yaml | 58 +++++++++++++++++++ ...lder-72c77f134254f33afbd956d2661ee799.yaml | 58 +++++++++++++++++++ ...lder-7af76cb753c181fa25d318d1a52543d2.yaml | 58 +++++++++++++++++++ ...lder-aaee16898f3cb4f4d7a9fcaef31839c3.yaml | 58 +++++++++++++++++++ ...lder-f731e8529b33108bde99e03616dec459.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-ac850d5730363d3bbd84ae6609135f15.yaml | 58 +++++++++++++++++++ ...chat-a85aa1b9a47ecb9d1b901a00495b06ae.yaml | 58 +++++++++++++++++++ ...chat-fdf2ccd0e27bd38fe570f70f1b82c105.yaml | 58 +++++++++++++++++++ ...port-c719c1fa9d94cb4a4d6e24f4ded47412.yaml | 58 +++++++++++++++++++ ...ries-ce863d77586ccc4b8e169d7ca2f897a8.yaml | 58 +++++++++++++++++++ ...ance-699697d906ce98da7e0a75001998e24b.yaml | 58 +++++++++++++++++++ ...ance-a149337d8133aa025f4ace42f65c06da.yaml | 58 +++++++++++++++++++ ...atic-468f187fbaef8b522a9247e1a677ec05.yaml | 58 +++++++++++++++++++ ...asel-919a5f84339755a5d7406eb8d1eb9388.yaml | 58 +++++++++++++++++++ ...icks-d103dcd12252c06ef076f4cb74df842f.yaml | 58 +++++++++++++++++++ ...soon-a811d729e46b4e2f338038f266981191.yaml | 58 +++++++++++++++++++ ...stic-40172980791539d9cbc1458226ed5fdf.yaml | 58 +++++++++++++++++++ ...stic-c5f1b8086e41aba21eb0fa4dcda314d9.yaml | 58 +++++++++++++++++++ ...soon-c76087a23749b6d57d9ddfc097bcae08.yaml | 58 +++++++++++++++++++ ...soon-dc8b61de30b02b2cff6abe2f9142cec9.yaml | 58 +++++++++++++++++++ ...soon-fbe96ae280b99abe5e90ec130aefb23d.yaml | 58 +++++++++++++++++++ ...mode-09f85e9adfb4624c22adfc3bca4cbc18.yaml | 58 +++++++++++++++++++ ...urax-801d1a90cceafe559a3466d4f67a8f10.yaml | 58 +++++++++++++++++++ ...urax-89444fbeceae5055dd4381ae452bd0d1.yaml | 58 +++++++++++++++++++ ...urax-90c77c994b57286cd58b89b0a94442a5.yaml | 58 +++++++++++++++++++ ...eady-1e4dc9ccf87cc496477270093047f038.yaml | 58 +++++++++++++++++++ ...page-03aed27f86819ca17f9267263897b2d4.yaml | 58 +++++++++++++++++++ ...page-590623a5d7befa81a3dd4c5d938153e0.yaml | 58 +++++++++++++++++++ ...page-604cc742b0731a1b0e3b91222daa2367.yaml | 58 +++++++++++++++++++ ...page-c6f17fa36993cabcda8dd7acf64ac9f3.yaml | 58 +++++++++++++++++++ ...n-wp-22b32b6b74cc9eb676a736f279318419.yaml | 58 +++++++++++++++++++ ...n-wp-c725a8bb61c1af435931beba79cf59e0.yaml | 58 +++++++++++++++++++ ...oons-943971993cbe3a7f3e1700395fdc37bf.yaml | 58 +++++++++++++++++++ ...ment-9d710f138a80414743d12fd42c3bd26f.yaml | 58 +++++++++++++++++++ ...ater-07a92bda75c6219e8b222de62ff37e0a.yaml | 58 +++++++++++++++++++ ...-pro-2faa74d51969fb024a7d850a91d6917b.yaml | 58 +++++++++++++++++++ ...ield-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...ield-f4996fd87f55d8cae08e1a7a083925f5.yaml | 58 +++++++++++++++++++ ...form-c25a227d2616b1e266b27ae90761f594.yaml | 58 +++++++++++++++++++ ...book-8a14e10c4e61da2c2574a977cb4dd78d.yaml | 58 +++++++++++++++++++ ...hter-8912ce3f5c5896ec3ae73a9aecfa4081.yaml | 58 +++++++++++++++++++ ...ense-1af6a7823a6a8a142bc89c08631d8f4b.yaml | 58 +++++++++++++++++++ ...move-7cee7594ab82d9cb202fec2e242ded86.yaml | 58 +++++++++++++++++++ ...ress-7231043a73d9377b28caf26dc1e18122.yaml | 58 +++++++++++++++++++ ...ting-19129120e783dd9166bd324662106d86.yaml | 58 +++++++++++++++++++ ...mail-2958b08ce41d2a089d276808ef68e4bc.yaml | 58 +++++++++++++++++++ ...tion-3aca7cdedcb176c4ccf669f0b5b15aaf.yaml | 58 +++++++++++++++++++ ...ator-f1883ea786fe0aa097422eb19ac010d8.yaml | 58 +++++++++++++++++++ ...ails-5a219153bb99d5d72b2a78882890f4e2.yaml | 58 +++++++++++++++++++ ...ture-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tluv-1115fbab8a2d4cca53dfc23d9cb02714.yaml | 58 +++++++++++++++++++ ...tluv-b5d9a629551e35099f17ad23fa529784.yaml | 58 +++++++++++++++++++ ...book-cf20fa8408c9425d9c1e30f3c5cdbbda.yaml | 58 +++++++++++++++++++ ...erce-0088814ed74fd156e9ee132de51ef1d2.yaml | 58 +++++++++++++++++++ ...erce-ad95e7e9eeb384d7cc8919d4327ff669.yaml | 58 +++++++++++++++++++ ...erce-df538269ee619b35cd6276912789d0c2.yaml | 58 +++++++++++++++++++ ...erce-ec4b91dfb2713f41a9889afeb0c19f09.yaml | 58 +++++++++++++++++++ ...like-42b4c4c9ef55b9cbba64c1b7340638c8.yaml | 58 +++++++++++++++++++ ...like-857b0e2bae5fe7d9b0d48bfa9ff32d2c.yaml | 58 +++++++++++++++++++ ...like-c44115ca320af6609e9d0557523edcce.yaml | 58 +++++++++++++++++++ ...d-to-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ings-8271075d3a50d2c7e6256973269145fa.yaml | 58 +++++++++++++++++++ ...ings-8c52e6f03af939f0f311c40af30d7f63.yaml | 58 +++++++++++++++++++ ...ings-ce5f44b2a1a66b11d6fba979058869f7.yaml | 58 +++++++++++++++++++ ...eets-92f3371642f241b95162e034abcbcb33.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...king-20bdb039adecbb0f3e200e117849b94d.yaml | 58 +++++++++++++++++++ ...ents-39d6469c1d7f12365cd669891d431a45.yaml | 58 +++++++++++++++++++ ...ents-6b9f6e01b27ac33a42a061d16a244031.yaml | 58 +++++++++++++++++++ ...ents-c74241ceba44be19e7ba6e8fb09c27d6.yaml | 58 +++++++++++++++++++ ...ayer-313b605e10bb673c24b20248a65978eb.yaml | 58 +++++++++++++++++++ ...ayer-950a80cc7b38cd4c46587704ae88fbc4.yaml | 58 +++++++++++++++++++ ...ayer-bd35c1f22ebbbba8b36bd6df988b805a.yaml | 58 +++++++++++++++++++ ...ayer-ee5672596a78a94ff41b76c62c23328e.yaml | 58 +++++++++++++++++++ ...date-2bc216cec70480009970bca04436c777.yaml | 58 +++++++++++++++++++ ...date-2e35c0afd479ebddda5688f51cb87b9d.yaml | 58 +++++++++++++++++++ ...date-df1246639b8669a251f2bf76a6725ade.yaml | 58 +++++++++++++++++++ ...ator-3b5f66bc28ba8ff54368e43564c0ea04.yaml | 58 +++++++++++++++++++ ...ator-99e9d7c301861638ef81beb6515cc7d4.yaml | 58 +++++++++++++++++++ ...ator-c4c4cf320f9d5a30f314d45c9905f1fd.yaml | 58 +++++++++++++++++++ ...edin-ae77789cf095ebe5a3c15cc04f8354ae.yaml | 58 +++++++++++++++++++ ...ight-87dc229e61795edde01adbbcb4d66d06.yaml | 58 +++++++++++++++++++ ...ight-cb154639cc7c0dc0d262bce9d7d2811e.yaml | 58 +++++++++++++++++++ ...ager-8b102422bdbae79fcfd828ee3dff2e44.yaml | 58 +++++++++++++++++++ ...raph-036ea79db83fe96391d5364e9f6a5d01.yaml | 58 +++++++++++++++++++ ...gdpr-0601046a507e54e46df377f0ecc6ed20.yaml | 58 +++++++++++++++++++ ...gdpr-0ace082d96b626b2ad5accfe37aabeee.yaml | 58 +++++++++++++++++++ ...gdpr-0dd9d84ae74328eec6905560ff06dc90.yaml | 58 +++++++++++++++++++ ...gdpr-20f199eadcf56055af91390c7aa42269.yaml | 58 +++++++++++++++++++ ...gdpr-36baea2a40cd4c21b07e642ec98d1598.yaml | 58 +++++++++++++++++++ ...gdpr-39d1abff46677c8f4222117f43e45a81.yaml | 58 +++++++++++++++++++ ...gdpr-3d78e2be612fb18102a14015e146e5ed.yaml | 58 +++++++++++++++++++ ...gdpr-3faec85547682ca0daca65d7bcfe4f48.yaml | 58 +++++++++++++++++++ ...gdpr-4df8cf40ac1883817a3463195832ddff.yaml | 58 +++++++++++++++++++ ...gdpr-52cfe6de8dc0e7f48422a0ddba0a4485.yaml | 58 +++++++++++++++++++ ...gdpr-54ec2b57636fc193223c60655466605e.yaml | 58 +++++++++++++++++++ ...gdpr-5e5f3cf37fc64d7bac2aaac542661852.yaml | 58 +++++++++++++++++++ ...gdpr-6f528eadb66a9354628a303cdece4106.yaml | 58 +++++++++++++++++++ ...gdpr-83ba977a44de14ef1ffafdedd6dd629e.yaml | 58 +++++++++++++++++++ ...gdpr-bd01bd53f32252ceb586f6e4a82fddff.yaml | 58 +++++++++++++++++++ ...gdpr-e9c38ea48203d6f34c8dd4e716a1108d.yaml | 58 +++++++++++++++++++ ...gdpr-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml | 58 +++++++++++++++++++ ...mium-3faec85547682ca0daca65d7bcfe4f48.yaml | 58 +++++++++++++++++++ ...mium-6f528eadb66a9354628a303cdece4106.yaml | 58 +++++++++++++++++++ ...mium-83ba977a44de14ef1ffafdedd6dd629e.yaml | 58 +++++++++++++++++++ ...mium-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml | 58 +++++++++++++++++++ ...shop-23022d4d8e20d83e1b4a708870cdf48e.yaml | 58 +++++++++++++++++++ ...shop-dececf152f183ba1e4159b4797e96e29.yaml | 58 +++++++++++++++++++ ...erce-9b415d0d3fdf05f04e00c8b364d66a56.yaml | 58 +++++++++++++++++++ ...erce-216a466c53c0f9dbd8311fa0afa66753.yaml | 58 +++++++++++++++++++ ...enus-134da546d2df4f04ca01066992554ee0.yaml | 58 +++++++++++++++++++ ...erce-47ed991bbc14dda7a2d912876312ff28.yaml | 58 +++++++++++++++++++ ...erce-687e0bfbb6d2f1a8953da32fe9e3e746.yaml | 58 +++++++++++++++++++ ...erce-f546949dea525a0c95c8895c66b00552.yaml | 58 +++++++++++++++++++ ...gets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...uler-cf3e255501522f24f949ee2a8f39ee25.yaml | 58 +++++++++++++++++++ ...dget-cf1b7f4c03fcd556e540f11fea53f35a.yaml | 58 +++++++++++++++++++ ...smtp-66c31f4c6740f8ad7d7b89dba2cbfd5f.yaml | 58 +++++++++++++++++++ ...data-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...ndar-73dac6bf00e8c2bb53faafd1de73576a.yaml | 58 +++++++++++++++++++ ...mons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ions-1f71cd156c1c7a7919178911b00bc151.yaml | 58 +++++++++++++++++++ ...ions-2e3f61534eb2162d57847e92682b9bbd.yaml | 58 +++++++++++++++++++ ...ions-6869d4da7d1da9e6712437e8840c161b.yaml | 58 +++++++++++++++++++ ...ions-b0b49bce1c15ad148a5058e1154b417c.yaml | 58 +++++++++++++++++++ ...ions-cf74b8fc2d5310123c3eee779bc13fa4.yaml | 58 +++++++++++++++++++ ...ions-db180c33b0677e46a0a6bb8bb9ad8a71.yaml | 58 +++++++++++++++++++ ...u-io-f1b98a2e76b778879a86c711e73365c4.yaml | 58 +++++++++++++++++++ ...orms-7651cce817269ea91d5fbe788e52194b.yaml | 58 +++++++++++++++++++ ...orms-903a37844bea1fdaf4cd48ec6980337e.yaml | 58 +++++++++++++++++++ ...orms-b14574939a93e002a63be522534dc429.yaml | 58 +++++++++++++++++++ ...unch-1a317e1cdbb26d9e49f5aa3bc192b26e.yaml | 58 +++++++++++++++++++ ...unch-437bae7c2a82ed4347741e0e69e1ae61.yaml | 58 +++++++++++++++++++ ...orms-d81bd0f10f327ed0fb83b12edeec74bf.yaml | 58 +++++++++++++++++++ ...bank-433ffdc26cf2c66e4eeb88d840e46a11.yaml | 58 +++++++++++++++++++ ...bank-6d98c218699b93985ac97a3eec99201e.yaml | 58 +++++++++++++++++++ ...bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...bank-dde9696bf354d3e3e05b50e1d6ec9e01.yaml | 58 +++++++++++++++++++ ...bank-e445dff1dbcdaa9bae7b0592b35676e6.yaml | 58 +++++++++++++++++++ ...bank-faf9b6b6bd7098d550180128b47f75fe.yaml | 58 +++++++++++++++++++ ...rm-7-1ff3b8d002a210c8bcbac1471cb6f6f6.yaml | 58 +++++++++++++++++++ ...rm-7-325454a71c0c17adfea3794a8a7a9236.yaml | 58 +++++++++++++++++++ ...rm-7-6e59234554b04ec8d40e5e3ef21541b6.yaml | 58 +++++++++++++++++++ ...rm-7-7f88047eb913450e01c938cb65d8b8a9.yaml | 58 +++++++++++++++++++ ...rm-7-8d379cb370e88332eb6d842ed734aa6a.yaml | 58 +++++++++++++++++++ ...cker-dd80fd1aa8e8ecdfc56af18872d295e2.yaml | 58 +++++++++++++++++++ ...sion-8ba7976e3e4bdeede76b4a3300e51140.yaml | 58 +++++++++++++++++++ ...sion-ad3bf812c0907ec51a65ebf62ff94eb1.yaml | 58 +++++++++++++++++++ ...sion-f69e0ba733c2c24bc554eac9c924b265.yaml | 58 +++++++++++++++++++ ...rm-7-f9c76f792a0cb9c9d573c3bb2df06a93.yaml | 58 +++++++++++++++++++ ...ions-4d9d22b8536ad510aca448861c4763dd.yaml | 58 +++++++++++++++++++ ...sion-01288e737e4ae077215c04412343fc17.yaml | 58 +++++++++++++++++++ ...sion-905c45437d6ba639495cb537666e1306.yaml | 58 +++++++++++++++++++ ...dule-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dule-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...tter-60ccaab36d8d291d989ebdd0beef30b5.yaml | 58 +++++++++++++++++++ ...d-on-46d92974df5823a07d95144ce4cc0f85.yaml | 58 +++++++++++++++++++ ...d-on-a742d112c80df865f27dc03fd5bad80a.yaml | 58 +++++++++++++++++++ ...d-on-d4ad0651fbd050ca5d0c0b31b84449cb.yaml | 58 +++++++++++++++++++ ...tcha-14d0e5668206cef97d18962e8ae7b83f.yaml | 58 +++++++++++++++++++ ...tcha-8adb7b06ec664dfb56f6f7d6b4e86d31.yaml | 58 +++++++++++++++++++ ...kins-2914c51da091e199d25a3dc8786db638.yaml | 58 +++++++++++++++++++ ...ddon-167d9672411be44feb72a5175fd0987c.yaml | 58 +++++++++++++++++++ ...ddon-be2731d38b6a95683208b89df2a4165d.yaml | 58 +++++++++++++++++++ ...tyle-a1fcf6f91e16b2992432e60b1b4c9234.yaml | 58 +++++++++++++++++++ ...tyle-ea1c126ca110ea032d6fcb986fdd350e.yaml | 58 +++++++++++++++++++ ...sion-6fadcf5f17b5915346db50e851606480.yaml | 58 +++++++++++++++++++ ...sion-7b879cd01e55c6fb3c0d10afee385802.yaml | 58 +++++++++++++++++++ ...sion-9307d10c2323b14a9686cf4c27778940.yaml | 58 +++++++++++++++++++ ...sion-b08c80c889936db0e80107b8d6e7f7c2.yaml | 58 +++++++++++++++++++ ...sion-b47f4196237e18a984049178586c33fe.yaml | 58 +++++++++++++++++++ ...-add-2d5c4c1875b8b7afff532ee362cb19b6.yaml | 58 +++++++++++++++++++ ...-add-2fc7a8d84b84e65f1ccfb4b2642e31b7.yaml | 58 +++++++++++++++++++ ...-add-7688a1f2aea8d38e34484935054bb963.yaml | 58 +++++++++++++++++++ ...-add-b5a086a164f76d9f65ec8c84b98c931b.yaml | 58 +++++++++++++++++++ ...base-7d7f5d445c1f890434d5685044d9c36e.yaml | 58 +++++++++++++++++++ ...lder-0dd2df3f5b8d5d1265b1558506e0a48b.yaml | 58 +++++++++++++++++++ ...lder-e751943c96e8083bbd38ea46395e441a.yaml | 58 +++++++++++++++++++ ...lder-eff7610d5a81227a5c58edb7e81bb7b8.yaml | 58 +++++++++++++++++++ ...stic-2fa0b1455e44ce08beb9843b8aba88e0.yaml | 58 +++++++++++++++++++ ...stic-3f35ac18f9207e0d36c74b4e353744ff.yaml | 58 +++++++++++++++++++ ...stic-4d5e40c3dba04c280b662fef0150a3f4.yaml | 58 +++++++++++++++++++ ...stic-8496d75762eb7cc39ecc911adbe09233.yaml | 58 +++++++++++++++++++ ...stic-8aec4bc7a4f45a1f32781336a736062d.yaml | 58 +++++++++++++++++++ ...fdb7-1870dbf4bb41dccecc97cff36f308cb8.yaml | 58 +++++++++++++++++++ ...fdb7-4804713458840c235ae2e000980eb782.yaml | 58 +++++++++++++++++++ ...fdb7-75518625380bcaa62f1a02064912f140.yaml | 58 +++++++++++++++++++ ...fdb7-75ff620cd218a38029d3e52c745f6285.yaml | 58 +++++++++++++++++++ ...fdb7-7a93aae5a1b0a527454a7a7e7a2079a6.yaml | 58 +++++++++++++++++++ ...fdb7-a479da98606812ed965dd3889c1983c1.yaml | 58 +++++++++++++++++++ ...ster-8399de040479bedb6b313106c99e1459.yaml | 58 +++++++++++++++++++ ...ries-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...ries-0ae9ca018a23708b259b56e1909be0dd.yaml | 58 +++++++++++++++++++ ...ries-11d2084b4b4824db42a1247a4ad4b029.yaml | 58 +++++++++++++++++++ ...ries-27391e149ab2871748f52ce997dd4e34.yaml | 58 +++++++++++++++++++ ...ries-4b0e1b091043f35eaaaa251df8ddc4b2.yaml | 58 +++++++++++++++++++ ...ries-572e59930dcc24f750ce3dae22510652.yaml | 58 +++++++++++++++++++ ...ries-7e31455dbe1dd61224e4a9a69904e9bc.yaml | 58 +++++++++++++++++++ ...ries-a7ecc95184b3ade18a4afbbf2cc86f31.yaml | 58 +++++++++++++++++++ ...ries-b1d3b6bac2cc1e1f3e245ca1837d27ff.yaml | 58 +++++++++++++++++++ ...ries-c8150190c374645707abe44442dd04c9.yaml | 58 +++++++++++++++++++ ...ator-4493ed5056e4671039baf554adba702c.yaml | 58 +++++++++++++++++++ ...ator-45055b7313617f4962d20d0d3cd73e8b.yaml | 58 +++++++++++++++++++ ...ator-60c9bfea8eebe4996b281df81354bfeb.yaml | 58 +++++++++++++++++++ ...maps-9b4261e2d1c94c9960e52f01252bbfd4.yaml | 58 +++++++++++++++++++ ...lite-3ecd0cc847951c575bdce3ab52ae1765.yaml | 58 +++++++++++++++++++ ...lite-97d382f4c9bc6b17c25a76a092e5b852.yaml | 58 +++++++++++++++++++ ...aker-5530cad0a9767bd88d96d829bf733779.yaml | 58 +++++++++++++++++++ ...aker-60c3cd16f2597496a4651e0715286bc1.yaml | 58 +++++++++++++++++++ ...aker-b9705619b7c26905bbb7df74ccb4fdad.yaml | 58 +++++++++++++++++++ ...aker-e46317cbf2f40aac373a74fb30f51dde.yaml | 58 +++++++++++++++++++ ...ager-362c09e706e4df3c312dbda6ffdf171c.yaml | 58 +++++++++++++++++++ ...ager-bf314fdb968b7a1f09514983e27476f9.yaml | 58 +++++++++++++++++++ ...ager-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml | 58 +++++++++++++++++++ ...ulti-78a680d0afadd06452bb6d0bff3dabe2.yaml | 58 +++++++++++++++++++ ...ugin-0c860e72b162cc9055e799dc4f8c2b43.yaml | 58 +++++++++++++++++++ ...ugin-28ac556db560c4dbe8e302546acf1314.yaml | 58 +++++++++++++++++++ ...ugin-32db8ca06e20ab6daa51c97bb6564bc7.yaml | 58 +++++++++++++++++++ ...ugin-7d2288f1e4c8fb646fdb55a372b6200a.yaml | 58 +++++++++++++++++++ ...ugin-b2200c29280205b8f648b84224e222a3.yaml | 58 +++++++++++++++++++ ...ugin-b74320f496d843edce06a2ca91d6d756.yaml | 58 +++++++++++++++++++ ...ugin-bfef76276701b6af6e198a50eb02c42f.yaml | 58 +++++++++++++++++++ ...ugin-db0677cd0c6ea98a43e8b2ad4b143537.yaml | 58 +++++++++++++++++++ ...ugin-dddf3ae843aadf68e8fa30f4a8366d3d.yaml | 58 +++++++++++++++++++ ...eady-91e28682a12b6a160969ea8bdc14d2e1.yaml | 58 +++++++++++++++++++ ...ions-5591c3e066a7e4066f46ad9259d47c7a.yaml | 58 +++++++++++++++++++ ...ions-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml | 58 +++++++++++++++++++ ...-api-23ce5fe03a72b8b92f4c0373c289ac85.yaml | 58 +++++++++++++++++++ ...-api-2cc77b5ea4b45b7ee724687c14467261.yaml | 58 +++++++++++++++++++ ...-api-d34228fe0ea5aea58ceb8ad3c32ed940.yaml | 58 +++++++++++++++++++ ...o-db-008dc0e9968f6799131ae4b8b208b112.yaml | 58 +++++++++++++++++++ ...o-db-0bc37b5f5d5498d8771db41a1e16a982.yaml | 58 +++++++++++++++++++ ...o-db-681fa4a6fa6cb7b76b53c0bb6085cace.yaml | 58 +++++++++++++++++++ ...o-db-74041a1cd73f08568e0ec3ed47a172de.yaml | 58 +++++++++++++++++++ ...mail-19c454491469bb4baac868d543f48c48.yaml | 58 +++++++++++++++++++ ...mail-2c888a383975451b85f071f96c07a849.yaml | 58 +++++++++++++++++++ ...mail-334f4f62624615af2cc14829ff37be7b.yaml | 58 +++++++++++++++++++ ...mail-441ea60f05f966e781a45c27f0c1432d.yaml | 58 +++++++++++++++++++ ...mail-523f9782716d9d1f6a85039ec487ef5a.yaml | 58 +++++++++++++++++++ ...mail-73e00ca7db916ed6c728c1ea942e0577.yaml | 58 +++++++++++++++++++ ...mail-97fdf4928bbd76fae340c4c5446a338a.yaml | 58 +++++++++++++++++++ ...mail-9dea660ab98d663f0efe8a0b1c33b059.yaml | 58 +++++++++++++++++++ ...mail-b66a39c48610a87259a172e4f5cf2fee.yaml | 58 +++++++++++++++++++ ...mail-c7e1acab172697ab915921160c7d0087.yaml | 58 +++++++++++++++++++ ...mail-c9506f63ff82213ed0ffcd809196c6f9.yaml | 58 +++++++++++++++++++ ...mail-f34034c5adff9e3ed6de1b8ed77cfaad.yaml | 58 +++++++++++++++++++ ...mail-fa3064d32c24f2074e60835d6d0ebe62.yaml | 58 +++++++++++++++++++ ...cita-6c834138798466361126510722b04f6a.yaml | 58 +++++++++++++++++++ ...cita-87393b6cbe65ceec06a5ec19e419100f.yaml | 58 +++++++++++++++++++ ...cita-c64d112b09ccd6fd1b8f5dd595338d1e.yaml | 58 +++++++++++++++++++ ...tcha-cae1c922212fa7c1549f820e13a75cb7.yaml | 58 +++++++++++++++++++ ...tcha-e81493486edc65b51a46933e4d69c1ae.yaml | 58 +++++++++++++++++++ ...rm-x-3ac76b892c0315db178c6ad3b771092a.yaml | 58 +++++++++++++++++++ ...orms-14cc2ff52c2662c5bebf9121075ccf4f.yaml | 58 +++++++++++++++++++ ...orms-6077f7a94c87d9a1b005a233e3c6fd5d.yaml | 58 +++++++++++++++++++ ...orms-6dcd6771f1f0746a16b380bac310ab87.yaml | 58 +++++++++++++++++++ ...orms-79bb03ced62c925cc3980f7773c8b468.yaml | 58 +++++++++++++++++++ ...orms-8da30969bcacb440bbb986e6162d8445.yaml | 58 +++++++++++++++++++ ...spam-20311a33f3f379efbba8f0342b6a65da.yaml | 58 +++++++++++++++++++ ...spam-87058e9c1b26afbdd8a6e1c7e1f576f5.yaml | 58 +++++++++++++++++++ ...spam-cac5b9f1e3e6750110efd6bb6787f157.yaml | 58 +++++++++++++++++++ ...spam-ff4c8819921d9a081116a64b6a2918f8.yaml | 58 +++++++++++++++++++ ...orms-bb71699aa4349b6b3064f95e45538058.yaml | 58 +++++++++++++++++++ ...lder-e7eeb43a188e099bb735454caeee5ee1.yaml | 58 +++++++++++++++++++ ...orms-f0c94fb1e754e56b41cc5bd812bd2131.yaml | 58 +++++++++++++++++++ ...list-572bae7edaf128953359cfe6de03a4a0.yaml | 58 +++++++++++++++++++ ...list-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ople-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...ople-500d22096689e74a2a7a6d680b428339.yaml | 58 +++++++++++++++++++ ...ople-b847bc73a92d46d668812fa6ef8e89b3.yaml | 58 +++++++++++++++++++ ...ople-b935aac9392ea74d48c16c20e8b0b995.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ctme-96de724cebfb88ce342c3f1cd99b7f35.yaml | 58 +++++++++++++++++++ ...osts-989d7e2b18423ced6908cb91d5240631.yaml | 58 +++++++++++++++++++ ...udit-a03a0aef3cdb2ee1e486094cc570f1e0.yaml | 58 +++++++++++++++++++ ...udit-bdf28a131c7bd7c8afd4060cccc1802a.yaml | 58 +++++++++++++++++++ ...bars-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...bars-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ards-3504e7e5ce554ea17877d4ad4d619862.yaml | 58 +++++++++++++++++++ ...ards-c0ae11bcf65a3a05752255a9835cc822.yaml | 58 +++++++++++++++++++ ...ctor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...trol-65043d39bf222f68f6c9850d424ae1bf.yaml | 58 +++++++++++++++++++ ...trol-6cd803f0fa2a9a46d6f2307a3acf4872.yaml | 58 +++++++++++++++++++ ...-egg-b1d431b2d71fecfb14bc9d5f71e53d5a.yaml | 58 +++++++++++++++++++ ...-egg-e3ab5ea87cccc6d9dbd7e7c3ec127075.yaml | 58 +++++++++++++++++++ ...rter-d376b4d580b7428d3bfbfcb6ac5ff40d.yaml | 58 +++++++++++++++++++ ...bber-d1c8ca034f832b8e22c96845d2890940.yaml | 58 +++++++++++++++++++ ...mask-1c3db202ed4136234a7dba357e335f3e.yaml | 58 +++++++++++++++++++ ...ctor-0585d1bea582d0ee6fb87cab95609406.yaml | 58 +++++++++++++++++++ ...ctor-457bded7758897bb7b11c24dee26d4c2.yaml | 58 +++++++++++++++++++ ...ctor-5a70a8d7dfb4ee35e96ebed234af90de.yaml | 58 +++++++++++++++++++ ...ctor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ctor-bd26cb20f513a11738059a698b560137.yaml | 58 +++++++++++++++++++ ...ctor-d2daaa3d964f6f32895fca6e21e6cab6.yaml | 58 +++++++++++++++++++ ...ater-8bc6ce24c222c874630a145ef16e8d93.yaml | 58 +++++++++++++++++++ ...ater-ab2b677573aede58b8661a8c8b875adf.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lide-8acf2c0ab08c8e98004387e8ebf54bb0.yaml | 58 +++++++++++++++++++ ...lide-d36d80c800d370d4009d1b192f222cc5.yaml | 58 +++++++++++++++++++ ...ging-a29cb4528fb3dd359faf1d68a8cf9ee1.yaml | 58 +++++++++++++++++++ ...post-321e86531ce3a7401f2a887940f1ca1d.yaml | 58 +++++++++++++++++++ ...page-32b155c617c0c335f9330107a2737ef9.yaml | 58 +++++++++++++++++++ ...page-96403daec96064716d990b4ed68fc604.yaml | 58 +++++++++++++++++++ ...page-f50e7448551c79441add3846b2a5874b.yaml | 58 +++++++++++++++++++ ...g-v2-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...line-7f9ad1d6a2154bddb398590843df9930.yaml | 58 +++++++++++++++++++ ...oxes-eaa7c0a2d867f267f85dfa358433a0fa.yaml | 58 +++++++++++++++++++ ...udio-573a62057c81ca4962d570ce03558e74.yaml | 58 +++++++++++++++++++ ...udio-64bd1922f633605cf49031a3735ffb86.yaml | 58 +++++++++++++++++++ ...udio-93d0c9fb7bc094c24fb138bae4f602fc.yaml | 58 +++++++++++++++++++ ...udio-9dbce4bd062a39cef5c1a852c279047e.yaml | 58 +++++++++++++++++++ ...cker-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml | 58 +++++++++++++++++++ ...lery-1fcba72eb855bf7a2b762f45f8e9327d.yaml | 58 +++++++++++++++++++ ...lery-2613b63d2aee689ccf6be1c1b97a178f.yaml | 58 +++++++++++++++++++ ...lery-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml | 58 +++++++++++++++++++ ...lery-4f98def5aafbaedc907582ddf709a1ef.yaml | 58 +++++++++++++++++++ ...lery-534d85fc0380423c37750b4f71b369b0.yaml | 58 +++++++++++++++++++ ...lery-53642a245d326d7cbf44af5789554e3c.yaml | 58 +++++++++++++++++++ ...lery-53bd8ee68daf44e8898790dff3d4d891.yaml | 58 +++++++++++++++++++ ...lery-53c528c4b38bd34834da864bf5436a73.yaml | 58 +++++++++++++++++++ ...lery-5e73e241c87c5dbc4d6ce35aa938828e.yaml | 58 +++++++++++++++++++ ...lery-757bd659f9146e7fed02497d3559c2e8.yaml | 58 +++++++++++++++++++ ...lery-89931846724982da840bead82e16369b.yaml | 58 +++++++++++++++++++ ...lery-8a640d3ed297a8a63d17c701796646c2.yaml | 58 +++++++++++++++++++ ...lery-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml | 58 +++++++++++++++++++ ...lery-8e81f52602da7d34f1be2c2a8e304501.yaml | 58 +++++++++++++++++++ ...lery-9580adf700b409fcf11b1b8ce6a8f986.yaml | 58 +++++++++++++++++++ ...lery-9ac93e930052c6b551d522a1a37f90fe.yaml | 58 +++++++++++++++++++ ...lery-9c0847af71db5cbde2297c6d8117181e.yaml | 58 +++++++++++++++++++ ...lery-a3fa9aa05831cbe48f93e588aa23d79b.yaml | 58 +++++++++++++++++++ ...lery-aa986981c75263be7a2313fe5bb981c0.yaml | 58 +++++++++++++++++++ ...lery-adf21f96bc20b891592eb95e06429f24.yaml | 58 +++++++++++++++++++ ...lery-b3fb140ad00234395ef28e4892077821.yaml | 58 +++++++++++++++++++ ...lery-c747e3cc597300516c2ada9764e8c1be.yaml | 58 +++++++++++++++++++ ...lery-cad4f56715717797069f7a87850b72f0.yaml | 58 +++++++++++++++++++ ...lery-cadc46493e5e64619719bfd06035e262.yaml | 58 +++++++++++++++++++ ...lery-cd8aaefa2a1be6647748a924e3adf35e.yaml | 58 +++++++++++++++++++ ...lery-e13fa86cb5f0a76818b71a18a333569e.yaml | 58 +++++++++++++++++++ ...lery-f0c828ee470540e4c37a94d5e7637488.yaml | 58 +++++++++++++++++++ ...lery-f468941db7d975cc4bd3298b085b669f.yaml | 58 +++++++++++++++++++ ...lery-f4eafb52aedd774a77d6abb99f32e10c.yaml | 58 +++++++++++++++++++ ...lery-f99fe05b2429bd9e4943506324d48d85.yaml | 58 +++++++++++++++++++ ...lery-feebbbe6815c937983c3b7fc4e387586.yaml | 58 +++++++++++++++++++ ...-pro-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml | 58 +++++++++++++++++++ ...-pro-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml | 58 +++++++++++++++++++ ...-pro-4f98def5aafbaedc907582ddf709a1ef.yaml | 58 +++++++++++++++++++ ...-pro-53c528c4b38bd34834da864bf5436a73.yaml | 58 +++++++++++++++++++ ...-pro-757bd659f9146e7fed02497d3559c2e8.yaml | 58 +++++++++++++++++++ ...-pro-82c2c907402b124f31a2f373f11be562.yaml | 58 +++++++++++++++++++ ...-pro-8a640d3ed297a8a63d17c701796646c2.yaml | 58 +++++++++++++++++++ ...-pro-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml | 58 +++++++++++++++++++ ...-pro-9ac93e930052c6b551d522a1a37f90fe.yaml | 58 +++++++++++++++++++ ...-pro-9c0847af71db5cbde2297c6d8117181e.yaml | 58 +++++++++++++++++++ ...-pro-a3fa9aa05831cbe48f93e588aa23d79b.yaml | 58 +++++++++++++++++++ ...-pro-aa986981c75263be7a2313fe5bb981c0.yaml | 58 +++++++++++++++++++ ...-pro-b3fb140ad00234395ef28e4892077821.yaml | 58 +++++++++++++++++++ ...-pro-c747e3cc597300516c2ada9764e8c1be.yaml | 58 +++++++++++++++++++ ...-pro-cad4f56715717797069f7a87850b72f0.yaml | 58 +++++++++++++++++++ ...-pro-cadc46493e5e64619719bfd06035e262.yaml | 58 +++++++++++++++++++ ...-pro-f4eafb52aedd774a77d6abb99f32e10c.yaml | 58 +++++++++++++++++++ ...fuel-45ed5bc2a620f7b73012888c5d094ada.yaml | 58 +++++++++++++++++++ ...fuel-7445eca3ede10516578f424839049031.yaml | 58 +++++++++++++++++++ ...olor-aaa55eb82dbd089503acfbd59b1c1516.yaml | 58 +++++++++++++++++++ ...osts-3e85c71c88d12aeaac665ff72e05dcde.yaml | 58 +++++++++++++++++++ ...osts-507e2521f54c5e6ca19bac49a7a788fa.yaml | 58 +++++++++++++++++++ ...osts-5edac4e24aea010bac0d630a89afdf47.yaml | 58 +++++++++++++++++++ ...osts-ab86f3a4c1a5f2be4ec7926458a9f257.yaml | 58 +++++++++++++++++++ ...osts-b2db28211fa50e37f6b6bfd260ae4ccb.yaml | 58 +++++++++++++++++++ ...osts-ea8b272e63e8b928e0d82ce3f2c7b461.yaml | 58 +++++++++++++++++++ ...rity-9a80eb4e9ae6ba3b2c9128c9152fe450.yaml | 58 +++++++++++++++++++ ...ller-bbd95e8edaa114935e8c46570e7cf3d6.yaml | 58 +++++++++++++++++++ ...tbox-4afaae0eb67cba7aee3bb7f48388cd03.yaml | 58 +++++++++++++++++++ ...tbox-d1d5a17953a33d04ba0957e7769eee44.yaml | 58 +++++++++++++++++++ ...tool-9a55a55c80f33af03798b4f5b44c2509.yaml | 58 +++++++++++++++++++ ...erns-c4ae84dae7d5de9c58b9c493377ad809.yaml | 58 +++++++++++++++++++ ...cess-a7fbc15e992c578892e165c742bd4873.yaml | 58 +++++++++++++++++++ ...cess-c49ea2c86d8c93655dddbd6be61fd77e.yaml | 58 +++++++++++++++++++ ...ayer-931a68fe7b31a6c4742b24a2e8784e8f.yaml | 58 +++++++++++++++++++ ...ents-5f9367f594e64f78f39747766e36b5a7.yaml | 58 +++++++++++++++++++ ...ents-c9875ec40b4bfff20efe07d7ffbd5d06.yaml | 58 +++++++++++++++++++ ...lery-27521f4f3d223c8b6a8b829305f4c5c6.yaml | 58 +++++++++++++++++++ ...lery-2cb21cf10e585cd5925c48e682cf6673.yaml | 58 +++++++++++++++++++ ...lery-439a38f99b97f598550cea829cc025f1.yaml | 58 +++++++++++++++++++ ...lery-5a110fd311341876d97192705d1ff40f.yaml | 58 +++++++++++++++++++ ...lery-61ac26890db9b6da684b026a500b1abb.yaml | 58 +++++++++++++++++++ ...lery-e26e50c2a1f74878104460c1a935b34d.yaml | 58 +++++++++++++++++++ ...n-10-e4eebb35f2461b3cc651ea0b61f79101.yaml | 58 +++++++++++++++++++ ...ador-2888b8004776c21ebddecea6ec731145.yaml | 58 +++++++++++++++++++ ...tson-a48a527c714ec711ca739eed07091779.yaml | 58 +++++++++++++++++++ ...orms-1c83e2fc407fdbaee8e0a7b1d33de8b3.yaml | 58 +++++++++++++++++++ ...orms-22b31e4572f874fba75c72ff00d007de.yaml | 58 +++++++++++++++++++ ...orms-d06ae0bd2926a035277d571533319f2e.yaml | 58 +++++++++++++++++++ ...neda-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...inja-f35417e8a6d1f5736025e50e8ca1a9dc.yaml | 58 +++++++++++++++++++ ...ypes-8cfa5c88e9f41fa81abd69a4c0a4495b.yaml | 58 +++++++++++++++++++ ...ypes-c58d543f66167e9552cf6cc989b83b2e.yaml | 58 +++++++++++++++++++ ...ocks-fd9bc570df9e6e1f10861293d27d4049.yaml | 58 +++++++++++++++++++ ...mbed-8451bc0b3344f88890ab58dfe6424c23.yaml | 58 +++++++++++++++++++ ...tful-0f483e5b57556e64c6fcbf6984188e67.yaml | 58 +++++++++++++++++++ ...tkit-530ef54f0cce1110a26e13d9009961ab.yaml | 58 +++++++++++++++++++ ...tkit-5ccba34100497998aa68e15dc82c8875.yaml | 58 +++++++++++++++++++ ...tkit-a064b7a7a37c845ee9c4b53a944b4505.yaml | 58 +++++++++++++++++++ ...plug-3445f10edb771a060415612c26e8b8f1.yaml | 58 +++++++++++++++++++ ...plug-350d1c9101b958bff14b2cd20f908108.yaml | 58 +++++++++++++++++++ ...plug-c180a9b603d8380fb7d1168376590f63.yaml | 58 +++++++++++++++++++ ...plug-f630b1d3cc9f84151af09d692a508d8b.yaml | 58 +++++++++++++++++++ ...tpro-144ed0d6a5cb015106c17c6c273b534a.yaml | 58 +++++++++++++++++++ ...late-553b8c0b3cbb1236b177498b5b57ae88.yaml | 58 +++++++++++++++++++ ...oked-13669a276e19b8811f99e2913ccb5a23.yaml | 58 +++++++++++++++++++ ...oked-6e286583f72963c211e1187360769087.yaml | 58 +++++++++++++++++++ ...-pro-48bbdd821c29a9665fc692ef526172c1.yaml | 58 +++++++++++++++++++ ...-pro-e81fd7787c96dcecf9ab7ed7e0fa064a.yaml | 58 +++++++++++++++++++ ...-bar-13b25bc0903a03574dd9d52d17a8d7fb.yaml | 58 +++++++++++++++++++ ...-bar-5f63dbab28102f21dce668e1dd09a569.yaml | 58 +++++++++++++++++++ ...-box-0a7db26507a2752830d796f872bfc74f.yaml | 58 +++++++++++++++++++ ...-bar-daa176383a0d1a1f03b0870eb52cd5ab.yaml | 58 +++++++++++++++++++ ...info-c794524768b79fbeacb43dc638d96e23.yaml | 58 +++++++++++++++++++ ...tice-4871efeec934efc06ef8f938e4a88d59.yaml | 58 +++++++++++++++++++ ...tice-94366e72b8b16247e4525177a190a390.yaml | 58 +++++++++++++++++++ ...nner-0f75bb052c76ac287df6a3cedb6cbaf7.yaml | 58 +++++++++++++++++++ ...sent-bd04f483d63aabca8f2d0d86dcbe84f9.yaml | 58 +++++++++++++++++++ ...tice-f08aff12bfc66296ae4f842e638dd13b.yaml | 58 +++++++++++++++++++ ...rams-72e30d516064ff268f270b89142b1d08.yaml | 58 +++++++++++++++++++ ...ebot-88740e25cc28fba39de089d7afe48b02.yaml | 58 +++++++++++++++++++ ...ehub-2606febac98b5b77708f94f9707ab5ad.yaml | 58 +++++++++++++++++++ ...ster-5b40ee65b1caa7d96e4e60846451b515.yaml | 58 +++++++++++++++++++ ...licy-f0ed757a74607e0e7be560cb144e0abe.yaml | 58 +++++++++++++++++++ ...y-jm-b9008bcb5ccd36f2981a1df579798a3b.yaml | 58 +++++++++++++++++++ ...line-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...loud-02f969afa585249fd7cbd8abedb25b46.yaml | 58 +++++++++++++++++++ ...line-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...line-6ce37c385f3376e7926c7b8faa81bc2f.yaml | 58 +++++++++++++++++++ ...lery-1a5984e73d9bda9668de2c9f32433df9.yaml | 58 +++++++++++++++++++ ...lock-d3f53759db6cbb2a0f47408beaf6dbd0.yaml | 58 +++++++++++++++++++ ...pify-d08d0840632760096f6b8acd75a58e66.yaml | 58 +++++++++++++++++++ ...osts-1b358fe1178e63af268bdd4f6a81f5be.yaml | 58 +++++++++++++++++++ ...osts-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...osts-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...osts-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...osts-f8c9b929aeaeb9c8fafdde93d3c6755f.yaml | 58 +++++++++++++++++++ ...y-me-0605116109dea812447b77431db29f66.yaml | 58 +++++++++++++++++++ ...ents-3199c52f1f975758dfffb8998d727e53.yaml | 58 +++++++++++++++++++ ...ents-4c213df5dc6174e79a79df8f8e0cad2a.yaml | 58 +++++++++++++++++++ ...ents-7b6f5ddd1a73a6079392a4dafa7418fb.yaml | 58 +++++++++++++++++++ ...code-54ab7472cf90fa30b87c2b5f7b48020b.yaml | 58 +++++++++++++++++++ ...tpro-04bb0fa287a9e5d3f21854cb26990e9b.yaml | 58 +++++++++++++++++++ ...trol-eeca82a89fbac0124d669de2f8301089.yaml | 58 +++++++++++++++++++ ...ster-848d3b967ba51cd5adfd6ee6af7f2576.yaml | 58 +++++++++++++++++++ ...vity-90b890e5600ae938f133578a1bc1190d.yaml | 58 +++++++++++++++++++ ...vity-d3a19cbbaa27911e489d78dc5e2a05f1.yaml | 58 +++++++++++++++++++ ...r-ad-34e1ea4c84115991aa9040d8463cc384.yaml | 58 +++++++++++++++++++ ...r-ad-490cf4e76b6c86f1bd637de80c3840f0.yaml | 58 +++++++++++++++++++ ...r-ad-927cbb958df998dc837f34fcb0cea909.yaml | 58 +++++++++++++++++++ ...tone-df57edbeaacf1839941749d528a6f8bc.yaml | 58 +++++++++++++++++++ ...tone-e6194f3012a16cad12df41e5eff8a678.yaml | 58 +++++++++++++++++++ ...nner-e740d0f5f3811a1aac1ce94a356e0d8f.yaml | 58 +++++++++++++++++++ ...ress-0395bd0434174482278f530635a1d70c.yaml | 58 +++++++++++++++++++ ...cial-ef4882c3d4c4772ce7530ff30b7b1640.yaml | 58 +++++++++++++++++++ ...mber-55f7bc7dbafb42aecc9f8ebab372d604.yaml | 58 +++++++++++++++++++ ...mber-62e533687797ef0b9325ac92a155944b.yaml | 58 +++++++++++++++++++ ...made-515b13054c00d74df0dd204b8f66cac0.yaml | 58 +++++++++++++++++++ ...core-0e249eccad21574e2f41d6b727c12756.yaml | 58 +++++++++++++++++++ ...lder-7ea277ec9b125c8bb0dc05cbc37ef294.yaml | 58 +++++++++++++++++++ ...-pro-2a7584a9fe53a3524213cd8679c71b87.yaml | 58 +++++++++++++++++++ ...erce-1da3bff2b929ee79b3408ef2cf734abb.yaml | 58 +++++++++++++++++++ ...erce-bdd35485646018dc29c3dede2e0cfc31.yaml | 58 +++++++++++++++++++ ...erce-c1f81ab3aa2788ffb3caf7e813611f11.yaml | 58 +++++++++++++++++++ ...-day-1424f14be2dcb113b8417a6cefda326b.yaml | 58 +++++++++++++++++++ ...-day-178ad27fec6356c0ff4786fef5ed9b55.yaml | 58 +++++++++++++++++++ ...-day-39efec1d687062290aa82ba498987905.yaml | 58 +++++++++++++++++++ ...-day-3d16ca713159983964ffa612b7a2f5b4.yaml | 58 +++++++++++++++++++ ...-day-5980acc6b3204929292de13732c438ae.yaml | 58 +++++++++++++++++++ ...-day-8219532133f7917d1e83bbff3f75f37b.yaml | 58 +++++++++++++++++++ ...-day-95e1c7301e20b06d93d00a27ff0164ee.yaml | 58 +++++++++++++++++++ ...-day-ba663052cd3e15a64b57c5574e6284ee.yaml | 58 +++++++++++++++++++ ...-day-ecd06ad3b241a40ab31e78d6ecc1667e.yaml | 58 +++++++++++++++++++ ...-day-fe9a4afd9a7e82aa5eb0f999cd08a3fe.yaml | 58 +++++++++++++++++++ ...lder-1400c910950cfb3abe9cd7aa01e509c4.yaml | 58 +++++++++++++++++++ ...lder-2e3506811e52ec17c7634c4366161915.yaml | 58 +++++++++++++++++++ ...lder-8078b4f9949ef9f89bc0fb06a9571b7f.yaml | 58 +++++++++++++++++++ ...lder-9fa44d8d4f03281cc0e3d7ac38bce0cf.yaml | 58 +++++++++++++++++++ ...lder-a8426729df158cf9f48bc7ffef172f3b.yaml | 58 +++++++++++++++++++ ...lder-fc7104705e7470f1c2f9c7438b20c375.yaml | 58 +++++++++++++++++++ ...ndar-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...mate-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...nded-a267ad47aaacbda283b13d30d0de08e1.yaml | 58 +++++++++++++++++++ ...nded-c8561a6d177892f154af9b7c10500c01.yaml | 58 +++++++++++++++++++ ...-box-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...-box-ac3838985ebca1d5500d58f039c66d50.yaml | 58 +++++++++++++++++++ ...-box-cb0d923b3f440d22cb21cc4f45b630a7.yaml | 58 +++++++++++++++++++ ...-box-d41f2371740382f5fe12f9b2729e260d.yaml | 58 +++++++++++++++++++ ...-box-e218b5d377826292a46ae91919228725.yaml | 58 +++++++++++++++++++ ...rica-ffdf4101e49b7fe440cdcd6bd244561e.yaml | 58 +++++++++++++++++++ ...down-b77c5c4f0c4cc702e5668e3bdfcce6f7.yaml | 58 +++++++++++++++++++ ...ator-143ae01b8a1b2078f71457c5b9d33fd9.yaml | 58 +++++++++++++++++++ ...gram-8e1c97786e963545019da486b6c3016e.yaml | 58 +++++++++++++++++++ ...gram-eb26b5bf441be9e4d97a8d78bbf90a65.yaml | 58 +++++++++++++++++++ ...tton-058f94a7273615ab6b78bfcaa4aea16c.yaml | 58 +++++++++++++++++++ ...s-pp-4496d2c0aaf13ede3ac3df8bc6db376f.yaml | 58 +++++++++++++++++++ ...-zen-110c4d87a801a711ff37411fb7b2a2b0.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ocks-b6fdd6c618695aebb9014f9dd705ea55.yaml | 58 +++++++++++++++++++ ...ocks-b8cbfee14c6231d74725cad73dbf5ac2.yaml | 58 +++++++++++++++++++ ...ypal-33bb20c48315e8c455839c78ef66e1b1.yaml | 58 +++++++++++++++++++ ...ypal-4612690a2b5b9e2adc467251d2200410.yaml | 58 +++++++++++++++++++ ...ypal-beee0c1304e0da531df84f8029d7259b.yaml | 58 +++++++++++++++++++ ...ypal-c94ec523ba103bad6a372ee7e463bd4f.yaml | 58 +++++++++++++++++++ ...ypal-e62ea330281841ac90814f51a2e6e358.yaml | 58 +++++++++++++++++++ ...lder-7cb4dee16a7431d0aa1859c958e33f53.yaml | 58 +++++++++++++++++++ ...lery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...tore-49c455ef861d32e49a005dd8ccd33e8b.yaml | 58 +++++++++++++++++++ ...tore-536b5e2cfc2a08abc865e016e5e97cd1.yaml | 58 +++++++++++++++++++ ...tore-9bd2beaa8992d85480d64ba226ec3b74.yaml | 58 +++++++++++++++++++ ...ndar-00da8a794f6f0b78648d305ed7e6dd04.yaml | 58 +++++++++++++++++++ ...ndar-0bfff3a27e6168b67b0fbc2473230506.yaml | 58 +++++++++++++++++++ ...ndar-184f300745326a1b6a8a5b5650121584.yaml | 58 +++++++++++++++++++ ...ndar-43693b5261d7e0528a3c7e646e9f1d6c.yaml | 58 +++++++++++++++++++ ...ndar-7f3bbc96f4be604cf6114ca81b08ca3f.yaml | 58 +++++++++++++++++++ ...olls-49a01bc79b6fdfb5a76a16441b827dc7.yaml | 58 +++++++++++++++++++ ...olls-51f0935847f259142e562e47f27b4145.yaml | 58 +++++++++++++++++++ ...olls-87b936573487d2a82b44f72e3ce646b8.yaml | 58 +++++++++++++++++++ ...olls-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml | 58 +++++++++++++++++++ ...olls-e2d507e5368356b0023e6347145e20b6.yaml | 58 +++++++++++++++++++ ...ndar-264c8b14fe403c6cf4002aa9134524ee.yaml | 58 +++++++++++++++++++ ...tter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ .../cpl-8f2565646e20d8caed1d049227635516.yaml | 58 +++++++++++++++++++ ...nion-1cb9694a410b975eefa3459fd9bd670b.yaml | 58 +++++++++++++++++++ ...nion-4e988801588842dadfebdadb774a426e.yaml | 58 +++++++++++++++++++ ...nion-a426d8604178ea06fd441814d816d538.yaml | 58 +++++++++++++++++++ ...ypes-20277bf2aad5677f3f9bd4eac5f630c9.yaml | 58 +++++++++++++++++++ ...odes-95b40623fcd88a0f55eead954c03a159.yaml | 58 +++++++++++++++++++ ...odes-f0281688d74f818cfad7334eba1cc561.yaml | 58 +++++++++++++++++++ ...usel-690a69806e87114ee81f4affa15549cd.yaml | 58 +++++++++++++++++++ ...usel-e983f7dc1644cbc367524173b0bfd556.yaml | 58 +++++++++++++++++++ ...code-62cbd308ef66719516de2026de43669c.yaml | 58 +++++++++++++++++++ ...code-f4d676108d638d4ae50c1c8a6da03c12.yaml | 58 +++++++++++++++++++ ...kers-0fbf5aeb9219f7fac5b857b809c640a1.yaml | 58 +++++++++++++++++++ ...tons-10ee5b6870d72574cd2ceacdf76db39e.yaml | 58 +++++++++++++++++++ ...data-ba3212d4cf255eee79a1e340ae3eb317.yaml | 58 +++++++++++++++++++ ...hter-3b77b21efbe327e0220e81411dd8c94e.yaml | 58 +++++++++++++++++++ ...hter-7a054d832bcd0e60bc0c72161b137fa9.yaml | 58 +++++++++++++++++++ ...hter-8031f45dad82be856d692bf4a86bc7d0.yaml | 58 +++++++++++++++++++ ...hter-a24d4eae978465f1c7539ec2afb5d89a.yaml | 58 +++++++++++++++++++ ...hter-b80148cb4f7c1ba75ee55b0181d810f7.yaml | 58 +++++++++++++++++++ ...hter-d47618ad7b3ff873ed22aa3e5efab3e0.yaml | 58 +++++++++++++++++++ ...bone-cbc819d180f6774324bc2ec20985637c.yaml | 58 +++++++++++++++++++ ...bone-fc9bfd70a66ba0377d47424bbce696e0.yaml | 58 +++++++++++++++++++ ...heme-aba320cfa8d843f5c52f809a638b1428.yaml | 58 +++++++++++++++++++ ...ntor-20f6bee077964f1739b79a57d0927952.yaml | 58 +++++++++++++++++++ ...ider-57ebfd8af23d19d638563ef7a40bf411.yaml | 58 +++++++++++++++++++ ...tact-20e49640b2d172fe60c3e66f7c5c2961.yaml | 58 +++++++++++++++++++ ...tact-883ac125446954bc56b63a659310e326.yaml | 58 +++++++++++++++++++ ...tact-f890a87599d700193f94857dcecd8b3d.yaml | 58 +++++++++++++++++++ ...cker-1adc9982ddc5e20d6e411f5dbc1caf02.yaml | 58 +++++++++++++++++++ ...cial-bed2d5e11413b5522569fa9192fcca60.yaml | 58 +++++++++++++++++++ ...ider-11611891705bb620b2fbc93feb153c11.yaml | 58 +++++++++++++++++++ ...ider-4ff3f91a93b3247cebd7620836598b68.yaml | 58 +++++++++++++++++++ ...ider-c49e2e06de0a40bb63220fc2a17c181a.yaml | 58 +++++++++++++++++++ ...ider-f264ee9267574176bc2aef0a4dad14ac.yaml | 58 +++++++++++++++++++ ...risp-2b1c5b57df30a34984198b5c1016c519.yaml | 58 +++++++++++++++++++ ...risp-3e9db5ca5f74e03bc884849a472e7363.yaml | 58 +++++++++++++++++++ ...cita-6c0eb1e7574e09726dcd946f510854bd.yaml | 58 +++++++++++++++++++ ...cita-8a9c908ec048eb5db70aedddafa15d74.yaml | 58 +++++++++++++++++++ ...hips-f670252b93de10e17e15c533cbe48519.yaml | 58 +++++++++++++++++++ ...orms-5b58119863530e15cb2cb1eb0cca6c45.yaml | 58 +++++++++++++++++++ ...orms-6323dfe519d667ba98cb2cb3a674b49d.yaml | 58 +++++++++++++++++++ ...orms-84e13e367dca55445350e25af8c4c3b9.yaml | 58 +++++++++++++++++++ ...orms-aa8353adb3620cf0044ffd866cd1ea46.yaml | 58 +++++++++++++++++++ ...orms-c0c58834ca90dc6201d9f559b76ed213.yaml | 58 +++++++++++++++++++ ...orms-f99e157b145b06140fa576ea488dbce3.yaml | 58 +++++++++++++++++++ ...rony-0a163e61bcc69936d2e5119ad16f6e94.yaml | 58 +++++++++++++++++++ ...rony-44c866df4156e18647ea081befd62b4f.yaml | 58 +++++++++++++++++++ ...nker-6efe820f12fb9f3137c56cee070730c7.yaml | 58 +++++++++++++++++++ ...-rss-477b707e65a4938013b3152b7f4ee656.yaml | 58 +++++++++++++++++++ ...ress-66a96d7ee2557e873f3475f1e86dd229.yaml | 58 +++++++++++++++++++ ...ider-059632153ccb2185cede1112e5adabf5.yaml | 58 +++++++++++++++++++ ...dget-306b847d2e6035c47912eb7c67152660.yaml | 58 +++++++++++++++++++ ...dget-56a618b5c71170cabc6b19e08404193b.yaml | 58 +++++++++++++++++++ ...ency-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ency-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...-box-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...-box-6c67c1bd228e1520f2b8d5bf20bbed3b.yaml | 58 +++++++++++++++++++ ...dget-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...dget-ad516406623ae6ecf9dab15916a4b830.yaml | 58 +++++++++++++++++++ ...dget-bdc2096d72e0a42fecec9d81de2115f0.yaml | 58 +++++++++++++++++++ ...dget-d5383d4e717242611eb588cd04425c5a.yaml | 58 +++++++++++++++++++ ...ices-c5c657b48dcb3ae9c728f121d2d0aa85.yaml | 58 +++++++++++++++++++ ...list-204c631f27f2150998aee71c01b37779.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...pack-b49e5a0564db1b49d18da40f1e13555b.yaml | 58 +++++++++++++++++++ ...pack-e0f9049a8a7ec17a668bbeb16a71bba1.yaml | 58 +++++++++++++++++++ ...aphp-6fe350acb2d7b08afd5696f747d0413e.yaml | 58 +++++++++++++++++++ ...rite-2707f1b08a4a34c3e1947ca39cd73e06.yaml | 58 +++++++++++++++++++ ...ress-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...hero-c65a895d58bf856765c9e28ed468f2ea.yaml | 58 +++++++++++++++++++ ...lbox-72b05538a975fe47e341442f2bdeeabf.yaml | 58 +++++++++++++++++++ ...lbox-b07fb9d1ee02580a27668ece326b4ac3.yaml | 58 +++++++++++++++++++ ...ager-61c2b811bcc6041f6a82b35f50d9b2b3.yaml | 58 +++++++++++++++++++ ...ords-035f7dbab49cd7102e78202706c7a9af.yaml | 58 +++++++++++++++++++ ...ords-8fa029836e390a41910a91e1df99c734.yaml | 58 +++++++++++++++++++ ...port-2adda436491ee9e5c0c2e9ccffab9afe.yaml | 58 +++++++++++++++++++ ...port-888fd755a466f61b6b5975477e6bfb5b.yaml | 58 +++++++++++++++++++ ...rter-87391130a959fbd6c64c577ce3bb974c.yaml | 58 +++++++++++++++++++ ...upon-f4d3fb2528b229e51486f812ddf75b90.yaml | 58 +++++++++++++++++++ ...erce-62cb33b4f205d311d390e62fba25cd36.yaml | 58 +++++++++++++++++++ ...gdpr-949e3c48d41e3ab6ec3beff5ca3c241d.yaml | 58 +++++++++++++++++++ .../cta-0fa73cd35698d01b3ea111a06727a347.yaml | 58 +++++++++++++++++++ .../cta-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml | 58 +++++++++++++++++++ ...erce-7f12ff16273eb990bb45ef4156cd86e1.yaml | 58 +++++++++++++++++++ ...ider-bee7ee097d9c2854b2e0df3652ff1065.yaml | 58 +++++++++++++++++++ ...work-c805577cc74fac959884880eefb7ff71.yaml | 58 +++++++++++++++++++ ...kout-36e8e0f9a5511d98ca66f925304a3a33.yaml | 58 +++++++++++++++++++ ...ject-b758c0c37fd1d990bf9268c1c848eb10.yaml | 58 +++++++++++++++++++ ...ator-d34575a4acf043c178e1c507a8583e51.yaml | 58 +++++++++++++++++++ ...dget-07141f22dbd69d711616f0823783fd10.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...erce-1435e710f882ca24fd63e6f30e30c39b.yaml | 58 +++++++++++++++++++ ...cher-181f8727807ba64411fbc27b7d06a7f7.yaml | 58 +++++++++++++++++++ ...cher-24c409175b75dd74bfd113d5f584dc08.yaml | 58 +++++++++++++++++++ ...cher-2d27e10efdfec8fc58acf4cf64107b4a.yaml | 58 +++++++++++++++++++ ...cher-666b2fb2c881bde28dcf6538f4e79c83.yaml | 58 +++++++++++++++++++ ...cher-8355052ed50773dfc024174bf5f762ad.yaml | 58 +++++++++++++++++++ ...cher-d88f90595d62f553e29356fc831883af.yaml | 58 +++++++++++++++++++ ...cher-fc8e4381ea5ebd79c418e0830ad7aa41.yaml | 58 +++++++++++++++++++ ...erce-57f78642fa9cede94bd35b0316b99b78.yaml | 58 +++++++++++++++++++ ...book-538fbd9fdeb83d5c5aab2ed683914a16.yaml | 58 +++++++++++++++++++ ...ypes-8cec5dcdfbdfde2c1732a5fcb98c3da8.yaml | 58 +++++++++++++++++++ ...name-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...tain-546cde9b90f17421631d383528055da0.yaml | 58 +++++++++++++++++++ ...tain-c8c8f457de7ea311efa222b66a51a434.yaml | 58 +++++++++++++++++++ ...-pro-030f26819c32911a473f408d586efb1e.yaml | 58 +++++++++++++++++++ ...-pro-200c405b0773aa3952229a5ad35202ef.yaml | 58 +++++++++++++++++++ ...-pro-67e917a11cbf398c051530dabd0fa5db.yaml | 58 +++++++++++++++++++ ...-pro-68585d4bba03002044d20ac970108ad9.yaml | 58 +++++++++++++++++++ ...-pro-96f5c1ab6101dad2bb86f8e89d978872.yaml | 58 +++++++++++++++++++ ...-pro-a40f47bd3665fa9aac14a11f65a2ad01.yaml | 58 +++++++++++++++++++ ...-pro-b5d35374c7a9af094e4ec14c748dcfa5.yaml | 58 +++++++++++++++++++ ...-pro-c4be63bba4a89fa3e83779737577feda.yaml | 58 +++++++++++++++++++ ...-pro-f1094be99ae561ef22eac5b48376079f.yaml | 58 +++++++++++++++++++ ...user-f2aee954ea519a4193f03af67cb64cc8.yaml | 58 +++++++++++++++++++ ...zest-0e96d2ec3c953050a17aaa45bf8227cd.yaml | 58 +++++++++++++++++++ ...page-991c1eac5fa7c61140560d60fd4bd8b2.yaml | 58 +++++++++++++++++++ ...ound-e463f937915a727f73f93451bc29c7b3.yaml | 58 +++++++++++++++++++ ...ners-3a4fdaa86716f7a2bccd54fbc792c9e7.yaml | 58 +++++++++++++++++++ ...ners-75a7478c504eb31e010492e08d11afbc.yaml | 58 +++++++++++++++++++ ...erms-59797dde213a6367a6157622c3715782.yaml | 58 +++++++++++++++++++ ...odes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-26658d0497122e0a7345c841c1d21163.yaml | 58 +++++++++++++++++++ ...orms-b5107e8a16fdf42082a09176739d6a43.yaml | 58 +++++++++++++++++++ ...orms-cc09a89f63ab3cefb7813241a6ecaf00.yaml | 58 +++++++++++++++++++ ...ntry-d5a15b7cded52d19f32afbdd2169bb8f.yaml | 58 +++++++++++++++++++ ...code-250d58918649c83e91a9349c1cb1cbf0.yaml | 58 +++++++++++++++++++ ...code-2c26192ebe7847230519e6e8ccb48b5f.yaml | 58 +++++++++++++++++++ ...code-bdd19c036429e94932241df6aef820bd.yaml | 58 +++++++++++++++++++ ...code-ef34cbe0110e2c6603d8d105d71a9566.yaml | 58 +++++++++++++++++++ ...code-fe4470deb32fffc7ae711831b5c4f60c.yaml | 58 +++++++++++++++++++ ...ager-262dd6c0036b365e35ff5544b3d1cf02.yaml | 58 +++++++++++++++++++ ...ager-b81d401412f069e93cf6d2de27788cec.yaml | 58 +++++++++++++++++++ ...-css-ae09c1b4732804e06d23d0fb90974789.yaml | 58 +++++++++++++++++++ ...s-js-237f33dd283cbe8ba991ef6c6d099f49.yaml | 58 +++++++++++++++++++ ...-pro-ee68c39b627e562f2e3f279eade2d8f3.yaml | 58 +++++++++++++++++++ ...gets-521091f698c90705cd994fe26c1eef68.yaml | 58 +++++++++++++++++++ ...ions-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...feed-167f18c0fe5e035801a709b220b7d533.yaml | 58 +++++++++++++++++++ ...feed-4c7bbe6117155e4a798748fa2ed8fb9c.yaml | 58 +++++++++++++++++++ ...feed-4f470840b5c22d9fdd8f597a9956aef0.yaml | 58 +++++++++++++++++++ ...feed-58a423ad62b9e5f8da38c911a8b01c5e.yaml | 58 +++++++++++++++++++ ...feed-ac43cf44566479227a4aa05f1f51c953.yaml | 58 +++++++++++++++++++ ...feed-da6dd99d1493b082c05d60ab888f9ef0.yaml | 58 +++++++++++++++++++ ...itor-5dbb9b01c1ce63e54b37aeec51a21a8e.yaml | 58 +++++++++++++++++++ ...nder-38fb53416dee6ab7b6bba5cadf55c4c5.yaml | 58 +++++++++++++++++++ ...ager-1b076d88024e9e8fa50fb517fb49e6d5.yaml | 58 +++++++++++++++++++ ...ager-c6eebad0122883aa540363f1389d9ced.yaml | 58 +++++++++++++++++++ ...uite-30ced7d36e2903b8ecf83d1c6ae8e869.yaml | 58 +++++++++++++++++++ ...uite-5914d2a62c6e9fda2e52358bd6a051ee.yaml | 58 +++++++++++++++++++ ...uite-aeb1af030c75596a2eb738838b5e8bf8.yaml | 58 +++++++++++++++++++ ...uite-f388cd40277e7ac72bbf02fcf8235c63.yaml | 58 +++++++++++++++++++ ...uite-f70de88be0d0ac1b3e5a362aa6fdf31c.yaml | 58 +++++++++++++++++++ ...late-41a8bca5b4e509ff5992617799743aa0.yaml | 58 +++++++++++++++++++ ...late-994931528097feea63f63eaaf2d7d1d0.yaml | 58 +++++++++++++++++++ ...late-bf719546b14904a6ed90c49ad64d0d09.yaml | 58 +++++++++++++++++++ ...late-d21e7c2b8075bc32648e9e728716b83f.yaml | 58 +++++++++++++++++++ ...late-e43554bdd9278f30da878de76ec696d2.yaml | 58 +++++++++++++++++++ ...arch-f6d418df63a84992a5e6e409836b9a8e.yaml | 58 +++++++++++++++++++ ...code-8199a4f2b40a6eabf0daf50bba86ea3b.yaml | 58 +++++++++++++++++++ ...ader-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...bles-1e3e94ac66c9cccf9af54623829f9f1e.yaml | 58 +++++++++++++++++++ ...ages-efdfea6c2ba24e39c6bc0574220a9327.yaml | 58 +++++++++++++++++++ ...agic-c0cb327a973fcb4e19ac20c22cf757a3.yaml | 58 +++++++++++++++++++ ...ogin-325931d9fc1c27761908e3875605b580.yaml | 58 +++++++++++++++++++ ...port-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...rect-58218c3064ab4e32ea67258adcb97a88.yaml | 58 +++++++++++++++++++ ...-map-afd7cbc1a6da1a4ae770134f7fa61d59.yaml | 58 +++++++++++++++++++ ...etas-bfcebe2d4bbc5af7082ecf54e71037c9.yaml | 58 +++++++++++++++++++ ...lete-38be090459bf4011b3b41398d60796a6.yaml | 58 +++++++++++++++++++ ...erce-8d1f98a443fa11a68eb0fbc9dc6290fa.yaml | 58 +++++++++++++++++++ ...plus-6a0d7503e007dc4edef85efcc548b100.yaml | 58 +++++++++++++++++++ ...erce-74ba5cc85102289a5d0b78a359268c6a.yaml | 58 +++++++++++++++++++ ...erce-8f61fbaad0ace89497c5a7515dc4a1eb.yaml | 58 +++++++++++++++++++ ...erce-2862da944ba4b374cef11881cc898ccb.yaml | 58 +++++++++++++++++++ ...erce-a9ddfb16bfebca41780e91a8896bacce.yaml | 58 +++++++++++++++++++ ...erce-bab11b77c0b278513f67c7444868950c.yaml | 58 +++++++++++++++++++ ...corp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...inks-a4a1da4d7b74087a323eb167fd7b89be.yaml | 58 +++++++++++++++++++ ...inks-b5323eb3191a74d0ae4ca412560414da.yaml | 58 +++++++++++++++++++ ...ager-2ec0e7698cdea1d83725ecb0fba1cce8.yaml | 58 +++++++++++++++++++ ...ator-b832c46935cda704a801fdf109478436.yaml | 58 +++++++++++++++++++ ...code-7a94ec5884e06f0a302f2bb4d1ea7e80.yaml | 58 +++++++++++++++++++ ...late-41234e0f9201b9670d0979855b89255d.yaml | 58 +++++++++++++++++++ ...ions-e40fd02f8747cfe679a9add88aabc8af.yaml | 58 +++++++++++++++++++ ...e-ui-797454d6297b04e0aa32a4dcc6b7a524.yaml | 58 +++++++++++++++++++ ...e-ui-cc0bb9dcf67e5af12d7fa45c43bf04f1.yaml | 58 +++++++++++++++++++ ...ypes-03278634b9340d2d49106fefa161e7cd.yaml | 58 +++++++++++++++++++ ...ypes-134091eb792475d128936c227b127601.yaml | 58 +++++++++++++++++++ ...ypes-dc2b0f4dde9149582362d961339fc430.yaml | 58 +++++++++++++++++++ ...ator-ba5dfaad8cf69b254b291ccd03ab7c28.yaml | 58 +++++++++++++++++++ ...tcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tcha-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ager-03faf5c8e4483bcb72677008477fdf8f.yaml | 58 +++++++++++++++++++ ...ager-12554d58fa3f58e451e08d638496a899.yaml | 58 +++++++++++++++++++ ...ager-161c815356a117f2a7d79bcb200b7ff9.yaml | 58 +++++++++++++++++++ ...ager-1ae4dd533f16291d906e419f9b6a90b5.yaml | 58 +++++++++++++++++++ ...ager-1d190b0241a92bf4c0712f3b939e7393.yaml | 58 +++++++++++++++++++ ...ager-405ccafee5e024bd55baaadb07fd61d0.yaml | 58 +++++++++++++++++++ ...ager-49f8b17fd3f7202d469cd36057801698.yaml | 58 +++++++++++++++++++ ...ager-4a6f7a73f2b2510b444077fe0160d05b.yaml | 58 +++++++++++++++++++ ...ager-4ebf8466ab7647227779ddf8d6ac3494.yaml | 58 +++++++++++++++++++ ...ager-560537cf7e37552cc5fc20cab905a672.yaml | 58 +++++++++++++++++++ ...ager-5b9008ba421c01f99bc8a2b66d06c955.yaml | 58 +++++++++++++++++++ ...ager-5d65a7992972ebe63734d1fdf7ce6dcd.yaml | 58 +++++++++++++++++++ ...ager-66c19504108f80a4369db438b2de733d.yaml | 58 +++++++++++++++++++ ...ager-750b74705bdff8d7fe8b29d226f6a7fb.yaml | 58 +++++++++++++++++++ ...ager-7db9573a3e8af958ed29c7bf6f04dd8e.yaml | 58 +++++++++++++++++++ ...ager-813e709d3dd48a31f481e32297dc8503.yaml | 58 +++++++++++++++++++ ...ager-85fa0155b108ebd593447d4fb927111e.yaml | 58 +++++++++++++++++++ ...ager-8e70f80b9a0aef35cef45454a2e20325.yaml | 58 +++++++++++++++++++ ...ager-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml | 58 +++++++++++++++++++ ...ager-98507312be61996148f27924ae96d00e.yaml | 58 +++++++++++++++++++ ...ager-a93b511e834ddd2e10f787cf551e0214.yaml | 58 +++++++++++++++++++ ...ager-bb05c43d4858d2cd6e99aeda4ad6534f.yaml | 58 +++++++++++++++++++ ...ager-bc39873d86ab4150675c8c4fc220361f.yaml | 58 +++++++++++++++++++ ...ager-d2f77ed0cac474a6437fa2cee0cecb6e.yaml | 58 +++++++++++++++++++ ...ager-e04842ca04263f6508eb41a6732d11e2.yaml | 58 +++++++++++++++++++ ...ager-e518e10775fef314a3432a0ef6a78cf1.yaml | 58 +++++++++++++++++++ ...ager-e8759c1eba32b6985f221d449c7045d7.yaml | 58 +++++++++++++++++++ ...ager-eab40a7edf5f2e1a98131d79813fdf48.yaml | 58 +++++++++++++++++++ ...ager-f0faf18308a797e616df68af878bf053.yaml | 58 +++++++++++++++++++ ...ager-f7a999ea17927c5e9ebebc775b43318c.yaml | 58 +++++++++++++++++++ ...ager-fcd65c8735954219062dc7bc27977dbf.yaml | 58 +++++++++++++++++++ ...gner-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...ugin-ea2aae884b82aaf10a9b6d9e08e6be98.yaml | 58 +++++++++++++++++++ ...stem-503f25d9a3f350dbb09e33967b718028.yaml | 58 +++++++++++++++++++ ...stem-6c2c1aea05bf11797b06068cda5033db.yaml | 58 +++++++++++++++++++ ...ings-73efd5c8bcd4c1bfe4df6f8b395749d7.yaml | 58 +++++++++++++++++++ ...ebar-e1e48d10961945b3a2fc571529bab9c7.yaml | 58 +++++++++++++++++++ ...bars-4274bbe3c0d27bb54b9223f6af8827e7.yaml | 58 +++++++++++++++++++ ...bars-aea09105f0f61d6ceb820ac11ed09e51.yaml | 58 +++++++++++++++++++ ...bars-e7cf3375d8a38efd1be42356dbb74de4.yaml | 58 +++++++++++++++++++ ...-rss-c55993b506252ecc7087422b008f250c.yaml | 58 +++++++++++++++++++ ...enus-f50829abfd0ab0292550a897d206e4fb.yaml | 58 +++++++++++++++++++ ...lors-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...tton-f62cbc07d0c97caefc6751d0180dc663.yaml | 58 +++++++++++++++++++ ...eeds-05b7197cf734fac5f20338febaf0428b.yaml | 58 +++++++++++++++++++ ...eeds-0787c7b553a6a5c88dae74eba6fc4fd1.yaml | 58 +++++++++++++++++++ ...eeds-ac43cf44566479227a4aa05f1f51c953.yaml | 58 +++++++++++++++++++ ...-css-6543643d1ea175fa61a5d758cd6fec45.yaml | 58 +++++++++++++++++++ ...area-5946d00520fcf71340c79730911fdae4.yaml | 58 +++++++++++++++++++ ...area-638180480b8e5ea2f7bb663f12fd87db.yaml | 58 +++++++++++++++++++ ...area-64194ddc20aa7461447b4d03da264c07.yaml | 58 +++++++++++++++++++ ...area-88e7e4a086d6356c7121d61d5de285a2.yaml | 58 +++++++++++++++++++ ...area-f9650549fbf42fb03bc206714accabe1.yaml | 58 +++++++++++++++++++ ...book-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...erce-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...erce-03f52e4edfa7408cb52c9d72fc195004.yaml | 58 +++++++++++++++++++ ...erce-087ab6a6409aed64b5c6d0e8d25ec639.yaml | 58 +++++++++++++++++++ ...erce-2d6698f89f32609adbc6e12eed98ca62.yaml | 58 +++++++++++++++++++ ...erce-33080b0d5149a7811a842330fcd02a9a.yaml | 58 +++++++++++++++++++ ...erce-34547cf35ff55eca1aec11c82238db2e.yaml | 58 +++++++++++++++++++ ...erce-5b09804fb0f54f039756dc2dbfaca10d.yaml | 58 +++++++++++++++++++ ...erce-704e8a4e646ad70dffa4b5a4a231b7e5.yaml | 58 +++++++++++++++++++ ...erce-72807f145d4d787ee0d78e0f3adf0196.yaml | 58 +++++++++++++++++++ ...erce-aba3e00a2a63250607e79d5288cb4fd8.yaml | 58 +++++++++++++++++++ ...erce-b2de750c81241fb9f0e6cca06ae6f2a3.yaml | 58 +++++++++++++++++++ ...erce-b617065e23c3fb2d068c8fc7c1e18a76.yaml | 58 +++++++++++++++++++ ...erce-b9103fa25ff1df562a7ef31b16b8ad03.yaml | 58 +++++++++++++++++++ ...erce-c4c5307df5e11c4cb59893ef8ef58c8a.yaml | 58 +++++++++++++++++++ ...erce-ccbfe5f4150b2a60a0b0de9e47423628.yaml | 58 +++++++++++++++++++ ...erce-d87bb9dcf525660329cf7bc1593d3596.yaml | 58 +++++++++++++++++++ ...mify-e6ebb86ebbdc2c2465c0fad6241913af.yaml | 58 +++++++++++++++++++ ...ites-c0b24144ee5f50c90a86d55930aab983.yaml | 58 +++++++++++++++++++ ...y-v2-43a2744fa82afcde1f284cbd5aa55b86.yaml | 58 +++++++++++++++++++ ...ogin-aa4710021e6cea364e343185a5562523.yaml | 58 +++++++++++++++++++ ...mage-cdd44eb1f0b901b8f5061171a068c613.yaml | 58 +++++++++++++++++++ ...erce-c07ce33288471d0dce242b9d0edc14b3.yaml | 58 +++++++++++++++++++ ...port-6aade0ab1cd3e84f1c328d12c13c28e5.yaml | 58 +++++++++++++++++++ ...port-c7389b248c40364239ac72c9e1e9985e.yaml | 58 +++++++++++++++++++ ...icly-62e4a961ffac0b881f8af1cc15505b69.yaml | 58 +++++++++++++++++++ ...nion-3712f3d2b17172eb0c737744e9767b9d.yaml | 58 +++++++++++++++++++ ...dier-a97afd1d52e8ec7c0950d3b4bfa966dc.yaml | 58 +++++++++++++++++++ ...-key-589eb0de3c09a1f6b4b85bf3ecf20784.yaml | 58 +++++++++++++++++++ ...-key-ebb0aac77c202e0b9298617914b34a43.yaml | 58 +++++++++++++++++++ ...ider-225f7f3db7dcaeda4fe6b0e7795cf610.yaml | 58 +++++++++++++++++++ ...tify-e785890064729677b76cdb50e8ed4af9.yaml | 58 +++++++++++++++++++ ...3lat-dfe9d916adc4339b514e6f246a1ff502.yaml | 58 +++++++++++++++++++ ...nder-d8cba654f3eadea699e2d001c5aee33d.yaml | 58 +++++++++++++++++++ ...gain-416f60ea7c83625605d6748aec7fe39d.yaml | 58 +++++++++++++++++++ ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-5325e87d52794ad590ce110a225276ac.yaml | 58 +++++++++++++++++++ ...eric-203fbe5cb049e55d1de84283cabe5bc1.yaml | 58 +++++++++++++++++++ ...ator-01b11fa90adbc20afc1174f440091c8c.yaml | 58 +++++++++++++++++++ ...ator-bc0818b74a63c7ccc5e71ee4877ab3c0.yaml | 58 +++++++++++++++++++ ...ques-1924e010841990f8a5472d7ce0d4475a.yaml | 58 +++++++++++++++++++ ...ques-1c709780f30cba2883c1f114a8ebe301.yaml | 58 +++++++++++++++++++ ...ques-2af4f586d3d7a602ecd50af91c2499d1.yaml | 58 +++++++++++++++++++ ...ques-3824f011eab5214f502db246222a2a64.yaml | 58 +++++++++++++++++++ ...ques-efb19c791feda5e8b127998d60bcf234.yaml | 58 +++++++++++++++++++ ...trwa-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ices-9018d0e2961530505f24475e2d5e362f.yaml | 58 +++++++++++++++++++ ...gcal-1c6832c32d7ec7d1a800137a443af3a0.yaml | 58 +++++++++++++++++++ ...mode-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...mode-1955d2bf9e3369181a1e0d457e568aab.yaml | 58 +++++++++++++++++++ ...mode-854c79af36aba0da3346494de4eaf39a.yaml | 58 +++++++++++++++++++ ...mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...mode-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...list-59a2c5c80739fa0eba22f8a13d17e144.yaml | 58 +++++++++++++++++++ ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ntor-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...ntor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...uite-2f94c3f833650d494dcd027c8f5b2a1d.yaml | 58 +++++++++++++++++++ ...uite-669f088fb31a1c784e368a7e51016243.yaml | 58 +++++++++++++++++++ ...-cpt-38a12cf4a56d072e88962074fdeb9b47.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...stic-22fbc746f561f8f03289b13752af9220.yaml | 58 +++++++++++++++++++ ...stic-384cfba7d4e3422564ffd94f08c53230.yaml | 58 +++++++++++++++++++ ...stic-3ca2d0288841fb102eec504b49f4dc79.yaml | 58 +++++++++++++++++++ ...stic-7bb51482172811e3c51edf370ad2cde3.yaml | 58 +++++++++++++++++++ ...stic-c639be60406ab3b6aefe17af97aa1a3c.yaml | 58 +++++++++++++++++++ ...stic-c974ccf1587cec2eccea9add62a9571f.yaml | 58 +++++++++++++++++++ ...kups-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml | 58 +++++++++++++++++++ ...wser-e2758e6d7a956b70bbb3456d32eb61ef.yaml | 58 +++++++++++++++++++ ...aner-8497dd1697d238f17e5ca2e374ee6979.yaml | 58 +++++++++++++++++++ ...-fix-fcc1a4da03b48b602844cc8edd8898d5.yaml | 58 +++++++++++++++++++ ...-cf7-95d14048da02f26059f2e07a39b028ec.yaml | 58 +++++++++++++++++++ ...peek-f5177dce5f851a784de6243f1a4812de.yaml | 58 +++++++++++++++++++ ...sync-2aec16dd65c0e6d2c91755c0d886efa6.yaml | 58 +++++++++++++++++++ ...ield-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...arch-00d2f835919a4763491bb6e0afc99ba1.yaml | 58 +++++++++++++++++++ ...arch-7110928090e9f383ac11ab04f9355ce4.yaml | 58 +++++++++++++++++++ ...eams-a68d2dddb296088b38bf42abce9933d3.yaml | 58 +++++++++++++++++++ ...ckup-3d0fd8af5f0a8aec16cd6e87b25d281e.yaml | 58 +++++++++++++++++++ ...lite-801a0dacfdb031773ac30c73693f41e6.yaml | 58 +++++++++++++++++++ ...ndor-050701771ca0e37751fe39d80669e4d1.yaml | 58 +++++++++++++++++++ ...ndor-0cabe3cbdd9087635cb4a8e92f2b6354.yaml | 58 +++++++++++++++++++ ...ndor-115f84062be09f43cd6446e8e537d648.yaml | 58 +++++++++++++++++++ ...ndor-2a540cf7d36146a7007600dc4f010b65.yaml | 58 +++++++++++++++++++ ...ndor-3813d137aafb06301157470b18da5221.yaml | 58 +++++++++++++++++++ ...ndor-8cf78197e7d698f2f23c8fbd16dab60a.yaml | 58 +++++++++++++++++++ ...ndor-c1eaaf83160125db463b30ba85a87fdc.yaml | 58 +++++++++++++++++++ ...ndor-d57f8fd6151dd1d65a65a746b8a04b7a.yaml | 58 +++++++++++++++++++ ...ndor-d637554edf1f6a8734fd4d40ddaa76fb.yaml | 58 +++++++++++++++++++ ...ndor-df1e63906c41c42e055b484618d26045.yaml | 58 +++++++++++++++++++ ...ndor-e66894a498d5cc4419643171ae03b827.yaml | 58 +++++++++++++++++++ ...ndor-fb02750d498a9fe091fa40a841ae2cde.yaml | 58 +++++++++++++++++++ ...usel-90dc0d96ef7711389c28489eadab8c4d.yaml | 58 +++++++++++++++++++ ...ting-ab9e9f7a6a475ad09ac9f13cde54db19.yaml | 58 +++++++++++++++++++ ...-day-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-88fee3d667cc75ecb76505d8552cdca3.yaml | 58 +++++++++++++++++++ ...lite-68faa1f3e16f9348cbcda9eee2cb1dfc.yaml | 58 +++++++++++++++++++ ...lite-6fd235aefa59090c5fd7d5db3ca17c7f.yaml | 58 +++++++++++++++++++ ...tant-7341f9a401e387eb541b7f0ce957b3d9.yaml | 58 +++++++++++++++++++ ...tant-c4cb405587c7aac808cc9a0330f4a287.yaml | 58 +++++++++++++++++++ ...-bar-9f879610fe035743b89a5d4d742c5ccf.yaml | 58 +++++++++++++++++++ ...ress-cc44bf442001983fd2f67014928f8289.yaml | 58 +++++++++++++++++++ ...ebug-d2a83c1dca589216a7517243ae0b440b.yaml | 58 +++++++++++++++++++ ...time-1bf084d49ccfb289b9614422c0f6cfe7.yaml | 58 +++++++++++++++++++ ...ager-5aedf0ec7cb5703a0c4feb9fa97466c2.yaml | 58 +++++++++++++++++++ ...ager-815fdb5c2ecc295dab6e7b3bac455dda.yaml | 58 +++++++++++++++++++ ...ager-b42518648b89a6c8b5bea17f9a27b0ef.yaml | 58 +++++++++++++++++++ ...ager-cdec87c9979cc4a76acefcf4b849c659.yaml | 58 +++++++++++++++++++ ...ager-f18de85deaea25c6fbd01540999d6426.yaml | 58 +++++++++++++++++++ ...data-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml | 58 +++++++++++++++++++ ...alog-2701fe0e6794c06d119a81cdcc54c2d8.yaml | 58 +++++++++++++++++++ ...alog-4cad88483ff2a2bf5cf9989b8721b221.yaml | 58 +++++++++++++++++++ ...-sms-09af6d4d8c4435a3e0935a8eb5df6c7f.yaml | 58 +++++++++++++++++++ ...izer-1f3875e7da43782ec8defe59eb7968b1.yaml | 58 +++++++++++++++++++ ...ents-349bcd84d9f8de30085279d049beebc1.yaml | 58 +++++++++++++++++++ ...ctor-13bfe589bdd47f65243e9b0ade34cdf3.yaml | 58 +++++++++++++++++++ ...rity-709a1cb6d6df454bb23d66adb846b221.yaml | 58 +++++++++++++++++++ ...rity-b3243229c8f5a6b1156c39447c936dd3.yaml | 58 +++++++++++++++++++ ...rity-c1ef6631b77d67c9c8c86d2d8178a478.yaml | 58 +++++++++++++++++++ ...rity-c321ccd5d4d39fbb513def54b28e9e2a.yaml | 58 +++++++++++++++++++ ...rity-d7852421719681a9a67e3d9678703a82.yaml | 58 +++++++++++++++++++ ...rity-ef25625daa30e1c21a7eef5298a77b22.yaml | 58 +++++++++++++++++++ ...ents-9ba6d95c0360c569d14b9d24ed1b35ed.yaml | 58 +++++++++++++++++++ ...sily-e054a1d4839545a4a78c6e2e05d738b6.yaml | 58 +++++++++++++++++++ ...site-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...elds-348c099c8d52b86e029274e932206d2d.yaml | 58 +++++++++++++++++++ ...osts-7b26661f47c6a54bac357fc46b5b57fd.yaml | 58 +++++++++++++++++++ ...osts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...osts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...e-me-da29ae9abf29175dd27fb6efb7642506.yaml | 58 +++++++++++++++++++ ...ders-7dc8aae42850432c949900f96b92f1dc.yaml | 58 +++++++++++++++++++ ...ally-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lick-7898f5c5139842babbcbee2306b1e703.yaml | 58 +++++++++++++++++++ ...etas-12a6d01f8c93264a681f271c8f676a9a.yaml | 58 +++++++++++++++++++ ...rier-c21b3a23e799a524e3a35bb5025290a6.yaml | 58 +++++++++++++++++++ ...ipes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oads-49f7af60a7d6ca8e6785ad7873768f2a.yaml | 58 +++++++++++++++++++ ...-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-seo-5457d1ce3892ed5603310b359ae787b8.yaml | 58 +++++++++++++++++++ ...-seo-9ff713bb61b0eb3f270aa06433895190.yaml | 58 +++++++++++++++++++ ...ress-507a6642fe4ac3f015f5c85064630dbd.yaml | 58 +++++++++++++++++++ ...poll-2e7b0b07966525201b04f4b815659d00.yaml | 58 +++++++++++++++++++ ...poll-9547ac03aa22594531f4f7ecb05105d2.yaml | 58 +++++++++++++++++++ ...poll-a76e6fad4bf5d5ba93f81a78338ef54e.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ries-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lish-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...hive-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...hive-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...auto-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...auto-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...port-5c8e28251cab5b1205b7a87c4a2a1426.yaml | 58 +++++++++++++++++++ ...tion-13d81033dab55eac53421a579e93f29f.yaml | 58 +++++++++++++++++++ ...tion-14a6574b6d9fc13262269a727d440dc3.yaml | 58 +++++++++++++++++++ ...tion-9c1a7ab296fd9381f729867ce6c145d6.yaml | 58 +++++++++++++++++++ ...ions-2e3087c002dc76b9a7567526587e8736.yaml | 58 +++++++++++++++++++ ...wall-b61c46947c98daf3d7e5aee079c69c53.yaml | 58 +++++++++++++++++++ ...cter-27cd6d77b0299e752388a04327a5ef2a.yaml | 58 +++++++++++++++++++ ...cter-69e238d5564cebaab229183900098117.yaml | 58 +++++++++++++++++++ ...stem-eaff27608bcf6deda804f06712a1b098.yaml | 58 +++++++++++++++++++ ...ntor-9e56ce0a564cde270ffad1e5997baa50.yaml | 58 +++++++++++++++++++ ...ntor-f509147c445359dac8de4743426be1bb.yaml | 58 +++++++++++++++++++ ...feed-539276d00e4422db414565e796e54c45.yaml | 58 +++++++++++++++++++ ...tter-26f3ee9e0b5d3d296c77f279bcf1dce7.yaml | 58 +++++++++++++++++++ ...cher-b029a1561cc2b382c267a1eedf8dbeeb.yaml | 58 +++++++++++++++++++ ...ices-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ayer-1da0a6197b1106904178e0b8178f3b2f.yaml | 58 +++++++++++++++++++ ...ayer-e75a2e4fcc95441946c7906f7e8c8fdf.yaml | 58 +++++++++++++++++++ ...stem-9badde4161dcfe466c75ad211f71fa17.yaml | 58 +++++++++++++++++++ ...cker-57412b2a8ecc09f7b642fb706ae35e4e.yaml | 58 +++++++++++++++++++ ...heet-c9ddd0481037c81ec76638f9cdd36097.yaml | 58 +++++++++++++++++++ ...logs-06cd483feacb2d314abff2ed5eebff85.yaml | 58 +++++++++++++++++++ ...ndar-93b21f556464132da5e236e1e43ab9a3.yaml | 58 +++++++++++++++++++ ...ages-793865077bcac4ea4b5fe53bac436ec4.yaml | 58 +++++++++++++++++++ ...digg-20201ad3e5b2ef096de0c5e50dbc6858.yaml | 58 +++++++++++++++++++ ...blog-a302b746a2ef51c079999dc7f35e46c2.yaml | 58 +++++++++++++++++++ ...risk-23a7b6466caf75eb82c1916af3aba873.yaml | 58 +++++++++++++++++++ ...e-wp-5cb36e2cb4718da1f24cc088fdc5e522.yaml | 58 +++++++++++++++++++ ...stic-317667951b7644dbd1a4529b628afac3.yaml | 58 +++++++++++++++++++ ...stic-4de4b5fb4c51e07373cc17e285c57285.yaml | 58 +++++++++++++++++++ ...stic-739db2cc0c9500d655d27c730225e398.yaml | 58 +++++++++++++++++++ ...stic-eadc3f836bcbd93a1ac6bfbe3a4ccd12.yaml | 58 +++++++++++++++++++ ...stic-f0509869323a911d6d3e4dec2a00653a.yaml | 58 +++++++++++++++++++ ...stic-f546fb5d8bed24f06bc4f3f7768fcf06.yaml | 58 +++++++++++++++++++ ...gits-b7d7504fc6882ec831aaed54e5e753c7.yaml | 58 +++++++++++++++++++ ...erce-5db488a5ce4a9b749eec8867f89dee42.yaml | 58 +++++++++++++++++++ ...load-386a2527052ae342a58190f18af94ea3.yaml | 58 +++++++++++++++++++ ...ries-a6efeec3a539abed47ad7c21c911bb3f.yaml | 58 +++++++++++++++++++ ...ries-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml | 58 +++++++++++++++++++ ...rist-01ea85ddd8a050d4ed49539de0e44b17.yaml | 58 +++++++++++++++++++ ...rist-0a59eb8864ee4a82b1288b61fa9c3b30.yaml | 58 +++++++++++++++++++ ...rist-0ac5cc81243c959ab88705244a2988b3.yaml | 58 +++++++++++++++++++ ...rist-1187996edf4177af89ef3ea40b60db53.yaml | 58 +++++++++++++++++++ ...rist-133afc4fd6bf43efcd46913bc74537a5.yaml | 58 +++++++++++++++++++ ...rist-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...rist-2cbbaa813e0954a798f362d364a25dbe.yaml | 58 +++++++++++++++++++ ...rist-3ca2c37cf2bcc2a6f7bd7d384d01930f.yaml | 58 +++++++++++++++++++ ...rist-50115b9c428a5ad33912876ac3e59d68.yaml | 58 +++++++++++++++++++ ...rist-6547c1d240217acd0e74acb8773a56d3.yaml | 58 +++++++++++++++++++ ...rist-9461e6fbc59ff2af30e33bb31e92efcb.yaml | 58 +++++++++++++++++++ ...rist-9576bd28245508413e199ad3d8acfb19.yaml | 58 +++++++++++++++++++ ...rist-a3e8c0ce1e12ba9e5616261592070d69.yaml | 58 +++++++++++++++++++ ...rist-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...ress-63e9460ae343812c425f6b6a9cf8cd2b.yaml | 58 +++++++++++++++++++ ...ress-95913a8fbfffbbc5d9172b93ca770d6c.yaml | 58 +++++++++++++++++++ ...-pdf-ed0ef3463be2d5aaf2ed1f44e5427cec.yaml | 58 +++++++++++++++++++ ...ents-20729b5326c844ceb8ab014ad17df6e2.yaml | 58 +++++++++++++++++++ ...-wpz-51b13cbe3f0c79746e5808bdafa8107c.yaml | 58 +++++++++++++++++++ ...lick-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...r-wp-675306159873a1cd00d34f2536abffba.yaml | 58 +++++++++++++++++++ ...ions-d95a2dcd05217531d4ed458d73ee033a.yaml | 58 +++++++++++++++++++ ...ogin-3955cce33eb34bd1a4fd37bd19c83679.yaml | 58 +++++++++++++++++++ ...bler-ae33a39eb3dc9b47978010832e99346a.yaml | 58 +++++++++++++++++++ ...tend-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...post-5b28a734c59e3ed66297833eac37980a.yaml | 58 +++++++++++++++++++ ...data-7d1a4c06854607da91f0cfd973b64e55.yaml | 58 +++++++++++++++++++ ...data-68e029abe789ad7c1ac8726ecdc73f1e.yaml | 58 +++++++++++++++++++ ...dget-773a62e129bb5aeb2d87a5f158085367.yaml | 58 +++++++++++++++++++ ...gets-c88811f07a28a64dae50ff3a4d1213f5.yaml | 58 +++++++++++++++++++ ...stem-0472db32aec7a9d3b04657389befed31.yaml | 58 +++++++++++++++++++ ...stem-10705e3d714d3c8649004193cb95f340.yaml | 58 +++++++++++++++++++ ...stem-6e244b00897597cd6328a4e5cd1875e2.yaml | 58 +++++++++++++++++++ ...stem-7a1c147c4cb293f32f92c2501e47596f.yaml | 58 +++++++++++++++++++ ...stem-bf623412f81fa76fc573618af8d6d1f2.yaml | 58 +++++++++++++++++++ ...load-764235f1dad8997c7feda04c94cf2850.yaml | 58 +++++++++++++++++++ ...cker-2fe97b6a7d11daeda44ed66f389013e0.yaml | 58 +++++++++++++++++++ ...cker-4d06425a78ba626ae09d9e74b3028b1c.yaml | 58 +++++++++++++++++++ ...cker-4fab6ad196fce7e90d2e5e9e3343b264.yaml | 58 +++++++++++++++++++ ...cker-b0853238e27436d970fc9e4c9b697d95.yaml | 58 +++++++++++++++++++ ...cker-cb44b891144850987aa067ef65bfd80b.yaml | 58 +++++++++++++++++++ ...cker-f95f25f2a333f8597e744c121fcbe5fe.yaml | 58 +++++++++++++++++++ ...cker-f9974cc25b2b5474809876c63c837de9.yaml | 58 +++++++++++++++++++ ...book-2fd703146be88e52db7e37909148b8fe.yaml | 58 +++++++++++++++++++ ...book-5a66a977b640a93acacfabeb4be863f1.yaml | 58 +++++++++++++++++++ ...book-8f2eed89cd34dbb395902a31efbdb53c.yaml | 58 +++++++++++++++++++ ...lder-344bde3518beec69cf32525065cbb92a.yaml | 58 +++++++++++++++++++ ...lder-4f3dfe26281afe74af18534af8dcf024.yaml | 58 +++++++++++++++++++ ...lder-a2b478ab05dc0dd0616e45e762ef893a.yaml | 58 +++++++++++++++++++ ...lder-aabb704338c74a997901edf2f42d1b76.yaml | 58 +++++++++++++++++++ ...lder-ec458e7be91893393a96a7bb4f01d557.yaml | 58 +++++++++++++++++++ ...lish-e6640ec95c6580e68f9599cfab145307.yaml | 58 +++++++++++++++++++ ...able-03f17f31cd71196d3e8108e1dfd1705d.yaml | 58 +++++++++++++++++++ ...able-05afb40274ed6e7e7ee85f9181367788.yaml | 58 +++++++++++++++++++ ...able-932d8591d976abf910e4179bc489f078.yaml | 58 +++++++++++++++++++ ...able-c74224b712fc0c2fb7b3dedfadd9ee64.yaml | 58 +++++++++++++++++++ ...bums-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...bums-f74320833916c503bc8924181a242988.yaml | 58 +++++++++++++++++++ ...rker-e4bec7dd7a04a9998930ce7422960fa5.yaml | 58 +++++++++++++++++++ ...book-0720f12ed328d9f8394eeb8c7b25a318.yaml | 58 +++++++++++++++++++ ...book-2b7d96b5ce8ab425f2e121a2dd72ecf0.yaml | 58 +++++++++++++++++++ ...book-464fda924b91446d67088565fa366b6b.yaml | 58 +++++++++++++++++++ ...book-81cd7c7b4d1173a363d79c9374f22f96.yaml | 58 +++++++++++++++++++ ...ress-0d2acb1823da711b074d38421e878cbc.yaml | 58 +++++++++++++++++++ ...ache-f17846666f850b5a719df18ee77ef5bc.yaml | 58 +++++++++++++++++++ ...l-de-2b530454070b0701fff7ade24fa23420.yaml | 58 +++++++++++++++++++ ...ting-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...dder-9726bedc4772feb78308da203819877a.yaml | 58 +++++++++++++++++++ ...dder-ab269c118fc3257cdc712b5cba24b2d9.yaml | 58 +++++++++++++++++++ ...lite-d8a488996304707ccbeb5881d0d3a2c5.yaml | 58 +++++++++++++++++++ ...case-945f1c78b2a3586f190550f87e150c27.yaml | 58 +++++++++++++++++++ ...lite-3a87cd2c194cd815db2ec636b84e643a.yaml | 58 +++++++++++++++++++ ...lite-5ad44d8edf07e29935fd9f2a379a8bdf.yaml | 58 +++++++++++++++++++ ...lite-7cae0337ec5d8357b2096a13255ff0e5.yaml | 58 +++++++++++++++++++ ...lite-83ceb85b9d98ac0ba31cc54d7c02a615.yaml | 58 +++++++++++++++++++ ...lite-98e27e4b860cdb80f775d8dcf8849471.yaml | 58 +++++++++++++++++++ ...lite-e63e30ec60f147aa93db545efe75d6f6.yaml | 58 +++++++++++++++++++ ...ogin-3e791f294648bb07f6f5d09991cd807c.yaml | 58 +++++++++++++++++++ ...ogin-76c4f32766bf14b6bbf96fbeaaac68ab.yaml | 58 +++++++++++++++++++ ...ogin-9b93ca969f1fec7d267bf68ade76e649.yaml | 58 +++++++++++++++++++ ...ogin-bd8336f3b7891bca7cf2acd9eb9176f8.yaml | 58 +++++++++++++++++++ ...heck-7bb785cc55f83f670623beb2518f8d46.yaml | 58 +++++++++++++++++++ ...stem-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lace-c2b0322b1c47551232078fdb7ec624e5.yaml | 58 +++++++++++++++++++ ...don8-147a2c380c511ff89f6007b5ad85a430.yaml | 58 +++++++++++++++++++ ...tton-d64691e54ed9f4bd04f9e5d0a049bc80.yaml | 58 +++++++++++++++++++ ...xtra-bf2a986ee34d32b284b49248c2116049.yaml | 58 +++++++++++++++++++ ...code-53c85ef54b387a398b144244c40bd611.yaml | 58 +++++++++++++++++++ ...code-737595c2ea3449d9afc6f182f87c2e0c.yaml | 58 +++++++++++++++++++ ...tton-2930d925944c874731b469b90d98e5da.yaml | 58 +++++++++++++++++++ ...tton-40014647f15550cd9dd8d5556a2d8ae1.yaml | 58 +++++++++++++++++++ ...eter-11d8842f155c393e0c8cf7dd8d4ce45b.yaml | 58 +++++++++++++++++++ ...lock-28e3179254b4fd139125a16ede646345.yaml | 58 +++++++++++++++++++ ...erce-89b8de7fceb27a44be5a7a24e0cb685a.yaml | 58 +++++++++++++++++++ ...llie-5d341faba5a243bc1f91722340667935.yaml | 58 +++++++++++++++++++ ...llie-c68aefc2513365ae0004ad9eeebe270b.yaml | 58 +++++++++++++++++++ ...form-074326e7470f284764101e6fc9e53f79.yaml | 58 +++++++++++++++++++ ...form-4667942accde23610dd8e0b089b22f23.yaml | 58 +++++++++++++++++++ ...rkup-2ead875f47442aad0463d1658f74b76e.yaml | 58 +++++++++++++++++++ ...erce-4cda745fb6b624bf244c2f741ab1add8.yaml | 58 +++++++++++++++++++ ...erce-5e9722517850435a4c6751ba68e3f182.yaml | 58 +++++++++++++++++++ ...erce-ccf7ae7c58d11c91be50450cab57d66e.yaml | 58 +++++++++++++++++++ ...erce-dbc6d35b9d97e2d76a522059041b4184.yaml | 58 +++++++++++++++++++ ...load-1963440e9d46a424a870f14bf4b601ac.yaml | 58 +++++++++++++++++++ ...load-de1a73429738ac6f52decf46ff2bdf86.yaml | 58 +++++++++++++++++++ ...tail-9a176796080675b246543fba168c027a.yaml | 58 +++++++++++++++++++ ...-pdf-7cecc34bfe19dc68894d7b020addf743.yaml | 58 +++++++++++++++++++ ...ents-6f48b6d420d1eeb4f46e78496cf4eb1b.yaml | 58 +++++++++++++++++++ ...iles-c619d56801748dba6948ad0822abf51a.yaml | 58 +++++++++++++++++++ ...page-3f433c20605e0478560f661cae839ad8.yaml | 58 +++++++++++++++++++ ...ager-010922f26f33a94ab231b7f0fdab049f.yaml | 58 +++++++++++++++++++ ...ager-02ae4a0720867671dd11925e4a221a75.yaml | 58 +++++++++++++++++++ ...ager-03366e13fcca1db85a35f2268a00796c.yaml | 58 +++++++++++++++++++ ...ager-07b6f9539cc79b55c833c05dca993fdb.yaml | 58 +++++++++++++++++++ ...ager-08c891f98b2f8faaecf3787ed0733081.yaml | 58 +++++++++++++++++++ ...ager-0fbbdf117a58185e2bf8aba144015927.yaml | 58 +++++++++++++++++++ ...ager-1c63696c8009b48d027fd7d86fee0dcb.yaml | 58 +++++++++++++++++++ ...ager-22e8c4993187acede41bbad9c3b9081a.yaml | 58 +++++++++++++++++++ ...ager-300ac7058f885b1b1ecbf0131074eaf1.yaml | 58 +++++++++++++++++++ ...ager-30d61c53466fa58934f9b72c5790a166.yaml | 58 +++++++++++++++++++ ...ager-31395bccdb490b805531cabc85d6de58.yaml | 58 +++++++++++++++++++ ...ager-31bb9a1a6021af8a029348a6ecc96852.yaml | 58 +++++++++++++++++++ ...ager-3654cd4919a2027fb17d521b494ff35a.yaml | 58 +++++++++++++++++++ ...ager-36d2ad9a774b3ffdb359958bc8b37040.yaml | 58 +++++++++++++++++++ ...ager-37c94bc66c005be68e2dea455cb8d54d.yaml | 58 +++++++++++++++++++ ...ager-46f8f7fca478042503cff5486b63739f.yaml | 58 +++++++++++++++++++ ...ager-4e4181a37474e6c9ba0613d6b7881b76.yaml | 58 +++++++++++++++++++ ...ager-5425379653c5c62de7cbdf4b522ef322.yaml | 58 +++++++++++++++++++ ...ager-6811835f1b3b62a667088ec060a91ec5.yaml | 58 +++++++++++++++++++ ...ager-6855332cd5767d389db903e31b1c4f88.yaml | 58 +++++++++++++++++++ ...ager-6aa900a875605d12f51c36a7aee68e0c.yaml | 58 +++++++++++++++++++ ...ager-7367ffe725d32472b793d84e3d0fe0d9.yaml | 58 +++++++++++++++++++ ...ager-7381977dcbbf38890f97270b77e9814a.yaml | 58 +++++++++++++++++++ ...ager-7db5ef531b59fcf315c55f77b9b8f6fb.yaml | 58 +++++++++++++++++++ ...ager-83ab5d6545a91728c424846b6a566917.yaml | 58 +++++++++++++++++++ ...ager-899169b3fe14c55dc2775d2907a0f4d5.yaml | 58 +++++++++++++++++++ ...ager-8c46bf632b1c3634dd29de610dae2727.yaml | 58 +++++++++++++++++++ ...ager-93730c80f26663486b577cf1ff9df8f4.yaml | 58 +++++++++++++++++++ ...ager-93832a5ea647bdf515b56a86b8d86d79.yaml | 58 +++++++++++++++++++ ...ager-9a4aa24f23eceeee8bc7c02ddb1c2cce.yaml | 58 +++++++++++++++++++ ...ager-9b3649e551e8d75fa74f183c3fac393e.yaml | 58 +++++++++++++++++++ ...ager-a251d6368bb7c15c47f1a00b82a60c06.yaml | 58 +++++++++++++++++++ ...ager-b1861af38d12189832b1b119b32a79ef.yaml | 58 +++++++++++++++++++ ...ager-baeb593e80daf8c0e9aa6de629d61f7e.yaml | 58 +++++++++++++++++++ ...ager-bc9258a94f7c2dba9bd7d9f332571167.yaml | 58 +++++++++++++++++++ ...ager-c1281bc3be6489439619d6a7c7e1abac.yaml | 58 +++++++++++++++++++ ...ager-c202e0ac545cb4289f68113596303c38.yaml | 58 +++++++++++++++++++ ...ager-ca1ac4d2663fee70b0283b8708b4ae50.yaml | 58 +++++++++++++++++++ ...ager-cb8528ea228de7c195be74b03a1cf056.yaml | 58 +++++++++++++++++++ ...ager-cf4fa8f0c990098bbe171db8d667a080.yaml | 58 +++++++++++++++++++ ...ager-da52023c7620366d69c94922efd73968.yaml | 58 +++++++++++++++++++ ...ager-dc6aa910a851ae74e5606d96e36b1052.yaml | 58 +++++++++++++++++++ ...ager-dc8ff7d3332154eb2062f549788da3cc.yaml | 58 +++++++++++++++++++ ...ager-de1ce77814c2edc391436dd273126a1e.yaml | 58 +++++++++++++++++++ ...ager-de94c31f4187177567b889a40327a1d3.yaml | 58 +++++++++++++++++++ ...ager-e505994846479615d49d4f4342d7b65f.yaml | 58 +++++++++++++++++++ ...ager-e5651ec96e6ca99165a7dcf4611fe4ad.yaml | 58 +++++++++++++++++++ ...ager-e6a59e2d8dcc1e62ef50ded882a3c3af.yaml | 58 +++++++++++++++++++ ...ager-edb73da37a786109cf2a1c2cf12e6eb7.yaml | 58 +++++++++++++++++++ ...edia-43eedc047028750edf0998930243bbd6.yaml | 58 +++++++++++++++++++ ...itor-2ee20ef00c8dffbd5ed7b6a797548996.yaml | 58 +++++++++++++++++++ ...itor-2f1f33bfd002c22ab758b0590571cc4a.yaml | 58 +++++++++++++++++++ ...itor-395b4caea34d0aadd182993cecde5b31.yaml | 58 +++++++++++++++++++ ...itor-5c72e030a59da55164488a0121d8367a.yaml | 58 +++++++++++++++++++ ...itor-8d4bf28803761cae038f398e0f1dd848.yaml | 58 +++++++++++++++++++ ...itor-9156a008e8a44bce922b7f9ab6484346.yaml | 58 +++++++++++++++++++ ...itor-937f60d959f194bc06ade3d9414194fa.yaml | 58 +++++++++++++++++++ ...itor-94ab1a5e48ccfc01b2ab43a21b16e2fe.yaml | 58 +++++++++++++++++++ ...itor-95ac055a4400e480693a1f956a7737eb.yaml | 58 +++++++++++++++++++ ...itor-9c43290fa22148f68ff47d72abec5161.yaml | 58 +++++++++++++++++++ ...itor-9ecbfebe7e10d279275667a070df122b.yaml | 58 +++++++++++++++++++ ...itor-a760bafd1cd95a91af8a27215ef05ba2.yaml | 58 +++++++++++++++++++ ...itor-bdf53bf0d4580f34f6ebb2e5285d2f9e.yaml | 58 +++++++++++++++++++ ...itor-c5272b0ed6c4fa11625cff04681b3b2d.yaml | 58 +++++++++++++++++++ ...itor-cae783a6ecd0d5e0f3f782adb9bd7358.yaml | 58 +++++++++++++++++++ ...itor-ce4d8c6c1d15b00a6a80a41c19c0a53f.yaml | 58 +++++++++++++++++++ ...itor-d953e0cc8d7eb1063dec9efaeff900d0.yaml | 58 +++++++++++++++++++ ...itor-e38136ce40ff372555239319f35c2227.yaml | 58 +++++++++++++++++++ ...itor-e73148573c5807bdfaeaab5f8604f081.yaml | 58 +++++++++++++++++++ ...itor-ee37641121dd5ca3e58a921bd679af5c.yaml | 58 +++++++++++++++++++ ...itor-fa3ec4c554fb01ca3485de73728dd008.yaml | 58 +++++++++++++++++++ ...erce-d82977967e8370fff3f7aa446912e4fd.yaml | 58 +++++++++++++++++++ ...ugin-10e0131bc3cbf1f9a7e37ed7d5c2a1cf.yaml | 58 +++++++++++++++++++ ...ugin-8a3bfba63e8785572c67f2c51b59a6d0.yaml | 58 +++++++++++++++++++ ...ugin-e331a48b9ae531e85ab7c6eb7fe0575f.yaml | 58 +++++++++++++++++++ ...oard-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml | 58 +++++++++++++++++++ ...code-075f2aa698fd0722386a96df1a3100c2.yaml | 58 +++++++++++++++++++ ...heme-132341ac397ed9029ecd03f993b8bfaa.yaml | 58 +++++++++++++++++++ ...ents-dd3d09b236f4e0306f62e328db6df55a.yaml | 58 +++++++++++++++++++ ...ktok-92fda4d05082e41cb8ccd1d0178b61a6.yaml | 58 +++++++++++++++++++ ...ktok-e50a1a1ba5097a77ccf546f0f88efdf8.yaml | 58 +++++++++++++++++++ ...ager-90ce5b5c6d8ae42fe1a7818063e130ea.yaml | 58 +++++++++++++++++++ ...ager-4995a23c57ea82d00ee47f5cbb214fc8.yaml | 58 +++++++++++++++++++ ...lite-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ient-809d63af1f69964de8a6d451fb63eac3.yaml | 58 +++++++++++++++++++ ...ient-c6fe3e98ca720b92fad33bdf271aacdd.yaml | 58 +++++++++++++++++++ ...mode-e474bd135ff4b7c6170c11705966b7d8.yaml | 58 +++++++++++++++++++ ...rm-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rm-7-0ef90759a645e5a0a85f1ab3e04c6459.yaml | 58 +++++++++++++++++++ ...rm-7-230e494196dc43c26e1062437fc400cf.yaml | 58 +++++++++++++++++++ ...rm-7-3a4354d7b58ccedc4bd821a299d4d814.yaml | 58 +++++++++++++++++++ ...rm-7-7e7eb2b24e63bfc8cd18835a55a41f43.yaml | 58 +++++++++++++++++++ ...rm-7-c5b846fbda39bbc2b213c6450fb38da1.yaml | 58 +++++++++++++++++++ ...rm-7-dfa883323c53046606f4e4db00277596.yaml | 58 +++++++++++++++++++ ...erce-0921939ba9d36b3bc7ef6782c794b5c5.yaml | 58 +++++++++++++++++++ ...erce-7ae73592996d92a88095adedd13bc8f2.yaml | 58 +++++++++++++++++++ ...erce-b6756a6cb324fb647e3fbdda3c2bb0bf.yaml | 58 +++++++++++++++++++ ...-pro-538294a6deb271080d96f98811f3c4f6.yaml | 58 +++++++++++++++++++ ...-pro-a9a7c8e5b6f35ebf19a42e787080a55e.yaml | 58 +++++++++++++++++++ ...ntor-93d3ba9b108e1112ee15e322299a4fea.yaml | 58 +++++++++++++++++++ ...tion-02fac00b4da69e9fe78fc7130f860fe9.yaml | 58 +++++++++++++++++++ ...tion-791dd23f996b2b0738face7fcbca2b1b.yaml | 58 +++++++++++++++++++ ...blog-ae76e34d6e644abc4667be59d0e2e0dc.yaml | 58 +++++++++++++++++++ ...blog-d1894aa72265b74c9b59e10ca93f4375.yaml | 58 +++++++++++++++++++ ...awit-697b1f32d4ef6920c80a41e74d1c7116.yaml | 58 +++++++++++++++++++ ...-box-b33caca512f21869a1112d26d070a67d.yaml | 58 +++++++++++++++++++ ...dash-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mode-8fff7b43d5e853aae2c55c13111f8f63.yaml | 58 +++++++++++++++++++ ...dons-b0e1b65089f5019f1d7bcee627168a5a.yaml | 58 +++++++++++++++++++ ...dons-e42d0569342324174ad2b7b5b34acfd1.yaml | 58 +++++++++++++++++++ ...oxes-7907c4688f5f43998579c328082a69f9.yaml | 58 +++++++++++++++++++ ...oxes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oxes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...oxes-e9fd5a8f4cb940c05dfbd60e736ab50a.yaml | 58 +++++++++++++++++++ ...hare-0508c37bf22986b5e27ea5c3d8bc9c4d.yaml | 58 +++++++++++++++++++ ...hare-fc82d74dbac5a3353b964b24a832d1d9.yaml | 58 +++++++++++++++++++ ...text-10e7110787ae61a1849daa9fe6489aae.yaml | 58 +++++++++++++++++++ ...text-746ab5fca61ed161758f284f4d55f254.yaml | 58 +++++++++++++++++++ ...dget-16dc3f3aa085dd7f2e3dfd536ed2021e.yaml | 58 +++++++++++++++++++ ...dget-831ca3a67ae53eee79512c998867b523.yaml | 58 +++++++++++++++++++ ...dget-9ca1c6bce5ebff9e9681d52ce2748227.yaml | 58 +++++++++++++++++++ ...ctor-7156ef80890822c55e70bd957b9a6411.yaml | 58 +++++++++++++++++++ ...-xox-e89dd0c73fdc543da4d63a7803ee9a97.yaml | 58 +++++++++++++++++++ ...arch-62dc43c109e10a4fb2083be6c80b9766.yaml | 58 +++++++++++++++++++ ...suit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...r-wp-1a5f08a913b9e66bca4a1d7c16d1cb52.yaml | 58 +++++++++++++++++++ ...r-wp-295363837d1454c8802423d79b02460d.yaml | 58 +++++++++++++++++++ ...r-wp-b82caad6c0c8bf440388b6328560de71.yaml | 58 +++++++++++++++++++ ...tube-eeffd2576729af4c20ea0d0989cea07e.yaml | 58 +++++++++++++++++++ ...ress-d1ad636a904712d275c068316d9921ca.yaml | 58 +++++++++++++++++++ ...ting-98886bf050f4aa01cda5000bdbc8e584.yaml | 58 +++++++++++++++++++ ...ting-a4b85243ad36c1329732b5275f246278.yaml | 58 +++++++++++++++++++ ...tion-42d462182add4a54a9067be955a98019.yaml | 58 +++++++++++++++++++ ...bers-58dabace517bb3fd14d9bc2e6628a726.yaml | 58 +++++++++++++++++++ ...tabs-bdf306cf1fa53c2e200c922d232a9b13.yaml | 58 +++++++++++++++++++ ...cker-53b973a947651cec1a2155ab2e3c223a.yaml | 58 +++++++++++++++++++ ...cker-78c62de2a8f7c6f108d2de7498401127.yaml | 58 +++++++++++++++++++ ...cker-8fe2149458ea063852f82a98766c0a1b.yaml | 58 +++++++++++++++++++ ...cker-e60c9facdf470d59f212ff7b56e40a91.yaml | 58 +++++++++++++++++++ ...eway-3f2cad5626e189b4a9fbbf4f777a78e7.yaml | 58 +++++++++++++++++++ ...ress-9517b97fe7566a06a9d352900cf24cf1.yaml | 58 +++++++++++++++++++ ...ress-9c5144d0854754a379c2d4994fc71dd3.yaml | 58 +++++++++++++++++++ ...-faq-eb38ab4fa2ba998f57df5784c60738ed.yaml | 58 +++++++++++++++++++ ...eoff-9a41ab0a37a3b754d3385603b40bbab6.yaml | 58 +++++++++++++++++++ ...page-2d87c0364307edea9fea6b2a2be6834f.yaml | 58 +++++++++++++++++++ ...post-1de4b637fd30a0c0161a02bf0be995dc.yaml | 58 +++++++++++++++++++ ...page-d66fba0caf4197da913cda06e8bae43e.yaml | 58 +++++++++++++++++++ ...page-fd184e22776918171b2daf7b166b3579.yaml | 58 +++++++++++++++++++ ...post-b4ec89e0637e2a12e7606215722e4f54.yaml | 58 +++++++++++++++++++ ...post-11953d0632dfa94f70f928a189af1971.yaml | 58 +++++++++++++++++++ ...post-4fd25d208fa1eb71c396970325cd56c1.yaml | 58 +++++++++++++++++++ ...post-517e55dfe7f60b7457c238ed215d0a10.yaml | 58 +++++++++++++++++++ ...type-373dd0a06bd13b32d55487814dbab124.yaml | 58 +++++++++++++++++++ ...type-87909a557eede328b649d626c4448f38.yaml | 58 +++++++++++++++++++ ...heme-0924f82ec3f5be000a2e6547a544a598.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...post-2d87c0364307edea9fea6b2a2be6834f.yaml | 58 +++++++++++++++++++ ...post-79f880a7e6c6b5f19edddfee4238c580.yaml | 58 +++++++++++++++++++ ...post-e4d1ad7c2888a8ba91b50fa79c134af9.yaml | 58 +++++++++++++++++++ ...ator-000a2d156aed05fdee1d26c9317df353.yaml | 58 +++++++++++++++++++ ...ator-0244633df1d46b9b703b5c746fbc6e51.yaml | 58 +++++++++++++++++++ ...ator-195b7c4b6c3a0504f0fb2ed5065020a7.yaml | 58 +++++++++++++++++++ ...ator-22105b80b6b00742d7d1393ced18465f.yaml | 58 +++++++++++++++++++ ...ator-2d581ac63f9fa320743d3174a6ca4961.yaml | 58 +++++++++++++++++++ ...ator-2e6e6e36243681b3cf144f17aaebf064.yaml | 58 +++++++++++++++++++ ...ator-435788aa8fd2d67e24f049a6e4d48777.yaml | 58 +++++++++++++++++++ ...ator-45ca25ef969a9c785b481aa6dd42b6ce.yaml | 58 +++++++++++++++++++ ...ator-718986dcd5947a1beb7efad526e28827.yaml | 58 +++++++++++++++++++ ...ator-84e8025814ede80f77a1696e5326822b.yaml | 58 +++++++++++++++++++ ...ator-988ed918d003525e19a036e7fba12cab.yaml | 58 +++++++++++++++++++ ...ator-9b8a6c665915ed37184ee04d4ad10c93.yaml | 58 +++++++++++++++++++ ...ator-cf9463289c46f678c704f21fa0d76e71.yaml | 58 +++++++++++++++++++ ...ator-fa14deacc63665329cc2a6a4da97d369.yaml | 58 +++++++++++++++++++ ...-pro-84e8025814ede80f77a1696e5326822b.yaml | 58 +++++++++++++++++++ ...-pro-cf9463289c46f678c704f21fa0d76e71.yaml | 58 +++++++++++++++++++ ...-pro-de0ba6f29dfa0f03254fb0a76e6f99c6.yaml | 58 +++++++++++++++++++ ...ager-7adc7eb8c094a09a98664c4579c84eb8.yaml | 58 +++++++++++++++++++ ...ager-9cdc8d9b3ff8215825fa26b48709bf41.yaml | 58 +++++++++++++++++++ ...ager-b6ecb92e579cb07e36e2314084112219.yaml | 58 +++++++++++++++++++ ...tion-668be2a6a44dad3bba943de0f544a515.yaml | 58 +++++++++++++++++++ ...obar-6ebbfbf7f4ff52ef90502e505dd10d64.yaml | 58 +++++++++++++++++++ ...swer-515c6f7cdb52a3563e73406fbbc7b42a.yaml | 58 +++++++++++++++++++ ...swer-5c4144b3a2f4c4a33c4c23a4eb7aa6d3.yaml | 58 +++++++++++++++++++ ...-pro-076d6aabf5652856b3ecd43b1d4071c7.yaml | 58 +++++++++++++++++++ ...-pro-b9a51b76cf54230b7233fe27914bddd2.yaml | 58 +++++++++++++++++++ ...nldr-266cec63957d7dffbe45528e32eb40a1.yaml | 58 +++++++++++++++++++ ...ages-d54d87fc848bb0b810cc40fffbda1954.yaml | 58 +++++++++++++++++++ ...edia-8b0729074646bdcd5148e643a832f062.yaml | 58 +++++++++++++++++++ ...edia-f556636fbe9fc4c5e3ffdb7df7f017ee.yaml | 58 +++++++++++++++++++ ...tion-34871fd2757b31ede448958147d678fa.yaml | 58 +++++++++++++++++++ ...mark-bee89c93ea84d7cced331403d3d3e739.yaml | 58 +++++++++++++++++++ ...ntor-698a88e923e2d2acd18664fa1b6321ce.yaml | 58 +++++++++++++++++++ ...-4wp-06fd5383f7580e13dbd892fe4cb03a32.yaml | 58 +++++++++++++++++++ ...-4wp-a7d48453e4893aefdc76f2106309c64c.yaml | 58 +++++++++++++++++++ ...ator-4446ca17737c11e44353bd7340e7ea63.yaml | 58 +++++++++++++++++++ ...ntor-a835e225538d98a6a0f49f942c25b6a5.yaml | 58 +++++++++++++++++++ ...gets-57ca0f970f541262d55b26c7692e76e4.yaml | 58 +++++++++++++++++++ ...gets-7c8cf3109f4d4b196459b75b96aa728e.yaml | 58 +++++++++++++++++++ ...gets-a4d9b1fab913268578f318671b68ca36.yaml | 58 +++++++++++++++++++ ...gets-d5d0747062745dca3a4a43c62a5b0669.yaml | 58 +++++++++++++++++++ ...bars-5127fd9a578ab8f75789be1aab665dea.yaml | 58 +++++++++++++++++++ ...font-53a08acd73ef559302d82929e1a8c837.yaml | 58 +++++++++++++++++++ ...font-e3c56661b9733debd3e6fea53555b839.yaml | 58 +++++++++++++++++++ ...lery-415af7715839a7a4186f1ea1fe3682a1.yaml | 58 +++++++++++++++++++ ...lery-b558d2c101e0c756483bb33734bc9369.yaml | 58 +++++++++++++++++++ ...lery-bf282437cadf1ae50cc09a36bacba2a9.yaml | 58 +++++++++++++++++++ ...lery-e983e659503cdb77c86c6aa843d06bc4.yaml | 58 +++++++++++++++++++ ...lery-f017982e52e64f946ac9c5f02ed762a4.yaml | 58 +++++++++++++++++++ ...unds-b343996b367c5fa680b75a4664349ae7.yaml | 58 +++++++++++++++++++ ...unds-bb0c16eac19b4817493c1c038ee23819.yaml | 58 +++++++++++++++++++ ...unds-bf8cf019bdb5cedf2f07acf0dbbd9293.yaml | 58 +++++++++++++++++++ ...arch-bbab653de7c22eabac485618a7984b27.yaml | 58 +++++++++++++++++++ ...arch-d9ec6670d2ff89bdcf34f0cd3338db3d.yaml | 58 +++++++++++++++++++ ...ture-9090b82ec6bee567e560b8e108d3dc16.yaml | 58 +++++++++++++++++++ ...sult-46393c1e973f37162a617bc152661e74.yaml | 58 +++++++++++++++++++ ...2pdf-4c337287b3ea29b58d22de863f5e59bf.yaml | 58 +++++++++++++++++++ ...2pdf-a6097b32439b60cacd59d47b3a1c8c61.yaml | 58 +++++++++++++++++++ ...2pdf-aa33e37a5a268fafeb4ae3c73aa43c7a.yaml | 58 +++++++++++++++++++ ...2pdf-cc85fecce61e81ebcfd16fc13ed35220.yaml | 58 +++++++++++++++++++ ...2pdf-d89b8d067839983b7d38b29c3f8dcaaa.yaml | 58 +++++++++++++++++++ ...2pdf-e3339c8e6a8ccbe16b78f0e2c9ca3674.yaml | 58 +++++++++++++++++++ ...erce-4e6a565e3f0523a8457d5186515c7331.yaml | 58 +++++++++++++++++++ ...erce-7aa0e1773e8e5c34cf563aa138c0d2da.yaml | 58 +++++++++++++++++++ ...erce-c34557dbe7e75a157fffc6005c83f4ba.yaml | 58 +++++++++++++++++++ ...erce-c623741b8b5dbd96eac005af1ef14987.yaml | 58 +++++++++++++++++++ ...-url-667161af8562bbf0616cde527e940c70.yaml | 58 +++++++++++++++++++ ...ider-28d8e466f42a7ea620fa3fe2f98c9634.yaml | 58 +++++++++++++++++++ ...ider-7a859a74f0e39d83ee989a269a737923.yaml | 58 +++++++++++++++++++ ...free-3253e2e7de1175aa67f3d6d5696567c5.yaml | 58 +++++++++++++++++++ ...free-5c300627494a1ad1099275af163a3e49.yaml | 58 +++++++++++++++++++ ...free-6139caeaed9293c95d17b26944e3e8d5.yaml | 58 +++++++++++++++++++ ...ager-70088a82bdb29c81346c08fa9d47c687.yaml | 58 +++++++++++++++++++ ...menu-3b5f830cc2d293978dbe39244d121ee0.yaml | 58 +++++++++++++++++++ ...lite-b9d3eb363a683c73c14fb5271b86198a.yaml | 58 +++++++++++++++++++ ...inks-4e96720039ccc700f05ab77c703ff32b.yaml | 58 +++++++++++++++++++ ...rify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ents-2302a07c8ff1ee9859f41cba989fe323.yaml | 58 +++++++++++++++++++ ...ents-84cb3311236885a9e904cbe429619629.yaml | 58 +++++++++++++++++++ ...ents-afa229bd02db847384791980963680d0.yaml | 58 +++++++++++++++++++ ...ents-b4ee9cff24049609b5e28a42cf47dee5.yaml | 58 +++++++++++++++++++ ...ents-e2ec209c741fed7cc95066eb8c9d077f.yaml | 58 +++++++++++++++++++ ...ents-e5114063e08dd4dd3989e0a929dd3452.yaml | 58 +++++++++++++++++++ ...mage-b69273626856756974f9cdee241ed8f7.yaml | 58 +++++++++++++++++++ ...ners-bbb1e092b9ae97dcfd27d316846c9ee9.yaml | 58 +++++++++++++++++++ ...-bet-49c0957ce7beb86c6cd3610ef85cd2a3.yaml | 58 +++++++++++++++++++ ...odes-05c1130a0be4b028fb1b748819924a55.yaml | 58 +++++++++++++++++++ ...-now-d24e798e6ecdde0cd2e6b3ca9f8356c6.yaml | 58 +++++++++++++++++++ ...tcha-20715ecda27605f90ac0c1717bd4bb1b.yaml | 58 +++++++++++++++++++ ...tcha-b7a34904a121ea28e68ab7539af86648.yaml | 58 +++++++++++++++++++ ...ings-2dcf73eb82f83432e780c74c23beb2a4.yaml | 58 +++++++++++++++++++ ...ings-7367b780672b9eb9abb37fcbb3fea6b1.yaml | 58 +++++++++++++++++++ ...pets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...pets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...soon-4b7a2f690ab23a9c56fa493203cfb340.yaml | 58 +++++++++++++++++++ ...soon-a73a6cac5bd5a80c6a22adb8c250c687.yaml | 58 +++++++++++++++++++ ...soon-ea0ca66e9eeeaa433f8d74bce5e52c45.yaml | 58 +++++++++++++++++++ ...-pro-7ddd7913775f2842bdb03b5dd83ed7fe.yaml | 58 +++++++++++++++++++ ...tion-ec82173ebd40f930fa2890b83a9358a8.yaml | 58 +++++++++++++++++++ ...-law-5d8f13ec518cdd664ccdf095210c75bb.yaml | 58 +++++++++++++++++++ ...licy-217c5fbd6c523ea432120eff4f82682f.yaml | 58 +++++++++++++++++++ ...wner-13544ef8fd49a172f51f21a85f5f216f.yaml | 58 +++++++++++++++++++ ...erpt-0574327d2925f2e5b1baa6cdafa54603.yaml | 58 +++++++++++++++++++ ...erpt-8bbf318086664bbd3967cf3760be4186.yaml | 58 +++++++++++++++++++ ...-css-0c5db1a026616a3fe0b1bcd649ed11ac.yaml | 58 +++++++++++++++++++ ...oads-227b9ec56c4c7cc21d26de58db461ac5.yaml | 58 +++++++++++++++++++ ...oads-3e264890774be501312d562a2e66b9a4.yaml | 58 +++++++++++++++++++ ...oads-47dc8b23e46c86e99fa06304aa8794ea.yaml | 58 +++++++++++++++++++ ...oads-4ada8035109d6dc47e94b2c651edea20.yaml | 58 +++++++++++++++++++ ...oads-50401a72166a704fa2626edd9085598a.yaml | 58 +++++++++++++++++++ ...oads-54c8692b5e555318ec75bfc89238f380.yaml | 58 +++++++++++++++++++ ...oads-58382c0384c54d2d71e941fcf6b84e29.yaml | 58 +++++++++++++++++++ ...oads-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml | 58 +++++++++++++++++++ ...oads-592d413a31d24bf2ca8e9ee4d3ed0b4b.yaml | 58 +++++++++++++++++++ ...oads-5c1e1909a38a10b277a3614b15cb89af.yaml | 58 +++++++++++++++++++ ...oads-66c19845dbec142651f3cf03a994c153.yaml | 58 +++++++++++++++++++ ...oads-6b70f3503530aa0d1601aef153ce564c.yaml | 58 +++++++++++++++++++ ...oads-836a97e413451f2556144747548f5aed.yaml | 58 +++++++++++++++++++ ...oads-8bf5f3c88eae040df5c93bb90ba373a1.yaml | 58 +++++++++++++++++++ ...oads-a03c78c6dbe166da7722da09ee707752.yaml | 58 +++++++++++++++++++ ...oads-a21c37325364d975a3c7e649a4cca551.yaml | 58 +++++++++++++++++++ ...oads-a5ae13191d707f6528df2db00d64b11b.yaml | 58 +++++++++++++++++++ ...oads-a71d6df449db20ab9c26824728336769.yaml | 58 +++++++++++++++++++ ...oads-b058df7a8fa1af7735771ea488135ed7.yaml | 58 +++++++++++++++++++ ...oads-bc7e0ce97309f84318e7a566c436b814.yaml | 58 +++++++++++++++++++ ...oads-bd2f40761a0dbf1803fa7290e415ab2f.yaml | 58 +++++++++++++++++++ ...oads-c9e09cee2b4a638d5cce1b20a666e2e7.yaml | 58 +++++++++++++++++++ ...oads-da73522010deacccd257b4e9a1315635.yaml | 58 +++++++++++++++++++ ...oads-f04987be0566d1eab3eaf27afc6eec08.yaml | 58 +++++++++++++++++++ ...itor-c7caaada028e0b85fc2ec25ebcdc9cfe.yaml | 58 +++++++++++++++++++ ...ndar-35d6cb483985201ac59c669cec20a881.yaml | 58 +++++++++++++++++++ ...-box-97fb5b5839a832ac7ff02fb0d708c5d7.yaml | 58 +++++++++++++++++++ ...ebox-09160f3fbb1916544cfbb6eb640a286b.yaml | 58 +++++++++++++++++++ ...ebox-308ac408c3111d0f21a07a5be08fe876.yaml | 58 +++++++++++++++++++ ...ebox-455ef09d7d7d2085e1e76af071d802ad.yaml | 58 +++++++++++++++++++ ...ebox-566c183277ddddc5541276b2514b770a.yaml | 58 +++++++++++++++++++ ...ebox-5e1243e1e25d813c82b94fbe494798e2.yaml | 58 +++++++++++++++++++ ...ebox-6a4b9abd38157d4627731558a0b86be9.yaml | 58 +++++++++++++++++++ ...ebox-6fdd9a10958cc151010736328ad8d63f.yaml | 58 +++++++++++++++++++ ...ebox-7e2aa27b61aaa1e5ca65bdc32112a6a9.yaml | 58 +++++++++++++++++++ ...ebox-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ebox-dcded48546674d8a7147bd7b9ee5af2d.yaml | 58 +++++++++++++++++++ ...ebox-f32c6b2b7d3eb58c4682087aa288b3f1.yaml | 58 +++++++++++++++++++ ...ybox-192f3751511f8b242f0945f1aac116aa.yaml | 58 +++++++++++++++++++ ...text-7ed4275b69b36875b8deb7c4de847800.yaml | 58 +++++++++++++++++++ ...form-2e8ccf164adc8951aa826c00f9317ffc.yaml | 58 +++++++++++++++++++ ...form-423b3ffaad4575c3793b54bac37f4ca7.yaml | 58 +++++++++++++++++++ ...lder-9f2fa558a3b450f42672af408bb3b106.yaml | 58 +++++++++++++++++++ ...lder-bdcfb7f870a9c9d99dad2a66d5149c6d.yaml | 58 +++++++++++++++++++ ...ware-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml | 58 +++++++++++++++++++ ...show-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...ress-da9bd5e9b4433e9c21c5e76b9f3bc74b.yaml | 58 +++++++++++++++++++ ...-map-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...ogin-5db1bc17d104f6fabd7d82e060cec486.yaml | 58 +++++++++++++++++++ ...ogin-6046df75d04ba248b7035ff17b16ffc4.yaml | 58 +++++++++++++++++++ ...lery-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...yler-7876e3e9a0cea227500debf5d1a1674e.yaml | 58 +++++++++++++++++++ ...erce-0f5164e7f48c30d96cada976fe71bf72.yaml | 58 +++++++++++++++++++ ...erce-16223cc2976f7faa5fb929bf7546e0a0.yaml | 58 +++++++++++++++++++ ...erce-b0368c6bddefa3eda18f57518ede7d9e.yaml | 58 +++++++++++++++++++ ...erce-eb7a1f00c95af7d29372c7231c49405b.yaml | 58 +++++++++++++++++++ ...soon-c6f7d89996a803ee8eb7814d6f5734cd.yaml | 58 +++++++++++++++++++ ...rify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...load-61b9b26895ba1396cd862550f59dfb02.yaml | 58 +++++++++++++++++++ ...load-91ba8b6ec0e7e434577621e62a4faeec.yaml | 58 +++++++++++++++++++ ...lery-28fafed38b204e7345a98c45e56c485e.yaml | 58 +++++++++++++++++++ ...lery-34f7f8a09e65787efd781e2d41901d93.yaml | 58 +++++++++++++++++++ ...lery-e35ccf6a5d1ddada5f10422331d300df.yaml | 58 +++++++++++++++++++ ...-pro-9bee1adcf88eccf5bdf4a140784b69db.yaml | 58 +++++++++++++++++++ ...lace-1f6ddf0ce56b9b9d3d870c2c339aeff1.yaml | 58 +++++++++++++++++++ ...odal-c2574a7a9b79ad452c99c332f592fe5f.yaml | 58 +++++++++++++++++++ ...odal-f615078fb53a8f47f20c6cb2792c121c.yaml | 58 +++++++++++++++++++ ...nups-2b77677bf3f1770d1f2637876cb7abee.yaml | 58 +++++++++++++++++++ ...nups-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nups-e1e05c3d687b12217db0b7b57b7d94d7.yaml | 58 +++++++++++++++++++ ...hart-c452417a821be37f2cab44c35d2fb224.yaml | 58 +++++++++++++++++++ ...rama-0fb85e5ea92cfc0152cd39c07cc97431.yaml | 58 +++++++++++++++++++ ...tion-00976904f98e30f11e675f02667fdeb3.yaml | 58 +++++++++++++++++++ ...tion-516b66dc7087b091ef77c6757e58f44f.yaml | 58 +++++++++++++++++++ ...tion-83b7e3214e301bc8ce0a2ff3a2e28649.yaml | 58 +++++++++++++++++++ ...tion-89760f3ab457772708d08bbbb7ce1092.yaml | 58 +++++++++++++++++++ ...tion-96fff1abfd750f8db5e7b15f8178a35a.yaml | 58 +++++++++++++++++++ ...kets-68062d9660942c9a08865e495ee36651.yaml | 58 +++++++++++++++++++ ...cart-6956ece992f5fba93947f810cb6c0062.yaml | 58 +++++++++++++++++++ ...cart-db5362134a2d7eadd5e40de928930826.yaml | 58 +++++++++++++++++++ ...load-40be5fedd5539e32999075c425fecfed.yaml | 58 +++++++++++++++++++ ...lbum-a16becf994c4a5d0fc37834e1a2c1f32.yaml | 58 +++++++++++++++++++ ...soon-8e2fcddafd26ffe986aba71521006509.yaml | 58 +++++++++++++++++++ ...soon-f58f1d8f11140c3bf88a5bed98434fc1.yaml | 58 +++++++++++++++++++ ...mode-276fdddefb69d404e325809486a9c5a4.yaml | 58 +++++++++++++++++++ ...show-eb0df5a7745874fdf5ef88eb67a5ec63.yaml | 58 +++++++++++++++++++ ...ypes-75e8a53ab865623ebf98c15a4f6ef027.yaml | 58 +++++++++++++++++++ ...ount-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ader-8a961b077a643c6dcf8e7dd2b515541b.yaml | 58 +++++++++++++++++++ ...bles-2c80874fb8fd4cd567be9f10e0fc4aab.yaml | 58 +++++++++++++++++++ ...bles-8074409c2ea9229ad0a8c825dc05c21d.yaml | 58 +++++++++++++++++++ ...bles-99e94192bf6d19eb379533764c917cb6.yaml | 58 +++++++++++++++++++ ...bles-e4f1d5f5dc814ad4d0bdfba0ea143852.yaml | 58 +++++++++++++++++++ ...ings-19a8a46d3531a17a737d3cfe8d4f708e.yaml | 58 +++++++++++++++++++ ...ings-7e74a978e0fcd8ce34e332a78ac6415d.yaml | 58 +++++++++++++++++++ ...ings-e049cf9cff2a64ed7bf022044d018fad.yaml | 58 +++++++++++++++++++ ...ings-f26d5492f0770f1b4f41cabb1dbfd120.yaml | 58 +++++++++++++++++++ ...ager-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml | 58 +++++++++++++++++++ ...orms-1988ed1c56a6e8e4ba81a01e51929328.yaml | 58 +++++++++++++++++++ ...orms-3cf0c7158d6fa6e72389913fb8e96f48.yaml | 58 +++++++++++++++++++ ...orms-d3595d30820755045dbe80d57c0f600c.yaml | 58 +++++++++++++++++++ ...icon-c65d467c803cb05436e2b506583569bb.yaml | 58 +++++++++++++++++++ ...dash-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...n-up-c3d61b837adb4506fbea73b489e751f0.yaml | 58 +++++++++++++++++++ ...tion-97f7a332ae5645762ec8464bbe228dfc.yaml | 58 +++++++++++++++++++ ...inks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cons-41e74ccfba32267621605ffd0d327b1c.yaml | 58 +++++++++++++++++++ ...cons-4e29bf7b20e2afded2580d5e1afd403a.yaml | 58 +++++++++++++++++++ ...cons-61a927bc340bb105a879f38c8d71f797.yaml | 58 +++++++++++++++++++ ...cons-65f22b1513e1da3131ee1c2793b0624c.yaml | 58 +++++++++++++++++++ ...cons-882e0143754f55aaf4f3cb06c8d13293.yaml | 58 +++++++++++++++++++ ...cons-9cfadb72ed62a1496ef5a1550e74d7ca.yaml | 58 +++++++++++++++++++ ...cons-d9a381f55de2cbcc100fd4387b57379e.yaml | 58 +++++++++++++++++++ ...cons-eb06b36db83cd57ff46c8ecced75bb58.yaml | 58 +++++++++++++++++++ ...cons-ecb72206512391b63853fcec98ca443c.yaml | 58 +++++++++++++++++++ ...cons-f326c6f978051192fcd3f58deac7c7e7.yaml | 58 +++++++++++++++++++ ...cons-f48220ff86f125e37c7a8dfee9752f3b.yaml | 58 +++++++++++++++++++ ...cons-f8dda67401c83c106e4913ae42963922.yaml | 58 +++++++++++++++++++ ...ress-7046ef2cfb73e30aa27cd120b026bf95.yaml | 58 +++++++++++++++++++ ...ons3-47b99cb97f68327c811e482acf82f22d.yaml | 58 +++++++++++++++++++ ...ons3-731324aeee016bb6f029892372fbf4ce.yaml | 58 +++++++++++++++++++ ...ons3-d90e5ac159925d0ab3971b3b6d358c41.yaml | 58 +++++++++++++++++++ ...ebar-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ebar-98193019af2a73f9695ff639de4023e0.yaml | 58 +++++++++++++++++++ ...ebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ults-429ff280452993df8646f6def7c9d328.yaml | 58 +++++++++++++++++++ ...ults-c4969b59b8b4cdf482f721bc206c229a.yaml | 58 +++++++++++++++++++ ...-svg-73a4ba5237a6c747115a7db7e60454a1.yaml | 58 +++++++++++++++++++ ...llow-99ad02b61917183fbf0c75dc39e4e9c8.yaml | 58 +++++++++++++++++++ ...able-1d7d7c5febd898bd86b248bdd1c64ad3.yaml | 58 +++++++++++++++++++ ...able-365c4967f8ed82c8fe8be419a127bb67.yaml | 58 +++++++++++++++++++ ...king-86987ea9b36773133771b8d624c0f2b6.yaml | 58 +++++++++++++++++++ ...ents-3d0e7652c5954cde6070c6634683929c.yaml | 58 +++++++++++++++++++ ...ager-1ff79c544d50f2338de3189197eb1777.yaml | 58 +++++++++++++++++++ ...ager-6fbfd79bf661b65b2359132741b885f3.yaml | 58 +++++++++++++++++++ ...ator-13b96d2f8807051b1c5765c2cfc941c7.yaml | 58 +++++++++++++++++++ ...ator-95ad70daa5a42e22046c057a639de555.yaml | 58 +++++++++++++++++++ ...ials-139542bed79cb071600ed5c3c1e9d45c.yaml | 58 +++++++++++++++++++ ...ials-386d494fe731db6879e7d8ca94c86cd4.yaml | 58 +++++++++++++++++++ ...ials-3e13ae2b6b41b4f67d87446a43e49fcf.yaml | 58 +++++++++++++++++++ ...ials-63f488767eed871fd699454a474174aa.yaml | 58 +++++++++++++++++++ ...ials-6fa4b95e95d113650666ff28a08a093d.yaml | 58 +++++++++++++++++++ ...ials-aeef249fc57afd724305e4aa12ba4e2c.yaml | 58 +++++++++++++++++++ ...ials-ded406378489866866417fd6ec210840.yaml | 58 +++++++++++++++++++ ...late-2411b4426d78f7ca35565f6c5d4b0e5b.yaml | 58 +++++++++++++++++++ ...late-52d571dc3064574a067b92facc54ed54.yaml | 58 +++++++++++++++++++ ...feed-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...eeds-376e635d9c344dbb946b8ae2b1699cff.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ayer-b2f775a90d3415bc2313e385ff781703.yaml | 58 +++++++++++++++++++ ...ayer-cdfd3455a6f46d912895a672ab21e1b5.yaml | 58 +++++++++++++++++++ ...iews-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...iews-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...mark-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...aner-7334a0dc3d35cec714b6fff3c35d6fab.yaml | 58 +++++++++++++++++++ ...smtp-3c68c1399fad8442e05257bec4405849.yaml | 58 +++++++++++++++++++ ...smtp-3fc9a3fcf79cc1897ce2e887e3d3f73c.yaml | 58 +++++++++++++++++++ ...smtp-9a16f7dd8fd77a0633f39e5cb1c0fe95.yaml | 58 +++++++++++++++++++ ...smtp-bc7fc430ade2f2b736ad2cc1fe4fe700.yaml | 58 +++++++++++++++++++ ...smtp-c7d1f2ed116b346313eed1fb0d2a8296.yaml | 58 +++++++++++++++++++ ...smtp-e3ac7cfb196d6042fdf4cb82d4ed4384.yaml | 58 +++++++++++++++++++ ...smtp-e3f24a45c97373cce269e0ae75379f47.yaml | 58 +++++++++++++++++++ ...iews-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...2map-164bec1494162189ba7115d5dd5c222b.yaml | 58 +++++++++++++++++++ ...2map-281571699228cab1d5beb867576443c8.yaml | 58 +++++++++++++++++++ ...2map-ad10f6931e20f26aa8f27ac8a7f0eba7.yaml | 58 +++++++++++++++++++ ...2map-d7ec8c507a9ed2e2307abe588cfe9f0d.yaml | 58 +++++++++++++++++++ ...otos-02351a704f122ed7e237be1c0b97be24.yaml | 58 +++++++++++++++++++ ...otos-e1e2d018531f7235196dc9a4085ec51e.yaml | 58 +++++++++++++++++++ ...ents-38d608cacdc80db417ded65078eef410.yaml | 58 +++++++++++++++++++ ...ents-72000fe0c780a49eca561c11357809c0.yaml | 58 +++++++++++++++++++ ...ents-f934be2103cf424f8b0313022bdc21ec.yaml | 58 +++++++++++++++++++ ...azon-78a77e4a1a5aa34cbb515f8d429a5d22.yaml | 58 +++++++++++++++++++ ...vent-3155b6afdeb6949fabf56095cff40791.yaml | 58 +++++++++++++++++++ ...jobs-1a89597b1bd6bb139b0cbb0c2a6cdcf9.yaml | 58 +++++++++++++++++++ ...jobs-a9798158db571367ab5f6fcdec40a746.yaml | 58 +++++++++++++++++++ ...logo-27956200aea3cb3bd27e1108bb27c97b.yaml | 58 +++++++++++++++++++ ...king-1ab98d23b8f5715db32cf93509d555f7.yaml | 58 +++++++++++++++++++ ...king-ad05fb4f71116fd5943d1a28593a9d80.yaml | 58 +++++++++++++++++++ ...king-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cipe-a78a16c3432adee203e9f1b257d4b189.yaml | 58 +++++++++++++++++++ ...ress-078c8808dfcbfebd119f13a67915c352.yaml | 58 +++++++++++++++++++ ...ates-a80bdd8568c61aa45e987adfac4d1b71.yaml | 58 +++++++++++++++++++ ...page-98fa09468510e4f3d608da204df8d702.yaml | 58 +++++++++++++++++++ ...docs-15118c222c3d3efe10e0b60b12d7cf6e.yaml | 58 +++++++++++++++++++ ...docs-19e34a16c1a810dff7996ec5d94f691f.yaml | 58 +++++++++++++++++++ ...docs-405b16e90fe11a6da428eb58c52f2070.yaml | 58 +++++++++++++++++++ ...docs-be6b3b7884ff27a71c7f24387abeb572.yaml | 58 +++++++++++++++++++ ...ress-08485cb22c15bc9351789c0be0e79565.yaml | 58 +++++++++++++++++++ ...ress-492078688f68b5c1a6aec5a98ed76f29.yaml | 58 +++++++++++++++++++ ...ecas-994e6758795c8c6e11e9f43c7bd4ac1c.yaml | 58 +++++++++++++++++++ ...load-6ad6b5074b24fa1505e13d3a89bb00ed.yaml | 58 +++++++++++++++++++ ...tore-0b18a98b24cbdb105ec0fbddf0f9fc1f.yaml | 58 +++++++++++++++++++ ...tore-898935c481a1816ebd33c0960cec20d4.yaml | 58 +++++++++++++++++++ ...tore-b6e604dc0c4bb898e75726aff1be1de2.yaml | 58 +++++++++++++++++++ ...tore-e077433f57a559397a844ed63a88920a.yaml | 58 +++++++++++++++++++ ...base-90823deeda228cab8f47ba8bfd583141.yaml | 58 +++++++++++++++++++ ...sign-0dc068ee145b8173a92e905141be0d9e.yaml | 58 +++++++++++++++++++ ...sign-9cf68cc8a68a2c81ff64f2eb044f1190.yaml | 58 +++++++++++++++++++ ...alog-0e1a3b18a1b946d1c273b3cccc408050.yaml | 58 +++++++++++++++++++ ...alog-292ccea97458e988671a2f5d1ab07fab.yaml | 58 +++++++++++++++++++ ...alog-2ab97a490ab3483a1ecd9eeb3292652a.yaml | 58 +++++++++++++++++++ ...alog-3319cf0ede499d0a15c5de919fc4d867.yaml | 58 +++++++++++++++++++ ...alog-656ddddc75a5e8d95a513d12188cc2a1.yaml | 58 +++++++++++++++++++ ...alog-6956e38d645c6fe5f56835ed84bbc61b.yaml | 58 +++++++++++++++++++ ...alog-908797ba849f02597e888316e5bb0c25.yaml | 58 +++++++++++++++++++ ...alog-90a088835020a5c787dfade0eee8a2e0.yaml | 58 +++++++++++++++++++ ...alog-9daff448e161c27a1010bad80a987a15.yaml | 58 +++++++++++++++++++ ...alog-9f4117fe62888ab2f2b714ed12570706.yaml | 58 +++++++++++++++++++ ...alog-9f6d47d07822136b59fe192df481593b.yaml | 58 +++++++++++++++++++ ...alog-cbd1d41b26b0296545c9edd7581d3ebc.yaml | 58 +++++++++++++++++++ ...alog-f239cdbdbea64adf739686a8765fc6ab.yaml | 58 +++++++++++++++++++ ...alog-fae58dcbc303cd1d67051f496ccc1326.yaml | 58 +++++++++++++++++++ ...tion-95ef764b37cb71c966879176967dfe4f.yaml | 58 +++++++++++++++++++ ...erce-fa186d1e1ec1e8fa099b44e363e81256.yaml | 58 +++++++++++++++++++ ...cart-106c0a7404df198e82204052394ad569.yaml | 58 +++++++++++++++++++ ...cart-3bc18d019b91d2de29e8f02de7016b9b.yaml | 58 +++++++++++++++++++ ...cart-46eb2de249c5ae6cf9fd3c49e21bb4bd.yaml | 58 +++++++++++++++++++ ...cart-b6af58199f4bb361c122e5469834d6a6.yaml | 58 +++++++++++++++++++ ...cart-cbb1fea9bfad5a9264ec67a1ffb3cfd0.yaml | 58 +++++++++++++++++++ ...cart-d5b7868baeed541383a9080a76f80c46.yaml | 58 +++++++++++++++++++ ...cart-e67a592d479a1912f830dde99db21328.yaml | 58 +++++++++++++++++++ ...cart-e96409adbbb169ea331189d4d409f4de.yaml | 58 +++++++++++++++++++ ...n-s3-188892e32d2c439c02d6eec7a4adfdb5.yaml | 58 +++++++++++++++++++ ...ders-aff649abeaf4857a79fa8884fa07fcd1.yaml | 58 +++++++++++++++++++ ...happ-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ions-dccce9109c5a84af7a34cbb0742260bc.yaml | 58 +++++++++++++++++++ ...ects-3b1d00a18f864c139ec613a9e0ffecf2.yaml | 58 +++++++++++++++++++ ...tion-d192f8275b2c7772bc52294d4963918a.yaml | 58 +++++++++++++++++++ ...rses-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...sell-e8637d731d41eb4cc5029aaa77c50673.yaml | 58 +++++++++++++++++++ ...ites-4f94094a1cb01e1f7943775986788b65.yaml | 58 +++++++++++++++++++ ...oads-96ff2499f32e58024088e6b7c6dc3990.yaml | 58 +++++++++++++++++++ ...ices-61717663c17e62c7f08a76483f0eeff3.yaml | 58 +++++++++++++++++++ ...ices-d21243f7c0461744fbee4b3ace491e32.yaml | 58 +++++++++++++++++++ ...ases-ece0f7db12607af6e93bd47b255fcaad.yaml | 58 +++++++++++++++++++ ...mper-7028a373145887022c971f45128fcdba.yaml | 58 +++++++++++++++++++ ...ails-d51efaf8de0ecaf24f9a181bc5d20bee.yaml | 58 +++++++++++++++++++ ...iews-2a6ac5f100690b8d0b4a16d1c12f679f.yaml | 58 +++++++++++++++++++ ...ions-0a523ea5e4a860d6c23793246d1e5019.yaml | 58 +++++++++++++++++++ ...odes-4bf1b8de6af96f98a7a1f3714d0ed32c.yaml | 58 +++++++++++++++++++ ...ings-5c7b076501be3d3c98666ffe30ae6a26.yaml | 58 +++++++++++++++++++ ...ents-099ead226109d18c4bc71e3d4e743b55.yaml | 58 +++++++++++++++++++ ...sing-52e4049030db45f1344545c480f7a4ef.yaml | 58 +++++++++++++++++++ ...ager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...file-268f9394678ef20df569fe0eb2e92a44.yaml | 58 +++++++++++++++++++ ...enmo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ists-0633b5d5c2288fd164f50f774a52dac5.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ents-7b827ab34d96ee14e9116ea8db988679.yaml | 58 +++++++++++++++++++ ...ents-b54ef55c09174d7838779006173ea01a.yaml | 58 +++++++++++++++++++ ...s-xt-c955d255994c77fa2afb0b159f25b5a9.yaml | 58 +++++++++++++++++++ ...able-3f51c790e689dcb447adc1ee79fee545.yaml | 58 +++++++++++++++++++ ...ndar-a85ca9a2b7f246b28c6ccf181717216e.yaml | 58 +++++++++++++++++++ ...ndar-b0561191aff3bb3e5af8336a71c1ffcc.yaml | 58 +++++++++++++++++++ ...ndar-c978227ed54be6d80dbe1ecf4f522c4f.yaml | 58 +++++++++++++++++++ ...tion-4f76a0450248571403ef40c78dab60dd.yaml | 58 +++++++++++++++++++ ...care-029b8e032e0fc0a8b295cb9989f4bc4f.yaml | 58 +++++++++++++++++++ ...care-cf9e561567f8ec0f7f05155ec9df9eb6.yaml | 58 +++++++++++++++++++ ...ddon-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...idge-44337a15956fb6efe76c43a84f40d4df.yaml | 58 +++++++++++++++++++ ...idge-a97648905a16e731980d6d512636856b.yaml | 58 +++++++++++++++++++ ...idge-e57ee015b5a3bc1cbb61b42c2d7af862.yaml | 58 +++++++++++++++++++ ...tter-777e4f42d98591ca2b51ba0e588ed585.yaml | 58 +++++++++++++++++++ ...tter-77b95b2fd3fc9982f02a243980235615.yaml | 58 +++++++++++++++++++ ...tter-af90005e3634d51c613c584f0861c0a2.yaml | 58 +++++++++++++++++++ ...hall-64357c63e9789d2ab1bb69c47d5337ab.yaml | 58 +++++++++++++++++++ ...ence-e5f4c0414a585004ed1f35745c5931f6.yaml | 58 +++++++++++++++++++ ...ents-f006ae96918e8c435b20f1e9d28e9e41.yaml | 58 +++++++++++++++++++ ...ails-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ails-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...nder-7666fb1e1d2345dc70da7aee12ac3253.yaml | 58 +++++++++++++++++++ ...ress-0046efcaf372ceea3cbda093fc9866d7.yaml | 58 +++++++++++++++++++ ...ress-1951707b594e6f4a4e8e4243b43c9841.yaml | 58 +++++++++++++++++++ ...ress-54bc1daf26907dc59a5c7876a142ff1b.yaml | 58 +++++++++++++++++++ ...ress-5dc312330e1225a6fb2a9d319cc31d3c.yaml | 58 +++++++++++++++++++ ...ress-73081b1f6f4e13a9e6e969eba5e746fc.yaml | 58 +++++++++++++++++++ ...ress-7522c596e66132396decc40456fc3c0b.yaml | 58 +++++++++++++++++++ ...ress-bd26ccd939104e13f73f569b312459d6.yaml | 58 +++++++++++++++++++ ...ress-c3dca1d1ef3a946c9ddf3e33caa00021.yaml | 58 +++++++++++++++++++ ...blog-fd2502bc424033ec4b34f2309e987add.yaml | 58 +++++++++++++++++++ ...ogin-f63b97efbb567f61e36df93bf47a02fe.yaml | 58 +++++++++++++++++++ ...onts-f10c9b43de964c20f74a052f0a107e7c.yaml | 58 +++++++++++++++++++ ...lite-e8533877c8cc904267c19512d475d608.yaml | 58 +++++++++++++++++++ ...ntor-1b9ddc8767486e6841efc7560084f93c.yaml | 58 +++++++++++++++++++ ...ntor-03fe440b02e44feccf06b79164360aca.yaml | 58 +++++++++++++++++++ ...ntor-151a3d01fba73eb2e03af896af5366b4.yaml | 58 +++++++++++++++++++ ...ntor-1f2c4e6dec405aef3fd5e6566d223430.yaml | 58 +++++++++++++++++++ ...ntor-26fe6330bdb19cfffb8c82c950ab810e.yaml | 58 +++++++++++++++++++ ...ntor-287536d4e13889455f637b6c851d2004.yaml | 58 +++++++++++++++++++ ...ntor-2a3ca00c5df2d9ec07efb3c8b755e2fe.yaml | 58 +++++++++++++++++++ ...ntor-2f027571e136822dc3132e7a5b6f47eb.yaml | 58 +++++++++++++++++++ ...ntor-5076d4232fcfbe5d646915f67652404a.yaml | 58 +++++++++++++++++++ ...ntor-5721e5b5b859df336ecc013b38726f93.yaml | 58 +++++++++++++++++++ ...ntor-5ccd429722cafafb64349730f5cc0669.yaml | 58 +++++++++++++++++++ ...ntor-5e6768e991caa45e72cc5f93d69cc8a5.yaml | 58 +++++++++++++++++++ ...ntor-5f7ca58c2ad3d25f19da443baa193352.yaml | 58 +++++++++++++++++++ ...ntor-660b23de83aeeb4aa32118217df234cf.yaml | 58 +++++++++++++++++++ ...ntor-669dc6b32158d01ea3af647aee0ce2e6.yaml | 58 +++++++++++++++++++ ...ntor-727d2f92da48e178eefceef10fd279f0.yaml | 58 +++++++++++++++++++ ...ntor-7df4e23827630859e3a047cf49f19af4.yaml | 58 +++++++++++++++++++ ...ntor-88f2e8b62006d8f70eead27b7d5c23f7.yaml | 58 +++++++++++++++++++ ...ntor-8f2ebff96481ee5356699783e44b68ea.yaml | 58 +++++++++++++++++++ ...ntor-95ed8c023906e2f70f01592d99282d0b.yaml | 58 +++++++++++++++++++ ...ntor-97ebb96fdd3db87faf02d7c0a7e706c7.yaml | 58 +++++++++++++++++++ ...ntor-98c8e6a6d80acb851afcee0bde588eea.yaml | 58 +++++++++++++++++++ ...ntor-b165aaaa725c1983b238dd197ed1a7e5.yaml | 58 +++++++++++++++++++ ...ntor-b58bfdaaa39d4e7d694c40523cac0a71.yaml | 58 +++++++++++++++++++ ...ntor-bdfd3cb15fc22fa823679d0ba1d3fc73.yaml | 58 +++++++++++++++++++ ...ntor-c04510d8ae6604902066b55cfed338f7.yaml | 58 +++++++++++++++++++ ...ntor-cba36394f848d0e615f1c12018c52329.yaml | 58 +++++++++++++++++++ ...ntor-d16f5d5a117e59e23a5a604664dfe044.yaml | 58 +++++++++++++++++++ ...ntor-e1d6d92659e9b697c29f278d3aacc568.yaml | 58 +++++++++++++++++++ ...ntor-ed7ec795a9e5769e2593c8bc7106e945.yaml | 58 +++++++++++++++++++ ...ntor-fa47ef3a071af26f7cb8467307b46f4c.yaml | 58 +++++++++++++++++++ ...ntor-fe43bc61a2c4502126731a0d72fb43ba.yaml | 58 +++++++++++++++++++ ...-pro-0f93fc1c537d4354bd5e942ea05347cf.yaml | 58 +++++++++++++++++++ ...-pro-25aa395084f363ecfd02447bcee9b684.yaml | 58 +++++++++++++++++++ ...-pro-4227a0d8303b8be51d7b7784befed50f.yaml | 58 +++++++++++++++++++ ...-pro-495b1b12b50b14325e42d32d8b21fb76.yaml | 58 +++++++++++++++++++ ...-pro-500730a31af9acbaf8945d735529d69e.yaml | 58 +++++++++++++++++++ ...-pro-52d465c21905272814a823dbfaac019a.yaml | 58 +++++++++++++++++++ ...-pro-5ecb61edb8f014ffed25792497a59fa8.yaml | 58 +++++++++++++++++++ ...-pro-68b5f15989ca60b284d4dce6601af76b.yaml | 58 +++++++++++++++++++ ...-pro-6b5638f86300bb8cb925bbc8ddae3c32.yaml | 58 +++++++++++++++++++ ...-pro-74f6871329004558f0dbc4c0f34288a7.yaml | 58 +++++++++++++++++++ ...-pro-d8cb62391dd6a20fc4b59fa893c8943a.yaml | 58 +++++++++++++++++++ ...-pro-f9bf203df336a8e0915eb488a89feed1.yaml | 58 +++++++++++++++++++ ...rlms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...plus-3da99f6ccd8b569aa4895183dacec31a.yaml | 58 +++++++++++++++++++ ...plus-c23e4efbffee4d6fedc761f6f4283de6.yaml | 58 +++++++++++++++++++ ...skit-7b0e7eea2756aa9a3fb9bd9d76ac83fe.yaml | 58 +++++++++++++++++++ ...skit-7ccdd8fc797e3fab9fea1a77280ae2aa.yaml | 58 +++++++++++++++++++ ...lite-01583a85c3bb765e7b9d1e3e575dd138.yaml | 58 +++++++++++++++++++ ...lite-55933111032f4be98ad6ab7b8ab899fc.yaml | 58 +++++++++++++++++++ ...lite-7a76232802e20b0ab3fa4ab939317696.yaml | 58 +++++++++++++++++++ ...lite-8951eb99c398a311cfe985bad4ff4e0c.yaml | 58 +++++++++++++++++++ ...lite-998f619282ed25afacc39847ff214ad0.yaml | 58 +++++++++++++++++++ ...lite-a391f7553cca71ac204345c2d728e50d.yaml | 58 +++++++++++++++++++ ...lite-b5aa1e2113ade8542174b19f6a7b50fe.yaml | 58 +++++++++++++++++++ ...lite-b81f70d3babfec3365a985059b1ef475.yaml | 58 +++++++++++++++++++ ...lite-c5f80f50585482477dae3983763ad356.yaml | 58 +++++++++++++++++++ ...lite-cebcb9a4981e79bfafb93e65195f6976.yaml | 58 +++++++++++++++++++ ...lite-e064b41fe8a39fcee76359d8531bca53.yaml | 58 +++++++++++++++++++ ...pare-e41adc177b897ccc45ae52e5f4de56b3.yaml | 58 +++++++++++++++++++ ...unts-1ceda12447caf192b9b71c29d944dec3.yaml | 58 +++++++++++++++++++ ...unts-5803c54654296625cc9282007e3bc732.yaml | 58 +++++++++++++++++++ ...unts-a95a041f663a4c62aff19b3c367f951b.yaml | 58 +++++++++++++++++++ ...asic-f5c3c86270b1863c3fa6b0703e6d1b39.yaml | 58 +++++++++++++++++++ ...logy-e298d4cd6c60e1657aca279370a259b7.yaml | 58 +++++++++++++++++++ ...ctor-3b02e02d41cec8d9db34b3c05317b116.yaml | 58 +++++++++++++++++++ ...oder-b24c287a46f17f82649a53242631be85.yaml | 58 +++++++++++++++++++ ...lery-20b7ddc5d1ffcbeda215596162f60f8b.yaml | 58 +++++++++++++++++++ ...lery-4d82961305a08da281f47753834e6ed4.yaml | 58 +++++++++++++++++++ ...lery-5969d2a7887ae66d8279d64632cb1bda.yaml | 58 +++++++++++++++++++ ...lery-9c1eeb6cb8e2181d2e2a015c65a4f34a.yaml | 58 +++++++++++++++++++ ...load-21e4ce5a3bfca4114f19fea4e07cedff.yaml | 58 +++++++++++++++++++ ...load-5ea0c3651c9da8625cccc634cc64b098.yaml | 58 +++++++++++++++++++ ...load-6ebfe44ebffa047243d43e4d8e8b6f78.yaml | 58 +++++++++++++++++++ ...load-a2870e76b912e745a86653be4b4db558.yaml | 58 +++++++++++++++++++ ...load-ccee5c3d44686cfe8d0fc73e53e58d49.yaml | 58 +++++++++++++++++++ ...erce-2dc01355a72cc0cc9990304f23aef74b.yaml | 58 +++++++++++++++++++ ...erce-240ee5ac158ce434b1247f54a6208c44.yaml | 58 +++++++++++++++++++ ...link-6fee77016a00b31c59636a01ae709575.yaml | 58 +++++++++++++++++++ ...ndle-39cc187a3eccc87804cc421fe29b611f.yaml | 58 +++++++++++++++++++ ...ndle-83be75cbe83d286de0e56bf13cde5945.yaml | 58 +++++++++++++++++++ ...ndle-8e9ca596ac830dab2177a8b85d591379.yaml | 58 +++++++++++++++++++ ...ndle-9a66ad8b0967001fd55d0d45f6e42869.yaml | 58 +++++++++++++++++++ ...ndle-9c882237ff7863bee4225b027eaf1086.yaml | 58 +++++++++++++++++++ ...ndle-c754ba54f7d343b7382e51da7c21880e.yaml | 58 +++++++++++++++++++ ...oter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-log-628e104d3a4b1ff3a2f651b79f8f25d3.yaml | 58 +++++++++++++++++++ ...-log-ed713a06b3f7e4b3455b2dcdb9972457.yaml | 58 +++++++++++++++++++ ...-log-f236054487317139ae48591f97952a0e.yaml | 58 +++++++++++++++++++ ...osts-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...tter-72825f3aadd86474681e72f8f4d9931a.yaml | 58 +++++++++++++++++++ ...tter-8a46b53d95feeaadec01fb4ec558c983.yaml | 58 +++++++++++++++++++ ...tter-faced947f330f89d07bbb1dcb1b4213e.yaml | 58 +++++++++++++++++++ ...bers-4eac7176009c682727808e01e866ef23.yaml | 58 +++++++++++++++++++ ...bers-70d540971be97a9211e2d9d5341f5f1e.yaml | 58 +++++++++++++++++++ ...bers-8758f22404dd62cde026b1679050e44a.yaml | 58 +++++++++++++++++++ ...ueue-b0b27aeca24eecebb185da8072b76690.yaml | 58 +++++++++++++++++++ ...ribe-42d0690a93913679d6541673c2295e13.yaml | 58 +++++++++++++++++++ ...ribe-61d643ab5e58be99a89f898a95037035.yaml | 58 +++++++++++++++++++ ...ribe-630f34845af5e5fc95882bb14f5c2a50.yaml | 58 +++++++++++++++++++ ...ribe-7d502a4de060d367bcc9b0de4a22c634.yaml | 58 +++++++++++++++++++ ...iber-59026d3a8bc5d6798f6f8303efbe2f34.yaml | 58 +++++++++++++++++++ ...bers-030bdddcac86d2bf18f94090df9f83ed.yaml | 58 +++++++++++++++++++ ...bers-13af706509ed275951fca2f87c67ca91.yaml | 58 +++++++++++++++++++ ...bers-250405dd7d7ac0936ba8e7cd74ae07f6.yaml | 58 +++++++++++++++++++ ...bers-3042e18a6deb29dac6c8bd45ef1b1544.yaml | 58 +++++++++++++++++++ ...bers-44b2c7a52835b66ee714b700c4849cf7.yaml | 58 +++++++++++++++++++ ...bers-52ad0bdca5afebb4c884c4a9d304e243.yaml | 58 +++++++++++++++++++ ...bers-611a77108bb5f90997b0fce9e22206d7.yaml | 58 +++++++++++++++++++ ...bers-648aa8a954870cce461eed81133035e4.yaml | 58 +++++++++++++++++++ ...bers-64ebdeacfb7857f81240b567b724e6b3.yaml | 58 +++++++++++++++++++ ...bers-6d5548494ee66c8a74f29f22d03a7935.yaml | 58 +++++++++++++++++++ ...bers-827bc1bb21b15b99a01d332b7037ec11.yaml | 58 +++++++++++++++++++ ...bers-865ecb5d1f3a9d92057b3c2510337cb0.yaml | 58 +++++++++++++++++++ ...bers-880b88155b22c7b6bb28fecc96be5e0e.yaml | 58 +++++++++++++++++++ ...bers-9ac9f5b4519b4e9d1529f25c11daa2ab.yaml | 58 +++++++++++++++++++ ...bers-9fe142798845207512b358a2cd4c8c4d.yaml | 58 +++++++++++++++++++ ...bers-a1ba03b1aedf70c25268c48aaf5fa097.yaml | 58 +++++++++++++++++++ ...bers-aa4af80a7f91093ad7b6f879bc08fdf0.yaml | 58 +++++++++++++++++++ ...bers-abc4377868fee7cd682ebf8a6fc03b43.yaml | 58 +++++++++++++++++++ ...bers-b5e4b4063141fbe3f98d4c057142e54f.yaml | 58 +++++++++++++++++++ ...bers-bbb33bf45ae299a4c2e1d54441bd6458.yaml | 58 +++++++++++++++++++ ...bers-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml | 58 +++++++++++++++++++ ...bers-fedbaf9b75c3966253ac9d4ff4472b7e.yaml | 58 +++++++++++++++++++ ...ates-57946d1dd6e11e1c396ef81b832dc135.yaml | 58 +++++++++++++++++++ ...ates-917b82f603a027a526dfc9cab63f789f.yaml | 58 +++++++++++++++++++ ...cker-1bc28fb76a1a4ab68d85fdb49a0d308f.yaml | 58 +++++++++++++++++++ ...cker-2aa4582e387e2f0aff6a161bf2999899.yaml | 58 +++++++++++++++++++ ...cker-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sers-6a64d101ff5229efb2db9bdfe2f53def.yaml | 58 +++++++++++++++++++ ...sers-6dc4bc21ff707a1d11a058362ed03503.yaml | 58 +++++++++++++++++++ ...sers-ccda15a5bf6159295fcd2e55b40f1e6b.yaml | 58 +++++++++++++++++++ ...sers-f8b327a38c9f793227404396765e7078.yaml | 58 +++++++++++++++++++ ...-pro-ee48551d5debb82650756b153a85ffe4.yaml | 58 +++++++++++++++++++ ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-4a3c747c05de1c383de7ec2aa84fdb32.yaml | 58 +++++++++++++++++++ ...erce-ee48551d5debb82650756b153a85ffe4.yaml | 58 +++++++++++++++++++ ...ment-da04799a8ee55b9edffd7e84cb258c78.yaml | 58 +++++++++++++++++++ ...cles-f3817a5409bd2eea88bc7efe16cd9b30.yaml | 58 +++++++++++++++++++ ...ling-6520a4a851336aa904cc04b7b33623a5.yaml | 58 +++++++++++++++++++ ...ages-ce946f2b4359bb7fac48391b993074ae.yaml | 58 +++++++++++++++++++ ...form-22880b987be0b07f46689049fd2458ff.yaml | 58 +++++++++++++++++++ ...onts-48e682e482ecb4079ded015fff88c4de.yaml | 58 +++++++++++++++++++ ...sily-83ccb1e8ea2bc379358acbb752bc4542.yaml | 58 +++++++++++++++++++ ...ewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...r-bi-30c71081d6f65fd865fd605bc8ca0520.yaml | 58 +++++++++++++++++++ ...vacy-bf9717887c7854e5283687233b3eaf88.yaml | 58 +++++++++++++++++++ ...gger-92781f05f816d6c99cfd35413990ba55.yaml | 58 +++++++++++++++++++ ...ideo-d936ad16c92f96a8d361e8354b08642f.yaml | 58 +++++++++++++++++++ ...-pro-db16305504754334b65159ac40ded503.yaml | 58 +++++++++++++++++++ ...link-2330137ae1ec8d7b8306559ca1c520ca.yaml | 58 +++++++++++++++++++ ...ress-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ress-115e00c651433aced451e63d84a0be40.yaml | 58 +++++++++++++++++++ ...ress-1d3dbd02fa5b7205872c8a687215c897.yaml | 58 +++++++++++++++++++ ...ress-1f31c2ba6ee46d152a9920d8ef0adb22.yaml | 58 +++++++++++++++++++ ...ress-1fc5887f904fbbe1b31241f4769801b5.yaml | 58 +++++++++++++++++++ ...ress-3c6a3e77a7ff2e2c086feda205237c52.yaml | 58 +++++++++++++++++++ ...ress-55354669981e5b8e2367ee7fd327c426.yaml | 58 +++++++++++++++++++ ...ress-70a205acd44742a9f8e261e79a40ad0f.yaml | 58 +++++++++++++++++++ ...ress-735922333648d19765f3918bee1c33f6.yaml | 58 +++++++++++++++++++ ...ress-7ebfb915654b21bb1907517d4349fa05.yaml | 58 +++++++++++++++++++ ...ress-880737228fe55f5d920474a43f87af97.yaml | 58 +++++++++++++++++++ ...ress-8d8dc52792f8d60124d8fa4fa4f53a0c.yaml | 58 +++++++++++++++++++ ...ress-af797cbd3361f1f4f2cd0edf1a785a5a.yaml | 58 +++++++++++++++++++ ...ress-c976de4a293db59cf9e14c118fa6d0c4.yaml | 58 +++++++++++++++++++ ...ress-cefa3854b69334bef3c2d36906bda58c.yaml | 58 +++++++++++++++++++ ...ress-e1343ff86b6c5b93b675136f5cf7bf16.yaml | 58 +++++++++++++++++++ ...ress-e6bef9cbc42ae7e22a44d23e311b7552.yaml | 58 +++++++++++++++++++ ...ress-ebf721c6b992d7c7bdcbf869b188ed93.yaml | 58 +++++++++++++++++++ ...ress-ef5a725ea594e708f6f726a1ed538862.yaml | 58 +++++++++++++++++++ ...ress-f70dc70f946daa66696d6fbc7263d880.yaml | 58 +++++++++++++++++++ ...ries-a14026f64e5ecc9508ff272952e95205.yaml | 58 +++++++++++++++++++ ...deos-dac97f512e0af4b1c598ff6f32c574aa.yaml | 58 +++++++++++++++++++ ...lity-66918096b133f0822c2cd20e34605973.yaml | 58 +++++++++++++++++++ ...lace-47f4114397364fc89b3a25b4215574b4.yaml | 58 +++++++++++++++++++ ...lace-bbc7fa54925890b55e253bb27ea68d3f.yaml | 58 +++++++++++++++++++ ...lace-dead64d1305225210f2390b6b61b5201.yaml | 58 +++++++++++++++++++ ...lace-deb23a0fc9d87cc73b65165406099d91.yaml | 58 +++++++++++++++++++ ...-svg-de18c34baf9718449b89d0d38543217b.yaml | 58 +++++++++++++++++++ ...oads-a61a2dfac8b16f216b2c313ed531d97e.yaml | 58 +++++++++++++++++++ ...load-165d37e436f1584c4d3db5b3ec68fd79.yaml | 58 +++++++++++++++++++ ...load-653a3ab56e5af63ff26288de711fb273.yaml | 58 +++++++++++++++++++ ...load-ac9050df076297964363495b9c075e7f.yaml | 58 +++++++++++++++++++ ...oard-f01cd050c27f35f17165fc03a0fa92ef.yaml | 58 +++++++++++++++++++ ...blog-0f455cd91b4366e91443512f4a924b14.yaml | 58 +++++++++++++++++++ ...blog-b92dc57dcec5014fa09f88c38e362f1b.yaml | 58 +++++++++++++++++++ ...form-2fb0bdf5e86e962a718dd05b2ce83f93.yaml | 58 +++++++++++++++++++ ...dmin-450ea91a4d60d7431414f8be13b7c9b7.yaml | 58 +++++++++++++++++++ ...erce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...tore-3a5678cecd4cbb7e481b97acb528f036.yaml | 58 +++++++++++++++++++ ...tore-88bf9af12ef5e38595f378ad9f2dcf87.yaml | 58 +++++++++++++++++++ ...tore-9549871153d587a10461e3eb973b5757.yaml | 58 +++++++++++++++++++ ...tore-9c674f0198c44bbc3b97237db4078df1.yaml | 58 +++++++++++++++++++ ...tore-ad1bab22a9b739c47d96ab770ca5f753.yaml | 58 +++++++++++++++++++ ...tore-d482e085c2e103ed9accb9a0cd94ae4d.yaml | 58 +++++++++++++++++++ ...tore-ed938d6748a55c68d3afc00fc2604d10.yaml | 58 +++++++++++++++++++ ...rary-6039d2569df090d7d3093a78e0441287.yaml | 58 +++++++++++++++++++ ...dmin-7b7a151dfcca0b5faecc4b73e9e5942a.yaml | 58 +++++++++++++++++++ ...dmin-f1a2d10749ea560492c49064688b416f.yaml | 58 +++++++++++++++++++ ...dget-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...dget-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...dget-a9a1d45bfcbca6c173ea125c110bda5d.yaml | 58 +++++++++++++++++++ ...dget-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...dget-d68b3bd827fa2538356da72861992193.yaml | 58 +++++++++++++++++++ ...dget-d8eaeaf9f69a4b2de6a788086b60bfc0.yaml | 58 +++++++++++++++++++ ...sary-543a621cb0bf8b18bfbda7bc7ee7cfa1.yaml | 58 +++++++++++++++++++ ...sary-5597c388852b3462017f5bc3ca0328fd.yaml | 58 +++++++++++++++++++ ...sary-6bc3c65cb1ca8d7f84584a1599bace9a.yaml | 58 +++++++++++++++++++ ...sary-7c07c1ab091dafa6dc739a4dcb0453d1.yaml | 58 +++++++++++++++++++ ...form-71e56d0f97e8b4d7649e09ad58dd5927.yaml | 58 +++++++++++++++++++ ...form-d2114b88fcc067766472c75899b7fa23.yaml | 58 +++++++++++++++++++ ...rtjs-1d70e5d002efa976ab87b56edcf9f0b9.yaml | 58 +++++++++++++++++++ ...rtjs-ace575e194919fed8a75c5778dd0bfab.yaml | 58 +++++++++++++++++++ ...usel-47817571e00845c157bd7b162b48263f.yaml | 58 +++++++++++++++++++ ...usel-8100bca7f40bd5eec7ce73b26e775600.yaml | 58 +++++++++++++++++++ ...tter-450d379738a3ed762b9b5b46fb6f58a1.yaml | 58 +++++++++++++++++++ ...tter-84f324614693ea073f92a44e128e4cc4.yaml | 58 +++++++++++++++++++ ...tter-9e2d3a35dbbc0898dce1216c2073fa6e.yaml | 58 +++++++++++++++++++ ...tter-eca3d823dd426887bd9194913fe758fe.yaml | 58 +++++++++++++++++++ ...hing-a1f55b7e935f65d8ec08ab5f8854d26f.yaml | 58 +++++++++++++++++++ ...erce-e5a8f42155cebe6939f0ccac8621a6a2.yaml | 58 +++++++++++++++++++ ...dons-0e079d604a8bf155d8a2cb48193c6100.yaml | 58 +++++++++++++++++++ ...dons-82e1dbec0eac00504fe2d5c8d1c53a7b.yaml | 58 +++++++++++++++++++ ...ents-e259392e4e0f5c005c71447bf33a289e.yaml | 58 +++++++++++++++++++ ...atis-514cd5f6862b902abdfe45e0c2ceab5f.yaml | 58 +++++++++++++++++++ ...atis-6b955e7831b4476315ace7bb8d5f3ecb.yaml | 58 +++++++++++++++++++ ...atis-77c5f9441620c4484058d80cea50d864.yaml | 58 +++++++++++++++++++ ...atis-b6be086ceb5c1e62386aaf5cf54e66b3.yaml | 58 +++++++++++++++++++ ...atis-e9f65fad0edf93964d95edc6a82cf394.yaml | 58 +++++++++++++++++++ ...lite-493dd00fbad457efffd98380feee37ad.yaml | 58 +++++++++++++++++++ ...lite-91259d563d9ff9cc3660b0bcf5beec5d.yaml | 58 +++++++++++++++++++ ...lite-cc4dabd01e1338fc09aa2ef444904587.yaml | 58 +++++++++++++++++++ ...lite-d0a21350c57dcbddba5f33bc0580065b.yaml | 58 +++++++++++++++++++ ...erce-99a74c6c9556a6c727c6aed622ee1c96.yaml | 58 +++++++++++++++++++ ...erce-aa0d08f997d780bef53fffda596a65a2.yaml | 58 +++++++++++++++++++ ...erce-da8d9bf1ad46e0cc886ba0015417b54e.yaml | 58 +++++++++++++++++++ ...xtra-8eea52e06c2c0dbad4e62c3bcac5c0df.yaml | 58 +++++++++++++++++++ ...xtra-c26f84b3b737dca9d0e2ab2c400f43b7.yaml | 58 +++++++++++++++++++ ...rove-bce2c57392aa12eefee039fe25226280.yaml | 58 +++++++++++++++++++ ...ting-17700405f02a76d34273fd6f63bdac56.yaml | 58 +++++++++++++++++++ ...ting-8119e5403d3a32487dee582a940781b5.yaml | 58 +++++++++++++++++++ ...ting-e39a71ad2e4c4fe07f9341861c3e2c8f.yaml | 58 +++++++++++++++++++ ...ping-ad0ff157f5be17af68fa4347894dd5e7.yaml | 58 +++++++++++++++++++ ...ects-535590a7d632fa42d8031b5da47799b7.yaml | 58 +++++++++++++++++++ ...ects-60796296d5bd5b2c076a796a73e81fc7.yaml | 58 +++++++++++++++++++ ...ects-65fec51a84e4dae8b6ac8a6f543cb922.yaml | 58 +++++++++++++++++++ ...ewed-c28abeb41bd6624cef6af021a381a425.yaml | 58 +++++++++++++++++++ ...oard-1bd28f72c9296305fff71e613d0c8c82.yaml | 58 +++++++++++++++++++ ...oard-b76f995a16535082b5686ca7f787e057.yaml | 58 +++++++++++++++++++ ...oard-bd06eea54f94d4f00b121a93f672de21.yaml | 58 +++++++++++++++++++ ...cket-9babf2cf45788c102d8f9d4588bf3e93.yaml | 58 +++++++++++++++++++ ...inar-2a4cf068be66f271c3b3f52be6e940ba.yaml | 58 +++++++++++++++++++ ...inar-5ea4e509f820ba7667284a234b2ed4c9.yaml | 58 +++++++++++++++++++ ...inar-cfb7ab3df6961d91dd158fd90d7552c0.yaml | 58 +++++++++++++++++++ ...inar-d77ed1e2b83213ba479b850a5dfc79e1.yaml | 58 +++++++++++++++++++ ...inar-e081d559a96dc283eb19909827c9469c.yaml | 58 +++++++++++++++++++ .../erp-028f2396fc3224cdf799828543a80de4.yaml | 58 +++++++++++++++++++ .../erp-1ecaadeb4176f89b0523e2b0bb90c06a.yaml | 58 +++++++++++++++++++ .../erp-28fd0d7c469dc40d11dbc75326d45936.yaml | 58 +++++++++++++++++++ .../erp-2c7b7c699deb0493bc338eec94d29af3.yaml | 58 +++++++++++++++++++ .../erp-3b72f620df35cbae939967377ac621cd.yaml | 58 +++++++++++++++++++ .../erp-4ba36f479c72328d41a5d7367a3a95ba.yaml | 58 +++++++++++++++++++ .../erp-4cd083213286b4e4a8589cde5bcde660.yaml | 58 +++++++++++++++++++ .../erp-8acf66d52cca352214a80a527274b5a4.yaml | 58 +++++++++++++++++++ .../erp-b10ae50c79331d4dcb069789ed2ad609.yaml | 58 +++++++++++++++++++ .../erp-b7e69e83c8c59004ad0e6d101ab301ac.yaml | 58 +++++++++++++++++++ .../erp-d1b821dbb873ab8f28cd2cb8f033062c.yaml | 58 +++++++++++++++++++ .../erp-d1fe516e72277a6efd50d79a0cef3b2d.yaml | 58 +++++++++++++++++++ .../erp-e196c6551f9d36abf1354b03caa3e5d1.yaml | 58 +++++++++++++++++++ ...itor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...itor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ewer-379b9f1826ea14bff8cb3dd2f951214d.yaml | 58 +++++++++++++++++++ ...ewer-4c143b0897524c6ae94ca24b5d894e6a.yaml | 58 +++++++++++++++++++ ...ewer-85f600cb7a38ce6985c36103e27ab0e2.yaml | 58 +++++++++++++++++++ ...ewer-a66a4d5df510beea3bf0ab3d3982bdad.yaml | 58 +++++++++++++++++++ ...shop-4712ac1bb5ac602fc210b88a33fdaf9f.yaml | 58 +++++++++++++++++++ ...shop-6b1f692527a7829aa26f6946e0d77ddd.yaml | 58 +++++++++++++++++++ ...shop-7e99952543b7586dc6b3250a2122b0f9.yaml | 58 +++++++++++++++++++ ...shop-b63e841ec4f7ba03a92d7fcbed9249bc.yaml | 58 +++++++++++++++++++ ...shop-e18e1098e91136cecbeb6e29db3c0caa.yaml | 58 +++++++++++++++++++ ...agic-2a97bfdfd8781ee071e1eb3b8b605769.yaml | 58 +++++++++++++++++++ ...ntor-298ee3ac56fa2818652ccdcf0f94081c.yaml | 58 +++++++++++++++++++ ...ntor-4efdbc3738e2b809632b64ac3cda51fe.yaml | 58 +++++++++++++++++++ ...ntor-f34ebd6d445ec4bbd536ce24fec37483.yaml | 58 +++++++++++++++++++ ...lite-1015b09d99817c2106e43f3451c30ac1.yaml | 58 +++++++++++++++++++ ...lite-1a4b02751bb2128579758045cc80caa1.yaml | 58 +++++++++++++++++++ ...lite-1a9b2b84b94bf133577af40ec3afb2be.yaml | 58 +++++++++++++++++++ ...lite-200d6c881afb4e097be1558e49c07780.yaml | 58 +++++++++++++++++++ ...lite-24bb86aa2326eca80531d492521a5d29.yaml | 58 +++++++++++++++++++ ...lite-3336686541cab0beb9c572eb91b49251.yaml | 58 +++++++++++++++++++ ...lite-622d5312417c1581aa63ff2faa690a9c.yaml | 58 +++++++++++++++++++ ...lite-641fbcb7693eaa3a03da6b383765a523.yaml | 58 +++++++++++++++++++ ...lite-73185f41beb88e54f54a80787c1d789a.yaml | 58 +++++++++++++++++++ ...lite-84d7b8eee39d9201723ad33de86e3865.yaml | 58 +++++++++++++++++++ ...lite-8bd60d8d3ae1eb23eefce0f380d89e1c.yaml | 58 +++++++++++++++++++ ...lite-8e520f19b2730c335f2344f32b135ff7.yaml | 58 +++++++++++++++++++ ...lite-9319000e1757d81a7b4d434242e3b0b6.yaml | 58 +++++++++++++++++++ ...lite-b435c087d203d9fb2850a517c55bcc97.yaml | 58 +++++++++++++++++++ ...lite-b4aa2ee32c8d094c0d7d3b9c1a221104.yaml | 58 +++++++++++++++++++ ...lite-b90105c25730b4d746a6acc92069913e.yaml | 58 +++++++++++++++++++ ...lite-baba429a98395d144623d60921070685.yaml | 58 +++++++++++++++++++ ...lite-c784400f0eb0916fb123587bb1f7a008.yaml | 58 +++++++++++++++++++ ...lite-c7afeb04136868c455da71b1177f088f.yaml | 58 +++++++++++++++++++ ...lite-c900b7eac90dcb368c77b66b5bee17b3.yaml | 58 +++++++++++++++++++ ...lite-c945e86e64bc195e431c6da83e2cc2c3.yaml | 58 +++++++++++++++++++ ...lite-cbede89175ad7b3a47d5ac8fb29d35bb.yaml | 58 +++++++++++++++++++ ...lite-d36603d2844e0ef2710cb2cbe62e45a6.yaml | 58 +++++++++++++++++++ ...lite-d4efcf3c752e65b8bb0f68965ff8309b.yaml | 58 +++++++++++++++++++ ...lite-d621d242ab564fd8e6e924445af60a72.yaml | 58 +++++++++++++++++++ ...lite-da6c348f533c2442c083b7568ed9771b.yaml | 58 +++++++++++++++++++ ...lite-e5a55bdcc25518bd7b994104c01d9391.yaml | 58 +++++++++++++++++++ ...lite-e9df6b62593e703fd734b693ccc67b68.yaml | 58 +++++++++++++++++++ ...lite-eeb15b3523994497219c24e4ab9f075e.yaml | 58 +++++++++++++++++++ ...lite-fd0c27ea93cffb5177b96e76bbc2aa5f.yaml | 58 +++++++++++++++++++ ...ocks-1092f82974f0d44c05422ba456183db5.yaml | 58 +++++++++++++++++++ ...ocks-6092ac059aadb6e2fb447935fafb717a.yaml | 58 +++++++++++++++++++ ...ocks-61d212d2e307b78bf3e793271bc28e50.yaml | 58 +++++++++++++++++++ ...ocks-65769acec1aefbf22b461433a4ab976c.yaml | 58 +++++++++++++++++++ ...ocks-670002c777730edbb2cb892efe1340bc.yaml | 58 +++++++++++++++++++ ...ocks-6bd5ec9d4799550acfbe6978f43129c9.yaml | 58 +++++++++++++++++++ ...ocks-7daa2f9a38772e28d5c088d50297e34a.yaml | 58 +++++++++++++++++++ ...ocks-809bef969b735d714b42168e6770e1c0.yaml | 58 +++++++++++++++++++ ...ocks-86a5e7d3d7ed00baf83310ad8f227a5e.yaml | 58 +++++++++++++++++++ ...ocks-8e520ae3c19cbf656f990691a6cb724f.yaml | 58 +++++++++++++++++++ ...ocks-9de5506c980e28c9e55c18a88ab23a5f.yaml | 58 +++++++++++++++++++ ...ocks-b8c50e487b4b0337b88f73b897d2ea2b.yaml | 58 +++++++++++++++++++ ...ocks-cc9e9a844434f90c7c28fe24a22a2f2b.yaml | 58 +++++++++++++++++++ ...ocks-d11264f27a09e4fdbe795eb60f43ac5c.yaml | 58 +++++++++++++++++++ ...ocks-daec7d39bacac9f0d791f41eb89b64b4.yaml | 58 +++++++++++++++++++ ...ocks-de6bb81e5776b8853821078d5af9e37e.yaml | 58 +++++++++++++++++++ ...ocks-ec83c952597cd4d48032e81f82ee4086.yaml | 58 +++++++++++++++++++ ...-pro-daec7d39bacac9f0d791f41eb89b64b4.yaml | 58 +++++++++++++++++++ ...-pro-de6bb81e5776b8853821078d5af9e37e.yaml | 58 +++++++++++++++++++ ...ypes-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...grid-252d8b0817c1504c9d368093cbed6570.yaml | 58 +++++++++++++++++++ ...grid-615a59dfb372c45c35b57f6455c9a01a.yaml | 58 +++++++++++++++++++ ...grid-ffdce410a6a7ddacc9790163fef8faa4.yaml | 58 +++++++++++++++++++ ...tate-00a2a2e9797fc1a0dfdb2c0093e34725.yaml | 58 +++++++++++++++++++ ...tate-495047757cee7d3f3cdfc2d78c597016.yaml | 58 +++++++++++++++++++ ...tate-530a5f39017e1b56e85add8e46eb1fc3.yaml | 58 +++++++++++++++++++ ...tate-54b8dea2a513397d549565f2d6307194.yaml | 58 +++++++++++++++++++ ...tate-79c84a24ae01cae4e07f5d580bc271de.yaml | 58 +++++++++++++++++++ ...tate-f1165caf4055b6656a8778038c98cf59.yaml | 58 +++++++++++++++++++ ...gets-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...atik-2dab9495e3032fc043db0a21d11fd446.yaml | 58 +++++++++++++++++++ ...atik-4a2a3f2d6fcad8ba2e9fd4989dbe6a53.yaml | 58 +++++++++++++++++++ ...atik-735edcca81533a941d73b22fd3c790b1.yaml | 58 +++++++++++++++++++ ...atik-c13a04653b2bd4332fed19d99c861058.yaml | 58 +++++++++++++++++++ ...atik-dffb7325ebaf69230baa15ff0c7b5c62.yaml | 58 +++++++++++++++++++ ...ator-4963e2b8018a63e397cd2fd1ef358d47.yaml | 58 +++++++++++++++++++ ...ator-b9268068741b5afa10930c2a68504f76.yaml | 58 +++++++++++++++++++ ...ugin-2b061e047e658e61d8ebbd4e7e809bba.yaml | 58 +++++++++++++++++++ ...ugin-3e529ad3f40187427736b7fab3732fc7.yaml | 58 +++++++++++++++++++ ...ugin-4a822947b182a8ad769234c031d65105.yaml | 58 +++++++++++++++++++ ...ugin-67b6d13fd5c91dcaea1d0b5a3d6ef9e6.yaml | 58 +++++++++++++++++++ ...ugin-69dc88dae2977364ee23f133476679d5.yaml | 58 +++++++++++++++++++ ...ugin-778530516424ce1a3968690bf84c44c4.yaml | 58 +++++++++++++++++++ ...ugin-7c1fbc71424269552780f75d587dc6d3.yaml | 58 +++++++++++++++++++ ...ugin-dfb4659d00ee25c056f5c89962f45122.yaml | 58 +++++++++++++++++++ ...eway-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...llet-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mico-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...shop-006e837e29a04be28f23fcb621fc7c5f.yaml | 58 +++++++++++++++++++ ...shop-12af00d20d6054e6e52d985c87c55f02.yaml | 58 +++++++++++++++++++ ...-law-0598f02cdb42ad5878825a4305d0cd60.yaml | 58 +++++++++++++++++++ ...-law-7bd73acb3e7a0bf377aeb77c95eb6b8a.yaml | 58 +++++++++++++++++++ ...erce-138945608ab96d8fde0710ddccd28d61.yaml | 58 +++++++++++++++++++ ...uate-c206b1ef471fcab481cc325e40071db1.yaml | 58 +++++++++++++++++++ ...risk-f472ae87189b5e53003e503dd6fa0b7e.yaml | 58 +++++++++++++++++++ ...r-wd-209b175b2921345ce72870696dcb5d5d.yaml | 58 +++++++++++++++++++ ...r-wd-47b8a1ee1f8560846764b32bfc0f5385.yaml | 58 +++++++++++++++++++ ...r-wd-4f2124ce38e5b11836dd224eb87f80c1.yaml | 58 +++++++++++++++++++ ...r-wd-c04a7619437a5f30e58f107b65d00343.yaml | 58 +++++++++++++++++++ ...r-wd-f5b60cb69c042e53c0624a4896969936.yaml | 58 +++++++++++++++++++ ...r-wd-f87eb9062acaa622ccaad44a0da4055e.yaml | 58 +++++++++++++++++++ ...ndar-204a4a5eb1bb83f22931c8d30c356316.yaml | 58 +++++++++++++++++++ ...ndar-c4cddbbbf9510f7f05b91c86dc3dade6.yaml | 58 +++++++++++++++++++ ...core-64738de487a64bb84aa49f1cb2905c9b.yaml | 58 +++++++++++++++++++ ...ecaf-58a3697a69c8ed53be8155b2e125899c.yaml | 58 +++++++++++++++++++ ...ecaf-b570b273a03a0fa29b5a4d4db2c58011.yaml | 58 +++++++++++++++++++ ...free-11785a74a8a2ea2253fb0fe61f67d120.yaml | 58 +++++++++++++++++++ ...free-3faf59fe255a23ab6371375fbe88c459.yaml | 58 +++++++++++++++++++ ...geek-895b9710054cceeb59eef3658e032c99.yaml | 58 +++++++++++++++++++ ...list-1b4409ad110c3c389ee584578fde5c3f.yaml | 58 +++++++++++++++++++ ...list-8aead4340d12e591a0e0e1fb46dd9226.yaml | 58 +++++++++++++++++++ ...list-b6feac7a7902db970215a4fc933d4825.yaml | 58 +++++++++++++++++++ ...ster-2ce3da9cb13ca01fe4975c718c0361d4.yaml | 58 +++++++++++++++++++ ...ster-5b36fd20286674ebec29c5f8c3b598c9.yaml | 58 +++++++++++++++++++ ...ster-6be2333e24bb1c10a3a6c889899366b0.yaml | 58 +++++++++++++++++++ ...ster-7d599c9ff2fd0f7d53f1daad762aa4e5.yaml | 58 +++++++++++++++++++ ...ster-86218768d044c8a0a41ad3c63743810a.yaml | 58 +++++++++++++++++++ ...fier-a1a48fe23ddfed810a2068245669c30f.yaml | 58 +++++++++++++++++++ ...ndar-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...post-7d0df8a0008135defe46e0244de6dafd.yaml | 58 +++++++++++++++++++ ...tion-3ce5735f215e4140f8aa361ffb4589b3.yaml | 58 +++++++++++++++++++ ...tion-9d8bac7e00ea2ec60ec3b7aebc38c2af.yaml | 58 +++++++++++++++++++ ...tion-b3acf24261888a93af1e07d21be14713.yaml | 58 +++++++++++++++++++ ...cita-75fa36bac06fa043ebc71b72e7bf53b3.yaml | 58 +++++++++++++++++++ ...cita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml | 58 +++++++++++++++++++ ...tion-e5636efc611147282df108916f2ce8de.yaml | 58 +++++++++++++++++++ ...kets-2581131a04f529b6a1d76a0e92f4b955.yaml | 58 +++++++++++++++++++ ...kets-2f07eb6c891e38765db750c63d86a120.yaml | 58 +++++++++++++++++++ ...kets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...kets-c4921b839172d2af0f48284749d41b1d.yaml | 58 +++++++++++++++++++ ...kets-cb6c55d4733797bb415d8f13c3aeab2d.yaml | 58 +++++++++++++++++++ ...kets-f8870005841795b1f61974063b04cd70.yaml | 58 +++++++++++++++++++ ...plus-2581131a04f529b6a1d76a0e92f4b955.yaml | 58 +++++++++++++++++++ ...plus-4df3cdb7c674def16735b8e037827c43.yaml | 58 +++++++++++++++++++ ...nner-eb93d0fd8aabb59ccf2ece6d36890f6a.yaml | 58 +++++++++++++++++++ ...tify-5dad00a11bede1ceffdac71757dc57c7.yaml | 58 +++++++++++++++++++ ...tify-a2935a109cadc5c6b15de3c6e258096e.yaml | 58 +++++++++++++++++++ ...nton-187d65743de5f807e3a3561c30924b2f.yaml | 58 +++++++++++++++++++ ...nton-2c733617d0e1924a092044fd73aaa5a5.yaml | 58 +++++++++++++++++++ ...nton-34378358cea5d52c68afc57717376111.yaml | 58 +++++++++++++++++++ ...nton-40551e34986076f096f391a092597f50.yaml | 58 +++++++++++++++++++ ...nton-4534912fcab3ecf2a9fe501762efc225.yaml | 58 +++++++++++++++++++ ...nton-537515ca49a9f4b41a11d36cd380e6f4.yaml | 58 +++++++++++++++++++ ...nton-68358961295abb7462ad91426e0c3310.yaml | 58 +++++++++++++++++++ ...nton-6c5fd9bdbd84a5f94cf449613dea61df.yaml | 58 +++++++++++++++++++ ...nton-83c99024de6733ef722985ade6213db3.yaml | 58 +++++++++++++++++++ ...nton-9a365d69136d08070aadedc43ca85c95.yaml | 58 +++++++++++++++++++ ...nton-bfc5e831d060dfacf2a5fc44dc2fba98.yaml | 58 +++++++++++++++++++ ...lite-187d65743de5f807e3a3561c30924b2f.yaml | 58 +++++++++++++++++++ ...lite-2c733617d0e1924a092044fd73aaa5a5.yaml | 58 +++++++++++++++++++ ...lite-32a06eefdb3abe2eefd8adc33ab67b7c.yaml | 58 +++++++++++++++++++ ...lite-34378358cea5d52c68afc57717376111.yaml | 58 +++++++++++++++++++ ...lite-4534912fcab3ecf2a9fe501762efc225.yaml | 58 +++++++++++++++++++ ...lite-537515ca49a9f4b41a11d36cd380e6f4.yaml | 58 +++++++++++++++++++ ...lite-68358961295abb7462ad91426e0c3310.yaml | 58 +++++++++++++++++++ ...lite-6c5fd9bdbd84a5f94cf449613dea61df.yaml | 58 +++++++++++++++++++ ...lite-83c99024de6733ef722985ade6213db3.yaml | 58 +++++++++++++++++++ ...lite-9854f6b7648b36ab18b7baf1bd96dfc8.yaml | 58 +++++++++++++++++++ ...lite-9a365d69136d08070aadedc43ca85c95.yaml | 58 +++++++++++++++++++ ...lite-b285571aa8961228c020fb748a563a39.yaml | 58 +++++++++++++++++++ ...lite-eb5eba3fb055e3f1a65941e7a11b92d0.yaml | 58 +++++++++++++++++++ ...lite-fb01f61580a3daa6743e2536b3904a23.yaml | 58 +++++++++++++++++++ ...rsvp-e0185b582d68cb517dbdd113cf354faa.yaml | 58 +++++++++++++++++++ ...ment-0518a583283f442e889b7000a0f04a7c.yaml | 58 +++++++++++++++++++ ...ment-0ce22c0fe7f774ad920004b34c3c97f2.yaml | 58 +++++++++++++++++++ ...ment-3bc30bc01f7305f10a41312e9c39291f.yaml | 58 +++++++++++++++++++ ...ment-3d6ad1520c77aad1133699654b17aff7.yaml | 58 +++++++++++++++++++ ...ment-3fbde3febf513db2a577aee06321eb0b.yaml | 58 +++++++++++++++++++ ...ment-42040b470560c747a13bf2788592d50b.yaml | 58 +++++++++++++++++++ ...ment-4d3269fa7a276b2eee412016f196b38c.yaml | 58 +++++++++++++++++++ ...ment-5484a37a07e396bedb80a8478f30a008.yaml | 58 +++++++++++++++++++ ...ment-5610b8d447f64bccab677eca7d6526f5.yaml | 58 +++++++++++++++++++ ...ment-7e0a85cefa9d78b7f58f293d006f3397.yaml | 58 +++++++++++++++++++ ...ment-7faa6bde45e1f2f5ce5eafbc2fbeb516.yaml | 58 +++++++++++++++++++ ...ment-8aeb2b8f9fd8f5408bc5cbce23cde23a.yaml | 58 +++++++++++++++++++ ...ment-98364cc3fafc257904edef9d7b1a931a.yaml | 58 +++++++++++++++++++ ...ment-aaa60a656a1631ccb0bbf7769cde29dc.yaml | 58 +++++++++++++++++++ ...ment-c14577a628b19f58f816579d213106ef.yaml | 58 +++++++++++++++++++ ...ment-d1b60cf010a4c4b99d620cf0f040e27a.yaml | 58 +++++++++++++++++++ ...ment-d621f315674a851e95757dca3af1ff0a.yaml | 58 +++++++++++++++++++ ...ment-e40a3e8ea03e0231ec1106a753934528.yaml | 58 +++++++++++++++++++ ...ment-ee51cf1fa55e4a9d226a63dcaad1a260.yaml | 58 +++++++++++++++++++ ...ment-ef2d23d82a10c333e2eaaf91d1a798ba.yaml | 58 +++++++++++++++++++ ...entr-3555e671fb855ca8a86dbba28248a06b.yaml | 58 +++++++++++++++++++ ...entr-55a68c58c48b9986849ddaa1407aa30f.yaml | 58 +++++++++++++++++++ ...ents-2ad357ed5ae7046d44da5210b6526312.yaml | 58 +++++++++++++++++++ ...ntor-8162890ff35ac91aaaabb28f65bfd97b.yaml | 58 +++++++++++++++++++ ...ntor-a83b5885cc29169b3a804ccaa82ed3fd.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...plus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...easy-2f7fd4d18b200014ffe6ce74713f97bf.yaml | 58 +++++++++++++++++++ ...easy-6f97964629a2d8890727a9938703cfc3.yaml | 58 +++++++++++++++++++ ...easy-9bcf64c7dbe781ab40d3670dc81b8e8c.yaml | 58 +++++++++++++++++++ ...easy-a5068346d1e00e358b18b96ff80d8028.yaml | 58 +++++++++++++++++++ ...easy-c2b3f954259c6ede40d68798a9520dde.yaml | 58 +++++++++++++++++++ ...easy-df8b0e3e82913bd73f66e923babf0341.yaml | 58 +++++++++++++++++++ ...easy-fb606eac6f1cd09b63793985561a9ded.yaml | 58 +++++++++++++++++++ ...ager-1c184d32846ab99f4fc87c2987b808cb.yaml | 58 +++++++++++++++++++ ...ager-33af423ffa646dbaa07cc6063b09bc62.yaml | 58 +++++++++++++++++++ ...ager-3f14554541d5c07fa1b8df4c175de3d3.yaml | 58 +++++++++++++++++++ ...ager-60e9ce57276e284607640edd3669122a.yaml | 58 +++++++++++++++++++ ...ager-644174d3b6cb573b8ad1e776e7aafb01.yaml | 58 +++++++++++++++++++ ...ager-6fb53b909e681612242b9b19b0af96e9.yaml | 58 +++++++++++++++++++ ...ager-7961a00c8fec25ebf767309437be3781.yaml | 58 +++++++++++++++++++ ...ager-7f61d132e9ad7bb4333f632fb4ac561f.yaml | 58 +++++++++++++++++++ ...ager-83ef28839c75055ae7537f111049194c.yaml | 58 +++++++++++++++++++ ...ager-944355331d4d9eab9649c96fbc1339dc.yaml | 58 +++++++++++++++++++ ...ager-96287411a0b4f9828a8db098282ac68f.yaml | 58 +++++++++++++++++++ ...ager-9691566897b1cf3f102fa4ca66fa2b90.yaml | 58 +++++++++++++++++++ ...ager-9dd081367b7c3b91dad73b336bd866df.yaml | 58 +++++++++++++++++++ ...ager-ad055d1685348a8fa4aef50dfdf0211f.yaml | 58 +++++++++++++++++++ ...ager-af430c9858b5bde975d56075509bcf57.yaml | 58 +++++++++++++++++++ ...ager-b1f45416f5a631250c26ec095bcb39a3.yaml | 58 +++++++++++++++++++ ...ager-bb7f415bbeb4b2bf0d001b37770eebf6.yaml | 58 +++++++++++++++++++ ...ager-bf648a28f236904436ac42427351efb1.yaml | 58 +++++++++++++++++++ ...ager-e1116b6e664ddbf85fd8a65fd5661abf.yaml | 58 +++++++++++++++++++ ...ager-e976dbcc632c2ee3b143a7604910e2c0.yaml | 58 +++++++++++++++++++ ...ager-eb6226c8060abd8c26fc61f24da2a61e.yaml | 58 +++++++++++++++++++ ...ager-eb8f98aa61e3c3db7506a6098f7ccbda.yaml | 58 +++++++++++++++++++ ...ager-ee6754b66c3dcc79f507ad42121825d8.yaml | 58 +++++++++++++++++++ ...ager-fb28659ef74c6816e9ff94aaba73e076.yaml | 58 +++++++++++++++++++ ...-pro-e1116b6e664ddbf85fd8a65fd5661abf.yaml | 58 +++++++++++++++++++ ...-pro-eb8f98aa61e3c3db7506a6098f7ccbda.yaml | 58 +++++++++++++++++++ ...ddon-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...ndar-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...ndar-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...pare-29989c774c0deb7fd695ddb2569712e6.yaml | 58 +++++++++++++++++++ ...ckup-5c5b5355efecc468361938b2443e7783.yaml | 58 +++++++++++++++++++ ...ckup-a3c1423112a235a586d65da99a810a94.yaml | 58 +++++++++++++++++++ ...orms-0234441805a1275e4ae695da76693b08.yaml | 58 +++++++++++++++++++ ...orms-5c3a1e24593bd044c08416c2f87d02e7.yaml | 58 +++++++++++++++++++ ...orms-7d693e04f09654267524d7ec908313ae.yaml | 58 +++++++++++++++++++ ...orms-baf3d29a2681cdd1e172041c4de8c0ca.yaml | 58 +++++++++++++++++++ ...orms-f3431b49cff580f3171934059274a2a5.yaml | 58 +++++++++++++++++++ ...ster-8c8032347c8a676583142ccf856ffd1b.yaml | 58 +++++++++++++++++++ ...ster-92de377343f9b56c26e4f5ac1766852a.yaml | 58 +++++++++++++++++++ ...ster-d6daa696f95c257bf8628b3447d01ec3.yaml | 58 +++++++++++++++++++ ...tbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ites-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...izer-3213ee891b4642b7b3ba63568830b33f.yaml | 58 +++++++++++++++++++ ...izer-508fae9ebaeb3994eeeea08dc7389cbc.yaml | 58 +++++++++++++++++++ ...izer-9693067e67d7ff6cc419426aa56eeabf.yaml | 58 +++++++++++++++++++ ...izer-da711e4ca0aefdf6c9cb2b9eee9b6839.yaml | 58 +++++++++++++++++++ ...izer-e39053204ece48a5897a197753f103d3.yaml | 58 +++++++++++++++++++ ...izer-fc7819dbc087612847b613b7048bbd69.yaml | 58 +++++++++++++++++++ ...mapp-1c6e8ef696086c4cf5cf1464c84048ce.yaml | 58 +++++++++++++++++++ ...mapp-1cb146595e5a6af092ba6cf697572ca5.yaml | 58 +++++++++++++++++++ ...kout-d7709cb27cfd7779480afac87a08fa8a.yaml | 58 +++++++++++++++++++ ...-net-de87b01d88a6a2f904015f5ea84ebf1e.yaml | 58 +++++++++++++++++++ ...king-34e10a41c5c20c0cdcc396ab3433b41a.yaml | 58 +++++++++++++++++++ ...axes-5d1048d4b4ff4e9d4fc21662470b4351.yaml | 58 +++++++++++++++++++ ...axes-7dbba6eb5e75b04ea05ba2ba683d8c34.yaml | 58 +++++++++++++++++++ ...axes-4c3c3f049b1bc0e13ddc430f9c3318dc.yaml | 58 +++++++++++++++++++ ...ices-fce7ebf61e0bbaa70b1a47fedc604d75.yaml | 58 +++++++++++++++++++ ...ases-4b04963b90b4f582746b4536b75f0fd9.yaml | 58 +++++++++++++++++++ ...ship-8167878f448149a825352a74752a3f9b.yaml | 58 +++++++++++++++++++ ...-pro-bf5b301e59797812833300e7fc88f201.yaml | 58 +++++++++++++++++++ ...ripe-b13a4a7fbd4cd3ebf80c43d8be8323aa.yaml | 58 +++++++++++++++++++ ...ping-3a6771ca38d2c7d158262d9fbdbb7826.yaml | 58 +++++++++++++++++++ ...dget-776b8b2ca961da26b6b406dc75d9298e.yaml | 58 +++++++++++++++++++ ...ntor-007d55abdcc3037b38fa1f4866ebcef6.yaml | 58 +++++++++++++++++++ ...ntor-03413c94281e9bdcb28cf85f17f56cbd.yaml | 58 +++++++++++++++++++ ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ntor-26c4a41ab859ae4dbf470aba313f594b.yaml | 58 +++++++++++++++++++ ...ntor-27f5aa34f1beb8f61eb1e953a98567c3.yaml | 58 +++++++++++++++++++ ...ntor-2f36bf28ff455df3f6e5bee8596dc834.yaml | 58 +++++++++++++++++++ ...ntor-34bbbe6df5443652a8ecc2885cf36469.yaml | 58 +++++++++++++++++++ ...ntor-4ab49877e45f4a964303177554e78a85.yaml | 58 +++++++++++++++++++ ...ntor-824dccfdb78b425ce34b0edfaef506c4.yaml | 58 +++++++++++++++++++ ...ntor-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...ntor-8639b20a2b1f76694c89791c1b2d91eb.yaml | 58 +++++++++++++++++++ ...ntor-b68fc6d974fd5ff5ec00e24e4a23388f.yaml | 58 +++++++++++++++++++ ...ntor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ntor-ba61abda2c1a03aab77d7d30f615bf9e.yaml | 58 +++++++++++++++++++ ...ntor-d0e696248d665e9f0a517c6587bde743.yaml | 58 +++++++++++++++++++ ...ntor-dc46778586f851feacb609ba4df93bd9.yaml | 58 +++++++++++++++++++ ...ntor-f3fab83347fba28adb4199c2198991f2.yaml | 58 +++++++++++++++++++ ...ntor-f6158c89533171b67393d05399849800.yaml | 58 +++++++++++++++++++ ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ntor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...monk-f9d8d4d48e517849984915b0fb71d1b5.yaml | 58 +++++++++++++++++++ ...show-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...tegy-c407ae94c2e09109c54e22295b58f6a2.yaml | 58 +++++++++++++++++++ ...inks-83161de0c1fd793802b927949569bb1f.yaml | 58 +++++++++++++++++++ ...aker-20e2ffcefe24845b4b4e6344c91c5c95.yaml | 58 +++++++++++++++++++ ...tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...pivi-434bdc3a2d6d4c7bf3a3c2d6bf17f8ff.yaml | 58 +++++++++++++++++++ ...nner-4a16fbddd32289a9425b6c977263e9d5.yaml | 58 +++++++++++++++++++ ...urls-171d0fe1d81993f6ce1992662fece84b.yaml | 58 +++++++++++++++++++ ...urls-4f798a978754f7760bf888652cfdf4e3.yaml | 58 +++++++++++++++++++ ...urls-a2bd93b9a3b512bd46c713fd9b617e38.yaml | 58 +++++++++++++++++++ ...urls-b5b013b649a98c215832bbde298896e0.yaml | 58 +++++++++++++++++++ ...urls-e300fc2b33c3e4cbe76c5a5f26d2b663.yaml | 58 +++++++++++++++++++ ...enus-554b3becffafc2d7533a6574bfe4f7de.yaml | 58 +++++++++++++++++++ ...urls-04fd004ccf778c74722c06c23011f3f9.yaml | 58 +++++++++++++++++++ ...info-0bf76c13f5d059f24c33a04b1579ea8d.yaml | 58 +++++++++++++++++++ ...info-80eb51ecba5ec678d038fbafb9f76a3a.yaml | 58 +++++++++++++++++++ ...text-96700f83c035e921aa6f4f1cc307643f.yaml | 58 +++++++++++++++++++ ...sers-947efea3054054e672bdea86aa02538b.yaml | 58 +++++++++++++++++++ ...-csv-e05fa458a1f240ccb4e1b67dcb2e1cc1.yaml | 58 +++++++++++++++++++ ...inct-8972c0084426af137e3ac2a4f9b562c5.yaml | 58 +++++++++++++++++++ ...-csv-6f6838754144cfba3c6bd90cbbf7e92a.yaml | 58 +++++++++++++++++++ ...erce-466267eb695f096848ba3c66efa093ba.yaml | 58 +++++++++++++++++++ ...erce-9c4ed2f25624ef8c0b44e775a33394e9.yaml | 58 +++++++++++++++++++ ...list-555fded38156b09a0ae4a96c58cecb2d.yaml | 58 +++++++++++++++++++ ...html-40abb9e32e5d663357bcdf2c7ce0ff79.yaml | 58 +++++++++++++++++++ ...html-96488db43481ee059de402cf95554483.yaml | 58 +++++++++++++++++++ ...feed-b2d6fe0a5065d0107b2198e03dfa4409.yaml | 58 +++++++++++++++++++ ...etsy-2b0c3de81abe87f7163c2ade96d864cf.yaml | 58 +++++++++++++++++++ ...tore-e3d531049fbe8d4cfc0687a776a83ff1.yaml | 58 +++++++++++++++++++ ...orts-cfd16ad8dc5bcf726c8b8727896a65ef.yaml | 58 +++++++++++++++++++ ...shop-3e4167472cc19aa7d5c770b7ff08e85b.yaml | 58 +++++++++++++++++++ ...tion-d864c9b876d3aee646e414b358c69b64.yaml | 58 +++++++++++++++++++ ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tify-a6e54ba491e72f796e7b6e74aa4dfebc.yaml | 58 +++++++++++++++++++ ...atus-c787c6531ee0637047c0b6f0c28238e9.yaml | 58 +++++++++++++++++++ ...-cf7-b10d47efef131454e92762a235006179.yaml | 58 +++++++++++++++++++ ...-cf7-d198bd5481953eb6029357e7049666d3.yaml | 58 +++++++++++++++++++ ...-map-e5ccc984a06602c5eeeca3eee991fc34.yaml | 58 +++++++++++++++++++ ...ddon-8b8ebcc1129f204595ea40775fe38d9a.yaml | 58 +++++++++++++++++++ ...edia-090b5ab75971c1cf3354717d50e20576.yaml | 58 +++++++++++++++++++ ...edia-2b23e7bc36f5649501747aa394af6972.yaml | 58 +++++++++++++++++++ ...edia-937a14986e699492c9c7f6e0e211e4a4.yaml | 58 +++++++++++++++++++ ...port-47882f7a2bc08ac13c7e58b547c2a0c7.yaml | 58 +++++++++++++++++++ ...port-55f57d9ee6e02fda2c4bc79302123377.yaml | 58 +++++++++++++++++++ ...nail-ad8d7c66fc9bf90a2896ae8bbda63697.yaml | 58 +++++++++++++++++++ ...body-98fa09468510e4f3d608da204df8d702.yaml | 58 +++++++++++++++++++ ...deos-c96e975122963919f6930b9c017e5991.yaml | 58 +++++++++++++++++++ ...erce-17ad0651e8a5c8de6d9430b66387dde0.yaml | 58 +++++++++++++++++++ ...ails-d6041cf221293372ef1d7c4da6af5933.yaml | 58 +++++++++++++++++++ ...ails-ff2f93ef83cef5530210b6c4053efbfa.yaml | 58 +++++++++++++++++++ ...p-wp-21d6fb0129ec0276cbb256583b4e5048.yaml | 58 +++++++++++++++++++ ...code-6ae4507849a8e19efb73377acf163d95.yaml | 58 +++++++++++++++++++ ...ator-ce2576aadbb4f84195b6b6013f98bb8b.yaml | 58 +++++++++++++++++++ ...olio-05d549bbf43422565845abd53d01ba98.yaml | 58 +++++++++++++++++++ ...tion-26aceda847c1eb3f25bb17474245905f.yaml | 58 +++++++++++++++++++ ...tion-f68243f27ec6cdc816f3b8c11a5b90ea.yaml | 58 +++++++++++++++++++ ...ckup-d1f60a6312b998075106906482a83fc4.yaml | 58 +++++++++++++++++++ ...ckup-d8d381cfd52ebd0caccc2d10110d0603.yaml | 58 +++++++++++++++++++ ...ents-0ef9782b82fa8d84264b6b12b21ce750.yaml | 58 +++++++++++++++++++ ...ugin-74a3d8f89352734cafb21e0108e82a16.yaml | 58 +++++++++++++++++++ ...ugin-9c248fffb99934b64b2404b3183ad52f.yaml | 58 +++++++++++++++++++ ...izar-281277016a09cf7dcda0f71c2e15f07f.yaml | 58 +++++++++++++++++++ ...city-ec95efd2e63d9d89b0c3d769bde2a40b.yaml | 58 +++++++++++++++++++ ...ixel-45d861039b945e03d43af50c9dafa301.yaml | 58 +++++++++++++++++++ ...ixel-be8a9fdeffbc92f43f8c28b524c398bc.yaml | 58 +++++++++++++++++++ ...ixel-e7103d15c56bf4b3a7eff2cebe3d9729.yaml | 58 +++++++++++++++++++ ...dget-c912d868bff6df29fc1013dc04c342d0.yaml | 58 +++++++++++++++++++ ...erce-9534faef8d85288ee99452de6c7c430a.yaml | 58 +++++++++++++++++++ ...erce-d27b9b5016915435f37e3d3e6a022f76.yaml | 58 +++++++++++++++++++ ...tton-3ff2a2ae71a0269c8c6a199dba440423.yaml | 58 +++++++++++++++++++ ...code-81e5332e3881680e9eac9f42ea7f36ca.yaml | 58 +++++++++++++++++++ ...bers-72f73bf14c806744336e445356e6090f.yaml | 58 +++++++++++++++++++ ...chat-abee8752b50a21f5a90a04b4599caff2.yaml | 58 +++++++++++++++++++ ...chat-dda14d0945970dcd1c739d9bb84285fc.yaml | 58 +++++++++++++++++++ ...-api-cfdb8d7325e93947d2061002a4b258f4.yaml | 58 +++++++++++++++++++ ...lery-358b0cd776c979c59cab288ffb33dfa2.yaml | 58 +++++++++++++++++++ ...dget-f5225829b9851280f9730cc7388f8c93.yaml | 58 +++++++++++++++++++ ...tion-0c15ed5f69fa39b17ef98a0065e40d8c.yaml | 58 +++++++++++++++++++ ...dule-49f7af60a7d6ca8e6785ad7873768f2a.yaml | 58 +++++++++++++++++++ ...lang-32c41bb49a17f6a6d495a0dfbe10790b.yaml | 58 +++++++++++++++++++ ...lang-8f62194e57a27510760b3cae99e669fe.yaml | 58 +++++++++++++++++++ ...lang-d0610fbd136beeb3618a2a0d3d1b4015.yaml | 58 +++++++++++++++++++ ...lang-d9e8ea266e8afee7a81a9944bddd705c.yaml | 58 +++++++++++++++++++ ...rter-f93b5106a9e7f989d008def1a9504779.yaml | 58 +++++++++++++++++++ ...-box-7e3662ab11c3565756d75a405c4e3374.yaml | 58 +++++++++++++++++++ ...cats-19f75dda03c1e9e919da72ec8c14ca5f.yaml | 58 +++++++++++++++++++ ...pbox-4eb5559b22a18e9337a5880d5e2f32aa.yaml | 58 +++++++++++++++++++ ...ents-0cc8ff0d29654f0f83c0bf1830dddb43.yaml | 58 +++++++++++++++++++ ...ents-cedfa6f88d2bc9a6561954401e5a9b61.yaml | 58 +++++++++++++++++++ ...lery-d80de73f9f6546e4a52cda1c1451f11a.yaml | 58 +++++++++++++++++++ ...gner-16fc618536c8b0d70612472b29c155c9.yaml | 58 +++++++++++++++++++ ...gner-29abd196b81aad745cf652b3ba722e02.yaml | 58 +++++++++++++++++++ ...gner-39de068f6a175124d260efb8485f212d.yaml | 58 +++++++++++++++++++ ...gner-4db617a8e70c447eb683850e9e2a4ba2.yaml | 58 +++++++++++++++++++ ...gner-4e867da6f1b40e5f079dbf8385eca830.yaml | 58 +++++++++++++++++++ ...gner-9feb5154944f3d4b90bd9e0974af5d4e.yaml | 58 +++++++++++++++++++ ...gner-af9dbe3dcd6f267d4b1ed941cf9ecbc0.yaml | 58 +++++++++++++++++++ ...gner-d07dd36048efbcee10cf1bb88265d662.yaml | 58 +++++++++++++++++++ ...gner-d8e9444efeb93debc442fb77c567fbad.yaml | 58 +++++++++++++++++++ ...gner-fccc44e164a0cbb0e0c232ae976cbb5f.yaml | 58 +++++++++++++++++++ ...ress-b8e3a07576df90727675ec278a1f9eb2.yaml | 58 +++++++++++++++++++ ...ress-f5917cabea5f4d2844b07d04e1880958.yaml | 58 +++++++++++++++++++ ...ickr-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...free-36f733a53254d69782057e16be93c1ec.yaml | 58 +++++++++++++++++++ ...-ays-050ac633edcdd8103878bb1a391274ca.yaml | 58 +++++++++++++++++++ ...erce-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...data-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...q-wd-37ac09d863363372a10edf05c9e9e76f.yaml | 58 +++++++++++++++++++ ...ager-45db54965982ed46b91f5576d8c56bfa.yaml | 58 +++++++++++++++++++ ...ager-7a87807daec2011fba4e64fcc9f8c9ff.yaml | 58 +++++++++++++++++++ ...ager-8cda9bfd3e2c450e7c2c0a786c763ffc.yaml | 58 +++++++++++++++++++ ...ader-77b48f1e08249dfc6423fc64fae31250.yaml | 58 +++++++++++++++++++ ...rbor-64d859df68bf3f0a0838ef413ae7d21e.yaml | 58 +++++++++++++++++++ ...rbor-bb190962067ba33976cc3f88e434b44c.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...bard-67c3c53f919818b53462cf301e3b0e2a.yaml | 58 +++++++++++++++++++ ...oard-02b84b42a8b3e6e7dc009b5046e38b5a.yaml | 58 +++++++++++++++++++ ...oard-b95feef4ddcb37164d4f7af73136c4f2.yaml | 58 +++++++++++++++++++ ...oard-f6258bc363d2da9cfcc2e756e12cfc0e.yaml | 58 +++++++++++++++++++ ...dder-de501746396265e937381399a0559403.yaml | 58 +++++++++++++++++++ ...solr-10798c3024f1dbe228591af7cfe4af9e.yaml | 58 +++++++++++++++++++ ...solr-6c441629c885cb1da3fc16e4bca4f23b.yaml | 58 +++++++++++++++++++ ...nify-eaab2de07f74987f7d28979a545e7860.yaml | 58 +++++++++++++++++++ ...t-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...t-wp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...peed-3cef17acd88883b32927f0569aa64da5.yaml | 58 +++++++++++++++++++ ...tdup-039ae8d5d3a67b23c1725f1bdffda73f.yaml | 58 +++++++++++++++++++ ...tdup-3f7e597b394edb376b06e6e36b03a12d.yaml | 58 +++++++++++++++++++ ...stly-c285ca083315515fededeb2a0a197394.yaml | 58 +++++++++++++++++++ ...lect-c3880379f0826cf949058267ed182aec.yaml | 58 +++++++++++++++++++ ...tify-2c794f20622aac748763bd2f16b2b33a.yaml | 58 +++++++++++++++++++ ...tify-e34616bfa39928844a257bee23d26881.yaml | 58 +++++++++++++++++++ ...tics-b1767ac6c4058810b3f215f7aa0668ab.yaml | 58 +++++++++++++++++++ ...tics-cf309d1aebaaa67d40cb82a03fbd96af.yaml | 58 +++++++++++++++++++ ...ra24-0997377af0d71afd8bec87a13519fcf6.yaml | 58 +++++++++++++++++++ ...ator-04adb1c439e43352ed4b6cca99f5cd66.yaml | 58 +++++++++++++++++++ ...ator-2a790c8bfc2f91a748cff8286de5f526.yaml | 58 +++++++++++++++++++ ...ator-c944b74833c9d564f3c694b934416df0.yaml | 58 +++++++++++++++++++ ...ator-d2c74ce8c17fcc02d9a06b8743990dd7.yaml | 58 +++++++++++++++++++ ...ator-7a9bf969e6086f1f35cf7f6bd6e6d0d3.yaml | 58 +++++++++++++++++++ ...cher-0f224f68bb34d36af769db2549696ba9.yaml | 58 +++++++++++++++++++ ...ites-46a2cdc68c7e07f12ed856fe3a47afc0.yaml | 58 +++++++++++++++++++ ...ites-f2c467fe9ec6884b9a3fd8b065881ed3.yaml | 58 +++++++++++++++++++ ...chat-13667cae5910c516f9b6358e59dc09f8.yaml | 58 +++++++++++++++++++ ...illa-b397f1751be329a0c2dee713557b74c5.yaml | 58 +++++++++++++++++++ ...ions-26cfa8bd44fa751562e056cb1d39d345.yaml | 58 +++++++++++++++++++ ...ypro-2298bd051dab3ee548414fe72135c13f.yaml | 58 +++++++++++++++++++ ...chat-50a85ccbd8f65581857b36c230e78a0e.yaml | 58 +++++++++++++++++++ ...ebox-c24b6fa8b7a5214338fb56e211d63730.yaml | 58 +++++++++++++++++++ ...page-466b2b2c45e70711b7c7f49150c81d51.yaml | 58 +++++++++++++++++++ ...page-5f677e9c4742e755f3a729c6304d8024.yaml | 58 +++++++++++++++++++ ...page-a766deff845672c22971718a646cf246.yaml | 58 +++++++++++++++++++ ...page-a8cea4062eea92bba71d4c0d54416fa2.yaml | 58 +++++++++++++++++++ ...page-d93191ee66b814104763b1eec2af5866.yaml | 58 +++++++++++++++++++ ...ents-785672d467101767144e711ae7fe2d35.yaml | 58 +++++++++++++++++++ ...ents-80de44f32a39260a4242f01334cdbfd5.yaml | 58 +++++++++++++++++++ ...tion-b18da97ec3842241538c439eaed13219.yaml | 58 +++++++++++++++++++ ...-url-229d47673c8d48ef0cc745a328967153.yaml | 58 +++++++++++++++++++ ...-url-3f695144fde56e5e68c9d7f131f8380c.yaml | 58 +++++++++++++++++++ ...-url-7420b38eef61601a8533cd300d3acef6.yaml | 58 +++++++++++++++++++ ...-url-ec1b9ba6cd34426926dd05163ef9cdaf.yaml | 58 +++++++++++++++++++ ...-url-f05edbcd117bd78991a113d104243207.yaml | 58 +++++++++++++++++++ ...-pro-03f178f78e73af9717f96f4261197534.yaml | 58 +++++++++++++++++++ ...lkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lkit-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...eeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tive-947aab9c660d0a41bcf7e37fa45491b8.yaml | 58 +++++++++++++++++++ ...tive-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...tive-d494024f4c91e4cd37b950448b8c612e.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-9bc357ece2cde706b261987c1bf85bfa.yaml | 58 +++++++++++++++++++ ...nger-2344762ab01ebc08578d7b685bed6e58.yaml | 58 +++++++++++++++++++ ...lite-44a3ea00d7c2ac41df4b3a6ac3cf83ba.yaml | 58 +++++++++++++++++++ ...lite-6358c61bb5cba311cb2b24aa2921d29a.yaml | 58 +++++++++++++++++++ ...lery-5556a133daa1113e5966da5001155a19.yaml | 58 +++++++++++++++++++ ...cial-193e887d8efbd63f7ee64b85c4a576a5.yaml | 58 +++++++++++++++++++ ...cial-2476012a7e618bdb63629cf9e6f2cc39.yaml | 58 +++++++++++++++++++ ...cial-274b8b119cea9c35028782c46e1417bd.yaml | 58 +++++++++++++++++++ ...cial-59dd174ba212cc11295537a27e4487d1.yaml | 58 +++++++++++++++++++ ...cial-60a7c7c6011ce03cafef9a29fbcdf397.yaml | 58 +++++++++++++++++++ ...cial-9019681407afd47da5b4816b7ae1001d.yaml | 58 +++++++++++++++++++ ...cial-9573f0bb03be4cafb0dc4630394c3c88.yaml | 58 +++++++++++++++++++ ...cial-9d9f62e188b5181406f57379c674b86e.yaml | 58 +++++++++++++++++++ ...cial-a23e521e782f280a44a30c5f1b1f5875.yaml | 58 +++++++++++++++++++ ...cial-b04dd0f6bbdb43801b1ffc8fb55026f1.yaml | 58 +++++++++++++++++++ ...cial-d72ce46972faf10b71efe8ec5768d82c.yaml | 58 +++++++++++++++++++ ...cial-e4fb6d249b711115cf1c72af2ed8bb4d.yaml | 58 +++++++++++++++++++ ...cial-fafa2caced18a7c0c4666d573df5d9d1.yaml | 58 +++++++++++++++++++ ...uite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...uite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...cout-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rect-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...rect-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...rect-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...mith-95305525d7820973fed879d8dfc49664.yaml | 58 +++++++++++++++++++ ...ocal-033552000c57d4d0e9b8f1077c9a1953.yaml | 58 +++++++++++++++++++ ...list-f30fee0809d10f803c0d4d592f397270.yaml | 58 +++++++++++++++++++ ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tube-50baee01b43a26ee8e4d58a0c9e6da8f.yaml | 58 +++++++++++++++++++ ...tube-ac43cf44566479227a4aa05f1f51c953.yaml | 58 +++++++++++++++++++ ...s-de-0cb6e32bbaac252186a04f8bf825e2e9.yaml | 58 +++++++++++++++++++ ...dweb-42c984330043ff937717eb97d232bbd2.yaml | 58 +++++++++++++++++++ ...dweb-42f14cb098faa7900818b46106b42afa.yaml | 58 +++++++++++++++++++ ...dweb-57aa4255793b420daa78a4aa19aedeff.yaml | 58 +++++++++++++++++++ ...ress-1790bee47ee796caaff632f15b4d5f1f.yaml | 58 +++++++++++++++++++ ...ress-4cd6dbf8c953f54b11c7fded30755c74.yaml | 58 +++++++++++++++++++ ...ress-6729304530e54584e7440ebda94579e0.yaml | 58 +++++++++++++++++++ ...ress-a5bd104322a21c6fe50fb764879c5682.yaml | 58 +++++++++++++++++++ ...ress-de2b65d20701ca8d9c4d34a5b9680868.yaml | 58 +++++++++++++++++++ ...eeds-49fc80b8d756a56dfe95c5a6032f1087.yaml | 58 +++++++++++++++++++ ...eeds-507b936e6df45800b9063c2207c957aa.yaml | 58 +++++++++++++++++++ ...eeds-566fe474170295f900e413573209c71a.yaml | 58 +++++++++++++++++++ ...eeds-915f28ed1e0ddfda2fff50d4304f5401.yaml | 58 +++++++++++++++++++ ...eeds-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...eeds-9e24f5f31aefd98727b13ebb0dfe3151.yaml | 58 +++++++++++++++++++ ...eeds-a371f0288a138d0c57e459d338c39157.yaml | 58 +++++++++++++++++++ ...eeds-a69ba668991cc895684ef6a2a0130022.yaml | 58 +++++++++++++++++++ ...eeds-dc84242672f23048124ef1d4e4b55e53.yaml | 58 +++++++++++++++++++ ...eeds-e0ef3d1097adeccc2f12bfdbdbab9d9c.yaml | 58 +++++++++++++++++++ ...o-wp-6124da6a0c9e2e52db4d825fb2c383a6.yaml | 58 +++++++++++++++++++ ...o-wp-bb1647b449a57413306bcf1ebbfb2090.yaml | 58 +++++++++++++++++++ ...ress-1e37c7574b8a6b340ccf9300cdecf15e.yaml | 58 +++++++++++++++++++ ...ress-bb1647b449a57413306bcf1ebbfb2090.yaml | 58 +++++++++++++++++++ ...ress-e50a4295f2c4d9bb583975552d8db6c3.yaml | 58 +++++++++++++++++++ ...erce-0eeffa23476d007efd123124288a7278.yaml | 58 +++++++++++++++++++ ...erce-39c8c0331c249c6c886fabcd8bbe5a6c.yaml | 58 +++++++++++++++++++ ...erce-bb1647b449a57413306bcf1ebbfb2090.yaml | 58 +++++++++++++++++++ ...lery-565b56570e9a0eaaf33a27883cc6e4ea.yaml | 58 +++++++++++++++++++ ...plus-6d8e5755418ddfddd7f22418d88b935e.yaml | 58 +++++++++++++++++++ ...away-466048d1971518e0b30eb580a52cc9ff.yaml | 58 +++++++++++++++++++ ...lery-2ff1bc044255f45b7cf3b45392cb2e17.yaml | 58 +++++++++++++++++++ ...lery-9030229f25561b555ab5bd8cf6a1c26d.yaml | 58 +++++++++++++++++++ ...lery-bb0f68d3ec28f4af1bec229baa1a1db9.yaml | 58 +++++++++++++++++++ ...ager-48a8d2f0d5a63315df776c831690e09c.yaml | 58 +++++++++++++++++++ ...ager-5c40de81086d557f84896e9d9e366a14.yaml | 58 +++++++++++++++++++ ...ager-7e2f90e6940d531b994c0538fa57bc34.yaml | 58 +++++++++++++++++++ ...ager-80453d1eac09488f23a96583710827a5.yaml | 58 +++++++++++++++++++ ...nced-1ced58320fa56965f50860e215f3e06d.yaml | 58 +++++++++++++++++++ ...code-07670443f68f4b9a28c2be946c910346.yaml | 58 +++++++++++++++++++ ...ager-bd5e0701ad8f9d787d4f03d3c90929d9.yaml | 58 +++++++++++++++++++ ...load-ca9ee22d1cc41a724720db8fe33326bf.yaml | 58 +++++++++++++++++++ ...bird-1298f4e0dd08f4cb0ce7e4baa39d0151.yaml | 58 +++++++++++++++++++ ...bird-16b2d22f9ed4777d1430ed12968eaafe.yaml | 58 +++++++++++++++++++ ...bird-4e2e155c281ae60022e2ed5429179c85.yaml | 58 +++++++++++++++++++ ...bird-61cc715601cb540fc69b978e74da1091.yaml | 58 +++++++++++++++++++ ...bird-7d0952eb6cd34263da0c111b4d2da259.yaml | 58 +++++++++++++++++++ ...load-16949f85deca6c76da36cc5d46cabd06.yaml | 58 +++++++++++++++++++ ...load-e3e5ad58c58ff0e4a41d1a39f9aad248.yaml | 58 +++++++++++++++++++ ...load-f50c03151ba977d208d9edbd82053474.yaml | 58 +++++++++++++++++++ ...izer-d61a99b7dbe136f85e3e2b350556f349.yaml | 58 +++++++++++++++++++ ...izer-fe85729fdce83d2abcd870326a089bf5.yaml | 58 +++++++++++++++++++ ...elay-83711b9f4415eeef12b96843272e6f77.yaml | 58 +++++++++++++++++++ ...ster-0fbaccf0dcc3983d2d26c8ef7aee1143.yaml | 58 +++++++++++++++++++ ...ster-3a0b06a228abc56684c0fecc37877b4c.yaml | 58 +++++++++++++++++++ ...ster-a9fb42c2dd47680db83577cec894ace4.yaml | 58 +++++++++++++++++++ ...ewer-beab7dee3648c51c868a41f9c4244298.yaml | 58 +++++++++++++++++++ ...tion-3978ba038f6fabf500896400bafac46f.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-e71ba64e3ce13e58bab0fc3eb80546e8.yaml | 58 +++++++++++++++++++ ...ight-7ec734b1370cfa2c11baf0ce838e63f7.yaml | 58 +++++++++++++++++++ ...ight-8cd6ae2b6361cbc9077a21e229786a98.yaml | 58 +++++++++++++++++++ ...lery-cf862152b16dd1f39286055ed51b17b7.yaml | 58 +++++++++++++++++++ ...lery-aa602beb5c908376cceff63e3f2e405f.yaml | 58 +++++++++++++++++++ ...ntal-a80892f45393695704153e2580e1d74c.yaml | 58 +++++++++++++++++++ ...lite-40a15a1270025c5cb430a29eea6824ae.yaml | 58 +++++++++++++++++++ ...lite-45a46be6bf0ef23f92774359273b99be.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...iles-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...ount-13f75b4807aa41447c76b6287198f0e6.yaml | 58 +++++++++++++++++++ ...ount-281ba59699e771f7b8298c529c863776.yaml | 58 +++++++++++++++++++ ...ount-942278840325a3151a90aba61723bd9e.yaml | 58 +++++++++++++++++++ ...ount-b2f9a3131a92b1faa45907be05feafe5.yaml | 58 +++++++++++++++++++ ...ount-b7d8017025d96230e362095b35be8556.yaml | 58 +++++++++++++++++++ ...list-65e3ebcdd517173ee2482f46a1239a5c.yaml | 58 +++++++++++++++++++ ...list-e0bf790da76322058f44ef1673072476.yaml | 58 +++++++++++++++++++ ...-all-3a24a068d1ed9da16159938c4295f7f7.yaml | 58 +++++++++++++++++++ ...-all-951a6c1e508507cf69c6b78271828a61.yaml | 58 +++++++++++++++++++ ...-all-ef26eea08cd48a0673b556bc7ad08135.yaml | 58 +++++++++++++++++++ ...hink-de57c9c6347745d9dac6d12ee00f13b8.yaml | 58 +++++++++++++++++++ ...ates-4976580f662d856b0ec790e30c784e5a.yaml | 58 +++++++++++++++++++ ...ocks-032b6d67d90bdb80edcbded91586f3c0.yaml | 58 +++++++++++++++++++ ...ndeo-41837fb37d737478db2ea9f3e428404e.yaml | 58 +++++++++++++++++++ ...ndeo-d1bbc50d843df9b465aead854697cdc8.yaml | 58 +++++++++++++++++++ ...tats-116359fea7fe1422fcee6d92fc7e8d15.yaml | 58 +++++++++++++++++++ ...tats-8d2b8d85e3990e663a1d1eeba9e988ea.yaml | 58 +++++++++++++++++++ ...lbox-7b6c4a5d491c136298d22f463e5441b8.yaml | 58 +++++++++++++++++++ ...erce-1249a65de4506f62402e8cab0fdcd2b8.yaml | 58 +++++++++++++++++++ ...tors-642950df2f7522b38841579e45f2fa32.yaml | 58 +++++++++++++++++++ ...tors-99086c0a0b024a064c1e5677b2106531.yaml | 58 +++++++++++++++++++ ...iner-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...shop-22c242de8477403c11aa170395108645.yaml | 58 +++++++++++++++++++ ...shop-8eccbee0dd1899147fba577f29a00bda.yaml | 58 +++++++++++++++++++ ...code-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...pair-2a21d5a31d3b98e1018a3dbbd691f093.yaml | 58 +++++++++++++++++++ ...lbar-39995b4a98bd80010d8be7d8f66f2d38.yaml | 58 +++++++++++++++++++ ...edly-6698c76500688159e50581d2fa14052b.yaml | 58 +++++++++++++++++++ ...lbox-30d0f494aa8b20416d51df052e0c844e.yaml | 58 +++++++++++++++++++ ...lbox-7a1fe9dbd3e35a123780e19c329830c8.yaml | 58 +++++++++++++++++++ ...lbox-817d9bd5ced767540dd82a3d7ff4067c.yaml | 58 +++++++++++++++++++ ...kins-ca01974b82faf04d95b2178a85b29c88.yaml | 58 +++++++++++++++++++ ...agem-ba981dbbf1ea06bbf2969e39bd0742cb.yaml | 58 +++++++++++++++++++ ...ingo-841259aa92d69f1fd000aa64627b9b99.yaml | 58 +++++++++++++++++++ ...lery-0b070c6bccd03db5dad9fdc1c059c617.yaml | 58 +++++++++++++++++++ ...lery-0ba2e71f2a03b9577c68d8acb58a10a7.yaml | 58 +++++++++++++++++++ ...lery-201957a4954f30a5d4ed40f134fba1c6.yaml | 58 +++++++++++++++++++ ...lery-311ab6afdc9cf3bb4b0014cc35739998.yaml | 58 +++++++++++++++++++ ...lery-4a78286f0fa257bf74920260dae5103f.yaml | 58 +++++++++++++++++++ ...lery-5a8f9f4e46e4e9903571445b91cbd00c.yaml | 58 +++++++++++++++++++ ...lery-9c64f5e45af7ae21167a588c42aec386.yaml | 58 +++++++++++++++++++ ...lery-a6b7b9dbed28e3619b6105ab67bf1f0c.yaml | 58 +++++++++++++++++++ ...lery-aeed8f75983d5d3eda35b4e52588c591.yaml | 58 +++++++++++++++++++ ...lery-bf1b5f8a23a62c1a6be7914495f430b8.yaml | 58 +++++++++++++++++++ ...lery-daf27b66517334d1a8886ba5982e7461.yaml | 58 +++++++++++++++++++ ...lery-e026b5a6041ce1f13dd851a463a892ee.yaml | 58 +++++++++++++++++++ ...lery-eca8e288e4dc717ec25c774372f69b42.yaml | 58 +++++++++++++++++++ ...lery-b3551195333886afba6c43fd173acb65.yaml | 58 +++++++++++++++++++ ...dget-fba24244e7e4f0de151661ff65df04c0.yaml | 58 +++++++++++++++++++ ...ayer-e36d4622c7c94ab3537e4da3e23c5c2d.yaml | 58 +++++++++++++++++++ ...ader-18d1a7d6e453e6e958428b87d731de75.yaml | 58 +++++++++++++++++++ ...ader-49a588fa69586f2484ce1bba5358bbd9.yaml | 58 +++++++++++++++++++ ...m-wp-783b91bae7d265f558a1870f59bc1ef0.yaml | 58 +++++++++++++++++++ ...m-wp-b7ea054dad22d02b62197c8fa3fba822.yaml | 58 +++++++++++++++++++ ...attr-466a1f62f3b9e3cbc883b22ebc0c11de.yaml | 58 +++++++++++++++++++ ...lexi-8180b2e535d97180306ef769873324d8.yaml | 58 +++++++++++++++++++ ...ator-13464676c956740d86ef6b835803b913.yaml | 58 +++++++++++++++++++ ...ator-8041e4418d6dd5832b9d268c12d84f0f.yaml | 58 +++++++++++++++++++ ...tcha-5ba06f6e9e576d3b96edab291a35b673.yaml | 58 +++++++++++++++++++ ...elds-313211003f16b9f4f6fba43486ffd622.yaml | 58 +++++++++++++++++++ ...elds-af1c4837148181f6207e66eb6c3b9ff3.yaml | 58 +++++++++++++++++++ ...type-9fb1e67eb818f983f8dbfc23b2a0c064.yaml | 58 +++++++++++++++++++ ...anel-7dea148c446a704ce10e41cb5e2e70c3.yaml | 58 +++++++++++++++++++ ...ping-0a20e0340c90c0e3abffd4151b1ac5e4.yaml | 58 +++++++++++++++++++ ...ping-cb1263fe7cf23ae55fdda5b42af76fdf.yaml | 58 +++++++++++++++++++ ...-ups-6b12163f0814856a86494d984e656633.yaml | 58 +++++++++++++++++++ ...usps-4e5d4a35614ae6a4ee59ec1f48b231d3.yaml | 58 +++++++++++++++++++ ...usps-addd443476959ed1e0edf984e54a6c38.yaml | 58 +++++++++++++++++++ ...itor-40dad92f1e274f70a2212adefbc68e38.yaml | 58 +++++++++++++++++++ ...lery-227a216c8593797eea57e8ea91304372.yaml | 58 +++++++++++++++++++ ...lery-43150c91e86c385735f6eec13fd0a597.yaml | 58 +++++++++++++++++++ ...lery-601901ac64242d401542d9abeeaae03f.yaml | 58 +++++++++++++++++++ ...ckup-f8ecc349c28ee0e39936813fba025244.yaml | 58 +++++++++++++++++++ ...-rss-0e4fc74efc949999cf345512b761619e.yaml | 58 +++++++++++++++++++ ...-rss-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml | 58 +++++++++++++++++++ ...-rss-4f5e1d138ae43eaa500111874f55d52e.yaml | 58 +++++++++++++++++++ ...-rss-ab05255cd8fd175d06143e7aa3177450.yaml | 58 +++++++++++++++++++ ...ocks-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...tlog-019716f1cdfed62fc1f8666dedb59747.yaml | 58 +++++++++++++++++++ ...book-0aa04e52bba38f5b04642c8395b8c974.yaml | 58 +++++++++++++++++++ ...orms-31993563048effdc0827881e9344d84c.yaml | 58 +++++++++++++++++++ ...orms-bbbaa8f4798af45f432fee689b1a5feb.yaml | 58 +++++++++++++++++++ ...orms-ec6ef7f01d456e74c1ef5bcee54d14d6.yaml | 58 +++++++++++++++++++ ...unch-9447e0c2ffa1a53245e3f3fb0bac226a.yaml | 58 +++++++++++++++++++ ...menu-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...menu-5fb9bec95a707650ef979fd037b97227.yaml | 58 +++++++++++++++++++ ...menu-c5eebb4553286e34a5dfcc1fcfb216a1.yaml | 58 +++++++++++++++++++ ...menu-cfe127cd973bbf2d8609c8c59c7606df.yaml | 58 +++++++++++++++++++ ...tton-402db9fc1f91d6a610e9186418e3f339.yaml | 58 +++++++++++++++++++ ...tton-974e55fea877636d350ce5211a9f2278.yaml | 58 +++++++++++++++++++ ...tton-54e58fd9cb8b4f0c4759deb7ef963895.yaml | 58 +++++++++++++++++++ ...tton-9d446cc2ded70f849208be8a7ce22b70.yaml | 58 +++++++++++++++++++ ...tton-b9b78bba7eb30618f125288c162ade39.yaml | 58 +++++++++++++++++++ ...tton-ef334e622eec391697c0d5a0070dc0e8.yaml | 58 +++++++++++++++++++ ...orwc-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...-div-f7eaf9b938a6df4b39be6616b2432caf.yaml | 58 +++++++++++++++++++ ...inks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-bar-6a69a2fa108e4cf956a3388af5834004.yaml | 58 +++++++++++++++++++ ...-bar-6f67eba72e7035f4406a73d70218218a.yaml | 58 +++++++++++++++++++ ...icon-3b1c84fb06bbfd928bb6bd8a2dc656bc.yaml | 58 +++++++++++++++++++ ...inks-19cad25687c6e57a8844f7bbbe3532db.yaml | 58 +++++++++++++++++++ ...inks-fabad8f9edf3a10c2fd048960f486a0d.yaml | 58 +++++++++++++++++++ ...eets-0d30322e95e68bf61a096904e3379311.yaml | 58 +++++++++++++++++++ ...eets-1e72c31c8795449e9c06e927fb97a2d9.yaml | 58 +++++++++++++++++++ ...flog-59446fd68b7784d882498e25f909137d.yaml | 58 +++++++++++++++++++ ...eams-765a9fd486d65b41296bb2e40f26d4d3.yaml | 58 +++++++++++++++++++ ...-one-4d590f8cfc3cb04affd33a6ac18e5217.yaml | 58 +++++++++++++++++++ ...ctor-a645bae2135580862fc251332e7ccf27.yaml | 58 +++++++++++++++++++ ...book-652d56be5b505867587dc16b9cc45713.yaml | 58 +++++++++++++++++++ ...book-d7435fb5e236cc613a20b63eff30b011.yaml | 58 +++++++++++++++++++ ...ayer-91cbfc58418f178a67da5f57d5fe8aa8.yaml | 58 +++++++++++++++++++ ...-crm-2021aef7227818f1c21db36c31bdbd79.yaml | 58 +++++++++++++++++++ ...-crm-bb26b6ff3e85d19e956ebfa35e2cc95c.yaml | 58 +++++++++++++++++++ ...rity-09c9894def0e25d05735b59cb11535d0.yaml | 58 +++++++++++++++++++ ...smtp-a0c235af0e0f30fc06e113ce304c9fbb.yaml | 58 +++++++++++++++++++ ...smtp-b77eedd011caf310b24c6086fb4f9f02.yaml | 58 +++++++++++++++++++ ...smtp-e7db547069bdcddc296155dd435cd330.yaml | 58 +++++++++++++++++++ ...port-239bba6a118f3c2dcf8340e2790b882b.yaml | 58 +++++++++++++++++++ ...port-da98de7f074ffd80f7cb587c569cdd12.yaml | 58 +++++++++++++++++++ ...form-31bfcad1a946ead477cc4d9cae0f33ff.yaml | 58 +++++++++++++++++++ ...form-4e36da2b6076ab0fa4395c3975079942.yaml | 58 +++++++++++++++++++ ...form-7505baf43f2a97f13623d8a9e01f067a.yaml | 58 +++++++++++++++++++ ...form-768d5a8c5da389ebb9689ad662d253aa.yaml | 58 +++++++++++++++++++ ...form-875a676a20644f9b257dd61453cbe7b9.yaml | 58 +++++++++++++++++++ ...form-a7309b89079395b33b2cb7915ba03d32.yaml | 58 +++++++++++++++++++ ...form-f587eb392e2056a4aa7f3a9cfdb47c3a.yaml | 58 +++++++++++++++++++ ...-pdf-150204c3648be383cc7b37e155a5d6bc.yaml | 58 +++++++++++++++++++ ...ions-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...kout-b225e6cc75e518b2d58ee3c68b1bcc48.yaml | 58 +++++++++++++++++++ ...show-656ffc00f499b97cc92334beba62fc4e.yaml | 58 +++++++++++++++++++ ...show-bd607ad7864f2c8f03d9043c5fbd64bb.yaml | 58 +++++++++++++++++++ ...show-d0db0236c8bb93bbd9849f985e9c57df.yaml | 58 +++++++++++++++++++ ...mbed-797a8ec8d14a7095c1401c88381f0455.yaml | 58 +++++++++++++++++++ ...ress-473a1cc0b0ec6c93a83a85cc6eeee218.yaml | 58 +++++++++++++++++++ ...code-60b8d6d9997cb1264cf24cce0caa381a.yaml | 58 +++++++++++++++++++ ...yzoo-b142fb65f777c01f09af0b6a529becd3.yaml | 58 +++++++++++++++++++ ...utes-f0a4fb1ab5ad45a43505bfb864975940.yaml | 58 +++++++++++++++++++ ...-pro-c2b59c8389d71cf87b7fb1296201832f.yaml | 58 +++++++++++++++++++ ...blog-572454d38450937113117ff602a4e326.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ders-0a3b78fadad1468caa114f49c5837f3b.yaml | 58 +++++++++++++++++++ ...ders-346a08b5e01ce0a0fe29178ae41386f7.yaml | 58 +++++++++++++++++++ ...ders-aa05d3117d6e609391e83e8b970f2625.yaml | 58 +++++++++++++++++++ ...iwyg-6d24ca924659d60813d0c9beab91c29b.yaml | 58 +++++++++++++++++++ ...iwyg-93eb8e1633c7ed38fbc4ff339a075742.yaml | 58 +++++++++++++++++++ ...w-me-de62fa1091876ce7733352db2cec2f12.yaml | 58 +++++++++++++++++++ ...enus-335b776cd554e8913d4f10e98e262ec0.yaml | 58 +++++++++++++++++++ ...enus-bb75a2fa99f691c300cd6cf18948e14d.yaml | 58 +++++++++++++++++++ ...some-7115ada113c9b929bcb0dd07d0bf9d4f.yaml | 58 +++++++++++++++++++ ...some-84fec46332999a5ca815e7af241174bf.yaml | 58 +++++++++++++++++++ ...tion-238d49dd6e9480e47ebe9505e3055120.yaml | 58 +++++++++++++++++++ ...cons-a57182d433f774a0b7467b555b805817.yaml | 58 +++++++++++++++++++ ...font-d9e88eed1e0b07c2c560dc1223a88aca.yaml | 58 +++++++++++++++++++ ...arsi-bbb0e39e4c65975737c298f09a794bf6.yaml | 58 +++++++++++++++++++ ...izer-92b1dcacf113aa7d72bfd995bd3a58b5.yaml | 58 +++++++++++++++++++ ...ader-272e6d95680eac64b1944ce8c40ac5b7.yaml | 58 +++++++++++++++++++ ...ific-7524f5b14f92599cfeabd0dc20123b14.yaml | 58 +++++++++++++++++++ ...iran-64d4e8ad6ebfa8f809457010fe938c57.yaml | 58 +++++++++++++++++++ ...iran-aeb0a88f1527e615e946ee4307c56d67.yaml | 58 +++++++++++++++++++ ...iran-ed8d60dbc212a2488ceb5fdf43131cd0.yaml | 58 +++++++++++++++++++ ...ster-315cb3873f38dcb4432456cd1e63a724.yaml | 58 +++++++++++++++++++ ...pler-a0f4536ea7bd1323c1b7b95c9e4b018e.yaml | 58 +++++++++++++++++++ ...ntsy-f11e331f492b99109760c26e69316ddd.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tbox-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...menu-414dd30601a3a8e396da28322c360c9c.yaml | 58 +++++++++++++++++++ ...menu-428e92a2be0374fb9f50d3efefc780e0.yaml | 58 +++++++++++++++++++ ...menu-58e8eb6b48043724a61dbfbade728e2c.yaml | 58 +++++++++++++++++++ ...menu-7a6e12751a5fafd18d6d56977b5ab766.yaml | 58 +++++++++++++++++++ ...tore-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tore-bb49a04965cd07c7ab0e642d989a68a5.yaml | 58 +++++++++++++++++++ ...lery-21a95839a8ab979ff0016f6fbedc5a1e.yaml | 58 +++++++++++++++++++ ...lery-2c9cfaa1b4268406a1d78df84c0cb895.yaml | 58 +++++++++++++++++++ ...lery-3ced01544afaf258ab773262adacbb46.yaml | 58 +++++++++++++++++++ ...lery-7acb842ebb36fed3d48b7a27908aad70.yaml | 58 +++++++++++++++++++ ...lery-84b774dce1ed446fe61865bc9717d231.yaml | 58 +++++++++++++++++++ ...lery-a94721f1db6a21d7268903bae3160d03.yaml | 58 +++++++++++++++++++ ...lery-b1493cf8f77a9e357e523e1844c8f281.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-c4af1e64fbcb95f3b91e16ac0f449bf5.yaml | 58 +++++++++++++++++++ ...lery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lery-d1db79cb95565d6ad4b74843ef9d4999.yaml | 58 +++++++++++++++++++ ...lery-ea2db66e943b1038a7ee25bf53b0dcc6.yaml | 58 +++++++++++++++++++ ...mium-a94721f1db6a21d7268903bae3160d03.yaml | 58 +++++++++++++++++++ ...ores-2d57f425ae40c364bab73a19021c28f3.yaml | 58 +++++++++++++++++++ ...pool-749aff0fcc167e558bca750035ba1596.yaml | 58 +++++++++++++++++++ ...pool-924ca2bb4d17021fd01ade1e50b5f40f.yaml | 58 +++++++++++++++++++ ...tter-947ad0b5d0e7c6896eb25c5ba15abe34.yaml | 58 +++++++++++++++++++ ...text-51f5cc0d0e28df647c1c9e27826141db.yaml | 58 +++++++++++++++++++ ...ired-1288b290469ac9f6682339ae7faeb1d6.yaml | 58 +++++++++++++++++++ ...last-9e22e51baaf99f342eddf6b6b8fb87ea.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...ield-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tons-53da943f73d7c6e6cd21ccb312450cb4.yaml | 58 +++++++++++++++++++ ...tons-bb70f2562e10a695ac872c839d1985e9.yaml | 58 +++++++++++++++++++ ...lock-3972eede365a3539d1345b6e32b15ffa.yaml | 58 +++++++++++++++++++ ...orms-96b39b472ca8eccbec11e47f253c80b8.yaml | 58 +++++++++++++++++++ ...tbox-df96a9df0511094bf94be89ac1740d20.yaml | 58 +++++++++++++++++++ ...aker-0e2b9d12590d3c7b14c8e22b3d6f6056.yaml | 58 +++++++++++++++++++ ...aker-2420cc8c52f0171d8c5b49b0e53cd69a.yaml | 58 +++++++++++++++++++ ...aker-3a5958dc81689a4069c9b57ecbde177c.yaml | 58 +++++++++++++++++++ ...aker-51b281937ca7291e3b4a94f5ec043e64.yaml | 58 +++++++++++++++++++ ...aker-54830c75db088a14f125745f43fdb1f9.yaml | 58 +++++++++++++++++++ ...aker-5ab78d017180c321a2a306a692c78211.yaml | 58 +++++++++++++++++++ ...aker-844eff1dfca0f37b0344bfc8951dcee9.yaml | 58 +++++++++++++++++++ ...aker-9efd1cc18514c55bcfc7bb0b901e8474.yaml | 58 +++++++++++++++++++ ...aker-b107934a8aab930d1fab2cf0f27d13f6.yaml | 58 +++++++++++++++++++ ...aker-b584bc3add37b438ea9f7d52a53c499d.yaml | 58 +++++++++++++++++++ ...aker-bac514b6f0b1f8c0997d58523192fc7a.yaml | 58 +++++++++++++++++++ ...aker-bc7687f3a38eb76862d41bf156e272e2.yaml | 58 +++++++++++++++++++ ...aker-c060cdd161613c35be3451870d488386.yaml | 58 +++++++++++++++++++ ...aker-c4e27cd6ca86640ba05f8d3c2423655f.yaml | 58 +++++++++++++++++++ ...aker-e23a8ff0f941885439bb6eaa6879d8d2.yaml | 58 +++++++++++++++++++ ...aker-f99ce34ee4393dd151b2436ea69250e6.yaml | 58 +++++++++++++++++++ ...aker-fd28c2a8a8ece88ce28c75cf84e47383.yaml | 58 +++++++++++++++++++ ...chat-08841c16939c6ce6bfc6679725ea1281.yaml | 58 +++++++++++++++++++ ...ibes-b7888b843ebf167b77c4d303a6db54de.yaml | 58 +++++++++++++++++++ ...ibes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...orms-14ef39181771488f76a78ebc7f182128.yaml | 58 +++++++++++++++++++ ...orms-40b17fbc397976bb918c3ad479c78a68.yaml | 58 +++++++++++++++++++ ...orms-a6ec47cf9956948a6246629d44179127.yaml | 58 +++++++++++++++++++ ...orms-d46aeb2acb3fb066be1f4ef24cb7b7ca.yaml | 58 +++++++++++++++++++ ...lder-15f3ff2fd895a09890b1601370ff17ff.yaml | 58 +++++++++++++++++++ ...lder-681334888d5905413f6f1159a30d2417.yaml | 58 +++++++++++++++++++ ...lder-860302baac60a4494cef29bab34e785b.yaml | 58 +++++++++++++++++++ ...lder-a6e4580408df1cc0fd425db3d3f61102.yaml | 58 +++++++++++++++++++ ...lder-e6475f7f5f871801f1bd4ec02d738d77.yaml | 58 +++++++++++++++++++ ...raft-b8e20e75d15dbb751b7fb081ab7cf785.yaml | 58 +++++++++++++++++++ ...raft-fd631c53e7ca7d0431606810665ee5df.yaml | 58 +++++++++++++++++++ ...lder-02ff6e8f4c50ebc35c46ebd6a0282258.yaml | 58 +++++++++++++++++++ ...lder-0793f0361460e084aa156d291ce75eb6.yaml | 58 +++++++++++++++++++ ...lder-27f44594eb9e99ef9e1059fc3d01b99d.yaml | 58 +++++++++++++++++++ ...lder-527f36f790da1a74645e814e4fe52934.yaml | 58 +++++++++++++++++++ ...lder-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml | 58 +++++++++++++++++++ ...lder-8ab11785066028af40a069df806e2ad0.yaml | 58 +++++++++++++++++++ ...lder-98163a520e2e6ad1b536bf4759e7aff4.yaml | 58 +++++++++++++++++++ ...lder-d35055f56360f454d611ea478b5c8142.yaml | 58 +++++++++++++++++++ ...lder-e2849c772d6e6f64d56860e36e54564f.yaml | 58 +++++++++++++++++++ ...aft3-633d0b293826c4a61b61e1d3210e0346.yaml | 58 +++++++++++++++++++ ...cade-240756f87690e8bd859858034bc8c975.yaml | 58 +++++++++++++++++++ ...rall-76bb7b1a62378179c2a3a748f3a4ef7c.yaml | 58 +++++++++++++++++++ ...form-2abba35343647b8a829e092f6dec80ee.yaml | 58 +++++++++++++++++++ ...form-d7ca1dd38546745c43c763574d903819.yaml | 58 +++++++++++++++++++ ...able-03587c706609d69bad10e8dac47e2f3e.yaml | 58 +++++++++++++++++++ ...able-08ccf69c17927ada744879c1923c390b.yaml | 58 +++++++++++++++++++ ...able-15c563e3f7d22cf323cc481f61b9eb8b.yaml | 58 +++++++++++++++++++ ...able-437b9be662132aed2b43b674efcda98c.yaml | 58 +++++++++++++++++++ ...able-46dd5dfacc34a4878325b7ee6f68202a.yaml | 58 +++++++++++++++++++ ...able-50b07daf945144cbfd99133630410da2.yaml | 58 +++++++++++++++++++ ...able-586f376968c226db0dcaf5061868b9ec.yaml | 58 +++++++++++++++++++ ...able-5ec297ac46cc1d40266a5ad0daa61699.yaml | 58 +++++++++++++++++++ ...able-5f864ea73d67dbc167ed3ae723a536cd.yaml | 58 +++++++++++++++++++ ...able-6c309d4fe4a7c00ec9f13abe6fdd70cc.yaml | 58 +++++++++++++++++++ ...able-75cfe0d86b035fdf1639773082de267a.yaml | 58 +++++++++++++++++++ ...able-77ecffd079fc8a0b13b180178795f1cd.yaml | 58 +++++++++++++++++++ ...able-961c6f8ac9568871bace8745083a3696.yaml | 58 +++++++++++++++++++ ...able-987b044c3bb6f7d497d7cc053aa32728.yaml | 58 +++++++++++++++++++ ...able-a29260605777cb6f82b580e66c46fcb9.yaml | 58 +++++++++++++++++++ ...able-aed9f1a9cf9e76b014fa4ceef2236366.yaml | 58 +++++++++++++++++++ ...able-b198b20134bc1a80b2134b7e32b1d9f4.yaml | 58 +++++++++++++++++++ ...able-f8715414342ae577e0f9a96507f17db4.yaml | 58 +++++++++++++++++++ ...tion-96ed0838fd20f84264d3c063e2ba926e.yaml | 58 +++++++++++++++++++ ...-sms-167d9672411be44feb72a5175fd0987c.yaml | 58 +++++++++++++++++++ ...-pdf-f2bfced9bfd91f1f83f4f10d9e2a4e2c.yaml | 58 +++++++++++++++++++ ...ting-b49deb95fc00559c0721d2c968358861.yaml | 58 +++++++++++++++++++ ...edge-ecf9407059e3582708411befde00831c.yaml | 58 +++++++++++++++++++ ...chat-309fdaa44a67ee8c05b1363fafbc2e7a.yaml | 58 +++++++++++++++++++ ...ator-0b29757be7c9544b9f5309f3b1be1e0d.yaml | 58 +++++++++++++++++++ ...ator-183d4dac6eb372129600913c83567fc9.yaml | 58 +++++++++++++++++++ ...ator-1c0b534ade0c088d820f904818d49367.yaml | 58 +++++++++++++++++++ ...ator-26f35acb3c0f14eb0fe591953d190a10.yaml | 58 +++++++++++++++++++ ...ator-286f623357d476ca932bc8210895d763.yaml | 58 +++++++++++++++++++ ...ator-292cb08d9cd5bb1cf7550652732f7a0a.yaml | 58 +++++++++++++++++++ ...ator-42f191921072c4fed5defc1af6bdccae.yaml | 58 +++++++++++++++++++ ...ator-64248c162e0a07dde805cd870763a3a0.yaml | 58 +++++++++++++++++++ ...ator-7753a7f9705bcf7c075ba8ba61f788d8.yaml | 58 +++++++++++++++++++ ...ator-7ff8aa4516f6800dd9ef07a8f731d28e.yaml | 58 +++++++++++++++++++ ...ator-8893a21ace79666845ab488b8953c970.yaml | 58 +++++++++++++++++++ ...ator-950d0fecfa65a978eebec0d58fd1e9bc.yaml | 58 +++++++++++++++++++ ...ator-956616cf620f8b1a830cdf6f68014a5e.yaml | 58 +++++++++++++++++++ ...ator-a6cb8bb474a298f0d13061a17830eac9.yaml | 58 +++++++++++++++++++ ...ator-bc2f6ff7db9bb1af0cb3049e6fc69b8c.yaml | 58 +++++++++++++++++++ ...ator-bd19f19c61a0ea2da7f41821ae297426.yaml | 58 +++++++++++++++++++ ...ator-e8992ee7cc3a04876d739dcede33aada.yaml | 58 +++++++++++++++++++ ...ator-ee384374dcb64224451204e7db1b00fc.yaml | 58 +++++++++++++++++++ ...ator-f4febcd0f8092108616f41cc252ca605.yaml | 58 +++++++++++++++++++ ...lder-95a617be3572708cabf012c967fad83d.yaml | 58 +++++++++++++++++++ ...e-it-12ca01b6bd94ae75bcfa758e16b20678.yaml | 58 +++++++++++++++++++ ...itor-d0f30576bf7c027192f1b193ba41eddc.yaml | 58 +++++++++++++++++++ ...berg-41cad88ff79d9f1a300cb623d000ffea.yaml | 58 +++++++++++++++++++ ...pier-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...pier-fdb7464284f0e3f92d05bc404992df2d.yaml | 58 +++++++++++++++++++ ...site-064670bf29900df44464bedf16a7db27.yaml | 58 +++++++++++++++++++ ...u-wp-69291e6d8dee217b57f3dde758dcad0f.yaml | 58 +++++++++++++++++++ ...u-wp-f48987de7fcf2018d5328a03cdd21065.yaml | 58 +++++++++++++++++++ ...rver-0856197f54ebc4b1a325747e3d0ab80c.yaml | 58 +++++++++++++++++++ ...rver-399de5e730909b7373d74d984520d5d0.yaml | 58 +++++++++++++++++++ ...rver-8cba549bfba1e71b314fc0d37ea95e7a.yaml | 58 +++++++++++++++++++ ...rver-a4cdd9300b8e89d6cefce68027bae177.yaml | 58 +++++++++++++++++++ ...orym-befc35f26a9ced6d8b2225ecf15d9b2e.yaml | 58 +++++++++++++++++++ ...iner-18c927eeaab747daf8dbc085388c3619.yaml | 58 +++++++++++++++++++ ...iner-b1f4f06fa1d08e23be33495079a7bf7e.yaml | 58 +++++++++++++++++++ ...book-7418be2024d99eec31c5374180cc36ac.yaml | 58 +++++++++++++++++++ ...moto-8e8e8d42c36c4d2147a0654eb00c12ca.yaml | 58 +++++++++++++++++++ ...kins-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml | 58 +++++++++++++++++++ ...ress-05da59639245e73e5006b3b27fd29b5e.yaml | 58 +++++++++++++++++++ ...ress-1ea57d4028638a993e3a1865c1c429fb.yaml | 58 +++++++++++++++++++ ...ress-28cc3b436a054be9278bf9f654cf7298.yaml | 58 +++++++++++++++++++ ...ress-4392c790af392965f4ef8691acb00317.yaml | 58 +++++++++++++++++++ ...ress-7b0b2b71a9f90e73601e91cbead48f87.yaml | 58 +++++++++++++++++++ ...ress-7ca06934a2b333b70b714ef75d613d92.yaml | 58 +++++++++++++++++++ ...shop-3853fc9827dc572851bdba569b2c07ee.yaml | 58 +++++++++++++++++++ ...shop-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...oyer-b150ed41da888a826e21d66b48bee30f.yaml | 58 +++++++++++++++++++ ...ukle-bc5c2979003bab8e2b8da8b35bec03cb.yaml | 58 +++++++++++++++++++ ...nter-5e704515f93be9a32478b5bfd42a6016.yaml | 58 +++++++++++++++++++ ...nner-47d3ad7250426f9e950984c71ba1d1f7.yaml | 58 +++++++++++++++++++ ...gets-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...onts-e969b7015915e405c8b6916d239e090c.yaml | 58 +++++++++++++++++++ ...make-2199233b48f19d9d270781cada038885.yaml | 58 +++++++++++++++++++ ...make-47ea4a03f1b0e77aad4910db22ee3336.yaml | 58 +++++++++++++++++++ ...make-5b689436673a442f720046bb44c5bd16.yaml | 58 +++++++++++++++++++ ...mage-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...wser-76c5ff841d2dc96506f10e16c9ef0103.yaml | 58 +++++++++++++++++++ ...gins-1cfbdd673750e91f71ee06cc181559e1.yaml | 58 +++++++++++++++++++ ...gins-5097af34e8087d4348de3729aa8f3d5b.yaml | 58 +++++++++++++++++++ ...page-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...port-1d392651d303b5509be666b562dfa310.yaml | 58 +++++++++++++++++++ ...port-7b87f2683ffda077fe6e0a14f3353b96.yaml | 58 +++++++++++++++++++ ...port-7c89a34e4a8d83c3780278094a4e89a3.yaml | 58 +++++++++++++++++++ ...tion-df35942c96b3dddb6612a4cd575a5663.yaml | 58 +++++++++++++++++++ ...tion-fc5d9e94a9531f198a2342d8d3133a1e.yaml | 58 +++++++++++++++++++ ...tter-65920cbefe2613a05348e64d8746a7b6.yaml | 58 +++++++++++++++++++ ...tter-f59240064f03e8205e770b15917de7bd.yaml | 58 +++++++++++++++++++ ...chat-d27688edaecd2e6ea6e4e18925595027.yaml | 58 +++++++++++++++++++ ...ends-5ca6e072da0718d54bf45a16b11714b0.yaml | 58 +++++++++++++++++++ ...itor-442cb89e3902ba64d65dffe5c1dfe1c2.yaml | 58 +++++++++++++++++++ ...itor-61e60e72ae19f21a2374d506ca4c56c0.yaml | 58 +++++++++++++++++++ ...itor-6d00e8bb2297cf89cd61e97ee33f9584.yaml | 58 +++++++++++++++++++ ...itor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...itor-daaaa272b2f5cd2cb1ddbf8cf5560d23.yaml | 58 +++++++++++++++++++ ...itor-eff7f0485f433e2b60a3d36ae5c865fc.yaml | 58 +++++++++++++++++++ ...sers-64fa318eea101296cd3a97fbe96ebb75.yaml | 58 +++++++++++++++++++ ...sers-9934720aa2c12ee56875eafe6d4b5c05.yaml | 58 +++++++++++++++++++ ...sers-b32372bcfcf7108428ee834bd234fb8e.yaml | 58 +++++++++++++++++++ ...d-pm-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...d-pm-d25fbd06f353d86f93a0e72e7cf70e64.yaml | 58 +++++++++++++++++++ ...load-457418759b22f908312742a3d8bc5f67.yaml | 58 +++++++++++++++++++ ...dmin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oard-ab5a35988c81716c4246b4eebac9618b.yaml | 58 +++++++++++++++++++ ...oard-d5fd81597164f2848144dc46b48d8bc3.yaml | 58 +++++++++++++++++++ ...dash-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ader-5804085185dabeb708155bde523d6d27.yaml | 58 +++++++++++++++++++ ...ader-968d2b25d7330f5b3338dbe58174f4a6.yaml | 58 +++++++++++++++++++ ...post-2bc2ba180bc24d4dc3efaf03022e4d70.yaml | 58 +++++++++++++++++++ ...ager-ec922857042222c2b2c5391db25ce37a.yaml | 58 +++++++++++++++++++ ...ager-28e4059a1c8041c52ed2e0e28f51c1c6.yaml | 58 +++++++++++++++++++ ...ugin-be1a1ff24188695237f37e3ff16d42cc.yaml | 58 +++++++++++++++++++ ...cart-41d0ef3672db9c552872805c429ef89f.yaml | 58 +++++++++++++++++++ ...-sms-167d9672411be44feb72a5175fd0987c.yaml | 58 +++++++++++++++++++ ...onts-4ccd73756d3ff800ac0459f5347027d3.yaml | 58 +++++++++++++++++++ ...cess-3fbce7126258b6f86e3d8d39cbcb69cc.yaml | 58 +++++++++++++++++++ ...ugin-65a4435f7b10b8d8206ed3ab27dff439.yaml | 58 +++++++++++++++++++ ...omer-1e47a59c0ad1f7f985e2120ccff4f8d1.yaml | 58 +++++++++++++++++++ ...omer-cb4a0a7493c7105139c64a6aefea1dd1.yaml | 58 +++++++++++++++++++ ...gner-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ting-405731b58f15425302771df60a27b5be.yaml | 58 +++++++++++++++++++ ...r-wp-c94b94b1075a77552263f3a72928ed0c.yaml | 58 +++++++++++++++++++ ...eria-5800bdb88427729dfe9beda3923c95e4.yaml | 58 +++++++++++++++++++ ...arch-b0298fb4feee8bd9ed9da9efccd4ef90.yaml | 58 +++++++++++++++++++ ...spam-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tcha-7c2f84ceedf786d66412b2ddd9745e29.yaml | 58 +++++++++++++++++++ ...lder-156cbee34f493f34443d5f3b942f355c.yaml | 58 +++++++++++++++++++ ...free-1389f4413b4c34ddc59ef4e67e6f0a3f.yaml | 58 +++++++++++++++++++ ...free-1d54b8b23176b36e6deb663d5a8ceaf5.yaml | 58 +++++++++++++++++++ ...free-21adcc5933f66f0dc2a717df7e950d3b.yaml | 58 +++++++++++++++++++ ...free-51b13423fa98551af760a9195cddd0e6.yaml | 58 +++++++++++++++++++ ...free-5627877412d66448db75b857038f84e0.yaml | 58 +++++++++++++++++++ ...free-706745fef06bc5b6b3083d2b8e19d2e9.yaml | 58 +++++++++++++++++++ ...free-7e168d2cbd20b0d5ec60c962781efa94.yaml | 58 +++++++++++++++++++ ...free-8cbb632e23e9fd1207c7a31fa3fa33cd.yaml | 58 +++++++++++++++++++ ...free-a0259835bb015f0f8ae0efa060f9f185.yaml | 58 +++++++++++++++++++ ...free-e1ad7ec25f4d848d78b5d1ca911d7ff1.yaml | 58 +++++++++++++++++++ ...free-e27d960770a662cb31ee7005dde8fb3c.yaml | 58 +++++++++++++++++++ ...kake-2513be2180efb8a9d99cb3b019874a28.yaml | 58 +++++++++++++++++++ ...core-0e249eccad21574e2f41d6b727c12756.yaml | 58 +++++++++++++++++++ ...ebar-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ebar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lder-5a8b95e9d623c8f7e9c70ff9c8a761a0.yaml | 58 +++++++++++++++++++ ...lder-b40b112aba812047c066895073435f9d.yaml | 58 +++++++++++++++++++ ...lder-b63d60bf3f2f663ff16710a1b09d1b70.yaml | 58 +++++++++++++++++++ ...lder-c1980d476739c222c7099c91e363860a.yaml | 58 +++++++++++++++++++ ...lder-d882958bab372a69d811837406b3986e.yaml | 58 +++++++++++++++++++ ...gage-b1b7cfcecf2de0389a1fca46f626041b.yaml | 58 +++++++++++++++++++ ...n-on-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...xtra-12800057837655525254001463af7107.yaml | 58 +++++++++++++++++++ ...xtra-3fb7396e595eda0e4c64d906babd7ea9.yaml | 58 +++++++++++++++++++ ...xtra-d4fcc9d0c55735e1818ea178387ac0a1.yaml | 58 +++++++++++++++++++ ...xtra-fbe0be2fd36d543628c64e13771b878d.yaml | 58 +++++++++++++++++++ ...ayer-21b5e2cc1773e8a375d4b06283f1f75c.yaml | 58 +++++++++++++++++++ ...ayer-2bb90ae2c9eb7a663eb0156580d59a88.yaml | 58 +++++++++++++++++++ ...ayer-2bd4aedc10e6362f1d46031adf65b2b5.yaml | 58 +++++++++++++++++++ ...ayer-31f01989f88bd51c1337d3cf6dfb5acb.yaml | 58 +++++++++++++++++++ ...ayer-351dfe17aa9c41d161fbfba3138330fd.yaml | 58 +++++++++++++++++++ ...ayer-3af842e4b028602d05da06af8493bf21.yaml | 58 +++++++++++++++++++ ...ayer-4ec113a2f6c7cc34cbdb0b48aa39a566.yaml | 58 +++++++++++++++++++ ...ayer-4f8b60559007de9693d6bd6dbd7b9937.yaml | 58 +++++++++++++++++++ ...ayer-61c688c55eb7ee42da571c3fb1a2e6d3.yaml | 58 +++++++++++++++++++ ...ayer-730bcdecc23fd71d57d0ec1ba0d53342.yaml | 58 +++++++++++++++++++ ...ayer-768117af17895fd2573e769996b5a89f.yaml | 58 +++++++++++++++++++ ...ayer-8269712f8aa3f2f54a5b3b611a3288b4.yaml | 58 +++++++++++++++++++ ...ayer-86d0c991bc6dd85c8051863807fe1299.yaml | 58 +++++++++++++++++++ ...ayer-8e904d0aa5c673b4683d6e95c3e351f3.yaml | 58 +++++++++++++++++++ ...ayer-9a7b3a67156b47fe25586e8e0cb89d8a.yaml | 58 +++++++++++++++++++ ...ayer-b90e27dda3a054f2561634700611d64f.yaml | 58 +++++++++++++++++++ ...ayer-b964392d781e5af12807956a1b25e48d.yaml | 58 +++++++++++++++++++ ...ayer-bb35779f0545e4fee400784885c47aca.yaml | 58 +++++++++++++++++++ ...ayer-bcc5b5d302cff6b12bb3e0ee2db5fa04.yaml | 58 +++++++++++++++++++ ...ayer-cf91d34b3b4f074c5504390aafe5f2f2.yaml | 58 +++++++++++++++++++ ...ayer-d173f6ac48d7132b733f53a51a70ac65.yaml | 58 +++++++++++++++++++ ...site-34e9fd3c5efdc1de6fe7fe47accd8e24.yaml | 58 +++++++++++++++++++ ...-toc-14de97dccf48252d3b3ac5a2e5d0250f.yaml | 58 +++++++++++++++++++ ...link-7e1dd5ec2f3ce921814a97005e4bdef0.yaml | 58 +++++++++++++++++++ ...ting-1ad67757b830dbb081c0f3324889f2b5.yaml | 58 +++++++++++++++++++ ...ager-9f4658b745b189d37014521dd6a95fe4.yaml | 58 +++++++++++++++++++ ...shop-2ae1fc13f687fb015528a3ff66e09125.yaml | 58 +++++++++++++++++++ ...king-779d1e87dc368b31bfafa7f1aaae4f82.yaml | 58 +++++++++++++++++++ ...r-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rsal-f581daf73a2ae47926782b6731f30bca.yaml | 58 +++++++++++++++++++ ...eria-0e933dc304f8275920849e5d36373b4d.yaml | 58 +++++++++++++++++++ ...lbum-0430b26f7f80d13db884ab9b0a5b4920.yaml | 58 +++++++++++++++++++ ...lbum-09c2db1952a267095a68cf64b0164363.yaml | 58 +++++++++++++++++++ ...lbum-1aaed1324faa189ffbfd4d07f45be185.yaml | 58 +++++++++++++++++++ ...lbum-63a9e6e007af9bec52f4b9f80d04c841.yaml | 58 +++++++++++++++++++ ...lbum-63e26d4ba1974966e333b4b151a2c5df.yaml | 58 +++++++++++++++++++ ...lbum-c181e74f647f3ed52bab481a97159011.yaml | 58 +++++++++++++++++++ ...lbum-d39f34ed184a71d23a5de1e368d430bb.yaml | 58 +++++++++++++++++++ ...lbum-f65c67e968e15596bef3448601bb7b39.yaml | 58 +++++++++++++++++++ ...bank-12287cbd7ce878e9fd3267a0e01cf78a.yaml | 58 +++++++++++++++++++ ...bank-26bba1e52907934fbc2f76bbe8677ffb.yaml | 58 +++++++++++++++++++ ...bank-3d1b14fe6d8db25f44038aa7941ff8ce.yaml | 58 +++++++++++++++++++ ...bank-4ba873ea604974c0a71c72511e63ccc8.yaml | 58 +++++++++++++++++++ ...bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...bank-b559946f964d6a635744aa2ff8d7bc1d.yaml | 58 +++++++++++++++++++ ...bank-b975729e6f64f7e39a41858a9d4457f9.yaml | 58 +++++++++++++++++++ ...bank-bb9ff775c7105fbb3a95361f39741664.yaml | 58 +++++++++++++++++++ ...-box-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...-box-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...-box-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...stic-2f3164fe48781902f2ffb82e4c682a7b.yaml | 58 +++++++++++++++++++ ...stic-3eb246a84ff094c4b5dad08106b186b3.yaml | 58 +++++++++++++++++++ ...stic-a442b3cb4140cc0565b34b0085780b5e.yaml | 58 +++++++++++++++++++ ...ries-86cf39a9caff1b0d57622ce3a08c77ef.yaml | 58 +++++++++++++++++++ ...lite-9266ca4886b0c646b2489433a5137061.yaml | 58 +++++++++++++++++++ ...iles-5888c8dd3a2fb05785315dbed1e6a3d3.yaml | 58 +++++++++++++++++++ ...iles-edf0c0f62c894ee6b53dbdcb9d2b787f.yaml | 58 +++++++++++++++++++ ...hoto-c27095e826fc99d4e3ff59487183eb49.yaml | 58 +++++++++++++++++++ ...ages-0ea6dc2d83fc938ad05b8877c6963a76.yaml | 58 +++++++++++++++++++ ...ages-1b866013a286b8267be128b4354cf380.yaml | 58 +++++++++++++++++++ ...ages-7029424562dcabc51ba988c294ceda39.yaml | 58 +++++++++++++++++++ ...ages-96e3c207dd79a77d8603f9b27ced710c.yaml | 58 +++++++++++++++++++ ...-ape-04b351a32ea4d9e14665cfe5ee1edb27.yaml | 58 +++++++++++++++++++ ...-ape-8f53c25a7439725994fa29007a578b4d.yaml | 58 +++++++++++++++++++ ...-ape-8f81c40c56a58242ce344610c4f30138.yaml | 58 +++++++++++++++++++ ...-ape-e82a3788d5ee1ba0ec33b3e0db2276c0.yaml | 58 +++++++++++++++++++ ...ages-b0c335beb11203f2fde885332ec9ff70.yaml | 58 +++++++++++++++++++ ...ages-c8299f7372dc1e4660eef2d2e7182331.yaml | 58 +++++++++++++++++++ ...ages-e236a1e5d3fb64e88e0ebd90fb6e2c1d.yaml | 58 +++++++++++++++++++ ...abox-24e92d0b5bd4d59ca9bd929ad9b17b1d.yaml | 58 +++++++++++++++++++ ...abox-9aa66e8181d06c3879c9f7626061f74d.yaml | 58 +++++++++++++++++++ ...abox-b4794af8b89126f30163809c87b8527e.yaml | 58 +++++++++++++++++++ ...ects-94bac6252ee86efbe8c51ab00926a8e1.yaml | 58 +++++++++++++++++++ ...lery-12173e4cbd316d08ac752e946b4c8207.yaml | 58 +++++++++++++++++++ ...lery-2e53d704a68a2528570d9bc04622f7a7.yaml | 58 +++++++++++++++++++ ...lery-75a867eaf135888f5843d1ae423e6546.yaml | 58 +++++++++++++++++++ ...lery-a359586a63676f31e06ba6a30e86f44d.yaml | 58 +++++++++++++++++++ ...lery-a43fcf2bf2b295c7f15edda834277892.yaml | 58 +++++++++++++++++++ ...lery-b15f1d58fa6bd5d27fb5b07cf543a238.yaml | 58 +++++++++++++++++++ ...lery-e682fc7edfbf166bd5ea5731aa2a90ff.yaml | 58 +++++++++++++++++++ ...ugin-123e18f5d341b41bb59091344f2c4c88.yaml | 58 +++++++++++++++++++ ...ugin-3c52a879e5c7f6b209aeea9f28acf059.yaml | 58 +++++++++++++++++++ ...ugin-5fd70893ee93b2581f3496673936c180.yaml | 58 +++++++++++++++++++ ...ugin-db5c08fdc8b62ebeda31a66adc0254db.yaml | 58 +++++++++++++++++++ ...olio-e03fc6f95e1cd7a63c181eae0df5daef.yaml | 58 +++++++++++++++++++ ...olio-eea2926eb15d95f90b3df3b2873dbe1c.yaml | 58 +++++++++++++++++++ ...ideo-4499af25b68b47ad188a0b7fb55c9dba.yaml | 58 +++++++++++++++++++ ...ideo-f4a5dffea18f1f7d8c2a38499c203636.yaml | 58 +++++++++++++++++++ ...deos-724aa916d7f99f934199d401cd079892.yaml | 58 +++++++++++++++++++ ...deos-c6bd3ba187d60fb65a038a39af19f9cc.yaml | 58 +++++++++++++++++++ ...deos-ff831311ec70debdd240fd0dff910b29.yaml | 58 +++++++++++++++++++ ...ider-1a1fe1dc5dd307bb721b18dad6e53951.yaml | 58 +++++++++++++++++++ ...atus-4860564c39627d424628b36fd20f6fbc.yaml | 58 +++++++++++++++++++ ...tabs-50466a7332e4b48f14aef77f62be1c1a.yaml | 58 +++++++++++++++++++ ...ress-5807ecea1e37da73a8c0fe20adcb6628.yaml | 58 +++++++++++++++++++ ...ress-2b733e03ac956657b279c0c2e7178248.yaml | 58 +++++++++++++++++++ ...ress-492436f7297ddc822ae54e1a5df2c7c8.yaml | 58 +++++++++++++++++++ ...ress-a3e63c6c1c70f9733ff90ef830f2ba25.yaml | 58 +++++++++++++++++++ ...ress-aec7b68517be6133995e008e368392d0.yaml | 58 +++++++++++++++++++ ...ress-b5027c0ff3d1a1043ee2d2b4a208d677.yaml | 58 +++++++++++++++++++ ...tton-778205eb09884149dafbca785f8423fc.yaml | 58 +++++++++++++++++++ ...tton-c617abebc11fcaba875f8bc2aad4995e.yaml | 58 +++++++++++++++++++ ...ress-d1724e13d2fdf6a25faad25727547d93.yaml | 58 +++++++++++++++++++ ...ress-dcab95fd687427a84724b3b04c96af59.yaml | 58 +++++++++++++++++++ ...ress-de9f8e0363804898afa8fe7d0b301fdf.yaml | 58 +++++++++++++++++++ ...tion-164be8fbabac441285f1a369205bd8e3.yaml | 58 +++++++++++++++++++ ...tion-808442071b530e99e27528108f7402f0.yaml | 58 +++++++++++++++++++ ...ntry-5e536ce02840d623d389b9ee218020ac.yaml | 58 +++++++++++++++++++ ...ents-3337ca8e284defa05fd45bda9b3ec176.yaml | 58 +++++++++++++++++++ ...ents-fdce74da2fc29d9a1b7b66e598acdde8.yaml | 58 +++++++++++++++++++ ...sale-a274fd2664073f0162156778e8dac986.yaml | 58 +++++++++++++++++++ ...kage-597aa63a54783e43984bca6c0a5bda16.yaml | 58 +++++++++++++++++++ ...feed-00a6e702537059b82f7d21b3c6087796.yaml | 58 +++++++++++++++++++ ...show-5951232c0f20a63b311a79c589b973af.yaml | 58 +++++++++++++++++++ ...tats-41dad8547a4dae3a9d56539c297d8d0a.yaml | 58 +++++++++++++++++++ ...ials-673bbf1cbb44b5f720028f2010c7e907.yaml | 58 +++++++++++++++++++ ...ents-16c5aaa4049ec9cf0dce63beccb79a30.yaml | 58 +++++++++++++++++++ ...ents-6edbfbf441adea692ef285720c58a9cd.yaml | 58 +++++++++++++++++++ ...ents-b5416cf2ccfb117fc0f1b193a5863e11.yaml | 58 +++++++++++++++++++ ...ents-fd5091b9ca6d56c1bb46823f06a6b82d.yaml | 58 +++++++++++++++++++ ...ueue-859e2f1c3d7c5202926f95b0d25e1db8.yaml | 58 +++++++++++++++++++ ...list-8ac9cdbd4cf7676c20528abcd5d7ef87.yaml | 58 +++++++++++++++++++ ...stem-034ab84e882013699ca86030c39bb7c1.yaml | 58 +++++++++++++++++++ ...stem-202b289fdef0d266d30f1e52a074682a.yaml | 58 +++++++++++++++++++ ...stem-363e85a87b5e31a1dda22e9466545bd8.yaml | 58 +++++++++++++++++++ ...stem-4aea8831d45ac7f2974ea4162d22b445.yaml | 58 +++++++++++++++++++ ...stem-567c0bab82561630aea9403749f896f8.yaml | 58 +++++++++++++++++++ ...stem-651523e243c6fa14f5b8ba27b9c0bb50.yaml | 58 +++++++++++++++++++ ...stem-79116f6e6f3436dd311270ae51db9449.yaml | 58 +++++++++++++++++++ ...stem-96454af8a6ce5f0b120ae58c0cde8af3.yaml | 58 +++++++++++++++++++ ...stem-d24dbe0a4be4e84f6cf2d04eb17d95aa.yaml | 58 +++++++++++++++++++ ...stem-f7fd1a8bc5d53786fd5110511a3a1b47.yaml | 58 +++++++++++++++++++ ...ders-626d7835b20c4c891b207d32709f9d9a.yaml | 58 +++++++++++++++++++ ...ders-c051ed74380d85e155152ed23876ff43.yaml | 58 +++++++++++++++++++ ...ting-0b148460306247418981fb91f92502a9.yaml | 58 +++++++++++++++++++ ...ting-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml | 58 +++++++++++++++++++ ...ting-df4cd9fee3d0d59fcdf3318f36c11feb.yaml | 58 +++++++++++++++++++ ...ting-ff4f16d3b72060599b9ed34018f0f5e7.yaml | 58 +++++++++++++++++++ ...shop-d3c451e9553be70e313576f0e6fdb8a8.yaml | 58 +++++++++++++++++++ ...ance-52a132f231403e0d19dffecc858bc7bc.yaml | 58 +++++++++++++++++++ ...stic-d52f1aa2c59f42390d8192c949633ea4.yaml | 58 +++++++++++++++++++ ...sent-f512a45803d4900b6bd2ce597a679e7f.yaml | 58 +++++++++++++++++++ ...ance-42ff6519960f311906ae3110cd3f6c64.yaml | 58 +++++++++++++++++++ ...ance-ebc9a2de114d9ab75adedbcfdade473e.yaml | 58 +++++++++++++++++++ ...sent-6fafcaccee81c5d3208247d34dd3565c.yaml | 58 +++++++++++++++++++ ...sent-74ceb3dd0e91d385e16d6cd94c463dea.yaml | 58 +++++++++++++++++++ ...sent-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...form-aafc1366408bf54fb9b81d829a07db37.yaml | 58 +++++++++++++++++++ ...ails-3ddf708feedcea3e47167b185d508195.yaml | 58 +++++++++++++++++++ ...tree-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...heme-14f53d257d97b80a7d3d574dcba76821.yaml | 58 +++++++++++++++++++ ...heme-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...osts-177a143182cd744b54e19a39a4cfbfd2.yaml | 58 +++++++++++++++++++ ...rm-7-213c6c67e9f7d7367e5fa5ff895afa34.yaml | 58 +++++++++++++++++++ ...ocks-207f8d3483b6bc918c2a6bbcc21fd35b.yaml | 58 +++++++++++++++++++ ...ocks-74b40b0063e22d99daacbf3fd60ee7a2.yaml | 58 +++++++++++++++++++ ...mium-616c8823c1cd69f1db936287f2d1fa7d.yaml | 58 +++++++++++++++++++ ...ocks-81d04df7ff5b0fa9ae3cc7f6b2f9eb6d.yaml | 58 +++++++++++++++++++ ...ocks-cc71ce3f07c7a7f6d2e0e309f25463b5.yaml | 58 +++++++++++++++++++ ...nced-c0043e4e0fc4abc274a0b7326af041c1.yaml | 58 +++++++++++++++++++ ...love-d3a9e47377e2967a1d3f37559f1438da.yaml | 58 +++++++++++++++++++ ...icon-a934a7b75723aefc4d34e91dfaf7a31f.yaml | 58 +++++++++++++++++++ ...nder-d4ee747485499e50fea0ef44831d0b48.yaml | 58 +++++++++++++++++++ ...shup-381d6cb0faea51f097b85258ee0a1587.yaml | 58 +++++++++++++++++++ ...shup-887adced0648142cd9b714a8cbded6f3.yaml | 58 +++++++++++++++++++ ...shup-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...y-wp-9764fa1268021fb445ed7c1cafd9a12b.yaml | 58 +++++++++++++++++++ ...y-wp-fcc1cf4316d93103b20ebe799631fe04.yaml | 58 +++++++++++++++++++ ...y-wp-ff66d6fc13b6cfdb064978e366821aab.yaml | 58 +++++++++++++++++++ ...ctor-7ff4f760c301092254ff0a3e49a089e0.yaml | 58 +++++++++++++++++++ ...uest-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ager-f6027704921a329e98184819d6ebf0b2.yaml | 58 +++++++++++++++++++ ...tory-0c1c0e5907f82c480480fd236d7507d7.yaml | 58 +++++++++++++++++++ ...tory-10faa8f7dbe39946fc1591dc4a29cfc1.yaml | 58 +++++++++++++++++++ ...tory-7539302587926b426117aef883b56a59.yaml | 58 +++++++++++++++++++ ...tory-88d4547a92050d1b28fb4357c26c8ac0.yaml | 58 +++++++++++++++++++ ...tory-ba7c20e930a8487a26eac0cfe90c0f74.yaml | 58 +++++++++++++++++++ ...tory-db82d66ee6f616f5c7fafadef247b8d1.yaml | 58 +++++++++++++++++++ ...tory-ff356638666fdb58f191f55340cbf4f0.yaml | 58 +++++++++++++++++++ ...ymes-ea5c3acfd64b155268d32c3228d1c82f.yaml | 58 +++++++++++++++++++ ...erce-0bdfa552c8e79eb2f1a91f087f9bcf9b.yaml | 58 +++++++++++++++++++ ...erce-5d5a5e01ff4136d5ff903d7e1aa12854.yaml | 58 +++++++++++++++++++ ...erce-6e53023aaed1d0ca3bd9def3a29a1431.yaml | 58 +++++++++++++++++++ ...lues-328e4fc27caed74ff806a419cfdcc0b7.yaml | 58 +++++++++++++++++++ ...lues-5e4bd8f4b7fcafa58897d3309b84db77.yaml | 58 +++++++++++++++++++ ...lues-a48251c3741e5bdda10cc3847e3d84b2.yaml | 58 +++++++++++++++++++ ...lues-c4a2060e848f8147ede668274113eb5f.yaml | 58 +++++++++++++++++++ ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...code-6a303c02814b33d00fcce0ecb738b831.yaml | 58 +++++++++++++++++++ ...cron-4320598ebb7d4a6b9802a276c7f0a6be.yaml | 58 +++++++++++++++++++ ...cron-a757fd116b9febd3ec3b6bc44f01bcb5.yaml | 58 +++++++++++++++++++ ...mber-eceee40ae071bd0838ed35de0f0e77bb.yaml | 58 +++++++++++++++++++ ...tion-318af4e7ad8fddddeacf6d8489b19638.yaml | 58 +++++++++++++++++++ ...tion-9fa773be7e5cdf580182e19b1f6e77fb.yaml | 58 +++++++++++++++++++ ...tion-ecee6fe6f960c3e32d930eed8f81ac9e.yaml | 58 +++++++++++++++++++ ...ions-c3ee6aa7cf2263de71bab964716588bf.yaml | 58 +++++++++++++++++++ ...twid-7da918d3fc3e2e8630ac4c982d69874d.yaml | 58 +++++++++++++++++++ ...twid-860548571db1d3ac7f3a8905c5f28f8d.yaml | 58 +++++++++++++++++++ ...twid-9bf910117bdf6862d3ee1c26c92e6b91.yaml | 58 +++++++++++++++++++ ...twid-ad0428bf7ab47783f2af074da8078ee3.yaml | 58 +++++++++++++++++++ ...twid-c31135ea82eaff9efa9c5f32111bb6e0.yaml | 58 +++++++++++++++++++ ...twid-caf19b99b78c33b145556e4b8cd07050.yaml | 58 +++++++++++++++++++ ...twid-d8609ca02744156f56f17a032b07e7ab.yaml | 58 +++++++++++++++++++ ...ting-e01c69283b147d24245068f3ebce49d9.yaml | 58 +++++++++++++++++++ ...-ips-8cf1834702b06ccbceec487f6fa13222.yaml | 58 +++++++++++++++++++ ...tact-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...-crm-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...desk-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...spot-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...soft-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...htly-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...erks-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...desk-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...zoho-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...fter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...fter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...arch-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...arch-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...elds-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...elds-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...feed-53d09e4ac030b1b8d99973338cf6e155.yaml | 58 +++++++++++++++++++ ...feed-e977a8524d61ac2824626ef17aa0bef1.yaml | 58 +++++++++++++++++++ ...host-9e13f21f3e18faff07670530f9d58cc5.yaml | 58 +++++++++++++++++++ ...rary-e7b7f002bb331eb26b796fe9ad1b013f.yaml | 58 +++++++++++++++++++ ...ator-992e494cb586ae82d8a59467cf03e6c8.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...t-up-22c8ae258ee7ee9005a864a39bda5496.yaml | 58 +++++++++++++++++++ ...t-up-904193396d39b8d655b88d4dbe19e726.yaml | 58 +++++++++++++++++++ ...t-up-a045ed71aa954e6a2d839e45661eb192.yaml | 58 +++++++++++++++++++ ...cher-1d5b9796eabe8ef0a97f7ac244be1692.yaml | 58 +++++++++++++++++++ ...cher-61fd2c4906855d53e38dbebcbfd74fb6.yaml | 58 +++++++++++++++++++ ...cher-8d18a006f7e8ea1576808227f78fb4e8.yaml | 58 +++++++++++++++++++ ...cher-cda43c8c429473025c851831200494f7.yaml | 58 +++++++++++++++++++ ...ress-13393dad61452f7f4e21c0de558fed80.yaml | 58 +++++++++++++++++++ ...ress-1a55c20ce9650829e57b6e448599ddb2.yaml | 58 +++++++++++++++++++ ...ress-6a1e5a3fb07b5d9291ff1e62a0f08cd2.yaml | 58 +++++++++++++++++++ ...ress-9b85cc5dac11e87b56eb1483e446220f.yaml | 58 +++++++++++++++++++ ...ress-df29a94c579971159744f58c90d00e43.yaml | 58 +++++++++++++++++++ ...ress-f31fcdd6accb0c61ba4b73c6a548d97d.yaml | 58 +++++++++++++++++++ ...ress-43352935e72ef2b8411f13007515e249.yaml | 58 +++++++++++++++++++ ...ress-4e01c0b287f81a38f8a747fdacd53194.yaml | 58 +++++++++++++++++++ ...give-21444ea062027be7746ee8919a0751f7.yaml | 58 +++++++++++++++++++ ...give-23e584511800cbedd4aa2481d8e724dc.yaml | 58 +++++++++++++++++++ ...give-24d7c262b4ff77236f6549957f02bcd3.yaml | 58 +++++++++++++++++++ ...give-37be249d4dba046bd5576085cbb2729e.yaml | 58 +++++++++++++++++++ ...give-3f68b15356bc4e3e423989f19f97e89a.yaml | 58 +++++++++++++++++++ ...give-513ec2f375998d3060fe3f60b69501e3.yaml | 58 +++++++++++++++++++ ...give-533fb5a34390cf0e65d667182e77a256.yaml | 58 +++++++++++++++++++ ...give-54db66d2a717e7bcc7922961c9407af7.yaml | 58 +++++++++++++++++++ ...give-560e75b141006ad846ab2e105e9e507e.yaml | 58 +++++++++++++++++++ ...give-57ba3dbc250a048ad4a278836ea777a0.yaml | 58 +++++++++++++++++++ ...give-57de8ad14c220bdfc73bc2840b43e6e3.yaml | 58 +++++++++++++++++++ ...give-5b936937c8c0c4c278a2b778b73bea89.yaml | 58 +++++++++++++++++++ ...give-6377ab76651d16deea08b67670c91822.yaml | 58 +++++++++++++++++++ ...give-65b42f995ea206de9225157157d7a733.yaml | 58 +++++++++++++++++++ ...give-709d37fdda47f80274e76b38e4a9b3f0.yaml | 58 +++++++++++++++++++ ...give-78446893c956fc1d75ddd7c2d7c876e7.yaml | 58 +++++++++++++++++++ ...give-7bb21adc4bf975d211fca6969dfaddaa.yaml | 58 +++++++++++++++++++ ...give-7d75f8931c3f52f53c2af82cabb73968.yaml | 58 +++++++++++++++++++ ...give-7dd2e84c6e70296a48fc2b4acb29199c.yaml | 58 +++++++++++++++++++ ...give-7e1c91d2fe86a0149b73baa7bbb169af.yaml | 58 +++++++++++++++++++ ...give-81dceb70d6b123bc1dd5fda793f142c3.yaml | 58 +++++++++++++++++++ ...give-85f432bf2dbf8ba147f83f3469bc9104.yaml | 58 +++++++++++++++++++ ...give-86bbc19d9e21d4915eb630a058d87bcf.yaml | 58 +++++++++++++++++++ ...give-87bce74e2816b9152b22f0db777f7371.yaml | 58 +++++++++++++++++++ ...give-941ef3ed4e3d287ad92a76b5c6b10f89.yaml | 58 +++++++++++++++++++ ...give-943637fa687cb5cc701289f6e9276a36.yaml | 58 +++++++++++++++++++ ...give-9507ea5164d4b920f9f2c716985b7a19.yaml | 58 +++++++++++++++++++ ...give-a0dbcf6f52eae1325b0e855594e29c09.yaml | 58 +++++++++++++++++++ ...give-b1b366ca92b9c54e2c2fcc9208d3c99a.yaml | 58 +++++++++++++++++++ ...give-b9cdb37818419e5c667c4243ff011f5d.yaml | 58 +++++++++++++++++++ ...give-c2ccbf305342f3ecbc58cb5dfedcc25d.yaml | 58 +++++++++++++++++++ ...give-cafa6e63a423db5471d38a13d54d5840.yaml | 58 +++++++++++++++++++ ...give-d338bda5ac65a8a3ce38070f7a58731b.yaml | 58 +++++++++++++++++++ ...give-d69efeae16b0ba8318e8a9d732208aec.yaml | 58 +++++++++++++++++++ ...give-e6953b327d094d1df94ac78f97ce3f1a.yaml | 58 +++++++++++++++++++ ...give-e8c206cd1f26f528590d564824a60ae5.yaml | 58 +++++++++++++++++++ ...give-ed46e202f3a956c555880fedcaa0b829.yaml | 58 +++++++++++++++++++ ...give-f373f6f19e01f5b1868c8800fb906e71.yaml | 58 +++++++++++++++++++ ...give-f58e0252abf68aa36c1bcaab03cbf89f.yaml | 58 +++++++++++++++++++ ...give-fa1fef40b905a2c3c8c8c056ae496c09.yaml | 58 +++++++++++++++++++ ...give-fbf0d51e53f3797d566b99247fa5f5d8.yaml | 58 +++++++++++++++++++ ...asap-3a84f9286ec25d34a996b5cb4ee829c4.yaml | 58 +++++++++++++++++++ ...asap-3d832eae81d276110b2fb05b6aea23b7.yaml | 58 +++++++++++++++++++ ...asap-6e765eeed6905cf3916d16fe5425c306.yaml | 58 +++++++++++++++++++ ...asap-7cc7ed508e00e037806456d02a30380e.yaml | 58 +++++++++++++++++++ ...asap-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...asap-c518ac9593781d65f764a219f04b0aec.yaml | 58 +++++++++++++++++++ ...asap-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...asap-fece4721182fa2d84ab761adf04133ca.yaml | 58 +++++++++++++++++++ ...away-26c15735f9b04a66bec91df3a0d7b981.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lass-6881e52d7cf04ebe1617491d26006f2c.yaml | 58 +++++++++++++++++++ ...ocks-6765f94f6a40bfeac4a799a7a22b461e.yaml | 58 +++++++++++++++++++ ...tons-13ea368d9bd0647c7fbc9fa83359351c.yaml | 58 +++++++++++++++++++ ...ries-08c393c21c576ae1c41fe91d54e7e9e1.yaml | 58 +++++++++++++++++++ ...ries-7ae34f6008db08976405a2c0ef63df74.yaml | 58 +++++++++++++++++++ ...ries-95f3b505db0bb5acbcaf86e1dd39e4eb.yaml | 58 +++++++++++++++++++ ...mius-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...arch-76fd12ad8b7b78037046699e5ffa0377.yaml | 58 +++++++++++++++++++ ...port-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ller-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...deat-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...deat-bc0cf3a754a6fbdff0b7d35751f27209.yaml | 58 +++++++++++++++++++ ...dget-8b27cef0936a142b64091e4a3cd8f0d4.yaml | 58 +++++++++++++++++++ ...opup-628e944f1865bad285b75e5824e5bb82.yaml | 58 +++++++++++++++++++ ...opup-9f96211fdf4dfb4e1d26bfe2d1c36496.yaml | 58 +++++++++++++++++++ ...opup-bc43f57bd35ee24fbcd374ea171e9e72.yaml | 58 +++++++++++++++++++ ...opup-d4e0a798d434cb0cbde1a32f973bc629.yaml | 58 +++++++++++++++++++ ...mace-573c28c014e533996385e54c5801eb5e.yaml | 58 +++++++++++++++++++ ...mace-91afdd80e105f88c419657c28ec390b7.yaml | 58 +++++++++++++++++++ ...mace-99958bc5af6b387619c59f0368c5fbd3.yaml | 58 +++++++++++++++++++ ...mbed-3d3b0b33d5d87ca799b6b79195a4eb93.yaml | 58 +++++++++++++++++++ ...mbed-72366184b67914a0825758added672d3.yaml | 58 +++++++++++++++++++ ...mbed-a2596cd818b9e76da96ce78707638a4c.yaml | 58 +++++++++++++++++++ ...mbed-cf16a38393f700cdb2be76a3ca5de2f2.yaml | 58 +++++++++++++++++++ ...sher-8fa57ae72750b34eb12df59c3f8bd733.yaml | 58 +++++++++++++++++++ ...tion-e9b21730376128cd6be89ff8a65d542e.yaml | 58 +++++++++++++++++++ ...erce-24f4d698ab0a491686fe5ba91eade3a1.yaml | 58 +++++++++++++++++++ ...erce-3151dcfef62c493c56c6489173f8c7fe.yaml | 58 +++++++++++++++++++ ...gine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...iral-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cing-6b34c883ba2362a8ae8903a4773f143d.yaml | 58 +++++++++++++++++++ ...cing-b5e2905f3fa25ed5a268cff184f71b6b.yaml | 58 +++++++++++++++++++ ...cing-c0501d6ec7222ce135cf1060e0209955.yaml | 58 +++++++++++++++++++ ...cing-d934ac1748b53a01cebaf8d5ba82ca90.yaml | 58 +++++++++++++++++++ ...odes-613714f5c2e87c49430822b55db25b79.yaml | 58 +++++++++++++++++++ ...odes-e2b3a3b43a72a2751316fff54c8d6a22.yaml | 58 +++++++++++++++++++ ...orms-e6ae143c6a0d21493b73e68beda81a51.yaml | 58 +++++++++++++++++++ ...orms-f63791a8b82a8db6f6f51f822aa27ea8.yaml | 58 +++++++++++++++++++ ...dget-af9b404439d9589515c5ec4e6d7f1ef0.yaml | 58 +++++++++++++++++++ ...ents-50f3d46f270e4758bbe32a2e3166c5bc.yaml | 58 +++++++++++++++++++ ...s-wp-600afe426493b29bf5509da4cbb82add.yaml | 58 +++++++++++++++++++ ...rber-59bc60dbb95a640744a1b35b77853c09.yaml | 58 +++++++++++++++++++ ...dlms-29cf41f615f87d85b5f82475c8720a9f.yaml | 58 +++++++++++++++++++ ...ews5-cf8879fce150bfeedade2a46a11300d9.yaml | 58 +++++++++++++++++++ ...alog-5354899032ab4aab5f7e436527798ae7.yaml | 58 +++++++++++++++++++ ...king-9de4f56ad1c8638320783f6629c2489f.yaml | 58 +++++++++++++++++++ ...ator-0d1a8a5f1814698e05f7c343a752da34.yaml | 58 +++++++++++++++++++ ...ator-43b0481b51b9c335093961e5a3ab3d80.yaml | 58 +++++++++++++++++++ ...ator-b8c54b7d77df783a3aa06fe35c635411.yaml | 58 +++++++++++++++++++ ...ator-c101bbb0e470de09f2d621ebb65fb72c.yaml | 58 +++++++++++++++++++ ...ator-d27196962105bff471a16f16aa617461.yaml | 58 +++++++++++++++++++ ...oard-575dc6634917d2a883d4c89ee0a2b4b7.yaml | 58 +++++++++++++++++++ ...r-wp-0afedca0afb43a5850c9c8a9aae6b215.yaml | 58 +++++++++++++++++++ ...r-wp-9084030bbc61cd11a5b8832a564811a7.yaml | 58 +++++++++++++++++++ ...ress-01178f6672a2045cbc07066e22c4b9ed.yaml | 58 +++++++++++++++++++ ...ress-49a596fa960c73e741b497015244d412.yaml | 58 +++++++++++++++++++ ...ress-4c07ee1f8d9ca7766b852300f804ffcc.yaml | 58 +++++++++++++++++++ ...ress-4db70895ddb744990c478a4f72d2b5cc.yaml | 58 +++++++++++++++++++ ...ress-5d2c8f0682b9df406ab0b4c99151d03e.yaml | 58 +++++++++++++++++++ ...ress-6589f8f5c2b9c61e1e02d46bf871ed81.yaml | 58 +++++++++++++++++++ ...ress-728945e5b2000023cafe3f37e7d91f51.yaml | 58 +++++++++++++++++++ ...ress-76e9ddecba440119067c8918ef300454.yaml | 58 +++++++++++++++++++ ...ress-89e45ac29496786a2f26bbad510d04b9.yaml | 58 +++++++++++++++++++ ...ress-d4b13be2a36ff961aada7107a748559a.yaml | 58 +++++++++++++++++++ ...s-mu-1622f7025c888065199677a7f8c3a0a4.yaml | 58 +++++++++++++++++++ ...-out-7173b1dd80c7cb39c8dbdccb921d11e8.yaml | 58 +++++++++++++++++++ ...mium-c8bc852e0f629926f8c3b976dbc68f47.yaml | 58 +++++++++++++++++++ ...dget-6bd671fcc5c9744eb02b51b3543e258d.yaml | 58 +++++++++++++++++++ ...ogin-a6981c5b5578853614f986e96039441b.yaml | 58 +++++++++++++++++++ ...ator-b920d1982fb42696fbafb9ceffabe1a9.yaml | 58 +++++++++++++++++++ ...ents-1dfb76723d09fb5ee2cf36729147fd09.yaml | 58 +++++++++++++++++++ ...ents-553b08020eb3e25f2e938865afb49062.yaml | 58 +++++++++++++++++++ ...ents-da47dd8f1298c3b7dee167384f30a8a6.yaml | 58 +++++++++++++++++++ ...ents-f9c0cef6c82321c823029b4f47ad6ec5.yaml | 58 +++++++++++++++++++ ...ents-fc53f712d57ef35888a981283b03a790.yaml | 58 +++++++++++++++++++ ...tcha-598cb96d3fc3853eb8776df6e751f4a4.yaml | 58 +++++++++++++++++++ ...tcha-6bc609f0d38e102f4943d0a60410cf7f.yaml | 58 +++++++++++++++++++ ...dder-0058c9636ab9a993ffe8aa9657a05d60.yaml | 58 +++++++++++++++++++ ...dder-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml | 58 +++++++++++++++++++ ...dder-0e4cfd2e84d3d4a0dcd341ba876cfae7.yaml | 58 +++++++++++++++++++ ...dder-4201a049c4e3da0f1f472f8fab792578.yaml | 58 +++++++++++++++++++ ...dder-96e3c232ce32c0e385509a8011930dfa.yaml | 58 +++++++++++++++++++ ...dder-cc3e06da44808e338c8d593b5ba332ad.yaml | 58 +++++++++++++++++++ ...dder-fdf6e35f0fe8eb69bf51476cf88fe9b7.yaml | 58 +++++++++++++++++++ ...emap-533a62c8ac6b0ab46c7891e8ab20865e.yaml | 58 +++++++++++++++++++ ...ator-18429af9c071c8309e034a7d4d00a8e6.yaml | 58 +++++++++++++++++++ ...ator-1cc23bdae3a780fc80463f59518007e6.yaml | 58 +++++++++++++++++++ ...ator-202ca74fdc1ed676814ee60bc8ef09cc.yaml | 58 +++++++++++++++++++ ...ator-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml | 58 +++++++++++++++++++ ...ator-b8c86f67e83059075ac727a634aa1bcf.yaml | 58 +++++++++++++++++++ ...ator-c7a8789e2e14665dec08cabfa7ba8238.yaml | 58 +++++++++++++++++++ ...ator-d02f0d7121f40075980c3a177c578c3f.yaml | 58 +++++++++++++++++++ ...ator-e0be71e8989abd7e932a8db49d3c409c.yaml | 58 +++++++++++++++++++ ...ator-6f56f1f427bde5f9933ce31042034bce.yaml | 58 +++++++++++++++++++ ...code-4863dac3dc1435179890da283e476787.yaml | 58 +++++++++++++++++++ ...code-5a9c8ffeceece98dba6df9f5a0d59a78.yaml | 58 +++++++++++++++++++ ...code-95846903ce77a5ec41c1ed6e6284de3b.yaml | 58 +++++++++++++++++++ ...p-wp-2d526bfd90ad711e245aa63d352c09e2.yaml | 58 +++++++++++++++++++ ...maps-116826aae00eabc027157d14465768bc.yaml | 58 +++++++++++++++++++ ...nced-bad18eab263a0541b49dc3dae830d379.yaml | 58 +++++++++++++++++++ ...here-d6efc23acaa92418f6d5991825096389.yaml | 58 +++++++++++++++++++ ...easy-066b2e83656aa18020e2e218de1f2a94.yaml | 58 +++++++++++++++++++ ...easy-071e46b1422bc01b590261a3c5a56383.yaml | 58 +++++++++++++++++++ ...easy-8055046b14f7ace81067cd61a7af0ffb.yaml | 58 +++++++++++++++++++ ...easy-c19921f21d9136f2954ea974f2d3b3d7.yaml | 58 +++++++++++++++++++ ...easy-f4c5da0c9249d69bad94272b808223ea.yaml | 58 +++++++++++++++++++ ...osts-ed62eec06fc25731ee3527890a026d6c.yaml | 58 +++++++++++++++++++ ...eady-42f393afcc63e1048ce48bee1feb1c00.yaml | 58 +++++++++++++++++++ ...code-e258e8570aa5a2a07663517678c9341e.yaml | 58 +++++++++++++++++++ ...dget-47ea06b51e4d84465dbdc7ce5332226e.yaml | 58 +++++++++++++++++++ ...dget-ec849d78c688b2190e2b3aabcf591070.yaml | 58 +++++++++++++++++++ ...emap-5229e60b10dc0cc0da445f82bd6aaa7c.yaml | 58 +++++++++++++++++++ ...emap-d6ab389c616dfd2cb30cbd7db8473c95.yaml | 58 +++++++++++++++++++ ...-one-487e1c477d62c893e7844e96f9998b9b.yaml | 58 +++++++++++++++++++ ...ghts-151d3e08592a36d4136c6e83ca9b4d33.yaml | 58 +++++++++++++++++++ ...ghts-69c002483424de642a83eb654d8e112a.yaml | 58 +++++++++++++++++++ ...pets-3b1e2a032a6f302e2ccd9d18f56d17aa.yaml | 58 +++++++++++++++++++ ...link-cc49f2dcb06843ad833fab55b1a84dab.yaml | 58 +++++++++++++++++++ ...-kit-ce48369642b01844ccbae0e0917885a1.yaml | 58 +++++++++++++++++++ ...-tag-27da99993e67f1ff7087f357854cd3f5.yaml | 58 +++++++++++++++++++ ...ator-877bab778ddda7032844b19d4fdbee7a.yaml | 58 +++++++++++++++++++ ...ator-a8343a6c54d23e35a66b54c79a6e406e.yaml | 58 +++++++++++++++++++ ...ugin-a9e88406cdac203530a27cd9ede9dcf0.yaml | 58 +++++++++++++++++++ ...aphy-cff018203a21cbec2137aca8bbff35f1.yaml | 58 +++++++++++++++++++ ...ator-1f82fcaacb5a6d3e18b98a66c9d7e3ab.yaml | 58 +++++++++++++++++++ ...ugin-3c3cbbdb8196193ef05917779fb71864.yaml | 58 +++++++++++++++++++ ...tics-2207307382a7e5b71273a639c041b28d.yaml | 58 +++++++++++++++++++ ...tics-d7f99b9c49c835552d523fc996a914ba.yaml | 58 +++++++++++++++++++ ...nify-c684be52691ba8cf475f40cbe594a992.yaml | 58 +++++++++++++++++++ ...tics-733ee63acd3da1891d75d0f23730ff92.yaml | 58 +++++++++++++++++++ ...tmls-0a0cd233b0f3cbcbaa65976cd56fef34.yaml | 58 +++++++++++++++++++ ...tmls-0c5d9c3d25fdcac52f9189c83dcf8aeb.yaml | 58 +++++++++++++++++++ ...tmls-1a3ebcec002fbbf2625550387d2d42c9.yaml | 58 +++++++++++++++++++ ...tmls-217282597c372f234ba0f9d1d76dc65e.yaml | 58 +++++++++++++++++++ ...tmls-708df63ef726347251d17af873084641.yaml | 58 +++++++++++++++++++ ...tmls-73c5b47663cb5585bace1d303c16cc9b.yaml | 58 +++++++++++++++++++ ...tmls-dad4d79fe3688c4dbc2389dd7cd7a0c1.yaml | 58 +++++++++++++++++++ ...tmls-ee46b680e67f5e4398b3104a6e695606.yaml | 58 +++++++++++++++++++ ...towp-1dba374d8f67142177f857791fc4897a.yaml | 58 +++++++++++++++++++ ...ship-3063b8281af6ebc7aeb1fd5ad46fb58d.yaml | 58 +++++++++++++++++++ ...e-id-0baa6a08e33ce425ecc59984cf3322d5.yaml | 58 +++++++++++++++++++ ...tter-b434181ec4dda3f7c495c50067c97199.yaml | 58 +++++++++++++++++++ ...ator-045152e75b1009ce745fb0f25f86d898.yaml | 58 +++++++++++++++++++ ...ator-57ecfed8d0fb67d406684f95901e8e61.yaml | 58 +++++++++++++++++++ ...ator-e9e7f1f63804b5a7bd339f4d7bcd16e9.yaml | 58 +++++++++++++++++++ ...ayer-639b65f134f2ebc0900152991d7d173d.yaml | 58 +++++++++++++++++++ ...ntor-2b7b5dc8c00ef5d0c5596161adf932c4.yaml | 58 +++++++++++++++++++ ...edia-0825ff9121c6db183cc7a8611f4eccae.yaml | 58 +++++++++++++++++++ ...edia-3d97f53ad1e035f606fd358779aba41f.yaml | 58 +++++++++++++++++++ ...edia-6c30ef6dc07bdb8e5463fc4ceb947996.yaml | 58 +++++++++++++++++++ ...edia-6f4811a1962934f7bbd6ba6e69c49111.yaml | 58 +++++++++++++++++++ ...edia-7f68709b4a4df440a41bc04d703e3fb6.yaml | 58 +++++++++++++++++++ ...edia-eb694b6f549de02c7bd8c2f716c1cbc2.yaml | 58 +++++++++++++++++++ ...edia-f89c8645dfcff6d7c8daa63e313b40dd.yaml | 58 +++++++++++++++++++ ...edia-feb8ea008986699e99b1ae18448b79c3.yaml | 58 +++++++++++++++++++ ...aphs-a96bb943a1852ea0b2e688a3b3910413.yaml | 58 +++++++++++++++++++ ...erce-b4bd8b09c6fbcb29788bc8bbefcbcdc0.yaml | 58 +++++++++++++++++++ ...cker-cd3644678d89d82305da7906f47bab11.yaml | 58 +++++++++++++++++++ ...free-aae4ca7abb59e5c604f97c05e398cdb3.yaml | 58 +++++++++++++++++++ ...xpay-c5c10bf83837ad294aabcbed9d694122.yaml | 58 +++++++++++++++++++ ...nded-67df3c9c3b7aab97d6fc038c36b94164.yaml | 58 +++++++++++++++++++ ...ions-167d9672411be44feb72a5175fd0987c.yaml | 58 +++++++++++++++++++ ...list-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...orms-5d1eddaacfc678e52758e23e8e3a8842.yaml | 58 +++++++++++++++++++ ...orms-6b968b7d554babf27aefcb5df3e3773f.yaml | 58 +++++++++++++++++++ ...orms-77f0a0f1e7db36263a8aa9ab981e047e.yaml | 58 +++++++++++++++++++ ...orms-7ce94184875be6701700a5e620312558.yaml | 58 +++++++++++++++++++ ...orms-975bf041109307c2b0234ccae26e4bc6.yaml | 58 +++++++++++++++++++ ...orms-af26d379855801f026d0f678221b9f09.yaml | 58 +++++++++++++++++++ ...orms-effd937dfb84f7185a68c8c7960d1571.yaml | 58 +++++++++++++++++++ ...orms-f9a5aabd053da65d5b8f27e85e3ac8c7.yaml | 58 +++++++++++++++++++ ...otes-a9ade0513aa1dccbdad4ffd99dcceb42.yaml | 58 +++++++++++++++++++ ...link-c5e8439f52a72fc808844ece6ad38bdd.yaml | 58 +++++++++++++++++++ ...ocks-01c7f6a7ff2da57d8e46e6c08e382c32.yaml | 58 +++++++++++++++++++ ...ocks-601f7b212435b0908f5157de31e9c323.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ocks-c16c01b270f8ba46731b798dbc4b70f0.yaml | 58 +++++++++++++++++++ ...ocks-f9a2a8b78b336f59f7555c63172782ec.yaml | 58 +++++++++++++++++++ ...eway-e92bd2c686e39336f450414601e8c047.yaml | 58 +++++++++++++++++++ ...-seo-1fdcfa12049d782d5c0a8a4b15f2b5b5.yaml | 58 +++++++++++++++++++ ...uite-5b0eec3be7323ada5d1daeb52ff32549.yaml | 58 +++++++++++++++++++ ...mium-ff22f0867ae120b77caf3636e99d73c8.yaml | 58 +++++++++++++++++++ ...plus-12eb7534db6d3a6b596836d9096b1dfc.yaml | 58 +++++++++++++++++++ ...plus-a7efe3d7340eefdf74e75d3be0901882.yaml | 58 +++++++++++++++++++ ...plus-ae14a34996c3d427efe7873c20688c21.yaml | 58 +++++++++++++++++++ ...odes-0ddb5ade9834993cf7b74808814bcc80.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...dget-c7a837e64827f8095f9260b40809766c.yaml | 58 +++++++++++++++++++ ...hogg-01e6da1e967018241a8f36efe6fd50ba.yaml | 58 +++++++++++++++++++ ...hogg-1d9266ecaa07d410393e4d47b4c9954f.yaml | 58 +++++++++++++++++++ ...hogg-5c29a3cc888c2b8f4800d87269906f2c.yaml | 58 +++++++++++++++++++ ...hogg-653bfe16d9c86908e0bcfff0b6dd1c6e.yaml | 58 +++++++++++++++++++ ...hogg-6b4accb527f76b2e4224aaf45a24e723.yaml | 58 +++++++++++++++++++ ...hogg-6f02fa76246cc8d01472e29b6032ad8f.yaml | 58 +++++++++++++++++++ ...hogg-7690dbacbae8cf712fa24f47448d84aa.yaml | 58 +++++++++++++++++++ ...hogg-8a471c08317f24a8f762c3b9912e1668.yaml | 58 +++++++++++++++++++ ...hogg-9bca420841e37204239e9083274e18ac.yaml | 58 +++++++++++++++++++ ...hogg-a69ac85c2f382d8b82f7f44fd083ec69.yaml | 58 +++++++++++++++++++ ...hogg-b86dfb6f9dd8aa205cbc3842be669c7a.yaml | 58 +++++++++++++++++++ ...hogg-ea3614c57e168b5cbba1a64665aa3e41.yaml | 58 +++++++++++++++++++ ...hogg-f995ec2617f1d8e01a76eb96ebc10f06.yaml | 58 +++++++++++++++++++ ...ison-9ec1775f8427416318a9bdfcfd96cca2.yaml | 58 +++++++++++++++++++ ...case-2dfa9da72134b3fee9c376ecca6fe446.yaml | 58 +++++++++++++++++++ ...olio-6238c45309a73e1d06001135fffb48d2.yaml | 58 +++++++++++++++++++ ...ents-36c5b3d7d876a774f8fd4aa153e32524.yaml | 58 +++++++++++++++++++ ...ents-51018cf0109648dade76eaf03756855f.yaml | 58 +++++++++++++++++++ ...olio-bb81738a1483724d89303a6a2b8b759f.yaml | 58 +++++++++++++++++++ ...olio-e4d780c0204ebc51d13bc9ff3d0c837f.yaml | 58 +++++++++++++++++++ ...ider-3a1240a24a2dd47c008d450b098689b3.yaml | 58 +++++++++++++++++++ ...ider-ee05a64bbaf03a516917796674375367.yaml | 58 +++++++++++++++++++ ...olio-0e5cb6701f47f915bf3484f8aa48343f.yaml | 58 +++++++++++++++++++ ...olio-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...olio-51cfef8c45760573f4f3cc1655e5ab39.yaml | 58 +++++++++++++++++++ ...olio-565c3a27c2a7060808c53a2711e80a32.yaml | 58 +++++++++++++++++++ ...olio-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...olio-876486fa06bffb3829a9c77f08f98e1b.yaml | 58 +++++++++++++++++++ ...bers-89d1ae974c3297f3be00b2900b223ee4.yaml | 58 +++++++++++++++++++ ...bers-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nial-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...nial-7cf1733a0fcabc72e1599e5c6fa6e184.yaml | 58 +++++++++++++++++++ ...nial-95b4227a0d3d41c249f2bf8ed2c425e5.yaml | 58 +++++++++++++++++++ ...nial-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...nial-d8076a607a4a2cad3434e6393a4159d1.yaml | 58 +++++++++++++++++++ ...ider-1735d30fe988ff978861d4dbdb0c640e.yaml | 58 +++++++++++++++++++ ...seor-3c35d6ca8d97eaaa9d359ed4e523fe3c.yaml | 58 +++++++++++++++++++ ...orms-48accc4aa9cbb4e6e06e0f437230bfc4.yaml | 58 +++++++++++++++++++ ...orms-5bdb93ed09679c782c93a7aa96190eff.yaml | 58 +++++++++++++++++++ ...-pro-5bdb93ed09679c782c93a7aa96190eff.yaml | 58 +++++++++++++++++++ ...orms-d84c432825dde022913bf769b768726f.yaml | 58 +++++++++++++++++++ ...orms-faac6d1ff1697000b9b14ca585be6ab0.yaml | 58 +++++++++++++++++++ ...-pro-faac6d1ff1697000b9b14ca585be6ab0.yaml | 58 +++++++++++++++++++ ...orms-2c53b255c00d529e8b580e9b919c837b.yaml | 58 +++++++++++++++++++ ...-pro-2c53b255c00d529e8b580e9b919c837b.yaml | 58 +++++++++++++++++++ ...show-216bc7429720f3a1737645ac0bc074a0.yaml | 58 +++++++++++++++++++ ...lery-931f5de56d92dfa4c2d39579eb08aff8.yaml | 58 +++++++++++++++++++ ...side-9d901cc0b99cacc346adcfb2e44aed31.yaml | 58 +++++++++++++++++++ ...ress-118d3bbf1129a6179234e3b857cad279.yaml | 58 +++++++++++++++++++ ...ress-241dd4c3f2d34cca641cc14b2238e0fd.yaml | 58 +++++++++++++++++++ ...ress-8d4923c8fc18392ea1fb56e01269ce95.yaml | 58 +++++++++++++++++++ ...late-49b5433838cce19f05784e59c6e0d7f6.yaml | 58 +++++++++++++++++++ ...late-530119b641fe83b81bd9470a37532801.yaml | 58 +++++++++++++++++++ ...late-5ebef968ecfba23771708b1d7c8b6112.yaml | 58 +++++++++++++++++++ ...late-d02f0d7121f40075980c3a177c578c3f.yaml | 58 +++++++++++++++++++ ...late-e193e03e756910d1d1e9b9cc6d320432.yaml | 58 +++++++++++++++++++ ...late-e57cb75d56b89999570d9a342a44a60a.yaml | 58 +++++++++++++++++++ ...iant-ca496e63542b74a88b0b8dd7fd0ebb0c.yaml | 58 +++++++++++++++++++ ...thor-9b2b2cc106e50e817ce608f745dbdaed.yaml | 58 +++++++++++++++++++ ...thor-bcd6b988167c1612bb5048004783e4f5.yaml | 58 +++++++++++++++++++ ...name-982e9cfa43c440d5e945696eaf09286b.yaml | 58 +++++++++++++++++++ ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ddon-dd93174b0504049ccc03e08eec846159.yaml | 58 +++++++++++++++++++ ...road-f295e8a8427ef02d3b3be1982f4ae5fa.yaml | 58 +++++++++++++++++++ ...ates-a6e719c0412296476082fdb1b971690e.yaml | 58 +++++++++++++++++++ ...berg-dea122a140ad8ae54d1e3b79712b8d73.yaml | 58 +++++++++++++++++++ ...ider-6a7d0f10989c55df0c2d186c1333c6d5.yaml | 58 +++++++++++++++++++ ...ider-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erse-c512399e58b223011a17608d4b51ac26.yaml | 58 +++++++++++++++++++ ...erse-f66a440cd899e10b9d3c84e8064d84c8.yaml | 58 +++++++++++++++++++ ...e-gb-02c38e87fc6391ec0ea333f550f5e898.yaml | 58 +++++++++++++++++++ ...e-gb-8d7e82e4dc7d56e63bcdb6a68358e1ba.yaml | 58 +++++++++++++++++++ ...e-gb-b0dcd475ee39f280da0df0dd6993e407.yaml | 58 +++++++++++++++++++ ...e-gb-d1ded0c2f1b1f7a73c6770c120be62b6.yaml | 58 +++++++++++++++++++ ...e-gb-def48545fc7b8f7aba56c88a829527ec.yaml | 58 +++++++++++++++++++ ...tats-e3f2fb4bebde6fbab715925584422191.yaml | 58 +++++++++++++++++++ ...ctor-a56db0fded06de81c5e370419ecf70d7.yaml | 58 +++++++++++++++++++ ...ment-398be83e4279f1a443c4d3cb2c5b8198.yaml | 58 +++++++++++++++++++ ...itor-5203ae90ef6af25fe25fc40bdffc879a.yaml | 58 +++++++++++++++++++ .../hal-06dfe81bc3a355cd7801ee39e75e5076.yaml | 58 +++++++++++++++++++ ...ayer-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml | 58 +++++++++++++++++++ ...bber-8f10a7f44536cd7d542d4c451e6c6b46.yaml | 58 +++++++++++++++++++ ...ials-87c27569f8277885aabdf5403aebae34.yaml | 58 +++++++++++++++++++ ...dons-11da24271f65d3b23d168c3013c450d2.yaml | 58 +++++++++++++++++++ ...dons-14492d14fdb2635abb58842e5c9c262d.yaml | 58 +++++++++++++++++++ ...dons-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...dons-3ed56e73a3a43b54020334fdf48e4e7f.yaml | 58 +++++++++++++++++++ ...dons-40e8b36488a6eac28e891fecfb75c2fd.yaml | 58 +++++++++++++++++++ ...dons-47a1a7c3503abffa7dc09bb7e0a3a05e.yaml | 58 +++++++++++++++++++ ...dons-554f77c669d0419c047d6805cc30482d.yaml | 58 +++++++++++++++++++ ...dons-5f5be8778a8041dd72149d1e03212c77.yaml | 58 +++++++++++++++++++ ...dons-6eaf90f575a0c36147979bc3388c8a32.yaml | 58 +++++++++++++++++++ ...dons-70c45809c8b9b14259a0bbce1a7bc3da.yaml | 58 +++++++++++++++++++ ...dons-72139ddfa4b65d7bc5dd06dc24f01748.yaml | 58 +++++++++++++++++++ ...dons-81f2915fd63b284fd9e4c66899667dd0.yaml | 58 +++++++++++++++++++ ...dons-857593f7e35e0afc65d726bb57f2b738.yaml | 58 +++++++++++++++++++ ...dons-a01bc9677b84a6e36d4cf67ad2a5dc30.yaml | 58 +++++++++++++++++++ ...dons-ab2437d4d93bac74a9eb7aad2f952033.yaml | 58 +++++++++++++++++++ ...dons-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...dons-bc1bf66d22152db23406f67a4e5cfee9.yaml | 58 +++++++++++++++++++ ...dons-c9ff001e2ccdd465207fe5710fbe6c52.yaml | 58 +++++++++++++++++++ ...dons-dbb7ef50cd218fd39017d67c755de559.yaml | 58 +++++++++++++++++++ ...dons-e18fa2425147eac664779a4e7540108b.yaml | 58 +++++++++++++++++++ ...dons-e3b2d19a0133da498045d08d6862f535.yaml | 58 +++++++++++++++++++ ...-pro-5f5be8778a8041dd72149d1e03212c77.yaml | 58 +++++++++++++++++++ ...-pro-61c39bef79293723f6fa3478b1529af9.yaml | 58 +++++++++++++++++++ ...-pro-bc1bf66d22152db23406f67a4e5cfee9.yaml | 58 +++++++++++++++++++ ...-pro-9a4a86b73d09899b1f2fa163f3660f75.yaml | 58 +++++++++++++++++++ ...-pro-c93f15f45e4694eec856b57673b454f8.yaml | 58 +++++++++++++++++++ ...orms-2707a3752ae7690ac46fe8896eb6632b.yaml | 58 +++++++++++++++++++ ...orms-7145c40ff1e0db4687c083ce378fc607.yaml | 58 +++++++++++++++++++ ...orms-74ccbff13cedef341c14f509a30bb49c.yaml | 58 +++++++++++++++++++ ...ents-70740ef575420bdce3307b7d6efb0e97.yaml | 58 +++++++++++++++++++ ...-bar-77bff58a02745412cca836e0af8ecf6c.yaml | 58 +++++++++++++++++++ ...-bar-cc04fc647a83c5a0bf41904a11665f19.yaml | 58 +++++++++++++++++++ ...rter-a59d3f4cb23477999357f88e98585933.yaml | 58 +++++++++++++++++++ ...xcan-3db14e51e4cd401655d11f7aea7dbad4.yaml | 58 +++++++++++++++++++ ...book-d14e048167575e51fe5556ff84906191.yaml | 58 +++++++++++++++++++ ...-url-560440aa181bea8a67faa79732a41f9b.yaml | 58 +++++++++++++++++++ ...-url-7ac6b90fc34536c09d99f508147f9181.yaml | 58 +++++++++++++++++++ ...-url-d13cb26577d06a7097c333dfa170e855.yaml | 58 +++++++++++++++++++ ...more-7b33ec746697457281bd9e42aec2f348.yaml | 58 +++++++++++++++++++ ...quiz-48f754f17606d4479811452c8745b0f0.yaml | 58 +++++++++++++++++++ ...quiz-eea7979a3adae6620386ae2fd9256411.yaml | 58 +++++++++++++++++++ ...lery-a27af52ed355aaf16d2ba0f06827a926.yaml | 58 +++++++++++++++++++ ...lery-e15109a3e2bca91cb9757f33e8ccceb0.yaml | 58 +++++++++++++++++++ ...tube-917d7399f5fb3cc1cf39f6cce7273cc7.yaml | 58 +++++++++++++++++++ ...tube-a307a0ae505afb842b5a198bc8bff8bf.yaml | 58 +++++++++++++++++++ ...ment-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...ager-29a76895e319eccbd61b3bb594faebd4.yaml | 58 +++++++++++++++++++ ...ager-4e85b966f722637fb8ba38d8dce7367a.yaml | 58 +++++++++++++++++++ ...ager-54aadf8fe607e5a163f75b88f9bb6921.yaml | 58 +++++++++++++++++++ ...ager-ebaed8da40ca133016da6dca47ef4e1c.yaml | 58 +++++++++++++++++++ ...ntor-5adfa5eb8fa56a7df3a28304be530aa5.yaml | 58 +++++++++++++++++++ ...ntor-76b99567dc5d8693687703220a992b79.yaml | 58 +++++++++++++++++++ ...ider-0fdfd9f22590d1df506441add4a664d1.yaml | 58 +++++++++++++++++++ ...-cms-924d818a306e9e6b06f3cb1274c2304e.yaml | 58 +++++++++++++++++++ ...yzer-54f2c04c2c06c269e0341f13f080ec95.yaml | 58 +++++++++++++++++++ ...yzer-8cd08637ffa8c2d1ca3b360f63505422.yaml | 58 +++++++++++++++++++ ...heck-3d51c2b8fb06721f3c5b968c3626fb70.yaml | 58 +++++++++++++++++++ ...heck-43535da8d5aa574c7cf4e311538c873d.yaml | 58 +++++++++++++++++++ ...heck-73c68dbf279656072f1ab958f24cc348.yaml | 58 +++++++++++++++++++ ...heck-fa8bb26d319a4e03fd0e1e3bc361d9db.yaml | 58 +++++++++++++++++++ ...this-f0164790773e35acb9b1d44f4c95382b.yaml | 58 +++++++++++++++++++ ...ackr-96b9af98f103ae55e184925f398dbbc0.yaml | 58 +++++++++++++++++++ ...ents-73dd9496dc7942d3595fe6b58faa41a3.yaml | 58 +++++++++++++++++++ ...ogin-132f29f7cba1678c467fb85b9d9b820e.yaml | 58 +++++++++++++++++++ ...asso-3b452da100c4d01a4273d3119ce13da9.yaml | 58 +++++++++++++++++++ ...rint-e743442fbb37f8e4e9406e7627aff2e1.yaml | 58 +++++++++++++++++++ ...rint-fb3207d7d531ee9e551e1696ce5b366a.yaml | 58 +++++++++++++++++++ ...skwp-0aa92148d99c1bca8d88494c39b853c4.yaml | 58 +++++++++++++++++++ ...pful-7344a2ea198088e725e4c36ccf66d66c.yaml | 58 +++++++++++++++++++ ...pful-dd20a0b7211e7318d7683dbce69df5bf.yaml | 58 +++++++++++++++++++ ...pful-fdcfcbc977d2772beb04b8279c53f48d.yaml | 58 +++++++++++++++++++ ...-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...-faq-fa8aa874dce84326a50185872038d6df.yaml | 58 +++++++++++++++++++ ...core-59d8f9139af0fff2996b4a871907966d.yaml | 58 +++++++++++++++++++ ...rmit-3ba7758def7bb999accbbcf70be2e182.yaml | 58 +++++++++++++++++++ ...rmit-43b828ba6ca06e13c96e8d6957a25d26.yaml | 58 +++++++++++++++++++ ...rmit-45a494ad00222afc72c15fb1ebbba00a.yaml | 58 +++++++++++++++++++ ...rmit-724dab272a7285745cd4df281951dbc2.yaml | 58 +++++++++++++++++++ ...mate-8e499ffbdb5eeef7ac0a6adb29663778.yaml | 58 +++++++++++++++++++ ...-pro-bb71b39bbb362217aeb2969b4b128fd1.yaml | 58 +++++++++++++++++++ ...reka-18424f590c597310c8b3007cf66d4132.yaml | 58 +++++++++++++++++++ ...oles-bfec3335d0c8a649eb978fd7079c22ce.yaml | 58 +++++++++++++++++++ ...page-d8cfd8cbb536b77db396cb96c4ec7492.yaml | 58 +++++++++++++++++++ ...y-wp-bc9fd382ebb4fba0cb4c50924f838977.yaml | 58 +++++++++++++++++++ ...y-wp-f06e932f1a72c7fb21b21c76bafdfc46.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...y_wp-9d0b835dc24461b5e3c8d9cb0d3fe615.yaml | 58 +++++++++++++++++++ ...y_wp-a5da2259e66916eeb957e15e5b2a199e.yaml | 58 +++++++++++++++++++ ...y_wp-c109e83620923dabed3942bad0a8805b.yaml | 58 +++++++++++++++++++ ...y_wp-e1e09568d086f8fa80d5f87a6742ffc7.yaml | 58 +++++++++++++++++++ ...y_wp-f9354e3145332671221f1b57bb58f382.yaml | 58 +++++++++++++++++++ ...ress-a3e9ff26d980a2a3e39533f0b78e5d83.yaml | 58 +++++++++++++++++++ ...ight-bfb136ecd8a5fcaea8f121127bb1d532.yaml | 58 +++++++++++++++++++ ...ocus-4f5affe3e6d10944ac86113d1e4881da.yaml | 58 +++++++++++++++++++ ...ults-cccbeb1e67006355f6c0344c831a92e5.yaml | 58 +++++++++++++++++++ ...tion-a292899c8a2340a097d09b07ac49f9ad.yaml | 58 +++++++++++++++++++ ...ick5-8c87a28bec934dcd5364cbdca924c771.yaml | 58 +++++++++++++++++++ ...ager-99e03ce9a586679417b36a7850aaddc6.yaml | 58 +++++++++++++++++++ ...ager-c0963c297f9f408e178419f30ee7e022.yaml | 58 +++++++++++++++++++ ...mple-927e2c90815a01d50a3aecbb0efc5c7c.yaml | 58 +++++++++++++++++++ ...tags-f98ba84845d04638f96a14d587800f12.yaml | 58 +++++++++++++++++++ ...arch-dd02ae8823de431da5d5d52246acd7ff.yaml | 58 +++++++++++++++++++ ...arch-ec9f1feec044e5447ec3ac663c7a05af.yaml | 58 +++++++++++++++++++ ...mode-7378070b61d09db85a0d4e6a50aa47a8.yaml | 58 +++++++++++++++++++ ...mode-c0b53a118173c14a546665b5482b078d.yaml | 58 +++++++++++++++++++ ...oles-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oles-db1c5c8b7f25d9de3f31e4725ede7e61.yaml | 58 +++++++++++++++++++ ...prem-294b436d8db887cede47424adf8c58d6.yaml | 58 +++++++++++++++++++ ...ials-0edbba73cef4d5273525e9fdeb2bcb4c.yaml | 58 +++++++++++++++++++ ...ials-8de4556487daff9f80ef882a72ac48a1.yaml | 58 +++++++++++++++++++ ...-box-62f024d1a6544d8128f328de7ec4ed81.yaml | 58 +++++++++++++++++++ ...-box-ca4ae9210ad5c6416e62ede162724557.yaml | 58 +++++++++++++++++++ ...p-up-48cb81f29289d3dff74b9ff9eb6ca258.yaml | 58 +++++++++++++++++++ ...p-up-9fb8bc0ed140e27215d75f6096a9ee6f.yaml | 58 +++++++++++++++++++ ...erce-61ef4484d482c37a0de9af18fac5edf6.yaml | 58 +++++++++++++++++++ ...ypot-4c06879b605c0ddf9d3252fe12dff25c.yaml | 58 +++++++++++++++++++ ...ypot-84ddb55655b14833e201c7e5f21d2907.yaml | 58 +++++++++++++++++++ ...ment-2030c3497157a45619c53075fe4be64d.yaml | 58 +++++++++++++++++++ ...ment-a8665e653501dfd87d7b7e15f79ece36.yaml | 58 +++++++++++++++++++ ...tent-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ment-797d8c237b397ae53a63dd9186307bf3.yaml | 58 +++++++++++++++++++ ...ment-c7a804f58a12769a69ea7efb7fd135b4.yaml | 58 +++++++++++++++++++ ...ment-6c841a99daf37cae6f46cd0d753efccb.yaml | 58 +++++++++++++++++++ ...ocal-8450871a53e20b19adaa61e1434e59d8.yaml | 58 +++++++++++++++++++ ...ocal-fbc80c02043c699931d3e726696377ec.yaml | 58 +++++++++++++++++++ ...ocal-2442f509b4c40ac50640a6c02e5c1509.yaml | 58 +++++++++++++++++++ ...ocal-c613d8cee5f1f00301bb24d6fb1e61f7.yaml | 58 +++++++++++++++++++ ...ocal-ca17e2759a3859433a0fdcccce8347ca.yaml | 58 +++++++++++++++++++ ...ocal-e5f4d0fbf2cb3e2ba7d87aa6af9f1099.yaml | 58 +++++++++++++++++++ ...stel-16bd3db16d545cda6e318dd7aeadbea4.yaml | 58 +++++++++++++++++++ ...stel-2719d6731668b9065520117203a3303c.yaml | 58 +++++++++++++++++++ ...stel-50b601cc2c81a33254df5b8d86129b71.yaml | 58 +++++++++++++++++++ ...stel-da8a9590fd2919ac3b910c3614df54d5.yaml | 58 +++++++++++++++++++ ...nger-fda0de5b4c70706b1c7590b4b32d12b9.yaml | 58 +++++++++++++++++++ ...cher-9e20884f267dfae0b2011b836be1bba3.yaml | 58 +++++++++++++++++++ ...cher-c27aea985311d8d430509d848af8ed00.yaml | 58 +++++++++++++++++++ ...mage-ac9cb365e503376aa31ed761706bf88b.yaml | 58 +++++++++++++++++++ ...ting-5485a109494b4df54da4337a9efe8523.yaml | 58 +++++++++++++++++++ ...ting-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...tjar-28e170e893975e3ad314a1e6dd206e77.yaml | 58 +++++++++++++++++++ ...ator-106707c65ee1208d448d3a7f0350d84b.yaml | 58 +++++++++++++++++++ ...form-e36d961a443fc07bfdc5e0b939b3e6e6.yaml | 58 +++++++++++++++++++ ...-crm-a2b34dc7c637e9503c30ea45277c4ce7.yaml | 58 +++++++++++++++++++ ...ster-6dad969c863a9551ee44b8e68612f92c.yaml | 58 +++++++++++++++++++ ...ects-4e07fbfa9287b3d698591e747048b894.yaml | 58 +++++++++++++++++++ ...mage-4ebc9d9cf2e6c0b8863f7b05c2ec1bcd.yaml | 58 +++++++++++++++++++ ...tool-fd9a8180717056f9f1f968f01ca33f0b.yaml | 58 +++++++++++++++++++ ...xtra-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-4d7973cbf6013501ff12cd0e04512888.yaml | 58 +++++++++++++++++++ ...cgws-6293b091bc766206bb45c5e76ab63e4c.yaml | 58 +++++++++++++++++++ .../hrm-8ce46300a9ee0c671870e83a220afb03.yaml | 58 +++++++++++++++++++ .../hrm-a36379ec9941e1d3446832e6154938a3.yaml | 58 +++++++++++++++++++ ...lder-deac3fc8969cda605bbcdcb387cd2a13.yaml | 58 +++++++++++++++++++ ...form-3d1cc5475dc75a23246949ead1d96006.yaml | 58 +++++++++++++++++++ ...tics-164d8e023bea2a9cf66601d6c8d87f66.yaml | 58 +++++++++++++++++++ ...tics-aeabe255a52538c85557d43415e4e073.yaml | 58 +++++++++++++++++++ ...tics-b50572ce7e2b149d1cbd18124538a979.yaml | 58 +++++++++++++++++++ ...vent-eea40bebf411a89783a41e1a9b7baa9a.yaml | 58 +++++++++++++++++++ ...gram-874767d2bf3455f1a596a7c733629154.yaml | 58 +++++++++++++++++++ ...ntor-01300894d57947b3560cabf2dbbcd115.yaml | 58 +++++++++++++++++++ ...ntor-39662c17a130cae2e0ac4d8f08110d5e.yaml | 58 +++++++++++++++++++ ...ntor-4352573f5cddc391c5178beba8d7f9b0.yaml | 58 +++++++++++++++++++ ...ntor-54345d40684c0a52baa3c3ff4f72b60d.yaml | 58 +++++++++++++++++++ ...ntor-70fc895faebcf1fe7c1137deedd632a4.yaml | 58 +++++++++++++++++++ ...ntor-719fa4e7b6c83ab485c9d95f46e8edb7.yaml | 58 +++++++++++++++++++ ...ntor-7648aa79e50b7fbff0359c4b0f9eb60d.yaml | 58 +++++++++++++++++++ ...ntor-77f47958ca9f6f3aca917f2faa21c35a.yaml | 58 +++++++++++++++++++ ...ntor-7bd8b052dc6ab5494250ef14b3571b9d.yaml | 58 +++++++++++++++++++ ...ntor-885b11bd05584acc3850df4149714f79.yaml | 58 +++++++++++++++++++ ...ntor-8dd7019aa8a80d139d621978f8455f94.yaml | 58 +++++++++++++++++++ ...ntor-b8980aa84f8cc55308551be159a27546.yaml | 58 +++++++++++++++++++ ...ntor-c8bc0703f7a40b6110052093d1b42354.yaml | 58 +++++++++++++++++++ ...ntor-c9c8b6f666802b2f51aa7a2059e8cf31.yaml | 58 +++++++++++++++++++ ...ntor-cbef84b88c0a2eb6e68bde27c710114f.yaml | 58 +++++++++++++++++++ ...ntor-d1cffa60eaefa9d562794ce4c0d0f8a6.yaml | 58 +++++++++++++++++++ ...ntor-e3441a86dca8e1266b44f1ac2828bc65.yaml | 58 +++++++++++++++++++ ...lite-c4c123ba803ff56ca56f62a58df9c1fd.yaml | 58 +++++++++++++++++++ ...olio-209d06497ab8e08c218ee68cdbabb1d1.yaml | 58 +++++++++++++++++++ ...ntor-58c63b651eae675c8ca30a5097ca90d9.yaml | 58 +++++++++++++++++++ ...cess-9345a855b917e9d7c301701fd76aad46.yaml | 58 +++++++++++++++++++ ...cess-edec211af3b7dbc24681331832d822e4.yaml | 58 +++++++++++++++++++ ...rect-9d01cf11d54833d25428e1cf81d5a407.yaml | 58 +++++++++++++++++++ ...orms-418ebe6c7dbfef34adbdede493bce943.yaml | 58 +++++++++++++++++++ ...orms-8afa46038c928522e1a939b693fa3626.yaml | 58 +++++++++++++++++++ ...l2wp-0df1e064add078cf57c6048e0292bd1f.yaml | 58 +++++++++++++++++++ ...l2wp-d9d330e96ffdfe1887976502e50deb2f.yaml | 58 +++++++++++++++++++ ...l2wp-fcada36c51980400d6b77ffead4b0c1b.yaml | 58 +++++++++++++++++++ ...ayer-1ab07ec0caa3cd50e192c36d8dc28388.yaml | 58 +++++++++++++++++++ ...ayer-8c8ea74da9222b97df27e5eb58a8262e.yaml | 58 +++++++++++++++++++ ...ayer-9cd02c8d638c4cb01b2d319013b9422d.yaml | 58 +++++++++++++++++++ ...ayer-2ea89aa92910e09e4a0699a93e6b8771.yaml | 58 +++++++++++++++++++ ...ayer-c399c93eb04d9720bd4e74a57c352087.yaml | 58 +++++++++++++++++++ ...maps-891ca23ffb08d94e6434e60528a16c74.yaml | 58 +++++++++++++++++++ ...maps-bdf0d3aa1632ca3b2ca5352b8bea588e.yaml | 58 +++++++++++++++++++ ...list-bd39f2dcd48837d67c4b40b69f78df98.yaml | 58 +++++++++++++++++++ ...list-0df580dacb0df6a2ca5f274d2d7147c5.yaml | 58 +++++++++++++++++++ ...list-cfb5454ff2827b6f871f30ef976e36bf.yaml | 58 +++++++++++++++++++ ...-faq-fb9f6e5f6b739b217a3c9294b96be3ec.yaml | 58 +++++++++++++++++++ ...list-c00b8bf14565edfcbae67925492b03f1.yaml | 58 +++++++++++++++++++ ...ayer-a517ff8b627b981a1fe850768f04bf42.yaml | 58 +++++++++++++++++++ ...list-485789fe72c833fe22bf40305da52bb0.yaml | 58 +++++++++++++++++++ ...ayer-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...room-b0382531907f0ce8fd4932cc7bcd495c.yaml | 58 +++++++++++++++++++ ...ager-39aa42ce6a12361e040ad2f2d3e0128f.yaml | 58 +++++++++++++++++++ ...auth-e90b537c5f5b2550abd571e86aaca30a.yaml | 58 +++++++++++++++++++ ...ders-15a164b8d7acefaa3a7ae7d37647554e.yaml | 58 +++++++++++++++++++ ...ders-3400f4eb6ff8887592360d9448530f42.yaml | 58 +++++++++++++++++++ ...ders-51f2517f9bbfce600c2f0bf80668bc91.yaml | 58 +++++++++++++++++++ ...ders-5f2adc5ca6dedc40903aa1f1e563d920.yaml | 58 +++++++++++++++++++ ...over-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...over-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...over-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...word-2dea767209c9552dbe15347492d80abf.yaml | 58 +++++++++++++++++++ ...dons-9b8d61323342cf7cc549ce8c8f2716e5.yaml | 58 +++++++++++++++++++ ...ance-198731eb0d140b29cd1b351f123496f9.yaml | 58 +++++++++++++++++++ ...ance-7c3ea2239a49993a972e3badf432bcfc.yaml | 58 +++++++++++++++++++ ...ance-ec5f1fa417ea6d6d86b4d82ac0f5e65d.yaml | 58 +++++++++++++++++++ ...erce-4954ab56551b4ce703a0899a0107deda.yaml | 58 +++++++++++++++++++ ...nail-ac71e6911e612c743a4ffc18cd41b753.yaml | 58 +++++++++++++++++++ ...inks-e4943a062e718f1da762551fe8208620.yaml | 58 +++++++++++++++++++ ...imer-268b053a1bfe487ee9a98a976d059155.yaml | 58 +++++++++++++++++++ ...olio-e91e3f50be0e7f98b6ee2b7340fe8b63.yaml | 58 +++++++++++++++++++ ...oser-b0e3fd5d9174b5eba29a79c0cda84c9b.yaml | 58 +++++++++++++++++++ ...ents-f48003feae4cf574ad5a0e007703e663.yaml | 58 +++++++++++++++++++ ...ator-ab777568922b3dcb0b2e73d6e3091f21.yaml | 58 +++++++++++++++++++ ...ader-0d249401678b4100fbfb0e12a940b6ff.yaml | 58 +++++++++++++++++++ ...this-4b04846741419fafa968ec2cd45a21dd.yaml | 58 +++++++++++++++++++ ...this-91fc45f92059ad3dccdaddc100f38fa5.yaml | 58 +++++++++++++++++++ ...this-c8c3c4e396d486583b9e49a37e519b53.yaml | 58 +++++++++++++++++++ ...this-d7eef9375bde202187f7666f53aba99e.yaml | 58 +++++++++++++++++++ ...this-f577d412a90189953cb8af4c09d74c9d.yaml | 58 +++++++++++++++++++ ...cons-5c4c3c093dd69f631ab63d22386e6148.yaml | 58 +++++++++++++++++++ ...ppro-2f8ca7fb94c2fd4e610b875c561d523b.yaml | 58 +++++++++++++++++++ ...dons-a99a6931f92bd0d642c13328925d2e73.yaml | 58 +++++++++++++++++++ ...itor-747cb2b72097d91ef1564458b7d2e373.yaml | 58 +++++++++++++++++++ ...itor-912a26e9536c81b126d2560cabd51139.yaml | 58 +++++++++++++++++++ ...itor-fdc54b4c35b7d9b62d80ce198388bdcb.yaml | 58 +++++++++++++++++++ ...rier-9fca0dd0c7f34e6a746c8a219eb28b95.yaml | 58 +++++++++++++++++++ ...gram-1189677e87fccd5ba86b3b7c8e3828fd.yaml | 58 +++++++++++++++++++ ...gram-173c2f3da25ffb641f6c881b0ecd192a.yaml | 58 +++++++++++++++++++ ...gram-1b90a29b0e05edb9e0100d5bac6dd543.yaml | 58 +++++++++++++++++++ ...gram-5c5cac9fef446ce5aab816bcf883d040.yaml | 58 +++++++++++++++++++ ...gram-889f2c95b741c5e0897bda79fd4658fe.yaml | 58 +++++++++++++++++++ ...gram-88a06d86ce607df4ff6b1b9039ea93cb.yaml | 58 +++++++++++++++++++ ...gram-952c35deeae371ba14bf32adbe040582.yaml | 58 +++++++++++++++++++ ...gram-c7d2eaa1bef247cc946f12a77351dbbb.yaml | 58 +++++++++++++++++++ ...gram-de418588fa621f09a7aaad7d1520c591.yaml | 58 +++++++++++++++++++ ...gram-fad6995dafdb43e5ee26d12d1d4dc9b6.yaml | 58 +++++++++++++++++++ ...aker-00aaf3a917048a24cf4188f68658ad92.yaml | 58 +++++++++++++++++++ ...icon-1b71c9c29fdfc5dbc008529fa648dbe1.yaml | 58 +++++++++++++++++++ ...icon-d0db52345c07a6211225ddd6537e55c1.yaml | 58 +++++++++++++++++++ ...dget-3d89fb86525a43be8c098b0f455b9af2.yaml | 58 +++++++++++++++++++ ...dget-8616181357e5ec901fe630838e957487.yaml | 58 +++++++++++++++++++ ...umbs-de57654257372bbed35371bcf945ac46.yaml | 58 +++++++++++++++++++ ...ader-8140a3945a877628cd9d34a767c59437.yaml | 58 +++++++++++++++++++ ...ader-cecbfeb5d8e878e2a09fb45c42f38adc.yaml | 58 +++++++++++++++++++ ...ader-d61c42f727c04f01365911b7fc14a3d5.yaml | 58 +++++++++++++++++++ ...ures-df867e267884badbbf8457b1d7257d5d.yaml | 58 +++++++++++++++++++ ...dget-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...ndar-13f1e3e1ecb400323f6ac6db56c9c266.yaml | 58 +++++++++++++++++++ ...ndar-145fd589f9d6e521c8599d0e3d4550d9.yaml | 58 +++++++++++++++++++ ...izer-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...bbee-6f26e9f01d61af85a0a5abec46c6e923.yaml | 58 +++++++++++++++++++ ...-map-9f41ca20cf9aa5ad6ef84f69ddb6f680.yaml | 58 +++++++++++++++++++ ...push-147226d7fc59bc73ef79b60eb67e7365.yaml | 58 +++++++++++++++++++ ...push-99da104892c6f75f32c9288294b2b02d.yaml | 58 +++++++++++++++++++ ...rm-7-950481457b7608baa20b9048bd054085.yaml | 58 +++++++++++++++++++ ...inum-74e3a5823f9cf5e58e6b984ee0054047.yaml | 58 +++++++++++++++++++ ...inum-99bc9f10b2d01aa27904e65b8ec6ed4c.yaml | 58 +++++++++++++++++++ ...inum-ce70b843af38d7c69c95be8ff1b26205.yaml | 58 +++++++++++++++++++ ...menu-cd6ae30437be0309f27d9b8ec11e2caa.yaml | 58 +++++++++++++++++++ ...f-so-a5beaca14051398b5a8cac72b33e8606.yaml | 58 +++++++++++++++++++ ...ider-4857da40460f492fd61121c6a3d9ad96.yaml | 58 +++++++++++++++++++ ...chat-8961ac80ff2f49ea02524bf55be03a91.yaml | 58 +++++++++++++++++++ ...chat-a5c9dfe234305fe9b3c82a7200b4785c.yaml | 58 +++++++++++++++++++ ...ders-7c92e9b689e3db3a0760660dea080463.yaml | 58 +++++++++++++++++++ ...rame-4e5782f54b030eb5a442bdadb5799911.yaml | 58 +++++++++++++++++++ ...rame-731244d7e48d469d8250ca7d6169422e.yaml | 58 +++++++++++++++++++ ...rame-87f3d8d7d2e5d0851519c88fc9a636a9.yaml | 58 +++++++++++++++++++ ...ages-51641e54d4899750cfc0bbb22e59a17f.yaml | 58 +++++++++++++++++++ ...rame-c1259d5d6340f1a9bb2b4b54cbfddf23.yaml | 58 +++++++++++++++++++ ...rame-f282e15c376140f7b66d206f8f96f3e6.yaml | 58 +++++++++++++++++++ ...orms-0e32b41ab13a7d99daea1bd1091ef1a3.yaml | 58 +++++++++++++++++++ ...opup-bd8810c05731a418d8d9a50b27d4228d.yaml | 58 +++++++++++++++++++ ...code-ff7d4698a1b99dc4dd381f78e045f0a7.yaml | 58 +++++++++++++++++++ ...teup-063e847b7379d721b0dcf7f56e94adc2.yaml | 58 +++++++++++++++++++ ...teup-2d2ac3176c43972722599e2c20bf65f9.yaml | 58 +++++++++++++++++++ ...teup-97d25b3e88007081f13d8a53fc8698cf.yaml | 58 +++++++++++++++++++ ...teup-afb7fcca9f98de3c120709c28d44be7f.yaml | 58 +++++++++++++++++++ ...teup-edf371c1f05d5a891d28a3a64c575117.yaml | 58 +++++++++++++++++++ ...deck-bd77f9a34ba05ef2dc0030989da5aee1.yaml | 58 +++++++++++++++++++ ...menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sweb-71669f91f6c03ce43a9b92fdae9360cb.yaml | 58 +++++++++++++++++++ ...ools-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ools-babf60986b5038101853937d0a274e12.yaml | 58 +++++++++++++++++++ ...live-f0b6f9044194846e4b5fe3270faf4ce0.yaml | 58 +++++++++++++++++++ ...eimg-aa275ed39ac05dab3dd3b7cb9e8afc6d.yaml | 58 +++++++++++++++++++ ...dget-2f83ea3f51d28fac6369a0c731ce68eb.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...port-f6b963f6eaf79a560e9301150e1dd55c.yaml | 58 +++++++++++++++++++ ...show-1ec9332e58fa89c17bc632e5c37f8d95.yaml | 58 +++++++++++++++++++ ...show-34b604e60259ea80e8e107b60855d439.yaml | 58 +++++++++++++++++++ ...show-3f3452426888f89fbe519623725273af.yaml | 58 +++++++++++++++++++ ...show-d9744d373611452d7acba4bbb5d5e69e.yaml | 58 +++++++++++++++++++ ...show-f04fb223e6bc1b82dc5e818d9e40fb20.yaml | 58 +++++++++++++++++++ ...show-09c9edd801d535f8b0dc361310e2bb14.yaml | 58 +++++++++++++++++++ ...show-21bae7dd0ccc10547daf0010edb807de.yaml | 58 +++++++++++++++++++ ...ntor-026772a7c84514935eb2f122e1212bd7.yaml | 58 +++++++++++++++++++ ...ntor-23084d0a675ec1fe2de5f06c696330cf.yaml | 58 +++++++++++++++++++ ...ntor-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml | 58 +++++++++++++++++++ ...css3-af386a5b7a4c4897059c13e07ba6a1c2.yaml | 58 +++++++++++++++++++ ...ects-ec47480114d271de7f87aec48e42bcd6.yaml | 58 +++++++++++++++++++ ...ects-f33065d14f70bf7433189e427d984bdc.yaml | 58 +++++++++++++++++++ ...mate-0291dfad8381b24ca3c37e22a37879df.yaml | 58 +++++++++++++++++++ ...mate-2996acb98eba30cde2adfc4ff1d39a59.yaml | 58 +++++++++++++++++++ ...mate-617785fa7c971048a906a08d626203c0.yaml | 58 +++++++++++++++++++ ...mate-8967ba956e5665f951b5fe05d1b8630c.yaml | 58 +++++++++++++++++++ ...mate-cb1c5b7fa2f66db14c90c48d844c8b70.yaml | 58 +++++++++++++++++++ ...mate-d213e2e9594308f580bdffdb06a3d065.yaml | 58 +++++++++++++++++++ ...mate-eef599f42089077d3f1367aba810ab3a.yaml | 58 +++++++++++++++++++ ...mate-f12c6444f5c306cf6d2f74b5d9b1f8a0.yaml | 58 +++++++++++++++++++ ...oser-5dac27116865bf3a33881aeb2e87a891.yaml | 58 +++++++++++++++++++ ...sion-6e8db758b1055e1e1edd16d20fa3c329.yaml | 58 +++++++++++++++++++ ...usel-2cb86c3f071de1232b4e814ea1574dc8.yaml | 58 +++++++++++++++++++ ...ense-772b71a2d81ce555d5c9a0a38892bb34.yaml | 58 +++++++++++++++++++ ...-pro-3dfe4a41b3f6685dbbc11ea86f232a73.yaml | 58 +++++++++++++++++++ ...-pro-bf2853efc06d31fecebbff0926f79cc8.yaml | 58 +++++++++++++++++++ ...lite-8ab353496a7495d9f3fe5d5531e368eb.yaml | 58 +++++++++++++++++++ ...lite-b94ff74e27b8bd0a63b0e4542b5543c1.yaml | 58 +++++++++++++++++++ ...cher-8c4def1f9e55d275755365eabd5c5c64.yaml | 58 +++++++++++++++++++ ...r-wd-0bbe2e9ad1b1c0a623ea6abfedb5595e.yaml | 58 +++++++++++++++++++ ...r-wd-49d7a3ff674ce6988ed92cbb4810948c.yaml | 58 +++++++++++++++++++ ...r-wd-5ec0f151883e50cc1d6e5241267d511f.yaml | 58 +++++++++++++++++++ ...r-wd-d21df22e38f007a905fafc644bb07ec2.yaml | 58 +++++++++++++++++++ ...sion-fddf50b89fd6e037cc6266b73dceb03a.yaml | 58 +++++++++++++++++++ ...ctor-9fd302216733e7b16fde39fa0da8b2af.yaml | 58 +++++++++++++++++++ ...crop-165f51757c849b44f8513611b7cd23ef.yaml | 58 +++++++++++++++++++ ...crop-20671ddf0d01a43586266ad4cb142fcf.yaml | 58 +++++++++++++++++++ ...crop-2ad93b712d25e80c970a93c8b1dd3cdf.yaml | 58 +++++++++++++++++++ ...crop-ad4cd5dc655c951abc6de30e0bcc2c3b.yaml | 58 +++++++++++++++++++ ...dget-45074c545eb15cccfd07e5326ca12779.yaml | 58 +++++++++++++++++++ ...dget-80d3ea73a73811fa5685b240e4282b5f.yaml | 58 +++++++++++++++++++ ...dget-a2adf408417d5a51a0a77f3bcfcdd29f.yaml | 58 +++++++++++++++++++ ...dget-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...dget-bd950fa0617ccb3a0edff5978b31a09b.yaml | 58 +++++++++++++++++++ ...dget-d5648214fbd82ebd55682a43fc8f813e.yaml | 58 +++++++++++++++++++ ...-isc-1928848d7760fbdf37a1f5a91bc90146.yaml | 58 +++++++++++++++++++ ...-isc-e8d6fd07d9a88fdd12cf1b98b1c2fb85.yaml | 58 +++++++++++++++++++ ...ager-83aa8e470a136322f24cc4f5d88ccbdd.yaml | 58 +++++++++++++++++++ ...ress-333e897c2dbf06223644ccfe5dd16694.yaml | 58 +++++++++++++++++++ ...show-7348256da9fa27f63ea541c99917352a.yaml | 58 +++++++++++++++++++ ...show-f917f02f001372c0ed6a2cbacd402eae.yaml | 58 +++++++++++++++++++ ...mark-cc02f6870e1e296858d0d36136b32112.yaml | 58 +++++++++++++++++++ ...zoom-285b140dd354e7b55f93f22538da9394.yaml | 58 +++++++++++++++++++ ...zoom-5721436cde7e78cb58601bb592cde002.yaml | 58 +++++++++++++++++++ ...boss-680976f321c5a9425e00ce5d5ee1cc42.yaml | 58 +++++++++++++++++++ ...lite-8578e85d2088d742e36b835c4afa7ca7.yaml | 58 +++++++++++++++++++ ...lite-d16be1a4a8c6ae781f11c50d01685d10.yaml | 58 +++++++++++++++++++ ...lite-e18789f54f5a5fe13b8ddacd79d408fc.yaml | 58 +++++++++++++++++++ ...gine-ca0bad06790922b16f5da17ee6db4bb8.yaml | 58 +++++++++++++++++++ ...gine-ed507e8efb229061c654187b47c114b4.yaml | 58 +++++++++++++++++++ ...pper-575c49a9b04a14a2dd633583f5e6e2d9.yaml | 58 +++++++++++++++++++ ...pper-6bb3656a861d0a80040f9af45e87952f.yaml | 58 +++++++++++++++++++ ...pper-a73f55993da6bf41bdb201284b107f4f.yaml | 58 +++++++++++++++++++ ...pper-bceb80496300028196724d32dbd5c249.yaml | 58 +++++++++++++++++++ ...ents-7e5494a96dcef18320683cf7875e7118.yaml | 58 +++++++++++++++++++ ...sion-0d90a3576c3d60d102b21bdca9c7c04e.yaml | 58 +++++++++++++++++++ ...sion-0f06a0233bd37a56c0b489be748f0408.yaml | 58 +++++++++++++++++++ ...sion-326d3f5baee82478e64ca11a4a66dbf4.yaml | 58 +++++++++++++++++++ ...sion-3949ffb8c4e3dc9661a06b8913f55d38.yaml | 58 +++++++++++++++++++ ...sion-433406de2bcd419520bb9dde58f80311.yaml | 58 +++++++++++++++++++ ...sion-4b301fc4cf7dbfb7aaec9b6db232442c.yaml | 58 +++++++++++++++++++ ...sion-4d89ea84ae0150939c78e1551488e87a.yaml | 58 +++++++++++++++++++ ...sion-4f4ea79c6be4308e1d54d5b19b226c52.yaml | 58 +++++++++++++++++++ ...sion-5712ab48057831452538f91f04d0bcb6.yaml | 58 +++++++++++++++++++ ...sion-57c14e4f565c7eb453e5b4a3b6f91099.yaml | 58 +++++++++++++++++++ ...sion-76976bd8ff1b9e40c5faf1dc6a34729f.yaml | 58 +++++++++++++++++++ ...sion-b842b7a1d1bc34dc06d2b83ecd274275.yaml | 58 +++++++++++++++++++ ...load-8646bfab3489f82817e5dfdc71de0090.yaml | 58 +++++++++++++++++++ ...show-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...-cf7-67cbbeb086472c18cc998dc3852acd0d.yaml | 58 +++++++++++++++++++ ...webp-a060d1379e872ddbb3c1744a92296936.yaml | 58 +++++++++++++++++++ ...webp-fe4c9ec6c5f12eda6f85dea0f4ee153f.yaml | 58 +++++++++++++++++++ ...eseo-113db7aead34e6d2e16bace92792af9b.yaml | 58 +++++++++++++++++++ ...-box-d08f135748c79437965679674f4da9c2.yaml | 58 +++++++++++++++++++ ...dget-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml | 58 +++++++++++++++++++ ...r360-0cbcc4f1288df0ee24dd7a2993f69c51.yaml | 58 +++++++++++++++++++ ...r360-4e3f3475e7c6375ac0400d146d374b8e.yaml | 58 +++++++++++++++++++ ...r360-55d8a21450cbea874f3ebd26e7f32a58.yaml | 58 +++++++++++++++++++ ...r360-897a0fa8ed3a14f37db420497ce08cb5.yaml | 58 +++++++++++++++++++ ...r360-c40ba36e2109a35c573b2639a4d72291.yaml | 58 +++++++++++++++++++ ...ress-f50fe166ad655bc28860751aec7160b0.yaml | 58 +++++++++++++++++++ ...iles-8a6b4336bdabbe2b23943219bba651ed.yaml | 58 +++++++++++++++++++ ...ages-3a14f8327aeabf7bf95eb7d9e4c0bcff.yaml | 58 +++++++++++++++++++ ...edia-65f707df02fc4e71880af94936e28fe7.yaml | 58 +++++++++++++++++++ ...erce-829eb8aa5088a8dfbd751ae2143f350b.yaml | 58 +++++++++++++++++++ ...tics-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...xcel-a4a103535f33f8f1f9687c4a0228f8b0.yaml | 58 +++++++++++++++++++ ...-csv-da2b51f042521776402cd06473b8ac45.yaml | 58 +++++++++++++++++++ ...meta-0c813c83aee456b071e95980f729e012.yaml | 58 +++++++++++++++++++ ...meta-107acb013e3444f157b376a5b20dd408.yaml | 58 +++++++++++++++++++ ...meta-176aadf8b8de4d702eafe02975bc433d.yaml | 58 +++++++++++++++++++ ...meta-1edc06e4c422303e708e12aebbe44cde.yaml | 58 +++++++++++++++++++ ...meta-342fee676d86d87109d08378d8dcd0b0.yaml | 58 +++++++++++++++++++ ...meta-5bda221acefc04e8d84a3c6e2be5c30e.yaml | 58 +++++++++++++++++++ ...meta-67ac2a423d1da6f86cbac7c3e9485c2b.yaml | 58 +++++++++++++++++++ ...meta-7ae4217671bcb5c8f6efe46ca1b8db85.yaml | 58 +++++++++++++++++++ ...meta-7e3d963887f74672e4d9f1a2c2d7ff76.yaml | 58 +++++++++++++++++++ ...meta-916825c2b82546703e1e58fc1213738b.yaml | 58 +++++++++++++++++++ ...meta-99e4e1e27563f717d9f8c278b33423ac.yaml | 58 +++++++++++++++++++ ...meta-aa502aa68695bf7b6ea2b96ba403c6a2.yaml | 58 +++++++++++++++++++ ...meta-af8e3b1753f58bd7e46c4cccec8f000f.yaml | 58 +++++++++++++++++++ ...meta-b7e40dcc40f790ccf1ceff5a8722305f.yaml | 58 +++++++++++++++++++ ...meta-bd9f222927714cfcc0530ce81d7d73ca.yaml | 58 +++++++++++++++++++ ...erce-3077bab58115e8abb5971ae28048d12c.yaml | 58 +++++++++++++++++++ ...feed-467a5580ac1383352cd27bfadc2d264b.yaml | 58 +++++++++++++++++++ ...feed-907bd7e9131bb850756aeaa09ab79dfd.yaml | 58 +++++++++++++++++++ ...feed-9ab53108097247c27c02dfd755c3ffcf.yaml | 58 +++++++++++++++++++ ...feed-fe6825f2b761786a96cd0f4fa3afa83c.yaml | 58 +++++++++++++++++++ ...tify-949bd129fe1adc15bb7653ff308658f2.yaml | 58 +++++++++++++++++++ ...reza-a94493070aaa329d2ae39d70dc712c09.yaml | 58 +++++++++++++++++++ ...page-300fd59e3797ac35e26fb3e33490ca99.yaml | 58 +++++++++++++++++++ ...dges-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...kend-aa15ef609effcca1e90c81c1a7f1d631.yaml | 58 +++++++++++++++++++ ...utes-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...gout-54ce6a774cfd5321930ee4e4fafbd369.yaml | 58 +++++++++++++++++++ ...gout-a7d769783ca2c437e9a1a4760da51769.yaml | 58 +++++++++++++++++++ ...eter-4b89abc62fd406d908566683e2dcbf5a.yaml | 58 +++++++++++++++++++ ...ment-824d93c3c9858047a50ed1387d69356d.yaml | 58 +++++++++++++++++++ ...brew-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...brew-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ting-7f3a88f3098dde9f2189ea7a2544c698.yaml | 58 +++++++++++++++++++ ...e-me-7df4ba3c146c5caf3d402ff70333f208.yaml | 58 +++++++++++++++++++ ...inks-1c5999a1196a6e32d7eacb9ae11f1a81.yaml | 58 +++++++++++++++++++ ...-pro-ab0d13d34dc4621d3f125a7e5e405bf1.yaml | 58 +++++++++++++++++++ ...rter-738cbcde2d8ae9b069d1cee10adc6b90.yaml | 58 +++++++++++++++++++ ...-pro-0122e284ef694546ea4cfa00ca4bb4ad.yaml | 58 +++++++++++++++++++ ...-pro-488696d83423a80a7653f70083bb7091.yaml | 58 +++++++++++++++++++ ...-pro-c78abe8c9dafca582dd0f5c66a5e2eb9.yaml | 58 +++++++++++++++++++ ...-pro-d5e71f9286573633246d95fe18c6dc87.yaml | 58 +++++++++++++++++++ ...-pro-e4eee191046305a40d967ee1ba037cbb.yaml | 58 +++++++++++++++++++ ...-pro-f7a99c10e9aa1ac19e91036f274d28b1.yaml | 58 +++++++++++++++++++ ...isto-12f4cc2153036a3efd08424c8d4576c6.yaml | 58 +++++++++++++++++++ ...nial-2804f23c4b5e807222522bde6eeefb47.yaml | 58 +++++++++++++++++++ ...nial-8a1017de3d1fd72aa86eae06b4f6a456.yaml | 58 +++++++++++++++++++ ...nial-bc1fc73bd669dca4197ffa756353cd75.yaml | 58 +++++++++++++++++++ ...inds-76874a7b4a83992edc7c544ab3ce90f7.yaml | 58 +++++++++++++++++++ ...ions-2c744f500a4cb530f5a915c698c40d99.yaml | 58 +++++++++++++++++++ ...gram-b0923245191ee8b19827587a90615915.yaml | 58 +++++++++++++++++++ ...list-1de8ccd3e6be5fc258bf58b1985495c8.yaml | 58 +++++++++++++++++++ ...list-d3e0f1a758bd59446de5b7d7cf2ab987.yaml | 58 +++++++++++++++++++ ...reel-2e8c881d695b74f611068f96c80b3487.yaml | 58 +++++++++++++++++++ ...soft-731c10dcd4a65ca76382b001a77071bb.yaml | 58 +++++++++++++++++++ ...soft-8a7ecb10c894553e29bd44217c769b5a.yaml | 58 +++++++++++++++++++ ...soft-eb2bb0feddcf3b5f17093cd80034744c.yaml | 58 +++++++++++++++++++ ...ages-31325fd9d39a9b170e5825b91f943680.yaml | 58 +++++++++++++++++++ ...orms-3c962311490d35eba5d44b2a55482b65.yaml | 58 +++++++++++++++++++ ...orms-fa11673c89d7f49c85f8e69d02b295a6.yaml | 58 +++++++++++++++++++ ...uard-3234f0a051e8628ee55bf3e418168da0.yaml | 58 +++++++++++++++++++ ...uard-a1f2a5e3cbcfc5d5c7da00302ff2ad5b.yaml | 58 +++++++++++++++++++ ...uard-ca5a202b7756a1fb685216ed26367b36.yaml | 58 +++++++++++++++++++ ...uard-f1d5eaff1a5d538327565db0438aa59a.yaml | 58 +++++++++++++++++++ ...ewer-1f04a4a11c02a582deff94a7681096d8.yaml | 58 +++++++++++++++++++ ...ewer-9f8810cd387382963f3ea98eed877722.yaml | 58 +++++++++++++++++++ ...arer-44d79c88f80918a39ad3735f87916ce8.yaml | 58 +++++++++++++++++++ ...inks-94786cf22c04d1dd0ce4fe28ab98e98a.yaml | 58 +++++++++++++++++++ ...ager-e14959fa43bbd40e929542fe49cd89d7.yaml | 58 +++++++++++++++++++ ...ager-e6fb630fd086e11cb5135f0bd10ba86b.yaml | 58 +++++++++++++++++++ ...lery-0001e462386fce9c0f630ec016ad34e2.yaml | 58 +++++++++++++++++++ ...lery-ad4acbb771f45212d6935861fe1f4c55.yaml | 58 +++++++++++++++++++ ...lery-b3a55c8660f19eddef4075e293b358ed.yaml | 58 +++++++++++++++++++ ...lery-ec29185ed2f65e10921961a5788cf99a.yaml | 58 +++++++++++++++++++ ...ning-bc55ea7b509124d1a77831d4400c5030.yaml | 58 +++++++++++++++++++ ...time-027f8eecce0a5762cf1bc3cc2ca92e8d.yaml | 58 +++++++++++++++++++ ...ters-759e637db585d6ba715dddf7878712c3.yaml | 58 +++++++++++++++++++ ...ters-88444b55ba593f6267560d3998cc950b.yaml | 58 +++++++++++++++++++ ...ters-b12b3184228f1ba6313c71b9719c05ba.yaml | 58 +++++++++++++++++++ ...ppet-605d1764c74abe695c069cdc63cb4675.yaml | 58 +++++++++++++++++++ ...ress-243ee6cead272cdb6dc2ad831bc4986e.yaml | 58 +++++++++++++++++++ ...ress-867b85000a9162268b1ddc0673082505.yaml | 58 +++++++++++++++++++ ...ress-a841f648b0bdbeeaa745d6da10e2cfec.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ages-20a34e507c4fa6283c8c06e9c7d18117.yaml | 58 +++++++++++++++++++ ...ages-474fa03f5b39570acd09bb99c310528b.yaml | 58 +++++++++++++++++++ ...ages-888c0d96bb5c45a5559094f92be9b42d.yaml | 58 +++++++++++++++++++ ...ages-91f8f23098584a64320691c5f2d0c50b.yaml | 58 +++++++++++++++++++ ...-php-57aad3805a9f2a510911c9b341933d75.yaml | 58 +++++++++++++++++++ ...-php-57e5d2556ce7902a3bd2de5a68a6b052.yaml | 58 +++++++++++++++++++ ...-php-8874a81b9a5f337f94a87e2812a49701.yaml | 58 +++++++++++++++++++ ...-php-c3c6968289de386f0f53996017935a1d.yaml | 58 +++++++++++++++++++ ...ppet-2f6907ee5c2cac6fd791f40374c04e13.yaml | 58 +++++++++++++++++++ ...-php-d815b281c1937dc0ed5e942ec305999d.yaml | 58 +++++++++++++++++++ ...ters-1951707b594e6f4a4e8e4243b43c9841.yaml | 58 +++++++++++++++++++ ...ters-54bc1daf26907dc59a5c7876a142ff1b.yaml | 58 +++++++++++++++++++ ...ters-73081b1f6f4e13a9e6e969eba5e746fc.yaml | 58 +++++++++++++++++++ ...ters-76a587735289e9eac6af28d246d8763a.yaml | 58 +++++++++++++++++++ ...ters-8de18da384e81ad90d91fef5286d3d00.yaml | 58 +++++++++++++++++++ ...ters-bd26ccd939104e13f73f569b312459d6.yaml | 58 +++++++++++++++++++ ...ters-dddfaf0e8fc5a7c4646ae5e0730589aa.yaml | 58 +++++++++++++++++++ ...ters-fbefbdad33b922acaee6e93ce44b4409.yaml | 58 +++++++++++++++++++ ...ters-fd9bc570df9e6e1f10861293d27d4049.yaml | 58 +++++++++++++++++++ ...core-f70ed327fff0a742246ce2b66447d100.yaml | 58 +++++++++++++++++++ ...ator-2a97538728d15bbfb55e66c4649885a4.yaml | 58 +++++++++++++++++++ ...lery-a977aa9a4c9e6ea956efab1274f3c128.yaml | 58 +++++++++++++++++++ ...feed-0dd37aac0a819da40009a99efded6eee.yaml | 58 +++++++++++++++++++ ...feed-3b223b70daf0d7ac552ca602835403d8.yaml | 58 +++++++++++++++++++ ...feed-92423e2553300e9755a17988ed907ec5.yaml | 58 +++++++++++++++++++ ...feed-ac43cf44566479227a4aa05f1f51c953.yaml | 58 +++++++++++++++++++ ...ress-b915266e3686714da03f11dc90c6893b.yaml | 58 +++++++++++++++++++ ...dget-10d8aab37d3fb12eedaaa7fee9be8657.yaml | 58 +++++++++++++++++++ ...dget-645aa6781f30864a3df503fc267b46f0.yaml | 58 +++++++++++++++++++ ...dget-965089db43408987ba593ca76bdc2587.yaml | 58 +++++++++++++++++++ ...dget-c1eea16a6a1e7ef59fb346fe87d0a93d.yaml | 58 +++++++++++++++++++ ...dget-c4bb8ef855ed7d5677231037db6f41b0.yaml | 58 +++++++++++++++++++ ...dget-d922f6e78e39c496155eaa17b9a13762.yaml | 58 +++++++++++++++++++ ...dget-da62044dc6f8ab5a6043df4bc628475e.yaml | 58 +++++++++++++++++++ ...zoom-76fc4346fbb39fa45316aca65b7d5177.yaml | 58 +++++++++++++++++++ ...ress-87fe64aef58d57af2256ba27b8518630.yaml | 58 +++++++++++++++++++ ...nker-73153b823b9be5fe13ce41cd22919fc2.yaml | 58 +++++++++++++++++++ ...-css-0dab0a18a0d2f3a2ca1ecadfb8dd6931.yaml | 58 +++++++++++++++++++ ...-css-417113d5b23fd45edbcf8209f3cff8e9.yaml | 58 +++++++++++++++++++ ...ages-4c925e8fe2ce8185ac5a57769f1ea714.yaml | 58 +++++++++++++++++++ ...ages-c57f6caa20d50f7b5d4102cef52235b3.yaml | 58 +++++++++++++++++++ ...ages-f64da1b37b4c50e68b9872eff4ca509b.yaml | 58 +++++++++++++++++++ ...ntio-09460681bc2a62e560d71252df4526a5.yaml | 58 +++++++++++++++++++ ...eeze-be25df600efc2e679e203dcc1fd3ddd8.yaml | 58 +++++++++++++++++++ ...nect-01cdcfbe9023d856c9c893d0a0c324ac.yaml | 58 +++++++++++++++++++ ...nect-124137503555ee97714094a30a8333d0.yaml | 58 +++++++++++++++++++ ...nect-18e3fa8b070375c158cc068ed4175205.yaml | 58 +++++++++++++++++++ ...nect-26e6b2b2c87cae333c1a6a8f12b3eb26.yaml | 58 +++++++++++++++++++ ...nect-54fd19cb983e5e5bd13d627c9c0487ab.yaml | 58 +++++++++++++++++++ ...nect-6e954d80cfdd10ddfc11dcc5cbf99755.yaml | 58 +++++++++++++++++++ ...nect-bb8913e248b8c353b00d004e9ca5f930.yaml | 58 +++++++++++++++++++ ...nect-c2f1285e4dfc6b400991c24ccadd137a.yaml | 58 +++++++++++++++++++ ...tory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...tion-29636b68c2f3ab161e7a045474b91034.yaml | 58 +++++++++++++++++++ ...tion-54337cab42839ec3b613ba98b54eca17.yaml | 58 +++++++++++++++++++ ...-woo-e39068416a4f471cfb854a8f2dd045d3.yaml | 58 +++++++++++++++++++ ...rive-2143d39c6a447e17fa955c9d29e9190e.yaml | 58 +++++++++++++++++++ ...rive-38e83b9a6a4293b21b59d418e1822477.yaml | 58 +++++++++++++++++++ ...rive-adb3487b4c23d4db1d3efcc4576dd222.yaml | 58 +++++++++++++++++++ ...rive-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rive-c380050a7e76482fb19d38cf49fcde28.yaml | 58 +++++++++++++++++++ ...rive-cf6efc26f721b1dd6c09ef244ad0a9a5.yaml | 58 +++++++++++++++++++ ...rive-d69e956d6cb0947d53013e6316065cae.yaml | 58 +++++++++++++++++++ ...rive-ff1168e2daec3177aba99d51eda07164.yaml | 58 +++++++++++++++++++ ...mics-0bafef3453580e19c740978e87d842b6.yaml | 58 +++++++++++++++++++ ...mics-0cdb0f49e1ffa1eb7fca32892dfdaa0f.yaml | 58 +++++++++++++++++++ ...mics-690b7012c329e2797db5ca1ec55c54f1.yaml | 58 +++++++++++++++++++ ...mics-9d49312a2bc1a33dff873907673334c5.yaml | 58 +++++++++++++++++++ ...orms-ed2236ee570598966dd60e4e75f31def.yaml | 58 +++++++++++++++++++ ...rive-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...rive-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...orms-ed2236ee570598966dd60e4e75f31def.yaml | 58 +++++++++++++++++++ ...erce-f7bbd778de1c9c53d31f5ab55d2c4192.yaml | 58 +++++++++++++++++++ ...rm-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ctor-4f39f823882301049a61a7a769c354a9.yaml | 58 +++++++++++++++++++ ...ctor-62a6954a02895633b5b6c39ba9526043.yaml | 58 +++++++++++++++++++ ...osts-8c51431cbfaf267d31cca7fde89367e4.yaml | 58 +++++++++++++++++++ ...osts-b1a9125711cb68f9ebd1c9d6ec3312c5.yaml | 58 +++++++++++++++++++ ...osts-b76f091c58ac292a18fb46e2a8af44ec.yaml | 58 +++++++++++++++++++ ...osts-defb0310eaae752bbe598525a0823968.yaml | 58 +++++++++++++++++++ ...-bar-43e66df1f9172a258f7b4833c10ba64c.yaml | 58 +++++++++++++++++++ ...-bar-a6bda315d152fc26cd48ceee633dd87d.yaml | 58 +++++++++++++++++++ ...mbed-8e5650d777bfcceefcb0d09b97742288.yaml | 58 +++++++++++++++++++ ...gine-62c7b160f34bc3f3dc184557c1c06a9e.yaml | 58 +++++++++++++++++++ ...gine-6daeff7e508f05aeef343934c15a7178.yaml | 58 +++++++++++++++++++ ...gine-d37560ff6c6a3603574d27509821e565.yaml | 58 +++++++++++++++++++ ...gine-d875c7330364cd8c2a286deccf313956.yaml | 58 +++++++++++++++++++ ...gine-f9ee3cd75d7f36da24c7816038266548.yaml | 58 +++++++++++++++++++ ...maps-18a9792159e3a4315eefb0545c165734.yaml | 58 +++++++++++++++++++ ...maps-6b38cc619c1f1d13c6fce974aa8b5a90.yaml | 58 +++++++++++++++++++ ...maps-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lder-d58b2eb7209b77e10a0a7be6a3ad7570.yaml | 58 +++++++++++++++++++ ...body-162fd1b80a689c044d519624e2cd6bbb.yaml | 58 +++++++++++++++++++ ...body-205de06070622aab10eb1bdf566b37c2.yaml | 58 +++++++++++++++++++ ...-map-a73b50da5126e009aa2afaa408141c1f.yaml | 58 +++++++++++++++++++ ...-map-24f9c4426e1ded4bbcd77cb8ae480628.yaml | 58 +++++++++++++++++++ ...-map-63308829f599612b4399930582e4c79a.yaml | 58 +++++++++++++++++++ ...maps-e458b043b3a8331f4ddf5924d17ccf2e.yaml | 58 +++++++++++++++++++ ...maps-51944a4f6212afc8f585f1bcea51f2d6.yaml | 58 +++++++++++++++++++ ...ugin-5f27ace6d76e064e4061fdf808767b2d.yaml | 58 +++++++++++++++++++ ...ugin-b83d0241d6f20c42a973f309878a9cc2.yaml | 58 +++++++++++++++++++ ...inks-75603149f92181c053a67aa413d7458b.yaml | 58 +++++++++++++++++++ ...inks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ents-d27b7d21b5912a09ea3805333b4f7140.yaml | 58 +++++++++++++++++++ ...ouch-5a4ceeb56cff119df02b4014ab6dd0d9.yaml | 58 +++++++++++++++++++ ...rder-18457ce0add8e02185ec82dfe3cc1c14.yaml | 58 +++++++++++++++++++ ...rder-5fce0179ad5dd3fa3f22de628e08db06.yaml | 58 +++++++++++++++++++ ...rder-65d0be98fb7fe486ad93703d74260aa6.yaml | 58 +++++++++++++++++++ ...rder-7737e8caafd57ae5760281e5e46a68d7.yaml | 58 +++++++++++++++++++ ...ress-6001aefe4ed5d867371bbaa565b1d288.yaml | 58 +++++++++++++++++++ ...it0r-2eafd9fb11071a8b513a28c962ba9483.yaml | 58 +++++++++++++++++++ ...ions-d4a44b7e5865ae371b4706ab716f5f69.yaml | 58 +++++++++++++++++++ ...cess-7dabd50801a5dc21167037bc053f6e5e.yaml | 58 +++++++++++++++++++ ...yone-378de5a4c8a761e6f865e9b293282366.yaml | 58 +++++++++++++++++++ ...yone-93d72496faa88a41ccc6451bd803706b.yaml | 58 +++++++++++++++++++ ...yone-9ebec4016a51c98a2dfc38226d295089.yaml | 58 +++++++++++++++++++ ...yone-b2bde61925d9704f5bb5670b30295470.yaml | 58 +++++++++++++++++++ ...yone-b6ce0f1beb89a33f3441e294aa1dd412.yaml | 58 +++++++++++++++++++ ...cing-7c4b664dcbab81960496a17b3a66e44c.yaml | 58 +++++++++++++++++++ ...cker-140887b5bfa7dc561500c7685b1acab8.yaml | 58 +++++++++++++++++++ ...cker-772e15bdf31248d6b001fc7f14d684f0.yaml | 58 +++++++++++++++++++ ...cker-c2d506865b475e467cd410bd4ff9f703.yaml | 58 +++++++++++++++++++ ...loud-25db80928ffd18548f83a78d2fb47f0e.yaml | 58 +++++++++++++++++++ ...loud-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml | 58 +++++++++++++++++++ ...loud-77e9594ea9c5da95d048b98c87af20b9.yaml | 58 +++++++++++++++++++ ...loud-aea3cbfb921c1d1330c879b8f85a35d1.yaml | 58 +++++++++++++++++++ ...loud-b7df280ef92a1ac8dd61f73a5d009cd8.yaml | 58 +++++++++++++++++++ ...loud-fbcd8cab0390c5423cc4977a1f1be996.yaml | 58 +++++++++++++++++++ ...oxes-88404ad5e8128c3699e3c229a21a2eba.yaml | 58 +++++++++++++++++++ ...oxes-c712eff3f3bb4a9cd97ce6c7063fd4f6.yaml | 58 +++++++++++++++++++ ...wall-80529a3b54852ed1b40d1078928149a9.yaml | 58 +++++++++++++++++++ ...cker-0c5a993c7be9746c745f0f9869cf8fb4.yaml | 58 +++++++++++++++++++ ...cker-28eb2dd9b394a6991989e0316614fa07.yaml | 58 +++++++++++++++++++ ...cker-2ac275b541904e5481df890267e095ba.yaml | 58 +++++++++++++++++++ ...cker-9ce1e54ae52ee82869377cad0e1b6dc4.yaml | 58 +++++++++++++++++++ ...cker-be59e4061d41f159389c5e0a45f572cb.yaml | 58 +++++++++++++++++++ ...cker-d1d5e763ed41a49986eaf738181a98d5.yaml | 58 +++++++++++++++++++ ...cker-ea51da120356d8e0bf883fe872498f8e.yaml | 58 +++++++++++++++++++ ...book-1ae1b0bb4039a24aa303fbc722996071.yaml | 58 +++++++++++++++++++ ...book-238730b48c414c2efa3f90f95ede4e1a.yaml | 58 +++++++++++++++++++ ...book-62025420139d5dbebb6173b14d6b099a.yaml | 58 +++++++++++++++++++ ...book-ffe84a5da8ea35eb24ec280a71f71719.yaml | 58 +++++++++++++++++++ ...lite-176b60254015c7171bdde001bfef506b.yaml | 58 +++++++++++++++++++ ...lite-718a86b8fb614bfca1d835a5b1869915.yaml | 58 +++++++++++++++++++ ...lite-93a89e746de1b01ce58a8098e6937879.yaml | 58 +++++++++++++++++++ ...lite-db0b66a5d47c2843954a651061f51619.yaml | 58 +++++++++++++++++++ ...lite-ed97130cf4e3c437fffae83fce6da395.yaml | 58 +++++++++++++++++++ ...list-24ffe594d50f8ec966de3f6d9723e35a.yaml | 58 +++++++++++++++++++ ...pull-1a055ae19ed953176d3ae4b152c78d6b.yaml | 58 +++++++++++++++++++ ...ntry-13327063860a0ee0e2e86f1e87898320.yaml | 58 +++++++++++++++++++ ...ntry-7a55d1c425d19f06030ed735a34d912e.yaml | 58 +++++++++++++++++++ ...ntry-93b718d7dcd910cc3c0b3209a78fa52e.yaml | 58 +++++++++++++++++++ ...ntry-c5db51e5f06010fca4f5938a5e56cd39.yaml | 58 +++++++++++++++++++ ...ntry-f1c8fa61b4af4443e96dfc38c36b4af9.yaml | 58 +++++++++++++++++++ ...opwp-1b30aff662020c0b4f39f0c4b04b2958.yaml | 58 +++++++++++++++++++ ...ange-f7228bc923e4f7e6b922e94dc9e73ec2.yaml | 58 +++++++++++++++++++ ...-pro-b5b87b7676de117a8342f94f403bc1ce.yaml | 58 +++++++++++++++++++ ...sync-8253ee833cb2687572180cd975dbf588.yaml | 58 +++++++++++++++++++ ...sync-885b35b00352c80953df3eed541d0a97.yaml | 58 +++++++++++++++++++ ...sync-9c48f849b993eee3990baaaaa12643ef.yaml | 58 +++++++++++++++++++ ...tter-d22a628e60dd0e0e47e495ea9eb75413.yaml | 58 +++++++++++++++++++ ...tion-34076a9fa6889f09a1439513a52a8cc3.yaml | 58 +++++++++++++++++++ ...tion-b904514033ab5aab0d8b6cea6480c116.yaml | 58 +++++++++++++++++++ ...tion-e4dfba623e207111ac2894d0b05e0171.yaml | 58 +++++++++++++++++++ ...tion-e70ae286a6778ee45405a4388b04fec9.yaml | 58 +++++++++++++++++++ ...-pro-f3a11b810db2dd0055915ce0cd13d43a.yaml | 58 +++++++++++++++++++ ...ient-05f450dd8aa4062aa24fbf2823c60c4a.yaml | 58 +++++++++++++++++++ ...ient-6a236c689e15bb7cc8c51fe8f71c025e.yaml | 58 +++++++++++++++++++ ...ient-6b04f0d74c9f2eb38243b412d23f2013.yaml | 58 +++++++++++++++++++ ...ient-701517c521fc506e2ba1ce37a6b5effa.yaml | 58 +++++++++++++++++++ ...ient-79054d990e7a7a32c990ccc921c67cf1.yaml | 58 +++++++++++++++++++ ...ient-c4e23e67727ce074f425f39975da1652.yaml | 58 +++++++++++++++++++ ...elds-9f8f05e27cd509d186ef8ebf6b358ad1.yaml | 58 +++++++++++++++++++ ...chat-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ters-0f6f97ec8d1cc89cf7cec3ff35c09656.yaml | 58 +++++++++++++++++++ ...ktag-a6cb60a315c6c7a94894e2123d4f4da7.yaml | 58 +++++++++++++++++++ ...pups-d1c49397ab5d1626905204217983db24.yaml | 58 +++++++++++++++++++ ...pups-fd8f4b76d0911973d7f68d0007d8b9f6.yaml | 58 +++++++++++++++++++ ...eway-4d6bafb19843bc6d71a91327064ee112.yaml | 58 +++++++++++++++++++ ...rter-6ceb62cda68f33df94c6d2d8223676b0.yaml | 58 +++++++++++++++++++ ...rter-70ada96da95be698f6717e6048a6ec59.yaml | 58 +++++++++++++++++++ ...mize-529055d3bc8d484bb022631bf8a543b2.yaml | 58 +++++++++++++++++++ ...mize-7438f6c5de0164c1ebbfea6f43fc0dba.yaml | 58 +++++++++++++++++++ ...mbed-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...olio-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ions-9f87cf742669dcbf6cbaabec0f8d8908.yaml | 58 +++++++++++++++++++ ...ions-c5989c384ff1fa34fed277024ca7c660.yaml | 58 +++++++++++++++++++ ...-kit-045b6020dfc1ed99134f3177a28e643d.yaml | 58 +++++++++++++++++++ ...-kit-0b6d48f80755becad907191d56a4faea.yaml | 58 +++++++++++++++++++ ...-kit-1429d93adf30ca5583ea8a8bc67d75f6.yaml | 58 +++++++++++++++++++ ...-kit-39f38e457d08269c0a24a582767d3dfd.yaml | 58 +++++++++++++++++++ ...-kit-8abead7c575d5ff9d8bcc0c1daac4379.yaml | 58 +++++++++++++++++++ ...-kit-9ac2eb6aa79c6ee262cfc473810b750d.yaml | 58 +++++++++++++++++++ ...-kit-a2e686465d8672ec5bf29632e66237cf.yaml | 58 +++++++++++++++++++ ...-kit-fc806cfd6ed4dc072c39a0980e8091bc.yaml | 58 +++++++++++++++++++ ...ocks-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...ocks-d0c27f042f57c6d16293a23758983b37.yaml | 58 +++++++++++++++++++ ...ocks-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...ocks-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...blog-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...blog-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...blog-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...list-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...list-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...list-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...ents-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...ents-7ba0ab8627448e04a3557ed6ccce144f.yaml | 58 +++++++++++++++++++ ...ents-cdc0a1afbf2cc009eea0f7deda8a5515.yaml | 58 +++++++++++++++++++ ...ents-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...ents-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...gine-1671dddc3e7743782d8ec72b0e2ab60c.yaml | 58 +++++++++++++++++++ ...gine-23ba9e8ddbee95a7030ba5db7648376b.yaml | 58 +++++++++++++++++++ ...gine-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...gine-f12b5bbfc5d1dcce9a91a5751dceea95.yaml | 58 +++++++++++++++++++ ...gine-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...menu-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...menu-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...menu-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...opup-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...opup-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...iews-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...iews-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...iews-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...arch-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...arch-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...ters-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...ters-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...ters-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...tabs-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...tabs-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...tabs-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...core-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...core-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...core-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...icks-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...icks-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...icks-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...lder-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...lder-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...lder-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...lery-320a6f011d285ddb19c436d57e994504.yaml | 58 +++++++++++++++++++ ...lery-dfd0d896b1397455913caf7f911dd62c.yaml | 58 +++++++++++++++++++ ...lery-fd87adc782adc661fc2721ea4df8055a.yaml | 58 +++++++++++++++++++ ...lder-162aad8c1f1a67baa5f70490c52d6e30.yaml | 58 +++++++++++++++++++ ...lder-49120404cfb8d5621438564fe9eb32bd.yaml | 58 +++++++++++++++++++ ...lder-5af33f7a1d49eb666342cd85959401ec.yaml | 58 +++++++++++++++++++ ...pack-056f71c24acbc6635e313f4c349ddfa5.yaml | 58 +++++++++++++++++++ ...pack-0e86932241c6ad3f70627e02c54dbc31.yaml | 58 +++++++++++++++++++ ...pack-26ecdaccaffefdf8e29ddd7078f1caed.yaml | 58 +++++++++++++++++++ ...pack-2be7d29f9bb984978a5f99c0ed30a7ed.yaml | 58 +++++++++++++++++++ ...pack-679cd3cb1279c50b5fee2410e1fd3f6b.yaml | 58 +++++++++++++++++++ ...pack-67e0a9fec932f5d791c2a1af30baf3c7.yaml | 58 +++++++++++++++++++ ...pack-72d92c55ab230f31b35329569f6860a8.yaml | 58 +++++++++++++++++++ ...pack-8018c4071bf114403387ecc74840b848.yaml | 58 +++++++++++++++++++ ...pack-9df4fd409a4edbb8572536db3f6715d1.yaml | 58 +++++++++++++++++++ ...pack-9fc3c2f298b108af257176fa3092141b.yaml | 58 +++++++++++++++++++ ...pack-a3ff2f778a78f56b1a077199729153f4.yaml | 58 +++++++++++++++++++ ...pack-aad57ee588ef69bf0761243cceff43ab.yaml | 58 +++++++++++++++++++ ...pack-b0d263ca65579d9d14b154cf891cd65e.yaml | 58 +++++++++++++++++++ ...pack-b9a10340d1ee615f8f2aaccc216ca7f7.yaml | 58 +++++++++++++++++++ ...pack-be7859a3dd693882ff3dd8991a70f093.yaml | 58 +++++++++++++++++++ ...pack-c792a1156e3fd0f41d681016940dc814.yaml | 58 +++++++++++++++++++ ...pack-d4b5db96e8a4cb8dde234da2c8c95905.yaml | 58 +++++++++++++++++++ ...pack-da2fe024ebfa193aa99df991321c990c.yaml | 58 +++++++++++++++++++ ...pack-e9445f5977de7568ced6d296abe4edd1.yaml | 58 +++++++++++++++++++ ...pack-fe6364297dbbdebcc849affd9cb5e248.yaml | 58 +++++++++++++++++++ ...ntor-47cacf238b136edb1857adcd228879bf.yaml | 58 +++++++++++++++++++ ...ntor-600dd698b59252da2334c219e30a3a4b.yaml | 58 +++++++++++++++++++ ...ntor-93b41408a78e1823934fe3d9ee7379d0.yaml | 58 +++++++++++++++++++ ...ntor-c3fb6f2c99d4c5f13096c4775a849201.yaml | 58 +++++++++++++++++++ ...ntor-d9a90b73211e016b68ca1b3072e7a420.yaml | 58 +++++++++++++++++++ ...gger-df91ebe73a45ac966511f7792447be75.yaml | 58 +++++++++++++++++++ ...gram-f73561aa7a756a9f3e5287e2a9bf11ee.yaml | 58 +++++++++++++++++++ ...-pro-1318af711c3fe0fec9bc7d351421ab5e.yaml | 58 +++++++++++++++++++ ...lkit-95537a5037076723ccef81d1fba789fa.yaml | 58 +++++++++++++++++++ ...chat-557dc76e2c2294cd33c5721f9ecf01e7.yaml | 58 +++++++++++++++++++ ...ards-9ece1f8354a7e11befbd20ae11f9cc95.yaml | 58 +++++++++++++++++++ ...ards-a147e2c0921b88394b88f70de0b50255.yaml | 58 +++++++++++++++++++ ...joan-385d5d7a4b24b938786ff7b93e4cd0be.yaml | 58 +++++++++++++++++++ ...joan-60783d04ed031e1d13d6ec674c133657.yaml | 58 +++++++++++++++++++ ...joan-ae19aa47eef9d7207f8ff256c3445ec9.yaml | 58 +++++++++++++++++++ ...oard-08107665cefdd5cc4f288c7614f8ef39.yaml | 58 +++++++++++++++++++ ...oard-e28ca962e4f58cae156935f08c9eded6.yaml | 58 +++++++++++++++++++ ...illa-4b6c5be1fe7b22ce9d31baa1ab6b6513.yaml | 58 +++++++++++++++++++ ...ager-10474b54f82207cb48d47efc5316fa08.yaml | 58 +++++++++++++++++++ ...ager-21f007f5ea27a69827ebd1e3bdac836f.yaml | 58 +++++++++++++++++++ ...ager-72d88d4156b62bb9e1abe8555a4604f1.yaml | 58 +++++++++++++++++++ ...ager-93a7a8515ae48a00a314691190815e8e.yaml | 58 +++++++++++++++++++ ...ager-988317a2aa68c393854967dc4677ab3f.yaml | 58 +++++++++++++++++++ ...reer-02ae5a0409f3bbd65473e557e495c850.yaml | 58 +++++++++++++++++++ ...reer-27d8b6ae177490f4dc5980ca233d4dfe.yaml | 58 +++++++++++++++++++ ...rtal-c57a50def1ef305a4e8acb9063bb5142.yaml | 58 +++++++++++++++++++ ...ings-654c8b4c06cccd2b893fe7f42cd13fff.yaml | 58 +++++++++++++++++++ ...ings-d91c4b972affa20bd870d04861c77d26.yaml | 58 +++++++++++++++++++ ...ings-da0336a411f4f619331fc9d86a24bec5.yaml | 58 +++++++++++++++++++ ...ings-fe45354b8faab4200224637d8bf8497c.yaml | 58 +++++++++++++++++++ ...ings-fe5cb5dd50547aaa395139fc837a5f8f.yaml | 58 +++++++++++++++++++ ...rdwp-bd931f434035df45531eaa63d35d55b4.yaml | 58 +++++++++++++++++++ ...rdwp-dbbebd9fd091a5f8a7900f65f6287602.yaml | 58 +++++++++++++++++++ ...rdwp-dc882a54ee21adad00f3c37faa34411b.yaml | 58 +++++++++++++++++++ ...rdwp-f86d763fc59c0d8f05b12bd8ecb8244c.yaml | 58 +++++++++++++++++++ ...reer-00ad079b8c94204c38afc1d934554333.yaml | 58 +++++++++++++++++++ ...reer-8605cf70b09f39b80921d3235eaa5a54.yaml | 58 +++++++++++++++++++ ...reer-8b266025d0f3695c542ad07de2e9b34c.yaml | 58 +++++++++++++++++++ ...reer-b9eb31c713b27c04fd47230e22de33c0.yaml | 58 +++++++++++++++++++ ...obwp-5aa8b17a95e784f5419ee88ce9b3c1f5.yaml | 58 +++++++++++++++++++ ...obwp-dd54b2279f8b3539fee1aca11b3b21e1.yaml | 58 +++++++++++++++++++ ...-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-seo-cca32e49d162555543a6de6d18516ab9.yaml | 58 +++++++++++++++++++ ...ents-01876089e61a6c3ae9cebc874b7fb7a5.yaml | 58 +++++++++++++++++++ ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rint-6e37ab7161cd9f2422895355af697330.yaml | 58 +++++++++++++++++++ ...site-584f7ea1f5eb53a996f78e6bd4374fc9.yaml | 58 +++++++++++++++++++ ...site-a1936a4a25a96962401af7be405882a8.yaml | 58 +++++++++++++++++++ ...cons-fcb752a84e136c08d10cbe281ed9acb9.yaml | 58 +++++++++++++++++++ ...ment-00536c9d692bf537f783adb6446f271d.yaml | 58 +++++++++++++++++++ ...ment-072c39710eb7dbfbeb82cc60cf47874f.yaml | 58 +++++++++++++++++++ ...ment-14278d198b70b2e64cd570f29581f83a.yaml | 58 +++++++++++++++++++ ...ment-16ee5e237a73d66076fd3bc3cb313106.yaml | 58 +++++++++++++++++++ ...ment-dbd794ea76909c06feaaa4b067d9c221.yaml | 58 +++++++++++++++++++ ...tics-6d795e6331799c55a6d3f3098ce86d6b.yaml | 58 +++++++++++++++++++ ...text-7d7e63bacfe422d65219ef49f5f2b1e7.yaml | 58 +++++++++++++++++++ ...agex-e67b32cb7aae592e15f89a10718ce09e.yaml | 58 +++++++++++++++++++ ...show-08b8cede6b6ee0e0f3a91f475dfd1447.yaml | 58 +++++++++++++++++++ ...atic-4783eb0d865a9f683c0f42594f272a3d.yaml | 58 +++++++++++++++++++ ...atic-934106ff95d7bc443b715a08222f1f73.yaml | 58 +++++++++++++++++++ ...atic-fd0ae4740c5dfc4422b8f4b3f77edf83.yaml | 58 +++++++++++++++++++ ...load-3040cc77a4a179c9ac426a7d4d300237.yaml | 58 +++++++++++++++++++ ...load-320dd95c1c6954f0769e8bf06822a1e3.yaml | 58 +++++++++++++++++++ ...cker-179abbcb3a9b789dc00b8e0d8f532b6a.yaml | 58 +++++++++++++++++++ ...cker-ec203a9e69230c2878eb1812f2101d77.yaml | 58 +++++++++++++++++++ ...ment-4ce88d432edfef73000dd57a527803fa.yaml | 58 +++++++++++++++++++ ...dget-cf29ff4800b24e4ea96e524c408240d8.yaml | 58 +++++++++++++++++++ ...ator-eab9e4fbf9582fd0da43dce31000dce5.yaml | 58 +++++++++++++++++++ ...rm-7-fdec704444e3056cbaed479252db31c8.yaml | 58 +++++++++++++++++++ ...menu-c27c21f00fd5cfc7fcc406cc847e2987.yaml | 58 +++++++++++++++++++ ...dget-265315e822cdfb8b9ba73135a9d29277.yaml | 58 +++++++++++++++++++ ...izer-9b9750afc0fcb77fca6e9424d2ce6b98.yaml | 58 +++++++++++++++++++ ...jobs-1f7578af7b08d6f0682dfe557a69cb45.yaml | 58 +++++++++++++++++++ ...jobs-23c92f364f22c50ebf1609484d67aa5e.yaml | 58 +++++++++++++++++++ ...jobs-9b43630f5837a1e7e35ee3f5d5c853aa.yaml | 58 +++++++++++++++++++ ...jobs-e2ad97f33f7abd91ea501d6e3cf80275.yaml | 58 +++++++++++++++++++ ...jobs-ff8fca95ef812c976ae31e630ef4e2a9.yaml | 58 +++++++++++++++++++ ...otel-107b72d2008fc8b953e147cb55e0c002.yaml | 58 +++++++++++++++++++ ...otel-3be3c98bb23ebc942163786ddfe2ad5d.yaml | 58 +++++++++++++++++++ ...otel-c6f1bc8dc593e94f4ca6205f51ff1930.yaml | 58 +++++++++++++++++++ ...otel-da95e93b8f550605e02b61a197352c24.yaml | 58 +++++++++++++++++++ ...rant-bdb0f91704ac2d68fedc7edd41a87d1c.yaml | 58 +++++++++++++++++++ ...cket-05e6db992de66a60c66b532d0b52e5c0.yaml | 58 +++++++++++++++++++ ...cket-0cf1772d2edd6248b5e99ca545774eec.yaml | 58 +++++++++++++++++++ ...cket-10beccaa7efca5aa61a354cb6243cda6.yaml | 58 +++++++++++++++++++ ...cket-1a072d8df8f66c1d4b2649edb7db538a.yaml | 58 +++++++++++++++++++ ...cket-32e7faa52a05f68e7c002ae73c9e64c8.yaml | 58 +++++++++++++++++++ ...cket-37413a766ec0b67c1d3586422811e23c.yaml | 58 +++++++++++++++++++ ...cket-497602ea4705020cbc78a0b19d427eba.yaml | 58 +++++++++++++++++++ ...cket-8bc92a63825b5e282b7e5f164f2d0274.yaml | 58 +++++++++++++++++++ ...cket-cd695a94c9ddf898661512e7b5a151f2.yaml | 58 +++++++++++++++++++ ...cket-dcc8e30c059ff6154a44599d32e5c2b6.yaml | 58 +++++++++++++++++++ ...oser-16bf911b12f5300e0830fe4fc1eb1ed0.yaml | 58 +++++++++++++++++++ ...oser-538a8622c152b16ef2caeb53a8ac1ec1.yaml | 58 +++++++++++++++++++ ...oser-83ebb5cd5f6dc281ececf75915c27b14.yaml | 58 +++++++++++++++++++ ...oser-86b92217e832cff4cd144076070304be.yaml | 58 +++++++++++++++++++ ...oser-9af98782950e2bb2fdcec622ba259511.yaml | 58 +++++++++++++++++++ ...oser-ad1820dedb4cef27ae24befa1b1daeac.yaml | 58 +++++++++++++++++++ ...oser-f10d7adc04b5a73f4d72dd21d3e9038b.yaml | 58 +++++++++++++++++++ ...l2wp-0c697c5c96080eeecc8327290c3e4bbc.yaml | 58 +++++++++++++++++++ ...l2wp-8f85626a3667c9d85d3c399330a92186.yaml | 58 +++++++++++++++++++ ...rter-727fc100f15758606ba9bacc049862be.yaml | 58 +++++++++++++++++++ ...rter-adbb6fa0fc2db14e16c1a1b09c0380c9.yaml | 58 +++++++++++++++++++ ...-api-017e173f787a75af41e99e7c6b2e153f.yaml | 58 +++++++++++++++++++ ...-api-5e1efa6ead2e9d16598b6140024797d0.yaml | 58 +++++++++++++++++++ ...-api-9d1887b8622dac2bd15f04e82a194689.yaml | 58 +++++++++++++++++++ ...bles-188621df0287aae144c1602d133b6eea.yaml | 58 +++++++++++++++++++ ...bles-8a2f1e9cb4e65657070d3644661c86c5.yaml | 58 +++++++++++++++++++ ...erce-e8b437aec6c6d5cf835be562d11e2a03.yaml | 58 +++++++++++++++++++ ...icer-1856c5e867bf1d120f63e6e0b7edcd33.yaml | 58 +++++++++++++++++++ ...lery-0f097e6e2a639803a729d611f2124080.yaml | 58 +++++++++++++++++++ ...core-0fb4e97ee7da5e51631d72f53857a9d4.yaml | 58 +++++++++++++++++++ ...core-6263cc6815827a2dcfc05e4efb3b62b1.yaml | 58 +++++++++++++++++++ ...core-723d96df6476235c8369c3ebff502325.yaml | 58 +++++++++++++++++++ ...core-7a177ce424b4ca9311638c336fb2a0c4.yaml | 58 +++++++++++++++++++ ...core-8c6a911c1599b488ff2e4c85e8723fde.yaml | 58 +++++++++++++++++++ ...core-b223d684e1bd83784af3dae666ad9edd.yaml | 58 +++++++++++++++++++ ...core-bf3d966b9ad3caa6240cfda0b540df5c.yaml | 58 +++++++++++++++++++ ...core-bfeb7be408c868527d6e4e4ae715a094.yaml | 58 +++++++++++++++++++ ...core-f3750481cefda659186282ffd61f21aa.yaml | 58 +++++++++++++++++++ ...elds-2e06d0c89a5dc3c234768757cec7f855.yaml | 58 +++++++++++++++++++ ...elds-35c9285e319e0fd8c44eb8868930cb11.yaml | 58 +++++++++++++++++++ ...bles-5fd0b28040a0aa5ee65912fc0591e5ff.yaml | 58 +++++++++++++++++++ ...lery-421ff303fd144872eafd938e0ed53208.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-d3b5c660c8e70bcaeca06e534455619d.yaml | 58 +++++++++++++++++++ ...cons-cbde558e3503539352816240255a9c09.yaml | 58 +++++++++++++++++++ ...cons-f64345cda7b5204d1b37828da4e7e5ea.yaml | 58 +++++++++++++++++++ ...list-dcac032f7f8635bf04a2ba3e28463625.yaml | 58 +++++++++++++++++++ ...r-wp-8564c9ce49cff70553493d3be285f932.yaml | 58 +++++++++++++++++++ ...ress-1762eb5f09e878b42fb55a3fe0a86976.yaml | 58 +++++++++++++++++++ ...ress-748f56889fa9468d09334c5315ffc76e.yaml | 58 +++++++++++++++++++ ...auth-b4373f75cd045c6c032603b171a73598.yaml | 58 +++++++++++++++++++ ...ocks-145ab093189c598c1d7c84674ba9b14b.yaml | 58 +++++++++++++++++++ ...ocks-19fda0443580ba364718d6332aa05bd3.yaml | 58 +++++++++++++++++++ ...ocks-1af00ca27a5fbf01cb83385e2b154d55.yaml | 58 +++++++++++++++++++ ...ocks-1ed8420474aea4653c484035b79e8e05.yaml | 58 +++++++++++++++++++ ...ocks-73e0ed91223d9a0bf611aaf9c6ef87bb.yaml | 58 +++++++++++++++++++ ...ocks-7c903975cddce5bde1f01b5dccfc9d5e.yaml | 58 +++++++++++++++++++ ...ocks-7faa2f91e19a5cd476ef97768ff54f4e.yaml | 58 +++++++++++++++++++ ...ocks-92efa25c2b07bccd1145767fcc736dac.yaml | 58 +++++++++++++++++++ ...ocks-ae54bb23e01b89e4ec06d2fb932844c4.yaml | 58 +++++++++++++++++++ ...ocks-b108894447f4647f7c71dc35d7e7ee8f.yaml | 58 +++++++++++++++++++ ...ocks-e67596c37a8f5cfdbaa53a0b072da6d5.yaml | 58 +++++++++++++++++++ ...ocks-f0d72e9f2bbc50f42260a8f158b94cfc.yaml | 58 +++++++++++++++++++ ...ates-884840a442619cbc5a7daf95f85cb6cb.yaml | 58 +++++++++++++++++++ ...gner-50843d38ad4401e3655e1238a9807eaf.yaml | 58 +++++++++++++++++++ ...gner-6994b89efe7c786e6720a2413c234aa9.yaml | 58 +++++++++++++++++++ ...orms-171d068f6ec1f7c5f7f36a222d7d8329.yaml | 58 +++++++++++++++++++ ...orms-51a3f66be32afef58cba4c10f2a34acc.yaml | 58 +++++++++++++++++++ ...orms-5837868c169d6f2b8a500d8da35501e2.yaml | 58 +++++++++++++++++++ ...orms-7de52979e23084c59771c8210cf92e97.yaml | 58 +++++++++++++++++++ ...orms-a8effa5bb19e2446851feb68b5c40364.yaml | 58 +++++++++++++++++++ ...orms-b8ab2dfdf20e4fafe82ff439f5e1b3cf.yaml | 58 +++++++++++++++++++ ...orms-bba8cb47607da11df10938d143f38653.yaml | 58 +++++++++++++++++++ ...orms-e13af05b11fa3359bbef7b6fbbcbe782.yaml | 58 +++++++++++++++++++ ...nter-703cbb2bd8ca38850245b92d6dc648dc.yaml | 58 +++++++++++++++++++ ...nter-738043af82effea7b721b2ac598247ee.yaml | 58 +++++++++++++++++++ ...nban-0ba2d63b51e45936904968ed820d3fb0.yaml | 58 +++++++++++++++++++ ...nban-437b56ebf4aacc7667a38732c9abf4be.yaml | 58 +++++++++++++++++++ ...nban-b7ae92a9935669b4053689b9e0cbb221.yaml | 58 +++++++++++++++++++ ...nban-c02729e12026bce3dd84d6631a92ade6.yaml | 58 +++++++++++++++++++ ...nban-f1213197a267fd7da7cf35e16e4c4e64.yaml | 58 +++++++++++++++++++ ...angu-44460dbeb7b8e704694c0ff2206a0cbe.yaml | 58 +++++++++++++++++++ ...desk-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...wara-405127e1ba90a2b29eb154a026e5d142.yaml | 58 +++++++++++++++++++ ...wara-40b261f9e620f48d7e973396d17f1ef6.yaml | 58 +++++++++++++++++++ ...tene-668f9a8a460ad561a2838627b58d495b.yaml | 58 +++++++++++++++++++ ...tion-8b4d0763701a7017afeea137760172c9.yaml | 58 +++++++++++++++++++ ...tion-9bc7114a41ccdec53120552ca052ffb2.yaml | 58 +++++++++++++++++++ ...tion-b58adfbc2afe32d767ef8aee301802e9.yaml | 58 +++++++++++++++++++ ...ator-3b8474b2759e8c9d48abfea5292a608c.yaml | 58 +++++++++++++++++++ ...ator-da0185c8881b7837eb3ff9bef5017584.yaml | 58 +++++++++++++++++++ ...port-11a5b3d7c20edce1773adda5ec308996.yaml | 58 +++++++++++++++++++ ...port-46afaecae6249c4e331df87e2126a4cd.yaml | 58 +++++++++++++++++++ ...port-7229f0a7ed96aafb75936c9e304ee19f.yaml | 58 +++++++++++++++++++ ...port-d5de86927ffadedc80433179f0132f85.yaml | 58 +++++++++++++++++++ ...port-d8468ce3a3b28bab55fbd9d9d45afc3e.yaml | 58 +++++++++++++++++++ ...ider-789529615bb2d4eb38b1e7ff92e021be.yaml | 58 +++++++++++++++++++ ...soon-0ab200e48d96a6ca5d84cfe7a3d18007.yaml | 58 +++++++++++++++++++ ...feed-71dea3214223a1d20c30d59ccb66600b.yaml | 58 +++++++++++++++++++ ...aily-097c0f138517316fbd3374861a3ee8f4.yaml | 58 +++++++++++++++++++ ...aily-dc6a4a649580730eac384e9fcfdcdd18.yaml | 58 +++++++++++++++++++ ...ocks-10dff6774b50ae753206c4c8ad748d9b.yaml | 58 +++++++++++++++++++ ...nter-3b3fa6e8d4f04ec12c101c522cbd4e95.yaml | 58 +++++++++++++++++++ ...nter-4f2a3c77ca82525aff6c0c722c03bbb8.yaml | 58 +++++++++++++++++++ ...nter-cd6793bdae8ddbc15fc2277d7e7c8776.yaml | 58 +++++++++++++++++++ ...nter-e343250b5d78372d282c8933d6d57ce1.yaml | 58 +++++++++++++++++++ ...ions-2edc0eee00be4035effb1c3f6980bcdd.yaml | 58 +++++++++++++++++++ ...ions-6f4e1c7a45d9fd969ed178f73339608a.yaml | 58 +++++++++++++++++++ ...ring-6adbed160e9381bd43ab920e4f4c10a6.yaml | 58 +++++++++++++++++++ ...meta-ff335b153bdda68f2c4ef086e30eeef7.yaml | 58 +++++++++++++++++++ ...inks-6a71a90d9115277ce9fcc31f3c8625f3.yaml | 58 +++++++++++++++++++ ...mbed-86b662d95dc55b9ca72cce4586bb6bc2.yaml | 58 +++++++++++++++++++ ...ress-4a6888e60c570cf313bf30503e9c55b5.yaml | 58 +++++++++++++++++++ ...oser-126c5ad6c5556b65e18e20f26325544a.yaml | 58 +++++++++++++++++++ ...oser-28f8218d0cd81907d78e413554e9b440.yaml | 58 +++++++++++++++++++ ...oser-48b0aa896289cd47d761dfb701222bb0.yaml | 58 +++++++++++++++++++ ...oser-4c2f06746a0f92dd0596f11498bf4bdb.yaml | 58 +++++++++++++++++++ ...oser-6fd5ee2a697c02149752bc647f98085f.yaml | 58 +++++++++++++++++++ ...oser-77b708d65934f257c39cc7cecab95cf9.yaml | 58 +++++++++++++++++++ ...oser-f10892c912aef9cf076885d5c4fde1a7.yaml | 58 +++++++++++++++++++ ...oser-fa1461d953e85c77009854b513c7864a.yaml | 58 +++++++++++++++++++ ...oard-3b5accdca91dd653d9fdbf15959cc447.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...prox-f629f1cbd9fba0b088aac877e4dc575f.yaml | 58 +++++++++++++++++++ ...ting-a7228223462154328da551d1f21d3c16.yaml | 58 +++++++++++++++++++ ...ting-ddf19add11c9e3078c959a56598f9a91.yaml | 58 +++++++++++++++++++ ...core-41d2d6be7c3a0182cf7393ba0b128c1e.yaml | 58 +++++++++++++++++++ ...stem-3500fb88bb82ba57864ceb27a25df18c.yaml | 58 +++++++++++++++++++ ...stem-8784759a4cb7c427ffba0c396b0eda3c.yaml | 58 +++++++++++++++++++ ...stem-a2fe6757edbb25d46fa159201cfedc69.yaml | 58 +++++++++++++++++++ ...stem-e448c9e4b5c0c1a44cb7637de9906bfd.yaml | 58 +++++++++++++++++++ ...stem-e6681bfff3cc4dc42aaabe81eb223699.yaml | 58 +++++++++++++++++++ ...usel-10df21fe953fcd7c84f02b55e2e8260b.yaml | 58 +++++++++++++++++++ ...hare-cf67d2bf93130a2d772a74f509dde212.yaml | 58 +++++++++++++++++++ ...hare-d64effb97bd4d31b42274790386bfdcb.yaml | 58 +++++++++++++++++++ ...ices-c6a3bc41ee8a2ee4ea6023cb51c1bb30.yaml | 58 +++++++++++++++++++ ...ings-31e1dd2369472619e89b67df12c89fa8.yaml | 58 +++++++++++++++++++ ...ings-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ings-d3315d27c075491e0975254e6c7dfe78.yaml | 58 +++++++++++++++++++ ...ings-e20377f8d33eee03a0841308e7bb35f3.yaml | 58 +++++++++++++++++++ ...erce-98a2172528b0fc22d4acb08039e5358a.yaml | 58 +++++++++++++++++++ ...erce-db671eee30eadb2b3e6d738cfc02d4cf.yaml | 58 +++++++++++++++++++ ...viyo-e9d4c2285e81f24a0ebb73201d5c6506.yaml | 58 +++++++++++++++++++ ...viyo-f10af2927781e57c830660efc5735cb4.yaml | 58 +++++++++++++++++++ ...your-fe19c96913ad86b413d30430f8f6dd54.yaml | 58 +++++++++++++++++++ ...news-a3153e139f0a73014bc8d2b3f8f23688.yaml | 58 +++++++++++++++++++ ...news-ab596007425584b1e79f9f5a75499083.yaml | 58 +++++++++++++++++++ ...news-bd4bb9d035972f9b926d372efd2d0c6a.yaml | 58 +++++++++++++++++++ ...nejs-3c3beb51159fce431f6c1df59690d1f4.yaml | 58 +++++++++++++++++++ ...nejs-aa7769527923a5d7ef3aff0dbf4c6e9e.yaml | 58 +++++++++++++++++++ ...nejs-f1c3c3df1834bde215592ceeafa99ec0.yaml | 58 +++++++++++++++++++ ...nter-154e2db41f3251206c18f35c16e169dc.yaml | 58 +++++++++++++++++++ ...base-41532dfb555f5a1e79f8f55e8febf84a.yaml | 58 +++++++++++++++++++ ...dget-ecd636facda8cd64296dd86dcfe53843.yaml | 58 +++++++++++++++++++ ...tton-b309eae3300d9042c3f3d6f98d0437a7.yaml | 58 +++++++++++++++++++ ...ikes-3a81ae3c463ea49e154447e90b9b17fa.yaml | 58 +++++++++++++++++++ ...iniu-16382904fc41ea3ab6b4c2791fc01fb4.yaml | 58 +++++++++++++++++++ ...hiwa-5e9157054c225e3f87bee05e68d2bb85.yaml | 58 +++++++++++++++++++ ...gine-23b35e5f653977b412c0dc708b752a30.yaml | 58 +++++++++++++++++++ ...heme-219182470bf96c81d2700e98935234cf.yaml | 58 +++++++++++++++++++ ...-sns-eccc639fdf835f594ca670b3e9f9f323.yaml | 58 +++++++++++++++++++ ...chat-44b3ba415f16865ebb1bd98068348f19.yaml | 58 +++++++++++++++++++ ...izer-a98db6a35902de5cbf34db4eed4ead5f.yaml | 58 +++++++++++++++++++ ...izer-d320263520ce22890af78fdf485478ad.yaml | 58 +++++++++++++++++++ ...izer-e82a5c99393c73fafe048a1ee03cc574.yaml | 58 +++++++++++++++++++ ...load-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...load-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ions-4283f13fe6bc4a6b024bd09e02f40c1e.yaml | 58 +++++++++++++++++++ ...-law-54befb9e4a40b2daeebffb4c52b40b61.yaml | 58 +++++++++++++++++++ ...onts-f59a000f4db543a9b891f92c5f6872de.yaml | 58 +++++++++++++++++++ ...cher-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...emap-03920cd9ca5ff22b06a994a5f8a5fb1c.yaml | 58 +++++++++++++++++++ ...ools-d4cabd09aa67db7f89a13839c46aab51.yaml | 58 +++++++++++++++++++ ...page-1da9a5e486a5bca5eea56b41f291472c.yaml | 58 +++++++++++++++++++ ...page-60eda95192a20425ef3765da3a807a07.yaml | 58 +++++++++++++++++++ ...page-75b95cd57aa6f181317402e50b5298ac.yaml | 58 +++++++++++++++++++ ...page-7f3124ca75169d1ce32c9846ab853c30.yaml | 58 +++++++++++++++++++ ...page-c2e6ea5d855361966f47fc5dcb8b0259.yaml | 58 +++++++++++++++++++ ...page-cc5f050077abe9bc4430ea7311dee63b.yaml | 58 +++++++++++++++++++ ...page-d50f67dc0f0c12eaee9077e2d5da5b59.yaml | 58 +++++++++++++++++++ ...page-e17132380795ec993497562455cdcf18.yaml | 58 +++++++++++++++++++ ...ager-3e06725c467ed0bbc52c31de7579bce8.yaml | 58 +++++++++++++++++++ ...gger-0eff9655bfda1837e342ad2c25cf67f3.yaml | 58 +++++++++++++++++++ ...ster-9f0a7a67bdcab820d9c877a9c152ccf4.yaml | 58 +++++++++++++++++++ ...odes-30c4f098df3ec040d50017f604f86e26.yaml | 58 +++++++++++++++++++ ...mage-01d1d88da52813ba88f89d4ae266435f.yaml | 58 +++++++++++++++++++ ...-cat-823af0fa0a5da870a62224c7ff6c3f56.yaml | 58 +++++++++++++++++++ ...ages-1bd3cf2ded386b4330f990e160e575a1.yaml | 58 +++++++++++++++++++ ...ages-1d38738da5297f92f4a75e3867c8fc2b.yaml | 58 +++++++++++++++++++ ...ages-32b6d6a7715e88760b71f326a4a0a744.yaml | 58 +++++++++++++++++++ ...ages-6ef6064badb5d7b87c27535925053eda.yaml | 58 +++++++++++++++++++ ...ages-cdbf7ebff8c4d1a9b90da71e4a3d5b8e.yaml | 58 +++++++++++++++++++ ...ages-fc1127bab00994e33df3aea4eda89e16.yaml | 58 +++++++++++++++++++ ...ages-4557d429895965429fa37880092128d8.yaml | 58 +++++++++++++++++++ ...lags-b653693e247ce65b83ad58a9d1c112a5.yaml | 58 +++++++++++++++++++ ...posh-cad70fb6bdfbb529b2f3fd5fa62ec983.yaml | 58 +++++++++++++++++++ ...asic-4888a583f0c17ec03ad6204f11cf19b4.yaml | 58 +++++++++++++++++++ ...asic-ba827c0c7827dd14721a734b247e5519.yaml | 58 +++++++++++++++++++ ...mbed-5b2a6f112dc7d70910b36648c4b4675a.yaml | 58 +++++++++++++++++++ ...mbed-77ceee4c9af8ec0a57ce3d32bf1b3aa5.yaml | 58 +++++++++++++++++++ ...tics-fbfa55f46b34cda37b3af16eb142622e.yaml | 58 +++++++++++++++++++ ...nder-c2ba29e0e5ecaebf723467e306a8b7e0.yaml | 58 +++++++++++++++++++ ...osts-3e7a9b56ead5fe8df432df319aeeebae.yaml | 58 +++++++++++++++++++ ...tion-d4b22919ff8b60c51f7cf57a644618b0.yaml | 58 +++++++++++++++++++ ...form-59cabb7b5299e919e0e9798126655ebf.yaml | 58 +++++++++++++++++++ ...-kit-393e2e191f65056b760ec314dc828cfa.yaml | 58 +++++++++++++++++++ ...-kit-c82aa7ec69ca20e438896d99f7ba7b77.yaml | 58 +++++++++++++++++++ ...-kit-dd731c24df053ea79b95f5153fe19979.yaml | 58 +++++++++++++++++++ ...unes-ca83dec475d25f0d439ff07447147bbd.yaml | 58 +++++++++++++++++++ ...dget-b7b0638727516de291f017e208e485cf.yaml | 58 +++++++++++++++++++ ...atex-53e03067c5c0bd571562823dadf2dc1b.yaml | 58 +++++++++++++++++++ ...cher-992cb2db66581f66b70df8df6297f14c.yaml | 58 +++++++++++++++++++ ...cher-fe2d4839032c7d1700f5ad488d4dc88f.yaml | 58 +++++++++++++++++++ ...obox-1d6b909d9b4a86a23d05301fe792416a.yaml | 58 +++++++++++++++++++ ...obox-e9635d2750ec3cdec7963e531110e8e5.yaml | 58 +++++++++++++++++++ ...ager-6e22ef37bb559e43f9ec487e46497c1a.yaml | 58 +++++++++++++++++++ ...ager-dcfc7774787e2e0bae54fdcbcdce15a5.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...erce-ae9a6b8dc34a1a7bd8079dc738c03df9.yaml | 58 +++++++++++++++++++ ...ider-02467e400ca754bab3e037cbbdd78309.yaml | 58 +++++++++++++++++++ ...ider-1abc3232bb9762193f328a8624f474b9.yaml | 58 +++++++++++++++++++ ...ider-4c62f9807e53925857a04839b7f811f3.yaml | 58 +++++++++++++++++++ ...ider-782d2a5a9a3b36ec02deacd0cc03dd91.yaml | 58 +++++++++++++++++++ ...ider-7b9f5b71ec8719bf9a8cb5694942faa9.yaml | 58 +++++++++++++++++++ ...ider-9212eb6af9b06f0daa962811d04b3aed.yaml | 58 +++++++++++++++++++ ...ider-9e79ec7559a564921e41d0c7103ccb78.yaml | 58 +++++++++++++++++++ ...ider-a578ebb6ebe38916edbe0405c9e0722c.yaml | 58 +++++++++++++++++++ ...ntor-64461a08e8c73126cafa25fcfb24f7b4.yaml | 58 +++++++++++++++++++ ...ents-277494a31c77da0ae18248d4fccbad90.yaml | 58 +++++++++++++++++++ ...load-7a66706d231bb588b40ed996e42c0254.yaml | 58 +++++++++++++++++++ ...deos-934698dce094abed0913795fed8be1e6.yaml | 58 +++++++++++++++++++ ...ckup-175c8ff94ca9713fddec53a350c86d55.yaml | 58 +++++++++++++++++++ ...lery-1d3a5e954dbca93e3fee328975ccc98e.yaml | 58 +++++++++++++++++++ ...show-e098e9eac7599a7bcc4cfaf12c6fb3a1.yaml | 58 +++++++++++++++++++ ...ideo-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ider-20c21b977e576c86cae60978b4cded07.yaml | 58 +++++++++++++++++++ ...ider-4bda697ca3ea7c8fca810d0d8ce167ae.yaml | 58 +++++++++++++++++++ ...tack-fdd4bded1dfa98b42ec68b8794019fbd.yaml | 58 +++++++++++++++++++ ...arch-5fb9868893588947cd0894306db3f85c.yaml | 58 +++++++++++++++++++ ...arch-b2d04a137f03b4bce0a603349a0a67e2.yaml | 58 +++++++++++++++++++ ...ites-10a0d810b2c87af5b6ac2f20a36975ae.yaml | 58 +++++++++++++++++++ ...ites-3662e536f344cad7ead518a87b44f9b9.yaml | 58 +++++++++++++++++++ ...ites-3ac7913de6e3ab3bdc9b5e42fbbe516c.yaml | 58 +++++++++++++++++++ ...ites-620886ffa263a68ff12dd7501ad110dd.yaml | 58 +++++++++++++++++++ ...ites-8871ef770441f03d651279dadfcbfd9f.yaml | 58 +++++++++++++++++++ ...ites-984ae033ae8ed023b8d291a56d4420e2.yaml | 58 +++++++++++++++++++ ...ites-9beaf57f0310a4e1b4eebc1c61cd56e0.yaml | 58 +++++++++++++++++++ ...ites-c703e23611edc1b7f4c547a3de6e5a54.yaml | 58 +++++++++++++++++++ ...tory-f8cd51c51fa81f86666de16c04486eac.yaml | 58 +++++++++++++++++++ ...lite-fb41ea027051c6c12e4e7b22c9f918d2.yaml | 58 +++++++++++++++++++ ...cita-730361678b13f8f0736a72594b63e5d4.yaml | 58 +++++++++++++++++++ ...lder-052c2263d304ba99984110ed21050e99.yaml | 58 +++++++++++++++++++ ...lder-096938bf849592b8e6a6dbaccc2157aa.yaml | 58 +++++++++++++++++++ ...lder-9baae5fb51d9dd1141e1931574d9d7be.yaml | 58 +++++++++++++++++++ ...lder-a64ff7d479ea82b36b6d5de70a97fbae.yaml | 58 +++++++++++++++++++ ...lder-ae016ddc716d42a85477445c62a5e437.yaml | 58 +++++++++++++++++++ ...lder-d46f40f2ab613d8e339074ed1d986191.yaml | 58 +++++++++++++++++++ ...lder-de55ae6e76c91a89ee0e3689f89fe0d9.yaml | 58 +++++++++++++++++++ ...ated-9a53cdf71ae16cc8f18244beb584e5b3.yaml | 58 +++++++++++++++++++ ...ower-9b2ea9b4d3e50f4a2171e20728a5e5ce.yaml | 58 +++++++++++++++++++ ...ctor-ffa89e4112fdba734a5ff64b0534aeff.yaml | 58 +++++++++++++++++++ ...adin-268919440c0c130df155e87fb1063e23.yaml | 58 +++++++++++++++++++ ...info-657bb32b8f91f0127ec427c69158cd75.yaml | 58 +++++++++++++++++++ ...ghts-871f126d178a351c71d698539beb418c.yaml | 58 +++++++++++++++++++ ...ghts-f78d7ba708259da0523cabc0cbdbd7c5.yaml | 58 +++++++++++++++++++ ...eads-bfe41c446963ca7621a719dd7519ca70.yaml | 58 +++++++++++++++++++ ...snap-34c15700740b2cf80007fd2a16414756.yaml | 58 +++++++++++++++++++ ...uite-8668394708fedca0791c9dce209e6c21.yaml | 58 +++++++++++++++++++ ...uite-fb9d67ae40f074a3d13bb91e383cd2e6.yaml | 58 +++++++++++++++++++ ...onal-35e6f9b545b9a3d3918e9b2b36941c18.yaml | 58 +++++++++++++++++++ ...onal-c7398725776161b539e66b85a7395b11.yaml | 58 +++++++++++++++++++ ...-map-0bd29affbc67a54bb066a76fed95c3b0.yaml | 58 +++++++++++++++++++ ...-map-5c2752426bec20e3d652e4f604fa0685.yaml | 58 +++++++++++++++++++ ...-map-e97645e174e90e9260a0b981384daa6e.yaml | 58 +++++++++++++++++++ ...rker-2729f42afbb3a34107349dbe43cc49c6.yaml | 58 +++++++++++++++++++ ...rker-7f6d3b4e502f3e87f036376c050085cb.yaml | 58 +++++++++++++++++++ ...rker-8015d391de62b785680b52c5ead73093.yaml | 58 +++++++++++++++++++ ...rker-d4c7d6015d840d0227eb1573d5a3b347.yaml | 58 +++++++++++++++++++ ...rker-fb54b510af0f0d5e8604602a7c9ddbef.yaml | 58 +++++++++++++++++++ ...-pro-8110fb2b6c7df8f95ef8ae68b2cdb995.yaml | 58 +++++++++++++++++++ ...-pro-8ad67d1554931a18fcf5c6d8fecb94f0.yaml | 58 +++++++++++++++++++ ...-pro-a72c48218cac40242d4a9479585b4525.yaml | 58 +++++++++++++++++++ ...-pro-f0f87fab2cfab311f11b9a274d616536.yaml | 58 +++++++++++++++++++ ...lite-a485120e585260a017fc72fe127dae66.yaml | 58 +++++++++++++++++++ ...ager-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml | 58 +++++++++++++++++++ ...ager-d0e94011e5fe6201731b0911afc2291e.yaml | 58 +++++++++++++++++++ ...ager-d95d6ea5b7b9ab6b188b96396997c452.yaml | 58 +++++++++++++++++++ ...wall-58a6911fd3193aa0bffa110e873b9369.yaml | 58 +++++++++++++++++++ ...wall-9dd9621e217d263471711af1462b33c0.yaml | 58 +++++++++++++++++++ ...n-wp-6cdc10306b381cbc45add2c281d72434.yaml | 58 +++++++++++++++++++ ...ager-ad546711ae594c4c52f6942c35b5d00b.yaml | 58 +++++++++++++++++++ ...ager-e199f05b41749995376359e6d56e2316.yaml | 58 +++++++++++++++++++ ...stem-8cf11b7a12ed4b53c21429a42b2dad73.yaml | 58 +++++++++++++++++++ ...stem-b7a48cf548d48b851bf88b40be93ae49.yaml | 58 +++++++++++++++++++ ...stem-f3b11694ac1b5d77b57c36945d67adf9.yaml | 58 +++++++++++++++++++ ...ress-087877bec152b3c6056ae543a1948ff7.yaml | 58 +++++++++++++++++++ ...ress-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml | 58 +++++++++++++++++++ ...ress-12497cf3a1ab73f82504a379a27c0f10.yaml | 58 +++++++++++++++++++ ...ress-12b3926da3c13269ad9e1faadb8734ac.yaml | 58 +++++++++++++++++++ ...ress-1f34156a3d4672d58e020bb5b55f0b64.yaml | 58 +++++++++++++++++++ ...ress-35cfad6b28404a58bea291114a1dac41.yaml | 58 +++++++++++++++++++ ...ress-3cc56a7c67e3f1095ccd425af8f1f8bf.yaml | 58 +++++++++++++++++++ ...ress-3efe74d4dfd2ffb7e9340cb78fbbba24.yaml | 58 +++++++++++++++++++ ...ress-4b10ad9364b379816e8420c4f6c13bb4.yaml | 58 +++++++++++++++++++ ...ress-52edc6613624a73f45b9edd81d15ffe1.yaml | 58 +++++++++++++++++++ ...ress-5b6638dc9ccd4becc08f9931fb9023fa.yaml | 58 +++++++++++++++++++ ...ress-665258488a89f334d44f72f086862e16.yaml | 58 +++++++++++++++++++ ...ress-67ce6cd2d5f260a7edab2bfeb7b2a875.yaml | 58 +++++++++++++++++++ ...ress-6d3b26eeb9dd4b508b1794df4cfed998.yaml | 58 +++++++++++++++++++ ...ress-71196217c30f569c96ec1f5bb53b87d5.yaml | 58 +++++++++++++++++++ ...ress-7716b5ad1739bacc35b966f53febea57.yaml | 58 +++++++++++++++++++ ...ress-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml | 58 +++++++++++++++++++ ...ress-7cd4e467091cf2ef9c11f5015a5e2616.yaml | 58 +++++++++++++++++++ ...ress-8ac95793b1af58e01fb386297987dde6.yaml | 58 +++++++++++++++++++ ...ress-8e805369c6f828c8254ff169ce6c85f4.yaml | 58 +++++++++++++++++++ ...ress-9300ac45be528f46650e4e8e9c810c53.yaml | 58 +++++++++++++++++++ ...ress-99975e67153f43d6158ad376c50faa87.yaml | 58 +++++++++++++++++++ ...ress-a1074ed3b0484056994227f5bc722d4b.yaml | 58 +++++++++++++++++++ ...ress-a3c23b348d99ad97eeba5901637fc834.yaml | 58 +++++++++++++++++++ ...ress-a6e9d3ad722034f3a564750baa53887c.yaml | 58 +++++++++++++++++++ ...ress-b383deabc0a5d3fd85420cbb993138a3.yaml | 58 +++++++++++++++++++ ...ress-c68a29c96ddfd9ef9aa3807b97890295.yaml | 58 +++++++++++++++++++ ...ress-c8400b062377f9f8018cda91a345e846.yaml | 58 +++++++++++++++++++ ...ress-d5338c51a39110eb82434918065d2ccd.yaml | 58 +++++++++++++++++++ ...ress-d8c2f0e374c51f43e12982dec783de7d.yaml | 58 +++++++++++++++++++ ...ress-e165d1235715cb13a0ff33a2e71acdb3.yaml | 58 +++++++++++++++++++ ...ress-ecf4e36c0bf9bffe5d8065599df28f54.yaml | 58 +++++++++++++++++++ ...ress-eec19c37d540d2e27f564c70a69eb498.yaml | 58 +++++++++++++++++++ ...ress-fdbdaaf65435bbd1ff18dc91bfebb894.yaml | 58 +++++++++++++++++++ ...ress-ffbfea6a2970df28e2afd4173682647a.yaml | 58 +++++++++++++++++++ ...port-22e409e6170e1adf0b8466f8fe714d12.yaml | 58 +++++++++++++++++++ ...port-3bfe2176ab2d6339c4363df34b9c843f.yaml | 58 +++++++++++++++++++ ...port-bcce3c1d97bc388506a917ca0cc1d4ac.yaml | 58 +++++++++++++++++++ ...nkme-aa03d96ef5988adea4feb7a4e959e6b8.yaml | 58 +++++++++++++++++++ ...nkme-e628e638290643fc84f3ec2a1da56d28.yaml | 58 +++++++++++++++++++ ...lery-74c124627aef7bceecd485cb551c158e.yaml | 58 +++++++++++++++++++ ...ages-10dd9a3434e3d079623a841e75c86c90.yaml | 58 +++++++++++++++++++ ...ages-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ages-873e76363814bb4471e426a80a606dee.yaml | 58 +++++++++++++++++++ ...ages-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ages-bea5c55c5c2c8de715c6ad731a47b480.yaml | 58 +++++++++++++++++++ ...ages-c5f8d6adcd0b5a4cfa26527341dbd20e.yaml | 58 +++++++++++++++++++ ...-box-40394fd34f6bdb20b6922c1630b7207e.yaml | 58 +++++++++++++++++++ ...cart-1a6e413024d8d1ae95c30f6878f11970.yaml | 58 +++++++++++++++++++ ...cart-381f90bef3e067367c93c00d3b2f3da3.yaml | 58 +++++++++++++++++++ ...cart-b6431bc8ea172cd6898e2fe9706d240f.yaml | 58 +++++++++++++++++++ ...ress-c8fa2e9308164baca50265fff2c3437b.yaml | 58 +++++++++++++++++++ ...ront-60d0aaf010589e85233668578dac1b45.yaml | 58 +++++++++++++++++++ ...ront-e039fd0b1618532fbbf520ec8b6c6d5b.yaml | 58 +++++++++++++++++++ ...eyka-3a9635822cb7314607ac71f9acb49b4b.yaml | 58 +++++++++++++++++++ ...eyka-4ad4d0b506ee721748cb73d977e55c9e.yaml | 58 +++++++++++++++++++ ...eyka-5079f0a10d3876d504cfe4b7bc45d5bd.yaml | 58 +++++++++++++++++++ ...eyka-575822ff84218761efa49bb8b62fda8e.yaml | 58 +++++++++++++++++++ ...eyka-820bf6eebe51459c99397ba007997b65.yaml | 58 +++++++++++++++++++ ...eyka-adb4907ddb0e6a30a22811f6c9a82a82.yaml | 58 +++++++++++++++++++ ...eyka-ec4b1b9fc14ecc8856f3a0b0d90e5205.yaml | 58 +++++++++++++++++++ ...usel-881bf0ba98d7fd08888e0831b881248d.yaml | 58 +++++++++++++++++++ ...-url-b2d30fafcd7658ca0faf8113857402a7.yaml | 58 +++++++++++++++++++ ...nger-5f7cb88319853fb89e824615700911ed.yaml | 58 +++++++++++++++++++ ...ewer-02d031e7b4eb9aeb9adbec2797214be1.yaml | 58 +++++++++++++++++++ ...ewer-d611c750b72176ae3a8cea6f7095bd28.yaml | 58 +++++++++++++++++++ ...form-34d9d11da38306b6b9ca0ad0c24c767a.yaml | 58 +++++++++++++++++++ ...ting-04c216a7711f03f2d76acb6a4f7b0e8c.yaml | 58 +++++++++++++++++++ ...ting-4614ae1f7c7171ae3257864a2b444504.yaml | 58 +++++++++++++++++++ ...ting-5c39e614f4c21b0d8aa062440989ce22.yaml | 58 +++++++++++++++++++ ...ting-61f36ff0df93fb03b2b83d8b189aa894.yaml | 58 +++++++++++++++++++ ...ting-6e94c2720ffeb0d7aea3042093ebf4ec.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-c66ec1dc83585f4762c2bc3e6a57c02b.yaml | 58 +++++++++++++++++++ ...rlms-164e2c0c315709a0cb3bf1d13c08e3b1.yaml | 58 +++++++++++++++++++ ...rlms-40270377df18382f5029626c6b47720b.yaml | 58 +++++++++++++++++++ ...rlms-7a853f0d8892e49dad6311d7c02311c7.yaml | 58 +++++++++++++++++++ ...rlms-93461439abae08e1620c6e9fa8825bb9.yaml | 58 +++++++++++++++++++ ...rlms-a12053c70cb8a7dc00df12e53f227856.yaml | 58 +++++++++++++++++++ ...rlms-bab5c3b1fc1e564a5e35a65a5e2e3c52.yaml | 58 +++++++++++++++++++ ...rlms-c5715a71dce8eee06efa6336dea28c63.yaml | 58 +++++++++++++++++++ ...rlms-fd8cf6722d31c028cb6e31b0f3dd50d0.yaml | 58 +++++++++++++++++++ ...ypal-a2c108cd8ca415a76c874f9ce93de755.yaml | 58 +++++++++++++++++++ ...ages-4241318cd929615a02a622c5e7416212.yaml | 58 +++++++++++++++++++ ...tbox-2890c7da7df716bb01f0e22088b2fa03.yaml | 58 +++++++++++++++++++ ...lery-6dc5d6d271c910589d9f7947458f0df6.yaml | 58 +++++++++++++++++++ ...lery-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml | 58 +++++++++++++++++++ ...plus-eea39cdb903f15de3e0223c1c0ebeecf.yaml | 58 +++++++++++++++++++ ...opup-e990d85401ec922ea084ebafd475f1d6.yaml | 58 +++++++++++++++++++ ...dion-85706ca0d20495fdfed005cc638cab53.yaml | 58 +++++++++++++++++++ ...dion-e6a664a291db10911439b7200ec5f058.yaml | 58 +++++++++++++++++++ ...-box-243adc14e5399e777d2255721eb66201.yaml | 58 +++++++++++++++++++ ...-box-98df1be3acb90063bf3d77ddbcd92918.yaml | 58 +++++++++++++++++++ ...tton-0e9099d596f12350ed3e94192d2103d8.yaml | 58 +++++++++++++++++++ ...tton-7574ce3ad743a4e2a6c60be8d0253363.yaml | 58 +++++++++++++++++++ ...tton-92e6b40557e12550c3bcd04a5869ae4b.yaml | 58 +++++++++++++++++++ ...tton-cfa91e4d46accd79431b3f983037646f.yaml | 58 +++++++++++++++++++ ...m4wp-d118d4258fb602bb69d7eb996fc782d9.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-ba4f93258decf77226fa4331245d3364.yaml | 58 +++++++++++++++++++ ...mpts-11bdd1e9de931e8eb6881e563e13ef54.yaml | 58 +++++++++++++++++++ ...mpts-bf3eff169429be7d80ad4c0e31426e1e.yaml | 58 +++++++++++++++++++ ...mpts-377e66001fb8e84db9266941f39f3e9d.yaml | 58 +++++++++++++++++++ ...mpts-f0a7cf7b914e091c8c5cd4fb058e543f.yaml | 58 +++++++++++++++++++ ...mpts-f6d106888724001be47f0a5722bc1e1c.yaml | 58 +++++++++++++++++++ ...plus-09ecd7b1a7d7c81f548e33bf4bc7b580.yaml | 58 +++++++++++++++++++ ...plus-20949787d924daf75440ffeec632fd08.yaml | 58 +++++++++++++++++++ ...aded-7a57fe35ffcd96f9b7d9e37175b67bfc.yaml | 58 +++++++++++++++++++ ...aded-83eca41cb757159390f58937921ee2df.yaml | 58 +++++++++++++++++++ ...aded-b0fbe8ed2bd5ede12fc8dff6720e9fab.yaml | 58 +++++++++++++++++++ ...aded-ea959a771940391e9a366a8cf4f552bc.yaml | 58 +++++++++++++++++++ ...tion-f623978da0d0e7e73c44c7f970c44b06.yaml | 58 +++++++++++++++++++ ...cker-472732c123ab155f18372e2d5d026883.yaml | 58 +++++++++++++++++++ ...eper-3ca3d61f633582fe10aacbed8816c6e5.yaml | 58 +++++++++++++++++++ ...rary-1c985f1116559af8ca42f803d48b129d.yaml | 58 +++++++++++++++++++ ...rary-263f0665c552df560e61f28530fa511b.yaml | 58 +++++++++++++++++++ ...rary-45cc93dab6d9a9c50a4569ff06d10d7a.yaml | 58 +++++++++++++++++++ ...rary-56c2ef2b70cad0dbe9025809ba135de2.yaml | 58 +++++++++++++++++++ ...rary-63da1e8a7d368a237a74bc6e90977e1d.yaml | 58 +++++++++++++++++++ ...rary-89d3c8a11ff10e6756f75032f0181833.yaml | 58 +++++++++++++++++++ ...rary-8eaf2fbb99993016796df5f74fcedae5.yaml | 58 +++++++++++++++++++ ...rary-9f1eb3ba72f073c220b0aca4f3eab325.yaml | 58 +++++++++++++++++++ ...rary-b560a7342e5a5547ffb025ec97c31f15.yaml | 58 +++++++++++++++++++ ...rary-bdfe22a56a0cb4f7b1af5e93a2693981.yaml | 58 +++++++++++++++++++ ...rary-dafcf72bc7ea7f4d11e003315c8b31d1.yaml | 58 +++++++++++++++++++ ...rary-ed114df4f201bdff927450bdcae78049.yaml | 58 +++++++++++++++++++ ...rary-f21e31fcba2b16b7b32fe6c94daf21e5.yaml | 58 +++++++++++++++++++ ...ager-3aa9bc9584cc58690e73b867607b46c9.yaml | 58 +++++++++++++++++++ ...-log-1ed30559c3d0fe2013efce706a1a0591.yaml | 58 +++++++++++++++++++ ...-log-200b4a20000c02e3ddb71f780d4da533.yaml | 58 +++++++++++++++++++ ...-log-a70d444a7f2c0c5012e01420603941d1.yaml | 58 +++++++++++++++++++ ...-log-f462ad6f4474c107cb4e1555ab936edc.yaml | 58 +++++++++++++++++++ ...lite-7c00a992b189dd605d955a517ab5ff4b.yaml | 58 +++++++++++++++++++ ...arty-422a9545144ac220769577361c25c2cd.yaml | 58 +++++++++++++++++++ ...arty-4fbe78a27e0a415c3958fe330e75a188.yaml | 58 +++++++++++++++++++ ...arty-a8c0b404c2334a1ce94afe05ce1ef335.yaml | 58 +++++++++++++++++++ ...arty-b3db63dd3833de216814572046aef4ca.yaml | 58 +++++++++++++++++++ ...sper-c53a6d31c98dcde7fc34b4079f07942b.yaml | 58 +++++++++++++++++++ ...sper-c7031edc7c8c818eb8b6f1853fee01eb.yaml | 58 +++++++++++++++++++ ...sper-cc953220a3ab9360fc3b920e9df2ed7f.yaml | 58 +++++++++++++++++++ ...sper-da040359bca67615913785734db30059.yaml | 58 +++++++++++++++++++ ...sper-efbea6db4c4deaef4b1a0846e33065cf.yaml | 58 +++++++++++++++++++ ...ayer-afdb73f09e63d9d93a801e87dd86e9bc.yaml | 58 +++++++++++++++++++ ...nker-dc961a43bf6645987863e2268d4c98e4.yaml | 58 +++++++++++++++++++ ...ugin-9ed1e670781ff936317a3cc7c1d9dd47.yaml | 58 +++++++++++++++++++ ...loon-2fc40f0eebe24b9548355cb63270c890.yaml | 58 +++++++++++++++++++ ...loon-5e0407cf5324ea7a57b720b722b3c657.yaml | 58 +++++++++++++++++++ ...tles-802be145d30a4aee303b74232b95831e.yaml | 58 +++++++++++++++++++ ...osts-3b8bb6063c635c2a8333462322de6a1f.yaml | 58 +++++++++++++++++++ ...osts-7ec69e14aaa720fc8a2decec00730012.yaml | 58 +++++++++++++++++++ ...dget-53b64c2cc89e0070db555cf593bc5061.yaml | 58 +++++++++++++++++++ ...code-b3a8e8167569aa6cba2a5950875c8b0e.yaml | 58 +++++++++++++++++++ ...plus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ache-0436bd17a7ce2057f085dec6812cf1d3.yaml | 58 +++++++++++++++++++ ...ache-303b76a4a36e60deb08e9b0d0435d79c.yaml | 58 +++++++++++++++++++ ...ache-5164946a6f7e888f2eb2eb6be3f062ed.yaml | 58 +++++++++++++++++++ ...ache-5a398aae9f8b9b2a378092433e37f0a2.yaml | 58 +++++++++++++++++++ ...ache-5f623b9be5a2d2349866b91146be2f95.yaml | 58 +++++++++++++++++++ ...ache-e320d6afe142ff2886379823eb8759ba.yaml | 58 +++++++++++++++++++ ...ache-eaef067d144406da863b2f1698405be1.yaml | 58 +++++++++++++++++++ ...ices-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...page-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...lder-130eab166dc7b7692723d0cf797df7b0.yaml | 58 +++++++++++++++++++ ...lder-72add1c0a6273b20aaa451b8bcfd56cd.yaml | 58 +++++++++++++++++++ ...lder-99586092e2e0a8d37b070fc12b9ea29f.yaml | 58 +++++++++++++++++++ ...lder-add895115f53c9c7df4b8eacc636e203.yaml | 58 +++++++++++++++++++ ...lder-b15b4d6b18eb8d6e1301c7d5d1d48c76.yaml | 58 +++++++++++++++++++ ...lite-884857566c11f05a4de329e58ea89043.yaml | 58 +++++++++++++++++++ ...ress-3a5d73d5522f92d087c0f9a99edc5e9e.yaml | 58 +++++++++++++++++++ ...ress-3fe9089ec5b0f3ad95a1bd0baa9d49ae.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...orwc-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...tion-6bf013010e508e54af93e6ae6969b8c7.yaml | 58 +++++++++++++++++++ ...ntor-86dd6dda2cd9ddc6bc20ee836c81850a.yaml | 58 +++++++++++++++++++ ...erce-cc133c83907831da0d998e047e9cfdbf.yaml | 58 +++++++++++++++++++ ...orms-bbcba6e13bde9bf14b1c5b83c187b0ab.yaml | 58 +++++++++++++++++++ ...orms-fbafef1583d66ee6ba3521f29ba434a8.yaml | 58 +++++++++++++++++++ ...ents-41a63082135d50f0e8bf2d19791a60a3.yaml | 58 +++++++++++++++++++ ...gets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...gets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ptim-f364089fe838821aa5875cc23a9bf280.yaml | 58 +++++++++++++++++++ ...tice-a521128c60a3e4447b1ae62129a4837e.yaml | 58 +++++++++++++++++++ ...orti-86ee984a5b2cc7b4ab97dc8a4e8b06c6.yaml | 58 +++++++++++++++++++ ...sync-38a3278b44badbc6201e3e06953e0d59.yaml | 58 +++++++++++++++++++ ...tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...page-4168c6f35e53b3bb6cbc2cd944aa14e6.yaml | 58 +++++++++++++++++++ ...ison-17de09501ab7fb8731b631ebf83d7a67.yaml | 58 +++++++++++++++++++ ...ison-58b316530bd9635132dfd03a76f490ff.yaml | 58 +++++++++++++++++++ ...erce-689c16f1a129b0e9c76ffa7cafd20108.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ment-29a60f726216a180f82f11be4b87c485.yaml | 58 +++++++++++++++++++ ...post-e804c0e7bbe92744b5b1a95863c8b199.yaml | 58 +++++++++++++++++++ ...ages-d92a3b7d2765d4947392cc8fcadba165.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ther-6c261a297dbcd9991a82748059272596.yaml | 58 +++++++++++++++++++ ...ions-68619625dd4330d653c82c2251ebc33a.yaml | 58 +++++++++++++++++++ ...ions-9e153a23809280911bab79339940a337.yaml | 58 +++++++++++++++++++ ...raid-95d961d91144502a2fa4a99f5da6e669.yaml | 58 +++++++++++++++++++ ...raid-b2cac182d257fbe66c64e34a40cb5d58.yaml | 58 +++++++++++++++++++ ...raid-cfb712440be870231ef705d9454b409e.yaml | 58 +++++++++++++++++++ ...raid-e7e716edf9e9518e46de8baeec91561e.yaml | 58 +++++++++++++++++++ ...raid-f129897036a69e5c156d976b88efd3ed.yaml | 58 +++++++++++++++++++ ...y-bp-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...ount-39749a910e46936207c7b87bdd710b5b.yaml | 58 +++++++++++++++++++ ...late-8187837c8e502d478100e3984ca296fb.yaml | 58 +++++++++++++++++++ ...late-d8800c16823f2094a6d5c651646d84fa.yaml | 58 +++++++++++++++++++ ...ests-5a93acfe5c571ac99fbd0be363e6f484.yaml | 58 +++++++++++++++++++ ...ator-1593b88b276363eaaec5e0cb5dde84ae.yaml | 58 +++++++++++++++++++ ...ator-76ed6482cec63261d1357200b150b91d.yaml | 58 +++++++++++++++++++ ...-log-bcfe334c42c567e215f8c00ef33611b7.yaml | 58 +++++++++++++++++++ ...rect-6defdad634c19587e3dd4bf9ad418075.yaml | 58 +++++++++++++++++++ ...user-0fc17742a12c442eca6b1350953762d1.yaml | 58 +++++++++++++++++++ ...user-4c2cc49d3c5ef5aabeaa2eb6035c1bc7.yaml | 58 +++++++++++++++++++ ...user-63d09700de769fbd6e753bbbd4ecabb8.yaml | 58 +++++++++++++++++++ ...user-7c535e169c75c3005c5d2941f3e6968b.yaml | 58 +++++++++++++++++++ ...user-ec624f0e0c8a0434187e7e5ecb5e4e8b.yaml | 58 +++++++++++++++++++ ...t-wp-0eea71d63bea39cf2254e5ce7029cff0.yaml | 58 +++++++++++++++++++ ...-ips-02f07014b96a3edb2c7f1b16bbe0bd90.yaml | 58 +++++++++++++++++++ ...-ips-a8dff80c8e083adc6ae91aa812785cd7.yaml | 58 +++++++++++++++++++ ...ator-138f6d0c8e0041a5a9ff7dcdbdf2c1bd.yaml | 58 +++++++++++++++++++ ...ator-46799564b7a9d79d9f58df7d68a85824.yaml | 58 +++++++++++++++++++ ...ator-beaa951d6e891d70c494baee952c2f4e.yaml | 58 +++++++++++++++++++ ...izer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tcha-eab309830ae20eeb18b4936d022eab3a.yaml | 58 +++++++++++++++++++ ...down-1bbaae2a7a498b205fb902506cd09f7f.yaml | 58 +++++++++++++++++++ ...down-88f9434afbf3660fe0710b500aa999f9.yaml | 58 +++++++++++++++++++ ...down-e2d3306782ffc6dc1c4428ce58ed053c.yaml | 58 +++++++++++++++++++ ...menu-de60bb7a2d8edb4c8b70880b7d8f6006.yaml | 58 +++++++++++++++++++ ...menu-1b2984fc633af00dfb52c6ca6adba0af.yaml | 58 +++++++++++++++++++ ...item-ca7d5b5619ab641f67f5cf5a4e55e4af.yaml | 58 +++++++++++++++++++ ...yler-7d4c259ea0aa11707d8270b3e5db8568.yaml | 58 +++++++++++++++++++ ...lder-0769a7de02fdecf0755ac761d0a440c1.yaml | 58 +++++++++++++++++++ ...lder-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml | 58 +++++++++++++++++++ ...tcha-b6dd04c8ab5f16c9a1c8ee0a8dbc7845.yaml | 58 +++++++++++++++++++ ...ager-16cbd69900a20c2a15cc998b66c6e30e.yaml | 58 +++++++++++++++++++ ...dget-fae7d043617694cc89520aef8cdc5ad0.yaml | 58 +++++++++++++++++++ ...ajax-08c2b329300ceeb5ec4ee1c1cf18abf3.yaml | 58 +++++++++++++++++++ ...ajax-2c0d615cfdc7e7ed23f5751818a97642.yaml | 58 +++++++++++++++++++ ...ajax-7bcea995c31208e7b3ae2001fc2e0fd5.yaml | 58 +++++++++++++++++++ ...ajax-d9979e2b554699fb1813833b2efa0480.yaml | 58 +++++++++++++++++++ ...ajax-ec063e4ec21933641631e905d4f64602.yaml | 58 +++++++++++++++++++ ...ajax-fe796847eb830527572fd03364591cba.yaml | 58 +++++++++++++++++++ ...zure-eebb96ce6566b7b10661225a9046264f.yaml | 58 +++++++++++++++++++ ...nito-29259c5b25c72133b49fdd41585cc3d7.yaml | 58 +++++++++++++++++++ ...nito-a884c095d086c59985c21ee277047e23.yaml | 58 +++++++++++++++++++ ...nito-eebb96ce6566b7b10661225a9046264f.yaml | 58 +++++++++++++++++++ ...mber-208e3b31993605c004819fb7fd167d1a.yaml | 58 +++++++++++++++++++ ...mber-56f2f327244a430ca8fc636a97b2e3cb.yaml | 58 +++++++++++++++++++ ...mber-64bb9b276a0e4073663c51a2aaebe19f.yaml | 58 +++++++++++++++++++ ...mber-6f4c822113b8980ad7d9ecbb478cdfd7.yaml | 58 +++++++++++++++++++ ...mber-a833ece3f343246705571f6788efd405.yaml | 58 +++++++++++++++++++ ...mber-ac531ca44d844146efaf8a60c7e71d41.yaml | 58 +++++++++++++++++++ ...mber-b9138583e38a18d791c31fb8353403c7.yaml | 58 +++++++++++++++++++ ...mber-ec75720f681f6e8a0dfa73dc2af48726.yaml | 58 +++++++++++++++++++ ...ship-5f0a636903de630172f072592f6edff3.yaml | 58 +++++++++++++++++++ ...ship-c5fe48358feae544a0b21efff11ac6fd.yaml | 58 +++++++++++++++++++ ...izer-27753e35f86f0683018abe1867499f91.yaml | 58 +++++++++++++++++++ ...izer-2ab9cce0c78fb172d9887da5c8b47923.yaml | 58 +++++++++++++++++++ ...izer-c17200ba4236119c0958120e5b5ef5cb.yaml | 58 +++++++++++++++++++ ...izer-c30046dfca2652f0c4622a1ba6d544e7.yaml | 58 +++++++++++++++++++ ...izer-cfd6c4a67043af04f9e4f98a73eab3fa.yaml | 58 +++++++++++++++++++ ...izer-dbdf12cf139233f26433b910fe482aa7.yaml | 58 +++++++++++++++++++ ...izer-e3a5de57aa22129643a4695275352679.yaml | 58 +++++++++++++++++++ ...ress-62395a250bd2c0c27cc1d46d95105e15.yaml | 58 +++++++++++++++++++ ...ress-9e304c0c2d27a9a5e4112a85cbe97828.yaml | 58 +++++++++++++++++++ ...ress-bed0cdd535564a50bc24db1db8a6aa5a.yaml | 58 +++++++++++++++++++ ...ress-e364d48aca33a25dca805353038f64e7.yaml | 58 +++++++++++++++++++ ...ress-ff3790cb0753cd7ef435623008e69310.yaml | 58 +++++++++++++++++++ ...-pro-2c903b10bdf887533eb269f90c22486a.yaml | 58 +++++++++++++++++++ ...-pro-6243447eedf5d12aac34558af1ea267e.yaml | 58 +++++++++++++++++++ ...free-426067a3112463f4371753090e35be9b.yaml | 58 +++++++++++++++++++ ...free-493a0e85cf8a05291a415d7ac00931ed.yaml | 58 +++++++++++++++++++ ...more-6608e81097680e6fc28899a61a6c4d0d.yaml | 58 +++++++++++++++++++ ...mate-bbfdb718b30267886c66b70ab8a80fee.yaml | 58 +++++++++++++++++++ ...ider-3290c8bd01d458a3a1d47adc4e14d07e.yaml | 58 +++++++++++++++++++ ...ider-3a725e62a03f5ade4440af8acdd72f67.yaml | 58 +++++++++++++++++++ ...ider-5de20b622f7b3426c6426e4d509bd26e.yaml | 58 +++++++++++++++++++ ...ider-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ider-810ed483cc25df9feef2344d7fe0063d.yaml | 58 +++++++++++++++++++ ...r-wp-c7884dbfd12febc95a975f955686dac3.yaml | 58 +++++++++++++++++++ ...mail-b232a806932eb3a8c3f6cb5279a74846.yaml | 58 +++++++++++++++++++ ...-now-8dc7d267bfbf58557e7062f8892fe14c.yaml | 58 +++++++++++++++++++ ...cons-6765d661ee89fff8539766bb02e51a4e.yaml | 58 +++++++++++++++++++ ...trol-4813c58962647ae4a6f05165adf752a7.yaml | 58 +++++++++++++++++++ ...trol-def2f7014de695ca135f23616af5b3ad.yaml | 58 +++++++++++++++++++ ...-one-dcf62ae8561beba15cd72e7dcb3bf604.yaml | 58 +++++++++++++++++++ ...tion-0e3c2a4eb55659f4b696836b1243ae68.yaml | 58 +++++++++++++++++++ ...tion-7b9f532f4a76fa76bf373061c63e567f.yaml | 58 +++++++++++++++++++ ...aner-7b9f532f4a76fa76bf373061c63e567f.yaml | 58 +++++++++++++++++++ ...aner-b3b6081b87407dd7552a8c8806c2ebc4.yaml | 58 +++++++++++++++++++ ...ogin-7b798e8ca30dadd7d24e9e59ebf40008.yaml | 58 +++++++++++++++++++ ...ogin-7b9f532f4a76fa76bf373061c63e567f.yaml | 58 +++++++++++++++++++ ...ogin-f625397271ed803259763f2838a2e510.yaml | 58 +++++++++++++++++++ ...mize-3e81ca2e699abf0578124ace41c312e8.yaml | 58 +++++++++++++++++++ ...mize-7b9f532f4a76fa76bf373061c63e567f.yaml | 58 +++++++++++++++++++ ...-sms-7b9f532f4a76fa76bf373061c63e567f.yaml | 58 +++++++++++++++++++ ...ools-057556914142c489ed57ccffe54665f7.yaml | 58 +++++++++++++++++++ ...ools-595af782abc65d0b72ff181cfebe8b09.yaml | 58 +++++++++++++++++++ ...ools-7b9f532f4a76fa76bf373061c63e567f.yaml | 58 +++++++++++++++++++ ...hart-d65055d7026996d94428cd7d953a60fd.yaml | 58 +++++++++++++++++++ ...ider-c02cfcdd0ba606abb55e36d23c78177d.yaml | 58 +++++++++++++++++++ ...opup-2ef37c350605f8670255f67b27eb34e5.yaml | 58 +++++++++++++++++++ ...opup-86c38c0f05080f78b36fa8b5f954e871.yaml | 58 +++++++++++++++++++ ...lite-25d30486ae110d12d4fc6bcb4d1b50f5.yaml | 58 +++++++++++++++++++ ...lite-46180ef43d3becfddd0144fed7922297.yaml | 58 +++++++++++++++++++ ...lery-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...lery-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...ress-0d7d13b3763620f659067ef0ef4a2ecc.yaml | 58 +++++++++++++++++++ ...ress-1e549d9fdcaec4289273d20aedde9604.yaml | 58 +++++++++++++++++++ ...ress-283e8dcbf95766b045e888a0d0963e03.yaml | 58 +++++++++++++++++++ ...ress-2b95a61584d1fb1af349c6d1aaeab17d.yaml | 58 +++++++++++++++++++ ...ress-5cd92fdc1b058e752c6530598f5dbea1.yaml | 58 +++++++++++++++++++ ...ress-6a54d7f93d8962555c63afb66d95fb68.yaml | 58 +++++++++++++++++++ ...ress-828638ea1963a58b890deaf22836b2cd.yaml | 58 +++++++++++++++++++ ...ress-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...odes-7b378f7b5f801637805b2f7c350d9359.yaml | 58 +++++++++++++++++++ ...odes-e9fde878e95431546f5a6d5b49c1a171.yaml | 58 +++++++++++++++++++ ...-box-423344ebaf15b72d32ea50cd38a95167.yaml | 58 +++++++++++++++++++ ...elds-57123cd71067e91d2b8fed604519bb45.yaml | 58 +++++++++++++++++++ ...elds-83aff6544a7c919044e1d77f749ea1cb.yaml | 58 +++++++++++++++++++ ...elds-b42951305c8f37d90390c15daed2c5f3.yaml | 58 +++++++++++++++++++ ...nail-415df088a3251b97c66d0b5934825289.yaml | 58 +++++++++++++++++++ ...nail-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nail-f0c24bf90cdba629568a0b0ff9462d8a.yaml | 58 +++++++++++++++++++ ...oice-57964eaa7fd52baacb77455232ddda16.yaml | 58 +++++++++++++++++++ ...ntor-ff7e8af2c4256f9a091a352140252d3e.yaml | 58 +++++++++++++++++++ ...play-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...play-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...form-26a525135ae718590eefdd570c160cb6.yaml | 58 +++++++++++++++++++ ...ader-2d79a02d518f8a5f5caa0b3954bfdd16.yaml | 58 +++++++++++++++++++ ...trol-7012db1ab8aed2692530b77526c2d553.yaml | 58 +++++++++++++++++++ ...-365-7fa8eef52402bb269ab6eda7703db35e.yaml | 58 +++++++++++++++++++ ...asta-0ae464a32aa65e97054ff65a6cd1aac7.yaml | 58 +++++++++++++++++++ ...asta-2a026b3abf7a570fa9c1168601d16d6c.yaml | 58 +++++++++++++++++++ ...asta-346d51a39433f3f2e66028061115352b.yaml | 58 +++++++++++++++++++ ...asta-367d3a73f5196cd91ac495a3ac0b62f5.yaml | 58 +++++++++++++++++++ ...asta-56b6a95b36a0bf98a099f526d08412cb.yaml | 58 +++++++++++++++++++ ...asta-61f3e3f11790d6bb7105200ca41924cd.yaml | 58 +++++++++++++++++++ ...asta-71386814122d58a47245526972d56d40.yaml | 58 +++++++++++++++++++ ...asta-882cb2013f62250b85eee3042b3892e0.yaml | 58 +++++++++++++++++++ ...asta-9bb1e384b35298c0d399c7e7719fdf83.yaml | 58 +++++++++++++++++++ ...asta-9f041e8fa181897986208bfc1b4d15f9.yaml | 58 +++++++++++++++++++ ...asta-a26e581f0f5b31b9784d43dce62a01f2.yaml | 58 +++++++++++++++++++ ...asta-ab348c720a0710e52e24c076c92c0cb1.yaml | 58 +++++++++++++++++++ ...asta-d349201003f1e073b123310455ca065d.yaml | 58 +++++++++++++++++++ ...asta-d853b0e423f8ed0a8520b3730f92bb07.yaml | 58 +++++++++++++++++++ ...date-ff845ece92fe1b8afa1885550aee0170.yaml | 58 +++++++++++++++++++ ...ueue-d32496895039dac95c881975dd0681cb.yaml | 58 +++++++++++++++++++ ...list-04389ec3013ce0dc7cd91731fa525c48.yaml | 58 +++++++++++++++++++ ...list-347522eaa82eb43bdeab94627e4d0f98.yaml | 58 +++++++++++++++++++ ...list-acb7010b85ecf2daba49fdd1b1643bd9.yaml | 58 +++++++++++++++++++ ...list-cabb923e0e757cd8efc2802197c2fa24.yaml | 58 +++++++++++++++++++ ...iver-18ddf3d9a880d4adca00df1dc5502132.yaml | 58 +++++++++++++++++++ ...erce-b001a479011d319ceac5f48bfd2e6d39.yaml | 58 +++++++++++++++++++ ...erce-f9bc7cdb6ab2ec4c7db8c04c4f500136.yaml | 58 +++++++++++++++++++ ...r-wp-27461955b32dd7d4c16736c7fbdc5771.yaml | 58 +++++++++++++++++++ ...r-wp-324bc23c2f374afaaf9c80c2964d5db4.yaml | 58 +++++++++++++++++++ ...r-wp-8bf2330dba276a12443bbd94d613f926.yaml | 58 +++++++++++++++++++ ...r-wp-a83717cc9322e41d87fb191d4173e2d0.yaml | 58 +++++++++++++++++++ ...r-wp-b15c16122e094141ccb76dd4bc1e2cd2.yaml | 58 +++++++++++++++++++ ...r-wp-b628a5c29017f302cc9e3a317e522425.yaml | 58 +++++++++++++++++++ ...r-wp-be854f0427cbc7550be4b51c5093b09f.yaml | 58 +++++++++++++++++++ ...r-wp-d08e992a9c86b0410a9dd2a576aeae42.yaml | 58 +++++++++++++++++++ ...unch-8aaee0ca0357561b8fb5f4652479c99b.yaml | 58 +++++++++++++++++++ ...unch-b6ffb2e5b3bc587f9c59e8240ff1f1b7.yaml | 58 +++++++++++++++++++ ...unch-ee6e6063f9b37d080b9aa6c0cc0d0766.yaml | 58 +++++++++++++++++++ ...unch-ef3aa6c6954785fff0d13c0cd6f5cb85.yaml | 58 +++++++++++++++++++ ...e-sm-249f3208e9e6f6c1af58b4828d3f6027.yaml | 58 +++++++++++++++++++ ...e-sm-45f25702e8ca4952a8a482198d36d226.yaml | 58 +++++++++++++++++++ ...e-sm-cecfff430f19f7261bbe2fd52865b1d7.yaml | 58 +++++++++++++++++++ ...p-wp-6d25ab79e6e7aca51a4387e7aae24c9c.yaml | 58 +++++++++++++++++++ ...lcwp-2e2ba7d6aad1663f173d0b9ff5355c70.yaml | 58 +++++++++++++++++++ ...lcwp-ed77d9c52a0d8e37bd68e8e975c1dcaf.yaml | 58 +++++++++++++++++++ ...ilin-2c0815cfa87364df1650c4d67869632e.yaml | 58 +++++++++++++++++++ ...ilin-66ccaf4314aac7933013ee5ce3827d9d.yaml | 58 +++++++++++++++++++ ...ilin-9be87992402232973e6ef9a016dc8c48.yaml | 58 +++++++++++++++++++ ...ilin-d7263c48cb93df306029f0ae2e2d9062.yaml | 58 +++++++++++++++++++ ...ilin-ebd2e4e996f9584103cdb7fb70162996.yaml | 58 +++++++++++++++++++ ...ress-bc4f6148886fd30cd6ed07bbbfa6c2c3.yaml | 58 +++++++++++++++++++ ...unch-030709cd098214238b78a48c4d533dc2.yaml | 58 +++++++++++++++++++ ...unch-827f2e843a499f08614a8388df30f388.yaml | 58 +++++++++++++++++++ ...ptin-1315b13ed71bd9eb1061038bb0e8996d.yaml | 58 +++++++++++++++++++ ...ptin-845e9efdcaa8e86ee95dfb613d1c9636.yaml | 58 +++++++++++++++++++ ...ptin-d4435c597b00bf3290ee73c887974569.yaml | 58 +++++++++++++++++++ ...poet-0fa38d6cfad2289f1e8e6d314fc29ef3.yaml | 58 +++++++++++++++++++ ...ress-d27df5a411c6747f235668cfd972f89f.yaml | 58 +++++++++++++++++++ ...elay-7e1bdcdaf0857c4f5a72b941792723cd.yaml | 58 +++++++++++++++++++ ...ster-5f27f34098a0ef0f61990648a8a5b251.yaml | 58 +++++++++++++++++++ ...ster-62e392ab6ca8e175fe9a689ec13ed494.yaml | 58 +++++++++++++++++++ ...ster-9b8d56fa1a52c124371a7a0f3bf72770.yaml | 58 +++++++++++++++++++ ...mail-a3abf4c0cdeac928831983eccfebc62a.yaml | 58 +++++++++++++++++++ ...ance-488c9d125819772b803e742156124a9a.yaml | 58 +++++++++++++++++++ ...page-12f99afa0343fc6e2ca09d9458b97d59.yaml | 58 +++++++++++++++++++ ...page-7a445b6bbe1f19472fb82aa1ab2d7a3a.yaml | 58 +++++++++++++++++++ ...itch-3615938f0921b802185b621340537010.yaml | 58 +++++++++++++++++++ ...itch-ebae4a3aba29339c7b56a2e57218464c.yaml | 58 +++++++++++++++++++ ...inwp-25fb56a80aebd27743fad680f237d7c2.yaml | 58 +++++++++++++++++++ ...inwp-373c4ea18f9baeef2872a78ab527c078.yaml | 58 +++++++++++++++++++ ...inwp-519db4fde18bf40cf63b23505a4840eb.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-bbbf9046b8721bc306a1868ce9ab75b5.yaml | 58 +++++++++++++++++++ ...sion-de9c08ef64270e7677f62d388e0cc26e.yaml | 58 +++++++++++++++++++ ...inwp-b8da63590cfb56758e18b031988ea29e.yaml | 58 +++++++++++++++++++ ...inwp-bbdba7157714312ea1ab0d3f73cd870e.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-c7fec950a07b33ca805efa5f4526bb87.yaml | 58 +++++++++++++++++++ ...sion-d432b5b11d667b6f9fe5cd55370cdb88.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-da3f36dbc6e00ae538ec7700a4a5da0a.yaml | 58 +++++++++++++++++++ ...sion-f0fbe6fb8cd2394ff4cf5755f2e3ce65.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-88e0ecb64f4709b7a4173b13eb85c3b6.yaml | 58 +++++++++++++++++++ ...hild-02abc776653c0e9d69b2d7bbbb0997b8.yaml | 58 +++++++++++++++++++ ...hild-0d279c099198801fd51b2e6ed08b0aa7.yaml | 58 +++++++++++++++++++ ...hild-5c361cd216288a792b3417e2eea8c64b.yaml | 58 +++++++++++++++++++ ...hild-b8da63590cfb56758e18b031988ea29e.yaml | 58 +++++++++++++++++++ ...hild-de951cb1c07b8f1a00e6e15f2067e75c.yaml | 58 +++++++++++++++++++ ...hild-f00ee035f691e855432693cfeab4496d.yaml | 58 +++++++++++++++++++ ...orts-b48bd5a9b387deec2652bf65a2f60d36.yaml | 58 +++++++++++++++++++ ...orts-ca770a3a0e8cd6c16a964b242179e2c5.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-cacc6911c40efb999d1fe86f0d0191d6.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-8f1eedab61ce04ff36cedd6b1737dcab.yaml | 58 +++++++++++++++++++ ...sion-ebaaeb684636cb787d78e7b3c484407e.yaml | 58 +++++++++++++++++++ ...sion-f6463e889774b4038473eb08cfdfa039.yaml | 58 +++++++++++++++++++ ...sion-3b5c9ebf6b5cbb215fd772c13336a403.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...inwp-db895078637698aba713d17b02ab863a.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-bbbf9046b8721bc306a1868ce9ab75b5.yaml | 58 +++++++++++++++++++ ...sion-c7fec950a07b33ca805efa5f4526bb87.yaml | 58 +++++++++++++++++++ ...sion-18f9f53e2e66e0e510b2dccb3d10627d.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-ef3286d81d94e9b713e6b4a272249cba.yaml | 58 +++++++++++++++++++ ...sion-3959344c0c7e5999442d4341d93fe901.yaml | 58 +++++++++++++++++++ ...sion-49a8bd4f442f3ed7ef68fc2e1242b1b6.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-aab60d7e635c7cb328946a00c5cb0802.yaml | 58 +++++++++++++++++++ ...sion-9731ebff7e31801f5a40ae7c87af6896.yaml | 58 +++++++++++++++++++ ...sion-04f298147815233cd89825cce559844d.yaml | 58 +++++++++++++++++++ ...sion-08e41a2e706bfd45d56edb520c5805b5.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-1700178605ea1a028eb5734d4a1eaad7.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-c009600ac01b461b216f777bf4f27175.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-8b15dcc48a6f92077370cb4c6934bd38.yaml | 58 +++++++++++++++++++ ...sion-1a7f5e2f6b8dc141b3974d01e70ce6c4.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-2aa015126a1a525f86550f7ae828f7a6.yaml | 58 +++++++++++++++++++ ...sion-7bfb92cd98981d6d2231287741115d7d.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-5bb6026096b7bf370409b664b0a819cb.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-b093b4fe361511a13e571267d2dc54e9.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...sion-853763a7a24f0714b558d69285e810e8.yaml | 58 +++++++++++++++++++ ...sion-aca127a8ed0bd7922687fe103f18d74f.yaml | 58 +++++++++++++++++++ ...sion-089c7908dc4fffc678d9e3d75fcc62a9.yaml | 58 +++++++++++++++++++ ...sion-09213ac628577f10fc1f9d7850e68118.yaml | 58 +++++++++++++++++++ ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 58 +++++++++++++++++++ ...tive-c1cb13846b68b46c9143c497ddfb2bf6.yaml | 58 +++++++++++++++++++ ...lper-6bd5d755fdb18da0e4495ddee37a2528.yaml | 58 +++++++++++++++++++ ...lper-86524d953838185228f7ca0bb9dd8a04.yaml | 58 +++++++++++++++++++ ...tion-46200eda6d80c305dc0a5fd8d6c3597a.yaml | 58 +++++++++++++++++++ ...nder-54a5c8f84066c82a1f84ab85f1710141.yaml | 58 +++++++++++++++++++ ...ails-a2bc40be2dd87e9dcd0977a6fdf140d6.yaml | 58 +++++++++++++++++++ ...ails-a5a6d2493729bf3090ce1785835756c3.yaml | 58 +++++++++++++++++++ ...ping-644c7cae519f04e689e17393d43159b0.yaml | 58 +++++++++++++++++++ ...moon-bf850209f75ffce28cf6dbc62d1d3ffe.yaml | 58 +++++++++++++++++++ ...moon-fcb2137e4fd0eeb6eaa0769932ceae96.yaml | 58 +++++++++++++++++++ ...oard-33e169ef58595c551d71b2a0f254c1a0.yaml | 58 +++++++++++++++++++ ...oard-4e66527828b974bdf1935dbf3ae98ee7.yaml | 58 +++++++++++++++++++ ...oard-50a5bfd5ef4ea3d67f1cc1653c0ac79b.yaml | 58 +++++++++++++++++++ ...oard-b9040953fd9d7380144b780f2d4080d6.yaml | 58 +++++++++++++++++++ ...-web-28c1871bb01e37ab60acecfab790c02b.yaml | 58 +++++++++++++++++++ ...-web-a43440257ec4eba085c1ac2ce540e1bf.yaml | 58 +++++++++++++++++++ ...crop-e5eb2b15a41ab9ee60dcb2af1f87d2ee.yaml | 58 +++++++++++++++++++ ...berg-f3ae8d3614658d0602179cdf953c8cf0.yaml | 58 +++++++++++++++++++ ...erce-33149871db85e014a52f28e4a7d38f17.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rker-98cc3184ae2ac53e6ec93de75027842b.yaml | 58 +++++++++++++++++++ ...lite-276d9e37b697911176c96dd2534c5db7.yaml | 58 +++++++++++++++++++ ...page-13d4f5660b4ca1f115f6a5db8348287c.yaml | 58 +++++++++++++++++++ ...plic-392f3d0edacca22b6e8516ac27324815.yaml | 58 +++++++++++++++++++ ...lite-392f3d0edacca22b6e8516ac27324815.yaml | 58 +++++++++++++++++++ ...ress-001b828c3c08777c5f66954153002511.yaml | 58 +++++++++++++++++++ ...ress-0db4927fc2e66efc196aae8bda2e501b.yaml | 58 +++++++++++++++++++ ...ress-14a7ffa14fbeefc172000dc0caefb552.yaml | 58 +++++++++++++++++++ ...ress-29adc02045150a72bc0879e8ef2cedbd.yaml | 58 +++++++++++++++++++ ...ress-6bf1979859a94fbe33542b88abb0e15d.yaml | 58 +++++++++++++++++++ ...ress-7b6a78f327e3069338279750b3f26ae1.yaml | 58 +++++++++++++++++++ ...ress-a32c5004dd8e3051476b1d2ace4665f9.yaml | 58 +++++++++++++++++++ ...ress-bed91f2c82382c1fad6f81b58becdcb8.yaml | 58 +++++++++++++++++++ ...ress-f49ac78d75e6d3fb0dc3afda46d041dc.yaml | 58 +++++++++++++++++++ ...ress-f938f1ab4ea9e7929903077ead3a87cb.yaml | 58 +++++++++++++++++++ ...pple-34f90d387401d288923a3d216c026fe2.yaml | 58 +++++++++++++++++++ ...pple-48cf291038d407d0c14437de80bf836d.yaml | 58 +++++++++++++++++++ ...pple-54bc1daf26907dc59a5c7876a142ff1b.yaml | 58 +++++++++++++++++++ ...pple-73081b1f6f4e13a9e6e969eba5e746fc.yaml | 58 +++++++++++++++++++ ...pple-bc55ea7b509124d1a77831d4400c5030.yaml | 58 +++++++++++++++++++ ...pple-f9078038dec7d199edb0413f76661495.yaml | 58 +++++++++++++++++++ ...rker-13b8a58f1828f2c64647f6e908737c8f.yaml | 58 +++++++++++++++++++ ...rker-22c2313f6ddd97279a9a6e05569e552c.yaml | 58 +++++++++++++++++++ ...rker-a7b5b9f7aae561ff960ba955e7bc8f21.yaml | 58 +++++++++++++++++++ ...rker-ad02e1c1e6ce500678284236a257328f.yaml | 58 +++++++++++++++++++ ...rker-fcbdec1ff65d61610081880538a802c5.yaml | 58 +++++++++++++++++++ ...maps-e101fa87e9e9a3f0059378f1f396b6c6.yaml | 58 +++++++++++++++++++ ...psvg-e1d4b31d2e512648b34fb410fc6ac542.yaml | 58 +++++++++++++++++++ ...maps-303bc652d47c2a787ae26772587ef7fc.yaml | 58 +++++++++++++++++++ ...pwiz-47ec4d19442547ad0d7289d6f4804147.yaml | 58 +++++++++++++++++++ ...mark-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml | 58 +++++++++++++++++++ ...osts-cf0f772efb4c9beac6971570b02c3073.yaml | 58 +++++++++++++++++++ ...mmer-79bf49b5f0577e5e924d09bc9548c465.yaml | 58 +++++++++++++++++++ ...oved-050d7cb19f5f214c16e87b6deb3805d1.yaml | 58 +++++++++++++++++++ ...oved-c99fdfdd6f51accf3ed6f44f28e23a84.yaml | 58 +++++++++++++++++++ ...r-io-cca1bdac61a7e1b80d3b722e283a8084.yaml | 58 +++++++++++++++++++ ...r-io-fb2c63718b2382dbcdfb9fbdbea83949.yaml | 58 +++++++++++++++++++ ...rter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...izer-3f528c05be1996d33dd348d92ec23461.yaml | 58 +++++++++++++++++++ ...ance-127a32a3d7486f122ba18339dee95397.yaml | 58 +++++++++++++++++++ ...king-8d38cd4f2bf680c2b1b244824fc691f8.yaml | 58 +++++++++++++++++++ ...ewer-b4b5d874a62067dd72085668d3cf4b24.yaml | 58 +++++++++++++++++++ ...work-95b7b2700fb0920c45a7d61cccd555c1.yaml | 58 +++++++++++++++++++ ...arer-6b3f6a43a6261f36339646ed344d5b53.yaml | 58 +++++++++++++++++++ ...arer-7512032bfe4cd740c20bf708ea302987.yaml | 58 +++++++++++++++++++ ...arer-b4206097b7af70105fc04d8db27b43ec.yaml | 58 +++++++++++++++++++ ...arer-d7a376bac039b7fcdb01d011343f232a.yaml | 58 +++++++++++++++++++ ...tags-cd31c4013d622ee5e8af44850bd1bbae.yaml | 58 +++++++++++++++++++ ...tags-75516a4a673e70626d0531442a9c901c.yaml | 58 +++++++++++++++++++ ...sers-317ac7f940ff6a7252e873e1a08b195c.yaml | 58 +++++++++++++++++++ ...ator-5d3fabeb2abe10bffbf3f69299e86974.yaml | 58 +++++++++++++++++++ ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dons-5ad76356f82ec882d88e003164818843.yaml | 58 +++++++++++++++++++ ...dons-5f2ebf4302880b4451790eb5366fdd55.yaml | 58 +++++++++++++++++++ ...dons-8583fcd7447422df9f9725341fb87a81.yaml | 58 +++++++++++++++++++ ...dons-963646e7d7bb88af1ad24a0f5a61ee55.yaml | 58 +++++++++++++++++++ ...dons-ab471e8dcd5ca84019365a59d356e23b.yaml | 58 +++++++++++++++++++ ...dons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dons-e068f616c0efa424554358743fa4c2b1.yaml | 58 +++++++++++++++++++ ...dons-e3418f180f0cc9cfc471a66e2f29ee79.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ents-2d24ccd35c9f49dd6df7abc0d20f88ce.yaml | 58 +++++++++++++++++++ ...ider-1f1264fb01a80102a1939e77505f347e.yaml | 58 +++++++++++++++++++ ...ider-2278ff8679ddb3e8d29bcac77bb31452.yaml | 58 +++++++++++++++++++ ...ider-37adca39d8686698946f55ba4e66fb39.yaml | 58 +++++++++++++++++++ ...ider-7ade56e168a75307ee8a4a01c082f207.yaml | 58 +++++++++++++++++++ ...ider-af6803b7659222cbe48ed01e4976d1d1.yaml | 58 +++++++++++++++++++ ...ider-b6500312e7eff76638bb1a536f1d8f8c.yaml | 58 +++++++++++++++++++ ...ider-ec15f998366a90597f3ae6005cf6d8b3.yaml | 58 +++++++++++++++++++ ...ider-f99c7ac14f9b6aff3ca4eaa0306e77ee.yaml | 58 +++++++++++++++++++ ...ider-0cbc0458d9514fd3618b0ed89f2d3c18.yaml | 58 +++++++++++++++++++ ...ider-5c92085932752374a04afe791196ed34.yaml | 58 +++++++++++++++++++ ...ider-624a2aa57869ce0516a56db0d2b7ba1e.yaml | 58 +++++++++++++++++++ ...stem-0f202e755d7e2e49728e189143faa82e.yaml | 58 +++++++++++++++++++ ...stem-16f3aadbc51503db1bc43aad84f72646.yaml | 58 +++++++++++++++++++ ...stem-296c49b1bc6f342e92d02be77b2dbe14.yaml | 58 +++++++++++++++++++ ...stem-44e1f2ffb01f5ea3ea36f27a7c236058.yaml | 58 +++++++++++++++++++ ...stem-4f9f0369d878a015f409ab24ea975cbb.yaml | 58 +++++++++++++++++++ ...stem-55dfb8067a9d9a28485a43b25b96a7c4.yaml | 58 +++++++++++++++++++ ...stem-5a1407576dc4eee8a15af816c107132f.yaml | 58 +++++++++++++++++++ ...stem-99f4448a717d374af03d744cdc0eb9ad.yaml | 58 +++++++++++++++++++ ...stem-9ab9e985d63e7f8faa4ebcb1df0816d3.yaml | 58 +++++++++++++++++++ ...stem-af86ce237a4bf58d93744674227f4830.yaml | 58 +++++++++++++++++++ ...stem-bf3837a16a33f16813a6b85f5185aa0d.yaml | 58 +++++++++++++++++++ ...stem-f9e11f76930ee22e20526313ed9f389b.yaml | 58 +++++++++++++++++++ ...rm-7-2c15d4e93f6f6d616a273e49657a41e3.yaml | 58 +++++++++++++++++++ ...ntor-639d631ea2d71e82d52ba35e11baa85c.yaml | 58 +++++++++++++++++++ ...ntor-eab3c1f0807691261d40289ccf106a32.yaml | 58 +++++++++++++++++++ ...nion-41bbba0b761effafe973f064cede1988.yaml | 58 +++++++++++++++++++ ...tion-2c787e56b33949d16c5a8fc8e49284cd.yaml | 58 +++++++++++++++++++ ...tion-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml | 58 +++++++++++++++++++ ...atex-c72bfd99ca891cab28a20713d4d5fa8e.yaml | 58 +++++++++++++++++++ ...tomo-3df1b6184a3059e9fa9458d9fe22e2e2.yaml | 58 +++++++++++++++++++ ...lery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ader-7eefbdb00f6e0dd3aa9ee384b653f5e3.yaml | 58 +++++++++++++++++++ ...erce-af46d9a5be7a2ee874bad5ee679a36f8.yaml | 58 +++++++++++++++++++ ...icks-7793772eece0aff14b3b4690844c3621.yaml | 58 +++++++++++++++++++ ...icks-cb8a70925c9490ee47d5d493a807b6ac.yaml | 58 +++++++++++++++++++ ...tons-1cc06f74e3aed2807f1fd2894b6227eb.yaml | 58 +++++++++++++++++++ ...tons-2cfa41593b5c54dbbe7f94408a704c8b.yaml | 58 +++++++++++++++++++ ...tons-3394a8c6bca4050b8fcb857b11ee3b36.yaml | 58 +++++++++++++++++++ ...tons-47fd93f8dbf38d292961db96282356d5.yaml | 58 +++++++++++++++++++ ...tons-5e63735b86336209453cce97844f636d.yaml | 58 +++++++++++++++++++ ...tons-6576cec6cc72bf932987474c7e82dbd1.yaml | 58 +++++++++++++++++++ ...tons-791eff0c2052bc2e9edb50c4e621f28e.yaml | 58 +++++++++++++++++++ ...tons-b87b09efd2ae58c86dc8e5fdf3e23221.yaml | 58 +++++++++++++++++++ ...eria-4d573fe9c428ad3a04750d4555eab402.yaml | 58 +++++++++++++++++++ ...eria-e066c5d256834fe1f65bdb778f74e19e.yaml | 58 +++++++++++++++++++ ...ader-3e1b73d443d99821d0af1b91c016f547.yaml | 58 +++++++++++++++++++ ...ader-ccaa11bd28c41ea215a8627a09fdb85f.yaml | 58 +++++++++++++++++++ ...sage-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml | 58 +++++++++++++++++++ ...ader-a6d6119e6304bac68d182070bb782f60.yaml | 58 +++++++++++++++++++ ...amer-7678a4c43bf3743b099ecbdc547aa500.yaml | 58 +++++++++++++++++++ ...aner-f41915eaa49875fc0d02563613a044ce.yaml | 58 +++++++++++++++++++ ...load-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ader-385ab086e084dcab7761c5868fab9464.yaml | 58 +++++++++++++++++++ ...ayer-6833c69669f3b6c1ff537772ca9a9c7f.yaml | 58 +++++++++++++++++++ ...ager-0096aa18a8e24a189b34368fe050792b.yaml | 58 +++++++++++++++++++ ...ager-54b9a63aa780af450d6501f70863fee9.yaml | 58 +++++++++++++++++++ ...ager-9116ab86d599e20ae25aa3123513f61a.yaml | 58 +++++++++++++++++++ ...nced-4c943f748aca793575933803bba5acc5.yaml | 58 +++++++++++++++++++ ...ager-bf399dd02aeab6e8c35f662b2b5169e5.yaml | 58 +++++++++++++++++++ ...izer-00bb27b1e1befeeadd2692ce2f1a6969.yaml | 58 +++++++++++++++++++ ...amer-22a2226407a4248640044dd2df483fba.yaml | 58 +++++++++++++++++++ ...amer-6234c54583fe97f4b335659ad6e8c2c3.yaml | 58 +++++++++++++++++++ ...amer-6e4ac4275a14e860f6690b3cd168f08e.yaml | 58 +++++++++++++++++++ ...amer-9a06183bb7fd52c18dc709884017b765.yaml | 58 +++++++++++++++++++ ...amer-e76a25dd6d02a9976e1a45024d852c58.yaml | 58 +++++++++++++++++++ ...-ftp-0efd51ee11e484e5ac059494b28050b4.yaml | 58 +++++++++++++++++++ ...-ftp-28349c1e621b4d3993d035aeb46ae68e.yaml | 58 +++++++++++++++++++ ...-ftp-c3c6f65072fe37bbbc2ef7dbe119003d.yaml | 58 +++++++++++++++++++ ...tant-0b903181e53a3afd2853d8a217d8de8d.yaml | 58 +++++++++++++++++++ ...tant-1071684e8b4fbe11ac61e0256dfaba92.yaml | 58 +++++++++++++++++++ ...tant-1749acb4ff55d423ebb0f0a82a7c5808.yaml | 58 +++++++++++++++++++ ...tant-1bcb114ae8bffc625089b17287fe97ca.yaml | 58 +++++++++++++++++++ ...tant-2e52fc4f7a8504883023eba2284cc957.yaml | 58 +++++++++++++++++++ ...tant-315158d01f8d35cf2208dddc8f7964b3.yaml | 58 +++++++++++++++++++ ...tant-4028fc1d58c158acfb13c46a4db5a2fb.yaml | 58 +++++++++++++++++++ ...tant-5541a58ff6aa2455768527014bebcd1e.yaml | 58 +++++++++++++++++++ ...tant-7a4b57c89eea61dbc376b3ebcfe96a70.yaml | 58 +++++++++++++++++++ ...tant-c35f9ed6b93a44d06dd09e34e66b7586.yaml | 58 +++++++++++++++++++ ...tant-cd5bfb58064b9745ccbd3f1f59ac312b.yaml | 58 +++++++++++++++++++ ...tant-eb721251db16f750bb7b6d9b4bcc4dbd.yaml | 58 +++++++++++++++++++ ...ries-01dd63a5f8faf96a00782f6bc3eb47be.yaml | 58 +++++++++++++++++++ ...lper-2c2851e9d6588865c8c62a92765f5da7.yaml | 58 +++++++++++++++++++ ...plus-15ea5684525ea85792493d1e42c50ee1.yaml | 58 +++++++++++++++++++ ...plus-2fee4732545e71342d59a2938407fe7a.yaml | 58 +++++++++++++++++++ ...plus-33bc7d755c896ae147d69853031aefe1.yaml | 58 +++++++++++++++++++ ...plus-7f361b8e267eec159cd338045858bebf.yaml | 58 +++++++++++++++++++ ...list-62fa04687cc3a59a6c68564d31d19c75.yaml | 58 +++++++++++++++++++ ...list-9a2c39e647de10bdf5506fe83c7446b4.yaml | 58 +++++++++++++++++++ ...rror-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...tags-5a607f07c740543865789590cbca6639.yaml | 58 +++++++++++++++++++ ...sage-3a2cab0afb3070dc0c2fdad7d3b7f22b.yaml | 58 +++++++++++++++++++ ...lite-b53850514eba837c1bf2ca4cf00a35b7.yaml | 58 +++++++++++++++++++ ...lite-dee11a999eea8acc0c1d0780e652bd48.yaml | 58 +++++++++++++++++++ ...ions-167d9672411be44feb72a5175fd0987c.yaml | 58 +++++++++++++++++++ ...-sms-030658ba5cc0f002fdffef84e42ae14b.yaml | 58 +++++++++++++++++++ ...-sms-167d9672411be44feb72a5175fd0987c.yaml | 58 +++++++++++++++++++ ...-sms-8536de3de245d6a4ab6eeac77e95e618.yaml | 58 +++++++++++++++++++ ...atic-0b95cfad1999ef6bac1ef79ebeeb624d.yaml | 58 +++++++++++++++++++ ...atic-66ac5cf55cb601e1e04c93898023eadb.yaml | 58 +++++++++++++++++++ ...atic-957e023e162fd65b104346c605f19c7a.yaml | 58 +++++++++++++++++++ ...atic-d708fed52a98da33c7b5f777938fb90a.yaml | 58 +++++++++++++++++++ ...anel-2f4da607198689ec8ae90e2f847fd2a8.yaml | 58 +++++++++++++++++++ ...eate-4db517b5824cdbfb59767dcfce03ed88.yaml | 58 +++++++++++++++++++ ...core-0e249eccad21574e2f41d6b727c12756.yaml | 58 +++++++++++++++++++ ...news-a0535ae9a08f66698f91957812ef49de.yaml | 58 +++++++++++++++++++ ...team-a2ba0d175d26a5652fc4c3dde4656860.yaml | 58 +++++++++++++++++++ ...cita-301e81e7a190a838bf006476907547b4.yaml | 58 +++++++++++++++++++ ...cita-647a040d673e13659115740c0e6a164f.yaml | 58 +++++++++++++++++++ ...cita-80701456edd5634e54dde4f94f03d86e.yaml | 58 +++++++++++++++++++ ...cita-85ec9094d25566acdd5938abeeebadbd.yaml | 58 +++++++++++++++++++ ...cita-b65c2cbf689ff5e6c36de8e6ea88fb1d.yaml | 58 +++++++++++++++++++ ...cita-c1f8f105aad937fe6b4d3f7e729e9b4d.yaml | 58 +++++++++++++++++++ ...oser-57d7eb4c0bda23c172922977bec66f98.yaml | 58 +++++++++++++++++++ ...oser-aef5861873c712667e57c762ed3ff81e.yaml | 58 +++++++++++++++++++ ...oser-e462c11578c3d7efd1d373387e69d961.yaml | 58 +++++++++++++++++++ ...ntor-e12b4eb0afaf97081bdd86d34fb980c9.yaml | 58 +++++++++++++++++++ ...orms-ddabc756c7ddb5aa3f2db005373f60ba.yaml | 58 +++++++++++++++++++ ...menu-3c9418584b935e41a1f48b31c0a5f181.yaml | 58 +++++++++++++++++++ ...menu-951a77020b9388eb21ea61b4c1dfd9f6.yaml | 58 +++++++++++++++++++ ...menu-68c192a64ec1c6719c741f7b5a598887.yaml | 58 +++++++++++++++++++ ...menu-fc3a86631dfc485c0a87a802663d412e.yaml | 58 +++++++++++++++++++ ...ayer-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...dget-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...dget-30f045a25a21ac539fd3f995d744abbd.yaml | 58 +++++++++++++++++++ ...dget-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...maps-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...hare-7f939cb3e37ce54ad131378445cfa889.yaml | 58 +++++++++++++++++++ ...odes-bee37332f6e8a8436cc61a9d140d558a.yaml | 58 +++++++++++++++++++ ...dget-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...dget-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...dget-065fb6634c2979f9a8dbb1a289a68a9b.yaml | 58 +++++++++++++++++++ ...dget-12cfc5e2c42c1035bf0a62b514ef0564.yaml | 58 +++++++++++++++++++ ...dget-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...dget-f41b10488dd7d69ac4748b8c313105e4.yaml | 58 +++++++++++++++++++ ...dget-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...dget-e224c1cc32d6c05f266106ae47b5db38.yaml | 58 +++++++++++++++++++ ...-ago-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...rter-b1fa67bf969fdb68e71efc5cd730124e.yaml | 58 +++++++++++++++++++ ...acao-d9141583a795a1e4a70084cd717fd9ac.yaml | 58 +++++++++++++++++++ ...oval-3a91d6c48afcaf4ec202f8da0ad11a12.yaml | 58 +++++++++++++++++++ ...base-e4f24d3eaa8049812bc7024a030b7c83.yaml | 58 +++++++++++++++++++ ...hero-59ccb7283840efae740fe390413a3bc9.yaml | 58 +++++++++++++++++++ ...odes-e0d43cef694a102644215555aaaf71de.yaml | 58 +++++++++++++++++++ ...ouse-9e5e9e74e35f7340ef7a86eda535ec55.yaml | 58 +++++++++++++++++++ ...ress-bc9d740ab02dbe4e65f7bf071f0e62db.yaml | 58 +++++++++++++++++++ ...oads-dd0bbd05ca9ba09666d0154a80a50eb1.yaml | 58 +++++++++++++++++++ ...port-3faf0e242f65e17c979c6f608e04b73e.yaml | 58 +++++++++++++++++++ ...port-44b1b2f0eb9245a5807308d2327328e8.yaml | 58 +++++++++++++++++++ ...list-c881e85c226dfb23c551995ac2bfcc0e.yaml | 58 +++++++++++++++++++ ...stic-6d746a5f0aa53afdd212e69305550ec1.yaml | 58 +++++++++++++++++++ ...erce-64b1bd7efe43945fafb1a600e8b59985.yaml | 58 +++++++++++++++++++ ...only-2aa29c629074136ede505c61ef73b338.yaml | 58 +++++++++++++++++++ ...only-384486cdf221789bfec827528caf2a6d.yaml | 58 +++++++++++++++++++ ...only-c2edf18b1dc2c5d697f81727cd0bac3f.yaml | 58 +++++++++++++++++++ ...site-e54255e9a743040c053c6d8e8f67ce92.yaml | 58 +++++++++++++++++++ ...rary-19255b523a36605faa1b692fe0bb8412.yaml | 58 +++++++++++++++++++ ...rary-59c9b879f516cc2f3ec6fb5323e1397d.yaml | 58 +++++++++++++++++++ ...rary-6a2ef437dbd84b379d13828c6767a7f7.yaml | 58 +++++++++++++++++++ ...rary-f4052902eccc72acecc4529d7a789e28.yaml | 58 +++++++++++++++++++ ...ugin-9cb69a500db940ecfdbb3ba869c26c38.yaml | 58 +++++++++++++++++++ ...cons-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...mage-34dac14ec559cdbb5998de7d415317dc.yaml | 58 +++++++++++++++++++ ...mage-800833211422a31fa0bc329389e6ba63.yaml | 58 +++++++++++++++++++ ...mage-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...uler-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...trol-15bf765de2821299511e8bf3105d6965.yaml | 58 +++++++++++++++++++ ...ions-211f53d8b1b52b0d7d117c8d6be4a364.yaml | 58 +++++++++++++++++++ ...ions-2624b69820d22e5b5127f2b411babf77.yaml | 58 +++++++++++++++++++ ...ions-52f3f56cac58e66f1b3bbe271591fbea.yaml | 58 +++++++++++++++++++ ...ions-8a39f2bd8431601e1f483135ec0a1cca.yaml | 58 +++++++++++++++++++ ...ions-901a8544f8fe096e9fdc9630ea2bd15f.yaml | 58 +++++++++++++++++++ ...code-9fdc305e956b483dd32edefc410a0147.yaml | 58 +++++++++++++++++++ ...pper-d19b62fdb46f9085fa90ed6dd74d5a4a.yaml | 58 +++++++++++++++++++ ...ubar-26d6e68f9f68d57837f1391aa39f629b.yaml | 58 +++++++++++++++++++ ...ubar-fa79ef441dd7b35cf3488c2a42a0ef43.yaml | 58 +++++++++++++++++++ ...lery-66b4e3e9081347f407fc784e61ce0c30.yaml | 58 +++++++++++++++++++ ...lery-c5cb3504c5d5a8aca1e1480362831116.yaml | 58 +++++++++++++++++++ ...lery-db3802f450d9e0fa899a4b52caf267f5.yaml | 58 +++++++++++++++++++ ...resh-19904e18d7847af1a770f2d024bfee5b.yaml | 58 +++++++++++++++++++ ...nion-3816de1a2f06ca9d6d7c8b9dfb0a51bf.yaml | 58 +++++++++++++++++++ ...nion-a94f9a8cf90bb953afc0d4af139b3df4.yaml | 58 +++++++++++++++++++ ...cker-5b0c7f3f3f3d8554824f38539044b215.yaml | 58 +++++++++++++++++++ ...-box-00301543cb972104eceace7da89e80f4.yaml | 58 +++++++++++++++++++ ...-box-1b89ecf879d1fbee7de1501d6959af35.yaml | 58 +++++++++++++++++++ ...-box-dc129067ca38c26e19992abcd62ec625.yaml | 58 +++++++++++++++++++ ...-box-fcea98b14977cde9054b36a1f61fabb1.yaml | 58 +++++++++++++++++++ ...tbox-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...tbox-cfbe849419c020c14e6592e12a1dd070.yaml | 58 +++++++++++++++++++ ...ager-85f58ceac5f2aff68a6dbc6ee57ae093.yaml | 58 +++++++++++++++++++ ...-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ides-d785c662ffdd5bb603cbd342128e597d.yaml | 58 +++++++++++++++++++ ...form-0a04782a874d0e98b450ea3140cd608d.yaml | 58 +++++++++++++++++++ ...form-1cd960c12693f517a3ddc1f2dd996093.yaml | 58 +++++++++++++++++++ ...form-1e853b05728a99a8747a224a5333ce69.yaml | 58 +++++++++++++++++++ ...form-1ececa6da15663bf0de4cd1f9cf0b9d9.yaml | 58 +++++++++++++++++++ ...form-2f98768ab3ca0c5e24ef32eeb6e8633c.yaml | 58 +++++++++++++++++++ ...form-4069751e80b8d8e6ebfbb3d8b76ab1b9.yaml | 58 +++++++++++++++++++ ...form-547f6d438086b7c901daed3b548b280c.yaml | 58 +++++++++++++++++++ ...form-5821b8bbdf52273dc284ba9fb20cfb12.yaml | 58 +++++++++++++++++++ ...form-5ca6c532bc755bf0bf6cce4098713b54.yaml | 58 +++++++++++++++++++ ...form-654990e546559285765575a21c3a354c.yaml | 58 +++++++++++++++++++ ...form-7ec1193c499ff8ca62486bd031ee3b72.yaml | 58 +++++++++++++++++++ ...form-80129a218b0d8978bbb5382fd0cace63.yaml | 58 +++++++++++++++++++ ...form-867cb44fcfb4a79db1df0d5c41aba304.yaml | 58 +++++++++++++++++++ ...form-9a3f3b16255e398a1ca1a217f9b4775c.yaml | 58 +++++++++++++++++++ ...form-a94be3f467ceacb837ea20db05393018.yaml | 58 +++++++++++++++++++ ...form-b8d7c77a852c836225d21aa48dc5ba53.yaml | 58 +++++++++++++++++++ ...form-bd74a2b3418b2ca97de6f6d3609c3ea2.yaml | 58 +++++++++++++++++++ ...form-cb9d0b1e1071125567f9f9731a764d07.yaml | 58 +++++++++++++++++++ ...form-dc74f0149670643ede0c882a9a3fc584.yaml | 58 +++++++++++++++++++ ...form-e1d3d2561a3fd7b42de1d4a0992e9e3d.yaml | 58 +++++++++++++++++++ ...form-f16e74cd433857af6e0b58aa13a15fac.yaml | 58 +++++++++++++++++++ ...cool-7746f8e1b3332b64c44418f10c52b872.yaml | 58 +++++++++++++++++++ ...ager-3d637613552d802b9173bc064749bb1c.yaml | 58 +++++++++++++++++++ ...ndar-2569de726bff5107260fe23150979031.yaml | 58 +++++++++++++++++++ ...ndar-3b4cfef4125eaa81be8aa8c8ba6a4733.yaml | 58 +++++++++++++++++++ ...ndar-4e3d792205a2fddf6adf72e5213cb0d5.yaml | 58 +++++++++++++++++++ ...ndar-6597d2336023fb01ba6013c2a92f4f5a.yaml | 58 +++++++++++++++++++ ...ndar-abea62bbd724165a2322bff6349a74e0.yaml | 58 +++++++++++++++++++ ...ndar-bf34e0d076673dbb1080a2742b54fd0c.yaml | 58 +++++++++++++++++++ ...ndar-d0c53aa3e05b1c3e9ba3c621e2806fb1.yaml | 58 +++++++++++++++++++ ...lery-fe1f1b8568ab900402e4ee21af348064.yaml | 58 +++++++++++++++++++ ...cker-ff23d770fb11fdc3c77523a1486cf3a6.yaml | 58 +++++++++++++++++++ ...udio-c7d6824255615bb5cf89bed6fab2e902.yaml | 58 +++++++++++++++++++ ...ster-02bdb4a60f8caf982b09839a595e4b9c.yaml | 58 +++++++++++++++++++ ...copy-f8764dadc75611aef7a1572c7ab006f8.yaml | 58 +++++++++++++++++++ ...osts-356ad590173ed87428302fe3f1cc7ead.yaml | 58 +++++++++++++++++++ ...-uet-4a64b780bf144c05e7e8310b30ac549a.yaml | 58 +++++++++++++++++++ ...rity-41374c7f8d145b4ed7aa35f41d920496.yaml | 58 +++++++++++++++++++ ...rity-e52bfc62f1976371888e01a2d756b470.yaml | 58 +++++++++++++++++++ ...dons-57c5519a5f47ee08f543aeb9d674466b.yaml | 58 +++++++++++++++++++ ...sers-2bf14b27cfeeb5a91ab7cdef09310906.yaml | 58 +++++++++++++++++++ ...lite-fe8e1355a12b62369103d3644c987bb7.yaml | 58 +++++++++++++++++++ ...-now-5f88cf9fcaa2bf2f8f88d764e30b12bd.yaml | 58 +++++++++++++++++++ ...inks-115be693fa2aef7e78774bec69a9ed0c.yaml | 58 +++++++++++++++++++ ...view-1e5ebadce2a1ab9a5fd9a23d7bb80d5b.yaml | 58 +++++++++++++++++++ ...feed-3155835b4a53204a1664eff58384d4a4.yaml | 58 +++++++++++++++++++ ...tisi-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml | 58 +++++++++++++++++++ ...ooks-a4f62ab934de0d3b7e3d119485cf9183.yaml | 58 +++++++++++++++++++ ...erce-e69e5ad6d5e1c350a8e72b9f067b0efd.yaml | 58 +++++++++++++++++++ ...ment-9f9a85cc7dcde674a13dc865058427ba.yaml | 58 +++++++++++++++++++ ...orum-4a9495cead71bfc76b3becea53804acd.yaml | 58 +++++++++++++++++++ ...orum-8baae250cdfb2a5ad0824fa7bf9c8a47.yaml | 58 +++++++++++++++++++ ...orum-bb8b3412160ee9a77c9d2e3d86221321.yaml | 58 +++++++++++++++++++ ...orum-ca1107b3905cae6801d38dcd71b363a8.yaml | 58 +++++++++++++++++++ ...orum-f35fe23400199bbe42a795d71f9a637a.yaml | 58 +++++++++++++++++++ ...orum-f5e683528ca64d9d4bdd8fbc39278345.yaml | 58 +++++++++++++++++++ ...orum-fb045d9c371baeb404b4c5f1d77f622c.yaml | 58 +++++++++++++++++++ ...cart-56a0c79ebe574b006dcddb57a105ed57.yaml | 58 +++++++++++++++++++ ...oops-43b8fe08466d27ab3e4146e678872b9a.yaml | 58 +++++++++++++++++++ ...dget-72675dc0f12c8960a29f55b61a35c78f.yaml | 58 +++++++++++++++++++ ...rkup-50f1f1c9543c7aff43ee35ce25ee5c01.yaml | 58 +++++++++++++++++++ ...mode-39eb4a9ab67b19c7b3e7b850c04221af.yaml | 58 +++++++++++++++++++ ...mode-6ae34c162bf6aa13569eb35a0dbe9a73.yaml | 58 +++++++++++++++++++ ...mode-6ff8db6967b717d0cf958b73dfda5c1c.yaml | 58 +++++++++++++++++++ ...mode-843fe9a3debf8db188ba99413c342e16.yaml | 58 +++++++++++++++++++ ...mode-a7b78f7a058348bb841c19e95bd21064.yaml | 58 +++++++++++++++++++ ...mode-f65f188c6963620914763af01a71f9a3.yaml | 58 +++++++++++++++++++ ...erce-ae760478256ed9e96e189f019a687210.yaml | 58 +++++++++++++++++++ ...tion-0e334f8b94041fdfb0dbd420bf6d8572.yaml | 58 +++++++++++++++++++ ...tion-171f9c1d23a1dd854f2389f7ab9f2720.yaml | 58 +++++++++++++++++++ ...tion-2c78335d8d426bf0b25d79bcc3a1ab65.yaml | 58 +++++++++++++++++++ ...tion-475af873f1e12ccee816ba0a881cf405.yaml | 58 +++++++++++++++++++ ...tion-4764645e6471ac58214ba2ea5f55bde8.yaml | 58 +++++++++++++++++++ ...tion-7f9d8f2c0da9df1ec2dd98d448e2220f.yaml | 58 +++++++++++++++++++ ...tion-8c3657d5aee544c7f980b9786567d40a.yaml | 58 +++++++++++++++++++ ...tion-e8c972936c2236ad7c5d5d3d5c2525c1.yaml | 58 +++++++++++++++++++ ...tion-eedcf99ab0d16ed7e1ce60956191875c.yaml | 58 +++++++++++++++++++ ...tion-14052cb4248c1d727995c47dc9e235be.yaml | 58 +++++++++++++++++++ ...ator-056a681add2c2e01374393f870550b92.yaml | 58 +++++++++++++++++++ ...ator-0afb6b2d10846bc66cf5079f2d5cff9d.yaml | 58 +++++++++++++++++++ ...mpts-1c092eb4ba33ccf4bb9feb95671821cb.yaml | 58 +++++++++++++++++++ ...mpts-6f5594aa21d74ab20f466ec04157beee.yaml | 58 +++++++++++++++++++ ...enid-0881f47c3594ae8da08c18a925e96922.yaml | 58 +++++++++++++++++++ ...enid-5585b9de0a3cacd6beb8b8edc279fcc3.yaml | 58 +++++++++++++++++++ ...enid-5e2f11a884ccbe34c9944f9c84b1340e.yaml | 58 +++++++++++++++++++ ...enid-65a50bc077f23975d5d3179b1fb56daa.yaml | 58 +++++++++++++++++++ ...enid-7a725b90d4cc282b22e04990737c3b98.yaml | 58 +++++++++++++++++++ ...enid-c57529c85cbb2380b599b6f25e5d1cbd.yaml | 58 +++++++++++++++++++ ...rity-de7221543e5e73690e1a713271a64c51.yaml | 58 +++++++++++++++++++ ...book-225cea6ba5a10bdee2c9620d04168830.yaml | 58 +++++++++++++++++++ ...book-8d13a40428bf38232a4e5bb1180f642a.yaml | 58 +++++++++++++++++++ ...book-9d80c6cd84258efd69f77a8f06dc55b8.yaml | 58 +++++++++++++++++++ ...book-9db01b7b537550571e5aaebf6e7d1ee5.yaml | 58 +++++++++++++++++++ ...book-eebb96ce6566b7b10661225a9046264f.yaml | 58 +++++++++++++++++++ ...book-fd8ebcf9d5fa5c6862626035f1ed028e.yaml | 58 +++++++++++++++++++ ...hmcs-7f3cd8184f95fe5ec57b6436f927a39d.yaml | 58 +++++++++++++++++++ ...tion-504399029097a5e86b5ba9c9da19637b.yaml | 58 +++++++++++++++++++ ...tion-65d716f9ae4f07532a2c4f0b876ee91a.yaml | 58 +++++++++++++++++++ ...tion-7ed5021e959e36c29209eaf63566fdb5.yaml | 58 +++++++++++++++++++ ...tion-86d39e17ff25614aec648f264a3fb15c.yaml | 58 +++++++++++++++++++ ...rver-d2f88ba803df2886b1661d9e9022a666.yaml | 58 +++++++++++++++++++ ...ient-039ddff757a24293b6b8e40930fc38b1.yaml | 58 +++++++++++++++++++ ...ient-eebb96ce6566b7b10661225a9046264f.yaml | 58 +++++++++++++++++++ ...tion-0cc0c3f4bf4487c2d84931d62250a698.yaml | 58 +++++++++++++++++++ ...n-on-17d0dd4ca47cd3783ad012601e5033f4.yaml | 58 +++++++++++++++++++ ...n-on-18ed21ba8d359bbdba46edad48e67bc5.yaml | 58 +++++++++++++++++++ ...n-on-27f647997621b679fa1b99cbf345bdbe.yaml | 58 +++++++++++++++++++ ...n-on-6125bda092f086c6d166ad135d42c4ef.yaml | 58 +++++++++++++++++++ ...n-on-c63318ebb764a0fec0149a0fb8aaa846.yaml | 58 +++++++++++++++++++ ...n-on-cef3df52a6e193270f584096ae2ab14a.yaml | 58 +++++++++++++++++++ ...-idp-73c8c687b5d5c2441c948ce0feefccb9.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...tape-2ab8437211d9c31dd339d122d8d0d412.yaml | 58 +++++++++++++++++++ ...oftp-23e0e48f6d4b609b278b4fbd54ac10a1.yaml | 58 +++++++++++++++++++ ...oftp-8e749acf47b12b0f727ea31609204180.yaml | 58 +++++++++++++++++++ ...oftp-d10118590b8b4520a15b5f492941e4d0.yaml | 58 +++++++++++++++++++ ...tory-d6ad3a8698b0ea599d014ed39ac8e503.yaml | 58 +++++++++++++++++++ ...inic-9d05bf270be054dfc1695e62a3911511.yaml | 58 +++++++++++++++++++ ...inic-df39b25c059b85a56edd3d99d606296d.yaml | 58 +++++++++++++++++++ ...obox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ider-162160e2cd5796ea83b5a0cd63035626.yaml | 58 +++++++++++++++++++ ...ider-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ider-2c78a721f8f6bce6bce705e149277edc.yaml | 58 +++++++++++++++++++ ...ider-511ef268c5ca19fe7d62dddd9e13f37e.yaml | 58 +++++++++++++++++++ ...ider-8f6a16f6b7fab2bb0e2d710564ba823c.yaml | 58 +++++++++++++++++++ ...ider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ider-e13785deba801d5052c18262b9c1ec9f.yaml | 58 +++++++++++++++++++ ...ider-ed137f483ea3e94091bee5b4d772d058.yaml | 58 +++++++++++++++++++ ...mage-0f3e86b7ffafefc40e02ec0059e76f0a.yaml | 58 +++++++++++++++++++ ...mage-bbfbe8576da0ded63051e9606f0a7198.yaml | 58 +++++++++++++++++++ ...nity-f0d4af3ac8d411e11b76b00eb4b51ce2.yaml | 58 +++++++++++++++++++ ...list-0ce6b6a0e9e78d060d6ca04414281584.yaml | 58 +++++++++++++++++++ ...list-d3e919ff7a9e64072ba58c94844a6e21.yaml | 58 +++++++++++++++++++ ...nger-2b956076e06d8a99488143a30a260c6a.yaml | 58 +++++++++++++++++++ ...ress-15489796bd09e80a5df20c3ad36d5a32.yaml | 58 +++++++++++++++++++ ...ctor-95502ecdd8716998187f526e7bbce587.yaml | 58 +++++++++++++++++++ ...nner-836d373165d51be73f6a63a08a49cd34.yaml | 58 +++++++++++++++++++ ...lect-1fd788f4344858c60db9f8c8da73d2ed.yaml | 58 +++++++++++++++++++ ...tons-f7f88d86922c2be2737227c4eb89350c.yaml | 58 +++++++++++++++++++ ...main-fe35f0738e4eed8ba11e27597e2d27c7.yaml | 58 +++++++++++++++++++ ...ager-32e884b82485fb448af167a249e58037.yaml | 58 +++++++++++++++++++ ...ager-d85e4c485a8dd6af61949c32b1b03d7f.yaml | 58 +++++++++++++++++++ ...ouch-719ff6e603e56a8355496bcf6077970d.yaml | 58 +++++++++++++++++++ ...erce-2d6d4e818a96c6e23f130697cfe95544.yaml | 58 +++++++++++++++++++ ...erce-cc96636e9196394b50c931f7bad41740.yaml | 58 +++++++++++++++++++ ...menu-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...menu-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ator-9d62e328d915f4bc5d1fc97fbe0f1bbc.yaml | 58 +++++++++++++++++++ ...look-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ugin-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml | 58 +++++++++++++++++++ ...alog-1520c53880fff07e37200c6f21a3681b.yaml | 58 +++++++++++++++++++ ...alog-d9262c55837abd68af90e0f35bcac926.yaml | 58 +++++++++++++++++++ ...-box-033ec25d9b806257f1f1c6f477525749.yaml | 58 +++++++++++++++++++ ...ndow-51118229a20281c018b629d79b26bfc7.yaml | 58 +++++++++++++++++++ ...ndow-53ff289b27bc5f383393c1a07c0f7797.yaml | 58 +++++++++++++++++++ ...ndow-b0b1da93e1bc1134b2188925015af3dc.yaml | 58 +++++++++++++++++++ ...ndow-cc4b9c34f1deaedc9df4457eb9089929.yaml | 58 +++++++++++++++++++ ...rvey-935046babdac50e2ed055ea1c49891d7.yaml | 58 +++++++++++++++++++ ...rvey-e5797459c3da936675c447c68b51e6f7.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-042678d5382067c26f9d9ead263e484c.yaml | 58 +++++++++++++++++++ ...lite-075f9c166c068dd8df28c57bf8d8a51a.yaml | 58 +++++++++++++++++++ ...lite-07fde43240c3cfe047c463512be535e6.yaml | 58 +++++++++++++++++++ ...lite-17e0aa925f801ca2b1033cf696b44f43.yaml | 58 +++++++++++++++++++ ...lite-4092810de68e3fe8831c5002fea9ea96.yaml | 58 +++++++++++++++++++ ...lite-4bedd1090bb0c6292f056d8449ad5ac2.yaml | 58 +++++++++++++++++++ ...lite-4dd145dc4bcaa7b143713cd5ced149a0.yaml | 58 +++++++++++++++++++ ...lite-61e330316e7097e0d9e2b13495d29a1f.yaml | 58 +++++++++++++++++++ ...lite-6a51878e913acce27812b845eba68b33.yaml | 58 +++++++++++++++++++ ...lite-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml | 58 +++++++++++++++++++ ...lite-aa263c677cae425acabeef2fb6fe8722.yaml | 58 +++++++++++++++++++ ...lite-afec02ed4fb861008e492afadabc92bd.yaml | 58 +++++++++++++++++++ ...lite-b99ab0aa7e8eaa169d59d870ba15e44f.yaml | 58 +++++++++++++++++++ ...lite-c1b0a376f2ef6bdd72b49e73751ed117.yaml | 58 +++++++++++++++++++ ...lite-f91654e07624f568e772537007d8ac97.yaml | 58 +++++++++++++++++++ ...otes-2885ef88741e4fead832f53749584e1b.yaml | 58 +++++++++++++++++++ ...otes-81c4580372e23b6ce41423bd5b13253e.yaml | 58 +++++++++++++++++++ ...elds-b8d61c50a15345214ea99c6a9bec5742.yaml | 58 +++++++++++++++++++ ...tons-ce8e510bc9bb481895074d6c2f363e65.yaml | 58 +++++++++++++++++++ ...lery-010a08c8c856a2f4fe4e778e18ce7576.yaml | 58 +++++++++++++++++++ ...lery-4d03edde0e9ae80bf33d37f9424bb420.yaml | 58 +++++++++++++++++++ ...lery-5e22f1474aec701db6c415effe7ee5bd.yaml | 58 +++++++++++++++++++ ...lery-e61de1050508666739a7f43858724491.yaml | 58 +++++++++++++++++++ ...anel-2c9039886374ff786c4c2e679732fd8d.yaml | 58 +++++++++++++++++++ ...tool-5efd9ccd23023c6687750d4699e0bae0.yaml | 58 +++++++++++++++++++ ...tool-d9dca1ca98884ba1a76cc0dbb34099eb.yaml | 58 +++++++++++++++++++ ...orms-50358f3970bdc1205a29969915a6519c.yaml | 58 +++++++++++++++++++ ...orms-8b372eebc313c06900867e460f19a6e4.yaml | 58 +++++++++++++++++++ ...erce-27287fd1e5df71f58411b21feefa43bc.yaml | 58 +++++++++++++++++++ ...ship-10a5adb358d22a46b8999d9c2d8dbd41.yaml | 58 +++++++++++++++++++ ...ship-1a6bdad9f927d9cadf5b74b8297f6ad5.yaml | 58 +++++++++++++++++++ ...ship-49b132283a9d5d5c8363ef530fb522a7.yaml | 58 +++++++++++++++++++ ...ship-8085a553b4ae6877292f03c349db3efa.yaml | 58 +++++++++++++++++++ ...ship-bc5e92508a73c7bd5e881af5254740d1.yaml | 58 +++++++++++++++++++ ...ship-d652edcb171ca597cc73fc3fc8e858f4.yaml | 58 +++++++++++++++++++ ...tion-179886cc2bdc18bcdb57983a57be1a6f.yaml | 58 +++++++++++++++++++ ...arch-a2b478ab05dc0dd0616e45e762ef893a.yaml | 58 +++++++++++++++++++ ...tize-4faeaa036aeca6705f522edda2ba7bc8.yaml | 58 +++++++++++++++++++ ...edit-fb73f4916ee278e30528ba4cbf3fead6.yaml | 58 +++++++++++++++++++ ...ager-142c8db8e90cbfc032437c60b440a7f4.yaml | 58 +++++++++++++++++++ ...mojo-0c582e7ad3f8369ffdb5a262e96fd69b.yaml | 58 +++++++++++++++++++ ...ting-e54ab178e0430008f60d1b3ffa4fc240.yaml | 58 +++++++++++++++++++ ...erce-1e2c9d24715886d9ba11e810be7c57d2.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ages-b073725ff3ce84124c4fbaa39058dd12.yaml | 58 +++++++++++++++++++ ...ogle-86350814cdd1486c9f09dfd7f4c47b39.yaml | 58 +++++++++++++++++++ ...s-se-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml | 58 +++++++++++++++++++ ...ider-6368f485fdfbfa4bcc6e9fc96c77a440.yaml | 58 +++++++++++++++++++ ...s-wp-51d2a215a7382b06f6f66c19158d7560.yaml | 58 +++++++++++++++++++ ...s-wp-fa0a09e9f8b4c6d9a874ba45527ab6cd.yaml | 58 +++++++++++++++++++ ...ator-f33817d1f67c73c0784fb9213086394b.yaml | 58 +++++++++++++++++++ ...dget-9cd32e924e90d865dad41a30260e1347.yaml | 58 +++++++++++++++++++ ...lite-53a42a688a74a64b49721153f05dafd3.yaml | 58 +++++++++++++++++++ ...lite-0c539e112e844dc3d098253d72219bba.yaml | 58 +++++++++++++++++++ ...lite-6df10c7399c7708f8d890fc41acb909e.yaml | 58 +++++++++++++++++++ ...lite-a7db1d4f6120721a3e8e59e280eb640d.yaml | 58 +++++++++++++++++++ ...lite-c70486d9239c270e7b09b18c9bd29bfc.yaml | 58 +++++++++++++++++++ ...ague-20fefc27d9160f7f5b2c386f22a44380.yaml | 58 +++++++++++++++++++ ...ings-2384bd3b0863727d54b70a40269280b6.yaml | 58 +++++++++++++++++++ ...ings-5f4c06c81ffca615e40ab92efa300ef7.yaml | 58 +++++++++++++++++++ ...ings-7af7bb77429bff8431b75ff2256568d2.yaml | 58 +++++++++++++++++++ ...ings-7f71b4b272aa7eae4323778da0a9d0b5.yaml | 58 +++++++++++++++++++ ...ings-8395989e9f463aede02be6293faac97f.yaml | 58 +++++++++++++++++++ ...ings-8fa1d4a13962968fa7c19c372fdbe540.yaml | 58 +++++++++++++++++++ ...roll-8cdddca0d188c62cd387707bc2f1bf90.yaml | 58 +++++++++++++++++++ ...dons-b4011099159d4b47f74f5b5034151fc1.yaml | 58 +++++++++++++++++++ ...dons-ca90bdb25f0c955406427bf755373f05.yaml | 58 +++++++++++++++++++ ...veto-0dd7f3bef33b38dffd2e7e5e50a01f63.yaml | 58 +++++++++++++++++++ ...veto-6b0918bd33802de1773e3becb0772e50.yaml | 58 +++++++++++++++++++ ...veto-aa8a8d1534c979b4a72d9c8bec09fbff.yaml | 58 +++++++++++++++++++ ...veto-f63e9747e46d5f44e7922b736df250ec.yaml | 58 +++++++++++++++++++ ...vies-ef405b3cbb9ac83187d4757d187f0977.yaml | 58 +++++++++++++++++++ ...menu-d9125d7ee55fa656fa01e772da7b6ddc.yaml | 58 +++++++++++++++++++ ...able-416df9dc9f4f5af0da5661ba17f7f5c9.yaml | 58 +++++++++++++++++++ ...able-953e4421c93547e97fe8ff565f4ade18.yaml | 58 +++++++++++++++++++ ...able-b16f008700574256ab90c1f92968c3fa.yaml | 58 +++++++++++++++++++ ...able-b786e0fb120de39094300b65ca31a23d.yaml | 58 +++++++++++++++++++ ...able-e189bd98f7f3328138bfc4085cfaad2e.yaml | 58 +++++++++++++++++++ ...able-e1f321924caa4de1b547928bc7e2455b.yaml | 58 +++++++++++++++++++ ...ayer-1a28da6fce455f006c2d11b2e29e3af5.yaml | 58 +++++++++++++++++++ ...ayer-498c92520d857cb30ad7df8aa299fc2f.yaml | 58 +++++++++++++++++++ ...ayer-69793a32c02cbaffdd1e5a5f626bea60.yaml | 58 +++++++++++++++++++ ...ayer-f2f737655d264b31c43ad2bd812bd2dc.yaml | 58 +++++++++++++++++++ ...naar-060bed5b5c04d1a43c1e948b34028358.yaml | 58 +++++++++++++++++++ ...naar-48b15a3295f54b70d085f78d5d278b00.yaml | 58 +++++++++++++++++++ ...naar-50550f19ed80806cbfb18739f79665ee.yaml | 58 +++++++++++++++++++ ...naar-8661844c33fd37e07467aee782d9dedc.yaml | 58 +++++++++++++++++++ ...naar-d0ed004aea7762f7063b9f573c38b581.yaml | 58 +++++++++++++++++++ ...sher-c19240e29be09298009c0e0215eb1f86.yaml | 58 +++++++++++++++++++ ...sher-c8b3ba4607788e0f441ac762600baab2.yaml | 58 +++++++++++++++++++ ...logs-2c4dadbb79348c7faca155e820c1a261.yaml | 58 +++++++++++++++++++ ...edit-f255a0d01d888b1ab68c9fee4e439ae8.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...iews-3b3f96c33b07ec89b36c294dbf4ced51.yaml | 58 +++++++++++++++++++ ...site-13034f6a839e821ee8d8b6496142d778.yaml | 58 +++++++++++++++++++ ...ment-5ac91f4d7709824d7d324fcc63da5897.yaml | 58 +++++++++++++++++++ ...-api-11537cde4e91f43e48d58ef19250e138.yaml | 58 +++++++++++++++++++ ...-api-11bfec28fd7489d580b927090a0bc03d.yaml | 58 +++++++++++++++++++ ...-api-1f2fdbe5d410730df888dae6fceb7e5a.yaml | 58 +++++++++++++++++++ ...-api-218590420fdaae12f7b13eebfab8b845.yaml | 58 +++++++++++++++++++ ...-api-2a9ab106af487c2aecdafee383fcc254.yaml | 58 +++++++++++++++++++ ...-api-46d4ebf7038a0e8c484c9aea0e512d27.yaml | 58 +++++++++++++++++++ ...-api-4acb0dd741daeb068a56799abff8a41c.yaml | 58 +++++++++++++++++++ ...-api-4f7baf83e51eb30ac1967902ba81559d.yaml | 58 +++++++++++++++++++ ...-api-5c09d79123e7df0cc552b5e3e1fb85e4.yaml | 58 +++++++++++++++++++ ...-api-5d1b1d2d30b64ee220b927e779fd3a7a.yaml | 58 +++++++++++++++++++ ...-api-62a933125d13190434146b926be57bbb.yaml | 58 +++++++++++++++++++ ...-api-63f43a6e88da428774e18ac7305171ad.yaml | 58 +++++++++++++++++++ ...-api-6f2e39604a581bcc0a7b4f915eff3dd9.yaml | 58 +++++++++++++++++++ ...-api-7dbb92a1633f5650078c7c51173954c5.yaml | 58 +++++++++++++++++++ ...-api-8506c65667776b8fc6f83c7b99b46a44.yaml | 58 +++++++++++++++++++ ...-api-8b6490d616c3b0afd9a25ca2623da6a2.yaml | 58 +++++++++++++++++++ ...-api-8be08765ef433238fcdb1a43ba0779f5.yaml | 58 +++++++++++++++++++ ...-api-9a8385daee7a51370fe7b2ccb01dc7d0.yaml | 58 +++++++++++++++++++ ...-api-ce3e51128d47fab10d04046c408cb2e6.yaml | 58 +++++++++++++++++++ ...-api-ffa610d468201a00e5838193890dc873.yaml | 58 +++++++++++++++++++ ...sync-a37d3498c6bbcc050576781692b33c90.yaml | 58 +++++++++++++++++++ ...quiz-2f5135a2953d35c3e23bf8648ed00b7e.yaml | 58 +++++++++++++++++++ ...quiz-5973e024827e1b713c70489b0018d6d3.yaml | 58 +++++++++++++++++++ ...quiz-5ec6acde81c3a11c030c7e48fb82e3a0.yaml | 58 +++++++++++++++++++ ...quiz-802392d669a0739410b0400626ccc124.yaml | 58 +++++++++++++++++++ ...quiz-bb563e95b48b650f94219f11430dd39c.yaml | 58 +++++++++++++++++++ ...quiz-eb50713c1c0af0073e35c8d86469e373.yaml | 58 +++++++++++++++++++ ...quiz-ee5dd1bd7e8e451209210bdf95385813.yaml | 58 +++++++++++++++++++ ...ener-5fa6ee2c71bfa785ae78ca09e3e47838.yaml | 58 +++++++++++++++++++ ...ener-e9eaa7084ed183eefbf2977e6f156e8c.yaml | 58 +++++++++++++++++++ ...ress-3f7de3cf6df81ad19fedc60f8e9d029a.yaml | 58 +++++++++++++++++++ ...-map-1179313cfd258782fb4aa71495304bc0.yaml | 58 +++++++++++++++++++ ...-map-637e4daf2caafdb5d476cac6dee7f199.yaml | 58 +++++++++++++++++++ ...ader-ae474b19622d960a9a30327a508a7a8c.yaml | 58 +++++++++++++++++++ ...-box-7dc2950e20e339de0e3c41a3a14e05fa.yaml | 58 +++++++++++++++++++ ...lkit-d6476ba9d1f9af74d842dc5c3e1d7008.yaml | 58 +++++++++++++++++++ ...ller-3099a61a8f302cdb834fd2736ccc7edc.yaml | 58 +++++++++++++++++++ ...ting-125f6e76ab3144c958a71a6f072d17aa.yaml | 58 +++++++++++++++++++ ...ting-63aab415fe29b03c8068882fbb1507f4.yaml | 58 +++++++++++++++++++ ...ting-7116e76b9d33cbc2c26869f8330931eb.yaml | 58 +++++++++++++++++++ ...ting-d5187e60da4aa17f7ec3f00e2f717a1c.yaml | 58 +++++++++++++++++++ ...ting-e487dc2fff22059c80c2edae74cd9a80.yaml | 58 +++++++++++++++++++ ...uler-841c70d8af33e4bb86e8b280b12a2f3b.yaml | 58 +++++++++++++++++++ ...form-262d571e1dff2c8fb3abba675c28c4e5.yaml | 58 +++++++++++++++++++ ...form-26e086c596fe6398b20ed3be8129cc9d.yaml | 58 +++++++++++++++++++ ...form-2822e321e1d70cd0fc641dbfe5a0bd37.yaml | 58 +++++++++++++++++++ ...form-447bef3440e263d45c541524d37bf6b4.yaml | 58 +++++++++++++++++++ ...form-463f67413eb1dfd1e1c7f65db3ca7607.yaml | 58 +++++++++++++++++++ ...form-962810e9bfe68aabdf565feb933a98a3.yaml | 58 +++++++++++++++++++ ...cons-704fb8f9c5192e5c8b8563d28e2e91a8.yaml | 58 +++++++++++++++++++ ...uage-d9699105126f16c0390a040c8ed5a573.yaml | 58 +++++++++++++++++++ ...endy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ages-bc5e61b065b355ecda981dfb9a91839d.yaml | 58 +++++++++++++++++++ ...erce-194154b98ea167d5243ca3bc6185dc5f.yaml | 58 +++++++++++++++++++ ...erce-4e39f41aeadd0e0dd90d8ba63c20d6b4.yaml | 58 +++++++++++++++++++ ...erce-890063830c1c25aee11e9fe1e8798a54.yaml | 58 +++++++++++++++++++ ...erce-b219b525f96b2aa71ca7a26ac08a9b92.yaml | 58 +++++++++++++++++++ ...erce-e463bbf0a92d1f70c76687905b887fc6.yaml | 58 +++++++++++++++++++ ...erce-e6a704ce234334d9f31ac517092f1bb0.yaml | 58 +++++++++++++++++++ ...erce-f76e1c53234e1a9b18e0328f53d84dde.yaml | 58 +++++++++++++++++++ ...ugin-3216cccc2ccf209ed6afbf1298c4c973.yaml | 58 +++++++++++++++++++ ...main-3a3edd25e4fa2cd1428645e4e1a051ab.yaml | 58 +++++++++++++++++++ ...thas-03e8fea4abe393774ca83cec29070e62.yaml | 58 +++++++++++++++++++ ...thas-1f2e03d503f5681dd8b4d168bb6a5e29.yaml | 58 +++++++++++++++++++ ...thas-2428c4eb87b4651b0b610c5b37e29f17.yaml | 58 +++++++++++++++++++ ...thas-410043251186f9da5efcd4c944487f1e.yaml | 58 +++++++++++++++++++ ...thas-7573fa793301510c262a9093c76e28a4.yaml | 58 +++++++++++++++++++ ...thas-867692d864273a70bf9ff47c77dd8e22.yaml | 58 +++++++++++++++++++ ...thas-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...thas-bce926ab22529c16e0539f0acc228409.yaml | 58 +++++++++++++++++++ ...ords-308319ee878eb47d99190ad100843184.yaml | 58 +++++++++++++++++++ ...oles-15583129ef6cea1a9a42a4bb010eaa6b.yaml | 58 +++++++++++++++++++ ...oles-c9b946cd1d70cba32e2ab4c05a432d51.yaml | 58 +++++++++++++++++++ ...erce-72a5beaa06012eefbccaf7bb2be8aca6.yaml | 58 +++++++++++++++++++ ...lock-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...epay-9ee1fb20140e6d73472d36e51f5b0eef.yaml | 58 +++++++++++++++++++ ...ator-6df6e844abfccff24d48183d808487ab.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-3e61760bac7d3dbcc4ad9810884d474f.yaml | 58 +++++++++++++++++++ ...tore-f2983beb380d477fba46a5c5deed43dd.yaml | 58 +++++++++++++++++++ ...tore-f8e91618f8a23f5d7b353935e566fd31.yaml | 58 +++++++++++++++++++ ...form-7c87e8f104753303f633f63d1aeebd8d.yaml | 58 +++++++++++++++++++ ...form-911484e3365757053bdfa0e54f447b4f.yaml | 58 +++++++++++++++++++ ...form-c9a6c3093cb802c72eb217b944b386a2.yaml | 58 +++++++++++++++++++ ...form-d1c63a8bf0beafb1c82149091059ec86.yaml | 58 +++++++++++++++++++ ...form-fb14b5eeb363b3c1bc8612df7d95fc5e.yaml | 58 +++++++++++++++++++ ...erce-20415f311fdf676cb6dd436c829d557f.yaml | 58 +++++++++++++++++++ ...down-d561f3d81e84a307c0bd1e31854171e0.yaml | 58 +++++++++++++++++++ ...orms-14d5ec39f3f717cd0febca936a2aa6ce.yaml | 58 +++++++++++++++++++ ...fect-013a3c9fa700970f10b7bbed788f507b.yaml | 58 +++++++++++++++++++ ...fect-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...fect-64c02d39235cbe33840c45ab521604aa.yaml | 58 +++++++++++++++++++ ...fect-ab1eb5a48a622a49086f766ee1ce86ba.yaml | 58 +++++++++++++++++++ ...fect-ce8ee7b9600d875960db0922db40d4c2.yaml | 58 +++++++++++++++++++ ...kype-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...kype-73a5ef3fe7ff6ce104975ee9342f5c66.yaml | 58 +++++++++++++++++++ ...tons-164235cec7e149cb5686d35550cc5b45.yaml | 58 +++++++++++++++++++ ...ocks-efba52660b6ae40494c76473deb3b9d9.yaml | 58 +++++++++++++++++++ ...itor-decd0181d7e39da44fe0e5d9af5455c7.yaml | 58 +++++++++++++++++++ ...ndar-0fa49314c689285a17b374209d3a5887.yaml | 58 +++++++++++++++++++ ...ndar-1e21b5582d8630d6c174336fda22cd0b.yaml | 58 +++++++++++++++++++ ...ndar-505ed98ce47f4d2bcda888e7e457703c.yaml | 58 +++++++++++++++++++ ...ndar-5855cc9e78b9585b3894e0c7b7fb5555.yaml | 58 +++++++++++++++++++ ...ndar-5c7338d4e00209af0345ad82177f57cf.yaml | 58 +++++++++++++++++++ ...ndar-5f2c8752d84edabaa8bbd1589413f608.yaml | 58 +++++++++++++++++++ ...ndar-65b1205e2a37abbb65be358b000a3445.yaml | 58 +++++++++++++++++++ ...ndar-72451557ba7e0e914a18e1ce213f28d7.yaml | 58 +++++++++++++++++++ ...ndar-7598877f4e713405d9e74bfad63425fb.yaml | 58 +++++++++++++++++++ ...ndar-921b9a5130a0ad2bf4a94e3131564950.yaml | 58 +++++++++++++++++++ ...ndar-a6b03d82501be09605ec3648f082c81b.yaml | 58 +++++++++++++++++++ ...ndar-aa680f4ce8dad5699d078d5a407ddd10.yaml | 58 +++++++++++++++++++ ...ndar-b87197a613662b55350c2f2781a87102.yaml | 58 +++++++++++++++++++ ...ndar-dd53e1988ec5b5d25424d4247fd55d9d.yaml | 58 +++++++++++++++++++ ...rder-46d83256b62bdfe4aa6f310ac82e97af.yaml | 58 +++++++++++++++++++ ...rder-64ec2a96ce824196b74660ea295fa52d.yaml | 58 +++++++++++++++++++ ...tbot-09bccc53b96a3e1339f2f17e91426178.yaml | 58 +++++++++++++++++++ ...ment-2e12d42eb302e6a61f201e211fa0da28.yaml | 58 +++++++++++++++++++ ...ment-f493de201064a7faaee262b5cd71afb2.yaml | 58 +++++++++++++++++++ ...free-124c0d175531516b3b7ac443edf7328e.yaml | 58 +++++++++++++++++++ ...rder-6e16524bd1d2a580c4988808ba69289d.yaml | 58 +++++++++++++++++++ ...rder-a5940bfb7c2779df0f2c0ab2e0cfe4dd.yaml | 58 +++++++++++++++++++ ...odes-de64d2f517270fa27d42f881da4c6d98.yaml | 58 +++++++++++++++++++ ...kets-3b65f76db2b87c51279c14c330d16347.yaml | 58 +++++++++++++++++++ ...kets-77e642ff24948f5be818c3b7338e42ce.yaml | 58 +++++++++++++++++++ ...kets-d8fe1550ef4435dde41b495aa629c7d1.yaml | 58 +++++++++++++++++++ ...waze-94a42c523ccdb6324d7b897f6e9c739d.yaml | 58 +++++++++++++++++++ ...list-de81b18a854ce81734a5dca6853e283e.yaml | 58 +++++++++++++++++++ ...y-wp-e034d0793fa530375c47c930a890a44e.yaml | 58 +++++++++++++++++++ ...heck-e849386b94578b26b80f8f92e65a3f8b.yaml | 58 +++++++++++++++++++ ...late-d3e6d2f3e4924a9f9f37a01c1a206e29.yaml | 58 +++++++++++++++++++ ...late-da4809632dd888beae369fbce2888e9e.yaml | 58 +++++++++++++++++++ ...wpdb-ca85fcbf44c8f529ecdfa95b175d7b9b.yaml | 58 +++++++++++++++++++ ...vacy-b91180f6c8ba3f8d6ff100d044a9837c.yaml | 58 +++++++++++++++++++ ...ceai-40ddfa284deb87a97d4ffba35198f3b4.yaml | 58 +++++++++++++++++++ ...ster-7b501f3b3223dc999faba6ed8169a765.yaml | 58 +++++++++++++++++++ ...logu-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...able-7da47fa66cee45b26565c0fef152490a.yaml | 58 +++++++++++++++++++ ...able-8dbe7a3817fde028be9e786330407154.yaml | 58 +++++++++++++++++++ ...able-93938fbe21973f374f80c1d00bd023f7.yaml | 58 +++++++++++++++++++ ...able-c4c3dacc97e2d49842f4e491e4abe511.yaml | 58 +++++++++++++++++++ ...cred-4696541fdc76b8ee098f38a67fea2a75.yaml | 58 +++++++++++++++++++ ...cred-5950b0d42aaf04d555a067d560ed1764.yaml | 58 +++++++++++++++++++ ...cred-6420c7d64b9445ffc9ff5c8ed72e1368.yaml | 58 +++++++++++++++++++ ...cred-6ae7e30bc28b46b135c2064dc2c025e6.yaml | 58 +++++++++++++++++++ ...cred-6d3bd66271ddc3e51b161d4fb84cf2f5.yaml | 58 +++++++++++++++++++ ...cred-7b33af13dcbb1f6cea4e6cd4849f85c9.yaml | 58 +++++++++++++++++++ ...cred-9d5e6984e47653aa7bf2ef78de6fcae3.yaml | 58 +++++++++++++++++++ ...cred-a4073afeed9945d540c4483af566c48e.yaml | 58 +++++++++++++++++++ ...cred-ab40c276cb9902f9d5e1087da672b8cb.yaml | 58 +++++++++++++++++++ ...cred-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cred-dab92fc7cb3e34a6cce738aec497ec2e.yaml | 58 +++++++++++++++++++ ...kout-7e48a0f635133ab535de9155dd7df3ac.yaml | 58 +++++++++++++++++++ ...kout-f806fd57534e9e84564f98154ed849f3.yaml | 58 +++++++++++++++++++ ...ycss-51cc7451392ec09a8c7688f9ed5f409c.yaml | 58 +++++++++++++++++++ ...ator-243dea5b11f06ba3f210fa9f99b93530.yaml | 58 +++++++++++++++++++ ...ator-972385a1b4b6972691f113fb45ea0adc.yaml | 58 +++++++++++++++++++ ...ckup-d663aae86bf8b83f4649ce306c1e5aed.yaml | 58 +++++++++++++++++++ ...lash-0de546d8ff8a440613f030661df64835.yaml | 58 +++++++++++++++++++ ...ress-49d2ffe5685768bca2fdd1bbd6d1b0f5.yaml | 58 +++++++++++++++++++ ...lery-0f137418131077a44fc4f4b8e86a7c26.yaml | 58 +++++++++++++++++++ ...dump-b448ff8f0ebed30bebafe7474f10c89b.yaml | 58 +++++++++++++++++++ ...pixs-c9480dcffb0b0878eee13c8e8528a0b7.yaml | 58 +++++++++++++++++++ ...dein-f56eab4e1dba033d85ad3e26044b8e2f.yaml | 58 +++++++++++++++++++ ...ents-3f6feeb32fb2210c6becc1260135473a.yaml | 58 +++++++++++++++++++ ...ents-54afcc25e30c13f6fd81531108a460de.yaml | 58 +++++++++++++++++++ ...ents-b8cf7f35198731bb7bfb27771c37478a.yaml | 58 +++++++++++++++++++ ...ents-fd075b6c9853246b5cc33cafcab17a0c.yaml | 58 +++++++++++++++++++ ...menu-06b7c4127350d50d75ab6e5a40c02f95.yaml | 58 +++++++++++++++++++ ...menu-49cfc8c3d99725c4ecb38a0e0b05420f.yaml | 58 +++++++++++++++++++ ...menu-b9ee2994c48a1ce98dffc9faf5d855b8.yaml | 58 +++++++++++++++++++ ...ures-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...tube-8753e5a555a2f3121491c204c567f453.yaml | 58 +++++++++++++++++++ ...nter-f47f5c28d52d4abd78cd616aff6e460a.yaml | 58 +++++++++++++++++++ ...-api-fdae69d4ebb419ff6e97487d1fa22ced.yaml | 58 +++++++++++++++++++ ...elds-164dd8ebbb83252d5e62c236087e083c.yaml | 58 +++++++++++++++++++ ...quiz-6d6529e910b656256c67d994d60b2a51.yaml | 58 +++++++++++++++++++ ...form-b56cc1f81e44553ad5837ff3f3a482ce.yaml | 58 +++++++++++++++++++ ...-lms-03657cd383df53489c98f2c2003d74b0.yaml | 58 +++++++++++++++++++ ...-lms-04f146ec33992e5efff05a0bd40f659f.yaml | 58 +++++++++++++++++++ ...-lms-243f75a6da65f6edc93ed6a1b9eaec80.yaml | 58 +++++++++++++++++++ ...-lms-396a46e2d061c4863ac25c94e4ca15f5.yaml | 58 +++++++++++++++++++ ...tory-27463f760012793e1526cf6e69e5e624.yaml | 58 +++++++++++++++++++ ...tory-28d57d2682124a0a2b82184f75d0b682.yaml | 58 +++++++++++++++++++ ...tory-6c06bc58e8c431cd39158598c7d3df3c.yaml | 58 +++++++++++++++++++ ...tory-e5ace19f8910dfb41dd382bdef641807.yaml | 58 +++++++++++++++++++ ...tory-ecb3bc304462f6f56763ded084ead34f.yaml | 58 +++++++++++++++++++ ...utor-19e99a4dcb048b9a78de389a4596a1c2.yaml | 58 +++++++++++++++++++ ...-map-f4ee020375ee3d79fbe799a7df61d461.yaml | 58 +++++++++++++++++++ ...dget-25e251a3406c9b35d33175212bd58aef.yaml | 58 +++++++++++++++++++ ...loud-501b82dc590b97d863184cfb9756e9ee.yaml | 58 +++++++++++++++++++ ...lery-0668c2487ce2c4fa1850c723426ba86a.yaml | 58 +++++++++++++++++++ ...lery-54c49ed92754fe9b72ea28cef486ac0b.yaml | 58 +++++++++++++++++++ ...lery-ac40665ad4ef3b69656a095a1b2358ab.yaml | 58 +++++++++++++++++++ ...king-164126146e9a645f77469a8e4602aa76.yaml | 58 +++++++++++++++++++ ...king-f38cba339dfbcce8dc24128ae403c983.yaml | 58 +++++++++++++++++++ ...ions-49fd6b403c3ae46f361045d570a15196.yaml | 58 +++++++++++++++++++ ...ions-7af5a8d75570b9733bf6f036d3311f98.yaml | 58 +++++++++++++++++++ ...ions-a1415a905803c20c67ca5fc03367ae55.yaml | 58 +++++++++++++++++++ ...ents-ef9b3c704d7fced594c5120e1a6fbd70.yaml | 58 +++++++++++++++++++ ...ning-a63938534e67d796e6484c84d1211d1e.yaml | 58 +++++++++++++++++++ ...ning-f7e07f423bc8c5880015a851a060fbc6.yaml | 58 +++++++++++++++++++ ...ects-2f7ae6b5d7fdabeafa201dc90bcb50c1.yaml | 58 +++++++++++++++++++ ...ects-a663013695ba225f715bd4ecd0b647ba.yaml | 58 +++++++++++++++++++ ...ects-e82bd49c08eee13d3a8a750e759d2e98.yaml | 58 +++++++++++++++++++ ...ects-f3802a1bd27cc43cf9c93101d4cbaed4.yaml | 58 +++++++++++++++++++ ...ions-05197d15c6555c370c0aabb516e1a176.yaml | 58 +++++++++++++++++++ ...ions-8665b291868b7068ace3fa9c23d3b9d6.yaml | 58 +++++++++++++++++++ ...ions-bb149be73e11ebe0c3b568543b54c91e.yaml | 58 +++++++++++++++++++ ...ions-e721e32fa48eebd873371f94b4b26240.yaml | 58 +++++++++++++++++++ ...odes-2430a9c1ac485d43602ad90dc9748594.yaml | 58 +++++++++++++++++++ ...odes-ac14ec5ad7742e553d78dac3325ff055.yaml | 58 +++++++++++++++++++ ...odes-bce590a02f073327d2ec7a566a982db1.yaml | 58 +++++++++++++++++++ ...odes-fada6798d03eaae704cdbb04f45c1dff.yaml | 58 +++++++++++++++++++ ...item-48dc2938fe186fc758ec2763ee6f0d79.yaml | 58 +++++++++++++++++++ ...avel-c5fdeee544445401f76739cfd131940a.yaml | 58 +++++++++++++++++++ ...avel-c95f7d5b525da0435460cefad8d11b57.yaml | 58 +++++++++++++++++++ ...ting-8f146e0beab27034b7dee531d37f0fa1.yaml | 58 +++++++++++++++++++ ...ting-95c205c5aad798b5c2c90ddd330acabe.yaml | 58 +++++++++++++++++++ ...ting-a591950f40f9d0373366c6581aa5c23f.yaml | 58 +++++++++++++++++++ ...ting-aa0f13dbdb6bd3444462a2203b7bb2ad.yaml | 58 +++++++++++++++++++ ...tent-ca8f431f36e53f60c13e3a9b6d7eff7f.yaml | 58 +++++++++++++++++++ ...text-f3d8bdcc3c7e14d05b34d12f8fc7e52b.yaml | 58 +++++++++++++++++++ ...maps-17731af892dc35dbe7d98abcc5958a1a.yaml | 58 +++++++++++++++++++ ...tgsm-7d6fe2c9df245e2b7ef32caaf5683478.yaml | 58 +++++++++++++++++++ ...iews-569c4e32e955a5a711d57f73a7ff1bf2.yaml | 58 +++++++++++++++++++ ...grid-5d20fde6dfb97e9f5d07e3e446eb155e.yaml | 58 +++++++++++++++++++ ...sher-04eafceaed46e98686bbc255ebb274ab.yaml | 58 +++++++++++++++++++ ...mary-2122a84f28fdfefbdc58444f837b4996.yaml | 58 +++++++++++++++++++ ...roll-1188e531905e3639c772d49bab35e621.yaml | 58 +++++++++++++++++++ ...roll-75a76987b60af6fa885fc4c0dfc6ee8a.yaml | 58 +++++++++++++++++++ ...dman-b19e098eab2b720f4c9c456bb0f876fa.yaml | 58 +++++++++++++++++++ ...dman-bf579b9a08de0f44c24def81bc3a2891.yaml | 58 +++++++++++++++++++ ...lery-bccc52eaf67f0c2e9578dcf9fea0c991.yaml | 58 +++++++++++++++++++ ...lery-b56d867b606b433de9a6f7e49a5d4259.yaml | 58 +++++++++++++++++++ ...lery-be71c57d44785349cf4b236716cff6b0.yaml | 58 +++++++++++++++++++ ...erce-0732f852b649541967c753671f29b37b.yaml | 58 +++++++++++++++++++ ...lery-1064e143eb72cf1f7f6e0379aeb06d2d.yaml | 58 +++++++++++++++++++ ...ider-0111982febae7056a14e209747a4d7f0.yaml | 58 +++++++++++++++++++ ...rove-0e6d3f2d08066d7cff85e87321056d7c.yaml | 58 +++++++++++++++++++ ...rove-26505cfee39309a781056291e8398c4a.yaml | 58 +++++++++++++++++++ ...rove-92b561b69b56e7600f4f7b9ae4076303.yaml | 58 +++++++++++++++++++ ...rove-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...t-up-2d0401b900eef6498675d312d5732e7a.yaml | 58 +++++++++++++++++++ ...lery-278430bfff21cdcd8521969c19275f0f.yaml | 58 +++++++++++++++++++ ...work-691d3fdf23c3a77219e053d123bb9c11.yaml | 58 +++++++++++++++++++ ...roll-433814dea51a33a792f1c14558ec0d69.yaml | 58 +++++++++++++++++++ ...roll-6c5199d39eb82de60e28b6acd63ef12d.yaml | 58 +++++++++++++++++++ ...wall-1a779beb118a344123814c7da3a92427.yaml | 58 +++++++++++++++++++ ...tter-05717ef617ff885ca4d0ac7195b86227.yaml | 58 +++++++++++++++++++ ...tter-329e4b44130ac269d4479f891a8c5f08.yaml | 58 +++++++++++++++++++ ...tter-36e06ea858a68708b1aaf6b3c07ed8c6.yaml | 58 +++++++++++++++++++ ...tter-46ccdfdd1e5c01b6218e531cf0996d36.yaml | 58 +++++++++++++++++++ ...tter-738e67611ca42fd98e51ccd2eb0ad2d6.yaml | 58 +++++++++++++++++++ ...tter-89837280a63d6f202a5c4d44cb2bc250.yaml | 58 +++++++++++++++++++ ...tter-8fcdb0b13a5576b5ff2b34a21c31cbb9.yaml | 58 +++++++++++++++++++ ...tter-981beced4302bc1ed44f59f5bbd895e2.yaml | 58 +++++++++++++++++++ ...tter-a0918f22ac918ae4fe62db47bcca205c.yaml | 58 +++++++++++++++++++ ...mail-72d17698c8eeb0073ce356c8f5c5e968.yaml | 58 +++++++++++++++++++ ...stic-5a374355ec4537f847bbfe7d5d9419bb.yaml | 58 +++++++++++++++++++ ...stic-62fd42906a2acfa6303c130d21470bd3.yaml | 58 +++++++++++++++++++ ...tter-c834c5e1d5d5c36b9532f258717d77bb.yaml | 58 +++++++++++++++++++ ...tter-e5ab2a90d77e5b6e1a1c85bcd4411c15.yaml | 58 +++++++++++++++++++ ...tter-ef27394574ec1b75cca56caa3de40fd5.yaml | 58 +++++++++++++++++++ ...tter-f4e01d148cb4faf1d4deb03b8e76c31d.yaml | 58 +++++++++++++++++++ ...ager-0533a1e9776fb29c7b5b9491b1113794.yaml | 58 +++++++++++++++++++ ...ager-1047bbd2b8a122544a7afe7bee9dd9ef.yaml | 58 +++++++++++++++++++ ...ager-437f867caa3099fbc234387a5d6249e0.yaml | 58 +++++++++++++++++++ ...ager-4fecc14512bd412ef7b458d7c2feb79a.yaml | 58 +++++++++++++++++++ ...ager-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml | 58 +++++++++++++++++++ ...-box-4e7b5734b71634dd9bb48b370cdad8aa.yaml | 58 +++++++++++++++++++ ...-box-51e92ff25e71a7c2e17f5c127452f585.yaml | 58 +++++++++++++++++++ ...opup-0fb02df24aa43363dc0b388137db084d.yaml | 58 +++++++++++++++++++ ...opup-c0ffd5d28b53a7790d15e70d69428d0e.yaml | 58 +++++++++++++++++++ ...r2go-d7690abd96f47b63d2e6b2b27468ddeb.yaml | 58 +++++++++++++++++++ ...lite-05fc8635fe3b2da7f76501f71f380eaa.yaml | 58 +++++++++++++++++++ ...lite-115f884d0c6c27b8ac283bf2fad6f3ed.yaml | 58 +++++++++++++++++++ ...lite-6341ec05f42eea92884ac2a29b84c8c0.yaml | 58 +++++++++++++++++++ ...lite-63a6ae12fc77467bfccad91ea4a943d2.yaml | 58 +++++++++++++++++++ ...lite-85e177edc7eae3fd9e8af515318eb68f.yaml | 58 +++++++++++++++++++ ...lite-941165a565ddef468f5deaa19a3321bc.yaml | 58 +++++++++++++++++++ ...lite-ade39cd867e3448bad9cda88f9ec4ce9.yaml | 58 +++++++++++++++++++ ...lite-f3852e2e998f0a9723c8ace5e7ebc48d.yaml | 58 +++++++++++++++++++ ...lite-fb658166b72b071de6ed9c2034675764.yaml | 58 +++++++++++++++++++ ...ugin-90997fecd42d62efb670daec1cf651f8.yaml | 58 +++++++++++++++++++ ...ress-53b1198e7ee8eee5292e3abdba3cbbf7.yaml | 58 +++++++++++++++++++ ...ress-5661d46a0d0f62ecdca1f908938fc469.yaml | 58 +++++++++++++++++++ ...ress-5a76fde7fb0009ab04ff52f07a51dd98.yaml | 58 +++++++++++++++++++ ...ress-8412ac7e626ed43c4ce45430524bd3c5.yaml | 58 +++++++++++++++++++ ...ress-85b9bc25cc8d9d1685d816dce491f099.yaml | 58 +++++++++++++++++++ ...ress-9429ed7d3468d9b070c3aef1b1b73950.yaml | 58 +++++++++++++++++++ ...ress-c5e29f3bae507d53468f7991a1fb1a3e.yaml | 58 +++++++++++++++++++ ...ress-e2fceb8fb39f58204ff5726ab0b6f62e.yaml | 58 +++++++++++++++++++ ...ress-ee6e70e7388e058992448bed848ba9e2.yaml | 58 +++++++++++++++++++ ...orms-8b8a23561a8628021b8646bf3571f1c0.yaml | 58 +++++++++++++++++++ ...lder-1873bca252baceb5719ad4cfda8c952f.yaml | 58 +++++++++++++++++++ ...lder-2d87227c0a1b8cce209867e1a3357d5b.yaml | 58 +++++++++++++++++++ ...lder-2d88339f87e8f539294930b47234f049.yaml | 58 +++++++++++++++++++ ...lder-320cc739be80667a41b7c33bc9c3ac5f.yaml | 58 +++++++++++++++++++ ...lder-3484031578b48515a252a1136c0592de.yaml | 58 +++++++++++++++++++ ...lder-3c32e113f430e95dd1bba8970b964bc4.yaml | 58 +++++++++++++++++++ ...lder-52a6b0aceece7742858232c190951358.yaml | 58 +++++++++++++++++++ ...lder-65a7e9e5db9a5af53a8c05db52ac919a.yaml | 58 +++++++++++++++++++ ...lder-69c9678050af93b08d000bd2cd1bbedb.yaml | 58 +++++++++++++++++++ ...lder-6e45966d9ef8042467981ba9a26f57f6.yaml | 58 +++++++++++++++++++ ...lder-9eff154e275679aff481294211504cad.yaml | 58 +++++++++++++++++++ ...lder-a82da444a73b50ac43a1369ce1b8722f.yaml | 58 +++++++++++++++++++ ...lder-bb95d05f96d844686568bca3576c4dd9.yaml | 58 +++++++++++++++++++ ...lder-c98999074aee70a52ec6540d435f9e75.yaml | 58 +++++++++++++++++++ ...lder-f0ac080b3744a919181119313b1bddf9.yaml | 58 +++++++++++++++++++ ...lder-ff2527cc6b81652aecd5a77ac2a8b673.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...page-cd42ea5f361eb592a86690da9944867b.yaml | 58 +++++++++++++++++++ ...gacy-5b2ed76d9224d230598bdf2cc0cffcbc.yaml | 58 +++++++++++++++++++ ...gacy-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml | 58 +++++++++++++++++++ ...nect-00ecb873d9d341992e1bd58f78a3eb00.yaml | 58 +++++++++++++++++++ ...nect-affff16d41b08985367338035f67daba.yaml | 58 +++++++++++++++++++ ...nect-b5ffaf80d661d564c9b660398c6daa12.yaml | 58 +++++++++++++++++++ ...nect-ca36ed6adf848cc827e64a29f8ea5b4f.yaml | 58 +++++++++++++++++++ ...nect-9813a1d6a9d1cff77f894bb801d07459.yaml | 58 +++++++++++++++++++ ...sion-289b4ce42c5317d66bb530e021b79a80.yaml | 58 +++++++++++++++++++ ...sion-45f2df14510cef20714306c6b2b6f810.yaml | 58 +++++++++++++++++++ ...lery-cac97ebd7382586a7c73dce4ae126172.yaml | 58 +++++++++++++++++++ ...lery-0852d9b8897d185217e138aaac4e2439.yaml | 58 +++++++++++++++++++ ...lery-13599838064c197e9952281d09390ec7.yaml | 58 +++++++++++++++++++ ...lery-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml | 58 +++++++++++++++++++ ...lery-2964883e1950fef80d801f06f14eb92b.yaml | 58 +++++++++++++++++++ ...lery-322df2ac71ce300f084e0fab2894de3c.yaml | 58 +++++++++++++++++++ ...lery-33f121d665e87151fe5985afb89d484f.yaml | 58 +++++++++++++++++++ ...lery-39cf49efc2cfacf8bc667751cb10cb94.yaml | 58 +++++++++++++++++++ ...lery-41d56c1ae043586e69a9cbdf8e53ac0a.yaml | 58 +++++++++++++++++++ ...lery-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml | 58 +++++++++++++++++++ ...lery-519e702e57b853557437ca261b9c8d23.yaml | 58 +++++++++++++++++++ ...lery-5eb51111eaa90d94b47d1fce5457ff77.yaml | 58 +++++++++++++++++++ ...lery-75f34276d9b10d0195d546eabefff833.yaml | 58 +++++++++++++++++++ ...lery-7e41774188b9f915d9ca937dad9a03c5.yaml | 58 +++++++++++++++++++ ...lery-7f9e6cd367e17f5d58e3f74e4dd23702.yaml | 58 +++++++++++++++++++ ...lery-862a8430206366dd5f1306f54a1da83a.yaml | 58 +++++++++++++++++++ ...lery-8aa932823fef6a8561cb1cce32b099e9.yaml | 58 +++++++++++++++++++ ...lery-8f740f4461f86da187ea01d0cc38bbab.yaml | 58 +++++++++++++++++++ ...lery-91308ce2ef066c70ca278e2e191864f4.yaml | 58 +++++++++++++++++++ ...lery-9c97398a1c0f455131b61618edca56df.yaml | 58 +++++++++++++++++++ ...lery-ac32959f74b06f08f41c35d9de9637f2.yaml | 58 +++++++++++++++++++ ...lery-b4ed5bad800bb63784fe65e3822d9b92.yaml | 58 +++++++++++++++++++ ...lery-b6ee1e856ee11834d66789e451bea084.yaml | 58 +++++++++++++++++++ ...lery-b7c464860f475ded8d2ed3cd59a1ad52.yaml | 58 +++++++++++++++++++ ...lery-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml | 58 +++++++++++++++++++ ...lery-c41810e93c0c7c558cec6a9a4900b3a7.yaml | 58 +++++++++++++++++++ ...lery-ca565e6cb88aa754dd01e131a2eefadc.yaml | 58 +++++++++++++++++++ ...lery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lery-d5553776b8e5331d8ec0787313ee2d60.yaml | 58 +++++++++++++++++++ ...lery-d6113147a445ba7f16a522f439b96bee.yaml | 58 +++++++++++++++++++ ...lery-f15eaf3968f794eee3d8d893185e8a4d.yaml | 58 +++++++++++++++++++ ...-pro-f8b3e9ff45c2c72c8ffae6c7215d920c.yaml | 58 +++++++++++++++++++ ...hoto-b45eecf36500371522a7a91600b79df4.yaml | 58 +++++++++++++++++++ ...ting-c141b8b973ee71335be586680efd9177.yaml | 58 +++++++++++++++++++ ...lery-fd1e125ffdeff47afb4a084c2351b847.yaml | 58 +++++++++++++++++++ ...exus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...exus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...erce-ec4aba644c290d0da3b6df79cb8b20be.yaml | 58 +++++++++++++++++++ ...atus-7561b8c1f99227b7381d59264fa6815d.yaml | 58 +++++++++++++++++++ ...port-82dd4087673f4e5c2cbc42c8ad11ddcf.yaml | 58 +++++++++++++++++++ ...lite-0471fd3ab900bd53f968b61b8e07cd67.yaml | 58 +++++++++++++++++++ ...able-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...page-0606b1934fa15f28fbfa63443f860808.yaml | 58 +++++++++++++++++++ ...page-473adc971897213907d43bcafc37522c.yaml | 58 +++++++++++++++++++ ...mode-d2a99368cddd63664c69600c9b7c92a3.yaml | 58 +++++++++++++++++++ ...lder-89f45b00f9f74bc6d93e777cef76ce78.yaml | 58 +++++++++++++++++++ ...orms-07e79cfbaad5cc6feea3f9163412cb03.yaml | 58 +++++++++++++++++++ ...orms-0b4ef9eb693a7e87ce6cfca4623c180a.yaml | 58 +++++++++++++++++++ ...orms-0c6f99e140df7ca1c5f4c6d0e22095b6.yaml | 58 +++++++++++++++++++ ...orms-137fb939b7f924b2e394225c2ffc4e4d.yaml | 58 +++++++++++++++++++ ...orms-176c16716215a971a6536fe6953bdcc3.yaml | 58 +++++++++++++++++++ ...orms-18aefdabee9873494c7322bd5c01157e.yaml | 58 +++++++++++++++++++ ...orms-23c6df4af51eff238970a0c85f41de19.yaml | 58 +++++++++++++++++++ ...orms-2955aefdf1cefad709d8b720d6db9ca9.yaml | 58 +++++++++++++++++++ ...orms-2cbe4a3f03e2199a537c6f7a9b091533.yaml | 58 +++++++++++++++++++ ...orms-3c9dac2ddd3bec2b9b5eb5b21c8ec91e.yaml | 58 +++++++++++++++++++ ...orms-3dacf8e00581b97f923ad6f17ff4ac46.yaml | 58 +++++++++++++++++++ ...orms-458e05b1bcf27643dfd06ce9324ce2c4.yaml | 58 +++++++++++++++++++ ...orms-4bf361aef2d1a7792461202b02e3df2e.yaml | 58 +++++++++++++++++++ ...orms-55f90d534a47161e6795864c30da55c2.yaml | 58 +++++++++++++++++++ ...orms-561eff22a0971cf174004fe156be75cb.yaml | 58 +++++++++++++++++++ ...orms-57cd30237a115f155e6a16a851952284.yaml | 58 +++++++++++++++++++ ...orms-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml | 58 +++++++++++++++++++ ...orms-624315d392127da9cdbb25a9ce0695f6.yaml | 58 +++++++++++++++++++ ...orms-6eed35694a75496bc23819374091960c.yaml | 58 +++++++++++++++++++ ...orms-706995907d69bd14e09ce77802032800.yaml | 58 +++++++++++++++++++ ...orms-707e5bb3cb201f78de35f00133c00922.yaml | 58 +++++++++++++++++++ ...orms-71b7f03c0d03bb060a04690fb6bef364.yaml | 58 +++++++++++++++++++ ...orms-740df732c021f2878fae481d2ff89873.yaml | 58 +++++++++++++++++++ ...orms-74be7f504d2131ca6cf13b47a8275858.yaml | 58 +++++++++++++++++++ ...orms-7a3eb0e4a2da32f4626463054bad7fe1.yaml | 58 +++++++++++++++++++ ...orms-7c7b836ffaa221f1b27ae77d75f66b3c.yaml | 58 +++++++++++++++++++ ...orms-844eb2f2a31165d103093ea081bdb4c7.yaml | 58 +++++++++++++++++++ ...orms-88ca4a7bd7c66c74cd477716cd98c157.yaml | 58 +++++++++++++++++++ ...orms-8af21f8f0c6e953daf8df61c5c7a078e.yaml | 58 +++++++++++++++++++ ...orms-9158a4f23cb6df7f396a1ff79ad04a19.yaml | 58 +++++++++++++++++++ ...orms-987fd1a6de7b9a768ddbb56335fccbb6.yaml | 58 +++++++++++++++++++ ...orms-9b10289c81ee712ffc41aaeeec7d52b6.yaml | 58 +++++++++++++++++++ ...orms-a2ca90e41d2e5160436c08c965469eba.yaml | 58 +++++++++++++++++++ ...orms-a784d42cac6270b3d15c7ded3f777f0b.yaml | 58 +++++++++++++++++++ ...orms-acac9b9e0c119ebbfe4a3d5af280d8ac.yaml | 58 +++++++++++++++++++ ...orms-b156b450e510844126aa5b98c430cad1.yaml | 58 +++++++++++++++++++ ...orms-ba28eba12a04215286d701e542084879.yaml | 58 +++++++++++++++++++ ...orms-c1844c535b6764f33ccae986eaa4a431.yaml | 58 +++++++++++++++++++ ...orms-c27b108510956c02768a728e2ce3fea8.yaml | 58 +++++++++++++++++++ ...orms-c4d0cc55798aa0e869ce6641ec043946.yaml | 58 +++++++++++++++++++ ...orms-c696f7538d036d4b686b31bca8e05d88.yaml | 58 +++++++++++++++++++ ...orms-c6b42e72ee53deb1fea76d399e341eb4.yaml | 58 +++++++++++++++++++ ...orms-c8ac9a46bde9d08b3cb4f64cfc42f9d1.yaml | 58 +++++++++++++++++++ ...orms-cefd5e99fb5e46fe5dc72467ce88dd69.yaml | 58 +++++++++++++++++++ ...orms-d14229a7a274bce478767a3985696f57.yaml | 58 +++++++++++++++++++ ...orms-d52a1b2d96a87813163020667b1d0ea9.yaml | 58 +++++++++++++++++++ ...orms-d58c1c7e73217599c748d955d8555b74.yaml | 58 +++++++++++++++++++ ...orms-d842d5a8fa51f3d63cc0b912fb91180a.yaml | 58 +++++++++++++++++++ ...orms-dc4ac81f8a955635294d773c7dd984b2.yaml | 58 +++++++++++++++++++ ...orms-e6738d3799e5a12b0457c2f4dc805c15.yaml | 58 +++++++++++++++++++ ...orms-ea56b6fc3599b19cc9355c178eadf7c8.yaml | 58 +++++++++++++++++++ ...orms-eb2e2d24b00f12552ab6c531c273fecb.yaml | 58 +++++++++++++++++++ ...orms-f42c358b68f2276f45d8e8fe7cf0bf75.yaml | 58 +++++++++++++++++++ ...orms-f907d4a58e9ce997eff45b8f7487d4d2.yaml | 58 +++++++++++++++++++ ...oads-4bc78371b9a6176130f5ed1b3336f728.yaml | 58 +++++++++++++++++++ ...oads-b97c4bb0c30e63e1bfc74807877230de.yaml | 58 +++++++++++++++++++ ...oads-cfede18703e7f00a56bec51b65b32812.yaml | 58 +++++++++++++++++++ ...ance-974c074b19789002549ca2e695247e1e.yaml | 58 +++++++++++++++++++ ...oard-42cd9ebeecaa0d8da2012c8fd7d95b4c.yaml | 58 +++++++++++++++++++ ...oard-ecdcb2d721b829e6a99b4761ba53fdfc.yaml | 58 +++++++++++++++++++ ...bles-208c19b89658d8f67c58a70365a86a8d.yaml | 58 +++++++++++++++++++ ...bles-406776aa8100e59355ccb6cf6b38aab0.yaml | 58 +++++++++++++++++++ ...bles-87a2603e70828cd5276b845c0ebcc6ab.yaml | 58 +++++++++++++++++++ ...bles-b925b2b6daf2d6ebba61a79be7a0f3f1.yaml | 58 +++++++++++++++++++ ...wall-bfe7f25b364c1c551aace9e3b8962033.yaml | 58 +++++++++++++++++++ ...-ses-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...port-a6bdfa613b7b681292bdcc51a2102fdd.yaml | 58 +++++++++++++++++++ ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ions-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...pack-bd4439ed9a58ebca35ee43480cc063fc.yaml | 58 +++++++++++++++++++ ...pack-e25f78b15c303433589429f0f1d159bb.yaml | 58 +++++++++++++++++++ ...loud-94bc27f855a1b3e71ba6782c8361e04d.yaml | 58 +++++++++++++++++++ ...ader-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml | 58 +++++++++++++++++++ ...ader-297873237de6b81c34c6241d19a94b3b.yaml | 58 +++++++++++++++++++ ...ader-345c91064d515186e70e2a5884cb7eb7.yaml | 58 +++++++++++++++++++ ...ader-46ddc1fb6e6a17cf8f3a950bda697f09.yaml | 58 +++++++++++++++++++ ...ader-591a1da3346f8d80da2af4a888473bd6.yaml | 58 +++++++++++++++++++ ...ader-6555d944c0da7a05c7a9f7417ba389b0.yaml | 58 +++++++++++++++++++ ...ader-6eae0900047437ffd3af67b0a999c0ce.yaml | 58 +++++++++++++++++++ ...ader-7ab127dd070b1ecb99f880fa6c24c6c9.yaml | 58 +++++++++++++++++++ ...ader-7e92e5675339b75e77ca040e1f512f1b.yaml | 58 +++++++++++++++++++ ...ader-907b43a94b9878024b4d583046e9b3a5.yaml | 58 +++++++++++++++++++ ...ader-912300bb987f9b62927bac6bd20872ca.yaml | 58 +++++++++++++++++++ ...ader-9d01a3c1450589963802e2c82f79a1da.yaml | 58 +++++++++++++++++++ ...ader-a0c32d3142a601a64a1bd122ecb7baaa.yaml | 58 +++++++++++++++++++ ...ader-cf17a017c60d948b78f758c0612d102b.yaml | 58 +++++++++++++++++++ ...ader-f1f1da3dcd767a5d11f1b776e491f57d.yaml | 58 +++++++++++++++++++ ...ader-f3328c896ffc09c53e1ecdfa60c1e5c5.yaml | 58 +++++++++++++++++++ ...ader-f4c2701ff75483ce690141623ec5eff4.yaml | 58 +++++++++++++++++++ ...iate-43886ab11181377f0791e69c2c423b63.yaml | 58 +++++++++++++++++++ ...tion-ecb41dd5dc38a4c73cfc3b8c255506fd.yaml | 58 +++++++++++++++++++ ...erce-268f07777e79e9582f2676bd74ffb8e4.yaml | 58 +++++++++++++++++++ ...erce-94af6b10fc464ad700fcc3825517ff11.yaml | 58 +++++++++++++++++++ ...inks-7a7c093f97491b5547b10f0abf94cd54.yaml | 58 +++++++++++++++++++ ...osts-42ee0da57f529d4a1f0ef2f4cdec544f.yaml | 58 +++++++++++++++++++ ...ment-bb94b7c262e87ba0deb3b3b8cd65e66b.yaml | 58 +++++++++++++++++++ ...ment-c253a6af837c11e2505414f6b22094fe.yaml | 58 +++++++++++++++++++ ...llow-a8cfb826ae3cd1e60648ab483d0a35aa.yaml | 58 +++++++++++++++++++ ...inks-dc8fd7c1140c8670f406818f67e3d066.yaml | 58 +++++++++++++++++++ ...inks-acc6eb8dd4e1bc540251436012892eb1.yaml | 58 +++++++++++++++++++ ...aces-83baefa8fe364357f6ef3e61c50fe83c.yaml | 58 +++++++++++++++++++ ...able-3c7165ed170542d9a48b7ebd75bdcfa2.yaml | 58 +++++++++++++++++++ ...able-8fd07febda83bd8c742a5f51259e2434.yaml | 58 +++++++++++++++++++ ...nooz-2b837a9bfbedcec8d35d48ea5080f6cf.yaml | 58 +++++++++++++++++++ ...mpti-bedbd591f6ca39f0af80a1081665a67e.yaml | 58 +++++++++++++++++++ ...ress-8247dd9e5bbd39d391956bd6159727f9.yaml | 58 +++++++++++++++++++ ...ress-8825e85de759f44127189c61a2caf509.yaml | 58 +++++++++++++++++++ ...ress-c6243b9dee6460614115df8351692603.yaml | 58 +++++++++++++++++++ ...ress-fc9778d621394c461290861e9ffed74c.yaml | 58 +++++++++++++++++++ ...-bar-18ae8fd1e9cb93487e81ac53ef4e167a.yaml | 58 +++++++++++++++++++ ...oard-b3b2af8cc00699a0018afcc81e707f41.yaml | 58 +++++++++++++++++++ ...ices-84d0d45fa88276425857758501e9c199.yaml | 58 +++++++++++++++++++ ...tion-eae4213a5c0782ae01f44dd9c21edcbb.yaml | 58 +++++++++++++++++++ ...ionx-735661dd4e86df9c4dde01f9f3e84d09.yaml | 58 +++++++++++++++++++ ...ionx-a270bbda89fbbfcb6121d07d9ec5b627.yaml | 58 +++++++++++++++++++ ...ionx-ad0a1b158b4e99b448b1e95b8addbc39.yaml | 58 +++++++++++++++++++ ...ionx-bcbaad1a845c82aad1bef42558b56fdd.yaml | 58 +++++++++++++++++++ ...form-9efb6c4b18285974b32863549d5c9405.yaml | 58 +++++++++++++++++++ ...list-6151f342a42025e02d427b32216a8adf.yaml | 58 +++++++++++++++++++ ...list-f083409bbde8131959cd560116eb8b78.yaml | 58 +++++++++++++++++++ ...-map-fd902d7294b8be7fc6c94e658239c2f8.yaml | 58 +++++++++++++++++++ ...puty-822c780c5b9c36a2c5c6155802580253.yaml | 58 +++++++++++++++++++ ...puty-9980c05da6f848a401a8e11f20123173.yaml | 58 +++++++++++++++++++ ...omer-b9cea09f7ed512cb1aad12f24e857815.yaml | 58 +++++++++++++++++++ ...r-wp-b2640c0e1d9759721b91219a63bf25ee.yaml | 58 +++++++++++++++++++ ...mark-0c0dde4c7a1e8ecba300d4f3a84714f5.yaml | 58 +++++++++++++++++++ ...-cdn-f0470adcfca34e53051811d10184b858.yaml | 58 +++++++++++++++++++ ...gify-a865b1f08fb1dfda225878dc830c893d.yaml | 58 +++++++++++++++++++ ...ngot-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ngot-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...chat-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-b5871188dda12d0d2d7ff147e7d129e3.yaml | 58 +++++++++++++++++++ ...weet-8b7ce3f62fb6e151f58953706865b9ed.yaml | 58 +++++++++++++++++++ ...ient-ed96d7b172dbc6676f3aac8fd6c4f947.yaml | 58 +++++++++++++++++++ ...tion-3ea452a110a6d721fb0c1348d6616fc5.yaml | 58 +++++++++++++++++++ ...tion-c53104da05cdac90a010088ce54093bb.yaml | 58 +++++++++++++++++++ ...pers-bca2d75657a1c7a6e99c08d66b7b4e2e.yaml | 58 +++++++++++++++++++ ...ider-2b20f536c5a1e1ecc9328244cf31fc2a.yaml | 58 +++++++++++++++++++ ...ider-41a31043d8f2b87b33721864ecd51995.yaml | 58 +++++++++++++++++++ ...ider-4b9f20c2f55cb0278e501a36498340f1.yaml | 58 +++++++++++++++++++ ...ider-b493d32c53c148490b49a06f9023d87a.yaml | 58 +++++++++++++++++++ ...ider-c7806db2330d78c1eb21bb3d81129b2a.yaml | 58 +++++++++++++++++++ ...ider-cbceddd57d7051d45761e4fa44eca556.yaml | 58 +++++++++++++++++++ ...ider-ef86ab7f523579cf61ae7ca65b0017ce.yaml | 58 +++++++++++++++++++ ...rver-11efe70fd2ae23707bfcf341a18862cb.yaml | 58 +++++++++++++++++++ ...ions-ffea4c38dbbf6eb29f1bb344ee6bae12.yaml | 58 +++++++++++++++++++ ...xtra-09c7e3b2a6a061e164af74ab6001f045.yaml | 58 +++++++++++++++++++ ...xtra-15e84b289a1503987417bb5a8a9db81a.yaml | 58 +++++++++++++++++++ ...xtra-1fa0a5990488e25fdbc5ceea9aa094d8.yaml | 58 +++++++++++++++++++ ...xtra-219e356df9406ff61a0cdb8030ff8ed2.yaml | 58 +++++++++++++++++++ ...xtra-4ea74f3f54b0253dbabe0bce4a43a6d7.yaml | 58 +++++++++++++++++++ ...xtra-59a12b62de2e9aeb74cd74615dde1cd6.yaml | 58 +++++++++++++++++++ ...xtra-675e6b4bb186a17f8fbe362e07f780dc.yaml | 58 +++++++++++++++++++ ...xtra-6f81fcdf0f0749244884a26bed49387a.yaml | 58 +++++++++++++++++++ ...xtra-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...xtra-d17f4b50b1d89180cdbd40b462cf4e20.yaml | 58 +++++++++++++++++++ ...xtra-dd78e64b2b479493968a1e6217c98447.yaml | 58 +++++++++++++++++++ ...-mp3-427c0efd9f4fe0120009a410add6694b.yaml | 58 +++++++++++++++++++ ...gist-d5fb85be1bce7f68e1b15520cd177f7a.yaml | 58 +++++++++++++++++++ ...bars-aedb89e2581210acfc64d10b1fcd7670.yaml | 58 +++++++++++++++++++ ...ixel-f71c21bb0ac8ac3a83c45ec9ea5fb6b4.yaml | 58 +++++++++++++++++++ ...ixel-fc2e2c986080502cae4c6d1516b6383d.yaml | 58 +++++++++++++++++++ ...orms-26c3585e6e7fad9c8d3a82c1982ff984.yaml | 58 +++++++++++++++++++ ...orms-72b3ee0aa0ee9a6370b95e5e332c6b93.yaml | 58 +++++++++++++++++++ ...orms-8057fa684bd813756becca039228732e.yaml | 58 +++++++++++++++++++ ...orms-83cdeca9a177bee255e863b7e36aae57.yaml | 58 +++++++++++++++++++ ...orms-a684bdf0ee6ecd33a27b06b384e7ee6c.yaml | 58 +++++++++++++++++++ ...orms-e5931a630006ade9f39755f24e1f8775.yaml | 58 +++++++++++++++++++ ...thod-74909c964d07fc09665c9e492aec8fb5.yaml | 58 +++++++++++++++++++ ...ress-d0adb6ab141d87bc7e2689c3386228f9.yaml | 58 +++++++++++++++++++ ...tags-d6eff878d5e751e7448431e370bd1e18.yaml | 58 +++++++++++++++++++ ...maps-edd20f1acfb98b2d0a1653edfc88a6dc.yaml | 58 +++++++++++++++++++ .../oik-31709e141c457255c2ab0ae7529088be.yaml | 58 +++++++++++++++++++ ...ream-a72c869069d2e541af149f51ffaa7390.yaml | 58 +++++++++++++++++++ ...odes-76ca7c77b83fa68f077aef4f9085d916.yaml | 58 +++++++++++++++++++ ...odes-d25bac07f3777da904ec9b43911bfe31.yaml | 58 +++++++++++++++++++ ...odes-d767c0b5d303daf65b04ebec294c7e3f.yaml | 58 +++++++++++++++++++ ...eter-c521258f5992e6f5c61e1567e72a1351.yaml | 58 +++++++++++++++++++ ...port-440a978024c68b2f27be0eeba3cb55c2.yaml | 58 +++++++++++++++++++ ...port-5d017f957b0d5736d3f04d80942cf97a.yaml | 58 +++++++++++++++++++ ...-pos-245aba3aeb74b218457ab6f11f877ea6.yaml | 58 +++++++++++++++++++ ...-pos-258778bddb1333c1704be45e0fa7b778.yaml | 58 +++++++++++++++++++ ...onts-97a8bbca52a057b5fde67edd446b89ce.yaml | 58 +++++++++++++++++++ ...bile-719947b7a1ac06fd82b24dd2b2c29f27.yaml | 58 +++++++++++++++++++ ...iles-6a2f2d47c1f3b50eb9874ef14abbcb61.yaml | 58 +++++++++++++++++++ ...nect-8c66e65fe1fbe52e6fc55791d539f808.yaml | 58 +++++++++++++++++++ ...nect-fed4c752f6b00fd9dda419d58b575ffe.yaml | 58 +++++++++++++++++++ ...opup-a274b1ec9586c121ed58c6cb9eda6a2b.yaml | 58 +++++++++++++++++++ ...opup-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...port-a9a32f74174df8c480433ef7ce05b39d.yaml | 58 +++++++++++++++++++ ...ogin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ater-a27299fafee4147eee6143e446c0d4ac.yaml | 58 +++++++++++++++++++ ...-ssl-a5333a81df962bfc4dc1ef98d3ece12b.yaml | 58 +++++++++++++++++++ ...ocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...atar-2eb3196d201c69c1b619f7192e23dfa3.yaml | 58 +++++++++++++++++++ ...atar-7a9355f03955196b49afdc0799980494.yaml | 58 +++++++++++++++++++ ...rder-5e1a23f981a78be569054daae1a85203.yaml | 58 +++++++++++++++++++ ...rder-5fad00879c22741100673bb27b7a3e06.yaml | 58 +++++++++++++++++++ ...rder-78ddb3e5efc137c9989117bb477a197f.yaml | 58 +++++++++++++++++++ ...rder-96bf5a76ba4653bdf89616d82d0bf5c1.yaml | 58 +++++++++++++++++++ ...-sso-1108320cabd88205cc0f43eb95edee22.yaml | 58 +++++++++++++++++++ ...-sso-5904f2c1ee5058ca4f26abdf16ad81a9.yaml | 58 +++++++++++++++++++ ...-sso-915fc461dd70a0b67939a2bed7cf5a68.yaml | 58 +++++++++++++++++++ ...-sso-a4d6624c57bb300c720d6a9c5b907312.yaml | 58 +++++++++++++++++++ ...-sso-eefbacdc57528669a142d2f5ac41c616.yaml | 58 +++++++++++++++++++ ...ions-697b3f7f41c78660c9aef82a5b73a231.yaml | 58 +++++++++++++++++++ ...nion-161c93480bad1a6fddf7935d08286cca.yaml | 58 +++++++++++++++++++ ...nion-95f9bc03677a083bf89832ea0c794033.yaml | 58 +++++++++++++++++++ ...nion-ad2905956fc52c5a5c7897e5da61eb9e.yaml | 58 +++++++++++++++++++ ...quiz-8c9605e19ac036b6c4395d0ff8d48030.yaml | 58 +++++++++++++++++++ ...quiz-b0e06633c5fe43db8e7a0339b16c2f91.yaml | 58 +++++++++++++++++++ ...lity-079b2f2c54a8b1fed68b5c27dcb96254.yaml | 58 +++++++++++++++++++ ...lity-2cc161db9aab9dca8c45963425559bbc.yaml | 58 +++++++++++++++++++ ...lity-32de7cdd0bd82a27d1f9a9185ff54e70.yaml | 58 +++++++++++++++++++ ...stem-236e1bbcc1e74385f1fd59662dd67917.yaml | 58 +++++++++++++++++++ ...stem-c1ecb14191a04d9e43d6e6f80f13e749.yaml | 58 +++++++++++++++++++ ...le-1-6da6015396d12ad265b2f5a24810c5e3.yaml | 58 +++++++++++++++++++ ...chat-802c4864b87b89e6df06fc16568188de.yaml | 58 +++++++++++++++++++ ...ntor-1ec906f849b052ad86a65e59b4ad588d.yaml | 58 +++++++++++++++++++ ...ntor-aef6ec9f420d3aef577ad115ead987ef.yaml | 58 +++++++++++++++++++ ...oorl-e0cc1eea89ba954f43096969782e9ac2.yaml | 58 +++++++++++++++++++ ...spam-1fe914fcf9950622b9e1e73ce1a20a73.yaml | 58 +++++++++++++++++++ ...spam-6bf95a000c0173a075e212bc6eeb873d.yaml | 58 +++++++++++++++++++ ...tate-2a75025d80c85273c30a2737105c9f4c.yaml | 58 +++++++++++++++++++ ...tate-92760ee1af263e3e31758b506a58ef85.yaml | 58 +++++++++++++++++++ ...king-6dff8ad57b57f849baa2c45d3ecc2834.yaml | 58 +++++++++++++++++++ ...ntor-75f9430e21b1ffadf43723a73937595b.yaml | 58 +++++++++++++++++++ ...ache-57773fba6f4ab595b91e9cf1bf98318c.yaml | 58 +++++++++++++++++++ ...ndow-00198a18211aefc70b8ce0f7e41cdd92.yaml | 58 +++++++++++++++++++ ...ndow-39407bfbd26cec40aa785db15ec93f9b.yaml | 58 +++++++++++++++++++ ...abox-74b8f8fd0be969b30108aa2c0d40f175.yaml | 58 +++++++++++++++++++ ...hite-ee6e51fb33ca759d2625bd1f3a131728.yaml | 58 +++++++++++++++++++ ...atie-96ad90fd0ad467a1d69bc6e1840d3891.yaml | 58 +++++++++++++++++++ ...cial-55fba5060ceecf0350eb52f214341712.yaml | 58 +++++++++++++++++++ ...-map-d517a1f1b39fbb25ce31405c236e39dc.yaml | 58 +++++++++++++++++++ ...data-fc3bbad32864e7b45f7b03bfa40e7ab6.yaml | 58 +++++++++++++++++++ ...enid-849d5a0a490a95eaf95ef135844c0ef2.yaml | 58 +++++++++++++++++++ ...ours-02f013b54b4f3674afd49b3afca90a89.yaml | 58 +++++++++++++++++++ ...ours-55a39ce22d26293084937266d25d08be.yaml | 58 +++++++++++++++++++ ...ours-8a9da35b1949b285490ef29120cda9a5.yaml | 58 +++++++++++++++++++ ...ours-8ef1ea8d8498496f3516b88ed77244c0.yaml | 58 +++++++++++++++++++ ...ours-c0079d75a97eeffbdeb6d0d0f4759f91.yaml | 58 +++++++++++++++++++ ...ress-0c949bb41cfd828ec7a8283210519fde.yaml | 58 +++++++++++++++++++ ...nsea-3e83969edc359576afe93a3a140053fe.yaml | 58 +++++++++++++++++++ ...nsea-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-txt-bd57476daf1ac0de7401eb5bfcebce92.yaml | 58 +++++++++++++++++++ ...anda-e524be4e74a799805187c5341f4ea89f.yaml | 58 +++++++++++++++++++ ...ress-a4c0765b0c52463caf31b82bc7711eb8.yaml | 58 +++++++++++++++++++ ...e-wp-7ae1e981db663479bebe95d4fc6e1fb9.yaml | 58 +++++++++++++++++++ ...e-wp-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...orms-b4a1c53e99884a28029186adce52a970.yaml | 58 +++++++++++++++++++ ...orms-d9b7d332948d93ec19ade23944fe8ee3.yaml | 58 +++++++++++++++++++ ...irex-487b45c8da9cac09ef28c95c49514ba6.yaml | 58 +++++++++++++++++++ ...inly-65a9527890576df98e6c12dd65024410.yaml | 58 +++++++++++++++++++ ...inly-8c1dce2381adf553748abcaef006cd86.yaml | 58 +++++++++++++++++++ ...ster-2e5b9dabe10dfc18a46871d43fa96491.yaml | 58 +++++++++++++++++++ ...ster-7ec39aae63fcb435502dc6ef345e3943.yaml | 58 +++++++++++++++++++ ...ster-8105121190d01c38a4c87c0ee0fe8654.yaml | 58 +++++++++++++++++++ ...ster-83bf7d35b08455904e5385f6657b0ce1.yaml | 58 +++++++++++++++++++ ...ster-fe779104db6239df2fe810ed3afc3c87.yaml | 58 +++++++++++++++++++ ...tree-3026c779c348f01329035d4d36b36cef.yaml | 58 +++++++++++++++++++ ...tree-5b29964f9492d211e56c39574405e47e.yaml | 58 +++++++++++++++++++ ...tree-6e42e23486d09ec34675722772aa1b90.yaml | 58 +++++++++++++++++++ ...tree-75c93ad74d45c10e07e436b9060dff63.yaml | 58 +++++++++++++++++++ ...tree-aa5a6552b97b2c6070e07b71a44f6dad.yaml | 58 +++++++++++++++++++ ...teen-0aceb58e1789a00f8987ade1ad5f4576.yaml | 58 +++++++++++++++++++ ...form-cb748c9c9efa655b709ed263bb18ce58.yaml | 58 +++++++++++++++++++ ...form-dc42737b07ffe9283fc25fc1965481dd.yaml | 58 +++++++++++++++++++ ...ator-083f45dd5cb197f01c97e7659014e0d8.yaml | 58 +++++++++++++++++++ ...ator-a2161b786ba8d84bdb2a3d032cd3b972.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-feb8c11c4ef0641488804a4e83e4b8c9.yaml | 58 +++++++++++++++++++ ...date-2d0aa79c36a81084122d47bccf285480.yaml | 58 +++++++++++++++++++ ...date-b3374ece5f330b0776522f2f5130afbd.yaml | 58 +++++++++++++++++++ ...date-eee696eab23205a2046e2b67a8b48808.yaml | 58 +++++++++++++++++++ ...erce-71393429192117f00dfd4a162cb8bf61.yaml | 58 +++++++++++++++++++ ...erce-fbf291b4c987a79d80bf5dc32be200a9.yaml | 58 +++++++++++++++++++ ...erce-0088814ed74fd156e9ee132de51ef1d2.yaml | 58 +++++++++++++++++++ ...erce-bb5370676c8e655ad72a3791cdb04f1e.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-woo-788617c7c507dc55ce43d126204f73e2.yaml | 58 +++++++++++++++++++ ...king-32b3fdbe7b7f22c46479a3e9393eb06a.yaml | 58 +++++++++++++++++++ ...king-61c433e3c6260b98301128a0db50f713.yaml | 58 +++++++++++++++++++ ...erce-0088814ed74fd156e9ee132de51ef1d2.yaml | 58 +++++++++++++++++++ ...erce-2c636c041261dbec5d7ba4cab181df88.yaml | 58 +++++++++++++++++++ ...ally-0a78b90f665dee3807012f6bf66ac8e7.yaml | 58 +++++++++++++++++++ ...ally-53cad8b598a3c7e05217d7a8485ccce4.yaml | 58 +++++++++++++++++++ ...ally-6221ac90696b9d40486e73f6a756b92e.yaml | 58 +++++++++++++++++++ ...hart-7a149af217c0a6dffb13397d014d6e33.yaml | 58 +++++++++++++++++++ ...hart-7dc1fbd7e7abf281f194a7d7c03c76ee.yaml | 58 +++++++++++++++++++ ...hart-a4e88b3da711b27ab40f6efd4bb4e5fa.yaml | 58 +++++++++++++++++++ ...hart-fbacd93e40e029ab5294ff6e4faadc80.yaml | 58 +++++++++++++++++++ ...izer-1b5adfb99c271100e33918010bf13877.yaml | 58 +++++++++++++++++++ ...izer-a88755371a7efc7dfaacf49c4e565b46.yaml | 58 +++++++++++++++++++ ...ster-ee1e925bdddc6bf24a1981ba88df97ca.yaml | 58 +++++++++++++++++++ ...ribe-a1996943f46f7e75b7c830d7d4d93d4d.yaml | 58 +++++++++++++++++++ .../osm-8b5e55916d6d52550d91a97ed666547f.yaml | 58 +++++++++++++++++++ .../osm-b58caf3062d49a3b707b9a414cc1dfaa.yaml | 58 +++++++++++++++++++ ...pper-2113dc45f9cb386268821363e5c4256a.yaml | 58 +++++++++++++++++++ ...iyun-60929a68cddca1a94650b63066730255.yaml | 58 +++++++++++++++++++ ...ocks-08e36a5e429e15172c47a461c7457404.yaml | 58 +++++++++++++++++++ ...ocks-46f9477f32da89d305905e8493b5f75e.yaml | 58 +++++++++++++++++++ ...ocks-74e59a3e9ea29768b5d0afa832d7eb55.yaml | 58 +++++++++++++++++++ ...ocks-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...ocks-c6ebd7f92a6a9f141b0c9e1fd40276a5.yaml | 58 +++++++++++++++++++ ...ocks-d1fde79ddb6f5cce29eedf02f3d4b354.yaml | 58 +++++++++++++++++++ ...ocks-e70c973ee52c3a8cad3d00694281c5e4.yaml | 58 +++++++++++++++++++ ...ocks-eb48e0d7cc280c7a495d24563f61a7d5.yaml | 58 +++++++++++++++++++ ...-pro-89238e69360283d59cda9a307dc44ad9.yaml | 58 +++++++++++++++++++ ...-pro-9f787a2ef36698ab9d958e79e9a7609e.yaml | 58 +++++++++++++++++++ ...case-fa0b498c03b490f6a302c8923c66045e.yaml | 58 +++++++++++++++++++ ...nced-15ed4766d27c484c5517c27d81b8d51f.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-box-746c295d8ae3e879964a1880bd187ba1.yaml | 58 +++++++++++++++++++ ...ager-c4f801789643f99238516422e3dea2a6.yaml | 58 +++++++++++++++++++ ...dule-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lkit-01230d7023712cf52d185f89bc18a400.yaml | 58 +++++++++++++++++++ ...ndle-c5037c5f6ce141975f7a422878dcc1cf.yaml | 58 +++++++++++++++++++ ...ddon-7f87928645d2c31cf00fa75d4b3905c3.yaml | 58 +++++++++++++++++++ ...ddon-965d06634426ae72a55053fa07ab23f9.yaml | 58 +++++++++++++++++++ ...usel-4dd1db9fbfcd7d8c0bd7134fb7dd4c2e.yaml | 58 +++++++++++++++++++ ...usel-9a422d0a1f5b287c75a0c4e8af0a5fc9.yaml | 58 +++++++++++++++++++ ...ther-8e5a5c6c98d5ff17214ae536b2646317.yaml | 58 +++++++++++++++++++ ...ther-d0ac90c02958fd486fae19ccf9cfd8db.yaml | 58 +++++++++++++++++++ ...tras-453edd08020fcb6cf7997bc23916e6f1.yaml | 58 +++++++++++++++++++ ...ygen-c334c90cee1067800314e97523ff3712.yaml | 58 +++++++++++++++++++ ...lder-c7a8bc13237071ee5b2f66d58803bacf.yaml | 58 +++++++++++++++++++ .../p3-a64f133bbd4857bc65950b864d18ea1f.yaml | 58 +++++++++++++++++++ ...iler-a26b66ffa61f83ecbb446f03cc1365ad.yaml | 58 +++++++++++++++++++ ...orwc-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...tion-2afaa956cded901d5ea2b4034f565538.yaml | 58 +++++++++++++++++++ ...tion-7e7d3fe35e3640caa3a72acaf61512d5.yaml | 58 +++++++++++++++++++ ...-add-1320225def4406c9e713cc329abaeb70.yaml | 58 +++++++++++++++++++ ...-add-65def4250a9c953c2f2257736ac45133.yaml | 58 +++++++++++++++++++ ...-add-76176e7d0b3c59c6f85d0f00865be579.yaml | 58 +++++++++++++++++++ ...-add-8417ca6ea2b385ef6685bba03ed8d8b5.yaml | 58 +++++++++++++++++++ ...-add-edfb37ba6e16342d02314bfa81ec308b.yaml | 58 +++++++++++++++++++ ...zexo-2ef42991bf5a3f6fe661eaa83837878d.yaml | 58 +++++++++++++++++++ ...zexo-903fd5007a29b9028410d0ffded470cf.yaml | 58 +++++++++++++++++++ ...zexo-f6a42cf9626a59a17d2bd6cce7c38364.yaml | 58 +++++++++++++++++++ ...zexo-ff89b70bfc48d132d2c1ae5c1ed04b8e.yaml | 58 +++++++++++++++++++ ...wich-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...wich-dba2df430cd702194cd11fb9213b265a.yaml | 58 +++++++++++++++++++ ...wich-f83002599a8aabe9f476ac830785a4d7.yaml | 58 +++++++++++++++++++ ...lery-bcdafb8d52b9b91e60896c4aab2b09a5.yaml | 58 +++++++++++++++++++ ...ator-02e1028b272d28de63335e7341b29e10.yaml | 58 +++++++++++++++++++ ...ator-328db48b412bf150c51734d4e256b1dc.yaml | 58 +++++++++++++++++++ ...ator-56d5619e454c2de075a4d59b6b36a2ce.yaml | 58 +++++++++++++++++++ ...lder-3b2a7a5fae5eb0af3506d02977a7f182.yaml | 58 +++++++++++++++++++ ...ager-547afaf6e830675a579bd6f2437a1e07.yaml | 58 +++++++++++++++++++ ...list-c7b94497207a62b415298f2f46cd674e.yaml | 58 +++++++++++++++++++ ...ects-06f0f6d997d3961c4576d91935933f05.yaml | 58 +++++++++++++++++++ ...o-id-6d5213a5628e216eb9e2a763fb4762ea.yaml | 58 +++++++++++++++++++ ...o-id-ffddbf496e7aaec02b6e7ddf918beed0.yaml | 58 +++++++++++++++++++ ...lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ount-13ec2bdc85df7c3571b35167e7c009d7.yaml | 58 +++++++++++++++++++ ...ount-67889b4ef1ae0d338be85daad64d3e7e.yaml | 58 +++++++++++++++++++ ...ount-b957833416680c3ce9532cace332c8be.yaml | 58 +++++++++++++++++++ ...ount-d058005189aafe6324b373d8ff03e3df.yaml | 58 +++++++++++++++++++ ...ebar-4b545f99e277a5b533a4828fddfdf3e6.yaml | 58 +++++++++++++++++++ ...ayer-03e434d9ea9a280060b3548276610903.yaml | 58 +++++++++++++++++++ ...ayer-05c61ba0f98849485be0002b6c76289c.yaml | 58 +++++++++++++++++++ ...ayer-2c10300e2e1d17099380134c8c4a5148.yaml | 58 +++++++++++++++++++ ...ayer-3368388a3eaf6ed2424923ab628b316b.yaml | 58 +++++++++++++++++++ ...ayer-37e749759243317adc52896293ee760e.yaml | 58 +++++++++++++++++++ ...ayer-49d9da9d472a0f5eb0cb749075fe3a10.yaml | 58 +++++++++++++++++++ ...ayer-53b0e5659c4aa4d52f12594842768c39.yaml | 58 +++++++++++++++++++ ...ayer-6c1bbce4c7a429a52d508c4dfbc689a9.yaml | 58 +++++++++++++++++++ ...ayer-822954310f58c5920d9c99a5b8f20e8a.yaml | 58 +++++++++++++++++++ ...ayer-891807496f9388f784feeff012bb9ac8.yaml | 58 +++++++++++++++++++ ...ayer-98aaf1a94b96eeb1d120f5b84c22c6ea.yaml | 58 +++++++++++++++++++ ...ayer-a19b0ea5f3c4659620b13f7e795adf29.yaml | 58 +++++++++++++++++++ ...ayer-c9ad2218a91633282ea6a559fd4a007d.yaml | 58 +++++++++++++++++++ ...ayer-e0bc64c58043fcf22274a1d73a269f55.yaml | 58 +++++++++++++++++++ ...ayer-f28d0839e906933601f8e3530cfcec02.yaml | 58 +++++++++++++++++++ ...mash-d079a0462c534cbc9ce3a05b45c6a4d6.yaml | 58 +++++++++++++++++++ ...code-4f011bf5e0985256ce0dc243eb8712f9.yaml | 58 +++++++++++++++++++ ...rict-383952897352436c7747104565840796.yaml | 58 +++++++++++++++++++ ...rict-449418fde0e77076010b8e37969e0e31.yaml | 58 +++++++++++++++++++ ...rict-4d8ef6bd985f2d34f506708108c9100b.yaml | 58 +++++++++++++++++++ ...tion-4ed0ed5324b5c3f087d2833d0484d7f4.yaml | 58 +++++++++++++++++++ ...tion-b86bab5c8fb0747eadd8257097e9b226.yaml | 58 +++++++++++++++++++ ...tion-fd43c9edc7bf436e03f5d59fcc9642f0.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...ions-134f2819e254034a77fb510bfe9b93c9.yaml | 58 +++++++++++++++++++ ...ions-3ac481618eb4347f5fc9d0f89470f6b5.yaml | 58 +++++++++++++++++++ ...ions-646e25531b1fa1af8fcb5aec525b7439.yaml | 58 +++++++++++++++++++ ...ions-ca8deb8cc99a7e80212ae873b89f0b6b.yaml | 58 +++++++++++++++++++ ...ions-cce20befda4e7caf1b066f754d7a6624.yaml | 58 +++++++++++++++++++ ...ions-da4af52f1837930e94d6d4291aca5d50.yaml | 58 +++++++++++++++++++ ...ship-1e4c87f532b07cfd840241f44de6c8f0.yaml | 58 +++++++++++++++++++ ...-pro-286f920ff3d0f48835cc5b28e8181446.yaml | 58 +++++++++++++++++++ ...-pro-2f5b75adc13263d5beea70db43442acd.yaml | 58 +++++++++++++++++++ ...-pro-3acca9f1846ccef5068e7ad578275e07.yaml | 58 +++++++++++++++++++ ...-pro-410910e3bde9f58e737907bb1681caa1.yaml | 58 +++++++++++++++++++ ...-pro-41611316d1ac99758a92032134152355.yaml | 58 +++++++++++++++++++ ...-pro-434f404b68ce3bb5e0a4d67432fad4b5.yaml | 58 +++++++++++++++++++ ...-pro-63f8abf1368e7fe90270064d672ae623.yaml | 58 +++++++++++++++++++ ...-pro-67f30623d09c4d720e6c11ecbff476fb.yaml | 58 +++++++++++++++++++ ...-pro-68293564bc63bf678c3143661b510396.yaml | 58 +++++++++++++++++++ ...-pro-83f1dd0f93cf1e789d768340fd3bb4e6.yaml | 58 +++++++++++++++++++ ...-pro-840229894b2c6a1be64b8d70b53d76ea.yaml | 58 +++++++++++++++++++ ...-pro-84d2d3378640513504438262d898e022.yaml | 58 +++++++++++++++++++ ...-pro-9d10b05b216e9b3725f77f2e756c3bb4.yaml | 58 +++++++++++++++++++ ...-pro-b52a7b696fd2137224ea5671e7e62354.yaml | 58 +++++++++++++++++++ ...-pro-bef07a85e28e83767b9819859bd47740.yaml | 58 +++++++++++++++++++ ...-pro-c3048e5abe91e890bbce0cc632e75565.yaml | 58 +++++++++++++++++++ ...-pro-cc7679b7eedbbcc9700c025bd91811bc.yaml | 58 +++++++++++++++++++ ...-pro-d48045ed590f6f55f1f2fdf8cf338a64.yaml | 58 +++++++++++++++++++ ...-pro-d6f22dc7688630789d302268152d865d.yaml | 58 +++++++++++++++++++ ...-pro-e07fd23d17f8dd83e161e7e2c0ee4d29.yaml | 58 +++++++++++++++++++ ...-pro-e8a21df86ab8f777d41e6648745d6563.yaml | 58 +++++++++++++++++++ ...-pro-fce0c7de1ac72dbab0de3f1d5f219540.yaml | 58 +++++++++++++++++++ ...ield-828e69c4d1ded9a5f7606667cb83c187.yaml | 58 +++++++++++++++++++ ...rama-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mage-b5b52d178ac9e73e1f7151b15d18b267.yaml | 58 +++++++++++++++++++ ...lock-39f54e5675da547fbcee34c5030b35da.yaml | 58 +++++++++++++++++++ ...rier-ce718587b1801a7c7537a48edc0e7766.yaml | 58 +++++++++++++++++++ ...anel-00bc7306212a1f1532879484863c8f21.yaml | 58 +++++++++++++++++++ ...khah-ad560a2e6c4b99cf57f1cbf4f8e13e03.yaml | 58 +++++++++++++++++++ ...rdot-700d1cfad4bd0fa3b320c8b805e07813.yaml | 58 +++++++++++++++++++ ...font-254f28aa80fff0eb08d98b4ce3b3dff8.yaml | 58 +++++++++++++++++++ ...erce-27a74900b090130d2ab9c1d98745b64a.yaml | 58 +++++++++++++++++++ ...core-0e249eccad21574e2f41d6b727c12756.yaml | 58 +++++++++++++++++++ ...base-07270c625770ea55406700bd4faf8963.yaml | 58 +++++++++++++++++++ ...base-11fe5ff4939095c8eaedbac059700247.yaml | 58 +++++++++++++++++++ ...base-74dfc45ecae7de304e8f9080bdfdb51d.yaml | 58 +++++++++++++++++++ ...base-bdf9e125f5be6c62d1e6ea586186b7ea.yaml | 58 +++++++++++++++++++ ...base-c5af09461da9c502c3934cc475901e6e.yaml | 58 +++++++++++++++++++ ...base-d7f00e0abe15580f7ace910ffb1d1a20.yaml | 58 +++++++++++++++++++ ...base-e0584db35cbb9869be95ba6010b7c0f4.yaml | 58 +++++++++++++++++++ ...base-e3cd907e6807fcf00ac40f54ec586f57.yaml | 58 +++++++++++++++++++ ...page-729488a672d6efd868aa434c8487ecdf.yaml | 58 +++++++++++++++++++ ...page-d66ad8d87de6007b46efcadeba262d7e.yaml | 58 +++++++++++++++++++ ...cted-f70dd0265071b25825ed4ac0daac6966.yaml | 58 +++++++++++++++++++ ...cted-fb622d8a3e8e58dd4ad557e902dc2f9e.yaml | 58 +++++++++++++++++++ ...tore-050f0116b8ceb2b0a56ee85d7392fdbc.yaml | 58 +++++++++++++++++++ ...ogin-8f38e1cb39832821632517021044a8d0.yaml | 58 +++++++++++++++++++ ...ager-d0bbc9ae1fbf2d240bae5f6283bcefb6.yaml | 58 +++++++++++++++++++ ...sion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sion-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...nect-1d56115c5756336039596f3db2afcf11.yaml | 58 +++++++++++++++++++ ...nect-1e16eec4b6ae009a904a8e7f17b7b28d.yaml | 58 +++++++++++++++++++ ...nect-3ea0fac767d2ae2ce8f2f4784f535988.yaml | 58 +++++++++++++++++++ ...nect-60d5b771eb752135710361fe9f24a381.yaml | 58 +++++++++++++++++++ ...nect-82c6c9cf005abdc27838609e8ad9cf02.yaml | 58 +++++++++++++++++++ ...nect-a8cb964066fe8aea6342dd9fef9872c0.yaml | 58 +++++++++++++++++++ ...nect-c914118ffbfe0c8c975fe93b917507cf.yaml | 58 +++++++++++++++++++ ...nect-d2e2b4003ef24e75b8d453ad2f0582ba.yaml | 58 +++++++++++++++++++ ...bard-089c469cd7ce66b1a9f5809db855888a.yaml | 58 +++++++++++++++++++ ...bard-5085814d704ddfd403da1227f11c5263.yaml | 58 +++++++++++++++++++ ...bard-5b594cb927f46fa8416160fd694e56a3.yaml | 58 +++++++++++++++++++ ...bard-bed2af87ac90c87dc04c6b517c073d4d.yaml | 58 +++++++++++++++++++ ...ayer-d6f933dccde3d9cca555af3f7b970f39.yaml | 58 +++++++++++++++++++ ...weet-46bf8ffa7005c6ec6cf07777085484d4.yaml | 58 +++++++++++++++++++ ...weet-5b86c54747aa1057e36177e85fea660b.yaml | 58 +++++++++++++++++++ ...erce-96955fd433f50860fcfbf43e30334f40.yaml | 58 +++++++++++++++++++ ...eway-ef84d19c40335efcda975110283f73b1.yaml | 58 +++++++++++++++++++ ...-pro-54a171a233ab972e99a42d6b3c349ad4.yaml | 58 +++++++++++++++++++ ...-pro-8f6f989dd4d5721becc523b6ef4c4688.yaml | 58 +++++++++++++++++++ ...tack-b7d244a1858960d6b7b8f5a6b3a02579.yaml | 58 +++++++++++++++++++ ...bric-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-1c5c778d8970e8a4e068e0dd69740d62.yaml | 58 +++++++++++++++++++ ...tion-4dec41a2eb36a7fd15e4e02a413a6b7c.yaml | 58 +++++++++++++++++++ ...tion-4f4afbbe05a47feb7aa9e67c94aa395d.yaml | 58 +++++++++++++++++++ ...tion-c992a7bd3a36bbd140f48c6c88718954.yaml | 58 +++++++++++++++++++ ...erce-5b76c3973cf0eb7f78223ae732ca5963.yaml | 58 +++++++++++++++++++ ...erce-ce702b3c11cc0fd58f850b3795d41794.yaml | 58 +++++++++++++++++++ ...erce-1deeac15598443407c5819458cb87e41.yaml | 58 +++++++++++++++++++ ...ions-6fc6438dcbfd4ff68526e6d482fa74a2.yaml | 58 +++++++++++++++++++ ...cita-75fa36bac06fa043ebc71b72e7bf53b3.yaml | 58 +++++++++++++++++++ ...cita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml | 58 +++++++++++++++++++ ...tium-2de2a309a48a2066b54fa1a1b79cdf95.yaml | 58 +++++++++++++++++++ ...tium-4f11f74ab70050e21f6862beb40d9a96.yaml | 58 +++++++++++++++++++ ...tium-62269eb67796cbb2339d6188b5db837c.yaml | 58 +++++++++++++++++++ ...tium-66a3b119265dd04d8b9e2ee514cfb4be.yaml | 58 +++++++++++++++++++ ...tium-6717ed512d0f6dcb712096abdaea80dd.yaml | 58 +++++++++++++++++++ ...tium-92d0e7bc94b44754e236b3eab5ba21b3.yaml | 58 +++++++++++++++++++ ...tium-986bf289302c49f136af4498727aaf05.yaml | 58 +++++++++++++++++++ ...tium-9b90abd6d830325819c48ecc09f52c5d.yaml | 58 +++++++++++++++++++ ...tium-b4cb9ba45757222ec6c9dc1b2fa44488.yaml | 58 +++++++++++++++++++ ...tium-d89f421b57194b2722cbd6095ba6fda5.yaml | 58 +++++++++++++++++++ ...tium-e5b14dd6b8ce0a1e923582746cd9e67d.yaml | 58 +++++++++++++++++++ ...tion-7e792191472cdad1fee49805adc5397c.yaml | 58 +++++++++++++++++++ ...ents-319371b7283fd7e2cb3c7db7ca64946f.yaml | 58 +++++++++++++++++++ ...ents-96f4752ff872cb8e19e30c74804a9934.yaml | 58 +++++++++++++++++++ ...erce-de1e70d7cd8b8051bc4083872be41746.yaml | 58 +++++++++++++++++++ ...erce-fd0b6587604276cef3b941ba57f9f4bd.yaml | 58 +++++++++++++++++++ ...ndia-796f8cb61c89c1bb396cd35b29d7d180.yaml | 58 +++++++++++++++++++ ...lash-5d636ce844c1e0268400f1bdd0bfac42.yaml | 58 +++++++++++++++++++ ...tion-063d32b817099e0883314c45f9a14882.yaml | 58 +++++++++++++++++++ ...port-d431a2f9901a2f7f0f42332dd7577612.yaml | 58 +++++++++++++++++++ ...ages-9d9c7f9cf0e3be8bd05b705703e8905b.yaml | 58 +++++++++++++++++++ ...lock-d7c844e32ca0ede6715df38694de53b3.yaml | 58 +++++++++++++++++++ ...orms-439e5eee55387eb3328692c215048cd9.yaml | 58 +++++++++++++++++++ ...dder-6736ec787d23e7bd8e0a13fc8e0e88d8.yaml | 58 +++++++++++++++++++ ...r-wp-ea6c92890a8ecc3f7389055b8a095cd6.yaml | 58 +++++++++++++++++++ ...erce-3f477473c5a3237b1cf487ce20b4000a.yaml | 58 +++++++++++++++++++ ...ewer-b4f2d824d6b4e83932e04d871f8fc11c.yaml | 58 +++++++++++++++++++ ...ster-d3e4552875a1e4c6d1824946dc7d9f5b.yaml | 58 +++++++++++++++++++ ...rint-3c928fa432700e9d8d2c446de566746a.yaml | 58 +++++++++++++++++++ ...rint-40ad9a6c734da3962dc8243739e3141d.yaml | 58 +++++++++++++++++++ ...rint-a599db0a567c14bb9ad602094c3db3bd.yaml | 58 +++++++++++++++++++ ...lock-a843323be037daf5f3b8528ace16935d.yaml | 58 +++++++++++++++++++ ...code-a904a832d065a78b4632aa6c156ad613.yaml | 58 +++++++++++++++++++ ...ewer-c8829397a00680f2b905cec73a59a77f.yaml | 58 +++++++++++++++++++ ...ntor-8b4bc04c0594b1b6d09d20b68880906b.yaml | 58 +++++++++++++++++++ ...-pdf-1f8d84e6699c9f64cbbc8919147cefef.yaml | 58 +++++++++++++++++++ ...-pdf-4eea95bcbc22121deeeb133b73467001.yaml | 58 +++++++++++++++++++ ...code-732f3abc36bb4bb116e7c8687f86e2aa.yaml | 58 +++++++++++++++++++ ...code-ca93f191e3639f84afcc1a9b1fea599a.yaml | 58 +++++++++++++++++++ ...-csv-2f2309313c5bda581e3b02314b8c850b.yaml | 58 +++++++++++++++++++ ...wser-c6589434b15992ea6614e8eb940f49fe.yaml | 58 +++++++++++++++++++ ...lder-820928972f49f35fc134f49ec2dd204c.yaml | 58 +++++++++++++++++++ ...lder-90317dde5460b2bcb67123acb90cdb53.yaml | 58 +++++++++++++++++++ ...core-05f8485e11de79d6aa39de126de0f4e7.yaml | 58 +++++++++++++++++++ ...core-15be0a70b6c61a646e8df6a2ecfc155f.yaml | 58 +++++++++++++++++++ ...core-2d63f6e8d357472c9ca1e82cb0bc121b.yaml | 58 +++++++++++++++++++ ...core-8ca99b4af6db318cbc7873fe643413aa.yaml | 58 +++++++++++++++++++ ...core-aca658478fc845070c3b917d5842d5d8.yaml | 58 +++++++++++++++++++ ...core-c8c569d2140668ddb48a8d5bad1f7b26.yaml | 58 +++++++++++++++++++ ...core-e0b883e3e5e2840b97f5723817b58a50.yaml | 58 +++++++++++++++++++ ...core-e75947da405d6f6d94e7f97545536f9b.yaml | 58 +++++++++++++++++++ ...core-efd8e3487b0ad4544e466658a022b655.yaml | 58 +++++++++++++++++++ ...core-f9fe4feda10b297d0acce20daa42a9f6.yaml | 58 +++++++++++++++++++ ...core-fb4fb2e9f3d0effd54f1a6d138f00892.yaml | 58 +++++++++++++++++++ ...otos-635219c62d7cd225129022aedb4232a9.yaml | 58 +++++++++++++++++++ ...base-1d4546a4614d787d7f8089a5da6d5fc4.yaml | 58 +++++++++++++++++++ ...base-995fd031fdd18a2d68fcabed6b6a8e84.yaml | 58 +++++++++++++++++++ ...oice-9ae16e48f44198f8088e9f21632ed314.yaml | 58 +++++++++++++++++++ ...oice-fe3ee4088bc486320d241799be9d47af.yaml | 58 +++++++++++++++++++ ...d-to-178341479b86e6771bea046e08788d1c.yaml | 58 +++++++++++++++++++ ...d-to-186c3d28d4f62e262c488a190cb41115.yaml | 58 +++++++++++++++++++ ...mons-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...link-9181aa3538843516f1558187b7acffea.yaml | 58 +++++++++++++++++++ ...otes-8d6f7061c576076509b8f92171f21824.yaml | 58 +++++++++++++++++++ ...rvey-6fe6a0f37349207e6c41e72076713696.yaml | 58 +++++++++++++++++++ ...rvey-a8d322ee7f2a3aae906b690c8d232e76.yaml | 58 +++++++++++++++++++ ...rvey-b9d0d288675f55bb8b0e4c8b1cc48daa.yaml | 58 +++++++++++++++++++ ...rvey-bfb3f454ae9448850fc297b53b5e2f82.yaml | 58 +++++++++++++++++++ ...ands-a5b9786b6284df449ea800f32dd8d580.yaml | 58 +++++++++++++++++++ ...ands-efce5df3c4d25a3fc56c583b2e3ca93e.yaml | 58 +++++++++++++++++++ ...ters-14db06c015099db1b01fba0887a78991.yaml | 58 +++++++++++++++++++ ...ters-706c2acdbff0e92fe0b4d13990d0fc81.yaml | 58 +++++++++++++++++++ ...ters-7bfb8a8c7905e357c4c4b5df9d93b6e7.yaml | 58 +++++++++++++++++++ ...ters-e0c010ddbd19926f406c155b62241279.yaml | 58 +++++++++++++++++++ ...-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-lab-ea8f062f0b56f024cc7cd24de72627d2.yaml | 58 +++++++++++++++++++ ...ager-10b89b9db07084a443cbeed71b129af6.yaml | 58 +++++++++++++++++++ ...ager-35e5b1d4ade66da7f51f342394148582.yaml | 58 +++++++++++++++++++ ...ager-48da01905911b9839c3e0f5a4a5539b0.yaml | 58 +++++++++++++++++++ ...ager-4e977ded44741d82f1c08a16943badd0.yaml | 58 +++++++++++++++++++ ...ager-8536531e312b5b608fd436fcd26ad3ab.yaml | 58 +++++++++++++++++++ ...ager-884aebd15e5eb05f43f6f8a3d490accf.yaml | 58 +++++++++++++++++++ ...ager-954c99838450703e2f9d2a807b32e669.yaml | 58 +++++++++++++++++++ ...ager-ca60ddb788ce2ba7421ade305d793252.yaml | 58 +++++++++++++++++++ ...ager-e32cc6e85c9fbac88c9c7b48d1277259.yaml | 58 +++++++++++++++++++ ...-pro-8536531e312b5b608fd436fcd26ad3ab.yaml | 58 +++++++++++++++++++ ...izer-eac9d9da89c904ba41a5397452bfcf9e.yaml | 58 +++++++++++++++++++ ...izer-f6a3298dd9a8254fb5d73c683663318f.yaml | 58 +++++++++++++++++++ ...ress-474a3f34ad481b0e51cd0ce4304a20fe.yaml | 58 +++++++++++++++++++ ...onts-8ee86188c71251e99a8f09d6e9fff31b.yaml | 58 +++++++++++++++++++ ...erce-b7124c79e7a307b3a04609b03d624131.yaml | 58 +++++++++++++++++++ ...-sms-99d48d97197070fa6f8afc1ea6ec2bed.yaml | 58 +++++++++++++++++++ ...-sms-f6e0611408f1fa46e8d9b7f9c0374cb8.yaml | 58 +++++++++++++++++++ ...nary-b7a954abdc80748332e27cd05868a534.yaml | 58 +++++++++++++++++++ ...page-7e5b3599be6904a958ea6b2b094ad05a.yaml | 58 +++++++++++++++++++ ...ager-13b68629426cfdd6f904bb91efc08ae5.yaml | 58 +++++++++++++++++++ ...ager-1e104d6bab1fb28ec84c0ed01b4f6113.yaml | 58 +++++++++++++++++++ ...ails-cf9cb4b184f662090fa6c012e4b5ad99.yaml | 58 +++++++++++++++++++ ...mage-a7e70ba8dbeab9ae2adc8e43fd59af93.yaml | 58 +++++++++++++++++++ ...rect-12236d5bb8f3c06e72ec152e136c1986.yaml | 58 +++++++++++++++++++ ...rect-55f3de8c0899443e80983275ca038b9f.yaml | 58 +++++++++++++++++++ ...rect-dcc1962541555ae792e76de2b7edad31.yaml | 58 +++++++++++++++++++ ...spam-d6df1bce344df99ce5b68d40f423014e.yaml | 58 +++++++++++++++++++ ...mage-a3e785056d2140e268a5211287db4a52.yaml | 58 +++++++++++++++++++ ...ings-4aabb12734f76649f5626710ac0ad1d9.yaml | 58 +++++++++++++++++++ ...iner-44929349a8819c69d02149042a6d6e8c.yaml | 58 +++++++++++++++++++ ...ress-6080809f6efdafef4c14410a7cb137c8.yaml | 58 +++++++++++++++++++ ...name-82eeedcf78f4352cc7bcae0bfb774fa5.yaml | 58 +++++++++++++++++++ ...erce-6736c43448ceec0a8c35031a10886cda.yaml | 58 +++++++++++++++++++ ...erce-f53b59e3d01b975c6802657d08b4d293.yaml | 58 +++++++++++++++++++ ...ions-da56011233283b841dd7c13f7f29d7e9.yaml | 58 +++++++++++++++++++ ...ager-86d1730d65ed535523c7e0c21cf9f29e.yaml | 58 +++++++++++++++++++ ...test-81dceae2605fe02ec91915c9cd7ee232.yaml | 58 +++++++++++++++++++ ...feed-e1280c44c0ffb9515ed7d76fdbc69b53.yaml | 58 +++++++++++++++++++ ...lery-02d4095d603887ea90170c039ddd4ef1.yaml | 58 +++++++++++++++++++ ...lery-03f9356825118ca4016abd782e8ac0fc.yaml | 58 +++++++++++++++++++ ...lery-16de4bf636763685f8c5b31304d24a38.yaml | 58 +++++++++++++++++++ ...lery-1cfd262b55edc365cf2f57c5e6d1da2e.yaml | 58 +++++++++++++++++++ ...lery-1defc4b79b3e0026fa5b8dc78f8c4d1d.yaml | 58 +++++++++++++++++++ ...lery-1e81e15f7eef3b25cd39002edd8c241e.yaml | 58 +++++++++++++++++++ ...lery-2338e1fdce13dabaa9329802ae34890e.yaml | 58 +++++++++++++++++++ ...lery-2357c93b70517db0a31d3d99ea026f13.yaml | 58 +++++++++++++++++++ ...lery-309d3be2a8406e388de1750ae092da31.yaml | 58 +++++++++++++++++++ ...lery-398552849d43600c1c4eab92f19672ff.yaml | 58 +++++++++++++++++++ ...lery-3c5bac80199ef30099a13588ec30b8cb.yaml | 58 +++++++++++++++++++ ...lery-44b42ab3cc67f2808aca4c4c544fe3ed.yaml | 58 +++++++++++++++++++ ...lery-4ee123ab64de9526a768d6e54f2c4b2d.yaml | 58 +++++++++++++++++++ ...lery-52e7ff3acb78cedfa1cc6fc74cf893bd.yaml | 58 +++++++++++++++++++ ...lery-581d9bde9452d0889b5682513ff8db3d.yaml | 58 +++++++++++++++++++ ...lery-620bdfabfd18b0eeb8341540ce2009f5.yaml | 58 +++++++++++++++++++ ...lery-6c9c7c812a4ff55c5f56daa5be2fd373.yaml | 58 +++++++++++++++++++ ...lery-730408927df5a002660d3bc7f56fa1f5.yaml | 58 +++++++++++++++++++ ...lery-78fe6306f76d32a87cb79d1ed7a18344.yaml | 58 +++++++++++++++++++ ...lery-7aac6c0223fd33522df44de52ce8d8aa.yaml | 58 +++++++++++++++++++ ...lery-7d9c26b229d5c8003d8d09b623e0e129.yaml | 58 +++++++++++++++++++ ...lery-8058e0bec878d58968e8631efe964917.yaml | 58 +++++++++++++++++++ ...lery-813522545f1eb15165129d8785a8fe18.yaml | 58 +++++++++++++++++++ ...lery-8372eec64ff21987a44ee27a8993e766.yaml | 58 +++++++++++++++++++ ...lery-8449cdb7230a3e1bb12d25a2395ff5c1.yaml | 58 +++++++++++++++++++ ...lery-85912756aaaf6a5c4da322cb7b750dd5.yaml | 58 +++++++++++++++++++ ...lery-93b42b89f073fbc75b7062f5d47b5b66.yaml | 58 +++++++++++++++++++ ...lery-9464a11b450ab411a742c340fdefaa58.yaml | 58 +++++++++++++++++++ ...lery-9568a93cf21f83223317ab5745dc29b8.yaml | 58 +++++++++++++++++++ ...lery-9f00578ac1259c4fd1c8b9de9165324f.yaml | 58 +++++++++++++++++++ ...lery-b3f949bc68c2f0c560af03cf782c4a27.yaml | 58 +++++++++++++++++++ ...lery-b9e46f23f1c3c438cdb8dc39395715de.yaml | 58 +++++++++++++++++++ ...lery-be54fbb88b07e1793c0aea3459743537.yaml | 58 +++++++++++++++++++ ...lery-beed03e57da7da89d62ad65025967548.yaml | 58 +++++++++++++++++++ ...lery-bf638326d3a61d38ab0c3d9a56b1c934.yaml | 58 +++++++++++++++++++ ...lery-c4eb24a39e4ca07448358eb29c4b844d.yaml | 58 +++++++++++++++++++ ...lery-cab41f4f844db778ab337835cad811f5.yaml | 58 +++++++++++++++++++ ...lery-cb06e44c5bf518af775ac99ec0dc273a.yaml | 58 +++++++++++++++++++ ...lery-cc028d4daad55d43a1db8ea8a8a61c72.yaml | 58 +++++++++++++++++++ ...lery-cde70bc716e26c33fb792a26b5c7f5b0.yaml | 58 +++++++++++++++++++ ...lery-d029a01fd5b93450433108c7576996d9.yaml | 58 +++++++++++++++++++ ...lery-d2f0c79f766915ada458669bedb0c203.yaml | 58 +++++++++++++++++++ ...lery-e07e7d71dc600bc27e4f1c11c365c393.yaml | 58 +++++++++++++++++++ ...lery-e1df20c1816f9cf921b493870b0123b0.yaml | 58 +++++++++++++++++++ ...lery-e8b3c520b2be53d9460363b1d88ad98e.yaml | 58 +++++++++++++++++++ ...lery-eaaac08a563441ff9dd67597a6450fdd.yaml | 58 +++++++++++++++++++ ...lery-ec16eda1a0270dfc503649db472e9967.yaml | 58 +++++++++++++++++++ ...lery-f4f85c5436cdac307c05feb98557fa30.yaml | 58 +++++++++++++++++++ ...lery-f6467ad8511f5004bea6f7b6c2cbc45b.yaml | 58 +++++++++++++++++++ ...lery-0310acae90d1336d07b5ec2866c09354.yaml | 58 +++++++++++++++++++ ...lery-367ff78bbe085f960fe46db042a99b4e.yaml | 58 +++++++++++++++++++ ...lery-7aee34ffd65481adae802a1b67540af3.yaml | 58 +++++++++++++++++++ ...lery-a3750b38ee19e455b2f22ad25b740352.yaml | 58 +++++++++++++++++++ ...lery-acd433b1de86848d8124ba9bb8ed6ee0.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-e067b113a87087f2914c0d765908e157.yaml | 58 +++++++++++++++++++ ...tory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...acer-ee5b679f01639572a698b05d286d526c.yaml | 58 +++++++++++++++++++ ...ries-33a2e7fa2283855eea0bc65fb87d66e5.yaml | 58 +++++++++++++++++++ ...pace-7457dd966d0c4c8ae20cdc84ea24da94.yaml | 58 +++++++++++++++++++ ...pace-b019cad8ad64e7103a4ef60d49f6dea3.yaml | 58 +++++++++++++++++++ ...sive-27268d0b59c1274c726da2859a7e1b6d.yaml | 58 +++++++++++++++++++ ...sive-b4a8b8c1c6aa3303fd49306d6d3da366.yaml | 58 +++++++++++++++++++ ...onry-4086b1cacdc76d37665a053863a25b12.yaml | 58 +++++++++++++++++++ ...ibit-c1c78bdc1547ba62275f78af4206540e.yaml | 58 +++++++++++++++++++ ...ibit-d80b7a12cea76f24d05fbaefc82e821f.yaml | 58 +++++++++++++++++++ ...cker-22cbdfe6497edcc66032227e018ed1b2.yaml | 58 +++++++++++++++++++ ...ndar-f4190c07f620d8114bc44ea330931d2f.yaml | 58 +++++++++++++++++++ ...here-80daa229706432d7991ba35deb710b25.yaml | 58 +++++++++++++++++++ ...here-83059d16d11e2fca8e78916d3d8e8973.yaml | 58 +++++++++++++++++++ ...here-a30d359b699628ff181230d080160c5b.yaml | 58 +++++++++++++++++++ ...here-f8e9e8a25542e313c19a4d2c9a30bf10.yaml | 58 +++++++++++++++++++ ...ugin-83ff6d6d9bc5d168afdb537857550fe7.yaml | 58 +++++++++++++++++++ ...hell-20137b81f547271c9a3bb4e93eb30f06.yaml | 58 +++++++++++++++++++ ...page-ae8fa6f84b5149157cb1430a27dde4d8.yaml | 58 +++++++++++++++++++ ...chat-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...o-wp-68aed4fb719e93aff911b8c6723e373b.yaml | 58 +++++++++++++++++++ ...elds-95830f5764b8d010ddba582e5df78be8.yaml | 58 +++++++++++++++++++ ...type-79edec65d658aad88495c54f54d3669a.yaml | 58 +++++++++++++++++++ ...lery-8ca0f44f9fa619376b40462781065a27.yaml | 58 +++++++++++++++++++ ...lery-0f95bb65415e0d0bde6379a1fe073b9f.yaml | 58 +++++++++++++++++++ ...ress-307c3c6d6bec988e070cfcb7b09e6f6d.yaml | 58 +++++++++++++++++++ ...lery-f15ed32464b8a833a76a0b7a1fe8248d.yaml | 58 +++++++++++++++++++ ...lery-520d5dbf8af2830d0201decc2e42cccf.yaml | 58 +++++++++++++++++++ ...r-wp-fad10c5df0d12e13e57389567502ed4b.yaml | 58 +++++++++++++++++++ ...ster-085dcf91f1430534b15ba25ebc810709.yaml | 58 +++++++++++++++++++ ...ster-3deaf34916ac99bc38f298b80ffb3072.yaml | 58 +++++++++++++++++++ ...ster-44a36b31780ae752545fe7f279378677.yaml | 58 +++++++++++++++++++ ...ster-48f2f58cd82d726138d269a3fe5d8999.yaml | 58 +++++++++++++++++++ ...ster-490ba182a143f8f2d65ee92cff342981.yaml | 58 +++++++++++++++++++ ...ster-5471d89b27018d77efeb5931175f6c33.yaml | 58 +++++++++++++++++++ ...ster-555fd231d361b91b6b7b333e844c48cf.yaml | 58 +++++++++++++++++++ ...ster-8c45c8eb0a60dbf34d7860d1438b26eb.yaml | 58 +++++++++++++++++++ ...ster-a5906711fb55acacbd35705f2d98b335.yaml | 58 +++++++++++++++++++ ...ster-b2f2a2293859699f71056b726eb185bf.yaml | 58 +++++++++++++++++++ ...ster-c271e79e457792d8093dce56ebc058d7.yaml | 58 +++++++++++++++++++ ...ster-d02d6cd1e31a58b9341cbaf75fde28c5.yaml | 58 +++++++++++++++++++ ...ster-d17a26eab5a1167d47a2ffdfdfa715f1.yaml | 58 +++++++++++++++++++ ...ster-e4630937cb3252f53c729f27f9bae6ad.yaml | 58 +++++++++++++++++++ ...ster-f10e961623521100a85e5972e8959ae4.yaml | 58 +++++++++++++++++++ ...ster-f2952d2417af91e1e214114658f123b5.yaml | 58 +++++++++++++++++++ ...ster-fdaada004101af13bbd1c236fd07775f.yaml | 58 +++++++++++++++++++ ...ress-2498bc224a94ac1ba539a681f69b7ef6.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-pro-a89413a448da960907f201f2e284d495.yaml | 58 +++++++++++++++++++ ...post-230333f7152338c0e847a31fb3c9a2dd.yaml | 58 +++++++++++++++++++ ...dget-62705338d1951d661bb8e5bc23d5b61e.yaml | 58 +++++++++++++++++++ ...ntor-b5ac41047b1437d9d41eb11c7b522d30.yaml | 58 +++++++++++++++++++ ...ntor-e66a7b75dd0639134f09eee91026a929.yaml | 58 +++++++++++++++++++ ...-pro-156652aa50db0572929dd8be39230242.yaml | 58 +++++++++++++++++++ ...-pro-20464abfb5a20fb1d96af1ded31e80d6.yaml | 58 +++++++++++++++++++ ...-pro-7170a15e98802cc9df1f92d68c501b1c.yaml | 58 +++++++++++++++++++ ...-pro-7188ef26349164dd23042500cdbf31b3.yaml | 58 +++++++++++++++++++ ...-pro-a073e10124aebcae7675d30da8592a4c.yaml | 58 +++++++++++++++++++ ...orms-3e3dbd541f7f8bdbabf98ab3f7d5763f.yaml | 58 +++++++++++++++++++ ...orms-4e38c1777edea860289ac75c8e42f2e1.yaml | 58 +++++++++++++++++++ ...orms-7ac0863d03c3cdd406341dca9d25711a.yaml | 58 +++++++++++++++++++ ...orms-7694e4b82dce0dfb26c86a146e774669.yaml | 58 +++++++++++++++++++ ...-pro-4e90b64e5c0880980f44418deca3c91b.yaml | 58 +++++++++++++++++++ ...ages-12ee5879dbc7fdb46e24ef76cc9a2d61.yaml | 58 +++++++++++++++++++ ...ages-5b2fbefb63fd7f965b09642c4ccecf5d.yaml | 58 +++++++++++++++++++ ...ages-5de755d9bd8418fefc2676ce9864e6b9.yaml | 58 +++++++++++++++++++ ...ages-99e3e9aef74467dcee4f17ac700177de.yaml | 58 +++++++++++++++++++ ...odes-4706d1b1438785969ae30d4549fd166c.yaml | 58 +++++++++++++++++++ ...site-46fd3a8d2dbfa8e63d62d0d4687e4eb8.yaml | 58 +++++++++++++++++++ ...site-5498e556e2216200fd56232f5d1a8034.yaml | 58 +++++++++++++++++++ ...site-7c22e43cb21e5962b21022636d9c698c.yaml | 58 +++++++++++++++++++ ...-pro-5498e556e2216200fd56232f5d1a8034.yaml | 58 +++++++++++++++++++ ...elds-32884b4069e08a6e3a456b6d9b5e62d6.yaml | 58 +++++++++++++++++++ ...elds-c610b8a5231d91145ad3b18f9f470868.yaml | 58 +++++++++++++++++++ ...ypes-5afe134af3509b1b84204a9f85b1cefe.yaml | 58 +++++++++++++++++++ ...ypes-f26696ee1719902df9af4673f5c5c04a.yaml | 58 +++++++++++++++++++ ...cker-14d59d1dd0d6c11dea03161b864cfb49.yaml | 58 +++++++++++++++++++ ...itor-97006d9ae784a094161529df95603173.yaml | 58 +++++++++++++++++++ ...ords-7ffe069edd0a90f30c2910fd73b2059b.yaml | 58 +++++++++++++++++++ ...ords-f0297e0c6535810defa6f3589f3d99ca.yaml | 58 +++++++++++++++++++ ...orms-b3f5b694f8149f7215285f5a07a42c03.yaml | 58 +++++++++++++++++++ ...pack-0fc1f5cd03c6bddb3df8077c66fc0927.yaml | 58 +++++++++++++++++++ ...pack-74239a2c7d59745dfff630629648ba8b.yaml | 58 +++++++++++++++++++ ...tics-067e897c25e69073ab36a1703c7f28be.yaml | 58 +++++++++++++++++++ ...tics-3b9fd84836c7bf88f01e3e36ab24d168.yaml | 58 +++++++++++++++++++ ...tics-c591f3e0b0e6607bb02f8ca1122eb1cd.yaml | 58 +++++++++++++++++++ ...y-ht-4eaf37cfdef1b74dc7b626ac3436d2c6.yaml | 58 +++++++++++++++++++ ...y-ht-6182145f7b993029088ccd0a82af0476.yaml | 58 +++++++++++++++++++ ...y-ht-e04d152bd4d70be12ad11762391a5d6a.yaml | 58 +++++++++++++++++++ ...ayer-0dd50401fc253eb4ff30c00f51c39236.yaml | 58 +++++++++++++++++++ ...ayer-3c0e50875a3bbfb2004a47e262647c92.yaml | 58 +++++++++++++++++++ ...ayer-a1229f8f2f131697def9604f593dc513.yaml | 58 +++++++++++++++++++ ...ayer-a132c10bef68833cf859b4bbead4a383.yaml | 58 +++++++++++++++++++ ...ayer-c58c613948b1843f7bb90012b0345e3e.yaml | 58 +++++++++++++++++++ ...ayer-ece1da78596879174efa10393f34846c.yaml | 58 +++++++++++++++++++ ...ayer-f4526bcdafc950c9e06f1e8880692066.yaml | 58 +++++++++++++++++++ ...tmap-2c3170861d7bd02e32a5482d1f26ddd0.yaml | 58 +++++++++++++++++++ ...lezi-c8ca58879ec3a0e2ce408bc544c89b18.yaml | 58 +++++++++++++++++++ ...vana-ed9933ab4af74460b44a6d3c7d1b8917.yaml | 58 +++++++++++++++++++ ...tral-8d3ea868911a052c015f14b1fed79fc4.yaml | 58 +++++++++++++++++++ ...oups-f9def0ceb1a6b24330f85d2a5c68b378.yaml | 58 +++++++++++++++++++ ...ogic-c9f14b3efd68aaad972afe4c5e7676c3.yaml | 58 +++++++++++++++++++ ...tter-4b8d96697b92d4da201ab4792cfe050a.yaml | 58 +++++++++++++++++++ ...list-d8a9eea8aa488b4edc83d1161c57f57d.yaml | 58 +++++++++++++++++++ ...oids-f1ab4812b24f2e95426a9a9673c2032b.yaml | 58 +++++++++++++++++++ ...lite-5a8e72249d01f06327896fcc8bd59c29.yaml | 58 +++++++++++++++++++ ...lite-f9f9a85d9bfed3059a0bb1fb2526ff0c.yaml | 58 +++++++++++++++++++ ...able-5af8a6245b1d97ecb98489a4ed722ce3.yaml | 58 +++++++++++++++++++ ...edit-20fb78c96d003cc1a6ca252c0fdacd2e.yaml | 58 +++++++++++++++++++ ...edit-a9d432e9161b4b6c46b6a95df71ed4b7.yaml | 58 +++++++++++++++++++ ...tcha-1a537a66e5a0122e9300b301ca51e7e6.yaml | 58 +++++++++++++++++++ ...bill-1758abc4263fca3455f9d9502f847bae.yaml | 58 +++++++++++++++++++ ...rses-001a8dbb2842e703a09732c4c42c632c.yaml | 58 +++++++++++++++++++ ...rses-91c7b7fe658244c6edc7ae3511a3b054.yaml | 58 +++++++++++++++++++ ...rses-b95250d725c58e5f77c57b6de18a5532.yaml | 58 +++++++++++++++++++ ...rses-d8db452c19f101c274ba8899184fb3d0.yaml | 58 +++++++++++++++++++ ...himp-b69217b2f780a8df207734ae1925c5b4.yaml | 58 +++++++++++++++++++ ...fast-160c7d8906d4726b6004392f05625a85.yaml | 58 +++++++++++++++++++ ...lper-f1d7c5edd451960671d8bd82cadc646e.yaml | 58 +++++++++++++++++++ ...-jpg-63d2a51e3e8824195c3d41033688aedc.yaml | 58 +++++++++++++++++++ ...ator-a0985a296fca110ec993acbc89421094.yaml | 58 +++++++++++++++++++ ...ator-e23aa6f9657419fe19f8c4bed7c9e59d.yaml | 58 +++++++++++++++++++ ...-box-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nels-c4998932aa42fcf89b684f69330f53ac.yaml | 58 +++++++++++++++++++ ...line-39c09063986ff422c9e20ab8b773f550.yaml | 58 +++++++++++++++++++ ...line-de4fed651acf6eb0a9891cf52fedb252.yaml | 58 +++++++++++++++++++ ...tons-a5c381dc4cbdb7060fc30ca87a13ef99.yaml | 58 +++++++++++++++++++ ...tons-e54fc04abf0b5b0662339153e1522a1e.yaml | 58 +++++++++++++++++++ ...ting-8fa43cada4de49d673caee2179427c31.yaml | 58 +++++++++++++++++++ ...ress-110726f45fe770f212d1aee89f3bb57f.yaml | 58 +++++++++++++++++++ ...ress-2e10545dd7017e6f584fc20c4f8e8985.yaml | 58 +++++++++++++++++++ ...ress-3472d41d965a1eba1565dbf3f6f91c0c.yaml | 58 +++++++++++++++++++ ...ress-4a1b15e037b0e674a6b8abd0386af8e9.yaml | 58 +++++++++++++++++++ ...ress-5bb8fe4f6089667dd51c2e2e1a9444ca.yaml | 58 +++++++++++++++++++ ...ress-6143c745f174c1205927522fed8aa49e.yaml | 58 +++++++++++++++++++ ...ress-c5c5fe7ae04b300c4245ab22359369aa.yaml | 58 +++++++++++++++++++ ...ress-d871e2a497ccda6c7cc830c72c3348e0.yaml | 58 +++++++++++++++++++ ...ress-e253bc9eb60b3ba0170a2740ba27c2f4.yaml | 58 +++++++++++++++++++ ...ress-f7d71098b8867ed535059e5ab72f5309.yaml | 58 +++++++++++++++++++ ...ress-f9001c4d0d146f20e371013d48c397ad.yaml | 58 +++++++++++++++++++ ...ress-f9c4a4753797c567682067fdd891aa71.yaml | 58 +++++++++++++++++++ ...ress-feda90e2637dc66a787016724474b475.yaml | 58 +++++++++++++++++++ ...tton-2f90b927ae201cfb6bea80146d60cefb.yaml | 58 +++++++++++++++++++ ...tton-4f7a95f2553b4e4ec80b6d04a6fbc8bb.yaml | 58 +++++++++++++++++++ ...tton-858f2f8353e461ae105f6c048cf36fc0.yaml | 58 +++++++++++++++++++ ...tton-f884e1e5931aac898c331db3ff9b0a47.yaml | 58 +++++++++++++++++++ ...ayer-5b013c9961d2008bd8c1b51839f147f0.yaml | 58 +++++++++++++++++++ ...ayer-e884ca510b37335b1134220e4cc6625b.yaml | 58 +++++++++++++++++++ ...ress-396371aecede5680b30f6adf18b9bebd.yaml | 58 +++++++++++++++++++ ...pods-33493821da381511f179da2cf195b351.yaml | 58 +++++++++++++++++++ ...pods-79c1e1544a74f2c87544fd2e816d236c.yaml | 58 +++++++++++++++++++ ...pods-7a55c80cef31b1897125e271418538f4.yaml | 58 +++++++++++++++++++ ...pods-85f6ac4895a90413fa74a9e82058c7a0.yaml | 58 +++++++++++++++++++ ...pods-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml | 58 +++++++++++++++++++ ...pods-b37f90f1be095104847aff5ef46084ff.yaml | 58 +++++++++++++++++++ ...pods-ba3ebdc8660c704b12fdc576b67a35b8.yaml | 58 +++++++++++++++++++ ...pods-d5266edec4a9e9c793fa60a9c89f4ac5.yaml | 58 +++++++++++++++++++ ...pods-dd09b82c04b588417962747e8b977772.yaml | 58 +++++++++++++++++++ ...pods-fc1ea9d8e61023700e49f1688ac8b5c8.yaml | 58 +++++++++++++++++++ ...pods-ff2c0144dd3f14c012ac895bb24d6c4c.yaml | 58 +++++++++++++++++++ ...itor-724f781d1b8ccbd2ec3504075cc6a13c.yaml | 58 +++++++++++++++++++ ...itor-d3df4f8a3c09c9129b3791672c61fc3a.yaml | 58 +++++++++++++++++++ ...erce-215be45a340fc01142771f1f9ff27095.yaml | 58 +++++++++++++++++++ ...erce-f595c203a77330422dba7245cce84dcd.yaml | 58 +++++++++++++++++++ ...aker-18f92d3237c36d8e0be4fe5c61fd453f.yaml | 58 +++++++++++++++++++ ...aker-29bc9c14cc220941303188c45b9daf29.yaml | 58 +++++++++++++++++++ ...aker-2db56d3c99ea70472b056252e5e2e9e6.yaml | 58 +++++++++++++++++++ ...aker-3172cfdf5fc8b7e358c053d42d06583b.yaml | 58 +++++++++++++++++++ ...aker-79decf1a0edb8491c84a287af6c9aee1.yaml | 58 +++++++++++++++++++ ...aker-7a1aa0c88530968ed1b5b646f3180462.yaml | 58 +++++++++++++++++++ ...aker-b01ef863c43e07a65402f06b0d7b0757.yaml | 58 +++++++++++++++++++ ...aker-c07bb721e301a0dbb891c103a2081934.yaml | 58 +++++++++++++++++++ ...aker-e9a2fbdd50662e029e4a5c38ab41c5ff.yaml | 58 +++++++++++++++++++ ...aker-fd99760a8adb4d7f1b1ef68935056870.yaml | 58 +++++++++++++++++++ ...l-wp-a7b9bf475d14b8ef039f5657643818f1.yaml | 58 +++++++++++++++++++ ...l-wp-c77fa481174899d20ed31a6b22926e33.yaml | 58 +++++++++++++++++++ ...addy-24fe066591faebd7c14b911941c41812.yaml | 58 +++++++++++++++++++ ...addy-30bec56b700c5c01448bca5f7c796f73.yaml | 58 +++++++++++++++++++ ...addy-3ba84c6caf17726274b8e8f2682a9b39.yaml | 58 +++++++++++++++++++ ...addy-7743d4aab2210fca5895ae50928bc6f9.yaml | 58 +++++++++++++++++++ ...addy-8295098ceddb00b6deaf6e823158a962.yaml | 58 +++++++++++++++++++ ...addy-a04514ff505b4f6eb352afc1674938fd.yaml | 58 +++++++++++++++++++ ...addy-ab195980f5561581f232d594039c4477.yaml | 58 +++++++++++++++++++ ...addy-bc16d03e307b2f3d476c4281bda98567.yaml | 58 +++++++++++++++++++ ...dget-ab0d8c25a4b5735f6b566693ae1e6b91.yaml | 58 +++++++++++++++++++ ...dget-cf547403a9a90330b0a13308e60c389b.yaml | 58 +++++++++++++++++++ ...lery-62d375a0ef3c9366ba6ad68911a5c603.yaml | 58 +++++++++++++++++++ ...lang-734bcf2e1364f37386af10d34a5f3d15.yaml | 58 +++++++++++++++++++ ...lang-79eabca00926846a970481cb6b7e83aa.yaml | 58 +++++++++++++++++++ ...usel-c2306772abb4405001a28e4fae27ec0e.yaml | 58 +++++++++++++++++++ ...mail-28928ab1eb71053bca13e7444bdf6fe5.yaml | 58 +++++++++++++++++++ ...tton-650e24c15aeace1d45fa4cd46dde8eb3.yaml | 58 +++++++++++++++++++ ...lder-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-xyz-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...p-up-4332f8cf6f6916ee73d377911664daa1.yaml | 58 +++++++++++++++++++ ...p-up-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...p-up-2ad443c3fcd60f912c758a2ef81745f4.yaml | 58 +++++++++++++++++++ ...p-up-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...p-up-9a1a1874ab2f30e05e0aeecc21462cab.yaml | 58 +++++++++++++++++++ ...p-up-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...tool-59d582cc0d2221cf47e1a851d96daa5e.yaml | 58 +++++++++++++++++++ ...ptin-fa365da8fb7be5a7c14e80d68226de79.yaml | 58 +++++++++++++++++++ ...lick-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...lick-a738a6df1d7af94fbdfc3f2ebe12ab82.yaml | 58 +++++++++++++++++++ ...lick-bd548451a3b6e5a6853676277735dfef.yaml | 58 +++++++++++++++++++ ...lick-d4b97461c23d3e553d4dc5a4ed959427.yaml | 58 +++++++++++++++++++ ...lick-dfa9091cff2e49dc88dc81c6af99c1f8.yaml | 58 +++++++++++++++++++ ...-box-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...-box-66e44ffd73c4157b210becf5e5234e8e.yaml | 58 +++++++++++++++++++ ...-box-cf6d429dc4a254aa005603854a5d8f0f.yaml | 58 +++++++++++++++++++ ...lder-0c50700eaffcf8d6b08d04f7dda8abac.yaml | 58 +++++++++++++++++++ ...lder-1558ae525a455945fc67fef6a1dd1612.yaml | 58 +++++++++++++++++++ ...lder-18e611cf48e8f4ad6e3b9384220c5457.yaml | 58 +++++++++++++++++++ ...lder-192f45705f7777bf22c82d567e0c737d.yaml | 58 +++++++++++++++++++ ...lder-1f9ac7c68fe8ba8939533494bdaf6f2c.yaml | 58 +++++++++++++++++++ ...lder-2b836e0762bdbf59a8ee2eb5384418f5.yaml | 58 +++++++++++++++++++ ...lder-65e82d728797876c4549a975b4ad5c9f.yaml | 58 +++++++++++++++++++ ...lder-9df0586fa1f03eb4aff1b246f09e907b.yaml | 58 +++++++++++++++++++ ...lder-a665c3284fcafde64dfe52ce15a964ef.yaml | 58 +++++++++++++++++++ ...lder-ac28c6a1f49fbad1719d7e09c0190565.yaml | 58 +++++++++++++++++++ ...lder-acfb5b2881f82d1968fd7915b9afb6ad.yaml | 58 +++++++++++++++++++ ...lder-aeb6fb0231c672e40781598de70439c1.yaml | 58 +++++++++++++++++++ ...lder-b04ad422f3446dde9c13618b34ff98a5.yaml | 58 +++++++++++++++++++ ...lder-b5996763218808f5db38a6126c890df9.yaml | 58 +++++++++++++++++++ ...lder-e90caa361b62564e08e191aa073473cd.yaml | 58 +++++++++++++++++++ ...lder-f3aaaced779e642f2bb1c29db02ea02e.yaml | 58 +++++++++++++++++++ ...stic-08f985452f29d16902708fda34a54b58.yaml | 58 +++++++++++++++++++ ...stic-0ff521bb2f967b893b649e52f933e62e.yaml | 58 +++++++++++++++++++ ...stic-4a55514451127aed8c9fafcd15f7c892.yaml | 58 +++++++++++++++++++ ...stic-7181f5f3bd0820834a4f3207e9060f79.yaml | 58 +++++++++++++++++++ ...stic-7d533a3d146be46c1ec4aa8c4e983051.yaml | 58 +++++++++++++++++++ ...stic-7fd4b87b9f62e3f833903e1a4cb60554.yaml | 58 +++++++++++++++++++ ...stic-aaf49aa53f803817d024c6faf4d05d87.yaml | 58 +++++++++++++++++++ ...form-3c0e91d24d36a9cd6d874ce52fecf15c.yaml | 58 +++++++++++++++++++ ...form-584864f4cdfe17f88fd042ba6424f8ca.yaml | 58 +++++++++++++++++++ ...ages-e6cb47157cb35f90dcc06e51f4ec2619.yaml | 58 +++++++++++++++++++ ...aker-189f237bf9c2686338f976edbe64b7e4.yaml | 58 +++++++++++++++++++ ...aker-3a1e41088675792a5f4e28fc34263cd0.yaml | 58 +++++++++++++++++++ ...aker-535ebdfe2ca4cb1641e4a25814726229.yaml | 58 +++++++++++++++++++ ...aker-a3b6f79669d9dc684f2a89cb966b83d1.yaml | 58 +++++++++++++++++++ ...aker-b57f56b1347aa5d19dac687fe592133a.yaml | 58 +++++++++++++++++++ ...aker-babd847e079fcdd7a546f8f906593529.yaml | 58 +++++++++++++++++++ ...aker-c446e0b00a3a4561bee5779481d638d6.yaml | 58 +++++++++++++++++++ ...aker-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...aker-d421af39d84b1128d0254744158f6c8d.yaml | 58 +++++++++++++++++++ ...aker-de64ee696bec8d009d778000d64252b8.yaml | 58 +++++++++++++++++++ ...aker-ff57e42e57104b9d5c57fd329587cf27.yaml | 58 +++++++++++++++++++ ...ager-76f3b72582acb97747f26a7d73d169e0.yaml | 58 +++++++++++++++++++ ...ager-da1a3662428b7d8e0a5c05c7f2cee12d.yaml | 58 +++++++++++++++++++ ...tube-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...more-7d2e01fb5142e419d7f12bc8417804ab.yaml | 58 +++++++++++++++++++ ...ybox-bee21ffa7faff706d4db361bca23b6c3.yaml | 58 +++++++++++++++++++ ...yrex-d9e5ab172446fd3be8d4dddf9dcfa63e.yaml | 58 +++++++++++++++++++ ...ally-104344c0b7a013be4ee55f379fbf7b52.yaml | 58 +++++++++++++++++++ ...ally-3e074f8fe92c7cadd8316ec7dd448917.yaml | 58 +++++++++++++++++++ ...pups-356d13b6974d8f1c305ed39531dbff42.yaml | 58 +++++++++++++++++++ ...dmin-cd131fb7dbc732763aa435e3a74746ae.yaml | 58 +++++++++++++++++++ ...dmin-d09c471b1ad5ad87d4f4afddc3658574.yaml | 58 +++++++++++++++++++ ...dmin-f5f19df0291f0636aeea89c408a38887.yaml | 58 +++++++++++++++++++ ...olio-417489514b9c703ef6de3484813afc07.yaml | 58 +++++++++++++++++++ ...ects-454dc41941365b15ee244d48d13a5ca3.yaml | 58 +++++++++++++++++++ ...ects-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...lund-6fc195976bc811efd5c4bd31a1b9fd8a.yaml | 58 +++++++++++++++++++ ...lund-83ec865d5c8f3847f1734b9b89afe851.yaml | 58 +++++++++++++++++++ ...ntor-20c420e00e7776a25487d5218d4e77bb.yaml | 58 +++++++++++++++++++ ...ntor-4d83bba8058d5550f9120708c18d4b23.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-6a48e7c9d0ebe158b3f7430c9e7962df.yaml | 58 +++++++++++++++++++ ...lery-6d651a584c882645ac53e340c49131a0.yaml | 58 +++++++++++++++++++ ...lery-1ef894646600f00b3158183d9299dcde.yaml | 58 +++++++++++++++++++ ...lery-815bbb8ecdc0251e048f40a706274fbc.yaml | 58 +++++++++++++++++++ ...lery-8195d0fd4f0b5ac7235f16224b2dcb18.yaml | 58 +++++++++++++++++++ ...lery-70beb78ba7fd734dda35bda551cb0775.yaml | 58 +++++++++++++++++++ ...lery-d3ba4c3e62ed9f2cd7ab1df9d9c7321d.yaml | 58 +++++++++++++++++++ ...show-cb4e42488e82603fdda3ed8a6057c4fa.yaml | 58 +++++++++++++++++++ ...-pro-9d8ad614993ab663e4e1353da10143d9.yaml | 58 +++++++++++++++++++ ...o-wp-422a760ab8a04278c237785bf5be638b.yaml | 58 +++++++++++++++++++ ...lity-10147d7844868b2801a0e636a99a05eb.yaml | 58 +++++++++++++++++++ ...lity-23f358a9d40cae78b36e38b231af07ae.yaml | 58 +++++++++++++++++++ ...lity-57ac81934caebdaedb69c79f34942250.yaml | 58 +++++++++++++++++++ ...lity-98b3c6ab8f905b035d160d1673b90dca.yaml | 58 +++++++++++++++++++ ...shop-0786a182b4b3d53e469584f477d9a727.yaml | 58 +++++++++++++++++++ ...erce-96ae79181b6ec77bcc77d5a1f71b9993.yaml | 58 +++++++++++++++++++ ...lder-55e2a4b9a97cda212301452238552f00.yaml | 58 +++++++++++++++++++ ...lder-cfbde5318ddfc1f99a56f4cb27a830a5.yaml | 58 +++++++++++++++++++ ...usel-b852d5115d07ebbb3d6948d1d5619495.yaml | 58 +++++++++++++++++++ ...usel-ddeb85dc820c08fb544362c25d281533.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ider-048a39e7d237e8f103e054f25cf72eb4.yaml | 58 +++++++++++++++++++ ...ctor-21e149e548734ec4b958e79da23daedf.yaml | 58 +++++++++++++++++++ ...ctor-77f1b741caca90f6e233d10f62410685.yaml | 58 +++++++++++++++++++ ...ctor-f776029d92548dff61e2448270aca9d0.yaml | 58 +++++++++++++++++++ ...-pro-f776029d92548dff61e2448270aca9d0.yaml | 58 +++++++++++++++++++ ...lrpc-c5997f1fef9873598e392fd29a23db70.yaml | 58 +++++++++++++++++++ ...ator-4411dec3eca9ec1ccdcf332ed790a4a3.yaml | 58 +++++++++++++++++++ ...ator-757377e3d1b7b4a16326ff93c76bfa77.yaml | 58 +++++++++++++++++++ ...ator-e3c761c4e430d07f3cc55d6f4fc67c86.yaml | 58 +++++++++++++++++++ ...ator-94847c0850f7aba0194b3e646162912e.yaml | 58 +++++++++++++++++++ ...lery-1b225faa6149f90c544fb3acb706af2f.yaml | 58 +++++++++++++++++++ ...grid-035b152afda993b6317a93d2886e872e.yaml | 58 +++++++++++++++++++ ...grid-2709ba16ebba4320ded81fce12f3563d.yaml | 58 +++++++++++++++++++ ...grid-27ea99e0a4c0fec30a4e9e397cbf9e1f.yaml | 58 +++++++++++++++++++ ...grid-62d64311944bfd1e5f948984fb1aa5c3.yaml | 58 +++++++++++++++++++ ...grid-95cbf2d4161dbe2a06b19107725df07f.yaml | 58 +++++++++++++++++++ ...grid-966d3900b7e6f22f0e9de38c28765bd0.yaml | 58 +++++++++++++++++++ ...grid-af61f5bee07d29ca204b7dc88cfe0b56.yaml | 58 +++++++++++++++++++ ...mate-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...grid-c45a88374cf340205cd7587349c11c58.yaml | 58 +++++++++++++++++++ ...mate-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...mate-1ddfe592d879bc70e98e16d6c917ddd6.yaml | 58 +++++++++++++++++++ ...mate-2f1e25e867c081cf048f4dbc7240dbff.yaml | 58 +++++++++++++++++++ ...mate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...mate-c9946499e4c79e58a3887d0481784464.yaml | 58 +++++++++++++++++++ ...grid-cf1bd6ff01752966d1624646c80166a0.yaml | 58 +++++++++++++++++++ ...grid-d85892acba5196bfde784fd680ddf7a0.yaml | 58 +++++++++++++++++++ ...grid-f73e002833ea0b53546c13f99fdb350d.yaml | 58 +++++++++++++++++++ ...ghts-a2564828601d8890d4d70eda1fefb7d7.yaml | 58 +++++++++++++++++++ ...nter-f768e79079373c221f74efaccdcb8674.yaml | 58 +++++++++++++++++++ ...ndex-a197637cb7c671923c50bb35a3955a77.yaml | 58 +++++++++++++++++++ ...exer-b17a43827beee501340aedb4ac43d4f4.yaml | 58 +++++++++++++++++++ ...exer-e8e5df43b04b7f37f9a558b78548b1cb.yaml | 58 +++++++++++++++++++ ...gner-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...gner-bb6c1374b9c3f1f7e4fbd5d4ecd1156f.yaml | 58 +++++++++++++++++++ ...gner-dd54abc9fa7f2f5d5c6010fa1c8c3d7f.yaml | 58 +++++++++++++++++++ ...mage-5d918b6eb4d2d11658c1c45d7b9c4c43.yaml | 58 +++++++++++++++++++ ...ager-09c17ceea6b1acc60dc27557a0b8ba88.yaml | 58 +++++++++++++++++++ ...ager-1261a6042800202478889a8b09341ae9.yaml | 58 +++++++++++++++++++ ...ager-91dbc533a6be524b4d3d9619ad71cbbc.yaml | 58 +++++++++++++++++++ ...ager-f2302a385e4bf0d806c1625e66741b99.yaml | 58 +++++++++++++++++++ ...-new-6b050fdad6f07dfeb11a710487994604.yaml | 58 +++++++++++++++++++ ...nter-c7ba3a45fd00d12be9d06e7d73d86881.yaml | 58 +++++++++++++++++++ ...nter-d8208f20ecd1e01dd3173f786b1bf7c7.yaml | 58 +++++++++++++++++++ ...nter-f9e928230a2004071cf8b8a565c1c9d8.yaml | 58 +++++++++++++++++++ ...rary-58af12d3803de6577a6e6446cfb68db8.yaml | 58 +++++++++++++++++++ ...code-b16694416bb8375e384e3d9eb2224580.yaml | 58 +++++++++++++++++++ ...usel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...usel-43333653570b3a1b8a29a02f94914583.yaml | 58 +++++++++++++++++++ ...smtp-0b71d9ca16ea40ec86cc7a6c955b072f.yaml | 58 +++++++++++++++++++ ...smtp-0b997461262414a5dc7659a0045e7c29.yaml | 58 +++++++++++++++++++ ...smtp-378b490d457309885c7c94c6e12193bf.yaml | 58 +++++++++++++++++++ ...smtp-53d4be9be43b09403fe429bdcc5fb51e.yaml | 58 +++++++++++++++++++ ...smtp-5cce32cc2992a89ca752b62e96a78a05.yaml | 58 +++++++++++++++++++ ...smtp-5dcfc5ea6f05d00ca9432dc6e06a959a.yaml | 58 +++++++++++++++++++ ...smtp-67e90d47ddcdc0a14625badc3df84c45.yaml | 58 +++++++++++++++++++ ...smtp-95f3dcaa4b86abab69cc1c0fd09f80aa.yaml | 58 +++++++++++++++++++ ...smtp-9886017b189939b50d12738a1b1a19c5.yaml | 58 +++++++++++++++++++ ...smtp-afbbe261546ed611413e53ceb7e989bf.yaml | 58 +++++++++++++++++++ ...smtp-d84a106e9bb81d7dc52eebf9c446c56a.yaml | 58 +++++++++++++++++++ ...smtp-ff6aea4a9e4f72f85f246b4af5287259.yaml | 58 +++++++++++++++++++ ...pets-67558508f8127f6d47b6b0749495c9d6.yaml | 58 +++++++++++++++++++ ...pets-6dabd7288f9bf1aa4314c1230eb61170.yaml | 58 +++++++++++++++++++ ...pets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...pets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...tags-615b1160bdc5d2675b75757e17bb7e35.yaml | 58 +++++++++++++++++++ ...lite-536f99b9c8b9515938d0ac526d370775.yaml | 58 +++++++++++++++++++ ...lite-fa9b6dc41b62f37cfba851a3e4e1b251.yaml | 58 +++++++++++++++++++ ...aser-767aeb59e47dca848d0413b31cb3f81a.yaml | 58 +++++++++++++++++++ ...aser-db46aef04d74b6695e5a22627a3163f0.yaml | 58 +++++++++++++++++++ ...itor-c06a16f33dee682ac5351a8f0d142a5f.yaml | 58 +++++++++++++++++++ ...line-d1c35f1b92d2cf694e8384e45db5ef1c.yaml | 58 +++++++++++++++++++ ...nter-ae3d9dc541dfd812b33967f0f1087c0a.yaml | 58 +++++++++++++++++++ ...-csv-20398cd1fa642be8e5e0c9798f123a57.yaml | 58 +++++++++++++++++++ ...-csv-7b65c39ddbda37096522c90c94a9d953.yaml | 58 +++++++++++++++++++ ...-csv-ebe4222fc5927e1301c1b27600c1ee1b.yaml | 58 +++++++++++++++++++ ...ness-b63b7b7e3d30454ea5fbfd364258f1a1.yaml | 58 +++++++++++++++++++ ...ness-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tter-b53860895277e266b1fcb14159c31da6.yaml | 58 +++++++++++++++++++ ...mple-2e58f9cd7db4957fbee5920bc996cbac.yaml | 58 +++++++++++++++++++ ...pe-x-1d0458d81b174356717b00e4b0b273b5.yaml | 58 +++++++++++++++++++ ...pe-x-26b80bc80cde32f0f361f2fadc6529c9.yaml | 58 +++++++++++++++++++ ...pe-x-965fb6d33351fd23a3e7b31a7c69feff.yaml | 58 +++++++++++++++++++ ...pe-x-c1d2bd9a1bb88b5b9cb365bbd2698cbe.yaml | 58 +++++++++++++++++++ ...iews-741838efe1987dc0902314663618d34f.yaml | 58 +++++++++++++++++++ ...nter-71955a966b82cf2219c81131b80c408e.yaml | 58 +++++++++++++++++++ ...nter-f4088a6dda890a2dfcb23a5a06369d61.yaml | 58 +++++++++++++++++++ ...tats-1e717f9147d850249e106a439e5cf9f6.yaml | 58 +++++++++++++++++++ ...epro-107104bc14e921090e757f0c5c64d34d.yaml | 58 +++++++++++++++++++ ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...stie-2555356e703532b9bbe5578b47fffbdf.yaml | 58 +++++++++++++++++++ ...stie-6f78bc0495c69824a3ef08a95ff8b518.yaml | 58 +++++++++++++++++++ ...stie-727d4fbf362548e62940ac117a3d3c3a.yaml | 58 +++++++++++++++++++ ...port-4f73853f1fed7601f5de786bcd020099.yaml | 58 +++++++++++++++++++ ...port-9efe0fb93db4e83b6512c73eb733e094.yaml | 58 +++++++++++++++++++ ...smtp-afe901ac8a088fbc034c09cb75a2f817.yaml | 58 +++++++++++++++++++ ...mash-4be4ac2753725fa5dd456a071085e7cc.yaml | 58 +++++++++++++++++++ ...mash-858a26ea9a23abdcedc5d015a7d5aad8.yaml | 58 +++++++++++++++++++ ...atic-364140ec5050587d4743f8ad888c8004.yaml | 58 +++++++++++++++++++ ...atic-77c6557ed6d5a269f424f3a44bdb8307.yaml | 58 +++++++++++++++++++ ...atic-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tats-d94e06192974b1fb1b08b2e10b17630f.yaml | 58 +++++++++++++++++++ ...page-4146040381375fe3470534dfb0d8c368.yaml | 58 +++++++++++++++++++ ...like-a6ade812b7794f2ce71092e01b3f3441.yaml | 58 +++++++++++++++++++ ...able-4d368f69e27c2436f2d59ef62ab42c49.yaml | 58 +++++++++++++++++++ ...page-f4bf91007a25d09c25ce2d7dd70ab2fa.yaml | 58 +++++++++++++++++++ ...tabs-03debccd2847f0f3861af391ac774ecf.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...omer-020f60a4dbeeac1a3b6d4d98194928a4.yaml | 58 +++++++++++++++++++ ...omer-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...rkit-0af70d46a8f7d1d575b47f6ceaa9d723.yaml | 58 +++++++++++++++++++ ...rkit-54dc33c4a20161d9ec4e865b2de44997.yaml | 58 +++++++++++++++++++ ...lder-97dd2eef8600f91fddf3cdf090566811.yaml | 58 +++++++++++++++++++ ...lder-e22d00de70da89c7d78c2d123c0c7293.yaml | 58 +++++++++++++++++++ ...ents-32838841eaf8293770fe8af6d9dab7cc.yaml | 58 +++++++++++++++++++ ...ents-89d7a5b57e6d3259874bdbb477d35f08.yaml | 58 +++++++++++++++++++ ...ents-910629dfad061ef1cd89c571481e8f0a.yaml | 58 +++++++++++++++++++ ...ntor-1e3008e9a413fca6d1323b62a2743a7d.yaml | 58 +++++++++++++++++++ ...ntor-328a1085ce78b77ac077833dbb3621ab.yaml | 58 +++++++++++++++++++ ...ntor-6a1e6967396b1126582c6ee0a5fede17.yaml | 58 +++++++++++++++++++ ...ntor-7cdc1189a823c084ca0c2c88ab1e4c6a.yaml | 58 +++++++++++++++++++ ...ntor-b041552e80a8d76e86ae11341bcea94f.yaml | 58 +++++++++++++++++++ ...ntor-bc9d2ff303507ede4dc68917dcd5ae6c.yaml | 58 +++++++++++++++++++ ...ntor-e94aceaf63920aa3eb4b9932eb00b35a.yaml | 58 +++++++++++++++++++ ...ress-09573bbd55ffbde9d233ad38438e8f66.yaml | 58 +++++++++++++++++++ ...ress-2a2fe738939a9e67d5cb46ca54ca2af9.yaml | 58 +++++++++++++++++++ ...ress-307c020a7d3d97fddb5823725bc2bdc1.yaml | 58 +++++++++++++++++++ ...ress-86221a41117bb12070fda480ca17a28c.yaml | 58 +++++++++++++++++++ ...ress-bb853e4203fd77e0eccd7981cc19970b.yaml | 58 +++++++++++++++++++ ...ress-d2b59825f91765366d354ae0bca502ca.yaml | 58 +++++++++++++++++++ ...ress-d401832f82eae4d4b25c6742ae7df7ee.yaml | 58 +++++++++++++++++++ ...ress-e8a960f3022a61734bef50d7f60e4d17.yaml | 58 +++++++++++++++++++ ...hois-5aab035ef042ccd7141d869c2750d5bc.yaml | 58 +++++++++++++++++++ ...pack-788f2a7e634374198c6c99e174e2830a.yaml | 58 +++++++++++++++++++ ...pack-eda45ed9fd55d54d8bc8631b38650581.yaml | 58 +++++++++++++++++++ ...ctor-b4d07a0d8ae8c6f01f34243674170720.yaml | 58 +++++++++++++++++++ ...fltr-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...erce-f8654e70b61d2e52e5f038a5f0414371.yaml | 58 +++++++++++++++++++ ...ints-c47827133b1c48070f46a59d37c27728.yaml | 58 +++++++++++++++++++ ...list-d84e75d6c9c8d0a3d0da84beaba7027f.yaml | 58 +++++++++++++++++++ ...arch-6b177b37379772051433776316566ccd.yaml | 58 +++++++++++++++++++ ...arch-a45e2a89638ef475d44955daca9531ef.yaml | 58 +++++++++++++++++++ ...arch-b2c299a9a1dfd6a544071cd299a840b8.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...site-2c9e7a14e26b36ebcb4ba9bbe208df94.yaml | 58 +++++++++++++++++++ ...ntor-07fd6d4168c19a2706208ce105fc7279.yaml | 58 +++++++++++++++++++ ...ntor-17011bf78eb7cb3c3509ef0727f15b97.yaml | 58 +++++++++++++++++++ ...ntor-285480d3186a91d1e0ed6c347ab46652.yaml | 58 +++++++++++++++++++ ...ntor-5332275b2ed1bab71594c8fbd6d44f11.yaml | 58 +++++++++++++++++++ ...ntor-53bbdc5768caf77b3864368c8b4ad9d8.yaml | 58 +++++++++++++++++++ ...ntor-5830898462cdce464207b0d4b8cd2848.yaml | 58 +++++++++++++++++++ ...ntor-5f4d629f81f40ae82d44c4c8c94e12ba.yaml | 58 +++++++++++++++++++ ...ntor-63b73f38de8e42ff42c365ddf35b05de.yaml | 58 +++++++++++++++++++ ...ntor-6be8b4c15f4802607f2237b86373c965.yaml | 58 +++++++++++++++++++ ...ntor-7346b5c5cde69749b42ec0dfced7a750.yaml | 58 +++++++++++++++++++ ...ntor-9196735e9e9fe6dd44235b7e0a53bb60.yaml | 58 +++++++++++++++++++ ...ntor-a48eaf0c735b82aaff5677d4812dc0a7.yaml | 58 +++++++++++++++++++ ...ntor-b940c9ab9a01a68eea4a5776ab2199d7.yaml | 58 +++++++++++++++++++ ...ntor-c1aa3c18402d6565768dc2655ac439f3.yaml | 58 +++++++++++++++++++ ...ntor-ca0593eecf48a43d195a057ed533a1b4.yaml | 58 +++++++++++++++++++ ...ntor-d5a4a92d920eb71aaeb7667326f31fb1.yaml | 58 +++++++++++++++++++ ...ntor-ee8591e5f3f55c96d9835c88a6740c39.yaml | 58 +++++++++++++++++++ ...-pro-24ae12d6b29ac4b2b659477fd814db52.yaml | 58 +++++++++++++++++++ ...-pro-3bfe779738faac39c2783a057e7fba45.yaml | 58 +++++++++++++++++++ ...-pro-3da39631322ead94331d2d8a800a3d3d.yaml | 58 +++++++++++++++++++ ...-pro-476134bec82a295d4478418acb3a1fc0.yaml | 58 +++++++++++++++++++ ...-pro-7dae15c1486a66b7dbaca3afb1f366c1.yaml | 58 +++++++++++++++++++ ...-pro-8ea80e6fdb96812cc7fb786f57b22769.yaml | 58 +++++++++++++++++++ ...-pro-a6cbba6a06f8c16a716b48b44610ad62.yaml | 58 +++++++++++++++++++ ...-pro-b898553c18a3c26f0a1b011522df0006.yaml | 58 +++++++++++++++++++ ...-pro-fe65855ff8de2259da21136e19e15ee9.yaml | 58 +++++++++++++++++++ ...sion-ccaafbc19f880370aa739512631721f1.yaml | 58 +++++++++++++++++++ ...ager-03cf8e93b74222e68871e585e93a1dfa.yaml | 58 +++++++++++++++++++ ...erce-8029afdc04745424b05ede0e496f1c03.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-2caec5a3e7a9b163d5d5f19244c4d557.yaml | 58 +++++++++++++++++++ ...ager-50f488111dad00bdb113f7022a4a0420.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-d025df7fa9c98e92f3b558a7323cb34f.yaml | 58 +++++++++++++++++++ ...arch-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oles-3d4210819f9a01bf5f52c577615b1ddd.yaml | 58 +++++++++++++++++++ ...oles-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ands-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ency-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lter-9460e33e1600fa49d2559c8b2959f093.yaml | 58 +++++++++++++++++++ ...lter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ches-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ches-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...cing-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...list-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...list-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ioni-0b0d398d1a79ae77845de8705631a4db.yaml | 58 +++++++++++++++++++ ...-seo-a5227115c16c80c1d90e0210cfd39bd1.yaml | 58 +++++++++++++++++++ ...ents-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...rter-86e875acdb3922f4740414dff44b0215.yaml | 58 +++++++++++++++++++ ...ward-618eabaed47a418425ba258f61366c0d.yaml | 58 +++++++++++++++++++ ...ward-d0af10e9ac4884ae3c68f9f3c40fdad7.yaml | 58 +++++++++++++++++++ ...ayer-ffd9211fd118d563cf07134a00f95502.yaml | 58 +++++++++++++++++++ ...ndar-c5888a6adf3b7c4a7f3becae44174450.yaml | 58 +++++++++++++++++++ ...ndar-f9b0e5543d8b6fde32af392e9a980e57.yaml | 58 +++++++++++++++++++ ...link-2b34a16f481c76cd3b855292edd0837c.yaml | 58 +++++++++++++++++++ ...link-3e48b050eb99b97d596e581160f8b0fb.yaml | 58 +++++++++++++++++++ ...link-41859e395573554f98122582c8a8f0c6.yaml | 58 +++++++++++++++++++ ...link-64447b975f887c7d7c5f32cb22cf8b08.yaml | 58 +++++++++++++++++++ ...link-788a92d89f29c9708029570d31435edd.yaml | 58 +++++++++++++++++++ ...link-937a958745ed3ab696229e1956002aef.yaml | 58 +++++++++++++++++++ ...link-b59b53ef6e4ef1805fb78be7f13120cc.yaml | 58 +++++++++++++++++++ ...lite-052601a64f3c278014382ca43022a402.yaml | 58 +++++++++++++++++++ ...lite-a5b27966569a74533de04e9d976c99c9.yaml | 58 +++++++++++++++++++ ...-url-977a0355e694b9d265545981130653f2.yaml | 58 +++++++++++++++++++ ...hoto-1c7062bfa495ccd866c7cbbbfe4462e3.yaml | 58 +++++++++++++++++++ ...save-9375f4344479a96cb2fe5deb81f3c215.yaml | 58 +++++++++++++++++++ ...cess-0dc878d77e3a3194c72fdd6ba3814c5b.yaml | 58 +++++++++++++++++++ ...tion-b8f19e13b8f78474f2f4efef8d80ad2c.yaml | 58 +++++++++++++++++++ ...ator-1c4812a533fa1689fc1c4f74901b1fce.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...orwc-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...able-c09dba9091d0ee592d0a0d23f17cab8b.yaml | 58 +++++++++++++++++++ ...erce-791f562db0a1b9f0bcd5351dce6eacc4.yaml | 58 +++++++++++++++++++ ...erce-8930cf2379d26f27d4dfc818449f89c9.yaml | 58 +++++++++++++++++++ ...able-a5038f440967c1bd1e883ce46373e9e5.yaml | 58 +++++++++++++++++++ ...stic-07351eac4ac9135631e6b13a4dbb9f2b.yaml | 58 +++++++++++++++++++ ...stic-5cd979c2d1bc0f7645ea6d8b845b95d5.yaml | 58 +++++++++++++++++++ ...stic-796cd5b627356be27433f08472302dc1.yaml | 58 +++++++++++++++++++ ...stic-a0cf0c70320b9077a478823de4b5e05c.yaml | 58 +++++++++++++++++++ ...stic-b8b87309673e04154a00de1091b89e07.yaml | 58 +++++++++++++++++++ ...stic-fef3c5d045b635ac89f7d5a505428c20.yaml | 58 +++++++++++++++++++ ...lder-ea2779881d033f74603b414138c61a0a.yaml | 58 +++++++++++++++++++ ...lder-fa96acbf0fe29f0b0c48fe458fac9bfe.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...over-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...over-ec0983e54c9058b456b78ea30580b6c5.yaml | 58 +++++++++++++++++++ ...erce-2af694ce57dffaf3d295cf18ffc50a9f.yaml | 58 +++++++++++++++++++ ...erce-7ec3d0366936e6cdb87debac06f05872.yaml | 58 +++++++++++++++++++ ...erce-c7e173848fb257299994b18731636ed4.yaml | 58 +++++++++++++++++++ ...erce-ef0878d0c845446e359ff8868f1f69d3.yaml | 58 +++++++++++++++++++ ...erce-4e625904aaffe65e8919040e5c5d03d6.yaml | 58 +++++++++++++++++++ ...erce-b658c34d6189136c251e0b8d8e225774.yaml | 58 +++++++++++++++++++ ...erce-b989c8fa7ed8639e2ece01754bff0c0b.yaml | 58 +++++++++++++++++++ ...erce-c1749d6ed9c579e061b6c82357a7d855.yaml | 58 +++++++++++++++++++ ...erce-e0a80937c004063afd9f6bac15ab1a10.yaml | 58 +++++++++++++++++++ ...blog-0562ee4a0dfba95b2ef2be1e8d702a78.yaml | 58 +++++++++++++++++++ ...blog-15e90fc31ab3dfba5bcef7edbbc05f6d.yaml | 58 +++++++++++++++++++ ...blog-26c14cb6ca4960fb59e24c4b3a62abf9.yaml | 58 +++++++++++++++++++ ...blog-6bab7e18a95398e2980bac2c1ae0a9ae.yaml | 58 +++++++++++++++++++ ...blog-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...atic-2a1202a3beb6f69088b7b47e3927398f.yaml | 58 +++++++++++++++++++ ...atic-6cf87515d30763cb39f9dddd78a854d6.yaml | 58 +++++++++++++++++++ ...atic-92919ce0eb17b0cea216462cfde732e2.yaml | 58 +++++++++++++++++++ ...page-2ff60d0958c013f69d2bb2b8a6cd708d.yaml | 58 +++++++++++++++++++ ...ndly-1d90f05eb3de7b1b2997cada03edccfe.yaml | 58 +++++++++++++++++++ ...ndly-8d6a1c8b6a0bd1e0976b28104afac768.yaml | 58 +++++++++++++++++++ ...erce-85ac97fd4125d5816ad5ef5d1d8e7011.yaml | 58 +++++++++++++++++++ ...atic-8edd86c32f445ba8a5cfcf66f80c6f54.yaml | 58 +++++++++++++++++++ ...atic-b1ef7da73b0bc448b39a7087f236d203.yaml | 58 +++++++++++++++++++ ...tent-c6757c3a086fd1dc631d770c06dfa500.yaml | 58 +++++++++++++++++++ ...iles-dfb92d2f2c245aee84f9cb4e282df3aa.yaml | 58 +++++++++++++++++++ ...dars-9e0ed51792e9270a576ac0d1dc550b71.yaml | 58 +++++++++++++++++++ ...ress-28a0fb0e5795f11d3d7f2a955c95e65c.yaml | 58 +++++++++++++++++++ ...ress-9a33307ee1f701bb2a441949f0f7229e.yaml | 58 +++++++++++++++++++ ...only-ec43ca1bf1629851ca9458501102a544.yaml | 58 +++++++++++++++++++ ...-dev-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ypes-2434cb0fd5a6747f4ecee8f99db9624f.yaml | 58 +++++++++++++++++++ ...ypes-cd2ecefb429545511e8b1657a942d790.yaml | 58 +++++++++++++++++++ ...gner-305166b60791f108d5e7fe6f43ded2e7.yaml | 58 +++++++++++++++++++ ...gner-dc3e0c6c532d55735bad2ab0a9b29d39.yaml | 58 +++++++++++++++++++ ...iler-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...ocks-0fda2513a52a35861fc96a4bfe4d416a.yaml | 58 +++++++++++++++++++ ...ocks-1a920eb903d024c035ef8c5bd825169f.yaml | 58 +++++++++++++++++++ ...ocks-52b32717fd3d0ae5a10aa7d3c77cb89f.yaml | 58 +++++++++++++++++++ ...erce-c121370e7ba5758271f409501c03a844.yaml | 58 +++++++++++++++++++ ...og-8-f04f87a896e55745312276c242be448b.yaml | 58 +++++++++++++++++++ ...feed-0c4b1084930aeba75c764a4b807cb55a.yaml | 58 +++++++++++++++++++ ...feed-14b3d9da0216be6cd75720390cc32eeb.yaml | 58 +++++++++++++++++++ ...feed-de6904b30338b532fe232a4eed04dacc.yaml | 58 +++++++++++++++++++ ...tree-15b4a0b7ca6834b3f08ed0acfa9781a1.yaml | 58 +++++++++++++++++++ ...tree-7e41870e8c673b23f19244598ea8ebcd.yaml | 58 +++++++++++++++++++ ...tree-93d68a604c1f31fabc010b04974afd20.yaml | 58 +++++++++++++++++++ ...erce-e4183cf6c320dd4a4188939a38d36eca.yaml | 58 +++++++++++++++++++ ...lite-84ccfe3dbfa257fc01b0e4c65174ef35.yaml | 58 +++++++++++++++++++ ...gner-929aa721697458bc99a1b54c167ebc87.yaml | 58 +++++++++++++++++++ ...erce-c7b36bc8204aa5070cf82a1f950c7e42.yaml | 58 +++++++++++++++++++ ...duct-a3db779bffaf01ac0439d97b043e7b9e.yaml | 58 +++++++++++++++++++ ...erce-bfa3bdf21b692d54c0876a9ef34f70f6.yaml | 58 +++++++++++++++++++ ...-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-woo-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml | 58 +++++++++++++++++++ ...-woo-ab754796885789e2785d22756395f374.yaml | 58 +++++++++++++++++++ ...-woo-d62fba94114c42d1399d83bf9ba0a989.yaml | 58 +++++++++++++++++++ ...erce-2ce3f934989f3f09920f8b67a7a75fec.yaml | 58 +++++++++++++++++++ ...erce-95b404a39a8029acce6d04daae5f2eac.yaml | 58 +++++++++++++++++++ ...oops-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...erce-16f12614c7a820b2ff0d5295346d446f.yaml | 58 +++++++++++++++++++ ...erce-eb2fd42fe2d2e213e39c0b11404601e5.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...erce-bc983a8f571310dd96f9e038e97c3ba7.yaml | 58 +++++++++++++++++++ ...erce-0088814ed74fd156e9ee132de51ef1d2.yaml | 58 +++++++++++++++++++ ...erce-2fb579c97de9a06544ccd98cdd1f1a82.yaml | 58 +++++++++++++++++++ ...-woo-f18aed8f26180438e01da09d99987534.yaml | 58 +++++++++++++++++++ ...lite-95618d186dc4c7ea88896374745039e9.yaml | 58 +++++++++++++++++++ ...ions-5e59a8e30610325be11fabed812368f9.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...erce-51f425b2b47157be5d941492e7da4019.yaml | 58 +++++++++++++++++++ ...erce-aa1854785cf9c11ed11fbc4dacf9e3b9.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...lder-00e848a455a7983930f44875cace1026.yaml | 58 +++++++++++++++++++ ...lder-251b86614cf3be75bb7b89fbf426f8a3.yaml | 58 +++++++++++++++++++ ...lder-3457b59f61c052b7277e18f32edfae6a.yaml | 58 +++++++++++++++++++ ...lder-5015ecbd471db4975c3b73948587d93d.yaml | 58 +++++++++++++++++++ ...lder-69b4ec76e7e9ef35af4eba10c77eda3e.yaml | 58 +++++++++++++++++++ ...lder-6d25cf58ffbcaa52d33430356ac1e25b.yaml | 58 +++++++++++++++++++ ...lder-70888d956fd216305358993b9594be41.yaml | 58 +++++++++++++++++++ ...lder-70dc7e4179ee1658845e3eaa45bb0f0f.yaml | 58 +++++++++++++++++++ ...lder-8f79685201a214e5aabf85b86caf9624.yaml | 58 +++++++++++++++++++ ...lder-960773bb26ec71f2b5c7ab22a6dcda0e.yaml | 58 +++++++++++++++++++ ...lder-9785eac397f218ab171d469467f03925.yaml | 58 +++++++++++++++++++ ...lder-a0c7f584a89a83d8f5abdb6a2467eb51.yaml | 58 +++++++++++++++++++ ...lder-adf6fac31c64a896c3bd8abd21897c4e.yaml | 58 +++++++++++++++++++ ...lder-c416c9eed88376e68372de18ba7ac866.yaml | 58 +++++++++++++++++++ ...lder-cdefed7ec787c02fefebf6f17656a114.yaml | 58 +++++++++++++++++++ ...lder-d50bca474bfff7b87f9bd013b925f56e.yaml | 58 +++++++++++++++++++ ...lder-d9e9e029782a4a4e5f78971a37604066.yaml | 58 +++++++++++++++++++ ...lder-da13e940921b9b4b286d3e79be1e9d85.yaml | 58 +++++++++++++++++++ ...lder-da987af29928bc75b0d20d1e2162e5dd.yaml | 58 +++++++++++++++++++ ...lder-dc37f981ae3cabe96f1627086e8e54ca.yaml | 58 +++++++++++++++++++ ...lder-ed5bd7edeac7881ada7083f398663350.yaml | 58 +++++++++++++++++++ ...lder-f044be0e1e4c22699ad8261226bc2dd0.yaml | 58 +++++++++++++++++++ ...-pro-47d88a978c6902943e13680f899b8407.yaml | 58 +++++++++++++++++++ ...-pro-960773bb26ec71f2b5c7ab22a6dcda0e.yaml | 58 +++++++++++++++++++ ...-pro-a686ec08a13b7563defc9b5263758c7f.yaml | 58 +++++++++++++++++++ ...-pro-b32ca2d76fc3293d68526cfa723e6bfe.yaml | 58 +++++++++++++++++++ ...-pro-ed5bd7edeac7881ada7083f398663350.yaml | 58 +++++++++++++++++++ ...elds-6c56f3c8c2911fbe28d5ba7b021c7d79.yaml | 58 +++++++++++++++++++ ...elds-be030cdf4529b191ea63fd886a20439f.yaml | 58 +++++++++++++++++++ ...ties-294749cd5a2ad1c57b32f41564fa1af1.yaml | 58 +++++++++++++++++++ ...ties-2f992f86ff54d554aa2e677bbff33be5.yaml | 58 +++++++++++++++++++ ...ties-44a5cf3e0ce958c3682da008c171fd01.yaml | 58 +++++++++++++++++++ ...ties-4a6b08579b21c259b0bca4ce2e0b2904.yaml | 58 +++++++++++++++++++ ...ties-4ca548e170bb0185c3dab51f55775413.yaml | 58 +++++++++++++++++++ ...ties-59843f563a6293fb05b21fc44ccb51b3.yaml | 58 +++++++++++++++++++ ...ties-5fabed76f8f56020c1155c8f97c6681c.yaml | 58 +++++++++++++++++++ ...ties-602df06e81e9929680d21f57b3d3e3d7.yaml | 58 +++++++++++++++++++ ...ties-614a90a330e23b7940675663ee8789c8.yaml | 58 +++++++++++++++++++ ...ties-639feb49244de37ebd2501828b79541b.yaml | 58 +++++++++++++++++++ ...ties-749e9c4c45c9dfe7d4370d9e1054a6bf.yaml | 58 +++++++++++++++++++ ...ties-76473b3f668ab27ce2fcb0878efe87b4.yaml | 58 +++++++++++++++++++ ...ties-7bf1226ebc8c449ae85cc65e327ee63d.yaml | 58 +++++++++++++++++++ ...ties-865589c83192a271d43a839d1c2dd482.yaml | 58 +++++++++++++++++++ ...ties-8781e1672be1a467451ab0b40e4c7713.yaml | 58 +++++++++++++++++++ ...ties-87d13bf13b6be6962a557c3627b3cfe7.yaml | 58 +++++++++++++++++++ ...ties-913748097cb69a1df6b424d4a05f37a3.yaml | 58 +++++++++++++++++++ ...ties-923942b507c5bb53ae8216a8af30479c.yaml | 58 +++++++++++++++++++ ...ties-a0b780503648451776551c0d1ff9b442.yaml | 58 +++++++++++++++++++ ...ties-b38eda58adcd55c816f6214da161bc56.yaml | 58 +++++++++++++++++++ ...ties-bfc26d10316dbb147d906861f757195d.yaml | 58 +++++++++++++++++++ ...ties-d335e6c8c52890984157995f488f49da.yaml | 58 +++++++++++++++++++ ...tton-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...erce-1fba8e9934d599624fea9971897c6598.yaml | 58 +++++++++++++++++++ ...erce-6a4904a703851349707d8d3d078c2123.yaml | 58 +++++++++++++++++++ ...erce-7734e62aac4f36040cb75f80a344eeea.yaml | 58 +++++++++++++++++++ ...erce-7a9d640d2710a17dd51cbd839f471ded.yaml | 58 +++++++++++++++++++ ...erce-c3011a2eec39e2ae9754cf338940cb61.yaml | 58 +++++++++++++++++++ ...erce-ef26b2db7d3ee3da13d6289352e36f3b.yaml | 58 +++++++++++++++++++ ...-bar-941ae6e3f270ab1852f33bed4b21e75f.yaml | 58 +++++++++++++++++++ ...ense-5901a98b1164ea8a4d049ee273115818.yaml | 58 +++++++++++++++++++ ...e-wp-87e99280c7fbf3c8ad55c6ac46aa584a.yaml | 58 +++++++++++++++++++ ...-app-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...lite-f526a0fb0a181d070234f458832b61bd.yaml | 58 +++++++++++++++++++ ...load-55ee60e67d9e233077a29ca0b025c99e.yaml | 58 +++++++++++++++++++ ...atus-e22d4b224819c0d0a8a173a4476a0e71.yaml | 58 +++++++++++++++++++ ...site-c6a13766dfee309169a154d6bf63adc3.yaml | 58 +++++++++++++++++++ ...obar-25d8c7ed5a7b1effbc548f589cbe27a9.yaml | 58 +++++++++++++++++++ ...ider-bffa3ebfd0f8f4eee0788789721093cc.yaml | 58 +++++++++++++++++++ ...ding-716d3ddce65959ddfb011b7ca5f75416.yaml | 58 +++++++++++++++++++ ...hive-0e504336a10f995a3d5ffd0688becb4a.yaml | 58 +++++++++++++++++++ ...hive-269c54556a1ca81f568118ffc940071f.yaml | 58 +++++++++++++++++++ ...hive-38f9b434ada5260ea345f99b88aaaba2.yaml | 58 +++++++++++++++++++ ...hive-453cdccb9ec27998718a08f552017bc2.yaml | 58 +++++++++++++++++++ ...hive-4ba37fc25b6b62478d53951a81386aeb.yaml | 58 +++++++++++++++++++ ...hive-53a71e50160d96221b329d00809ca7b7.yaml | 58 +++++++++++++++++++ ...hive-5e68a3cd88ecb3d8410d3d1d23bfef75.yaml | 58 +++++++++++++++++++ ...hive-ca880b16159d0a9fbb68955f79340071.yaml | 58 +++++++++++++++++++ ...hive-deea856103e67ca13471337c06b08b93.yaml | 58 +++++++++++++++++++ ...hive-f53efc19e67fc15708f7aff7dc031f4c.yaml | 58 +++++++++++++++++++ ...oter-7ddce7ee421f18bacb72f14e66ea1bcb.yaml | 58 +++++++++++++++++++ ...oads-dcaafd0f02c38e487ed1a8a26307e284.yaml | 58 +++++++++++++++++++ ...page-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dmin-0e3824b9f05a1d4071b5fbf703950004.yaml | 58 +++++++++++++++++++ ...dmin-3008a63f18e7f2e88b5013011c2e866b.yaml | 58 +++++++++++++++++++ ...dmin-ec9f7eccec9ca008528410c831cadf91.yaml | 58 +++++++++++++++++++ ...page-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tton-5d1bfbb84afa64ba47c235dccca370e2.yaml | 58 +++++++++++++++++++ ...tton-6c57eb9a493b5e8a3f87551a89731a76.yaml | 58 +++++++++++++++++++ ...tton-c17395d57aa530c1ca072f07b2b709c1.yaml | 58 +++++++++++++++++++ ...tcha-e1c57fbc348dfda4a7e2fa9073819ee6.yaml | 58 +++++++++++++++++++ ...lite-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...lite-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...tmap-a5f0ed212c4766edc5a74c9f3775bc05.yaml | 58 +++++++++++++++++++ ...-ups-061a0160582ddd92c54f532180e67c97.yaml | 58 +++++++++++++++++++ ...rter-bc684639838d61cf579a672d96063b79.yaml | 58 +++++++++++++++++++ ...sage-6c62a897542f5fcbb95887f636c680c5.yaml | 58 +++++++++++++++++++ ...tion-a18a9d03d5ff2c74e7d4dd874ea75ae5.yaml | 58 +++++++++++++++++++ ...dule-577c8d638d67108f4b264900ccfdf446.yaml | 58 +++++++++++++++++++ ...dule-fed0833f3ebebd240e7a0f4e9421be22.yaml | 58 +++++++++++++++++++ ...-kit-f9078038dec7d199edb0413f76661495.yaml | 58 +++++++++++++++++++ ...ress-5eb9664c4cfc97621e70ca6044316a22.yaml | 58 +++++++++++++++++++ ...bbub-380fec032d7d63f91e53bba15b6960ee.yaml | 58 +++++++++++++++++++ ...arts-04f39942fc16c2a7c2f6145e385c8d07.yaml | 58 +++++++++++++++++++ ...chat-388546e2e07357a0226d8ddb30b48362.yaml | 58 +++++++++++++++++++ ...erce-0c6025826e5726423a84ca94ebcaa441.yaml | 58 +++++++++++++++++++ ...erce-4e655e8637363048266492f0b32a6610.yaml | 58 +++++++++++++++++++ ...dify-851c9539a872462d0d73ba1acd344a0c.yaml | 58 +++++++++++++++++++ ...ress-de2d50a00641894476c3c991e151cbfe.yaml | 58 +++++++++++++++++++ ...sist-0be29b33ea0746b92d956c4f705ae369.yaml | 58 +++++++++++++++++++ ...r-wp-1aa0482b62398dab21c7b36e9908a28d.yaml | 58 +++++++++++++++++++ ...r-wp-a3f1f9f4718f614e268d95c106a320c2.yaml | 58 +++++++++++++++++++ ...r-wp-eb00e90873e8ae18941584253499c1dd.yaml | 58 +++++++++++++++++++ ...r-wp-fe4487fc151c051d39c023720ae70292.yaml | 58 +++++++++++++++++++ ...ndom-fab925188af5751f6804af30f809b504.yaml | 58 +++++++++++++++++++ ...card-5e2dbe8495edd1ca09ac4612c6d74e51.yaml | 58 +++++++++++++++++++ ...card-94984c10367f1fcd785a8a0e382575e0.yaml | 58 +++++++++++++++++++ ...card-a7098d4414a3fb82cc8c3dc220f2fa3d.yaml | 58 +++++++++++++++++++ ...card-c229c4974b89d25a5147c1603f3793b5.yaml | 58 +++++++++++++++++++ ...card-d7741f047915382e7e65e25c2ecaf00c.yaml | 58 +++++++++++++++++++ ...nd-a-8f0eb841fe57a3d4a24e95c0d9fd6f34.yaml | 58 +++++++++++++++++++ ...ager-f5f5e3a5ee363b242df2c9cf1503d06e.yaml | 58 +++++++++++++++++++ ...rder-fbe56fde0056bf97342eed3fc2b3be5e.yaml | 58 +++++++++++++++++++ ...ards-70d2ed5770a2a31bdff6c60df8512383.yaml | 58 +++++++++++++++++++ ...ards-e6cabe992a07b751187d2c7299c53fb6.yaml | 58 +++++++++++++++++++ ...free-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...yman-72e98d054dd35c38c2ccedc1b3e556e3.yaml | 58 +++++++++++++++++++ ...yman-9b3e1e16f60897007a08c1914eadf98c.yaml | 58 +++++++++++++++++++ ...ntor-236ec29d3a581237ffdca9038176da82.yaml | 58 +++++++++++++++++++ ...ntor-5f28fbeb41c87c1968016458f52b73af.yaml | 58 +++++++++++++++++++ ...ntor-d88df7a254a138ad74fa62f540e9ec2c.yaml | 58 +++++++++++++++++++ ...ntor-fc19ca606bef9f853ea0565c4043c5ce.yaml | 58 +++++++++++++++++++ ...ader-de57d40696cbfcd8ffe966c8ed179267.yaml | 58 +++++++++++++++++++ ...dons-204d25ca766e5be5a84be69d8f92acaa.yaml | 58 +++++++++++++++++++ ...dget-24af70f4d05b151741440482fab416b5.yaml | 58 +++++++++++++++++++ ...feed-24af70f4d05b151741440482fab416b5.yaml | 58 +++++++++++++++++++ ...oser-d93a6b7f14b256d2a3a93d0625fdf894.yaml | 58 +++++++++++++++++++ ...-tag-01bea8ce6854ad71bd30075dcae56490.yaml | 58 +++++++++++++++++++ ...ctor-c050d4c8a8366a715e53188fca3792c1.yaml | 58 +++++++++++++++++++ ...ctor-c4d987240409a1f0d12971f957b18465.yaml | 58 +++++++++++++++++++ ...adio-3a52346bbe93c0a607f0387208360f6f.yaml | 58 +++++++++++++++++++ ...late-1a21904a7af165ae2d206e73642b0122.yaml | 58 +++++++++++++++++++ ...late-bc3ead94b2639f49d2a3b634baef9593.yaml | 58 +++++++++++++++++++ ...slug-06390fac0ced660df846425f4aecaf69.yaml | 58 +++++++++++++++++++ ...slug-d48b1b8c0f8a5de4fba0c27ae075681f.yaml | 58 +++++++++++++++++++ ...port-200e4897c4af10260a18bb0d58b656f6.yaml | 58 +++++++++++++++++++ ...port-9583c7a118279761c36edb998dbf641d.yaml | 58 +++++++++++++++++++ ...te-x-73d067013f68a47f6173cf4bf4742fbc.yaml | 58 +++++++++++++++++++ ...te-x-92923e233ad137b6c565b0d9cb5490bf.yaml | 58 +++++++++++++++++++ ...menu-3151cdab51ec74016dc2dec07b8a7882.yaml | 58 +++++++++++++++++++ ...artz-1f86e582a713c3bd4333747ed30a9d68.yaml | 58 +++++++++++++++++++ ...form-88a3fac791c3551827ed85f785e74c8c.yaml | 58 +++++++++++++++++++ ...bely-658353ea5a92a1a477d6b2c5047dc091.yaml | 58 +++++++++++++++++++ ...bely-6f075010900e43673686fc0d208260ff.yaml | 58 +++++++++++++++++++ ...bely-ac09455e90923727a5127092ab5cf052.yaml | 58 +++++++++++++++++++ ...bely-fea58c2fffc9b2ea6b58c47efd69a713.yaml | 58 +++++++++++++++++++ ...chat-1b8adc4375e4968834c6e9a5908156bc.yaml | 58 +++++++++++++++++++ ...chat-f3d365dcf43ab1e2b6ca241869ef39d2.yaml | 58 +++++++++++++++++++ ...gler-67a6c3615087f3f1fcb723b7f2d140b4.yaml | 58 +++++++++++++++++++ ...wall-9ee0bf881f08cd3cb60239af7879852d.yaml | 58 +++++++++++++++++++ ...ense-910562f88b7ea3f43ef082aba4fd2945.yaml | 58 +++++++++++++++++++ ...tore-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tton-5e36e98c6255c04628e65e3d6f66d61f.yaml | 58 +++++++++++++++++++ ...chat-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml | 58 +++++++++++++++++++ ...chat-8cc73df94f56aa782250ddecf7e67823.yaml | 58 +++++++++++++++++++ ...chat-abc60569ec003973ef7bd7139d6a27ba.yaml | 58 +++++++++++++++++++ ...form-62b74eeb9a66bc4a3cf51fa299ef8a9e.yaml | 58 +++++++++++++++++++ ...form-b466bd977f9394a49d2724fac1d5dea0.yaml | 58 +++++++++++++++++++ ...form-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...form-ce6b524d26d0001f570c1800dff1d295.yaml | 58 +++++++++++++++++++ ...form-f442fd7af4f1450884ccd37204471581.yaml | 58 +++++++++++++++++++ ...link-4d297c80a42418395b04392e5878bdbd.yaml | 58 +++++++++++++++++++ ...ager-54c83422727dbe8ec911e59f2a60998f.yaml | 58 +++++++++++++++++++ ...ager-62435dbb476a65fcd06c2741817e8fae.yaml | 58 +++++++++++++++++++ ...ager-8d27ee0724391ce9a1b74bd9a604ecbc.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-cb184c0a5bf632bde9de97505ce638ee.yaml | 58 +++++++++++++++++++ ...ager-d0fba4b305c548a881378b07e2028d26.yaml | 58 +++++++++++++++++++ ...ages-5decd5b15e9e99b50c1cb7b49d2f0314.yaml | 58 +++++++++++++++++++ ...ider-38cb5c8ab728ac8718e42eee958aba2f.yaml | 58 +++++++++++++++++++ ...ider-c0866523c68fe7ee32f439546ea1ce87.yaml | 58 +++++++++++++++++++ ...erce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ugin-2b5c6ad57482cc18f3496406a2a98d3b.yaml | 58 +++++++++++++++++++ ...ugin-5475b95f6d45498a4d0880aced5c1162.yaml | 58 +++++++++++++++++++ ...ugin-9f2f326dd2b99a9ab7152b99b148e34c.yaml | 58 +++++++++++++++++++ ...ents-ac00155c6073a79243073e436990a17b.yaml | 58 +++++++++++++++++++ ...ents-ae8fa78ab666a9d6da1d3e3cf8461322.yaml | 58 +++++++++++++++++++ ...ents-b05b3a24d162881cbb5011a114d7958e.yaml | 58 +++++++++++++++++++ ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ents-be3c32e9604f247b7cd8b895cd2961c3.yaml | 58 +++++++++++++++++++ ...ents-c39c9d651b411fa109fee2b8c3a1d9b8.yaml | 58 +++++++++++++++++++ ...ents-e5b4920cbbb8f5f8f7e1a259b30101c9.yaml | 58 +++++++++++++++++++ ...dget-ab4d33853504febd7c01f9cee8c9c3d2.yaml | 58 +++++++++++++++++++ ...menu-380da9e03ed91b4a26ee23da1fdb68e1.yaml | 58 +++++++++++++++++++ ...menu-608358cb0a02728075caac1560a96687.yaml | 58 +++++++++++++++++++ ...menu-afdcbe4c6f5ebc0939cff7424649942e.yaml | 58 +++++++++++++++++++ ...menu-be53691c287fd0615412e7fc76d56676.yaml | 58 +++++++++++++++++++ ...menu-f4c35f9c74d06655cf517936ec3bc387.yaml | 58 +++++++++++++++++++ ...ions-471137e11c9f1e10b7cb270b58e41353.yaml | 58 +++++++++++++++++++ ...ions-bcb8383c6f8589761d6cb6fb2a6e00e4.yaml | 58 +++++++++++++++++++ ...ribe-acd84f5e4cde82a402d1c05f1e4adf06.yaml | 58 +++++++++++++++++++ ...erce-66d0aaa8dc75cc7c0b323f4705b3d63d.yaml | 58 +++++++++++++++++++ ...lter-2088a48130abc94abb1d3c3504ebe491.yaml | 58 +++++++++++++++++++ ...lter-bf3863997447d609f7f8dc8d30e7d4d2.yaml | 58 +++++++++++++++++++ ...wish-16e0560ff9c94eb90a6a00b414476508.yaml | 58 +++++++++++++++++++ ...orms-b2aa6adf9a3ecfeb3a1e73b7feaface1.yaml | 58 +++++++++++++++++++ ...orms-e52f401dadeba42db0e156f089227a37.yaml | 58 +++++++++++++++++++ ...pert-389af6c33829297aca423fb16f20d755.yaml | 58 +++++++++++++++++++ ...aker-35ccb571fab7efd2bc565db8cbe0afc7.yaml | 58 +++++++++++++++++++ ...aker-64b00495d7288bbf7260545472f9a87a.yaml | 58 +++++++++++++++++++ ...aker-8a965e61f7a81d40e758e9b24cfff6a0.yaml | 58 +++++++++++++++++++ ...aker-933559cdad5a8cb46fa09f456890e810.yaml | 58 +++++++++++++++++++ ...aker-a72cf1044ce793e721c265e19c02178a.yaml | 58 +++++++++++++++++++ ...aker-bd82d97465f017d9a9f8d8b408f50f76.yaml | 58 +++++++++++++++++++ ...aker-dd16f95f6d8f39d62500d48f9193456c.yaml | 58 +++++++++++++++++++ ...aker-ddce93e1ec5dbf71b7783f859c8be22b.yaml | 58 +++++++++++++++++++ ...aker-e8c4ecddb52fde1de74da4b2c7a57560.yaml | 58 +++++++++++++++++++ ...next-070ef3fbf8c5c19235dc610987639500.yaml | 58 +++++++++++++++++++ ...next-0ab1239b54a9d197b2df31bb69f5b07b.yaml | 58 +++++++++++++++++++ ...next-1bd2c64c3515a166f1356799c13010c5.yaml | 58 +++++++++++++++++++ ...next-1cb4591e0480a2550d32c48672d101ca.yaml | 58 +++++++++++++++++++ ...next-1f3365288c8ad41d2a38dadca302de5e.yaml | 58 +++++++++++++++++++ ...next-20fec9c706022c27227f812437225b4b.yaml | 58 +++++++++++++++++++ ...next-3b324ee7499600905ccc907887c4cb07.yaml | 58 +++++++++++++++++++ ...next-4023135654a032018b1b7ca568ed38d7.yaml | 58 +++++++++++++++++++ ...next-4221c767cd86a7aece637717d70dec97.yaml | 58 +++++++++++++++++++ ...next-5c16a4a40c0341b380c1079e60c3c420.yaml | 58 +++++++++++++++++++ ...next-63d1e14f304a4cf01bbcbf655abc19a8.yaml | 58 +++++++++++++++++++ ...next-658febabd8f8ee9b00c71e69efcbac2c.yaml | 58 +++++++++++++++++++ ...next-6943a5c5894e8c0c6d2e210f5f6691a1.yaml | 58 +++++++++++++++++++ ...next-6a6885b887da3fa682a8e96453ce2b11.yaml | 58 +++++++++++++++++++ ...next-75f2f8257d6545a80c97f57f791fb7a9.yaml | 58 +++++++++++++++++++ ...next-899f848126483b240dc44a4870e7bfef.yaml | 58 +++++++++++++++++++ ...next-91489b941b180b4987354a4aee0df6e3.yaml | 58 +++++++++++++++++++ ...next-92d3a763fd6bf9ed5605e7e613d361f0.yaml | 58 +++++++++++++++++++ ...next-9fbb2aba0f1c281c62bcad50b683f582.yaml | 58 +++++++++++++++++++ ...next-a50b1df259c1e694ecfebb517ea01b13.yaml | 58 +++++++++++++++++++ ...next-acd3eef162930a0876122d4b56734acd.yaml | 58 +++++++++++++++++++ ...next-b13bd75954a4a1908d54b2904726ac6a.yaml | 58 +++++++++++++++++++ ...next-be8ed34a1e61e6308ab867606f425e64.yaml | 58 +++++++++++++++++++ ...next-bf605754a0547b06a6170015aaa9595a.yaml | 58 +++++++++++++++++++ ...next-cbf15a410baf5df5c6e73ec81eccde3a.yaml | 58 +++++++++++++++++++ ...next-ce3f05ae5116fef07efba37ae58297b9.yaml | 58 +++++++++++++++++++ ...next-ce53aada13325acb27d477b230e028dd.yaml | 58 +++++++++++++++++++ ...next-d01c7b873aec80a58b54be7a8d535664.yaml | 58 +++++++++++++++++++ ...next-d42a5f37bc2973237f5bd33bf937988e.yaml | 58 +++++++++++++++++++ ...next-d44f53d903df9cab8928396a4ae4768d.yaml | 58 +++++++++++++++++++ ...next-d5c9a981371783e864a000bed9ff14a0.yaml | 58 +++++++++++++++++++ ...next-d78c11170c73128e3967572f8231c5a5.yaml | 58 +++++++++++++++++++ ...next-d813a33aa115d1d1e87017777577752a.yaml | 58 +++++++++++++++++++ ...next-e1a43bd038bea91c9d042110dd2e93ec.yaml | 58 +++++++++++++++++++ ...next-eacb603a076c52a6fb91269497cf41a5.yaml | 58 +++++++++++++++++++ ...next-ebcb1014c323d7367182014f59409f1c.yaml | 58 +++++++++++++++++++ ...next-ecadda5bda84d8a0b69e1131abec5fcf.yaml | 58 +++++++++++++++++++ ...next-f2fa5aa94720ea308820bf6a59c12304.yaml | 58 +++++++++++++++++++ ...next-f7f576e6c366fb73cfae249a8888bb15.yaml | 58 +++++++++++++++++++ ...next-fa56dcf05a0758bb5d6c8d1d87961bf1.yaml | 58 +++++++++++++++++++ ...next-fc2afeaf55a2da67ef007ba91890a8f5.yaml | 58 +++++++++++++++++++ ...next-fddce4b8eb2e7caabf78ce5b75bb4ed4.yaml | 58 +++++++++++++++++++ ...lite-8979f6505c90c68150042fb786bf639e.yaml | 58 +++++++++++++++++++ ...lord-05b1f0bb86ade4c6c32252e799c74986.yaml | 58 +++++++++++++++++++ ...lord-aa821804338bfa52c597bf95613d3cbf.yaml | 58 +++++++++++++++++++ ...atic-6435ac4f9788a7cece5b6014e8487e16.yaml | 58 +++++++++++++++++++ ...tips-105cf32b00a014867c600a479b6d44a5.yaml | 58 +++++++++++++++++++ ...tips-f790a2eb76a9891e0156538f1e3bc9cf.yaml | 58 +++++++++++++++++++ ...tion-498d9280bb627df5ee0fc3435bab6bb8.yaml | 58 +++++++++++++++++++ ...tion-62f03cd88708d633c3bea1020189b887.yaml | 58 +++++++++++++++++++ ...erce-24df3873e0b9065e19944f2b69074a09.yaml | 58 +++++++++++++++++++ ...erce-3948e5dd3b8cda882c6a23ce86fccec7.yaml | 58 +++++++++++++++++++ ...lama-88df46a6830158391aaf7619c151706b.yaml | 58 +++++++++++++++++++ ...nner-63e5f2960a8b5c3108f981b93e6323c6.yaml | 58 +++++++++++++++++++ ...nner-f4e8b028120d672af95b84876878fcae.yaml | 58 +++++++++++++++++++ ...ards-1ee20142f7aad0f4393d7540b9bd0fb9.yaml | 58 +++++++++++++++++++ ...ards-28d16d6b1cef547447e4d705dcc2a1cb.yaml | 58 +++++++++++++++++++ ...code-1954398156051d3ad0f2e33b45b08e3a.yaml | 58 +++++++++++++++++++ ...code-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ader-9593057fd73362b3675fc833e6f4bac6.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mies-5f709cb3f787aa3d6fe0c1b9fbcebecf.yaml | 58 +++++++++++++++++++ ...orge-5344d2a9421d4134e013b9ef9543b210.yaml | 58 +++++++++++++++++++ ...ayer-0f0d0d2c6b89a442a33118c19c04ca9f.yaml | 58 +++++++++++++++++++ ...ayer-74ed56a742e6bfe4ae7f688057f0e58c.yaml | 58 +++++++++++++++++++ ...ayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ayer-ced2048e66568ff23a7c9306db5ed20b.yaml | 58 +++++++++++++++++++ ...ayer-fa19810ebcf6bda0fe16609b0188a9da.yaml | 58 +++++++++++++++++++ ...tion-7d1f832265699144424e86f453859317.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-f928630a44e376a8556ef8a85dd515fa.yaml | 58 +++++++++++++++++++ ...lery-49732b61e5fbbf5b8a051a31af421fcc.yaml | 58 +++++++++++++++++++ ...ress-0d992e0c4b2262e08e00bc7728421227.yaml | 58 +++++++++++++++++++ ...ress-0df72c1ea599347d49ac94e58a15317d.yaml | 58 +++++++++++++++++++ ...ress-1a4de07092fc301c92fce8ed74ad446d.yaml | 58 +++++++++++++++++++ ...ress-f756689d49883a94fc2d2b5fe92fc364.yaml | 58 +++++++++++++++++++ ...nner-6cbcd9de8a0bffdfb0e1ab93c491bf62.yaml | 58 +++++++++++++++++++ ...nner-c1af03a9bc6d8f06f284071a1218ac5b.yaml | 58 +++++++++++++++++++ ...zoom-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...erce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...mize-2c6114a75a15d3b058a7dc1004291c25.yaml | 58 +++++++++++++++++++ ...text-1fdf26dc57df471e3029b947067853d6.yaml | 58 +++++++++++++++++++ ...bear-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cart-8ca33f13028f0931d0d1467c7211048d.yaml | 58 +++++++++++++++++++ ...cart-956705464f8d3e3f33f8d0fbd34de8bb.yaml | 58 +++++++++++++++++++ ...port-7625842be5b20a912d85c30fab35389d.yaml | 58 +++++++++++++++++++ ...post-0a011d3a5ee0fe8850f5ad8de7716ef3.yaml | 58 +++++++++++++++++++ ...post-785e036f5ce45cab570c638ad313ef67.yaml | 58 +++++++++++++++++++ ...post-980522b8038ad0463392a24edde56a31.yaml | 58 +++++++++++++++++++ ...post-bc63c69c92e0f2828459114bbefab4b4.yaml | 58 +++++++++++++++++++ ...post-c9a71c8c5b02e60eb52f4d4cd3d0c571.yaml | 58 +++++++++++++++++++ ...post-cd934d4abb39f62a28c7ae7b5501f68f.yaml | 58 +++++++++++++++++++ ...view-b6d9dd2af7efaf91b36ca5f14358b6f3.yaml | 58 +++++++++++++++++++ ...-bws-64aea5cedd920a29c29c6656f64c0089.yaml | 58 +++++++++++++++++++ ...-bws-ac572eddea26c37b87d8b8b50f635cf6.yaml | 58 +++++++++++++++++++ ...dget-37317046e94cf4102e2b78af213fc732.yaml | 58 +++++++++++++++++++ ...dget-4f6bcd63e0061408e2503cd933be694d.yaml | 58 +++++++++++++++++++ ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...page-fbf39c35d747104c4d4297ab90803845.yaml | 58 +++++++++++++++++++ ...n4wp-36b86201be553488a21224994bdfe4a7.yaml | 58 +++++++++++++++++++ ...n4wp-942951937c68cc5db7a5bc776617ab05.yaml | 58 +++++++++++++++++++ ...grid-5c28550696f855f4c3c836e5bcf2c491.yaml | 58 +++++++++++++++++++ ...inks-1b62450f818e2ba095ee733915545ce8.yaml | 58 +++++++++++++++++++ ...lery-404f62898fe72968016d5c9a6f1d92d8.yaml | 58 +++++++++++++++++++ ...fier-3cba8118600a736749afebf101985b5d.yaml | 58 +++++++++++++++++++ ...ator-bd5ef70cad456cfb810c3a196f6a2a81.yaml | 58 +++++++++++++++++++ ...cher-c4ba01e059d197a2a3abc453d782dcf8.yaml | 58 +++++++++++++++++++ ...form-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...bcam-ecc9ca2eedeba9a7eb9cef5703953450.yaml | 58 +++++++++++++++++++ ...tood-913904da9b37e5de5dab8db2c48cdd1a.yaml | 58 +++++++++++++++++++ ...tood-9859097987f0e7ca79e11ace81cfa3fa.yaml | 58 +++++++++++++++++++ ...tood-b32bcea1f07567d61bc53250e86795f7.yaml | 58 +++++++++++++++++++ ...more-353927ae64af5c6eafc196b5f94afe9a.yaml | 58 +++++++++++++++++++ ...link-8911ed0627c35d1ed98759cc71c063ca.yaml | 58 +++++++++++++++++++ ...link-fb56c017c2ceb4ddc8f04cf045c71346.yaml | 58 +++++++++++++++++++ ...resh-66aaa6f41f27e2a7e948bc3c3424d334.yaml | 58 +++++++++++++++++++ ...line-49f7af60a7d6ca8e6785ad7873768f2a.yaml | 58 +++++++++++++++++++ ...line-c19240e29be09298009c0e0215eb1f86.yaml | 58 +++++++++++++++++++ ...erce-11774eca9d7255cbce54b4f5c2cb1270.yaml | 58 +++++++++++++++++++ ...nner-c03c24ae2b0b619cef671f24ff29a655.yaml | 58 +++++++++++++++++++ ...nner-cb472ca260be89964a7f7e562d3b7648.yaml | 58 +++++++++++++++++++ ...nner-cd3b33eab1e4a7c6dd00ae8ecc737be3.yaml | 58 +++++++++++++++++++ ...-wpl-df196e267631abea140e582e96b3b0e3.yaml | 58 +++++++++++++++++++ ...-wpl-edeebbc602448470d251a6422f124213.yaml | 58 +++++++++++++++++++ ...ager-715775220a5d0726abf3cb0c44398e2b.yaml | 58 +++++++++++++++++++ ...ager-ce5b36195b53746aaff59fc078e530e9.yaml | 58 +++++++++++++++++++ ...-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...-kit-ba00ab2a2755c54cd7d0683aa28f5913.yaml | 58 +++++++++++++++++++ ...lite-2a7a5a205e77ded07268b829f167efa8.yaml | 58 +++++++++++++++++++ ...lite-426ec193e6b1f2e068f34932123c6dcd.yaml | 58 +++++++++++++++++++ ...lite-458c0d6ab63df27e3e21cbe7fc77cfd2.yaml | 58 +++++++++++++++++++ ...lite-d45b3048f23bdc5676881ea128b4fe4b.yaml | 58 +++++++++++++++++++ ...lace-6a587e71ee083048d4679f04ad4755b0.yaml | 58 +++++++++++++++++++ ...lace-eab47af35bd14f792c9512e4731e4999.yaml | 58 +++++++++++++++++++ ...lace-8704c0e0a0b31ff063e1784b2389347e.yaml | 58 +++++++++++++++++++ ...lace-8de354ee8a09f1e40abb305d774cf1ed.yaml | 58 +++++++++++++++++++ ...iwyg-1b2227bfbc114c60a1d636953ef21b96.yaml | 58 +++++++++++++++++++ ...book-079ec9a97d66af6e700f5d8e97855854.yaml | 58 +++++++++++++++++++ ...book-2c4b560690d4d3a59e350708726945d0.yaml | 58 +++++++++++++++++++ ...book-40245b305fdf9a44e43f9056d7f5ec77.yaml | 58 +++++++++++++++++++ ...book-95ba3629393e6ed9cf82cdffe1354c3f.yaml | 58 +++++++++++++++++++ ...book-a9204f8c11120cb2c33b3f2dfe972d8b.yaml | 58 +++++++++++++++++++ ...book-ec9bb451b23b2be1cff3727d057731cd.yaml | 58 +++++++++++++++++++ ...lite-8ed0dc233dd88ec7cbdf934305689592.yaml | 58 +++++++++++++++++++ ...edia-d27f815adbf875ce27b19fc701a2c8d1.yaml | 58 +++++++++++++++++++ ...te-7-f30e0a2c040dabe8e3f5e523525b42cc.yaml | 58 +++++++++++++++++++ ...alia-797afe8d10d441ac220fabb0d1962367.yaml | 58 +++++++++++++++++++ ...alia-be08bf68983d62c13cc53ac7ac785641.yaml | 58 +++++++++++++++++++ ...alia-ddde16de87a667ba158100a63c4bffd9.yaml | 58 +++++++++++++++++++ ...tons-37e5e3d24dd11a2139d9abb17ffd385f.yaml | 58 +++++++++++++++++++ ...ideo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-814d6c2e2d8cde0de9aa6bd07e3615ce.yaml | 58 +++++++++++++++++++ ...post-6d6c428d36c4156820a311ffe1d5b698.yaml | 58 +++++++++++++++++++ ...-ssl-a2af19cf083e10d02f6ef64bbfb896ec.yaml | 58 +++++++++++++++++++ ...alty-59680ca703e54b65bb1444ccb4c65653.yaml | 58 +++++++++++++++++++ ...tion-3eb72b31a7a3f042d44188428aa0f9df.yaml | 58 +++++++++++++++++++ ...maze-8a160378fcef72b726e178d76f962841.yaml | 58 +++++++++++++++++++ ...ucts-b1810213664dbc480df9bda4d5950322.yaml | 58 +++++++++++++++++++ ...ucts-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml | 58 +++++++++++++++++++ ...ucts-f904152cc56225725583f8016fc8d925.yaml | 58 +++++++++++++++++++ ...-all-13830cbd72a32fb533758edb07ec60b9.yaml | 58 +++++++++++++++++++ ...iews-7675af1bd6eb113efdfef786b75aea68.yaml | 58 +++++++++++++++++++ ...kups-99c982940e78c45e6e770604c5c36b5e.yaml | 58 +++++++++++++++++++ ...ider-4cc443b42c40fb382275f264fe03f5d8.yaml | 58 +++++++++++++++++++ ...ider-e355011ae0213a93a83d03d9e7e91d4c.yaml | 58 +++++++++++++++++++ ...nded-77dbf9da4687af62eb092f0a4f8fc78c.yaml | 58 +++++++++++++++++++ ...ntly-623ee8a736cc9ca7598f1fcb6de572f9.yaml | 58 +++++++++++++++++++ ...ntly-8309716d7ccc4397ca213e945a98f0a4.yaml | 58 +++++++++++++++++++ ...ucts-3efeefb310fc267db6d3c82c2278b44a.yaml | 58 +++++++++++++++++++ ...ucts-270d399794c014b613fbaaf0f85e4480.yaml | 58 +++++++++++++++++++ ...zoom-6fb42790ec406c67546f572fbaa70d56.yaml | 58 +++++++++++++++++++ ...zoom-9e09c516a2b7ded06b65b8f77bf8db84.yaml | 58 +++++++++++++++++++ ...iter-f1d9f474bbf4576d12894725bd74f389.yaml | 58 +++++++++++++++++++ ...iply-2c837883e1f56cbaae8104fe350db484.yaml | 58 +++++++++++++++++++ ...iend-acf04354988365754f4760bff4f381fb.yaml | 58 +++++++++++++++++++ ...-edd-2d450de1fce5683a098921397bf9fd03.yaml | 58 +++++++++++++++++++ ...urwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-0efa8cbd8c22916066d2b5e7e99436b6.yaml | 58 +++++++++++++++++++ ...tion-1c7545a8e1d8674632497b398a1210a7.yaml | 58 +++++++++++++++++++ ...tion-1c7d356f69acd16bb266c8cb14441fbb.yaml | 58 +++++++++++++++++++ ...tion-3b4de27e05fc461ccdbc713207442ee6.yaml | 58 +++++++++++++++++++ ...tion-804968d490234b5a152e19bbec2ea599.yaml | 58 +++++++++++++++++++ ...page-20764e34dd96746ac27cacdf816c512f.yaml | 58 +++++++++++++++++++ ...page-9e45d93bc20aa1ba4a07ca72cfe37e3f.yaml | 58 +++++++++++++++++++ ...rent-bc6654f724ab34dab168398ec4971081.yaml | 58 +++++++++++++++++++ ...ogin-47522a4a3dc3a65ace6791fdc8ad2676.yaml | 58 +++++++++++++++++++ ...okie-4b2ca7d4c265994cb8dc0a8ab8e5c412.yaml | 58 +++++++++++++++++++ ...tion-00ed26bc99082a5e2bf7869b142812b5.yaml | 58 +++++++++++++++++++ ...tion-08ab49e654c5fb6f0db2079823b53c43.yaml | 58 +++++++++++++++++++ ...tion-1217e0d32488feda5672b5f2f6f6be10.yaml | 58 +++++++++++++++++++ ...tion-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...tion-28a102683d2de6c72760dd7d0e2159c9.yaml | 58 +++++++++++++++++++ ...tion-3d292d211ef84b695362922dc8bdf57d.yaml | 58 +++++++++++++++++++ ...tion-5f79866291aaa54e9869bd9b8bbe5231.yaml | 58 +++++++++++++++++++ ...tion-60528de5f76e38fabee103931a1b735a.yaml | 58 +++++++++++++++++++ ...tion-6321b133726d239355f81b9be99d916b.yaml | 58 +++++++++++++++++++ ...tion-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...tion-830a9c71ac432305903c3e193057a4cc.yaml | 58 +++++++++++++++++++ ...tion-8392879a309371134897c994ca4719c8.yaml | 58 +++++++++++++++++++ ...tion-8f253566c415a0f14e8b52adda279855.yaml | 58 +++++++++++++++++++ ...tion-97d82c7c3e0d924cc99e2436cf7939dd.yaml | 58 +++++++++++++++++++ ...tion-a25c46576285e4b046d7eb2e59073172.yaml | 58 +++++++++++++++++++ ...tion-a8b98bbbec0875de2bde4d3647cd15e1.yaml | 58 +++++++++++++++++++ ...tion-aa77b46ba67be3115863377f556c5a4e.yaml | 58 +++++++++++++++++++ ...tion-b50c18f00398146fa63407abab98b643.yaml | 58 +++++++++++++++++++ ...tion-b61ef24ab5fc8a9d1e6c1708a630e28a.yaml | 58 +++++++++++++++++++ ...tion-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...tion-cccbe637c2ca5b40eb7fbe65c1b79317.yaml | 58 +++++++++++++++++++ ...tion-cd01191c441182857b674a67ee885426.yaml | 58 +++++++++++++++++++ ...tion-d5ca64507af2d41a9a4ef9ba365317c0.yaml | 58 +++++++++++++++++++ ...tion-d6be25b195f3dbb670fc00d8e81691ca.yaml | 58 +++++++++++++++++++ ...tion-d9b1627f6db7a7b3f667f9603a20aaf3.yaml | 58 +++++++++++++++++++ ...tion-e6c58ad2d5bc21fe6d61a4ea411b1552.yaml | 58 +++++++++++++++++++ ...tion-ea95cfe33e5fa5b39484db3e52e2b47c.yaml | 58 +++++++++++++++++++ ...tion-f87ba6cab449c45a93f64218906b54cf.yaml | 58 +++++++++++++++++++ ...tion-fc35edd680a0ec79497d3d82a4143e86.yaml | 58 +++++++++++++++++++ ...tion-fdcd8dc7df27cc5b5172ef52e914706c.yaml | 58 +++++++++++++++++++ ...tion-660c79b80e87c9453730e77d4013c8f0.yaml | 58 +++++++++++++++++++ ...tion-85fb58f3784e72234e673d2c8f294c3c.yaml | 58 +++++++++++++++++++ ...tion-a476ca04014656ec0e898375af56f461.yaml | 58 +++++++++++++++++++ ...tion-c050cce5edc786cc76c2f3dcee80f148.yaml | 58 +++++++++++++++++++ ...tion-cb361e2e4a8f09fdba16ef55d82e4742.yaml | 58 +++++++++++++++++++ ...page-8319ea5020d449067d1800ef0c846413.yaml | 58 +++++++++++++++++++ ...ects-05abcb4b1243c795ddc0ecd996fc16e3.yaml | 58 +++++++++++++++++++ ...ects-b6235d62fa0b8b99245758e77840a37a.yaml | 58 +++++++++++++++++++ ...work-97e559b0ee0d8f7ed9a23afb1d3a5dfd.yaml | 58 +++++++++++++++++++ ...work-a1baf40622208b1f64155c8e91066f50.yaml | 58 +++++++++++++++++++ ...work-d3c0e78a7ab3eab8df864917b272700d.yaml | 58 +++++++++++++++++++ ...work-fd34b68ddff550331d533d0325717761.yaml | 58 +++++++++++++++++++ ...r-wp-80e870552d1f61c00ccba36553924e99.yaml | 58 +++++++++++++++++++ ...ctor-7360b269548987558385c14071463af9.yaml | 58 +++++++++++++++++++ ...lery-0b9a8fd5b9580f066dc53b6f1500e016.yaml | 58 +++++++++++++++++++ ...lery-2a835a9354c731a6c02faf265cb4e924.yaml | 58 +++++++++++++++++++ ...lery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...lery-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml | 58 +++++++++++++++++++ ...inks-41b1f3d72a4299f7246fbd213ebf002e.yaml | 58 +++++++++++++++++++ ...site-98561600a0a03a1e4059046cfde3ef9d.yaml | 58 +++++++++++++++++++ ...plus-b96c1d6a7bd0352b636fe37d13da471d.yaml | 58 +++++++++++++++++++ ...plus-d04743501a9b489b050663d074da392e.yaml | 58 +++++++++++++++++++ ...edux-f168af3ebc1cfea437c8aae66664ebce.yaml | 58 +++++++++++++++++++ ...ndar-6258eabd3d155e4cfa6307428f5a26a2.yaml | 58 +++++++++++++++++++ ...ndar-ea140c5960098a8a84aefd6da22f5e70.yaml | 58 +++++++++++++++++++ ...ndar-f0fbd94801917d7779c8532e6d8fde24.yaml | 58 +++++++++++++++++++ ...pack-6c7076324759f17d9672657f46020f5a.yaml | 58 +++++++++++++++++++ ...work-5f2b7d6e36647de882c9475f5d8d8b2a.yaml | 58 +++++++++++++++++++ ...post-a1b975d388fb5bea73a488037353b7d6.yaml | 58 +++++++++++++++++++ ...osts-04095bed8429464e27d2a70bb8ef316a.yaml | 58 +++++++++++++++++++ ...osts-8bd8a9f5ca37f9921800c559c58dbf6b.yaml | 58 +++++++++++++++++++ ...anta-58ad613c40728469546ff0c459432f85.yaml | 58 +++++++++++++++++++ ...r-wp-09949db09aaf30fc4de378c2b0344be7.yaml | 58 +++++++++++++++++++ ...r-wp-34814d2dfa1715ce58f0048a1692ce5e.yaml | 58 +++++++++++++++++++ ...r-wp-38bcc8fc23f5e64dd2298c12f27f47b2.yaml | 58 +++++++++++++++++++ ...r-wp-3d9e0203f0bc8c54067f868dba02e8ff.yaml | 58 +++++++++++++++++++ ...r-wp-83b73a058cb79d602447680b268132d1.yaml | 58 +++++++++++++++++++ ...r-wp-f1c3515bad659cca0bfecb6aedd6af21.yaml | 58 +++++++++++++++++++ ...ites-089422f3c866882a628baf83e48ef51c.yaml | 58 +++++++++++++++++++ ...deos-d32864ffc345a5bdea6ab7e2b3b9981b.yaml | 58 +++++++++++++++++++ ...nssi-13c50b13a503600e0189283b0a2ceddd.yaml | 58 +++++++++++++++++++ ...nssi-2c5ab69854e1511d339bef7563a27b08.yaml | 58 +++++++++++++++++++ ...nssi-2df9887091a9e43477c93a8f95a59867.yaml | 58 +++++++++++++++++++ ...nssi-459e9e8ff0ce6dbbd756036aacf40336.yaml | 58 +++++++++++++++++++ ...nssi-54a6c2fc6f1decd20e0ec9cd229454ec.yaml | 58 +++++++++++++++++++ ...nssi-88fcfbe0235fbfcf5894d075044bc4db.yaml | 58 +++++++++++++++++++ ...nssi-9456cea40ce6ea28f05bb2ff20b05594.yaml | 58 +++++++++++++++++++ ...nssi-984a23521e50b74e0baafc6841353e19.yaml | 58 +++++++++++++++++++ ...nssi-acdf52a1422628d1552415a9b0199eee.yaml | 58 +++++++++++++++++++ ...nssi-b595d6fc7446c3f09ff44c55f79ffecc.yaml | 58 +++++++++++++++++++ ...nssi-d45998919544e36fcefce47f272dd36e.yaml | 58 +++++++++++++++++++ ...mium-2c5ab69854e1511d339bef7563a27b08.yaml | 58 +++++++++++++++++++ ...mium-3770a5a68072ae899f0f18af895e3c7e.yaml | 58 +++++++++++++++++++ ...mium-54a6c2fc6f1decd20e0ec9cd229454ec.yaml | 58 +++++++++++++++++++ ...mium-9456cea40ce6ea28f05bb2ff20b05594.yaml | 58 +++++++++++++++++++ ...mium-98c7cb2a9ca321e390f21a13c7f9a775.yaml | 58 +++++++++++++++++++ ...mium-b595d6fc7446c3f09ff44c55f79ffecc.yaml | 58 +++++++++++++++++++ ...mium-d45998919544e36fcefce47f272dd36e.yaml | 58 +++++++++++++++++++ ...vant-b86717449a9c418a47f519067cc5b57f.yaml | 58 +++++++++++++++++++ ...vant-c81d2be092773595df7e11c3e43455e6.yaml | 58 +++++++++++++++++++ ...load-f2e5b32595ebb4e1010770520fb235a0.yaml | 58 +++++++++++++++++++ ...code-894688b32a41816c9ef521e84f097274.yaml | 58 +++++++++++++++++++ ...load-fc6507793e849585ffa987ba2f9e1c71.yaml | 58 +++++++++++++++++++ ...erce-7470db0dc31ae4a970e3b604671601cb.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...base-47c8baaa723b461feba125f5d75cdf5b.yaml | 58 +++++++++++++++++++ ...osts-f208b8c044d71b8d44e9868aaf03997a.yaml | 58 +++++++++++++++++++ ...edit-012dc707b39ddca593987305dcc50476.yaml | 58 +++++++++++++++++++ ...edit-028fc092b08e0b0008553cd7b4eaeaf7.yaml | 58 +++++++++++++++++++ ...edit-3996e754fae7512574e32b3cc63b1ef7.yaml | 58 +++++++++++++++++++ ...inks-ad02b35bda70a416277656d231f43211.yaml | 58 +++++++++++++++++++ ...hema-d7e271a4d692214ae3d3d23271160c51.yaml | 58 +++++++++++++++++++ ...type-a6300420b047adf0811f5afe66cadf12.yaml | 58 +++++++++++++++++++ ...nags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...meta-3511a1c14fe55ddf7548121635409a76.yaml | 58 +++++++++++++++++++ ...iles-024b2767e265d1c0c5a095406c0967d5.yaml | 58 +++++++++++++++++++ ...ogin-0c74520a6b922c051dd2e71bd71dde2f.yaml | 58 +++++++++++++++++++ ...ntre-112337a2e4900da8476bf23196ef2b93.yaml | 58 +++++++++++++++++++ ...ntre-219b72efe5cc6f0e217f743d6fbc88d5.yaml | 58 +++++++++++++++++++ ...ntre-2f8f397bcad4eb939787697b135e157a.yaml | 58 +++++++++++++++++++ ...ntre-3a45dc282f560e731773a059f5e7ca5d.yaml | 58 +++++++++++++++++++ ...ntre-5164636d32af20648741053f5b9caab7.yaml | 58 +++++++++++++++++++ ...ntre-5c0349ca079e747f13053866a0f9f7b4.yaml | 58 +++++++++++++++++++ ...ntre-71100afca944fcdf5852ccd8d5a09657.yaml | 58 +++++++++++++++++++ ...ntre-7116f21024cd4d3ec70934c93595bec9.yaml | 58 +++++++++++++++++++ ...ntre-eb6a95dc8c6a4d6036eb6038576d5022.yaml | 58 +++++++++++++++++++ ...ress-4981ace1c6912438e6aebe6db5797df1.yaml | 58 +++++++++++++++++++ ...word-3a5045c6057ba75552aa877da967cc1d.yaml | 58 +++++++++++++++++++ ...osts-d08d72d9d704360392caeeb3caa1999d.yaml | 58 +++++++++++++++++++ ...uote-9285c0881d2d0d11de4e3b3a24768c84.yaml | 58 +++++++++++++++++++ ...uote-bd1e1a72d84e778ed0728f8ce93d9820.yaml | 58 +++++++++++++++++++ ...uote-d660fb4211ca4d5aa389748791b62abb.yaml | 58 +++++++++++++++++++ ...uote-e78bafbef882a9c48928d514c06bbb3b.yaml | 58 +++++++++++++++++++ ...uote-f9f6ff6ab82acd24abf9e4da4d050784.yaml | 58 +++++++++++++++++++ ...-tag-0d603e3edf902251fc832f3e8e30e339.yaml | 58 +++++++++++++++++++ ...mies-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sads-33b6f66391ce62eb7e838b36fc2b4558.yaml | 58 +++++++++++++++++++ ...odes-dd783793d1579786f0da18d50db26b6a.yaml | 58 +++++++++++++++++++ ...mail-9ad1bb5942489f3a5ae6b0ae145bf51a.yaml | 58 +++++++++++++++++++ ...ermy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...dget-33be367e25256f8164e300b3a7daf9ad.yaml | 58 +++++++++++++++++++ ...dget-f157822d9e859b87e8f345e48a1d0719.yaml | 58 +++++++++++++++++++ ...dash-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-ara-9bd64c494589e276c977a9c82f664000.yaml | 58 +++++++++++++++++++ ...plus-a6af184da39fc0e8d8ed033eba477325.yaml | 58 +++++++++++++++++++ ...load-7d8fc6eda80cc32678a794e07adb8263.yaml | 58 +++++++++++++++++++ ...izer-0292116775ef708600542a7e8f86fd65.yaml | 58 +++++++++++++++++++ ...izer-69e740cf6c8c1abbdc55bae92d3a061a.yaml | 58 +++++++++++++++++++ ...izer-e43bc5511341599f04f729dc760bab86.yaml | 58 +++++++++++++++++++ ...-ons-324f681dcc32f9cad80599a822ed178a.yaml | 58 +++++++++++++++++++ ...-ons-c4bc19656917f2d34b4812810b207db1.yaml | 58 +++++++++++++++++++ ...-ons-e6d62601d9fb0272cdf0ccd211481dcd.yaml | 58 +++++++++++++++++++ ...ider-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...gets-21056c551dd1aeb9a76645f88361467f.yaml | 58 +++++++++++++++++++ ...gets-28559d7c492fb8129804be5b16de6e2e.yaml | 58 +++++++++++++++++++ ...soon-0362bdcef3a6a0f78140270dfd8f3247.yaml | 58 +++++++++++++++++++ ...soon-5f71a5cbd6bba8194eb0fd13e3daceef.yaml | 58 +++++++++++++++++++ ...soon-d0a9eb1395b2d7adc32f3db9fd1a5b08.yaml | 58 +++++++++++++++++++ ...page-2fca652bdc1152658ff99e932f826e15.yaml | 58 +++++++++++++++++++ ...page-3e7642452405a4b08d52483d238d4dd9.yaml | 58 +++++++++++++++++++ ...page-3f9a61f980dbe211de3420fd4e108af4.yaml | 58 +++++++++++++++++++ ...page-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml | 58 +++++++++++++++++++ ...page-6e94975f5a72379b4c113015c234f26e.yaml | 58 +++++++++++++++++++ ...page-90c5798f111069225c0a9b9bba314556.yaml | 58 +++++++++++++++++++ ...page-9a185bb7031cc9ee6aedfd50f633a1fb.yaml | 58 +++++++++++++++++++ ...page-aeeb6c4c51959fc6de4f70bfbf031f53.yaml | 58 +++++++++++++++++++ ...page-c26b1839d934a6c01fe10cd6a0d67c39.yaml | 58 +++++++++++++++++++ ...page-c4c0b94844e7f594c58f973ae84c6505.yaml | 58 +++++++++++++++++++ ...page-ff98de6f26943739c7dc560ade3e2c7d.yaml | 58 +++++++++++++++++++ ...sent-d2ced4606aa87805c35fba9cf8d5be3f.yaml | 58 +++++++++++++++++++ ...itor-f2d03c372af597128c556a16b6de11cf.yaml | 58 +++++++++++++++++++ ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...olio-0f725a315fbc29f28fcbc561372c708a.yaml | 58 +++++++++++++++++++ ...grid-41e0b9bc5daa86f41c29f0c4deb81563.yaml | 58 +++++++++++++++++++ ...grid-460458a06d8d211770e9a31930d7029e.yaml | 58 +++++++++++++++++++ ...grid-a609881cbf31d06f5f3320cc98e71e76.yaml | 58 +++++++++++++++++++ ...ider-2196f2a72b0d78d150ae68d55da0fd92.yaml | 58 +++++++++++++++++++ ...tabs-00eeb6c21c5d722501b60770e277f490.yaml | 58 +++++++++++++++++++ ...tabs-850e736734b165b9f53f31b41b925633.yaml | 58 +++++++++++++++++++ ...tabs-950a4b8c92825a575ac3cedca47edcba.yaml | 58 +++++++++++++++++++ ...tabs-beb8d0299f9b57d02b746cf7959b845d.yaml | 58 +++++++++++++++++++ ...tbox-12fb9fdf8190804b70dbaba2fb2c9085.yaml | 58 +++++++++++++++++++ ...tbox-7b55e5afda1f744808ef7891452f6863.yaml | 58 +++++++++++++++++++ ...tbox-a59e139d7834d1f343a41f6f77f479a9.yaml | 58 +++++++++++++++++++ ...tbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...tbox-d3aee972ef803bd73b594546fe5f08d6.yaml | 58 +++++++++++++++++++ ...box2-85a882f3a47555e7fcebe3d512a6eae9.yaml | 58 +++++++++++++++++++ ...box2-87b6d9e5131d99ef758c739f3a95c342.yaml | 58 +++++++++++++++++++ ...show-8d120ab408475ea52678a65c5972ac37.yaml | 58 +++++++++++++++++++ ...menu-05079d9697e3f59f6cb3b3fffd76d6cd.yaml | 58 +++++++++++++++++++ ...menu-35d0076e41c66587aa55b1dff00355a9.yaml | 58 +++++++++++++++++++ ...menu-6e39ce305d8fc46246730df95c49bc5a.yaml | 58 +++++++++++++++++++ ...menu-7361a0798b6e7d91e3483a810ae46200.yaml | 58 +++++++++++++++++++ ...menu-dfaadc66129d4ea285875cfb5037ccde.yaml | 58 +++++++++++++++++++ ...poll-7eb5e40a54b7b7c228b5d29ef47daaf0.yaml | 58 +++++++++++++++++++ ...ider-62cee29d32c85b3a5dc1219c65c05aa1.yaml | 58 +++++++++++++++++++ ...tabs-1ad6aee2c1707dc46ec5695ab78feced.yaml | 58 +++++++++++++++++++ ...tabs-36493737cc718a786fc3dabd10944cc2.yaml | 58 +++++++++++++++++++ ...tabs-7cfb9c8a38b02b5d1f8df2ea212c2f3b.yaml | 58 +++++++++++++++++++ ...tabs-dd8a374519ab8fd8464df00ba9945d8b.yaml | 58 +++++++++++++++++++ ...kery-daa26206b4813de7be1eac00b5b9eaa0.yaml | 58 +++++++++++++++++++ ...maps-5fdd374f315987970f85f0248f2dd57a.yaml | 58 +++++++++++++++++++ ...eech-7dc366f5379f56890e8af348e04eb10f.yaml | 58 +++++++++++++++++++ ...gram-f45bff66b36c1cb9f233929a488ca421.yaml | 58 +++++++++++++++++++ ...utes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-86b13954ec743e9dcd370ce47777c030.yaml | 58 +++++++++++++++++++ ...ntor-a27c4dd18076acddac4a93fd8d6716aa.yaml | 58 +++++++++++++++++++ ...ntor-b6712bac11e9ddea585e5254f026c8f1.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...e-in-fe4c4bb2122cdad1871934e83ec97820.yaml | 58 +++++++++++++++++++ ...ions-2357694d03c405e4b8e1df1be34f5e9f.yaml | 58 +++++++++++++++++++ ...ions-2e12923b4994409fb95da9b1bf700385.yaml | 58 +++++++++++++++++++ ...ions-381a1cb122afb3c93e4a0ba82f88d009.yaml | 58 +++++++++++++++++++ ...ions-cb138827efa994e4ab1f824349c2d29b.yaml | 58 +++++++++++++++++++ ...list-49049729ee40c19e1754ddd17e7749a5.yaml | 58 +++++++++++++++++++ ...ries-29ad4ef137c9211b84960b488500f18e.yaml | 58 +++++++++++++++++++ ...tent-69f3351aa6a5162d89a81a8e42b30fee.yaml | 58 +++++++++++++++++++ ...tent-b9186cec24d42bc1865829817db744a2.yaml | 58 +++++++++++++++++++ ...tent-bf0fefcefc90da6dc2662202215f7095.yaml | 58 +++++++++++++++++++ ...tent-c6aeb8f23d8123cc999647a0e011d5c1.yaml | 58 +++++++++++++++++++ ...cess-1003a4422a3ca5fc014222d5d79884b1.yaml | 58 +++++++++++++++++++ ...cess-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cess-c66270d1aaf4c8bec88be3444d5d8440.yaml | 58 +++++++++++++++++++ ...ters-00fcc0e6d0a51f0c0f6ca9266dccfbaf.yaml | 58 +++++++++++++++++++ ...tent-277d2735251bde1d7660b619defc33af.yaml | 58 +++++++++++++++++++ ...tent-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cess-0046efcaf372ceea3cbda093fc9866d7.yaml | 58 +++++++++++++++++++ ...cess-1951707b594e6f4a4e8e4243b43c9841.yaml | 58 +++++++++++++++++++ ...cess-bd26ccd939104e13f73f569b312459d6.yaml | 58 +++++++++++++++++++ ...cess-efb14ebe0992b6c3f6efdf7585df67a0.yaml | 58 +++++++++++++++++++ ...ress-7045891b02879797f89361d3201b5ab1.yaml | 58 +++++++++++++++++++ ...ress-915182a6d2a256cbd187d2f4b8b4f74c.yaml | 58 +++++++++++++++++++ ...ress-a008c3a52fa94300e9ec331bd11a1546.yaml | 58 +++++++++++++++++++ ...lder-3cd33ca20c9c9eda3e3eb14910cde0f4.yaml | 58 +++++++++++++++++++ ...ings-5de4daf9f0d92df126da3ff853382c5a.yaml | 58 +++++++++++++++++++ ...ings-91bd3f9499da9e21fc35c9c04bbb9fa2.yaml | 58 +++++++++++++++++++ ...form-a0e2c0524dc803cf1690a2292b288992.yaml | 58 +++++++++++++++++++ ...form-accdbc7387e8cd352346b508525444ba.yaml | 58 +++++++++++++++++++ ...tain-3c6cc9490d009d5c5e5a38130b58bb8c.yaml | 58 +++++++++++++++++++ ...lock-bc55ea7b509124d1a77831d4400c5030.yaml | 58 +++++++++++++++++++ ...lock-c3dca1d1ef3a946c9ddf3e33caa00021.yaml | 58 +++++++++++++++++++ ...lock-f9078038dec7d199edb0413f76661495.yaml | 58 +++++++++++++++++++ ...nded-ebc582d4f12fc14b9a1428f77cdbf053.yaml | 58 +++++++++++++++++++ ...ocks-ccb9140dfd14809f1b9eb83224f5c145.yaml | 58 +++++++++++++++++++ ...erce-91eeb175efe504db40acff5c5fa662ef.yaml | 58 +++++++++++++++++++ ...oups-b51b043ae0bd51e5c02a86aef7693c29.yaml | 58 +++++++++++++++++++ ...oups-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...oups-df796716cdd12b786f639a85872402ce.yaml | 58 +++++++++++++++++++ ...gine-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...gine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...hema-6a28dfe4469613c00410a3afcd856457.yaml | 58 +++++++++++++++++++ ...ream-f9cb3c789647691d2de33bca14ad9edd.yaml | 58 +++++++++++++++++++ ...rbnb-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...azon-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...reso-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...erra-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...uare-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...able-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...s-hu-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...isor-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...plus-153f878c481a2d3c062b001804128554.yaml | 58 +++++++++++++++++++ ...plus-b033ee29eabf26b20084a86d35b9d877.yaml | 58 +++++++++++++++++++ ...gets-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...yelp-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...iewx-119c0f69d5b8485973b55dbcfc907989.yaml | 58 +++++++++++++++++++ ...iewx-1589d579faac8c7d72195578a8342786.yaml | 58 +++++++++++++++++++ ...iewx-1f09731ddd1d1af88db90bbc4fec3ba8.yaml | 58 +++++++++++++++++++ ...iewx-6663c4e8258a97ca80d8e61f0b37ac68.yaml | 58 +++++++++++++++++++ ...iewx-6a99396550744ae560a5320a1b153079.yaml | 58 +++++++++++++++++++ ...iewx-ada9bfaee2bdcdae8c612fda04e8585f.yaml | 58 +++++++++++++++++++ ...iewx-d13b6e0194ead1aa761a79dc4de31982.yaml | 58 +++++++++++++++++++ ...-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml | 58 +++++++++++++++++++ ...erce-b6ad60014841f75188893319dd4470b9.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ider-21b56747ef932af6a293d705a4f1c993.yaml | 58 +++++++++++++++++++ ...ider-27d3cbadcfb0487ad424f81cd866c990.yaml | 58 +++++++++++++++++++ ...ider-2e2946ff7ceba7ce385ae21a430029fb.yaml | 58 +++++++++++++++++++ ...ider-37ebb1547ffcf7ee914afd4ab2a7338e.yaml | 58 +++++++++++++++++++ ...ider-648072cf9e5d6b428e895ff9cc55e265.yaml | 58 +++++++++++++++++++ ...ider-685b01b9c20a58ab8625d54ca9e5774b.yaml | 58 +++++++++++++++++++ ...ider-77cb7270adb1ee8f80145931d246bc67.yaml | 58 +++++++++++++++++++ ...ider-be4d0822a09dabbfb60c56eb78326475.yaml | 58 +++++++++++++++++++ ...ider-ea2d65615410e5461dba977dc309841e.yaml | 58 +++++++++++++++++++ ...ezgo-1bdd11fadd06cfdab7d4d06e095a85bd.yaml | 58 +++++++++++++++++++ ...ezgo-d8487b4cdf30d9f95919fc0d077ba4cd.yaml | 58 +++++++++++++++++++ ...ezgo-fe69a0c777f01161eb85876f2a58c68c.yaml | 58 +++++++++++++++++++ ...arch-d144e1655e99bcb34fc6b0573a7608ff.yaml | 58 +++++++++++++++++++ ...nter-77a02e9a59afcc2450797fc7712b5da9.yaml | 58 +++++++++++++++++++ ...line-bb6d2bf0f5a8a794df5c5f921c8ed2d6.yaml | 58 +++++++++++++++++++ ...iews-619ac7254fccc036c35607f86905c212.yaml | 58 +++++++++++++++++++ ...iews-b5ff51b3c591b9026f1ed0c5c634aabc.yaml | 58 +++++++++++++++++++ ...iews-d096551cc11e027298b83171a2a3683a.yaml | 58 +++++++++++++++++++ ...ents-0a2ecbcc02c5fdd93dc20fd7c66c9f62.yaml | 58 +++++++++++++++++++ ...tent-0a49b86c658b566e0874b7c8c6fd8f9c.yaml | 58 +++++++++++++++++++ ...dget-563c9252bb845bff9256a99d2c884c98.yaml | 58 +++++++++++++++++++ ...ions-9454be14498ff26da96354e9b5fc82b2.yaml | 58 +++++++++++++++++++ ...ions-b6405ae9eaca03d55059021293cdb417.yaml | 58 +++++++++++++++++++ ...dget-94ba05091d5c1c002f96ded27dad7e5c.yaml | 58 +++++++++++++++++++ ...ayer-90b978a91efacda536eb1e0ded121cd4.yaml | 58 +++++++++++++++++++ ...ayer-ca4ec2717c0e87b5e6136533f933edf4.yaml | 58 +++++++++++++++++++ ...ocks-300e5e2ebc65101a8ebb5e6f23b6747a.yaml | 58 +++++++++++++++++++ ...form-9a2bf7d17126275dce9aeca280888e4f.yaml | 58 +++++++++++++++++++ ...arch-039516da624d506160b1c30124a56f9f.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lery-11a45c98dd2f844970dab94e4b84b3d9.yaml | 58 +++++++++++++++++++ ...lery-21d5c5e61124efe0fdb8d063c0f79f9f.yaml | 58 +++++++++++++++++++ ...lery-5fb58f1bd63b817d6a622885ff3cda93.yaml | 58 +++++++++++++++++++ ...lery-6cee4524dc586561620cd18145330773.yaml | 58 +++++++++++++++++++ ...lery-9376ca64ef0c10c441ff62358957edd7.yaml | 58 +++++++++++++++++++ ...lery-9f2f2dde98598fd295064b72e326d9fc.yaml | 58 +++++++++++++++++++ ...lery-b37d0ab8478827b0dcd11d96ae9c0099.yaml | 58 +++++++++++++++++++ ...lery-ca5f7b99213750bdb7e09f3fde148865.yaml | 58 +++++++++++++++++++ ...assa-a1f3ce23c26813a2d0636e6681a66fe2.yaml | 58 +++++++++++++++++++ ...vert-a6ad4e1a267f3d946e1e2e12d5bebc25.yaml | 58 +++++++++++++++++++ ...vert-c9b759e004eccd5b21e624aa9b7c9cb8.yaml | 58 +++++++++++++++++++ ...vert-f5bd530013958004252bd14d740d1932.yaml | 58 +++++++++++++++++++ ...font-056b7aae26aa632814d20eff8a2aaeb8.yaml | 58 +++++++++++++++++++ ...mode-28d27bb70102b6a3ff9c97ba43afec20.yaml | 58 +++++++++++++++++++ ...mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dges-b501e58c10633b07f2bbf5ed16ac706e.yaml | 58 +++++++++++++++++++ ...ings-c12136de0ef8038ae757e3a4dc014f16.yaml | 58 +++++++++++++++++++ ...erce-226373864d57cc20f7f59dea62a55c3b.yaml | 58 +++++++++++++++++++ ...erce-9572375f1a63fe71cfefeb901690b502.yaml | 58 +++++++++++++++++++ ...oper-25222fc492113823793e49be1ec42e70.yaml | 58 +++++++++++++++++++ ...oper-787af0ce94bcdf676a12979b911ee5bb.yaml | 58 +++++++++++++++++++ ...ider-47760446230886f970132bba81795035.yaml | 58 +++++++++++++++++++ ...ntor-3b2e242a0e8c63c5936cb035e1688322.yaml | 58 +++++++++++++++++++ ...ntor-8e63763711ef860c6f3f1ec391c10df2.yaml | 58 +++++++++++++++++++ ...form-9fc19dd6fd6294d34dede89f8670266f.yaml | 58 +++++++++++++++++++ ...loud-702f612dcb7a10b7280f1dc0d80858a2.yaml | 58 +++++++++++++++++++ ...osts-f7a5929579e2eeff4b02eaa7e1b6a770.yaml | 58 +++++++++++++++++++ ...hart-0c31a10cc87b13f4ea6563dcb29fd71f.yaml | 58 +++++++++++++++++++ ...eats-89c3f6ae4022d4ba5030523ac97f470e.yaml | 58 +++++++++++++++++++ ...dons-0041eed105fca66b7639ed88612e2a80.yaml | 58 +++++++++++++++++++ ...dons-0085871a665961c1d3ef1282f6a6ad11.yaml | 58 +++++++++++++++++++ ...dons-0149f7dc82642e7c9e2df42d374cf976.yaml | 58 +++++++++++++++++++ ...dons-0482c6a15acfe9611a210ed128b0e569.yaml | 58 +++++++++++++++++++ ...dons-14fedf42454dd570b7c4db0f006340a9.yaml | 58 +++++++++++++++++++ ...dons-1e54d333594befa754c49d164d26005e.yaml | 58 +++++++++++++++++++ ...dons-1e5ce0b67a0027e4214650c86e79dae3.yaml | 58 +++++++++++++++++++ ...dons-234019268f52489cd57bd03c8706abb6.yaml | 58 +++++++++++++++++++ ...dons-2b7446b2ef604595e4c14f2ae5295842.yaml | 58 +++++++++++++++++++ ...dons-30adae9325a039e658c3c87f75010bc4.yaml | 58 +++++++++++++++++++ ...dons-34cb9813e7e0af12dde3e7fb63dcabc4.yaml | 58 +++++++++++++++++++ ...dons-3a171cbd9ee1ba65bf8842bbdf9667ce.yaml | 58 +++++++++++++++++++ ...dons-427e946f25b6c94eeb7fca443cbb0fb9.yaml | 58 +++++++++++++++++++ ...dons-42b03ce9c451ca4b2e6d55fc7e3bcc5f.yaml | 58 +++++++++++++++++++ ...dons-42efdeb2109159b8e16a9767609f5a82.yaml | 58 +++++++++++++++++++ ...dons-67ad0ff7411e0b10941fca10e62b3adc.yaml | 58 +++++++++++++++++++ ...dons-7df172b3edf3e84909e57255e5af7560.yaml | 58 +++++++++++++++++++ ...dons-7f3e0aa2645efef948b43657b5c03dab.yaml | 58 +++++++++++++++++++ ...dons-85f4d977a933b76ef44dca3b5cf211a8.yaml | 58 +++++++++++++++++++ ...dons-971ac066c8b1c8e7c33176652acbee75.yaml | 58 +++++++++++++++++++ ...dons-a1c5cf13e8000c5432d1ca3433582d6a.yaml | 58 +++++++++++++++++++ ...dons-a51510a3a53aad35586cd77db87e9061.yaml | 58 +++++++++++++++++++ ...dons-a8dfb144a96e09ab6fe557b583b0e2e1.yaml | 58 +++++++++++++++++++ ...dons-aba156d650d00c8cf56ce115df0a8a51.yaml | 58 +++++++++++++++++++ ...dons-af78f3c1214fac33b65ff5feb5cc1cdc.yaml | 58 +++++++++++++++++++ ...dons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dons-bf5db01ece74e4b17297bc41008d1094.yaml | 58 +++++++++++++++++++ ...dons-d8b16bccaae81ea809d42b4a13235086.yaml | 58 +++++++++++++++++++ ...dons-e9fbd2b032cc27ad5763353222798302.yaml | 58 +++++++++++++++++++ ...dons-f23a396c773e57d57939f05c9afe1afd.yaml | 58 +++++++++++++++++++ ...dons-f2cad193bfdf87038af8a439971f7167.yaml | 58 +++++++++++++++++++ ...dons-f99e6ab2e39506303838ab9dbdf68d36.yaml | 58 +++++++++++++++++++ ...dons-fbf2bd6ee999c2641f3988cb02ef8d65.yaml | 58 +++++++++++++++++++ ...dons-ffeb5e23a26d75b1d475c25e6d94fa7a.yaml | 58 +++++++++++++++++++ ...dons-fffeaa1f78027e80b8c9ac73b2739073.yaml | 58 +++++++++++++++++++ ...ider-b8b913c56ed39f29c61eb2552bb40930.yaml | 58 +++++++++++++++++++ ...wall-4c932f620189df7cfc310b8ab7529a19.yaml | 58 +++++++++++++++++++ ...ader-0bfa9343d868449c3d973f2c81052fe9.yaml | 58 +++++++++++++++++++ ...dget-20537453f991f8c89e48950bab56c824.yaml | 58 +++++++++++++++++++ ...dget-cad14760637700672da85dda380a58c3.yaml | 58 +++++++++++++++++++ ...urbo-509b534cfaeb00eddb901be35d0a9812.yaml | 58 +++++++++++++++++++ ...urbo-6c5c77255a84fb41b6fdd26d0fd10783.yaml | 58 +++++++++++++++++++ ...port-cd17a32212236705de6be45ec4d31053.yaml | 58 +++++++++++++++++++ ...ages-e82724cb73e8d739a7e74ba12a2c0b77.yaml | 58 +++++++++++++++++++ ...rsvp-38dc5d2aec94b7c14ed0604e5b57a847.yaml | 58 +++++++++++++++++++ ...rsvp-72cd99005222b05f8d3ba5703b3d3c18.yaml | 58 +++++++++++++++++++ ...rsvp-9a3fa62818d09a4c2a4693cadbb72035.yaml | 58 +++++++++++++++++++ ...aker-11d11665e7b84e94329e03dc64274c9e.yaml | 58 +++++++++++++++++++ ...aker-202c703bcd7494b0db3a9f2aa3a2b6de.yaml | 58 +++++++++++++++++++ ...aker-54909ff694f2550a529ed9dc33c2ddad.yaml | 58 +++++++++++++++++++ ...aker-59b8b133d2114d7582e975a5c3c2845d.yaml | 58 +++++++++++++++++++ ...aker-73c59415c469f5d4853f326fdd664c56.yaml | 58 +++++++++++++++++++ ...aker-84319e4342ea4c4283c523e681307b09.yaml | 58 +++++++++++++++++++ ...aker-871693a9ac7cbae97114e3dda03c407f.yaml | 58 +++++++++++++++++++ ...aker-b5eb1eaeff0523cd8fae2efd6f6ac02e.yaml | 58 +++++++++++++++++++ ...aker-d81020aeab63f5a6071cc384e45c425d.yaml | 58 +++++++++++++++++++ ...aker-e4702a04134b47b76d799a6fc7f1263b.yaml | 58 +++++++++++++++++++ ...xcel-a2edcd49a7e89b5985d5c1db4e3e3fcb.yaml | 58 +++++++++++++++++++ ...aker-fa61f96851f0d9df6ac08db9cd077c0f.yaml | 58 +++++++++++++++++++ ...aker-fb36faa4bab8a0d1c4868c63043ddd1b.yaml | 58 +++++++++++++++++++ ...aker-fe52f515eb00fff50a18a2e75044bc1d.yaml | 58 +++++++++++++++++++ ...aker-ff8293f84b21b2955bef22aebfa62b32.yaml | 58 +++++++++++++++++++ ...post-702f90b8bb07e6c13ea1a4bcd70721ac.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-f0986ec848116bdaf85ff2fe79a684cc.yaml | 58 +++++++++++++++++++ ...hoto-94b0b54aeb124f4c7a107e54a5615849.yaml | 58 +++++++++++++++++++ ...desk-9346f7a9d2f3883e949e211cd3195670.yaml | 58 +++++++++++++++++++ ...rucy-83e12e5ef7835e334ea713df657c881c.yaml | 58 +++++++++++++++++++ ...emes-4505fe3a4261c48a734f7d8e99d7b55b.yaml | 58 +++++++++++++++++++ ...zing-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...zing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...line-b2a2498dae5be84f29d9989669186b97.yaml | 58 +++++++++++++++++++ ...olat-39be907595b014d4e7a7c4f54bad9f2a.yaml | 58 +++++++++++++++++++ ...lkit-81219af6a17b244e1843ac9c7762f11a.yaml | 58 +++++++++++++++++++ ...base-5f21cea7a9aedb5442f3d8dbb7f2496a.yaml | 58 +++++++++++++++++++ ...base-5fa9907f51cd1542af3ba3f055782fc5.yaml | 58 +++++++++++++++++++ ...base-75da5a5df58032a31ea21868586e0a7e.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...work-6b723c7b581edfa3ccd6460c5d7aad90.yaml | 58 +++++++++++++++++++ ...mber-0e1b741ad7286ca5428685bd7aed1755.yaml | 58 +++++++++++++++++++ ...mber-5573468f295cf6226ec0e468f3d5d806.yaml | 58 +++++++++++++++++++ ...mber-e07374f70a1aa87298a8b60340913353.yaml | 58 +++++++++++++++++++ ...wser-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ideo-2f8d0ca1e6e86f93253415194d417267.yaml | 58 +++++++++++++++++++ ...ideo-83c44f74fb6f267a714fb43018452c84.yaml | 58 +++++++++++++++++++ ...ideo-98fa09468510e4f3d608da204df8d702.yaml | 58 +++++++++++++++++++ ...ideo-b308d8dd463cbe3361a5a4c348d193ac.yaml | 58 +++++++++++++++++++ ...ayer-73b7b4fd6adbc8f05bd6aa0607d34105.yaml | 58 +++++++++++++++++++ ...ming-727a6d10eed1dfebfba432e96cc38739.yaml | 58 +++++++++++++++++++ ...erts-94a35e06d280c2901bcd1f032d9e8a1d.yaml | 58 +++++++++++++++++++ ...erts-cd6e7fbf5a95badd9018fdfc8c60db7c.yaml | 58 +++++++++++++++++++ ...lock-dbff9a993e10a4f80cd4718f67303541.yaml | 58 +++++++++++++++++++ ...cuss-7038593ad5992122fe087ebe7875e6ac.yaml | 58 +++++++++++++++++++ ...abre-8a88cbe198527237519cb3478f4555ce.yaml | 58 +++++++++++++++++++ ...itor-e01a95cfae1821b6d1bcf2a917c4f01c.yaml | 58 +++++++++++++++++++ ...ager-05c2167f7f1f78fa58c980d418931b2c.yaml | 58 +++++++++++++++++++ ...-svg-1cccf375a4463c9d416a20eff76583ef.yaml | 58 +++++++++++++++++++ ...-svg-8b2ac3daa03fbba70cf83c4563849d67.yaml | 58 +++++++++++++++++++ ...-svg-b58eeb8e60d6f7c5cf602173c2c00549.yaml | 58 +++++++++++++++++++ ...-svg-d8ec46ad4534895bbeab1b52d6693d3b.yaml | 58 +++++++++++++++++++ ...-svg-de5739613e14a996b46539b30ca9beab.yaml | 58 +++++++++++++++++++ ...eway-9e6de6f10cec1c471c1242da8d788708.yaml | 58 +++++++++++++++++++ ...erce-436125bac0484b579189e9f21786e904.yaml | 58 +++++++++++++++++++ ...ixel-c3f117930fe59986e129269f444e98be.yaml | 58 +++++++++++++++++++ ...mail-579cd3fc5c2399656d85cbe343c14eef.yaml | 58 +++++++++++++++++++ ...mail-a4f4eba72296421005733a610933f605.yaml | 58 +++++++++++++++++++ ...imes-dff51ecf68a2a27471cd48bde63ce4a2.yaml | 58 +++++++++++++++++++ ...lert-5727788917ca5dc70c5a2a8fc41d6ea0.yaml | 58 +++++++++++++++++++ ...lert-f2eb2411647af07955e8ded396c4583e.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...king-4ad4863544909ca65fb59059a85b6ca2.yaml | 58 +++++++++++++++++++ ...king-c34456b0a354174a8b99c79db450a526.yaml | 58 +++++++++++++++++++ ...king-d2407407e16d8affae24d481d0b34cb9.yaml | 58 +++++++++++++++++++ ...nago-eaa83ff52990564332c5852f905f9fb7.yaml | 58 +++++++++++++++++++ ...core-6883c989062268d5da80d537f9e1e493.yaml | 58 +++++++++++++++++++ ...core-80c6230c139aaee435c35c9df894dae1.yaml | 58 +++++++++++++++++++ ...stem-00157407495e1ef41be2fc477a456a7d.yaml | 58 +++++++++++++++++++ ...stem-0bea880f7043c5054d61f7e9d6ba4d2f.yaml | 58 +++++++++++++++++++ ...stem-12219750d7664db4408ea75c73fa706d.yaml | 58 +++++++++++++++++++ ...stem-17739eab6c3078839f62948bae53f8f7.yaml | 58 +++++++++++++++++++ ...stem-1874294040d198d9f843d58bbcc1548b.yaml | 58 +++++++++++++++++++ ...stem-3a9e5880883b3238662167448ae8e190.yaml | 58 +++++++++++++++++++ ...stem-473ae39f2c9b117fd21ddfea3f742daa.yaml | 58 +++++++++++++++++++ ...stem-80865fbe8c06ec562ac960b28b962ecd.yaml | 58 +++++++++++++++++++ ...stem-826b0e6fc8bdc77439da0a867a102476.yaml | 58 +++++++++++++++++++ ...stem-9935fc74a7e8d09ff1c372489adcc9dd.yaml | 58 +++++++++++++++++++ ...stem-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...stem-c957720e1b76962412e197bc09cb35e8.yaml | 58 +++++++++++++++++++ ...stem-f991f9853892bf031ebb72c811af6b0f.yaml | 58 +++++++++++++++++++ ...free-0f6c840a3fb64dbbf3be23d21800f577.yaml | 58 +++++++++++++++++++ ...lite-0f6c840a3fb64dbbf3be23d21800f577.yaml | 58 +++++++++++++++++++ ...lite-3b9bd1e4f5897df85a36d204f832a5eb.yaml | 58 +++++++++++++++++++ ...lite-56ba6deff570cd4e7d1696cb032991b3.yaml | 58 +++++++++++++++++++ ...hare-07ab6177e4eee952d64d139410f561bc.yaml | 58 +++++++++++++++++++ ...hare-40aacb4df39566c6bb333af52f28e227.yaml | 58 +++++++++++++++++++ ...hare-4d80f38d93d7f5f929f7caeb5348b571.yaml | 58 +++++++++++++++++++ ...hare-6150ea7134cb72d73e6e7ce3f51ab46c.yaml | 58 +++++++++++++++++++ ...hare-754268962b0bd973cebfd375c7df9425.yaml | 58 +++++++++++++++++++ ...hare-c564c36d083131df8b70721d4380612a.yaml | 58 +++++++++++++++++++ ...hare-f793e64947f92282a534916c8b501137.yaml | 58 +++++++++++++++++++ ...rowd-67ad930884b5b87d29530a8be64ff268.yaml | 58 +++++++++++++++++++ ...rowd-e66b394b6ca847ce34ca3e1d63c12c27.yaml | 58 +++++++++++++++++++ ...rowd-1cdee5629acdb013a2031fc71ce18e3f.yaml | 58 +++++++++++++++++++ ...rowd-2aaf513c887290d1b06e4a97482b6da3.yaml | 58 +++++++++++++++++++ ...rowd-b2cea8a198e9a575447977f949754486.yaml | 58 +++++++++++++++++++ ...grab-abad4bfa80c4735594596dcf267be185.yaml | 58 +++++++++++++++++++ ...ayac-22e02ff5de893b13264dcb770563429d.yaml | 58 +++++++++++++++++++ ...ayac-d88d0c224f666498b5887acc3c70b802.yaml | 58 +++++++++++++++++++ ...list-321ea6ffd1b44901180d2be13bcb0547.yaml | 58 +++++++++++++++++++ ...m-db-43e92e48fce7405625b7afca66933559.yaml | 58 +++++++++++++++++++ ...m-db-66e7875aa9a79f68060a917eb8074082.yaml | 58 +++++++++++++++++++ ...m-db-e0426a28b885d426fb32a6121c958a26.yaml | 58 +++++++++++++++++++ ...ader-987ba48a8effbae5bcbbbe65d3a7dff9.yaml | 58 +++++++++++++++++++ ...-svg-9a645fa828e0b867db978ce345a20000.yaml | 58 +++++++++++++++++++ ...ndar-53afece9446695901fc03dfbb692e04f.yaml | 58 +++++++++++++++++++ ...ndar-a076b8ca38d0ad2532c4b659c3b54901.yaml | 58 +++++++++++++++++++ ...dget-29145e5db5dd5627b3607ea1e36f49b2.yaml | 58 +++++++++++++++++++ ...-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...king-1a925f12b1905f4ad4c8d17bba7bb15a.yaml | 58 +++++++++++++++++++ ...r-wp-157cdd8bc992e58c6e6f6337bc97b4c2.yaml | 58 +++++++++++++++++++ ...r-wp-1fa869ed52b230924c8c94b2bfb591af.yaml | 58 +++++++++++++++++++ ...r-wp-24a60434e502bd4fe3a3e9f654b441e8.yaml | 58 +++++++++++++++++++ ...r-wp-62957aaeb6104548f77744232edc7490.yaml | 58 +++++++++++++++++++ ...r-wp-84ecfe35530dba1d6d850c87907091be.yaml | 58 +++++++++++++++++++ ...aorg-d4b2be233d46cfcba65da98993b34434.yaml | 58 +++++++++++++++++++ ...ment-3f1c3ad85ad1a49bfdfa7d4e3b840987.yaml | 58 +++++++++++++++++++ ...ment-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml | 58 +++++++++++++++++++ ...-pro-2646a8b516c31d3d675ed11114c6f9aa.yaml | 58 +++++++++++++++++++ ...-pro-c85a39b22a9266777e8fa557a3826f56.yaml | 58 +++++++++++++++++++ ...stem-be2315835d7b2267c9fa00b942855a61.yaml | 58 +++++++++++++++++++ ...sten-13e0cdd00039aa83908edb26fc9e840c.yaml | 58 +++++++++++++++++++ ...loud-cef5983d30ffaada806aedbacf5b6bc6.yaml | 58 +++++++++++++++++++ ...nder-1e95de3e52134f8f88956ec119bc2d88.yaml | 58 +++++++++++++++++++ ...-lcx-211da40fdd7ec7390b239420458edbc0.yaml | 58 +++++++++++++++++++ ...maps-1a6adfb616ef7e8670ebde6e3c2f0918.yaml | 58 +++++++++++++++++++ ...ring-53a6ab0ca5df0931f86a3cb0e36625b5.yaml | 58 +++++++++++++++++++ ...yles-dd27ae18a86029fffd366285509782e0.yaml | 58 +++++++++++++++++++ ...izer-c348ce6c7574b8ff9d61db7b1c6faf04.yaml | 58 +++++++++++++++++++ ...aner-62e4e20027880ffdd76d60900f6cc1c9.yaml | 58 +++++++++++++++++++ ...erpt-4634b65a3b88602069115a32b9310bb1.yaml | 58 +++++++++++++++++++ ...-top-b5b3c8eb6791ecd6029bb9d46ed89ac0.yaml | 58 +++++++++++++++++++ ...ions-a2f2e6465cf5db9cbb966e235c714c1c.yaml | 58 +++++++++++++++++++ ...hors-823ea976111689a9bb4045475cc60c43.yaml | 58 +++++++++++++++++++ ...ects-92ee91cf72a43dfa2c90a26dd4e9aac0.yaml | 58 +++++++++++++++++++ ...ence-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ence-d8b5bd57572fb9305d66b7bd52b02101.yaml | 58 +++++++++++++++++++ ...ayer-85cd297e94e13a79acaf0e0195efaaf9.yaml | 58 +++++++++++++++++++ ...ions-0f1cce8b3f6cc44f06846edd384bb3d3.yaml | 58 +++++++++++++++++++ ...ions-466149e12563eb78ed7febca48abd052.yaml | 58 +++++++++++++++++++ ...tics-48d179450e001d6e5bb006bf4ba5d2a6.yaml | 58 +++++++++++++++++++ ...tics-6b13e1ddb211e52169360fc54388c951.yaml | 58 +++++++++++++++++++ ...hare-63d0d67aa5aba2dddaa9648ffc434152.yaml | 58 +++++++++++++++++++ ...lete-227404dac34993cad671e2236080d324.yaml | 58 +++++++++++++++++++ ...hing-117a868c3ea3bb712e5a1d73897e37a5.yaml | 58 +++++++++++++++++++ ...hing-3aae779483ac61fd460b1860a2ef2f7d.yaml | 58 +++++++++++++++++++ ...hing-db06882af76c86da8baedbdae183f52e.yaml | 58 +++++++++++++++++++ ...hing-f5c19231c40427d40fe57581f10b7d84.yaml | 58 +++++++++++++++++++ ...lude-3a32aa7a18d47ef0f7438986ced63310.yaml | 58 +++++++++++++++++++ ...lude-e9fa8cb8021c5fce11cdeba05ed162ba.yaml | 58 +++++++++++++++++++ ...lter-7932b82c356f203f76bc21fa22bfac04.yaml | 58 +++++++++++++++++++ ...lace-67ada1785c1a67660530280a293c0d89.yaml | 58 +++++++++++++++++++ ...lace-90aecfac8b56c743716b7354156b72b0.yaml | 58 +++++++++++++++++++ ...gger-967dff727dbc42b5a7eb2d15c9e083d4.yaml | 58 +++++++++++++++++++ ...eter-f23eeb8c9b5eae93abecc2b7d750a8f6.yaml | 58 +++++++++++++++++++ ...shed-6786949bf947df30c87362646165e5b3.yaml | 58 +++++++++++++++++++ ...chiq-0d7f8442f33ed7fc7eccab9aaa8ce0e0.yaml | 58 +++++++++++++++++++ ...chiq-84940a417e2023353b70ebc282a092a0.yaml | 58 +++++++++++++++++++ ...chiq-aa754ad2c8b3fd090579a6c1c7b9d91c.yaml | 58 +++++++++++++++++++ ...ng-2-3c345f487511e8bb822be122aa461bdf.yaml | 58 +++++++++++++++++++ ...ng-2-4fdb668b4072805be7b723dcf1d44abb.yaml | 58 +++++++++++++++++++ ...chwp-347f040de616333a1a9814dd7bc708c0.yaml | 58 +++++++++++++++++++ ...arch-3ff9ea32aaa393cc30b39527dd3a58c2.yaml | 58 +++++++++++++++++++ ...arch-f7cf83a853e0c8a85044ac66f5cc847b.yaml | 58 +++++++++++++++++++ ...kets-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...tion-3cb680b76cd76f74dd3e1108311fe7fe.yaml | 58 +++++++++++++++++++ ...itle-bf1fcb74e30994cb355bab78b549e730.yaml | 58 +++++++++++++++++++ ...ider-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ress-2b0a7466b22e63c34f32b08697f5cfdf.yaml | 58 +++++++++++++++++++ ...ress-797ed9f22b4525fb7840122eb0973904.yaml | 58 +++++++++++++++++++ ...-pro-797ed9f22b4525fb7840122eb0973904.yaml | 58 +++++++++++++++++++ ...n-ip-eed5959a62db993b12da83da9d803446.yaml | 58 +++++++++++++++++++ ...tion-40c9df59c7e3df119c2dd5f1035b5b7e.yaml | 58 +++++++++++++++++++ ...tion-80ad6ff6a41f2684b99adffd0cc6275a.yaml | 58 +++++++++++++++++++ ...tion-a8ed8c08b34ae95a0c525696512c70ee.yaml | 58 +++++++++++++++++++ ...tion-b20594c424375d9856782a72ff8e9db1.yaml | 58 +++++++++++++++++++ ...ager-d557c696333289ec8d8f662866e89376.yaml | 58 +++++++++++++++++++ ...iles-ce5ed87dfc2376443fc12498fa99a891.yaml | 58 +++++++++++++++++++ ...ayer-c6380a7487a7c0067133d9ec14c64bfc.yaml | 58 +++++++++++++++++++ ...gins-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...udit-a2f819fdd51f14b2b69a4d02f7d84f43.yaml | 58 +++++++++++++++++++ ...e-wp-3eab710837b3e13c81a4f7d732c43657.yaml | 58 +++++++++++++++++++ ...e-wp-64412a6d5b249eafc3d5bfa69a4e3d27.yaml | 58 +++++++++++++++++++ ...ixed-e76639e268e0d7879dd985548e2b0ee7.yaml | 58 +++++++++++++++++++ ...wall-2bc21dde1345455ea9561d5fe5ed0e15.yaml | 58 +++++++++++++++++++ ...wall-4d1eef19885c78121ffb497c3fe4a3bd.yaml | 58 +++++++++++++++++++ ...inja-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...safe-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...onts-05c88cf821e14c133b503ea979e12c4d.yaml | 58 +++++++++++++++++++ ...cial-714e1a158166a33a7b439bd28dcdaa32.yaml | 58 +++++++++++++++++++ ...cial-c4ddc0489c7fc6327da43ce100fae835.yaml | 58 +++++++++++++++++++ ...licy-99cc5f18cba37431e326c7c04591a219.yaml | 58 +++++++++++++++++++ ...licy-ba1c662a4a4fab81f4b84d2ac53ce3a1.yaml | 58 +++++++++++++++++++ ...tons-f73941d406d9c3fcf56582655794e007.yaml | 58 +++++++++++++++++++ ...oads-1db698397280ce7aca6c9daca8c7b7c7.yaml | 58 +++++++++++++++++++ ...oads-95e1f751d91cfff872210a09f6fcaf59.yaml | 58 +++++++++++++++++++ ...edia-c56e654821bb31914422facf9fd1d9d9.yaml | 58 +++++++++++++++++++ ...edia-d6132019cfaa7b420b3260f07bd086fb.yaml | 58 +++++++++++++++++++ ...hoto-655bb3b8d4438b69c94c0ae63c754913.yaml | 58 +++++++++++++++++++ ...lkit-eb3ea92b0c5a4b0e8e1f707fd264374b.yaml | 58 +++++++++++++++++++ ...iwyg-19b57e69ca3c481c9cd19e98284be152.yaml | 58 +++++++++++++++++++ ...-api-3fb8bbd93e29c77c2c10fff01c5754a2.yaml | 58 +++++++++++++++++++ ...malt-42f2aed82645b4c22a964230d4cf5c0e.yaml | 58 +++++++++++++++++++ ...rm-7-5c801a046ddb1fac8004d7794f007242.yaml | 58 +++++++++++++++++++ ...rm-7-9b9891b7d15de10b021b57247a686e05.yaml | 58 +++++++++++++++++++ ...rm-7-fbdeefe8fdc61a2e9093fee1505ec5f9.yaml | 58 +++++++++++++++++++ ...ails-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mail-0f1df16e8eed1b185bf479b1f2bd0199.yaml | 58 +++++++++++++++++++ ...nder-5aca3acdcafb2379cade4b6c2df42ece.yaml | 58 +++++++++++++++++++ ...fied-526f9a50eb94365c6edf2a44fc6ceed7.yaml | 58 +++++++++++++++++++ ...ndit-85ac26fe1ed37dc881dfc2a5252c3fa6.yaml | 58 +++++++++++++++++++ ...ress-2b3a10a2b0c01a20025a0d9db118f2df.yaml | 58 +++++++++++++++++++ ...ress-349038bfb8ad974ae4bba5615712f5b9.yaml | 58 +++++++++++++++++++ ...ress-359a63479caac5270f841c962366bff8.yaml | 58 +++++++++++++++++++ ...ress-446bb803ccb7ab54ba9c587af27ed178.yaml | 58 +++++++++++++++++++ ...ress-572ada3e2b5cfd266bbe4d55b671ea76.yaml | 58 +++++++++++++++++++ ...ress-81e845426b35bbadfec4fa7948427e09.yaml | 58 +++++++++++++++++++ ...ress-9ba240bc312b43fe5719cb9b5a56a769.yaml | 58 +++++++++++++++++++ ...ress-f386ff3f48b7d778335b6a97f6c41a43.yaml | 58 +++++++++++++++++++ ...push-30e35a536fd4afd5cb956f988fb6ecbc.yaml | 58 +++++++++++++++++++ ...-lms-6892cd1d0b697581c7511a564b22d2f3.yaml | 58 +++++++++++++++++++ ...-lms-a7ff75affe3888f63fffbde3a81a35a3.yaml | 58 +++++++++++++++++++ ...-lms-c6ad96281ff7d4df0c44c10217f4d0ea.yaml | 58 +++++++++++++++++++ ...meta-1d87fdeb396f4600b280560afe2112ee.yaml | 58 +++++++++++++++++++ ...lert-437f4f4319341eb71e66802d9a46e647.yaml | 58 +++++++++++++++++++ ...ding-e894a6552613ace9ff7694fe7f0247a5.yaml | 58 +++++++++++++++++++ ...inks-40b96ba14c189bc5294c696f541a5a2a.yaml | 58 +++++++++++++++++++ ...eaks-ed27c4cd836ec804d97b971161525852.yaml | 58 +++++++++++++++++++ ...itor-a957dbe1122815a4d921b97d5fcd30d4.yaml | 58 +++++++++++++++++++ ...inks-896998a582295bc584998dec0e35768b.yaml | 58 +++++++++++++++++++ ...ster-9732cad9519d7ec0a87d22f95e1da009.yaml | 58 +++++++++++++++++++ ...ster-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ster-cc60724a02e2069155463638fe585163.yaml | 58 +++++++++++++++++++ ...0web-70a47ff6f5488e7468e76cf5273bfb81.yaml | 58 +++++++++++++++++++ ...0web-fcebd70d7bd0fae30a9aee2fa4de1dca.yaml | 58 +++++++++++++++++++ ...math-0412effdb25dc1c079b5ac901ba8eb41.yaml | 58 +++++++++++++++++++ ...math-10c02e3884689b63f9593289046d6bbb.yaml | 58 +++++++++++++++++++ ...math-149aa3cdb8f6dba02a1015d8c51445b9.yaml | 58 +++++++++++++++++++ ...math-29a6c7e2607d1c0248462dad6e8d2dae.yaml | 58 +++++++++++++++++++ ...math-3cd75b090f3018ee840ae18474ab15b1.yaml | 58 +++++++++++++++++++ ...math-424aba97fb32ef1aa4a45220d2d79ae0.yaml | 58 +++++++++++++++++++ ...math-4309b7c0188a30115c93b002a27055be.yaml | 58 +++++++++++++++++++ ...math-4aca4e8ed2773f54fe21e7e09f146650.yaml | 58 +++++++++++++++++++ ...math-50ad7e6a87a7ec0f76525597202c2f2f.yaml | 58 +++++++++++++++++++ ...math-786eb02bbb9c78c1c09fd80a45e23bb1.yaml | 58 +++++++++++++++++++ ...math-f745637cf5ff648ecffd79a7f071d200.yaml | 58 +++++++++++++++++++ ...-pro-8be746d8d4f7199896166d7de62beb9e.yaml | 58 +++++++++++++++++++ ...itor-b91a2480651782f3bb16ba3659354dba.yaml | 58 +++++++++++++++++++ ...list-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...s-de-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...erce-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...mage-78fd1adecba808ca03a48398d3c13c9f.yaml | 58 +++++++++++++++++++ ...rank-2ef18c0d57d1cdd92f75ace88711d88f.yaml | 58 +++++++++++++++++++ ...rter-c8630bcb4ab2b5cd9e6ea3a337451d8d.yaml | 58 +++++++++++++++++++ ...tion-1f2d414ddc2a277c0bf1caa864fd45b1.yaml | 58 +++++++++++++++++++ ...tion-73f794bdb6d5d5ebc6d4220191ef5dda.yaml | 58 +++++++++++++++++++ ...tion-81580e623be1bd11eb139b9bedb99985.yaml | 58 +++++++++++++++++++ ...tion-82c66bd49c9670a47844ee08f2e1dfec.yaml | 58 +++++++++++++++++++ ...tion-b37230941774d99792032d2914c74bb5.yaml | 58 +++++++++++++++++++ ...tion-d80bb287fb3b361c731e4fbb1c1ed49d.yaml | 58 +++++++++++++++++++ ...tion-da0195abc3fd621c83febd2fb7f0bcc9.yaml | 58 +++++++++++++++++++ ...tion-ea58f8019f8858d1a6e5612496c6cdb0.yaml | 58 +++++++++++++++++++ ...tion-f06f3a35df3df0c40ee23bf235a7efbb.yaml | 58 +++++++++++++++++++ ...ency-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ider-afa388cb5079dcd3f29d050e7cf600e7.yaml | 58 +++++++++++++++++++ ...-tag-f5e5ea8fe0a79e328718fc83043de80f.yaml | 58 +++++++++++++++++++ ...cher-4a70a1d91b23564dea1f6826c9041806.yaml | 58 +++++++++++++++++++ ...zard-c65adcc35ac4040261ad16030af10bc8.yaml | 58 +++++++++++++++++++ ...ator-99d9f69262b565cb98ac9182ded6ba39.yaml | 58 +++++++++++++++++++ ...form-54eacca3ec158df026692c600567e01e.yaml | 58 +++++++++++++++++++ ...ters-2163947a7faebedb99b02ea382f621f0.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...ator-2677f82c6e08d61546678037c73f3707.yaml | 58 +++++++++++++++++++ ...ator-4bb5304c273d308af87d9ef184195800.yaml | 58 +++++++++++++++++++ ...ator-68b6ddf8373e9922e3759838ef90fc9f.yaml | 58 +++++++++++++++++++ ...ator-c1c389ad46f0bb17d071702dede0897b.yaml | 58 +++++++++++++++++++ ...ator-d2de41ee5b97d7c9433fd01d3f1c9751.yaml | 58 +++++++++++++++++++ ...ator-dab17f74e7c510ebeda6e16b5ea6519f.yaml | 58 +++++++++++++++++++ ...-mgr-91fa5c3d290e5cca3440a17eaa19829e.yaml | 58 +++++++++++++++++++ ...urce-ca69de4894a78d151874e42160f8d4e3.yaml | 58 +++++++++++++++++++ ...ator-0bd471365f33bde2fc9b3cf18367b907.yaml | 58 +++++++++++++++++++ ...ting-483e7e9040acb4dde997f1c7e60efa41.yaml | 58 +++++++++++++++++++ ...ting-7d9695bdca873940197ea6a55e88c78a.yaml | 58 +++++++++++++++++++ ...ting-bd3f97a6db76b6dcae059be482b558f5.yaml | 58 +++++++++++++++++++ ...ting-d610c8cf7006865b0eb76d0efb43ad21.yaml | 58 +++++++++++++++++++ ...tats-80f967b027a6da96dccfd0c385ae1ac0.yaml | 58 +++++++++++++++++++ ...tats-c2e5ca7c3943870cf107630ce8a7ec83.yaml | 58 +++++++++++++++++++ ...wser-63d4ee9917fcafc47225c3c77377bf2f.yaml | 58 +++++++++++++++++++ ...wser-9660e0224b9760d1af88fd4611d7d759.yaml | 58 +++++++++++++++++++ ...wser-a799081d34c432defddee7667cec19dc.yaml | 58 +++++++++++++++++++ ...wser-f3788e8161735094781c1f5ae1d95441.yaml | 58 +++++++++++++++++++ ...ment-71b25caf3907e04060e0d61d5bb4a2e5.yaml | 58 +++++++++++++++++++ ...ment-bcc8790a8d36a1db91c142f8ad59d902.yaml | 58 +++++++++++++++++++ ...rank-f8142d6147ba8985e902d3e3c7f8c24d.yaml | 58 +++++++++++++++++++ ...info-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...meip-70cdf6a74f267301ff9a7a0c0a03da5b.yaml | 58 +++++++++++++++++++ ...cker-bb6a55b0c6e726b2a2ecec4b50c8f7ea.yaml | 58 +++++++++++++++++++ ...itor-8a1f943914f4672fa3bb0af353ac1cbd.yaml | 58 +++++++++++++++++++ ...itor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...seur-01f666d1348f15c58dad4eff11007661.yaml | 58 +++++++++++++++++++ ...seur-0ca7c41649d0f082ad6681a5a0217ff7.yaml | 58 +++++++++++++++++++ ...-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-bio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...form-df188a4635663bfa5512f1ac98e2f946.yaml | 58 +++++++++++++++++++ ...arks-5031bc59caa3037821df61e5a345c90f.yaml | 58 +++++++++++++++++++ ...-lms-02626784075443390163f8db5670c28a.yaml | 58 +++++++++++++++++++ ...-lms-10a89ae66beb80eb5f5ead8cc5089e02.yaml | 58 +++++++++++++++++++ ...-lms-13a97dd87cd8da4d2ca9cc4586e65cfe.yaml | 58 +++++++++++++++++++ ...-lms-2a5ae121ac45c4db9286f6262f63f6e5.yaml | 58 +++++++++++++++++++ ...-lms-417dd4625c1b025667086ec6772974db.yaml | 58 +++++++++++++++++++ ...-lms-838c5377a3ecbc7084b894cb32f7b8cc.yaml | 58 +++++++++++++++++++ ...-lms-953891b7b02246cb4b83db8ae0e364f6.yaml | 58 +++++++++++++++++++ ...-lms-d6e8b2f76cbc2ec5ae7e7af3679d4ed8.yaml | 58 +++++++++++++++++++ ...ress-43f4c20972d989cec8564607e81e3507.yaml | 58 +++++++++++++++++++ ...ress-ed44e679b80b227382994fd698507bde.yaml | 58 +++++++++++++++++++ ...rity-158366fe9b5b0baf92dc531e125fc491.yaml | 58 +++++++++++++++++++ ...rity-29fc5077ea2edf3a78db8c636c61b5fc.yaml | 58 +++++++++++++++++++ ...rity-97e524444c79464d138f78b1bdccb0af.yaml | 58 +++++++++++++++++++ ...qotd-b07db4dfebcda2750bc8765b2f84f5e0.yaml | 58 +++++++++++++++++++ ...nion-f17b3e6f69f39571541cab98885c4a49.yaml | 58 +++++++++++++++++++ ...sgvo-65fb11931177bab0fee70a7467cb7286.yaml | 58 +++++++++++++++++++ ...sgvo-b1b317cf528065a9659ae132db582cd7.yaml | 58 +++++++++++++++++++ ...sgvo-c87c5ce6e1dba004330c2ec9d5dc6740.yaml | 58 +++++++++++++++++++ ...llow-d6e1f3b40bc3ef2b92a5e3cad8048813.yaml | 58 +++++++++++++++++++ ...pora-94e88d16398a1d45a3247b177897a58b.yaml | 58 +++++++++++++++++++ ...rive-bc20fc7e32cb3fbec9137570aec723f7.yaml | 58 +++++++++++++++++++ ...erce-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...this-32ca157e45a11cba9d0a4e52d697d9d8.yaml | 58 +++++++++++++++++++ ...mage-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml | 58 +++++++++++++++++++ ...mage-a8305ef02686935203a872eb58a73ff6.yaml | 58 +++++++++++++++++++ ...mage-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mail-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...olic-71a9b86af5e18a20f6a7538c29ad1df9.yaml | 58 +++++++++++++++++++ ...olic-822679f46a678c28d53cacb1c12444b4.yaml | 58 +++++++++++++++++++ ...olic-d30830ee183428306dfe29b862928edf.yaml | 58 +++++++++++++++++++ ...olic-f19f31f075dbc06538f36ae8e36c55d3.yaml | 58 +++++++++++++++++++ ...ebar-2f64e4cf69164182b2f4695a0a03f04b.yaml | 58 +++++++++++++++++++ ...ebar-61fcaed16881b56993f1d78f9758c2b3.yaml | 58 +++++++++++++++++++ ...ebar-c69d9d03bd69d8ab6bf679257ba19be1.yaml | 58 +++++++++++++++++++ ...ebar-c6abae1f3b36418b8b7ce31e542cc230.yaml | 58 +++++++++++++++++++ ...unts-dd581bb2f106d38c2b413e5d4d1b0414.yaml | 58 +++++++++++++++++++ ...iles-13647ac0f5697b4e3d7374c8bbd8f571.yaml | 58 +++++++++++++++++++ ...iles-31aeecdc666490a1580c3359e75e5fff.yaml | 58 +++++++++++++++++++ ...iles-b62cd969ddcf5b8e9b0c69558a4a4184.yaml | 58 +++++++++++++++++++ ...iles-b6bd7791f200f7232382796f865d36f1.yaml | 58 +++++++++++++++++++ ...iles-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cart-59dd009cc3bbb81f3cf9451ec529dc99.yaml | 58 +++++++++++++++++++ ...riff-373cd634451823c6ebf5fcda405d8cd5.yaml | 58 +++++++++++++++++++ ...riff-76ebe4a4bfefd9bdb89c2aafde46a61c.yaml | 58 +++++++++++++++++++ ...riff-91995026ff620283dce0ded1573ce367.yaml | 58 +++++++++++++++++++ ...riff-9868f32ae613992060ba083e76a3d3bf.yaml | 58 +++++++++++++++++++ ...ring-541de8c068694bf2fd0d54b891070b5b.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...sync-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...sync-2681315eb5322b6e8d1489c4efcc7445.yaml | 58 +++++++++++++++++++ ...sync-5eb00ad2756b2388ac92152e000bcf7c.yaml | 58 +++++++++++++++++++ ...sync-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...sync-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...leth-6be8e2d8421b17caa2e2804c1c44200c.yaml | 58 +++++++++++++++++++ ...ller-6d8b84eb17134784244ee11191ce581e.yaml | 58 +++++++++++++++++++ ...ller-8d232cf88104a0bce1dc247150d7aae4.yaml | 58 +++++++++++++++++++ ...ller-d67e7665ddd98551189d5ed08461e85a.yaml | 58 +++++++++++++++++++ ...menu-178a0b2872232b9ff07f79c6391e0625.yaml | 58 +++++++++++++++++++ ...tons-2cc10dd6846c3b5a424c2d4d83378809.yaml | 58 +++++++++++++++++++ ...rier-43ca0b6b0ea70acc9611835de771b2f8.yaml | 58 +++++++++++++++++++ ...-woo-7232fed6406ae4ba37d22f0a1efb507e.yaml | 58 +++++++++++++++++++ ...icon-7f858d0082d9f9b3baf67bc48e2d6a9b.yaml | 58 +++++++++++++++++++ ...erce-204abbaf4719b0c465697b2d07725668.yaml | 58 +++++++++++++++++++ ...erce-c95fb7e9995eb1cfa4e559bcf8a93b02.yaml | 58 +++++++++++++++++++ ...e-wp-2bd96fa6fc397c3dffcc3e90ed6550f2.yaml | 58 +++++++++++++++++++ ...ruct-f40061e389876ea9a0c58de3f34fe3a0.yaml | 58 +++++++++++++++++++ ...gine-129b979d8e67fbc88666813fc32a0c22.yaml | 58 +++++++++++++++++++ ...nder-248ab13a1cecf5e500d9ad5e3403c1b5.yaml | 58 +++++++++++++++++++ ...hopp-aefb5230fce9985b540fe0a540e3c3be.yaml | 58 +++++++++++++++++++ ...ages-2cc21eace9abb2004f2ff03d1c79dbc9.yaml | 58 +++++++++++++++++++ ...dons-51577bdf9a059e7edb1dda702623d2b6.yaml | 58 +++++++++++++++++++ ...dons-a26b1ca65400b2d024a19fa1088625ac.yaml | 58 +++++++++++++++++++ ...dons-e51458c52ee75e442332748b235c894d.yaml | 58 +++++++++++++++++++ ...tory-0b1685f3bb7d2556abd3f8a3adda5904.yaml | 58 +++++++++++++++++++ ...tory-d0a3ff8d18b2421520c07ab45424de7d.yaml | 58 +++++++++++++++++++ ...date-237f09cf608b33e2d885ba45327a8a92.yaml | 58 +++++++++++++++++++ ...date-baf7113ec23d15f1819896037517b713.yaml | 58 +++++++++++++++++++ ...some-a7ddbb09fcd7198bac10f4c61d87a90f.yaml | 58 +++++++++++++++++++ ...case-1c68ed9adb5cb9e4bd046ceebf588774.yaml | 58 +++++++++++++++++++ ...case-3e2e342247ff105c5df7ef4d8c77821d.yaml | 58 +++++++++++++++++++ ...case-619a199c4aef0c8ec4b0e45c8c920810.yaml | 58 +++++++++++++++++++ ...case-9ba37298cb6084c9a432846276355e13.yaml | 58 +++++++++++++++++++ ...imdb-05c667ea35f9abbc77504891932e218e.yaml | 58 +++++++++++++++++++ ...imdb-568ee8060d1c0b8a7ff761ffdaf606b0.yaml | 58 +++++++++++++++++++ ...menu-0d3480d611d68322f3807ad912f13fa3.yaml | 58 +++++++++++++++++++ ...inja-382f2dc0e3689fe8f1bed64d23fca41f.yaml | 58 +++++++++++++++++++ ...rect-552fdceb70e178ef12665118f36af7cf.yaml | 58 +++++++++++++++++++ ...data-3558264fbd3bd3c84b28ca0ff40cd986.yaml | 58 +++++++++++++++++++ ...data-6d61e0b46b881d3a5609918a45b30992.yaml | 58 +++++++++++++++++++ ...data-a2374460bb7e70d55eb2c8c43ce8140b.yaml | 58 +++++++++++++++++++ ...data-a8aacb001d1b5ea46e16ff44cb2daa72.yaml | 58 +++++++++++++++++++ ...oder-30441a12301c990d7aaae2342a03a490.yaml | 58 +++++++++++++++++++ ...nder-0a2d3f8adac7ce1d181ce17764b6e0b6.yaml | 58 +++++++++++++++++++ ...nder-f57a6c83ef919f8797158e43c847775c.yaml | 58 +++++++++++++++++++ ...s-ui-2dbf94e1363346187fd0d9415f21a87d.yaml | 58 +++++++++++++++++++ ...s-ui-464b854a586427e5e143e4896c8caafc.yaml | 58 +++++++++++++++++++ ...mate-0445de609fc885d2b170effe241e7510.yaml | 58 +++++++++++++++++++ ...mate-051c86487ea054ab8374342c3d7fd783.yaml | 58 +++++++++++++++++++ ...mate-235127c1445e6eee4f6de6fb13cf776e.yaml | 58 +++++++++++++++++++ ...mate-2b8f19b8c01bfb1b9a5352e232b91e8f.yaml | 58 +++++++++++++++++++ ...mate-40c38cbf6914f34e30e735daee9d90f9.yaml | 58 +++++++++++++++++++ ...mate-49026b84d0c7a958dfce935cb3d41d0b.yaml | 58 +++++++++++++++++++ ...mate-5f9c4587b984a64216df76781ce699a0.yaml | 58 +++++++++++++++++++ ...mate-61bcaa4eb5a8e67da44b4e8cf864a6f5.yaml | 58 +++++++++++++++++++ ...mate-6211c1f22472d646cc232f92f882834f.yaml | 58 +++++++++++++++++++ ...mate-63222bd033aa9c6bf238fe6f7d23725d.yaml | 58 +++++++++++++++++++ ...mate-7485c7376b8dcdbe05490b2d21b9e0de.yaml | 58 +++++++++++++++++++ ...mate-88b0cb27fd508341f3181a16f7fa23a3.yaml | 58 +++++++++++++++++++ ...mate-9485da9dcc7a2c1f998297394d9f2737.yaml | 58 +++++++++++++++++++ ...mate-aad87c0bfd109df2ae9940475ba0f22b.yaml | 58 +++++++++++++++++++ ...mate-b0748dc23e38f40e5e4a1c508a030889.yaml | 58 +++++++++++++++++++ ...mate-b5878d0522eaa3cc7d6330e71db266d0.yaml | 58 +++++++++++++++++++ ...mate-cdab814f5acb52d3219d4930f7ee1f81.yaml | 58 +++++++++++++++++++ ...mate-dbe0cc2eb5dbae77d4244d0de7839b9b.yaml | 58 +++++++++++++++++++ ...mate-dca1a97a6a5540d73d22b80fbffbb729.yaml | 58 +++++++++++++++++++ ...mate-e188a014b244e93ae49b1e82bb73babe.yaml | 58 +++++++++++++++++++ ...mate-edf5537839b9111e9296303d5a76a556.yaml | 58 +++++++++++++++++++ ...mate-f46955793d003bf5208172175382fed1.yaml | 58 +++++++++++++++++++ ...cros-7c4f098f276bb438e8b06c67cf08748e.yaml | 58 +++++++++++++++++++ ...-url-1b17b31db5584b79d66232be582b7de6.yaml | 58 +++++++++++++++++++ ...-url-258545baa917b7571f477b428889162e.yaml | 58 +++++++++++++++++++ ...-url-6098ffaf0f2018e72b2fddb1b0994b64.yaml | 58 +++++++++++++++++++ ...-url-b16f37785fe5e86af56a0da58078826e.yaml | 58 +++++++++++++++++++ ...-url-cd46d97404c66642d7eaa5afb0766ece.yaml | 58 +++++++++++++++++++ ...-url-e61dc6652abcb067051b61e901442c72.yaml | 58 +++++++++++++++++++ ...-url-ed44a5e289d05299409a4dd60c060b57.yaml | 58 +++++++++++++++++++ ...ages-0cf023eb74228b9523fd8b71152bf7de.yaml | 58 +++++++++++++++++++ ...ages-40682ba05fa0921516b4be5a1906460e.yaml | 58 +++++++++++++++++++ ...ages-53f8d45b4de3c175288d6c924b71f816.yaml | 58 +++++++++++++++++++ ...ages-a49400e133fec50151a4f33acb299a5e.yaml | 58 +++++++++++++++++++ ...-css-d937680a60653a1af5b2a6c9c069ec41.yaml | 58 +++++++++++++++++++ ...iser-be0e8faaebc12ffdded98e3e60be9390.yaml | 58 +++++++++++++++++++ ...iser-edd7c00369ad56e0646da80d37cfae3b.yaml | 58 +++++++++++++++++++ ...page-48a0237cfe1dbdec835c8ee992606292.yaml | 58 +++++++++++++++++++ ...pand-de70b1243fed8f47eec92e24941c2439.yaml | 58 +++++++++++++++++++ ...pand-f122002b6d51991b7a2676304d17940e.yaml | 58 +++++++++++++++++++ ...osts-0e821b289513241b63396beff87653b4.yaml | 58 +++++++++++++++++++ ...zpro-1cb173d5c34f023836f0c32128d87847.yaml | 58 +++++++++++++++++++ ...zpro-21b56747ef932af6a293d705a4f1c993.yaml | 58 +++++++++++++++++++ ...ress-f1dda6bcbed7eecbc2cee8a7403b412e.yaml | 58 +++++++++++++++++++ ...form-503833e43a0634ab7984563e9c441bb9.yaml | 58 +++++++++++++++++++ ...erce-5dc88e8bebac4fb35e29ff329ac029fd.yaml | 58 +++++++++++++++++++ ...erce-d432100581e1c6943b259719e2daead5.yaml | 58 +++++++++++++++++++ ...erce-ef1305fc1419b96443cd5e83467ca803.yaml | 58 +++++++++++++++++++ ...menu-5f3c1d80f50fc6780cc9be3d160231a8.yaml | 58 +++++++++++++++++++ ...lite-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...lite-081b5b67d5d1d150a8961aa511991ad2.yaml | 58 +++++++++++++++++++ ...lite-58b47ebea36b65f50bab513dec8fd081.yaml | 58 +++++++++++++++++++ ...lite-fdccd6b56f7fe69b11c256c29780a2ae.yaml | 58 +++++++++++++++++++ ...lite-fe8e75c60168f65685f1418c9d95c3e6.yaml | 58 +++++++++++++++++++ ...dder-eefcf68c0de93fc8b650bb6a4fb470d9.yaml | 58 +++++++++++++++++++ ...ager-8fe609dfcf914f85364a28e0762bd9d8.yaml | 58 +++++++++++++++++++ ...blog-85bcd61b96548b75a4bebce0af8ade18.yaml | 58 +++++++++++++++++++ ...eets-20e759b7f6b75ab3b1e69a94701cd5a5.yaml | 58 +++++++++++++++++++ ...eets-56fc7e10ac8b22881c3f0ca008407e33.yaml | 58 +++++++++++++++++++ ...eets-c68fc62b3d163e900a125613050369e5.yaml | 58 +++++++++++++++++++ ...eets-df5624fcfc60e06a94f15a6af052be53.yaml | 58 +++++++++++++++++++ ...osts-004512741c42cbbce92c569c825c6150.yaml | 58 +++++++++++++++++++ ...osts-2474a94365b10412bcdef71534b7cdd2.yaml | 58 +++++++++++++++++++ ...eren-ff7129c5c489e7620ff9948f47fc6a7b.yaml | 58 +++++++++++++++++++ ...ects-0a3a5e7befa978af91189dd0693b7678.yaml | 58 +++++++++++++++++++ ...ects-129397ab97060ab9e51308f171e27b82.yaml | 58 +++++++++++++++++++ ...ects-6dffe3576454f2a64f00311b905d034a.yaml | 58 +++++++++++++++++++ ...ects-92f8dddef0caee0f45322f38c33da40e.yaml | 58 +++++++++++++++++++ ...ader-3c9cb9c40163b96bf6d0686c6178a29c.yaml | 58 +++++++++++++++++++ ...ader-561657a1d8eb71d24910435f19187999.yaml | 58 +++++++++++++++++++ ...ects-da9748807dbda454b45fa581681ad9a2.yaml | 58 +++++++++++++++++++ ...ects-dfc0dcf8b3d813272459721cf312f589.yaml | 58 +++++++++++++++++++ ...ects-f2f204b71c27258d8bc3636a9cf0d080.yaml | 58 +++++++++++++++++++ ...osts-268fe7ccb3ae756c66592ca513b99e93.yaml | 58 +++++++++++++++++++ ...ange-5dcc472de5e4f87aebcc632749f7aaa7.yaml | 58 +++++++++++++++++++ ...ager-09660999cf2e1317d729c3b722d62caa.yaml | 58 +++++++++++++++++++ ...ager-0f6c840a3fb64dbbf3be23d21800f577.yaml | 58 +++++++++++++++++++ ...ager-975e95579a2458f3541a3c52ec1cdb1c.yaml | 58 +++++++++++++++++++ ...ager-9ef58392cce08c654034b90fbf742ce5.yaml | 58 +++++++++++++++++++ ...ager-c16d7e5e9f240793779b7bb14373632e.yaml | 58 +++++++++++++++++++ ...ager-dd9ac89fd471fa2e15cbd7416ec1c978.yaml | 58 +++++++++++++++++++ ...ager-eea091db60550f784f9a2d189bb3b4f1.yaml | 58 +++++++++++++++++++ ...chat-1bbd8f2ed08db0b77690cb0df76fdffe.yaml | 58 +++++++++++++++++++ ...chat-2181575a0cd142c1833c1ffdc36fbeb4.yaml | 58 +++++++++++++++++++ ...chat-6d7a079131a28ced1afc399eed5de96c.yaml | 58 +++++++++++++++++++ ...chat-8097ab26da9158c6ac8991a667833327.yaml | 58 +++++++++++++++++++ ...chat-c6329477c32be141bd1ef013c37024ea.yaml | 58 +++++++++++++++++++ ...-box-4c2b5bad649e24fd03a9941d8a2a227e.yaml | 58 +++++++++++++++++++ ...-box-d6de8501bae90885b4cfb5ea79dec80a.yaml | 58 +++++++++++++++++++ ...ckup-898cc6b047f3aedcaae44caf9cb46034.yaml | 58 +++++++++++++++++++ ...nner-292e0cc17029954da0392c71fc757409.yaml | 58 +++++++++++++++++++ ...nner-cc890ca86d59bec43888764af28bac9a.yaml | 58 +++++++++++++++++++ ...nner-decbeaef5c23a80c05557edd9e92444e.yaml | 58 +++++++++++++++++++ ...form-24b6c342cef1d8274544190481da6dc0.yaml | 58 +++++++++++++++++++ ...form-8b606c34ee5d9927b9ffc892e04d01c1.yaml | 58 +++++++++++++++++++ ...olio-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...olio-542985c679cbc99f40cd1241c2489438.yaml | 58 +++++++++++++++++++ ...cets-600b942b044271afb765e6ae63286c52.yaml | 58 +++++++++++++++++++ ...card-38f522639c782f75ecbda00625777030.yaml | 58 +++++++++++++++++++ ...card-c207cf3269409384bfc7adaacb440036.yaml | 58 +++++++++++++++++++ ...ator-440da6ea620b4f0e53a03bec13770ad3.yaml | 58 +++++++++++++++++++ ...ator-aaaedc139789465865fcfb0738c02925.yaml | 58 +++++++++++++++++++ ...tile-0591772600d7345412c5914adc415e3f.yaml | 58 +++++++++++++++++++ ...rter-797076b6d5e9db4c8f8d40e3e026648b.yaml | 58 +++++++++++++++++++ ...iles-a772a1bfbb77e4750a15c026120428cc.yaml | 58 +++++++++++++++++++ ...data-740c2a0d357fce3bff875d5d58b6f9d4.yaml | 58 +++++++++++++++++++ ...data-fe349fb095cfb7a6ef8e1ff393fda6e6.yaml | 58 +++++++++++++++++++ ...code-1d37800259dd9a7caaaf8879496d00f2.yaml | 58 +++++++++++++++++++ ...nter-a54fbae2de8a8e13d0527ba702d34945.yaml | 58 +++++++++++++++++++ ...itor-19ad328fea959219a0ccf5d117ad75c7.yaml | 58 +++++++++++++++++++ ...itor-49034c31f1dba0715c18246f4dd38cde.yaml | 58 +++++++++++++++++++ ...itor-5017a561b2bec42e777a79d3e7f73798.yaml | 58 +++++++++++++++++++ ...itor-5814be735a5f5cee00bab9378ee0cbea.yaml | 58 +++++++++++++++++++ ...itor-59401ea9ce38d0433cad6f039547d860.yaml | 58 +++++++++++++++++++ ...itor-5d5eee8781ce2674b2c2c40cb2fcc273.yaml | 58 +++++++++++++++++++ ...itor-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml | 58 +++++++++++++++++++ ...itor-9b6bff957c02c5adaec64684fd5bd810.yaml | 58 +++++++++++++++++++ ...itor-b170f8ef7c7061e6ad33e8f3d3426766.yaml | 58 +++++++++++++++++++ ...itor-bbc8a2a1421137b76670971e66f228ca.yaml | 58 +++++++++++++++++++ ...itor-d77dd6f710585ae9ffaedbfddc152d76.yaml | 58 +++++++++++++++++++ ...itor-f2c626818640778246ca3c4d6d3ce648.yaml | 58 +++++++++++++++++++ ...itor-fe4a2b77904ea26c425ce24d00765709.yaml | 58 +++++++++++++++++++ ...form-8f5233bb2f72d4a8a72b4725ffa80041.yaml | 58 +++++++++++++++++++ ...cart-b9227c21bfafb1eba2c9f59a2176e5a7.yaml | 58 +++++++++++++++++++ ...code-b2367564b8e810af49ec2f68b7f40f1d.yaml | 58 +++++++++++++++++++ ...nner-0c7da527d5c5020bdc519d1c19025768.yaml | 58 +++++++++++++++++++ ...nner-0e3b2109a8f3c98e6d7b288936c49e4a.yaml | 58 +++++++++++++++++++ ...ndar-6cfd85b37acb634912f405192489654f.yaml | 58 +++++++++++++++++++ ...ndar-d3d0ad8926aafa9beab7b5840f982076.yaml | 58 +++++++++++++++++++ ...ugin-0fc896a4acc44efa8900b336ff580b9b.yaml | 58 +++++++++++++++++++ ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ests-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...elds-272ee2a329a8d2a28bce41429783dc10.yaml | 58 +++++++++++++++++++ ...elds-8ee30668d728aabff36c7b1c3fc51930.yaml | 58 +++++++++++++++++++ ...elds-cac4a2326e31475991ad4983e2696f4e.yaml | 58 +++++++++++++++++++ ...ader-f7783b1b95259bfc99e8cabc59fcdb30.yaml | 58 +++++++++++++++++++ ...list-0bf86b2d6edcb55bd09f7e32e0eeb2ec.yaml | 58 +++++++++++++++++++ ...list-1035cac119c2deeb77e8b4fd1a309012.yaml | 58 +++++++++++++++++++ ...list-1057cae23f85520832f9b7c2f9fe55c7.yaml | 58 +++++++++++++++++++ ...list-12458527208bedb32b3812054b29eb28.yaml | 58 +++++++++++++++++++ ...list-14ceaddf4e0a3ca100c27db5abbea3a5.yaml | 58 +++++++++++++++++++ ...list-5be7a97c9b94c45be28a2be5c28c5d40.yaml | 58 +++++++++++++++++++ ...list-99f94d5f6f5961794646e333f2e12898.yaml | 58 +++++++++++++++++++ ...list-ca0b8d3a53c8c8a234faae7fa7f12350.yaml | 58 +++++++++++++++++++ ...list-d2fe1c961f4314cb633d294e6983652b.yaml | 58 +++++++++++++++++++ ...list-f1ab2ba9aab33ab61ed9ab0dbb6a8c74.yaml | 58 +++++++++++++++++++ ...ideo-ec78e7994dbd34ffd9cacf3cd9b3ffa4.yaml | 58 +++++++++++++++++++ ...orum-cb19aa38112af2f12cff55ba678ad12d.yaml | 58 +++++++++++++++++++ ...ogin-6882049d71ccbb0177ed642930a8f0f7.yaml | 58 +++++++++++++++++++ ...isit-5d0daee3984605beba0293322e7ea274.yaml | 58 +++++++++++++++++++ ...tory-29ab8049cd5f90b5e3925c4324e6bd1d.yaml | 58 +++++++++++++++++++ ...tory-4a300ce6f6f831fce9cb1c19680cdfa4.yaml | 58 +++++++++++++++++++ ...tory-db642edfb58e0acb6106afe687e6b897.yaml | 58 +++++++++++++++++++ ...cons-77fadf9a7971f3244b33864c9a81256e.yaml | 58 +++++++++++++++++++ ...rame-b7ed33471f1469ef97fb3b870c3b3d8e.yaml | 58 +++++++++++++++++++ ...ator-ea364a8fa3fc256e34217f6289a9b8fd.yaml | 58 +++++++++++++++++++ ...opup-5bcd1f7720b268a32568c458d817b9bf.yaml | 58 +++++++++++++++++++ ...opup-8279425e8ad5b9257ee709bdcae15c73.yaml | 58 +++++++++++++++++++ ...-ban-288abda2cfd9da64eaad068ba5d6f96e.yaml | 58 +++++++++++++++++++ ...oard-020ad3f8f39e050397b159e81ed4f1b3.yaml | 58 +++++++++++++++++++ ...oard-0fc41c225cd6f2ddbf5e247314d75c25.yaml | 58 +++++++++++++++++++ ...oard-290105b1777b3869c2f6dcc0140c3419.yaml | 58 +++++++++++++++++++ ...oard-38572faa042f019158c1451d2a7c5d7f.yaml | 58 +++++++++++++++++++ ...oard-59d448dc5105924595fdd539b0bfe7c6.yaml | 58 +++++++++++++++++++ ...oard-661f3aae79018666cdd8577c9c2b3176.yaml | 58 +++++++++++++++++++ ...oard-77686428a77d266ce22bfe59b8ab3fea.yaml | 58 +++++++++++++++++++ ...oard-c2ff28d160f20eabee177d8a2b7b09d9.yaml | 58 +++++++++++++++++++ ...oard-d3e97b172914a58ea06088d46e467be0.yaml | 58 +++++++++++++++++++ ...ogin-3ada0767be249ce4ccbdfd9339b2ad7e.yaml | 58 +++++++++++++++++++ ...ogin-8fbdf0ef245a8769540801975b5c209f.yaml | 58 +++++++++++++++++++ ...lery-e6650062a97ccf46abe2dbd6696321ce.yaml | 58 +++++++++++++++++++ ...tory-015dffa63b4d6620c92e5c35b6af39d2.yaml | 58 +++++++++++++++++++ ...tory-79157f424e30fa185835500ed275b892.yaml | 58 +++++++++++++++++++ ...tory-7c915245e6d34ca005ac6f0296c41e2a.yaml | 58 +++++++++++++++++++ ...tars-39a5dd9e98d6f265b6feec05166e7c4e.yaml | 58 +++++++++++++++++++ ...tars-bc55ea7b509124d1a77831d4400c5030.yaml | 58 +++++++++++++++++++ ...tars-c3dca1d1ef3a946c9ddf3e33caa00021.yaml | 58 +++++++++++++++++++ ...-log-12a03041cb4314274c121ed3640d2d05.yaml | 58 +++++++++++++++++++ ...-log-dccb2fad351753e7b3f64d92b4c6eda7.yaml | 58 +++++++++++++++++++ ...form-5a0364c13a90f16b0ef1e911c302d0f2.yaml | 58 +++++++++++++++++++ ...oder-af3f71c6cb2b4348d03bef1b2409408c.yaml | 58 +++++++++++++++++++ ...ails-6c5121c72e7c9f744eb347ac328d000e.yaml | 58 +++++++++++++++++++ ...ship-0e0241755c24b40325ed6519b8127a2f.yaml | 58 +++++++++++++++++++ ...ship-127d546d7f94ec42c9601b4f8349bbdc.yaml | 58 +++++++++++++++++++ ...ship-2f13e3a17e9723ee8fd643dcd4f4cb9b.yaml | 58 +++++++++++++++++++ ...ship-3097ab413126701a31b2c663342da851.yaml | 58 +++++++++++++++++++ ...ship-3586a3c704c10a9bba7bafa073bac863.yaml | 58 +++++++++++++++++++ ...ship-3af100998fbed69cbdecde044b4ff026.yaml | 58 +++++++++++++++++++ ...ship-492d26185e3f340adae3b16a9841dc89.yaml | 58 +++++++++++++++++++ ...ship-4ad519606c4e4a0ac9ad3558c99fc1da.yaml | 58 +++++++++++++++++++ ...ship-4ae0743589a43c31ae78715c1bb792c2.yaml | 58 +++++++++++++++++++ ...ship-59892014ec81eb27e2ab381aff54e186.yaml | 58 +++++++++++++++++++ ...ship-74e01ccc109391de849c5a0cd8cc8167.yaml | 58 +++++++++++++++++++ ...ship-7928906e44428b2e974a49500a097fe0.yaml | 58 +++++++++++++++++++ ...ship-85baf9c84f251fb6b49e11a866b547fb.yaml | 58 +++++++++++++++++++ ...ship-a905027b9d2ec38752ee2efe0b3dd4df.yaml | 58 +++++++++++++++++++ ...ship-c287a1ab95bf7ac0c8652093f1dad2f5.yaml | 58 +++++++++++++++++++ ...ship-d6d556bb2d97483e57922ab9c509f981.yaml | 58 +++++++++++++++++++ ...ship-d87695af989823f3f60bb3499466b104.yaml | 58 +++++++++++++++++++ ...ship-db5dfd04511983fc7ceb561728d3d97d.yaml | 58 +++++++++++++++++++ ...ship-e1512d94164bf44f71f33d2c22c01840.yaml | 58 +++++++++++++++++++ ...ship-ee68d2b7440e6b2e6fe5023cb49039df.yaml | 58 +++++++++++++++++++ ...port-c2be66a7e8a99421d368476b2dea75ed.yaml | 58 +++++++++++++++++++ ...rect-8476462746ebfeabed27484bda97b80c.yaml | 58 +++++++++++++++++++ ...hart-5ed062a5fc9035bd7e1a852f98a93b1f.yaml | 58 +++++++++++++++++++ ...hart-7a420ee74601bcf08094df0c89e9ad5e.yaml | 58 +++++++++++++++++++ ...tion-f4f0364b52b62c50c67321424bfe5d46.yaml | 58 +++++++++++++++++++ ...ring-05c2167f7f1f78fa58c980d418931b2c.yaml | 58 +++++++++++++++++++ ...ring-1951707b594e6f4a4e8e4243b43c9841.yaml | 58 +++++++++++++++++++ ...ring-4ae509b53172b618cff3a0afd6c091e5.yaml | 58 +++++++++++++++++++ ...ring-bd26ccd939104e13f73f569b312459d6.yaml | 58 +++++++++++++++++++ ...tion-e261c5a60aee7d653735874a5f24eea5.yaml | 58 +++++++++++++++++++ ...ewer-03f092a688a4fa72580d80fe6ada5bb3.yaml | 58 +++++++++++++++++++ ...sage-b85cfdf152cc4ae0e3deb547dc1b6d6a.yaml | 58 +++++++++++++++++++ ...lery-8c2e6071ee4d4b147b6cf4ef074e12d8.yaml | 58 +++++++++++++++++++ ...lery-c565f2afdd0b7bcc15b5e1a59e0b33d0.yaml | 58 +++++++++++++++++++ ...ting-05c2167f7f1f78fa58c980d418931b2c.yaml | 58 +++++++++++++++++++ ...ting-48cf291038d407d0c14437de80bf836d.yaml | 58 +++++++++++++++++++ ...ting-73081b1f6f4e13a9e6e969eba5e746fc.yaml | 58 +++++++++++++++++++ ...ting-bc55ea7b509124d1a77831d4400c5030.yaml | 58 +++++++++++++++++++ ...ting-c3dca1d1ef3a946c9ddf3e33caa00021.yaml | 58 +++++++++++++++++++ ...opup-8a828053bf646bd38f0facf7c997017f.yaml | 58 +++++++++++++++++++ ...ages-37440742787d9f260ab4813dfe2d7c5e.yaml | 58 +++++++++++++++++++ ...tter-eb9f0a8e4e92fb7cae75094dbbc288ce.yaml | 58 +++++++++++++++++++ ...lery-ace70e46c2c11dce25895020e8f9ce37.yaml | 58 +++++++++++++++++++ ...post-79a115d0225d5e6109d2bfb5d804fc26.yaml | 58 +++++++++++++++++++ ...lery-dd18adf97d60be295e46212698edf568.yaml | 58 +++++++++++++++++++ ...otes-ae1d09ace0c5a27260a5b15fa0f15e71.yaml | 58 +++++++++++++++++++ ...otes-fe9aa9fc4f7853d3cc97f567a43935dd.yaml | 58 +++++++++++++++++++ ...ails-a4aa366f217005e74322ff2bf7a0e182.yaml | 58 +++++++++++++++++++ ...cker-9431aa52549a30a720033bb06c5049ca.yaml | 58 +++++++++++++++++++ ...cker-f09df8170b914522627f58aeacdfb8a8.yaml | 58 +++++++++++++++++++ ...tion-2ccafd0bfa63eb3f14f0d41c56ae0ce0.yaml | 58 +++++++++++++++++++ ...tion-64c2c780c319f550380bf0e9ebd98976.yaml | 58 +++++++++++++++++++ ...ck-4-b3837018bee9dc0f25b1197bd329be87.yaml | 58 +++++++++++++++++++ ...lery-0be4bbe081fe5b1039259f84286874e7.yaml | 58 +++++++++++++++++++ ...rict-aa5a6a671fb5da473aaf8781afbfa3bd.yaml | 58 +++++++++++++++++++ ...enus-ff68da2306359b7fb7d2ec7bcba42c9a.yaml | 58 +++++++++++++++++++ ...lete-e8203a29d9dd8569fe66a5c0b614fae4.yaml | 58 +++++++++++++++++++ ...tory-9d4cfba6200e394cef32d487f65ab9e2.yaml | 58 +++++++++++++++++++ ...rity-2c08e7ca2855464050481f48ae1d114f.yaml | 58 +++++++++++++++++++ ...dder-0e06afa272317d9b882c9a62ae6109b4.yaml | 58 +++++++++++++++++++ ...dder-47569f4c91357650e1a29f2c2f2817fe.yaml | 58 +++++++++++++++++++ ...dder-6b9a4af9881f034177e75898019a5215.yaml | 58 +++++++++++++++++++ ...dder-934f2b643137558d27d763ac97da6357.yaml | 58 +++++++++++++++++++ ...dder-ce6741d54beed2d67ba4497c046c28fc.yaml | 58 +++++++++++++++++++ ...tton-ab84cffde93b8e75b3b5fbb96c93d333.yaml | 58 +++++++++++++++++++ ...-edd-c110f3311248c25cc2e6e53a20d9f8d7.yaml | 58 +++++++++++++++++++ ...rify-401f06c28c1cd430ed4024172948f5b4.yaml | 58 +++++++++++++++++++ ...emap-1523648bd0f24adc2a26d45bbae47ace.yaml | 58 +++++++++++++++++++ ...emap-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ider-c8de5b2d5272ca0aa0591b883e38753b.yaml | 58 +++++++++++++++++++ ...-ssp-596c1534922e10c637aff8c9e7564a21.yaml | 58 +++++++++++++++++++ ...ager-a60c5d49ef21710901095695504b7608.yaml | 58 +++++++++++++++++++ ...ager-f09c7ceacd429aa043a57b7468959d50.yaml | 58 +++++++++++++++++++ ...late-59c7d1a679853ce7b01d642a9cdae84d.yaml | 58 +++++++++++++++++++ ...tons-12ff7814319c3fed879573cad73d612b.yaml | 58 +++++++++++++++++++ ...tons-40fcf644d2fbb45e473e3839f27d17b7.yaml | 58 +++++++++++++++++++ ...tons-7f383db1332d5a58a59f192dff645bd4.yaml | 58 +++++++++++++++++++ ...tons-84af63ce54f1aff066c5cbc0224ece1e.yaml | 58 +++++++++++++++++++ ...tons-89e9193b1c972a396e2f39602a9c0962.yaml | 58 +++++++++++++++++++ ...tons-fa41e1fa9c47147fc51a8bf59061fdaf.yaml | 58 +++++++++++++++++++ ...arch-dad17a0f7cc6bf4dce65968822857b48.yaml | 58 +++++++++++++++++++ ...hips-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...list-065f57f30aadd88480dc295cfdb7429a.yaml | 58 +++++++++++++++++++ ...list-7d02fb68117844792850ad968e93d6a6.yaml | 58 +++++++++++++++++++ ...list-f7b0dea7fdc53cc395c11a147701c107.yaml | 58 +++++++++++++++++++ ...oter-e689aa17f6bf2fdc2c6603a9014c4c60.yaml | 58 +++++++++++++++++++ ...sult-02a688a26a04ec997a303637d53b9750.yaml | 58 +++++++++++++++++++ ...sult-1e87bae656b2627d83b3d372f1614a11.yaml | 58 +++++++++++++++++++ ...sult-fbd5307588c0ac8cc334e800f9e7068d.yaml | 58 +++++++++++++++++++ ...stem-cf523f7ef0e6572480c576e8223b6d77.yaml | 58 +++++++++++++++++++ ...ager-51cc1e2fa9b76200d8c0e1cffbbd6dc5.yaml | 58 +++++++++++++++++++ ...tags-1b628b6e919f163c78dec1ae22685875.yaml | 58 +++++++++++++++++++ ...tags-4c56b6bb234842fef87202ea54089581.yaml | 58 +++++++++++++++++++ ...tags-62ca43337bd991ee98ecbcd228da04f1.yaml | 58 +++++++++++++++++++ ...tags-9af4513a0f46be16e18750162e487d0e.yaml | 58 +++++++++++++++++++ ...tags-dbd78c6bc37635ee7558d00a91a8165a.yaml | 58 +++++++++++++++++++ ...tags-f897c75665f54f7b712469c3a1014b0b.yaml | 58 +++++++++++++++++++ ...r-wp-0564976f3c6b024a77575f33f874aa48.yaml | 58 +++++++++++++++++++ ...case-af9704a1a0aaec6b76168fbe08955226.yaml | 58 +++++++++++++++++++ ...case-f4692d4ecdfbe84f92ac77014c0e0a83.yaml | 58 +++++++++++++++++++ ...ions-d24630671f65fdbbb367bb893bfade3c.yaml | 58 +++++++++++++++++++ ...cker-6007724142dc6c51f92be093926036d0.yaml | 58 +++++++++++++++++++ ...tips-0a74f9768178c52be7335a4414a065a0.yaml | 58 +++++++++++++++++++ ...tips-6284e6441b25b9ea2f8b947793590242.yaml | 58 +++++++++++++++++++ ...weet-0cd1e08a1b0cf9639f9192490f465d8f.yaml | 58 +++++++++++++++++++ ...weet-27310a1dc2397e2cac54db00506a62d4.yaml | 58 +++++++++++++++++++ ...urls-15bda1e21fcfc4331fee33475b186388.yaml | 58 +++++++++++++++++++ ...urls-2b45864828a1aff6937ee7dc2951db60.yaml | 58 +++++++++++++++++++ ...urls-5110a92cba7ac370f8a4c5806d1c585c.yaml | 58 +++++++++++++++++++ ...urls-675d927de3b1b53ecaa9209929290da6.yaml | 58 +++++++++++++++++++ ...urls-ada2b4fe98d8efc08dd626edec328d75.yaml | 58 +++++++++++++++++++ ...urls-f2a5202240be9077b802b53424bd6267.yaml | 58 +++++++++++++++++++ ...ting-8fb6f9883fb5a7c53db96c756412e908.yaml | 58 +++++++++++++++++++ ...dder-f34299764af595ef815c30af6bd496f7.yaml | 58 +++++++++++++++++++ ...stat-c6a09e1ae4216b85c7cb7a2c1a13117a.yaml | 58 +++++++++++++++++++ ...ader-ebfae304236d531958d5ca860f60e6f8.yaml | 58 +++++++++++++++++++ ...emap-59259dfce205e3430d84312173c09724.yaml | 58 +++++++++++++++++++ ...hive-d3f480cf02dc331ee92b8ba5f6c29338.yaml | 58 +++++++++++++++++++ ...sive-a8a2129053b6265336aaeb65bc0c164a.yaml | 58 +++++++++++++++++++ ...ickr-cf071fc2ff7ad6812b023519dad9013e.yaml | 58 +++++++++++++++++++ ...life-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml | 58 +++++++++++++++++++ ...emap-50af53f1d764e968928a866f51c31158.yaml | 58 +++++++++++++++++++ ...smcf-96b2063a0950eb9d73bc44532d96a2af.yaml | 58 +++++++++++++++++++ ...ress-1385e98bb73a78a4b3298f9d107fe144.yaml | 58 +++++++++++++++++++ ...ress-31ce7b8320b2e27875e4234cacbc73eb.yaml | 58 +++++++++++++++++++ ...ress-3f6009b49c4de5d656c7bafec85eed5e.yaml | 58 +++++++++++++++++++ ...ress-41182a8a3c15b1cd38397763553e436b.yaml | 58 +++++++++++++++++++ ...ress-64b8d0d829a31289bbb915ba2b2eb077.yaml | 58 +++++++++++++++++++ ...ress-6673123aea5f3dacd5949ff035699808.yaml | 58 +++++++++++++++++++ ...tion-66b6ce3815a5720d174a72208f049b60.yaml | 58 +++++++++++++++++++ ...p-cz-b6921c4c41be466e80b527433949b2cd.yaml | 58 +++++++++++++++++++ ...p-cz-ebdc4e179afbae0e73d5291d7befe15e.yaml | 58 +++++++++++++++++++ ...tent-f60018e6fdebf8ed4334a970a3e624c1.yaml | 58 +++++++++++++++++++ ...form-144725995c15dd892b47406937b4c8c9.yaml | 58 +++++++++++++++++++ ...form-669be7a13bf58d1940739fe39615ab4b.yaml | 58 +++++++++++++++++++ ...rpts-01f45554766c9d4c4656369fac530065.yaml | 58 +++++++++++++++++++ ...lude-9035cd59a4944d047d13b61802d65e13.yaml | 58 +++++++++++++++++++ ...lock-11813679c9659f7e86b27269316b1760.yaml | 58 +++++++++++++++++++ ...lock-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lock-e8011af8e84e91734034cab87d49e815.yaml | 58 +++++++++++++++++++ ...poll-cf17297c2e5d307d7deaa74f22821404.yaml | 58 +++++++++++++++++++ ...ents-2a22d89645a206ec3980a097270f17eb.yaml | 58 +++++++++++++++++++ ...ents-4875a2fe8d20d1fa49a472eba79255a0.yaml | 58 +++++++++++++++++++ ...ents-8913b61e532a835b143f97f633aefd8d.yaml | 58 +++++++++++++++++++ ...ents-97337e0bb5451938a58c2c753a687598.yaml | 58 +++++++++++++++++++ ...ents-c38981be41bbef7485b5eec0cd09e15d.yaml | 58 +++++++++++++++++++ ...ents-f9c99e185c0c70242a4641a50c06e0c6.yaml | 58 +++++++++++++++++++ ...ents-fb1f94792250765f89467bf81e536614.yaml | 58 +++++++++++++++++++ ...atic-7a5d96cd355dcc2c5701c024f2ba7043.yaml | 58 +++++++++++++++++++ ...atic-ee067e98831efc015954686b9f2f926b.yaml | 58 +++++++++++++++++++ ...ntor-4db0da089db1959632856d530ba9ce1d.yaml | 58 +++++++++++++++++++ ...ntor-5549387f2d45c534d6b21b6c2a38d654.yaml | 58 +++++++++++++++++++ ...ntor-85fafc88eba7f097874b28a387304352.yaml | 58 +++++++++++++++++++ ...ntor-9a44744af3993590fe3bf014b0ad32e9.yaml | 58 +++++++++++++++++++ ...ntor-e224a4cb8b7e311ea14d699136e59c51.yaml | 58 +++++++++++++++++++ ...rter-e9772ee13db7edf1a8985c488222cdb7.yaml | 58 +++++++++++++++++++ ...ient-d5d7eb75824b8adafca40c78e85d9d96.yaml | 58 +++++++++++++++++++ ...lery-612c6db228099d10e3e66678f293335f.yaml | 58 +++++++++++++++++++ ...sirv-0e449c9a497e53b142f5674fb22e2a1f.yaml | 58 +++++++++++++++++++ ...sirv-20f2364245cca99badf62beb26ca57f1.yaml | 58 +++++++++++++++++++ ...sirv-28a2dfdb4b89718535fa7dedda6260e9.yaml | 58 +++++++++++++++++++ ...sirv-56de812058629ef41442e0db5d74e172.yaml | 58 +++++++++++++++++++ ...sirv-6ccadf7e1366ca3249cc5950850c4bdc.yaml | 58 +++++++++++++++++++ ...sirv-da89f8a86000f654eccfee96ffe3f6a3.yaml | 58 +++++++++++++++++++ ...ball-1d1308e4009a475d471dafd71ee14d32.yaml | 58 +++++++++++++++++++ ...ball-3230f7ba42466d011feb76d708212b0d.yaml | 58 +++++++++++++++++++ ...udit-e422a5cf5dae135dafe01672b0f3ffbc.yaml | 58 +++++++++++++++++++ ...itor-d269819cdfc64e9b2366e7d4a6d8de82.yaml | 58 +++++++++++++++++++ ...ugin-fcfe12c9ab0b540a8002a6b623d72f95.yaml | 58 +++++++++++++++++++ ...otes-a184b0331f3ba7e840ac7ff2eaf4f219.yaml | 58 +++++++++++++++++++ ...line-27d8a1199f49c828fd2eeb0b1780c2d6.yaml | 58 +++++++++++++++++++ ...line-4160c9c4da480f4b3c030b1d1b582ea6.yaml | 58 +++++++++++++++++++ ...line-f94ad2e40424de33128764065d19c984.yaml | 58 +++++++++++++++++++ ...iews-1d382a2cbfe1692803bdc9f5974b02e1.yaml | 58 +++++++++++++++++++ ...iews-27b5597908113501f4beb8489633cce4.yaml | 58 +++++++++++++++++++ ...iews-363cf849a90f39fbc05b59e8ab91a270.yaml | 58 +++++++++++++++++++ ...iews-5d6957b18909422bd5f841b070340ee6.yaml | 58 +++++++++++++++++++ ...iews-68354cec14dcc6c8c5561bd362f6a851.yaml | 58 +++++++++++++++++++ ...iews-a344469158b924b0533b76919c9daf70.yaml | 58 +++++++++++++++++++ ...iews-c2ad47353175f44f004de63cfd387b37.yaml | 58 +++++++++++++++++++ ...iews-db3e14a64935e9816ff1fc8cb2d49569.yaml | 58 +++++++++++++++++++ ...iews-dc0678502bda1f209b1b74a11263e93c.yaml | 58 +++++++++++++++++++ ...iews-f51b1e88d3f4e8a3ab51d6b13ceec3ec.yaml | 58 +++++++++++++++++++ ...iews-f8a3890c58a293ea8072e2174a632bd1.yaml | 58 +++++++++++++++++++ ...ents-a6ba1a0da5df7762bd146ece37b9f32b.yaml | 58 +++++++++++++++++++ ...ekit-1db1c2d5f1fad40eb6b6cd9715e502a3.yaml | 58 +++++++++++++++++++ ...ekit-50ade2845c53f4bbe684ddfabd1bfd64.yaml | 58 +++++++++++++++++++ ...ekit-d10ca8810c9a238a95e8c428f2cea03d.yaml | 58 +++++++++++++++++++ ...ick5-61a8c97249e7ba41d1f71a1052bb0639.yaml | 58 +++++++++++++++++++ ...emap-efa61bc9a560990c025c5047443643f6.yaml | 58 +++++++++++++++++++ ...ndex-e71a52c7f200dba2edfeb838eff9f8f3.yaml | 58 +++++++++++++++++++ ...nels-7b1460489673c879f7bd7cd256d22891.yaml | 58 +++++++++++++++++++ ...nels-7df5e5754fb5a3c3ef39f58481635571.yaml | 58 +++++++++++++++++++ ...nels-86d73827337d8244a557bb98a9e7b2f5.yaml | 58 +++++++++++++++++++ ...nels-e99c33f11f772bd71a3e435320a873d8.yaml | 58 +++++++++++++++++++ ...rm-7-2583927ebea3f6f03dee7ed526491728.yaml | 58 +++++++++++++++++++ ...-cms-15159729e5663620758ffbfa0eee6068.yaml | 58 +++++++++++++++++++ ...-cms-1695c167f694fa63c272f7b2c5254e2e.yaml | 58 +++++++++++++++++++ ...-cms-46fa110da1e59fdc31ecff31d6e6ec62.yaml | 58 +++++++++++++++++++ ...-cms-491308ff9993e601a9660084e0636c41.yaml | 58 +++++++++++++++++++ ...-cms-6692bd08a8b42e4b9b60d9c07beac88f.yaml | 58 +++++++++++++++++++ ...-cms-70ddb8ac3ce5b7c3fc2fb83f47b8e6a3.yaml | 58 +++++++++++++++++++ ...-cms-9389937eda8b2fc2252c70c4bad38de9.yaml | 58 +++++++++++++++++++ ...-cms-a1547a2e9b2e7ebf2c891fd062c403d1.yaml | 58 +++++++++++++++++++ ...-cms-a6e3a37b161efaa29dc8fd7f5584611e.yaml | 58 +++++++++++++++++++ ...-cms-a91445aaf81e735f1118d6cfce37548b.yaml | 58 +++++++++++++++++++ ...-cms-bf27f6ce9ebbfb831479a794b9f49858.yaml | 58 +++++++++++++++++++ ...-cms-fc97a63071c0bdeea490fe1b61f06d10.yaml | 58 +++++++++++++++++++ ...rger-4151801d30351f47d79a16fa8ebbfc4c.yaml | 58 +++++++++++++++++++ ...e-wp-9903b310d82da078ab37bcb7e6aa7858.yaml | 58 +++++++++++++++++++ ...azar-9c08f0f48da441b0237405decb3b5169.yaml | 58 +++++++++++++++++++ ...lder-b8c540477ad8f7b59e43be9ed6a57e18.yaml | 58 +++++++++++++++++++ ...ates-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dons-f0d3919ed390e73df44ed1542e1a826f.yaml | 58 +++++++++++++++++++ ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...atus-05ead7ef23623d246fc2b9a535b5761b.yaml | 58 +++++++++++++++++++ ...cial-8b895d6fff8c69659029604aec394ccf.yaml | 58 +++++++++++++++++++ ...eate-0b9b027562576dde68a9c5ee80494e44.yaml | 58 +++++++++++++++++++ ...dmin-04cfad21aa5454a8d771191b1d8fe82b.yaml | 58 +++++++++++++++++++ ...ices-3f2e88483cb032a762f3e5f925264d0f.yaml | 58 +++++++++++++++++++ ...ices-3f5afe1c06de95e459f12d16b7792b0b.yaml | 58 +++++++++++++++++++ ...ices-65575bb9311bc9f57fa766150b890bbc.yaml | 58 +++++++++++++++++++ ...cewp-17722d2484373a19ea1df8b15b8f0eea.yaml | 58 +++++++++++++++++++ ...cewp-1e57a0095a9d05c5ba61b4bee5ed304a.yaml | 58 +++++++++++++++++++ ...orms-5e71c24603564ca342c0b82fb64d9b20.yaml | 58 +++++++++++++++++++ ...opup-f2cee4c0f9afdf3e98814a937701d9b0.yaml | 58 +++++++++++++++++++ ...opup-fe295018c777f28527f026c1db66229d.yaml | 58 +++++++++++++++++++ ...tons-40d20dcfc0a9c20d06ce00b51231e085.yaml | 58 +++++++++++++++++++ ...menu-5644317bfa18cf11b8235cb40790b4ed.yaml | 58 +++++++++++++++++++ ...quiz-3395165ceb6b70322e35bead04697388.yaml | 58 +++++++++++++++++++ ...quiz-53a30d941da402857e0ee8cdb2011b69.yaml | 58 +++++++++++++++++++ ...ickr-46b167768e3cac0676fa19e5201075cc.yaml | 58 +++++++++++++++++++ ...hing-125fc22aa1fac173aaf79b805fc0dafc.yaml | 58 +++++++++++++++++++ ...hing-96440e1a43df69d4a2a108bd78a1d55e.yaml | 58 +++++++++++++++++++ ...hing-dba115ec2b96e48bab904dedd2103380.yaml | 58 +++++++++++++++++++ ...-pro-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...deck-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...eck2-5efee1538ea17e01965c435ea80717db.yaml | 58 +++++++++++++++++++ ...line-09f92d564944a33a7811dc40429fdb32.yaml | 58 +++++++++++++++++++ ...prox-5b04e98d5ed9360b3ebe4e58880d2319.yaml | 58 +++++++++++++++++++ ...stic-5a964b37d1f769e559a3b5969ea09bec.yaml | 58 +++++++++++++++++++ ...stic-63a1aadd7fd62f660af4d37169d1f541.yaml | 58 +++++++++++++++++++ ...stic-8e2647d10010d639fca262268ba703d9.yaml | 58 +++++++++++++++++++ ...stic-d94ab49d4d8adfed309a34be052981f9.yaml | 58 +++++++++++++++++++ ...tory-b04b6aa85a76ebddc71c9e203d10773d.yaml | 58 +++++++++++++++++++ ...tory-d5d65492c7b3878ca773e2f63b4a08a2.yaml | 58 +++++++++++++++++++ ...hero-3adbda03e672466ae4cf2477d48f1715.yaml | 58 +++++++++++++++++++ ...hero-4fef6f3c1b2c07adc38d4a7abbb8304a.yaml | 58 +++++++++++++++++++ ...hero-53fef4883b3ae390bd3ce74f9e9ddf6a.yaml | 58 +++++++++++++++++++ ...hero-f2a7736ebfea66ac36ad813725de381e.yaml | 58 +++++++++++++++++++ ...mage-d1752e9520f041ace82927039ac74f84.yaml | 58 +++++++++++++++++++ ...mage-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml | 58 +++++++++++++++++++ ...ages-ed271342f2446f50a4b4b39df1d986d6.yaml | 58 +++++++++++++++++++ ...show-091efbe9d1188b98a534caa4402e018b.yaml | 58 +++++++++++++++++++ ...show-4b10785e370a78ae1450447cedf61d9b.yaml | 58 +++++++++++++++++++ ...show-9cf47a9aaadc1341f9d7d43e1e7e02f2.yaml | 58 +++++++++++++++++++ ...show-ba96af4ca3ffeaa3bcc3879d978146cb.yaml | 58 +++++++++++++++++++ ...ideo-93c0b4806bb82af1f99b4d0c878535e6.yaml | 58 +++++++++++++++++++ ...r-wd-0f314421e3eb6001edc6ef983cf272a2.yaml | 58 +++++++++++++++++++ ...r-wd-330b086d5a163173ce80e7bcf35592b2.yaml | 58 +++++++++++++++++++ ...r-wd-3ca395cf4457963d99cc7df0953a3124.yaml | 58 +++++++++++++++++++ ...r-wd-f2f66b2c0dd30886e21fe41a945038db.yaml | 58 +++++++++++++++++++ ...rpro-55b1133e21935d007c80035f80fa6446.yaml | 58 +++++++++++++++++++ ...ders-cabe168b618270b5c6e54c5ab98ed27e.yaml | 58 +++++++++++++++++++ ...hare-9fb99305b4730cdc01315914158330a9.yaml | 58 +++++++++++++++++++ ...w-ck-315a1c5d119a58cae4d57802c27a1504.yaml | 58 +++++++++++++++++++ ...lery-073c0ab3bbb78673d0076b71747b0b85.yaml | 58 +++++++++++++++++++ ...lery-0c2f46d7d5137da04a7f7e4fef5f160b.yaml | 58 +++++++++++++++++++ ...lery-173ff175ba6504a9e007b9120074cdb1.yaml | 58 +++++++++++++++++++ ...ry-2-000c49df1eb1fffb19ba2879f7922470.yaml | 58 +++++++++++++++++++ ...lery-3930a563943aaf08712d2221306b606c.yaml | 58 +++++++++++++++++++ ...lery-3f761f29ded0c3fd592cbc7b4d2d4ba7.yaml | 58 +++++++++++++++++++ ...lery-44893e4f1aa00774102d61f70312168f.yaml | 58 +++++++++++++++++++ ...lery-4dd9a3ba0bea201c247a65cf330c4a19.yaml | 58 +++++++++++++++++++ ...lery-5e35179f25bd306b0effea20785c4fdf.yaml | 58 +++++++++++++++++++ ...lery-710832b220893c2e7b26cd41c7676342.yaml | 58 +++++++++++++++++++ ...lery-9ed3ad19217255e206c74e32650683d5.yaml | 58 +++++++++++++++++++ ...lery-a6e5defdd0b61862c997e167d9ee2576.yaml | 58 +++++++++++++++++++ ...lery-c799988a889ed03a659b8598e8dac08b.yaml | 58 +++++++++++++++++++ ...lery-ea214ec811be5112708a570a75f3ddc5.yaml | 58 +++++++++++++++++++ ...lery-f4f28ce30d47491a4cae733a861ef690.yaml | 58 +++++++++++++++++++ ...lery-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml | 58 +++++++++++++++++++ ...lery-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml | 58 +++++++++++++++++++ ...lery-631caed2c41cece190cfd835b6648401.yaml | 58 +++++++++++++++++++ ...lery-74a8ac0075a235e0a0c14b0719aab19b.yaml | 58 +++++++++++++++++++ ...lery-f45ce441ba6fd10c3e2bec3c1e3949b8.yaml | 58 +++++++++++++++++++ ...w-se-0d198fa5a9097295a41f947e62ed164f.yaml | 58 +++++++++++++++++++ ...w-se-4c2a731e32a3d9201839b73fb37eef51.yaml | 58 +++++++++++++++++++ ...cons-40737c0a7a095d43140be7cd03a62330.yaml | 58 +++++++++++++++++++ ...nder-5621a7def81227d66a22e352451dbd2f.yaml | 58 +++++++++++++++++++ ...izer-cd301beffca3145a1148fa46876e8ecb.yaml | 58 +++++++++++++++++++ ...nner-4d6efde8bb592c906d33a37bc632b9bf.yaml | 58 +++++++++++++++++++ ...nner-bc7de60f28ed50bda8c32e87282861c6.yaml | 58 +++++++++++++++++++ ...-kit-66eed7c58e1298fa04981c6c1b2ea3cc.yaml | 58 +++++++++++++++++++ ...elds-0d0a2f550b1652e990ebb3d0da6393ae.yaml | 58 +++++++++++++++++++ ...ions-183ebb9bdb87985c4ca10ea8af8836ec.yaml | 58 +++++++++++++++++++ ...ions-37dbc4d1c954090682035935efde0d58.yaml | 58 +++++++++++++++++++ ...ions-575d541f48b602d18582347a4f3b977f.yaml | 58 +++++++++++++++++++ ...ions-6f7b5cdd2c06fd389f02600d38bca12e.yaml | 58 +++++++++++++++++++ ...ions-974f0ab4bb265d59dbd405aba4fe0b7a.yaml | 58 +++++++++++++++++++ ...ions-a9d63cf96793705be5a47f94a1b589be.yaml | 58 +++++++++++++++++++ ...erts-ceb6447b3a16776fe0078a55abeaee38.yaml | 58 +++++++++++++++++++ ...-flv-f4124706d0e19c3b0ecdc824e2dde79c.yaml | 58 +++++++++++++++++++ ...orms-280e3b3d0994374de6814f38b2990648.yaml | 58 +++++++++++++++++++ ...orms-305aa37d733d46f38e2d556cd38a63ea.yaml | 58 +++++++++++++++++++ ...orms-3928f6f30c541722320412a9e71021b8.yaml | 58 +++++++++++++++++++ ...orms-96ab3b40e77e6543e8b3a6fdd1944579.yaml | 58 +++++++++++++++++++ ...orms-9c331f426cf6396a6a2c802b7f7eeb8d.yaml | 58 +++++++++++++++++++ ...orms-a4a6f5b9e735cb14d76827d4a578ff1c.yaml | 58 +++++++++++++++++++ ...orms-a78ee203ec03252165376f049d05071b.yaml | 58 +++++++++++++++++++ ...orms-c396dcb95eb5f0d3adb51913e8a502fc.yaml | 58 +++++++++++++++++++ ...orms-e55616747ddb7edf848ca48c3c65a365.yaml | 58 +++++++++++++++++++ ...rter-61d92e4ca30273cfa735fd279e1d5fd6.yaml | 58 +++++++++++++++++++ ...rter-8f4c726ec3ff968264c33031aafd5dd4.yaml | 58 +++++++++++++++++++ ...lery-9226076d86703169a8ae6d270bd5adc3.yaml | 58 +++++++++++++++++++ ...t-id-96cba560d28a367fadd5acf394466224.yaml | 58 +++++++++++++++++++ ...lite-32a522f1c04399b883d41fab9d9aff30.yaml | 58 +++++++++++++++++++ ...mode-9f6fe676338d7fcfeadb295b51a36459.yaml | 58 +++++++++++++++++++ ...erce-0489a9c545313d7845eb08297287eaa5.yaml | 58 +++++++++++++++++++ ...erce-51ad2e96cf8162f9d2be287019b590c3.yaml | 58 +++++++++++++++++++ ...r-wp-5d316e62377c24672c816fca478bdf84.yaml | 58 +++++++++++++++++++ ...dget-0b26b05fd72223ab78d0eb64dadbd40a.yaml | 58 +++++++++++++++++++ ...tool-8ac688a05969c32cd04eef86b8133c6f.yaml | 58 +++++++++++++++++++ ...tool-b76eb61ef2aa1f7567f1609609758512.yaml | 58 +++++++++++++++++++ ...show-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...show-c97035ebd849b96be34cf1445f8283fd.yaml | 58 +++++++++++++++++++ ...er-2-4e3fd84eb31659b1ac399191d2db7828.yaml | 58 +++++++++++++++++++ ...er-3-01aa5492a4b5bc7532a3a46a182927f8.yaml | 58 +++++++++++++++++++ ...er-3-39ab4c2294aa56f29beb5a701f23e19b.yaml | 58 +++++++++++++++++++ ...er-3-7fcf2911100968a88895e890aa0259dd.yaml | 58 +++++++++++++++++++ ...er-3-b789e3115d873b4f1d599f40302f434c.yaml | 58 +++++++++++++++++++ ...er-3-c9194ffc50bb3f8abe6f00ef14c4cdc5.yaml | 58 +++++++++++++++++++ ...er-3-f451ba2e71b9d178f196c4bee4c708ef.yaml | 58 +++++++++++++++++++ ...ages-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...vert-f6b44afa42d4e9ad47e5de4f61561c71.yaml | 58 +++++++++++++++++++ ...arch-517aef4b1533709bdbf95e8d657f10e6.yaml | 58 +++++++++++++++++++ ...tube-94622a9541e2d7c1e56d077f426d64ea.yaml | 58 +++++++++++++++++++ ...-seo-0f5c5f0145a23c33dd91c0c052718e6c.yaml | 58 +++++++++++++++++++ ...-seo-b9c11b54952021362ff03d2b884e46b9.yaml | 58 +++++++++++++++++++ ...ideo-eacbf719bf265fc7ee4ac85dd80a065a.yaml | 58 +++++++++++++++++++ ...tkit-43e0cd9b2e64838710c022fed726ad02.yaml | 58 +++++++++++++++++++ ...chat-681d5f2f15a561b04bf2e029cc02c5b4.yaml | 58 +++++++++++++++++++ ...ress-67cf82bcdd960b08b194bbfec613a24f.yaml | 58 +++++++++++++++++++ ...ress-714adebc0f79250fa11c7babb8af735a.yaml | 58 +++++++++++++++++++ ...gnal-43890f1f23768c00ae2a757d58110ef2.yaml | 58 +++++++++++++++++++ ...gnal-c0dc18b21bfa2b86d77830cf4a915b55.yaml | 58 +++++++++++++++++++ ...tons-c1380d1b7ef910c0603f14abaf611a7b.yaml | 58 +++++++++++++++++++ ...tons-ed5e303cb61bf4126d5ebc5c9cfb7c58.yaml | 58 +++++++++++++++++++ ...-ssl-3ea22c02a19639aa3b53bac3d8c83192.yaml | 58 +++++++++++++++++++ ...ider-5e7c4bc77fb9b2b637c41f55c55733f0.yaml | 58 +++++++++++++++++++ ...ider-60f28a7307d8376de999213f19e8d5bb.yaml | 58 +++++++++++++++++++ ...ller-2cf2ecadfdb85fc26b2f2d1670a74a60.yaml | 58 +++++++++++++++++++ ...odes-c3292186ff6270827e326f6eecd76002.yaml | 58 +++++++++++++++++++ ...lert-7c8a4badc44767125cd457fdcb3a6ffa.yaml | 58 +++++++++++++++++++ ...lert-d6a49c02628ddcb69bd8644362723660.yaml | 58 +++++++++++++++++++ ...-ovh-71d3c20a220713a113b92e288fcb3219.yaml | 58 +++++++++++++++++++ ...erce-a6b4638155101fd9dca73e44a2714579.yaml | 58 +++++++++++++++++++ ...ster-43a98edb387e539611a5da070feef314.yaml | 58 +++++++++++++++++++ ...mail-504075ccb58d6f87a992a01e113a99a6.yaml | 58 +++++++++++++++++++ ...mail-8790e1fe54b5de31a7c208c20bbec007.yaml | 58 +++++++++++++++++++ ...mail-9b2a41c17f324bc427373274ec0c74e7.yaml | 58 +++++++++++++++++++ ...mail-c45322aa4144e7836fe027084e2d3416.yaml | 58 +++++++++++++++++++ ...ueue-4f005a53f32a91b958c425e9676f1ab9.yaml | 58 +++++++++++++++++++ ...p2go-702ceb7e56323b84fbe97e278b8eb74c.yaml | 58 +++++++++++++++++++ ...ixel-778723489fb152c7cb9e920525174271.yaml | 58 +++++++++++++++++++ ...ixel-ed4eb2c4883d6e7594e77a8d9e41fb0a.yaml | 58 +++++++++++++++++++ ...maps-2c0772cee08d9dbe384d352f3239ef5e.yaml | 58 +++++++++++++++++++ ...heme-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...heme-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lets-4361e4878576bdb762f0e4fba9f0435f.yaml | 58 +++++++++++++++++++ ...lets-4db82812dea0cad0cb375ee4495ca7c3.yaml | 58 +++++++++++++++++++ ...lets-5f1f84d548433ea33fa547d3daa5b883.yaml | 58 +++++++++++++++++++ ...orms-4c37447306ccd460df466d06d390970b.yaml | 58 +++++++++++++++++++ ...ible-64658b8ae4088e2d2245fcf0b29be320.yaml | 58 +++++++++++++++++++ ...lugs-8f29322bf5d9ac8d382567725e776aae.yaml | 58 +++++++++++++++++++ ...ndle-81727806f0ca35ac1a1911812f8bc5ed.yaml | 58 +++++++++++++++++++ ...ndle-9b450d4afbc0c12b819c42370b2e9a09.yaml | 58 +++++++++++++++++++ ...ndle-c33a17581ea3c88326cc98d137f0e313.yaml | 58 +++++++++++++++++++ ...ndle-dee8b4970935a0806a128f5493b5e0f3.yaml | 58 +++++++++++++++++++ ...ndle-e42a9ef463fb91cd20488d17488f8aed.yaml | 58 +++++++++++++++++++ ...lite-b9c46b0a4fb09a909818464ef220a0fe.yaml | 58 +++++++++++++++++++ ...able-4c5051d5f52547e43ba1e2683a220c8c.yaml | 58 +++++++++++++++++++ ...-bio-0d0deecac2c086210a1797922eb618d1.yaml | 58 +++++++++++++++++++ ...pack-aa3e1a0b3ade1f54e4f5b1a7d2b7227c.yaml | 58 +++++++++++++++++++ ...nect-4382e753da7c1d916f58a427140d32b1.yaml | 58 +++++++++++++++++++ ...nect-c1236c0c6ab8ee5053b35b87bf461df3.yaml | 58 +++++++++++++++++++ ...plus-db555c53112ae6b4ac441d3b5a76ee6d.yaml | 58 +++++++++++++++++++ ...ions-d6c0976e89582e9e5113b1695c4b2cd6.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...tags-941b5bba10cb296e00cbfe0b3138a5d9.yaml | 58 +++++++++++++++++++ ...zoom-9590c9a713d41dcccd250e79c2d68a75.yaml | 58 +++++++++++++++++++ ...-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cker-6b8f7b7b7105323e383724ec1fbf543e.yaml | 58 +++++++++++++++++++ ...cker-a5378db9ff5e403b6611ab949a2e8073.yaml | 58 +++++++++++++++++++ ...-bws-70c3e0a35f7627ffa035ef5b1d41e423.yaml | 58 +++++++++++++++++++ ...n-wp-338164cecd8fcca43099976a3c20b294.yaml | 58 +++++++++++++++++++ ...lder-d57b4e44c91b72a924430dae58b27aa4.yaml | 58 +++++++++++++++++++ ...lbar-99651f4102212266ab89ea9f71ca952d.yaml | 58 +++++++++++++++++++ ...ther-1588d8e6d7413910cf24de603f48ae6c.yaml | 58 +++++++++++++++++++ ...ther-fb9c081792eb804457cb99e8fe8f106d.yaml | 58 +++++++++++++++++++ ...dget-276bb0253d9d90921d2b50bb63655a6a.yaml | 58 +++++++++++++++++++ ...dget-2a26b1ebd615a5a8ab227978499778fd.yaml | 58 +++++++++++++++++++ ...rics-6685df96c78b040fc19a70ee58d84842.yaml | 58 +++++++++++++++++++ ...tabs-b4a4ad1fab127bb574b5a124686073ff.yaml | 58 +++++++++++++++++++ ...er-g-00a3fc8db4a9ccf9c23a6b373ee7039a.yaml | 58 +++++++++++++++++++ ...er-g-0a3b3d0ea7c2929f39d0e12eda2eee2b.yaml | 58 +++++++++++++++++++ ...er-g-0d23421a7bc38a06fa339a0b7dfcab21.yaml | 58 +++++++++++++++++++ ...er-g-26e31433d5fce5f379c3acf232bae66e.yaml | 58 +++++++++++++++++++ ...er-g-51832005d17a1bf5560310c763dc4026.yaml | 58 +++++++++++++++++++ ...er-g-78405f03bea86dc35a1c5e66198ba314.yaml | 58 +++++++++++++++++++ ...er-g-c00ddbff9a00f61bfe31a00b389503a1.yaml | 58 +++++++++++++++++++ ...er-g-eb56bf16494883e891ab8b3be05b8bf5.yaml | 58 +++++++++++++++++++ ...lery-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml | 58 +++++++++++++++++++ ...tage-fad318487dd970b284385e44520c85d8.yaml | 58 +++++++++++++++++++ ...ider-f60d70179169d7470d698c285c73d2aa.yaml | 58 +++++++++++++++++++ ...-pug-010c78c3e5a7548cd6f10c07c7e5988f.yaml | 58 +++++++++++++++++++ ...-pug-1553916233de2092a6a61d801beae073.yaml | 58 +++++++++++++++++++ ...-pug-614c612f12b893f0f92f502ce23d7035.yaml | 58 +++++++++++++++++++ ...-pug-870c7bd1810589217dfd341e2045182a.yaml | 58 +++++++++++++++++++ ...-pug-b2adf01153d5956e8d9a8d75b32e133c.yaml | 58 +++++++++++++++++++ ...-pug-f0354930e8182da4de2a1a00399f0307.yaml | 58 +++++++++++++++++++ ...cket-219e55994660c3c36e84474ca074be21.yaml | 58 +++++++++++++++++++ ...cket-d503115e692639756bb3a2ffdde34c03.yaml | 58 +++++++++++++++++++ ...oost-362e89b41145042eb5431e45e53b6db2.yaml | 58 +++++++++++++++++++ ...oost-68edca1ac76c8646936a8dc6a3f4659d.yaml | 58 +++++++++++++++++++ ...oost-bcdb06e3079fdbbb06462441ceb79bc4.yaml | 58 +++++++++++++++++++ ...tton-de24827a638a2efce744c6eade7a73f3.yaml | 58 +++++++++++++++++++ ...stic-50f3815a7306e514f6cb6f2669b958ed.yaml | 58 +++++++++++++++++++ ...stic-aa18dc73a5ad2f3458b2829a667a4dbe.yaml | 58 +++++++++++++++++++ ...stic-cda45d54f4a107e20020517047ad5ad6.yaml | 58 +++++++++++++++++++ ...stic-daf56c568297c549e428734f0390b5eb.yaml | 58 +++++++++++++++++++ ...stic-db671b595a6de4259366a24bfd717a43.yaml | 58 +++++++++++++++++++ ...lkit-b594ed2c30b3954ae4ee7c97ed6645b0.yaml | 58 +++++++++++++++++++ ...lkit-dcf043d6af78599175beab95bc8309bb.yaml | 58 +++++++++++++++++++ ...lkit-fab081bdfce9f805f8a61feef8468916.yaml | 58 +++++++++++++++++++ ...ider-fb94da76ff281a4e13dbc1c86ed0929d.yaml | 58 +++++++++++++++++++ ...kers-54c5f87c18eece344632707c2a248764.yaml | 58 +++++++++++++++++++ ...tape-f65f1ef88d2d62f17ad5f25db5f837fc.yaml | 58 +++++++++++++++++++ ...dget-109bcc0df2db9108727b125f1715f024.yaml | 58 +++++++++++++++++++ ...dget-cfc720059dcf0db5379f24aec3318afb.yaml | 58 +++++++++++++++++++ ...fare-18ca8dc6d6eaaf78aee24ea0452c8428.yaml | 58 +++++++++++++++++++ ...fare-357fbb3649272b57b08a032d33621319.yaml | 58 +++++++++++++++++++ ...fare-aa4bf5d698c5cb8e5401cc2cfa4e07c6.yaml | 58 +++++++++++++++++++ ...fare-cf2b6bb9f998ed8bc8db5b63bcf57bd0.yaml | 58 +++++++++++++++++++ ...fare-cf38fe10bb49e0d1d6d84b988c9ef72b.yaml | 58 +++++++++++++++++++ ...fare-f488a9133074cf6ace7e478b0a192bb6.yaml | 58 +++++++++++++++++++ ...iver-7c3165415d7bf963906af20d2c357430.yaml | 58 +++++++++++++++++++ ...grid-ee08b0491d28739787eab972fee61b21.yaml | 58 +++++++++++++++++++ ...mark-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...snap-7cc4115eca0cf9c161547f1b88d6e0eb.yaml | 58 +++++++++++++++++++ ...olls-18fe02250ff137adf75ad3081c09ea5f.yaml | 58 +++++++++++++++++++ ...ager-664ca2d87dcbd63deac8c49c5554db17.yaml | 58 +++++++++++++++++++ ...ager-b0e0ed74ea2c963635231dd123335584.yaml | 58 +++++++++++++++++++ ...ager-c4fee1f627e8de419abb2cb77fa742f7.yaml | 58 +++++++++++++++++++ ...ager-c95ffe646d0a761b10647658a7c40d15.yaml | 58 +++++++++++++++++++ ...eale-b75ef217a6365bc215b41cd9f7c0293c.yaml | 58 +++++++++++++++++++ ...ters-6e0c27e6aa8bbd23ae1645c9db38ce34.yaml | 58 +++++++++++++++++++ ...kets-753b1cfc0cff5215c4137639d86b10b2.yaml | 58 +++++++++++++++++++ ...iate-390f815591982373c000eae4c03f7206.yaml | 58 +++++++++++++++++++ ...dres-22545828b4d21f4c13980a9fc5313fe5.yaml | 58 +++++++++++++++++++ ...dres-a159294bbf51e0b7e5b555bc0921d9bf.yaml | 58 +++++++++++++++++++ ...lite-6360ed6ca296565a491121426d09e439.yaml | 58 +++++++++++++++++++ ...ophi-c3dca1d1ef3a946c9ddf3e33caa00021.yaml | 58 +++++++++++++++++++ ...itle-973fd490fc9004516881a731f3c2d83a.yaml | 58 +++++++++++++++++++ ...gold-4ff0e478fdb270b77d40058c8e73075a.yaml | 58 +++++++++++++++++++ ...gold-97e81ce09ae72195c5b04d7f6a992589.yaml | 58 +++++++++++++++++++ ...gold-a72a870d8ea76185ed68595992193f58.yaml | 58 +++++++++++++++++++ ...code-69235207b58aed8fe2c8ecd662e7a82c.yaml | 58 +++++++++++++++++++ ...code-dc226a4fd8674625d0b38158fd388bcd.yaml | 58 +++++++++++++++++++ ...ress-8f924182750ff29f56bd3ee7a3546db5.yaml | 58 +++++++++++++++++++ ...ides-6d1532fdad80760bbcdb59b753aaa43d.yaml | 58 +++++++++++++++++++ ...list-4c3c497ff4bf73b3f95e774197f4a725.yaml | 58 +++++++++++++++++++ ...usic-aae33717a53aff7e44346754fe498f79.yaml | 58 +++++++++++++++++++ ...usic-c6e943f02c816d59dc350abe53cdb37c.yaml | 58 +++++++++++++++++++ ...rica-1a4e07a5bd173dbacaf88e7f59c17b91.yaml | 58 +++++++++++++++++++ ...ment-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-04a07a765c467ba9a937f6672ca388bf.yaml | 58 +++++++++++++++++++ ...ager-06564215bf3fbac51cfe3cf6be605864.yaml | 58 +++++++++++++++++++ ...ager-2363aa1bcf8789d416b82d1e475636e8.yaml | 58 +++++++++++++++++++ ...ager-2850eb23becb886717557cbcc134de27.yaml | 58 +++++++++++++++++++ ...ager-2d5254568244460078b2f5ebf11d2614.yaml | 58 +++++++++++++++++++ ...ager-3992d1400a14226b637a309e355d88df.yaml | 58 +++++++++++++++++++ ...ager-401b607f5d2e6f27bfcb5e6df2983f64.yaml | 58 +++++++++++++++++++ ...ager-5c5bdc3c3fb1d75ed0dae2921575f884.yaml | 58 +++++++++++++++++++ ...ager-617c1b1381aefd6f7fe9c5ab76d6b608.yaml | 58 +++++++++++++++++++ ...ager-68171971cc36274d03be6fb322c19104.yaml | 58 +++++++++++++++++++ ...ager-6fe68888cdbcff1f92e26aa3597b8cee.yaml | 58 +++++++++++++++++++ ...ager-a887472c18a8df1556ea7f4984db4ec4.yaml | 58 +++++++++++++++++++ ...ager-ac1431b1561b6c549c99a1b7125f3596.yaml | 58 +++++++++++++++++++ ...ager-b4c26568b976acff74ff99cb773e576a.yaml | 58 +++++++++++++++++++ ...ager-cb1e1ee6d4a86d7ed0a6cb77ed172c33.yaml | 58 +++++++++++++++++++ ...ager-ce5dcabcccc42aa46e68f15d61979ef3.yaml | 58 +++++++++++++++++++ ...ager-dba53cd3548af35e05600706ff16691a.yaml | 58 +++++++++++++++++++ ...ager-f2cabdaf778fd02d270ecff63ff16022.yaml | 58 +++++++++++++++++++ ...ager-f424267505cbcf902cf4e60fa01acaf4.yaml | 58 +++++++++++++++++++ ...ager-f55d9ddf38ced2af39de4e46518b9654.yaml | 58 +++++++++++++++++++ ...-faq-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...dget-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...ager-41e16d89dcc64533542d0355200f7979.yaml | 58 +++++++++++++++++++ ...acer-d06ebbe7f6b16be606d476a52581f74c.yaml | 58 +++++++++++++++++++ ...ebye-e9caa2ebc5663770aed9ca1501187910.yaml | 58 +++++++++++++++++++ ...orwc-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...ress-82c72f71ce0609e7f3c0c0507adae482.yaml | 58 +++++++++++++++++++ ...ress-cbc5e9eb934f71de91a8cb0463db32ff.yaml | 58 +++++++++++++++++++ ...mbam-ba683037cf589f0cf1f070f5a09f7594.yaml | 58 +++++++++++++++++++ ...lock-376bf43456853b74eb2f520d8ce53233.yaml | 58 +++++++++++++++++++ ...lock-8abe61b53911c7ef41a9f9b79b5a7a76.yaml | 58 +++++++++++++++++++ ...post-74a58305bbc22438aab63e645d576e4d.yaml | 58 +++++++++++++++++++ ...rrow-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...kout-a008170121378cc4ebae8dd26f86a202.yaml | 58 +++++++++++++++++++ ...kout-bfb97206bbfb6336668e50882960e16f.yaml | 58 +++++++++++++++++++ ...kout-c91bb87bc2ac78b385f1ba0404999869.yaml | 58 +++++++++++++++++++ ...tent-abc7b516295a7f19088f575460d378b0.yaml | 58 +++++++++++++++++++ ...bile-3ebf96dd87dccb36e3b3f1a2a1f3837f.yaml | 58 +++++++++++++++++++ ...-pro-995df7f208463f40decef18bc20c7cae.yaml | 58 +++++++++++++++++++ ...pack-076ba2e4af7ca8a46ce67983592fc4f6.yaml | 58 +++++++++++++++++++ ...pack-221fa8b539336ea57a6760f06055d98c.yaml | 58 +++++++++++++++++++ ...ache-226c23fcac1339a85375c1a4fa7531e2.yaml | 58 +++++++++++++++++++ ...ache-54778688cb39f84f341e249c6ffef279.yaml | 58 +++++++++++++++++++ ...ache-e22a3c007f773a45322f383ac43c3a2c.yaml | 58 +++++++++++++++++++ ...ider-65a9626411491f24b8c3f89e82e2b81b.yaml | 58 +++++++++++++++++++ ...roll-6adf85227442a25ea6b65f4f4a3a9b6f.yaml | 58 +++++++++++++++++++ ...ndar-f2155ebc56a5ab206ac221be4f14be59.yaml | 58 +++++++++++++++++++ ...ndar-1e97950fcbacf9ecbb58beed5fdc2b28.yaml | 58 +++++++++++++++++++ ...ndar-2ed7504786f2c69f8fb1940cf29e910f.yaml | 58 +++++++++++++++++++ ...ndar-8e5f1d8103bbbd8289c9adf60d58fadc.yaml | 58 +++++++++++++++++++ ...ndar-f7cf93aa76a02f42c50608fccf671ed3.yaml | 58 +++++++++++++++++++ ...book-3419ce492dfca943f0e1d53900563907.yaml | 58 +++++++++++++++++++ ...book-69ea852e8d20e1b9095ff76a5199f22b.yaml | 58 +++++++++++++++++++ ...book-8a173d0b76b8837ebc37d42174f4f25c.yaml | 58 +++++++++++++++++++ ...book-913a3de69251f92dd6bb96cf67b3c77f.yaml | 58 +++++++++++++++++++ ...book-e8946bc978834049177d3e02187e8035.yaml | 58 +++++++++++++++++++ ...-faq-b0259ad6d689e8e7c0c44fb374384bbb.yaml | 58 +++++++++++++++++++ ...lyse-0c25180cc619839b0311e294d1b3cbd8.yaml | 58 +++++++++++++++++++ ...iffy-6758599a3791f7538bc2d472bcdf24af.yaml | 58 +++++++++++++++++++ ...ndar-08f37baf7169a857040ffc59c0868398.yaml | 58 +++++++++++++++++++ ...ndar-154bfb5b4169e90929a178c26caff90a.yaml | 58 +++++++++++++++++++ ...ndar-1777236d571c6ec2a8def6ba8c1b858a.yaml | 58 +++++++++++++++++++ ...ndar-3e09107013e755aea584073e7dd4de99.yaml | 58 +++++++++++++++++++ ...ndar-75045db4676725000c0fe50648ef7533.yaml | 58 +++++++++++++++++++ ...ndar-96ead8130baf6f3e4de85814e7242d2f.yaml | 58 +++++++++++++++++++ ...ndar-9cd804229a710db23428eb806db45e23.yaml | 58 +++++++++++++++++++ ...ndar-e0473e70c98ee61e4fe5a38893d2153e.yaml | 58 +++++++++++++++++++ ...ndar-ec679d8af6cf4a084b96b00c5d5a19da.yaml | 58 +++++++++++++++++++ ...n360-8be8bdb7ee929f691ca61327631de08d.yaml | 58 +++++++++++++++++++ ...ader-ab94523f6e880edfade4cc9deca8c597.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...reen-2fce51431212ec05fbe8e4b6de6695f9.yaml | 58 +++++++++++++++++++ ...ntor-b7e73505abb95891d8cab73e20eb43fb.yaml | 58 +++++++++++++++++++ ...bble-124b0c02e423c613251c0019e72c2c54.yaml | 58 +++++++++++++++++++ ...usel-eca4f2076644e75e750957ea6e558bad.yaml | 58 +++++++++++++++++++ ...dget-9197b8a3552582e2b7bb578d10695dcb.yaml | 58 +++++++++++++++++++ ...ress-12303619a441af1cb4218513536dee14.yaml | 58 +++++++++++++++++++ ...ress-6844db7940c370d06922bd9c5958a18b.yaml | 58 +++++++++++++++++++ ...ress-e4e04326ab22918580d15e25fd27ca8d.yaml | 58 +++++++++++++++++++ ...ress-298d6bd79a1c9c5409fd8603fff56484.yaml | 58 +++++++++++++++++++ ...ress-31672843b36374c6d9bc9abf980ac503.yaml | 58 +++++++++++++++++++ ...ress-a7c9f85c93718ea45a6837bae9a163d3.yaml | 58 +++++++++++++++++++ ...ents-ad069f3a56279cbff65458936b83abde.yaml | 58 +++++++++++++++++++ ...eeds-2d33cf6aadd9c85f7e657c07e30320a8.yaml | 58 +++++++++++++++++++ ...eeds-383f0a78726324384b13637bfb824e6d.yaml | 58 +++++++++++++++++++ ...eeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...your-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...your-a5f4f463543df4d2c732d202ef98faae.yaml | 58 +++++++++++++++++++ ...apid-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...lery-a406e3b1989f167ebfda1e3281f7073d.yaml | 58 +++++++++++++++++++ ...shop-1fd62c5f484f1392e0781314c57798c9.yaml | 58 +++++++++++++++++++ ...ents-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ices-59ac68597f5d4f0100ad7ca8fa79cc45.yaml | 58 +++++++++++++++++++ ...ices-9a71754acff1f7a8a4e0b96c58483fa2.yaml | 58 +++++++++++++++++++ ...ices-f12b94e3ed29f6a01de55ac0eaeeefde.yaml | 58 +++++++++++++++++++ ...erce-a5194bfa9db34596e371b3fb9a988aa4.yaml | 58 +++++++++++++++++++ ...ices-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...code-a25bdc4c7adc28787a5a6691ec7b0deb.yaml | 58 +++++++++++++++++++ ...ails-e4179682cad3bde3b1674a51f6f83b60.yaml | 58 +++++++++++++++++++ ...odes-5bf6caeb14a9d5459f5e8842d7b83fd0.yaml | 58 +++++++++++++++++++ ...odes-a40320a58f3885e7d8eeeafc625b97f0.yaml | 58 +++++++++++++++++++ ...-seo-5af8eacf37d85841618cfbc1ca1be43e.yaml | 58 +++++++++++++++++++ ...-seo-6478aae484fa31cdf3168da6c2ae9db6.yaml | 58 +++++++++++++++++++ ...-seo-6e0a660167cf480a4e16e426dedc8853.yaml | 58 +++++++++++++++++++ ...-seo-83717a76e7400e087835909cd79a400f.yaml | 58 +++++++++++++++++++ ...-seo-83878a85b5ef451846cd41cd6a228f4f.yaml | 58 +++++++++++++++++++ ...-seo-97aa7aa2977bb6f3604b4b418beecdeb.yaml | 58 +++++++++++++++++++ ...-seo-f98418e2a88f3c300252df6d0a548031.yaml | 58 +++++++++++++++++++ ...-seo-ffbd02fc4497b01dad7c0fa802b669cd.yaml | 58 +++++++++++++++++++ ...pack-24ebe2280a642d19c25498acc13aa5f7.yaml | 58 +++++++++++++++++++ ...atin-4393e503b4c5e360e86d4cf75de99b91.yaml | 58 +++++++++++++++++++ ...atin-acbdf42f0c9734064513cf6368d19553.yaml | 58 +++++++++++++++++++ ...atin-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml | 58 +++++++++++++++++++ ...nter-30c7579fa3259d02083eb82bd53cf64e.yaml | 58 +++++++++++++++++++ ...nter-44e9876427663f96d92e4c3c678955d5.yaml | 58 +++++++++++++++++++ ...oads-a491a4eb2f6511d2fd18eb2730601144.yaml | 58 +++++++++++++++++++ ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-zen-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...quiz-7e5a458fe10904a2f1fd482c3506274a.yaml | 58 +++++++++++++++++++ ...-tip-2145217038a04527e759e3c42206ab95.yaml | 58 +++++++++++++++++++ ...tter-3701fafb074b402084511d8e3b04bc0d.yaml | 58 +++++++++++++++++++ ...tter-84952e15b91150d8294a112b87e25b78.yaml | 58 +++++++++++++++++++ ...ocks-36fca09be33f968137213dd9d8d406cb.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-pro-ac98669a164eec200e7d954863b49097.yaml | 58 +++++++++++++++++++ ...list-23bc4348b9c1d4b0887cf4fec0175219.yaml | 58 +++++++++++++++++++ ...list-f5c3047a64378a59b5a46efb892afcac.yaml | 58 +++++++++++++++++++ ...show-63519f47d94f5357008fbc9245726b8e.yaml | 58 +++++++++++++++++++ ...ools-295c71d391fe6f97f05c0f5bc739be92.yaml | 58 +++++++++++++++++++ ...ools-5f2953556f6ef8b300e083b724959d0b.yaml | 58 +++++++++++++++++++ ...iews-268eba465e26dd79ea6cf3787bb22b93.yaml | 58 +++++++++++++++++++ ...iews-f7de3a4183d7c85f1508bd7bcbb56139.yaml | 58 +++++++++++++++++++ ...tons-b00282494ef0f9932dc7277c14e145b9.yaml | 58 +++++++++++++++++++ ...erce-346e0f78c8914c5524619c3f260ec3fe.yaml | 58 +++++++++++++++++++ ...erce-68ab25be74477c215ab2a821dbee384e.yaml | 58 +++++++++++++++++++ ...rbox-55749978c55c3ff34eeaa5813711f342.yaml | 58 +++++++++++++++++++ ...rbox-750a764136a41cb3d1ef7fa35a4e6897.yaml | 58 +++++++++++++++++++ ...rbox-97fda38a75735b5bdc9de194b151a883.yaml | 58 +++++++++++++++++++ ...rbox-e415a95e174fb12ae126d3d07ffd90b5.yaml | 58 +++++++++++++++++++ ...ting-b25512c67e99a5071e31e499f00e5d98.yaml | 58 +++++++++++++++++++ ...iews-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...iews-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...menu-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...ting-877b177b6c582a19ddf3d94a1f834d93.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...gets-97fdac4e69d052b8d3b0b9d3bb3a6f6c.yaml | 58 +++++++++++++++++++ ...gets-d60b1c02d17322f76c1b2881d2462ff2.yaml | 58 +++++++++++++++++++ ...-pro-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sscn-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml | 58 +++++++++++++++++++ ...tats-6928e4dd3f8a754ad4543c4aa86a65d0.yaml | 58 +++++++++++++++++++ ...tats-c67af2c20174cb06fdec04d2bad87d02.yaml | 58 +++++++++++++++++++ ...nter-02fe09c7b43da12dda02e01bae697e2b.yaml | 58 +++++++++++++++++++ ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ntor-b3370369626f0cd7746a33baa8f9c6f9.yaml | 58 +++++++++++++++++++ ...ntor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ntor-cebe60a1cf2dde46346583e6502d2df4.yaml | 58 +++++++++++++++++++ ...ntor-e4c7791fde3e7334165d62fc0d2ccc21.yaml | 58 +++++++++++++++++++ ...stax-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lder-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...lder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...lder-cbf068b76996a12348c77160d6abfb9b.yaml | 58 +++++++++++++++++++ ...ewer-ba89c7968306258a1d45a93c7b938ec5.yaml | 58 +++++++++++++++++++ ...tmap-e82baab8930846897895cd56a53f4176.yaml | 58 +++++++++++++++++++ ...etic-6c87924dbb6c43a2f1ddf339475f1f21.yaml | 58 +++++++++++++++++++ ...-bar-e6b604fdb9cd729f08feb0319847d447.yaml | 58 +++++++++++++++++++ ...-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tons-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...tons-7e2dc330bdadb62eadfb9a21217d5798.yaml | 58 +++++++++++++++++++ ...tons-859f059a5b5e1e007a3660b6b0f57e21.yaml | 58 +++++++++++++++++++ ...dget-081b4b5984322d0654bd5e7e3e37d073.yaml | 58 +++++++++++++++++++ ...anwp-40341532c7f84f3b54f6d735c45b3460.yaml | 58 +++++++++++++++++++ ...roll-cb59e9addcdd2f8364b25566a29199bb.yaml | 58 +++++++++++++++++++ ...opup-309733b2329b1a831e5f4ba1b62b19a8.yaml | 58 +++++++++++++++++++ ...osts-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...cons-c9799f12c2184eb30d64cc5143268b5b.yaml | 58 +++++++++++++++++++ ...erce-52fb89fd718db76422fb10fc104a8d62.yaml | 58 +++++++++++++++++++ ...erce-7484648ba547861958c645da1722e120.yaml | 58 +++++++++++++++++++ ...k-in-3f8c7e452acf0c92c2be04758743dd87.yaml | 58 +++++++++++++++++++ ...k-in-b71491b8bf7c07dcdab705de72ac74a3.yaml | 58 +++++++++++++++++++ ...erce-56e0af85bfab5155d836999c55aea415.yaml | 58 +++++++++++++++++++ ...nviz-4d66daf76c1a504d8951d5442d44e0d6.yaml | 58 +++++++++++++++++++ ...list-9bd703646402672c6e3df139cb8847d8.yaml | 58 +++++++++++++++++++ ...erce-0a4ea8332eb63945a72a76009caecdd3.yaml | 58 +++++++++++++++++++ ...erce-9c2789fd4f31da6a3e682d3cde6291b3.yaml | 58 +++++++++++++++++++ ...erce-c9110bf3cc68474c30b266d852672473.yaml | 58 +++++++++++++++++++ ...cker-2ea3be25438d9c3b8022fc0114332035.yaml | 58 +++++++++++++++++++ ...cker-389e4423679f1c467a852761b85f3cfd.yaml | 58 +++++++++++++++++++ ...cker-5d5ae51f589bad252b3ae3b1c695b8aa.yaml | 58 +++++++++++++++++++ ...cker-a63f1210dd076ac1af75bbdfb4936df5.yaml | 58 +++++++++++++++++++ ...hart-77325720e82684664a6b23fccd8e86e5.yaml | 58 +++++++++++++++++++ ...ager-93d3f42fb72b82260168d21150301cb3.yaml | 58 +++++++++++++++++++ ...spam-e98b32d10be48dc189fcfc8cfe33a3ba.yaml | 58 +++++++++++++++++++ ...ents-33e0e465970f1e21e7fead2332f406d1.yaml | 58 +++++++++++++++++++ ...ugin-38876a8a5fbfd61cde5369e484f937f2.yaml | 58 +++++++++++++++++++ ...ugin-a2fadf4a6acf31a1331e23447ba2981f.yaml | 58 +++++++++++++++++++ ...ugin-aaa45d66679ac35ae0d003ff8a8e5f48.yaml | 58 +++++++++++++++++++ ...ugin-b2a65b01b1c6a6a8966ce47037369844.yaml | 58 +++++++++++++++++++ ...ugin-cb772dd359af032492bf762585f62bb0.yaml | 58 +++++++++++++++++++ ...ugin-d2259aaa4d4ae5c5473c4b6238d48632.yaml | 58 +++++++++++++++++++ ...tion-1c50f19daed34665b30f7fb7e6a79c86.yaml | 58 +++++++++++++++++++ ...tion-6c5cd06dc489c66e7f89a876c4054223.yaml | 58 +++++++++++++++++++ ...tion-6cfb42fd9a90247cd4a309cf7c3fa9cd.yaml | 58 +++++++++++++++++++ ...tion-bdfa460006d70b85bf4366e301016193.yaml | 58 +++++++++++++++++++ ...tion-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...tion-da52ec4cd6fe55fb3a74c279a252a272.yaml | 58 +++++++++++++++++++ ...bots-24b1f52e6cf57fe2a2edbecda487edee.yaml | 58 +++++++++++++++++++ ...bots-2f682fb3b99f66abb1a193957df1d1e6.yaml | 58 +++++++++++++++++++ ...bots-3415fa1c70f4a284c1c590e2a6e45217.yaml | 58 +++++++++++++++++++ ...bots-8b5bbda26afcdfaa4409d718842d5879.yaml | 58 +++++++++++++++++++ ...bots-a56a10763fef9c6c1ee5edbd42a68314.yaml | 58 +++++++++++++++++++ ...bots-c37f8531d687078be9fa5b927c4c16c4.yaml | 58 +++++++++++++++++++ ...bots-c80c3c19565fc6e0af352542c128422a.yaml | 58 +++++++++++++++++++ ...bots-cfab52d3443d4e82a03b0d2f0889ab4f.yaml | 58 +++++++++++++++++++ ...ates-aa4cd28c9af95c0e13ddc060c836b2b0.yaml | 58 +++++++++++++++++++ ...ator-118f160a8ab578043e1b061d32f15698.yaml | 58 +++++++++++++++++++ ...ator-f5bef0233a73b448e858b3681231c7d1.yaml | 58 +++++++++++++++++++ ...ator-ff474dfbe600046b3769ad9ddb54c011.yaml | 58 +++++++++++++++++++ ...r-le-41bea91ce3336d6adb86e1ea410b9aef.yaml | 58 +++++++++++++++++++ ...r-le-81806c847f0b2c320b63849d660c9dca.yaml | 58 +++++++++++++++++++ ...r-le-e2053d18b4d79ba0e416f265a7be2f35.yaml | 58 +++++++++++++++++++ ...r-le-fc1b2b62341494b2d9cc5ef165563a2a.yaml | 58 +++++++++++++++++++ ...erce-1b9679a4f42d9c30f3b2de1ebd1889b6.yaml | 58 +++++++++++++++++++ ...text-dcf3d519c235997890c41f1336f203e6.yaml | 58 +++++++++++++++++++ ...hief-6329046104e43f1ec0f867ede19cab78.yaml | 58 +++++++++++++++++++ ...hief-9bb529865a4378d4915d3b7f30503af0.yaml | 58 +++++++++++++++++++ ...ndar-f561113c4b166210ffa84b58619b347d.yaml | 58 +++++++++++++++++++ ...atum-b90da7474429ff0560b494c992f7386d.yaml | 58 +++++++++++++++++++ ...rm-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ream-04699771b766f0fc714834ca199fc5ab.yaml | 58 +++++++++++++++++++ ...ream-4203dc94ef5199d201031e3f384724b9.yaml | 58 +++++++++++++++++++ ...ream-439ba91c06350a9c8bb984e5dff1a4a4.yaml | 58 +++++++++++++++++++ ...ream-aa025e6cf603e2a31820747c34b944ac.yaml | 58 +++++++++++++++++++ ...ream-e2fa9b7a2ac83dce50f44abd024d6931.yaml | 58 +++++++++++++++++++ ...ayer-a61b4c2ab615ad0f80b5138981abe8ce.yaml | 58 +++++++++++++++++++ ...cast-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cast-fe66522b1a62142749b36d39c6b2760b.yaml | 58 +++++++++++++++++++ ...tion-0fc7500c1842d66d6981f5c71273cba4.yaml | 58 +++++++++++++++++++ ...tion-2d2a726dfea1c83cf2d93df104a8c8d5.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ator-2d86b7b96a584b0abcc7bac3e11b4cae.yaml | 58 +++++++++++++++++++ ...ator-54ef8279e490c1378421576f13667db9.yaml | 58 +++++++++++++++++++ ...erce-47381a600b8cc2173f5be6a0287dc5d1.yaml | 58 +++++++++++++++++++ ...eway-d9184aea5b0340682c329de3d4d22fd3.yaml | 58 +++++++++++++++++++ ...ents-560fba5c90dc74d38384277269b51dae.yaml | 58 +++++++++++++++++++ ...ents-5bf985e952afe6aa546a83aa3289787b.yaml | 58 +++++++++++++++++++ ...ents-925029dc31c55bdce33ed22d851b35e1.yaml | 58 +++++++++++++++++++ ...ents-d255a7962cab4ed87609083cbd5373c3.yaml | 58 +++++++++++++++++++ ...show-c6f782f9040ea9a039305ec1ed2ddafa.yaml | 58 +++++++++++++++++++ ...ials-30299c84e4a810a5d91c885ccad19e9f.yaml | 58 +++++++++++++++++++ ...ials-4c7136348e958aecb57a2e8c3842e1af.yaml | 58 +++++++++++++++++++ ...ials-4e10d6d81d87afd9b8cf214ddcd496ad.yaml | 58 +++++++++++++++++++ ...ials-6733337aa2d304b28cb671c239d55eef.yaml | 58 +++++++++++++++++++ ...ials-75b8a5222fb6f26aa91b12f6a779084a.yaml | 58 +++++++++++++++++++ ...ials-9789112c0d34ac6cf02fb911bdea5e63.yaml | 58 +++++++++++++++++++ ...ials-bad0302697b20bb164a7d48924161471.yaml | 58 +++++++++++++++++++ ...tent-8afca71d6fa766e9a24060d9214388e1.yaml | 58 +++++++++++++++++++ ...tent-b00e5b46c74081e9862bff90f3aaef92.yaml | 58 +++++++++++++++++++ ...tent-b240c0fd3b8e35e0e7b7374ee39360eb.yaml | 58 +++++++++++++++++++ ...tent-bb8100b665f7be766e2f2566af0a9770.yaml | 58 +++++++++++++++++++ ...e-it-d99f0f471a2dd63c73902853b59daf4d.yaml | 58 +++++++++++++++++++ ...yles-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...ator-17f69747f5418f0c498184d7a40cd5d8.yaml | 58 +++++++++++++++++++ ...ator-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ator-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...mium-7a44d61ebaa3b700401c1ffe420cd8f6.yaml | 58 +++++++++++++++++++ ...list-1162e5c3375a29dda16c38290874b6a7.yaml | 58 +++++++++++++++++++ ...list-bcf6a8a116341bcac1e69fe2f154a5e2.yaml | 58 +++++++++++++++++++ ...list-f10183ed44d63adcd1747764a96c820f.yaml | 58 +++++++++++++++++++ ...list-b62755f81eca9dc431fe91f1c1c5e844.yaml | 58 +++++++++++++++++++ ...uage-80e328ca936017b96ab31fe4d42f9f3e.yaml | 58 +++++++++++++++++++ ...nded-67118eb3397203867c13f43462b990f9.yaml | 58 +++++++++++++++++++ ...ebar-783f6ed85330c62d6c5fe672e0ec559c.yaml | 58 +++++++++++++++++++ ...gory-75e4710b6f6d108c91a0d10797676b5b.yaml | 58 +++++++++++++++++++ ...gory-f8057967039523304998e4a1e27c496f.yaml | 58 +++++++++++++++++++ ...ents-d227231b4f8bc2fd1ba287eabca0e5a2.yaml | 58 +++++++++++++++++++ ...ents-f75bd794bdf0bce00fb43494bf16c7f1.yaml | 58 +++++++++++++++++++ ...aded-15bbee0302a2c0acdbacef494a071dae.yaml | 58 +++++++++++++++++++ ...aded-218762f76a47ddcb2051ebcd055069c7.yaml | 58 +++++++++++++++++++ ...aded-ea7188fa96127d6768b6d958f17226e5.yaml | 58 +++++++++++++++++++ ...aded-efa006e93668f7aca40417ac3bc81a16.yaml | 58 +++++++++++++++++++ ...ibe2-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ibe2-6183f2ee603510ff52f63f1f006c28a4.yaml | 58 +++++++++++++++++++ ...ibe2-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...ibe2-8402c61711992f819817934b35ca7a98.yaml | 58 +++++++++++++++++++ ...ibe2-914f38027718514db2df33bcbfa5d9b6.yaml | 58 +++++++++++++++++++ ...ibe2-ac88ac9a4126934ac4e490020952d981.yaml | 58 +++++++++++++++++++ ...ibe2-b1c3c2103a95130385060251902a6b08.yaml | 58 +++++++++++++++++++ ...ibe2-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...iber-6e4e8347273d5c0e2b6b13d913498882.yaml | 58 +++++++++++++++++++ ...-com-a6ba6de400353cbaf7c7146b43b770d6.yaml | 58 +++++++++++++++++++ ...nter-912f96d113a5aa3c6fbc130ea2c63f30.yaml | 58 +++++++++++++++++++ ...ypal-246acc4f8640ae460f0f934c6252b374.yaml | 58 +++++++++++++++++++ ...bway-dd1fa2d046eacdab57006cff4cc678d1.yaml | 58 +++++++++++++++++++ ...nner-783f372f4644686742e160ed2c3ab92d.yaml | 58 +++++++++++++++++++ ...ules-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mome-67ae2a415472885fa884ebc17419d3bf.yaml | 58 +++++++++++++++++++ ...cart-04bb16712ffe510bd42325a97d792814.yaml | 58 +++++++++++++++++++ ...cart-15830d6b8ea556fb257579ec9221b580.yaml | 58 +++++++++++++++++++ ...cart-46f4f6351643b92d6e721f9df0cbb87d.yaml | 58 +++++++++++++++++++ ...cart-6fb4ed5587f0486cce5c1d786ad4230e.yaml | 58 +++++++++++++++++++ ...cart-a734bff91fde948cd641fb4f506275db.yaml | 58 +++++++++++++++++++ ...cart-d0182d6b5ad1d47371d3d46c5ca25851.yaml | 58 +++++++++++++++++++ ...cart-d096370d5e8a77a5a56a117293d4ce98.yaml | 58 +++++++++++++++++++ ...cart-f3dea6737790d88bd69a099bbefbf2b4.yaml | 58 +++++++++++++++++++ ...orms-23939dc50089a2fd8ea8e17b2f3390a5.yaml | 58 +++++++++++++++++++ ...orms-245a41771beb2dc7d12a123756efaedb.yaml | 58 +++++++++++++++++++ ...maps-100f897c38dafe938e9af02c79c8f1ff.yaml | 58 +++++++++++++++++++ ...maps-93ccfea21d84c366d260e239066074ae.yaml | 58 +++++++++++++++++++ ...apps-86c50499cb2301a82786d4f168d5a72c.yaml | 58 +++++++++++++++++++ ...apps-da1b2a8c96719ab9e52f2e44ede96439.yaml | 58 +++++++++++++++++++ ...izer-164f540fc7a38170dc136b3ff3864ea3.yaml | 58 +++++++++++++++++++ ...izer-1d7bb8633b523735c234101babaefc6e.yaml | 58 +++++++++++++++++++ ...izer-2c66024442466abc661bfb4f6aa99c2f.yaml | 58 +++++++++++++++++++ ...izer-46d7cdc90f6e4788d19f634ed2b57174.yaml | 58 +++++++++++++++++++ ...izer-55664802ca8a80e3857f1283c80160e1.yaml | 58 +++++++++++++++++++ ...izer-9a23102fb64a765611d796440b87f458.yaml | 58 +++++++++++++++++++ ...izer-d2b942d377993c80a764418d9e08cf38.yaml | 58 +++++++++++++++++++ ...izer-f1616b3150e17cf700c43af1d021a1e6.yaml | 58 +++++++++++++++++++ ...izer-f857ae19dab84e492640b0478274e45c.yaml | 58 +++++++++++++++++++ ...nial-16fe73a759651a7d3bcefdb3b3d57eae.yaml | 58 +++++++++++++++++++ ...nial-a39aab4c2ab62bbbd835d18cf4082e05.yaml | 58 +++++++++++++++++++ ...nial-f27a4c95db01a4a56d77711f77220046.yaml | 58 +++++++++++++++++++ ...nial-f50a0c6a3334b6a9833d56ea2fa95097.yaml | 58 +++++++++++++++++++ ...-pro-16fe73a759651a7d3bcefdb3b3d57eae.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-d47a1b6b1cff7517a2e9c1cfb877c153.yaml | 58 +++++++++++++++++++ ...tons-99c5f90a74d748855313b5f983dc4bc2.yaml | 58 +++++++++++++++++++ ...tons-bfcc2c70b2c01ba809a238ca61e5f88c.yaml | 58 +++++++++++++++++++ ...menu-683819db80183ccca71d3fa32fe3879a.yaml | 58 +++++++++++++++++++ ...-faq-043f908fb4f9351f4c0f0add9321f548.yaml | 58 +++++++++++++++++++ ...e-wp-100f897c38dafe938e9af02c79c8f1ff.yaml | 58 +++++++++++++++++++ ...r-wp-100f897c38dafe938e9af02c79c8f1ff.yaml | 58 +++++++++++++++++++ ...r-wp-4f8bb1cd134e141985840e55e7337ff2.yaml | 58 +++++++++++++++++++ ...r-wp-93ccfea21d84c366d260e239066074ae.yaml | 58 +++++++++++++++++++ ...lite-d0405f3a6546530ea0089cf284177266.yaml | 58 +++++++++++++++++++ ...oard-2a20c012892057123c0688f9b3a4ff38.yaml | 58 +++++++++++++++++++ ...oard-4b0cb38b99185f75f96c68ddb4fd5800.yaml | 58 +++++++++++++++++++ ...oard-79a87cfdb010addc7119ceae498cd6d2.yaml | 58 +++++++++++++++++++ ...oard-b10ddb53a1d55359331e1cfb5b98fd64.yaml | 58 +++++++++++++++++++ ...oard-c1a62af10487c310f7866304f28fe56c.yaml | 58 +++++++++++++++++++ ...oard-df4750e020fd99b1db3b233a3a40020d.yaml | 58 +++++++++++++++++++ ...andy-1e4fd26a738e660824e15332d3d7697a.yaml | 58 +++++++++++++++++++ ...andy-32dcf173d1237771b363c0c2887254dc.yaml | 58 +++++++++++++++++++ ...andy-3dc309d6eba7a3765b70c365b5153ae1.yaml | 58 +++++++++++++++++++ ...andy-48b2566d4213ee09dc933aa00171e18b.yaml | 58 +++++++++++++++++++ ...andy-4b6c9f5939660218c2639c17b2048a97.yaml | 58 +++++++++++++++++++ ...andy-6e5471e206d56f7ca756740955d7ef85.yaml | 58 +++++++++++++++++++ ...andy-907062f692752ce26e64e57b3c581650.yaml | 58 +++++++++++++++++++ ...andy-a66f1036a5faeca38f844c5e78d8a411.yaml | 58 +++++++++++++++++++ ...andy-b305b8b934fd913e3c8bf40e033b8b8e.yaml | 58 +++++++++++++++++++ ...andy-d675073a50b5ae439cde851f96a93469.yaml | 58 +++++++++++++++++++ ...andy-e0621827f65c399f847dba7ee6445c56.yaml | 58 +++++++++++++++++++ ...ezzy-2008dfadd96c77e37701fc89701d0b2f.yaml | 58 +++++++++++++++++++ ...flow-ce31848b731129452978ca83014199c1.yaml | 58 +++++++++++++++++++ ...flow-ed6a08d26be37dfa8ba1985aca8693da.yaml | 58 +++++++++++++++++++ ...rser-0f94c84212785d00cc5084f78797c691.yaml | 58 +++++++++++++++++++ ...divi-21942b6e9d955d0155ca56bc416fed6c.yaml | 58 +++++++++++++++++++ ...tics-65bd3240ae8121decf63d5f24c3d008f.yaml | 58 +++++++++++++++++++ ...tics-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cart-3d8dd9beb9e2d1b17d8d01ef045ea5d3.yaml | 58 +++++++++++++++++++ ...gers-f1d679f5d2a45e6f2ff41ed909dc0711.yaml | 58 +++++++++++++++++++ ...rseo-c3e49cc5a301ec2fc03ff611d9afd783.yaml | 58 +++++++++++++++++++ ...aker-10c918e1f30e41c6abab8f1a64304178.yaml | 58 +++++++++++++++++++ ...aker-1918195d7c2ab5867189768d59900f1c.yaml | 58 +++++++++++++++++++ ...aker-261de0ba624118de4ab57965a4edcc34.yaml | 58 +++++++++++++++++++ ...aker-2bb4b724bd1a7da8929a5d331260d484.yaml | 58 +++++++++++++++++++ ...aker-643403eb7ff5706c9caf1f0a5a756401.yaml | 58 +++++++++++++++++++ ...aker-669917e04d085a827cbc9c1935738ecb.yaml | 58 +++++++++++++++++++ ...aker-72fdd3a89359bcd594b4d65638469ed8.yaml | 58 +++++++++++++++++++ ...aker-82219905fba0330c7a27bd3f2e291fd5.yaml | 58 +++++++++++++++++++ ...aker-8acec0a5c8b59824f7149c3540944dde.yaml | 58 +++++++++++++++++++ ...aker-8eb8c6930c0431ff7195d8b5e7d4d215.yaml | 58 +++++++++++++++++++ ...aker-ad612424551c0ee261f169ba5954843e.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...veys-73f9709e24c19194b73986ad030e8015.yaml | 58 +++++++++++++++++++ ...veys-ddf10b902ecdb6f3ecf20febec84cbe8.yaml | 58 +++++++++++++++++++ ...veys-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml | 58 +++++++++++++++++++ ...pert-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...port-4cdd67f3f418a30581118cbbb5c2e501.yaml | 58 +++++++++++++++++++ ...port-5b6d277a829fbd531e952b54c0a495ad.yaml | 58 +++++++++++++++++++ ...port-ffa9b508bdc94d69f110d4734885da09.yaml | 58 +++++++++++++++++++ ...port-4d2ea21aa8044b97f6f856b2ca032bba.yaml | 58 +++++++++++++++++++ ...ugin-03cfd10aef3dc88159ec608d4ac8800f.yaml | 58 +++++++++++++++++++ ...ugin-b7954fa43e16eb8eb1a34f4e676a00e3.yaml | 58 +++++++++++++++++++ ...ator-20391a519d77c31bd1c976dfdc89ed20.yaml | 58 +++++++++++++++++++ ...bles-3f854df7bfd619307ed654215e939951.yaml | 58 +++++++++++++++++++ ...bles-59d35e08e05da774933855f91366b645.yaml | 58 +++++++++++++++++++ ...bles-a665f3ee73307241410449c4f67e450a.yaml | 58 +++++++++++++++++++ ...dles-325c2ee814ddc7331db5383ec03956d1.yaml | 58 +++++++++++++++++++ ...arch-17ca7ff5c21686a9400e80e063d3e66d.yaml | 58 +++++++++++++++++++ ...chly-dac1076894ee7430c4ad6bf91ae05401.yaml | 58 +++++++++++++++++++ ...work-0b02214c516fa5bc85822569a5b642f2.yaml | 58 +++++++++++++++++++ ...work-f58e0fb779a935f032e6158130723d4e.yaml | 58 +++++++++++++++++++ ...lite-174bf1d87b8761ea6f77723705dffc85.yaml | 58 +++++++++++++++++++ ...lite-7dfff8c4900f7bbdbc49f6aa2df77488.yaml | 58 +++++++++++++++++++ ...-bar-861a2a6e66a953eb50c087718b438c88.yaml | 58 +++++++++++++++++++ ...ager-94a65bcd2f84366f6216e3f9b19f7582.yaml | 58 +++++++++++++++++++ ...ager-ee107d9cd894fe54bb677ea3e5052c7f.yaml | 58 +++++++++++++++++++ ...shop-6d412503c15b02be74462a4b525012a6.yaml | 58 +++++++++++++++++++ ...shop-9dadadc2ea66cec373bf71c20060be7b.yaml | 58 +++++++++++++++++++ ...erce-04275b24c87ac6163ea35464c25c26e3.yaml | 58 +++++++++++++++++++ ...erce-fab645de2f6e6231ff6074be3c265848.yaml | 58 +++++++++++++++++++ ...lbox-49b75b404a9ba001add19a1df795abd7.yaml | 58 +++++++++++++++++++ ...lbox-5adaf21161b5d5d8e7d95c715efbd0e3.yaml | 58 +++++++++++++++++++ ...lbox-c87a07214ae94f7db769181aa46e6e3e.yaml | 58 +++++++++++++++++++ ...lbox-f499e4efa4d99d7d76254d2c3b103977.yaml | 58 +++++++++++++++++++ ...tock-5e582ef605e9fe0c0d1cac86ea21ae85.yaml | 58 +++++++++++++++++++ ...-neo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...site-886a02653a1926dd36921eb04bdcde64.yaml | 58 +++++++++++++++++++ ...-cos-52c19ba3b4c4a4e86f87839bb901d71b.yaml | 58 +++++++++++++++++++ ...iers-85d0c53e63bad002a594a7c01a2ede3c.yaml | 58 +++++++++++++++++++ ...ping-d016ddea2985e3c1ec3f3ed31d67329b.yaml | 58 +++++++++++++++++++ ...inks-85ef6da03e1e6bb00fd985498d35a632.yaml | 58 +++++++++++++++++++ ...hter-527a854b5306cfe2112c84c3b74302ad.yaml | 58 +++++++++++++++++++ ...hter-860aeeaea687dc364b79673a2290695e.yaml | 58 +++++++++++++++++++ ...odes-6c1c86676b3f6a00f366fd4021465d09.yaml | 58 +++++++++++++++++++ ...oard-00f8b2060d8c742440ee6fd7c2090104.yaml | 58 +++++++++++++++++++ ...oard-50be407197651ee72b3d338a1eac693d.yaml | 58 +++++++++++++++++++ ...oard-6bb233f728b21686bbc5b5d256c952f1.yaml | 58 +++++++++++++++++++ ...oard-6d13564fb4f4f025b03f3bb2e7eff230.yaml | 58 +++++++++++++++++++ ...oard-b60f7befa67eb443974e00d882b10881.yaml | 58 +++++++++++++++++++ ...oard-d08dba75a00314181a7ea312016fdabc.yaml | 58 +++++++++++++++++++ ...bbed-e8c1d3f10e1f58956d4fcfa9c811fff0.yaml | 58 +++++++++++++++++++ ...ator-fd97a9eb267d56f526d35e401fac2886.yaml | 58 +++++++++++++++++++ ...plus-59af9a4b87c64d3fc5a5f77eb6d682d2.yaml | 58 +++++++++++++++++++ ...plus-88443ca5df44ae2bdc297b09180bef0c.yaml | 58 +++++++++++++++++++ ...plus-d17932e78accf27930222cbdfc82272b.yaml | 58 +++++++++++++++++++ ...ress-289da9c0d14eee035f8071c1e92f71c3.yaml | 58 +++++++++++++++++++ ...ress-3fb1358d568dc8245a52a721b92fb318.yaml | 58 +++++++++++++++++++ ...ress-5d739fff0b557fdd4318a7044651d1e4.yaml | 58 +++++++++++++++++++ ...some-41bad327accd676bdd6230643f7e28a5.yaml | 58 +++++++++++++++++++ ...some-6d5a094525084991d10cf28cec2fcdc6.yaml | 58 +++++++++++++++++++ ...some-918ad86e1bedc485af1c75c927ff2b30.yaml | 58 +++++++++++++++++++ ...some-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oola-7ecf6794fd0be35e81a6be54c3e6a722.yaml | 58 +++++++++++++++++++ ...tabs-1aa0e79be369c61efc2c0807922659cb.yaml | 58 +++++++++++++++++++ ...-pro-20d48d249a9d91a3d81b3c5c649e28eb.yaml | 58 +++++++++++++++++++ ...sive-f48a8e9c9fcbd8cc7a0d7249289e3206.yaml | 58 +++++++++++++++++++ ...dget-713789bc3ffbd71b9430af55e34d0b0b.yaml | 58 +++++++++++++++++++ ...osts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oups-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dget-9ebf12f531ac825152bdbeecae0483e1.yaml | 58 +++++++++++++++++++ ...ator-7066a02b08506808c19c2698c3c5e512.yaml | 58 +++++++++++++++++++ ...dget-3d53b8857bb0bf4f709b612366ce52ba.yaml | 58 +++++++++++++++++++ ...dget-460e4d77e94c99909f00493d8717ec60.yaml | 58 +++++++++++++++++++ ...dget-8984d8e2e14f0b49968f909a1d35ae5c.yaml | 58 +++++++++++++++++++ ...dget-8d570fcab536c9b0d9a14e0fe3f1fda7.yaml | 58 +++++++++++++++++++ ...ator-42f689e89098e402a672dac5ec8f6c89.yaml | 58 +++++++++++++++++++ ...ager-582f95ad25f63ca7cc5ef7bcd4bbcf92.yaml | 58 +++++++++++++++++++ ...acan-8e6b1c0313de5c2d10a529693b2cd5e4.yaml | 58 +++++++++++++++++++ ...acan-9361c5082e0aaebe13dacdb499fc4e4b.yaml | 58 +++++++++++++++++++ ...acan-b7c02268f4f394ae79b51e80494204b3.yaml | 58 +++++++++++++++++++ ...acan-bec9a874ffcaa5ff9d2f46a18b295cfb.yaml | 58 +++++++++++++++++++ ...ajer-30f1777054f2ffb243b10c5c1e00bdab.yaml | 58 +++++++++++++++++++ ...ykit-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...iate-0bb4c4e55d3bd7066abf4b3e5c409eb3.yaml | 58 +++++++++++++++++++ ...onjs-7493b4e361e65fc33d302e9a8676eef5.yaml | 58 +++++++++++++++++++ ...onjs-cdde9db33caece636f624a4e888cbf55.yaml | 58 +++++++++++++++++++ ...-pro-3c71f53ddfca3bc25fb132db1aac667a.yaml | 58 +++++++++++++++++++ ...-pro-4c984e9d1c9a129101e93a0ae80c8a9c.yaml | 58 +++++++++++++++++++ ...-pro-fb6f222be4d39ed80f59f3fdd0187537.yaml | 58 +++++++++++++++++++ ...uler-49f7af60a7d6ca8e6785ad7873768f2a.yaml | 58 +++++++++++++++++++ ...lder-aa1aed011557ee5dc2bfa06501123a9e.yaml | 58 +++++++++++++++++++ ...atsu-fbd8ecc6dba160d0b0ce8ccb8069b0ff.yaml | 58 +++++++++++++++++++ ...chat-21ae3b1c550108707903a2e1d2b50e39.yaml | 58 +++++++++++++++++++ ...load-65ee5bf735571153b550ec180d2f83b7.yaml | 58 +++++++++++++++++++ ...load-9b43aaab2dbac6c310bbe5db0693f0ed.yaml | 58 +++++++++++++++++++ ...lter-f3d2115fb9f146bc796a9f84dc975747.yaml | 58 +++++++++++++++++++ ...cher-6295a7a546ef764d879b794c2aebb334.yaml | 58 +++++++++++++++++++ ...rder-c638d03db9f642ea8657e9efadb89fe3.yaml | 58 +++++++++++++++++++ ...rder-f5ae27bdecf9c7ab3666827aa6121937.yaml | 58 +++++++++++++++++++ ...ript-03ddcc1c34e43981b71842dcf356a652.yaml | 58 +++++++++++++++++++ ...bers-7cd66621baa98ee6c1094c3629ee5b9c.yaml | 58 +++++++++++++++++++ ...maps-91e768f9e801d14e24ca5019cd490f0a.yaml | 58 +++++++++++++++++++ ...tcs3-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...rary-e9eec5a929c2311a5540a7010e91443f.yaml | 58 +++++++++++++++++++ ...oser-01793590016afb66f5a418a945e41a09.yaml | 58 +++++++++++++++++++ ...oser-0a8a5d2ceeee68cf5d8ceb172875b32d.yaml | 58 +++++++++++++++++++ ...oser-5795df5f8da9d7d45bd34eff74cbbef7.yaml | 58 +++++++++++++++++++ ...oser-b10d497d51d23e43935beff2259b9524.yaml | 58 +++++++++++++++++++ ...oser-bff7cd3ae66179edd6f79145d30bd8a6.yaml | 58 +++++++++++++++++++ ...orms-506c24db7cc3a5984423e257c1b75a3b.yaml | 58 +++++++++++++++++++ ...ress-0e20035daf500b66ef66815e5fae94f5.yaml | 58 +++++++++++++++++++ ...ress-2eaa08a72f8ffd2eb931a796cf5157f4.yaml | 58 +++++++++++++++++++ ...ress-3b16719dacbde5289812e70a9eb8dc52.yaml | 58 +++++++++++++++++++ ...ress-9c5b70c021deba50a223641e7218d917.yaml | 58 +++++++++++++++++++ ...team-005741c51584101e42f20f4a09530ec1.yaml | 58 +++++++++++++++++++ ...team-1d181af5ec91b0160f1b6df2779bb251.yaml | 58 +++++++++++++++++++ ...team-b569d36710f81ad9bca4fdee9649f13c.yaml | 58 +++++++++++++++++++ ...team-d26cb33300448e8878b411d58432ae7f.yaml | 58 +++++++++++++++++++ ...bers-3251ec6afe785e3bef31ff4841e744c5.yaml | 58 +++++++++++++++++++ ...bers-68a19dcbafa893fee0f134b5b9682816.yaml | 58 +++++++++++++++++++ ...bers-97f6d832d77568cb83cbfd8ed5696c11.yaml | 58 +++++++++++++++++++ ...case-50a35a271362419338fef58cbfdfbd44.yaml | 58 +++++++++++++++++++ ...reme-f7d812f744f4c9ca71f204033cc41839.yaml | 58 +++++++++++++++++++ ...dard-62dc43c109e10a4fb2083be6c80b9766.yaml | 58 +++++++++++++++++++ ...tion-32f527b1fe26d5c077366894530c8689.yaml | 58 +++++++++++++++++++ ...-bot-0caf4f2b6437a679adbb5b527c6703b2.yaml | 58 +++++++++++++++++++ ...nker-a6d339b3bc08ee880c9c68cfd52a0937.yaml | 58 +++++++++++++++++++ ...nder-4150b6c5ffc14f9f916be876839f27fe.yaml | 58 +++++++++++++++++++ ...aily-10fa074ce14cd8aff4840b1abbaf6c83.yaml | 58 +++++++++++++++++++ ...ndar-218c9a934953359a2e2d8f63be0a287c.yaml | 58 +++++++++++++++++++ ...ndar-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...ndar-803648dc94dbeaf482d25b8433d5ee7f.yaml | 58 +++++++++++++++++++ ...port-1024fb2bb768926b2f10b7f06d6c4de1.yaml | 58 +++++++++++++++++++ ...port-e259392e4e0f5c005c71447bf33a289e.yaml | 58 +++++++++++++++++++ ...tely-6db2725ca256b74963101e9d1eafe501.yaml | 58 +++++++++++++++++++ ...tion-0f7e356340d28416c48865e039d750ac.yaml | 58 +++++++++++++++++++ ...tion-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...lkit-6880997a756b467547a9370c60ac6681.yaml | 58 +++++++++++++++++++ ...lkit-71cf8d6f1781f11cff9af8b811c7f0b2.yaml | 58 +++++++++++++++++++ ...lkit-d10130ec70ac5e95df8a68d13ca495cb.yaml | 58 +++++++++++++++++++ ...word-e518402d2982dad7f3cfd89eedd61449.yaml | 58 +++++++++++++++++++ ...-cos-1697bad848dd1bd16f0c413821ab2401.yaml | 58 +++++++++++++++++++ ...-cos-b1770f9eb849f830c90d98a4a92d2baf.yaml | 58 +++++++++++++++++++ ...izer-15b5b7552cd59d4fe58cc4180bb081ff.yaml | 58 +++++++++++++++++++ ...izer-20a9d8955f3c9e8e519f715c32a5f589.yaml | 58 +++++++++++++++++++ ...izer-b27ee90d1fddd4df887e8806bf4e7ee4.yaml | 58 +++++++++++++++++++ ...izer-bd8227b6953d3cab7fe7bcfea80c058c.yaml | 58 +++++++++++++++++++ ...arts-18c4c68c7c881f2ea27926221e43a5a9.yaml | 58 +++++++++++++++++++ ...arts-c18aab0e3a8fe7ad353658faf1fddbbe.yaml | 58 +++++++++++++++++++ ...iews-47c8ae751ee325a323299c1e28df1079.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...ions-4ca0cd7e003f070985982d00b73cdc44.yaml | 58 +++++++++++++++++++ ...ieds-4be3fece7979d31adacbce90e5c628f3.yaml | 58 +++++++++++++++++++ ...ieds-8f126edef9e9df4d2ad158f1a5a43c5d.yaml | 58 +++++++++++++++++++ ...nial-9fed5404f994e2e62aad7f01b29dde3c.yaml | 58 +++++++++++++++++++ ...-add-098a7c1e7e4a3294c0b3e783c9234d81.yaml | 58 +++++++++++++++++++ ...lder-cc8d3237ec9d31d7a17e75a3773f4b59.yaml | 58 +++++++++++++++++++ ...lder-ebb1ebcf4f2c8c10213c00b9f2126830.yaml | 58 +++++++++++++++++++ ...free-68309fb63b5db886058ca866de7b117b.yaml | 58 +++++++++++++++++++ ...free-bc1021396d5f2f9f59d1b9e8308f6b42.yaml | 58 +++++++++++++++++++ ...ator-a98e82a7c384a33ad5d0d42365168f67.yaml | 58 +++++++++++++++++++ ...ator-ef09ee87048a20a553f4804a48eb6952.yaml | 58 +++++++++++++++++++ ...ider-0cd68afb7b6d648c1cc92eb32c923eff.yaml | 58 +++++++++++++++++++ ...ider-6d9a6d99fa80beb8d831bc3a1d45ac3c.yaml | 58 +++++++++++++++++++ ...case-3fcde9cc662e3ad45e20c993057641fd.yaml | 58 +++++++++++++++++++ ...case-f54e3a0500b97b96852bb8d2c3a17f16.yaml | 58 +++++++++++++++++++ ...ider-c2d76074465a6dcb60332d83861a2a8f.yaml | 58 +++++++++++++++++++ ...ider-c6bb0e4c31a358c9eb072ecaccea302f.yaml | 58 +++++++++++++++++++ ...code-43c13d89c14426ecb661544b7d24f058.yaml | 58 +++++++++++++++++++ ...gets-064923882cd32ff7964d2ef158cf8d5f.yaml | 58 +++++++++++++++++++ ...gets-0a08727c9a8cc242989bfe2a49030a2a.yaml | 58 +++++++++++++++++++ ...ials-2ee541e9c869c15a8b871966c41047ce.yaml | 58 +++++++++++++++++++ ...dget-f08697abe75fa6ac28d5ec1f1d0bb149.yaml | 58 +++++++++++++++++++ ...tion-2d693d589095b4560f08a66dde7ee787.yaml | 58 +++++++++++++++++++ ...over-c38399df1330c2dfd449ee16ef7996a9.yaml | 58 +++++++++++++++++++ ...tion-3832b3b7c5502757f733258a03de8f45.yaml | 58 +++++++++++++++++++ ...tion-cc2369bd97072a25359057b15b301ff4.yaml | 58 +++++++++++++++++++ ...exty-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...exty-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...aton-0ca0bd9c39bf258c51c77483b135b8f5.yaml | 58 +++++++++++++++++++ ...hviz-04e03efeaf45c2f9ebc60f262f17a9a4.yaml | 58 +++++++++++++++++++ ...arch-299542a4c8b3958179820e8901ce5f1d.yaml | 58 +++++++++++++++++++ ...arch-9baae5fb51d9dd1141e1931574d9d7be.yaml | 58 +++++++++++++++++++ ...arch-9e3753c62120a17f21550a2c92d7d0fe.yaml | 58 +++++++++++++++++++ ...cart-41d911400ca8ace536dfd110ed4dbc79.yaml | 58 +++++++++++++++++++ ...cart-e7aa48c0891a8d823aef1576b3ef286e.yaml | 58 +++++++++++++++++++ ...pare-9baae5fb51d9dd1141e1931574d9d7be.yaml | 58 +++++++++++++++++++ ...ches-a125844e860a48204534272bc2a11b7b.yaml | 58 +++++++++++++++++++ ...cial-f1d890dd18142758b1c8cdecbd50795b.yaml | 58 +++++++++++++++++++ ...ater-5e0fa9fcba55bce0a7d159ec1d8e3486.yaml | 58 +++++++++++++++++++ ...tton-60056c59f58d08c739eaa4877baa7622.yaml | 58 +++++++++++++++++++ ...tton-073c84bcdcba646c59175dbb887b7a95.yaml | 58 +++++++++++++++++++ ...ndar-15adc07dcc170bd663dc3c1e94fa94e1.yaml | 58 +++++++++++++++++++ ...ndar-362ad579ac93dd9d0975339b992aaf7d.yaml | 58 +++++++++++++++++++ ...ndar-55a397e3ac510c4f6b8de73dafe73c50.yaml | 58 +++++++++++++++++++ ...ndar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ndar-c982f06cdd6fece879cc973f1756a4e5.yaml | 58 +++++++++++++++++++ ...ndar-dce291168af66dac21606f747d77714a.yaml | 58 +++++++++++++++++++ ...kets-86cd270f4cc1442525b2973b263a3c27.yaml | 58 +++++++++++++++++++ ...ndar-f52eb0f0fb1dc47ee06378a3c186f4e1.yaml | 58 +++++++++++++++++++ ...diet-e7aa2e734d6d80e9f42443bea3734579.yaml | 58 +++++++++++++++++++ ...ndar-a669ab86f241324d8d2f2b22eaec997d.yaml | 58 +++++++++++++++++++ ...izer-fb202acb909978e8641eabe44749f8ea.yaml | 58 +++++++++++++++++++ ...ddon-d8bfc01f0d93fad4fb2e1a339254a3ed.yaml | 58 +++++++++++++++++++ ...ddon-e89c86876a9fa2c6c7251b6a1cdc42b1.yaml | 58 +++++++++++++++++++ ...itor-64920ba860c3e3d6855bec6b3359aa95.yaml | 58 +++++++++++++++++++ ...itor-fdbe6ed30963d2d89b9e4d6d9ea6d03d.yaml | 58 +++++++++++++++++++ ...lder-20984fc62bd28bb51dbd02e6ae5eacfc.yaml | 58 +++++++++++++++++++ ...lder-28b13ccb507cfeb174aa819fc3235b5f.yaml | 58 +++++++++++++++++++ ...lder-3835c81a3b054f8f577b5a29958ca111.yaml | 58 +++++++++++++++++++ ...lder-3d06eee6979cba3a65776c3770040194.yaml | 58 +++++++++++++++++++ ...lder-421c48e1cd35997d3959562c69cf5279.yaml | 58 +++++++++++++++++++ ...lder-53696e5218de6a7c32a3a9109583afd7.yaml | 58 +++++++++++++++++++ ...lder-6b109b8afc142f70c57afa63265ae2e5.yaml | 58 +++++++++++++++++++ ...lder-712959520f4dede71b7a2d9e44002c33.yaml | 58 +++++++++++++++++++ ...lder-ad74c1853755393f0d665754f820d681.yaml | 58 +++++++++++++++++++ ...lder-c3136cf32a8ee994d42daa37c82bd5e1.yaml | 58 +++++++++++++++++++ ...lder-cd4c918fd5ff72f1664fbf0ef99c4299.yaml | 58 +++++++++++++++++++ ...grid-6d37d0911eec8eaf770eb1eec58145bc.yaml | 58 +++++++++++++++++++ ...grid-aa24420637d5fac56ca63b2271fa8b9f.yaml | 58 +++++++++++++++++++ ...grid-dc7632e71a497cfee47279611e30245e.yaml | 58 +++++++++++++++++++ ...rter-ca1b64ffb0ccae02fca2d23bb2d6ec12.yaml | 58 +++++++++++++++++++ ...code-be0ba3aacccf6ba5116887341d902b74.yaml | 58 +++++++++++++++++++ ...atre-69bd71812f8b19e052624d1ea9f84cfd.yaml | 58 +++++++++++++++++++ ...ress-0918a1cd67495fb4f2501b4a07ebe974.yaml | 58 +++++++++++++++++++ ...ress-380b3f09b95ab564acee2d8952a33e71.yaml | 58 +++++++++++++++++++ ...ress-566549d4981430f7717caf8e709d7d50.yaml | 58 +++++++++++++++++++ ...ress-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml | 58 +++++++++++++++++++ ...ress-e7c178a2471ea08f4ec99b9eb663cf05.yaml | 58 +++++++++++++++++++ ...lder-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...maps-9be84376d34a812060ad8aba2e71f1f0.yaml | 58 +++++++++++++++++++ ...odes-7ba8529af3436a78498f1c21893b7e85.yaml | 58 +++++++++++++++++++ ...odes-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...ders-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...reas-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...port-42bbb29a21ceaaa3011864640412a5ea.yaml | 58 +++++++++++++++++++ ...port-acd2f33fed5535f04cc63cbd673f8668.yaml | 58 +++++++++++++++++++ ...itor-2dfa0b8f134cf415442ecf4c309e85d2.yaml | 58 +++++++++++++++++++ ...itor-eb3be0c0cf31ccd39967171afebb18b6.yaml | 58 +++++++++++++++++++ ...itor-fd1e677494c37ae823f0277f9b7da0c4.yaml | 58 +++++++++++++++++++ ...odes-4f1dddafa18fba59ec7aef53cc2b0d3d.yaml | 58 +++++++++++++++++++ ...fier-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...ogin-755306c8577963b7e9a15f996cc38136.yaml | 58 +++++++++++++++++++ ...ogin-ef20cf055251e93d9b846f8776b699ac.yaml | 58 +++++++++++++++++++ ...user-220d44d27b32ec5f1770ce6de644f463.yaml | 58 +++++++++++++++++++ ...tcha-b4a41681eefe755efd70571167096dd9.yaml | 58 +++++++++++++++++++ ...rive-9aa568df84b066bcc0755624fabcc470.yaml | 58 +++++++++++++++++++ ...lang-f5d278de8a6f52f6b1d00da3aecdfc57.yaml | 58 +++++++++++++++++++ ...uner-66f3161d1022633589022b156d74abba.yaml | 58 +++++++++++++++++++ ...lite-f61528b18c019a7fd52fbe924751e5b4.yaml | 58 +++++++++++++++++++ ...rter-96a6eb43348a230ce62c16f4c805f2b0.yaml | 58 +++++++++++++++++++ ...nion-058a642e0573877c079f2c954605d344.yaml | 58 +++++++++++++++++++ ...nion-0b0a53122105422e3ec1a7c6051d3302.yaml | 58 +++++++++++++++++++ ...nion-175f5f197d39e1751001f35acbaf01df.yaml | 58 +++++++++++++++++++ ...nion-46672cc6093b70f0f99b8c9c1af2d835.yaml | 58 +++++++++++++++++++ ...nion-6440d16b09a3de3d5784ee99cd71888c.yaml | 58 +++++++++++++++++++ ...nion-6738f168d7a8aa50cafb43b72d6946b9.yaml | 58 +++++++++++++++++++ ...nion-6f08ab84e1cb8caf7e2c6c058fbbbb3c.yaml | 58 +++++++++++++++++++ ...nion-79fb0bcc374a70f9a1181c9553d664f5.yaml | 58 +++++++++++++++++++ ...nion-911f38a48744ee0cba908ae42a0febe1.yaml | 58 +++++++++++++++++++ ...nion-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...nion-a3f525d7b3a02a872519446805f2e5b1.yaml | 58 +++++++++++++++++++ ...nion-f0869bd6c833a2dcca8d781669a8f39f.yaml | 58 +++++++++++++++++++ ...ntor-6e2990d184d8844f6771deadef053685.yaml | 58 +++++++++++++++++++ ...lder-30397736441a65fb1b71b67544e3f42a.yaml | 58 +++++++++++++++++++ ...lder-a4983d33df5e385e92545ad0082911fc.yaml | 58 +++++++++++++++++++ ...post-9036b0b68d189e2a08606b1361a322c6.yaml | 58 +++++++++++++++++++ ...cons-2317e44c2f1aa246df478fdf378e128f.yaml | 58 +++++++++++++++++++ ...post-293ee203790c9494dd9271c2d0887ade.yaml | 58 +++++++++++++++++++ ...post-4ad06cea9bbed1fbf99a4d128c33e936.yaml | 58 +++++++++++++++++++ ...post-be668a1f67bf2032bc65bfbd87433e2e.yaml | 58 +++++++++++++++++++ ...post-eeb643b56c37992255be8d889b1e9ae2.yaml | 58 +++++++++++++++++++ ...post-ef2ccc3b2c02ce044d17cf1db08c67d1.yaml | 58 +++++++++++++++++++ ...-ptb-1cf2042a7f76cab8ad8de631e6023745.yaml | 58 +++++++++++++++++++ ...-ptb-30618ae67f4be74afbd8c2992d6203d9.yaml | 58 +++++++++++++++++++ ...arch-76258f27176a5343dd9686e2b8dcac25.yaml | 58 +++++++++++++++++++ ...odes-52e89cc1870832c0bf35fd7b63eefddc.yaml | 58 +++++++++++++++++++ ...odes-6d39c5dd9e079ccbe9ac0c1a99d74a94.yaml | 58 +++++++++++++++++++ ...odes-7fb1bb76537e399dfae9ca2dc54c6a8c.yaml | 58 +++++++++++++++++++ ...lter-50b5d414fd08ab5c52f1201434d28062.yaml | 58 +++++++++++++++++++ ...lter-cac21e55f896febf57888b4da2df94b8.yaml | 58 +++++++++++++++++++ ...lter-cf981f122fbf50e8a58080fdccd2e915.yaml | 58 +++++++++++++++++++ ...lter-d0c7733d559f41b4b35373b971b25453.yaml | 58 +++++++++++++++++++ ...ddon-42da06bbd85810d2b121cf524da3d863.yaml | 58 +++++++++++++++++++ ...ddon-5a73608ad73ff1099a14f74919aa1eff.yaml | 58 +++++++++++++++++++ ...ddon-82599fc80ce8e9167026a24befbd5025.yaml | 58 +++++++++++++++++++ ...ddon-a014fe0d588971955e094229935a8c6e.yaml | 58 +++++++++++++++++++ ...ddon-ad74c1853755393f0d665754f820d681.yaml | 58 +++++++++++++++++++ ...ddon-b93cfae43335af57ef88a10fac024249.yaml | 58 +++++++++++++++++++ ...ddon-ecbb50223a0cdb771fc6a4f617780de7.yaml | 58 +++++++++++++++++++ ...ddon-ee363fd534d1a755fb5facda5882c857.yaml | 58 +++++++++++++++++++ ...hook-a514048fb251bf33fbe7f38a2147dc40.yaml | 58 +++++++++++++++++++ ...aphy-4f6c9e5f134bc3a7357c0b3f26384141.yaml | 58 +++++++++++++++++++ ...-kit-1eee2854f94957b31e7d0d2d3c4c5271.yaml | 58 +++++++++++++++++++ ...ader-d35fe59b43f4760392f4ec7a5eaa4ede.yaml | 58 +++++++++++++++++++ ...form-3134d0e942033e6ac2b7d54901e657a7.yaml | 58 +++++++++++++++++++ ...form-4ffa4f4b774dde3b240b3f91f3c7533e.yaml | 58 +++++++++++++++++++ ...twit-eae5f7c2210c1cdf959e29a045115865.yaml | 58 +++++++++++++++++++ ...mind-0777ed3a3a96e55428342d8be3673b96.yaml | 58 +++++++++++++++++++ ...ates-7f32d3ac2f0177d9329a7490c025ed06.yaml | 58 +++++++++++++++++++ ...ates-8982f505d6a79ae940fb4ce5e211ca2b.yaml | 58 +++++++++++++++++++ ...ates-edc3a8280c90c700d2ea22dbd7cd3a1b.yaml | 58 +++++++++++++++++++ ...tory-6254bdc184e74d40b3b0be9a1c286f34.yaml | 58 +++++++++++++++++++ ...ctor-260d59850520222ae9e82cf8d0c5f77a.yaml | 58 +++++++++++++++++++ ...ting-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...tice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...ator-954cc7b2d6b89c7d92594b8f26d6124a.yaml | 58 +++++++++++++++++++ ...gets-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...ents-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...oard-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...izer-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...eads-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...tion-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...lder-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...atum-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...itor-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...away-36c982ede7470d2e3e88a740557c4530.yaml | 58 +++++++++++++++++++ ...rpts-bab8c0d44e1c325d945380a6221bd569.yaml | 58 +++++++++++++++++++ ...ting-28083443631175bd4dcd05294b64aae6.yaml | 58 +++++++++++++++++++ ...ting-f00e3cac8717028c6c69750368de6108.yaml | 58 +++++++++++++++++++ ...list-566c05bbe9b725b2c0c80f4e03660720.yaml | 58 +++++++++++++++++++ ...list-728e240a198c7c451039858fc71e171c.yaml | 58 +++++++++++++++++++ ...list-c1e85ed5dbff1aadf024b8bce56884f9.yaml | 58 +++++++++++++++++++ ...mium-728e240a198c7c451039858fc71e171c.yaml | 58 +++++++++++++++++++ ...mium-c1e85ed5dbff1aadf024b8bce56884f9.yaml | 58 +++++++++++++++++++ ...mate-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...stem-207f27a384ef3a3941e38d3aa57e12b4.yaml | 58 +++++++++++++++++++ ...stem-2d0717f7b86d7fd0bf523aa76bbbaeb6.yaml | 58 +++++++++++++++++++ ...stem-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...stem-c24d0aa2f1031533f0515499592257fe.yaml | 58 +++++++++++++++++++ ...stem-e6aee90d79a8ce1370df8b0531e47510.yaml | 58 +++++++++++++++++++ ...ager-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ilor-64923c9a5ffa9c7e5e2ff84955e346c3.yaml | 58 +++++++++++++++++++ ...form-885c0e7d869967a6d9428aa8fe4ebe55.yaml | 58 +++++++++++++++++++ ...lery-051fe49289887077b7bf7774208d8ef1.yaml | 58 +++++++++++++++++++ ...chat-3713d3bbe5441b73f08676feaf2b85ec.yaml | 58 +++++++++++++++++++ ...chat-a8fc519a1878f904c76257237b147fde.yaml | 58 +++++++++++++++++++ ...ocom-1e76bb40e4de81280c04372b8a422f59.yaml | 58 +++++++++++++++++++ ...ocom-3cda5f6cbc287806403c6627673d9151.yaml | 58 +++++++++++++++++++ ...ocom-f4fc2d0ee12c0981504dfb21225895dd.yaml | 58 +++++++++++++++++++ ...able-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...form-e900f7eced6fb67094982ccf0f2ecdaa.yaml | 58 +++++++++++++++++++ ...hing-2da3bb827430b38a292fe600fab2f658.yaml | 58 +++++++++++++++++++ ...eets-1e381af0c631b13f86322331880f1612.yaml | 58 +++++++++++++++++++ ...eets-49fe99f51fd3a93a572d1c7ee54d4741.yaml | 58 +++++++++++++++++++ ...eets-f2aba70ce8a44005876e1620c7a6d111.yaml | 58 +++++++++++++++++++ ...tent-2049615ded6008298be273ad480dccbb.yaml | 58 +++++++++++++++++++ ...ider-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...some-4dec1d95d84aa9956ba49479ab4962de.yaml | 58 +++++++++++++++++++ ...ndar-85e4c9b56c88bebde438fcf37c31b92a.yaml | 58 +++++++++++++++++++ ...ntor-e56f591ae1b5802507934b44dcafdc98.yaml | 58 +++++++++++++++++++ ...npro-7246f496264a94e15a1d8c35393cc7dd.yaml | 58 +++++++++++++++++++ ...tton-a2f77566f40955cc7451f648aaec112c.yaml | 58 +++++++++++++++++++ ...heet-22a755155bed2f04b1157ca6e2e3c976.yaml | 58 +++++++++++++++++++ ...humb-a4aa366f217005e74322ff2bf7a0e182.yaml | 58 +++++++++++++++++++ ...humb-b970262dad30a7d484efebc698a4fbb7.yaml | 58 +++++++++++++++++++ ...nner-5eff25f23e727e07861c6b9793205529.yaml | 58 +++++++++++++++++++ ...ider-54520ac61a70e176cb0b123fca675fcd.yaml | 58 +++++++++++++++++++ ...plus-e0a3631cbe633a42d5989c02ecf7206b.yaml | 58 +++++++++++++++++++ ...form-daddd512be0305b66a7c59d444cececf.yaml | 58 +++++++++++++++++++ ...mspy-9f9e4858911ea4301e5e57019a58fb6b.yaml | 58 +++++++++++++++++++ ...nced-43f501281b9dc8f645fd47c4a0800fba.yaml | 58 +++++++++++++++++++ ...yles-a238023f989616cc05c2de1d1e0516a1.yaml | 58 +++++++++++++++++++ ...tate-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tate-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...cker-63703d9ee4495028e03f0458c1905965.yaml | 58 +++++++++++++++++++ ...cker-ffaf15e9710e51e22815d7c14866275b.yaml | 58 +++++++++++++++++++ ...yles-500071d87ecb0967bf74f13aaaaabbd7.yaml | 58 +++++++++++++++++++ ...yles-c3680e3206f99027fb5f3986ae69948a.yaml | 58 +++++++++++++++++++ ...lery-d4668154e14e969595c9de23505f40d2.yaml | 58 +++++++++++++++++++ ...ippy-13d220693e087642304f87b309abc136.yaml | 58 +++++++++++++++++++ ...rier-3a70527433a2343d8a6eb73d336b1d11.yaml | 58 +++++++++++++++++++ ...rier-6007b8b9442eb6013d2d90e94b8a6f90.yaml | 58 +++++++++++++++++++ ...work-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...work-8048ca5fa2e5dc8c9443b2fbef022686.yaml | 58 +++++++++++++++++++ ...udit-cb74790ba4bbb7de85dca1c3cb33c74c.yaml | 58 +++++++++++++++++++ ...tion-32a996c823f220857a5611dc8238f0fc.yaml | 58 +++++++++++++++++++ ...onts-0439b5ba8ec01f6ad565e8fbfefdff7e.yaml | 58 +++++++++++++++++++ ...onts-75dc3c235e29287a43892beb13ca3ae4.yaml | 58 +++++++++++++++++++ ...onts-8ac6490c5c7ec2a3665c4caa676311dd.yaml | 58 +++++++++++++++++++ ...onts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...code-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...olio-104358d8439dd47eecd1fd56dc0931ad.yaml | 58 +++++++++++++++++++ ...olio-248c17eb0194783cca6065d1efba6689.yaml | 58 +++++++++++++++++++ ...team-cdba025b70cc52735f49fc0178ac6ba2.yaml | 58 +++++++++++++++++++ ...list-4951c2f84359ebbaf9ae45fa01138a5f.yaml | 58 +++++++++++++++++++ ...-2fa-df76c0e1569130642f03fed33b459e14.yaml | 58 +++++++++++++++++++ ...lder-ad314c516dbfab27754190c924b97ec4.yaml | 58 +++++++++++++++++++ ...-top-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 58 +++++++++++++++++++ ...hing-439f898124b090bed262004bd1d51e22.yaml | 58 +++++++++++++++++++ ...hing-9efc44a2e2c2df22995a8fc10affc12c.yaml | 58 +++++++++++++++++++ ...itle-d02abc95243fe34c87855a6ca2a95d58.yaml | 58 +++++++++++++++++++ ...m8te-999f932c9f3d9b513b20f73dd0f5752b.yaml | 58 +++++++++++++++++++ ...hare-4c6e2168599e221f42c1bf26fb04cbf7.yaml | 58 +++++++++++++++++++ ...page-fc90c64fe13a7ebe4bd7cb7436d1b567.yaml | 58 +++++++++++++++++++ ...p-10-11f988700fa46a478a10a059a72cb6a3.yaml | 58 +++++++++++++++++++ ...p-10-4b2149909b70a0a5dde344497a2540e6.yaml | 58 +++++++++++++++++++ ...p-10-8a2fdef7cc698ec15988b37831ded08d.yaml | 58 +++++++++++++++++++ ...p-10-91499f9c529069cc8bb058d78e92bdab.yaml | 58 +++++++++++++++++++ ...p-10-a631956fae26932cfe37dec9f8eea277.yaml | 58 +++++++++++++++++++ ...p-10-aebc987297daa60ebc9f62d4c873ab22.yaml | 58 +++++++++++++++++++ ...p-10-d6080d1f6e6aba862d174924fa49080e.yaml | 58 +++++++++++++++++++ ...p-10-e382c8222b1abf6c6b2e0b2db7e0beeb.yaml | 58 +++++++++++++++++++ ...p-10-e7e948bfa89ef889d57ad4a644f6ffc0.yaml | 58 +++++++++++++++++++ ...cons-34bed79fb50712c291365a8ff729b6f4.yaml | 58 +++++++++++++++++++ ...-bar-4f0560b0cde9af506953920ade591947.yaml | 58 +++++++++++++++++++ ...-bar-7b68da6e2373d2ac5c585efcf03c710b.yaml | 58 +++++++++++++++++++ ...-bar-f8df3f710c2acd675329722d570c9bc9.yaml | 58 +++++++++++++++++++ ...ents-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...uark-40135bc4e3a937389149719d0bfc1b0d.yaml | 58 +++++++++++++++++++ ...orms-0b90da005dc4b695e711677701780a3d.yaml | 58 +++++++++++++++++++ ...ions-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml | 58 +++++++++++++++++++ ...erce-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...rity-d59208c9d25614855049428d0906a55a.yaml | 58 +++++++++++++++++++ ...rity-fa39168559be958bde89e0128746256e.yaml | 58 +++++++++++++++++++ ...lite-79e3222cd5781d3ee2de3dbd9ec9763f.yaml | 58 +++++++++++++++++++ ...lite-dfd03aad01c26cf05b1c4c93b960bbc9.yaml | 58 +++++++++++++++++++ ...link-60f02b8fa4eb1579a77b1a967b981a9d.yaml | 58 +++++++++++++++++++ ...ager-54c41ad802aaebe2d928746014c08472.yaml | 58 +++++++++++++++++++ ...rfic-2b22d0b76b6d55c94058bbf5818916eb.yaml | 58 +++++++++++++++++++ ...rfic-98b35360d65753a713db3a25c694f42c.yaml | 58 +++++++++++++++++++ ...rfic-edd8e3c62f3b71f626ad36553a59802b.yaml | 58 +++++++++++++++++++ ...rfic-f0ebaf7908d2916224db8f5d1ff59d88.yaml | 58 +++++++++++++++++++ ...tion-da386ce90f0520e508b80fb1a2e2a0c2.yaml | 58 +++++++++++++++++++ ...rect-98c7efbdf31bd767f6d42c5af6007d9c.yaml | 58 +++++++++++++++++++ ...tics-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...rm-7-5fc14f2bf72ff01c08c1f94583d480b0.yaml | 58 +++++++++++++++++++ ...stat-9b7b630dc39bbb454cf973350a25b5ed.yaml | 58 +++++++++++++++++++ ...lick-61b51e0560f095cce3544140b3170777.yaml | 58 +++++++++++++++++++ ...eets-0d742014c6c6d4f612dc93a0d8ee844f.yaml | 58 +++++++++++++++++++ ...ager-421ea02f0f2faaa78ee159ebbd1f2ea2.yaml | 58 +++++++++++++++++++ ...ager-6e8a9152de2bbc5b83be5ce9d45091f1.yaml | 58 +++++++++++++++++++ ...ager-d699893673e058c723134b07631ea093.yaml | 58 +++++++++++++++++++ ...ager-f9f8c7475cd82f380479dbcd08cdc45c.yaml | 58 +++++++++++++++++++ ...erce-8c789a924b584ff9b2a3b88bc5b7e816.yaml | 58 +++++++++++++++++++ ...nner-0335e77335774af60e62b59ea8bf3dff.yaml | 58 +++++++++++++++++++ ...nner-38e522344d31819f399f7be27a471788.yaml | 58 +++++++++++++++++++ ...tore-1ff709162f10c9c6eac55480ea55c5a7.yaml | 58 +++++++++++++++++++ ...ager-0cc0200594a7eced582455e86333c795.yaml | 58 +++++++++++++++++++ ...ager-1b0051f6cdacf52fc28a89570f274917.yaml | 58 +++++++++++++++++++ ...yzer-f3bf3aa52e1e30ba08101ace5617af2a.yaml | 58 +++++++++++++++++++ ...rest-73d72f655c3b804018b0ad6a3a400257.yaml | 58 +++++++++++++++++++ ...oder-d2e24dc9b57b626b239083dab805eaec.yaml | 58 +++++++++++++++++++ ...gual-17f9d007266f9a0cab0ee55eb44edcc9.yaml | 58 +++++++++++++++++++ ...gual-1bcc8deaed7a36dfed3699cc2606446d.yaml | 58 +++++++++++++++++++ ...ange-31af361d998f1bee646666eb75e8dde6.yaml | 58 +++++++++++++++++++ ...ress-49c0e5a87593ae8cdbc066b20e281fbc.yaml | 58 +++++++++++++++++++ ...ress-4b35d32175d8c6a60caf01bbc915cbc9.yaml | 58 +++++++++++++++++++ ...ress-4b9ec610b796c8632d430b70259226bd.yaml | 58 +++++++++++++++++++ ...ress-99547d0fc21ffda2676b791122585c77.yaml | 58 +++++++++++++++++++ ...ress-a687f130dc4fb0dc3fa1596936a6c928.yaml | 58 +++++++++++++++++++ ...ress-bc943b920a596196582824c3eeb70aba.yaml | 58 +++++++++++++++++++ ...ress-d8f6d24ae9aefabd89bc3732379fc08a.yaml | 58 +++++++++++++++++++ ...ress-f437ea7631a9816d78b50dbf1934085a.yaml | 58 +++++++++++++++++++ ...ress-ff4e9233f972b9e92d912d8cb47ef8e2.yaml | 58 +++++++++++++++++++ ...nzly-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ight-23bff824abe3c334624b92f8ce9d99b5.yaml | 58 +++++++++++++++++++ ...-map-d60ef1067dd86b18895f878c5b5156fd.yaml | 58 +++++++++++++++++++ ...blog-24d707836e835d320b88fb566bce9822.yaml | 58 +++++++++++++++++++ ...outs-6ab0ff32728ffec64a0e21f4658b6bb5.yaml | 58 +++++++++++++++++++ ...outs-b09a62954fc53a69adf6069c4bfa2ef7.yaml | 58 +++++++++++++++++++ ...-map-77f419c6676bae16b665cb7bfb361770.yaml | 58 +++++++++++++++++++ ...-map-94fb995c7fcb31381238e0489629c885.yaml | 58 +++++++++++++++++++ ...ress-537feb2660b274ef93e595158af0eec1.yaml | 58 +++++++++++++++++++ ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erty-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...ugin-feb2ed9a776f1da5d8e1058653f64bda.yaml | 58 +++++++++++++++++++ ...eway-3b9f3653c0029d132688d85fbc757af3.yaml | 58 +++++++++++++++++++ ...etto-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...etto-cbd3eb6cc45789e5134a8a2c5f167a39.yaml | 58 +++++++++++++++++++ ...form-68ca9f8a242a5c678fbfe7eb11cba349.yaml | 58 +++++++++++++++++++ ...3ds2-54a8519739469e9488888f770d59f330.yaml | 58 +++++++++++++++++++ ...3ds2-98fdced366cbe609ca2059360fd4aeb3.yaml | 58 +++++++++++++++++++ ...erce-6a7609985d974c1a4f6bfca880ceff9a.yaml | 58 +++++++++++++++++++ ...erce-83fc5c78890dc3902a4d33e267bdeee6.yaml | 58 +++++++++++++++++++ ...file-d9e69153baef2dd2b92bf1c6141dd476.yaml | 58 +++++++++++++++++++ ...dons-69db74f4852004f23d22f9fcc0555117.yaml | 58 +++++++++++++++++++ ...noha-dfc5edcffb51809997c1a8d53e1c44ad.yaml | 58 +++++++++++++++++++ ...kura-20e7688da466978fa975c03a8c97cece.yaml | 58 +++++++++++++++++++ ...kura-a105732b2a52f48ea5c6c2e4cd20e7e6.yaml | 58 +++++++++++++++++++ ...kura-c6294db0063d8f01b936cac40a7466ae.yaml | 58 +++++++++++++++++++ ...ayer-f7f846ee6a2643596409a73557db5ac2.yaml | 58 +++++++++++++++++++ ...ress-57636a2970a5968684b69eba7f56b3ea.yaml | 58 +++++++++++++++++++ ...ions-6b17719b7745b3293d6a68a531034051.yaml | 58 +++++++++++++++++++ ...ions-be55063f7f98deaf97bbbf0199feb448.yaml | 58 +++++++++++++++++++ ...rary-61d4a8b20f3ed6218af8118f12f3c6f5.yaml | 58 +++++++++++++++++++ ...gets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...gets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...osts-0e14619d4299f9ad0b2cbdadcef1842c.yaml | 58 +++++++++++++++++++ ...utor-015631a41e17e7c68847b5f1f1c1e6e5.yaml | 58 +++++++++++++++++++ ...utor-06bc0f0b4cde81f2a3c25e5d1294f81f.yaml | 58 +++++++++++++++++++ ...utor-0f7d324b49374ff1264595834ad272cb.yaml | 58 +++++++++++++++++++ ...utor-14663e06b0c267ee32922b2e7b917924.yaml | 58 +++++++++++++++++++ ...utor-1a3c55b78621c5a0f1132cb6e90ef267.yaml | 58 +++++++++++++++++++ ...utor-1b5a3539f272e50644f8022d37b4430b.yaml | 58 +++++++++++++++++++ ...utor-2219d30096a201736b1d63372957d1b1.yaml | 58 +++++++++++++++++++ ...utor-2b473e1a0769986163223c209e7c2396.yaml | 58 +++++++++++++++++++ ...utor-3a1a2462f10e12efaa2197ad33a42396.yaml | 58 +++++++++++++++++++ ...utor-583b3f0f882e9563f461b70129fd6f7b.yaml | 58 +++++++++++++++++++ ...utor-5979ee9f3da8926b114aaafc108d86c3.yaml | 58 +++++++++++++++++++ ...utor-728966d9c09b57c99055d67de463c279.yaml | 58 +++++++++++++++++++ ...utor-78fae6f744a75ffe299dd93a24365b9f.yaml | 58 +++++++++++++++++++ ...utor-78ff72d9346255abccb5396c4cac06cb.yaml | 58 +++++++++++++++++++ ...utor-7feda050b3f384761620a931ffec2f7f.yaml | 58 +++++++++++++++++++ ...utor-805b776aa99780dfe83d45b24c67ce87.yaml | 58 +++++++++++++++++++ ...utor-853a8966d699d4f6cdb8b175598ce3ed.yaml | 58 +++++++++++++++++++ ...utor-982f78919d6ffdbae69689e67e460d30.yaml | 58 +++++++++++++++++++ ...utor-a9f74f94f7fdfe42f50099f4c0f55e53.yaml | 58 +++++++++++++++++++ ...utor-b38686638c5362ebcaa7af99aefa8146.yaml | 58 +++++++++++++++++++ ...utor-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml | 58 +++++++++++++++++++ ...utor-b9268ddd3338fe184d978d9f6b4b6b66.yaml | 58 +++++++++++++++++++ ...utor-c0f6a6341ec834d167178ebdcad90073.yaml | 58 +++++++++++++++++++ ...utor-c52e67edc9fcaef058b0a6422fbb16e8.yaml | 58 +++++++++++++++++++ ...utor-c75d16ff72ec9720f6fa40f4e6a40b23.yaml | 58 +++++++++++++++++++ ...utor-cb03fd3d39a18ba5fc9dfbdcafc632b1.yaml | 58 +++++++++++++++++++ ...utor-d8208bd4e60d421585f9ef9118f52dc1.yaml | 58 +++++++++++++++++++ ...utor-e2363905c79cd827257e78bbd587e9a9.yaml | 58 +++++++++++++++++++ ...utor-e8391494de925affdef94809fe41363c.yaml | 58 +++++++++++++++++++ ...utor-ee13651f12379100949dbc5d6ec901e8.yaml | 58 +++++++++++++++++++ ...utor-f530ac7e06964741f1f737d7f624d307.yaml | 58 +++++++++++++++++++ ...utor-f99975c48c34eedbd4615cb8e4e07928.yaml | 58 +++++++++++++++++++ ...dons-57be4142bba97742b3c54d88f289eda5.yaml | 58 +++++++++++++++++++ ...oads-e87d1b56c2a442f8852b77f4c58543d2.yaml | 58 +++++++++++++++++++ ...iews-276bf528dcf846639fd31e2f34582a53.yaml | 58 +++++++++++++++++++ ...chat-1b6d6a3b10f19ccd74a4ee734a0f0ee6.yaml | 58 +++++++++++++++++++ ...chat-f2bbc682244e8a496bf0cb76f67467d1.yaml | 58 +++++++++++++++++++ ...eple-ca308dcf17a0b7f5d26b3212b813a6aa.yaml | 58 +++++++++++++++++++ ...nder-b04c389a2c7db09e215c22221497896f.yaml | 58 +++++++++++++++++++ ...post-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...post-9cdc97f4b49b38ab2b29bd8a59a5e2a0.yaml | 58 +++++++++++++++++++ ...post-b4cd17df95bd140cf7c61464c7525ad6.yaml | 58 +++++++++++++++++++ ...heel-79a6c6928e7e7b780f5e2d2e60aa16c6.yaml | 58 +++++++++++++++++++ ...heel-afd2744612e8626c5e5d28907e19b048.yaml | 58 +++++++++++++++++++ ...ribe-181c4a45776e23b2e4688d3d65b94f78.yaml | 58 +++++++++++++++++++ ...dget-a75aed58343a47e8c366c92bf6c30f08.yaml | 58 +++++++++++++++++++ ...ty20-227a5c7ee9b9e5c6c608ba88b684ac16.yaml | 58 +++++++++++++++++++ ...aper-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...p-wp-f1ba708b36938f8403e7e3c932465c6c.yaml | 58 +++++++++++++++++++ ...tget-1280f1445230b7ae1ede9b8d16dcfe7d.yaml | 58 +++++++++++++++++++ ...tget-ae271d2d4ccc1afd11c18a1dfce05e0c.yaml | 58 +++++++++++++++++++ ...weet-95e6d76ba8d0fec093b1906b71015aa5.yaml | 58 +++++++++++++++++++ ...ider-bb937d8b80c96bf28d192769190e5a64.yaml | 58 +++++++++++++++++++ ...meta-61a96d10635962decc1ce6046743090a.yaml | 58 +++++++++++++++++++ ...meta-dc78477c8100a1cf79517cd718961ced.yaml | 58 +++++++++++++++++++ ...meta-f47b58aa7a47ddf3e1cee744a91d58ee.yaml | 58 +++++++++++++++++++ ...dget-d6876da6619cc37a90baffbdd9833da4.yaml | 58 +++++++++++++++++++ ...blog-42c67e99f4b0956315e05e4c9000cee0.yaml | 58 +++++++++++++++++++ ...ugin-0be6c78c98564af0756cb75d83e4ca54.yaml | 58 +++++++++++++++++++ ...ugin-d8d27a0f27f9a3ef698ef167496cc3cc.yaml | 58 +++++++++++++++++++ ...ugin-df50b4bafe4c4501f744155f1ffc2d55.yaml | 58 +++++++++++++++++++ ...dash-29127228d14d384699d6b5442d961328.yaml | 58 +++++++++++++++++++ ...call-953b50610487338e685a5cf5fb66996e.yaml | 58 +++++++++++++++++++ ...tion-5e2cda3c648eae11638d20b64a6ac7f2.yaml | 58 +++++++++++++++++++ ...tion-f066ce4a5d628014aa8c478503783258.yaml | 58 +++++++++++++++++++ ...ager-a3ea3eadba50d012fd5181689a40ff84.yaml | 58 +++++++++++++++++++ ...sure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ebot-2dfca9afbcd5108da5d0b371a8c3da93.yaml | 58 +++++++++++++++++++ ...ypes-0a99c8d6ca146b58134b86cdf1bd1b53.yaml | 58 +++++++++++++++++++ ...ypes-30b50f08ba3bd834d5cba525e28c2ad2.yaml | 58 +++++++++++++++++++ ...ypes-f2d9478a61ae546bc6c42d7e589dc8be.yaml | 58 +++++++++++++++++++ ...pofr-4d609a345d021b6f474f9e27302e1298.yaml | 58 +++++++++++++++++++ ...peru-f2c3929c09b259d783ad3e308478fb8e.yaml | 58 +++++++++++++++++++ ...text-474821f1bfc79c7314fe0d7eec328e34.yaml | 58 +++++++++++++++++++ ...azon-cac3c9ade2b34b60466d535155587563.yaml | 58 +++++++++++++++++++ ...draw-bdbcc1232260c01ca170cb0fd5c807cf.yaml | 58 +++++++++++++++++++ ...down-15a33f4bb5e2d06a85f82ec34f8865fa.yaml | 58 +++++++++++++++++++ ...down-72e728e9748e016a77172519c9f57dce.yaml | 58 +++++++++++++++++++ ...opup-de9e079bb83ef0de7a86b06c72e28cbc.yaml | 58 +++++++++++++++++++ ...okie-187ba8ada5a41b0d7770ae8aebf496fa.yaml | 58 +++++++++++++++++++ ...sent-c62e1a09b5d25064f2b824e42c65ea26.yaml | 58 +++++++++++++++++++ ...-crm-27f214402efdbe2c3b0f5b6769f3d129.yaml | 58 +++++++++++++++++++ ...oard-19a7dd3894c625a145c40adc74330444.yaml | 58 +++++++++++++++++++ ...ting-2082dbaf9edb41272f9cdbee4745f6ea.yaml | 58 +++++++++++++++++++ ...ting-24b23f372a9b3fb67e55f59a220932b6.yaml | 58 +++++++++++++++++++ ...ting-3262dd8277294ea89d83139475cd5b78.yaml | 58 +++++++++++++++++++ ...ting-36444e5193280ad0907d2e76be8be503.yaml | 58 +++++++++++++++++++ ...ting-3f0cdd113a5dc6e8c57d6d8884bb2046.yaml | 58 +++++++++++++++++++ ...ting-470a77f2468b82bfe33702afea1bef64.yaml | 58 +++++++++++++++++++ ...ting-6543c4464af9cc8a7951778c3557602f.yaml | 58 +++++++++++++++++++ ...ting-83811d9b1f9b97a8bbd0a5e724834401.yaml | 58 +++++++++++++++++++ ...ting-854fbb986eea30c9b6ae9000bc6d9efa.yaml | 58 +++++++++++++++++++ ...ting-929d1756f21a22cbefc18ee9e80a95fd.yaml | 58 +++++++++++++++++++ ...ting-93bdb0cf774445292043ebf14695588f.yaml | 58 +++++++++++++++++++ ...ting-97376ff2f9573b5a393871b387b01b84.yaml | 58 +++++++++++++++++++ ...ting-992243a3e82e516c6ec6b7febbf82953.yaml | 58 +++++++++++++++++++ ...ting-a1f1c6c86ee1f2f79ad0b2ee7c41833d.yaml | 58 +++++++++++++++++++ ...ting-a20ba6f3c763563b32768dda0edf95aa.yaml | 58 +++++++++++++++++++ ...ting-a847b30526e9eda8af7322c234934756.yaml | 58 +++++++++++++++++++ ...ting-c1bd4d0b368ec2fd5b9252cc36742695.yaml | 58 +++++++++++++++++++ ...-410-80866fdc72be2b54c095a4fd7f7db5e4.yaml | 58 +++++++++++++++++++ ...lder-d5ab4dadd75fec9af134144e666ff1a3.yaml | 58 +++++++++++++++++++ ...lite-1a33452c961e3444957f4bc07615cf79.yaml | 58 +++++++++++++++++++ ...lite-33a470e219d30f02e24dacca366cf3a9.yaml | 58 +++++++++++++++++++ ...lite-6a22eab260469991c892609c3554e5c2.yaml | 58 +++++++++++++++++++ ...lite-71c8544bfd8e2585abc3fe4c509dc5e8.yaml | 58 +++++++++++++++++++ ...lite-74e928a44773876c1faeda39f648c8c1.yaml | 58 +++++++++++++++++++ ...lite-909eee3c64db045125d6a0e9ea1350a2.yaml | 58 +++++++++++++++++++ ...lite-933cb3c57cef1616939f9329edac577e.yaml | 58 +++++++++++++++++++ ...lite-b79883c3437a6dd7938862f157254782.yaml | 58 +++++++++++++++++++ ...rm-7-4c7073bcb34b91519f3886f6522a24df.yaml | 58 +++++++++++++++++++ ...rm-7-6cf0838d8f56929452bab2f8ff3f1bd8.yaml | 58 +++++++++++++++++++ ...rm-7-6ecaac8965c567964f683839f3212253.yaml | 58 +++++++++++++++++++ ...rm-7-8461759ea5a4f2c3230ae2ba89953371.yaml | 58 +++++++++++++++++++ ...rm-7-89c7530bb0ccb65cbe93d8710754fbde.yaml | 58 +++++++++++++++++++ ...rm-7-b2845fc817c419db85576f698a4d3013.yaml | 58 +++++++++++++++++++ ...rm-7-b8421311d76851450148e6c1e68c8aa3.yaml | 58 +++++++++++++++++++ ...rm-7-c0847a869834cac59e5bd8ee9a8f049f.yaml | 58 +++++++++++++++++++ ...ntor-688329ccf7bb0b49cbf94f9e95fe056a.yaml | 58 +++++++++++++++++++ ...berg-11a2580b3d0abb5ce4a2d1b75225b077.yaml | 58 +++++++++++++++++++ ...berg-2e1aa97d2a69303c55e94b8b3fd49dd1.yaml | 58 +++++++++++++++++++ ...berg-54ca82ae8ec1733aa6ce2fbfb7528cc8.yaml | 58 +++++++++++++++++++ ...berg-5e747ec4420f9649cb9fa7868eb33968.yaml | 58 +++++++++++++++++++ ...berg-74062d3bc6524d681fbfe5faf76c4ab5.yaml | 58 +++++++++++++++++++ ...berg-7be36c301f6852821a57629c849c8dbf.yaml | 58 +++++++++++++++++++ ...berg-7f4172230ab5f4cfd3c2df5f07ea6d4e.yaml | 58 +++++++++++++++++++ ...berg-baf6f9647aa6e6045c6bf5dfb25901ae.yaml | 58 +++++++++++++++++++ ...berg-c5f769a2ad53c678c35d169acd9dd76e.yaml | 58 +++++++++++++++++++ ...berg-d75adb1e1a8470a2c11b41a61ac1c215.yaml | 58 +++++++++++++++++++ ...berg-da3f3594c596e882f29a46f5eb088351.yaml | 58 +++++++++++++++++++ ...berg-e2ba51cd3a24abd61ca453335ef98edb.yaml | 58 +++++++++++++++++++ ...berg-e57055214b95f532f53777eeb789b4ce.yaml | 58 +++++++++++++++++++ ...berg-f25e6249bdc00f58ed87833d8179196d.yaml | 58 +++++++++++++++++++ ...berg-fbe34f85c5c0e3a0ed7be431ce9a9754.yaml | 58 +++++++++++++++++++ ...ling-9936959fd813ccd389d4906204f0314e.yaml | 58 +++++++++++++++++++ ...tion-06c61feebda6eda56577372883413c6b.yaml | 58 +++++++++++++++++++ ...tion-2b8dbf4f0e346913342b93011c311311.yaml | 58 +++++++++++++++++++ ...ocks-8ecac7c0d333dc76f1706559fa2ff22f.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-825ff2ff95290127035d7fc582cf6f47.yaml | 58 +++++++++++++++++++ ...ntor-b7beb3a7782030a0bf8580cffcb377f0.yaml | 58 +++++++++++++++++++ ...llow-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-d246c52e9d4725c7b245a84d679cf9a0.yaml | 58 +++++++++++++++++++ ...oser-5829eead4c96879234a4f24b2d7f9ad4.yaml | 58 +++++++++++++++++++ ...uder-47b41bc2712a70e4aff6fb8649c1924a.yaml | 58 +++++++++++++++++++ ...oard-5955a72c6d4dde7cf5a0b6e449e430ae.yaml | 58 +++++++++++++++++++ ...oard-74982fb1ee6ee7e80b9e6c7f6db4f09f.yaml | 58 +++++++++++++++++++ ...oard-b6be8c11fad37e887646a283e9c47ba4.yaml | 58 +++++++++++++++++++ ...oard-c5b5b783e98de972c2044e0acdd3ca83.yaml | 58 +++++++++++++++++++ ...ntor-6c08edd49eae20ef345d45ae5326d421.yaml | 58 +++++++++++++++++++ ...ntor-9d2da4be0bb177af2af2d4539faa65e1.yaml | 58 +++++++++++++++++++ ...ntor-b3de31ba898622222026a1275ef3dc05.yaml | 58 +++++++++++++++++++ ...ents-507dc7ea634baa930020adb83f291cb6.yaml | 58 +++++++++++++++++++ ...faqs-01d841cc481bc716c0f7b858b4f11c39.yaml | 58 +++++++++++++++++++ ...faqs-91fd3dac9c4d5ede970602c4fc325980.yaml | 58 +++++++++++++++++++ ...faqs-b632dc6cba0c61ee2bf8f89345f7cf19.yaml | 58 +++++++++++++++++++ ...faqs-c31ec2a99302fba742cc98be29fde1f0.yaml | 58 +++++++++++++++++++ ...faqs-deca81735cc88aee9510bee96ebea3f5.yaml | 58 +++++++++++++++++++ ...lite-296629ec48c2e29c001ff73c83d740a4.yaml | 58 +++++++++++++++++++ ...lite-343d05bc9d208789b5e376940d559b37.yaml | 58 +++++++++++++++++++ ...lite-8222ebd9d6f8937e984983c872335120.yaml | 58 +++++++++++++++++++ ...berg-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...feed-8056d85f33dbcf3eacb36ae8419af314.yaml | 58 +++++++++++++++++++ ...feed-ccaa53f193d436f82f09665a210de68c.yaml | 58 +++++++++++++++++++ ...page-55c8be1b98f905c0f97aa18a603d7cea.yaml | 58 +++++++++++++++++++ ...stic-358ac8b0121729fe99fde2c984a71ee0.yaml | 58 +++++++++++++++++++ ...stic-6f6b50e35dbc0c6deca59671d5ec0737.yaml | 58 +++++++++++++++++++ ...stic-705a4f41d4e1aa767a8f267fa3454855.yaml | 58 +++++++++++++++++++ ...stic-d90dc94bb51dfa2f24514c386a4ae9c2.yaml | 58 +++++++++++++++++++ ...mber-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml | 58 +++++++++++++++++++ ...mber-08b6d9dc73cde56d748bcfad89022c1b.yaml | 58 +++++++++++++++++++ ...mber-0e25a5015b31f614947b39dfb4bdedd7.yaml | 58 +++++++++++++++++++ ...mber-0e4c98f58a3149e9a232e9c95d40a56b.yaml | 58 +++++++++++++++++++ ...mber-0f6437cf628a3bd90ee26c228a1c0006.yaml | 58 +++++++++++++++++++ ...mber-18ceaed7f43455d18367a3a1c3285ab3.yaml | 58 +++++++++++++++++++ ...mber-1c487d7f0e032490b79fb7ae13bd082b.yaml | 58 +++++++++++++++++++ ...mber-1f4b95ce58b10f02cade4467768773cc.yaml | 58 +++++++++++++++++++ ...mber-242a068db50aca331a847418abd23c68.yaml | 58 +++++++++++++++++++ ...mber-2502f9d9353560a8e219bba8c12b1db1.yaml | 58 +++++++++++++++++++ ...mber-255674fc07ae81595ebffe932a85af22.yaml | 58 +++++++++++++++++++ ...mber-29ac257d0d3d26be4d0323f19b8203fa.yaml | 58 +++++++++++++++++++ ...mber-33abe543df77e7949cb3756acaf591a2.yaml | 58 +++++++++++++++++++ ...mber-3c91005e14cc5d86d18c2bf91cfcd5a0.yaml | 58 +++++++++++++++++++ ...mber-3cc251560d3b16f1b023b3769603bce5.yaml | 58 +++++++++++++++++++ ...mber-40c98f25ab20a5cec3c5a2b4260a50d3.yaml | 58 +++++++++++++++++++ ...mber-40e897d2ffdca51f7bd6bf3f82372d65.yaml | 58 +++++++++++++++++++ ...mber-43eec6271332d7e594aedf23b6c236f2.yaml | 58 +++++++++++++++++++ ...mber-468eaebc73eb5b6623a0434366ab7c6e.yaml | 58 +++++++++++++++++++ ...mber-4bd6ca2ba70df51b819fed4e8082314e.yaml | 58 +++++++++++++++++++ ...mber-6192c67ee2c3bd9b9e931c78efebf58a.yaml | 58 +++++++++++++++++++ ...mber-662783c84d37079d21b3524fa95f4917.yaml | 58 +++++++++++++++++++ ...mber-674e9e8ffc19e4d579a57273137742ea.yaml | 58 +++++++++++++++++++ ...mber-7333037ca30b5f74ef217bf9466f85b1.yaml | 58 +++++++++++++++++++ ...mber-7db7009418abd13063c2d118e09483f4.yaml | 58 +++++++++++++++++++ ...mber-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml | 58 +++++++++++++++++++ ...mber-7f5926ab268dbc1681fd3a5de983583a.yaml | 58 +++++++++++++++++++ ...mber-80c655d3d796ab546d2bd2d7a2a197bc.yaml | 58 +++++++++++++++++++ ...mber-85405b283a5b7488c3b527272c63f06e.yaml | 58 +++++++++++++++++++ ...mber-913680c7cc113c5e372d717a86269c4e.yaml | 58 +++++++++++++++++++ ...mber-9c147c1fb503983534bc4ea0ae8ec8cf.yaml | 58 +++++++++++++++++++ ...mber-a3c4d74b63323bef472fb10b591d6314.yaml | 58 +++++++++++++++++++ ...mber-a52442145dbdbdaec9bfaa19c0573b9d.yaml | 58 +++++++++++++++++++ ...mber-a6054d32c09f0a33057b0746bec92f89.yaml | 58 +++++++++++++++++++ ...mber-aaa278b6b3d118139396380f3db91970.yaml | 58 +++++++++++++++++++ ...mber-afb0b6e6fbde3c83cc029e81733d53ca.yaml | 58 +++++++++++++++++++ ...mber-afb15d666e098434f8ebcb7a76b5d273.yaml | 58 +++++++++++++++++++ ...mber-b9f884e6575d690e9989d7d2f0484ed9.yaml | 58 +++++++++++++++++++ ...mber-bcc49c967f35b7af17804d1e16dc2e60.yaml | 58 +++++++++++++++++++ ...mber-bcd9ca517989975e14b7cf4813bc0e1b.yaml | 58 +++++++++++++++++++ ...mber-c040e1b7f1d715ec00a05b885aa3bea9.yaml | 58 +++++++++++++++++++ ...mber-c30bc91af795fd14b3e08b79d07d649a.yaml | 58 +++++++++++++++++++ ...mber-c814b16777b5d2f124bf7a293b35df9d.yaml | 58 +++++++++++++++++++ ...mber-ca3f8b736fe25e4b904e1b16b1beb376.yaml | 58 +++++++++++++++++++ ...mber-caa94527ec89b606495dedb1b363e9ed.yaml | 58 +++++++++++++++++++ ...mber-cb65508cd745e36647cf4ef3930d3944.yaml | 58 +++++++++++++++++++ ...mber-cf4cd1ad5bd449a05295e57107462f9b.yaml | 58 +++++++++++++++++++ ...mber-d14d68253fb2c57056fb03621a5ee651.yaml | 58 +++++++++++++++++++ ...mber-d6ddc334180239abe617a7bb4b11e74b.yaml | 58 +++++++++++++++++++ ...mber-d96c9d39ba81c10e5ff2a55a63974daf.yaml | 58 +++++++++++++++++++ ...mber-dac7bdda4e28b985a7da6425e9bc4314.yaml | 58 +++++++++++++++++++ ...mber-e00b98ac8c54622a944850cb2d386b43.yaml | 58 +++++++++++++++++++ ...mber-e44d6ae66963d07b80fddcfb06cf2f83.yaml | 58 +++++++++++++++++++ ...mber-f6c1c83fdf17318a9a2aff5f238d4136.yaml | 58 +++++++++++++++++++ ...mber-fd2089a519aca4aa15a99f294c4457f0.yaml | 58 +++++++++++++++++++ ...tool-349558c766b935473393c8c3c8e1f5f7.yaml | 58 +++++++++++++++++++ ...l-ii-4a5a32357411170270407ccbec6bd523.yaml | 58 +++++++++++++++++++ ...post-6bd54388aa30b6dc806cb18d7d914f6a.yaml | 58 +++++++++++++++++++ ...post-769f278ef7d8854e596567a95f8b276a.yaml | 58 +++++++++++++++++++ ...post-93a0069582fa34f4857779b646fe9dc3.yaml | 58 +++++++++++++++++++ ...post-cd3ebd9e5b8349096037121f145eb200.yaml | 58 +++++++++++++++++++ ...post-d5a9675642b3846bb1039f5b8393297a.yaml | 58 +++++++++++++++++++ ...post-d8c9bea1d4420a5baa6bb9e5a5a7051e.yaml | 58 +++++++++++++++++++ ...post-d9d7cdc24ee2887d8625dc92279b0527.yaml | 58 +++++++++++++++++++ ...post-e855f3857fc0bf41fee74940fd262c9f.yaml | 58 +++++++++++++++++++ ...post-f1550f59a752c11a5990aadbb66d56bb.yaml | 58 +++++++++++++++++++ ...-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dget-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...dget-36882e902da34c7275792dd2c6fee99b.yaml | 58 +++++++++++++++++++ ...dget-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...dget-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...ugin-0a55a8c44319eebd91a4589219732011.yaml | 58 +++++++++++++++++++ ...ogue-0aceb6e391e9a8017538f79a192451fd.yaml | 58 +++++++++++++++++++ ...ogue-1c142e2aa6457c78b7a30e33f81ed033.yaml | 58 +++++++++++++++++++ ...ogue-299e26f66452f89b69cd95a12049938a.yaml | 58 +++++++++++++++++++ ...ogue-3e1e0e265d4d4fc05de3487796f682db.yaml | 58 +++++++++++++++++++ ...ogue-50a03dd43db2d419331c54a14051f151.yaml | 58 +++++++++++++++++++ ...ogue-6ff591cfb79ba4ed5cb37dfcdc90b581.yaml | 58 +++++++++++++++++++ ...ogue-7cfd32fcdabda7adb9a40d5e10f1b10f.yaml | 58 +++++++++++++++++++ ...ogue-7d8c18514116a3d9cb2fadc12704ae7f.yaml | 58 +++++++++++++++++++ ...ogue-b03c4c87ff7bab2ae236d29a941caaa0.yaml | 58 +++++++++++++++++++ ...ogue-cde26cb38667ced94a7ae59e21d1dd95.yaml | 58 +++++++++++++++++++ ...ogue-cdfdacefadee3ac15d930a67722d11e2.yaml | 58 +++++++++++++++++++ ...ogue-f9aadb3cdc138771a95f01e67d7ac253.yaml | 58 +++++++++++++++++++ ...lder-2efc0981a055a3e602c4cd88e853b098.yaml | 58 +++++++++++++++++++ ...ider-5ed7439fdc6a179319e68a6091db0e8d.yaml | 58 +++++++++++++++++++ ...iews-708bf4cdcd042a35006425f5ea7145d1.yaml | 58 +++++++++++++++++++ ...iews-9cac9db84fd0e9e4554d820862a40ccc.yaml | 58 +++++++++++++++++++ ...iews-c2f057b1286b0479a330a6cf26c60c67.yaml | 58 +++++++++++++++++++ ...ions-7e5407bb7184b7940282a0b93fde7bc8.yaml | 58 +++++++++++++++++++ ...cons-0e6b771f58abc47bc1cd00cdb88a6b13.yaml | 58 +++++++++++++++++++ ...cons-18e30a879d28e13fe4c17653ed1fbf81.yaml | 58 +++++++++++++++++++ ...cons-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...cons-2c0845cf5ef92a44ab74f2dd40912af0.yaml | 58 +++++++++++++++++++ ...cons-3744994d57ee508f70c6a9f678c510bd.yaml | 58 +++++++++++++++++++ ...cons-50ee1df3b648d8ffe7c8bf72d2de42cd.yaml | 58 +++++++++++++++++++ ...cons-87dbe2addf6a62fa336594e2b679e9d7.yaml | 58 +++++++++++++++++++ ...cons-b3e3aaaac8096f0ab040a4994ceb701a.yaml | 58 +++++++++++++++++++ ...cons-baba5d57c66f94a59676f999b229ed40.yaml | 58 +++++++++++++++++++ ...cons-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...cons-f2357db60079c2fc441be42e2dc1b954.yaml | 58 +++++++++++++++++++ ...cons-fbb313009acd3079ce8680fb05b3abe6.yaml | 58 +++++++++++++++++++ ...plus-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...plus-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...plus-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...plus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...plus-ea8ebad551118883e1feafe80a786b1f.yaml | 58 +++++++++++++++++++ ...-kit-dd1f48796d4f00ba40c7555318c798d9.yaml | 58 +++++++++++++++++++ ...bles-f75d5e3e7f3e99d9ce25d5222799613b.yaml | 58 +++++++++++++++++++ ...ager-4ebf29f3b4a848c6cc95b046c1f56126.yaml | 58 +++++++++++++++++++ ...ager-b8296fd7e9d3d8c36b36cd4afd336fd3.yaml | 58 +++++++++++++++++++ ...ymce-f63b14eb213bbc6239ffa4f4e582cbbd.yaml | 58 +++++++++++++++++++ ...tion-4d6b9908316d738d104a51fdd9ba9967.yaml | 58 +++++++++++++++++++ ...ugin-6dfcf8980861ee5739e5b83eb5156f9e.yaml | 58 +++++++++++++++++++ ...ight-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ight-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lter-f48aa8ce150f50f9f99d4d22650a952e.yaml | 58 +++++++++++++++++++ ...dons-1dd6b9575ac3d36dc5c340f7191b2a11.yaml | 58 +++++++++++++++++++ ...dons-42a6391e7ed0fe5a4ef825a270130c8a.yaml | 58 +++++++++++++++++++ ...dons-86920ea2244bf931a0a9455591658b64.yaml | 58 +++++++++++++++++++ ...dons-97e102e48e3400c8c2827b76216fe5ac.yaml | 58 +++++++++++++++++++ ...dons-c12fe9671d21c1c91257ccad7444bd6a.yaml | 58 +++++++++++++++++++ ...ewoo-6717e2739d81d19391ed1a7f5eb33e10.yaml | 58 +++++++++++++++++++ ...eter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...eter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...nion-c2d16b936c79c5f7cc118ed34032bc44.yaml | 58 +++++++++++++++++++ ...dons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ator-2ee8042813603dca155007c66d9f6e42.yaml | 58 +++++++++++++++++++ ...ator-bece17e1f0cb0904484a2c28333a822a.yaml | 58 +++++++++++++++++++ ...lkit-05449252a81a55fa1aedbb41d626d3a8.yaml | 58 +++++++++++++++++++ ...lkit-66d45612d48c50a420406488ffbcd2d8.yaml | 58 +++++++++++++++++++ ...lkit-a75e8600265672ffbfe8fc90d6a06636.yaml | 58 +++++++++++++++++++ ...lkit-c6423cfe94699f968f30f91786e41914.yaml | 58 +++++++++++++++++++ ...core-0aa92524ef3f479006bf6a6cae10326a.yaml | 58 +++++++++++++++++++ ...core-7a2fa40c9c3153d28c4763e5656c59b8.yaml | 58 +++++++++++++++++++ ...core-9ed7e89f3675608a54d511e5410f33f1.yaml | 58 +++++++++++++++++++ ...rmed-a24ad83ed56eb98da964ec89f37324d1.yaml | 58 +++++++++++++++++++ ...mode-1a77d096fd122735e7059db4ae2493a4.yaml | 58 +++++++++++++++++++ ...mode-98a55f47607149620a63e3a8f43662c3.yaml | 58 +++++++++++++++++++ ...page-74c4f31916c7f5bc337751afa8a7f10e.yaml | 58 +++++++++++++++++++ ...page-88940c0e9fa7615075a5fc8e9bc16c56.yaml | 58 +++++++++++++++++++ ...page-c8d3a5bffd1b0c28a6e17cfdad5deb52.yaml | 58 +++++++++++++++++++ ...tion-0e39d853b3d4654c80796b1245bb017e.yaml | 58 +++++++++++++++++++ ...tion-49a29c208dcdf8c767e242ee9b07c664.yaml | 58 +++++++++++++++++++ ...tion-52197fd3d372d9ca3330b7fb6abe6c1e.yaml | 58 +++++++++++++++++++ ...tion-8f08fc8519e9426e0c9c0ec2b77bcf6d.yaml | 58 +++++++++++++++++++ ...tion-931565033fc7a18f04b3f4a474f02d5f.yaml | 58 +++++++++++++++++++ ...lery-054a0cbde4f5e83c80e6fe80ca873ffc.yaml | 58 +++++++++++++++++++ ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-cmp-52d99f3d726c6a2b0f9591cf7e9202f7.yaml | 58 +++++++++++++++++++ ...nify-06c85397dccc182d76ce00ddb1fdcc56.yaml | 58 +++++++++++++++++++ ...tall-e0876152720c53588a74ce9328051604.yaml | 58 +++++++++++++++++++ ...lite-103ae57e192be7c58d97324e70895c9f.yaml | 58 +++++++++++++++++++ ...lite-1ccd8092085adf5a5342024d683bb79b.yaml | 58 +++++++++++++++++++ ...lite-4b751d7bee414741f3c79461b74b4584.yaml | 58 +++++++++++++++++++ ...lite-d8d7674d520927a7ad2ed94f66363231.yaml | 58 +++++++++++++++++++ ...lite-e8e6f489ccaee4d00c096c7d8c466fc5.yaml | 58 +++++++++++++++++++ ...lery-24e3cfedb16e14aa15147d4ebb35d6c8.yaml | 58 +++++++++++++++++++ ...tics-ac061f34e871527fabbabb8afc45c209.yaml | 58 +++++++++++++++++++ ...ting-09395db7be64b2d03b62fa45ed0398d7.yaml | 58 +++++++++++++++++++ ...ting-d853e52fe1d33267e0c81c91100de86c.yaml | 58 +++++++++++++++++++ ...teme-58ddfbc8f08958c578758b38baef9c64.yaml | 58 +++++++++++++++++++ ...4663-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...99-1-e1d1dd2650750b2b23a32becb4d086f9.yaml | 58 +++++++++++++++++++ ...00-1-57f7b5f0694f05830341c7de29cc9c44.yaml | 58 +++++++++++++++++++ ...22-1-fb63d7c63da2917737fade2e6962cd5e.yaml | 58 +++++++++++++++++++ ...5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml | 58 +++++++++++++++++++ ...16-1-6c82b87e7c42a19481f1690450d14b67.yaml | 58 +++++++++++++++++++ ...5120-dcded48546674d8a7147bd7b9ee5af2d.yaml | 58 +++++++++++++++++++ ...1772-4ebbec62da7dd4744569d093e5a7ca36.yaml | 58 +++++++++++++++++++ ...8700-eee72fcaef7d6d7710f8503cc05b2365.yaml | 58 +++++++++++++++++++ ...0536-dcbc0003781c6decb5bf6d916532822b.yaml | 58 +++++++++++++++++++ ...65-1-af4d8c78cfc5d18ffd2467d3a5581338.yaml | 58 +++++++++++++++++++ ...76-1-5558112c84605e9bc74e93c1eb9fbe3b.yaml | 58 +++++++++++++++++++ ...50-1-5ef4178486944c845329dc8d7715fea8.yaml | 58 +++++++++++++++++++ ...31-1-f3d1f4048a78d100d7199aa687dd970a.yaml | 58 +++++++++++++++++++ ...30-1-7e83efd5775fb18032b0a614d3a4dbf4.yaml | 58 +++++++++++++++++++ ...85-1-3e71b451d444e56f20cac2bd5a92795e.yaml | 58 +++++++++++++++++++ ...08-1-62601b5430c03a6d792da3905efea1b8.yaml | 58 +++++++++++++++++++ ...26-1-e5bdd89e96929b7bea4a7677f7939bf4.yaml | 58 +++++++++++++++++++ ...lder-7222dd54a342eb0ec1d2eb49f0d0425a.yaml | 58 +++++++++++++++++++ ...devs-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...devs-83be4877901e862ff402253df3e3d6d7.yaml | 58 +++++++++++++++++++ ...devs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ntor-0115c4f456db0247c3530a55e2dfe13e.yaml | 58 +++++++++++++++++++ ...ntor-0ecdecef5b5861d9228c5e4232350428.yaml | 58 +++++++++++++++++++ ...ntor-1f2c777b2d1a87f6daecfabe8050a1d2.yaml | 58 +++++++++++++++++++ ...ntor-2304b21574018f9296b7348b5813fb8e.yaml | 58 +++++++++++++++++++ ...ntor-6a7387f7988e4dac2eb8210534154d2a.yaml | 58 +++++++++++++++++++ ...ntor-8b1647a7cae04c475a434c97e40430f4.yaml | 58 +++++++++++++++++++ ...ntor-a4e1a6eed6af75293ee8acc33aa5bb7f.yaml | 58 +++++++++++++++++++ ...ntor-a752917f99712ba0255e64b4033cf044.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ntor-ba7ba7554cf607d5d507c2c2d4751a5b.yaml | 58 +++++++++++++++++++ ...ntor-f213f0cf0f29187e1d444e194fee045d.yaml | 58 +++++++++++++++++++ ...pups-87cd3b8d44051ebe8fa42c56e4d1cbb3.yaml | 58 +++++++++++++++++++ ...pups-f4a8622061e5460b0d2e3667b1d15b03.yaml | 58 +++++++++++++++++++ ...dcss-0fee961f47a5a9afb9a972a5a5342a98.yaml | 58 +++++++++++++++++++ ...dcss-26699e962c9e60112283bf64ac1ad60a.yaml | 58 +++++++++++++++++++ ...dcss-2a1f9d077aaf4e3fadb41e60e62e6854.yaml | 58 +++++++++++++++++++ ...dcss-2b045fe9c22899f178f1269f6a026542.yaml | 58 +++++++++++++++++++ ...dcss-2b7ae4ca78bd06166aae6152ceb4da4c.yaml | 58 +++++++++++++++++++ ...dcss-5c781006f6fca5d11eb9b4f46b04eda7.yaml | 58 +++++++++++++++++++ ...dcss-6ec723a75cd7d5a7782b1351c8098782.yaml | 58 +++++++++++++++++++ ...dcss-76ac5b6d638212e0347ed800db5531d1.yaml | 58 +++++++++++++++++++ ...dcss-7fabd60d3b2198be95329f47bacc886f.yaml | 58 +++++++++++++++++++ ...dcss-9a0b6c64179538a07b644a9798c3ccee.yaml | 58 +++++++++++++++++++ ...dcss-a0e3ff5d3be6b2d76d2f97e392703cee.yaml | 58 +++++++++++++++++++ ...dcss-a339149dde9b1d7d6ce8f5a68c95c72b.yaml | 58 +++++++++++++++++++ ...dcss-a5b2d252972ec3a0a983d2f147eccab3.yaml | 58 +++++++++++++++++++ ...dcss-bc3c5983bb2636786bed9c036578261b.yaml | 58 +++++++++++++++++++ ...dcss-dea1282ba49458404fbdca77bb502b69.yaml | 58 +++++++++++++++++++ ...dcss-e06f0873eb001cb3482364eb50615d1b.yaml | 58 +++++++++++++++++++ ...dcss-fdaa7c7a6a16dd831123dd45077162f8.yaml | 58 +++++++++++++++++++ ...yson-610d128e626440e80c8a487da8ac96e5.yaml | 58 +++++++++++++++++++ ...yson-90e033d103f597ab6ef613db20a319e8.yaml | 58 +++++++++++++++++++ ...yson-ec632236ed321f22549e49610f9ecc8d.yaml | 58 +++++++++++++++++++ ...lery-7138d2ba8421f62a9d8f037aab75e745.yaml | 58 +++++++++++++++++++ ...bute-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...bute-a1741d936a6f3f09256d6ab3128f4cf5.yaml | 58 +++++++++++++++++++ ...bute-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...file-f49cbe09035132568d19e52e79936740.yaml | 58 +++++++++++++++++++ ...ater-5a578f0ccecd9e70dbf98ea6c2ad1d23.yaml | 58 +++++++++++++++++++ ...raft-c7d89f14d724c38d6f5b1f1ce939143f.yaml | 58 +++++++++++++++++++ ...tral-54f7c8a344914499dc39be96b51e8433.yaml | 58 +++++++++++++++++++ ...plus-00045a0149ac4849a8afd76259c91e36.yaml | 58 +++++++++++++++++++ ...plus-1962b90b79f7e959c4385d817037dc9e.yaml | 58 +++++++++++++++++++ ...plus-1eca727a0c6686a8bab81174d47e18f7.yaml | 58 +++++++++++++++++++ ...plus-25f70760f08292d981b9d26ac7ec9db4.yaml | 58 +++++++++++++++++++ ...plus-4bbd3789375ef8b0ef3fbe16cd0df54c.yaml | 58 +++++++++++++++++++ ...plus-50aa046ee7fe3b1495c79cf309977bf9.yaml | 58 +++++++++++++++++++ ...plus-53e761311ef3248ba3af1f39cba27328.yaml | 58 +++++++++++++++++++ ...plus-72d990255d7638d74a26d5dede988b7c.yaml | 58 +++++++++++++++++++ ...plus-84290819179c80fad98664a6919a3707.yaml | 58 +++++++++++++++++++ ...plus-adb867864793eef1f6a24c287d50691a.yaml | 58 +++++++++++++++++++ ...plus-c3cfc3a43625bfa414c3f27665757d46.yaml | 58 +++++++++++++++++++ ...plus-dfc59073972648e0153f8a7cda52c6bd.yaml | 58 +++++++++++++++++++ ...plus-eed5fef42a38602252bb39c1154507e2.yaml | 58 +++++++++++++++++++ ...plus-f1749872ec46f0f647fe9218c75359fd.yaml | 58 +++++++++++++++++++ ...-pro-50aa046ee7fe3b1495c79cf309977bf9.yaml | 58 +++++++++++++++++++ ...-pro-84290819179c80fad98664a6919a3707.yaml | 58 +++++++++++++++++++ ...zard-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ugin-5edfe37e0774673d507ae94c41a64138.yaml | 58 +++++++++++++++++++ ...-url-bd97d62d56ce3ddf250859ccd5e19efb.yaml | 58 +++++++++++++++++++ ...ader-38106c08054956ec9ec0eb985cd6a30a.yaml | 58 +++++++++++++++++++ ...ader-735ef8c38ee5ffe28e9bc5668b5d3f8c.yaml | 58 +++++++++++++++++++ ...dify-b4755c12ff5cf84e1e1eeb1202ce1555.yaml | 58 +++++++++++++++++++ ...tion-16a665c0b98de9adb6d4047ea6cb1588.yaml | 58 +++++++++++++++++++ ...iles-31f526f5fc6023df268597ecb0e81e2e.yaml | 58 +++++++++++++++++++ ...iles-3e6fcba7da4eb2d07480c9678c589c91.yaml | 58 +++++++++++++++++++ ...iles-5c305c85e58387c07315e703af6d187a.yaml | 58 +++++++++++++++++++ ...maps-21d62382cf0e1f6a821aaecd2963e3e4.yaml | 58 +++++++++++++++++++ ...rypt-2e334a9b30a8a16758bc7c2d1620372e.yaml | 58 +++++++++++++++++++ ...rams-89a1787cccb90fd10317497361aed1fe.yaml | 58 +++++++++++++++++++ ...tify-776a14f8c4824ce1b1f773d4a2d1c83a.yaml | 58 +++++++++++++++++++ ...tify-7d73c621a5e8b7d0767350621fede4eb.yaml | 58 +++++++++++++++++++ ...tify-8987091ef60f2278d438fac982e52804.yaml | 58 +++++++++++++++++++ ...tify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tify-c2468d3ae2dd3b63e789f3e42f85078a.yaml | 58 +++++++++++++++++++ ...hter-05f9b585294ccf338dddc9365df56f99.yaml | 58 +++++++++++++++++++ ...shop-030644f38346879c8062677144e765a1.yaml | 58 +++++++++++++++++++ ...shop-038cd4d7f3a85c2e02153b9f3d732338.yaml | 58 +++++++++++++++++++ ...shop-096aec3054df6ba2321176f02f5a1d37.yaml | 58 +++++++++++++++++++ ...shop-1dc13a6a71c3d10751ef8c16460e007d.yaml | 58 +++++++++++++++++++ ...shop-1e7c916b690d74cb7822c04675caf429.yaml | 58 +++++++++++++++++++ ...shop-210ee561ccacfc2a5ebd14551c7ee8ef.yaml | 58 +++++++++++++++++++ ...shop-21d8c490b865a29263e262b969e2ce3d.yaml | 58 +++++++++++++++++++ ...shop-229b28e3351ab434cc4be3a1c3322160.yaml | 58 +++++++++++++++++++ ...shop-2711228331aed4ad8d57b410230e7202.yaml | 58 +++++++++++++++++++ ...shop-27b0c9418a17896ce00c7f804b61f8d8.yaml | 58 +++++++++++++++++++ ...shop-2ddf644540fef01e3b57f8fb75bbef89.yaml | 58 +++++++++++++++++++ ...shop-2ff5131571517bfee0f572e860d19db4.yaml | 58 +++++++++++++++++++ ...shop-31114b788d1703e5027b3d9e13cfe612.yaml | 58 +++++++++++++++++++ ...shop-4b4264267e112c94d109dcec42a2f42e.yaml | 58 +++++++++++++++++++ ...shop-4cfd2c744e2f57cb62950af3a51becf5.yaml | 58 +++++++++++++++++++ ...shop-4f7978d908f1ff8c4cd9a4c00b97533c.yaml | 58 +++++++++++++++++++ ...shop-4fe7d1bc981304a877651572e2d01606.yaml | 58 +++++++++++++++++++ ...shop-536d118f42dde4ae5564cdbfac7489ee.yaml | 58 +++++++++++++++++++ ...shop-559ca835d1ba91752b5fda135b9252b7.yaml | 58 +++++++++++++++++++ ...shop-72bbf06194176f982771d77cb4853bda.yaml | 58 +++++++++++++++++++ ...shop-774c036e84ef68a0e067057a5470d4c6.yaml | 58 +++++++++++++++++++ ...shop-87df231a3fe89988f05561dc4a2eda17.yaml | 58 +++++++++++++++++++ ...shop-88d558d73b2f64520cd166163d121c99.yaml | 58 +++++++++++++++++++ ...shop-8cf84dc81a40a5707b5bcb6a5de08836.yaml | 58 +++++++++++++++++++ ...shop-b635a88aed40383d80b165aae1551858.yaml | 58 +++++++++++++++++++ ...shop-c124fe326fda2227cda364e6977789ed.yaml | 58 +++++++++++++++++++ ...shop-c85d6be596b55b91d137e8053b85f064.yaml | 58 +++++++++++++++++++ ...shop-cfe5fa3015f2fc55d2b05163019ba81a.yaml | 58 +++++++++++++++++++ ...shop-defc78f281b1b753471f78628f828031.yaml | 58 +++++++++++++++++++ ...shop-e3d6a99c1f59024071ddea4c2fb68561.yaml | 58 +++++++++++++++++++ ...shop-e4a8e0f95ee7761efbfd23ea0c0e9596.yaml | 58 +++++++++++++++++++ ...shop-ed4c279d09c7012524c7ccab923e2ae4.yaml | 58 +++++++++++++++++++ ...shop-f06d882e6e9ca473dc32139014858b23.yaml | 58 +++++++++++++++++++ ...shop-f56dc5bbdc913e57ded42347de5ef8aa.yaml | 58 +++++++++++++++++++ ...shop-fc6e5379eaab092cc08185fd85a10348.yaml | 58 +++++++++++++++++++ ...shop-fdd08ff4357466d1ef831234fd4686a2.yaml | 58 +++++++++++++++++++ ...font-4c69021959bdea7c58c778958310ad50.yaml | 58 +++++++++++++++++++ ...font-bdb0853cb6d84b9abe929218f47378a4.yaml | 58 +++++++++++++++++++ ...font-ce93f109973b52b249a7106eb15a123c.yaml | 58 +++++++++++++++++++ ...ched-f91c9276892eda169cc400a6c1591e0c.yaml | 58 +++++++++++++++++++ ...rive-97b7c398dfbcdf367ba6ab6fa80d3110.yaml | 58 +++++++++++++++++++ ...ager-663fd6040ba08a6cf95a5d56aa372c7d.yaml | 58 +++++++++++++++++++ ...ager-17f86cc37ff70d41fe6fd01dc9d4117f.yaml | 58 +++++++++++++++++++ ...ager-6233e05856841c02f1c38924069a60ef.yaml | 58 +++++++++++++++++++ ...ager-96bfdb264056a59de7cf266b01d0316c.yaml | 58 +++++++++++++++++++ ...ager-a6c764475f8c46f0276397b9437e1a40.yaml | 58 +++++++++++++++++++ ...mail-044b344fe9d706549aa3d52095be3dd2.yaml | 58 +++++++++++++++++++ ...vity-a9046caf138583ab295d7c397e7fc905.yaml | 58 +++++++++++++++++++ ...-log-01d78cbce70a1dfeb3bb295a9cdc3356.yaml | 58 +++++++++++++++++++ ...-log-02cae5f64c7458f6a2f1e1b080ca9389.yaml | 58 +++++++++++++++++++ ...-log-1e01dff414d04212c3c6453a2d281edc.yaml | 58 +++++++++++++++++++ ...-log-60c68d204f0a8a653bebafe6c6059142.yaml | 58 +++++++++++++++++++ ...-log-784f32f658992df1fedbc6c38d15c1f5.yaml | 58 +++++++++++++++++++ ...-log-cf0ba687a6ace638f9be60d1f6b85b3d.yaml | 58 +++++++++++++++++++ ...-log-e27368e4785bcd7f22809f69244573f8.yaml | 58 +++++++++++++++++++ ...-log-e95622a863397746d0d019b16e681085.yaml | 58 +++++++++++++++++++ ...-log-ee6d7181de7e06427ee243be8abb06fb.yaml | 58 +++++++++++++++++++ ...-pro-580004f61a42f3e8c462a7bbd946dd47.yaml | 58 +++++++++++++++++++ ...-pro-948ee2018064c5e8007e811b1634bf17.yaml | 58 +++++++++++++++++++ ...-pro-cab9aea0ec63087506e1760b3541b9ef.yaml | 58 +++++++++++++++++++ ...-log-86f9a1d2e10b6f707453e4230d5a4770.yaml | 58 +++++++++++++++++++ ...-log-aceb5c3c8c29eefd527f85b61425b8aa.yaml | 58 +++++++++++++++++++ ...atar-1a7905e3891eb108823307ae3d6bb4ec.yaml | 58 +++++++++++++++++++ ...aded-48546947f3dbea6a3d1c0687b8db90bb.yaml | 58 +++++++++++++++++++ ...cker-78588e22a79e99f07ccbdc69fa52af87.yaml | 58 +++++++++++++++++++ ...trol-18d2c8e769b3a1ea9cd3276288e3748d.yaml | 58 +++++++++++++++++++ ...list-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml | 58 +++++++++++++++++++ ...data-07eca49e75cf7db4ec73f20f42d19592.yaml | 58 +++++++++++++++++++ ...data-b68fe278807d5bbe8b9f9515e0348d4e.yaml | 58 +++++++++++++++++++ ...tion-0fd2b55ebd627169d7e7b82b7b9c0e52.yaml | 58 +++++++++++++++++++ ...d-ip-2ccf4a97a0b2b289a9997f10c05da014.yaml | 58 +++++++++++++++++++ ...tory-933c9d4b3eacccddbe4abc821f273b41.yaml | 58 +++++++++++++++++++ ...tory-9be06bea648875a81d4dd1ca47dd3d3b.yaml | 58 +++++++++++++++++++ ...tory-d5d36dd3296371bddd49874e159fc4e0.yaml | 58 +++++++++++++++++++ ...-log-f899587161f02b977d621dc3afe7bca7.yaml | 58 +++++++++++++++++++ ...enus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...meta-1bdc37d166ed1b52a0580bcf09d995a0.yaml | 58 +++++++++++++++++++ ...meta-27ff799b988fb677dadaedc3ce5f35d5.yaml | 58 +++++++++++++++++++ ...meta-5115b57fde3d1e0fc01f9c1b4fc604ad.yaml | 58 +++++++++++++++++++ ...meta-ef13d8f60909d5e2009ffdcbdc23e29a.yaml | 58 +++++++++++++++++++ ...ager-2a280bf41720079c39a3d0371323f56e.yaml | 58 +++++++++++++++++++ ...ager-9613ac9ff24ae943d3cd927f06034317.yaml | 58 +++++++++++++++++++ ...ager-baba7e4c328e9317fa2b2839a155f748.yaml | 58 +++++++++++++++++++ ...ager-d08b89da5a56f4cae4fcae784a8807f4.yaml | 58 +++++++++++++++++++ ...ager-fd49f8dca96bc998246e314731906420.yaml | 58 +++++++++++++++++++ ...odes-5edf46c467e512c2a9c72dfadcf57fa5.yaml | 58 +++++++++++++++++++ ...otes-e04c0fd89ca49cf41266e90f8d4a7135.yaml | 58 +++++++++++++++++++ ...hoto-70ddedc5487f163b43d7ace431e3f2c6.yaml | 58 +++++++++++++++++++ ...hoto-8e79000a55d2a7778e1f3a653b09e17f.yaml | 58 +++++++++++++++++++ ...iles-2203cb02480ab13ddbd56959a93d1555.yaml | 58 +++++++++++++++++++ ...iles-2fc467eab8e252aba51501d739ddcb42.yaml | 58 +++++++++++++++++++ ...iles-34d2a65b3d8097e555cf3aab3134db2d.yaml | 58 +++++++++++++++++++ ...iles-d150ec7618e98f105f22738eb7217f44.yaml | 58 +++++++++++++++++++ ...iles-d51a1ba95a0d2e1117f38d0ea2128650.yaml | 58 +++++++++++++++++++ ...file-103b877d6c6654d012dcfb8c68378ae3.yaml | 58 +++++++++++++++++++ ...tion-1ab35ec2ada14325b98997bb858be8c8.yaml | 58 +++++++++++++++++++ ...tion-2612ae00d02e310a6680f563b8b56eab.yaml | 58 +++++++++++++++++++ ...tion-3d14b08568400569a677dd320c2e823a.yaml | 58 +++++++++++++++++++ ...tion-4d9fd3b2756396c2e2474f36f3b3ed72.yaml | 58 +++++++++++++++++++ ...tion-563b5a5f445bb7fdee347bcd0ac2e921.yaml | 58 +++++++++++++++++++ ...tion-5a06b4b0b81af48987e3d90166388572.yaml | 58 +++++++++++++++++++ ...tion-89a71e03ca88d2c02f3be0f2c0d21756.yaml | 58 +++++++++++++++++++ ...tion-a3ab87ca43ceb26b3f09e3ed0047a2de.yaml | 58 +++++++++++++++++++ ...tion-d2e28c2323c53d6e9cc43d245f41b33e.yaml | 58 +++++++++++++++++++ ...tion-d95100aaa0c0f9fcb84493d4239628ac.yaml | 58 +++++++++++++++++++ ...tion-f2f2b27ba49b35955a269b199809763e.yaml | 58 +++++++++++++++++++ ...ager-0b9fcb239ed2ed2b5bab0eed8480c44c.yaml | 58 +++++++++++++++++++ ...ager-954c2405c628d0efb2aa813bafba83c6.yaml | 58 +++++++++++++++++++ ...ager-a0b7b51da946e56980c587504bc9c3d1.yaml | 58 +++++++++++++++++++ ...role-19953c61fa61f206c9ea957d11e2d617.yaml | 58 +++++++++++++++++++ ...role-be510149fd1b62e5b5bb38762ffb0573.yaml | 58 +++++++++++++++++++ ...itor-19fa35bb35a821be90be40a4df1f6407.yaml | 58 +++++++++++++++++++ ...plus-4c45cf0c9392dc7bd44f9128bee077ba.yaml | 58 +++++++++++++++++++ ...over-6c1be9857aef3e70d84394860b7ed82f.yaml | 58 +++++++++++++++++++ ...osts-17a41e1a16870158d7b7f29143acb1a4.yaml | 58 +++++++++++++++++++ ...osts-36cace1718aa377bc2a0687653bc5015.yaml | 58 +++++++++++++++++++ ...osts-b4200cfb6c25751d846b15f9be817013.yaml | 58 +++++++++++++++++++ ...osts-e52fe8ccbb854729b4cd4efd3c029a6b.yaml | 58 +++++++++++++++++++ ...osts-ec6e68cb23a447be8fad62b8d99d082d.yaml | 58 +++++++++++++++++++ ...osts-ef952e49d818ad8d9f5105858ddc8b74.yaml | 58 +++++++++++++++++++ ...tion-ca88165c86af83d72c5c99df7036335e.yaml | 58 +++++++++++++++++++ ...-spy-6cfb5c63bbc7af6b76f9e01d4d2fe2ac.yaml | 58 +++++++++++++++++++ ...back-0c4c2f31024fbf5cfab7d01fe111d650.yaml | 58 +++++++++++++++++++ ...lite-1e3a0fb44323bb8b37d482026ed1bcb6.yaml | 58 +++++++++++++++++++ ...lite-61ee64923a0fe1e6df3a4bb79ec27733.yaml | 58 +++++++++++++++++++ ...lite-bc5c4137940b6ee9a3fd20aa718b68a9.yaml | 58 +++++++++++++++++++ ...lite-bdeaf570096cf99a20e12f37d41beaeb.yaml | 58 +++++++++++++++++++ ...heat-783cdb329475b25222f6cb9b44f2e64c.yaml | 58 +++++++++++++++++++ ...like-e37188c1de6df4d33488960fa6e214fa.yaml | 58 +++++++++++++++++++ ...ater-2508566224c9697f712ccd556a0ee74e.yaml | 58 +++++++++++++++++++ ...oise-b99ce0637c979eb1d01fd84441afddba.yaml | 58 +++++++++++++++++++ ...plus-dbb603a582acad18868b604587ba2dff.yaml | 58 +++++++++++++++++++ ...rpro-04f8df43c58f1fcfe62ac6f2791a6403.yaml | 58 +++++++++++++++++++ ...rpro-0738939cc65ce7903ad33d05a6227fd2.yaml | 58 +++++++++++++++++++ ...rpro-154b839caaa4713224f0ab043264e6ea.yaml | 58 +++++++++++++++++++ ...rpro-183bcbf1ecc01c4bcdfd0244c1054c88.yaml | 58 +++++++++++++++++++ ...rpro-299d4f6f43babb859c2fe770a633ef35.yaml | 58 +++++++++++++++++++ ...rpro-3c7a7bda89b03e9d2cc247c341834e4e.yaml | 58 +++++++++++++++++++ ...rpro-3e54e940d7f7e91b150b3a2075b3abc6.yaml | 58 +++++++++++++++++++ ...rpro-656244efbeeadce5c71da45e29bb9a67.yaml | 58 +++++++++++++++++++ ...rpro-73550b54c3b3918e019ec5d1a646e218.yaml | 58 +++++++++++++++++++ ...rpro-89d956efcfdb19ea855c5732e7ba78c5.yaml | 58 +++++++++++++++++++ ...rpro-ae32c7f72e10e74657f2f9c1c4ca3ce3.yaml | 58 +++++++++++++++++++ ...rpro-caff8f6f354132f41c0e30a99b04fa75.yaml | 58 +++++++++++++++++++ ...rpro-dc4223fef5ec45deab1fbfe214a6cedd.yaml | 58 +++++++++++++++++++ ...rpro-df416b9c3abe234cfa201d8c25a6cb67.yaml | 58 +++++++++++++++++++ ...rpro-e552b5aef7987e0ab7219edb686bfcc2.yaml | 58 +++++++++++++++++++ ...rpro-e9ae8122ab019b9f575d632976e78882.yaml | 58 +++++++++++++++++++ ...rpro-ec4b5ca541f179f9756ae5a9210d5761.yaml | 58 +++++++++++++++++++ ...rpro-fbcad9f6d7319e6ca8392a71ea0bffb3.yaml | 58 +++++++++++++++++++ ...erce-0088814ed74fd156e9ee132de51ef1d2.yaml | 58 +++++++++++++++++++ ...erce-0ced1508729f529a88bdefd2f552e467.yaml | 58 +++++++++++++++++++ ...erce-2178e4e9767ddbb5794b39d1005e082d.yaml | 58 +++++++++++++++++++ ...erce-4f3805308ff329789ed39fb1a7c50453.yaml | 58 +++++++++++++++++++ ...erce-a5584c4a9e33feea6b14b638918b3b10.yaml | 58 +++++++++++++++++++ ...erce-b9a49aa567e405f97048b32968f3519a.yaml | 58 +++++++++++++++++++ ...ture-28ec3275d51e7b8c31fce132b1bffc74.yaml | 58 +++++++++++++++++++ ...ture-e433366cbf26ba8f78929a0ce010f58a.yaml | 58 +++++++++++++++++++ ...-csv-3f8947e2a587b0ae5ce07c0ba75d46bc.yaml | 58 +++++++++++++++++++ ...ltra-37103802a9b9cdbc51b5059fa8045bc3.yaml | 58 +++++++++++++++++++ ...ltra-3e0e02d0ef91eed396842fb253ab425c.yaml | 58 +++++++++++++++++++ ...ltra-4d92bacdb897e72bc7c9b888465bfb12.yaml | 58 +++++++++++++++++++ ...ltra-4ee3b92fe5cef5ace6e0821bce6a628f.yaml | 58 +++++++++++++++++++ ...ltra-741cff403a911873546d8451aea6b8dc.yaml | 58 +++++++++++++++++++ ...ltra-7d8cf8e800d2870ca230bed514c737c3.yaml | 58 +++++++++++++++++++ ...ltra-9ae9897b899214e88181a9313e35781d.yaml | 58 +++++++++++++++++++ ...ltra-cace5e5791cd3b60783efcb6a58bc103.yaml | 58 +++++++++++++++++++ ...ltra-ccec5144654bab62438c0000b0cd001b.yaml | 58 +++++++++++++++++++ ...ltra-d475119af8f003a2c6e0eb9a10044dee.yaml | 58 +++++++++++++++++++ ...ltra-d7cc53ebc89a0251fb7abbabbb69e870.yaml | 58 +++++++++++++++++++ ...ltra-ee6588c23752ef8db22d5c7efc9281bf.yaml | 58 +++++++++++++++++++ ...snap-650d3965dc4c579880213651d87a4777.yaml | 58 +++++++++++++++++++ ...rswp-467ae4d6a0b8db0e5b6c781618b2d3ee.yaml | 58 +++++++++++++++++++ ...rswp-608aad3fd1d4f9ba2d0904fa4c5d78c2.yaml | 58 +++++++++++++++++++ ...rswp-83754afd4792513884989ed11f95add6.yaml | 58 +++++++++++++++++++ ...rswp-8d1c622642cdaf2469921f84335dfe12.yaml | 58 +++++++++++++++++++ ...rswp-e839aa50a0f3e00f901dfe5f18166d4a.yaml | 58 +++++++++++++++++++ ...rswp-fbc5f16f0d879df70b9a5d8bd9595927.yaml | 58 +++++++++++++++++++ ...cker-fae9c4f5e42508587fcd2ed1f9caedd8.yaml | 58 +++++++++++++++++++ ...lery-17199c68a13d9adf35ea73d24856f5f8.yaml | 58 +++++++++++++++++++ ...flat-58b2abf7cb460597ca6a6d20fc9fbdcc.yaml | 58 +++++++++++++++++++ ...ated-22471b3f81db400388be79d0e5d0cf32.yaml | 58 +++++++++++++++++++ ...uard-eef4fef4e9f3255888f8b403eb0a1916.yaml | 58 +++++++++++++++++++ ...ress-a000811d6a7f224f2863a66f08bbbdef.yaml | 58 +++++++++++++++++++ ...ress-e4890ed290e8d1de6f994e789f5bdedd.yaml | 58 +++++++++++++++++++ ...it14-64fc1c1aeafb0b67c8b714966bfc2dcb.yaml | 58 +++++++++++++++++++ ...tabs-02e92fc9d8edd2a31ef37844cc4fdd57.yaml | 58 +++++++++++++++++++ ...tabs-36ee3fb721eebb245b42e5817603a92b.yaml | 58 +++++++++++++++++++ ...tabs-e4bedac25bcf1a2f58f7010119167cc3.yaml | 58 +++++++++++++++++++ ...oard-02e2e7490cf032ead7b1cdd23b1c4e3e.yaml | 58 +++++++++++++++++++ ...oard-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml | 58 +++++++++++++++++++ ...back-e460da3b1111d5e40e60d6fa9f63a75a.yaml | 58 +++++++++++++++++++ ...tics-7f3d4ae07c7ffdb4fa4da20576013347.yaml | 58 +++++++++++++++++++ ...tics-820c42b11e0167933dfc728bc7134cba.yaml | 58 +++++++++++++++++++ ...tion-1b1edb5a0481b6f1c207bb5bde4a4999.yaml | 58 +++++++++++++++++++ ...ager-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...ge3d-61bd18cfe47ff36978c91845f9ffc1e4.yaml | 58 +++++++++++++++++++ ...ents-f5a38f2fe44d1f55847f0985e9ae01e0.yaml | 58 +++++++++++++++++++ ...atic-6172c422eaf36f3edbfde89320e25329.yaml | 58 +++++++++++++++++++ ...ugin-673a5e282a31715aadad077526dcf5b4.yaml | 58 +++++++++++++++++++ ...ugin-67a5e177b639db224cce52014e47431a.yaml | 58 +++++++++++++++++++ ...post-3cd2547007d3bd29308efde9fcc7a52a.yaml | 58 +++++++++++++++++++ ...post-4703f57dd95a665cc36f6d5726f726bb.yaml | 58 +++++++++++++++++++ ...post-c284496133c2f9c59611c8aa7ef34141.yaml | 58 +++++++++++++++++++ ...tter-011e0a807fc0a0f2b6240634cb1a2fc2.yaml | 58 +++++++++++++++++++ ...rumb-af6a5ec90875038596d2be175f9973f4.yaml | 58 +++++++++++++++++++ ...form-6cdecc6c25d61ef54d3cce62a39d5781.yaml | 58 +++++++++++++++++++ ...form-ac7f9e7a96a60fd50d34edd3ddfed5fd.yaml | 58 +++++++++++++++++++ ...form-c4a0d7f41c623cf7ed897902ed58a4d2.yaml | 58 +++++++++++++++++++ ...form-fee860b7d0f6d3f1d84550b3137cfcb6.yaml | 58 +++++++++++++++++++ ...maps-1f531b026c2443d4ba9e4c6118234d6d.yaml | 58 +++++++++++++++++++ ...maps-3937fc851cb1ff4a5bb8e086fcf8881e.yaml | 58 +++++++++++++++++++ ...quiz-2dc0412984b0bc2f2e238ad04ba47e6a.yaml | 58 +++++++++++++++++++ ...ound-5826ca6dc34aaca6ed2393f60977f5a4.yaml | 58 +++++++++++++++++++ ...tral-0c9e1bdf3a0788fe28746e6155355583.yaml | 58 +++++++++++++++++++ ...rder-78372eee8a5b2f566eb2e73090f227ad.yaml | 58 +++++++++++++++++++ ...-api-04b07d5a23563c59738fac6ed8c55499.yaml | 58 +++++++++++++++++++ ...-api-0f74188fa6907e010455dac3c70a8990.yaml | 58 +++++++++++++++++++ ...-api-53bb78dfe8f49d4c148bc03b41d5bdd1.yaml | 58 +++++++++++++++++++ ...-api-9285e52d6060d6dfe3360f4e1f181cf7.yaml | 58 +++++++++++++++++++ ...-api-b3301724d1287a8bf29be9b1cdb836e4.yaml | 58 +++++++++++++++++++ ...-api-bb335261eec45408126dfda83cd4c302.yaml | 58 +++++++++++++++++++ ...-api-f10237083d4fb8765ca105c0d369da21.yaml | 58 +++++++++++++++++++ ...-api-fd0cb242cefa0526fbeeee9f82de8f3b.yaml | 58 +++++++++++++++++++ ...test-9390ac5e66dccc4c03531e3f70a3187f.yaml | 58 +++++++++++++++++++ ...test-9c305cd17e2c5e4b31590488ef7540fc.yaml | 58 +++++++++++++++++++ ...-box-a38e11881f3b1727628c06798dde0846.yaml | 58 +++++++++++++++++++ ...ator-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml | 58 +++++++++++++++++++ ...ator-98fa09468510e4f3d608da204df8d702.yaml | 58 +++++++++++++++++++ ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ator-e01f827fa521817af1e20ee7feffc395.yaml | 58 +++++++++++++++++++ ...grid-966b09d5da742736124d86ca165e04fd.yaml | 58 +++++++++++++++++++ ...grid-da5e4c18307210c3c7624c0c204213c5.yaml | 58 +++++++++++++++++++ ...form-2c3b5f42630b423898a1e16a09268499.yaml | 58 +++++++++++++++++++ ...ager-0641eb85b540308df0a59914e6860d1d.yaml | 58 +++++++++++++++++++ ...abox-75efd2c629134e3b1ce9051b730e0f50.yaml | 58 +++++++++++++++++++ ...ugin-b02a15f7379c80def93c3f96c6e69608.yaml | 58 +++++++++++++++++++ ...ugin-cf54779dba07a41267cf823153d0f954.yaml | 58 +++++++++++++++++++ ...tube-a0ce396e7f670f307c62bda6d8db01dd.yaml | 58 +++++++++++++++++++ ...opup-73b8394a2820dad4a75a3855507d242d.yaml | 58 +++++++++++++++++++ ...rder-5db7f2428ab16ac575d716a8cfad3c32.yaml | 58 +++++++++++++++++++ ...rder-c54528cc487e7accd04a692896738ff0.yaml | 58 +++++++++++++++++++ ...gets-24e6c274146f1f712f8edfca9e42b8b8.yaml | 58 +++++++++++++++++++ ...ails-8d15869c84f7bfe6c6e24ef3e0872ddf.yaml | 58 +++++++++++++++++++ ...-pdf-a674e9a5d2840820506909b7c50b3d92.yaml | 58 +++++++++++++++++++ ...-pdf-b6332548231f9e6746e56fba70247618.yaml | 58 +++++++++++++++++++ ...ails-66fc8c140dcc821532233cac0866d8de.yaml | 58 +++++++++++++++++++ ...ator-6dedc798f36ce152fba54a352e7344d1.yaml | 58 +++++++++++++++++++ ...ayer-affad12bbe06868aff921eeaa6373196.yaml | 58 +++++++++++++++++++ ...ress-cb800bf450a42c7a99ab39154ac260ab.yaml | 58 +++++++++++++++++++ ...oard-8391bb351216c4e82b25becd62acbe04.yaml | 58 +++++++++++++++++++ ...wall-00e5ad7e3bf399641d532ed3e720874e.yaml | 58 +++++++++++++++++++ ...tion-03b6c1fcf0f57a257ac2a3d2a55d5120.yaml | 58 +++++++++++++++++++ ...tion-42a62f1f71a30dceae90a70ace46a441.yaml | 58 +++++++++++++++++++ ...tion-6a21a7f0a6f77d602fe9c552fd42f33f.yaml | 58 +++++++++++++++++++ ...tion-7d1e8292f93556701618a4f3a10127bf.yaml | 58 +++++++++++++++++++ ...tion-86f850e8e3017abf354eb04e885cbf48.yaml | 58 +++++++++++++++++++ ...tion-a2cc7daca48d70191ab86ec84c12d114.yaml | 58 +++++++++++++++++++ ...tion-e248f5c6da990a6a809a8d58910d242b.yaml | 58 +++++++++++++++++++ ...tion-e3eb91ea8e0abf266056dc6051ae44be.yaml | 58 +++++++++++++++++++ ...tion-482450ad7baa658a3b68c206f814d808.yaml | 58 +++++++++++++++++++ ...tion-6f6f44e45d5eee07a0df86633d90ebbf.yaml | 58 +++++++++++++++++++ ...tion-eb64a1dd7efbf5edcd293e2db2a6feb2.yaml | 58 +++++++++++++++++++ ...tion-9998c7f7c7bb7712cfa7f84562a697aa.yaml | 58 +++++++++++++++++++ ...tion-cefd687fbbabebb599cedccce0e05504.yaml | 58 +++++++++++++++++++ ...dseo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ages-2a6d9f6b466aaa4a0be1aebe9eb53633.yaml | 58 +++++++++++++++++++ ...lite-0b7d0113722a4b24cdf6bdf7adba767c.yaml | 58 +++++++++++++++++++ ...lite-56d2c56931ff57a31974c2c98619fbfb.yaml | 58 +++++++++++++++++++ ...lite-8cd4e41bc9637a2e580f2b8d0e6a5222.yaml | 58 +++++++++++++++++++ ...lite-a603f2f7b17ff9bc553bc5b3bf9dd764.yaml | 58 +++++++++++++++++++ ...lite-c6f76b277135a527f7d758e51abc2864.yaml | 58 +++++++++++++++++++ ...ntor-9d9f04adbd773a74d47487580aa614ff.yaml | 58 +++++++++++++++++++ ...king-059937c2ab51cec2bc81f288819c3352.yaml | 58 +++++++++++++++++++ ...king-0f884ba817e82a09c51444fd8fb9e0c3.yaml | 58 +++++++++++++++++++ ...king-1132ab9cdb5e1aa03187f7d03bdc59a2.yaml | 58 +++++++++++++++++++ ...king-11c30745c195f14e48360fc77cdc8022.yaml | 58 +++++++++++++++++++ ...king-12086c6161e4cc7ce0b879de54cf11f6.yaml | 58 +++++++++++++++++++ ...king-149a8ac4ac482f385c63390cadbe0a31.yaml | 58 +++++++++++++++++++ ...king-3dd533aeaca3a609962577867487da63.yaml | 58 +++++++++++++++++++ ...king-403f4119f5106c46647a3bb6c05fea16.yaml | 58 +++++++++++++++++++ ...king-9ff0528f3bdcbc7bc2a574ec76b7073c.yaml | 58 +++++++++++++++++++ ...king-ba194baade8141b72395aa7c5242d733.yaml | 58 +++++++++++++++++++ ...king-c0b90ff70024ded1dfbdce03e3404db4.yaml | 58 +++++++++++++++++++ ...king-c19786c26a81604ba7bc3b6d58623c1b.yaml | 58 +++++++++++++++++++ ...king-c235b99db232fa89dbe1e8ea3f927b66.yaml | 58 +++++++++++++++++++ ...king-d0ed43596ccad23cf6dcc12ca585066a.yaml | 58 +++++++++++++++++++ ...king-ea274279c76479017f4b24af2da83e22.yaml | 58 +++++++++++++++++++ ...king-f0f2d05530912202185a73680e9244c7.yaml | 58 +++++++++++++++++++ ...king-fa15faecec3c0097e1e35ec5d5e47da4.yaml | 58 +++++++++++++++++++ ...king-fcfcdfbc5ea20598aae14247eec11a2c.yaml | 58 +++++++++++++++++++ ...king-ffb7f4edd06313966de8aad6a57d25cc.yaml | 58 +++++++++++++++++++ ...tcar-16743b52ce55d3a70d56b31f8a11af2a.yaml | 58 +++++++++++++++++++ ...tcar-24d354774853bc075905dadb9ff31bb3.yaml | 58 +++++++++++++++++++ ...tcar-89a7d7a1b88043a7292e56fadd9f32f2.yaml | 58 +++++++++++++++++++ ...tcar-8e0a508178120443600d129a2e7dbdba.yaml | 58 +++++++++++++++++++ ...mute-eaecffa52785ff552863c4cf8f09811c.yaml | 58 +++++++++++++++++++ ...aphy-bebe54861e63e8c1edcba180c7d233b2.yaml | 58 +++++++++++++++++++ ...irim-88ade2a77a8822c9ff6c3f53c1bb583d.yaml | 58 +++++++++++++++++++ ...izzy-2d9ff787627cd2e1924f86a1568cd815.yaml | 58 +++++++++++++++++++ ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ntor-3bd671f811e3dbd6eac29209e9039fd8.yaml | 58 +++++++++++++++++++ ...ntor-72146eb794f4fa05966f36db5696ae7f.yaml | 58 +++++++++++++++++++ ...ntor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...sion-b3d167dc589e1f7c398305699f98be68.yaml | 58 +++++++++++++++++++ ...sion-c13eb59a9d6116b65835e8ca21a2d0eb.yaml | 58 +++++++++++++++++++ ...sion-f802cbbf070d1570e17c10fd49d87b73.yaml | 58 +++++++++++++++++++ ...s-io-8e9a9f02c6675b20e9272fbaa352217c.yaml | 58 +++++++++++++++++++ ...info-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...maps-41e6c56837296bd4311fa3f480bdbffa.yaml | 58 +++++++++++++++++++ ...-app-e71ce69c47edc4e510fe6e645722913d.yaml | 58 +++++++++++++++++++ ...line-25b24f1a950efe4f8999613471b96c47.yaml | 58 +++++++++++++++++++ ...line-fa2ea82db1a96118628c1703677b3f4f.yaml | 58 +++++++++++++++++++ ...tics-354f6d128f8dd6bd63a76dae47bd8628.yaml | 58 +++++++++++++++++++ ...tics-36f12570b7647f69d0074b300c5e8c91.yaml | 58 +++++++++++++++++++ ...tics-4fea783b4afcd4b123f2e73a82fb91f6.yaml | 58 +++++++++++++++++++ ...tics-57b54adcb0ab1b8bfd870b37f7db6b68.yaml | 58 +++++++++++++++++++ ...tics-5a91aad28267261ebd2de3c8343f1995.yaml | 58 +++++++++++++++++++ ...tics-95fcd32657de195d1ff10c3dd6c72f1b.yaml | 58 +++++++++++++++++++ ...tics-c591eeb2c7d14c7927ba6447beaabc1b.yaml | 58 +++++++++++++++++++ ...over-364c4ddc9c54073c09edf9a8678d0eaa.yaml | 58 +++++++++++++++++++ ...lder-02a51eb116d83b932887ff5f7b3fb4a8.yaml | 58 +++++++++++++++++++ ...lder-101912c034e5833d5a8cc53836ca2a9d.yaml | 58 +++++++++++++++++++ ...lder-4c347b72fa44728662f7bf8d25a3a220.yaml | 58 +++++++++++++++++++ ...lder-531bd0b3fee40b8878bba597b7ee560f.yaml | 58 +++++++++++++++++++ ...lder-666310311f6b757b5edf8f0953dbd9e0.yaml | 58 +++++++++++++++++++ ...lder-ae7a817c1a6cf436dfde12a47c0fecc0.yaml | 58 +++++++++++++++++++ ...lder-bbd390969a32b30a2e60ec6fbae2e10c.yaml | 58 +++++++++++++++++++ ...lder-fd65d6ef4219e436898ad3cacb24b677.yaml | 58 +++++++++++++++++++ ...view-1ba012726d7c27bdaaa5794ed01a43ce.yaml | 58 +++++++++++++++++++ ...olio-904ef9700805f0f3f94a1742149713b3.yaml | 58 +++++++++++++++++++ ...olio-f7bdb4090710d2db62425857f01fcc9d.yaml | 58 +++++++++++++++++++ ...oser-1390282d7da53f6dd62f69c33ae3d8da.yaml | 58 +++++++++++++++++++ ...oser-8a58bcfdfe2c7ef0990c9f0e6222a7d9.yaml | 58 +++++++++++++++++++ ...oser-9c4cf933125615aec48f1e67f49080b2.yaml | 58 +++++++++++++++++++ ...oser-b1162d19127bf06b82fd09bfd50f373f.yaml | 58 +++++++++++++++++++ ...oser-f7c4402196deebd8e7afa93ed50fb9fe.yaml | 58 +++++++++++++++++++ ...izer-2124b535b772d79cc24446b949f6de44.yaml | 58 +++++++++++++++++++ ...izer-41ad3634ff8212271a6b431b84da2b4e.yaml | 58 +++++++++++++++++++ ...izer-4f85b81befb670bebb2829a27d7eeb09.yaml | 58 +++++++++++++++++++ ...izer-586527cb70d024f19104907acee04683.yaml | 58 +++++++++++++++++++ ...izer-9153236cbe43b83fd86d1f43d04bc623.yaml | 58 +++++++++++++++++++ ...izer-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...izer-9bbff95ee11b793fca5a68930a481dc0.yaml | 58 +++++++++++++++++++ ...izer-a42d8ff7a7669fd14fcfc52a34b52ce7.yaml | 58 +++++++++++++++++++ ...izer-ec448d87fbb2bc9f763dfc52911d4e7b.yaml | 58 +++++++++++++++++++ ...iews-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...amin-78063a4bd6e10b68423683776f51a447.yaml | 58 +++++++++++++++++++ ...lite-d6b6bc643ec1ba18798cef4b6b37fe69.yaml | 58 +++++++++++++++++++ ...unit-12bc74e09861e7d74d799801df685593.yaml | 58 +++++++++++++++++++ ...unit-5f7a0857cd225d8f715faf1ad377962f.yaml | 58 +++++++++++++++++++ ...unit-649bbe5603010e1e08e8da0606e10331.yaml | 58 +++++++++++++++++++ ...unit-8f7f33ee1e4675fee4c38d5051fea8e5.yaml | 58 +++++++++++++++++++ ...unit-c77161a5bde1c663570a6c8d07d1524e.yaml | 58 +++++++++++++++++++ ...unit-c9d94923a4b0892540bbb0f51f12aa0e.yaml | 58 +++++++++++++++++++ ...erns-0d1db255d715c554771e21ce6d36684e.yaml | 58 +++++++++++++++++++ ...erns-eda825401e6ca5d10a15871a11cf4f40.yaml | 58 +++++++++++++++++++ ...ocks-06ebadedd58b7ae3403fa022e6ae3a90.yaml | 58 +++++++++++++++++++ ...ocks-30ce892560143a1889e7a76a4e09b69d.yaml | 58 +++++++++++++++++++ ...ocks-4131547f48ef03f81376294e8bfec1f9.yaml | 58 +++++++++++++++++++ ...ocks-768fa7749718c2471763f91755f4694f.yaml | 58 +++++++++++++++++++ ...ocks-7d646a32d0c4bc3814bc480ca69d5434.yaml | 58 +++++++++++++++++++ ...-pro-4131547f48ef03f81376294e8bfec1f9.yaml | 58 +++++++++++++++++++ ...-pro-7d646a32d0c4bc3814bc480ca69d5434.yaml | 58 +++++++++++++++++++ ...arch-0ade74287dacdefe3e19153b1abafe0f.yaml | 58 +++++++++++++++++++ ...roup-d8b1183c7012780dff9901b361328ade.yaml | 58 +++++++++++++++++++ ...kups-213063abe242012045731163716041ce.yaml | 58 +++++++++++++++++++ ...kups-a4378f0df660425c1f67e7a182915736.yaml | 58 +++++++++++++++++++ ...ndar-495d298d6c0fc5fe1a9847d638c40959.yaml | 58 +++++++++++++++++++ ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...niak-a84518c46b40e343620d7d2d2c269c9e.yaml | 58 +++++++++++++++++++ ...lery-7d553117936251fe3b1ece76fb8572be.yaml | 58 +++++++++++++++++++ ...lder-e26003fb15eb8dfdd3862b141bc3094e.yaml | 58 +++++++++++++++++++ ...ents-261bb3f8fcb24ed57cf7abcc44aedfa4.yaml | 58 +++++++++++++++++++ ...orms-c401610c8e651db75595790ef198f851.yaml | 58 +++++++++++++++++++ ...arin-77ab2c9cedf221b773b22cab621c11cd.yaml | 58 +++++++++++++++++++ ...cord-ad8900917be83354859c30baad4cca67.yaml | 58 +++++++++++++++++++ ...cord-d7a48a2145831cedc1837e88079bf034.yaml | 58 +++++++++++++++++++ ...sync-56742077a11be41d865b1f712520ef41.yaml | 58 +++++++++++++++++++ ...sync-616950a87be3ab946c404a2c6a2e1022.yaml | 58 +++++++++++++++++++ ...sync-7396a7e456a789122fb4ba49d41fa089.yaml | 58 +++++++++++++++++++ ...sync-a514896a8210fef61861b6a5fb93d0c5.yaml | 58 +++++++++++++++++++ ...m360-739af30ba304d3e19c7edf50976bcb67.yaml | 58 +++++++++++++++++++ ...m360-902c45e06d6e22c072a9fbbf19901e92.yaml | 58 +++++++++++++++++++ ...view-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml | 58 +++++++++++++++++++ ...ider-ae05ec43cb054e1a5de163d4a7addf3a.yaml | 58 +++++++++++++++++++ ...ider-c05c9af186400589f780a92d671602c2.yaml | 58 +++++++++++++++++++ ...ider-f6de196088ccb0c72ee71de4440a1879.yaml | 58 +++++++++++++++++++ ...alil-a9e063bb904bfdeb89be1c3d634b4901.yaml | 58 +++++++++++++++++++ ...ache-237d90f247ac40e7588399f654c2f945.yaml | 58 +++++++++++++++++++ ...ache-2c04466110be8251bf39f71f2f0129f9.yaml | 58 +++++++++++++++++++ ...ache-33afd6f00d43406e27d753729de8f990.yaml | 58 +++++++++++++++++++ ...ache-389652b9ed2920a4e8345ff324a62971.yaml | 58 +++++++++++++++++++ ...ache-3b7846f9454db2dd18a15d1689f18426.yaml | 58 +++++++++++++++++++ ...ache-4ca0a5e4c5d3b1a483a53f4021ede181.yaml | 58 +++++++++++++++++++ ...ache-57ae0f701129b967301e9690233d7d6d.yaml | 58 +++++++++++++++++++ ...ache-61d22084a07ab6379ed5a9d407ab8f1e.yaml | 58 +++++++++++++++++++ ...ache-656dd25ede0c1a0fb3db612c85cade65.yaml | 58 +++++++++++++++++++ ...ache-674672e1e54ec2d3fc7aad7c1b44634e.yaml | 58 +++++++++++++++++++ ...ache-6cc6a3d6d739a61d420343f25551dbad.yaml | 58 +++++++++++++++++++ ...ache-8437380ee000b7b821ec06d0f6614d78.yaml | 58 +++++++++++++++++++ ...ache-8a10bd5b823c6c28d5929375c43a3ded.yaml | 58 +++++++++++++++++++ ...ache-9634b52b6b740b73ed118cf9bfbd4f9e.yaml | 58 +++++++++++++++++++ ...ache-b37fca0bdc8729c2bc44a693e998aecd.yaml | 58 +++++++++++++++++++ ...ache-b5d8ded2a6d665cb05a255daa76e0cda.yaml | 58 +++++++++++++++++++ ...ache-ba551800e95fe2ce106bcd3e144638e2.yaml | 58 +++++++++++++++++++ ...ache-cf834d46bd9b982d7dc5819942daefcd.yaml | 58 +++++++++++++++++++ ...ache-d85a4206680fff0382032f3de61ef4b1.yaml | 58 +++++++++++++++++++ ...ache-e3b3066110fe8b51abc2330a4086e518.yaml | 58 +++++++++++++++++++ ...ache-f9f79bf204290d6d3c8b8009bb85feff.yaml | 58 +++++++++++++++++++ ...ache-fa0b9f9e638380f9e9ab2db59f133c49.yaml | 58 +++++++++++++++++++ ...zoho-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...zoho-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...r-wp-a31d8c67055bd157a9c5d5f833b91a5a.yaml | 58 +++++++++++++++++++ ...list-081112230905e11fac17a07fd3185d02.yaml | 58 +++++++++++++++++++ ...list-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...list-9ce8bccb779cbb91638a31953a621086.yaml | 58 +++++++++++++++++++ ...list-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...list-bfcfe2a24b673f9c7c3adba8fe6586b3.yaml | 58 +++++++++++++++++++ ...list-d895c4410550575e217cad2419400870.yaml | 58 +++++++++++++++++++ ...lder-74a80222591ee08f7fca8ee1f11e45fa.yaml | 58 +++++++++++++++++++ ...tton-bbd0071d59903fe2f31999b2357a095e.yaml | 58 +++++++++++++++++++ ...tton-bc4698e238b0c0be70f90cf3e64702b5.yaml | 58 +++++++++++++++++++ ...rvey-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ting-1209e60c33aa42384c4d16b88f0a5ed8.yaml | 58 +++++++++++++++++++ ...ting-2724145ee24f5785e7f7e4619d00fbc8.yaml | 58 +++++++++++++++++++ ...ting-8c1942cb96af03432bec152c3b3fb8a0.yaml | 58 +++++++++++++++++++ ...ting-e15e05d52edf8dfda475d35365b1fa33.yaml | 58 +++++++++++++++++++ ...ting-f0771147e509df66bb2795f5abd8b650.yaml | 58 +++++++++++++++++++ ...erce-15f73ea2399f5741a02449d49b638dc5.yaml | 58 +++++++++++++++++++ ...erce-9c997af79b10bc0805f0be2e95bc48ad.yaml | 58 +++++++++++++++++++ ...core-bde36549e6c813f81edb8dd7a9a04ef9.yaml | 58 +++++++++++++++++++ ...core-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...erce-7706ecb0938b8fb85c383697e07572be.yaml | 58 +++++++++++++++++++ ...uard-537a2dc42705104ff023fd51b5c2411d.yaml | 58 +++++++++++++++++++ ...uard-54e8332ab2042b90448af1c552f2e323.yaml | 58 +++++++++++++++++++ ...uard-db49793104c02948c0a70acebb25609e.yaml | 58 +++++++++++++++++++ ...ment-002ef48540e20a0d89d1ec091c0333a2.yaml | 58 +++++++++++++++++++ ...ment-169d659b2a655a618a75f90fea3adcb4.yaml | 58 +++++++++++++++++++ ...site-d09fc1530295f530d642bfbf2434f308.yaml | 58 +++++++++++++++++++ ...ssup-0d76cdabd99991797881aa307b9b2932.yaml | 58 +++++++++++++++++++ ...ssup-20a5a74760194c2a8f6292ec671e20a6.yaml | 58 +++++++++++++++++++ ...ssup-4b2830a65cedd0c5dc26608a77f72c10.yaml | 58 +++++++++++++++++++ ...ssup-c1bbee5af74211de37a39642515f7de2.yaml | 58 +++++++++++++++++++ ...ssup-f20cc872feace3e3660ec95d470c9be3.yaml | 58 +++++++++++++++++++ ...eezy-798f3fd97aa989f25f329926174d2a78.yaml | 58 +++++++++++++++++++ ...erhq-7f144a6800afc0e683d9d4b4e5524bee.yaml | 58 +++++++++++++++++++ ...erhq-b817d9941d4ed7ec0b863760a17d14b5.yaml | 58 +++++++++++++++++++ ...erhq-c416f9baa331de51ce04675f6be775e1.yaml | 58 +++++++++++++++++++ ...aded-b5016fe0cbf526aff24bd66f2a8d0464.yaml | 58 +++++++++++++++++++ ...wats-8cc533b05aae8f8735d3033cbbcc92b8.yaml | 58 +++++++++++++++++++ ...watu-10c1cecb5e025d7fe3193dda4559f4a3.yaml | 58 +++++++++++++++++++ ...watu-22dc3c966bc99d033ff51a2a9e75f62c.yaml | 58 +++++++++++++++++++ ...watu-38df56fa1dc5330e530e8cc53cb9a80a.yaml | 58 +++++++++++++++++++ ...watu-498902087f55cd027211cbff49f69fac.yaml | 58 +++++++++++++++++++ ...watu-89a35a79088c1cac6da4471e1521db2a.yaml | 58 +++++++++++++++++++ ...watu-b8cc2d0576f53610bf8d4065262e9115.yaml | 58 +++++++++++++++++++ ...watu-bc7de59ba516744b35b1924de01c50d6.yaml | 58 +++++++++++++++++++ ...watu-c2cbb8ef0136e2fd003d5d3fa4115b69.yaml | 58 +++++++++++++++++++ ...watu-ce97e7aa4395e3d292936b1987fa10a3.yaml | 58 +++++++++++++++++++ ...watu-dc2fc518b05ca80ce1806da39fabb982.yaml | 58 +++++++++++++++++++ ...upro-cee24bd7bc9abfcb337ea3d0346213d6.yaml | 58 +++++++++++++++++++ ...upro-e908001e4e531adbaea4081ce2990e50.yaml | 58 +++++++++++++++++++ ...-ads-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...arch-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...ider-826769e27edbc5a7e8c99a41d2b44f99.yaml | 58 +++++++++++++++++++ ...lder-898754090db0c7c53df1a53b0a6b37dc.yaml | 58 +++++++++++++++++++ ...tcha-59d95b9687e55d617dd1230a739e9c20.yaml | 58 +++++++++++++++++++ ...case-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...case-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...hile-dfcbb5ca7eda2dc1efe66c0932fc3702.yaml | 58 +++++++++++++++++++ ...urce-324d03958cfaceefa9e17d53cf4690e2.yaml | 58 +++++++++++++++++++ ...form-c92c28d92f174db02a0c2fa3d5d985bd.yaml | 58 +++++++++++++++++++ ...unts-9febd7c017184f2da162cbcd9ca6acbf.yaml | 58 +++++++++++++++++++ ...unts-e783401602a498d4131896498c1a16c5.yaml | 58 +++++++++++++++++++ ...tory-6351a80c46e754ccfc255c93464a7133.yaml | 58 +++++++++++++++++++ ...tory-c91fc0c595c28d56281ceceb582f95ca.yaml | 58 +++++++++++++++++++ ...ager-0c52b9ced5fad811a9c32501960e026a.yaml | 58 +++++++++++++++++++ ...ager-21c7f53627abc5f5c7e2ab4c4c0be8ef.yaml | 58 +++++++++++++++++++ ...ager-3e07b6da33478750c50e5b536bd946ad.yaml | 58 +++++++++++++++++++ ...ager-678114ef3e2b187e51ff0be3e7f2cb83.yaml | 58 +++++++++++++++++++ ...ctor-561949f2365cf48493988b7c3c181142.yaml | 58 +++++++++++++++++++ ...ctor-792043f233fdfdf73c23cd58a8394e1e.yaml | 58 +++++++++++++++++++ ...ency-4ff702381866f61703ebf71fe12af15e.yaml | 58 +++++++++++++++++++ ...ency-cb35d75b82f07351d5d16e14c21403c2.yaml | 58 +++++++++++++++++++ ...ping-7255e5fa9e3ec3cf7fa69588c79329ad.yaml | 58 +++++++++++++++++++ ...ping-f0926dfe58b2d68873b90253a8c8de31.yaml | 58 +++++++++++++++++++ ...lace-09629550fe11748b689836fcea30749f.yaml | 58 +++++++++++++++++++ ...lace-1478aed4c0e54759cab266ed6c352f80.yaml | 58 +++++++++++++++++++ ...lace-5567b70c50ecdd16ecc424f15907fa4e.yaml | 58 +++++++++++++++++++ ...lace-f2b7f592ec3ba706f4f8d466824a06fa.yaml | 58 +++++++++++++++++++ ...ship-30f699fd6cdbd468ddc76c3c8a6a1ad8.yaml | 58 +++++++++++++++++++ ...ship-56e813efb82c352fb78dd0b9d790ba93.yaml | 58 +++++++++++++++++++ ...ship-97518b1e79707fc1ebbeb0e1daae9dba.yaml | 58 +++++++++++++++++++ ...ship-a335f75177dafe5e24035ba2e131a198.yaml | 58 +++++++++++++++++++ ...lite-87d943234d9fd7c1b966ece253dc1110.yaml | 58 +++++++++++++++++++ ...gory-dd705d1a34267a8e434a4d7783906fdf.yaml | 58 +++++++++++++++++++ ...eway-bf0e4365c0a80682381fd05937032a09.yaml | 58 +++++++++++++++++++ ...ment-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...thor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...list-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-a4d40046e4eca99f143d32a308572489.yaml | 58 +++++++++++++++++++ ...lite-ddad3bba44bb780c0ca045c9e513315e.yaml | 58 +++++++++++++++++++ ...tton-43fc63136cea65380642c1d5a8771c07.yaml | 58 +++++++++++++++++++ ...elds-3bc9c18ecec44e99a8a9ea6dc1c2be4b.yaml | 58 +++++++++++++++++++ ...anty-50a3dde160b2a73e3a26cf26d3c385b6.yaml | 58 +++++++++++++++++++ ...tion-9a08cd964e2072002295aa2ccec0ac6e.yaml | 58 +++++++++++++++++++ ...bers-a6e3e3fb130ca53fe59b00bde1e4c562.yaml | 58 +++++++++++++++++++ ...odes-603a30eceae4e23d58fec3225b0d2f29.yaml | 58 +++++++++++++++++++ ...odes-8911dada79ef696f6a6182ef72e3da28.yaml | 58 +++++++++++++++++++ ...odes-d28bd5fd4f3450ea3f311605e6d65b1d.yaml | 58 +++++++++++++++++++ ...stem-1b283946c80a7878d62493f2e843e97b.yaml | 58 +++++++++++++++++++ ...stem-a215ad133aa4b98aa9f0101d4d17e0cc.yaml | 58 +++++++++++++++++++ ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dors-07b010f0b7d81d013a7b9731f936031d.yaml | 58 +++++++++++++++++++ ...dors-e8bc31ae76ca92a9ee7834937815ba80.yaml | 58 +++++++++++++++++++ ...ping-1f67e045b6e7fe7d437958d4ed1bb1b5.yaml | 58 +++++++++++++++++++ ...elle-7957be3fab19e29df56fc4f0499a1aaf.yaml | 58 +++++++++++++++++++ ...elle-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...c4bp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...c4bp-bf0f79649962d2d1514ad595e16e29b6.yaml | 58 +++++++++++++++++++ ...c4bp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...arch-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-api-054a823a88fd659044cb1d5f3fc034a5.yaml | 58 +++++++++++++++++++ ...ator-1e89a13fba73865588209c9be692cd21.yaml | 58 +++++++++++++++++++ ...form-313015abf6a4029981fb303ae0c8c403.yaml | 58 +++++++++++++++++++ ...form-d5eec60f27d6879accd492bf02988af0.yaml | 58 +++++++++++++++++++ ...form-dcababdc75851dd1c392ab090e66bbb5.yaml | 58 +++++++++++++++++++ ...ther-16ac809b05b30c0b6fd94eeae5705ae7.yaml | 58 +++++++++++++++++++ ...ther-f67cd9a7d9946e522cc9799584d6f928.yaml | 58 +++++++++++++++++++ ...feed-416f9daf88fd1151a6d830797c7cec0b.yaml | 58 +++++++++++++++++++ ...feed-692a59847419e00f01e0e2c7d8867aaa.yaml | 58 +++++++++++++++++++ ...tics-68962a84ced90a9ac882bf37153f6810.yaml | 58 +++++++++++++++++++ ...tics-bec851a00ad3a57c79ae718c7939bfce.yaml | 58 +++++++++++++++++++ ...maps-2dba3f9d9e05a82800f2a05f03266828.yaml | 58 +++++++++++++++++++ ...maps-49fe0ec6f2b7aab6fa4c17842c7d352a.yaml | 58 +++++++++++++++++++ ...maps-69de6d03812ceef96ce6fe7bde70be19.yaml | 58 +++++++++++++++++++ ...maps-7e3117bf0f4e61f1c6678c5ed0029bc5.yaml | 58 +++++++++++++++++++ ...maps-913aecbb55aeada0646124d3b1f7ac2e.yaml | 58 +++++++++++++++++++ ...maps-918f1e8f5b006a783c5bc9147cfd6f61.yaml | 58 +++++++++++++++++++ ...maps-beb09afd16c7dbf0c14aa5a401d0f673.yaml | 58 +++++++++++++++++++ ...feed-12d0498f23c173f6e13e28a5406baf6c.yaml | 58 +++++++++++++++++++ ...feed-6c265d4dd5a13df1986f278910f69c7d.yaml | 58 +++++++++++++++++++ ...gate-ab7b45d23a9e44cbc1f94f5b43ecd585.yaml | 58 +++++++++++++++++++ ...tlas-f48e8a5fbf1e696f1cc387a7e678c77c.yaml | 58 +++++++++++++++++++ ...fect-f85537b61e94963bbc9d5c86e5b9998c.yaml | 58 +++++++++++++++++++ ...fect-fa8d9c6fc1b3f748c9c03e858b8946b9.yaml | 58 +++++++++++++++++++ ...port-5614f511e973e614fd375402d8486642.yaml | 58 +++++++++++++++++++ ...port-d8d38e7154b358bc9b031a2ad78ce806.yaml | 58 +++++++++++++++++++ ...wall-504399029097a5e86b5ba9c9da19637b.yaml | 58 +++++++++++++++++++ ...free-263813b94544d66ca6de0f83221d4012.yaml | 58 +++++++++++++++++++ ...tals-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tals-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ento-0c1ff6bda54a1c54ef1a2295ae5e33e6.yaml | 58 +++++++++++++++++++ ...nger-dcf62ae8561beba15cd72e7dcb3bf604.yaml | 58 +++++++++++++++++++ ...oice-1da82cb5548de3f68423707825b69043.yaml | 58 +++++++++++++++++++ ...oice-4d7353aae0306a1d0c2e5c68f3406ced.yaml | 58 +++++++++++++++++++ ...stat-6f7706168cb1bf8ff1d56088b3f10d22.yaml | 58 +++++++++++++++++++ ...ries-1c085614f4dda72120112eb265cf3956.yaml | 58 +++++++++++++++++++ ...ries-6090167e88ca71d53352f4ae35082be0.yaml | 58 +++++++++++++++++++ ...tion-a39c97187fc8c6885698e5dd59bde6ea.yaml | 58 +++++++++++++++++++ ...tion-de99acad607297a91554bdcebfb71c6e.yaml | 58 +++++++++++++++++++ ...lder-f2c489e7cd964714f8d10d151c46e5bf.yaml | 58 +++++++++++++++++++ ...erce-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...erce-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...erce-e28aab5b6692c380e9af77bda5d75a97.yaml | 58 +++++++++++++++++++ ...barx-01553cdc4d088a5ffa18c2b6b9ad5640.yaml | 58 +++++++++++++++++++ ...barx-c1098b6c3ef986df5a9cd4bcd3f22c1d.yaml | 58 +++++++++++++++++++ ...lite-2a09ce4f54ecaad8c53766c936fa0a77.yaml | 58 +++++++++++++++++++ ...lite-852d49969bf0838b042595dfd6400dc8.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...chat-0f5da3ff5cb74e14389716d803ec3198.yaml | 58 +++++++++++++++++++ ...chat-e6c1637e24e361150992210212c2ee7c.yaml | 58 +++++++++++++++++++ ...gage-a81e63270dce3acdb86d52d988c823c1.yaml | 58 +++++++++++++++++++ ...ator-424714e0619eb7899a426abc7531d5d4.yaml | 58 +++++++++++++++++++ ...ages-d242d8704b7ccc1eaddd7fe775c62763.yaml | 58 +++++++++++++++++++ ...shop-4107aeeea36af4cc92554c8214549a0c.yaml | 58 +++++++++++++++++++ ...lier-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...meet-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...meet-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...meet-c115c2b38773f756d29db80a784da83d.yaml | 58 +++++++++++++++++++ ...tion-24235010dc5f596c69c8fc2e49290c79.yaml | 58 +++++++++++++++++++ ...tion-248f6a7272fbf1cbf24050ac1a199f58.yaml | 58 +++++++++++++++++++ ...tion-5178d59b66e68e951d4f7950c9fe1897.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-ce19f0865e2754bb33aa14bd9af59e12.yaml | 58 +++++++++++++++++++ ...tion-ea72a950c1ec7c195be94a36b1f4a88b.yaml | 58 +++++++++++++++++++ ...rian-078737c487b7cb7dd59dfa47479456c5.yaml | 58 +++++++++++++++++++ ...rian-09a7bcc8ea30f2211fb747659d8fc0b2.yaml | 58 +++++++++++++++++++ ...rian-19dc9eaf0f82c574889586e002e668f6.yaml | 58 +++++++++++++++++++ ...rian-721a4bb5a70d51824521f6e59c15ccd0.yaml | 58 +++++++++++++++++++ ...rian-df8c113b5a2942a4fbbfe352003deb48.yaml | 58 +++++++++++++++++++ ...eeds-2f71afc8c2d9293f41fbc23cbef8e12e.yaml | 58 +++++++++++++++++++ ...eeds-658f027744f04fc24b4bbaa34345300a.yaml | 58 +++++++++++++++++++ ...eeds-9052f6be826c55f21c5dca387bdd8f58.yaml | 58 +++++++++++++++++++ ...eeds-c4fa0744bf528288e2b344cf15e3e525.yaml | 58 +++++++++++++++++++ ...ools-ed6d1649ba9976ebdf4a57c36e036026.yaml | 58 +++++++++++++++++++ ...ools-fcf19f2a25a048981731715a2abd665b.yaml | 58 +++++++++++++++++++ ...tion-200b5675cd7f93f9a3a59f8b16a025dd.yaml | 58 +++++++++++++++++++ ...tion-83bb2c4151dabc454448c4004e1bc5d5.yaml | 58 +++++++++++++++++++ ...edia-52ad3a4045cbc52c94981ea4e45a3cca.yaml | 58 +++++++++++++++++++ ...edia-a5e6cd84098c70182c2285443d912164.yaml | 58 +++++++++++++++++++ ...ress-3d333cad26fc8b3d5422c9b862bc540d.yaml | 58 +++++++++++++++++++ ...ress-a115c09e275d981be8fd48f835f5a022.yaml | 58 +++++++++++++++++++ ...ions-8ddc4ba3a0f497ef212e13a7d6e63ce3.yaml | 58 +++++++++++++++++++ ...ions-99ed4f84114970decbe599553d25ef62.yaml | 58 +++++++++++++++++++ ...ions-c54aa5c11f04ffd29f7bfb4d878ecdae.yaml | 58 +++++++++++++++++++ ...mail-65f94ea0710a1cc5f2df8da6f9883ee7.yaml | 58 +++++++++++++++++++ ...ewer-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...bles-eb4c190ad02fb7be0bb121747087fd9e.yaml | 58 +++++++++++++++++++ ...enet-9f77fe459a0e5283ffcbf11ae93f5733.yaml | 58 +++++++++++++++++++ ...load-33759bcda67b63222c81180460386592.yaml | 58 +++++++++++++++++++ ...load-e6a88eb36d00e8ebcfe3d81bafc03b1e.yaml | 58 +++++++++++++++++++ ...itor-b4286607d776cde455809a59a67464fa.yaml | 58 +++++++++++++++++++ ...enet-fb6bf968c60057d0db8de1f7c72a739d.yaml | 58 +++++++++++++++++++ ...keur-bb474de523e33ab78eb1474118c2fa7e.yaml | 58 +++++++++++++++++++ ...cast-71573a0535f08f2db438af64d10b0f1d.yaml | 58 +++++++++++++++++++ ...ward-bcff2870cae12c5758ea4c72282891f6.yaml | 58 +++++++++++++++++++ ...ager-0a72b6924fec36fec1dd6c3deccd8793.yaml | 58 +++++++++++++++++++ ...ager-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ager-4c439a45b0012520f242bad12e03107a.yaml | 58 +++++++++++++++++++ ...ager-8a54587701c521af8ba2b5105bfe686a.yaml | 58 +++++++++++++++++++ ...ager-b61b6ac3b97f0d01cb8ed1723488895c.yaml | 58 +++++++++++++++++++ ...ager-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ager-df9102694b36792bdabf02d0dae189bc.yaml | 58 +++++++++++++++++++ ...ager-edc5ca28f14c37c2e01dbf4e23653e4f.yaml | 58 +++++++++++++++++++ ...docs-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...docs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...lite-910100abea99ef6c374051083d0fe4ff.yaml | 58 +++++++++++++++++++ ...dule-b226e8f4a0772170244c06930bdb6dc9.yaml | 58 +++++++++++++++++++ ...dule-a7639c71f3241814b9c95f17c5919356.yaml | 58 +++++++++++++++++++ ...orms-20aadb46b84139edf712ada2a54996af.yaml | 58 +++++++++++++++++++ ...orms-22ec989ac05e231b0a72ec153f660e8e.yaml | 58 +++++++++++++++++++ ...orms-38f8a2f1ccb6fa8679c01ae474dc43d3.yaml | 58 +++++++++++++++++++ ...orms-4e68aefc025803a73af9ddad4f651646.yaml | 58 +++++++++++++++++++ ...orms-61c13420e3dc8f41c004527b0a6dcd7f.yaml | 58 +++++++++++++++++++ ...orms-b76b106cd104db99c0e761b215cfa76f.yaml | 58 +++++++++++++++++++ ...glot-9b9cbf166c5c9952b460a90920fbb492.yaml | 58 +++++++++++++++++++ ...erce-962608679c37b286812f3dffa30e38de.yaml | 58 +++++++++++++++++++ ...nced-2bcf120ca9cfae0292d17d841a512698.yaml | 58 +++++++++++++++++++ ...itor-3d2b6fc11dbb30b7c1a2b1d4703e5965.yaml | 58 +++++++++++++++++++ ...itor-9ad568f26d284db1bbd80573c9ce9895.yaml | 58 +++++++++++++++++++ ...mail-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...mail-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...rker-5b8de369a947d5ef9762408c0a15df35.yaml | 58 +++++++++++++++++++ ...umns-c849c5ba3c9b4616d8436c9196e9a011.yaml | 58 +++++++++++++++++++ ...odes-a04fa743a93c3af81940f7c153cec33e.yaml | 58 +++++++++++++++++++ ...epos-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...epos-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...rity-b205c6392eb0136cf0df5ea96fc73a56.yaml | 58 +++++++++++++++++++ ...sent-0533a60780cf9a211a23b93d336f2dae.yaml | 58 +++++++++++++++++++ ...auge-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...auge-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ials-d863abcdf052b29c71bf4158cc87a13f.yaml | 58 +++++++++++++++++++ ...word-363aa4459971c85215990cb3c8eb5496.yaml | 58 +++++++++++++++++++ ...word-c67d4649ea18743c5c7a2e3701c4b78b.yaml | 58 +++++++++++++++++++ ...zzle-054cca949d3d20e70e41393d4d7ba0fa.yaml | 58 +++++++++++++++++++ ...arch-6fde6e46382738cc90cbede415252e23.yaml | 58 +++++++++++++++++++ ...arch-9c32419221ff25df45de1a2bef4b454c.yaml | 58 +++++++++++++++++++ ...ator-4f768a2e6ed5431813ce2815c2416c7e.yaml | 58 +++++++++++++++++++ ...sapp-35617caa27e1534d5543f128d4268283.yaml | 58 +++++++++++++++++++ ...tton-5010f538683e4ce673730780a1277a01.yaml | 58 +++++++++++++++++++ ...ogin-e5890c71dc0cd4588ccd030aa7bc5fbd.yaml | 58 +++++++++++++++++++ ...file-93c626578b9ec2f6ee1b804fc44e2116.yaml | 58 +++++++++++++++++++ ...file-c6789a8c4ddf7f4894074b67cbbeecc0.yaml | 58 +++++++++++++++++++ ...abel-5163255cf1a46ed12d467697bfe3f205.yaml | 58 +++++++++++++++++++ ...ntor-e6a4bf4b7def7461fd0f2bf14330f22c.yaml | 58 +++++++++++++++++++ ...-cms-5442adae59d3e3922670d74f56222668.yaml | 58 +++++++++++++++++++ ...-cms-7987b5631645ef011c12aa6fb80cc221.yaml | 58 +++++++++++++++++++ ...-cms-84f16791aafe87d42cf363331892fb65.yaml | 58 +++++++++++++++++++ ...-cms-c371077c38bdbe69f0a63c723cbb2e25.yaml | 58 +++++++++++++++++++ ...-cms-ed7d98d793a5f352e711f6139453960a.yaml | 58 +++++++++++++++++++ ...-cms-fbf7c3cd22ded693b164bcbaa6ae36f2.yaml | 58 +++++++++++++++++++ ...tion-4a259e9179bf39bf0792ee310ede4901.yaml | 58 +++++++++++++++++++ ...hizz-8475202b9f0509bc3f7f733c6c0c1b7b.yaml | 58 +++++++++++++++++++ ...hizz-b7bde08d72b1bc77eb8f6cd0fab4feae.yaml | 58 +++++++++++++++++++ ...izzy-41404190c9a7f512053b049611a997bf.yaml | 58 +++++++++++++++++++ ...izzy-6ab5c2b9e9da3c807bbb85a9044847fe.yaml | 58 +++++++++++++++++++ ...idge-239a7878d9add7cd58180811b224bdbf.yaml | 58 +++++++++++++++++++ ...idge-f7ea807ec289aa8d8be34a1208e9ebb9.yaml | 58 +++++++++++++++++++ ...nter-4d3c4e1a467914ea53537050432b3938.yaml | 58 +++++++++++++++++++ ...nter-a52b3eb784f2d8ce0a9c250a80d5caf4.yaml | 58 +++++++++++++++++++ ...nter-de2e48f236e18fa41cbab430238c4a68.yaml | 58 +++++++++++++++++++ ...rket-8c2cb48bfeb76279d7566cc81ccb49f0.yaml | 58 +++++++++++++++++++ ...erce-519740287ea130c472e2b41307bc4416.yaml | 58 +++++++++++++++++++ ...erce-cb9daa85351403585e36c2f7a51816cd.yaml | 58 +++++++++++++++++++ ...erce-f7ab3183d6a1c8faf8c7fa4cce5c285d.yaml | 58 +++++++++++++++++++ ...alex-315c913a950b5ab55bf23c5c0352b368.yaml | 58 +++++++++++++++++++ ...alex-6923c1be5ff9c6a809243f9a5e70bfcf.yaml | 58 +++++++++++++++++++ ...alex-dee36755177c71d5de078f0f334f5c8c.yaml | 58 +++++++++++++++++++ ...alex-fcf9aaed3d1b8f79608285d878f326bc.yaml | 58 +++++++++++++++++++ ...ense-13ab8a3f776049bebae928b8bd527987.yaml | 58 +++++++++++++++++++ ...ense-29fe63e56224db942ac29ad8bcab73cb.yaml | 58 +++++++++++++++++++ ...ders-094fc0c37d514333a53dda18143a300a.yaml | 58 +++++++++++++++++++ ...ders-0b0e708bccfb3aa959792527101f43e8.yaml | 58 +++++++++++++++++++ ...ders-192adf4b1d06945fee5aacceae89bc97.yaml | 58 +++++++++++++++++++ ...ders-1ae6c66606c2f76330e0314294bf793f.yaml | 58 +++++++++++++++++++ ...ders-30f703a8acc3080fb74debd07614d86d.yaml | 58 +++++++++++++++++++ ...ders-3831d6e441ebd610665743a8c0a63dc7.yaml | 58 +++++++++++++++++++ ...ders-38cfa7354fceb66defa5b11a8b1426c0.yaml | 58 +++++++++++++++++++ ...ders-414ea88c3052f2317af7072cb92eace3.yaml | 58 +++++++++++++++++++ ...ders-41e14165ad1acfba7a5c854923e3ff08.yaml | 58 +++++++++++++++++++ ...ders-4604c654a4b997b8c024a5034ff5a092.yaml | 58 +++++++++++++++++++ ...ders-4d2d5a55f2e91189ca973872c711a490.yaml | 58 +++++++++++++++++++ ...ders-5f610251a978e5acf9ae5800b76c24c6.yaml | 58 +++++++++++++++++++ ...ders-68f67c3c9420931e292f3ba3431422cd.yaml | 58 +++++++++++++++++++ ...ders-84c888c9934970f66e3e629431140250.yaml | 58 +++++++++++++++++++ ...ders-893145b250531536b2c0fa0f1e330f2c.yaml | 58 +++++++++++++++++++ ...ders-98f5671f8000cd41848d0242c4d503d1.yaml | 58 +++++++++++++++++++ ...ders-be4129faca04d80ed9ac385cd5b2bcc3.yaml | 58 +++++++++++++++++++ ...ders-d79b94a0512e6933bbccf753fd89114f.yaml | 58 +++++++++++++++++++ ...ders-de667b04628eecce001a8b74a40e92e3.yaml | 58 +++++++++++++++++++ ...ders-dfd279bb4131501197e1f533c2de9f14.yaml | 58 +++++++++++++++++++ ...ders-e8700910e77f438a47719067618b1f42.yaml | 58 +++++++++++++++++++ ...lock-123c61ec8b7e4bc9b57cbeaee02f12fe.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...uery-8fe3695ecc567c29e92906730f596df1.yaml | 58 +++++++++++++++++++ ...rm-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-api-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...iews-459b18886f45ada6d060921939e88905.yaml | 58 +++++++++++++++++++ ...iews-4de563d96c4862070b39ddbeaaf2aa52.yaml | 58 +++++++++++++++++++ ...iews-648a32c4399962c7e8df779124e03350.yaml | 58 +++++++++++++++++++ ...iews-69fd4d1a3d07810924c63e0b65d11e51.yaml | 58 +++++++++++++++++++ ...ogic-068331b2d9acf141050172c5e67910ff.yaml | 58 +++++++++++++++++++ ...ider-7bdd14c359e34ad7380502271a0ac656.yaml | 58 +++++++++++++++++++ ...port-a5767736936a5d7db756e536a6ac0996.yaml | 58 +++++++++++++++++++ ...code-6ec64fa1d5347bc867f5cb9d59094e81.yaml | 58 +++++++++++++++++++ ...tter-b5c74375abda0734f64c322204bc8108.yaml | 58 +++++++++++++++++++ ...ntor-20b8b7b7f0087daadf58f3d74ba2a999.yaml | 58 +++++++++++++++++++ ...ntor-85a1c6e007a9a1b0879129219d595f5f.yaml | 58 +++++++++++++++++++ ...ntor-bc4814d8e32bebe97767bb786c515063.yaml | 58 +++++++++++++++++++ ...ntor-f92fdb8def6ac7c07ce14435754a7ffa.yaml | 58 +++++++++++++++++++ ...ller-bcfdb3c82ae0485dc6fcdad4aba69c36.yaml | 58 +++++++++++++++++++ ...iews-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...iews-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...iews-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...igin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...iews-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...iews-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...iews-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...ages-022d6e4b68c3750efdb62382e3088ee3.yaml | 58 +++++++++++++++++++ ...osts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...osts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ages-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...code-d17eaa15397a887312aedfb1919c156f.yaml | 58 +++++++++++++++++++ ...ipop-11d411cbc5ec47f84a5a874c5f4a706d.yaml | 58 +++++++++++++++++++ ...lock-a51f4e9f249cf27f338341ad1f220702.yaml | 58 +++++++++++++++++++ ...lock-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...ogin-41ebdf42bbd34392f33d2e300bcf1f22.yaml | 58 +++++++++++++++++++ ...ogin-604150a52b0430463d87d2c334416504.yaml | 58 +++++++++++++++++++ ...chat-6a2f9e4e8b4608d42296886211931452.yaml | 58 +++++++++++++++++++ ...chat-6b39b952a5d8522421f2815fd5e705bc.yaml | 58 +++++++++++++++++++ ...chat-af5cb5e26919d347db9037fb5a77d7dd.yaml | 58 +++++++++++++++++++ ...form-b236dd17f6f9d64bfcd1ad06166ef939.yaml | 58 +++++++++++++++++++ ...tify-6b2cae5676cc752aa89b0a0ababa3a92.yaml | 58 +++++++++++++++++++ ...erce-dfec65d3ffe11067030127a9c011404a.yaml | 58 +++++++++++++++++++ ...pare-d336c1132b5fe2aa3919365b360cd97c.yaml | 58 +++++++++++++++++++ ...uite-636baab4ac31da3f60a0d64060238890.yaml | 58 +++++++++++++++++++ ...uite-b1e2122cdc23a9d17ef80227bd4601b9.yaml | 58 +++++++++++++++++++ ...uite-cab8156a963bed782ca63418d284864e.yaml | 58 +++++++++++++++++++ ...lose-4690da6a9cd43936031eeb63dbe5ba89.yaml | 58 +++++++++++++++++++ ...lose-7a36c8dbdadc012c88743cb1cfe1ebe4.yaml | 58 +++++++++++++++++++ ...lert-484dd45c6c89790208a6369cc9e3257b.yaml | 58 +++++++++++++++++++ ...ress-b64173f040b81fec7a1fc17ca0c0ce07.yaml | 58 +++++++++++++++++++ ...tags-a603cc9c5e1a7b03e0366ddf1342a158.yaml | 58 +++++++++++++++++++ ...tags-d2fc1c819ff763ffa1233f51f7546ae8.yaml | 58 +++++++++++++++++++ ...udio-065dcae4701acc4da94fbbf470a429a5.yaml | 58 +++++++++++++++++++ ...udio-66fd05b591a1b1e766cf1d8976a2f593.yaml | 58 +++++++++++++++++++ ...mbed-4fd129ac95b2130cc2038525d8a627da.yaml | 58 +++++++++++++++++++ ...lite-e6c6234529a7a371a2050a65eda4af25.yaml | 58 +++++++++++++++++++ ...mbed-da919374ddf5731e45e304b65e085880.yaml | 58 +++++++++++++++++++ ...very-919e97db9044ec7b244c9151671a753a.yaml | 58 +++++++++++++++++++ ...ange-e6dc5c65c5e3da715fdfcb77e5293453.yaml | 58 +++++++++++++++++++ ...uote-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...book-35ff0530e249316fdf7a2ba6a6ea24d8.yaml | 58 +++++++++++++++++++ ...otes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...otes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...arch-c0b1d947b4291937f57429344da7ac74.yaml | 58 +++++++++++++++++++ ...arch-cd59c1c91da7bd7850f2d8eefef7525f.yaml | 58 +++++++++++++++++++ ...hart-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mail-1a3d5e6e024266b84857a352fd89d5d4.yaml | 58 +++++++++++++++++++ ...king-7d0205a12fc304106a260b15c9e203c3.yaml | 58 +++++++++++++++++++ ...king-c176f376f5ace8dd8c28eea850150499.yaml | 58 +++++++++++++++++++ ...ship-321cda5857ad757ce4e9e189c0e44351.yaml | 58 +++++++++++++++++++ ...ship-f3d781217508c2a98509cd1c1ad7df6d.yaml | 58 +++++++++++++++++++ ...ping-665a15eb3c74a6909c9a809b40156100.yaml | 58 +++++++++++++++++++ ...ping-b53f2739c791cac0974587f72b226309.yaml | 58 +++++++++++++++++++ ...eway-30b073e9b1352950780f07d63c18b80e.yaml | 58 +++++++++++++++++++ ...eway-fa3a0e16158897f1a5622777bde0d373.yaml | 58 +++++++++++++++++++ ...view-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...-aim-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...date-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...plus-ed2236ee570598966dd60e4e75f31def.yaml | 58 +++++++++++++++++++ ...mers-6028c54ef4ac7396964867f4a36d1c6f.yaml | 58 +++++++++++++++++++ ...mers-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ndar-beebd9357e523ac8ce9429685a86283c.yaml | 58 +++++++++++++++++++ ...ther-75a6b15f48d4510d78d2b82a83179681.yaml | 58 +++++++++++++++++++ ...ucts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...itor-0d7505c66909a7f3ed3a00f6a96e3574.yaml | 58 +++++++++++++++++++ ...itor-1a98182627ada5df6f3381c144225d78.yaml | 58 +++++++++++++++++++ ...itor-279b072b9f314efe6eaa0526f843e1e3.yaml | 58 +++++++++++++++++++ ...itor-2c64ec746b7e41f305498188d926d390.yaml | 58 +++++++++++++++++++ ...itor-3174ef274fa543dfe91589efb1d4f079.yaml | 58 +++++++++++++++++++ ...itor-31c3ed011ea62ab6b0c75e066a9aedba.yaml | 58 +++++++++++++++++++ ...itor-40d6fd2347c9fdc44764f85da9bdf3cd.yaml | 58 +++++++++++++++++++ ...itor-4c865f41093e5024a99224cc98999126.yaml | 58 +++++++++++++++++++ ...itor-8717d29877e2716945b774b8b7bdcce3.yaml | 58 +++++++++++++++++++ ...itor-a16906c099275dafdc8327b1b913b90b.yaml | 58 +++++++++++++++++++ ...itor-ad48b0930ccb8ba605ddc4459d92eb83.yaml | 58 +++++++++++++++++++ ...itor-b5f79719a2f0199ef2281b12f3375388.yaml | 58 +++++++++++++++++++ ...itor-b9712f471d4d13ca925287df646b0e0b.yaml | 58 +++++++++++++++++++ ...itor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml | 58 +++++++++++++++++++ ...itor-c7c8e86fe8e5b4d368e1042cf3070ec8.yaml | 58 +++++++++++++++++++ ...itor-de9fc871b36bb1f0c6b5f7fa879cfa84.yaml | 58 +++++++++++++++++++ ...itor-df6b45b19424e9077c2131a407f92c61.yaml | 58 +++++++++++++++++++ ...itor-f064b3d43557a2b70b82cf2abcbc206d.yaml | 58 +++++++++++++++++++ ...date-9bae62947b00cd1f996b54815106f5ed.yaml | 58 +++++++++++++++++++ ...very-2cb72da676dcd5a807c86a857bed18a6.yaml | 58 +++++++++++++++++++ ...-one-b8b7b83ec8db40ca0658077a3631988b.yaml | 58 +++++++++++++++++++ ...ever-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ever-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...grid-9d69b5dedc1dea8d291f6cedb75f3be2.yaml | 58 +++++++++++++++++++ ...-pro-d8db32c50c0bea30a973b5af0530e9fa.yaml | 58 +++++++++++++++++++ ...oods-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oods-d6e20ffc56fbb7647d56a679f340333c.yaml | 58 +++++++++++++++++++ ...itor-f717a47fafca36f7d936ae0544056836.yaml | 58 +++++++++++++++++++ ...tech-bfd48818a8f8d2ed09939883a8a76d0e.yaml | 58 +++++++++++++++++++ ...kout-74ac9426139c38e6a637e2d13087eef0.yaml | 58 +++++++++++++++++++ ...kout-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ways-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...kout-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mail-1d7d1acaaeae708601e11c980ce64351.yaml | 58 +++++++++++++++++++ ...mail-20bfb39c28e57afafa73126a681ef707.yaml | 58 +++++++++++++++++++ ...mail-b62e00bc83e523a8ff2af72e62215cf4.yaml | 58 +++++++++++++++++++ ...mail-d1b51a702a678b8f9406ba962cb571a3.yaml | 58 +++++++++++++++++++ ...nced-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sage-4ea02dc94cad5b57a77c42e7c7c8d042.yaml | 58 +++++++++++++++++++ ...sage-7ef27e6173494edb101fd9088d250a65.yaml | 58 +++++++++++++++++++ ...sage-929f7bccf6d99dcdb90fbc58af16ac0f.yaml | 58 +++++++++++++++++++ ...sage-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sage-d6c1488951c377a5fdee8dcb8a391129.yaml | 58 +++++++++++++++++++ ...sage-dfbc847d6328add5c7ec6fda715f3e24.yaml | 58 +++++++++++++++++++ ...sage-f98bb5a74d2fa1a9c0b6c8217a328496.yaml | 58 +++++++++++++++++++ ...itor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ency-daeaf69e03551f5a39540769cb2822ca.yaml | 58 +++++++++++++++++++ ...mber-1c1bae32227727e0a4d5c09c16777000.yaml | 58 +++++++++++++++++++ ...ield-5e5aa6772ed81579447472ccdd176622.yaml | 58 +++++++++++++++++++ ...elds-49cbb81571d3991f2ef26ba874e53110.yaml | 58 +++++++++++++++++++ ...ails-05692bb82558cd77ced2449a9947331d.yaml | 58 +++++++++++++++++++ ...ails-6fa0ab83d8badc8c29c9bbd5b82377a3.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tory-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...edit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ules-b3abc33ac5c0eee824c171ffc996d70e.yaml | 58 +++++++++++++++++++ ...ules-d279b5b7a9de7113552384d130438d18.yaml | 58 +++++++++++++++++++ ...ules-d3067d7741f8700134e947d8ed10ad79.yaml | 58 +++++++++++++++++++ ...view-c53ac682d18711081effb4af801447e3.yaml | 58 +++++++++++++++++++ ...duct-6c3c2bf7b8f6a532d25d6bbbc66fa7c9.yaml | 58 +++++++++++++++++++ ...duct-7afdbaf504234dadcc9587b5a57a9cbb.yaml | 58 +++++++++++++++++++ ...book-0870bc8b1d530b3be68df9963ba1cc56.yaml | 58 +++++++++++++++++++ ...book-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ates-fd2527f160b6f8cee6c4ddf5aa4628c1.yaml | 58 +++++++++++++++++++ ...trol-12c1c0291f579d50f27573549b527d0e.yaml | 58 +++++++++++++++++++ ...pack-fb541598017032d47ba3cc3277c46760.yaml | 58 +++++++++++++++++++ ...esto-57f4b88a911e06a50ba6bc2f26eebab2.yaml | 58 +++++++++++++++++++ ...cost-67ed94f8d8db54b41e53c8a3a1c3d065.yaml | 58 +++++++++++++++++++ ...rate-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...iana-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cial-121f872296f7b7ce0005b54c410bc320.yaml | 58 +++++++++++++++++++ ...cial-4ee9faaf80de869a01f1ea65d80acfbb.yaml | 58 +++++++++++++++++++ ...lite-3a32b3729ec435ff7a8be0b786f133fc.yaml | 58 +++++++++++++++++++ ...lite-dea87137a3d1b873f5ca5b46839f87d8.yaml | 58 +++++++++++++++++++ ...lock-03ab94cbc5738569e6dbfc88111c85a5.yaml | 58 +++++++++++++++++++ ...lock-749a7702ffa607983798f5d2868f83ea.yaml | 58 +++++++++++++++++++ ...lock-9198fc1dbd756abf9188b781cecd0f68.yaml | 58 +++++++++++++++++++ ...lock-9b394c0cb664e18a38599c0b1cdfdbd2.yaml | 58 +++++++++++++++++++ ...rect-63de733b8b1cbcf5195bd25b24651bd1.yaml | 58 +++++++++++++++++++ ...rect-ce92d15642911831d9ca92e448d0dc45.yaml | 58 +++++++++++++++++++ ...heel-3ef982ad02fa7fc67bd896ba5c9c238f.yaml | 58 +++++++++++++++++++ ...lite-88cd9d196e2b824c736badcdf2c60486.yaml | 58 +++++++++++++++++++ ...lite-cca05bc5622e1c098579dbd96b0cb97a.yaml | 58 +++++++++++++++++++ ...antx-775b75e12971ef700fb478179dfd07a1.yaml | 58 +++++++++++++++++++ ...ngle-c32694721413767cb44f24e1463718a9.yaml | 58 +++++++++++++++++++ ...bird-23c9a6bcdbbbbe8c2bbfd755ec5ced2f.yaml | 58 +++++++++++++++++++ ...ency-04585caadf98109f09006297093db829.yaml | 58 +++++++++++++++++++ ...ency-284ad5b3246186f6f3b938546b4129a9.yaml | 58 +++++++++++++++++++ ...ency-4e4599c0d5b0830c29196e68a72f1714.yaml | 58 +++++++++++++++++++ ...eway-eb8db2756daf0437e7a0fbebd28c57f2.yaml | 58 +++++++++++++++++++ ...step-3be6a8dd2db55478dab854bd989a4208.yaml | 58 +++++++++++++++++++ ...lite-17a0ab6b1d7221d78713c85b5cfc7d09.yaml | 58 +++++++++++++++++++ ...lite-45f3255db2b21cf02cfd20c83ca9648c.yaml | 58 +++++++++++++++++++ ...lite-585b04156d64682d18676fed41ed4dfa.yaml | 58 +++++++++++++++++++ ...lite-82c4fdf6c165bae11c6baa8d84cc1665.yaml | 58 +++++++++++++++++++ ...lite-8cd31768dc61f0033829ab9bfd911338.yaml | 58 +++++++++++++++++++ ...lite-b59d3f14536598579f52eca567b11500.yaml | 58 +++++++++++++++++++ ...lite-db3f5d95cd42ccb9361196cfcc805ca2.yaml | 58 +++++++++++++++++++ ...king-1a6f3983d747959c89e7ec5dc65f9024.yaml | 58 +++++++++++++++++++ ...king-685c428e53c4340f09b6fcad98e8d448.yaml | 58 +++++++++++++++++++ ...king-dc785a9dfefaca6a0bea1613af751930.yaml | 58 +++++++++++++++++++ ...-pro-24c087c6076b1a75e662317afa8f98e8.yaml | 58 +++++++++++++++++++ ...-pro-6aa82d20e38845c6379edadfe73f8c79.yaml | 58 +++++++++++++++++++ ...late-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...bank-1c405e04f6277e8f63afc203bd74a63b.yaml | 58 +++++++++++++++++++ ...lder-16eec9967d2bcd67afac046816dc70ce.yaml | 58 +++++++++++++++++++ ...lder-5fd419efd8243713404055494bed8420.yaml | 58 +++++++++++++++++++ ...lder-6173b7b86957899221b3529556dc4a8a.yaml | 58 +++++++++++++++++++ ...lder-669481af47f05337ab733ec932b4b377.yaml | 58 +++++++++++++++++++ ...lder-83c650e19a6e1371f9525c06e9d1b62b.yaml | 58 +++++++++++++++++++ ...lder-c34ad7d49b6b5e2f77c281c8865fee0c.yaml | 58 +++++++++++++++++++ ...lder-e3fb45d4e1d6f55f124a91bc17024113.yaml | 58 +++++++++++++++++++ ...load-c19240e29be09298009c0e0215eb1f86.yaml | 58 +++++++++++++++++++ ...opay-4745429fbf9ec000c34eb26fe0eb2f46.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-cb1f5da1a0250368a9a1a2840b5fd8ff.yaml | 58 +++++++++++++++++++ ...opup-cecf0eea6a928571e9c6c0b109812dde.yaml | 58 +++++++++++++++++++ ...ails-4696b6dfedb443693738f04c3e5960c7.yaml | 58 +++++++++++++++++++ ...ails-f05f9460461d72edc72c6f486798730b.yaml | 58 +++++++++++++++++++ ...ment-8ec1d88a0440fb4d4bbc8ae34370a592.yaml | 58 +++++++++++++++++++ ...ment-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ndle-9b89103e6239de0df78ba6046e07241b.yaml | 58 +++++++++++++++++++ ...mate-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...mate-26d0ee067e8dc6608c7e062864b37750.yaml | 58 +++++++++++++++++++ ...mate-ace737eb3d27f2ecec85cbe6fb6964e9.yaml | 58 +++++++++++++++++++ ...mate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ount-01c368446b8700dac5340c9b9ddef1fe.yaml | 58 +++++++++++++++++++ ...ount-96e5ec11f01f1860b01e6de9ecd0a44e.yaml | 58 +++++++++++++++++++ ...uiry-971d7261bd1edf88014f77f83ee8b436.yaml | 58 +++++++++++++++++++ ...-pro-08b219082c14d0a4ceb2c461431d5022.yaml | 58 +++++++++++++++++++ ...-pro-092da9a0754379d27798e711aadf357a.yaml | 58 +++++++++++++++++++ ...-pro-57778ba99fa499e925c126c40d1e19eb.yaml | 58 +++++++++++++++++++ ...-pro-b6ba556ddde027cab29e149fd92ec34e.yaml | 58 +++++++++++++++++++ ...-pro-e33771324145cc65657e7a62ea2644b5.yaml | 58 +++++++++++++++++++ ...-pro-f7380d2067d81298695b7ed10624b075.yaml | 58 +++++++++++++++++++ ...lter-44c408e8dae2b7e08323b9972af77572.yaml | 58 +++++++++++++++++++ ...lter-b0a7fb767afdd59226d27d99a02d7966.yaml | 58 +++++++++++++++++++ ...ider-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ider-35e78d37b187cb4c7fe5d6abc5c15922.yaml | 58 +++++++++++++++++++ ...ider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...code-345d3d45cedd9f71e91c6e61868d3c59.yaml | 58 +++++++++++++++++++ ...code-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...gory-ba63b488e2407e68ac5be6c07d4b813b.yaml | 58 +++++++++++++++++++ ...ider-c1072dc6be25d5ca69ffa07a2d068093.yaml | 58 +++++++++++++++++++ ...ider-f700ae3c5b4e92d34fddc6f86f957267.yaml | 58 +++++++++++++++++++ ...able-e2d12fb1743cf7c34146fef09c867ef4.yaml | 58 +++++++++++++++++++ ...bles-ff403ca55433c3790064bbfc25253b20.yaml | 58 +++++++++++++++++++ ...lery-865b10a62092a11efd2388d72979b0d5.yaml | 58 +++++++++++++++++++ ...ches-820cc233aa3e1e97214079c055bbd5fb.yaml | 58 +++++++++++++++++++ ...ntor-b224632750bfc8c01cfd4c8878280cb5.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rpay-d60970bed3416d1d0688f40201a3d447.yaml | 58 +++++++++++++++++++ ...lite-96ff12fd53b9282c4a2c4aeb674ac66e.yaml | 58 +++++++++++++++++++ ...load-f9f7aa614950622531a31e76990cf4c8.yaml | 58 +++++++++++++++++++ ...remo-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...remo-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ager-1b1e66fd36e59457695196db22e1a6e9.yaml | 58 +++++++++++++++++++ ...erks-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...ddon-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ltic-39e0cd9a1bb57b7c976fa340879a57c5.yaml | 58 +++++++++++++++++++ ...ltic-bbc1707c7a5ee3103ec07e525a958c37.yaml | 58 +++++++++++++++++++ ...nger-8f9a4b2e27aff6f1c97baa2ca96cfe9f.yaml | 58 +++++++++++++++++++ ...view-a4bcc5ba22f6cf25dbecf393d91d5f77.yaml | 58 +++++++++++++++++++ ...list-0960254cf84107ae737889786d951876.yaml | 58 +++++++++++++++++++ ...list-6ecaf4687f30a18c2f1e4bdfe098e4f9.yaml | 58 +++++++++++++++++++ ...list-de4740107fbd20caea40fce59ea96c07.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...izer-179df283f6f4faa0dd973e427dd4bc30.yaml | 58 +++++++++++++++++++ ...izer-5cee27767ae5190db018a1cdcac6e39b.yaml | 58 +++++++++++++++++++ ...izer-7bdefad8c5305dfe4fbbdb047ffa82e3.yaml | 58 +++++++++++++++++++ ...lite-13f75b4807aa41447c76b6287198f0e6.yaml | 58 +++++++++++++++++++ ...lite-87df5cc36f24c1b7dd693537f9d2db36.yaml | 58 +++++++++++++++++++ ...lite-c43b2bc97ac2bdb36f5cf0cc1582221c.yaml | 58 +++++++++++++++++++ ...tion-45a6c5ecbb4131cfd2ebe25ca43d9a26.yaml | 58 +++++++++++++++++++ ...ales-60fd57f03f391911c0b737f75f701788.yaml | 58 +++++++++++++++++++ ...eway-24387a4b139635373353e5f045ea2527.yaml | 58 +++++++++++++++++++ ...shta-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-9404e968e946456749ff0111b0225ba5.yaml | 58 +++++++++++++++++++ ...ches-2b30ea73d6d558993d47f6388caba82c.yaml | 58 +++++++++++++++++++ ...viet-4246ff71c6ef488c4b4e4889ffbb362f.yaml | 58 +++++++++++++++++++ ...kout-56d4c43d31e2f8fea26c256a0553165d.yaml | 58 +++++++++++++++++++ ...kout-b2ee5069c05c98988181a6b0620a514c.yaml | 58 +++++++++++++++++++ ...kout-e718f73216a4ec4310297c0a9de0ac63.yaml | 58 +++++++++++++++++++ ...kout-eab2919aee1646dd0938cff504effdc4.yaml | 58 +++++++++++++++++++ ...ipps-e6cf650c13f11df4cb2b334fe314415e.yaml | 58 +++++++++++++++++++ ...llet-6cf5df1f5906c35e420af33d77451aff.yaml | 58 +++++++++++++++++++ ...llet-b6b61804ee61270fd88ffc6edea74fbb.yaml | 58 +++++++++++++++++++ ...llet-d38b07bf476ecd6b9ce90d545b02abb0.yaml | 58 +++++++++++++++++++ ...llet-d844d4bb69ae6b349312f77792834a3c.yaml | 58 +++++++++++++++++++ ...llet-fcef50fc4ab0d04c6eb8673c640961fc.yaml | 58 +++++++++++++++++++ ...uote-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...cing-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...show-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...zoho-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...zoho-359caa278db872385828cbff71df46b1.yaml | 58 +++++++++++++++++++ ...erce-03ab94cbc5738569e6dbfc88111c85a5.yaml | 58 +++++++++++++++++++ ...erce-13f4465ab134739f41610e238895c266.yaml | 58 +++++++++++++++++++ ...erce-1645d7b438ae878dd17947c113ddb596.yaml | 58 +++++++++++++++++++ ...ment-ff847df8e45ccd8c8631d5e2f3e5787c.yaml | 58 +++++++++++++++++++ ...erce-4074eef51d8ca4819a222281bd576993.yaml | 58 +++++++++++++++++++ ...erce-42f5857c1a1a9fe3bd07b32288faed9d.yaml | 58 +++++++++++++++++++ ...erce-43309247b72224f5060fd8cc3b8291fb.yaml | 58 +++++++++++++++++++ ...erce-487085694140471bbcc32f33541e46e2.yaml | 58 +++++++++++++++++++ ...erce-55e1b5df5b9827c27e5df23a7321f7ee.yaml | 58 +++++++++++++++++++ ...erce-57d45ec0a5be7d9e2195cf95b8c7f148.yaml | 58 +++++++++++++++++++ ...erce-5e6273100f90a46acd28f79e1bdc6d60.yaml | 58 +++++++++++++++++++ ...erce-6b3293fc7e42148d6c0cc437d12f11f2.yaml | 58 +++++++++++++++++++ ...erce-6bdece41810a5c3396f0d8933c273aac.yaml | 58 +++++++++++++++++++ ...erce-74b60f27afca1a7a8208f5a85162c261.yaml | 58 +++++++++++++++++++ ...erce-754810521866facb83b95cb8c9ef612b.yaml | 58 +++++++++++++++++++ ...erce-774e498835f1c205f8e5e4fbdea2e637.yaml | 58 +++++++++++++++++++ ...erce-78f0103ede56d833dde1d4c6ee111bb8.yaml | 58 +++++++++++++++++++ ...erce-7c984cea3d0bc3b9e0b3fd7eb2901db1.yaml | 58 +++++++++++++++++++ ...erce-7cf6ee2913d01ef81ee274bec7bbaacd.yaml | 58 +++++++++++++++++++ ...erce-7f0ce5b9ec72dd2d493ed1d295a17a8c.yaml | 58 +++++++++++++++++++ ...erce-8157d8b031515138cda4bb1e1c15680c.yaml | 58 +++++++++++++++++++ ...erce-8278cbb2c639762ea7b3c55a978dbdc6.yaml | 58 +++++++++++++++++++ ...erce-8558a4e07d53714cf571da3da3c60ba1.yaml | 58 +++++++++++++++++++ ...erce-8e8520225c7963139985f5c0746f0ebf.yaml | 58 +++++++++++++++++++ ...erce-96783cf4f584cdb85a4c3bf872b8f294.yaml | 58 +++++++++++++++++++ ...erce-97e4eb2a7cf055f8f422858c1ea33b8e.yaml | 58 +++++++++++++++++++ ...erce-9b394c0cb664e18a38599c0b1cdfdbd2.yaml | 58 +++++++++++++++++++ ...cart-2042df62ed2200315f3bbe8811391a51.yaml | 58 +++++++++++++++++++ ...cart-632ea9fb21b1d6ea9e4243a233a18985.yaml | 58 +++++++++++++++++++ ...cart-652c5c7de96b7353e84cc91a0e987c70.yaml | 58 +++++++++++++++++++ ...cart-6f4ff6b3d32734c83c5aee8986e3f499.yaml | 58 +++++++++++++++++++ ...cart-7b4674feefc9f627315c264f6661bb7a.yaml | 58 +++++++++++++++++++ ...cart-a3fbd1fe770668e38f708933d8dad89a.yaml | 58 +++++++++++++++++++ ...cart-af9a5eb02914599951c2e164f6765355.yaml | 58 +++++++++++++++++++ ...cart-d06e8f101fc29e27f35965c937d312fd.yaml | 58 +++++++++++++++++++ ...cart-d3760060833c9e24b772fab4457401bf.yaml | 58 +++++++++++++++++++ ...cart-e28866aa63369c2f108c411b915f57f5.yaml | 58 +++++++++++++++++++ ...cart-ea2c685d00d1a8d5b19ac5e3ca2b27ac.yaml | 58 +++++++++++++++++++ ...cart-f6a7581692765a7c832e5e3df2035856.yaml | 58 +++++++++++++++++++ ...-pro-a3fbd1fe770668e38f708933d8dad89a.yaml | 58 +++++++++++++++++++ ...erce-aca82f89029d85161f52ea200f7cad49.yaml | 58 +++++++++++++++++++ ...rect-754ce0f32f23ec71660fa4b4da98462b.yaml | 58 +++++++++++++++++++ ...dmin-97e4eb2a7cf055f8f422858c1ea33b8e.yaml | 58 +++++++++++++++++++ ...ters-34cd193453255faacca3d3995f1433f7.yaml | 58 +++++++++++++++++++ ...ters-d6de9c59d6ad94b2ef11d2e62d1ccaa3.yaml | 58 +++++++++++++++++++ ...ship-a08ed7f8c49cfccd0922eb203ec35499.yaml | 58 +++++++++++++++++++ ...sion-11c10e4dc5f28f5f7b4e3c822488409f.yaml | 58 +++++++++++++++++++ ...raud-eaf081771c47b844dc7170803f97eae4.yaml | 58 +++++++++++++++++++ ...tion-31cb28ae35765828074fe75a48e7d24a.yaml | 58 +++++++++++++++++++ ...erce-bb197c9271e2ac64456b0775acafc71f.yaml | 58 +++++++++++++++++++ ...ster-ef09f842dc72675ee253130a4cf363a3.yaml | 58 +++++++++++++++++++ ...ings-469be2a58c38c17e864a03db20b30c4c.yaml | 58 +++++++++++++++++++ ...ings-88bae4ee7812477c9e872ff70c893eb5.yaml | 58 +++++++++++++++++++ ...fice-26df4386152f6b2123dc8be12dc2c025.yaml | 58 +++++++++++++++++++ ...fice-615764f544ee769c8562683adf2e3c22.yaml | 58 +++++++++++++++++++ ...fice-e7840c043e4c24ed6e535dc7a65aee86.yaml | 58 +++++++++++++++++++ ...ands-36407f459596fb4be9dff24b707a16b5.yaml | 58 +++++++++++++++++++ ...ands-e749226d2f0bc5e5b3821630005dc969.yaml | 58 +++++++++++++++++++ ...ager-ebcec202e20e94c78709b42424b149aa.yaml | 58 +++++++++++++++++++ ...form-24628850cd8464ffd20b56d41e476477.yaml | 58 +++++++++++++++++++ ...form-d9e29420afd04acd93625f8acad7ad8f.yaml | 58 +++++++++++++++++++ ...ment-8a651f3bc7f119f869db333cd8567d87.yaml | 58 +++++++++++++++++++ ...erce-c27b32abd810b7ccfab57cf684c27b3d.yaml | 58 +++++++++++++++++++ ...erce-c2df943b1eb079c6b9fb4ba610f1737e.yaml | 58 +++++++++++++++++++ ...uiry-12f3d91aee2db4ef957651a35087221c.yaml | 58 +++++++++++++++++++ ...uiry-9c5f7452ef32bc2b3e47c8bc589c9872.yaml | 58 +++++++++++++++++++ ...uiry-a21ec241225c68d34de1331139c91c71.yaml | 58 +++++++++++++++++++ ...uiry-b8512840012a562de1323a1815a4b21e.yaml | 58 +++++++++++++++++++ ...uiry-f62206ccce82eddd9f38650d3ec27d0d.yaml | 58 +++++++++++++++++++ ...ucts-a49761e8700910d2b10517900bb96f1c.yaml | 58 +++++++++++++++++++ ...itor-067d07e6d5151cb4c0893a5aec05a2dd.yaml | 58 +++++++++++++++++++ ...itor-63101b083d74ba3046ffc1cbbf2b131c.yaml | 58 +++++++++++++++++++ ...ager-c27f182f563d1fb6d07ba79eda84b6fe.yaml | 58 +++++++++++++++++++ ...ager-eb73f0a8b99b79a58df7341a863670b9.yaml | 58 +++++++++++++++++++ ...ager-f0bd7cf2208f5a7facbcde43d480de7a.yaml | 58 +++++++++++++++++++ ...inks-45dd3e2337c1445444e70d9c65cc1e8d.yaml | 58 +++++++++++++++++++ ...ucts-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...ucts-b935aac9392ea74d48c16c20e8b0b995.yaml | 58 +++++++++++++++++++ ...ucts-866b0214eeca06aa312ee4f312dac633.yaml | 58 +++++++++++++++++++ ...king-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...king-552bb0df3849cc75dcf6d19f97ba3b05.yaml | 58 +++++++++++++++++++ ...king-8f3437550e10d6083b697e38767da0b0.yaml | 58 +++++++++++++++++++ ...king-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...king-f4f0c2c884affbdbf175616a0bb1ff76.yaml | 58 +++++++++++++++++++ ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...port-d33187604cb9b21d8a56ab4bd171d46f.yaml | 58 +++++++++++++++++++ ...cher-2e62f757ecb9e88c7028d520dbc7db1f.yaml | 58 +++++++++++++++++++ ...cher-406a6ababbf7eb821b04527364536110.yaml | 58 +++++++++++++++++++ ...cher-419388b03e7c101be5aa9e9f67fb81d9.yaml | 58 +++++++++++++++++++ ...cher-4a8f4a33d3fd03ddfa522524f9449c10.yaml | 58 +++++++++++++++++++ ...cher-6bedb1579a7e4736e9514fa8e953db76.yaml | 58 +++++++++++++++++++ ...cher-730d551e137dbe1c7e3252334b46b802.yaml | 58 +++++++++++++++++++ ...cher-92d281b70c0c1113532c8a9e6c09ac40.yaml | 58 +++++++++++++++++++ ...cher-94b50ea832a6fb6b13dcb5407b94970f.yaml | 58 +++++++++++++++++++ ...cher-a667090a25b41229ec62a693f2dae2ee.yaml | 58 +++++++++++++++++++ ...cher-ddc4061947d45933e373a65e6831e3d2.yaml | 58 +++++++++++++++++++ ...lite-32cfeb3b1e33f847bf448188352666fd.yaml | 58 +++++++++++++++++++ ...ager-1cb42f62394546a329e0486aa05cce34.yaml | 58 +++++++++++++++++++ ...ager-367546d5612217d94f1a8cf076937dba.yaml | 58 +++++++++++++++++++ ...ager-5e7acd4f9908a648514410cb186a2982.yaml | 58 +++++++++++++++++++ ...ager-95abb58d27d0cf8744e0e12e5ec2a346.yaml | 58 +++++++++++++++++++ ...ager-9ab63666836232ba83e4036d46f6e9b9.yaml | 58 +++++++++++++++++++ ...ager-fc1bee3fb68d7c35aad200db5adf3590.yaml | 58 +++++++++++++++++++ ...eway-47a69422b8abe1dcc847b3db9997fa97.yaml | 58 +++++++++++++++++++ ...erce-d12b3c547439468c334a187596dd5c5f.yaml | 58 +++++++++++++++++++ ...erce-dd9c5510a5d40b29d6b46c88b274a46a.yaml | 58 +++++++++++++++++++ ...otes-0416673ace5e88173c78bb032365c216.yaml | 58 +++++++++++++++++++ ...otes-1ba99d8d0c43c59d761a87f64764e3da.yaml | 58 +++++++++++++++++++ ...otes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml | 58 +++++++++++++++++++ ...plus-96b191d228294e43622c1d713d7ed4e0.yaml | 58 +++++++++++++++++++ ...ping-397fa61492d70ec7211788fe03e433d9.yaml | 58 +++++++++++++++++++ ...lery-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...lery-b935aac9392ea74d48c16c20e8b0b995.yaml | 58 +++++++++++++++++++ ...erce-e115a05599db838c2333feb6f8913d93.yaml | 58 +++++++++++++++++++ ...erce-e456b215f29a4067fb78fdf79a4f6d54.yaml | 58 +++++++++++++++++++ ...eway-327db16d1bb219d0ce7124ea14eed0f3.yaml | 58 +++++++++++++++++++ ...erce-ef7a31408ee94f0eeed2849750238bac.yaml | 58 +++++++++++++++++++ ...test-a44ca1908d9450fd4614e4ea737f8275.yaml | 58 +++++++++++++++++++ ...e-es-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tant-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rter-0a7c54bda59de606bfaad194d1e6aebd.yaml | 58 +++++++++++++++++++ ...rter-108c66426e710c3a88abb1208f5ec4da.yaml | 58 +++++++++++++++++++ ...rter-63060da1b9f2c3cbd43712f8f4871703.yaml | 58 +++++++++++++++++++ ...rter-675cb8bcb438f10a9bd4c15d9cbed954.yaml | 58 +++++++++++++++++++ ...rter-91f566864bd30a277df8beb598ea361a.yaml | 58 +++++++++++++++++++ ...rter-94e6a09d2cc84f5575e6e27866d15b32.yaml | 58 +++++++++++++++++++ ...ways-b3d7ce698d96885aab2b92e8488d08ec.yaml | 58 +++++++++++++++++++ ...ails-09fe90e01138ef94b76cf31af60e964c.yaml | 58 +++++++++++++++++++ ...ails-1a8df042079c3b5a71f5229720de76a0.yaml | 58 +++++++++++++++++++ ...ails-9f39bbe8da0a79b61b743c5fac55c881.yaml | 58 +++++++++++++++++++ ...ails-c78f898e91c2c10e61af831a7f77760d.yaml | 58 +++++++++++++++++++ ...apan-010c2fa504f8e0c5ce7acdd2e0b14e5d.yaml | 58 +++++++++++++++++++ ...apan-8d1e93909b79d28537c696fa4ea3a13b.yaml | 58 +++++++++++++++++++ ...apan-af335eaec6af4f82a164161fc36ab9ea.yaml | 58 +++++++++++++++++++ ...ager-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...nced-c2c0a2ea7f55bd32da478c30032d1869.yaml | 58 +++++++++++++++++++ ...iwiz-ffaaa29eafbfa43f1ab24fb78aa6ea85.yaml | 58 +++++++++++++++++++ ...eway-b9c5331c1740635695be7100e378bb1c.yaml | 58 +++++++++++++++++++ ...less-372a57ef9400497453c7017d55fedd93.yaml | 58 +++++++++++++++++++ ...b-dp-ab20415721ed085ae618181a838033a3.yaml | 58 +++++++++++++++++++ ...ripe-0187684b30a8dd357634d24962eef6bd.yaml | 58 +++++++++++++++++++ ...ripe-0b81aaa01f44c52b0f6d2c057df8ef8e.yaml | 58 +++++++++++++++++++ ...ripe-1dd78a63fe389dc209197bb2e45c0680.yaml | 58 +++++++++++++++++++ ...ripe-3b50ede48b2cfc5cc49521992d3d9653.yaml | 58 +++++++++++++++++++ ...ized-efd088c138987744c27fa2ae009c995c.yaml | 58 +++++++++++++++++++ ...-tag-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cout-be181067e24f0cdc8c0b449617d32f97.yaml | 58 +++++++++++++++++++ ...pack-127ab045dd12eca20b1f05cdaef8b291.yaml | 58 +++++++++++++++++++ ...pack-21b746fb77ead6544f6c7dbfa1edc718.yaml | 58 +++++++++++++++++++ ...pack-2594adb9a7b091439405e835629ab066.yaml | 58 +++++++++++++++++++ ...pack-38cbe872337aaa11f53f5f047e11de00.yaml | 58 +++++++++++++++++++ ...pack-3ae6c1779315005d2af44a96ee77af2d.yaml | 58 +++++++++++++++++++ ...pack-4281d6cbf86b1cb2ecab3675e42347ac.yaml | 58 +++++++++++++++++++ ...pack-42e7549e05a04879d284fb2372860cb2.yaml | 58 +++++++++++++++++++ ...pack-58678de90c143fa9b35140b23ca7ba6c.yaml | 58 +++++++++++++++++++ ...pack-6db5d1fe8cacae7e42ba1eadc757c2cf.yaml | 58 +++++++++++++++++++ ...pack-761ad1a5f416d5f845100fe45755bedf.yaml | 58 +++++++++++++++++++ ...pack-7832435d7568bbf632e364a36f5e57e1.yaml | 58 +++++++++++++++++++ ...pack-7ee31b33feb435cadd87c62f79cebfe3.yaml | 58 +++++++++++++++++++ ...pack-882bdd3fdb6681642f156a22924c9a36.yaml | 58 +++++++++++++++++++ ...pack-885fb17b6662f56f045b926c01f35175.yaml | 58 +++++++++++++++++++ ...pack-9c19725e7330d8a4aba8b2ac8de32961.yaml | 58 +++++++++++++++++++ ...pack-a2e4cd3309d1f111f649373058fb4d50.yaml | 58 +++++++++++++++++++ ...pack-ab678c0df2a17e9783905e758a6050b6.yaml | 58 +++++++++++++++++++ ...pack-aca759ef038f25525825e47a4ffc724f.yaml | 58 +++++++++++++++++++ ...pack-ae7ec62fe186e1a7a30df795c82f42a1.yaml | 58 +++++++++++++++++++ ...pack-b4d2681789aa51cbc2f0247a1fc077e0.yaml | 58 +++++++++++++++++++ ...pack-bea7c217c1714d6e73035b13fbfa872c.yaml | 58 +++++++++++++++++++ ...pack-bf615bf143d1873d5b3b8d3683682f8b.yaml | 58 +++++++++++++++++++ ...pack-cba7d92a9ae2afc427a931dcb7ec0c7f.yaml | 58 +++++++++++++++++++ ...pack-e3b83c4eb77b086c6d4b79728a8e33f2.yaml | 58 +++++++++++++++++++ ...pack-f2f846fb0dd5d9b11e1e9659c07919f7.yaml | 58 +++++++++++++++++++ ...pack-f7a2331fcfcd2f54c326b52127a157a4.yaml | 58 +++++++++++++++++++ ...pack-f91c2602522656e11d82af368c387634.yaml | 58 +++++++++++++++++++ ...cart-4c6eee0db8572f7bcd30530fa44d18aa.yaml | 58 +++++++++++++++++++ ...sion-a56026625ece44a82e5e6eba005e9ec0.yaml | 58 +++++++++++++++++++ ...pago-792751d76323c735bfedba81a5c362e9.yaml | 58 +++++++++++++++++++ ...pago-9a89bb3aae603e90bebf5f173e16f83b.yaml | 58 +++++++++++++++++++ ...ency-fdd08f1e50818f896e8c8a898740f26b.yaml | 58 +++++++++++++++++++ ...gual-405af1244e8e91b41a724bfd16213a75.yaml | 58 +++++++++++++++++++ ...gual-a3fe0d186555bfccf2ee6cc4060fb41e.yaml | 58 +++++++++++++++++++ ...dons-293d0db4cdca8f446d52a99ed91cf4be.yaml | 58 +++++++++++++++++++ ...kout-3df49792a8ece76a8d711abde91f5cbd.yaml | 58 +++++++++++++++++++ ...rint-b81127029753923b54df2f74db7ead66.yaml | 58 +++++++++++++++++++ ...odes-d43224e006298ab64602bb491da85360.yaml | 58 +++++++++++++++++++ ...fier-ae1b1a51b391401549de89991091def2.yaml | 58 +++++++++++++++++++ ...post-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ents-3c1095436fd6552a40c2bd2c4e117041.yaml | 58 +++++++++++++++++++ ...ents-477398bcb43958a50c7a7519798e0391.yaml | 58 +++++++++++++++++++ ...ents-8f2275f20711e7ff52e234ab96188172.yaml | 58 +++++++++++++++++++ ...ents-b9180b9244a3340bd6331bb97ffb0fd1.yaml | 58 +++++++++++++++++++ ...ents-ce1aa5091f6bad027f616e3d2a1d6732.yaml | 58 +++++++++++++++++++ ...ents-f291a0b96ba11ad5b48df58ad86c38db.yaml | 58 +++++++++++++++++++ ...ents-4f7331e8a3ba4696249e7fcea579fa07.yaml | 58 +++++++++++++++++++ ...plug-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...aisa-a236237c099e41f3f0f40af4eb789d56.yaml | 58 +++++++++++++++++++ ...lips-20e967f496e19df1e9123f3c23d87252.yaml | 58 +++++++++++++++++++ ...lips-300feb509f489660d5d15d529d154d5c.yaml | 58 +++++++++++++++++++ ...lips-682c136fe192ebcfc486e6f937b67fae.yaml | 58 +++++++++++++++++++ ...lips-7e729c66876df948651c9d3837d1f01c.yaml | 58 +++++++++++++++++++ ...lips-822c565b84349831aeea48fc4b498976.yaml | 58 +++++++++++++++++++ ...lips-94f5b565df6f54587e7f38dd2d74f17d.yaml | 58 +++++++++++++++++++ ...lips-c7680f1772f94d4abf62aaaeb8635605.yaml | 58 +++++++++++++++++++ ...lips-f245b6f7ab151ad35769fbe02b21bebd.yaml | 58 +++++++++++++++++++ ...lips-fe9c9963c880e901919af258a30c3298.yaml | 58 +++++++++++++++++++ ...-pos-c5f695dbb7b3e9a0ae3b6a589e6824c0.yaml | 58 +++++++++++++++++++ ...ders-0fc3c475af9db5468072b0d596ac658f.yaml | 58 +++++++++++++++++++ ...ders-32013e3714497eae530c018b20664f08.yaml | 58 +++++++++++++++++++ ...ders-43b4713bd32261291b78f5d694cd58d4.yaml | 58 +++++++++++++++++++ ...ders-7d14368de367a2adadf4a2871484c186.yaml | 58 +++++++++++++++++++ ...ders-875dd3da0012185a61616213c415a5c6.yaml | 58 +++++++++++++++++++ ...arch-8943f00b83bb9af4ef7c839b2bef305e.yaml | 58 +++++++++++++++++++ ...arch-eec24adc2af4f908f31797f26239353a.yaml | 58 +++++++++++++++++++ ...arch-f2d13e82f4916c94ee541da275776204.yaml | 58 +++++++++++++++++++ ...ddon-16c0c6fbe1e44f95ba18add61d515572.yaml | 58 +++++++++++++++++++ ...ddon-1f1d174c2e97694f79432cc5756f8ec3.yaml | 58 +++++++++++++++++++ ...ddon-3385cb8b008c9eac317535d656ebf7b2.yaml | 58 +++++++++++++++++++ ...ddon-3e690c446445b36926062b98d511c3ea.yaml | 58 +++++++++++++++++++ ...ddon-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...ddon-c42befeaabe8cc2f04b4d79fa9968af7.yaml | 58 +++++++++++++++++++ ...ddon-cad557e1501fb237a72952936969ee8d.yaml | 58 +++++++++++++++++++ ...dons-0250c115051a0a19911ae4becfbbb8c8.yaml | 58 +++++++++++++++++++ ...dons-60ae0dd0a6141b106409f50a537c78fa.yaml | 58 +++++++++++++++++++ ...dget-a51a38d55ed23a34d7d068afc04d5742.yaml | 58 +++++++++++++++++++ ...rter-370954cd310380bf196a7af5fabc1594.yaml | 58 +++++++++++++++++++ ...ents-ad492c1cfb90e87fe9d66d5cf28a0298.yaml | 58 +++++++++++++++++++ ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ions-ad4e5ec7c446d0edde1fe1894b44d8fb.yaml | 58 +++++++++++++++++++ ...play-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...play-65c990e02c196c01529c8a603f8098c6.yaml | 58 +++++++++++++++++++ ...lert-e39ea928bd894c6c2a483c3234cd1111.yaml | 58 +++++++++++++++++++ ...lert-e8c2deda009bcec0877e0c00cb99051a.yaml | 58 +++++++++++++++++++ ...dors-2b07cb3c5e7b07e516cdc03a041ab509.yaml | 58 +++++++++++++++++++ ...dors-85987e7f67f649cd4fc002f1b0337124.yaml | 58 +++++++++++++++++++ ...dors-b89386d59e4ac2c68e4b5b1c7b8ceed1.yaml | 58 +++++++++++++++++++ ...dors-c1ee2d06e4183c51b8ff1009cad4dc30.yaml | 58 +++++++++++++++++++ ...dors-c7798079a12ba87e21be5abb7f463202.yaml | 58 +++++++++++++++++++ ...dors-d7d028793891883b49da58d28555fdb8.yaml | 58 +++++++++++++++++++ ...dors-d801fbca464a51e293e83c92692f388d.yaml | 58 +++++++++++++++++++ ...dors-de80de004725b03b45137b9eba24ca0e.yaml | 58 +++++++++++++++++++ ...dors-e78a0243a637937a0520333d07ecbb4e.yaml | 58 +++++++++++++++++++ ...gner-9d44943de528e08b2e8164cbb922f935.yaml | 58 +++++++++++++++++++ ...lter-0a19ecfdd9174c31fe37388d883b8078.yaml | 58 +++++++++++++++++++ ...lter-174314b50918543554df901d90f75335.yaml | 58 +++++++++++++++++++ ...lter-2662479a714ea06abb48b0b84a949600.yaml | 58 +++++++++++++++++++ ...lter-4d5b5eea5b0d303e259444505b764438.yaml | 58 +++++++++++++++++++ ...lter-57308f16648d2cd63200f80e8b82615f.yaml | 58 +++++++++++++++++++ ...lter-745b890d4e4ab266ecb625f54f34190e.yaml | 58 +++++++++++++++++++ ...lter-b127fca718a0b357c2daf67816c8cec2.yaml | 58 +++++++++++++++++++ ...lter-d449c0063627e88ef77e8f2a6b150e88.yaml | 58 +++++++++++++++++++ ...lter-d97caddab7bd05fd7de5182cc29d4629.yaml | 58 +++++++++++++++++++ ...lter-dbbbee37e25f2954b72ee20a77edf10c.yaml | 58 +++++++++++++++++++ ...lter-f93c186c199b2993e134631be68ea0a1.yaml | 58 +++++++++++++++++++ ...lter-fc942581b6d806c7e158aaa084482451.yaml | 58 +++++++++++++++++++ ...view-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...view-666b088d7e486f0731500dc6b44206fb.yaml | 58 +++++++++++++++++++ ...ider-333375d8287e28edefeeceeb32f12475.yaml | 58 +++++++++++++++++++ ...ider-b143f95f119acbc330075f594bca9125.yaml | 58 +++++++++++++++++++ ...ctor-0c5c03e535c02675bf0d5fbe19ae065d.yaml | 58 +++++++++++++++++++ ...ctor-cb9adf9824210ad3d3e7d6f714b65556.yaml | 58 +++++++++++++++++++ ...tion-a4d2edadf2ab61a5bc7487773709b53f.yaml | 58 +++++++++++++++++++ ...ices-4f8b1165a8fd4674c47b694bb6769361.yaml | 58 +++++++++++++++++++ ...post-38e07b44fffc0387d1db0b5b701e8767.yaml | 58 +++++++++++++++++++ ...post-df5510828b9908f177a3676bf0d29efa.yaml | 58 +++++++++++++++++++ ...duct-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sses-2fa400cde48ebbb1e062c53ea041ad86.yaml | 58 +++++++++++++++++++ ...sses-a044d35c75736c87fd061116f4c5b4e5.yaml | 58 +++++++++++++++++++ ...sses-c19f8aaf85e78b37bfb8827bc7a43d0f.yaml | 58 +++++++++++++++++++ ...sses-d3e334361801ef90de8fcb6bd64767c5.yaml | 58 +++++++++++++++++++ ...sses-fd721cac9b419bce8f15888dfbaef077.yaml | 58 +++++++++++++++++++ ...duct-40b2ce035ef569465fd6e4b21f17410c.yaml | 58 +++++++++++++++++++ ...tion-806f7834f371ee46a5b9d44d9bbedb5e.yaml | 58 +++++++++++++++++++ ...pons-57a83ff4d8f574921eb2f0df37539660.yaml | 58 +++++++++++++++++++ ...tons-3cf6e0cef1945cb6c17b1720f47371b0.yaml | 58 +++++++++++++++++++ ...uare-249dbfd7183b6684ad412dc7f00e598b.yaml | 58 +++++++++++++++++++ ...ager-738d94ad59cff1e1ce944d9227e0e807.yaml | 58 +++++++++++++++++++ ...ager-814789c90e4385b5926fdbf0791f6c8c.yaml | 58 +++++++++++++++++++ ...ager-febc39f061d4ea440e6c2d9bf3acdb4c.yaml | 58 +++++++++++++++++++ ...lkit-22e18aac0c8974a11f388cc18919e7ec.yaml | 58 +++++++++++++++++++ ...lkit-6604e9811397b340324d84776057ca87.yaml | 58 +++++++++++++++++++ ...lkit-a07726826b94a32080195c3e79a97baf.yaml | 58 +++++++++++++++++++ ...lkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ions-38d794189585526f4580cbcbd32cd51a.yaml | 58 +++++++++++++++++++ ...ions-5d14f17d0a9567bc2e5e172cd96c2e2f.yaml | 58 +++++++++++++++++++ ...ions-825cedb504a9d0b999d8eff2bf66435d.yaml | 58 +++++++++++++++++++ ...ions-c710e29aeb4a754ea209ddfa89b2e510.yaml | 58 +++++++++++++++++++ ...ions-f9c4b5a4e9087a30d794272cce966354.yaml | 58 +++++++++++++++++++ ...tura-c713f885667125d83707da22fe966bb2.yaml | 58 +++++++++++++++++++ ...duct-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...iles-82ad20df19b26c5e50cfbeea380e1cf4.yaml | 58 +++++++++++++++++++ ...urns-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...anty-17db65035566800d21b599e4302d577c.yaml | 58 +++++++++++++++++++ ...anty-90191aff4f4fd94ead6048a6f9309bb7.yaml | 58 +++++++++++++++++++ ...anty-ac9e437a3a3be183da02189f782c1fad.yaml | 58 +++++++++++++++++++ ...anty-d1c23493ccad67b72beabba59496692f.yaml | 58 +++++++++++++++++++ ...ices-6d6e0436ccffe0043617b48128024cf4.yaml | 58 +++++++++++++++++++ ...ices-ea695aba033f5eaa6e1bbebc4ad1cb3b.yaml | 58 +++++++++++++++++++ ...ices-f863836bfdeb95471721235ad3d4953e.yaml | 58 +++++++++++++++++++ ...cing-a0de754d48741e450291ec842fdf7fcc.yaml | 58 +++++++++++++++++++ ...cing-f5210926c29e7df2401ce419d82b4fb7.yaml | 58 +++++++++++++++++++ ...lite-90a621b8b64ebeedf4e6b4f1f9506dab.yaml | 58 +++++++++++++++++++ ...izer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ents-11d5ca6aae21b29aac64f7355ab7d838.yaml | 58 +++++++++++++++++++ ...ents-1dbd0f5d4eba498d79dffc911453625c.yaml | 58 +++++++++++++++++++ ...core-32a5c2fd9daa910750906c2719426827.yaml | 58 +++++++++++++++++++ ...core-e297cccd68c340cc70a93b54e4b06686.yaml | 58 +++++++++++++++++++ ...port-b8484e4bbe43b173d4b67998a26e2ce3.yaml | 58 +++++++++++++++++++ ...ding-1cab07c4811f7b84831ca9fc37bca8af.yaml | 58 +++++++++++++++++++ ...eaks-9657eccbcacadfd84a104020a1ba720f.yaml | 58 +++++++++++++++++++ ...kout-211b4e2e29da3a6c7a3f6f46fc11c764.yaml | 58 +++++++++++++++++++ ...kout-3553b5d538c18918d9dc4a1b5515d805.yaml | 58 +++++++++++++++++++ ...kout-a3e402dfd0b7363889b8931013656dea.yaml | 58 +++++++++++++++++++ ...dons-00621ef6c76184f88ccca1414d74fac7.yaml | 58 +++++++++++++++++++ ...dons-092f1fde35361407c0c7db51482b885d.yaml | 58 +++++++++++++++++++ ...dons-0affc1d09cec859aeeea9abdfeb1c7b6.yaml | 58 +++++++++++++++++++ ...dons-2f369022c90ab11184f498c7e18175e1.yaml | 58 +++++++++++++++++++ ...dons-7c425cf580174869d5b1f033a9941ff6.yaml | 58 +++++++++++++++++++ ...dons-925ecf8dc9bb2b2baefb9be7dfe4e0e0.yaml | 58 +++++++++++++++++++ ...dons-9d840efd84947ddae0da773e8bea6c66.yaml | 58 +++++++++++++++++++ ...dons-a09c2c9abc79ca137e522820700cc3d7.yaml | 58 +++++++++++++++++++ ...dons-bd64f1f16c4920e8819a833f00007e5e.yaml | 58 +++++++++++++++++++ ...dons-c4fa40659d43973eb06846ab990bf0bc.yaml | 58 +++++++++++++++++++ ...dons-e2e16530577d94aba470c5d11e9df874.yaml | 58 +++++++++++++++++++ ...dons-f19b67578553b4899e4857d2a0013f9e.yaml | 58 +++++++++++++++++++ ...otiv-fb36175cd4f9026269e4e65b050f0b1c.yaml | 58 +++++++++++++++++++ ...opra-4e90b64e5c0880980f44418deca3c91b.yaml | 58 +++++++++++++++++++ ...opra-aa8c984fec41bb48489f399f6ec63ef2.yaml | 58 +++++++++++++++++++ ...rter-b55a13d9b3421679e7e8eb49d23be81c.yaml | 58 +++++++++++++++++++ ...ards-9d13f1d3852ef39a0de552cc88d8fec7.yaml | 58 +++++++++++++++++++ ...tent-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lder-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...sell-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-bar-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...rter-362d3676648172fe24d0a4f6ea7f422f.yaml | 58 +++++++++++++++++++ ...rter-b2a85d8fd51446e550fee890b46b39fe.yaml | 58 +++++++++++++++++++ ...ping-d9f05f56ca3567e886c01941a461d782.yaml | 58 +++++++++++++++++++ ...bars-354dafbbd9f0f8346bf3ecdcdb25b186.yaml | 58 +++++++++++++++++++ ...rter-209b59f9f6a6704c1242005d050454d8.yaml | 58 +++++++++++++++++++ ...erce-9cbc81546b21a100994e807b3ec7d261.yaml | 58 +++++++++++++++++++ ...uare-19746aa654bdce1c5c57da933bb299ae.yaml | 58 +++++++++++++++++++ ...uare-63a838c07fa7f4dbcc749cd4ec305acf.yaml | 58 +++++++++++++++++++ ...uare-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rary-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...rary-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...rary-bf6365dff081103c217daff8833cbf80.yaml | 58 +++++++++++++++++++ ...pply-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...wipe-e20e9bcb00e5e945a6bb2c24c79d65cf.yaml | 58 +++++++++++++++++++ ...ello-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ovip-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...llet-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...zone-605a67411fb1b4e46eb2a9b231a35b01.yaml | 58 +++++++++++++++++++ ...zone-854e0c6e8605c626361126b016b08a27.yaml | 58 +++++++++++++++++++ ...zone-9fc89469f8a530afdf83c67ae386fe4e.yaml | 58 +++++++++++++++++++ ...zone-c9f6ba5dc3a76ccaf9e57d79e18e6ca4.yaml | 58 +++++++++++++++++++ ...zone-e261de97ae518fadfa674900f6884131.yaml | 58 +++++++++++++++++++ ...zone-e2b6dedf58550635a9af3b0cb010148d.yaml | 58 +++++++++++++++++++ ...loon-367b7f8831e5629ea2336d98cf86a14a.yaml | 58 +++++++++++++++++++ ...loon-a3cc2155590ae1415e931b5fb88c4ba6.yaml | 58 +++++++++++++++++++ ...ltra-82ccd5e1aeac71fd905aec731ee6d6b0.yaml | 58 +++++++++++++++++++ ...ltra-ca80be8d82d9f4b7b474971b5f658d56.yaml | 58 +++++++++++++++++++ ...able-3161964a915ebff8fbd41c85d4b1281d.yaml | 58 +++++++++++++++++++ ...dapp-755ac9508c7a76c31cd7d0edf80b8b6e.yaml | 58 +++++++++++++++++++ ...alks-7a96e3ef8700d304a9dfa367fee4cef2.yaml | 58 +++++++++++++++++++ ...ence-058c5e78b9996f732b9318d662c631ea.yaml | 58 +++++++++++++++++++ ...ence-0b892f42133b0cde6baf163046912807.yaml | 58 +++++++++++++++++++ ...ence-123ae05dae80d93502cd649f5ec1d55b.yaml | 58 +++++++++++++++++++ ...ence-20a5446793c82d7b30a3e33ca0d2737f.yaml | 58 +++++++++++++++++++ ...ence-2be64cfcc4c65cd88d9acc6ffb63f29d.yaml | 58 +++++++++++++++++++ ...ence-2fe978140d6bb192dbe8f6347a246620.yaml | 58 +++++++++++++++++++ ...ence-3c3ca8f76126413596e767724c529582.yaml | 58 +++++++++++++++++++ ...ence-59e1a99c9f0b45a9f6f61c16b82c38c9.yaml | 58 +++++++++++++++++++ ...ence-5af88d26b08538821fbf3df9c9788c30.yaml | 58 +++++++++++++++++++ ...ence-5feccb7307b20851729f7d1fe5c16402.yaml | 58 +++++++++++++++++++ ...ence-6e3aec88bbc3b7a8585b22a385ae7c31.yaml | 58 +++++++++++++++++++ ...ence-aaccf9d8425eddd13e4ac4f8c70f1e50.yaml | 58 +++++++++++++++++++ ...lift-4626cb693582f4ef4c3fd754ef5fda3a.yaml | 58 +++++++++++++++++++ ...ugin-0a3943b43f76d9a29800828b188b084b.yaml | 58 +++++++++++++++++++ ...ugin-c52e6603b19e1ddbfb9c023a9a70f51b.yaml | 58 +++++++++++++++++++ ...trol-6ab743a2d3b53689e8dd020c482ecaf3.yaml | 58 +++++++++++++++++++ ...ager-8fd44c63d94c422a14e4d5e118df7d97.yaml | 58 +++++++++++++++++++ ...pbox-5ae574c1617e1bfbc92584f8f9bebe8c.yaml | 58 +++++++++++++++++++ ...kout-7a57451a1f089e6fb01f4c4c10c089ef.yaml | 58 +++++++++++++++++++ ...sole-97c1ceb18f16975e668ed8d0bd718768.yaml | 58 +++++++++++++++++++ ...dget-0c91dc81841b4946dcdd188b1f4f59d9.yaml | 58 +++++++++++++++++++ ...dget-475773ebaa71f55189abb950928342c8.yaml | 58 +++++++++++++++++++ ...dget-a672faba2cf5fa34711e0d654497c3c5.yaml | 58 +++++++++++++++++++ ...ctor-004a45b0040859f9d7a9047f0ccf10be.yaml | 58 +++++++++++++++++++ ...eset-93f8396aa2e225fac63eb4694d99073e.yaml | 58 +++++++++++++++++++ ...eset-eb85d378289992deb2bdae8ab06df635.yaml | 58 +++++++++++++++++++ ...eset-f4aa3f1d5ea67fd4f48e9da5d1dfcb26.yaml | 58 +++++++++++++++++++ ...ugin-b86559278d78c8a80909bf3088ee795a.yaml | 58 +++++++++++++++++++ ...ugin-c10b1142778769e9493bfb35c88879e4.yaml | 58 +++++++++++++++++++ ...erce-5245595392095b6ab4fe76ec4a372258.yaml | 58 +++++++++++++++++++ ...lite-31081287c88cb43d85e54ce23366ff88.yaml | 58 +++++++++++++++++++ ...lite-3b6f736b0a47011b88af56143e4fb668.yaml | 58 +++++++++++++++++++ ...tics-53e4fc6f46b4ed911de81fb486aade37.yaml | 58 +++++++++++++++++++ ...tics-de270735c8bc70be908d067be8516116.yaml | 58 +++++++++++++++++++ ...itor-573f32cd1b90d92ebe8ccd29c90cebc9.yaml | 58 +++++++++++++++++++ ...-pro-12fc948c06bbe2558fcf0a602f5f480e.yaml | 58 +++++++++++++++++++ ...-pro-6bee4ceb90dc1010814fe03431f27200.yaml | 58 +++++++++++++++++++ ...-pro-7723e642214a4cc19dd0a90f922c5611.yaml | 58 +++++++++++++++++++ ...ll-2-82484b577e47d68881c7ffa118db364c.yaml | 58 +++++++++++++++++++ ...ader-c25ccd4ececc7e49a3a30276bcef3c5c.yaml | 58 +++++++++++++++++++ ...ager-19a0491cf914c310a86ae542abd14b9a.yaml | 58 +++++++++++++++++++ ...ugin-757461bd55fd10188ca28b32819858c1.yaml | 58 +++++++++++++++++++ ...tion-352ac8649ed0ca01e334a505a5c69503.yaml | 58 +++++++++++++++++++ ...gdpr-8d35451021499279a9a8ae84e508d492.yaml | 58 +++++++++++++++++++ ...gdpr-fcc5426738caa36fef03b50110efc0b4.yaml | 58 +++++++++++++++++++ ...ttps-0f5a748a6662b40f3b68d87419a0f759.yaml | 58 +++++++++++++++++++ ...feed-81a1379b5306a9cfccfcaaf08bd3abdb.yaml | 58 +++++++++++++++++++ ...uage-a96c597219ed29fc68772417c5a3093c.yaml | 58 +++++++++++++++++++ ...tion-06202f5e4de9fb07c515215afeba85ee.yaml | 58 +++++++++++++++++++ ...bots-f1ed96d1b2d98c3026e1dd704ae2087a.yaml | 58 +++++++++++++++++++ ...pack-6e0d2cdfe1ad1668438fc68f481cce1d.yaml | 58 +++++++++++++++++++ ...pack-860afca6e31101e845f00131fa4002f8.yaml | 58 +++++++++++++++++++ ...pack-961d82f12e20011650e9c4bbef7df9eb.yaml | 58 +++++++++++++++++++ ...sync-438cf6d09d279a07d988d54f0a418a95.yaml | 58 +++++++++++++++++++ ...view-64d1005014509c77d54b45b09764489b.yaml | 58 +++++++++++++++++++ ...view-8517e4991bb30bbf1e9448cc624f7284.yaml | 58 +++++++++++++++++++ ...izer-2760701a1ef8db138bc19b206575f1f8.yaml | 58 +++++++++++++++++++ ...izer-6b5c7dbafc7933afc0d5047343324578.yaml | 58 +++++++++++++++++++ ...tion-1bd642d2e3ff9973b88e9924e704fbb7.yaml | 58 +++++++++++++++++++ ...osts-05a7a0498d570dab847e4a9ab6951cdd.yaml | 58 +++++++++++++++++++ ...osts-178d99b6f6579f15b7e84dce26c43816.yaml | 58 +++++++++++++++++++ ...osts-93d2bfa4a5e5debcba57e4ef188367d5.yaml | 58 +++++++++++++++++++ ...osts-9912c297cff35bf8bf01c7b24d0db7f5.yaml | 58 +++++++++++++++++++ ...osts-b56b584c99468f4e887375bc7db1f73b.yaml | 58 +++++++++++++++++++ ...osts-c4493263837f30eb253dcd6ff28e47dc.yaml | 58 +++++++++++++++++++ ...opup-38f6be428d034f5c009a03a3e9513d4f.yaml | 58 +++++++++++++++++++ ...opup-a5647b646e9ca22a1d24f5022994a6b7.yaml | 58 +++++++++++++++++++ ...opup-a9d45b4a14ad045ecea1bcd26aa66e30.yaml | 58 +++++++++++++++++++ ...mbed-336c529affe134c8a71f1e7879ec0dcb.yaml | 58 +++++++++++++++++++ ...inel-3d4fded5713d977453c4246e8903bc20.yaml | 58 +++++++++++++++++++ ...inel-909fb52910e98c1692077a1c3b14b033.yaml | 58 +++++++++++++++++++ ...inel-aeea609833832e1baa1f0bd27367ec6d.yaml | 58 +++++++++++++++++++ ...-seo-0cab757218d53679bf548112d251d15c.yaml | 58 +++++++++++++++++++ ...-seo-307e49126b500d4032b9dda6877b05b0.yaml | 58 +++++++++++++++++++ ...-seo-3bbe5a341cf1e072236bafa671320c7b.yaml | 58 +++++++++++++++++++ ...-seo-3ea36d65c6ea5b35072fe01e09307dfa.yaml | 58 +++++++++++++++++++ ...-seo-4a0b4f088a324947da6aaf5af5ea450e.yaml | 58 +++++++++++++++++++ ...-seo-5b5b01b1109744d37f0c0118833ce729.yaml | 58 +++++++++++++++++++ ...-seo-5e0b93fe3a022a24343b38fe5a2f7283.yaml | 58 +++++++++++++++++++ ...-seo-729af181e052b537a824f590788c4026.yaml | 58 +++++++++++++++++++ ...-seo-828cafaa2f518b65826b98ac79418f2d.yaml | 58 +++++++++++++++++++ ...-seo-a3fa83da79405e5abf7cb2c0fd1ed37b.yaml | 58 +++++++++++++++++++ ...-seo-c4ae1764980f5453e8096a0bd6623d73.yaml | 58 +++++++++++++++++++ ...-seo-e132f1944facf59d50c4939f26f4d93f.yaml | 58 +++++++++++++++++++ ...-seo-ec23ceaa5e6474fc50d6e6ec68c64eb6.yaml | 58 +++++++++++++++++++ ...-seo-edb5aff062fcd8aac278362a1ce01bce.yaml | 58 +++++++++++++++++++ ...-seo-faaf1948155c5f302388ba2e8f465a89.yaml | 58 +++++++++++++++++++ ...mium-4b1052f9f0f7a36afef9bbca9c94d0af.yaml | 58 +++++++++++++++++++ ...cart-02744bc958048e60b6fe8becee3f2311.yaml | 58 +++++++++++++++++++ ...cart-6b95e055e3edeffca7582f29e2098070.yaml | 58 +++++++++++++++++++ ...cart-9a4d0d65ff4983f3b672d24a253f60cd.yaml | 58 +++++++++++++++++++ ...cart-d8a3146b821fb343fd351d5a10339bc8.yaml | 58 +++++++++++++++++++ ...-box-00010ebed83feef9acaee37ee3019824.yaml | 58 +++++++++++++++++++ ...ogin-40cf6c93cbbc13dcb57a60ba2f57fb5f.yaml | 58 +++++++++++++++++++ ...ogin-710e5bb2b38338950e0e2ed07d09069e.yaml | 58 +++++++++++++++++++ ...ogin-adeb22f24ece0b4bc846eeeff12f100f.yaml | 58 +++++++++++++++++++ ...ogin-e0d816c541690f9c52144ee19295acfb.yaml | 58 +++++++++++++++++++ ...ring-62254c40802e5286c6fd0b29e99ea8df.yaml | 58 +++++++++++++++++++ ...ides-b256004910fed4c7647ff561ae5de5c8.yaml | 58 +++++++++++++++++++ ...lbar-5d23bca1d1789e21db9aa8a0def5c93b.yaml | 58 +++++++++++++++++++ ...tips-166d139550be5e578382c81fd839bb55.yaml | 58 +++++++++++++++++++ ...tips-68662c1466a6ef85961a45678881f8c7.yaml | 58 +++++++++++++++++++ ...tips-8904938c0e9840b0a2511b1de74ee529.yaml | 58 +++++++++++++++++++ ...rbot-773ba4639bef3a2cc4abde5ded928895.yaml | 58 +++++++++++++++++++ ...sers-41da9a8fbffc2a03fc19ba494b850b3a.yaml | 58 +++++++++++++++++++ ...sers-4944da448643beff513f9225eb7219f0.yaml | 58 +++++++++++++++++++ ...arch-bd7b626f96c68af8d6a9ffc833f69a62.yaml | 58 +++++++++++++++++++ ...arch-e7674c99987b6c4c7435d1f976b8d7fb.yaml | 58 +++++++++++++++++++ ...rezi-a32e0707f724d294df7bedd19626586f.yaml | 58 +++++++++++++++++++ ...spew-cd4550e19ad68ff40f21b1f3220a5912.yaml | 58 +++++++++++++++++++ ...humb-b970262dad30a7d484efebc698a4fbb7.yaml | 58 +++++++++++++++++++ ...tube-95162b6c7bf303f9400020b8a2a23185.yaml | 58 +++++++++++++++++++ ...tube-d61196f45e716711cfb53207a0939fc2.yaml | 58 +++++++++++++++++++ ...load-b450a44aefe31f7479f070620cd005a5.yaml | 58 +++++++++++++++++++ ...load-b6c3a1e30e85d38e350b01bfe2c5f9b5.yaml | 58 +++++++++++++++++++ ...rker-9869e7dbba52086c75e55654db902ff3.yaml | 58 +++++++++++++++++++ ...core-295565d6c00c49b75df12a1f75ae3147.yaml | 58 +++++++++++++++++++ ...able-d94ecce4e6207ecfb48491b051e2c22d.yaml | 58 +++++++++++++++++++ ...tion-feb69abbe38ff9a6a9b07a48bdd2d2c8.yaml | 58 +++++++++++++++++++ ...read-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...read-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...lite-046715d681a1f3005e1ea96f6c71e30f.yaml | 58 +++++++++++++++++++ ...stro-06578949edf7886954089bf5ea02f690.yaml | 58 +++++++++++++++++++ ...-2fa-01aeea137ad62c07f9208d787662a3f3.yaml | 58 +++++++++++++++++++ ...-2fa-2becdaea6cfb27f349b62f01ae364f94.yaml | 58 +++++++++++++++++++ ...-2fa-2cdb07f7994925a2e6c4e7d56439a615.yaml | 58 +++++++++++++++++++ ...-2fa-35260dcdba60bfeb24022f0e25251913.yaml | 58 +++++++++++++++++++ ...-2fa-4ff6298b795b2324bce636d08965d81d.yaml | 58 +++++++++++++++++++ ...-2fa-681ba8b639ed4b20d46dc5044edc1ee3.yaml | 58 +++++++++++++++++++ ...-2fa-c057e704d00bbfb4a8d170d3b72c040a.yaml | 58 +++++++++++++++++++ ...ator-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...show-9c37c1dadae3a910f37cc6fe2a02a906.yaml | 58 +++++++++++++++++++ ...post-aab17c6b24a2dfba03255d9a47e0c674.yaml | 58 +++++++++++++++++++ ...post-bdbbe04b17b8a1ca6597cc1e008085c0.yaml | 58 +++++++++++++++++++ ...post-e213c95c0a4a994ef52b0b98d3d99e14.yaml | 58 +++++++++++++++++++ ...ager-0f680b0fba849d5d9ea4bc12dadd3c2e.yaml | 58 +++++++++++++++++++ ...ager-de1f04792375136ec89153b76014f079.yaml | 58 +++++++++++++++++++ ...ager-fbf758a644d0a5c8124110ba01ca9800.yaml | 58 +++++++++++++++++++ ...ople-52128069b8783cc721b252c69306747a.yaml | 58 +++++++++++++++++++ ...lity-ad7eb7a1c6f0dd20fda9c7137924de5c.yaml | 58 +++++++++++++++++++ ...lper-3be3a9644337351c7a40dbeb1dd937c1.yaml | 58 +++++++++++++++++++ ...lper-6194829f785c406e2e428c86316d96c5.yaml | 58 +++++++++++++++++++ ...lper-bd68d113848e70b56a089eb9f2977075.yaml | 58 +++++++++++++++++++ ...work-17cbc81bfbd2835ea082db7b23dfca8c.yaml | 58 +++++++++++++++++++ ...work-8fe65facf4fd0cb40e8b7fae00de182d.yaml | 58 +++++++++++++++++++ ...asic-33ab7e0d75c2ed6bd56f09ac49100c0b.yaml | 58 +++++++++++++++++++ ...nger-410921c5c60a1f559b97b16f075ad4ff.yaml | 58 +++++++++++++++++++ ...nter-b82cc40f758ba3c73375abdf46eafb06.yaml | 58 +++++++++++++++++++ ...tyle-04d32a3642a2c96352c83010608db77d.yaml | 58 +++++++++++++++++++ ...mize-d5f34e92eea10518421633a7bf6a6987.yaml | 58 +++++++++++++++++++ ...ment-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...rter-59ca924932c6a0bc7545937f3874e3e1.yaml | 58 +++++++++++++++++++ ...arch-5c6787fa63866ceaebca40b1eb3f19f3.yaml | 58 +++++++++++++++++++ ...arch-84ddf5342f72d908358cc5325eb7e319.yaml | 58 +++++++++++++++++++ ...arch-a4635161f2aa6600f48d00dc0b0a15b3.yaml | 58 +++++++++++++++++++ ...arch-e8896aaa278ff92ff4eab642f544ea11.yaml | 58 +++++++++++++++++++ ...sure-78aa7f4c0fd135cd902e3c93c245e07f.yaml | 58 +++++++++++++++++++ ...sure-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sure-c87c4ea28269200455ab4fe854f72ca0.yaml | 58 +++++++++++++++++++ ...sure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...inks-7a21d7c86e8ebeab0cea551daecba3fc.yaml | 58 +++++++++++++++++++ ...form-9760015c4d350e201fad6b9179af7df3.yaml | 58 +++++++++++++++++++ ...form-9d26ce45ae3e2b9cd30cf1aaa62ddd92.yaml | 58 +++++++++++++++++++ ...form-d9821340f78ed9354be13076604f5c91.yaml | 58 +++++++++++++++++++ ...form-f655053c752606f8cf271b5e2d50d49f.yaml | 58 +++++++++++++++++++ ...ider-5f97cab1c787955760a43df34e0be9d5.yaml | 58 +++++++++++++++++++ ...ider-bbbfb24fae80d53d9d732dd1134e3189.yaml | 58 +++++++++++++++++++ ...ckup-8616428f32a57e2652dd917dc2c90d74.yaml | 58 +++++++++++++++++++ ...port-1ab755d3e95de25c386caeb2d042c3d1.yaml | 58 +++++++++++++++++++ ...port-3e761f82934df2ab4021a24d8a5d3f17.yaml | 58 +++++++++++++++++++ ...port-54815dfa4753d9cdf9883b354532f577.yaml | 58 +++++++++++++++++++ ...port-a04852934ccd4497c8403afda3917aa6.yaml | 58 +++++++++++++++++++ ...port-c1088d4a7272923461f43cf76023c143.yaml | 58 +++++++++++++++++++ ...port-ddbeec70f5c8cc5ed33b819f003e57b0.yaml | 58 +++++++++++++++++++ ...-pro-3e761f82934df2ab4021a24d8a5d3f17.yaml | 58 +++++++++++++++++++ ...-pro-54815dfa4753d9cdf9883b354532f577.yaml | 58 +++++++++++++++++++ ...-pro-92aa647881d350b340f99ec0dcdafcc3.yaml | 58 +++++++++++++++++++ ...-pro-a04852934ccd4497c8403afda3917aa6.yaml | 58 +++++++++++++++++++ ...-pro-c8d77620d025f09aeefa4638ee5b37e1.yaml | 58 +++++++++++++++++++ ...port-23f6ba2f9c75b4517345ed804d2e1ff6.yaml | 58 +++++++++++++++++++ ...port-490b87f43f2fe349a60db708b8fdfe27.yaml | 58 +++++++++++++++++++ ...port-54d38a1874377a19e755c0dd341fe745.yaml | 58 +++++++++++++++++++ ...port-5b6052811294a634af9b6d15efbb8d49.yaml | 58 +++++++++++++++++++ ...port-5fbee904a26db0083f1a4d8da7695a16.yaml | 58 +++++++++++++++++++ ...port-6542eb9293767f9620f37e7f59fd2a40.yaml | 58 +++++++++++++++++++ ...port-655d94e53e4a588a8f5f35013abd45f6.yaml | 58 +++++++++++++++++++ ...port-6e8d8a68dd9873805b5f71eb69761022.yaml | 58 +++++++++++++++++++ ...port-7f5752064f65cad24bb5910cabcdce74.yaml | 58 +++++++++++++++++++ ...port-81844f67a8cb300bf38ea9c090e351aa.yaml | 58 +++++++++++++++++++ ...port-8b209ab2ce1916ae647e2542cfaaa488.yaml | 58 +++++++++++++++++++ ...port-8f60c3b6446189e3058b9237676dd33f.yaml | 58 +++++++++++++++++++ ...port-aed64fd523c0d1b492fdf86a110cd8b5.yaml | 58 +++++++++++++++++++ ...port-c459c6390d6920d9836ff6f1ec3a05e1.yaml | 58 +++++++++++++++++++ ...port-d244aad713442e8917ed457759893c6e.yaml | 58 +++++++++++++++++++ ...port-dcb0952ba59e4cf6e5088fb4c3d3565e.yaml | 58 +++++++++++++++++++ ...port-e69997328ca18e69bd3343eedbb036ad.yaml | 58 +++++++++++++++++++ ...port-ea7f76443ee4f847f0d00da3e01a11a3.yaml | 58 +++++++++++++++++++ ...-pro-23f6ba2f9c75b4517345ed804d2e1ff6.yaml | 58 +++++++++++++++++++ ...-pro-5b6052811294a634af9b6d15efbb8d49.yaml | 58 +++++++++++++++++++ ...-pro-5fbee904a26db0083f1a4d8da7695a16.yaml | 58 +++++++++++++++++++ ...-pro-81844f67a8cb300bf38ea9c090e351aa.yaml | 58 +++++++++++++++++++ ...-pro-a9e3662a53271551df51fdd8b8a5f31b.yaml | 58 +++++++++++++++++++ ...-pro-df4cc539ef140fa3859e0e46cb3bb0b2.yaml | 58 +++++++++++++++++++ ...shop-5595c7f205cd9ae7c0c1e3237881d78f.yaml | 58 +++++++++++++++++++ ...shop-90f8bc64469472ae0cd3174d5b6a7976.yaml | 58 +++++++++++++++++++ ...-amo-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...tify-4570eda0c03b7f7b441d2c3a25dcd80e.yaml | 58 +++++++++++++++++++ ...tify-66b6d0074514ae9bf7d808b0d7b9a6e2.yaml | 58 +++++++++++++++++++ ...tify-70ab06ad0d2802465de5c71330534e85.yaml | 58 +++++++++++++++++++ ...tify-899a0dde0ba2e19723247e16c93f4325.yaml | 58 +++++++++++++++++++ ...tify-8fa6b82859e5d82c0a64a9973f57957b.yaml | 58 +++++++++++++++++++ ...tify-d12af8e80ae1c421ffa919ff53dc2e47.yaml | 58 +++++++++++++++++++ ...tify-d2645755bf5586970e23e1757a9c7bfe.yaml | 58 +++++++++++++++++++ ...tify-f76c0706f43a6aad759753a6e61a5e5f.yaml | 58 +++++++++++++++++++ ...ider-aaaf4480d575f84ecd3c01a63e4a0287.yaml | 58 +++++++++++++++++++ ...arat-098bdb5ff12e782e87bacda8082a6346.yaml | 58 +++++++++++++++++++ ...aker-2b14d8058c7a99881803f353bd15c8bf.yaml | 58 +++++++++++++++++++ ...pbox-7765fb8469b9b88a34d6b432871e62d3.yaml | 58 +++++++++++++++++++ ...pbox-e587e1665fb732b10014cf1110ac13b4.yaml | 58 +++++++++++++++++++ ...stem-041adfd3c39d4b3580e02b6803d8c84d.yaml | 58 +++++++++++++++++++ ...ules-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml | 58 +++++++++++++++++++ ...n-up-157e1680396fa809586b361348ce2314.yaml | 58 +++++++++++++++++++ ...n-up-16b8fc2e25c46e7423213d8067c33e6d.yaml | 58 +++++++++++++++++++ ...n-up-5a7f7124402fcdd1661001779df0ff58.yaml | 58 +++++++++++++++++++ ...n-up-7caff55cfec661a72791dee0bee83561.yaml | 58 +++++++++++++++++++ ...tics-3b9b22b591de089c72309692f7ac4907.yaml | 58 +++++++++++++++++++ ...tics-6a4f3e2a82b7793dde5ce79a450d31bf.yaml | 58 +++++++++++++++++++ ...port-512d60f62525369cb1c0a614152e673f.yaml | 58 +++++++++++++++++++ ...ents-607d97f75ca23282557e4dc2fc682915.yaml | 58 +++++++++++++++++++ ...ents-bb80630c4629833cfa0b6983a79076e1.yaml | 58 +++++++++++++++++++ ...ents-d368d355a42efc82f9add75ee0c1d079.yaml | 58 +++++++++++++++++++ ...test-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...inks-0f1369367add235ed7f30ce397da16e3.yaml | 58 +++++++++++++++++++ ...inks-30897ef76876a3c79e7909e7acb376e5.yaml | 58 +++++++++++++++++++ ...inks-599f329db78aa16926991b18378d93d9.yaml | 58 +++++++++++++++++++ ...inks-5a61a27c8209633543dc7131ccce0c7b.yaml | 58 +++++++++++++++++++ ...inks-a3e119e35f3f29987c194ca1040f096b.yaml | 58 +++++++++++++++++++ ...inks-ade8d23b5006403a0ff80adcff26f453.yaml | 58 +++++++++++++++++++ ...inks-b84aaa0eb34e70d57406b1fb31a3db1e.yaml | 58 +++++++++++++++++++ ...inks-d7c92809e4625ed3fe6e7ee1f56c18ee.yaml | 58 +++++++++++++++++++ ...inks-e4074964cc7b7dad2faeab0f0074d7ea.yaml | 58 +++++++++++++++++++ ...lish-83c485f2e43507746d6f598a094e8632.yaml | 58 +++++++++++++++++++ ...lish-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...atic-47dfd7659803e2a498c5473e1e3ec44c.yaml | 58 +++++++++++++++++++ ...atic-652fe9285b64528e4143d85b4b2dc5a1.yaml | 58 +++++++++++++++++++ ...atic-6d3dc09a9fc43aca247841d5ac80b15c.yaml | 58 +++++++++++++++++++ ...atic-90f8c1652860b9223ed16176900d2afd.yaml | 58 +++++++++++++++++++ ...atic-bb78f143e91055aae4c346dd861f8fa1.yaml | 58 +++++++++++++++++++ ...atic-bfe038d664cd2a78c28c48237b8f9052.yaml | 58 +++++++++++++++++++ ...edic-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...arch-8757d0b374234a37718f99a73c9ea57a.yaml | 58 +++++++++++++++++++ ...-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-275ca735c51459885db221498880b57d.yaml | 58 +++++++++++++++++++ ...itup-6dee28ffa5289832e7634748227965f3.yaml | 58 +++++++++++++++++++ ...itup-bb87858762b8ce23abd3059540eaff9b.yaml | 58 +++++++++++++++++++ ...itup-ef2dda421f64bcf3a7eba43646d7c8ab.yaml | 58 +++++++++++++++++++ ...bank-133f9da4970886f2c6daa016271571ae.yaml | 58 +++++++++++++++++++ ...ager-24094706612b6a6d63025fb464dc964d.yaml | 58 +++++++++++++++++++ ...plus-09ab64106100b0ec32bd19145f93c2e8.yaml | 58 +++++++++++++++++++ ...plus-54581f8752e2a09c1534ddfc5763d754.yaml | 58 +++++++++++++++++++ ...bmit-2820cb8fd83fcd8f6cd4181103e215ab.yaml | 58 +++++++++++++++++++ ...-ban-012d37d1a0419e2b4d417ad1bf8624b8.yaml | 58 +++++++++++++++++++ ...-ban-cd2f40630317ec8325a0d94cdae423ba.yaml | 58 +++++++++++++++++++ ...rize-b6ce71d23b8bb3b641046b5238bd95ce.yaml | 58 +++++++++++++++++++ ...-pro-aedddcad604ad7e5d2eeb8d8f5ee448e.yaml | 58 +++++++++++++++++++ ...lite-2a0c0ac8cd49182e6cdc6ee30b392712.yaml | 58 +++++++++++++++++++ ...ents-ae553332abea3b98510af17f933a8bf7.yaml | 58 +++++++++++++++++++ ...ents-fc8825d6c61c86ccb18ee45ace94f66b.yaml | 58 +++++++++++++++++++ ...quiz-d89cd4d50e467aee5b89a046ed25a308.yaml | 58 +++++++++++++++++++ ...ails-91762f25ca1ba53290ed2c419bfe3a07.yaml | 58 +++++++++++++++++++ ...inks-1fb46247dc51fca766c3b6cc15fb0753.yaml | 58 +++++++++++++++++++ ...itly-d6f90ea934e0ed467a2133d2d162346d.yaml | 58 +++++++++++++++++++ ...pbot-549e52f202fcfb1294c6d1e3496da00f.yaml | 58 +++++++++++++++++++ ...gets-8bfdb58ec24e0630da2bd7f7847728ae.yaml | 58 +++++++++++++++++++ ...gets-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...rium-34fbecc9c7ff44a06fa49fc5283f7c1f.yaml | 58 +++++++++++++++++++ ...oard-4e8e6308af14cc738d0cb86b4562e1c4.yaml | 58 +++++++++++++++++++ ...stem-4f49b393f88ca9ff4cbed10f183193ed.yaml | 58 +++++++++++++++++++ ...stem-7be8b313071b390988085960c7a1cc2b.yaml | 58 +++++++++++++++++++ ...stem-96e25e69c7f878ae73c7f29f99c97760.yaml | 58 +++++++++++++++++++ ...stem-bba48b2b3db8c722b3183d512e2cbe2e.yaml | 58 +++++++++++++++++++ ...stem-cb489cb39876b1f1dad08fd79397698a.yaml | 58 +++++++++++++++++++ ...mium-cb489cb39876b1f1dad08fd79397698a.yaml | 58 +++++++++++++++++++ ...klet-12bc7ed9ac4b4df7c9585c5a1693f987.yaml | 58 +++++++++++++++++++ ...lery-6e616d77f2461fd1d3e6a21e8750c36c.yaml | 58 +++++++++++++++++++ ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lery-2326f2ccfd7003acca183b6e98abdbd2.yaml | 58 +++++++++++++++++++ ...bies-2a429e3083a4c7d371b1df483f6771d1.yaml | 58 +++++++++++++++++++ ...ages-9dbf8fc670267468d6465754d6800d70.yaml | 58 +++++++++++++++++++ ...date-1bed895aa03e840b8e1fbdc433b64dc4.yaml | 58 +++++++++++++++++++ ...date-324762b1db43ab659ab273b35e9a6427.yaml | 58 +++++++++++++++++++ ...ords-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...gbot-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tory-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...lite-1163b6a8ec95736fa4c6fa05104ece7e.yaml | 58 +++++++++++++++++++ ...lite-f8cc4565cf41b4df5b2b7d0c05a42787.yaml | 58 +++++++++++++++++++ ...ecom-648854ce1a941daab3125afb660bc4a5.yaml | 58 +++++++++++++++++++ ...cafe-34721fea6a2d4e3ec618e5f696ce767f.yaml | 58 +++++++++++++++++++ ...cafe-352ffd44ce61ab8d22bcb3394c22313a.yaml | 58 +++++++++++++++++++ ...-cal-f584c8e11a9dac20a4d8a5133459696f.yaml | 58 +++++++++++++++++++ ...ameo-d827c61ecd6e1b49bd9f088b6451ceb2.yaml | 58 +++++++++++++++++++ ...ndar-7d771013dd99d35b0d7273344b75ad3f.yaml | 58 +++++++++++++++++++ ...tcha-0a98ad5ece69d0c7228854255adb9a0c.yaml | 58 +++++++++++++++++++ ...tcha-da8dfca2c41b22eddf583b5ba482b227.yaml | 58 +++++++++++++++++++ ...free-4b6f3787781ed281c4bf315d7815f11d.yaml | 58 +++++++++++++++++++ ...free-6ae6ba71c1c511094e234e44db33e39b.yaml | 58 +++++++++++++++++++ ...free-91917d1d663ea184f4f2f69e04c99474.yaml | 58 +++++++++++++++++++ ...ogue-525630ec5598f74dd721d94a531fba2f.yaml | 58 +++++++++++++++++++ ...dget-aab20aa3ba5a82ccff2265ebe56cac66.yaml | 58 +++++++++++++++++++ ...meta-070f5b1993a30da98cfd837719ef997d.yaml | 58 +++++++++++++++++++ ...list-2349a7bd555a58451ac9e6f7145fe711.yaml | 58 +++++++++++++++++++ ...list-91173f58fb32fd621503c873c6d8b146.yaml | 58 +++++++++++++++++++ ...tral-124c235f99b301743df1e63ff167148a.yaml | 58 +++++++++++++++++++ ...tral-3814938e3640604c2b661225dcd59b9c.yaml | 58 +++++++++++++++++++ ...tral-40f584e497f01d406cc7fecd2f3771f0.yaml | 58 +++++++++++++++++++ ...rber-00e68b1df25f64641326f1dec4151572.yaml | 58 +++++++++++++++++++ ...rber-42ad4e32d4737220d58f4a4e7f0c15a2.yaml | 58 +++++++++++++++++++ ...rber-47b0a77f72cd6358c4ce2e9a58f14fae.yaml | 58 +++++++++++++++++++ ...rber-5915172b226df8e80423b0b8b00c97b9.yaml | 58 +++++++++++++++++++ ...rber-ae6491998df759b28d14cdb429fd6751.yaml | 58 +++++++++++++++++++ ...rber-e40d5c75fb230023d171a6172222366a.yaml | 58 +++++++++++++++++++ ...rber-f1c926e99dc13eb40c609c7d4094f9b0.yaml | 58 +++++++++++++++++++ ...rber-f203d2dfc14bc6efd92b667d0eba2f47.yaml | 58 +++++++++++++++++++ ...-cfm-23d9a477d53eb5ee302467e17a43e605.yaml | 58 +++++++++++++++++++ ...ship-cb362ac834e4e127112e662b8e597a11.yaml | 58 +++++++++++++++++++ ...ship-cb7fe4a1f5c046460e4d69413b578527.yaml | 58 +++++++++++++++++++ ...nder-f5fc5ba02aa4560ef332189f36172c97.yaml | 58 +++++++++++++++++++ ...arts-c499c5763cb0c8fadcbd79a7862db8b4.yaml | 58 +++++++++++++++++++ ...tbot-3243534248880dc4d13208e428d3bdd1.yaml | 58 +++++++++++++++++++ ...size-13481b1ed77fd504fee89b917516fad5.yaml | 58 +++++++++++++++++++ ...ator-c4cf1ef74f307e3d974c13ea6edd24eb.yaml | 58 +++++++++++++++++++ ...sion-ba1043324d157b0279fb5fef89ed3d34.yaml | 58 +++++++++++++++++++ ...rrus-217b5f3c17336fde467ad6d4d4052a6d.yaml | 58 +++++++++++++++++++ ...rrus-a7963745ff69e39eb4bbcfe48cff5818.yaml | 58 +++++++++++++++++++ ...n-up-2b8ff50cbfd95099e68cc6637c86457e.yaml | 58 +++++++++++++++++++ ...nfix-3dc2fefb55b6d17e837bc91376ca059e.yaml | 58 +++++++++++++++++++ ...nfix-40d1328c8d4c642fffaf6abab5865649.yaml | 58 +++++++++++++++++++ ...nfix-75c70b1bb438dfcca6e33d6263e0e86e.yaml | 58 +++++++++++++++++++ ...usel-119ed13ee8d9c38858fd75fb1eb0a4cd.yaml | 58 +++++++++++++++++++ ...orts-11a9c2fdd6ced3454ae2f484273892ee.yaml | 58 +++++++++++++++++++ ...orts-a5b46952d543f797449f79e0a9cccb18.yaml | 58 +++++++++++++++++++ ...demy-25a10466c42d47292b8a71c862e9a26a.yaml | 58 +++++++++++++++++++ ...demy-6ac56b73dfbde68009426ab1366ff6c2.yaml | 58 +++++++++++++++++++ ...demy-7379020b548b14b7be62b539ae5d76a2.yaml | 58 +++++++++++++++++++ ...demy-a1129a205ef2deec4965e57f9f73108e.yaml | 58 +++++++++++++++++++ ...demy-c451f687ef3559dbeeebe92c1e87ed44.yaml | 58 +++++++++++++++++++ ...demy-ec34a021a2077f3815f991d8c8d817ea.yaml | 58 +++++++++++++++++++ ...ache-7da86808d4989a68c5d31062aa40a7e0.yaml | 58 +++++++++++++++++++ ...ache-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...oudy-0ad53ed111e4c9bd0fa768a28b64118e.yaml | 58 +++++++++++++++++++ ...ager-88ba893aacf7da3ba8fb038d6bba0a0b.yaml | 58 +++++++++++++++++++ ...ager-980a1e8d0e2c9d6875260534aa15c2ab.yaml | 58 +++++++++++++++++++ ...ager-dabe11ac9a89ef7717da39d4e9cb7dcc.yaml | 58 +++++++++++++++++++ ...htjs-c1479c1cda6995c80979468ade477a9b.yaml | 58 +++++++++++++++++++ ...htjs-ca875a69734817c022d2b5742d18b09a.yaml | 58 +++++++++++++++++++ ...lock-291a48e25bfa003aa951458172971d46.yaml | 58 +++++++++++++++++++ ...oder-03747b0c7844da2a502c367644e13831.yaml | 58 +++++++++++++++++++ ...oder-245098f6b0653f99e8181fe1d0b4d9ec.yaml | 58 +++++++++++++++++++ ...oder-83f22a47dbd6befc1b5b2de701a66592.yaml | 58 +++++++++++++++++++ ...oder-d4baf5319f8e6cff227085b65be4db6a.yaml | 58 +++++++++++++++++++ ...oder-ed25dc4554a62fa61ab6134b2e367cf7.yaml | 58 +++++++++++++++++++ ...rbox-4c3b7c4b9ee3cb503e7f1c307a295ea7.yaml | 58 +++++++++++++++++++ ...elds-0cde94286321975aa282d120f32f5bac.yaml | 58 +++++++++++++++++++ ...elds-287b97d3800f658fb6c7787e238d09c5.yaml | 58 +++++++++++++++++++ ...elds-6fee77f4c30ccce8c47c0e8979fa4163.yaml | 58 +++++++++++++++++++ ...emix-1498b56c7721705e179b43bd40cfa29f.yaml | 58 +++++++++++++++++++ ...emix-574c183518fa14bb1a854e4b68f72a19.yaml | 58 +++++++++++++++++++ ...emix-5defb55cded48a565a064567cc9f2fde.yaml | 58 +++++++++++++++++++ ...navi-c4c58ad76c633d16084174a989d36082.yaml | 58 +++++++++++++++++++ ...izer-214d7a66a2d3ba448e1f7f45ccd8e5f3.yaml | 58 +++++++++++++++++++ ...izer-388de01a3c00f86461e75b59a8e80e96.yaml | 58 +++++++++++++++++++ ...izer-ab5c346298e5bc332a45956af170b3b8.yaml | 58 +++++++++++++++++++ ...ours-31a7c57e145b1990f031344b13acb01b.yaml | 58 +++++++++++++++++++ ...dule-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...itor-416feeed72e481e9c6ade025bb1108e9.yaml | 58 +++++++++++++++++++ ...mode-aadc81f29bdd98e82b479da656b5f939.yaml | 58 +++++++++++++++++++ ...mode-c4b1471de80c6f40eddc08f35e8d5a25.yaml | 58 +++++++++++++++++++ ...tant-ac90b1e42401eceeda1d0c4445ebc72b.yaml | 58 +++++++++++++++++++ ...form-007c1b62fcbe28eefc7df62d2a9616c8.yaml | 58 +++++++++++++++++++ ...dget-faf2b2d46d16f4cbc167cb1d3ca32849.yaml | 58 +++++++++++++++++++ ...ider-13a0eed39cd76523725bdb9ac6f8ad2f.yaml | 58 +++++++++++++++++++ ...ider-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ider-d8df0d0d76816bab3218aaeebd329b4b.yaml | 58 +++++++++++++++++++ ...form-03e041af34914994b5b4b3e20ec8ee2e.yaml | 58 +++++++++++++++++++ ...form-fbe96c78719e34780f9334cd4775f2cc.yaml | 58 +++++++++++++++++++ ...ager-49aab57e3a849669daec0648093b2a24.yaml | 58 +++++++++++++++++++ ...tion-d51d69d330a061dad190bd18258e5c37.yaml | 58 +++++++++++++++++++ ...ctor-d40e32a5b0b2b53caa45979ec9bf9c5b.yaml | 58 +++++++++++++++++++ ...ctor-d7e80e6f1bf77fdb58c4ef0772ba692b.yaml | 58 +++++++++++++++++++ ...ctor-e6f9d411cfc36ab403436e5079e013a0.yaml | 58 +++++++++++++++++++ ...lter-cf0e16a0243bc8e5fbe7907a0ee34454.yaml | 58 +++++++++++++++++++ ...ilot-0eba82d1fba78dd21145988eca694adc.yaml | 58 +++++++++++++++++++ ...info-11d8ae615e422011cdb2e654cf3c2a37.yaml | 58 +++++++++++++++++++ ...oise-e18f49f80ec9826dcfb049693894ccc8.yaml | 58 +++++++++++++++++++ ...tect-e1febe978f6ac681c905f0209b923309.yaml | 58 +++++++++++++++++++ ...tect-e4e5ff4fcb64dcafb0055252dafcef0a.yaml | 58 +++++++++++++++++++ ...-web-0146139ec324fe379ee6ec8f57dc3c30.yaml | 58 +++++++++++++++++++ ...-web-79179ad54ba7abdd62ae8ef75c3ac232.yaml | 58 +++++++++++++++++++ ...cors-e46a5a03ceb7f18070858cdd9f1f8b5c.yaml | 58 +++++++++++++++++++ ...lock-c70d49119f4b9f186615bc657f763711.yaml | 58 +++++++++++++++++++ ...eals-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rses-33d299e06297ee744f8b2ab0f31bf14e.yaml | 58 +++++++++++++++++++ ...rses-863ed304215cd2e175d9703d88e6083d.yaml | 58 +++++++++++++++++++ ...rses-940c6ab33d2bde0b6449cfe6f3d13395.yaml | 58 +++++++++++++++++++ ...rses-97452a6bc86602fd42828322e14bf1a4.yaml | 58 +++++++++++++++++++ ...rses-f5cb3f8d334ac2311e5f8501cefe50c7.yaml | 58 +++++++++++++++++++ ...-crm-977852d7cbd71ce5f22a0af60232cc54.yaml | 58 +++++++++++++++++++ ...stem-0f98500a56d8bff1fd15d46c8720db00.yaml | 58 +++++++++++++++++++ ...oard-2f795470b566b4d4e27fdf7c4b01f4e4.yaml | 58 +++++++++++++++++++ ...cker-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...trol-4868cf7c42be3158ef073642ac63d2ca.yaml | 58 +++++++++++++++++++ ...trol-ab25c765042411f076e2c34c06b3fa2a.yaml | 58 +++++++++++++++++++ ...ding-1dcb303214a4e16964564ee6c958b8e1.yaml | 58 +++++++++++++++++++ ...ding-1ed0f12e4f8286a9294dfd9901458db7.yaml | 58 +++++++++++++++++++ ...ding-29e9ddd5b76fa0248f97f07fd01dc1e5.yaml | 58 +++++++++++++++++++ ...ding-53abed64d2c7da6e29618b2b45471eff.yaml | 58 +++++++++++++++++++ ...ding-738aec4d264c39b57fdb9fa2e1cd1e49.yaml | 58 +++++++++++++++++++ ...ding-91cfe4c5d855055ec913db3b32084f9f.yaml | 58 +++++++++++++++++++ ...ding-c28a0d08c5fbf894a1f8488da42215b4.yaml | 58 +++++++++++++++++++ ...-csv-1f51055337b26e17849cecf509bf67bf.yaml | 58 +++++++++++++++++++ ...rter-4e6e2faa30d1cb67b640ff4b64c7c434.yaml | 58 +++++++++++++++++++ ...rter-968c8d1a2b35e84ec8cc4db089cc5a0f.yaml | 58 +++++++++++++++++++ ...base-83d9cd71e386193f00255f0781416f64.yaml | 58 +++++++++++++++++++ ...ufon-ec9648c71f1130788ab995bdc3f376ab.yaml | 58 +++++++++++++++++++ ...ulus-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml | 58 +++++++++++++++++++ ...ulus-ae74e5195b986dc457ca3bcab394fb91.yaml | 58 +++++++++++++++++++ ...ulus-b5fa15c1717b09cfe3a9444e5c71ce00.yaml | 58 +++++++++++++++++++ ...ulus-df02c18fa8558df79345e6d025074ade.yaml | 58 +++++++++++++++++++ ...itae-3e2d48fb8718138bcd53c5ef0645702a.yaml | 58 +++++++++++++++++++ ...face-32ed4b36d9532730d50e66214a30b7fa.yaml | 58 +++++++++++++++++++ ...face-440ba93423360c612c2bdc92f81276f2.yaml | 58 +++++++++++++++++++ ...face-5bdecbba58ada95bd7bc5fd2be57ef44.yaml | 58 +++++++++++++++++++ ...face-c74c11d5784e405e62062349c0e1950a.yaml | 58 +++++++++++++++++++ ...-url-050cddb029ad5e41b8d75ac57910a3a4.yaml | 58 +++++++++++++++++++ ...lass-64d4110e0f9003166c73a24b6fad0a3d.yaml | 58 +++++++++++++++++++ ...lass-d03a7182da2d0e0b179ec3d956910e32.yaml | 58 +++++++++++++++++++ ...sors-31292a415c3bd76b8562016d2514c1b7.yaml | 58 +++++++++++++++++++ ...sors-5c48a008fb4b7cf800ee3deda45c5f7c.yaml | 58 +++++++++++++++++++ ...sors-9698878f57267bfd24968203a9fc1400.yaml | 58 +++++++++++++++++++ ...sors-990bebfd04ffccf7784d9ed7851bc9ac.yaml | 58 +++++++++++++++++++ ...sors-ece3289501587998363581768a050e75.yaml | 58 +++++++++++++++++++ ...arch-0b1be450ec6216c739b3d0139ea02732.yaml | 58 +++++++++++++++++++ ...arch-8eccd870a6d15f799494bf58d6a610b0.yaml | 58 +++++++++++++++++++ ...page-4fd05a735543332a71cc4808699480af.yaml | 58 +++++++++++++++++++ ...ages-4e0f6a7fdb6146beb66009561f485674.yaml | 58 +++++++++++++++++++ ...late-fae9e4b7c0dc6fb3f6341b0fd31d1ab6.yaml | 58 +++++++++++++++++++ ...area-23aac587b81f89d6096ca89681943380.yaml | 58 +++++++++++++++++++ ...iews-11af501cd400c11d4471a7dd2fad2f1e.yaml | 58 +++++++++++++++++++ ...iews-6ed86de0b04577fc056eab4066eb09a3.yaml | 58 +++++++++++++++++++ ...iews-a0746efee95fbf7d166096b25b7d8be2.yaml | 58 +++++++++++++++++++ ...iews-b3f06bebea4c15ec9085029db00fb9fa.yaml | 58 +++++++++++++++++++ ...iews-c2b458a87e9095667109688e878e4bb7.yaml | 58 +++++++++++++++++++ ...iews-daafab6254624f5514eee093537d860d.yaml | 58 +++++++++++++++++++ ...iews-e97ef8cef65f1238fc33971be91c7b6a.yaml | 58 +++++++++++++++++++ ...p-d3-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml | 58 +++++++++++++++++++ ...p-d3-8e3ce96babe760c2cb16640799a8d0b9.yaml | 58 +++++++++++++++++++ ...mode-129be45dc62378c19cbd82aa0287c865.yaml | 58 +++++++++++++++++++ ...mode-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...mode-9b4ecfa65ce2bd75653c853011940f82.yaml | 58 +++++++++++++++++++ ...mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...otes-49ce77ee7ff4dfc9b11f4efe4714eccb.yaml | 58 +++++++++++++++++++ ...otes-d64722e01dc579e8e1b721ed84873800.yaml | 58 +++++++++++++++++++ ...cess-69231840a822d24bacb2d776a5d46cf4.yaml | 58 +++++++++++++++++++ ...cess-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cess-f5497363e91c49e85823434d8464dab9.yaml | 58 +++++++++++++++++++ ...dmin-6cf9abd0a55631980f6943dc1552464b.yaml | 58 +++++++++++++++++++ ...ckup-01a81435c686a1247dfccda6d4fceb1e.yaml | 58 +++++++++++++++++++ ...ckup-0ccf2aeb067cc807426227d06027c42a.yaml | 58 +++++++++++++++++++ ...ckup-230f648691b91c6194be1f415c1bb8f9.yaml | 58 +++++++++++++++++++ ...ckup-434ae7a95fc78d705c7843354abb6396.yaml | 58 +++++++++++++++++++ ...ckup-4e3789575d49b1ac4382fdd75784e5a5.yaml | 58 +++++++++++++++++++ ...ckup-570d7dad3e17c051e824f46c008efb18.yaml | 58 +++++++++++++++++++ ...ckup-71e8880d940289fc5d83f840f7f72d23.yaml | 58 +++++++++++++++++++ ...ckup-72a1bd2cf4b65d84a10506cf15cba770.yaml | 58 +++++++++++++++++++ ...ckup-8927f27721e1d8b23d2e73cb09a3c9b9.yaml | 58 +++++++++++++++++++ ...ckup-89f1af83c5f7816ee1b237c0d204c470.yaml | 58 +++++++++++++++++++ ...ckup-ad22dd4e7945e819f768594bfd7f51a8.yaml | 58 +++++++++++++++++++ ...ckup-d37ffc3b204cc5bf91198dd14b07cd91.yaml | 58 +++++++++++++++++++ ...ckup-f1bef4e2b058a613299e0bc52fb82835.yaml | 58 +++++++++++++++++++ ...ager-fe4659922c34e5697cab9b458b24c4e0.yaml | 58 +++++++++++++++++++ ...cker-e6aa8433ac2636bbe0e1dd25466b1760.yaml | 58 +++++++++++++++++++ ...ckup-067d3779b4dc783cbbb0a5aaab128700.yaml | 58 +++++++++++++++++++ ...ckup-39941d45971237ca65a192ec3e53bd89.yaml | 58 +++++++++++++++++++ ...ckup-5741da0b171618ff87448def21553be2.yaml | 58 +++++++++++++++++++ ...ckup-b872392d30229399db8513dcb00793fb.yaml | 58 +++++++++++++++++++ ....php-1354435c4f5fd2cf36a77bfe4d9efd70.yaml | 58 +++++++++++++++++++ ...ager-28a1f826666cf3d5563d0cfab46756c5.yaml | 58 +++++++++++++++++++ ...ager-2e5e8e1009429a76d7f18bdd3c57a7a9.yaml | 58 +++++++++++++++++++ ...ager-46753bc0e0a5000c6953d11b4c87a555.yaml | 58 +++++++++++++++++++ ...ager-d56c9f9434c8eee9514eb927acff9263.yaml | 58 +++++++++++++++++++ ...ager-ee247de60df1bfe0f1ecd93cf598296f.yaml | 58 +++++++++++++++++++ ...ging-54ecced4ec6b955678ac66c0d0f02ad3.yaml | 58 +++++++++++++++++++ ...ging-7f4824acb6f88f468d76a43937c8bc24.yaml | 58 +++++++++++++++++++ ...mage-498a64542dbb51a5eba70d23bf7af5b7.yaml | 58 +++++++++++++++++++ ...aces-9a9c52cdec433248e8d2c508fc3c6161.yaml | 58 +++++++++++++++++++ ...ypes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dmin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...wers-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...alog-0b351fbbceddd3af3b8762c10e45e612.yaml | 58 +++++++++++++++++++ ...emap-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...vite-9f99c3916170112c6519a28e2f1378e6.yaml | 58 +++++++++++++++++++ ...vite-d4039daa19b11d4d7dd3d98ae4448907.yaml | 58 +++++++++++++++++++ ...vite-fef6aa22cfe22d9b149697c3717922bc.yaml | 58 +++++++++++++++++++ ...oard-78755e457e479cae23d5dca42eeac5db.yaml | 58 +++++++++++++++++++ ...sers-426286a65b9c6cb22be8026fc66ac3eb.yaml | 58 +++++++++++++++++++ ...docs-35dda5414154f53d96b973b68d2be63d.yaml | 58 +++++++++++++++++++ ...docs-8438c9473d07feba9507b08f7b2ca394.yaml | 58 +++++++++++++++++++ ...docs-de718f2bd31fc4ccd0bdde8aa56c6557.yaml | 58 +++++++++++++++++++ ...rect-4e4e50f7a420b0e140281c805ef6a928.yaml | 58 +++++++++++++++++++ ...nate-9f7bf70b345ad8176b09c272029728d7.yaml | 58 +++++++++++++++++++ ...rack-6d5c3a6b6510902181c0fc950daad824.yaml | 58 +++++++++++++++++++ ...rade-c8a533331a66588a41e484e2593bc634.yaml | 58 +++++++++++++++++++ ...load-38075b2ddd2270a10fc2d087e129aea8.yaml | 58 +++++++++++++++++++ ...ager-f8b195ad87a5a50c5754f7800933e00c.yaml | 58 +++++++++++++++++++ ...ager-2a2c96d8b7e05bdda2ce23679852b0ec.yaml | 58 +++++++++++++++++++ ...ager-46ca57fda9611a4d8d3fe3eb2317d1ac.yaml | 58 +++++++++++++++++++ ...ager-504f4fd7f6488b8460fa7b0e025293ef.yaml | 58 +++++++++++++++++++ ...ager-fde55a7ed22dac34f683215367ee2443.yaml | 58 +++++++++++++++++++ ...lery-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...-map-7fd62997a96edc06785da25d5644aff0.yaml | 58 +++++++++++++++++++ ...plus-56b48bd0a46510cdd09a4ee245e5ae52.yaml | 58 +++++++++++++++++++ ...e-30-1f13b5881c3d355245302cf4439befbf.yaml | 58 +++++++++++++++++++ ...e-30-21fdda375898746027e6f9dda342b8cd.yaml | 58 +++++++++++++++++++ ...e-30-5a34f6e49c7ef01f010ae75476cc8b14.yaml | 58 +++++++++++++++++++ ...ator-422c4f76899e03c0666b1907832b3ab3.yaml | 58 +++++++++++++++++++ ...ator-4b8f53dac7b962db019d821a894cbb82.yaml | 58 +++++++++++++++++++ ...ator-65d839a96475e08e7231c85cc5b59ef7.yaml | 58 +++++++++++++++++++ ...ator-e41b83efa869789b0f40a748caa1121d.yaml | 58 +++++++++++++++++++ ...page-783792bc349c3286b30c741d65b88b21.yaml | 58 +++++++++++++++++++ ...ctor-9cb0eb94b28c3edb80588351824c0d35.yaml | 58 +++++++++++++++++++ ...ctor-a13ac145586953796d79d44892866da5.yaml | 58 +++++++++++++++++++ ...erce-18d6c29d9809d383ee48c11e640d6bfc.yaml | 58 +++++++++++++++++++ ...erce-289d7937d831ca65d987bd5d70a6be46.yaml | 58 +++++++++++++++++++ ...erce-47355e6b7ab75ca2f167e153c73e9cb8.yaml | 58 +++++++++++++++++++ ...erce-5f327ec92a2ed47a19cfa74c78839e26.yaml | 58 +++++++++++++++++++ ...erce-79dc45699a7994a2167adb230c8ff41d.yaml | 58 +++++++++++++++++++ ...erce-985a4d5103b9ddb67f837c1ceb401728.yaml | 58 +++++++++++++++++++ ...erce-bf5cbdf8020a636cc9f21e15a59d9023.yaml | 58 +++++++++++++++++++ ...erce-cb27559ef010c67b27e71c1d47ff78e4.yaml | 58 +++++++++++++++++++ ...rter-b87c02ac90f7b6f2632497368ebe2ad8.yaml | 58 +++++++++++++++++++ ...erce-f774eebe4f23829fc94b7eafdba5ce4e.yaml | 58 +++++++++++++++++++ ...tact-1a94885b829a17aaf2fa1ae77773a27a.yaml | 58 +++++++++++++++++++ ...ents-3c60189d6f13a72d771cf945af5deabf.yaml | 58 +++++++++++++++++++ ...lery-0a9f08b24926b461870620f84309d060.yaml | 58 +++++++++++++++++++ ...lery-4b99edd00f6941b4dd18ce780651f43a.yaml | 58 +++++++++++++++++++ ...lery-53e584ae34c9d1aad8bceb6896eca3e1.yaml | 58 +++++++++++++++++++ ...lery-609b7c2d6b7906e24d1cf69e810126a4.yaml | 58 +++++++++++++++++++ ...lery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...lery-f0840392ae02502b377a0491bc44f08d.yaml | 58 +++++++++++++++++++ ...lery-fe0e146c52658b7a7e60347935b3c568.yaml | 58 +++++++++++++++++++ ...-pay-7019ae891ef15e3836bd8cf0d5c1f6e9.yaml | 58 +++++++++++++++++++ ...-pay-978317c4070e7121d6a698893d413687.yaml | 58 +++++++++++++++++++ ...-pay-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-pay-e9841c7d453db007ae94f5b33ac69fd2.yaml | 58 +++++++++++++++++++ ...king-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml | 58 +++++++++++++++++++ ...cart-00935a43a6eeac3216e5733aff1322b8.yaml | 58 +++++++++++++++++++ ...cart-039f1cb39ecb5839b4ea52ff55c41eac.yaml | 58 +++++++++++++++++++ ...cart-0cbf88d6c1cf37efa7d39650814fcfdb.yaml | 58 +++++++++++++++++++ ...cart-2b72a770047348328de1929b10696b75.yaml | 58 +++++++++++++++++++ ...cart-2e1c1b8086549c30cda9ee97a6f1462b.yaml | 58 +++++++++++++++++++ ...cart-32c514a1869a13a710a63935ad684892.yaml | 58 +++++++++++++++++++ ...cart-333442feab2beac98ba52d2344da3703.yaml | 58 +++++++++++++++++++ ...cart-3c89e27202b3ceefaa020a7f1c33e993.yaml | 58 +++++++++++++++++++ ...cart-558868c7563df01c1f5dedf319b2c882.yaml | 58 +++++++++++++++++++ ...cart-5c5967c0bbcbea315d0f076aa78401d0.yaml | 58 +++++++++++++++++++ ...cart-634f36268feec63bbd65254294b6c4f9.yaml | 58 +++++++++++++++++++ ...cart-6a08a7b07ff874974a20d821c1b5579b.yaml | 58 +++++++++++++++++++ ...cart-72e9256e7194c6f152bbcbf59294459d.yaml | 58 +++++++++++++++++++ ...cart-850e9ef75c282ac77bdc710fb921007a.yaml | 58 +++++++++++++++++++ ...cart-8bf5f589d084befe53d71ebadbbe38a9.yaml | 58 +++++++++++++++++++ ...cart-8d0780ef9cdce64a723061f380152be4.yaml | 58 +++++++++++++++++++ ...cart-b86446f22d4643018e6ef2052ed1d120.yaml | 58 +++++++++++++++++++ ...rter-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...ypal-51e05e1842b40dddcacbdfa060eb58f3.yaml | 58 +++++++++++++++++++ ...ypal-8bdc053cc4675755b000b5fc58ac8d1d.yaml | 58 +++++++++++++++++++ ...ypal-a742d112c80df865f27dc03fd5bad80a.yaml | 58 +++++++++++++++++++ ...ypal-f76ae0a1a5395e01d11e666acc5af070.yaml | 58 +++++++++++++++++++ ...ling-3b47626efde37c9b368853074eff5ac4.yaml | 58 +++++++++++++++++++ ...ling-ea6169545e62509ba8c9c97e59403c47.yaml | 58 +++++++++++++++++++ ...menu-466f828dbbe6a38b41f50c90b304f162.yaml | 58 +++++++++++++++++++ ...menu-d194b7c99710bb89f1ee39dafcb5d71b.yaml | 58 +++++++++++++++++++ ...cted-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...cted-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...name-267f0e0e2934a72d1de6f6f1105dcde9.yaml | 58 +++++++++++++++++++ ...name-7b1e0db7c2338cbba544192fa7f81810.yaml | 58 +++++++++++++++++++ ...itor-1184e292a35a8344c32cddb99a8fcb99.yaml | 58 +++++++++++++++++++ ...itor-1681b68cd41846205691e7808fd5da5e.yaml | 58 +++++++++++++++++++ ...itor-38bda0676f9c2f71340a844a3a8819c1.yaml | 58 +++++++++++++++++++ ...itor-b9526b8daaa2ae88bfa635ff810051bf.yaml | 58 +++++++++++++++++++ ...itor-eb8ded5298215dd0e82d0abb7c7916df.yaml | 58 +++++++++++++++++++ ...itor-fd1c6aef8498143f615d9a33fd78c139.yaml | 58 +++++++++++++++++++ ...ormd-74293ce2d79dd2a7920de3a46ed52f1d.yaml | 58 +++++++++++++++++++ ...tion-6bb2bf3114fc53c78aea9aa0493d5c3b.yaml | 58 +++++++++++++++++++ ...drop-af2b2579ba875af3f2aa500d0c6dc341.yaml | 58 +++++++++++++++++++ ...drop-f0134606fede470163532ed054b5ffbb.yaml | 58 +++++++++++++++++++ ...nial-2bdde235df4e60ece644c15f4a368e21.yaml | 58 +++++++++++++++++++ ...mail-00703f6574c6499c4c754c18b06e2fac.yaml | 58 +++++++++++++++++++ ...mail-1692bf36a577861d7694fe5e6a6349e9.yaml | 58 +++++++++++++++++++ ...mail-9f58597847e89287848eee54c2091729.yaml | 58 +++++++++++++++++++ ...mail-aff34bbee6abae075d8a005450eb25f1.yaml | 58 +++++++++++++++++++ ...ture-01c32de4da27201264daa86cce20846d.yaml | 58 +++++++++++++++++++ ...ture-8b5e824a12086cc74066614f2e4e51cc.yaml | 58 +++++++++++++++++++ ...ture-c12916d335310986eaec85514752de0c.yaml | 58 +++++++++++++++++++ ...ture-f31ccb9cf3abf671f018dab7c32b0baa.yaml | 58 +++++++++++++++++++ ...mail-d7c41c4fc68b394974bfd23e0a1efa8e.yaml | 58 +++++++++++++++++++ ...late-2961759aa56e979f7c4730d8320eec28.yaml | 58 +++++++++++++++++++ ...late-6f39409e9cc737c9be51051f78033048.yaml | 58 +++++++++++++++++++ ...sers-2c7df8a6a41b0cfad78e17028e8be6b9.yaml | 58 +++++++++++++++++++ ...sers-f523c60311785f4d77bdd4f2724550c9.yaml | 58 +++++++++++++++++++ ...aily-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...book-d255ee9fa48bc6c366622d018f796d6c.yaml | 58 +++++++++++++++++++ ...-one-dba2619ab2d561166f40c11574711a13.yaml | 58 +++++++++++++++++++ ...form-55c899bce76676ae0bd2f27011d06ab7.yaml | 58 +++++++++++++++++++ ...form-56c7f8b22a3b891b810a80379c9e7a01.yaml | 58 +++++++++++++++++++ ...form-f77ac51d7f87288e232b2c219c40d8d5.yaml | 58 +++++++++++++++++++ ...ator-e5c02072906413fc46145a5e93a1996b.yaml | 58 +++++++++++++++++++ ...ager-0d45a6acc266b9099e698fb6465812c3.yaml | 58 +++++++++++++++++++ ...ager-0e1bfe9ca60605b5abd7dce920ae439f.yaml | 58 +++++++++++++++++++ ...ager-1c01adecb12aee3257c9d0dbd49129d4.yaml | 58 +++++++++++++++++++ ...ager-5dfd39caa2a4a17a9d81b2bcb48fe7a9.yaml | 58 +++++++++++++++++++ ...ager-b1c130064cba38fde3b249c93cb244d8.yaml | 58 +++++++++++++++++++ ...ager-c18f4199236ac87f44c609c0bce30e9b.yaml | 58 +++++++++++++++++++ ...ners-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-0b82fadb36c481a1a5ef36694d259943.yaml | 58 +++++++++++++++++++ ...tion-470fcf5d296c10b95ff256d3ed543789.yaml | 58 +++++++++++++++++++ ...ents-725f7191ecab88079bfff1263c7f0b6b.yaml | 58 +++++++++++++++++++ ...free-2fc3b192219eef2561c8cf224133798e.yaml | 58 +++++++++++++++++++ ...free-92b868ab957b2d6b33921f7b3f3c0643.yaml | 58 +++++++++++++++++++ ...free-e352fc57a2782b7212eb2f2b84743eba.yaml | 58 +++++++++++++++++++ ...free-e835818e3176559c0f65d870084d0fe9.yaml | 58 +++++++++++++++++++ ...free-2560e5ea38a398fb682ed22ee1d9efc5.yaml | 58 +++++++++++++++++++ ...kout-ba0174f27e21e2789733491b8587f8b7.yaml | 58 +++++++++++++++++++ ...kout-e4fa85790fd0d4e4853e9542fdd405a2.yaml | 58 +++++++++++++++++++ ...arch-2124f2372d43d33c582fb413bf11d2cf.yaml | 58 +++++++++++++++++++ ...inks-8503267448a714d1d5d099f1366cd0ea.yaml | 58 +++++++++++++++++++ ...inks-acbe4c57371265432a7073cce828c9b8.yaml | 58 +++++++++++++++++++ ...inks-c77650d093057aaa003b4663a520daa0.yaml | 58 +++++++++++++++++++ ...xtra-04bca0e78f8b136ea82b1c4e9e1fafd4.yaml | 58 +++++++++++++++++++ ...xtra-1bacae6a1e466eb95d42535d2732f49e.yaml | 58 +++++++++++++++++++ ...xtra-72f52b3195cda1a84eb378b7230b5a8a.yaml | 58 +++++++++++++++++++ ...xtra-cf9d9e6d9a79f949d859a47a9fc67035.yaml | 58 +++++++++++++++++++ ...ypes-388ae826ccb91352f7d4e90d33114225.yaml | 58 +++++++++++++++++++ ...feed-0680dda962d6629defb4aaff80f780c3.yaml | 58 +++++++++++++++++++ ...feed-19cdc4c29e421f2a623449d500d3da59.yaml | 58 +++++++++++++++++++ ...roup-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...nger-e11138180e51155554e951dfca6551c2.yaml | 58 +++++++++++++++++++ ...iews-1f98c7de637a490b84e9178dba93c59d.yaml | 58 +++++++++++++++++++ ...iews-33420cd1d54a09491bc3d21e0f948bd1.yaml | 58 +++++++++++++++++++ ...iews-a6734b6686a1620a7fb5250d66545fe3.yaml | 58 +++++++++++++++++++ ...iews-de4b42af1ef3e90d957d2f6f01c968f1.yaml | 58 +++++++++++++++++++ ...humb-00db16fbca7a4f9a03bd9187fe606bf2.yaml | 58 +++++++++++++++++++ ...humb-f4af8d356c8b91106f18b8295f1a09bd.yaml | 58 +++++++++++++++++++ ...news-eac77b73e6b9904c178e050ff0c75895.yaml | 58 +++++++++++++++++++ ...2ban-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...2ban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ybox-8282698eb41cb94eaba8ce79ac54a59f.yaml | 58 +++++++++++++++++++ ...ache-8db2ce4fbc6df6bbc133a98c76aaa326.yaml | 58 +++++++++++++++++++ ...ache-2bc9467a4d3e89abb47c57f5fb5c5502.yaml | 58 +++++++++++++++++++ ...ache-2c2de25348b7c75ca7429eb5ebee61e0.yaml | 58 +++++++++++++++++++ ...ache-308394f6b31625a7b3cc64b85e9f4dc2.yaml | 58 +++++++++++++++++++ ...ache-34c60f50f8424840987ed5ec10c2ec3b.yaml | 58 +++++++++++++++++++ ...ache-434e9952fd09ca91a230586603143cbf.yaml | 58 +++++++++++++++++++ ...ache-5159dc207c489f95e16ee89d4e708b82.yaml | 58 +++++++++++++++++++ ...ache-528f5db23cd029b151a95682806084f9.yaml | 58 +++++++++++++++++++ ...ache-5c10da7a2c723b79d143625ddb915594.yaml | 58 +++++++++++++++++++ ...ache-5f9f7bf290ea80a41025c30b0ffd1db1.yaml | 58 +++++++++++++++++++ ...ache-6c168d1ea28ed0681002f0d31c5c68ec.yaml | 58 +++++++++++++++++++ ...ache-781be145445f4ecc9aced0ff98acc796.yaml | 58 +++++++++++++++++++ ...ache-7bdbbcae3cce706a901ef3f3a6b92425.yaml | 58 +++++++++++++++++++ ...ache-87d8a616e4f6cf2eb5659e011debac27.yaml | 58 +++++++++++++++++++ ...ache-880d7d40699b96b833547889085219bd.yaml | 58 +++++++++++++++++++ ...ache-8cc833441ebc75f63db145d2a0ea886f.yaml | 58 +++++++++++++++++++ ...ache-a5a9392a98391031218baa6258f9a301.yaml | 58 +++++++++++++++++++ ...ache-a984dcb982c3439de2d89b2a845332c4.yaml | 58 +++++++++++++++++++ ...ache-aa83e2ade173c8a794348dca58308ca5.yaml | 58 +++++++++++++++++++ ...ache-aee951aa25d6cb6b8a83ee793cc48cd4.yaml | 58 +++++++++++++++++++ ...ache-b042f2e0c8fff5912a04fa9b2c227c26.yaml | 58 +++++++++++++++++++ ...ache-b07a02f9d4db7fe492ff4a4ebc6a38ba.yaml | 58 +++++++++++++++++++ ...ache-c154f039f669a6109ec8e5a85b87164a.yaml | 58 +++++++++++++++++++ ...ache-c21f1786e3abdb7c657091d8024583d5.yaml | 58 +++++++++++++++++++ ...ache-c81b4ef2016d652c733da1bfa6c2e44c.yaml | 58 +++++++++++++++++++ ...ache-cda6fd724330a43ee464ed21db562f0f.yaml | 58 +++++++++++++++++++ ...ache-da0ca9a834853b4f5e811265296c5adc.yaml | 58 +++++++++++++++++++ ...ache-dca77da230ccc48431ba72fffaf1572c.yaml | 58 +++++++++++++++++++ ...ache-e73d249d01ad89f85ce6653e71044320.yaml | 58 +++++++++++++++++++ ...ache-e894ea885bc953386f78fce46ae1e024.yaml | 58 +++++++++++++++++++ ...ache-eff26e4e38ea08eb75bc359769b06555.yaml | 58 +++++++++++++++++++ ...ache-f28e9e3f4825fae9f836906b103e0875.yaml | 58 +++++++++++++++++++ ...ache-fc23a4effa46a10b3b1c7e7c56d41874.yaml | 58 +++++++++++++++++++ ...ache-feb6288652d7faad54d04d9b1b85ce3b.yaml | 58 +++++++++++++++++++ ...osts-7d31af080da908940b0bf5332e53662b.yaml | 58 +++++++++++++++++++ ...nect-1649363ae97196f303e072aa7eb1a4bc.yaml | 58 +++++++++++++++++++ ...nect-92964841ce29c9fa3f7d3cfce6a290be.yaml | 58 +++++++++++++++++++ ...nect-c2d92bf1dd144f0becd8dbed310ba478.yaml | 58 +++++++++++++++++++ ...ider-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...book-0b46297c5a1cfd566b6a7dde332d02ec.yaml | 58 +++++++++++++++++++ ...book-6baff9c0f37923203f19e1b9ed3bec89.yaml | 58 +++++++++++++++++++ ...ight-91e729c82f2d9f67d872d81509700a6c.yaml | 58 +++++++++++++++++++ ...ents-255053b922939496ac6eb4ab1dee395c.yaml | 58 +++++++++++++++++++ ...ager-04ad31792d5c51d45b79863f46499a91.yaml | 58 +++++++++++++++++++ ...ager-125b5a46ac07b4fbf1d6669e65082c22.yaml | 58 +++++++++++++++++++ ...ager-1560744dca5de73758ff3516e44b8c1d.yaml | 58 +++++++++++++++++++ ...ager-51f90b4356078332ed05b86ecb626225.yaml | 58 +++++++++++++++++++ ...ager-6943b3fa4f51347e8c8fc20d043e8814.yaml | 58 +++++++++++++++++++ ...ager-7b25308fe9b7c95a04987753945e2077.yaml | 58 +++++++++++++++++++ ...ager-8ce49b249ec2d999d67fd390598bddc7.yaml | 58 +++++++++++++++++++ ...ager-ab69897227314aa3081e7c66ae76a1a8.yaml | 58 +++++++++++++++++++ ...ager-e2709c74f557b8f05efa6466674d741e.yaml | 58 +++++++++++++++++++ ...ager-e29d6db8a3a02793b21f4d3bff2f8cc9.yaml | 58 +++++++++++++++++++ ...ager-f02efca96aea9cf0bcb75d72789d8419.yaml | 58 +++++++++++++++++++ ...ager-fd8eab398a722e719e1bf89dd3138490.yaml | 58 +++++++++++++++++++ ...-pro-8ce49b249ec2d999d67fd390598bddc7.yaml | 58 +++++++++++++++++++ ...-pro-d3109a73b6d87d8103efae9f126590cb.yaml | 58 +++++++++++++++++++ ...-pro-f7fdc67eadf58def32919b2ae093d4d8.yaml | 58 +++++++++++++++++++ ...load-1145c2b3c9a783cc9ddbd56cf0e9e202.yaml | 58 +++++++++++++++++++ ...load-12655be83937ecd726e038deb4f658d4.yaml | 58 +++++++++++++++++++ ...load-12fc948c06bbe2558fcf0a602f5f480e.yaml | 58 +++++++++++++++++++ ...load-1d2216e58fa97236cb9e7bf56c440d7a.yaml | 58 +++++++++++++++++++ ...load-1ea0fe6e846ccbee16701a333d122fbe.yaml | 58 +++++++++++++++++++ ...load-257266db439be46c584223cbad6695eb.yaml | 58 +++++++++++++++++++ ...load-3384b3561233822afc35f30b762beb0e.yaml | 58 +++++++++++++++++++ ...load-392e3e13340828fa089ab176edcbfb0e.yaml | 58 +++++++++++++++++++ ...load-50251b72083cccfc7a4f498fee677478.yaml | 58 +++++++++++++++++++ ...load-558dd2abba5a0995e4e08d93b33b9766.yaml | 58 +++++++++++++++++++ ...load-6bee4ceb90dc1010814fe03431f27200.yaml | 58 +++++++++++++++++++ ...load-7723e642214a4cc19dd0a90f922c5611.yaml | 58 +++++++++++++++++++ ...load-8e67911649c9d62ea26bf9814db29d96.yaml | 58 +++++++++++++++++++ ...load-90d37fd2fba0470460729c814dc702e8.yaml | 58 +++++++++++++++++++ ...load-95115eb6cd7773daea0c3290d4bc4306.yaml | 58 +++++++++++++++++++ ...load-c497e96a3198128f634a2cba43cbd62b.yaml | 58 +++++++++++++++++++ ...load-c865a729c4dbcf73f4c0bf83297ccf74.yaml | 58 +++++++++++++++++++ ...load-e144ec17062b8eeed75efab5b0c01953.yaml | 58 +++++++++++++++++++ ...load-ee7a8e2edf67246d96fc10ab588599db.yaml | 58 +++++++++++++++++++ ...ader-4f06deea31f34880211b0c4ef80881fe.yaml | 58 +++++++++++++++++++ ...base-5624e3de57e88dce47b0f6296615cfd9.yaml | 58 +++++++++++++++++++ ...base-de989fc706fa629e883c0763f12184c4.yaml | 58 +++++++++++++++++++ ...base-e9c482adf3dbad1f07b295406e0bf073.yaml | 58 +++++++++++++++++++ ...ager-de2762b35b84b3a5bdda7739f2f6324a.yaml | 58 +++++++++++++++++++ ...udio-074487038ea654261d72956b1f3003fc.yaml | 58 +++++++++++++++++++ ...ayer-23ae728eb43f332c22abd8b17feda1e5.yaml | 58 +++++++++++++++++++ ...lock-d86c9fbec6faeed6e24c9e1120c7e0c6.yaml | 58 +++++++++++++++++++ ...menu-4aff32f6f1228de170ce7ff458bf1831.yaml | 58 +++++++++++++++++++ ...ybox-216ef8528cdb19a4a187eee0e2877db5.yaml | 58 +++++++++++++++++++ ...some-7e2bbcff98524a357bbf2e605454a087.yaml | 58 +++++++++++++++++++ ...some-cedcad8fb42c104219ce15d5179e2ec0.yaml | 58 +++++++++++++++++++ ...ager-af40b53dc8c1c75f92915027f96fff8f.yaml | 58 +++++++++++++++++++ ...ball-40f4199a368e88456e06377e7668ed2b.yaml | 58 +++++++++++++++++++ ...otes-a8ccc8e656f57b6f03393d18f5ac6d44.yaml | 58 +++++++++++++++++++ ...cast-ac7ff3acb8eeb83f868977100c1901f2.yaml | 58 +++++++++++++++++++ ...cast-f00922a5d35b3c6ca276e64048795ab0.yaml | 58 +++++++++++++++++++ ...tcha-67bff2c5d8fb36a5ed2e0ba46f102703.yaml | 58 +++++++++++++++++++ ...tcha-d806a63c536300d0b583cd9fc85457ce.yaml | 58 +++++++++++++++++++ ...tcha-f1e4ab77de69b73a462cc92d770eba6e.yaml | 58 +++++++++++++++++++ ...orum-3baacd5c535501f1e7c594d4e91f33bf.yaml | 58 +++++++++++++++++++ ...orum-6e024b27bbd5dc8c98695441370b8501.yaml | 58 +++++++++++++++++++ ...orum-a6e364da6e9eb1d449de394f7ac6c782.yaml | 58 +++++++++++++++++++ ...tain-5cd702313892426c4d5db9e30cd43042.yaml | 58 +++++++++++++++++++ ...-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...file-0ed606409f522ba3351ac7659014c32c.yaml | 58 +++++++++++++++++++ ...file-b37c0d0d71a59763b804ee0d533397e0.yaml | 58 +++++++++++++++++++ ...file-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...file-c8cceb90ecf899fbb284e13c71ee2405.yaml | 58 +++++++++++++++++++ ...file-fc6a57b91ab486b0b4aef62bb7676ee2.yaml | 58 +++++++++++++++++++ ...tory-94c180de31d25f5739b8f87267d3c1b7.yaml | 58 +++++++++++++++++++ ...ager-73b4a317dbf4f39375dbd58ae18a9d97.yaml | 58 +++++++++++++++++++ ...free-667e350f42b763781ac08f9d6c648e0b.yaml | 58 +++++++++++++++++++ ...free-75e488bcf8c81561792f2b21f5fbd763.yaml | 58 +++++++++++++++++++ ...free-c18b0aa1f2de13dec1ee3b9448c0e5ba.yaml | 58 +++++++++++++++++++ ...ndar-4d29004b4f45680a61808cd7f630a100.yaml | 58 +++++++++++++++++++ ...tion-62232a302f7fe9f8b0db43176a902970.yaml | 58 +++++++++++++++++++ ...ress-45b180f701bbda6c2ac66302babf8238.yaml | 58 +++++++++++++++++++ ...lite-815613664281ce9641a420b93ff49909.yaml | 58 +++++++++++++++++++ ...lite-91f81bae19c8e6b1e95305d25a17b6e0.yaml | 58 +++++++++++++++++++ ...lite-cdfacbb67934ca9294af25220e6a52b7.yaml | 58 +++++++++++++++++++ ...lite-e8cf37239a5b69d21791d9c5728d4701.yaml | 58 +++++++++++++++++++ ...rter-de0285827724428521077b71df2ee67d.yaml | 58 +++++++++++++++++++ ...abox-377dfbc1893c3f82b60d799556ea4360.yaml | 58 +++++++++++++++++++ ...ance-6e07c5d5d730f2ffaadc2b47ec323077.yaml | 58 +++++++++++++++++++ ...ance-7963dd486edaf4e2c2e742763011f365.yaml | 58 +++++++++++++++++++ ...ance-8501b849b0f302eafdaedb3a9eb077f6.yaml | 58 +++++++++++++++++++ ...ance-9a25bf02d1d516ebfa83ea0a4af36e6d.yaml | 58 +++++++++++++++++++ ...ance-d47084b590cbc795c568485d3590251a.yaml | 58 +++++++++++++++++++ ...core-97711fb53683ab26635f9b3f2754784c.yaml | 58 +++++++++++++++++++ ...core-ccf9bbc2066dab286ce4f7f98f9f46d7.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...r-md-37948e20cc8aeb00d7f629d9bf7d79ee.yaml | 58 +++++++++++++++++++ ...sary-782e75e9ade7cd09f2f9dfc0e07ecdf7.yaml | 58 +++++++++++++++++++ ...sary-c8baa9ed85af66dd4a921b8f2c5af1ac.yaml | 58 +++++++++++++++++++ ...maps-8f06cbf2f40450a7e41adaa2e12c5c0e.yaml | 58 +++++++++++++++++++ ...ents-cf4a1e3cd78f1384d3dc34cdb54fb3f8.yaml | 58 +++++++++++++++++++ ...onts-0bd9393f43d814fb82bad26dc2a66a03.yaml | 58 +++++++++++++++++++ ...onts-693e37cf0d606fc058da1d65dc80c30a.yaml | 58 +++++++++++++++++++ ...ugin-0677fc472ce6636d2560dd0fee27206d.yaml | 58 +++++++++++++++++++ ...ugin-0680dcfefb929cf836c59db202cd40da.yaml | 58 +++++++++++++++++++ ...ugin-09e6dfe7f784e608ed0fba91188d7274.yaml | 58 +++++++++++++++++++ ...ugin-4778c289f09f336f1a397e49c205f5e1.yaml | 58 +++++++++++++++++++ ...ugin-5237dfae31b24b8180bcd6193ab8bd7f.yaml | 58 +++++++++++++++++++ ...ugin-6a35bf1797897f8d13c75911c491ac65.yaml | 58 +++++++++++++++++++ ...ugin-70c01b9021b52ac03758d9968f42dcbe.yaml | 58 +++++++++++++++++++ ...ugin-7149f44d871608d660e807410983089b.yaml | 58 +++++++++++++++++++ ...ugin-7382281cd5a556c25b2c10e2b81ec2b8.yaml | 58 +++++++++++++++++++ ...ugin-73f135de232fc553a1861c313e9ab548.yaml | 58 +++++++++++++++++++ ...ugin-a5532d15dce91adaa57b29acc9d33bb8.yaml | 58 +++++++++++++++++++ ...ugin-ab2c33982fe57a3db954e28d388810a5.yaml | 58 +++++++++++++++++++ ...ugin-b619ff669f813db2e4bf72a01401c559.yaml | 58 +++++++++++++++++++ ...maps-019dd8c7d843763da77dfac2e01453aa.yaml | 58 +++++++++++++++++++ ...maps-2cd3d2328b9309d385778042d73c86e8.yaml | 58 +++++++++++++++++++ ...maps-363421e443d86bf6a03f6199bd5c6045.yaml | 58 +++++++++++++++++++ ...maps-3d197f1213a479cd13434bd580bc4732.yaml | 58 +++++++++++++++++++ ...maps-5938cf4c59a1d8ebf45c155344fba09e.yaml | 58 +++++++++++++++++++ ...maps-69657f4112d937c57fc4155d562b7525.yaml | 58 +++++++++++++++++++ ...maps-69aedfc905a5a0f0e668841416c424fd.yaml | 58 +++++++++++++++++++ ...maps-73bf56678d08f13f561affd2573b6e8a.yaml | 58 +++++++++++++++++++ ...maps-7b9a92238f85900b8c03567a6a71f188.yaml | 58 +++++++++++++++++++ ...maps-8a13eb8b9bb39899a8b48afee98189b2.yaml | 58 +++++++++++++++++++ ...maps-8c03b52626997e166cccabfb7426db2b.yaml | 58 +++++++++++++++++++ ...maps-9c83e22896300f312af778a1727c5b7c.yaml | 58 +++++++++++++++++++ ...maps-9fa457edab3267f4204b5dd4138a4aa0.yaml | 58 +++++++++++++++++++ ...maps-ea627a7f49b873c84bcdde34c37b25bd.yaml | 58 +++++++++++++++++++ ...maps-f4a3d95a0a4f34bdd233d89b3cc7dec8.yaml | 58 +++++++++++++++++++ ...-pro-622602817799a1869bfcc5c18c23392a.yaml | 58 +++++++++++++++++++ ...lish-1f645d98bf29f7b2e378ac42457eb0cd.yaml | 58 +++++++++++++++++++ ...lish-5bc39e042d909c5c804ae61b49719209.yaml | 58 +++++++++++++++++++ ...ider-12c0516e02b16dc0e022502178a348b1.yaml | 58 +++++++++++++++++++ ...ider-63e8aaca3bf1d75703f616e718360745.yaml | 58 +++++++++++++++++++ ...ider-8f14563b89ae2fb865ea87d5f251bc48.yaml | 58 +++++++++++++++++++ ...view-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ager-8a0f63d90f622470f02014f08a84be2f.yaml | 58 +++++++++++++++++++ ...inar-352c9721f769a69dbdfdbca5d48088a2.yaml | 58 +++++++++++++++++++ ...inar-7ef847bd47bcec43447f7d6368de1312.yaml | 58 +++++++++++++++++++ ...maps-2948a715e4c44d771b627432c9f5701c.yaml | 58 +++++++++++++++++++ ...maps-87f838d84fa79999236dcd79f1342013.yaml | 58 +++++++++++++++++++ ...phql-026295425673c504bf7857c72ec29c89.yaml | 58 +++++++++++++++++++ ...phql-3ce969cc21aaadf47f9f21f5d1e9275b.yaml | 58 +++++++++++++++++++ ...phql-57520ddea3aef158b3f4c190e8c7e07c.yaml | 58 +++++++++++++++++++ ...phql-b238fd34b5c3e924a09fd674d5421611.yaml | 58 +++++++++++++++++++ ...phql-b842e16402f90d1b3c5bd6bd8d47b010.yaml | 58 +++++++++++++++++++ ...phql-ffeca4920c42635f66f540ad7d4822e8.yaml | 58 +++++++++++++++++++ ...erce-bc8d13f34974a281819e2214a599c545.yaml | 58 +++++++++++++++++++ ...tify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...eets-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...tmap-25e2788cf757f6544d551ea3a1e2ff53.yaml | 58 +++++++++++++++++++ ...uppy-a903ab4eb75c172e6eca10c67cb489f2.yaml | 58 +++++++++++++++++++ ...ages-40e3027a5e804a97b0f46e2e4f30f502.yaml | 58 +++++++++++++++++++ ...lite-7a5eb553f654c8abb18f57d79b8b5c6d.yaml | 58 +++++++++++++++++++ ...lite-a7962c57d554ba3791bc1c180659f4a3.yaml | 58 +++++++++++++++++++ ...lite-b94cc0b7afe53c571ed57e681c321c40.yaml | 58 +++++++++++++++++++ ...lite-eb9d1a9f33f022abcf9d4898480aa085.yaml | 58 +++++++++++++++++++ ...hide-9e68449652754ef8472e39a728f388be.yaml | 58 +++++++++++++++++++ ...ices-d44a9e8c9bb990d8de78849d0af5d4fe.yaml | 58 +++++++++++++++++++ ...ages-0d6956dd795b21ad1b36b190e37feb8e.yaml | 58 +++++++++++++++++++ ...post-1f01b8aac13069c5d246c4165063f59f.yaml | 58 +++++++++++++++++++ ...ncer-7d8abe3c50b03fecc955bd5577c71ca3.yaml | 58 +++++++++++++++++++ ...ncer-abbf4b405ae85f6f94a6172993fba981.yaml | 58 +++++++++++++++++++ ...ijri-4daf2f8ba4a45a7e36fb255ce745667e.yaml | 58 +++++++++++++++++++ ...menu-1663017756a06282bb3d18d015739d82.yaml | 58 +++++++++++++++++++ ...show-086786b1308db5fa85a4991de8593d04.yaml | 58 +++++++++++++++++++ ...show-47a30f13a712f0b51de3660787ce6dab.yaml | 58 +++++++++++++++++++ ...king-1ca57b94b0c3924da7aeb6a7b470fb34.yaml | 58 +++++++++++++++++++ ...king-1dcd89bf2988fc6137fe33f02a552c95.yaml | 58 +++++++++++++++++++ ...king-75ba043cb8adfd31b0f166864fde485a.yaml | 58 +++++++++++++++++++ ...king-9d40d7d424169039478e2bac7970cbe4.yaml | 58 +++++++++++++++++++ ...king-b9f4dda3ee3f676f0c301784c74a1eb5.yaml | 58 +++++++++++++++++++ ...king-c965265cd81e4009a888757a2fe10108.yaml | 58 +++++++++++++++++++ ...king-da3e165cf3ef701df2ce9756df8e0a3e.yaml | 58 +++++++++++++++++++ ...king-e2b770c20c0fc55c7a4f89e727dd45de.yaml | 58 +++++++++++++++++++ ...king-f3912809d80374ed45475cdb257fbe88.yaml | 58 +++++++++++++++++++ ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...trol-4c313c7653b942a477e04e3a6c17f18a.yaml | 58 +++++++++++++++++++ ...wais-752b08f32f0cfee54f18be53421a36cb.yaml | 58 +++++++++++++++++++ ...mail-0d54afc8ed70fc0c6271f164073322bf.yaml | 58 +++++++++++++++++++ ...mail-29dfa6e3862f7e4332686362811dfe12.yaml | 58 +++++++++++++++++++ ...mail-a97999937eba2822f909f308d3c02136.yaml | 58 +++++++++++++++++++ ...mail-e6cee718e04226d8b1f750fff9c130ff.yaml | 58 +++++++++++++++++++ ...emap-817be9a0bd25037cf51f3d6111fd059e.yaml | 58 +++++++++++++++++++ ...sswd-f030486cf056eab3637611e650524a05.yaml | 58 +++++++++++++++++++ ...erce-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...stxt-e4bd7eea0fd05e8e2fe20b6f0c6b7046.yaml | 58 +++++++++++++++++++ ...lity-2d9904a0be3734fb0155be062ed61702.yaml | 58 +++++++++++++++++++ ...lity-e3f695a2140d0d6b1618f7ffa872601f.yaml | 58 +++++++++++++++++++ ...erce-f4d44f135652b4f97e23ce29c089eca6.yaml | 58 +++++++++++++++++++ ...usel-074f8cb869df86a1b6d64a4a39d460b8.yaml | 58 +++++++++++++++++++ ...ider-05168237faa874bd973125b39bd200d2.yaml | 58 +++++++++++++++++++ ...ider-2d5c1e4ab0db1f2ad3a139f4145f58ad.yaml | 58 +++++++++++++++++++ ...ider-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...izer-8b089becf530f93c37bff15846437ba4.yaml | 58 +++++++++++++++++++ ...show-b5617dec0fcbbbc761aa88231d94be83.yaml | 58 +++++++++++++++++++ ...ooom-11ece8e5656573afec625cc63879b1c5.yaml | 58 +++++++++++++++++++ ...ooom-fdc1c524e165c5f1685c267f450ebcb9.yaml | 58 +++++++++++++++++++ ...zoom-324709497ee87aa1c88e83eb2c996e98.yaml | 58 +++++++++++++++++++ ...zoom-3de3e5de16fc382e7b8fe56b08addd2e.yaml | 58 +++++++++++++++++++ ...lite-5f94fd73fc44e0e8d375d47e5fc1e6c1.yaml | 58 +++++++++++++++++++ ...lite-a9b4271e0f7289a56cd0261063f73943.yaml | 58 +++++++++++++++++++ ...erce-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...imat-62dc43c109e10a4fb2083be6c80b9766.yaml | 58 +++++++++++++++++++ ...ject-807cd0a33bfd97782e746e860be1d566.yaml | 58 +++++++++++++++++++ ...ject-9741c51413af2327faa27cd2e2fade6e.yaml | 58 +++++++++++++++++++ ...ject-eaace189d52939bb1c67d181a1aa5e03.yaml | 58 +++++++++++++++++++ ...sert-6cca6746a9736e02869580a9ebe96b4c.yaml | 58 +++++++++++++++++++ ...sert-c33e053383feb22bc4a0a09a68717fb4.yaml | 58 +++++++++++++++++++ ...bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...name-cfe80c2324444169a4424a703a8b6196.yaml | 58 +++++++++++++++++++ ...ance-be2ba6e35694514824b8df64e723158d.yaml | 58 +++++++++++++++++++ ...ator-ef0c35cfc8264d312ebd8c7577e88c19.yaml | 58 +++++++++++++++++++ ...lack-280619c8c575de4aa0faedb1d7908342.yaml | 58 +++++++++++++++++++ ...ager-363c3c176ac2ef6391bdaf79f83140e3.yaml | 58 +++++++++++++++++++ ...ager-52c7fb159214201f2c95219274f70ec6.yaml | 58 +++++++++++++++++++ ...ager-d6fda2db9aef5ee17aff3a1a9d5aae26.yaml | 58 +++++++++++++++++++ ...ager-da8ea76dfd26f4abbbdb294a05baca1e.yaml | 58 +++++++++++++++++++ ...oice-57a112bd1c50a2fbcdf02a29f1461095.yaml | 58 +++++++++++++++++++ ...oice-68ccb9bcad04a1c6dd8014a68d2d5fe9.yaml | 58 +++++++++++++++++++ ...oice-7137b8fac252650babdfc2fa8502b307.yaml | 58 +++++++++++++++++++ ...oice-875ad9422b6c5059d922fea2bec00a1f.yaml | 58 +++++++++++++++++++ ...oice-891def7bec49bf5ec54dedc52d9240f9.yaml | 58 +++++++++++++++++++ ...oice-916c5b9976a17729e06d1b6fb0458ebf.yaml | 58 +++++++++++++++++++ ...oice-e02e4d31cf49a5cf3437bdef98608b60.yaml | 58 +++++++++++++++++++ ...ager-249ae1950a1aba5232af2a232fae47b2.yaml | 58 +++++++++++++++++++ ...ager-778debf79e02e51fc617919e605d5f31.yaml | 58 +++++++++++++++++++ ...ager-a866bf8732fbf685f3dd9ae8b9f07dfa.yaml | 58 +++++++++++++++++++ ...ager-ab18ce3ab5c885047a8f794ed3023e87.yaml | 58 +++++++++++++++++++ ...ager-ad1a7b10885844b515902d55c9660f2d.yaml | 58 +++++++++++++++++++ ...ager-f05562fc94116db3e2f5dd9c7a1bb0d7.yaml | 58 +++++++++++++++++++ ...ings-e0b60cc25d6815b825cf11a25f942d5d.yaml | 58 +++++++++++++++++++ ...rtal-549d5bc8afbc0ac7d09fc136717ff89d.yaml | 58 +++++++++++++++++++ ...rtal-965d1bb3ea0dc7dd2bd7703dedecb0bb.yaml | 58 +++++++++++++++++++ ...rtal-a5de647c0bebb3ff3775ad99edcea819.yaml | 58 +++++++++++++++++++ ...rtal-b1effc0c53914bb4a1c16ea81ae4e1e7.yaml | 58 +++++++++++++++++++ ...rtal-f2a0a0a17a439c3fab0b66d207898f19.yaml | 58 +++++++++++++++++++ ...hunt-8605cf70b09f39b80921d3235eaa5a54.yaml | 58 +++++++++++++++++++ ...hunt-8b266025d0f3695c542ad07de2e9b34c.yaml | 58 +++++++++++++++++++ ...jobs-1a1e231870f2d36ae969bc3201047b95.yaml | 58 +++++++++++++++++++ ...jobs-b2a0f64728c134eb1a214207f2b340c0.yaml | 58 +++++++++++++++++++ ...arch-06bec6e8b710a7efd7b4113567911744.yaml | 58 +++++++++++++++++++ ...arch-0757689ccb9eb2501cdd998e2d1228fe.yaml | 58 +++++++++++++++++++ ...arch-0b45e780227d592e1f06fb820f3146b8.yaml | 58 +++++++++++++++++++ ...arch-32e08ef17f0f9f45149490d3fa9aaf1b.yaml | 58 +++++++++++++++++++ ...arch-485819fe9f0636879bb1f6cfba46a621.yaml | 58 +++++++++++++++++++ ...arch-493970b9d6651de9fd021a267048266d.yaml | 58 +++++++++++++++++++ ...arch-5e2c242003cfedf04505fc0b33fa0f84.yaml | 58 +++++++++++++++++++ ...arch-91fa130b7c3ea6431b231102505db7d5.yaml | 58 +++++++++++++++++++ ...arch-a75fd23fc24c5b8e6f032ef260fd0fc8.yaml | 58 +++++++++++++++++++ ...arch-a7b8efd454ece6d5c8233c73f0d61099.yaml | 58 +++++++++++++++++++ ...arch-a81ba5cd5b7c78f82a652995b8b78367.yaml | 58 +++++++++++++++++++ ...arch-ab32f6a94ae805ae0f774665898eaf69.yaml | 58 +++++++++++++++++++ ...arch-e1e8b509fbe86c6565ac6936dc65e181.yaml | 58 +++++++++++++++++++ ...p-js-6c30c87bb2fee4db66c7047f9fb31811.yaml | 58 +++++++++++++++++++ ...info-0d9b0b8cf0e1e0917d4472d07a7d609b.yaml | 58 +++++++++++++++++++ ...menu-9a1755a05c804d6305bb91e5146a62c4.yaml | 58 +++++++++++++++++++ ...link-f68af0f4ef5270237a2dac4a79c88b36.yaml | 58 +++++++++++++++++++ ...base-fe2e1db48888e950bcc3a91fea1678a4.yaml | 58 +++++++++++++++++++ ...info-524d5feb3bdf1faf2643f61f231563b9.yaml | 58 +++++++++++++++++++ ...osts-2f5edb5bb8d4702a159f34742943af0d.yaml | 58 +++++++++++++++++++ ...osts-ebb04d83edca666591b8c2ebf9b4b8bd.yaml | 58 +++++++++++++++++++ ...ream-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-css-378840583bbe122d719ad92f2c75681f.yaml | 58 +++++++++++++++++++ ...-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-ssl-f5a7556a27575fd8d1312f715924210f.yaml | 58 +++++++++++++++++++ ...show-5088078af30c234ceab9ea2c99baf901.yaml | 58 +++++++++++++++++++ ...show-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...show-99ce085e8b4d878765e949a7f07f6195.yaml | 58 +++++++++++++++++++ ...ox-2-9d391b643840d9b9d7ead6e546f2d7b1.yaml | 58 +++++++++++++++++++ ...tpop-7ceecb4a33f59ca62a5f2246eb0be6e8.yaml | 58 +++++++++++++++++++ ...tton-00aa1f64cb2e6c80b8a5546f8e6d1be0.yaml | 58 +++++++++++++++++++ ...tton-d25b2870a2ba1a71b2f08074d958c754.yaml | 58 +++++++++++++++++++ ...tton-d4b7dbaa3f20ba708731c645b0814aa7.yaml | 58 +++++++++++++++++++ ...mpts-03550082734f798d8bdd156b8cc8a2c2.yaml | 58 +++++++++++++++++++ ...mpts-6a540f27193664ae64c1c9c67379218b.yaml | 58 +++++++++++++++++++ ...mpts-a7118940def94872d54ec018ff1c6fc1.yaml | 58 +++++++++++++++++++ ...mpts-6811a32eecdf5ce987fe449d57d50384.yaml | 58 +++++++++++++++++++ ...mpts-b0713874d1e1aea3108651f256578abe.yaml | 58 +++++++++++++++++++ ...ally-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml | 58 +++++++++++++++++++ ...mits-f3e27a924e055b88af7811293412cc67.yaml | 58 +++++++++++++++++++ ...tify-b546805f046a6ab76ad9842bd21444bd.yaml | 58 +++++++++++++++++++ ...-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lish-e30e15a9c4996773efb6051e3f90c9c4.yaml | 58 +++++++++++++++++++ ...page-c714b4c448de917cbe9dde73273b4f80.yaml | 58 +++++++++++++++++++ ...page-e52be0435f55047670368cd34b580535.yaml | 58 +++++++++++++++++++ ...azon-178c8e00fd5bfb5400710e1fa21e320a.yaml | 58 +++++++++++++++++++ ...azon-6cd99d073813881160ae0f456cc4a754.yaml | 58 +++++++++++++++++++ ...azon-fbce84a8ee57be3789217c9b7a75a712.yaml | 58 +++++++++++++++++++ ...ebay-1691930e201b6c9ce529fab20806ab3a.yaml | 58 +++++++++++++++++++ ...ebay-d5ae4878a4d320a4dee3c301e3085c64.yaml | 58 +++++++++++++++++++ ...ebay-dc87f7ad02889b2fba3b573d8f507b49.yaml | 58 +++++++++++++++++++ ...ings-1732e4e08bdb234132d824677ffb996f.yaml | 58 +++++++++++++++++++ ...ings-828d5e38dbe1047738a24a003f9a3134.yaml | 58 +++++++++++++++++++ ...ings-c94bdab6658e87ec5036df9af1fd3f36.yaml | 58 +++++++++++++++++++ ...ress-614cced2da1395e72b78e478d2060077.yaml | 58 +++++++++++++++++++ ...ress-7695d17d2a6f043e2b7067503447a869.yaml | 58 +++++++++++++++++++ ...port-0afdcc5a66b8604c315ccd15a101d49e.yaml | 58 +++++++++++++++++++ ...port-1006dbdfc9efb098ea5160eab40a333c.yaml | 58 +++++++++++++++++++ ...port-18d01dbad64386da194504c3f5ffe26e.yaml | 58 +++++++++++++++++++ ...port-245c40ef7971bdcc79b4668a4d4b1ccf.yaml | 58 +++++++++++++++++++ ...port-39656d176cfde17eb173675dd34ae675.yaml | 58 +++++++++++++++++++ ...port-3ae5086ca70170003dc9a3bdb44eba92.yaml | 58 +++++++++++++++++++ ...port-423d9d2c6628472db1ad6145d184fab1.yaml | 58 +++++++++++++++++++ ...port-5b3f76eca7d765ff7782b4367d966247.yaml | 58 +++++++++++++++++++ ...port-66eb7f5c446de79e267dceb74a880097.yaml | 58 +++++++++++++++++++ ...port-74010eb8fa617d9fb39895a55a268c3c.yaml | 58 +++++++++++++++++++ ...port-84da1bcb85beb132b593a5fff336db83.yaml | 58 +++++++++++++++++++ ...port-875e2588a6c7f11db1b0d18dfa5a3b24.yaml | 58 +++++++++++++++++++ ...port-ac9a4353796cc2c432e6ec8cb3e235d2.yaml | 58 +++++++++++++++++++ ...port-b1af204538776bc3f4caa86c078ec978.yaml | 58 +++++++++++++++++++ ...port-e810e3355fe67bdcfcad0632d29d1e56.yaml | 58 +++++++++++++++++++ ...-pro-5dad5dd2cab63732345a28406c0429ec.yaml | 58 +++++++++++++++++++ ...-pro-f4c8de2dff39667b20d17f36ad03ed25.yaml | 58 +++++++++++++++++++ ...e-tv-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ephp-9088cbacca16ddb298ad417146be5fc5.yaml | 58 +++++++++++++++++++ ...rect-73c1cd9e5bfe098bfeb3d4b81b96f05b.yaml | 58 +++++++++++++++++++ ...-box-1b107fac39fc60c6674fcf9f0d2a0f84.yaml | 58 +++++++++++++++++++ ...tory-d5419bc1feddd2eafb9324b9b87684d7.yaml | 58 +++++++++++++++++++ ...case-99abe0055e8aeebf770fa9b05612b4e1.yaml | 58 +++++++++++++++++++ ...ider-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...ebox-cda07eafd840bbbfe97d5dd1471777f9.yaml | 58 +++++++++++++++++++ ...bank-7bbbf63e0874145284bff009623a4860.yaml | 58 +++++++++++++++++++ ...cher-2f15c2e1797d3dce53478e732579afa9.yaml | 58 +++++++++++++++++++ ...cher-3aca48d71f7f1c4be4b57fb19e19bd9d.yaml | 58 +++++++++++++++++++ ...cher-6c96ae1b407264caa660411d1fa4575c.yaml | 58 +++++++++++++++++++ ...cher-e5e442420905170833a6af8d927d5a01.yaml | 58 +++++++++++++++++++ ...mail-cfbf975d1c5266eb2e6c08324dadc438.yaml | 58 +++++++++++++++++++ ...-log-179315a1d6d0707060d355a5241e7195.yaml | 58 +++++++++++++++++++ ...-log-31c57eb5baf7bb0acd957fca651b5df2.yaml | 58 +++++++++++++++++++ ...-log-74effda90864a740ff398e9c12c52b1c.yaml | 58 +++++++++++++++++++ ...-log-8be88bbbbf187ed081686352f66fd170.yaml | 58 +++++++++++++++++++ ...-log-95ff4ff837620d6ea480a2d73422a590.yaml | 58 +++++++++++++++++++ ...-log-e4f7324bab65bcd3d88d8e669baede29.yaml | 58 +++++++++++++++++++ ...-log-fe1c7e5641b372bf56ee629133d6f4e5.yaml | 58 +++++++++++++++++++ ...ging-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...ging-642e4603076cf5b4473a13c75fbb4249.yaml | 58 +++++++++++++++++++ ...ging-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ging-d4ae66d5784ee57fd8bb24dc427e9062.yaml | 58 +++++++++++++++++++ ...ging-e516ec301b4cffad1129ddeea6a2940a.yaml | 58 +++++++++++++++++++ ...ging-e597c8ed0035e8185b143a4799be8f2d.yaml | 58 +++++++++++++++++++ ...smtp-1f2e61c0dd580a01c313ec65237451a6.yaml | 58 +++++++++++++++++++ ...-pro-da10288b29dd37bfe67b8eab58492860.yaml | 58 +++++++++++++++++++ ...ster-6435ffbe89f0f4a16cb704e9095f5d40.yaml | 58 +++++++++++++++++++ ...inks-d9f0423766ca387f95476b5cd1e1b1e4.yaml | 58 +++++++++++++++++++ ...ilup-5be3d6220be540ab529a6f616f5316f8.yaml | 58 +++++++++++++++++++ ...ilup-74a3eb8891dcef7e1892db3c005e178d.yaml | 58 +++++++++++++++++++ ...ance-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml | 58 +++++++++++++++++++ ...ance-aab671eab1f3a35319bc119c20a62b84.yaml | 58 +++++++++++++++++++ ...ance-d9b09bd810ab52f398f0afdd79c897af.yaml | 58 +++++++++++++++++++ ...ance-e8d379239814ced6a5f09013cbb811b8.yaml | 58 +++++++++++++++++++ ...mode-12a42b489a4f41309029bce2b7df59b4.yaml | 58 +++++++++++++++++++ ...mode-18112388a9914d1cf0c8f86d0f31e148.yaml | 58 +++++++++++++++++++ ...mode-27c270156b5cf78eb4bb31035b7f5db8.yaml | 58 +++++++++++++++++++ ...mode-92df025ccfa89a1351393b8f44caea90.yaml | 58 +++++++++++++++++++ ...mode-a8309537878561527873c9aaba1b29f6.yaml | 58 +++++++++++++++++++ ...mode-c03b6eeac707e2faa28a70a9e28fd5e0.yaml | 58 +++++++++++++++++++ ...mode-f508bbced58788f18196a525afb794c1.yaml | 58 +++++++++++++++++++ ...tion-7393cd06bd9f0a8e6b160ee1e40091a1.yaml | 58 +++++++++++++++++++ ...tion-9a4983ebf76516d5539ccc05a21c897b.yaml | 58 +++++++++++++++++++ ...tion-acbdf3cc478f1988c5c3adc520bf6766.yaml | 58 +++++++++++++++++++ ...tion-dc3b48b4dca1bdc6da00b0dd6c2512e9.yaml | 58 +++++++++++++++++++ ...ncao-a9cc9d2366f33cd5741768b12deb923f.yaml | 58 +++++++++++++++++++ ...lock-5b50465ae2f78659823d6ff4bd2ffc8a.yaml | 58 +++++++++++++++++++ ...pain-85d2798dcbad09cd3df8222f6cc3a39d.yaml | 58 +++++++++++++++++++ ...apit-76a5d195529e4a00633fd456330950cc.yaml | 58 +++++++++++++++++++ ...ions-17e239a9a613785a57f9dff8c47dabbc.yaml | 58 +++++++++++++++++++ ...ions-2d0f997ee92e7b6c06625a4a937305f5.yaml | 58 +++++++++++++++++++ ...ions-d18e40088a787bdccb931530c8848277.yaml | 58 +++++++++++++++++++ ...rade-923b7799c6c4b8b6606ee152480bc325.yaml | 58 +++++++++++++++++++ ...size-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...size-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...ment-5a3ba228c7ef68acd338809eb5946660.yaml | 58 +++++++++++++++++++ ...aner-ee67de5781e7fd9c2318027f775c66d6.yaml | 58 +++++++++++++++++++ ...lder-1196705650803cf1c8c204bb4b542a25.yaml | 58 +++++++++++++++++++ ...lder-2da7a3f2515edfb050506d62d2d86fdd.yaml | 58 +++++++++++++++++++ ...lder-a0b0c399b7514c70fcf0e05e68ca4408.yaml | 58 +++++++++++++++++++ ...ries-5a62a90392d8e5e62d1e1ad4b9531478.yaml | 58 +++++++++++++++++++ ...ries-9fd777f73c4ef625b6fdbf9d8363a65e.yaml | 58 +++++++++++++++++++ ...ayer-cf07672d5cc5a9d43b461f631786b4cf.yaml | 58 +++++++++++++++++++ ...menu-c6355382690553750aa0f80495721ab6.yaml | 58 +++++++++++++++++++ ...bers-00ca2c99ad053400f72b1ad04cedfa49.yaml | 58 +++++++++++++++++++ ...bers-0a288cfd79394a91cc2f2e98f7ebe8f7.yaml | 58 +++++++++++++++++++ ...bers-7700c6b035beec7a0abef5d3cdd6b1cf.yaml | 58 +++++++++++++++++++ ...bers-927acdfb36c0f4e522e79fd5612163d3.yaml | 58 +++++++++++++++++++ ...bers-a980d40221670f484b92312f4acbd125.yaml | 58 +++++++++++++++++++ ...bers-ceb215b10a19ec9d161edd4eed36fac8.yaml | 58 +++++++++++++++++++ ...bers-dcbc79daa691cad653de67a9ff1a5707.yaml | 58 +++++++++++++++++++ ...bers-e2f5ffd9a4d18c5b5627131fa4317643.yaml | 58 +++++++++++++++++++ ...bers-e3501204b93612b8ff957cf7e1036632.yaml | 58 +++++++++++++++++++ ...ship-398e2e434c59ceafeecf5e603168a0d7.yaml | 58 +++++++++++++++++++ ...ship-a284426b60f71419209b182f0b3fc61e.yaml | 58 +++++++++++++++++++ ...ship-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 58 +++++++++++++++++++ ...mory-da896910a5cacf8279e4d7de14e16a7d.yaml | 58 +++++++++++++++++++ ...mory-e5755ab6ce28e69bf31d165e7430384a.yaml | 58 +++++++++++++++++++ ...cart-3600d02bff1e230933e1bf9df683d80b.yaml | 58 +++++++++++++++++++ ...over-9a466e34216ffe71aad25917ff6bfb32.yaml | 58 +++++++++++++++++++ ...over-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...over-d52eb2dcb52eaf5c45a9c76db66b7765.yaml | 58 +++++++++++++++++++ ...lter-320c57cb813e49326995b9fd67784965.yaml | 58 +++++++++++++++++++ ...lter-388ffda3d201191cb375824a74d92ffc.yaml | 58 +++++++++++++++++++ ...lter-407035e57e51b9b24244b7b6677f36c6.yaml | 58 +++++++++++++++++++ ...lter-412021edf597308d1e073bd0f08f6dda.yaml | 58 +++++++++++++++++++ ...lter-4f95fbf5d542e431aaee4d569011a0a0.yaml | 58 +++++++++++++++++++ ...lter-6028fbb33888953a639d7f4fdb105b84.yaml | 58 +++++++++++++++++++ ...lter-74e2cca43a241e929e4d02ce42179766.yaml | 58 +++++++++++++++++++ ...lter-a210c90325ac6434534abb97976ad7c8.yaml | 58 +++++++++++++++++++ ...lter-cd3ec729b30fa6c24f2c8dc5202be75f.yaml | 58 +++++++++++++++++++ ...-seo-051ffefc51104be6bb17d2b5cf41b941.yaml | 58 +++++++++++++++++++ ...-seo-2e08f88f4d646fb37132bf634ea9d86a.yaml | 58 +++++++++++++++++++ ...-seo-2f2d8b93ad701e19ec6f3207f936eef8.yaml | 58 +++++++++++++++++++ ...-seo-48db89bfccb085b8a9e9bacdc76c0af1.yaml | 58 +++++++++++++++++++ ...-seo-8315a66d2bff25e165368a9ba5b2cd91.yaml | 58 +++++++++++++++++++ ...-seo-853440dc6a0bac372d49c0a52406c979.yaml | 58 +++++++++++++++++++ ...-seo-8f211e542f6f3ea8f0872b9525089564.yaml | 58 +++++++++++++++++++ ...-seo-9ba2b29c37ba8aee356eadac5eafa36d.yaml | 58 +++++++++++++++++++ ...-seo-a77598a8619865ebfa5a440835fd61e6.yaml | 58 +++++++++++++++++++ ...-seo-b140b905bbbe2df2a34bd620d01bfe72.yaml | 58 +++++++++++++++++++ ...-seo-b8cc5900239df821d12d0c9f9351444a.yaml | 58 +++++++++++++++++++ ...-seo-c8739a5f40e6869f84a528bbf32f369f.yaml | 58 +++++++++++++++++++ ...-seo-c9a67836be647194b958b42b1afed33a.yaml | 58 +++++++++++++++++++ ...-seo-eb91f445c10e82b7c3e98be1062a0e24.yaml | 58 +++++++++++++++++++ ...teor-a24478d45a578be442865b8c295c465f.yaml | 58 +++++++++++++++++++ ...teor-e8d8c624f6e6d23d2dff82c9385b3265.yaml | 58 +++++++++++++++++++ ...logs-a4cab622005282169cece09a74ca7822.yaml | 58 +++++++++++++++++++ ...-pro-94e62ec82b514bdceccaf12bf9504a39.yaml | 58 +++++++++++++++++++ ...ator-0db6e70cdcdc7229b4099d9f0f9133ae.yaml | 58 +++++++++++++++++++ ...ator-4b9b30de695a6c7d318c6f418b6450d0.yaml | 58 +++++++++++++++++++ ...ator-766e921c63902196b3dd14a962737125.yaml | 58 +++++++++++++++++++ ...ator-9cffec44ea772b6c67672a3ffd4bf0f4.yaml | 58 +++++++++++++++++++ ...ator-beccbd5d983b56da7098c3b6df8c3b57.yaml | 58 +++++++++++++++++++ ...ator-f9b95c5df8218e5c27a0db54debfd7c6.yaml | 58 +++++++++++++++++++ ...ayer-4c9bbb5092eaa29d7b825a0537618beb.yaml | 58 +++++++++++++++++++ ...ayer-c27c7bc4ca057439f5c832171e19b8eb.yaml | 58 +++++++++++++++++++ ...-mlm-1d57464ff64efe2d03c6cb93be9a6afe.yaml | 58 +++++++++++++++++++ ...-mlm-7ab1b8001b5218efd4de7d54884624ea.yaml | 58 +++++++++++++++++++ ...tion-85ff2c77617a0afcf489782fd73dc851.yaml | 58 +++++++++++++++++++ ...ctor-b8f1b94a4c4fb9902f110573ce1ff5a4.yaml | 58 +++++++++++++++++++ ...ctor-f753e4eb4ef42bb2c3d71aa325c61612.yaml | 58 +++++++++++++++++++ ...-mon-18d17e555e96ada9756147d2b8dcb4f4.yaml | 58 +++++++++++++++++++ ...lisa-4a1f8595afbd88494aea9ace0d288d1b.yaml | 58 +++++++++++++++++++ ...mpdf-587a081cbf30acea89ba24ccbad04bdd.yaml | 58 +++++++++++++++++++ ...mpdf-d805f3809c5645b75249ec0ee72ac4c8.yaml | 58 +++++++++++++++++++ ...nput-5efd2ce0ed5c8f6b3ada49f2773bc973.yaml | 58 +++++++++++++++++++ ...ator-f8b65cf3e0a27eff31bc4c61ee628d1e.yaml | 58 +++++++++++++++++++ ...pier-600f23cea45d49c9fbecd578c78ad87f.yaml | 58 +++++++++++++++++++ ...pier-f964c84de99e9a1b22168e1a03305b04.yaml | 58 +++++++++++++++++++ ...-pro-b01e4229acbf8d04a3ea8a3add02fd51.yaml | 58 +++++++++++++++++++ ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ages-1f2c3201ce6430a901ea9b9ce7fb0cee.yaml | 58 +++++++++++++++++++ ...ages-2628ec35fd0d634f503face1acac9f3d.yaml | 58 +++++++++++++++++++ ...ages-45c1e4dae128391ea2cc462d89ea9873.yaml | 58 +++++++++++++++++++ ...ages-a1585fbfbb722da035628da67638c64a.yaml | 58 +++++++++++++++++++ ...ages-a5430dc528533c2edeaccbfbb9028a8f.yaml | 58 +++++++++++++++++++ ...ages-fa85581f8faec8e54a152a5a0efaf823.yaml | 58 +++++++++++++++++++ ...zine-444a6d6c5748b1105adf9f2574afc368.yaml | 58 +++++++++++++++++++ ...inks-e8487dc3f356aea666909141340ca69c.yaml | 58 +++++++++++++++++++ ...inks-e9f11c328847b06004cf712b0d79f902.yaml | 58 +++++++++++++++++++ ...pnlh-e4874305a11ba506fee5f820a68e7e63.yaml | 58 +++++++++++++++++++ ...bell-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-oer-3eb3affb644d24e715bf8fc2c2551c12.yaml | 58 +++++++++++++++++++ ...fers-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cart-57987a7ef285cce42daf7bbeebe78cfc.yaml | 58 +++++++++++++++++++ ...-map-a2b96140a75a31f47368cade76c6e421.yaml | 58 +++++++++++++++++++ ...ours-59655d2ccadb8aa0cfd1aeca8138f97d.yaml | 58 +++++++++++++++++++ ...ours-acd8ba84e60cbc0f092ddfff82c451e8.yaml | 58 +++++++++++++++++++ ...t-in-1045ae974bdd8bcaee8ec5d4a243aff7.yaml | 58 +++++++++++++++++++ ...mize-4393e503b4c5e360e86d4cf75de99b91.yaml | 58 +++++++++++++++++++ ...mize-e272d49a412192b851a22b514c20a44d.yaml | 58 +++++++++++++++++++ ...heel-411b8509491892139820c81fdaf43572.yaml | 58 +++++++++++++++++++ ...path-40022e8f0d8dd6d5dda3b842e2bc95ed.yaml | 58 +++++++++++++++++++ ...ator-73f67eef9808ee2307cc661b7742b37f.yaml | 58 +++++++++++++++++++ ...bers-ff4872dcc815f541fc27c739fcf1dea7.yaml | 58 +++++++++++++++++++ ...lone-f6874af8a1671c63716fd288efc17414.yaml | 58 +++++++++++++++++++ ...dget-55f93685840531332a73837cca77e23f.yaml | 58 +++++++++++++++++++ ...dget-62e712c4c51e2629997a1a286dd08453.yaml | 58 +++++++++++++++++++ ...lder-1b7c0478a7036329e96c3ed903574a31.yaml | 58 +++++++++++++++++++ ...lder-3e7f60a3df49d0f7fb4057d158598ecf.yaml | 58 +++++++++++++++++++ ...lder-a43b3bc12796ff1c85d44370263684f7.yaml | 58 +++++++++++++++++++ ...lder-dcd836cebf0e20586e7baffdfe54c10c.yaml | 58 +++++++++++++++++++ ...nate-2cf1a19662092e1fd3d184af328e1b57.yaml | 58 +++++++++++++++++++ ...nate-ac056be778ddfca7dda3b1e72c3f8315.yaml | 58 +++++++++++++++++++ ...date-2692648b62c683c1169af33c43d304ff.yaml | 58 +++++++++++++++++++ ...-pay-d4e69b9467d19a12ce87ff85410a8c01.yaml | 58 +++++++++++++++++++ ...form-899cd60c14dae78cdc6100d2ac624744.yaml | 58 +++++++++++++++++++ ...form-b1068b6e2a026b74220f30a25a306c1a.yaml | 58 +++++++++++++++++++ ...ypal-f591ec3fd6349f415ea113a1e0a8f96c.yaml | 58 +++++++++++++++++++ ...-pay-0b2d1a45be009b6e70cf642e2a8cf8b0.yaml | 58 +++++++++++++++++++ ...ator-c703a061b8844fae5d93d775fc4ecbe8.yaml | 58 +++++++++++++++++++ ...ople-1077c15755f408817e721c74b28ad3a7.yaml | 58 +++++++++++++++++++ ...ster-b7c469773d7593a7dd075aebd86fb19a.yaml | 58 +++++++++++++++++++ ...ogin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...otos-f9cd598e625ead7b114953b55ded2f31.yaml | 58 +++++++++++++++++++ ...plus-1738a4677acfcf43b6595c38e083bc1c.yaml | 58 +++++++++++++++++++ ...plus-1a15d3860222a3fd81a5cd2f0cd29cc3.yaml | 58 +++++++++++++++++++ ...plus-20a2e4a6290983370284d76170f55741.yaml | 58 +++++++++++++++++++ ...plus-669581ec1a30e7b96468876d795acc3e.yaml | 58 +++++++++++++++++++ ...plus-6e313c2d32fa44151bb5398004b93815.yaml | 58 +++++++++++++++++++ ...plus-8ca87aad5255d876a5c1cfa42d199cb3.yaml | 58 +++++++++++++++++++ ...plus-9cb518fd50dfbf2df48bad0ade9b992b.yaml | 58 +++++++++++++++++++ ...plus-b3f583df01b20215cf8c32eded7781af.yaml | 58 +++++++++++++++++++ ...plus-b6b6c7434231029039b20df85b5959db.yaml | 58 +++++++++++++++++++ ...plus-e0955365088800798455704629f84855.yaml | 58 +++++++++++++++++++ ...ects-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ects-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...r-50-6068fa535a8253f59a90a4115ac59459.yaml | 58 +++++++++++++++++++ ...dget-744495d3ff838bb26ab75ce1cff94317.yaml | 58 +++++++++++++++++++ ...sion-2dede50337ae844885c0bf328702828d.yaml | 58 +++++++++++++++++++ ...sion-8d1c748e2defc5d91fbb1dd267386d44.yaml | 58 +++++++++++++++++++ ...mage-453e6aa482844b66a1b60332d0011a80.yaml | 58 +++++++++++++++++++ ...atic-9c4aad914c8baa77edd573a5d1dca1f4.yaml | 58 +++++++++++++++++++ ...ipes-a48d0e7d0d0abab8208c9ac988b86701.yaml | 58 +++++++++++++++++++ ...ipes-d7894fe3e27e0eed0959b050f56097d8.yaml | 58 +++++++++++++++++++ ...iwik-011e9219619a7fcb5d0b0fb47e00200b.yaml | 58 +++++++++++++++++++ ...iwik-26274ac2ac485b632b4597df6467189e.yaml | 58 +++++++++++++++++++ ...iwik-2cdd87e3f80dc46e464c425f1498ee45.yaml | 58 +++++++++++++++++++ ...iwik-59221c8c4cf4b83ed678f38b12740d87.yaml | 58 +++++++++++++++++++ ...iwik-9872ae4cefad3c4ed3119e4c32d1b891.yaml | 58 +++++++++++++++++++ ...anet-b888730346b1af7ed35cfb04de015b09.yaml | 58 +++++++++++++++++++ ...otly-2304e691feb866a99a567fd410649f69.yaml | 58 +++++++++++++++++++ ...otly-9098123c91e037cb8b4722ce5e0246b6.yaml | 58 +++++++++++++++++++ ...card-25b6bae2090d69c4b65ae56919567a18.yaml | 58 +++++++++++++++++++ ...ster-7ae4b63767ade919d8f9b4392d05e652.yaml | 58 +++++++++++++++++++ ...ager-a447458eea9f44bc06114a67289afadc.yaml | 58 +++++++++++++++++++ ...urls-d20347ab3694d4969b9a9d128b6ebd42.yaml | 58 +++++++++++++++++++ ...itic-1981b0b53f874fc3ac5cfb1e486c1b8b.yaml | 58 +++++++++++++++++++ ...poll-65871570265ff3cbf8c9f9629c5ab326.yaml | 58 +++++++++++++++++++ ...poll-b72d7e0205356324b67801ccf623ea08.yaml | 58 +++++++++++++++++++ ...olls-228a265800d06a8158d2945ad50b57f5.yaml | 58 +++++++++++++++++++ ...olls-72b547593d28ba78083c2d30dcb45b59.yaml | 58 +++++++++++++++++++ ...olls-a90ac74b16b2e57f70d959075904445d.yaml | 58 +++++++++++++++++++ ...olls-bc43778c342efbd129c6364212fbe04d.yaml | 58 +++++++++++++++++++ ...olls-d279c90e5e616e3125c9a657ba8ab939.yaml | 58 +++++++++++++++++++ ...ners-10b51d35ae6aafbea477ae24a9c22ccc.yaml | 58 +++++++++++++++++++ ...ners-92d1ed4c27e6f1a39ae5c39770d54c23.yaml | 58 +++++++++++++++++++ ...lder-aad2940a7ed6f57fa5fd0a2a1f283a4d.yaml | 58 +++++++++++++++++++ ...lder-c232fc614c70c66e672cbac2a32ca9cd.yaml | 58 +++++++++++++++++++ ...lite-2aa273895136d445a6cf0ea6a1d06c8e.yaml | 58 +++++++++++++++++++ ...lite-3f71ab9bea10d44c97baaae5fd797060.yaml | 58 +++++++++++++++++++ ...lite-44f42e89daa3749af5c9d461caa7bbaa.yaml | 58 +++++++++++++++++++ ...lite-690de1b98dd30a46cb8901aa5c2f16aa.yaml | 58 +++++++++++++++++++ ...lery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...thor-b3367042bf6f7f08c7f7fe623f66bded.yaml | 58 +++++++++++++++++++ ...thor-bdfab040be8b5ddc53b63b2720a5db99.yaml | 58 +++++++++++++++++++ ...thor-de2cc205752867abbe773a0b92ad0ea7.yaml | 58 +++++++++++++++++++ ...lock-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...umns-2e27bbe1226fc43e3aceee610de45550.yaml | 58 +++++++++++++++++++ ...ting-872e77979f08b8dfa6cf8411f0e84c8f.yaml | 58 +++++++++++++++++++ ...imer-1387aa003d8d347fdc448b66fea447f4.yaml | 58 +++++++++++++++++++ ...tend-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml | 58 +++++++++++++++++++ ...odal-8e3b2acb0664262c6a53a39a282fbea3.yaml | 58 +++++++++++++++++++ ...lone-2d87c0364307edea9fea6b2a2be6834f.yaml | 58 +++++++++++++++++++ ...lone-477f1ad4dc386cbc51b27ed2633fd23f.yaml | 58 +++++++++++++++++++ ...tics-67f1d03c366ffc7cf370449f40680bad.yaml | 58 +++++++++++++++++++ ...ling-4746a61d808453b3b90542c6699809d7.yaml | 58 +++++++++++++++++++ ...-pdf-e97d01552bb2ae8d753dbf0013cb0c0b.yaml | 58 +++++++++++++++++++ ...ings-230dca5ad7a4f65f364511571d38f472.yaml | 58 +++++++++++++++++++ ...ings-421d9d9506623e25232b233cfeaf22ca.yaml | 58 +++++++++++++++++++ ...ings-8dec592932911140013173fa65adb3b3.yaml | 58 +++++++++++++++++++ ...ings-ac814100e213d264685a18f0bee470c2.yaml | 58 +++++++++++++++++++ ...turl-544ee7aee750c4df26fe7f3c5d3e9353.yaml | 58 +++++++++++++++++++ ...iews-888312a64923f43849174a79d906913e.yaml | 58 +++++++++++++++++++ ...tats-d2359b1121bed9933888a9df14ebd74e.yaml | 58 +++++++++++++++++++ ...lery-3fd0f15662f38cc8cf4de2e9cf15e403.yaml | 58 +++++++++++++++++++ ...lery-4d6fdc24cec05dab8e1448ebdf64ba23.yaml | 58 +++++++++++++++++++ ...lery-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...lery-f8194d7ca5455df0340759073541f5a7.yaml | 58 +++++++++++++++++++ ...ayer-83bea5d4bb17e709cec571f15c9f09ce.yaml | 58 +++++++++++++++++++ ...ayer-93817db5fd5a790f9a8413665f75bc03.yaml | 58 +++++++++++++++++++ ...ayer-c57cd7bd5b015a60858f3a01ad1d45ea.yaml | 58 +++++++++++++++++++ ...ayer-fc6f44579727101979a58b50043c9f62.yaml | 58 +++++++++++++++++++ ...rint-b73d87f96280b93d84cc00f272e356ef.yaml | 58 +++++++++++++++++++ ...ndly-07ab0ae27a6f3fee8bb775502300d8a3.yaml | 58 +++++++++++++++++++ ...ndly-82ee0ecca0569c5ee6149d011bc22c2e.yaml | 58 +++++++++++++++++++ ...plus-13ab88959bcdd9c68f7d9d04453c2d2d.yaml | 58 +++++++++++++++++++ ...plus-aed641f4c8c8fbdbffc5591e24cc25c4.yaml | 58 +++++++++++++++++++ ...plus-d5107af4decc8fb0ccbe36135deb72d1.yaml | 58 +++++++++++++++++++ ...plus-ed06ada3e2d61861fecb8610e5d7a1ac.yaml | 58 +++++++++++++++++++ ...edia-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...sage-f96de744475c9f8a69cb4acf328a0bc2.yaml | 58 +++++++++++++++++++ ...ages-dc7758f91293ce9c92573a1104c733de.yaml | 58 +++++++++++++++++++ ...nter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...quiz-f47da71d7fbe6f22fdb13d8b16b739c2.yaml | 58 +++++++++++++++++++ ...ager-68254971cbcf2fc6d5bd7c51c76b34c5.yaml | 58 +++++++++++++++++++ ...ager-ac3cdb02dfa19f5b0080855ac08f88be.yaml | 58 +++++++++++++++++++ ...view-4d1a3458be4ae0555d1a0720658316fe.yaml | 58 +++++++++++++++++++ ...erty-403a3d4815913e613911a54871a0f61d.yaml | 58 +++++++++++++++++++ ...erty-eece58b4ed3b36911722cf60f06d0f49.yaml | 58 +++++++++++++++++++ ...ions-76cc9ef157cda8ab12c517a7c91088af.yaml | 58 +++++++++++++++++++ ...card-800d1ab574434819322506f176feb04a.yaml | 58 +++++++++++++++++++ ...itor-18ba5164adc930f4c13bf8eac8771529.yaml | 58 +++++++++++++++++++ ...itor-34686e9b40a6d9c4dcc8e1fbb6d4343b.yaml | 58 +++++++++++++++++++ ...itor-480b8a3eac01c8a8ea01d02be8cf6e9e.yaml | 58 +++++++++++++++++++ ...itor-f945b2013c9f8db455b1c19cba6e241e.yaml | 58 +++++++++++++++++++ ...ator-10b5f73ced4f4ae8f40389dd6e188b1c.yaml | 58 +++++++++++++++++++ ...adio-4750f217b4fbd830bf2a4ee2b5c1530d.yaml | 58 +++++++++++++++++++ ...adio-785b1c3458487127cc883fbac1f1ef7f.yaml | 58 +++++++++++++++++++ ...adio-86ac2d003a393175395c9b05a6663062.yaml | 58 +++++++++++++++++++ ...adio-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-0b686c4cb6f413d46dafa7ed933109c6.yaml | 58 +++++++++++++++++++ ...lite-1fa1c4ce292a4074e0d2a4792b491027.yaml | 58 +++++++++++++++++++ ...alty-0434ab5209741c3f7521537eabd69256.yaml | 58 +++++++++++++++++++ ...alty-d2c57b8ede776b72c978f813e6d0a827.yaml | 58 +++++++++++++++++++ ...call-4d45d2a7dc106d49db836138495ed8c3.yaml | 58 +++++++++++++++++++ ...call-60df39bb0575c5dbb8ccfec2f18ede40.yaml | 58 +++++++++++++++++++ ...call-8d8383b244607eb18513c4f27a52d173.yaml | 58 +++++++++++++++++++ ...call-c0cb61dd6fecf2d07db617deb2e20095.yaml | 58 +++++++++++++++++++ ...tcha-9b84dd02ba8c932cd7e6589112f001f1.yaml | 58 +++++++++++++++++++ ...tcha-e3d831bb072ff08836a63c6a4ebecea3.yaml | 58 +++++++++++++++++++ ...ents-7e43f159f02a44d44b4f5f778ba799d4.yaml | 58 +++++++++++++++++++ ...ents-a8f25522ea55ec9a76938298a24a0acc.yaml | 58 +++++++++++++++++++ ...ents-d9b7779382ec9bca0dc96d41eb9855af.yaml | 58 +++++++++++++++++++ ...aker-08ecb188f4c24bff415036a618bb6f62.yaml | 58 +++++++++++++++++++ ...aker-30317bfce905faf2637e9a9df56ecb43.yaml | 58 +++++++++++++++++++ ...aker-348b2d2c08f931f9d2b3643ac2152b3a.yaml | 58 +++++++++++++++++++ ...aker-55265bc94a3e60f3cd5f796b692a1dbf.yaml | 58 +++++++++++++++++++ ...aker-563c86924064bbeed4e8a4af90017e06.yaml | 58 +++++++++++++++++++ ...aker-827537b84b4ae3840c51006c12ccc5df.yaml | 58 +++++++++++++++++++ ...aker-948461229b764fced19a13ef5ba11252.yaml | 58 +++++++++++++++++++ ...aker-96587021500f654fee1593a976493ca2.yaml | 58 +++++++++++++++++++ ...aker-c3b5c2246526b047e580623567471684.yaml | 58 +++++++++++++++++++ ...aker-cb50f73b0638afd5cd0d186b2a6577a5.yaml | 58 +++++++++++++++++++ ...aker-f594e103526836b64061a1f68427567d.yaml | 58 +++++++++++++++++++ ...code-7ae915288e9c3c74b018a1157e470354.yaml | 58 +++++++++++++++++++ ...code-e5cd3f1b72f8c188bcce67a3cd5ccf0a.yaml | 58 +++++++++++++++++++ ...osts-7db34627f1b70dfb15b3a62077ab868f.yaml | 58 +++++++++++++++++++ ...-ads-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-ads-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...arch-07a16aaf94526ab4a5492ec25d7bc965.yaml | 58 +++++++++++++++++++ ...sync-b5b3726a38a0d1a56eeda75879ed92d9.yaml | 58 +++++++++++++++++++ ...sync-be653cd14bcab55a461716f49e0f0156.yaml | 58 +++++++++++++++++++ ...post-64ddeafe0a6eb1f3dc3db9049ece872d.yaml | 58 +++++++++++++++++++ ...tify-ad6d214a4db8beee18bddf61121faca2.yaml | 58 +++++++++++++++++++ ...post-1540a4d1322834c5a338a51354b58ee1.yaml | 58 +++++++++++++++++++ ...post-b9c578185717d2a2b3d8049789a9a952.yaml | 58 +++++++++++++++++++ ...post-fdf3c9a8ce0d028a3ed00c7adbf8cbb4.yaml | 58 +++++++++++++++++++ ...post-0e94306a43ae08419eb38c17f3bdf17f.yaml | 58 +++++++++++++++++++ ...post-f62d90a1456165ae9d04c07d4bf69a25.yaml | 58 +++++++++++++++++++ ...mail-1c70785f67dd945fd36f027518750446.yaml | 58 +++++++++++++++++++ ...mail-20b79e43dd02b60a0996dbe99e7ba439.yaml | 58 +++++++++++++++++++ ...mail-ca75f0bb6be077d73d2ab1f9278e0078.yaml | 58 +++++++++++++++++++ ...eset-07bd4b69b402b2bb38b733353ad05536.yaml | 58 +++++++++++++++++++ ...eset-1ac9ed75dda676d9de3cd3380fd4d32a.yaml | 58 +++++++++++++++++++ ...eset-83fdf9d48a350c095ff472b1a9a82eb4.yaml | 58 +++++++++++++++++++ ...eset-dc229c244bcfffc7d06d63944e8371c4.yaml | 58 +++++++++++++++++++ ...menu-56eaa7b8dc455f22f829544599237693.yaml | 58 +++++++++++++++++++ ...lery-d5756f65fb344b6553377b88f83d5a57.yaml | 58 +++++++++++++++++++ ...view-9f9f1456664e215602c73448e19f0749.yaml | 58 +++++++++++++++++++ ...ider-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...tbox-25a9f7730c5842083500e9e166082efc.yaml | 58 +++++++++++++++++++ ...tbox-892de5c9148c6f8df52be6ed544382d2.yaml | 58 +++++++++++++++++++ ...tbox-bd4c9f634768986dc47827bf4d97837f.yaml | 58 +++++++++++++++++++ ...tbox-f125bb3227f74edc5c60e8c9d6eb9da3.yaml | 58 +++++++++++++++++++ ...dget-6ee9ba365ca511bfc329f7df63da810e.yaml | 58 +++++++++++++++++++ ...ider-2f648ce81ebcdfff75d3b5dc6ad4dbca.yaml | 58 +++++++++++++++++++ ...ider-44dea4f7c7575cbbd8f534048f1c0dce.yaml | 58 +++++++++++++++++++ ...ider-568c91e024801d5d2e19e257aa73eeab.yaml | 58 +++++++++++++++++++ ...ider-961b204cf44c68d337a8c4abce4e5661.yaml | 58 +++++++++++++++++++ ...ider-b2718ea6f3f6ed667b8cfc7c6db95d2f.yaml | 58 +++++++++++++++++++ ...tbox-c3b3583607c5150ae09b547b67030790.yaml | 58 +++++++++++++++++++ ...tbox-e1d3d085ab54042265af9032b57a352b.yaml | 58 +++++++++++++++++++ ...tion-c4daa9433506094793f25873e18663b9.yaml | 58 +++++++++++++++++++ ...tful-db7767ed937dfde97dcfb07b299497ed.yaml | 58 +++++++++++++++++++ ...a-2x-575007d168cd026eefe7a606e43b0e70.yaml | 58 +++++++++++++++++++ ...a-2x-6bed45cc7ffa2c1423965f9f86a13b79.yaml | 58 +++++++++++++++++++ ...a-2x-ad6eca81b2e556f270b3ae3f5090cf96.yaml | 58 +++++++++++++++++++ ...ogle-46456613c7a836ce3b1a8f48d3151f77.yaml | 58 +++++++++++++++++++ ...ogle-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 58 +++++++++++++++++++ ...ogle-ed0f9423d4c48dfd65b856931b8ae551.yaml | 58 +++++++++++++++++++ ...dmap-1c48d6771b0e3d17023908b8bdc75005.yaml | 58 +++++++++++++++++++ ...cket-b300eab2789f0638494228aea0ada3b0.yaml | 58 +++++++++++++++++++ ...tion-0822b2c02c49629a19bf084eb6d8580a.yaml | 58 +++++++++++++++++++ ...back-79ab1b5d546d12b519823b2566724735.yaml | 58 +++++++++++++++++++ ...back-7a4c9972726e4955d433f6a7b81c1d28.yaml | 58 +++++++++++++++++++ ...ator-2565b37cf24425d8b3b9a64e0058d4a4.yaml | 58 +++++++++++++++++++ ...ator-49339be9905399af5760c326a04d9feb.yaml | 58 +++++++++++++++++++ ...ator-788781eedb2bbfc885e59d651ce4ff66.yaml | 58 +++++++++++++++++++ ...ator-7a5699f4eb992769878daf8812d2e5b5.yaml | 58 +++++++++++++++++++ ...ator-b26100fb2d07199c87c48d6d1e20e10e.yaml | 58 +++++++++++++++++++ ...ator-c9743e9890778c464db472a56cb6fc0e.yaml | 58 +++++++++++++++++++ ...hers-462fb716ec2f0ec4e2f418a785fb1df8.yaml | 58 +++++++++++++++++++ ...hers-74b1a71215563001aea36d2a3bce8f35.yaml | 58 +++++++++++++++++++ ...hers-ee3fe625ab8f88885d07211e8987b8d5.yaml | 58 +++++++++++++++++++ ...ages-2efaa05e7b1e6abe1f42ac71047e9bba.yaml | 58 +++++++++++++++++++ ...rter-7725287d44cd6757cf277fdd17b26ca6.yaml | 58 +++++++++++++++++++ ...ster-59933ed8813fc650ac85aae65e91d1d9.yaml | 58 +++++++++++++++++++ ...ever-122cd7a43161913d8685a15b660bcb12.yaml | 58 +++++++++++++++++++ ...ever-9183c93b61003074c2d21915934372a5.yaml | 58 +++++++++++++++++++ ...p-s3-693d96d86e403672dd1c5e131a4895d3.yaml | 58 +++++++++++++++++++ ...load-00fe1d8fca57ad1440836b41da0ce6fd.yaml | 58 +++++++++++++++++++ ...arch-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml | 58 +++++++++++++++++++ ...osts-49f4f7442b45f88ffafdd0b100d2831c.yaml | 58 +++++++++++++++++++ ...osts-f11abc39d7b4372ca1d0f7ca1556eb9b.yaml | 58 +++++++++++++++++++ ...-pro-8bdef51e6a9551cb787f034110fc0fe2.yaml | 58 +++++++++++++++++++ ...-pro-c23d0468fa1aa29e9cff4258e8e5f1b7.yaml | 58 +++++++++++++++++++ ...-pro-e2131dbbacfbe2a2f95adf59d0db7bef.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...pets-57f5b93dff7110d58cb432e56910af6c.yaml | 58 +++++++++++++++++++ ...lter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rect-f19084b39601e7bc7ba34fa7ad78104e.yaml | 58 +++++++++++++++++++ ...-log-0918e7c524803020ebc3787f7788ecb1.yaml | 58 +++++++++++++++++++ ...-log-64c7c31089552dec4abb3ef175072235.yaml | 58 +++++++++++++++++++ ...-log-896c32b149ebcd3122663a40d0461f18.yaml | 58 +++++++++++++++++++ ...-log-908a2c5a645886182a7c18816c5cda70.yaml | 58 +++++++++++++++++++ ...-log-a5b0543470506882efb8fd3f9daadcc9.yaml | 58 +++++++++++++++++++ ...-log-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-log-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...-log-dd3770633c5e3f81d160a943bc75a752.yaml | 58 +++++++++++++++++++ ...-log-eacb463d459e2bbbfb442e19685437c7.yaml | 58 +++++++++++++++++++ ...-log-f0b0a230f7453036382fc231a8391538.yaml | 58 +++++++++++++++++++ ...mium-b55e1b34aba62c4a9df9aec2a27f5d8a.yaml | 58 +++++++++++++++++++ ...mium-dd3770633c5e3f81d160a943bc75a752.yaml | 58 +++++++++++++++++++ ...mium-f0b0a230f7453036382fc231a8391538.yaml | 58 +++++++++++++++++++ ...mium-f254c1351f2a36bee58dc6381cb8f93e.yaml | 58 +++++++++++++++++++ ...mium-fb8070a3ea093b2b03c1a0de45c253ff.yaml | 58 +++++++++++++++++++ ...ning-02cf6d254ae1f4fae318bf77bab478be.yaml | 58 +++++++++++++++++++ ...ning-4db11f352c6c8a3ad49ea7bd3d7d466b.yaml | 58 +++++++++++++++++++ ...-pro-8e950dd64eb760b48f921b3528ca5c9f.yaml | 58 +++++++++++++++++++ ...ions-5eaff96b7044868ab9324ffea89f33a1.yaml | 58 +++++++++++++++++++ ...scan-c9a2376716cf70bca17532d4183c4633.yaml | 58 +++++++++++++++++++ ...dfox-492dc981351dd6fd004e149962bdd870.yaml | 58 +++++++++++++++++++ ...ntry-d34327d1e992d219d0a1381df1c090fa.yaml | 58 +++++++++++++++++++ ...izer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...izer-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...-301-0da88a23adab8991ac9273c6a18e2665.yaml | 58 +++++++++++++++++++ ...tags-d9e051e1f4b85b4ae8c0ea3e691890cc.yaml | 58 +++++++++++++++++++ ...-tdk-faf3d9f40dc5bc77ef5ec90bb9977185.yaml | 58 +++++++++++++++++++ ...ress-13e2a2185dde6af6bd269d22e183dd35.yaml | 58 +++++++++++++++++++ ...ress-c6c1e0bf86c779c9f71689d63880acf1.yaml | 58 +++++++++++++++++++ ...ress-e3109d7817fd480896a3a3bc464556af.yaml | 58 +++++++++++++++++++ ...ress-fa9cf150c44f8d9dc935bb57af5fe0c5.yaml | 58 +++++++++++++++++++ ...ress-fb48c2712fa8a78f7a012c1644582d5a.yaml | 58 +++++++++++++++++++ ...tats-47415a21e09795154df1ff35281901c5.yaml | 58 +++++++++++++++++++ ...tats-be1ae498f783b881934c37ce01f5e849.yaml | 58 +++++++++++++++++++ ...-ses-13e3b44160360e3746c78b8d29452ac0.yaml | 58 +++++++++++++++++++ ...-ses-e6c4489ab4760cc2610080b31e1c8d78.yaml | 58 +++++++++++++++++++ ...zard-c10fda9bfdd3663d875e2a0fc2207f2e.yaml | 58 +++++++++++++++++++ ...amsi-26e6e5cc3851b03fa772529952303fc4.yaml | 58 +++++++++++++++++++ ...amsi-4a71f65ecef18d04fe003f6a65b7d9e2.yaml | 58 +++++++++++++++++++ ...amsi-738fbfc3eb4f88850a59e7c7149f1534.yaml | 58 +++++++++++++++++++ ...cial-28f21eddf2463cba2cb6b77e1419e5f9.yaml | 58 +++++++++++++++++++ ...ages-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ldon-61c8d3fe6528b22ae362e184d779fcaf.yaml | 58 +++++++++++++++++++ ...inal-9bf86f14d92b1788e3ded94564f9e0cb.yaml | 58 +++++++++++++++++++ ...inal-a0116eeab00e009fd4fa3d22d8f45407.yaml | 58 +++++++++++++++++++ ...inal-b4f93738fd70e3a8da5c44b9944ae088.yaml | 58 +++++++++++++++++++ ...cart-1033fcda6639f4daeff0c508d8a82d3b.yaml | 58 +++++++++++++++++++ ...code-485c8e5c2bb61a87b483e8c051daba67.yaml | 58 +++++++++++++++++++ ...chat-adaa6144e39af9e742e7ba711c4a036d.yaml | 58 +++++++++++++++++++ ...chat-c35613a2745b5628f153e1858939c22a.yaml | 58 +++++++++++++++++++ ...osts-10f63d314e85015ce49d2337fc605c93.yaml | 58 +++++++++++++++++++ ...osts-353fc9ffdc08426a0ffe5e2540b9087b.yaml | 58 +++++++++++++++++++ ...osts-d8e5ca43d4d7693416e241c26cbea0ec.yaml | 58 +++++++++++++++++++ ...hide-d3ed4033e1c7b404f15d64bf377cadc7.yaml | 58 +++++++++++++++++++ ...ndar-839915408da31966610f43b45f853f1c.yaml | 58 +++++++++++++++++++ ...ndar-bac170dcd3835d8bbf7c00e58b6af261.yaml | 58 +++++++++++++++++++ ...ents-9bd31a69895b603beba548b13ee3a848.yaml | 58 +++++++++++++++++++ ...wall-380d905325ab5069c99a7e476a1a4f89.yaml | 58 +++++++++++++++++++ ...wall-3f0faa20d6a05156c4a1c46312d50cf7.yaml | 58 +++++++++++++++++++ ...wall-90c7f750404de09cdcd8955a310ab0ab.yaml | 58 +++++++++++++++++++ ...wall-c9d4c4f2e6258505d4c75758afeb7ff1.yaml | 58 +++++++++++++++++++ ...wall-ce7b15ad921b8740cd4f98bd5c07c031.yaml | 58 +++++++++++++++++++ ...ries-49548450e8e603c888246b4324b9abfb.yaml | 58 +++++++++++++++++++ ...emap-0ec33f0610c3b4ae6a2adacc48ffade7.yaml | 58 +++++++++++++++++++ ...emap-1697fb18453f32ca7e1c0790f12f9bda.yaml | 58 +++++++++++++++++++ ...emap-56ca15387b80b4855859eb683a9c79c5.yaml | 58 +++++++++++++++++++ ...emap-be653a8d2bee2421f88f0e6d66ccc0f3.yaml | 58 +++++++++++++++++++ ...ugin-3019f115da4ce05058864e5dcdcaacab.yaml | 58 +++++++++++++++++++ ...view-170b4d1a9ba8f9c16cc0bc165c8fd973.yaml | 58 +++++++++++++++++++ ...ogle-0df69cb46add8b6c0a7b0f63ee7a53a7.yaml | 58 +++++++++++++++++++ ...mail-bdefbe0337f0d8136e413e9977ce9dce.yaml | 58 +++++++++++++++++++ ...tect-cd4b20c0b028ccb6a7d2b5c1ffeba918.yaml | 58 +++++++++++++++++++ ...ctor-edb0b1b70571f2dd40f46a09b0477a9b.yaml | 58 +++++++++++++++++++ ...page-f2a1201d248d9810b0b0d58bf8df9f81.yaml | 58 +++++++++++++++++++ ...usel-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...stat-04e23ac1b6365010d31ca471e4c11f32.yaml | 58 +++++++++++++++++++ ...stat-3171c38b67df36d18560a0a3bce363f3.yaml | 58 +++++++++++++++++++ ...stat-323a2528ecc021abe5c2c6bd363f0d32.yaml | 58 +++++++++++++++++++ ...stat-423f90da633eb79297c96d8f0abf8be5.yaml | 58 +++++++++++++++++++ ...stat-49bd4bae2777384dde2f9b06bf68d410.yaml | 58 +++++++++++++++++++ ...stat-597e668e79f61dad3842fcd6906ce6f8.yaml | 58 +++++++++++++++++++ ...stat-64166b21a8975f062b52f4886bce7163.yaml | 58 +++++++++++++++++++ ...stat-9024f709636fd6877d65d2f3b4c1635e.yaml | 58 +++++++++++++++++++ ...stat-971075c7b5684cf126577f8a88b91254.yaml | 58 +++++++++++++++++++ ...stat-9ab73d918da016b8bea0197df7034889.yaml | 58 +++++++++++++++++++ ...stat-b3e91448e22115e9d095b2a1e488e5df.yaml | 58 +++++++++++++++++++ ...stat-c568408b66270ee8858beb6b5337a826.yaml | 58 +++++++++++++++++++ ...stat-d15c506a6326f67745ff7867b3d43cbf.yaml | 58 +++++++++++++++++++ ...stat-e97cf38eec743d7e32a9d6f2848bc70b.yaml | 58 +++++++++++++++++++ ...t-ex-2e45916daba26c04ce6c83d3b1938df3.yaml | 58 +++++++++++++++++++ ...stat-f260533813247786590cffbf5861c8f5.yaml | 58 +++++++++++++++++++ ...stat-f800126fa2e8457384feccc64971626b.yaml | 58 +++++++++++++++++++ ...stat-f8bccfc95e7537d4400b0b6737b24e5f.yaml | 58 +++++++++++++++++++ ...acts-221016fc8948bfb930fdcdca33f79836.yaml | 58 +++++++++++++++++++ ...free-ee95b664445938e62cfbf4d8ed5ffe44.yaml | 58 +++++++++++++++++++ ...itor-475ba1df38c75381825efc84071f7c9f.yaml | 58 +++++++++++++++++++ ...port-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...port-7d8c7a6621cd6acf11eab3f4d618152a.yaml | 58 +++++++++++++++++++ ...port-ba1778641ae55d3040d21a76affd5b00.yaml | 58 +++++++++++++++++++ ...port-ccfe47d5faf99f962197429daac2a562.yaml | 58 +++++++++++++++++++ ...port-ed2e7de8683ce4c367d3321852d1f7db.yaml | 58 +++++++++++++++++++ ...ader-19694fc6eba31e53a1ac14bdaf6f6028.yaml | 58 +++++++++++++++++++ ...iley-77e2d5337a10d2b6f8dfe7d3c316ea63.yaml | 58 +++++++++++++++++++ ...iley-ae9135d7bf1c7296c12f3a734a25c4bf.yaml | 58 +++++++++++++++++++ ...-sms-2a19a88ce4a92a9c8fbf2df45764b32f.yaml | 58 +++++++++++++++++++ ...-sms-2eac9220f1c0d85aff9cba25bec21ed8.yaml | 58 +++++++++++++++++++ ...-sms-604205ec49f025926385a1b0eaceae3d.yaml | 58 +++++++++++++++++++ ...-sms-69342488f4f3aabf705547384317c745.yaml | 58 +++++++++++++++++++ ...-sms-7216efc8a277e31e7bc37bcee5ad9a4b.yaml | 58 +++++++++++++++++++ ...-sms-84f2aef7f11acfd2b73b896d3ef7cd04.yaml | 58 +++++++++++++++++++ ...-sms-9026afc07d244baf4060b61e93a40775.yaml | 58 +++++++++++++++++++ ...-sms-a21f47d4523bdd1432738c19a9cc15fb.yaml | 58 +++++++++++++++++++ ...-sms-e1ececf98f98b05b8b9294fdacec5d2d.yaml | 58 +++++++++++++++++++ ...-sms-f21ce23a89308829a19c21d66925ddd0.yaml | 58 +++++++++++++++++++ ...-sms-f7c37966d32c6dbab8ccdc2a7eb8df23.yaml | 58 +++++++++++++++++++ ...smtp-4cb0701b6db05c073e2060623ec2f204.yaml | 58 +++++++++++++++++++ ...shit-2b972fb379a3ef9946c652caaa66df2d.yaml | 58 +++++++++++++++++++ ...shit-3baba46cc5a286838f8fb9a60b0d6094.yaml | 58 +++++++++++++++++++ ...shit-607f1baa27192c23513225845ec25b9b.yaml | 58 +++++++++++++++++++ ...shit-7a3ab4b4d26a299b96225464ccb1d356.yaml | 58 +++++++++++++++++++ ...cial-0f9348eac96a42ea06d72213f997cb8e.yaml | 58 +++++++++++++++++++ ...menu-8682c5fbeed29195fc3c6e36608df123.yaml | 58 +++++++++++++++++++ ...ight-7e1c6a231bffdfe14a3a2ce673d73608.yaml | 58 +++++++++++++++++++ ...ight-df9c64a17ee3d013ca8c6b78de44f86b.yaml | 58 +++++++++++++++++++ ...tons-7b54be45a2f07bfa9d249dae96b2b8a9.yaml | 58 +++++++++++++++++++ ...cial-f8238c64411cb9dd2c01251b0ae0655a.yaml | 58 +++++++++++++++++++ ...feed-3799bad4858d7913f9586ea4576ffdaf.yaml | 58 +++++++++++++++++++ ...ions-4abec42ea1e0860b972b9757ce0cdb30.yaml | 58 +++++++++++++++++++ ...ring-bde0dbf50dee086cf6c52ee659134929.yaml | 58 +++++++++++++++++++ ...dget-78c7195ce152d6d5bdeab7f38e20a1db.yaml | 58 +++++++++++++++++++ ...dget-877e1c3b42118075385c29c980e6d4e6.yaml | 58 +++++++++++++++++++ ...izer-9c5f430746b739fbae6902b53c806e7a.yaml | 58 +++++++++++++++++++ ...book-04e0aa1c786990263905d4523aa6fa2d.yaml | 58 +++++++++++++++++++ ...page-52e5de8cae8585e04365085f31752913.yaml | 58 +++++++++++++++++++ ...rder-a561a450756c85ce3eedf88a4f646811.yaml | 58 +++++++++++++++++++ ...trol-4c18709c2b499b4e0a77ed40ef54cc76.yaml | 58 +++++++++++++++++++ ...free-3506e96eaa45f558b87763e6782644a7.yaml | 58 +++++++++++++++++++ ...oxes-1e506d7d0a79883a044afbbb48ac382a.yaml | 58 +++++++++++++++++++ ...oxes-e6b578c644b8dec6cfd9f0e734409896.yaml | 58 +++++++++++++++++++ ...heck-1775b7a8bc86b1994bca20dc9c550675.yaml | 58 +++++++++++++++++++ ...heck-98dad0bdb32669bad2542d8ed31dc9ac.yaml | 58 +++++++++++++++++++ ...heck-b804d82967d372f1edcb1ab799e70f37.yaml | 58 +++++++++++++++++++ ...heck-d87dde15977bcc3d1ce01f496b79774b.yaml | 58 +++++++++++++++++++ ...heck-fc588495329f4334ef4deb847bcc6bbe.yaml | 58 +++++++++++++++++++ ...alia-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ages-3ea0e1871dec257bfd7cde582f2ade2e.yaml | 58 +++++++++++++++++++ ...ages-8a665769e5dbc54922bf72bb281bcb8c.yaml | 58 +++++++++++++++++++ ...sors-6e76234b4d1dbafb645996466faffb64.yaml | 58 +++++++++++++++++++ ...sors-dfaf8f13c7a5730a90b10c23bd27623b.yaml | 58 +++++++++++++++++++ ...ugin-70f0c41d6aa67cd78e36b9d8660c315e.yaml | 58 +++++++++++++++++++ ...ging-3d60381961999c332401ff6c0d1b2fcd.yaml | 58 +++++++++++++++++++ ...ging-491b3ba699d00a68d515de73a1bb974a.yaml | 58 +++++++++++++++++++ ...ging-84e23826180e38f8c23713de5476118f.yaml | 58 +++++++++++++++++++ ...ging-cb4f2a317f426735af573c79456925c6.yaml | 58 +++++++++++++++++++ ...ging-f1e3da63f99b2cc6fa2a68c3535839bf.yaml | 58 +++++++++++++++++++ ...-pro-84e23826180e38f8c23713de5476118f.yaml | 58 +++++++++++++++++++ ...-pro-cb4f2a317f426735af573c79456925c6.yaml | 58 +++++++++++++++++++ ...-pro-f1e3da63f99b2cc6fa2a68c3535839bf.yaml | 58 +++++++++++++++++++ ...less-1aa8a227283e43da0f41a656224571d0.yaml | 58 +++++++++++++++++++ ...less-99a5656c2d3d84a74af5b274cf1cca3f.yaml | 58 +++++++++++++++++++ ...tics-077764df60648b9aef2b2fc6c9e65d50.yaml | 58 +++++++++++++++++++ ...tics-089f9d6847e0d3965eee292fee99d926.yaml | 58 +++++++++++++++++++ ...tics-0ec38a5c1835d15197b4df3637b60941.yaml | 58 +++++++++++++++++++ ...tics-1510080b156a41f0be0cec87e4c71c9d.yaml | 58 +++++++++++++++++++ ...tics-1c8db3326f7e7fbd2267d1b19822a630.yaml | 58 +++++++++++++++++++ ...tics-268f3c8028825c46a53ec35cc9415801.yaml | 58 +++++++++++++++++++ ...tics-2a14d3fb0a465f1cdb9f64f93f69aedd.yaml | 58 +++++++++++++++++++ ...tics-2fefd80a39593e8b391e705011e7dfb1.yaml | 58 +++++++++++++++++++ ...tics-3465e5292d73a551eb6c16bb4b06a27c.yaml | 58 +++++++++++++++++++ ...tics-3a4442e88172a0a47b7f5df765c70f36.yaml | 58 +++++++++++++++++++ ...tics-402d7d7b6c58cc7a536b0d43e9d4a1fc.yaml | 58 +++++++++++++++++++ ...tics-419ac020ad7416a34796c2fb1e817b8f.yaml | 58 +++++++++++++++++++ ...tics-4533ca9d47b3b4f7b077cc893cacad61.yaml | 58 +++++++++++++++++++ ...tics-4ab5b9d0741d36fdeb0d5b8e06672d39.yaml | 58 +++++++++++++++++++ ...tics-4c0f6a08d37bb188811061a17ff42cfa.yaml | 58 +++++++++++++++++++ ...tics-50c234504ff6b18931188a11546b06e4.yaml | 58 +++++++++++++++++++ ...tics-5a1aec8bb448585f2b3947c8d2f43d52.yaml | 58 +++++++++++++++++++ ...tics-5c2247e17c791b6fdfbffdac85a13840.yaml | 58 +++++++++++++++++++ ...tics-5cdc77b83509c234be9fd2621b4d50a6.yaml | 58 +++++++++++++++++++ ...tics-6600d372243624aa436749b499ef6260.yaml | 58 +++++++++++++++++++ ...tics-84d819f2c5dbd24e5ca9102c42b9b228.yaml | 58 +++++++++++++++++++ ...tics-98db2564f4a4bc79566064c237408008.yaml | 58 +++++++++++++++++++ ...tics-99d2db479f6570516dd28aa787f58742.yaml | 58 +++++++++++++++++++ ...tics-b396ad7ddae66e7db7a5d4c1747eea0d.yaml | 58 +++++++++++++++++++ ...tics-c6fa1f77c447ad70ead1d031770de1e9.yaml | 58 +++++++++++++++++++ ...tics-c7e70d0a47cc47b927ca88ef25cbbeb3.yaml | 58 +++++++++++++++++++ ...tics-cf0e8508a150a92dcb38be8ebc42b5eb.yaml | 58 +++++++++++++++++++ ...tics-d323b2ee541571a78879d377867cb57c.yaml | 58 +++++++++++++++++++ ...tics-e9a7d43315eb08a5c15f9831030945e8.yaml | 58 +++++++++++++++++++ ...tics-f2b175b82a16e321f13c2528d80eed13.yaml | 58 +++++++++++++++++++ ...tics-fba6fe4ba924ddd9440214f83e497b37.yaml | 58 +++++++++++++++++++ ...tics-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml | 58 +++++++++++++++++++ ...tats-422debdfe258e02ddb505987826a2ea3.yaml | 58 +++++++++++++++++++ ...oard-cca20bceb29d548b71fff2c6b265d9c3.yaml | 58 +++++++++++++++++++ ...ager-1085089f2339a1b75325ca6667c1e32b.yaml | 58 +++++++++++++++++++ ...ager-1be66c0880c6c44fa345977c011d45e4.yaml | 58 +++++++++++++++++++ ...ager-6d7c8242c157e79033d5cce1ebd197e9.yaml | 58 +++++++++++++++++++ ...ager-784bab21dbff631c360386613afa3af2.yaml | 58 +++++++++++++++++++ ...ager-8bca0401c2687aab215b4ddd44231c26.yaml | 58 +++++++++++++++++++ ...ager-933664bac0ba7d546ec800941231f6f3.yaml | 58 +++++++++++++++++++ ...ager-a3d20ed9da7c57fc778f0d01bfbac322.yaml | 58 +++++++++++++++++++ ...cial-a15cdcee1d81fbf41320a2105863ebbb.yaml | 58 +++++++++++++++++++ ...kout-23d71c471ed57b8e6edb42812714c4cc.yaml | 58 +++++++++++++++++++ ...kout-8a4ffb5cbc3cc45c48f96fc0d6e8fdac.yaml | 58 +++++++++++++++++++ ...kout-deed3fa156af1c41e337b8275419b59f.yaml | 58 +++++++++++++++++++ ...tion-538423ca9f2308dfd7db2d7106fab896.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...hema-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rkup-d5d53242307fbcb60f1d07b6a75cb319.yaml | 58 +++++++++++++++++++ ...ribe-a4b9301f609713ae947856e0a785959d.yaml | 58 +++++++++++++++++++ ...itle-8e8d26048a256bd2a6af10c450c287bb.yaml | 58 +++++++++++++++++++ ...ache-0063bb4beaa99595ff7d4e40026fb686.yaml | 58 +++++++++++++++++++ ...ache-0a730b29011862fa99f3ba28ddcb0a8c.yaml | 58 +++++++++++++++++++ ...ache-3a746d0bb8a8a4bacac9da6a17fd5b77.yaml | 58 +++++++++++++++++++ ...ache-5536ba6a87acebd391c60f6bc2e48bf9.yaml | 58 +++++++++++++++++++ ...ache-578845e46f5e10ee10237d1397f1fce9.yaml | 58 +++++++++++++++++++ ...ache-725f6537c801584f5af7c0692e2d6c4d.yaml | 58 +++++++++++++++++++ ...ache-a4d897fcad2378851d5e9f3438f9cdff.yaml | 58 +++++++++++++++++++ ...ache-ab30f037d37814a0114fbff89d19c5f7.yaml | 58 +++++++++++++++++++ ...ache-afeb8327fb03504a0b5ac79fd5a442f7.yaml | 58 +++++++++++++++++++ ...ache-c29571f39de26e98c4a31202523c55d7.yaml | 58 +++++++++++++++++++ ...ache-d80662422b2866b3d65a5445924467ed.yaml | 58 +++++++++++++++++++ ...ache-fce354233cc8042e718d5365b3a58e08.yaml | 58 +++++++++++++++++++ ...nify-83ffcb1b7b93055d3871683fd17b0c51.yaml | 58 +++++++++++++++++++ ...opup-39af241a774d2dcd3cc32b6204b6cb7b.yaml | 58 +++++++++++++++++++ ...stem-385055003f5f62851bef6489ef8b74ea.yaml | 58 +++++++++++++++++++ ...stem-43205c5c452a1868decf3021c2397818.yaml | 58 +++++++++++++++++++ ...stem-45e53acb580bbd675bfc6be68ad774dd.yaml | 58 +++++++++++++++++++ ...stem-497a0a1ea8afe0e920601e57f5c6ccaa.yaml | 58 +++++++++++++++++++ ...stem-4fb356daa205fa86efebf393915d0c50.yaml | 58 +++++++++++++++++++ ...stem-8775037057b715229697772ba91f4bf3.yaml | 58 +++++++++++++++++++ ...stem-8c62c79ac1c1ebf901388664001a676c.yaml | 58 +++++++++++++++++++ ...stem-9ffc56b5ea5f6b924435376642f18ea0.yaml | 58 +++++++++++++++++++ ...stem-d69b023495447f633ec6d9d561e7345f.yaml | 58 +++++++++++++++++++ ...stem-e87da4fdaddc8c3f88dc163d8c30bc5e.yaml | 58 +++++++++++++++++++ ...stem-f30cbcc00e52a547df9af466cf2eeb9d.yaml | 58 +++++++++++++++++++ ...stem-fac707dbaf41d85badb955071bceca40.yaml | 58 +++++++++++++++++++ ...poll-7aeb0cb02f45fcefa48994c17b9a07f7.yaml | 58 +++++++++++++++++++ ...tool-19c5c13179457ac1c8bd83d2fa6c9156.yaml | 58 +++++++++++++++++++ ...tool-fe7166fce08ea1c027bfc2808eb6d8de.yaml | 58 +++++++++++++++++++ ...plus-e9cbfa821e4a40c5bf6ec29f2c85944c.yaml | 58 +++++++++++++++++++ ...ages-d123d567f469bf81fa1efe0cec4fc6a4.yaml | 58 +++++++++++++++++++ ...team-99900192dbf1fe9dc977df0b62f5f3df.yaml | 58 +++++++++++++++++++ ...sium-2fec5b54bae57b8457c08f84660fdcc9.yaml | 58 +++++++++++++++++++ ...sium-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml | 58 +++++++++++++++++++ ...sium-491436cd325d5b03202c1b421dcad671.yaml | 58 +++++++++++++++++++ ...sium-4ae9af0b470e9693506c7f0dea29cf9b.yaml | 58 +++++++++++++++++++ ...sium-8339317d8346b6724b17c27a89e2d93a.yaml | 58 +++++++++++++++++++ ...sium-94c6416d0acf4ef5543b79e97739f29b.yaml | 58 +++++++++++++++++++ ...sium-ab05d89891e41c4ee487b45fc002d7f7.yaml | 58 +++++++++++++++++++ ...sium-ae07dd3ec22029a67416995c9e379fb8.yaml | 58 +++++++++++++++++++ ...sium-ea4a5a60afde85ede6fced3685c1e946.yaml | 58 +++++++++++++++++++ ...sium-f25290eae54007b679e22d13b90a23ce.yaml | 58 +++++++++++++++++++ ...sium-f66731d5fdc6cfd1b64d52850c4933f1.yaml | 58 +++++++++++++++++++ ...sium-f6896d23342ecbcbdbcbfcb5cd72746c.yaml | 58 +++++++++++++++++++ ...-pro-22fdef306e2010977a36342bab3a6db5.yaml | 58 +++++++++++++++++++ ...-pro-e1a78698f63c6c67c8d3c4fb4ad0041f.yaml | 58 +++++++++++++++++++ ...ntax-2f32fe11ebe5c9f4865c13025a6e4323.yaml | 58 +++++++++++++++++++ ...-wap-9296439439a688a4e97beee133155172.yaml | 58 +++++++++++++++++++ ...able-a6d8f41f2ddaf46a5ebf99480a45e53f.yaml | 58 +++++++++++++++++++ ...lder-995599fd4bfe995b20d11fbb5655b003.yaml | 58 +++++++++++++++++++ ...lder-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lder-fe0115e4206583520304b505b1843190.yaml | 58 +++++++++++++++++++ ...able-cc04ccc2cdbcd0bde6cfa02b200848c8.yaml | 58 +++++++++++++++++++ ...ager-63379065ec53581cef23820054e2a064.yaml | 58 +++++++++++++++++++ ...aded-4fd8626c11bff94fd8a393ce1bb61f0e.yaml | 58 +++++++++++++++++++ ...aded-c5db9aebd1fc40e9e4c7b7eca92c3a88.yaml | 58 +++++++++++++++++++ ...port-ea4dc9da45a9f3810a9a2f98b5102871.yaml | 58 +++++++++++++++++++ ...ager-092e64b42de134fb4233d6bec85b9415.yaml | 58 +++++++++++++++++++ ...ider-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...form-98b6ebee95a026d40c782ddad544fd4e.yaml | 58 +++++++++++++++++++ ...form-d4c59ee10654dc665fe7870643db894a.yaml | 58 +++++++++++++++++++ ...opup-d03335b5fcf3342ce30e3d6994089bf1.yaml | 58 +++++++++++++++++++ ...dget-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...ials-b810e04fd2ee9ba72626a776c33f0a7b.yaml | 58 +++++++++++++++++++ ...ting-23d65a0c7f78efb0a00d9004db77bb73.yaml | 58 +++++++++++++++++++ ...ting-a2c4b877b0651ff620e8169263705757.yaml | 58 +++++++++++++++++++ ...cket-2335d22fc63434a5bcaa426b8fe660ca.yaml | 58 +++++++++++++++++++ ...cket-62dc43c109e10a4fb2083be6c80b9766.yaml | 58 +++++++++++++++++++ ...cket-96b4fb44cfb3ecbb2e1732d4d6ba46bb.yaml | 58 +++++++++++++++++++ ...iles-b470f5de6fb2ae7a347b8e6eaf7d8ee9.yaml | 58 +++++++++++++++++++ ...iles-bb37f5b838caa5657fedd0a448ebd7d3.yaml | 58 +++++++++++++++++++ ...iles-d83c363445764249cee1964637302b09.yaml | 58 +++++++++++++++++++ ...sule-09442a8e62653817975163ce52e15dd6.yaml | 58 +++++++++++++++++++ ...sule-3a16571e5ca596c6b7dc35af4b36d41d.yaml | 58 +++++++++++++++++++ ...form-099c9bac2b6d7ddf1f9ecc25ace0905e.yaml | 58 +++++++++++++++++++ ...form-1b5cbc1452a8c85b5da51d915487aec1.yaml | 58 +++++++++++++++++++ ...form-23b8ee7d3cf1c8b343f01dee0e6b0127.yaml | 58 +++++++++++++++++++ ...form-35d905a17c07bb22f6bef2c153cb7c2c.yaml | 58 +++++++++++++++++++ ...form-b9b9aa6a14a97f87b3f16ec3dcb05759.yaml | 58 +++++++++++++++++++ ...form-ba2fa23f53107ae20224ebf362890e0c.yaml | 58 +++++++++++++++++++ ...opup-5abf4f5c282834f3798f994f3f36892f.yaml | 58 +++++++++++++++++++ ...opup-db2fb4ed164af1282f62f44a0c0e168a.yaml | 58 +++++++++++++++++++ ...azon-b1af016f9e6a13ef862b57d6918f5436.yaml | 58 +++++++++++++++++++ ...ffer-95f254edf062c496895c196beac952e1.yaml | 58 +++++++++++++++++++ ...uite-ed03689d193897df0f01e218797bc0ef.yaml | 58 +++++++++++++++++++ ...tter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...todo-0c05bed3e63ebe0076e41774e5d167dd.yaml | 58 +++++++++++++++++++ ...usel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...usel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dule-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...news-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...pbar-08fad01812fb757e5dc8ffa5260888ab.yaml | 58 +++++++++++++++++++ ...pbar-4813d0bc8d38f259871443d57dcbdad8.yaml | 58 +++++++++++++++++++ ...pbar-633e46af2038cc804c4d8333e35d9bb7.yaml | 58 +++++++++++++++++++ ...pbar-808f401d9d8c5d86d169e876e53df971.yaml | 58 +++++++++++++++++++ ...acks-f6fedef4900f687723635382ff2bb4d5.yaml | 58 +++++++++++++++++++ ...view-28c3e191fb5a4aac43fb323a1cacb211.yaml | 58 +++++++++++++++++++ ...tera-1398c704e82e0c99d9df5d75e0d38bc0.yaml | 58 +++++++++++++++++++ ...avel-60704cf340adf2f27bf6eb359b29de1e.yaml | 58 +++++++++++++++++++ ...avel-b8daa06004410466af99c0f3caa27fee.yaml | 58 +++++++++++++++++++ ...gine-0345a4f0aab13c10753508309e5ccf34.yaml | 58 +++++++++++++++++++ ...gine-12373fb4bdec1cf1197ea716e420bdce.yaml | 58 +++++++++++++++++++ ...gine-615ecebdae8d81f4fc482834631b0455.yaml | 58 +++++++++++++++++++ ...gine-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...gine-f6c6555824d98b71401c19c502cb055d.yaml | 58 +++++++++++++++++++ ...dget-4c44757f9cbb823ed3a472ca5e2ff612.yaml | 58 +++++++++++++++++++ ...dget-9f65d6fc085d85b53357bd33fa3d4834.yaml | 58 +++++++++++++++++++ ...ider-5aea692cc96187a31807c0f2f26416eb.yaml | 58 +++++++++++++++++++ ...ider-60704a9704a6bd75205a7bd8179ee4be.yaml | 58 +++++++++++++++++++ ...bdir-d9ebf3668fe7cefc2f8b63111d50df87.yaml | 58 +++++++++++++++++++ ...core-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...feed-455782a485d876c2acfcbf2a3f64d156.yaml | 58 +++++++++++++++++++ ...-box-f762f226f7d0453e8c9973d68200bc39.yaml | 58 +++++++++++++++++++ ...like-18de9e095474a950fd157d62f9dc2e8b.yaml | 58 +++++++++++++++++++ ...like-4082ebaabfc2d3e63cea9e5b73f5105a.yaml | 58 +++++++++++++++++++ ...like-44f7bceac9641de69745cf2de93af035.yaml | 58 +++++++++++++++++++ ...like-5e4d2604a5e90cd0dc912e39171976ad.yaml | 58 +++++++++++++++++++ ...like-9047e8467f610de62edfbde349b606d7.yaml | 58 +++++++++++++++++++ ...like-bd4d77259e44439674b77141abd7a906.yaml | 58 +++++++++++++++++++ ...like-dea805289f838218c2f4999e6fa41c84.yaml | 58 +++++++++++++++++++ ...rter-0d112b75baa32165ac17ae118d62fed2.yaml | 58 +++++++++++++++++++ ...rter-51b67c232457e0e4e3e29917fed2f232.yaml | 58 +++++++++++++++++++ ...rter-592a630a84a40228131a6018242fc7c7.yaml | 58 +++++++++++++++++++ ...rter-72bc0780c4316abe13ceb4d45308b845.yaml | 58 +++++++++++++++++++ ...rter-75438814e26aeaea61aafcd29b551852.yaml | 58 +++++++++++++++++++ ...rter-7705126a4ed4d1dc1d9561088cab0d7f.yaml | 58 +++++++++++++++++++ ...rter-87ab1df12e024103ce206734007bad62.yaml | 58 +++++++++++++++++++ ...rter-9112916c5852d2f0b814be06e90dc90b.yaml | 58 +++++++++++++++++++ ...rter-944848224aa29d59185411875e6e7a83.yaml | 58 +++++++++++++++++++ ...rter-ac3eeb7507bcafd357b4a7e25611dbcc.yaml | 58 +++++++++++++++++++ ...rter-be9c6bd76ef257817f6a2776deaaac06.yaml | 58 +++++++++++++++++++ ...rter-c5aaff2cbf4515e9a35f03f837f2957f.yaml | 58 +++++++++++++++++++ ...rter-c7addb8e32d754a1c27b6eb5611849e7.yaml | 58 +++++++++++++++++++ ...rter-dc21ebc00161a8071a291b6ff6e22872.yaml | 58 +++++++++++++++++++ ...rter-e5b4ec8d38e3122f17a3232664bd3572.yaml | 58 +++++++++++++++++++ ...rter-e9ce7b3589ea1d2e769d3fe233efa510.yaml | 58 +++++++++++++++++++ ...rter-ef92d81c5e504ad1e37f94f452c8477f.yaml | 58 +++++++++++++++++++ ...eter-4abbb6efa9b6eb6c9ea1daf1a46873cb.yaml | 58 +++++++++++++++++++ ...eter-d7975313aa0a75118cad6d46dc36f4d3.yaml | 58 +++++++++++++++++++ ...eter-fc176b004d2c6f19188839a3973c1a4d.yaml | 58 +++++++++++++++++++ ...rter-bcf7bbddbe5644610b151dc0fbb630e1.yaml | 58 +++++++++++++++++++ ...rter-c50d345162d88814f557da562004033c.yaml | 58 +++++++++++++++++++ ...rter-df373c772cbef38a246093f173c5b45a.yaml | 58 +++++++++++++++++++ ...rter-e989541539b3897cd4ab2d9eb3394079.yaml | 58 +++++++++++++++++++ ...cipe-1e6683ba97d940c27fa31053738ff471.yaml | 58 +++++++++++++++++++ ...view-101443664a3de2bb124cd3553eeabe4b.yaml | 58 +++++++++++++++++++ ...view-60ae23854ab0f767b1c82b0fb6a8dc96.yaml | 58 +++++++++++++++++++ ...view-7ec860262e0c4326c23d456dc0dfb1da.yaml | 58 +++++++++++++++++++ ...view-86e49b910c876d1cc23d6f192f89fdb5.yaml | 58 +++++++++++++++++++ ...view-be633c3be5c6aae5c5d02b60c8c542b1.yaml | 58 +++++++++++++++++++ ...view-cc90e11a79b5063f7474d47d11615e6d.yaml | 58 +++++++++++++++++++ ...view-f59ad0e4ed3c2f1220e9486cbde45cae.yaml | 58 +++++++++++++++++++ ...cart-6ee5c39e29212bcfe2590b9e64dd32ec.yaml | 58 +++++++++++++++++++ ...mage-b96d233c9f831b3a15126c8efb4195dc.yaml | 58 +++++++++++++++++++ ...-upg-b03939b1629e023f1100df8dea055a3b.yaml | 58 +++++++++++++++++++ ...tion-451bef3a18327362fa560f933f5185ec.yaml | 58 +++++++++++++++++++ ...tion-5a577e1325bef2936221483c67cddb03.yaml | 58 +++++++++++++++++++ ...tion-f55c5d00698b3df2b8933d7fd6999c2a.yaml | 58 +++++++++++++++++++ ...user-1a67fea2fb785d012349551999e163de.yaml | 58 +++++++++++++++++++ ...user-873b35008af518fb3d54c42d47368243.yaml | 58 +++++++++++++++++++ ...atar-0698a66e8bb0aa2a8b088a7a1889cbc2.yaml | 58 +++++++++++++++++++ ...atar-0e94d67e78f08a20056789a0d440afe2.yaml | 58 +++++++++++++++++++ ...atar-1f71e71cd24bceed84937a152a603cb2.yaml | 58 +++++++++++++++++++ ...atar-3eb275ee591fa0c16b66f277e10e13bc.yaml | 58 +++++++++++++++++++ ...atar-48b606f51693dab11522b09034d3ae96.yaml | 58 +++++++++++++++++++ ...atar-51b25af2629d0400d7625bb870546310.yaml | 58 +++++++++++++++++++ ...atar-6281ccf1cb45a0f040d0e2c858dca63e.yaml | 58 +++++++++++++++++++ ...atar-6587cf615ade25a9efae204930a519bd.yaml | 58 +++++++++++++++++++ ...atar-6819e71a564d878e4f4419dfc409235b.yaml | 58 +++++++++++++++++++ ...atar-72031d703636f4d374acfec2037f647b.yaml | 58 +++++++++++++++++++ ...atar-7433993cea900124b0f7230cf232b44d.yaml | 58 +++++++++++++++++++ ...atar-771fb956baaf0127618e8cf00b66b399.yaml | 58 +++++++++++++++++++ ...atar-77904fe78351f83bbdf488cb644ca3d1.yaml | 58 +++++++++++++++++++ ...atar-813e33d3439eeca37bb846e820e1b423.yaml | 58 +++++++++++++++++++ ...atar-82bdc31754953bb5cbc55f18a69f9401.yaml | 58 +++++++++++++++++++ ...atar-88e8a642963113f357e180145695e08e.yaml | 58 +++++++++++++++++++ ...atar-90145687b353ad4682e8d470b00e07e1.yaml | 58 +++++++++++++++++++ ...atar-93365cd3a26ee2a497f31876bb4917f2.yaml | 58 +++++++++++++++++++ ...atar-9e91fef8c5a09e4e777921aa54a9f471.yaml | 58 +++++++++++++++++++ ...atar-a51251f0d703aa8b0485bf4eda435396.yaml | 58 +++++++++++++++++++ ...atar-b376ae9eb5e73985c7b2db36dc58f72f.yaml | 58 +++++++++++++++++++ ...atar-b67db9ae21f25fb045ea60943b5dc06e.yaml | 58 +++++++++++++++++++ ...atar-c25b123faba0bdec0e1756161a7f2a1e.yaml | 58 +++++++++++++++++++ ...atar-c396441598767a6e09e79d93045681a8.yaml | 58 +++++++++++++++++++ ...atar-ce05c14849e5f32e89c54867b5580301.yaml | 58 +++++++++++++++++++ ...atar-d60068516760d7fad3a37219e7d9a9f1.yaml | 58 +++++++++++++++++++ ...atar-d69cccda2f91ca5cf933845a336f8818.yaml | 58 +++++++++++++++++++ ...atar-ea7c82866444834be834917feb8c07e7.yaml | 58 +++++++++++++++++++ ...atar-faa5c662684f3e34d87e4c432d1f9f4a.yaml | 58 +++++++++++++++++++ ...trol-833c717ddaa425412e5078aad2dee670.yaml | 58 +++++++++++++++++++ ...user-dcecbe3ad598b0f09d573e5ce1408664.yaml | 58 +++++++++++++++++++ ...tend-009b7c3c01cbc1b8e5b1583fe598205f.yaml | 58 +++++++++++++++++++ ...tend-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...tend-2b0505dcb148063bd28b62fb8d1236a0.yaml | 58 +++++++++++++++++++ ...tend-36566c3afb06b969f751eee41300c71b.yaml | 58 +++++++++++++++++++ ...tend-52f719767f15ee080cb75a30bc027c64.yaml | 58 +++++++++++++++++++ ...tend-878f413ec190d0a95a0db0404871c06a.yaml | 58 +++++++++++++++++++ ...tend-9cdff4661ff94d9ebac19d8fc5548ae6.yaml | 58 +++++++++++++++++++ ...tend-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...oups-bf634e73fd86b893cfe39f853485f27b.yaml | 58 +++++++++++++++++++ ...ager-5acef1bfe4bd1454c852e9b74429a91a.yaml | 58 +++++++++++++++++++ ...ager-966b6ace296100d0ad47e45751a9a6b6.yaml | 58 +++++++++++++++++++ ...rger-7f2ad53d025d64620bae59b467d70f5b.yaml | 58 +++++++++++++++++++ ...rger-9e9c8555eaf480676d3bf05dbd493869.yaml | 58 +++++++++++++++++++ ...rger-f267d62c47f700236f07eb0616a44f03.yaml | 58 +++++++++++++++++++ ...atar-8d7a863f5c4efdd21d67e64b56b84820.yaml | 58 +++++++++++++++++++ ...atar-af96d1868fb4ef94535942e6a7a96e89.yaml | 58 +++++++++++++++++++ ...atar-ec4121cea31885fa26a199486b7f74e3.yaml | 58 +++++++++++++++++++ ...itch-e3973fedf7a8f63d43b3386884883485.yaml | 58 +++++++++++++++++++ ...line-5b8cbfd6e3ba79c4725fe838c412c514.yaml | 58 +++++++++++++++++++ ...line-6232cffe5a9c5f7164bab7ade4dfa253.yaml | 58 +++++++++++++++++++ ...line-669b73ac27d820ad91a32920ca859ce3.yaml | 58 +++++++++++++++++++ ...line-7db35c118cdf678977312aec08d43ff0.yaml | 58 +++++++++++++++++++ ...able-453fdd29f3b3ed3425776068af53e39d.yaml | 58 +++++++++++++++++++ ...rter-5709251856e505a66ad635cfb702132a.yaml | 58 +++++++++++++++++++ ...edia-1c4626b1b3d1dd0c219d11001b424f9a.yaml | 58 +++++++++++++++++++ ...edia-6c042e8ea6605a500a8eb10aee943be3.yaml | 58 +++++++++++++++++++ ...ault-adc5003f671700d129ab7c75b33ee75d.yaml | 58 +++++++++++++++++++ ...ider-1c782b4e649e4631f30e49b11990c278.yaml | 58 +++++++++++++++++++ ...ider-9ef0672874cd901f6cd102e8cb391c48.yaml | 58 +++++++++++++++++++ ...ider-ea2ac4bbba26e325b5bfe41be94a548c.yaml | 58 +++++++++++++++++++ ...ider-edc2879e6dbbc4290d65d5576c4e456b.yaml | 58 +++++++++++++++++++ ...free-259e85ddeb38f519130917626241cfb2.yaml | 58 +++++++++++++++++++ ...tbox-92e1a581ed538c56c551dca01e319f17.yaml | 58 +++++++++++++++++++ ...tbox-9a15f5067a143fbe0852c7999a453016.yaml | 58 +++++++++++++++++++ ...tbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...tbox-d27fa19d4b96ffbe2e62694bb7f786a1.yaml | 58 +++++++++++++++++++ ...tbox-ea22f32ac37f9f8e0f263b4584b31b1a.yaml | 58 +++++++++++++++++++ ...tbox-f81f2c3fb0fd545df0470702817f5fe2.yaml | 58 +++++++++++++++++++ ...ergb-f5789b694dfc2fa041ad362aac79382e.yaml | 58 +++++++++++++++++++ ...ergb-fe07dbc2056b4c877acab0ca5ff47ac2.yaml | 58 +++++++++++++++++++ ...aded-4a0f27da648b505730f70f317974fdf7.yaml | 58 +++++++++++++++++++ ...lder-1302cc789091d34c6db79147cc295acd.yaml | 58 +++++++++++++++++++ ...p-vk-82a078e3bdcdcaf8541a885f22c4a7a6.yaml | 58 +++++++++++++++++++ ...test-671933c31cfdf22d6690b9521e0d209c.yaml | 58 +++++++++++++++++++ ...view-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml | 58 +++++++++++++++++++ ...stem-fafafb2a28dce19928fc435ec7cb0821.yaml | 58 +++++++++++++++++++ ...sapp-15be6de4677a81d9742115b7d4dbf93c.yaml | 58 +++++++++++++++++++ ...sapp-45fa634ab986eb98d5523af1f02322fd.yaml | 58 +++++++++++++++++++ ...sapp-50ffb87c6ba7528dcf0d0be367e8a965.yaml | 58 +++++++++++++++++++ ...sapp-b8a0ef29774cb506ae49e9736f363d94.yaml | 58 +++++++++++++++++++ ...chat-a04496fc12c107641a2dfaedc56869ca.yaml | 58 +++++++++++++++++++ ...main-a66081067407b18cb9328a87caf935e9.yaml | 58 +++++++++++++++++++ ...nate-b4434ce76a215860884d76b7a0613c9a.yaml | 58 +++++++++++++++++++ ...heet-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ooks-06af3faa39139877126963434919c510.yaml | 58 +++++++++++++++++++ ...ooks-2f31a15bf76b537432656c32ac9543f6.yaml | 58 +++++++++++++++++++ ...ount-12dbefa5509a29120cd218ac3cfa3bd8.yaml | 58 +++++++++++++++++++ ...ount-7fe1343755ae3216e2612ce9dec35f72.yaml | 58 +++++++++++++++++++ ...rthy-41b9f790801ad7eb3878c73ca1b86fd1.yaml | 58 +++++++++++++++++++ ...ider-aea7c598ba9d4fa4ffd8fc15ef6dd40c.yaml | 58 +++++++++++++++++++ ...live-72dd99a1f42299b6be0b974a6a37581e.yaml | 58 +++++++++++++++++++ ...live-ed930301ff6966bb2b42fba1c213a244.yaml | 58 +++++++++++++++++++ ...lyte-762212510e78e95a2afd8767337992cf.yaml | 58 +++++++++++++++++++ ...ider-fd55f9f1199bb3c6e4b47c897716c4d9.yaml | 58 +++++++++++++++++++ ...p125-498ee45b8c7fc3083e30dce9b4fdf901.yaml | 58 +++++++++++++++++++ ...p125-4fb52fd64080462536a5af2ab82cbace.yaml | 58 +++++++++++++++++++ ...heck-d62c21a080a1bd7668ca5e7c3c2401ec.yaml | 58 +++++++++++++++++++ ...-app-742c9543d814556f22bc231e7b11cfdd.yaml | 58 +++++++++++++++++++ ...eads-867cda99b5370418b92599a3b962874f.yaml | 58 +++++++++++++++++++ ...slog-648a83746134b316901bad2fa3ef15ab.yaml | 58 +++++++++++++++++++ ...form-d691c077b0b5b8af36c29715d058c65d.yaml | 58 +++++++++++++++++++ ...form-fa29e08afa0977392a72c8db3f79a464.yaml | 58 +++++++++++++++++++ ...kbox-2942494a90a5b05bbe3fa65ad3543d68.yaml | 58 +++++++++++++++++++ ...kbox-502a8b74aaac2ce3e991032bf3befa89.yaml | 58 +++++++++++++++++++ ...kbox-574dc34d30f91def859e09b0a356d889.yaml | 58 +++++++++++++++++++ ...kbox-88e8ba621a8292f361dd4b3feafab680.yaml | 58 +++++++++++++++++++ ...kbox-9f14f890fac2e72907737fa43d9ecccc.yaml | 58 +++++++++++++++++++ ...kbox-cd0ec18ee2e9c7997945ee9a46aad6fd.yaml | 58 +++++++++++++++++++ ...kbox-d6f8ecce18e666922944e07fee064cee.yaml | 58 +++++++++++++++++++ ...ller-597c6e67a31af6c6a7a2d601240421fb.yaml | 58 +++++++++++++++++++ ...ller-7567bf84b12ab943cd6e85c03bb96456.yaml | 58 +++++++++++++++++++ ...ller-aac4e5cdebf3c4a9846a05088dd727df.yaml | 58 +++++++++++++++++++ ...ller-c02ce6b402a9605654d5b549b0907636.yaml | 58 +++++++++++++++++++ ...ller-c818bb92a63c04284d6553cc7b039f4e.yaml | 58 +++++++++++++++++++ ...news-7c6d29a3909e213adc94d309653788e0.yaml | 58 +++++++++++++++++++ ...ager-3e0f0262584f8c40d73a496ea910a6ad.yaml | 58 +++++++++++++++++++ ...ager-3e96a83f9d494e9bb04654bc2cf2b35d.yaml | 58 +++++++++++++++++++ ...ager-72ebb65d1fa3b6166c7e5d318376e5b9.yaml | 58 +++++++++++++++++++ ...ager-bf849da6762c8d33269fd51d7387923f.yaml | 58 +++++++++++++++++++ ...ager-fa459b52ecf85365dc55ab67da949392.yaml | 58 +++++++++++++++++++ ...ries-0f9befacf85fe32f94dfe927ef9fdeab.yaml | 58 +++++++++++++++++++ ...ries-1ef0cef9578e2e2ff5a620bc5688bfde.yaml | 58 +++++++++++++++++++ ...ries-3a9858a70aad10ad34f34258734286d8.yaml | 58 +++++++++++++++++++ ...ries-bd3c8934fd0962d780c7ee3f1bf2f569.yaml | 58 +++++++++++++++++++ ...ries-eefb6b80498f7d564bf268d183ca0c4c.yaml | 58 +++++++++++++++++++ ...tact-7d9cfe7c7d057a8bbf5fcb3c72a54c2b.yaml | 58 +++++++++++++++++++ ...inja-5e80d211739bf78fc6d29ff73646a991.yaml | 58 +++++++++++++++++++ ...inja-6481182e7ac4b130cac34d43758d1847.yaml | 58 +++++++++++++++++++ ...inja-f7b23b7f219bdfa01165ca96135e1423.yaml | 58 +++++++++++++++++++ ...ayer-75529ea91935af94487230f89ef485d5.yaml | 58 +++++++++++++++++++ ...-faq-ea35e08ef79a30cf67846c992e562b69.yaml | 58 +++++++++++++++++++ ...core-27aee4f01d78d059f9dfc206e065e8b8.yaml | 58 +++++++++++++++++++ ...core-72aca1ce30687d819e7bbef9469c5435.yaml | 58 +++++++++++++++++++ ...core-7f6904f57576a4004d7574ed67ed80fe.yaml | 58 +++++++++++++++++++ ...core-a601da5135d3caac4f0c675dffcf2dc4.yaml | 58 +++++++++++++++++++ ...core-e005bf53dd0cb1727a65fdd723c2b325.yaml | 58 +++++++++++++++++++ ...core-f27c27a0d0d7414568ced2d665d44341.yaml | 58 +++++++++++++++++++ ...mark-5950b11bfaba8d27fdadd77f829d5bd8.yaml | 58 +++++++++++++++++++ ...ntor-23e0e7010272bc0edbef97452d9c2437.yaml | 58 +++++++++++++++++++ ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...book-596940e1ffaab74a13bdb327bf203eca.yaml | 58 +++++++++++++++++++ ...alai-131875d333b38df6cd9a906f0f1d6d15.yaml | 58 +++++++++++++++++++ ...alai-24f75a43b0feb32392540a8e35cfe74d.yaml | 58 +++++++++++++++++++ ...alai-55c5d66fcb1a0e14740f101ab90eeba9.yaml | 58 +++++++++++++++++++ ...ypes-e83a61f4951a190bf506663021152379.yaml | 58 +++++++++++++++++++ ...ment-0c0c3155e7f5976c6ad290b0d35fa570.yaml | 58 +++++++++++++++++++ ...ucts-7d701d3a30fca3143559ca73fdb370ec.yaml | 58 +++++++++++++++++++ ...duct-5207af68b5cb6f829d0bffea5881c5d4.yaml | 58 +++++++++++++++++++ ...pcal-8e0c44401a0d94704f78e1b86fc33007.yaml | 58 +++++++++++++++++++ ...calc-8c686690daafe251c11d3b5105b46fb5.yaml | 58 +++++++++++++++++++ ...argo-1a30a24dd5f7f3d1429055cabcbadceb.yaml | 58 +++++++++++++++++++ ...argo-db32a0bf7f699c5e4cc79b9b16676c96.yaml | 58 +++++++++++++++++++ ...argo-f0b2493ebe50f27c282dd108348c8532.yaml | 58 +++++++++++++++++++ ...wpcb-4295379b4ef5affb647e77f938ae4ec4.yaml | 58 +++++++++++++++++++ ...rect-0446faf7e8a09fe554612052c4885eba.yaml | 58 +++++++++++++++++++ ...rect-1b89c40965836bd2b2d15087fcdb7314.yaml | 58 +++++++++++++++++++ ...rect-31ee70bfe05643b60268fd1099915dd0.yaml | 58 +++++++++++++++++++ ...rect-42471f956508e099a58e2e33212c947e.yaml | 58 +++++++++++++++++++ ...rect-7cb2e46e237585083f0f410d32da724a.yaml | 58 +++++++++++++++++++ ...rect-8eae6b3d481165727afe77f464d11a2d.yaml | 58 +++++++++++++++++++ ...rect-981460190387e68d2f348e5da885ce72.yaml | 58 +++++++++++++++++++ ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rect-c6f31211c94f2b3281ba219f5092b473.yaml | 58 +++++++++++++++++++ ...rect-fc89ed1d43552a7a477f16e3ec9d6e29.yaml | 58 +++++++++++++++++++ ...lper-e0c846e88f45df5b86f82a30f1ef58f4.yaml | 58 +++++++++++++++++++ ...twit-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml | 58 +++++++++++++++++++ ...lete-22285771e4513b7b2557db1a144305fd.yaml | 58 +++++++++++++++++++ ...bles-0c5b7f509db51c1a7230bd37febd24a9.yaml | 58 +++++++++++++++++++ ...bles-19cf3f1ecae01908df4ff2c886d4fa04.yaml | 58 +++++++++++++++++++ ...bles-1cf3419f9a5e9bc6544a37dc3d117609.yaml | 58 +++++++++++++++++++ ...bles-23d1479acb7980e0e80c8871beec9664.yaml | 58 +++++++++++++++++++ ...bles-25ab8b4cfcb0262dc70ad0a958834bfd.yaml | 58 +++++++++++++++++++ ...bles-3df29a28a26a7ffb43fd457831c6ecb6.yaml | 58 +++++++++++++++++++ ...bles-46151945d00d6bf25de490ff58da7c2c.yaml | 58 +++++++++++++++++++ ...bles-597ddaaf7d3e092f9fab20618eafe4bf.yaml | 58 +++++++++++++++++++ ...bles-60aa5e34343915a312cec2a9e0258902.yaml | 58 +++++++++++++++++++ ...bles-63badef136741f64fed4a6df28e08497.yaml | 58 +++++++++++++++++++ ...bles-983af3d35ec99acfdee458670c0dbf30.yaml | 58 +++++++++++++++++++ ...bles-bda023c028e1312df3faada5184e3051.yaml | 58 +++++++++++++++++++ ...bles-bf60bab5b44140ba04d1559cd2178f30.yaml | 58 +++++++++++++++++++ ...bles-f804d8bbf28112a85600c922c4860868.yaml | 58 +++++++++++++++++++ ...lean-a5e440b48c52ba08f10c05d92c40559d.yaml | 58 +++++++++++++++++++ ...eepl-8452e21745012f33387aa8675156e84d.yaml | 58 +++++++++++++++++++ ...eepl-cc7c61101245515951b3119b10be8047.yaml | 58 +++++++++++++++++++ ...eepl-e18f5ca4b5b5eca3a99631f697d0e3f8.yaml | 58 +++++++++++++++++++ ...menu-2af353880436693fc35e39cf38c13b8a.yaml | 58 +++++++++++++++++++ ...menu-802460476421cb6c2e180a48c3796054.yaml | 58 +++++++++++++++++++ ...menu-cfda816b6240f8a3b82f71453a31052b.yaml | 58 +++++++++++++++++++ ...ykit-169725f2f4440d7e4d2c8758f176453b.yaml | 58 +++++++++++++++++++ ...ykit-23de0bb4163d3b6bba768143cf2dcf96.yaml | 58 +++++++++++++++++++ ...ykit-4885793b2807286a2196897535bf89a5.yaml | 58 +++++++++++++++++++ ...ykit-4b446531318d71c375cbec3251c138e5.yaml | 58 +++++++++++++++++++ ...ykit-504a39994c84bd2792f780a53fd144b4.yaml | 58 +++++++++++++++++++ ...ykit-6bec264de722325d8055d26873b10d23.yaml | 58 +++++++++++++++++++ ...ykit-85863960848d10abf7509addf7ced106.yaml | 58 +++++++++++++++++++ ...ykit-b5f02e86b0a4e22a4260a76da5ba5c23.yaml | 58 +++++++++++++++++++ ...ykit-de6c40221b62e856a02b07f7a8b63ef2.yaml | 58 +++++++++++++++++++ ...ykit-f5cbed8041a7afd2170e85e7e9cafc79.yaml | 58 +++++++++++++++++++ ...scuz-0bc93e8d9149869cc1871c88dbbfb381.yaml | 58 +++++++++++++++++++ ...scuz-16a0db053a94923b7846b57810e1f6c8.yaml | 58 +++++++++++++++++++ ...scuz-1ed3919ab7a486f4e9a15463ad8bff96.yaml | 58 +++++++++++++++++++ ...scuz-223865afe5d53909b5b1a1c4a2e94a6b.yaml | 58 +++++++++++++++++++ ...scuz-51bab80f0c546820e2f032bc9393b40e.yaml | 58 +++++++++++++++++++ ...scuz-5a55693edc24427d1f47532bb94de1b0.yaml | 58 +++++++++++++++++++ ...scuz-6c13f07e879053414ff6baeb7933d2d9.yaml | 58 +++++++++++++++++++ ...scuz-6fc4af928f6f064abafe70a5e89e72c3.yaml | 58 +++++++++++++++++++ ...scuz-80cc11249951d77617837d489d137970.yaml | 58 +++++++++++++++++++ ...scuz-8e49820ed6d4efe09269732fec37b1be.yaml | 58 +++++++++++++++++++ ...scuz-a0549630b70baaa25b54d3a02da3e3cd.yaml | 58 +++++++++++++++++++ ...scuz-a9411edebf4b02260a501cf288486160.yaml | 58 +++++++++++++++++++ ...scuz-a97759482458c44cbd86520addf0e715.yaml | 58 +++++++++++++++++++ ...scuz-b26f381c9f7354f3462011430c6f3516.yaml | 58 +++++++++++++++++++ ...scuz-bb1322086ee5fb78a847811248987555.yaml | 58 +++++++++++++++++++ ...scuz-beb4595f765deb10835ff70e19259d4b.yaml | 58 +++++++++++++++++++ ...scuz-d7dc7eb24d3a5429c846eb87b8592531.yaml | 58 +++++++++++++++++++ ...scuz-f66d967d74fa7c849a46bb1299b2eece.yaml | 58 +++++++++++++++++++ ...ocks-5096ea0bd77ac20a45ea75149ea1f0e9.yaml | 58 +++++++++++++++++++ ...ages-1a67baf6167d3af7ea57dc54d855070a.yaml | 58 +++++++++++++++++++ ...ages-9cbb5db009f771b1f71dcb8eaf85d7e6.yaml | 58 +++++++++++++++++++ ...ping-a0f96e4b9cfd2e8b1cd4cfaea6299052.yaml | 58 +++++++++++++++++++ ...tico-ce2aa47cca210105b9ad928ad1c57540.yaml | 58 +++++++++++++++++++ ...orms-1c7acc022622f36ca344db11dcebaddf.yaml | 58 +++++++++++++++++++ ...orms-4ca7bd0e8f61ffa08f04711e58090827.yaml | 58 +++++++++++++++++++ ...orms-7a378944e613d1b359a5928a9883a2f4.yaml | 58 +++++++++++++++++++ ...lite-0425ae56a9fab522c188634fc2eda86f.yaml | 58 +++++++++++++++++++ ...lite-220dd315bf8421f9ddbac8301f226083.yaml | 58 +++++++++++++++++++ ...lite-316c95f4f3b5891fdd91af058dfb9524.yaml | 58 +++++++++++++++++++ ...lite-3833fde53c02f881d8b11d577a449782.yaml | 58 +++++++++++++++++++ ...lite-3d5a86cd8278e1869b165a5be40a3baa.yaml | 58 +++++++++++++++++++ ...lite-7a378944e613d1b359a5928a9883a2f4.yaml | 58 +++++++++++++++++++ ...lite-a191d4d9963290504268454ad924a754.yaml | 58 +++++++++++++++++++ ...foro-026833d334ad1214ad9b4e4b3b4251a9.yaml | 58 +++++++++++++++++++ ...foro-038a878abb8f9607405d070f7e55bf0f.yaml | 58 +++++++++++++++++++ ...foro-0974ad31ae0ff4ed4780871fa5a19327.yaml | 58 +++++++++++++++++++ ...foro-180565f2bb1ffb1d14acebaf2b798b98.yaml | 58 +++++++++++++++++++ ...foro-472cf1af897e591100ceb6b96fb80de8.yaml | 58 +++++++++++++++++++ ...foro-51d849db0aa0f9961d0bb5eb2d81e11e.yaml | 58 +++++++++++++++++++ ...foro-5e08a8bcdaa0ffc86e373916165d670a.yaml | 58 +++++++++++++++++++ ...foro-5fc70b9a54a47a4a18b6ce16ce7c23ba.yaml | 58 +++++++++++++++++++ ...foro-7796a6543f11d887deb3ec9c31928648.yaml | 58 +++++++++++++++++++ ...foro-86ba8169e30edfd0fbeaaac7e702dfce.yaml | 58 +++++++++++++++++++ ...foro-b1ced039ec3e12066bd1cc12c97938c8.yaml | 58 +++++++++++++++++++ ...foro-c0b1c2357ac077725cbe857dcad08e43.yaml | 58 +++++++++++++++++++ ...foro-c32ce9a33cb4b84bfdebec18aaf08699.yaml | 58 +++++++++++++++++++ ...foro-c9f41d227d49a467420a82298376145f.yaml | 58 +++++++++++++++++++ ...foro-cc42a23c3489a21703ade49d1baae26a.yaml | 58 +++++++++++++++++++ ...foro-d2f0460858f178a35a9b0566104e93cb.yaml | 58 +++++++++++++++++++ ...foro-dcbc26c1e59709ba0a55cede543653d5.yaml | 58 +++++++++++++++++++ ...foro-df308cf6b44530f23e6aa9e16f45633a.yaml | 58 +++++++++++++++++++ ...foro-e0fff88ad101eb2ee95866f7be5ec00c.yaml | 58 +++++++++++++++++++ ...foro-e5552ad191b551e3319c3d216b7466cf.yaml | 58 +++++++++++++++++++ ...foro-ee5b4c2ac22e2de04acc625e8a8d31f3.yaml | 58 +++++++++++++++++++ ...mail-f018dd006c86a273640a9091528e99af.yaml | 58 +++++++++++++++++++ ...-bar-450b5eb205eb4e03e4e00eea052c76d9.yaml | 58 +++++++++++++++++++ ...-bar-88bd79040ab3368b09f14c252d140de8.yaml | 58 +++++++++++++++++++ ...-bar-994b2a0046a121a24de62a7ef6f747b0.yaml | 58 +++++++++++++++++++ ...-bar-b0586fa88a487c798158f25ead9b6004.yaml | 58 +++++++++++++++++++ ...-top-357b47caf5db9e0098a5f7a1e50f8dc7.yaml | 58 +++++++++++++++++++ ...itor-42deb2684c3eba9205d231d5d23306bf.yaml | 58 +++++++++++++++++++ ...itor-4836d612a10fff8d15b3666d7165500a.yaml | 58 +++++++++++++++++++ ...itor-94d9ce1faf35ceff75a34ff49e69f6d9.yaml | 58 +++++++++++++++++++ ...nels-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...nels-6ab516426049dc622ee1b94cc628b61c.yaml | 58 +++++++++++++++++++ ...nels-7a5213754c46194429382d819c00f511.yaml | 58 +++++++++++++++++++ ...nels-9e38f58085aab4d926890f7398810c6b.yaml | 58 +++++++++++++++++++ ...nels-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...nels-c470f8f5625ce2e9f7a4e073bc31fb3b.yaml | 58 +++++++++++++++++++ ...eway-e8e4caf35c45fbc7a371f3be1ae5a251.yaml | 58 +++++++++++++++++++ ...ting-17d9d2647ecfd4b0be797349f3817c27.yaml | 58 +++++++++++++++++++ ...tapi-4c6d6429665eac8877ce0e75f13992a4.yaml | 58 +++++++++++++++++++ ...form-44fe84770decd19120a8d913bc09bfe5.yaml | 58 +++++++++++++++++++ ...form-55aa46c17c94c8921a5e40ecf3701f67.yaml | 58 +++++++++++++++++++ ...form-6647340253053f9bdb1fb3f23b4abe85.yaml | 58 +++++++++++++++++++ ...form-82c5164bc77f066c7a8d33b886720225.yaml | 58 +++++++++++++++++++ ...form-b4ea588ba50958ad00d8b73f87c65822.yaml | 58 +++++++++++++++++++ ...obus-3ba8578c9b517b602d4e446e82ee6f17.yaml | 58 +++++++++++++++++++ ...obus-485a36eabec5f4b9943990f0033b308d.yaml | 58 +++++++++++++++++++ ...obus-83e2358dd513fd53b034068ccf305836.yaml | 58 +++++++++++++++++++ ...obus-c384382f7d3c6321e1b275243f5d2c28.yaml | 58 +++++++++++++++++++ ...obus-ddb8a7f2865d6d7dbea16193f41bd919.yaml | 58 +++++++++++++++++++ ...obus-e95762dedf29574050fd40fac42c78ac.yaml | 58 +++++++++++++++++++ ...obus-f4fb22207f3c1928cb95d88c1e1f82b7.yaml | 58 +++++++++++++++++++ ...ions-db22094eea816af85bb6ec1f6633c114.yaml | 58 +++++++++++++++++++ ...pgsi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...pgsi-c60ee47fa89a26e43f0b2e6590ebf383.yaml | 58 +++++++++++++++++++ ...pgsi-c6d9a7955a97d5139542746523314cb2.yaml | 58 +++++++++++++++++++ ...onal-c60ee47fa89a26e43f0b2e6590ebf383.yaml | 58 +++++++++++++++++++ ...onal-c6d9a7955a97d5139542746523314cb2.yaml | 58 +++++++++++++++++++ ...late-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...uote-5e98c4735eb20663ca1067da327e8606.yaml | 58 +++++++++++++++++++ ...iles-faa612ca5bdaf4285ef55a7ed1d04960.yaml | 58 +++++++++++++++++++ ...pide-13d6d07ad8433fc4c13ab399af9c2000.yaml | 58 +++++++++++++++++++ ...pide-a281a6daee68ba362dc7d77d71441ffb.yaml | 58 +++++++++++++++++++ ...pide-ec9c194a00305798df823bbd977744c9.yaml | 58 +++++++++++++++++++ ...-woo-739e325811d595a476c8a9d5ed5b690b.yaml | 58 +++++++++++++++++++ ...-woo-dd0249dc72735c5a5faff42cfa7f7ee0.yaml | 58 +++++++++++++++++++ ...-woo-f47e9f4ca218e71c08ad0ae51486eb67.yaml | 58 +++++++++++++++++++ ...asic-d8720ff7be23b66bec0bd659c201c502.yaml | 58 +++++++++++++++++++ ...oard-15e650b4ee038f777984c647938b664a.yaml | 58 +++++++++++++++++++ ...oard-251f38cefaa8d1370dc48f71e7aae210.yaml | 58 +++++++++++++++++++ ...oard-528b7498cac098c3cafe6540ba1e4135.yaml | 58 +++++++++++++++++++ ...oard-52e9c784ee926500b6a7a44692c6aef8.yaml | 58 +++++++++++++++++++ ...oard-81d15af02efd4bc202d6f72b6e97fc68.yaml | 58 +++++++++++++++++++ ...oard-b36f175e4f497082be7e93c3a08ddc08.yaml | 58 +++++++++++++++++++ ...ntor-13b1426aee2c11f321401f7155b3cd3d.yaml | 58 +++++++++++++++++++ ...ages-5ab744233de8cca4ab1cbaa602802c09.yaml | 58 +++++++++++++++++++ ...ages-7251846dd87f32952c517012f5416bb3.yaml | 58 +++++++++++++++++++ ...ages-aa2d32a6da076063dc14a9036390d1fe.yaml | 58 +++++++++++++++++++ ...lite-3910ec4d645c60375887481edfe719b7.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...sync-3bdb0d0ea9cf8219d34566c6858ae4f8.yaml | 58 +++++++++++++++++++ ...iler-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rill-12a5a8360002b901fa077eaf0cb0a07a.yaml | 58 +++++++++++++++++++ ...lace-1c957d73e722d9ee39589589b266de33.yaml | 58 +++++++++++++++++++ ...lace-8cc608a635186c89042b092a2deb5e86.yaml | 58 +++++++++++++++++++ ...lace-a7e8497ccc525908d871f8d3891b7252.yaml | 58 +++++++++++++++++++ ...wpml-b794db11782c303b2a81b056287603af.yaml | 58 +++++++++++++++++++ ...wpml-cb38c4c6a570ec5691624654c5d4d34c.yaml | 58 +++++++++++++++++++ ...tion-18e8b80c2622db130ba5596fe32dcfee.yaml | 58 +++++++++++++++++++ ...ogin-41c658cc02437ea28ef89a50228368a2.yaml | 58 +++++++++++++++++++ ...ogin-fa8823b3be9be96069014fd7460133fa.yaml | 58 +++++++++++++++++++ ...ures-e2fa4c8a4519773eef901f4abb2bc665.yaml | 58 +++++++++++++++++++ ...ptin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...flip-92ae3c7f62669bb059cdddeab166dfdd.yaml | 58 +++++++++++++++++++ ...ppdf-2bf5272ec6d886fad7b7b1d47db7c04d.yaml | 58 +++++++++++++++++++ ...ster-f14cc7b2edd1a1231a45d376dd4df337.yaml | 58 +++++++++++++++++++ ...izza-32909284311b9711b0c941168cf05813.yaml | 58 +++++++++++++++++++ ...izza-81f88656b7bb4f363fcac664b1d8935a.yaml | 58 +++++++++++++++++++ ...izza-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 58 +++++++++++++++++++ ...izza-e4bdb79e642b57f61de774ae24d8a0ad.yaml | 58 +++++++++++++++++++ ...wppm-11e0416c47cc399cafbb7b5feca59d4c.yaml | 58 +++++++++++++++++++ ...wpqa-399a0cfb0032357f26f899d011d7490f.yaml | 58 +++++++++++++++++++ ...wpqa-5cfa8b6a040b435f7a92a3787291a533.yaml | 58 +++++++++++++++++++ ...wpqa-a41befce41d6aff1f7ad093dd0e01517.yaml | 58 +++++++++++++++++++ ...wpqa-c453f0ecd6a4881debc7f71c36086298.yaml | 58 +++++++++++++++++++ ...wpqa-c890a2d3e19ae2099edf204803cc83b0.yaml | 58 +++++++++++++++++++ ...wpqa-dd3fead301df531f0d1ae759b6afb54b.yaml | 58 +++++++++++++++++++ ...wpqa-dda12396183ee405a0b6804083230616.yaml | 58 +++++++++++++++++++ ...wpqa-dfd03ed6db32c6975ee246c21a630603.yaml | 58 +++++++++++++++++++ ...mote-8861d9073cc3a63b6e47dd25252b2b60.yaml | 58 +++++++++++++++++++ ...ille-94445150de831d7b0c3c55471e2a0bcf.yaml | 58 +++++++++++++++++++ ...ator-272502bd23e70077d3c0e25865267220.yaml | 58 +++++++++++++++++++ ...aner-486e0efe0e6e4cb2a652ed1f5a6563b0.yaml | 58 +++++++++++++++++++ ...aner-7f379444fd295591b6061598a142cc5d.yaml | 58 +++++++++++++++++++ ...ogin-631db0a162eaa0bf7ba9778e5dde5467.yaml | 58 +++++++++++++++++++ ...ogin-7c05693517b55b87f0d7f83514eb2c07.yaml | 58 +++++++++++++++++++ ...ogin-db674a6de8d9817e777becabcbbc904f.yaml | 58 +++++++++++++++++++ ...ogin-e36199753fc8222b9a4c8dc023f4878a.yaml | 58 +++++++++++++++++++ ...ogin-e8798ed63a85d45d71422ad1f5961970.yaml | 58 +++++++++++++++++++ ...ogin-eb378c658d67b036fda08c9801554621.yaml | 58 +++++++++++++++++++ ...ogin-efc5740c90ff0a59809e4e9849d0d149.yaml | 58 +++++++++++++++++++ ...ogin-ffe4a494ba525ff7867c7e82eb26993d.yaml | 58 +++++++++++++++++++ ...ogin-33ba7ead1d6b53a7bacd0ee1d3cec66a.yaml | 58 +++++++++++++++++++ ...ogin-ac32a3365dd3ce67be3869f846f1d80e.yaml | 58 +++++++++++++++++++ ...ogin-e87c9f8090be1d89c33f679b357f6df8.yaml | 58 +++++++++++++++++++ ...ress-fbdea8451b311eb4ce44cfe1a03a2154.yaml | 58 +++++++++++++++++++ ...ress-40c66d343981decaf1c11e2239adae6e.yaml | 58 +++++++++++++++++++ ...ress-806ff64ba5797ae36351687c8c401e27.yaml | 58 +++++++++++++++++++ ...ress-a9a638b4142268e1bac6a40ef293c66b.yaml | 58 +++++++++++++++++++ ...ress-b9006062d746b8caf6ca2e15e2892f35.yaml | 58 +++++++++++++++++++ ...ress-f1f206bccc7ec9ca4ed21059b6547361.yaml | 58 +++++++++++++++++++ ...ress-f6bb81d744ef9464f6fccc27a671bc84.yaml | 58 +++++++++++++++++++ ...ocal-062a12d42d5fa439eba03cd3a142a5ad.yaml | 58 +++++++++++++++++++ ...ocal-559e4b65f535b45dcfe5d339b535e1b8.yaml | 58 +++++++++++++++++++ ...ocal-6f2bfa44316597918db6902f22101641.yaml | 58 +++++++++++++++++++ ...shop-081f62a87d654a4a56d997452fef47f0.yaml | 58 +++++++++++++++++++ ...zlei-8b316c2c5c57a5bec4fddd68dace9cd3.yaml | 58 +++++++++++++++++++ ...hops-c41eb0b63074858e7a2ad3fb4237d823.yaml | 58 +++++++++++++++++++ ...pify-d58b5b8c1f20223d27dbac48d68ed8bc.yaml | 58 +++++++++++++++++++ ...code-556540f24142f2b0189f842b638e3b3b.yaml | 58 +++++++++++++++++++ ...ewer-955bd8a9c17ef8d9a80499ee35d81209.yaml | 58 +++++++++++++++++++ ...imit-9de482ee3d956ce585f6bd7d5fa3f9c1.yaml | 58 +++++++++++++++++++ ...over-d2df040b2ddbf2c6a18a499a718c8a17.yaml | 58 +++++++++++++++++++ ...dges-c3fe9adbef48906de6288ff04a6a51a9.yaml | 58 +++++++++++++++++++ ...sync-41acc719f07692e44cc41d180d104907.yaml | 58 +++++++++++++++++++ ...papp-894d5909f0af3672921ffb2138091248.yaml | 58 +++++++++++++++++++ ...gine-e0c5d4dca3eeae77e08a24a0d2c24dce.yaml | 58 +++++++++++++++++++ ...wpss-7cf13e2bb716c26880ecc9fba4b8b446.yaml | 58 +++++++++++++++++++ ...wpss-dfc9289a15b5d9ef4c8b8a78a1e983f0.yaml | 58 +++++++++++++++++++ ...wpss-ee3866229b628cfe3699728232f7f492.yaml | 58 +++++++++++++++++++ ...cart-1f49340070b07f37e2b631ba71cc0b18.yaml | 58 +++++++++++++++++++ ...ream-d011f1f83d77935b57f8c936c3d34792.yaml | 58 +++++++++++++++++++ ...ream-d118e9921cdb49f79910263f2b2e7390.yaml | 58 +++++++++++++++++++ ...chro-7c11f7c384d9dd8d4651247b810c16b8.yaml | 58 +++++++++++++++++++ ...chro-e74a81eb9870251841dabcabe93454ff.yaml | 58 +++++++++++++++++++ ...bles-81fef267b7d2479d27762ebd528c25d5.yaml | 58 +++++++++++++++++++ ...lery-0e5c12aafd12c94fc7a397fbe2697f9a.yaml | 58 +++++++++++++++++++ ...ools-08963ed44b1cea3058d5d701a7dc7bd5.yaml | 58 +++++++++++++++++++ ...ools-509c39acb39a633805d6b569fc41a485.yaml | 58 +++++++++++++++++++ ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ouch-10e0f566e327669476b16f2a9ebfe55e.yaml | 58 +++++++++++++++++++ ...ouch-1b6d42c938576bb7e9892a86129f9bc5.yaml | 58 +++++++++++++++++++ ...ouch-4578c261077bba561117707849a7d191.yaml | 58 +++++++++++++++++++ ...ouch-79ef66275733eff8f488bb76b45e9786.yaml | 58 +++++++++++++++++++ ...ouch-92f2fb442048282c27cd8fc5629a2db5.yaml | 58 +++++++++++++++++++ ...ouch-b8cd38cebac9c7df524c313f084f74d0.yaml | 58 +++++++++++++++++++ ...ouch-c426bf1b8239d541e948689bf4281f26.yaml | 58 +++++++++++++++++++ ...ouch-ddef2c9b920afc1274bfc9aad43c2024.yaml | 58 +++++++++++++++++++ ...ouch-f63166b5a96e6e66374a20ab51c64110.yaml | 58 +++++++++++++++++++ ...tons-94f3a814c03c449b36cb253d7f80d949.yaml | 58 +++++++++++++++++++ ...view-0da2272f6fad3d314fe055d518112eb5.yaml | 58 +++++++++++++++++++ ...inwp-3df45b218aba0e53ba0ae72e9699b2ef.yaml | 58 +++++++++++++++++++ ...inwp-a7bf9a411638a6c87526e9cf7c7ea42c.yaml | 58 +++++++++++++++++++ ...tore-02311b741caefd1373a75d8083768696.yaml | 58 +++++++++++++++++++ ...tore-0bef183926021b3705ecb7e440cd2280.yaml | 58 +++++++++++++++++++ ...tore-11e9b1d880ea6b9e7b3f23d21ed1379c.yaml | 58 +++++++++++++++++++ ...tore-167f863d325454383d95967607b16eaf.yaml | 58 +++++++++++++++++++ ...tore-21742813963970be1b852e62999d105e.yaml | 58 +++++++++++++++++++ ...tore-261f8d0d96a6973bf1fe24c56cd5b3ec.yaml | 58 +++++++++++++++++++ ...tore-549345c10b291ab93f71309abaa38002.yaml | 58 +++++++++++++++++++ ...tore-574ff230e2226e2c8ffbb0d383453c99.yaml | 58 +++++++++++++++++++ ...tore-5bf4618f3f911336450f68ac829f8ebb.yaml | 58 +++++++++++++++++++ ...tore-66174d632ca5e11403564d89ab52d0f1.yaml | 58 +++++++++++++++++++ ...tore-6e746242a89a0f0791f490c19cf07982.yaml | 58 +++++++++++++++++++ ...tore-6fc26492de3e14b8a03318635a942d46.yaml | 58 +++++++++++++++++++ ...tore-70efeee5b28a1c15fdfabb1bea0a8d31.yaml | 58 +++++++++++++++++++ ...tore-92cb4c71463b35b1c480a90397f7eb13.yaml | 58 +++++++++++++++++++ ...tore-a6bc1c4f18d7c787b94d2c3a536d60d6.yaml | 58 +++++++++++++++++++ ...tore-a88c71a7fe9a31f1969a27de0aeb4145.yaml | 58 +++++++++++++++++++ ...tore-b070ea085481a5d7bd82f5fd3f416fd0.yaml | 58 +++++++++++++++++++ ...tore-c09b3bbf7fa2f9da4c4d07cfecb5595a.yaml | 58 +++++++++++++++++++ ...tore-ed94652247c936f26c87589210c8b78f.yaml | 58 +++++++++++++++++++ ...wpvr-0494f8e348129a631af8f56e0ffddc34.yaml | 58 +++++++++++++++++++ ...wpvr-05be7d772f531cd07131df257a1f15a1.yaml | 58 +++++++++++++++++++ ...wpvr-05c834cda01a386b0744c30fe4c1b224.yaml | 58 +++++++++++++++++++ ...wpvr-0e6778305a28eacf186b54844a0e5ea0.yaml | 58 +++++++++++++++++++ ...wpvr-18966e8228314b8165d39d48519f43cc.yaml | 58 +++++++++++++++++++ ...wpvr-30833f7da41d4fcbb3740f51789c1920.yaml | 58 +++++++++++++++++++ ...wpvr-30df02f445ade717ac7c0e2991062171.yaml | 58 +++++++++++++++++++ ...wpvr-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...lder-1453924550bc29c555e5d4ba1d470f33.yaml | 58 +++++++++++++++++++ ...lder-435ab56c3c78663cfa598710697f9daf.yaml | 58 +++++++++++++++++++ ...lder-46443215df27c06259cb9cb549f79f5d.yaml | 58 +++++++++++++++++++ ...lder-6fe1ccb7efc24357409ad5ff0b713ab1.yaml | 58 +++++++++++++++++++ ...lder-c8eb6bc5db7f4876cb01e7f978c6ef1d.yaml | 58 +++++++++++++++++++ ...dons-0c1df7bc0f650153d4deab14ee137704.yaml | 58 +++++++++++++++++++ ...olio-0ee2773c0417239ca9eb51cc09f9c94f.yaml | 58 +++++++++++++++++++ ...odes-3b341aa619ead8c67e0c3faf1b78e638.yaml | 58 +++++++++++++++++++ ...tion-46269389e3b60bf15a43ac719ab1d96d.yaml | 58 +++++++++++++++++++ ...form-cf0536ededa77239ac982d05d856b3db.yaml | 58 +++++++++++++++++++ ...bles-b7300a2ec84dffd7f0d27ca9d7ff574b.yaml | 58 +++++++++++++++++++ ...bles-c3986a6ffb844160a08c3a8660d4bd5e.yaml | 58 +++++++++++++++++++ ...p-vc-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ebox-4ece1b2368b1b6541fd5808b6263c140.yaml | 58 +++++++++++++++++++ ...form-7c5b4d9c6aa7181d9617238c12cc19eb.yaml | 58 +++++++++++++++++++ ...form-832185af76432ae76d6be1580f0d17e2.yaml | 58 +++++++++++++++++++ ...form-a9651b358db184ef2f9f80cf3ecfa474.yaml | 58 +++++++++++++++++++ ...form-b4ff9a96de0f409f95e972962d7a3e6d.yaml | 58 +++++++++++++++++++ ...-pro-832185af76432ae76d6be1580f0d17e2.yaml | 58 +++++++++++++++++++ ...-pro-a9651b358db184ef2f9f80cf3ecfa474.yaml | 58 +++++++++++++++++++ ...ands-02b515a3d90192b157fb5edc5ea88a55.yaml | 58 +++++++++++++++++++ ...cure-8435cd6b84481f3b14132a8d7f815c94.yaml | 58 +++++++++++++++++++ ...cure-9b48b8479f4c58ab28f6369c437cd823.yaml | 58 +++++++++++++++++++ ...ader-8589ee226f71b9ad4c2ae9aa0680e0d9.yaml | 58 +++++++++++++++++++ ...ader-de76eb4127c4abe851f7593ebf365054.yaml | 58 +++++++++++++++++++ ...post-3324e66b3f1d865a4a88e7aa92b87f29.yaml | 58 +++++++++++++++++++ ...post-bea1167e010c002491bae397468a7fde.yaml | 58 +++++++++++++++++++ ...post-fe235b16e5129f2873d5a71f2024f409.yaml | 58 +++++++++++++++++++ ...ting-530246c3333edec963a6035638964677.yaml | 58 +++++++++++++++++++ ...code-e7037db773bf01752d04e36ac2a2c9a0.yaml | 58 +++++++++++++++++++ ...utes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...-aff-c7d33fa41953ee9af357676fb8306244.yaml | 58 +++++++++++++++++++ ...over-92ee681763fb9cdadb89c1275ea24df6.yaml | 58 +++++++++++++++++++ ...-org-c30ecd15c33e495c7a907535cf50c4ac.yaml | 58 +++++++++++++++++++ ...sync-506b320d59fe9094f7b88764f2b3b6fd.yaml | 58 +++++++++++++++++++ ...ters-0dc627cd120008e5a66c81e20ce78b02.yaml | 58 +++++++++++++++++++ ...ters-149048c8f49646b7cbdd6843761e070a.yaml | 58 +++++++++++++++++++ ...ters-16a2ba366a797ba0d5eb3e8be47b4c59.yaml | 58 +++++++++++++++++++ ...ters-568514847d2ecbfcd9be56c047f3a92a.yaml | 58 +++++++++++++++++++ ...ters-7b51f983a57c524a14f0aa93885b9cf0.yaml | 58 +++++++++++++++++++ ...ters-d6e885fce7f28ee6559b8945eb076a5d.yaml | 58 +++++++++++++++++++ ...ters-eb211f56901dd02ad29cd2f46f132fad.yaml | 58 +++++++++++++++++++ ...ters-edea3de67b57b3e5d091c25ded4c1ae1.yaml | 58 +++++++++++++++++++ ...ters-f7d5e9c6698316d3dbc370fb98b6400f.yaml | 58 +++++++++++++++++++ ...ters-ff3256f502dbc04fc7eb4fae59537065.yaml | 58 +++++++++++++++++++ ...ress-0943806ea17e69fbad3f9008b6d8edaf.yaml | 58 +++++++++++++++++++ ...tore-04c5acbffc68842824e9b1f4759868d3.yaml | 58 +++++++++++++++++++ ...tore-10a6f997b77b37003eabf2a216fdeced.yaml | 58 +++++++++++++++++++ ...tore-1603594359d529d2b8fdbef947c8f58c.yaml | 58 +++++++++++++++++++ ...tore-1c3b4e53e5b3379877d01d32e9f8b494.yaml | 58 +++++++++++++++++++ ...tore-259f1c198d6aae45fe01969db446735f.yaml | 58 +++++++++++++++++++ ...tore-34ff52c103b465dd566bb0b7233b8c5c.yaml | 58 +++++++++++++++++++ ...tore-614dbc5cead598413ac3ce439b53a52e.yaml | 58 +++++++++++++++++++ ...tore-66945b5d2da91990e6148061d7f22822.yaml | 58 +++++++++++++++++++ ...tore-7d4b923b890bf3599f0fa68ae5f894dc.yaml | 58 +++++++++++++++++++ ...tore-9584af5b5f010003c1054d63d9d8c800.yaml | 58 +++++++++++++++++++ ...tore-981dc1dc52b06f3430863bd14410cb31.yaml | 58 +++++++++++++++++++ ...tore-ba15e4c927467d88c6d7ea80fbe845a6.yaml | 58 +++++++++++++++++++ ...tore-c66baa1c275e274488b7d52e2acbab59.yaml | 58 +++++++++++++++++++ ...tore-d6467913a640b127b20e07c49e842d3b.yaml | 58 +++++++++++++++++++ ...usel-780fa31d43c1e72887f541f835fe2c28.yaml | 58 +++++++++++++++++++ ...line-02e1b44167070c59f019d59aa8eb3804.yaml | 58 +++++++++++++++++++ ...erce-05a9cfff31ff66f2865f7b47e03322c5.yaml | 58 +++++++++++++++++++ ...erce-ad605f98f0b12012c381eafdf54cfada.yaml | 58 +++++++++++++++++++ ...tter-1ce0c9b4a51f3fdac3a650bd3678e546.yaml | 58 +++++++++++++++++++ ...tags-ec41c915e32b517417556f61cbbe4554.yaml | 58 +++++++++++++++++++ ...ndar-cfbef53d87854aaa058c431289304e79.yaml | 58 +++++++++++++++++++ ...erce-0088814ed74fd156e9ee132de51ef1d2.yaml | 58 +++++++++++++++++++ ...nter-ad7168d347e726627d613abda6b471b1.yaml | 58 +++++++++++++++++++ ...feed-ed9d6de2b2caf08fa88d82aee7a4dacf.yaml | 58 +++++++++++++++++++ ...ogle-cdde1a134c6ef6b26a1e78ad1a41d56f.yaml | 58 +++++++++++++++++++ ...deos-a35a0e7274ecf003f21418a2f0fe05e6.yaml | 58 +++++++++++++++++++ ...ndar-4cf56c133f1db56b8a3cc3b03429bb93.yaml | 58 +++++++++++++++++++ ...ider-3f7130e05b74b1e5f65b8d9e77a1373e.yaml | 58 +++++++++++++++++++ ...rity-0d6d2e1e75a3d7c24aa16b9420abf358.yaml | 58 +++++++++++++++++++ ...lock-75fb06485693f13299e4aa42a8ec1d70.yaml | 58 +++++++++++++++++++ ...lite-68634c1a8c946edc4c46f0185186727b.yaml | 58 +++++++++++++++++++ ...lite-7fd7a99aaec9de09c58a50b6b832a9fa.yaml | 58 +++++++++++++++++++ ...dons-85070818b2a0ed18993539089f99013d.yaml | 58 +++++++++++++++++++ ...leon-4589a6370d5dbea689df46df9c5577a1.yaml | 58 +++++++++++++++++++ ...ator-5b3901e02ad2424b1793990cd718f093.yaml | 58 +++++++++++++++++++ ...cart-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ards-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ches-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ator-2adf451d71caa92a7f7c155d4ef7aae4.yaml | 58 +++++++++++++++++++ ...yabp-474b68fd8dad59276b2b0abb985452ea.yaml | 58 +++++++++++++++++++ ...wiki-57f13a889e0cffca9cc00946f63d375b.yaml | 58 +++++++++++++++++++ ...ress-489466a4c841b3b26e3fdf281284debf.yaml | 58 +++++++++++++++++++ ...maps-f801c1aeb4734b7133d474f559fadcb5.yaml | 58 +++++++++++++++++++ ...kout-d991553a68fa73bd081b1770dfe6f7af.yaml | 58 +++++++++++++++++++ ...tton-480067fff73f218a897f527d009097f5.yaml | 58 +++++++++++++++++++ ...tton-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...itsa-0cfa07456732530e831220894e1919de.yaml | 58 +++++++++++++++++++ ...atra-3cae7fcdb0832a80c22b613ce2425d20.yaml | 58 +++++++++++++++++++ ...ools-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...awpp-6ef860020cf2393d29a3d4b7f6db6475.yaml | 58 +++++++++++++++++++ ...awpp-a37629b8951d8dca9eaa0034808a75be.yaml | 58 +++++++++++++++++++ ...smtp-1880e59c92fe0e79ed53bd8a0e62de6d.yaml | 58 +++++++++++++++++++ ...smtp-3dde0f0622765c2ad7f47077755dade6.yaml | 58 +++++++++++++++++++ ...smtp-4d3dbfcfc5bd83e1f32cd6ab14a72545.yaml | 58 +++++++++++++++++++ ...smtp-53237b2a666711b5ed5327cacfdd45f6.yaml | 58 +++++++++++++++++++ ...smtp-c5709fba92c5e77b429d3d6d877dbdaa.yaml | 58 +++++++++++++++++++ ...stem-099d72d33b89027185d04eec96bd1d04.yaml | 58 +++++++++++++++++++ ...izer-0a6ee246dd7e0fbebdf1fe319b82ca2c.yaml | 58 +++++++++++++++++++ ...izer-7a834f58a606cf067ebc7019fbcc29e8.yaml | 58 +++++++++++++++++++ ...izer-bc75273fcc2a01b62e53de804d6a871c.yaml | 58 +++++++++++++++++++ ...yard-04f24d8a77ed9613e08490a191c4df98.yaml | 58 +++++++++++++++++++ ...yard-c5527d6f57853cc49c907b306043f9d1.yaml | 58 +++++++++++++++++++ ...esno-d1fe830178bd836f853d2f1e8ea1327c.yaml | 58 +++++++++++++++++++ ...ugin-6fe67f9ebf1fd28c0850e6428387bc2e.yaml | 58 +++++++++++++++++++ ...ugin-9da0817673d4e46e6fd57b591efba31c.yaml | 58 +++++++++++++++++++ ...ugin-bff9375a673f8d2d232dddd7e1d5201a.yaml | 58 +++++++++++++++++++ ...ugin-c1c98038e2071b40fa92b1876951feb1.yaml | 58 +++++++++++++++++++ ...ugin-f004ce2a754ccfc5988e2e69aed45af9.yaml | 58 +++++++++++++++++++ ...ugin-f373bbafc03e475d3ffabbbd84f90eda.yaml | 58 +++++++++++++++++++ ...ting-146da8f6895b52d2f71daced48bc4bb3.yaml | 58 +++++++++++++++++++ ...ting-2f087270cc2f0766f3522e85859f5682.yaml | 58 +++++++++++++++++++ ...ting-61995cd0cadb8b6360d652af233c94df.yaml | 58 +++++++++++++++++++ ...ting-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ting-c1cf31deca47ab06031c32c6f87e918a.yaml | 58 +++++++++++++++++++ ...ting-efe780e12c2c72ceb89cb957cd97aaac.yaml | 58 +++++++++++++++++++ ...ting-ffed5a07256deebff2bbee11af3700d2.yaml | 58 +++++++++++++++++++ ...tabs-6208ba5c5d5d6da9586016ed5d7a8c01.yaml | 58 +++++++++++++++++++ ...tabs-8d1ec64befa71150df8d15ca9a46e658.yaml | 58 +++++++++++++++++++ ...nder-03e1e5461591c1057ed60beb9b3bae79.yaml | 58 +++++++++++++++++++ ...nder-177659464b8d85544069425197c4369a.yaml | 58 +++++++++++++++++++ ...nder-1d49f8f287f32ef24b0d6d09efbb3a99.yaml | 58 +++++++++++++++++++ ...nder-23c724086aac6deded1ebc7c3f6322cf.yaml | 58 +++++++++++++++++++ ...nder-386a0afabc9239508b641e7c3c487c92.yaml | 58 +++++++++++++++++++ ...nder-53951cc6c6fc3a1b6dbee499dbf71331.yaml | 58 +++++++++++++++++++ ...nder-548ea404dc918edae3aacbe70f4f2745.yaml | 58 +++++++++++++++++++ ...nder-85182e02e56cd4169277eefa805fcb8b.yaml | 58 +++++++++++++++++++ ...nder-92e334f7eff847d619a107f5b6ee2b7d.yaml | 58 +++++++++++++++++++ ...nder-b2623a7e77be214a3a6362bd14987ece.yaml | 58 +++++++++++++++++++ ...nder-cce904a4a7f2d422f5ff2c8c1b3c77b4.yaml | 58 +++++++++++++++++++ ...nder-fe922fd0e38d640f64cea8429582a5c0.yaml | 58 +++++++++++++++++++ ...erce-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...erce-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...erce-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...erce-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...erce-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...erce-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...erce-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...erce-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...erce-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...erce-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...erce-77b9a05dcc6a23ba6229304e9509d659.yaml | 58 +++++++++++++++++++ ...ce-1-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ce-1-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ling-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ling-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...mode-47f2a0e84b3d74553b2adb604a344eb0.yaml | 58 +++++++++++++++++++ ...mode-9e36292a7ac47d63600972695d9e0b66.yaml | 58 +++++++++++++++++++ ...mode-c63c09dfe0443988600f74c6f35feaf4.yaml | 58 +++++++++++++++++++ ...erce-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...erce-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...erce-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...erce-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...erce-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...erce-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...erce-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...erce-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...erce-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...mium-982ffbf6beec794e0b1ae79fe9b1aaa9.yaml | 58 +++++++++++++++++++ ...opup-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...opup-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...opup-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...iews-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...iews-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...iews-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ates-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ates-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ates-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...tion-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...tion-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...tion-8e47416ac2dba104b5166ffbff80d7af.yaml | 58 +++++++++++++++++++ ...arch-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...arch-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...arch-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...eway-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...eway-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...eway-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ment-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ment-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ment-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...lers-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...d-on-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...d-on-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...d-on-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ting-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ting-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ting-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ages-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ages-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ages-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...mode-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...mode-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...dion-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...dion-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...pare-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...pare-282e251eab336c690b3101edf7ffeddc.yaml | 58 +++++++++++++++++++ ...pare-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...pare-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...pare-e5eb957a437ccd71daf2e9f56a4559b2.yaml | 58 +++++++++++++++++++ ...ideo-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ideo-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ther-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ther-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ther-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ards-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ards-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ards-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...mium-41e80875772903dab5f7014a7dce0bda.yaml | 58 +++++++++++++++++++ ...mium-4a463e7ba518b96c1fea8ec0461b05e3.yaml | 58 +++++++++++++++++++ ...mium-83ba46f68dcdc63735fee9175b72793e.yaml | 58 +++++++++++++++++++ ...himp-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...himp-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...himp-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...kout-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...kout-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...kout-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...rice-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...rice-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...king-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...king-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...king-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...oice-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...oice-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...oice-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ards-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ards-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ards-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...opup-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...opup-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...-ons-255ea4aa4e6fb6ceab7bcf43313eab50.yaml | 58 +++++++++++++++++++ ...-ons-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...-ons-27280f97d7c2f094c66e491abb0e38cf.yaml | 58 +++++++++++++++++++ ...-ons-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...-ons-61ed528306912302d784398edae3cbb2.yaml | 58 +++++++++++++++++++ ...-ons-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...dles-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...dles-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...dles-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...usel-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...usel-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...dors-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...dors-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...dors-dced2caedbf7a329c1717024ec2a676a.yaml | 58 +++++++++++++++++++ ...dors-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...wers-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...wers-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...wers-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...view-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...view-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...view-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...cart-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...uote-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...uote-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...uote-cd76dd48c85b587e87acb07c80de397a.yaml | 58 +++++++++++++++++++ ...uote-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ogin-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ogin-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ogin-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ripe-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ripe-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...ripe-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...tion-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...tion-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...tion-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...ager-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...ager-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...list-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...list-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...list-bcdc9da8f16c2dd363504b15d634a8b3.yaml | 58 +++++++++++++++++++ ...list-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...list-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...list-2ae81b909e77b01f5f9d53fd011b14fb.yaml | 58 +++++++++++++++++++ ...list-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...list-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...fier-26995bfc01056c81bc6600b718d2f9c3.yaml | 58 +++++++++++++++++++ ...fier-564f40d4fe0ef114f55053468e52e333.yaml | 58 +++++++++++++++++++ ...fier-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 58 +++++++++++++++++++ ...rket-2bf6e569a041eba29b626a0e786e076e.yaml | 58 +++++++++++++++++++ ...rket-af78913e8aa3b92d3397ebee3054a3e9.yaml | 58 +++++++++++++++++++ ...arch-128d5f3d162a44e44f532e8dc2dce7bf.yaml | 58 +++++++++++++++++++ ...ider-1327cd5b3a24f53dc0f827abbdb99b36.yaml | 58 +++++++++++++++++++ ...ider-6496be73d20798eb7af74bf20b42d8fa.yaml | 58 +++++++++++++++++++ ...ider-7da4dea81c55210aa215efa50cd5e1a7.yaml | 58 +++++++++++++++++++ ...ider-7f7eb1234b1c572ad770fcbedeeb7de7.yaml | 58 +++++++++++++++++++ ...ider-e46bfa26b6acc9d0ed585b68ffa95ec6.yaml | 58 +++++++++++++++++++ ...assa-10647c17dbf9c37ea854931ce84957f9.yaml | 58 +++++++++++++++++++ ...assa-d03a599615f97ee32ed6c9f069046608.yaml | 58 +++++++++++++++++++ ...poll-0779481b7f80c0411ff97013b26aee05.yaml | 58 +++++++++++++++++++ ...poll-2209fd73f482335c124e2a704dbac383.yaml | 58 +++++++++++++++++++ ...poll-348e9954cde1ddefaa405cdbf442ab7b.yaml | 58 +++++++++++++++++++ ...poll-3ceff14dcfb2e0311d597c89266b0063.yaml | 58 +++++++++++++++++++ ...poll-538b036c9b7ca7079f6e2a5cc2642fb5.yaml | 58 +++++++++++++++++++ ...poll-570709303e69e8bea02cdb35b74ee58c.yaml | 58 +++++++++++++++++++ ...poll-5cd8506b97bde8d30090476ea4e9f6d6.yaml | 58 +++++++++++++++++++ ...poll-7a46739bfced50470df5ec8fce622b5b.yaml | 58 +++++++++++++++++++ ...poll-811602c2462c1ce744a5866bcb3ff2bb.yaml | 58 +++++++++++++++++++ ...poll-ac4eaf61003a7bcab0c4c83244d45aab.yaml | 58 +++++++++++++++++++ ...poll-cb10630ddc7da513be3fbc863f316ce2.yaml | 58 +++++++++++++++++++ ...poll-dde39ba4d7059070e8dd3bb604ff98da.yaml | 58 +++++++++++++++++++ ...erce-2209fd38d31d7045610e08e5a8e2302b.yaml | 58 +++++++++++++++++++ ...mbed-371f210cfb55319010fd16b3a7c4efca.yaml | 58 +++++++++++++++++++ ...mbed-50a6dff0cb336807f517358763e4184a.yaml | 58 +++++++++++++++++++ ...mbed-fcbd76097c62e0d5592f5bd058f1a16f.yaml | 58 +++++++++++++++++++ ...hang-43a1e8131c5398f64ddb0148cb86b0fc.yaml | 58 +++++++++++++++++++ ...cart-0b4cf00934e898c124e66c8a24ee9c38.yaml | 58 +++++++++++++++++++ ...ager-882b62316645c3c4ca02d06b90f3ba4c.yaml | 58 +++++++++++++++++++ ...nnel-14a83f20a2e76cecad34b8959bcb030a.yaml | 58 +++++++++++++++++++ ...nnel-3989a9901d352d6a2f1182e6cf00355e.yaml | 58 +++++++++++++++++++ ...nnel-46e730049923010c8fef590481e6af11.yaml | 58 +++++++++++++++++++ ...nnel-79b5bcc733210544f6943a7d400a5741.yaml | 58 +++++++++++++++++++ ...nnel-7b03e9c7a48a7a487481072b229c74d2.yaml | 58 +++++++++++++++++++ ...nnel-7eee22ee9d7eafb911cff5c522c34cc9.yaml | 58 +++++++++++++++++++ ...nnel-874a492260299c7a5afa8a7cc7cbcac9.yaml | 58 +++++++++++++++++++ ...nnel-9ffefef754ef7b05c84f3b0ba93de0df.yaml | 58 +++++++++++++++++++ ...nnel-bda0e76aad71129453d100395876792d.yaml | 58 +++++++++++++++++++ ...nnel-c9984a876e871660704819ab2121a5a0.yaml | 58 +++++++++++++++++++ ...bers-4841648779bddf5eb17a1f0352588205.yaml | 58 +++++++++++++++++++ ...ugin-4ad999fa82a381d094bc99654eb86aca.yaml | 58 +++++++++++++++++++ ...nnel-3485e314595e8ba9b90ab54d159e74ca.yaml | 58 +++++++++++++++++++ ...nnel-3f9ac076d173ecd9afccb09cd7195bfc.yaml | 58 +++++++++++++++++++ ...nnel-8e4fe58479cedd644fbbd3b418e0b682.yaml | 58 +++++++++++++++++++ ...nnel-dd26803b22794f717e5726511579315e.yaml | 58 +++++++++++++++++++ ...lery-b830431516693664401f38e9ff6fdd82.yaml | 58 +++++++++++++++++++ ...mbed-315a019742ffab737ef11e333f6ddf51.yaml | 58 +++++++++++++++++++ ...mbed-b86d996fd3fb32f4d4a2741c181e0be2.yaml | 58 +++++++++++++++++++ ...plus-ee98789d25d36584b37cbc76b4f1f9c4.yaml | 58 +++++++++++++++++++ ...eder-ba80b860d4e6bf99a76e42ede7281809.yaml | 58 +++++++++++++++++++ ...ayer-803fd151825baa056b93685e93955a54.yaml | 58 +++++++++++++++++++ ...ayer-a14f62f5c8828736c014cf6f6d52173a.yaml | 58 +++++++++++++++++++ ...code-de2bc693a1c312889ab71164989a7177.yaml | 58 +++++++++++++++++++ ...case-adff1d89188982b4e28e29b803f67a6e.yaml | 58 +++++++++++++++++++ ...load-1850212bc734be4160339a2e211bb5c6.yaml | 58 +++++++++++++++++++ ...rter-62d169261c9604e6c54d2dda26a18971.yaml | 58 +++++++++++++++++++ ...ayer-2b8463e6867dce79ddd40af4dd9780fd.yaml | 58 +++++++++++++++++++ ...ayer-9f08d8940e734966b92051cba3f5ff32.yaml | 58 +++++++++++++++++++ ...sive-d5afc9936d3ec0ef2f1ebf204d2b6f90.yaml | 58 +++++++++++++++++++ ...down-db1bfddf516dcb0f89a64dd78526f798.yaml | 58 +++++++++++++++++++ ...zify-0bcd48a3f1b52a4a7092a42bfa6473a6.yaml | 58 +++++++++++++++++++ ...zify-1eaf6ff13c8b718103c9b459aa46b172.yaml | 58 +++++++++++++++++++ ...zify-87cb25b1c7747f5af4e409cfd05ed832.yaml | 58 +++++++++++++++++++ ...zify-8b9fbd031d6f59226821b7faa24713d4.yaml | 58 +++++++++++++++++++ ...tion-deb298ce4863a239756c2bf229347f46.yaml | 58 +++++++++++++++++++ ...ayer-3976419442f6726cc8fee397bc7f22ee.yaml | 58 +++++++++++++++++++ ...ayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...witt-76b896e05441bad3b87a1f15a06f97a4.yaml | 58 +++++++++++++++++++ ...post-73a2e276237565aa409d25c41f8ca0e2.yaml | 58 +++++++++++++++++++ ...view-7afc53a437871814faec30b27e8447a5.yaml | 58 +++++++++++++++++++ ...ntem-ef5ed531568c083ac4bd116aef4f2b54.yaml | 58 +++++++++++++++++++ ...ayer-aa439b9d2e93b6ff2495abedfda870b3.yaml | 58 +++++++++++++++++++ ...tats-e5d3824dce2c042eb639b46cc57ff2d2.yaml | 58 +++++++++++++++++++ ...dity-c1b48655787cca8bb98f42a7402e4f5f.yaml | 58 +++++++++++++++++++ ...hare-09e64e82ae55462158eeb5e726a22311.yaml | 58 +++++++++++++++++++ ...tory-3ecd9d29be301ddeb0777372578c9ed3.yaml | 58 +++++++++++++++++++ ...tive-6dca12dc38630f4f9ae87a5c64f8992b.yaml | 58 +++++++++++++++++++ ...desk-754636da4394eed1ba762eb903570de0.yaml | 58 +++++++++++++++++++ ...nter-83e7004306bfbb58dbc0b94ba733c14a.yaml | 58 +++++++++++++++++++ ...ment-1e3f4e1ff5158794a25646563fe28f9d.yaml | 58 +++++++++++++++++++ ...ment-e98f58904228ac7173e5fcfac5af85a6.yaml | 58 +++++++++++++++++++ ...mage-581a16776001d26901f68412e72a12c5.yaml | 58 +++++++++++++++++++ ...izer-230d51cfd302c1eecd4d3a3387befab9.yaml | 58 +++++++++++++++++++ ...ager-0683602aa21df3d5a8b5ad8b8d019fd4.yaml | 58 +++++++++++++++++++ ...ager-37c471f64e53100c9ad9fb469cb0b5ca.yaml | 58 +++++++++++++++++++ ...ager-624c5301cd644d9b563918924237400c.yaml | 58 +++++++++++++++++++ ...ager-794b67b62be42f3f8ca1d215c298fa56.yaml | 58 +++++++++++++++++++ ...ager-dafa2871ae7c93d913fdc3e40139c185.yaml | 58 +++++++++++++++++++ ...ager-e94377837818e9045e22fcbe33f9af9d.yaml | 58 +++++++++++++++++++ ...ager-ffa1a3ac7c56aa84edc8d1c4d2786035.yaml | 58 +++++++++++++++++++ ...ting-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 58 +++++++++++++++++++ ...-crm-38ff57a3a79c762236aaaeaffc92c374.yaml | 58 +++++++++++++++++++ ...-crm-aec751941690d89755638c950f64d01d.yaml | 58 +++++++++++++++++++ ...-crm-b829e9e3bc2e932b44b01c6e5d51daac.yaml | 58 +++++++++++++++++++ ...-crm-e541a07e8afe605f1bf04dc95e06d38b.yaml | 58 +++++++++++++++++++ ...-crm-e62802506f71c3511e6c8f20c3c5bc64.yaml | 58 +++++++++++++++++++ ...-crm-ebb8de96320f3c64a91f6dbb13b596fa.yaml | 58 +++++++++++++++++++ ...spam-4639cf5f39a95924327a8dca4717fa6c.yaml | 58 +++++++++++++++++++ ...spam-76cebc35705efab283512491fbfb5ded.yaml | 58 +++++++++++++++++++ ...spam-8d3590a739a7dcd2c4eca80910f2eb77.yaml | 58 +++++++++++++++++++ ...spam-da9b182fa6fe344911bcf311918bd2c9.yaml | 58 +++++++++++++++++++ ...spam-e1ad6d026d68d47f5c4c4162b3b2d312.yaml | 58 +++++++++++++++++++ ...unce-3b122e7dd636f2979e4419665efeeeb4.yaml | 58 +++++++++++++++++++ ...orum-b3a1763459f84e01883c4eac1864668d.yaml | 58 +++++++++++++++++++ ...kets-189f446d2c45b3b01640096dd0b387b9.yaml | 58 +++++++++++++++++++ ...shop-47fb80194f8e9eb6848064791850ac64.yaml | 58 +++++++++++++++++++ ...shop-f4ee9df210a60a8c7b3151780ca279b1.yaml | 58 +++++++++++++++++++ ...lder-c982dae5e8a9922c1cd4de17c56c6264.yaml | 58 +++++++++++++++++++ ...ents-0cc87c7e1c569749aff97d224894c613.yaml | 58 +++++++++++++++++++ ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ipes-6dd6d330b8c5b9519a5c7e7eb2275f8f.yaml | 58 +++++++++++++++++++ ...ipes-cb09c78d8cbad27edaa184a301bc9557.yaml | 58 +++++++++++++++++++ ...ipes-dafddc9bea1e241db1766d412621b738.yaml | 58 +++++++++++++++++++ ...ipes-f7e8f8b14f258bbc08d845e9a1c78fe8.yaml | 58 +++++++++++++++++++ ...ippy-5296c4f305bae7ac7b64bb4111846d67.yaml | 58 +++++++++++++++++++ ...ippy-79737b0e5975df19862e5152b14611f3.yaml | 58 +++++++++++++++++++ ...ippy-919cf6f31f29222aa869aeeb40e21222.yaml | 58 +++++++++++++++++++ ...ippy-c592d86340244bb94d180507b23fa5a8.yaml | 58 +++++++++++++++++++ ...oard-a3ba5f2761ca9302a85775ee3b727b37.yaml | 58 +++++++++++++++++++ ...wall-4dd3cd282a5e0a6020901679d8114797.yaml | 58 +++++++++++++++++++ ...ster-bd15ec75a9f06fe35c580f88aeba9b7d.yaml | 58 +++++++++++++++++++ ...ster-c9973ef86938dfe0c48a5abdfafd30a8.yaml | 58 +++++++++++++++++++ ...ster-ffbdefeb8e9807045768193f5cbcf332.yaml | 58 +++++++++++++++++++ ...lery-d6a4a05c68d8a3214ff9eb4a728a2600.yaml | 58 +++++++++++++++++++ ...igns-51be17f4121e81eef8733d9b91f0a025.yaml | 58 +++++++++++++++++++ ...igns-6dfc8c4749111821f698bf2e3a274663.yaml | 58 +++++++++++++++++++ ...igns-b96f5bf9788a7a3f117bdd9d17e4d783.yaml | 58 +++++++++++++++++++ ...orms-16abe83fb7023039495bc71d0e3e2b48.yaml | 58 +++++++++++++++++++ ...orms-8e8dcc759eccd2518e9fba14e695c093.yaml | 58 +++++++++++++++++++ ...orms-db1fed2fca8e80d33156bce8fe1dd724.yaml | 58 +++++++++++++++++++ ...orms-f34776806e968812940c4c4d5f82b503.yaml | 58 +++++++++++++++++++ ...orms-fe0f3dd2df39b34940cdb1e352238936.yaml | 58 +++++++++++++++++++ ...esiq-177e4a3cb284ab639d60d2cdc0a716b5.yaml | 58 +++++++++++++++++++ ...esiq-379056d331237206cad69e45d8d3007e.yaml | 58 +++++++++++++++++++ ...esiq-4ecc6299ecfad3b8f439662203eb02a8.yaml | 58 +++++++++++++++++++ ...esiq-808251beac3177b1d028049231c161e6.yaml | 58 +++++++++++++++++++ ...chat-7727a5f68ed648a5191d57e52492a289.yaml | 58 +++++++++++++++++++ ...ress-01df5885583291c622278972bf76eb28.yaml | 58 +++++++++++++++++++ ...ress-1c48bf4d484ac338c2e58423c802cdcb.yaml | 58 +++++++++++++++++++ ...ress-895ca2434557d1111d9453e776e1d9be.yaml | 58 +++++++++++++++++++ ...ress-d38242ac867a6661d41aa63eccb9b83c.yaml | 58 +++++++++++++++++++ ...load-11b8e915a665a007145e1d71a284462b.yaml | 58 +++++++++++++++++++ ...-seo-f761a34ad9eca6bfb3e6a9ab7b2cb2d8.yaml | 58 +++++++++++++++++++ ...zine-c8e594cea5366acd20db9ff8e1b21b92.yaml | 58 +++++++++++++++++++ ...star-a3ed9e76b0fc321cc4d7c1cb9261a2e1.yaml | 58 +++++++++++++++++++ ...apna-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...ance-9c1002d331f3bfe836a243fd7707a431.yaml | 58 +++++++++++++++++++ ...asic-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...asic-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...asic-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...-mag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...-mag-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...-mag-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...-new-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...-new-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...-new-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...root-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...root-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...root-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...aple-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...aple-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...tore-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...tore-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...tore-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...ccio-24f878705cb6e0f5cec5d442fe0259a1.yaml | 58 +++++++++++++++++++ ...page-32d2ee023e5c98d46821542b46ed3472.yaml | 58 +++++++++++++++++++ ...ntra-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml | 58 +++++++++++++++++++ ...ello-18df9000e9dcd67d242e383e74bea4f4.yaml | 58 +++++++++++++++++++ ...ello-72ccbc519dc7d87cb6145ad667cfc553.yaml | 58 +++++++++++++++++++ ...ello-860fdeef59df60170db304dfbf6f0b2b.yaml | 58 +++++++++++++++++++ ...ello-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...fier-b4f8ef061eeaa39684a868f52e5b3f72.yaml | 58 +++++++++++++++++++ ...stem-9ac9653b7778a104c1c015f03f55c35c.yaml | 58 +++++++++++++++++++ ...stem-fc94e531c85615591e0410bbc642dfdf.yaml | 58 +++++++++++++++++++ ...rnal-e75bbb3acde201345699c9ea2b1c0b80.yaml | 58 +++++++++++++++++++ ...uent-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 58 +++++++++++++++++++ ...form-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...akal-fe56f2af6a571fb33fc7c4e1b9783967.yaml | 58 +++++++++++++++++++ ...kita-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...iant-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...tuts-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...ster-972c6f275cedbc5b8ff06bc4a592ad76.yaml | 58 +++++++++++++++++++ ...tate-aa5567043b1aeefa3498402c7cd8a275.yaml | 58 +++++++++++++++++++ ...mera-2df8a8571d64dba2e22b8dd47eadb176.yaml | 58 +++++++++++++++++++ ...mera-b3f6da3b653ea452b8c40472572fa927.yaml | 58 +++++++++++++++++++ ...a-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...eska-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...ence-0e4a8af0dcec83139d2c5869dc07116c.yaml | 58 +++++++++++++++++++ ...mela-161c9677e95eb847dc432eddc65db142.yaml | 58 +++++++++++++++++++ ...mela-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...oveo-fc7e66fb4c7bc293f2767aac95e6ae0a.yaml | 58 +++++++++++++++++++ ...plus-da3e281a5f70bba201afb2a0076933cd.yaml | 58 +++++++++++++++++++ ...nand-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...blue-2a9919a2db8ebb02104bc342de5cafa4.yaml | 58 +++++++++++++++++++ ...aust-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...logy-eec950257920134a1e693aabe46a51ab.yaml | 58 +++++++++++++++++++ ...ioch-694a19ed51aeba4709fe5b1bfc70368e.yaml | 58 +++++++++++++++++++ ...news-1eca6946030b47a7e15dbf74278035b1.yaml | 58 +++++++++++++++++++ ...reas-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...pius-3df99e7d9df14f2aba3c8375eecce88f.yaml | 58 +++++++++++++++++++ ...pius-5f0f9a2a6cce4ecc1bb938245d0aa8e7.yaml | 58 +++++++++++++++++++ ...ment-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...zend-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...zend-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...dian-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...ea53-5e5beafa47f3eac0bbc5ba2133fe2f0f.yaml | 58 +++++++++++++++++++ ...elle-161c9677e95eb847dc432eddc65db142.yaml | 58 +++++++++++++++++++ ...elle-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...elle-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lewp-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...ival-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...ival-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...ival-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...ence-e655964abfea5d2b4e77a9418e2e0409.yaml | 58 +++++++++++++++++++ ...pose-60f02b355aaa909eb31e9332ca9f9968.yaml | 58 +++++++++++++++++++ ...-pro-6d10f2e1e54180210b870dbff144a87b.yaml | 58 +++++++++++++++++++ ...k-me-1c2da71dac8a1ffb07f1c87e262b5e0e.yaml | 58 +++++++++++++++++++ ...k-me-3b38633cbeac82c001940cb4aed44709.yaml | 58 +++++++++++++++++++ ...k-me-b27f19c1380e428266833869dc85c54d.yaml | 58 +++++++++++++++++++ ...k-me-e8eee7b13f0d955b5b5dd5ba7908051b.yaml | 58 +++++++++++++++++++ ...tore-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...stra-069688784bb13290b6aea0da4a233825.yaml | 58 +++++++++++++++++++ ...stra-4d6ff8c8afd1310bcbc6da555c1c2ca4.yaml | 58 +++++++++++++++++++ ...alpa-b8aaeac54a85cc121f7aef5c9dc1b9be.yaml | 58 +++++++++++++++++++ ...alpa-e8b1937b8d22149355604761f9e2e597.yaml | 58 +++++++++++++++++++ ...ness-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...rney-7b1133cf795e5004c4eb6459afb4af96.yaml | 58 +++++++++++++++++++ ...rney-ac1c1976acfd0aeffc2f834a988bb3ea.yaml | 58 +++++++++++++++++++ ...erge-5d7be31521ee03a3c41d06e3d9d363f9.yaml | 58 +++++++++++++++++++ ...ntic-4a7a1840571177670b84b0075f0a9a69.yaml | 58 +++++++++++++++++++ ...-car-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...vada-003889b218e2b00be9012c017586c0d2.yaml | 58 +++++++++++++++++++ ...vada-45a743f5d162595c13c7d51a595d52ef.yaml | 58 +++++++++++++++++++ ...vada-49fe6661a7e83dfa08fd330a80312c71.yaml | 58 +++++++++++++++++++ ...vada-4a05ae911598dc28de7b72c0be044356.yaml | 58 +++++++++++++++++++ ...vada-51e019b787984ebb59dc9257a3fe25a4.yaml | 58 +++++++++++++++++++ ...vada-855366bc54f67a90854fe071e412ecdb.yaml | 58 +++++++++++++++++++ ...vada-907496c3b43ef59b87d499ec04fd4467.yaml | 58 +++++++++++++++++++ ...vada-9abc850c93257e8269e3f6780cf7c973.yaml | 58 +++++++++++++++++++ ...vada-b6efebccc72344ca35f158202f79667f.yaml | 58 +++++++++++++++++++ ...vada-bb65f92eeb63b478b2f218d634d42a06.yaml | 58 +++++++++++++++++++ ...vada-c75774e4c2c9b9851693b07aeb2b25ad.yaml | 58 +++++++++++++++++++ ...vada-d4d2889c92e76cd2635d3cb3c6eabcdb.yaml | 58 +++++++++++++++++++ ...vada-d882958bab372a69d811837406b3986e.yaml | 58 +++++++++++++++++++ ...vada-e3ee06b08069cc90d373b87f289545a0.yaml | 58 +++++++++++++++++++ ...vada-e6b2cb8bfdcceb721cbe5b7ffbe02c9a.yaml | 58 +++++++++++++++++++ ...vada-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml | 58 +++++++++++++++++++ ...vada-f93d99515ef4e6bdea2dd530448d23e4.yaml | 58 +++++++++++++++++++ ...anix-153b374358a4469baf0dcf3e128485d7.yaml | 58 +++++++++++++++++++ ...wake-6f4ec28d470f70401f41d76af77cb887.yaml | 58 +++++++++++++++++++ ...wake-d6c2e6fd9fd0cfab443b5c0a2bd9f57d.yaml | 58 +++++++++++++++++++ ...ress-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...ioma-4dcbb5c4a13afaeaec2eb944e1efc4e0.yaml | 58 +++++++++++++++++++ ...cola-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml | 58 +++++++++++++++++++ ...lkon-25caf82ba3c3384a973d48ab8eff05a3.yaml | 58 +++++++++++++++++++ ...bani-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...bani-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...rate-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...lite-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ .../bbe-9d3718684afa0305d0420944743522e1.yaml | 58 +++++++++++++++++++ ...mium-430614badd7183227eb02d22143e3a52.yaml | 58 +++++++++++++++++++ ...ello-0d1b849fd565592736828b4a54b39135.yaml | 58 +++++++++++++++++++ ...ello-84b15db6be01953ae7e773bc858c3601.yaml | 58 +++++++++++++++++++ ...ello-a5df397db51ff69150f57b2d7f5c09a8.yaml | 58 +++++++++++++++++++ ...heme-0eda30de3bc2dbaa94da2af30caf268c.yaml | 58 +++++++++++++++++++ ...heme-4177059b270800f6cdd2567297565b05.yaml | 58 +++++++++++++++++++ ...heme-4248ab6c48d79553c417ff3c6f6afabd.yaml | 58 +++++++++++++++++++ ...heme-6bcabc3b4e69486405e1172846710922.yaml | 58 +++++++++++++++++++ ...heme-a0089e085e056ad847052764bb440612.yaml | 58 +++++++++++++++++++ ...heme-a02d18d0740894600f021e06a20fd2de.yaml | 58 +++++++++++++++++++ ...heme-c3f3aac4022202f47e3ad7f05ff237dd.yaml | 58 +++++++++++++++++++ ...heme-eef54adf293c01cfcd3711ba2746f5e0.yaml | 58 +++++++++++++++++++ ...heme-f2c966f060ba4e0ec53591e455e174f0.yaml | 58 +++++++++++++++++++ ...heme-f626e9df68cec35c776cf1191c5c3f5d.yaml | 58 +++++++++++++++++++ ...heme-f83868d3a00a9fcf53648bc46fb152f1.yaml | 58 +++++++++++++++++++ ...tore-b619e22c55f5ef6d348009289f2fb6f6.yaml | 58 +++++++++++++++++++ ...ngle-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...ngle-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...ngle-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...head-530c76ddc7a277b970fa701ca1edf42b.yaml | 58 +++++++++++++++++++ ...lain-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...laze-902eeda285eff78838cf6ebbc45afd69.yaml | 58 +++++++++++++++++++ ...sing-d850c5ed075967896003b1b01706f556.yaml | 58 +++++++++++++++++++ ...blix-54409f2bc5984d61c42ec97047d41adc.yaml | 58 +++++++++++++++++++ ...blix-c0b95532030c59fee6c1d3ae2a188201.yaml | 58 +++++++++++++++++++ ...ixed-54409f2bc5984d61c42ec97047d41adc.yaml | 58 +++++++++++++++++++ ...rieg-54409f2bc5984d61c42ec97047d41adc.yaml | 58 +++++++++++++++++++ ...cksy-07a77988897e3af64d686b49eda84d8d.yaml | 58 +++++++++++++++++++ ...cksy-0ec4296664350dc8ee374e0d44043428.yaml | 58 +++++++++++++++++++ ...cksy-924efae616f0032d8047ad716d24a484.yaml | 58 +++++++++++++++++++ ...cksy-9f5f23c716774bbd462d447842ecf871.yaml | 58 +++++++++++++++++++ ...cksy-bc2b1b1b8cc260b904b43a53b27b1dc7.yaml | 58 +++++++++++++++++++ ...cksy-db7f8fed7cd5746da95374c4a1d925a5.yaml | 58 +++++++++++++++++++ ...oger-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...oger-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...oger-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...buzz-e5b5400c624e25843b2372f9abb89d26.yaml | 58 +++++++++++++++++++ ...v1.1-e7c3ee180660fac9fead4fadabb98bef.yaml | 58 +++++++++++++++++++ ...-spa-a9b48fe75d8b0cb9e851b9c9fd985412.yaml | 58 +++++++++++++++++++ ...ries-f021202130cf5324996d350595ae862c.yaml | 58 +++++++++++++++++++ ...oldy-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...ster-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...kers-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 58 +++++++++++++++++++ ...ower-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...rand-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rand-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...icks-006e2e470c53d4a4e5eb56e28322392e.yaml | 58 +++++++++++++++++++ ...icks-76570c8af26fd8add3788aed77d646fa.yaml | 58 +++++++++++++++++++ ...icks-8d874ea95f55c0ec9bb8e08a17ec4807.yaml | 58 +++++++++++++++++++ ...idge-24af70f4d05b151741440482fab416b5.yaml | 58 +++++++++++++++++++ ...idge-c39e88fb98a263a4718fa22351cd75a3.yaml | 58 +++++++++++++++++++ ...tbox-de6a8f71d54a21ca8a8ec790aa7c8445.yaml | 58 +++++++++++++++++++ ...ance-72ccbc519dc7d87cb6145ad667cfc553.yaml | 58 +++++++++++++++++++ ...ance-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...ance-ee1a1b54258e473972fcc31462b15e8f.yaml | 58 +++++++++++++++++++ ...risk-2ab21e22bdca9635ce4e964a4031d548.yaml | 58 +++++++++++++++++++ ...rite-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...cope-30fe39ec377fc6748bfe3566282b5413.yaml | 58 +++++++++++++++++++ ...klyn-145399e0c7a9d439e5ba93f1ed497004.yaml | 58 +++++++++++++++++++ ...klyn-fb3df7b0090a05c3bb2c9600778e1c86.yaml | 58 +++++++++++++++++++ ...rovy-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...rovy-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...rovy-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...heme-ab3814e3ae070036041f3fc37ac29f36.yaml | 58 +++++++++++++++++++ ...epot-2e6c4db554765f15e335810f248cb790.yaml | 58 +++++++++++++++++++ ...rket-493e804a1e5431f2ca50d457edc4b8eb.yaml | 58 +++++++++++++++++++ ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 58 +++++++++++++++++++ ...lite-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...care-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...-pro-958193ceafe9fa46f427a02590b8676e.yaml | 58 +++++++++++++++++++ ...expo-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...sswp-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...prof-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...tore-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...tore-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...ctus-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...stro-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...kifo-02d6de68e2eb0c0f7215999509c086c8.yaml | 58 +++++++++++++++++++ ...iope-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...nvas-41077f62819cf65dd71bfb4c6e199325.yaml | 58 +++++++++++++++++++ ...vice-619d74f5efad50bb0716462ce5537ea9.yaml | 58 +++++++++++++++++++ ...aler-77435d9114ce158ef3aadb96d9fd0449.yaml | 58 +++++++++++++++++++ ...erfy-0b2658951b7cfc28db2aef3263c845a3.yaml | 58 +++++++++++++++++++ ...erfy-0cc827bd1e5b71473ebe52fdbadbc377.yaml | 58 +++++++++++++++++++ ...erfy-2f7c99cf9aa6337e1f437507a7c03dd4.yaml | 58 +++++++++++++++++++ ...erfy-6e465dc97257e1344df72e8224803afb.yaml | 58 +++++++++++++++++++ ...erfy-70111aaef33d8dec5c55f5b989914270.yaml | 58 +++++++++++++++++++ ...erfy-89809dfbca4560d57d80e19c74e319fc.yaml | 58 +++++++++++++++++++ ...erfy-93a5155d0c6c821f6dac512fe074d8b8.yaml | 58 +++++++++++++++++++ ...erfy-d814bf89eef506e207923233b9147995.yaml | 58 +++++++++++++++++++ ...erfy-f287f6d03ce957fcb674730856528833.yaml | 58 +++++++++++++++++++ ...erup-3dadecf90476b3cb59a265c7ae6d0c01.yaml | 58 +++++++++++++++++++ ...plus-ead8215e6f4d6c583e6aa46b74460457.yaml | 58 +++++++++++++++++++ ...spot-67f647f4edf0dc956943ef2a579b4258.yaml | 58 +++++++++++++++++++ ...spot-8b93cde54b567f48c75c8a61eb4877a4.yaml | 58 +++++++++++++++++++ ...spot-a1557c2cdb71bc0d86215f36aee8a08b.yaml | 58 +++++++++++++++++++ ...aulk-d57e6f59d0c7b9d3a924383e2c688a1c.yaml | 58 +++++++++++++++++++ ...leon-39069bbb190265d3be495e952f317246.yaml | 58 +++++++++++++++++++ ...nkhe-cf02434258a49a4a00aa24a96c05817d.yaml | 58 +++++++++++++++++++ ...ices-8f802c8a8b5a882c2b86d1de293231a6.yaml | 58 +++++++++++++++++++ ...hope-1a60867207919ae0076f781fa334aeef.yaml | 58 +++++++++++++++++++ ...book-17f6998fdf35be8a6349776a3309aedc.yaml | 58 +++++++++++++++++++ ...book-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml | 58 +++++++++++++++++++ ...book-a31de8d5a2ca016a785502d82ebaaa83.yaml | 58 +++++++++++++++++++ ...book-be3f332add5d9ce678efc86e37a29e03.yaml | 58 +++++++++++++++++++ ...book-f5204789b3d63c1e5dd223fef5d1ac5d.yaml | 58 +++++++++++++++++++ ...ogic-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...ssic-7cba36ac5159d909041a39ae02e640fa.yaml | 58 +++++++++++++++++++ ...sima-94f85d394521a13053659cf48cf14634.yaml | 58 +++++++++++++++++++ ...ress-376edc97e45ef94c79a753de3d636245.yaml | 58 +++++++++++++++++++ ...tone-1fd636290ae799c72ab0c32a97e71316.yaml | 58 +++++++++++++++++++ ...otya-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml | 58 +++++++++++++++++++ ...ress-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...heme-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...tion-fb64a0398d930ef57cb315100ba26973.yaml | 58 +++++++++++++++++++ ...sion-01b7472afbbdd4ea1b26eb8768b12686.yaml | 58 +++++++++++++++++++ ...i-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...i-wp-7b784615e846271087f6cdcbcbcd3d70.yaml | 58 +++++++++++++++++++ ...lege-4790b4ad8b25152cb39533647a69d638.yaml | 58 +++++++++++++++++++ ...bold-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...rmag-15626a5f31201ec9a6bcc2f5d39038c5.yaml | 58 +++++++++++++++++++ ...rmag-be833eb15318e91b50173179ef1ced63.yaml | 58 +++++++++++++++++++ ...rmix-b4955c7ae6a4cb6cbe657aa114b2de30.yaml | 58 +++++++++++++++++++ ...news-a2599bd3c91638fd59172f5a65248fdd.yaml | 58 +++++++++++++++++++ ...rway-0b548a7717c352b81e5b3026850fe79e.yaml | 58 +++++++++++++++++++ ...rway-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...rway-eec026409b2ce5ae4162f07361f714bc.yaml | 58 +++++++++++++++++++ ...dore-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...ruct-80688e6bb1e67826e5659821551b9b07.yaml | 58 +++++++++++++++++++ ...ruct-e0af7f9c14f46c6865579ec474c8422f.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...tera-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...reet-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...park-c96b02624922c50381a023e57cd89cf7.yaml | 58 +++++++++++++++++++ ...rona-6fd6dbbc58f038d409e478e2b51e5038.yaml | 58 +++++++++++++++++++ ...orsa-32eb01ee606ecc19d89dc769776b1c92.yaml | 58 +++++++++++++++++++ ...etsy-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml | 58 +++++++++++++++++++ ...demo-7ffc401b1ac82b8be2938971d08cc9fb.yaml | 58 +++++++++++++++++++ ...r-wp-ab5cb4980d96d0502a1385c5c51d0ea4.yaml | 58 +++++++++++++++++++ ...ress-99dafceb50253393d9ffc3281335a6c4.yaml | 58 +++++++++++++++++++ ...blog-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...blog-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...blog-3f03bc4b4b5619e488422c5b9dbcc730.yaml | 58 +++++++++++++++++++ ...rius-d78e7652648c0b8a881a39d5a0a824ec.yaml | 58 +++++++++++++++++++ ...sign-8c50ec7bbb214484280a482bec76837e.yaml | 58 +++++++++++++++++++ ...lace-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...urvo-d59f1cca77e5c81eb993686d3bfbe443.yaml | 58 +++++++++++++++++++ ...nity-35e7becde59fc0889fa433fc22f8f1b5.yaml | 58 +++++++++++++++++++ ...mizr-019dda7346a94447f0c3df91572a74eb.yaml | 58 +++++++++++++++++++ ...agda-9a0a697c12153160f55b76aada0a723e.yaml | 58 +++++++++++++++++++ ...deal-52cc2ef9a6c2df75495af02a2e660264.yaml | 58 +++++++++++++++++++ ...deal-ba59ebce085f3da1439c5ad1f6fdb637.yaml | 58 +++++++++++++++++++ ...tion-460c948e3348c2b843b63d20f8149eb1.yaml | 58 +++++++++++++++++++ ...tion-6bdfdbb30005886703826f665471e962.yaml | 58 +++++++++++++++++++ ...tion-c2529ec5eebcb070f1d2933f71c24b9b.yaml | 58 +++++++++++++++++++ ...isho-6c37ed5f01e697fababa0d98a125cf7e.yaml | 58 +++++++++++++++++++ ...lion-186e0de3e300f22fb53b3c68716d1f21.yaml | 58 +++++++++++++++++++ ...rcie-88f76b0fbecb245eab5d377f2510f527.yaml | 58 +++++++++++++++++++ ...blue-6d8163753ad1f1a6cf7ea136432e8e62.yaml | 58 +++++++++++++++++++ ...-mag-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...javu-76a4f53242c3d8ade723708cc7f5a953.yaml | 58 +++++++++++++++++++ ...javu-be169372bbe2ce4f8eada3564b525f9e.yaml | 58 +++++++++++++++++++ ...nexo-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...plus-3724085b216ee48b2a3bc8286f400ae9.yaml | 58 +++++++++++++++++++ ...pile-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...iary-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...tore-f5fc5bca6e41d90a9454914bbfeeafc7.yaml | 58 +++++++++++++++++++ ...emes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml | 58 +++++++++++++++++++ ...sion-033d028c8d102a833af4770e22a7e5b6.yaml | 58 +++++++++++++++++++ ...omat-c41f2615174c7d773c4d8f292dfcd2a3.yaml | 58 +++++++++++++++++++ ...iscy-3cce740c3da6d548d8d19689826c4cf1.yaml | 58 +++++++++++++++++++ ...iscy-46244fdcad0724fd77e42ba287d7514a.yaml | 58 +++++++++++++++++++ ...iscy-dda12396183ee405a0b6804083230616.yaml | 58 +++++++++++++++++++ ...iscy-e286b3a8935bca8a0217c3e2e8d64e5c.yaml | 58 +++++++++++++++++++ ...divi-1ea409fe86fe5baf6c5d95a328e05b6b.yaml | 58 +++++++++++++++++++ ...divi-344bde3518beec69cf32525065cbb92a.yaml | 58 +++++++++++++++++++ ...divi-4f3dfe26281afe74af18534af8dcf024.yaml | 58 +++++++++++++++++++ ...divi-aabb704338c74a997901edf2f42d1b76.yaml | 58 +++++++++++++++++++ ...divi-e37e5d73321c4c6eb17ee3379b565090.yaml | 58 +++++++++++++++++++ ...divi-ec458e7be91893393a96a7bb4f01d557.yaml | 58 +++++++++++++++++++ ...doko-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...doko-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...doko-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...late-042613decef34429d197e1051e8a6f20.yaml | 58 +++++++++++++++++++ ...late-42cb0128fedfa4377c3f29de3cf2cb68.yaml | 58 +++++++++++++++++++ ...late-8c6baf342080d67dd1da781b7c2fdff0.yaml | 58 +++++++++++++++++++ ...late-daa315fbfc85fdf58446d6f8b56cda97.yaml | 58 +++++++++++++++++++ ...late-dcee3b9f11fc1725f690a44de458561d.yaml | 58 +++++++++++++++++++ ...late-e1c40eb25b51b97676a5f939865df658.yaml | 58 +++++++++++++++++++ ...late-fbae7b535aa5c352a8744c22c013bc35.yaml | 58 +++++++++++++++++++ ...the7-0086334fa92fba62187d0290e70cdbe7.yaml | 58 +++++++++++++++++++ ...the7-95d424216e84379eaaf681135f0af62a.yaml | 58 +++++++++++++++++++ ...the7-c2a573da80f21ade51e0477e5d127224.yaml | 58 +++++++++++++++++++ ...book-17f6998fdf35be8a6349776a3309aedc.yaml | 58 +++++++++++++++++++ ...book-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml | 58 +++++++++++++++++++ ...book-be3f332add5d9ce678efc86e37a29e03.yaml | 58 +++++++++++++++++++ ...book-f5204789b3d63c1e5dd223fef5d1ac5d.yaml | 58 +++++++++++++++++++ ...ebiz-153b374358a4469baf0dcf3e128485d7.yaml | 58 +++++++++++++++++++ ...elon-61d6bd39a6e6d20f6024207c6900ca16.yaml | 58 +++++++++++++++++++ ...elon-9de2929d93f53a09f4c6d8d87f325131.yaml | 58 +++++++++++++++++++ ...elon-f473a45e54915af6da4e96437d244f3c.yaml | 58 +++++++++++++++++++ ...obiz-153b374358a4469baf0dcf3e128485d7.yaml | 58 +++++++++++++++++++ ...edge-48efc81cbefdf18882ef324fd2ff057b.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...lmag-3220945a9ad1b5aa7c5c294cafd443a6.yaml | 58 +++++++++++++++++++ ...nter-8b501a3e440ee475a390c14b78d1469e.yaml | 58 +++++++++++++++++++ ...-sec-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...-sec-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...-sec-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...asta-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ance-2d5cfa75ccec0b7d6ce43b488e635fe7.yaml | 58 +++++++++++++++++++ ...ance-93d95b14737baf6796a29212125f2e59.yaml | 58 +++++++++++++++++++ ...unge-0aff17e28ef121a8c519ec81ffed16b1.yaml | 58 +++++++++++++++++++ ...emin-7b82f3d715a6e6e5e86a24db471b8d19.yaml | 58 +++++++++++++++++++ ...e-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...ress-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...lite-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...fold-1876a4c168f4df4e89e5c4309cb04275.yaml | 58 +++++++++++++++++++ ...fold-35b352df5d14bf9606b8ec800fc7030c.yaml | 58 +++++++++++++++++++ ...fold-4e11cfef06ec2642923cf28426346ef9.yaml | 58 +++++++++++++++++++ ...fold-ed5e4871114b7f75ca3b625c577f01e9.yaml | 58 +++++++++++++++++++ ...hten-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...hten-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...hten-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...ness-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...urch-7968590f04797f892b64c6624bb7ba86.yaml | 58 +++++++++++++++++++ ...onic-4d35df14ccd9eab621208a42de471fff.yaml | 58 +++++++++++++++++++ ...nade-a255ef8b2471d464b72404fea528ca4b.yaml | 58 +++++++++++++++++++ ...ence-cf3f8795f333a75c5fe6e390bdbbdfce.yaml | 58 +++++++++++++++++++ ...sica-f89b8b2276b119437fe5d13da6f29ea1.yaml | 58 +++++++++++++++++++ ...clid-a6caef4d4eacfb6278b4d425ef54c643.yaml | 58 +++++++++++++++++++ ...nice-cca0a1d963a9d045f5815fda1ac1ee73.yaml | 58 +++++++++++++++++++ ...noia-457ebe36f8d645741bdfd0b59a49af7e.yaml | 58 +++++++++++++++++++ ...ress-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...news-3f03bc4b4b5619e488422c5b9dbcc730.yaml | 58 +++++++++++++++++++ ...news-47a3d5ecf22b909cbf2d50dac0698416.yaml | 58 +++++++++++++++++++ ...-pro-006ac377302a554decdd04aa7ce724fd.yaml | 58 +++++++++++++++++++ ...erse-161c9677e95eb847dc432eddc65db142.yaml | 58 +++++++++++++++++++ ...erse-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...olve-170bc795059fb0d98227f8d8677e21e8.yaml | 58 +++++++++++++++++++ ...icit-3af6c2ccbc49fd7ac785ee1caf9ff348.yaml | 58 +++++++++++++++++++ ...pose-f1706f372daa69509bea2f9b5da810d7.yaml | 58 +++++++++++++++++++ ...e-wp-4569fe83ce2bb42a6e266298e47ccef7.yaml | 58 +++++++++++++++++++ ...xtra-1d46fd13f5959cf6806058064008bc68.yaml | 58 +++++++++++++++++++ ...xtra-344bde3518beec69cf32525065cbb92a.yaml | 58 +++++++++++++++++++ ...xtra-4f3dfe26281afe74af18534af8dcf024.yaml | 58 +++++++++++++++++++ ...xtra-aabb704338c74a997901edf2f42d1b76.yaml | 58 +++++++++++++++++++ ...xtra-ec458e7be91893393a96a7bb4f01d557.yaml | 58 +++++++++++++++++++ ...lite-e63ed950312b124c0d59757ed157173d.yaml | 58 +++++++++++++++++++ ...mous-cf7f4b2a43d36048518c3a15a6b1e9fb.yaml | 58 +++++++++++++++++++ ...nate-3f03bc4b4b5619e488422c5b9dbcc730.yaml | 58 +++++++++++++++++++ ...er12-97973544cebecee841ad830cbe28916b.yaml | 58 +++++++++++++++++++ ...lici-83462ab31c23510cbb4ed4293c5a8d88.yaml | 58 +++++++++++++++++++ ...lici-f938ed44289b5e0945ae989fccd9132d.yaml | 58 +++++++++++++++++++ ...teen-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...ncio-5f8311aafd1822576a08e6d0d9e190d6.yaml | 58 +++++++++++++++++++ ...ndgo-ea09594aa9ec08768edd559eabb04c79.yaml | 58 +++++++++++++++++++ ...ndus-cfc50a0804539ff785925571caba914b.yaml | 58 +++++++++++++++++++ ...park-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...park-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...ight-9ffe40ed2860214fb806a94be92be5e0.yaml | 58 +++++++++++++++++++ ...news-64c7d7601684303a62306dcc7a67e144.yaml | 58 +++++++++++++++++++ ...ashy-8fedd556095791de1de8cc0522ea9441.yaml | 58 +++++++++++++++++++ ...some-77106c0ccdc78c4aab3d70ea99b49ace.yaml | 58 +++++++++++++++++++ ...some-87cfaaeceb9c0891333268e59bdaed28.yaml | 58 +++++++++++++++++++ ...blog-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...blog-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...folo-50f6ed0722c7403f0c0ea86b6df7e2ff.yaml | 58 +++++++++++++++++++ ...kery-2687b8db8bc7e715cc5827b0aedae5fd.yaml | 58 +++++++++++++++++++ ...kery-db1c237e9a78f54d168253b3ad75c0f7.yaml | 58 +++++++++++++++++++ ...uare-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...aphy-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...aphy-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...aphy-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...heme-57b3e170776f796da541bc1640675353.yaml | 58 +++++++++++++++++++ ...pire-81558dbfc1c686b52278115bcc212692.yaml | 58 +++++++++++++++++++ ...tful-547ae69e23e79945ee41118869bf3151.yaml | 58 +++++++++++++++++++ ...tful-80477eee43f78931347fee8d51f74e47.yaml | 58 +++++++++++++++++++ ...rnob-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml | 58 +++++++++++++++++++ ...heme-33dcd77e5c96a0f6e337bee86a58383b.yaml | 58 +++++++++++++++++++ ...heme-fd188ab37a40c68b931d58403248c27a.yaml | 58 +++++++++++++++++++ ...sted-50500b0da9551f89249fc057d52b16ad.yaml | 58 +++++++++++++++++++ ...plan-d95348460c662925b6cdc57ffd4469ba.yaml | 58 +++++++++++++++++++ ...heme-999d17b4d58bf12011698692c265aa6e.yaml | 58 +++++++++++++++++++ ...zine-f81807c8cf5504e6b638b35df7a4314b.yaml | 58 +++++++++++++++++++ ...ces4-2c537d66a4c6bad8d1c1a1ad47705253.yaml | 58 +++++++++++++++++++ ...beta-2c537d66a4c6bad8d1c1a1ad47705253.yaml | 58 +++++++++++++++++++ ...host-0338317a9be20261847acad2da4f5a91.yaml | 58 +++++++++++++++++++ ...lite-3f03bc4b4b5619e488422c5b9dbcc730.yaml | 58 +++++++++++++++++++ ...golo-1089e240eda4d80561f1b8e6010e3ce7.yaml | 58 +++++++++++++++++++ ...dnex-43e8debd4c3b7f8c8ab3ef6be25475c7.yaml | 58 +++++++++++++++++++ ...goto-442aecad9b46601423fcf0fe82256c7f.yaml | 58 +++++++++++++++++++ ...goto-4847183a2bd6b773eb419ec6d2799ae7.yaml | 58 +++++++++++++++++++ ...goto-e8d662d192f7e80a8946662a46a27738.yaml | 58 +++++++++++++++++++ ...hene-3f304f35d6ee539a7dae259777309bd7.yaml | 58 +++++++++++++++++++ ...mart-b4cada853b7b3a733e2f6bbdfd522497.yaml | 58 +++++++++++++++++++ ...mart-dd0aba2b8bd6fc74a58e5b1a3acae9cd.yaml | 58 +++++++++++++++++++ ...dsby-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...imag-faa38012dd533ba54ed31853b5a52271.yaml | 58 +++++++++++++++++++ ...blog-48870272d1c6df07d927cc89f91930ec.yaml | 58 +++++++++++++++++++ ...ance-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...hone-06cd0f178ae533c7b94126d052d17b3f.yaml | 58 +++++++++++++++++++ ...hone-d566c0816c38ea6ca24760850c1eaf4a.yaml | 58 +++++++++++++++++++ ...sium-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...dway-27ec034aba5d4951c82cebc35f1cf5b5.yaml | 58 +++++++++++++++++++ ...ntor-5aee783cc8ced806fe0ecf20e182e607.yaml | 58 +++++++++++++++++++ ...imer-dda12396183ee405a0b6804083230616.yaml | 58 +++++++++++++++++++ ...tern-5970a067cb1dc2fa3e954c8bf2cf2b8e.yaml | 58 +++++++++++++++++++ ...weet-5804396a1d6a8f486bc1aec9d443ab22.yaml | 58 +++++++++++++++++++ ...tate-437a2bdda5608892f1a5bb69f6ded0f0.yaml | 58 +++++++++++++++++++ ...ress-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...uzez-7f368981191f0cf6c7a56557a4488185.yaml | 58 +++++++++++++++++++ ...uzez-a707f28c337bd9658c006013182d7d8f.yaml | 58 +++++++++++++++++++ ...uzez-f04b27db24cc3e0ca67ee5594c5f4107.yaml | 58 +++++++++++++++++++ ...eman-59b839d07dc6fe1d9770afd5dab3f742.yaml | 58 +++++++++++++++++++ ...o-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...brid-e0526e94c953cbf63946457c72f3fcad.yaml | 58 +++++++++++++++++++ ...xcel-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...-max-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...tion-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...tion-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...-pro-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...lldy-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...veit-434d2b681ad27e0586b6012fe3acb7bd.yaml | 58 +++++++++++++++++++ ...tale-1f96e011e88f8f33ff0ebc9d331187dd.yaml | 58 +++++++++++++++++++ ...ocus-c7028a8b7ddad37c6ed248c7eae283ef.yaml | 58 +++++++++++++++++++ ...ocus-e5d8148f1234029a0a9a4eed3ccbe249.yaml | 58 +++++++++++++++++++ ...njob-92767dd3ccfd3becf3c7e6ba2eae227b.yaml | 58 +++++++++++++++++++ ...njob-ef882ef3da26fd11db1b83d92b970da3.yaml | 58 +++++++++++++++++++ ...race-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml | 58 +++++++++++++++++++ ...dity-a725115e3c0edf17f7d3885d6b810646.yaml | 58 +++++++++++++++++++ ...ento-632fa81c7cda7a0da5783abd37b66f4c.yaml | 58 +++++++++++++++++++ ...bile-fa869fa1b9881b5f13b3949335d2518c.yaml | 58 +++++++++++++++++++ ...mes2-896b6e6e64eabb6a52a6556daf8cafc3.yaml | 58 +++++++++++++++++++ ...nnah-073caac98b397aafa1ef62965d38c4a4.yaml | 58 +++++++++++++++++++ ...nnah-6edf86dbe6ca8c2373758418bafd3a5c.yaml | 58 +++++++++++++++++++ ...spot-f1d47f939b2f1e86782042bfd4182287.yaml | 58 +++++++++++++++++++ ...tapo-59597a1103eb0e1b65ccc3450fe7b191.yaml | 58 +++++++++++++++++++ ...erce-59597a1103eb0e1b65ccc3450fe7b191.yaml | 58 +++++++++++++++++++ ...tore-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...news-9eec149d26b5525f47c83e62d5178cba.yaml | 58 +++++++++++++++++++ ...reer-24ed2c04cbd73f5247d8f86d829c0936.yaml | 58 +++++++++++++++++++ ...oard-d4c3b2bb6cecd391eb07e1531f6f5e45.yaml | 58 +++++++++++++++++++ ...ller-39f6c4b040b9b850cb80b837122e7ddf.yaml | 58 +++++++++++++++++++ ...unch-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...tart-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...iter-25e01eb0a9bc2abfaf531fab30be9b46.yaml | 58 +++++++++++++++++++ ...iter-2fbd93f620678f9df8d36f97616c7078.yaml | 58 +++++++++++++++++++ ...iter-f3750481cefda659186282ffd61f21aa.yaml | 58 +++++++++++++++++++ ...terx-0fb4e97ee7da5e51631d72f53857a9d4.yaml | 58 +++++++++++++++++++ ...terx-25e01eb0a9bc2abfaf531fab30be9b46.yaml | 58 +++++++++++++++++++ ...terx-427edef992d7f7fdd62c26fd579e2341.yaml | 58 +++++++++++++++++++ ...hmag-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...hmag-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...heme-3391cd9b7f891216e1287f590b982c8e.yaml | 58 +++++++++++++++++++ ...iddo-02553228cdf9d241cd10c1636838398f.yaml | 58 +++++++++++++++++++ ...cabs-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...cabs-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...heme-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...zept-0f4251fd59b25576860e082b19c2ffec.yaml | 58 +++++++++++++++++++ ...zept-181dd35c27fd1dd79209b58840d41cab.yaml | 58 +++++++++++++++++++ ...zept-1af4e5a51ec83381dbc6ba8e121a6437.yaml | 58 +++++++++++++++++++ ...sala-7050f0ff8d99b81263bff6c6e7cb2702.yaml | 58 +++++++++++++++++++ ...tice-a3693c90a0060afc06ae1758aa95f75e.yaml | 58 +++++++++++++++++++ ...lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...more-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ning-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...peed-0925bd2ba6dd2e41532d1726d441e4b1.yaml | 58 +++++++++++++++++++ ...steo-27a371efed383b3d1ada42fe51a20c93.yaml | 58 +++++++++++++++++++ ...steo-328e4f3efad73259f1eb9967e17030cd.yaml | 58 +++++++++++++++++++ ...ingo-fa1aa4f0aefa698e79145595ae3e2cba.yaml | 58 +++++++++++++++++++ ...gpro-150cb95f9f40b2e120f1867ef595a1a2.yaml | 58 +++++++++++++++++++ ...gpro-5ff88083e32bfbabf7c17c2a2829921d.yaml | 58 +++++++++++++++++++ ...gpro-7cb74951ec30df91b0363483bf7bb394.yaml | 58 +++++++++++++++++++ ...gpro-9db9bcd8fc228077bf75d34eb26eccd1.yaml | 58 +++++++++++++++++++ ...gpro-a7a54e981c91a31a82ea2b30647ffe08.yaml | 58 +++++++++++++++++++ ...gpro-e612ae5fb8c05a8c56c1d21cf4568559.yaml | 58 +++++++++++++++++++ ...te27-c9225a68a3d87aec89e9b458c0c8c07e.yaml | 58 +++++++++++++++++++ ...avel-5762e5f00074e74d1c85e81e663d8bab.yaml | 58 +++++++++++++++++++ ...avel-9bd39b890f49a9e6a22c3a473a09195d.yaml | 58 +++++++++++++++++++ ...luxe-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...luxe-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...core-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml | 58 +++++++++++++++++++ ...core-126a4deb066c34b8dce5df40cd3bb8ed.yaml | 58 +++++++++++++++++++ ...asic-714780fca2f8a2a618fef942f7783415.yaml | 58 +++++++++++++++++++ ...edge-f5a034fa03b4780f360af411f657fb5a.yaml | 58 +++++++++++++++++++ ...tudo-f6413facd40fa44bc0324df507036203.yaml | 58 +++++++++++++++++++ ...ment-0cec5a6d0e834430dc98d58d37f70832.yaml | 58 +++++++++++++++++++ ...tion-4ff647a98759fdf657abd921475d51de.yaml | 58 +++++++++++++++++++ ...alis-30dc0670053ac012aae9f0b808f32600.yaml | 58 +++++++++++++++++++ ...azar-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml | 58 +++++++++++++++++++ ...heed-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...heed-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...lite-90a7b869d3e2a4d7bc3ba6fed7e1b85c.yaml | 58 +++++++++++++++++++ ...lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...kaid-161c9677e95eb847dc432eddc65db142.yaml | 58 +++++++++++++++++++ ...ishh-8ddcc8df3c11e4879c7d118b2a205450.yaml | 58 +++++++++++++++++++ ...lite-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...idia-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...eris-7905993a7c5a7f25cd0e632ebe3eba34.yaml | 58 +++++++++++++++++++ ...rize-30dc0670053ac012aae9f0b808f32600.yaml | 58 +++++++++++++++++++ ...thod-a68321afd1de998e2bc90487dbfd6089.yaml | 58 +++++++++++++++++++ ...thod-c6de20b984de470bf1d127432900931e.yaml | 58 +++++++++++++++++++ ...tore-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...tore-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...inus-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...inus-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...blog-0eeb168325aaf2fd5bb4eb1250e0882d.yaml | 58 +++++++++++++++++++ ...dern-51ba94283b04aa5998cb156cf18689aa.yaml | 58 +++++++++++++++++++ ...ular-5bcd37ce85991177fef2e23e81673c5b.yaml | 58 +++++++++++++++++++ ...ular-77c188b4a0a9e7f3fd38cd17c193fd8f.yaml | 58 +++++++++++++++++++ ...lisa-4ce9a104251b3ec9c1a2e0db4f305096.yaml | 58 +++++++++++++++++++ ...ters-28442395b27b7c2fb7b0b1c99993c0cc.yaml | 58 +++++++++++++++++++ ...heme-01c4d40fcdab41e37ee61c249a61b9a0.yaml | 58 +++++++++++++++++++ ...heme-4cf0d4bb064447613ec145a23104c84a.yaml | 58 +++++++++++++++++++ ...olit-3b0c578afae8e4197f9fa7776b2f418c.yaml | 58 +++++++++++++++++++ ...zuma-4261580e84ae15728409e95c26688958.yaml | 58 +++++++++++++++++++ ...ffee-59015ab41c28db2b3674f30b01c20313.yaml | 58 +++++++++++++++++++ ...otor-cf765c7372b51ee3e57db42cf2ef8936.yaml | 58 +++++++++++++++++++ ...unus-3ca22e0c044d3496c6201e10375e41b4.yaml | 58 +++++++++++++++++++ ...unus-ebf16930146209f7120ebc7fcbae64e2.yaml | 58 +++++++++++++++++++ ...usic-5e8a086d1dfb832a1c846fbcfd72fb75.yaml | 58 +++++++++++++++++++ ...riad-447d4ca1bc9aa4bfb680b8076950e6d4.yaml | 58 +++++++++++++++++++ ...riad-a8a6d19e0044050e4db4211aba65994f.yaml | 58 +++++++++++++++++++ ...maha-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...urch-03d2e78e2f453b5e454ab203f543423b.yaml | 58 +++++++++++++++++++ ...lite-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...neon-ce8dd1af11ff660941fa17a3827331a2.yaml | 58 +++++++++++++++++++ ...ense-c7e8c47233570f8175e41802ba29bf54.yaml | 58 +++++++++++++++++++ ...rker-68d0e40bde0f989b020b573553c376d1.yaml | 58 +++++++++++++++++++ ...news-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml | 58 +++++++++++++++++++ ...smag-4ce967b961dc587fdbeb05e0806627ae.yaml | 58 +++++++++++++++++++ ...smag-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...smag-bff7cd3ae66179edd6f79145d30bd8a6.yaml | 58 +++++++++++++++++++ ...smag-eee75ef3c538836fcb67797f819fea53.yaml | 58 +++++++++++++++++++ ...atic-8182d66ef4e973d2ca9cb45d86ff3d4f.yaml | 58 +++++++++++++++++++ ...aper-6aa028e953687ecd485553c1a3a1d760.yaml | 58 +++++++++++++++++++ ...aper-8196dc2fb2d79f5488f7ada6ad314549.yaml | 58 +++++++++++++++++++ ...aper-9d97e58336af952a45a71932fb959090.yaml | 58 +++++++++++++++++++ ...aper-a588607108cf849846e45967a8f41100.yaml | 58 +++++++++++++++++++ ...aper-bff7cd3ae66179edd6f79145d30bd8a6.yaml | 58 +++++++++++++++++++ ...aper-c159f842979de9da3050a83cd3188bb4.yaml | 58 +++++++++++++++++++ ...aper-e9eec5a929c2311a5540a7010e91443f.yaml | 58 +++++++++++++++++++ ...aper-f7df930f39831ca9c998366434d0f175.yaml | 58 +++++++++++++++++++ ...lite-17b72cbae2806ebc0f250c3c7b56eebd.yaml | 58 +++++++++++++++++++ ...er-x-72ccbc519dc7d87cb6145ad667cfc553.yaml | 58 +++++++++++++++++++ ...er-x-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...ress-7d03328ac3d4c62cd7bbe97808deaeca.yaml | 58 +++++++++++++++++++ ...exos-34acc22fa074776c63206475018db5f7.yaml | 58 +++++++++++++++++++ ...exos-42713e2eee178dc417083530771f3ed7.yaml | 58 +++++++++++++++++++ ...exos-89678d145b82686546d5edb88c1716ee.yaml | 58 +++++++++++++++++++ ...exos-a1ee8803b42d3b197599b6095f91fefd.yaml | 58 +++++++++++++++++++ ...xter-4671c56fe35cfb879a2471b3343a30c7.yaml | 58 +++++++++++++++++++ ...xter-fad17491d46d93aa052a2c5d2ff91e1e.yaml | 58 +++++++++++++++++++ ...lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...base-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tate-e239f345bc8a481c67e859f476dff343.yaml | 58 +++++++++++++++++++ ...life-723c4ff79d9f0fe1e4ecde5d53761a98.yaml | 58 +++++++++++++++++++ ...okke-161c9677e95eb847dc432eddc65db142.yaml | 58 +++++++++++++++++++ ...okke-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ster-416263074de0ee717fb7c97e5e787220.yaml | 58 +++++++++++++++++++ ...ster-484e846ac2c2ca29eb31f11236276ff2.yaml | 58 +++++++++++++++++++ ...lite-2cf62694c1273a50c31799d50a62c51a.yaml | 58 +++++++++++++++++++ .../nsc-47b642ac75c1b5d9ea7b88cb11912c96.yaml | 58 +++++++++++++++++++ ...ance-0327a43feb8609a30501f61830824dfb.yaml | 58 +++++++++++++++++++ ...heme-aff200e3fd02dd9a3a104f29c0a6659a.yaml | 58 +++++++++++++++++++ ...anwp-e5433fd914f5f7bdfa5093c95eaa7f18.yaml | 58 +++++++++++++++++++ ...anwp-edb6cbfc2b955228bcb748bd996c120c.yaml | 58 +++++++++++++++++++ ...air2-3a52346bbe93c0a607f0387208360f6f.yaml | 58 +++++++++++++++++++ ...site-d1d5b5cda2193b27d3a6f40310fec17c.yaml | 58 +++++++++++++++++++ ...tone-161c93480bad1a6fddf7935d08286cca.yaml | 58 +++++++++++++++++++ ...tone-95f9bc03677a083bf89832ea0c794033.yaml | 58 +++++++++++++++++++ ...tore-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...tore-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...tore-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...tore-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...tore-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...ress-cc59f91f842a517b5809b79cc65f1b6e.yaml | 58 +++++++++++++++++++ ...door-7818a6f8e7606cc76a49355022fa2087.yaml | 58 +++++++++++++++++++ ...ovum-153b374358a4469baf0dcf3e128485d7.yaml | 58 +++++++++++++++++++ ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 58 +++++++++++++++++++ ...ines-420826a18f17be957cec476d8ddba661.yaml | 58 +++++++++++++++++++ ...amic-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...some-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...some-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...some-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...sect-c7556a1caf919c1acc5983a1f0ea7582.yaml | 58 +++++++++++++++++++ ...tion-ab49cd0603fd2aad8bd2addfd19e8e37.yaml | 58 +++++++++++++++++++ ...tion-c7556a1caf919c1acc5983a1f0ea7582.yaml | 58 +++++++++++++++++++ ...ject-c7556a1caf919c1acc5983a1f0ea7582.yaml | 58 +++++++++++++++++++ ...nite-c7556a1caf919c1acc5983a1f0ea7582.yaml | 58 +++++++++++++++++++ ...ount-d272edd7bf2202319b532fbee6ccf813.yaml | 58 +++++++++++++++++++ ...rtdo-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml | 58 +++++++++++++++++++ ...hway-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...olio-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...rmag-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...rmag-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...sion-7cbcd3695c9e4a82582727b8bf002ad8.yaml | 58 +++++++++++++++++++ ...sion-a15ad11bdf9b6729c6b7e6c228643dc4.yaml | 58 +++++++++++++++++++ ...heme-5f8f39bace71e82e660205813ebdbf8f.yaml | 58 +++++++++++++++++++ ...heme-62e00956791226e133fce07bc6049175.yaml | 58 +++++++++++++++++++ ...heme-95e54f65e6d0b56382227247b6627a71.yaml | 58 +++++++++++++++++++ ...olio-8ef9471efc371c6e5352e86a4f1c97cf.yaml | 58 +++++++++++++++++++ ...logy-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml | 58 +++++++++++++++++++ ...tory-817085c14092d48e41f60bbe2970b571.yaml | 58 +++++++++++++++++++ ...oard-da11574313c0b78ab88b69a807dbc63e.yaml | 58 +++++++++++++++++++ ...nity-d160b72531c6001a36910570c68caf3f.yaml | 58 +++++++++++++++++++ ...stom-caeb5a0b48102c1758efb7acc2ae32c5.yaml | 58 +++++++++++++++++++ ...lite-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...form-097b177de58f6e0ab66eb9ddb05e4182.yaml | 58 +++++++++++++++++++ ...form-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml | 58 +++++++++++++++++++ ...iska-a2a9df8b3604a4aa48635001d225e7fd.yaml | 58 +++++++++++++++++++ ...pont-5bbc8aa8376e0b4126beac5ed3fccdfe.yaml | 58 +++++++++++++++++++ ...pool-7ff920414ab7dcbc44bc64e30066047c.yaml | 58 +++++++++++++++++++ ...arfx-64d81acfaf286b16665d31bcc42d2bfa.yaml | 58 +++++++++++++++++++ ...orto-68e18ce0101bb6035f701d461eb70415.yaml | 58 +++++++++++++++++++ ...orto-a4ba9fcc1f7e22d1ee8a16e40da81130.yaml | 58 +++++++++++++++++++ ...sive-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...sive-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...list-4c079e7a4ff59ab0c43e5c88ab6d23d3.yaml | 58 +++++++++++++++++++ ...tore-68a9180f1b681c9557f7931c761fd8d8.yaml | 58 +++++++++++++++++++ ...sume-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...unte-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...unte-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...unte-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...rosa-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...urus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...urus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...t-v2-f10a2f89b43d6c910b6e1605fdde5663.yaml | 58 +++++++++++++++++++ ...gine-51d36380a77053aac089f5606e300111.yaml | 58 +++++++++++++++++++ ...lity-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...asar-8a7f28eb936158f3b884555eebcf14f4.yaml | 58 +++++++++++++++++++ ...uota-b91f6a56da52c114b3a84093ea345821.yaml | 58 +++++++++++++++++++ ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 58 +++++++++++++++++++ ...-mag-a81a5bf9125eeee92e00bfdaa83c90ee.yaml | 58 +++++++++++++++++++ ...ambo-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...ness-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 58 +++++++++++++++++++ ...tory-0c8164317d8680b32c0889f7b19b5e0b.yaml | 58 +++++++++++++++++++ ...tory-527c1df8473c8a3efd5589ba81b0395f.yaml | 58 +++++++++++++++++++ ...te-7-024d089f0907af94147d4ffdaa704965.yaml | 58 +++++++++++++++++++ ...te-7-66d97e7594f241334344e22e74a87e0f.yaml | 58 +++++++++++++++++++ ...te-7-7c80a51dbc178dbba0958056b8c3f2e8.yaml | 58 +++++++++++++++++++ ...te-7-8be48b3453eb15360ed107a9ab69d0f6.yaml | 58 +++++++++++++++++++ ...te-7-c2afa79da4aeafd15b33b22d1b481661.yaml | 58 +++++++++++++++++++ ...te-7-cc4eb2a8450ba7d1ac65c2f61e0d0cf7.yaml | 58 +++++++++++++++++++ ...te-7-e4a1be97c16e08b518e98ce4293ed725.yaml | 58 +++++++++++++++++++ ...te-7-f1a9fcf69d62e2bfd481e04f939f5821.yaml | 58 +++++++++++++++++++ ...tate-b65ead0bf4d8e59d495a3f91f757b324.yaml | 58 +++++++++++++++++++ ...omes-4a61498f6efba74cb49bf8c1a7045be1.yaml | 58 +++++++++++++++++++ ...omes-d33a8c081c58ee9aa399ed8893b885f0.yaml | 58 +++++++++++++++++++ ...lity-3985d2776b3f2339d3a1cdb855d509b4.yaml | 58 +++++++++++++++++++ ...lity-3d461e76f68c530821c0137a86bc0253.yaml | 58 +++++++++++++++++++ ...lity-7a0da0352bb71e4b35931b40a5da432b.yaml | 58 +++++++++++++++++++ ...line-6d6ebc25c70df8d2d5941ea4d08ecee0.yaml | 58 +++++++++++++++++++ ...teel-74dd0fb008f6cc6f34e6b30263cedfe1.yaml | 58 +++++++++++++++++++ ...tion-57d8566b3666f1822ca82f2082d046bb.yaml | 58 +++++++++++++++++++ ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 58 +++++++++++++++++++ ...lite-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...lite-f1520e7afffb75e51c28f74d7ae1e832.yaml | 58 +++++++++++++++++++ ...heme-7848dbbabd9f06e0c602290bde397eb1.yaml | 58 +++++++++++++++++++ ...heme-b4a06dd8a8b5f551ef3c31a46e092a4e.yaml | 58 +++++++++++++++++++ ...heme-b8220e763aaa4255ba01ed2e30a358fd.yaml | 58 +++++++++++++++++++ ...gent-288eb500b515d4e74eb8cc4150e440e6.yaml | 58 +++++++++++++++++++ ...soto-87e4105fcd662623c87dc5371d2bcde2.yaml | 58 +++++++++++++++++++ ...sive-935bd93984704dacecafedc205b598e5.yaml | 58 +++++++++++++++++++ ...cafe-c69c081915e9f9d8dfc0bc8f1bf2863b.yaml | 58 +++++++++++++++++++ ...cess-da96835466676ae365fbd594b9bba421.yaml | 58 +++++++++++++++++++ ...olve-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...olve-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...olve-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...tnow-21873517e62f6eb7a1f45af969de223e.yaml | 58 +++++++++++++++++++ ...pple-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...pple-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...pple-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...rise-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...rise-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 58 +++++++++++++++++++ ...well-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...-kit-a2114fc45474e481aea36dcc9b5f1c4d.yaml | 58 +++++++++++++++++++ ...-kit-c3f19b4938e0be4a55a8b5f19fc9f5b1.yaml | 58 +++++++++++++++++++ ...n_wp-57d8566b3666f1822ca82f2082d046bb.yaml | 58 +++++++++++++++++++ ...hifa-3d0307222924b1a61871ddfb3612e17b.yaml | 58 +++++++++++++++++++ ...hifa-8f0fce172385265946ed4e8ec3bfed88.yaml | 58 +++++++++++++++++++ ...aico-81e1d981b3021dcdf8ad1a9df6d9d51d.yaml | 58 +++++++++++++++++++ ...kala-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...kala-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...kala-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...alem-25d9dfe9dcb2d90be01a548affeb688f.yaml | 58 +++++++++++++++++++ ...ient-29b864084c574899fcc996f9b322577a.yaml | 58 +++++++++++++++++++ ...n-wp-26ee088c8368fd2a8bcecfc18ae8bb11.yaml | 58 +++++++++++++++++++ ...dbox-519977ede43c175cac49c012c33ae5bd.yaml | 58 +++++++++++++++++++ ...dbox-989254b568354826202f288242e58427.yaml | 58 +++++++++++++++++++ ...lite-4dd17e99df33e7a68f2a978cf00a71e1.yaml | 58 +++++++++++++++++++ ...oshi-2cd7c65813d463e1581c58ac5badd893.yaml | 58 +++++++++++++++++++ ...rlet-828e17b05d92c010fb7f9a4a0922569b.yaml | 58 +++++++++++++++++++ ...reme-88013bc8aa189f38a19a59f4e02b7e1e.yaml | 58 +++++++++++++++++++ ...llme-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...llme-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...llme-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...scv1-b773af1a6c770b410098cbaaaa01e41c.yaml | 58 +++++++++++++++++++ ...elio-46177c2639c7b5ae832248baa4073a3a.yaml | 58 +++++++++++++++++++ ...elio-fbaa72caee7c30faff8212706be987c1.yaml | 58 +++++++++++++++++++ ...e-wp-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...ient-41077f62819cf65dd71bfb4c6e199325.yaml | 58 +++++++++++++++++++ ...king-40130dd58c838247ce08e93680f217da.yaml | 58 +++++++++++++++++++ ...less-6490c018ab51d9b822f80c44c2a4f77f.yaml | 58 +++++++++++++++++++ ...pely-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...ette-c5cd64fdc88a18d66954d78adc22f76d.yaml | 58 +++++++++++++++++++ ...star-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...hort-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...tbox-0dec1530fa29f0f3dd02117fbaf12b9a.yaml | 58 +++++++++++++++++++ ...uban-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...uban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...chid-f668ff84aa12e9412717100f16882a82.yaml | 58 +++++++++++++++++++ ...ance-36a65684d72ca90db400bc9a48e4b1a7.yaml | 58 +++++++++++++++++++ ...dark-b20cdb3204e221d28ac3a3a0e91939e9.yaml | 58 +++++++++++++++++++ ...mplo-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...olio-464f844153534ce96044f5502d947b55.yaml | 58 +++++++++++++++++++ ...rius-b962a43c022ee33e3f132497b433375e.yaml | 58 +++++++++++++++++++ ...tees-2cb73a83c44fa300cec02ee7b0e67068.yaml | 58 +++++++++++++++++++ ...h-wp-db53188989f27ad0f003901fbcf178c9.yaml | 58 +++++++++++++++++++ ...door-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...rtit-dc6219f91f46d9292d66b44460a2668b.yaml | 58 +++++++++++++++++++ ...tart-9ef0d273482df03c9ba3dcd5e27ac8b5.yaml | 58 +++++++++++++++++++ ...edad-1e964bc864ca0fa372e686235b23e1f1.yaml | 58 +++++++++++++++++++ ...edad-33c4d0a0f515bd1cedf9cdcf55231d10.yaml | 58 +++++++++++++++++++ ...edad-4f22cc4c7f59ad21868eda159380a421.yaml | 58 +++++++++++++++++++ ...edad-6a8cda00f1080a3aa286a272f860fd12.yaml | 58 +++++++++++++++++++ ...edad-6b8df25137f38e4882527178954fd3e6.yaml | 58 +++++++++++++++++++ ...edad-7cd3fabdb13125f30851d3aa6b007d33.yaml | 58 +++++++++++++++++++ ...edad-bca67036ec26c26cd0007b6d8426083e.yaml | 58 +++++++++++++++++++ ...edad-c15a76ab76b6bacb9d3a014790c1e98c.yaml | 58 +++++++++++++++++++ ...edad-f1943d1009d5a9a5f1799b0883b7d043.yaml | 58 +++++++++++++++++++ ...last-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...urce-03c4d8dd500314f942cf4bffdc3e3289.yaml | 58 +++++++++++++++++++ ...alon-8605169c0986bc4adffdd4b6cd4bbc09.yaml | 58 +++++++++++++++++++ ...tore-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...tore-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...ling-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...arky-186cdb2704350d8646ad5a58aed89581.yaml | 58 +++++++++++++++++++ ...alon-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...pawp-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...list-48124923f45f6ff808c33e2b8fa204cd.yaml | 58 +++++++++++++++++++ ...ulor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...ulor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml | 58 +++++++++++++++++++ ...ware-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...rmag-4afe438c3219ba223c08f05567ce5890.yaml | 58 +++++++++++++++++++ ...rmag-57ce58b6230c68936a87b493b14f2285.yaml | 58 +++++++++++++++++++ ...ikes-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...lack-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...piko-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...uare-3715092a367ddcdb9354396fe5cef26a.yaml | 58 +++++++++++++++++++ ...ared-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...ared-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...type-301d4c247a680f6ce86b39ab492df068.yaml | 58 +++++++++++++++++++ ...tkit-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...upzy-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml | 58 +++++++++++++++++++ ...fort-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...illa-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...illa-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...illa-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...ried-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...ried-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...ozen-0aa9e3593c86e4ffacf4528cd86f4af3.yaml | 58 +++++++++++++++++++ ...ozen-c5502df29957af11b4d0db61f979c665.yaml | 58 +++++++++++++++++++ ...erio-cb7c43df76e71bb6d20f5f4c8a5d90eb.yaml | 58 +++++++++++++++++++ ...list-887e51b7ac6ae9ebfb1f0b6b57330b90.yaml | 58 +++++++++++++++++++ ...tory-e1d105a5373862135dae31af977cf05f.yaml | 58 +++++++++++++++++++ ...gger-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 58 +++++++++++++++++++ ...wape-7ec2393a2db75328cb78362c45e273f6.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...lade-6e394bf087d75cce991df25bc2d90b32.yaml | 58 +++++++++++++++++++ .../t1-51d5d1c24b78c2a34638e1c642bf73fd.yaml | 58 +++++++++++++++++++ ...face-72e35bfea95d9e42520259e2f04f4250.yaml | 58 +++++++++++++++++++ ...drop-aa0917a06c9e064c66e0e15d0b79978d.yaml | 58 +++++++++++++++++++ ...luro-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...ence-3d5a012eeeb1f6dd0f8bcd44e5b5cd93.yaml | 58 +++++++++++++++++++ ...dite-86bc0489b6564a6b791112624ecc4c24.yaml | 58 +++++++++++++++++++ ...cher-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...cher-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...cher-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...nday-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...nday-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...nday-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...e100-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...e100-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...e100-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...ency-18e29f581b2b637530caba059b3180e6.yaml | 58 +++++++++++++++++++ ...v114-d377235da8e0cc9500eb3b5f44252198.yaml | 58 +++++++++++++++++++ ...egem-0f0ddbff82e7ef39ec0bd688d9ec8fea.yaml | 58 +++++++++++++++++++ ...egem-8d422c3c7895b2b4d7494cb28df2efe5.yaml | 58 +++++++++++++++++++ ...egem-9132b473713ba452ca61cd28b37b6336.yaml | 58 +++++++++++++++++++ ...egem-a830a457478521ad7f5b87d39b666bbf.yaml | 58 +++++++++++++++++++ ...egem-e3e7d2debbf761854054ecabf536826d.yaml | 58 +++++++++++++++++++ ...ltra-1e0aaf982b61c73dcc9a05511e801c09.yaml | 58 +++++++++++++++++++ ...ltra-3d30a7e8f0b8f6bc4309468a15c7f314.yaml | 58 +++++++++++++++++++ ...ltra-c842576ba599cc503a47eb67c0e70851.yaml | 58 +++++++++++++++++++ ...ltra-e85a48bb53d03fe4f0288a0ec1595649.yaml | 58 +++++++++++++++++++ ...ltra-f655e8b1894773f9d99ee26fcaeba800.yaml | 58 +++++++++++++++++++ ...roof-b3e7445697f1970506026aee23a35900.yaml | 58 +++++++++++++++++++ ...sive-744f91815860d793f31d9dcfde87abdc.yaml | 58 +++++++++++++++++++ ...sway-f7825c5bf409c18daf2cdaf15d281a99.yaml | 58 +++++++++++++++++++ ...heme-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...heme-c88aacc0c258c2583886d5df08f00e4f.yaml | 58 +++++++++++++++++++ ...heme-ec5c5e05e1261f9960d3089a18968f4c.yaml | 58 +++++++++++++++++++ ...heme-fece5d89023061344eacddb3239c9c49.yaml | 58 +++++++++++++++++++ ...lbox-936c77f53a2357ce622711b674cdaed4.yaml | 58 +++++++++++++++++++ ...otal-99f1c42a705f1b7c13a404d5bf315c5f.yaml | 58 +++++++++++++++++++ ...otal-e9ad128afe18da7565a18caa795c2ef0.yaml | 58 +++++++++++++++++++ ...nhub-17f6998fdf35be8a6349776a3309aedc.yaml | 58 +++++++++++++++++++ ...nhub-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml | 58 +++++++++++++++++++ ...nhub-be3f332add5d9ce678efc86e37a29e03.yaml | 58 +++++++++++++++++++ ...nhub-ee94325aa53d1af2c9c7dc7266c2b8f3.yaml | 58 +++++++++++++++++++ ...nhub-f5204789b3d63c1e5dd223fef5d1ac5d.yaml | 58 +++++++++++++++++++ ...cend-a746469ba08e7ad3eaafd923d2717c92.yaml | 58 +++++++++++++++++++ ...ency-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...king-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...eler-10e06b5ef925da2edfec94c00c6ef59a.yaml | 58 +++++++++++++++++++ ...eler-47edf7b573f3606ae6a648dd78bee5ee.yaml | 58 +++++++++++++++++++ ...eler-4e8adfcb068bf53ba8223d2136f425a4.yaml | 58 +++++++++++++++++++ ...eler-ef4958af1c7e13be4b4aa1bba11ecbc2.yaml | 58 +++++++++++++++++++ ...eler-f415db0563c7e2bf116edbc6956f1ae6.yaml | 58 +++++++++++++++++++ ...avey-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml | 58 +++++++++++++++++++ ...ding-1def92176b2075addd1971f8bb11410a.yaml | 58 +++++++++++++++++++ ...emag-909fb4f06b4694caa086894d4ab6e947.yaml | 58 +++++++++++++++++++ ...-edd-b586a8ab64bee13c2ee807e747d50adb.yaml | 58 +++++++++++++++++++ ...sign-3d5c779f38ece858601f73d1cc738733.yaml | 58 +++++++++++++++++++ ...sign-3f3928c6559acc265ac4dc8abe8f4e68.yaml | 58 +++++++++++++++++++ ...even-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...even-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...even-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...akit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...ique-df4c2356c55ce196a7dc2c935ff36c73.yaml | 58 +++++++++++++++++++ ...amed-babd8720f51cdfc03ee525219e51d67f.yaml | 58 +++++++++++++++++++ ...d-se-babd8720f51cdfc03ee525219e51d67f.yaml | 58 +++++++++++++++++++ ...ntwp-4fc88bb474bb1a0cdd35b01d04f15578.yaml | 58 +++++++++++++++++++ ...cale-5e5f5586f8a04fc7c1bb725c8fd2a8ff.yaml | 58 +++++++++++++++++++ ...city-7afac27e2fdaa8f6fe79366afab488a9.yaml | 58 +++++++++++++++++++ ...lvet-cebcf5c5e3b1d8025e7b39f8bd391a13.yaml | 58 +++++++++++++++++++ ...sage-1f43087f32c2016495bdaad26c9a18a2.yaml | 58 +++++++++++++++++++ ...tice-37917ea4c5b30e9a2f479f087050ff0a.yaml | 58 +++++++++++++++++++ ...blog-6d87a6f7248c4528f7d5ef6ed7c11eba.yaml | 58 +++++++++++++++++++ ...llar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...iral-06cd0f178ae533c7b94126d052d17b3f.yaml | 58 +++++++++++++++++++ ...iral-d566c0816c38ea6ca24760850c1eaf4a.yaml | 58 +++++++++++++++++++ ...-mag-800d496f51d819e5732256fbd162712b.yaml | 58 +++++++++++++++++++ ...news-06cd0f178ae533c7b94126d052d17b3f.yaml | 58 +++++++++++++++++++ ...news-d566c0816c38ea6ca24760850c1eaf4a.yaml | 58 +++++++++++++++++++ ...like-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...rtue-2d42369e26f63aede3d7de3de1ae9995.yaml | 58 +++++++++++++++++++ ...ttle-8fb46ccbfe8eb892f418af64a9d461a7.yaml | 58 +++++++++++++++++++ ...ithy-72d0f45bd923b7475bc87b8f7146adf8.yaml | 58 +++++++++++++++++++ ...ithy-eee162c4e035760d9235de8c731181be.yaml | 58 +++++++++++++++++++ ...vmag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...vmag-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...vmag-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...news-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...news-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...news-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...oice-09bb804f266b350634cb031ea62ca641.yaml | 58 +++++++++++++++++++ ...oice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 58 +++++++++++++++++++ ...reet-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...reme-13c73556a747c83cbb4df9719464f4fd.yaml | 58 +++++++++++++++++++ ...reme-17ab37dbc7beb458edc5925614c59dfa.yaml | 58 +++++++++++++++++++ ...0901-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml | 58 +++++++++++++++++++ ...olio-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...news-a66c423ab6d157ff18cae8cbb8d16a15.yaml | 58 +++++++++++++++++++ ...tand-5bf9d91713d8c35818245877f73557be.yaml | 58 +++++++++++++++++++ ...ibar-8720a886474e9b973346fa40eca70f76.yaml | 58 +++++++++++++++++++ ...ters-1bdc5a83caa0df98ccf44a6fbb6306e2.yaml | 58 +++++++++++++++++++ ...wise-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...blog-a81a5bf9125eeee92e00bfdaa83c90ee.yaml | 58 +++++++++++++++++++ ...fice-b256df5c032ca82a00290c7b34a523e2.yaml | 58 +++++++++++++++++++ ...mart-1a6b9215905d609bfa19a88fafbe9af4.yaml | 58 +++++++++++++++++++ ...mart-1d9a2ca68f50fb01ed55a21dfdc7c1dc.yaml | 58 +++++++++++++++++++ ...mart-27976922dece0aca2bde50f6320bde6f.yaml | 58 +++++++++++++++++++ ...mart-7bd424eb93435e30d87b1474845a32ce.yaml | 58 +++++++++++++++++++ ...mart-9ab86db9ce48449a4c43692df0ff7e17.yaml | 58 +++++++++++++++++++ ...mart-a392159f37a0ade5203b528da67d0e66.yaml | 58 +++++++++++++++++++ ...ohoo-cc3c8c63ee92500b82ad257317be9d73.yaml | 58 +++++++++++++++++++ ...tify-5a02b0682e7d4b10352df50fd089e856.yaml | 58 +++++++++++++++++++ ...tore-41077f62819cf65dd71bfb4c6e199325.yaml | 58 +++++++++++++++++++ ...ique-41077f62819cf65dd71bfb4c6e199325.yaml | 58 +++++++++++++++++++ ...rkio-3cfee65e35362bbfc116d2c83a3a30c9.yaml | 58 +++++++++++++++++++ ...reap-26b89a3f8ab991ddf909838ee3f83a8f.yaml | 58 +++++++++++++++++++ ...reap-5b880f984cc2c6ee6aced998be3c7997.yaml | 58 +++++++++++++++++++ ...reap-8b0a78ba7d4de258f1d5d80e510c721b.yaml | 58 +++++++++++++++++++ ...reap-c1a5d94e24ff3bf97db23d2e01bc94ca.yaml | 58 +++++++++++++++++++ ...reap-f3ff7e279524c365a3f486be69df6e9f.yaml | 58 +++++++++++++++++++ ...cout-295565d6c00c49b75df12a1f75ae3147.yaml | 58 +++++++++++++++++++ ...rkup-598875fea738a6301ca41e5bba8cb8dc.yaml | 58 +++++++++++++++++++ ...oose-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...olio-10655f6004e5353e2b6a2b5ad40ac777.yaml | 58 +++++++++++++++++++ ...tate-9df83661bbe3f56e6da6d47f2ce8176c.yaml | 58 +++++++++++++++++++ ...erra-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 58 +++++++++++++++++++ ...tore-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...tore-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...tore-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...phrm-d1dc7536ba0bbf23ad7893c422769d48.yaml | 58 +++++++++++++++++++ ...plms-1a3b140e25db47aa6f5e6de5d03caa41.yaml | 58 +++++++++++++++++++ ...plms-87521cd586bc2f45b279349b97e31c54.yaml | 58 +++++++++++++++++++ ...aces-56c321d3601ae77c62688196e1aa61b1.yaml | 58 +++++++++++++++++++ ...llax-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...llax-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...llax-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...-pro-0d2429a44660b0fd9009cfc551d51d85.yaml | 58 +++++++++++++++++++ ...itro-fe0eedbb007ccace8a4e2ce0abc973e1.yaml | 58 +++++++++++++++++++ ...nder-a5fba451ec49e569a6e3b33c31987240.yaml | 58 +++++++++++++++++++ ...x-t9-086335e3764d29c07c7d7cc4e2750c93.yaml | 58 +++++++++++++++++++ ...enon-809667597aa78113de32ecd2d78b1168.yaml | 58 +++++++++++++++++++ ...xmas-920241a52177d01e01f51750db4e9043.yaml | 58 +++++++++++++++++++ ...tore-015cd56d3f2f470971a1fb745e9facf8.yaml | 58 +++++++++++++++++++ ...tore-38fb7f7c173d005d7a2c4887d0346c93.yaml | 58 +++++++++++++++++++ ...tore-5eda4166c53220a4fc1a66df7cda1b76.yaml | 58 +++++++++++++++++++ ...tore-8a9cd0a3b3bf0281b86f1864c19141dc.yaml | 58 +++++++++++++++++++ ...tore-a093f9ab0678625e44f3702b1a154c42.yaml | 58 +++++++++++++++++++ ...tore-bf873db96785a26a3145cbfaa5b26d6e.yaml | 58 +++++++++++++++++++ ...emes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml | 58 +++++++++++++++++++ ...rney-4eeae71a78a49f8b3e46b309da962e47.yaml | 58 +++++++++++++++++++ ...yuki-2820877b5dbf766c7f6817fd492690e8.yaml | 58 +++++++++++++++++++ ...yuki-3787d9c397d58c6e8f2c674f16ffe8c1.yaml | 58 +++++++++++++++++++ ...vora-af728e68019b9ee6cc8672f7e19f6c44.yaml | 58 +++++++++++++++++++ ...ever-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml | 58 +++++++++++++++++++ ...lite-2c9dd1c9df5c34a137e9f118a0781a3d.yaml | 58 +++++++++++++++++++ ...baby-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...baby-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...baby-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...tics-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...tics-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...tics-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 58 +++++++++++++++++++ ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 58 +++++++++++++++++++ ...lite-f89ee1fe18d2f93346e76054105f5916.yaml | 58 +++++++++++++++++++ ...oner-4fb619246fc5d2000cab608496d82ce7.yaml | 58 +++++++++++++++++++ ...oner-d7ec4a32cfcc6080d759cea90bff42d1.yaml | 58 +++++++++++++++++++ 17887 files changed, 1037396 insertions(+), 8 deletions(-) create mode 100644 nuclei-templates/cve-less/plugins/001-prime-strategy-translate-accelerator-5be710df65d6bc92f524c90909df2f99.yaml create mode 100644 nuclei-templates/cve-less/plugins/0mk-shortener-17c0f8c5353b51c76be9ea996254e492.yaml create mode 100644 nuclei-templates/cve-less/plugins/0mk-shortener-cbd2f40afcea324b1b6628d63c264b5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/1-flash-gallery-e9ae08724abba099d4b3758d3e5c0730.yaml create mode 100644 nuclei-templates/cve-less/plugins/1-jquery-photo-gallery-slideshow-flash-205a1fbb250b5543ad54712c5ab85794.yaml create mode 100644 nuclei-templates/cve-less/plugins/1003-mortgage-application-5d3b862e6e4baaf71b24925f067433ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/1003-mortgage-application-ced1428c6198f92ade552b4de59a878b.yaml create mode 100644 nuclei-templates/cve-less/plugins/10to8-online-booking-22fe25cfef73eeb94b97da8f9108cc4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/12-step-meeting-list-3884d9a5a5a83b7a3dc7015b6e93594e.yaml create mode 100644 nuclei-templates/cve-less/plugins/12-step-meeting-list-63b258c691616cbc41ef567bfa0329d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/123-chat-videochat-93f5b1d9d41a68948272932dc6addd39.yaml create mode 100644 nuclei-templates/cve-less/plugins/123contactform-for-wordpress-5b8ac2585d2f3bb3221568e060310933.yaml create mode 100644 nuclei-templates/cve-less/plugins/123contactform-for-wordpress-d83585e94da6387ed15cb2d62de561eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/123contactform-for-wordpress-df1a5321125f83ce7c8f5507c7f81133.yaml create mode 100644 nuclei-templates/cve-less/plugins/1app-business-forms-0bb8bade373073a31c7eae43154f4462.yaml create mode 100644 nuclei-templates/cve-less/plugins/1app-business-forms-3a92cf2d3b454c13398f20f7a203cccd.yaml create mode 100644 nuclei-templates/cve-less/plugins/1g-music-share-862c51605ec18beb1576064976f304a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/1player-98fa09468510e4f3d608da204df8d702.yaml create mode 100644 nuclei-templates/cve-less/plugins/2-click-socialmedia-buttons-50d503ecab241e54444834a8beaebf25.yaml create mode 100644 nuclei-templates/cve-less/plugins/2-click-socialmedia-buttons-a6ea9efcd2b00d833f3dd3cae90d9348.yaml create mode 100644 nuclei-templates/cve-less/plugins/2j-slideshow-32bdd04e0affc46dfffa9d8a81425f9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/2j-slideshow-6009aafd4759ca9a9de1f0b928158a27.yaml create mode 100644 nuclei-templates/cve-less/plugins/2j-slideshow-c5c3a05f327c9f5ee9273cd2dd422a24.yaml create mode 100644 nuclei-templates/cve-less/plugins/2kb-amazon-affiliates-store-8030149fcea03a9895d089120ebb4064.yaml create mode 100644 nuclei-templates/cve-less/plugins/2kb-amazon-affiliates-store-942a0a0ff8bd16dd5a3f3bf1e155403a.yaml create mode 100644 nuclei-templates/cve-less/plugins/3-word-address-validation-field-9dec9c9b266000df591dc3dcef1e7d84.yaml create mode 100644 nuclei-templates/cve-less/plugins/360-product-rotation-7c268109bdc7dc29465b157c5422cae8.yaml create mode 100644 nuclei-templates/cve-less/plugins/360-product-rotation-bd56b3adb9677e584285e6d539545e56.yaml create mode 100644 nuclei-templates/cve-less/plugins/360deg-javascript-viewer-b160f2225fa61e39751381696b9f32c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/360deg-javascript-viewer-de737cfbceda5a83bf3527f7e7cd5395.yaml create mode 100644 nuclei-templates/cve-less/plugins/3com-asesor-de-cookies-2f1a45c352b73e0646091d728f0d1831.yaml create mode 100644 nuclei-templates/cve-less/plugins/3d-cover-carousel-8727745b12483495d5142bd68893d94d.yaml create mode 100644 nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-2c9be73a62038f3d8273efbfe3ddeeff.yaml create mode 100644 nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-6970693f733e5a846cb7f76630b73d22.yaml create mode 100644 nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-f6e79c74546c68ce5cae314ffc286a54.yaml create mode 100644 nuclei-templates/cve-less/plugins/3d-viewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/3dady-real-time-web-stats-ea643024832757f9f2006e750b2fb2aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/3dprint-d5d38bc96ea3d80c250cd1535165fc1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/3dprint-f6f5e5b83dd05b47087018ab93dc70c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/3dprint-lite-e32ba6270a5c504833f090f97c5f6929.yaml create mode 100644 nuclei-templates/cve-less/plugins/3r-elementor-timeline-widget-1c97daee437b7051f2d3a3601380f79a.yaml create mode 100644 nuclei-templates/cve-less/plugins/3xsocializer-af2ae774d22378ee0a69d1768e15e475.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-redirection-manager-5abfc4a3a7a8a78baed36252f32bd2c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-redirection-manager-ab1f48347ef68d08de8af611ca6f7153.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-solution-1c59c6071776e5fed814157ec36f53bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-solution-64f66ce5bf8a7c60ba469ac77d7c053d.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-solution-80092ae62e91070a929addb38cf05eeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-solution-dc23dda4be9febbbe1e1b634c133ec2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-solution-e8f10c1130d647962cf4e7ae1be8e563.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-to-301-1455eb1db51304e088780d96a4de0388.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-to-301-30cdceb24c9fb6269d5ab38dde655939.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-to-301-77ebf1c20a9fe589cfb00388461b5ac7.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-to-301-cb580b1f1380796b4c9c6b8e0a7f576c.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-to-301-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-to-301-e5012481eb3358496d9e8266284a0c72.yaml create mode 100644 nuclei-templates/cve-less/plugins/404-to-start-540d765197d5d77b942283129699e946.yaml create mode 100644 nuclei-templates/cve-less/plugins/404like-af8b6c1405ca4fecbb6348cbb779bff6.yaml create mode 100644 nuclei-templates/cve-less/plugins/404s-fb3335fd014953747fe67771d5c2fe67.yaml create mode 100644 nuclei-templates/cve-less/plugins/4ecps-webforms-2d4f6a1b39a4cc9b06569630fa151900.yaml create mode 100644 nuclei-templates/cve-less/plugins/4k-icon-fonts-for-visual-composer-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/5-anker-connect-01a4732a49ff7a9ef4ebc45204cbcc4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/5-stars-rating-funnel-067c415d5e57c3f7bf3c32e31e7bfdc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/5-stars-rating-funnel-078909fc07244cccae3451c5f9a6996f.yaml create mode 100644 nuclei-templates/cve-less/plugins/5-stars-rating-funnel-aa9afd9a4b3e913533a4ca30d7c2f62e.yaml create mode 100644 nuclei-templates/cve-less/plugins/5280-bootstrap-modal-contact-form-4d5bd93e0c27080244733cb180f3f8d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/59sec-lite-contact-form-7-push-notifications-on-ios-and-android-535595f4b0854a5ba3ef769bc0a6d8a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/8-degree-notification-bar-d7e6e52fbc5100c15dd93975c02af422.yaml create mode 100644 nuclei-templates/cve-less/plugins/99fy-core-2ade9cd6a231682261bc318b1ed04cfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/99robots-header-footer-code-manager-pro-747c4bd1125204cefd447ba68faf21f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/a-forms-44494ddc52293f35d4e91f03bc8a3bb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/a-staff-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/a2-optimized-wp-7a6dd13ed18a2e45d6c2f734b970d2e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/a3-lazy-load-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/a3-lazy-load-b935aac9392ea74d48c16c20e8b0b995.yaml create mode 100644 nuclei-templates/cve-less/plugins/a3-portfolio-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/a3-portfolio-69bbdafafddf73eabec5b44d29b3cf8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/a3-portfolio-b935aac9392ea74d48c16c20e8b0b995.yaml create mode 100644 nuclei-templates/cve-less/plugins/a3-responsive-slider-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/a3-responsive-slider-ae8b89aaa7a588f83d4c4781cadfd7d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/a3-responsive-slider-b935aac9392ea74d48c16c20e8b0b995.yaml create mode 100644 nuclei-templates/cve-less/plugins/a4-barcode-generator-1003d8c4cbec4c692768d02c2deb833d.yaml create mode 100644 nuclei-templates/cve-less/plugins/a4-barcode-generator-96d45953f77055903959c32a94c71bbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/aa-calculator-abc87888690b19dcb77925a4c30ad407.yaml create mode 100644 nuclei-templates/cve-less/plugins/aajoda-testimonials-6d0e53ee77e3c1fef450b5cd709f1ad9.yaml create mode 100644 nuclei-templates/cve-less/plugins/aawp-339dac9db5bc9d83f9bdf6846ab3c955.yaml create mode 100644 nuclei-templates/cve-less/plugins/aawp-39d46e34c8d82019270861865807cb95.yaml create mode 100644 nuclei-templates/cve-less/plugins/ab-google-map-travel-5b4876c37f7fd35309718a01d65b18f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ab-press-optimizer-lite-414da17bdb4a780711966608cd7b68aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/ab-rankings-testing-tool-d05a6b8d7f246d51e5c6639ab5b124d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/abeta-punchout-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/abitgone-commentsafe-5f5e581ab08c36f61f1784ceff23dfca.yaml create mode 100644 nuclei-templates/cve-less/plugins/about-author-box-0b3e32c5343e2d92c6dd937071e516b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/about-author-c3b408a5f882549523fb91707173e697.yaml create mode 100644 nuclei-templates/cve-less/plugins/about-me-3000-d71809a4e98fe91e7030122fe36364ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/about-me-3000-e7894ec8416d5b9bca834efe054366ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/about-me-a5ad111bbf24e4213c2e76334a25e047.yaml create mode 100644 nuclei-templates/cve-less/plugins/about-rentals-e3ba97fb48a1eae9c0640e6703a15a7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/absolute-privacy-08a30537532865cd761666366968e42d.yaml create mode 100644 nuclei-templates/cve-less/plugins/absolute-privacy-b38c5781d2a93e3491c104d301bd4d0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/absolute-reviews-bcec64a9217ef083d681e74eb6ceccde.yaml create mode 100644 nuclei-templates/cve-less/plugins/abtest-32bb442297758f740a582a38fb271291.yaml create mode 100644 nuclei-templates/cve-less/plugins/abwp-simple-counter-2583c8c1dd1479446cbf085c6134c883.yaml create mode 100644 nuclei-templates/cve-less/plugins/academy-2f3fe53a50f6ba1e34fffa48d4d3ffac.yaml create mode 100644 nuclei-templates/cve-less/plugins/academy-74f803f6a35ab9fee5ff5f4a7905da8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/academy-9f9b469ed3c99cc2601f251ee6ef9e63.yaml create mode 100644 nuclei-templates/cve-less/plugins/accelerated-mobile-pages-2f9298ab3f6a9cf7ac470aa68de57def.yaml create mode 100644 nuclei-templates/cve-less/plugins/accelerated-mobile-pages-498e3e358d7cb9235d23b7fd787ad310.yaml create mode 100644 nuclei-templates/cve-less/plugins/accelerated-mobile-pages-779279c30a67e49a16a563a554fb708b.yaml create mode 100644 nuclei-templates/cve-less/plugins/accelerated-mobile-pages-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/accelerated-mobile-pages-adc8f09209828ecd25d3a9013f76dba0.yaml create mode 100644 nuclei-templates/cve-less/plugins/accelerated-mobile-pages-c05da70d5ed77ea30636d59ab804aaa2.yaml create mode 100644 nuclei-templates/cve-less/plugins/accelerated-mobile-pages-c7b7a15003ffbb80a100eb159e64a8bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/accelerated-mobile-pages-d0f1f9dc5f8553a777fe29b0dbac4733.yaml create mode 100644 nuclei-templates/cve-less/plugins/access-category-password-ba769ee3b56a07d054d82d24eca8d984.yaml create mode 100644 nuclei-templates/cve-less/plugins/access-code-feeder-5321d52c0d483f1a186be60c117d7779.yaml create mode 100644 nuclei-templates/cve-less/plugins/access-demo-importer-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/access-demo-importer-87857021bf0d6b4f9e9f9a7926fd73da.yaml create mode 100644 nuclei-templates/cve-less/plugins/access-demo-importer-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/plugins/access-demo-importer-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessally-dbc81bf016cd5e5e4c2433dc1422c4ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessally-ec586f38da217e272f237a09e0ca477d.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessibe-d4ff7ccda72ef3d478471c54ece0f540.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessibility-2d14f404d420f837153fea14d49aa1f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessibility-7dc4797d3de860817ed6ac2d09e72ea4.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessibility-c41141bd67c49cd259895cd7c78b521d.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessibility-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessibility-help-button-a26164aedf80b474ee438ebcd8be6953.yaml create mode 100644 nuclei-templates/cve-less/plugins/accessibility-widget-7e7c2d3094ebf66ce262024cc34ea145.yaml create mode 100644 nuclei-templates/cve-less/plugins/accesspress-anonymous-post-0259b7e0abb7a82246638a669050bc8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/accesspress-anonymous-post-ba2dfbd8bd85affc67a7972c0b9842d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/accesspress-anonymous-post-pro-2e117974c1e793e439ba4ca717328fe2.yaml create mode 100644 nuclei-templates/cve-less/plugins/accesspress-facebook-auto-post-8c06a8350a61d118d6e045c1630ddff6.yaml create mode 100644 nuclei-templates/cve-less/plugins/accesspress-social-icons-3129a6f1429e82e60a76e088cdf26794.yaml create mode 100644 nuclei-templates/cve-less/plugins/accesspress-social-icons-38223592e03cdebd88e125b4e466dd20.yaml create mode 100644 nuclei-templates/cve-less/plugins/accesspress-social-icons-c6ab36823a7ccb132d76b57507e4ea5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/accesspress-twitter-feed-543905e5a70999b20f996a2b4d8c92c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/accommodation-system-e2e327ed0c82906cdc72ee6a3da6e38d.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordion-and-accordion-slider-124a6a229ba4bdf103aa1881e7bf0b04.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordion-and-accordion-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordion-eb55b372b5c3928eeddbd79bc1b91ebd.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordion-shortcodes-3091ac7532eaab098f714acca62716d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordion-slider-9ea3c82ee3ff18eecbc44a826a19457f.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-0a2080d70a92fba8a8847abac6eea304.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-1948bb7537e0374279551e8dbc2dad83.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-375db66af2081253ff533757f9dca92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-eb03f1b5d95ef0a7d7a29907029d610c.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-1b12a289a671c54e3c29dcf0a118316b.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-3b610f84d98a5bc8d0e6aaa3b08f5054.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-4032a78ffdb0269b83ac44db0e50cdc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-49cb459f51b461767e5a15017db69d79.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-4ef1f0520c09d9782f1be91688816f9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-4f4db8cd21765548f8ac243b07d65419.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-6e7fd75d5000c1a779cde51d0f7b0d94.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-73da8bcc97724050406ff5bdd6471c84.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-805e4862296df1b32dd279bbfd5412a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-or-faqs-ce7addd0eabe078cf96d1fb6e8d32578.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-wp-5600898416ea4451dceafd9acde6424d.yaml create mode 100644 nuclei-templates/cve-less/plugins/accordions-wp-cdf9a047d5c0c62c170cfb4f220b5807.yaml create mode 100644 nuclei-templates/cve-less/plugins/account-manager-woocommerce-b870ae481ac77b6b40f8ab9a7e8f35ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/accredible-certificates-35886a1535b89d1815cbc273329902f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/accurate-form-data-real-time-form-validation-5c23a6c70aea6e2ef9477919b8442851.yaml create mode 100644 nuclei-templates/cve-less/plugins/aceide-66b82cf9b546b0dbf96942572438d94e.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-better-search-a4fd26323192935dbbcbf3b0527f2fd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-extended-386512462e991dca6695af0141e48ca0.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-extended-dea0414e4a9baf8defc1d9528b3ab197.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-for-woocommerce-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-front-end-editor-f830b550290522c771fc5d5f581ec239.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-frontend-display-72069309fe30eff95916a5572e194ede.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-frontend-form-element-358ece292f0da9494f24c3c3237a7bf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-frontend-form-element-48759f93c52619bbac694a4e94eca96c.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-frontend-form-element-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-image-crop-add-on-a5f89ffe6e75548da5bcc9b8bd527e66.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-on-the-go-e066b94b3267fad45f35322be08f0f07.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-options-importexport-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-quickedit-fields-c99833151ca554dccf2540548a5b3a40.yaml create mode 100644 nuclei-templates/cve-less/plugins/acf-to-rest-api-1e33553896157651d598bc5cf39ab65c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ach-for-stripe-plaid-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/acme-fix-images-4ba662d6b707785ba4b6d4f4f14b8096.yaml create mode 100644 nuclei-templates/cve-less/plugins/aco-product-labels-for-woocommerce-3ec6520097de3a68210e828e99c83fad.yaml create mode 100644 nuclei-templates/cve-less/plugins/acobot-0f23eed689a75af60a6352d8c9b0e5a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/active-directory-integration-a7284d3f83c86c028a5b0cebbf2cf2ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/activecampaign-for-woocommerce-511e748ac6289331b63ef5c4ea73256a.yaml create mode 100644 nuclei-templates/cve-less/plugins/activecampaign-for-woocommerce-e8ed3a408ffed7b696f1556afff0400c.yaml create mode 100644 nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-0bd5595821e6e021ded7947ef04d5401.yaml create mode 100644 nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-7126916cd15b71eb21f56467461f8ab1.yaml create mode 100644 nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-910b5f5663169fdea4f0325e6cf734a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/activedemand-a4ef61682da896a77f77c008966e7b92.yaml create mode 100644 nuclei-templates/cve-less/plugins/activedemand-adf2d29be020721f57ebc8e5c323f1bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/activehelper-livehelp-98bfd8505d63ab414ff4e674e40520aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/activity-log-mainwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/activity-reactions-for-buddypress-2764a8f5acae96c89d7440a05722c172.yaml create mode 100644 nuclei-templates/cve-less/plugins/activity-reactions-for-buddypress-f8b3cfa96a6263fb75e4e2e3d0d2b588.yaml create mode 100644 nuclei-templates/cve-less/plugins/activitypub-3492aa2f8ff8d594f214ebc3c0f6df74.yaml create mode 100644 nuclei-templates/cve-less/plugins/activitypub-3d9f543216228e07e8805addbdc60815.yaml create mode 100644 nuclei-templates/cve-less/plugins/activitypub-e408b7193fb2b136537798455a49df5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/activitypub-ec1e17ee6b9dff2a9b24906383f33988.yaml create mode 100644 nuclei-templates/cve-less/plugins/activitypub-f60eec61fd032c9a9193cb04ba124ce1.yaml create mode 100644 nuclei-templates/cve-less/plugins/activitytime-a43196491819b1394c39bdcafa720fd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/activitytime-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/acumbamail-signup-forms-a7783b6874a69305b48413041df4fc03.yaml create mode 100644 nuclei-templates/cve-less/plugins/acurax-social-media-widget-1ccff55ca83ceb7924ebbc45fc9187e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/acurax-social-media-widget-6c3ed40b4545418647bb281d1735150e.yaml create mode 100644 nuclei-templates/cve-less/plugins/acurax-social-media-widget-e91f78a4d7f529b6160e3f85bc787127.yaml create mode 100644 nuclei-templates/cve-less/plugins/acymailing-240aa2bc102d76090c9b42a8f66071ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/acymailing-9c2165239aea161f40d7ad21814e157b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-blocking-detector-33e33b7e60f5bb1cbc3c1d66bbc57d88.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-buttons-ced2fa1255261a6b95f5e5c089baa7a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-injection-55f4a1b139d90fca33a89ff564faba6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-05c7f4b1ec789bf87edb2e9f58b5a516.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-05dc7f00a65d6d066b60c74e22d18787.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-085734e6e575cc721d044070dab37117.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-2021111b9f6ef5ab3859ee3ee5bee180.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-79f632cd97a0ebb6e16d846a092aa9f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-b3d92b780aa6d9d512b427a6e681192d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-c5d0a251b677b3b951be5050c3700b32.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-e2189a48266beb6940ada2c357f2ecea.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-e9f3d7aebb0ed7cd4a6a52dea34e70b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-fc176b7bb57291a7a6cb64680552a9c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-pro-085734e6e575cc721d044070dab37117.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-inserter-pro-408292faf542bf83787cacdb065a1b67.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-invalid-click-protector-21d21ac863b5d217214b983983ea0861.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-invalid-click-protector-5b5ec9fb47af5349a4069a8334bed873.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-invalid-click-protector-f2687a211e25f95aa3e0981921986366.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-minister-8ed4f4b4804b54524ede760d18b29fad.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-refresh-control-fd9bc570df9e6e1f10861293d27d4049.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-swapper-62dc43c109e10a4fb2083be6c80b9766.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-widget-4889575a9366ba976f9903b70e5fb359.yaml create mode 100644 nuclei-templates/cve-less/plugins/ad-widget-7559c037fdee829f7bf9775d464accd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/adamrob-parallax-scroll-0e52d08abcfaa24832dc556c46587054.yaml create mode 100644 nuclei-templates/cve-less/plugins/adapta-rgpd-a8caff9400eec85f908551f99981c4c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/adaptive-images-092d91aed0440af0f2ea67a8f6a61ea3.yaml create mode 100644 nuclei-templates/cve-less/plugins/adaptive-images-2cea449c252db115bc0ec944ee102d56.yaml create mode 100644 nuclei-templates/cve-less/plugins/adaptive-images-c12c2c5f48822779a17dfa51b8772537.yaml create mode 100644 nuclei-templates/cve-less/plugins/adblock-notify-by-bweb-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-actions-and-filters-0c9c5d7d8c587d19d97cdd4ed72a25ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-actions-and-filters-3a2ca32819bf69f7c166bffc53191044.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-actions-and-filters-7d55795955a6759ccf7bacae2a8fb7d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-actions-and-filters-d3a3435dfd803c8984d494bbdacab67a.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-any-extension-to-pages-b90fc576a88f2023fbf4be0c7e221753.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-any-extension-to-pages-f95a4bd79444a6bb4c86f62647865224.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-comments-5f015fc98ebe61708b30f8e106c0dca9.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-custom-body-class-e958f1600aa0e32635d67ccd172b77c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-customer-for-woocommerce-073e94466d93432fc20ff7757afbfb89.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-edit-delete-listing-for-member-module-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-expires-headers-a517abb9ae98faf810f5cc111ea3cf8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-expires-headers-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-facebook-0445d2e77118d710e79ad9b8b4807a1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-facebook-3329f436b3e9299453177bb21ca6d4b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-a100f718edfa547990462b4c8b9cca8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-b9bdab270fe39bf9e158152b28713054.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-d334f4c5640d489b36128befbb9349ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-from-server-373c3d1e9d0bf3f43f2574269f041f82.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-hierarchy-parent-to-post-d831e3189dd50ede75f49828d65ef488.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-instagram-446660b2783c8caadc3d9d08f86fa99d.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-link-to-facebook-3bc3a29ed4f22f4e728217981dd51f12.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-link-to-facebook-8ffb6f085ca0e1f89a621d273438f0fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-link-to-facebook-c58905f34c05ba2fa6edde7c71c05f27.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-local-avatar-fd5d00c088aafb595097efbcaff18f66.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-multiple-marker-5c12b38e55523c2abb1229db17d7b69c.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-multiple-marker-93ed6654d55bf39f7e0ea24a9224f858.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-pinterest-conversion-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-pinterest-conversion-tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-posts-to-pages-64cea71514683366dc6b4c2ffb6a6e72.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-search-to-menu-0f70db17156622f62eb6b0301d900f5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-search-to-menu-340c0c43c74f3a05736fcc7f14255c5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-search-to-menu-57689f801f3390e9106eb400e17d855b.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-search-to-menu-57c77fb954904b0b546e721dabd7febb.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-search-to-menu-ab5a0a3bb4872aa99cbafa75e82578af.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-search-to-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-search-to-menu-d407a9e1907a7ef46afd85eee39e3c29.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-search-to-menu-f9cdd85e870155975fbf07ebd6c11543.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-social-share-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-social-share-buttons-b831673e867a40d3a440f96a21bff239.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-subtitle-e650ec648b3137d2000a4e41f6b87363.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-svg-support-for-media-uploader-inventivo-71268622d169b66d5da459dba61f1b1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-tabs-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-tiktok-advertising-pixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-to-any-3ade8e2913488ed45de5178c94ddcdcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-to-any-6b33e64acf4e555f0136d2c33ebedb80.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-to-any-ae230608473cfc56a303443ba2385f1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-to-calendar-button-2e36e1fd5443dd09871a6501069bddbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-to-cart-direct-checkout-for-woocommerce-1f532de1970706b80de4de5a54d3380e.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-to-feedly-9327431607715dc8ad5049b0a62ebe4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-to-home-screen-wp-0eddba28d26b374b7f8490ca46c51c29.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-twitter-pixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-user-role-473bd673aad6ebbb1666b1cd91242034.yaml create mode 100644 nuclei-templates/cve-less/plugins/add-widgets-to-page-7c19600be6bfdb748bd3e60c37bbe32a.yaml create mode 100644 nuclei-templates/cve-less/plugins/add2fav-d039001c0af8cb5076be473a89522a72.yaml create mode 100644 nuclei-templates/cve-less/plugins/addblockblocker-1e7ddc6e347b7dc14fdbf28e9726a2fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/addendio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/addfreestats-a3cdd5fc08475bf0155bcdf233d6ccac.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-abandoned-cart-recovery-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-checkout-fields-manager-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-custom-fields-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-custom-order-number-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-custom-registration-forms-builder-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-free-gifts-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-gift-registry-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-image-watermark-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-order-approval-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-order-tracking-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-price-calculator-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-product-dynamic-pricing-and-discounts-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-product-labels-and-stickers-7f2753bfc2a0c6bb0434db7d475ab03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addify-product-stock-manager-8e787a46ad14cecfaea14ee098f61614.yaml create mode 100644 nuclei-templates/cve-less/plugins/additional-order-filters-for-woocommerce-cd60ae6d86175a2b0663a7f4bb146125.yaml create mode 100644 nuclei-templates/cve-less/plugins/additional-product-fields-for-woocommerce-f25ce468da2d85a66509b9e029e6fac8.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-0ef3f8bd25033cd91b4d106c69c8559b.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-0fb47ccc27ee413d414cd8b0ba979166.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-19c52dd7e875a0e50693de27a767788f.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-214593575ac1d3e95584c0521e8c5928.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-3546c72d408f5a6ead5d764bba6d4ef6.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-54120e3f5fb914e9169ba2eee6152b5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-5934e1315f8774ec64137d0af59055a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-68cc06979ff8bb95723bb04a557ffaae.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-8305b529a6785da6470d8457740ff920.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-9260b43e6ac9e5101461f0e5b3ca5c55.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-966b2e78a79b5d63896247b963e8d55a.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-974e69c005824474ea421d11c0a2e8fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-b1bb95f8c4ff39f12ce42050633fe6ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-c1b63cc136f48f5f3766e7772bec95ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-ce4e21b72cfe20823efba4862db87109.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-ea8fafa1914b33a7541d6d71c9272dbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-f95a6103756f27e103bcf366ca12c670.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-fbb7a174a49a3b47cc8ab51df927085f.yaml create mode 100644 nuclei-templates/cve-less/plugins/addon-library-1b768170ce1555d79635fdd71ff99339.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-beaver-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-0a02674a461ee92c9bdab38333dc64d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-3c3007d2c808c5107195ff3e0b9f940c.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-435e5a4b20bcaf9d0c9ffb3797d6604e.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-6b0cd31bdd2edf441adfecb677828dc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-7278c1d5f51388c1851434ad959c1788.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-a2edba0b6f9194a358b22756bbd79a75.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-c2bef3c139a7a3ae094de8e562cf6429.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-c4f6d0a939cffb23c47ad426a3f0d45f.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-e5a323ffcfde2fc677ad46470b3d50f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-f08da3e42125c87db99ab45bab5c3734.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-f7fd1f97dac21964944e06746d183317.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-elementor-fc5e0217c3dc9969d4594ab0394109b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-visual-composer-43cb177771740873ed7f858ac79c4db6.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-visual-composer-92680d6145a8b866d3fbe1493fdcbbd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-visual-composer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/addons-for-visual-composer-eb66f71390c85b359c35c7747a93043f.yaml create mode 100644 nuclei-templates/cve-less/plugins/address-autocomplete-using-google-place-api-60d12634c1b8de8d81af0efb8a90411b.yaml create mode 100644 nuclei-templates/cve-less/plugins/address-email-and-phone-validation-bc6751aa5110381a68bfe443bb0b5c6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/addthis-400e484570b51dd745ebe0689024ac48.yaml create mode 100644 nuclei-templates/cve-less/plugins/addthis-4df8f94a1b3a10a0e93c979447a9e37d.yaml create mode 100644 nuclei-templates/cve-less/plugins/addthis-63618d1b2772f81d989c25189b57727a.yaml create mode 100644 nuclei-templates/cve-less/plugins/addthis-f458b6b7d201e75465fa11d780919cd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/adfoxly-3bb7ea48eda3e0c286b8f4154d1c722a.yaml create mode 100644 nuclei-templates/cve-less/plugins/adfoxly-55491e6388a9facf7c82130d1d7c03fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/adfoxly-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/adif-log-search-widget-b022913a2c1b91275126aaf3b57a5b27.yaml create mode 100644 nuclei-templates/cve-less/plugins/adl-post-slider-baea03495f30d429cbcc479e7010d90b.yaml create mode 100644 nuclei-templates/cve-less/plugins/adl-team-b4bab111be528a55d6c4bef04962870e.yaml create mode 100644 nuclei-templates/cve-less/plugins/adl-team-ddd0e9486fe68ad8ba91d2369f80747b.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-and-client-message-after-order-for-woocommerce-5b3434af05805f54d95301c9d2bfe97f.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-bar-7fb9197171618e79a095c113a75de482.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-bar-dashboard-control-11e3031fc351fbc9a833e9b97e46b6a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-block-country-065bc0a5eb0849b7c6a410326eca6499.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-columns-pro-2cf825b0502a2430e12833bc820c6234.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-columns-pro-9a1ea12529e15f0a017ce8f0e47401f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-css-mu-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-custom-login-8e89a9166eb8a31b3f0788c884713593.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-custom-login-a3f7dace6308a168799f4b5efdcbf0fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-font-editor-923aa4370429c541e105a9a0e073bc36.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-form-86177d3d57734b384c40bd47dc22f497.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-form-ca4f90158895ba65bf2d705fcea04dfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-log-df593141a2030e92d8b8a063fe09a284.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-management-xtended-7c54d0c02ff88e8b029dfc7540d8d088.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-management-xtended-9639beb38d5d1c45bea1fc0af8299ea1.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-management-xtended-de7a5d3d23cd7a255b8c43340d197b1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-menu-e411bd798191f2720fc8b5639b6efe9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-menu-editor-b38b7cc5414ae950246e64e87c33ee56.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-menu-restriction-87b8cc0c2911555903ef563ff0be512f.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-notices-for-team-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-notices-for-team-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-pack-by-site-caseiro-b56b643a394756ad5a6e6d10ca73e89c.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-page-framework-49f7af60a7d6ca8e6785ad7873768f2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-page-spider-a7d2f24ba1d738c469db3701e7d249a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-renamer-extended-86ca53e4f7322bd713f7a0d173845e67.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-1b189d1d5eea3b43d17277dc35a1184f.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-1c83a92e446554fa5dca6a3142ee08a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-338378bbb7402de89fbb870142f8402e.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-6038d8499b4a66981281a09913dec32b.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-7ad427989216bf7651898fa8b21eefdc.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-site-enhancements-66e2a6cfa3da10d668341e96b2f32949.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-word-count-column-00453bee0b2389611473722a70457a0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/admin-word-count-column-d5cca6b6b2563223e79910114117f74a.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminer-3b8ab0bd7f7bcc6cdb534f9d784854fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminer-50ccd5d0a1c5b6dd13714f3e3f3f4b8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminify-01ec13470a183f703d9497a5409e83a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminify-41758ee37f85a4ada05dbd855bba9b0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminify-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminify-bc021f50f994b63de0e089ca7983044c.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminimize-98258e7e3672ebda27bdfc41933c5290.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminimize-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/administrator-z-e6db47c78eec7cdfa79fc10eb791885d.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminonline-8605679482008c33234e96d6513ed206.yaml create mode 100644 nuclei-templates/cve-less/plugins/adminpad-70956e63e550605d8f25a09facb07794.yaml create mode 100644 nuclei-templates/cve-less/plugins/adplugg-9a9ae078aa8492b142c833f71cc23292.yaml create mode 100644 nuclei-templates/cve-less/plugins/adrotate-1978bcad197f3b110297309bda97f32a.yaml create mode 100644 nuclei-templates/cve-less/plugins/adrotate-1f31d20eb76428666b511698c9ea1c7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/adrotate-404d802e6aee5b15a871049b9ffff69a.yaml create mode 100644 nuclei-templates/cve-less/plugins/adrotate-a74fb6f00e03de1d4dc066ebae34f69d.yaml create mode 100644 nuclei-templates/cve-less/plugins/adrotate-b24e50f88d059b7df802d8ab2740b6f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/adrotate-d07cf22ef8f576e671dbb7b3eafdf13a.yaml create mode 100644 nuclei-templates/cve-less/plugins/adrotate-d9b7905c602159e1d431254ae8993ca0.yaml create mode 100644 nuclei-templates/cve-less/plugins/adrotate-f5d87ece59db37936b3fb9bdb05376cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ads-box-6a26301f5fd7c4d97e54e67c3224031f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ads-by-datafeedrcom-b6c1a6adb8481fecb3d92549d2f5a5bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ads-by-datafeedrcom-f9c63ff99c5edff8a5bfda2b8b7db0d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ads-for-wp-32ccd5e0c657d764432d8a2599e1ffbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ads-for-wp-97317cfba5a4e1ac31624c57d27d0191.yaml create mode 100644 nuclei-templates/cve-less/plugins/ads-invalid-click-protection-d53d7fc7db0d940484e982ea2d1a452b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ads-txt-admin-2edbd29eb6775e076f4926bb495fbd5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ads-txt-manager-bc55ea7b509124d1a77831d4400c5030.yaml create mode 100644 nuclei-templates/cve-less/plugins/adsanity-76eba8cd8a4e862710149dc77a310969.yaml create mode 100644 nuclei-templates/cve-less/plugins/adsense-click-fraud-monitoring-a06b9dcd1c61939b7e3171c0fcf7e2b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/adsense-deluxe-e6b40723167a263b6dd92aa26e882342.yaml create mode 100644 nuclei-templates/cve-less/plugins/adsense-plugin-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml create mode 100644 nuclei-templates/cve-less/plugins/adsense-plugin-b0dd2a8da30a77a184664b44d16f014b.yaml create mode 100644 nuclei-templates/cve-less/plugins/adsensei-b30-3fb8a6560a10a77149304b3038078ed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/adserve-0be4b8a6e8c5523e50c4255a6c88e58b.yaml create mode 100644 nuclei-templates/cve-less/plugins/adsplacer-26120d11811fdddc12c0808afc461d28.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-menu-manager-024bbec9ead04ec628d8ff702c3aabae.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-menu-manager-0f106f68230dd3847df5cac404354f2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-menu-manager-b07982a67f16a7148433f4d658429720.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-menu-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-menu-manager-c848309da304f217f6ed4776631e8c6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-search-223f6e5ecb381f112c575b56d5d37f09.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-search-65722f234323ee23193cc280e3922176.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-search-e5f9122605f16ebf468dfc1c8cf77f37.yaml create mode 100644 nuclei-templates/cve-less/plugins/advance-wc-analytics-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-0254425f076f9a4e04894c3c01bc9caf.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-1591ae4acd002a80b846e658ca20b8b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-1c25b9d9b10bd77a049e735bb0a8965a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-1cbbbacebab6eafbabdd1ea3e6ed8c33.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-2239ca03e49ffeb792ff8f7c625fd4da.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-22c3c4fbb2c94545987b2da04e166d40.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-304412fedec296474e9a664baa039b40.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-3b7a2e7b6f89f58e23d11ffebc1efd41.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-7d84c9a9ee6bf717c602d3a38e459b86.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-86962de7248a9bc1e25d4d3ee2951f2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-access-manager-aa18fa16264ca0049a45d96495a5cf8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-admin-search-b5af9134a0dd9c46b02e9a0fe6e4c234.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-ads-0ce7e54d96c7e37996c0287c3e487a8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-ads-1cb900b8a90233cac04a7870b7e3d8b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-ads-83e91dab60d5a445ab0bd5d25903d462.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-ads-e81a4620e336feb8f24131c8ad7dbdcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-ajax-page-loader-e6b2b9642eaa28f30036533185d6907f.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-booking-calendar-02c5d62eb1659f29fbc55dae8e4463de.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-booking-calendar-26d3ea26eccb41307c119c75a4db08cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-booking-calendar-66bcdef39a721f6e9228bf986823abfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-booking-calendar-88053ac7586fc02cd2a372b5e620460b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-booking-calendar-a9aa77a954191266292b06f87ea42806.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-booking-calendar-d4656841565576de3042f9c9b59d5ada.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-booking-calendar-e81bb0ad426b5246d688d9a7f2eaddcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-booking-calendar-ee1cda86ab18e381ca4e90653a705f3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-category-template-850462c19f63654938faf5f00514f8c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-category-template-eaf398ea01fd7dda89f0e980c07588c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-cf7-db-09b9a87909e1abd2b1771c596b468a9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-cf7-db-0ac820af26b82917a9384c67560e13a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-cf7-db-4039c397e350c84a436243d9a4f3eab1.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-cf7-db-cf64bc2fcdc70126dfb7b9884847888f.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-7909b368603f8e81e96e69064ab1be28.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-coupons-for-woocommerce-free-bf87097eab97d5618311a5d6293581ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-cron-manager-330ef9633d0984d1501cc01b4833593f.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-cron-manager-9b156b803761678f004bbe691278814c.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-cron-manager-pro-9b156b803761678f004bbe691278814c.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-currency-switcher-22846449cdda1461ad8961f070d0c8f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-27283408ce212ababfa6ab6738bcc33b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-3a746fc902e2b6559213043452550064.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-5ab0380f0225cb3f813fd2faf9e0804b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-62768c2e4740e3e20150e0c67af690b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-728081d1e4f34c41ac0cf5df180e962c.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-72b80dd4bc94210ab9dd3b1876e438ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-73ae88fd78bf0becac09b57aa5f8c767.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-74d01cddad4cc8a47fb2dbd74bd23ca7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-a5138dbd3ab5f7be9499c9facaa915f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-a56a7a539382d6f88ae2afe6cc65c72c.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-d907690c5c767a972864a779d8ced723.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-db2d8a1251fb5f78024e34146e92e4d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-ebdf981fa373e4823561a65bb577a1a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-195a4f0d8d0765a9379e79abc595005a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-3a746fc902e2b6559213043452550064.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-877a1559edb434fbb6761e8bcd1aaf40.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-a5138dbd3ab5f7be9499c9facaa915f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-d907690c5c767a972864a779d8ced723.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-db2d8a1251fb5f78024e34146e92e4d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-ebdf981fa373e4823561a65bb577a1a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-custom-fields-table-field-f0cdadcff316feb53fd77aca416bb2f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-database-cleaner-317c2d6753e5308f0908f9dfb1cd475a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-database-cleaner-655a7a3d142e2b2810e2cbdce0fda49a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-database-cleaner-662b0d4e06b53c4127af628452071119.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-database-cleaner-672e25f5e31f63e7bd1671bc45955d6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-database-cleaner-6bf8881666d7b800c84c385bcfdc33c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-database-cleaner-f22c4e2a2ebc3ea71e41c368cf894811.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-database-replacer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dewplayer-9d0309e800290fb37ba28ab13061e40e.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dewplayer-e75a2e4fcc95441946c7906f7e8c8fdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-13af69fc3b4639d4eee1c5f8765f3113.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-221eba2ef4992774b45479de6031a5d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-2b7649bf0d1b33f22a628883cdb8312a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-37fc83c506180cf381ac5dfbd233eafb.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-69850835aba43cc07b9062e15e01dfd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-739c3b6a5da1b82e1034ec2752c5a42f.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-9036eb8b1e0f76afba77e37799b01f92.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-aa979abd3b3cb9b7bb1cd2ef795b502b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-bb5f8ff13ce89043a17957f4917820c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-bcf8e746293c2a8c7e07a4dcb5e63f07.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-fc8048569d06ebc90ac21a7212b76518.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-facebook-twitter-widget-04f6cc7c3ad39880573726a5f936d0a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-flamingo-608028938d46bc393127dab9f8a1b9fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-floating-content-lite-18a7728320d1ae3570e8bc349a822d19.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-floating-content-lite-f9f9f8843b8a77c541ca723acfae2e44.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-form-integration-78c3981cb87a9d312796397fd5fb8a1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-form-integration-796ca63acc83e02954fe943ab729646a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-form-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-form-integration-cc61e989c9930149472e4334372ea609.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-forms-019da25ecceb2c42293b8bf9c83a7180.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-forms-8f7e0f2cdbd50435173e1262f75f15c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-free-flat-shipping-woocommerce-7e6cf0a72223b6dafdbb68257635237d.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-iframe-4d70d402016d1f4b86f60918b22119da.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-iframe-5ef4900200b4415e3b14a42418354f64.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-iframe-750d46ec675a067e58f6ca5aa716c8bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-iframe-7af7b97a823a315642996f534f0bd2be.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-iframe-8cb4e5d28c572c7b2415f308b23aba3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-image-sitemap-d3419d10a1c15957810bab79025cae18.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-import-21d84dd234ad676a469c1b281a9da497.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-4a9af0a7a0f9267c64d43cbcc0f6e60e.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-53dce218cb6cdf713c943d61cbe1c885.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-58a489f667854b233fd61745ace5a1a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-bf4905bcfa1e978b4bbdcf9e3f9b15d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-eb7c2afb91d54b1e8be36c66e317f588.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-menu-widget-95d0775d6527d5eae5d7126ad333b363.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-most-recent-posts-mod-b02147be7bebef844df5583704a48a3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-nocaptcha-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-nocaptcha-recaptcha-cbb68fdfa6e0c8d1d1dcc60eddde34f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-page-visit-counter-51ed12a9f2c55cf6d27dee66a25ab3d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-page-visit-counter-6868a3f667554717afcb5780d663774e.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-page-visit-counter-6b14dff49fec7b24e0d17d0c9fb34f3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-page-visit-counter-9c6b12242aa8d580a35fa22bad685fff.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-page-visit-counter-a606eb221eb05ffe5dadb8dd25fec864.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-page-visit-counter-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-page-visit-counter-fb290f4001663ab9b3572ec6c32d0eb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-popups-b8a8e0d0fe8b5ab801f2a60f0e606d3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-post-block-504571f3f4f99ae23a7efdf0aa6a64d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-post-list-dd776d5a9d71139420b6706ccdb1e25f.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-post-manager-0a56d3b69d6caf51fb2e7fd016d073ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-product-labels-for-woocommerce-949ecf55eab79c7524cfdba1c2344ca4.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-product-labels-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-quiz-1044e73f9f4c90a4318631b027811f47.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-quiz-84ca5039f02eeb82650dbead88aee202.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-recent-posts-aedd5bdd6732fba44f64193c96bef864.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-schedule-posts-afd12d5545489eccaee099aa3bb1c0d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-sermons-564170441cb69873b0d861ef3dcdaa9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-sermons-88167a3eb5eaecbe4676b38334e8f643.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-testimonial-carousel-for-elementor-afe32fcbbc30cab4f3e35a08cf6d7b9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-text-widget-0bc66019a5442f087e2da571324acbb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-text-widget-eec11cac81b9e7efcb35b893f28148cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-text-widget-f8ef60664eb207643cf086f83584b3db.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-uploader-501a1f4c716dcfc5dbf27f3bb41b2666.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-woo-search-5b7332c185aca9ac9b78f6d0d022fb37.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-woo-search-8206819943af063a893fdd6fd4e9d3b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-woo-search-8e1ec5e631a2487f0c22f50d8172463a.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-woo-search-bafdacae26c88640cb6e30b25ba66a73.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-wp-columns-46e70ce2d5b65ea57e5b89cf696f0367.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-wp-reset-2bd2ae0db95f304cf533ef5905d6a487.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-xml-reader-7e2d3043b2f8338719c38cc2aa7f1e6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-xml-reader-9c4b4d0de92603aa8d882131c97bd1c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-youtube-channel-pagination-843692451d0aaf769ef716bbf02853d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/advanced-youtube-channel-pagination-f6df4debeaba888aeb7941d246864164.yaml create mode 100644 nuclei-templates/cve-less/plugins/aesop-story-engine-d882520450a9e95c908e1ad71ca03592.yaml create mode 100644 nuclei-templates/cve-less/plugins/af-companion-2a375b974a759f200b634b44a398013f.yaml create mode 100644 nuclei-templates/cve-less/plugins/affieasy-c0f8f6f17ac93058fc835ead77535268.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-ads-builder-for-clickbank-products-9960c486a0af8a01fba712be84f42610.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-for-woocommerce-5e2a21e34446161fac44e66bf2f9139e.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-for-woocommerce-6dc63a693616ad13933a53bb0a4503d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-links-a7668a1f316cb3a4a10463e8f1f4e787.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-power-49603be4fe7e1b0e01494ff562e4811f.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-pro-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-solution-5b09bbfafab13caa853913e46666c79b.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-4e7b022945e1e84a41ab0b83bedcfe7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-66e9bc6784c94720522599f8e4bbc15e.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-67b32c2b2aa638ff335d272cd6273e53.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-6af7c3d9958b5f30ac2537a2fdf59735.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-b20121a47df1b1b276886f5bf24ee99b.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-c364b3be5ae879c7f6b82ff2d4ab8d09.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-fb9e76e2a53a99a1061be745850fe380.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliatebooster-blocks-29fccdeb7b52e0d6f66d4f325a03df63.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-0664d46ebb4d5beec24f857df0859063.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-0b8752438dda7aa69e32a586e9110978.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-32ee9eb90ef2a155ebbafe7c599b04ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-33941d22287915d817c6ffb3567c4ed8.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-5c818a45f2a9dcd466f195a8752dd840.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-6e35e7842129d49b737d83e066ce8d1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-9029119eb68fd27e882d54dbd4a742cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-a17b58f6876bd5740a12242958831995.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-c3402d8baeb272f8f57711f60b17c812.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-d32b9642e142675d1efb9d9aa59869ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-e1c03f1ab3bdbb028e55c2429bbfb1ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliates-manager-faf4e22f4322606f876df1073bff3e6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliatewp-3205ac6df5d6745a5d1c210179723168.yaml create mode 100644 nuclei-templates/cve-less/plugins/affiliatewp-9d0741a170ac5d20bebb10f83abadeaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/afterpay-gateway-for-woocommerce-33feebd0ce1f9bfb560414c22acd0fc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/afterpay-gateway-for-woocommerce-936cb1425d1afce350e246d7f6629f3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ag-custom-admin-0fe1889336697580123eb1971e124832.yaml create mode 100644 nuclei-templates/cve-less/plugins/ag-custom-admin-866cca38d2ecb21a9fd2aaaa55245cfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ag-custom-admin-958209cd1cdd4ea5cb260b87d6b618da.yaml create mode 100644 nuclei-templates/cve-less/plugins/ag-custom-admin-b0c570c63a16100d4cac08a03560c9a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ag-custom-admin-c65dc1c886e5406e004d2361f156725f.yaml create mode 100644 nuclei-templates/cve-less/plugins/age-gate-6748230cb5270a84b852b5bff3631f4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/age-gate-97022dfbeffcbfe3aa12e117163569a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/age-gate-fd92bd6a6db4c23807c2430ed1f93f72.yaml create mode 100644 nuclei-templates/cve-less/plugins/age-verification-a5b4dc34f38723a5d47abbf10322cc89.yaml create mode 100644 nuclei-templates/cve-less/plugins/age-verification-screen-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/age-verify-ad680440946c8285b654e4b8c5916390.yaml create mode 100644 nuclei-templates/cve-less/plugins/agenteasy-properties-246a1b75793883d17dc885e0bfc6e4bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/agile-store-locator-589dfcdba354fa240bd819df50a6a8aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/agile-store-locator-944ac31152268777f0456da5b0f72ab2.yaml create mode 100644 nuclei-templates/cve-less/plugins/agile-store-locator-9a7bc6474013942cb9ad4b06ba961bd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/agile-store-locator-9bc085475e51bc522ac86c43319af153.yaml create mode 100644 nuclei-templates/cve-less/plugins/agile-store-locator-dff478252e53a4d48eba850e27632073.yaml create mode 100644 nuclei-templates/cve-less/plugins/agp-font-awesome-collection-6c437d39b10b5c27652f2e2c65e1a8bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/agp-font-awesome-collection-dbfd1d48ef4c46203463363bfd6d7743.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-assistant-by-10web-3a0831746763e4cc6e13a3b507a11959.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-contact-us-4cb7b1b325a065f19e4694c97bc6e095.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-content-writing-assistant-36f9c2eff3f6b6336f95cca8929b8fac.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-engine-3184746777b9e1e2355cf98fc7ddb576.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-engine-780696e15f2e9c20283c58547979c77d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-engine-be2a7ea44bcbe05b9601da197fe2fcd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-engine-e074a411b9f033a38afc60d73e72553d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-engine-f6ef0668f114bdc3d35c493842c984d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-post-generator-9eed014edec42d5cd4860053e291ce89.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-twitter-feeds-bec7b3aa816a59f17fd4e32834f42e90.yaml create mode 100644 nuclei-templates/cve-less/plugins/ai-wp-writer-77df5424b8737ee4b8f9f9f20e1fee34.yaml create mode 100644 nuclei-templates/cve-less/plugins/aikit-wordpress-ai-writing-assistant-using-gpt3-9466631ad739782449cdf9fdc36419ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/aio-time-clock-lite-395ce3ec44ad4bf8f5ea06caea1ca7c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/airpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ait-csv-import-export-11ae27bab87a7fcaf72c7e008d486310.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-archive-calendar-2689d661f3ccd51f254bc58895e1f11d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-bootmodal-login-f3c89d2a491437ada76310350bb04447.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-domain-checker-61e6a79f794c5261dca1b1de62bb1bb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-filter-posts-81e36fcfaba8f47f8b0cb1d0a7f67af8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-filter-posts-de3ad2c14ae092820725df486681b852.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-0d10f95dc02c34323ca2661d596c206b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-1e202ba9a2d031ffbc5309780a3c635a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-28696fa61d6f901911f226ee59d9bc21.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-492664286a6eb9d8fced88f47715604a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-4f9a7c8d29cfd4a2c0b16e09a2e378ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-581efb108579060acb9ef33538e40085.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-638d34b4766f8e2a63bed27bf53ab9d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-8d9637ff6f7495cd146495e0fed931b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-anything-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-anything-d42480a2d6aa4bbbab085fa708ce9549.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-d42fbc843251d5f50991be5b8b42b3d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-dd9fbf3b8166974e70c88fa52bb178a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-load-more-ed883dae9c66c1836affaf918e96286d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-login-and-registration-modal-popup-d5f5796dec9da2bb7306be7b46162089.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-pagination-2a977820226e88678497823102fe2796.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-random-post-f5f9272c971083b586bc76b67b0f159d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-random-posts-84109abe067d4816d7c462f3484f1a25.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-6a2b5867f4b2cb8b9df53b8ba2dbfdc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-d03e7c1b36748ce86c160cf6fe252332.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-lite-150da04fe1b2c2f3039470b8ad6b53ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-lite-83c0864a3df9b4d7703e76d7c2b55658.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-lite-a9cc73f9037d9cdf674a96fc1a0c0e0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-lite-d1c4ab98e28efbbf6dc7bca15dda3762.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-lite-ee8c565da649725aad8c04a309fabb54.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-pro-50dadf64810a03dde8b1e065c3742494.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-pro-a0309fc6dada5d85650b4762bb282066.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-pro-a896492161d6d4522e22315d9827d81b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-search-pro-e17e90463e6889aa07cbb8b7927771be.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-store-locator-08f39736bf86d4909fd35daa9e56d865.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-store-locator-13897edd701bcc92c64dc07394d89d44.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax-thumbnail-rebuild-4fe952dc4f33b2225826338b2a3f9203.yaml create mode 100644 nuclei-templates/cve-less/plugins/ajax_multi_upload-4a0db472e405a72a7a0d1d796c76bfbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/akismet-0b8de7e6634f1364f8cfc6fe68a06736.yaml create mode 100644 nuclei-templates/cve-less/plugins/akismet-cff9e4a18682397642168ab27f023202.yaml create mode 100644 nuclei-templates/cve-less/plugins/akismet-privacy-policies-7d62761bf9e985cd9ec96ef45ca051b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/albo-pretorio-on-line-1a93903cd8703be96d5ab3384ff96410.yaml create mode 100644 nuclei-templates/cve-less/plugins/albo-pretorio-on-line-5dcbe902f6c095827d48543a0e5195b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/albo-pretorio-on-line-6838ce604685d145899a0da7953c236d.yaml create mode 100644 nuclei-templates/cve-less/plugins/albo-pretorio-on-line-79d3f2b9565b075a8be7591881880990.yaml create mode 100644 nuclei-templates/cve-less/plugins/albo-pretorio-on-line-c50e397cbcec3a24df13ba5f0440e5c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/albo-pretorio-on-line-dce5f7b0fd01a31b21d6138c4476ff92.yaml create mode 100644 nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-20745ffeb0a850e3593a6c35ba6844e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-3d269a7750029141d9d3783312ca3377.yaml create mode 100644 nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/alert-before-your-post-47f5d0213d6a55b30c759752f9fa351e.yaml create mode 100644 nuclei-templates/cve-less/plugins/alfred-click-collect-58928e38edbab233a84020a472a44caa.yaml create mode 100644 nuclei-templates/cve-less/plugins/alipay-32ce162d5a195b7dc3b119d3f49907dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/alipay-e94f4c2cbdc244ce8cd5d182c9382536.yaml create mode 100644 nuclei-templates/cve-less/plugins/alkubot-515bfb8e519273db685ebdf46ba27554.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-404-pages-redirect-to-homepage-bef2b57812116d5514b05222293f3067.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-404-redirect-to-homepage-4c92870ff7a0f182a44699dda7bffd35.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-404-redirect-to-homepage-7172bda31ad3e76ec8fc3741d1b4007c.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-bootstrap-blocks-9c898a5aa67433abd50514e4cc3473b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-contact-form-integration-for-elementor-561149d23bc984dc77ee30065a13dd2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-contact-form-integration-for-elementor-9aa94eb00cf28342fe9feedacb199d11.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-custom-fields-groups-a9400ef3239db6bee40d5b6dffb3e748.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-b2b-for-woocommerce-c0d39693f384de620acf92b953f594c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-b2b-for-woocommerce-f5e8e2f7e4d09169e169fd3e043e479c.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-event-calendar-4cc48166ebcc92ad5083e1d92ba64cf5.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-event-calendar-9e62074ce42abae7e7fbef8d4e799261.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-event-calendar-a2ffb630ad37eb7dbee79aab63fdf2fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-event-calendar-d860722788c4c74050a19c2504b094da.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-facebook-like-widget-ab9e9f1fd2829128e3bb4bce435b5cf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-favicon-1d838507fd655633d89fdd3f677085f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-favicon-adf6fd1cec72a101892ceb2db93bece6.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-invite-codes-154de88e6cddd165b6ff204a5922a0ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-invite-codes-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-invite-codes-bbd2aa17be72216554254e2d8e755d19.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-redirection-3222e9d54de5c7b5bf110a40b9d38190.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-redirection-c5b1505c51ef599dd7a272165d502dfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-schemaorg-rich-snippets-2c9c135fa647599d064a59e1f5f46c79.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-schemaorg-rich-snippets-4e93731af3497ed66d721b94ba1ecb7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-1d7ad2d4f9699d8aaf4ebf33922949a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-332ad697947dfbdebeb9b4731490be30.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-3e5491f9c256bb6627d2d89120b86cd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-52b9b171189fecca507b9059a4e2fc92.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-56c4db12334add5dab088d2ed97db3d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-6810465a01d1f9a2f5b95f9fe91e406a.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-6b8b57f1101c92df559274dfef436538.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-814d85e88dab797899057f8e016cf74f.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-996209252b43de8bc510aae02fc9d00b.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-9c814d5a9ddaae393720aa3fbf301f85.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-9cda1ab1353fbdf5592281281da13bfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-a64ce08453bed39084d8a2cea93a9117.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-bc257f9f7078df85b51c2e5181af811d.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-c08b2158511f440bda6243887c732dc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-d92c57db44864e6e406520d1e97fd01f.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-d9419931966f7a4ced3c49a3cc9a6932.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-f0ea860f14b0b0ca566ac38e74715e9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-f74b8b0e3c6cf42f9c7d68f58857b310.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-seo-pack-pro-ed79806268ad8e12ebf6df82f872530a.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-social-lite-05ed6188e517a3d4fdb915f7f3265319.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-video-gallery-411b1116f71957083ea7a80c47e56945.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-video-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-video-gallery-bcb990d5b998ea9f0d9516d80108b489.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-video-gallery-cae2253667a3a6e475a01cd76266d7d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-video-gallery-d6f77b9c72ad2f48ab3f2230e6326337.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-webmaster-7851eebfd119dbcb64d57949b00c8e79.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-4e8189c76d0d644714db52904b337d1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-7757d5b35907f5f49944633dfa8351f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-7dd77db31c1f92ec3dedef1e96c01885.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-8f4400345c9597af11e729ad184f888d.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-b0e3894c13ad13c0cec750095d3f0495.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-b422384e41850357dd97dbccb4c496f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-baaba4f56b4f175e80057b4999371a96.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-box-extension-9c485cf198874e1abdd12011232fd4df.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-dropbox-extension-9c485cf198874e1abdd12011232fd4df.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-f07ffeeb51734bb9713522e8c30b9042.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-gdrive-extension-9c485cf198874e1abdd12011232fd4df.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-migration-onedrive-extension-9c485cf198874e1abdd12011232fd4df.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-034278da31b37bb4154e8c34cebfdbb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-1b948ed195be07fe30ccbe1a13374b86.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-1ff113267284bee6f1d42d303e8be7d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-261df4cac42862f9e31db7a040ca080c.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-44ac07d5baafaaec1fde2cca5e220010.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-5ac539645eb63c949c47fcaeea5bb661.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-5d289d7e578bce569fb34678a49e0c92.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-63844d0bc7bddede485d089be95f74bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7195efc84ea5b8977b30b3313bab7ab8.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7567c31561b747bfa0cbc91d7005334d.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-797698582c82d4b61a2a10f67de975cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7e555f0e951cd13fa43e01d838261f04.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-873b15a500e300080bf17fdd62b04ccc.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-8a165e6adde141141ce45b5b63a01ed2.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-8a8f73a13c6d3fc3aaf61bd1592c30a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-a314db2bc927095a45456b220d0f28ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-bb860d80b94ca7ade5a2893713f833b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-c313a41c23d690edbe2cdbf35c825a0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-c43c8e4dbb43df481e0c6cf7578539a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-cc351f4beec6cba9fc81f542a275a440.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-cf8c3aa457289ad6466208862da0c244.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-d66601db34445c53f772431589140096.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-d6e02747846dc962e1ab5d119bbf94ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-df24bb44c8ea32f14d2d1f45017493e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-e1b9583cb78e016115d982acbd157618.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-ff26968664379c67bbd03960f230d505.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-users-messenger-64408a501c37fbcf42b9db6bc5338336.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-video-gallery-bc135ea3b74553b0fd14eafbe49bca73.yaml create mode 100644 nuclei-templates/cve-less/plugins/all-video-gallery-e6b6d80807708af0a37d88bb4f8862c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/all_in_one_carousel-a4f443048ee610edd9a8b4b6992abbfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/alley-business-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/allow-php-in-posts-and-pages-ab57e6fe4cbafa10ab5f9c2c276102ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/allow-svg-3108293e567a66e53a5d8bbabea561b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-31dc7219db80b05f4214d90d08edeba8.yaml create mode 100644 nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-3da0a6229596dce00028400fe8617c2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-a8f44d7ac88d056c42286ff4fcb52be6.yaml create mode 100644 nuclei-templates/cve-less/plugins/alma-gateway-for-woocommerce-046fbaec2a225aa81dc9d68e003387fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/alo-easymail-794ee578d2fea0d37b812494538880ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/alo-easymail-a800af3f915adeb03a4c49e2c0c22f5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/alo-easymail-cc81d0e6c8cdea1ef8a5bdab3d5fd485.yaml create mode 100644 nuclei-templates/cve-less/plugins/alojapro-widget-7358f712002614260dfd68c7ec8f6f4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/alphabetic-pagination-090eaec5db6a3b5e9520804055acdec3.yaml create mode 100644 nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-23db8271ff8255b01a17c8a3f5ed7743.yaml create mode 100644 nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-87c10838d1b8a43254afbf05b7f964c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-b1149dab4397624c406a542663f9d6f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/alpine-photo-tile-for-pinterest-56be40d6cceb101df1647cdc9530b1ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/alt-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/alt-manager-d805d4a834d45dbc023ff957c63ddbf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/alter-c55830103f810a3363d3fb305910a1b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/altos-connect-62fcd76831b1e2041b5f8a95a5780c32.yaml create mode 100644 nuclei-templates/cve-less/plugins/alttext-ai-39af102f2f1fef516b0141731bd29ae6.yaml create mode 100644 nuclei-templates/cve-less/plugins/am-hili-affiliate-manager-for-publishers-d9ed7ea48d292aeb09b5a69dca626c8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazon-affiliate-link-localizer-aff79341750b1cf6ce299e2e5a87675c.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazon-auto-links-2e0473e7d7a7731e63b2d6908a232799.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazon-auto-links-511039b32ead609323c267e9b1ba2e48.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazon-auto-links-9d2a99598a00b93d061f40c1f9bcc177.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazon-einzeltitellinks-179da13f00bd0c1a7dc169b4d93d8c60.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazon-link-e8c6c87a94f00d5eab313cc9a401818b.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazon-product-in-a-post-plugin-604db2886f0075f3ac3cb7f4356d58ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazon-s3-and-cloudfront-13e3b44160360e3746c78b8d29452ac0.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazonify-0b5a4c4a0addd6f794e40840ce70fde3.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazonify-ac651fc6ec7fb9810b883366b31dc14b.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazonjs-b196a1a5480d68e35f21f441524da412.yaml create mode 100644 nuclei-templates/cve-less/plugins/amazonsimpleadmin-20e17109f21cb297758d197e8d1110d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/amcharts-charts-and-maps-f4919b10c6f7c2a14e1c7d5b8a3f99cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-1dec4b557f1e0bf62d3ecb5bf357937d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-1e74f382f78739ad9a39f07eff336537.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-21e094c4609ed338d0c6ca8ad2e72ecf.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-2578d12fdea00971e02ae66b1e0d46ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-2bddc689f5d338bc55ee33baa5dff25d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-54e594fa48b562cc05ac1592828d94dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-7aade2b2966b32522e64422bd2ebd245.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-9f5c66adfa528be5333386be21bb61b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-b59499e53223c5a8b455880f0f73a4d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-bb8040f6049d728dd727ac789ea87332.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-d7b2973ce1bce5f224e9a3aa96df9db7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-e3aba66b1c44c2a68545f2079a474dc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ameliabooking-fe66c51cf4d5dab04c1eb481e6c9c787.yaml create mode 100644 nuclei-templates/cve-less/plugins/amerisale-re-041f22e2f532a722c98f76a160bb194f.yaml create mode 100644 nuclei-templates/cve-less/plugins/amerisale-re-e0853825d6dfb06bad466ce63aac12b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/amministrazione-aperta-f5cc690dc04197cd95b8aba840195297.yaml create mode 100644 nuclei-templates/cve-less/plugins/amministrazione-trasparente-810fcfbd5671347d9b568db97f356d26.yaml create mode 100644 nuclei-templates/cve-less/plugins/amministrazione-trasparente-cd1cf1735f71561e3ab5315052ee03d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/amp-extensions-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/amp-plus-d58e16875ccf06b26ad1bd06e93be82c.yaml create mode 100644 nuclei-templates/cve-less/plugins/amp-toolbox-5f6a8d3b6e89855777270ac51874a97a.yaml create mode 100644 nuclei-templates/cve-less/plugins/amp-toolbox-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/amp-wp-b9058f95d651f92a27bde9c074bdcdbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/ampedsense-adsense-split-tester-d3d77cd29222cddd45d79ddfc8341b95.yaml create mode 100644 nuclei-templates/cve-less/plugins/amr-ical-events-list-65248f15aa94ab7dabcc81cdc7d86180.yaml create mode 100644 nuclei-templates/cve-less/plugins/amr-shortcode-any-widget-957e4d84091168909dcf10979c3f829e.yaml create mode 100644 nuclei-templates/cve-less/plugins/amr-users-3b7bdb3a8404e199e1deb34a5f3502a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/amr-users-5ff51e8e3d70f359c04a37d7bd2f99bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/amty-thumb-recent-post-95db80ffd1d934591e0e0a483a99236e.yaml create mode 100644 nuclei-templates/cve-less/plugins/amtythumb-96de88df50c13b090e6e70188ce8bb28.yaml create mode 100644 nuclei-templates/cve-less/plugins/an-gradebook-054cd3c24ebffa75be93ee2056e1824c.yaml create mode 100644 nuclei-templates/cve-less/plugins/an-gradebook-9da08dd717e53fc804ec0889b3c45692.yaml create mode 100644 nuclei-templates/cve-less/plugins/anac-xml-viewer-16ea15328c267590894ffee4442a84eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/analogwp-templates-28932f902044dea62ee1c6a2f1f7a4c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/analytics-cat-7d46d3a81ec6bb63cad62cde0afab07a.yaml create mode 100644 nuclei-templates/cve-less/plugins/analytics-cat-e08a52f680b625be47e9beebec7b3154.yaml create mode 100644 nuclei-templates/cve-less/plugins/analytics-counter-1896039bad385dbb49f9bb374ae0e749.yaml create mode 100644 nuclei-templates/cve-less/plugins/analytics-for-wp-5b728c0f0ab67d66edeb4ee534a33e19.yaml create mode 100644 nuclei-templates/cve-less/plugins/analytics-insights-13226ec92f273d612bf06ab3bca22c10.yaml create mode 100644 nuclei-templates/cve-less/plugins/analytics-tracker-8f9bc8ffd93a472c3d732de50d85129c.yaml create mode 100644 nuclei-templates/cve-less/plugins/anchor-episodes-index-843f515046670d7a382e75e7e4f584c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/anfrageformular-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/angwp-389af4405b0ad50159ccf3ce376f93d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/angwp-4ca7a80c9a74f97dd3daf1874e8c0993.yaml create mode 100644 nuclei-templates/cve-less/plugins/animal-captcha-94cc1c5140ee3a2bfeb91a422867b0fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/animate-everything-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/animate-everything-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/animate-it-5cb88706cc3e4d4bdffd38343a9f038a.yaml create mode 100644 nuclei-templates/cve-less/plugins/animate-it-61c977fb1adb33ac70d098207834a351.yaml create mode 100644 nuclei-templates/cve-less/plugins/animate-it-6786cc650f667a015a2cad75459e0a89.yaml create mode 100644 nuclei-templates/cve-less/plugins/animate-it-9d4c7c94456d7936525f7973a9574896.yaml create mode 100644 nuclei-templates/cve-less/plugins/animated-counters-4187eb8bb2c5fe78d6c93246f1bd60b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/animated-fullscreen-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/animated-headline-b8a793584d2186fb4e0aa8046771e551.yaml create mode 100644 nuclei-templates/cve-less/plugins/animated-number-counters-cf48a696f82d0831c89a84db8271161e.yaml create mode 100644 nuclei-templates/cve-less/plugins/animated-typing-effect-8a6899bd3b3c6951efcee5344ca06fff.yaml create mode 100644 nuclei-templates/cve-less/plugins/annasta-woocommerce-product-filters-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/annonces-0f95c70ffc4866d8a15e485bb0d699dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/announce-from-the-dashboard-05ea715911776cce9345bba9207f2978.yaml create mode 100644 nuclei-templates/cve-less/plugins/announce-from-the-dashboard-4e902ac20277ef72a0ba4b9fef3685d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/announcekit-59df5359f3dd97e1bd86b18fcb289b4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/announcer-e3632f2772b0c1ed9b46e568946ebc5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/anonymous-restricted-content-e64c3828b87ac23a870624916c783fb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-36cd8a02716876f0db4708fd488996f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-8094d83bdd6a783dc479a31b16dcc2d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-a0dc813b81ea3eaaf35abcdfd0e51d08.yaml create mode 100644 nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-c3d1c94528da88057c08634021981f55.yaml create mode 100644 nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-c888a527d839638dab34ddfabb9982e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-d4f178ca51b9a3854e944ff01429b4d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-f8694c41fb21641e443ef7de9264487a.yaml create mode 100644 nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/answer-my-question-0c71e628227c3366ba2ba3d967bd6786.yaml create mode 100644 nuclei-templates/cve-less/plugins/answer-my-question-0e6f7731fa395b27ed01a77e157db879.yaml create mode 100644 nuclei-templates/cve-less/plugins/anthologize-ba0f1a7c1e75b12eba4e62626fd27944.yaml create mode 100644 nuclei-templates/cve-less/plugins/anti-plagiarism-77af612ec3dcbb3822b11616df7c8557.yaml create mode 100644 nuclei-templates/cve-less/plugins/anti-spam-41cd3278684cd2fa92e7808b44952638.yaml create mode 100644 nuclei-templates/cve-less/plugins/anti-spam-6dd6322d887c160ebd9dfa555a077a3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/antihacker-1198314be1810779166a4e03d8729a10.yaml create mode 100644 nuclei-templates/cve-less/plugins/antihacker-52d5b418dd2173338819829d8805e340.yaml create mode 100644 nuclei-templates/cve-less/plugins/antihacker-6e0c5ff8c6831d302f08813c9570b138.yaml create mode 100644 nuclei-templates/cve-less/plugins/antihacker-ee14c893825237703550266d1fea00de.yaml create mode 100644 nuclei-templates/cve-less/plugins/antispam-bee-a7e9b1b256d670c7c0f18ffa58157054.yaml create mode 100644 nuclei-templates/cve-less/plugins/antivirus-a436748e8c0a814be61fc5b51906b1d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/anual-archive-498bbeebfd7d1067e2db21072dfc82ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/anual-archive-633a7d922fc914b18ddc7d21035ab39d.yaml create mode 100644 nuclei-templates/cve-less/plugins/anual-archive-c19853d6227a07842c1d1043daa343e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/any-hostname-3bc0607c56016206aa45fc2de8e660d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/any-popup-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/any-popup-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/anycomment-186957a6ecba5765a080f5c6c5b39bcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/anycomment-b59e16af89b52cabb8769776994f8e59.yaml create mode 100644 nuclei-templates/cve-less/plugins/anycomment-d22c70f9ec92b7d76f2eae20313e8d32.yaml create mode 100644 nuclei-templates/cve-less/plugins/anycomment-ee36904a88935929b3b15a0e036819ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/anyfont-01e8465418f355e76abbd3d29a83c487.yaml create mode 100644 nuclei-templates/cve-less/plugins/anymind-widget-acdadfe8e1df89f0c7d26ae29b23fa05.yaml create mode 100644 nuclei-templates/cve-less/plugins/anyvar-180f313b58923b98a121e2e279750680.yaml create mode 100644 nuclei-templates/cve-less/plugins/anywhere-elementor-953d7c74a5cb5d227016dedae23e3cfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/anywhere-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/anywhere-flash-embed-881cc93528fb94be5fa214f77b12a3dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/aoi-tori-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ap-custom-testimonial-e046ac5677cd6d59abd3c0371d7c020d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ap-custom-testimonial-ea71ac2a34dc7248e02bdf91d9e86e30.yaml create mode 100644 nuclei-templates/cve-less/plugins/ap-mega-menu-415cf9b2f7bbb0e22dd8557e0a6ae54d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ap-pricing-tables-lite-55621d6fc615b8d4a345ef4a0a4b8e73.yaml create mode 100644 nuclei-templates/cve-less/plugins/ap-pricing-tables-lite-dd1e137c703afe40250d4d373711d33b.yaml create mode 100644 nuclei-templates/cve-less/plugins/aparat-7c5c2b955a800f0567ad6425eb1a8e69.yaml create mode 100644 nuclei-templates/cve-less/plugins/apartment-management-00968ba3e8c09884c42e4fbfc8959579.yaml create mode 100644 nuclei-templates/cve-less/plugins/apexchat-da0d789e3ff0c2c8ea9e944c14348b70.yaml create mode 100644 nuclei-templates/cve-less/plugins/api-bearer-auth-fee563db4bd1e05c4270644fa9c809a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/api-bing-map-2018-d02235de5f3ca7c1b60ff50591414693.yaml create mode 100644 nuclei-templates/cve-less/plugins/api-info-themes-plugins-wp-org-13ae41c5ac5351326da940b1b17232ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/api-key-for-google-maps-63bf92bd556ddc7e31ce5d5810bb1772.yaml create mode 100644 nuclei-templates/cve-less/plugins/api2cart-bridge-connector-19171308e9a97bd1af9a42e88ced211e.yaml create mode 100644 nuclei-templates/cve-less/plugins/api2cart-bridge-connector-eade6cf258216cda6b355deeb5801b73.yaml create mode 100644 nuclei-templates/cve-less/plugins/apocalypse-meow-2d245ed13c0df226645514583b167c2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/apollo13-framework-extensions-07d84b9abdb8923fa8bed12fef2c739c.yaml create mode 100644 nuclei-templates/cve-less/plugins/apollo13-framework-extensions-2c1fdb69500dc831bd46062ddc0d2b02.yaml create mode 100644 nuclei-templates/cve-less/plugins/apollo13-framework-extensions-783d77b98a5b328f4a28ee2d5345a1f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/apollo13-framework-extensions-7c93e57058800cc97d4580d0e8797ab3.yaml create mode 100644 nuclei-templates/cve-less/plugins/app-ads-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/app-builder-41d7dedc3e3a9c3e6b69d336c29a1195.yaml create mode 100644 nuclei-templates/cve-less/plugins/app-builder-e5e1ea362452a736ee3e514dade0c3d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/appexperts-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/apply-online-5543057e7022cfec9b8ae11fa6f72d5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/apply-online-79807fbebc743d8cb1249f7ab347cb5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/apply-online-acf9697c1a09f246be4d3f2a957b0449.yaml create mode 100644 nuclei-templates/cve-less/plugins/appmysite-989829020debf8c57aef5b384fb5a34d.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-08426323208aa24ee3404d3b3ddfff01.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-08a6dbc5d307f61c67e7655c763c44e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-297cb3aa5bbfd9cc7b8af82349a82915.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-35c4ece0623f219b885fb4f9c4a8296b.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-5da504c8dee91299e78459069ad88795.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-6dd0e2469be8342859a9ccb068065a86.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-771c97465f47602bb9d8eaea8019fba4.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-945428d4546aafa998fc04a10d10dbe9.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-9ab71be11dbcb0181c89ee507de51f30.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-booking-calendar-e90b932522d2fa559539fe55a84e18ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-calendar-1c7dc157fa96adfd05a4bca562cbd9a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-calendar-a44ebccf5ee05a1c5c4e60f95c997bb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-calendar-ddf4f66c18523a137871577fe704ba77.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-236c93e0abdcaccaa98b96d0eb756aaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-49498beeab40d799abe54105f37dda52.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-8140e129d8e838ad592a5c184c1cf2c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-93e983f709a0a8202ff094d785febb7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-aa161d7417ea73aa3cb2b51c21fd83db.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-b36315e23ade129c61fb07a902fc54b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-bb0044840289e8306c7f62e7542e65ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-e18c42540e73da21df0e80ed6910311c.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointment-hour-booking-f0cf91bed602f178255f06e47ead86ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/appointments-8afefefadde8900ab97df32e69f71d32.yaml create mode 100644 nuclei-templates/cve-less/plugins/apppresser-2f1276a08770749aab26a12f9e94025f.yaml create mode 100644 nuclei-templates/cve-less/plugins/apppresser-36235d6783de2113be1f6010065b9add.yaml create mode 100644 nuclei-templates/cve-less/plugins/apppresser-3f24de62c55c69c367431f554a182adc.yaml create mode 100644 nuclei-templates/cve-less/plugins/apppresser-ee0a89e3e23a3a50f6d12be73524e3c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/apptha-banner-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/apptha-slider-gallery-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/apptivo-business-site-b0a5bbc946df09d6c3b0cc9fe2eebc81.yaml create mode 100644 nuclei-templates/cve-less/plugins/aprils-super-functions-pack-6d5aea08d890e341921e43e6b4a849e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ar-contactus-34166a606544203d0a234746ff259ddd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ar-contactus-5efe3bb103834ebca4e7ce81f7b0fd92.yaml create mode 100644 nuclei-templates/cve-less/plugins/arabic-font-81f4538f2765df23f8b4f561b33039aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/archives-calendar-widget-e83ff3d04c646c58cf810db301109219.yaml create mode 100644 nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-1c50317ba4f62105b747a16f1bd9f458.yaml create mode 100644 nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-63705f2cf5933c3d0b8cb680facff791.yaml create mode 100644 nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-8185273926919177675b90d12fcb9ed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-97ba3b63c769d26efcad34ad353deecd.yaml create mode 100644 nuclei-templates/cve-less/plugins/arconix-faq-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/arconix-shortcodes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/arconix-shortcodes-2638501c4f697eb3fd2442b86e278a44.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-2a8ab0eb9e4b0b2a994e3256b1961375.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-3e021672a349a4fa909b6c3fa423b85d.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-7071343c33e807accfdddf119ab9779f.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-a0061c960a93fff2adc1360d0d280001.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-a84b96611f097506467644350038a82b.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-form-builder-021b10291895f49c72c52c95a60965eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-form-builder-2b5549b3c83c7777a1b6e0311c345bd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-form-builder-74c47f2edddbb589b4230d596bf5f1e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-form-builder-934adbeaa90ed24edd97e3a659c47938.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-form-builder-b525a1e6aebd5326b1ab0e97e084de90.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-form-builder-b8f70793547b459fbbb5874a8a3de62b.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-form-builder-bab973a9aab141bdb4381de471b4752a.yaml create mode 100644 nuclei-templates/cve-less/plugins/arforms-form-builder-d033cc97f1c7c8d9b5f748a688df721f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-adminer-e26e58963c45719b3e25492ec26bb785.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-cf7-connector-09c79ac5dfe7a7e2777e5c3067dc8b55.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-cf7-connector-38ba390551110addf63f2acef704b878.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-cf7-connector-82cf044c6b5c43e07d092f3e03e58313.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-fancy-lightbox-80735d78d7816d8ea105bb7f1037c875.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-stream-quiz-104becea74a63a5fb9c4e033385ae9cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-stream-quiz-3587db01a7a28244ee4173daa03a691b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-stream-quiz-6f4ecb36b96c9dd745bf20e36b1a7043.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-stream-quiz-83e77c7536580dfcf15705797ee936c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-stream-quiz-9cc53a2c7c51eb8cc900a2d7b01bfc6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-stream-quiz-a088cd6d5872bf40384c1e2afa0283ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/ari-stream-quiz-f630977977a8e3f3533623f6c0f7c890.yaml create mode 100644 nuclei-templates/cve-less/plugins/ark-wysiwyg-comment-editor-2b16886725a873c1bee4cefe26c49349.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-3ca2d382a221d380504a5d9703316520.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-744209b23a7e6299f52186bba738be87.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-0786d35a357f001d251a3bbf5eef2d35.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-12b01b43b57b8f272157206cf06dc3ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-2c4f92f87bb9ef6f0a1e7c033135ace0.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-41830c974de1f3419028654a94a429d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-4c834bc5fa8008630a55b72e056da47e.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-52377d1fb17ba651463be55fa1b78765.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-6cb8297a956ab7d71fae8eaf17eed227.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-77d3a7baf2067b9573aef8e72c5d2033.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-928dd303af6c4624ef6e7653fba246d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-9650322438fb16b52c4432ecc521bf68.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-9b5e7b374f6bba66c7565c0c933eb6f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-a85248fb3ba2da0688167185e0c87249.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-ab42ec9d60829884112a87fe093b6c61.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-cb6fa6f6958986304e8bc18c130022ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-df79548a0cacba87c7dd01e5f2d614e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-e36fdcdf09b5a64eac64f879dc48947d.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-f134a30b8e43bd6402d66fadc73e7004.yaml create mode 100644 nuclei-templates/cve-less/plugins/armember-membership-fe13beada39d84f2847878b7d4da45e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/arprice-responsive-pricing-table-79efca326c7a11854304313bbb2dcff3.yaml create mode 100644 nuclei-templates/cve-less/plugins/arprice-responsive-pricing-table-a7def05240ca9e7abb72b7c9c9771694.yaml create mode 100644 nuclei-templates/cve-less/plugins/arscode-ninja-popups-a719159263b63e2be06c98fecd13de77.yaml create mode 100644 nuclei-templates/cve-less/plugins/art-decoration-shortcode-6866d09139386202bbed5983be370086.yaml create mode 100644 nuclei-templates/cve-less/plugins/art-direction-47deea3f06e73d1d92fa8e2918f9b61e.yaml create mode 100644 nuclei-templates/cve-less/plugins/artibot-a33517bbb57428ced1cfd6968a2c3a6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/artibot-a516963ffdc1c41b00bc8d54c0948a03.yaml create mode 100644 nuclei-templates/cve-less/plugins/article-analytics-727442235b3241daec9b8505f42a54a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/article-directory-6ee3ff55725bf2e5894fc0e814f92fd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/article-directory-redux-bab2d740e6550ac0744f9a04322bcfe9.yaml create mode 100644 nuclei-templates/cve-less/plugins/article2pdf-32331c436a25ac1de1bf5da05cd58308.yaml create mode 100644 nuclei-templates/cve-less/plugins/article2pdf-bc30f477415f000a25c8cf2e28a66988.yaml create mode 100644 nuclei-templates/cve-less/plugins/artplacer-widget-ab0a99467dd011ce171b426da9ac5ab8.yaml create mode 100644 nuclei-templates/cve-less/plugins/aruba-hispeed-cache-44de9a2461187be18ff94240ec7b0927.yaml create mode 100644 nuclei-templates/cve-less/plugins/aryo-activity-log-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/aryo-activity-log-70da5885a2f28e43c5e9331e1fdeb92b.yaml create mode 100644 nuclei-templates/cve-less/plugins/aryo-activity-log-7e4338ffecef779ba0a29a7607305ac9.yaml create mode 100644 nuclei-templates/cve-less/plugins/aryo-activity-log-8bb2281b07179f11fd172e832ab240af.yaml create mode 100644 nuclei-templates/cve-less/plugins/aryo-activity-log-be27c4b6992c035b340ec769cdb51351.yaml create mode 100644 nuclei-templates/cve-less/plugins/aryo-activity-log-d4d7a04a467c657c90f622b79da37f85.yaml create mode 100644 nuclei-templates/cve-less/plugins/aryo-activity-log-e186fa859c9eb38cc8ef0cb73e6a43b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/aryo-activity-log-e2708e282bb00df5e2bc3a4493f5868c.yaml create mode 100644 nuclei-templates/cve-less/plugins/as-create-pinterest-pinboard-pages-d1f3834e2f95aaed2e601e83a20e5d59.yaml create mode 100644 nuclei-templates/cve-less/plugins/asf-allow-svg-files-6b99b25706bc10b6938889b6d61c2c79.yaml create mode 100644 nuclei-templates/cve-less/plugins/asf-allow-svg-files-f31b01af0e36d70ece981a2da79389f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/asgaros-forum-253ae1868772845aa5a363aeb4a8d859.yaml create mode 100644 nuclei-templates/cve-less/plugins/asgaros-forum-488a5177633c5d61ff8bef1899fcdb13.yaml create mode 100644 nuclei-templates/cve-less/plugins/asgaros-forum-536f8f709fcfc0e34ccf2b79f3c436d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/asgaros-forum-6584898d6200cc68ea0f9c1ee82648c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/asgaros-forum-9f49ea16b14f6c2511df8453564cbeeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/asgaros-forum-d214d99e51223f558d7540a78be5f43a.yaml create mode 100644 nuclei-templates/cve-less/plugins/asgaros-forum-d9dc418339bf1c25423bb7e18f222c8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/asgaros-forum-eb11a26c1af4959f22b43b7df59cd527.yaml create mode 100644 nuclei-templates/cve-less/plugins/ashe-extra-c4ac8ff1dfd268623baae850718c4ab2.yaml create mode 100644 nuclei-templates/cve-less/plugins/askapache-firefox-adsense-3ee736065c571005f3aa44af407146c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/asmember-caf355595af5171fa75c6b8b0c04dfb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/aspose-cloud-ebook-generator-2dc16b0147ac9503c18f0e957af766f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/aspose-doc-exporter-5012da2be4de20cb472aea0abf71670b.yaml create mode 100644 nuclei-templates/cve-less/plugins/aspose-doc-exporter-615972550ac1ea7b975135922dc13fb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/aspose-importer-exporter-f96d2d362df935e9372a6bebea47626c.yaml create mode 100644 nuclei-templates/cve-less/plugins/aspose-pdf-exporter-cb307b5a36222abf7cd21b8d59667e63.yaml create mode 100644 nuclei-templates/cve-less/plugins/asset-manager-0e47f60cc879dad43442c621e6d5bb62.yaml create mode 100644 nuclei-templates/cve-less/plugins/assistant-aa77d870ecb6d6f531eb842d8f66fa4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/assistant-c365c40f61838d38a40469cd2e67b28b.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-addon-1ab112c9db0961813049d1b450f4b178.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-addon-349353b08ad0d6204581635fb97a9527.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-bulk-edit-3e0d971821f286a488f83631df3f9e8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-import-export-d974f8d1ecb932f30e0efce7f2789451.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-pro-sites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-pro-sites-53fb886a588d15854380c3b94bdeab19.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-sites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-sites-53fb886a588d15854380c3b94bdeab19.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-sites-9449b2c65db0c3fbbcb51d4c753869a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-sites-b7edfb498be50e4270697b56ff65997c.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-sites-dfeeecb3cd427fc07ce343314d55c42c.yaml create mode 100644 nuclei-templates/cve-less/plugins/astra-sites-ead0c2fc6bfbbdd6a858fbe0610f5c02.yaml create mode 100644 nuclei-templates/cve-less/plugins/async-javascript-1487ac20915c63a985fc090bb178b2a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/async-javascript-3a24ca5d79101db2344acd5815fa20cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/atarim-visual-collaboration-70c6c7a80871c323a0d41da757459072.yaml create mode 100644 nuclei-templates/cve-less/plugins/atarim-visual-collaboration-79139d2e0a7eb5022bea3408ba7847f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/atarim-visual-collaboration-b5350d73ee034ae7067ab3d2b696ae06.yaml create mode 100644 nuclei-templates/cve-less/plugins/athlon-manage-calameo-publications-98d9cd4d13fec25657ca94210605c694.yaml create mode 100644 nuclei-templates/cve-less/plugins/atlas-knowledge-base-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/atomchat-f021a9b99ee30b184dab1f6f57a36751.yaml create mode 100644 nuclei-templates/cve-less/plugins/attendance-manager-b68d1df69fccd4a3fd0f7eef890ed158.yaml create mode 100644 nuclei-templates/cve-less/plugins/attendance-manager-c52de35daf5b13bbf0e8777d574ea5fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/attesa-extra-76e71bc12b464dcb30907399a9d0eccf.yaml create mode 100644 nuclei-templates/cve-less/plugins/auctionplugin-47d9c553f76b1db5bf988e755d7f727b.yaml create mode 100644 nuclei-templates/cve-less/plugins/audio-and-video-player-9585db3736e35b2828063fe3229af0e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/audio-d78d8916b5f5bd711472247cd8557306.yaml create mode 100644 nuclei-templates/cve-less/plugins/audio-merchant-07cf727b65166fc33c537ed10a4a1542.yaml create mode 100644 nuclei-templates/cve-less/plugins/audio-merchant-40a88180b6759feac8abef362a1880e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/audio-player-c346700edac77f8ba964672619183f58.yaml create mode 100644 nuclei-templates/cve-less/plugins/audio-player-with-playlist-ultimate-4a822bfcb4b13bd5154ea0a206a03b5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/audio-record-d64db224cd3df0f0072f2a058012253c.yaml create mode 100644 nuclei-templates/cve-less/plugins/audio-video-download-buttons-for-youtube-bb4857408fb36340cc11efff0d796ba5.yaml create mode 100644 nuclei-templates/cve-less/plugins/augmented-reality-5d2387c9183cf43d10d61fd017f20663.yaml create mode 100644 nuclei-templates/cve-less/plugins/auth0-03670bf85bbf904a0e4e7a4b5e5a3b85.yaml create mode 100644 nuclei-templates/cve-less/plugins/auth0-2b0533cd6930889b564dac0001232de1.yaml create mode 100644 nuclei-templates/cve-less/plugins/auth0-4c3165a51cada8ffcfc130121958fc36.yaml create mode 100644 nuclei-templates/cve-less/plugins/auth0-6bd4ae57c5ef629c5bc1d004189d96b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/auth0-74d2043a574ab69cbbb11dda595211e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/auth0-90a41beee5735837ff7592583a00d291.yaml create mode 100644 nuclei-templates/cve-less/plugins/authenticator-ec741bccccea1c86002394aeac45c0a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/authldap-bdd4b664f15822a6a49a236c18fe020b.yaml create mode 100644 nuclei-templates/cve-less/plugins/authldap-cc2cca093f03fe71d2f989bb7299a3fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/author-avatars-2ba7e464285026388de6685dba844dbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/author-bio-box-6674d09f375c0a0c6100b633268f7e7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/author-chat-e0ff0dcaa5f28679cfbec1f0cc721e5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/authorizer-0dee3aeb64244e66a13f4201e38521ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/authors-list-f4f27ef7b51870c2ee29ac141ca3d041.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-advance-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-delete-posts-558370c6db6c7d4d1eb32adfed3a020b.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-excerpt-everywhere-9438e07daceade026bfabee5db9fec5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-hide-admin-bar-1243017811fac8a9f67c1c02c6c11406.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-hyperlink-urls-0886361daf0aecc3d4f4d311809f8748.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-limit-posts-reloaded-ea1f016fc610b9737d2a2631fc4d6d33.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-listings-8b6ee3af1a9508cfbedefd1fe07951b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-location-for-wp-job-manager-c35094b437e27c460747dae02d21159c.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-login-new-user-after-registration-3503792f93b778d8b203c79791005536.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-login-new-user-after-registration-cbd733c7ebdd096e6d282497c4c8eb45.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-login-when-resister-8a80eb46c7edc3e736e43babb9e6251b.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-more-tag-5181665927ed9da562e36af3ea3ec2fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-post-thumbnail-272755bdeeb1adc01a4352f800652c09.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-post-thumbnail-4a832155afe3b99c1f4d2882162139df.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-post-thumbnail-eb2326275a758827f7cb2f8622cad6ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-poster-d78cf00c59cb04a1784e89b4d96527fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-prune-posts-0853f27900d9d1d4cc0e56f1b61fc316.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-refresh-single-page-176d59252e2a1ced83fc8440cad1b0f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-rename-media-on-upload-9eab813e12b4ac048e7bde30bc6ba691.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-tag-creator-ef92930a59c0704397081e4543f7586d.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-thickbox-plus-1fdd6fa4d9b258037503dfcfecd3a543.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-upload-images-7deebe50bd92a2450bb0ab52d4fabce8.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-upload-images-e720f99baaecf49f6cf9a7d54ee9d187.yaml create mode 100644 nuclei-templates/cve-less/plugins/auto-youtube-importer-be7901b9f5b68d7364c4afedf93335bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/autocomplete-location-field-contact-form-7-4113301795a9f6abc828e53db152bc61.yaml create mode 100644 nuclei-templates/cve-less/plugins/autolinks-ad0620cb04a8c4743efa183697178556.yaml create mode 100644 nuclei-templates/cve-less/plugins/automated-editor-3a906cc64f922d280ee100fae46edd10.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatewoo-4dae001d6d6e08996c09e2836f10b44d.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatewoo-62fe87d4141e78303e17a76d693266f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatewoo-ccfc84b5a73050c155c0bdabcf1ece75.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatewoo-d7fca3e11b3b0863de2f43ab6c4390c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-domain-changer-61bee7d86e2db9bfd0c620f9695ac8f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-grid-image-listing-b320e1c5f0dacab6b03f963021265f72.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-internal-links-for-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-pages-for-privacy-policy-terms-about-and-contact-8ce996cc6b76d039a08ff1d01926c151.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-post-categories-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-user-roles-switcher-3117c9f6ca4b5d0c58f750cb4d3a545e.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-youtube-gallery-41e70074e724b3d58c82d2325b25db5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-youtube-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatic-youtube-video-posts-0a33d637c29ba75c2b509bcefbd3461e.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatorwp-8115d47111d8823e88df213c3ae2493b.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatorwp-bb200d907df69c9c4fcee1658bb3b23d.yaml create mode 100644 nuclei-templates/cve-less/plugins/automatorwp-ecd15bc5f3de0e81bd280c25d15be5a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/automizy-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-4cdab5a4c9d1ef359c9ea3e65c6cdb07.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-6be16d4dc7a3396a4e2044185bf46f84.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-75251abfce703752327c7069170783ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-80c50d46e1edaea1d21acc931b61620b.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-967efd081266df53c7d5c10295955cd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-9b6d789ab9054bec8f3668e533e7af06.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-a168ad5542ffc3cded569dbf621954d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-c98cc11ba230cb93eea39872b453bb99.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoptimize-dac1811f2f42b2f9bf0fce4cd043df4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoresponder-gwa-1baba58fdf15d4d0a7d4d7886ec16e9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoresponder-gwa-d0a082141e820d78d2c62d7167bca620.yaml create mode 100644 nuclei-templates/cve-less/plugins/autosave-net-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoshare-for-twitter-1f6e5011b7adf7858fca1938316d62fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoshare-for-twitter-73081b1f6f4e13a9e6e969eba5e746fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/autoshare-for-twitter-f9078038dec7d199edb0413f76661495.yaml create mode 100644 nuclei-templates/cve-less/plugins/autotitle-for-wordpress-4914e87d81ced1cde016cf120e762a4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-700e36ec39fe3e8c88c494279e29f4d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-730a6fdf4be6bb50ac42ce16cbcc6d77.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-7c56383fa31fa34806b79179038f9c39.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-7cb2639ce12fe262360726f38fcd9d92.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-9eb8fddd5a9f0696ed91d545e4dd965c.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-a06dc2822d205c30829a39942b5c0aee.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-a3c60d763b55ba109d8e7ef5cc4b73cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-c1fa4ca90d68aef3b1e407c4bbb8f6e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-ce1baa6ffb742e3e4c86c030e2aaf287.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-d5f51941abb9e332fec6da6716857cba.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-d69e955ab6caeeb527fcd68ff48fdaa2.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-d7661df8620c7b906e4301d69849100f.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-elements-efcaa0147762fa54393728f49e9affeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-portfolio-bd574799289bf82115af4f7319ebe51c.yaml create mode 100644 nuclei-templates/cve-less/plugins/auxin-shop-e3bcf24a15914a9cc834e70ea4b9adc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/auyautochat-for-wp-1c7bd7b413a535860c5a3694b104e04c.yaml create mode 100644 nuclei-templates/cve-less/plugins/availability-calendar-1fa01304932da158500562eabc5ce5d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/availability-calendar-3850f9fd40f943ca2e9ea3445b1f1e23.yaml create mode 100644 nuclei-templates/cve-less/plugins/availability-calendar-562eae7f881850beb009ee88869dd234.yaml create mode 100644 nuclei-templates/cve-less/plugins/avalex-00e15cae549764aa48f28dd7ae0bb1cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/avalex-9bcf1b21f2afb149521c1b2b2eae8a87.yaml create mode 100644 nuclei-templates/cve-less/plugins/avartan-slider-lite-d11978412fa07cd9d2358fa468a9d42e.yaml create mode 100644 nuclei-templates/cve-less/plugins/avchat-3-417e197336cd9f9a0d5cd9505aacac7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/avcp-28b0382bdb3605846c741b0b29e57d1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/avenirsoft-directdownload-3231c8774c4d66bff9d3f46fb317e754.yaml create mode 100644 nuclei-templates/cve-less/plugins/aviary-image-editor-add-on-for-gravity-forms-2837065b3a48acc8f4f2b3e0459274f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/avirato-calendar-f27c37237edad62fdf365ba901d07da8.yaml create mode 100644 nuclei-templates/cve-less/plugins/aweber-web-form-widget-16c74e447f178d9a81be3266e07ecdda.yaml create mode 100644 nuclei-templates/cve-less/plugins/aweber-web-form-widget-cbc652a67aafb71a7a53197a032b3a41.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-18b2efc80a79b2c683b250abf8605dd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-d959830a068b86235ba87177aa38047a.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-dd607130eb4cdf70c195f7eed039edc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-ff6624786e8e60814d172183c9a7bf5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-1dd9869669e4a7c4f20b2235d2df68c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-1f2a06a643f40ca267bd342499fdc692.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-266ba42edca3ad9aefeac2a819615d83.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-41afc2537de7dc4ac1f3ebf67c718802.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-44e9c5f94ff15d80337fbc26acc2f9ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-4d46668ff9f00851738b6095ebac210e.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-57028c13cec1060b66617f5f07c85c6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-8712cc1632e225c594b19df34ae596ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-89ce07ac930dc51991979cb98280bbb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-938da0cde8319acbc8cd634349637fad.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-95ed715a05e3d26da6f74ccbd6ab85ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-b26029d3fea40b72701a527b04841a5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-b6e9ca61c7913b93778f0505c3d8b45b.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-d27639e06760fb0c9830c5a72e87ab5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-d4c78d8203546198e179a467ececd0d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-de2f88d15a1b5aecd6a16f406646e9a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-e5141ff592bd9997e23b1aad269872cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-e5b491b44226f62122b1d1d362aae078.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-support-f3efba04fcdce6cec3efa7cec92aedc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-weather-24dc0fb35229c989c41ed2754572ea29.yaml create mode 100644 nuclei-templates/cve-less/plugins/awesome-weather-906c7d163a05db6b1db16532f52ba291.yaml create mode 100644 nuclei-templates/cve-less/plugins/awin-data-feed-8c4a0974b3df67f7339b8c6388934e6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/awin-data-feed-b0fddc41ffe057bf823e73bc28d298ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/aws-cdn-by-wpadmin-69ff1cf9c2667131344592beac8a2eff.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-6b7b2b04e942b5d2f162bf42039d4c12.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-90c4cbfb7712449319d9759e0ded5087.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-a5bc98329e35c128c91f3ce8a71c6a41.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-c5dca15da955e97b5160cc77880cc971.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-248e31ef2c55014a53d3afdb1f6ae07b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-4f73bdbdeaed18569d9edce85c2c628c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-5174039d89c7d18d794fb10cf1a282f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-5d4640c4264ffacd4152e50de3f3f317.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-5f0f062620e3c5241de7c7fa9457553a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-74192cf75d7a306906b056f839712e82.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-8198c675532e8f307d66f6e19540bf63.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-838e3be64c22dc1203b2c46a22794d70.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-c01322d993d29040f70fca990f38339c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-c5104058a36ba87cb65f65ec0059bc5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-popup-box-ffda73ee0ac47c439700ae8ebfad208d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-slider-46069454c6ba944e642bfecf69aa0fc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ays-slider-e3798772f56ed41206446ba8085ca086.yaml create mode 100644 nuclei-templates/cve-less/plugins/azw-woocommerce-file-uploads-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/b-slider-f176e53a42ca2011d6f5c8a03ade6f30.yaml create mode 100644 nuclei-templates/cve-less/plugins/b2bking-wholesale-for-woocommerce-5676c8d193c6c7c7c19f827a6027fe03.yaml create mode 100644 nuclei-templates/cve-less/plugins/b2bking-wholesale-for-woocommerce-eef58a96354df2086d4576efe4313ff1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ba-book-everything-08de41cb2b0c0b28a5deead53bb308d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ba-book-everything-32308cb2a86eba1af06f28c633448e1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ba-book-everything-4012f134749539452de47052e41b95bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/ba-book-everything-e548c20619f1bf8ad1418368ebd16e42.yaml create mode 100644 nuclei-templates/cve-less/plugins/ba-plus-before-after-image-slider-free-a65ff3a4b26159a2c4e25124ed20b089.yaml create mode 100644 nuclei-templates/cve-less/plugins/back-button-widget-9a6e06a6f52e0f7856e09ef8ac51eff2.yaml create mode 100644 nuclei-templates/cve-less/plugins/back-in-stock-notifier-for-woocommerce-c6eded4721823fad177e3bbf3127c4c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/back-to-the-top-button-0adc72a8beddf445761ccd2b42cda0f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/backend-designer-8a00d4110806870e5118fa117a1c5da6.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-31705d92f5b0540e46103bf0e8f5290e.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-506d872307a475af76e6ae5402a1e474.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-892437eb68b329dd17b3be2557272f56.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-8bb122c471113121afc3ab2c199c2c7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-8eae7ffaabe0ed4cfdd5b1537b7b4d67.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-9458fe34c744167704f938702ae6ca24.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-9b7d6017f1a72f048acef7512ee0eb68.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-and-restore-for-wp-90dcee7cddc408bda7d7da416498432f.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-5143c97c48d7dbc931ae167f87839db5.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-62786f2608f27a539a0474c4d2ebfa59.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-69b19f14e2d5ec73b6d0b29b5ce933ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-87fc5ec6b1d8ce88fa24b6d37dc7769d.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-a95d754905d3f53fb57a0e2d890050ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-bafe57d5b57ae88c67b8e813c789e809.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-c2f123eeeab4951b42a1cc8fc1528dc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-d0b7defb1dd587ee6e11e3b384bd4e57.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-dc13d87f49a5c107f5d523c7a6538ca9.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-backup-e15cd5eb900eec690c6bd9ba7205617d.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-bolt-e92ff64cb5237b7fef80c551a995240d.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-by-supsystic-d7479b175a0668ffbe5af726e8c140b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-e30a273c4e2ac5b93368dcb61feeb896.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-ec758abe67d8493d911d656fdfa690f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-scheduler-2042c2ccb1432ca181653532b126746f.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-scheduler-897959e22c40ecc199bf5dc5042856a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/backup-wd-38b12fb47f5d220861d665c3785bcfc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupbuddy-141ab8478a476872f09ca6589d710d31.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupbuddy-2a4553829059c88ea2966fb66da7e42a.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupbuddy-4644df3f89f37fce826cc2d06ead9821.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupbuddy-928b2ae49df36c8a8c06f8fa9afee383.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupbuddy-a43e4c1368e5181d1a16d6caef32b605.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupbuddy-bb9a3765668a45566332d836d123f363.yaml create mode 100644 nuclei-templates/cve-less/plugins/backuply-471be969472b8d0ef26e1ed1be3ca7b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/backuply-6cad3fdbb1d6f65f827e62fa999a9d63.yaml create mode 100644 nuclei-templates/cve-less/plugins/backuply-ea428ee30f7eac0893dba990c7647b20.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupwordpress-d55df6ea0549bd5bc1a28b66aeed72e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupwordpress-f5711bcfafc45228fc0a872f3e3fae05.yaml create mode 100644 nuclei-templates/cve-less/plugins/backupwordpress-ff88c3f150fa8c25d9c92672f9b00beb.yaml create mode 100644 nuclei-templates/cve-less/plugins/backwpup-1298f4a06721cabe055b21858243d155.yaml create mode 100644 nuclei-templates/cve-less/plugins/backwpup-2bca208b2748ce062cd1cca09cfae994.yaml create mode 100644 nuclei-templates/cve-less/plugins/backwpup-356feecea26ff4c40d9fa77a244963ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/backwpup-58ee338d74c3490fd7f800caad932984.yaml create mode 100644 nuclei-templates/cve-less/plugins/backwpup-86bb89c01ac64d331e5e9e535a06cf97.yaml create mode 100644 nuclei-templates/cve-less/plugins/backwpup-e260f5dd85134184a7b4e8005c4f1616.yaml create mode 100644 nuclei-templates/cve-less/plugins/backwpup-eaf4d65714ae3e70ffdd0fc233476145.yaml create mode 100644 nuclei-templates/cve-less/plugins/bacola-core-0e249eccad21574e2f41d6b727c12756.yaml create mode 100644 nuclei-templates/cve-less/plugins/bad-behavior-0638cf0d113b279b6ab4547692f6759f.yaml create mode 100644 nuclei-templates/cve-less/plugins/badgeos-6a3c999f177d3f3a9005f7b86b4e26cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/badgeos-8e5d590ef949dabd3bb7265d663cdfbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/badgeos-948fbb4659b9489d63a6dcbbe5ab82b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/badgeos-99d724e78c6e3ca9e817c7ab41561c22.yaml create mode 100644 nuclei-templates/cve-less/plugins/badgeos-d8de339d3ac4f62207036cc196c6166a.yaml create mode 100644 nuclei-templates/cve-less/plugins/badgeos-e1ab43eefd1268f41af50d790136abb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/badgeos-ee566a4e5dfcb43b5aa7224c7fc505bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/badgeos-ef94b2f85f2ba20fe6f83fee3d6d311f.yaml create mode 100644 nuclei-templates/cve-less/plugins/baggage-freight-56e63bf99909025ae251d6417333b36f.yaml create mode 100644 nuclei-templates/cve-less/plugins/baidu-submit-link-9c6d171f6c42d066e20b0847cb9e2d62.yaml create mode 100644 nuclei-templates/cve-less/plugins/baidu-tongji-generator-d91574fca4b237a59bfef53213c75bb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/baidu-tongji-generator-ee80f8c937a77ba9a3b8602ebbefd769.yaml create mode 100644 nuclei-templates/cve-less/plugins/bamboo-columns-414a4199455e61f63d4f1a06e321a38b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ban-users-137251846c7319666c4983642238e856.yaml create mode 100644 nuclei-templates/cve-less/plugins/bangladeshi-payment-gateways-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/bangladeshi-payment-gateways-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/bank-mellat-226ccdc58627d396ab167a357486235f.yaml create mode 100644 nuclei-templates/cve-less/plugins/banner-cycler-b587c5b6b45c195ebb12bd5f55ed780d.yaml create mode 100644 nuclei-templates/cve-less/plugins/banner-effect-header-434911a5447ed5d05a669b67b9efd816.yaml create mode 100644 nuclei-templates/cve-less/plugins/banner-effect-header-f7325cb69c59d2a2951bb8ec98779e8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-0167f45d0f324e4791bf42a58fe0f3d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-fccced4c8f4a5e0806978ddedbe57a10.yaml create mode 100644 nuclei-templates/cve-less/plugins/bannerlid-55df23e4f01ef0022903c3f40bc900ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/bannerman-1bdbe0eed23754132ebb7324a7cbafe1.yaml create mode 100644 nuclei-templates/cve-less/plugins/bannerman-acb1c7356c04fc668153a6e512559aa7.yaml create mode 100644 nuclei-templates/cve-less/plugins/barclaycart-c2aa0d5f18c95dfed2e602c88c079b1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-3fe433fa04cbd74a4139a79417d6ceaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-40a18728cfe568ff4c836d2215f1bab4.yaml create mode 100644 nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-6598da95314501b73bd8f49d12607cda.yaml create mode 100644 nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-762974517202b3d8e87994dd1daef458.yaml create mode 100644 nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-91fab9aed123b89a5ffac035c0489ae7.yaml create mode 100644 nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-c1bec35c5489d7d12ae6b841d923b29e.yaml create mode 100644 nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-ea61aaf0b841c4447233caa711d245e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/basepress-a5afc25e9a9bba6762e73f63456f868e.yaml create mode 100644 nuclei-templates/cve-less/plugins/basepress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/basepress-fdf5e229c491f2ee061576794ec1d5c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/basic-interactive-world-map-b5b7bc46aa5c73951c7934c79faf05ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/baslider-6df2df1f538663a4b281d00b01155047.yaml create mode 100644 nuclei-templates/cve-less/plugins/baslider-8d331ddadf2ec92c698925fb701e1625.yaml create mode 100644 nuclei-templates/cve-less/plugins/baslider-9ea1bb5d162409cd77ba612423f2f166.yaml create mode 100644 nuclei-templates/cve-less/plugins/batch-cat-5fc1378196caf660cea9b35242972f9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/baw-login-logout-menu-4d7cf09bd61a740d1d041e4a547bb223.yaml create mode 100644 nuclei-templates/cve-less/plugins/baw-post-views-count-689bba03a0123069bb521d413df5bf54.yaml create mode 100644 nuclei-templates/cve-less/plugins/bb-bootstrap-cards-42392b45ae66f65286752e395147b8a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bb-ultimate-addon-1c74e3df9173084b9bb7ea805c234e58.yaml create mode 100644 nuclei-templates/cve-less/plugins/bb-ultimate-addon-463ccdd827fdb7cc231455301d2f674b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bb-ultimate-addon-8495527ac09a59599c4f06adeea443c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbp-members-only-de02ae500f9a57c33a0ee01cf27ee98f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbp-move-topics-2d66a242a2a2a1cad4298e09bf72f7ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbp-move-topics-7d2d77fb555165867755ecf651af34c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbp-style-pack-a8af060628ffa49f9121f24c1f544243.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbp-style-pack-b166ccca1e33f4281f58142489d93a0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbp-toolkit-1c16449f8bc6ec80daa181529883284c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbp-toolkit-f0f195114e43b21943298311709b9cdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbp-voting-40b2967e127caf7495ebfc36b3279860.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbpress-1f87f7a2adf09634e0df0bd21922373b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbpress-4cbf85b774e16b710e92618758678558.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbpress-50e1ba859aba6574e04bc19be7d2a72d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbpress-a08c651ad045a182d61e4a734b04e24d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbpress-c2aad2cd7c74971784609bd3b7e968af.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbpress-login-register-links-on-forum-topic-pages-8b2df19f52d17e59f7bf267a5a7cd929.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbpress-post-topics-e9ae76ec6425c2521c80399f801c780e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbresolutions-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbs-e-franchise-c3364a727b0ebaebc84adf04bc03aa05.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbs-e-popup-47cb3cea5c7ee929fdb9a30f97cd8b93.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbs-e-popup-cf929e621e4b1d597c324db37b74c90e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bbspoiler-3b3faa72335204be9fd1e5395bb7377e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bc-menu-cart-woo-e37de4c1f7c016da27e52bf7ca80605e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bc-woo-custom-thank-you-pages-b81dbbcc402e93364fc6c79f5c55b224.yaml create mode 100644 nuclei-templates/cve-less/plugins/bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-613e6d1f73b0e9a2cfb432bf7b65549d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bcorp-shortcodes-e46e0878d80b0d8d4416a50916ac9925.yaml create mode 100644 nuclei-templates/cve-less/plugins/bcs-bertline-book-importer-1c1e9e2dd7e363e8e9eb9d15d5f2b60e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-c32e665e9be4b817092efeaf96853d74.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-46bd5e871ffddefa69b74900fbbdea14.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-7e6a3b2c412bc3d13ddc87f480a49f5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-88c402ced2fc7c5811d5e082ac94297b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-91833325e07473e81e8f172735b05fa1.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-a5718896caa8539c5806c104b13a2ecf.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-e0e7d7ae87e3b7c89bbdeabc1a752e7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-e5cbcd667f6374a7cacb1531a9b3233c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-f4f911fdf61cb94da9a5aa199fbba441.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-332edd099b0a24d5cedbd6ff5e1c921f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-4475ed600e0c7aee761684483f573ae1.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-4856ea4fa23608af898ff19809065029.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-58cf3685b6d061649f14b9a15a1de69b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-7c8990ed736a3cb5113e28a3af38b444.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-889847d33809b1d03070e688df75ac6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-b5d8ae30fccbde3a30e869d152e37902.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-c0add8aac27f340c1c289e5c63a1598d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-dea28b24d7e53b89e98cd471b0652d7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bdvs-password-reset-1a189dbfcf27a170ebf674465bd67d58.yaml create mode 100644 nuclei-templates/cve-less/plugins/be-popia-compliant-7d6d3ed82fbce25bd8d4d72adc5dbb85.yaml create mode 100644 nuclei-templates/cve-less/plugins/be-popia-compliant-89d00060ada213715ac2f4cc10816ef2.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaf-before-and-after-gallery-5866d53824f6a21c318e64067df5b3af.yaml create mode 100644 nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-2f0c52f572204949d9dfa707ba4715b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-4f0dd73da2c5ab7153159044ff19606c.yaml create mode 100644 nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-e17b32fc1c537aa75c208693d7d1b8f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-03b179e5beb399c252262dca2e1c2a47.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-31a5f54f51f59ec02334f6066d4afc3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-3deace4984f0c809f54b31e2e6aaea40.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-49f8c3ec41639ad41107106a61b3b652.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-4a6425bd134427fc325c845997202a57.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-73d0b7fc0e78937e14e64656fc0eec81.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-811048b3ad2eacb5c29f4e0546b22dd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a0f8dbe86bd25cb76ecd0536100264a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a11c0611909385052cd0aaeced3bbff4.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a48a705bfc66279fa96d49ee01ec64a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a4b84494f2ca0459161168fd007453cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-ac5ea49d172b7aeae239859f4682fe56.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-b00000526bce4d638ca8288e0858fb40.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-c20cb20ff14b1ed9f84a7525784a41bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-dd8649decc08f39c4790db22c44b5be7.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-builder-lite-version-e9ae67bcdb286ec58db8997d8a78829a.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-themer-b957cb5f454b449f583a6eef42317102.yaml create mode 100644 nuclei-templates/cve-less/plugins/beaver-themer-c8a7f0039447f90c8cdf2d5bac0144d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/becustom-1b89b5eb4288496d851956ba01f7ee38.yaml create mode 100644 nuclei-templates/cve-less/plugins/beds24-online-booking-362ca4d6e33d614fc53fac12799f63e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/beds24-online-booking-843511a1c7a253d8815f1011e5416ca7.yaml create mode 100644 nuclei-templates/cve-less/plugins/beebee-mini-56db8ce4b9ff6871db6cca64bbbcf0dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/beepress-7d84dd587f6a41715457eb91e2b1b3ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/before-after-image-slider-c52273b2cf56d5474ff79f10bc5133f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/before-and-after-9868c860ce207929896c4fa67bae9575.yaml create mode 100644 nuclei-templates/cve-less/plugins/before-and-after-product-images-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/before-and-after-product-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/bellows-accordion-menu-a2e597896da84d8e5ead12576f9d50bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/benchmark-email-lite-f47f4e7914a77fceef2cac004cb55a1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bepro-listings-4b7af90d1d419a64b595cd9c1418239a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bertha-ai-free-b518bec195877c390c9c609530bbaa4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/best-restaurant-menu-by-pricelisto-6c6dcf20e63f7dc387f2f85722e8901c.yaml create mode 100644 nuclei-templates/cve-less/plugins/best-woocommerce-feed-339c653ee99c338c15ef4d1eade1d929.yaml create mode 100644 nuclei-templates/cve-less/plugins/best-woocommerce-feed-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/bestbooks-2a2a7cb185c86a125aeb5500ccc53d3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-anchor-links-237b2843475a8f4f4f800677c6af1b8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-click-to-tweet-88dbd900cde513bacf9820ea94c0e8ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-click-to-tweet-d23e433446769426d4aae17f6fe2a04a.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-click-to-tweet-d6f0e617de1a3c82f777a89829211e90.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-comments-7585bdd855a3ce213df577df1a0cf7c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-comments-cca7855a039dbac1182b0b2fae34c3b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-delete-revision-fdec0718eabbae53872d03fa70d141a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-elementor-addons-267d7435385a9582ef7c8199e8931303.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-elementor-addons-9167001bdde424000d6bf79c1d596a20.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-elementor-addons-b4d70a86acec874506b4ab2dcb06e399.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-elementor-addons-c71bf414dec349bec3e4220e85ee81e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-follow-button-for-jetpack-bf3890ad3455b3c44beacb3bebc6b11a.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-font-awesome-1c7d78d4a78d0f2d3396fece72367d31.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-font-awesome-367b17bcc7fd153764ffbb7e174fed0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-font-awesome-415ed972729f96565976948d92875199.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-font-awesome-e128c0c0167442ae481665888471e921.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-messages-wc-vendors-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-messages-wcfm-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-robots-txt-0e514fdd87f87b672172ceb862e2efda.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-robots-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-robots-txt-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-rss-widget-e9bfeb55edc6f8bed127152a2312d037.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-1bccfaa95263e0cba6cdbff0fea9a636.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-283fafa85d866a9f95a9b66cbfa775a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-44c47555058dcc87f8d2d8e62dfb89fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-53aca78c2b71aacc822f7508e26b8d8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-6cd471916f03102419bfc2ce43f76e09.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-d7962457b9f0fe1cda7fdf789451b9d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-replace-116a3711d1ab72d436ec5c35678ceddf.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-replace-3d5b724b4980f24cb96bdfad9d38ad3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-search-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-sharing-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-0997b0e1fcb7c16b9cb4f5f402cc298d.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-39b1d1f60ebd078d2064f8fc42a6a86d.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-45704500e2fe99541d5fde0dba82eb44.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-57328511425c4e523d0fbcd1b2df1e0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-5914e98b8f19f72e002d683195cf84b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-607c512f0481cf565f88f66597dbe101.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-8a1c6c8c0e2f1e2277e0443f4946d572.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-968e9dd9430c57e6055a517f19a3f88f.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-98d2f4e2c6a41f3ef336107b39e46630.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-a5079326b62d5c755b0860e79f56c774.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-b5b87b7676de117a8342f94f403bc1ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-bc0054c93edc82fecefb873208e2d77c.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-cc701acb3e47b30801109dacbba292b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-d3827d64e2bdf966f3d9c111c132ea14.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-d859b6b56bcc909202cbeb832d5a6748.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-d99359e94988cec585163990a9f996b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-ed72aeba76ce6c9e43fa074b4806ae70.yaml create mode 100644 nuclei-templates/cve-less/plugins/better-wp-security-f3ca166a2636d3e3f94a1bc3eb68152a.yaml create mode 100644 nuclei-templates/cve-less/plugins/betterdocs-757fc98134d873ee7c2bce4cfa1cf695.yaml create mode 100644 nuclei-templates/cve-less/plugins/betterdocs-808772ef0715e55e48845eb09fe27708.yaml create mode 100644 nuclei-templates/cve-less/plugins/betterlinks-7f5e21acda03d1d7fde69a880719d61b.yaml create mode 100644 nuclei-templates/cve-less/plugins/betterlinks-f079e6954da62257f11ff80bfdb93326.yaml create mode 100644 nuclei-templates/cve-less/plugins/betteroptin-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-0e6fd2b1537d8a018f72311524eaf46b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-23eb31c668264c3c5aee5b4814654a30.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-33bf8f8eb63499d2436cf7f9e5a448fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-3c224c321d9ba7c36132b340a7d491de.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-4270b682ebfb5d58e498fa26615a2af8.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-53f4d866310c8c093dd280b48d69df62.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-85e7a548980a393d1ae0ce58883c267a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-a324da45179a3a5384dabaa9a7992990.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-a4456a392889d99a207556dae46d468a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-a749224e64254fa4b744badbc098456b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-a99d654d3052252ef402e0749a9ce566.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-b4b2a249b6f5481511775013e7ebd58b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-b82f68ac873a5cd389e13e2f431350c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-ee5009aa999f8729af055978227a592d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-f39e8e9f12f06ce6e02dc29ac3b8f718.yaml create mode 100644 nuclei-templates/cve-less/plugins/bft-autoresponder-fa4a6ca6cb5f0ed29a506220c9fcc52b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bg-biblie-references-9e36b0cf17e47fe4192107564b677097.yaml create mode 100644 nuclei-templates/cve-less/plugins/bib2html-94f4e4e5606b83b8d91c368a5ee77e4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bic-media-4f0f10f376030e01ed907ee127ea7f81.yaml create mode 100644 nuclei-templates/cve-less/plugins/bigbluebutton-985f213479d8daa64d5f4a16ef20cb10.yaml create mode 100644 nuclei-templates/cve-less/plugins/bigbluebutton-c390ab25927b32a9c95c398ffd819321.yaml create mode 100644 nuclei-templates/cve-less/plugins/bigcommerce-a40fe25194e0ab57cda985c21cea16d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/bigcontact-307decab8c86de849610b37252ca6e15.yaml create mode 100644 nuclei-templates/cve-less/plugins/bigcontact-61a7db517f3679fdc65455e830f0b650.yaml create mode 100644 nuclei-templates/cve-less/plugins/billingo-cfe50efdb1ba541e0424c762743e3772.yaml create mode 100644 nuclei-templates/cve-less/plugins/bing-site-verification-using-meta-tag-bc281b421f8fff950362929962ab0019.yaml create mode 100644 nuclei-templates/cve-less/plugins/biometric-login-for-woocommerce-cf14923d0b22ebbc7d1094e134b296e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/bird-feeder-028571cd7473a719693f2daa6ec95f68.yaml create mode 100644 nuclei-templates/cve-less/plugins/birthdays-widget-c350cdbcabbf0c6c2cbe275725809f83.yaml create mode 100644 nuclei-templates/cve-less/plugins/bit-assist-2a0968e3dc51c0d6442ac11d19f9e211.yaml create mode 100644 nuclei-templates/cve-less/plugins/bit-assist-5ca89842f69cd4e87dbd74d08645e3d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/bit-form-9d1eaa00002183482a2bac30ce7a0865.yaml create mode 100644 nuclei-templates/cve-less/plugins/bit-form-ec6c4566c5b89e861708c86d4c662f99.yaml create mode 100644 nuclei-templates/cve-less/plugins/bit-form-fc27afcbd3ffc5123db575382c98ea40.yaml create mode 100644 nuclei-templates/cve-less/plugins/bitcoin-faucet-1ad3a36baf4c9ef732b67d8d092f21e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/biteship-4952fa6645076ab711fade644ad856a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/biteship-a18213c9c980e2ab86f946c3cc789f65.yaml create mode 100644 nuclei-templates/cve-less/plugins/bitpay-checkout-for-woocommerce-bb0ef31fb16bd70576b63c47a36e1c9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bizcalendar-web-d5a1c9a6ee7e97f923697ab3631f023c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bizlibrary-84478af058257dde74ad587387b8e0c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/bj-lazy-load-2a10558db0160ae54882e46d43e98878.yaml create mode 100644 nuclei-templates/cve-less/plugins/blackhole-bad-bots-d6d7d32a1720382a929420a5407cae07.yaml create mode 100644 nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-8ba5840f6e2c5e47c69ce5e7a4b52e4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-bc595712854b7922ce7b557c9cf5ef0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/blobinator-2817b00f145ff05ea405982ca6e4d8ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-for-font-awesome-69676cf2f0074a9838e0f912aa1e46f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-options-009566ddcb125b1bb12196db82871dc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-options-3b363f50f63e2252e93a4eaf65f7fc9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-options-b24d1d3e12abe16b131b78c39c76f1e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-referer-spam-a9d78c30300919411b59e3816f76e46c.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-specific-plugin-updates-5d7f25544963dc4081c5c5f1f1e89a49.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-styler-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/block-wp-login-c30d74ab3c1dc1a9e7b14ed816c12f35.yaml create mode 100644 nuclei-templates/cve-less/plugins/blocked-in-china-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/blockmeister-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/blockonomics-bitcoin-payments-6e2bb03aadc9f84e5afdbf209dfee08d.yaml create mode 100644 nuclei-templates/cve-less/plugins/blockonomics-bitcoin-payments-8a9e3a258561fd11df73e03998dab8aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/blocks-3d078edbe634b7f5d57ec87a78fa8d02.yaml create mode 100644 nuclei-templates/cve-less/plugins/blockspare-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/blocksy-companion-10dffc5e6c324ec1dc8ebf67decddde7.yaml create mode 100644 nuclei-templates/cve-less/plugins/blocksy-companion-388e6ad87200512eea2e328c413a87c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/blocksy-companion-487e89618ab2c9b35b3c1576f9f20c5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/blocksy-companion-56a40035beb7c39c52fc3da1e76c20df.yaml create mode 100644 nuclei-templates/cve-less/plugins/blocksy-companion-a84b51b86b24a12fc85c3fc5e41345c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/blocksy-companion-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/blockypage-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-designer-bbf6652d4e763c9a7fafd94f884696c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-designer-for-post-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-designer-for-post-and-widget-c371054500c25911223fb4e88ae17274.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-designer-pack-940c3e462fa88340681bbbfe05c2ceb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-designer-pack-95eff066a45135b12edbc92f481f5d74.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-designer-pack-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-filter-0fe998643673fbc89bdce1d6f1c4acbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-floating-button-5dd5fb8b74d5846a17aa6d905d9963d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-in-blog-97602b372ac2dff313ee6b7601be8c2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-in-blog-e95a6a45d70dd7149f957cc2dea209d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-manager-light-2091e63be6d7dbb4cc291d8c18478150.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog-sidebar-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-0e2341ee2d418b0b91267b97433b22e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-21019b02ab939e1588f34c6a653e9f06.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-3fd3ad86b8b959b5f946903b7447c084.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-5b5598cebbb5b08b875d9ea03d9a72bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-73117910b29a1c368fce71745504290c.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-763aed0421435f4023b6ace21a8f066e.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-98ef59566a56f0d321854bb5454562cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-993cbe7cdb99fa0d1ec6b5c0bf18769e.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-bd94973d379cdc38fafbad6fbe8d2f5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-cefe6e830adb746b2199d03b92e9b0d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-edba2b974302ba40bc2fe3d88269ff10.yaml create mode 100644 nuclei-templates/cve-less/plugins/blog2social-f25219e94e90ee9c8edfde6f7652a267.yaml create mode 100644 nuclei-templates/cve-less/plugins/blogger-importer-86bf587683902d78762ff4957c96a94c.yaml create mode 100644 nuclei-templates/cve-less/plugins/blogroll-fun-d0c3cc2d1f4d2b123e52708c762c0240.yaml create mode 100644 nuclei-templates/cve-less/plugins/blogstand-smart-banner-6ccf09aa4f6f92564c1ba185250a9b6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/blogvault-real-time-backup-81a6f5ecaf1c598cd2e1db2f58c01ff9.yaml create mode 100644 nuclei-templates/cve-less/plugins/bloom-a2b478ab05dc0dd0616e45e762ef893a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bloom-a6745ab870958e9a36acad5aaba242da.yaml create mode 100644 nuclei-templates/cve-less/plugins/blossom-recipe-maker-d5a23abb517a497649fa5fae9ebed1d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/blossomthemes-email-newsletter-9c222eb6bd53905ec6dff84bf0b52c03.yaml create mode 100644 nuclei-templates/cve-less/plugins/blue-admin-2eb580b3f81928dc01b4da13b3317526.yaml create mode 100644 nuclei-templates/cve-less/plugins/blue-triad-ezanalytics-5427934b8eab07d0d5e4f82f464ce7f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/blue-wrench-videos-widget-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/bluet-keywords-tooltip-generator-7485636761a29a7581b6c5a9a59a849c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bluet-keywords-tooltip-generator-89c277020720d7e5b4106e25f34686a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/bmi-adultkid-calculator-3e4297109cfe1e3292757dea8d3ced9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bmi-bmr-calculator-08456b78a7e27d7a315067ad64f8b5ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/bmi-calculator-shortcode-0d15cc8e701957684f6f3b30c5023ccf.yaml create mode 100644 nuclei-templates/cve-less/plugins/bne-testimonials-aec5b406433b53e4f92df5e66d0bb478.yaml create mode 100644 nuclei-templates/cve-less/plugins/bnfw-659d041771a16c5c0a237cb39f903338.yaml create mode 100644 nuclei-templates/cve-less/plugins/bnfw-8eba613f6cf1178ae1e4bc455157c83a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bng-gateway-for-woocommerce-9c98e07f9de6c1ac362dea3f4f9b98af.yaml create mode 100644 nuclei-templates/cve-less/plugins/bo-wc-customer-review-watson-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/boilerplate-extension-6d4992572a9f9bd5311ba2254f8b32c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/boilerplate-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/boilerplate-extension-de9c08ef64270e7677f62d388e0cc26e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-005e163e7b395198e1ed48634c687240.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-1c83761e8850a90348fc378dc1547a09.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-2109981df34c3c3e10e9a3ff3ab51437.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-48cb8d5c20069dd21ff6f85ee4f57b84.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-5289bbf92c9bdc3c3c0e4f0086563240.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-5b50680d973f4b29013f914d7a1b34f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-7f9f186670238d7e784b2f81e1301181.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-7fcbda1cfae66ee74a18ccdfe4753dbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-8b94055b335b8fd181b35e0e5b73b692.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-8e1e2ed917edbc0807da4afd84ddc7ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-9f377f95856b4156effc9e05a81da19a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-b332e32a470aff42684e131c72a2c94a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-dd7568e4d3ea5ea32920ba4a6563336b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-page-builder-e2f4a51da7010a4270e848488a346f79.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-timeline-lite-263cb8027fbba6881585c49ec8985e2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bold-timeline-lite-d090aa5f37413bd2a82801bde518653e.yaml create mode 100644 nuclei-templates/cve-less/plugins/boldgrid-backup-a66a38c6ab7f828962843ef151472f92.yaml create mode 100644 nuclei-templates/cve-less/plugins/boldgrid-backup-faa8cb9cb5e4fa47467175ce98c14091.yaml create mode 100644 nuclei-templates/cve-less/plugins/boldgrid-easy-seo-cbd6f11a9e82c5a5f837c5dd0976e92e.yaml create mode 100644 nuclei-templates/cve-less/plugins/boldgrid-easy-seo-facd15a60590ce98592dd0da5f942c33.yaml create mode 100644 nuclei-templates/cve-less/plugins/bonus-for-woo-d1a09c4c8a10014e2eab3f97a79ce973.yaml create mode 100644 nuclei-templates/cve-less/plugins/bonuspressx-fa751f89fc374e558e8d01ea059343f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/book-appointment-online-edbb23e6d1dd3c6d3b98a72a827de16d.yaml create mode 100644 nuclei-templates/cve-less/plugins/book-buyback-prices-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/book-press-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/booked-42e35e0cb682e934fb2b734db4cdfce2.yaml create mode 100644 nuclei-templates/cve-less/plugins/booked-fb0b66127fc8d6704716bac309ccc3a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-279486597ac6d210058519567f6297ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-2f651d26ae436687bdff9a8abab4a173.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-64d2238bd20222d178f28431616be0e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-6a265db2a9121f4da4875337b8e6751f.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-74317d53fd76ca3a1801e928aa95e907.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-871ce8145600084845b667e836bf190e.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-882a83d7e6d94e3f6111d1f0063b43d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-a720a32e95724b99f716e58fddc9c585.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-activities-362486302d19ffc4bedbec14216dc7ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-and-rental-manager-for-woocommerce-de725b70e5d07ce131e255467578f038.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-b3c2fa102dc78b18cc1d35e379c8dc7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-0cfb154efea7a6cd97d79b7c9bd11b19.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-52b3904a98bc3991ae688cb27d9acbe7.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-6a9d80e8fa30f682db502c67279e3ece.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-78f758aca2b7adcaf11ee6e697616163.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-86234e029258ca45a99eefee2aff4d20.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-88138db1d1aea177c6151b845da287ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-88cc9361682247d3851fe23cf11de139.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-aacd8cf9b8bd0dfbb9f05d6cc01da96f.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-c3498fe08662af21fd3da077be763084.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-contact-form-2c05a2f96b41f067812b952900469965.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-contact-form-5e09860a3e9bed6cd5fc9927ca9a87b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-contact-form-66b0b9e68fee422256033ff3686e7914.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-contact-form-8e9a2657d58363938f72aae51c6cd0a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-contact-form-ce69ee3276348a391868ff2589e7f8b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-contact-form-ea7f2b8cee8445bfd3a6af9dd8ec1877.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-d11c386e86541e81dcae4e94a2860a10.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-calendar-e44a87677c68a494baa8ed72b523a10f.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-e064d299c84a7a932db5e1b086223b4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-e9dd2b4943d62b4d4eacb38332a5b454.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-eb4b31f33272ec5c989c730f7ccb3d9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-manager-701997e59be83cd9ba4ad233278f4aaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-manager-ffbb08b3382f9c076d19dfa65caa3e3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-package-6104fab3d6323129ecb2671e037b46ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-package-64d367b3cacb5cf8c295e6ccc3504c04.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-package-6b73dfda9277bb390c84251b69303827.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-package-bea3389dfa395e208890fd90e5f6c66b.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-package-eb4f476f66236ca8f6047b9846303766.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-sms-167d9672411be44feb72a5175fd0987c.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-sms-a5d93553709e3d7ff537bf5a7307a899.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-system-044e0b800aae833468f672b3d52648b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-system-18e973bad98be5b94dffe02819323b60.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-system-1cab2d59082ad51ce28485e5e2656cc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-system-38e29be67779459d45a16e8dcf062abc.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-system-47ded31f222bc2d2f0264df68174ce6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-system-7983ddc66df9d17c37dd89bbc4e4f416.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-system-b9395679d8a85b69727aeef7e08a5667.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-437e935b70b10e1a496119f3d8fbac5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-5b1c2add49d2a47b01ab11a65c17a099.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-7075591051dde0bd8bf5f75302619dd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-770cacdb7e6dbbed594d0162d09eaa1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-946e2c8cf66089d544e720fc4e253df1.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-a730585b1aab8262e7f092340f9d0036.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-afe05343ac8d22a01c8645d538528ad3.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-b37c04c35cc1fc9903c14f0d3df33b2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/booking-ultra-pro-cec3580e3bef11008dce66e6706b0fc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingcom-banner-creator-792631ba5cdfc566598ea26dfe895270.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingcom-product-helper-97d71a5a3da44a42d764845b5a062c1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-31c57dd6605d62ca0d6cd98ec04a3787.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-631d4cb99a459c16e4abfaa250ae1a0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-65f544c282d9d1cc0fbf1f6438a4d682.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-6afeb2ce393f64d78e2ee60294c65cf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-7012d2201a7455c1e6a2f89c3d28d2a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-7693fcc00d13cef3033e8801e5f162a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-8e84c6d55a38a50c9e90b28855791a03.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-939a2361df462af629884dcbb9b0b778.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-97d20ad28c50ce54c99b6663434336ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookit-11aab719a7f95d840a71a26506348060.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookit-3617ec07999a872e306f9b352b63ebdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookit-bc903096388fe8f2ee39329af87a5f0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-1609915cce06136e2f0af7da1d5a5d40.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-5e7a34d7ec594c161e3b32965c332df1.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-8001bfb6e3adcf1d41f5f6700841da72.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-818af94ff212e6efa6d6c820fd265294.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-8558d7a24f00d0b4c6ef650bca69a892.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-9ae477d5648cc901734eab0eec621bd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-9fa7c4fbd0089213898129a94fb855e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookmarkify-2b409575c7974f5c970ac5bf63b20b84.yaml create mode 100644 nuclei-templates/cve-less/plugins/books-papers-01ed1eb8aac2e68ae5c276ba61ed6aed.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookshelf-0e3f0bd6a580d466d037adb8757f5f4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookshelf-6ab8d1e005858a4b8a6347eda74e7ac7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bookx-a1af99e36ad926e6fbfffb28e9e0b399.yaml create mode 100644 nuclei-templates/cve-less/plugins/booqable-rental-reservations-aa0b3a997f2af2400ed5816a52c96615.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-2594adb9a7b091439405e835629ab066.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-2b5138240155c353b3e1835e93054ec3.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-882bdd3fdb6681642f156a22924c9a36.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-a64fce4b936462ae9966af0a7b1ddcf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-bd1638a89aa7173589958124d15f2afb.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-da8ac31a9cff4acdc3e67efcf5be4751.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-ed8996a111dbc40e1e02c2318552499b.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-extension-1f9b8670b25d19d8fd0aa7ae1c76967d.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-for-elementor-37d5b7622ee837d13b79238620e127af.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-0927d29209569b3fa6ca414e42a83816.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-127ab045dd12eca20b1f05cdaef8b291.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-1fe649382158471b98650df856d70fee.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-2594adb9a7b091439405e835629ab066.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-3ae6c1779315005d2af44a96ee77af2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-672dfc933502a4edaa8116764ba522b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-882bdd3fdb6681642f156a22924c9a36.yaml create mode 100644 nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-f91c2602522656e11d82af368c387634.yaml create mode 100644 nuclei-templates/cve-less/plugins/boostify-header-footer-builder-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/boostify-header-footer-builder-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/boostify-header-footer-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-0063be3832ab01645d83916172a49901.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-1c682460ea1b975e2214df2ecfd2a316.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-3cdf082bedfada27b24599e0f1cfd2ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-4162fc0aa9f89a19a3b0d9a16f341e8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-548b1bf05be2eb1395c8483d4525a9fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-56e13ca8937773de3612c03bb63c62f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-5baab614c3a64c60d1e33947fef5d35a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-9fb1ec0e705e68a81b6b6afdf66e55e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-b9a97b0935a5ed2529aec7b450e17238.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-dac296fb931bf261709dca85eb4e38f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-ee646c363ad3189cf7438d75312013e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bootstrap-shortcodes-f8952c598fe28f01e932d940cff08de2.yaml create mode 100644 nuclei-templates/cve-less/plugins/border-loading-bar-0355d1e8eb46bcc87e42a81e780a30de.yaml create mode 100644 nuclei-templates/cve-less/plugins/border-loading-bar-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/borderless-2504b2285582e1e86e6e013779bb055f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-activity-filter-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-activity-social-share-0c3c59a360a5bdbf267be8b305e5b01c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-activity-social-share-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-27610b5571a30e556b64bf5b8d096808.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-453a8422f88d4cb86f0bfdbbb1968f0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-83e4f665f1af2e601634717e68062856.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-aa4a0e71714152916ddf88945c46dfa0.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-b9ebb0412655a1be395c1fd4d44393e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-bcaba1132a8ac1a695b97d03ca9be0db.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-c908fd3552b679e573e25a7e48dd7e10.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-cf8da83f0f83eb1a574fe335e5527411.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-better-messages-e17bce1a8a59b23cca6c3786e7d0e9d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-check-in-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-create-group-type-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-gallery-6cdf919648d82bb79f7fd259426a9e61.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-group-documents-2954406cfff461fdbbd41cca0f0b5dbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-group-documents-377c33087f53eb5bcffb99a599fdc127.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-group-documents-37fef8959e103795e5217ab4860bd85a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-group-documents-3a30cbb34610b918136a671069241bbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-job-manager-integration-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-profile-search-7be20794431b31f1b6e43bd0f8a27ca0.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-profile-search-8abf5a60713230c7b3ea5764184f876d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-profile-shortcodes-extra-1c0f40dcfb4caae9a4327cd7172a7b18.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-social-connect-93264bce58bf86815d047dde89423fc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-user-profile-reviews-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bp-user-to-do-list-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bpcustomerio-25ee6eba4f05265a07353f4c20de2e87.yaml create mode 100644 nuclei-templates/cve-less/plugins/bradesco-gateway-3dc139e568d48b3719f09d74e5c6ac5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/braftonwordpressplugin-421b45189c95e21b02ed0def677eee30.yaml create mode 100644 nuclei-templates/cve-less/plugins/branda-white-labeling-5394ed5bbbdcf7b65cff8921a9a68e7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/branda-white-labeling-7c37f00fa8e3ffb07ac6ec246eebe54b.yaml create mode 100644 nuclei-templates/cve-less/plugins/branded-social-images-296dca83f7d30b213a3d42f8baefd9aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/brandfolder-05453cda2259f2ed6f2379bbfd9d67f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/brands-for-woocommerce-3bc18921bc6f3f90e04d9001cf0b809e.yaml create mode 100644 nuclei-templates/cve-less/plugins/brands-for-woocommerce-558e7a9aa7fa3c2ac2fdb51e4f62875d.yaml create mode 100644 nuclei-templates/cve-less/plugins/brands-for-woocommerce-825f1e0aa5ff97544f2d8803cf6504ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/brands-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/brave-popup-builder-997d1000e8574991f2c13cb7aa2ef7b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/brave-popup-builder-9cb937babec24c7a5f1e798bac3533ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/bravo-translate-ce76e5efada5037a3e4a2325d3d70d7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/breadcrumb-27fbae7541522bd11e17939b8913ef50.yaml create mode 100644 nuclei-templates/cve-less/plugins/breadcrumb-navxt-32e0114d44072a3612b1116316fc4009.yaml create mode 100644 nuclei-templates/cve-less/plugins/breadcrumb-simple-8507164d3055217cb96ce83c182ad6aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/breadcrumbs-by-menu-49ba2e496df198082592a83af2dd4d61.yaml create mode 100644 nuclei-templates/cve-less/plugins/breadcrumbs-by-menu-d4f39f41edde6809c1e3f1995c35c774.yaml create mode 100644 nuclei-templates/cve-less/plugins/breadcrumbs-shortcode-47b99e01cae37cb070ef3a81700bf8b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/breakdance-b2885ea30200f7cd94ec6f28c25609a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/breakdance-f5d920633ee9565486368ab785adab3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/breeze-310b89b29fc26cf3b3da141667d5a42b.yaml create mode 100644 nuclei-templates/cve-less/plugins/breeze-59a7cb3ce7ab42429819a5af71285080.yaml create mode 100644 nuclei-templates/cve-less/plugins/breeze-d2df0429a7a8c5673deb89d4cce4e2fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/breezing-forms-f47477188afe1a9a9b869f9c5c6fafbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/bricksforge-08c2f711dab885b1524ebbd7b0782f00.yaml create mode 100644 nuclei-templates/cve-less/plugins/bricksforge-20d94fa7cbaa795926bd10e9c360bcb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bricksforge-fe10205699bf88a71e4460031e80e0cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/bridge-core-3b4f016c7ae4d3dd29540472e7fdd513.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-223fd164cbed0be2e156fefd83517bf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-22707a3d55e78cedf2f7dfb41d94bfbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-2731966af274d5e5b3eb099c6bdc40aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-2ea9b11139987a1bb9095ad4e4be45bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-44eea350bc1338780b2a377c7a4acfdc.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-475d1ffae41ddc61dae5fe3b295751d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-4f15003c85cf67398b6ba79713bb96a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-51d48891356faa4b5ee750ea40af7e8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-7310ba3269deb60929ca945cac8767e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-7d6d564d16561c7bab08d495e46b51fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-827a8d5ffa28fd47c13e94e0a15edf68.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-9ac7de23b3d67dbdcd278f6e1494759d.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-a5ce2d4f9e1b1bb323f57b01146d769b.yaml create mode 100644 nuclei-templates/cve-less/plugins/brizy-a6227d9d923140efcf18978d7c277e53.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-2c732f7d3e8ac28c93dbfa9cd10c3d81.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-3120d6067a3e5e251eec4212f4e5aeb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-4673047ca29ad4630d7b8bb30f727df8.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-4787aca2f4649ac09a5532468944b982.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-64556376243051c6c3bc87690377ce32.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-a9a979661add0df60253539d4415e8c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-bada82132f6cbfd33d5760be8742a9cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-e1d1d0387e0e80a55061f8f78f966bcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-checker-for-youtube-e58df3f9e159a90a2b75adb9058879da.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-finder-ae16dab4cf6e57b86cebb9a4da6eafa8.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-manager-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-manager-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-manager-47bfe206cfaf86d87b1c99f3c44195fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/broken-link-manager-4d4a758d5270914e8644a21140cebd3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/browser-and-operating-system-finder-48dead1c8e1154d67ccc9e390d285269.yaml create mode 100644 nuclei-templates/cve-less/plugins/browser-and-operating-system-finder-99e41ed657ab27362dc617dd94edb65f.yaml create mode 100644 nuclei-templates/cve-less/plugins/browser-shots-e8da5022574661b62f1a47c50584d384.yaml create mode 100644 nuclei-templates/cve-less/plugins/browser-theme-color-b6c60215d191e78bbb1469004f73341c.yaml create mode 100644 nuclei-templates/cve-less/plugins/brute-force-login-protection-48e518f6131232316ecd7bce4c25cf68.yaml create mode 100644 nuclei-templates/cve-less/plugins/brutebank-dbb7d441461d213063eb891cf460c431.yaml create mode 100644 nuclei-templates/cve-less/plugins/bs-shortcode-ultimate-c6a7ed723d2b968d4f9df70823302086.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsi-hotel-pro-bfcbe695fa101c3e16c8d87ef093b6cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsk-contact-form-7-blacklist-ad738a9e4dada70c7860d495c6a31281.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsk-gravityforms-blacklist-9d98910f079017bb745e5dfdd7b3a383.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsk-gravityforms-blacklist-e0096662f4021341254048a6332cbd3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsk-pdf-manager-127715120e5f598c6f6d3ae7380f9898.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsk-pdf-manager-3a7bd82599c0011e05818b715925a7ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsk-pdf-manager-a6117f5c5b129c85596c75822f81da17.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsk-pdf-manager-f85f5bca86f0fe8e61b822a458c1b11f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bsuite-596c399ca77f6898f5eb2e3e553223f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/bubble-menu-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/bubble-menu-7343e5b259d4e1cfb4df95c545aa69f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddybadges-0b4ca30f3ad4ec80ff7de93b32a4ae21.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyboss-media-1cf8853774794c9a185058bff3041a9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyboss-platform-122921564a68def720b196881ac65cfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-004b4a4b5a4f50cb7e2b7f31cbe37f6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-04719c2aa85ce103d2b347cbc1de6bf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-3c4ad527262d00d607d5c7466a5e3a23.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-4f1bcfb6c80585124e17859286f212d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-5a3c975faaff05174a403394f594d251.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-6410ce52f11ad48713df208e717c6bdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-6c9eb31202fa41d32a09d5fd559fe8f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-acf-6f39f76c23209b8f553defb1d25caa0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-b917e284e5115c137684e2852a491ab5.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-c0fe1fee8a4f48d20fef6e8a451cadaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-e466bc3583e942d1065171a722796cc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-easypin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-hook-fields-cff8c4e5924684eb6753231ae69511fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-members-aa1e46c69c06ec911dde69a16f67cb87.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddyforms-review-3d4fe5743b4cfd3fb11de9a33d55f7f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddymeet-848807325cc6df7207551325cd628ce9.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-08cd70ed7dd5c5c6156967f8c0e81815.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-13a0f9bc92fbfe82f8148720984ec395.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-172545cfbc947ee677d3a8bdac5e5224.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-1d7f1035caa311db84f335e8b5f7ce3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-1f93d822784f1c50c03c1335049e7dfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-376f3b7be651ac6251ca8825ec683915.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-430f35a9a91f48c97c43930a9ef1c8e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-533ee8fa484df21d792f06431e1c5c50.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-5fe17c2fd9a91ee4cda8ff9e79dd3204.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-863062f7cb6b2bf7365f623cc8d292ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-88c5b961644bad4c49d63ba50954d1ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-9a2cdadfd3bcbd9bf749adf6574068df.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-activity-plus-5f432c656be335dcd6d93a860c52a8ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-af97e64423b75225062fc5e60d8e5fa3.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-b60bae014d152f2a394bd09bd7490303.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-c109037c5bd54b61559d2af24279cf52.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-c3337fb47eeb04c822819fd17c433268.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-c4124b2dee30c6d41a48f0a55354e6b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-cfcbf4a057a79e8a98be0e1376a14728.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-check-ins-pro-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-d0fd9cc44e353f2e6039b73677016f83.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-docs-8dce3163a90bed75fd5b9e557a28f3b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-extended-friendship-request-a103c2e3cc97ab522767ac0230b22480.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-f3ed5f14a02e2bdcce7190205d484a67.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-global-search-ed89c8160fc54a5150ed5e4f427981e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-hashtag-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-098044594b04ab841c349ed64a192c47.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-143b187563c9f2554688db0c6157a5d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-5185077331b584e736df6ae601c45310.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-58b37148ce0bdaa5522c3559b2f37ff0.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-85898493501c4d75829911d4553b254e.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-8b2a21b8747d982584ad7e24dffd2d64.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-aeff462ac51a8748cbda344eafd679be.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-af05e39beae4ccc85b4b7733a1dfc389.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-c87d935ed7b249bf9a1f11f3472af3e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-d489286ed41649bac6a4b978b2c38ed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-media-dc0051edab31221e49ae9364dcda380b.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-sticky-post-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddypress-xprofile-custom-fields-type-5299c25ee2ef36af65c119614434bd1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/buddystream-f5631d6e08f23256931384659c340b7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/buffer-my-post-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bug-library-16a4534effaaeb1466ec5e74fc661c70.yaml create mode 100644 nuclei-templates/cve-less/plugins/build-app-online-02a886272dd2cdcd86a1f09e85f56770.yaml create mode 100644 nuclei-templates/cve-less/plugins/build-app-online-26189f152df8893b52731b2bdd16e94e.yaml create mode 100644 nuclei-templates/cve-less/plugins/build-app-online-af6a1540ae3f6f386fc5dcefbac66cbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/builder-contact-ffaa84c2ddc8dc8e320dfb0fae85b11d.yaml create mode 100644 nuclei-templates/cve-less/plugins/builder-style-manager-f87c4c6d53b29231a0f57635f4d257a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/builderall-cheetah-for-wp-262146db4fdf9dc0247b51f04e7c7b5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulgarisation-for-woocommerce-b71f43cf539320adcdf753a5632e031f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulgarisation-for-woocommerce-f361db7993b168bd9190093a1decfa83.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-add-to-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-attachment-download-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-block-converter-c38ba88828239a3fc9d444831fba05d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-change-09f74f7b9db91816c6e2bc32700d99d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-comment-remove-5508f1f637e90aba06cb7afdc5129513.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-creator-c3fa207f4b7e44a252f8db84f79dbd3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-datetime-change-29b5be50bbb53513769398d4dbd36872.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-delete-24cf0801a4963f154c38e24267fc828d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-delete-users-by-email-66ff52bda667dbc0abbc88dbfecf89ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-delete-users-by-email-aa16febdbc946ef586052ff28c269ebe.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-edit-categories-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-edit-post-titles-d1e689eb00e15a822c5a4bc69f8d4926.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-edit-post-titles-e79dfaa6d6a126465f94617b43a94699.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-edit-user-profiles-in-spreadsheet-4f2b194ecb7432206d5e63b6f9923644.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-edit-user-profiles-in-spreadsheet-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-10360815e5a20aeed5671b4b975451a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-4d37b5938e435e55d1b784b692eb0059.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-78b9d1af7b3a60f9f86a06190eb42653.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-89b2790236539e015ae4e5bc957d832c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-8a1c3cab2f9b4de5abbed7eadb500759.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-c2e59525aa8afa93502c3fb0824f336b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-e34822239e7a06946c13777f1af5a66d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-editor-fb0e4f9dfbe427b130769e6af2734cfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-image-alt-text-with-yoast-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-image-title-attribute-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-aab8828fbd21352e7bbaf9cbf0ad1810.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-cf39fd16fb8f788c8db751f0dadfb29c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-eff805b4d7ec1d79e32d68ca80330ad6.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-page-creator-8f6754331835c0e520f1fdc12e539318.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-resize-media-bb9fce36721cf5452da89d5517df1cbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulk-woocommerce-category-creator-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletin-announcements-0716e418df849204967cfc79352f5ba7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletin-announcements-246b8b56564018f48400096509996111.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletin-announcements-5eb89c28ff961004bce910abdba4c1a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletin-announcements-a1b8f44a7ac7bccab5a1c94f60d1251a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletin-announcements-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-05b396118a681cd132367b6e58e8468f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-123845e838da3a6daa580f3b2ed445cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-2269359ddd46edefa6d111262722719c.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-42f3a7532bbf8a08643a30303225bc1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-5dceb192e7c190761b3c97b152cbfe74.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-69678c7361dde97e99f926d45953a3db.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-80f01f8956a520ccda68d02885c8eaae.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-8d9d8e003ce03da674f1adc87ce55135.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-a2ffed6de9ed93ebd568a9a5d4586523.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-ae058acace8503cc8d5660ee1d5bf68e.yaml create mode 100644 nuclei-templates/cve-less/plugins/bulletproof-security-cad2b6b8af5079972fa1531cce991f4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bunnycdn-c7b13d17993dc7e235bed80189f9bc22.yaml create mode 100644 nuclei-templates/cve-less/plugins/burst-pro-106e6826f0718372efc6e503171c8663.yaml create mode 100644 nuclei-templates/cve-less/plugins/burst-statistics-106e6826f0718372efc6e503171c8663.yaml create mode 100644 nuclei-templates/cve-less/plugins/burst-statistics-a36b6c8064388eb19a8195201a1f8d8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/burst-statistics-fd93b73cf46336153d1b2692824ed6b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bus-ticket-booking-with-seat-reservation-2954a20fc20c80e75db1c146dc2ce5bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/bus-ticket-booking-with-seat-reservation-dec87833cedb03a8980db3616c32b95d.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-card-by-esterox-100-5e4c1e870696b3efcdbf85ce990788dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-card-by-esterox-100-7fc47d45293f896fc846aa4ca502d2b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-card-by-esterox-100-8c18151f3e9775aa380622b4246d4bad.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-card-by-esterox-100-95fc25676cc1a333e3b3171b175734a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-directory-plugin-167e61af371a8f35ae376105d3215900.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-directory-plugin-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-directory-plugin-3950561f5b69ad2aadeaa54bf293ca85.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-directory-plugin-3fa1d19f6ab4b3b413035e0d19283cea.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-directory-plugin-6896fd40fd840eb45a889008aea0c67e.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-directory-plugin-70e9f9d703b7871b412f99e0b65bc826.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-directory-plugin-c7ee5314e18860cb525cd22fac24dbf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-directory-plugin-f1a649593702eb632f6f553b9ae25e5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-hours-indicator-b0f7eacb55c0790170a8a4009593c548.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-manager-24e7ccbee7ca416ae56183733be3750e.yaml create mode 100644 nuclei-templates/cve-less/plugins/business-profile-828427f0b9437525d7829a16b68575dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-3e24dfff2b5771f43f4fe5ad4a241e28.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-63f1bf4087d9427b6d24f67f8ffe6d66.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-contact-vr-978cbd8cd586092e7c39e28ce0b70684.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-generation-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-generation-0ad7f5a9c3342b7aeba5a03db14c71d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-generation-0ea9d75794d2c7486ec9098022942b0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-generation-42e2e881f29393c821ce6d432bf2a46a.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-generation-82603c2847e2ca1ee15bc23d829fbc4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-generation-913a26462c41f8def73f8a9767771136.yaml create mode 100644 nuclei-templates/cve-less/plugins/button-generation-fb1c9dec29fbcdf7eb9112a479b097f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/buttonizer-multifunctional-button-456677c70a49bc1c088cafa5c6ef9da9.yaml create mode 100644 nuclei-templates/cve-less/plugins/buttonizer-multifunctional-button-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/buttons-shortcode-and-widget-b4d222d7f6fbba49026992c33a4f820f.yaml create mode 100644 nuclei-templates/cve-less/plugins/buttons-x-f3522c3cb0ccfb1220b311f9a238555b.yaml create mode 100644 nuclei-templates/cve-less/plugins/buymeacoffee-0caf8903231ef8666af5245315083b74.yaml create mode 100644 nuclei-templates/cve-less/plugins/buymeacoffee-514e5589e35f6de5b251e63d9ba1561e.yaml create mode 100644 nuclei-templates/cve-less/plugins/buymeacoffee-9c9be48d36983f46c1dafc5a934e6547.yaml create mode 100644 nuclei-templates/cve-less/plugins/buymeacoffee-e74780b7e51cbe82d58b11a6033838ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/buzzsprout-podcasting-469ce07115e491efc4cb1c8371dce59b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bwl-advanced-faq-manager-1fb9c20f2dc722c53163029233b7680b.yaml create mode 100644 nuclei-templates/cve-less/plugins/bwp-google-xml-sitemaps-e5558e0a5f22ef3f76543aa9614d9789.yaml create mode 100644 nuclei-templates/cve-less/plugins/bwp-recaptcha-2fe5526a4726214454b149388de7772d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-featured-posts-5c14fa33e85650f1c6cb1512fa1848c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-google-analytics-1758588699ac13a0da770bd7cd456b77.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-google-maps-f5ede402fdf5293b860276b605ce4e8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-latest-posts-2af654d4e68b70fada0ba70d7ef43915.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-linkedin-b2f000587e20cf237a45ef2d6036a9a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-pinterest-e64b2928f117109f88452f28d939f5ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-popular-posts-baca13b0bce150bcaf2ee5c05eb2cc1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-smtp-6356cf8af8f87c1115ab1b364de5897a.yaml create mode 100644 nuclei-templates/cve-less/plugins/bws-testimonials-11832d8ff71b77f5c5443c834508a4b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/bxslider-wp-629a86e61ae281b9190188a5f16e6d8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/byconsole-woo-order-delivery-time-9473021a502a63a62049e1b92de7e47f.yaml create mode 100644 nuclei-templates/cve-less/plugins/byconsole-woo-order-delivery-time-cd5b979265c6693d84b238525b6e2413.yaml create mode 100644 nuclei-templates/cve-less/plugins/bzscore-live-score-192e415b611335b3538e5f2af9fbc394.yaml create mode 100644 nuclei-templates/cve-less/plugins/cab-fare-calculator-850cdc2bb11e2c84c49d36aadc35f92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cab-grid-e859444e797e41b8d664b82e23a899ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/cache-images-0c97fc31b35102d21ddbee9abbb4d9fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/cache-images-182ea68949b1ee6faae255d4de23157d.yaml create mode 100644 nuclei-templates/cve-less/plugins/caddy-b41c7809a15dd29e69a83cb3726570dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cafe-lite-dddec61512fe66c6bc2775d423f59680.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-139d1504f66cd87031fd329a5f49ab94.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-13cb55c1f508982488cee2289cc6f8a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-447e8d03dfe04fdb92ac705bfa6b054a.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-4b4ac88975e8590a6a5fd0cf4302a336.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-4c3327ab228513e0bba5f6564699d19d.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-83141551066454cfa3570b7b645030aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-a09cb353956813c158f3eacbd53365c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-a7620f303af6467e51bdd4f84801b80c.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-b6900545e2e4c40eddb286d1788c8880.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculated-fields-form-d066e564c9d177f69ad8edb9aa85d9a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculator-builder-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/calculatorpro-calculators-bf9560c62dd0208ea0e7d6c1046859e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/caldera-forms-768674b25e725613816286a9dc3c4233.yaml create mode 100644 nuclei-templates/cve-less/plugins/caldera-forms-7c34573376626471f92815a30e26e5cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/caldera-forms-b4c4ff584d962e0bfb58568b73a5ecd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/caldera-forms-cc7f0854e90c58e6d36843a97af2d437.yaml create mode 100644 nuclei-templates/cve-less/plugins/caldera-forms-dd0b75b6278e9d9ace01e3d0f5ed462a.yaml create mode 100644 nuclei-templates/cve-less/plugins/caldera-forms-de09ecc40e8ef125eed740508fee8b16.yaml create mode 100644 nuclei-templates/cve-less/plugins/caldera-forms-pro-af5db143583f026b4ec13d0e53264642.yaml create mode 100644 nuclei-templates/cve-less/plugins/calderawp-license-manager-b88cf8c0086678b4179593db6bed64e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendar-05d1ff035c1fc3b076e51a7b5c7af2a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendar-2ac1b11dfdd4d8aec9aef19739eee675.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendar-610a8079730189f1c51d4e425058e93f.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendar-8b25a4024805d97b0bbe39b2b083bd09.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendar-booking-b0ee79ee6bfacccc5c859ba67a33f0de.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendar-event-09740a555ab133389f0f6571fce0ae84.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendar-event-cee3839418561c0992d928e881decc00.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendar-plugin-27b6ebe3ed4381bb3c55ec596f477456.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendarista-basic-edition-7ca52430035acd6a97700e0a1293791e.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendarista-basic-edition-be21de51738bde44b4ff85eb79707aec.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendarista-basic-edition-cc489789b5cb387a9c3918987d9c41fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/calendarista-dc0d3deddd939ceb7da2b7a2e45dc103.yaml create mode 100644 nuclei-templates/cve-less/plugins/call-now-button-f1b22b19f1452ccdd593cc23416c662b.yaml create mode 100644 nuclei-templates/cve-less/plugins/call-now-icon-animate-cfbef64f1e1fba4c3a45a9c3c672157f.yaml create mode 100644 nuclei-templates/cve-less/plugins/callbook-mobile-bar-2ea25ed58e645deebc4c9ee26219463e.yaml create mode 100644 nuclei-templates/cve-less/plugins/callrail-phone-call-tracking-1c049cc07d2d3d3aff9e887e6aede6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/callrail-phone-call-tracking-4e96ec415742df4383d4f15264a5ba1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/camera-slideshow-010b13dab325ad4db18460bf37133fe2.yaml create mode 100644 nuclei-templates/cve-less/plugins/campaign-monitor-wp-c8dbdfc73ab33e8afe0f3263d7ef0673.yaml create mode 100644 nuclei-templates/cve-less/plugins/campaign-url-builder-a735151e1a4f287ab4567ad75cce9a30.yaml create mode 100644 nuclei-templates/cve-less/plugins/campaign-url-builder-fdb6580a9b4fe182559a2e3ed6c65f0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/camptix-1b1736563be4cd48928200e2f20f46f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/camptix-6821f0debd453e2dc059a8ca2d3fede9.yaml create mode 100644 nuclei-templates/cve-less/plugins/campus-directory-aefc22c7a60a7d5e0b05b0ef2a479b2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cancel-order-request-woocommerce-5b5a80245567937203123aecaa90cc27.yaml create mode 100644 nuclei-templates/cve-less/plugins/candidate-application-form-f979531e448b7af410cfe697c4a56a83.yaml create mode 100644 nuclei-templates/cve-less/plugins/canto-01407881ecb8410d18cf22fb6eadefa6.yaml create mode 100644 nuclei-templates/cve-less/plugins/canto-3a9821f8d5cc2355d8fbcd9465b098d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/canto-5bb05314b65c718b289ec510721af0ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/canto-5f3e8a4fee8c983cab0188c7dcf05d7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/canto-62aaab2000dfd7cd8870403602e59565.yaml create mode 100644 nuclei-templates/cve-less/plugins/canto-63e4f5d4e15b76376a440d71c38d9660.yaml create mode 100644 nuclei-templates/cve-less/plugins/canva-e04c0229e8744dd1a1d90594b9aeb97f.yaml create mode 100644 nuclei-templates/cve-less/plugins/canvasio3d-light-07f4ebdf99bc6bc543918be1a478a57b.yaml create mode 100644 nuclei-templates/cve-less/plugins/canvasio3d-light-85fcd9779448a368c2c74d702cd2f30d.yaml create mode 100644 nuclei-templates/cve-less/plugins/capa-aacd4552800caf4d2cb49989fbc6ad61.yaml create mode 100644 nuclei-templates/cve-less/plugins/capabilities-pro-90e136f1c49e3c12cb6162b882a23711.yaml create mode 100644 nuclei-templates/cve-less/plugins/capability-manager-enhanced-7230e34e5bb18f402b20042366cbe3fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/capability-manager-enhanced-90e136f1c49e3c12cb6162b882a23711.yaml create mode 100644 nuclei-templates/cve-less/plugins/capability-manager-enhanced-df1f9aa06bdcfa30c9c48b598c66ff46.yaml create mode 100644 nuclei-templates/cve-less/plugins/capability-manager-enhanced-ffa44387e06e48e98303b52781d92b69.yaml create mode 100644 nuclei-templates/cve-less/plugins/captain-slider-c23ce008dc2473271851552ad5775c2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/captainform-84e047e46e28d58fa1b7c6a8e2da02e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/captainform-d6b551c8eebbc07aebd60fb21b086030.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-06e4153293e52f8c9043f9af68520509.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-37bc6be0c6a9c157c75ceed9ddf9d26e.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-bws-eadf748bcfc719d5710c4f372c6fc3a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-bws-f2483f1e9fa6d9c3c1a5e1dc23e31a6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-c4ac4eb73c727fb730c8ebeb8d318861.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-code-authentication-31a8072de701550e4edcf2604b9e23bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-code-authentication-870cf9f4b157c60e42faef24d8dd195e.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-for-contact-form-7-1aaed89497f863004f63bac937997897.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-in-thai-0b74c8fb0ed5d80d8d86412fe0ecefe0.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-offrepo-e23766eb69c1e01b61ceb05404bdb9f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/captcha-them-all-1772bca649ab5b99b71eb70af7333d0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/captchinoo-captcha-for-login-form-protection-8a7e1f1e76c1a5624370361e3f4014b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/captchinoo-captcha-for-login-form-protection-cf2f1acbf24407737a2ea0faf858d6e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/car-e6c806cffb708ac14203b6a177746aad.yaml create mode 100644 nuclei-templates/cve-less/plugins/car-rental-3827b6d062237203be17d7460bdfff1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/car-rental-840d0f5e27379db8cc72bc8207e84fc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/car-rental-system-ed300225e14e2bc5b42ef0d162dd4c0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/card-oracle-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardealer-6b187667244750832b7e539032f73d81.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardealer-87691ec7eeba77afd606ae3cf92f6d8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardgate-24f679f9f324edb55cd9d46a91aafdf6.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardinity-free-payment-gateway-for-woocommerce-94b5a2833af1ffbcffb385277b832bff.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardoza-3d-tag-cloud-27fde2e6c4a806f7a102ac0a7cda9a14.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardoza-3d-tag-cloud-65f120a185fc7462303fec7b1afa9585.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardoza-ajax-search-b8b3a3fbd66ce4f7e79e6dafb76c83ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardoza-facebook-like-box-9ad733bd3bff15d00b8cf7407f8d01f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-51e3e4afb8caf590d3f3c081b5b24b7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-94d04ee1ef58708b41d6145bfcae5eba.yaml create mode 100644 nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-eb36c7e115c0d22d7762853e6f5759cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/careerfy-1af02924d8ed846b859206c9bcd93941.yaml create mode 100644 nuclei-templates/cve-less/plugins/careerfy-b6b5ac51737dc25240c45d0d6e3809e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/caret-country-access-limit-cc17c22adecd59067c0b764ef4c8f084.yaml create mode 100644 nuclei-templates/cve-less/plugins/carousel-anything-894cd49c8916bb82c60619f3c2cf8165.yaml create mode 100644 nuclei-templates/cve-less/plugins/carousel-ck-3a426a819fa4af21ed44f2fbb809eae0.yaml create mode 100644 nuclei-templates/cve-less/plugins/carousel-slider-24a3397fbf299aff4ecd7a231ef53936.yaml create mode 100644 nuclei-templates/cve-less/plugins/carousel-slider-630df0c98158fef2598199d5ff83a48f.yaml create mode 100644 nuclei-templates/cve-less/plugins/carrrot-d0bff2c3c4777b0c5230adf64beddf0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cars-seller-auto-classifieds-script-67c6ac36101695384c180d0d88713f05.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart-lift-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart-lift-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart-lift-e8d0684b467b2dbd613cfc306a1e44bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart-link-for-woocommerce-691ef5f746f46ce4f71b48e893324dcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart-notices-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart-products-suggestions-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart-rest-api-for-woocommerce-f86a366b83ee22a3c8a02c83ac209077.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart2cart-magento-to-woocommerce-migration-b1456c2b0a44366db809a824b44e5c5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart66-lite-06ef746af3d0592e05a038c507873a93.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart66-lite-412eb3ff2c6b3450ae105bf1638dee64.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart66-lite-67c99f9c8f327331a1d82c5ff5d685e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart66-lite-70045bd7c712e66fb897584cd45830ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart66-lite-73c7b664803cc72f6ed74c19b2560471.yaml create mode 100644 nuclei-templates/cve-less/plugins/cart66-lite-e1efc7cab467c2f5bb9e0770c86a7f44.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartflows-2031b341cdd31868784b73bf44a323dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartflows-2af5d7487ceb106d0bc29f7a8108e53c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartflows-9051aa7c81fdec9135cd53a28b43a964.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartflows-c62d1469eaee8b9fee97540c3f237340.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartflows-ef918f495b11d984490181ededbf81f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartflows-pro-5f1b3c571aefdb13a941afd0f6a1e2f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartflows-pro-90187049563f57856c792eeb068a786a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartoon-url-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartpauj-register-captcha-7feee71659763988d044dea046c00a68.yaml create mode 100644 nuclei-templates/cve-less/plugins/cartpops-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/carts-guru-484f6782156958a3ab27ac5661456a24.yaml create mode 100644 nuclei-templates/cve-less/plugins/cashtomer-652b592a23d9d8ef3233d28a405d4909.yaml create mode 100644 nuclei-templates/cve-less/plugins/casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-755b5e97b09ddabb36f708e4895b834c.yaml create mode 100644 nuclei-templates/cve-less/plugins/catablog-1319960b548fb4b068018632e6f16db7.yaml create mode 100644 nuclei-templates/cve-less/plugins/catablog-1e67f5ab14ff0db89bd5b743da99072c.yaml create mode 100644 nuclei-templates/cve-less/plugins/catablog-457555c66db611fbfa678adc71e787e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/catalog-ba6ce63fd5cf470afef6a6aae7117079.yaml create mode 100644 nuclei-templates/cve-less/plugins/catalyst-connect-client-portal-0444dd694cfe16cd55e5d0cab9135b80.yaml create mode 100644 nuclei-templates/cve-less/plugins/catalyst-connect-client-portal-719aecac015dde0f14f4cf5400965308.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-breadcrumb-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-breadcrumb-4ba0680f325fbd064afe994053bfe704.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-duplicate-switcher-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-gallery-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-ids-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-import-export-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-infinite-scroll-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-instagram-feed-gallery-widget-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-scroll-progress-bar-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-sticky-menu-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-themes-demo-import-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-themes-demo-import-b60d38a6f27b4184d7cf8b134a701e36.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-themes-demo-import-ede5967c43f0c429d90aef07bf32832d.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-under-construction-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-web-tools-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/catch-web-tools-c59a23b4a74b5a776a9442e033941d2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/catchers-helpdesk-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/categories-gallery-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/categories-gallery-woocommerce-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-2f5fc8a76419fe6bea249f884a02d85d.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-5151b196e7969f448d1e0346e210bd82.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-5f87f741e48b627a6080cd7b2aa94d46.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-714c67b8b7c104cb121813dc61b2219b.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-aca00b4de03dae498ba9e363cc7669df.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-b283da624a496380d695ed4b3e4a8065.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-bf5e4013e055d945f3801300e58d2936.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-c408e44047c03520c426eb804c18a88a.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-dd16da990120154a69703f2e9dcba084.yaml create mode 100644 nuclei-templates/cve-less/plugins/categorify-f9749bdc11799874266b6a084bbe85ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-grid-view-gallery-f90056d9800bc9f38b8a269e9be583b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-list-portfolio-page-a4aa366f217005e74322ff2bf7a0e182.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-page-icons-76db9edf1640ca25c16598ce97e68f02.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-post-list-widget-4f664c5f9a6ed3cf0ca52dbb21a8c73c.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-post-list-widget-86c2efd6cd386af606e7ebf660f34040.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-seo-meta-tags-37be0ad02414c3e78dc60922e377602e.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-seo-meta-tags-44b23b8882e9805e87909dc573565952.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-0ff74c47b60a2c36a0f0a3f6185c5446.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-299c560ce9cc99513d88a13d89852030.yaml create mode 100644 nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-4f38551b81bcc12b9f18d5f308341508.yaml create mode 100644 nuclei-templates/cve-less/plugins/caxton-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbcurrencyconverter-6ab6a237cf19832f12a2229f950a0a08.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbi-referral-manager-20bdedbec4b7794610e6cc496e884cca.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbxgooglemap-3af00e1da087fccdad50b389a0a1a76d.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbxgooglemap-4965c11c4afc77625d19c06034b78a11.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbxpetition-a3872c1aa8a56f8dfa0964ede1e7d0e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbxwpbookmark-4eab0b03120e29e0608c25e79fc1f7b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbxwpbookmark-7ba99274f1f38a4d9ad4fdbd6398ca72.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbxwpbookmark-c8761ad8d517d60679bd97ecd8a6c050.yaml create mode 100644 nuclei-templates/cve-less/plugins/cbxwpbookmark-de7d8d5a0d1dee1ddf8eeecb2547d31f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cc-bmi-calculator-3049339e7a57ef7848a40fe1f1e47b95.yaml create mode 100644 nuclei-templates/cve-less/plugins/cc-child-pages-16f9ec159f7aada4bb87cabf3c4d9411.yaml create mode 100644 nuclei-templates/cve-less/plugins/cc-coming-soon-61f33b76950c42b803451a29637fa07c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cc-custom-taxonmy-bc617b508aff51ac43ff170f5e7c19e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/cdnvote-0c5cfe7358bda15b692d66201e48f291.yaml create mode 100644 nuclei-templates/cve-less/plugins/cds-simple-seo-0a5cc290bf065b9d61dd8d6424548f9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cds-simple-seo-5acab9ad0ccb5e44fc932f6fa0ba244a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cds-simple-seo-7a3d9d99e440e4df9bd78305e509f883.yaml create mode 100644 nuclei-templates/cve-less/plugins/cds-simple-seo-901981c5d4aab63f7790ceb08b75d467.yaml create mode 100644 nuclei-templates/cve-less/plugins/cds-simple-seo-ad7b2ab497c839e3400fd7b625d4fc3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ceceppa-multilingua-26a1c70f5188aa0c3366f60965527dcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf-geoplugin-51cc9e8778ef47abd167df4053287906.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf-geoplugin-682168a7f6b8d8c54e16ca072c08d0b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf-geoplugin-9cb312dcf3076a957034e2392391c1c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf-geoplugin-dc2ceae7a9d01dd85dd05b54d27673ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-active-campaign-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-antispam-e8894e8512ac5d54a44ce89e1645ca1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-conditional-fields-5f06348f7bb36613ac049dfd554c46bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-conditional-fields-c2bf3837de0efe09eb976b0292e9ae9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-constant-contact-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-constant-contact-d8e7f6cb9c19a44c84604c82e55187be.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-constant-contact-fields-mapping-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-customizer-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-database-406a8beae5e2073e89eddace606a906a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-easy-math-captcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-field-validation-779ca838360ffafbdcec116be7a4214b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-file-download-d3779debb6d6eb8ad0d25988128d76ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-google-map-2da90a041f7dbd6259f3200e335d184b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-3ba45c08f1c81a3b4f346669dc635f8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-pro-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-grid-and-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-hubspot-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-hubspot-78d1a3ea4011830cf6a4045c4e76d9c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-infusionsoft-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-insightly-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-invisible-recaptcha-4e7be8550ac4c225de3b247432067648.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-invisible-recaptcha-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-live-preview-a6d4da7080e5e33e606a2bdd628cb1b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-mailchimp-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-redirect-thank-you-page-1adae250456b8ff3c36bf7b47cd9ad26.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-salesforce-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-salesforce-f6809789bc3db192511a7eb7008b1a2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-store-to-db-lite-457136e7a482f19e1fb7eda420cd0512.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-styler-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-widget-elementor-0a3c0452d5847fbc8bf97c2978948097.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-widget-elementor-f7129e84ad88621ffd1e743ea53941ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-zendesk-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-zoho-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-zoho-1e95da79eb44567d35aa35ba90fa7af9.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-zoho-22168446272a333f9aeaf32a63eb65ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/cf7-zoho-2fe05eeb0f074422838b91d061a270ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms-8e029958bdc3ff72cf62f3277afe0ddc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms-ad9f5965c16c8246b424703d21435589.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-0a7e50f278580c630584ee885abf7fbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-435be2da19b4391be47c1eff3c320bfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-6e2fc253c488c9fb6b9867ac9b52ef35.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-746dbfeca03bdbf3d2fc4d83e4a0ed40.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-84b6699e5f738c5aa2a22a553abe9531.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-8564fd78eda1e5e95c5755fd00c36fad.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-9a7daf03bb65349e79adecac5d21db12.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-b4c6a4aeabe2851a3af8facd90e9e06e.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-c746c9817b7b9a6f45f694a27b37baa9.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-f8d3e5b9686014f5cd0d4b3b339a644d.yaml create mode 100644 nuclei-templates/cve-less/plugins/cforms2-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml create mode 100644 nuclei-templates/cve-less/plugins/cgc-maintenance-mode-16302374c3729c860ad18fd6cf163b27.yaml create mode 100644 nuclei-templates/cve-less/plugins/cgc-maintenance-mode-ba2f4df1d4ab7f80e3d41245c7258128.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-160920c3b93078e89551079e7b5eaf71.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-18bb670f149f3ce453ab41abb0ba94e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-1a479aba51042862bdb0c5caaca911dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-2d3408ffedaf3db88a6330ec42f826f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-3202568d0ef30adfbc4903b533249872.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-328d39d28a95cf7b4841489a8ffe5709.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-36a32b4cb0e29bcda79b2aacf4de5bad.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-465e906926b7ad2f7695941c2d2f3545.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-4932bcd4df2882e039a7b09a90097299.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-4a26e6944326e51fbc6f1bb093dd580e.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-4acb85f5976a533776dda534630f7468.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-53813c475afa70818392401295ac8091.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-5ad18bbfeb4c12a137de8b17b7553a5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-65db5904362ad316155a2ed2c78eb032.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-7943d082ee4cf7c0ecdfc0080489be58.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-95b04656752bb123878499817b8956fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-b648d871623ad477887d3a2ad417ce75.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-bb66f4ac76af234c75b6841b7c13994a.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-c2f2835d90a3f3c6d22ed640d7b5a35a.yaml create mode 100644 nuclei-templates/cve-less/plugins/chained-quiz-d0976f5c2f9eb3654eb8c7ee13a935fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/chamber-dashboard-business-directory-285685ddf3c4cea5af33e325a30ef210.yaml create mode 100644 nuclei-templates/cve-less/plugins/chameleon-6c023e252025477e682e7148561b6604.yaml create mode 100644 nuclei-templates/cve-less/plugins/chameleon-css-6e87e05f951d4532dd6f6de3b88ad77d.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-default-login-logo-url-and-title-85ca7cedd2597831c97a27e7d00fa427.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-login-logo-dc6848daf0e6078b7f345f206891b945.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-memory-limit-37d8f4614be006df7ea5c5c8ccf22b6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-prices-with-time-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-table-prefix-ca722f2c2467f4f9c95321209d16faa6.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-uploaded-file-permissions-b3c283ecfc25af9f10f9c937f229f24c.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-wc-price-title-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-woocommerce-add-to-cart-button-text-a483253d605901e000058299d42af1c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-wp-admin-login-4490549b2215d97aa7dcad6a865e6752.yaml create mode 100644 nuclei-templates/cve-less/plugins/change-wp-admin-login-5385baa6493f36fd557c3aebaffd13c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/charitable-2242cb39ce05f115de2cf4c2d7f707ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/charitable-3ebd40bb61580d15dfcd12d2fb7e83aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/charitable-6af09e3fae008ebc46d2a7e390514583.yaml create mode 100644 nuclei-templates/cve-less/plugins/charitable-6feaa562e8c22b0716b934987c7ecb18.yaml create mode 100644 nuclei-templates/cve-less/plugins/charitable-8a3943e3e4b63a520dbb0168b24f856a.yaml create mode 100644 nuclei-templates/cve-less/plugins/charitable-f4e452921028a365c12034905b529473.yaml create mode 100644 nuclei-templates/cve-less/plugins/chart-builder-08b024925f5d1dcafa4385a333501904.yaml create mode 100644 nuclei-templates/cve-less/plugins/chart-builder-9c920cf674baacb0579f3b1f4946e20e.yaml create mode 100644 nuclei-templates/cve-less/plugins/chat-bee-66589665af0b647ad01185928e32cee5.yaml create mode 100644 nuclei-templates/cve-less/plugins/chat-bubble-036e41317f960475dab82c492d364c11.yaml create mode 100644 nuclei-templates/cve-less/plugins/chat-bubble-9273f5ba0fae5fff2a4a50e2ed96c406.yaml create mode 100644 nuclei-templates/cve-less/plugins/chat-bubble-f0274c328c4fa319248646b0f1fefd1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/chat-help-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-196434d911f0f2030523284b9ab4ed7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-2b374eb61066305fce645375b473ec81.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-43f628ea46bf1b19a83b42111a34194e.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-45a7d47baac99a733e5ee7898a52f7c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-4b541be8b8519e80f2cec24d1b2f8ef6.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-584e49f9f9bb47c562f3e0a8463d6240.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-5d770457008ba85c2ccd6a7b3ee7247f.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-5eba30f00f0fc37dca7e730267948bfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-5ef5a5a8c6cb4692922673fc79eb4970.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-67e61488b97755fd204f3e38d91bbcf2.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-711d5e4371b5307e83aafa75e094a16d.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-8142bc3541567011d52df62ad2e24883.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-94f813d00f5c832ee527c5c3251318bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-96bcbe0539bed3ce58849487848c2a2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-9f74a97e65247db4961da7465a48826a.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-a8d129ffa611a0e2860f9a0cb3ae87ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-b0f34e3010de519cd369f7b9dbab99cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-c8b00e3a8ae7ee111daecc90a5a50970.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-chatgpt-916951fd750c41452dbc03c332006408.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-d3213062fc9b1a2c7b785c61361d34fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-dacff2143dd0506c8bdad1a273f67459.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-e91e697ef1f971cda16c40acfd5a2dfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-f715c92150b63b8634910eb743badf7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/chatbot-fb85a7124dad283264113a73b1162be4.yaml create mode 100644 nuclei-templates/cve-less/plugins/chaty-07056c447bdab5ad6a1bdd36170bd91a.yaml create mode 100644 nuclei-templates/cve-less/plugins/chaty-1afdb113a8eb638275401757c0567e46.yaml create mode 100644 nuclei-templates/cve-less/plugins/chaty-54240ff4b4cecbac0ff14d99813212f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/chaty-63f126067f4ae4bb5668663357185275.yaml create mode 100644 nuclei-templates/cve-less/plugins/chaty-6fb60bc9485708489fdd72c16e1fb82c.yaml create mode 100644 nuclei-templates/cve-less/plugins/chaty-6ffb854c265938eec5a761ac2ea74cda.yaml create mode 100644 nuclei-templates/cve-less/plugins/chaty-a21592f489772d448729c01eea1a3d4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/chaty-d2f186fae58d1b5afd77fc5306fc26bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/chauffeur-booking-system-b40844c1e763e67ca14e58da5d8219ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/check-email-212007d229cb11caf3b5098b0d076057.yaml create mode 100644 nuclei-templates/cve-less/plugins/check-email-57441a6bd13b11b69e9f1629f83e2faa.yaml create mode 100644 nuclei-templates/cve-less/plugins/check-email-88a3c1a86120c49f8c7acdd40fc0ba9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/check-email-a582597ac626e8033a80d456beb664e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/check-email-d739207b5203bbaf9071af23095dbb99.yaml create mode 100644 nuclei-templates/cve-less/plugins/checkfront-wp-booking-a9bc73625028a7b9d27c51cb883237c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/checklist-d4f973711f83e484b1ab150d8a07fcda.yaml create mode 100644 nuclei-templates/cve-less/plugins/checkout-fees-for-woocommerce-d46c47231d5f7c1d21cefa0fd0efa427.yaml create mode 100644 nuclei-templates/cve-less/plugins/checkout-files-upload-woocommerce-d9b04ea1292b41be830780f6e6d01550.yaml create mode 100644 nuclei-templates/cve-less/plugins/checkout-for-paypal-8648ead24f8ede303ab8621f146c3147.yaml create mode 100644 nuclei-templates/cve-less/plugins/checkout-mestres-wp-1e6a2a2317e6c0646d9912b475c2283c.yaml create mode 100644 nuclei-templates/cve-less/plugins/checkout-mestres-wp-d54d63e5f680e91069c2712ba5d24580.yaml create mode 100644 nuclei-templates/cve-less/plugins/checkout-mestres-wp-e80edd6c2880294918a0f04214b9aef1.yaml create mode 100644 nuclei-templates/cve-less/plugins/checkout-plugins-stripe-woo-15e030858694c0a02fa97544922bfe88.yaml create mode 100644 nuclei-templates/cve-less/plugins/cherry-plugin-028198ae17f77e0fafdf84b4c3a51484.yaml create mode 100644 nuclei-templates/cve-less/plugins/child-theme-generator-e12bf2fb09ed5e271c0d21b336dc261a.yaml create mode 100644 nuclei-templates/cve-less/plugins/child-theme-generator-ed864fc86a7fe870d57e87a3dcd3af49.yaml create mode 100644 nuclei-templates/cve-less/plugins/chilexpress-oficial-29ab94320ed945dea921e0756254429b.yaml create mode 100644 nuclei-templates/cve-less/plugins/choice-payment-gateway-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/chopslider-b9df60ed6459d260336415d2d308e184.yaml create mode 100644 nuclei-templates/cve-less/plugins/chp-ads-block-detector-8ecff4070b265868b558d6084036a925.yaml create mode 100644 nuclei-templates/cve-less/plugins/chp-ads-block-detector-98c26ef05457073952420479d08234d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/chp-ads-block-detector-a6450bbcf1d391d632396e4291c55731.yaml create mode 100644 nuclei-templates/cve-less/plugins/christmas-greetings-d9f5e61a49fbbfbd69a5c0f7460c4648.yaml create mode 100644 nuclei-templates/cve-less/plugins/chronoforms-0f50287e721edfee647a952371440e59.yaml create mode 100644 nuclei-templates/cve-less/plugins/chronosly-events-calendar-32fc78061d3eb7ab5ce33b0356499170.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-211d17907ac598fe9fa7fe583c9712b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-2552c36873674cea120ccc38e69f7427.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-5730fd190ef48d8c13b621a11b022d51.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-5b5631c6755ba3e58cfcfbe9ec90f71c.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-5e04848eef304ee1fb47854040c71b18.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-62fad85c6fa5b7fb3d8634d94c62f43f.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-85e68d609db8f93e17b14e0a7511b5c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-8c1d8b54955c02df9ba77ea482839214.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-be26aafc9c00248210b5b5ec8b8d8831.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-c1356627585be8298fc5154daa83bb1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-d0a63c61f1af91f397e1af950dda23c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-dada2db55c799a5508c295a160b1fcaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-admin-dd67ce4e359afe3a28fa3105db87a235.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-management-a6893186307907fca26272a54fd950bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/church-theme-content-3e8d1d694647ed5b6d6bc051900f98be.yaml create mode 100644 nuclei-templates/cve-less/plugins/cimy-header-image-rotator-b77d972bfa12e86d544c2057da2d9c61.yaml create mode 100644 nuclei-templates/cve-less/plugins/cimy-user-manager-6b907b5178535d26ea12591112bdce4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/cip4-folder-download-widget-f5f3c9e8239bc353d0388304ee46c783.yaml create mode 100644 nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-42e55306470e6d1ac0240deaf313219c.yaml create mode 100644 nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-93dba1cadeafcd73215feec69fcf5f63.yaml create mode 100644 nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-ef03a122b111711054e748e01eb53a23.yaml create mode 100644 nuclei-templates/cve-less/plugins/circles-gallery-ae8255f2994549b36706bb9a56ad3c0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/citadela-directory-cbb621b3a6e8313b4fce0a47ef22d371.yaml create mode 100644 nuclei-templates/cve-less/plugins/citadela-directory-da4e2303d14d4ccfc14a24b1a1b01b04.yaml create mode 100644 nuclei-templates/cve-less/plugins/citizen-space-d8f2805c892cce30b8ee704118111dfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/cits-support-svg-webp-media-upload-4e81e30f96ac2459f5d1b33071468659.yaml create mode 100644 nuclei-templates/cve-less/plugins/civicrm-7c25c077af82ab884cd08d532650e9f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ckeditor-for-wordpress-e7b1c96e657c95612bee61206db60673.yaml create mode 100644 nuclei-templates/cve-less/plugins/claptastic-clap-button-f34bb308bdc8bf0abc4007f19af318c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/classic-editor-addon-cbd9c033d999d7b582bab8aeab6cd501.yaml create mode 100644 nuclei-templates/cve-less/plugins/classic-editor-and-classic-widgets-0d765d8e5ca0f1a3232d36cbff05684c.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-core-94f85d394521a13053659cf48cf14634.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-listing-095d7ac917f72e37e9bb35fbb61b06e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-listing-4133059c81c533e7538f4a29d7f3ad01.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-listing-94f85d394521a13053659cf48cf14634.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-listing-e39757704ab66d7ab58f6ee33ac96e65.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-listing-f4bbfecaa3b9697ac9c466359f202f2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-listing-pro-3bf83b01db180da0cd7fc6578f1451d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-listing-pro-94f85d394521a13053659cf48cf14634.yaml create mode 100644 nuclei-templates/cve-less/plugins/classified-listing-store-94f85d394521a13053659cf48cf14634.yaml create mode 100644 nuclei-templates/cve-less/plugins/classyfrieds-f47e6eae64c804173012f23d96ac47f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/clean-and-simple-contact-form-by-meg-nicholas-9b88069f10fdb904873358d79983304f.yaml create mode 100644 nuclei-templates/cve-less/plugins/clean-and-simple-contact-form-by-meg-nicholas-f5690c4ae22224ef33491e3a8f293f4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/clean-contact-800e55dd995f58ca489269cf15bde8aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/clean-login-1603de092dffce494eb91c592d08f004.yaml create mode 100644 nuclei-templates/cve-less/plugins/clean-login-5ac185ae82fe98b391f7b0249d150337.yaml create mode 100644 nuclei-templates/cve-less/plugins/clean-login-ac790c964325ea0370bae2df48218a78.yaml create mode 100644 nuclei-templates/cve-less/plugins/clean-login-b85e6f076cf78bc83dad21e66d70a2d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/clean-social-icons-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-212daaad6857839ca091cc2dcc90e7c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-4459115a144ee37cdfb4079325938d4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-6ffa9b277924d8aa648b0bee9bf4b06d.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-a8def04824c95aa61e5602395bc3c9b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-ab9f6d0139ba1f196a65f817d6af329b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-bf15f8f75324665dbab0a976954762a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-cde99dbef0431b3a59324e5afac3b480.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-d289b479a5c784ed3d240622792b7f9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-de9d4da93fc4bb5251225efa35d16a3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleantalk-spam-protect-efa9a2b8677e473b07061cec22c03e03.yaml create mode 100644 nuclei-templates/cve-less/plugins/clearfy-0f9dc26252e942e8e9d25b0caef515cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/clearpay-gateway-for-woocommerce-b4be168069ffc18f5624f70fb3431825.yaml create mode 100644 nuclei-templates/cve-less/plugins/clerkio-c0684cce94d057969c2bd8df09557f34.yaml create mode 100644 nuclei-templates/cve-less/plugins/cleverwise-daily-quotes-38c76ee17f970b2f9f7455a9aafdaf8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-datos-lopd-72faeb48932ddf0ca0fa007188dbfbf8.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-call-or-chat-buttons-7abc665e21c65fbf0435b861d32be85d.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-chat-for-whatsapp-902cce6bbff4fff8307b6fb241b9a8f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-chat-for-whatsapp-a875d85b1acd34789210b1b8be6e7c70.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-top-07e8e438f9983a0ea397db3cccfb2a0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-top-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-top-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-tweet-83ab7ae2d1f6873a9d18c0bfa8619354.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-tweet-935ebeacc0c73d89223e844fd2aaeaeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/click-to-tweet-b512f326cf614df599ebd00014aea201.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickbank-ads-clickbank-widget-55592f88afc85caec6c62b369547bd3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickbank-ads-clickbank-widget-b1bcff9d2efb787a948b3f8018f345ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickcease-click-fraud-protection-002091a126b1a7dfb25af78b55c0c684.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickcease-click-fraud-protection-006e48b094cc72cebf7417cf47b157bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickdesk-live-support-chat-plugin-41d06e1c542cc99b348ba7db58f2c892.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickdesk-live-support-chat-plugin-45e600351b047339fd78ec95bb2976bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickervolt-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickfunnels-6402d67cbcfcbc43cbb160f004d8a96c.yaml create mode 100644 nuclei-templates/cve-less/plugins/clickfunnels-b375402f4d94456be8a455efbe0b59a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/clicksold-wordpress-plugin-52312cb9d61651d5626cb5f7632011c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/clicky-8edea37489d7d07897482f68884c7200.yaml create mode 100644 nuclei-templates/cve-less/plugins/clictracker-da7f33487455bd9ca64c5f5b0b3257c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/client-dash-0f5e9e59b2ad6fbf734b7cc14c76890d.yaml create mode 100644 nuclei-templates/cve-less/plugins/client-dash-1ed96ac73f1ecde8fe792ec7cdde085c.yaml create mode 100644 nuclei-templates/cve-less/plugins/client-dash-c20c39f747c7f70cb8ab495d6417a431.yaml create mode 100644 nuclei-templates/cve-less/plugins/client-portal-67cb2c3e35f22a85706bb01a35436ed6.yaml create mode 100644 nuclei-templates/cve-less/plugins/client-portal-73ba9c23c0821b68df8f36806d87a69d.yaml create mode 100644 nuclei-templates/cve-less/plugins/client-portal-suitedash-login-0b15ae4e67ed167e4179722b43d42dc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/clinicalwp-core-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/clio-grow-form-cc0d4514b7c79b3cb4d1496328155c24.yaml create mode 100644 nuclei-templates/cve-less/plugins/clipr-e96b7ac8a29e8b231c1f7265734f9442.yaml create mode 100644 nuclei-templates/cve-less/plugins/clipta-video-informer-675c723533131f486896f65ba6a33288.yaml create mode 100644 nuclei-templates/cve-less/plugins/cloak-front-end-email-8f88ca251b34c3f9441215db0d0eb986.yaml create mode 100644 nuclei-templates/cve-less/plugins/clock-in-portal-0541b61acd6f59d8dbe0825e7d0780e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/clock-in-portal-300b9d97cc08f164b31a4377dbab9d4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/clock-in-portal-5b61cdb6d6ba8def275e2059b874af65.yaml create mode 100644 nuclei-templates/cve-less/plugins/clock-in-portal-7e6ed21add5029121985af000727b133.yaml create mode 100644 nuclei-templates/cve-less/plugins/clock-in-portal-ad4c52a60f74c08cbf0949e67b843c74.yaml create mode 100644 nuclei-templates/cve-less/plugins/clock-in-portal-df02e428fa69a24d16a3d7cce97f1bcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/clockwork-two-factor-authentication-167d9672411be44feb72a5175fd0987c.yaml create mode 100644 nuclei-templates/cve-less/plugins/clone-menu-bb2e17c35167609647005349850505d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/clotya-core-0e249eccad21574e2f41d6b727c12756.yaml create mode 100644 nuclei-templates/cve-less/plugins/cloud-manager-9f8e06f58bb3d62fb41a0d24a3483a49.yaml create mode 100644 nuclei-templates/cve-less/plugins/cloudflare-54a71a6006d636e1097ee6d46e6ecfe6.yaml create mode 100644 nuclei-templates/cve-less/plugins/cloudflare-82dd6e10056d4e2acdde095ee3c87000.yaml create mode 100644 nuclei-templates/cve-less/plugins/cloudnet-sync-31b36ec0444d32e3c3a9acc4186c5727.yaml create mode 100644 nuclei-templates/cve-less/plugins/clover-online-orders-0f96dcc46121deff356e0d1a5d840b39.yaml create mode 100644 nuclei-templates/cve-less/plugins/clover-online-orders-3211ecfd0817984e803716532365c05f.yaml create mode 100644 nuclei-templates/cve-less/plugins/clover-online-orders-e55440d3ef9cff783b9861081230c8c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/club-management-software-3e4694078ceef16f755ef9eb324edfcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/cluevo-lms-9424f0d1add83019568a32a2d432a588.yaml create mode 100644 nuclei-templates/cve-less/plugins/cluevo-lms-f070e8d35eccf1703741e9fc7f61600d.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-ad-changer-1c07181abecff4187bed7fdcd8d1afe4.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-ad-changer-5c3ee68d8799e2236b3bc1333dfd2f35.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-answers-2ace3607ba6999f91533535a3a2816d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-0892bb5b73a2988ec7694336ad4f4900.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-16f2bcb5cfa3d079c1a300d23d7f7166.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-4ad8dd096306cdfdd3b295e2def3a2c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-5fc74cc66f5330c5bc45fdae1ec9ced1.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-60df52935f4401dddac85a54784a5e69.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-846117b538ab9ba30f69a12efe0f9e57.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-aa2a9b71c269086e8f022720378d80bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-bd35c16b70884879b92d89ef15ca63e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-download-manager-ecc77de29f842207c628b7046d3e4a17.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-on-demand-search-and-replace-420882c95451d067f82426e7b79441c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-on-demand-search-and-replace-514273203d780a9cda87e275d81e2d5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-pop-up-banners-9a8cd1490d53fe02691b7245088ba1a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-pop-up-banners-ad88df41b076143465006e1296e02fd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-registration-pro-53024ed5f0e18aa66d4ebe04f4f0eace.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-video-lesson-manager-d10884d848b4b49b542895ed8b750487.yaml create mode 100644 nuclei-templates/cve-less/plugins/cm-video-lesson-manager-pro-d10884d848b4b49b542895ed8b750487.yaml create mode 100644 nuclei-templates/cve-less/plugins/cmb2-8c74a48bb6b992ea1d77056b8703ebf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-166fef08e9b74456a644f0a9d21fb872.yaml create mode 100644 nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-4532b4dbcf2e547347daa5207db523f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-8ec76f6766e0fda899f0bc8eebfb4339.yaml create mode 100644 nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-8ee98246eb8d1e952fa8185b436e76db.yaml create mode 100644 nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-a905768098fb049d17090a5880f96add.yaml create mode 100644 nuclei-templates/cve-less/plugins/cms-commander-client-1aebd68acb64b20280f49bb62f1d7be6.yaml create mode 100644 nuclei-templates/cve-less/plugins/cms-commander-client-5e8b0e22556acc1ddd3b390056ee15b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/cms-press-a3fcccf439bdac9208ecc47d006e929e.yaml create mode 100644 nuclei-templates/cve-less/plugins/cms-tree-page-view-664f9708c952ef16850b76782a119235.yaml create mode 100644 nuclei-templates/cve-less/plugins/cms-tree-page-view-72fe0a438fb0e3368285665d2037073e.yaml create mode 100644 nuclei-templates/cve-less/plugins/cms-tree-page-view-ad3b6e67373c173a68de7fe25df960c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/cmyee-momentopress-549edad2ce245fbc28f77db9aee80ff6.yaml create mode 100644 nuclei-templates/cve-less/plugins/co-authors-plus-5fd18b55135c9269021a77a72c48b74a.yaml create mode 100644 nuclei-templates/cve-less/plugins/co-marquage-service-public-a60a30a5dd8e8a555825a7d98c57da43.yaml create mode 100644 nuclei-templates/cve-less/plugins/co-marquage-service-public-baef1d0e01440a39ac30bd5826a2469a.yaml create mode 100644 nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-c148c7298cbf640c64f29d57d3ad5df1.yaml create mode 100644 nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/coblocks-4086933ae9a93ef9f0adb45c61ef5080.yaml create mode 100644 nuclei-templates/cve-less/plugins/coblocks-fdd365ece4b9b292b937aee693d1c5a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-snippets-2a2cec7651f5442eb2c1435c40fb232d.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-snippets-39bc2edd346e28405d70531e51a8164a.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-snippets-495cf5fc28b98b14d2a1a7c5bb6e683a.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-snippets-aa298dcdd541921aa6e5a62400773be6.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-snippets-aceeb583ba4064a9ac66804525abc9eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-snippets-extended-429616022004f10edfb6da5df655ced8.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-snippets-extended-989eb9c3cbf3a8a65b24266fa6fa3458.yaml create mode 100644 nuclei-templates/cve-less/plugins/code-snippets-extended-e82db8a28efe18641f3e717f9b09b84e.yaml create mode 100644 nuclei-templates/cve-less/plugins/codecolorer-6a2386cdcd3910d335805b9ddf952385.yaml create mode 100644 nuclei-templates/cve-less/plugins/codeflavors-vimeo-video-post-lite-d5eb243a63ca847d2586e41fb57f6f14.yaml create mode 100644 nuclei-templates/cve-less/plugins/codelights-shortcodes-and-widgets-4f0e3223d5ea7b01c767c6e564ea2ada.yaml create mode 100644 nuclei-templates/cve-less/plugins/codelights-shortcodes-and-widgets-5a9c4861ed09ce785a6f69836ddbac67.yaml create mode 100644 nuclei-templates/cve-less/plugins/codepeople-post-map-1123677072a0d47589707f79eb0e7e54.yaml create mode 100644 nuclei-templates/cve-less/plugins/codepeople-post-map-d5c941a5e08fc52cf3fcc7e08e2232da.yaml create mode 100644 nuclei-templates/cve-less/plugins/codepress-admin-columns-1b44920a5aedb519e7cd543d04a01fe4.yaml create mode 100644 nuclei-templates/cve-less/plugins/codepress-admin-columns-2cf825b0502a2430e12833bc820c6234.yaml create mode 100644 nuclei-templates/cve-less/plugins/codepress-admin-columns-9a1ea12529e15f0a017ce8f0e47401f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/codestyling-localization-4f6e39e80416a527c850a1165c7ace82.yaml create mode 100644 nuclei-templates/cve-less/plugins/codestyling-localization-ddc63b74125a60840010b54470ac437e.yaml create mode 100644 nuclei-templates/cve-less/plugins/coditor-3030bade61470958bdc416b0e2c89b83.yaml create mode 100644 nuclei-templates/cve-less/plugins/codup-read-only-admin-e0006b9b22f8ac4f0ab20b6b14560c09.yaml create mode 100644 nuclei-templates/cve-less/plugins/codup-woocommerce-dynamic-pricing-table-view-9a51dd537aff6d05f9d6a7c50a359270.yaml create mode 100644 nuclei-templates/cve-less/plugins/codup-wp-freshsales-0a55644b51a5df02f2cc7d960c48224c.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-01e0b89afcfee7ee0b87257825f06c59.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-06110f65fe21eb76cccfd39d7f91d25b.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-21f9461e5270818af4357d314ab90f57.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-29c3e0ef4de33c7a54c9e5adeed782a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-3bb3b1b877c8539475d5edd92db3636e.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-411de6e419140a33390e4cf84e25eb26.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-461ccdb0bda3c12c709b07472ce088e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-72c77f134254f33afbd956d2661ee799.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-7af76cb753c181fa25d318d1a52543d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-aaee16898f3cb4f4d7a9fcaef31839c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/colibri-page-builder-f731e8529b33108bde99e03616dec459.yaml create mode 100644 nuclei-templates/cve-less/plugins/collage-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/collect-and-deliver-interface-for-woocommerce-ac850d5730363d3bbd84ae6609135f15.yaml create mode 100644 nuclei-templates/cve-less/plugins/collectchat-a85aa1b9a47ecb9d1b901a00495b06ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/collectchat-fdf2ccd0e27bd38fe570f70f1b82c105.yaml create mode 100644 nuclei-templates/cve-less/plugins/college-publisher-import-c719c1fa9d94cb4a4d6e24f4ded47412.yaml create mode 100644 nuclei-templates/cve-less/plugins/colorful-categories-ce863d77586ccc4b8e169d7ca2f897a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/colorlib-coming-soon-maintenance-699697d906ce98da7e0a75001998e24b.yaml create mode 100644 nuclei-templates/cve-less/plugins/colorlib-coming-soon-maintenance-a149337d8133aa025f4ace42f65c06da.yaml create mode 100644 nuclei-templates/cve-less/plugins/column-matic-468f187fbaef8b522a9247e1a677ec05.yaml create mode 100644 nuclei-templates/cve-less/plugins/comic-easel-919a5f84339755a5d7406eb8d1eb9388.yaml create mode 100644 nuclei-templates/cve-less/plugins/comicbookmanagementsystemweeklypicks-d103dcd12252c06ef076f4cb74df842f.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-a811d729e46b4e2f338038f266981191.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-by-supsystic-40172980791539d9cbc1458226ed5fdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-by-supsystic-c5f1b8086e41aba21eb0fa4dcda314d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-c76087a23749b6d57d9ddfc097bcae08.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-dc8b61de30b02b2cff6abe2f9142cec9.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-fbe96ae280b99abe5e90ec130aefb23d.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-09f85e9adfb4624c22adfc3bca4cbc18.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-801d1a90cceafe559a3466d4f67a8f10.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-89444fbeceae5055dd4381ae452bd0d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-90c77c994b57286cd58b89b0a94442a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-ready-1e4dc9ccf87cc496477270093047f038.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-page-03aed27f86819ca17f9267263897b2d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-page-590623a5d7befa81a3dd4c5d938153e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-page-604cc742b0731a1b0e3b91222daa2367.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-page-c6f17fa36993cabcda8dd7acf64ac9f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-wp-22b32b6b74cc9eb676a736f279318419.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soon-wp-c725a8bb61c1af435931beba79cf59e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/coming-soons-943971993cbe3a7f3e1700395fdc37bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-attachment-9d710f138a80414743d12fd42c3bd26f.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-blacklist-updater-07a92bda75c6219e8b222de62ff37e0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-engine-pro-2faa74d51969fb024a7d850a91d6917b.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-extra-field-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-extra-field-f4996fd87f55d8cae08e1a7a083925f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-form-c25a227d2616b1e266b27ae90761f594.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-guestbook-8a14e10c4e61da2c2574a977cb4dd78d.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-highlighter-8912ce3f5c5896ec3ae73a9aecfa4081.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-license-1af6a7823a6a8a142bc89c08631d8f4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-link-remove-7cee7594ab82d9cb202fec2e242ded86.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-press-7231043a73d9377b28caf26dc1e18122.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-rating-19129120e783dd9166bd324662106d86.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-reply-email-2958b08ce41d2a089d276808ef68e4bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/comment-reply-notification-3aca7cdedcb176c4ccf669f0b5b15aaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/commentator-f1883ea786fe0aa097422eb19ac010d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/commenter-emails-5a219153bb99d5d72b2a78882890f4e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/commenting-feature-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/commentluv-1115fbab8a2d4cca53dfc23d9cb02714.yaml create mode 100644 nuclei-templates/cve-less/plugins/commentluv-b5d9a629551e35099f17ad23fa529784.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-from-facebook-cf20fa8408c9425d9c1e30f3c5cdbbda.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-ad95e7e9eeb384d7cc8919d4327ff669.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-df538269ee619b35cd6276912789d0c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-ec4b91dfb2713f41a9889afeb0c19f09.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-like-dislike-42b4c4c9ef55b9cbba64c1b7340638c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-like-dislike-857b0e2bae5fe7d9b0d48bfa9ff32d2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-like-dislike-c44115ca320af6609e9d0557523edcce.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-not-replied-to-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-ratings-8271075d3a50d2c7e6256973269145fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-ratings-8c52e6f03af939f0f311c40af30d7f63.yaml create mode 100644 nuclei-templates/cve-less/plugins/comments-ratings-ce5f44b2a1a66b11d6fba979058869f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/commenttweets-92f3371642f241b95162e034abcbcb33.yaml create mode 100644 nuclei-templates/cve-less/plugins/commerce-coinbase-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/commonsbooking-20bdb039adecbb0f3e200e117849b94d.yaml create mode 100644 nuclei-templates/cve-less/plugins/community-events-39d6469c1d7f12365cd669891d431a45.yaml create mode 100644 nuclei-templates/cve-less/plugins/community-events-6b9f6e01b27ac33a42a061d16a244031.yaml create mode 100644 nuclei-templates/cve-less/plugins/community-events-c74241ceba44be19e7ba6e8fb09c27d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/compact-wp-audio-player-313b605e10bb673c24b20248a65978eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/compact-wp-audio-player-950a80cc7b38cd4c46587704ae88fbc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/compact-wp-audio-player-bd35c1f22ebbbba8b36bd6df988b805a.yaml create mode 100644 nuclei-templates/cve-less/plugins/compact-wp-audio-player-ee5672596a78a94ff41b76c62c23328e.yaml create mode 100644 nuclei-templates/cve-less/plugins/companion-auto-update-2bc216cec70480009970bca04436c777.yaml create mode 100644 nuclei-templates/cve-less/plugins/companion-auto-update-2e35c0afd479ebddda5688f51cb87b9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/companion-auto-update-df1246639b8669a251f2bf76a6725ade.yaml create mode 100644 nuclei-templates/cve-less/plugins/companion-sitemap-generator-3b5f66bc28ba8ff54368e43564c0ea04.yaml create mode 100644 nuclei-templates/cve-less/plugins/companion-sitemap-generator-99e9d7c301861638ef81beb6515cc7d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/companion-sitemap-generator-c4c4cf320f9d5a30f314d45c9905f1fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/company-updates-for-linkedin-ae77789cf095ebe5a3c15cc04f8354ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/compfight-87dc229e61795edde01adbbcb4d66d06.yaml create mode 100644 nuclei-templates/cve-less/plugins/compfight-cb154639cc7c0dc0d262bce9d7d2811e.yaml create mode 100644 nuclei-templates/cve-less/plugins/complete-gallery-manager-8b102422bdbae79fcfd828ee3dff2e44.yaml create mode 100644 nuclei-templates/cve-less/plugins/complete-open-graph-036ea79db83fe96391d5364e9f6a5d01.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-0601046a507e54e46df377f0ecc6ed20.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-0ace082d96b626b2ad5accfe37aabeee.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-0dd9d84ae74328eec6905560ff06dc90.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-20f199eadcf56055af91390c7aa42269.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-36baea2a40cd4c21b07e642ec98d1598.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-39d1abff46677c8f4222117f43e45a81.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-3d78e2be612fb18102a14015e146e5ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-3faec85547682ca0daca65d7bcfe4f48.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-4df8cf40ac1883817a3463195832ddff.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-52cfe6de8dc0e7f48422a0ddba0a4485.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-54ec2b57636fc193223c60655466605e.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-5e5f3cf37fc64d7bac2aaac542661852.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-6f528eadb66a9354628a303cdece4106.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-83ba977a44de14ef1ffafdedd6dd629e.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-bd01bd53f32252ceb586f6e4a82fddff.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-e9c38ea48203d6f34c8dd4e716a1108d.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-premium-3faec85547682ca0daca65d7bcfe4f48.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-premium-6f528eadb66a9354628a303cdece4106.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-premium-83ba977a44de14ef1ffafdedd6dd629e.yaml create mode 100644 nuclei-templates/cve-less/plugins/complianz-gdpr-premium-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml create mode 100644 nuclei-templates/cve-less/plugins/computer-repair-shop-23022d4d8e20d83e1b4a708870cdf48e.yaml create mode 100644 nuclei-templates/cve-less/plugins/computer-repair-shop-dececf152f183ba1e4159b4797e96e29.yaml create mode 100644 nuclei-templates/cve-less/plugins/conditional-checkout-fields-for-woocommerce-9b415d0d3fdf05f04e00c8b364d66a56.yaml create mode 100644 nuclei-templates/cve-less/plugins/conditional-extra-fees-for-woocommerce-216a466c53c0f9dbd8311fa0afa66753.yaml create mode 100644 nuclei-templates/cve-less/plugins/conditional-menus-134da546d2df4f04ca01066992554ee0.yaml create mode 100644 nuclei-templates/cve-less/plugins/conditional-payment-methods-for-woocommerce-47ed991bbc14dda7a2d912876312ff28.yaml create mode 100644 nuclei-templates/cve-less/plugins/conditional-payments-for-woocommerce-687e0bfbb6d2f1a8953da32fe9e3e746.yaml create mode 100644 nuclei-templates/cve-less/plugins/conditional-shipping-for-woocommerce-f546949dea525a0c95c8895c66b00552.yaml create mode 100644 nuclei-templates/cve-less/plugins/coneblog-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/conference-scheduler-cf3e255501522f24f949ee2a8f39ee25.yaml create mode 100644 nuclei-templates/cve-less/plugins/configurable-tag-cloud-widget-cf1b7f4c03fcd556e540f11fea53f35a.yaml create mode 100644 nuclei-templates/cve-less/plugins/configure-smtp-66c31f4c6740f8ad7d7b89dba2cbfd5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/confirm-data-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/connect-daily-web-calendar-73dac6bf00e8c2bb53faafd1de73576a.yaml create mode 100644 nuclei-templates/cve-less/plugins/connected-sermons-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/connections-1f71cd156c1c7a7919178911b00bc151.yaml create mode 100644 nuclei-templates/cve-less/plugins/connections-2e3f61534eb2162d57847e92682b9bbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/connections-6869d4da7d1da9e6712437e8840c161b.yaml create mode 100644 nuclei-templates/cve-less/plugins/connections-b0b49bce1c15ad148a5058e1154b417c.yaml create mode 100644 nuclei-templates/cve-less/plugins/connections-cf74b8fc2d5310123c3eee779bc13fa4.yaml create mode 100644 nuclei-templates/cve-less/plugins/connections-db180c33b0677e46a0a6bb8bb9ad8a71.yaml create mode 100644 nuclei-templates/cve-less/plugins/consensu-io-f1b98a2e76b778879a86c711e73365c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/constant-contact-forms-7651cce817269ea91d5fbe788e52194b.yaml create mode 100644 nuclei-templates/cve-less/plugins/constant-contact-forms-903a37844bea1fdaf4cd48ec6980337e.yaml create mode 100644 nuclei-templates/cve-less/plugins/constant-contact-forms-b14574939a93e002a63be522534dc429.yaml create mode 100644 nuclei-templates/cve-less/plugins/constant-contact-forms-by-mailmunch-1a317e1cdbb26d9e49f5aa3bc192b26e.yaml create mode 100644 nuclei-templates/cve-less/plugins/constant-contact-forms-by-mailmunch-437bae7c2a82ed4347741e0e69e1ae61.yaml create mode 100644 nuclei-templates/cve-less/plugins/constant-contact-forms-d81bd0f10f327ed0fb83b12edeec74bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-bank-433ffdc26cf2c66e4eeb88d840e46a11.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-bank-6d98c218699b93985ac97a3eec99201e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-bank-dde9696bf354d3e3e05b50e1d6ec9e01.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-bank-e445dff1dbcdaa9bae7b0592b35676e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-bank-faf9b6b6bd7098d550180128b47f75fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-1ff3b8d002a210c8bcbac1471cb6f6f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-325454a71c0c17adfea3794a8a7a9236.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-6e59234554b04ec8d40e5e3ef21541b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-7f88047eb913450e01c938cb65d8b8a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-8d379cb370e88332eb6d842ed734aa6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-datepicker-dd80fd1aa8e8ecdfc56af18872d295e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-8ba7976e3e4bdeede76b4a3300e51140.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-ad3bf812c0907ec51a65ebf62ff94eb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-f69e0ba733c2c24bc554eac9c924b265.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-f9c76f792a0cb9c9d573c3bb2df06a93.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-integrations-4d9d22b8536ad510aca448861c4763dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-mailchimp-extension-01288e737e4ae077215c04412343fc17.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-mailchimp-extension-905c45437d6ba639495cb537666e1306.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-multi-step-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-multi-step-module-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-newsletter-60ccaab36d8d291d989ebdd0beef30b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-46d92974df5823a07d95144ce4cc0f85.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-a742d112c80df865f27dc03fd5bad80a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-d4ad0651fbd050ca5d0c0b31b84449cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-simple-recaptcha-14d0e5668206cef97d18962e8ae7b83f.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-simple-recaptcha-8adb7b06ec664dfb56f6f7d6b4e86d31.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-skins-2914c51da091e199d25a3dc8786db638.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-sms-addon-167d9672411be44feb72a5175fd0987c.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-sms-addon-be2731d38b6a95683208b89df2a4165d.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-style-a1fcf6f91e16b2992432e60b1b4c9234.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-style-ea1c126ca110ea032d6fcb986fdd350e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-6fadcf5f17b5915346db50e851606480.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-7b879cd01e55c6fb3c0d10afee385802.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-9307d10c2323b14a9686cf4c27778940.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-b08c80c889936db0e80107b8d6e7f7c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-b47f4196237e18a984049178586c33fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-add-2d5c4c1875b8b7afff532ee362cb19b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-add-2fc7a8d84b84e65f1ccfb4b2642e31b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-add-7688a1f2aea8d38e34484935054bb963.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-add-b5a086a164f76d9f65ec8c84b98c931b.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-advanced-database-7d7f5d445c1f890434d5685044d9c36e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-builder-0dd2df3f5b8d5d1265b1558506e0a48b.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-builder-e751943c96e8083bbd38ea46395e441a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-builder-eff7610d5a81227a5c58edb7e81bb7b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-by-supsystic-2fa0b1455e44ce08beb9843b8aba88e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-by-supsystic-3f35ac18f9207e0d36c74b4e353744ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-by-supsystic-4d5e40c3dba04c280b662fef0150a3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-by-supsystic-8496d75762eb7cc39ecc911adbe09233.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-by-supsystic-8aec4bc7a4f45a1f32781336a736062d.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-cfdb7-1870dbf4bb41dccecc97cff36f308cb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-cfdb7-4804713458840c235ae2e000980eb782.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-cfdb7-75518625380bcaa62f1a02064912f140.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-cfdb7-75ff620cd218a38029d3e52c745f6285.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-cfdb7-7a93aae5a1b0a527454a7a7e7a2079a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-cfdb7-a479da98606812ed965dd3889c1983c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-check-tester-8399de040479bedb6b313106c99e1459.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-0ae9ca018a23708b259b56e1909be0dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-11d2084b4b4824db42a1247a4ad4b029.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-27391e149ab2871748f52ce997dd4e34.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-4b0e1b091043f35eaaaa251df8ddc4b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-572e59930dcc24f750ce3dae22510652.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-7e31455dbe1dd61224e4a9a69904e9bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-a7ecc95184b3ade18a4afbbf2cc86f31.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-b1d3b6bac2cc1e1f3e245ca1837d27ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-entries-c8150190c374645707abe44442dd04c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-generator-4493ed5056e4671039baf554adba702c.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-generator-45055b7313617f4962d20d0d3cd73e8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-generator-60c9bfea8eebe4996b281df81354bfeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-integrated-with-google-maps-9b4261e2d1c94c9960e52f01252bbfd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-lite-3ecd0cc847951c575bdce3ab52ae1765.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-lite-97d382f4c9bc6b17c25a76a092e5b852.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-maker-5530cad0a9767bd88d96d829bf733779.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-maker-60c3cd16f2597496a4651e0715286bc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-maker-b9705619b7c26905bbb7df74ccb4fdad.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-maker-e46317cbf2f40aac373a74fb30f51dde.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-manager-362c09e706e4df3c312dbda6ffdf171c.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-manager-bf314fdb968b7a1f09514983e27476f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-manager-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-multi-78a680d0afadd06452bb6d0bff3dabe2.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-0c860e72b162cc9055e799dc4f8c2b43.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-28ac556db560c4dbe8e302546acf1314.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-32db8ca06e20ab6daa51c97bb6564bc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-7d2288f1e4c8fb646fdb55a372b6200a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-b2200c29280205b8f648b84224e222a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-b74320f496d843edce06a2ca91d6d756.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-bfef76276701b6af6e198a50eb02c42f.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-db0677cd0c6ea98a43e8b2ad4b143537.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-plugin-dddf3ae843aadf68e8fa30f4a8366d3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-ready-91e28682a12b6a160969ea8bdc14d2e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-submissions-5591c3e066a7e4066f46ad9259d47c7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-submissions-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-any-api-23ce5fe03a72b8b92f4c0373c289ac85.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-any-api-2cc77b5ea4b45b7ee724687c14467261.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-any-api-d34228fe0ea5aea58ceb8ad3c32ed940.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-db-008dc0e9968f6799131ae4b8b208b112.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-db-0bc37b5f5d5498d8771db41a1e16a982.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-db-681fa4a6fa6cb7b76b53c0bb6085cace.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-db-74041a1cd73f08568e0ec3ed47a172de.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-19c454491469bb4baac868d543f48c48.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-2c888a383975451b85f071f96c07a849.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-334f4f62624615af2cc14829ff37be7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-441ea60f05f966e781a45c27f0c1432d.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-523f9782716d9d1f6a85039ec487ef5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-73e00ca7db916ed6c728c1ea942e0577.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-97fdf4928bbd76fae340c4c5446a338a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-9dea660ab98d663f0efe8a0b1c33b059.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-b66a39c48610a87259a172e4f5cf2fee.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-c7e1acab172697ab915921160c7d0087.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-c9506f63ff82213ed0ffcd809196c6f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-f34034c5adff9e3ed6de1b8ed77cfaad.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-to-email-fa3064d32c24f2074e60835d6d0ebe62.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-6c834138798466361126510722b04f6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-87393b6cbe65ceec06a5ec19e419100f.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-c64d112b09ccd6fd1b8f5dd595338d1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-with-captcha-cae1c922212fa7c1549f820e13a75cb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-with-captcha-e81493486edc65b51a46933e4d69c1ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-form-x-3ac76b892c0315db178c6ad3b771092a.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-14cc2ff52c2662c5bebf9121075ccf4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-6077f7a94c87d9a1b005a233e3c6fd5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-6dcd6771f1f0746a16b380bac310ab87.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-79bb03ced62c925cc3980f7773c8b468.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-8da30969bcacb440bbb986e6162d8445.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-anti-spam-20311a33f3f379efbba8f0342b6a65da.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-anti-spam-87058e9c1b26afbdd8a6e1c7e1f576f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-anti-spam-cac5b9f1e3e6750110efd6bb6787f157.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-anti-spam-ff4c8819921d9a081116a64b6a2918f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-bb71699aa4349b6b3064f95e45538058.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-builder-e7eeb43a188e099bb735454caeee5ee1.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-forms-f0c94fb1e754e56b41cc5bd812bd2131.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-list-572bae7edaf128953359cfe6de03a4a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-list-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-us-page-contact-people-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-us-page-contact-people-500d22096689e74a2a7a6d680b428339.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-us-page-contact-people-b847bc73a92d46d668812fa6ef8e89b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-us-page-contact-people-b935aac9392ea74d48c16c20e8b0b995.yaml create mode 100644 nuclei-templates/cve-less/plugins/contact-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/contactme-96de724cebfb88ce342c3f1cd99b7f35.yaml create mode 100644 nuclei-templates/cve-less/plugins/contempo-real-estate-custom-posts-989d7e2b18423ced6908cb91d5240631.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-audit-a03a0aef3cdb2ee1e486094cc570f1e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-audit-bdf28a131c7bd7c8afd4060cccc1802a.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-aware-sidebars-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-aware-sidebars-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-cards-3504e7e5ce554ea17877d4ad4d619862.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-cards-c0ae11bcf65a3a05752255a9835cc822.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-collector-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-control-65043d39bf222f68f6c9850d424ae1bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-control-6cd803f0fa2a9a46d6f2307a3acf4872.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-egg-b1d431b2d71fecfb14bc9d5f71e53d5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-egg-e3ab5ea87cccc6d9dbd7e7c3ec127075.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-excel-importer-d376b4d580b7428d3bfbfcb6ac5ff40d.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-grabber-d1c8ca034f832b8e22c96845d2890940.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-mask-1c3db202ed4136234a7dba357e335f3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-protector-0585d1bea582d0ee6fb87cab95609406.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-protector-457bded7758897bb7b11c24dee26d4c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-protector-5a70a8d7dfb4ee35e96ebed234af90de.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-protector-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-protector-bd26cb20f513a11738059a698b560137.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-protector-d2daaa3d964f6f32895fca6e21e6cab6.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-repeater-8bc6ce24c222c874630a145ef16e8d93.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-repeater-ab2b677573aede58b8661a8c8b875adf.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-restrictor-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-slide-8acf2c0ab08c8e98004387e8ebf54bb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-slide-d36d80c800d370d4009d1b192f222cc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-staging-a29cb4528fb3dd359faf1d68a8cf9ee1.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-text-slider-on-post-321e86531ce3a7401f2a887940f1ca1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-32b155c617c0c335f9330107a2737ef9.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-96403daec96064716d990b4ed68fc604.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-f50e7448551c79441add3846b2a5874b.yaml create mode 100644 nuclei-templates/cve-less/plugins/content-warning-v2-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/content_timeline-7f9ad1d6a2154bddb398590843df9930.yaml create mode 100644 nuclei-templates/cve-less/plugins/contentboxes-eaa7c0a2d867f267f85dfa358433a0fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/contentstudio-573a62057c81ca4962d570ce03558e74.yaml create mode 100644 nuclei-templates/cve-less/plugins/contentstudio-64bd1922f633605cf49031a3735ffb86.yaml create mode 100644 nuclei-templates/cve-less/plugins/contentstudio-93d0c9fb7bc094c24fb138bae4f602fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/contentstudio-9dbce4bd062a39cef5c1a852c279047e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-code-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-1fcba72eb855bf7a2b762f45f8e9327d.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-2613b63d2aee689ccf6be1c1b97a178f.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-4f98def5aafbaedc907582ddf709a1ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-534d85fc0380423c37750b4f71b369b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-53642a245d326d7cbf44af5789554e3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-53bd8ee68daf44e8898790dff3d4d891.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-53c528c4b38bd34834da864bf5436a73.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-5e73e241c87c5dbc4d6ce35aa938828e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-757bd659f9146e7fed02497d3559c2e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-89931846724982da840bead82e16369b.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-8a640d3ed297a8a63d17c701796646c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-8e81f52602da7d34f1be2c2a8e304501.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-9580adf700b409fcf11b1b8ce6a8f986.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-9ac93e930052c6b551d522a1a37f90fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-9c0847af71db5cbde2297c6d8117181e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-a3fa9aa05831cbe48f93e588aa23d79b.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-aa986981c75263be7a2313fe5bb981c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-adf21f96bc20b891592eb95e06429f24.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-b3fb140ad00234395ef28e4892077821.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-c747e3cc597300516c2ada9764e8c1be.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-cad4f56715717797069f7a87850b72f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-cadc46493e5e64619719bfd06035e262.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-cd8aaefa2a1be6647748a924e3adf35e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-e13fa86cb5f0a76818b71a18a333569e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-f0c828ee470540e4c37a94d5e7637488.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-f468941db7d975cc4bd3298b085b669f.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-f4eafb52aedd774a77d6abb99f32e10c.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-f99fe05b2429bd9e4943506324d48d85.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-feebbbe6815c937983c3b7fc4e387586.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-4f98def5aafbaedc907582ddf709a1ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-53c528c4b38bd34834da864bf5436a73.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-757bd659f9146e7fed02497d3559c2e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-82c2c907402b124f31a2f373f11be562.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-8a640d3ed297a8a63d17c701796646c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-9ac93e930052c6b551d522a1a37f90fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-9c0847af71db5cbde2297c6d8117181e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-a3fa9aa05831cbe48f93e588aa23d79b.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-aa986981c75263be7a2313fe5bb981c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-b3fb140ad00234395ef28e4892077821.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-c747e3cc597300516c2ada9764e8c1be.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-cad4f56715717797069f7a87850b72f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-cadc46493e5e64619719bfd06035e262.yaml create mode 100644 nuclei-templates/cve-less/plugins/contest-gallery-pro-f4eafb52aedd774a77d6abb99f32e10c.yaml create mode 100644 nuclei-templates/cve-less/plugins/contests-from-rewards-fuel-45ed5bc2a620f7b73012888c5d094ada.yaml create mode 100644 nuclei-templates/cve-less/plugins/contests-from-rewards-fuel-7445eca3ede10516578f424839049031.yaml create mode 100644 nuclei-templates/cve-less/plugins/contextual-adminbar-color-aaa55eb82dbd089503acfbd59b1c1516.yaml create mode 100644 nuclei-templates/cve-less/plugins/contextual-related-posts-3e85c71c88d12aeaac665ff72e05dcde.yaml create mode 100644 nuclei-templates/cve-less/plugins/contextual-related-posts-507e2521f54c5e6ca19bac49a7a788fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/contextual-related-posts-5edac4e24aea010bac0d630a89afdf47.yaml create mode 100644 nuclei-templates/cve-less/plugins/contextual-related-posts-ab86f3a4c1a5f2be4ec7926458a9f257.yaml create mode 100644 nuclei-templates/cve-less/plugins/contextual-related-posts-b2db28211fa50e37f6b6bfd260ae4ccb.yaml create mode 100644 nuclei-templates/cve-less/plugins/contextual-related-posts-ea8b272e63e8b928e0d82ce3f2c7b461.yaml create mode 100644 nuclei-templates/cve-less/plugins/contexture-page-security-9a80eb4e9ae6ba3b2c9128c9152fe450.yaml create mode 100644 nuclei-templates/cve-less/plugins/continuous-announcement-scroller-bbd95e8edaa114935e8c46570e7cf3d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/continuous-image-carousel-with-lightbox-4afaae0eb67cba7aee3bb7f48388cd03.yaml create mode 100644 nuclei-templates/cve-less/plugins/continuous-image-carousel-with-lightbox-d1d5a17953a33d04ba0957e7769eee44.yaml create mode 100644 nuclei-templates/cve-less/plugins/contractor-contact-form-website-to-workflow-tool-9a55a55c80f33af03798b4f5b44c2509.yaml create mode 100644 nuclei-templates/cve-less/plugins/control-block-patterns-c4ae84dae7d5de9c58b9c493377ad809.yaml create mode 100644 nuclei-templates/cve-less/plugins/controlled-admin-access-a7fbc15e992c578892e165c742bd4873.yaml create mode 100644 nuclei-templates/cve-less/plugins/controlled-admin-access-c49ea2c86d8c93655dddbd6be61fd77e.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-hd-flv-player-931a68fe7b31a6c4742b24a2e8784e8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-comments-5f9367f594e64f78f39747766e36b5a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-comments-c9875ec40b4bfff20efe07d7ffbd5d06.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-gallery-27521f4f3d223c8b6a8b829305f4c5c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-gallery-2cb21cf10e585cd5925c48e682cf6673.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-gallery-439a38f99b97f598550cea829cc025f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-gallery-5a110fd311341876d97192705d1ff40f.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-gallery-61ac26890db9b6da684b026a500b1abb.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-gallery-e26e50c2a1f74878104460c1a935b34d.yaml create mode 100644 nuclei-templates/cve-less/plugins/contus-video-galleryversion-10-e4eebb35f2461b3cc651ea0b61f79101.yaml create mode 100644 nuclei-templates/cve-less/plugins/conversador-2888b8004776c21ebddecea6ec731145.yaml create mode 100644 nuclei-templates/cve-less/plugins/conversation-watson-a48a527c714ec711ca739eed07091779.yaml create mode 100644 nuclei-templates/cve-less/plugins/conversational-forms-1c83e2fc407fdbaee8e0a7b1d33de8b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/conversational-forms-22b31e4572f874fba75c72ff00d007de.yaml create mode 100644 nuclei-templates/cve-less/plugins/conversational-forms-d06ae0bd2926a035277d571533319f2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/conversion-de-moneda-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/conversionninja-f35417e8a6d1f5736025e50e8ca1a9dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/convert-post-types-8cfa5c88e9f41fa81abd69a4c0a4495b.yaml create mode 100644 nuclei-templates/cve-less/plugins/convert-post-types-c58d543f66167e9552cf6cc989b83b2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/convert-to-blocks-fd9bc570df9e6e1f10861293d27d4049.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertbox-auto-embed-8451bc0b3344f88890ab58dfe6424c23.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertful-0f483e5b57556e64c6fcbf6984188e67.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertkit-530ef54f0cce1110a26e13d9009961ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertkit-5ccba34100497998aa68e15dc82c8875.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertkit-a064b7a7a37c845ee9c4b53a944b4505.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertplug-3445f10edb771a060415612c26e8b8f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertplug-350d1c9101b958bff14b2cd20f908108.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertplug-c180a9b603d8380fb7d1168376590f63.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertplug-f630b1d3cc9f84151af09d692a508d8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/convertpro-144ed0d6a5cb015106c17c6c273b534a.yaml create mode 100644 nuclei-templates/cve-less/plugins/conveythis-translate-553b8c0b3cbb1236b177498b5b57ae88.yaml create mode 100644 nuclei-templates/cve-less/plugins/cooked-13669a276e19b8811f99e2913ccb5a23.yaml create mode 100644 nuclei-templates/cve-less/plugins/cooked-6e286583f72963c211e1187360769087.yaml create mode 100644 nuclei-templates/cve-less/plugins/cooked-pro-48bbdd821c29a9665fc692ef526172c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/cooked-pro-e81fd7787c96dcecf9ab7ed7e0fa064a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-bar-13b25bc0903a03574dd9d52d17a8d7fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-bar-5f63dbab28102f21dce668e1dd09a569.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-consent-box-0a7db26507a2752830d796f872bfc74f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-law-bar-daa176383a0d1a1f03b0870eb52cd5ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-law-info-c794524768b79fbeacb43dc638d96e23.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-notice-4871efeec934efc06ef8f938e4a88d59.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-notice-94366e72b8b16247e4525177a190a390.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-notice-and-consent-banner-0f75bb052c76ac287df6a3cedb6cbaf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-notice-consent-bd04f483d63aabca8f2d0d86dcbe84f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-notice-f08aff12bfc66296ae4f842e638dd13b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookie-params-72e30d516064ff268f270b89142b1d08.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookiebot-88740e25cc28fba39de089d7afe48b02.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookiehub-2606febac98b5b77708f94f9707ab5ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookiemonster-5b40ee65b1caa7d96e4e60846451b515.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookies-and-content-security-policy-f0ed757a74607e0e7be560cb144e0abe.yaml create mode 100644 nuclei-templates/cve-less/plugins/cookies-by-jm-b9008bcb5ccd36f2981a1df579798a3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cool-facebook-page-feed-timeline-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/cool-tag-cloud-02f969afa585249fd7cbd8abedb25b46.yaml create mode 100644 nuclei-templates/cve-less/plugins/cool-timeline-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cool-timeline-6ce37c385f3376e7926c7b8faa81bc2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cool-video-gallery-1a5984e73d9bda9668de2c9f32433df9.yaml create mode 100644 nuclei-templates/cve-less/plugins/coolclock-d3f53759db6cbb2a0f47408beaf6dbd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/copify-d08d0840632760096f6b8acd75a58e66.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-delete-posts-1b358fe1178e63af268bdd4f6a81f5be.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-delete-posts-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-delete-posts-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-delete-posts-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-delete-posts-f8c9b929aeaeb9c8fafdde93d3c6755f.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-me-0605116109dea812447b77431db29f66.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-or-move-comments-3199c52f1f975758dfffb8998d727e53.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-or-move-comments-4c213df5dc6174e79a79df8f8e0cad2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-or-move-comments-7b6f5ddd1a73a6079392a4dafa7418fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/copy-the-code-54ab7472cf90fa30b87c2b5f7b48020b.yaml create mode 100644 nuclei-templates/cve-less/plugins/copyrightpro-04bb0fa287a9e5d3f21854cb26990e9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/core-control-eeca82a89fbac0124d669de2f8301089.yaml create mode 100644 nuclei-templates/cve-less/plugins/core-web-vitals-pagespeed-booster-848d3b967ba51cd5adfd6ee6af7f2576.yaml create mode 100644 nuclei-templates/cve-less/plugins/coreactivity-90b890e5600ae938f133578a1bc1190d.yaml create mode 100644 nuclei-templates/cve-less/plugins/coreactivity-d3a19cbbaa27911e489d78dc5e2a05f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/corner-ad-34e1ea4c84115991aa9040d8463cc384.yaml create mode 100644 nuclei-templates/cve-less/plugins/corner-ad-490cf4e76b6c86f1bd637de80c3840f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/corner-ad-927cbb958df998dc837f34fcb0cea909.yaml create mode 100644 nuclei-templates/cve-less/plugins/cornerstone-df57edbeaacf1839941749d528a6f8bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cornerstone-e6194f3012a16cad12df41e5eff8a678.yaml create mode 100644 nuclei-templates/cve-less/plugins/corona-virus-covid-19-banner-e740d0f5f3811a1aac1ce94a356e0d8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/correos-express-0395bd0434174482278f530635a1d70c.yaml create mode 100644 nuclei-templates/cve-less/plugins/correos-oficial-ef4882c3d4c4772ce7530ff30b7b1640.yaml create mode 100644 nuclei-templates/cve-less/plugins/coru-lfmember-55f7bc7dbafb42aecc9f8ebab372d604.yaml create mode 100644 nuclei-templates/cve-less/plugins/coru-lfmember-62e533687797ef0b9325ac92a155944b.yaml create mode 100644 nuclei-templates/cve-less/plugins/coschedule-by-todaymade-515b13054c00d74df0dd204b8f66cac0.yaml create mode 100644 nuclei-templates/cve-less/plugins/cosmetsy-core-0e249eccad21574e2f41d6b727c12756.yaml create mode 100644 nuclei-templates/cve-less/plugins/cost-calculator-builder-7ea277ec9b125c8bb0dc05cbc37ef294.yaml create mode 100644 nuclei-templates/cve-less/plugins/cost-calculator-builder-pro-2a7584a9fe53a3524213cd8679c71b87.yaml create mode 100644 nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-1da3bff2b929ee79b3408ef2cf734abb.yaml create mode 100644 nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-bdd35485646018dc29c3dede2e0cfc31.yaml create mode 100644 nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-c1f81ab3aa2788ffb3caf7e813611f11.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-1424f14be2dcb113b8417a6cefda326b.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-178ad27fec6356c0ff4786fef5ed9b55.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-39efec1d687062290aa82ba498987905.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-3d16ca713159983964ffa612b7a2f5b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-5980acc6b3204929292de13732c438ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-8219532133f7917d1e83bbff3f75f37b.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-95e1c7301e20b06d93d00a27ff0164ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-ba663052cd3e15a64b57c5574e6284ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-ecd06ad3b241a40ab31e78d6ecc1667e.yaml create mode 100644 nuclei-templates/cve-less/plugins/count-per-day-fe9a4afd9a7e82aa5eb0f999cd08a3fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-builder-1400c910950cfb3abe9cd7aa01e509c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-builder-2e3506811e52ec17c7634c4366161915.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-builder-8078b4f9949ef9f89bc0fb06a9571b7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-builder-9fa44d8d4f03281cc0e3d7ac38bce0cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-builder-a8426729df158cf9f48bc7ffef172f3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-builder-fc7104705e7470f1c2f9c7438b20c375.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-timer-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-wpdevart-extended-a267ad47aaacbda283b13d30d0de08e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/countdown-wpdevart-extended-c8561a6d177892f154af9b7c10500c01.yaml create mode 100644 nuclei-templates/cve-less/plugins/counter-box-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/counter-box-ac3838985ebca1d5500d58f039c66d50.yaml create mode 100644 nuclei-templates/cve-less/plugins/counter-box-cb0d923b3f440d22cb21cc4f45b630a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/counter-box-d41f2371740382f5fe12f9b2729e260d.yaml create mode 100644 nuclei-templates/cve-less/plugins/counter-box-e218b5d377826292a46ae91919228725.yaml create mode 100644 nuclei-templates/cve-less/plugins/counter-yandex-metrica-ffdf4101e49b7fe440cdcd6bd244561e.yaml create mode 100644 nuclei-templates/cve-less/plugins/country-state-city-auto-dropdown-b77c5c4f0c4cc702e5668e3bdfcce6f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/coupon-creator-143ae01b8a1b2078f71457c5b9d33fd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/coupon-referral-program-8e1c97786e963545019da486b6c3016e.yaml create mode 100644 nuclei-templates/cve-less/plugins/coupon-referral-program-eb26b5bf441be9e4d97a8d78bbf90a65.yaml create mode 100644 nuclei-templates/cve-less/plugins/coupon-reveal-button-058f94a7273615ab6b78bfcaa4aea16c.yaml create mode 100644 nuclei-templates/cve-less/plugins/coupon-tab-for-directorypress-pp-4496d2c0aaf13ede3ac3df8bc6db376f.yaml create mode 100644 nuclei-templates/cve-less/plugins/coupon-zen-110c4d87a801a711ff37411fb7b2a2b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/court-reservation-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-blocks-b6fdd6c618695aebb9014f9dd705ea55.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-blocks-b8cbfee14c6231d74725cad73dbf5ac2.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-33bb20c48315e8c455839c78ef66e1b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-4612690a2b5b9e2adc467251d2200410.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-beee0c1304e0da531df84f8029d7259b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-c94ec523ba103bad6a372ee7e463bd4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-e62ea330281841ac90814f51a2e6e358.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-easy-form-builder-7cb4dee16a7431d0aa1859c958e33f53.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-image-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-image-store-49c455ef861d32e49a005dd8ccd33e8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-image-store-536b5e2cfc2a08abc865e016e5e97cd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-image-store-9bd2beaa8992d85480d64ba226ec3b74.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-multi-view-calendar-00da8a794f6f0b78648d305ed7e6dd04.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-multi-view-calendar-0bfff3a27e6168b67b0fbc2473230506.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-multi-view-calendar-184f300745326a1b6a8a5b5650121584.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-multi-view-calendar-43693b5261d7e0528a3c7e646e9f1d6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-multi-view-calendar-7f3bbc96f4be604cf6114ca81b08ca3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-polls-49a01bc79b6fdfb5a76a16441b827dc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-polls-51f0935847f259142e562e47f27b4145.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-polls-87b936573487d2a82b44f72e3ce646b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-polls-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-polls-e2d507e5368356b0023e6347145e20b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-reservation-calendar-264c8b14fe403c6cf4002aa9134524ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-simple-newsletter-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cp-simple-newsletter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpl-8f2565646e20d8caed1d049227635516.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpo-companion-1cb9694a410b975eefa3459fd9bd670b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpo-companion-4e988801588842dadfebdadb774a426e.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpo-companion-a426d8604178ea06fd441814d816d538.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpo-content-types-20277bf2aad5677f3f9bd4eac5f630c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpo-shortcodes-95b40623fcd88a0f55eead954c03a159.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpo-shortcodes-f0281688d74f818cfad7334eba1cc561.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpt-bootstrap-carousel-690a69806e87114ee81f4affa15549cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpt-bootstrap-carousel-e983f7dc1644cbc367524173b0bfd556.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpt-shortcode-62cbd308ef66719516de2026de43669c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpt-shortcode-f4d676108d638d4ae50c1c8a6da03c12.yaml create mode 100644 nuclei-templates/cve-less/plugins/cpt-speakers-0fbf5aeb9219f7fac5b857b809c640a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/crafty-social-buttons-10ee5b6870d72574cd2ceacdf76db39e.yaml create mode 100644 nuclei-templates/cve-less/plugins/craw-data-ba3212d4cf255eee79a1e340ae3eb317.yaml create mode 100644 nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-3b77b21efbe327e0220e81411dd8c94e.yaml create mode 100644 nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-7a054d832bcd0e60bc0c72161b137fa9.yaml create mode 100644 nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-8031f45dad82be856d692bf4a86bc7d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-a24d4eae978465f1c7539ec2afb5d89a.yaml create mode 100644 nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-b80148cb4f7c1ba75ee55b0181d810f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-d47618ad7b3ff873ed22aa3e5efab3e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/crazy-bone-cbc819d180f6774324bc2ec20985637c.yaml create mode 100644 nuclei-templates/cve-less/plugins/crazy-bone-fc9bfd70a66ba0377d47424bbce696e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/create-block-theme-aba320cfa8d843f5c52f809a638b1428.yaml create mode 100644 nuclei-templates/cve-less/plugins/creative-addons-for-elementor-20f6bee077964f1739b79a57d0927952.yaml create mode 100644 nuclei-templates/cve-less/plugins/creative-image-slider-57ebfd8af23d19d638563ef7a40bf411.yaml create mode 100644 nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-20e49640b2d172fe60c3e66f7c5c2961.yaml create mode 100644 nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-883ac125446954bc56b63a659310e326.yaml create mode 100644 nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-f890a87599d700193f94857dcecd8b3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/credit-tracker-1adc9982ddc5e20d6e411f5dbc1caf02.yaml create mode 100644 nuclei-templates/cve-less/plugins/credova-financial-bed2d5e11413b5522569fa9192fcca60.yaml create mode 100644 nuclei-templates/cve-less/plugins/crelly-slider-11611891705bb620b2fbc93feb153c11.yaml create mode 100644 nuclei-templates/cve-less/plugins/crelly-slider-4ff3f91a93b3247cebd7620836598b68.yaml create mode 100644 nuclei-templates/cve-less/plugins/crelly-slider-c49e2e06de0a40bb63220fc2a17c181a.yaml create mode 100644 nuclei-templates/cve-less/plugins/crelly-slider-f264ee9267574176bc2aef0a4dad14ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/crisp-2b1c5b57df30a34984198b5c1016c519.yaml create mode 100644 nuclei-templates/cve-less/plugins/crisp-3e9db5ca5f74e03bc884849a472e7363.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-customer-relationship-management-by-vcita-6c0eb1e7574e09726dcd946f510854bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-customer-relationship-management-by-vcita-8a9c908ec048eb5db70aedddafa15d74.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-memberships-f670252b93de10e17e15c533cbe48519.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-perks-forms-5b58119863530e15cb2cb1eb0cca6c45.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-perks-forms-6323dfe519d667ba98cb2cb3a674b49d.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-perks-forms-84e13e367dca55445350e25af8c4c3b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-perks-forms-aa8353adb3620cf0044ffd866cd1ea46.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-perks-forms-c0c58834ca90dc6201d9f559b76ed213.yaml create mode 100644 nuclei-templates/cve-less/plugins/crm-perks-forms-f99e157b145b06140fa576ea488dbce3.yaml create mode 100644 nuclei-templates/cve-less/plugins/crony-0a163e61bcc69936d2e5119ad16f6e94.yaml create mode 100644 nuclei-templates/cve-less/plugins/crony-44c866df4156e18647ea081befd62b4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/cross-linker-6efe820f12fb9f3137c56cee070730c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cross-rss-477b707e65a4938013b3152b7f4ee656.yaml create mode 100644 nuclei-templates/cve-less/plugins/crossslide-jquery-plugin-for-wordpress-66a96d7ee2557e873f3475f1e86dd229.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryout-serious-slider-059632153ccb2185cede1112e5adabf5.yaml create mode 100644 nuclei-templates/cve-less/plugins/crypto-converter-widget-306b847d2e6035c47912eb7c67152660.yaml create mode 100644 nuclei-templates/cve-less/plugins/crypto-converter-widget-56a618b5c71170cabc6b19e08404193b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-donation-box-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-donation-box-6c67c1bd228e1520f2b8d5bf20bbed3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-ad516406623ae6ecf9dab15916a4b830.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-bdc2096d72e0a42fecec9d81de2115f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-d5383d4e717242611eb588cd04425c5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-prices-c5c657b48dcb3ae9c728f121d2d0aa85.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-pricing-list-204c631f27f2150998aee71c01b37779.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-product-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-widgets-for-elementor-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-widgets-pack-b49e5a0564db1b49d18da40f1e13555b.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptocurrency-widgets-pack-e0f9049a8a7ec17a668bbeb16a71bba1.yaml create mode 100644 nuclei-templates/cve-less/plugins/cryptographp-6fe350acb2d7b08afd5696f747d0413e.yaml create mode 100644 nuclei-templates/cve-less/plugins/csprite-2707f1b08a4a34c3e1947ca39cd73e06.yaml create mode 100644 nuclei-templates/cve-less/plugins/css-adder-by-agence-press-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/css-hero-c65a895d58bf856765c9e28ed468f2ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/css-javascript-toolbox-72b05538a975fe47e341442f2bdeeabf.yaml create mode 100644 nuclei-templates/cve-less/plugins/css-javascript-toolbox-b07fb9d1ee02580a27668ece326b4ac3.yaml create mode 100644 nuclei-templates/cve-less/plugins/css-js-manager-61c2b811bcc6041f6a82b35f50d9b2b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/css3-rotating-words-035f7dbab49cd7102e78202706c7a9af.yaml create mode 100644 nuclei-templates/cve-less/plugins/css3-rotating-words-8fa029836e390a41910a91e1df99c734.yaml create mode 100644 nuclei-templates/cve-less/plugins/csv-import-2adda436491ee9e5c0c2e9ccffab9afe.yaml create mode 100644 nuclei-templates/cve-less/plugins/csv-import-export-888fd755a466f61b6b5975477e6bfb5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/csv-importer-87391130a959fbd6c64c577ce3bb974c.yaml create mode 100644 nuclei-templates/cve-less/plugins/csv2wpec-coupon-f4d3fb2528b229e51486f812ddf75b90.yaml create mode 100644 nuclei-templates/cve-less/plugins/ct-commerce-62cb33b4f205d311d390e62fba25cd36.yaml create mode 100644 nuclei-templates/cve-less/plugins/ct-ultimate-gdpr-949e3c48d41e3ab6ec3beff5ca3c241d.yaml create mode 100644 nuclei-templates/cve-less/plugins/cta-0fa73cd35698d01b3ea111a06727a347.yaml create mode 100644 nuclei-templates/cve-less/plugins/cta-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ctt-expresso-para-woocommerce-7f12ff16273eb990bb45ef4156cd86e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/cube-slider-bee7ee097d9c2854b2e0df3652ff1065.yaml create mode 100644 nuclei-templates/cve-less/plugins/cubewp-framework-c805577cc74fac959884880eefb7ff71.yaml create mode 100644 nuclei-templates/cve-less/plugins/culqi-checkout-36e8e0f9a5511d98ca66f925304a3a33.yaml create mode 100644 nuclei-templates/cve-less/plugins/culture-object-b758c0c37fd1d990bf9268c1c848eb10.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-converter-calculator-d34575a4acf043c178e1c507a8583e51.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-converter-widget-07141f22dbd69d711616f0823783fd10.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-exchange-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-per-product-for-woocommerce-1435e710f882ca24fd63e6f30e30c39b.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-switcher-181f8727807ba64411fbc27b7d06a7f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-switcher-24c409175b75dd74bfd113d5f584dc08.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-switcher-2d27e10efdfec8fc58acf4cf64107b4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-switcher-666b2fb2c881bde28dcf6538f4e79c83.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-switcher-8355052ed50773dfc024174bf5f762ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-switcher-d88f90595d62f553e29356fc831883af.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-switcher-fc8e4381ea5ebd79c418e0830ad7aa41.yaml create mode 100644 nuclei-templates/cve-less/plugins/currency-switcher-woocommerce-57f78642fa9cede94bd35b0316b99b78.yaml create mode 100644 nuclei-templates/cve-less/plugins/current-book-538fbd9fdeb83d5c5aab2ed683914a16.yaml create mode 100644 nuclei-templates/cve-less/plugins/current-menu-item-for-custom-post-types-8cec5dcdfbdfde2c1732a5fcb98c3da8.yaml create mode 100644 nuclei-templates/cve-less/plugins/current-template-name-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/curtain-546cde9b90f17421631d383528055da0.yaml create mode 100644 nuclei-templates/cve-less/plugins/curtain-c8c8f457de7ea311efa222b66a51a434.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-030f26819c32911a473f408d586efb1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-200c405b0773aa3952229a5ad35202ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-67e917a11cbf398c051530dabd0fa5db.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-68585d4bba03002044d20ac970108ad9.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-96f5c1ab6101dad2bb86f8e89d978872.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-a40f47bd3665fa9aac14a11f65a2ad01.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-b5d35374c7a9af094e4ec14c748dcfa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-c4be63bba4a89fa3e83779737577feda.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-404-pro-f1094be99ae561ef22eac5b48376079f.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-add-user-f2aee954ea519a4193f03af67cb64cc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-admin-login-styler-wpzest-0e96d2ec3c953050a17aaa45bf8227cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-admin-page-991c1eac5fa7c61140560d60fd4bd8b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-background-e463f937915a727f73f93451bc29c7b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-banners-3a4fdaa86716f7a2bccd54fbc792c9e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-banners-75a7478c504eb31e010492e08d11afbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-base-terms-59797dde213a6367a6157622c3715782.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-codes-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-colors-for-real-estate-manager-26658d0497122e0a7345c841c1d21163.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-contact-forms-b5107e8a16fdf42082a09176739d6a43.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-contact-forms-cc09a89f63ab3cefb7813241a6ecaf00.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-content-by-country-d5a15b7cded52d19f32afbdd2169bb8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-content-shortcode-250d58918649c83e91a9349c1cb1cbf0.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-content-shortcode-2c26192ebe7847230519e6e8ccb48b5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-content-shortcode-bdd19c036429e94932241df6aef820bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-content-shortcode-ef34cbe0110e2c6603d8d105d71a9566.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-content-shortcode-fe4470deb32fffc7ae711831b5c4f60c.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-content-type-manager-262dd6c0036b365e35ff5544b3d1cf02.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-content-type-manager-b81d401412f069e93cf6d2de27788cec.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-css-ae09c1b4732804e06d23d0fb90974789.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-css-js-237f33dd283cbe8ba991ef6c6d099f49.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-css-pro-ee68c39b627e562f2e3f279eade2d8f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-dashboard-widgets-521091f698c90705cd994fe26c1eef68.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-email-options-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-facebook-feed-167f18c0fe5e035801a709b220b7d533.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-facebook-feed-4c7bbe6117155e4a798748fa2ed8fb9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-facebook-feed-4f470840b5c22d9fdd8f597a9956aef0.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-facebook-feed-58a423ad62b9e5f8da38c911a8b01c5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-facebook-feed-ac43cf44566479227a4aa05f1f51c953.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-facebook-feed-da6dd99d1493b082c05d60ab888f9ef0.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-bulk-editor-5dbb9b01c1ce63e54b37aeec51a21a8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-finder-38fb53416dee6ab7b6bba5cadf55c4c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-for-wp-job-manager-1b076d88024e9e8fa50fb517fb49e6d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-for-wp-job-manager-c6eebad0122883aa540363f1389d9ced.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-suite-30ced7d36e2903b8ecf83d1c6ae8e869.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-suite-5914d2a62c6e9fda2e52358bd6a051ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-suite-aeb1af030c75596a2eb738838b5e8bf8.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-suite-f388cd40277e7ac72bbf02fcf8235c63.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-suite-f70de88be0d0ac1b3e5a362aa6fdf31c.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-template-41a8bca5b4e509ff5992617799743aa0.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-template-994931528097feea63f63eaaf2d7d1d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-template-bf719546b14904a6ed90c49ad64d0d09.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-template-d21e7c2b8075bc32648e9e728716b83f.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-field-template-e43554bdd9278f30da878de76ec696d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-fields-search-f6d418df63a84992a5e6e409836b9a8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-fields-shortcode-8199a4f2b40a6eabf0daf50bba86ea3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-font-uploader-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-global-variables-1e3e94ac66c9cccf9af54623829f9f1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-header-images-efdfea6c2ba24e39c6bc0574220a9327.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-landing-pages-leadmagic-c0cb327a973fcb4e19ac20c22cf757a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-login-325931d9fc1c27761908e3875605b580.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-login-admin-front-end-css-with-multisite-support-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-login-redirect-58218c3064ab4e32ea67258adcb97a88.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-map-afd7cbc1a6da1a4ae770134f7fa61d59.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-metas-bfcebe2d4bbc5af7082ecf54e71037c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-more-link-complete-38be090459bf4011b3b41398d60796a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-my-account-for-woocommerce-8d1f98a443fa11a68eb0fbc9dc6290fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-options-plus-6a0d7503e007dc4edef85efcc548b100.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-order-numbers-for-woocommerce-74ba5cc85102289a5d0b78a359268c6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-order-numbers-for-woocommerce-8f61fbaad0ace89497c5a7515dc4a1eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-order-statuses-for-woocommerce-2862da944ba4b374cef11881cc898ccb.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-order-statuses-for-woocommerce-a9ddfb16bfebca41780e91a8896bacce.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-order-statuses-woocommerce-bab11b77c0b278513f67c7444868950c.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-page-templates-by-vegacorp-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-permalinks-a4a1da4d7b74087a323eb167fd7b89be.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-permalinks-b5323eb3191a74d0ae4ca412560414da.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-type-cpt-cusom-taxonomy-ct-manager-2ec0e7698cdea1d83725ecb0fba1cce8.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-type-generator-b832c46935cda704a801fdf109478436.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-type-list-shortcode-7a94ec5884e06f0a302f2bb4d1ea7e80.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-type-page-template-41234e0f9201b9670d0979855b89255d.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-type-relations-e40fd02f8747cfe679a9add88aabc8af.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-type-ui-797454d6297b04e0aa32a4dcc6b7a524.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-type-ui-cc0bb9dcf67e5af12d7fa45c43bf04f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-types-03278634b9340d2d49106fefa161e7cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-types-134091eb792475d128936c227b127601.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-types-dc2b0f4dde9149582362d961339fc430.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-post-view-generator-ba5dfaad8cf69b254b291ccd03ab7c28.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-and-login-forms-with-new-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-and-login-forms-with-new-recaptcha-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-03faf5c8e4483bcb72677008477fdf8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-12554d58fa3f58e451e08d638496a899.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-161c815356a117f2a7d79bcb200b7ff9.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-1ae4dd533f16291d906e419f9b6a90b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-1d190b0241a92bf4c0712f3b939e7393.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-405ccafee5e024bd55baaadb07fd61d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-49f8b17fd3f7202d469cd36057801698.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-4a6f7a73f2b2510b444077fe0160d05b.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-4ebf8466ab7647227779ddf8d6ac3494.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-560537cf7e37552cc5fc20cab905a672.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-5b9008ba421c01f99bc8a2b66d06c955.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-5d65a7992972ebe63734d1fdf7ce6dcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-66c19504108f80a4369db438b2de733d.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-750b74705bdff8d7fe8b29d226f6a7fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-7db9573a3e8af958ed29c7bf6f04dd8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-813e709d3dd48a31f481e32297dc8503.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-85fa0155b108ebd593447d4fb927111e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-8e70f80b9a0aef35cef45454a2e20325.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-98507312be61996148f27924ae96d00e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-a93b511e834ddd2e10f787cf551e0214.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-bb05c43d4858d2cd6e99aeda4ad6534f.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-bc39873d86ab4150675c8c4fc220361f.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-d2f77ed0cac474a6437fa2cee0cecb6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e04842ca04263f6508eb41a6732d11e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e518e10775fef314a3432a0ef6a78cf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e8759c1eba32b6985f221d449c7045d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-eab40a7edf5f2e1a98131d79813fdf48.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-f0faf18308a797e616df68af878bf053.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-f7a999ea17927c5e9ebebc775b43318c.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-fcd65c8735954219062dc7bc27977dbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-scroll-bar-designer-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-search-plugin-ea2aae884b82aaf10a9b6d9e08e6be98.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-searchable-data-entry-system-503f25d9a3f350dbb09e33967b718028.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-searchable-data-entry-system-6c2c1aea05bf11797b06068cda5033db.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-settings-73efd5c8bcd4c1bfe4df6f8b395749d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-share-buttons-with-floating-sidebar-e1e48d10961945b3a2fc571529bab9c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-sidebars-4274bbe3c0d27bb54b9223f6af8827e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-sidebars-aea09105f0f61d6ceb820ac11ed09e51.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-sidebars-e7cf3375d8a38efd1be42356dbb74de4.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-simple-rss-c55993b506252ecc7087422b008f250c.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-sub-menus-f50829abfd0ab0292550a897d206e4fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-text-selection-colors-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-tinymce-shortcode-button-f62cbc07d0c97caefc6751d0180dc663.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-twitter-feeds-05b7197cf734fac5f20338febaf0428b.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-twitter-feeds-0787c7b553a6a5c88dae74eba6fc4fd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-twitter-feeds-ac43cf44566479227a4aa05f1f51c953.yaml create mode 100644 nuclei-templates/cve-less/plugins/custom-user-css-6543643d1ea175fa61a5d758cd6fec45.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-area-5946d00520fcf71340c79730911fdae4.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-area-638180480b8e5ea2f7bb663f12fd87db.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-area-64194ddc20aa7461447b4d03da264c07.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-area-88e7e4a086d6356c7121d61d5de285a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-area-f9650549fbf42fb03bc206714accabe1.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-chat-facebook-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-collector-for-woocommerce-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-03f52e4edfa7408cb52c9d72fc195004.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-087ab6a6409aed64b5c6d0e8d25ec639.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-2d6698f89f32609adbc6e12eed98ca62.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-33080b0d5149a7811a842330fcd02a9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-34547cf35ff55eca1aec11c82238db2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-5b09804fb0f54f039756dc2dbfaca10d.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-704e8a4e646ad70dffa4b5a4a231b7e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-72807f145d4d787ee0d78e0f3adf0196.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-aba3e00a2a63250607e79d5288cb4fd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b2de750c81241fb9f0e6cca06ae6f2a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b617065e23c3fb2d068c8fc7c1e18a76.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b9103fa25ff1df562a7ef31b16b8ad03.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-c4c5307df5e11c4cb59893ef8ef58c8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-ccbfe5f4150b2a60a0b0de9e47423628.yaml create mode 100644 nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-d87bb9dcf525660329cf7bc1593d3596.yaml create mode 100644 nuclei-templates/cve-less/plugins/customify-e6ebb86ebbdc2c2465c0fad6241913af.yaml create mode 100644 nuclei-templates/cve-less/plugins/customify-sites-c0b24144ee5f50c90a86d55930aab983.yaml create mode 100644 nuclei-templates/cve-less/plugins/customily-v2-43a2744fa82afcde1f284cbd5aa55b86.yaml create mode 100644 nuclei-templates/cve-less/plugins/customize-login-aa4710021e6cea364e343185a5562523.yaml create mode 100644 nuclei-templates/cve-less/plugins/customize-login-image-cdd44eb1f0b901b8f5061171a068c613.yaml create mode 100644 nuclei-templates/cve-less/plugins/customize-my-account-for-woocommerce-c07ce33288471d0dce242b9d0edc14b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/customizer-export-import-6aade0ab1cd3e84f1c328d12c13c28e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/customizer-export-import-c7389b248c40364239ac72c9e1e9985e.yaml create mode 100644 nuclei-templates/cve-less/plugins/cwicly-62e4a961ffac0b881f8af1cc15505b69.yaml create mode 100644 nuclei-templates/cve-less/plugins/cww-companion-3712f3d2b17172eb0c737744e9767b9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/cybersoldier-a97afd1d52e8ec7c0950d3b4bfa966dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/cyberus-key-589eb0de3c09a1f6b4b85bf3ecf20784.yaml create mode 100644 nuclei-templates/cve-less/plugins/cyberus-key-ebb0aac77c202e0b9298617914b34a43.yaml create mode 100644 nuclei-templates/cve-less/plugins/cyclone-slider-225f7f3db7dcaeda4fe6b0e7795cf610.yaml create mode 100644 nuclei-templates/cve-less/plugins/cyklodev-wp-notify-e785890064729677b76cdb50e8ed4af9.yaml create mode 100644 nuclei-templates/cve-less/plugins/cyr3lat-dfe9d916adc4339b514e6f246a1ff502.yaml create mode 100644 nuclei-templates/cve-less/plugins/cysteme-finder-d8cba654f3eadea699e2d001c5aee33d.yaml create mode 100644 nuclei-templates/cve-less/plugins/d-bargain-416f60ea7c83625605d6748aec7fe39d.yaml create mode 100644 nuclei-templates/cve-less/plugins/da-reactions-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/daext-autolinks-manager-5325e87d52794ad590ce110a225276ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/daggerhart-openid-connect-generic-203fbe5cb049e55d1de84283cabe5bc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/daily-inspiration-generator-01b11fa90adbc20afc1174f440091c8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/daily-inspiration-generator-bc0818b74a63c7ccc5e71ee4877ab3c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-1924e010841990f8a5472d7ce0d4475a.yaml create mode 100644 nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-1c709780f30cba2883c1f114a8ebe301.yaml create mode 100644 nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-2af4f586d3d7a602ecd50af91c2499d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-3824f011eab5214f502db246222a2a64.yaml create mode 100644 nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-efb19c791feda5e8b127998d60bcf234.yaml create mode 100644 nuclei-templates/cve-less/plugins/dancepress-trwa-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/dandyid-services-9018d0e2961530505f24475e2d5e362f.yaml create mode 100644 nuclei-templates/cve-less/plugins/dans-gcal-1c6832c32d7ec7d1a800137a443af3a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/dark-mode-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/dark-mode-1955d2bf9e3369181a1e0d457e568aab.yaml create mode 100644 nuclei-templates/cve-less/plugins/dark-mode-854c79af36aba0da3346494de4eaf39a.yaml create mode 100644 nuclei-templates/cve-less/plugins/dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/darklup-lite-wp-dark-mode-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/darklup-lite-wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/dashboard-to-do-list-59a2c5c80739fa0eba22f8a13d17e144.yaml create mode 100644 nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/dashboard-widgets-suite-2f94c3f833650d494dcd027c8f5b2a1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/dashboard-widgets-suite-669f088fb31a1c784e368a7e51016243.yaml create mode 100644 nuclei-templates/cve-less/plugins/dashicons-cpt-38a12cf4a56d072e88962074fdeb9b47.yaml create mode 100644 nuclei-templates/cve-less/plugins/dashylite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-22fbc746f561f8f03289b13752af9220.yaml create mode 100644 nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-384cfba7d4e3422564ffd94f08c53230.yaml create mode 100644 nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-3ca2d0288841fb102eec504b49f4dc79.yaml create mode 100644 nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-7bb51482172811e3c51edf370ad2cde3.yaml create mode 100644 nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-c639be60406ab3b6aefe17af97aa1a3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-c974ccf1587cec2eccea9add62a9571f.yaml create mode 100644 nuclei-templates/cve-less/plugins/database-backups-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/database-browser-e2758e6d7a956b70bbb3456d32eb61ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/database-cleaner-8497dd1697d238f17e5ca2e374ee6979.yaml create mode 100644 nuclei-templates/cve-less/plugins/database-collation-fix-fcc1a4da03b48b602844cc8edd8898d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/database-for-cf7-95d14048da02f26059f2e07a39b028ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/database-peek-f5177dce5f851a784de6243f1a4812de.yaml create mode 100644 nuclei-templates/cve-less/plugins/database-sync-2aec16dd65c0e6d2c91755c0d886efa6.yaml create mode 100644 nuclei-templates/cve-less/plugins/date-time-picker-field-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/daves-wordpress-live-search-00d2f835919a4763491bb6e0afc99ba1.yaml create mode 100644 nuclei-templates/cve-less/plugins/daves-wordpress-live-search-7110928090e9f383ac11ab04f9355ce4.yaml create mode 100644 nuclei-templates/cve-less/plugins/dazzlersoft-teams-a68d2dddb296088b38bf42abce9933d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/db-backup-3d0fd8af5f0a8aec16cd6e87b25d281e.yaml create mode 100644 nuclei-templates/cve-less/plugins/dbox-slider-lite-801a0dacfdb031773ac30c73693f41e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-050701771ca0e37751fe39d80669e4d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-0cabe3cbdd9087635cb4a8e92f2b6354.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-115f84062be09f43cd6446e8e537d648.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-2a540cf7d36146a7007600dc4f010b65.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-3813d137aafb06301157470b18da5221.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-8cf78197e7d698f2f23c8fbd16dab60a.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-c1eaaf83160125db463b30ba85a87fdc.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-d57f8fd6151dd1d65a65a746b8a04b7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-d637554edf1f6a8734fd4d40ddaa76fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-df1e63906c41c42e055b484618d26045.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-e66894a498d5cc4419643171ae03b827.yaml create mode 100644 nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-fb02750d498a9fe091fa40a841ae2cde.yaml create mode 100644 nuclei-templates/cve-less/plugins/dd-post-carousel-90dc0d96ef7711389c28489eadab8c4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/dd-rating-ab9e9f7a6a475ad09ac9f13cde54db19.yaml create mode 100644 nuclei-templates/cve-less/plugins/deal-of-the-day-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress-88fee3d667cc75ecb76505d8552cdca3.yaml create mode 100644 nuclei-templates/cve-less/plugins/dearpdf-lite-68faa1f3e16f9348cbcda9eee2cb1dfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/dearpdf-lite-6fd235aefa59090c5fd7d5db3ca17c7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-assistant-7341f9a401e387eb541b7f0ce957b3d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-assistant-c4cb405587c7aac808cc9a0330f4a287.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-bar-9f879610fe035743b89a5d4d742c5ccf.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-bar-elasticpress-cc44bf442001983fd2f67014928f8289.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-d2a83c1dca589216a7517243ae0b440b.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-functions-time-1bf084d49ccfb289b9614422c0f6cfe7.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-log-manager-5aedf0ec7cb5703a0c4feb9fa97466c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-log-manager-815fdb5c2ecc295dab6e7b3bac455dda.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-log-manager-b42518648b89a6c8b5bea17f9a27b0ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-log-manager-cdec87c9979cc4a76acefcf4b849c659.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-log-manager-f18de85deaea25c6fbd01540999d6426.yaml create mode 100644 nuclei-templates/cve-less/plugins/debug-meta-data-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml create mode 100644 nuclei-templates/cve-less/plugins/decalog-2701fe0e6794c06d119a81cdcc54c2d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/decalog-4cad88483ff2a2bf5cf9989b8721b221.yaml create mode 100644 nuclei-templates/cve-less/plugins/decon-wp-sms-09af6d4d8c4435a3e0935a8eb5df6c7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/decorator-woocommerce-email-customizer-1f3875e7da43782ec8defe59eb7968b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/deeper-comments-349bcd84d9f8de30085279d049beebc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/defa-online-image-protector-13bfe589bdd47f65243e9b0ade34cdf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/defender-security-709a1cb6d6df454bb23d66adb846b221.yaml create mode 100644 nuclei-templates/cve-less/plugins/defender-security-b3243229c8f5a6b1156c39447c936dd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/defender-security-c1ef6631b77d67c9c8c86d2d8178a478.yaml create mode 100644 nuclei-templates/cve-less/plugins/defender-security-c321ccd5d4d39fbb513def54b28e9e2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/defender-security-d7852421719681a9a67e3d9678703a82.yaml create mode 100644 nuclei-templates/cve-less/plugins/defender-security-ef25625daa30e1c21a7eef5298a77b22.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-all-comments-9ba6d95c0360c569d14b9d24ed1b35ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-all-comments-easily-e054a1d4839545a4a78c6e2e05d738b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-all-comments-of-website-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-custom-fields-348c099c8d52b86e029274e932206d2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-duplicate-posts-7b26661f47c6a54bac357fc46b5b57fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-duplicate-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-duplicate-posts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-me-da29ae9abf29175dd27fb6efb7642506.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-old-orders-7dc8aae42850432c949900f96b92f1dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-old-posts-programmatically-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-post-revisions-on-single-click-7898f5c5139842babbcbee2306b1e703.yaml create mode 100644 nuclei-templates/cve-less/plugins/delete-usermetas-12a6d01f8c93264a681f271c8f676a9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/delhivery-logistics-courier-c21b3a23e799a524e3a35bb5025290a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/delicious-recipes-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/delightful-downloads-49f7af60a7d6ca8e6785ad7873768f2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/delivery-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/delucks-seo-5457d1ce3892ed5603310b359ae787b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/delucks-seo-9ff713bb61b0eb3f270aa06433895190.yaml create mode 100644 nuclei-templates/cve-less/plugins/demo-my-wordpress-507a6642fe4ac3f015f5c85064630dbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/democracy-poll-2e7b0b07966525201b04f4b815659d00.yaml create mode 100644 nuclei-templates/cve-less/plugins/democracy-poll-9547ac03aa22594531f4f7ecb05105d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/democracy-poll-a76e6fad4bf5d5ba93f81a78338ef54e.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-address-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-address-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-categories-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-classify-on-publish-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-grid-archive-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-grid-archive-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-media-tools-auto-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-media-tools-auto-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/demomentsomtres-wp-export-5c8e28251cab5b1205b7a87c4a2a1426.yaml create mode 100644 nuclei-templates/cve-less/plugins/demon-image-annotation-13d81033dab55eac53421a579e93f29f.yaml create mode 100644 nuclei-templates/cve-less/plugins/demon-image-annotation-14a6574b6d9fc13262269a727d440dc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/demon-image-annotation-9c1a7ab296fd9381f729867ce6c145d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/denk-internet-solutions-2e3087c002dc76b9a7567526587e8736.yaml create mode 100644 nuclei-templates/cve-less/plugins/deny-all-firewall-b61c46947c98daf3d7e5aee079c69c53.yaml create mode 100644 nuclei-templates/cve-less/plugins/depicter-27cd6d77b0299e752388a04327a5ef2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/depicter-69e238d5564cebaab229183900098117.yaml create mode 100644 nuclei-templates/cve-less/plugins/design-approval-system-eaff27608bcf6deda804f06712a1b098.yaml create mode 100644 nuclei-templates/cve-less/plugins/dethemekit-for-elementor-9e56ce0a564cde270ffad1e5997baa50.yaml create mode 100644 nuclei-templates/cve-less/plugins/dethemekit-for-elementor-f509147c445359dac8de4743426be1bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/devbuddy-twitter-feed-539276d00e4422db414565e796e54c45.yaml create mode 100644 nuclei-templates/cve-less/plugins/devformatter-26f3ee9e0b5d3d296c77f279bcf1dce7.yaml create mode 100644 nuclei-templates/cve-less/plugins/device-theme-switcher-b029a1561cc2b382c267a1eedf8dbeeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/devices-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/dewplayer-flash-mp3-player-1da0a6197b1106904178e0b8178f3b2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/dewplayer-flash-mp3-player-e75a2e4fcc95441946c7906f7e8c8fdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/dexs-pm-system-9badde4161dcfe466c75ad211f71fa17.yaml create mode 100644 nuclei-templates/cve-less/plugins/dh-anti-adblocker-57412b2a8ecc09f7b642fb706ae35e4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/dhtmlxspreadsheet-c9ddd0481037c81ec76638f9cdd36097.yaml create mode 100644 nuclei-templates/cve-less/plugins/dialogs-06cd483feacb2d314abff2ed5eebff85.yaml create mode 100644 nuclei-templates/cve-less/plugins/diary-availability-calendar-93b21f556464132da5e236e1e43ab9a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/different-menus-in-different-pages-793865077bcac4ea4b5fe53bac436ec4.yaml create mode 100644 nuclei-templates/cve-less/plugins/digg-digg-20201ad3e5b2ef096de0c5e50dbc6858.yaml create mode 100644 nuclei-templates/cve-less/plugins/digiproveblog-a302b746a2ef51c079999dc7f35e46c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/digirisk-23a7b6466caf75eb82c1916af3aba873.yaml create mode 100644 nuclei-templates/cve-less/plugins/digital-climate-strike-wp-5cb36e2cb4718da1f24cc088fdc5e522.yaml create mode 100644 nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-317667951b7644dbd1a4529b628afac3.yaml create mode 100644 nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-4de4b5fb4c51e07373cc17e285c57285.yaml create mode 100644 nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-739db2cc0c9500d655d27c730225e398.yaml create mode 100644 nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-eadc3f836bcbd93a1ac6bfbe3a4ccd12.yaml create mode 100644 nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-f0509869323a911d6d3e4dec2a00653a.yaml create mode 100644 nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-f546fb5d8bed24f06bc4f3f7768fcf06.yaml create mode 100644 nuclei-templates/cve-less/plugins/digits-b7d7504fc6882ec831aaed54e5e753c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/direct-checkout-for-woocommerce-5db488a5ce4a9b749eec8867f89dee42.yaml create mode 100644 nuclei-templates/cve-less/plugins/directdownload-386a2527052ae342a58190f18af94ea3.yaml create mode 100644 nuclei-templates/cve-less/plugins/directories-a6efeec3a539abed47ad7c21c911bb3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/directories-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-01ea85ddd8a050d4ed49539de0e44b17.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-0a59eb8864ee4a82b1288b61fa9c3b30.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-0ac5cc81243c959ab88705244a2988b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-1187996edf4177af89ef3ea40b60db53.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-133afc4fd6bf43efcd46913bc74537a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-2cbbaa813e0954a798f362d364a25dbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-3ca2c37cf2bcc2a6f7bd7d384d01930f.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-50115b9c428a5ad33912876ac3e59d68.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-6547c1d240217acd0e74acb8773a56d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-9461e6fbc59ff2af30e33bb31e92efcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-9576bd28245508413e199ad3d8acfb19.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-a3e8c0ce1e12ba9e5616261592070d69.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorist-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/directory-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorypress-63e9460ae343812c425f6b6a9cf8cd2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/directorypress-95913a8fbfffbbc5d9172b93ca770d6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/dirtysuds-embed-pdf-ed0ef3463be2d5aaf2ed1f44e5427cec.yaml create mode 100644 nuclei-templates/cve-less/plugins/disable-comments-20729b5326c844ceb8ab014ad17df6e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/disable-comments-wpz-51b13cbe3f0c79746e5808bdafa8107c.yaml create mode 100644 nuclei-templates/cve-less/plugins/disable-image-right-click-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/disable-right-click-for-wp-675306159873a1cd00d34f2536abffba.yaml create mode 100644 nuclei-templates/cve-less/plugins/disable-update-notifications-d95a2dcd05217531d4ed458d73ee033a.yaml create mode 100644 nuclei-templates/cve-less/plugins/disable-user-login-3955cce33eb34bd1a4fd37bd19c83679.yaml create mode 100644 nuclei-templates/cve-less/plugins/disabler-ae33a39eb3dc9b47978010832e99346a.yaml create mode 100644 nuclei-templates/cve-less/plugins/display-admin-page-on-frontend-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/display-custom-post-5b28a734c59e3ed66297833eac37980a.yaml create mode 100644 nuclei-templates/cve-less/plugins/display-metadata-7d1a4c06854607da91f0cfd973b64e55.yaml create mode 100644 nuclei-templates/cve-less/plugins/display-post-metadata-68e029abe789ad7c1ac8726ecdc73f1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/display-widget-773a62e129bb5aeb2d87a5f158085367.yaml create mode 100644 nuclei-templates/cve-less/plugins/display-widgets-c88811f07a28a64dae50ff3a4d1213f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/disqus-comment-system-0472db32aec7a9d3b04657389befed31.yaml create mode 100644 nuclei-templates/cve-less/plugins/disqus-comment-system-10705e3d714d3c8649004193cb95f340.yaml create mode 100644 nuclei-templates/cve-less/plugins/disqus-comment-system-6e244b00897597cd6328a4e5cd1875e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/disqus-comment-system-7a1c147c4cb293f32f92c2501e47596f.yaml create mode 100644 nuclei-templates/cve-less/plugins/disqus-comment-system-bf623412f81fa76fc573618af8d6d1f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/disqus-conditional-load-764235f1dad8997c7feda04c94cf2850.yaml create mode 100644 nuclei-templates/cve-less/plugins/ditty-news-ticker-2fe97b6a7d11daeda44ed66f389013e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ditty-news-ticker-4d06425a78ba626ae09d9e74b3028b1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ditty-news-ticker-4fab6ad196fce7e90d2e5e9e3343b264.yaml create mode 100644 nuclei-templates/cve-less/plugins/ditty-news-ticker-b0853238e27436d970fc9e4c9b697d95.yaml create mode 100644 nuclei-templates/cve-less/plugins/ditty-news-ticker-cb44b891144850987aa067ef65bfd80b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ditty-news-ticker-f95f25f2a333f8597e744c121fcbe5fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/ditty-news-ticker-f9974cc25b2b5474809876c63c837de9.yaml create mode 100644 nuclei-templates/cve-less/plugins/divebook-2fd703146be88e52db7e37909148b8fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/divebook-5a66a977b640a93acacfabeb4be863f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/divebook-8f2eed89cd34dbb395902a31efbdb53c.yaml create mode 100644 nuclei-templates/cve-less/plugins/divi-builder-344bde3518beec69cf32525065cbb92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/divi-builder-4f3dfe26281afe74af18534af8dcf024.yaml create mode 100644 nuclei-templates/cve-less/plugins/divi-builder-a2b478ab05dc0dd0616e45e762ef893a.yaml create mode 100644 nuclei-templates/cve-less/plugins/divi-builder-aabb704338c74a997901edf2f42d1b76.yaml create mode 100644 nuclei-templates/cve-less/plugins/divi-builder-ec458e7be91893393a96a7bb4f01d557.yaml create mode 100644 nuclei-templates/cve-less/plugins/dj-email-publish-e6640ec95c6580e68f9599cfab145307.yaml create mode 100644 nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-03f17f31cd71196d3e8108e1dfd1705d.yaml create mode 100644 nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-05afb40274ed6e7e7ee85f9181367788.yaml create mode 100644 nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-932d8591d976abf910e4179bc489f078.yaml create mode 100644 nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-c74224b712fc0c2fb7b3dedfadd9ee64.yaml create mode 100644 nuclei-templates/cve-less/plugins/dm-albums-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/dm-albums-f74320833916c503bc8924181a242988.yaml create mode 100644 nuclei-templates/cve-less/plugins/dmca-watermarker-e4bec7dd7a04a9998930ce7422960fa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/dmsguestbook-0720f12ed328d9f8394eeb8c7b25a318.yaml create mode 100644 nuclei-templates/cve-less/plugins/dmsguestbook-2b7d96b5ce8ab425f2e121a2dd72ecf0.yaml create mode 100644 nuclei-templates/cve-less/plugins/dmsguestbook-464fda924b91446d67088565fa366b6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/dmsguestbook-81cd7c7b4d1173a363d79c9374f22f96.yaml create mode 100644 nuclei-templates/cve-less/plugins/dnui-delete-not-used-image-wordpress-0d2acb1823da711b074d38421e878cbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/docket-cache-f17846666f850b5a719df18ee77ef5bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/docollipics-faustball-de-2b530454070b0701fff7ade24fa23420.yaml create mode 100644 nuclei-templates/cve-less/plugins/doctor-listing-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/document-emberdder-9726bedc4772feb78308da203819877a.yaml create mode 100644 nuclei-templates/cve-less/plugins/document-emberdder-ab269c118fc3257cdc712b5cba24b2d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/documentor-lite-d8a488996304707ccbeb5881d0d3a2c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/dofollow-case-by-case-945f1c78b2a3586f190550f87e150c27.yaml create mode 100644 nuclei-templates/cve-less/plugins/dokan-lite-3a87cd2c194cd815db2ec636b84e643a.yaml create mode 100644 nuclei-templates/cve-less/plugins/dokan-lite-5ad44d8edf07e29935fd9f2a379a8bdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/dokan-lite-7cae0337ec5d8357b2096a13255ff0e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/dokan-lite-83ceb85b9d98ac0ba31cc54d7c02a615.yaml create mode 100644 nuclei-templates/cve-less/plugins/dokan-lite-98e27e4b860cdb80f775d8dcf8849471.yaml create mode 100644 nuclei-templates/cve-less/plugins/dokan-lite-e63e30ec60f147aa93db545efe75d6f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/dologin-3e791f294648bb07f6f5d09991cd807c.yaml create mode 100644 nuclei-templates/cve-less/plugins/dologin-76c4f32766bf14b6bbf96fbeaaac68ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/dologin-9b93ca969f1fec7d267bf68ade76e649.yaml create mode 100644 nuclei-templates/cve-less/plugins/dologin-bd8336f3b7891bca7cf2acd9eb9176f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/domain-check-7bb785cc55f83f670623beb2518f8d46.yaml create mode 100644 nuclei-templates/cve-less/plugins/domain-mapping-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/domain-replace-c2b0322b1c47551232078fdb7ec624e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/don8-147a2c380c511ff89f6007b5ad85a430.yaml create mode 100644 nuclei-templates/cve-less/plugins/donate-button-d64691e54ed9f4bd04f9e5d0a049bc80.yaml create mode 100644 nuclei-templates/cve-less/plugins/donate-extra-bf2a986ee34d32b284b49248c2116049.yaml create mode 100644 nuclei-templates/cve-less/plugins/donate-with-qrcode-53c85ef54b387a398b144244c40bd611.yaml create mode 100644 nuclei-templates/cve-less/plugins/donate-with-qrcode-737595c2ea3449d9afc6f182f87c2e0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/donation-button-2930d925944c874731b469b90d98e5da.yaml create mode 100644 nuclei-templates/cve-less/plugins/donation-button-40014647f15550cd9dd8d5556a2d8ae1.yaml create mode 100644 nuclei-templates/cve-less/plugins/donation-thermometer-11d8842f155c393e0c8cf7dd8d4ce45b.yaml create mode 100644 nuclei-templates/cve-less/plugins/donations-block-28e3179254b4fd139125a16ede646345.yaml create mode 100644 nuclei-templates/cve-less/plugins/donations-for-woocommerce-89b8de7fceb27a44be5a7a24e0cb685a.yaml create mode 100644 nuclei-templates/cve-less/plugins/doneren-met-mollie-5d341faba5a243bc1f91722340667935.yaml create mode 100644 nuclei-templates/cve-less/plugins/doneren-met-mollie-c68aefc2513365ae0004ad9eeebe270b.yaml create mode 100644 nuclei-templates/cve-less/plugins/donorbox-donation-form-074326e7470f284764101e6fc9e53f79.yaml create mode 100644 nuclei-templates/cve-less/plugins/donorbox-donation-form-4667942accde23610dd8e0b089b22f23.yaml create mode 100644 nuclei-templates/cve-less/plugins/dont-muck-my-markup-2ead875f47442aad0463d1658f74b76e.yaml create mode 100644 nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-4cda745fb6b624bf244c2f741ab1add8.yaml create mode 100644 nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-5e9722517850435a4c6751ba68e3f182.yaml create mode 100644 nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-ccf7ae7c58d11c91be50450cab57d66e.yaml create mode 100644 nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-dbc6d35b9d97e2d76a522059041b4184.yaml create mode 100644 nuclei-templates/cve-less/plugins/double-opt-in-for-download-1963440e9d46a424a870f14bf4b601ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/double-opt-in-for-download-de1a73429738ac6f52decf46ff2bdf86.yaml create mode 100644 nuclei-templates/cve-less/plugins/dovetail-9a176796080675b246543fba168c027a.yaml create mode 100644 nuclei-templates/cve-less/plugins/down-as-pdf-7cecc34bfe19dc68894d7b020addf743.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-attachments-6f48b6d420d1eeb4f46e78496cf4eb1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-from-files-c619d56801748dba6948ad0822abf51a.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-info-page-3f433c20605e0478560f661cae839ad8.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-010922f26f33a94ab231b7f0fdab049f.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-02ae4a0720867671dd11925e4a221a75.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-03366e13fcca1db85a35f2268a00796c.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-07b6f9539cc79b55c833c05dca993fdb.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-08c891f98b2f8faaecf3787ed0733081.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-0fbbdf117a58185e2bf8aba144015927.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-1c63696c8009b48d027fd7d86fee0dcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-22e8c4993187acede41bbad9c3b9081a.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-300ac7058f885b1b1ecbf0131074eaf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-30d61c53466fa58934f9b72c5790a166.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-31395bccdb490b805531cabc85d6de58.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-31bb9a1a6021af8a029348a6ecc96852.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-3654cd4919a2027fb17d521b494ff35a.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-36d2ad9a774b3ffdb359958bc8b37040.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-37c94bc66c005be68e2dea455cb8d54d.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-46f8f7fca478042503cff5486b63739f.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-4e4181a37474e6c9ba0613d6b7881b76.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-5425379653c5c62de7cbdf4b522ef322.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-6811835f1b3b62a667088ec060a91ec5.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-6855332cd5767d389db903e31b1c4f88.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-6aa900a875605d12f51c36a7aee68e0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-7367ffe725d32472b793d84e3d0fe0d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-7381977dcbbf38890f97270b77e9814a.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-7db5ef531b59fcf315c55f77b9b8f6fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-83ab5d6545a91728c424846b6a566917.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-899169b3fe14c55dc2775d2907a0f4d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-8c46bf632b1c3634dd29de610dae2727.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-93730c80f26663486b577cf1ff9df8f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-93832a5ea647bdf515b56a86b8d86d79.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-9a4aa24f23eceeee8bc7c02ddb1c2cce.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-9b3649e551e8d75fa74f183c3fac393e.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-a251d6368bb7c15c47f1a00b82a60c06.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-b1861af38d12189832b1b119b32a79ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-baeb593e80daf8c0e9aa6de629d61f7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-bc9258a94f7c2dba9bd7d9f332571167.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-c1281bc3be6489439619d6a7c7e1abac.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-c202e0ac545cb4289f68113596303c38.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-ca1ac4d2663fee70b0283b8708b4ae50.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-cb8528ea228de7c195be74b03a1cf056.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-cf4fa8f0c990098bbe171db8d667a080.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-da52023c7620366d69c94922efd73968.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-dc6aa910a851ae74e5606d96e36b1052.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-dc8ff7d3332154eb2062f549788da3cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-de1ce77814c2edc391436dd273126a1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-de94c31f4187177567b889a40327a1d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-e505994846479615d49d4f4342d7b65f.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-e5651ec96e6ca99165a7dcf4611fe4ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-e6a59e2d8dcc1e62ef50ded882a3c3af.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-manager-edb73da37a786109cf2a1c2cf12e6eb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-media-43eedc047028750edf0998930243bbd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-2ee20ef00c8dffbd5ed7b6a797548996.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-2f1f33bfd002c22ab758b0590571cc4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-395b4caea34d0aadd182993cecde5b31.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-5c72e030a59da55164488a0121d8367a.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-8d4bf28803761cae038f398e0f1dd848.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-9156a008e8a44bce922b7f9ab6484346.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-937f60d959f194bc06ade3d9414194fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-94ab1a5e48ccfc01b2ab43a21b16e2fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-95ac055a4400e480693a1f956a7737eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-9c43290fa22148f68ff47d72abec5161.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-9ecbfebe7e10d279275667a070df122b.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-a760bafd1cd95a91af8a27215ef05ba2.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-bdf53bf0d4580f34f6ebb2e5285d2f9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-c5272b0ed6c4fa11625cff04681b3b2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-cae783a6ecd0d5e0f3f782adb9bd7358.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-ce4d8c6c1d15b00a6a80a41c19c0a53f.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-d953e0cc8d7eb1063dec9efaeff900d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-e38136ce40ff372555239319f35c2227.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-e73148573c5807bdfaeaab5f8604f081.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-ee37641121dd5ca3e58a921bd679af5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-monitor-fa3ec4c554fb01ca3485de73728dd008.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-now-for-woocommerce-d82977967e8370fff3f7aa446912e4fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-plugin-10e0131bc3cbf1f9a7e37ed7d5c2a1cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-plugin-8a3bfba63e8785572c67f2c51b59a6d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-plugin-e331a48b9ae531e85ab7c6eb7fe0575f.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-plugins-dashboard-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-shortcode-075f2aa698fd0722386a96df1a3100c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-theme-132341ac397ed9029ecd03f993b8bfaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/download-zip-attachments-dd3d09b236f4e0306f62e328db6df55a.yaml create mode 100644 nuclei-templates/cve-less/plugins/downloader-tiktok-92fda4d05082e41cb8ccd1d0178b61a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/downloader-tiktok-e50a1a1ba5097a77ccf546f0f88efdf8.yaml create mode 100644 nuclei-templates/cve-less/plugins/downloadmanager-90ce5b5c6d8ae42fe1a7818063e130ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/downloads-manager-4995a23c57ea82d00ee47f5cbb214fc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/dp-maintenance-mode-lite-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/dpt-oauth-client-809d63af1f69964de8a6d451fb63eac3.yaml create mode 100644 nuclei-templates/cve-less/plugins/dpt-oauth-client-c6fe3e98ca720b92fad33bdf271aacdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/dracula-dark-mode-e474bd135ff4b7c6170c11705966b7d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-form-builder-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-0ef90759a645e5a0a85f1ab3e04c6459.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-230e494196dc43c26e1062437fc400cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-3a4354d7b58ccedc4bd821a299d4d814.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-7e7eb2b24e63bfc8cd18835a55a41f43.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-c5b846fbda39bbc2b213c6450fb38da1.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-dfa883323c53046606f4e4db00277596.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-0921939ba9d36b3bc7ef6782c794b5c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-7ae73592996d92a88095adedd13bc8f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-b6756a6cb324fb647e3fbdda3c2bb0bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-n-drop-upload-cf7-pro-538294a6deb271080d96f98811f3c4f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/drag-n-drop-upload-cf7-pro-a9a7c8e5b6f35ebf19a42e787080a55e.yaml create mode 100644 nuclei-templates/cve-less/plugins/dragfy-addons-for-elementor-93d3ba9b108e1112ee15e322299a4fea.yaml create mode 100644 nuclei-templates/cve-less/plugins/draw-attention-02fac00b4da69e9fe78fc7130f860fe9.yaml create mode 100644 nuclei-templates/cve-less/plugins/draw-attention-791dd23f996b2b0738face7fcbca2b1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/drawblog-ae76e34d6e644abc4667be59d0e2e0dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/drawblog-d1894aa72265b74c9b59e10ca93f4375.yaml create mode 100644 nuclei-templates/cve-less/plugins/drawit-697b1f32d4ef6920c80a41e74d1c7116.yaml create mode 100644 nuclei-templates/cve-less/plugins/dreamgrow-scroll-triggered-box-b33caca512f21869a1112d26d070a67d.yaml create mode 100644 nuclei-templates/cve-less/plugins/drip-feed-content-extended-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/droit-dark-mode-8fff7b43d5e853aae2c55c13111f8f63.yaml create mode 100644 nuclei-templates/cve-less/plugins/droit-elementor-addons-b0e1b65089f5019f1d7bcee627168a5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/droit-elementor-addons-e42d0569342324174ad2b7b5b34acfd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/drop-shadow-boxes-7907c4688f5f43998579c328082a69f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/drop-shadow-boxes-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/drop-shadow-boxes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/drop-shadow-boxes-e9fd5a8f4cb940c05dfbd60e736ab50a.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropbox-folder-share-0508c37bf22986b5e27ea5c3d8bc9c4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropbox-folder-share-fc82d74dbac5a3353b964b24a832d1d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropdown-and-scrollable-text-10e7110787ae61a1849daa9fe6489aae.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropdown-and-scrollable-text-746ab5fca61ed161758f284f4d55f254.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropdown-menu-widget-16dc3f3aa085dd7f2e3dfd536ed2021e.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropdown-menu-widget-831ca3a67ae53eee79512c998867b523.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropdown-menu-widget-9ca1c6bce5ebff9e9681d52ce2748227.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropdown-multisite-selector-7156ef80890822c55e70bd957b9a6411.yaml create mode 100644 nuclei-templates/cve-less/plugins/dropshipping-xox-e89dd0c73fdc543da4d63a7803ee9a97.yaml create mode 100644 nuclei-templates/cve-less/plugins/drug-search-62dc43c109e10a4fb2083be6c80b9766.yaml create mode 100644 nuclei-templates/cve-less/plugins/ds-suit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-1a5f08a913b9e66bca4a1d7c16d1cb52.yaml create mode 100644 nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-295363837d1454c8802423d79b02460d.yaml create mode 100644 nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-b82caad6c0c8bf440388b6328560de71.yaml create mode 100644 nuclei-templates/cve-less/plugins/dsgvo-youtube-eeffd2576729af4c20ea0d0989cea07e.yaml create mode 100644 nuclei-templates/cve-less/plugins/dsidxpress-d1ad636a904712d275c068316d9921ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/dsp_dating-98886bf050f4aa01cda5000bdbc8e584.yaml create mode 100644 nuclei-templates/cve-less/plugins/dsp_dating-a4b85243ad36c1329732b5275f246278.yaml create mode 100644 nuclei-templates/cve-less/plugins/dssearchagent-wordpress-edition-42d462182add4a54a9067be955a98019.yaml create mode 100644 nuclei-templates/cve-less/plugins/dsubscribers-58dabace517bb3fd14d9bc2e6628a726.yaml create mode 100644 nuclei-templates/cve-less/plugins/dtabs-bdf306cf1fa53c2e200c922d232a9b13.yaml create mode 100644 nuclei-templates/cve-less/plugins/dtracker-53b973a947651cec1a2155ab2e3c223a.yaml create mode 100644 nuclei-templates/cve-less/plugins/dtracker-78c62de2a8f7c6f108d2de7498401127.yaml create mode 100644 nuclei-templates/cve-less/plugins/dtracker-8fe2149458ea063852f82a98766c0a1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/dtracker-e60c9facdf470d59f212ff7b56e40a91.yaml create mode 100644 nuclei-templates/cve-less/plugins/duitku-social-payment-gateway-3f2cad5626e189b4a9fbbf4f777a78e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/dukapress-9517b97fe7566a06a9d352900cf24cf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/dukapress-9c5144d0854754a379c2d4994fc71dd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/duofaq-responsive-flat-simple-faq-eb38ab4fa2ba998f57df5784c60738ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/dupeoff-9a41ab0a37a3b754d3385603b40bbab6.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-page-2d87c0364307edea9fea6b2a2be6834f.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-page-and-post-1de4b637fd30a0c0161a02bf0be995dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-page-d66fba0caf4197da913cda06e8bae43e.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-page-fd184e22776918171b2daf7b166b3579.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-page-or-post-b4ec89e0637e2a12e7606215722e4f54.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-post-11953d0632dfa94f70f928a189af1971.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-post-4fd25d208fa1eb71c396970325cd56c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-post-517e55dfe7f60b7457c238ed215d0a10.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-post-page-menu-custom-post-type-373dd0a06bd13b32d55487814dbab124.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-post-page-menu-custom-post-type-87909a557eede328b649d626c4448f38.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-theme-0924f82ec3f5be000a2e6547a544a598.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-variations-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-wp-page-post-2d87c0364307edea9fea6b2a2be6834f.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-wp-page-post-79f880a7e6c6b5f19edddfee4238c580.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicate-wp-page-post-e4d1ad7c2888a8ba91b50fa79c134af9.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-000a2d156aed05fdee1d26c9317df353.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-0244633df1d46b9b703b5c746fbc6e51.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-195b7c4b6c3a0504f0fb2ed5065020a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-22105b80b6b00742d7d1393ced18465f.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-2d581ac63f9fa320743d3174a6ca4961.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-2e6e6e36243681b3cf144f17aaebf064.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-435788aa8fd2d67e24f049a6e4d48777.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-45ca25ef969a9c785b481aa6dd42b6ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-718986dcd5947a1beb7efad526e28827.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-84e8025814ede80f77a1696e5326822b.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-988ed918d003525e19a036e7fba12cab.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-9b8a6c665915ed37184ee04d4ad10c93.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-cf9463289c46f678c704f21fa0d76e71.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-fa14deacc63665329cc2a6a4da97d369.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-pro-84e8025814ede80f77a1696e5326822b.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-pro-cf9463289c46f678c704f21fa0d76e71.yaml create mode 100644 nuclei-templates/cve-less/plugins/duplicator-pro-de0ba6f29dfa0f03254fb0a76e6f99c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-7adc7eb8c094a09a98664c4579c84eb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-9cdc8d9b3ff8215825fa26b48709bf41.yaml create mode 100644 nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-b6ecb92e579cb07e36e2314084112219.yaml create mode 100644 nuclei-templates/cve-less/plugins/dvs-custom-notification-668be2a6a44dad3bba943de0f544a515.yaml create mode 100644 nuclei-templates/cve-less/plugins/dw-promobar-6ebbfbf7f4ff52ef90502e505dd10d64.yaml create mode 100644 nuclei-templates/cve-less/plugins/dw-question-answer-515c6f7cdb52a3563e73406fbbc7b42a.yaml create mode 100644 nuclei-templates/cve-less/plugins/dw-question-answer-5c4144b3a2f4c4a33c4c23a4eb7aa6d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/dw-question-answer-pro-076d6aabf5652856b3ecd43b1d4071c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/dw-question-answer-pro-b9a51b76cf54230b7233fe27914bddd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/dwnldr-266cec63957d7dffbe45528e32eb40a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/dx-auto-save-images-d54d87fc848bb0b810cc40fffbda1954.yaml create mode 100644 nuclei-templates/cve-less/plugins/dx-delete-attached-media-8b0729074646bdcd5148e643a832f062.yaml create mode 100644 nuclei-templates/cve-less/plugins/dx-delete-attached-media-f556636fbe9fc4c5e3ffdb7df7f017ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/dx-share-selection-34871fd2757b31ede448958147d678fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/dx-watermark-bee89c93ea84d7cced331403d3d3e739.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-content-for-elementor-698a88e923e2d2acd18664fa1b6321ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-font-replacement-4wp-06fd5383f7580e13dbd892fe4cb03a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-font-replacement-4wp-a7d48453e4893aefdc76f2106309c64c.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-qr-code-generator-4446ca17737c11e44353bd7340e7ea63.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-visibility-for-elementor-a835e225538d98a6a0f49f942c25b6a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-widgets-57ca0f970f541262d55b26c7692e76e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-widgets-7c8cf3109f4d4b196459b75b96aa728e.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-widgets-a4d9b1fab913268578f318671b68ca36.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamic-widgets-d5d0747062745dca3a4a43c62a5b0669.yaml create mode 100644 nuclei-templates/cve-less/plugins/dynamically-register-sidebars-5127fd9a578ab8f75789be1aab665dea.yaml create mode 100644 nuclei-templates/cve-less/plugins/dyslexiefont-53a08acd73ef559302d82929e1a8c837.yaml create mode 100644 nuclei-templates/cve-less/plugins/dyslexiefont-e3c56661b9733debd3e6fea53555b839.yaml create mode 100644 nuclei-templates/cve-less/plugins/dzs-videogallery-415af7715839a7a4186f1ea1fe3682a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/dzs-videogallery-b558d2c101e0c756483bb33734bc9369.yaml create mode 100644 nuclei-templates/cve-less/plugins/dzs-videogallery-bf282437cadf1ae50cc09a36bacba2a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/dzs-videogallery-e983e659503cdb77c86c6aa843d06bc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/dzs-videogallery-f017982e52e64f946ac9c5f02ed762a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/dzs-zoomsounds-b343996b367c5fa680b75a4664349ae7.yaml create mode 100644 nuclei-templates/cve-less/plugins/dzs-zoomsounds-bb0c16eac19b4817493c1c038ee23819.yaml create mode 100644 nuclei-templates/cve-less/plugins/dzs-zoomsounds-bf8cf019bdb5cedf2f07acf0dbbd9293.yaml create mode 100644 nuclei-templates/cve-less/plugins/e-search-bbab653de7c22eabac485618a7984b27.yaml create mode 100644 nuclei-templates/cve-less/plugins/e-search-d9ec6670d2ff89bdcf34f0cd3338db3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/e-signature-9090b82ec6bee567e560b8e108d3dc16.yaml create mode 100644 nuclei-templates/cve-less/plugins/e-unlocked-student-result-46393c1e973f37162a617bc152661e74.yaml create mode 100644 nuclei-templates/cve-less/plugins/e2pdf-4c337287b3ea29b58d22de863f5e59bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/e2pdf-a6097b32439b60cacd59d47b3a1c8c61.yaml create mode 100644 nuclei-templates/cve-less/plugins/e2pdf-aa33e37a5a268fafeb4ae3c73aa43c7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/e2pdf-cc85fecce61e81ebcfd16fc13ed35220.yaml create mode 100644 nuclei-templates/cve-less/plugins/e2pdf-d89b8d067839983b7d38b29c3f8dcaaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/e2pdf-e3339c8e6a8ccbe16b78f0e2c9ca3674.yaml create mode 100644 nuclei-templates/cve-less/plugins/ean-for-woocommerce-4e6a565e3f0523a8457d5186515c7331.yaml create mode 100644 nuclei-templates/cve-less/plugins/ean-for-woocommerce-7aa0e1773e8e5c34cf563aa138c0d2da.yaml create mode 100644 nuclei-templates/cve-less/plugins/ean-for-woocommerce-c34557dbe7e75a157fffc6005c83f4ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/ean-for-woocommerce-c623741b8b5dbd96eac005af1ef14987.yaml create mode 100644 nuclei-templates/cve-less/plugins/easily-generate-rest-api-url-667161af8562bbf0616cde527e940c70.yaml create mode 100644 nuclei-templates/cve-less/plugins/easing-slider-28d8e466f42a7ea620fa3fe2f98c9634.yaml create mode 100644 nuclei-templates/cve-less/plugins/easing-slider-7a859a74f0e39d83ee989a269a737923.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-accordion-free-3253e2e7de1175aa67f3d6d5696567c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-accordion-free-5c300627494a1ad1099275af163a3e49.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-accordion-free-6139caeaed9293c95d17b26944e3e8d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-ad-manager-70088a82bdb29c81346c08fa9d47c687.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-admin-menu-3b5f830cc2d293978dbe39244d121ee0.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-adsense-lite-b9d3eb363a683c73c14fb5271b86198a.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-affiliate-links-4e96720039ccc700f05ab77c703ff32b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-age-verify-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-appointments-2302a07c8ff1ee9859f41cba989fe323.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-appointments-84cb3311236885a9e904cbe429619629.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-appointments-afa229bd02db847384791980963680d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-appointments-b4ee9cff24049609b5e28a42cf47dee5.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-appointments-e2ec209c741fed7cc95066eb8c9d077f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-appointments-e5114063e08dd4dd3989e0a929dd3452.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-author-image-b69273626856756974f9cdee241ed8f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-banners-bbb1e092b9ae97dcfd27d316846c9ee9.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-bet-49c0957ce7beb86c6cd3610ef85cd2a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-bootstrap-shortcodes-05c1130a0be4b028fb1b748819924a55.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-call-now-d24e798e6ecdde0cd2e6b3ca9f8356c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-captcha-20715ecda27605f90ac0c1717bd4bb1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-captcha-b7a34904a121ea28e68ab7539af86648.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-career-openings-2dcf73eb82f83432e780c74c23beb2a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-career-openings-7367b780672b9eb9abb37fcbb3fea6b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-code-snippets-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-code-snippets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-coming-soon-4b7a2f690ab23a9c56fa493203cfb340.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-coming-soon-a73a6cac5bd5a80c6a22adb8c250c687.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-coming-soon-ea0ca66e9eeeaa433f8d74bce5e52c45.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-contact-form-pro-7ddd7913775f2842bdb03b5dd83ed7fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-contact-form-solution-ec82173ebd40f930fa2890b83a9358a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-cookie-law-5d8f13ec518cdd664ccdf095210c75bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-cookies-policy-217c5fbd6c523ea432120eff4f82682f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-countdowner-13544ef8fd49a172f51f21a85f5f216f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-custom-auto-excerpt-0574327d2925f2e5b1baa6cdafa54603.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-custom-auto-excerpt-8bbf318086664bbd3967cf3760be4186.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-custom-js-and-css-0c5db1a026616a3fe0b1bcd649ed11ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-227b9ec56c4c7cc21d26de58db461ac5.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-3e264890774be501312d562a2e66b9a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-47dc8b23e46c86e99fa06304aa8794ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-4ada8035109d6dc47e94b2c651edea20.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-50401a72166a704fa2626edd9085598a.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-54c8692b5e555318ec75bfc89238f380.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-58382c0384c54d2d71e941fcf6b84e29.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-592d413a31d24bf2ca8e9ee4d3ed0b4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-5c1e1909a38a10b277a3614b15cb89af.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-66c19845dbec142651f3cf03a994c153.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-6b70f3503530aa0d1601aef153ce564c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-836a97e413451f2556144747548f5aed.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-8bf5f3c88eae040df5c93bb90ba373a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-a03c78c6dbe166da7722da09ee707752.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-a21c37325364d975a3c7e649a4cca551.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-a5ae13191d707f6528df2db00d64b11b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-a71d6df449db20ab9c26824728336769.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-b058df7a8fa1af7735771ea488135ed7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-bc7e0ce97309f84318e7a566c436b814.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-bd2f40761a0dbf1803fa7290e415ab2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-c9e09cee2b4a638d5cce1b20a666e2e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-da73522010deacccd257b4e9a1315635.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-f04987be0566d1eab3eaf27afc6eec08.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-digital-downloads-htaccess-editor-c7caaada028e0b85fc2ec25ebcdc9cfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-event-calendar-35d6cb483985201ac59c669cec20a881.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-like-box-97fb5b5839a832ac7ff02fb0d708c5d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-09160f3fbb1916544cfbb6eb640a286b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-308ac408c3111d0f21a07a5be08fe876.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-455ef09d7d7d2085e1e76af071d802ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-566c183277ddddc5541276b2514b770a.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-5e1243e1e25d813c82b94fbe494798e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-6a4b9abd38157d4627731558a0b86be9.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-6fdd9a10958cc151010736328ad8d63f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-7e2aa27b61aaa1e5ca65bdc32112a6a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-dcded48546674d8a7147bd7b9ee5af2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-facebook-likebox-f32c6b2b7d3eb58c4682087aa288b3f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-fancybox-192f3751511f8b242f0945f1aac116aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-faq-with-expanding-text-7ed4275b69b36875b8deb7c4de847800.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-form-2e8ccf164adc8951aa826c00f9317ffc.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-form-423b3ffaad4575c3793b54bac37f4ca7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-form-builder-9f2fa558a3b450f42672af408bb3b106.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-form-builder-bdcfb7f870a9c9d99dad2a66d5149c6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-form-builder-by-bitware-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-gallery-slideshow-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-google-analytics-for-wordpress-da9bd5e9b4433e9c21c5e76b9f3bc74b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-google-map-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-hide-login-5db1bc17d104f6fabd7d82e060cec486.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-hide-login-6046df75d04ba248b7035ff17b16ffc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-justified-gallery-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-login-styler-7876e3e9a0cea227500debf5d1a1674e.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-login-woocommerce-0f5164e7f48c30d96cada976fe71bf72.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-login-woocommerce-16223cc2976f7faa5fb929bf7546e0a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-login-woocommerce-b0368c6bddefa3eda18f57518ede7d9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-login-woocommerce-eb7a1f00c95af7d29372c7231c49405b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-maintenance-mode-coming-soon-c6f7d89996a803ee8eb7814d6f5734cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-marijuana-age-verify-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-media-download-61b9b26895ba1396cd862550f59dfb02.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-media-download-91ba8b6ec0e7e434577621e62a4faeec.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-media-gallery-28fafed38b204e7345a98c45e56c485e.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-media-gallery-34f7f8a09e65787efd781e2d41901d93.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-media-gallery-e35ccf6a5d1ddada5f10422331d300df.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-media-gallery-pro-9bee1adcf88eccf5bdf4a140784b69db.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-media-replace-1f6ddf0ce56b9b9d3d870c2c339aeff1.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-modal-c2574a7a9b79ad452c99c332f592fe5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-modal-f615078fb53a8f47f20c6cb2792c121c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-newsletter-signups-2b77677bf3f1770d1f2637876cb7abee.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-newsletter-signups-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-newsletter-signups-e1e05c3d687b12217db0b7b57b7d94d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-org-chart-c452417a821be37f2cab44c35d2fb224.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-panorama-0fb85e5ea92cfc0152cd39c07cc97431.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-paypal-donation-00976904f98e30f11e675f02667fdeb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-paypal-donation-516b66dc7087b091ef77c6757e58f44f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-paypal-donation-83b7e3214e301bc8ce0a2ff3a2e28649.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-paypal-donation-89760f3ab457772708d08bbbb7ce1092.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-paypal-donation-96fff1abfd750f8db5e7b15f8178a35a.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-paypal-events-tickets-68062d9660942c9a08865e495ee36651.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-paypal-shopping-cart-6956ece992f5fba93947f810cb6c0062.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-paypal-shopping-cart-db5362134a2d7eadd5e40de928930826.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-pdf-restaurant-menu-upload-40be5fedd5539e32999075c425fecfed.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-photo-album-a16becf994c4a5d0fc37834e1a2c1f32.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-pie-coming-soon-8e2fcddafd26ffe986aba71521006509.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-pie-coming-soon-f58f1d8f11140c3bf88a5bed98434fc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-pie-maintenance-mode-276fdddefb69d404e325809486a9c5a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-popup-show-eb0df5a7745874fdf5ef88eb67a5ec63.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-post-types-75e8a53ab865623ebf98c15a4f6ef027.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-post-views-count-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-prayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-preloader-8a961b077a643c6dcf8e7dd2b515541b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-pricing-tables-2c80874fb8fd4cd567be9f10e0fc4aab.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-pricing-tables-8074409c2ea9229ad0a8c825dc05c21d.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-pricing-tables-99e94192bf6d19eb379533764c917cb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-pricing-tables-e4f1d5f5dc814ad4d0bdfba0ea143852.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-property-listings-19a8a46d3531a17a737d3cfe8d4f708e.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-property-listings-7e74a978e0fcd8ce34e332a78ac6415d.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-property-listings-e049cf9cff2a64ed7bf022044d018fad.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-property-listings-f26d5492f0770f1b4f41cabb1dbfd120.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-redirect-manager-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-registration-forms-1988ed1c56a6e8e4ba81a01e51929328.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-registration-forms-3cf0c7158d6fa6e72389913fb8e96f48.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-registration-forms-d3595d30820755045dbe80d57c0f600c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-set-favicon-c65d467c803cb05436e2b506583569bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-settings-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-sign-up-c3d61b837adb4506fbea73b489e751f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-slider-revolution-97f7a332ae5645762ec8464bbe228dfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-smooth-scroll-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-41e74ccfba32267621605ffd0d327b1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-4e29bf7b20e2afded2580d5e1afd403a.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-61a927bc340bb105a879f38c8d71f797.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-65f22b1513e1da3131ee1c2793b0624c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-882e0143754f55aaf4f3cb06c8d13293.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-9cfadb72ed62a1496ef5a1550e74d7ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-d9a381f55de2cbcc100fd4387b57379e.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-eb06b36db83cd57ff46c8ecced75bb58.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-ecb72206512391b63853fcec98ca443c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-f326c6f978051192fcd3f58deac7c7e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-f48220ff86f125e37c7a8dfee9752f3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-icons-f8dda67401c83c106e4913ae42963922.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-share-buttons-for-wordpress-7046ef2cfb73e30aa27cd120b026bf95.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-share-buttons3-47b99cb97f68327c811e482acf82f22d.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-share-buttons3-731324aeee016bb6f029892372fbf4ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-social-share-buttons3-d90e5ac159925d0ab3971b3b6d358c41.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-sticky-sidebar-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-sticky-sidebar-98193019af2a73f9695ff639de4023e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-sticky-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-student-results-429ff280452993df8646f6def7c9d328.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-student-results-c4969b59b8b4cdf482f721bc206c229a.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-svg-73a4ba5237a6c747115a7db7e60454a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-svg-image-allow-99ad02b61917183fbf0c75dc39e4e9c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-table-1d7d7c5febd898bd86b248bdd1c64ad3.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-table-365c4967f8ed82c8fe8be419a127bb67.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-table-booking-86987ea9b36773133771b8d624c0f2b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-table-of-contents-3d0e7652c5954cde6070c6634683929c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-team-manager-1ff79c544d50f2338de3189197eb1777.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonial-manager-6fbfd79bf661b65b2359132741b885f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonial-rotator-13b96d2f8807051b1c5765c2cfc941c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonial-rotator-95ad70daa5a42e22046c057a639de555.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonials-139542bed79cb071600ed5c3c1e9d45c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonials-386d494fe731db6879e7d8ca94c86cd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonials-3e13ae2b6b41b4f67d87446a43e49fcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonials-63f488767eed871fd699454a474174aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonials-6fa4b95e95d113650666ff28a08a093d.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonials-aeef249fc57afd724305e4aa12ba4e2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-testimonials-ded406378489866866417fd6ec210840.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-textillate-2411b4426d78f7ca35565f6c5d4b0e5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-textillate-52d571dc3064574a067b92facc54ed54.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-tiktok-feed-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-twitter-feeds-376e635d9c344dbb946b8ae2b1699cff.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-under-construction-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-video-player-b2f775a90d3415bc2313e385ff781703.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-video-player-cdfd3455a6f46d912895a672ab21e1b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-video-reviews-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-video-reviews-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-watermark-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-wp-cleaner-7334a0dc3d35cec714b6fff3c35d6fab.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-wp-smtp-3c68c1399fad8442e05257bec4405849.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-wp-smtp-3fc9a3fcf79cc1897ce2e887e3d3f73c.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-wp-smtp-9a16f7dd8fd77a0633f39e5cb1c0fe95.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-wp-smtp-bc7fc430ade2f2b736ad2cc1fe4fe700.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-wp-smtp-c7d1f2ed116b346313eed1fb0d2a8296.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-wp-smtp-e3ac7cfb196d6042fdf4cb82d4ed4384.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-wp-smtp-e3f24a45c97373cce269e0ae75379f47.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy-zillow-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy2map-164bec1494162189ba7115d5dd5c222b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy2map-281571699228cab1d5beb867576443c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy2map-ad10f6931e20f26aa8f27ac8a7f0eba7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy2map-d7ec8c507a9ed2e2307abe588cfe9f0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy2map-photos-02351a704f122ed7e237be1c0b97be24.yaml create mode 100644 nuclei-templates/cve-less/plugins/easy2map-photos-e1e2d018531f7235196dc9a4085ec51e.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyappointments-38d608cacdc80db417ded65078eef410.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyappointments-72000fe0c780a49eca561c11357809c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyappointments-f934be2103cf424f8b0313022bdc21ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyazon-78a77e4a1a5aa34cbb515f8d429a5d22.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyevent-3155b6afdeb6949fabf56095cff40791.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyjobs-1a89597b1bd6bb139b0cbb0c2a6cdcf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyjobs-a9798158db571367ab5f6fcdec40a746.yaml create mode 100644 nuclei-templates/cve-less/plugins/easylogo-27956200aea3cb3bd27e1108bb27c97b.yaml create mode 100644 nuclei-templates/cve-less/plugins/easync-booking-1ab98d23b8f5715db32cf93509d555f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easync-booking-ad05fb4f71116fd5943d1a28593a9d80.yaml create mode 100644 nuclei-templates/cve-less/plugins/easync-booking-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyrecipe-a78a16c3432adee203e9f1b257d4b189.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyrotator-for-wordpress-078c8808dfcbfebd119f13a67915c352.yaml create mode 100644 nuclei-templates/cve-less/plugins/easyship-woocommerce-shipping-rates-a80bdd8568c61aa45e987adfac4d1b71.yaml create mode 100644 nuclei-templates/cve-less/plugins/easysqueezepage-98fa09468510e4f3d608da204df8d702.yaml create mode 100644 nuclei-templates/cve-less/plugins/eazydocs-15118c222c3d3efe10e0b60b12d7cf6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/eazydocs-19e34a16c1a810dff7996ec5d94f691f.yaml create mode 100644 nuclei-templates/cve-less/plugins/eazydocs-405b16e90fe11a6da428eb58c52f2070.yaml create mode 100644 nuclei-templates/cve-less/plugins/eazydocs-be6b3b7884ff27a71c7f24387abeb572.yaml create mode 100644 nuclei-templates/cve-less/plugins/ebay-feeds-for-wordpress-08485cb22c15bc9351789c0be0e79565.yaml create mode 100644 nuclei-templates/cve-less/plugins/ebay-feeds-for-wordpress-492078688f68b5c1a6aec5a98ed76f29.yaml create mode 100644 nuclei-templates/cve-less/plugins/ebecas-994e6758795c8c6e11e9f43c7bd4ac1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ebook-download-6ad6b5074b24fa1505e13d3a89bb00ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/ebook-store-0b18a98b24cbdb105ec0fbddf0f9fc1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ebook-store-898935c481a1816ebd33c0960cec20d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ebook-store-b6e604dc0c4bb898e75726aff1be1de2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ebook-store-e077433f57a559397a844ed63a88920a.yaml create mode 100644 nuclei-templates/cve-less/plugins/echo-knowledge-base-90823deeda228cab8f47ba8bfd583141.yaml create mode 100644 nuclei-templates/cve-less/plugins/echosign-0dc068ee145b8173a92e905141be0d9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/echosign-9cf68cc8a68a2c81ff64f2eb044f1190.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-0e1a3b18a1b946d1c273b3cccc408050.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-292ccea97458e988671a2f5d1ab07fab.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-2ab97a490ab3483a1ecd9eeb3292652a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-3319cf0ede499d0a15c5de919fc4d867.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-656ddddc75a5e8d95a513d12188cc2a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-6956e38d645c6fe5f56835ed84bbc61b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-908797ba849f02597e888316e5bb0c25.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-90a088835020a5c787dfade0eee8a2e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9daff448e161c27a1010bad80a987a15.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9f4117fe62888ab2f2b714ed12570706.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9f6d47d07822136b59fe192df481593b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-cbd1d41b26b0296545c9edd7581d3ebc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-f239cdbdbea64adf739686a8765fc6ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-product-catalog-fae58dcbc303cd1d67051f496ccc1326.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecommerce-two-factor-authentication-95ef764b37cb71c966879176967dfe4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecpay-logistics-for-woocommerce-fa186d1e1ec1e8fa099b44e363e81256.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecwid-shopping-cart-106c0a7404df198e82204052394ad569.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecwid-shopping-cart-3bc18d019b91d2de29e8f02de7016b9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecwid-shopping-cart-46eb2de249c5ae6cf9fd3c49e21bb4bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecwid-shopping-cart-b6af58199f4bb361c122e5469834d6a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecwid-shopping-cart-cbb1fea9bfad5a9264ec67a1ffb3cfd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecwid-shopping-cart-d5b7868baeed541383a9080a76f80c46.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecwid-shopping-cart-e67a592d479a1912f830dde99db21328.yaml create mode 100644 nuclei-templates/cve-less/plugins/ecwid-shopping-cart-e96409adbbb169ea331189d4d409f4de.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-amazon-s3-188892e32d2c439c02d6eec7a4adfdb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-attach-accounts-to-orders-aff649abeaf4857a79fa8884fa07fcd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-cashapp-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-commissions-dccce9109c5a84af7a34cbb0742260bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-conditional-success-redirects-3b1d00a18f864c139ec613a9e0ffecf2.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-content-restriction-d192f8275b2c7772bc52294d4963918a.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-courses-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-cross-sell-and-upsell-e8637d731d41eb4cc5029aaa77c50673.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-favorites-4f94094a1cb01e1f7943775986788b65.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-free-downloads-96ff2499f32e58024088e6b7c6dc3990.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-invoices-61717663c17e62c7f08a76483f0eeff3.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-invoices-d21243f7c0461744fbee4b3ace491e32.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-manual-purchases-ece0f7db12607af6e93bd47b255fcaad.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-pdf-stamper-7028a373145887022c971f45128fcdba.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-per-product-emails-d51efaf8de0ecaf24f9a181bc5d20bee.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-product-reviews-2a6ac5f100690b8d0b4a16d1c12f679f.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-pushover-notifications-0a523ea5e4a860d6c23793246d1e5019.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-qr-codes-4bf1b8de6af96f98a7a1f3714d0ed32c.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-recount-earnings-5c7b076501be3d3c98666ffe30ae6a26.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-recurring-payments-099ead226109d18c4bc71e3d4e743b55.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-software-licensing-52e4049030db45f1344545c480f7a4ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-tab-manager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-upload-file-268f9394678ef20df569fe0eb2e92a44.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-venmo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/edd-wish-lists-0633b5d5c2288fd164f50f774a52dac5.yaml create mode 100644 nuclei-templates/cve-less/plugins/edge-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/edit-comments-7b827ab34d96ee14e9116ea8db988679.yaml create mode 100644 nuclei-templates/cve-less/plugins/edit-comments-b54ef55c09174d7838779006173ea01a.yaml create mode 100644 nuclei-templates/cve-less/plugins/edit-comments-xt-c955d255994c77fa2afb0b159f25b5a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/editable-table-3f51c790e689dcb447adc1ee79fee545.yaml create mode 100644 nuclei-templates/cve-less/plugins/editorial-calendar-a85ca9a2b7f246b28c6ccf181717216e.yaml create mode 100644 nuclei-templates/cve-less/plugins/editorial-calendar-b0561191aff3bb3e5af8336a71c1ffcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/editorial-calendar-c978227ed54be6d80dbe1ecf4f522c4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/edoc-employee-application-4f76a0450248571403ef40c78dab60dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/educare-029b8e032e0fc0a8b295cb9989f4bc4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/educare-cf9e561567f8ec0f7f05155ec9df9eb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/education-addon-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/edwiser-bridge-44337a15956fb6efe76c43a84f40d4df.yaml create mode 100644 nuclei-templates/cve-less/plugins/edwiser-bridge-a97648905a16e731980d6d512636856b.yaml create mode 100644 nuclei-templates/cve-less/plugins/edwiser-bridge-e57ee015b5a3bc1cbb61b42c2d7af862.yaml create mode 100644 nuclei-templates/cve-less/plugins/eelv-newsletter-777e4f42d98591ca2b51ba0e588ed585.yaml create mode 100644 nuclei-templates/cve-less/plugins/eelv-newsletter-77b95b2fd3fc9982f02a243980235615.yaml create mode 100644 nuclei-templates/cve-less/plugins/eelv-newsletter-af90005e3634d51c613c584f0861c0a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/eexamhall-64357c63e9789d2ab1bb69c47d5337ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/efence-e5f4c0414a585004ed1f35745c5931f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/eg-attachments-f006ae96918e8c435b20f1e9d28e9e41.yaml create mode 100644 nuclei-templates/cve-less/plugins/ehive-account-details-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ehive-object-details-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/elastic-email-sender-7666fb1e1d2345dc70da7aee12ac3253.yaml create mode 100644 nuclei-templates/cve-less/plugins/elasticpress-0046efcaf372ceea3cbda093fc9866d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/elasticpress-1951707b594e6f4a4e8e4243b43c9841.yaml create mode 100644 nuclei-templates/cve-less/plugins/elasticpress-54bc1daf26907dc59a5c7876a142ff1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/elasticpress-5dc312330e1225a6fb2a9d319cc31d3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/elasticpress-73081b1f6f4e13a9e6e969eba5e746fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/elasticpress-7522c596e66132396decc40456fc3c0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/elasticpress-bd26ccd939104e13f73f569b312459d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/elasticpress-c3dca1d1ef3a946c9ddf3e33caa00021.yaml create mode 100644 nuclei-templates/cve-less/plugins/ele-blog-fd2502bc424033ec4b34f2309e987add.yaml create mode 100644 nuclei-templates/cve-less/plugins/electric-studio-client-login-f63b97efbb567f61e36df93bf47a02fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/elegant-custom-fonts-f10c9b43de964c20f74a052f0a107e7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/element-ready-lite-e8533877c8cc904267c19512d475d608.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementinvader-addons-for-elementor-1b9ddc8767486e6841efc7560084f93c.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-03fe440b02e44feccf06b79164360aca.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-151a3d01fba73eb2e03af896af5366b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-1f2c4e6dec405aef3fd5e6566d223430.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-26fe6330bdb19cfffb8c82c950ab810e.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-287536d4e13889455f637b6c851d2004.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-2a3ca00c5df2d9ec07efb3c8b755e2fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-2f027571e136822dc3132e7a5b6f47eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-5076d4232fcfbe5d646915f67652404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-5721e5b5b859df336ecc013b38726f93.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-5ccd429722cafafb64349730f5cc0669.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-5e6768e991caa45e72cc5f93d69cc8a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-5f7ca58c2ad3d25f19da443baa193352.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-660b23de83aeeb4aa32118217df234cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-669dc6b32158d01ea3af647aee0ce2e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-727d2f92da48e178eefceef10fd279f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-7df4e23827630859e3a047cf49f19af4.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-88f2e8b62006d8f70eead27b7d5c23f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-8f2ebff96481ee5356699783e44b68ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-95ed8c023906e2f70f01592d99282d0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-97ebb96fdd3db87faf02d7c0a7e706c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-98c8e6a6d80acb851afcee0bde588eea.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-b165aaaa725c1983b238dd197ed1a7e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-b58bfdaaa39d4e7d694c40523cac0a71.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-bdfd3cb15fc22fa823679d0ba1d3fc73.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-c04510d8ae6604902066b55cfed338f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-cba36394f848d0e615f1c12018c52329.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-d16f5d5a117e59e23a5a604664dfe044.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-e1d6d92659e9b697c29f278d3aacc568.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-ed7ec795a9e5769e2593c8bc7106e945.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-fa47ef3a071af26f7cb8467307b46f4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-fe43bc61a2c4502126731a0d72fb43ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-0f93fc1c537d4354bd5e942ea05347cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-25aa395084f363ecfd02447bcee9b684.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-4227a0d8303b8be51d7b7784befed50f.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-495b1b12b50b14325e42d32d8b21fb76.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-500730a31af9acbaf8945d735529d69e.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-52d465c21905272814a823dbfaac019a.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-5ecb61edb8f014ffed25792497a59fa8.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-68b5f15989ca60b284d4dce6601af76b.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-6b5638f86300bb8cb925bbc8ddae3c32.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-74f6871329004558f0dbc4c0f34288a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-d8cb62391dd6a20fc4b59fa893c8943a.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementor-pro-f9bf203df336a8e0915eb488a89feed1.yaml create mode 100644 nuclei-templates/cve-less/plugins/elements-for-lifterlms-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/elements-plus-3da99f6ccd8b569aa4895183dacec31a.yaml create mode 100644 nuclei-templates/cve-less/plugins/elements-plus-c23e4efbffee4d6fedc761f6f4283de6.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-7b0e7eea2756aa9a3fb9bd9d76ac83fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-7ccdd8fc797e3fab9fea1a77280ae2aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-01583a85c3bb765e7b9d1e3e575dd138.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-55933111032f4be98ad6ab7b8ab899fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-7a76232802e20b0ab3fa4ab939317696.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-8951eb99c398a311cfe985bad4ff4e0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-998f619282ed25afacc39847ff214ad0.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-a391f7553cca71ac204345c2d728e50d.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-b5aa1e2113ade8542174b19f6a7b50fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-b81f70d3babfec3365a985059b1ef475.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-c5f80f50585482477dae3983763ad356.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-cebcb9a4981e79bfafb93e65195f6976.yaml create mode 100644 nuclei-templates/cve-less/plugins/elementskit-lite-e064b41fe8a39fcee76359d8531bca53.yaml create mode 100644 nuclei-templates/cve-less/plugins/elespare-e41adc177b897ccc45ae52e5f4de56b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-1ceda12447caf192b9b71c29d944dec3.yaml create mode 100644 nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-5803c54654296625cc9282007e3bc732.yaml create mode 100644 nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-a95a041f663a4c62aff19b3c367f951b.yaml create mode 100644 nuclei-templates/cve-less/plugins/elex-woocommerce-google-product-feed-plugin-basic-f5c3c86270b1863c3fa6b0703e6d1b39.yaml create mode 100644 nuclei-templates/cve-less/plugins/ellipsis-human-presence-technology-e298d4cd6c60e1657aca279370a259b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/emag-marketplace-connector-3b02e02d41cec8d9db34b3c05317b116.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-address-encoder-b24c287a46f17f82649a53242631be85.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-artillery-20b7ddc5d1ffcbeda215596162f60f8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-artillery-4d82961305a08da281f47753834e6ed4.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-artillery-5969d2a7887ae66d8279d64632cb1bda.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-artillery-9c1eeb6cb8e2181d2e2a015c65a4f34a.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-before-download-21e4ce5a3bfca4114f19fea4e07cedff.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-before-download-5ea0c3651c9da8625cccc634cc64b098.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-before-download-6ebfe44ebffa047243d43e4d8e8b6f78.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-before-download-a2870e76b912e745a86653be4b4db558.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-before-download-ccee5c3d44686cfe8d0fc73e53e58d49.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-customizer-for-woocommerce-2dc01355a72cc0cc9990304f23aef74b.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-customizer-woocommerce-240ee5ac158ce434b1247f54a6208c44.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-download-link-6fee77016a00b31c59636a01ae709575.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-encoder-bundle-39cc187a3eccc87804cc421fe29b611f.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-encoder-bundle-83be75cbe83d286de0e56bf13cde5945.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-encoder-bundle-8e9ca596ac830dab2177a8b85d591379.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-encoder-bundle-9a66ad8b0967001fd55d0d45f6e42869.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-encoder-bundle-9c882237ff7863bee4225b027eaf1086.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-encoder-bundle-c754ba54f7d343b7382e51da7c21880e.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-header-footer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-log-628e104d3a4b1ff3a2f651b79f8f25d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-log-ed713a06b3f7e4b3455b2dcdb9972457.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-log-f236054487317139ae48591f97952a0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-my-posts-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-newsletter-72825f3aadd86474681e72f8f4d9931a.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-newsletter-8a46b53d95feeaadec01fb4ec558c983.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-newsletter-faced947f330f89d07bbb1dcb1b4213e.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-posts-to-subscribers-4eac7176009c682727808e01e866ef23.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-posts-to-subscribers-70d540971be97a9211e2d9d5341f5f1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-posts-to-subscribers-8758f22404dd62cde026b1679050e44a.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-queue-b0b27aeca24eecebb185da8072b76690.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribe-42d0690a93913679d6541673c2295e13.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribe-61d643ab5e58be99a89f898a95037035.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribe-630f34845af5e5fc95882bb14f5c2a50.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribe-7d502a4de060d367bcc9b0de4a22c634.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscriber-59026d3a8bc5d6798f6f8303efbe2f34.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-030bdddcac86d2bf18f94090df9f83ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-13af706509ed275951fca2f87c67ca91.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-250405dd7d7ac0936ba8e7cd74ae07f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-3042e18a6deb29dac6c8bd45ef1b1544.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-44b2c7a52835b66ee714b700c4849cf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-52ad0bdca5afebb4c884c4a9d304e243.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-611a77108bb5f90997b0fce9e22206d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-648aa8a954870cce461eed81133035e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-64ebdeacfb7857f81240b567b724e6b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-6d5548494ee66c8a74f29f22d03a7935.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-827bc1bb21b15b99a01d332b7037ec11.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-865ecb5d1f3a9d92057b3c2510337cb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-880b88155b22c7b6bb28fecc96be5e0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-9ac9f5b4519b4e9d1529f25c11daa2ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-9fe142798845207512b358a2cd4c8c4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-a1ba03b1aedf70c25268c48aaf5fa097.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-aa4af80a7f91093ad7b6f879bc08fdf0.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-abc4377868fee7cd682ebf8a6fc03b43.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-b5e4b4063141fbe3f98d4c057142e54f.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-bbb33bf45ae299a4c2e1d54441bd6458.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-subscribers-fedbaf9b75c3966253ac9d4ff4472b7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-templates-57946d1dd6e11e1c396ef81b832dc135.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-templates-917b82f603a027a526dfc9cab63f789f.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-tracker-1bc28fb76a1a4ab68d85fdb49a0d308f.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-tracker-2aa4582e387e2f0aff6a161bf2999899.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-tracker-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-users-6a64d101ff5229efb2db9bdfe2f53def.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-users-6dc4bc21ff707a1d11a058362ed03503.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-users-ccda15a5bf6159295fcd2e55b40f1e6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-users-f8b327a38c9f793227404396765e7078.yaml create mode 100644 nuclei-templates/cve-less/plugins/email-verification-for-woocommerce-pro-ee48551d5debb82650756b153a85ffe4.yaml create mode 100644 nuclei-templates/cve-less/plugins/emails-blacklist-everest-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/emails-verification-for-woocommerce-4a3c747c05de1c383de7ec2aa84fdb32.yaml create mode 100644 nuclei-templates/cve-less/plugins/emails-verification-for-woocommerce-ee48551d5debb82650756b153a85ffe4.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-any-document-da04799a8ee55b9edffd7e84cb258c78.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-articles-f3817a5409bd2eea88bc7efe16cd9b30.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-calendly-scheduling-6520a4a851336aa904cc04b7b33623a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-comment-images-ce946f2b4359bb7fac48391b993074ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-form-22880b987be0b07f46689049fd2458ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-google-fonts-48e682e482ecb4079ded015fff88c4de.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-google-photos-album-easily-83ccb1e8ea2bc379358acbb752bc4542.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-office-viewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-power-bi-30c71081d6f65fd865fd605bc8ca0520.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-privacy-bf9717887c7854e5283687233b3eaf88.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-swagger-92781f05f816d6c99cfd35413990ba55.yaml create mode 100644 nuclei-templates/cve-less/plugins/embed-youtube-video-d936ad16c92f96a8d361e8354b08642f.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedalbum-pro-db16305504754334b65159ac40ded503.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedded-video-with-link-2330137ae1ec8d7b8306559ca1c520ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedplus-for-wordpress-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-115e00c651433aced451e63d84a0be40.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-1d3dbd02fa5b7205872c8a687215c897.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-1f31c2ba6ee46d152a9920d8ef0adb22.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-1fc5887f904fbbe1b31241f4769801b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-3c6a3e77a7ff2e2c086feda205237c52.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-55354669981e5b8e2367ee7fd327c426.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-70a205acd44742a9f8e261e79a40ad0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-735922333648d19765f3918bee1c33f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-7ebfb915654b21bb1907517d4349fa05.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-880737228fe55f5d920474a43f87af97.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-8d8dc52792f8d60124d8fa4fa4f53a0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-af797cbd3361f1f4f2cd0edf1a785a5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-c976de4a293db59cf9e14c118fa6d0c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-cefa3854b69334bef3c2d36906bda58c.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-e1343ff86b6c5b93b675136f5cf7bf16.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-e6bef9cbc42ae7e22a44d23e311b7552.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-ebf721c6b992d7c7bdcbf869b188ed93.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-ef5a725ea594e708f6f726a1ed538862.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedpress-f70dc70f946daa66696d6fbc7263d880.yaml create mode 100644 nuclei-templates/cve-less/plugins/embedstories-a14026f64e5ecc9508ff272952e95205.yaml create mode 100644 nuclei-templates/cve-less/plugins/emc2-custom-help-videos-dac97f512e0af4b1c598ff6f32c574aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-accessibility-66918096b133f0822c2cd20e34605973.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-media-replace-47f4114397364fc89b3a25b4215574b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-media-replace-bbc7fa54925890b55e253bb27ea68d3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-media-replace-dead64d1305225210f2390b6b61b5201.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-media-replace-deb23a0fc9d87cc73b65165406099d91.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-svg-de18c34baf9718449b89d0d38543217b.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-svg-uploads-a61a2dfac8b16f216b2c313ed531d97e.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-165d37e436f1584c4d3db5b3ec68fd79.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-653a3ab56e5af63ff26288de711fb273.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-ac9050df076297964363495b9c075e7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/enable-wp-debug-from-admin-dashboard-f01cd050c27f35f17165fc03a0fa92ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/encrypted-blog-0f455cd91b4366e91443512f4a924b14.yaml create mode 100644 nuclei-templates/cve-less/plugins/encrypted-blog-b92dc57dcec5014fa09f88c38e362f1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/encrypted-contact-form-2fb0bdf5e86e962a718dd05b2ce83f93.yaml create mode 100644 nuclei-templates/cve-less/plugins/english-wp-admin-450ea91a4d60d7431414f8be13b7c9b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-catalog-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-3a5678cecd4cbb7e481b97acb528f036.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-88bf9af12ef5e38595f378ad9f2dcf87.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-9549871153d587a10461e3eb973b5757.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-9c674f0198c44bbc3b97237db4078df1.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-ad1bab22a9b739c47d96ab770ca5f753.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-d482e085c2e103ed9accb9a0cd94ae4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-ed938d6748a55c68d3afc00fc2604d10.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-media-library-6039d2569df090d7d3093a78e0441287.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-plugin-admin-7b7a151dfcca0b5faecc4b73e9e5942a.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-plugin-admin-f1a2d10749ea560492c49064688b416f.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-text-widget-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-text-widget-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-text-widget-a9a1d45bfcbca6c173ea125c110bda5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-text-widget-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-text-widget-d68b3bd827fa2538356da72861992193.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-text-widget-d8eaeaf9f69a4b2de6a788086b60bfc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-543a621cb0bf8b18bfbda7bc7ee7cfa1.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-5597c388852b3462017f5bc3ca0328fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-6bc3c65cb1ca8d7f84584a1599bace9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-7c07c1ab091dafa6dc739a4dcb0453d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-wordpress-contactform-71e56d0f97e8b4d7649e09ad58dd5927.yaml create mode 100644 nuclei-templates/cve-less/plugins/enhanced-wordpress-contactform-d2114b88fcc067766472c75899b7fa23.yaml create mode 100644 nuclei-templates/cve-less/plugins/enigma-chartjs-1d70e5d002efa976ab87b56edcf9f0b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/enigma-chartjs-ace575e194919fed8a75c5778dd0bfab.yaml create mode 100644 nuclei-templates/cve-less/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel-47817571e00845c157bd7b162b48263f.yaml create mode 100644 nuclei-templates/cve-less/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel-8100bca7f40bd5eec7ce73b26e775600.yaml create mode 100644 nuclei-templates/cve-less/plugins/enl-newsletter-450d379738a3ed762b9b5b46fb6f58a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/enl-newsletter-84f324614693ea073f92a44e128e4cc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/enl-newsletter-9e2d3a35dbbc0898dce1216c2073fa6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/enl-newsletter-eca3d823dd426887bd9194913fe758fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/enqueue-anything-a1f55b7e935f65d8ec08ab5f8854d26f.yaml create mode 100644 nuclei-templates/cve-less/plugins/enquiry-quotation-for-woocommerce-e5a8f42155cebe6939f0ccac8621a6a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/enteraddons-0e079d604a8bf155d8a2cb48193c6100.yaml create mode 100644 nuclei-templates/cve-less/plugins/enteraddons-82e1dbec0eac00504fe2d5c8d1c53a7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/envato-elements-e259392e4e0f5c005c71447bf33a289e.yaml create mode 100644 nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-514cd5f6862b902abdfe45e0c2ceab5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-6b955e7831b4476315ace7bb8d5f3ecb.yaml create mode 100644 nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-77c5f9441620c4484058d80cea50d864.yaml create mode 100644 nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-b6be086ceb5c1e62386aaf5cf54e66b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-e9f65fad0edf93964d95edc6a82cf394.yaml create mode 100644 nuclei-templates/cve-less/plugins/envira-gallery-lite-493dd00fbad457efffd98380feee37ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/envira-gallery-lite-91259d563d9ff9cc3660b0bcf5beec5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/envira-gallery-lite-cc4dabd01e1338fc09aa2ef444904587.yaml create mode 100644 nuclei-templates/cve-less/plugins/envira-gallery-lite-d0a21350c57dcbddba5f33bc0580065b.yaml create mode 100644 nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-99a74c6c9556a6c727c6aed622ee1c96.yaml create mode 100644 nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-aa0d08f997d780bef53fffda596a65a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-da8d9bf1ad46e0cc886ba0015417b54e.yaml create mode 100644 nuclei-templates/cve-less/plugins/envo-extra-8eea52e06c2c0dbad4e62c3bcac5c0df.yaml create mode 100644 nuclei-templates/cve-less/plugins/envo-extra-c26f84b3b737dca9d0e2ab2c400f43b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/eonet-manual-user-approve-bce2c57392aa12eefee039fe25226280.yaml create mode 100644 nuclei-templates/cve-less/plugins/epoll-wp-voting-17700405f02a76d34273fd6f63bdac56.yaml create mode 100644 nuclei-templates/cve-less/plugins/epoll-wp-voting-8119e5403d3a32487dee582a940781b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/epoll-wp-voting-e39a71ad2e4c4fe07f9341861c3e2c8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/eprolo-dropshipping-ad0ff157f5be17af68fa4347894dd5e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/eps-301-redirects-535590a7d632fa42d8031b5da47799b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/eps-301-redirects-60796296d5bd5b2c076a796a73e81fc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/eps-301-redirects-65fec51a84e4dae8b6ac8a6f543cb922.yaml create mode 100644 nuclei-templates/cve-less/plugins/ere-recently-viewed-c28abeb41bd6624cef6af021a381a425.yaml create mode 100644 nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-1bd28f72c9296305fff71e613d0c8c82.yaml create mode 100644 nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-b76f995a16535082b5686ca7f787e057.yaml create mode 100644 nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-bd06eea54f94d4f00b121a93f672de21.yaml create mode 100644 nuclei-templates/cve-less/plugins/erocket-9babf2cf45788c102d8f9d4588bf3e93.yaml create mode 100644 nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-2a4cf068be66f271c3b3f52be6e940ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-5ea4e509f820ba7667284a234b2ed4c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-cfb7ab3df6961d91dd158fd90d7552c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-d77ed1e2b83213ba479b850a5dfc79e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-e081d559a96dc283eb19909827c9469c.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-028f2396fc3224cdf799828543a80de4.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-1ecaadeb4176f89b0523e2b0bb90c06a.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-28fd0d7c469dc40d11dbc75326d45936.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-2c7b7c699deb0493bc338eec94d29af3.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-3b72f620df35cbae939967377ac621cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-4ba36f479c72328d41a5d7367a3a95ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-4cd083213286b4e4a8589cde5bcde660.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-8acf66d52cca352214a80a527274b5a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-b10ae50c79331d4dcb069789ed2ad609.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-b7e69e83c8c59004ad0e6d101ab301ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-d1b821dbb873ab8f28cd2cb8f033062c.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-d1fe516e72277a6efd50d79a0cef3b2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/erp-e196c6551f9d36abf1354b03caa3e5d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/error-log-monitor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/error-log-monitor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/error-log-viewer-379b9f1826ea14bff8cb3dd2f951214d.yaml create mode 100644 nuclei-templates/cve-less/plugins/error-log-viewer-4c143b0897524c6ae94ca24b5d894e6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/error-log-viewer-85f600cb7a38ce6985c36103e27ab0e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/error-log-viewer-a66a4d5df510beea3bf0ab3d3982bdad.yaml create mode 100644 nuclei-templates/cve-less/plugins/eshop-4712ac1bb5ac602fc210b88a33fdaf9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/eshop-6b1f692527a7829aa26f6946e0d77ddd.yaml create mode 100644 nuclei-templates/cve-less/plugins/eshop-7e99952543b7586dc6b3250a2122b0f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/eshop-b63e841ec4f7ba03a92d7fcbed9249bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/eshop-e18e1098e91136cecbeb6e29db3c0caa.yaml create mode 100644 nuclei-templates/cve-less/plugins/eshop-magic-2a97bfdfd8781ee071e1eb3b8b605769.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-elementor-298ee3ac56fa2818652ccdcf0f94081c.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-elementor-4efdbc3738e2b809632b64ac3cda51fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-elementor-f34ebd6d445ec4bbd536ce24fec37483.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1015b09d99817c2106e43f3451c30ac1.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1a4b02751bb2128579758045cc80caa1.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1a9b2b84b94bf133577af40ec3afb2be.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-200d6c881afb4e097be1558e49c07780.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-24bb86aa2326eca80531d492521a5d29.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-3336686541cab0beb9c572eb91b49251.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-622d5312417c1581aa63ff2faa690a9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-641fbcb7693eaa3a03da6b383765a523.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-73185f41beb88e54f54a80787c1d789a.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-84d7b8eee39d9201723ad33de86e3865.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-8bd60d8d3ae1eb23eefce0f380d89e1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-8e520f19b2730c335f2344f32b135ff7.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-9319000e1757d81a7b4d434242e3b0b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b435c087d203d9fb2850a517c55bcc97.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b4aa2ee32c8d094c0d7d3b9c1a221104.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b90105c25730b4d746a6acc92069913e.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-baba429a98395d144623d60921070685.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c784400f0eb0916fb123587bb1f7a008.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c7afeb04136868c455da71b1177f088f.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c900b7eac90dcb368c77b66b5bee17b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c945e86e64bc195e431c6da83e2cc2c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-cbede89175ad7b3a47d5ac8fb29d35bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d36603d2844e0ef2710cb2cbe62e45a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d4efcf3c752e65b8bb0f68965ff8309b.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d621d242ab564fd8e6e924445af60a72.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-da6c348f533c2442c083b7568ed9771b.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-e5a55bdcc25518bd7b994104c01d9391.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-e9df6b62593e703fd734b693ccc67b68.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-eeb15b3523994497219c24e4ab9f075e.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-fd0c27ea93cffb5177b96e76bbc2aa5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-1092f82974f0d44c05422ba456183db5.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-6092ac059aadb6e2fb447935fafb717a.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-61d212d2e307b78bf3e793271bc28e50.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-65769acec1aefbf22b461433a4ab976c.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-670002c777730edbb2cb892efe1340bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-6bd5ec9d4799550acfbe6978f43129c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-7daa2f9a38772e28d5c088d50297e34a.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-809bef969b735d714b42168e6770e1c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-86a5e7d3d7ed00baf83310ad8f227a5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-8e520ae3c19cbf656f990691a6cb724f.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-9de5506c980e28c9e55c18a88ab23a5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-b8c50e487b4b0337b88f73b897d2ea2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-cc9e9a844434f90c7c28fe24a22a2f2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-d11264f27a09e4fdbe795eb60f43ac5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-daec7d39bacac9f0d791f41eb89b64b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-de6bb81e5776b8853821078d5af9e37e.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-ec83c952597cd4d48032e81f82ee4086.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-pro-daec7d39bacac9f0d791f41eb89b64b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-blocks-pro-de6bb81e5776b8853821078d5af9e37e.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-content-types-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-grid-252d8b0817c1504c9d368093cbed6570.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-grid-615a59dfb372c45c35b57f6455c9a01a.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-grid-ffdce410a6a7ddacc9790163fef8faa4.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-real-estate-00a2a2e9797fc1a0dfdb2c0093e34725.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-real-estate-495047757cee7d3f3cdfc2d78c597016.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-real-estate-530a5f39017e1b56e85add8e46eb1fc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-real-estate-54b8dea2a513397d549565f2d6307194.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-real-estate-79c84a24ae01cae4e07f5d580bc271de.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-real-estate-f1165caf4055b6656a8778038c98cf59.yaml create mode 100644 nuclei-templates/cve-less/plugins/essential-widgets-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/estatik-2dab9495e3032fc043db0a21d11fd446.yaml create mode 100644 nuclei-templates/cve-less/plugins/estatik-4a2a3f2d6fcad8ba2e9fd4989dbe6a53.yaml create mode 100644 nuclei-templates/cve-less/plugins/estatik-735edcca81533a941d73b22fd3c790b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/estatik-c13a04653b2bd4332fed19d99c861058.yaml create mode 100644 nuclei-templates/cve-less/plugins/estatik-dffb7325ebaf69230baa15ff0c7b5c62.yaml create mode 100644 nuclei-templates/cve-less/plugins/estatik-mortgage-calculator-4963e2b8018a63e397cd2fd1ef358d47.yaml create mode 100644 nuclei-templates/cve-less/plugins/estatik-mortgage-calculator-b9268068741b5afa10930c2a68504f76.yaml create mode 100644 nuclei-templates/cve-less/plugins/et-core-plugin-2b061e047e658e61d8ebbd4e7e809bba.yaml create mode 100644 nuclei-templates/cve-less/plugins/et-core-plugin-3e529ad3f40187427736b7fab3732fc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/et-core-plugin-4a822947b182a8ad769234c031d65105.yaml create mode 100644 nuclei-templates/cve-less/plugins/et-core-plugin-67b6d13fd5c91dcaea1d0b5a3d6ef9e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/et-core-plugin-69dc88dae2977364ee23f133476679d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/et-core-plugin-778530516424ce1a3968690bf84c44c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/et-core-plugin-7c1fbc71424269552780f75d587dc6d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/et-core-plugin-dfb4659d00ee25c056f5c89962f45122.yaml create mode 100644 nuclei-templates/cve-less/plugins/ether-and-erc20-tokens-woocommerce-payment-gateway-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ethereum-wallet-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ethereumico-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ethpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/etsy-shop-006e837e29a04be28f23fcb621fc7c5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/etsy-shop-12af00d20d6054e6e52d985c87c55f02.yaml create mode 100644 nuclei-templates/cve-less/plugins/eu-cookie-law-0598f02cdb42ad5878825a4305d0cd60.yaml create mode 100644 nuclei-templates/cve-less/plugins/eu-cookie-law-7bd73acb3e7a0bf377aeb77c95eb6b8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/eupago-gateway-for-woocommerce-138945608ab96d8fde0710ddccd28d61.yaml create mode 100644 nuclei-templates/cve-less/plugins/evaluate-c206b1ef471fcab481cc325e40071db1.yaml create mode 100644 nuclei-templates/cve-less/plugins/evarisk-f472ae87189b5e53003e503dd6fa0b7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-calendar-wd-209b175b2921345ce72870696dcb5d5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-calendar-wd-47b8a1ee1f8560846764b32bfc0f5385.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-calendar-wd-4f2124ce38e5b11836dd224eb87f80c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-calendar-wd-c04a7619437a5f30e58f107b65d00343.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-calendar-wd-f5b60cb69c042e53c0624a4896969936.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-calendar-wd-f87eb9062acaa622ccaad44a0da4055e.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-easy-calendar-204a4a5eb1bb83f22931c8d30c356316.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-easy-calendar-c4cddbbbf9510f7f05b91c86dc3dade6.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-espresso-core-64738de487a64bb84aa49f1cb2905c9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-espresso-decaf-58a3697a69c8ed53be8155b2e125899c.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-espresso-decaf-b570b273a03a0fa29b5a4d4db2c58011.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-espresso-free-11785a74a8a2ea2253fb0fe61f67d120.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-espresso-free-3faf59fe255a23ab6371375fbe88c459.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-geek-895b9710054cceeb59eef3658e032c99.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-list-1b4409ad110c3c389ee584578fde5c3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-list-8aead4340d12e591a0e0e1fb46dd9226.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-list-b6feac7a7902db970215a4fc933d4825.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-monster-2ce3da9cb13ca01fe4975c718c0361d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-monster-5b36fd20286674ebec29c5f8c3b598c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-monster-6be2333e24bb1c10a3a6c889899366b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-monster-7d599c9ff2fd0f7d53f1daad762aa4e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-monster-86218768d044c8a0a41ad3c63743810a.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-notifier-a1a48fe23ddfed810a2068245669c30f.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-page-templates-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-post-7d0df8a0008135defe46e0244de6dafd.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-registration-3ce5735f215e4140f8aa361ffb4589b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-registration-9d8bac7e00ea2ec60ec3b7aebc38c2af.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-registration-b3acf24261888a93af1e07d21be14713.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-registration-calendar-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-registration-calendar-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-registration-e5636efc611147282df108916f2ce8de.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-2581131a04f529b6a1d76a0e92f4b955.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-2f07eb6c891e38765db750c63d86a120.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-c4921b839172d2af0f48284749d41b1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-cb6c55d4733797bb415d8f13c3aeab2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-f8870005841795b1f61974063b04cd70.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-plus-2581131a04f529b6a1d76a0e92f4b955.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-plus-4df3cdb7c674def16735b8e037827c43.yaml create mode 100644 nuclei-templates/cve-less/plugins/event-tickets-with-ticket-scanner-eb93d0fd8aabb59ccf2ece6d36890f6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventify-5dad00a11bede1ceffdac71757dc57c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventify-a2935a109cadc5c6b15de3c6e258096e.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-187d65743de5f807e3a3561c30924b2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-2c733617d0e1924a092044fd73aaa5a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-34378358cea5d52c68afc57717376111.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-40551e34986076f096f391a092597f50.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-4534912fcab3ecf2a9fe501762efc225.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-537515ca49a9f4b41a11d36cd380e6f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-68358961295abb7462ad91426e0c3310.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-6c5fd9bdbd84a5f94cf449613dea61df.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-83c99024de6733ef722985ade6213db3.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-9a365d69136d08070aadedc43ca85c95.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-bfc5e831d060dfacf2a5fc44dc2fba98.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-187d65743de5f807e3a3561c30924b2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-2c733617d0e1924a092044fd73aaa5a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-32a06eefdb3abe2eefd8adc33ab67b7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-34378358cea5d52c68afc57717376111.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-4534912fcab3ecf2a9fe501762efc225.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-537515ca49a9f4b41a11d36cd380e6f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-68358961295abb7462ad91426e0c3310.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-6c5fd9bdbd84a5f94cf449613dea61df.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-83c99024de6733ef722985ade6213db3.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-9854f6b7648b36ab18b7baf1bd96dfc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-9a365d69136d08070aadedc43ca85c95.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-b285571aa8961228c020fb748a563a39.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-eb5eba3fb055e3f1a65941e7a11b92d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-lite-fb01f61580a3daa6743e2536b3904a23.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventon-rsvp-e0185b582d68cb517dbdd113cf354faa.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-0518a583283f442e889b7000a0f04a7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-0ce22c0fe7f774ad920004b34c3c97f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3bc30bc01f7305f10a41312e9c39291f.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3d6ad1520c77aad1133699654b17aff7.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3fbde3febf513db2a577aee06321eb0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-42040b470560c747a13bf2788592d50b.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-4d3269fa7a276b2eee412016f196b38c.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-5484a37a07e396bedb80a8478f30a008.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-5610b8d447f64bccab677eca7d6526f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-7e0a85cefa9d78b7f58f293d006f3397.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-7faa6bde45e1f2f5ce5eafbc2fbeb516.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-8aeb2b8f9fd8f5408bc5cbce23cde23a.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-98364cc3fafc257904edef9d7b1a931a.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-aaa60a656a1631ccb0bbf7769cde29dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-c14577a628b19f58f816579d213106ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-d1b60cf010a4c4b99d620cf0f040e27a.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-d621f315674a851e95757dca3af1ff0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-e40a3e8ea03e0231ec1106a753934528.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-ee51cf1fa55e4a9d226a63dcaad1a260.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-ef2d23d82a10c333e2eaaf91d1a798ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventr-3555e671fb855ca8a86dbba28248a06b.yaml create mode 100644 nuclei-templates/cve-less/plugins/eventr-55a68c58c48b9986849ddaa1407aa30f.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-2ad357ed5ae7046d44da5210b6526312.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-addon-for-elementor-8162890ff35ac91aaaabb28f65bfd97b.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-addon-for-elementor-a83b5885cc29169b3a804ccaa82ed3fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-calendar-registration-booking-by-events-plus-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-made-easy-2f7fd4d18b200014ffe6ce74713f97bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-made-easy-6f97964629a2d8890727a9938703cfc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-made-easy-9bcf64c7dbe781ab40d3670dc81b8e8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-made-easy-a5068346d1e00e358b18b96ff80d8028.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-made-easy-c2b3f954259c6ede40d68798a9520dde.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-made-easy-df8b0e3e82913bd73f66e923babf0341.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-made-easy-fb606eac6f1cd09b63793985561a9ded.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-1c184d32846ab99f4fc87c2987b808cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-33af423ffa646dbaa07cc6063b09bc62.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-3f14554541d5c07fa1b8df4c175de3d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-60e9ce57276e284607640edd3669122a.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-644174d3b6cb573b8ad1e776e7aafb01.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-6fb53b909e681612242b9b19b0af96e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-7961a00c8fec25ebf767309437be3781.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-7f61d132e9ad7bb4333f632fb4ac561f.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-83ef28839c75055ae7537f111049194c.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-944355331d4d9eab9649c96fbc1339dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-96287411a0b4f9828a8db098282ac68f.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-9691566897b1cf3f102fa4ca66fa2b90.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-9dd081367b7c3b91dad73b336bd866df.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-ad055d1685348a8fa4aef50dfdf0211f.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-af430c9858b5bde975d56075509bcf57.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-b1f45416f5a631250c26ec095bcb39a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-bb7f415bbeb4b2bf0d001b37770eebf6.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-bf648a28f236904436ac42427351efb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-e1116b6e664ddbf85fd8a65fd5661abf.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-e976dbcc632c2ee3b143a7604910e2c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-eb6226c8060abd8c26fc61f24da2a61e.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-eb8f98aa61e3c3db7506a6098f7ccbda.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-ee6754b66c3dcc79f507ad42121825d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-fb28659ef74c6816e9ff94aaba73e076.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-pro-e1116b6e664ddbf85fd8a65fd5661abf.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-manager-pro-eb8f98aa61e3c3db7506a6098f7ccbda.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-notification-bar-addon-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-search-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/events-widgets-for-elementor-and-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ever-compare-29989c774c0deb7fd695ddb2569712e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/everest-backup-5c5b5355efecc468361938b2443e7783.yaml create mode 100644 nuclei-templates/cve-less/plugins/everest-backup-a3c1423112a235a586d65da99a810a94.yaml create mode 100644 nuclei-templates/cve-less/plugins/everest-forms-0234441805a1275e4ae695da76693b08.yaml create mode 100644 nuclei-templates/cve-less/plugins/everest-forms-5c3a1e24593bd044c08416c2f87d02e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/everest-forms-7d693e04f09654267524d7ec908313ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/everest-forms-baf3d29a2681cdd1e172041c4de8c0ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/everest-forms-f3431b49cff580f3171934059274a2a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/evergreen-content-poster-8c8032347c8a676583142ccf856ffd1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/evergreen-content-poster-92de377343f9b56c26e4f5ac1766852a.yaml create mode 100644 nuclei-templates/cve-less/plugins/evergreen-content-poster-d6daa696f95c257bf8628b3447d01ec3.yaml create mode 100644 nuclei-templates/cve-less/plugins/everlightbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/everse-starter-sites-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ewww-image-optimizer-3213ee891b4642b7b3ba63568830b33f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ewww-image-optimizer-508fae9ebaeb3994eeeea08dc7389cbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ewww-image-optimizer-9693067e67d7ff6cc419426aa56eeabf.yaml create mode 100644 nuclei-templates/cve-less/plugins/ewww-image-optimizer-da711e4ca0aefdf6c9cb2b9eee9b6839.yaml create mode 100644 nuclei-templates/cve-less/plugins/ewww-image-optimizer-e39053204ece48a5897a197753f103d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ewww-image-optimizer-fc7819dbc087612847b613b7048bbd69.yaml create mode 100644 nuclei-templates/cve-less/plugins/examapp-1c6e8ef696086c4cf5cf1464c84048ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/examapp-1cb146595e5a6af092ba6cf697572ca5.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-2checkout-d7709cb27cfd7779480afac87a08fa8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-authorize-net-de87b01d88a6a2f904015f5ea84ebf1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-custom-url-tracking-34e10a41c5c20c0cdcc396ab3433b41a.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-easy-canadian-sales-taxes-5d1048d4b4ff4e9d4fc21662470b4351.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-easy-eu-vat-taxes-7dbba6eb5e75b04ea05ba2ba683d8c34.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-easy-us-sales-taxes-4c3c3f049b1bc0e13ddc430f9c3318dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-invoices-fce7ebf61e0bbaa70b1a47fedc604d75.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-manual-purchases-4b04963b90b4f582746b4536b75f0fd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-membership-8167878f448149a825352a74752a3f9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-paypal-pro-bf5b301e59797812833300e7fc88f201.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-stripe-b13a4a7fbd4cd3ebf80c43d8be8323aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-addon-table-rate-shipping-3a6771ca38d2c7d158262d9fbdbb7826.yaml create mode 100644 nuclei-templates/cve-less/plugins/exchange-rates-widget-776b8b2ca961da26b6b406dc75d9298e.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-007d55abdcc3037b38fa1f4866ebcef6.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-03413c94281e9bdcb28cf85f17f56cbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-26c4a41ab859ae4dbf470aba313f594b.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-27f5aa34f1beb8f61eb1e953a98567c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-2f36bf28ff455df3f6e5bee8596dc834.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-34bbbe6df5443652a8ecc2885cf36469.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-4ab49877e45f4a964303177554e78a85.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-824dccfdb78b425ce34b0edfaef506c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-8639b20a2b1f76694c89791c1b2d91eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-b68fc6d974fd5ff5ec00e24e4a23388f.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-ba61abda2c1a03aab77d7d30f615bf9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-d0e696248d665e9f0a517c6587bde743.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-dc46778586f851feacb609ba4df93bd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-f3fab83347fba28adb4199c2198991f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-f6158c89533171b67393d05399849800.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-team-for-elementor-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/exclusive-team-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/exit-intent-popups-by-optimonk-f9d8d4d48e517849984915b0fb71d1b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/exit-popup-show-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/exit-strategy-c407ae94c2e09109c54e22295b58f6a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/exmage-wp-image-links-83161de0c1fd793802b927949569bb1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/expand-maker-20e2ffcefe24845b4b4e6344c91c5c95.yaml create mode 100644 nuclei-templates/cve-less/plugins/expire-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/expire-tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/expivi-434bdc3a2d6d4c7bf3a3c2d6bf17f8ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/exploit-scanner-4a16fbddd32289a9425b6c977263e9d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-all-urls-171d0fe1d81993f6ce1992662fece84b.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-all-urls-4f798a978754f7760bf888652cfdf4e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-all-urls-a2bd93b9a3b512bd46c713fd9b617e38.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-all-urls-b5b013b649a98c215832bbde298896e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-all-urls-e300fc2b33c3e4cbe76c5a5f26d2b663.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-import-menus-554b3becffafc2d7533a6574bfe4f7de.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-media-urls-04fd004ccf778c74722c06c23011f3f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-post-info-0bf76c13f5d059f24c33a04b1579ea8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-post-info-80eb51ecba5ec678d038fbafb9f76a3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-to-text-96700f83c035e921aa6f4f1cc307643f.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-users-947efea3054054e672bdea86aa02538b.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-users-data-csv-e05fa458a1f240ccb4e1b67dcb2e1cc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-users-data-distinct-8972c0084426af137e3ac2a4f9b562c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-users-to-csv-6f6838754144cfba3c6bd90cbbf7e92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-woocommerce-466267eb695f096848ba3c66efa093ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-woocommerce-9c4ed2f25624ef8c0b44e775a33394e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-woocommerce-customer-list-555fded38156b09a0ae4a96c58cecb2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-wp-page-to-static-html-40abb9e32e5d663357bcdf2c7ce0ff79.yaml create mode 100644 nuclei-templates/cve-less/plugins/export-wp-page-to-static-html-96488db43481ee059de402cf95554483.yaml create mode 100644 nuclei-templates/cve-less/plugins/exportfeed-for-woocommerce-google-product-feed-b2d6fe0a5065d0107b2198e03dfa4409.yaml create mode 100644 nuclei-templates/cve-less/plugins/exportfeed-for-woocommerce-product-to-etsy-2b0c3de81abe87f7163c2ade96d864cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/exportfeed-list-woocommerce-products-on-ebay-store-e3d531049fbe8d4cfc0687a776a83ff1.yaml create mode 100644 nuclei-templates/cve-less/plugins/exports-and-reports-cfd16ad8dc5bcf726c8b8727896a65ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/express-shop-3e4167472cc19aa7d5c770b7ff08e85b.yaml create mode 100644 nuclei-templates/cve-less/plugins/exquisite-paypal-donation-d864c9b876d3aee646e414b358c69b64.yaml create mode 100644 nuclei-templates/cve-less/plugins/extend-filter-products-by-price-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/extended-evaluation-for-statify-a6e54ba491e72f796e7b6e74aa4dfebc.yaml create mode 100644 nuclei-templates/cve-less/plugins/extended-post-status-c787c6531ee0637047c0b6f0c28238e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/extensions-for-cf7-b10d47efef131454e92762a235006179.yaml create mode 100644 nuclei-templates/cve-less/plugins/extensions-for-cf7-d198bd5481953eb6029357e7049666d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/extensions-leaflet-map-e5ccc984a06602c5eeeca3eee991fc34.yaml create mode 100644 nuclei-templates/cve-less/plugins/extensive-vc-addon-8b8ebcc1129f204595ea40775fe38d9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/external-media-090b5ab75971c1cf3354717d50e20576.yaml create mode 100644 nuclei-templates/cve-less/plugins/external-media-2b23e7bc36f5649501747aa394af6972.yaml create mode 100644 nuclei-templates/cve-less/plugins/external-media-937a14986e699492c9c7f6e0e211e4a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/external-media-without-import-47882f7a2bc08ac13c7e58b547c2a0c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/external-media-without-import-55f57d9ee6e02fda2c4bc79302123377.yaml create mode 100644 nuclei-templates/cve-less/plugins/external-url-as-post-featured-image-thumbnail-ad8d7c66fc9bf90a2896ae8bbda63697.yaml create mode 100644 nuclei-templates/cve-less/plugins/external-video-for-everybody-98fa09468510e4f3d608da204df8d702.yaml create mode 100644 nuclei-templates/cve-less/plugins/external-videos-c96e975122963919f6930b9c017e5991.yaml create mode 100644 nuclei-templates/cve-less/plugins/extra-product-options-for-woocommerce-17ad0651e8a5c8de6d9430b66387dde0.yaml create mode 100644 nuclei-templates/cve-less/plugins/extra-user-details-d6041cf221293372ef1d7c4da6af5933.yaml create mode 100644 nuclei-templates/cve-less/plugins/extra-user-details-ff2f93ef83cef5530210b6c4053efbfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/exxp-wp-21d6fb0129ec0276cbb256583b4e5048.yaml create mode 100644 nuclei-templates/cve-less/plugins/eyes-only-user-access-shortcode-6ae4507849a8e19efb73377acf163d95.yaml create mode 100644 nuclei-templates/cve-less/plugins/ez-form-calculator-ce2576aadbb4f84195b6b6013f98bb8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ez-portfolio-05d549bbf43422565845abd53d01ba98.yaml create mode 100644 nuclei-templates/cve-less/plugins/ezoic-integration-26aceda847c1eb3f25bb17474245905f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ezoic-integration-f68243f27ec6cdc816f3b8c11a5b90ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/ezpz-one-click-backup-d1f60a6312b998075106906482a83fc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ezpz-one-click-backup-d8d381cfd52ebd0caccc2d10110d0603.yaml create mode 100644 nuclei-templates/cve-less/plugins/f4-improvements-0ef9782b82fa8d84264b6b12b21ce750.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-button-plugin-74a3d8f89352734cafb21e0108e82a16.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-button-plugin-9c248fffb99934b64b2404b3183ad52f.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-by-weblizar-281277016a09cf7dcda0f71c2e15f07f.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-comment-by-vivacity-ec95efd2e63d9d89b0c3d769bde2a40b.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-conversion-pixel-45d861039b945e03d43af50c9dafa301.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-conversion-pixel-be8a9fdeffbc92f43f8c28b524c398bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-conversion-pixel-e7103d15c56bf4b3a7eff2cebe3d9729.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-fan-page-widget-c912d868bff6df29fc1013dc04c342d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-for-woocommerce-9534faef8d85288ee99452de6c7c430a.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-for-woocommerce-d27b9b5016915435f37e3d3e6a022f76.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-like-send-button-3ff2a2ae71a0269c8c6a199dba440423.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-likebox-widget-and-shortcode-81e5332e3881680e9eac9f42ea7f36ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-members-72f73bf14c806744336e445356e6090f.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-messenger-customer-chat-abee8752b50a21f5a90a04b4599caff2.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-messenger-customer-chat-dda14d0945970dcd1c739d9bb84285fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-page-feed-graph-api-cfdb8d7325e93947d2061002a4b258f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-page-photo-gallery-358b0cd776c979c59cab288ffb33dfa2.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-pagelike-widget-f5225829b9851280f9730cc7388f8c93.yaml create mode 100644 nuclei-templates/cve-less/plugins/facebook-wall-and-social-integration-0c15ed5f69fa39b17ef98a0065e40d8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/faculty-weekly-schedule-49f7af60a7d6ca8e6785ad7873768f2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/falang-32c41bb49a17f6a6d495a0dfbe10790b.yaml create mode 100644 nuclei-templates/cve-less/plugins/falang-8f62194e57a27510760b3cae99e669fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/falang-d0610fbd136beeb3618a2a0d3d1b4015.yaml create mode 100644 nuclei-templates/cve-less/plugins/falang-d9e8ea266e8afee7a81a9944bddd705c.yaml create mode 100644 nuclei-templates/cve-less/plugins/famethemes-demo-importer-f93b5106a9e7f989d008def1a9504779.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancier-author-box-7e3662ab11c3565756d75a405c4e3374.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-cats-19f75dda03c1e9e919da72ec8c14ca5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-elementor-flipbox-4eb5559b22a18e9337a5880d5e2f32aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-facebook-comments-0cc8ff0d29654f0f83c0bf1830dddb43.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-facebook-comments-cedfa6f88d2bc9a6561954401e5a9b61.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-gallery-d80de73f9f6546e4a52cda1c1451f11a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-16fc618536c8b0d70612472b29c155c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-29abd196b81aad745cf652b3ba722e02.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-39de068f6a175124d260efb8485f212d.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-4db617a8e70c447eb683850e9e2a4ba2.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-4e867da6f1b40e5f079dbf8385eca830.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-9feb5154944f3d4b90bd9e0974af5d4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-af9dbe3dcd6f267d4b1ed941cf9ecbc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-d07dd36048efbcee10cf1bb88265d662.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-d8e9444efeb93debc442fb77c567fbad.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancy-product-designer-fccc44e164a0cbb0e0c232ae976cbb5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancybox-for-wordpress-b8e3a07576df90727675ec278a1f9eb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancybox-for-wordpress-f5917cabea5f4d2844b07d04e1880958.yaml create mode 100644 nuclei-templates/cve-less/plugins/fancyflickr-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/fantastic-content-protector-free-36f733a53254d69782057e16be93c1ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/faq-builder-ays-050ac633edcdd8103878bb1a391274ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/faq-for-woocommerce-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/faq-manager-with-structured-data-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/faq-wd-37ac09d863363372a10edf05c9e9e76f.yaml create mode 100644 nuclei-templates/cve-less/plugins/faqs-manager-45db54965982ed46b91f5576d8c56bfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/faqs-manager-7a87807daec2011fba4e64fcc9f8c9ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/faqs-manager-8cda9bfd3e2c450e7c2c0a786c763ffc.yaml create mode 100644 nuclei-templates/cve-less/plugins/far-future-expiry-header-77b48f1e08249dfc6423fc64fae31250.yaml create mode 100644 nuclei-templates/cve-less/plugins/fareharbor-64d859df68bf3f0a0838ef413ae7d21e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fareharbor-bb190962067ba33976cc3f88e434b44c.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-custom-social-share-by-codebard-67c3c53f919818b53462cf301e3b0e2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-flow-dashboard-02b84b42a8b3e6e7dc009b5046e38b5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-flow-dashboard-b95feef4ddcb37164d4f7af73136c4f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-flow-dashboard-f6258bc363d2da9cfcc2e756e12cfc0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-image-adder-de501746396265e937381399a0559403.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-search-powered-by-solr-10798c3024f1dbe228591af7cfe4af9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-search-powered-by-solr-6c441629c885cb1da3fc16e4bca4f23b.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-velocity-minify-eaab2de07f74987f7d28979a545e7860.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-wp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/fast-wp-speed-3cef17acd88883b32927f0569aa64da5.yaml create mode 100644 nuclei-templates/cve-less/plugins/fastdup-039ae8d5d3a67b23c1725f1bdffda73f.yaml create mode 100644 nuclei-templates/cve-less/plugins/fastdup-3f7e597b394edb376b06e6e36b03a12d.yaml create mode 100644 nuclei-templates/cve-less/plugins/fastly-c285ca083315515fededeb2a0a197394.yaml create mode 100644 nuclei-templates/cve-less/plugins/fat-rat-collect-c3880379f0826cf949058267ed182aec.yaml create mode 100644 nuclei-templates/cve-less/plugins/fatal-error-notify-2c794f20622aac748763bd2f16b2b33a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fatal-error-notify-e34616bfa39928844a257bee23d26881.yaml create mode 100644 nuclei-templates/cve-less/plugins/fathom-analytics-b1767ac6c4058810b3f215f7aa0668ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/fathom-analytics-cf309d1aebaaa67d40cb82a03fbd96af.yaml create mode 100644 nuclei-templates/cve-less/plugins/fattura24-0997377af0d71afd8bec87a13519fcf6.yaml create mode 100644 nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-04adb1c439e43352ed4b6cca99f5cd66.yaml create mode 100644 nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-2a790c8bfc2f91a748cff8286de5f526.yaml create mode 100644 nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-c944b74833c9d564f3c694b934416df0.yaml create mode 100644 nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-d2c74ce8c17fcc02d9a06b8743990dd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/favicon-rotator-7a9bf969e6086f1f35cf7f6bd6e6d0d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/favicon-switcher-0f224f68bb34d36af769db2549696ba9.yaml create mode 100644 nuclei-templates/cve-less/plugins/favorites-46a2cdc68c7e07f12ed856fe3a47afc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/favorites-f2c467fe9ec6884b9a3fd8b065881ed3.yaml create mode 100644 nuclei-templates/cve-less/plugins/fb-messenger-live-chat-13667cae5910c516f9b6358e59dc09f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/fbgorilla-b397f1751be329a0c2dee713557b74c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/fbpromotions-26cfa8bd44fa751562e056cb1d39d345.yaml create mode 100644 nuclei-templates/cve-less/plugins/fbsurveypro-2298bd051dab3ee548414fe72135c13f.yaml create mode 100644 nuclei-templates/cve-less/plugins/fcchat-50a85ccbd8f65581857b36c230e78a0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fd-elementor-imagebox-c24b6fa8b7a5214338fb56e211d63730.yaml create mode 100644 nuclei-templates/cve-less/plugins/feather-login-page-466b2b2c45e70711b7c7f49150c81d51.yaml create mode 100644 nuclei-templates/cve-less/plugins/feather-login-page-5f677e9c4742e755f3a729c6304d8024.yaml create mode 100644 nuclei-templates/cve-less/plugins/feather-login-page-a766deff845672c22971718a646cf246.yaml create mode 100644 nuclei-templates/cve-less/plugins/feather-login-page-a8cea4062eea92bba71d4c0d54416fa2.yaml create mode 100644 nuclei-templates/cve-less/plugins/feather-login-page-d93191ee66b814104763b1eec2af5866.yaml create mode 100644 nuclei-templates/cve-less/plugins/feature-comments-785672d467101767144e711ae7fe2d35.yaml create mode 100644 nuclei-templates/cve-less/plugins/feature-comments-80de44f32a39260a4242f01334cdbfd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-caption-b18da97ec3842241538c439eaed13219.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-from-url-229d47673c8d48ef0cc745a328967153.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-from-url-3f695144fde56e5e68c9d7f131f8380c.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-from-url-7420b38eef61601a8533cd300d3acef6.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-from-url-ec1b9ba6cd34426926dd05163ef9cdaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-from-url-f05edbcd117bd78991a113d104243207.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-pro-03f178f78e73af9717f96f4261197534.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-image-toolkit-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-images-for-rss-feeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-post-creative-947aab9c660d0a41bcf7e37fa45491b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-post-creative-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-post-creative-d494024f4c91e4cd37b950448b8c612e.yaml create mode 100644 nuclei-templates/cve-less/plugins/featured-products-first-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/featurific-for-wordpress-9bc357ece2cde706b261987c1bf85bfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-changer-2344762ab01ebc08578d7b685bed6e58.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-instagram-lite-44a3ea00d7c2ac41df4b3a6ac3cf83ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-instagram-lite-6358c61bb5cba311cb2b24aa2921d29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-gallery-5556a133daa1113e5966da5001155a19.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-193e887d8efbd63f7ee64b85c4a576a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-2476012a7e618bdb63629cf9e6f2cc39.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-274b8b119cea9c35028782c46e1417bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-59dd174ba212cc11295537a27e4487d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-60a7c7c6011ce03cafef9a29fbcdf397.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-9019681407afd47da5b4816b7ae1001d.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-9573f0bb03be4cafb0dc4630394c3c88.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-9d9f62e188b5181406f57379c674b86e.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-a23e521e782f280a44a30c5f1b1f5875.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-b04dd0f6bbdb43801b1ffc8fb55026f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-d72ce46972faf10b71efe8ec5768d82c.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-e4fb6d249b711115cf1c72af2ed8bb4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/feed-them-social-fafa2caced18a7c0c4666d573df5d9d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedback-suite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedback-suite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedbackscout-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedburner-feedsmith-95305525d7820973fed879d8dfc49664.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedfocal-033552000c57d4d0e9b8f1077c9a1953.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedlist-f30fee0809d10f803c0d4d592f397270.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedpress-generator-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/feeds-for-youtube-50baee01b43a26ee8e4d58a0c9e6da8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/feeds-for-youtube-ac43cf44566479227a4aa05f1f51c953.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedstats-de-0cb6e32bbaac252186a04f8bf825e2e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedweb-42c984330043ff937717eb97d232bbd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedweb-42f14cb098faa7900818b46106b42afa.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedweb-57aa4255793b420daa78a4aa19aedeff.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedwordpress-1790bee47ee796caaff632f15b4d5f1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedwordpress-4cd6dbf8c953f54b11c7fded30755c74.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedwordpress-6729304530e54584e7440ebda94579e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedwordpress-a5bd104322a21c6fe50fb764879c5682.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedwordpress-de2b65d20701ca8d9c4d34a5b9680868.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-49fc80b8d756a56dfe95c5a6032f1087.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-507b936e6df45800b9063c2207c957aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-566fe474170295f900e413573209c71a.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-915f28ed1e0ddfda2fff50d4304f5401.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-9e24f5f31aefd98727b13ebb0dfe3151.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-a371f0288a138d0c57e459d338c39157.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-a69ba668991cc895684ef6a2a0130022.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-dc84242672f23048124ef1d4e4b55e53.yaml create mode 100644 nuclei-templates/cve-less/plugins/feedzy-rss-feeds-e0ef3d1097adeccc2f12bfdbdbab9d9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/fg-drupal-to-wp-6124da6a0c9e2e52db4d825fb2c383a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/fg-drupal-to-wp-bb1647b449a57413306bcf1ebbfb2090.yaml create mode 100644 nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-1e37c7574b8a6b340ccf9300cdecf15e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-bb1647b449a57413306bcf1ebbfb2090.yaml create mode 100644 nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-e50a4295f2c4d9bb583975552d8db6c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-0eeffa23476d007efd123124288a7278.yaml create mode 100644 nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-39c8c0331c249c6c886fabcd8bbe5a6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-bb1647b449a57413306bcf1ebbfb2090.yaml create mode 100644 nuclei-templates/cve-less/plugins/fgallery-565b56570e9a0eaaf33a27883cc6e4ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/fgallery_plus-6d8e5755418ddfddd7f22418d88b935e.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-away-466048d1971518e0b30eb580a52cc9ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-gallery-2ff1bc044255f45b7cf3b45392cb2e17.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-gallery-9030229f25561b555ab5bd8cf6a1c26d.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-gallery-bb0f68d3ec28f4af1bec229baa1a1db9.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-manager-48a8d2f0d5a63315df776c831690e09c.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-manager-5c40de81086d557f84896e9d9e366a14.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-manager-7e2f90e6940d531b994c0538fa57bc34.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-manager-80453d1eac09488f23a96583710827a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-manager-advanced-1ced58320fa56965f50860e215f3e06d.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-manager-advanced-shortcode-07670443f68f4b9a28c2be946c910346.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-manager-bd5e0701ad8f9d787d4f03d3c90929d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/file-renaming-on-upload-ca9ee22d1cc41a724720db8fe33326bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/filebird-1298f4e0dd08f4cb0ce7e4baa39d0151.yaml create mode 100644 nuclei-templates/cve-less/plugins/filebird-16b2d22f9ed4777d1430ed12968eaafe.yaml create mode 100644 nuclei-templates/cve-less/plugins/filebird-4e2e155c281ae60022e2ed5429179c85.yaml create mode 100644 nuclei-templates/cve-less/plugins/filebird-61cc715601cb540fc69b978e74da1091.yaml create mode 100644 nuclei-templates/cve-less/plugins/filebird-7d0952eb6cd34263da0c111b4d2da259.yaml create mode 100644 nuclei-templates/cve-less/plugins/filedownload-16949f85deca6c76da36cc5d46cabd06.yaml create mode 100644 nuclei-templates/cve-less/plugins/filedownload-e3e5ad58c58ff0e4a41d1a39f9aad248.yaml create mode 100644 nuclei-templates/cve-less/plugins/filedownload-f50c03151ba977d208d9edbd82053474.yaml create mode 100644 nuclei-templates/cve-less/plugins/fileorganizer-d61a99b7dbe136f85e3e2b350556f349.yaml create mode 100644 nuclei-templates/cve-less/plugins/fileorganizer-fe85729fdce83d2abcd870326a089bf5.yaml create mode 100644 nuclei-templates/cve-less/plugins/files-download-delay-83711b9f4415eeef12b96843272e6f77.yaml create mode 100644 nuclei-templates/cve-less/plugins/filester-0fbaccf0dcc3983d2d26c8ef7aee1143.yaml create mode 100644 nuclei-templates/cve-less/plugins/filester-3a0b06a228abc56684c0fecc37877b4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/filester-a9fb42c2dd47680db83577cec894ace4.yaml create mode 100644 nuclei-templates/cve-less/plugins/fileviewer-beab7dee3648c51c868a41f9c4244298.yaml create mode 100644 nuclei-templates/cve-less/plugins/filr-protection-3978ba038f6fabf500896400bafac46f.yaml create mode 100644 nuclei-templates/cve-less/plugins/filr-protection-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/filr-protection-e71ba64e3ce13e58bab0fc3eb80546e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/filter-custom-fields-taxonomies-light-7ec734b1370cfa2c11baf0ce838e63f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/filter-custom-fields-taxonomies-light-8cd6ae2b6361cbc9077a21e229786a98.yaml create mode 100644 nuclei-templates/cve-less/plugins/filter-gallery-cf862152b16dd1f39286055ed51b17b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/filter-portfolio-gallery-aa602beb5c908376cceff63e3f2e405f.yaml create mode 100644 nuclei-templates/cve-less/plugins/filtre-de-surveillance-gouvernemental-a80892f45393695704153e2580e1d74c.yaml create mode 100644 nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-40a15a1270025c5cb430a29eea6824ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-45a46be6bf0ef23f92774359273b99be.yaml create mode 100644 nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/final-user-wp-frontend-user-profiles-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-13f75b4807aa41447c76b6287198f0e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-281ba59699e771f7b8298c529c863776.yaml create mode 100644 nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-942278840325a3151a90aba61723bd9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-b2f9a3131a92b1faa45907be05feafe5.yaml create mode 100644 nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-b7d8017025d96230e362095b35be8556.yaml create mode 100644 nuclei-templates/cve-less/plugins/finalist-65e3ebcdd517173ee2482f46a1239a5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/finalist-e0bf790da76322058f44ef1673072476.yaml create mode 100644 nuclei-templates/cve-less/plugins/find-and-replace-all-3a24a068d1ed9da16159938c4295f7f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/find-and-replace-all-951a6c1e508507cf69c6b78271828a61.yaml create mode 100644 nuclei-templates/cve-less/plugins/find-and-replace-all-ef26eea08cd48a0673b556bc7ad08135.yaml create mode 100644 nuclei-templates/cve-less/plugins/find-any-think-de57c9c6347745d9dac6d12ee00f13b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/find-duplicates-4976580f662d856b0ec790e30c784e5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/find-my-blocks-032b6d67d90bdb80edcbded91586f3c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/findeo-41837fb37d737478db2ea9f3e428404e.yaml create mode 100644 nuclei-templates/cve-less/plugins/findeo-d1bbc50d843df9b465aead854697cdc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/firestats-116359fea7fe1422fcee6d92fc7e8d15.yaml create mode 100644 nuclei-templates/cve-less/plugins/firestats-8d2b8d85e3990e663a1d1eeba9e988ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/first-graders-toolbox-7b6c4a5d491c136298d22f463e5441b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/first-order-discount-woocommerce-1249a65de4506f62402e8cab0fdcd2b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/fitness-calculators-642950df2f7522b38841579e45f2fa32.yaml create mode 100644 nuclei-templates/cve-less/plugins/fitness-calculators-99086c0a0b024a064c1e5677b2106531.yaml create mode 100644 nuclei-templates/cve-less/plugins/fitness-trainer-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/five-minute-webshop-22c242de8477403c11aa170395108645.yaml create mode 100644 nuclei-templates/cve-less/plugins/five-minute-webshop-8eccbee0dd1899147fba577f29a00bda.yaml create mode 100644 nuclei-templates/cve-less/plugins/five-star-ratings-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/fix-my-feed-rss-repair-2a21d5a31d3b98e1018a3dbbd691f093.yaml create mode 100644 nuclei-templates/cve-less/plugins/fixed-html-toolbar-39995b4a98bd80010d8be7d8f66f2d38.yaml create mode 100644 nuclei-templates/cve-less/plugins/fixedly-6698c76500688159e50581d2fa14052b.yaml create mode 100644 nuclei-templates/cve-less/plugins/fl3r-feelbox-30d0f494aa8b20416d51df052e0c844e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fl3r-feelbox-7a1fe9dbd3e35a123780e19c329830c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/fl3r-feelbox-817d9bd5ced767540dd82a3d7ff4067c.yaml create mode 100644 nuclei-templates/cve-less/plugins/flagallery-skins-ca01974b82faf04d95b2178a85b29c88.yaml create mode 100644 nuclei-templates/cve-less/plugins/flagem-ba981dbbf1ea06bbf2969e39bd0742cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/flamingo-841259aa92d69f1fd000aa64627b9b99.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-0b070c6bccd03db5dad9fdc1c059c617.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-0ba2e71f2a03b9577c68d8acb58a10a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-201957a4954f30a5d4ed40f134fba1c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-311ab6afdc9cf3bb4b0014cc35739998.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-4a78286f0fa257bf74920260dae5103f.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-5a8f9f4e46e4e9903571445b91cbd00c.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-9c64f5e45af7ae21167a588c42aec386.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-a6b7b9dbed28e3619b6105ab67bf1f0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-aeed8f75983d5d3eda35b4e52588c591.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-bf1b5f8a23a62c1a6be7914495f430b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-daf27b66517334d1a8886ba5982e7461.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-e026b5a6041ce1f13dd851a463a892ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-album-gallery-eca8e288e4dc717ec25c774372f69b42.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-photo-gallery-b3551195333886afba6c43fd173acb65.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-player-widget-fba24244e7e4f0de151661ff65df04c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/flash-video-player-e36d4622c7c94ab3537e4da3e23c5c2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/flat-preloader-18d1a7d6e453e6e958428b87d731de75.yaml create mode 100644 nuclei-templates/cve-less/plugins/flat-preloader-49a588fa69586f2484ce1bba5358bbd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/flatpm-wp-783b91bae7d265f558a1870f59bc1ef0.yaml create mode 100644 nuclei-templates/cve-less/plugins/flatpm-wp-b7ea054dad22d02b62197c8fa3fba822.yaml create mode 100644 nuclei-templates/cve-less/plugins/flattr-466a1f62f3b9e3cbc883b22ebc0c11de.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexi-8180b2e535d97180306ef769873324d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexi-quote-rotator-13464676c956740d86ef6b835803b913.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexi-quote-rotator-8041e4418d6dd5832b9d268c12d84f0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-captcha-5ba06f6e9e576d3b96edab291a35b673.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-checkout-fields-313211003f16b9f4f6fba43486ffd622.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-checkout-fields-af1c4837148181f6207e66eb6c3b9ff3.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-custom-post-type-9fb1e67eb818f983f8dbfc23b2a0c064.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-elementor-panel-7dea148c446a704ce10e41cb5e2e70c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-shipping-0a20e0340c90c0e3abffd4151b1ac5e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-shipping-cb1263fe7cf23ae55fdda5b42af76fdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-shipping-ups-6b12163f0814856a86494d984e656633.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-shipping-usps-4e5d4a35614ae6a4ee59ec1f48b231d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-shipping-usps-addd443476959ed1e0edf984e54a6c38.yaml create mode 100644 nuclei-templates/cve-less/plugins/flexible-woocommerce-checkout-field-editor-40dad92f1e274f70a2212adefbc68e38.yaml create mode 100644 nuclei-templates/cve-less/plugins/flickr-gallery-227a216c8593797eea57e8ea91304372.yaml create mode 100644 nuclei-templates/cve-less/plugins/flickr-justified-gallery-43150c91e86c385735f6eec13fd0a597.yaml create mode 100644 nuclei-templates/cve-less/plugins/flickr-justified-gallery-601901ac64242d401542d9abeeaae03f.yaml create mode 100644 nuclei-templates/cve-less/plugins/flickr-picture-backup-f8ecc349c28ee0e39936813fba025244.yaml create mode 100644 nuclei-templates/cve-less/plugins/flickr-rss-0e4fc74efc949999cf345512b761619e.yaml create mode 100644 nuclei-templates/cve-less/plugins/flickr-rss-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml create mode 100644 nuclei-templates/cve-less/plugins/flickr-rss-4f5e1d138ae43eaa500111874f55d52e.yaml create mode 100644 nuclei-templates/cve-less/plugins/flickr-rss-ab05255cd8fd175d06143e7aa3177450.yaml create mode 100644 nuclei-templates/cve-less/plugins/flight-search-widget-blocks-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/flightlog-019716f1cdfed62fc1f8666dedb59747.yaml create mode 100644 nuclei-templates/cve-less/plugins/flipbook-0aa04e52bba38f5b04642c8395b8c974.yaml create mode 100644 nuclei-templates/cve-less/plugins/flo-forms-31993563048effdc0827881e9344d84c.yaml create mode 100644 nuclei-templates/cve-less/plugins/flo-forms-bbbaa8f4798af45f432fee689b1a5feb.yaml create mode 100644 nuclei-templates/cve-less/plugins/flo-forms-ec6ef7f01d456e74c1ef5bcee54d14d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/flo-launch-9447e0c2ffa1a53245e3f3fb0bac226a.yaml create mode 100644 nuclei-templates/cve-less/plugins/float-menu-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/float-menu-5fb9bec95a707650ef979fd037b97227.yaml create mode 100644 nuclei-templates/cve-less/plugins/float-menu-c5eebb4553286e34a5dfcc1fcfb216a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/float-menu-cfe127cd973bbf2d8609c8c59c7606df.yaml create mode 100644 nuclei-templates/cve-less/plugins/float-to-top-button-402db9fc1f91d6a610e9186418e3f339.yaml create mode 100644 nuclei-templates/cve-less/plugins/float-to-top-button-974e55fea877636d350ce5211a9f2278.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-action-button-54e58fd9cb8b4f0c4759deb7ef963895.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-action-button-9d446cc2ded70f849208be8a7ce22b70.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-action-button-b9b78bba7eb30618f125288c162ade39.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-button-ef334e622eec391697c0d5a0070dc0e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-div-f7eaf9b938a6df4b39be6616b2432caf.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-social-bar-6a69a2fa108e4cf956a3388af5834004.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-social-bar-6f67eba72e7035f4406a73d70218218a.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-social-media-icon-3b1c84fb06bbfd928bb6bd8a2dc656bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-social-media-links-19cad25687c6e57a8844f7bbbe3532db.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-social-media-links-fabad8f9edf3a10c2fd048960f486a0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-tweets-0d30322e95e68bf61a096904e3379311.yaml create mode 100644 nuclei-templates/cve-less/plugins/floating-tweets-1e72c31c8795449e9c06e927fb97a2d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/flog-59446fd68b7784d882498e25f909137d.yaml create mode 100644 nuclei-templates/cve-less/plugins/flow-flow-social-streams-765a9fd486d65b41296bb2e40f26d4d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/flower-delivery-by-florist-one-4d590f8cfc3cb04affd33a6ac18e5217.yaml create mode 100644 nuclei-templates/cve-less/plugins/flowfact-wp-connector-a645bae2135580862fc251332e7ccf27.yaml create mode 100644 nuclei-templates/cve-less/plugins/flowpaper-lite-pdf-flipbook-652d56be5b505867587dc16b9cc45713.yaml create mode 100644 nuclei-templates/cve-less/plugins/flowpaper-lite-pdf-flipbook-d7435fb5e236cc613a20b63eff30b011.yaml create mode 100644 nuclei-templates/cve-less/plugins/flowplayer6-video-player-91cbfc58418f178a67da5f57d5fe8aa8.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluent-crm-2021aef7227818f1c21db36c31bdbd79.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluent-crm-bb26b6ff3e85d19e956ebfa35e2cc95c.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluent-security-09c9894def0e25d05735b59cb11535d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluent-smtp-a0c235af0e0f30fc06e113ce304c9fbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluent-smtp-b77eedd011caf310b24c6086fb4f9f02.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluent-smtp-e7db547069bdcddc296155dd435cd330.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluent-support-239bba6a118f3c2dcf8340e2790b882b.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluent-support-da98de7f074ffd80f7cb587c569cdd12.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluentform-31bfcad1a946ead477cc4d9cae0f33ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluentform-4e36da2b6076ab0fa4395c3975079942.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluentform-7505baf43f2a97f13623d8a9e01f067a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluentform-768d5a8c5da389ebb9689ad662d253aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluentform-875a676a20644f9b257dd61453cbe7b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluentform-a7309b89079395b33b2cb7915ba03d32.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluentform-f587eb392e2056a4aa7f3a9cfdb47c3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluentforms-pdf-150204c3648be383cc7b37e155a5d6bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluid-accessible-ui-options-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluid-checkout-b225e6cc75e518b2d58ee3c68b1bcc48.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-656ffc00f499b97cc92334beba62fc4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-bd607ad7864f2c8f03d9043c5fbd64bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-d0db0236c8bb93bbd9849f985e9c57df.yaml create mode 100644 nuclei-templates/cve-less/plugins/flv-embed-797a8ec8d14a7095c1401c88381f0455.yaml create mode 100644 nuclei-templates/cve-less/plugins/flying-press-473a1cc0b0ec6c93a83a85cc6eeee218.yaml create mode 100644 nuclei-templates/cve-less/plugins/flynsarmy-iframe-shortcode-60b8d6d9997cb1264cf24cce0caa381a.yaml create mode 100644 nuclei-templates/cve-less/plugins/flyzoo-b142fb65f777c01f09af0b6a529becd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/fma-additional-registration-attributes-f0a4fb1ab5ad45a43505bfb864975940.yaml create mode 100644 nuclei-templates/cve-less/plugins/fma-products-tabs-pro-c2b59c8389d71cf87b7fb1296201832f.yaml create mode 100644 nuclei-templates/cve-less/plugins/fmoblog-572454d38450937113117ff602a4e326.yaml create mode 100644 nuclei-templates/cve-less/plugins/focus-on-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/folders-0a3b78fadad1468caa114f49c5837f3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/folders-346a08b5e01ce0a0fe29178ae41386f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/folders-aa05d3117d6e609391e83e8b970f2625.yaml create mode 100644 nuclei-templates/cve-less/plugins/foliopress-wysiwyg-6d24ca924659d60813d0c9beab91c29b.yaml create mode 100644 nuclei-templates/cve-less/plugins/foliopress-wysiwyg-93eb8e1633c7ed38fbc4ff339a075742.yaml create mode 100644 nuclei-templates/cve-less/plugins/follow-me-de62fa1091876ce7733352db2cec2f12.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-awesome-4-menus-335b776cd554e8913d4f10e98e262ec0.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-awesome-4-menus-bb75a2fa99f691c300cd6cf18948e14d.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-awesome-7115ada113c9b929bcb0dd07d0bf9d4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-awesome-84fec46332999a5ca815e7af241174bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-awesome-integration-238d49dd6e9480e47ebe9505e3055120.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-awesome-more-icons-a57182d433f774a0b7467b555b805817.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-d9e88eed1e0b07c2c560dc1223a88aca.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-farsi-bbb0e39e4c65975737c298f09a794bf6.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-organizer-92b1dcacf113aa7d72bfd995bd3a58b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/font-uploader-272e6d95680eac64b1944ce8c40ac5b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/fontific-7524f5b14f92599cfeabd0dc20123b14.yaml create mode 100644 nuclei-templates/cve-less/plugins/fontiran-64d4e8ad6ebfa8f809457010fe938c57.yaml create mode 100644 nuclei-templates/cve-less/plugins/fontiran-aeb0a88f1527e615e946ee4307c56d67.yaml create mode 100644 nuclei-templates/cve-less/plugins/fontiran-ed8d60dbc212a2488ceb5fdf43131cd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/fontmeister-315cb3873f38dcb4432456cd1e63a724.yaml create mode 100644 nuclei-templates/cve-less/plugins/fontsampler-a0f4536ea7bd1323c1b7b95c9e4b018e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fontsy-f11e331f492b99109760c26e69316ddd.yaml create mode 100644 nuclei-templates/cve-less/plugins/foobar-notifications-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/foobox-image-lightbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/foobox-image-lightbox-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/food-and-drink-menu-414dd30601a3a8e396da28322c360c9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/food-and-drink-menu-428e92a2be0374fb9f50d3efefc780e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/food-and-drink-menu-58e8eb6b48043724a61dbfbade728e2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/food-and-drink-menu-7a6e12751a5fafd18d6d56977b5ab766.yaml create mode 100644 nuclei-templates/cve-less/plugins/food-store-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/food-store-bb49a04965cd07c7ab0e642d989a68a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-21a95839a8ab979ff0016f6fbedc5a1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-2c9cfaa1b4268406a1d78df84c0cb895.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-3ced01544afaf258ab773262adacbb46.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-7acb842ebb36fed3d48b7a27908aad70.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-84b774dce1ed446fe61865bc9717d231.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-a94721f1db6a21d7268903bae3160d03.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-b1493cf8f77a9e357e523e1844c8f281.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-c4af1e64fbcb95f3b91e16ac0f449bf5.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-d1db79cb95565d6ad4b74843ef9d4999.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-ea2db66e943b1038a7ee25bf53b0dcc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/foogallery-premium-a94721f1db6a21d7268903bae3160d03.yaml create mode 100644 nuclei-templates/cve-less/plugins/football-live-scores-2d57f425ae40c364bab73a19021c28f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/football-pool-749aff0fcc167e558bca750035ba1596.yaml create mode 100644 nuclei-templates/cve-less/plugins/football-pool-924ca2bb4d17021fd01ade1e50b5f40f.yaml create mode 100644 nuclei-templates/cve-less/plugins/footer-putter-947ad0b5d0e7c6896eb25c5ba15abe34.yaml create mode 100644 nuclei-templates/cve-less/plugins/footer-text-51f5cc0d0e28df647c1c9e27826141db.yaml create mode 100644 nuclei-templates/cve-less/plugins/for-the-visually-impaired-1288b290469ac9f6682339ae7faeb1d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/force-first-last-9e22e51baaf99f342eddf6b6b8fb87ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/force-sell-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/forcefield-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/forget-about-shortcode-buttons-53da943f73d7c6e6cd21ccb312450cb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/forget-about-shortcode-buttons-bb70f2562e10a695ac872c839d1985e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-block-3972eede365a3539d1345b6e32b15ffa.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-forms-96b39b472ca8eccbec11e47f253c80b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-lightbox-df96a9df0511094bf94be89ac1740d20.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-0e2b9d12590d3c7b14c8e22b3d6f6056.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-2420cc8c52f0171d8c5b49b0e53cd69a.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-3a5958dc81689a4069c9b57ecbde177c.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-51b281937ca7291e3b4a94f5ec043e64.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-54830c75db088a14f125745f43fdb1f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-5ab78d017180c321a2a306a692c78211.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-844eff1dfca0f37b0344bfc8951dcee9.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-9efd1cc18514c55bcfc7bb0b901e8474.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-b107934a8aab930d1fab2cf0f27d13f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-b584bc3add37b438ea9f7d52a53c499d.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-bac514b6f0b1f8c0997d58523192fc7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-bc7687f3a38eb76862d41bf156e272e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-c060cdd161613c35be3451870d488386.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-c4e27cd6ca86640ba05f8d3c2423655f.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-e23a8ff0f941885439bb6eaa6879d8d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-f99ce34ee4393dd151b2436ea69250e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-maker-fd28c2a8a8ece88ce28c75cf84e47383.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-to-chat-08841c16939c6ce6bfc6679725ea1281.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-vibes-b7888b843ebf167b77c4d303a6db54de.yaml create mode 100644 nuclei-templates/cve-less/plugins/form-vibes-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/formassembly-web-forms-14ef39181771488f76a78ebc7f182128.yaml create mode 100644 nuclei-templates/cve-less/plugins/formassembly-web-forms-40b17fbc397976bb918c3ad479c78a68.yaml create mode 100644 nuclei-templates/cve-less/plugins/formassembly-web-forms-a6ec47cf9956948a6246629d44179127.yaml create mode 100644 nuclei-templates/cve-less/plugins/formassembly-web-forms-d46aeb2acb3fb066be1f4ef24cb7b7ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/formbuilder-15f3ff2fd895a09890b1601370ff17ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/formbuilder-681334888d5905413f6f1159a30d2417.yaml create mode 100644 nuclei-templates/cve-less/plugins/formbuilder-860302baac60a4494cef29bab34e785b.yaml create mode 100644 nuclei-templates/cve-less/plugins/formbuilder-a6e4580408df1cc0fd425db3d3f61102.yaml create mode 100644 nuclei-templates/cve-less/plugins/formbuilder-e6475f7f5f871801f1bd4ec02d738d77.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-b8e20e75d15dbb751b7fb081ab7cf785.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-fd631c53e7ca7d0431606810665ee5df.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-02ff6e8f4c50ebc35c46ebd6a0282258.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-0793f0361460e084aa156d291ce75eb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-27f44594eb9e99ef9e1059fc3d01b99d.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-527f36f790da1a74645e814e4fe52934.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-8ab11785066028af40a069df806e2ad0.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-98163a520e2e6ad1b536bf4759e7aff4.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-d35055f56360f454d611ea478b5c8142.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft-form-builder-e2849c772d6e6f64d56860e36e54564f.yaml create mode 100644 nuclei-templates/cve-less/plugins/formcraft3-633d0b293826c4a61b61e1d3210e0346.yaml create mode 100644 nuclei-templates/cve-less/plugins/formfacade-240756f87690e8bd859858034bc8c975.yaml create mode 100644 nuclei-templates/cve-less/plugins/formforall-76bb7b1a62378179c2a3a748f3a4ef7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/formget-contact-form-2abba35343647b8a829e092f6dec80ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/formget-contact-form-d7ca1dd38546745c43c763574d903819.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-03587c706609d69bad10e8dac47e2f3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-08ccf69c17927ada744879c1923c390b.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-15c563e3f7d22cf323cc481f61b9eb8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-437b9be662132aed2b43b674efcda98c.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-46dd5dfacc34a4878325b7ee6f68202a.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-50b07daf945144cbfd99133630410da2.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-586f376968c226db0dcaf5061868b9ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-5ec297ac46cc1d40266a5ad0daa61699.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-5f864ea73d67dbc167ed3ae723a536cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-6c309d4fe4a7c00ec9f13abe6fdd70cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-75cfe0d86b035fdf1639773082de267a.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-77ecffd079fc8a0b13b180178795f1cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-961c6f8ac9568871bace8745083a3696.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-987b044c3bb6f7d497d7cc053aa32728.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-a29260605777cb6f82b580e66c46fcb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-aed9f1a9cf9e76b014fa4ceef2236366.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-b198b20134bc1a80b2134b7e32b1d9f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-f8715414342ae577e0f9a96507f17db4.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-registration-96ed0838fd20f84264d3c063e2ba926e.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidable-sms-167d9672411be44feb72a5175fd0987c.yaml create mode 100644 nuclei-templates/cve-less/plugins/formidablepro-2-pdf-f2bfced9bfd91f1f83f4f10d9e2a4e2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/formilla-chat-and-marketing-b49deb95fc00559c0721d2c968358861.yaml create mode 100644 nuclei-templates/cve-less/plugins/formilla-edge-ecf9407059e3582708411befde00831c.yaml create mode 100644 nuclei-templates/cve-less/plugins/formilla-live-chat-309fdaa44a67ee8c05b1363fafbc2e7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-0b29757be7c9544b9f5309f3b1be1e0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-183d4dac6eb372129600913c83567fc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-1c0b534ade0c088d820f904818d49367.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-26f35acb3c0f14eb0fe591953d190a10.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-286f623357d476ca932bc8210895d763.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-292cb08d9cd5bb1cf7550652732f7a0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-42f191921072c4fed5defc1af6bdccae.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-64248c162e0a07dde805cd870763a3a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-7753a7f9705bcf7c075ba8ba61f788d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-7ff8aa4516f6800dd9ef07a8f731d28e.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-8893a21ace79666845ab488b8953c970.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-950d0fecfa65a978eebec0d58fd1e9bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-956616cf620f8b1a830cdf6f68014a5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-a6cb8bb474a298f0d13061a17830eac9.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-bc2f6ff7db9bb1af0cb3049e6fc69b8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-bd19f19c61a0ea2da7f41821ae297426.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-e8992ee7cc3a04876d739dcede33aada.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-ee384374dcb64224451204e7db1b00fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/forminator-f4febcd0f8092108616f41cc252ca605.yaml create mode 100644 nuclei-templates/cve-less/plugins/forms-ada-form-builder-95a617be3572708cabf012c967fad83d.yaml create mode 100644 nuclei-templates/cve-less/plugins/forms-by-made-it-12ca01b6bd94ae75bcfa758e16b20678.yaml create mode 100644 nuclei-templates/cve-less/plugins/forms-for-campaign-monitor-d0f30576bf7c027192f1b193ba41eddc.yaml create mode 100644 nuclei-templates/cve-less/plugins/forms-gutenberg-41cad88ff79d9f1a300cb623d000ffea.yaml create mode 100644 nuclei-templates/cve-less/plugins/forms-to-zapier-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/forms-to-zapier-fdb7464284f0e3f92d05bc404992df2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/formsite-064670bf29900df44464bedf16a7db27.yaml create mode 100644 nuclei-templates/cve-less/plugins/formzu-wp-69291e6d8dee217b57f3dde758dcad0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/formzu-wp-f48987de7fcf2018d5328a03cdd21065.yaml create mode 100644 nuclei-templates/cve-less/plugins/forum-server-0856197f54ebc4b1a325747e3d0ab80c.yaml create mode 100644 nuclei-templates/cve-less/plugins/forum-server-399de5e730909b7373d74d984520d5d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/forum-server-8cba549bfba1e71b314fc0d37ea95e7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/forum-server-a4cdd9300b8e89d6cefce68027bae177.yaml create mode 100644 nuclei-templates/cve-less/plugins/forym-befc35f26a9ced6d8b2225ecf15d9b2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fossura-tag-miner-18c927eeaab747daf8dbc085388c3619.yaml create mode 100644 nuclei-templates/cve-less/plugins/fossura-tag-miner-b1f4f06fa1d08e23be33495079a7bf7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fotobook-7418be2024d99eec31c5374180cc36ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/fotomoto-8e8e8d42c36c4d2147a0654eb00c12ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/foursquare-checkins-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml create mode 100644 nuclei-templates/cve-less/plugins/foxypress-05da59639245e73e5006b3b27fd29b5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/foxypress-1ea57d4028638a993e3a1865c1c429fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/foxypress-28cc3b436a054be9278bf9f654cf7298.yaml create mode 100644 nuclei-templates/cve-less/plugins/foxypress-4392c790af392965f4ef8691acb00317.yaml create mode 100644 nuclei-templates/cve-less/plugins/foxypress-7b0b2b71a9f90e73601e91cbead48f87.yaml create mode 100644 nuclei-templates/cve-less/plugins/foxypress-7ca06934a2b333b70b714ef75d613d92.yaml create mode 100644 nuclei-templates/cve-less/plugins/foxyshop-3853fc9827dc572851bdba569b2c07ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/foxyshop-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/foyer-b150ed41da888a826e21d66b48bee30f.yaml create mode 100644 nuclei-templates/cve-less/plugins/free-comments-for-wordpress-vuukle-bc5c2979003bab8e2b8da8b35bec03cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/free-counter-5e704515f93be9a32478b5bfd42a6016.yaml create mode 100644 nuclei-templates/cve-less/plugins/free-event-banner-47d3ad7250426f9e950984c71ba1d1f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/free-facebook-reviews-and-recommendations-widgets-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/free-google-fonts-e969b7015915e405c8b6916d239e090c.yaml create mode 100644 nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-2199233b48f19d9d270781cada038885.yaml create mode 100644 nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-47ea4a03f1b0e77aad4910db22ee3336.yaml create mode 100644 nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-5b689436673a442f720046bb44c5bd16.yaml create mode 100644 nuclei-templates/cve-less/plugins/freemage-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/freemind-wp-browser-76c5ff841d2dc96506f10e16c9ef0103.yaml create mode 100644 nuclei-templates/cve-less/plugins/freesoul-deactivate-plugins-1cfbdd673750e91f71ee06cc181559e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/freesoul-deactivate-plugins-5097af34e8087d4348de3729aa8f3d5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/fresh-page-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/freshdesk-support-1d392651d303b5509be666b562dfa310.yaml create mode 100644 nuclei-templates/cve-less/plugins/freshdesk-support-7b87f2683ffda077fe6e0a14f3353b96.yaml create mode 100644 nuclei-templates/cve-less/plugins/freshdesk-support-7c89a34e4a8d83c3780278094a4e89a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/freshmail-integration-df35942c96b3dddb6612a4cd575a5663.yaml create mode 100644 nuclei-templates/cve-less/plugins/freshmail-integration-fc5d9e94a9531f198a2342d8d3133a1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/freshmail-newsletter-65920cbefe2613a05348e64d8746a7b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/freshmail-newsletter-f59240064f03e8205e770b15917de7bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/friechat-d27688edaecd2e6ea6e4e18925595027.yaml create mode 100644 nuclei-templates/cve-less/plugins/friends-5ca6e072da0718d54bf45a16b11714b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-editor-442cb89e3902ba64d65dffe5c1dfe1c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-editor-61e60e72ae19f21a2374d506ca4c56c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-editor-6d00e8bb2297cf89cd61e97ee33f9584.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-editor-daaaa272b2f5cd2cb1ddbf8cf5560d23.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-end-editor-eff7f0485f433e2b60a3d36ae5c865fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-end-only-users-64fa318eea101296cd3a97fbe96ebb75.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-end-only-users-9934720aa2c12ee56875eafe6d4b5c05.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-end-only-users-b32372bcfcf7108428ee834bd234fb8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-end-pm-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-end-pm-d25fbd06f353d86f93a0e72e7cf70e64.yaml create mode 100644 nuclei-templates/cve-less/plugins/front-end-upload-457418759b22f908312742a3d8bc5f67.yaml create mode 100644 nuclei-templates/cve-less/plugins/frontend-admin-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/frontend-dashboard-ab5a35988c81716c4246b4eebac9618b.yaml create mode 100644 nuclei-templates/cve-less/plugins/frontend-dashboard-d5fd81597164f2848144dc46b48d8bc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/frontend-group-restriction-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/frontend-uploader-5804085185dabeb708155bde523d6d27.yaml create mode 100644 nuclei-templates/cve-less/plugins/frontend-uploader-968d2b25d7330f5b3338dbe58174f4a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/frontier-post-2bc2ba180bc24d4dc3efaf03022e4d70.yaml create mode 100644 nuclei-templates/cve-less/plugins/frontpage-manager-ec922857042222c2b2c5391db25ce37a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fs-license-manager-28e4059a1c8041c52ed2e0e28f51c1c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/fs-real-estate-plugin-be1a1ff24188695237f37e3ff16d42cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/fs-shopping-cart-41d0ef3672db9c552872805c429ef89f.yaml create mode 100644 nuclei-templates/cve-less/plugins/fscf-sms-167d9672411be44feb72a5175fd0987c.yaml create mode 100644 nuclei-templates/cve-less/plugins/fsflex-local-fonts-4ccd73756d3ff800ac0459f5347027d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ftp-access-3fbce7126258b6f86e3d8d39cbcb69cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/fudousan-plugin-65a4435f7b10b8d8206ed3ab27dff439.yaml create mode 100644 nuclei-templates/cve-less/plugins/full-customer-1e47a59c0ad1f7f985e2120ccff4f8d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/full-customer-cb4a0a7493c7105139c64a6aefea1dd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/full-page-blog-designer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/full-site-editing-405731b58f15425302771df60a27b5be.yaml create mode 100644 nuclei-templates/cve-less/plugins/full-width-responsive-slider-wp-c94b94b1075a77552263f3a72928ed0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/fullscreen-galleria-5800bdb88427729dfe9beda3923c95e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/fulltext-search-b0298fb4feee8bd9ed9da9efccd4ef90.yaml create mode 100644 nuclei-templates/cve-less/plugins/fullworks-anti-spam-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/funcaptcha-7c2f84ceedf786d66412b2ddd9745e29.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnel-builder-156cbee34f493f34443d5f3b942f355c.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-1389f4413b4c34ddc59ef4e67e6f0a3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-1d54b8b23176b36e6deb663d5a8ceaf5.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-21adcc5933f66f0dc2a717df7e950d3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-51b13423fa98551af760a9195cddd0e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-5627877412d66448db75b857038f84e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-706745fef06bc5b6b3083d2b8e19d2e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-7e168d2cbd20b0d5ec60c962781efa94.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-8cbb632e23e9fd1207c7a31fa3fa33cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-a0259835bb015f0f8ae0efa060f9f185.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-e1ad7ec25f4d848d78b5d1ca911d7ff1.yaml create mode 100644 nuclei-templates/cve-less/plugins/funnelforms-free-e27d960770a662cb31ee7005dde8fb3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/furikake-2513be2180efb8a9d99cb3b019874a28.yaml create mode 100644 nuclei-templates/cve-less/plugins/furnob-core-0e249eccad21574e2f41d6b727c12756.yaml create mode 100644 nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/fusion-builder-5a8b95e9d623c8f7e9c70ff9c8a761a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/fusion-builder-b40b112aba812047c066895073435f9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/fusion-builder-b63d60bf3f2f663ff16710a1b09d1b70.yaml create mode 100644 nuclei-templates/cve-less/plugins/fusion-builder-c1980d476739c222c7099c91e363860a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fusion-builder-d882958bab372a69d811837406b3986e.yaml create mode 100644 nuclei-templates/cve-less/plugins/fusion-engage-b1b7cfcecf2de0389a1fca46f626041b.yaml create mode 100644 nuclei-templates/cve-less/plugins/fusionspan-impexium-single-sign-on-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/futurio-extra-12800057837655525254001463af7107.yaml create mode 100644 nuclei-templates/cve-less/plugins/futurio-extra-3fb7396e595eda0e4c64d906babd7ea9.yaml create mode 100644 nuclei-templates/cve-less/plugins/futurio-extra-d4fcc9d0c55735e1818ea178387ac0a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/futurio-extra-fbe0be2fd36d543628c64e13771b878d.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-21b5e2cc1773e8a375d4b06283f1f75c.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-2bb90ae2c9eb7a663eb0156580d59a88.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-2bd4aedc10e6362f1d46031adf65b2b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-31f01989f88bd51c1337d3cf6dfb5acb.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-351dfe17aa9c41d161fbfba3138330fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-3af842e4b028602d05da06af8493bf21.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-4ec113a2f6c7cc34cbdb0b48aa39a566.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-4f8b60559007de9693d6bd6dbd7b9937.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-61c688c55eb7ee42da571c3fb1a2e6d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-730bcdecc23fd71d57d0ec1ba0d53342.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-768117af17895fd2573e769996b5a89f.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-8269712f8aa3f2f54a5b3b611a3288b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-86d0c991bc6dd85c8051863807fe1299.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-8e904d0aa5c673b4683d6e95c3e351f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-9a7b3a67156b47fe25586e8e0cb89d8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-b90e27dda3a054f2561634700611d64f.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-b964392d781e5af12807956a1b25e48d.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-bb35779f0545e4fee400784885c47aca.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-bcc5b5d302cff6b12bb3e0ee2db5fa04.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-cf91d34b3b4f074c5504390aafe5f2f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-d173f6ac48d7132b733f53a51a70ac65.yaml create mode 100644 nuclei-templates/cve-less/plugins/fx-private-site-34e9fd3c5efdc1de6fe7fe47accd8e24.yaml create mode 100644 nuclei-templates/cve-less/plugins/fx-toc-14de97dccf48252d3b3ac5a2e5d0250f.yaml create mode 100644 nuclei-templates/cve-less/plugins/g-auto-hyperlink-7e1dd5ec2f3ce921814a97005e4bdef0.yaml create mode 100644 nuclei-templates/cve-less/plugins/g-business-reviews-rating-1ad67757b830dbb081c0f3324889f2b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/g-lock-double-opt-in-manager-9f4658b745b189d37014521dd6a95fe4.yaml create mode 100644 nuclei-templates/cve-less/plugins/g-web-shop-2ae1fc13f687fb015528a3ff66e09125.yaml create mode 100644 nuclei-templates/cve-less/plugins/ga-backend-tracking-779d1e87dc368b31bfafa7f1aaae4f82.yaml create mode 100644 nuclei-templates/cve-less/plugins/ga-for-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ga-universal-f581daf73a2ae47926782b6731f30bca.yaml create mode 100644 nuclei-templates/cve-less/plugins/galleria-0e933dc304f8275920849e5d36373b4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-album-0430b26f7f80d13db884ab9b0a5b4920.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-album-09c2db1952a267095a68cf64b0164363.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-album-1aaed1324faa189ffbfd4d07f45be185.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-album-63a9e6e007af9bec52f4b9f80d04c841.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-album-63e26d4ba1974966e333b4b151a2c5df.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-album-c181e74f647f3ed52bab481a97159011.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-album-d39f34ed184a71d23a5de1e368d430bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-album-f65c67e968e15596bef3448601bb7b39.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-bank-12287cbd7ce878e9fd3267a0e01cf78a.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-bank-26bba1e52907934fbc2f76bbe8677ffb.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-bank-3d1b14fe6d8db25f44038aa7941ff8ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-bank-4ba873ea604974c0a71c72511e63ccc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-bank-b559946f964d6a635744aa2ff8d7bc1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-bank-b975729e6f64f7e39a41858a9d4457f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-bank-bb9ff775c7105fbb3a95361f39741664.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-box-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-box-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-box-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-by-supsystic-2f3164fe48781902f2ffb82e4c682a7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-by-supsystic-3eb246a84ff094c4b5dad08106b186b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-by-supsystic-a442b3cb4140cc0565b34b0085780b5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-categories-86cf39a9caff1b0d57622ce3a08c77ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-factory-lite-9266ca4886b0c646b2489433a5137061.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-from-files-5888c8dd3a2fb05785315dbed1e6a3d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-from-files-edf0c0f62c894ee6b53dbdcb9d2b787f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-image-gallery-photo-c27095e826fc99d4e3ff59487183eb49.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-0ea6dc2d83fc938ad05b8877c6963a76.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-1b866013a286b8267be128b4354cf380.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-7029424562dcabc51ba988c294ceda39.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-96e3c207dd79a77d8603f9b27ced710c.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-ape-04b351a32ea4d9e14665cfe5ee1edb27.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-ape-8f53c25a7439725994fa29007a578b4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-ape-8f81c40c56a58242ce344610c4f30138.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-ape-e82a3788d5ee1ba0ec33b3e0db2276c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-b0c335beb11203f2fde885332ec9ff70.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-c8299f7372dc1e4660eef2d2e7182331.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-images-e236a1e5d3fb64e88e0ebd90fb6e2c1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-metabox-24e92d0b5bd4d59ca9bd929ad9b17b1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-metabox-9aa66e8181d06c3879c9f7626061f74d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-metabox-b4794af8b89126f30163809c87b8527e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-objects-94bac6252ee86efbe8c51ab00926a8e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-photo-gallery-12173e4cbd316d08ac752e946b4c8207.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-photo-gallery-2e53d704a68a2528570d9bc04622f7a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-photo-gallery-75a867eaf135888f5843d1ae423e6546.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-photo-gallery-a359586a63676f31e06ba6a30e86f44d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-photo-gallery-a43fcf2bf2b295c7f15edda834277892.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-photo-gallery-b15f1d58fa6bd5d27fb5b07cf543a238.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-photo-gallery-e682fc7edfbf166bd5ea5731aa2a90ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-plugin-123e18f5d341b41bb59091344f2c4c88.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-plugin-3c52a879e5c7f6b209aeea9f28acf059.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-plugin-5fd70893ee93b2581f3496673936c180.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-plugin-db5c08fdc8b62ebeda31a66adc0254db.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-portfolio-e03fc6f95e1cd7a63c181eae0df5daef.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-portfolio-eea2926eb15d95f90b3df3b2873dbe1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-video-4499af25b68b47ad188a0b7fb55c9dba.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-video-f4a5dffea18f1f7d8c2a38499c203636.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-videos-724aa916d7f99f934199d401cd079892.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-videos-c6bd3ba187d60fb65a038a39af19f9cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-videos-ff831311ec70debdd240fd0dff910b29.yaml create mode 100644 nuclei-templates/cve-less/plugins/gallery-with-thumbnail-slider-1a1fe1dc5dd307bb721b18dad6e53951.yaml create mode 100644 nuclei-templates/cve-less/plugins/game-server-status-4860564c39627d424628b36fd20f6fbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/game-tabs-50466a7332e4b48f14aef77f62be1c1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamepress-5807ecea1e37da73a8c0fe20adcb6628.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-2b733e03ac956657b279c0c2e7178248.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-492436f7297ddc822ae54e1a5df2c7c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-a3e63c6c1c70f9733ff90ef830f2ba25.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-aec7b68517be6133995e008e368392d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-b5027c0ff3d1a1043ee2d2b4a208d677.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-button-778205eb09884149dafbca785f8423fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-button-c617abebc11fcaba875f8bc2aad4995e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-d1724e13d2fdf6a25faad25727547d93.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-dcab95fd687427a84724b3b04c96af59.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-de9f8e0363804898afa8fe7d0b301fdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-vimeo-integration-164be8fbabac441285f1a369205bd8e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/gamipress-youtube-integration-808442071b530e99e27528108f7402f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/gantry-5e536ce02840d623d389b9ee218020ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/gappointments-3337ca8e284defa05fd45bda9b3ec176.yaml create mode 100644 nuclei-templates/cve-less/plugins/gappointments-fdce74da2fc29d9a1b7b66e598acdde8.yaml create mode 100644 nuclei-templates/cve-less/plugins/garagesale-a274fd2664073f0162156778e8dac986.yaml create mode 100644 nuclei-templates/cve-less/plugins/garden-gnome-package-597aa63a54783e43984bca6c0a5bda16.yaml create mode 100644 nuclei-templates/cve-less/plugins/garees-flickr-feed-00a6e702537059b82f7d21b3c6087796.yaml create mode 100644 nuclei-templates/cve-less/plugins/gb-gallery-slideshow-5951232c0f20a63b311a79c589b973af.yaml create mode 100644 nuclei-templates/cve-less/plugins/gbteamstats-41dad8547a4dae3a9d56539c297d8d0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/gc-testimonials-673bbf1cbb44b5f720028f2010c7e907.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-bbpress-attachments-16c5aaa4049ec9cf0dce63beccb79a30.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-bbpress-attachments-6edbfbf441adea692ef285720c58a9cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-bbpress-attachments-b5416cf2ccfb117fc0f1b193a5863e11.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-bbpress-attachments-fd5091b9ca6d56c1bb46823f06a6b82d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-mail-queue-859e2f1c3d7c5202926f95b0d25e1db8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-mylist-8ac9cdbd4cf7676c20528abcd5d7ef87.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-034ab84e882013699ca86030c39bb7c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-202b289fdef0d266d30f1e52a074682a.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-363e85a87b5e31a1dda22e9466545bd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-4aea8831d45ac7f2974ea4162d22b445.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-567c0bab82561630aea9403749f896f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-651523e243c6fa14f5b8ba27b9c0bb50.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-79116f6e6f3436dd311270ae51db9449.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-96454af8a6ce5f0b120ae58c0cde8af3.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-d24dbe0a4be4e84f6cf2d04eb17d95aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-rating-system-f7fd1a8bc5d53786fd5110511a3a1b47.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-security-headers-626d7835b20c4c891b207d32709f9d9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-security-headers-c051ed74380d85e155152ed23876ff43.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-star-rating-0b148460306247418981fb91f92502a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-star-rating-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-star-rating-df4cd9fee3d0d59fcdf3318f36c11feb.yaml create mode 100644 nuclei-templates/cve-less/plugins/gd-star-rating-ff4f16d3b72060599b9ed34018f0f5e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdeslon-affiliate-shop-d3c451e9553be70e313576f0e6fdb8a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-compliance-52a132f231403e0d19dffecc858bc7bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-compliance-by-supsystic-d52f1aa2c59f42390d8192c949633ea4.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-compliance-cookie-consent-f512a45803d4900b6bd2ce597a679e7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-cookie-compliance-42ff6519960f311906ae3110cd3f6c64.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-cookie-compliance-ebc9a2de114d9ab75adedbcfdade473e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-cookie-consent-6fafcaccee81c5d3208247d34dd3565c.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-cookie-consent-74ceb3dd0e91d385e16d6cd94c463dea.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-cookie-consent-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gdpr-data-request-form-aafc1366408bf54fb9b81d829a07db37.yaml create mode 100644 nuclei-templates/cve-less/plugins/gecka-terms-thumbnails-3ddf708feedcea3e47167b185d508195.yaml create mode 100644 nuclei-templates/cve-less/plugins/genealogical-tree-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/generate-child-theme-14f53d257d97b80a7d3d574dcba76821.yaml create mode 100644 nuclei-templates/cve-less/plugins/generate-child-theme-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/generate-dummy-posts-177a143182cd744b54e19a39a4cfbfd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/generate-pdf-using-contact-form-7-213c6c67e9f7d7367e5fa5ff895afa34.yaml create mode 100644 nuclei-templates/cve-less/plugins/generateblocks-207f8d3483b6bc918c2a6bbcc21fd35b.yaml create mode 100644 nuclei-templates/cve-less/plugins/generateblocks-74b40b0063e22d99daacbf3fd60ee7a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/generatepress-premium-616c8823c1cd69f1db936287f2d1fa7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/genesis-blocks-81d04df7ff5b0fa9ae3cc7f6b2f9eb6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/genesis-blocks-cc71ce3f07c7a7f6d2e0e309f25463b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/genesis-columns-advanced-c0043e4e0fc4abc274a0b7326af041c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/genesis-simple-love-d3a9e47377e2967a1d3f37559f1438da.yaml create mode 100644 nuclei-templates/cve-less/plugins/genie-wp-favicon-a934a7b75723aefc4d34e91dfaf7a31f.yaml create mode 100644 nuclei-templates/cve-less/plugins/genki-pre-publish-reminder-d4ee747485499e50fea0ef44831d0b48.yaml create mode 100644 nuclei-templates/cve-less/plugins/geo-mashup-381d6cb0faea51f097b85258ee0a1587.yaml create mode 100644 nuclei-templates/cve-less/plugins/geo-mashup-887adced0648142cd9b714a8cbded6f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/geo-mashup-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/geo-my-wp-9764fa1268021fb445ed7c1cafd9a12b.yaml create mode 100644 nuclei-templates/cve-less/plugins/geo-my-wp-fcc1cf4316d93103b20ebe799631fe04.yaml create mode 100644 nuclei-templates/cve-less/plugins/geo-my-wp-ff66d6fc13b6cfdb064978e366821aab.yaml create mode 100644 nuclei-templates/cve-less/plugins/geo-redirector-7ff4f760c301092254ff0a3e49a089e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/geo-request-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/geodir_location_manager-f6027704921a329e98184819d6ebf0b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/geodirectory-0c1c0e5907f82c480480fd236d7507d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/geodirectory-10faa8f7dbe39946fc1591dc4a29cfc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/geodirectory-7539302587926b426117aef883b56a59.yaml create mode 100644 nuclei-templates/cve-less/plugins/geodirectory-88d4547a92050d1b28fb4357c26c8ac0.yaml create mode 100644 nuclei-templates/cve-less/plugins/geodirectory-ba7c20e930a8487a26eac0cfe90c0f74.yaml create mode 100644 nuclei-templates/cve-less/plugins/geodirectory-db82d66ee6f616f5c7fafadef247b8d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/geodirectory-ff356638666fdb58f191f55340cbf4f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/gestion-pymes-ea5c3acfd64b155268d32c3228d1c82f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-0bdfa552c8e79eb2f1a91f087f9bcf9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-5d5a5e01ff4136d5ff903d7e1aa12854.yaml create mode 100644 nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-6e53023aaed1d0ca3bd9def3a29a1431.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-custom-field-values-328e4fc27caed74ff806a419cfdcc0b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-custom-field-values-5e4bd8f4b7fcafa58897d3309b84db77.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-custom-field-values-a48251c3741e5bdda10cc3847e3d84b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-custom-field-values-c4a2060e848f8147ede668274113eb5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-directions-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-site-to-phone-by-qr-code-6a303c02814b33d00fcce0ecb738b831.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-url-cron-4320598ebb7d4a6b9802a276c7f0a6be.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-url-cron-a757fd116b9febd3ec3b6bc44f01bcb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/get-your-number-eceee40ae071bd0838ed35de0f0e77bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/getresponse-integration-318af4e7ad8fddddeacf6d8489b19638.yaml create mode 100644 nuclei-templates/cve-less/plugins/getresponse-integration-9fa773be7e5cdf580182e19b1f6e77fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/getresponse-integration-ecee6fe6f960c3e32d930eed8f81ac9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gettext-override-translations-c3ee6aa7cf2263de71bab964716588bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/getwid-7da918d3fc3e2e8630ac4c982d69874d.yaml create mode 100644 nuclei-templates/cve-less/plugins/getwid-860548571db1d3ac7f3a8905c5f28f8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/getwid-9bf910117bdf6862d3ee1c26c92e6b91.yaml create mode 100644 nuclei-templates/cve-less/plugins/getwid-ad0428bf7ab47783f2af074da8078ee3.yaml create mode 100644 nuclei-templates/cve-less/plugins/getwid-c31135ea82eaff9efa9c5f32111bb6e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/getwid-caf19b99b78c33b145556e4b8cd07050.yaml create mode 100644 nuclei-templates/cve-less/plugins/getwid-d8609ca02744156f56f17a032b07e7ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/getyourguide-ticketing-e01c69283b147d24245068f3ebce49d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-block-ips-8cf1834702b06ccbceec487f6fa13222.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-constant-contact-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-dynamics-crm-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-freshdesk-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-hubspot-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-infusionsoft-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-insightly-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-salesforce-crmperks-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-zendesk-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gf-zoho-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/gfirem-action-after-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gfirem-action-after-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/gfirem-advance-search-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gfirem-advance-search-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/gfirem-fields-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gfirem-fields-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/gg-woo-feed-53d09e4ac030b1b8d99973338cf6e155.yaml create mode 100644 nuclei-templates/cve-less/plugins/gg-woo-feed-e977a8524d61ac2824626ef17aa0bef1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ghost-9e13f21f3e18faff07670530f9d58cc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/gi-media-library-e7b7f002bb331eb26b796fe9ad1b013f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-certificate-creator-992e494cb586ae82d8a59467cf03e6c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-message-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-up-22c8ae258ee7ee9005a864a39bda5496.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-up-904193396d39b8d655b88d4dbe19e726.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-up-a045ed71aa954e6a2d839e45661eb192.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-voucher-1d5b9796eabe8ef0a97f7ac244be1692.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-voucher-61fd2c4906855d53e38dbebcbfd74fb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-voucher-8d18a006f7e8ea1576808227f78fb4e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gift-voucher-cda43c8c429473025c851831200494f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gigpress-13393dad61452f7f4e21c0de558fed80.yaml create mode 100644 nuclei-templates/cve-less/plugins/gigpress-1a55c20ce9650829e57b6e448599ddb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/gigpress-6a1e5a3fb07b5d9291ff1e62a0f08cd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/gigpress-9b85cc5dac11e87b56eb1483e446220f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gigpress-df29a94c579971159744f58c90d00e43.yaml create mode 100644 nuclei-templates/cve-less/plugins/gigpress-f31fcdd6accb0c61ba4b73c6a548d97d.yaml create mode 100644 nuclei-templates/cve-less/plugins/giphypress-43352935e72ef2b8411f13007515e249.yaml create mode 100644 nuclei-templates/cve-less/plugins/gistpress-4e01c0b287f81a38f8a747fdacd53194.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-21444ea062027be7746ee8919a0751f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-23e584511800cbedd4aa2481d8e724dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-24d7c262b4ff77236f6549957f02bcd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-37be249d4dba046bd5576085cbb2729e.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-3f68b15356bc4e3e423989f19f97e89a.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-513ec2f375998d3060fe3f60b69501e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-533fb5a34390cf0e65d667182e77a256.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-54db66d2a717e7bcc7922961c9407af7.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-560e75b141006ad846ab2e105e9e507e.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-57ba3dbc250a048ad4a278836ea777a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-57de8ad14c220bdfc73bc2840b43e6e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-5b936937c8c0c4c278a2b778b73bea89.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-6377ab76651d16deea08b67670c91822.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-65b42f995ea206de9225157157d7a733.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-709d37fdda47f80274e76b38e4a9b3f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-78446893c956fc1d75ddd7c2d7c876e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-7bb21adc4bf975d211fca6969dfaddaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-7d75f8931c3f52f53c2af82cabb73968.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-7dd2e84c6e70296a48fc2b4acb29199c.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-7e1c91d2fe86a0149b73baa7bbb169af.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-81dceb70d6b123bc1dd5fda793f142c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-85f432bf2dbf8ba147f83f3469bc9104.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-86bbc19d9e21d4915eb630a058d87bcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-87bce74e2816b9152b22f0db777f7371.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-941ef3ed4e3d287ad92a76b5c6b10f89.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-943637fa687cb5cc701289f6e9276a36.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-9507ea5164d4b920f9f2c716985b7a19.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-a0dbcf6f52eae1325b0e855594e29c09.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-b1b366ca92b9c54e2c2fcc9208d3c99a.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-b9cdb37818419e5c667c4243ff011f5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-c2ccbf305342f3ecbc58cb5dfedcc25d.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-cafa6e63a423db5471d38a13d54d5840.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-d338bda5ac65a8a3ce38070f7a58731b.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-d69efeae16b0ba8318e8a9d732208aec.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-e6953b327d094d1df94ac78f97ce3f1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-e8c206cd1f26f528590d564824a60ae5.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-ed46e202f3a956c555880fedcaa0b829.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-f373f6f19e01f5b1868c8800fb906e71.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-f58e0252abf68aa36c1bcaab03cbf89f.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-fa1fef40b905a2c3c8c8c056ae496c09.yaml create mode 100644 nuclei-templates/cve-less/plugins/give-fbf0d51e53f3797d566b99247fa5f5d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveasap-3a84f9286ec25d34a996b5cb4ee829c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveasap-3d832eae81d276110b2fb05b6aea23b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveasap-6e765eeed6905cf3916d16fe5425c306.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveasap-7cc7ed508e00e037806456d02a30380e.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveasap-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveasap-c518ac9593781d65f764a219f04b0aec.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveasap-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveasap-fece4721182fa2d84ab761adf04133ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveaway-26c15735f9b04a66bec91df3a0d7b981.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveaways-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/giveaways-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/glass-6881e52d7cf04ebe1617491d26006f2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/global-content-blocks-6765f94f6a40bfeac4a799a7a22b461e.yaml create mode 100644 nuclei-templates/cve-less/plugins/global-elementor-buttons-13ea368d9bd0647c7fbc9fa83359351c.yaml create mode 100644 nuclei-templates/cve-less/plugins/global-flash-galleries-08c393c21c576ae1c41fe91d54e7e9e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/global-flash-galleries-7ae34f6008db08976405a2c0ef63df74.yaml create mode 100644 nuclei-templates/cve-less/plugins/global-flash-galleries-95f3b505db0bb5acbcaf86e1dd39e4eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/global-income-stats-from-freemius-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/global-multisite-search-76fd12ad8b7b78037046699e5ffa0377.yaml create mode 100644 nuclei-templates/cve-less/plugins/glorious-services-support-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/glorious-sites-installer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/glossary-by-codeat-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/glossary-by-codeat-bc0cf3a754a6fbdff0b7d35751f27209.yaml create mode 100644 nuclei-templates/cve-less/plugins/gm-woo-product-list-widget-8b27cef0936a142b64091e4a3cd8f0d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-628e944f1865bad285b75e5824e5bb82.yaml create mode 100644 nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-9f96211fdf4dfb4e1d26bfe2d1c36496.yaml create mode 100644 nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-bc43f57bd35ee24fbcd374ea171e9e72.yaml create mode 100644 nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-d4e0a798d434cb0cbde1a32f973bc629.yaml create mode 100644 nuclei-templates/cve-less/plugins/gmace-573c28c014e533996385e54c5801eb5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gmace-91afdd80e105f88c419657c28ec390b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gmace-99958bc5af6b387619c59f0368c5fbd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/gmap-embed-3d3b0b33d5d87ca799b6b79195a4eb93.yaml create mode 100644 nuclei-templates/cve-less/plugins/gmap-embed-72366184b67914a0825758added672d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/gmap-embed-a2596cd818b9e76da96ce78707638a4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/gmap-embed-cf16a38393f700cdb2be76a3ca5de2f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/gn-publisher-8fa57ae72750b34eb12df59c3f8bd733.yaml create mode 100644 nuclei-templates/cve-less/plugins/gnu-mailman-integration-e9b21730376128cd6be89ff8a65d542e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gnucommerce-24f4d698ab0a491686fe5ba91eade3a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/gnucommerce-3151dcfef62c493c56c6489173f8c7fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/go-fetch-jobs-jobengine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/go-fetch-jobs-wp-job-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/go-viral-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/go_pricing-6b34c883ba2362a8ae8903a4773f143d.yaml create mode 100644 nuclei-templates/cve-less/plugins/go_pricing-b5e2905f3fa25ed5a268cff184f71b6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/go_pricing-c0501d6ec7222ce135cf1060e0209955.yaml create mode 100644 nuclei-templates/cve-less/plugins/go_pricing-d934ac1748b53a01cebaf8d5ba82ca90.yaml create mode 100644 nuclei-templates/cve-less/plugins/gocodes-613714f5c2e87c49430822b55db25b79.yaml create mode 100644 nuclei-templates/cve-less/plugins/gocodes-e2b3a3b43a72a2751316fff54c8d6a22.yaml create mode 100644 nuclei-templates/cve-less/plugins/godaddy-email-marketing-sign-up-forms-e6ae143c6a0d21493b73e68beda81a51.yaml create mode 100644 nuclei-templates/cve-less/plugins/godaddy-email-marketing-sign-up-forms-f63791a8b82a8db6f6f51f822aa27ea8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gold-price-chart-widget-af9b404439d9589515c5ec4e6d7f1ef0.yaml create mode 100644 nuclei-templates/cve-less/plugins/good-bad-comments-50f3d46f270e4758bbe32a2e3166c5bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/good-reviews-wp-600afe426493b29bf5509da4cbb82add.yaml create mode 100644 nuclei-templates/cve-less/plugins/goodbarber-59bc60dbb95a640744a1b35b77853c09.yaml create mode 100644 nuclei-templates/cve-less/plugins/goodlms-29cf41f615f87d85b5f82475c8720a9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/goodnews5-cf8879fce150bfeedade2a46a11300d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/goods-catalog-5354899032ab4aab5f7e436527798ae7.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-adsense-and-hotel-booking-9de4f56ad1c8638320783f6629c2489f.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analyticator-0d1a8a5f1814698e05f7c343a752da34.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analyticator-43b0481b51b9c335093961e5a3ab3d80.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analyticator-b8c54b7d77df783a3aa06fe35c635411.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analyticator-c101bbb0e470de09f2d621ebb65fb72c.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analyticator-d27196962105bff471a16f16aa617461.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-dashboard-575dc6634917d2a883d4c89ee0a2b4b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-dashboard-for-wp-0afedca0afb43a5850c9c8a9aae6b215.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-dashboard-for-wp-9084030bbc61cd11a5b8832a564811a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-01178f6672a2045cbc07066e22c4b9ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-49a596fa960c73e741b497015244d412.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-4c07ee1f8d9ca7766b852300f804ffcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-4db70895ddb744990c478a4f72d2b5cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-5d2c8f0682b9df406ab0b4c99151d03e.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-6589f8f5c2b9c61e1e02d46bf871ed81.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-728945e5b2000023cafe3f37e7d91f51.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-76e9ddecba440119067c8918ef300454.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-89e45ac29496786a2f26bbad510d04b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-d4b13be2a36ff961aada7107a748559a.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-mu-1622f7025c888065199677a7f8c3a0a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-opt-out-7173b1dd80c7cb39c8dbdccb921d11e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-premium-c8bc852e0f629926f8c3b976dbc68f47.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-analytics-top-posts-widget-6bd671fcc5c9744eb02b51b3543e258d.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-apps-login-a6981c5b5578853614f986e96039441b.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-authenticator-b920d1982fb42696fbafb9ceffabe1a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-calendar-events-1dfb76723d09fb5ee2cf36729147fd09.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-calendar-events-553b08020eb3e25f2e938865afb49062.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-calendar-events-da47dd8f1298c3b7dee167384f30a8a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-calendar-events-f9c0cef6c82321c823029b4f47ad6ec5.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-calendar-events-fc53f712d57ef35888a981283b03a790.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-captcha-598cb96d3fc3853eb8776df6e751f4a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-captcha-6bc609f0d38e102f4943d0a60410cf7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-document-embedder-0058c9636ab9a993ffe8aa9657a05d60.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-document-embedder-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-document-embedder-0e4cfd2e84d3d4a0dcd341ba876cfae7.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-document-embedder-4201a049c4e3da0f1f472f8fab792578.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-document-embedder-96e3c232ce32c0e385509a8011930dfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-document-embedder-cc3e06da44808e338c8d593b5ba332ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-document-embedder-fdf6e35f0fe8eb69bf51476cf88fe9b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-image-sitemap-533a62c8ac6b0ab46c7891e8ab20865e.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-language-translator-18429af9c071c8309e034a7d4d00a8e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-language-translator-1cc23bdae3a780fc80463f59518007e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-language-translator-202ca74fdc1ed676814ee60bc8ef09cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-language-translator-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-language-translator-b8c86f67e83059075ac727a634aa1bcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-language-translator-c7a8789e2e14665dec08cabfa7ba8238.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-language-translator-d02f0d7121f40075980c3a177c578c3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-language-translator-e0be71e8989abd7e932a8db49d3c409c.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-map-generator-6f56f1f427bde5f9933ce31042034bce.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-map-shortcode-4863dac3dc1435179890da283e476787.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-map-shortcode-5a9c8ffeceece98dba6df9f5a0d59a78.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-map-shortcode-95846903ce77a5ec41c1ed6e6284de3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-map-wp-2d526bfd90ad711e245aa63d352c09e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-116826aae00eabc027157d14465768bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-advanced-bad18eab263a0541b49dc3dae830d379.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-anywhere-d6efc23acaa92418f6d5991825096389.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-easy-066b2e83656aa18020e2e218de1f2a94.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-easy-071e46b1422bc01b590261a3c5a56383.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-easy-8055046b14f7ace81067cd61a7af0ffb.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-easy-c19921f21d9136f2954ea974f2d3b3d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-easy-f4c5da0c9249d69bad94272b808223ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-in-posts-ed62eec06fc25731ee3527890a026d6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-ready-42f393afcc63e1048ce48bee1feb1c00.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-v3-shortcode-e258e8570aa5a2a07663517678c9341e.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-widget-47ea06b51e4d84465dbdc7ce5332226e.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-maps-widget-ec849d78c688b2190e2b3aabcf591070.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-mobile-sitemap-5229e60b10dc0cc0da445f82bd6aaa7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-news-sitemap-d6ab389c616dfd2cb30cbd7db8473c95.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-one-487e1c477d62c893e7844e96f9998b9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-pagespeed-insights-151d3e08592a36d4136c6e83ca9b4d33.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-pagespeed-insights-69c002483424de642a83eb654d8e112a.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-seo-author-snippets-3b1e2a032a6f302e2ccd9d18f56d17aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-shortlink-cc49f2dcb06843ad833fab55b1a84dab.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-site-kit-ce48369642b01844ccbae0e0917885a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-site-verification-using-meta-tag-27da99993e67f1ff7087f357854cd3f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-sitemap-generator-877bab778ddda7032844b19d4fdbee7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-sitemap-generator-a8343a6c54d23e35a66b54c79a6e406e.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-sitemap-plugin-a9e88406cdac203530a27cd9ede9dcf0.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-typography-cff018203a21cbec2137aca8bbff35f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/google-xml-sitemaps-generator-1f82fcaacb5a6d3e18b98a66c9d7e3ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/googlealertandtwitterplugin-3c3cbbdb8196193ef05917779fb71864.yaml create mode 100644 nuclei-templates/cve-less/plugins/googleanalytics-2207307382a7e5b71273a639c041b28d.yaml create mode 100644 nuclei-templates/cve-less/plugins/googleanalytics-d7f99b9c49c835552d523fc996a914ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/googmonify-c684be52691ba8cf475f40cbe594a992.yaml create mode 100644 nuclei-templates/cve-less/plugins/goolytics-simple-google-analytics-733ee63acd3da1891d75d0f23730ff92.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotmls-0a0cd233b0f3cbcbaa65976cd56fef34.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotmls-0c5d9c3d25fdcac52f9189c83dcf8aeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotmls-1a3ebcec002fbbf2625550387d2d42c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotmls-217282597c372f234ba0f9d1d76dc65e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotmls-708df63ef726347251d17af873084641.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotmls-73c5b47663cb5585bace1d303c16cc9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotmls-dad4d79fe3688c4dbc2389dd7cd7a0c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotmls-ee46b680e67f5e4398b3104a6e695606.yaml create mode 100644 nuclei-templates/cve-less/plugins/gotowp-1dba374d8f67142177f857791fc4897a.yaml create mode 100644 nuclei-templates/cve-less/plugins/gourl-bitcoin-payment-gateway-paid-downloads-membership-3063b8281af6ebc7aeb1fd5ad46fb58d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gp-unique-id-0baa6a08e33ce425ecc59984cf3322d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/gps-plotter-b434181ec4dda3f7c495c50067c97199.yaml create mode 100644 nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-045152e75b1009ce745fb0f25f86d898.yaml create mode 100644 nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-57ecfed8d0fb67d406684f95901e8e61.yaml create mode 100644 nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-e9e7f1f63804b5a7bd339f4d7bcd16e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/gracemedia-media-player-639b65f134f2ebc0900152991d7d173d.yaml create mode 100644 nuclei-templates/cve-less/plugins/gradient-text-widget-for-elementor-2b7b5dc8c00ef5d0c5596161adf932c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/grand-media-0825ff9121c6db183cc7a8611f4eccae.yaml create mode 100644 nuclei-templates/cve-less/plugins/grand-media-3d97f53ad1e035f606fd358779aba41f.yaml create mode 100644 nuclei-templates/cve-less/plugins/grand-media-6c30ef6dc07bdb8e5463fc4ceb947996.yaml create mode 100644 nuclei-templates/cve-less/plugins/grand-media-6f4811a1962934f7bbd6ba6e69c49111.yaml create mode 100644 nuclei-templates/cve-less/plugins/grand-media-7f68709b4a4df440a41bc04d703e3fb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/grand-media-eb694b6f549de02c7bd8c2f716c1cbc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/grand-media-f89c8645dfcff6d7c8daa63e313b40dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/grand-media-feb8ea008986699e99b1ae18448b79c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/graphina-elementor-charts-and-graphs-a96bb943a1852ea0b2e688a3b3910413.yaml create mode 100644 nuclei-templates/cve-less/plugins/gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce-b4bd8b09c6fbcb29788bc8bbefcbcdc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravitate-qa-tracker-cd3644678d89d82305da7906f47bab11.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravity-file-ajax-upload-free-aae4ca7abb59e5c604f97c05e398cdb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravity-forms-dps-pxpay-c5c10bf83837ad294aabcbed9d694122.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravity-forms-pdf-extended-67df3c9c3b7aab97d6fc038c36b94164.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravity-forms-sms-notifications-167d9672411be44feb72a5175fd0987c.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravity-forms-sticky-list-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravityforms-5d1eddaacfc678e52758e23e8e3a8842.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravityforms-6b968b7d554babf27aefcb5df3e3773f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravityforms-77f0a0f1e7db36263a8aa9ab981e047e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravityforms-7ce94184875be6701700a5e620312558.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravityforms-975bf041109307c2b0234ccae26e4bc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravityforms-af26d379855801f026d0f678221b9f09.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravityforms-effd937dfb84f7185a68c8c7960d1571.yaml create mode 100644 nuclei-templates/cve-less/plugins/gravityforms-f9a5aabd053da65d5b8f27e85e3ac8c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/great-quotes-a9ade0513aa1dccbdad4ffd99dcceb42.yaml create mode 100644 nuclei-templates/cve-less/plugins/greeklish-permalink-c5e8439f52a72fc808844ece6ad38bdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-01c7f6a7ff2da57d8e46e6c08e382c32.yaml create mode 100644 nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-601f7b212435b0908f5157de31e9c323.yaml create mode 100644 nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-c16c01b270f8ba46731b798dbc4b70f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-f9a2a8b78b336f59f7555c63172782ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/greenwallet-gateway-e92bd2c686e39336f450414601e8c047.yaml create mode 100644 nuclei-templates/cve-less/plugins/gregs-high-performance-seo-1fdcfa12049d782d5c0a8a4b15f2b5b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/greyd_suite-5b0eec3be7323ada5d1daeb52ff32549.yaml create mode 100644 nuclei-templates/cve-less/plugins/grid-kit-premium-ff22f0867ae120b77caf3636e99d73c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/grid-plus-12eb7534db6d3a6b596836d9096b1dfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/grid-plus-a7efe3d7340eefdf74e75d3be0901882.yaml create mode 100644 nuclei-templates/cve-less/plugins/grid-plus-ae14a34996c3d427efe7873c20688c21.yaml create mode 100644 nuclei-templates/cve-less/plugins/grid-shortcodes-0ddb5ade9834993cf7b74808814bcc80.yaml create mode 100644 nuclei-templates/cve-less/plugins/gridlist-view-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/grou-random-image-widget-c7a837e64827f8095f9260b40809766c.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-01e6da1e967018241a8f36efe6fd50ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-1d9266ecaa07d410393e4d47b4c9954f.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-5c29a3cc888c2b8f4800d87269906f2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-653bfe16d9c86908e0bcfff0b6dd1c6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-6b4accb527f76b2e4224aaf45a24e723.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-6f02fa76246cc8d01472e29b6032ad8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-7690dbacbae8cf712fa24f47448d84aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-8a471c08317f24a8f762c3b9912e1668.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-9bca420841e37204239e9083274e18ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-a69ac85c2f382d8b82f7f44fd083ec69.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-b86dfb6f9dd8aa205cbc3842be669c7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-ea3614c57e168b5cbba1a64665aa3e41.yaml create mode 100644 nuclei-templates/cve-less/plugins/groundhogg-f995ec2617f1d8e01a76eb96ebc10f06.yaml create mode 100644 nuclei-templates/cve-less/plugins/groupdocs-comparison-9ec1775f8427416318a9bdfcfd96cca2.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-books-showcase-2dfa9da72134b3fee9c376ecca6fe446.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-envato-portfolio-6238c45309a73e1d06001135fffb48d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-facebook-comments-36c5b3d7d876a774f8fd4aa153e32524.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-facebook-comments-51018cf0109648dade76eaf03756855f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-instagram-portfolio-bb81738a1483724d89303a6a2b8b759f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-instagram-portfolio-e4d780c0204ebc51d13bc9ff3d0c837f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-logo-slider-3a1240a24a2dd47c008d450b098689b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-logo-slider-ee05a64bbaf03a516917796674375367.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-0e5cb6701f47f915bf3484f8aa48343f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-51cfef8c45760573f4f3cc1655e5ab39.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-565c3a27c2a7060808c53a2711e80a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-portfolio-876486fa06bffb3829a9c77f08f98e1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-team-members-89d1ae974c3297f3be00b2900b223ee4.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-team-members-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-testimonial-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-testimonial-7cf1733a0fcabc72e1599e5c6fa6e184.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-testimonial-95b4227a0d3d41c249f2bf8ed2c425e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-testimonial-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-testimonial-d8076a607a4a2cad3434e6393a4159d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/gs-woocommerce-products-slider-1735d30fe988ff978861d4dbdb0c640e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gseor-3c35d6ca8d97eaaa9d359ed4e523fe3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/gsheetconnector-caldera-forms-48accc4aa9cbb4e6e06e0f437230bfc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/gsheetconnector-for-elementor-forms-5bdb93ed09679c782c93a7aa96190eff.yaml create mode 100644 nuclei-templates/cve-less/plugins/gsheetconnector-for-elementor-forms-pro-5bdb93ed09679c782c93a7aa96190eff.yaml create mode 100644 nuclei-templates/cve-less/plugins/gsheetconnector-gravity-forms-d84c432825dde022913bf769b768726f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gsheetconnector-ninja-forms-faac6d1ff1697000b9b14ca585be6ab0.yaml create mode 100644 nuclei-templates/cve-less/plugins/gsheetconnector-ninja-forms-pro-faac6d1ff1697000b9b14ca585be6ab0.yaml create mode 100644 nuclei-templates/cve-less/plugins/gsheetconnector-wpforms-2c53b255c00d529e8b580e9b919c837b.yaml create mode 100644 nuclei-templates/cve-less/plugins/gsheetconnector-wpforms-pro-2c53b255c00d529e8b580e9b919c837b.yaml create mode 100644 nuclei-templates/cve-less/plugins/gslideshow-216bc7429720f3a1737645ac0bc074a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/gt3-photo-video-gallery-931f5de56d92dfa4c2d39579eb08aff8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtm-server-side-9d901cc0b99cacc346adcfb2e44aed31.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-118d3bbf1129a6179234e3b857cad279.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-241dd4c3f2d34cca641cc14b2238e0fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-8d4923c8fc18392ea1fb56e01269ce95.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtranslate-49b5433838cce19f05784e59c6e0d7f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtranslate-530119b641fe83b81bd9470a37532801.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtranslate-5ebef968ecfba23771708b1d7c8b6112.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtranslate-d02f0d7121f40075980c3a177c578c3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtranslate-e193e03e756910d1d1e9b9cc6d320432.yaml create mode 100644 nuclei-templates/cve-less/plugins/gtranslate-e57cb75d56b89999570d9a342a44a60a.yaml create mode 100644 nuclei-templates/cve-less/plugins/guardgiant-ca496e63542b74a88b0b8dd7fd0ebb0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/guest-author-9b2b2cc106e50e817ce608f745dbdaed.yaml create mode 100644 nuclei-templates/cve-less/plugins/guest-author-bcd6b988167c1612bb5048004783e4f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/guest-author-name-982e9cfa43c440d5e945696eaf09286b.yaml create mode 100644 nuclei-templates/cve-less/plugins/guestofy-restaurant-reservations-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gum-elementor-addon-dd93174b0504049ccc03e08eec846159.yaml create mode 100644 nuclei-templates/cve-less/plugins/gumroad-f295e8a8427ef02d3b3be1982f4ae5fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/guruwalk-affiliates-a6e719c0412296476082fdb1b971690e.yaml create mode 100644 nuclei-templates/cve-less/plugins/gutenberg-dea122a140ad8ae54d1e3b79712b8d73.yaml create mode 100644 nuclei-templates/cve-less/plugins/gutenslider-6a7d0f10989c55df0c2d186c1333c6d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/gutenslider-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gutenverse-c512399e58b223011a17608d4b51ac26.yaml create mode 100644 nuclei-templates/cve-less/plugins/gutenverse-f66a440cd899e10b9d3c84e8064d84c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/gwolle-gb-02c38e87fc6391ec0ea333f550f5e898.yaml create mode 100644 nuclei-templates/cve-less/plugins/gwolle-gb-8d7e82e4dc7d56e63bcdb6a68358e1ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/gwolle-gb-b0dcd475ee39f280da0df0dd6993e407.yaml create mode 100644 nuclei-templates/cve-less/plugins/gwolle-gb-d1ded0c2f1b1f7a73c6770c120be62b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/gwolle-gb-def48545fc7b8f7aba56c88a829527ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/gwp-histats-e3f2fb4bebde6fbab715925584422191.yaml create mode 100644 nuclei-templates/cve-less/plugins/gwyns-imagemap-selector-a56db0fded06de81c5e370419ecf70d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/gym-management-398be83e4279f1a443c4d3cb2c5b8198.yaml create mode 100644 nuclei-templates/cve-less/plugins/h5p-css-editor-5203ae90ef6af25fe25fc40bdffc879a.yaml create mode 100644 nuclei-templates/cve-less/plugins/hal-06dfe81bc3a355cd7801ee39e75e5076.yaml create mode 100644 nuclei-templates/cve-less/plugins/hana-flv-player-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml create mode 100644 nuclei-templates/cve-less/plugins/handl-utm-grabber-8f10a7f44536cd7d542d4c451e6c6b46.yaml create mode 100644 nuclei-templates/cve-less/plugins/handsome-testimonials-87c27569f8277885aabdf5403aebae34.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-11da24271f65d3b23d168c3013c450d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-14492d14fdb2635abb58842e5c9c262d.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-3ed56e73a3a43b54020334fdf48e4e7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-40e8b36488a6eac28e891fecfb75c2fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-47a1a7c3503abffa7dc09bb7e0a3a05e.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-554f77c669d0419c047d6805cc30482d.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-5f5be8778a8041dd72149d1e03212c77.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-6eaf90f575a0c36147979bc3388c8a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-70c45809c8b9b14259a0bbce1a7bc3da.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-72139ddfa4b65d7bc5dd06dc24f01748.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-81f2915fd63b284fd9e4c66899667dd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-857593f7e35e0afc65d726bb57f2b738.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-a01bc9677b84a6e36d4cf67ad2a5dc30.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-ab2437d4d93bac74a9eb7aad2f952033.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-bc1bf66d22152db23406f67a4e5cfee9.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-c9ff001e2ccdd465207fe5710fbe6c52.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-dbb7ef50cd218fd39017d67c755de559.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-e18fa2425147eac664779a4e7540108b.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-e3b2d19a0133da498045d08d6862f535.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-5f5be8778a8041dd72149d1e03212c77.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-61c39bef79293723f6fa3478b1529af9.yaml create mode 100644 nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-bc1bf66d22152db23406f67a4e5cfee9.yaml create mode 100644 nuclei-templates/cve-less/plugins/happyfiles-pro-9a4a86b73d09899b1f2fa163f3660f75.yaml create mode 100644 nuclei-templates/cve-less/plugins/happyfiles-pro-c93f15f45e4694eec856b57673b454f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/happyforms-2707a3752ae7690ac46fe8896eb6632b.yaml create mode 100644 nuclei-templates/cve-less/plugins/happyforms-7145c40ff1e0db4687c083ce378fc607.yaml create mode 100644 nuclei-templates/cve-less/plugins/happyforms-74ccbff13cedef341c14f509a30bb49c.yaml create mode 100644 nuclei-templates/cve-less/plugins/hash-elements-70740ef575420bdce3307b7d6efb0e97.yaml create mode 100644 nuclei-templates/cve-less/plugins/hashbar-wp-notification-bar-77bff58a02745412cca836e0af8ecf6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/hashbar-wp-notification-bar-cc04fc647a83c5a0bf41904a11665f19.yaml create mode 100644 nuclei-templates/cve-less/plugins/hashthemes-demo-importer-a59d3f4cb23477999357f88e98585933.yaml create mode 100644 nuclei-templates/cve-less/plugins/haxcan-3db14e51e4cd401655d11f7aea7dbad4.yaml create mode 100644 nuclei-templates/cve-less/plugins/hbook-d14e048167575e51fe5556ff84906191.yaml create mode 100644 nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-560440aa181bea8a67faa79732a41f9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-7ac6b90fc34536c09d99f508147f9181.yaml create mode 100644 nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-d13cb26577d06a7097c333dfa170e855.yaml create mode 100644 nuclei-templates/cve-less/plugins/hcaptcha-for-forms-and-more-7b33ec746697457281bd9e42aec2f348.yaml create mode 100644 nuclei-templates/cve-less/plugins/hd-quiz-48f754f17606d4479811452c8745b0f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/hd-quiz-eea7979a3adae6620386ae2fd9256411.yaml create mode 100644 nuclei-templates/cve-less/plugins/hdw-player-video-player-video-gallery-a27af52ed355aaf16d2ba0f06827a926.yaml create mode 100644 nuclei-templates/cve-less/plugins/hdw-player-video-player-video-gallery-e15109a3e2bca91cb9757f33e8ccceb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/hdw-tube-917d7399f5fb3cc1cf39f6cce7273cc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/hdw-tube-a307a0ae505afb842b5a198bc8bff8bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/header-enhancement-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/header-footer-code-manager-29a76895e319eccbd61b3bb594faebd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/header-footer-code-manager-4e85b966f722637fb8ba38d8dce7367a.yaml create mode 100644 nuclei-templates/cve-less/plugins/header-footer-code-manager-54aadf8fe607e5a163f75b88f9bb6921.yaml create mode 100644 nuclei-templates/cve-less/plugins/header-footer-code-manager-ebaed8da40ca133016da6dca47ef4e1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/header-footer-elementor-5adfa5eb8fa56a7df3a28304be530aa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/header-footer-elementor-76b99567dc5d8693687703220a992b79.yaml create mode 100644 nuclei-templates/cve-less/plugins/header-image-slider-0fdfd9f22590d1df506441add4a664d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/headless-cms-924d818a306e9e6b06f3cb1274c2304e.yaml create mode 100644 nuclei-templates/cve-less/plugins/headline-analyzer-54f2c04c2c06c269e0341f13f080ec95.yaml create mode 100644 nuclei-templates/cve-less/plugins/headline-analyzer-8cd08637ffa8c2d1ca3b360f63505422.yaml create mode 100644 nuclei-templates/cve-less/plugins/health-check-3d51c2b8fb06721f3c5b968c3626fb70.yaml create mode 100644 nuclei-templates/cve-less/plugins/health-check-43535da8d5aa574c7cf4e311538c873d.yaml create mode 100644 nuclei-templates/cve-less/plugins/health-check-73c68dbf279656072f1ab958f24cc348.yaml create mode 100644 nuclei-templates/cve-less/plugins/health-check-fa8bb26d319a4e03fd0e1e3bc361d9db.yaml create mode 100644 nuclei-templates/cve-less/plugins/heart-this-f0164790773e35acb9b1d44f4c95382b.yaml create mode 100644 nuclei-templates/cve-less/plugins/heat-trackr-96b9af98f103ae55e184925f398dbbc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/heateor-social-comments-73dd9496dc7942d3595fe6b58faa41a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/heateor-social-login-132f29f7cba1678c467fb85b9d9b820e.yaml create mode 100644 nuclei-templates/cve-less/plugins/helloasso-3b452da100c4d01a4273d3119ce13da9.yaml create mode 100644 nuclei-templates/cve-less/plugins/helloprint-e743442fbb37f8e4e9406e7627aff2e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/helloprint-fb3207d7d531ee9e551e1696ce5b366a.yaml create mode 100644 nuclei-templates/cve-less/plugins/helpdeskwp-0aa92148d99c1bca8d88494c39b853c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/helpful-7344a2ea198088e725e4c36ccf66d66c.yaml create mode 100644 nuclei-templates/cve-less/plugins/helpful-dd20a0b7211e7318d7683dbce69df5bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/helpful-fdcfcbc977d2772beb04b8279c53f48d.yaml create mode 100644 nuclei-templates/cve-less/plugins/helpie-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/helpie-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/helpie-faq-fa8aa874dce84326a50185872038d6df.yaml create mode 100644 nuclei-templates/cve-less/plugins/hercules-core-59d8f9139af0fff2996b4a871907966d.yaml create mode 100644 nuclei-templates/cve-less/plugins/hermit-3ba7758def7bb999accbbcf70be2e182.yaml create mode 100644 nuclei-templates/cve-less/plugins/hermit-43b828ba6ca06e13c96e8d6957a25d26.yaml create mode 100644 nuclei-templates/cve-less/plugins/hermit-45a494ad00222afc72c15fb1ebbba00a.yaml create mode 100644 nuclei-templates/cve-less/plugins/hermit-724dab272a7285745cd4df281951dbc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/hero-banner-ultimate-8e499ffbdb5eeef7ac0a6adb29663778.yaml create mode 100644 nuclei-templates/cve-less/plugins/hero-maps-pro-bb71b39bbb362217aeb2969b4b128fd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/heureka-18424f590c597310c8b3007cf66d4132.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide-admin-bar-based-on-user-roles-bfec3335d0c8a649eb978fd7079c22ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide-login-page-d8cfd8cbb536b77db396cb96c4ec7492.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide-my-wp-bc9fd382ebb4fba0cb4c50924f838977.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide-my-wp-f06e932f1a72c7fb21b21c76bafdfc46.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide-shipping-method-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide_my_wp-9d0b835dc24461b5e3c8d9cb0d3fe615.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide_my_wp-a5da2259e66916eeb957e15e5b2a199e.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide_my_wp-c109e83620923dabed3942bad0a8805b.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide_my_wp-e1e09568d086f8fa80d5f87a6742ffc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/hide_my_wp-f9354e3145332671221f1b57bb58f382.yaml create mode 100644 nuclei-templates/cve-less/plugins/high-compress-a3e9ff26d980a2a3e39533f0b78e5d83.yaml create mode 100644 nuclei-templates/cve-less/plugins/highlight-bfb136ecd8a5fcaea8f121127bb1d532.yaml create mode 100644 nuclei-templates/cve-less/plugins/highlight-focus-4f5affe3e6d10944ac86113d1e4881da.yaml create mode 100644 nuclei-templates/cve-less/plugins/highlight-search-terms-results-cccbeb1e67006355f6c0344c831a92e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/history-collection-a292899c8a2340a097d09b07ac49f9ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/history-log-by-click5-8c87a28bec934dcd5364cbdca924c771.yaml create mode 100644 nuclei-templates/cve-less/plugins/hitsteps-visitor-manager-99e03ce9a586679417b36a7850aaddc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/hitsteps-visitor-manager-c0963c297f9f408e178419f30ee7e022.yaml create mode 100644 nuclei-templates/cve-less/plugins/hiweb-migration-simple-927e2c90815a01d50a3aecbb0efc5c7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/hk-exif-tags-f98ba84845d04638f96a14d587800f12.yaml create mode 100644 nuclei-templates/cve-less/plugins/hk-filter-and-search-dd02ae8823de431da5d5d52246acd7ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/hk-filter-and-search-ec9f1feec044e5447ec3ac663c7a05af.yaml create mode 100644 nuclei-templates/cve-less/plugins/hkdev-maintenance-mode-7378070b61d09db85a0d4e6a50aa47a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/hkdev-maintenance-mode-c0b53a118173c14a546665b5482b078d.yaml create mode 100644 nuclei-templates/cve-less/plugins/hm-multiple-roles-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/hm-multiple-roles-db1c5c8b7f25d9de3f31e4725ede7e61.yaml create mode 100644 nuclei-templates/cve-less/plugins/hmapsprem-294b436d8db887cede47424adf8c58d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/hms-testimonials-0edbba73cef4d5273525e9fdeb2bcb4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/hms-testimonials-8de4556487daff9f80ef882a72ac48a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/holler-box-62f024d1a6544d8128f328de7ec4ed81.yaml create mode 100644 nuclei-templates/cve-less/plugins/holler-box-ca4ae9210ad5c6416e62ede162724557.yaml create mode 100644 nuclei-templates/cve-less/plugins/homepage-pop-up-48cb81f29289d3dff74b9ff9eb6ca258.yaml create mode 100644 nuclei-templates/cve-less/plugins/homepage-pop-up-9fb8bc0ed140e27215d75f6096a9ee6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/homepage-product-organizer-for-woocommerce-61ef4484d482c37a0de9af18fac5edf6.yaml create mode 100644 nuclei-templates/cve-less/plugins/honeypot-4c06879b605c0ddf9d3252fe12dff25c.yaml create mode 100644 nuclei-templates/cve-less/plugins/honeypot-84ddb55655b14833e201c7e5f21d2907.yaml create mode 100644 nuclei-templates/cve-less/plugins/honeypot-for-wp-comment-2030c3497157a45619c53075fe4be64d.yaml create mode 100644 nuclei-templates/cve-less/plugins/honeypot-for-wp-comment-a8665e653501dfd87d7b7e15f79ece36.yaml create mode 100644 nuclei-templates/cve-less/plugins/hooked-editable-content-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/horizontal-scrolling-announcement-797d8c237b397ae53a63dd9186307bf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/horizontal-scrolling-announcement-c7a804f58a12769a69ea7efb7fd135b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/hospital-management-6c841a99daf37cae6f46cd0d753efccb.yaml create mode 100644 nuclei-templates/cve-less/plugins/host-analyticsjs-local-8450871a53e20b19adaa61e1434e59d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/host-analyticsjs-local-fbc80c02043c699931d3e726696377ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/host-webfonts-local-2442f509b4c40ac50640a6c02e5c1509.yaml create mode 100644 nuclei-templates/cve-less/plugins/host-webfonts-local-c613d8cee5f1f00301bb24d6fb1e61f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/host-webfonts-local-ca17e2759a3859433a0fdcccce8347ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/host-webfonts-local-e5f4d0fbf2cb3e2ba7d87aa6af9f1099.yaml create mode 100644 nuclei-templates/cve-less/plugins/hostel-16bd3db16d545cda6e318dd7aeadbea4.yaml create mode 100644 nuclei-templates/cve-less/plugins/hostel-2719d6731668b9065520117203a3303c.yaml create mode 100644 nuclei-templates/cve-less/plugins/hostel-50b601cc2c81a33254df5b8d86129b71.yaml create mode 100644 nuclei-templates/cve-less/plugins/hostel-da8a9590fd2919ac3b910c3614df54d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/hostinger-fda0de5b4c70706b1c7590b4b32d12b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/hot-linked-image-cacher-9e20884f267dfae0b2011b836be1bba3.yaml create mode 100644 nuclei-templates/cve-less/plugins/hot-linked-image-cacher-c27aea985311d8d430509d848af8ed00.yaml create mode 100644 nuclei-templates/cve-less/plugins/hot-random-image-ac9cb365e503376aa31ed761706bf88b.yaml create mode 100644 nuclei-templates/cve-less/plugins/hotel-listing-5485a109494b4df54da4337a9efe8523.yaml create mode 100644 nuclei-templates/cve-less/plugins/hotel-listing-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/hotjar-28e170e893975e3ad314a1e6dd206e77.yaml create mode 100644 nuclei-templates/cve-less/plugins/hotjar-connecticator-106707c65ee1208d448d3a7f0350d84b.yaml create mode 100644 nuclei-templates/cve-less/plugins/hotscot-contact-form-e36d961a443fc07bfdc5e0b939b3e6e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/houzez-crm-a2b34dc7c637e9503c30ea45277c4ce7.yaml create mode 100644 nuclei-templates/cve-less/plugins/houzez-login-register-6dad969c863a9551ee44b8e68612f92c.yaml create mode 100644 nuclei-templates/cve-less/plugins/hover-effects-4e07fbfa9287b3d698591e747048b894.yaml create mode 100644 nuclei-templates/cve-less/plugins/hover-image-4ebc9d9cf2e6c0b8863f7b05c2ec1bcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/hpbtool-fd9a8180717056f9f1f968f01ca33f0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/hqtheme-extra-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/hreflang-manager-lite-4d7973cbf6013501ff12cd0e04512888.yaml create mode 100644 nuclei-templates/cve-less/plugins/hreflang-tags-by-dcgws-6293b091bc766206bb45c5e76ab63e4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/hrm-8ce46300a9ee0c671870e83a220afb03.yaml create mode 100644 nuclei-templates/cve-less/plugins/hrm-a36379ec9941e1d3446832e6154938a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-builder-deac3fc8969cda605bbcdcb387cd2a13.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-contactform-3d1cc5475dc75a23246949ead1d96006.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-easy-google-analytics-164d8e023bea2a9cf66601d6c8d87f66.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-easy-google-analytics-aeabe255a52538c85557d43415e4e073.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-easy-google-analytics-b50572ce7e2b149d1cbd18124538a979.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-event-eea40bebf411a89783a41e1a9b7baa9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-instagram-874767d2bf3455f1a596a7c733629154.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-01300894d57947b3560cabf2dbbcd115.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-39662c17a130cae2e0ac4d8f08110d5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-4352573f5cddc391c5178beba8d7f9b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-54345d40684c0a52baa3c3ff4f72b60d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-70fc895faebcf1fe7c1137deedd632a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-719fa4e7b6c83ab485c9d95f46e8edb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-7648aa79e50b7fbff0359c4b0f9eb60d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-77f47958ca9f6f3aca917f2faa21c35a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-7bd8b052dc6ab5494250ef14b3571b9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-885b11bd05584acc3850df4149714f79.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-8dd7019aa8a80d139d621978f8455f94.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-b8980aa84f8cc55308551be159a27546.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-c8bc0703f7a40b6110052093d1b42354.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-c9c8b6f666802b2f51aa7a2059e8cf31.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-cbef84b88c0a2eb6e68bde27c710114f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-d1cffa60eaefa9d562794ce4c0d0f8a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-mega-for-elementor-e3441a86dca8e1266b44f1ac2828bc65.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-menu-lite-c4c123ba803ff56ca56f62a58df9c1fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-portfolio-209d06497ab8e08c218ee68cdbabb1d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ht-slider-for-elementor-58c63b651eae675c8ca30a5097ca90d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/htaccess-9345a855b917e9d7c301701fd76aad46.yaml create mode 100644 nuclei-templates/cve-less/plugins/htaccess-edec211af3b7dbc24681331832d822e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/htaccess-redirect-9d01cf11d54833d25428e1cf81d5a407.yaml create mode 100644 nuclei-templates/cve-less/plugins/html-forms-418ebe6c7dbfef34adbdede493bce943.yaml create mode 100644 nuclei-templates/cve-less/plugins/html-forms-8afa46038c928522e1a939b693fa3626.yaml create mode 100644 nuclei-templates/cve-less/plugins/html2wp-0df1e064add078cf57c6048e0292bd1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/html2wp-d9d330e96ffdfe1887976502e50deb2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/html2wp-fcada36c51980400d6b77ffead4b0c1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-audio-player-1ab07ec0caa3cd50e192c36d8dc28388.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-audio-player-8c8ea74da9222b97df27e5eb58a8262e.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-audio-player-9cd02c8d638c4cb01b2d319013b9422d.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-jquery-audio-player-2ea89aa92910e09e4a0699a93e6b8771.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-lyrics-karaoke-player-c399c93eb04d9720bd4e74a57c352087.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-maps-891ca23ffb08d94e6434e60528a16c74.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-maps-bdf0d3aa1632ca3b2ca5352b8bea588e.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-mp3-player-with-mp3-folder-feedburner-playlist-bd39f2dcd48837d67c4b40b69f78df98.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-mp3-player-with-playlist-0df580dacb0df6a2ca5f274d2d7147c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-mp3-player-with-playlist-cfb5454ff2827b6f871f30ef976e36bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-responsive-faq-fb9f6e5f6b739b217a3c9294b96be3ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-soundcloud-player-with-playlist-c00b8bf14565edfcbae67925492b03f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-video-player-a517ff8b627b981a1fe850768f04bf42.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-video-player-with-playlist-485789fe72c833fe22bf40305da52bb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-videogallery-plus-player-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5-virtual-classroom-b0382531907f0ce8fd4932cc7bcd495c.yaml create mode 100644 nuclei-templates/cve-less/plugins/html5avmanager-39aa42ce6a12361e040ad2f2d3e0128f.yaml create mode 100644 nuclei-templates/cve-less/plugins/http-auth-e90b537c5f5b2550abd571e86aaca30a.yaml create mode 100644 nuclei-templates/cve-less/plugins/http-headers-15a164b8d7acefaa3a7ae7d37647554e.yaml create mode 100644 nuclei-templates/cve-less/plugins/http-headers-3400f4eb6ff8887592360d9448530f42.yaml create mode 100644 nuclei-templates/cve-less/plugins/http-headers-51f2517f9bbfce600c2f0bf80668bc91.yaml create mode 100644 nuclei-templates/cve-less/plugins/http-headers-5f2adc5ca6dedc40903aa1f1e563d920.yaml create mode 100644 nuclei-templates/cve-less/plugins/http-https-remover-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/http-https-remover-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/http-https-remover-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/hub2word-2dea767209c9552dbe15347492d80abf.yaml create mode 100644 nuclei-templates/cve-less/plugins/hueman-addons-9b8d61323342cf7cc549ce8c8f2716e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/hummingbird-performance-198731eb0d140b29cd1b351f123496f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/hummingbird-performance-7c3ea2239a49993a972e3badf432bcfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/hummingbird-performance-ec5f1fa417ea6d6d86b4d82ac0f5e65d.yaml create mode 100644 nuclei-templates/cve-less/plugins/hungarian-pickup-points-for-woocommerce-4954ab56551b4ce703a0899a0107deda.yaml create mode 100644 nuclei-templates/cve-less/plugins/hungred-post-thumbnail-ac71e6911e612c743a4ffc18cd41b753.yaml create mode 100644 nuclei-templates/cve-less/plugins/hunk-external-links-e4943a062e718f1da762551fe8208620.yaml create mode 100644 nuclei-templates/cve-less/plugins/hurrytimer-268b053a1bfe487ee9a98a976d059155.yaml create mode 100644 nuclei-templates/cve-less/plugins/huskerportfolio-e91e3f50be0e7f98b6ee2b7340fe8b63.yaml create mode 100644 nuclei-templates/cve-less/plugins/hybrid-composer-b0e3fd5d9174b5eba29a79c0cda84c9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/hypercomments-f48003feae4cf574ad5a0e007703e663.yaml create mode 100644 nuclei-templates/cve-less/plugins/hyphenator-ab777568922b3dcb0b2e73d6e3091f21.yaml create mode 100644 nuclei-templates/cve-less/plugins/i-dump-iphone-to-wordpress-photo-uploader-0d249401678b4100fbfb0e12a940b6ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/i-recommend-this-4b04846741419fafa968ec2cd45a21dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/i-recommend-this-91fc45f92059ad3dccdaddc100f38fa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/i-recommend-this-c8c3c4e396d486583b9e49a37e519b53.yaml create mode 100644 nuclei-templates/cve-less/plugins/i-recommend-this-d7eef9375bde202187f7666f53aba99e.yaml create mode 100644 nuclei-templates/cve-less/plugins/i-recommend-this-f577d412a90189953cb8af4c09d74c9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/i2-pro-cons-5c4c3c093dd69f631ab63d22386e6148.yaml create mode 100644 nuclei-templates/cve-less/plugins/ibs-mappro-2f8ca7fb94c2fd4e610b875c561d523b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ibtana-ecommerce-product-addons-a99a6931f92bd0d642c13328925d2e73.yaml create mode 100644 nuclei-templates/cve-less/plugins/ibtana-visual-editor-747cb2b72097d91ef1564458b7d2e373.yaml create mode 100644 nuclei-templates/cve-less/plugins/ibtana-visual-editor-912a26e9536c81b126d2560cabd51139.yaml create mode 100644 nuclei-templates/cve-less/plugins/ibtana-visual-editor-fdc54b4c35b7d9b62d80ce198388bdcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/icalendrier-9fca0dd0c7f34e6a746c8a219eb28b95.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-1189677e87fccd5ba86b3b7c8e3828fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-173c2f3da25ffb641f6c881b0ecd192a.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-1b90a29b0e05edb9e0100d5bac6dd543.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-5c5cac9fef446ce5aab816bcf883d040.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-889f2c95b741c5e0897bda79fd4658fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-88a06d86ce607df4ff6b1b9039ea93cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-952c35deeae371ba14bf32adbe040582.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-c7d2eaa1bef247cc946f12a77351dbbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-de418588fa621f09a7aaad7d1520c591.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-fad6995dafdb43e5ee26d12d1d4dc9b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/icegram-rainmaker-00aaf3a917048a24cf4188f68658ad92.yaml create mode 100644 nuclei-templates/cve-less/plugins/icon-1b71c9c29fdfc5dbc008529fa648dbe1.yaml create mode 100644 nuclei-templates/cve-less/plugins/icon-d0db52345c07a6211225ddd6537e55c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/icon-widget-3d89fb86525a43be8c098b0f455b9af2.yaml create mode 100644 nuclei-templates/cve-less/plugins/icon-widget-8616181357e5ec901fe630838e957487.yaml create mode 100644 nuclei-templates/cve-less/plugins/iconic-woothumbs-de57654257372bbed35371bcf945ac46.yaml create mode 100644 nuclei-templates/cve-less/plugins/icons-font-loader-8140a3945a877628cd9d34a767c59437.yaml create mode 100644 nuclei-templates/cve-less/plugins/icons-font-loader-cecbfeb5d8e878e2a09fb45c42f38adc.yaml create mode 100644 nuclei-templates/cve-less/plugins/icons-font-loader-d61c42f727c04f01365911b7fc14a3d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/icons-for-features-df867e267884badbbf8457b1d7257d5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/icons-with-links-widget-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ics-calendar-13f1e3e1ecb400323f6ac6db56c9c266.yaml create mode 100644 nuclei-templates/cve-less/plugins/ics-calendar-145fd589f9d6e521c8599d0e3d4550d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/icustomizer-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/idbbee-6f26e9f01d61af85a0a5abec46c6e923.yaml create mode 100644 nuclei-templates/cve-less/plugins/ideal-interactive-map-9f41ca20cf9aa5ad6ef84f69ddb6f680.yaml create mode 100644 nuclei-templates/cve-less/plugins/ideapush-147226d7fc59bc73ef79b60eb67e7365.yaml create mode 100644 nuclei-templates/cve-less/plugins/ideapush-99da104892c6f75f32c9288294b2b02d.yaml create mode 100644 nuclei-templates/cve-less/plugins/idpay-contact-form-7-950481457b7608baa20b9048bd054085.yaml create mode 100644 nuclei-templates/cve-less/plugins/idx-broker-platinum-74e3a5823f9cf5e58e6b984ee0054047.yaml create mode 100644 nuclei-templates/cve-less/plugins/idx-broker-platinum-99bc9f10b2d01aa27904e65b8ec6ed4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/idx-broker-platinum-ce70b843af38d7c69c95be8ff1b26205.yaml create mode 100644 nuclei-templates/cve-less/plugins/if-menu-cd6ae30437be0309f27d9b8ec11e2caa.yaml create mode 100644 nuclei-templates/cve-less/plugins/if-so-a5beaca14051398b5a8cac72b33e8606.yaml create mode 100644 nuclei-templates/cve-less/plugins/ifeature-slider-4857da40460f492fd61121c6a3d9ad96.yaml create mode 100644 nuclei-templates/cve-less/plugins/iflychat-8961ac80ff2f49ea02524bf55be03a91.yaml create mode 100644 nuclei-templates/cve-less/plugins/iflychat-a5c9dfe234305fe9b3c82a7200b4785c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ifolders-7c92e9b689e3db3a0760660dea080463.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-4e5782f54b030eb5a442bdadb5799911.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-731244d7e48d469d8250ca7d6169422e.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-87f3d8d7d2e5d0851519c88fc9a636a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-admin-pages-51641e54d4899750cfc0bbb22e59a17f.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-c1259d5d6340f1a9bb2b4b54cbfddf23.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-f282e15c376140f7b66d206f8f96f3e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-forms-0e32b41ab13a7d99daea1bd1091ef1a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-popup-bd8810c05731a418d8d9a50b27d4228d.yaml create mode 100644 nuclei-templates/cve-less/plugins/iframe-shortcode-ff7d4698a1b99dc4dd381f78e045f0a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/igniteup-063e847b7379d721b0dcf7f56e94adc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/igniteup-2d2ac3176c43972722599e2c20bf65f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/igniteup-97d25b3e88007081f13d8a53fc8698cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/igniteup-afb7fcca9f98de3c120709c28d44be7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/igniteup-edf371c1f05d5a891d28a3a64c575117.yaml create mode 100644 nuclei-templates/cve-less/plugins/ignitiondeck-bd77f9a34ba05ef2dc0030989da5aee1.yaml create mode 100644 nuclei-templates/cve-less/plugins/iks-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/iksweb-71669f91f6c03ce43a9b92fdae9360cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ilab-media-tools-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ilab-media-tools-babf60986b5038101853937d0a274e12.yaml create mode 100644 nuclei-templates/cve-less/plugins/ilive-f0b6f9044194846e4b5fe3270faf4ce0.yaml create mode 100644 nuclei-templates/cve-less/plugins/iloveimg-aa275ed39ac05dab3dd3b7cb9e8afc6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-banner-widget-2f83ea3f51d28fac6369a0c731ce68eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-export-f6b963f6eaf79a560e9301150e1dd55c.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-1ec9332e58fa89c17bc632e5c37f8d95.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-34b604e60259ea80e8e107b60855d439.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-3f3452426888f89fbe519623725273af.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-d9744d373611452d7acba4bbb5d5e69e.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-f04fb223e6bc1b82dc5e818d9e40fb20.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-horizontal-reel-scroll-slideshow-09c9edd801d535f8b0dc361310e2bb14.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-horizontal-reel-scroll-slideshow-21bae7dd0ccc10547daf0010edb807de.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-026772a7c84514935eb2f122e1212bd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-23084d0a675ec1fe2de5f06c696330cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-css3-af386a5b7a4c4897059c13e07ba6a1c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ec47480114d271de7f87aec48e42bcd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-f33065d14f70bf7433189e427d984bdc.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-0291dfad8381b24ca3c37e22a37879df.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-2996acb98eba30cde2adfc4ff1d39a59.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-617785fa7c971048a906a08d626203c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-8967ba956e5665f951b5fe05d1b8630c.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-cb1c5b7fa2f66db14c90c48d844c8b70.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-d213e2e9594308f580bdffdb06a3d065.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-eef599f42089077d3f1367aba810ab3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-f12c6444f5c306cf6d2f74b5d9b1f8a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-visual-composer-5dac27116865bf3a33881aeb2e87a891.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-visual-composer-extension-6e8db758b1055e1e1edd16d20fa3c329.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-hover-effects-with-carousel-2cb86c3f071de1232b4e814ea1574dc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-intense-772b71a2d81ce555d5c9a0a38892bb34.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-map-pro-3dfe4a41b3f6685dbbc11ea86f232a73.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-map-pro-bf2853efc06d31fecebbff0926f79cc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-map-pro-lite-8ab353496a7495d9f3fe5d5531e368eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-map-pro-lite-b94ff74e27b8bd0a63b0e4542b5543c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-metadata-cruncher-8c4def1f9e55d275755365eabd5c5c64.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-optimizer-wd-0bbe2e9ad1b1c0a623ea6abfedb5595e.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-optimizer-wd-49d7a3ff674ce6988ed92cbb4810948c.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-optimizer-wd-5ec0f151883e50cc1d6e5241267d511f.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-optimizer-wd-d21df22e38f007a905fafc644bb07ec2.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-over-image-vc-extension-fddf50b89fd6e037cc6266b73dceb03a.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-protector-9fd302216733e7b16fde39fa0da8b2af.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-regenerate-select-crop-165f51757c849b44f8513611b7cd23ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-regenerate-select-crop-20671ddf0d01a43586266ad4cb142fcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-regenerate-select-crop-2ad93b712d25e80c970a93c8b1dd3cdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-regenerate-select-crop-ad4cd5dc655c951abc6de30e0bcc2c3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-slider-widget-45074c545eb15cccfd07e5326ca12779.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-slider-widget-80d3ea73a73811fa5685b240e4282b5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-slider-widget-a2adf408417d5a51a0a77f3bcfcdd29f.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-slider-widget-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-slider-widget-bd950fa0617ccb3a0edff5978b31a09b.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-slider-widget-d5648214fbd82ebd55682a43fc8f813e.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-source-control-isc-1928848d7760fbdf37a1f5a91bc90146.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-source-control-isc-e8d6fd07d9a88fdd12cf1b98b1c2fb85.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-tag-manager-83aa8e470a136322f24cc4f5d88ccbdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-upload-for-bbpress-333e897c2dbf06223644ccfe5dd16694.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-vertical-reel-scroll-slideshow-7348256da9fa27f63ea541c99917352a.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-vertical-reel-scroll-slideshow-f917f02f001372c0ed6a2cbacd402eae.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-watermark-cc02f6870e1e296858d0d36136b32112.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-zoom-285b140dd354e7b55f93f22538da9394.yaml create mode 100644 nuclei-templates/cve-less/plugins/image-zoom-5721436cde7e78cb58601bb592cde002.yaml create mode 100644 nuclei-templates/cve-less/plugins/imageboss-680976f321c5a9425e00ce5d5ee1cc42.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-8578e85d2088d742e36b835c4afa7ca7.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-d16be1a4a8c6ae781f11c50d01685d10.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-e18789f54f5a5fe13b8ddacd79d408fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagemagick-engine-ca0bad06790922b16f5da17ee6db4bb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagemagick-engine-ed507e8efb229061c654187b47c114b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagemapper-575c49a9b04a14a2dd633583f5e6e2d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagemapper-6bb3656a861d0a80040f9af45e87952f.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagemapper-a73f55993da6bf41bdb201284b107f4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagemapper-bceb80496300028196724d32dbd5c249.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagements-7e5494a96dcef18320683cf7875e7118.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-0d90a3576c3d60d102b21bdca9c7c04e.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-0f06a0233bd37a56c0b489be748f0408.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-326d3f5baee82478e64ca11a4a66dbf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-3949ffb8c4e3dc9661a06b8913f55d38.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-433406de2bcd419520bb9dde58f80311.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4b301fc4cf7dbfb7aaec9b6db232442c.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4d89ea84ae0150939c78e1551488e87a.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4f4ea79c6be4308e1d54d5b19b226c52.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-5712ab48057831452538f91f04d0bcb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-57c14e4f565c7eb453e5b4a3b6f91099.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-76976bd8ff1b9e40c5faf1dc6a34729f.yaml create mode 100644 nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-b842b7a1d1bc34dc06d2b83ecd274275.yaml create mode 100644 nuclei-templates/cve-less/plugins/images-asynchronous-load-8646bfab3489f82817e5dfdc71de0090.yaml create mode 100644 nuclei-templates/cve-less/plugins/images-lazyload-and-slideshow-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/images-optimize-and-upload-cf7-67cbbeb086472c18cc998dc3852acd0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/images-to-webp-a060d1379e872ddbb3c1744a92296936.yaml create mode 100644 nuclei-templates/cve-less/plugins/images-to-webp-fe4c9ec6c5f12eda6f85dea0f4ee153f.yaml create mode 100644 nuclei-templates/cve-less/plugins/imageseo-113db7aead34e6d2e16bace92792af9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/imdb-info-box-d08f135748c79437965679674f4da9c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/imdb-widget-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/imember360-0cbcc4f1288df0ee24dd7a2993f69c51.yaml create mode 100644 nuclei-templates/cve-less/plugins/imember360-4e3f3475e7c6375ac0400d146d374b8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/imember360-55d8a21450cbea874f3ebd26e7f32a58.yaml create mode 100644 nuclei-templates/cve-less/plugins/imember360-897a0fa8ed3a14f37db420497ce08cb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/imember360-c40ba36e2109a35c573b2639a4d72291.yaml create mode 100644 nuclei-templates/cve-less/plugins/immopress-f50fe166ad655bc28860751aec7160b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-csv-files-8a6b4336bdabbe2b23943219bba651ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-external-images-3a14f8327aeabf7bf95eb7d9e4c0bcff.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-legacy-media-65f707df02fc4e71880af94936e28fe7.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-shopify-to-woocommerce-829eb8aa5088a8dfbd751ae2143f350b.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-social-statistics-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-spreadsheets-from-microsoft-excel-a4a103535f33f8f1f9687c4a0228f8b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-da2b51f042521776402cd06473b8ac45.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-0c813c83aee456b071e95980f729e012.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-107acb013e3444f157b376a5b20dd408.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-176aadf8b8de4d702eafe02975bc433d.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-1edc06e4c422303e708e12aebbe44cde.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-342fee676d86d87109d08378d8dcd0b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-5bda221acefc04e8d84a3c6e2be5c30e.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-67ac2a423d1da6f86cbac7c3e9485c2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-7ae4217671bcb5c8f6efe46ca1b8db85.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-7e3d963887f74672e4d9f1a2c2d7ff76.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-916825c2b82546703e1e58fc1213738b.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-99e4e1e27563f717d9f8c278b33423ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-aa502aa68695bf7b6ea2b96ba403c6a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-af8e3b1753f58bd7e46c4cccec8f000f.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-b7e40dcc40f790ccf1ceff5a8722305f.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-bd9f222927714cfcc0530ce81d7d73ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-woocommerce-3077bab58115e8abb5971ae28048d12c.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-xml-feed-467a5580ac1383352cd27bfadc2d264b.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-xml-feed-907bd7e9131bb850756aeaa09ab79dfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-xml-feed-9ab53108097247c27c02dfd755c3ffcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/import-xml-feed-fe6825f2b761786a96cd0f4fa3afa83c.yaml create mode 100644 nuclei-templates/cve-less/plugins/importify-949bd129fe1adc15bb7653ff308658f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/impreza-a94493070aaa329d2ae39d70dc712c09.yaml create mode 100644 nuclei-templates/cve-less/plugins/improved-include-page-300fd59e3797ac35e26fb3e33490ca99.yaml create mode 100644 nuclei-templates/cve-less/plugins/improved-sale-badges-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/improved-user-search-in-backend-aa15ef609effcca1e90c81c1a7f1d631.yaml create mode 100644 nuclei-templates/cve-less/plugins/improved-variable-product-attributes-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/inactive-logout-54ce6a774cfd5321930ee4e4fafbd369.yaml create mode 100644 nuclei-templates/cve-less/plugins/inactive-logout-a7d769783ca2c437e9a1a4760da51769.yaml create mode 100644 nuclei-templates/cve-less/plugins/inactive-user-deleter-4b89abc62fd406d908566683e2dcbf5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/inazo-advanced-ads-management-824d93c3c9858047a50ed1387d69356d.yaml create mode 100644 nuclei-templates/cve-less/plugins/inbound-brew-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/inbound-brew-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/inboundio-marketing-7f3a88f3098dde9f2189ea7a2544c698.yaml create mode 100644 nuclei-templates/cve-less/plugins/include-me-7df4ba3c146c5caf3d402ff70333f208.yaml create mode 100644 nuclei-templates/cve-less/plugins/incoming-links-1c5999a1196a6e32d7eacb9ae11f1a81.yaml create mode 100644 nuclei-templates/cve-less/plugins/indeed-affiliate-pro-ab0d13d34dc4621d3f125a7e5e405bf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/indeed-job-importer-738cbcde2d8ae9b069d1cee10adc6b90.yaml create mode 100644 nuclei-templates/cve-less/plugins/indeed-membership-pro-0122e284ef694546ea4cfa00ca4bb4ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/indeed-membership-pro-488696d83423a80a7653f70083bb7091.yaml create mode 100644 nuclei-templates/cve-less/plugins/indeed-membership-pro-c78abe8c9dafca582dd0f5c66a5e2eb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/indeed-membership-pro-d5e71f9286573633246d95fe18c6dc87.yaml create mode 100644 nuclei-templates/cve-less/plugins/indeed-membership-pro-e4eee191046305a40d967ee1ba037cbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/indeed-membership-pro-f7a99c10e9aa1ac19e91036f274d28b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/indexisto-12f4cc2153036a3efd08424c8d4576c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/indianic-testimonial-2804f23c4b5e807222522bde6eeefb47.yaml create mode 100644 nuclei-templates/cve-less/plugins/indianic-testimonial-8a1017de3d1fd72aa86eae06b4f6a456.yaml create mode 100644 nuclei-templates/cve-less/plugins/indianic-testimonial-bc1fc73bd669dca4197ffa756353cd75.yaml create mode 100644 nuclei-templates/cve-less/plugins/indieweb-post-kinds-76874a7b4a83992edc7c544ab3ce90f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/indigitall-web-push-notifications-2c744f500a4cb530f5a915c698c40d99.yaml create mode 100644 nuclei-templates/cve-less/plugins/infogram-b0923245191ee8b19827587a90615915.yaml create mode 100644 nuclei-templates/cve-less/plugins/infographic-and-list-builder-ilist-1de8ccd3e6be5fc258bf58b1985495c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/infographic-and-list-builder-ilist-d3e0f1a758bd59446de5b7d7cf2ab987.yaml create mode 100644 nuclei-templates/cve-less/plugins/information-reel-2e8c881d695b74f611068f96c80b3487.yaml create mode 100644 nuclei-templates/cve-less/plugins/infusionsoft-731c10dcd4a65ca76382b001a77071bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/infusionsoft-8a7ecb10c894553e29bd44217c769b5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/infusionsoft-eb2bb0feddcf3b5f17093cd80034744c.yaml create mode 100644 nuclei-templates/cve-less/plugins/infusionsoft-landing-pages-31325fd9d39a9b170e5825b91f943680.yaml create mode 100644 nuclei-templates/cve-less/plugins/infusionsoft-official-opt-in-forms-3c962311490d35eba5d44b2a55482b65.yaml create mode 100644 nuclei-templates/cve-less/plugins/infusionsoft-official-opt-in-forms-fa11673c89d7f49c85f8e69d02b295a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/injection-guard-3234f0a051e8628ee55bf3e418168da0.yaml create mode 100644 nuclei-templates/cve-less/plugins/injection-guard-a1f2a5e3cbcfc5d5c7da00302ff2ad5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/injection-guard-ca5a202b7756a1fb685216ed26367b36.yaml create mode 100644 nuclei-templates/cve-less/plugins/injection-guard-f1d5eaff1a5d538327565db0438aa59a.yaml create mode 100644 nuclei-templates/cve-less/plugins/inline-google-spreadsheet-viewer-1f04a4a11c02a582deff94a7681096d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/inline-google-spreadsheet-viewer-9f8810cd387382963f3ea98eed877722.yaml create mode 100644 nuclei-templates/cve-less/plugins/inline-tweet-sharer-44d79c88f80918a39ad3735f87916ce8.yaml create mode 100644 nuclei-templates/cve-less/plugins/inlinks-94786cf22c04d1dd0ce4fe28ab98e98a.yaml create mode 100644 nuclei-templates/cve-less/plugins/innovs-hr-manager-e14959fa43bbd40e929542fe49cd89d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/innovs-hr-manager-e6fb630fd086e11cb5135f0bd10ba86b.yaml create mode 100644 nuclei-templates/cve-less/plugins/inpost-gallery-0001e462386fce9c0f630ec016ad34e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/inpost-gallery-ad4acbb771f45212d6935861fe1f4c55.yaml create mode 100644 nuclei-templates/cve-less/plugins/inpost-gallery-b3a55c8660f19eddef4075e293b358ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/inpost-gallery-ec29185ed2f65e10921961a5788cf99a.yaml create mode 100644 nuclei-templates/cve-less/plugins/insecure-content-warning-bc55ea7b509124d1a77831d4400c5030.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-estimated-reading-time-027f8eecce0a5762cf1bc3cc2ca92e8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-headers-and-footers-759e637db585d6ba715dddf7878712c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-headers-and-footers-88444b55ba593f6267560d3998cc950b.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-headers-and-footers-b12b3184228f1ba6313c71b9719c05ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-html-snippet-605d1764c74abe695c069cdc63cb4675.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-243ee6cead272cdb6dc2ad831bc4986e.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-867b85000a9162268b1ddc0673082505.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-a841f648b0bdbeeaa745d6da10e2cfec.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-pages-20a34e507c4fa6283c8c06e9c7d18117.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-pages-474fa03f5b39570acd09bb99c310528b.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-pages-888c0d96bb5c45a5559094f92be9b42d.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-pages-91f8f23098584a64320691c5f2d0c50b.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-php-57aad3805a9f2a510911c9b341933d75.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-php-57e5d2556ce7902a3bd2de5a68a6b052.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-php-8874a81b9a5f337f94a87e2812a49701.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-php-c3c6968289de386f0f53996017935a1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-php-code-snippet-2f6907ee5c2cac6fd791f40374c04e13.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-php-d815b281c1937dc0ed5e942ec305999d.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-1951707b594e6f4a4e8e4243b43c9841.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-54bc1daf26907dc59a5c7876a142ff1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-73081b1f6f4e13a9e6e969eba5e746fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-76a587735289e9eac6af28d246d8763a.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-8de18da384e81ad90d91fef5286d3d00.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-bd26ccd939104e13f73f569b312459d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-dddfaf0e8fc5a7c4646ae5e0730589aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-fbefbdad33b922acaee6e93ce44b4409.yaml create mode 100644 nuclei-templates/cve-less/plugins/insert-special-characters-fd9bc570df9e6e1f10861293d27d4049.yaml create mode 100644 nuclei-templates/cve-less/plugins/insight-core-f70ed327fff0a742246ce2b66447d100.yaml create mode 100644 nuclei-templates/cve-less/plugins/inspirational-quote-rotator-2a97538728d15bbfb55e66c4649885a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/insta-gallery-a977aa9a4c9e6ea956efab1274f3c128.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-feed-0dd37aac0a819da40009a99efded6eee.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-feed-3b223b70daf0d7ac552ca602835403d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-feed-92423e2553300e9755a17988ed907ec5.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-feed-ac43cf44566479227a4aa05f1f51c953.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-for-wordpress-b915266e3686714da03f11dc90c6893b.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-slider-widget-10d8aab37d3fb12eedaaa7fee9be8657.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-slider-widget-645aa6781f30864a3df503fc267b46f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-slider-widget-965089db43408987ba593ca76bdc2587.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-slider-widget-c1eea16a6a1e7ef59fb346fe87d0a93d.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-slider-widget-c4bb8ef855ed7d5677231037db6f41b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-slider-widget-d922f6e78e39c496155eaa17b9a13762.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-slider-widget-da62044dc6f8ab5a6043df4bc628475e.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagram-widget-by-wpzoom-76fc4346fbb39fa45316aca65b7d5177.yaml create mode 100644 nuclei-templates/cve-less/plugins/instagrate-to-wordpress-87fe64aef58d57af2256ba27b8518630.yaml create mode 100644 nuclei-templates/cve-less/plugins/instalinker-73153b823b9be5fe13ce41cd22919fc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/instant-css-0dab0a18a0d2f3a2ca1ecadfb8dd6931.yaml create mode 100644 nuclei-templates/cve-less/plugins/instant-css-417113d5b23fd45edbcf8209f3cff8e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/instant-images-4c925e8fe2ce8185ac5a57769f1ea714.yaml create mode 100644 nuclei-templates/cve-less/plugins/instant-images-c57f6caa20d50f7b5d4102cef52235b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/instant-images-f64da1b37b4c50e68b9872eff4ca509b.yaml create mode 100644 nuclei-templates/cve-less/plugins/instantio-09460681bc2a62e560d71252df4526a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/instasqueeze-be25df600efc2e679e203dcc1fd3ddd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/instawp-connect-01cdcfbe9023d856c9c893d0a0c324ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/instawp-connect-124137503555ee97714094a30a8333d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/instawp-connect-18e3fa8b070375c158cc068ed4175205.yaml create mode 100644 nuclei-templates/cve-less/plugins/instawp-connect-26e6b2b2c87cae333c1a6a8f12b3eb26.yaml create mode 100644 nuclei-templates/cve-less/plugins/instawp-connect-54fd19cb983e5e5bd13d627c9c0487ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/instawp-connect-6e954d80cfdd10ddfc11dcc5cbf99755.yaml create mode 100644 nuclei-templates/cve-less/plugins/instawp-connect-bb8913e248b8c353b00d004e9ca5f930.yaml create mode 100644 nuclei-templates/cve-less/plugins/instawp-connect-c2f1285e4dfc6b400991c24ccadd137a.yaml create mode 100644 nuclei-templates/cve-less/plugins/institutions-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/integracao-rd-station-29636b68c2f3ab161e7a045474b91034.yaml create mode 100644 nuclei-templates/cve-less/plugins/integracao-rd-station-54337cab42839ec3b613ba98b54eca17.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrar-getnet-con-woo-e39068416a4f471cfb854a8f2dd045d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrate-google-drive-2143d39c6a447e17fa955c9d29e9190e.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrate-google-drive-38e83b9a6a4293b21b59d418e1822477.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrate-google-drive-adb3487b4c23d4db1d3efcc4576dd222.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrate-google-drive-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrate-google-drive-c380050a7e76482fb19d38cf49fcde28.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrate-google-drive-cf6efc26f721b1dd6c09ef244ad0a9a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrate-google-drive-d69e956d6cb0947d53013e6316065cae.yaml create mode 100644 nuclei-templates/cve-less/plugins/integrate-google-drive-ff1168e2daec3177aba99d51eda07164.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-dynamics-0bafef3453580e19c740978e87d842b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-dynamics-0cdb0f49e1ffa1eb7fca32892dfdaa0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-dynamics-690b7012c329e2797db5ca1ec55c54f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-dynamics-9d49312a2bc1a33dff873907673334c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-for-billingo-gravity-forms-ed2236ee570598966dd60e4e75f31def.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-for-contact-form-7-and-pipedrive-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-for-gravity-forms-and-pipedrive-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-for-szamlazz-hu-gravity-forms-ed2236ee570598966dd60e4e75f31def.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-for-szamlazzhu-woocommerce-f7bbd778de1c9c53d31f5ab55d2c4192.yaml create mode 100644 nuclei-templates/cve-less/plugins/integration-of-capsule-crm-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/integromat-connector-4f39f823882301049a61a7a769c354a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/integromat-connector-62a6954a02895633b5b6c39ba9526043.yaml create mode 100644 nuclei-templates/cve-less/plugins/intelly-related-posts-8c51431cbfaf267d31cca7fde89367e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/intelly-related-posts-b1a9125711cb68f9ebd1c9d6ec3312c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/intelly-related-posts-b76f091c58ac292a18fb46e2a8af44ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/intelly-related-posts-defb0310eaae752bbe598525a0823968.yaml create mode 100644 nuclei-templates/cve-less/plugins/intelly-welcome-bar-43e66df1f9172a258f7b4833c10ba64c.yaml create mode 100644 nuclei-templates/cve-less/plugins/intelly-welcome-bar-a6bda315d152fc26cd48ceee633dd87d.yaml create mode 100644 nuclei-templates/cve-less/plugins/interact-quiz-embed-8e5650d777bfcceefcb0d09b97742288.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-62c7b160f34bc3f3dc184557c1c06a9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-6daeff7e508f05aeef343934c15a7178.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-d37560ff6c6a3603574d27509821e565.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-d875c7330364cd8c2a286deccf313956.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-f9ee3cd75d7f36da24c7816038266548.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-geo-maps-18a9792159e3a4315eefb0545c165734.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-geo-maps-6b38cc619c1f1d13c6fce974aa8b5a90.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-geo-maps-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-image-map-builder-d58b2eb7209b77e10a0a7be6a3ad7570.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-medical-drawing-of-human-body-162fd1b80a689c044d519624e2cd6bbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-medical-drawing-of-human-body-205de06070622aab10eb1bdf566b37c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-polish-map-a73b50da5126e009aa2afaa408141c1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-world-map-24f9c4426e1ded4bbcd77cb8ae480628.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-world-map-63308829f599612b4399930582e4c79a.yaml create mode 100644 nuclei-templates/cve-less/plugins/interactive-world-maps-e458b043b3a8331f4ddf5924d17ccf2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/intergeo-maps-51944a4f6212afc8f585f1bcea51f2d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/internal-link-building-plugin-5f27ace6d76e064e4061fdf808767b2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/internal-link-building-plugin-b83d0241d6f20c42a973f309878a9cc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/internal-links-75603149f92181c053a67aa413d7458b.yaml create mode 100644 nuclei-templates/cve-less/plugins/internal-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/intimate-io-cryptocurrency-payments-d27b7d21b5912a09ea3805333b4f7140.yaml create mode 100644 nuclei-templates/cve-less/plugins/intouch-5a4ceeb56cff119df02b4014ab6dd0d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/intuitive-custom-post-order-18457ce0add8e02185ec82dfe3cc1c14.yaml create mode 100644 nuclei-templates/cve-less/plugins/intuitive-custom-post-order-5fce0179ad5dd3fa3f22de628e08db06.yaml create mode 100644 nuclei-templates/cve-less/plugins/intuitive-custom-post-order-65d0be98fb7fe486ad93703d74260aa6.yaml create mode 100644 nuclei-templates/cve-less/plugins/intuitive-custom-post-order-7737e8caafd57ae5760281e5e46a68d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/inventorypress-6001aefe4ed5d867371bbaa565b1d288.yaml create mode 100644 nuclei-templates/cve-less/plugins/invit0r-2eafd9fb11071a8b513a28c962ba9483.yaml create mode 100644 nuclei-templates/cve-less/plugins/invitation-based-registrations-d4a44b7e5865ae371b4706ab716f5f69.yaml create mode 100644 nuclei-templates/cve-less/plugins/invitation-code-content-access-7dabd50801a5dc21167037bc053f6e5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/invite-anyone-378de5a4c8a761e6f865e9b293282366.yaml create mode 100644 nuclei-templates/cve-less/plugins/invite-anyone-93d72496faa88a41ccc6451bd803706b.yaml create mode 100644 nuclei-templates/cve-less/plugins/invite-anyone-9ebec4016a51c98a2dfc38226d295089.yaml create mode 100644 nuclei-templates/cve-less/plugins/invite-anyone-b2bde61925d9704f5bb5670b30295470.yaml create mode 100644 nuclei-templates/cve-less/plugins/invite-anyone-b6ce0f1beb89a33f3441e294aa1dd412.yaml create mode 100644 nuclei-templates/cve-less/plugins/invoicing-7c4b664dcbab81960496a17b3a66e44c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-address-blocker-140887b5bfa7dc561500c7685b1acab8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-address-blocker-772e15bdf31248d6b001fc7f14d684f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-address-blocker-c2d506865b475e467cd410bd4ff9f703.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-blacklist-cloud-25db80928ffd18548f83a78d2fb47f0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-blacklist-cloud-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-blacklist-cloud-77e9594ea9c5da95d048b98c87af20b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-blacklist-cloud-aea3cbfb921c1d1330c879b8f85a35d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-blacklist-cloud-b7df280ef92a1ac8dd61f73a5d009cd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-blacklist-cloud-fbcd8cab0390c5423cc4977a1f1be996.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-metaboxes-88404ad5e8128c3699e3c229a21a2eba.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-metaboxes-c712eff3f3bb4a9cd97ce6c7063fd4f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip-vault-wp-firewall-80529a3b54852ed1b40d1078928149a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip2location-country-blocker-0c5a993c7be9746c745f0f9869cf8fb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip2location-country-blocker-28eb2dd9b394a6991989e0316614fa07.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip2location-country-blocker-2ac275b541904e5481df890267e095ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip2location-country-blocker-9ce1e54ae52ee82869377cad0e1b6dc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip2location-country-blocker-be59e4061d41f159389c5e0a45f572cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip2location-country-blocker-d1d5e763ed41a49986eaf738181a98d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ip2location-country-blocker-ea51da120356d8e0bf883fe872498f8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipages-flipbook-1ae1b0bb4039a24aa303fbc722996071.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipages-flipbook-238730b48c414c2efa3f90f95ede4e1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipages-flipbook-62025420139d5dbebb6173b14d6b099a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipages-flipbook-ffe84a5da8ea35eb24ec280a71f71719.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-176b60254015c7171bdde001bfef506b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-718a86b8fb614bfca1d835a5b1869915.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-93a89e746de1b01ce58a8098e6937879.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-db0b66a5d47c2843954a651061f51619.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-ed97130cf4e3c437fffae83fce6da395.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipblocklist-24ffe594d50f8ec966de3f6d9723e35a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ipushpull-1a055ae19ed953176d3ae4b152c78d6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/iq-block-country-13327063860a0ee0e2e86f1e87898320.yaml create mode 100644 nuclei-templates/cve-less/plugins/iq-block-country-7a55d1c425d19f06030ed735a34d912e.yaml create mode 100644 nuclei-templates/cve-less/plugins/iq-block-country-93b718d7dcd910cc3c0b3209a78fa52e.yaml create mode 100644 nuclei-templates/cve-less/plugins/iq-block-country-c5db51e5f06010fca4f5938a5e56cd39.yaml create mode 100644 nuclei-templates/cve-less/plugins/iq-block-country-f1c8fa61b4af4443e96dfc38c36b4af9.yaml create mode 100644 nuclei-templates/cve-less/plugins/itempropwp-1b30aff662020c0b4f39f0c4b04b2958.yaml create mode 100644 nuclei-templates/cve-less/plugins/ithemes-exchange-f7228bc923e4f7e6b922e94dc9e73ec2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ithemes-security-pro-b5b87b7676de117a8342f94f403bc1ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/ithemes-sync-8253ee833cb2687572180cd975dbf588.yaml create mode 100644 nuclei-templates/cve-less/plugins/ithemes-sync-885b35b00352c80953df3eed541d0a97.yaml create mode 100644 nuclei-templates/cve-less/plugins/ithemes-sync-9c48f849b993eee3990baaaaa12643ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/itwitter-d22a628e60dd0e0e47e495ea9eb75413.yaml create mode 100644 nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-34076a9fa6889f09a1439513a52a8cc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-b904514033ab5aab0d8b6cea6480c116.yaml create mode 100644 nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-e4dfba623e207111ac2894d0b05e0171.yaml create mode 100644 nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-e70ae286a6778ee45405a4388b04fec9.yaml create mode 100644 nuclei-templates/cve-less/plugins/iva-business-hours-pro-f3a11b810db2dd0055915ce0cd13d43a.yaml create mode 100644 nuclei-templates/cve-less/plugins/iwp-client-05f450dd8aa4062aa24fbf2823c60c4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/iwp-client-6a236c689e15bb7cc8c51fe8f71c025e.yaml create mode 100644 nuclei-templates/cve-less/plugins/iwp-client-6b04f0d74c9f2eb38243b412d23f2013.yaml create mode 100644 nuclei-templates/cve-less/plugins/iwp-client-701517c521fc506e2ba1ce37a6b5effa.yaml create mode 100644 nuclei-templates/cve-less/plugins/iwp-client-79054d990e7a7a32c990ccc921c67cf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/iwp-client-c4e23e67727ce074f425f39975da1652.yaml create mode 100644 nuclei-templates/cve-less/plugins/iws-geo-form-fields-9f8f05e27cd509d186ef8ebf6b358ad1.yaml create mode 100644 nuclei-templates/cve-less/plugins/izeechat-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/jackmail-newsletters-0f6f97ec8d1cc89cf7cec3ff35c09656.yaml create mode 100644 nuclei-templates/cve-less/plugins/jayj-quicktag-a6cb60a315c6c7a94894e2123d4f4da7.yaml create mode 100644 nuclei-templates/cve-less/plugins/jazz-popups-d1c49397ab5d1626905204217983db24.yaml create mode 100644 nuclei-templates/cve-less/plugins/jazz-popups-fd8f4b76d0911973d7f68d0007d8b9f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/jazzcash-woocommerce-gateway-4d6bafb19843bc6d71a91327064ee112.yaml create mode 100644 nuclei-templates/cve-less/plugins/jc-importer-6ceb62cda68f33df94c6d2d8223676b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/jc-importer-70ada96da95be698f6717e6048a6ec59.yaml create mode 100644 nuclei-templates/cve-less/plugins/jch-optimize-529055d3bc8d484bb022631bf8a543b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/jch-optimize-7438f6c5de0164c1ebbfea6f43fc0dba.yaml create mode 100644 nuclei-templates/cve-less/plugins/jcwp-youtube-channel-embed-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/jds-portfolio-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeeng-push-notifications-9f87cf742669dcbf6cbaabec0f8d8908.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeeng-push-notifications-c5989c384ff1fa34fed277024ca7c660.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeg-elementor-kit-045b6020dfc1ed99134f3177a28e643d.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeg-elementor-kit-0b6d48f80755becad907191d56a4faea.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeg-elementor-kit-1429d93adf30ca5583ea8a8bc67d75f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeg-elementor-kit-39f38e457d08269c0a24a582767d3dfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeg-elementor-kit-8abead7c575d5ff9d8bcc0c1daac4379.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeg-elementor-kit-9ac2eb6aa79c6ee262cfc473810b750d.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeg-elementor-kit-a2e686465d8672ec5bf29632e66237cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/jeg-elementor-kit-fc806cfd6ed4dc072c39a0980e8091bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-blocks-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-blocks-d0c27f042f57c6d16293a23758983b37.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-blocks-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-blocks-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-blog-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-blog-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-blog-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-compare-wishlist-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-compare-wishlist-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-compare-wishlist-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-elements-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-elements-7ba0ab8627448e04a3557ed6ccce144f.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-elements-cdc0a1afbf2cc009eea0f7deda8a5515.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-elements-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-elements-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-engine-1671dddc3e7743782d8ec72b0e2ab60c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-engine-23ba9e8ddbee95a7030ba5db7648376b.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-engine-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-engine-f12b5bbfc5d1dcce9a91a5751dceea95.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-engine-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-menu-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-menu-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-menu-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-popup-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-popup-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-reviews-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-reviews-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-reviews-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-search-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-search-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-smart-filters-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-smart-filters-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-smart-filters-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-tabs-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-tabs-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-tabs-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-theme-core-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-theme-core-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-theme-core-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-tricks-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-tricks-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-tricks-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-woo-builder-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-woo-builder-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-woo-builder-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-woo-product-gallery-320a6f011d285ddb19c436d57e994504.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-woo-product-gallery-dfd0d896b1397455913caf7f911dd62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jet-woo-product-gallery-fd87adc782adc661fc2721ea4df8055a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetformbuilder-162aad8c1f1a67baa5f70490c52d6e30.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetformbuilder-49120404cfb8d5621438564fe9eb32bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetformbuilder-5af33f7a1d49eb666342cd85959401ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-056f71c24acbc6635e313f4c349ddfa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-0e86932241c6ad3f70627e02c54dbc31.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-26ecdaccaffefdf8e29ddd7078f1caed.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-2be7d29f9bb984978a5f99c0ed30a7ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-679cd3cb1279c50b5fee2410e1fd3f6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-67e0a9fec932f5d791c2a1af30baf3c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-72d92c55ab230f31b35329569f6860a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-8018c4071bf114403387ecc74840b848.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-9df4fd409a4edbb8572536db3f6715d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-9fc3c2f298b108af257176fa3092141b.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-a3ff2f778a78f56b1a077199729153f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-aad57ee588ef69bf0761243cceff43ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-b0d263ca65579d9d14b154cf891cd65e.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-b9a10340d1ee615f8f2aaccc216ca7f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-be7859a3dd693882ff3dd8991a70f093.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-c792a1156e3fd0f41d681016940dc814.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-d4b5db96e8a4cb8dde234da2c8c95905.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-da2fe024ebfa193aa99df991321c990c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-e9445f5977de7568ced6d296abe4edd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetpack-fe6364297dbbdebcc849affd9cb5e248.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-47cacf238b136edb1857adcd228879bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-600dd698b59252da2334c219e30a3a4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-93b41408a78e1823934fe3d9ee7379d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-c3fb6f2c99d4c5f13096c4775a849201.yaml create mode 100644 nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-d9a90b73211e016b68ca1b3072e7a420.yaml create mode 100644 nuclei-templates/cve-less/plugins/jh-404-logger-df91ebe73a45ac966511f7792447be75.yaml create mode 100644 nuclei-templates/cve-less/plugins/jiangqie-official-website-mini-program-f73561aa7a756a9f3e5287e2a9bf11ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/jibu-pro-1318af711c3fe0fec9bc7d351421ab5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/jigoshop-store-toolkit-95537a5037076723ccef81d1fba789fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/jivochat-557dc76e2c2294cd33c5721f9ecf01e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/jm-twitter-cards-9ece1f8354a7e11befbd20ae11f9cc95.yaml create mode 100644 nuclei-templates/cve-less/plugins/jm-twitter-cards-a147e2c0921b88394b88f70de0b50255.yaml create mode 100644 nuclei-templates/cve-less/plugins/joan-385d5d7a4b24b938786ff7b93e4cd0be.yaml create mode 100644 nuclei-templates/cve-less/plugins/joan-60783d04ed031e1d13d6ec674c133657.yaml create mode 100644 nuclei-templates/cve-less/plugins/joan-ae19aa47eef9d7207f8ff256c3445ec9.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-board-08107665cefdd5cc4f288c7614f8ef39.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-board-e28ca962e4f58cae156935f08c9eded6.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-board-vanilla-4b6c5be1fe7b22ce9d31baa1ab6b6513.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-manager-10474b54f82207cb48d47efc5316fa08.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-manager-21f007f5ea27a69827ebd1e3bdac836f.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-manager-72d88d4156b62bb9e1abe8555a4604f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-manager-93a7a8515ae48a00a314691190815e8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-manager-988317a2aa68c393854967dc4677ab3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-manager-career-02ae5a0409f3bbd65473e557e495c850.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-manager-career-27d8b6ae177490f4dc5980ca233d4dfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-portal-c57a50def1ef305a4e8acb9063bb5142.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-postings-654c8b4c06cccd2b893fe7f42cd13fff.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-postings-d91c4b972affa20bd870d04861c77d26.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-postings-da0336a411f4f619331fc9d86a24bec5.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-postings-fe45354b8faab4200224637d8bf8497c.yaml create mode 100644 nuclei-templates/cve-less/plugins/job-postings-fe5cb5dd50547aaa395139fc837a5f8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobboardwp-bd931f434035df45531eaa63d35d55b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobboardwp-dbbebd9fd091a5f8a7900f65f6287602.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobboardwp-dc882a54ee21adad00f3c37faa34411b.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobboardwp-f86d763fc59c0d8f05b12bd8ecb8244c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobcareer-00ad079b8c94204c38afc1d934554333.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobcareer-8605cf70b09f39b80921d3235eaa5a54.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobcareer-8b266025d0f3695c542ad07de2e9b34c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobcareer-b9eb31c713b27c04fd47230e22de33c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobwp-5aa8b17a95e784f5419ee88ce9b3c1f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/jobwp-dd54b2279f8b3539fee1aca11b3b21e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/joli-faq-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/joli-faq-seo-cca32e49d162555543a6de6d18516ab9.yaml create mode 100644 nuclei-templates/cve-less/plugins/joli-table-of-contents-01876089e61a6c3ae9cebc874b7fb7a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/joli-table-of-contents-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/joliprint-6e37ab7161cd9f2422895355af697330.yaml create mode 100644 nuclei-templates/cve-less/plugins/jonradio-private-site-584f7ea1f5eb53a996f78e6bd4374fc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/jonradio-private-site-a1936a4a25a96962401af7be405882a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/joomdev-wp-pros-cons-fcb752a84e136c08d10cbe281ed9acb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-00536c9d692bf537f783adb6446f271d.yaml create mode 100644 nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-072c39710eb7dbfbeb82cc60cf47874f.yaml create mode 100644 nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-14278d198b70b2e64cd570f29581f83a.yaml create mode 100644 nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-16ee5e237a73d66076fd3bc3cb313106.yaml create mode 100644 nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-dbd794ea76909c06feaaa4b067d9c221.yaml create mode 100644 nuclei-templates/cve-less/plugins/journey-analytics-6d795e6331799c55a6d3f3098ce86d6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/joy-of-text-7d7e63bacfe422d65219ef49f5f2b1e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/jp-staticpagex-e67b32cb7aae592e15f89a10718ce09e.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-accordion-slideshow-08b8cede6b6ee0e0f3a91f475dfd1447.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-4783eb0d865a9f683c0f42594f272a3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-934106ff95d7bc443b715a08222f1f73.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-fd0ae4740c5dfc4422b8f4b3f77edf83.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-html5-file-upload-3040cc77a4a179c9ac426a7d4d300237.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-html5-file-upload-320dd95c1c6954f0769e8bf06822a1e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-news-ticker-179abbcb3a9b789dc00b8e0d8f532b6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-news-ticker-ec203a9e69230c2878eb1812f2101d77.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-reply-to-comment-4ce88d432edfef73000dd57a527803fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-t-countdown-widget-cf29ff4800b24e4ea96e524c408240d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-tagline-rotator-eab9e4fbf9582fd0da43dce31000dce5.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-validation-for-contact-form-7-fdec704444e3056cbaed479252db31c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/jquery-vertical-accordion-menu-c27c21f00fd5cfc7fcc406cc847e2987.yaml create mode 100644 nuclei-templates/cve-less/plugins/jrss-widget-265315e822cdfb8b9ba73135a9d29277.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-css-script-optimizer-9b9750afc0fcb77fca6e9424d2ce6b98.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-jobs-1f7578af7b08d6f0682dfe557a69cb45.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-jobs-23c92f364f22c50ebf1609484d67aa5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-jobs-9b43630f5837a1e7e35ee3f5d5c853aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-jobs-e2ad97f33f7abd91ea501d6e3cf80275.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-jobs-ff8fca95ef812c976ae31e630ef4e2a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-multihotel-107b72d2008fc8b953e147cb55e0c002.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-multihotel-3be3c98bb23ebc942163786ddfe2ad5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-multihotel-c6f1bc8dc593e94f4ca6205f51ff1930.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-multihotel-da95e93b8f550605e02b61a197352c24.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-restaurant-bdb0f91704ac2d68fedc7edd41a87d1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-05e6db992de66a60c66b532d0b52e5c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-0cf1772d2edd6248b5e99ca545774eec.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-10beccaa7efca5aa61a354cb6243cda6.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-1a072d8df8f66c1d4b2649edb7db538a.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-32e7faa52a05f68e7c002ae73c9e64c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-37413a766ec0b67c1d3586422811e23c.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-497602ea4705020cbc78a0b19d427eba.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-8bc92a63825b5e282b7e5f164f2d0274.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-cd695a94c9ddf898661512e7b5a151f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/js-support-ticket-dcc8e30c059ff6154a44599d32e5c2b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/js_composer-16bf911b12f5300e0830fe4fc1eb1ed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/js_composer-538a8622c152b16ef2caeb53a8ac1ec1.yaml create mode 100644 nuclei-templates/cve-less/plugins/js_composer-83ebb5cd5f6dc281ececf75915c27b14.yaml create mode 100644 nuclei-templates/cve-less/plugins/js_composer-86b92217e832cff4cd144076070304be.yaml create mode 100644 nuclei-templates/cve-less/plugins/js_composer-9af98782950e2bb2fdcec622ba259511.yaml create mode 100644 nuclei-templates/cve-less/plugins/js_composer-ad1820dedb4cef27ae24befa1b1daeac.yaml create mode 100644 nuclei-templates/cve-less/plugins/js_composer-f10d7adc04b5a73f4d72dd21d3e9038b.yaml create mode 100644 nuclei-templates/cve-less/plugins/jsmol2wp-0c697c5c96080eeecc8327290c3e4bbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/jsmol2wp-8f85626a3667c9d85d3c399330a92186.yaml create mode 100644 nuclei-templates/cve-less/plugins/json-content-importer-727fc100f15758606ba9bacc049862be.yaml create mode 100644 nuclei-templates/cve-less/plugins/json-content-importer-adbb6fa0fc2db14e16c1a1b09c0380c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/json-rest-api-017e173f787a75af41e99e7c6b2e153f.yaml create mode 100644 nuclei-templates/cve-less/plugins/json-rest-api-5e1efa6ead2e9d16598b6140024797d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/json-rest-api-9d1887b8622dac2bd15f04e82a194689.yaml create mode 100644 nuclei-templates/cve-less/plugins/jtrt-responsive-tables-188621df0287aae144c1602d133b6eea.yaml create mode 100644 nuclei-templates/cve-less/plugins/jtrt-responsive-tables-8a2f1e9cb4e65657070d3644661c86c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/judgeme-product-reviews-woocommerce-e8b437aec6c6d5cf835be562d11e2a03.yaml create mode 100644 nuclei-templates/cve-less/plugins/juicer-1856c5e867bf1d120f63e6e0b7edcd33.yaml create mode 100644 nuclei-templates/cve-less/plugins/jungbillig-portfolio-gallery-0f097e6e2a639803a729d611f2124080.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-0fb4e97ee7da5e51631d72f53857a9d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-6263cc6815827a2dcfc05e4efb3b62b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-723d96df6476235c8369c3ebff502325.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-7a177ce424b4ca9311638c336fb2a0c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-8c6a911c1599b488ff2e4c85e8723fde.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-b223d684e1bd83784af3dae666ad9edd.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-bf3d966b9ad3caa6240cfda0b540df5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-bfeb7be408c868527d6e4e4ae715a094.yaml create mode 100644 nuclei-templates/cve-less/plugins/jupiterx-core-f3750481cefda659186282ffd61f21aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/just-custom-fields-2e06d0c89a5dc3c234768757cec7f855.yaml create mode 100644 nuclei-templates/cve-less/plugins/just-custom-fields-35c9285e319e0fd8c44eb8868930cb11.yaml create mode 100644 nuclei-templates/cve-less/plugins/just-tables-5fd0b28040a0aa5ee65912fc0591e5ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/justified-gallery-421ff303fd144872eafd938e0ed53208.yaml create mode 100644 nuclei-templates/cve-less/plugins/justified-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/justified-gallery-d3b5c660c8e70bcaeca06e534455619d.yaml create mode 100644 nuclei-templates/cve-less/plugins/jvm-rich-text-icons-cbde558e3503539352816240255a9c09.yaml create mode 100644 nuclei-templates/cve-less/plugins/jvm-rich-text-icons-f64345cda7b5204d1b37828da4e7e5ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/jvm-woocommerce-wishlist-dcac032f7f8635bf04a2ba3e28463625.yaml create mode 100644 nuclei-templates/cve-less/plugins/jw-player-7-for-wp-8564c9ce49cff70553493d3be285f932.yaml create mode 100644 nuclei-templates/cve-less/plugins/jw-player-plugin-for-wordpress-1762eb5f09e878b42fb55a3fe0a86976.yaml create mode 100644 nuclei-templates/cve-less/plugins/jw-player-plugin-for-wordpress-748f56889fa9468d09334c5315ffc76e.yaml create mode 100644 nuclei-templates/cve-less/plugins/jwt-auth-b4373f75cd045c6c032603b171a73598.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-145ab093189c598c1d7c84674ba9b14b.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-19fda0443580ba364718d6332aa05bd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-1af00ca27a5fbf01cb83385e2b154d55.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-1ed8420474aea4653c484035b79e8e05.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-73e0ed91223d9a0bf611aaf9c6ef87bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-7c903975cddce5bde1f01b5dccfc9d5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-7faa2f91e19a5cd476ef97768ff54f4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-92efa25c2b07bccd1145767fcc736dac.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-ae54bb23e01b89e4ec06d2fb932844c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-b108894447f4647f7c71dc35d7e7ee8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-e67596c37a8f5cfdbaa53a0b072da6d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-blocks-f0d72e9f2bbc50f42260a8f158b94cfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-starter-templates-884840a442619cbc5a7daf95f85cb6cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-woocommerce-email-designer-50843d38ad4401e3655e1238a9807eaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/kadence-woocommerce-email-designer-6994b89efe7c786e6720a2413c234aa9.yaml create mode 100644 nuclei-templates/cve-less/plugins/kali-forms-171d068f6ec1f7c5f7f36a222d7d8329.yaml create mode 100644 nuclei-templates/cve-less/plugins/kali-forms-51a3f66be32afef58cba4c10f2a34acc.yaml create mode 100644 nuclei-templates/cve-less/plugins/kali-forms-5837868c169d6f2b8a500d8da35501e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/kali-forms-7de52979e23084c59771c8210cf92e97.yaml create mode 100644 nuclei-templates/cve-less/plugins/kali-forms-a8effa5bb19e2446851feb68b5c40364.yaml create mode 100644 nuclei-templates/cve-less/plugins/kali-forms-b8ab2dfdf20e4fafe82ff439f5e1b3cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/kali-forms-bba8cb47607da11df10938d143f38653.yaml create mode 100644 nuclei-templates/cve-less/plugins/kali-forms-e13af05b11fa3359bbef7b6fbbcbe782.yaml create mode 100644 nuclei-templates/cve-less/plugins/kama-clic-counter-703cbb2bd8ca38850245b92d6dc648dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/kama-clic-counter-738043af82effea7b721b2ac598247ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/kanban-0ba2d63b51e45936904968ed820d3fb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/kanban-437b56ebf4aacc7667a38732c9abf4be.yaml create mode 100644 nuclei-templates/cve-less/plugins/kanban-b7ae92a9935669b4053689b9e0cbb221.yaml create mode 100644 nuclei-templates/cve-less/plugins/kanban-c02729e12026bce3dd84d6631a92ade6.yaml create mode 100644 nuclei-templates/cve-less/plugins/kanban-f1213197a267fd7da7cf35e16e4c4e64.yaml create mode 100644 nuclei-templates/cve-less/plugins/kangu-44460dbeb7b8e704694c0ff2206a0cbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/kanzu-support-desk-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/kaswara-405127e1ba90a2b29eb154a026e5d142.yaml create mode 100644 nuclei-templates/cve-less/plugins/kaswara-40b261f9e620f48d7e973396d17f1ef6.yaml create mode 100644 nuclei-templates/cve-less/plugins/kattene-668f9a8a460ad561a2838627b58d495b.yaml create mode 100644 nuclei-templates/cve-less/plugins/kau-boys-backend-localization-8b4d0763701a7017afeea137760172c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/kau-boys-backend-localization-9bc7114a41ccdec53120552ca052ffb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/kau-boys-backend-localization-b58adfbc2afe32d767ef8aee301802e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/kaya-qr-code-generator-3b8474b2759e8c9d48abfea5292a608c.yaml create mode 100644 nuclei-templates/cve-less/plugins/kaya-qr-code-generator-da0185c8881b7837eb3ff9bef5017584.yaml create mode 100644 nuclei-templates/cve-less/plugins/kb-support-11a5b3d7c20edce1773adda5ec308996.yaml create mode 100644 nuclei-templates/cve-less/plugins/kb-support-46afaecae6249c4e331df87e2126a4cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/kb-support-7229f0a7ed96aafb75936c9e304ee19f.yaml create mode 100644 nuclei-templates/cve-less/plugins/kb-support-d5de86927ffadedc80433179f0132f85.yaml create mode 100644 nuclei-templates/cve-less/plugins/kb-support-d8468ce3a3b28bab55fbd9d9d45afc3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/kbslider-789529615bb2d4eb38b1e7ff92e021be.yaml create mode 100644 nuclei-templates/cve-less/plugins/kd-coming-soon-0ab200e48d96a6ca5d84cfe7a3d18007.yaml create mode 100644 nuclei-templates/cve-less/plugins/kebo-twitter-feed-71dea3214223a1d20c30d59ccb66600b.yaml create mode 100644 nuclei-templates/cve-less/plugins/keep-backup-daily-097c0f138517316fbd3374861a3ee8f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/keep-backup-daily-dc6a4a649580730eac384e9fcfdcdd18.yaml create mode 100644 nuclei-templates/cve-less/plugins/kenta-blocks-10dff6774b50ae753206c4c8ad748d9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/kento-post-view-counter-3b3fa6e8d4f04ec12c101c522cbd4e95.yaml create mode 100644 nuclei-templates/cve-less/plugins/kento-post-view-counter-4f2a3c77ca82525aff6c0c722c03bbb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/kento-post-view-counter-cd6793bdae8ddbc15fc2277d7e7c8776.yaml create mode 100644 nuclei-templates/cve-less/plugins/kento-post-view-counter-e343250b5d78372d282c8933d6d57ce1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ketchup-restaurant-reservations-2edc0eee00be4035effb1c3f6980bcdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ketchup-restaurant-reservations-6f4e1c7a45d9fd969ed178f73339608a.yaml create mode 100644 nuclei-templates/cve-less/plugins/keyring-6adbed160e9381bd43ab920e4f4c10a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/keyword-meta-ff335b153bdda68f2c4ef086e30eeef7.yaml create mode 100644 nuclei-templates/cve-less/plugins/keyword-strategy-internal-links-6a71a90d9115277ce9fcc31f3c8625f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/kimili-flash-embed-86b662d95dc55b9ca72cce4586bb6bc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/kindeditor-for-wordpress-4a6888e60c570cf313bf30503e9c55b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingcomposer-126c5ad6c5556b65e18e20f26325544a.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingcomposer-28f8218d0cd81907d78e413554e9b440.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingcomposer-48b0aa896289cd47d761dfb701222bb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingcomposer-4c2f06746a0f92dd0596f11498bf4bdb.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingcomposer-6fd5ee2a697c02149752bc647f98085f.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingcomposer-77b708d65934f257c39cc7cecab95cf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingcomposer-f10892c912aef9cf076885d5c4fde1a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingcomposer-fa1461d953e85c77009854b513c7864a.yaml create mode 100644 nuclei-templates/cve-less/plugins/kingkong-board-3b5accdca91dd653d9fdbf15959cc447.yaml create mode 100644 nuclei-templates/cve-less/plugins/kioken-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/kioskprox-f629f1cbd9fba0b088aac877e4dc575f.yaml create mode 100644 nuclei-templates/cve-less/plugins/kish-guest-posting-a7228223462154328da551d1f21d3c16.yaml create mode 100644 nuclei-templates/cve-less/plugins/kish-guest-posting-ddf19add11c9e3078c959a56598f9a91.yaml create mode 100644 nuclei-templates/cve-less/plugins/kitestudio-core-41d2d6be7c3a0182cf7393ba0b128c1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-3500fb88bb82ba57864ceb27a25df18c.yaml create mode 100644 nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-8784759a4cb7c427ffba0c396b0eda3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-a2fe6757edbb25d46fa159201cfedc69.yaml create mode 100644 nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-e448c9e4b5c0c1a44cb7637de9906bfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-e6681bfff3cc4dc42aaabe81eb223699.yaml create mode 100644 nuclei-templates/cve-less/plugins/kiwi-logo-carousel-10df21fe953fcd7c84f02b55e2e8260b.yaml create mode 100644 nuclei-templates/cve-less/plugins/kiwi-social-share-cf67d2bf93130a2d772a74f509dde212.yaml create mode 100644 nuclei-templates/cve-less/plugins/kiwi-social-share-d64effb97bd4d31b42274790386bfdcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/kjm-admin-notices-c6a3bc41ee8a2ee4ea6023cb51c1bb30.yaml create mode 100644 nuclei-templates/cve-less/plugins/kk-star-ratings-31e1dd2369472619e89b67df12c89fa8.yaml create mode 100644 nuclei-templates/cve-less/plugins/kk-star-ratings-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/kk-star-ratings-d3315d27c075491e0975254e6c7dfe78.yaml create mode 100644 nuclei-templates/cve-less/plugins/kk-star-ratings-e20377f8d33eee03a0841308e7bb35f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/klarna-checkout-for-woocommerce-98a2172528b0fc22d4acb08039e5358a.yaml create mode 100644 nuclei-templates/cve-less/plugins/klarna-payments-for-woocommerce-db671eee30eadb2b3e6d738cfc02d4cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/klaviyo-e9d4c2285e81f24a0ebb73201d5c6506.yaml create mode 100644 nuclei-templates/cve-less/plugins/klaviyo-f10af2927781e57c830660efc5735cb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/kn-fix-your-fe19c96913ad86b413d30430f8f6dd54.yaml create mode 100644 nuclei-templates/cve-less/plugins/knews-a3153e139f0a73014bc8d2b3f8f23688.yaml create mode 100644 nuclei-templates/cve-less/plugins/knews-ab596007425584b1e79f9f5a75499083.yaml create mode 100644 nuclei-templates/cve-less/plugins/knews-bd4bb9d035972f9b926d372efd2d0c6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/knight-lab-timelinejs-3c3beb51159fce431f6c1df59690d1f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/knight-lab-timelinejs-aa7769527923a5d7ef3aff0dbf4c6e9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/knight-lab-timelinejs-f1c3c3df1834bde215592ceeafa99ec0.yaml create mode 100644 nuclei-templates/cve-less/plugins/knowledge-center-154e2db41f3251206c18f35c16e169dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/knowledgebase-41532dfb555f5a1e79f8f55e8febf84a.yaml create mode 100644 nuclei-templates/cve-less/plugins/knr-author-list-widget-ecd636facda8cd64296dd86dcfe53843.yaml create mode 100644 nuclei-templates/cve-less/plugins/ko-fi-button-b309eae3300d9042c3f3d6f98d0437a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/kodex-posts-likes-3a81ae3c463ea49e154447e90b9b17fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/kodo-qiniu-16382904fc41ea3ab6b4c2791fc01fb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/konnichiwa-5e9157054c225e3f87bee05e68d2bb85.yaml create mode 100644 nuclei-templates/cve-less/plugins/kontxt-semantic-engine-23b35e5f653977b412c0dc708b752a30.yaml create mode 100644 nuclei-templates/cve-less/plugins/kopatheme-219182470bf96c81d2700e98935234cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/korea-sns-eccc639fdf835f594ca670b3e9f9f323.yaml create mode 100644 nuclei-templates/cve-less/plugins/kp-fastest-tawk-to-chat-44b3ba415f16865ebb1bd98068348f19.yaml create mode 100644 nuclei-templates/cve-less/plugins/kraken-image-optimizer-a98db6a35902de5cbf34db4eed4ead5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/kraken-image-optimizer-d320263520ce22890af78fdf485478ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/kraken-image-optimizer-e82a5c99393c73fafe048a1ee03cc574.yaml create mode 100644 nuclei-templates/cve-less/plugins/krsp-frontend-file-upload-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/krsp-frontend-file-upload-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/kudos-donations-4283f13fe6bc4a6b024bd09e02f40c1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/kunze-law-54befb9e4a40b2daeebffb4c52b40b61.yaml create mode 100644 nuclei-templates/cve-less/plugins/kv-tinymce-editor-fonts-f59a000f4db543a9b891f92c5f6872de.yaml create mode 100644 nuclei-templates/cve-less/plugins/kvoucher-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/kwayy-html-sitemap-03920cd9ca5ff22b06a994a5f8a5fb1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/labtools-d4cabd09aa67db7f89a13839c46aab51.yaml create mode 100644 nuclei-templates/cve-less/plugins/ladipage-1da9a5e486a5bca5eea56b41f291472c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ladipage-60eda95192a20425ef3765da3a807a07.yaml create mode 100644 nuclei-templates/cve-less/plugins/ladipage-75b95cd57aa6f181317402e50b5298ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/ladipage-7f3124ca75169d1ce32c9846ab853c30.yaml create mode 100644 nuclei-templates/cve-less/plugins/ladipage-c2e6ea5d855361966f47fc5dcb8b0259.yaml create mode 100644 nuclei-templates/cve-less/plugins/ladipage-cc5f050077abe9bc4430ea7311dee63b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ladipage-d50f67dc0f0c12eaee9077e2d5da5b59.yaml create mode 100644 nuclei-templates/cve-less/plugins/ladipage-e17132380795ec993497562455cdcf18.yaml create mode 100644 nuclei-templates/cve-less/plugins/lana-downloads-manager-3e06725c467ed0bbc52c31de7579bce8.yaml create mode 100644 nuclei-templates/cve-less/plugins/lana-email-logger-0eff9655bfda1837e342ad2c25cf67f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/lana-email-tester-9f0a7a67bdcab820d9c877a9c152ccf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/lana-shortcodes-30c4f098df3ec040d50017f604f86e26.yaml create mode 100644 nuclei-templates/cve-less/plugins/lana-text-to-image-01d1d88da52813ba88f89d4ae266435f.yaml create mode 100644 nuclei-templates/cve-less/plugins/landing-page-cat-823af0fa0a5da870a62224c7ff6c3f56.yaml create mode 100644 nuclei-templates/cve-less/plugins/landing-pages-1bd3cf2ded386b4330f990e160e575a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/landing-pages-1d38738da5297f92f4a75e3867c8fc2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/landing-pages-32b6d6a7715e88760b71f326a4a0a744.yaml create mode 100644 nuclei-templates/cve-less/plugins/landing-pages-6ef6064badb5d7b87c27535925053eda.yaml create mode 100644 nuclei-templates/cve-less/plugins/landing-pages-cdbf7ebff8c4d1a9b90da71e4a3d5b8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/landing-pages-fc1127bab00994e33df3aea4eda89e16.yaml create mode 100644 nuclei-templates/cve-less/plugins/landingi-landing-pages-4557d429895965429fa37880092128d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/language-bar-flags-b653693e247ce65b83ad58a9d1c112a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/language-switcher-for-transposh-cad70fb6bdfbb529b2f3fd5fa62ec983.yaml create mode 100644 nuclei-templates/cve-less/plugins/laposta-signup-basic-4888a583f0c17ec03ad6204f11cf19b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/laposta-signup-basic-ba827c0c7827dd14721a734b247e5519.yaml create mode 100644 nuclei-templates/cve-less/plugins/laposta-signup-embed-5b2a6f112dc7d70910b36648c4b4675a.yaml create mode 100644 nuclei-templates/cve-less/plugins/laposta-signup-embed-77ceee4c9af8ec0a57ce3d32bf1b3aa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/lara-google-analytics-fbfa55f46b34cda37b3af16eb142622e.yaml create mode 100644 nuclei-templates/cve-less/plugins/larsens-calender-c2ba29e0e5ecaebf723467e306a8b7e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/last-viewed-posts-3e7a9b56ead5fe8df432df319aeeebae.yaml create mode 100644 nuclei-templates/cve-less/plugins/lastfm-rotation-d4b22919ff8b60c51f7cf57a644618b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/lastform-59cabb7b5299e919e0e9798126655ebf.yaml create mode 100644 nuclei-templates/cve-less/plugins/lastudio-element-kit-393e2e191f65056b760ec314dc828cfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/lastudio-element-kit-c82aa7ec69ca20e438896d99f7ba7b77.yaml create mode 100644 nuclei-templates/cve-less/plugins/lastudio-element-kit-dd731c24df053ea79b95f5153fe19979.yaml create mode 100644 nuclei-templates/cve-less/plugins/lastunes-ca83dec475d25f0d439ff07447147bbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/latest-tweets-widget-b7b0638727516de291f017e208e485cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/latex-53e03067c5c0bd571562823dadf2dc1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/launcher-992cb2db66581f66b70df8df6297f14c.yaml create mode 100644 nuclei-templates/cve-less/plugins/launcher-fe2d4839032c7d1700f5ad488d4dc88f.yaml create mode 100644 nuclei-templates/cve-less/plugins/launchpad-by-obox-1d6b909d9b4a86a23d05301fe792416a.yaml create mode 100644 nuclei-templates/cve-less/plugins/launchpad-by-obox-e9635d2750ec3cdec7963e531110e8e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/lava-directory-manager-6e22ef37bb559e43f9ec487e46497c1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/lava-directory-manager-dcfc7774787e2e0bae54fdcbcdce15a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/lawpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/lawyer-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/laybuy-gateway-for-woocommerce-ae9a6b8dc34a1a7bd8079dc738c03df9.yaml create mode 100644 nuclei-templates/cve-less/plugins/layerslider-02467e400ca754bab3e037cbbdd78309.yaml create mode 100644 nuclei-templates/cve-less/plugins/layerslider-1abc3232bb9762193f328a8624f474b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/layerslider-4c62f9807e53925857a04839b7f811f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/layerslider-782d2a5a9a3b36ec02deacd0cc03dd91.yaml create mode 100644 nuclei-templates/cve-less/plugins/layerslider-7b9f5b71ec8719bf9a8cb5694942faa9.yaml create mode 100644 nuclei-templates/cve-less/plugins/layerslider-9212eb6af9b06f0daa962811d04b3aed.yaml create mode 100644 nuclei-templates/cve-less/plugins/layerslider-9e79ec7559a564921e41d0c7103ccb78.yaml create mode 100644 nuclei-templates/cve-less/plugins/layerslider-a578ebb6ebe38916edbe0405c9e0722c.yaml create mode 100644 nuclei-templates/cve-less/plugins/layouts-for-elementor-64461a08e8c73126cafa25fcfb24f7b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/lazy-facebook-comments-277494a31c77da0ae18248d4fccbad90.yaml create mode 100644 nuclei-templates/cve-less/plugins/lazy-load-7a66706d231bb588b40ed996e42c0254.yaml create mode 100644 nuclei-templates/cve-less/plugins/lazy-load-for-videos-934698dce094abed0913795fed8be1e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/lazyest-backup-175c8ff94ca9713fddec53a350c86d55.yaml create mode 100644 nuclei-templates/cve-less/plugins/lazyest-gallery-1d3a5e954dbca93e3fee328975ccc98e.yaml create mode 100644 nuclei-templates/cve-less/plugins/lb-mixed-slideshow-e098e9eac7599a7bcc4cfaf12c6fb3a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/lb-tube-video-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/lbg_zoominoutslider-20c21b977e576c86cae60978b4cded07.yaml create mode 100644 nuclei-templates/cve-less/plugins/lbg_zoominoutslider-4bda697ca3ea7c8fca810d0d8ce167ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/lbstopattack-fdd4bded1dfa98b42ec68b8794019fbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-ad-staff-employee-directory-search-5fb9868893588947cd0894306db3f85c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-ad-staff-employee-directory-search-b2d04a137f03b4bce0a603349a0a67e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-10a0d810b2c87af5b6ac2f20a36975ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-3662e536f344cad7ead518a87b44f9b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-3ac7913de6e3ab3bdc9b5e42fbbe516c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-620886ffa263a68ff12dd7501ad110dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-8871ef770441f03d651279dadfcbfd9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-984ae033ae8ed023b8d291a56d4420e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-9beaf57f0310a4e1b4eebc1c61cd56e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-c703e23611edc1b7f4c547a3de6e5a54.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldap-wp-login-integration-with-active-directory-f8cd51c51fa81f86666de16c04486eac.yaml create mode 100644 nuclei-templates/cve-less/plugins/ldd-directory-lite-fb41ea027051c6c12e4e7b22c9f918d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-capturing-call-to-actions-by-vcita-730361678b13f8f0736a72594b63e5d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-form-builder-052c2263d304ba99984110ed21050e99.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-form-builder-096938bf849592b8e6a6dbaccc2157aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-form-builder-9baae5fb51d9dd1141e1931574d9d7be.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-form-builder-a64ff7d479ea82b36b6d5de70a97fbae.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-form-builder-ae016ddc716d42a85477445c62a5e437.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-form-builder-d46f40f2ab613d8e339074ed1d986191.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-form-builder-de55ae6e76c91a89ee0e3689f89fe0d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-generated-9a53cdf71ae16cc8f18244beb584e5b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/lead-octopus-power-9b2ea9b4d3e50f4a2171e20728a5e5ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/leadconnector-ffa89e4112fdba734a5ff64b0534aeff.yaml create mode 100644 nuclei-templates/cve-less/plugins/leadin-268919440c0c130df155e87fb1063e23.yaml create mode 100644 nuclei-templates/cve-less/plugins/leadinfo-657bb32b8f91f0127ec427c69158cd75.yaml create mode 100644 nuclei-templates/cve-less/plugins/leads-5050-visitor-insights-871f126d178a351c71d698539beb418c.yaml create mode 100644 nuclei-templates/cve-less/plugins/leads-5050-visitor-insights-f78d7ba708259da0523cabc0cbdbd7c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/leads-bfe41c446963ca7621a719dd7519ca70.yaml create mode 100644 nuclei-templates/cve-less/plugins/leadsnap-34c15700740b2cf80007fd2a16414756.yaml create mode 100644 nuclei-templates/cve-less/plugins/leadsquared-suite-8668394708fedca0791c9dce209e6c21.yaml create mode 100644 nuclei-templates/cve-less/plugins/leadsquared-suite-fb9d67ae40f074a3d13bb91e383cd2e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/leadster-marketing-conversacional-35e6f9b545b9a3d3918e9b2b36941c18.yaml create mode 100644 nuclei-templates/cve-less/plugins/leadster-marketing-conversacional-c7398725776161b539e66b85a7395b11.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-map-0bd29affbc67a54bb066a76fed95c3b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-map-5c2752426bec20e3d652e4f604fa0685.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-map-e97645e174e90e9260a0b981384daa6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-2729f42afbb3a34107349dbe43cc49c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-7f6d3b4e502f3e87f036376c050085cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-8015d391de62b785680b52c5ead73093.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-d4c7d6015d840d0227eb1573d5a3b347.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-fb54b510af0f0d5e8604602a7c9ddbef.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-8110fb2b6c7df8f95ef8ae68b2cdb995.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-8ad67d1554931a18fcf5c6d8fecb94f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-a72c48218cac40242d4a9479585b4525.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-f0f87fab2cfab311f11b9a274d616536.yaml create mode 100644 nuclei-templates/cve-less/plugins/league-table-lite-a485120e585260a017fc72fe127dae66.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaguemanager-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaguemanager-d0e94011e5fe6201731b0911afc2291e.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaguemanager-d95d6ea5b7b9ab6b188b96396997c452.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaky-paywall-58a6911fd3193aa0bffa110e873b9369.yaml create mode 100644 nuclei-templates/cve-less/plugins/leaky-paywall-9dd9621e217d263471711af1462b33c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/lean-wp-6cdc10306b381cbc45add2c281d72434.yaml create mode 100644 nuclei-templates/cve-less/plugins/learn-manager-ad546711ae594c4c52f6942c35b5d00b.yaml create mode 100644 nuclei-templates/cve-less/plugins/learn-manager-e199f05b41749995376359e6d56e2316.yaml create mode 100644 nuclei-templates/cve-less/plugins/learning-management-system-8cf11b7a12ed4b53c21429a42b2dad73.yaml create mode 100644 nuclei-templates/cve-less/plugins/learning-management-system-b7a48cf548d48b851bf88b40be93ae49.yaml create mode 100644 nuclei-templates/cve-less/plugins/learning-management-system-f3b11694ac1b5d77b57c36945d67adf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-087877bec152b3c6056ae543a1948ff7.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-12497cf3a1ab73f82504a379a27c0f10.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-12b3926da3c13269ad9e1faadb8734ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-1f34156a3d4672d58e020bb5b55f0b64.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-35cfad6b28404a58bea291114a1dac41.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-3cc56a7c67e3f1095ccd425af8f1f8bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-3efe74d4dfd2ffb7e9340cb78fbbba24.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-4b10ad9364b379816e8420c4f6c13bb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-52edc6613624a73f45b9edd81d15ffe1.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-5b6638dc9ccd4becc08f9931fb9023fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-665258488a89f334d44f72f086862e16.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-67ce6cd2d5f260a7edab2bfeb7b2a875.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-6d3b26eeb9dd4b508b1794df4cfed998.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-71196217c30f569c96ec1f5bb53b87d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-7716b5ad1739bacc35b966f53febea57.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-7cd4e467091cf2ef9c11f5015a5e2616.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-8ac95793b1af58e01fb386297987dde6.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-8e805369c6f828c8254ff169ce6c85f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-9300ac45be528f46650e4e8e9c810c53.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-99975e67153f43d6158ad376c50faa87.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-a1074ed3b0484056994227f5bc722d4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-a3c23b348d99ad97eeba5901637fc834.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-a6e9d3ad722034f3a564750baa53887c.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-b383deabc0a5d3fd85420cbb993138a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-c68a29c96ddfd9ef9aa3807b97890295.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-c8400b062377f9f8018cda91a345e846.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-d5338c51a39110eb82434918065d2ccd.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-d8c2f0e374c51f43e12982dec783de7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-e165d1235715cb13a0ff33a2e71acdb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-ecf4e36c0bf9bffe5d8065599df28f54.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-eec19c37d540d2e27f564c70a69eb498.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-fdbdaaf65435bbd1ff18dc91bfebb894.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-ffbfea6a2970df28e2afd4173682647a.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-import-export-22e409e6170e1adf0b8466f8fe714d12.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-import-export-3bfe2176ab2d6339c4363df34b9c843f.yaml create mode 100644 nuclei-templates/cve-less/plugins/learnpress-import-export-bcce3c1d97bc388506a917ca0cc1d4ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/leenkme-aa03d96ef5988adea4feb7a4e959e6b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/leenkme-e628e638290643fc84f3ec2a1da56d28.yaml create mode 100644 nuclei-templates/cve-less/plugins/left-right-image-slideshow-gallery-74c124627aef7bceecd485cb551c158e.yaml create mode 100644 nuclei-templates/cve-less/plugins/legal-pages-10dd9a3434e3d079623a841e75c86c90.yaml create mode 100644 nuclei-templates/cve-less/plugins/legal-pages-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/legal-pages-873e76363814bb4471e426a80a606dee.yaml create mode 100644 nuclei-templates/cve-less/plugins/legal-pages-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/legal-pages-bea5c55c5c2c8de715c6ad731a47b480.yaml create mode 100644 nuclei-templates/cve-less/plugins/legal-pages-c5f8d6adcd0b5a4cfa26527341dbd20e.yaml create mode 100644 nuclei-templates/cve-less/plugins/lets-box-40394fd34f6bdb20b6922c1630b7207e.yaml create mode 100644 nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-1a6e413024d8d1ae95c30f6878f11970.yaml create mode 100644 nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-381f90bef3e067367c93c00d3b2f3da3.yaml create mode 100644 nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-b6431bc8ea172cd6898e2fe9706d240f.yaml create mode 100644 nuclei-templates/cve-less/plugins/letterpress-c8fa2e9308164baca50265fff2c3437b.yaml create mode 100644 nuclei-templates/cve-less/plugins/levelfourstorefront-60d0aaf010589e85233668578dac1b45.yaml create mode 100644 nuclei-templates/cve-less/plugins/levelfourstorefront-e039fd0b1618532fbbf520ec8b6c6d5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/leyka-3a9635822cb7314607ac71f9acb49b4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/leyka-4ad4d0b506ee721748cb73d977e55c9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/leyka-5079f0a10d3876d504cfe4b7bc45d5bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/leyka-575822ff84218761efa49bb8b62fda8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/leyka-820bf6eebe51459c99397ba007997b65.yaml create mode 100644 nuclei-templates/cve-less/plugins/leyka-adb4907ddb0e6a30a22811f6c9a82a82.yaml create mode 100644 nuclei-templates/cve-less/plugins/leyka-ec4b1b9fc14ecc8856f3a0b0d90e5205.yaml create mode 100644 nuclei-templates/cve-less/plugins/lgx-owl-carousel-881bf0ba98d7fd08888e0831b881248d.yaml create mode 100644 nuclei-templates/cve-less/plugins/lh-add-media-from-url-b2d30fafcd7658ca0faf8113857402a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/lh-password-changer-5f7cb88319853fb89e824615700911ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/library-viewer-02d031e7b4eb9aeb9adbec2797214be1.yaml create mode 100644 nuclei-templates/cve-less/plugins/library-viewer-d611c750b72176ae3a8cea6f7095bd28.yaml create mode 100644 nuclei-templates/cve-less/plugins/libreform-34d9d11da38306b6b9ca0ad0c24c767a.yaml create mode 100644 nuclei-templates/cve-less/plugins/libsyn-podcasting-04c216a7711f03f2d76acb6a4f7b0e8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/libsyn-podcasting-4614ae1f7c7171ae3257864a2b444504.yaml create mode 100644 nuclei-templates/cve-less/plugins/libsyn-podcasting-5c39e614f4c21b0d8aa062440989ce22.yaml create mode 100644 nuclei-templates/cve-less/plugins/libsyn-podcasting-61f36ff0df93fb03b2b83d8b189aa894.yaml create mode 100644 nuclei-templates/cve-less/plugins/libsyn-podcasting-6e94c2720ffeb0d7aea3042093ebf4ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/license-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/license-manager-for-woocommerce-c66ec1dc83585f4762c2bc3e6a57c02b.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-164e2c0c315709a0cb3bf1d13c08e3b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-40270377df18382f5029626c6b47720b.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-7a853f0d8892e49dad6311d7c02311c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-93461439abae08e1620c6e9fa8825bb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-a12053c70cb8a7dc00df12e53f227856.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-bab5c3b1fc1e564a5e35a65a5e2e3c52.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-c5715a71dce8eee06efa6336dea28c63.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-fd8cf6722d31c028cb6e31b0f3dd50d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/lifterlms-gateway-paypal-a2c108cd8ca415a76c874f9ce93de755.yaml create mode 100644 nuclei-templates/cve-less/plugins/light-messages-4241318cd929615a02a622c5e7416212.yaml create mode 100644 nuclei-templates/cve-less/plugins/lightbox-2890c7da7df716bb01f0e22088b2fa03.yaml create mode 100644 nuclei-templates/cve-less/plugins/lightbox-gallery-6dc5d6d271c910589d9f7947458f0df6.yaml create mode 100644 nuclei-templates/cve-less/plugins/lightbox-photo-gallery-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/lightbox-plus-eea39cdb903f15de3e0223c1c0ebeecf.yaml create mode 100644 nuclei-templates/cve-less/plugins/lightbox-popup-e990d85401ec922ea084ebafd475f1d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/lightweight-accordion-85706ca0d20495fdfed005cc638cab53.yaml create mode 100644 nuclei-templates/cve-less/plugins/lightweight-accordion-e6a664a291db10911439b7200ec5f058.yaml create mode 100644 nuclei-templates/cve-less/plugins/like-box-243adc14e5399e777d2255721eb66201.yaml create mode 100644 nuclei-templates/cve-less/plugins/like-box-98df1be3acb90063bf3d77ddbcd92918.yaml create mode 100644 nuclei-templates/cve-less/plugins/likebtn-like-button-0e9099d596f12350ed3e94192d2103d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/likebtn-like-button-7574ce3ad743a4e2a6c60be8d0253363.yaml create mode 100644 nuclei-templates/cve-less/plugins/likebtn-like-button-92e6b40557e12550c3bcd04a5869ae4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/likebtn-like-button-cfa91e4d46accd79431b3f983037646f.yaml create mode 100644 nuclei-templates/cve-less/plugins/lim4wp-d118d4258fb602bb69d7eb996fc782d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/limb-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/limb-gallery-ba4f93258decf77226fa4331245d3364.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-attempts-11bdd1e9de931e8eb6881e563e13ef54.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-attempts-bf3eff169429be7d80ad4c0e31426e1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-377e66001fb8e84db9266941f39f3e9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-f0a7cf7b914e091c8c5cd4fb058e543f.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-f6d106888724001be47f0a5722bc1e1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-plus-09ecd7b1a7d7c81f548e33bf4bc7b580.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-plus-20949787d924daf75440ffeec632fd08.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-7a57fe35ffcd96f9b7d9e37175b67bfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-83eca41cb757159390f58937921ee2df.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-b0fbe8ed2bd5ede12fc8dff6720e9fab.yaml create mode 100644 nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-ea959a771940391e9a366a8cf4f552bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/lingotek-translation-f623978da0d0e7e73c44c7f970c44b06.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-checker-472732c123ab155f18372e2d5d026883.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-juice-keeper-3ca3d61f633582fe10aacbed8816c6e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-1c985f1116559af8ca42f803d48b129d.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-263f0665c552df560e61f28530fa511b.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-45cc93dab6d9a9c50a4569ff06d10d7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-56c2ef2b70cad0dbe9025809ba135de2.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-63da1e8a7d368a237a74bc6e90977e1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-89d3c8a11ff10e6756f75032f0181833.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-8eaf2fbb99993016796df5f74fcedae5.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-9f1eb3ba72f073c220b0aca4f3eab325.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-b560a7342e5a5547ffb025ec97c31f15.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-bdfe22a56a0cb4f7b1af5e93a2693981.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-dafcf72bc7ea7f4d11e003315c8b31d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-ed114df4f201bdff927450bdcae78049.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-library-f21e31fcba2b16b7b32fe6c94daf21e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-list-manager-3aa9bc9584cc58690e73b867607b46c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-log-1ed30559c3d0fe2013efce706a1a0591.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-log-200b4a20000c02e3ddb71f780d4da533.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-log-a70d444a7f2c0c5012e01420603941d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-log-f462ad6f4474c107cb4e1555ab936edc.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-optimizer-lite-7c00a992b189dd605d955a517ab5ff4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-party-422a9545144ac220769577361c25c2cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-party-4fbe78a27e0a415c3958fe330e75a188.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-party-a8c0b404c2334a1ce94afe05ce1ef335.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-party-b3db63dd3833de216814572046aef4ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-whisper-c53a6d31c98dcde7fc34b4079f07942b.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-whisper-c7031edc7c8c818eb8b6f1853fee01eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-whisper-cc953220a3ab9360fc3b920e9df2ed7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-whisper-da040359bca67615913785734db30059.yaml create mode 100644 nuclei-templates/cve-less/plugins/link-whisper-efbea6db4c4deaef4b1a0846e33065cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/link2player-afdb73f09e63d9d93a801e87dd86e9bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/linker-dc961a43bf6645987863e2268d4c98e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/linkworth-wp-plugin-9ed1e670781ff936317a3cc7c1d9dd47.yaml create mode 100644 nuclei-templates/cve-less/plugins/liquid-speech-balloon-2fc40f0eebe24b9548355cb63270c890.yaml create mode 100644 nuclei-templates/cve-less/plugins/liquid-speech-balloon-5e0407cf5324ea7a57b720b722b3c657.yaml create mode 100644 nuclei-templates/cve-less/plugins/list-all-posts-by-authors-nested-categories-and-titles-802be145d30a4aee303b74232b95831e.yaml create mode 100644 nuclei-templates/cve-less/plugins/list-category-posts-3b8bb6063c635c2a8333462322de6a1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/list-category-posts-7ec69e14aaa720fc8a2decec00730012.yaml create mode 100644 nuclei-templates/cve-less/plugins/list-custom-taxonomy-widget-53b64c2cc89e0070db555cf593bc5061.yaml create mode 100644 nuclei-templates/cve-less/plugins/list-pages-shortcode-b3a8e8167569aa6cba2a5950875c8b0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/listplus-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/litespeed-cache-0436bd17a7ce2057f085dec6812cf1d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/litespeed-cache-303b76a4a36e60deb08e9b0d0435d79c.yaml create mode 100644 nuclei-templates/cve-less/plugins/litespeed-cache-5164946a6f7e888f2eb2eb6be3f062ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/litespeed-cache-5a398aae9f8b9b2a378092433e37f0a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/litespeed-cache-5f623b9be5a2d2349866b91146be2f95.yaml create mode 100644 nuclei-templates/cve-less/plugins/litespeed-cache-e320d6afe142ff2886379823eb8759ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/litespeed-cache-eaef067d144406da863b2f1698405be1.yaml create mode 100644 nuclei-templates/cve-less/plugins/littlebot-invoices-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-chat-facebook-fanpage-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-composer-page-builder-130eab166dc7b7692723d0cf797df7b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-composer-page-builder-72add1c0a6273b20aaa451b8bcfd56cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-composer-page-builder-99586092e2e0a8d37b070fc12b9ea29f.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-composer-page-builder-add895115f53c9c7df4b8eacc636e203.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-composer-page-builder-b15b4d6b18eb8d6e1301c7d5d1d48c76.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-news-lite-884857566c11f05a4de329e58ea89043.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-scores-for-sportspress-3a5d73d5522f92d087c0f9a99edc5e9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-scores-for-sportspress-3fe9089ec5b0f3ad95a1bd0baa9d49ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-scores-for-sportspress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-search-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/live-weather-station-6bf013010e508e54af93e6ae6969b8c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/livechat-elementor-86dd6dda2cd9ddc6bc20ee836c81850a.yaml create mode 100644 nuclei-templates/cve-less/plugins/livechat-woocommerce-cc133c83907831da0d998e047e9cfdbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/liveforms-bbcba6e13bde9bf14b1c5b83c187b0ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/liveforms-fbafef1583d66ee6ba3521f29ba434a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/livefyre-comments-41a63082135d50f0e8bf2d19791a60a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/livemesh-siteorigin-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/livemesh-siteorigin-widgets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/liveoptim-f364089fe838821aa5875cc23a9bf280.yaml create mode 100644 nuclei-templates/cve-less/plugins/livestream-notice-a521128c60a3e4447b1ae62129a4837e.yaml create mode 100644 nuclei-templates/cve-less/plugins/livesupporti-86ee984a5b2cc7b4ab97dc8a4e8b06c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/livesync-38a3278b44badbc6201e3e06953e0d59.yaml create mode 100644 nuclei-templates/cve-less/plugins/lktags-linkedin-insight-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/load-more-products-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/loading-page-4168c6f35e53b3bb6cbc2cd944aa14e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/loan-comparison-17de09501ab7fb8731b631ebf83d7a67.yaml create mode 100644 nuclei-templates/cve-less/plugins/loan-comparison-58b316530bd9635132dfd03a76f490ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/local-delivery-drivers-for-woocommerce-689c16f1a129b0e9c76ffa7cafd20108.yaml create mode 100644 nuclei-templates/cve-less/plugins/local-delivery-drivers-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/local-development-29a60f726216a180f82f11be4b87c485.yaml create mode 100644 nuclei-templates/cve-less/plugins/localize-my-post-e804c0e7bbe92744b5b1a95863c8b199.yaml create mode 100644 nuclei-templates/cve-less/plugins/localize-remote-images-d92a3b7d2765d4947392cc8fcadba165.yaml create mode 100644 nuclei-templates/cve-less/plugins/localseomap-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/location-weather-6c261a297dbcd9991a82748059272596.yaml create mode 100644 nuclei-templates/cve-less/plugins/locations-68619625dd4330d653c82c2251ebc33a.yaml create mode 100644 nuclei-templates/cve-less/plugins/locations-9e153a23809280911bab79339940a337.yaml create mode 100644 nuclei-templates/cve-less/plugins/locatoraid-95d961d91144502a2fa4a99f5da6e669.yaml create mode 100644 nuclei-templates/cve-less/plugins/locatoraid-b2cac182d257fbe66c64e34a40cb5d58.yaml create mode 100644 nuclei-templates/cve-less/plugins/locatoraid-cfb712440be870231ef705d9454b409e.yaml create mode 100644 nuclei-templates/cve-less/plugins/locatoraid-e7e716edf9e9518e46de8baeec91561e.yaml create mode 100644 nuclei-templates/cve-less/plugins/locatoraid-f129897036a69e5c156d976b88efd3ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/lock-my-bp-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/lock-user-account-39749a910e46936207c7b87bdd710b5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/loco-translate-8187837c8e502d478100e3984ca296fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/loco-translate-d8800c16823f2094a6d5c651646d84fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/log-http-requests-5a93acfe5c571ac99fbd0be363e6f484.yaml create mode 100644 nuclei-templates/cve-less/plugins/logaster-logo-generator-1593b88b276363eaaec5e0cb5dde84ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/logaster-logo-generator-76ed6482cec63261d1357200b150b91d.yaml create mode 100644 nuclei-templates/cve-less/plugins/logdash-activity-log-bcfe334c42c567e215f8c00ef33611b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-and-logout-redirect-6defdad634c19587e3dd4bf9ad418075.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-as-customer-or-user-0fc17742a12c442eca6b1350953762d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-as-customer-or-user-4c2cc49d3c5ef5aabeaa2eb6035c1bc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-as-customer-or-user-63d09700de769fbd6e753bbbd4ecabb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-as-customer-or-user-7c535e169c75c3005c5d2941f3e6968b.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-as-customer-or-user-ec624f0e0c8a0434187e7e5ecb5e4e8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-attempts-limit-wp-0eea71d63bea39cf2254e5ce7029cff0.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-block-ips-02f07014b96a3edb2c7f1b16bbe0bd90.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-block-ips-a8dff80c8e083adc6ae91aa812785cd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-configurator-138f6d0c8e0041a5a9ff7dcdbdf2c1bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-configurator-46799564b7a9d79d9f58df7d68a85824.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-configurator-beaa951d6e891d70c494baee952c2f4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-customizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-form-recaptcha-eab309830ae20eeb18b4936d022eab3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-lockdown-1bbaae2a7a498b205fb902506cd09f7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-lockdown-88f9434afbf3660fe0710b500aa999f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-lockdown-e2d3306782ffc6dc1c4428ce58ed053c.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-logout-menu-de60bb7a2d8edb4c8b70880b7d8f6006.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-logout-register-menu-1b2984fc633af00dfb52c6ca6adba0af.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-or-logout-menu-item-ca7d5b5619ab641f67f5cf5a4e55e4af.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-page-styler-7d4c259ea0aa11707d8270b3e5db8568.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-rebuilder-0769a7de02fdecf0755ac761d0a440c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-rebuilder-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-recaptcha-b6dd04c8ab5f16c9a1c8ee0a8dbc7845.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-screen-manager-16cbd69900a20c2a15cc998b66c6e30e.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-sidebar-widget-fae7d043617694cc89520aef8cdc5ad0.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-ajax-08c2b329300ceeb5ec4ee1c1cf18abf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-ajax-2c0d615cfdc7e7ed23f5751818a97642.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-ajax-7bcea995c31208e7b3ae2001fc2e0fd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-ajax-d9979e2b554699fb1813833b2efa0480.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-ajax-ec063e4ec21933641631e905d4f64602.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-ajax-fe796847eb830527572fd03364591cba.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-azure-eebb96ce6566b7b10661225a9046264f.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-cognito-29259c5b25c72133b49fdd41585cc3d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-cognito-a884c095d086c59985c21ee277047e23.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-cognito-eebb96ce6566b7b10661225a9046264f.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-phone-number-208e3b31993605c004819fb7fd167d1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-phone-number-56f2f327244a430ca8fc636a97b2e3cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-phone-number-64bb9b276a0e4073663c51a2aaebe19f.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-phone-number-6f4c822113b8980ad7d9ecbb478cdfd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-phone-number-a833ece3f343246705571f6788efd405.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-phone-number-ac531ca44d844146efaf8a60c7e71d41.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-phone-number-b9138583e38a18d791c31fb8353403c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-phone-number-ec75720f681f6e8a0dfa73dc2af48726.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-yourmembership-5f0a636903de630172f072592f6edff3.yaml create mode 100644 nuclei-templates/cve-less/plugins/login-with-yourmembership-c5fe48358feae544a0b21efff11ac6fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginizer-27753e35f86f0683018abe1867499f91.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginizer-2ab9cce0c78fb172d9887da5c8b47923.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginizer-c17200ba4236119c0958120e5b5ef5cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginizer-c30046dfca2652f0c4622a1ba6d544e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginizer-cfd6c4a67043af04f9e4f98a73eab3fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginizer-dbdf12cf139233f26433b910fe482aa7.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginizer-e3a5de57aa22129643a4695275352679.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginpress-62395a250bd2c0c27cc1d46d95105e15.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginpress-9e304c0c2d27a9a5e4112a85cbe97828.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginpress-bed0cdd535564a50bc24db1db8a6aa5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginpress-e364d48aca33a25dca805353038f64e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginpress-ff3790cb0753cd7ef435623008e69310.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginpress-pro-2c903b10bdf887533eb269f90c22486a.yaml create mode 100644 nuclei-templates/cve-less/plugins/loginpress-pro-6243447eedf5d12aac34558af1ea267e.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-carousel-free-426067a3112463f4371753090e35be9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-carousel-free-493a0e85cf8a05291a415d7ac00931ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-scheduler-great-for-holidays-events-and-more-6608e81097680e6fc28899a61a6c4d0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-showcase-ultimate-bbfdb718b30267886c66b70ab8a80fee.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-3290c8bd01d458a3a1d47adc4e14d07e.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-3a725e62a03f5ade4440af8acdd72f67.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-5de20b622f7b3426c6426e4d509bd26e.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-slider-810ed483cc25df9feef2344d7fe0063d.yaml create mode 100644 nuclei-templates/cve-less/plugins/logo-slider-wp-c7884dbfd12febc95a975f955686dac3.yaml create mode 100644 nuclei-templates/cve-less/plugins/logwpmail-b232a806932eb3a8c3f6cb5279a74846.yaml create mode 100644 nuclei-templates/cve-less/plugins/lokalyze-call-now-8dc7d267bfbf58557e7062f8892fe14c.yaml create mode 100644 nuclei-templates/cve-less/plugins/lordicon-interactive-icons-6765d661ee89fff8539766bb02e51a4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/luckywp-scripts-control-4813c58962647ae4a6f05165adf752a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/luckywp-scripts-control-def2f7014de695ca135f23616af5b3ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/lw-all-in-one-dcf62ae8561beba15cd72e7dcb3bf604.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-affiliation-0e3c2a4eb55659f4b696836b1243ae68.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-affiliation-7b9f532f4a76fa76bf373061c63e567f.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-cleaner-7b9f532f4a76fa76bf373061c63e567f.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-cleaner-b3b6081b87407dd7552a8c8806c2ebc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-hide-login-7b798e8ca30dadd7d24e9e59ebf40008.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-hide-login-7b9f532f4a76fa76bf373061c63e567f.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-hide-login-f625397271ed803259763f2838a2e510.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-optimize-3e81ca2e699abf0578124ace41c312e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-optimize-7b9f532f4a76fa76bf373061c63e567f.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-sms-7b9f532f4a76fa76bf373061c63e567f.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-tools-057556914142c489ed57ccffe54665f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-tools-595af782abc65d0b72ff181cfebe8b09.yaml create mode 100644 nuclei-templates/cve-less/plugins/lws-tools-7b9f532f4a76fa76bf373061c63e567f.yaml create mode 100644 nuclei-templates/cve-less/plugins/m-chart-d65055d7026996d94428cd7d953a60fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/m-vslider-c02cfcdd0ba606abb55e36d23c78177d.yaml create mode 100644 nuclei-templates/cve-less/plugins/m-wp-popup-2ef37c350605f8670255f67b27eb34e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/m-wp-popup-86c38c0f05080f78b36fa8b5f954e871.yaml create mode 100644 nuclei-templates/cve-less/plugins/mabel-shoppable-images-lite-25d30486ae110d12d4fc6bcb4d1b50f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mabel-shoppable-images-lite-46180ef43d3becfddd0144fed7922297.yaml create mode 100644 nuclei-templates/cve-less/plugins/mac-dock-gallery-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mac-dock-photogallery-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mage-eventpress-0d7d13b3763620f659067ef0ef4a2ecc.yaml create mode 100644 nuclei-templates/cve-less/plugins/mage-eventpress-1e549d9fdcaec4289273d20aedde9604.yaml create mode 100644 nuclei-templates/cve-less/plugins/mage-eventpress-283e8dcbf95766b045e888a0d0963e03.yaml create mode 100644 nuclei-templates/cve-less/plugins/mage-eventpress-2b95a61584d1fb1af349c6d1aaeab17d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mage-eventpress-5cd92fdc1b058e752c6530598f5dbea1.yaml create mode 100644 nuclei-templates/cve-less/plugins/mage-eventpress-6a54d7f93d8962555c63afb66d95fb68.yaml create mode 100644 nuclei-templates/cve-less/plugins/mage-eventpress-828638ea1963a58b890deaf22836b2cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/mage-eventpress-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/magee-shortcodes-7b378f7b5f801637805b2f7c350d9359.yaml create mode 100644 nuclei-templates/cve-less/plugins/magee-shortcodes-e9fde878e95431546f5a6d5b49c1a171.yaml create mode 100644 nuclei-templates/cve-less/plugins/magic-action-box-423344ebaf15b72d32ea50cd38a95167.yaml create mode 100644 nuclei-templates/cve-less/plugins/magic-fields-57123cd71067e91d2b8fed604519bb45.yaml create mode 100644 nuclei-templates/cve-less/plugins/magic-fields-83aff6544a7c919044e1d77f749ea1cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/magic-fields-b42951305c8f37d90390c15daed2c5f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/magic-post-thumbnail-415df088a3251b97c66d0b5934825289.yaml create mode 100644 nuclei-templates/cve-less/plugins/magic-post-thumbnail-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/magic-post-thumbnail-f0c24bf90cdba629568a0b0ff9462d8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/magic-post-voice-57964eaa7fd52baacb77455232ddda16.yaml create mode 100644 nuclei-templates/cve-less/plugins/magical-addons-for-elementor-ff7e8af2c4256f9a091a352140252d3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/magical-posts-display-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/magical-posts-display-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/magicform-26a525135ae718590eefdd570c160cb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/magn-html5-drag-and-drop-media-uploader-2d79a02d518f8a5f5caa0b3954bfdd16.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-control-7012db1ab8aed2692530b77526c2d553.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-integration-365-7fa8eef52402bb269ab6eda7703db35e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-0ae464a32aa65e97054ff65a6cd1aac7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-2a026b3abf7a570fa9c1168601d16d6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-346d51a39433f3f2e66028061115352b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-367d3a73f5196cd91ac495a3ac0b62f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-56b6a95b36a0bf98a099f526d08412cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-61f3e3f11790d6bb7105200ca41924cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-71386814122d58a47245526972d56d40.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-882cb2013f62250b85eee3042b3892e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-9bb1e384b35298c0d399c7e7719fdf83.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-9f041e8fa181897986208bfc1b4d15f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-a26e581f0f5b31b9784d43dce62a01f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-ab348c720a0710e52e24c076c92c0cb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-d349201003f1e073b123310455ca065d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-masta-d853b0e423f8ed0a8520b3730f92bb07.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-on-update-ff845ece92fe1b8afa1885550aee0170.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-queue-d32496895039dac95c881975dd0681cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-subscribe-list-04389ec3013ce0dc7cd91731fa525c48.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-subscribe-list-347522eaa82eb43bdeab94627e4d0f98.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-subscribe-list-acb7010b85ecf2daba49fdd1b1643bd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mail-subscribe-list-cabb923e0e757cd8efc2802197c2fa24.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailarchiver-18ddf3d9a880d4adca00df1dc5502132.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-woocommerce-b001a479011d319ceac5f48bfd2e6d39.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-woocommerce-f9bc7cdb6ab2ec4c7db8c04c4f500136.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-wp-27461955b32dd7d4c16736c7fbdc5771.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-wp-324bc23c2f374afaaf9c80c2964d5db4.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-wp-8bf2330dba276a12443bbd94d613f926.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-wp-a83717cc9322e41d87fb191d4173e2d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-wp-b15c16122e094141ccb76dd4bc1e2cd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-wp-b628a5c29017f302cc9e3a317e522425.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-wp-be854f0427cbc7550be4b51c5093b09f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-for-wp-d08e992a9c86b0410a9dd2a576aeae42.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-8aaee0ca0357561b8fb5f4652479c99b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-b6ffb2e5b3bc587f9c59e8240ff1f1b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-ee6e6063f9b37d080b9aa6c0cc0d0766.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-ef3aa6c6954785fff0d13c0cd6f5cb85.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-249f3208e9e6f6c1af58b4828d3f6027.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-45f25702e8ca4952a8a482198d36d226.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-cecfff430f19f7261bbe2fd52865b1d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailchimp-wp-6d25ab79e6e7aca51a4387e7aae24c9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailcwp-2e2ba7d6aad1663f173d0b9ff5355c70.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailcwp-ed77d9c52a0d8e37bd68e8e975c1dcaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailin-2c0815cfa87364df1650c4d67869632e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailin-66ccaf4314aac7933013ee5ce3827d9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailin-9be87992402232973e6ef9a016dc8c48.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailin-d7263c48cb93df306029f0ae2e2d9062.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailin-ebd2e4e996f9584103cdb7fb70162996.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailjet-for-wordpress-bc4f6148886fd30cd6ed07bbbfa6c2c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailmunch-030709cd098214238b78a48c4d533dc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailmunch-827f2e843a499f08614a8388df30f388.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailoptin-1315b13ed71bd9eb1061038bb0e8996d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailoptin-845e9efdcaa8e86ee95dfb613d1c9636.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailoptin-d4435c597b00bf3290ee73c887974569.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailpoet-0fa38d6cfad2289f1e8e6d314fc29ef3.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailpress-d27df5a411c6747f235668cfd972f89f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailrelay-7e1bdcdaf0857c4f5a72b941792723cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailster-5f27f34098a0ef0f61990648a8a5b251.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailster-62e392ab6ca8e175fe9a689ec13ed494.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailster-9b8d56fa1a52c124371a7a0f3bf72770.yaml create mode 100644 nuclei-templates/cve-less/plugins/mailtree-log-mail-a3abf4c0cdeac928831983eccfebc62a.yaml create mode 100644 nuclei-templates/cve-less/plugins/maintenance-488c9d125819772b803e742156124a9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/maintenance-page-12f99afa0343fc6e2ca09d9458b97d59.yaml create mode 100644 nuclei-templates/cve-less/plugins/maintenance-page-7a445b6bbe1f19472fb82aa1ab2d7a3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/maintenance-switch-3615938f0921b802185b621340537010.yaml create mode 100644 nuclei-templates/cve-less/plugins/maintenance-switch-ebae4a3aba29339c7b56a2e57218464c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-25fb56a80aebd27743fad680f237d7c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-373c4ea18f9baeef2872a78ab527c078.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-519db4fde18bf40cf63b23505a4840eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-bbbf9046b8721bc306a1868ce9ab75b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-de9c08ef64270e7677f62d388e0cc26e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-b8da63590cfb56758e18b031988ea29e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-bbdba7157714312ea1ab0d3f73cd870e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-blogvault-backup-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-blogvault-backup-extension-c7fec950a07b33ca805efa5f4526bb87.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-branding-extension-d432b5b11d667b6f9fe5cd55370cdb88.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-da3f36dbc6e00ae538ec7700a4a5da0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-f0fbe6fb8cd2394ff4cf5755f2e3ce65.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-buddy-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-buddy-extension-88e0ecb64f4709b7a4173b13eb85c3b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-child-02abc776653c0e9d69b2d7bbbb0997b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-child-0d279c099198801fd51b2e6ed08b0aa7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-child-5c361cd216288a792b3417e2eea8c64b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-child-b8da63590cfb56758e18b031988ea29e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-child-de951cb1c07b8f1a00e6e15f2067e75c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-child-f00ee035f691e855432693cfeab4496d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-child-reports-b48bd5a9b387deec2652bf65a2f60d36.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-child-reports-ca770a3a0e8cd6c16a964b242179e2c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-clone-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-clone-extension-cacc6911c40efb999d1fe86f0d0191d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-8f1eedab61ce04ff36cedd6b1737dcab.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-ebaaeb684636cb787d78e7b3c484407e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-f6463e889774b4038473eb08cfdfa039.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-comments-extension-3b5c9ebf6b5cbb215fd772c13336a403.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-comments-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-db895078637698aba713d17b02ab863a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-favorites-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-favorites-extension-bbbf9046b8721bc306a1868ce9ab75b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-favorites-extension-c7fec950a07b33ca805efa5f4526bb87.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-18f9f53e2e66e0e510b2dccb3d10627d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-ef3286d81d94e9b713e6b4a272249cba.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-3959344c0c7e5999442d4341d93fe901.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-49a8bd4f442f3ed7ef68fc2e1242b1b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-ithemes-security-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-ithemes-security-extension-aab60d7e635c7cb328946a00c5cb0802.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-links-manager-extension-9731ebff7e31801f5a40ae7c87af6896.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-04f298147815233cd89825cce559844d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-08e41a2e706bfd45d56edb520c5805b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-page-speed-extension-1700178605ea1a028eb5734d4a1eaad7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-page-speed-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-piwik-extension-c009600ac01b461b216f777bf4f27175.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-post-dripper-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-post-dripper-extension-8b15dcc48a6f92077370cb4c6934bd38.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-post-plus-extension-1a7f5e2f6b8dc141b3974d01e70ce6c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-post-plus-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-rocket-extension-2aa015126a1a525f86550f7ae828f7a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-rocket-extension-7bfb92cd98981d6d2231287741115d7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-rocket-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-seo-extension-5bb6026096b7bf370409b664b0a819cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-seo-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-staging-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-staging-extension-b093b4fe361511a13e571267d2dc54e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-853763a7a24f0714b558d69285e810e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-aca127a8ed0bd7922687fe103f18d74f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-089c7908dc4fffc678d9e3d75fcc62a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-09213ac628577f10fc1f9d7850e68118.yaml create mode 100644 nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/make-paths-relative-c1cb13846b68b46c9143c497ddfb2bf6.yaml create mode 100644 nuclei-templates/cve-less/plugins/makestories-helper-6bd5d755fdb18da0e4495ddee37a2528.yaml create mode 100644 nuclei-templates/cve-less/plugins/makestories-helper-86524d953838185228f7ca0bb9dd8a04.yaml create mode 100644 nuclei-templates/cve-less/plugins/malinky-ajax-pagination-46200eda6d80c305dc0a5fd8d6c3597a.yaml create mode 100644 nuclei-templates/cve-less/plugins/malware-finder-54a5c8f84066c82a1f84ab85f1710141.yaml create mode 100644 nuclei-templates/cve-less/plugins/manage-notification-emails-a2bc40be2dd87e9dcd0977a6fdf140d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/manage-notification-emails-a5a6d2493729bf3090ce1785835756c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/manage-shipyaari-shipping-644c7cae519f04e689e17393d43159b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/manager-for-icomoon-bf850209f75ffce28cf6dbc62d1d3ffe.yaml create mode 100644 nuclei-templates/cve-less/plugins/manager-for-icomoon-fcb2137e4fd0eeb6eaa0769932ceae96.yaml create mode 100644 nuclei-templates/cve-less/plugins/mangboard-33e169ef58595c551d71b2a0f254c1a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mangboard-4e66527828b974bdf1935dbf3ae98ee7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mangboard-50a5bfd5ef4ea3d67f1cc1653c0ac79b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mangboard-b9040953fd9d7380144b780f2d4080d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mantenimiento-web-28c1871bb01e37ab60acecfab790c02b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mantenimiento-web-a43440257ec4eba085c1ac2ce540e1bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/manual-image-crop-e5eb2b15a41ab9ee60dcb2af1f87d2ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/map-block-gutenberg-f3ae8d3614658d0602179cdf953c8cf0.yaml create mode 100644 nuclei-templates/cve-less/plugins/map-location-picker-at-checkout-for-woocommerce-33149871db85e014a52f28e4a7d38f17.yaml create mode 100644 nuclei-templates/cve-less/plugins/map-location-picker-at-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/map-multi-marker-98cc3184ae2ac53e6ec93de75027842b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapifylite-276d9e37b697911176c96dd2534c5db7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapping-multiple-urls-redirect-same-page-13d4f5660b4ca1f115f6a5db8348287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapplic-392f3d0edacca22b6e8516ac27324815.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapplic-lite-392f3d0edacca22b6e8516ac27324815.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-001b828c3c08777c5f66954153002511.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-0db4927fc2e66efc196aae8bda2e501b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-14a7ffa14fbeefc172000dc0caefb552.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-29adc02045150a72bc0879e8ef2cedbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-6bf1979859a94fbe33542b88abb0e15d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-7b6a78f327e3069338279750b3f26ae1.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-a32c5004dd8e3051476b1d2ace4665f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-bed91f2c82382c1fad6f81b58becdcb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-f49ac78d75e6d3fb0dc3afda46d041dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-f938f1ab4ea9e7929903077ead3a87cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/maps-block-apple-34f90d387401d288923a3d216c026fe2.yaml create mode 100644 nuclei-templates/cve-less/plugins/maps-block-apple-48cf291038d407d0c14437de80bf836d.yaml create mode 100644 nuclei-templates/cve-less/plugins/maps-block-apple-54bc1daf26907dc59a5c7876a142ff1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/maps-block-apple-73081b1f6f4e13a9e6e969eba5e746fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/maps-block-apple-bc55ea7b509124d1a77831d4400c5030.yaml create mode 100644 nuclei-templates/cve-less/plugins/maps-block-apple-f9078038dec7d199edb0413f76661495.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapsmarker-13b8a58f1828f2c64647f6e908737c8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapsmarker-22c2313f6ddd97279a9a6e05569e552c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapsmarker-a7b5b9f7aae561ff960ba955e7bc8f21.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapsmarker-ad02e1c1e6ce500678284236a257328f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapsmarker-fcbdec1ff65d61610081880538a802c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapster-wp-maps-e101fa87e9e9a3f0059378f1f396b6c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapsvg-e1d4b31d2e512648b34fb410fc6ac542.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapsvg-lite-interactive-vector-maps-303bc652d47c2a787ae26772587ef7fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/mapwiz-47ec4d19442547ad0d7289d6f4804147.yaml create mode 100644 nuclei-templates/cve-less/plugins/marekkis-watermark-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mark-posts-cf0f772efb4c9beac6971570b02c3073.yaml create mode 100644 nuclei-templates/cve-less/plugins/mark-user-as-spammer-79bf49b5f0577e5e924d09bc9548c465.yaml create mode 100644 nuclei-templates/cve-less/plugins/markdown-on-save-improved-050d7cb19f5f214c16e87b6deb3805d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/markdown-on-save-improved-c99fdfdd6f51accf3ed6f44f28e23a84.yaml create mode 100644 nuclei-templates/cve-less/plugins/marker-io-cca1bdac61a7e1b80d3b722e283a8084.yaml create mode 100644 nuclei-templates/cve-less/plugins/marker-io-fb2c63718b2382dbcdfb9fbdbea83949.yaml create mode 100644 nuclei-templates/cve-less/plugins/market-exporter-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/marketing-optimizer-3f528c05be1996d33dd348d92ec23461.yaml create mode 100644 nuclei-templates/cve-less/plugins/marketing-performance-127a32a3d7486f122ba18339dee95397.yaml create mode 100644 nuclei-templates/cve-less/plugins/marketo-forms-and-tracking-8d38cd4f2bf680c2b1b244824fc691f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/marmoset-viewer-b4b5d874a62067dd72085668d3cf4b24.yaml create mode 100644 nuclei-templates/cve-less/plugins/martins-link-network-95b7b2700fb0920c45a7d61cccd555c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/mashsharer-6b3f6a43a6261f36339646ed344d5b53.yaml create mode 100644 nuclei-templates/cve-less/plugins/mashsharer-7512032bfe4cd740c20bf708ea302987.yaml create mode 100644 nuclei-templates/cve-less/plugins/mashsharer-b4206097b7af70105fc04d8db27b43ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/mashsharer-d7a376bac039b7fcdb01d011343f232a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mass-delete-tags-cd31c4013d622ee5e8af44850bd1bbae.yaml create mode 100644 nuclei-templates/cve-less/plugins/mass-delete-unused-tags-75516a4a673e70626d0531442a9c901c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mass-email-to-users-317ac7f940ff6a7252e873e1a08b195c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mass-pagesposts-creator-5d3fabeb2abe10bffbf3f69299e86974.yaml create mode 100644 nuclei-templates/cve-less/plugins/mass-pagesposts-creator-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-addons-5ad76356f82ec882d88e003164818843.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-addons-5f2ebf4302880b4451790eb5366fdd55.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-addons-8583fcd7447422df9f9725341fb87a81.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-addons-963646e7d7bb88af1ad24a0f5a61ee55.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-addons-ab471e8dcd5ca84019365a59d356e23b.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-addons-e068f616c0efa424554358743fa4c2b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-addons-e3418f180f0cc9cfc471a66e2f29ee79.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-elements-2d24ccd35c9f49dd6df7abc0d20f88ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-slider-1f1264fb01a80102a1939e77505f347e.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-slider-2278ff8679ddb3e8d29bcac77bb31452.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-slider-37adca39d8686698946f55ba4e66fb39.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-slider-7ade56e168a75307ee8a4a01c082f207.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-slider-af6803b7659222cbe48ed01e4976d1d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-slider-b6500312e7eff76638bb1a536f1d8f8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-slider-ec15f998366a90597f3ae6005cf6d8b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/master-slider-f99c7ac14f9b6aff3ca4eaa0306e77ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterslider-0cbc0458d9514fd3618b0ed89f2d3c18.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterslider-5c92085932752374a04afe791196ed34.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterslider-624a2aa57869ce0516a56db0d2b7ba1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-0f202e755d7e2e49728e189143faa82e.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-16f3aadbc51503db1bc43aad84f72646.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-296c49b1bc6f342e92d02be77b2dbe14.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-44e1f2ffb01f5ea3ea36f27a7c236058.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-4f9f0369d878a015f409ab24ea975cbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-55dfb8067a9d9a28485a43b25b96a7c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-5a1407576dc4eee8a15af816c107132f.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-99f4448a717d374af03d744cdc0eb9ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-9ab9e985d63e7f8faa4ebcb1df0816d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-af86ce237a4bf58d93744674227f4830.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-bf3837a16a33f16813a6b85f5185aa0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-f9e11f76930ee22e20526313ed9f389b.yaml create mode 100644 nuclei-templates/cve-less/plugins/material-design-for-contact-form-7-2c15d4e93f6f6d616a273e49657a41e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/material-design-icons-for-elementor-639d631ea2d71e82d52ba35e11baa85c.yaml create mode 100644 nuclei-templates/cve-less/plugins/material-design-icons-for-elementor-eab3c1f0807691261d40289ccf106a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/materialis-companion-41bbba0b761effafe973f064cede1988.yaml create mode 100644 nuclei-templates/cve-less/plugins/math-comment-spam-protection-2c787e56b33949d16c5a8fc8e49284cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/math-comment-spam-protection-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mathjax-latex-c72bfd99ca891cab28a20713d4d5fa8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/matomo-3df1b6184a3059e9fa9458d9fe22e2e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/matrix-image-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/matrix-pre-loader-7eefbdb00f6e0dd3aa9ee384b653f5e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/mautic-integration-for-woocommerce-af46d9a5be7a2ee874bad5ee679a36f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/max-addons-pro-bricks-7793772eece0aff14b3b4690844c3621.yaml create mode 100644 nuclei-templates/cve-less/plugins/max-addons-pro-bricks-cb8a70925c9490ee47d5d493a807b6ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxbuttons-1cc06f74e3aed2807f1fd2894b6227eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxbuttons-2cfa41593b5c54dbbe7f94408a704c8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxbuttons-3394a8c6bca4050b8fcb857b11ee3b36.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxbuttons-47fd93f8dbf38d292961db96282356d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxbuttons-5e63735b86336209453cce97844f636d.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxbuttons-6576cec6cc72bf932987474c7e82dbd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxbuttons-791eff0c2052bc2e9edb50c4e621f28e.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxbuttons-b87b09efd2ae58c86dc8e5fdf3e23221.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxgalleria-4d573fe9c428ad3a04750d4555eab402.yaml create mode 100644 nuclei-templates/cve-less/plugins/maxgalleria-e066c5d256834fe1f65bdb778f74e19e.yaml create mode 100644 nuclei-templates/cve-less/plugins/maz-loader-3e1b73d443d99821d0af1b91c016f547.yaml create mode 100644 nuclei-templates/cve-less/plugins/maz-loader-ccaa11bd28c41ea215a8627a09fdb85f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mdc-private-message-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mdc-youtube-downloader-a6d6119e6304bac68d182070bb782f60.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-alt-renamer-7678a4c43bf3743b099ecbdc547aa500.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-cleaner-f41915eaa49875fc0d02563613a044ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-download-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-downloader-385ab086e084dcab7761c5868fab9464.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-element-html5-video-and-audio-player-6833c69669f3b6c1ff537772ca9a9c7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-manager-0096aa18a8e24a189b34368fe050792b.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-manager-54b9a63aa780af450d6501f70863fee9.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-manager-9116ab86d599e20ae25aa3123513f61a.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-manager-advanced-4c943f748aca793575933803bba5acc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-manager-bf399dd02aeab6e8c35f662b2b5169e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-organizer-00bb27b1e1befeeadd2692ce2f1a6969.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-renamer-22a2226407a4248640044dd2df483fba.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-renamer-6234c54583fe97f4b335659ad6e8c2c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-renamer-6e4ac4275a14e860f6690b3cd168f08e.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-renamer-9a06183bb7fd52c18dc709884017b765.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-file-renamer-e76a25dd6d02a9976e1a45024d852c58.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-from-ftp-0efd51ee11e484e5ac059494b28050b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-from-ftp-28349c1e621b4d3993d035aeb46ae68e.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-from-ftp-c3c6f65072fe37bbbc2ef7dbe119003d.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-0b903181e53a3afd2853d8a217d8de8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-1071684e8b4fbe11ac61e0256dfaba92.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-1749acb4ff55d423ebb0f0a82a7c5808.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-1bcb114ae8bffc625089b17287fe97ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-2e52fc4f7a8504883023eba2284cc957.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-315158d01f8d35cf2208dddc8f7964b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-4028fc1d58c158acfb13c46a4db5a2fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-5541a58ff6aa2455768527014bebcd1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-7a4b57c89eea61dbc376b3ebcfe96a70.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-c35f9ed6b93a44d06dd09e34e66b7586.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-cd5bfb58064b9745ccbd3f1f59ac312b.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-assistant-eb721251db16f750bb7b6d9b4bcc4dbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-categories-01dd63a5f8faf96a00782f6bc3eb47be.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-helper-2c2851e9d6588865c8c62a92765f5da7.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-plus-15ea5684525ea85792493d1e42c50ee1.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-plus-2fee4732545e71342d59a2938407fe7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-plus-33bc7d755c896ae147d69853031aefe1.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-library-plus-7f361b8e267eec159cd338045858bebf.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-list-62fa04687cc3a59a6c68564d31d19c75.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-list-9a2c39e647de10bdf5506fe83c7446b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-mirror-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-tags-5a607f07c740543865789590cbca6639.yaml create mode 100644 nuclei-templates/cve-less/plugins/media-usage-3a2cab0afb3070dc0c2fdad7d3b7f22b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediabay-lite-b53850514eba837c1bf2ca4cf00a35b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediabay-lite-dee11a999eea8acc0c1d0780e652bd48.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediaburst-ecommerce-sms-notifications-167d9672411be44feb72a5175fd0987c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-030658ba5cc0f002fdffef84e42ae14b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-167d9672411be44feb72a5175fd0987c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-8536de3de245d6a4ab6eeac77e95e618.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediamatic-0b95cfad1999ef6bac1ef79ebeeb624d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediamatic-66ac5cf55cb601e1e04c93898023eadb.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediamatic-957e023e162fd65b104346c605f19c7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediamatic-d708fed52a98da33c7b5f777938fb90a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediavine-control-panel-2f4da607198689ec8ae90e2f847fd2a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/mediavine-create-4db517b5824cdbfb59767dcfce03ed88.yaml create mode 100644 nuclei-templates/cve-less/plugins/medibazar-core-0e249eccad21574e2f41d6b727c12756.yaml create mode 100644 nuclei-templates/cve-less/plugins/meenews-a0535ae9a08f66698f91957812ef49de.yaml create mode 100644 nuclei-templates/cve-less/plugins/meet-my-team-a2ba0d175d26a5652fc4c3dde4656860.yaml create mode 100644 nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-301e81e7a190a838bf006476907547b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-647a040d673e13659115740c0e6a164f.yaml create mode 100644 nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-80701456edd5634e54dde4f94f03d86e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-85ec9094d25566acdd5938abeeebadbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-b65c2cbf689ff5e6c36de8e6ea88fb1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-c1f8f105aad937fe6b4d3f7e729e9b4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-57d7eb4c0bda23c172922977bec66f98.yaml create mode 100644 nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-aef5861873c712667e57c762ed3ff81e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-e462c11578c3d7efd1d373387e69d961.yaml create mode 100644 nuclei-templates/cve-less/plugins/mega-elements-addons-for-elementor-e12b4eb0afaf97081bdd86d34fb980c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mega-forms-ddabc756c7ddb5aa3f2db005373f60ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/mega_main_menu-3c9418584b935e41a1f48b31c0a5f181.yaml create mode 100644 nuclei-templates/cve-less/plugins/mega_main_menu-951a77020b9388eb21ea61b4c1dfd9f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/megamenu-68c192a64ec1c6719c741f7b5a598887.yaml create mode 100644 nuclei-templates/cve-less/plugins/megamenu-fc3a86631dfc485c0a87a802663d412e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-audio-player-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-easy-ads-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-easy-instagram-widget-30f045a25a21ac539fd3f995d744abbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-easy-instagram-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-easy-maps-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-easy-social-share-7f939cb3e37ce54ad131378445cfa889.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-flexible-shortcodes-bee37332f6e8a8436cc61a9d140d558a.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-simple-flickr-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-smart-author-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-smart-social-widget-065fb6634c2979f9a8dbb1a289a68a9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-smart-social-widget-12cfc5e2c42c1035bf0a62b514ef0564.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-smart-social-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-smart-social-widget-f41b10488dd7d69ac4748b8c313105e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-themeforest-smart-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-themeforest-smart-widget-e224c1cc32d6c05f266106ae47b5db38.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-time-ago-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/meks-video-importer-b1fa67bf969fdb68e71efc5cd730124e.yaml create mode 100644 nuclei-templates/cve-less/plugins/melhor-envio-cotacao-d9141583a795a1e4a70084cd717fd9ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/member-approval-3a91d6c48afcaf4ec202f8da0ad11a12.yaml create mode 100644 nuclei-templates/cve-less/plugins/member-database-e4f24d3eaa8049812bc7024a030b7c83.yaml create mode 100644 nuclei-templates/cve-less/plugins/member-hero-59ccb7283840efae740fe390413a3bc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/memberlite-shortcodes-e0d43cef694a102644215555aaaf71de.yaml create mode 100644 nuclei-templates/cve-less/plugins/membermouse-9e5e9e74e35f7340ef7a86eda535ec55.yaml create mode 100644 nuclei-templates/cve-less/plugins/memberpress-bc9d740ab02dbe4e65f7bf071f0e62db.yaml create mode 100644 nuclei-templates/cve-less/plugins/memberpress-downloads-dd0bbd05ca9ba09666d0154a80a50eb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/members-import-3faf0e242f65e17c979c6f608e04b73e.yaml create mode 100644 nuclei-templates/cve-less/plugins/members-import-44b1b2f0eb9245a5807308d2327328e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/members-list-c881e85c226dfb23c551995ac2bfcc0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/membership-by-supsystic-6d746a5f0aa53afdd212e69305550ec1.yaml create mode 100644 nuclei-templates/cve-less/plugins/membership-for-woocommerce-64b1bd7efe43945fafb1a600e8b59985.yaml create mode 100644 nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-2aa29c629074136ede505c61ef73b338.yaml create mode 100644 nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-384486cdf221789bfec827528caf2a6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-c2edf18b1dc2c5d697f81727cd0bac3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/membership-site-e54255e9a743040c053c6d8e8f67ce92.yaml create mode 100644 nuclei-templates/cve-less/plugins/memphis-documents-library-19255b523a36605faa1b692fe0bb8412.yaml create mode 100644 nuclei-templates/cve-less/plugins/memphis-documents-library-59c9b879f516cc2f3ec6fb5323e1397d.yaml create mode 100644 nuclei-templates/cve-less/plugins/memphis-documents-library-6a2ef437dbd84b379d13828c6767a7f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/memphis-documents-library-f4052902eccc72acecc4529d7a789e28.yaml create mode 100644 nuclei-templates/cve-less/plugins/mendeleyplugin-9cb69a500db940ecfdbb3ba869c26c38.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-icons-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-image-34dac14ec559cdbb5998de7d415317dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-image-800833211422a31fa0bc329389e6ba63.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-image-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-item-scheduler-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-items-visibility-control-15bf765de2821299511e8bf3105d6965.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-ordering-reservations-211f53d8b1b52b0d7d117c8d6be4a364.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-ordering-reservations-2624b69820d22e5b5127f2b411babf77.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-ordering-reservations-52f3f56cac58e66f1b3bbe271591fbea.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-ordering-reservations-8a39f2bd8431601e1f483135ec0a1cca.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-ordering-reservations-901a8544f8fe096e9fdc9630ea2bd15f.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-shortcode-9fdc305e956b483dd32edefc410a0147.yaml create mode 100644 nuclei-templates/cve-less/plugins/menu-swapper-d19b62fdb46f9085fa90ed6dd74d5a4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/menubar-26d6e68f9f68d57837f1391aa39f629b.yaml create mode 100644 nuclei-templates/cve-less/plugins/menubar-fa79ef441dd7b35cf3488c2a42a0ef43.yaml create mode 100644 nuclei-templates/cve-less/plugins/meow-gallery-66b4e3e9081347f407fc784e61ce0c30.yaml create mode 100644 nuclei-templates/cve-less/plugins/meow-gallery-c5cb3504c5d5a8aca1e1480362831116.yaml create mode 100644 nuclei-templates/cve-less/plugins/meow-gallery-db3802f450d9e0fa899a4b52caf267f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/merge-minify-refresh-19904e18d7847af1a770f2d024bfee5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mesmerize-companion-3816de1a2f06ca9d6d7c8b9dfb0a51bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/mesmerize-companion-a94f9a8cf90bb953afc0d4af139b3df4.yaml create mode 100644 nuclei-templates/cve-less/plugins/message-ticker-5b0c7f3f3f3d8554824f38539044b215.yaml create mode 100644 nuclei-templates/cve-less/plugins/meta-box-00301543cb972104eceace7da89e80f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/meta-box-1b89ecf879d1fbee7de1501d6959af35.yaml create mode 100644 nuclei-templates/cve-less/plugins/meta-box-dc129067ca38c26e19992abcd62ec625.yaml create mode 100644 nuclei-templates/cve-less/plugins/meta-box-fcea98b14977cde9054b36a1f61fabb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/meta-slider-and-carousel-with-lightbox-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/meta-slider-and-carousel-with-lightbox-cfbe849419c020c14e6592e12a1dd070.yaml create mode 100644 nuclei-templates/cve-less/plugins/meta-tag-manager-85f58ceac5f2aff68a6dbc6ee57ae093.yaml create mode 100644 nuclei-templates/cve-less/plugins/meta-tags-for-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/meteor-slides-d785c662ffdd5bb603cbd342128e597d.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-0a04782a874d0e98b450ea3140cd608d.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-1cd960c12693f517a3ddc1f2dd996093.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-1e853b05728a99a8747a224a5333ce69.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-1ececa6da15663bf0de4cd1f9cf0b9d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-2f98768ab3ca0c5e24ef32eeb6e8633c.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-4069751e80b8d8e6ebfbb3d8b76ab1b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-547f6d438086b7c901daed3b548b280c.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-5821b8bbdf52273dc284ba9fb20cfb12.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-5ca6c532bc755bf0bf6cce4098713b54.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-654990e546559285765575a21c3a354c.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-7ec1193c499ff8ca62486bd031ee3b72.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-80129a218b0d8978bbb5382fd0cace63.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-867cb44fcfb4a79db1df0d5c41aba304.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-9a3f3b16255e398a1ca1a217f9b4775c.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-a94be3f467ceacb837ea20db05393018.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-b8d7c77a852c836225d21aa48dc5ba53.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-bd74a2b3418b2ca97de6f6d3609c3ea2.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-cb9d0b1e1071125567f9f9731a764d07.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-dc74f0149670643ede0c882a9a3fc584.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-e1d3d2561a3fd7b42de1d4a0992e9e3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/metform-f16e74cd433857af6e0b58aa13a15fac.yaml create mode 100644 nuclei-templates/cve-less/plugins/metricool-7746f8e1b3332b64c44418f10c52b872.yaml create mode 100644 nuclei-templates/cve-less/plugins/metronet-tag-manager-3d637613552d802b9173bc064749bb1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mf-gig-calendar-2569de726bff5107260fe23150979031.yaml create mode 100644 nuclei-templates/cve-less/plugins/mf-gig-calendar-3b4cfef4125eaa81be8aa8c8ba6a4733.yaml create mode 100644 nuclei-templates/cve-less/plugins/mf-gig-calendar-4e3d792205a2fddf6adf72e5213cb0d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mf-gig-calendar-6597d2336023fb01ba6013c2a92f4f5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mf-gig-calendar-abea62bbd724165a2322bff6349a74e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mf-gig-calendar-bf34e0d076673dbb1080a2742b54fd0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mf-gig-calendar-d0c53aa3e05b1c3e9ba3c621e2806fb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/mgl-instagram-gallery-fe1f1b8568ab900402e4ee21af348064.yaml create mode 100644 nuclei-templates/cve-less/plugins/mhr-post-ticker-ff23d770fb11fdc3c77523a1486cf3a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/microaudio-c7d6824255615bb5cf89bed6fab2e902.yaml create mode 100644 nuclei-templates/cve-less/plugins/microblog-poster-02bdb4a60f8caf982b09839a595e4b9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/microcopy-f8764dadc75611aef7a1572c7ab006f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/microkids-related-posts-356ad590173ed87428302fe3f1cc7ead.yaml create mode 100644 nuclei-templates/cve-less/plugins/microsoft-advertising-universal-event-tracking-uet-4a64b780bf144c05e7e8310b30ac549a.yaml create mode 100644 nuclei-templates/cve-less/plugins/microsoft-clarity-41374c7f8d145b4ed7aa35f41d920496.yaml create mode 100644 nuclei-templates/cve-less/plugins/microsoft-clarity-e52bfc62f1976371888e01a2d756b470.yaml create mode 100644 nuclei-templates/cve-less/plugins/mighty-addons-57c5519a5f47ee08f543aeb9d674466b.yaml create mode 100644 nuclei-templates/cve-less/plugins/migrate-users-2bf14b27cfeeb5a91ab7cdef09310906.yaml create mode 100644 nuclei-templates/cve-less/plugins/mihanpanel-lite-fe8e1355a12b62369103d3644c987bb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mihdan-index-now-5f88cf9fcaa2bf2f8f88d764e30b12bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/mihdan-no-external-links-115be693fa2aef7e78774bec69a9ed0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mihdan-public-post-preview-1e5ebadce2a1ab9a5fd9a23d7bb80d5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mihdan-yandex-turbo-feed-3155835b4a53204a1664eff58384d4a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/mikiurl-wordpress-eklentisi-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml create mode 100644 nuclei-templates/cve-less/plugins/mimetic-books-a4f62ab934de0d3b7e3d119485cf9183.yaml create mode 100644 nuclei-templates/cve-less/plugins/min-and-max-purchase-for-woocommerce-e69e5ad6d5e1c350a8e72b9f067b0efd.yaml create mode 100644 nuclei-templates/cve-less/plugins/mindbody-access-management-9f9a85cc7dcde674a13dc865058427ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/mingle-forum-4a9495cead71bfc76b3becea53804acd.yaml create mode 100644 nuclei-templates/cve-less/plugins/mingle-forum-8baae250cdfb2a5ad0824fa7bf9c8a47.yaml create mode 100644 nuclei-templates/cve-less/plugins/mingle-forum-bb8b3412160ee9a77c9d2e3d86221321.yaml create mode 100644 nuclei-templates/cve-less/plugins/mingle-forum-ca1107b3905cae6801d38dcd71b363a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/mingle-forum-f35fe23400199bbe42a795d71f9a637a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mingle-forum-f5e683528ca64d9d4bdd8fbc39278345.yaml create mode 100644 nuclei-templates/cve-less/plugins/mingle-forum-fb045d9c371baeb404b4c5f1d77f622c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mini-cart-56a0c79ebe574b006dcddb57a105ed57.yaml create mode 100644 nuclei-templates/cve-less/plugins/mini-loops-43b8fe08466d27ab3e4146e678872b9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mini-mail-dashboard-widget-72675dc0f12c8960a29f55b61a35c78f.yaml create mode 100644 nuclei-templates/cve-less/plugins/minify-html-markup-50f1f1c9543c7aff43ee35ce25ee5c01.yaml create mode 100644 nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-39eb4a9ab67b19c7b3e7b850c04221af.yaml create mode 100644 nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-6ae34c162bf6aa13569eb35a0dbe9a73.yaml create mode 100644 nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-6ff8db6967b717d0cf958b73dfda5c1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-843fe9a3debf8db188ba99413c342e16.yaml create mode 100644 nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-a7b78f7a058348bb841c19e95bd21064.yaml create mode 100644 nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-f65f188c6963620914763af01a71f9a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/minimum-purchase-for-woocommerce-ae760478256ed9e96e189f019a687210.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-0e334f8b94041fdfb0dbd420bf6d8572.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-171f9c1d23a1dd854f2389f7ab9f2720.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-2c78335d8d426bf0b25d79bcc3a1ab65.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-475af873f1e12ccee816ba0a881cf405.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-4764645e6471ac58214ba2ea5f55bde8.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-7f9d8f2c0da9df1ec2dd98d448e2220f.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-8c3657d5aee544c7f980b9786567d40a.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-e8c972936c2236ad7c5d5d3d5c2525c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-eedcf99ab0d16ed7e1ce60956191875c.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-discord-integration-14052cb4248c1d727995c47dc9e235be.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-google-authenticator-056a681add2c2e01374393f870550b92.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-google-authenticator-0afb6b2d10846bc66cf5079f2d5cff9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-limit-login-attempts-1c092eb4ba33ccf4bb9feb95671821cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-limit-login-attempts-6f5594aa21d74ab20f466ec04157beee.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-openid-0881f47c3594ae8da08c18a925e96922.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-openid-5585b9de0a3cacd6beb8b8edc279fcc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-openid-5e2f11a884ccbe34c9944f9c84b1340e.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-openid-65a50bc077f23975d5d3179b1fb56daa.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-openid-7a725b90d4cc282b22e04990737c3b98.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-openid-c57529c85cbb2380b599b6f25e5d1cbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-security-de7221543e5e73690e1a713271a64c51.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-225cea6ba5a10bdee2c9620d04168830.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-8d13a40428bf38232a4e5bb1180f642a.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-9d80c6cd84258efd69f77a8f06dc55b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-9db01b7b537550571e5aaebf6e7d1ee5.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-eebb96ce6566b7b10661225a9046264f.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-fd8ebcf9d5fa5c6862626035f1ed028e.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-login-with-whmcs-7f3cd8184f95fe5ec57b6436f927a39d.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-malware-protection-504399029097a5e86b5ba9c9da19637b.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-malware-protection-65d716f9ae4f07532a2c4f0b876ee91a.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-malware-protection-7ed5021e959e36c29209eaf63566fdb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-malware-protection-86d39e17ff25614aec648f264a3fb15c.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-oauth-20-server-d2f88ba803df2886b1661d9e9022a666.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-openid-connect-client-039ddff757a24293b6b8e40930fc38b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-openid-connect-client-eebb96ce6566b7b10661225a9046264f.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-otp-verification-0cc0c3f4bf4487c2d84931d62250a698.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-17d0dd4ca47cd3783ad012601e5033f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-18ed21ba8d359bbdba46edad48e67bc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-27f647997621b679fa1b99cbf345bdbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-6125bda092f086c6d166ad135d42c4ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-c63318ebb764a0fec0149a0fb8aaa846.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-cef3df52a6e193270f584096ae2ab14a.yaml create mode 100644 nuclei-templates/cve-less/plugins/miniorange-wp-as-saml-idp-73c8c687b5d5c2441c948ce0feefccb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/minmax-quantity-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mistape-2ab8437211d9c31dd339d122d8d0d412.yaml create mode 100644 nuclei-templates/cve-less/plugins/miwoftp-23e0e48f6d4b609b278b4fbd54ac10a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/miwoftp-8e749acf47b12b0f727ea31609204180.yaml create mode 100644 nuclei-templates/cve-less/plugins/miwoftp-d10118590b8b4520a15b5f492941e4d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mj-update-history-d6ad3a8698b0ea599d014ed39ac8e503.yaml create mode 100644 nuclei-templates/cve-less/plugins/mjm-clinic-9d05bf270be054dfc1695e62a3911511.yaml create mode 100644 nuclei-templates/cve-less/plugins/mjm-clinic-df39b25c059b85a56edd3d99d606296d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mklasens-photobox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ml-slider-162160e2cd5796ea83b5a0cd63035626.yaml create mode 100644 nuclei-templates/cve-less/plugins/ml-slider-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ml-slider-2c78a721f8f6bce6bce705e149277edc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ml-slider-511ef268c5ca19fe7d62dddd9e13f37e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ml-slider-8f6a16f6b7fab2bb0e2d710564ba823c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ml-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/ml-slider-e13785deba801d5052c18262b9c1ec9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ml-slider-ed137f483ea3e94091bee5b4d772d058.yaml create mode 100644 nuclei-templates/cve-less/plugins/mm-email2image-0f3e86b7ffafefc40e02ec0059e76f0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mm-email2image-bbfbe8576da0ded63051e9606f0a7198.yaml create mode 100644 nuclei-templates/cve-less/plugins/mm-forms-community-f0d4af3ac8d411e11b76b00eb4b51ce2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mmm-file-list-0ce6b6a0e9e78d060d6ca04414281584.yaml create mode 100644 nuclei-templates/cve-less/plugins/mmm-file-list-d3e919ff7a9e64072ba58c94844a6e21.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-address-bar-changer-2b956076e06d8a99488143a30a260c6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-app-builder-by-wappress-15489796bd09e80a5df20c3ad36d5a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-assistant-connector-95502ecdd8716998187f526e7bbce587.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-banner-836d373165d51be73f6a63a08a49cd34.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-browser-color-select-1fd788f4344858c60db9f8c8da73d2ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-call-now-map-buttons-f7f88d86922c2be2737227c4eb89350c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-domain-fe35f0738e4eed8ba11e27597e2d27c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-events-manager-32e884b82485fb448af167a249e58037.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-events-manager-d85e4c485a8dd6af61949c32b1b03d7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-friendly-app-builder-by-easytouch-719ff6e603e56a8355496bcf6077970d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-login-woocommerce-2d6d4e818a96c6e23f130697cfe95544.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-login-woocommerce-cc96636e9196394b50c931f7bad41740.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-menu-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobile-menu-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobilechief-mobile-site-creator-9d62e328d915f4bc5d1fc97fbe0f1bbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobilook-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mobiloud-mobile-app-plugin-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal-dialog-1520c53880fff07e37200c6f21a3681b.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal-dialog-d9262c55837abd68af90e0f35bcac926.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal-popup-box-033ec25d9b806257f1f1c6f477525749.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal-window-51118229a20281c018b629d79b26bfc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal-window-53ff289b27bc5f383393c1a07c0f7797.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal-window-b0b1da93e1bc1134b2188925015af3dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal-window-cc4b9c34f1deaedc9df4457eb9089929.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal_survey-935046babdac50e2ed055ea1c49891d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/modal_survey-e5797459c3da936675c447c68b51e6f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-addons-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-designs-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-042678d5382067c26f9d9ead263e484c.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-075f9c166c068dd8df28c57bf8d8a51a.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-07fde43240c3cfe047c463512be535e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-17e0aa925f801ca2b1033cf696b44f43.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4092810de68e3fe8831c5002fea9ea96.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4bedd1090bb0c6292f056d8449ad5ac2.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4dd145dc4bcaa7b143713cd5ced149a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-61e330316e7097e0d9e2b13495d29a1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-6a51878e913acce27812b845eba68b33.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-aa263c677cae425acabeef2fb6fe8722.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-afec02ed4fb861008e492afadabc92bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-b99ab0aa7e8eaa169d59d870ba15e44f.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-c1b0a376f2ef6bdd72b49e73751ed117.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-events-calendar-lite-f91654e07624f568e772537007d8ac97.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-footnotes-2885ef88741e4fead832f53749584e1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/modern-footnotes-81c4580372e23b6ce41423bd5b13253e.yaml create mode 100644 nuclei-templates/cve-less/plugins/modify-comment-fields-b8d61c50a15345214ea99c6a9bec5742.yaml create mode 100644 nuclei-templates/cve-less/plugins/modify-profile-fields-dashboard-menu-buttons-ce8e510bc9bb481895074d6c2f363e65.yaml create mode 100644 nuclei-templates/cve-less/plugins/modula-best-grid-gallery-010a08c8c856a2f4fe4e778e18ce7576.yaml create mode 100644 nuclei-templates/cve-less/plugins/modula-best-grid-gallery-4d03edde0e9ae80bf33d37f9424bb420.yaml create mode 100644 nuclei-templates/cve-less/plugins/modula-best-grid-gallery-5e22f1474aec701db6c415effe7ee5bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/modula-best-grid-gallery-e61de1050508666739a7f43858724491.yaml create mode 100644 nuclei-templates/cve-less/plugins/mojoplug-slide-panel-2c9039886374ff786c4c2e679732fd8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/molie-instructure-canvas-linking-tool-5efd9ccd23023c6687750d4699e0bae0.yaml create mode 100644 nuclei-templates/cve-less/plugins/molie-instructure-canvas-linking-tool-d9dca1ca98884ba1a76cc0dbb34099eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/mollie-forms-50358f3970bdc1205a29969915a6519c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mollie-forms-8b372eebc313c06900867e460f19a6e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/mollie-payments-for-woocommerce-27287fd1e5df71f58411b21feefa43bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/molongui-authorship-10a5adb358d22a46b8999d9c2d8dbd41.yaml create mode 100644 nuclei-templates/cve-less/plugins/molongui-authorship-1a6bdad9f927d9cadf5b74b8297f6ad5.yaml create mode 100644 nuclei-templates/cve-less/plugins/molongui-authorship-49b132283a9d5d5c8363ef530fb522a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/molongui-authorship-8085a553b4ae6877292f03c349db3efa.yaml create mode 100644 nuclei-templates/cve-less/plugins/molongui-authorship-bc5e92508a73c7bd5e881af5254740d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/molongui-authorship-d652edcb171ca597cc73fc3fc8e858f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/momoyoga-integration-179886cc2bdc18bcdb57983a57be1a6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/monarch-a2b478ab05dc0dd0616e45e762ef893a.yaml create mode 100644 nuclei-templates/cve-less/plugins/monetize-4faeaa036aeca6705f522edda2ba7bc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/monsters-editor-10-for-wp-super-edit-fb73f4916ee278e30528ba4cbf3fead6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mooberry-book-manager-142c8db8e90cbfc032437c60b440a7f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/moolamojo-0c582e7ad3f8369ffdb5a262e96fd69b.yaml create mode 100644 nuclei-templates/cve-less/plugins/moosend-email-marketing-e54ab178e0430008f60d1b3ffa4fc240.yaml create mode 100644 nuclei-templates/cve-less/plugins/moova-for-woocommerce-1e2c9d24715886d9ba11e810be7c57d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/more-better-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/more-featured-images-b073725ff3ce84124c4fbaa39058dd12.yaml create mode 100644 nuclei-templates/cve-less/plugins/more-from-google-86350814cdd1486c9f09dfd7f4c47b39.yaml create mode 100644 nuclei-templates/cve-less/plugins/moreads-se-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/morpheus-slider-6368f485fdfbfa4bcc6e9fc96c77a440.yaml create mode 100644 nuclei-templates/cve-less/plugins/mortgage-calculators-wp-51d2a215a7382b06f6f66c19158d7560.yaml create mode 100644 nuclei-templates/cve-less/plugins/mortgage-calculators-wp-fa0a09e9f8b4c6d9a874ba45527ab6cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/mortgage-loan-calculator-f33817d1f67c73c0784fb9213086394b.yaml create mode 100644 nuclei-templates/cve-less/plugins/most-and-least-read-posts-widget-9cd32e924e90d865dad41a30260e1347.yaml create mode 100644 nuclei-templates/cve-less/plugins/most-popular-posts-widget-lite-53a42a688a74a64b49721153f05dafd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-0c539e112e844dc3d098253d72219bba.yaml create mode 100644 nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-6df10c7399c7708f8d890fc41acb909e.yaml create mode 100644 nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-a7db1d4f6120721a3e8e59e280eb640d.yaml create mode 100644 nuclei-templates/cve-less/plugins/motopress-slider-lite-c70486d9239c270e7b09b18c9bd29bfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/motor-racing-league-20fefc27d9160f7f5b2c386f22a44380.yaml create mode 100644 nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-2384bd3b0863727d54b70a40269280b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-5f4c06c81ffca615e40ab92efa300ef7.yaml create mode 100644 nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-7af7bb77429bff8431b75ff2256568d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-7f71b4b272aa7eae4323778da0a9d0b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-8395989e9f463aede02be6293faac97f.yaml create mode 100644 nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-8fa1d4a13962968fa7c19c372fdbe540.yaml create mode 100644 nuclei-templates/cve-less/plugins/mousewheel-smooth-scroll-8cdddca0d188c62cd387707bc2f1bf90.yaml create mode 100644 nuclei-templates/cve-less/plugins/move-addons-b4011099159d4b47f74f5b5034151fc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/move-addons-ca90bdb25f0c955406427bf755373f05.yaml create mode 100644 nuclei-templates/cve-less/plugins/moveto-0dd7f3bef33b38dffd2e7e5e50a01f63.yaml create mode 100644 nuclei-templates/cve-less/plugins/moveto-6b0918bd33802de1773e3becb0772e50.yaml create mode 100644 nuclei-templates/cve-less/plugins/moveto-aa8a8d1534c979b4a72d9c8bec09fbff.yaml create mode 100644 nuclei-templates/cve-less/plugins/moveto-f63e9747e46d5f44e7922b736df250ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/movies-ef405b3cbb9ac83187d4757d187f0977.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp-restaurant-menu-d9125d7ee55fa656fa01e772da7b6ddc.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp-timetable-416df9dc9f4f5af0da5661ba17f7f5c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp-timetable-953e4421c93547e97fe8ff565f4ade18.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp-timetable-b16f008700574256ab90c1f92968c3fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp-timetable-b786e0fb120de39094300b65ca31a23d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp-timetable-e189bd98f7f3328138bfc4085cfaad2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp-timetable-e1f321924caa4de1b547928bc7e2455b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-jplayer-1a28da6fce455f006c2d11b2e29e3af5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-jplayer-498c92520d857cb30ad7df8aa299fc2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-jplayer-69793a32c02cbaffdd1e5a5f626bea60.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-jplayer-f2f737655d264b31c43ad2bd812bd2dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-060bed5b5c04d1a43c1e948b34028358.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-48b15a3295f54b70d085f78d5d278b00.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-50550f19ed80806cbfb18739f79665ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-8661844c33fd37e07467aee782d9dedc.yaml create mode 100644 nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-d0ed004aea7762f7063b9f573c38b581.yaml create mode 100644 nuclei-templates/cve-less/plugins/mpl-publisher-c19240e29be09298009c0e0215eb1f86.yaml create mode 100644 nuclei-templates/cve-less/plugins/mpl-publisher-c8b3ba4607788e0f441ac762600baab2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mpoperationlogs-2c4dadbb79348c7faca155e820c1a261.yaml create mode 100644 nuclei-templates/cve-less/plugins/mq-woocommerce-products-price-bulk-edit-f255a0d01d888b1ab68c9fee4e439ae8.yaml create mode 100644 nuclei-templates/cve-less/plugins/mrkwp-footer-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ms-reviews-3b3f96c33b07ec89b36c294dbf4ced51.yaml create mode 100644 nuclei-templates/cve-less/plugins/mshop-mysite-13034f6a839e821ee8d8b6496142d778.yaml create mode 100644 nuclei-templates/cve-less/plugins/msmc-redirect-after-comment-5ac91f4d7709824d7d324fcc63da5897.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-11537cde4e91f43e48d58ef19250e138.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-11bfec28fd7489d580b927090a0bc03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-1f2fdbe5d410730df888dae6fceb7e5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-218590420fdaae12f7b13eebfab8b845.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-2a9ab106af487c2aecdafee383fcc254.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-46d4ebf7038a0e8c484c9aea0e512d27.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-4acb0dd741daeb068a56799abff8a41c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-4f7baf83e51eb30ac1967902ba81559d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-5c09d79123e7df0cc552b5e3e1fb85e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-5d1b1d2d30b64ee220b927e779fd3a7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-62a933125d13190434146b926be57bbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-63f43a6e88da428774e18ac7305171ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-6f2e39604a581bcc0a7b4f915eff3dd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-7dbb92a1633f5650078c7c51173954c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-8506c65667776b8fc6f83c7b99b46a44.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-8b6490d616c3b0afd9a25ca2623da6a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-8be08765ef433238fcdb1a43ba0779f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-9a8385daee7a51370fe7b2ccb01dc7d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-ce3e51128d47fab10d04046c408cb2e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mstore-api-ffa610d468201a00e5838193890dc873.yaml create mode 100644 nuclei-templates/cve-less/plugins/msync-a37d3498c6bbcc050576781692b33c90.yaml create mode 100644 nuclei-templates/cve-less/plugins/mtouch-quiz-2f5135a2953d35c3e23bf8648ed00b7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mtouch-quiz-5973e024827e1b713c70489b0018d6d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/mtouch-quiz-5ec6acde81c3a11c030c7e48fb82e3a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mtouch-quiz-802392d669a0739410b0400626ccc124.yaml create mode 100644 nuclei-templates/cve-less/plugins/mtouch-quiz-bb563e95b48b650f94219f11430dd39c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mtouch-quiz-eb50713c1c0af0073e35c8d86469e373.yaml create mode 100644 nuclei-templates/cve-less/plugins/mtouch-quiz-ee5dd1bd7e8e451209210bdf95385813.yaml create mode 100644 nuclei-templates/cve-less/plugins/mts-url-shortener-5fa6ee2c71bfa785ae78ca09e3e47838.yaml create mode 100644 nuclei-templates/cve-less/plugins/mts-url-shortener-e9eaa7084ed183eefbf2977e6f156e8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mukioplayer-for-wordpress-3f7de3cf6df81ad19fedc60f8e9d029a.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-column-tag-map-1179313cfd258782fb4aa71495304bc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-column-tag-map-637e4daf2caafdb5d476cac6dee7f199.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-feed-reader-ae474b19622d960a9a30327a508a7a8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-meta-box-7dc2950e20e339de0e3c41a3a14e05fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-page-toolkit-d6476ba9d1f9af74d842dc5c3e1d7008.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-plugin-installer-3099a61a8f302cdb834fd2736ccc7edc.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-rating-125f6e76ab3144c958a71a6f072d17aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-rating-63aab415fe29b03c8068882fbb1507f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-rating-7116e76b9d33cbc2c26869f8330931eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-rating-d5187e60da4aa17f7ec3f00e2f717a1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-rating-e487dc2fff22059c80c2edae74cd9a80.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-scheduler-841c70d8af33e4bb86e8b280b12a2f3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-step-form-262d571e1dff2c8fb3abba675c28c4e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-step-form-26e086c596fe6398b20ed3be8129cc9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-step-form-2822e321e1d70cd0fc641dbfe5a0bd37.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-step-form-447bef3440e263d45c541524d37bf6b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-step-form-463f67413eb1dfd1e1c7f65db3ca7607.yaml create mode 100644 nuclei-templates/cve-less/plugins/multi-step-form-962810e9bfe68aabdf565feb933a98a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/multicons-704fb8f9c5192e5c8b8563d28e2e91a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/multilanguage-d9699105126f16c0390a040c8ed5a573.yaml create mode 100644 nuclei-templates/cve-less/plugins/multilist-subscribe-for-sendy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/multimedial-images-bc5e61b065b355ecda981dfb9a91839d.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-194154b98ea167d5243ca3bc6185dc5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-4e39f41aeadd0e0dd90d8ba63c20d6b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-890063830c1c25aee11e9fe1e8798a54.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-b219b525f96b2aa71ca7a26ac08a9b92.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-e463bbf0a92d1f70c76687905b887fc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-e6a704ce234334d9f31ac517092f1bb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-f76e1c53234e1a9b18e0328f53d84dde.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiplayer-plugin-3216cccc2ccf209ed6afbf1298c4c973.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-domain-3a3edd25e4fa2cd1428645e4e1a051ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-03e8fea4abe393774ca83cec29070e62.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-1f2e03d503f5681dd8b4d168bb6a5e29.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-2428c4eb87b4651b0b610c5b37e29f17.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-410043251186f9da5efcd4c944487f1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-7573fa793301510c262a9093c76e28a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-867692d864273a70bf9ff47c77dd8e22.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-bce926ab22529c16e0539f0acc228409.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-post-passwords-308319ee878eb47d99190ad100843184.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-roles-15583129ef6cea1a9a42a4bb010eaa6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-roles-c9b946cd1d70cba32e2ab4c05a432d51.yaml create mode 100644 nuclei-templates/cve-less/plugins/multiple-shipping-address-woocommerce-72a5beaa06012eefbccaf7bb2be8aca6.yaml create mode 100644 nuclei-templates/cve-less/plugins/multipurpose-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/multisafepay-9ee1fb20140e6d73472d36e51f5b0eef.yaml create mode 100644 nuclei-templates/cve-less/plugins/multisite-post-duplicator-6df6e844abfccff24d48183d808487ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/multisite-robotstxt-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/music-player-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/music-player-for-woocommerce-3e61760bac7d3dbcc4ad9810884d474f.yaml create mode 100644 nuclei-templates/cve-less/plugins/music-store-f2983beb380d477fba46a5c5deed43dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/music-store-f8e91618f8a23f5d7b353935e566fd31.yaml create mode 100644 nuclei-templates/cve-less/plugins/mw-wp-form-7c87e8f104753303f633f63d1aeebd8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/mw-wp-form-911484e3365757053bdfa0e54f447b4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mw-wp-form-c9a6c3093cb802c72eb217b944b386a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mw-wp-form-d1c63a8bf0beafb1c82149091059ec86.yaml create mode 100644 nuclei-templates/cve-less/plugins/mw-wp-form-fb14b5eeb363b3c1bc8612df7d95fc5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwb-point-of-sale-pos-for-woocommerce-20415f311fdf676cb6dd436c829d557f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-countdown-d561f3d81e84a307c0bd1e31854171e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-forms-14d5ec39f3f717cd0febca936a2aa6ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-herd-effect-013a3c9fa700970f10b7bbed788f507b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-herd-effect-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-herd-effect-64c02d39235cbe33840c45ab521604aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-herd-effect-ab1eb5a48a622a49086f766ee1ce86ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-herd-effect-ce8ee7b9600d875960db0922db40d4c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-skype-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/mwp-skype-73a5ef3fe7ff6ce104975ee9342f5c66.yaml create mode 100644 nuclei-templates/cve-less/plugins/mww-disclaimer-buttons-164235cec7e149cb5686d35550cc5b45.yaml create mode 100644 nuclei-templates/cve-less/plugins/mx-time-zone-clocks-efba52660b6ae40494c76473deb3b9d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-account-page-editor-decd0181d7e39da44fe0e5d9af5455c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-0fa49314c689285a17b374209d3a5887.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-1e21b5582d8630d6c174336fda22cd0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-505ed98ce47f4d2bcda888e7e457703c.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-5855cc9e78b9585b3894e0c7b7fb5555.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-5c7338d4e00209af0345ad82177f57cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-5f2c8752d84edabaa8bbd1589413f608.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-65b1205e2a37abbb65be358b000a3445.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-72451557ba7e0e914a18e1ce213f28d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-7598877f4e713405d9e74bfad63425fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-921b9a5130a0ad2bf4a94e3131564950.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-a6b03d82501be09605ec3648f082c81b.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-aa680f4ce8dad5699d078d5a407ddd10.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-b87197a613662b55350c2f2781a87102.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-calendar-dd53e1988ec5b5d25424d4247fd55d9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-category-order-46d83256b62bdfe4aa6f310ac82e97af.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-category-order-64ec2a96ce824196b74660ea295fa52d.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-chatbot-09bccc53b96a3e1339f2f17e91426178.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-content-management-2e12d42eb302e6a61f201e211fa0da28.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-content-management-f493de201064a7faaee262b5cd71afb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-geo-posts-free-124c0d175531516b3b7ac443edf7328e.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-link-order-6e16524bd1d2a580c4988808ba69289d.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-page-order-a5940bfb7c2779df0f2c0ab2e0cfe4dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-shortcodes-de64d2f517270fa27d42f881da4c6d98.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-tickets-3b65f76db2b87c51279c14c330d16347.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-tickets-77e642ff24948f5be818c3b7338e42ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-tickets-d8fe1550ef4435dde41b495aa629c7d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-waze-94a42c523ccdb6324d7b897f6e9c739d.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-wish-list-de81b18a854ce81734a5dca6853e283e.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-wp-e034d0793fa530375c47c930a890a44e.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-wp-health-check-e849386b94578b26b80f8f92e65a3f8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-wp-translate-d3e6d2f3e4924a9f9f37a01c1a206e29.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-wp-translate-da4809632dd888beae369fbce2888e9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/my-wpdb-ca85fcbf44c8f529ecdfa95b175d7b9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/myagileprivacy-b91180f6c8ba3f8d6ff100d044a9837c.yaml create mode 100644 nuclei-templates/cve-less/plugins/myaliceai-40ddfa284deb87a97d4ffba35198f3b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/mybb-cross-poster-7b501f3b3223dc999faba6ed8169a765.yaml create mode 100644 nuclei-templates/cve-less/plugins/myblogu-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/mybooktable-7da47fa66cee45b26565c0fef152490a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mybooktable-8dbe7a3817fde028be9e786330407154.yaml create mode 100644 nuclei-templates/cve-less/plugins/mybooktable-93938fbe21973f374f80c1d00bd023f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mybooktable-c4c3dacc97e2d49842f4e491e4abe511.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-4696541fdc76b8ee098f38a67fea2a75.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-5950b0d42aaf04d555a067d560ed1764.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-6420c7d64b9445ffc9ff5c8ed72e1368.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-6ae7e30bc28b46b135c2064dc2c025e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-6d3bd66271ddc3e51b161d4fb84cf2f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-7b33af13dcbb1f6cea4e6cd4849f85c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-9d5e6984e47653aa7bf2ef78de6fcae3.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-a4073afeed9945d540c4483af566c48e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-ab40c276cb9902f9d5e1087da672b8cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycred-dab92fc7cb3e34a6cce738aec497ec2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycryptocheckout-7e48a0f635133ab535de9155dd7df3ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycryptocheckout-f806fd57534e9e84564f98154ed849f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycss-51cc7451392ec09a8c7688f9ed5f409c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycurator-243dea5b11f06ba3f210fa9f99b93530.yaml create mode 100644 nuclei-templates/cve-less/plugins/mycurator-972385a1b4b6972691f113fb45ea0adc.yaml create mode 100644 nuclei-templates/cve-less/plugins/myeasybackup-d663aae86bf8b83f4649ce306c1e5aed.yaml create mode 100644 nuclei-templates/cve-less/plugins/myflash-0de546d8ff8a440613f030661df64835.yaml create mode 100644 nuclei-templates/cve-less/plugins/myftp-ftp-like-plugin-for-wordpress-49d2ffe5685768bca2fdd1bbd6d1b0f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/mygallery-0f137418131077a44fc4f4b8e86a7c26.yaml create mode 100644 nuclei-templates/cve-less/plugins/mylinksdump-b448ff8f0ebed30bebafe7474f10c89b.yaml create mode 100644 nuclei-templates/cve-less/plugins/mypixs-c9480dcffb0b0878eee13c8e8528a0b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/myshopkit-popup-smartbar-slidein-f56eab4e1dba033d85ad3e26044b8e2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mystickyelements-3f6feeb32fb2210c6becc1260135473a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mystickyelements-54afcc25e30c13f6fd81531108a460de.yaml create mode 100644 nuclei-templates/cve-less/plugins/mystickyelements-b8cf7f35198731bb7bfb27771c37478a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mystickyelements-fd075b6c9853246b5cc33cafcab17a0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/mystickymenu-06b7c4127350d50d75ab6e5a40c02f95.yaml create mode 100644 nuclei-templates/cve-less/plugins/mystickymenu-49cfc8c3d99725c4ecb38a0e0b05420f.yaml create mode 100644 nuclei-templates/cve-less/plugins/mystickymenu-b9ee2994c48a1ce98dffc9faf5d855b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/mytreasures-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/mytube-8753e5a555a2f3121491c204c567f453.yaml create mode 100644 nuclei-templates/cve-less/plugins/mywebcounter-f47f5c28d52d4abd78cd616aff6e460a.yaml create mode 100644 nuclei-templates/cve-less/plugins/mz-mindbody-api-fdae69d4ebb419ff6e97487d1fa22ced.yaml create mode 100644 nuclei-templates/cve-less/plugins/n-media-woocommerce-checkout-fields-164dd8ebbb83252d5e62c236087e083c.yaml create mode 100644 nuclei-templates/cve-less/plugins/n-media-wp-simple-quiz-6d6529e910b656256c67d994d60b2a51.yaml create mode 100644 nuclei-templates/cve-less/plugins/n5-uploadform-b56cc1f81e44553ad5837ff3f3a482ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/namaste-lms-03657cd383df53489c98f2c2003d74b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/namaste-lms-04f146ec33992e5efff05a0bd40f659f.yaml create mode 100644 nuclei-templates/cve-less/plugins/namaste-lms-243f75a6da65f6edc93ed6a1b9eaec80.yaml create mode 100644 nuclei-templates/cve-less/plugins/namaste-lms-396a46e2d061c4863ac25c94e4ca15f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/name-directory-27463f760012793e1526cf6e69e5e624.yaml create mode 100644 nuclei-templates/cve-less/plugins/name-directory-28d57d2682124a0a2b82184f75d0b682.yaml create mode 100644 nuclei-templates/cve-less/plugins/name-directory-6c06bc58e8c431cd39158598c7d3df3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/name-directory-e5ace19f8910dfb41dd382bdef641807.yaml create mode 100644 nuclei-templates/cve-less/plugins/name-directory-ecb3bc304462f6f56763ded084ead34f.yaml create mode 100644 nuclei-templates/cve-less/plugins/narnoo-distributor-19e99a4dcb048b9a78de389a4596a1c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/naver-map-f4ee020375ee3d79fbe799a7df61d461.yaml create mode 100644 nuclei-templates/cve-less/plugins/navigation-menu-as-dropdown-widget-25e251a3406c9b35d33175212bd58aef.yaml create mode 100644 nuclei-templates/cve-less/plugins/navis-documentcloud-501b82dc590b97d863184cfb9756e9ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/navz-photo-gallery-0668c2487ce2c4fa1850c723426ba86a.yaml create mode 100644 nuclei-templates/cve-less/plugins/navz-photo-gallery-54c49ed92754fe9b72ea28cef486ac0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/navz-photo-gallery-ac40665ad4ef3b69656a095a1b2358ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-booking-164126146e9a645f77469a8e4602aa76.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-booking-f38cba339dfbcce8dc24128ae403c983.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-donations-49fd6b403c3ae46f361045d570a15196.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-donations-7af5a8d75570b9733bf6f036d3311f98.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-donations-a1415a905803c20c67ca5fc03367ae55.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-elements-ef9b3c704d7fced594c5120e1a6fbd70.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-learning-a63938534e67d796e6484c84d1211d1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-learning-f7e07f423bc8c5880015a851a060fbc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-projects-2f7ae6b5d7fdabeafa201dc90bcb50c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-projects-a663013695ba225f715bd4ecd0b647ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-projects-e82bd49c08eee13d3a8a750e759d2e98.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-projects-f3802a1bd27cc43cf9c93101d4cbaed4.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-restaurant-reservations-05197d15c6555c370c0aabb516e1a176.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-restaurant-reservations-8665b291868b7068ace3fa9c23d3b9d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-restaurant-reservations-bb149be73e11ebe0c3b568543b54c91e.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-restaurant-reservations-e721e32fa48eebd873371f94b4b26240.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-shortcodes-2430a9c1ac485d43602ad90dc9748594.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-shortcodes-ac14ec5ad7742e553d78dac3325ff055.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-shortcodes-bce590a02f073327d2ec7a566a982db1.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-shortcodes-fada6798d03eaae704cdbb04f45c1dff.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-stats-for-envato-sales-by-item-48dc2938fe186fc758ec2763ee6f0d79.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-travel-c5fdeee544445401f76739cfd131940a.yaml create mode 100644 nuclei-templates/cve-less/plugins/nd-travel-c95f7d5b525da0435460cefad8d11b57.yaml create mode 100644 nuclei-templates/cve-less/plugins/nelio-ab-testing-8f146e0beab27034b7dee531d37f0fa1.yaml create mode 100644 nuclei-templates/cve-less/plugins/nelio-ab-testing-95c205c5aad798b5c2c90ddd330acabe.yaml create mode 100644 nuclei-templates/cve-less/plugins/nelio-ab-testing-a591950f40f9d0373366c6581aa5c23f.yaml create mode 100644 nuclei-templates/cve-less/plugins/nelio-ab-testing-aa0f13dbdb6bd3444462a2203b7bb2ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/nelio-content-ca8f431f36e53f60c13e3a9b6d7eff7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/neon-text-f3d8bdcc3c7e14d05b34d12f8fc7e52b.yaml create mode 100644 nuclei-templates/cve-less/plugins/neshan-maps-17731af892dc35dbe7d98abcc5958a1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/netgsm-7d6fe2c9df245e2b7ef32caaf5683478.yaml create mode 100644 nuclei-templates/cve-less/plugins/netreviews-569c4e32e955a5a711d57f73a7ff1bf2.yaml create mode 100644 nuclei-templates/cve-less/plugins/netroics-blog-posts-grid-5d20fde6dfb97e9f5d07e3e446eb155e.yaml create mode 100644 nuclei-templates/cve-less/plugins/network-publisher-04eafceaed46e98686bbc255ebb274ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/network-summary-2122a84f28fdfefbdc58444f837b4996.yaml create mode 100644 nuclei-templates/cve-less/plugins/neuvoo-jobroll-1188e531905e3639c772d49bab35e621.yaml create mode 100644 nuclei-templates/cve-less/plugins/neuvoo-jobroll-75a76987b60af6fa885fc4c0dfc6ee8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-adman-b19e098eab2b720f4c9c456bb0f876fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-adman-bf579b9a08de0f44c24def81bc3a2891.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-album-gallery-bccc52eaf67f0c2e9578dcf9fea0c991.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-grid-gallery-b56d867b606b433de9a6f7e49a5d4259.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-grid-gallery-be71c57d44785349cf4b236716cff6b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-order-notification-for-woocommerce-0732f852b649541967c753671f29b37b.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-photo-gallery-1064e143eb72cf1f7f6e0379aeb06d2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-royalslider-0111982febae7056a14e209747a4d7f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-user-approve-0e6d3f2d08066d7cff85e87321056d7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-user-approve-26505cfee39309a781056291e8398c4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-user-approve-92b561b69b56e7600f4f7b9ae4076303.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-user-approve-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-user-email-set-up-2d0401b900eef6498675d312d5732e7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-video-gallery-278430bfff21cdcd8521969c19275f0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/new-year-firework-691d3fdf23c3a77219e053d123bb9c11.yaml create mode 100644 nuclei-templates/cve-less/plugins/news-announcement-scroll-433814dea51a33a792f1c14558ec0d69.yaml create mode 100644 nuclei-templates/cve-less/plugins/news-announcement-scroll-6c5199d39eb82de60e28b6acd63ef12d.yaml create mode 100644 nuclei-templates/cve-less/plugins/news-wall-1a779beb118a344123814c7da3a92427.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-05717ef617ff885ca4d0ac7195b86227.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-329e4b44130ac269d4479f891a8c5f08.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-36e06ea858a68708b1aaf6b3c07ed8c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-46ccdfdd1e5c01b6218e531cf0996d36.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-738e67611ca42fd98e51ccd2eb0ad2d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-89837280a63d6f202a5c4d44cb2bc250.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-8fcdb0b13a5576b5ff2b34a21c31cbb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-981beced4302bc1ed44f59f5bbd895e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-a0918f22ac918ae4fe62db47bcca205c.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-bulk-email-72d17698c8eeb0073ce356c8f5c5e968.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-by-supsystic-5a374355ec4537f847bbfe7d5d9419bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-by-supsystic-62fd42906a2acfa6303c130d21470bd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-c834c5e1d5d5c36b9532f258717d77bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-e5ab2a90d77e5b6e1a1c85bcd4411c15.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-ef27394574ec1b75cca56caa3de40fd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-f4e01d148cb4faf1d4deb03b8e76c31d.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-manager-0533a1e9776fb29c7b5b9491b1113794.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-manager-1047bbd2b8a122544a7afe7bee9dd9ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-manager-437f867caa3099fbc234387a5d6249e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-manager-4fecc14512bd412ef7b458d7c2feb79a.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-manager-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-optin-box-4e7b5734b71634dd9bb48b370cdad8aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-optin-box-51e92ff25e71a7c2e17f5c127452f585.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-popup-0fb02df24aa43363dc0b388137db084d.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter-popup-c0ffd5d28b53a7790d15e70d69428d0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletter2go-d7690abd96f47b63d2e6b2b27468ddeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-05fc8635fe3b2da7f76501f71f380eaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-115f884d0c6c27b8ac283bf2fad6f3ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-6341ec05f42eea92884ac2a29b84c8c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-63a6ae12fc77467bfccad91ea4a943d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-85e177edc7eae3fd9e8af515318eb68f.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-941165a565ddef468f5deaa19a3321bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-ade39cd867e3448bad9cda88f9ec4ce9.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-f3852e2e998f0a9723c8ace5e7ebc48d.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsletters-lite-fb658166b72b071de6ed9c2034675764.yaml create mode 100644 nuclei-templates/cve-less/plugins/newsplugin-90997fecd42d62efb670daec1cf651f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-53b1198e7ee8eee5292e3abdba3cbbf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-5661d46a0d0f62ecdca1f908938fc469.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-5a76fde7fb0009ab04ff52f07a51dd98.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-8412ac7e626ed43c4ce45430524bd3c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-85b9bc25cc8d9d1685d816dce491f099.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-9429ed7d3468d9b070c3aef1b1b73950.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-c5e29f3bae507d53468f7991a1fb1a3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-e2fceb8fb39f58204ff5726ab0b6f62e.yaml create mode 100644 nuclei-templates/cve-less/plugins/newstatpress-ee6e70e7388e058992448bed848ba9e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-8b8a23561a8628021b8646bf3571f1c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-1873bca252baceb5719ad4cfda8c952f.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-2d87227c0a1b8cce209867e1a3357d5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-2d88339f87e8f539294930b47234f049.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-320cc739be80667a41b7c33bc9c3ac5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-3484031578b48515a252a1136c0592de.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-3c32e113f430e95dd1bba8970b964bc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-52a6b0aceece7742858232c190951358.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-65a7e9e5db9a5af53a8c05db52ac919a.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-69c9678050af93b08d000bd2cd1bbedb.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-6e45966d9ef8042467981ba9a26f57f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-9eff154e275679aff481294211504cad.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-a82da444a73b50ac43a1369ce1b8722f.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-bb95d05f96d844686568bca3576c4dd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-c98999074aee70a52ec6540d435f9e75.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-f0ac080b3744a919181119313b1bddf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-ff2527cc6b81652aecd5a77ac2a8b673.yaml create mode 100644 nuclei-templates/cve-less/plugins/next-order-coupon-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/next-order-coupon-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/next-page-cd42ea5f361eb592a86690da9944867b.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextcellent-gallery-nextgen-legacy-5b2ed76d9224d230598bdf2cc0cffcbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextcellent-gallery-nextgen-legacy-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextend-facebook-connect-00ecb873d9d341992e1bd58f78a3eb00.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextend-facebook-connect-affff16d41b08985367338035f67daba.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextend-facebook-connect-b5ffaf80d661d564c9b660398c6daa12.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextend-facebook-connect-ca36ed6adf848cc827e64a29f8ea5b4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextend-twitter-connect-9813a1d6a9d1cff77f894bb801d07459.yaml create mode 100644 nuclei-templates/cve-less/plugins/nexter-extension-289b4ce42c5317d66bb530e021b79a80.yaml create mode 100644 nuclei-templates/cve-less/plugins/nexter-extension-45f2df14510cef20714306c6b2b6f810.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-cu3er-gallery-cac97ebd7382586a7c73dce4ae126172.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-0852d9b8897d185217e138aaac4e2439.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-13599838064c197e9952281d09390ec7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-2964883e1950fef80d801f06f14eb92b.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-322df2ac71ce300f084e0fab2894de3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-33f121d665e87151fe5985afb89d484f.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-39cf49efc2cfacf8bc667751cb10cb94.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-41d56c1ae043586e69a9cbdf8e53ac0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-519e702e57b853557437ca261b9c8d23.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-5eb51111eaa90d94b47d1fce5457ff77.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-75f34276d9b10d0195d546eabefff833.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-7e41774188b9f915d9ca937dad9a03c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-7f9e6cd367e17f5d58e3f74e4dd23702.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-862a8430206366dd5f1306f54a1da83a.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-8aa932823fef6a8561cb1cce32b099e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-8f740f4461f86da187ea01d0cc38bbab.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-91308ce2ef066c70ca278e2e191864f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-9c97398a1c0f455131b61618edca56df.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-ac32959f74b06f08f41c35d9de9637f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-b4ed5bad800bb63784fe65e3822d9b92.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-b6ee1e856ee11834d66789e451bea084.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-b7c464860f475ded8d2ed3cd59a1ad52.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-c41810e93c0c7c558cec6a9a4900b3a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-ca565e6cb88aa754dd01e131a2eefadc.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-d5553776b8e5331d8ec0787313ee2d60.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-d6113147a445ba7f16a522f439b96bee.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-f15eaf3968f794eee3d8d893185e8a4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-pro-f8b3e9ff45c2c72c8ffae6c7215d920c.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-sell-photo-b45eecf36500371522a7a91600b79df4.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-gallery-voting-c141b8b973ee71335be586680efd9177.yaml create mode 100644 nuclei-templates/cve-less/plugins/nextgen-smooth-gallery-fd1e125ffdeff47afb4a084c2351b847.yaml create mode 100644 nuclei-templates/cve-less/plugins/nexus-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nexus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/ni-purchase-orderpo-for-woocommerce-ec4aba644c290d0da3b6df79cb8b20be.yaml create mode 100644 nuclei-templates/cve-less/plugins/ni-woocommerce-custom-order-status-7561b8c1f99227b7381d59264fa6815d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ni-woocommerce-sales-report-82dd4087673f4e5c2cbc42c8ad11ddcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/nice-paypal-button-lite-0471fd3ab900bd53f968b61b8e07cd67.yaml create mode 100644 nuclei-templates/cve-less/plugins/nichetable-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nifty-coming-soon-and-under-construction-page-0606b1934fa15f28fbfa63443f860808.yaml create mode 100644 nuclei-templates/cve-less/plugins/nifty-coming-soon-and-under-construction-page-473adc971897213907d43bcafc37522c.yaml create mode 100644 nuclei-templates/cve-less/plugins/night-mode-d2a99368cddd63664c69600c9b7c92a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/nimble-builder-89f45b00f9f74bc6d93e777cef76ce78.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-07e79cfbaad5cc6feea3f9163412cb03.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-0b4ef9eb693a7e87ce6cfca4623c180a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-0c6f99e140df7ca1c5f4c6d0e22095b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-137fb939b7f924b2e394225c2ffc4e4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-176c16716215a971a6536fe6953bdcc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-18aefdabee9873494c7322bd5c01157e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-23c6df4af51eff238970a0c85f41de19.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-2955aefdf1cefad709d8b720d6db9ca9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-2cbe4a3f03e2199a537c6f7a9b091533.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-3c9dac2ddd3bec2b9b5eb5b21c8ec91e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-3dacf8e00581b97f923ad6f17ff4ac46.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-458e05b1bcf27643dfd06ce9324ce2c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-4bf361aef2d1a7792461202b02e3df2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-55f90d534a47161e6795864c30da55c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-561eff22a0971cf174004fe156be75cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-57cd30237a115f155e6a16a851952284.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-624315d392127da9cdbb25a9ce0695f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-6eed35694a75496bc23819374091960c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-706995907d69bd14e09ce77802032800.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-707e5bb3cb201f78de35f00133c00922.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-71b7f03c0d03bb060a04690fb6bef364.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-740df732c021f2878fae481d2ff89873.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-74be7f504d2131ca6cf13b47a8275858.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-7a3eb0e4a2da32f4626463054bad7fe1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-7c7b836ffaa221f1b27ae77d75f66b3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-844eb2f2a31165d103093ea081bdb4c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-88ca4a7bd7c66c74cd477716cd98c157.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-8af21f8f0c6e953daf8df61c5c7a078e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-9158a4f23cb6df7f396a1ff79ad04a19.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-987fd1a6de7b9a768ddbb56335fccbb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-9b10289c81ee712ffc41aaeeec7d52b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-a2ca90e41d2e5160436c08c965469eba.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-a784d42cac6270b3d15c7ded3f777f0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-acac9b9e0c119ebbfe4a3d5af280d8ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-b156b450e510844126aa5b98c430cad1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-ba28eba12a04215286d701e542084879.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-c1844c535b6764f33ccae986eaa4a431.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-c27b108510956c02768a728e2ce3fea8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-c4d0cc55798aa0e869ce6641ec043946.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-c696f7538d036d4b686b31bca8e05d88.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-c6b42e72ee53deb1fea76d399e341eb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-c8ac9a46bde9d08b3cb4f64cfc42f9d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-cefd5e99fb5e46fe5dc72467ce88dd69.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-d14229a7a274bce478767a3985696f57.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-d52a1b2d96a87813163020667b1d0ea9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-d58c1c7e73217599c748d955d8555b74.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-d842d5a8fa51f3d63cc0b912fb91180a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-dc4ac81f8a955635294d773c7dd984b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-e6738d3799e5a12b0457c2f4dc805c15.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-ea56b6fc3599b19cc9355c178eadf7c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-eb2e2d24b00f12552ab6c531c273fecb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-f42c358b68f2276f45d8e8fe7cf0bf75.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-f907d4a58e9ce997eff45b8f7487d4d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-uploads-4bc78371b9a6176130f5ed1b3336f728.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-uploads-b97c4bb0c30e63e1bfc74807877230de.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-forms-uploads-cfede18703e7f00a56bec51b65b32812.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-gdpr-compliance-974c074b19789002549ca2e695247e1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-job-board-42cd9ebeecaa0d8da2012c8fd7d95b4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-job-board-ecdcb2d721b829e6a99b4761ba53fdfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-tables-208c19b89658d8f67c58a70365a86a8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-tables-406776aa8100e59355ccb6cf6b38aab0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-tables-87a2603e70828cd5276b845c0ebcc6ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninja-tables-b925b2b6daf2d6ebba61a79be7a0f3f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninjafirewall-bfe7f25b364c1c551aace9e3b8962033.yaml create mode 100644 nuclei-templates/cve-less/plugins/ninjalibs-ses-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nirweb-support-a6bdfa613b7b681292bdcc51a2102fdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/nitek-carousel-cool-transitions-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nitek-carousel-cool-transitions-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/nitropack-bd4439ed9a58ebca35ee43480cc063fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/nitropack-e25f78b15c303433589429f0f1d159bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/nktagcloud-94bc27f855a1b3e71ba6782c8361e04d.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-297873237de6b81c34c6241d19a94b3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-345c91064d515186e70e2a5884cb7eb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-46ddc1fb6e6a17cf8f3a950bda697f09.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-591a1da3346f8d80da2af4a888473bd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-6555d944c0da7a05c7a9f7417ba389b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-6eae0900047437ffd3af67b0a999c0ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-7ab127dd070b1ecb99f880fa6c24c6c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-7e92e5675339b75e77ca040e1f512f1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-907b43a94b9878024b4d583046e9b3a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-912300bb987f9b62927bac6bd20872ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-9d01a3c1450589963802e2c82f79a1da.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-a0c32d3142a601a64a1bd122ecb7baaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-cf17a017c60d948b78f758c0612d102b.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f1f1da3dcd767a5d11f1b776e491f57d.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f3328c896ffc09c53e1ecdfa60c1e5c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f4c2701ff75483ce690141623ec5eff4.yaml create mode 100644 nuclei-templates/cve-less/plugins/no-api-amazon-affiliate-43886ab11181377f0791e69c2c423b63.yaml create mode 100644 nuclei-templates/cve-less/plugins/no-bot-registration-ecb41dd5dc38a4c73cfc3b8c255506fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/no-captcha-recaptcha-for-woocommerce-268f07777e79e9582f2676bd74ffb8e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/no-captcha-recaptcha-for-woocommerce-94af6b10fc464ad700fcc3825517ff11.yaml create mode 100644 nuclei-templates/cve-less/plugins/no-external-links-7a7c093f97491b5547b10f0abf94cd54.yaml create mode 100644 nuclei-templates/cve-less/plugins/no-future-posts-42ee0da57f529d4a1f0ef2f4cdec544f.yaml create mode 100644 nuclei-templates/cve-less/plugins/no-page-comment-bb94b7c262e87ba0deb3b3b8cd65e66b.yaml create mode 100644 nuclei-templates/cve-less/plugins/no-page-comment-c253a6af837c11e2505414f6b22094fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/nofollow-a8cfb826ae3cd1e60648ab483d0a35aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/nofollow-all-external-links-dc8fd7c1140c8670f406818f67e3d066.yaml create mode 100644 nuclei-templates/cve-less/plugins/nofollow-links-acc6eb8dd4e1bc540251436012892eb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/nokia-mapsplaces-83baefa8fe364357f6ef3e61c50fe83c.yaml create mode 100644 nuclei-templates/cve-less/plugins/noo-timetable-3c7165ed170542d9a48b7ebd75bdcfa2.yaml create mode 100644 nuclei-templates/cve-less/plugins/noo-timetable-8fd07febda83bd8c742a5f51259e2434.yaml create mode 100644 nuclei-templates/cve-less/plugins/nooz-2b837a9bfbedcec8d35d48ea5080f6cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/nospampti-bedbd591f6ca39f0af80a1081665a67e.yaml create mode 100644 nuclei-templates/cve-less/plugins/note-press-8247dd9e5bbd39d391956bd6159727f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/note-press-8825e85de759f44127189c61a2caf509.yaml create mode 100644 nuclei-templates/cve-less/plugins/note-press-c6243b9dee6460614115df8351692603.yaml create mode 100644 nuclei-templates/cve-less/plugins/note-press-fc9778d621394c461290861e9ffed74c.yaml create mode 100644 nuclei-templates/cve-less/plugins/notice-bar-18ae8fd1e9cb93487e81ac53ef4e167a.yaml create mode 100644 nuclei-templates/cve-less/plugins/notice-board-b3b2af8cc00699a0018afcc81e707f41.yaml create mode 100644 nuclei-templates/cve-less/plugins/notices-84d0d45fa88276425857758501e9c199.yaml create mode 100644 nuclei-templates/cve-less/plugins/notification-eae4213a5c0782ae01f44dd9c21edcbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/notificationx-735661dd4e86df9c4dde01f9f3e84d09.yaml create mode 100644 nuclei-templates/cve-less/plugins/notificationx-a270bbda89fbbfcb6121d07d9ec5b627.yaml create mode 100644 nuclei-templates/cve-less/plugins/notificationx-ad0a1b158b4e99b448b1e95b8addbc39.yaml create mode 100644 nuclei-templates/cve-less/plugins/notificationx-bcbaad1a845c82aad1bef42558b56fdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/notifyvisitors-lead-form-9efb6c4b18285974b32863549d5c9405.yaml create mode 100644 nuclei-templates/cve-less/plugins/novelist-6151f342a42025e02d427b32216a8adf.yaml create mode 100644 nuclei-templates/cve-less/plugins/novelist-f083409bbde8131959cd560116eb8b78.yaml create mode 100644 nuclei-templates/cve-less/plugins/novo-map-fd902d7294b8be7fc6c94e658239c2f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/nps-computy-822c780c5b9c36a2c5c6155802580253.yaml create mode 100644 nuclei-templates/cve-less/plugins/nps-computy-9980c05da6f848a401a8e11f20123173.yaml create mode 100644 nuclei-templates/cve-less/plugins/ns-coupon-to-become-customer-b9cea09f7ed512cb1aad12f24e857815.yaml create mode 100644 nuclei-templates/cve-less/plugins/ns-facebook-pixel-for-wp-b2640c0e1d9759721b91219a63bf25ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/ns-woocommerce-watermark-0c0dde4c7a1e8ecba300d4f3a84714f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/nuajik-cdn-f0470adcfca34e53051811d10184b858.yaml create mode 100644 nuclei-templates/cve-less/plugins/nudgify-a865b1f08fb1dfda225878dc830c893d.yaml create mode 100644 nuclei-templates/cve-less/plugins/nugget-by-ingot-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/nugget-by-ingot-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/number-chat-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/o2s-gallery-b5871188dda12d0d2d7ff147e7d129e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/o2tweet-8b7ce3f62fb6e151f58953706865b9ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth-client-ed96d7b172dbc6676f3aac8fd6c4f947.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth-client-for-user-authentication-3ea452a110a6d721fb0c1348d6616fc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth-client-for-user-authentication-c53104da05cdac90a010088ce54093bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth-twitter-feed-for-developers-bca2d75657a1c7a6e99c08d66b7b4e2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth2-provider-2b20f536c5a1e1ecc9328244cf31fc2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth2-provider-41a31043d8f2b87b33721864ecd51995.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth2-provider-4b9f20c2f55cb0278e501a36498340f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth2-provider-b493d32c53c148490b49a06f9023d87a.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth2-provider-c7806db2330d78c1eb21bb3d81129b2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth2-provider-cbceddd57d7051d45761e4fa44eca556.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth2-provider-ef86ab7f523579cf61ae7ca65b0017ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/oauth2-server-11efe70fd2ae23707bfcf341a18862cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/occasions-ffea4c38dbbf6eb29f1bb344ee6bae12.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-09c7e3b2a6a061e164af74ab6001f045.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-15e84b289a1503987417bb5a8a9db81a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-1fa0a5990488e25fdbc5ceea9aa094d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-219e356df9406ff61a0cdb8030ff8ed2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-4ea74f3f54b0253dbabe0bce4a43a6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-59a12b62de2e9aeb74cd74615dde1cd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-675e6b4bb186a17f8fbe362e07f780dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-6f81fcdf0f0749244884a26bed49387a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-d17f4b50b1d89180cdbd40b462cf4e20.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocean-extra-dd78e64b2b479493968a1e6217c98447.yaml create mode 100644 nuclei-templates/cve-less/plugins/ocim-mp3-427c0efd9f4fe0120009a410add6694b.yaml create mode 100644 nuclei-templates/cve-less/plugins/oembed-gist-d5fb85be1bce7f68e1b15520cd177f7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/off-canvas-sidebars-aedb89e2581210acfc64d10b1fcd7670.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-facebook-pixel-f71c21bb0ac8ac3a83c45ec9ea5fb6b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-facebook-pixel-fc2e2c986080502cae4c6d1516b6383d.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-26c3585e6e7fad9c8d3a82c1982ff984.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-72b3ee0aa0ee9a6370b95e5e332c6b93.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-8057fa684bd813756becca039228732e.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-83cdeca9a177bee255e863b7e36aae57.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-a684bdf0ee6ecd33a27b06b384e7ee6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-e5931a630006ade9f39755f24e1f8775.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-sendle-shipping-method-74909c964d07fc09665c9e492aec8fb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/official-statcounter-plugin-for-wordpress-d0adb6ab141d87bc7e2689c3386228f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/og-tags-d6eff878d5e751e7448431e370bd1e18.yaml create mode 100644 nuclei-templates/cve-less/plugins/oi-yamaps-edd20f1acfb98b2d0a1653edfc88a6dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/oik-31709e141c457255c2ab0ae7529088be.yaml create mode 100644 nuclei-templates/cve-less/plugins/oleggo-livestream-a72c869069d2e541af149f51ffaa7390.yaml create mode 100644 nuclei-templates/cve-less/plugins/olevmedia-shortcodes-76ca7c77b83fa68f077aef4f9085d916.yaml create mode 100644 nuclei-templates/cve-less/plugins/olevmedia-shortcodes-d25bac07f3777da904ec9b43911bfe31.yaml create mode 100644 nuclei-templates/cve-less/plugins/olevmedia-shortcodes-d767c0b5d303daf65b04ebec294c7e3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/olimometer-c521258f5992e6f5c61e1567e72a1351.yaml create mode 100644 nuclei-templates/cve-less/plugins/olive-one-click-demo-import-440a978024c68b2f27be0eeba3cb55c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/olive-one-click-demo-import-5d017f957b0d5736d3f04d80942cf97a.yaml create mode 100644 nuclei-templates/cve-less/plugins/oliver-pos-245aba3aeb74b218457ab6f11f877ea6.yaml create mode 100644 nuclei-templates/cve-less/plugins/oliver-pos-258778bddb1333c1704be45e0fa7b778.yaml create mode 100644 nuclei-templates/cve-less/plugins/olympus-google-fonts-97a8bbca52a057b5fde67edd446b89ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/omfg-mobile-719947b7a1ac06fd82b24dd2b2c29f27.yaml create mode 100644 nuclei-templates/cve-less/plugins/omni-secure-files-6a2f2d47c1f3b50eb9874ef14abbcb61.yaml create mode 100644 nuclei-templates/cve-less/plugins/omnisend-connect-8c66e65fe1fbe52e6fc55791d539f808.yaml create mode 100644 nuclei-templates/cve-less/plugins/omnisend-connect-fed4c752f6b00fd9dda419d58b575ffe.yaml create mode 100644 nuclei-templates/cve-less/plugins/onclick-show-popup-a274b1ec9586c121ed58c6cb9eda6a2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/onclick-show-popup-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/one-click-demo-import-a9a32f74174df8c480433ef7ce05b39d.yaml create mode 100644 nuclei-templates/cve-less/plugins/one-click-login-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/one-click-plugin-updater-a27299fafee4147eee6143e446c0d4ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/one-click-ssl-a5333a81df962bfc4dc1ef98d3ece12b.yaml create mode 100644 nuclei-templates/cve-less/plugins/one-page-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/one-user-avatar-2eb3196d201c69c1b619f7192e23dfa3.yaml create mode 100644 nuclei-templates/cve-less/plugins/one-user-avatar-7a9355f03955196b49afdc0799980494.yaml create mode 100644 nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-5e1a23f981a78be569054daae1a85203.yaml create mode 100644 nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-5fad00879c22741100673bb27b7a3e06.yaml create mode 100644 nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-78ddb3e5efc137c9989117bb477a197f.yaml create mode 100644 nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-96bf5a76ba4653bdf89616d82d0bf5c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/onelogin-saml-sso-1108320cabd88205cc0f43eb95edee22.yaml create mode 100644 nuclei-templates/cve-less/plugins/onelogin-saml-sso-5904f2c1ee5058ca4f26abdf16ad81a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/onelogin-saml-sso-915fc461dd70a0b67939a2bed7cf5a68.yaml create mode 100644 nuclei-templates/cve-less/plugins/onelogin-saml-sso-a4d6624c57bb300c720d6a9c5b907312.yaml create mode 100644 nuclei-templates/cve-less/plugins/onelogin-saml-sso-eefbacdc57528669a142d2f5ac41c616.yaml create mode 100644 nuclei-templates/cve-less/plugins/onesignal-free-web-push-notifications-697b3f7f41c78660c9aef82a5b73a231.yaml create mode 100644 nuclei-templates/cve-less/plugins/onetone-companion-161c93480bad1a6fddf7935d08286cca.yaml create mode 100644 nuclei-templates/cve-less/plugins/onetone-companion-95f9bc03677a083bf89832ea0c794033.yaml create mode 100644 nuclei-templates/cve-less/plugins/onetone-companion-ad2905956fc52c5a5c7897e5da61eb9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/onionbuzz-viral-quiz-8c9605e19ac036b6c4395d0ff8d48030.yaml create mode 100644 nuclei-templates/cve-less/plugins/onionbuzz-viral-quiz-b0e06633c5fe43db8e7a0339b16c2f91.yaml create mode 100644 nuclei-templates/cve-less/plugins/online-accessibility-079b2f2c54a8b1fed68b5c27dcb96254.yaml create mode 100644 nuclei-templates/cve-less/plugins/online-accessibility-2cc161db9aab9dca8c45963425559bbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/online-accessibility-32de7cdd0bd82a27d1f9a9185ff54e70.yaml create mode 100644 nuclei-templates/cve-less/plugins/online-lesson-booking-system-236e1bbcc1e74385f1fd59662dd67917.yaml create mode 100644 nuclei-templates/cve-less/plugins/online-lesson-booking-system-c1ecb14191a04d9e43d6e6f80f13e749.yaml create mode 100644 nuclei-templates/cve-less/plugins/only-tweet-like-share-and-google-1-6da6015396d12ad265b2f5a24810c5e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/onwebchat-802c4864b87b89e6df06fc16568188de.yaml create mode 100644 nuclei-templates/cve-less/plugins/ooohboi-steroids-for-elementor-1ec906f849b052ad86a65e59b4ad588d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ooohboi-steroids-for-elementor-aef6ec9f420d3aef577ad115ead987ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/ooorl-e0cc1eea89ba954f43096969782e9ac2.yaml create mode 100644 nuclei-templates/cve-less/plugins/oopspam-anti-spam-1fe914fcf9950622b9e1e73ce1a20a73.yaml create mode 100644 nuclei-templates/cve-less/plugins/oopspam-anti-spam-6bf95a000c0173a075e212bc6eeb873d.yaml create mode 100644 nuclei-templates/cve-less/plugins/opal-estate-2a75025d80c85273c30a2737105c9f4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/opal-estate-92760ee1af263e3e31758b506a58ef85.yaml create mode 100644 nuclei-templates/cve-less/plugins/opal-hotel-room-booking-6dff8ad57b57f849baa2c45d3ecc2834.yaml create mode 100644 nuclei-templates/cve-less/plugins/opal-widgets-for-elementor-75f9430e21b1ffadf43723a73937595b.yaml create mode 100644 nuclei-templates/cve-less/plugins/opcache-57773fba6f4ab595b91e9cf1bf98318c.yaml create mode 100644 nuclei-templates/cve-less/plugins/open-external-links-in-a-new-window-00198a18211aefc70b8ce0f7e41cdd92.yaml create mode 100644 nuclei-templates/cve-less/plugins/open-external-links-in-a-new-window-39407bfbd26cec40aa785db15ec93f9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/open-graph-metabox-74b8f8fd0be969b30108aa2c0d40f175.yaml create mode 100644 nuclei-templates/cve-less/plugins/open-graphite-ee6e51fb33ca759d2625bd1f3a131728.yaml create mode 100644 nuclei-templates/cve-less/plugins/open-rdw-kenteken-voertuiginformatie-96ad90fd0ad467a1d69bc6e1840d3891.yaml create mode 100644 nuclei-templates/cve-less/plugins/open-social-55fba5060ceecf0350eb52f214341712.yaml create mode 100644 nuclei-templates/cve-less/plugins/open-user-map-d517a1f1b39fbb25ce31405c236e39dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/openbook-book-data-fc3bbad32864e7b45f7b03bfa40e7ab6.yaml create mode 100644 nuclei-templates/cve-less/plugins/openid-849d5a0a490a95eaf95ef135844c0ef2.yaml create mode 100644 nuclei-templates/cve-less/plugins/opening-hours-02f013b54b4f3674afd49b3afca90a89.yaml create mode 100644 nuclei-templates/cve-less/plugins/opening-hours-55a39ce22d26293084937266d25d08be.yaml create mode 100644 nuclei-templates/cve-less/plugins/opening-hours-8a9da35b1949b285490ef29120cda9a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/opening-hours-8ef1ea8d8498496f3516b88ed77244c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/opening-hours-c0079d75a97eeffbdeb6d0d0f4759f91.yaml create mode 100644 nuclei-templates/cve-less/plugins/openinviter-for-wordpress-0c949bb41cfd828ec7a8283210519fde.yaml create mode 100644 nuclei-templates/cve-less/plugins/opensea-3e83969edc359576afe93a3a140053fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/opensea-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ops-robots-txt-bd57476daf1ac0de7401eb5bfcebce92.yaml create mode 100644 nuclei-templates/cve-less/plugins/opt-in-panda-e524be4e74a799805187c5341f4ea89f.yaml create mode 100644 nuclei-templates/cve-less/plugins/optima-express-a4c0765b0c52463caf31b82bc7711eb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/optimole-wp-7ae1e981db663479bebe95d4fc6e1fb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/optimole-wp-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/optin-forms-b4a1c53e99884a28029186adce52a970.yaml create mode 100644 nuclei-templates/cve-less/plugins/optin-forms-d9b7d332948d93ec19ade23944fe8ee3.yaml create mode 100644 nuclei-templates/cve-less/plugins/optinfirex-487b45c8da9cac09ef28c95c49514ba6.yaml create mode 100644 nuclei-templates/cve-less/plugins/optinly-65a9527890576df98e6c12dd65024410.yaml create mode 100644 nuclei-templates/cve-less/plugins/optinly-8c1dce2381adf553748abcaef006cd86.yaml create mode 100644 nuclei-templates/cve-less/plugins/optinmonster-2e5b9dabe10dfc18a46871d43fa96491.yaml create mode 100644 nuclei-templates/cve-less/plugins/optinmonster-7ec39aae63fcb435502dc6ef345e3943.yaml create mode 100644 nuclei-templates/cve-less/plugins/optinmonster-8105121190d01c38a4c87c0ee0fe8654.yaml create mode 100644 nuclei-templates/cve-less/plugins/optinmonster-83bf7d35b08455904e5385f6657b0ce1.yaml create mode 100644 nuclei-templates/cve-less/plugins/optinmonster-fe779104db6239df2fe810ed3afc3c87.yaml create mode 100644 nuclei-templates/cve-less/plugins/option-tree-3026c779c348f01329035d4d36b36cef.yaml create mode 100644 nuclei-templates/cve-less/plugins/option-tree-5b29964f9492d211e56c39574405e47e.yaml create mode 100644 nuclei-templates/cve-less/plugins/option-tree-6e42e23486d09ec34675722772aa1b90.yaml create mode 100644 nuclei-templates/cve-less/plugins/option-tree-75c93ad74d45c10e07e436b9060dff63.yaml create mode 100644 nuclei-templates/cve-less/plugins/option-tree-aa5a6552b97b2c6070e07b71a44f6dad.yaml create mode 100644 nuclei-templates/cve-less/plugins/options-for-twenty-seventeen-0aceb58e1789a00f8987ade1ad5f4576.yaml create mode 100644 nuclei-templates/cve-less/plugins/orange-form-cb748c9c9efa655b709ed263bb18ce58.yaml create mode 100644 nuclei-templates/cve-less/plugins/orange-form-dc42737b07ffe9283fc25fc1965481dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/orbisius-child-theme-creator-083f45dd5cb197f01c97e7659014e0d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/orbisius-child-theme-creator-a2161b786ba8d84bdb2a3d032cd3b972.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-and-inventory-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-auto-complete-for-woocommerce-feb8c11c4ef0641488804a4e83e4b8c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-delivery-date-2d0aa79c36a81084122d47bccf285480.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-delivery-date-b3374ece5f330b0776522f2f5130afbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-delivery-date-eee696eab23205a2046e2b67a8b48808.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-delivery-date-for-woocommerce-71393429192117f00dfd4a162cb8bf61.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-delivery-date-for-woocommerce-fbf291b4c987a79d80bf5dc32be200a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-import-export-for-woocommerce-bb5370676c8e655ad72a3791cdb04f1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-on-chat-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-tip-woo-788617c7c507dc55ce43d126204f73e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-tracking-32b3fdbe7b7f22c46479a3e9393eb06a.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-tracking-61c433e3c6260b98301128a0db50f713.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-xml-file-export-import-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-xml-file-export-import-for-woocommerce-2c636c041261dbec5d7ba4cab181df88.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-your-posts-manually-0a78b90f665dee3807012f6bf66ac8e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-your-posts-manually-53cad8b598a3c7e05217d7a8485ccce4.yaml create mode 100644 nuclei-templates/cve-less/plugins/order-your-posts-manually-6221ac90696b9d40486e73f6a756b92e.yaml create mode 100644 nuclei-templates/cve-less/plugins/organization-chart-7a149af217c0a6dffb13397d014d6e33.yaml create mode 100644 nuclei-templates/cve-less/plugins/organization-chart-7dc1fbd7e7abf281f194a7d7c03c76ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/organization-chart-a4e88b3da711b27ab40f6efd4bb4e5fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/organization-chart-fbacd93e40e029ab5294ff6e4faadc80.yaml create mode 100644 nuclei-templates/cve-less/plugins/organizer-1b5adfb99c271100e33918010bf13877.yaml create mode 100644 nuclei-templates/cve-less/plugins/organizer-a88755371a7efc7dfaacf49c4e565b46.yaml create mode 100644 nuclei-templates/cve-less/plugins/original-texts-yandex-webmaster-ee1e925bdddc6bf24a1981ba88df97ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/osd-subscribe-a1996943f46f7e75b7c830d7d4d93d4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/osm-8b5e55916d6d52550d91a97ed666547f.yaml create mode 100644 nuclei-templates/cve-less/plugins/osm-b58caf3062d49a3b707b9a414cc1dfaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/osmapper-2113dc45f9cb386268821363e5c4256a.yaml create mode 100644 nuclei-templates/cve-less/plugins/oss-aliyun-60929a68cddca1a94650b63066730255.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-blocks-08e36a5e429e15172c47a461c7457404.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-blocks-46f9477f32da89d305905e8493b5f75e.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-blocks-74e59a3e9ea29768b5d0afa832d7eb55.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-blocks-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-blocks-c6ebd7f92a6a9f141b0c9e1fd40276a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-blocks-d1fde79ddb6f5cce29eedf02f3d4b354.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-blocks-e70c973ee52c3a8cad3d00694281c5e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-blocks-eb48e0d7cc280c7a495d24563f61a7d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-pro-89238e69360283d59cda9a307dc44ad9.yaml create mode 100644 nuclei-templates/cve-less/plugins/otter-pro-9f787a2ef36698ab9d958e79e9a7609e.yaml create mode 100644 nuclei-templates/cve-less/plugins/our-services-showcase-fa0b498c03b490f6a302c8923c66045e.yaml create mode 100644 nuclei-templates/cve-less/plugins/our-team-enhanced-15ed4766d27c484c5517c27d81b8d51f.yaml create mode 100644 nuclei-templates/cve-less/plugins/out-of-stock-display-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/out-of-the-box-746c295d8ae3e879964a1880bd187ba1.yaml create mode 100644 nuclei-templates/cve-less/plugins/outbound-link-manager-c4f801789643f99238516422e3dea2a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/overlay-image-divi-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ovic-addon-toolkit-01230d7023712cf52d185f89bc18a400.yaml create mode 100644 nuclei-templates/cve-less/plugins/ovic-product-bundle-c5037c5f6ce141975f7a422878dcc1cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/ovic-vc-addon-7f87928645d2c31cf00fa75d4b3905c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ovic-vc-addon-965d06634426ae72a55053fa07ab23f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/owl-carousel-4dd1db9fbfcd7d8c0bd7134fb7dd4c2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/owl-carousel-9a422d0a1f5b287c75a0c4e8af0a5fc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/owm-weather-8e5a5c6c98d5ff17214ae536b2646317.yaml create mode 100644 nuclei-templates/cve-less/plugins/owm-weather-d0ac90c02958fd486fae19ccf9cfd8db.yaml create mode 100644 nuclei-templates/cve-less/plugins/oxyextras-453edd08020fcb6cf7997bc23916e6f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/oxygen-c334c90cee1067800314e97523ff3712.yaml create mode 100644 nuclei-templates/cve-less/plugins/oxygenbuilder-c7a8bc13237071ee5b2f66d58803bacf.yaml create mode 100644 nuclei-templates/cve-less/plugins/p3-a64f133bbd4857bc65950b864d18ea1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/p3-profiler-a26b66ffa61f83ecbb446f03cc1365ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/package-quantity-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-and-post-restriction-2afaa956cded901d5ea2b4034f565538.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-and-post-restriction-7e7d3fe35e3640caa3a72acaf61512d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-add-1320225def4406c9e713cc329abaeb70.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-add-65def4250a9c953c2f2257736ac45133.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-add-76176e7d0b3c59c6f85d0f00865be579.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-add-8417ca6ea2b385ef6685bba03ed8d8b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-add-edfb37ba6e16342d02314bfa81ec308b.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-by-azexo-2ef42991bf5a3f6fe661eaa83837878d.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-by-azexo-903fd5007a29b9028410d0ffded470cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-by-azexo-f6a42cf9626a59a17d2bd6cce7c38364.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-by-azexo-ff89b70bfc48d132d2c1ae5c1ed04b8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-sandwich-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-sandwich-dba2df430cd702194cd11fb9213b265a.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-builder-sandwich-f83002599a8aabe9f476ac830785a4d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-flip-image-gallery-bcdafb8d52b9b91e60896c4aab2b09a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-generator-02e1028b272d28de63335e7341b29e10.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-generator-328db48b412bf150c51734d4e256b1dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-generator-56d5619e454c2de075a4d59b6b36a2ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-layout-builder-3b2a7a5fae5eb0af3506d02977a7f182.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-link-manager-547afaf6e830675a579bd6f2437a1e07.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-list-c7b94497207a62b415298f2f46cd674e.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-loading-effects-06f0f6d997d3961c4576d91935933f05.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-scroll-to-id-6d5213a5628e216eb9e2a763fb4762ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-scroll-to-id-ffddbf496e7aaec02b6e7ddf918beed0.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-studio-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-views-count-13ec2bdc85df7c3571b35167e7c009d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-views-count-67889b4ef1ae0d338be85daad64d3e7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-views-count-b957833416680c3ce9532cace332c8be.yaml create mode 100644 nuclei-templates/cve-less/plugins/page-views-count-d058005189aafe6324b373d8ff03e3df.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagebar-4b545f99e277a5b533a4828fddfdf3e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-03e434d9ea9a280060b3548276610903.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-05c61ba0f98849485be0002b6c76289c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-2c10300e2e1d17099380134c8c4a5148.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-3368388a3eaf6ed2424923ab628b316b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-37e749759243317adc52896293ee760e.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-49d9da9d472a0f5eb0cb749075fe3a10.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-53b0e5659c4aa4d52f12594842768c39.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-6c1bbce4c7a429a52d508c4dfbc689a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-822954310f58c5920d9c99a5b8f20e8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-891807496f9388f784feeff012bb9ac8.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-98aaf1a94b96eeb1d120f5b84c22c6ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-a19b0ea5f3c4659620b13f7e795adf29.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-c9ad2218a91633282ea6a559fd4a007d.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-e0bc64c58043fcf22274a1d73a269f55.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagelayer-f28d0839e906933601f8e3530cfcec02.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagemash-d079a0462c534cbc9ce3a05b45c6a4d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagepost-content-shortcode-4f011bf5e0985256ce0dc243eb8712f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagerestrict-383952897352436c7747104565840796.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagerestrict-449418fde0e77076010b8e37969e0e31.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagerestrict-4d8ef6bd985f2d34f506708108c9100b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagination-4ed0ed5324b5c3f087d2833d0484d7f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagination-b86bab5c8fb0747eadd8257097e9b226.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagination-fd43c9edc7bf436e03f5d59fcc9642f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/pagination-styler-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-member-subscriptions-134f2819e254034a77fb510bfe9b93c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-member-subscriptions-3ac481618eb4347f5fc9d0f89470f6b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-member-subscriptions-646e25531b1fa1af8fcb5aec525b7439.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-member-subscriptions-ca8deb8cc99a7e80212ae873b89f0b6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-member-subscriptions-cce20befda4e7caf1b066f754d7a6624.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-member-subscriptions-da4af52f1837930e94d6d4291aca5d50.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-membership-1e4c87f532b07cfd840241f44de6c8f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-286f920ff3d0f48835cc5b28e8181446.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-2f5b75adc13263d5beea70db43442acd.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-3acca9f1846ccef5068e7ad578275e07.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-410910e3bde9f58e737907bb1681caa1.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-41611316d1ac99758a92032134152355.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-434f404b68ce3bb5e0a4d67432fad4b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-63f8abf1368e7fe90270064d672ae623.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-67f30623d09c4d720e6c11ecbff476fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-68293564bc63bf678c3143661b510396.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-83f1dd0f93cf1e789d768340fd3bb4e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-840229894b2c6a1be64b8d70b53d76ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-84d2d3378640513504438262d898e022.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-9d10b05b216e9b3725f77f2e756c3bb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-b52a7b696fd2137224ea5671e7e62354.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-bef07a85e28e83767b9819859bd47740.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-c3048e5abe91e890bbce0cc632e75565.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-cc7679b7eedbbcc9700c025bd91811bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-d48045ed590f6f55f1f2fdf8cf338a64.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-d6f22dc7688630789d302268152d865d.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-e07fd23d17f8dd83e161e7e2c0ee4d29.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-e8a21df86ab8f777d41e6648745d6563.yaml create mode 100644 nuclei-templates/cve-less/plugins/paid-memberships-pro-fce0c7de1ac72dbab0de3f1d5f219540.yaml create mode 100644 nuclei-templates/cve-less/plugins/panda-pods-repeater-field-828e69c4d1ded9a5f7606667cb83c187.yaml create mode 100644 nuclei-templates/cve-less/plugins/panorama-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/parallax-image-b5b52d178ac9e73e1f7151b15d18b267.yaml create mode 100644 nuclei-templates/cve-less/plugins/parallax-slider-block-39f54e5675da547fbcee34c5030b35da.yaml create mode 100644 nuclei-templates/cve-less/plugins/parcel-tracker-ecourier-ce718587b1801a7c7537a48edc0e7766.yaml create mode 100644 nuclei-templates/cve-less/plugins/parcelpanel-00bc7306212a1f1532879484863c8f21.yaml create mode 100644 nuclei-templates/cve-less/plugins/pardakht-delkhah-ad560a2e6c4b99cf57f1cbf4f8e13e03.yaml create mode 100644 nuclei-templates/cve-less/plugins/pardot-700d1cfad4bd0fa3b320c8b805e07813.yaml create mode 100644 nuclei-templates/cve-less/plugins/parsi-font-254f28aa80fff0eb08d98b4ce3b3dff8.yaml create mode 100644 nuclei-templates/cve-less/plugins/parsian-bank-gateway-for-woocommerce-27a74900b090130d2ab9c1d98745b64a.yaml create mode 100644 nuclei-templates/cve-less/plugins/partdo-core-0e249eccad21574e2f41d6b727c12756.yaml create mode 100644 nuclei-templates/cve-less/plugins/participants-database-07270c625770ea55406700bd4faf8963.yaml create mode 100644 nuclei-templates/cve-less/plugins/participants-database-11fe5ff4939095c8eaedbac059700247.yaml create mode 100644 nuclei-templates/cve-less/plugins/participants-database-74dfc45ecae7de304e8f9080bdfdb51d.yaml create mode 100644 nuclei-templates/cve-less/plugins/participants-database-bdf9e125f5be6c62d1e6ea586186b7ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/participants-database-c5af09461da9c502c3934cc475901e6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/participants-database-d7f00e0abe15580f7ace910ffb1d1a20.yaml create mode 100644 nuclei-templates/cve-less/plugins/participants-database-e0584db35cbb9869be95ba6010b7c0f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/participants-database-e3cd907e6807fcf00ac40f54ec586f57.yaml create mode 100644 nuclei-templates/cve-less/plugins/password-protect-page-729488a672d6efd868aa434c8487ecdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/password-protect-page-d66ad8d87de6007b46efcadeba262d7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/password-protected-f70dd0265071b25825ed4ac0daac6966.yaml create mode 100644 nuclei-templates/cve-less/plugins/password-protected-fb622d8a3e8e58dd4ad557e902dc2f9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/password-protected-woo-store-050f0116b8ceb2b0a56ee85d7392fdbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/passwordless-login-8f38e1cb39832821632517021044a8d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/passwords-manager-d0bbc9ae1fbf2d240bae5f6283bcefb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/past-events-extension-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/past-events-extension-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/patreon-connect-1d56115c5756336039596f3db2afcf11.yaml create mode 100644 nuclei-templates/cve-less/plugins/patreon-connect-1e16eec4b6ae009a904a8e7f17b7b28d.yaml create mode 100644 nuclei-templates/cve-less/plugins/patreon-connect-3ea0fac767d2ae2ce8f2f4784f535988.yaml create mode 100644 nuclei-templates/cve-less/plugins/patreon-connect-60d5b771eb752135710361fe9f24a381.yaml create mode 100644 nuclei-templates/cve-less/plugins/patreon-connect-82c6c9cf005abdc27838609e8ad9cf02.yaml create mode 100644 nuclei-templates/cve-less/plugins/patreon-connect-a8cb964066fe8aea6342dd9fef9872c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/patreon-connect-c914118ffbfe0c8c975fe93b917507cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/patreon-connect-d2e2b4003ef24e75b8d453ad2f0582ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-089c469cd7ce66b1a9f5809db855888a.yaml create mode 100644 nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-5085814d704ddfd403da1227f11c5263.yaml create mode 100644 nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-5b594cb927f46fa8416160fd694e56a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-bed2af87ac90c87dc04c6b517c073d4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/pay-per-media-player-d6f933dccde3d9cca555af3f7b970f39.yaml create mode 100644 nuclei-templates/cve-less/plugins/pay-with-tweet-46bf8ffa7005c6ec6cf07777085484d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/pay-with-tweet-5b86c54747aa1057e36177e85fea660b.yaml create mode 100644 nuclei-templates/cve-less/plugins/paygreen-woocommerce-96955fd433f50860fcfbf43e30334f40.yaml create mode 100644 nuclei-templates/cve-less/plugins/payhere-payment-gateway-ef84d19c40335efcda975110283f73b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-form-for-paypal-pro-54a171a233ab972e99a42d6b3c349ad4.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-form-for-paypal-pro-8f6f989dd4d5721becc523b6ef4c4688.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-forms-for-paystack-b7d244a1858960d6b7b8f5a6b3a02579.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-gateway-payfabric-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-1c5c778d8970e8a4e068e0dd69740d62.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-4dec41a2eb36a7fd15e4e02a413a6b7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-4f4afbbe05a47feb7aa9e67c94aa395d.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-c992a7bd3a36bbd140f48c6c88718954.yaml create mode 100644 nuclei-templates/cve-less/plugins/payment-gateways-caller-for-wp-e-commerce-5b76c3973cf0eb7f78223ae732ca5963.yaml create mode 100644 nuclei-templates/cve-less/plugins/paypal-brasil-para-woocommerce-ce702b3c11cc0fd58f850b3795d41794.yaml create mode 100644 nuclei-templates/cve-less/plugins/paypal-currency-converter-basic-for-woocommerce-1deeac15598443407c5819458cb87e41.yaml create mode 100644 nuclei-templates/cve-less/plugins/paypal-donations-6fc6438dcbfd4ff68526e6d482fa74a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/paypal-payment-button-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/paypal-payment-button-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-2de2a309a48a2066b54fa1a1b79cdf95.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-4f11f74ab70050e21f6862beb40d9a96.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-62269eb67796cbb2339d6188b5db837c.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-66a3b119265dd04d8b9e2ee514cfb4be.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-6717ed512d0f6dcb712096abdaea80dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-92d0e7bc94b44754e236b3eab5ba21b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-986bf289302c49f136af4498727aaf05.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-9b90abd6d830325819c48ecc09f52c5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-b4cb9ba45757222ec6c9dc1b2fa44488.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-d89f421b57194b2722cbd6095ba6fda5.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytium-e5b14dd6b8ce0a1e923582746cd9e67d.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytm-donation-7e792191472cdad1fee49805adc5397c.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytm-payments-319371b7283fd7e2cb3c7db7ca64946f.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytm-payments-96f4752ff872cb8e19e30c74804a9934.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytr-taksit-tablosu-woocommerce-de1e70d7cd8b8051bc4083872be41746.yaml create mode 100644 nuclei-templates/cve-less/plugins/paytr-taksit-tablosu-woocommerce-fd0b6587604276cef3b941ba57f9f4bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/payu-india-796f8cb61c89c1bb396cd35b29d7d180.yaml create mode 100644 nuclei-templates/cve-less/plugins/pb-embedflash-5d636ce844c1e0268400f1bdd0bfac42.yaml create mode 100644 nuclei-templates/cve-less/plugins/pb-mailcrypt-antispam-email-encryption-063d32b817099e0883314c45f9a14882.yaml create mode 100644 nuclei-templates/cve-less/plugins/pb-oembed-html5-audio-with-cache-support-d431a2f9901a2f7f0f42332dd7577612.yaml create mode 100644 nuclei-templates/cve-less/plugins/pb-seo-friendly-images-9d9c7f9cf0e3be8bd05b705703e8905b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-block-d7c844e32ca0ede6715df38694de53b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-builder-for-wpforms-439e5eee55387eb3328692c215048cd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-embedder-6736ec787d23e7bd8e0a13fc8e0e88d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-generator-for-wp-ea6c92890a8ecc3f7389055b8a095cd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-invoices-and-packing-slips-for-woocommerce-3f477473c5a3237b1cf487ce20b4000a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-light-viewer-b4f2d824d6b4e83932e04d871f8fc11c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-poster-d3e4552875a1e4c6d1824946dc7d9f5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-print-3c928fa432700e9d8d2c446de566746a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-print-40ad9a6c734da3962dc8243739e3141d.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-print-a599db0a567c14bb9ad602094c3db3bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-viewer-block-a843323be037daf5f3b8528ace16935d.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-viewer-by-themencode-a904a832d065a78b4632aa6c156ad613.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-viewer-c8829397a00680f2b905cec73a59a77f.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf-viewer-for-elementor-8b4bc04c0594b1b6d09d20b68880906b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf24-post-to-pdf-1f8d84e6699c9f64cbbc8919147cefef.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdf24-posts-to-pdf-4eea95bcbc22121deeeb133b73467001.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdfjs-viewer-shortcode-732f3abc36bb4bb116e7c8687f86e2aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdfjs-viewer-shortcode-ca93f191e3639f84afcc1a9b1fea599a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdq-csv-2f2309313c5bda581e3b02314b8c850b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pdw-file-browser-c6589434b15992ea6614e8eb940f49fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/pearl-header-builder-820928972f49f35fc134f49ec2dd204c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pearl-header-builder-90317dde5460b2bcb67123acb90cdb53.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-05f8485e11de79d6aa39de126de0f4e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-15be0a70b6c61a646e8df6a2ecfc155f.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-2d63f6e8d357472c9ca1e82cb0bc121b.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-8ca99b4af6db318cbc7873fe643413aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-aca658478fc845070c3b917d5842d5d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-c8c569d2140668ddb48a8d5bad1f7b26.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-e0b883e3e5e2840b97f5723817b58a50.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-e75947da405d6f6d94e7f97545536f9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-efd8e3487b0ad4544e466658a022b655.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-f9fe4feda10b297d0acce20daa42a9f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-core-fb4fb2e9f3d0effd54f1a6d138f00892.yaml create mode 100644 nuclei-templates/cve-less/plugins/peepso-photos-635219c62d7cd225129022aedb4232a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/pepro-cf7-database-1d4546a4614d787d7f8089a5da6d5fc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/pepro-cf7-database-995fd031fdd18a2d68fcabed6b6a8e84.yaml create mode 100644 nuclei-templates/cve-less/plugins/pepro-ultimate-invoice-9ae16e48f44198f8088e9f21632ed314.yaml create mode 100644 nuclei-templates/cve-less/plugins/pepro-ultimate-invoice-fe3ee4088bc486320d241799be9d47af.yaml create mode 100644 nuclei-templates/cve-less/plugins/per-page-add-to-178341479b86e6771bea046e08788d1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/per-page-add-to-186c3d28d4f62e262c488a190cb41115.yaml create mode 100644 nuclei-templates/cve-less/plugins/perelandra-sermons-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/perelink-9181aa3538843516f1558187b7acffea.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfect-pullquotes-8d6f7061c576076509b8f92171f21824.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfect-survey-6fe6a0f37349207e6c41e72076713696.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfect-survey-a8d322ee7f2a3aae906b690c8d232e76.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfect-survey-b9d0d288675f55bb8b0e4c8b1cc48daa.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfect-survey-bfb3f454ae9448850fc297b53b5e2f82.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfect-woocommerce-brands-a5b9786b6284df449ea800f32dd8d580.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfect-woocommerce-brands-efce5df3c4d25a3fc56c583b2e3ca93e.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfmatters-14db06c015099db1b01fba0887a78991.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfmatters-706c2acdbff0e92fe0b4d13990d0fc81.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfmatters-7bfb8a8c7905e357c4c4b5df9d93b6e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/perfmatters-e0c010ddbd19926f406c155b62241279.yaml create mode 100644 nuclei-templates/cve-less/plugins/performance-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/performance-lab-ea8f062f0b56f024cc7cd24de72627d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-10b89b9db07084a443cbeed71b129af6.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-35e5b1d4ade66da7f51f342394148582.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-48da01905911b9839c3e0f5a4a5539b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-4e977ded44741d82f1c08a16943badd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-8536531e312b5b608fd436fcd26ad3ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-884aebd15e5eb05f43f6f8a3d490accf.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-954c99838450703e2f9d2a807b32e669.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-ca60ddb788ce2ba7421ade305d793252.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-e32cc6e85c9fbac88c9c7b48d1277259.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalink-manager-pro-8536531e312b5b608fd436fcd26ad3ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalinks-customizer-eac9d9da89c904ba41a5397452bfcf9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalinks-customizer-f6a3298dd9a8254fb5d73c683663318f.yaml create mode 100644 nuclei-templates/cve-less/plugins/permalinks-migration-plugin-for-wordpress-474a3f34ad481b0e51cd0ce4304a20fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/persian-fonts-8ee86188c71251e99a8f09d6e9fff31b.yaml create mode 100644 nuclei-templates/cve-less/plugins/persian-woocommerce-b7124c79e7a307b3a04609b03d624131.yaml create mode 100644 nuclei-templates/cve-less/plugins/persian-woocommerce-sms-99d48d97197070fa6f8afc1ea6ec2bed.yaml create mode 100644 nuclei-templates/cve-less/plugins/persian-woocommerce-sms-f6e0611408f1fa46e8d9b7f9c0374cb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/personal-dictionary-b7a954abdc80748332e27cd05868a534.yaml create mode 100644 nuclei-templates/cve-less/plugins/personalize-woocommerce-cart-page-7e5b3599be6904a958ea6b2b094ad05a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pet-manager-13b68629426cfdd6f904bb91efc08ae5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pet-manager-1e104d6bab1fb28ec84c0ed01b4f6113.yaml create mode 100644 nuclei-templates/cve-less/plugins/peters-collaboration-e-mails-cf9cb4b184f662090fa6c012e4b5ad99.yaml create mode 100644 nuclei-templates/cve-less/plugins/peters-custom-anti-spam-image-a7e70ba8dbeab9ae2adc8e43fd59af93.yaml create mode 100644 nuclei-templates/cve-less/plugins/peters-login-redirect-12236d5bb8f3c06e72ec152e136c1986.yaml create mode 100644 nuclei-templates/cve-less/plugins/peters-login-redirect-55f3de8c0899443e80983275ca038b9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/peters-login-redirect-dcc1962541555ae792e76de2b7edad31.yaml create mode 100644 nuclei-templates/cve-less/plugins/peters-math-anti-spam-d6df1bce344df99ce5b68d40f423014e.yaml create mode 100644 nuclei-templates/cve-less/plugins/peters-random-anti-spam-image-a3e785056d2140e268a5211287db4a52.yaml create mode 100644 nuclei-templates/cve-less/plugins/petfinder-listings-4aabb12734f76649f5626710ac0ad1d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/pexlechris-adminer-44929349a8819c69d02149042a6d6e8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/phastpress-6080809f6efdafef4c14410a7cb137c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/phoenix-media-rename-82eeedcf78f4352cc7bcae0bfb774fa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/phone-orders-for-woocommerce-6736c43448ceec0a8c35031a10886cda.yaml create mode 100644 nuclei-templates/cve-less/plugins/phone-orders-for-woocommerce-f53b59e3d01b975c6802657d08b4d293.yaml create mode 100644 nuclei-templates/cve-less/plugins/phonepe-payment-solutions-da56011233283b841dd7c13f7f29d7e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/phonetrack-meu-site-manager-86d1730d65ed535523c7e0c21cf9f29e.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-contest-81dceae2605fe02ec91915c9cd7ee232.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-feed-e1280c44c0ffb9515ed7d76fdbc69b53.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-02d4095d603887ea90170c039ddd4ef1.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-03f9356825118ca4016abd782e8ac0fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-16de4bf636763685f8c5b31304d24a38.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-1cfd262b55edc365cf2f57c5e6d1da2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-1defc4b79b3e0026fa5b8dc78f8c4d1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-1e81e15f7eef3b25cd39002edd8c241e.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-2338e1fdce13dabaa9329802ae34890e.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-2357c93b70517db0a31d3d99ea026f13.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-309d3be2a8406e388de1750ae092da31.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-398552849d43600c1c4eab92f19672ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-3c5bac80199ef30099a13588ec30b8cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-44b42ab3cc67f2808aca4c4c544fe3ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-4ee123ab64de9526a768d6e54f2c4b2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-52e7ff3acb78cedfa1cc6fc74cf893bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-581d9bde9452d0889b5682513ff8db3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-620bdfabfd18b0eeb8341540ce2009f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-6c9c7c812a4ff55c5f56daa5be2fd373.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-730408927df5a002660d3bc7f56fa1f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-78fe6306f76d32a87cb79d1ed7a18344.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-7aac6c0223fd33522df44de52ce8d8aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-7d9c26b229d5c8003d8d09b623e0e129.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-8058e0bec878d58968e8631efe964917.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-813522545f1eb15165129d8785a8fe18.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-8372eec64ff21987a44ee27a8993e766.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-8449cdb7230a3e1bb12d25a2395ff5c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-85912756aaaf6a5c4da322cb7b750dd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-93b42b89f073fbc75b7062f5d47b5b66.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-9464a11b450ab411a742c340fdefaa58.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-9568a93cf21f83223317ab5745dc29b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-9f00578ac1259c4fd1c8b9de9165324f.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-b3f949bc68c2f0c560af03cf782c4a27.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-b9e46f23f1c3c438cdb8dc39395715de.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-be54fbb88b07e1793c0aea3459743537.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-beed03e57da7da89d62ad65025967548.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-bf638326d3a61d38ab0c3d9a56b1c934.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-c4eb24a39e4ca07448358eb29c4b844d.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-cab41f4f844db778ab337835cad811f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-cb06e44c5bf518af775ac99ec0dc273a.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-cc028d4daad55d43a1db8ea8a8a61c72.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-cde70bc716e26c33fb792a26b5c7f5b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-d029a01fd5b93450433108c7576996d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-d2f0c79f766915ada458669bedb0c203.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-e07e7d71dc600bc27e4f1c11c365c393.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-e1df20c1816f9cf921b493870b0123b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-e8b3c520b2be53d9460363b1d88ad98e.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-eaaac08a563441ff9dd67597a6450fdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-ec16eda1a0270dfc503649db472e9967.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-f4f85c5436cdac307c05feb98557fa30.yaml create mode 100644 nuclei-templates/cve-less/plugins/photo-gallery-f6467ad8511f5004bea6f7b6c2cbc45b.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-0310acae90d1336d07b5ec2866c09354.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-367ff78bbe085f960fe46db042a99b4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-7aee34ffd65481adae802a1b67540af3.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-a3750b38ee19e455b2f22ad25b740352.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-acd433b1de86848d8124ba9bb8ed6ee0.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-e067b113a87087f2914c0d765908e157.yaml create mode 100644 nuclei-templates/cve-less/plugins/photographer-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoracer-ee5b679f01639572a698b05d286d526c.yaml create mode 100644 nuclei-templates/cve-less/plugins/photosmash-galleries-33a2e7fa2283855eea0bc65fb87d66e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/photospace-7457dd966d0c4c8ae20cdc84ea24da94.yaml create mode 100644 nuclei-templates/cve-less/plugins/photospace-b019cad8ad64e7103a4ef60d49f6dea3.yaml create mode 100644 nuclei-templates/cve-less/plugins/photospace-responsive-27268d0b59c1274c726da2859a7e1b6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/photospace-responsive-b4a8b8c1c6aa3303fd49306d6d3da366.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoswipe-masonry-4086b1cacdc76d37665a053863a25b12.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoxhibit-c1c78bdc1547ba62275f78af4206540e.yaml create mode 100644 nuclei-templates/cve-less/plugins/photoxhibit-d80b7a12cea76f24d05fbaefc82e821f.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-compatibility-checker-22cbdfe6497edcc66032227e018ed1b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-event-calendar-f4190c07f620d8114bc44ea330931d2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-everywhere-80daa229706432d7991ba35deb710b25.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-everywhere-83059d16d11e2fca8e78916d3d8e8973.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-everywhere-a30d359b699628ff181230d080160c5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-everywhere-f8e9e8a25542e313c19a4d2c9a30bf10.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-execution-plugin-83ff6d6d9bc5d168afdb537857550fe7.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-shell-20137b81f547271c9a3bb4e93eb30f06.yaml create mode 100644 nuclei-templates/cve-less/plugins/php-to-page-ae8fa6f84b5149157cb1430a27dde4d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/phpfreechat-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/phpinfo-wp-68aed4fb719e93aff911b8c6723e373b.yaml create mode 100644 nuclei-templates/cve-less/plugins/phppoet-checkout-fields-95830f5764b8d010ddba582e5df78be8.yaml create mode 100644 nuclei-templates/cve-less/plugins/pi-woocommerce-order-date-time-and-type-79edec65d658aad88495c54f54d3669a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pica-photo-gallery-8ca0f44f9fa619376b40462781065a27.yaml create mode 100644 nuclei-templates/cve-less/plugins/pictobrowser-gallery-0f95bb65415e0d0bde6379a1fe073b9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/pictpress-307c3c6d6bec988e070cfcb7b09e6f6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/picture-gallery-f15ed32464b8a833a76a0b7a1fe8248d.yaml create mode 100644 nuclei-templates/cve-less/plugins/picturesurf-gallery-520d5dbf8af2830d0201decc2e42cccf.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-forms-for-wp-fad10c5df0d12e13e57389567502ed4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-085dcf91f1430534b15ba25ebc810709.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-3deaf34916ac99bc38f298b80ffb3072.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-44a36b31780ae752545fe7f279378677.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-48f2f58cd82d726138d269a3fe5d8999.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-490ba182a143f8f2d65ee92cff342981.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-5471d89b27018d77efeb5931175f6c33.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-555fd231d361b91b6b7b333e844c48cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-8c45c8eb0a60dbf34d7860d1438b26eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-a5906711fb55acacbd35705f2d98b335.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-b2f2a2293859699f71056b726eb185bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-c271e79e457792d8093dce56ebc058d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-d02d6cd1e31a58b9341cbaf75fde28c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-d17a26eab5a1167d47a2ffdfdfa715f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-e4630937cb3252f53c729f27f9bae6ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-f10e961623521100a85e5972e8959ae4.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-f2952d2417af91e1e214114658f123b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pie-register-fdaada004101af13bbd1c236fd07775f.yaml create mode 100644 nuclei-templates/cve-less/plugins/pilotpress-2498bc224a94ac1ba539a681f69b7ef6.yaml create mode 100644 nuclei-templates/cve-less/plugins/pinblocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ping-list-pro-a89413a448da960907f201f2e284d495.yaml create mode 100644 nuclei-templates/cve-less/plugins/pinterest-pin-it-button-on-image-hover-and-post-230333f7152338c0e847a31fb3c9a2dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/pinterest-rss-widget-62705338d1951d661bb8e5bc23d5b61e.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-b5ac41047b1437d9d41eb11c7b522d30.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-e66a7b75dd0639134f09eee91026a929.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-156652aa50db0572929dd8be39230242.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-20464abfb5a20fb1d96af1ded31e80d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-7170a15e98802cc9df1f92d68c501b1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-7188ef26349164dd23042500cdbf31b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-a073e10124aebcae7675d30da8592a4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnetforms-3e3dbd541f7f8bdbabf98ab3f7d5763f.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnetforms-4e38c1777edea860289ac75c8e42f2e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/piotnetforms-7ac0863d03c3cdd406341dca9d25711a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pirate-forms-7694e4b82dce0dfb26c86a146e774669.yaml create mode 100644 nuclei-templates/cve-less/plugins/piwik-pro-4e90b64e5c0880980f44418deca3c91b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixabay-images-12ee5879dbc7fdb46e24ef76cc9a2d61.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixabay-images-5b2fbefb63fd7f965b09642c4ccecf5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixabay-images-5de755d9bd8418fefc2676ce9864e6b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixabay-images-99e3e9aef74467dcee4f17ac700177de.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixcodes-4706d1b1438785969ae30d4549fd166c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixelyoursite-46fd3a8d2dbfa8e63d62d0d4687e4eb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixelyoursite-5498e556e2216200fd56232f5d1a8034.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixelyoursite-7c22e43cb21e5962b21022636d9c698c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixelyoursite-pro-5498e556e2216200fd56232f5d1a8034.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixfields-32884b4069e08a6e3a456b6d9b5e62d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixfields-c610b8a5231d91145ad3b18f9f470868.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixtypes-5afe134af3509b1b84204a9f85b1cefe.yaml create mode 100644 nuclei-templates/cve-less/plugins/pixtypes-f26696ee1719902df9af4673f5c5c04a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pj-news-ticker-14d59d1dd0d6c11dea03161b864cfb49.yaml create mode 100644 nuclei-templates/cve-less/plugins/plainview-activity-monitor-97006d9ae784a094161529df95603173.yaml create mode 100644 nuclei-templates/cve-less/plugins/plainview-protect-passwords-7ffe069edd0a90f30c2910fd73b2059b.yaml create mode 100644 nuclei-templates/cve-less/plugins/plainview-protect-passwords-f0297e0c6535810defa6f3589f3d99ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/planso-forms-b3f5b694f8149f7215285f5a07a42c03.yaml create mode 100644 nuclei-templates/cve-less/plugins/platinum-seo-pack-0fc1f5cd03c6bddb3df8077c66fc0927.yaml create mode 100644 nuclei-templates/cve-less/plugins/platinum-seo-pack-74239a2c7d59745dfff630629648ba8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/plausible-analytics-067e897c25e69073ab36a1703c7f28be.yaml create mode 100644 nuclei-templates/cve-less/plugins/plausible-analytics-3b9fd84836c7bf88f01e3e36ab24d168.yaml create mode 100644 nuclei-templates/cve-less/plugins/plausible-analytics-c591f3e0b0e6607bb02f8ca1122eb1cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/play-ht-4eaf37cfdef1b74dc7b626ac3436d2c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/play-ht-6182145f7b993029088ccd0a82af0476.yaml create mode 100644 nuclei-templates/cve-less/plugins/play-ht-e04d152bd4d70be12ad11762391a5d6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/player-0dd50401fc253eb4ff30c00f51c39236.yaml create mode 100644 nuclei-templates/cve-less/plugins/player-3c0e50875a3bbfb2004a47e262647c92.yaml create mode 100644 nuclei-templates/cve-less/plugins/player-a1229f8f2f131697def9604f593dc513.yaml create mode 100644 nuclei-templates/cve-less/plugins/player-a132c10bef68833cf859b4bbead4a383.yaml create mode 100644 nuclei-templates/cve-less/plugins/player-c58c613948b1843f7bb90012b0345e3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/player-ece1da78596879174efa10393f34846c.yaml create mode 100644 nuclei-templates/cve-less/plugins/player-f4526bcdafc950c9e06f1e8880692066.yaml create mode 100644 nuclei-templates/cve-less/plugins/plerdy-heatmap-2c3170861d7bd02e32a5482d1f26ddd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/plezi-c8ca58879ec3a0e2ce408bc544c89b18.yaml create mode 100644 nuclei-templates/cve-less/plugins/plg_novana-ed9933ab4af74460b44a6d3c7d1b8917.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugin-central-8d3ea868911a052c015f14b1fed79fc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugin-groups-f9def0ceb1a6b24330f85d2a5c68b378.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugin-logic-c9f14b3efd68aaad972afe4c5e7676c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugin-newsletter-4b8d96697b92d4da201ab4792cfe050a.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugins-list-d8a9eea8aa488b4edc83d1161c57f57d.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugins-on-steroids-f1ab4812b24f2e95426a9a9673c2032b.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugmatter-optin-feature-box-lite-5a8e72249d01f06327896fcc8bd59c29.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugmatter-optin-feature-box-lite-f9f9a85d9bfed3059a0bb1fb2526ff0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugmatter-pricing-table-5af8a6245b1d97ecb98489a4ed722ce3.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugnedit-20fb78c96d003cc1a6ca252c0fdacd2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/plugnedit-a9d432e9161b4b6c46b6a95df71ed4b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/pluscaptcha-1a537a66e5a0122e9300b301ca51e7e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/pmpro-ccbill-1758abc4263fca3455f9d9502f847bae.yaml create mode 100644 nuclei-templates/cve-less/plugins/pmpro-courses-001a8dbb2842e703a09732c4c42c632c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pmpro-courses-91c7b7fe658244c6edc7ae3511a3b054.yaml create mode 100644 nuclei-templates/cve-less/plugins/pmpro-courses-b95250d725c58e5f77c57b6de18a5532.yaml create mode 100644 nuclei-templates/cve-less/plugins/pmpro-courses-d8db452c19f101c274ba8899184fb3d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/pmpro-mailchimp-b69217b2f780a8df207734ae1925c5b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/pmpro-payfast-160c7d8906d4726b6004392f05625a85.yaml create mode 100644 nuclei-templates/cve-less/plugins/pmpro-register-helper-f1d7c5edd451960671d8bd82cadc646e.yaml create mode 100644 nuclei-templates/cve-less/plugins/png-to-jpg-63d2a51e3e8824195c3d41033688aedc.yaml create mode 100644 nuclei-templates/cve-less/plugins/pocket-news-generator-a0985a296fca110ec993acbc89421094.yaml create mode 100644 nuclei-templates/cve-less/plugins/pocket-news-generator-e23aa6f9657419fe19f8c4bed7c9e59d.yaml create mode 100644 nuclei-templates/cve-less/plugins/podcast-box-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/podcast-channels-c4998932aa42fcf89b684f69330f53ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/podcast-importer-secondline-39c09063986ff422c9e20ab8b773f550.yaml create mode 100644 nuclei-templates/cve-less/plugins/podcast-importer-secondline-de4fed651acf6eb0a9891cf52fedb252.yaml create mode 100644 nuclei-templates/cve-less/plugins/podcast-subscribe-buttons-a5c381dc4cbdb7060fc30ca87a13ef99.yaml create mode 100644 nuclei-templates/cve-less/plugins/podcast-subscribe-buttons-e54fc04abf0b5b0662339153e1522a1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/podcasting-8fa43cada4de49d673caee2179427c31.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-110726f45fe770f212d1aee89f3bb57f.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-2e10545dd7017e6f584fc20c4f8e8985.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-3472d41d965a1eba1565dbf3f6f91c0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-4a1b15e037b0e674a6b8abd0386af8e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-5bb8fe4f6089667dd51c2e2e1a9444ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-6143c745f174c1205927522fed8aa49e.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-c5c5fe7ae04b300c4245ab22359369aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-d871e2a497ccda6c7cc830c72c3348e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-e253bc9eb60b3ba0170a2740ba27c2f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f7d71098b8867ed535059e5ab72f5309.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f9001c4d0d146f20e371013d48c397ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f9c4a4753797c567682067fdd891aa71.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-feda90e2637dc66a787016724474b475.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-subscribe-button-2f90b927ae201cfb6bea80146d60cefb.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-subscribe-button-4f7a95f2553b4e4ec80b6d04a6fbc8bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-subscribe-button-858f2f8353e461ae105f6c048cf36fc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-subscribe-button-f884e1e5931aac898c331db3ff9b0a47.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-web-player-5b013c9961d2008bd8c1b51839f147f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/podlove-web-player-e884ca510b37335b1134220e4cc6625b.yaml create mode 100644 nuclei-templates/cve-less/plugins/podpress-396371aecede5680b30f6adf18b9bebd.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-33493821da381511f179da2cf195b351.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-79c1e1544a74f2c87544fd2e816d236c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-7a55c80cef31b1897125e271418538f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-85f6ac4895a90413fa74a9e82058c7a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-b37f90f1be095104847aff5ef46084ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-ba3ebdc8660c704b12fdc576b67a35b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-d5266edec4a9e9c793fa60a9c89f4ac5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-dd09b82c04b588417962747e8b977772.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-fc1ea9d8e61023700e49f1688ac8b5c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/pods-ff2c0144dd3f14c012ac895bb24d6c4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/poeditor-724f781d1b8ccbd2ec3504075cc6a13c.yaml create mode 100644 nuclei-templates/cve-less/plugins/poeditor-d3df4f8a3c09c9129b3791672c61fc3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/points-and-rewards-for-woocommerce-215be45a340fc01142771f1f9ff27095.yaml create mode 100644 nuclei-templates/cve-less/plugins/points-and-rewards-for-woocommerce-f595c203a77330422dba7245cce84dcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-18f92d3237c36d8e0be4fe5c61fd453f.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-29bc9c14cc220941303188c45b9daf29.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-2db56d3c99ea70472b056252e5e2e9e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-3172cfdf5fc8b7e358c053d42d06583b.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-79decf1a0edb8491c84a287af6c9aee1.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-7a1aa0c88530968ed1b5b646f3180462.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-b01ef863c43e07a65402f06b0d7b0757.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-c07bb721e301a0dbb891c103a2081934.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-e9a2fbdd50662e029e4a5c38ab41c5ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-maker-fd99760a8adb4d7f1b1ef68935056870.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-wp-a7b9bf475d14b8ef039f5657643818f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/poll-wp-c77fa481174899d20ed31a6b22926e33.yaml create mode 100644 nuclei-templates/cve-less/plugins/polldaddy-24fe066591faebd7c14b911941c41812.yaml create mode 100644 nuclei-templates/cve-less/plugins/polldaddy-30bec56b700c5c01448bca5f7c796f73.yaml create mode 100644 nuclei-templates/cve-less/plugins/polldaddy-3ba84c6caf17726274b8e8f2682a9b39.yaml create mode 100644 nuclei-templates/cve-less/plugins/polldaddy-7743d4aab2210fca5895ae50928bc6f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/polldaddy-8295098ceddb00b6deaf6e823158a962.yaml create mode 100644 nuclei-templates/cve-less/plugins/polldaddy-a04514ff505b4f6eb352afc1674938fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/polldaddy-ab195980f5561581f232d594039c4477.yaml create mode 100644 nuclei-templates/cve-less/plugins/polldaddy-bc16d03e307b2f3d476c4281bda98567.yaml create mode 100644 nuclei-templates/cve-less/plugins/polls-widget-ab0d8c25a4b5735f6b566693ae1e6b91.yaml create mode 100644 nuclei-templates/cve-less/plugins/polls-widget-cf547403a9a90330b0a13308e60c389b.yaml create mode 100644 nuclei-templates/cve-less/plugins/polo-video-gallery-62d375a0ef3c9366ba6ad68911a5c603.yaml create mode 100644 nuclei-templates/cve-less/plugins/polylang-734bcf2e1364f37386af10d34a5f3d15.yaml create mode 100644 nuclei-templates/cve-less/plugins/polylang-79eabca00926846a970481cb6b7e83aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/pondol-carousel-c2306772abb4405001a28e4fae27ec0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/pondol-formmail-28928ab1eb71053bca13e7444bdf6fe5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pootle-button-650e24c15aeace1d45fa4cd46dde8eb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/pootle-page-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/pop-over-xyz-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/pop-up-4332f8cf6f6916ee73d377911664daa1.yaml create mode 100644 nuclei-templates/cve-less/plugins/pop-up-pop-up-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pop-up-pop-up-2ad443c3fcd60f912c758a2ef81745f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/pop-up-pop-up-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/pop-up-pop-up-9a1a1874ab2f30e05e0aeecc21462cab.yaml create mode 100644 nuclei-templates/cve-less/plugins/pop-up-pop-up-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/popcashnet-code-integration-tool-59d582cc0d2221cf47e1a851d96daa5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/poptin-fa365da8fb7be5a7c14e80d68226de79.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-anything-on-click-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-anything-on-click-a738a6df1d7af94fbdfc3f2ebe12ab82.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-anything-on-click-bd548451a3b6e5a6853676277735dfef.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-anything-on-click-d4b97461c23d3e553d4dc5a4ed959427.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-anything-on-click-dfa9091cff2e49dc88dc81c6af99c1f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-box-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-box-66e44ffd73c4157b210becf5e5234e8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-box-cf6d429dc4a254aa005603854a5d8f0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-0c50700eaffcf8d6b08d04f7dda8abac.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-1558ae525a455945fc67fef6a1dd1612.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-18e611cf48e8f4ad6e3b9384220c5457.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-192f45705f7777bf22c82d567e0c737d.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-1f9ac7c68fe8ba8939533494bdaf6f2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-2b836e0762bdbf59a8ee2eb5384418f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-65e82d728797876c4549a975b4ad5c9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-9df0586fa1f03eb4aff1b246f09e907b.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-a665c3284fcafde64dfe52ce15a964ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-ac28c6a1f49fbad1719d7e09c0190565.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-acfb5b2881f82d1968fd7915b9afb6ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-aeb6fb0231c672e40781598de70439c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-b04ad422f3446dde9c13618b34ff98a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-b5996763218808f5db38a6126c890df9.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-e90caa361b62564e08e191aa073473cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-builder-f3aaaced779e642f2bb1c29db02ea02e.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-by-supsystic-08f985452f29d16902708fda34a54b58.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-by-supsystic-0ff521bb2f967b893b649e52f933e62e.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-by-supsystic-4a55514451127aed8c9fafcd15f7c892.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-by-supsystic-7181f5f3bd0820834a4f3207e9060f79.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-by-supsystic-7d533a3d146be46c1ec4aa8c4e983051.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-by-supsystic-7fd4b87b9f62e3f833903e1a4cb60554.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-by-supsystic-aaf49aa53f803817d024c6faf4d05d87.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-contact-form-3c0e91d24d36a9cd6d874ce52fecf15c.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-contact-form-584864f4cdfe17f88fd042ba6424f8ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-images-e6cb47157cb35f90dcc06e51f4ec2619.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-189f237bf9c2686338f976edbe64b7e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-3a1e41088675792a5f4e28fc34263cd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-535ebdfe2ca4cb1641e4a25814726229.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-a3b6f79669d9dc684f2a89cb966b83d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-b57f56b1347aa5d19dac687fe592133a.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-babd847e079fcdd7a546f8f906593529.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-c446e0b00a3a4561bee5779481d638d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-d421af39d84b1128d0254744158f6c8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-de64ee696bec8d009d778000d64252b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-maker-ff57e42e57104b9d5c57fd329587cf27.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-manager-76f3b72582acb97747f26a7d73d169e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-manager-da1a3662428b7d8e0a5c05c7f2cee12d.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-modal-for-youtube-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-more-7d2e01fb5142e419d7f12bc8417804ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-with-fancybox-bee21ffa7faff706d4db361bca23b6c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/popup-zyrex-d9e5ab172446fd3be8d4dddf9dcfa63e.yaml create mode 100644 nuclei-templates/cve-less/plugins/popupally-104344c0b7a013be4ee55f379fbf7b52.yaml create mode 100644 nuclei-templates/cve-less/plugins/popupally-3e074f8fe92c7cadd8316ec7dd448917.yaml create mode 100644 nuclei-templates/cve-less/plugins/popups-356d13b6974d8f1c305ed39531dbff42.yaml create mode 100644 nuclei-templates/cve-less/plugins/portable-phpmyadmin-cd131fb7dbc732763aa435e3a74746ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/portable-phpmyadmin-d09c471b1ad5ad87d4f4afddc3658574.yaml create mode 100644 nuclei-templates/cve-less/plugins/portable-phpmyadmin-f5f19df0291f0636aeea89c408a38887.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-417489514b9c703ef6de3484813afc07.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-and-projects-454dc41941365b15ee244d48d13a5ca3.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-and-projects-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-by-lisa-westlund-6fc195976bc811efd5c4bd31a1b9fd8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-by-lisa-westlund-83ec865d5c8f3847f1734b9b89afe851.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-elementor-20c420e00e7776a25487d5218d4e77bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-elementor-4d83bba8058d5550f9120708c18d4b23.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-filter-gallery-6a48e7c9d0ebe158b3f7430c9e7962df.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-filter-gallery-6d651a584c882645ac53e340c49131a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-gallery-1ef894646600f00b3158183d9299dcde.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-gallery-815bbb8ecdc0251e048f40a706274fbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-gallery-8195d0fd4f0b5ac7235f16224b2dcb18.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-responsive-gallery-70beb78ba7fd734dda35bda551cb0775.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-responsive-gallery-d3ba4c3e62ed9f2cd7ab1df9d9c7321d.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-slideshow-cb4e42488e82603fdda3ed8a6057c4fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-slideshow-pro-9d8ad614993ab663e4e1353da10143d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/portfolio-wp-422a760ab8a04278c237785bf5be638b.yaml create mode 100644 nuclei-templates/cve-less/plugins/porto-functionality-10147d7844868b2801a0e636a99a05eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/porto-functionality-23f358a9d40cae78b36e38b231af07ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/porto-functionality-57ac81934caebdaedb69c79f34942250.yaml create mode 100644 nuclei-templates/cve-less/plugins/porto-functionality-98b3c6ab8f905b035d160d1673b90dca.yaml create mode 100644 nuclei-templates/cve-less/plugins/portrait-archiv-shop-0786a182b4b3d53e469584f477d9a727.yaml create mode 100644 nuclei-templates/cve-less/plugins/portugal-ctt-tracking-woocommerce-96ae79181b6ec77bcc77d5a1f71b9993.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-and-page-builder-55e2a4b9a97cda212301452238552f00.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-and-page-builder-cfbde5318ddfc1f99a56f4cb27a830a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-carousel-b852d5115d07ebbb3d6948d1d5619495.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-carousel-ddeb85dc820c08fb544362c25d281533.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-carousel-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-category-image-with-grid-and-slider-048a39e7d237e8f103e054f25cf72eb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-connector-21e149e548734ec4b958e79da23daedf.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-connector-77f1b741caca90f6e233d10f62410685.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-connector-f776029d92548dff61e2448270aca9d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-connector-pro-f776029d92548dff61e2448270aca9d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-content-xmlrpc-c5997f1fef9873598e392fd29a23db70.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-duplicator-4411dec3eca9ec1ccdcf332ed790a4a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-duplicator-757377e3d1b7b4a16326ff93c76bfa77.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-duplicator-e3c761c4e430d07f3cc55d6f4fc67c86.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-expirator-94847c0850f7aba0194b3e646162912e.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-gallery-1b225faa6149f90c544fb3acb706af2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-035b152afda993b6317a93d2886e872e.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-2709ba16ebba4320ded81fce12f3563d.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-27ea99e0a4c0fec30a4e9e397cbf9e1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-62d64311944bfd1e5f948984fb1aa5c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-95cbf2d4161dbe2a06b19107725df07f.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-966d3900b7e6f22f0e9de38c28765bd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-af61f5bee07d29ca204b7dc88cfe0b56.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-and-filter-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-c45a88374cf340205cd7587349c11c58.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-1ddfe592d879bc70e98e16d6c917ddd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-2f1e25e867c081cf048f4dbc7240dbff.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-c9946499e4c79e58a3887d0481784464.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-cf1bd6ff01752966d1624646c80166a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-d85892acba5196bfde784fd680ddf7a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-grid-f73e002833ea0b53546c13f99fdb350d.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-highlights-a2564828601d8890d4d70eda1fefb7d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-hit-counter-f768e79079373c221f74efaccdcb8674.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-index-a197637cb7c671923c50bb35a3955a77.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-indexer-b17a43827beee501340aedb4ac43d4f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-indexer-e8e5df43b04b7f37f9a558b78548b1cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-list-designer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-list-designer-bb6c1374b9c3f1f7e4fbd5d4ecd1156f.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-list-designer-dd54abc9fa7f2f5d5c6010fa1c8c3d7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-list-with-featured-image-5d918b6eb4d2d11658c1c45d7b9c4c43.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-meta-data-manager-09c17ceea6b1acc60dc27557a0b8ba88.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-meta-data-manager-1261a6042800202478889a8b09341ae9.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-meta-data-manager-91dbc533a6be524b4d3d9619ad71cbbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-meta-data-manager-f2302a385e4bf0d806c1625e66741b99.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-new-6b050fdad6f07dfeb11a710487994604.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-pay-counter-c7ba3a45fd00d12be9d06e7d73d86881.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-pay-counter-d8208f20ecd1e01dd3173f786b1bf7c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-pay-counter-f9e928230a2004071cf8b8a565c1c9d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-plugin-library-58af12d3803de6577a6e6446cfb68db8.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-shortcode-b16694416bb8375e384e3d9eb2224580.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-slider-and-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-slider-carousel-43333653570b3a1b8a29a02f94914583.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-0b71d9ca16ea40ec86cc7a6c955b072f.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-0b997461262414a5dc7659a0045e7c29.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-378b490d457309885c7c94c6e12193bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-53d4be9be43b09403fe429bdcc5fb51e.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-5cce32cc2992a89ca752b62e96a78a05.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-5dcfc5ea6f05d00ca9432dc6e06a959a.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-67e90d47ddcdc0a14625badc3df84c45.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-95f3dcaa4b86abab69cc1c0fd09f80aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-9886017b189939b50d12738a1b1a19c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-afbbe261546ed611413e53ceb7e989bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-d84a106e9bb81d7dc52eebf9c446c56a.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-smtp-ff6aea4a9e4f72f85f246b4af5287259.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-snippets-67558508f8127f6d47b6b0749495c9d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-snippets-6dabd7288f9bf1aa4314c1230eb61170.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-snippets-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-snippets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-state-tags-615b1160bdc5d2675b75757e17bb7e35.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-status-notifier-lite-536f99b9c8b9515938d0ac526d370775.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-status-notifier-lite-fa9b6dc41b62f37cfba851a3e4e1b251.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-teaser-767aeb59e47dca848d0413b31cb3f81a.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-teaser-db46aef04d74b6695e5a22627a3163f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-thumbnail-editor-c06a16f33dee682ac5351a8f0d142a5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-timeline-d1c35f1b92d2cf694e8384e45db5ef1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-title-counter-ae3d9dc541dfd812b33967f0f1087c0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-to-csv-20398cd1fa642be8e5e0c9798f123a57.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-to-csv-7b65c39ddbda37096522c90c94a9d953.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-to-csv-ebe4222fc5927e1301c1b27600c1ee1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-to-google-my-business-b63b7b7e3d30454ea5fbfd364258f1a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-to-google-my-business-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-to-twitter-b53860895277e266b1fcb14159c31da6.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-type-modifier-simple-2e58f9cd7db4957fbee5920bc996cbac.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-type-x-1d0458d81b174356717b00e4b0b273b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-type-x-26b80bc80cde32f0f361f2fadc6529c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-type-x-965fb6d33351fd23a3e7b31a7c69feff.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-type-x-c1d2bd9a1bb88b5b9cb365bbd2698cbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-views-741838efe1987dc0902314663618d34f.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-views-counter-71955a966b82cf2219c81131b80c408e.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-views-counter-f4088a6dda890a2dfcb23a5a06369d61.yaml create mode 100644 nuclei-templates/cve-less/plugins/post-views-stats-1e717f9147d850249e106a439e5cf9f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/postaffiliatepro-107104bc14e921090e757f0c5c64d34d.yaml create mode 100644 nuclei-templates/cve-less/plugins/postcode-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/postie-2555356e703532b9bbe5578b47fffbdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/postie-6f78bc0495c69824a3ef08a95ff8b518.yaml create mode 100644 nuclei-templates/cve-less/plugins/postie-727d4fbf362548e62940ac117a3d3c3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/postmagthemes-demo-import-4f73853f1fed7601f5de786bcd020099.yaml create mode 100644 nuclei-templates/cve-less/plugins/postmagthemes-demo-import-9efe0fb93db4e83b6512c73eb733e094.yaml create mode 100644 nuclei-templates/cve-less/plugins/postman-smtp-afe901ac8a088fbc034c09cb75a2f817.yaml create mode 100644 nuclei-templates/cve-less/plugins/postmash-4be4ac2753725fa5dd456a071085e7cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/postmash-858a26ea9a23abdcedc5d015a7d5aad8.yaml create mode 100644 nuclei-templates/cve-less/plugins/postmatic-364140ec5050587d4743f8ad888c8004.yaml create mode 100644 nuclei-templates/cve-less/plugins/postmatic-77c6557ed6d5a269f424f3a44bdb8307.yaml create mode 100644 nuclei-templates/cve-less/plugins/postmatic-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/posts-and-users-stats-d94e06192974b1fb1b08b2e10b17630f.yaml create mode 100644 nuclei-templates/cve-less/plugins/posts-in-page-4146040381375fe3470534dfb0d8c368.yaml create mode 100644 nuclei-templates/cve-less/plugins/posts-like-dislike-a6ade812b7794f2ce71092e01b3f3441.yaml create mode 100644 nuclei-templates/cve-less/plugins/posts-table-filterable-4d368f69e27c2436f2d59ef62ab42c49.yaml create mode 100644 nuclei-templates/cve-less/plugins/posts-to-page-f4bf91007a25d09c25ce2d7dd70ab2fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/posttabs-03debccd2847f0f3861af391ac774ecf.yaml create mode 100644 nuclei-templates/cve-less/plugins/power-ups-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/power-zoomer-020f60a4dbeeac1a3b6d4d98194928a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/power-zoomer-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerkit-0af70d46a8f7d1d575b47f6ceaa9d723.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerkit-54dc33c4a20161d9ec4e865b2de44997.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-addon-for-beaver-builder-97dd2eef8600f91fddf3cdf090566811.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-addon-for-beaver-builder-e22d00de70da89c7d78c2d123c0c7293.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-elements-32838841eaf8293770fe8af6d9dab7cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-elements-89d7a5b57e6d3259874bdbb477d35f08.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-elements-910629dfad061ef1cd89c571481e8f0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-1e3008e9a413fca6d1323b62a2743a7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-328a1085ce78b77ac077833dbb3621ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-6a1e6967396b1126582c6ee0a5fede17.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-7cdc1189a823c084ca0c2c88ab1e4c6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-b041552e80a8d76e86ae11341bcea94f.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-bc9d2ff303507ede4dc68917dcd5ae6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-e94aceaf63920aa3eb4b9932eb00b35a.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpress-09573bbd55ffbde9d233ad38438e8f66.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpress-2a2fe738939a9e67d5cb46ca54ca2af9.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpress-307c020a7d3d97fddb5823725bc2bdc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpress-86221a41117bb12070fda480ca17a28c.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpress-bb853e4203fd77e0eccd7981cc19970b.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpress-d2b59825f91765366d354ae0bca502ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpress-d401832f82eae4d4b25c6742ae7df7ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/powerpress-e8a960f3022a61734bef50d7f60e4d17.yaml create mode 100644 nuclei-templates/cve-less/plugins/powies-whois-5aab035ef042ccd7141d869c2750d5bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/powr-pack-788f2a7e634374198c6c99e174e2830a.yaml create mode 100644 nuclei-templates/cve-less/plugins/powr-pack-eda45ed9fd55d54d8bc8631b38650581.yaml create mode 100644 nuclei-templates/cve-less/plugins/ppc-fraud-detctor-b4d07a0d8ae8c6f01f34243674170720.yaml create mode 100644 nuclei-templates/cve-less/plugins/prdctfltr-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pre-orders-for-woocommerce-f8654e70b61d2e52e5f038a5f0414371.yaml create mode 100644 nuclei-templates/cve-less/plugins/pre-party-browser-hints-c47827133b1c48070f46a59d37c27728.yaml create mode 100644 nuclei-templates/cve-less/plugins/pre-publish-checklist-d84e75d6c9c8d0a3d0da84beaba7027f.yaml create mode 100644 nuclei-templates/cve-less/plugins/predictive-search-6b177b37379772051433776316566ccd.yaml create mode 100644 nuclei-templates/cve-less/plugins/predictive-search-a45e2a89638ef475d44955daca9531ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/predictive-search-b2c299a9a1dfd6a544071cd299a840b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/preloader-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/preloader-for-website-2c9e7a14e26b36ebcb4ba9bbe208df94.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-07fd6d4168c19a2706208ce105fc7279.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-17011bf78eb7cb3c3509ef0727f15b97.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-285480d3186a91d1e0ed6c347ab46652.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5332275b2ed1bab71594c8fbd6d44f11.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-53bbdc5768caf77b3864368c8b4ad9d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5830898462cdce464207b0d4b8cd2848.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5f4d629f81f40ae82d44c4c8c94e12ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-63b73f38de8e42ff42c365ddf35b05de.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-6be8b4c15f4802607f2237b86373c965.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-7346b5c5cde69749b42ec0dfced7a750.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-9196735e9e9fe6dd44235b7e0a53bb60.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-a48eaf0c735b82aaff5677d4812dc0a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-b940c9ab9a01a68eea4a5776ab2199d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-c1aa3c18402d6565768dc2655ac439f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-ca0593eecf48a43d195a057ed533a1b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-d5a4a92d920eb71aaeb7667326f31fb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-for-elementor-ee8591e5f3f55c96d9835c88a6740c39.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-24ae12d6b29ac4b2b659477fd814db52.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-3bfe779738faac39c2783a057e7fba45.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-3da39631322ead94331d2d8a800a3d3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-476134bec82a295d4478418acb3a1fc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-7dae15c1486a66b7dbaca3afb1f366c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-8ea80e6fdb96812cc7fb786f57b22769.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-a6cbba6a06f8c16a716b48b44610ad62.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-b898553c18a3c26f0a1b011522df0006.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-addons-pro-fe65855ff8de2259da21136e19e15ee9.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium-seo-pack-light-version-ccaafbc19f880370aa739512631721f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/premium_gallery_manager-03cf8e93b74222e68871e585e93a1dfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-8029afdc04745424b05ede0e496f1c03.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-redirect-manager-2caec5a3e7a9b163d5d5f19244c4d557.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-redirect-manager-50f488111dad00bdb113f7022a4a0420.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-redirect-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-redirect-manager-d025df7fa9c98e92f3b558a7323cb34f.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-search-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-user-roles-3d4210819f9a01bf5f52c577615b1ddd.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-user-roles-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-brands-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-multi-currency-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-9460e33e1600fa49d2559c8b2959f093.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-variation-swatches-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-wholesale-pricing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-wishlist-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/premmerce-woocommerce-wishlist-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/prenotazioni-0b0d398d1a79ae77845de8705631a4db.yaml create mode 100644 nuclei-templates/cve-less/plugins/prepost-seo-a5227115c16c80c1d90e0210cfd39bd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/press-elements-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/pressference-exporter-86e875acdb3922f4740414dff44b0215.yaml create mode 100644 nuclei-templates/cve-less/plugins/pressforward-618eabaed47a418425ba258f61366c0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/pressforward-d0af10e9ac4884ae3c68f9f3c40fdad7.yaml create mode 100644 nuclei-templates/cve-less/plugins/presto-player-ffd9211fd118d563cf07134a00f95502.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-google-calendar-c5888a6adf3b7c4a7f3becae44174450.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-google-calendar-f9b0e5543d8b6fde32af392e9a980e57.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-2b34a16f481c76cd3b855292edd0837c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-3e48b050eb99b97d596e581160f8b0fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-41859e395573554f98122582c8a8f0c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-64447b975f887c7d7c5f32cb22cf8b08.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-788a92d89f29c9708029570d31435edd.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-937a958745ed3ab696229e1956002aef.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-b59b53ef6e4ef1805fb78be7f13120cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-lite-052601a64f3c278014382ca43022a402.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-link-lite-a5b27966569a74533de04e9d976c99c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/pretty-url-977a0355e694b9d265545981130653f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/prettyphoto-1c7062bfa495ccd866c7cbbbfe4462e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/prevent-content-copy-image-save-9375f4344479a96cb2fe5deb81f3c215.yaml create mode 100644 nuclei-templates/cve-less/plugins/prevent-file-access-0dc878d77e3a3194c72fdd6ba3814c5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/prevent-landscape-rotation-b8f19e13b8f78474f2f4efef8d80ad2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/preview-link-generator-1c4812a533fa1689fc1c4f74901b1fce.yaml create mode 100644 nuclei-templates/cve-less/plugins/price-bands-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/price-bands-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/price-commander-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricetable-c09dba9091d0ee592d0a0d23f17cab8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-deals-for-woocommerce-791f562db0a1b9f0bcd5351dce6eacc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-deals-for-woocommerce-8930cf2379d26f27d4dfc818449f89c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-table-a5038f440967c1bd1e883ce46373e9e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-07351eac4ac9135631e6b13a4dbb9f2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-5cd979c2d1bc0f7645ea6d8b845b95d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-796cd5b627356be27433f08472302dc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-a0cf0c70320b9077a478823de4b5e05c.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-b8b87309673e04154a00de1091b89e07.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-fef3c5d045b635ac89f7d5a505428c20.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-tables-for-wpbakery-page-builder-ea2779881d033f74603b414138c61a0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/pricing-tables-for-wpbakery-page-builder-fa96acbf0fe29f0b0c48fe458fac9bfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/primary-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/prime-mover-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/prime-mover-ec0983e54c9058b456b78ea30580b6c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-2af694ce57dffaf3d295cf18ffc50a9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-7ec3d0366936e6cdb87debac06f05872.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-c7e173848fb257299994b18731636ed4.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-ef0878d0c845446e359ff8868f1f69d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-4e625904aaffe65e8919040e5c5d03d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-b658c34d6189136c251e0b8d8e225774.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-b989c8fa7ed8639e2ece01754bff0c0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-c1749d6ed9c579e061b6c82357a7d855.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-e0a80937c004063afd9f6bac15ab1a10.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-my-blog-0562ee4a0dfba95b2ef2be1e8d702a78.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-my-blog-15e90fc31ab3dfba5bcef7edbbc05f6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-my-blog-26c14cb6ca4960fb59e24c4b3a62abf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-my-blog-6bab7e18a95398e2980bac2c1ae0a9ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-my-blog-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-o-matic-2a1202a3beb6f69088b7b47e3927398f.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-o-matic-6cf87515d30763cb39f9dddd78a854d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-o-matic-92919ce0eb17b0cea216462cfde732e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/print-page-2ff60d0958c013f69d2bb2b8a6cd708d.yaml create mode 100644 nuclei-templates/cve-less/plugins/printfriendly-1d90f05eb3de7b1b2997cada03edccfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/printfriendly-8d6a1c8b6a0bd1e0976b28104afac768.yaml create mode 100644 nuclei-templates/cve-less/plugins/printful-shipping-for-woocommerce-85ac97fd4125d5816ad5ef5d1d8e7011.yaml create mode 100644 nuclei-templates/cve-less/plugins/prismatic-8edd86c32f445ba8a5cfcf66f80c6f54.yaml create mode 100644 nuclei-templates/cve-less/plugins/prismatic-b1ef7da73b0bc448b39a7087f236d203.yaml create mode 100644 nuclei-templates/cve-less/plugins/private-content-c6757c3a086fd1dc631d770c06dfa500.yaml create mode 100644 nuclei-templates/cve-less/plugins/private-files-dfb92d2f2c245aee84f9cb4e282df3aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/private-google-calendars-9e0ed51792e9270a576ac0d1dc550b71.yaml create mode 100644 nuclei-templates/cve-less/plugins/private-messages-for-wordpress-28a0fb0e5795f11d3d7f2a955c95e65c.yaml create mode 100644 nuclei-templates/cve-less/plugins/private-messages-for-wordpress-9a33307ee1f701bb2a441949f0f7229e.yaml create mode 100644 nuclei-templates/cve-less/plugins/private-only-ec43ca1bf1629851ca9458501102a544.yaml create mode 100644 nuclei-templates/cve-less/plugins/pro-links-maintainer-dev-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/pro-mime-types-2434cb0fd5a6747f4ecee8f99db9624f.yaml create mode 100644 nuclei-templates/cve-less/plugins/pro-mime-types-cd2ecefb429545511e8b1657a942d790.yaml create mode 100644 nuclei-templates/cve-less/plugins/process-steps-template-designer-305166b60791f108d5e7fe6f43ded2e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/process-steps-template-designer-dc3e0c6c532d55735bad2ab0a9b29d39.yaml create mode 100644 nuclei-templates/cve-less/plugins/producer-retailer-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-blocks-0fda2513a52a35861fc96a4bfe4d416a.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-blocks-1a920eb903d024c035ef8c5bd825169f.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-blocks-52b32717fd3d0ae5a10aa7d3c77cb89f.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-carousel-slider-for-woocommerce-c121370e7ba5758271f409501c03a844.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-catalog-8-f04f87a896e55745312276c242be448b.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-catalog-feed-0c4b1084930aeba75c764a4b807cb55a.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-catalog-feed-14b3d9da0216be6cd75720390cc32eeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-catalog-feed-de6904b30338b532fe232a4eed04dacc.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-category-tree-15b4a0b7ca6834b3f08ed0acfa9781a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-category-tree-7e41870e8c673b23f19244598ea8ebcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-category-tree-93d68a604c1f31fabc010b04974afd20.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-code-for-woocommerce-e4183cf6c320dd4a4188939a38d36eca.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-delivery-date-for-woocommerce-lite-84ccfe3dbfa257fc01b0e4c65174ef35.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-designer-929aa721697458bc99a1b54c167ebc87.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-expiry-for-woocommerce-c7b36bc8204aa5070cf82a1f950c7e42.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-filter-for-woocommerce-product-a3db779bffaf01ac0439d97b043e7b9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-gtin-ean-upc-isbn-for-woocommerce-bfa3bdf21b692d54c0876a9ef34f70f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-image-watermark-for-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-import-export-for-woo-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-import-export-for-woo-ab754796885789e2785d22756395f374.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-import-export-for-woo-d62fba94114c42d1399d83bf9ba0a989.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-input-fields-for-woocommerce-2ce3f934989f3f09920f8b67a7a75fec.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-input-fields-for-woocommerce-95b404a39a8029acce6d04daae5f2eac.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-loops-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-of-the-day-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-page-shipping-calculator-for-woocommerce-16f12614c7a820b2ff0d5295346d446f.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-page-shipping-calculator-for-woocommerce-eb2fd42fe2d2e213e39c0b11404601e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-preview-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-recommendation-quiz-for-ecommerce-bc983a8f571310dd96f9e038e97c3ba7.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-reviews-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-reviews-import-export-for-woocommerce-2fb579c97de9a06544ccd98cdd1f1a82.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-size-chart-for-woo-f18aed8f26180438e01da09d99987534.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-slider-for-woocommerce-lite-95618d186dc4c7ea88896374745039e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-specifications-5e59a8e30610325be11fabed812368f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-tabs-manager-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-variation-swatches-for-woocommerce-51f425b2b47157be5d941492e7da4019.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-visibility-by-country-for-woocommerce-aa1854785cf9c11ed11fbc4dacf9e3b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/product-watermark-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/products-compare-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-00e848a455a7983930f44875cace1026.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-251b86614cf3be75bb7b89fbf426f8a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-3457b59f61c052b7277e18f32edfae6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-5015ecbd471db4975c3b73948587d93d.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-69b4ec76e7e9ef35af4eba10c77eda3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-6d25cf58ffbcaa52d33430356ac1e25b.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-70888d956fd216305358993b9594be41.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-70dc7e4179ee1658845e3eaa45bb0f0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-8f79685201a214e5aabf85b86caf9624.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-960773bb26ec71f2b5c7ab22a6dcda0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-9785eac397f218ab171d469467f03925.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-a0c7f584a89a83d8f5abdb6a2467eb51.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-adf6fac31c64a896c3bd8abd21897c4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-c416c9eed88376e68372de18ba7ac866.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-cdefed7ec787c02fefebf6f17656a114.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-d50bca474bfff7b87f9bd013b925f56e.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-d9e9e029782a4a4e5f78971a37604066.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-da13e940921b9b4b286d3e79be1e9d85.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-da987af29928bc75b0d20d1e2162e5dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-dc37f981ae3cabe96f1627086e8e54ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-ed5bd7edeac7881ada7083f398663350.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-f044be0e1e4c22699ad8261226bc2dd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-pro-47d88a978c6902943e13680f899b8407.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-pro-960773bb26ec71f2b5c7ab22a6dcda0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-pro-a686ec08a13b7563defc9b5263758c7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-pro-b32ca2d76fc3293d68526cfa723e6bfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-builder-pro-ed5bd7edeac7881ada7083f398663350.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-extra-fields-6c56f3c8c2911fbe28d5ba7b021c7d79.yaml create mode 100644 nuclei-templates/cve-less/plugins/profile-extra-fields-be030cdf4529b191ea63fd886a20439f.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-294749cd5a2ad1c57b32f41564fa1af1.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-2f992f86ff54d554aa2e677bbff33be5.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-44a5cf3e0ce958c3682da008c171fd01.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-4a6b08579b21c259b0bca4ce2e0b2904.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-4ca548e170bb0185c3dab51f55775413.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-59843f563a6293fb05b21fc44ccb51b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-5fabed76f8f56020c1155c8f97c6681c.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-602df06e81e9929680d21f57b3d3e3d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-614a90a330e23b7940675663ee8789c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-639feb49244de37ebd2501828b79541b.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-749e9c4c45c9dfe7d4370d9e1054a6bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-76473b3f668ab27ce2fcb0878efe87b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-7bf1226ebc8c449ae85cc65e327ee63d.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-865589c83192a271d43a839d1c2dd482.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-8781e1672be1a467451ab0b40e4c7713.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-87d13bf13b6be6962a557c3627b3cfe7.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-913748097cb69a1df6b424d4a05f37a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-923942b507c5bb53ae8216a8af30479c.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-a0b780503648451776551c0d1ff9b442.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-b38eda58adcd55c816f6214da161bc56.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-bfc26d10316dbb147d906861f757195d.yaml create mode 100644 nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-d335e6c8c52890984157995f488f49da.yaml create mode 100644 nuclei-templates/cve-less/plugins/profit-button-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-1fba8e9934d599624fea9971897c6598.yaml create mode 100644 nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-6a4904a703851349707d8d3d078c2123.yaml create mode 100644 nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-7734e62aac4f36040cb75f80a344eeea.yaml create mode 100644 nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-7a9d640d2710a17dd51cbd839f471ded.yaml create mode 100644 nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-c3011a2eec39e2ae9754cf338940cb61.yaml create mode 100644 nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-ef26b2db7d3ee3da13d6289352e36f3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/progress-bar-941ae6e3f270ab1852f33bed4b21e75f.yaml create mode 100644 nuclei-templates/cve-less/plugins/progressive-license-5901a98b1164ea8a4d049ee273115818.yaml create mode 100644 nuclei-templates/cve-less/plugins/progressive-wp-87e99280c7fbf3c8ad55c6ac46aa584a.yaml create mode 100644 nuclei-templates/cve-less/plugins/project-app-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/project-panorama-lite-f526a0fb0a181d070234f458832b61bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/project-source-code-download-55ee60e67d9e233077a29ca0b025c99e.yaml create mode 100644 nuclei-templates/cve-less/plugins/project-status-e22d4b224819c0d0a8a173a4476a0e71.yaml create mode 100644 nuclei-templates/cve-less/plugins/projecthuddle-child-site-c6a13766dfee309169a154d6bf63adc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/promobar-25d8c7ed5a7b1effbc548f589cbe27a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/promotion-slider-bffa3ebfd0f8f4eee0788789721093cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/proofreading-716d3ddce65959ddfb011b7ca5f75416.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-0e504336a10f995a3d5ffd0688becb4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-269c54556a1ca81f568118ffc940071f.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-38f9b434ada5260ea345f99b88aaaba2.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-453cdccb9ec27998718a08f552017bc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-4ba37fc25b6b62478d53951a81386aeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-53a71e50160d96221b329d00809ca7b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-5e68a3cd88ecb3d8410d3d1d23bfef75.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-ca880b16159d0a9fbb68955f79340071.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-deea856103e67ca13471337c06b08b93.yaml create mode 100644 nuclei-templates/cve-less/plugins/propertyhive-f53efc19e67fc15708f7aff7dc031f4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/proquoter-7ddce7ee421f18bacb72f14e66ea1bcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/protect-uploads-dcaafd0f02c38e487ed1a8a26307e284.yaml create mode 100644 nuclei-templates/cve-less/plugins/protect-uploads-with-login-page-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/protect-wp-admin-0e3824b9f05a1d4071b5fbf703950004.yaml create mode 100644 nuclei-templates/cve-less/plugins/protect-wp-admin-3008a63f18e7f2e88b5013011c2e866b.yaml create mode 100644 nuclei-templates/cve-less/plugins/protect-wp-admin-ec9f7eccec9ca008528410c831cadf91.yaml create mode 100644 nuclei-templates/cve-less/plugins/protected-page-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/protected-posts-logout-button-5d1bfbb84afa64ba47c235dccca370e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/protected-posts-logout-button-6c57eb9a493b5e8a3f87551a89731a76.yaml create mode 100644 nuclei-templates/cve-less/plugins/protected-posts-logout-button-c17395d57aa530c1ca072f07b2b709c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ps-phpcaptcha-e1c57fbc348dfda4a7e2fa9073819ee6.yaml create mode 100644 nuclei-templates/cve-less/plugins/pt-elementor-addons-lite-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/pt-elementor-addons-lite-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/ptengine-real-time-web-analytics-and-heatmap-a5f0ed212c4766edc5a74c9f3775bc05.yaml create mode 100644 nuclei-templates/cve-less/plugins/ptoffice-sign-ups-061a0160582ddd92c54f532180e67c97.yaml create mode 100644 nuclei-templates/cve-less/plugins/ptypeconverter-bc684639838d61cf579a672d96063b79.yaml create mode 100644 nuclei-templates/cve-less/plugins/publish-confirm-message-6c62a897542f5fcbb95887f636c680c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/publish-post-email-notification-a18a9d03d5ff2c74e7d4dd874ea75ae5.yaml create mode 100644 nuclei-templates/cve-less/plugins/publish-to-schedule-577c8d638d67108f4b264900ccfdf446.yaml create mode 100644 nuclei-templates/cve-less/plugins/publish-to-schedule-fed0833f3ebebd240e7a0f4e9421be22.yaml create mode 100644 nuclei-templates/cve-less/plugins/publisher-media-kit-f9078038dec7d199edb0413f76661495.yaml create mode 100644 nuclei-templates/cve-less/plugins/publishpress-5eb9664c4cfc97621e70ca6044316a22.yaml create mode 100644 nuclei-templates/cve-less/plugins/pubsubhubbub-380fec032d7d63f91e53bba15b6960ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/pubydoc-data-tables-and-charts-04f39942fc16c2a7c2f6145e385c8d07.yaml create mode 100644 nuclei-templates/cve-less/plugins/pure-chat-388546e2e07357a0226d8ddb30b48362.yaml create mode 100644 nuclei-templates/cve-less/plugins/purple-xmls-google-product-feed-for-woocommerce-0c6025826e5726423a84ca94ebcaa441.yaml create mode 100644 nuclei-templates/cve-less/plugins/purple-xmls-google-product-feed-for-woocommerce-4e655e8637363048266492f0b32a6610.yaml create mode 100644 nuclei-templates/cve-less/plugins/push-notification-by-feedify-851c9539a872462d0d73ba1acd344a0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/push-notification-for-post-and-buddypress-de2d50a00641894476c3c991e151cbfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/push-notification-for-wp-by-pushassist-0be29b33ea0746b92d956c4f705ae369.yaml create mode 100644 nuclei-templates/cve-less/plugins/push-notifications-for-wp-1aa0482b62398dab21c7b36e9908a28d.yaml create mode 100644 nuclei-templates/cve-less/plugins/pwa-for-wp-a3f1f9f4718f614e268d95c106a320c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/pwa-for-wp-eb00e90873e8ae18941584253499c1dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/pwa-for-wp-fe4487fc151c051d39c023720ae70292.yaml create mode 100644 nuclei-templates/cve-less/plugins/pwgrandom-fab925188af5751f6804af30f809b504.yaml create mode 100644 nuclei-templates/cve-less/plugins/pz-linkcard-5e2dbe8495edd1ca09ac4612c6d74e51.yaml create mode 100644 nuclei-templates/cve-less/plugins/pz-linkcard-94984c10367f1fcd785a8a0e382575e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/pz-linkcard-a7098d4414a3fb82cc8c3dc220f2fa3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/pz-linkcard-c229c4974b89d25a5147c1603f3793b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/pz-linkcard-d7741f047915382e7e65e25c2ecaf00c.yaml create mode 100644 nuclei-templates/cve-less/plugins/q-and-a-8f0eb841fe57a3d4a24e95c0d9fd6f34.yaml create mode 100644 nuclei-templates/cve-less/plugins/q2w3-inc-manager-f5f5e3a5ee363b242df2c9cf1503d06e.yaml create mode 100644 nuclei-templates/cve-less/plugins/q2w3-post-order-fbe56fde0056bf97342eed3fc2b3be5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/qards-70d2ed5770a2a31bdff6c60df8512383.yaml create mode 100644 nuclei-templates/cve-less/plugins/qards-e6cabe992a07b751187d2c7299c53fb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/qards-free-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/qe-seo-handyman-72e98d054dd35c38c2ccedc1b3e556e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/qe-seo-handyman-9b3e1e16f60897007a08c1914eadf98c.yaml create mode 100644 nuclei-templates/cve-less/plugins/qi-addons-for-elementor-236ec29d3a581237ffdca9038176da82.yaml create mode 100644 nuclei-templates/cve-less/plugins/qi-addons-for-elementor-5f28fbeb41c87c1968016458f52b73af.yaml create mode 100644 nuclei-templates/cve-less/plugins/qi-addons-for-elementor-d88df7a254a138ad74fa62f540e9ec2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/qi-addons-for-elementor-fc19ca606bef9f853ea0565c4043c5ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/qiniu-uploader-de57d40696cbfcd8ffe966c8ed179267.yaml create mode 100644 nuclei-templates/cve-less/plugins/qode-essential-addons-204d25ca766e5be5a84be69d8f92acaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/qode-instagram-widget-24af70f4d05b151741440482fab416b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/qode-twitter-feed-24af70f4d05b151741440482fab416b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/qr-code-composer-d93a6b7f14b256d2a3a93d0625fdf894.yaml create mode 100644 nuclei-templates/cve-less/plugins/qr-code-tag-01bea8ce6854ad71bd30075dcae56490.yaml create mode 100644 nuclei-templates/cve-less/plugins/qr-redirector-c050d4c8a8366a715e53188fca3792c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/qr-redirector-c4d987240409a1f0d12971f957b18465.yaml create mode 100644 nuclei-templates/cve-less/plugins/qt-kentharadio-3a52346bbe93c0a607f0387208360f6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/qtranslate-1a21904a7af165ae2d206e73642b0122.yaml create mode 100644 nuclei-templates/cve-less/plugins/qtranslate-bc3ead94b2639f49d2a3b634baef9593.yaml create mode 100644 nuclei-templates/cve-less/plugins/qtranslate-slug-06390fac0ced660df846425f4aecaf69.yaml create mode 100644 nuclei-templates/cve-less/plugins/qtranslate-slug-d48b1b8c0f8a5de4fba0c27ae075681f.yaml create mode 100644 nuclei-templates/cve-less/plugins/qtranslate-to-wpml-export-200e4897c4af10260a18bb0d58b656f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/qtranslate-to-wpml-export-9583c7a118279761c36edb998dbf641d.yaml create mode 100644 nuclei-templates/cve-less/plugins/qtranslate-x-73d067013f68a47f6173cf4bf4742fbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/qtranslate-x-92923e233ad137b6c565b0d9cb5490bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/quadmenu-3151cdab51ec74016dc2dec07b8a7882.yaml create mode 100644 nuclei-templates/cve-less/plugins/quartz-1f86e582a713c3bd4333747ed30a9d68.yaml create mode 100644 nuclei-templates/cve-less/plugins/quasar-form-88a3fac791c3551827ed85f785e74c8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/qubely-658353ea5a92a1a477d6b2c5047dc091.yaml create mode 100644 nuclei-templates/cve-less/plugins/qubely-6f075010900e43673686fc0d208260ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/qubely-ac09455e90923727a5127092ab5cf052.yaml create mode 100644 nuclei-templates/cve-less/plugins/qubely-fea58c2fffc9b2ea6b58c47efd69a713.yaml create mode 100644 nuclei-templates/cve-less/plugins/qubotchat-1b8adc4375e4968834c6e9a5908156bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/qubotchat-f3d365dcf43ab1e2b6ca241869ef39d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/query-wrangler-67a6c3615087f3f1fcb723b7f2d140b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/querywall-9ee0bf881f08cd3cb60239af7879852d.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-adsense-910562f88b7ea3f43ef082aba4fd2945.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-affiliate-store-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-call-button-5e36e98c6255c04628e65e3d6f66d61f.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-chat-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-chat-8cc73df94f56aa782250ddecf7e67823.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-chat-abc60569ec003973ef7bd7139d6a27ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-contact-form-62b74eeb9a66bc4a3cf51fa299ef8a9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-contact-form-b466bd977f9394a49d2724fac1d5dea0.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-contact-form-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-contact-form-ce6b524d26d0001f570c1800dff1d295.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-contact-form-f442fd7af4f1450884ccd37204471581.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-edit-template-link-4d297c80a42418395b04392e5878bdbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-event-manager-54c83422727dbe8ec911e59f2a60998f.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-event-manager-62435dbb476a65fcd06c2741817e8fae.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-event-manager-8d27ee0724391ce9a1b74bd9a604ecbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-event-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-event-manager-cb184c0a5bf632bde9de97505ce638ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-event-manager-d0fba4b305c548a881378b07e2028d26.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-featured-images-5decd5b15e9e99b50c1cb7b49d2f0314.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-interest-slider-38cb5c8ab728ac8718e42eee958aba2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-interest-slider-c0866523c68fe7ee32f439546ea1ce87.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-orders-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-2b5c6ad57482cc18f3496406a2a98d3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-5475b95f6d45498a4d0880aced5c1162.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-9f2f326dd2b99a9ab7152b99b148e34c.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-paypal-payments-ac00155c6073a79243073e436990a17b.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-paypal-payments-ae8fa78ab666a9d6da1d3e3cf8461322.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-paypal-payments-b05b3a24d162881cbb5011a114d7958e.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-paypal-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-paypal-payments-be3c32e9604f247b7cd8b895cd2961c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-paypal-payments-c39c9d651b411fa109fee2b8c3a1d9b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-paypal-payments-e5b4920cbbb8f5f8f7e1a259b30101c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-post-widget-ab4d33853504febd7c01f9cee8c9c3d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-restaurant-menu-380da9e03ed91b4a26ee23da1fdb68e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-restaurant-menu-608358cb0a02728075caac1560a96687.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-restaurant-menu-afdcbe4c6f5ebc0939cff7424649942e.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-restaurant-menu-be53691c287fd0615412e7fc76d56676.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-restaurant-menu-f4c35f9c74d06655cf517936ec3bc387.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-restaurant-reservations-471137e11c9f1e10b7cb270b58e41353.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-restaurant-reservations-bcb8383c6f8589761d6cb6fb2a6e00e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-subscribe-acd84f5e4cde82a402d1c05f1e4adf06.yaml create mode 100644 nuclei-templates/cve-less/plugins/quick-view-and-buy-now-for-woocommerce-66d0aaa8dc75cc7c0b323f4705b3d63d.yaml create mode 100644 nuclei-templates/cve-less/plugins/quicksand-jquery-post-filter-2088a48130abc94abb1d3c3504ebe491.yaml create mode 100644 nuclei-templates/cve-less/plugins/quicksand-jquery-post-filter-bf3863997447d609f7f8dc8d30e7d4d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/quickswish-16e0560ff9c94eb90a6a00b414476508.yaml create mode 100644 nuclei-templates/cve-less/plugins/quillforms-b2aa6adf9a3ecfeb3a1e73b7feaface1.yaml create mode 100644 nuclei-templates/cve-less/plugins/quillforms-e52f401dadeba42db0e156f089227a37.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-expert-389af6c33829297aca423fb16f20d755.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-35ccb571fab7efd2bc565db8cbe0afc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-64b00495d7288bbf7260545472f9a87a.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-8a965e61f7a81d40e758e9b24cfff6a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-933559cdad5a8cb46fa09f456890e810.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-a72cf1044ce793e721c265e19c02178a.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-bd82d97465f017d9a9f8d8b408f50f76.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-dd16f95f6d8f39d62500d48f9193456c.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-ddce93e1ec5dbf71b7783f859c8be22b.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-maker-e8c4ecddb52fde1de74da4b2c7a57560.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-070ef3fbf8c5c19235dc610987639500.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-0ab1239b54a9d197b2df31bb69f5b07b.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-1bd2c64c3515a166f1356799c13010c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-1cb4591e0480a2550d32c48672d101ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-1f3365288c8ad41d2a38dadca302de5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-20fec9c706022c27227f812437225b4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-3b324ee7499600905ccc907887c4cb07.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-4023135654a032018b1b7ca568ed38d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-4221c767cd86a7aece637717d70dec97.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-5c16a4a40c0341b380c1079e60c3c420.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-63d1e14f304a4cf01bbcbf655abc19a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-658febabd8f8ee9b00c71e69efcbac2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-6943a5c5894e8c0c6d2e210f5f6691a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-6a6885b887da3fa682a8e96453ce2b11.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-75f2f8257d6545a80c97f57f791fb7a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-899f848126483b240dc44a4870e7bfef.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-91489b941b180b4987354a4aee0df6e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-92d3a763fd6bf9ed5605e7e613d361f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-9fbb2aba0f1c281c62bcad50b683f582.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-a50b1df259c1e694ecfebb517ea01b13.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-acd3eef162930a0876122d4b56734acd.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-b13bd75954a4a1908d54b2904726ac6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-be8ed34a1e61e6308ab867606f425e64.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-bf605754a0547b06a6170015aaa9595a.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-cbf15a410baf5df5c6e73ec81eccde3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-ce3f05ae5116fef07efba37ae58297b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-ce53aada13325acb27d477b230e028dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-d01c7b873aec80a58b54be7a8d535664.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-d42a5f37bc2973237f5bd33bf937988e.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-d44f53d903df9cab8928396a4ae4768d.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-d5c9a981371783e864a000bed9ff14a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-d78c11170c73128e3967572f8231c5a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-d813a33aa115d1d1e87017777577752a.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-e1a43bd038bea91c9d042110dd2e93ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-eacb603a076c52a6fb91269497cf41a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-ebcb1014c323d7367182014f59409f1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-ecadda5bda84d8a0b69e1131abec5fcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-f2fa5aa94720ea308820bf6a59c12304.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-f7f576e6c366fb73cfae249a8888bb15.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-fa56dcf05a0758bb5d6c8d1d87961bf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-fc2afeaf55a2da67ef007ba91890a8f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-master-next-fddce4b8eb2e7caabf78ce5b75bb4ed4.yaml create mode 100644 nuclei-templates/cve-less/plugins/quiz-tool-lite-8979f6505c90c68150042fb786bf639e.yaml create mode 100644 nuclei-templates/cve-less/plugins/quizlord-05b1f0bb86ade4c6c32252e799c74986.yaml create mode 100644 nuclei-templates/cve-less/plugins/quizlord-aa821804338bfa52c597bf95613d3cbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/quote-o-matic-6435ac4f9788a7cece5b6014e8487e16.yaml create mode 100644 nuclei-templates/cve-less/plugins/quotes-and-tips-105cf32b00a014867c600a479b6d44a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/quotes-and-tips-f790a2eb76a9891e0156538f1e3bc9cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/quotes-collection-498d9280bb627df5ee0fc3435bab6bb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/quotes-collection-62f03cd88708d633c3bea1020189b887.yaml create mode 100644 nuclei-templates/cve-less/plugins/quotes-for-woocommerce-24df3873e0b9065e19944f2b69074a09.yaml create mode 100644 nuclei-templates/cve-less/plugins/quotes-for-woocommerce-3948e5dd3b8cda882c6a23ce86fccec7.yaml create mode 100644 nuclei-templates/cve-less/plugins/quotes-llama-88df46a6830158391aaf7619c151706b.yaml create mode 100644 nuclei-templates/cve-less/plugins/quttera-web-malware-scanner-63e5f2960a8b5c3108f981b93e6323c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/quttera-web-malware-scanner-f4e8b028120d672af95b84876878fcae.yaml create mode 100644 nuclei-templates/cve-less/plugins/qwiz-online-quizzes-and-flashcards-1ee20142f7aad0f4393d7540b9bd0fb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/qwiz-online-quizzes-and-flashcards-28d16d6b1cef547447e4d705dcc2a1cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/qyrr-code-1954398156051d3ad0f2e33b45b08e3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/qyrr-code-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/rabbit-loader-9593057fd73362b3675fc833e6f4bac6.yaml create mode 100644 nuclei-templates/cve-less/plugins/racar-clear-cart-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-buttons-for-taxonomies-5f709cb3f787aa3d6fe0c1b9fbcebecf.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-forge-5344d2a9421d4134e013b9ef9543b210.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-player-0f0d0d2c6b89a442a33118c19c04ca9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-player-74ed56a742e6bfe4ae7f688057f0e58c.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-player-ced2048e66568ff23a7c9306db5ed20b.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-player-fa19810ebcf6bda0fe16609b0188a9da.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-station-7d1f832265699144424e86f453859317.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-station-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/radio-station-f928630a44e376a8556ef8a85dd515fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/radykal-fancy-gallery-49732b61e5fbbf5b8a051a31af421fcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/rafflepress-0d992e0c4b2262e08e00bc7728421227.yaml create mode 100644 nuclei-templates/cve-less/plugins/rafflepress-0df72c1ea599347d49ac94e58a15317d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rafflepress-1a4de07092fc301c92fce8ed74ad446d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rafflepress-f756689d49883a94fc2d2b5fe92fc364.yaml create mode 100644 nuclei-templates/cve-less/plugins/random-banner-6cbcd9de8a0bffdfb0e1ab93c491bf62.yaml create mode 100644 nuclei-templates/cve-less/plugins/random-banner-c1af03a9bc6d8f06f284071a1218ac5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/random-image-gallery-with-pretty-photo-zoom-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/random-sorting-order-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/randomize-2c6114a75a15d3b058a7dc1004291c25.yaml create mode 100644 nuclei-templates/cve-less/plugins/randomtext-1fdf26dc57df471e3029b947067853d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/rankbear-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/rapidexpcart-8ca33f13028f0931d0d1467c7211048d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rapidexpcart-956705464f8d3e3f33f8d0fbd34de8bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/rara-one-click-demo-import-7625842be5b20a912d85c30fab35389d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rate-my-post-0a011d3a5ee0fe8850f5ad8de7716ef3.yaml create mode 100644 nuclei-templates/cve-less/plugins/rate-my-post-785e036f5ce45cab570c638ad313ef67.yaml create mode 100644 nuclei-templates/cve-less/plugins/rate-my-post-980522b8038ad0463392a24edde56a31.yaml create mode 100644 nuclei-templates/cve-less/plugins/rate-my-post-bc63c69c92e0f2828459114bbefab4b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/rate-my-post-c9a71c8c5b02e60eb52f4d4cd3d0c571.yaml create mode 100644 nuclei-templates/cve-less/plugins/rate-my-post-cd934d4abb39f62a28c7ae7b5501f68f.yaml create mode 100644 nuclei-templates/cve-less/plugins/rate-star-review-b6d9dd2af7efaf91b36ca5f14358b6f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/rating-bws-64aea5cedd920a29c29c6656f64c0089.yaml create mode 100644 nuclei-templates/cve-less/plugins/rating-bws-ac572eddea26c37b87d8b8b50f635cf6.yaml create mode 100644 nuclei-templates/cve-less/plugins/rating-widget-37317046e94cf4102e2b78af213fc732.yaml create mode 100644 nuclei-templates/cve-less/plugins/rating-widget-4f6bcd63e0061408e2503cd933be694d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rating-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ravpage-fbf39c35d747104c4d4297ab90803845.yaml create mode 100644 nuclei-templates/cve-less/plugins/raygun4wp-36b86201be553488a21224994bdfe4a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/raygun4wp-942951937c68cc5db7a5bc776617ab05.yaml create mode 100644 nuclei-templates/cve-less/plugins/rays-grid-5c28550696f855f4c3c836e5bcf2c491.yaml create mode 100644 nuclei-templates/cve-less/plugins/rb-internal-links-1b62450f818e2ba095ee733915545ce8.yaml create mode 100644 nuclei-templates/cve-less/plugins/rbxgallery-404f62898fe72968016d5c9a6f1d92d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/rd-wc-order-modifier-3cba8118600a736749afebf101985b5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rduplicator-bd5ef70cad456cfb810c3a196f6a2a81.yaml create mode 100644 nuclei-templates/cve-less/plugins/re-attacher-c4ba01e059d197a2a3abc453d782dcf8.yaml create mode 100644 nuclei-templates/cve-less/plugins/reach-us-contact-form-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/react-webcam-ecc9ca2eedeba9a7eb9cef5703953450.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-and-understood-913904da9b37e5de5dab8db2c48cdd1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-and-understood-9859097987f0e7ca79e11ace81cfa3fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-and-understood-b32bcea1f07567d61bc53250e86795f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-more-353927ae64af5c6eafc196b5f94afe9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-more-excerpt-link-8911ed0627c35d1ed98759cc71c063ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-more-excerpt-link-fb56c017c2ceb4ddc8f04cf045c71346.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-more-without-refresh-66aaa6f41f27e2a7e948bc3c3424d334.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-offline-49f7af60a7d6ca8e6785ad7873768f2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/read-offline-c19240e29be09298009c0e0215eb1f86.yaml create mode 100644 nuclei-templates/cve-less/plugins/ready-ecommerce-11774eca9d7255cbce54b4f5c2cb1270.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-cookie-banner-c03c24ae2b0b619cef671f24ff29a655.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-cookie-banner-cb472ca260be89964a7f7e562d3b7648.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-cookie-banner-cd3b33eab1e4a7c6dd00ae8ecc737be3.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-estate-listing-realtyna-wpl-df196e267631abea140e582e96b3b0e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-estate-listing-realtyna-wpl-edeebbc602448470d251a6422f124213.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-estate-manager-715775220a5d0726abf3cb0c44398e2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-estate-manager-ce5b36195b53746aaff59fc078e530e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-estate-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-kit-ba00ab2a2755c54cd7d0683aa28f5913.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-media-library-lite-2a7a5a205e77ded07268b829f167efa8.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-media-library-lite-426ec193e6b1f2e068f34932123c6dcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-media-library-lite-458c0d6ab63df27e3e21cbe7fc77cfd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-media-library-lite-d45b3048f23bdc5676881ea128b4fe4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-time-auto-find-and-replace-6a587e71ee083048d4679f04ad4755b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-time-auto-find-and-replace-eab47af35bd14f792c9512e4731e4999.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-time-find-and-replace-8704c0e0a0b31ff063e1784b2389347e.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-time-find-and-replace-8de354ee8a09f1e40abb305d774cf1ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/real-wysiwyg-1b2227bfbc114c60a1d636953ef21b96.yaml create mode 100644 nuclei-templates/cve-less/plugins/real3d-flipbook-079ec9a97d66af6e700f5d8e97855854.yaml create mode 100644 nuclei-templates/cve-less/plugins/real3d-flipbook-2c4b560690d4d3a59e350708726945d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/real3d-flipbook-40245b305fdf9a44e43f9056d7f5ec77.yaml create mode 100644 nuclei-templates/cve-less/plugins/real3d-flipbook-95ba3629393e6ed9cf82cdffe1354c3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/real3d-flipbook-a9204f8c11120cb2c33b3f2dfe972d8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/real3d-flipbook-ec9bb451b23b2be1cff3727d057731cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/real3d-flipbook-lite-8ed0dc233dd88ec7cbdf934305689592.yaml create mode 100644 nuclei-templates/cve-less/plugins/realbig-media-d27f815adbf875ce27b19fc701a2c8d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/realestate-7-f30e0a2c040dabe8e3f5e523525b42cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/realia-797afe8d10d441ac220fabb0d1962367.yaml create mode 100644 nuclei-templates/cve-less/plugins/realia-be08bf68983d62c13cc53ac7ac785641.yaml create mode 100644 nuclei-templates/cve-less/plugins/realia-ddde16de87a667ba158100a63c4bffd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/really-simple-facebook-twitter-share-buttons-37e5e3d24dd11a2139d9abb17ffd385f.yaml create mode 100644 nuclei-templates/cve-less/plugins/really-simple-featured-video-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/really-simple-google-tag-manager-814d6c2e2d8cde0de9aa6bd07e3615ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/really-simple-guest-post-6d6c428d36c4156820a311ffe1d5b698.yaml create mode 100644 nuclei-templates/cve-less/plugins/really-simple-ssl-a2af19cf083e10d02f6ef64bbfb896ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/realty-59680ca703e54b65bb1444ccb4c65653.yaml create mode 100644 nuclei-templates/cve-less/plugins/realty-workstation-3eb72b31a7a3f042d44188428aa0f9df.yaml create mode 100644 nuclei-templates/cve-less/plugins/reamaze-8a160378fcef72b726e178d76f962841.yaml create mode 100644 nuclei-templates/cve-less/plugins/rearrange-woocommerce-products-b1810213664dbc480df9bda4d5950322.yaml create mode 100644 nuclei-templates/cve-less/plugins/recall-products-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/recall-products-f904152cc56225725583f8016fc8d925.yaml create mode 100644 nuclei-templates/cve-less/plugins/recaptcha-for-all-13830cbd72a32fb533758edb07ec60b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/recencio-book-reviews-7675af1bd6eb113efdfef786b75aea68.yaml create mode 100644 nuclei-templates/cve-less/plugins/recent-backups-99c982940e78c45e6e770604c5c36b5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/recent-posts-slider-4cc443b42c40fb382275f264fe03f5d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/recent-posts-slider-e355011ae0213a93a83d03d9e7e91d4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/recent-posts-widget-extended-77dbf9da4687af62eb092f0a4f8fc78c.yaml create mode 100644 nuclei-templates/cve-less/plugins/recently-623ee8a736cc9ca7598f1fcb6de572f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/recently-8309716d7ccc4397ca213e945a98f0a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/recently-viewed-and-most-viewed-products-3efeefb310fc267db6d3c82c2278b44a.yaml create mode 100644 nuclei-templates/cve-less/plugins/recently-viewed-products-270d399794c014b613fbaaf0f85e4480.yaml create mode 100644 nuclei-templates/cve-less/plugins/recipe-card-blocks-by-wpzoom-6fb42790ec406c67546f572fbaa70d56.yaml create mode 100644 nuclei-templates/cve-less/plugins/recipe-card-blocks-by-wpzoom-9e09c516a2b7ded06b65b8f77bf8db84.yaml create mode 100644 nuclei-templates/cve-less/plugins/recipes-writer-f1d9f474bbf4576d12894725bd74f389.yaml create mode 100644 nuclei-templates/cve-less/plugins/reciply-2c837883e1f56cbaae8104fe350db484.yaml create mode 100644 nuclei-templates/cve-less/plugins/recommend-a-friend-acf04354988365754f4760bff4f381fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/recommended-products-edd-2d450de1fce5683a098921397bf9fd03.yaml create mode 100644 nuclei-templates/cve-less/plugins/recurwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/redi-restaurant-reservation-0efa8cbd8c22916066d2b5e7e99436b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/redi-restaurant-reservation-1c7545a8e1d8674632497b398a1210a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/redi-restaurant-reservation-1c7d356f69acd16bb266c8cb14441fbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/redi-restaurant-reservation-3b4de27e05fc461ccdbc713207442ee6.yaml create mode 100644 nuclei-templates/cve-less/plugins/redi-restaurant-reservation-804968d490234b5a152e19bbec2ea599.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-404-error-page-to-homepage-or-custom-page-20764e34dd96746ac27cacdf816c512f.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-404-error-page-to-homepage-or-custom-page-9e45d93bc20aa1ba4a07ca72cfe37e3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-404-to-parent-bc6654f724ab34dab168398ec4971081.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-after-login-47522a4a3dc3a65ace6791fdc8ad2676.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-by-cookie-4b2ca7d4c265994cb8dc0a8ab8e5c412.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-00ed26bc99082a5e2bf7869b142812b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-08ab49e654c5fb6f0db2079823b53c43.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-1217e0d32488feda5672b5f2f6f6be10.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-28a102683d2de6c72760dd7d0e2159c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-3d292d211ef84b695362922dc8bdf57d.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-5f79866291aaa54e9869bd9b8bbe5231.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-60528de5f76e38fabee103931a1b735a.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-6321b133726d239355f81b9be99d916b.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-830a9c71ac432305903c3e193057a4cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-8392879a309371134897c994ca4719c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-8f253566c415a0f14e8b52adda279855.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-97d82c7c3e0d924cc99e2436cf7939dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-a25c46576285e4b046d7eb2e59073172.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-a8b98bbbec0875de2bde4d3647cd15e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-aa77b46ba67be3115863377f556c5a4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-b50c18f00398146fa63407abab98b643.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-b61ef24ab5fc8a9d1e6c1708a630e28a.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-cccbe637c2ca5b40eb7fbe65c1b79317.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-cd01191c441182857b674a67ee885426.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-d5ca64507af2d41a9a4ef9ba365317c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-d6be25b195f3dbb670fc00d8e81691ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-d9b1627f6db7a7b3f667f9603a20aaf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-e6c58ad2d5bc21fe6d61a4ea411b1552.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-ea95cfe33e5fa5b39484db3e52e2b47c.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-f87ba6cab449c45a93f64218906b54cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-fc35edd680a0ec79497d3d82a4143e86.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirect-redirection-fdcd8dc7df27cc5b5172ef52e914706c.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirection-660c79b80e87c9453730e77d4013c8f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirection-85fb58f3784e72234e673d2c8f294c3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirection-a476ca04014656ec0e898375af56f461.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirection-c050cce5edc786cc76c2f3dcee80f148.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirection-cb361e2e4a8f09fdba16ef55d82e4742.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirection-page-8319ea5020d449067d1800ef0c846413.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirects-05abcb4b1243c795ddc0ecd996fc16e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/redirects-b6235d62fa0b8b99245758e77840a37a.yaml create mode 100644 nuclei-templates/cve-less/plugins/redux-framework-97e559b0ee0d8f7ed9a23afb1d3a5dfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/redux-framework-a1baf40622208b1f64155c8e91066f50.yaml create mode 100644 nuclei-templates/cve-less/plugins/redux-framework-d3c0e78a7ab3eab8df864917b272700d.yaml create mode 100644 nuclei-templates/cve-less/plugins/redux-framework-fd34b68ddff550331d533d0325717761.yaml create mode 100644 nuclei-templates/cve-less/plugins/refer-a-friend-widget-for-wp-80e870552d1f61c00ccba36553924e99.yaml create mode 100644 nuclei-templates/cve-less/plugins/referrer-detector-7360b269548987558385c14071463af9.yaml create mode 100644 nuclei-templates/cve-less/plugins/reflex-gallery-0b9a8fd5b9580f066dc53b6f1500e016.yaml create mode 100644 nuclei-templates/cve-less/plugins/reflex-gallery-2a835a9354c731a6c02faf265cb4e924.yaml create mode 100644 nuclei-templates/cve-less/plugins/reflex-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/reflex-gallery-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml create mode 100644 nuclei-templates/cve-less/plugins/regenerate-post-permalinks-41b1f3d72a4299f7246fbd213ebf002e.yaml create mode 100644 nuclei-templates/cve-less/plugins/register-ip-multisite-98561600a0a03a1e4059046cfde3ef9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/register-plus-b96c1d6a7bd0352b636fe37d13da471d.yaml create mode 100644 nuclei-templates/cve-less/plugins/register-plus-d04743501a9b489b050663d074da392e.yaml create mode 100644 nuclei-templates/cve-less/plugins/register-plus-redux-f168af3ebc1cfea437c8aae66664ebce.yaml create mode 100644 nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-6258eabd3d155e4cfa6307428f5a26a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-ea140c5960098a8a84aefd6da22f5e70.yaml create mode 100644 nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-f0fbd94801917d7779c8532e6d8fde24.yaml create mode 100644 nuclei-templates/cve-less/plugins/regpack-6c7076324759f17d9672657f46020f5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/rehub-framework-5f2b7d6e36647de882c9475f5d8d8b2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-post-a1b975d388fb5bea73a488037353b7d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-04095bed8429464e27d2a70bb8ef316a.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-8bd8a9f5ca37f9921800c559c58dbf6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-by-zemanta-58ad613c40728469546ff0c459432f85.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-for-wp-09949db09aaf30fc4de378c2b0344be7.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-for-wp-34814d2dfa1715ce58f0048a1692ce5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-for-wp-38bcc8fc23f5e64dd2298c12f27f47b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-for-wp-3d9e0203f0bc8c54067f868dba02e8ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-for-wp-83b73a058cb79d602447680b268132d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-posts-for-wp-f1c3515bad659cca0bfecb6aedd6af21.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-sites-089422f3c866882a628baf83e48ef51c.yaml create mode 100644 nuclei-templates/cve-less/plugins/related-youtube-videos-d32864ffc345a5bdea6ab7e2b3b9981b.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-13c50b13a503600e0189283b0a2ceddd.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-2c5ab69854e1511d339bef7563a27b08.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-2df9887091a9e43477c93a8f95a59867.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-459e9e8ff0ce6dbbd756036aacf40336.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-54a6c2fc6f1decd20e0ec9cd229454ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-88fcfbe0235fbfcf5894d075044bc4db.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-9456cea40ce6ea28f05bb2ff20b05594.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-984a23521e50b74e0baafc6841353e19.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-acdf52a1422628d1552415a9b0199eee.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-b595d6fc7446c3f09ff44c55f79ffecc.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-d45998919544e36fcefce47f272dd36e.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-premium-2c5ab69854e1511d339bef7563a27b08.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-premium-3770a5a68072ae899f0f18af895e3c7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-premium-54a6c2fc6f1decd20e0ec9cd229454ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-premium-9456cea40ce6ea28f05bb2ff20b05594.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-premium-98c7cb2a9ca321e390f21a13c7f9a775.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-premium-b595d6fc7446c3f09ff44c55f79ffecc.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevanssi-premium-d45998919544e36fcefce47f272dd36e.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevant-b86717449a9c418a47f519067cc5b57f.yaml create mode 100644 nuclei-templates/cve-less/plugins/relevant-c81d2be092773595df7e11c3e43455e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/relocate-upload-f2e5b32595ebb4e1010770520fb235a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/remote-content-shortcode-894688b32a41816c9ef521e84f097274.yaml create mode 100644 nuclei-templates/cve-less/plugins/remote-upload-fc6507793e849585ffa987ba2f9e1c71.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-add-to-cart-woocommerce-7470db0dc31ae4a970e3b604671601cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-add-to-cart-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-cpt-base-47c8baaa723b461feba125f5d75cdf5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-duplicate-posts-f208b8c044d71b8d44e9868aaf03997a.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-footer-credit-012dc707b39ddca593987305dcc50476.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-footer-credit-028fc092b08e0b0008553cd7b4eaeaf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-footer-credit-3996e754fae7512574e32b3cc63b1ef7.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-old-slugspermalinks-ad02b35bda70a416277656d231f43211.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-schema-d7e271a4d692214ae3d3d23271160c51.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-slug-from-custom-post-type-a6300420b047adf0811f5afe66cadf12.yaml create mode 100644 nuclei-templates/cve-less/plugins/remove-wp-update-nags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/removehide-author-date-category-like-entry-meta-3511a1c14fe55ddf7548121635409a76.yaml create mode 100644 nuclei-templates/cve-less/plugins/rename-media-files-024b2767e265d1c0c5a095406c0967d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/rename-wp-login-0c74520a6b922c051dd2e71bd71dde2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-112337a2e4900da8476bf23196ef2b93.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-219b72efe5cc6f0e217f743d6fbc88d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-2f8f397bcad4eb939787697b135e157a.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-3a45dc282f560e731773a059f5e7ca5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-5164636d32af20648741053f5b9caab7.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-5c0349ca079e747f13053866a0f9f7b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-71100afca944fcdf5852ccd8d5a09657.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-7116f21024cd4d3ec70934c93595bec9.yaml create mode 100644 nuclei-templates/cve-less/plugins/rencontre-eb6a95dc8c6a4d6036eb6038576d5022.yaml create mode 100644 nuclei-templates/cve-less/plugins/rentpress-4981ace1c6912438e6aebe6db5797df1.yaml create mode 100644 nuclei-templates/cve-less/plugins/replace-word-3a5045c6057ba75552aa877da967cc1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/republish-old-posts-d08d72d9d704360392caeeb3caa1999d.yaml create mode 100644 nuclei-templates/cve-less/plugins/request-a-quote-9285c0881d2d0d11de4e3b3a24768c84.yaml create mode 100644 nuclei-templates/cve-less/plugins/request-a-quote-bd1e1a72d84e778ed0728f8ce93d9820.yaml create mode 100644 nuclei-templates/cve-less/plugins/request-a-quote-d660fb4211ca4d5aa389748791b62abb.yaml create mode 100644 nuclei-templates/cve-less/plugins/request-a-quote-e78bafbef882a9c48928d514c06bbb3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/request-a-quote-f9f6ff6ab82acd24abf9e4da4d050784.yaml create mode 100644 nuclei-templates/cve-less/plugins/require-taxonomy-image-category-tag-0d603e3edf902251fc832f3e8e30e339.yaml create mode 100644 nuclei-templates/cve-less/plugins/required-taxonomies-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/resads-33b6f66391ce62eb7e838b36fc2b4558.yaml create mode 100644 nuclei-templates/cve-less/plugins/rescue-shortcodes-dd783793d1579786f0da18d50db26b6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/resend-welcome-email-9ad1bb5942489f3a5ae6b0ae145bf51a.yaml create mode 100644 nuclei-templates/cve-less/plugins/resermy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/reservation-studio-widget-33be367e25256f8164e300b3a7daf9ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/reservation-studio-widget-f157822d9e859b87e8f345e48a1d0719.yaml create mode 100644 nuclei-templates/cve-less/plugins/reset-course-progress-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/resim-ara-9bd64c494589e276c977a9c82f664000.yaml create mode 100644 nuclei-templates/cve-less/plugins/resize-at-upload-plus-a6af184da39fc0e8d8ed033eba477325.yaml create mode 100644 nuclei-templates/cve-less/plugins/resize-image-after-upload-7d8fc6eda80cc32678a794e07adb8263.yaml create mode 100644 nuclei-templates/cve-less/plugins/resmushit-image-optimizer-0292116775ef708600542a7e8f86fd65.yaml create mode 100644 nuclei-templates/cve-less/plugins/resmushit-image-optimizer-69e740cf6c8c1abbdc55bae92d3a061a.yaml create mode 100644 nuclei-templates/cve-less/plugins/resmushit-image-optimizer-e43bc5511341599f04f729dc760bab86.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-add-ons-324f681dcc32f9cad80599a822ed178a.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-add-ons-c4bc19656917f2d34b4812810b207db1.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-add-ons-e6d62601d9fb0272cdf0ccd211481dcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-category-slider-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-column-widgets-21056c551dd1aeb9a76645f88361467f.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-column-widgets-28559d7c492fb8129804be5b16de6e2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-0362bdcef3a6a0f78140270dfd8f3247.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-5f71a5cbd6bba8194eb0fd13e3daceef.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-d0a9eb1395b2d7adc32f3db9fd1a5b08.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-2fca652bdc1152658ff99e932f826e15.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-3e7642452405a4b08d52483d238d4dd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-3f9a61f980dbe211de3420fd4e108af4.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-6e94975f5a72379b4c113015c234f26e.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-90c5798f111069225c0a9b9bba314556.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-9a185bb7031cc9ee6aedfd50f633a1fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-aeeb6c4c51959fc6de4f70bfbf031f53.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-c26b1839d934a6c01fe10cd6a0d67c39.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-c4c0b94844e7f594c58f973ae84c6505.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-coming-soon-page-ff98de6f26943739c7dc560ade3e2c7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-cookie-consent-d2ced4606aa87805c35fba9cf8d5be3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-css-editor-f2d03c372af597128c556a16b6de11cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-facebook-and-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-filterable-portfolio-0f725a315fbc29f28fcbc561372c708a.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-gallery-grid-41e0b9bc5daa86f41c29f0c4deb81563.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-gallery-grid-460458a06d8d211770e9a31930d7029e.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-gallery-grid-a609881cbf31d06f5f3320cc98e71e76.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-header-image-slider-2196f2a72b0d78d150ae68d55da0fd92.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-00eeb6c21c5d722501b60770e277f490.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-850e736734b165b9f53f31b41b925633.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-950a4b8c92825a575ac3cedca47edcba.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-beb8d0299f9b57d02b746cf7959b845d.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-lightbox-12fb9fdf8190804b70dbaba2fb2c9085.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-lightbox-7b55e5afda1f744808ef7891452f6863.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-lightbox-a59e139d7834d1f343a41f6f77f479a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-lightbox-d3aee972ef803bd73b594546fe5f08d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-lightbox2-85a882f3a47555e7fcebe3d512a6eae9.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-lightbox2-87b6d9e5131d99ef758c739f3a95c342.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-logo-slideshow-8d120ab408475ea52678a65c5972ac37.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-menu-05079d9697e3f59f6cb3b3fffd76d6cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-menu-35d0076e41c66587aa55b1dff00355a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-menu-6e39ce305d8fc46246730df95c49bc5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-menu-7361a0798b6e7d91e3483a810ae46200.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-menu-dfaadc66129d4ea285875cfb5037ccde.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-poll-7eb5e40a54b7b7c228b5d29ef47daaf0.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-slick-slider-62cee29d32c85b3a5dc1219c65c05aa1.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-tabs-1ad6aee2c1707dc46ec5695ab78feced.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-tabs-36493737cc718a786fc3dabd10944cc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-tabs-7cfb9c8a38b02b5d1f8df2ea212c2f3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-tabs-dd8a374519ab8fd8464df00ba9945d8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-tabs-for-wpbakery-daa26206b4813de7be1eac00b5b9eaa0.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsive-vector-maps-5fdd374f315987970f85f0248f2dd57a.yaml create mode 100644 nuclei-templates/cve-less/plugins/responsivevoice-text-to-speech-7dc366f5379f56890e8af348e04eb10f.yaml create mode 100644 nuclei-templates/cve-less/plugins/rest-api-to-miniprogram-f45bff66b36c1cb9f233929a488ca421.yaml create mode 100644 nuclei-templates/cve-less/plugins/rest-routes-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-86b13954ec743e9dcd370ce47777c030.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-a27c4dd18076acddac4a93fd8d6716aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-b6712bac11e9ddea585e5254f026c8f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-pickup-delivery-dine-in-fe4c4bb2122cdad1871934e83ec97820.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-reservations-2357694d03c405e4b8e1df1be34f5e9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-reservations-2e12923b4994409fb95da9b1bf700385.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-reservations-381a1cb122afb3c93e4a0ba82f88d009.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-reservations-cb138827efa994e4ab1f824349c2d29b.yaml create mode 100644 nuclei-templates/cve-less/plugins/restaurant-solutions-checklist-49049729ee40c19e1754ddd17e7749a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-categories-29ad4ef137c9211b84960b488500f18e.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-content-69f3351aa6a5162d89a81a8e42b30fee.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-content-b9186cec24d42bc1865829817db744a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-content-bf0fefcefc90da6dc2662202215f7095.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-content-c6aeb8f23d8123cc999647a0e011d5c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-user-access-1003a4422a3ca5fc014222d5d79884b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-user-access-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-user-access-c66270d1aaf4c8bec88be3444d5d8440.yaml create mode 100644 nuclei-templates/cve-less/plugins/restrict-usernames-emails-characters-00fcc0e6d0a51f0c0f6ca9266dccfbaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/restricted-content-277d2735251bde1d7660b619defc33af.yaml create mode 100644 nuclei-templates/cve-less/plugins/restricted-content-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/restricted-site-access-0046efcaf372ceea3cbda093fc9866d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/restricted-site-access-1951707b594e6f4a4e8e4243b43c9841.yaml create mode 100644 nuclei-templates/cve-less/plugins/restricted-site-access-bd26ccd939104e13f73f569b312459d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/restricted-site-access-efb14ebe0992b6c3f6efdf7585df67a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/restropress-7045891b02879797f89361d3201b5ab1.yaml create mode 100644 nuclei-templates/cve-less/plugins/restropress-915182a6d2a256cbd187d2f4b8b4f74c.yaml create mode 100644 nuclei-templates/cve-less/plugins/restropress-a008c3a52fa94300e9ec331bd11a1546.yaml create mode 100644 nuclei-templates/cve-less/plugins/resume-builder-3cd33ca20c9c9eda3e3eb14910cde0f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/resume-submissions-job-postings-5de4daf9f0d92df126da3ff853382c5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/resume-submissions-job-postings-91bd3f9499da9e21fc35c9c04bbb9fa2.yaml create mode 100644 nuclei-templates/cve-less/plugins/resume-upload-form-a0e2c0524dc803cf1690a2292b288992.yaml create mode 100644 nuclei-templates/cve-less/plugins/resume-upload-form-accdbc7387e8cd352346b508525444ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/retain-3c6cc9490d009d5c5e5a38130b58bb8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/retro-winamp-block-bc55ea7b509124d1a77831d4400c5030.yaml create mode 100644 nuclei-templates/cve-less/plugins/retro-winamp-block-c3dca1d1ef3a946c9ddf3e33caa00021.yaml create mode 100644 nuclei-templates/cve-less/plugins/retro-winamp-block-f9078038dec7d199edb0413f76661495.yaml create mode 100644 nuclei-templates/cve-less/plugins/reusable-blocks-extended-ebc582d4f12fc14b9a1428f77cdbf053.yaml create mode 100644 nuclei-templates/cve-less/plugins/reusable-text-blocks-ccb9140dfd14809f1b9eb83224f5c145.yaml create mode 100644 nuclei-templates/cve-less/plugins/revampcrm-woocommerce-91eeb175efe504db40acff5c5fa662ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-buddypress-groups-b51b043ae0bd51e5c02a86aef7693c29.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-buddypress-groups-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-buddypress-groups-df796716cdd12b786f639a85872402ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-engine-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-engine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-schema-6a28dfe4469613c00410a3afcd856457.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-stream-f9cb3c789647691d2de33bca14ad9edd.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-airbnb-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-amazon-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-arukereso-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-booking-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-capterra-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-foursquare-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-hotels-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-opentable-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-szallas-hu-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/review-widgets-for-tripadvisor-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviews-plus-153f878c481a2d3c062b001804128554.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviews-plus-b033ee29eabf26b20084a86d35b9d877.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviews-widgets-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviews-widgets-for-yelp-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewx-119c0f69d5b8485973b55dbcfc907989.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewx-1589d579faac8c7d72195578a8342786.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewx-1f09731ddd1d1af88db90bbc4fec3ba8.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewx-6663c4e8258a97ca80d8e61f0b37ac68.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewx-6a99396550744ae560a5320a1b153079.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewx-ada9bfaee2bdcdae8c612fda04e8585f.yaml create mode 100644 nuclei-templates/cve-less/plugins/reviewx-d13b6e0194ead1aa761a79dc4de31982.yaml create mode 100644 nuclei-templates/cve-less/plugins/revision-manager-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/revolut-gateway-for-woocommerce-b6ad60014841f75188893319dd4470b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/revolution-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/revolution-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-21b56747ef932af6a293d705a4f1c993.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-27d3cbadcfb0487ad424f81cd866c990.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-2e2946ff7ceba7ce385ae21a430029fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-37ebb1547ffcf7ee914afd4ab2a7338e.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-648072cf9e5d6b428e895ff9cc55e265.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-685b01b9c20a58ab8625d54ca9e5774b.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-77cb7270adb1ee8f80145931d246bc67.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-be4d0822a09dabbfb60c56eb78326475.yaml create mode 100644 nuclei-templates/cve-less/plugins/revslider-ea2d65615410e5461dba977dc309841e.yaml create mode 100644 nuclei-templates/cve-less/plugins/rezgo-1bdd11fadd06cfdab7d4d06e095a85bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/rezgo-d8487b4cdf30d9f95919fc0d077ba4cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/rezgo-fe69a0c777f01161eb85876f2a58c68c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ricerca-smart-search-d144e1655e99bcb34fc6b0573a7608ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/rich-counter-77a02e9a59afcc2450797fc7712b5da9.yaml create mode 100644 nuclei-templates/cve-less/plugins/rich-event-timeline-bb6d2bf0f5a8a794df5c5f921c8ed2d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/rich-reviews-619ac7254fccc036c35607f86905c212.yaml create mode 100644 nuclei-templates/cve-less/plugins/rich-reviews-b5ff51b3c591b9026f1ed0c5c634aabc.yaml create mode 100644 nuclei-templates/cve-less/plugins/rich-reviews-d096551cc11e027298b83171a2a3683a.yaml create mode 100644 nuclei-templates/cve-less/plugins/rich-snippets-vevents-0a2ecbcc02c5fdd93dc20fd7c66c9f62.yaml create mode 100644 nuclei-templates/cve-less/plugins/rich-table-of-content-0a49b86c658b566e0874b7c8c6fd8f9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/rich-widget-563c9252bb845bff9256a99d2c884c98.yaml create mode 100644 nuclei-templates/cve-less/plugins/rife-elementor-extensions-9454be14498ff26da96354e9b5fc82b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/rife-elementor-extensions-b6405ae9eaca03d55059021293cdb417.yaml create mode 100644 nuclei-templates/cve-less/plugins/rimons-twitter-widget-94ba05091d5c1c002f96ded27dad7e5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ripe-hd-player-90b978a91efacda536eb1e0ded121cd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ripe-hd-player-ca4ec2717c0e87b5e6136533f933edf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/rise-blocks-300e5e2ebc65101a8ebb5e6f23b6747a.yaml create mode 100644 nuclei-templates/cve-less/plugins/rk-responsive-contact-form-9a2bf7d17126275dce9aeca280888e4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/rlswordpresssearch-039516da624d506160b1c30124a56f9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/rm-mailchimp-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/rm-mailchimp-manager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/robo-gallery-11a45c98dd2f844970dab94e4b84b3d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/robo-gallery-21d5c5e61124efe0fdb8d063c0f79f9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/robo-gallery-5fb58f1bd63b817d6a622885ff3cda93.yaml create mode 100644 nuclei-templates/cve-less/plugins/robo-gallery-6cee4524dc586561620cd18145330773.yaml create mode 100644 nuclei-templates/cve-less/plugins/robo-gallery-9376ca64ef0c10c441ff62358957edd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/robo-gallery-9f2f2dde98598fd295064b72e326d9fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/robo-gallery-b37d0ab8478827b0dcd11d96ae9c0099.yaml create mode 100644 nuclei-templates/cve-less/plugins/robo-gallery-ca5f7b99213750bdb7e09f3fde148865.yaml create mode 100644 nuclei-templates/cve-less/plugins/robokassa-a1f3ce23c26813a2d0636e6681a66fe2.yaml create mode 100644 nuclei-templates/cve-less/plugins/rock-convert-a6ad4e1a267f3d946e1e2e12d5bebc25.yaml create mode 100644 nuclei-templates/cve-less/plugins/rock-convert-c9b759e004eccd5b21e624aa9b7c9cb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/rock-convert-f5bd530013958004252bd14d740d1932.yaml create mode 100644 nuclei-templates/cve-less/plugins/rocket-font-056b7aae26aa632814d20eff8a2aaeb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/rocket-maintenance-mode-28d27bb70102b6a3ff9c97ba43afec20.yaml create mode 100644 nuclei-templates/cve-less/plugins/rocket-maintenance-mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/rockhoist-badges-b501e58c10633b07f2bbf5ed16ac706e.yaml create mode 100644 nuclei-templates/cve-less/plugins/rockhoist-ratings-c12136de0ef8038ae757e3a4dc014f16.yaml create mode 100644 nuclei-templates/cve-less/plugins/role-based-pricing-for-woocommerce-226373864d57cc20f7f59dea62a55c3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/role-based-pricing-for-woocommerce-9572375f1a63fe71cfefeb901690b502.yaml create mode 100644 nuclei-templates/cve-less/plugins/role-scoper-25222fc492113823793e49be1ec42e70.yaml create mode 100644 nuclei-templates/cve-less/plugins/role-scoper-787af0ce94bcdf676a12979b911ee5bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/rolo-slider-47760446230886f970132bba81795035.yaml create mode 100644 nuclei-templates/cve-less/plugins/rometheme-for-elementor-3b2e242a0e8c63c5936cb035e1688322.yaml create mode 100644 nuclei-templates/cve-less/plugins/rometheme-for-elementor-8e63763711ef860c6f3f1ec391c10df2.yaml create mode 100644 nuclei-templates/cve-less/plugins/romethemeform-9fc19dd6fd6294d34dede89f8670266f.yaml create mode 100644 nuclei-templates/cve-less/plugins/roomcloud-702f612dcb7a10b7280f1dc0d80858a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/rotating-posts-f7a5929579e2eeff4b02eaa7e1b6a770.yaml create mode 100644 nuclei-templates/cve-less/plugins/rough-chart-0c31a10cc87b13f4ea6563dcb29fd71f.yaml create mode 100644 nuclei-templates/cve-less/plugins/row-seats-89c3f6ae4022d4ba5030523ac97f470e.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-0041eed105fca66b7639ed88612e2a80.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-0085871a665961c1d3ef1282f6a6ad11.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-0149f7dc82642e7c9e2df42d374cf976.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-0482c6a15acfe9611a210ed128b0e569.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-14fedf42454dd570b7c4db0f006340a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-1e54d333594befa754c49d164d26005e.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-1e5ce0b67a0027e4214650c86e79dae3.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-234019268f52489cd57bd03c8706abb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-2b7446b2ef604595e4c14f2ae5295842.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-30adae9325a039e658c3c87f75010bc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-34cb9813e7e0af12dde3e7fb63dcabc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-3a171cbd9ee1ba65bf8842bbdf9667ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-427e946f25b6c94eeb7fca443cbb0fb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-42b03ce9c451ca4b2e6d55fc7e3bcc5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-42efdeb2109159b8e16a9767609f5a82.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-67ad0ff7411e0b10941fca10e62b3adc.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-7df172b3edf3e84909e57255e5af7560.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-7f3e0aa2645efef948b43657b5c03dab.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-85f4d977a933b76ef44dca3b5cf211a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-971ac066c8b1c8e7c33176652acbee75.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-a1c5cf13e8000c5432d1ca3433582d6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-a51510a3a53aad35586cd77db87e9061.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-a8dfb144a96e09ab6fe557b583b0e2e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-aba156d650d00c8cf56ce115df0a8a51.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-af78f3c1214fac33b65ff5feb5cc1cdc.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-bf5db01ece74e4b17297bc41008d1094.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-d8b16bccaae81ea809d42b4a13235086.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-e9fbd2b032cc27ad5763353222798302.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-f23a396c773e57d57939f05c9afe1afd.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-f2cad193bfdf87038af8a439971f7167.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-f99e6ab2e39506303838ab9dbdf68d36.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-fbf2bd6ee999c2641f3988cb02ef8d65.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-ffeb5e23a26d75b1d475c25e6d94fa7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-elementor-addons-fffeaa1f78027e80b8c9ac73b2739073.yaml create mode 100644 nuclei-templates/cve-less/plugins/royal-slider-b8b913c56ed39f29c61eb2552bb40930.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsfirewall-4c932f620189df7cfc310b8ab7529a19.yaml create mode 100644 nuclei-templates/cve-less/plugins/rss-feed-reader-0bfa9343d868449c3d973f2c81052fe9.yaml create mode 100644 nuclei-templates/cve-less/plugins/rss-feed-widget-20537453f991f8c89e48950bab56c824.yaml create mode 100644 nuclei-templates/cve-less/plugins/rss-feed-widget-cad14760637700672da85dda380a58c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/rss-for-yandex-turbo-509b534cfaeb00eddb901be35d0a9812.yaml create mode 100644 nuclei-templates/cve-less/plugins/rss-for-yandex-turbo-6c5c77255a84fb41b6fdd26d0fd10783.yaml create mode 100644 nuclei-templates/cve-less/plugins/rss-import-cd17a32212236705de6be45ec4d31053.yaml create mode 100644 nuclei-templates/cve-less/plugins/rss-includes-pages-e82724cb73e8d739a7e74ba12a2c0b77.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvp-38dc5d2aec94b7c14ed0604e5b57a847.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvp-72cd99005222b05f8d3ba5703b3d3c18.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvp-9a3fa62818d09a4c2a4693cadbb72035.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-11d11665e7b84e94329e03dc64274c9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-202c703bcd7494b0db3a9f2aa3a2b6de.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-54909ff694f2550a529ed9dc33c2ddad.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-59b8b133d2114d7582e975a5c3c2845d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-73c59415c469f5d4853f326fdd664c56.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-84319e4342ea4c4283c523e681307b09.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-871693a9ac7cbae97114e3dda03c407f.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-b5eb1eaeff0523cd8fae2efd6f6ac02e.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-d81020aeab63f5a6071cc384e45c425d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-e4702a04134b47b76d799a6fc7f1263b.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-excel-a2edcd49a7e89b5985d5c1db4e3e3fcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-fa61f96851f0d9df6ac08db9cd077c0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-fb36faa4bab8a0d1c4868c63043ddd1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-fe52f515eb00fff50a18a2e75044bc1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/rsvpmaker-ff8293f84b21b2955bef22aebfa62b32.yaml create mode 100644 nuclei-templates/cve-less/plugins/rt-custom-css-page-and-post-702f90b8bb07e6c13ea1a4bcd70721ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/rt-easy-builder-advanced-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/rt-easy-builder-advanced-addons-for-elementor-f0986ec848116bdaf85ff2fe79a684cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/rt-prettyphoto-94b0b54aeb124f4c7a107e54a5615849.yaml create mode 100644 nuclei-templates/cve-less/plugins/ruby-help-desk-9346f7a9d2f3883e949e211cd3195670.yaml create mode 100644 nuclei-templates/cve-less/plugins/rucy-83e12e5ef7835e334ea713df657c881c.yaml create mode 100644 nuclei-templates/cve-less/plugins/rumbletalk-chat-a-chat-with-themes-4505fe3a4261c48a734f7d8e99d7b55b.yaml create mode 100644 nuclei-templates/cve-less/plugins/run-time-image-resizing-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/run-time-image-resizing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/running-line-b2a2498dae5be84f29d9989669186b97.yaml create mode 100644 nuclei-templates/cve-less/plugins/rustolat-39be907595b014d4e7a7c4f54bad9f2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ruven-toolkit-81219af6a17b244e1843ac9c7762f11a.yaml create mode 100644 nuclei-templates/cve-less/plugins/rvg-optimize-database-5f21cea7a9aedb5442f3d8dbb7f2496a.yaml create mode 100644 nuclei-templates/cve-less/plugins/rvg-optimize-database-5fa9907f51cd1542af3ba3f055782fc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/rvg-optimize-database-75da5a5df58032a31ea21868586e0a7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/rw-divi-unite-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/rw-divi-unite-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/s2framework-6b723c7b581edfa3ccd6460c5d7aad90.yaml create mode 100644 nuclei-templates/cve-less/plugins/s2member-0e1b741ad7286ca5428685bd7aed1755.yaml create mode 100644 nuclei-templates/cve-less/plugins/s2member-5573468f295cf6226ec0e468f3d5d806.yaml create mode 100644 nuclei-templates/cve-less/plugins/s2member-e07374f70a1aa87298a8b60340913353.yaml create mode 100644 nuclei-templates/cve-less/plugins/s2member-secure-file-browser-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/s3-video-2f8d0ca1e6e86f93253415194d417267.yaml create mode 100644 nuclei-templates/cve-less/plugins/s3-video-83c44f74fb6f267a714fb43018452c84.yaml create mode 100644 nuclei-templates/cve-less/plugins/s3-video-98fa09468510e4f3d608da204df8d702.yaml create mode 100644 nuclei-templates/cve-less/plugins/s3-video-b308d8dd463cbe3361a5a4c348d193ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/s3audible-amazon-s3-music-player-73b7b4fd6adbc8f05bd6aa0607d34105.yaml create mode 100644 nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-audio-streaming-727a6d10eed1dfebfba432e96cc38739.yaml create mode 100644 nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-html-5-video-with-adverts-94a35e06d280c2901bcd1f032d9e8a1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-html-5-video-with-adverts-cd6e7fbf5a95badd9018fdfc8c60db7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/saan-world-clock-dbff9a993e10a4f80cd4718f67303541.yaml create mode 100644 nuclei-templates/cve-less/plugins/sabaisdiscuss-7038593ad5992122fe087ebe7875e6ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/sabre-8a88cbe198527237519cb3478f4555ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/safe-editor-e01a95cfae1821b6d1bcf2a917c4f01c.yaml create mode 100644 nuclei-templates/cve-less/plugins/safe-redirect-manager-05c2167f7f1f78fa58c980d418931b2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/safe-svg-1cccf375a4463c9d416a20eff76583ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/safe-svg-8b2ac3daa03fbba70cf83c4563849d67.yaml create mode 100644 nuclei-templates/cve-less/plugins/safe-svg-b58eeb8e60d6f7c5cf602173c2c00549.yaml create mode 100644 nuclei-templates/cve-less/plugins/safe-svg-d8ec46ad4534895bbeab1b52d6693d3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/safe-svg-de5739613e14a996b46539b30ca9beab.yaml create mode 100644 nuclei-templates/cve-less/plugins/sagepay-direct-for-woocommerce-payment-gateway-9e6de6f10cec1c471c1242da8d788708.yaml create mode 100644 nuclei-templates/cve-less/plugins/sagepay-server-gateway-for-woocommerce-436125bac0484b579189e9f21786e904.yaml create mode 100644 nuclei-templates/cve-less/plugins/sahu-tiktok-pixel-c3f117930fe59986e129269f444e98be.yaml create mode 100644 nuclei-templates/cve-less/plugins/sailthru-triggermail-579cd3fc5c2399656d85cbe343c14eef.yaml create mode 100644 nuclei-templates/cve-less/plugins/sailthru-triggermail-a4f4eba72296421005733a610933f605.yaml create mode 100644 nuclei-templates/cve-less/plugins/salat-times-dff51ecf68a2a27471cd48bde63ce4a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/salert-5727788917ca5dc70c5a2a8fc41d6ea0.yaml create mode 100644 nuclei-templates/cve-less/plugins/salert-f2eb2411647af07955e8ded396c4583e.yaml create mode 100644 nuclei-templates/cve-less/plugins/sales-report-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/salesking-4ad4863544909ca65fb59059a85b6ca2.yaml create mode 100644 nuclei-templates/cve-less/plugins/salesking-c34456b0a354174a8b99c79db450a526.yaml create mode 100644 nuclei-templates/cve-less/plugins/salesking-d2407407e16d8affae24d481d0b34cb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/salesmanago-eaa83ff52990564332c5852f905f9fb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/salient-core-6883c989062268d5da80d537f9e1e493.yaml create mode 100644 nuclei-templates/cve-less/plugins/salient-core-80c6230c139aaee435c35c9df894dae1.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-00157407495e1ef41be2fc477a456a7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-0bea880f7043c5054d61f7e9d6ba4d2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-12219750d7664db4408ea75c73fa706d.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-17739eab6c3078839f62948bae53f8f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-1874294040d198d9f843d58bbcc1548b.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-3a9e5880883b3238662167448ae8e190.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-473ae39f2c9b117fd21ddfea3f742daa.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-80865fbe8c06ec562ac960b28b962ecd.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-826b0e6fc8bdc77439da0a867a102476.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-9935fc74a7e8d09ff1c372489adcc9dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-c957720e1b76962412e197bc09cb35e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/salon-booking-system-f991f9853892bf031ebb72c811af6b0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sam-pro-free-0f6c840a3fb64dbbf3be23d21800f577.yaml create mode 100644 nuclei-templates/cve-less/plugins/sam-pro-lite-0f6c840a3fb64dbbf3be23d21800f577.yaml create mode 100644 nuclei-templates/cve-less/plugins/sangar-slider-lite-3b9bd1e4f5897df85a36d204f832a5eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/saphali-woocommerce-lite-56ba6deff570cd4e7d1696cb032991b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sassy-social-share-07ab6177e4eee952d64d139410f561bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/sassy-social-share-40aacb4df39566c6bb333af52f28e227.yaml create mode 100644 nuclei-templates/cve-less/plugins/sassy-social-share-4d80f38d93d7f5f929f7caeb5348b571.yaml create mode 100644 nuclei-templates/cve-less/plugins/sassy-social-share-6150ea7134cb72d73e6e7ce3f51ab46c.yaml create mode 100644 nuclei-templates/cve-less/plugins/sassy-social-share-754268962b0bd973cebfd375c7df9425.yaml create mode 100644 nuclei-templates/cve-less/plugins/sassy-social-share-c564c36d083131df8b70721d4380612a.yaml create mode 100644 nuclei-templates/cve-less/plugins/sassy-social-share-f793e64947f92282a534916c8b501137.yaml create mode 100644 nuclei-templates/cve-less/plugins/save-as-image-by-pdfcrowd-67ad930884b5b87d29530a8be64ff268.yaml create mode 100644 nuclei-templates/cve-less/plugins/save-as-image-by-pdfcrowd-e66b394b6ca847ce34ca3e1d63c12c27.yaml create mode 100644 nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-1cdee5629acdb013a2031fc71ce18e3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-2aaf513c887290d1b06e4a97482b6da3.yaml create mode 100644 nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-b2cea8a198e9a575447977f949754486.yaml create mode 100644 nuclei-templates/cve-less/plugins/save-grab-abad4bfa80c4735594596dcf267be185.yaml create mode 100644 nuclei-templates/cve-less/plugins/sayfa-sayac-22e02ff5de893b13264dcb770563429d.yaml create mode 100644 nuclei-templates/cve-less/plugins/sayfa-sayac-d88d0c224f666498b5887acc3c70b802.yaml create mode 100644 nuclei-templates/cve-less/plugins/sb-child-list-321ea6ffd1b44901180d2be13bcb0547.yaml create mode 100644 nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-43e92e48fce7405625b7afca66933559.yaml create mode 100644 nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-66e7875aa9a79f68060a917eb8074082.yaml create mode 100644 nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-e0426a28b885d426fb32a6121c958a26.yaml create mode 100644 nuclei-templates/cve-less/plugins/sb-uploader-987ba48a8effbae5bcbbbe65d3a7dff9.yaml create mode 100644 nuclei-templates/cve-less/plugins/scalable-vector-graphics-svg-9a645fa828e0b867db978ce345a20000.yaml create mode 100644 nuclei-templates/cve-less/plugins/schedule-posts-calendar-53afece9446695901fc03dfbb692e04f.yaml create mode 100644 nuclei-templates/cve-less/plugins/schedule-posts-calendar-a076b8ca38d0ad2532c4b659c3b54901.yaml create mode 100644 nuclei-templates/cve-less/plugins/scheduled-announcements-widget-29145e5db5dd5627b3607ea1e36f49b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/scheduled-notification-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/schedulicity-online-appointment-booking-1a925f12b1905f4ad4c8d17bba7bb15a.yaml create mode 100644 nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-157cdd8bc992e58c6e6f6337bc97b4c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-1fa869ed52b230924c8c94b2bfb591af.yaml create mode 100644 nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-24a60434e502bd4fe3a3e9f654b441e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-62957aaeb6104548f77744232edc7490.yaml create mode 100644 nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-84ecfe35530dba1d6d850c87907091be.yaml create mode 100644 nuclei-templates/cve-less/plugins/schema-app-structured-data-for-schemaorg-d4b2be233d46cfcba65da98993b34434.yaml create mode 100644 nuclei-templates/cve-less/plugins/school-management-3f1c3ad85ad1a49bfdfa7d4e3b840987.yaml create mode 100644 nuclei-templates/cve-less/plugins/school-management-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml create mode 100644 nuclei-templates/cve-less/plugins/school-management-pro-2646a8b516c31d3d675ed11114c6f9aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/school-management-pro-c85a39b22a9266777e8fa557a3826f56.yaml create mode 100644 nuclei-templates/cve-less/plugins/school-management-system-be2315835d7b2267c9fa00b942855a61.yaml create mode 100644 nuclei-templates/cve-less/plugins/schreikasten-13e0cdd00039aa83908edb26fc9e840c.yaml create mode 100644 nuclei-templates/cve-less/plugins/scormcloud-cef5983d30ffaada806aedbacf5b6bc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/scoutnet-kalender-1e95de3e52134f8f88956ec119bc2d88.yaml create mode 100644 nuclei-templates/cve-less/plugins/screets-lcx-211da40fdd7ec7390b239420458edbc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/scribble-maps-1a6adfb616ef7e8670ebde6e3c2f0918.yaml create mode 100644 nuclei-templates/cve-less/plugins/scriptless-social-sharing-53a6ab0ca5df0931f86a3cb0e36625b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/scripts-n-styles-dd27ae18a86029fffd366285509782e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/scripts-organizer-c348ce6c7574b8ff9d61db7b1c6faf04.yaml create mode 100644 nuclei-templates/cve-less/plugins/scroll-baner-62e4e20027880ffdd76d60900f6cc1c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/scroll-post-excerpt-4634b65a3b88602069115a32b9310bb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/scroll-top-b5b3c8eb6791ecd6029bb9d46ed89ac0.yaml create mode 100644 nuclei-templates/cve-less/plugins/scroll-triggered-animations-a2f2e6465cf5db9cbb966e235c714c1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/scrolling-anchors-823ea976111689a9bb4045475cc60c43.yaml create mode 100644 nuclei-templates/cve-less/plugins/scrollrevealjs-effects-92ee91cf72a43dfa2c90a26dd4e9aac0.yaml create mode 100644 nuclei-templates/cve-less/plugins/scrollsequence-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/scrollsequence-d8b5bd57572fb9305d66b7bd52b02101.yaml create mode 100644 nuclei-templates/cve-less/plugins/se-html5-album-audio-player-85cd297e94e13a79acaf0e0195efaaf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/seamless-donations-0f1cce8b3f6cc44f06846edd384bb3d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/seamless-donations-466149e12563eb78ed7febca48abd052.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-analytics-48d179450e001d6e5bb006bf4ba5d2a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-analytics-6b13e1ddb211e52169360fc54388c951.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-and-share-63d0d67aa5aba2dddaa9648ffc434152.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-autocomplete-227404dac34993cad671e2236080d324.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-everything-117a868c3ea3bb712e5a1d73897e37a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-everything-3aae779483ac61fd460b1860a2ef2f7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-everything-db06882af76c86da8baedbdae183f52e.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-everything-f5c19231c40427d40fe57581f10b7d84.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-exclude-3a32aa7a18d47ef0f7438986ced63310.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-exclude-e9fa8cb8021c5fce11cdeba05ed162ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-filter-7932b82c356f203f76bc21fa22bfac04.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-in-place-67ada1785c1a67660530280a293c0d89.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-in-place-90aecfac8b56c743716b7354156b72b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-logger-967dff727dbc42b5a7eb2d15c9e083d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-meter-f23eeb8c9b5eae93abecc2b7d750a8f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/search-unleashed-6786949bf947df30c87362646165e5b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/searchiq-0d7f8442f33ed7fc7eccab9aaa8ce0e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/searchiq-84940a417e2023353b70ebc282a092a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/searchiq-aa754ad2c8b3fd090579a6c1c7b9d91c.yaml create mode 100644 nuclei-templates/cve-less/plugins/searchterms-tagging-2-3c345f487511e8bb822be122aa461bdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/searchterms-tagging-2-4fdb668b4072805be7b723dcf1d44abb.yaml create mode 100644 nuclei-templates/cve-less/plugins/searchwp-347f040de616333a1a9814dd7bc708c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/searchwp-live-ajax-search-3ff9ea32aaa393cc30b39527dd3a58c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/searchwp-live-ajax-search-f7cf83a853e0c8a85044ac66f5cc847b.yaml create mode 100644 nuclei-templates/cve-less/plugins/seatgeek-affiliate-tickets-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/second-street-promotion-3cb680b76cd76f74dd3e1108311fe7fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/secondary-title-bf1fcb74e30994cb355bab78b549e730.yaml create mode 100644 nuclei-templates/cve-less/plugins/section-slider-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/secupress-2b0a7466b22e63c34f32b08697f5cfdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/secupress-797ed9f22b4525fb7840122eb0973904.yaml create mode 100644 nuclei-templates/cve-less/plugins/secupress-pro-797ed9f22b4525fb7840122eb0973904.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-admin-ip-eed5959a62db993b12da83da9d803446.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-copy-content-protection-40c9df59c7e3df119c2dd5f1035b5b7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-copy-content-protection-80ad6ff6a41f2684b99adffd0cc6275a.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-copy-content-protection-a8ed8c08b34ae95a0c525696512c70ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-copy-content-protection-b20594c424375d9856782a72ff8e9db1.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-file-manager-d557c696333289ec8d8f662866e89376.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-files-ce5ed87dfc2376443fc12498fa99a891.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-html5-video-player-c6380a7487a7c0067133d9ec14c64bfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/secure-ip-logins-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/securemoz-security-audit-a2f819fdd51f14b2b69a4d02f7d84f43.yaml create mode 100644 nuclei-templates/cve-less/plugins/securimage-wp-3eab710837b3e13c81a4f7d732c43657.yaml create mode 100644 nuclei-templates/cve-less/plugins/securimage-wp-64412a6d5b249eafc3d5bfa69a4e3d27.yaml create mode 100644 nuclei-templates/cve-less/plugins/securimage-wp-fixed-e76639e268e0d7879dd985548e2b0ee7.yaml create mode 100644 nuclei-templates/cve-less/plugins/security-malware-firewall-2bc21dde1345455ea9561d5fe5ed0e15.yaml create mode 100644 nuclei-templates/cve-less/plugins/security-malware-firewall-4d1eef19885c78121ffb497c3fe4a3bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/security-ninja-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/security-safe-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/seed-fonts-05c88cf821e14c133b503ea979e12c4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/seed-social-714e1a158166a33a7b439bd28dcdaa32.yaml create mode 100644 nuclei-templates/cve-less/plugins/seed-social-c4ddc0489c7fc6327da43ce100fae835.yaml create mode 100644 nuclei-templates/cve-less/plugins/seers-cookie-consent-banner-privacy-policy-99cc5f18cba37431e326c7c04591a219.yaml create mode 100644 nuclei-templates/cve-less/plugins/seers-cookie-consent-banner-privacy-policy-ba1c662a4a4fab81f4b84d2ac53ce3a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons-f73941d406d9c3fcf56582655794e007.yaml create mode 100644 nuclei-templates/cve-less/plugins/sell-downloads-1db698397280ce7aca6c9daca8c7b7c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sell-downloads-95e1f751d91cfff872210a09f6fcaf59.yaml create mode 100644 nuclei-templates/cve-less/plugins/sell-media-c56e654821bb31914422facf9fd1d9d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/sell-media-d6132019cfaa7b420b3260f07bd086fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/sell-photo-655bb3b8d4438b69c94c0ae63c754913.yaml create mode 100644 nuclei-templates/cve-less/plugins/sellkit-eb3ea92b0c5a4b0e8e1f707fd264374b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sem-wysiwyg-19b57e69ca3c481c9cd19e98284be152.yaml create mode 100644 nuclei-templates/cve-less/plugins/sema-api-3fb8bbd93e29c77c2c10fff01c5754a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/semalt-42f2aed82645b4c22a964230d4cf5c0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-5c801a046ddb1fac8004d7794f007242.yaml create mode 100644 nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-9b9891b7d15de10b021b57247a686e05.yaml create mode 100644 nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-fbdeefe8fdc61a2e9093fee1505ec5f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/send-prebuilt-emails-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/send-users-email-0f1df16e8eed1b185bf479b1f2bd0199.yaml create mode 100644 nuclei-templates/cve-less/plugins/sender-5aca3acdcafb2379cade4b6c2df42ece.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendgrid-email-delivery-simplified-526f9a50eb94365c6edf2a44fc6ceed7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendit-85ac26fe1ed37dc881dfc2a5252c3fa6.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpress-2b3a10a2b0c01a20025a0d9db118f2df.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpress-349038bfb8ad974ae4bba5615712f5b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpress-359a63479caac5270f841c962366bff8.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpress-446bb803ccb7ab54ba9c587af27ed178.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpress-572ada3e2b5cfd266bbe4d55b671ea76.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpress-81e845426b35bbadfec4fa7948427e09.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpress-9ba240bc312b43fe5719cb9b5a56a769.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpress-f386ff3f48b7d778335b6a97f6c41a43.yaml create mode 100644 nuclei-templates/cve-less/plugins/sendpulse-web-push-30e35a536fd4afd5cb956f988fb6ecbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/sensei-lms-6892cd1d0b697581c7511a564b22d2f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sensei-lms-a7ff75affe3888f63fffbde3a81a35a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sensei-lms-c6ad96281ff7d4df0c44c10217f4d0ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-301-meta-1d87fdeb396f4600b280560afe2112ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-alert-437f4f4319341eb71e66802d9a46e647.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-automated-link-building-e894a6552613ace9ff7694fe7f0247a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-automatic-links-40b96ba14c189bc5294c696f541a5a2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-automatic-wp-core-tweaks-ed27c4cd836ec804d97b971161525852.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-backlink-monitor-a957dbe1122815a4d921b97d5fcd30d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-backlinks-896998a582295bc584998dec0e35768b.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-booster-9732cad9519d7ec0a87d22f95e1da009.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-booster-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-booster-cc60724a02e2069155463638fe585163.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-10web-70a47ff6f5488e7468e76cf5273bfb81.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-10web-fcebd70d7bd0fae30a9aee2fa4de1dca.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-0412effdb25dc1c079b5ac901ba8eb41.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-10c02e3884689b63f9593289046d6bbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-149aa3cdb8f6dba02a1015d8c51445b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-29a6c7e2607d1c0248462dad6e8d2dae.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-3cd75b090f3018ee840ae18474ab15b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-424aba97fb32ef1aa4a45220d2d79ae0.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-4309b7c0188a30115c93b002a27055be.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-4aca4e8ed2773f54fe21e7e09f146650.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-50ad7e6a87a7ec0f76525597202c2f2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-786eb02bbb9c78c1c09fd80a45e23bb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-f745637cf5ff648ecffd79a7f071d200.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-by-rank-math-pro-8be746d8d4f7199896166d7de62beb9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-change-monitor-b91a2480651782f3bb16ba3659354dba.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-checklist-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-dashboard-by-gutewebsites-de-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-for-woocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-image-78fd1adecba808ca03a48398d3c13c9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-local-rank-2ef18c0d57d1cdd92f75ace88711d88f.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-rank-reporter-c8630bcb4ab2b5cd9e6ea3a337451d8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-1f2d414ddc2a277c0bf1caa864fd45b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-73f794bdb6d5d5ebc6d4220191ef5dda.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-81580e623be1bd11eb139b9bedb99985.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-82c66bd49c9670a47844ee08f2e1dfec.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-b37230941774d99792032d2914c74bb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-d80bb287fb3b361c731e4fbb1c1ed49d.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-da0195abc3fd621c83febd2fb7f0bcc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-ea58f8019f8858d1a6e5612496c6cdb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-redirection-f06f3a35df3df0c40ee23bf235a7efbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-site-auditor-agency-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-slider-afa388cb5079dcd3f29d050e7cf600e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-title-tag-f5e5ea8fe0a79e328718fc83043de80f.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-watcher-4a70a1d91b23564dea1f6826c9041806.yaml create mode 100644 nuclei-templates/cve-less/plugins/seo-wizard-c65adcc35ac4040261ad16030af10bc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/seolinkrotator-99d9f69262b565cb98ac9182ded6ba39.yaml create mode 100644 nuclei-templates/cve-less/plugins/seos-contact-form-54eacca3ec158df026692c600567e01e.yaml create mode 100644 nuclei-templates/cve-less/plugins/seosamba-webmasters-2163947a7faebedb99b02ea382f621f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/sequential-order-numbers-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/seraphinite-accelerator-2677f82c6e08d61546678037c73f3707.yaml create mode 100644 nuclei-templates/cve-less/plugins/seraphinite-accelerator-4bb5304c273d308af87d9ef184195800.yaml create mode 100644 nuclei-templates/cve-less/plugins/seraphinite-accelerator-68b6ddf8373e9922e3759838ef90fc9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/seraphinite-accelerator-c1c389ad46f0bb17d071702dede0897b.yaml create mode 100644 nuclei-templates/cve-less/plugins/seraphinite-accelerator-d2de41ee5b97d7c9433fd01d3f1c9751.yaml create mode 100644 nuclei-templates/cve-less/plugins/seraphinite-accelerator-dab17f74e7c510ebeda6e16b5ea6519f.yaml create mode 100644 nuclei-templates/cve-less/plugins/seraphinite-old-slugs-mgr-91fa5c3d290e5cca3440a17eaa19829e.yaml create mode 100644 nuclei-templates/cve-less/plugins/seraphinite-post-docx-source-ca69de4894a78d151874e42160f8d4e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/serial-codes-generator-and-validator-0bd471365f33bde2fc9b3cf18367b907.yaml create mode 100644 nuclei-templates/cve-less/plugins/seriously-simple-podcasting-483e7e9040acb4dde997f1c7e60efa41.yaml create mode 100644 nuclei-templates/cve-less/plugins/seriously-simple-podcasting-7d9695bdca873940197ea6a55e88c78a.yaml create mode 100644 nuclei-templates/cve-less/plugins/seriously-simple-podcasting-bd3f97a6db76b6dcae059be482b558f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/seriously-simple-podcasting-d610c8cf7006865b0eb76d0efb43ad21.yaml create mode 100644 nuclei-templates/cve-less/plugins/seriously-simple-stats-80f967b027a6da96dccfd0c385ae1ac0.yaml create mode 100644 nuclei-templates/cve-less/plugins/seriously-simple-stats-c2e5ca7c3943870cf107630ce8a7ec83.yaml create mode 100644 nuclei-templates/cve-less/plugins/sermon-browser-63d4ee9917fcafc47225c3c77377bf2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sermon-browser-9660e0224b9760d1af88fd4611d7d759.yaml create mode 100644 nuclei-templates/cve-less/plugins/sermon-browser-a799081d34c432defddee7667cec19dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/sermon-browser-f3788e8161735094781c1f5ae1d95441.yaml create mode 100644 nuclei-templates/cve-less/plugins/sermone-online-sermons-management-71b25caf3907e04060e0d61d5bb4a2e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/sermone-online-sermons-management-bcc8790a8d36a1db91c142f8ad59d902.yaml create mode 100644 nuclei-templates/cve-less/plugins/serp-rank-f8142d6147ba8985e902d3e3c7f8c24d.yaml create mode 100644 nuclei-templates/cve-less/plugins/server-info-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/server-status-by-hostnameip-70cdf6a74f267301ff9a7a0c0a03da5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/service-area-postcode-checker-bb6a55b0c6e726b2a2ecec4b50c8f7ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/setka-editor-8a1f943914f4672fa3bb0af353ac1cbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/setka-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/seur-01f666d1348f15c58dad4eff11007661.yaml create mode 100644 nuclei-templates/cve-less/plugins/seur-0ca7c41649d0f082ad6681a5a0217ff7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sexy-author-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sexy-author-bio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/sexy-contact-form-df188a4635663bfa5512f1ac98e2f946.yaml create mode 100644 nuclei-templates/cve-less/plugins/sexybookmarks-5031bc59caa3037821df61e5a345c90f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sfwd-lms-02626784075443390163f8db5670c28a.yaml create mode 100644 nuclei-templates/cve-less/plugins/sfwd-lms-10a89ae66beb80eb5f5ead8cc5089e02.yaml create mode 100644 nuclei-templates/cve-less/plugins/sfwd-lms-13a97dd87cd8da4d2ca9cc4586e65cfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/sfwd-lms-2a5ae121ac45c4db9286f6262f63f6e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/sfwd-lms-417dd4625c1b025667086ec6772974db.yaml create mode 100644 nuclei-templates/cve-less/plugins/sfwd-lms-838c5377a3ecbc7084b894cb32f7b8cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/sfwd-lms-953891b7b02246cb4b83db8ae0e364f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/sfwd-lms-d6e8b2f76cbc2ec5ae7e7af3679d4ed8.yaml create mode 100644 nuclei-templates/cve-less/plugins/sg-cachepress-43f4c20972d989cec8564607e81e3507.yaml create mode 100644 nuclei-templates/cve-less/plugins/sg-cachepress-ed44e679b80b227382994fd698507bde.yaml create mode 100644 nuclei-templates/cve-less/plugins/sg-security-158366fe9b5b0baf92dc531e125fc491.yaml create mode 100644 nuclei-templates/cve-less/plugins/sg-security-29fc5077ea2edf3a78db8c636c61b5fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/sg-security-97e524444c79464d138f78b1bdccb0af.yaml create mode 100644 nuclei-templates/cve-less/plugins/shantz-wordpress-qotd-b07db4dfebcda2750bc8765b2f84f5e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/shapely-companion-f17b3e6f69f39571541cab98885c4a49.yaml create mode 100644 nuclei-templates/cve-less/plugins/shapepress-dsgvo-65fb11931177bab0fee70a7467cb7286.yaml create mode 100644 nuclei-templates/cve-less/plugins/shapepress-dsgvo-b1b317cf528065a9659ae132db582cd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/shapepress-dsgvo-c87c5ce6e1dba004330c2ec9d5dc6740.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-and-follow-d6e1f3b40bc3ef2b92a5e3cad8048813.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-on-diaspora-94e88d16398a1d45a3247b177897a58b.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-one-drive-bc20fc7e32cb3fbec9137570aec723f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-print-pdf-woocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-this-32ca157e45a11cba9d0a4e52d697d9d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-this-image-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-this-image-a8305ef02686935203a872eb58a73ff6.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-this-image-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/share-woocommerce-email-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/shareaholic-71a9b86af5e18a20f6a7538c29ad1df9.yaml create mode 100644 nuclei-templates/cve-less/plugins/shareaholic-822679f46a678c28d53cacb1c12444b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/shareaholic-d30830ee183428306dfe29b862928edf.yaml create mode 100644 nuclei-templates/cve-less/plugins/shareaholic-f19f31f075dbc06538f36ae8e36c55d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sharebar-2f64e4cf69164182b2f4695a0a03f04b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sharebar-61fcaed16881b56993f1d78f9758c2b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sharebar-c69d9d03bd69d8ab6bf679257ba19be1.yaml create mode 100644 nuclei-templates/cve-less/plugins/sharebar-c6abae1f3b36418b8b7ce31e542cc230.yaml create mode 100644 nuclei-templates/cve-less/plugins/shared-counts-dd581bb2f106d38c2b413e5d4d1b0414.yaml create mode 100644 nuclei-templates/cve-less/plugins/shared-files-13647ac0f5697b4e3d7374c8bbd8f571.yaml create mode 100644 nuclei-templates/cve-less/plugins/shared-files-31aeecdc666490a1580c3359e75e5fff.yaml create mode 100644 nuclei-templates/cve-less/plugins/shared-files-b62cd969ddcf5b8e9b0c69558a4a4184.yaml create mode 100644 nuclei-templates/cve-less/plugins/shared-files-b6bd7791f200f7232382796f865d36f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/shared-files-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/shareyourcart-59dd009cc3bbb81f3cf9451ec529dc99.yaml create mode 100644 nuclei-templates/cve-less/plugins/shariff-373cd634451823c6ebf5fcda405d8cd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/shariff-76ebe4a4bfefd9bdb89c2aafde46a61c.yaml create mode 100644 nuclei-templates/cve-less/plugins/shariff-91995026ff620283dce0ded1573ce367.yaml create mode 100644 nuclei-templates/cve-less/plugins/shariff-9868f32ae613992060ba083e76a3d3bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/shariff-sharing-541de8c068694bf2fd0d54b891070b5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sheetpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sheetpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-2681315eb5322b6e8d1489c4efcc7445.yaml create mode 100644 nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-5eb00ad2756b2388ac92152e000bcf7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/shibboleth-6be8e2d8421b17caa2e2804c1c44200c.yaml create mode 100644 nuclei-templates/cve-less/plugins/shiftcontroller-6d8b84eb17134784244ee11191ce581e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shiftcontroller-8d232cf88104a0bce1dc247150d7aae4.yaml create mode 100644 nuclei-templates/cve-less/plugins/shiftcontroller-d67e7665ddd98551189d5ed08461e85a.yaml create mode 100644 nuclei-templates/cve-less/plugins/shiftnav-responsive-mobile-menu-178a0b2872232b9ff07f79c6391e0625.yaml create mode 100644 nuclei-templates/cve-less/plugins/shiny-buttons-2cc10dd6846c3b5a424c2d4d83378809.yaml create mode 100644 nuclei-templates/cve-less/plugins/ship-to-ecourier-43ca0b6b0ea70acc9611835de771b2f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/shipping-labels-for-woo-7232fed6406ae4ba37d22f0a1efb507e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shockingly-simple-favicon-7f858d0082d9f9b3baf67bc48e2d6a9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/shop-as-a-customer-for-woocommerce-204abbaf4719b0c465697b2d07725668.yaml create mode 100644 nuclei-templates/cve-less/plugins/shop-as-a-customer-for-woocommerce-c95fb7e9995eb1cfa4e559bcf8a93b02.yaml create mode 100644 nuclei-templates/cve-less/plugins/shop-page-wp-2bd96fa6fc397c3dffcc3e90ed6550f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/shopconstruct-f40061e389876ea9a0c58de3f34fe3a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/shopengine-129b979d8e67fbc88666813fc32a0c22.yaml create mode 100644 nuclei-templates/cve-less/plugins/shopkeeper-extender-248ab13a1cecf5e500d9ad5e3403c1b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/shopp-aefb5230fce9985b540fe0a540e3c3be.yaml create mode 100644 nuclei-templates/cve-less/plugins/shopping-pages-2cc21eace9abb2004f2ff03d1c79dbc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-addons-51577bdf9a059e7edb1dda702623d2b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-addons-a26b1ca65400b2d024a19fa1088625ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-addons-e51458c52ee75e442332748b235c894d.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-factory-0b1685f3bb7d2556abd3f8a3adda5904.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-factory-d0a3ff8d18b2421520c07ab45424de7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-for-current-date-237f09cf608b33e2d885ba45327a8a92.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-for-current-date-baf7113ec23d15f1819896037517b713.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-for-font-awesome-a7ddbb09fcd7198bac10f4c61d87a90f.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-1c68ed9adb5cb9e4bd046ceebf588774.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-3e2e342247ff105c5df7ef4d8c77821d.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-619a199c4aef0c8ec4b0e45c8c920810.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-9ba37298cb6084c9a432846276355e13.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-imdb-05c667ea35f9abbc77504891932e218e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-imdb-568ee8060d1c0b8a7ff761ffdaf606b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-menu-0d3480d611d68322f3807ad912f13fa3.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-ninja-382f2dc0e3689fe8f1bed64d23fca41f.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-redirect-552fdceb70e178ef12665118f36af7cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-3558264fbd3bd3c84b28ca0ff40cd986.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-6d61e0b46b881d3a5609918a45b30992.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-a2374460bb7e70d55eb2c8c43ce8140b.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-a8aacb001d1b5ea46e16ff44cb2daa72.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcoder-30441a12301c990d7aaae2342a03a490.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-finder-0a2d3f8adac7ce1d181ce17764b6e0b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-finder-f57a6c83ef919f8797158e43c847775c.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ui-2dbf94e1363346187fd0d9415f21a87d.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ui-464b854a586427e5e143e4896c8caafc.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-0445de609fc885d2b170effe241e7510.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-051c86487ea054ab8374342c3d7fd783.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-235127c1445e6eee4f6de6fb13cf776e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-2b8f19b8c01bfb1b9a5352e232b91e8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-40c38cbf6914f34e30e735daee9d90f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-49026b84d0c7a958dfce935cb3d41d0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-5f9c4587b984a64216df76781ce699a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-61bcaa4eb5a8e67da44b4e8cf864a6f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-6211c1f22472d646cc232f92f882834f.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-63222bd033aa9c6bf238fe6f7d23725d.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-7485c7376b8dcdbe05490b2d21b9e0de.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-88b0cb27fd508341f3181a16f7fa23a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-9485da9dcc7a2c1f998297394d9f2737.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-aad87c0bfd109df2ae9940475ba0f22b.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-b0748dc23e38f40e5e4a1c508a030889.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-b5878d0522eaa3cc7d6330e71db266d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-cdab814f5acb52d3219d4930f7ee1f81.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-dbe0cc2eb5dbae77d4244d0de7839b9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-dca1a97a6a5540d73d22b80fbffbb729.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-e188a014b244e93ae49b1e82bb73babe.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-edf5537839b9111e9296303d5a76a556.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcodes-ultimate-f46955793d003bf5208172175382fed1.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortcut-macros-7c4f098f276bb438e8b06c67cf08748e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shorten-url-1b17b31db5584b79d66232be582b7de6.yaml create mode 100644 nuclei-templates/cve-less/plugins/shorten-url-258545baa917b7571f477b428889162e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shorten-url-6098ffaf0f2018e72b2fddb1b0994b64.yaml create mode 100644 nuclei-templates/cve-less/plugins/shorten-url-b16f37785fe5e86af56a0da58078826e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shorten-url-cd46d97404c66642d7eaa5afb0766ece.yaml create mode 100644 nuclei-templates/cve-less/plugins/shorten-url-e61dc6652abcb067051b61e901442c72.yaml create mode 100644 nuclei-templates/cve-less/plugins/shorten-url-ed44a5e289d05299409a4dd60c060b57.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-0cf023eb74228b9523fd8b71152bf7de.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-40682ba05fa0921516b4be5a1906460e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-53f8d45b4de3c175288d6c924b71f816.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-a49400e133fec50151a4f33acb299a5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortpixel-critical-css-d937680a60653a1af5b2a6c9c069ec41.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortpixel-image-optimiser-be0e8faaebc12ffdded98e3e60be9390.yaml create mode 100644 nuclei-templates/cve-less/plugins/shortpixel-image-optimiser-edd7c00369ad56e0646da80d37cfae3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/show-all-comments-in-one-page-48a0237cfe1dbdec835c8ee992606292.yaml create mode 100644 nuclei-templates/cve-less/plugins/show-hidecollapse-expand-de70b1243fed8f47eec92e24941c2439.yaml create mode 100644 nuclei-templates/cve-less/plugins/show-hidecollapse-expand-f122002b6d51991b7a2676304d17940e.yaml create mode 100644 nuclei-templates/cve-less/plugins/show-posts-0e821b289513241b63396beff87653b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/showbizpro-1cb173d5c34f023836f0c32128d87847.yaml create mode 100644 nuclei-templates/cve-less/plugins/showbizpro-21b56747ef932af6a293d705a4f1c993.yaml create mode 100644 nuclei-templates/cve-less/plugins/si-captcha-for-wordpress-f1dda6bcbed7eecbc2cee8a7403b412e.yaml create mode 100644 nuclei-templates/cve-less/plugins/si-contact-form-503833e43a0634ab7984563e9c441bb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-cart-woocommerce-5dc88e8bebac4fb35e29ff329ac029fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-cart-woocommerce-d432100581e1c6943b259719e2daead5.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-cart-woocommerce-ef1305fc1419b96443cd5e83467ca803.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-menu-5f3c1d80f50fc6780cc9be3d160231a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-menu-lite-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-menu-lite-081b5b67d5d1d150a8961aa511991ad2.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-menu-lite-58b47ebea36b65f50bab513dec8fd081.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-menu-lite-fdccd6b56f7fe69b11c256c29780a2ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/side-menu-lite-fe8e75c60168f65685f1418c9d95c3e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/sidebar-adder-eefcf68c0de93fc8b650bb6a4fb470d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/sidebar-manager-8fe609dfcf914f85364a28e0762bd9d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/sideblog-85bcd61b96548b75a4bebce0af8ade18.yaml create mode 100644 nuclei-templates/cve-less/plugins/sign-up-sheets-20e759b7f6b75ab3b1e69a94701cd5a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/sign-up-sheets-56fc7e10ac8b22881c3f0ca008407e33.yaml create mode 100644 nuclei-templates/cve-less/plugins/sign-up-sheets-c68fc62b3d163e900a125613050369e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/sign-up-sheets-df5624fcfc60e06a94f15a6af052be53.yaml create mode 100644 nuclei-templates/cve-less/plugins/similar-posts-004512741c42cbbce92c569c825c6150.yaml create mode 100644 nuclei-templates/cve-less/plugins/similar-posts-2474a94365b10412bcdef71534b7cdd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/simpel-reserveren-ff7129c5c489e7620ff9948f47fc6a7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-0a3a5e7befa978af91189dd0693b7678.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-129397ab97060ab9e51308f171e27b82.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-6dffe3576454f2a64f00311b905d034a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-92f8dddef0caee0f45322f38c33da40e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-addon-bulk-uploader-3c9cb9c40163b96bf6d0686c6178a29c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-addon-bulk-uploader-561657a1d8eb71d24910435f19187999.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-da9748807dbda454b45fa581681ad9a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-dfc0dcf8b3d813272459721cf312f589.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-301-redirects-f2f204b71c27258d8bc3636a9cf0d080.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-add-pages-or-posts-268fe7ccb3ae756c66592ca513b99e93.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-admin-language-change-5dcc472de5e4f87aebcc632749f7aaa7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ads-manager-09660999cf2e1317d729c3b722d62caa.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ads-manager-0f6c840a3fb64dbbf3be23d21800f577.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ads-manager-975e95579a2458f3541a3c52ec1cdb1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ads-manager-9ef58392cce08c654034b90fbf742ce5.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ads-manager-c16d7e5e9f240793779b7bb14373632e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ads-manager-dd9ac89fd471fa2e15cbd7416ec1c978.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ads-manager-eea091db60550f784f9a2d189bb3b4f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ajax-chat-1bbd8f2ed08db0b77690cb0df76fdffe.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ajax-chat-2181575a0cd142c1833c1ffdc36fbeb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ajax-chat-6d7a079131a28ced1afc399eed5de96c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ajax-chat-8097ab26da9158c6ac8991a667833327.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ajax-chat-c6329477c32be141bd1ef013c37024ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-author-box-4c2b5bad649e24fd03a9941d8a2a227e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-author-box-d6de8501bae90885b4cfb5ea79dec80a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-backup-898cc6b047f3aedcaae44caf9cb46034.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-banner-292e0cc17029954da0392c71fc757409.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-banner-cc890ca86d59bec43888764af28bac9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-banner-decbeaef5c23a80c05557edd9e92444e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-basic-contact-form-24b6c342cef1d8274544190481da6dc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-basic-contact-form-8b606c34ee5d9927b9ffc892e04d01c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-behace-portfolio-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-behace-portfolio-542985c679cbc99f40cd1241c2489438.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-bitcoin-faucets-600b942b044271afb765e6ae63286c52.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-blog-card-38f522639c782f75ecbda00625777030.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-blog-card-c207cf3269409384bfc7adaacb440036.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-buttons-creator-440da6ea620b4f0e53a03bec13770ad3.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-buttons-creator-aaaedc139789465865fcfb0738c02925.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-cloudflare-turnstile-0591772600d7345412c5914adc415e3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-csv-xls-exporter-797076b6d5e9db4c8f8d40e3e026648b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-custom-author-profiles-a772a1bfbb77e4750a15c026120428cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-custom-website-data-740c2a0d357fce3bff875d5d58b6f9d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-custom-website-data-fe349fb095cfb7a6ef8e1ff393fda6e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-button-shortcode-1d37800259dd9a7caaaf8879496d00f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-counter-a54fbae2de8a8e13d0527ba702d34945.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-19ad328fea959219a0ccf5d117ad75c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-49034c31f1dba0715c18246f4dd38cde.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-5017a561b2bec42e777a79d3e7f73798.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-5814be735a5f5cee00bab9378ee0cbea.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-59401ea9ce38d0433cad6f039547d860.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-5d5eee8781ce2674b2c2c40cb2fcc273.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-9b6bff957c02c5adaec64684fd5bd810.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-b170f8ef7c7061e6ad33e8f3d3426766.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-bbc8a2a1421137b76670971e66f228ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-d77dd6f710585ae9ffaedbfddc152d76.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-f2c626818640778246ca3c4d6d3ce648.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-download-monitor-fe4a2b77904ea26c425ce24d00765709.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-dropbox-upload-form-8f5233bb2f72d4a8a72b4725ffa80041.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-e-commerce-shopping-cart-b9227c21bfafb1eba2c9f59a2176e5a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-embed-code-b2367564b8e810af49ec2f68b7f40f1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-event-planner-0c7da527d5c5020bdc519d1c19025768.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-event-planner-0e3b2109a8f3c98e6d7b288936c49e4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-events-calendar-6cfd85b37acb634912f405192489654f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-events-calendar-d3d0ad8926aafa9beab7b5840f982076.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-facebook-plugin-0fc896a4acc44efa8900b336ff580b9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-facebook-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-feature-requests-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-fields-272ee2a329a8d2a28bce41429783dc10.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-fields-8ee30668d728aabff36c7b1c3fc51930.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-fields-cac4a2326e31475991ad4983e2696f4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-downloader-f7783b1b95259bfc99e8cabc59fcdb30.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-0bf86b2d6edcb55bd09f7e32e0eeb2ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-1035cac119c2deeb77e8b4fd1a309012.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-1057cae23f85520832f9b7c2f9fe55c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-12458527208bedb32b3812054b29eb28.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-14ceaddf4e0a3ca100c27db5abbea3a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-5be7a97c9b94c45be28a2be5c28c5d40.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-99f94d5f6f5961794646e333f2e12898.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-ca0b8d3a53c8c8a234faae7fa7f12350.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-d2fe1c961f4314cb633d294e6983652b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-file-list-f1ab2ba9aab33ab61ed9ab0dbb6a8c74.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-flash-video-ec78e7994dbd34ffd9cacf3cd9b3ffa4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-forum-cb19aa38112af2f12cff55ba678ad12d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-gmail-login-6882049d71ccbb0177ed642930a8f0f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-googlebot-visit-5d0daee3984605beba0293322e7ea274.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-history-29ab8049cd5f90b5e3925c4324e6bd1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-history-4a300ce6f6f831fce9cb1c19680cdfa4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-history-db642edfb58e0acb6106afe687e6b897.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-icons-77fadf9a7971f3244b33864c9a81256e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-iframe-b7ed33471f1469ef97fb3b870c3b3d8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-image-manipulator-ea364a8fa3fc256e34217f6289a9b8fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-image-popup-5bcd1f7720b268a32568c458d817b9bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-image-popup-8279425e8ad5b9257ee709bdcae15c73.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ip-ban-288abda2cfd9da64eaad068ba5d6f96e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-020ad3f8f39e050397b159e81ed4f1b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-0fc41c225cd6f2ddbf5e247314d75c25.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-290105b1777b3869c2f6dcc0140c3419.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-38572faa042f019158c1451d2a7c5d7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-59d448dc5105924595fdd539b0bfe7c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-661f3aae79018666cdd8577c9c2b3176.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-77686428a77d266ce22bfe59b8ab3fea.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-c2ff28d160f20eabee177d8a2b7b09d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-job-board-d3e97b172914a58ea06088d46e467be0.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-jwt-login-3ada0767be249ce4ccbdfd9339b2ad7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-jwt-login-8fbdf0ef245a8769540801975b5c209f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-lightbox-gallery-e6650062a97ccf46abe2dbd6696321ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-link-directory-015dffa63b4d6620c92e5c35b6af39d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-link-directory-79157f424e30fa185835500ed275b892.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-link-directory-7c915245e6d34ca005ac6f0296c41e2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-local-avatars-39a5dd9e98d6f265b6feec05166e7c4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-local-avatars-bc55ea7b509124d1a77831d4400c5030.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-local-avatars-c3dca1d1ef3a946c9ddf3e33caa00021.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-login-log-12a03041cb4314274c121ed3640d2d05.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-login-log-dccb2fad351753e7b3f64d92b4c6eda7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-long-form-5a0364c13a90f16b0ef1e911c302d0f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-mail-address-encoder-af3f71c6cb2b4348d03bef1b2409408c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-matted-thumbnails-6c5121c72e7c9f744eb347ac328d000e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-0e0241755c24b40325ed6519b8127a2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-127d546d7f94ec42c9601b4f8349bbdc.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-2f13e3a17e9723ee8fd643dcd4f4cb9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-3097ab413126701a31b2c663342da851.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-3586a3c704c10a9bba7bafa073bac863.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-3af100998fbed69cbdecde044b4ff026.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-492d26185e3f340adae3b16a9841dc89.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-4ad519606c4e4a0ac9ad3558c99fc1da.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-4ae0743589a43c31ae78715c1bb792c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-59892014ec81eb27e2ab381aff54e186.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-74e01ccc109391de849c5a0cd8cc8167.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-7928906e44428b2e974a49500a097fe0.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-85baf9c84f251fb6b49e11a866b547fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-a905027b9d2ec38752ee2efe0b3dd4df.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-c287a1ab95bf7ac0c8652093f1dad2f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-d6d556bb2d97483e57922ab9c509f981.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-d87695af989823f3f60bb3499466b104.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-db5dfd04511983fc7ceb561728d3d97d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-e1512d94164bf44f71f33d2c22c01840.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-ee68d2b7440e6b2e6fe5023cb49039df.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-membership-wp-user-import-c2be66a7e8a99421d368476b2dea75ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-mobile-url-redirect-8476462746ebfeabed27484bda97b80c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-org-chart-5ed062a5fc9035bd7e1a852f98a93b1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-org-chart-7a420ee74601bcf08094df0c89e9ad5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-page-access-restriction-f4f0364b52b62c50c67321424bfe5d46.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-page-ordering-05c2167f7f1f78fa58c980d418931b2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-page-ordering-1951707b594e6f4a4e8e4243b43c9841.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-page-ordering-4ae509b53172b618cff3a0afd6c091e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-page-ordering-bd26ccd939104e13f73f569b312459d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-page-transition-e261c5a60aee7d653735874a5f24eea5.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-pdf-viewer-03f092a688a4fa72580d80fe6ada5bb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-personal-message-b85cfdf152cc4ae0e3deb547dc1b6d6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-photo-gallery-8c2e6071ee4d4b147b6cf4ef074e12d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-photo-gallery-c565f2afdd0b7bcc15b5e1a59e0b33d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-podcasting-05c2167f7f1f78fa58c980d418931b2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-podcasting-48cf291038d407d0c14437de80bf836d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-podcasting-73081b1f6f4e13a9e6e969eba5e746fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-podcasting-bc55ea7b509124d1a77831d4400c5030.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-podcasting-c3dca1d1ef3a946c9ddf3e33caa00021.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-popup-8a828053bf646bd38f0facf7c997017f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-popup-images-37440742787d9f260ab4813dfe2d7c5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-popup-newsletter-eb9f0a8e4e92fb7cae75094dbbc288ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-portfolio-gallery-ace70e46c2c11dce25895020e8f9ce37.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-post-79a115d0225d5e6109d2bfb5d804fc26.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-post-gallery-dd18adf97d60be295e46212698edf568.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-post-notes-ae1d09ace0c5a27260a5b15fa0f15e71.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-post-notes-fe9aa9fc4f7853d3cc97f567a43935dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-post-thumbnails-a4aa366f217005e74322ff2bf7a0e182.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-posts-ticker-9431aa52549a30a720033bb06c5049ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-posts-ticker-f09df8170b914522627f58aeacdfb8a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-quotation-2ccafd0bfa63eb3f14f0d41c56ae0ce0.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-quotation-64c2c780c319f550380bf0e9ebd98976.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-real-estate-pack-4-b3837018bee9dc0f25b1197bd329be87.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-responsive-image-gallery-0be4bbe081fe5b1039259f84286874e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-restrict-aa5a6a671fb5da473aaf8781afbfa3bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-retail-menus-ff68da2306359b7fb7d2ec7bcba42c9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-revisions-delete-e8203a29d9dd8569fe66a5c0b614fae4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-schools-staff-directory-9d4cfba6200e394cef32d487f65ab9e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-security-2c08e7ca2855464050481f48ae1d114f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-share-buttons-adder-0e06afa272317d9b882c9a62ae6109b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-share-buttons-adder-47569f4c91357650e1a29f2c2f2817fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-share-buttons-adder-6b9a4af9881f034177e75898019a5215.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-share-buttons-adder-934f2b643137558d27d763ac97da6357.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-share-buttons-adder-ce6741d54beed2d67ba4497c046c28fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-share-follow-button-ab84cffde93b8e75b3b5fbb96c93d333.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-shipping-edd-c110f3311248c25cc2e6e53a20d9f8d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-site-verify-401f06c28c1cd430ed4024172948f5b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-sitemap-1523648bd0f24adc2a26d45bbae47ace.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-sitemap-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-slider-c8de5b2d5272ca0aa0591b883e38753b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-slider-ssp-596c1534922e10c637aff8c9e7564a21.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-slideshow-manager-a60c5d49ef21710901095695504b7608.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-slideshow-manager-f09c7ceacd429aa043a57b7468959d50.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-slug-translate-59c7d1a679853ce7b01d642a9cdae84d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-social-buttons-12ff7814319c3fed879573cad73d612b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-social-buttons-40fcf644d2fbb45e473e3839f27d17b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-social-buttons-7f383db1332d5a58a59f192dff645bd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-social-buttons-84af63ce54f1aff066c5cbc0224ece1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-social-buttons-89e9193b1c972a396e2f39602a9c0962.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-social-buttons-fa41e1fa9c47147fc51a8bf59061fdaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-sortsearch-dad17a0f7cc6bf4dce65968822857b48.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-sponsorships-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-staff-list-065f57f30aadd88480dc295cfdb7429a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-staff-list-7d02fb68117844792850ad968e93d6a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-staff-list-f7b0dea7fdc53cc395c11a147701c107.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-sticky-footer-e689aa17f6bf2fdc2c6603a9014c4c60.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-student-result-02a688a26a04ec997a303637d53b9750.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-student-result-1e87bae656b2627d83b3d372f1614a11.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-student-result-fbd5307588c0ac8cc334e800f9e7068d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-support-ticket-system-cf523f7ef0e6572480c576e8223b6d77.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-table-manager-51cc1e2fa9b76200d8c0e1cffbbd6dc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tags-1b628b6e919f163c78dec1ae22685875.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tags-4c56b6bb234842fef87202ea54089581.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tags-62ca43337bd991ee98ecbcd228da04f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tags-9af4513a0f46be16e18750162e487d0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tags-dbd78c6bc37635ee7558d00a91a8165a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tags-f897c75665f54f7b712469c3a1014b0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-telegram-for-wp-0564976f3c6b024a77575f33f874aa48.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-testimonials-showcase-af9704a1a0aaec6b76168fbe08955226.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-testimonials-showcase-f4692d4ecdfbe84f92ac77014c0e0a83.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-theme-options-d24630671f65fdbbb367bb893bfade3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-ticker-6007724142dc6c51f92be093926036d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tooltips-0a74f9768178c52be7335a4414a065a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tooltips-6284e6441b25b9ea2f8b947793590242.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tweet-0cd1e08a1b0cf9639f9192490f465d8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-tweet-27310a1dc2397e2cac54db00506a62d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-urls-15bda1e21fcfc4331fee33475b186388.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-urls-2b45864828a1aff6937ee7dc2951db60.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-urls-5110a92cba7ac370f8a4c5806d1c585c.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-urls-675d927de3b1b53ecaa9209929290da6.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-urls-ada2b4fe98d8efc08dd626edec328d75.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-urls-f2a5202240be9077b802b53424bd6267.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-user-listing-8fb6f9883fb5a7c53db96c756412e908.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-video-embedder-f34299764af595ef815c30af6bd496f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-visitor-stat-c6a09e1ae4216b85c7cb7a2c1a13117a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-woocommerce-csv-loader-ebfae304236d531958d5ca860f60e6f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-wp-sitemap-59259dfce205e3430d84312173c09724.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-yearly-archive-d3f480cf02dc331ee92b8ba5f6c29338.yaml create mode 100644 nuclei-templates/cve-less/plugins/simple-youtube-responsive-a8a2129053b6265336aaeb65bc0c164a.yaml create mode 100644 nuclei-templates/cve-less/plugins/simpleflickr-cf071fc2ff7ad6812b023519dad9013e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplelife-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplemap-50af53f1d764e968928a866f51c31158.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplemodal-contact-form-smcf-96b2063a0950eb9d73bc44532d96a2af.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplepress-1385e98bb73a78a4b3298f9d107fe144.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplepress-31ce7b8320b2e27875e4234cacbc73eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplepress-3f6009b49c4de5d656c7bafec85eed5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplepress-41182a8a3c15b1cd38397763553e436b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplepress-64b8d0d829a31289bbb915ba2b2eb077.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplepress-6673123aea5f3dacd5949ff035699808.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplesamlphp-authentication-66b6ce3815a5720d174a72208f049b60.yaml create mode 100644 nuclei-templates/cve-less/plugins/simpleshop-cz-b6921c4c41be466e80b527433949b2cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/simpleshop-cz-ebdc4e179afbae0e73d5291d7befe15e.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplified-content-f60018e6fdebf8ed4334a970a3e624c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplr-registration-form-144725995c15dd892b47406937b4c8c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/simplr-registration-form-669be7a13bf58d1940739fe39615ab4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-excerpts-01f45554766c9d4c4656369fac530065.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-exclude-9035cd59a4944d047d13b61802d65e13.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-gallery-block-11813679c9659f7e86b27269316b1760.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-gallery-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-gallery-block-e8011af8e84e91734034cab87d49e815.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-poll-cf17297c2e5d307d7deaa74f22821404.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-schedule-appointments-2a22d89645a206ec3980a097270f17eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-schedule-appointments-4875a2fe8d20d1fa49a472eba79255a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-schedule-appointments-8913b61e532a835b143f97f633aefd8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-schedule-appointments-97337e0bb5451938a58c2c753a687598.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-schedule-appointments-c38981be41bbef7485b5eec0cd09e15d.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-schedule-appointments-f9c99e185c0c70242a4641a50c06e0c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-schedule-appointments-fb1f94792250765f89467bf81e536614.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-static-7a5d96cd355dcc2c5701c024f2ba7043.yaml create mode 100644 nuclei-templates/cve-less/plugins/simply-static-ee067e98831efc015954686b9f2f926b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sina-extension-for-elementor-4db0da089db1959632856d530ba9ce1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/sina-extension-for-elementor-5549387f2d45c534d6b21b6c2a38d654.yaml create mode 100644 nuclei-templates/cve-less/plugins/sina-extension-for-elementor-85fafc88eba7f097874b28a387304352.yaml create mode 100644 nuclei-templates/cve-less/plugins/sina-extension-for-elementor-9a44744af3993590fe3bf014b0ad32e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/sina-extension-for-elementor-e224a4cb8b7e311ea14d699136e59c51.yaml create mode 100644 nuclei-templates/cve-less/plugins/single-post-exporter-e9772ee13db7edf1a8985c488222cdb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/single-sign-on-client-d5d7eb75824b8adafca40c78e85d9d96.yaml create mode 100644 nuclei-templates/cve-less/plugins/sintic_gallery-612c6db228099d10e3e66678f293335f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sirv-0e449c9a497e53b142f5674fb22e2a1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sirv-20f2364245cca99badf62beb26ca57f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/sirv-28a2dfdb4b89718535fa7dedda6260e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/sirv-56de812058629ef41442e0db5d74e172.yaml create mode 100644 nuclei-templates/cve-less/plugins/sirv-6ccadf7e1366ca3249cc5950850c4bdc.yaml create mode 100644 nuclei-templates/cve-less/plugins/sirv-da89f8a86000f654eccfee96ffe3f6a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sis-handball-1d1308e4009a475d471dafd71ee14d32.yaml create mode 100644 nuclei-templates/cve-less/plugins/sis-handball-3230f7ba42466d011feb76d708212b0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-audit-e422a5cf5dae135dafe01672b0f3ffbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-editor-d269819cdfc64e9b2366e7d4a6d8de82.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-is-offline-plugin-fcfe12c9ab0b540a8002a6b623d72f95.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-notes-a184b0331f3ba7e840ac7ff2eaf4f219.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-offline-27d8a1199f49c828fd2eeb0b1780c2d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-offline-4160c9c4da480f4b3c030b1d1b582ea6.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-offline-f94ad2e40424de33128764065d19c984.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-1d382a2cbfe1692803bdc9f5974b02e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-27b5597908113501f4beb8489633cce4.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-363cf849a90f39fbc05b59e8ab91a270.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-5d6957b18909422bd5f841b070340ee6.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-68354cec14dcc6c8c5561bd362f6a851.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-a344469158b924b0533b76919c9daf70.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-c2ad47353175f44f004de63cfd387b37.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-db3e14a64935e9816ff1fc8cb2d49569.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-dc0678502bda1f209b1b74a11263e93c.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-f51b1e88d3f4e8a3ab51d6b13ceec3ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/site-reviews-f8a3890c58a293ea8072e2174a632bd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitebuilder-dynamic-components-a6ba1a0da5df7762bd146ece37b9f32b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitekit-1db1c2d5f1fad40eb6b6cd9715e502a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitekit-50ade2845c53f4bbe684ddfabd1bfd64.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitekit-d10ca8810c9a238a95e8c428f2cea03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitemap-by-click5-61a8c97249e7ba41d1f71a1052bb0639.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitemap-efa61bc9a560990c025c5047443643f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitemap-index-e71a52c7f200dba2edfeb838eff9f8f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/siteorigin-panels-7b1460489673c879f7bd7cd256d22891.yaml create mode 100644 nuclei-templates/cve-less/plugins/siteorigin-panels-7df5e5754fb5a3c3ef39f58481635571.yaml create mode 100644 nuclei-templates/cve-less/plugins/siteorigin-panels-86d73827337d8244a557bb98a9e7b2f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/siteorigin-panels-e99c33f11f772bd71a3e435320a873d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepact-klaviyo-contact-form-7-2583927ebea3f6f03dee7ed526491728.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-15159729e5663620758ffbfa0eee6068.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-1695c167f694fa63c272f7b2c5254e2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-46fa110da1e59fdc31ecff31d6e6ec62.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-491308ff9993e601a9660084e0636c41.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-6692bd08a8b42e4b9b60d9c07beac88f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-70ddb8ac3ce5b7c3fc2fb83f47b8e6a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-9389937eda8b2fc2252c70c4bad38de9.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a1547a2e9b2e7ebf2c891fd062c403d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a6e3a37b161efaa29dc8fd7f5584611e.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a91445aaf81e735f1118d6cfce37548b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-bf27f6ce9ebbfb831479a794b9f49858.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-fc97a63071c0bdeea490fe1b61f06d10.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitesupercharger-4151801d30351f47d79a16fa8ebbfc4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/sitewide-notice-wp-9903b310d82da078ab37bcb7e6aa7858.yaml create mode 100644 nuclei-templates/cve-less/plugins/skaut-bazar-9c08f0f48da441b0237405decb3b5169.yaml create mode 100644 nuclei-templates/cve-less/plugins/skt-builder-b8c540477ad8f7b59e43be9ed6a57e18.yaml create mode 100644 nuclei-templates/cve-less/plugins/skt-templates-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sky-elementor-addons-f0d3919ed390e73df44ed1542e1a826f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sky-login-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/skype-online-status-05ead7ef23623d246fc2b9a535b5761b.yaml create mode 100644 nuclei-templates/cve-less/plugins/skysa-official-8b895d6fff8c69659029604aec394ccf.yaml create mode 100644 nuclei-templates/cve-less/plugins/sl-user-create-0b9b027562576dde68a9c5ee80494e44.yaml create mode 100644 nuclei-templates/cve-less/plugins/slash-admin-04cfad21aa5454a8d771191b1d8fe82b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sliced-invoices-3f2e88483cb032a762f3e5f925264d0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sliced-invoices-3f5afe1c06de95e459f12d16b7792b0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sliced-invoices-65575bb9311bc9f57fa766150b890bbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/slicewp-17722d2484373a19ea1df8b15b8f0eea.yaml create mode 100644 nuclei-templates/cve-less/plugins/slicewp-1e57a0095a9d05c5ba61b4bee5ed304a.yaml create mode 100644 nuclei-templates/cve-less/plugins/slick-contact-forms-5e71c24603564ca342c0b82fb64d9b20.yaml create mode 100644 nuclei-templates/cve-less/plugins/slick-popup-f2cee4c0f9afdf3e98814a937701d9b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/slick-popup-fe295018c777f28527f026c1db66229d.yaml create mode 100644 nuclei-templates/cve-less/plugins/slick-social-share-buttons-40d20dcfc0a9c20d06ce00b51231e085.yaml create mode 100644 nuclei-templates/cve-less/plugins/slicknav-mobile-menu-5644317bfa18cf11b8235cb40790b4ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/slickquiz-3395165ceb6b70322e35bead04697388.yaml create mode 100644 nuclei-templates/cve-less/plugins/slickquiz-53a30d941da402857e0ee8cdb2011b69.yaml create mode 100644 nuclei-templates/cve-less/plugins/slickr-flickr-46b167768e3cac0676fa19e5201075cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/slide-anything-125fc22aa1fac173aaf79b805fc0dafc.yaml create mode 100644 nuclei-templates/cve-less/plugins/slide-anything-96440e1a43df69d4a2a108bd78a1d55e.yaml create mode 100644 nuclei-templates/cve-less/plugins/slide-anything-dba115ec2b96e48bab904dedd2103380.yaml create mode 100644 nuclei-templates/cve-less/plugins/slide-show-pro-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/slidedeck-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/slidedeck2-5efee1538ea17e01965c435ea80717db.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideonline-09f92d564944a33a7811dc40429fdb32.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideoptinprox-5b04e98d5ed9360b3ebe4e58880d2319.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-by-supsystic-5a964b37d1f769e559a3b5969ea09bec.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-by-supsystic-63a1aadd7fd62f660af4d37169d1f541.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-by-supsystic-8e2647d10010d639fca262268ba703d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-by-supsystic-d94ab49d4d8adfed309a34be052981f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-factory-b04b6aa85a76ebddc71c9e203d10773d.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-factory-d5d65492c7b3878ca773e2f63b4a08a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-hero-3adbda03e672466ae4cf2477d48f1715.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-hero-4fef6f3c1b2c07adc38d4a7abbb8304a.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-hero-53fef4883b3ae390bd3ce74f9e9ddf6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-hero-f2a7736ebfea66ac36ad813725de381e.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-image-d1752e9520f041ace82927039ac74f84.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-image-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-images-ed271342f2446f50a4b4b39df1d986d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-responsive-slideshow-091efbe9d1188b98a534caa4402e018b.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-slideshow-4b10785e370a78ae1450447cedf61d9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-slideshow-9cf47a9aaadc1341f9d7d43e1e7e02f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-slideshow-ba96af4ca3ffeaa3bcc3879d978146cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-video-93c0b4806bb82af1f99b4d0c878535e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-wd-0f314421e3eb6001edc6ef983cf272a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-wd-330b086d5a163173ce80e7bcf35592b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-wd-3ca395cf4457963d99cc7df0953a3124.yaml create mode 100644 nuclei-templates/cve-less/plugins/slider-wd-f2f66b2c0dd30886e21fe41a945038db.yaml create mode 100644 nuclei-templates/cve-less/plugins/sliderpro-55b1133e21935d007c80035f80fa6446.yaml create mode 100644 nuclei-templates/cve-less/plugins/sliderspack-all-in-one-image-sliders-cabe168b618270b5c6e54c5ab98ed27e.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshare-9fb99305b4730cdc01315914158330a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-ck-315a1c5d119a58cae4d57802c27a1504.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-073c0ab3bbb78673d0076b71747b0b85.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-0c2f46d7d5137da04a7f7e4fef5f160b.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-173ff175ba6504a9e007b9120074cdb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-2-000c49df1eb1fffb19ba2879f7922470.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-3930a563943aaf08712d2221306b606c.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-3f761f29ded0c3fd592cbc7b4d2d4ba7.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-44893e4f1aa00774102d61f70312168f.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-4dd9a3ba0bea201c247a65cf330c4a19.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-5e35179f25bd306b0effea20785c4fdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-710832b220893c2e7b26cd41c7676342.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-9ed3ad19217255e206c74e32650683d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-a6e5defdd0b61862c997e167d9ee2576.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-c799988a889ed03a659b8598e8dac08b.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-ea214ec811be5112708a570a75f3ddc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-f4f28ce30d47491a4cae733a861ef690.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-gallery-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-631caed2c41cece190cfd835b6648401.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-74a8ac0075a235e0a0c14b0719aab19b.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-f45ce441ba6fd10c3e2bec3c1e3949b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-se-0d198fa5a9097295a41f947e62ed164f.yaml create mode 100644 nuclei-templates/cve-less/plugins/slideshow-se-4c2a731e32a3d9201839b73fb37eef51.yaml create mode 100644 nuclei-templates/cve-less/plugins/sliding-social-icons-40737c0a7a095d43140be7cd03a62330.yaml create mode 100644 nuclei-templates/cve-less/plugins/slivery-extender-5621a7def81227d66a22e352451dbd2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sloth-logo-customizer-cd301beffca3145a1148fa46876e8ecb.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-app-banner-4d6efde8bb592c906d33a37bc632b9bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-app-banner-bc7de60f28ed50bda8c32e87282861c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-cookie-kit-66eed7c58e1298fa04981c6c1b2ea3cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-custom-fields-0d0a2f550b1652e990ebb3d0da6393ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-donations-183ebb9bdb87985c4ca10ea8af8836ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-donations-37dbc4d1c954090682035935efde0d58.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-donations-575d541f48b602d18582347a4f3b977f.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-donations-6f7b5cdd2c06fd389f02600d38bca12e.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-donations-974f0ab4bb265d59dbd405aba4fe0b7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-donations-a9d63cf96793705be5a47f94a1b589be.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-email-alerts-ceb6447b3a16776fe0078a55abeaee38.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-flv-f4124706d0e19c3b0ecdc824e2dde79c.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-280e3b3d0994374de6814f38b2990648.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-305aa37d733d46f38e2d556cd38a63ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-3928f6f30c541722320412a9e71021b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-96ab3b40e77e6543e8b3a6fdd1944579.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-9c331f426cf6396a6a2c802b7f7eeb8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-a4a6f5b9e735cb14d76827d4a578ff1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-a78ee203ec03252165376f049d05071b.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-c396dcb95eb5f0d3adb51913e8a502fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-forms-e55616747ddb7edf848ca48c3c65a365.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-google-code-inserter-61d92e4ca30273cfa735fd279e1d5fd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-google-code-inserter-8f4c726ec3ff968264c33031aafd5dd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-grid-gallery-9226076d86703169a8ae6d270bd5adc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-id-96cba560d28a367fadd5acf394466224.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-logo-showcase-lite-32a522f1c04399b883d41fab9d9aff30.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-maintenance-mode-9f6fe676338d7fcfeadb295b51a36459.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-manager-for-wp-e-commerce-0489a9c545313d7845eb08297287eaa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-manager-for-wp-e-commerce-51ad2e96cf8162f9d2be287019b590c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-marketing-for-wp-5d316e62377c24672c816fca478bdf84.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-recent-posts-widget-0b26b05fd72223ab78d0eb64dadbd40a.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-seo-tool-8ac688a05969c32cd04eef86b8133c6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-seo-tool-b76eb61ef2aa1f7567f1609609758512.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slide-show-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slide-show-c97035ebd849b96be34cf1445f8283fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slider-2-4e3fd84eb31659b1ac399191d2db7828.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slider-3-01aa5492a4b5bc7532a3a46a182927f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slider-3-39ab4c2294aa56f29beb5a701f23e19b.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slider-3-7fcf2911100968a88895e890aa0259dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slider-3-b789e3115d873b4f1d599f40302f434c.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slider-3-c9194ffc50bb3f8abe6f00ef14c4cdc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-slider-3-f451ba2e71b9d178f196c4bee4c708ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-variations-images-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-wishlist-for-more-convert-f6b44afa42d4e9ad47e5de4f61561c71.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-woocommerce-search-517aef4b1533709bdbf95e8d657f10e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/smart-youtube-94622a9541e2d7c1e56d077f426d64ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/smartcrawl-seo-0f5c5f0145a23c33dd91c0c052718e6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/smartcrawl-seo-b9c11b54952021362ff03d2b884e46b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/smartideo-eacbf719bf265fc7ee4ac85dd80a065a.yaml create mode 100644 nuclei-templates/cve-less/plugins/smartkit-43e0cd9b2e64838710c022fed726ad02.yaml create mode 100644 nuclei-templates/cve-less/plugins/smartsoftbutton-widget-de-botones-de-chat-681d5f2f15a561b04bf2e029cc02c5b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/smarty-for-wordpress-67cf82bcdd960b08b194bbfec613a24f.yaml create mode 100644 nuclei-templates/cve-less/plugins/smarty-for-wordpress-714adebc0f79250fa11c7babb8af735a.yaml create mode 100644 nuclei-templates/cve-less/plugins/smokesignal-43890f1f23768c00ae2a757d58110ef2.yaml create mode 100644 nuclei-templates/cve-less/plugins/smokesignal-c0dc18b21bfa2b86d77830cf4a915b55.yaml create mode 100644 nuclei-templates/cve-less/plugins/smooth-page-scroll-updown-buttons-c1380d1b7ef910c0603f14abaf611a7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/smooth-page-scroll-updown-buttons-ed5e303cb61bf4126d5ebc5c9cfb7c58.yaml create mode 100644 nuclei-templates/cve-less/plugins/smooth-scrolling-links-ssl-3ea22c02a19639aa3b53bac3d8c83192.yaml create mode 100644 nuclei-templates/cve-less/plugins/smooth-slider-5e7c4bc77fb9b2b637c41f55c55733f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/smooth-slider-60f28a7307d8376de999213f19e8d5bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/smoothscroller-2cf2ecadfdb85fc26b2f2d1670a74a60.yaml create mode 100644 nuclei-templates/cve-less/plugins/smpl-shortcodes-c3292186ff6270827e326f6eecd76002.yaml create mode 100644 nuclei-templates/cve-less/plugins/sms-alert-7c8a4badc44767125cd457fdcb3a6ffa.yaml create mode 100644 nuclei-templates/cve-less/plugins/sms-alert-d6a49c02628ddcb69bd8644362723660.yaml create mode 100644 nuclei-templates/cve-less/plugins/sms-ovh-71d3c20a220713a113b92e288fcb3219.yaml create mode 100644 nuclei-templates/cve-less/plugins/smsa-shipping-for-woocommerce-a6b4638155101fd9dca73e44a2714579.yaml create mode 100644 nuclei-templates/cve-less/plugins/smsmaster-43a98edb387e539611a5da070feef314.yaml create mode 100644 nuclei-templates/cve-less/plugins/smtp-mail-504075ccb58d6f87a992a01e113a99a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/smtp-mail-8790e1fe54b5de31a7c208c20bbec007.yaml create mode 100644 nuclei-templates/cve-less/plugins/smtp-mail-9b2a41c17f324bc427373274ec0c74e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/smtp-mail-c45322aa4144e7836fe027084e2d3416.yaml create mode 100644 nuclei-templates/cve-less/plugins/smtp-mailing-queue-4f005a53f32a91b958c425e9676f1ab9.yaml create mode 100644 nuclei-templates/cve-less/plugins/smtp2go-702ceb7e56323b84fbe97e278b8eb74c.yaml create mode 100644 nuclei-templates/cve-less/plugins/snap-pixel-778723489fb152c7cb9e920525174271.yaml create mode 100644 nuclei-templates/cve-less/plugins/snap-pixel-ed4eb2c4883d6e7594e77a8d9e41fb0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/snazzy-maps-2c0772cee08d9dbe384d352f3239ef5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/snazzyadmin-wp-admin-theme-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/snazzyadmin-wp-admin-theme-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/sniplets-4361e4878576bdb762f0e4fba9f0435f.yaml create mode 100644 nuclei-templates/cve-less/plugins/sniplets-4db82812dea0cad0cb375ee4495ca7c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sniplets-5f1f84d548433ea33fa547d3daa5b883.yaml create mode 100644 nuclei-templates/cve-less/plugins/snow-monkey-forms-4c37447306ccd460df466d06d390970b.yaml create mode 100644 nuclei-templates/cve-less/plugins/so-audible-64658b8ae4088e2d2245fcf0b29be320.yaml create mode 100644 nuclei-templates/cve-less/plugins/so-pinyin-slugs-8f29322bf5d9ac8d382567725e776aae.yaml create mode 100644 nuclei-templates/cve-less/plugins/so-widgets-bundle-81727806f0ca35ac1a1911812f8bc5ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/so-widgets-bundle-9b450d4afbc0c12b819c42370b2e9a09.yaml create mode 100644 nuclei-templates/cve-less/plugins/so-widgets-bundle-c33a17581ea3c88326cc98d137f0e313.yaml create mode 100644 nuclei-templates/cve-less/plugins/so-widgets-bundle-dee8b4970935a0806a128f5493b5e0f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/so-widgets-bundle-e42a9ef463fb91cd20488d17488f8aed.yaml create mode 100644 nuclei-templates/cve-less/plugins/soccer-engine-lite-b9c46b0a4fb09a909818464ef220a0fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/sociable-4c5051d5f52547e43ba1e2683a220c8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-autho-bio-0d0deecac2c086210a1797922eb618d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-buttons-pack-aa3e1a0b3ade1f54e4f5b1a7d2b7227c.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-connect-4382e753da7c1d916f58a427140d32b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-connect-c1236c0c6ab8ee5053b35b87bf461df3.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-count-plus-db555c53112ae6b4ac441d3b5a76ee6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-discussions-d6c0976e89582e9e5113b1695c4b2cd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-hashtags-941b5bba10cb296e00cbfe0b3138a5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-icons-widget-by-wpzoom-9590c9a713d41dcccd250e79c2d68a75.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-locker-6b8f7b7b7105323e383724ec1fbf543e.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-locker-a5378db9ff5e403b6611ab949a2e8073.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-login-bws-70c3e0a35f7627ffa035ef5b1d41e423.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-login-wp-338164cecd8fcca43099976a3c20b294.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-media-builder-d57b4e44c91b72a924430dae58b27aa4.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-media-buttons-toolbar-99651f4102212266ab89ea9f71ca952d.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-media-feather-1588d8e6d7413910cf24de603f48ae6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-media-feather-fb9c081792eb804457cb99e8fe8f106d.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-media-widget-276bb0253d9d90921d2b50bb63655a6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-media-widget-2a26b1ebd615a5a8ab227978499778fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-metrics-6685df96c78b040fc19a70ee58d84842.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-network-tabs-b4a4ad1fab127bb574b5a124686073ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-00a3fc8db4a9ccf9c23a6b373ee7039a.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-0a3b3d0ea7c2929f39d0e12eda2eee2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-0d23421a7bc38a06fa339a0b7dfcab21.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-26e31433d5fce5f379c3acf232bae66e.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-51832005d17a1bf5560310c763dc4026.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-78405f03bea86dc35a1c5e66198ba314.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-c00ddbff9a00f61bfe31a00b389503a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-eb56bf16494883e891ab8b3be05b8bf5.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-photo-gallery-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-polls-by-opinionstage-fad318487dd970b284385e44520c85d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-proof-testimonials-slider-f60d70179169d7470d698c285c73d2aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-pug-010c78c3e5a7548cd6f10c07c7e5988f.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-pug-1553916233de2092a6a61d801beae073.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-pug-614c612f12b893f0f92f502ce23d7035.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-pug-870c7bd1810589217dfd341e2045182a.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-pug-b2adf01153d5956e8d9a8d75b32e133c.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-pug-f0354930e8182da4de2a1a00399f0307.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-rocket-219e55994660c3c36e84474ca074be21.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-rocket-d503115e692639756bb3a2ffdde34c03.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-boost-362e89b41145042eb5431e45e53b6db2.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-boost-68edca1ac76c8646936a8dc6a3f4659d.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-boost-bcdb06e3079fdbbb06462441ceb79bc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-button-de24827a638a2efce744c6eade7a73f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-50f3815a7306e514f6cb6f2669b958ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-aa18dc73a5ad2f3458b2829a667a4dbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-cda45d54f4a107e20020517047ad5ad6.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-daf56c568297c549e428734f0390b5eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-db671b595a6de4259366a24bfd717a43.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-sharing-toolkit-b594ed2c30b3954ae4ee7c97ed6645b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-sharing-toolkit-dcf043d6af78599175beab95bc8309bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-sharing-toolkit-fab081bdfce9f805f8a61feef8468916.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-slider-fb94da76ff281a4e13dbc1c86ed0929d.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-stickers-54c5f87c18eece344632707c2a248764.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-tape-f65f1ef88d2d62f17ad5f25db5f837fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-testimonials-and-reviews-widget-109bcc0df2db9108727b125f1715f024.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-testimonials-and-reviews-widget-cfc720059dcf0db5379f24aec3318afb.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-warfare-18ca8dc6d6eaaf78aee24ea0452c8428.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-warfare-357fbb3649272b57b08a032d33621319.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-warfare-aa4bf5d698c5cb8e5401cc2cfa4e07c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-warfare-cf2b6bb9f998ed8bc8db5b63bcf57bd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-warfare-cf38fe10bb49e0d1d6d84b988c9ef72b.yaml create mode 100644 nuclei-templates/cve-less/plugins/social-warfare-f488a9133074cf6ace7e478b0a192bb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/socialdriver-7c3165415d7bf963906af20d2c357430.yaml create mode 100644 nuclei-templates/cve-less/plugins/socialgrid-ee08b0491d28739787eab972fee61b21.yaml create mode 100644 nuclei-templates/cve-less/plugins/socialmark-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/socialsnap-7cc4115eca0cf9c161547f1b88d6e0eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/sodahead-polls-18fe02250ff137adf75ad3081c09ea5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/software-license-manager-664ca2d87dcbd63deac8c49c5554db17.yaml create mode 100644 nuclei-templates/cve-less/plugins/software-license-manager-b0e0ed74ea2c963635231dd123335584.yaml create mode 100644 nuclei-templates/cve-less/plugins/software-license-manager-c4fee1f627e8de419abb2cb77fa742f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/software-license-manager-c95ffe646d0a761b10647658a7c40d15.yaml create mode 100644 nuclei-templates/cve-less/plugins/soisy-pagamento-rateale-b75ef217a6365bc215b41cd9f7c0293c.yaml create mode 100644 nuclei-templates/cve-less/plugins/sola-newsletters-6e0c27e6aa8bbd23ae1645c9db38ce34.yaml create mode 100644 nuclei-templates/cve-less/plugins/sola-support-tickets-753b1cfc0cff5215c4137639d86b10b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/solid-affiliate-390f815591982373c000eae4c03f7206.yaml create mode 100644 nuclei-templates/cve-less/plugins/solidres-22545828b4d21f4c13980a9fc5313fe5.yaml create mode 100644 nuclei-templates/cve-less/plugins/solidres-a159294bbf51e0b7e5b555bc0921d9bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/soliloquy-lite-6360ed6ca296565a491121426d09e439.yaml create mode 100644 nuclei-templates/cve-less/plugins/sophi-c3dca1d1ef3a946c9ddf3e33caa00021.yaml create mode 100644 nuclei-templates/cve-less/plugins/sort-searchresult-by-title-973fd490fc9004516881a731f3c2d83a.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundcloud-is-gold-4ff0e478fdb270b77d40058c8e73075a.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundcloud-is-gold-97e81ce09ae72195c5b04d7f6a992589.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundcloud-is-gold-a72a870d8ea76185ed68595992193f58.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundcloud-shortcode-69235207b58aed8fe2c8ecd662e7a82c.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundcloud-shortcode-dc226a4fd8674625d0b38158fd388bcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundpress-8f924182750ff29f56bd3ee7a3546db5.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundslides-6d1532fdad80760bbcdb59b753aaa43d.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundy-audio-playlist-4c3c497ff4bf73b3f95e774197f4a725.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundy-background-music-aae33717a53aff7e44346754fe498f79.yaml create mode 100644 nuclei-templates/cve-less/plugins/soundy-background-music-c6e943f02c816d59dc350abe53cdb37c.yaml create mode 100644 nuclei-templates/cve-less/plugins/sourceafrica-1a4e07a5bd173dbacaf88e7f59c17b91.yaml create mode 100644 nuclei-templates/cve-less/plugins/south-pole-the-offset-movement-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-04a07a765c467ba9a937f6672ca388bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-06564215bf3fbac51cfe3cf6be605864.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-2363aa1bcf8789d416b82d1e475636e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-2850eb23becb886717557cbcc134de27.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-2d5254568244460078b2f5ebf11d2614.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-3992d1400a14226b637a309e355d88df.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-401b607f5d2e6f27bfcb5e6df2983f64.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-5c5bdc3c3fb1d75ed0dae2921575f884.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-617c1b1381aefd6f7fe9c5ab76d6b608.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-68171971cc36274d03be6fb322c19104.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-6fe68888cdbcff1f92e26aa3597b8cee.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-a887472c18a8df1556ea7f4984db4ec4.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-ac1431b1561b6c549c99a1b7125f3596.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-b4c26568b976acff74ff99cb773e576a.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-cb1e1ee6d4a86d7ed0a6cb77ed172c33.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-ce5dcabcccc42aa46e68f15d61979ef3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-dba53cd3548af35e05600706ff16691a.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-f2cabdaf778fd02d270ecff63ff16022.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-f424267505cbcf902cf4e60fa01acaf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-client-document-manager-f55d9ddf38ced2af39de4e46518b9654.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-faq-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-news-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/sp-rental-manager-41e16d89dcc64533542d0355200f7979.yaml create mode 100644 nuclei-templates/cve-less/plugins/spacer-d06ebbe7f6b16be606d476a52581f74c.yaml create mode 100644 nuclei-templates/cve-less/plugins/spam-byebye-e9caa2ebc5663770aed9ca1501187910.yaml create mode 100644 nuclei-templates/cve-less/plugins/spam-control-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/spam-free-wordpress-82c72f71ce0609e7f3c0c0507adae482.yaml create mode 100644 nuclei-templates/cve-less/plugins/spam-free-wordpress-cbc5e9eb934f71de91a8cb0463db32ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/spambam-ba683037cf589f0cf1f070f5a09f7594.yaml create mode 100644 nuclei-templates/cve-less/plugins/spamreferrerblock-376bf43456853b74eb2f520d8ce53233.yaml create mode 100644 nuclei-templates/cve-less/plugins/spamreferrerblock-8abe61b53911c7ef41a9f9b79b5a7a76.yaml create mode 100644 nuclei-templates/cve-less/plugins/sparkpost-74a58305bbc22438aab63e645d576e4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/sparrow-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/speakout-a008170121378cc4ebae8dd26f86a202.yaml create mode 100644 nuclei-templates/cve-less/plugins/speakout-bfb97206bbfb6336668e50882960e16f.yaml create mode 100644 nuclei-templates/cve-less/plugins/speakout-c91bb87bc2ac78b385f1ba0404999869.yaml create mode 100644 nuclei-templates/cve-less/plugins/special-box-for-content-abc7b516295a7f19088f575460d378b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/specific-content-for-mobile-3ebf96dd87dccb36e3b3f1a2a1f3837f.yaml create mode 100644 nuclei-templates/cve-less/plugins/spectra-pro-995df7f208463f40decef18bc20c7cae.yaml create mode 100644 nuclei-templates/cve-less/plugins/speed-booster-pack-076ba2e4af7ca8a46ce67983592fc4f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/speed-booster-pack-221fa8b539336ea57a6760f06055d98c.yaml create mode 100644 nuclei-templates/cve-less/plugins/speedycache-226c23fcac1339a85375c1a4fa7531e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/speedycache-54778688cb39f84f341e249c6ffef279.yaml create mode 100644 nuclei-templates/cve-less/plugins/speedycache-e22a3c007f773a45322f383ac43c3a2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/spice-post-slider-65a9626411491f24b8c3f89e82e2b81b.yaml create mode 100644 nuclei-templates/cve-less/plugins/spicy-blogroll-6adf85227442a25ea6b65f4f4a3a9b6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-calendar-f2155ebc56a5ab206ac221be4f14be59.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-event-calendar-1e97950fcbacf9ecbb58beed5fdc2b28.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-event-calendar-2ed7504786f2c69f8fb1940cf29e910f.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-event-calendar-8e5f1d8103bbbd8289c9adf60d58fadc.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-event-calendar-f7cf93aa76a02f42c50608fccf671ed3.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-facebook-3419ce492dfca943f0e1d53900563907.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-facebook-69ea852e8d20e1b9095ff76a5199f22b.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-facebook-8a173d0b76b8837ebc37d42174f4f25c.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-facebook-913a3de69251f92dd6bb96cf67b3c77f.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-facebook-e8946bc978834049177d3e02187e8035.yaml create mode 100644 nuclei-templates/cve-less/plugins/spider-faq-b0259ad6d689e8e7c0c44fb374384bbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/spideranalyse-0c25180cc619839b0311e294d1b3cbd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-6758599a3791f7538bc2d472bcdf24af.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-08f37baf7169a857040ffc59c0868398.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-154bfb5b4169e90929a178c26caff90a.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-1777236d571c6ec2a8def6ba8c1b858a.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-3e09107013e755aea584073e7dd4de99.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-75045db4676725000c0fe50648ef7533.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-96ead8130baf6f3e4de85814e7242d2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-9cd804229a710db23428eb806db45e23.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-e0473e70c98ee61e4fe5a38893d2153e.yaml create mode 100644 nuclei-templates/cve-less/plugins/spiffy-calendar-ec679d8af6cf4a084b96b00c5d5a19da.yaml create mode 100644 nuclei-templates/cve-less/plugins/spin360-8be8bdb7ee929f691ca61327631de08d.yaml create mode 100644 nuclei-templates/cve-less/plugins/splash-header-ab94523f6e880edfade4cc9deca8c597.yaml create mode 100644 nuclei-templates/cve-less/plugins/splash-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/splashscreen-2fce51431212ec05fbe8e4b6de6695f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/split-test-for-elementor-b7e73505abb95891d8cab73e20eb43fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/spnbabble-124b0c02e423c613251c0019e72c2c54.yaml create mode 100644 nuclei-templates/cve-less/plugins/sponsors-carousel-eca4f2076644e75e750957ea6e558bad.yaml create mode 100644 nuclei-templates/cve-less/plugins/spoontalk-social-media-icons-widget-9197b8a3552582e2b7bb578d10695dcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/sportspress-12303619a441af1cb4218513536dee14.yaml create mode 100644 nuclei-templates/cve-less/plugins/sportspress-6844db7940c370d06922bd9c5958a18b.yaml create mode 100644 nuclei-templates/cve-less/plugins/sportspress-e4e04326ab22918580d15e25fd27ca8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-298d6bd79a1c9c5409fd8603fff56484.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-31672843b36374c6d9bc9abf980ac503.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-a7c9f85c93718ea45a6837bae9a163d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotim-comments-ad069f3a56279cbff65458936b83abde.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-2d33cf6aadd9c85f7e657c07e30320a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-383f0a78726324384b13637bfb824e6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotlightyour-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/spotlightyour-a5f4f463543df4d2c732d202ef98faae.yaml create mode 100644 nuclei-templates/cve-less/plugins/sprapid-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/spreadshirt-rss-3d-cube-flash-gallery-a406e3b1989f167ebfda1e3281f7073d.yaml create mode 100644 nuclei-templates/cve-less/plugins/spreadshop-1fd62c5f484f1392e0781314c57798c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/sprout-clients-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/sprout-invoices-59ac68597f5d4f0100ad7ca8fa79cc45.yaml create mode 100644 nuclei-templates/cve-less/plugins/sprout-invoices-9a71754acff1f7a8a4e0b96c58483fa2.yaml create mode 100644 nuclei-templates/cve-less/plugins/sprout-invoices-f12b94e3ed29f6a01de55ac0eaeeefde.yaml create mode 100644 nuclei-templates/cve-less/plugins/spryng-payments-woocommerce-a5194bfa9db34596e371b3fb9a988aa4.yaml create mode 100644 nuclei-templates/cve-less/plugins/sql-reporting-services-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sql-shortcode-a25bdc4c7adc28787a5a6691ec7b0deb.yaml create mode 100644 nuclei-templates/cve-less/plugins/square-thumbnails-e4179682cad3bde3b1674a51f6f83b60.yaml create mode 100644 nuclei-templates/cve-less/plugins/squelch-tabs-and-accordions-shortcodes-5bf6caeb14a9d5459f5e8842d7b83fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/squelch-tabs-and-accordions-shortcodes-a40320a58f3885e7d8eeeafc625b97f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-5af8eacf37d85841618cfbc1ca1be43e.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-6478aae484fa31cdf3168da6c2ae9db6.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-6e0a660167cf480a4e16e426dedc8853.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-83717a76e7400e087835909cd79a400f.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-83878a85b5ef451846cd41cd6a228f4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-97aa7aa2977bb6f3604b4b418beecdeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-f98418e2a88f3c300252df6d0a548031.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-ffbd02fc4497b01dad7c0fa802b669cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/squirrly-seo-pack-24ebe2280a642d19c25498acc13aa5f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/srbtranslatin-4393e503b4c5e360e86d4cf75de99b91.yaml create mode 100644 nuclei-templates/cve-less/plugins/srbtranslatin-acbdf42f0c9734064513cf6368d19553.yaml create mode 100644 nuclei-templates/cve-less/plugins/srbtranslatin-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/srs-simple-hits-counter-30c7579fa3259d02083eb82bd53cf64e.yaml create mode 100644 nuclei-templates/cve-less/plugins/srs-simple-hits-counter-44e9876427663f96d92e4c3c678955d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ss-downloads-a491a4eb2f6511d2fd18eb2730601144.yaml create mode 100644 nuclei-templates/cve-less/plugins/ssl-atlas-free-ssl-certificate-https-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ssl-zen-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ssquiz-7e5a458fe10904a2f1fd482c3506274a.yaml create mode 100644 nuclei-templates/cve-less/plugins/st-daily-tip-2145217038a04527e759e3c42206ab95.yaml create mode 100644 nuclei-templates/cve-less/plugins/st_newsletter-3701fafb074b402084511d8e3b04bc0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/st_newsletter-84952e15b91150d8294a112b87e25b78.yaml create mode 100644 nuclei-templates/cve-less/plugins/stackable-ultimate-gutenberg-blocks-36fca09be33f968137213dd9d8d406cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/stackable-ultimate-gutenberg-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/staff-directory-pro-ac98669a164eec200e7d954863b49097.yaml create mode 100644 nuclei-templates/cve-less/plugins/stafflist-23bc4348b9c1d4b0887cf4fec0175219.yaml create mode 100644 nuclei-templates/cve-less/plugins/stafflist-f5c3047a64378a59b5a46efb892afcac.yaml create mode 100644 nuclei-templates/cve-less/plugins/stageshow-63519f47d94f5357008fbc9245726b8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/stagtools-295c71d391fe6f97f05c0f5bc739be92.yaml create mode 100644 nuclei-templates/cve-less/plugins/stagtools-5f2953556f6ef8b300e083b724959d0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/stampedio-product-reviews-268eba465e26dd79ea6cf3787bb22b93.yaml create mode 100644 nuclei-templates/cve-less/plugins/stampedio-product-reviews-f7de3a4183d7c85f1508bd7bcbb56139.yaml create mode 100644 nuclei-templates/cve-less/plugins/standout-color-boxes-and-buttons-b00282494ef0f9932dc7277c14e145b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/star-cloudprnt-for-woocommerce-346e0f78c8914c5524619c3f260ec3fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/star-cloudprnt-for-woocommerce-68ab25be74477c215ab2a821dbee384e.yaml create mode 100644 nuclei-templates/cve-less/plugins/starbox-55749978c55c3ff34eeaa5813711f342.yaml create mode 100644 nuclei-templates/cve-less/plugins/starbox-750a764136a41cb3d1ef7fa35a4e6897.yaml create mode 100644 nuclei-templates/cve-less/plugins/starbox-97fda38a75735b5bdc9de194b151a883.yaml create mode 100644 nuclei-templates/cve-less/plugins/starbox-e415a95e174fb12ae126d3d07ffd90b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/starbox-voting-b25512c67e99a5071e31e499f00e5d98.yaml create mode 100644 nuclei-templates/cve-less/plugins/starfish-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/starfish-reviews-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/stars-menu-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/stars-rating-877b177b6c582a19ddf3d94a1f834d93.yaml create mode 100644 nuclei-templates/cve-less/plugins/starterblocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/startklar-elmentor-forms-extwidgets-97fdac4e69d052b8d3b0b9d3bb3a6f6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/startklar-elmentor-forms-extwidgets-d60b1c02d17322f76c1b2881d2462ff2.yaml create mode 100644 nuclei-templates/cve-less/plugins/station-pro-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/station-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/statpresscn-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/stats-6928e4dd3f8a754ad4543c4aa86a65d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/stats-c67af2c20174cb06fdec04d2bad87d02.yaml create mode 100644 nuclei-templates/cve-less/plugins/stats-counter-02fe09c7b43da12dda02e01bae697e2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-addons-for-elementor-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-addons-for-elementor-b3370369626f0cd7746a33baa8f9c6f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-addons-for-elementor-cebe60a1cf2dde46346583e6502d2df4.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-addons-for-elementor-e4c7791fde3e7334165d62fc0d2ccc21.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-buddy-builder-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-buddy-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/stax-buddy-builder-cbf068b76996a12348c77160d6abfb9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/steam-group-viewer-ba89c7968306258a1d45a93c7b938ec5.yaml create mode 100644 nuclei-templates/cve-less/plugins/stepbyteservice-openstreetmap-e82baab8930846897895cd56a53f4176.yaml create mode 100644 nuclei-templates/cve-less/plugins/stetic-6c87924dbb6c43a2f1ddf339475f1f21.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-ad-bar-e6b604fdb9cd729f08feb0319847d447.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-add-to-cart-for-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-buttons-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-buttons-7e2dc330bdadb62eadfb9a21217d5798.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-buttons-859f059a5b5e1e007a3660b6b0f57e21.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-chat-widget-081b4b5984322d0654bd5e7e3e37d073.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-header-oceanwp-40341532c7f84f3b54f6d735c45b3460.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-menu-or-anything-on-scroll-cb59e9addcdd2f8364b25566a29199bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-popup-309733b2329b1a831e5f4ba1b62b19a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-related-posts-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/sticky-social-media-icons-c9799f12c2184eb30d64cc5143268b5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-exporter-for-woocommerce-52fb89fd718db76422fb10fc104a8d62.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-exporter-for-woocommerce-7484648ba547861958c645da1722e120.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-in-3f8c7e452acf0c92c2be04758743dd87.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-in-b71491b8bf7c07dcdab705de72ac74a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-locations-for-woocommerce-56e0af85bfab5155d836999c55aea415.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-market-charts-from-finviz-4d66daf76c1a504d8951d5442d44e0d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-quotes-list-9bd703646402672c6e3df139cb8847d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-0a4ea8332eb63945a72a76009caecdd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-9c2789fd4f31da6a3e682d3cde6291b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-c9110bf3cc68474c30b266d852672473.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-ticker-2ea3be25438d9c3b8022fc0114332035.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-ticker-389e4423679f1c467a852761b85f3cfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-ticker-5d5ae51f589bad252b3ae3b1c695b8aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/stock-ticker-a63f1210dd076ac1af75bbdfb4936df5.yaml create mode 100644 nuclei-templates/cve-less/plugins/stockdio-historical-chart-77325720e82684664a6b23fccd8e86e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/stockists-manager-93d3f42fb72b82260168d21150301cb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-referrer-spam-e98b32d10be48dc189fcfc8cfe33a3ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-spam-comments-33e0e465970f1e21e7fead2332f406d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-38876a8a5fbfd61cde5369e484f937f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-a2fadf4a6acf31a1331e23447ba2981f.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-aaa45d66679ac35ae0d003ff8a8e5f48.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-b2a65b01b1c6a6a8966ce47037369844.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-cb772dd359af032492bf762585f62bb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-d2259aaa4d4ae5c5473c4b6238d48632.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-user-enumeration-1c50f19daed34665b30f7fb7e6a79c86.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-user-enumeration-6c5cd06dc489c66e7f89a876c4054223.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-user-enumeration-6cfb42fd9a90247cd4a309cf7c3fa9cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-user-enumeration-bdfa460006d70b85bf4366e301016193.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-user-enumeration-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/stop-user-enumeration-da52ec4cd6fe55fb3a74c279a252a272.yaml create mode 100644 nuclei-templates/cve-less/plugins/stopbadbots-24b1f52e6cf57fe2a2edbecda487edee.yaml create mode 100644 nuclei-templates/cve-less/plugins/stopbadbots-2f682fb3b99f66abb1a193957df1d1e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/stopbadbots-3415fa1c70f4a284c1c590e2a6e45217.yaml create mode 100644 nuclei-templates/cve-less/plugins/stopbadbots-8b5bbda26afcdfaa4409d718842d5879.yaml create mode 100644 nuclei-templates/cve-less/plugins/stopbadbots-a56a10763fef9c6c1ee5edbd42a68314.yaml create mode 100644 nuclei-templates/cve-less/plugins/stopbadbots-c37f8531d687078be9fa5b927c4c16c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/stopbadbots-c80c3c19565fc6e0af352542c128422a.yaml create mode 100644 nuclei-templates/cve-less/plugins/stopbadbots-cfab52d3443d4e82a03b0d2f0889ab4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/stops-core-theme-and-plugin-updates-aa4cd28c9af95c0e13ddc060c836b2b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/store-locator-118f160a8ab578043e1b061d32f15698.yaml create mode 100644 nuclei-templates/cve-less/plugins/store-locator-f5bef0233a73b448e858b3681231c7d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/store-locator-ff474dfbe600046b3769ad9ddb54c011.yaml create mode 100644 nuclei-templates/cve-less/plugins/store-locator-le-41bea91ce3336d6adb86e1ea410b9aef.yaml create mode 100644 nuclei-templates/cve-less/plugins/store-locator-le-81806c847f0b2c320b63849d660c9dca.yaml create mode 100644 nuclei-templates/cve-less/plugins/store-locator-le-e2053d18b4d79ba0e416f265a7be2f35.yaml create mode 100644 nuclei-templates/cve-less/plugins/store-locator-le-fc1b2b62341494b2d9cc5ef165563a2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/store-toolkit-for-wp-e-commerce-1b9679a4f42d9c30f3b2de1ebd1889b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/storefront-footer-text-dcf3d519c235997890c41f1336f203e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/story-chief-6329046104e43f1ec0f867ede19cab78.yaml create mode 100644 nuclei-templates/cve-less/plugins/story-chief-9bb529865a4378d4915d3b7f30503af0.yaml create mode 100644 nuclei-templates/cve-less/plugins/stout-google-calendar-f561113c4b166210ffa84b58619b347d.yaml create mode 100644 nuclei-templates/cve-less/plugins/stratum-b90da7474429ff0560b494c992f7386d.yaml create mode 100644 nuclei-templates/cve-less/plugins/streak-crm-for-gmail-integration-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/stream-04699771b766f0fc714834ca199fc5ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/stream-4203dc94ef5199d201031e3f384724b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/stream-439ba91c06350a9c8bb984e5dff1a4a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/stream-aa025e6cf603e2a31820747c34b944ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/stream-e2fa9b7a2ac83dce50f44abd024d6931.yaml create mode 100644 nuclei-templates/cve-less/plugins/stream-video-player-a61b4c2ab615ad0f80b5138981abe8ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/streamcast-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/streamcast-fe66522b1a62142749b36d39c6b2760b.yaml create mode 100644 nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-0fc7500c1842d66d6981f5c71273cba4.yaml create mode 100644 nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-2d2a726dfea1c83cf2d93df104a8c8d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/string-locator-2d86b7b96a584b0abcc7bac3e11b4cae.yaml create mode 100644 nuclei-templates/cve-less/plugins/string-locator-54ef8279e490c1378421576f13667db9.yaml create mode 100644 nuclei-templates/cve-less/plugins/stripe-for-woocommerce-47381a600b8cc2173f5be6a0287dc5d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/stripe-gateway-d9184aea5b0340682c329de3d4d22fd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/stripe-payments-560fba5c90dc74d38384277269b51dae.yaml create mode 100644 nuclei-templates/cve-less/plugins/stripe-payments-5bf985e952afe6aa546a83aa3289787b.yaml create mode 100644 nuclei-templates/cve-less/plugins/stripe-payments-925029dc31c55bdce33ed22d851b35e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/stripe-payments-d255a7962cab4ed87609083cbd5373c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/stripshow-c6f782f9040ea9a039305ec1ed2ddafa.yaml create mode 100644 nuclei-templates/cve-less/plugins/strong-testimonials-30299c84e4a810a5d91c885ccad19e9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/strong-testimonials-4c7136348e958aecb57a2e8c3842e1af.yaml create mode 100644 nuclei-templates/cve-less/plugins/strong-testimonials-4e10d6d81d87afd9b8cf214ddcd496ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/strong-testimonials-6733337aa2d304b28cb671c239d55eef.yaml create mode 100644 nuclei-templates/cve-less/plugins/strong-testimonials-75b8a5222fb6f26aa91b12f6a779084a.yaml create mode 100644 nuclei-templates/cve-less/plugins/strong-testimonials-9789112c0d34ac6cf02fb911bdea5e63.yaml create mode 100644 nuclei-templates/cve-less/plugins/strong-testimonials-bad0302697b20bb164a7d48924161471.yaml create mode 100644 nuclei-templates/cve-less/plugins/structured-content-8afca71d6fa766e9a24060d9214388e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/structured-content-b00e5b46c74081e9862bff90f3aaef92.yaml create mode 100644 nuclei-templates/cve-less/plugins/structured-content-b240c0fd3b8e35e0e7b7374ee39360eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/structured-content-bb8100b665f7be766e2f2566af0a9770.yaml create mode 100644 nuclei-templates/cve-less/plugins/style-it-d99f0f471a2dd63c73902853b59daf4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/styles-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/stylish-cost-calculator-17f69747f5418f0c498184d7a40cd5d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/stylish-cost-calculator-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/stylish-cost-calculator-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/stylish-cost-calculator-premium-7a44d61ebaa3b700401c1ffe420cd8f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/stylish-price-list-1162e5c3375a29dda16c38290874b6a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/stylish-price-list-bcf6a8a116341bcac1e69fe2f154a5e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/stylish-price-list-f10183ed44d63adcd1747764a96c820f.yaml create mode 100644 nuclei-templates/cve-less/plugins/stylist-b62755f81eca9dc431fe91f1c1c5e844.yaml create mode 100644 nuclei-templates/cve-less/plugins/sublanguage-80e328ca936017b96ab31fe4d42f9f3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/subpages-extended-67118eb3397203867c13f43462b990f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-sidebar-783f6ed85330c62d6c5fe672e0ec559c.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-to-category-75e4710b6f6d108c91a0d10797676b5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-to-category-f8057967039523304998e4a1e27c496f.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-to-comments-d227231b4f8bc2fd1ba287eabca0e5a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-to-comments-f75bd794bdf0bce00fb43494bf16c7f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-15bbee0302a2c0acdbacef494a071dae.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-218762f76a47ddcb2051ebcd055069c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-ea7188fa96127d6768b6d958f17226e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-efa006e93668f7aca40417ac3bc81a16.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe2-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe2-6183f2ee603510ff52f63f1f006c28a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe2-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe2-8402c61711992f819817934b35ca7a98.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe2-914f38027718514db2df33bcbfa5d9b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe2-ac88ac9a4126934ac4e490020952d981.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe2-b1c3c2103a95130385060251902a6b08.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribe2-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscriber-6e4e8347273d5c0e2b6b13d913498882.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribers-com-a6ba6de400353cbaf7c7146b43b770d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscribers-text-counter-912f96d113a5aa3c6fbc130ea2c63f30.yaml create mode 100644 nuclei-templates/cve-less/plugins/subscriptions-memberships-for-paypal-246acc4f8640ae460f0f934c6252b374.yaml create mode 100644 nuclei-templates/cve-less/plugins/subway-dd1fa2d046eacdab57006cff4cc678d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/sucuri-scanner-783f372f4644686742e160ed2c3ab92d.yaml create mode 100644 nuclei-templates/cve-less/plugins/sumo-divi-modules-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sumome-67ae2a415472885fa884ebc17419d3bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/sunshine-photo-cart-04bb16712ffe510bd42325a97d792814.yaml create mode 100644 nuclei-templates/cve-less/plugins/sunshine-photo-cart-15830d6b8ea556fb257579ec9221b580.yaml create mode 100644 nuclei-templates/cve-less/plugins/sunshine-photo-cart-46f4f6351643b92d6e721f9df0cbb87d.yaml create mode 100644 nuclei-templates/cve-less/plugins/sunshine-photo-cart-6fb4ed5587f0486cce5c1d786ad4230e.yaml create mode 100644 nuclei-templates/cve-less/plugins/sunshine-photo-cart-a734bff91fde948cd641fb4f506275db.yaml create mode 100644 nuclei-templates/cve-less/plugins/sunshine-photo-cart-d0182d6b5ad1d47371d3d46c5ca25851.yaml create mode 100644 nuclei-templates/cve-less/plugins/sunshine-photo-cart-d096370d5e8a77a5a56a117293d4ce98.yaml create mode 100644 nuclei-templates/cve-less/plugins/sunshine-photo-cart-f3dea6737790d88bd69a099bbefbf2b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-forms-23939dc50089a2fd8ea8e17b2f3390a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-forms-245a41771beb2dc7d12a123756efaedb.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-interactive-maps-100f897c38dafe938e9af02c79c8f1ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-interactive-maps-93ccfea21d84c366d260e239066074ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-progressive-web-apps-86c50499cb2301a82786d4f168d5a72c.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-progressive-web-apps-da1b2a8c96719ab9e52f2e44ede96439.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-164f540fc7a38170dc136b3ff3864ea3.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-1d7bb8633b523735c234101babaefc6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-2c66024442466abc661bfb4f6aa99c2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-46d7cdc90f6e4788d19f634ed2b57174.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-55664802ca8a80e3857f1283c80160e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-9a23102fb64a765611d796440b87f458.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-d2b942d377993c80a764418d9e08cf38.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-f1616b3150e17cf700c43af1d021a1e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-socializer-f857ae19dab84e492640b0478274e45c.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-testimonial-16fe73a759651a7d3bcefdb3b3d57eae.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-testimonial-a39aab4c2ab62bbbd835d18cf4082e05.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-testimonial-f27a4c95db01a4a56d77711f77220046.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-testimonial-f50a0c6a3334b6a9833d56ea2fa95097.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-testimonial-pro-16fe73a759651a7d3bcefdb3b3d57eae.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-transactional-emails-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/super-video-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/superb-slideshow-gallery-d47a1b6b1cff7517a2e9c1cfb877c153.yaml create mode 100644 nuclei-templates/cve-less/plugins/superb-social-share-and-follow-buttons-99c5f90a74d748855313b5f983dc4bc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/superb-social-share-and-follow-buttons-bfcc2c70b2c01ba809a238ca61e5f88c.yaml create mode 100644 nuclei-templates/cve-less/plugins/superfly-menu-683819db80183ccca71d3fa32fe3879a.yaml create mode 100644 nuclei-templates/cve-less/plugins/superior-faq-043f908fb4f9351f4c0f0add9321f548.yaml create mode 100644 nuclei-templates/cve-less/plugins/superlogoshowcase-wp-100f897c38dafe938e9af02c79c8f1ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/superstorefinder-wp-100f897c38dafe938e9af02c79c8f1ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/superstorefinder-wp-4f8bb1cd134e141985840e55e7337ff2.yaml create mode 100644 nuclei-templates/cve-less/plugins/superstorefinder-wp-93ccfea21d84c366d260e239066074ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/support-genix-lite-d0405f3a6546530ea0089cf284177266.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportboard-2a20c012892057123c0688f9b3a4ff38.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportboard-4b0cb38b99185f75f96c68ddb4fd5800.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportboard-79a87cfdb010addc7119ceae498cd6d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportboard-b10ddb53a1d55359331e1cfb5b98fd64.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportboard-c1a62af10487c310f7866304f28fe56c.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportboard-df4750e020fd99b1db3b233a3a40020d.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-1e4fd26a738e660824e15332d3d7697a.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-32dcf173d1237771b363c0c2887254dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-3dc309d6eba7a3765b70c365b5153ae1.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-48b2566d4213ee09dc933aa00171e18b.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-4b6c9f5939660218c2639c17b2048a97.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-6e5471e206d56f7ca756740955d7ef85.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-907062f692752ce26e64e57b3c581650.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-a66f1036a5faeca38f844c5e78d8a411.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-b305b8b934fd913e3c8bf40e033b8b8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-d675073a50b5ae439cde851f96a93469.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportcandy-e0621827f65c399f847dba7ee6445c56.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportezzy-2008dfadd96c77e37701fc89701d0b2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportflow-ce31848b731129452978ca83014199c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/supportflow-ed6a08d26be37dfa8ba1985aca8693da.yaml create mode 100644 nuclei-templates/cve-less/plugins/supra-csv-parser-0f94c84212785d00cc5084f78797c691.yaml create mode 100644 nuclei-templates/cve-less/plugins/supreme-modules-for-divi-21942b6e9d955d0155ca56bc416fed6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/surbma-gdpr-proof-google-analytics-65bd3240ae8121decf63d5f24c3d008f.yaml create mode 100644 nuclei-templates/cve-less/plugins/surbma-gdpr-proof-google-analytics-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/surbma-magyar-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/surecart-3d8dd9beb9e2d1b17d8d01ef045ea5d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/suretriggers-f1d679f5d2a45e6f2ff41ed909dc0711.yaml create mode 100644 nuclei-templates/cve-less/plugins/surferseo-c3e49cc5a301ec2fc03ff611d9afd783.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-10c918e1f30e41c6abab8f1a64304178.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-1918195d7c2ab5867189768d59900f1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-261de0ba624118de4ab57965a4edcc34.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-2bb4b724bd1a7da8929a5d331260d484.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-643403eb7ff5706c9caf1f0a5a756401.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-669917e04d085a827cbc9c1935738ecb.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-72fdd3a89359bcd594b4d65638469ed8.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-82219905fba0330c7a27bd3f2e291fd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-8acec0a5c8b59824f7149c3540944dde.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-8eb8c6930c0431ff7195d8b5e7d4d215.yaml create mode 100644 nuclei-templates/cve-less/plugins/survey-maker-ad612424551c0ee261f169ba5954843e.yaml create mode 100644 nuclei-templates/cve-less/plugins/surveyfunnel-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/surveys-73f9709e24c19194b73986ad030e8015.yaml create mode 100644 nuclei-templates/cve-less/plugins/surveys-ddf10b902ecdb6f3ecf20febec84cbe8.yaml create mode 100644 nuclei-templates/cve-less/plugins/surveys-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/sv-provenexpert-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sv-tracking-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/svg-flags-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/svg-support-4cdd67f3f418a30581118cbbb5c2e501.yaml create mode 100644 nuclei-templates/cve-less/plugins/svg-support-5b6d277a829fbd531e952b54c0a495ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/svg-support-ffa9b508bdc94d69f110d4734885da09.yaml create mode 100644 nuclei-templates/cve-less/plugins/svg-uploads-support-4d2ea21aa8044b97f6f856b2ca032bba.yaml create mode 100644 nuclei-templates/cve-less/plugins/svg-vector-icon-plugin-03cfd10aef3dc88159ec608d4ac8800f.yaml create mode 100644 nuclei-templates/cve-less/plugins/svg-vector-icon-plugin-b7954fa43e16eb8eb1a34f4e676a00e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/svgator-20391a519d77c31bd1c976dfdc89ed20.yaml create mode 100644 nuclei-templates/cve-less/plugins/svs-pricing-tables-3f854df7bfd619307ed654215e939951.yaml create mode 100644 nuclei-templates/cve-less/plugins/svs-pricing-tables-59d35e08e05da774933855f91366b645.yaml create mode 100644 nuclei-templates/cve-less/plugins/svs-pricing-tables-a665f3ee73307241410449c4f67e450a.yaml create mode 100644 nuclei-templates/cve-less/plugins/sw-product-bundles-325c2ee814ddc7331db5383ec03956d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/sw_ajax_woocommerce_search-17ca7ff5c21686a9400e80e063d3e66d.yaml create mode 100644 nuclei-templates/cve-less/plugins/swatchly-dac1076894ee7430c4ad6bf91ae05401.yaml create mode 100644 nuclei-templates/cve-less/plugins/swift-framework-0b02214c516fa5bc85822569a5b642f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/swift-framework-f58e0fb779a935f032e6158130723d4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/swift-performance-lite-174bf1d87b8761ea6f77723705dffc85.yaml create mode 100644 nuclei-templates/cve-less/plugins/swift-performance-lite-7dfff8c4900f7bbdbc49f6aa2df77488.yaml create mode 100644 nuclei-templates/cve-less/plugins/swifty-bar-861a2a6e66a953eb50c087718b438c88.yaml create mode 100644 nuclei-templates/cve-less/plugins/swifty-page-manager-94a65bcd2f84366f6216e3f9b19f7582.yaml create mode 100644 nuclei-templates/cve-less/plugins/swifty-page-manager-ee107d9cd894fe54bb677ea3e5052c7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/swipe-hq-checkout-for-eshop-6d412503c15b02be74462a4b525012a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/swipe-hq-checkout-for-jigoshop-9dadadc2ea66cec373bf71c20060be7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/swipehq-payment-gateway-woocommerce-04275b24c87ac6163ea35464c25c26e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/swipehq-payment-gateway-wp-e-commerce-fab645de2f6e6231ff6074be3c265848.yaml create mode 100644 nuclei-templates/cve-less/plugins/sydney-toolbox-49b75b404a9ba001add19a1df795abd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sydney-toolbox-5adaf21161b5d5d8e7d95c715efbd0e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/sydney-toolbox-c87a07214ae94f7db769181aa46e6e3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/sydney-toolbox-f499e4efa4d99d7d76254d2c3b103977.yaml create mode 100644 nuclei-templates/cve-less/plugins/symbiostock-5e582ef605e9fe0c0d1cac86ea21ae85.yaml create mode 100644 nuclei-templates/cve-less/plugins/sync-ecommerce-neo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/sync-post-with-other-site-886a02653a1926dd36921eb04bdcde64.yaml create mode 100644 nuclei-templates/cve-less/plugins/sync-qcloud-cos-52c19ba3b4c4a4e86f87839bb901d71b.yaml create mode 100644 nuclei-templates/cve-less/plugins/syncee-for-suppliers-85d0c53e63bad002a594a7c01a2ede3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/syncee-global-dropshipping-d016ddea2985e3c1ec3f3ed31d67329b.yaml create mode 100644 nuclei-templates/cve-less/plugins/syndication-links-85ef6da03e1e6bb00fd985498d35a632.yaml create mode 100644 nuclei-templates/cve-less/plugins/syntaxhighlighter-527a854b5306cfe2112c84c3b74302ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/syntaxhighlighter-860aeeaea687dc364b79673a2290695e.yaml create mode 100644 nuclei-templates/cve-less/plugins/synved-shortcodes-6c1c86676b3f6a00f366fd4021465d09.yaml create mode 100644 nuclei-templates/cve-less/plugins/system-dashboard-00f8b2060d8c742440ee6fd7c2090104.yaml create mode 100644 nuclei-templates/cve-less/plugins/system-dashboard-50be407197651ee72b3d338a1eac693d.yaml create mode 100644 nuclei-templates/cve-less/plugins/system-dashboard-6bb233f728b21686bbc5b5d256c952f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/system-dashboard-6d13564fb4f4f025b03f3bb2e7eff230.yaml create mode 100644 nuclei-templates/cve-less/plugins/system-dashboard-b60f7befa67eb443974e00d882b10881.yaml create mode 100644 nuclei-templates/cve-less/plugins/system-dashboard-d08dba75a00314181a7ea312016fdabc.yaml create mode 100644 nuclei-templates/cve-less/plugins/tabbed-e8c1d3f10e1f58956d4fcfa9c811fff0.yaml create mode 100644 nuclei-templates/cve-less/plugins/table-generator-fd97a9eb267d56f526d35e401fac2886.yaml create mode 100644 nuclei-templates/cve-less/plugins/table-of-contents-plus-59af9a4b87c64d3fc5a5f77eb6d682d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/table-of-contents-plus-88443ca5df44ae2bdc297b09180bef0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/table-of-contents-plus-d17932e78accf27930222cbdfc82272b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tablepress-289da9c0d14eee035f8071c1e92f71c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/tablepress-3fb1358d568dc8245a52a721b92fb318.yaml create mode 100644 nuclei-templates/cve-less/plugins/tablepress-5d739fff0b557fdd4318a7044651d1e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/tablesome-41bad327accd676bdd6230643f7e28a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/tablesome-6d5a094525084991d10cf28cec2fcdc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/tablesome-918ad86e1bedc485af1c75c927ff2b30.yaml create mode 100644 nuclei-templates/cve-less/plugins/tablesome-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/taboola-7ecf6794fd0be35e81a6be54c3e6a722.yaml create mode 100644 nuclei-templates/cve-less/plugins/tabs-1aa0e79be369c61efc2c0807922659cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/tabs-pro-20d48d249a9d91a3d81b3c5c649e28eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/tabs-responsive-f48a8e9c9fcbd8cc7a0d7249289e3206.yaml create mode 100644 nuclei-templates/cve-less/plugins/tabs-shortcode-and-widget-713789bc3ffbd71b9430af55e34d0b0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tabs-with-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tag-groups-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tagembed-widget-9ebf12f531ac825152bdbeecae0483e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/taggator-7066a02b08506808c19c2698c3c5e512.yaml create mode 100644 nuclei-templates/cve-less/plugins/taggbox-widget-3d53b8857bb0bf4f709b612366ce52ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/taggbox-widget-460e4d77e94c99909f00493d8717ec60.yaml create mode 100644 nuclei-templates/cve-less/plugins/taggbox-widget-8984d8e2e14f0b49968f909a1d35ae5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/taggbox-widget-8d570fcab536c9b0d9a14e0fe3f1fda7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tagregator-42f689e89098e402a672dac5ec8f6c89.yaml create mode 100644 nuclei-templates/cve-less/plugins/tags-cloud-manager-582f95ad25f63ca7cc5ef7bcd4bbcf92.yaml create mode 100644 nuclei-templates/cve-less/plugins/tainacan-8e6b1c0313de5c2d10a529693b2cd5e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/tainacan-9361c5082e0aaebe13dacdb499fc4e4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tainacan-b7c02268f4f394ae79b51e80494204b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/tainacan-bec9a874ffcaa5ff9d2f46a18b295cfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/tajer-30f1777054f2ffb243b10c5c1e00bdab.yaml create mode 100644 nuclei-templates/cve-less/plugins/tallykit-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/tapfiliate-0bb4c4e55d3bd7066abf4b3e5c409eb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/tarteaucitronjs-7493b4e361e65fc33d302e9a8676eef5.yaml create mode 100644 nuclei-templates/cve-less/plugins/tarteaucitronjs-cdde9db33caece636f624a4e888cbf55.yaml create mode 100644 nuclei-templates/cve-less/plugins/task-manager-pro-3c71f53ddfca3bc25fb132db1aac667a.yaml create mode 100644 nuclei-templates/cve-less/plugins/task-manager-pro-4c984e9d1c9a129101e93a0ae80c8a9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/task-manager-pro-fb6f222be4d39ed80f59f3fdd0187537.yaml create mode 100644 nuclei-templates/cve-less/plugins/task-scheduler-49f7af60a7d6ca8e6785ad7873768f2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/taskbuilder-aa1aed011557ee5dc2bfa06501123a9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/tatsu-fbd8ecc6dba160d0b0ce8ccb8069b0ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/tawkto-live-chat-21ae3b1c550108707903a2e1d2b50e39.yaml create mode 100644 nuclei-templates/cve-less/plugins/tax-rate-upload-65ee5bf735571153b550ec180d2f83b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tax-rate-upload-9b43aaab2dbac6c310bbe5db0693f0ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/taxonomy-filter-f3d2115fb9f146bc796a9f84dc975747.yaml create mode 100644 nuclei-templates/cve-less/plugins/taxonomy-switcher-6295a7a546ef764d879b794c2aebb334.yaml create mode 100644 nuclei-templates/cve-less/plugins/taxonomy-terms-order-c638d03db9f642ea8657e9efadb89fe3.yaml create mode 100644 nuclei-templates/cve-less/plugins/taxonomy-terms-order-f5ae27bdecf9c7ab3666827aa6121937.yaml create mode 100644 nuclei-templates/cve-less/plugins/tc-custom-javascript-03ddcc1c34e43981b71842dcf356a652.yaml create mode 100644 nuclei-templates/cve-less/plugins/tc-team-members-7cd66621baa98ee6c1094c3629ee5b9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/tcd-google-maps-91e768f9e801d14e24ca5019cd490f0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/tcs3-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/td-cloud-library-e9eec5a929c2311a5540a7010e91443f.yaml create mode 100644 nuclei-templates/cve-less/plugins/td-composer-01793590016afb66f5a418a945e41a09.yaml create mode 100644 nuclei-templates/cve-less/plugins/td-composer-0a8a5d2ceeee68cf5d8ceb172875b32d.yaml create mode 100644 nuclei-templates/cve-less/plugins/td-composer-5795df5f8da9d7d45bd34eff74cbbef7.yaml create mode 100644 nuclei-templates/cve-less/plugins/td-composer-b10d497d51d23e43935beff2259b9524.yaml create mode 100644 nuclei-templates/cve-less/plugins/td-composer-bff7cd3ae66179edd6f79145d30bd8a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/tdo-mini-forms-506c24db7cc3a5984423e257c1b75a3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/teachpress-0e20035daf500b66ef66815e5fae94f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/teachpress-2eaa08a72f8ffd2eb931a796cf5157f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/teachpress-3b16719dacbde5289812e70a9eb8dc52.yaml create mode 100644 nuclei-templates/cve-less/plugins/teachpress-9c5b70c021deba50a223641e7218d917.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-005741c51584101e42f20f4a09530ec1.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-1d181af5ec91b0160f1b6df2779bb251.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-b569d36710f81ad9bca4fdee9649f13c.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-d26cb33300448e8878b411d58432ae7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-members-3251ec6afe785e3bef31ff4841e744c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-members-68a19dcbafa893fee0f134b5b9682816.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-members-97f6d832d77568cb83cbfd8ed5696c11.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-showcase-50a35a271362419338fef58cbfdfbd44.yaml create mode 100644 nuclei-templates/cve-less/plugins/team-showcase-supreme-f7d812f744f4c9ca71f204033cc41839.yaml create mode 100644 nuclei-templates/cve-less/plugins/teaser-maker-standard-62dc43c109e10a4fb2083be6c80b9766.yaml create mode 100644 nuclei-templates/cve-less/plugins/telefication-32f527b1fe26d5c077366894530c8689.yaml create mode 100644 nuclei-templates/cve-less/plugins/telegram-bot-0caf4f2b6437a679adbb5b527c6703b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/telephone-number-linker-a6d339b3bc08ee880c9c68cfd52a0937.yaml create mode 100644 nuclei-templates/cve-less/plugins/telsender-4150b6c5ffc14f9f916be876839f27fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/telugu-bible-verse-daily-10fa074ce14cd8aff4840b1abbaf6c83.yaml create mode 100644 nuclei-templates/cve-less/plugins/template-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml create mode 100644 nuclei-templates/cve-less/plugins/template-events-calendar-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/template-events-calendar-803648dc94dbeaf482d25b8433d5ee7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/template-kit-import-1024fb2bb768926b2f10b7f06d6c4de1.yaml create mode 100644 nuclei-templates/cve-less/plugins/template-kit-import-e259392e4e0f5c005c71447bf33a289e.yaml create mode 100644 nuclei-templates/cve-less/plugins/templately-6db2725ca256b74963101e9d1eafe501.yaml create mode 100644 nuclei-templates/cve-less/plugins/templates-patterns-collection-0f7e356340d28416c48865e039d750ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/templates-patterns-collection-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/templatesnext-toolkit-6880997a756b467547a9370c60ac6681.yaml create mode 100644 nuclei-templates/cve-less/plugins/templatesnext-toolkit-71cf8d6f1781f11cff9af8b811c7f0b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/templatesnext-toolkit-d10130ec70ac5e95df8a68d13ca495cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/temporary-login-without-password-e518402d2982dad7f3cfd89eedd61449.yaml create mode 100644 nuclei-templates/cve-less/plugins/tencentcloud-cos-1697bad848dd1bd16f0c413821ab2401.yaml create mode 100644 nuclei-templates/cve-less/plugins/tencentcloud-cos-b1770f9eb849f830c90d98a4a92d2baf.yaml create mode 100644 nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-15b5b7552cd59d4fe58cc4180bb081ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-20a9d8955f3c9e8e519f715c32a5f589.yaml create mode 100644 nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-b27ee90d1fddd4df887e8806bf4e7ee4.yaml create mode 100644 nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-bd8227b6953d3cab7fe7bcfea80c058c.yaml create mode 100644 nuclei-templates/cve-less/plugins/tera-charts-18c4c68c7c881f2ea27926221e43a5a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/tera-charts-c18aab0e3a8fe7ad353658faf1fddbbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/terillion-reviews-47c8ae751ee325a323299c1e28df1079.yaml create mode 100644 nuclei-templates/cve-less/plugins/terms-and-conditions-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/terms-descriptions-4ca0cd7e003f070985982d00b73cdc44.yaml create mode 100644 nuclei-templates/cve-less/plugins/terraclassifieds-4be3fece7979d31adacbce90e5c628f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/terraclassifieds-8f126edef9e9df4d2ad158f1a5a43c5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-9fed5404f994e2e62aad7f01b29dde3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-add-098a7c1e7e4a3294c0b3e783c9234d81.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-builder-cc8d3237ec9d31d7a17e75a3773f4b59.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-builder-ebb1ebcf4f2c8c10213c00b9f2126830.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-free-68309fb63b5db886058ca866de7b117b.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-free-bc1021396d5f2f9f59d1b9e8308f6b42.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-rotator-a98e82a7c384a33ad5d0d42365168f67.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-rotator-ef09ee87048a20a553f4804a48eb6952.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-slider-0cd68afb7b6d648c1cc92eb32c923eff.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-slider-6d9a6d99fa80beb8d831bc3a1d45ac3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-slider-and-showcase-3fcde9cc662e3ad45e20c993057641fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-slider-and-showcase-f54e3a0500b97b96852bb8d2c3a17f16.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-slider-c2d76074465a6dcb60332d83861a2a8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-slider-c6bb0e4c31a358c9eb072ecaccea302f.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-slider-shortcode-43c13d89c14426ecb661544b7d24f058.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-widgets-064923882cd32ff7964d2ef158cf8d5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonial-widgets-0a08727c9a8cc242989bfe2a49030a2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonials-2ee541e9c869c15a8b871966c41047ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/testimonials-widget-f08697abe75fa6ac28d5ec1f1d0bb149.yaml create mode 100644 nuclei-templates/cve-less/plugins/tevolution-2d693d589095b4560f08a66dde7ee787.yaml create mode 100644 nuclei-templates/cve-less/plugins/text-hover-c38399df1330c2dfd449ee16ef7996a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/textme-sms-integration-3832b3b7c5502757f733258a03de8f45.yaml create mode 100644 nuclei-templates/cve-less/plugins/textme-sms-integration-cc2369bd97072a25359057b15b301ff4.yaml create mode 100644 nuclei-templates/cve-less/plugins/texty-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/texty-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/tf-numbers-number-counter-animaton-0ca0bd9c39bf258c51c77483b135b8f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/tfo-graphviz-04e03efeaf45c2f9ebc60f262f17a9a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/th-advance-product-search-299542a4c8b3958179820e8901ce5f1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/th-advance-product-search-9baae5fb51d9dd1141e1931574d9d7be.yaml create mode 100644 nuclei-templates/cve-less/plugins/th-advance-product-search-9e3753c62120a17f21550a2c92d7d0fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/th-all-in-one-woo-cart-41d911400ca8ace536dfd110ed4dbc79.yaml create mode 100644 nuclei-templates/cve-less/plugins/th-all-in-one-woo-cart-e7aa48c0891a8d823aef1576b3ef286e.yaml create mode 100644 nuclei-templates/cve-less/plugins/th-product-compare-9baae5fb51d9dd1141e1931574d9d7be.yaml create mode 100644 nuclei-templates/cve-less/plugins/th-variation-swatches-a125844e860a48204534272bc2a11b7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/th23-social-f1d890dd18142758b1c8cdecbd50795b.yaml create mode 100644 nuclei-templates/cve-less/plugins/thank-me-later-5e0fa9fcba55bce0a7d159ec1d8e3486.yaml create mode 100644 nuclei-templates/cve-less/plugins/thanks-you-counter-button-60056c59f58d08c739eaa4877baa7622.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-buffer-button-073c84bcdcba646c59175dbb887b7a95.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-events-calendar-15adc07dcc170bd663dc3c1e94fa94e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-events-calendar-362ad579ac93dd9d0975339b992aaf7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-events-calendar-55a397e3ac510c4f6b8de73dafe73c50.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-events-calendar-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-events-calendar-c982f06cdd6fece879cc973f1756a4e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-events-calendar-dce291168af66dac21606f747d77714a.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-events-calendar-eventbrite-tickets-86cd270f4cc1442525b2973b263a3c27.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-events-calendar-f52eb0f0fb1dc47ee06378a3c186f4e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-hackers-diet-e7aa2e734d6d80e9f42443bea3734579.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-holiday-calendar-a669ab86f241324d8d2f2b22eaec997d.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-moneytizer-fb202acb909978e8641eabe44749f8ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-pack-addon-d8bfc01f0d93fad4fb2e1a339254a3ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-pack-addon-e89c86876a9fa2c6c7251b6a1cdc42b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-block-editor-64920ba860c3e3d6855bec6b3359aa95.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-block-editor-fdbe6ed30963d2d89b9e4d6d9ea6d03d.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-20984fc62bd28bb51dbd02e6ae5eacfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-28b13ccb507cfeb174aa819fc3235b5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-3835c81a3b054f8f577b5a29958ca111.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-3d06eee6979cba3a65776c3770040194.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-421c48e1cd35997d3959562c69cf5279.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-53696e5218de6a7c32a3a9109583afd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-6b109b8afc142f70c57afa63265ae2e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-712959520f4dede71b7a2d9e44002c33.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-ad74c1853755393f0d665754f820d681.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-c3136cf32a8ee994d42daa37c82bd5e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-cd4c918fd5ff72f1664fbf0ef99c4299.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-post-grid-6d37d0911eec8eaf770eb1eec58145bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-post-grid-aa24420637d5fac56ca63b2271fa8b9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-post-grid-dc7632e71a497cfee47279611e30245e.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-sorter-ca1b64ffb0ccae02fca2d23bb2d6ec12.yaml create mode 100644 nuclei-templates/cve-less/plugins/the-very-simple-vimeo-shortcode-be0ba3aacccf6ba5116887341d902b74.yaml create mode 100644 nuclei-templates/cve-less/plugins/theatre-69bd71812f8b19e052624d1ea9f84cfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/thecartpress-0918a1cd67495fb4f2501b4a07ebe974.yaml create mode 100644 nuclei-templates/cve-less/plugins/thecartpress-380b3f09b95ab564acee2d8952a33e71.yaml create mode 100644 nuclei-templates/cve-less/plugins/thecartpress-566549d4981430f7717caf8e709d7d50.yaml create mode 100644 nuclei-templates/cve-less/plugins/thecartpress-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/thecartpress-e7c178a2471ea08f4ec99b9eb663cf05.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-blvd-layout-builder-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-blvd-responsive-google-maps-9be84376d34a812060ad8aba2e71f1f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-blvd-shortcodes-7ba8529af3436a78498f1c21893b7e85.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-blvd-shortcodes-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-blvd-sliders-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-blvd-widget-areas-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-demo-import-42bbb29a21ceaaa3011864640412a5ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-demo-import-acd2f33fed5535f04cc63cbd673f8668.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-editor-2dfa0b8f134cf415442ecf4c309e85d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-editor-eb3be0c0cf31ccd39967171afebb18b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-editor-fd1e677494c37ae823f0277f9b7da0c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-junkie-shortcodes-4f1dddafa18fba59ec7aef53cc2b0d3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-minifier-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-my-login-755306c8577963b7e9a15f996cc38136.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-my-login-ef20cf055251e93d9b846f8776b699ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-per-user-220d44d27b32ec5f1770ce6de644f463.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-switcha-b4a41681eefe755efd70571167096dd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-test-drive-9aa568df84b066bcc0755624fabcc470.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-translation-for-polylang-f5d278de8a6f52f6b1d00da3aecdfc57.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-tuner-66f3161d1022633589022b156d74abba.yaml create mode 100644 nuclei-templates/cve-less/plugins/theme-tweaker-lite-f61528b18c019a7fd52fbe924751e5b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/themegrill-demo-importer-96a6eb43348a230ce62c16f4c805f2b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-058a642e0573877c079f2c954605d344.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-0b0a53122105422e3ec1a7c6051d3302.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-175f5f197d39e1751001f35acbaf01df.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-46672cc6093b70f0f99b8c9c1af2d835.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-6440d16b09a3de3d5784ee99cd71888c.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-6738f168d7a8aa50cafb43b72d6946b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-6f08ab84e1cb8caf7e2c6c058fbbbb3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-79fb0bcc374a70f9a1181c9553d664f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-911f38a48744ee0cba908ae42a0febe1.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-a3f525d7b3a02a872519446805f2e5b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/themeisle-companion-f0869bd6c833a2dcca8d781669a8f39f.yaml create mode 100644 nuclei-templates/cve-less/plugins/themesflat-addons-for-elementor-6e2990d184d8844f6771deadef053685.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-builder-30397736441a65fb1b71b67544e3f42a.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-builder-a4983d33df5e385e92545ad0082911fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-event-post-9036b0b68d189e2a08606b1361a322c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-icons-2317e44c2f1aa246df478fdf378e128f.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-portfolio-post-293ee203790c9494dd9271c2d0887ade.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-portfolio-post-4ad06cea9bbed1fbf99a4d128c33e936.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-portfolio-post-be668a1f67bf2032bc65bfbd87433e2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-portfolio-post-eeb643b56c37992255be8d889b1e9ae2.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-portfolio-post-ef2ccc3b2c02ce044d17cf1db08c67d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-ptb-1cf2042a7f76cab8ad8de631e6023745.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-ptb-30618ae67f4be74afbd8c2992d6203d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-ptb-search-76258f27176a5343dd9686e2b8dcac25.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-shortcodes-52e89cc1870832c0bf35fd7b63eefddc.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-shortcodes-6d39c5dd9e079ccbe9ac0c1a99d74a94.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-shortcodes-7fb1bb76537e399dfae9ca2dc54c6a8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-wc-product-filter-50b5d414fd08ab5c52f1201434d28062.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-wc-product-filter-cac21e55f896febf57888b4da2df94b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-wc-product-filter-cf981f122fbf50e8a58080fdccd2e915.yaml create mode 100644 nuclei-templates/cve-less/plugins/themify-wc-product-filter-d0c7733d559f41b4b35373b971b25453.yaml create mode 100644 nuclei-templates/cve-less/plugins/theplus_elementor_addon-42da06bbd85810d2b121cf524da3d863.yaml create mode 100644 nuclei-templates/cve-less/plugins/theplus_elementor_addon-5a73608ad73ff1099a14f74919aa1eff.yaml create mode 100644 nuclei-templates/cve-less/plugins/theplus_elementor_addon-82599fc80ce8e9167026a24befbd5025.yaml create mode 100644 nuclei-templates/cve-less/plugins/theplus_elementor_addon-a014fe0d588971955e094229935a8c6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/theplus_elementor_addon-ad74c1853755393f0d665754f820d681.yaml create mode 100644 nuclei-templates/cve-less/plugins/theplus_elementor_addon-b93cfae43335af57ef88a10fac024249.yaml create mode 100644 nuclei-templates/cve-less/plugins/theplus_elementor_addon-ecbb50223a0cdb771fc6a4f617780de7.yaml create mode 100644 nuclei-templates/cve-less/plugins/theplus_elementor_addon-ee363fd534d1a755fb5facda5882c857.yaml create mode 100644 nuclei-templates/cve-less/plugins/thesis-openhook-a514048fb251bf33fbe7f38a2147dc40.yaml create mode 100644 nuclei-templates/cve-less/plugins/thesography-4f6c9e5f134bc3a7357c0b3f26384141.yaml create mode 100644 nuclei-templates/cve-less/plugins/thim-elementor-kit-1eee2854f94957b31e7d0d2d3c4c5271.yaml create mode 100644 nuclei-templates/cve-less/plugins/thinkific-uploader-d35fe59b43f4760392f4ec7a5eaa4ede.yaml create mode 100644 nuclei-templates/cve-less/plugins/thinkit-wp-contact-form-3134d0e942033e6ac2b7d54901e657a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/thinkit-wp-contact-form-4ffa4f4b774dde3b240b3f91f3c7533e.yaml create mode 100644 nuclei-templates/cve-less/plugins/thinktwit-eae5f7c2210c1cdf959e29a045115865.yaml create mode 100644 nuclei-templates/cve-less/plugins/thinkun-remind-0777ed3a3a96e55428342d8be3673b96.yaml create mode 100644 nuclei-templates/cve-less/plugins/thirstyaffiliates-7f32d3ac2f0177d9329a7490c025ed06.yaml create mode 100644 nuclei-templates/cve-less/plugins/thirstyaffiliates-8982f505d6a79ae940fb4ce5e211ca2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/thirstyaffiliates-edc3a8280c90c700d2ea22dbd7cd3a1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/this-day-in-history-6254bdc184e74d40b3b0be9a1c286f34.yaml create mode 100644 nuclei-templates/cve-less/plugins/threewp-email-reflector-260d59850520222ae9e82cf8d0c5f77a.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-ab-page-testing-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-apprentice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-automator-954cc7b2d6b89c7d92594b8f26d6124a.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-clever-widgets-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-comments-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-dashboard-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-headline-optimizer-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-leads-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-ovation-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-quiz-builder-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-ultimatum-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/thrive-visual-editor-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/throws-spam-away-36c982ede7470d2e3e88a740557c4530.yaml create mode 100644 nuclei-templates/cve-less/plugins/thumbnail-for-excerpts-bab8c0d44e1c325d945380a6221bd569.yaml create mode 100644 nuclei-templates/cve-less/plugins/thumbs-rating-28083443631175bd4dcd05294b64aae6.yaml create mode 100644 nuclei-templates/cve-less/plugins/thumbs-rating-f00e3cac8717028c6c69750368de6108.yaml create mode 100644 nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-566c05bbe9b725b2c0c80f4e03660720.yaml create mode 100644 nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-728e240a198c7c451039858fc71e171c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-c1e85ed5dbff1aadf024b8bce56884f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-premium-728e240a198c7c451039858fc71e171c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-premium-c1e85ed5dbff1aadf024b8bce56884f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ticker-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-207f27a384ef3a3941e38d3aa57e12b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-2d0717f7b86d7fd0bf523aa76bbbaeb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-c24d0aa2f1031533f0515499592257fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-e6aee90d79a8ce1370df8b0531e47510.yaml create mode 100644 nuclei-templates/cve-less/plugins/ticket-manager-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ticket-tailor-64923c9a5ffa9c7e5e2ff84955e346c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/tidio-form-885c0e7d869967a6d9428aa8fe4ebe55.yaml create mode 100644 nuclei-templates/cve-less/plugins/tidio-gallery-051fe49289887077b7bf7774208d8ef1.yaml create mode 100644 nuclei-templates/cve-less/plugins/tidio-live-chat-3713d3bbe5441b73f08676feaf2b85ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/tidio-live-chat-a8fc519a1878f904c76257237b147fde.yaml create mode 100644 nuclei-templates/cve-less/plugins/tiempocom-1e76bb40e4de81280c04372b8a422f59.yaml create mode 100644 nuclei-templates/cve-less/plugins/tiempocom-3cda5f6cbc287806403c6627673d9151.yaml create mode 100644 nuclei-templates/cve-less/plugins/tiempocom-f4fc2d0ee12c0981504dfb21225895dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/tier-pricing-table-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tiger-form-e900f7eced6fb67094982ccf0f2ecdaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/tilda-publishing-2da3bb827430b38a292fe600fab2f658.yaml create mode 100644 nuclei-templates/cve-less/plugins/time-sheets-1e381af0c631b13f86322331880f1612.yaml create mode 100644 nuclei-templates/cve-less/plugins/time-sheets-49fe99f51fd3a93a572d1c7ee54d4741.yaml create mode 100644 nuclei-templates/cve-less/plugins/time-sheets-f2aba70ce8a44005876e1620c7a6d111.yaml create mode 100644 nuclei-templates/cve-less/plugins/timed-content-2049615ded6008298be273ad480dccbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/timeline-and-history-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/timeline-awesome-4dec1d95d84aa9956ba49479ab4962de.yaml create mode 100644 nuclei-templates/cve-less/plugins/timeline-calendar-85e4c9b56c88bebde438fcf37c31b92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/timeline-widget-addon-for-elementor-e56f591ae1b5802507934b44dcafdc98.yaml create mode 100644 nuclei-templates/cve-less/plugins/timelineoptinpro-7246f496264a94e15a1d8c35393cc7dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/timely-booking-button-a2f77566f40955cc7451f648aaec112c.yaml create mode 100644 nuclei-templates/cve-less/plugins/timesheet-22a755155bed2f04b1157ca6e2e3c976.yaml create mode 100644 nuclei-templates/cve-less/plugins/timthumb-a4aa366f217005e74322ff2bf7a0e182.yaml create mode 100644 nuclei-templates/cve-less/plugins/timthumb-b970262dad30a7d484efebc698a4fbb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/timthumb-vulnerability-scanner-5eff25f23e727e07861c6b9793205529.yaml create mode 100644 nuclei-templates/cve-less/plugins/tiny-carousel-horizontal-slider-54520ac61a70e176cb0b123fca675fcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/tiny-carousel-horizontal-slider-plus-e0a3631cbe633a42d5989c02ecf7206b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tiny-contact-form-daddd512be0305b66a7c59d444cececf.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinychat-roomspy-9f9e4858911ea4301e5e57019a58fb6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-advanced-43f501281b9dc8f645fd47c4a0800fba.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-and-tinymce-advanced-professsional-formats-and-styles-a238023f989616cc05c2de1d1e0516a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-annotate-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-annotate-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-colorpicker-63703d9ee4495028e03f0458c1905965.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-colorpicker-ffaf15e9710e51e22815d7c14866275b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-custom-styles-500071d87ecb0967bf74f13aaaaabbd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-custom-styles-c3680e3206f99027fb5f3986ae69948a.yaml create mode 100644 nuclei-templates/cve-less/plugins/tinymce-thumbnail-gallery-d4668154e14e969595c9de23505f40d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/tippy-13d220693e087642304f87b309abc136.yaml create mode 100644 nuclei-templates/cve-less/plugins/tipsacarrier-3a70527433a2343d8a6eb73d336b1d11.yaml create mode 100644 nuclei-templates/cve-less/plugins/tipsacarrier-6007b8b9442eb6013d2d90e94b8a6f90.yaml create mode 100644 nuclei-templates/cve-less/plugins/titan-framework-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/titan-framework-8048ca5fa2e5dc8c9443b2fbef022686.yaml create mode 100644 nuclei-templates/cve-less/plugins/titan-labs-security-audit-cb74790ba4bbb7de85dca1c3cb33c74c.yaml create mode 100644 nuclei-templates/cve-less/plugins/title-field-validation-32a996c823f220857a5611dc8238f0fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/tk-google-fonts-0439b5ba8ec01f6ad565e8fbfefdff7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/tk-google-fonts-75dc3c235e29287a43892beb13ca3ae4.yaml create mode 100644 nuclei-templates/cve-less/plugins/tk-google-fonts-8ac6490c5c7ec2a3665c4caa676311dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/tk-google-fonts-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tk-smugmug-slideshow-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tlp-portfolio-104358d8439dd47eecd1fd56dc0931ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/tlp-portfolio-248c17eb0194783cca6065d1efba6689.yaml create mode 100644 nuclei-templates/cve-less/plugins/tlp-team-cdba025b70cc52735f49fc0178ac6ba2.yaml create mode 100644 nuclei-templates/cve-less/plugins/tm-woocommerce-compare-wishlist-4951c2f84359ebbaf9ae45fa01138a5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/tml-2fa-df76c0e1569130642f03fed33b459e14.yaml create mode 100644 nuclei-templates/cve-less/plugins/tnit-filter-gallery-for-beaver-builder-ad314c516dbfab27754190c924b97ec4.yaml create mode 100644 nuclei-templates/cve-less/plugins/to-top-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/toast-stick-anything-439f898124b090bed262004bd1d51e22.yaml create mode 100644 nuclei-templates/cve-less/plugins/toast-stick-anything-9efc44a2e2c2df22995a8fc10affc12c.yaml create mode 100644 nuclei-templates/cve-less/plugins/toggle-the-title-d02abc95243fe34c87855a6ca2a95d58.yaml create mode 100644 nuclei-templates/cve-less/plugins/tom-m8te-999f932c9f3d9b513b20f73dd0f5752b.yaml create mode 100644 nuclei-templates/cve-less/plugins/toolbar-to-share-4c6e2168599e221f42c1bf26fb04cbf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/toolpage-fc90c64fe13a7ebe4bd7cb7436d1b567.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-11f988700fa46a478a10a059a72cb6a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-4b2149909b70a0a5dde344497a2540e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-8a2fdef7cc698ec15988b37831ded08d.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-91499f9c529069cc8bb058d78e92bdab.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-a631956fae26932cfe37dec9f8eea277.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-aebc987297daa60ebc9f62d4c873ab22.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-d6080d1f6e6aba862d174924fa49080e.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-e382c8222b1abf6c6b2e0b2db7e0beeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-10-e7e948bfa89ef889d57ad4a644f6ffc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-25-social-icons-34bed79fb50712c291365a8ff729b6f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-bar-4f0560b0cde9af506953920ade591947.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-bar-7b68da6e2373d2ac5c585efcf03c710b.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-bar-f8df3f710c2acd675329722d570c9bc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/top-table-of-contents-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/topquark-40135bc4e3a937389149719d0bfc1b0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/torro-forms-0b90da005dc4b695e711677701780a3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/total-donations-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/total-sales-for-woocommerce-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/total-security-d59208c9d25614855049428d0906a55a.yaml create mode 100644 nuclei-templates/cve-less/plugins/total-security-fa39168559be958bde89e0128746256e.yaml create mode 100644 nuclei-templates/cve-less/plugins/totalpoll-lite-79e3222cd5781d3ee2de3dbd9ec9763f.yaml create mode 100644 nuclei-templates/cve-less/plugins/totalpoll-lite-dfd03aad01c26cf05b1c4c93b960bbc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/totop-link-60f02b8fa4eb1579a77b1a967b981a9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/tour-booking-manager-54c41ad802aaebe2d928746014c08472.yaml create mode 100644 nuclei-templates/cve-less/plugins/tourfic-2b22d0b76b6d55c94058bbf5818916eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/tourfic-98b35360d65753a713db3a25c694f42c.yaml create mode 100644 nuclei-templates/cve-less/plugins/tourfic-edd8e3c62f3b71f626ad36553a59802b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tourfic-f0ebaf7908d2916224db8f5d1ff59d88.yaml create mode 100644 nuclei-templates/cve-less/plugins/tp-education-da386ce90f0520e508b80fb1a2e2a0c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/tpg-redirect-98c7efbdf31bd767f6d42c5af6007d9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/tr-easy-google-analytics-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/track-geolocation-of-users-using-contact-form-7-5fc14f2bf72ff01c08c1f94583d480b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/track-that-stat-9b7b630dc39bbb454cf973350a25b5ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/track-the-click-61b51e0560f095cce3544140b3170777.yaml create mode 100644 nuclei-templates/cve-less/plugins/tracked-tweets-0d742014c6c6d4f612dc93a0d8ee844f.yaml create mode 100644 nuclei-templates/cve-less/plugins/tracking-code-manager-421ea02f0f2faaa78ee159ebbd1f2ea2.yaml create mode 100644 nuclei-templates/cve-less/plugins/tracking-code-manager-6e8a9152de2bbc5b83be5ce9d45091f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/tracking-code-manager-d699893673e058c723134b07631ea093.yaml create mode 100644 nuclei-templates/cve-less/plugins/tracking-code-manager-f9f8c7475cd82f380479dbcd08cdc45c.yaml create mode 100644 nuclei-templates/cve-less/plugins/trackship-for-woocommerce-8c789a924b584ff9b2a3b88bc5b7e816.yaml create mode 100644 nuclei-templates/cve-less/plugins/traderunner-0335e77335774af60e62b59ea8bf3dff.yaml create mode 100644 nuclei-templates/cve-less/plugins/traderunner-38e522344d31819f399f7be27a471788.yaml create mode 100644 nuclei-templates/cve-less/plugins/tradetracker-store-1ff709162f10c9c6eac55480ea55c5a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/traffic-manager-0cc0200594a7eced582455e86333c795.yaml create mode 100644 nuclei-templates/cve-less/plugins/traffic-manager-1b0051f6cdacf52fc28a89570f274917.yaml create mode 100644 nuclei-templates/cve-less/plugins/trafficanalyzer-f3bf3aa52e1e30ba08101ace5617af2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/transbank-webpay-plus-rest-73d72f655c3b804018b0ad6a3a400257.yaml create mode 100644 nuclei-templates/cve-less/plugins/transcoder-d2e24dc9b57b626b239083dab805eaec.yaml create mode 100644 nuclei-templates/cve-less/plugins/translatepress-multilingual-17f9d007266f9a0cab0ee55eb44edcc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/translatepress-multilingual-1bcc8deaed7a36dfed3699cc2606446d.yaml create mode 100644 nuclei-templates/cve-less/plugins/translation-exchange-31af361d998f1bee646666eb75e8dde6.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-49c0e5a87593ae8cdbc066b20e281fbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-4b35d32175d8c6a60caf01bbc915cbc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-4b9ec610b796c8632d430b70259226bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-99547d0fc21ffda2676b791122585c77.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-a687f130dc4fb0dc3fa1596936a6c928.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-bc943b920a596196582824c3eeb70aba.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-d8f6d24ae9aefabd89bc3732379fc08a.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-f437ea7631a9816d78b50dbf1934085a.yaml create mode 100644 nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-ff4e9233f972b9e92d912d8cb47ef8e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/tranzly-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/travel-light-23bff824abe3c334624b92f8ce9d99b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/travelers-map-d60ef1067dd86b18895f878c5b5156fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/travelmap-blog-24d707836e835d320b88fb566bce9822.yaml create mode 100644 nuclei-templates/cve-less/plugins/travelpayouts-6ab0ff32728ffec64a0e21f4658b6bb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/travelpayouts-b09a62954fc53a69adf6069c4bfa2ef7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tree-website-map-77f419c6676bae16b665cb7bfb361770.yaml create mode 100644 nuclei-templates/cve-less/plugins/tree-website-map-94fb995c7fcb31381238e0489629c885.yaml create mode 100644 nuclei-templates/cve-less/plugins/treepress-537feb2660b274ef93e595158af0eec1.yaml create mode 100644 nuclei-templates/cve-less/plugins/treepress-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/trexanh-property-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/triberr-wordpress-plugin-feb2ed9a776f1da5d8e1058653f64bda.yaml create mode 100644 nuclei-templates/cve-less/plugins/tripay-payment-gateway-3b9f3653c0029d132688d85fbc757af3.yaml create mode 100644 nuclei-templates/cve-less/plugins/tripetto-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/tripetto-cbd3eb6cc45789e5134a8a2c5f167a39.yaml create mode 100644 nuclei-templates/cve-less/plugins/trust-form-68ca9f8a242a5c678fbfe7eb11cba349.yaml create mode 100644 nuclei-templates/cve-less/plugins/trust-payments-gateway-3ds2-54a8519739469e9488888f770d59f330.yaml create mode 100644 nuclei-templates/cve-less/plugins/trust-payments-gateway-3ds2-98fdced366cbe609ca2059360fd4aeb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/trustmate-io-integration-for-woocommerce-6a7609985d974c1a4f6bfca880ceff9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/trustmate-io-integration-for-woocommerce-83fc5c78890dc3902a4d33e267bdeee6.yaml create mode 100644 nuclei-templates/cve-less/plugins/trustprofile-d9e69153baef2dd2b92bf1c6141dd476.yaml create mode 100644 nuclei-templates/cve-less/plugins/trx_addons-69db74f4852004f23d22f9fcc0555117.yaml create mode 100644 nuclei-templates/cve-less/plugins/ts-webfonts-for-conoha-dfc5edcffb51809997c1a8d53e1c44ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-20e7688da466978fa975c03a8c97cece.yaml create mode 100644 nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-a105732b2a52f48ea5c6c2e4cd20e7e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-c6294db0063d8f01b936cac40a7466ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/ttv-easy-embed-player-f7f846ee6a2643596409a73557db5ac2.yaml create mode 100644 nuclei-templates/cve-less/plugins/tubepress-57636a2970a5968684b69eba7f56b3ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/tumult-hype-animations-6b17719b7745b3293d6a68a531034051.yaml create mode 100644 nuclei-templates/cve-less/plugins/tumult-hype-animations-be55063f7f98deaf97bbbf0199feb448.yaml create mode 100644 nuclei-templates/cve-less/plugins/tune-library-61d4a8b20f3ed6218af8118f12f3c6f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/turbo-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/turbo-widgets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/turn-off-comments-for-all-posts-0e14619d4299f9ad0b2cbdadcef1842c.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-015631a41e17e7c68847b5f1f1c1e6e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-06bc0f0b4cde81f2a3c25e5d1294f81f.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-0f7d324b49374ff1264595834ad272cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-14663e06b0c267ee32922b2e7b917924.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-1a3c55b78621c5a0f1132cb6e90ef267.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-1b5a3539f272e50644f8022d37b4430b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-2219d30096a201736b1d63372957d1b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-2b473e1a0769986163223c209e7c2396.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-3a1a2462f10e12efaa2197ad33a42396.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-583b3f0f882e9563f461b70129fd6f7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-5979ee9f3da8926b114aaafc108d86c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-728966d9c09b57c99055d67de463c279.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-78fae6f744a75ffe299dd93a24365b9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-78ff72d9346255abccb5396c4cac06cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-7feda050b3f384761620a931ffec2f7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-805b776aa99780dfe83d45b24c67ce87.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-853a8966d699d4f6cdb8b175598ce3ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-982f78919d6ffdbae69689e67e460d30.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-a9f74f94f7fdfe42f50099f4c0f55e53.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-b38686638c5362ebcaa7af99aefa8146.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-b9268ddd3338fe184d978d9f6b4b6b66.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-c0f6a6341ec834d167178ebdcad90073.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-c52e67edc9fcaef058b0a6422fbb16e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-c75d16ff72ec9720f6fa40f4e6a40b23.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-cb03fd3d39a18ba5fc9dfbdcafc632b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-d8208bd4e60d421585f9ef9118f52dc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-e2363905c79cd827257e78bbd587e9a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-e8391494de925affdef94809fe41363c.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-ee13651f12379100949dbc5d6ec901e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-f530ac7e06964741f1f737d7f624d307.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-f99975c48c34eedbd4615cb8e4e07928.yaml create mode 100644 nuclei-templates/cve-less/plugins/tutor-lms-elementor-addons-57be4142bba97742b3c54d88f289eda5.yaml create mode 100644 nuclei-templates/cve-less/plugins/tuxedo-big-file-uploads-e87d1b56c2a442f8852b77f4c58543d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/twb-woocommerce-reviews-276bf528dcf846639fd31e2f34582a53.yaml create mode 100644 nuclei-templates/cve-less/plugins/twchat-1b6d6a3b10f19ccd74a4ee734a0f0ee6.yaml create mode 100644 nuclei-templates/cve-less/plugins/twchat-f2bbc682244e8a496bf0cb76f67467d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweeple-ca308dcf17a0b7f5d26b3212b813a6aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweet-blender-b04c389a2c7db09e215c22221497896f.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweet-old-post-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweet-old-post-9cdc97f4b49b38ab2b29bd8a59a5e2a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweet-old-post-b4cd17df95bd140cf7c61464c7525ad6.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweet-wheel-79a6c6928e7e7b780f5e2d2e60aa16c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweet-wheel-afd2744612e8626c5e5d28907e19b048.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweetscribe-181c4a45776e23b2e4688d3d65b94f78.yaml create mode 100644 nuclei-templates/cve-less/plugins/tweetscroll-widget-a75aed58343a47e8c366c92bf6c30f08.yaml create mode 100644 nuclei-templates/cve-less/plugins/twenty20-227a5c7ee9b9e5c6c608ba88b684ac16.yaml create mode 100644 nuclei-templates/cve-less/plugins/twentyfourth-wp-scraper-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/twimp-wp-f1ba708b36938f8403e7e3c932465c6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitget-1280f1445230b7ae1ede9b8d16dcfe7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitget-ae271d2d4ccc1afd11c18a1dfce05e0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/twittee-text-tweet-95e6d76ba8d0fec093b1906b71015aa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-bootstrap-slider-bb937d8b80c96bf28d192769190e5a64.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-cards-meta-61a96d10635962decc1ce6046743090a.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-cards-meta-dc78477c8100a1cf79517cd718961ced.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-cards-meta-f47b58aa7a47ddf3e1cee744a91d58ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-friends-widget-d6876da6619cc37a90baffbdd9833da4.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-liveblog-42c67e99f4b0956315e05e4c9000cee0.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-plugin-0be6c78c98564af0756cb75d83e4ca54.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-plugin-d8d27a0f27f9a3ef698ef167496cc3cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitter-plugin-df50b4bafe4c4501f744155f1ffc2d55.yaml create mode 100644 nuclei-templates/cve-less/plugins/twitterdash-29127228d14d384699d6b5442d961328.yaml create mode 100644 nuclei-templates/cve-less/plugins/twl-easy-call-953b50610487338e685a5cf5fb66996e.yaml create mode 100644 nuclei-templates/cve-less/plugins/two-factor-authentication-5e2cda3c648eae11638d20b64a6ac7f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/two-factor-authentication-f066ce4a5d628014aa8c478503783258.yaml create mode 100644 nuclei-templates/cve-less/plugins/tx-onepager-a3ea3eadba50d012fd5181689a40ff84.yaml create mode 100644 nuclei-templates/cve-less/plugins/typea-ftc-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/typebot-2dfca9afbcd5108da5d0b371a8c3da93.yaml create mode 100644 nuclei-templates/cve-less/plugins/types-0a99c8d6ca146b58134b86cdf1bd1b53.yaml create mode 100644 nuclei-templates/cve-less/plugins/types-30b50f08ba3bd834d5cba525e28c2ad2.yaml create mode 100644 nuclei-templates/cve-less/plugins/types-f2d9478a61ae546bc6c42d7e589dc8be.yaml create mode 100644 nuclei-templates/cve-less/plugins/typofr-4d609a345d021b6f474f9e27302e1298.yaml create mode 100644 nuclei-templates/cve-less/plugins/ubigeo-peru-f2c3929c09b259d783ad3e308478fb8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ucontext-474821f1bfc79c7314fe0d7eec328e34.yaml create mode 100644 nuclei-templates/cve-less/plugins/ucontext-for-amazon-cac3c9ade2b34b60466d535155587563.yaml create mode 100644 nuclei-templates/cve-less/plugins/udraw-bdbcc1232260c01ca170cb0fd5c807cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/uji-countdown-15a33f4bb5e2d06a85f82ec34f8865fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/uji-countdown-72e728e9748e016a77172519c9f57dce.yaml create mode 100644 nuclei-templates/cve-less/plugins/uji-popup-de9e079bb83ef0de7a86b06c72e28cbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/uk-cookie-187ba8ada5a41b0d7770ae8aebf496fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/uk-cookie-consent-c62e1a09b5d25064f2b824e42c65ea26.yaml create mode 100644 nuclei-templates/cve-less/plugins/ukuupeople-the-simple-crm-27f214402efdbe2c3b0f5b6769f3d129.yaml create mode 100644 nuclei-templates/cve-less/plugins/uleak-security-dashboard-19a7dd3894c625a145c40adc74330444.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-2082dbaf9edb41272f9cdbee4745f6ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-24b23f372a9b3fb67e55f59a220932b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-3262dd8277294ea89d83139475cd5b78.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-36444e5193280ad0907d2e76be8be503.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-3f0cdd113a5dc6e8c57d6d8884bb2046.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-470a77f2468b82bfe33702afea1bef64.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-6543c4464af9cc8a7951778c3557602f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-83811d9b1f9b97a8bbd0a5e724834401.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-854fbb986eea30c9b6ae9000bc6d9efa.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-929d1756f21a22cbefc18ee9e80a95fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-93bdb0cf774445292043ebf14695588f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-97376ff2f9573b5a393871b387b01b84.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-992243a3e82e516c6ec6b7febbf82953.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-a1f1c6c86ee1f2f79ad0b2ee7c41833d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-a20ba6f3c763563b32768dda0edf95aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-a847b30526e9eda8af7322c234934756.yaml create mode 100644 nuclei-templates/cve-less/plugins/ulisting-c1bd4d0b368ec2fd5b9252cc36742695.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-410-80866fdc72be2b54c095a4fd7f7db5e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-d5ab4dadd75fec9af134144e666ff1a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-1a33452c961e3444957f4bc07615cf79.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-33a470e219d30f02e24dacca366cf3a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-6a22eab260469991c892609c3554e5c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-71c8544bfd8e2585abc3fe4c509dc5e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-74e928a44773876c1faeda39f648c8c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-909eee3c64db045125d6a0e9ea1350a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-933cb3c57cef1616939f9329edac577e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-b79883c3437a6dd7938862f157254782.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-4c7073bcb34b91519f3886f6522a24df.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-6cf0838d8f56929452bab2f8ff3f1bd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-6ecaac8965c567964f683839f3212253.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-8461759ea5a4f2c3230ae2ba89953371.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-89c7530bb0ccb65cbe93d8710754fbde.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-b2845fc817c419db85576f698a4d3013.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-b8421311d76851450148e6c1e68c8aa3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-c0847a869834cac59e5bd8ee9a8f049f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-elementor-688329ccf7bb0b49cbf94f9e95fe056a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-11a2580b3d0abb5ce4a2d1b75225b077.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-2e1aa97d2a69303c55e94b8b3fd49dd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-54ca82ae8ec1733aa6ce2fbfb7528cc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-5e747ec4420f9649cb9fa7868eb33968.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-74062d3bc6524d681fbfe5faf76c4ab5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-7be36c301f6852821a57629c849c8dbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-7f4172230ab5f4cfd3c2df5f07ea6d4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-baf6f9647aa6e6045c6bf5dfb25901ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-c5f769a2ad53c678c35d169acd9dd76e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-d75adb1e1a8470a2c11b41a61ac1c215.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-da3f3594c596e882f29a46f5eb088351.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-e2ba51cd3a24abd61ca453335ef98edb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-e57055214b95f532f53777eeb789b4ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-f25e6249bdc00f58ed87833d8179196d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-fbe34f85c5c0e3a0ed7be431ce9a9754.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-appointment-scheduling-9936959fd813ccd389d4906204f0314e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-auction-06c61feebda6eda56577372883413c6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-auction-2b8dbf4f0e346913342b93011c311311.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-blocks-8ecac7c0d333dc76f1706559fa2ff22f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-bootstrap-elements-for-elementor-825ff2ff95290127035d7fc582cf6f47.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-bootstrap-elements-for-elementor-b7beb3a7782030a0bf8580cffcb377f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-bulk-seo-noindex-nofollow-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-carousel-for-elementor-d246c52e9d4725c7b245a84d679cf9a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-carousel-for-visual-composer-5829eead4c96879234a4f24b2d7f9ad4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-category-excluder-47b41bc2712a70e4aff6fb8649c1924a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-dashboard-5955a72c6d4dde7cf5a0b6e449e430ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-dashboard-74982fb1ee6ee7e80b9e6c7f6db4f09f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-dashboard-b6be8c11fad37e887646a283e9c47ba4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-dashboard-c5b5b783e98de972c2044e0acdd3ca83.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-elementor-6c08edd49eae20ef345d45ae5326d421.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-elementor-9d2da4be0bb177af2af2d4539faa65e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-elementor-b3de31ba898622222026a1275ef3dc05.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-facebook-comments-507dc7ea634baa930020adb83f291cb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-faqs-01d841cc481bc716c0f7b858b4f11c39.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-faqs-91fd3dac9c4d5ede970602c4fc325980.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-faqs-b632dc6cba0c61ee2bf8f89345f7cf19.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-faqs-c31ec2a99302fba742cc98be29fde1f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-faqs-deca81735cc88aee9510bee96ebea3f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-296629ec48c2e29c001ff73c83d740a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-343d05bc9d208789b5e376940d559b37.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-8222ebd9d6f8937e984983c872335120.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-gutenberg-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-instagram-feed-8056d85f33dbcf3eacb36ae8419af314.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-instagram-feed-ccaa53f193d436f82f09665a210de68c.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-landing-page-55c8be1b98f905c0f97aa18a603d7cea.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-358ac8b0121729fe99fde2c984a71ee0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-6f6b50e35dbc0c6deca59671d5ec0737.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-705a4f41d4e1aa767a8f267fa3454855.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-d90dc94bb51dfa2f24514c386a4ae9c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-08b6d9dc73cde56d748bcfad89022c1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-0e25a5015b31f614947b39dfb4bdedd7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-0e4c98f58a3149e9a232e9c95d40a56b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-0f6437cf628a3bd90ee26c228a1c0006.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-18ceaed7f43455d18367a3a1c3285ab3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-1c487d7f0e032490b79fb7ae13bd082b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-1f4b95ce58b10f02cade4467768773cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-242a068db50aca331a847418abd23c68.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-2502f9d9353560a8e219bba8c12b1db1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-255674fc07ae81595ebffe932a85af22.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-29ac257d0d3d26be4d0323f19b8203fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-33abe543df77e7949cb3756acaf591a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-3c91005e14cc5d86d18c2bf91cfcd5a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-3cc251560d3b16f1b023b3769603bce5.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-40c98f25ab20a5cec3c5a2b4260a50d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-40e897d2ffdca51f7bd6bf3f82372d65.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-43eec6271332d7e594aedf23b6c236f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-468eaebc73eb5b6623a0434366ab7c6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-4bd6ca2ba70df51b819fed4e8082314e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-6192c67ee2c3bd9b9e931c78efebf58a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-662783c84d37079d21b3524fa95f4917.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-674e9e8ffc19e4d579a57273137742ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-7333037ca30b5f74ef217bf9466f85b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-7db7009418abd13063c2d118e09483f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-7f5926ab268dbc1681fd3a5de983583a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-80c655d3d796ab546d2bd2d7a2a197bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-85405b283a5b7488c3b527272c63f06e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-913680c7cc113c5e372d717a86269c4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-9c147c1fb503983534bc4ea0ae8ec8cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-a3c4d74b63323bef472fb10b591d6314.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-a52442145dbdbdaec9bfaa19c0573b9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-a6054d32c09f0a33057b0746bec92f89.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-aaa278b6b3d118139396380f3db91970.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-afb0b6e6fbde3c83cc029e81733d53ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-afb15d666e098434f8ebcb7a76b5d273.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-b9f884e6575d690e9989d7d2f0484ed9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-bcc49c967f35b7af17804d1e16dc2e60.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-bcd9ca517989975e14b7cf4813bc0e1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-c040e1b7f1d715ec00a05b885aa3bea9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-c30bc91af795fd14b3e08b79d07d649a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-c814b16777b5d2f124bf7a293b35df9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-ca3f8b736fe25e4b904e1b16b1beb376.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-caa94527ec89b606495dedb1b363e9ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-cb65508cd745e36647cf4ef3930d3944.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-cf4cd1ad5bd449a05295e57107462f9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-d14d68253fb2c57056fb03621a5ee651.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-d6ddc334180239abe617a7bb4b11e74b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-d96c9d39ba81c10e5ff2a55a63974daf.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-dac7bdda4e28b985a7da6425e9bc4314.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-e00b98ac8c54622a944850cb2d386b43.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-e44d6ae66963d07b80fddcfb06cf2f83.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-f6c1c83fdf17318a9a2aff5f238d4136.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-member-fd2089a519aca4aa15a99f294c4457f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-noindex-nofollow-tool-349558c766b935473393c8c3c8e1f5f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-noindex-nofollow-tool-ii-4a5a32357411170270407ccbec6bd523.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-6bd54388aa30b6dc806cb18d7d914f6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-769f278ef7d8854e596567a95f8b276a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-93a0069582fa34f4857779b646fe9dc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-cd3ebd9e5b8349096037121f145eb200.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-d5a9675642b3846bb1039f5b8393297a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-d8c9bea1d4420a5baa6bb9e5a5a7051e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-d9d7cdc24ee2887d8625dc92279b0527.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-e855f3857fc0bf41fee74940fd262c9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-f1550f59a752c11a5990aadbb66d56bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-post-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-posts-widget-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-posts-widget-36882e902da34c7275792dd2c6fee99b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-posts-widget-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-posts-widget-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-premium-plugin-0a55a8c44319eebd91a4589219732011.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-0aceb6e391e9a8017538f79a192451fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-1c142e2aa6457c78b7a30e33f81ed033.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-299e26f66452f89b69cd95a12049938a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-3e1e0e265d4d4fc05de3487796f682db.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-50a03dd43db2d419331c54a14051f151.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-6ff591cfb79ba4ed5cb37dfcdc90b581.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-7cfd32fcdabda7adb9a40d5e10f1b10f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-7d8c18514116a3d9cb2fadc12704ae7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-b03c4c87ff7bab2ae236d29a941caaa0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-cde26cb38667ced94a7ae59e21d1dd95.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-cdfdacefadee3ac15d930a67722d11e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-product-catalogue-f9aadb3cdc138771a95f01e67d7ac253.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-profile-builder-2efc0981a055a3e602c4cd88e853b098.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-responsive-image-slider-5ed7439fdc6a179319e68a6091db0e8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-reviews-708bf4cdcd042a35006425f5ea7145d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-reviews-9cac9db84fd0e9e4554d820862a40ccc.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-reviews-c2f057b1286b0479a330a6cf26c60c67.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-sms-notifications-7e5407bb7184b7940282a0b93fde7bc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-0e6b771f58abc47bc1cd00cdb88a6b13.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-18e30a879d28e13fe4c17653ed1fbf81.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-2c0845cf5ef92a44ab74f2dd40912af0.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-3744994d57ee508f70c6a9f678c510bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-50ee1df3b648d8ffe7c8bf72d2de42cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-87dbe2addf6a62fa336594e2b679e9d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-b3e3aaaac8096f0ab040a4994ceb701a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-baba5d57c66f94a59676f999b229ed40.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-f2357db60079c2fc441be42e2dc1b954.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-icons-fbb313009acd3079ce8680fb05b3abe6.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-plus-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-plus-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-plus-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-plus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-social-media-plus-ea8ebad551118883e1feafe80a786b1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-store-kit-dd1f48796d4f00ba40c7555318c798d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-tables-f75d5e3e7f3e99d9ce25d5222799613b.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-taxonomy-manager-4ebf29f3b4a848c6cc95b046c1f56126.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-taxonomy-manager-b8296fd7e9d3d8c36b36cd4afd336fd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-tinymce-f63b14eb213bbc6239ffa4f4e582cbbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-under-construction-4d6b9908316d738d104a51fdd9ba9967.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-weather-plugin-6dfcf8980861ee5739e5b83eb5156f9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-widgets-light-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-widgets-light-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate-wp-query-search-filter-f48aa8ce150f50f9f99d4d22650a952e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate_vc_addons-1dd6b9575ac3d36dc5c340f7191b2a11.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate_vc_addons-42a6391e7ed0fe5a4ef825a270130c8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate_vc_addons-86920ea2244bf931a0a9455591658b64.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate_vc_addons-97e102e48e3400c8c2827b76216fe5ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimate_vc_addons-c12fe9671d21c1c91257ccad7444bd6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimatewoo-6717e2739d81d19391ed1a7f5eb33e10.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimeter-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultimeter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultra-companion-c2d16b936c79c5f7cc118ed34032bc44.yaml create mode 100644 nuclei-templates/cve-less/plugins/ultra-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncanny-automator-2ee8042813603dca155007c66d9f6e42.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncanny-automator-bece17e1f0cb0904484a2c28333a822a.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-05449252a81a55fa1aedbb41d626d3a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-66d45612d48c50a420406488ffbcd2d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-a75e8600265672ffbfe8fc90d6a06636.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-c6423cfe94699f968f30f91786e41914.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncode-core-0aa92524ef3f479006bf6a6cae10326a.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncode-core-7a2fa40c9c3153d28c4763e5656c59b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/uncode-core-9ed7e89f3675608a54d511e5410f33f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/unconfirmed-a24ad83ed56eb98da964ec89f37324d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/under-construction-maintenance-mode-1a77d096fd122735e7059db4ae2493a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/under-construction-maintenance-mode-98a55f47607149620a63e3a8f43662c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/under-construction-page-74c4f31916c7f5bc337751afa8a7f10e.yaml create mode 100644 nuclei-templates/cve-less/plugins/under-construction-page-88940c0e9fa7615075a5fc8e9bc16c56.yaml create mode 100644 nuclei-templates/cve-less/plugins/under-construction-page-c8d3a5bffd1b0c28a6e17cfdad5deb52.yaml create mode 100644 nuclei-templates/cve-less/plugins/underconstruction-0e39d853b3d4654c80796b1245bb017e.yaml create mode 100644 nuclei-templates/cve-less/plugins/underconstruction-49a29c208dcdf8c767e242ee9b07c664.yaml create mode 100644 nuclei-templates/cve-less/plugins/underconstruction-52197fd3d372d9ca3330b7fb6abe6c1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/underconstruction-8f08fc8519e9426e0c9c0ec2b77bcf6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/underconstruction-931565033fc7a18f04b3f4a474f02d5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/ungallery-054a0cbde4f5e83c80e6fe80ca873ffc.yaml create mode 100644 nuclei-templates/cve-less/plugins/uni-woo-custom-product-options-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/uniconsent-cmp-52d99f3d726c6a2b0f9591cf7e9202f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/unify-06c85397dccc182d76ce00ddb1fdcc56.yaml create mode 100644 nuclei-templates/cve-less/plugins/uninstall-e0876152720c53588a74ce9328051604.yaml create mode 100644 nuclei-templates/cve-less/plugins/unite-gallery-lite-103ae57e192be7c58d97324e70895c9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/unite-gallery-lite-1ccd8092085adf5a5342024d683bb79b.yaml create mode 100644 nuclei-templates/cve-less/plugins/unite-gallery-lite-4b751d7bee414741f3c79461b74b4584.yaml create mode 100644 nuclei-templates/cve-less/plugins/unite-gallery-lite-d8d7674d520927a7ad2ed94f66363231.yaml create mode 100644 nuclei-templates/cve-less/plugins/unite-gallery-lite-e8e6f489ccaee4d00c096c7d8c466fc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/unitegallery-24e3cfedb16e14aa15147d4ebb35d6c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/universal-analytics-ac061f34e871527fabbabb8afc45c209.yaml create mode 100644 nuclei-templates/cve-less/plugins/universal-star-rating-09395db7be64b2d03b62fa45ed0398d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/universal-star-rating-d853e52fe1d33267e0c81c91100de86c.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2013-0291-deleteme-58ddfbc8f08958c578758b38baef9c64.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2014-4663-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2015-10099-1-e1d1dd2650750b2b23a32becb4d086f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2015-10100-1-57f7b5f0694f05830341c7de29cc9c44.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2015-10122-1-fb63d7c63da2917737fade2e6962cd5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2021-24916-1-6c82b87e7c42a19481f1690450d14b67.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2021-25120-dcded48546674d8a7147bd7b9ee5af2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2022-1772-4ebbec62da7dd4744569d093e5a7ca36.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2022-28700-eee72fcaef7d6d7710f8503cc05b2365.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2022-30536-dcbc0003781c6decb5bf6d916532822b.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2023-0865-1-af4d8c78cfc5d18ffd2467d3a5581338.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2023-35776-1-5558112c84605e9bc74e93c1eb9fbe3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2023-3650-1-5ef4178486944c845329dc8d7715fea8.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2023-50831-1-f3d1f4048a78d100d7199aa687dd970a.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2023-5530-1-7e83efd5775fb18032b0a614d3a4dbf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2023-6485-1-3e71b451d444e56f20cac2bd5a92795e.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2024-2908-1-62601b5430c03a6d792da3905efea1b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/unknown-cve-2024-30226-1-e5bdd89e96929b7bea4a7677f7939bf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-addons-for-wpbakery-page-builder-7222dd54a342eb0ec1d2eb49f0d0425a.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-83be4877901e862ff402253df3e3d6d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-0115c4f456db0247c3530a55e2dfe13e.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-0ecdecef5b5861d9228c5e4232350428.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-1f2c777b2d1a87f6daecfabe8050a1d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-2304b21574018f9296b7348b5813fb8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-6a7387f7988e4dac2eb8210534154d2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-8b1647a7cae04c475a434c97e40430f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-a4e1a6eed6af75293ee8acc33aa5bb7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-a752917f99712ba0255e64b4033cf044.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-ba7ba7554cf607d5d507c2c2d4751a5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-f213f0cf0f29187e1d444e194fee045d.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-popups-87cd3b8d44051ebe8fa42c56e4d1cbb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/unlimited-popups-f4a8622061e5460b0d2e3667b1d15b03.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-0fee961f47a5a9afb9a972a5a5342a98.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-26699e962c9e60112283bf64ac1ad60a.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-2a1f9d077aaf4e3fadb41e60e62e6854.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-2b045fe9c22899f178f1269f6a026542.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-2b7ae4ca78bd06166aae6152ceb4da4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-5c781006f6fca5d11eb9b4f46b04eda7.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-6ec723a75cd7d5a7782b1351c8098782.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-76ac5b6d638212e0347ed800db5531d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-7fabd60d3b2198be95329f47bacc886f.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-9a0b6c64179538a07b644a9798c3ccee.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-a0e3ff5d3be6b2d76d2f97e392703cee.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-a339149dde9b1d7d6ce8f5a68c95c72b.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-a5b2d252972ec3a0a983d2f147eccab3.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-bc3c5983bb2636786bed9c036578261b.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-dea1282ba49458404fbdca77bb502b69.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-e06f0873eb001cb3482364eb50615d1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/unusedcss-fdaa7c7a6a16dd831123dd45077162f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/unyson-610d128e626440e80c8a487da8ac96e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/unyson-90e033d103f597ab6ef613db20a319e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/unyson-ec632236ed321f22549e49610f9ecc8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/up-down-image-slideshow-gallery-7138d2ba8421f62a9d8f037aab75e745.yaml create mode 100644 nuclei-templates/cve-less/plugins/update-alt-attribute-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/update-alt-attribute-a1741d936a6f3f09256d6ab3128f4cf5.yaml create mode 100644 nuclei-templates/cve-less/plugins/update-alt-attribute-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/update-theme-and-plugins-from-zip-file-f49cbe09035132568d19e52e79936740.yaml create mode 100644 nuclei-templates/cve-less/plugins/updater-5a578f0ccecd9e70dbf98ea6c2ad1d23.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraft-c7d89f14d724c38d6f5b1f1ce939143f.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftcentral-54f7c8a344914499dc39be96b51e8433.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-00045a0149ac4849a8afd76259c91e36.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-1962b90b79f7e959c4385d817037dc9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-1eca727a0c6686a8bab81174d47e18f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-25f70760f08292d981b9d26ac7ec9db4.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-4bbd3789375ef8b0ef3fbe16cd0df54c.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-50aa046ee7fe3b1495c79cf309977bf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-53e761311ef3248ba3af1f39cba27328.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-72d990255d7638d74a26d5dede988b7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-84290819179c80fad98664a6919a3707.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-adb867864793eef1f6a24c287d50691a.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-c3cfc3a43625bfa414c3f27665757d46.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-dfc59073972648e0153f8a7cda52c6bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-eed5fef42a38602252bb39c1154507e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-f1749872ec46f0f647fe9218c75359fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-pro-50aa046ee7fe3b1495c79cf309977bf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/updraftplus-pro-84290819179c80fad98664a6919a3707.yaml create mode 100644 nuclei-templates/cve-less/plugins/upfiv-complete-all-in-one-seo-wizard-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/upload-file-type-settings-plugin-5edfe37e0774673d507ae94c41a64138.yaml create mode 100644 nuclei-templates/cve-less/plugins/upload-media-by-url-bd97d62d56ce3ddf250859ccd5e19efb.yaml create mode 100644 nuclei-templates/cve-less/plugins/uploader-38106c08054956ec9ec0eb985cd6a30a.yaml create mode 100644 nuclei-templates/cve-less/plugins/uploader-735ef8c38ee5ffe28e9bc5668b5d3f8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/uploadify-b4755c12ff5cf84e1e1eeb1202ce1555.yaml create mode 100644 nuclei-templates/cve-less/plugins/uploadify-integration-16a665c0b98de9adb6d4047ea6cb1588.yaml create mode 100644 nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-31f526f5fc6023df268597ecb0e81e2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-3e6fcba7da4eb2d07480c9678c589c91.yaml create mode 100644 nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-5c305c85e58387c07315e703af6d187a.yaml create mode 100644 nuclei-templates/cve-less/plugins/upqode-google-maps-21d62382cf0e1f6a821aaecd2963e3e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/url-cloak-encrypt-2e334a9b30a8a16758bc7c2d1620372e.yaml create mode 100644 nuclei-templates/cve-less/plugins/url-params-89a1787cccb90fd10317497361aed1fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/url-shortify-776a14f8c4824ce1b1f773d4a2d1c83a.yaml create mode 100644 nuclei-templates/cve-less/plugins/url-shortify-7d73c621a5e8b7d0767350621fede4eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/url-shortify-8987091ef60f2278d438fac982e52804.yaml create mode 100644 nuclei-templates/cve-less/plugins/url-shortify-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/url-shortify-c2468d3ae2dd3b63e789f3e42f85078a.yaml create mode 100644 nuclei-templates/cve-less/plugins/urvanov-syntax-highlighter-05f9b585294ccf338dddc9365df56f99.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-030644f38346879c8062677144e765a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-038cd4d7f3a85c2e02153b9f3d732338.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-096aec3054df6ba2321176f02f5a1d37.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-1dc13a6a71c3d10751ef8c16460e007d.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-1e7c916b690d74cb7822c04675caf429.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-210ee561ccacfc2a5ebd14551c7ee8ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-21d8c490b865a29263e262b969e2ce3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-229b28e3351ab434cc4be3a1c3322160.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-2711228331aed4ad8d57b410230e7202.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-27b0c9418a17896ce00c7f804b61f8d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-2ddf644540fef01e3b57f8fb75bbef89.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-2ff5131571517bfee0f572e860d19db4.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-31114b788d1703e5027b3d9e13cfe612.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-4b4264267e112c94d109dcec42a2f42e.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-4cfd2c744e2f57cb62950af3a51becf5.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-4f7978d908f1ff8c4cd9a4c00b97533c.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-4fe7d1bc981304a877651572e2d01606.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-536d118f42dde4ae5564cdbfac7489ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-559ca835d1ba91752b5fda135b9252b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-72bbf06194176f982771d77cb4853bda.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-774c036e84ef68a0e067057a5470d4c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-87df231a3fe89988f05561dc4a2eda17.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-88d558d73b2f64520cd166163d121c99.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-8cf84dc81a40a5707b5bcb6a5de08836.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-b635a88aed40383d80b165aae1551858.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-c124fe326fda2227cda364e6977789ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-c85d6be596b55b91d137e8053b85f064.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-cfe5fa3015f2fc55d2b05163019ba81a.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-defc78f281b1b753471f78628f828031.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-e3d6a99c1f59024071ddea4c2fb68561.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-e4a8e0f95ee7761efbfd23ea0c0e9596.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-ed4c279d09c7012524c7ccab923e2ae4.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-f06d882e6e9ca473dc32139014858b23.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-f56dc5bbdc913e57ded42347de5ef8aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-fc6e5379eaab092cc08185fd85a10348.yaml create mode 100644 nuclei-templates/cve-less/plugins/usc-e-shop-fdd08ff4357466d1ef831234fd4686a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/use-any-font-4c69021959bdea7c58c778958310ad50.yaml create mode 100644 nuclei-templates/cve-less/plugins/use-any-font-bdb0853cb6d84b9abe929218f47378a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/use-any-font-ce93f109973b52b249a7106eb15a123c.yaml create mode 100644 nuclei-templates/cve-less/plugins/use-memcached-f91c9276892eda169cc400a6c1591e0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/use-your-drive-97b7c398dfbcdf367ba6ab6fa80d3110.yaml create mode 100644 nuclei-templates/cve-less/plugins/useful-banner-manager-663fd6040ba08a6cf95a5d56aa372c7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-access-manager-17f86cc37ff70d41fe6fd01dc9d4117f.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-access-manager-6233e05856841c02f1c38924069a60ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-access-manager-96bfdb264056a59de7cf266b01d0316c.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-access-manager-a6c764475f8c46f0276397b9437e1a40.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activation-email-044b344fe9d706549aa3d52095be3dd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-a9046caf138583ab295d7c397e7fc905.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-01d78cbce70a1dfeb3bb295a9cdc3356.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-02cae5f64c7458f6a2f1e1b080ca9389.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-1e01dff414d04212c3c6453a2d281edc.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-60c68d204f0a8a653bebafe6c6059142.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-784f32f658992df1fedbc6c38d15c1f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-cf0ba687a6ace638f9be60d1f6b85b3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-e27368e4785bcd7f22809f69244573f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-e95622a863397746d0d019b16e681085.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-ee6d7181de7e06427ee243be8abb06fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-pro-580004f61a42f3e8c462a7bbd946dd47.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-pro-948ee2018064c5e8007e811b1634bf17.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-log-pro-cab9aea0ec63087506e1760b3541b9ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-tracking-and-log-86f9a1d2e10b6f707453e4230d5a4770.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-activity-tracking-and-log-aceb5c3c8c29eefd527f85b61425b8aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-avatar-1a7905e3891eb108823307ae3d6bb4ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-avatar-reloaded-48546947f3dbea6a3d1c0687b8db90bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-blocker-78588e22a79e99f07ccbdc69fa52af87.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-control-18d2c8e769b3a1ea9cd3276288e3748d.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-domain-whitelist-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-export-with-their-meta-data-07eca49e75cf7db4ec73f20f42d19592.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-export-with-their-meta-data-b68fe278807d5bbe8b9f9515e0348d4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-ip-and-location-0fd2b55ebd627169d7e7b82b7b9c0e52.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-location-and-ip-2ccf4a97a0b2b289a9997f10c05da014.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-login-history-933c9d4b3eacccddbe4abc821f273b41.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-login-history-9be06bea648875a81d4dd1ca47dd3d3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-login-history-d5d36dd3296371bddd49874e159fc4e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-login-log-f899587161f02b977d621dc3afe7bca7.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-menus-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-1bdc37d166ed1b52a0580bcf09d995a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-27ff799b988fb677dadaedc3ce5f35d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-5115b57fde3d1e0fc01f9c1b4fc604ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-ef13d8f60909d5e2009ffdcbdc23e29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-manager-2a280bf41720079c39a3d0371323f56e.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-manager-9613ac9ff24ae943d3cd927f06034317.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-manager-baba7e4c328e9317fa2b2839a155f748.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-manager-d08b89da5a56f4cae4fcae784a8807f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-manager-fd49f8dca96bc998246e314731906420.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-meta-shortcodes-5edf46c467e512c2a9c72dfadcf57fa5.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-notes-e04c0fd89ca49cf41266e90f8d4a7135.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-photo-70ddedc5487f163b43d7ace431e3f2c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-photo-8e79000a55d2a7778e1f3a653b09e17f.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-private-files-2203cb02480ab13ddbd56959a93d1555.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-private-files-2fc467eab8e252aba51501d739ddcb42.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-private-files-34d2a65b3d8097e555cf3aab3134db2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-private-files-d150ec7618e98f105f22738eb7217f44.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-private-files-d51a1ba95a0d2e1117f38d0ea2128650.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-profile-103b877d6c6654d012dcfb8c68378ae3.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-1ab35ec2ada14325b98997bb858be8c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-2612ae00d02e310a6680f563b8b56eab.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-3d14b08568400569a677dd320c2e823a.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-4d9fd3b2756396c2e2474f36f3b3ed72.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-563b5a5f445bb7fdee347bcd0ac2e921.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-5a06b4b0b81af48987e3d90166388572.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-89a71e03ca88d2c02f3be0f2c0d21756.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-a3ab87ca43ceb26b3f09e3ed0047a2de.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-d2e28c2323c53d6e9cc43d245f41b33e.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-d95100aaa0c0f9fcb84493d4239628ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-registration-f2f2b27ba49b35955a269b199809763e.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-rights-access-manager-0b9fcb239ed2ed2b5bab0eed8480c44c.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-rights-access-manager-954c2405c628d0efb2aa813bafba83c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-rights-access-manager-a0b7b51da946e56980c587504bc9c3d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-role-19953c61fa61f206c9ea957d11e2d617.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-role-be510149fd1b62e5b5bb38762ffb0573.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-role-editor-19fa35bb35a821be90be40a4df1f6407.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-shortcodes-plus-4c45cf0c9392dc7bd44f9128bee077ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-spam-remover-6c1be9857aef3e70d84394860b7ed82f.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-submitted-posts-17a41e1a16870158d7b7f29143acb1a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-submitted-posts-36cace1718aa377bc2a0687653bc5015.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-submitted-posts-b4200cfb6c25751d846b15f9be817013.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-submitted-posts-e52fe8ccbb854729b4cd4efd3c029a6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-submitted-posts-ec6e68cb23a447be8fad62b8d99d082d.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-submitted-posts-ef952e49d818ad8d9f5105858ddc8b74.yaml create mode 100644 nuclei-templates/cve-less/plugins/user-verification-ca88165c86af83d72c5c99df7036335e.yaml create mode 100644 nuclei-templates/cve-less/plugins/useragent-spy-6cfb5c63bbc7af6b76f9e01d4d2fe2ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/userback-0c4c2f31024fbf5cfab7d01fe111d650.yaml create mode 100644 nuclei-templates/cve-less/plugins/userfeedback-lite-1e3a0fb44323bb8b37d482026ed1bcb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/userfeedback-lite-61ee64923a0fe1e6df3a4bb79ec27733.yaml create mode 100644 nuclei-templates/cve-less/plugins/userfeedback-lite-bc5c4137940b6ee9a3fd20aa718b68a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/userfeedback-lite-bdeaf570096cf99a20e12f37d41beaeb.yaml create mode 100644 nuclei-templates/cve-less/plugins/userheat-783cdb329475b25222f6cb9b44f2e64c.yaml create mode 100644 nuclei-templates/cve-less/plugins/userlike-e37188c1de6df4d33488960fa6e214fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/username-updater-2508566224c9697f712ccd556a0ee74e.yaml create mode 100644 nuclei-templates/cve-less/plugins/usernoise-b99ce0637c979eb1d01fd84441afddba.yaml create mode 100644 nuclei-templates/cve-less/plugins/userplus-dbb603a582acad18868b604587ba2dff.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-04f8df43c58f1fcfe62ac6f2791a6403.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-0738939cc65ce7903ad33d05a6227fd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-154b839caaa4713224f0ab043264e6ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-183bcbf1ecc01c4bcdfd0244c1054c88.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-299d4f6f43babb859c2fe770a633ef35.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-3c7a7bda89b03e9d2cc247c341834e4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-3e54e940d7f7e91b150b3a2075b3abc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-656244efbeeadce5c71da45e29bb9a67.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-73550b54c3b3918e019ec5d1a646e218.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-89d956efcfdb19ea855c5732e7ba78c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-ae32c7f72e10e74657f2f9c1c4ca3ce3.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-caff8f6f354132f41c0e30a99b04fa75.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-dc4223fef5ec45deab1fbfe214a6cedd.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-df416b9c3abe234cfa201d8c25a6cb67.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-e552b5aef7987e0ab7219edb686bfcc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-e9ae8122ab019b9f575d632976e78882.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-ec4b5ca541f179f9756ae5a9210d5761.yaml create mode 100644 nuclei-templates/cve-less/plugins/userpro-fbcad9f6d7319e6ca8392a71ea0bffb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-0ced1508729f529a88bdefd2f552e467.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-2178e4e9767ddbb5794b39d1005e082d.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-4f3805308ff329789ed39fb1a7c50453.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-a5584c4a9e33feea6b14b638918b3b10.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-b9a49aa567e405f97048b32968f3519a.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-profile-picture-28ec3275d51e7b8c31fce132b1bffc74.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-profile-picture-e433366cbf26ba8f78929a0ce010f58a.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-to-csv-3f8947e2a587b0ae5ce07c0ba75d46bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-37103802a9b9cdbc51b5059fa8045bc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-3e0e02d0ef91eed396842fb253ab425c.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-4d92bacdb897e72bc7c9b888465bfb12.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-4ee3b92fe5cef5ace6e0821bce6a628f.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-741cff403a911873546d8451aea6b8dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-7d8cf8e800d2870ca230bed514c737c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-9ae9897b899214e88181a9313e35781d.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-cace5e5791cd3b60783efcb6a58bc103.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-ccec5144654bab62438c0000b0cd001b.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-d475119af8f003a2c6e0eb9a10044dee.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-d7cc53ebc89a0251fb7abbabbb69e870.yaml create mode 100644 nuclei-templates/cve-less/plugins/users-ultra-ee6588c23752ef8db22d5c7efc9281bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/usersnap-650d3965dc4c579880213651d87a4777.yaml create mode 100644 nuclei-templates/cve-less/plugins/userswp-467ae4d6a0b8db0e5b6c781618b2d3ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/userswp-608aad3fd1d4f9ba2d0904fa4c5d78c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/userswp-83754afd4792513884989ed11f95add6.yaml create mode 100644 nuclei-templates/cve-less/plugins/userswp-8d1c622642cdaf2469921f84335dfe12.yaml create mode 100644 nuclei-templates/cve-less/plugins/userswp-e839aa50a0f3e00f901dfe5f18166d4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/userswp-fbc5f16f0d879df70b9a5d8bd9595927.yaml create mode 100644 nuclei-templates/cve-less/plugins/utm-tracker-fae9c4f5e42508587fcd2ed1f9caedd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/utubevideo-gallery-17199c68a13d9adf35ea73d24856f5f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ux-flat-58b2abf7cb460597ca6a6d20fc9fbdcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/validated-22471b3f81db400388be79d0e5d0cf32.yaml create mode 100644 nuclei-templates/cve-less/plugins/vanguard-eef4fef4e9f3255888f8b403eb0a1916.yaml create mode 100644 nuclei-templates/cve-less/plugins/vaultpress-a000811d6a7f224f2863a66f08bbbdef.yaml create mode 100644 nuclei-templates/cve-less/plugins/vaultpress-e4890ed290e8d1de6f994e789f5bdedd.yaml create mode 100644 nuclei-templates/cve-less/plugins/vc-addons-by-bit14-64fc1c1aeafb0b67c8b714966bfc2dcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/vc-tabs-02e92fc9d8edd2a31ef37844cc4fdd57.yaml create mode 100644 nuclei-templates/cve-less/plugins/vc-tabs-36ee3fb721eebb245b42e5817603a92b.yaml create mode 100644 nuclei-templates/cve-less/plugins/vc-tabs-e4bedac25bcf1a2f58f7010119167cc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/vc_clipboard-02e2e7490cf032ead7b1cdd23b1c4e3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/vc_clipboard-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml create mode 100644 nuclei-templates/cve-less/plugins/vdz-call-back-e460da3b1111d5e40e60d6fa9f63a75a.yaml create mode 100644 nuclei-templates/cve-less/plugins/vdz-google-analytics-7f3d4ae07c7ffdb4fa4da20576013347.yaml create mode 100644 nuclei-templates/cve-less/plugins/vdz-google-analytics-820c42b11e0167933dfc728bc7134cba.yaml create mode 100644 nuclei-templates/cve-less/plugins/vdz-verification-1b1edb5a0481b6f1c207bb5bde4a4999.yaml create mode 100644 nuclei-templates/cve-less/plugins/venture-event-manager-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/verge3d-61bd18cfe47ff36978c91845f9ffc1e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/verification-code-for-comments-f5a38f2fe44d1f55847f0985e9ae01e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/verse-o-matic-6172c422eaf36f3edbfde89320e25329.yaml create mode 100644 nuclei-templates/cve-less/plugins/vertical-marquee-plugin-673a5e282a31715aadad077526dcf5b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/vertical-marquee-plugin-67a5e177b639db224cce52014e47431a.yaml create mode 100644 nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-3cd2547007d3bd29308efde9fcc7a52a.yaml create mode 100644 nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-4703f57dd95a665cc36f6d5726f726bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-c284496133c2f9c59611c8aa7ef34141.yaml create mode 100644 nuclei-templates/cve-less/plugins/verweise-wordpress-twitter-011e0a807fc0a0f2b6240634cb1a2fc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/very-simple-breadcrumb-af6a5ec90875038596d2be175f9973f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/very-simple-contact-form-6cdecc6c25d61ef54d3cce62a39d5781.yaml create mode 100644 nuclei-templates/cve-less/plugins/very-simple-contact-form-ac7f9e7a96a60fd50d34edd3ddfed5fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/very-simple-contact-form-c4a0d7f41c623cf7ed897902ed58a4d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/very-simple-contact-form-fee860b7d0f6d3f1d84550b3137cfcb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/very-simple-google-maps-1f531b026c2443d4ba9e4c6118234d6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/very-simple-google-maps-3937fc851cb1ff4a5bb8e086fcf8881e.yaml create mode 100644 nuclei-templates/cve-less/plugins/very-simple-quiz-2dc0412984b0bc2f2e238ad04ba47e6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-background-5826ca6dc34aaca6ed2393f60977f5a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-central-0c9e1bdf3a0788fe28746e6155355583.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-comments-webcam-recorder-78372eee8a5b2f566eb2e73090f227ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-04b07d5a23563c59738fac6ed8c55499.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-0f74188fa6907e010455dac3c70a8990.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-53bb78dfe8f49d4c148bc03b41d5bdd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-9285e52d6060d6dfe3360f4e1f181cf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-b3301724d1287a8bf29be9b1cdb836e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-bb335261eec45408126dfda83cd4c302.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-f10237083d4fb8765ca105c0d369da21.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-fd0cb242cefa0526fbeeee9f82de8f3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-contest-9390ac5e66dccc4c03531e3f70a3187f.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-contest-9c305cd17e2c5e4b31590488ef7540fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-embed-box-a38e11881f3b1727628c06798dde0846.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-98fa09468510e4f3d608da204df8d702.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-e01f827fa521817af1e20ee7feffc395.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-grid-966b09d5da742736124d86ca165e04fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-grid-da5e4c18307210c3c7624c0c204213c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-lead-form-2c3b5f42630b423898a1e16a09268499.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-list-manager-0641eb85b540308df0a59914e6860d1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-metabox-75efd2c629134e3b1ce9051b730e0f50.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-playlist-and-gallery-plugin-b02a15f7379c80def93c3f96c6e69608.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-playlist-and-gallery-plugin-cf54779dba07a41267cf823153d0f954.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-playlist-for-youtube-a0ce396e7f670f307c62bda6d8db01dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-popup-73b8394a2820dad4a75a3855507d242d.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-posts-webcam-recorder-5db7f2428ab16ac575d716a8cfad3c32.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-posts-webcam-recorder-c54528cc487e7accd04a692896738ff0.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-sidebar-widgets-24e6c274146f1f712f8edfca9e42b8b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-slider-with-thumbnails-8d15869c84f7bfe6c6e24ef3e0872ddf.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-synchro-pdf-a674e9a5d2840820506909b7c50b3d92.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-synchro-pdf-b6332548231f9e6746e56fba70247618.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-thumbnails-66fc8c140dcc821532233cac0866d8de.yaml create mode 100644 nuclei-templates/cve-less/plugins/video-xml-sitemap-generator-6dedc798f36ce152fba54a352e7344d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/videojs-html5-player-affad12bbe06868aff921eeaa6373196.yaml create mode 100644 nuclei-templates/cve-less/plugins/videojs-html5-video-player-for-wordpress-cb800bf450a42c7a99ab39154ac260ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/videos-on-admin-dashboard-8391bb351216c4e82b25becd62acbe04.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowall-00e5ad7e3bf399641d532ed3e720874e.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-03b6c1fcf0f57a257ac2a3d2a55d5120.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-42a62f1f71a30dceae90a70ace46a441.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-6a21a7f0a6f77d602fe9c552fd42f33f.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-7d1e8292f93556701618a4f3a10127bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-86f850e8e3017abf354eb04e885cbf48.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-a2cc7daca48d70191ab86ec84c12d114.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-e248f5c6da990a6a809a8d58910d242b.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-e3eb91ea8e0abf266056dc6051ae44be.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-482450ad7baa658a3b68c206f814d808.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-6f6f44e45d5eee07a0df86633d90ebbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-eb64a1dd7efbf5edcd293e2db2a6feb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-video-presentation-9998c7f7c7bb7712cfa7f84562a697aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/videowhisper-video-presentation-cefd687fbbabebb599cedccce0e05504.yaml create mode 100644 nuclei-templates/cve-less/plugins/vidseo-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/view-all-posts-pages-2a6d9f6b466aaa4a0be1aebe9eb53633.yaml create mode 100644 nuclei-templates/cve-less/plugins/views-for-wpforms-lite-0b7d0113722a4b24cdf6bdf7adba767c.yaml create mode 100644 nuclei-templates/cve-less/plugins/views-for-wpforms-lite-56d2c56931ff57a31974c2c98619fbfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/views-for-wpforms-lite-8cd4e41bc9637a2e580f2b8d0e6a5222.yaml create mode 100644 nuclei-templates/cve-less/plugins/views-for-wpforms-lite-a603f2f7b17ff9bc553bc5b3bf9dd764.yaml create mode 100644 nuclei-templates/cve-less/plugins/views-for-wpforms-lite-c6f76b277135a527f7d758e51abc2864.yaml create mode 100644 nuclei-templates/cve-less/plugins/vigilantor-9d9f04adbd773a74d47487580aa614ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-059937c2ab51cec2bc81f288819c3352.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-0f884ba817e82a09c51444fd8fb9e0c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-1132ab9cdb5e1aa03187f7d03bdc59a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-11c30745c195f14e48360fc77cdc8022.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-12086c6161e4cc7ce0b879de54cf11f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-149a8ac4ac482f385c63390cadbe0a31.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-3dd533aeaca3a609962577867487da63.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-403f4119f5106c46647a3bb6c05fea16.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-9ff0528f3bdcbc7bc2a574ec76b7073c.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-ba194baade8141b72395aa7c5242d733.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-c0b90ff70024ded1dfbdce03e3404db4.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-c19786c26a81604ba7bc3b6d58623c1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-c235b99db232fa89dbe1e8ea3f927b66.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-d0ed43596ccad23cf6dcc12ca585066a.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-ea274279c76479017f4b24af2da83e22.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-f0f2d05530912202185a73680e9244c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-fa15faecec3c0097e1e35ec5d5e47da4.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-fcfcdfbc5ea20598aae14247eec11a2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikbooking-ffb7f4edd06313966de8aad6a57d25cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikrentcar-16743b52ce55d3a70d56b31f8a11af2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikrentcar-24d354774853bc075905dadb9ff31bb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikrentcar-89a7d7a1b88043a7292e56fadd9f32f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/vikrentcar-8e0a508178120443600d129a2e7dbdba.yaml create mode 100644 nuclei-templates/cve-less/plugins/vimeo-video-autoplay-automute-eaecffa52785ff552863c4cf8f09811c.yaml create mode 100644 nuclei-templates/cve-less/plugins/vimeography-bebe54861e63e8c1edcba180c7d233b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/virim-88ade2a77a8822c9ff6c3f53c1bb583d.yaml create mode 100644 nuclei-templates/cve-less/plugins/virtual-robotstxt-littlebizzy-2d9ff787627cd2e1924f86a1568cd815.yaml create mode 100644 nuclei-templates/cve-less/plugins/visibility-logic-elementor-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/visibility-logic-elementor-3bd671f811e3dbd6eac29209e9039fd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/visibility-logic-elementor-72146eb794f4fa05966f36db5696ae7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/visibility-logic-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/vision-b3d167dc589e1f7c398305699f98be68.yaml create mode 100644 nuclei-templates/cve-less/plugins/vision-c13eb59a9d6116b65835e8ca21a2d0eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/vision-f802cbbf070d1570e17c10fd49d87b73.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitor-analytics-io-8e9a9f02c6675b20e9272fbaa352217c.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitor-info-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitor-maps-41e6c56837296bd4311fa3f480bdbffa.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-app-e71ce69c47edc4e510fe6e645722913d.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-online-25b24f1a950efe4f8999613471b96c47.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-online-fa2ea82db1a96118628c1703677b3f4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-354f6d128f8dd6bd63a76dae47bd8628.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-36f12570b7647f69d0074b300c5e8c91.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-4fea783b4afcd4b123f2e73a82fb91f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-57b54adcb0ab1b8bfd870b37f7db6b68.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-5a91aad28267261ebd2de3c8343f1995.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-95fcd32657de195d1ff10c3dd6c72f1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-c591eeb2c7d14c7927ba6447beaabc1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-footer-credit-remover-364c4ddc9c54073c09edf9a8678d0eaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-form-builder-02a51eb116d83b932887ff5f7b3fb4a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-form-builder-101912c034e5833d5a8cc53836ca2a9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-form-builder-4c347b72fa44728662f7bf8d25a3a220.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-form-builder-531bd0b3fee40b8878bba597b7ee560f.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-form-builder-666310311f6b757b5edf8f0953dbd9e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-form-builder-ae7a817c1a6cf436dfde12a47c0fecc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-form-builder-bbd390969a32b30a2e60ec6fbae2e10c.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-form-builder-fd65d6ef4219e436898ad3cacb24b677.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-link-preview-1ba012726d7c27bdaaa5794ed01a43ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-portfolio-904ef9700805f0f3f94a1742149713b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/visual-portfolio-f7bdb4090710d2db62425857f01fcc9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualcomposer-1390282d7da53f6dd62f69c33ae3d8da.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualcomposer-8a58bcfdfe2c7ef0990c9f0e6222a7d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualcomposer-9c4cf933125615aec48f1e67f49080b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualcomposer-b1162d19127bf06b82fd09bfd50f373f.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualcomposer-f7c4402196deebd8e7afa93ed50fb9fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-2124b535b772d79cc24446b949f6de44.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-41ad3634ff8212271a6b431b84da2b4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-4f85b81befb670bebb2829a27d7eeb09.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-586527cb70d024f19104907acee04683.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-9153236cbe43b83fd86d1f43d04bc623.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-9bbff95ee11b793fca5a68930a481dc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-a42d8ff7a7669fd14fcfc52a34b52ce7.yaml create mode 100644 nuclei-templates/cve-less/plugins/visualizer-ec448d87fbb2bc9f763dfc52911d4e7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/vit-website-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/vitamin-78063a4bd6e10b68423683776f51a447.yaml create mode 100644 nuclei-templates/cve-less/plugins/vitepos-lite-d6b6bc643ec1ba18798cef4b6b37fe69.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-12bc74e09861e7d74d799801df685593.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-5f7a0857cd225d8f715faf1ad377962f.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-649bbe5603010e1e08e8da0606e10331.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-8f7f33ee1e4675fee4c38d5051fea8e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-c77161a5bde1c663570a6c8d07d1524e.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-c9d94923a4b0892540bbb0f51f12aa0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-block-patterns-0d1db255d715c554771e21ce6d36684e.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-block-patterns-eda825401e6ca5d10a15871a11cf4f40.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-blocks-06ebadedd58b7ae3403fa022e6ae3a90.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-blocks-30ce892560143a1889e7a76a4e09b69d.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-blocks-4131547f48ef03f81376294e8bfec1f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-blocks-768fa7749718c2471763f91755f4694f.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-blocks-7d646a32d0c4bc3814bc480ca69d5434.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-blocks-pro-4131547f48ef03f81376294e8bfec1f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-blocks-pro-7d646a32d0c4bc3814bc480ca69d5434.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-filter-search-0ade74287dacdefe3e19153b1abafe0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/vk-poster-group-d8b1183c7012780dff9901b361328ade.yaml create mode 100644 nuclei-templates/cve-less/plugins/vm-backups-213063abe242012045731163716041ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/vm-backups-a4378f0df660425c1f67e7a182915736.yaml create mode 100644 nuclei-templates/cve-less/plugins/vn-calendar-495d298d6c0fc5fe1a9847d638c40959.yaml create mode 100644 nuclei-templates/cve-less/plugins/vo-locator-the-wp-store-locator-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/vod-infomaniak-a84518c46b40e343620d7d2d2c269c9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/vodpod-video-gallery-7d553117936251fe3b1ece76fb8572be.yaml create mode 100644 nuclei-templates/cve-less/plugins/void-elementor-post-grid-addon-for-elementor-page-builder-e26003fb15eb8dfdd3862b141bc3094e.yaml create mode 100644 nuclei-templates/cve-less/plugins/void-elementor-whmcs-elements-261bb3f8fcb24ed57cf7abcc44aedfa4.yaml create mode 100644 nuclei-templates/cve-less/plugins/vospari-forms-c401610c8e651db75595790ef198f851.yaml create mode 100644 nuclei-templates/cve-less/plugins/votecount-for-balatarin-77ab2c9cedf221b773b22cab621c11cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/voting-record-ad8900917be83354859c30baad4cca67.yaml create mode 100644 nuclei-templates/cve-less/plugins/voting-record-d7a48a2145831cedc1837e88079bf034.yaml create mode 100644 nuclei-templates/cve-less/plugins/vr-calendar-sync-56742077a11be41d865b1f712520ef41.yaml create mode 100644 nuclei-templates/cve-less/plugins/vr-calendar-sync-616950a87be3ab946c404a2c6a2e1022.yaml create mode 100644 nuclei-templates/cve-less/plugins/vr-calendar-sync-7396a7e456a789122fb4ba49d41fa089.yaml create mode 100644 nuclei-templates/cve-less/plugins/vr-calendar-sync-a514896a8210fef61861b6a5fb93d0c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/vrm360-739af30ba304d3e19c7edf50976bcb67.yaml create mode 100644 nuclei-templates/cve-less/plugins/vrm360-902c45e06d6e22c072a9fbbf19901e92.yaml create mode 100644 nuclei-templates/cve-less/plugins/vrview-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml create mode 100644 nuclei-templates/cve-less/plugins/vslider-ae05ec43cb054e1a5de163d4a7addf3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/vslider-c05c9af186400589f780a92d671602c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/vslider-f6de196088ccb0c72ee71de4440a1879.yaml create mode 100644 nuclei-templates/cve-less/plugins/w-dalil-a9e063bb904bfdeb89be1c3d634b4901.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-237d90f247ac40e7588399f654c2f945.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-2c04466110be8251bf39f71f2f0129f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-33afd6f00d43406e27d753729de8f990.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-389652b9ed2920a4e8345ff324a62971.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-3b7846f9454db2dd18a15d1689f18426.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-4ca0a5e4c5d3b1a483a53f4021ede181.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-57ae0f701129b967301e9690233d7d6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-61d22084a07ab6379ed5a9d407ab8f1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-656dd25ede0c1a0fb3db612c85cade65.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-674672e1e54ec2d3fc7aad7c1b44634e.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-6cc6a3d6d739a61d420343f25551dbad.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-8437380ee000b7b821ec06d0f6614d78.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-8a10bd5b823c6c28d5929375c43a3ded.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-9634b52b6b740b73ed118cf9bfbd4f9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-b37fca0bdc8729c2bc44a693e998aecd.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-b5d8ded2a6d665cb05a255daa76e0cda.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-ba551800e95fe2ce106bcd3e144638e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-cf834d46bd9b982d7dc5819942daefcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-d85a4206680fff0382032f3de61ef4b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-e3b3066110fe8b51abc2330a4086e518.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-f9f79bf204290d6d3c8b8009bb85feff.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3-total-cache-fa0b9f9e638380f9e9ab2db59f133c49.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3s-cf7-zoho-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3s-cf7-zoho-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/w3speedster-wp-a31d8c67055bd157a9c5d5f833b91a5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/w4-post-list-081112230905e11fac17a07fd3185d02.yaml create mode 100644 nuclei-templates/cve-less/plugins/w4-post-list-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/w4-post-list-9ce8bccb779cbb91638a31953a621086.yaml create mode 100644 nuclei-templates/cve-less/plugins/w4-post-list-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/w4-post-list-bfcfe2a24b673f9c7c3adba8fe6586b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/w4-post-list-d895c4410550575e217cad2419400870.yaml create mode 100644 nuclei-templates/cve-less/plugins/wa-form-builder-74a80222591ee08f7fca8ee1f11e45fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wa-sticky-button-bbd0071d59903fe2f31999b2357a095e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wa-sticky-button-bc4698e238b0c0be70f90cf3e64702b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wadi-survey-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/waiting-1209e60c33aa42384c4d16b88f0a5ed8.yaml create mode 100644 nuclei-templates/cve-less/plugins/waiting-2724145ee24f5785e7f7e4619d00fbc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/waiting-8c1942cb96af03432bec152c3b3fb8a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/waiting-e15e05d52edf8dfda475d35365b1fa33.yaml create mode 100644 nuclei-templates/cve-less/plugins/waiting-f0771147e509df66bb2795f5abd8b650.yaml create mode 100644 nuclei-templates/cve-less/plugins/waitlist-woocommerce-15f73ea2399f5741a02449d49b638dc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/waitlist-woocommerce-9c997af79b10bc0805f0be2e95bc48ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/walk-score-bde36549e6c813f81edb8dd7a9a04ef9.yaml create mode 100644 nuclei-templates/cve-less/plugins/walker-core-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wallet-system-for-woocommerce-7706ecb0938b8fb85c383697e07572be.yaml create mode 100644 nuclei-templates/cve-less/plugins/wangguard-537a2dc42705104ff023fd51b5c2411d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wangguard-54e8332ab2042b90448af1c552f2e323.yaml create mode 100644 nuclei-templates/cve-less/plugins/wangguard-db49793104c02948c0a70acebb25609e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wappointment-002ef48540e20a0d89d1ec091c0333a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wappointment-169d659b2a655a618a75f90fea3adcb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wapppress-builds-android-app-for-website-d09fc1530295f530d642bfbf2434f308.yaml create mode 100644 nuclei-templates/cve-less/plugins/wassup-0d76cdabd99991797881aa307b9b2932.yaml create mode 100644 nuclei-templates/cve-less/plugins/wassup-20a5a74760194c2a8f6292ec671e20a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wassup-4b2830a65cedd0c5dc26608a77f72c10.yaml create mode 100644 nuclei-templates/cve-less/plugins/wassup-c1bbee5af74211de37a39642515f7de2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wassup-f20cc872feace3e3660ec95d470c9be3.yaml create mode 100644 nuclei-templates/cve-less/plugins/watcheezy-798f3fd97aa989f25f329926174d2a78.yaml create mode 100644 nuclei-templates/cve-less/plugins/watchtowerhq-7f144a6800afc0e683d9d4b4e5524bee.yaml create mode 100644 nuclei-templates/cve-less/plugins/watchtowerhq-b817d9941d4ed7ec0b863760a17d14b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/watchtowerhq-c416f9baa331de51ce04675f6be775e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/watermark-reloaded-b5016fe0cbf526aff24bd66f2a8d0464.yaml create mode 100644 nuclei-templates/cve-less/plugins/wats-8cc533b05aae8f8735d3033cbbcc92b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-10c1cecb5e025d7fe3193dda4559f4a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-22dc3c966bc99d033ff51a2a9e75f62c.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-38df56fa1dc5330e530e8cc53cb9a80a.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-498902087f55cd027211cbff49f69fac.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-89a35a79088c1cac6da4471e1521db2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-b8cc2d0576f53610bf8d4065262e9115.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-bc7de59ba516744b35b1924de01c50d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-c2cbb8ef0136e2fd003d5d3fa4115b69.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-ce97e7aa4395e3d292936b1987fa10a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/watu-dc2fc518b05ca80ce1806da39fabb982.yaml create mode 100644 nuclei-templates/cve-less/plugins/watupro-cee24bd7bc9abfcb337ea3d0346213d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/watupro-e908001e4e531adbaea4081ce2990e50.yaml create mode 100644 nuclei-templates/cve-less/plugins/wbcom-designs-buddypress-ads-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wbcom-designs-buddypress-search-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-basic-slider-826769e27edbc5a7e8c99a41d2b44f99.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-builder-898754090db0c7c53df1a53b0a6b37dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-captcha-59d95b9687e55d617dd1230a739e9c20.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-category-showcase-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-category-showcase-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-ciudades-y-regiones-de-chile-dfcbb5ca7eda2dc1efe66c0932fc3702.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-customer-source-324d03958cfaceefa9e17d53cf4690e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-donation-platform-c92c28d92f174db02a0c2fa3d5d985bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-dynamic-pricing-and-discounts-9febd7c017184f2da162cbcd9ca6acbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-dynamic-pricing-and-discounts-e783401602a498d4131896498c1a16c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-fields-factory-6351a80c46e754ccfc255c93464a7133.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-fields-factory-c91fc0c595c28d56281ceceb582f95ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-frontend-manager-0c52b9ced5fad811a9c32501960e026a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-frontend-manager-21c7f53627abc5f5c7e2ab4c4c0be8ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-frontend-manager-3e07b6da33478750c50e5b536bd946ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-frontend-manager-678114ef3e2b187e51ff0be3e7f2cb83.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-gsheetconnector-561949f2365cf48493988b7c3c181142.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-gsheetconnector-792043f233fdfdf73c23cd58a8394e1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multi-currency-4ff702381866f61703ebf71fe12af15e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multi-currency-cb35d75b82f07351d5d16e14c21403c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multishipping-7255e5fa9e3ec3cf7fa69588c79329ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multishipping-f0926dfe58b2d68873b90253a8c8de31.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-09629550fe11748b689836fcea30749f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-1478aed4c0e54759cab266ed6c352f80.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-5567b70c50ecdd16ecc424f15907fa4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-f2b7f592ec3ba706f4f8d466824a06fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multivendor-membership-30f699fd6cdbd468ddc76c3c8a6a1ad8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multivendor-membership-56e813efb82c352fb78dd0b9d790ba93.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multivendor-membership-97518b1e79707fc1ebbeb0e1daae9dba.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-multivendor-membership-a335f75177dafe5e24035ba2e131a198.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-order-limit-lite-87d943234d9fd7c1b966ece253dc1110.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-payment-gateway-per-category-dd705d1a34267a8e434a4d7783906fdf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-peach-payments-gateway-bf0e4365c0a80682381fd05937032a09.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-place-order-without-payment-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-product-author-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-product-customer-list-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-product-table-lite-a4d40046e4eca99f143d32a308572489.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-product-table-lite-ddad3bba44bb780c0ca045c9e513315e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-quantity-plus-minus-button-43fc63136cea65380642c1d5a8771c07.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-remove-tabs-and-fields-3bc9c18ecec44e99a8a9ea6dc1c2be4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-return-warrranty-50a3dde160b2a73e3a26cf26d3c385b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-sales-notification-9a08cd964e2072002295aa2ccec0ac6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-serial-numbers-a6e3e3fb130ca53fe59b00bde1e4c562.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-shortcodes-603a30eceae4e23d58fec3225b0d2f29.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-shortcodes-8911dada79ef696f6a6182ef72e3da28.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-shortcodes-d28bd5fd4f3450ea3f311605e6d65b1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-support-system-1b283946c80a7878d62493f2e843e97b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-support-system-a215ad133aa4b98aa9f0101d4d17e0cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-thanks-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-vendors-07b010f0b7d81d013a7b9731f936031d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-vendors-e8bc31ae76ca92a9ee7834937815ba80.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-venipak-shipping-1f67e045b6e7fe7d437958d4ed1bb1b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-zelle-7957be3fab19e29df56fc4f0499a1aaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc-zelle-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc4bp-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc4bp-bf0f79649962d2d1514ad595e16e29b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wc4bp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wcc-seo-keyword-research-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wcfm-marketplace-rest-api-054a823a88fd659044cb1d5f3fc034a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wck-custom-fields-and-custom-post-types-creator-1e89a13fba73865588209c9be692cd21.yaml create mode 100644 nuclei-templates/cve-less/plugins/wcp-contact-form-313015abf6a4029981fb303ae0c8c403.yaml create mode 100644 nuclei-templates/cve-less/plugins/wcp-contact-form-d5eec60f27d6879accd492bf02988af0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wcp-contact-form-dcababdc75851dd1c392ab090e66bbb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wcp-openweather-16ac809b05b30c0b6fd94eeae5705ae7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wcp-openweather-f67cd9a7d9946e522cc9799584d6f928.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-facebook-feed-416f9daf88fd1151a6d830797c7cec0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-facebook-feed-692a59847419e00f01e0e2c7d8867aaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-analytics-68962a84ced90a9ac882bf37153f6810.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-analytics-bec851a00ad3a57c79ae718c7939bfce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-maps-2dba3f9d9e05a82800f2a05f03266828.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-maps-49fe0ec6f2b7aab6fa4c17842c7d352a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-maps-69de6d03812ceef96ce6fe7bde70be19.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-maps-7e3117bf0f4e61f1c6678c5ed0029bc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-maps-913aecbb55aeada0646124d3b1f7ac2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-maps-918f1e8f5b006a783c5bc9147cfd6f61.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-google-maps-beb09afd16c7dbf0c14aa5a401d0f673.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-instagram-feed-12d0498f23c173f6e13e28a5406baf6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wd-instagram-feed-6c265d4dd5a13df1986f278910f69c7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wds-multisite-aggregate-ab7b45d23a9e44cbc1f94f5b43ecd585.yaml create mode 100644 nuclei-templates/cve-less/plugins/weather-atlas-f48e8a5fbf1e696f1cc387a7e678c77c.yaml create mode 100644 nuclei-templates/cve-less/plugins/weather-effect-f85537b61e94963bbc9d5c86e5b9998c.yaml create mode 100644 nuclei-templates/cve-less/plugins/weather-effect-fa8d9c6fc1b3f748c9c03e858b8946b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/weaverx-theme-support-5614f511e973e614fd375402d8486642.yaml create mode 100644 nuclei-templates/cve-less/plugins/weaverx-theme-support-d8d38e7154b358bc9b031a2ad78ce806.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-application-firewall-504399029097a5e86b5ba9c9da19637b.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-directory-free-263813b94544d66ca6de0f83221d4012.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-disrupt-funnelmentals-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-disrupt-funnelmentals-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-en-mantenimiento-0c1ff6bda54a1c54ef1a2295ae5e33e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-instant-messenger-dcf62ae8561beba15cd72e7dcb3bf604.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-invoice-1da82cb5548de3f68423707825b69043.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-invoice-4d7353aae0306a1d0c2e5c68f3406ced.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-stat-6f7706168cb1bf8ff1d56088b3f10d22.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-stories-1c085614f4dda72120112eb265cf3956.yaml create mode 100644 nuclei-templates/cve-less/plugins/web-stories-6090167e88ca71d53352f4ae35082be0.yaml create mode 100644 nuclei-templates/cve-less/plugins/web3-authentication-a39c97187fc8c6885698e5dd59bde6ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/web3-authentication-de99acad607297a91554bdcebfb71c6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/webapp-builder-f2c489e7cd964714f8d10d151c46e5bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/webappick-pdf-invoice-for-woocommerce-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/webappick-pdf-invoice-for-woocommerce-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/webappick-product-feed-for-woocommerce-e28aab5b6692c380e9af77bda5d75a97.yaml create mode 100644 nuclei-templates/cve-less/plugins/webarx-01553cdc4d088a5ffa18c2b6b9ad5640.yaml create mode 100644 nuclei-templates/cve-less/plugins/webarx-c1098b6c3ef986df5a9cd4bcd3f22c1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/webba-booking-lite-2a09ce4f54ecaad8c53766c936fa0a77.yaml create mode 100644 nuclei-templates/cve-less/plugins/webba-booking-lite-852d49969bf0838b042595dfd6400dc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/webba-booking-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/webcam-2way-videochat-0f5da3ff5cb74e14389716d803ec3198.yaml create mode 100644 nuclei-templates/cve-less/plugins/webcam-2way-videochat-e6c1637e24e361150992210212c2ee7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/webengage-a81e63270dce3acdb86d52d988c823c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/weberino-timed-quiz-creator-424714e0619eb7899a426abc7531d5d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/webflow-pages-d242d8704b7ccc1eaddd7fe775c62763.yaml create mode 100644 nuclei-templates/cve-less/plugins/webful-simple-grocery-shop-4107aeeea36af4cc92554c8214549a0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/webhotelier-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-c115c2b38773f756d29db80a784da83d.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-ignition-24235010dc5f596c69c8fc2e49290c79.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-ignition-248f6a7272fbf1cbf24050ac1a199f58.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-ignition-5178d59b66e68e951d4f7950c9fe1897.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-ignition-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-ignition-ce19f0865e2754bb33aa14bd9af59e12.yaml create mode 100644 nuclei-templates/cve-less/plugins/webinar-ignition-ea72a950c1ec7c195be94a36b1f4a88b.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblibrarian-078737c487b7cb7dd59dfa47479456c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblibrarian-09a7bcc8ea30f2211fb747659d8fc0b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblibrarian-19dc9eaf0f82c574889586e002e668f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblibrarian-721a4bb5a70d51824521f6e59c15ccd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblibrarian-df8c113b5a2942a4fbbfe352003deb48.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-2f71afc8c2d9293f41fbc23cbef8e12e.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-658f027744f04fc24b4bbaa34345300a.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-9052f6be826c55f21c5dca387bdd8f58.yaml create mode 100644 nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-c4fa0744bf528288e2b344cf15e3e525.yaml create mode 100644 nuclei-templates/cve-less/plugins/webmaster-tools-ed6d1649ba9976ebdf4a57c36e036026.yaml create mode 100644 nuclei-templates/cve-less/plugins/webmaster-tools-fcf19f2a25a048981731715a2abd665b.yaml create mode 100644 nuclei-templates/cve-less/plugins/webmaster-tools-verification-200b5675cd7f93f9a3a59f8b16a025dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/webmention-83bb2c4151dabc454448c4004e1bc5d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/webp-converter-for-media-52ad3a4045cbc52c94981ea4e45a3cca.yaml create mode 100644 nuclei-templates/cve-less/plugins/webp-converter-for-media-a5e6cd84098c70182c2285443d912164.yaml create mode 100644 nuclei-templates/cve-less/plugins/webp-express-3d333cad26fc8b3d5422c9b862bc540d.yaml create mode 100644 nuclei-templates/cve-less/plugins/webp-express-a115c09e275d981be8fd48f835f5a022.yaml create mode 100644 nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-8ddc4ba3a0f497ef212e13a7d6e63ce3.yaml create mode 100644 nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-99ed4f84114970decbe599553d25ef62.yaml create mode 100644 nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-c54aa5c11f04ffd29f7bfb4d878ecdae.yaml create mode 100644 nuclei-templates/cve-less/plugins/webriti-smtp-mail-65f94ea0710a1cc5f2df8da6f9883ee7.yaml create mode 100644 nuclei-templates/cve-less/plugins/webrotate-360-product-viewer-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/websimon-tables-eb4c190ad02fb7be0bb121747087fd9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/website-article-monetization-by-magenet-9f77fe459a0e5283ffcbf11ae93f5733.yaml create mode 100644 nuclei-templates/cve-less/plugins/website-contact-form-with-file-upload-33759bcda67b63222c81180460386592.yaml create mode 100644 nuclei-templates/cve-less/plugins/website-contact-form-with-file-upload-e6a88eb36d00e8ebcfe3d81bafc03b1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/website-file-changes-monitor-b4286607d776cde455809a59a67464fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/website-monetization-by-magenet-fb6bf968c60057d0db8de1f7c72a739d.yaml create mode 100644 nuclei-templates/cve-less/plugins/webwinkelkeur-bb474de523e33ab78eb1474118c2fa7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wechat-broadcast-71573a0535f08f2db438af64d10b0f1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wechat-reward-bcff2870cae12c5758ea4c72282891f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedevs-project-manager-0a72b6924fec36fec1dd6c3deccd8793.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedevs-project-manager-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedevs-project-manager-4c439a45b0012520f242bad12e03107a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedevs-project-manager-8a54587701c521af8ba2b5105bfe686a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedevs-project-manager-b61b6ac3b97f0d01cb8ed1723488895c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedevs-project-manager-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedevs-project-manager-df9102694b36792bdabf02d0dae189bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedevs-project-manager-edc5ca28f14c37c2e01dbf4e23653e4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedocs-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wedocs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/weebotlite-910100abea99ef6c374051083d0fe4ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/weekly-class-schedule-b226e8f4a0772170244c06930bdb6dc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/weekly-schedule-a7639c71f3241814b9c95f17c5919356.yaml create mode 100644 nuclei-templates/cve-less/plugins/weforms-20aadb46b84139edf712ada2a54996af.yaml create mode 100644 nuclei-templates/cve-less/plugins/weforms-22ec989ac05e231b0a72ec153f660e8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/weforms-38f8a2f1ccb6fa8679c01ae474dc43d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/weforms-4e68aefc025803a73af9ddad4f651646.yaml create mode 100644 nuclei-templates/cve-less/plugins/weforms-61c13420e3dc8f41c004527b0a6dcd7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/weforms-b76b106cd104db99c0e761b215cfa76f.yaml create mode 100644 nuclei-templates/cve-less/plugins/weglot-9b9cbf166c5c9952b460a90920fbb492.yaml create mode 100644 nuclei-templates/cve-less/plugins/weight-based-shipping-for-woocommerce-962608679c37b286812f3dffa30e38de.yaml create mode 100644 nuclei-templates/cve-less/plugins/weixin-robot-advanced-2bcf120ca9cfae0292d17d841a512698.yaml create mode 100644 nuclei-templates/cve-less/plugins/welcome-email-editor-3d2b6fc11dbb30b7c1a2b1d4703e5965.yaml create mode 100644 nuclei-templates/cve-less/plugins/welcome-email-editor-9ad568f26d284db1bbd80573c9ce9895.yaml create mode 100644 nuclei-templates/cve-less/plugins/wemail-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wemail-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wemanage-app-worker-5b8de369a947d5ef9762408c0a15df35.yaml create mode 100644 nuclei-templates/cve-less/plugins/wen-responsive-columns-c849c5ba3c9b4616d8436c9196e9a011.yaml create mode 100644 nuclei-templates/cve-less/plugins/wens-responsive-column-layout-shortcodes-a04fa743a93c3af81940f7c153cec33e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wepos-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wepos-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wesecur-security-b205c6392eb0136cf0df5ea96fc73a56.yaml create mode 100644 nuclei-templates/cve-less/plugins/wf-cookie-consent-0533a60780cf9a211a23b93d336f2dae.yaml create mode 100644 nuclei-templates/cve-less/plugins/wgauge-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wgauge-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wh-testimonials-d863abcdf052b29c71bf4158cc87a13f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wha-crossword-363aa4459971c85215990cb3c8eb5496.yaml create mode 100644 nuclei-templates/cve-less/plugins/wha-crossword-c67d4649ea18743c5c7a2e3701c4b78b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wha-puzzle-054cca949d3d20e70e41393d4d7ba0fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wha-wordsearch-6fde6e46382738cc90cbede415252e23.yaml create mode 100644 nuclei-templates/cve-less/plugins/wha-wordsearch-9c32419221ff25df45de1a2bef4b454c.yaml create mode 100644 nuclei-templates/cve-less/plugins/whats-new-genarator-4f768a2e6ed5431813ce2815c2416c7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/whatsapp-35617caa27e1534d5543f128d4268283.yaml create mode 100644 nuclei-templates/cve-less/plugins/whatshelp-chat-button-5010f538683e4ce673730780a1277a01.yaml create mode 100644 nuclei-templates/cve-less/plugins/when-last-login-e5890c71dc0cd4588ccd030aa7bc5fbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/which-template-file-93c626578b9ec2f6ee1b804fc44e2116.yaml create mode 100644 nuclei-templates/cve-less/plugins/which-template-file-c6789a8c4ddf7f4894074b67cbbeecc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-label-5163255cf1a46ed12d467697bfe3f205.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-label-branding-elementor-e6a4bf4b7def7461fd0f2bf14330f22c.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-label-cms-5442adae59d3e3922670d74f56222668.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-label-cms-7987b5631645ef011c12aa6fb80cc221.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-label-cms-84f16791aafe87d42cf363331892fb65.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-label-cms-c371077c38bdbe69f0a63c723cbb2e25.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-label-cms-ed7d98d793a5f352e711f6139453960a.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-label-cms-fbf7c3cd22ded693b164bcbaa6ae36f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/white-page-publication-4a259e9179bf39bf0792ee310ede4901.yaml create mode 100644 nuclei-templates/cve-less/plugins/whizz-8475202b9f0509bc3f7f733c6c0c1b7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/whizz-b7bde08d72b1bc77eb8f6cd0fab4feae.yaml create mode 100644 nuclei-templates/cve-less/plugins/whizzy-41404190c9a7f512053b049611a997bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/whizzy-6ab5c2b9e9da3c807bbb85a9044847fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/whmcs-bridge-239a7878d9add7cd58180811b224bdbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/whmcs-bridge-f7ea807ec289aa8d8be34a1208e9ebb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-4d3c4e1a467914ea53537050432b3938.yaml create mode 100644 nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-a52b3eb784f2d8ce0a9c250a80d5caf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-de2e48f236e18fa41cbab430238c4a68.yaml create mode 100644 nuclei-templates/cve-less/plugins/wholesale-market-8c2cb48bfeb76279d7566cc81ccb49f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-519740287ea130c472e2b41307bc4416.yaml create mode 100644 nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-cb9daa85351403585e36c2f7a51816cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-f7ab3183d6a1c8faf8c7fa4cce5c285d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wholesalex-315c913a950b5ab55bf23c5c0352b368.yaml create mode 100644 nuclei-templates/cve-less/plugins/wholesalex-6923c1be5ff9c6a809243f9a5e70bfcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wholesalex-dee36755177c71d5de078f0f334f5c8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wholesalex-fcf9aaed3d1b8f79608285d878f326bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/whydowork-adsense-13ab8a3f776049bebae928b8bd527987.yaml create mode 100644 nuclei-templates/cve-less/plugins/whydowork-adsense-29fe63e56224db942ac29ad8bcab73cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-094fc0c37d514333a53dda18143a300a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-0b0e708bccfb3aa959792527101f43e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-192adf4b1d06945fee5aacceae89bc97.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-1ae6c66606c2f76330e0314294bf793f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-30f703a8acc3080fb74debd07614d86d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-3831d6e441ebd610665743a8c0a63dc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-38cfa7354fceb66defa5b11a8b1426c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-414ea88c3052f2317af7072cb92eace3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-41e14165ad1acfba7a5c854923e3ff08.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-4604c654a4b997b8c024a5034ff5a092.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-4d2d5a55f2e91189ca973872c711a490.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-5f610251a978e5acf9ae5800b76c24c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-68f67c3c9420931e292f3ba3431422cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-84c888c9934970f66e3e629431140250.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-893145b250531536b2c0fa0f1e330f2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-98f5671f8000cd41848d0242c4d503d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-be4129faca04d80ed9ac385cd5b2bcc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-d79b94a0512e6933bbccf753fd89114f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-de667b04628eecce001a8b74a40e92e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-dfd279bb4131501197e1f533c2de9f14.yaml create mode 100644 nuclei-templates/cve-less/plugins/wicked-folders-e8700910e77f438a47719067618b1f42.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-control-powered-by-everyblock-123c61ec8b7e4bc9b57cbeaee02f12fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-detector-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-extend-builtin-query-8fe3695ecc567c29e92906730f596df1.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-for-eventbrite-api-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-google-reviews-459b18886f45ada6d060921939e88905.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-google-reviews-4de563d96c4862070b39ddbeaaf2aa52.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-google-reviews-648a32c4399962c7e8df779124e03350.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-google-reviews-69fd4d1a3d07810924c63e0b65d11e51.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-logic-068331b2d9acf141050172c5e67910ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-post-slider-7bdd14c359e34ad7380502271a0ac656.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-settings-importexport-a5767736936a5d7db756e536a6ac0996.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-shortcode-6ec64fa1d5347bc867f5cb9d59094e81.yaml create mode 100644 nuclei-templates/cve-less/plugins/widget-twitter-b5c74375abda0734f64c322204bc8108.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgetkit-for-elementor-20b8b7b7f0087daadf58f3d74ba2a999.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgetkit-for-elementor-85a1c6e007a9a1b0879129219d595f5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgetkit-for-elementor-bc4814d8e32bebe97767bb786c515063.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgetkit-for-elementor-f92fdb8def6ac7c07ce14435754a7ffa.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-controller-bcfdb3c82ae0485dc6fcdad4aba69c36.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-for-alibaba-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-for-aliexpress-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-for-ebay-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-for-siteorigin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-for-sourceforge-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-for-thumbtack-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-for-zillow-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-on-pages-022d6e4b68c3750efdb62382e3088ee3.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-on-pages-and-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-on-pages-and-posts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgets-on-pages-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/widgetshortcode-d17eaa15397a887312aedfb1919c156f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wikipop-11d411cbc5ec47f84a5a874c5f4a706d.yaml create mode 100644 nuclei-templates/cve-less/plugins/winterlock-a51f4e9f249cf27f338341ad1f220702.yaml create mode 100644 nuclei-templates/cve-less/plugins/winterlock-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wip-custom-login-41ebdf42bbd34392f33d2e300bcf1f22.yaml create mode 100644 nuclei-templates/cve-less/plugins/wip-custom-login-604150a52b0430463d87d2c334416504.yaml create mode 100644 nuclei-templates/cve-less/plugins/wise-chat-6a2f9e4e8b4608d42296886211931452.yaml create mode 100644 nuclei-templates/cve-less/plugins/wise-chat-6b39b952a5d8522421f2815fd5e705bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wise-chat-af5cb5e26919d347db9037fb5a77d7dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wiseagentleadform-b236dd17f6f9d64bfcd1ad06166ef939.yaml create mode 100644 nuclei-templates/cve-less/plugins/wiser-notify-6b2cae5676cc752aa89b0a0ababa3a92.yaml create mode 100644 nuclei-templates/cve-less/plugins/wish-wait-list-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wishlist-and-compare-d336c1132b5fe2aa3919365b360cd97c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wishsuite-636baab4ac31da3f60a0d64060238890.yaml create mode 100644 nuclei-templates/cve-less/plugins/wishsuite-b1e2122cdc23a9d17ef80227bd4601b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wishsuite-cab8156a963bed782ca63418d284864e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woc-open-close-4690da6a9cd43936031eeb63dbe5ba89.yaml create mode 100644 nuclei-templates/cve-less/plugins/woc-open-close-7a36c8dbdadc012c88743cb1cfe1ebe4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woc-order-alert-484dd45c6c89790208a6369cc9e3257b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wolfnet-idx-for-wordpress-b64173f040b81fec7a1fc17ca0c0ce07.yaml create mode 100644 nuclei-templates/cve-less/plugins/wonderm00ns-simple-facebook-open-graph-tags-a603cc9c5e1a7b03e0366ddf1342a158.yaml create mode 100644 nuclei-templates/cve-less/plugins/wonderm00ns-simple-facebook-open-graph-tags-d2fc1c819ff763ffa1233f51f7546ae8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wonderplugin-audio-065dcae4701acc4da94fbbf470a429a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wonderplugin-audio-66fd05b591a1b1e766cf1d8976a2f593.yaml create mode 100644 nuclei-templates/cve-less/plugins/wonderplugin-pdf-embed-4fd129ac95b2130cc2038525d8a627da.yaml create mode 100644 nuclei-templates/cve-less/plugins/wonderplugin-slider-lite-e6c6234529a7a371a2050a65eda4af25.yaml create mode 100644 nuclei-templates/cve-less/plugins/wonderplugin-video-embed-da919374ddf5731e45e304b65e085880.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-abandoned-cart-recovery-919e97db9044ec7b244c9151671a753a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-add-to-cart-text-change-e6dc5c65c5e3da715fdfcb77e5293453.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-add-to-quote-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-address-book-35ff0530e249316fdf7a2ba6a6ea24d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-admin-product-notes-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-admin-product-notes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-advance-search-c0b1d947b4291937f57429344da7ac74.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-advance-search-cd59c1c91da7bd7850f2d8eefef7525f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-advanced-product-size-chart-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-advanced-sales-report-email-1a3d5e6e024266b84857a352fd89d5d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-advanced-shipment-tracking-7d0205a12fc304106a260b15c9e203c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-advanced-shipment-tracking-c176f376f5ace8dd8c28eea850150499.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-alidropship-321cda5857ad757ce4e9e189c0e44351.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-alidropship-f3d781217508c2a98509cd1c1ad7df6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-aliexpress-dropshipping-665a15eb3c74a6909c9a809b40156100.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-aliexpress-dropshipping-b53f2739c791cac0974587f72b226309.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-altcoin-payment-gateway-30b073e9b1352950780f07d63c18b80e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-altcoin-payment-gateway-fa3a0e16158897f1a5622777bde0d373.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-audio-preview-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-authorize-net-gateway-aim-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-availability-date-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-billingo-plus-ed2236ee570598966dd60e4e75f31def.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-6028c54ef4ac7396964867f4a36d1c6f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bookings-calendar-beebd9357e523ac8ce9429685a86283c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bought-together-75a6b15f48d4510d78d2b82a83179681.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-edit-products-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-0d7505c66909a7f3ed3a00f6a96e3574.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-1a98182627ada5df6f3381c144225d78.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-279b072b9f314efe6eaa0526f843e1e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-2c64ec746b7e41f305498188d926d390.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-3174ef274fa543dfe91589efb1d4f079.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-31c3ed011ea62ab6b0c75e066a9aedba.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-40d6fd2347c9fdc44764f85da9bdf3cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-4c865f41093e5024a99224cc98999126.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-8717d29877e2716945b774b8b7bdcce3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-a16906c099275dafdc8327b1b913b90b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-ad48b0930ccb8ba605ddc4459d92eb83.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-b5f79719a2f0199ef2281b12f3375388.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-b9712f471d4d13ca925287df646b0e0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-c7c8e86fe8e5b4d368e1042cf3070ec8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-de9fc871b36bb1f0c6b5f7fa879cfa84.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-df6b45b19424e9077c2131a407f92c61.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-editor-f064b3d43557a2b70b82cf2abcbc206d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-bulk-price-update-9bae62947b00cd1f996b54815106f5ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-cart-abandonment-recovery-2cb72da676dcd5a807c86a857bed18a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-cart-all-in-one-b8b7b83ec8db40ca0658077a3631988b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-category-slider-by-pluginever-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-category-slider-by-pluginever-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-category-slider-grid-9d69b5dedc1dea8d291f6cedb75f3be2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-checkout-field-editor-pro-d8db32c50c0bea30a973b5af0530e9fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-checkout-for-digital-goods-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-checkout-for-digital-goods-d6e20ffc56fbb7647d56a679f340333c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-checkout-regsiter-field-editor-f717a47fafca36f7d936ae0544056836.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-clover-gateway-by-zaytech-bfd48818a8f8d2ed09939883a8a76d0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-conditional-discount-rules-for-checkout-74ac9426139c38e6a637e2d13087eef0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-conditional-discount-rules-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-conditional-payment-gateways-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-conditional-product-fees-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-confirmation-email-1d7d1acaaeae708601e11c980ce64351.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-confirmation-email-20bfb39c28e57afafa73126a681ef707.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-confirmation-email-b62e00bc83e523a8ff2af72e62215cf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-confirmation-email-d1b51a702a678b8f9406ba962cb571a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-country-restrictions-advanced-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-coupon-usage-4ea02dc94cad5b57a77c42e7c7c8d042.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-coupon-usage-7ef27e6173494edb101fd9088d250a65.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-coupon-usage-929f7bccf6d99dcdb90fbc58af16ac0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-coupon-usage-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-coupon-usage-d6c1488951c377a5fdee8dcb8a391129.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-coupon-usage-dfbc847d6328add5c7ec6fda715f3e24.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-coupon-usage-f98bb5a74d2fa1a9c0b6c8217a328496.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-coupons-bulk-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-currency-daeaf69e03551f5a39540769cb2822ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-custom-and-sequential-order-number-1c1bae32227727e0a4d5c09c16777000.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-custom-checkout-field-5e5aa6772ed81579447472ccdd176622.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-custom-checkout-fields-49cbb81571d3991f2ef26ba874e53110.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-custom-emails-05692bb82558cd77ced2449a9947331d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-custom-emails-6fa0ab83d8badc8c29c9bbd5b82377a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-customers-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-customers-order-history-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-customers-spreadsheet-bulk-edit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-discount-rules-b3abc33ac5c0eee824c171ffc996d70e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-discount-rules-d279b5b7a9de7113552384d130438d18.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-discount-rules-d3067d7741f8700134e947d8ed10ad79.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-document-preview-c53ac682d18711081effb4af801447e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-easy-duplicate-product-6c3c2bf7b8f6a532d25d6bbbc66fa7c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-easy-duplicate-product-7afdbaf504234dadcc9587b5a57a9cbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-ecommerce-tracking-for-google-and-facebook-0870bc8b1d530b3be68df9963ba1cc56.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-ecommerce-tracking-for-google-and-facebook-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-edit-templates-fd2527f160b6f8cee6c4ddf5aa4628c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-email-control-12c1c0291f579d50f27573549b527d0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-enviopack-fb541598017032d47ba3cc3277c46760.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-esto-57f4b88a911e06a50ba6bc2f26eebab2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-extra-cost-67ed94f8d8db54b41e53c8a3a1c3d065.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-extra-flat-rate-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-fiscalita-italiana-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-floating-cart-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-gerencianet-official-121f872296f7b7ce0005b54c410bc320.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-gerencianet-official-4ee9faaf80de869a01f1ea65d80acfbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-gift-cards-lite-3a32b3729ec435ff7a8be0b786f133fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-gift-cards-lite-dea87137a3d1b873f5ca5b46839f87d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-03ab94cbc5738569e6dbfc88111c85a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-749a7702ffa607983798f5d2868f83ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-9198fc1dbd756abf9188b781cecd0f68.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-9b394c0cb664e18a38599c0b1cdfdbd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-login-redirect-63de733b8b1cbcf5195bd25b24651bd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-login-redirect-ce92d15642911831d9ca92e448d0dc45.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-lucky-wheel-3ef982ad02fa7fc67bd896ba5c9c238f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-mailerlite-88cd9d196e2b824c736badcdf2c60486.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-mailerlite-cca05bc5622e1c098579dbd96b0cb97a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-merchantx-775b75e12971ef700fb478179dfd07a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-min-max-quantity-step-control-single-c32694721413767cb44f24e1463718a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-moneybird-23c9a6bcdbbbbe8c2bbfd755ec5ced2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-multi-currency-04585caadf98109f09006297093db829.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-multi-currency-284ad5b3246186f6f3b938546b4129a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-multi-currency-4e4599c0d5b0830c29196e68a72f1714.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-myghpay-payment-gateway-eb8db2756daf0437e7a0fbebd28c57f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-nmi-three-step-3be6a8dd2db55478dab854bd989a4208.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-order-export-lite-17a0ab6b1d7221d78713c85b5cfc7d09.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-order-export-lite-45f3255db2b21cf02cfd20c83ca9648c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-order-export-lite-585b04156d64682d18676fed41ed4dfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-order-export-lite-82c4fdf6c165bae11c6baa8d84cc1665.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-order-export-lite-8cd31768dc61f0033829ab9bfd911338.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-order-export-lite-b59d3f14536598579f52eca567b11500.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-order-export-lite-db3f5d95cd42ccb9361196cfcc805ca2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-orders-tracking-1a6f3983d747959c89e7ec5dc65f9024.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-orders-tracking-685c428e53c4340f09b6fcad98e8d448.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-orders-tracking-dc785a9dfefaca6a0bea1613af751930.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-parcel-pro-24c087c6076b1a75e662317afa8f98e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-parcel-pro-6aa82d20e38845c6379edadfe73f8c79.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-paylate-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-payment-gateway-for-piraeus-bank-1c405e04f6277e8f63afc203bd74a63b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-16eec9967d2bcd67afac046816dc70ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-5fd419efd8243713404055494bed8420.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-6173b7b86957899221b3529556dc4a8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-669481af47f05337ab733ec932b4b377.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-83c650e19a6e1371f9525c06e9d1b62b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-c34ad7d49b6b5e2f77c281c8865fee0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-e3fb45d4e1d6f55f124a91bc17024113.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pdf-invoices-bulk-download-c19240e29be09298009c0e0215eb1f86.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-pensopay-4745429fbf9ec000c34eb26fe0eb2f46.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-permalink-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-permalink-manager-cb1f5da1a0250368a9a1a2840b5fd8ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-popup-cecf0eea6a928571e9c6c0b109812dde.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-preview-emails-4696b6dfedb443693738f04c3e5960c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-preview-emails-f05f9460461d72edc72c6f486798730b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-attachment-8ec1d88a0440fb4d4bbc8ae34370a592.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-attachment-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-bundle-9b89103e6239de0df78ba6046e07241b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-26d0ee067e8dc6608c7e062864b37750.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-ace737eb3d27f2ecec85cbe6fb6964e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-category-discount-01c368446b8700dac5340c9b9ddef1fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-category-discount-96e5ec11f01f1860b01e6de9ecd0a44e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-enquiry-971d7261bd1edf88014f77f83ee8b436.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-feed-pro-08b219082c14d0a4ceb2c461431d5022.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-feed-pro-092da9a0754379d27798e711aadf357a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-feed-pro-57778ba99fa499e925c126c40d1e19eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-feed-pro-b6ba556ddde027cab29e149fd92ec34e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-feed-pro-e33771324145cc65657e7a62ea2644b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-feed-pro-f7380d2067d81298695b7ed10624b075.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-filter-44c408e8dae2b7e08323b9972af77572.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-filter-b0a7fb767afdd59226d27d99a02d7966.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-gallery-slider-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-gallery-slider-35e78d37b187cb4c7fe5d6abc5c15922.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-gallery-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-reviews-shortcode-345d3d45cedd9f71e91c6e61868d3c59.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-reviews-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-slider-and-carousel-with-category-ba63b488e2407e68ac5be6c07d4b813b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-slider-c1072dc6be25d5ca69ffa07a2d068093.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-slider-f700ae3c5b4e92d34fddc6f86f957267.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-table-e2d12fb1743cf7c34146fef09c867ef4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-tables-ff403ca55433c3790064bbfc25253b20.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-variation-gallery-865b10a62092a11efd2388d72979b0d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-product-variation-swatches-820cc233aa3e1e97214079c055bbd5fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-products-widgets-for-elementor-b224632750bfc8c01cfd4c8878280cb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-products-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-razorpay-d60970bed3416d1d0688f40201a3d447.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-refund-and-exchange-lite-96ff12fd53b9282c4a2c4aeb674ac66e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-related-products-refresh-on-reload-f9f7aa614950622531a31e76990cf4c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-reviews-by-wiremo-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-reviews-by-wiremo-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-reviews-manager-1b1e66fd36e59457695196db22e1a6e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-salesforce-plugin-crm-perks-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-seo-addon-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-shipping-display-mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-shipping-dpd-baltic-39e0cd9a1bb57b7c976fa340879a57c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-shipping-dpd-baltic-bbc1707c7a5ee3103ec07e525a958c37.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-sku-label-changer-8f9a4b2e27aff6f1c97baa2ca96cfe9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-smart-quick-view-a4bcc5ba22f6cf25dbecf393d91d5f77.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-smart-wishlist-0960254cf84107ae737889786d951876.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-smart-wishlist-6ecaf4687f30a18c2f1e4bdfe098e4f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-smart-wishlist-de4740107fbd20caea40fce59ea96c07.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-swatches-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-179df283f6f4faa0dd973e427dd4bc30.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-5cee27767ae5190db018a1cdcac6e39b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-7bdefad8c5305dfe4fbbdb047ffa82e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-13f75b4807aa41447c76b6287198f0e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-87df5cc36f24c1b7dd693537f9d2db36.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-c43b2bc97ac2bdb36f5cf0cc1582221c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-tipdonation-45a6c5ecbb4131cfd2ebe25ca43d9a26.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-total-sales-60fd57f03f391911c0b737f75f701788.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-tranzila-gateway-24387a4b139635373353e5f045ea2527.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-ukrposhta-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-variation-gallery-9404e968e946456749ff0111b0225ba5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-variation-swatches-2b30ea73d6d558993d47f6388caba82c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-viet-4246ff71c6ef488c4b4e4889ffbb362f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-vietnam-checkout-56d4c43d31e2f8fea26c256a0553165d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-vietnam-checkout-b2ee5069c05c98988181a6b0620a514c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-vietnam-checkout-e718f73216a4ec4310297c0a9de0ac63.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-vietnam-checkout-eab2919aee1646dd0938cff504effdc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-vipps-e6cf650c13f11df4cb2b334fe314415e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-wallet-6cf5df1f5906c35e420af33d77451aff.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-wallet-b6b61804ee61270fd88ffc6edea74fbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-wallet-d38b07bf476ecd6b9ce90d545b02abb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-wallet-d844d4bb69ae6b349312f77792834a3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-wallet-fcef50fc4ab0d04c6eb8673c640961fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-whatsapp-request-quote-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-widget-product-slideshow-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-zoho-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/woo-zoho-359caa278db872385828cbff71df46b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-03ab94cbc5738569e6dbfc88111c85a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-13f4465ab134739f41610e238895c266.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-1645d7b438ae878dd17947c113ddb596.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-2checkout-payment-ff847df8e45ccd8c8631d5e2f3e5787c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-4074eef51d8ca4819a222281bd576993.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-42f5857c1a1a9fe3bd07b32288faed9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-43309247b72224f5060fd8cc3b8291fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-487085694140471bbcc32f33541e46e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-55e1b5df5b9827c27e5df23a7321f7ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-57d45ec0a5be7d9e2195cf95b8c7f148.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-5e6273100f90a46acd28f79e1bdc6d60.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-6b3293fc7e42148d6c0cc437d12f11f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-6bdece41810a5c3396f0d8933c273aac.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-74b60f27afca1a7a8208f5a85162c261.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-754810521866facb83b95cb8c9ef612b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-774e498835f1c205f8e5e4fbdea2e637.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-78f0103ede56d833dde1d4c6ee111bb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-7c984cea3d0bc3b9e0b3fd7eb2901db1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-7cf6ee2913d01ef81ee274bec7bbaacd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-7f0ce5b9ec72dd2d493ed1d295a17a8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-8157d8b031515138cda4bb1e1c15680c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-8278cbb2c639762ea7b3c55a978dbdc6.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-8558a4e07d53714cf571da3da3c60ba1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-8e8520225c7963139985f5c0746f0ebf.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-96783cf4f584cdb85a4c3bf872b8f294.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-97e4eb2a7cf055f8f422858c1ea33b8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-9b394c0cb664e18a38599c0b1cdfdbd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-2042df62ed2200315f3bbe8811391a51.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-632ea9fb21b1d6ea9e4243a233a18985.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-652c5c7de96b7353e84cc91a0e987c70.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-6f4ff6b3d32734c83c5aee8986e3f499.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-7b4674feefc9f627315c264f6661bb7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-a3fbd1fe770668e38f708933d8dad89a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-af9a5eb02914599951c2e164f6765355.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-d06e8f101fc29e27f35965c937d312fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-d3760060833c9e24b772fab4457401bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-e28866aa63369c2f108c411b915f57f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-ea2c685d00d1a8d5b19ac5e3ca2b27ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-f6a7581692765a7c832e5e3df2035856.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-pro-a3fbd1fe770668e38f708933d8dad89a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-aca82f89029d85161f52ea200f7cad49.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-add-to-cart-custom-redirect-754ce0f32f23ec71660fa4b4da98462b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-admin-97e4eb2a7cf055f8f422858c1ea33b8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-ajax-filters-34cd193453255faacca3d3995f1433f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-ajax-filters-d6de9c59d6ad94b2ef11d2e62d1ccaa3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-alidropship-a08ed7f8c49cfccd0922eb203ec35499.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-amazon-affiliates-light-version-11c10e4dc5f28f5f7b4e3c822488409f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-anti-fraud-eaf081771c47b844dc7170803f97eae4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-aweber-newsletter-subscription-31cb28ae35765828074fe75a48e7d24a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-bb197c9271e2ac64456b0775acafc71f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-beta-tester-ef09f842dc72675ee253130a4cf363a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-bookings-469be2a58c38c17e864a03db20b30c4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-bookings-88bae4ee7812477c9e872ff70c893eb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-box-office-26df4386152f6b2123dc8be12dc2c025.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-box-office-615764f544ee769c8562683adf2e3c22.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-box-office-e7840c043e4c24ed6e535dc7a65aee86.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-brands-36407f459596fb4be9dff24b707a16b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-brands-e749226d2f0bc5e5b3821630005dc969.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-buddypress-integration-xprofile-checkout-manager-ebcec202e20e94c78709b42424b149aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-bulk-order-form-24628850cd8464ffd20b56d41e476477.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-bulk-order-form-d9e29420afd04acd93625f8acad7ad8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-bulk-stock-management-8a651f3bc7f119f869db333cd8567d87.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-c27b32abd810b7ccfab57cf684c27b3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-c2df943b1eb079c6b9fb4ba610f1737e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-12f3d91aee2db4ef957651a35087221c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-9c5f7452ef32bc2b3e47c8bc589c9872.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-a21ec241225c68d34de1331139c91c71.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-b8512840012a562de1323a1815a4b21e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-f62206ccce82eddd9f38650d3ec27d0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-chained-products-a49761e8700910d2b10517900bb96f1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-checkout-field-editor-067d07e6d5151cb4c0893a5aec05a2dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-checkout-field-editor-63101b083d74ba3046ffc1cbbf2b131c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-c27f182f563d1fb6d07ba79eda84b6fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-eb73f0a8b99b79a58df7341a863670b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-f0bd7cf2208f5a7facbcde43d480de7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-cloak-affiliate-links-45dd3e2337c1445444e70d9c65cc1e8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-compare-products-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-compare-products-b935aac9392ea74d48c16c20e8b0b995.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-composite-products-866b0214eeca06aa312ee4f312dac633.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-552bb0df3849cc75dcf6d19f97ba3b05.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-8f3437550e10d6083b697e38767da0b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-f4f0c2c884affbdbf175616a0bb1ff76.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-country-based-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-csvimport-d33187604cb9b21d8a56ab4bd171d46f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-2e62f757ecb9e88c7028d520dbc7db1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-406a6ababbf7eb821b04527364536110.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-419388b03e7c101be5aa9e9f67fb81d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-4a8f4a33d3fd03ddfa522524f9449c10.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-6bedb1579a7e4736e9514fa8e953db76.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-730d551e137dbe1c7e3252334b46b802.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-92d281b70c0c1113532c8a9e6c09ac40.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-94b50ea832a6fb6b13dcb5407b94970f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-a667090a25b41229ec62a693f2dae2ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-ddc4061947d45933e373a65e6831e3d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-custom-product-tabs-lite-32cfeb3b1e33f847bf448188352666fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-customers-manager-1cb42f62394546a329e0486aa05cce34.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-customers-manager-367546d5612217d94f1a8cf076937dba.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-customers-manager-5e7acd4f9908a648514410cb186a2982.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-customers-manager-95abb58d27d0cf8744e0e12e5ec2a346.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-customers-manager-9ab63666836232ba83e4036d46f6e9b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-customers-manager-fc1bee3fb68d7c35aad200db5adf3590.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-cvr-payment-gateway-47a69422b8abe1dcc847b3db9997fa97.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-d12b3c547439468c334a187596dd5c5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-dd9c5510a5d40b29d6b46c88b274a46a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-0416673ace5e88173c78bb032365c216.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-1ba99d8d0c43c59d761a87f64764e3da.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-discounts-plus-96b191d228294e43622c1d713d7ed4e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-dropshipping-397fa61492d70ec7211788fe03e433d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-dynamic-gallery-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-dynamic-gallery-b935aac9392ea74d48c16c20e8b0b995.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-e115a05599db838c2333feb6f8913d93.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-e456b215f29a4067fb78fdf79a4f6d54.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-ean-payment-gateway-327db16d1bb219d0ce7124ea14eed0f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-ef7a31408ee94f0eeed2849750238bac.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-email-test-a44ca1908d9450fd4614e4ea737f8275.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-es-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-eu-vat-assistant-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-exporter-0a7c54bda59de606bfaad194d1e6aebd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-exporter-108c66426e710c3a88abb1208f5ec4da.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-exporter-63060da1b9f2c3cbd43712f8f4871703.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-exporter-675cb8bcb438f10a9bd4c15d9cbed954.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-exporter-91f566864bd30a277df8beb598ea361a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-exporter-94e6a09d2cc84f5575e6e27866d15b32.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-extra-charges-to-payment-gateways-b3d7ce698d96885aab2b92e8488d08ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-09fe90e01138ef94b76cf31af60e964c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-1a8df042079c3b5a71f5229720de76a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-9f39bbe8da0a79b61b743c5fac55c881.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-c78f898e91c2c10e61af831a7f77760d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-for-japan-010c2fa504f8e0c5ce7acdd2e0b14e5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-for-japan-8d1e93909b79d28537c696fa4ea3a13b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-for-japan-af335eaec6af4f82a164161fc36ab9ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-frontend-shop-manager-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-amazon-payments-advanced-c2c0a2ea7f55bd32da478c30032d1869.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz-ffaaa29eafbfa43f1ab24fb78aa6ea85.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-eway-b9c5331c1740635695be7100e378bb1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-gocardless-372a57ef9400497453c7017d55fedd93.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-nab-dp-ab20415721ed085ae618181a838033a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-0187684b30a8dd357634d24962eef6bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-0b81aaa01f44c52b0f6d2c057df8ef8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-1dd78a63fe389dc209197bb2e45c0680.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-3b50ede48b2cfc5cc49521992d3d9653.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-germanized-efd088c138987744c27fa2ae009c995c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-google-adwords-conversion-tracking-tag-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-help-scout-be181067e24f0cdc8c0b449617d32f97.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-127ab045dd12eca20b1f05cdaef8b291.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-21b746fb77ead6544f6c7dbfa1edc718.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-2594adb9a7b091439405e835629ab066.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-38cbe872337aaa11f53f5f047e11de00.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-3ae6c1779315005d2af44a96ee77af2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-4281d6cbf86b1cb2ecab3675e42347ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-42e7549e05a04879d284fb2372860cb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-58678de90c143fa9b35140b23ca7ba6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-6db5d1fe8cacae7e42ba1eadc757c2cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-761ad1a5f416d5f845100fe45755bedf.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-7832435d7568bbf632e364a36f5e57e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-7ee31b33feb435cadd87c62f79cebfe3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-882bdd3fdb6681642f156a22924c9a36.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-885fb17b6662f56f045b926c01f35175.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-9c19725e7330d8a4aba8b2ac8de32961.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-a2e4cd3309d1f111f649373058fb4d50.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-ab678c0df2a17e9783905e758a6050b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-aca759ef038f25525825e47a4ffc724f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-ae7ec62fe186e1a7a30df795c82f42a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-b4d2681789aa51cbc2f0247a1fc077e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-bea7c217c1714d6e73035b13fbfa872c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-bf615bf143d1873d5b3b8d3683682f8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-cba7d92a9ae2afc427a931dcb7ec0c7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-e3b83c4eb77b086c6d4b79728a8e33f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-f2f846fb0dd5d9b11e1e9659c07919f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-f7a2331fcfcd2f54c326b52127a157a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-jetpack-f91c2602522656e11d82af368c387634.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-menu-bar-cart-4c6eee0db8572f7bcd30530fa44d18aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-menu-extension-a56026625ece44a82e5e6eba005e9ec0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-mercadopago-792751d76323c735bfedba81a5c362e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-mercadopago-9a89bb3aae603e90bebf5f173e16f83b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-multi-currency-fdd08f1e50818f896e8c8a898740f26b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-multilingual-405af1244e8e91b41a724bfd16213a75.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-multilingual-a3fe0d186555bfccf2ee6cc4060fb41e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-ninjaforms-product-addons-293d0db4cdca8f446d52a99ed91cf4be.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-one-page-checkout-3df49792a8ece76a8d711abde91f5cbd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-order-address-print-b81127029753923b54df2f74db7ead66.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-order-barcodes-d43224e006298ab64602bb491da85360.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-order-status-change-notifier-ae1b1a51b391401549de89991091def2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pay-per-post-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-payments-3c1095436fd6552a40c2bd2c4e117041.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-payments-477398bcb43958a50c7a7519798e0391.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-payments-8f2275f20711e7ff52e234ab96188172.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-payments-b9180b9244a3340bd6331bb97ffb0fd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-payments-ce1aa5091f6bad027f616e3d2a1d6732.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-payments-f291a0b96ba11ad5b48df58ad86c38db.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-paypal-payments-4f7331e8a3ba4696249e7fcea579fa07.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-payplug-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-payu-paisa-a236237c099e41f3f0f40af4eb789d56.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-20e967f496e19df1e9123f3c23d87252.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-300feb509f489660d5d15d529d154d5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-682c136fe192ebcfc486e6f937b67fae.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-7e729c66876df948651c9d3837d1f01c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-822c565b84349831aeea48fc4b498976.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-94f5b565df6f54587e7f38dd2d74f17d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-c7680f1772f94d4abf62aaaeb8635605.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-f245b6f7ab151ad35769fbe02b21bebd.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-fe9c9963c880e901919af258a30c3298.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pos-c5f695dbb7b3e9a0ae3b6a589e6824c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pre-orders-0fc3c475af9db5468072b0d596ac658f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pre-orders-32013e3714497eae530c018b20664f08.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pre-orders-43b4713bd32261291b78f5d694cd58d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pre-orders-7d14368de367a2adadf4a2871484c186.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-pre-orders-875dd3da0012185a61616213c415a5c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-predictive-search-8943f00b83bb9af4ef7c839b2bef305e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-predictive-search-eec24adc2af4f908f31797f26239353a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-predictive-search-f2d13e82f4916c94ee541da275776204.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addon-16c0c6fbe1e44f95ba18add61d515572.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addon-1f1d174c2e97694f79432cc5756f8ec3.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addon-3385cb8b008c9eac317535d656ebf7b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addon-3e690c446445b36926062b98d511c3ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addon-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addon-c42befeaabe8cc2f04b4d79fa9968af7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addon-cad557e1501fb237a72952936969ee8d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addons-0250c115051a0a19911ae4becfbbb8c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-addons-60ae0dd0a6141b106409f50a537c78fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-category-selection-widget-a51a38d55ed23a34d7d068afc04d5742.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-importer-370954cd310380bf196a7af5fabc1594.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-payments-ad492c1cfb90e87fe9d66d5cf28a0298.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-recommendations-ad4e5ec7c446d0edde1fe1894b44d8fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-sort-and-display-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-sort-and-display-65c990e02c196c01529c8a603f8098c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-stock-alert-e39ea928bd894c6c2a483c3234cd1111.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-stock-alert-e8c2deda009bcec0877e0c00cb99051a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-2b07cb3c5e7b07e516cdc03a041ab509.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-85987e7f67f649cd4fc002f1b0337124.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-b89386d59e4ac2c68e4b5b1c7b8ceed1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-c1ee2d06e4183c51b8ff1009cad4dc30.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-c7798079a12ba87e21be5abb7f463202.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-d7d028793891883b49da58d28555fdb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-d801fbca464a51e293e83c92692f388d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-de80de004725b03b45137b9eba24ca0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-product-vendors-e78a0243a637937a0520333d07ecbb4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-designer-9d44943de528e08b2e8164cbb922f935.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-0a19ecfdd9174c31fe37388d883b8078.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-174314b50918543554df901d90f75335.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-2662479a714ea06abb48b0b84a949600.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-4d5b5eea5b0d303e259444505b764438.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-57308f16648d2cd63200f80e8b82615f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-745b890d4e4ab266ecb625f54f34190e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-b127fca718a0b357c2daf67816c8cec2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-d449c0063627e88ef77e8f2a6b150e88.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-d97caddab7bd05fd7de5182cc29d4629.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-dbbbee37e25f2954b72ee20a77edf10c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-f93c186c199b2993e134631be68ea0a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-filter-fc942581b6d806c7e158aaa084482451.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-quick-view-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-quick-view-666b088d7e486f0731500dc6b44206fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-slider-333375d8287e28edefeeceeb32f12475.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-products-slider-b143f95f119acbc330075f594bca9125.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-putler-connector-0c5c03e535c02675bf0d5fbe19ae065d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-putler-connector-cb9adf9824210ad3d3e7d6f714b65556.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-sendinblue-newsletter-subscription-a4d2edadf2ab61a5bc7487773709b53f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-services-4f8b1165a8fd4674c47b694bb6769361.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-canada-post-38e07b44fffc0387d1db0b5b701e8767.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-canada-post-df5510828b9908f177a3676bf0d29efa.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-gateway-per-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-2fa400cde48ebbb1e062c53ea041ad86.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-a044d35c75736c87fd061116f4c5b4e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-c19f8aaf85e78b37bfb8827bc7a43d0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-d3e334361801ef90de8fcb6bd64767c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-fd721cac9b419bce8f15888dfbaef077.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-shipping-per-product-40b2ce035ef569465fd6e4b21f17410c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-simple-registration-806f7834f371ee46a5b9d44d9bbedb5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-smart-coupons-57a83ff4d8f574921eb2f0df37539660.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-social-media-share-buttons-3cf6e0cef1945cb6c17b1720f47371b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-square-249dbfd7183b6684ad412dc7f00e598b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-stock-manager-738d94ad59cff1e1ce944d9227e0e807.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-stock-manager-814789c90e4385b5926fdbf0791f6c8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-stock-manager-febc39f061d4ea440e6c2d9bf3acdb4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-22e18aac0c8974a11f388cc18919e7ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-6604e9811397b340324d84776057ca87.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-a07726826b94a32080195c3e79a97baf.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-subscriptions-38d794189585526f4580cbcbd32cd51a.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-subscriptions-5d14f17d0a9567bc2e5e172cd96c2e2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-subscriptions-825cedb504a9d0b999d8eff2bf66435d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-subscriptions-c710e29aeb4a754ea209ddfa89b2e510.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-subscriptions-f9c4b5a4e9087a30d794272cce966354.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-superfaktura-c713f885667125d83707da22fe966bb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-upcoming-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-upload-files-82ad20df19b26c5e50cfbeea380e1cf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-warranties-and-returns-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-warranty-17db65035566800d21b599e4302d577c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-warranty-90191aff4f4fd94ead6048a6f9309bb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-warranty-ac9e437a3a3be183da02189f782c1fad.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-warranty-d1c23493ccad67b72beabba59496692f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-6d6e0436ccffe0043617b48128024cf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-ea695aba033f5eaa6e1bbebc4ad1cb3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-f863836bfdeb95471721235ad3d4953e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-wholesale-pricing-a0de754d48741e450291ec842fdf7fcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-wholesale-pricing-f5210926c29e7df2401ce419d82b4fb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocommerce-woocart-popup-lite-90a621b8b64ebeedf4e6b4f1f9506dab.yaml create mode 100644 nuclei-templates/cve-less/plugins/woocustomizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woodiscuz-woocommerce-comments-11d5ca6aae21b29aac64f7355ab7d838.yaml create mode 100644 nuclei-templates/cve-less/plugins/woodiscuz-woocommerce-comments-1dbd0f5d4eba498d79dffc911453625c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woodmart-core-32a5c2fd9daa910750906c2719426827.yaml create mode 100644 nuclei-templates/cve-less/plugins/woodmart-core-e297cccd68c340cc70a93b54e4b06686.yaml create mode 100644 nuclei-templates/cve-less/plugins/wooemailreport-b8484e4bbe43b173d4b67998a26e2ce3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wooframework-branding-1cab07c4811f7b84831ca9fc37bca8af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wooframework-tweaks-9657eccbcacadfd84a104020a1ba720f.yaml create mode 100644 nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-211b4e2e29da3a6c7a3f6f46fc11c764.yaml create mode 100644 nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-3553b5d538c18918d9dc4a1b5515d805.yaml create mode 100644 nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-a3e402dfd0b7363889b8931013656dea.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-00621ef6c76184f88ccca1414d74fac7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-092f1fde35361407c0c7db51482b885d.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-0affc1d09cec859aeeea9abdfeb1c7b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-2f369022c90ab11184f498c7e18175e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-7c425cf580174869d5b1f033a9941ff6.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-925ecf8dc9bb2b2baefb9be7dfe4e0e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-9d840efd84947ddae0da773e8bea6c66.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-a09c2c9abc79ca137e522820700cc3d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-bd64f1f16c4920e8819a833f00007e5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-c4fa40659d43973eb06846ab990bf0bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-e2e16530577d94aba470c5d11e9df874.yaml create mode 100644 nuclei-templates/cve-less/plugins/woolentor-addons-f19b67578553b4899e4857d2a0013f9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woomotiv-fb36175cd4f9026269e4e65b050f0b1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woopra-4e90b64e5c0880980f44418deca3c91b.yaml create mode 100644 nuclei-templates/cve-less/plugins/woopra-aa8c984fec41bb48489f399f6ec63ef2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wooreviews-importer-b55a13d9b3421679e7e8eb49d23be81c.yaml create mode 100644 nuclei-templates/cve-less/plugins/woorewards-9d13f1d3852ef39a0de552cc88d8fec7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woorocks-magic-content-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/woorocks-magic-content-for-siteorigins-pagebuilder-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/woorousell-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woosaleskit-bar-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wooshark-aliexpress-importer-362d3676648172fe24d0a4f6ea7f422f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wooshark-aliexpress-importer-b2a85d8fd51446e550fee890b46b39fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wooshark-woocommerce-dropshipping-d9f05f56ca3567e886c01941a461d782.yaml create mode 100644 nuclei-templates/cve-less/plugins/woosidebars-354dafbbd9f0f8346bf3ecdcdb25b186.yaml create mode 100644 nuclei-templates/cve-less/plugins/woosidebars-sbm-converter-209b59f9f6a6704c1242005d050454d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/woosms-sms-module-for-woocommerce-9cbc81546b21a100994e807b3ec7d261.yaml create mode 100644 nuclei-templates/cve-less/plugins/woosquare-19746aa654bdce1c5c57da933bb299ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/woosquare-63a838c07fa7f4dbcc749cd4ec305acf.yaml create mode 100644 nuclei-templates/cve-less/plugins/woosquare-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woostify-sites-library-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/woostify-sites-library-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/woostify-sites-library-bf6365dff081103c217daff8833cbf80.yaml create mode 100644 nuclei-templates/cve-less/plugins/woosupply-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/wooswipe-e20e9bcb00e5e945a6bb2c24c79d65cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wootrello-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woovip-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/woovirtualwallet-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/woowgallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/woozone-605a67411fb1b4e46eb2a9b231a35b01.yaml create mode 100644 nuclei-templates/cve-less/plugins/woozone-854e0c6e8605c626361126b016b08a27.yaml create mode 100644 nuclei-templates/cve-less/plugins/woozone-9fc89469f8a530afdf83c67ae386fe4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/woozone-c9f6ba5dc3a76ccaf9e57d79e18e6ca4.yaml create mode 100644 nuclei-templates/cve-less/plugins/woozone-e261de97ae518fadfa674900f6884131.yaml create mode 100644 nuclei-templates/cve-less/plugins/woozone-e2b6dedf58550635a9af3b0cb010148d.yaml create mode 100644 nuclei-templates/cve-less/plugins/word-balloon-367b7f8831e5629ea2336d98cf86a14a.yaml create mode 100644 nuclei-templates/cve-less/plugins/word-balloon-a3cc2155590ae1415e931b5fb88c4ba6.yaml create mode 100644 nuclei-templates/cve-less/plugins/word-replacer-ultra-82ccd5e1aeac71fd905aec731ee6d6b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/word-replacer-ultra-ca80be8d82d9f4b7b474971b5f658d56.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordable-3161964a915ebff8fbd41c85d4b1281d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordapp-755ac9508c7a76c31cd7d0edf80b8b6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordcamp-talks-7a96e3ef8700d304a9dfa367fee4cef2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-058c5e78b9996f732b9318d662c631ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-0b892f42133b0cde6baf163046912807.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-123ae05dae80d93502cd649f5ec1d55b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-20a5446793c82d7b30a3e33ca0d2737f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-2be64cfcc4c65cd88d9acc6ffb63f29d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-2fe978140d6bb192dbe8f6347a246620.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-3c3ca8f76126413596e767724c529582.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-59e1a99c9f0b45a9f6f61c16b82c38c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-5af88d26b08538821fbf3df9c9788c30.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-5feccb7307b20851729f7d1fe5c16402.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-6e3aec88bbc3b7a8585b22a385ae7c31.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordfence-aaccf9d8425eddd13e4ac4f8c70f1e50.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordlift-4626cb693582f4ef4c3fd754ef5fda3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-23-related-posts-plugin-0a3943b43f76d9a29800828b188b084b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-23-related-posts-plugin-c52e6603b19e1ddbfb9c023a9a70f51b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-access-control-6ab743a2d3b53689e8dd020c482ecaf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-admanager-8fd44c63d94c422a14e4d5e118df7d97.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-backup-to-dropbox-5ae574c1617e1bfbc92584f8f9bebe8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-checkout-7a57451a1f089e6fb01f4c4c10c089ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-console-97c1ceb18f16975e668ed8d0bd718768.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-countdown-widget-0c91dc81841b4946dcdd188b1f4f59d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-countdown-widget-475773ebaa71f55189abb950928342c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-countdown-widget-a672faba2cf5fa34711e0d654497c3c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-country-selector-004a45b0040859f9d7a9047f0ccf10be.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-database-reset-93f8396aa2e225fac63eb4694d99073e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-database-reset-eb85d378289992deb2bdae8ab06df635.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-database-reset-f4aa3f1d5ea67fd4f48e9da5d1dfcb26.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin-b86559278d78c8a80909bf3088ee795a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin-c10b1142778769e9493bfb35c88879e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-ecommerce-5245595392095b6ab4fe76ec4a372258.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-exit-box-lite-31081287c88cb43d85e54ce23366ff88.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-exit-box-lite-3b6f736b0a47011b88af56143e4fb668.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-feed-statistics-53e4fc6f46b4ed911de81fb486aade37.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-feed-statistics-de270735c8bc70be908d067be8516116.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-file-monitor-573f32cd1b90d92ebe8ccd29c90cebc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-12fc948c06bbe2558fcf0a602f5f480e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-6bee4ceb90dc1010814fe03431f27200.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-7723e642214a4cc19dd0a90f922c5611.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-firewall-2-82484b577e47d68881c7ffa118db364c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-flash-uploader-c25ccd4ececc7e49a3a30276bcef3c5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-form-manager-19a0491cf914c310a86ae542abd14b9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-gallery-plugin-757461bd55fd10188ca28b32819858c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-gallery-transformation-352ac8649ed0ca01e334a505a5c69503.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-gdpr-8d35451021499279a9a8ae84e508d492.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-gdpr-fcc5426738caa36fef03b50110efc0b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-https-0f5a748a6662b40f3b68d87419a0f759.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-instagram-feed-81a1379b5306a9cfccfcaaf08bd3abdb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-language-a96c597219ed29fc68772417c5a3093c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-member-private-conversation-06202f5e4de9fb07c515215afeba85ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-meta-robots-f1ed96d1b2d98c3026e1dd704ae2087a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-mobile-pack-6e0d2cdfe1ad1668438fc68f481cce1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-mobile-pack-860afca6e31101e845f00131fa4002f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-mobile-pack-961d82f12e20011650e9c4bbef7df9eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-multisite-user-sync-438cf6d09d279a07d988d54f0a418a95.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-nextgen-galleryview-64d1005014509c77d54b45b09764489b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-nextgen-galleryview-8517e4991bb30bbf1e9448cc624f7284.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-ping-optimizer-2760701a1ef8db138bc19b206575f1f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-ping-optimizer-6b5c7dbafc7933afc0d5047343324578.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-plugin-for-simple-google-adsense-insertion-1bd642d2e3ff9973b88e9924e704fbb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popular-posts-05a7a0498d570dab847e4a9ab6951cdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popular-posts-178d99b6f6579f15b7e84dce26c43816.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popular-posts-93d2bfa4a5e5debcba57e4ef188367d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popular-posts-9912c297cff35bf8bf01c7b24d0db7f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popular-posts-b56b584c99468f4e887375bc7db1f73b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popular-posts-c4493263837f30eb253dcd6ff28e47dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popup-38f6be428d034f5c009a03a3e9513d4f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popup-a5647b646e9ca22a1d24f5022994a6b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-popup-a9d45b4a14ad045ecea1bcd26aa66e30.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-processing-embed-336c529affe134c8a71f1e7879ec0dcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-sentinel-3d4fded5713d977453c4246e8903bc20.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-sentinel-909fb52910e98c1692077a1c3b14b033.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-sentinel-aeea609833832e1baa1f0bd27367ec6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-0cab757218d53679bf548112d251d15c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-307e49126b500d4032b9dda6877b05b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-3bbe5a341cf1e072236bafa671320c7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-3ea36d65c6ea5b35072fe01e09307dfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-4a0b4f088a324947da6aaf5af5ea450e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-5b5b01b1109744d37f0c0118833ce729.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-5e0b93fe3a022a24343b38fe5a2f7283.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-729af181e052b537a824f590788c4026.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-828cafaa2f518b65826b98ac79418f2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-a3fa83da79405e5abf7cb2c0fd1ed37b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-c4ae1764980f5453e8096a0bd6623d73.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-e132f1944facf59d50c4939f26f4d93f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-ec23ceaa5e6474fc50d6e6ec68c64eb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-edb5aff062fcd8aac278362a1ce01bce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-faaf1948155c5f302388ba2e8f465a89.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-seo-premium-4b1052f9f0f7a36afef9bbca9c94d0af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-02744bc958048e60b6fe8becee3f2311.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-6b95e055e3edeffca7582f29e2098070.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-9a4d0d65ff4983f3b672d24a253f60cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-d8a3146b821fb343fd351d5a10339bc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-simple-shout-box-00010ebed83feef9acaee37ee3019824.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-social-login-40cf6c93cbbc13dcb57a60ba2f57fb5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-social-login-710e5bb2b38338950e0e2ed07d09069e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-social-login-adeb22f24ece0b4bc846eeeff12f100f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-social-login-e0d816c541690f9c52144ee19295acfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-social-ring-62254c40802e5286c6fd0b29e99ea8df.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-tabs-slides-b256004910fed4c7647ff561ae5de5c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-toolbar-5d23bca1d1789e21db9aa8a0def5c93b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-tooltips-166d139550be5e578382c81fd839bb55.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-tooltips-68662c1466a6ef85961a45678881f8c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-tooltips-8904938c0e9840b0a2511b1de74ee529.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-twitterbot-773ba4639bef3a2cc4abde5ded928895.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-users-41da9a8fbffc2a03fc19ba494b850b3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-users-4944da448643beff513f9225eb7219f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-whois-search-bd7b626f96c68af8d6a9ffc833f69a62.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordpress-whois-search-e7674c99987b6c4c7435d1f976b8d7fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordprezi-a32e0707f724d294df7bedd19626586f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordspew-cd4550e19ad68ff40f21b1f3220a5912.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordthumb-b970262dad30a7d484efebc698a4fbb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordtube-95162b6c7bf303f9400020b8a2a23185.yaml create mode 100644 nuclei-templates/cve-less/plugins/wordtube-d61196f45e716711cfb53207a0939fc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/work-the-flow-file-upload-b450a44aefe31f7479f070620cd005a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/work-the-flow-file-upload-b6c3a1e30e85d38e350b01bfe2c5f9b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/worker-9869e7dbba52086c75e55654db902ff3.yaml create mode 100644 nuclei-templates/cve-less/plugins/workscout-core-295565d6c00c49b75df12a1f75ae3147.yaml create mode 100644 nuclei-templates/cve-less/plugins/world-of-warcraft-armory-table-d94ecce4e6207ecfb48491b051e2c22d.yaml create mode 100644 nuclei-templates/cve-less/plugins/world-travel-information-feb69abbe38ff9a6a9b07a48bdd2d2c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/worth-the-read-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/worth-the-read-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wow-moodboard-lite-046715d681a1f3005e1ea96f6c71e30f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wowrestro-06578949edf7886954089bf5ea02f690.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-2fa-01aeea137ad62c07f9208d787662a3f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-2fa-2becdaea6cfb27f349b62f01ae364f94.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-2fa-2cdb07f7994925a2e6c4e7d56439a615.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-2fa-35260dcdba60bfeb24022f0e25251913.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-2fa-4ff6298b795b2324bce636d08965d81d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-2fa-681ba8b639ed4b20d46dc5044edc1ee3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-2fa-c057e704d00bbfb4a8d170d3b72c040a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-3dbanner-rotator-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-3dflick-slideshow-9c37c1dadae3a910f37cc6fe2a02a906.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-aab17c6b24a2dfba03255d9a47e0c674.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-bdbbe04b17b8a1ca6597cc1e008085c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-e213c95c0a4a994ef52b0b98d3d99e14.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-0f680b0fba849d5d9ea4bc12dadd3c2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-de1f04792375136ec89153b76014f079.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-fbf758a644d0a5c8124110ba01ca9800.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-academic-people-52128069b8783cc721b252c69306747a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-accessibility-ad7eb7a1c6f0dd20fda9c7137924de5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-accessibility-helper-3be3a9644337351c7a40dbeb1dd937c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-accessibility-helper-6194829f785c406e2e428c86316d96c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-accessibility-helper-bd68d113848e70b56a089eb9f2977075.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-action-network-17cbc81bfbd2835ea082db7b23dfca8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-action-network-8fe65facf4fd0cb40e8b7fae00de182d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ada-compliance-check-basic-33ab7e0d75c2ed6bd56f09ac49100c0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-admin-logo-changer-410921c5c60a1f559b97b16f075ad4ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-admin-notification-center-b82cc40f758ba3c73375abdf46eafb06.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-admin-style-04d32a3642a2c96352c83010608db77d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-admin-ui-customize-d5f34e92eea10518421633a7bf6a6987.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-advance-comment-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-advanced-importer-59ca924932c6a0bc7545937f3874e3e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-advanced-search-5c6787fa63866ceaebca40b1eb3f19f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-advanced-search-84ddf5342f72d908358cc5325eb7e319.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-advanced-search-a4635161f2aa6600f48d00dc0b0a15b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-advanced-search-e8896aaa278ff92ff4eab642f544ea11.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-78aa7f4c0fd135cd902e3c93c245e07f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-c87c4ea28269200455ab4fe854f72ca0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-links-7a21d7c86e8ebeab0cea551daecba3fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-platform-9760015c4d350e201fad6b9179af7df3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-platform-9d26ce45ae3e2b9cd30cf1aaa62ddd92.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-platform-d9821340f78ed9354be13076604f5c91.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-affiliate-platform-f655053c752606f8cf271b5e2d50d49f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-airbnb-review-slider-5f97cab1c787955760a43df34e0be9d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-airbnb-review-slider-bbbfb24fae80d53d9d732dd1134e3189.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-backup-8616428f32a57e2652dd917dc2c90d74.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-1ab755d3e95de25c386caeb2d042c3d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-3e761f82934df2ab4021a24d8a5d3f17.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-54815dfa4753d9cdf9883b354532f577.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-a04852934ccd4497c8403afda3917aa6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-c1088d4a7272923461f43cf76023c143.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-ddbeec70f5c8cc5ed33b819f003e57b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-pro-3e761f82934df2ab4021a24d8a5d3f17.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-pro-54815dfa4753d9cdf9883b354532f577.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-pro-92aa647881d350b340f99ec0dcdafcc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-pro-a04852934ccd4497c8403afda3917aa6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-export-pro-c8d77620d025f09aeefa4638ee5b37e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-23f6ba2f9c75b4517345ed804d2e1ff6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-490b87f43f2fe349a60db708b8fdfe27.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-54d38a1874377a19e755c0dd341fe745.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-5b6052811294a634af9b6d15efbb8d49.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-5fbee904a26db0083f1a4d8da7695a16.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-6542eb9293767f9620f37e7f59fd2a40.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-655d94e53e4a588a8f5f35013abd45f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-6e8d8a68dd9873805b5f71eb69761022.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-7f5752064f65cad24bb5910cabcdce74.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-81844f67a8cb300bf38ea9c090e351aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-8b209ab2ce1916ae647e2542cfaaa488.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-8f60c3b6446189e3058b9237676dd33f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-aed64fd523c0d1b492fdf86a110cd8b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-c459c6390d6920d9836ff6f1ec3a05e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-d244aad713442e8917ed457759893c6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-dcb0952ba59e4cf6e5088fb4c3d3565e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-e69997328ca18e69bd3343eedbb036ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-ea7f76443ee4f847f0d00da3e01a11a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-pro-23f6ba2f9c75b4517345ed804d2e1ff6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-pro-5b6052811294a634af9b6d15efbb8d49.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-pro-5fbee904a26db0083f1a4d8da7695a16.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-pro-81844f67a8cb300bf38ea9c090e351aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-pro-a9e3662a53271551df51fdd8b8a5f31b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-all-import-pro-df4cc539ef140fa3859e0e46cb3bb0b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-amasin-the-amazon-affiliate-shop-5595c7f205cd9ae7c0c1e3237881d78f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-amazon-shop-90f8bc64469472ae0cd3174d5b6a7976.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-amo-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-analytify-4570eda0c03b7f7b441d2c3a25dcd80e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-analytify-66b6d0074514ae9bf7d808b0d7b9a6e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-analytify-70ab06ad0d2802465de5c71330534e85.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-analytify-899a0dde0ba2e19723247e16c93f4325.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-analytify-8fa6b82859e5d82c0a64a9973f57957b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-analytify-d12af8e80ae1c421ffa919ff53dc2e47.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-analytify-d2645755bf5586970e23e1757a9c7bfe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-analytify-f76c0706f43a6aad759753a6e61a5e5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-anything-slider-aaaf4480d575f84ecd3c01a63e4a0287.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-aparat-098bdb5ff12e782e87bacda8082a6346.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-app-maker-2b14d8058c7a99881803f353bd15c8bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-appbox-7765fb8469b9b88a34d6b432871e62d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-appbox-e587e1665fb732b10014cf1110ac13b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-appointment-schedule-booking-system-041adfd3c39d4b3580e02b6803d8c84d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-appointments-schedules-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-asset-clean-up-157e1680396fa809586b361348ce2314.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-asset-clean-up-16b8fc2e25c46e7423213d8067c33e6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-asset-clean-up-5a7f7124402fcdd1661001779df0ff58.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-asset-clean-up-7caff55cfec661a72791dee0bee83561.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-athletics-3b9b22b591de089c72309692f7ac4907.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-athletics-6a4f3e2a82b7793dde5ce79a450d31bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-attachment-export-512d60f62525369cb1c0a614152e673f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-attachments-607d97f75ca23282557e4dc2fc682915.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-attachments-bb80630c4629833cfa0b6983a79076e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-attachments-d368d355a42efc82f9add75ee0c1d079.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-attest-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-0f1369367add235ed7f30ce397da16e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-30897ef76876a3c79e7909e7acb376e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-599f329db78aa16926991b18378d93d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-5a61a27c8209633543dc7131ccce0c7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-a3e119e35f3f29987c194ca1040f096b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-ade8d23b5006403a0ff80adcff26f453.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-b84aaa0eb34e70d57406b1fb31a3db1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-d7c92809e4625ed3fe6e7ee1f56c18ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-e4074964cc7b7dad2faeab0f0074d7ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-republish-83c485f2e43507746d6f598a094e8632.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-auto-republish-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-automatic-47dfd7659803e2a498c5473e1e3ec44c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-automatic-652fe9285b64528e4143d85b4b2dc5a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-automatic-6d3dc09a9fc43aca247841d5ac80b15c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-automatic-90f8c1652860b9223ed16176900d2afd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-automatic-bb78f143e91055aae4c346dd861f8fa1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-automatic-bfe038d664cd2a78c28c48237b8f9052.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-automedic-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-autosearch-8757d0b374234a37718f99a73c9ea57a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-awesome-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-backgrounds-lite-275ca735c51459885db221498880b57d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-backitup-6dee28ffa5289832e7634748227965f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-backitup-bb87858762b8ce23abd3059540eaff9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-backitup-ef2dda421f64bcf3a7eba43646d7c8ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-backup-bank-133f9da4970886f2c6daa016271571ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-backup-manager-24094706612b6a6d63025fb464dc964d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-backup-plus-09ab64106100b0ec32bd19145f93c2e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-backup-plus-54581f8752e2a09c1534ddfc5763d754.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-baidu-submit-2820cb8fd83fcd8f6cd4181103e215ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ban-012d37d1a0419e2b4d417ad1bf8624b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ban-cd2f40630317ec8325a0d94cdae423ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-bannerize-b6ce71d23b8bb3b641046b5238bd95ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-bannerize-pro-aedddcad604ad7e5d2eeb8d8f5ee448e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-banners-lite-2a0c0ac8cd49182e6cdc6ee30b392712.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-basic-elements-ae553332abea3b98510af17f933a8bf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-basic-elements-fc8825d6c61c86ccb18ee45ace94f66b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-best-quiz-d89cd4d50e467aee5b89a046ed25a308.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-better-emails-91762f25ca1ba53290ed2c419bfe3a07.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-better-permalinks-1fb46247dc51fca766c3b6cc15fb0753.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-bitly-d6f90ea934e0ed467a2133d2d162346d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-blipbot-549e52f202fcfb1294c6d1e3496da00f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-blog-and-widgets-8bfdb58ec24e0630da2bd7f7847728ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-blog-and-widgets-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-blogs-planetarium-34fbecc9c7ff44a06fa49fc5283f7c1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-board-4e8e6308af14cc738d0cb86b4562e1c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-booking-system-4f49b393f88ca9ff4cbed10f183193ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-booking-system-7be8b313071b390988085960c7a1cc2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-booking-system-96e25e69c7f878ae73c7f29f99c97760.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-booking-system-bba48b2b3db8c722b3183d512e2cbe2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-booking-system-cb489cb39876b1f1dad08fd79397698a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-booking-system-premium-cb489cb39876b1f1dad08fd79397698a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-booklet-12bc7ed9ac4b4df7c9585c5a1693f987.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-books-gallery-6e616d77f2461fd1d3e6a21e8750c36c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-books-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-bootstrap-gallery-2326f2ccfd7003acca183b6e98abdbd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-born-babies-2a429e3083a4c7d371b1df483f6771d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-broken-images-9dbf8fc670267468d6465754d6800d70.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-browser-update-1bed895aa03e840b8e1fbdc433b64dc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-browser-update-324762b1db43ab659ab273b35e9a6427.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-buddha-free-adwords-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-bugbot-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-business-directory-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-business-intelligence-lite-1163b6a8ec95736fa4c6fa05104ece7e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-business-intelligence-lite-f8cc4565cf41b4df5b2b7d0c05a42787.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cachecom-648854ce1a941daab3125afb660bc4a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cafe-34721fea6a2d4e3ec618e5f696ce767f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cafe-352ffd44ce61ab8d22bcb3394c22313a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cal-f584c8e11a9dac20a4d8a5133459696f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-calameo-d827c61ecd6e1b49bd9f088b6451ceb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-calendar-7d771013dd99d35b0d7273344b75ad3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-captcha-0a98ad5ece69d0c7228854255adb9a0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-captcha-da8dfca2c41b22eddf583b5ba482b227.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-carousel-free-4b6f3787781ed281c4bf315d7815f11d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-carousel-free-6ae6ba71c1c511094e234e44db33e39b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-carousel-free-91917d1d663ea184f4f2f69e04c99474.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-catalogue-525630ec5598f74dd721d94a531fba2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-categories-widget-aab20aa3ba5a82ccff2265ebe56cac66.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-category-meta-070f5b1993a30da98cfd837719ef997d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-category-posts-list-2349a7bd555a58451ac9e6f7145fe711.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-category-posts-list-91173f58fb32fd621503c873c6d8b146.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-central-124c235f99b301743df1e63ff167148a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-central-3814938e3640604c2b661225dcd59b9c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-central-40f584e497f01d406cc7fecd2f3771f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cerber-00e68b1df25f64641326f1dec4151572.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cerber-42ad4e32d4737220d58f4a4e7f0c15a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cerber-47b0a77f72cd6358c4ce2e9a58f14fae.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cerber-5915172b226df8e80423b0b8b00c97b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cerber-ae6491998df759b28d14cdb429fd6751.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cerber-e40d5c75fb230023d171a6172222366a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cerber-f1c926e99dc13eb40c609c7d4094f9b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cerber-f203d2dfc14bc6efd92b667d0eba2f47.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cfm-23d9a477d53eb5ee302467e17a43e605.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-championship-cb362ac834e4e127112e662b8e597a11.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-championship-cb7fe4a1f5c046460e4d69413b578527.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-change-email-sender-f5fc5ba02aa4560ef332189f36172c97.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-charts-c499c5763cb0c8fadcbd79a7862db8b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-chatbot-3243534248880dc4d13208e428d3bdd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-chgfontsize-13481b1ed77fd504fee89b917516fad5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-child-theme-generator-c4cf1ef74f307e3d974c13ea6edd24eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-chinese-conversion-ba1043324d157b0279fb5fef89ed3d34.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cirrus-217b5f3c17336fde467ad6d4d4052a6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cirrus-a7963745ff69e39eb4bbcfe48cff5818.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-clean-up-2b8ff50cbfd95099e68cc6637c86457e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cleanfix-3dc2fefb55b6d17e837bc91376ca059e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cleanfix-40d1328c8d4c642fffaf6abab5865649.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cleanfix-75c70b1bb438dfcca6e33d6263e0e86e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-client-logo-carousel-119ed13ee8d9c38858fd75fb1eb0a4cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-client-reports-11a9c2fdd6ced3454ae2f484273892ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-client-reports-a5b46952d543f797449f79e0a9cccb18.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-25a10466c42d47292b8a71c862e9a26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-6ac56b73dfbde68009426ab1366ff6c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-7379020b548b14b7be62b539ae5d76a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-a1129a205ef2deec4965e57f9f73108e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-c451f687ef3559dbeeebe92c1e87ed44.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-ec34a021a2077f3815f991d8c8d817ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cloudflare-page-cache-7da86808d4989a68c5d31062aa40a7e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cloudflare-page-cache-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cloudy-0ad53ed111e4c9bd0fa768a28b64118e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-club-manager-88ba893aacf7da3ba8fb038d6bba0a0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-club-manager-980a1e8d0e2c9d6875260534aa15c2ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-club-manager-dabe11ac9a89ef7717da39d4e9cb7dcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-code-highlightjs-c1479c1cda6995c80979468ade477a9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-code-highlightjs-ca875a69734817c022d2b5742d18b09a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-codemirror-block-291a48e25bfa003aa951458172971d46.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-coder-03747b0c7844da2a502c367644e13831.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-coder-245098f6b0653f99e8181fe1d0b4d9ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-coder-83f22a47dbd6befc1b5b2de701a66592.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-coder-d4baf5319f8e6cff227085b65be4db6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-coder-ed25dc4554a62fa61ab6134b2e367cf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-colorbox-4c3b7c4b9ee3cb503e7f1c307a295ea7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-comment-fields-0cde94286321975aa282d120f32f5bac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-comment-fields-287b97d3800f658fb6c7787e238d09c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-comment-fields-6fee77f4c30ccce8c47c0e8979fa4163.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-comment-remix-1498b56c7721705e179b43bd40cfa29f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-comment-remix-574c183518fa14bb1a854e4b68f72a19.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-comment-remix-5defb55cded48a565a064567cc9f2fde.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-commentnavi-c4c58ad76c633d16084174a989d36082.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-214d7a66a2d3ba448e1f7f45ccd8e5f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-388de01a3c00f86461e75b59a8e80e96.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-ab5c346298e5bc332a45956af170b3b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-concours-31a7c57e145b1990f031344b13acb01b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-conference-schedule-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-config-file-editor-416feeed72e481e9c6ade025bb1108e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-construction-mode-aadc81f29bdd98e82b479da656b5f939.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-construction-mode-c4b1471de80c6f40eddc08f35e8d5a25.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-consultant-ac90b1e42401eceeda1d0c4445ebc72b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-contact-form-007c1b62fcbe28eefc7df62d2a9616c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-contact-sidebar-widget-faf2b2d46d16f4cbc167cb1d3ca32849.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-contact-slider-13a0eed39cd76523725bdb9ac6f8ad2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-contact-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-contact-slider-d8df0d0d76816bab3218aaeebd329b4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-contactform-03e041af34914994b5b4b3e20ec8ee2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-contactform-fbe96c78719e34780f9334cd4775f2cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-contacts-manager-49aab57e3a849669daec0648093b2a24.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-content-copy-protection-d51d69d330a061dad190bd18258e5c37.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-content-copy-protector-d40e32a5b0b2b53caa45979ec9bf9c5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-content-copy-protector-d7e80e6f1bf77fdb58c4ef0772ba692b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-content-copy-protector-e6f9d411cfc36ab403436e5079e013a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-content-filter-cf0e16a0243bc8e5fbe7907a0ee34454.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-content-pilot-0eba82d1fba78dd21145988eca694adc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cookie-user-info-11d8ae615e422011cdb2e654cf3c2a37.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cookiechoise-e18f49f80ec9826dcfb049693894ccc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-copyprotect-e1febe978f6ac681c905f0209b923309.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-copyprotect-e4e5ff4fcb64dcafb0055252dafcef0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-copysafe-web-0146139ec324fe379ee6ec8f57dc3c30.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-copysafe-web-79179ad54ba7abdd62ae8ef75c3ac232.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cors-e46a5a03ceb7f18070858cdd9f1f8b5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-countdown-block-c70d49119f4b9f186615bc657f763711.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-coupons-and-deals-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-courses-33d299e06297ee744f8b2ab0f31bf14e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-courses-863ed304215cd2e175d9703d88e6083d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-courses-940c6ab33d2bde0b6449cfe6f3d13395.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-courses-97452a6bc86602fd42828322e14bf1a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-courses-f5cb3f8d334ac2311e5f8501cefe50c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crm-977852d7cbd71ce5f22a0af60232cc54.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crm-system-0f98500a56d8bff1fd15d46c8720db00.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cron-dashboard-2f795470b566b4d4e27fdf7c4b01f4e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cron-status-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crontrol-4868cf7c42be3158ef073642ac63d2ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crontrol-ab25c765042411f076e2c34c06b3fa2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crowdfunding-1dcb303214a4e16964564ee6c958b8e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crowdfunding-1ed0f12e4f8286a9294dfd9901458db7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crowdfunding-29e9ddd5b76fa0248f97f07fd01dc1e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crowdfunding-53abed64d2c7da6e29618b2b45471eff.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crowdfunding-738aec4d264c39b57fdb9fa2e1cd1e49.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crowdfunding-91cfe4c5d855055ec913db3b32084f9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-crowdfunding-c28a0d08c5fbf894a1f8488da42215b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-csv-1f51055337b26e17849cecf509bf67bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-csv-exporter-4e6e2faa30d1cb67b640ff4b64c7c434.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-csv-exporter-968c8d1a2b35e84ec8cc4db089cc5a0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-csv-to-database-83d9cd71e386193f00255f0781416f64.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cufon-ec9648c71f1130788ab995bdc3f376ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cumulus-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cumulus-ae74e5195b986dc457ca3bcab394fb91.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cumulus-b5fa15c1717b09cfe3a9444e5c71ce00.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-cumulus-df02c18fa8558df79345e6d025074ade.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-curriculo-vitae-3e2d48fb8718138bcd53c5ef0645702a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-admin-interface-32ed4b36d9532730d50e66214a30b7fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-admin-interface-440ba93423360c612c2bdc92f81276f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-admin-interface-5bdecbba58ada95bd7bc5fd2be57ef44.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-admin-interface-c74c11d5784e405e62062349c0e1950a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-author-url-050cddb029ad5e41b8d75ac57910a3a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-body-class-64d4110e0f9003166c73a24b6fad0a3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-body-class-d03a7182da2d0e0b179ec3d956910e32.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-cursors-31292a415c3bd76b8562016d2514c1b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-cursors-5c48a008fb4b7cf800ee3deda45c5f7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-cursors-9698878f57267bfd24968203a9fc1400.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-cursors-990bebfd04ffccf7784d9ed7851bc9ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-cursors-ece3289501587998363581768a050e75.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-fields-search-0b1be450ec6216c739b3d0139ea02732.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-fields-search-8eccd870a6d15f799494bf58d6a610b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-login-page-4fd05a735543332a71cc4808699480af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-pages-4e0f6a7fdb6146beb66009561f485674.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-post-template-fae9e4b7c0dc6fb3f6341b0fd31d1ab6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-custom-widget-area-23aac587b81f89d6096ca89681943380.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-customer-reviews-11af501cd400c11d4471a7dd2fad2f1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-customer-reviews-6ed86de0b04577fc056eab4066eb09a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-customer-reviews-a0746efee95fbf7d166096b25b7d8be2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-customer-reviews-b3f06bebea4c15ec9085029db00fb9fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-customer-reviews-c2b458a87e9095667109688e878e4bb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-customer-reviews-daafab6254624f5514eee093537d860d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-customer-reviews-e97ef8cef65f1238fc33971be91c7b6a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-d3-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-d3-8e3ce96babe760c2cb16640799a8d0b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dark-mode-129be45dc62378c19cbd82aa0287c865.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dark-mode-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dark-mode-9b4ecfa65ce2bd75653c853011940f82.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dashboard-notes-49ce77ee7ff4dfc9b11f4efe4714eccb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dashboard-notes-d64722e01dc579e8e1b721ed84873800.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-data-access-69231840a822d24bacb2d776a5d46cf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-data-access-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-data-access-f5497363e91c49e85823434d8464dab9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-admin-6cf9abd0a55631980f6943dc1552464b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-01a81435c686a1247dfccda6d4fceb1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-0ccf2aeb067cc807426227d06027c42a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-230f648691b91c6194be1f415c1bb8f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-434ae7a95fc78d705c7843354abb6396.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-4e3789575d49b1ac4382fdd75784e5a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-570d7dad3e17c051e824f46c008efb18.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-71e8880d940289fc5d83f840f7f72d23.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-72a1bd2cf4b65d84a10506cf15cba770.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-8927f27721e1d8b23d2e73cb09a3c9b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-89f1af83c5f7816ee1b237c0d204c470.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-ad22dd4e7945e819f768594bfd7f51a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-d37ffc3b204cc5bf91198dd14b07cd91.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-backup-f1bef4e2b058a613299e0bc52fb82835.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-database-error-manager-fe4659922c34e5697cab9b458b24c4e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-datepicker-e6aa8433ac2636bbe0e1dd25466b1760.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-db-backup-067d3779b4dc783cbbb0a5aaab128700.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-db-backup-39941d45971237ca65a192ec3e53bd89.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-db-backup-5741da0b171618ff87448def21553be2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-db-backup-b872392d30229399db8513dcb00793fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-db-backup.php-1354435c4f5fd2cf36a77bfe4d9efd70.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dbmanager-28a1f826666cf3d5563d0cfab46756c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dbmanager-2e5e8e1009429a76d7f18bdd3c57a7a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dbmanager-46753bc0e0a5000c6953d11b4c87a555.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dbmanager-d56c9f9434c8eee9514eb927acff9263.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dbmanager-ee247de60df1bfe0f1ecd93cf598296f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-debugging-54ecced4ec6b955678ac66c0d0f02ad3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-debugging-7f4824acb6f88f468d76a43937c8bc24.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-default-feature-image-498a64542dbb51a5eba70d23bf7af5b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-design-maps-places-9a9c52cdec433248e8d2c508fc3c6161.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dev-powers-acf-color-coded-field-types-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dev-powers-display-screen-dimensions-to-admin-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dev-powers-element-selector-jquery-powers-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dialog-0b351fbbceddd3af3b8762c10e45e612.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-disable-sitemap-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-discord-invite-9f99c3916170112c6519a28e2f1378e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-discord-invite-d4039daa19b11d4d7dd3d98ae4448907.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-discord-invite-fef6aa22cfe22d9b149697c3717922bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-discussion-board-78755e457e479cae23d5dca42eeac5db.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-display-users-426286a65b9c6cb22be8026fc66ac3eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-docs-35dda5414154f53d96b973b68d2be63d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-docs-8438c9473d07feba9507b08f7b2ca394.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-docs-de718f2bd31fc4ccd0bdde8aa56c6557.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-domain-redirect-4e4e50f7a420b0e140281c805ef6a928.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-donate-9f7bf70b345ad8176b09c272029728d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-donottrack-6d5c3a6b6510902181c0fc950daad824.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-downgrade-c8a533331a66588a41e484e2593bc634.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-download-38075b2ddd2270a10fc2d087e129aea8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-download-manager-f8b195ad87a5a50c5754f7800933e00c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-downloadmanager-2a2c96d8b7e05bdda2ce23679852b0ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-downloadmanager-46ca57fda9611a4d8d3fe3eb2317d1ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-downloadmanager-504f4fd7f6488b8460fa7b0e025293ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-downloadmanager-fde55a7ed22dac34f683215367ee2443.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dreamworkgallery-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ds-blog-map-7fd62997a96edc06785da25d5644aff0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ds-faq-plus-56b48bd0a46510cdd09a4ee245e5ae52.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dtree-30-1f13b5881c3d355245302cf4439befbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dtree-30-21fdda375898746027e6f9dda342b8cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dtree-30-5a34f6e49c7ef01f010ae75476cc8b14.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dummy-content-generator-422c4f76899e03c0666b1907832b3ab3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dummy-content-generator-4b8f53dac7b962db019d821a894cbb82.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dummy-content-generator-65d839a96475e08e7231c85cc5b59ef7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dummy-content-generator-e41b83efa869789b0f40a748caa1121d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-duplicate-page-783792bc349c3286b30c741d65b88b21.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dynamic-keywords-injector-9cb0eb94b28c3edb80588351824c0d35.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-dynamic-keywords-injector-a13ac145586953796d79d44892866da5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-18d6c29d9809d383ee48c11e640d6bfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-289d7937d831ca65d987bd5d70a6be46.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-47355e6b7ab75ca2f167e153c73e9cb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-5f327ec92a2ed47a19cfa74c78839e26.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-79dc45699a7994a2167adb230c8ff41d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-985a4d5103b9ddb67f837c1ceb401728.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-bf5cbdf8020a636cc9f21e15a59d9023.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-cb27559ef010c67b27e71c1d47ff78e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-exporter-b87c02ac90f7b6f2632497368ebe2ad8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-e-commerce-f774eebe4f23829fc94b7eafdba5ce4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-contact-1a94885b829a17aaf2fa1ae77773a27a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-events-3c60189d6f13a72d771cf945af5deabf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-gallery-0a9f08b24926b461870620f84309d060.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-gallery-4b99edd00f6941b4dd18ce780651f43a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-gallery-53e584ae34c9d1aad8bceb6896eca3e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-gallery-609b7c2d6b7906e24d1cf69e810126a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-gallery-f0840392ae02502b377a0491bc44f08d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-gallery-fe0e146c52658b7a7e60347935b3c568.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-pay-7019ae891ef15e3836bd8cf0d5c1f6e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-pay-978317c4070e7121d6a698893d413687.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-pay-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easy-pay-e9841c7d453db007ae94f5b33ac69fd2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easybooking-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-00935a43a6eeac3216e5733aff1322b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-039f1cb39ecb5839b4ea52ff55c41eac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-0cbf88d6c1cf37efa7d39650814fcfdb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-2b72a770047348328de1929b10696b75.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-2e1c1b8086549c30cda9ee97a6f1462b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-32c514a1869a13a710a63935ad684892.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-333442feab2beac98ba52d2344da3703.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-3c89e27202b3ceefaa020a7f1c33e993.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-558868c7563df01c1f5dedf319b2c882.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-5c5967c0bbcbea315d0f076aa78401d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-634f36268feec63bbd65254294b6c4f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-6a08a7b07ff874974a20d821c1b5579b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-72e9256e7194c6f152bbcbf59294459d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-850e9ef75c282ac77bdc710fb921007a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-8bf5f589d084befe53d71ebadbbe38a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-8d0780ef9cdce64a723061f380152be4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-easycart-b86446f22d4643018e6ef2052ed1d120.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ecommerce-cvs-importer-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-51e05e1842b40dddcacbdfa060eb58f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-8bdc053cc4675755b000b5fc58ac8d1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-a742d112c80df865f27dc03fd5bad80a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-f76ae0a1a5395e01d11e666acc5af070.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ecommerce-shop-styling-3b47626efde37c9b368853074eff5ac4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ecommerce-shop-styling-ea6169545e62509ba8c9c97e59403c47.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-edit-menu-466f828dbbe6a38b41f50c90b304f162.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-edit-menu-d194b7c99710bb89f1ee39dafcb5d71b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-edit-password-protected-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-edit-password-protected-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-edit-username-267f0e0e2934a72d1de6f6f1105dcde9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-edit-username-7b1e0db7c2338cbba544192fa7f81810.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-editor-1184e292a35a8344c32cddb99a8fcb99.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-editor-1681b68cd41846205691e7808fd5da5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-editor-38bda0676f9c2f71340a844a3a8819c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-editor-b9526b8daaa2ae88bfa635ff810051bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-editor-eb8ded5298215dd0e82d0abb7c7916df.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-editor-fd1c6aef8498143f615d9a33fd78c139.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-editormd-74293ce2d79dd2a7920de3a46ed52f1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-education-6bb2bf3114fc53c78aea9aa0493d5c3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-eggdrop-af2b2579ba875af3f2aa500d0c6dc341.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-eggdrop-f0134606fede470163532ed054b5ffbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-elegant-testimonial-2bdde235df4e60ece644c15f4a368e21.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-00703f6574c6499c4c754c18b06e2fac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-1692bf36a577861d7694fe5e6a6349e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-9f58597847e89287848eee54c2091729.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-aff34bbee6abae075d8a005450eb25f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-capture-01c32de4da27201264daa86cce20846d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-capture-8b5e824a12086cc74066614f2e4e51cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-capture-c12916d335310986eaec85514752de0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-capture-f31ccb9cf3abf671f018dab7c32b0baa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-d7c41c4fc68b394974bfd23e0a1efa8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-template-2961759aa56e979f7c4730d8320eec28.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-template-6f39409e9cc737c9be51051f78033048.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-users-2c7df8a6a41b0cfad78e17028e8be6b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-email-users-f523c60311785f4d77bdd4f2724550c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-emaily-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-embed-facebook-d255ee9fa48bc6c366622d018f796d6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-emoji-one-dba2619ab2d561166f40c11574711a13.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-estimation-form-55c899bce76676ae0bd2f27011d06ab7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-estimation-form-56c7f8b22a3b891b810a80379c9e7a01.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-estimation-form-f77ac51d7f87288e232b2c219c40d8d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-aggregator-e5c02072906413fc46145a5e93a1996b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-manager-0d45a6acc266b9099e698fb6465812c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-manager-0e1bfe9ca60605b5abd7dce920ae439f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-manager-1c01adecb12aee3257c9d0dbd49129d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-manager-5dfd39caa2a4a17a9d81b2bcb48fe7a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-manager-b1c130064cba38fde3b249c93cb244d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-manager-c18f4199236ac87f44c609c0bce30e9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-partners-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-solution-0b82fadb36c481a1a5ef36694d259943.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-event-solution-470fcf5d296c10b95ff256d3ed543789.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-events-725f7191ecab88079bfff1263c7f0b6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-expand-tabs-free-2fc3b192219eef2561c8cf224133798e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-expand-tabs-free-92b868ab957b2d6b33921f7b3f3c0643.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-expand-tabs-free-e352fc57a2782b7212eb2f2b84743eba.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-expand-tabs-free-e835818e3176559c0f65d870084d0fe9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-experiments-free-2560e5ea38a398fb682ed22ee1d9efc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-express-checkout-ba0174f27e21e2789733491b8587f8b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-express-checkout-e4fa85790fd0d4e4853e9542fdd405a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-extended-search-2124f2372d43d33c582fb413bf11d2cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-external-links-8503267448a714d1d5d099f1366cd0ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-external-links-acbe4c57371265432a7073cce828c9b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-external-links-c77650d093057aaa003b4663a520daa0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-extra-04bca0e78f8b136ea82b1c4e9e1fafd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-extra-1bacae6a1e466eb95d42535d2732f49e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-extra-72f52b3195cda1a84eb378b7230b5a8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-extra-cf9d9e6d9a79f949d859a47a9fc67035.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-extra-file-types-388ae826ccb91352f7d4e90d33114225.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facebook-feed-0680dda962d6629defb4aaff80f780c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facebook-feed-19cdc4c29e421f2a623449d500d3da59.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facebook-group-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facebook-messenger-e11138180e51155554e951dfca6551c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facebook-reviews-1f98c7de637a490b84e9178dba93c59d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facebook-reviews-33420cd1d54a09491bc3d21e0f948bd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facebook-reviews-a6734b6686a1620a7fb5250d66545fe3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facebook-reviews-de4b42af1ef3e90d957d2f6f01c968f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facethumb-00db16fbca7a4f9a03bd9187fe606bf2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-facethumb-f4af8d356c8b91106f18b8295f1a09bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fade-in-text-news-eac77b73e6b9904c178e050ff0c75895.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fail2ban-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fail2ban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fancybox-8282698eb41cb94eaba8ce79ac54a59f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fast-cache-8db2ce4fbc6df6bbc133a98c76aaa326.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-2bc9467a4d3e89abb47c57f5fb5c5502.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-2c2de25348b7c75ca7429eb5ebee61e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-308394f6b31625a7b3cc64b85e9f4dc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-34c60f50f8424840987ed5ec10c2ec3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-434e9952fd09ca91a230586603143cbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-5159dc207c489f95e16ee89d4e708b82.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-528f5db23cd029b151a95682806084f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-5c10da7a2c723b79d143625ddb915594.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-5f9f7bf290ea80a41025c30b0ffd1db1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-6c168d1ea28ed0681002f0d31c5c68ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-781be145445f4ecc9aced0ff98acc796.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-7bdbbcae3cce706a901ef3f3a6b92425.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-87d8a616e4f6cf2eb5659e011debac27.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-880d7d40699b96b833547889085219bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-8cc833441ebc75f63db145d2a0ea886f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-a5a9392a98391031218baa6258f9a301.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-a984dcb982c3439de2d89b2a845332c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-aa83e2ade173c8a794348dca58308ca5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-aee951aa25d6cb6b8a83ee793cc48cd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-b042f2e0c8fff5912a04fa9b2c227c26.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-b07a02f9d4db7fe492ff4a4ebc6a38ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-c154f039f669a6109ec8e5a85b87164a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-c21f1786e3abdb7c657091d8024583d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-c81b4ef2016d652c733da1bfa6c2e44c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-cda6fd724330a43ee464ed21db562f0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-da0ca9a834853b4f5e811265296c5adc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-dca77da230ccc48431ba72fffaf1572c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-e73d249d01ad89f85ce6653e71044320.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-e894ea885bc953386f78fce46ae1e024.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-eff26e4e38ea08eb75bc359769b06555.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-f28e9e3f4825fae9f836906b103e0875.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-fc23a4effa46a10b3b1c7e7c56d41874.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fastest-cache-feb6288652d7faad54d04d9b1b85ce3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-favorite-posts-7d31af080da908940b0bf5332e53662b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fb-autoconnect-1649363ae97196f303e072aa7eb1a4bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fb-autoconnect-92964841ce29c9fa3f7d3cfce6a290be.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fb-autoconnect-c2d92bf1dd144f0becd8dbed310ba478.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-featured-content-and-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fevents-book-0b46297c5a1cfd566b6a7dde332d02ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fevents-book-6baff9c0f37923203f19e1b9ed3bec89.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-download-light-91e729c82f2d9f67d872d81509700a6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-get-contents-255053b922939496ac6eb4ab1dee395c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-04ad31792d5c51d45b79863f46499a91.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-125b5a46ac07b4fbf1d6669e65082c22.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-1560744dca5de73758ff3516e44b8c1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-51f90b4356078332ed05b86ecb626225.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-6943b3fa4f51347e8c8fc20d043e8814.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-7b25308fe9b7c95a04987753945e2077.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-8ce49b249ec2d999d67fd390598bddc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-ab69897227314aa3081e7c66ae76a1a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-e2709c74f557b8f05efa6466674d741e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-e29d6db8a3a02793b21f4d3bff2f8cc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-f02efca96aea9cf0bcb75d72789d8419.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-fd8eab398a722e719e1bf89dd3138490.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-pro-8ce49b249ec2d999d67fd390598bddc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-pro-d3109a73b6d87d8103efae9f126590cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-manager-pro-f7fdc67eadf58def32919b2ae093d4d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-1145c2b3c9a783cc9ddbd56cf0e9e202.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-12655be83937ecd726e038deb4f658d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-12fc948c06bbe2558fcf0a602f5f480e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-1d2216e58fa97236cb9e7bf56c440d7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-1ea0fe6e846ccbee16701a333d122fbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-257266db439be46c584223cbad6695eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-3384b3561233822afc35f30b762beb0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-392e3e13340828fa089ab176edcbfb0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-50251b72083cccfc7a4f498fee677478.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-558dd2abba5a0995e4e08d93b33b9766.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-6bee4ceb90dc1010814fe03431f27200.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-7723e642214a4cc19dd0a90f922c5611.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-8e67911649c9d62ea26bf9814db29d96.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-90d37fd2fba0470460729c814dc702e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-95115eb6cd7773daea0c3290d4bc4306.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-c497e96a3198128f634a2cba43cbd62b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-c865a729c4dbcf73f4c0bf83297ccf74.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-e144ec17062b8eeed75efab5b0c01953.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-upload-ee7a8e2edf67246d96fc10ab588599db.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-file-uploader-4f06deea31f34880211b0c4ef80881fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-filebase-5624e3de57e88dce47b0f6296615cfd9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-filebase-de989fc706fa629e883c0763f12184c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-filebase-e9c482adf3dbad1f07b295406e0bf073.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-filemanager-de2762b35b84b3a5bdda7739f2f6324a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-film-studio-074487038ea654261d72956b1f3003fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-flash-player-23ae728eb43f332c22abd8b17feda1e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-flipclock-d86c9fbec6faeed6e24c9e1120c7e0c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-floating-menu-4aff32f6f1228de170ce7ff458bf1831.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-flybox-216ef8528cdb19a4a187eee0e2877db5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-font-awesome-7e2bbcff98524a357bbf2e605454a087.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-font-awesome-cedcad8fb42c104219ce15d5179e2ec0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-food-manager-af40b53dc8c1c75f92915027f96fff8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-football-40f4199a368e88456e06377e7668ed2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-footnotes-a8ccc8e656f57b6f03393d18f5ac6d44.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-forecast-ac7ff3acb8eeb83f868977100c1901f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-forecast-f00922a5d35b3c6ca276e64048795ab0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-67bff2c5d8fb36a5ed2e0ba46f102703.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-d806a63c536300d0b583cd9fc85457ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-f1e4ab77de69b73a462cc92d770eba6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-forum-3baacd5c535501f1e7c594d4e91f33bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-forum-6e024b27bbd5dc8c98695441370b8501.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-forum-a6e364da6e9eb1d449de394f7ac6c782.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fountain-5cd702313892426c4d5db9e30cd43042.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-free-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-front-end-profile-0ed606409f522ba3351ac7659014c32c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-front-end-profile-b37c0d0d71a59763b804ee0d533397e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-front-end-profile-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-front-end-profile-c8cceb90ecf899fbb284e13c71ee2405.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-front-end-profile-fc6a57b91ab486b0b4aef62bb7676ee2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-front-end-repository-94c180de31d25f5739b8f87267d3c1b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-full-auto-tags-manager-73b4a317dbf4f39375dbd58ae18a9d97.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-full-stripe-free-667e350f42b763781ac08f9d6c648e0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-full-stripe-free-75e488bcf8c81561792f2b21f5fbd763.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-full-stripe-free-c18b0aa1f2de13dec1ee3b9448c0e5ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fullcalendar-4d29004b4f45680a61808cd7f630a100.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fundraising-donation-62232a302f7fe9f8b0db43176a902970.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-funeral-press-45b180f701bbda6c2ac66302babf8238.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fusion-lite-815613664281ce9641a420b93ff49909.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fusion-lite-91f81bae19c8e6b1e95305d25a17b6e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fusion-lite-cdfacbb67934ca9294af25220e6a52b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-fusion-lite-e8cf37239a5b69d21791d9c5728d4701.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gallery-exporter-de0285827724428521077b71df2ee67d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gallery-metabox-377dfbc1893c3f82b60d799556ea4360.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gdpr-compliance-6e07c5d5d730f2ffaadc2b47ec323077.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gdpr-compliance-7963dd486edaf4e2c2e742763011f365.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gdpr-compliance-8501b849b0f302eafdaedb3a9eb077f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gdpr-compliance-9a25bf02d1d516ebfa83ea0a4af36e6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gdpr-compliance-d47084b590cbc795c568485d3590251a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gdpr-core-97711fb53683ab26635f9b3f2754784c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gdpr-core-ccf9bbc2066dab286ce4f7f98f9f46d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-get-personal-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-githuber-md-37948e20cc8aeb00d7f629d9bf7d79ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-glossary-782e75e9ade7cd09f2f9dfc0e07ecdf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-glossary-c8baa9ed85af66dd4a921b8f2c5af1ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gmappity-easy-google-maps-8f06cbf2f40450a7e41adaa2e12c5c0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-analytics-events-cf4a1e3cd78f1384d3dc34cdb54fb3f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-fonts-0bd9393f43d814fb82bad26dc2a66a03.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-fonts-693e37cf0d606fc058da1d65dc80c30a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-0677fc472ce6636d2560dd0fee27206d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-0680dcfefb929cf836c59db202cd40da.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-09e6dfe7f784e608ed0fba91188d7274.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-4778c289f09f336f1a397e49c205f5e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-5237dfae31b24b8180bcd6193ab8bd7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-6a35bf1797897f8d13c75911c491ac65.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-70c01b9021b52ac03758d9968f42dcbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-7149f44d871608d660e807410983089b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-7382281cd5a556c25b2c10e2b81ec2b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-73f135de232fc553a1861c313e9ab548.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-a5532d15dce91adaa57b29acc9d33bb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-ab2c33982fe57a3db954e28d388810a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-map-plugin-b619ff669f813db2e4bf72a01401c559.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-019dd8c7d843763da77dfac2e01453aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-2cd3d2328b9309d385778042d73c86e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-363421e443d86bf6a03f6199bd5c6045.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-3d197f1213a479cd13434bd580bc4732.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-5938cf4c59a1d8ebf45c155344fba09e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-69657f4112d937c57fc4155d562b7525.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-69aedfc905a5a0f0e668841416c424fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-73bf56678d08f13f561affd2573b6e8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-7b9a92238f85900b8c03567a6a71f188.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-8a13eb8b9bb39899a8b48afee98189b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-8c03b52626997e166cccabfb7426db2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-9c83e22896300f312af778a1727c5b7c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-9fa457edab3267f4204b5dd4138a4aa0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-ea627a7f49b873c84bcdde34c37b25bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-f4a3d95a0a4f34bdd233d89b3cc7dec8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-maps-pro-622602817799a1869bfcc5c18c23392a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-my-business-auto-publish-1f645d98bf29f7b2e378ac42457eb0cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-my-business-auto-publish-5bc39e042d909c5c804ae61b49719209.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-places-review-slider-12c0516e02b16dc0e022502178a348b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-places-review-slider-63e8aaca3bf1d75703f616e718360745.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-places-review-slider-8f14563b89ae2fb865ea87d5f251bc48.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-street-view-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-google-tag-manager-8a0f63d90f622470f02014f08a84be2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gotowebinar-352c9721f769a69dbdfdbca5d48088a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gotowebinar-7ef847bd47bcec43447f7d6368de1312.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gpx-maps-2948a715e4c44d771b627432c9f5701c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gpx-maps-87f838d84fa79999236dcd79f1342013.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-graphql-026295425673c504bf7857c72ec29c89.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-graphql-3ce969cc21aaadf47f9f21f5d1e9275b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-graphql-57520ddea3aef158b3f4c190e8c7e07c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-graphql-b238fd34b5c3e924a09fd674d5421611.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-graphql-b842e16402f90d1b3c5bd6bd8d47b010.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-graphql-ffeca4920c42635f66f540ad7d4822e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-graphql-woocommerce-bc8d13f34974a281819e2214a599c545.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gratify-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-gravity-forms-spreadsheets-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-guestmap-25e2788cf757f6544d551ea3a1e2ff53.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-guppy-a903ab4eb75c172e6eca10c67cb489f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-header-images-40e3027a5e804a97b0f46e2e4f30f502.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-helper-lite-7a5eb553f654c8abb18f57d79b8b5c6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-helper-lite-a7962c57d554ba3791bc1c180659f4a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-helper-lite-b94cc0b7afe53c571ed57e681c321c40.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-helper-lite-eb9d1a9f33f022abcf9d4898480aa085.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hide-9e68449652754ef8472e39a728f388be.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hide-backed-notices-d44a9e8c9bb990d8de78849d0af5d4fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hide-pages-0d6956dd795b21ad1b36b190e37feb8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hide-post-1f01b8aac13069c5d246c4165063f59f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hide-security-enhancer-7d8abe3c50b03fecc955bd5577c71ca3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hide-security-enhancer-abbf4b405ae85f6f94a6172993fba981.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hijri-4daf2f8ba4a45a7e36fb255ce745667e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-home-page-menu-1663017756a06282bb3d18d015739d82.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-homepage-slideshow-086786b1308db5fa85a4991de8593d04.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-homepage-slideshow-47a30f13a712f0b51de3660787ce6dab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-1ca57b94b0c3924da7aeb6a7b470fb34.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-1dcd89bf2988fc6137fe33f02a552c95.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-75ba043cb8adfd31b0f166864fde485a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-9d40d7d424169039478e2bac7970cbe4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-b9f4dda3ee3f676f0c301784c74a1eb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-c965265cd81e4009a888757a2fe10108.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-da3e165cf3ef701df2ce9756df8e0a3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-e2b770c20c0fc55c7a4f89e727dd45de.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hotel-booking-f3912809d80374ed45475cdb257fbe88.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hr-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-htaccess-control-4c313c7653b942a477e04e3a6c17f18a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-html-author-bio-by-ahmad-awais-752b08f32f0cfee54f18be53421a36cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-html-mail-0d54afc8ed70fc0c6271f164073322bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-html-mail-29dfa6e3862f7e4332686362811dfe12.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-html-mail-a97999937eba2822f909f308d3c02136.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-html-mail-e6cee718e04226d8b1f750fff9c130ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-html-sitemap-817be9a0bd25037cf51f3d6111fd059e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-htpasswd-f030486cf056eab3637611e650524a05.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-hubspot-woocommerce-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-humanstxt-e4bd7eea0fd05e8e2fe20b6f0c6b7046.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ical-availability-2d9904a0be3734fb0155be062ed61702.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ical-availability-e3f695a2140d0d6b1618f7ffa872601f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-icommerce-f4d44f135652b4f97e23ce29c089eca6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-image-carousel-074f8cb869df86a1b6d64a4a39d460b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-image-news-slider-05168237faa874bd973125b39bd200d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-image-news-slider-2d5c1e4ab0db1f2ad3a139f4145f58ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-image-news-slider-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-image-resizer-8b089becf530f93c37bff15846437ba4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-image-slideshow-b5617dec0fcbbbc761aa88231d94be83.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-image-zoooom-11ece8e5656573afec625cc63879b1c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-image-zoooom-fdc1c524e165c5f1685c267f450ebcb9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-imagezoom-324709497ee87aa1c88e83eb2c996e98.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-imagezoom-3de3e5de16fc382e7b8fe56b08addd2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-import-export-lite-5f94fd73fc44e0e8d375d47e5fc1e6c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-import-export-lite-a9b4271e0f7289a56cd0261063f73943.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-infusionsoft-woocommerce-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-inimat-62dc43c109e10a4fb2083be6c80b9766.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-inject-807cd0a33bfd97782e746e860be1d566.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-inject-9741c51413af2327faa27cd2e2fade6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-inject-eaace189d52939bb1c67d181a1aa5e03.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-insert-6cca6746a9736e02869580a9ebe96b4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-insert-c33e053383feb22bc4a0a09a68717fb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-instagram-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-instance-rename-cfe80c2324444169a4424a703a8b6196.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-insurance-be2ba6e35694514824b8df64e723158d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-integrator-ef0c35cfc8264d312ebd8c7577e88c19.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-intercom-slack-280619c8c575de4aa0faedb1d7908342.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-inventory-manager-363c3c176ac2ef6391bdaf79f83140e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-inventory-manager-52c7fb159214201f2c95219274f70ec6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-inventory-manager-d6fda2db9aef5ee17aff3a1a9d5aae26.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-inventory-manager-da8ea76dfd26f4abbbdb294a05baca1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-invoice-57a112bd1c50a2fbcdf02a29f1461095.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-invoice-68ccb9bcad04a1c6dd8014a68d2d5fe9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-invoice-7137b8fac252650babdfc2fa8502b307.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-invoice-875ad9422b6c5059d922fea2bec00a1f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-invoice-891def7bec49bf5ec54dedc52d9240f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-invoice-916c5b9976a17729e06d1b6fb0458ebf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-invoice-e02e4d31cf49a5cf3437bdef98608b60.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-manager-249ae1950a1aba5232af2a232fae47b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-manager-778debf79e02e51fc617919e605d5f31.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-manager-a866bf8732fbf685f3dd9ae8b9f07dfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-manager-ab18ce3ab5c885047a8f794ed3023e87.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-manager-ad1a7b10885844b515902d55c9660f2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-manager-f05562fc94116db3e2f5dd9c7a1bb0d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-openings-e0b60cc25d6815b825cf11a25f942d5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-portal-549d5bc8afbc0ac7d09fc136717ff89d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-portal-965d1bb3ea0dc7dd2bd7703dedecb0bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-portal-a5de647c0bebb3ff3775ad99edcea819.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-portal-b1effc0c53914bb4a1c16ea81ae4e1e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-job-portal-f2a0a0a17a439c3fab0b66d207898f19.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobhunt-8605cf70b09f39b80921d3235eaa5a54.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobhunt-8b266025d0f3695c542ad07de2e9b34c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobs-1a1e231870f2d36ae969bc3201047b95.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobs-b2a0f64728c134eb1a214207f2b340c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-06bec6e8b710a7efd7b4113567911744.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-0757689ccb9eb2501cdd998e2d1228fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-0b45e780227d592e1f06fb820f3146b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-32e08ef17f0f9f45149490d3fa9aaf1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-485819fe9f0636879bb1f6cfba46a621.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-493970b9d6651de9fd021a267048266d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-5e2c242003cfedf04505fc0b33fa0f84.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-91fa130b7c3ea6431b231102505db7d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-a75fd23fc24c5b8e6f032ef260fd0fc8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-a7b8efd454ece6d5c8233c73f0d61099.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-a81ba5cd5b7c78f82a652995b8b78367.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-ab32f6a94ae805ae0f774665898eaf69.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jobsearch-e1e8b509fbe86c6565ac6936dc65e181.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-js-6c30c87bb2fee4db66c7047f9fb31811.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-js-external-link-info-0d9b0b8cf0e1e0917d4472d07a7d609b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-jump-menu-9a1755a05c804d6305bb91e5146a62c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-keyword-link-f68af0f4ef5270237a2dac4a79c88b36.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-knowledgebase-fe2e1db48888e950bcc3a91fea1678a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-last-modified-info-524d5feb3bdf1faf2643f61f231563b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-latest-posts-2f5edb5bb8d4702a159f34742943af0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-latest-posts-ebb04d83edca666591b8c2ebf9b4b8bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lead-stream-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-less-to-css-378840583bbe122d719ad92f2c75681f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-letsencrypt-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-letsencrypt-ssl-f5a7556a27575fd8d1312f715924210f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-levoslideshow-5088078af30c234ceab9ea2c99baf901.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-levoslideshow-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-levoslideshow-99ce085e8b4d878765e949a7f07f6195.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lightbox-2-9d391b643840d9b9d7ead6e546f2d7b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lightpop-7ceecb4a33f59ca62a5f2246eb0be6e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-like-button-00aa1f64cb2e6c80b8a5546f8e6d1be0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-like-button-d25b2870a2ba1a71b2f08074d958c754.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-like-button-d4b7dbaa3f20ba708731c645b0814aa7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-03550082734f798d8bdd156b8cc8a2c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-6a540f27193664ae64c1c9c67379218b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-a7118940def94872d54ec018ff1c6fc1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-limit-login-attempts-6811a32eecdf5ce987fe449d57d50384.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-limit-login-attempts-b0713874d1e1aea3108651f256578abe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-limit-posts-automatically-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-limits-f3e27a924e055b88af7811293412cc67.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-line-notify-b546805f046a6ab76ad9842bd21444bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-link-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-linkedin-auto-publish-e30e15a9c4996773efb6051e3f90c9c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-links-page-c714b4c448de917cbe9dde73273b4f80.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-links-page-e52be0435f55047670368cd34b580535.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lister-for-amazon-178c8e00fd5bfb5400710e1fa21e320a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lister-for-amazon-6cd99d073813881160ae0f456cc4a754.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lister-for-amazon-fbce84a8ee57be3789217c9b7a75a712.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lister-for-ebay-1691930e201b6c9ce529fab20806ab3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lister-for-ebay-d5ae4878a4d320a4dee3c301e3085c64.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lister-for-ebay-dc87f7ad02889b2fba3b573d8f507b49.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-listings-1732e4e08bdb234132d824677ffb996f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-listings-828d5e38dbe1047738a24a003f9a3134.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-listings-c94bdab6658e87ec5036df9af1fd3f36.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-software-for-wordpress-614cced2da1395e72b78e478d2060077.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-software-for-wordpress-7695d17d2a6f043e2b7067503447a869.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-0afdcc5a66b8604c315ccd15a101d49e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-1006dbdfc9efb098ea5160eab40a333c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-18d01dbad64386da194504c3f5ffe26e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-245c40ef7971bdcc79b4668a4d4b1ccf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-39656d176cfde17eb173675dd34ae675.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-3ae5086ca70170003dc9a3bdb44eba92.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-423d9d2c6628472db1ad6145d184fab1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-5b3f76eca7d765ff7782b4367d966247.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-66eb7f5c446de79e267dceb74a880097.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-74010eb8fa617d9fb39895a55a268c3c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-84da1bcb85beb132b593a5fff336db83.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-875e2588a6c7f11db1b0d18dfa5a3b24.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-ac9a4353796cc2c432e6ec8cb3e235d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-b1af204538776bc3f4caa86c078ec978.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-e810e3355fe67bdcfcad0632d29d1e56.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-pro-5dad5dd2cab63732345a28406c0429ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-chat-support-pro-f4c8de2dff39667b20d17f36ad03ed25.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-live-tv-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-livephp-9088cbacca16ddb298ad417146be5fc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-login-and-logout-redirect-73c1cd9e5bfe098bfeb3d4b81b96f05b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-login-box-1b107fac39fc60c6674fcf9f0d2a0f84.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-login-security-and-history-d5419bc1feddd2eafb9324b9b87684d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-logo-showcase-99abe0055e8aeebf770fa9b05612b4e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-logo-showcase-responsive-slider-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-lytebox-cda07eafd840bbbfe97d5dd1471777f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-bank-7bbbf63e0874145284bff009623a4860.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-catcher-2f15c2e1797d3dce53478e732579afa9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-catcher-3aca48d71f7f1c4be4b57fb19e19bd9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-catcher-6c96ae1b407264caa660411d1fa4575c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-catcher-e5e442420905170833a6af8d927d5a01.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-cfbf975d1c5266eb2e6c08324dadc438.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-log-179315a1d6d0707060d355a5241e7195.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-log-31c57eb5baf7bb0acd957fca651b5df2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-log-74effda90864a740ff398e9c12c52b1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-log-8be88bbbbf187ed081686352f66fd170.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-log-95ff4ff837620d6ea480a2d73422a590.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-log-e4f7324bab65bcd3d88d8e669baede29.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-log-fe1c7e5641b372bf56ee629133d6f4e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-logging-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-logging-642e4603076cf5b4473a13c75fbb4249.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-logging-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-logging-d4ae66d5784ee57fd8bb24dc427e9062.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-logging-e516ec301b4cffad1129ddeea6a2940a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-logging-e597c8ed0035e8185b143a4799be8f2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-smtp-1f2e61c0dd580a01c313ec65237451a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mail-smtp-pro-da10288b29dd37bfe67b8eab58492860.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mailster-6435ffbe89f0f4a16cb704e9095f5d40.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mailto-links-d9f0423766ca387f95476b5cd1e1b1e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mailup-5be3d6220be540ab529a6f616f5316f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mailup-74a3eb8891dcef7e1892db3c005e178d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-aab671eab1f3a35319bc119c20a62b84.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-d9b09bd810ab52f398f0afdd79c897af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-e8d379239814ced6a5f09013cbb811b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-12a42b489a4f41309029bce2b7df59b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-18112388a9914d1cf0c8f86d0f31e148.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-27c270156b5cf78eb4bb31035b7f5db8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-92df025ccfa89a1351393b8f44caea90.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-a8309537878561527873c9aaba1b29f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-c03b6eeac707e2faa28a70a9e28fd5e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-f508bbced58788f18196a525afb794c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-7393cd06bd9f0a8e6b160ee1e40091a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-9a4983ebf76516d5539ccc05a21c897b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-acbdf3cc478f1988c5c3adc520bf6766.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-dc3b48b4dca1bdc6da00b0dd6c2512e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-manutencao-a9cc9d2366f33cd5741768b12deb923f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-map-block-5b50465ae2f78659823d6ff4bd2ffc8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mapa-politico-spain-85d2798dcbad09cd3df8222f6cc3a39d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mapit-76a5d195529e4a00633fd456330950cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-marketing-automations-17e239a9a613785a57f9dff8c47dabbc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-marketing-automations-2d0f997ee92e7b6c06625a4a937305f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-marketing-automations-d18e40088a787bdccb931530c8848277.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-masquerade-923b7799c6c4b8b6606ee152480bc325.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maximum-upload-file-size-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-maximum-upload-file-size-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-media-category-management-5a3ba228c7ef68acd338809eb5946660.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-media-cleaner-ee67de5781e7fd9c2318027f775c66d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-media-folder-1196705650803cf1c8c204bb4b542a25.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-media-folder-2da7a3f2515edfb050506d62d2d86fdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-media-folder-a0b0c399b7514c70fcf0e05e68ca4408.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-media-library-categories-5a62a90392d8e5e62d1e1ad4b9531478.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-media-library-categories-9fd777f73c4ef625b6fdbf9d8363a65e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-media-player-cf07672d5cc5a9d43b461f631786b4cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-megamenu-c6355382690553750aa0f80495721ab6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-00ca2c99ad053400f72b1ad04cedfa49.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-0a288cfd79394a91cc2f2e98f7ebe8f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-7700c6b035beec7a0abef5d3cdd6b1cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-927acdfb36c0f4e522e79fd5612163d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-a980d40221670f484b92312f4acbd125.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-ceb215b10a19ec9d161edd4eed36fac8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-dcbc79daa691cad653de67a9ff1a5707.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-e2f5ffd9a4d18c5b5627131fa4317643.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-members-e3501204b93612b8ff957cf7e1036632.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-membership-398e2e434c59ceafeecf5e603168a0d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-membership-a284426b60f71419209b182f0b3fc61e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-membership-c1fc6421a52e6ac7d9b0f476667cd29a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-memory-da896910a5cacf8279e4d7de14e16a7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-memory-e5755ab6ce28e69bf31d165e7430384a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-menu-cart-3600d02bff1e230933e1bf9df683d80b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-9a466e34216ffe71aad25917ff6bfb32.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-d52eb2dcb52eaf5c45a9c76db66b7765.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-320c57cb813e49326995b9fd67784965.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-388ffda3d201191cb375824a74d92ffc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-407035e57e51b9b24244b7b6677f36c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-412021edf597308d1e073bd0f08f6dda.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-4f95fbf5d542e431aaee4d569011a0a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-6028fbb33888953a639d7f4fdb105b84.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-74e2cca43a241e929e4d02ce42179766.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-a210c90325ac6434534abb97976ad7c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-cd3ec729b30fa6c24f2c8dc5202be75f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-051ffefc51104be6bb17d2b5cf41b941.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-2e08f88f4d646fb37132bf634ea9d86a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-2f2d8b93ad701e19ec6f3207f936eef8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-48db89bfccb085b8a9e9bacdc76c0af1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-8315a66d2bff25e165368a9ba5b2cd91.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-853440dc6a0bac372d49c0a52406c979.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-8f211e542f6f3ea8f0872b9525089564.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-9ba2b29c37ba8aee356eadac5eafa36d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-a77598a8619865ebfa5a440835fd61e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-b140b905bbbe2df2a34bd620d01bfe72.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-b8cc5900239df821d12d0c9f9351444a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-c8739a5f40e6869f84a528bbf32f369f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-c9a67836be647194b958b42b1afed33a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meta-seo-eb91f445c10e82b7c3e98be1062a0e24.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meteor-a24478d45a578be442865b8c295c465f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-meteor-e8d8c624f6e6d23d2dff82c9385b3265.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-microblogs-a4cab622005282169cece09a74ca7822.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-migrate-db-pro-94e62ec82b514bdceccaf12bf9504a39.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-migration-duplicator-0db6e70cdcdc7229b4099d9f0f9133ae.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-migration-duplicator-4b9b30de695a6c7d318c6f418b6450d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-migration-duplicator-766e921c63902196b3dd14a962737125.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-migration-duplicator-9cffec44ea772b6c67672a3ffd4bf0f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-migration-duplicator-beccbd5d983b56da7098c3b6df8c3b57.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-migration-duplicator-f9b95c5df8218e5c27a0db54debfd7c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-miniaudioplayer-4c9bbb5092eaa29d7b825a0537618beb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-miniaudioplayer-c27c7bc4ca057439f5c832171e19b8eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mlm-1d57464ff64efe2d03c6cb93be9a6afe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mlm-7ab1b8001b5218efd4de7d54884624ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mobile-bankid-integration-85ff2c77617a0afcf489782fd73dc851.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mobile-detector-b8f1b94a4c4fb9902f110573ce1ff5a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mobile-detector-f753e4eb4ef42bb2c3d71aa325c61612.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mon-18d17e555e96ada9756147d2b8dcb4f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-monalisa-4a1f8595afbd88494aea9ace0d288d1b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mpdf-587a081cbf30acea89ba24ccbad04bdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mpdf-d805f3809c5645b75249ec0ee72ac4c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-mui-mass-user-input-5efd2ce0ed5c8f6b3ada49f2773bc973.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-multi-store-locator-f8b65cf3e0a27eff31bc4c61ee628d1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-multisite-content-copier-600f23cea45d49c9fbecd578c78ad87f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-multisite-content-copier-f964c84de99e9a1b22168e1a03305b04.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-multisite-content-copier-pro-b01e4229acbf8d04a3ea8a3add02fd51.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-munich-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-munich-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-my-admin-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-nested-pages-1f2c3201ce6430a901ea9b9ce7fb0cee.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-nested-pages-2628ec35fd0d634f503face1acac9f3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-nested-pages-45c1e4dae128391ea2cc462d89ea9873.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-nested-pages-a1585fbfbb722da035628da67638c64a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-nested-pages-a5430dc528533c2edeaccbfbb9028a8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-nested-pages-fa85581f8faec8e54a152a5a0efaf823.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-news-magazine-444a6d6c5748b1105adf9f2574afc368.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-noexternallinks-e8487dc3f356aea666909141340ca69c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-noexternallinks-e9f11c328847b06004cf712b0d79f902.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-not-login-hide-wpnlh-e4874305a11ba506fee5f820a68e7e63.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-notification-bell-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-oer-3eb3affb644d24e715bf8fc2c2551c12.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-offers-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-olivecart-57987a7ef285cce42daf7bbeebe78cfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-open-street-map-a2b96140a75a31f47368cade76c6e421.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-opening-hours-59655d2ccadb8aa0cfd1aeca8138f97d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-opening-hours-acd8ba84e60cbc0f092ddfff82c451e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-opt-in-1045ae974bdd8bcaee8ec5d4a243aff7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-optimize-4393e503b4c5e360e86d4cf75de99b91.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-optimize-e272d49a412192b851a22b514c20a44d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-optin-wheel-411b8509491892139820c81fdaf43572.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-original-media-path-40022e8f0d8dd6d5dda3b842e2bc95ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-page-duplicator-73f67eef9808ee2307cc661b7742b37f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-page-numbers-ff4872dcc815f541fc27c739fcf1dea7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-page-post-widget-clone-f6874af8a1671c63716fd288efc17414.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-page-widget-55f93685840531332a73837cca77e23f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-page-widget-62e712c4c51e2629997a1a286dd08453.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pagebuilder-1b7c0478a7036329e96c3ed903574a31.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pagebuilder-3e7f60a3df49d0f7fb4057d158598ecf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pagebuilder-a43b3bc12796ff1c85d44370263684f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pagebuilder-dcd836cebf0e20586e7baffdfe54c10c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-paginate-2cf1a19662092e1fd3d184af328e1b57.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-paginate-ac056be778ddfca7dda3b1e72c3f8315.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-parsidate-2692648b62c683c1169af33c43d304ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-payeezy-pay-d4e69b9467d19a12ce87ff85410a8c01.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-payment-form-899cd60c14dae78cdc6100d2ac624744.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-payment-form-b1068b6e2a026b74220f30a25a306c1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-paypal-f591ec3fd6349f415ea113a1e0a8f96c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-paytm-pay-0b2d1a45be009b6e70cf642e2a8cf8b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pdf-generator-c703a061b8844fae5d93d775fc4ecbe8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-people-1077c15755f408817e721c74b28ad3a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-performance-score-booster-b7c469773d7593a7dd075aebd86fb19a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-persistent-login-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pexels-free-stock-photos-f9cd598e625ead7b114953b55ded2f31.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-1738a4677acfcf43b6595c38e083bc1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-1a15d3860222a3fd81a5cd2f0cd29cc3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-20a2e4a6290983370284d76170f55741.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-669581ec1a30e7b96468876d795acc3e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-6e313c2d32fa44151bb5398004b93815.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-8ca87aad5255d876a5c1cfa42d199cb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-9cb518fd50dfbf2df48bad0ade9b992b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-b3f583df01b20215cf8c32eded7781af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-b6b6c7434231029039b20df85b5959db.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-album-plus-e0955365088800798455704629f84855.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-effects-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-effects-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-photo-text-slider-50-6068fa535a8253f59a90a4115ac59459.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-php-widget-744495d3ff838bb26ab75ce1cff94317.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-phpmyadmin-extension-2dede50337ae844885c0bf328702828d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-phpmyadmin-extension-8d1c748e2defc5d91fbb1dd267386d44.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-picasa-image-453e6aa482844b66a1b60332d0011a80.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pinterest-automatic-9c4aad914c8baa77edd573a5d1dca1f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pipes-a48d0e7d0d0abab8208c9ac988b86701.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pipes-d7894fe3e27e0eed0959b050f56097d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-piwik-011e9219619a7fcb5d0b0fb47e00200b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-piwik-26274ac2ac485b632b4597df6467189e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-piwik-2cdd87e3f80dc46e464c425f1498ee45.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-piwik-59221c8c4cf4b83ed678f38b12740d87.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-piwik-9872ae4cefad3c4ed3119e4c32d1b891.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-planet-b888730346b1af7ed35cfb04de015b09.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-plotly-2304e691feb866a99a567fd410649f69.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-plotly-9098123c91e037cb8b4722ce5e0246b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-plugin-info-card-25b6bae2090d69c4b65ae56919567a18.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-plugin-lister-7ae4b63767ade919d8f9b4392d05e652.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-plugin-manager-a447458eea9f44bc06114a67289afadc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pocket-urls-d20347ab3694d4969b9a9d128b6ebd42.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-politic-1981b0b53f874fc3ac5cfb1e486c1b8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-poll-65871570265ff3cbf8c9f9629c5ab326.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-poll-b72d7e0205356324b67801ccf623ea08.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-polls-228a265800d06a8158d2945ad50b57f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-polls-72b547593d28ba78083c2d30dcb45b59.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-polls-a90ac74b16b2e57f70d959075904445d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-polls-bc43778c342efbd129c6364212fbe04d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-polls-d279c90e5e616e3125c9a657ba8ab939.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-popup-banners-10b51d35ae6aafbea477ae24a9c22ccc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-popup-banners-92d1ed4c27e6f1a39ae5c39770d54c23.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-popup-builder-aad2940a7ed6f57fa5fd0a2a1f283a4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-popup-builder-c232fc614c70c66e672cbac2a32ca9cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-popups-lite-2aa273895136d445a6cf0ea6a1d06c8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-popups-lite-3f71ab9bea10d44c97baaae5fd797060.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-popups-lite-44f42e89daa3749af5c9d461caa7bbaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-popups-lite-690de1b98dd30a46cb8901aa5c2f16aa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-portfolio-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-author-b3367042bf6f7f08c7f7fe623f66bded.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-author-bdfab040be8b5ddc53b63b2720a5db99.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-author-de2cc205752867abbe773a0b92ad0ea7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-columns-2e27bbe1226fc43e3aceee610de45550.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-comment-rating-872e77979f08b8dfa6cf8411f0e84c8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-disclaimer-1387aa003d8d347fdc448b66fea447f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-frontend-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-modal-8e3b2acb0664262c6a53a39a282fbea3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-page-clone-2d87c0364307edea9fea6b2a2be6834f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-page-clone-477f1ad4dc386cbc51b27ed2633fd23f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-real-time-statistics-67f1d03c366ffc7cf370449f40680bad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-styling-4746a61d808453b3b90542c6699809d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-post-to-pdf-e97d01552bb2ae8d753dbf0013cb0c0b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-postratings-230dca5ad7a4f65f364511571d38f472.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-postratings-421d9d9506623e25232b233cfeaf22ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-postratings-8dec592932911140013173fa65adb3b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-postratings-ac814100e213d264685a18f0bee470c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-posturl-544ee7aee750c4df26fe7f3c5d3e9353.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-postviews-888312a64923f43849174a79d906913e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-power-stats-d2359b1121bed9933888a9df14ebd74e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-powerplaygallery-3fd0f15662f38cc8cf4de2e9cf15e403.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-powerplaygallery-4d6fdc24cec05dab8e1448ebdf64ba23.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-powerplaygallery-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-powerplaygallery-f8194d7ca5455df0340759073541f5a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-prayer-83bea5d4bb17e709cec571f15c9f09ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-prayer-93817db5fd5a790f9a8413665f75bc03.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-prayer-c57cd7bd5b015a60858f3a01ad1d45ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-prayer-fc6f44579727101979a58b50043c9f62.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-print-b73d87f96280b93d84cc00f272e356ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-print-friendly-07ab0ae27a6f3fee8bb775502300d8a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-print-friendly-82ee0ecca0569c5ee6149d011bc22c2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-private-content-plus-13ab88959bcdd9c68f7d9d04453c2d2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-private-content-plus-aed641f4c8c8fbdbffc5591e24cc25c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-private-content-plus-d5107af4decc8fb0ccbe36135deb72d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-private-content-plus-ed06ada3e2d61861fecb8610e5d7a1ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-private-media-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-private-message-f96de744475c9f8a69cb4acf328a0bc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-private-messages-dc7758f91293ce9c92573a1104c733de.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pro-counter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-pro-quiz-f47da71d7fbe6f22fdb13d8b16b739c2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-product-feed-manager-68254971cbcf2fc6d5bd7c51c76b34c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-product-feed-manager-ac3cdb02dfa19f5b0080855ac08f88be.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-product-review-4d1a3458be4ae0555d1a0720658316fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-property-403a3d4815913e613911a54871a0f61d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-property-eece58b4ed3b36911722cf60f06d0f49.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-publications-76cc9ef157cda8ab12c517a7c91088af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-qrcode-me-v-card-800d1ab574434819322506f176feb04a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-18ba5164adc930f4c13bf8eac8771529.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-34686e9b40a6d9c4dcc8e1fbb6d4343b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-480b8a3eac01c8a8ea01d02be8cf6e9e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-f945b2013c9f8db455b1c19cba6e241e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-quick-post-duplicator-10b5f73ced4f4ae8f40389dd6e188b1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-radio-4750f217b4fbd830bf2a4ee2b5c1530d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-radio-785b1c3458487127cc883fbac1f1ef7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-radio-86ac2d003a393175395c9b05a6663062.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-radio-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reactions-lite-0b686c4cb6f413d46dafa7ed933109c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reactions-lite-1fa1c4ce292a4074e0d2a4792b491027.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-realty-0434ab5209741c3f7521537eabd69256.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-realty-d2c57b8ede776b72c978f813e6d0a827.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recall-4d45d2a7dc106d49db836138495ed8c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recall-60df39bb0575c5dbb8ccfec2f18ede40.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recall-8d8383b244607eb18513c4f27a52d173.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recall-c0cb61dd6fecf2d07db617deb2e20095.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recaptcha-9b84dd02ba8c932cd7e6589112f001f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recaptcha-e3d831bb072ff08836a63c6a4ebecea3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recentcomments-7e43f159f02a44d44b4f5f778ba799d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recentcomments-a8f25522ea55ec9a76938298a24a0acc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recentcomments-d9b7779382ec9bca0dc96d41eb9855af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-08ecb188f4c24bff415036a618bb6f62.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-30317bfce905faf2637e9a9df56ecb43.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-348b2d2c08f931f9d2b3643ac2152b3a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-55265bc94a3e60f3cd5f796b692a1dbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-563c86924064bbeed4e8a4af90017e06.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-827537b84b4ae3840c51006c12ccc5df.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-948461229b764fced19a13ef5ba11252.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-96587021500f654fee1593a976493ca2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-c3b5c2246526b047e580623567471684.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-cb50f73b0638afd5cd0d186b2a6577a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-recipe-maker-f594e103526836b64061a1f68427567d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-register-profile-with-shortcode-7ae915288e9c3c74b018a1157e470354.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-register-profile-with-shortcode-e5cd3f1b72f8c188bcce67a3cd5ccf0a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-related-posts-7db34627f1b70dfb15b3a62077ab868f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-relevant-ads-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-relevant-ads-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-remote-site-search-07a16aaf94526ab4a5492ec25d7bc965.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-remote-users-sync-b5b3726a38a0d1a56eeda75879ed92d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-remote-users-sync-be653cd14bcab55a461716f49e0f0156.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-replicate-post-64ddeafe0a6eb1f3dc3db9049ece872d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reply-notify-ad6d214a4db8beee18bddf61121faca2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-report-post-1540a4d1322834c5a338a51354b58ee1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-report-post-b9c578185717d2a2b3d8049789a9a952.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-report-post-fdf3c9a8ce0d028a3ed00c7adbf8cbb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-repost-0e94306a43ae08419eb38c17f3bdf17f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-repost-f62d90a1456165ae9d04c07d4bf69a25.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reroute-email-1c70785f67dd945fd36f027518750446.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reroute-email-20b79e43dd02b60a0996dbe99e7ba439.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reroute-email-ca75f0bb6be077d73d2ab1f9278e0078.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reset-07bd4b69b402b2bb38b733353ad05536.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reset-1ac9ed75dda676d9de3cd3380fd4d32a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reset-83fdf9d48a350c095ff472b1a9a82eb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reset-dc229c244bcfffc7d06d63944e8371c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-menu-56eaa7b8dc455f22f829544599237693.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-photo-gallery-d5756f65fb344b6553377b88f83d5a57.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-preview-9f9f1456664e215602c73448e19f0749.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-recent-post-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-25a9f7730c5842083500e9e166082efc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-892de5c9148c6f8df52be6ed544382d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-bd4c9f634768986dc47827bf4d97837f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-f125bb3227f74edc5c60e8c9d6eb9da3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-testimonials-slider-and-widget-6ee9ba365ca511bfc329f7df63da810e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-2f648ce81ebcdfff75d3b5dc6ad4dbca.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-44dea4f7c7575cbbd8f534048f1c0dce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-568c91e024801d5d2e19e257aa73eeab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-961b204cf44c68d337a8c4abce4e5661.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-b2718ea6f3f6ed667b8cfc7c6db95d2f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-video-gallery-with-lightbox-c3b3583607c5150ae09b547b67030790.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-responsive-video-gallery-with-lightbox-e1d3d085ab54042265af9032b57a352b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rest-api-authentication-c4daa9433506094793f25873e18663b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-restful-db7767ed937dfde97dcfb07b299497ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-retina-2x-575007d168cd026eefe7a606e43b0e70.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-retina-2x-6bed45cc7ffa2c1423965f9f86a13b79.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-retina-2x-ad6eca81b2e556f270b3ae3f5090cf96.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-46456613c7a836ce3b1a8f48d3151f77.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-61b7e681fc2aebd347be4e6d876bf4f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-ed0f9423d4c48dfd65b856931b8ae551.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-roadmap-1c48d6771b0e3d17023908b8bdc75005.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rocket-b300eab2789f0638494228aea0ada3b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-roles-at-registration-0822b2c02c49629a19bf084eb6d8580a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rollback-79ab1b5d546d12b519823b2566724735.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rollback-7a4c9972726e4955d433f6a7b81c1d28.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-aggregator-2565b37cf24425d8b3b9a64e0058d4a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-aggregator-49339be9905399af5760c326a04d9feb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-aggregator-788781eedb2bbfc885e59d651ce4ff66.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-aggregator-7a5699f4eb992769878daf8812d2e5b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-aggregator-b26100fb2d07199c87c48d6d1e20e10e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-aggregator-c9743e9890778c464db472a56cb6fc0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-by-publishers-462fb716ec2f0ec4e2f418a785fb1df8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-by-publishers-74b1a71215563001aea36d2a3bce8f35.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-by-publishers-ee3fe625ab8f88885d07211e8987b8d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-images-2efaa05e7b1e6abe1f42ac71047e9bba.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-multi-importer-7725287d44cd6757cf277fdd17b26ca6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-poster-59933ed8813fc650ac85aae65e91d1d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-retriever-122cd7a43161913d8685a15b660bcb12.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-rss-retriever-9183c93b61003074c2d21915934372a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-s3-693d96d86e403672dd1c5e131a4895d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-s3-smart-upload-00fe1d8fca57ad1440836b41da0ce6fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-safe-search-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-scheduled-posts-49f4f7442b45f88ffafdd0b100d2831c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-scheduled-posts-f11abc39d7b4372ca1d0f7ca1556eb9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-schema-pro-8bdef51e6a9551cb787f034110fc0fe2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-schema-pro-c23d0468fa1aa29e9cff4258e8e5f1b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-schema-pro-e2131dbbacfbe2a2f95adf59d0db7bef.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-school-calendar-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-scrippets-57f5b93dff7110d58cb432e56910af6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-search-filter-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-search-keyword-redirect-f19084b39601e7bc7ba34fa7ad78104e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-0918e7c524803020ebc3787f7788ecb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-64c7c31089552dec4abb3ef175072235.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-896c32b149ebcd3122663a40d0461f18.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-908a2c5a645886182a7c18816c5cda70.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-a5b0543470506882efb8fd3f9daadcc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-dd3770633c5e3f81d160a943bc75a752.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-eacb463d459e2bbbfb442e19685437c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-f0b0a230f7453036382fc231a8391538.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-b55e1b34aba62c4a9df9aec2a27f5d8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-dd3770633c5e3f81d160a943bc75a752.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-f0b0a230f7453036382fc231a8391538.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-f254c1351f2a36bee58dc6381cb8f93e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-fb8070a3ea093b2b03c1a0de45c253ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-hardening-02cf6d254ae1f4fae318bf77bab478be.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-hardening-4db11f352c6c8a3ad49ea7bd3d7d466b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-pro-8e950dd64eb760b48f921b3528ca5c9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-questions-5eaff96b7044868ab9324ffea89f33a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-security-scan-c9a2376716cf70bca17532d4183c4633.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sendfox-492dc981351dd6fd004e149962bdd870.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sentry-d34327d1e992d219d0a1381df1c090fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seo-keyword-optimizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seo-keyword-optimizer-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seo-redirect-301-0da88a23adab8991ac9273c6a18e2665.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seo-tags-d9e051e1f4b85b4ae8c0ea3e691890cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seo-tdk-faf3d9f40dc5bc77ef5ec90bb9977185.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seopress-13e2a2185dde6af6bd269d22e183dd35.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seopress-c6c1e0bf86c779c9f71689d63880acf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seopress-e3109d7817fd480896a3a3bc464556af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seopress-fa9cf150c44f8d9dc935bb57af5fe0c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-seopress-fb48c2712fa8a78f7a012c1644582d5a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-server-stats-47415a21e09795154df1ff35281901c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-server-stats-be1ae498f783b881934c37ce01f5e849.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ses-13e3b44160360e3746c78b8d29452ac0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ses-e6c4489ab4760cc2610080b31e1c8d78.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-setup-wizard-c10fda9bfdd3663d875e2a0fc2207f2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shamsi-26e6e5cc3851b03fa772529952303fc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shamsi-4a71f65ecef18d04fe003f6a65b7d9e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shamsi-738fbfc3eb4f88850a59e7c7149f1534.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-share-buttons-analytics-by-getsocial-28f21eddf2463cba2cb6b77e1419e5f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shieldon-61c8d3fe6528b22ae362e184d779fcaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shop-original-9bf86f14d92b1788e3ded94564f9e0cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shop-original-a0116eeab00e009fd4fa3d22d8f45407.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shop-original-b4f93738fd70e3a8da5c44b9944ae088.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shopping-cart-1033fcda6639f4daeff0c508d8a82d3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shortcode-485c8e5c2bb61a87b483e8c051daba67.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shoutbox-live-chat-adaa6144e39af9e742e7ba711c4a036d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-shoutbox-live-chat-c35613a2745b5628f153e1858939c22a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-show-posts-10f63d314e85015ce49d2337fc605c93.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-show-posts-353fc9ffdc08426a0ffe5e2540b9087b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-show-posts-d8e5ca43d4d7693416e241c26cbea0ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-showhide-d3ed4033e1c7b404f15d64bf377cadc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-booking-calendar-839915408da31966610f43b45f853f1c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-booking-calendar-bac170dcd3835d8bbf7c00e58b6af261.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-events-9bd31a69895b603beba548b13ee3a848.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-firewall-380d905325ab5069c99a7e476a1a4f89.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-firewall-3f0faa20d6a05156c4a1c46312d50cf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-firewall-90c7f750404de09cdcd8955a310ab0ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-firewall-c9d4c4f2e6258505d4c75758afeb7ff1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-firewall-ce7b15ad921b8740cd4f98bd5c07c031.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-galleries-49548450e8e603c888246b4324b9abfb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-0ec33f0610c3b4ae6a2adacc48ffade7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-1697fb18453f32ca7e1c0790f12f9bda.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-56ca15387b80b4855859eb683a9c79c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-be653a8d2bee2421f88f0e6d66ccc0f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-login-registration-plugin-3019f115da4ce05058864e5dcdcaacab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-post-view-170b4d1a9ba8f9c16cc0bc165c8fd973.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simple-spreadsheet-fetcher-for-google-0df69cb46add8b6c0a7b0f63ee7a53a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-simplemail-bdefbe0337f0d8136e413e9977ce9dce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-site-protect-cd4b20c0b028ccb6a7d2b5c1ffeba918.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-site-protector-edb0b1b70571f2dd40f46a09b0477a9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sitemap-page-f2a1201d248d9810b0b0d58bf8df9f81.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slick-slider-and-image-carousel-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-04e23ac1b6365010d31ca471e4c11f32.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-3171c38b67df36d18560a0a3bce363f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-323a2528ecc021abe5c2c6bd363f0d32.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-423f90da633eb79297c96d8f0abf8be5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-49bd4bae2777384dde2f9b06bf68d410.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-597e668e79f61dad3842fcd6906ce6f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-64166b21a8975f062b52f4886bce7163.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-9024f709636fd6877d65d2f3b4c1635e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-971075c7b5684cf126577f8a88b91254.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-9ab73d918da016b8bea0197df7034889.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-b3e91448e22115e9d095b2a1e488e5df.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-c568408b66270ee8858beb6b5337a826.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-d15c506a6326f67745ff7867b3d43cbf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-e97cf38eec743d7e32a9d6f2848bc70b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-ex-2e45916daba26c04ce6c83d3b1938df3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-f260533813247786590cffbf5861c8f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-f800126fa2e8457384feccc64971626b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-slimstat-f8bccfc95e7537d4400b0b6737b24e5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-contracts-221016fc8948bfb930fdcdca33f79836.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-crm-invoices-free-ee95b664445938e62cfbf4d8ed5ffe44.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-editor-475ba1df38c75381825efc84071f7c9f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-export-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-import-7d8c7a6621cd6acf11eab3f4d618152a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-import-ba1778641ae55d3040d21a76affd5b00.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-import-ccfe47d5faf99f962197429daac2a562.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-import-ed2e7de8683ce4c367d3321852d1f7db.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smart-preloader-19694fc6eba31e53a1ac14bdaf6f6028.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smiley-77e2d5337a10d2b6f8dfe7d3c316ea63.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smiley-ae9135d7bf1c7296c12f3a734a25c4bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-2a19a88ce4a92a9c8fbf2df45764b32f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-2eac9220f1c0d85aff9cba25bec21ed8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-604205ec49f025926385a1b0eaceae3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-69342488f4f3aabf705547384317c745.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-7216efc8a277e31e7bc37bcee5ad9a4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-84f2aef7f11acfd2b73b896d3ef7cd04.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-9026afc07d244baf4060b61e93a40775.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-a21f47d4523bdd1432738c19a9cc15fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-e1ececf98f98b05b8b9294fdacec5d2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-f21ce23a89308829a19c21d66925ddd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sms-f7c37966d32c6dbab8ccdc2a7eb8df23.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smtp-4cb0701b6db05c073e2060623ec2f204.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smushit-2b972fb379a3ef9946c652caaa66df2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smushit-3baba46cc5a286838f8fb9a60b0d6094.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smushit-607f1baa27192c23513225845ec25b9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-smushit-7a3ab4b4d26a299b96225464ccb1d356.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-0f9348eac96a42ea06d72213f997cb8e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-bookmark-menu-8682c5fbeed29195fc3c6e36608df123.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-bookmarking-light-7e1c6a231bffdfe14a3a2ce673d73608.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-bookmarking-light-df9c64a17ee3d013ca8c6b78de44f86b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-buttons-7b54be45a2f07bfa9d249dae96b2b8a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-f8238c64411cb9dd2c01251b0ae0655a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-feed-3799bad4858d7913f9586ea4576ffdaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-invitations-4abec42ea1e0860b972b9757ce0cdb30.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-sharing-bde0dbf50dee086cf6c52ee659134929.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-widget-78c7195ce152d6d5bdeab7f38e20a1db.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-social-widget-877e1c3b42118075385c29c980e6d4e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-socializer-9c5f430746b739fbae6902b53c806e7a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-songbook-04e0aa1c786990263905d4523aa6fa2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-soononline-page-52e5de8cae8585e04365085f31752913.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sort-order-a561a450756c85ce3eedf88a4f646811.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-source-control-4c18709c2b499b4e0a77ed40ef54cc76.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-spamfree-3506e96eaa45f558b87763e6782644a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-special-textboxes-1e506d7d0a79883a044afbbb48ac382a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-special-textboxes-e6b578c644b8dec6cfd9f0e734409896.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-spell-check-1775b7a8bc86b1994bca20dc9c550675.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-spell-check-98dad0bdb32669bad2542d8ed31dc9ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-spell-check-b804d82967d372f1edcb1ab799e70f37.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-spell-check-d87dde15977bcc3d1ce01f496b79774b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-spell-check-fc588495329f4334ef4deb847bcc6bbe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-spid-italia-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-splashing-images-3ea0e1871dec257bfd7cde582f2ade2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-splashing-images-8a665769e5dbc54922bf72bb281bcb8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sponsors-6e76234b4d1dbafb645996466faffb64.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sponsors-dfaf8f13c7a5730a90b10c23bd27623b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-spreadplugin-70f0c41d6aa67cd78e36b9d8660c315e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-staging-3d60381961999c332401ff6c0d1b2fcd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-staging-491b3ba699d00a68d515de73a1bb974a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-staging-84e23826180e38f8c23713de5476118f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-staging-cb4f2a317f426735af573c79456925c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-staging-f1e3da63f99b2cc6fa2a68c3535839bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-staging-pro-84e23826180e38f8c23713de5476118f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-staging-pro-cb4f2a317f426735af573c79456925c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-staging-pro-f1e3da63f99b2cc6fa2a68c3535839bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stateless-1aa8a227283e43da0f41a656224571d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stateless-99a5656c2d3d84a74af5b274cf1cca3f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-077764df60648b9aef2b2fc6c9e65d50.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-089f9d6847e0d3965eee292fee99d926.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-0ec38a5c1835d15197b4df3637b60941.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-1510080b156a41f0be0cec87e4c71c9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-1c8db3326f7e7fbd2267d1b19822a630.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-268f3c8028825c46a53ec35cc9415801.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-2a14d3fb0a465f1cdb9f64f93f69aedd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-2fefd80a39593e8b391e705011e7dfb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-3465e5292d73a551eb6c16bb4b06a27c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-3a4442e88172a0a47b7f5df765c70f36.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-402d7d7b6c58cc7a536b0d43e9d4a1fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-419ac020ad7416a34796c2fb1e817b8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-4533ca9d47b3b4f7b077cc893cacad61.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-4ab5b9d0741d36fdeb0d5b8e06672d39.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-4c0f6a08d37bb188811061a17ff42cfa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-50c234504ff6b18931188a11546b06e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-5a1aec8bb448585f2b3947c8d2f43d52.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-5c2247e17c791b6fdfbffdac85a13840.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-5cdc77b83509c234be9fd2621b4d50a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-6600d372243624aa436749b499ef6260.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-84d819f2c5dbd24e5ca9102c42b9b228.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-98db2564f4a4bc79566064c237408008.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-99d2db479f6570516dd28aa787f58742.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-b396ad7ddae66e7db7a5d4c1747eea0d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-c6fa1f77c447ad70ead1d031770de1e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-c7e70d0a47cc47b927ca88ef25cbbeb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-cf0e8508a150a92dcb38be8ebc42b5eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-d323b2ee541571a78879d377867cb57c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-e9a7d43315eb08a5c15f9831030945e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-f2b175b82a16e321f13c2528d80eed13.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-fba6fe4ba924ddd9440214f83e497b37.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-statistics-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-422debdfe258e02ddb505987826a2ea3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-dashboard-cca20bceb29d548b71fff2c6b265d9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-manager-1085089f2339a1b75325ca6667c1e32b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-manager-1be66c0880c6c44fa345977c011d45e4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-manager-6d7c8242c157e79033d5cce1ebd197e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-manager-784bab21dbff631c360386613afa3af2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-manager-8bca0401c2687aab215b4ddd44231c26.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-manager-933664bac0ba7d546ec800941231f6f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stats-manager-a3d20ed9da7c57fc778f0d01bfbac322.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-sticky-social-a15cdcee1d81fbf41320a2105863ebbb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stripe-checkout-23d71c471ed57b8e6edb42812714c4cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stripe-checkout-8a4ffb5cbc3cc45c48f96fc0d6e8fdac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stripe-checkout-deed3fa156af1c41e337b8275419b59f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stripe-donation-538423ca9f2308dfd7db2d7106fab896.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-stripe-donation-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-structured-data-schema-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-structuring-markup-d5d53242307fbcb60f1d07b6a75cb319.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-subscribe-a4b9301f609713ae947856e0a785959d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-subtitle-8e8d26048a256bd2a6af10c450c287bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-0063bb4beaa99595ff7d4e40026fb686.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-0a730b29011862fa99f3ba28ddcb0a8c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-3a746d0bb8a8a4bacac9da6a17fd5b77.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-5536ba6a87acebd391c60f6bc2e48bf9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-578845e46f5e10ee10237d1397f1fce9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-725f6537c801584f5af7c0692e2d6c4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-a4d897fcad2378851d5e9f3438f9cdff.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-ab30f037d37814a0114fbff89d19c5f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-afeb8327fb03504a0b5ac79fd5a442f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-c29571f39de26e98c4a31202523c55d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-d80662422b2866b3d65a5445924467ed.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-cache-fce354233cc8042e718d5365b3a58e08.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-minify-83ffcb1b7b93055d3871683fd17b0c51.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-super-popup-39af241a774d2dcd3cc32b6204b6cb7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-385055003f5f62851bef6489ef8b74ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-43205c5c452a1868decf3021c2397818.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-45e53acb580bbd675bfc6be68ad774dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-497a0a1ea8afe0e920601e57f5c6ccaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-4fb356daa205fa86efebf393915d0c50.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-8775037057b715229697772ba91f4bf3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-8c62c79ac1c1ebf901388664001a676c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-9ffc56b5ea5f6b924435376642f18ea0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-d69b023495447f633ec6d9d561e7345f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-e87da4fdaddc8c3f88dc163d8c30bc5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-f30cbcc00e52a547df9af466cf2eeb9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-fac707dbaf41d85badb955071bceca40.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-survey-and-poll-7aeb0cb02f45fcefa48994c17b9a07f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-survey-and-quiz-tool-19c5c13179457ac1c8bd83d2fa6c9156.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-survey-and-quiz-tool-fe7166fce08ea1c027bfc2808eb6d8de.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-survey-plus-e9cbfa821e4a40c5bf6ec29f2c85944c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-svg-images-d123d567f469bf81fa1efe0cec4fc6a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-swimteam-99900192dbf1fe9dc977df0b62f5f3df.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-2fec5b54bae57b8457c08f84660fdcc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-491436cd325d5b03202c1b421dcad671.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-4ae9af0b470e9693506c7f0dea29cf9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-8339317d8346b6724b17c27a89e2d93a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-94c6416d0acf4ef5543b79e97739f29b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-ab05d89891e41c4ee487b45fc002d7f7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-ae07dd3ec22029a67416995c9e379fb8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-ea4a5a60afde85ede6fced3685c1e946.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-f25290eae54007b679e22d13b90a23ce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-f66731d5fdc6cfd1b64d52850c4933f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-f6896d23342ecbcbdbcbfcb5cd72746c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-pro-22fdef306e2010977a36342bab3a6db5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-symposium-pro-e1a78698f63c6c67c8d3c4fb4ad0041f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-syntax-2f32fe11ebe5c9f4865c13025a6e4323.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-t-wap-9296439439a688a4e97beee133155172.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-table-a6d8f41f2ddaf46a5ebf99480a45e53f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-table-builder-995599fd4bfe995b20d11fbb5655b003.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-table-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-table-builder-fe0115e4206583520304b505b1843190.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-table-cc04ccc2cdbcd0bde6cfa02b200848c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-table-manager-63379065ec53581cef23820054e2a064.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-table-reloaded-4fd8626c11bff94fd8a393ce1bb61f0e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-table-reloaded-c5db9aebd1fc40e9e4c7b7eca92c3a88.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-taxonomy-import-ea4dc9da45a9f3810a9a2f98b5102871.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-team-manager-092e64b42de134fb4233d6bec85b9415.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-team-showcase-and-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tell-a-friend-popup-form-98b6ebee95a026d40c782ddad544fd4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tell-a-friend-popup-form-d4c59ee10654dc665fe7870643db894a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-terms-popup-d03335b5fcf3342ce30e3d6994089bf1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-testimonial-with-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-testimonials-b810e04fd2ee9ba72626a776c33f0a7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-testing-23d65a0c7f78efb0a00d9004db77bb73.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-testing-a2c4b877b0651ff620e8169263705757.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ticket-2335d22fc63434a5bcaa426b8fe660ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ticket-62dc43c109e10a4fb2083be6c80b9766.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ticket-96b4fb44cfb3ecbb2e1732d4d6ba46bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tiles-b470f5de6fb2ae7a347b8e6eaf7d8ee9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tiles-bb37f5b838caa5657fedd0a448ebd7d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tiles-d83c363445764249cee1964637302b09.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-time-capsule-09442a8e62653817975163ce52e15dd6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-time-capsule-3a16571e5ca596c6b7dc35af4b36d41d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-099c9bac2b6d7ddf1f9ecc25ace0905e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-1b5cbc1452a8c85b5da51d915487aec1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-23b8ee7d3cf1c8b343f01dee0e6b0127.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-35d905a17c07bb22f6bef2c153cb7c2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-b9b9aa6a14a97f87b3f16ec3dcb05759.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-ba2fa23f53107ae20224ebf362890e0c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-timed-popup-5abf4f5c282834f3798f994f3f36892f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-timed-popup-db2fb4ed164af1282f62f44a0c0e168a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tmkm-amazon-b1af016f9e6a13ef862b57d6918f5436.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-to-buffer-95f254edf062c496895c196beac952e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-to-hootsuite-ed03689d193897df0f01e218797bc0ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-to-twitter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-todo-0c05bed3e63ebe0076e41774e5d167dd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tools-divi-blog-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tools-divi-product-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tools-gravity-forms-divi-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-top-news-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-topbar-08fad01812fb757e5dc8ffa5260888ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-topbar-4813d0bc8d38f259871443d57dcbdad8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-topbar-633e46af2038cc804c4d8333e35d9bb7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-topbar-808f401d9d8c5d86d169e876e53df971.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-total-hacks-f6fedef4900f687723635382ff2bb4d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tradingview-28c3e191fb5a4aac43fb323a1cacb211.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-translitera-1398c704e82e0c99d9df5d75e0d38bc0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-travel-60704cf340adf2f27bf6eb359b29de1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-travel-b8daa06004410466af99c0f3caa27fee.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-travel-engine-0345a4f0aab13c10753508309e5ccf34.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-travel-engine-12373fb4bdec1cf1197ea716e420bdce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-travel-engine-615ecebdae8d81f4fc482834631b0455.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-travel-engine-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-travel-engine-f6c6555824d98b71401c19c502cb055d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-trending-post-slider-and-widget-4c44757f9cbb823ed3a472ca5e2ff612.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-trending-post-slider-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tripadvisor-review-slider-5aea692cc96187a31807c0f2f26416eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-tripadvisor-review-slider-60704a9704a6bd75205a7bd8179ee4be.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ttisbdir-d9ebf3668fe7cefc2f8b63111d50df87.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-twilio-core-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-twitter-feed-455782a485d876c2acfcbf2a3f64d156.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-twitter-mega-fan-box-f762f226f7d0453e8c9973d68200bc39.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ulike-18de9e095474a950fd157d62f9dc2e8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ulike-4082ebaabfc2d3e63cea9e5b73f5105a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ulike-44f7bceac9641de69745cf2de93af035.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ulike-5e4d2604a5e90cd0dc912e39171976ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ulike-9047e8467f610de62edfbde349b606d7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ulike-bd4d77259e44439674b77141abd7a906.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ulike-dea805289f838218c2f4999e6fa41c84.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-0d112b75baa32165ac17ae118d62fed2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-51b67c232457e0e4e3e29917fed2f232.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-592a630a84a40228131a6018242fc7c7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-72bc0780c4316abe13ceb4d45308b845.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-75438814e26aeaea61aafcd29b551852.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-7705126a4ed4d1dc1d9561088cab0d7f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-87ab1df12e024103ce206734007bad62.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-9112916c5852d2f0b814be06e90dc90b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-944848224aa29d59185411875e6e7a83.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-ac3eeb7507bcafd357b4a7e25611dbcc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-be9c6bd76ef257817f6a2776deaaac06.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-c5aaff2cbf4515e9a35f03f837f2957f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-c7addb8e32d754a1c27b6eb5611849e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-dc21ebc00161a8071a291b6ff6e22872.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-e5b4ec8d38e3122f17a3232664bd3572.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-e9ce7b3589ea1d2e769d3fe233efa510.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-ef92d81c5e504ad1e37f94f452c8477f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-4abbb6efa9b6eb6c9ea1daf1a46873cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-d7975313aa0a75118cad6d46dc36f4d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-fc176b004d2c6f19188839a3973c1a4d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-exporter-bcf7bbddbe5644610b151dc0fbb630e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-exporter-c50d345162d88814f557da562004033c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-exporter-df373c772cbef38a246093f173c5b45a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-exporter-e989541539b3897cd4ab2d9eb3394079.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-recipe-1e6683ba97d940c27fa31053738ff471.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-review-101443664a3de2bb124cd3553eeabe4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-review-60ae23854ab0f767b1c82b0fb6a8dc96.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-review-7ec860262e0c4326c23d456dc0dfb1da.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-review-86e49b910c876d1cc23d6f192f89fdb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-review-be633c3be5c6aae5c5d02b60c8c542b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-review-cc90e11a79b5063f7474d47d11615e6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultimate-review-f59ad0e4ed3c2f1220e9486cbde45cae.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-ultra-simple-paypal-shopping-cart-6ee5c39e29212bcfe2590b9e64dd32ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-unique-article-header-image-b96d233c9f831b3a15126c8efb4195dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-upg-b03939b1629e023f1100df8dea055a3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-upload-restriction-451bef3a18327362fa560f933f5185ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-upload-restriction-5a577e1325bef2936221483c67cddb03.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-upload-restriction-f55c5d00698b3df2b8933d7fd6999c2a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-1a67fea2fb785d012349551999e163de.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-873b35008af518fb3d54c42d47368243.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-0698a66e8bb0aa2a8b088a7a1889cbc2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-0e94d67e78f08a20056789a0d440afe2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-1f71e71cd24bceed84937a152a603cb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-3eb275ee591fa0c16b66f277e10e13bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-48b606f51693dab11522b09034d3ae96.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-51b25af2629d0400d7625bb870546310.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-6281ccf1cb45a0f040d0e2c858dca63e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-6587cf615ade25a9efae204930a519bd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-6819e71a564d878e4f4419dfc409235b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-72031d703636f4d374acfec2037f647b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-7433993cea900124b0f7230cf232b44d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-771fb956baaf0127618e8cf00b66b399.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-77904fe78351f83bbdf488cb644ca3d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-813e33d3439eeca37bb846e820e1b423.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-82bdc31754953bb5cbc55f18a69f9401.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-88e8a642963113f357e180145695e08e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-90145687b353ad4682e8d470b00e07e1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-93365cd3a26ee2a497f31876bb4917f2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-9e91fef8c5a09e4e777921aa54a9f471.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-a51251f0d703aa8b0485bf4eda435396.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-b376ae9eb5e73985c7b2db36dc58f72f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-b67db9ae21f25fb045ea60943b5dc06e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-c25b123faba0bdec0e1756161a7f2a1e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-c396441598767a6e09e79d93045681a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-ce05c14849e5f32e89c54867b5580301.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-d60068516760d7fad3a37219e7d9a9f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-d69cccda2f91ca5cf933845a336f8818.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-ea7c82866444834be834917feb8c07e7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-avatar-faa5c662684f3e34d87e4c432d1f9f4a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-control-833c717ddaa425412e5078aad2dee670.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-dcecbe3ad598b0f09d573e5ce1408664.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-frontend-009b7c3c01cbc1b8e5b1583fe598205f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-frontend-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-frontend-2b0505dcb148063bd28b62fb8d1236a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-frontend-36566c3afb06b969f751eee41300c71b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-frontend-52f719767f15ee080cb75a30bc027c64.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-frontend-878f413ec190d0a95a0db0404871c06a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-frontend-9cdff4661ff94d9ebac19d8fc5548ae6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-frontend-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-groups-bf634e73fd86b893cfe39f853485f27b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-manager-5acef1bfe4bd1454c852e9b74429a91a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-manager-966b6ace296100d0ad47e45751a9a6b6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-merger-7f2ad53d025d64620bae59b467d70f5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-merger-9e9c8555eaf480676d3bf05dbd493869.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-merger-f267d62c47f700236f07eb0616a44f03.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-profile-avatar-8d7a863f5c4efdd21d67e64b56b84820.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-profile-avatar-af96d1868fb4ef94535942e6a7a96e89.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-profile-avatar-ec4121cea31885fa26a199486b7f74e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-user-switch-e3973fedf7a8f63d43b3386884883485.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-useronline-5b8cbfd6e3ba79c4725fe838c412c514.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-useronline-6232cffe5a9c5f7164bab7ade4dfa253.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-useronline-669b73ac27d820ad91a32920ca859ce3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-useronline-7db35c118cdf678977312aec08d43ff0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-users-disable-453fdd29f3b3ed3425776068af53e39d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-users-exporter-5709251856e505a66ad635cfb702132a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-users-media-1c4626b1b3d1dd0c219d11001b424f9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-users-media-6c042e8ea6605a500a8eb10aee943be3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vault-adc5003f671700d129ab7c75b33ee75d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vertical-image-slider-1c782b4e649e4631f30e49b11990c278.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vertical-image-slider-9ef0672874cd901f6cd102e8cb391c48.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vertical-image-slider-ea2ac4bbba26e325b5bfe41be94a548c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vertical-image-slider-edc2879e6dbbc4290d65d5576c4e456b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-video-gallery-free-259e85ddeb38f519130917626241cfb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-video-lightbox-92e1a581ed538c56c551dca01e319f17.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-video-lightbox-9a15f5067a143fbe0852c7999a453016.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-video-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-video-lightbox-d27fa19d4b96ffbe2e62694bb7f786a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-video-lightbox-ea22f32ac37f9f8e0f263b4584b31b1a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-video-lightbox-f81f2c3fb0fd545df0470702817f5fe2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vipergb-f5789b694dfc2fa041ad362aac79382e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vipergb-fe07dbc2056b4c877acab0ca5ff47ac2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-visited-countries-reloaded-4a0f27da648b505730f70f317974fdf7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-visual-slidebox-builder-1302cc789091d34c6db79147cc295acd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vk-82a078e3bdcdcaf8541a885f22c4a7a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-voting-contest-671933c31cfdf22d6690b9521e0d209c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-vr-view-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-webinarsystem-fafafb2a28dce19928fc435ec7cb0821.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-whatsapp-15be6de4677a81d9742115b7d4dbf93c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-whatsapp-45fa634ab986eb98d5523af1f02322fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-whatsapp-50ffb87c6ba7528dcf0d0be367e8a965.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-whatsapp-b8a0ef29774cb506ae49e9736f363d94.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-whatsapp-chat-a04496fc12c107641a2dfaedc56869ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-whois-domain-a66081067407b18cb9328a87caf935e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-whydonate-b4434ce76a215860884d76b7a0613c9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-woo-commerce-sync-for-g-sheet-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-woocommerce-quickbooks-06af3faa39139877126963434919c510.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-woocommerce-quickbooks-2f31a15bf76b537432656c32ac9543f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-word-count-12dbefa5509a29120cd218ac3cfa3bd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-word-count-7fe1343755ae3216e2612ce9dec35f72.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-worthy-41b9f790801ad7eb3878c73ca1b86fd1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-yelp-review-slider-aea7c598ba9d4fa4ffd8fc15ef6dd40c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-youtube-live-72dd99a1f42299b6be0b974a6a37581e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-youtube-live-ed930301ff6966bb2b42fba1c213a244.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-youtube-lyte-762212510e78e95a2afd8767337992cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp-zillow-review-slider-fd55f9f1199bb3c6e4b47c897716c4d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp125-498ee45b8c7fc3083e30dce9b4fdf901.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp125-4fb52fd64080462536a5af2ab82cbace.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp24-domain-check-d62c21a080a1bd7668ca5e7c3c2401ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp2android-turn-wp-site-into-android-app-742c9543d814556f22bc231e7b11cfdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp2leads-867cda99b5370418b92599a3b962874f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp2syslog-648a83746134b316901bad2fa3ef15ab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_estimation_form-d691c077b0b5b8af36c29715d058c65d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_estimation_form-fa29e08afa0977392a72c8db3f79a464.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokbox-2942494a90a5b05bbe3fa65ad3543d68.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokbox-502a8b74aaac2ce3e991032bf3befa89.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokbox-574dc34d30f91def859e09b0a356d889.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokbox-88e8ba621a8292f361dd4b3feafab680.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokbox-9f14f890fac2e72907737fa43d9ecccc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokbox-cd0ec18ee2e9c7997945ee9a46aad6fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokbox-d6f8ecce18e666922944e07fee064cee.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokintroscroller-597c6e67a31af6c6a7a2d601240421fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokintroscroller-7567bf84b12ab943cd6e85c03bb96456.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokintroscroller-aac4e5cdebf3c4a9846a05088dd727df.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokintroscroller-c02ce6b402a9605654d5b549b0907636.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokintroscroller-c818bb92a63c04284d6553cc7b039f4e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokmicronews-7c6d29a3909e213adc94d309653788e0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_roknewspager-3e0f0262584f8c40d73a496ea910a6ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_roknewspager-3e96a83f9d494e9bb04654bc2cf2b35d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_roknewspager-72ebb65d1fa3b6166c7e5d318376e5b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_roknewspager-bf849da6762c8d33269fd51d7387923f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_roknewspager-fa459b52ecf85365dc55ab67da949392.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokstories-0f9befacf85fe32f94dfe927ef9fdeab.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokstories-1ef0cef9578e2e2ff5a620bc5688bfde.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokstories-3a9858a70aad10ad34f34258734286d8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokstories-bd3c8934fd0962d780c7ee3f1bf2f569.yaml create mode 100644 nuclei-templates/cve-less/plugins/wp_rokstories-eefb6b80498f7d564bf268d183ca0c4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpagecontact-7d9cfe7c7d057a8bbf5fcb3c72a54c2b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpappninja-5e80d211739bf78fc6d29ff73646a991.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpappninja-6481182e7ac4b130cac34d43758d1847.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpappninja-f7b23b7f219bdfa01165ca96135e1423.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpaudio-mp3-player-75529ea91935af94487230f89ef485d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpb-advanced-faq-ea35e08ef79a30cf67846c992e562b69.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpb-show-core-27aee4f01d78d059f9dfc206e065e8b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpb-show-core-72aca1ce30687d819e7bbef9469c5435.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpb-show-core-7f6904f57576a4004d7574ed67ed80fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpb-show-core-a601da5135d3caac4f0c675dffcf2dc4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpb-show-core-e005bf53dd0cb1727a65fdd723c2b325.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpb-show-core-f27c27a0d0d7414568ced2d665d44341.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpbenchmark-5950b11bfaba8d27fdadd77f829d5bd8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpbits-addons-for-elementor-23e0e7010272bc0edbef97452d9c2437.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpbits-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpbook-596940e1ffaab74a13bdb327bf203eca.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpbrutalai-131875d333b38df6cd9a906f0f1d6d15.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpbrutalai-24f75a43b0feb32392540a8e35cfe74d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpbrutalai-55c5d66fcb1a0e14740f101ab90eeba9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpbulky-wp-bulk-edit-post-types-e83a61f4951a190bf506663021152379.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpc-badge-management-0c0c3155e7f5976c6ad290b0d35fa570.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpc-composite-products-7d701d3a30fca3143559ca73fdb370ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpc-grouped-product-5207af68b5cb6f829d0bffea5881c5d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcal-8e0c44401a0d94704f78e1b86fc33007.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcalc-8c686690daafe251c11d3b5105b46fb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcargo-1a30a24dd5f7f3d1429055cabcbadceb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcargo-db32a0bf7f699c5e4cc79b9b16676c96.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcargo-f0b2493ebe50f27c282dd108348c8532.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcb-4295379b4ef5affb647e77f938ae4ec4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-0446faf7e8a09fe554612052c4885eba.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-1b89c40965836bd2b2d15087fcdb7314.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-31ee70bfe05643b60268fd1099915dd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-42471f956508e099a58e2e33212c947e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-7cb2e46e237585083f0f410d32da724a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-8eae6b3d481165727afe77f464d11a2d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-981460190387e68d2f348e5da885ce72.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-c6f31211c94f2b3281ba219f5092b473.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcf7-redirect-fc89ed1d43552a7a477f16e3ec9d6e29.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcodefactory-helper-e0c846e88f45df5b86f82a30f1ef58f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcommenttwit-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpcomplete-22285771e4513b7b2557db1a144305fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-0c5b7f509db51c1a7230bd37febd24a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-19cf3f1ecae01908df4ff2c886d4fa04.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-1cf3419f9a5e9bc6544a37dc3d117609.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-23d1479acb7980e0e80c8871beec9664.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-25ab8b4cfcb0262dc70ad0a958834bfd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-3df29a28a26a7ffb43fd457831c6ecb6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-46151945d00d6bf25de490ff58da7c2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-597ddaaf7d3e092f9fab20618eafe4bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-60aa5e34343915a312cec2a9e0258902.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-63badef136741f64fed4a6df28e08497.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-983af3d35ec99acfdee458670c0dbf30.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-bda023c028e1312df3faada5184e3051.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-bf60bab5b44140ba04d1559cd2178f30.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdatatables-f804d8bbf28112a85600c922c4860868.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdbspringclean-a5e440b48c52ba08f10c05d92c40559d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdeepl-8452e21745012f33387aa8675156e84d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdeepl-cc7c61101245515951b3119b10be8047.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdeepl-e18f5ca4b5b5eca3a99631f697d0e3f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-2af353880436693fc35e39cf38c13b8a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-802460476421cb6c2e180a48c3796054.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-cfda816b6240f8a3b82f71453a31052b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-169725f2f4440d7e4d2c8758f176453b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-23de0bb4163d3b6bba768143cf2dcf96.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-4885793b2807286a2196897535bf89a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-4b446531318d71c375cbec3251c138e5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-504a39994c84bd2792f780a53fd144b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-6bec264de722325d8055d26873b10d23.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-85863960848d10abf7509addf7ced106.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-b5f02e86b0a4e22a4260a76da5ba5c23.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-de6c40221b62e856a02b07f7a8b63ef2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdirectorykit-f5cbed8041a7afd2170e85e7e9cafc79.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-0bc93e8d9149869cc1871c88dbbfb381.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-16a0db053a94923b7846b57810e1f6c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-1ed3919ab7a486f4e9a15463ad8bff96.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-223865afe5d53909b5b1a1c4a2e94a6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-51bab80f0c546820e2f032bc9393b40e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-5a55693edc24427d1f47532bb94de1b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-6c13f07e879053414ff6baeb7933d2d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-6fc4af928f6f064abafe70a5e89e72c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-80cc11249951d77617837d489d137970.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-8e49820ed6d4efe09269732fec37b1be.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-a0549630b70baaa25b54d3a02da3e3cd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-a9411edebf4b02260a501cf288486160.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-a97759482458c44cbd86520addf0e715.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-b26f381c9f7354f3462011430c6f3516.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-bb1322086ee5fb78a847811248987555.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-beb4595f765deb10835ff70e19259d4b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-d7dc7eb24d3a5429c846eb87b8592531.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdiscuz-f66d967d74fa7c849a46bb1299b2eece.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdm-gutenberg-blocks-5096ea0bd77ac20a45ea75149ea1f0e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdm-premium-packages-1a67baf6167d3af7ea57dc54d855070a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpdm-premium-packages-9cbb5db009f771b1f71dcb8eaf85d7e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpe-indoshipping-a0f96e4b9cfd2e8b1cd4cfaea6299052.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpematico-ce2aa47cca210105b9ad928ad1c57540.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-1c7acc022622f36ca344db11dcebaddf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-4ca7bd0e8f61ffa08f04711e58090827.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-7a378944e613d1b359a5928a9883a2f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-lite-0425ae56a9fab522c188634fc2eda86f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-lite-220dd315bf8421f9ddbac8301f226083.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-lite-316c95f4f3b5891fdd91af058dfb9524.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-lite-3833fde53c02f881d8b11d577a449782.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-lite-3d5a86cd8278e1869b165a5be40a3baa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-lite-7a378944e613d1b359a5928a9883a2f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforms-lite-a191d4d9963290504268454ad924a754.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-026833d334ad1214ad9b4e4b3b4251a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-038a878abb8f9607405d070f7e55bf0f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-0974ad31ae0ff4ed4780871fa5a19327.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-180565f2bb1ffb1d14acebaf2b798b98.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-472cf1af897e591100ceb6b96fb80de8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-51d849db0aa0f9961d0bb5eb2d81e11e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-5e08a8bcdaa0ffc86e373916165d670a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-5fc70b9a54a47a4a18b6ce16ce7c23ba.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-7796a6543f11d887deb3ec9c31928648.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-86ba8169e30edfd0fbeaaac7e702dfce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-b1ced039ec3e12066bd1cc12c97938c8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-c0b1c2357ac077725cbe857dcad08e43.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-c32ce9a33cb4b84bfdebec18aaf08699.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-c9f41d227d49a467420a82298376145f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-cc42a23c3489a21703ade49d1baae26a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-d2f0460858f178a35a9b0566104e93cb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-dcbc26c1e59709ba0a55cede543653d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-df308cf6b44530f23e6aa9e16f45633a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-e0fff88ad101eb2ee95866f7be5ec00c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-e5552ad191b551e3319c3d216b7466cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpforo-ee5b4c2ac22e2de04acc625e8a8d31f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfrom-email-f018dd006c86a273640a9091528e99af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfront-notification-bar-450b5eb205eb4e03e4e00eea052c76d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfront-notification-bar-88bd79040ab3368b09f14c252d140de8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfront-notification-bar-994b2a0046a121a24de62a7ef6f747b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfront-notification-bar-b0586fa88a487c798158f25ead9b6004.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfront-scroll-top-357b47caf5db9e0098a5f7a1e50f8dc7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfront-user-role-editor-42deb2684c3eba9205d231d5d23306bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfront-user-role-editor-4836d612a10fff8d15b3666d7165500a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfront-user-role-editor-94d9ce1faf35ceff75a34ff49e69f6d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfunnels-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfunnels-6ab516426049dc622ee1b94cc628b61c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfunnels-7a5213754c46194429382d819c00f511.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfunnels-9e38f58085aab4d926890f7398810c6b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfunnels-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpfunnels-c470f8f5625ce2e9f7a4e073bc31fb3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgateway-e8e4caf35c45fbc7a371f3be1ae5a251.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgenious-job-listing-17d9d2647ecfd4b0be797349f3817c27.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgetapi-4c6d6429665eac8877ce0e75f13992a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgform-44fe84770decd19120a8d913bc09bfe5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgform-55aa46c17c94c8921a5e40ecf3701f67.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgform-6647340253053f9bdb1fb3f23b4abe85.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgform-82c5164bc77f066c7a8d33b886720225.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgform-b4ea588ba50958ad00d8b73f87c65822.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpglobus-3ba8578c9b517b602d4e446e82ee6f17.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpglobus-485a36eabec5f4b9943990f0033b308d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpglobus-83e2358dd513fd53b034068ccf305836.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpglobus-c384382f7d3c6321e1b275243f5d2c28.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpglobus-ddb8a7f2865d6d7dbea16193f41bd919.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpglobus-e95762dedf29574050fd40fac42c78ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpglobus-f4fb22207f3c1928cb95d88c1e1f82b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpglobus-translate-options-db22094eea816af85bb6ec1f6633c114.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgsi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgsi-c60ee47fa89a26e43f0b2e6590ebf383.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgsi-c6d9a7955a97d5139542746523314cb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgsi-professional-c60ee47fa89a26e43f0b2e6590ebf383.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgsi-professional-c6d9a7955a97d5139542746523314cb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpgt-google-translate-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpheka-request-for-quote-5e98c4735eb20663ca1067da327e8606.yaml create mode 100644 nuclei-templates/cve-less/plugins/wphotfiles-faa612ca5bdaf4285ef55a7ed1d04960.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpide-13d6d07ad8433fc4c13ab399af9c2000.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpide-a281a6daee68ba362dc7d77d71441ffb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpide-ec9c194a00305798df823bbd977744c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpify-woo-739e325811d595a476c8a9d5ed5b690b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpify-woo-dd0249dc72735c5a5faff42cfa7f7ee0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpify-woo-f47e9f4ca218e71c08ad0ae51486eb67.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpjam-basic-d8720ff7be23b66bec0bd659c201c502.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpjobboard-15e650b4ee038f777984c647938b664a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpjobboard-251f38cefaa8d1370dc48f71e7aae210.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpjobboard-528b7498cac098c3cafe6540ba1e4135.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpjobboard-52e9c784ee926500b6a7a44692c6aef8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpjobboard-81d15af02efd4bc202d6f72b6e97fc68.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpjobboard-b36f175e4f497082be7e93c3a08ddc08.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpkoi-templates-for-elementor-13b1426aee2c11f321401f7155b3cd3d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wplegalpages-5ab744233de8cca4ab1cbaa602802c09.yaml create mode 100644 nuclei-templates/cve-less/plugins/wplegalpages-7251846dd87f32952c517012f5416bb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wplegalpages-aa2d32a6da076063dc14a9036390d1fe.yaml create mode 100644 nuclei-templates/cve-less/plugins/wplite-3910ec4d645c60375887481edfe719b7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wplocalplus-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wplr-sync-3bdb0d0ea9cf8219d34566c6858ae4f8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpmailer-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpmandrill-12a5a8360002b901fa077eaf0cb0a07a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpmarketplace-1c957d73e722d9ee39589589b266de33.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpmarketplace-8cc608a635186c89042b092a2deb5e86.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpmarketplace-a7e8497ccc525908d871f8d3891b7252.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpml-b794db11782c303b2a81b056287603af.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpml-cb38c4c6a570ec5691624654c5d4d34c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpml-string-translation-18e8b80c2622db130ba5596fe32dcfee.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpo365-login-41c658cc02437ea28ef89a50228368a2.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpo365-login-fa8823b3be9be96069014fd7460133fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpopal-core-features-e2fa4c8a4519773eef901f4abb2bc665.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpoptin-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wppageflip-92ae3c7f62669bb059cdddeab166dfdd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wppdf-2bf5272ec6d886fad7b7b1d47db7c04d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpperformancetester-f14cc7b2edd1a1231a45d376dd4df337.yaml create mode 100644 nuclei-templates/cve-less/plugins/wppizza-32909284311b9711b0c941168cf05813.yaml create mode 100644 nuclei-templates/cve-less/plugins/wppizza-81f88656b7bb4f363fcac664b1d8935a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wppizza-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml create mode 100644 nuclei-templates/cve-less/plugins/wppizza-e4bdb79e642b57f61de774ae24d8a0ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wppm-11e0416c47cc399cafbb7b5feca59d4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpqa-399a0cfb0032357f26f899d011d7490f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpqa-5cfa8b6a040b435f7a92a3787291a533.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpqa-a41befce41d6aff1f7ad093dd0e01517.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpqa-c453f0ecd6a4881debc7f71c36086298.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpqa-c890a2d3e19ae2099edf204803cc83b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpqa-dd3fead301df531f0d1ae759b6afb54b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpqa-dda12396183ee405a0b6804083230616.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpqa-dfd03ed6db32c6975ee246c21a630603.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpremote-8861d9073cc3a63b6e47dd25252b2b60.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-bidouille-94445150de831d7b0c3c55471e2a0bcf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-child-theme-generator-272502bd23e70077d3c0e25865267220.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-cleaner-486e0efe0e6e4cb2a652ed1f5a6563b0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-cleaner-7f379444fd295591b6061598a142cc5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-hide-login-631db0a162eaa0bf7ba9778e5dde5467.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-hide-login-7c05693517b55b87f0d7f83514eb2c07.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-hide-login-db674a6de8d9817e777becabcbbc904f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-hide-login-e36199753fc8222b9a4c8dc023f4878a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-hide-login-e8798ed63a85d45d71422ad1f5961970.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-hide-login-eb378c658d67b036fda08c9801554621.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-hide-login-efc5740c90ff0a59809e4e9849d0d149.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-hide-login-ffe4a494ba525ff7867c7e82eb26993d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-limit-login-33ba7ead1d6b53a7bacd0ee1d3cec66a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-limit-login-ac32a3365dd3ce67be3869f846f1d80e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wps-limit-login-e87c9f8090be1d89c33f679b357f6df8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsc-mijnpress-fbdea8451b311eb4ce44cfe1a03a2154.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpschoolpress-40c66d343981decaf1c11e2239adae6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpschoolpress-806ff64ba5797ae36351687c8c401e27.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpschoolpress-a9a638b4142268e1bac6a40ef293c66b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpschoolpress-b9006062d746b8caf6ca2e15e2892f35.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpschoolpress-f1f206bccc7ec9ca4ed21059b6547361.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpschoolpress-f6bb81d744ef9464f6fccc27a671bc84.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpseo-local-062a12d42d5fa439eba03cd3a142a5ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpseo-local-559e4b65f535b45dcfe5d339b535e1b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpseo-local-6f2bfa44316597918db6902f22101641.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpshop-081f62a87d654a4a56d997452fef47f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpshopgermany-it-recht-kanzlei-8b316c2c5c57a5bec4fddd68dace9cd3.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpshopgermany-protectedshops-c41eb0b63074858e7a2ad3fb4237d823.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpshopify-d58b5b8c1f20223d27dbac48d68ed8bc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsid-shortcode-556540f24142f2b0189f842b638e3b3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsimpletools-log-viewer-955bd8a9c17ef8d9a80499ee35d81209.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsimpletools-upload-limit-9de482ee3d956ce585f6bd7d5fa3f9c1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsite-background-takeover-d2df040b2ddbf2c6a18a499a718c8a17.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsite-follow-us-badges-c3fe9adbef48906de6288ff04a6a51a9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpslacksync-41acc719f07692e44cc41d180d104907.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsnapapp-894d5909f0af3672921ffb2138091248.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsolr-search-engine-e0c5d4dca3eeae77e08a24a0d2c24dce.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpss-7cf13e2bb716c26880ecc9fba4b8b446.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpss-dfc9289a15b5d9ef4c8b8a78a1e983f0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpss-ee3866229b628cfe3699728232f7f492.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpstorecart-1f49340070b07f37e2b631ba71cc0b18.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpstream-d011f1f83d77935b57f8c936c3d34792.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpstream-d118e9921cdb49f79910263f2b2e7390.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsynchro-7c11f7c384d9dd8d4651247b810c16b8.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpsynchro-e74a81eb9870251841dabcabe93454ff.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptables-81fef267b7d2479d27762ebd528c25d5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptf-image-gallery-0e5c12aafd12c94fc7a397fbe2697f9a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptools-08963ed44b1cea3058d5d701a7dc7bd5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptools-509c39acb39a633805d6b569fc41a485.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptools-masonry-gallery-posts-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-10e0f566e327669476b16f2a9ebfe55e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-1b6d42c938576bb7e9892a86129f9bc5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-4578c261077bba561117707849a7d191.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-79ef66275733eff8f488bb76b45e9786.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-92f2fb442048282c27cd8fc5629a2db5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-b8cd38cebac9c7df524c313f084f74d0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-c426bf1b8239d541e948689bf4281f26.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-ddef2c9b920afc1274bfc9aad43c2024.yaml create mode 100644 nuclei-templates/cve-less/plugins/wptouch-f63166b5a96e6e66374a20ab51c64110.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpupper-share-buttons-94f3a814c03c449b36cb253d7f80d949.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpview-0da2272f6fad3d314fe055d518112eb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backup-mainwp-3df45b218aba0e53ba0ae72e9699b2ef.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backup-mainwp-a7bf9a411638a6c87526e9cf7c7ea42c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-02311b741caefd1373a75d8083768696.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-0bef183926021b3705ecb7e440cd2280.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-11e9b1d880ea6b9e7b3f23d21ed1379c.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-167f863d325454383d95967607b16eaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-21742813963970be1b852e62999d105e.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-261f8d0d96a6973bf1fe24c56cd5b3ec.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-549345c10b291ab93f71309abaa38002.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-574ff230e2226e2c8ffbb0d383453c99.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-5bf4618f3f911336450f68ac829f8ebb.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-66174d632ca5e11403564d89ab52d0f1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-6e746242a89a0f0791f490c19cf07982.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-6fc26492de3e14b8a03318635a942d46.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-70efeee5b28a1c15fdfabb1bea0a8d31.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-92cb4c71463b35b1c480a90397f7eb13.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-a6bc1c4f18d7c787b94d2c3a536d60d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-a88c71a7fe9a31f1969a27de0aeb4145.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-b070ea085481a5d7bd82f5fd3f416fd0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-c09b3bbf7fa2f9da4c4d07cfecb5595a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvivid-backuprestore-ed94652247c936f26c87589210c8b78f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvr-0494f8e348129a631af8f56e0ffddc34.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvr-05be7d772f531cd07131df257a1f15a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvr-05c834cda01a386b0744c30fe4c1b224.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvr-0e6778305a28eacf186b54844a0e5ea0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvr-18966e8228314b8165d39d48519f43cc.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvr-30833f7da41d4fcbb3740f51789c1920.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvr-30df02f445ade717ac7c0e2991062171.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpvr-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpworx-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-1453924550bc29c555e5d4ba1d470f33.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-435ab56c3c78663cfa598710697f9daf.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-46443215df27c06259cb9cb549f79f5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-6fe1ccb7efc24357409ad5ff0b713ab1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-c8eb6bc5db7f4876cb01e7f978c6ef1d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpzoom-elementor-addons-0c1df7bc0f650153d4deab14ee137704.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpzoom-portfolio-0ee2773c0417239ca9eb51cc09f9c94f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wpzoom-shortcodes-3b341aa619ead8c67e0c3faf1b78e638.yaml create mode 100644 nuclei-templates/cve-less/plugins/wr-age-verification-46269389e3b60bf15a43ac719ab1d96d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wr-contactform-cf0536ededa77239ac982d05d856b3db.yaml create mode 100644 nuclei-templates/cve-less/plugins/wrc-pricing-tables-b7300a2ec84dffd7f0d27ca9d7ff574b.yaml create mode 100644 nuclei-templates/cve-less/plugins/wrc-pricing-tables-c3986a6ffb844160a08c3a8660d4bd5e.yaml create mode 100644 nuclei-templates/cve-less/plugins/ws-bootstrap-vc-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/ws-facebook-likebox-4ece1b2368b1b6541fd5808b6263c140.yaml create mode 100644 nuclei-templates/cve-less/plugins/ws-form-7c5b4d9c6aa7181d9617238c12cc19eb.yaml create mode 100644 nuclei-templates/cve-less/plugins/ws-form-832185af76432ae76d6be1580f0d17e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ws-form-a9651b358db184ef2f9f80cf3ecfa474.yaml create mode 100644 nuclei-templates/cve-less/plugins/ws-form-b4ff9a96de0f409f95e972962d7a3e6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/ws-form-pro-832185af76432ae76d6be1580f0d17e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/ws-form-pro-a9651b358db184ef2f9f80cf3ecfa474.yaml create mode 100644 nuclei-templates/cve-less/plugins/wsb-brands-02b515a3d90192b157fb5edc5ea88a55.yaml create mode 100644 nuclei-templates/cve-less/plugins/wsecure-8435cd6b84481f3b14132a8d7f815c94.yaml create mode 100644 nuclei-templates/cve-less/plugins/wsecure-9b48b8479f4c58ab28f6369c437cd823.yaml create mode 100644 nuclei-templates/cve-less/plugins/wsm-downloader-8589ee226f71b9ad4c2ae9aa0680e0d9.yaml create mode 100644 nuclei-templates/cve-less/plugins/wsm-downloader-de76eb4127c4abe851f7593ebf365054.yaml create mode 100644 nuclei-templates/cve-less/plugins/wti-like-post-3324e66b3f1d865a4a88e7aa92b87f29.yaml create mode 100644 nuclei-templates/cve-less/plugins/wti-like-post-bea1167e010c002491bae397468a7fde.yaml create mode 100644 nuclei-templates/cve-less/plugins/wti-like-post-fe235b16e5129f2873d5a71f2024f409.yaml create mode 100644 nuclei-templates/cve-less/plugins/wu-rating-530246c3333edec963a6035638964677.yaml create mode 100644 nuclei-templates/cve-less/plugins/wufoo-shortcode-e7037db773bf01752d04e36ac2a2c9a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wupo-group-attributes-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/wwc-amz-aff-c7d33fa41953ee9af357676fb8306244.yaml create mode 100644 nuclei-templates/cve-less/plugins/wwm-social-share-on-image-hover-92ee681763fb9cdadb89c1275ea24df6.yaml create mode 100644 nuclei-templates/cve-less/plugins/www-xml-sitemap-generator-org-c30ecd15c33e495c7a907535cf50c4ac.yaml create mode 100644 nuclei-templates/cve-less/plugins/wxsync-506b320d59fe9094f7b88764f2b3b6fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-0dc627cd120008e5a66c81e20ce78b02.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-149048c8f49646b7cbdd6843761e070a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-16a2ba366a797ba0d5eb3e8be47b4c59.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-568514847d2ecbfcd9be56c047f3a92a.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-7b51f983a57c524a14f0aa93885b9cf0.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-d6e885fce7f28ee6559b8945eb076a5d.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-eb211f56901dd02ad29cd2f46f132fad.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-edea3de67b57b3e5d091c25ded4c1ae1.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-f7d5e9c6698316d3dbc370fb98b6400f.yaml create mode 100644 nuclei-templates/cve-less/plugins/wysija-newsletters-ff3256f502dbc04fc7eb4fae59537065.yaml create mode 100644 nuclei-templates/cve-less/plugins/x-forms-express-0943806ea17e69fbad3f9008b6d8edaf.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-04c5acbffc68842824e9b1f4759868d3.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-10a6f997b77b37003eabf2a216fdeced.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-1603594359d529d2b8fdbef947c8f58c.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-1c3b4e53e5b3379877d01d32e9f8b494.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-259f1c198d6aae45fe01969db446735f.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-34ff52c103b465dd566bb0b7233b8c5c.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-614dbc5cead598413ac3ce439b53a52e.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-66945b5d2da91990e6148061d7f22822.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-7d4b923b890bf3599f0fa68ae5f894dc.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-9584af5b5f010003c1054d63d9d8c800.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-981dc1dc52b06f3430863bd14410cb31.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-ba15e4c927467d88c6d7ea80fbe845a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-c66baa1c275e274488b7d52e2acbab59.yaml create mode 100644 nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-d6467913a640b127b20e07c49e842d3b.yaml create mode 100644 nuclei-templates/cve-less/plugins/xen-carousel-780fa31d43c1e72887f541f835fe2c28.yaml create mode 100644 nuclei-templates/cve-less/plugins/xerte-online-02e1b44167070c59f019d59aa8eb3804.yaml create mode 100644 nuclei-templates/cve-less/plugins/xforwoocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/xforwoocommerce-ad605f98f0b12012c381eafdf54cfada.yaml create mode 100644 nuclei-templates/cve-less/plugins/xhanch-my-twitter-1ce0c9b4a51f3fdac3a650bd3678e546.yaml create mode 100644 nuclei-templates/cve-less/plugins/xili-tidy-tags-ec41c915e32b517417556f61cbbe4554.yaml create mode 100644 nuclei-templates/cve-less/plugins/xllentech-english-islamic-calendar-cfbef53d87854aaa058c431289304e79.yaml create mode 100644 nuclei-templates/cve-less/plugins/xml-file-export-import-for-stampscom-and-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/xml-for-google-merchant-center-ad7168d347e726627d613abda6b471b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/xml-sitemap-feed-ed9d6de2b2caf08fa88d82aee7a4dacf.yaml create mode 100644 nuclei-templates/cve-less/plugins/xml-sitemap-generator-for-google-cdde1a134c6ef6b26a1e78ad1a41d56f.yaml create mode 100644 nuclei-templates/cve-less/plugins/xml-sitemaps-for-videos-a35a0e7274ecf003f21418a2f0fe05e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/xo-event-calendar-4cf56c133f1db56b8a3cc3b03429bb93.yaml create mode 100644 nuclei-templates/cve-less/plugins/xo-liteslider-3f7130e05b74b1e5f65b8d9e77a1373e.yaml create mode 100644 nuclei-templates/cve-less/plugins/xo-security-0d6d2e1e75a3d7c24aa16b9420abf358.yaml create mode 100644 nuclei-templates/cve-less/plugins/xorbin-digital-flash-clock-75fb06485693f13299e4aa42a8ec1d70.yaml create mode 100644 nuclei-templates/cve-less/plugins/xpinner-lite-68634c1a8c946edc4c46f0185186727b.yaml create mode 100644 nuclei-templates/cve-less/plugins/xpinner-lite-7fd7a99aaec9de09c58a50b6b832a9fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/xpro-elementor-addons-85070818b2a0ed18993539089f99013d.yaml create mode 100644 nuclei-templates/cve-less/plugins/xqueue-maileon-4589a6370d5dbea689df46df9c5577a1.yaml create mode 100644 nuclei-templates/cve-less/plugins/xserver-migrator-5b3901e02ad2424b1793990cd718f093.yaml create mode 100644 nuclei-templates/cve-less/plugins/xt-woo-ajax-add-to-cart-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/xt-woo-points-rewards-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/xt-woo-quick-view-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/xt-woo-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/xtremelocator-2adf451d71caa92a7f7c155d4ef7aae4.yaml create mode 100644 nuclei-templates/cve-less/plugins/yabp-474b68fd8dad59276b2b0abb985452ea.yaml create mode 100644 nuclei-templates/cve-less/plugins/yada-wiki-57f13a889e0cffca9cc00946f63d375b.yaml create mode 100644 nuclei-templates/cve-less/plugins/yahoo-updates-for-wordpress-489466a4c841b3b26e3fdf281284debf.yaml create mode 100644 nuclei-templates/cve-less/plugins/yamaps-f801c1aeb4734b7133d474f559fadcb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/yampi-checkout-d991553a68fa73bd081b1770dfe6f7af.yaml create mode 100644 nuclei-templates/cve-less/plugins/yandex-money-button-480067fff73f218a897f527d009097f5.yaml create mode 100644 nuclei-templates/cve-less/plugins/yandex-money-button-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/yandexnews-feed-by-teplitsa-0cfa07456732530e831220894e1919de.yaml create mode 100644 nuclei-templates/cve-less/plugins/yatra-3cae7fcdb0832a80c22b613ce2425d20.yaml create mode 100644 nuclei-templates/cve-less/plugins/yatri-tools-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/yawpp-6ef860020cf2393d29a3d4b7f6db6475.yaml create mode 100644 nuclei-templates/cve-less/plugins/yawpp-a37629b8951d8dca9eaa0034808a75be.yaml create mode 100644 nuclei-templates/cve-less/plugins/yaysmtp-1880e59c92fe0e79ed53bd8a0e62de6d.yaml create mode 100644 nuclei-templates/cve-less/plugins/yaysmtp-3dde0f0622765c2ad7f47077755dade6.yaml create mode 100644 nuclei-templates/cve-less/plugins/yaysmtp-4d3dbfcfc5bd83e1f32cd6ab14a72545.yaml create mode 100644 nuclei-templates/cve-less/plugins/yaysmtp-53237b2a666711b5ed5327cacfdd45f6.yaml create mode 100644 nuclei-templates/cve-less/plugins/yaysmtp-c5709fba92c5e77b429d3d6d877dbdaa.yaml create mode 100644 nuclei-templates/cve-less/plugins/yds-support-ticket-system-099d72d33b89027185d04eec96bd1d04.yaml create mode 100644 nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-0a6ee246dd7e0fbebdf1fe319b82ca2c.yaml create mode 100644 nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-7a834f58a606cf067ebc7019fbcc29e8.yaml create mode 100644 nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-bc75273fcc2a01b62e53de804d6a871c.yaml create mode 100644 nuclei-templates/cve-less/plugins/yellow-yard-04f24d8a77ed9613e08490a191c4df98.yaml create mode 100644 nuclei-templates/cve-less/plugins/yellow-yard-c5527d6f57853cc49c907b306043f9d1.yaml create mode 100644 nuclei-templates/cve-less/plugins/yesno-d1fe830178bd836f853d2f1e8ea1327c.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-6fe67f9ebf1fd28c0850e6428387bc2e.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-9da0817673d4e46e6fd57b591efba31c.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-bff9375a673f8d2d232dddd7e1d5201a.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-c1c98038e2071b40fa92b1876951feb1.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-f004ce2a754ccfc5988e2e69aed45af9.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-f373bbafc03e475d3ffabbbd84f90eda.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-stars-rating-146da8f6895b52d2f71daced48bc4bb3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-stars-rating-2f087270cc2f0766f3522e85859f5682.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-stars-rating-61995cd0cadb8b6360d652af233c94df.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-stars-rating-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-stars-rating-c1cf31deca47ab06031c32c6f87e918a.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-stars-rating-efe780e12c2c72ceb89cb957cd97aaac.yaml create mode 100644 nuclei-templates/cve-less/plugins/yet-another-stars-rating-ffed5a07256deebff2bbee11af3700d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-custom-woocommerce-product-tabs-6208ba5c5d5d6da9586016ed5d7a8c01.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-custom-woocommerce-product-tabs-8d1ec64befa71150df8d15ca9a46e658.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-03e1e5461591c1057ed60beb9b3bae79.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-177659464b8d85544069425197c4369a.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-1d49f8f287f32ef24b0d6d09efbb3a99.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-23c724086aac6deded1ebc7c3f6322cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-386a0afabc9239508b641e7c3c487c92.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-53951cc6c6fc3a1b6dbee499dbf71331.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-548ea404dc918edae3aacbe70f4f2745.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-85182e02e56cd4169277eefa805fcb8b.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-92e334f7eff847d619a107f5b6ee2b7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-b2623a7e77be214a3a6362bd14987ece.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-cce904a4a7f2d422f5ff2c8c1b3c77b4.yaml create mode 100644 nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-fe922fd0e38d640f64cea8429582a5c0.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-advanced-refund-system-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-desktop-notifications-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-donations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-donations-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-easy-login-register-popup-for-woocommerce-77b9a05dcc6a23ba6229304e9509d659.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-essential-kit-for-woocommerce-1-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-essential-kit-for-woocommerce-1-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-infinite-scrolling-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-infinite-scrolling-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-maintenance-mode-47f2a0e84b3d74553b2adb604a344eb0.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-maintenance-mode-9e36292a7ac47d63600972695d9e0b66.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-maintenance-mode-c63c09dfe0443988600f74c6f35feaf4.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-paypal-payments-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-paypal-payments-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-product-size-charts-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-account-funds-premium-982ffbf6beec794e0b1ae79fe9b1aaa9.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-8e47416ac2dba104b5166ffbff80d7af.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-best-sellers-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-catalog-mode-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-catalog-mode-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-category-accordion-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-category-accordion-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-compare-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-compare-282e251eab336c690b3101edf7ffeddc.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-compare-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-compare-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-compare-e5eb957a437ccd71daf2e9f56a4559b2.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-featured-video-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-featured-video-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-41e80875772903dab5f7014a7dce0bda.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-4a463e7ba518b96c1fea8ec0461b05e3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-83ba46f68dcdc63735fee9175b72793e.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-name-your-price-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-name-your-price-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-popup-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-popup-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-255ea4aa4e6fb6ceab7bcf43313eab50.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-27280f97d7c2f094c66e491abb0e38cf.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-61ed528306912302d784398edae3cbb2.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-slider-carousel-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-slider-carousel-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-dced2caedbf7a329c1717024ec2a676a.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-recover-abandoned-cart-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-cd76dd48c85b587e87acb07c80de397a.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-tab-manager-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-tab-manager-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-bcdc9da8f16c2dd363504b15d634a8b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-2ae81b909e77b01f5f9d53fd011b14fb.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-26995bfc01056c81bc6600b718d2f9c3.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-564f40d4fe0ef114f55053468e52e333.yaml create mode 100644 nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-e1335c6f9c71ba603c44dff8a99e9a32.yaml create mode 100644 nuclei-templates/cve-less/plugins/yml-for-yandex-market-2bf6e569a041eba29b626a0e786e076e.yaml create mode 100644 nuclei-templates/cve-less/plugins/yml-for-yandex-market-af78913e8aa3b92d3397ebee3054a3e9.yaml create mode 100644 nuclei-templates/cve-less/plugins/yolink-search-128d5f3d162a44e44f532e8dc2dce7bf.yaml create mode 100644 nuclei-templates/cve-less/plugins/yoo-slider-1327cd5b3a24f53dc0f827abbdb99b36.yaml create mode 100644 nuclei-templates/cve-less/plugins/yoo-slider-6496be73d20798eb7af74bf20b42d8fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/yoo-slider-7da4dea81c55210aa215efa50cd5e1a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/yoo-slider-7f7eb1234b1c572ad770fcbedeeb7de7.yaml create mode 100644 nuclei-templates/cve-less/plugins/yoo-slider-e46bfa26b6acc9d0ed585b68ffa95ec6.yaml create mode 100644 nuclei-templates/cve-less/plugins/yookassa-10647c17dbf9c37ea854931ce84957f9.yaml create mode 100644 nuclei-templates/cve-less/plugins/yookassa-d03a599615f97ee32ed6c9f069046608.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-0779481b7f80c0411ff97013b26aee05.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-2209fd73f482335c124e2a704dbac383.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-348e9954cde1ddefaa405cdbf442ab7b.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-3ceff14dcfb2e0311d597c89266b0063.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-538b036c9b7ca7079f6e2a5cc2642fb5.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-570709303e69e8bea02cdb35b74ee58c.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-5cd8506b97bde8d30090476ea4e9f6d6.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-7a46739bfced50470df5ec8fce622b5b.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-811602c2462c1ce744a5866bcb3ff2bb.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-ac4eaf61003a7bcab0c4c83244d45aab.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-cb10630ddc7da513be3fbc863f316ce2.yaml create mode 100644 nuclei-templates/cve-less/plugins/yop-poll-dde39ba4d7059070e8dd3bb604ff98da.yaml create mode 100644 nuclei-templates/cve-less/plugins/yotpo-reviews-for-woocommerce-2209fd38d31d7045610e08e5a8e2302b.yaml create mode 100644 nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-371f210cfb55319010fd16b3a7c4efca.yaml create mode 100644 nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-50a6dff0cb336807f517358763e4184a.yaml create mode 100644 nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-fcbd76097c62e0d5592f5bd058f1a16f.yaml create mode 100644 nuclei-templates/cve-less/plugins/you-shang-43a1e8131c5398f64ddb0148cb86b0fc.yaml create mode 100644 nuclei-templates/cve-less/plugins/youforms-free-for-copecart-0b4cf00934e898c124e66c8a24ee9c38.yaml create mode 100644 nuclei-templates/cve-less/plugins/your-text-manager-882b62316645c3c4ca02d06b90f3ba4c.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-14a83f20a2e76cecad34b8959bcb030a.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-3989a9901d352d6a2f1182e6cf00355e.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-46e730049923010c8fef590481e6af11.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-79b5bcc733210544f6943a7d400a5741.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-7b03e9c7a48a7a487481072b229c74d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-7eee22ee9d7eafb911cff5c522c34cc9.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-874a492260299c7a5afa8a7cc7cbcac9.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-9ffefef754ef7b05c84f3b0ba93de0df.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-bda0e76aad71129453d100395876792d.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourchannel-c9984a876e871660704819ab2121a5a0.yaml create mode 100644 nuclei-templates/cve-less/plugins/yourmembers-4841648779bddf5eb17a1f0352588205.yaml create mode 100644 nuclei-templates/cve-less/plugins/yousaytoo-auto-publishing-plugin-4ad999fa82a381d094bc99654eb86aca.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-channel-3485e314595e8ba9b90ab54d159e74ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-channel-3f9ac076d173ecd9afccb09cd7195bfc.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-channel-8e4fe58479cedd644fbbd3b418e0b682.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-channel-dd26803b22794f717e5726511579315e.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-channel-gallery-b830431516693664401f38e9ff6fdd82.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-embed-315a019742ffab737ef11e333f6ddf51.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-embed-b86d996fd3fb32f4d4a2741c181e0be2.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-embed-plus-ee98789d25d36584b37cbc76b4f1f9c4.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-feeder-ba80b860d4e6bf99a76e42ede7281809.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-playlist-player-803fd151825baa056b93685e93955a54.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-playlist-player-a14f62f5c8828736c014cf6f6d52173a.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-shortcode-de2bc693a1c312889ab71164989a7177.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-showcase-adff1d89188982b4e28e29b803f67a6e.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-speedload-1850212bc734be4160339a2e211bb5c6.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-video-inserter-62d169261c9604e6c54d2dda26a18971.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-video-player-2b8463e6867dce79ddd40af4dd9780fd.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-video-player-9f08d8940e734966b92051cba3f5ff32.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtube-widget-responsive-d5afc9936d3ec0ef2f1ebf204d2b6f90.yaml create mode 100644 nuclei-templates/cve-less/plugins/youtubefreedown-db1bfddf516dcb0f89a64dd78526f798.yaml create mode 100644 nuclei-templates/cve-less/plugins/youzify-0bcd48a3f1b52a4a7092a42bfa6473a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/youzify-1eaf6ff13c8b718103c9b459aa46b172.yaml create mode 100644 nuclei-templates/cve-less/plugins/youzify-87cb25b1c7747f5af4e409cfd05ed832.yaml create mode 100644 nuclei-templates/cve-less/plugins/youzify-8b9fbd031d6f59226821b7faa24713d4.yaml create mode 100644 nuclei-templates/cve-less/plugins/youzify-moderation-deb298ce4863a239756c2bf229347f46.yaml create mode 100644 nuclei-templates/cve-less/plugins/yt-player-3976419442f6726cc8fee397bc7f22ee.yaml create mode 100644 nuclei-templates/cve-less/plugins/yt-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/yurl-retwitt-76b896e05441bad3b87a1f15a06f97a4.yaml create mode 100644 nuclei-templates/cve-less/plugins/yuzo-related-post-73a2e276237565aa409d25c41f8ca0e2.yaml create mode 100644 nuclei-templates/cve-less/plugins/z-url-preview-7afc53a437871814faec30b27e8447a5.yaml create mode 100644 nuclei-templates/cve-less/plugins/zarzadzanie_kontem-ef5ed531568c083ac4bd116aef4f2b54.yaml create mode 100644 nuclei-templates/cve-less/plugins/zd-youtube-flv-player-aa439b9d2e93b6ff2495abedfda870b3.yaml create mode 100644 nuclei-templates/cve-less/plugins/zdstats-e5d3824dce2c042eb639b46cc57ff2d2.yaml create mode 100644 nuclei-templates/cve-less/plugins/zedity-c1b48655787cca8bb98f42a7402e4f5f.yaml create mode 100644 nuclei-templates/cve-less/plugins/zeenshare-09e64e82ae55462158eeb5e726a22311.yaml create mode 100644 nuclei-templates/cve-less/plugins/zelist-directory-3ecd9d29be301ddeb0777372578c9ed3.yaml create mode 100644 nuclei-templates/cve-less/plugins/zen-mobile-app-native-6dca12dc38630f4f9ae87a5c64f8992b.yaml create mode 100644 nuclei-templates/cve-less/plugins/zendesk-754636da4394eed1ba762eb903570de0.yaml create mode 100644 nuclei-templates/cve-less/plugins/zendesk-help-center-83e7004306bfbb58dbc0b94ba733c14a.yaml create mode 100644 nuclei-templates/cve-less/plugins/zendrop-dropshipping-and-fulfillment-1e3f4e1ff5158794a25646563fe28f9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/zendrop-dropshipping-and-fulfillment-e98f58904228ac7173e5fcfac5af85a6.yaml create mode 100644 nuclei-templates/cve-less/plugins/zengo-custom-thumbnail-image-581a16776001d26901f68412e72a12c5.yaml create mode 100644 nuclei-templates/cve-less/plugins/zeno-font-resizer-230d51cfd302c1eecd4d3a3387befab9.yaml create mode 100644 nuclei-templates/cve-less/plugins/zephyr-project-manager-0683602aa21df3d5a8b5ad8b8d019fd4.yaml create mode 100644 nuclei-templates/cve-less/plugins/zephyr-project-manager-37c471f64e53100c9ad9fb469cb0b5ca.yaml create mode 100644 nuclei-templates/cve-less/plugins/zephyr-project-manager-624c5301cd644d9b563918924237400c.yaml create mode 100644 nuclei-templates/cve-less/plugins/zephyr-project-manager-794b67b62be42f3f8ca1d215c298fa56.yaml create mode 100644 nuclei-templates/cve-less/plugins/zephyr-project-manager-dafa2871ae7c93d913fdc3e40139c185.yaml create mode 100644 nuclei-templates/cve-less/plugins/zephyr-project-manager-e94377837818e9045e22fcbe33f9af9d.yaml create mode 100644 nuclei-templates/cve-less/plugins/zephyr-project-manager-ffa1a3ac7c56aa84edc8d1c4d2786035.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-bs-accounting-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-bs-crm-38ff57a3a79c762236aaaeaffc92c374.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-bs-crm-aec751941690d89755638c950f64d01d.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-bs-crm-b829e9e3bc2e932b44b01c6e5d51daac.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-bs-crm-e541a07e8afe605f1bf04dc95e06d38b.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-bs-crm-e62802506f71c3511e6c8f20c3c5bc64.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-bs-crm-ebb8de96320f3c64a91f6dbb13b596fa.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-spam-4639cf5f39a95924327a8dca4717fa6c.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-spam-76cebc35705efab283512491fbfb5ded.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-spam-8d3590a739a7dcd2c4eca80910f2eb77.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-spam-da9b182fa6fe344911bcf311918bd2c9.yaml create mode 100644 nuclei-templates/cve-less/plugins/zero-spam-e1ad6d026d68d47f5c4c4162b3b2d312.yaml create mode 100644 nuclei-templates/cve-less/plugins/zerobounce-3b122e7dd636f2979e4419665efeeeb4.yaml create mode 100644 nuclei-templates/cve-less/plugins/zingiri-forum-b3a1763459f84e01883c4eac1864668d.yaml create mode 100644 nuclei-templates/cve-less/plugins/zingiri-tickets-189f446d2c45b3b01640096dd0b387b9.yaml create mode 100644 nuclei-templates/cve-less/plugins/zingiri-web-shop-47fb80194f8e9eb6848064791850ac64.yaml create mode 100644 nuclei-templates/cve-less/plugins/zingiri-web-shop-f4ee9df210a60a8c7b3151780ca279b1.yaml create mode 100644 nuclei-templates/cve-less/plugins/zionbuilder-c982dae5e8a9922c1cd4de17c56c6264.yaml create mode 100644 nuclei-templates/cve-less/plugins/zip-attachments-0cc87c7e1c569749aff97d224894c613.yaml create mode 100644 nuclei-templates/cve-less/plugins/zip-codes-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/plugins/zip-recipes-6dd6d330b8c5b9519a5c7e7eb2275f8f.yaml create mode 100644 nuclei-templates/cve-less/plugins/zip-recipes-cb09c78d8cbad27edaa184a301bc9557.yaml create mode 100644 nuclei-templates/cve-less/plugins/zip-recipes-dafddc9bea1e241db1766d412621b738.yaml create mode 100644 nuclei-templates/cve-less/plugins/zip-recipes-f7e8f8b14f258bbc08d845e9a1c78fe8.yaml create mode 100644 nuclei-templates/cve-less/plugins/zippy-5296c4f305bae7ac7b64bb4111846d67.yaml create mode 100644 nuclei-templates/cve-less/plugins/zippy-79737b0e5975df19862e5152b14611f3.yaml create mode 100644 nuclei-templates/cve-less/plugins/zippy-919cf6f31f29222aa869aeeb40e21222.yaml create mode 100644 nuclei-templates/cve-less/plugins/zippy-c592d86340244bb94d180507b23fa5a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/ziteboard-online-whiteboard-a3ba5f2761ca9302a85775ee3b727b37.yaml create mode 100644 nuclei-templates/cve-less/plugins/zlick-paywall-4dd3cd282a5e0a6020901679d8114797.yaml create mode 100644 nuclei-templates/cve-less/plugins/zm-ajax-login-register-bd15ec75a9f06fe35c580f88aeba9b7d.yaml create mode 100644 nuclei-templates/cve-less/plugins/zm-ajax-login-register-c9973ef86938dfe0c48a5abdfafd30a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/zm-ajax-login-register-ffbdefeb8e9807045768193f5cbcf332.yaml create mode 100644 nuclei-templates/cve-less/plugins/zm-gallery-d6a4a05c68d8a3214ff9eb4a728a2600.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-campaigns-51be17f4121e81eef8733d9b91f0a025.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-campaigns-6dfc8c4749111821f698bf2e3a274663.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-campaigns-b96f5bf9788a7a3f117bdd9d17e4d783.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-crm-forms-16abe83fb7023039495bc71d0e3e2b48.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-crm-forms-8e8dcc759eccd2518e9fba14e695c093.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-crm-forms-db1fed2fca8e80d33156bce8fe1dd724.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-forms-f34776806e968812940c4c4d5f82b503.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-forms-fe0f3dd2df39b34940cdb1e352238936.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-salesiq-177e4a3cb284ab639d60d2cdc0a716b5.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-salesiq-379056d331237206cad69e45d8d3007e.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-salesiq-4ecc6299ecfad3b8f439662203eb02a8.yaml create mode 100644 nuclei-templates/cve-less/plugins/zoho-salesiq-808251beac3177b1d028049231c161e6.yaml create mode 100644 nuclei-templates/cve-less/plugins/zopim-live-chat-7727a5f68ed648a5191d57e52492a289.yaml create mode 100644 nuclei-templates/cve-less/plugins/zotpress-01df5885583291c622278972bf76eb28.yaml create mode 100644 nuclei-templates/cve-less/plugins/zotpress-1c48bf4d484ac338c2e58423c802cdcb.yaml create mode 100644 nuclei-templates/cve-less/plugins/zotpress-895ca2434557d1111d9453e776e1d9be.yaml create mode 100644 nuclei-templates/cve-less/plugins/zotpress-d38242ac867a6661d41aa63eccb9b83c.yaml create mode 100644 nuclei-templates/cve-less/plugins/zx-csv-upload-11b8e915a665a007145e1d71a284462b.yaml create mode 100644 nuclei-templates/cve-less/plugins/zynith-seo-f761a34ad9eca6bfb3e6a9ab7b2cb2d8.yaml create mode 100644 nuclei-templates/cve-less/themes/15zine-c8e594cea5366acd20db9ff8e1b21b92.yaml create mode 100644 nuclei-templates/cve-less/themes/5star-a3ed9e76b0fc321cc4d7c1cb9261a2e1.yaml create mode 100644 nuclei-templates/cve-less/themes/aapna-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/abundance-9c1002d331f3bfe836a243fd7707a431.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-basic-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-basic-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-basic-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-mag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-mag-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-mag-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-parallax-new-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-parallax-new-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-parallax-new-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-root-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-root-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-root-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-staple-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-staple-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-store-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-store-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/accesspress-store-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/accio-24f878705cb6e0f5cec5d442fe0259a1.yaml create mode 100644 nuclei-templates/cve-less/themes/accio-one-page-32d2ee023e5c98d46821542b46ed3472.yaml create mode 100644 nuclei-templates/cve-less/themes/accountra-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml create mode 100644 nuclei-templates/cve-less/themes/activello-18df9000e9dcd67d242e383e74bea4f4.yaml create mode 100644 nuclei-templates/cve-less/themes/activello-72ccbc519dc7d87cb6145ad667cfc553.yaml create mode 100644 nuclei-templates/cve-less/themes/activello-860fdeef59df60170db304dfbf6f0b2b.yaml create mode 100644 nuclei-templates/cve-less/themes/activello-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/adifier-b4f8ef061eeaa39684a868f52e5b3f72.yaml create mode 100644 nuclei-templates/cve-less/themes/adifier-system-9ac9653b7778a104c1c015f03f55c35c.yaml create mode 100644 nuclei-templates/cve-less/themes/adifier-system-fc94e531c85615591e0410bbc642dfdf.yaml create mode 100644 nuclei-templates/cve-less/themes/adventure-journal-e75bbb3acde201345699c9ea2b1c0b80.yaml create mode 100644 nuclei-templates/cve-less/themes/affluent-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/agritourismo-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml create mode 100644 nuclei-templates/cve-less/themes/aidreform-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/akal-fe56f2af6a571fb33fc7c4e1b9783967.yaml create mode 100644 nuclei-templates/cve-less/themes/akita-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/themes/allegiant-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/alltuts-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/allure-real-estate-theme-for-placester-972c6f275cedbc5b8ff06bc4a592ad76.yaml create mode 100644 nuclei-templates/cve-less/themes/allure-real-estate-theme-for-real-estate-aa5567043b1aeefa3498402c7cd8a275.yaml create mode 100644 nuclei-templates/cve-less/themes/almera-2df8a8571d64dba2e22b8dd47eadb176.yaml create mode 100644 nuclei-templates/cve-less/themes/almera-b3f6da3b653ea452b8c40472572fa927.yaml create mode 100644 nuclei-templates/cve-less/themes/althea-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/alyeska-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/themes/ambience-0e4a8af0dcec83139d2c5869dc07116c.yaml create mode 100644 nuclei-templates/cve-less/themes/amela-161c9677e95eb847dc432eddc65db142.yaml create mode 100644 nuclei-templates/cve-less/themes/amela-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/amoveo-fc7e66fb4c7bc293f2767aac95e6ae0a.yaml create mode 100644 nuclei-templates/cve-less/themes/amplus-da3e281a5f70bba201afb2a0076933cd.yaml create mode 100644 nuclei-templates/cve-less/themes/anand-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/andyblue-2a9919a2db8ebb02104bc342de5cafa4.yaml create mode 100644 nuclei-templates/cve-less/themes/anfaust-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/anthology-eec950257920134a1e693aabe46a51ab.yaml create mode 100644 nuclei-templates/cve-less/themes/antioch-694a19ed51aeba4709fe5b1bfc70368e.yaml create mode 100644 nuclei-templates/cve-less/themes/antisnews-1eca6946030b47a7e15dbf74278035b1.yaml create mode 100644 nuclei-templates/cve-less/themes/antreas-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/appius-3df99e7d9df14f2aba3c8375eecce88f.yaml create mode 100644 nuclei-templates/cve-less/themes/appius-5f0f9a2a6cce4ecc1bb938245d0aa8e7.yaml create mode 100644 nuclei-templates/cve-less/themes/appointment-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/appzend-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/appzend-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/aquarella-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/arcadian-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/themes/area53-5e5beafa47f3eac0bbc5ba2133fe2f0f.yaml create mode 100644 nuclei-templates/cve-less/themes/arendelle-161c9677e95eb847dc432eddc65db142.yaml create mode 100644 nuclei-templates/cve-less/themes/arendelle-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/arendelle-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/arilewp-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/arrival-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/arrival-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/arrival-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/artificial-intelligence-e655964abfea5d2b4e77a9418e2e0409.yaml create mode 100644 nuclei-templates/cve-less/themes/arya-multipurpose-60f02b355aaa909eb31e9332ca9f9968.yaml create mode 100644 nuclei-templates/cve-less/themes/arya-multipurpose-pro-6d10f2e1e54180210b870dbff144a87b.yaml create mode 100644 nuclei-templates/cve-less/themes/ask-me-1c2da71dac8a1ffb07f1c87e262b5e0e.yaml create mode 100644 nuclei-templates/cve-less/themes/ask-me-3b38633cbeac82c001940cb4aed44709.yaml create mode 100644 nuclei-templates/cve-less/themes/ask-me-b27f19c1380e428266833869dc85c54d.yaml create mode 100644 nuclei-templates/cve-less/themes/ask-me-e8eee7b13f0d955b5b5dd5ba7908051b.yaml create mode 100644 nuclei-templates/cve-less/themes/astore-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/astra-069688784bb13290b6aea0da4a233825.yaml create mode 100644 nuclei-templates/cve-less/themes/astra-4d6ff8c8afd1310bcbc6da555c1c2ca4.yaml create mode 100644 nuclei-templates/cve-less/themes/atahualpa-b8aaeac54a85cc121f7aef5c9dc1b9be.yaml create mode 100644 nuclei-templates/cve-less/themes/atahualpa-e8b1937b8d22149355604761f9e2e597.yaml create mode 100644 nuclei-templates/cve-less/themes/atlast-business-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/attorney-7b1133cf795e5004c4eb6459afb4af96.yaml create mode 100644 nuclei-templates/cve-less/themes/attorney-ac1c1976acfd0aeffc2f834a988bb3ea.yaml create mode 100644 nuclei-templates/cve-less/themes/auberge-5d7be31521ee03a3c41d06e3d9d363f9.yaml create mode 100644 nuclei-templates/cve-less/themes/authentic-4a7a1840571177670b84b0075f0a9a69.yaml create mode 100644 nuclei-templates/cve-less/themes/auto-car-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-003889b218e2b00be9012c017586c0d2.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-45a743f5d162595c13c7d51a595d52ef.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-49fe6661a7e83dfa08fd330a80312c71.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-4a05ae911598dc28de7b72c0be044356.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-51e019b787984ebb59dc9257a3fe25a4.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-855366bc54f67a90854fe071e412ecdb.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-907496c3b43ef59b87d499ec04fd4467.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-9abc850c93257e8269e3f6780cf7c973.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-b6efebccc72344ca35f158202f79667f.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-bb65f92eeb63b478b2f218d634d42a06.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-c75774e4c2c9b9851693b07aeb2b25ad.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-d4d2889c92e76cd2635d3cb3c6eabcdb.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-d882958bab372a69d811837406b3986e.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-e3ee06b08069cc90d373b87f289545a0.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-e6b2cb8bfdcceb721cbe5b7ffbe02c9a.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml create mode 100644 nuclei-templates/cve-less/themes/avada-f93d99515ef4e6bdea2dd530448d23e4.yaml create mode 100644 nuclei-templates/cve-less/themes/avanix-153b374358a4469baf0dcf3e128485d7.yaml create mode 100644 nuclei-templates/cve-less/themes/awake-6f4ec28d470f70401f41d76af77cb887.yaml create mode 100644 nuclei-templates/cve-less/themes/awake-d6c2e6fd9fd0cfab443b5c0a2bd9f57d.yaml create mode 100644 nuclei-templates/cve-less/themes/awpbusinesspress-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/axioma-4dcbb5c4a13afaeaec2eb944e1efc4e0.yaml create mode 100644 nuclei-templates/cve-less/themes/bacola-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml create mode 100644 nuclei-templates/cve-less/themes/balkon-25caf82ba3c3384a973d48ab8eff05a3.yaml create mode 100644 nuclei-templates/cve-less/themes/bani-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/bani-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/themes/barelycorporate-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/themes/bazaar-lite-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/bbe-9d3718684afa0305d0420944743522e1.yaml create mode 100644 nuclei-templates/cve-less/themes/beauty-premium-430614badd7183227eb02d22143e3a52.yaml create mode 100644 nuclei-templates/cve-less/themes/bello-0d1b849fd565592736828b4a54b39135.yaml create mode 100644 nuclei-templates/cve-less/themes/bello-84b15db6be01953ae7e773bc858c3601.yaml create mode 100644 nuclei-templates/cve-less/themes/bello-a5df397db51ff69150f57b2d7f5c09a8.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-0eda30de3bc2dbaa94da2af30caf268c.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-4177059b270800f6cdd2567297565b05.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-4248ab6c48d79553c417ff3c6f6afabd.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-6bcabc3b4e69486405e1172846710922.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-a0089e085e056ad847052764bb440612.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-a02d18d0740894600f021e06a20fd2de.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-c3f3aac4022202f47e3ad7f05ff237dd.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-eef54adf293c01cfcd3711ba2746f5e0.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-f2c966f060ba4e0ec53591e455e174f0.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-f626e9df68cec35c776cf1191c5c3f5d.yaml create mode 100644 nuclei-templates/cve-less/themes/betheme-f83868d3a00a9fcf53648bc46fb152f1.yaml create mode 100644 nuclei-templates/cve-less/themes/big-store-b619e22c55f5ef6d348009289f2fb6f6.yaml create mode 100644 nuclei-templates/cve-less/themes/bingle-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/bingle-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/bingle-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/black-letterhead-530c76ddc7a277b970fa701ca1edf42b.yaml create mode 100644 nuclei-templates/cve-less/themes/blain-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/blaze-902eeda285eff78838cf6ebbc45afd69.yaml create mode 100644 nuclei-templates/cve-less/themes/blessing-d850c5ed075967896003b1b01706f556.yaml create mode 100644 nuclei-templates/cve-less/themes/blix-54409f2bc5984d61c42ec97047d41adc.yaml create mode 100644 nuclei-templates/cve-less/themes/blix-c0b95532030c59fee6c1d3ae2a188201.yaml create mode 100644 nuclei-templates/cve-less/themes/blixed-54409f2bc5984d61c42ec97047d41adc.yaml create mode 100644 nuclei-templates/cve-less/themes/blixkrieg-54409f2bc5984d61c42ec97047d41adc.yaml create mode 100644 nuclei-templates/cve-less/themes/blocksy-07a77988897e3af64d686b49eda84d8d.yaml create mode 100644 nuclei-templates/cve-less/themes/blocksy-0ec4296664350dc8ee374e0d44043428.yaml create mode 100644 nuclei-templates/cve-less/themes/blocksy-924efae616f0032d8047ad716d24a484.yaml create mode 100644 nuclei-templates/cve-less/themes/blocksy-9f5f23c716774bbd462d447842ecf871.yaml create mode 100644 nuclei-templates/cve-less/themes/blocksy-bc2b1b1b8cc260b904b43a53b27b1dc7.yaml create mode 100644 nuclei-templates/cve-less/themes/blocksy-db7f8fed7cd5746da95374c4a1d925a5.yaml create mode 100644 nuclei-templates/cve-less/themes/bloger-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/bloger-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/bloger-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/blogger-buzz-e5b5400c624e25843b2372f9abb89d26.yaml create mode 100644 nuclei-templates/cve-less/themes/blooog-v1.1-e7c3ee180660fac9fead4fadabb98bef.yaml create mode 100644 nuclei-templates/cve-less/themes/blossom-spa-a9b48fe75d8b0cb9e851b9c9fd985412.yaml create mode 100644 nuclei-templates/cve-less/themes/blue-memories-f021202130cf5324996d350595ae862c.yaml create mode 100644 nuclei-templates/cve-less/themes/boldy-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/bolster-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/bonkers-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/bordeaux-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml create mode 100644 nuclei-templates/cve-less/themes/brain-power-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/brand-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/brand-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/themes/bricks-006e2e470c53d4a4e5eb56e28322392e.yaml create mode 100644 nuclei-templates/cve-less/themes/bricks-76570c8af26fd8add3788aed77d646fa.yaml create mode 100644 nuclei-templates/cve-less/themes/bricks-8d874ea95f55c0ec9bb8e08a17ec4807.yaml create mode 100644 nuclei-templates/cve-less/themes/bridge-24af70f4d05b151741440482fab416b5.yaml create mode 100644 nuclei-templates/cve-less/themes/bridge-c39e88fb98a263a4718fa22351cd75a3.yaml create mode 100644 nuclei-templates/cve-less/themes/brightbox-de6a8f71d54a21ca8a8ec790aa7c8445.yaml create mode 100644 nuclei-templates/cve-less/themes/brilliance-72ccbc519dc7d87cb6145ad667cfc553.yaml create mode 100644 nuclei-templates/cve-less/themes/brilliance-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/brilliance-ee1a1b54258e473972fcc31462b15e8f.yaml create mode 100644 nuclei-templates/cve-less/themes/brisk-2ab21e22bdca9635ce4e964a4031d548.yaml create mode 100644 nuclei-templates/cve-less/themes/brite-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/broadcast-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/broadscope-30fe39ec377fc6748bfe3566282b5413.yaml create mode 100644 nuclei-templates/cve-less/themes/brooklyn-145399e0c7a9d439e5ba93f1ed497004.yaml create mode 100644 nuclei-templates/cve-less/themes/brooklyn-fb3df7b0090a05c3bb2c9600778e1c86.yaml create mode 100644 nuclei-templates/cve-less/themes/brovy-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/brovy-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/brovy-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/buddyboss-theme-ab3814e3ae070036041f3fc37ac29f36.yaml create mode 100644 nuclei-templates/cve-less/themes/builderchild-depot-2e6c4db554765f15e335810f248cb790.yaml create mode 100644 nuclei-templates/cve-less/themes/builderchild-market-493e804a1e5431f2ca50d457edc4b8eb.yaml create mode 100644 nuclei-templates/cve-less/themes/bulteno-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml create mode 100644 nuclei-templates/cve-less/themes/bunnypresslite-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/busicare-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/business-pro-958193ceafe9fa46f427a02590b8676e.yaml create mode 100644 nuclei-templates/cve-less/themes/businessexpo-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/businesswp-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/busiprof-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/buzzstore-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/buzzstore-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/cactus-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/cafe-bistro-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/cakifo-02d6de68e2eb0c0f7215999509c086c8.yaml create mode 100644 nuclei-templates/cve-less/themes/calliope-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/canvas-41077f62819cf65dd71bfb4c6e199325.yaml create mode 100644 nuclei-templates/cve-less/themes/car-repair-service-619d74f5efad50bb0716462ce5537ea9.yaml create mode 100644 nuclei-templates/cve-less/themes/cardealer-77435d9114ce158ef3aadb96d9fd0449.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-0b2658951b7cfc28db2aef3263c845a3.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-0cc827bd1e5b71473ebe52fdbadbc377.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-2f7c99cf9aa6337e1f437507a7c03dd4.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-6e465dc97257e1344df72e8224803afb.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-70111aaef33d8dec5c55f5b989914270.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-89809dfbca4560d57d80e19c74e319fc.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-93a5155d0c6c821f6dac512fe074d8b8.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-d814bf89eef506e207923233b9147995.yaml create mode 100644 nuclei-templates/cve-less/themes/careerfy-f287f6d03ce957fcb674730856528833.yaml create mode 100644 nuclei-templates/cve-less/themes/careerup-3dadecf90476b3cb59a265c7ae6d0c01.yaml create mode 100644 nuclei-templates/cve-less/themes/careplus-ead8215e6f4d6c583e6aa46b74460457.yaml create mode 100644 nuclei-templates/cve-less/themes/carspot-67f647f4edf0dc956943ef2a579b4258.yaml create mode 100644 nuclei-templates/cve-less/themes/carspot-8b93cde54b567f48c75c8a61eb4877a4.yaml create mode 100644 nuclei-templates/cve-less/themes/carspot-a1557c2cdb71bc0d86215f36aee8a08b.yaml create mode 100644 nuclei-templates/cve-less/themes/caulk-d57e6f59d0c7b9d3a924383e2c688a1c.yaml create mode 100644 nuclei-templates/cve-less/themes/chameleon-39069bbb190265d3be495e952f317246.yaml create mode 100644 nuclei-templates/cve-less/themes/chankhe-cf02434258a49a4a00aa24a96c05817d.yaml create mode 100644 nuclei-templates/cve-less/themes/choices-8f802c8a8b5a882c2b86d1de293231a6.yaml create mode 100644 nuclei-templates/cve-less/themes/churchope-1a60867207919ae0076f781fa334aeef.yaml create mode 100644 nuclei-templates/cve-less/themes/citybook-17f6998fdf35be8a6349776a3309aedc.yaml create mode 100644 nuclei-templates/cve-less/themes/citybook-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml create mode 100644 nuclei-templates/cve-less/themes/citybook-a31de8d5a2ca016a785502d82ebaaa83.yaml create mode 100644 nuclei-templates/cve-less/themes/citybook-be3f332add5d9ce678efc86e37a29e03.yaml create mode 100644 nuclei-templates/cve-less/themes/citybook-f5204789b3d63c1e5dd223fef5d1ac5d.yaml create mode 100644 nuclei-templates/cve-less/themes/citylogic-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/classic-7cba36ac5159d909041a39ae02e640fa.yaml create mode 100644 nuclei-templates/cve-less/themes/classima-94f85d394521a13053659cf48cf14634.yaml create mode 100644 nuclei-templates/cve-less/themes/classipress-376edc97e45ef94c79a753de3d636245.yaml create mode 100644 nuclei-templates/cve-less/themes/clockstone-1fd636290ae799c72ab0c32a97e71316.yaml create mode 100644 nuclei-templates/cve-less/themes/clotya-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml create mode 100644 nuclei-templates/cve-less/themes/cloudpress-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/club-theme-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/coalition-fb64a0398d930ef57cb315100ba26973.yaml create mode 100644 nuclei-templates/cve-less/themes/coldfusion-01b7472afbbdd4ea1b26eb8768b12686.yaml create mode 100644 nuclei-templates/cve-less/themes/colibri-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/colibri-wp-7b784615e846271087f6cdcbcbcd3d70.yaml create mode 100644 nuclei-templates/cve-less/themes/college-4790b4ad8b25152cb39533647a69d638.yaml create mode 100644 nuclei-templates/cve-less/themes/colorbold-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/colormag-15626a5f31201ec9a6bcc2f5d39038c5.yaml create mode 100644 nuclei-templates/cve-less/themes/colormag-be833eb15318e91b50173179ef1ced63.yaml create mode 100644 nuclei-templates/cve-less/themes/colormix-b4955c7ae6a4cb6cbe657aa114b2de30.yaml create mode 100644 nuclei-templates/cve-less/themes/colornews-a2599bd3c91638fd59172f5a65248fdd.yaml create mode 100644 nuclei-templates/cve-less/themes/colorway-0b548a7717c352b81e5b3026850fe79e.yaml create mode 100644 nuclei-templates/cve-less/themes/colorway-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/colorway-eec026409b2ce5ae4162f07361f714bc.yaml create mode 100644 nuclei-templates/cve-less/themes/commodore-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/themes/construct-80688e6bb1e67826e5659821551b9b07.yaml create mode 100644 nuclei-templates/cve-less/themes/construct-e0af7f9c14f46c6865579ec474c8422f.yaml create mode 100644 nuclei-templates/cve-less/themes/construction-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/construction-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/construction-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/consultera-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/consultpress-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/consultpress-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/themes/consultstreet-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/cordobo-green-park-c96b02624922c50381a023e57cd89cf7.yaml create mode 100644 nuclei-templates/cve-less/themes/corona-6fd6dbbc58f038d409e478e2b51e5038.yaml create mode 100644 nuclei-templates/cve-less/themes/corsa-32eb01ee606ecc19d89dc769776b1c92.yaml create mode 100644 nuclei-templates/cve-less/themes/cosmetsy-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml create mode 100644 nuclei-templates/cve-less/themes/couponis-demo-7ffc401b1ac82b8be2938971d08cc9fb.yaml create mode 100644 nuclei-templates/cve-less/themes/cover-wp-ab5cb4980d96d0502a1385c5c51d0ea4.yaml create mode 100644 nuclei-templates/cve-less/themes/covertvideopress-99dafceb50253393d9ffc3281335a6c4.yaml create mode 100644 nuclei-templates/cve-less/themes/craft-blog-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/craft-blog-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/cream-blog-3f03bc4b4b5619e488422c5b9dbcc730.yaml create mode 100644 nuclei-templates/cve-less/themes/crius-d78e7652648c0b8a881a39d5a0a824ec.yaml create mode 100644 nuclei-templates/cve-less/themes/cstardesign-8c50ec7bbb214484280a482bec76837e.yaml create mode 100644 nuclei-templates/cve-less/themes/cuisine-palace-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/curvo-d59f1cca77e5c81eb993686d3bfbe443.yaml create mode 100644 nuclei-templates/cve-less/themes/custom-community-35e7becde59fc0889fa433fc22f8f1b5.yaml create mode 100644 nuclei-templates/cve-less/themes/customizr-019dda7346a94447f0c3df91572a74eb.yaml create mode 100644 nuclei-templates/cve-less/themes/dagda-9a0a697c12153160f55b76aada0a723e.yaml create mode 100644 nuclei-templates/cve-less/themes/dailydeal-52cc2ef9a6c2df75495af02a2e660264.yaml create mode 100644 nuclei-templates/cve-less/themes/dailydeal-ba59ebce085f3da1439c5ad1f6fdb637.yaml create mode 100644 nuclei-templates/cve-less/themes/dailyedition-460c948e3348c2b843b63d20f8149eb1.yaml create mode 100644 nuclei-templates/cve-less/themes/dailyedition-6bdfdbb30005886703826f665471e962.yaml create mode 100644 nuclei-templates/cve-less/themes/dailyedition-c2529ec5eebcb070f1d2933f71c24b9b.yaml create mode 100644 nuclei-templates/cve-less/themes/daisho-6c37ed5f01e697fababa0d98a125cf7e.yaml create mode 100644 nuclei-templates/cve-less/themes/dandelion-186e0de3e300f22fb53b3c68716d1f21.yaml create mode 100644 nuclei-templates/cve-less/themes/darcie-88f76b0fbecb245eab5d377f2510f527.yaml create mode 100644 nuclei-templates/cve-less/themes/deep-blue-6d8163753ad1f1a6cf7ea136432e8e62.yaml create mode 100644 nuclei-templates/cve-less/themes/default-mag-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/dejavu-76a4f53242c3d8ade723708cc7f5a953.yaml create mode 100644 nuclei-templates/cve-less/themes/dejavu-be169372bbe2ce4f8eada3564b525f9e.yaml create mode 100644 nuclei-templates/cve-less/themes/designexo-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/designfolio-plus-3724085b216ee48b2a3bc8286f400ae9.yaml create mode 100644 nuclei-templates/cve-less/themes/designpile-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/diary-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/digital-agency-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/digital-agency-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/digital-agency-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/digital-store-f5fc5bca6e41d90a9454914bbfeeafc7.yaml create mode 100644 nuclei-templates/cve-less/themes/dignitas-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml create mode 100644 nuclei-templates/cve-less/themes/dimension-033d028c8d102a833af4770e22a7e5b6.yaml create mode 100644 nuclei-templates/cve-less/themes/diplomat-c41f2615174c7d773c4d8f292dfcd2a3.yaml create mode 100644 nuclei-templates/cve-less/themes/discy-3cce740c3da6d548d8d19689826c4cf1.yaml create mode 100644 nuclei-templates/cve-less/themes/discy-46244fdcad0724fd77e42ba287d7514a.yaml create mode 100644 nuclei-templates/cve-less/themes/discy-dda12396183ee405a0b6804083230616.yaml create mode 100644 nuclei-templates/cve-less/themes/discy-e286b3a8935bca8a0217c3e2e8d64e5c.yaml create mode 100644 nuclei-templates/cve-less/themes/divi-1ea409fe86fe5baf6c5d95a328e05b6b.yaml create mode 100644 nuclei-templates/cve-less/themes/divi-344bde3518beec69cf32525065cbb92a.yaml create mode 100644 nuclei-templates/cve-less/themes/divi-4f3dfe26281afe74af18534af8dcf024.yaml create mode 100644 nuclei-templates/cve-less/themes/divi-aabb704338c74a997901edf2f42d1b76.yaml create mode 100644 nuclei-templates/cve-less/themes/divi-e37e5d73321c4c6eb17ee3379b565090.yaml create mode 100644 nuclei-templates/cve-less/themes/divi-ec458e7be91893393a96a7bb4f01d557.yaml create mode 100644 nuclei-templates/cve-less/themes/doko-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/doko-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/doko-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-chocolate-042613decef34429d197e1051e8a6f20.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-chocolate-42cb0128fedfa4377c3f29de3cf2cb68.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-chocolate-8c6baf342080d67dd1da781b7c2fdff0.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-chocolate-daa315fbfc85fdf58446d6f8b56cda97.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-chocolate-dcee3b9f11fc1725f690a44de458561d.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-chocolate-e1c40eb25b51b97676a5f939865df658.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-chocolate-fbae7b535aa5c352a8744c22c013bc35.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-the7-0086334fa92fba62187d0290e70cdbe7.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-the7-95d424216e84379eaaf681135f0af62a.yaml create mode 100644 nuclei-templates/cve-less/themes/dt-the7-c2a573da80f21ade51e0477e5d127224.yaml create mode 100644 nuclei-templates/cve-less/themes/easybook-17f6998fdf35be8a6349776a3309aedc.yaml create mode 100644 nuclei-templates/cve-less/themes/easybook-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml create mode 100644 nuclei-templates/cve-less/themes/easybook-be3f332add5d9ce678efc86e37a29e03.yaml create mode 100644 nuclei-templates/cve-less/themes/easybook-f5204789b3d63c1e5dd223fef5d1ac5d.yaml create mode 100644 nuclei-templates/cve-less/themes/ebiz-153b374358a4469baf0dcf3e128485d7.yaml create mode 100644 nuclei-templates/cve-less/themes/echelon-61d6bd39a6e6d20f6024207c6900ca16.yaml create mode 100644 nuclei-templates/cve-less/themes/echelon-9de2929d93f53a09f4c6d8d87f325131.yaml create mode 100644 nuclei-templates/cve-less/themes/echelon-f473a45e54915af6da4e96437d244f3c.yaml create mode 100644 nuclei-templates/cve-less/themes/ecobiz-153b374358a4469baf0dcf3e128485d7.yaml create mode 100644 nuclei-templates/cve-less/themes/edge-48efc81cbefdf18882ef324fd2ff057b.yaml create mode 100644 nuclei-templates/cve-less/themes/edict-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/edict-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/edict-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/editorialmag-3220945a9ad1b5aa7c5c294cafd443a6.yaml create mode 100644 nuclei-templates/cve-less/themes/educenter-8b501a3e440ee475a390c14b78d1469e.yaml create mode 100644 nuclei-templates/cve-less/themes/eight-sec-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/eight-sec-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/eight-sec-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/eightlaw-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/eightlaw-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/eightlaw-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/eightmedi-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/eightmedi-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/eightmedi-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/eightstore-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/eightstore-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/eightstore-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/elasta-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/elation-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/elegance-2d5cfa75ccec0b7d6ce43b488e635fe7.yaml create mode 100644 nuclei-templates/cve-less/themes/elegance-93d95b14737baf6796a29212125f2e59.yaml create mode 100644 nuclei-templates/cve-less/themes/elegant-grunge-0aff17e28ef121a8c519ec81ffed16b1.yaml create mode 100644 nuclei-templates/cve-less/themes/elemin-7b82f3d715a6e6e5e86a24db471b8d19.yaml create mode 100644 nuclei-templates/cve-less/themes/elevate-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/elitepress-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/emmet-lite-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/enfold-1876a4c168f4df4e89e5c4309cb04275.yaml create mode 100644 nuclei-templates/cve-less/themes/enfold-35b352df5d14bf9606b8ec800fc7030c.yaml create mode 100644 nuclei-templates/cve-less/themes/enfold-4e11cfef06ec2642923cf28426346ef9.yaml create mode 100644 nuclei-templates/cve-less/themes/enfold-ed5e4871114b7f75ca3b625c577f01e9.yaml create mode 100644 nuclei-templates/cve-less/themes/enlighten-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/enlighten-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/enlighten-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/envo-business-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/epic-church-7968590f04797f892b64c6624bb7ba86.yaml create mode 100644 nuclei-templates/cve-less/themes/eptonic-4d35df14ccd9eab621208a42de471fff.yaml create mode 100644 nuclei-templates/cve-less/themes/esplanade-a255ef8b2471d464b72404fea528ca4b.yaml create mode 100644 nuclei-templates/cve-less/themes/essence-cf3f8795f333a75c5fe6e390bdbbdfce.yaml create mode 100644 nuclei-templates/cve-less/themes/estrutura-basica-f89b8b2276b119437fe5d13da6f29ea1.yaml create mode 100644 nuclei-templates/cve-less/themes/euclid-a6caef4d4eacfb6278b4d425ef54c643.yaml create mode 100644 nuclei-templates/cve-less/themes/eunice-cca0a1d963a9d045f5815fda1ac1ee73.yaml create mode 100644 nuclei-templates/cve-less/themes/eunoia-457ebe36f8d645741bdfd0b59a49af7e.yaml create mode 100644 nuclei-templates/cve-less/themes/eventpress-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/everest-news-3f03bc4b4b5619e488422c5b9dbcc730.yaml create mode 100644 nuclei-templates/cve-less/themes/everest-news-47a3d5ecf22b909cbf2d50dac0698416.yaml create mode 100644 nuclei-templates/cve-less/themes/everest-news-pro-006ac377302a554decdd04aa7ce724fd.yaml create mode 100644 nuclei-templates/cve-less/themes/everse-161c9677e95eb847dc432eddc65db142.yaml create mode 100644 nuclei-templates/cve-less/themes/everse-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/evolve-170bc795059fb0d98227f8d8677e21e8.yaml create mode 100644 nuclei-templates/cve-less/themes/explicit-3af6c2ccbc49fd7ac785ee1caf9ff348.yaml create mode 100644 nuclei-templates/cve-less/themes/expose-f1706f372daa69509bea2f9b5da810d7.yaml create mode 100644 nuclei-templates/cve-less/themes/exquisite-wp-4569fe83ce2bb42a6e266298e47ccef7.yaml create mode 100644 nuclei-templates/cve-less/themes/extra-1d46fd13f5959cf6806058064008bc68.yaml create mode 100644 nuclei-templates/cve-less/themes/extra-344bde3518beec69cf32525065cbb92a.yaml create mode 100644 nuclei-templates/cve-less/themes/extra-4f3dfe26281afe74af18534af8dcf024.yaml create mode 100644 nuclei-templates/cve-less/themes/extra-aabb704338c74a997901edf2f42d1b76.yaml create mode 100644 nuclei-templates/cve-less/themes/extra-ec458e7be91893393a96a7bb4f01d557.yaml create mode 100644 nuclei-templates/cve-less/themes/f8-lite-e63ed950312b124c0d59757ed157173d.yaml create mode 100644 nuclei-templates/cve-less/themes/famous-cf7f4b2a43d36048518c3a15a6b1e9fb.yaml create mode 100644 nuclei-templates/cve-less/themes/fascinate-3f03bc4b4b5619e488422c5b9dbcc730.yaml create mode 100644 nuclei-templates/cve-less/themes/feather12-97973544cebecee841ad830cbe28916b.yaml create mode 100644 nuclei-templates/cve-less/themes/felici-83462ab31c23510cbb4ed4293c5a8d88.yaml create mode 100644 nuclei-templates/cve-less/themes/felici-f938ed44289b5e0945ae989fccd9132d.yaml create mode 100644 nuclei-templates/cve-less/themes/fifteen-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/financio-5f8311aafd1822576a08e6d0d9e190d6.yaml create mode 100644 nuclei-templates/cve-less/themes/findgo-ea09594aa9ec08768edd559eabb04c79.yaml create mode 100644 nuclei-templates/cve-less/themes/findus-cfc50a0804539ff785925571caba914b.yaml create mode 100644 nuclei-templates/cve-less/themes/fitness-park-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/fitness-park-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/flashlight-9ffe40ed2860214fb806a94be92be5e0.yaml create mode 100644 nuclei-templates/cve-less/themes/flashnews-64c7d7601684303a62306dcc7a67e144.yaml create mode 100644 nuclei-templates/cve-less/themes/flashy-8fedd556095791de1de8cc0522ea9441.yaml create mode 100644 nuclei-templates/cve-less/themes/flatsome-77106c0ccdc78c4aab3d70ea99b49ace.yaml create mode 100644 nuclei-templates/cve-less/themes/flatsome-87cfaaeceb9c0891333268e59bdaed28.yaml create mode 100644 nuclei-templates/cve-less/themes/focusblog-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/focusblog-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/folo-50f6ed0722c7403f0c0ea86b6df7e2ff.yaml create mode 100644 nuclei-templates/cve-less/themes/foodbakery-2687b8db8bc7e715cc5827b0aedae5fd.yaml create mode 100644 nuclei-templates/cve-less/themes/foodbakery-db1c237e9a78f54d168253b3ad75c0f7.yaml create mode 100644 nuclei-templates/cve-less/themes/footysquare-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/fotography-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/fotography-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/fotography-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/fraction-theme-57b3e170776f796da541bc1640675353.yaml create mode 100644 nuclei-templates/cve-less/themes/freesia-empire-81558dbfc1c686b52278115bcc212692.yaml create mode 100644 nuclei-templates/cve-less/themes/fruitful-547ae69e23e79945ee41118869bf3151.yaml create mode 100644 nuclei-templates/cve-less/themes/fruitful-80477eee43f78931347fee8d51f74e47.yaml create mode 100644 nuclei-templates/cve-less/themes/furnob-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml create mode 100644 nuclei-templates/cve-less/themes/fushion-theme-33dcd77e5c96a0f6e337bee86a58383b.yaml create mode 100644 nuclei-templates/cve-less/themes/fushion-theme-fd188ab37a40c68b931d58403248c27a.yaml create mode 100644 nuclei-templates/cve-less/themes/fusion-delisted-50500b0da9551f89249fc057d52b16ad.yaml create mode 100644 nuclei-templates/cve-less/themes/gameplan-d95348460c662925b6cdc57ffd4469ba.yaml create mode 100644 nuclei-templates/cve-less/themes/gamestheme-999d17b4d58bf12011698692c265aa6e.yaml create mode 100644 nuclei-templates/cve-less/themes/geomagazine-f81807c8cf5504e6b638b35df7a4314b.yaml create mode 100644 nuclei-templates/cve-less/themes/geoplaces4-2c537d66a4c6bad8d1c1a1ad47705253.yaml create mode 100644 nuclei-templates/cve-less/themes/geoplaces4beta-2c537d66a4c6bad8d1c1a1ad47705253.yaml create mode 100644 nuclei-templates/cve-less/themes/ghost-0338317a9be20261847acad2da4f5a91.yaml create mode 100644 nuclei-templates/cve-less/themes/glaze-blog-lite-3f03bc4b4b5619e488422c5b9dbcc730.yaml create mode 100644 nuclei-templates/cve-less/themes/golo-1089e240eda4d80561f1b8e6010e3ce7.yaml create mode 100644 nuclei-templates/cve-less/themes/goodnex-43e8debd4c3b7f8c8ab3ef6be25475c7.yaml create mode 100644 nuclei-templates/cve-less/themes/goto-442aecad9b46601423fcf0fe82256c7f.yaml create mode 100644 nuclei-templates/cve-less/themes/goto-4847183a2bd6b773eb419ec6d2799ae7.yaml create mode 100644 nuclei-templates/cve-less/themes/goto-e8d662d192f7e80a8946662a46a27738.yaml create mode 100644 nuclei-templates/cve-less/themes/graphene-3f304f35d6ee539a7dae259777309bd7.yaml create mode 100644 nuclei-templates/cve-less/themes/greenmart-b4cada853b7b3a733e2f6bbdfd522497.yaml create mode 100644 nuclei-templates/cve-less/themes/greenmart-dd0aba2b8bd6fc74a58e5b1a3acae9cd.yaml create mode 100644 nuclei-templates/cve-less/themes/gridsby-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/grimag-faa38012dd533ba54ed31853b5a52271.yaml create mode 100644 nuclei-templates/cve-less/themes/gucherry-blog-48870272d1c6df07d927cc89f91930ec.yaml create mode 100644 nuclei-templates/cve-less/themes/happenstance-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/hashone-06cd0f178ae533c7b94126d052d17b3f.yaml create mode 100644 nuclei-templates/cve-less/themes/hashone-d566c0816c38ea6ca24760850c1eaf4a.yaml create mode 100644 nuclei-templates/cve-less/themes/hasium-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/hasten-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/headway-27ec034aba5d4951c82cebc35f1cf5b5.yaml create mode 100644 nuclei-templates/cve-less/themes/hello-elementor-5aee783cc8ced806fe0ecf20e182e607.yaml create mode 100644 nuclei-templates/cve-less/themes/himer-dda12396183ee405a0b6804083230616.yaml create mode 100644 nuclei-templates/cve-less/themes/holding_pattern-5970a067cb1dc2fa3e954c8bf2cf2b8e.yaml create mode 100644 nuclei-templates/cve-less/themes/homesweet-5804396a1d6a8f486bc1aec9d443ab22.yaml create mode 100644 nuclei-templates/cve-less/themes/homevillas-real-estate-437a2bdda5608892f1a5bb69f6ded0f0.yaml create mode 100644 nuclei-templates/cve-less/themes/honeypress-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/houzez-7f368981191f0cf6c7a56557a4488185.yaml create mode 100644 nuclei-templates/cve-less/themes/houzez-a707f28c337bd9658c006013182d7d8f.yaml create mode 100644 nuclei-templates/cve-less/themes/houzez-f04b27db24cc3e0ca67ee5594c5f4107.yaml create mode 100644 nuclei-templates/cve-less/themes/hueman-59b839d07dc6fe1d9770afd5dab3f742.yaml create mode 100644 nuclei-templates/cve-less/themes/hugo-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/hybrid-e0526e94c953cbf63946457c72f3fcad.yaml create mode 100644 nuclei-templates/cve-less/themes/i-excel-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/i-max-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/ignition-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/ignition-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/ih-business-pro-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/illdy-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/iloveit-434d2b681ad27e0586b6012fe3acb7bd.yaml create mode 100644 nuclei-templates/cve-less/themes/imperial-fairytale-1f96e011e88f8f33ff0ebc9d331187dd.yaml create mode 100644 nuclei-templates/cve-less/themes/infocus-c7028a8b7ddad37c6ed248c7eae283ef.yaml create mode 100644 nuclei-templates/cve-less/themes/infocus-e5d8148f1234029a0a9a4eed3ccbe249.yaml create mode 100644 nuclei-templates/cve-less/themes/injob-92767dd3ccfd3becf3c7e6ba2eae227b.yaml create mode 100644 nuclei-templates/cve-less/themes/injob-ef882ef3da26fd11db1b83d92b970da3.yaml create mode 100644 nuclei-templates/cve-less/themes/intrace-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml create mode 100644 nuclei-templates/cve-less/themes/intrepidity-a725115e3c0edf17f7d3885d6b810646.yaml create mode 100644 nuclei-templates/cve-less/themes/invento-632fa81c7cda7a0da5783abd37b66f4c.yaml create mode 100644 nuclei-templates/cve-less/themes/ithemes-mobile-fa869fa1b9881b5f13b3949335d2518c.yaml create mode 100644 nuclei-templates/cve-less/themes/ithemes2-896b6e6e64eabb6a52a6556daf8cafc3.yaml create mode 100644 nuclei-templates/cve-less/themes/jannah-073caac98b397aafa1ef62965d38c4a4.yaml create mode 100644 nuclei-templates/cve-less/themes/jannah-6edf86dbe6ca8c2373758418bafd3a5c.yaml create mode 100644 nuclei-templates/cve-less/themes/javo-spot-f1d47f939b2f1e86782042bfd4182287.yaml create mode 100644 nuclei-templates/cve-less/themes/jetapo-59597a1103eb0e1b65ccc3450fe7b191.yaml create mode 100644 nuclei-templates/cve-less/themes/jetapo-with-woocommerce-59597a1103eb0e1b65ccc3450fe7b191.yaml create mode 100644 nuclei-templates/cve-less/themes/jewelry-store-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/jnews-9eec149d26b5525f47c83e62d5178cba.yaml create mode 100644 nuclei-templates/cve-less/themes/jobcareer-24ed2c04cbd73f5247d8f86d829c0936.yaml create mode 100644 nuclei-templates/cve-less/themes/jobeleon-wpjobboard-d4c3b2bb6cecd391eb07e1531f6f5e45.yaml create mode 100644 nuclei-templates/cve-less/themes/jobroller-39f6c4b040b9b850cb80b837122e7ddf.yaml create mode 100644 nuclei-templates/cve-less/themes/journalcrunch-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/jumpstart-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/themes/jupiter-25e01eb0a9bc2abfaf531fab30be9b46.yaml create mode 100644 nuclei-templates/cve-less/themes/jupiter-2fbd93f620678f9df8d36f97616c7078.yaml create mode 100644 nuclei-templates/cve-less/themes/jupiter-f3750481cefda659186282ffd61f21aa.yaml create mode 100644 nuclei-templates/cve-less/themes/jupiterx-0fb4e97ee7da5e51631d72f53857a9d4.yaml create mode 100644 nuclei-templates/cve-less/themes/jupiterx-25e01eb0a9bc2abfaf531fab30be9b46.yaml create mode 100644 nuclei-templates/cve-less/themes/jupiterx-427edef992d7f7fdd62c26fd579e2341.yaml create mode 100644 nuclei-templates/cve-less/themes/kathmag-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/kathmag-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/kernel-theme-3391cd9b7f891216e1287f590b982c8e.yaml create mode 100644 nuclei-templates/cve-less/themes/kiddo-02553228cdf9d241cd10c1636838398f.yaml create mode 100644 nuclei-templates/cve-less/themes/kingcabs-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/kingcabs-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/kingclub-theme-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/konzept-0f4251fd59b25576860e082b19c2ffec.yaml create mode 100644 nuclei-templates/cve-less/themes/konzept-181dd35c27fd1dd79209b58840d41cab.yaml create mode 100644 nuclei-templates/cve-less/themes/konzept-1af4e5a51ec83381dbc6ba8e121a6437.yaml create mode 100644 nuclei-templates/cve-less/themes/kormosala-7050f0ff8d99b81263bff6c6e7cb2702.yaml create mode 100644 nuclei-templates/cve-less/themes/lattice-a3693c90a0060afc06ae1758aa95f75e.yaml create mode 100644 nuclei-templates/cve-less/themes/lawyerpress-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/learnmore-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/lightning-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/lightspeed-0925bd2ba6dd2e41532d1726d441e4b1.yaml create mode 100644 nuclei-templates/cve-less/themes/listeo-27a371efed383b3d1ada42fe51a20c93.yaml create mode 100644 nuclei-templates/cve-less/themes/listeo-328e4f3efad73259f1eb9967e17030cd.yaml create mode 100644 nuclei-templates/cve-less/themes/listingo-fa1aa4f0aefa698e79145595ae3e2cba.yaml create mode 100644 nuclei-templates/cve-less/themes/listingpro-150cb95f9f40b2e120f1867ef595a1a2.yaml create mode 100644 nuclei-templates/cve-less/themes/listingpro-5ff88083e32bfbabf7c17c2a2829921d.yaml create mode 100644 nuclei-templates/cve-less/themes/listingpro-7cb74951ec30df91b0363483bf7bb394.yaml create mode 100644 nuclei-templates/cve-less/themes/listingpro-9db9bcd8fc228077bf75d34eb26eccd1.yaml create mode 100644 nuclei-templates/cve-less/themes/listingpro-a7a54e981c91a31a82ea2b30647ffe08.yaml create mode 100644 nuclei-templates/cve-less/themes/listingpro-e612ae5fb8c05a8c56c1d21cf4568559.yaml create mode 100644 nuclei-templates/cve-less/themes/lote27-c9225a68a3d87aec89e9b458c0c8c07e.yaml create mode 100644 nuclei-templates/cve-less/themes/lovetravel-5762e5f00074e74d1c85e81e663d8bab.yaml create mode 100644 nuclei-templates/cve-less/themes/lovetravel-9bd39b890f49a9e6a22c3a473a09195d.yaml create mode 100644 nuclei-templates/cve-less/themes/luxe-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/luxe-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/machic-core-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml create mode 100644 nuclei-templates/cve-less/themes/machic-core-126a4deb066c34b8dce5df40cd3bb8ed.yaml create mode 100644 nuclei-templates/cve-less/themes/magazine-basic-714780fca2f8a2a618fef942f7783415.yaml create mode 100644 nuclei-templates/cve-less/themes/magazine-edge-f5a034fa03b4780f360af411f657fb5a.yaml create mode 100644 nuclei-templates/cve-less/themes/magnitudo-f6413facd40fa44bc0324df507036203.yaml create mode 100644 nuclei-templates/cve-less/themes/make_a_statement-0cec5a6d0e834430dc98d58d37f70832.yaml create mode 100644 nuclei-templates/cve-less/themes/malmonation-4ff647a98759fdf657abd921475d51de.yaml create mode 100644 nuclei-templates/cve-less/themes/materialis-30dc0670053ac012aae9f0b808f32600.yaml create mode 100644 nuclei-templates/cve-less/themes/medibazar-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml create mode 100644 nuclei-templates/cve-less/themes/medical-heed-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/medical-heed-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/mediciti-lite-90a7b869d3e2a4d7bc3ba6fed7e1b85c.yaml create mode 100644 nuclei-templates/cve-less/themes/mediciti-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/medikaid-161c9677e95eb847dc432eddc65db142.yaml create mode 100644 nuclei-templates/cve-less/themes/mediumishh-8ddcc8df3c11e4879c7d118b2a205450.yaml create mode 100644 nuclei-templates/cve-less/themes/medzone-lite-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/meridia-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/meris-7905993a7c5a7f25cd0e632ebe3eba34.yaml create mode 100644 nuclei-templates/cve-less/themes/mesmerize-30dc0670053ac012aae9f0b808f32600.yaml create mode 100644 nuclei-templates/cve-less/themes/method-a68321afd1de998e2bc90487dbfd6089.yaml create mode 100644 nuclei-templates/cve-less/themes/method-c6de20b984de470bf1d127432900931e.yaml create mode 100644 nuclei-templates/cve-less/themes/metrostore-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/metrostore-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/minus-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/minus-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/mocho-blog-0eeb168325aaf2fd5bb4eb1250e0882d.yaml create mode 100644 nuclei-templates/cve-less/themes/modern-51ba94283b04aa5998cb156cf18689aa.yaml create mode 100644 nuclei-templates/cve-less/themes/modular-5bcd37ce85991177fef2e23e81673c5b.yaml create mode 100644 nuclei-templates/cve-less/themes/modular-77c188b4a0a9e7f3fd38cd17c193fd8f.yaml create mode 100644 nuclei-templates/cve-less/themes/monalisa-4ce9a104251b3ec9c1a2e0db4f305096.yaml create mode 100644 nuclei-templates/cve-less/themes/moneymasters-28442395b27b7c2fb7b0b1c99993c0cc.yaml create mode 100644 nuclei-templates/cve-less/themes/moneytheme-01c4d40fcdab41e37ee61c249a61b9a0.yaml create mode 100644 nuclei-templates/cve-less/themes/moneytheme-4cf0d4bb064447613ec145a23104c84a.yaml create mode 100644 nuclei-templates/cve-less/themes/monolit-3b0c578afae8e4197f9fa7776b2f418c.yaml create mode 100644 nuclei-templates/cve-less/themes/montezuma-4261580e84ae15728409e95c26688958.yaml create mode 100644 nuclei-templates/cve-less/themes/morning-coffee-59015ab41c28db2b3674f30b01c20313.yaml create mode 100644 nuclei-templates/cve-less/themes/motor-cf765c7372b51ee3e57db42cf2ef8936.yaml create mode 100644 nuclei-templates/cve-less/themes/mtheme-unus-3ca22e0c044d3496c6201e10375e41b4.yaml create mode 100644 nuclei-templates/cve-less/themes/mtheme-unus-ebf16930146209f7120ebc7fcbae64e2.yaml create mode 100644 nuclei-templates/cve-less/themes/music-5e8a086d1dfb832a1c846fbcfd72fb75.yaml create mode 100644 nuclei-templates/cve-less/themes/myriad-447d4ca1bc9aa4bfb680b8076950e6d4.yaml create mode 100644 nuclei-templates/cve-less/themes/myriad-a8a6d19e0044050e4db4211aba65994f.yaml create mode 100644 nuclei-templates/cve-less/themes/namaha-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/nativechurch-03d2e78e2f453b5e454ab203f543423b.yaml create mode 100644 nuclei-templates/cve-less/themes/naturemag-lite-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/neon-ce8dd1af11ff660941fa17a3827331a2.yaml create mode 100644 nuclei-templates/cve-less/themes/neosense-c7e8c47233570f8175e41802ba29bf54.yaml create mode 100644 nuclei-templates/cve-less/themes/networker-68d0e40bde0f989b020b573553c376d1.yaml create mode 100644 nuclei-templates/cve-less/themes/news-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml create mode 100644 nuclei-templates/cve-less/themes/newsmag-4ce967b961dc587fdbeb05e0806627ae.yaml create mode 100644 nuclei-templates/cve-less/themes/newsmag-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/newsmag-bff7cd3ae66179edd6f79145d30bd8a6.yaml create mode 100644 nuclei-templates/cve-less/themes/newsmag-eee75ef3c538836fcb67797f819fea53.yaml create mode 100644 nuclei-templates/cve-less/themes/newsmatic-8182d66ef4e973d2ca9cb45d86ff3d4f.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-6aa028e953687ecd485553c1a3a1d760.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-8196dc2fb2d79f5488f7ada6ad314549.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-9d97e58336af952a45a71932fb959090.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-a588607108cf849846e45967a8f41100.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-bff7cd3ae66179edd6f79145d30bd8a6.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-c159f842979de9da3050a83cd3188bb4.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-e9eec5a929c2311a5540a7010e91443f.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-f7df930f39831ca9c998366434d0f175.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-lite-17b72cbae2806ebc0f250c3c7b56eebd.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-x-72ccbc519dc7d87cb6145ad667cfc553.yaml create mode 100644 nuclei-templates/cve-less/themes/newspaper-x-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/newsxpress-7d03328ac3d4c62cd7bbe97808deaeca.yaml create mode 100644 nuclei-templates/cve-less/themes/nexos-34acc22fa074776c63206475018db5f7.yaml create mode 100644 nuclei-templates/cve-less/themes/nexos-42713e2eee178dc417083530771f3ed7.yaml create mode 100644 nuclei-templates/cve-less/themes/nexos-89678d145b82686546d5edb88c1716ee.yaml create mode 100644 nuclei-templates/cve-less/themes/nexos-a1ee8803b42d3b197599b6095f91fefd.yaml create mode 100644 nuclei-templates/cve-less/themes/nexter-4671c56fe35cfb879a2471b3343a30c7.yaml create mode 100644 nuclei-templates/cve-less/themes/nexter-fad17491d46d93aa052a2c5d2ff91e1e.yaml create mode 100644 nuclei-templates/cve-less/themes/ngo-charity-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/nichebase-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/nictitate-e239f345bc8a481c67e859f476dff343.yaml create mode 100644 nuclei-templates/cve-less/themes/nightlife-723c4ff79d9f0fe1e4ecde5d53761a98.yaml create mode 100644 nuclei-templates/cve-less/themes/nokke-161c9677e95eb847dc432eddc65db142.yaml create mode 100644 nuclei-templates/cve-less/themes/nokke-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/noo-jobmonster-416263074de0ee717fb7c97e5e787220.yaml create mode 100644 nuclei-templates/cve-less/themes/noo-jobmonster-484e846ac2c2ca29eb31f11236276ff2.yaml create mode 100644 nuclei-templates/cve-less/themes/nova-lite-2cf62694c1273a50c31799d50a62c51a.yaml create mode 100644 nuclei-templates/cve-less/themes/nsc-47b642ac75c1b5d9ea7b88cb11912c96.yaml create mode 100644 nuclei-templates/cve-less/themes/nuance-0327a43feb8609a30501f61830824dfb.yaml create mode 100644 nuclei-templates/cve-less/themes/oberliga_theme-aff200e3fd02dd9a3a104f29c0a6659a.yaml create mode 100644 nuclei-templates/cve-less/themes/oceanwp-e5433fd914f5f7bdfa5093c95eaa7f18.yaml create mode 100644 nuclei-templates/cve-less/themes/oceanwp-edb6cbfc2b955228bcb748bd996c120c.yaml create mode 100644 nuclei-templates/cve-less/themes/onair2-3a52346bbe93c0a607f0387208360f6f.yaml create mode 100644 nuclei-templates/cve-less/themes/onepagewebsite-d1d5b5cda2193b27d3a6f40310fec17c.yaml create mode 100644 nuclei-templates/cve-less/themes/onetone-161c93480bad1a6fddf7935d08286cca.yaml create mode 100644 nuclei-templates/cve-less/themes/onetone-95f9bc03677a083bf89832ea0c794033.yaml create mode 100644 nuclei-templates/cve-less/themes/online-estore-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/online-estore-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/opstore-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/opstore-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/opstore-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/optimizepress-cc59f91f842a517b5809b79cc65f1b6e.yaml create mode 100644 nuclei-templates/cve-less/themes/outdoor-7818a6f8e7606cc76a49355022fa2087.yaml create mode 100644 nuclei-templates/cve-less/themes/ovum-153b374358a4469baf0dcf3e128485d7.yaml create mode 100644 nuclei-templates/cve-less/themes/oxygen-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml create mode 100644 nuclei-templates/cve-less/themes/pagelines-420826a18f17be957cec476d8ddba661.yaml create mode 100644 nuclei-templates/cve-less/themes/panoramic-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/parallaxsome-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/parallaxsome-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/parallaxsome-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/parallelus-intersect-c7556a1caf919c1acc5983a1f0ea7582.yaml create mode 100644 nuclei-templates/cve-less/themes/parallelus-salutation-ab49cd0603fd2aad8bd2addfd19e8e37.yaml create mode 100644 nuclei-templates/cve-less/themes/parallelus-salutation-c7556a1caf919c1acc5983a1f0ea7582.yaml create mode 100644 nuclei-templates/cve-less/themes/parallelus-traject-c7556a1caf919c1acc5983a1f0ea7582.yaml create mode 100644 nuclei-templates/cve-less/themes/parallelus-unite-c7556a1caf919c1acc5983a1f0ea7582.yaml create mode 100644 nuclei-templates/cve-less/themes/paramount-d272edd7bf2202319b532fbee6ccf813.yaml create mode 100644 nuclei-templates/cve-less/themes/partdo-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml create mode 100644 nuclei-templates/cve-less/themes/pathway-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/perfect-portfolio-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/performag-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/performag-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/persuasion-7cbcd3695c9e4a82582727b8bf002ad8.yaml create mode 100644 nuclei-templates/cve-less/themes/persuasion-a15ad11bdf9b6729c6b7e6c228643dc4.yaml create mode 100644 nuclei-templates/cve-less/themes/photocrati-theme-5f8f39bace71e82e660205813ebdbf8f.yaml create mode 100644 nuclei-templates/cve-less/themes/photocrati-theme-62e00956791226e133fce07bc6049175.yaml create mode 100644 nuclei-templates/cve-less/themes/photocrati-theme-95e54f65e6d0b56382227247b6627a71.yaml create mode 100644 nuclei-templates/cve-less/themes/photolio-8ef9471efc371c6e5352e86a4f1c97cf.yaml create mode 100644 nuclei-templates/cve-less/themes/photology-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml create mode 100644 nuclei-templates/cve-less/themes/picturefactory-817085c14092d48e41f60bbe2970b571.yaml create mode 100644 nuclei-templates/cve-less/themes/pinboard-da11574313c0b78ab88b69a807dbc63e.yaml create mode 100644 nuclei-templates/cve-less/themes/pinfinity-d160b72531c6001a36910570c68caf3f.yaml create mode 100644 nuclei-templates/cve-less/themes/pixiv-custom-caeb5a0b48102c1758efb7acc2ae32c5.yaml create mode 100644 nuclei-templates/cve-less/themes/pixova-lite-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/platform-097b177de58f6e0ab66eb9ddb05e4182.yaml create mode 100644 nuclei-templates/cve-less/themes/platform-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml create mode 100644 nuclei-templates/cve-less/themes/pliska-a2a9df8b3604a4aa48635001d225e7fd.yaml create mode 100644 nuclei-templates/cve-less/themes/pont-5bbc8aa8376e0b4126beac5ed3fccdfe.yaml create mode 100644 nuclei-templates/cve-less/themes/pool-7ff920414ab7dcbc44bc64e30066047c.yaml create mode 100644 nuclei-templates/cve-less/themes/popularfx-64d81acfaf286b16665d31bcc42d2bfa.yaml create mode 100644 nuclei-templates/cve-less/themes/porto-68e18ce0101bb6035f701d461eb70415.yaml create mode 100644 nuclei-templates/cve-less/themes/porto-a4ba9fcc1f7e22d1ee8a16e40da81130.yaml create mode 100644 nuclei-templates/cve-less/themes/pressive-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/pressive-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/prolist-4c079e7a4ff59ab0c43e5c88ab6d23d3.yaml create mode 100644 nuclei-templates/cve-less/themes/prostore-68a9180f1b681c9557f7931c761fd8d8.yaml create mode 100644 nuclei-templates/cve-less/themes/prosume-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/punte-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/punte-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/punte-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/purosa-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/purus-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/purus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/themes/pyrmont-v2-f10a2f89b43d6c910b6e1605fdde5663.yaml create mode 100644 nuclei-templates/cve-less/themes/qaengine-51d36380a77053aac089f5606e300111.yaml create mode 100644 nuclei-templates/cve-less/themes/quality-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/quasar-8a7f28eb936158f3b884555eebcf14f4.yaml create mode 100644 nuclei-templates/cve-less/themes/quota-b91f6a56da52c114b3a84093ea345821.yaml create mode 100644 nuclei-templates/cve-less/themes/radial-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml create mode 100644 nuclei-templates/cve-less/themes/raise-mag-a81a5bf9125eeee92e00bfdaa83c90ee.yaml create mode 100644 nuclei-templates/cve-less/themes/rambo-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/rara-business-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/rayoflight-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml create mode 100644 nuclei-templates/cve-less/themes/real-estate-directory-0c8164317d8680b32c0889f7b19b5e0b.yaml create mode 100644 nuclei-templates/cve-less/themes/real-estate-directory-527c1df8473c8a3efd5589ba81b0395f.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-7-024d089f0907af94147d4ffdaa704965.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-7-66d97e7594f241334344e22e74a87e0f.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-7-7c80a51dbc178dbba0958056b8c3f2e8.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-7-8be48b3453eb15360ed107a9ab69d0f6.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-7-c2afa79da4aeafd15b33b22d1b481661.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-7-cc4eb2a8450ba7d1ac65c2f61e0d0cf7.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-7-e4a1be97c16e08b518e98ce4293ed725.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-7-f1a9fcf69d62e2bfd481e04f939f5821.yaml create mode 100644 nuclei-templates/cve-less/themes/realestate-b65ead0bf4d8e59d495a3f91f757b324.yaml create mode 100644 nuclei-templates/cve-less/themes/realhomes-4a61498f6efba74cb49bf8c1a7045be1.yaml create mode 100644 nuclei-templates/cve-less/themes/realhomes-d33a8c081c58ee9aa399ed8893b885f0.yaml create mode 100644 nuclei-templates/cve-less/themes/reality-3985d2776b3f2339d3a1cdb855d509b4.yaml create mode 100644 nuclei-templates/cve-less/themes/reality-3d461e76f68c530821c0137a86bc0253.yaml create mode 100644 nuclei-templates/cve-less/themes/reality-7a0da0352bb71e4b35931b40a5da432b.yaml create mode 100644 nuclei-templates/cve-less/themes/redline-6d6ebc25c70df8d2d5941ea4d08ecee0.yaml create mode 100644 nuclei-templates/cve-less/themes/redsteel-74dd0fb008f6cc6f34e6b30263cedfe1.yaml create mode 100644 nuclei-templates/cve-less/themes/refraction-57d8566b3666f1822ca82f2082d046bb.yaml create mode 100644 nuclei-templates/cve-less/themes/reganto-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml create mode 100644 nuclei-templates/cve-less/themes/regina-lite-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/regina-lite-f1520e7afffb75e51c28f74d7ae1e832.yaml create mode 100644 nuclei-templates/cve-less/themes/rehub-theme-7848dbbabd9f06e0c602290bde397eb1.yaml create mode 100644 nuclei-templates/cve-less/themes/rehub-theme-b4a06dd8a8b5f551ef3c31a46e092a4e.yaml create mode 100644 nuclei-templates/cve-less/themes/rehub-theme-b8220e763aaa4255ba01ed2e30a358fd.yaml create mode 100644 nuclei-templates/cve-less/themes/repagent-288eb500b515d4e74eb8cc4150e440e6.yaml create mode 100644 nuclei-templates/cve-less/themes/resoto-87e4105fcd662623c87dc5371d2bcde2.yaml create mode 100644 nuclei-templates/cve-less/themes/responsive-935bd93984704dacecafedc205b598e5.yaml create mode 100644 nuclei-templates/cve-less/themes/restaurant-and-cafe-c69c081915e9f9d8dfc0bc8f1bf2863b.yaml create mode 100644 nuclei-templates/cve-less/themes/restricted-site-access-da96835466676ae365fbd594b9bba421.yaml create mode 100644 nuclei-templates/cve-less/themes/revolve-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/revolve-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/revolve-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/rightnow-21873517e62f6eb7a1f45af969de223e.yaml create mode 100644 nuclei-templates/cve-less/themes/ripple-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/ripple-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/ripple-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/rise-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/rise-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/robolist-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/rockstar-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml create mode 100644 nuclei-templates/cve-less/themes/rockwell-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/royal-elementor-kit-a2114fc45474e481aea36dcc9b5f1c4d.yaml create mode 100644 nuclei-templates/cve-less/themes/royal-elementor-kit-c3f19b4938e0be4a55a8b5f19fc9f5b1.yaml create mode 100644 nuclei-templates/cve-less/themes/rt_refraction_wp-57d8566b3666f1822ca82f2082d046bb.yaml create mode 100644 nuclei-templates/cve-less/themes/sahifa-3d0307222924b1a61871ddfb3612e17b.yaml create mode 100644 nuclei-templates/cve-less/themes/sahifa-8f0fce172385265946ed4e8ec3bfed88.yaml create mode 100644 nuclei-templates/cve-less/themes/saico-81e1d981b3021dcdf8ad1a9df6d9d51d.yaml create mode 100644 nuclei-templates/cve-less/themes/sakala-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/sakala-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/sakala-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/salem-25d9dfe9dcb2d90be01a548affeb688f.yaml create mode 100644 nuclei-templates/cve-less/themes/salient-29b864084c574899fcc996f9b322577a.yaml create mode 100644 nuclei-templates/cve-less/themes/salutation-wp-26ee088c8368fd2a8bcecfc18ae8bb11.yaml create mode 100644 nuclei-templates/cve-less/themes/sandbox-519977ede43c175cac49c012c33ae5bd.yaml create mode 100644 nuclei-templates/cve-less/themes/sandbox-989254b568354826202f288242e58427.yaml create mode 100644 nuclei-templates/cve-less/themes/sarada-lite-4dd17e99df33e7a68f2a978cf00a71e1.yaml create mode 100644 nuclei-templates/cve-less/themes/satoshi-2cd7c65813d463e1581c58ac5badd893.yaml create mode 100644 nuclei-templates/cve-less/themes/scarlet-828e17b05d92c010fb7f9a4a0922569b.yaml create mode 100644 nuclei-templates/cve-less/themes/scoreme-88013bc8aa189f38a19a59f4e02b7e1e.yaml create mode 100644 nuclei-templates/cve-less/themes/scrollme-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/scrollme-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/scrollme-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/scv1-b773af1a6c770b410098cbaaaa01e41c.yaml create mode 100644 nuclei-templates/cve-less/themes/selio-46177c2639c7b5ae832248baa4073a3a.yaml create mode 100644 nuclei-templates/cve-less/themes/selio-fbaa72caee7c30faff8212706be987c1.yaml create mode 100644 nuclei-templates/cve-less/themes/sensible-wp-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/sentient-41077f62819cf65dd71bfb4c6e199325.yaml create mode 100644 nuclei-templates/cve-less/themes/sf-booking-40130dd58c838247ce08e93680f217da.yaml create mode 100644 nuclei-templates/cve-less/themes/shapeless-6490c018ab51d9b822f80c44c2a4f77f.yaml create mode 100644 nuclei-templates/cve-less/themes/shapely-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/shopbiz-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/shoppette-c5cd64fdc88a18d66954d78adc22f76d.yaml create mode 100644 nuclei-templates/cve-less/themes/shopstar-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/short-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/shoutbox-0dec1530fa29f0f3dd02117fbaf12b9a.yaml create mode 100644 nuclei-templates/cve-less/themes/shuban-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/shuban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/themes/silverorchid-f668ff84aa12e9412717100f16882a82.yaml create mode 100644 nuclei-templates/cve-less/themes/simplebalance-36a65684d72ca90db400bc9a48e4b1a7.yaml create mode 100644 nuclei-templates/cve-less/themes/simpledark-b20cdb3204e221d28ac3a3a0e91939e9.yaml create mode 100644 nuclei-templates/cve-less/themes/simplo-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/simpolio-464f844153534ce96044f5502d947b55.yaml create mode 100644 nuclei-templates/cve-less/themes/sirius-b962a43c022ee33e3f132497b433375e.yaml create mode 100644 nuclei-templates/cve-less/themes/sixtees-2cb73a83c44fa300cec02ee7b0e67068.yaml create mode 100644 nuclei-templates/cve-less/themes/slash-wp-db53188989f27ad0f003901fbcf178c9.yaml create mode 100644 nuclei-templates/cve-less/themes/sliding-door-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/smartit-dc6219f91f46d9292d66b44460a2668b.yaml create mode 100644 nuclei-templates/cve-less/themes/smartstart-9ef0d273482df03c9ba3dcd5e27ac8b5.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-1e964bc864ca0fa372e686235b23e1f1.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-33c4d0a0f515bd1cedf9cdcf55231d10.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-4f22cc4c7f59ad21868eda159380a421.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-6a8cda00f1080a3aa286a272f860fd12.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-6b8df25137f38e4882527178954fd3e6.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-7cd3fabdb13125f30851d3aa6b007d33.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-bca67036ec26c26cd0007b6d8426083e.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-c15a76ab76b6bacb9d3a014790c1e98c.yaml create mode 100644 nuclei-templates/cve-less/themes/soledad-f1943d1009d5a9a5f1799b0883b7d043.yaml create mode 100644 nuclei-templates/cve-less/themes/soundblast-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/source-03c4d8dd500314f942cf4bffdc3e3289.yaml create mode 100644 nuclei-templates/cve-less/themes/spa-and-salon-8605169c0986bc4adffdd4b6cd4bbc09.yaml create mode 100644 nuclei-templates/cve-less/themes/sparklestore-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/sparklestore-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/sparkling-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/sparky-186cdb2704350d8646ad5a58aed89581.yaml create mode 100644 nuclei-templates/cve-less/themes/spasalon-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/spawp-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/specialist-48124923f45f6ff808c33e2b8fa204cd.yaml create mode 100644 nuclei-templates/cve-less/themes/speculor-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/speculor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml create mode 100644 nuclei-templates/cve-less/themes/spice-software-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/spidermag-4afe438c3219ba223c08f05567ce5890.yaml create mode 100644 nuclei-templates/cve-less/themes/spidermag-57ce58b6230c68936a87b493b14f2285.yaml create mode 100644 nuclei-templates/cve-less/themes/spikes-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/spikes-black-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/spiko-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/square-3715092a367ddcdb9354396fe5cef26a.yaml create mode 100644 nuclei-templates/cve-less/themes/squared-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/squared-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/squaretype-301d4c247a680f6ce86b39ab492df068.yaml create mode 100644 nuclei-templates/cve-less/themes/startkit-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/startupzy-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml create mode 100644 nuclei-templates/cve-less/themes/statfort-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/storevilla-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/storevilla-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/storevilla-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/storied-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/storied-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/studiozen-0aa9e3593c86e4ffacf4528cd86f4af3.yaml create mode 100644 nuclei-templates/cve-less/themes/studiozen-c5502df29957af11b4d0db61f979c665.yaml create mode 100644 nuclei-templates/cve-less/themes/superio-cb7c43df76e71bb6d20f5f4c8a5d90eb.yaml create mode 100644 nuclei-templates/cve-less/themes/superlist-887e51b7ac6ae9ebfb1f0b6b57330b90.yaml create mode 100644 nuclei-templates/cve-less/themes/supreme-directory-e1d105a5373862135dae31af977cf05f.yaml create mode 100644 nuclei-templates/cve-less/themes/swagger-816c00d91c21f41afdfc82cbe3dd6a68.yaml create mode 100644 nuclei-templates/cve-less/themes/swape-7ec2393a2db75328cb78362c45e273f6.yaml create mode 100644 nuclei-templates/cve-less/themes/swing-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/swing-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/swing-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/switchblade-6e394bf087d75cce991df25bc2d90b32.yaml create mode 100644 nuclei-templates/cve-less/themes/t1-51d5d1c24b78c2a34638e1c642bf73fd.yaml create mode 100644 nuclei-templates/cve-less/themes/tainacan-interface-72e35bfea95d9e42520259e2f04f4250.yaml create mode 100644 nuclei-templates/cve-less/themes/teardrop-aa0917a06c9e064c66e0e15d0b79978d.yaml create mode 100644 nuclei-templates/cve-less/themes/teluro-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/the-conference-3d5a012eeeb1f6dd0f8bcd44e5b5cd93.yaml create mode 100644 nuclei-templates/cve-less/themes/the-erudite-86bc0489b6564a6b791112624ecc4c24.yaml create mode 100644 nuclei-templates/cve-less/themes/the-launcher-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/the-launcher-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/the-launcher-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/the-monday-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/the-monday-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/the-monday-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/the100-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/the100-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/the100-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/theagency-18e29f581b2b637530caba059b3180e6.yaml create mode 100644 nuclei-templates/cve-less/themes/thecotton_v114-d377235da8e0cc9500eb3b5f44252198.yaml create mode 100644 nuclei-templates/cve-less/themes/thegem-0f0ddbff82e7ef39ec0bd688d9ec8fea.yaml create mode 100644 nuclei-templates/cve-less/themes/thegem-8d422c3c7895b2b4d7494cb28df2efe5.yaml create mode 100644 nuclei-templates/cve-less/themes/thegem-9132b473713ba452ca61cd28b37b6336.yaml create mode 100644 nuclei-templates/cve-less/themes/thegem-a830a457478521ad7f5b87d39b666bbf.yaml create mode 100644 nuclei-templates/cve-less/themes/thegem-e3e7d2debbf761854054ecabf536826d.yaml create mode 100644 nuclei-templates/cve-less/themes/themify-ultra-1e0aaf982b61c73dcc9a05511e801c09.yaml create mode 100644 nuclei-templates/cve-less/themes/themify-ultra-3d30a7e8f0b8f6bc4309468a15c7f314.yaml create mode 100644 nuclei-templates/cve-less/themes/themify-ultra-c842576ba599cc503a47eb67c0e70851.yaml create mode 100644 nuclei-templates/cve-less/themes/themify-ultra-e85a48bb53d03fe4f0288a0ec1595649.yaml create mode 100644 nuclei-templates/cve-less/themes/themify-ultra-f655e8b1894773f9d99ee26fcaeba800.yaml create mode 100644 nuclei-templates/cve-less/themes/theroof-b3e7445697f1970506026aee23a35900.yaml create mode 100644 nuclei-templates/cve-less/themes/thinkresponsive-744f91815860d793f31d9dcfde87abdc.yaml create mode 100644 nuclei-templates/cve-less/themes/thisway-f7825c5bf409c18daf2cdaf15d281a99.yaml create mode 100644 nuclei-templates/cve-less/themes/thrive-theme-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/thrive-theme-c88aacc0c258c2583886d5df08f00e4f.yaml create mode 100644 nuclei-templates/cve-less/themes/thrive-theme-ec5c5e05e1261f9960d3089a18968f4c.yaml create mode 100644 nuclei-templates/cve-less/themes/thrive-theme-fece5d89023061344eacddb3239c9c49.yaml create mode 100644 nuclei-templates/cve-less/themes/toolbox-936c77f53a2357ce622711b674cdaed4.yaml create mode 100644 nuclei-templates/cve-less/themes/total-99f1c42a705f1b7c13a404d5bf315c5f.yaml create mode 100644 nuclei-templates/cve-less/themes/total-e9ad128afe18da7565a18caa795c2ef0.yaml create mode 100644 nuclei-templates/cve-less/themes/townhub-17f6998fdf35be8a6349776a3309aedc.yaml create mode 100644 nuclei-templates/cve-less/themes/townhub-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml create mode 100644 nuclei-templates/cve-less/themes/townhub-be3f332add5d9ce678efc86e37a29e03.yaml create mode 100644 nuclei-templates/cve-less/themes/townhub-ee94325aa53d1af2c9c7dc7266c2b8f3.yaml create mode 100644 nuclei-templates/cve-less/themes/townhub-f5204789b3d63c1e5dd223fef5d1ac5d.yaml create mode 100644 nuclei-templates/cve-less/themes/transcend-a746469ba08e7ad3eaafd923d2717c92.yaml create mode 100644 nuclei-templates/cve-less/themes/travel-agency-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/travel-booking-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/traveler-10e06b5ef925da2edfec94c00c6ef59a.yaml create mode 100644 nuclei-templates/cve-less/themes/traveler-47edf7b573f3606ae6a648dd78bee5ee.yaml create mode 100644 nuclei-templates/cve-less/themes/traveler-4e8adfcb068bf53ba8223d2136f425a4.yaml create mode 100644 nuclei-templates/cve-less/themes/traveler-ef4958af1c7e13be4b4aa1bba11ecbc2.yaml create mode 100644 nuclei-templates/cve-less/themes/traveler-f415db0563c7e2bf116edbc6956f1ae6.yaml create mode 100644 nuclei-templates/cve-less/themes/travey-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml create mode 100644 nuclei-templates/cve-less/themes/trending-1def92176b2075addd1971f8bb11410a.yaml create mode 100644 nuclei-templates/cve-less/themes/truemag-909fb4f06b4694caa086894d4ab6e947.yaml create mode 100644 nuclei-templates/cve-less/themes/twenty-twelve-edd-b586a8ab64bee13c2ee807e747d50adb.yaml create mode 100644 nuclei-templates/cve-less/themes/u-design-3d5c779f38ece858601f73d1cc738733.yaml create mode 100644 nuclei-templates/cve-less/themes/u-design-3f3928c6559acc265ac4dc8abe8f4e68.yaml create mode 100644 nuclei-templates/cve-less/themes/ultra-seven-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/ultra-seven-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/ultra-seven-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/unakit-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/uncode-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/uncode-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/uncode-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/unique-df4c2356c55ce196a7dc2c935ff36c73.yaml create mode 100644 nuclei-templates/cve-less/themes/unnamed-babd8720f51cdfc03ee525219e51d67f.yaml create mode 100644 nuclei-templates/cve-less/themes/unnamed-se-babd8720f51cdfc03ee525219e51d67f.yaml create mode 100644 nuclei-templates/cve-less/themes/upfrontwp-4fc88bb474bb1a0cdd35b01d04f15578.yaml create mode 100644 nuclei-templates/cve-less/themes/upscale-5e5f5586f8a04fc7c1bb725c8fd2a8ff.yaml create mode 100644 nuclei-templates/cve-less/themes/urbancity-7afac27e2fdaa8f6fe79366afab488a9.yaml create mode 100644 nuclei-templates/cve-less/themes/velvet-cebcf5c5e3b1d8025e7b39f8bd391a13.yaml create mode 100644 nuclei-templates/cve-less/themes/vernissage-1f43087f32c2016495bdaad26c9a18a2.yaml create mode 100644 nuclei-templates/cve-less/themes/vertice-37917ea4c5b30e9a2f479f087050ff0a.yaml create mode 100644 nuclei-templates/cve-less/themes/viable-blog-6d87a6f7248c4528f7d5ef6ed7c11eba.yaml create mode 100644 nuclei-templates/cve-less/themes/villar-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/viral-06cd0f178ae533c7b94126d052d17b3f.yaml create mode 100644 nuclei-templates/cve-less/themes/viral-d566c0816c38ea6ca24760850c1eaf4a.yaml create mode 100644 nuclei-templates/cve-less/themes/viral-mag-800d496f51d819e5732256fbd162712b.yaml create mode 100644 nuclei-templates/cve-less/themes/viral-news-06cd0f178ae533c7b94126d052d17b3f.yaml create mode 100644 nuclei-templates/cve-less/themes/viral-news-d566c0816c38ea6ca24760850c1eaf4a.yaml create mode 100644 nuclei-templates/cve-less/themes/viralike-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/virtue-2d42369e26f63aede3d7de3de1ae9995.yaml create mode 100644 nuclei-templates/cve-less/themes/vistered-little-8fb46ccbfe8eb892f418af64a9d461a7.yaml create mode 100644 nuclei-templates/cve-less/themes/vithy-72d0f45bd923b7475bc87b8f7146adf8.yaml create mode 100644 nuclei-templates/cve-less/themes/vithy-eee162c4e035760d9235de8c731181be.yaml create mode 100644 nuclei-templates/cve-less/themes/vmag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/vmag-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/vmag-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/vmagazine-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/vmagazine-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/vmagazine-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/vmagazine-news-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/vmagazine-news-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/vmagazine-news-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/voice-09bb804f266b350634cb031ea62ca641.yaml create mode 100644 nuclei-templates/cve-less/themes/voice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml create mode 100644 nuclei-templates/cve-less/themes/wallstreet-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/weaver-xtreme-13c73556a747c83cbb4df9719464f4fd.yaml create mode 100644 nuclei-templates/cve-less/themes/weaver-xtreme-17ab37dbc7beb458edc5925614c59dfa.yaml create mode 100644 nuclei-templates/cve-less/themes/web-minimalist-200901-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml create mode 100644 nuclei-templates/cve-less/themes/webfolio-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/weeklynews-a66c423ab6d157ff18cae8cbb8d16a15.yaml create mode 100644 nuclei-templates/cve-less/themes/westand-5bf9d91713d8c35818245877f73557be.yaml create mode 100644 nuclei-templates/cve-less/themes/wibar-8720a886474e9b973346fa40eca70f76.yaml create mode 100644 nuclei-templates/cve-less/themes/winters-1bdc5a83caa0df98ccf44a6fbb6306e2.yaml create mode 100644 nuclei-templates/cve-less/themes/wise-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/wishful-blog-a81a5bf9125eeee92e00bfdaa83c90ee.yaml create mode 100644 nuclei-templates/cve-less/themes/woffice-b256df5c032ca82a00290c7b34a523e2.yaml create mode 100644 nuclei-templates/cve-less/themes/woodmart-1a6b9215905d609bfa19a88fafbe9af4.yaml create mode 100644 nuclei-templates/cve-less/themes/woodmart-1d9a2ca68f50fb01ed55a21dfdc7c1dc.yaml create mode 100644 nuclei-templates/cve-less/themes/woodmart-27976922dece0aca2bde50f6320bde6f.yaml create mode 100644 nuclei-templates/cve-less/themes/woodmart-7bd424eb93435e30d87b1474845a32ce.yaml create mode 100644 nuclei-templates/cve-less/themes/woodmart-9ab86db9ce48449a4c43692df0ff7e17.yaml create mode 100644 nuclei-templates/cve-less/themes/woodmart-a392159f37a0ade5203b528da67d0e66.yaml create mode 100644 nuclei-templates/cve-less/themes/woohoo-cc3c8c63ee92500b82ad257317be9d73.yaml create mode 100644 nuclei-templates/cve-less/themes/woostify-5a02b0682e7d4b10352df50fd089e856.yaml create mode 100644 nuclei-templates/cve-less/themes/woostore-41077f62819cf65dd71bfb4c6e199325.yaml create mode 100644 nuclei-templates/cve-less/themes/wootique-41077f62819cf65dd71bfb4c6e199325.yaml create mode 100644 nuclei-templates/cve-less/themes/workio-3cfee65e35362bbfc116d2c83a3a30c9.yaml create mode 100644 nuclei-templates/cve-less/themes/workreap-26b89a3f8ab991ddf909838ee3f83a8f.yaml create mode 100644 nuclei-templates/cve-less/themes/workreap-5b880f984cc2c6ee6aced998be3c7997.yaml create mode 100644 nuclei-templates/cve-less/themes/workreap-8b0a78ba7d4de258f1d5d80e510c721b.yaml create mode 100644 nuclei-templates/cve-less/themes/workreap-c1a5d94e24ff3bf97db23d2e01bc94ca.yaml create mode 100644 nuclei-templates/cve-less/themes/workreap-f3ff7e279524c365a3f486be69df6e9f.yaml create mode 100644 nuclei-templates/cve-less/themes/workscout-295565d6c00c49b75df12a1f75ae3147.yaml create mode 100644 nuclei-templates/cve-less/themes/workup-598875fea738a6301ca41e5bba8cb8dc.yaml create mode 100644 nuclei-templates/cve-less/themes/wp-moose-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/wp-portfolio-10655f6004e5353e2b6a2b5ad40ac777.yaml create mode 100644 nuclei-templates/cve-less/themes/wp-real-estate-9df83661bbe3f56e6da6d47f2ce8176c.yaml create mode 100644 nuclei-templates/cve-less/themes/wp-sierra-b9563d9e100a8de4aef6c2ddb59436a7.yaml create mode 100644 nuclei-templates/cve-less/themes/wp-store-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/wp-store-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/wp-store-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/wphrm-d1dc7536ba0bbf23ad7893c422769d48.yaml create mode 100644 nuclei-templates/cve-less/themes/wplms-1a3b140e25db47aa6f5e6de5d03caa41.yaml create mode 100644 nuclei-templates/cve-less/themes/wplms-87521cd586bc2f45b279349b97e31c54.yaml create mode 100644 nuclei-templates/cve-less/themes/wplocalplaces-56c321d3601ae77c62688196e1aa61b1.yaml create mode 100644 nuclei-templates/cve-less/themes/wpparallax-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/wpparallax-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/wpparallax-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/wpzoom-inspiro-pro-0d2429a44660b0fd9009cfc551d51d85.yaml create mode 100644 nuclei-templates/cve-less/themes/wr-nitro-fe0eedbb007ccace8a4e2ce0abc973e1.yaml create mode 100644 nuclei-templates/cve-less/themes/wyzi-business-finder-a5fba451ec49e569a6e3b33c31987240.yaml create mode 100644 nuclei-templates/cve-less/themes/x-t9-086335e3764d29c07c7d7cc4e2750c93.yaml create mode 100644 nuclei-templates/cve-less/themes/xenon-809667597aa78113de32ecd2d78b1168.yaml create mode 100644 nuclei-templates/cve-less/themes/xmas-920241a52177d01e01f51750db4e9043.yaml create mode 100644 nuclei-templates/cve-less/themes/xstore-015cd56d3f2f470971a1fb745e9facf8.yaml create mode 100644 nuclei-templates/cve-less/themes/xstore-38fb7f7c173d005d7a2c4887d0346c93.yaml create mode 100644 nuclei-templates/cve-less/themes/xstore-5eda4166c53220a4fc1a66df7cda1b76.yaml create mode 100644 nuclei-templates/cve-less/themes/xstore-8a9cd0a3b3bf0281b86f1864c19141dc.yaml create mode 100644 nuclei-templates/cve-less/themes/xstore-a093f9ab0678625e44f3702b1a154c42.yaml create mode 100644 nuclei-templates/cve-less/themes/xstore-bf873db96785a26a3145cbfaa5b26d6e.yaml create mode 100644 nuclei-templates/cve-less/themes/yaaburnee-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml create mode 100644 nuclei-templates/cve-less/themes/yourjourney-4eeae71a78a49f8b3e46b309da962e47.yaml create mode 100644 nuclei-templates/cve-less/themes/yuki-2820877b5dbf766c7f6817fd492690e8.yaml create mode 100644 nuclei-templates/cve-less/themes/yuki-3787d9c397d58c6e8f2c674f16ffe8c1.yaml create mode 100644 nuclei-templates/cve-less/themes/yvora-af728e68019b9ee6cc8672f7e19f6c44.yaml create mode 100644 nuclei-templates/cve-less/themes/zeever-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml create mode 100644 nuclei-templates/cve-less/themes/zenlite-2c9dd1c9df5c34a137e9f118a0781a3d.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-baby-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-baby-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-baby-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-cosmetics-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-cosmetics-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-cosmetics-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-lite-b05621ef791a4dad965a137ebf6fa48c.yaml create mode 100644 nuclei-templates/cve-less/themes/zigcy-lite-f89ee1fe18d2f93346e76054105f5916.yaml create mode 100644 nuclei-templates/cve-less/themes/zoner-4fb619246fc5d2000cab608496d82ce7.yaml create mode 100644 nuclei-templates/cve-less/themes/zoner-d7ec4a32cfcc6080d759cea90bff42d1.yaml diff --git a/README.md b/README.md index a91fc8a9f1..0536e89e74 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ # Nuclei + Wordfence = ♥ -This project provides a massive up-to-date collection of **13,265 Nuclei templates** that can be used to scan for vulnerabilities in WordPress Core, WordPress Plugins and WordPress Themes. The templates are based on the vulnerability reports of [Wordfence.com](https://www.wordfence.com/threat-intel/vulnerabilities/). +This project provides a massive up-to-date collection of **31,519 Nuclei templates** that can be used to scan for vulnerabilities in WordPress Core, WordPress Plugins and WordPress Themes. The templates are based on the vulnerability reports of [Wordfence.com](https://www.wordfence.com/threat-intel/vulnerabilities/). This project is a valuable resource for anyone who wants to scan for vulnerabilities in WordPress-based websites. The templates are easy to use and up-to-date, and they are open source so you can modify them to fit your specific needs. If you are responsible for the security of a website that uses WordPress, I highly recommend using this project to scan for vulnerabilities. @@ -25,19 +25,19 @@ This project is a valuable resource for anyone who wants to scan for vulnerabili | category | total | |---|---| -| wp-plugins | [12,567](https://github.com/search?q=%22wp-plugin%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | -| wp-themes | [357](https://github.com/search?q=%22wp-theme%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | -| wp-core | [332](https://github.com/search?q=%22wp-core%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | +| wp-plugins | [29,463](https://github.com/search?q=%22wp-plugin%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | +| wp-themes | [1,347](https://github.com/search?q=%22wp-theme%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | +| wp-core | [702](https://github.com/search?q=%22wp-core%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | | other | [16](https://github.com/search?q=repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML++NOT+%22wp-plugin%22+NOT+%22wp-core%22+NOT+%22wp-theme%22+path%3A%2F%5Enuclei-templates%5C%2F%2F&type=code&ref=advsearch) | | severity | total | |---|---| | info | [7](https://github.com/search?q=%22severity%3A+info%22+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | -| low | [71](https://github.com/search?q=severity%3A+low+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | -| medium | [9,554](https://github.com/search?q=severity%3A+medium+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | -| high | [2,623](https://github.com/search?q=severity%3A+high+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | -| critical | [1,009](https://github.com/search?q=severity%3A+critical+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | +| low | [2,972](https://github.com/search?q=severity%3A+low+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | +| medium | [17,793](https://github.com/search?q=severity%3A+medium+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | +| high | [8,254](https://github.com/search?q=severity%3A+high+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | +| critical | [2,492](https://github.com/search?q=severity%3A+critical+repo%3Atopscoder%2Fnuclei-wordfence-cve+language%3AYAML&type=code&ref=advsearch) | ## Usage diff --git a/nuclei-templates/cve-less/plugins/001-prime-strategy-translate-accelerator-5be710df65d6bc92f524c90909df2f99.yaml b/nuclei-templates/cve-less/plugins/001-prime-strategy-translate-accelerator-5be710df65d6bc92f524c90909df2f99.yaml new file mode 100644 index 0000000000..c5c4563ba1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/001-prime-strategy-translate-accelerator-5be710df65d6bc92f524c90909df2f99.yaml @@ -0,0 +1,58 @@ +id: 001-prime-strategy-translate-accelerator-5be710df65d6bc92f524c90909df2f99 + +info: + name: > + 001 Prime Strategy Translate Accelerator <= 1.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/217d68dc-6133-4b7e-9d8f-bb8fc18f1c12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/001-prime-strategy-translate-accelerator/" + google-query: inurl:"/wp-content/plugins/001-prime-strategy-translate-accelerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,001-prime-strategy-translate-accelerator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/001-prime-strategy-translate-accelerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "001-prime-strategy-translate-accelerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/0mk-shortener-17c0f8c5353b51c76be9ea996254e492.yaml b/nuclei-templates/cve-less/plugins/0mk-shortener-17c0f8c5353b51c76be9ea996254e492.yaml new file mode 100644 index 0000000000..05aafdf1a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/0mk-shortener-17c0f8c5353b51c76be9ea996254e492.yaml @@ -0,0 +1,58 @@ +id: 0mk-shortener-17c0f8c5353b51c76be9ea996254e492 + +info: + name: > + 0mk Shortener <= 0.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b798c64-3434-427d-b578-5abbdac8cd0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/0mk-shortener/" + google-query: inurl:"/wp-content/plugins/0mk-shortener/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,0mk-shortener,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/0mk-shortener/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "0mk-shortener" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/0mk-shortener-cbd2f40afcea324b1b6628d63c264b5b.yaml b/nuclei-templates/cve-less/plugins/0mk-shortener-cbd2f40afcea324b1b6628d63c264b5b.yaml new file mode 100644 index 0000000000..4a5df4da49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/0mk-shortener-cbd2f40afcea324b1b6628d63c264b5b.yaml @@ -0,0 +1,58 @@ +id: 0mk-shortener-cbd2f40afcea324b1b6628d63c264b5b + +info: + name: > + 0mk Shortener <= 0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de9f3b83-4575-4566-9731-0af9107c7c30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/0mk-shortener/" + google-query: inurl:"/wp-content/plugins/0mk-shortener/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,0mk-shortener,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/0mk-shortener/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "0mk-shortener" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/1-flash-gallery-e9ae08724abba099d4b3758d3e5c0730.yaml b/nuclei-templates/cve-less/plugins/1-flash-gallery-e9ae08724abba099d4b3758d3e5c0730.yaml new file mode 100644 index 0000000000..4fb8d10ad7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/1-flash-gallery-e9ae08724abba099d4b3758d3e5c0730.yaml @@ -0,0 +1,58 @@ +id: 1-flash-gallery-e9ae08724abba099d4b3758d3e5c0730 + +info: + name: > + 1 Flash Gallery <= 1.9.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fea93d2-c1a5-416d-90d4-92304d8dc41f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/1-flash-gallery/" + google-query: inurl:"/wp-content/plugins/1-flash-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,1-flash-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/1-flash-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "1-flash-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/1-jquery-photo-gallery-slideshow-flash-205a1fbb250b5543ad54712c5ab85794.yaml b/nuclei-templates/cve-less/plugins/1-jquery-photo-gallery-slideshow-flash-205a1fbb250b5543ad54712c5ab85794.yaml new file mode 100644 index 0000000000..54b9bc2078 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/1-jquery-photo-gallery-slideshow-flash-205a1fbb250b5543ad54712c5ab85794.yaml @@ -0,0 +1,58 @@ +id: 1-jquery-photo-gallery-slideshow-flash-205a1fbb250b5543ad54712c5ab85794 + +info: + name: > + ZooEffect Plugin for Video player, Photo Gallery Slideshow jQuery and audio / music / podcast – HTML5 <= 1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7be3688d-61f5-457d-a38b-0560205b2f8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/" + google-query: inurl:"/wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,1-jquery-photo-gallery-slideshow-flash,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/1-jquery-photo-gallery-slideshow-flash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "1-jquery-photo-gallery-slideshow-flash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/1003-mortgage-application-5d3b862e6e4baaf71b24925f067433ca.yaml b/nuclei-templates/cve-less/plugins/1003-mortgage-application-5d3b862e6e4baaf71b24925f067433ca.yaml new file mode 100644 index 0000000000..ae1338e775 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/1003-mortgage-application-5d3b862e6e4baaf71b24925f067433ca.yaml @@ -0,0 +1,58 @@ +id: 1003-mortgage-application-5d3b862e6e4baaf71b24925f067433ca + +info: + name: > + 1003 Mortgage Application <= 1.75 - Authenticated (Subscriber+) Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d77105-19a8-40eb-8a9c-aa519a757a8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/1003-mortgage-application/" + google-query: inurl:"/wp-content/plugins/1003-mortgage-application/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,1003-mortgage-application,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/1003-mortgage-application/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "1003-mortgage-application" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/1003-mortgage-application-ced1428c6198f92ade552b4de59a878b.yaml b/nuclei-templates/cve-less/plugins/1003-mortgage-application-ced1428c6198f92ade552b4de59a878b.yaml new file mode 100644 index 0000000000..15d56d9e2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/1003-mortgage-application-ced1428c6198f92ade552b4de59a878b.yaml @@ -0,0 +1,58 @@ +id: 1003-mortgage-application-ced1428c6198f92ade552b4de59a878b + +info: + name: > + 1003 Mortgage Application <= 1.75 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63567094-9fb1-44b2-a3e6-99194389c4b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/1003-mortgage-application/" + google-query: inurl:"/wp-content/plugins/1003-mortgage-application/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,1003-mortgage-application,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/1003-mortgage-application/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "1003-mortgage-application" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/10to8-online-booking-22fe25cfef73eeb94b97da8f9108cc4a.yaml b/nuclei-templates/cve-less/plugins/10to8-online-booking-22fe25cfef73eeb94b97da8f9108cc4a.yaml new file mode 100644 index 0000000000..b0dab6e501 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/10to8-online-booking-22fe25cfef73eeb94b97da8f9108cc4a.yaml @@ -0,0 +1,58 @@ +id: 10to8-online-booking-22fe25cfef73eeb94b97da8f9108cc4a + +info: + name: > + 10to8 Online Appointment Booking System <= 1.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fbb5ed0-ed76-44fe-88c4-eb05ad87e510?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/10to8-online-booking/" + google-query: inurl:"/wp-content/plugins/10to8-online-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,10to8-online-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/10to8-online-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "10to8-online-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/12-step-meeting-list-3884d9a5a5a83b7a3dc7015b6e93594e.yaml b/nuclei-templates/cve-less/plugins/12-step-meeting-list-3884d9a5a5a83b7a3dc7015b6e93594e.yaml new file mode 100644 index 0000000000..97f9e771f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/12-step-meeting-list-3884d9a5a5a83b7a3dc7015b6e93594e.yaml @@ -0,0 +1,58 @@ +id: 12-step-meeting-list-3884d9a5a5a83b7a3dc7015b6e93594e + +info: + name: > + 12 Step Meeting List <= 3.14.24 - Authenticated (Contributor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d6e9cb0-6b90-4a5b-8626-0b3f378fbc92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/12-step-meeting-list/" + google-query: inurl:"/wp-content/plugins/12-step-meeting-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,12-step-meeting-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/12-step-meeting-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "12-step-meeting-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.14.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/12-step-meeting-list-63b258c691616cbc41ef567bfa0329d4.yaml b/nuclei-templates/cve-less/plugins/12-step-meeting-list-63b258c691616cbc41ef567bfa0329d4.yaml new file mode 100644 index 0000000000..10b889674b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/12-step-meeting-list-63b258c691616cbc41ef567bfa0329d4.yaml @@ -0,0 +1,58 @@ +id: 12-step-meeting-list-63b258c691616cbc41ef567bfa0329d4 + +info: + name: > + 12 Step Meeting List <= 3.14.28 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8269f83b-5d7d-4f01-85ee-fd7262fed5b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/12-step-meeting-list/" + google-query: inurl:"/wp-content/plugins/12-step-meeting-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,12-step-meeting-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/12-step-meeting-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "12-step-meeting-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.14.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/123-chat-videochat-93f5b1d9d41a68948272932dc6addd39.yaml b/nuclei-templates/cve-less/plugins/123-chat-videochat-93f5b1d9d41a68948272932dc6addd39.yaml new file mode 100644 index 0000000000..1bf44231f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/123-chat-videochat-93f5b1d9d41a68948272932dc6addd39.yaml @@ -0,0 +1,58 @@ +id: 123-chat-videochat-93f5b1d9d41a68948272932dc6addd39 + +info: + name: > + 123.chat <= 1.3.0 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a0ced4d-368d-4f12-9099-1f8c0b0fe245?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/123-chat-videochat/" + google-query: inurl:"/wp-content/plugins/123-chat-videochat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,123-chat-videochat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/123-chat-videochat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "123-chat-videochat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-5b8ac2585d2f3bb3221568e060310933.yaml b/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-5b8ac2585d2f3bb3221568e060310933.yaml new file mode 100644 index 0000000000..dd9cdbbee9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-5b8ac2585d2f3bb3221568e060310933.yaml @@ -0,0 +1,58 @@ +id: 123contactform-for-wordpress-5b8ac2585d2f3bb3221568e060310933 + +info: + name: > + 123ContactForm for WordPress <= 1.5.6 - Validation Bypass via Plugin Verification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc5f274-6e71-47a1-b4ec-9b3ba46fd7bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/123contactform-for-wordpress/" + google-query: inurl:"/wp-content/plugins/123contactform-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,123contactform-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/123contactform-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "123contactform-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-d83585e94da6387ed15cb2d62de561eb.yaml b/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-d83585e94da6387ed15cb2d62de561eb.yaml new file mode 100644 index 0000000000..c1bce8c8bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-d83585e94da6387ed15cb2d62de561eb.yaml @@ -0,0 +1,58 @@ +id: 123contactform-for-wordpress-d83585e94da6387ed15cb2d62de561eb + +info: + name: > + 123ContactForm for WordPress <= 1.5.6 - Arbitrary Post Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d7da9c3-dc46-4c61-8737-052844939e93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/123contactform-for-wordpress/" + google-query: inurl:"/wp-content/plugins/123contactform-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,123contactform-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/123contactform-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "123contactform-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-df1a5321125f83ce7c8f5507c7f81133.yaml b/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-df1a5321125f83ce7c8f5507c7f81133.yaml new file mode 100644 index 0000000000..a33c5bcd1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/123contactform-for-wordpress-df1a5321125f83ce7c8f5507c7f81133.yaml @@ -0,0 +1,58 @@ +id: 123contactform-for-wordpress-df1a5321125f83ce7c8f5507c7f81133 + +info: + name: > + 123ContactForm for WordPress <= 1.5.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/860e70be-2ccd-4d4d-b0d9-bde8d163c211?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/123contactform-for-wordpress/" + google-query: inurl:"/wp-content/plugins/123contactform-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,123contactform-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/123contactform-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "123contactform-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/1app-business-forms-0bb8bade373073a31c7eae43154f4462.yaml b/nuclei-templates/cve-less/plugins/1app-business-forms-0bb8bade373073a31c7eae43154f4462.yaml new file mode 100644 index 0000000000..1b777acd63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/1app-business-forms-0bb8bade373073a31c7eae43154f4462.yaml @@ -0,0 +1,58 @@ +id: 1app-business-forms-0bb8bade373073a31c7eae43154f4462 + +info: + name: > + 1app Business Forms <= 1.0.0 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30295480-3d20-412f-a7fd-3f18d425fdc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/1app-business-forms/" + google-query: inurl:"/wp-content/plugins/1app-business-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,1app-business-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/1app-business-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "1app-business-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/1app-business-forms-3a92cf2d3b454c13398f20f7a203cccd.yaml b/nuclei-templates/cve-less/plugins/1app-business-forms-3a92cf2d3b454c13398f20f7a203cccd.yaml new file mode 100644 index 0000000000..3d6cd3b086 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/1app-business-forms-3a92cf2d3b454c13398f20f7a203cccd.yaml @@ -0,0 +1,58 @@ +id: 1app-business-forms-3a92cf2d3b454c13398f20f7a203cccd + +info: + name: > + 1app Business Forms <= 1.0.0 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65ab07e8-4cba-4d81-8e80-8c6c96c1095e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/1app-business-forms/" + google-query: inurl:"/wp-content/plugins/1app-business-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,1app-business-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/1app-business-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "1app-business-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/1g-music-share-862c51605ec18beb1576064976f304a2.yaml b/nuclei-templates/cve-less/plugins/1g-music-share-862c51605ec18beb1576064976f304a2.yaml new file mode 100644 index 0000000000..e83c55112b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/1g-music-share-862c51605ec18beb1576064976f304a2.yaml @@ -0,0 +1,58 @@ +id: 1g-music-share-862c51605ec18beb1576064976f304a2 + +info: + name: > + 1g-music-share <= 1.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c64120f-254f-4deb-93bc-d24e366631ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/1g-music-share/" + google-query: inurl:"/wp-content/plugins/1g-music-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,1g-music-share,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/1g-music-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "1g-music-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/1player-98fa09468510e4f3d608da204df8d702.yaml b/nuclei-templates/cve-less/plugins/1player-98fa09468510e4f3d608da204df8d702.yaml new file mode 100644 index 0000000000..fc74ad393d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/1player-98fa09468510e4f3d608da204df8d702.yaml @@ -0,0 +1,58 @@ +id: 1player-98fa09468510e4f3d608da204df8d702 + +info: + name: > + VideoJS (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d73f773-f084-40da-b18f-8b30b0d0c08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/1player/" + google-query: inurl:"/wp-content/plugins/1player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,1player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/1player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "1player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/2-click-socialmedia-buttons-50d503ecab241e54444834a8beaebf25.yaml b/nuclei-templates/cve-less/plugins/2-click-socialmedia-buttons-50d503ecab241e54444834a8beaebf25.yaml new file mode 100644 index 0000000000..04ed457612 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/2-click-socialmedia-buttons-50d503ecab241e54444834a8beaebf25.yaml @@ -0,0 +1,58 @@ +id: 2-click-socialmedia-buttons-50d503ecab241e54444834a8beaebf25 + +info: + name: > + 2 Click Social Media Buttons < 0.34 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82da75f4-f036-40e0-ae4c-5011d6a39df4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/2-click-socialmedia-buttons/" + google-query: inurl:"/wp-content/plugins/2-click-socialmedia-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,2-click-socialmedia-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/2-click-socialmedia-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "2-click-socialmedia-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/2-click-socialmedia-buttons-a6ea9efcd2b00d833f3dd3cae90d9348.yaml b/nuclei-templates/cve-less/plugins/2-click-socialmedia-buttons-a6ea9efcd2b00d833f3dd3cae90d9348.yaml new file mode 100644 index 0000000000..3b02171885 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/2-click-socialmedia-buttons-a6ea9efcd2b00d833f3dd3cae90d9348.yaml @@ -0,0 +1,58 @@ +id: 2-click-socialmedia-buttons-a6ea9efcd2b00d833f3dd3cae90d9348 + +info: + name: > + 2 Click Social Media Buttons <= 0.33 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40b5d7e4-97a0-4a1c-8000-f2cfd1e751a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/2-click-socialmedia-buttons/" + google-query: inurl:"/wp-content/plugins/2-click-socialmedia-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,2-click-socialmedia-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/2-click-socialmedia-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "2-click-socialmedia-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/2j-slideshow-32bdd04e0affc46dfffa9d8a81425f9b.yaml b/nuclei-templates/cve-less/plugins/2j-slideshow-32bdd04e0affc46dfffa9d8a81425f9b.yaml new file mode 100644 index 0000000000..4c7df660da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/2j-slideshow-32bdd04e0affc46dfffa9d8a81425f9b.yaml @@ -0,0 +1,58 @@ +id: 2j-slideshow-32bdd04e0affc46dfffa9d8a81425f9b + +info: + name: > + Slideshow, Image Slider by 2J <= 1.3.54 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5abfc19-dc34-4458-a0af-5587b7d5a6b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/2j-slideshow/" + google-query: inurl:"/wp-content/plugins/2j-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,2j-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/2j-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "2j-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.54') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/2j-slideshow-6009aafd4759ca9a9de1f0b928158a27.yaml b/nuclei-templates/cve-less/plugins/2j-slideshow-6009aafd4759ca9a9de1f0b928158a27.yaml new file mode 100644 index 0000000000..744fd40712 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/2j-slideshow-6009aafd4759ca9a9de1f0b928158a27.yaml @@ -0,0 +1,58 @@ +id: 2j-slideshow-6009aafd4759ca9a9de1f0b928158a27 + +info: + name: > + Slideshow, Image Slider by 2J <= 1.3.31 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f06d1b9e-e27d-4c43-a69b-7641518e4615?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/2j-slideshow/" + google-query: inurl:"/wp-content/plugins/2j-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,2j-slideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/2j-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "2j-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/2j-slideshow-c5c3a05f327c9f5ee9273cd2dd422a24.yaml b/nuclei-templates/cve-less/plugins/2j-slideshow-c5c3a05f327c9f5ee9273cd2dd422a24.yaml new file mode 100644 index 0000000000..8ee1026bc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/2j-slideshow-c5c3a05f327c9f5ee9273cd2dd422a24.yaml @@ -0,0 +1,58 @@ +id: 2j-slideshow-c5c3a05f327c9f5ee9273cd2dd422a24 + +info: + name: > + Slideshow, Image Slider by 2J <= 1.3.54 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bbccacf-0c34-4656-834b-b3b4c0a84abe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/2j-slideshow/" + google-query: inurl:"/wp-content/plugins/2j-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,2j-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/2j-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "2j-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.54') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/2kb-amazon-affiliates-store-8030149fcea03a9895d089120ebb4064.yaml b/nuclei-templates/cve-less/plugins/2kb-amazon-affiliates-store-8030149fcea03a9895d089120ebb4064.yaml new file mode 100644 index 0000000000..2c2b9d6335 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/2kb-amazon-affiliates-store-8030149fcea03a9895d089120ebb4064.yaml @@ -0,0 +1,58 @@ +id: 2kb-amazon-affiliates-store-8030149fcea03a9895d089120ebb4064 + +info: + name: > + 2kb Amazon Affiliates Store < 2.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/926341b5-345a-4906-b578-b32bfe2ee4ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/2kb-amazon-affiliates-store/" + google-query: inurl:"/wp-content/plugins/2kb-amazon-affiliates-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,2kb-amazon-affiliates-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/2kb-amazon-affiliates-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "2kb-amazon-affiliates-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/2kb-amazon-affiliates-store-942a0a0ff8bd16dd5a3f3bf1e155403a.yaml b/nuclei-templates/cve-less/plugins/2kb-amazon-affiliates-store-942a0a0ff8bd16dd5a3f3bf1e155403a.yaml new file mode 100644 index 0000000000..4ce04b86b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/2kb-amazon-affiliates-store-942a0a0ff8bd16dd5a3f3bf1e155403a.yaml @@ -0,0 +1,58 @@ +id: 2kb-amazon-affiliates-store-942a0a0ff8bd16dd5a3f3bf1e155403a + +info: + name: > + 2kb Amazon Affiliates Store <= 2.1.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d7d9521-4814-411d-859f-c7645551d3c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/2kb-amazon-affiliates-store/" + google-query: inurl:"/wp-content/plugins/2kb-amazon-affiliates-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,2kb-amazon-affiliates-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/2kb-amazon-affiliates-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "2kb-amazon-affiliates-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3-word-address-validation-field-9dec9c9b266000df591dc3dcef1e7d84.yaml b/nuclei-templates/cve-less/plugins/3-word-address-validation-field-9dec9c9b266000df591dc3dcef1e7d84.yaml new file mode 100644 index 0000000000..990c9e54a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3-word-address-validation-field-9dec9c9b266000df591dc3dcef1e7d84.yaml @@ -0,0 +1,58 @@ +id: 3-word-address-validation-field-9dec9c9b266000df591dc3dcef1e7d84 + +info: + name: > + what3words Address Field <= 4.0.0 - Authenticated (Administrator+) Sensitive Information Exposure in class-w3w-autosuggest-public.php + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/770fe29d-601b-487b-b102-d5027f09fc24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3-word-address-validation-field/" + google-query: inurl:"/wp-content/plugins/3-word-address-validation-field/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3-word-address-validation-field,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3-word-address-validation-field/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3-word-address-validation-field" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/360-product-rotation-7c268109bdc7dc29465b157c5422cae8.yaml b/nuclei-templates/cve-less/plugins/360-product-rotation-7c268109bdc7dc29465b157c5422cae8.yaml new file mode 100644 index 0000000000..56835a3fc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/360-product-rotation-7c268109bdc7dc29465b157c5422cae8.yaml @@ -0,0 +1,58 @@ +id: 360-product-rotation-7c268109bdc7dc29465b157c5422cae8 + +info: + name: > + 360 Product Rotation <= 1.2.0 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/613e1862-e0b7-4012-a77d-b5fb56cbbb9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/360-product-rotation/" + google-query: inurl:"/wp-content/plugins/360-product-rotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,360-product-rotation,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/360-product-rotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "360-product-rotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/360-product-rotation-bd56b3adb9677e584285e6d539545e56.yaml b/nuclei-templates/cve-less/plugins/360-product-rotation-bd56b3adb9677e584285e6d539545e56.yaml new file mode 100644 index 0000000000..f5825fd2bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/360-product-rotation-bd56b3adb9677e584285e6d539545e56.yaml @@ -0,0 +1,58 @@ +id: 360-product-rotation-bd56b3adb9677e584285e6d539545e56 + +info: + name: > + 360 Product Rotation < 1.4.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb1f22c2-fdb3-4e3c-b6d5-2e933ec889bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/360-product-rotation/" + google-query: inurl:"/wp-content/plugins/360-product-rotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,360-product-rotation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/360-product-rotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "360-product-rotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/360deg-javascript-viewer-b160f2225fa61e39751381696b9f32c3.yaml b/nuclei-templates/cve-less/plugins/360deg-javascript-viewer-b160f2225fa61e39751381696b9f32c3.yaml new file mode 100644 index 0000000000..f1e8a76795 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/360deg-javascript-viewer-b160f2225fa61e39751381696b9f32c3.yaml @@ -0,0 +1,58 @@ +id: 360deg-javascript-viewer-b160f2225fa61e39751381696b9f32c3 + +info: + name: > + 360 Javascript Viewer <= 1.7.12 - Missing Authorization to Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ba33c84-5198-4c77-8995-d0a315d68990?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/360deg-javascript-viewer/" + google-query: inurl:"/wp-content/plugins/360deg-javascript-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,360deg-javascript-viewer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/360deg-javascript-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "360deg-javascript-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/360deg-javascript-viewer-de737cfbceda5a83bf3527f7e7cd5395.yaml b/nuclei-templates/cve-less/plugins/360deg-javascript-viewer-de737cfbceda5a83bf3527f7e7cd5395.yaml new file mode 100644 index 0000000000..2bc5184413 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/360deg-javascript-viewer-de737cfbceda5a83bf3527f7e7cd5395.yaml @@ -0,0 +1,58 @@ +id: 360deg-javascript-viewer-de737cfbceda5a83bf3527f7e7cd5395 + +info: + name: > + 360 Javascript Viewer <= 1.7.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25a8169d-1057-4cf2-9048-fb85f62d6ead?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/360deg-javascript-viewer/" + google-query: inurl:"/wp-content/plugins/360deg-javascript-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,360deg-javascript-viewer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/360deg-javascript-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "360deg-javascript-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3com-asesor-de-cookies-2f1a45c352b73e0646091d728f0d1831.yaml b/nuclei-templates/cve-less/plugins/3com-asesor-de-cookies-2f1a45c352b73e0646091d728f0d1831.yaml new file mode 100644 index 0000000000..1cd25b53c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3com-asesor-de-cookies-2f1a45c352b73e0646091d728f0d1831.yaml @@ -0,0 +1,58 @@ +id: 3com-asesor-de-cookies-2f1a45c352b73e0646091d728f0d1831 + +info: + name: > + 3com – Asesor de Cookies <= 3.4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d4544b9-bb15-47e2-b377-0bae91aba4da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3com-asesor-de-cookies/" + google-query: inurl:"/wp-content/plugins/3com-asesor-de-cookies/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3com-asesor-de-cookies,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3com-asesor-de-cookies/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3com-asesor-de-cookies" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3d-cover-carousel-8727745b12483495d5142bd68893d94d.yaml b/nuclei-templates/cve-less/plugins/3d-cover-carousel-8727745b12483495d5142bd68893d94d.yaml new file mode 100644 index 0000000000..2bbc4b8ff7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3d-cover-carousel-8727745b12483495d5142bd68893d94d.yaml @@ -0,0 +1,58 @@ +id: 3d-cover-carousel-8727745b12483495d5142bd68893d94d + +info: + name: > + 3D Cover Carousel <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5e14205-d31d-414b-aff2-22f589dbf04c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3d-cover-carousel/" + google-query: inurl:"/wp-content/plugins/3d-cover-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3d-cover-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3d-cover-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3d-cover-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-2c9be73a62038f3d8273efbfe3ddeeff.yaml b/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-2c9be73a62038f3d8273efbfe3ddeeff.yaml new file mode 100644 index 0000000000..307d0578ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-2c9be73a62038f3d8273efbfe3ddeeff.yaml @@ -0,0 +1,58 @@ +id: 3d-flipbook-dflip-lite-2c9be73a62038f3d8273efbfe3ddeeff + +info: + name: > + PDF Flipbook, 3D Flipbook – DearFlip <= 2.2.26 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92e37b28-1a17-417a-b40f-cb4bbe6ec759?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3d-flipbook-dflip-lite/" + google-query: inurl:"/wp-content/plugins/3d-flipbook-dflip-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3d-flipbook-dflip-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3d-flipbook-dflip-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3d-flipbook-dflip-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-6970693f733e5a846cb7f76630b73d22.yaml b/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-6970693f733e5a846cb7f76630b73d22.yaml new file mode 100644 index 0000000000..9677ab4f43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-6970693f733e5a846cb7f76630b73d22.yaml @@ -0,0 +1,58 @@ +id: 3d-flipbook-dflip-lite-6970693f733e5a846cb7f76630b73d22 + +info: + name: > + DearFlip <= 2.2.26 - Authenticated (Contributor+) Stored Cross-Site Scripting via force_fit + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a10cf70e-bc66-4888-b88d-c1c4847389c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3d-flipbook-dflip-lite/" + google-query: inurl:"/wp-content/plugins/3d-flipbook-dflip-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3d-flipbook-dflip-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3d-flipbook-dflip-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3d-flipbook-dflip-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-f6e79c74546c68ce5cae314ffc286a54.yaml b/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-f6e79c74546c68ce5cae314ffc286a54.yaml new file mode 100644 index 0000000000..290b3da1c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3d-flipbook-dflip-lite-f6e79c74546c68ce5cae314ffc286a54.yaml @@ -0,0 +1,58 @@ +id: 3d-flipbook-dflip-lite-f6e79c74546c68ce5cae314ffc286a54 + +info: + name: > + PDF Flipbook, 3D Flipbook WordPress – DearFlip Lite <= 1.7.12 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efb692da-6878-420a-b16e-2cb871bef764?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3d-flipbook-dflip-lite/" + google-query: inurl:"/wp-content/plugins/3d-flipbook-dflip-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3d-flipbook-dflip-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3d-flipbook-dflip-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3d-flipbook-dflip-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3d-viewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/3d-viewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..da81a92297 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3d-viewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: 3d-viewer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3d-viewer/" + google-query: inurl:"/wp-content/plugins/3d-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3d-viewer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3d-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3d-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3dady-real-time-web-stats-ea643024832757f9f2006e750b2fb2aa.yaml b/nuclei-templates/cve-less/plugins/3dady-real-time-web-stats-ea643024832757f9f2006e750b2fb2aa.yaml new file mode 100644 index 0000000000..231c8f1ac1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3dady-real-time-web-stats-ea643024832757f9f2006e750b2fb2aa.yaml @@ -0,0 +1,58 @@ +id: 3dady-real-time-web-stats-ea643024832757f9f2006e750b2fb2aa + +info: + name: > + 3dady real-time web stats <= 1.0 - Authenticated (Administrator+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5223d6c3-9fe0-4ac5-bd69-990a13b17826?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3dady-real-time-web-stats/" + google-query: inurl:"/wp-content/plugins/3dady-real-time-web-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3dady-real-time-web-stats,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3dady-real-time-web-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3dady-real-time-web-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3dprint-d5d38bc96ea3d80c250cd1535165fc1d.yaml b/nuclei-templates/cve-less/plugins/3dprint-d5d38bc96ea3d80c250cd1535165fc1d.yaml new file mode 100644 index 0000000000..b866a25c26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3dprint-d5d38bc96ea3d80c250cd1535165fc1d.yaml @@ -0,0 +1,58 @@ +id: 3dprint-d5d38bc96ea3d80c250cd1535165fc1d + +info: + name: > + 3DPrint <= 3.5.6.8 - Cross-Site Request Forgery to Arbitrary File Download + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/095724bb-9949-4c62-9a11-02f1cd4c6043?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3dprint/" + google-query: inurl:"/wp-content/plugins/3dprint/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3dprint,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3dprint/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3dprint" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3dprint-f6f5e5b83dd05b47087018ab93dc70c8.yaml b/nuclei-templates/cve-less/plugins/3dprint-f6f5e5b83dd05b47087018ab93dc70c8.yaml new file mode 100644 index 0000000000..9b97aba140 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3dprint-f6f5e5b83dd05b47087018ab93dc70c8.yaml @@ -0,0 +1,58 @@ +id: 3dprint-f6f5e5b83dd05b47087018ab93dc70c8 + +info: + name: > + 3DPrint <= 3.5.4.7 - Cross-Site Request Forgery to Arbitrary File Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f89e9c46-aca3-4b2f-b935-2976c510ed8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3dprint/" + google-query: inurl:"/wp-content/plugins/3dprint/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3dprint,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3dprint/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3dprint" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3dprint-lite-e32ba6270a5c504833f090f97c5f6929.yaml b/nuclei-templates/cve-less/plugins/3dprint-lite-e32ba6270a5c504833f090f97c5f6929.yaml new file mode 100644 index 0000000000..ee452f4b47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3dprint-lite-e32ba6270a5c504833f090f97c5f6929.yaml @@ -0,0 +1,58 @@ +id: 3dprint-lite-e32ba6270a5c504833f090f97c5f6929 + +info: + name: > + 3DPrint Lite < 1.9.1.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d52f601b-6a80-4b6f-895b-fcbbdf73103a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3dprint-lite/" + google-query: inurl:"/wp-content/plugins/3dprint-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3dprint-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3dprint-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3dprint-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3r-elementor-timeline-widget-1c97daee437b7051f2d3a3601380f79a.yaml b/nuclei-templates/cve-less/plugins/3r-elementor-timeline-widget-1c97daee437b7051f2d3a3601380f79a.yaml new file mode 100644 index 0000000000..9e6bc9eb3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3r-elementor-timeline-widget-1c97daee437b7051f2d3a3601380f79a.yaml @@ -0,0 +1,58 @@ +id: 3r-elementor-timeline-widget-1c97daee437b7051f2d3a3601380f79a + +info: + name: > + Elementor Timeline Widget <= 2.2 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/819b3e0c-1cd0-45f9-8621-41817ad1de5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3r-elementor-timeline-widget/" + google-query: inurl:"/wp-content/plugins/3r-elementor-timeline-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3r-elementor-timeline-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3r-elementor-timeline-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3r-elementor-timeline-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/3xsocializer-af2ae774d22378ee0a69d1768e15e475.yaml b/nuclei-templates/cve-less/plugins/3xsocializer-af2ae774d22378ee0a69d1768e15e475.yaml new file mode 100644 index 0000000000..8845e4fdc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/3xsocializer-af2ae774d22378ee0a69d1768e15e475.yaml @@ -0,0 +1,58 @@ +id: 3xsocializer-af2ae774d22378ee0a69d1768e15e475 + +info: + name: > + 3xSocializer <= 0.98.22 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1200d2b3-2c1b-44a4-bf87-2d9b0121d6cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/3xsocializer/" + google-query: inurl:"/wp-content/plugins/3xsocializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,3xsocializer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/3xsocializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "3xsocializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.98.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-redirection-manager-5abfc4a3a7a8a78baed36252f32bd2c8.yaml b/nuclei-templates/cve-less/plugins/404-redirection-manager-5abfc4a3a7a8a78baed36252f32bd2c8.yaml new file mode 100644 index 0000000000..fadc9df4ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-redirection-manager-5abfc4a3a7a8a78baed36252f32bd2c8.yaml @@ -0,0 +1,58 @@ +id: 404-redirection-manager-5abfc4a3a7a8a78baed36252f32bd2c8 + +info: + name: > + 404 SEO Redirection <= 1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d6bebb7-375c-45b8-9b54-58c6dbc0bb70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-redirection-manager/" + google-query: inurl:"/wp-content/plugins/404-redirection-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-redirection-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-redirection-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-redirection-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-redirection-manager-ab1f48347ef68d08de8af611ca6f7153.yaml b/nuclei-templates/cve-less/plugins/404-redirection-manager-ab1f48347ef68d08de8af611ca6f7153.yaml new file mode 100644 index 0000000000..623da4884c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-redirection-manager-ab1f48347ef68d08de8af611ca6f7153.yaml @@ -0,0 +1,58 @@ +id: 404-redirection-manager-ab1f48347ef68d08de8af611ca6f7153 + +info: + name: > + 404 SEO Redirection <= 1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b64921fe-1b09-49e7-b2ec-f708fba99c2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-redirection-manager/" + google-query: inurl:"/wp-content/plugins/404-redirection-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-redirection-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-redirection-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-redirection-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-solution-1c59c6071776e5fed814157ec36f53bd.yaml b/nuclei-templates/cve-less/plugins/404-solution-1c59c6071776e5fed814157ec36f53bd.yaml new file mode 100644 index 0000000000..f57d9f8e0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-solution-1c59c6071776e5fed814157ec36f53bd.yaml @@ -0,0 +1,58 @@ +id: 404-solution-1c59c6071776e5fed814157ec36f53bd + +info: + name: > + 404 Solution <= 2.33.0 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fadc1374-fe4d-414a-af84-1a4de5b89807?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-solution/" + google-query: inurl:"/wp-content/plugins/404-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-solution,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-solution-64f66ce5bf8a7c60ba469ac77d7c053d.yaml b/nuclei-templates/cve-less/plugins/404-solution-64f66ce5bf8a7c60ba469ac77d7c053d.yaml new file mode 100644 index 0000000000..d2c54267a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-solution-64f66ce5bf8a7c60ba469ac77d7c053d.yaml @@ -0,0 +1,58 @@ +id: 404-solution-64f66ce5bf8a7c60ba469ac77d7c053d + +info: + name: > + 404 Solution <= 2.35.7 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/901e85b9-0948-4a00-a29f-a726b53ba51b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-solution/" + google-query: inurl:"/wp-content/plugins/404-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-solution,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.35.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-solution-80092ae62e91070a929addb38cf05eeb.yaml b/nuclei-templates/cve-less/plugins/404-solution-80092ae62e91070a929addb38cf05eeb.yaml new file mode 100644 index 0000000000..faf4164551 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-solution-80092ae62e91070a929addb38cf05eeb.yaml @@ -0,0 +1,58 @@ +id: 404-solution-80092ae62e91070a929addb38cf05eeb + +info: + name: > + 404 Solution <= 2.33.0 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73643d45-9542-4372-a7a2-0a443819b8a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-solution/" + google-query: inurl:"/wp-content/plugins/404-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-solution,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-solution-dc23dda4be9febbbe1e1b634c133ec2a.yaml b/nuclei-templates/cve-less/plugins/404-solution-dc23dda4be9febbbe1e1b634c133ec2a.yaml new file mode 100644 index 0000000000..57f22f31c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-solution-dc23dda4be9febbbe1e1b634c133ec2a.yaml @@ -0,0 +1,58 @@ +id: 404-solution-dc23dda4be9febbbe1e1b634c133ec2a + +info: + name: > + 404 Solution <= 2.33.2 - Authenticated (Administrator+) SQL Injection via orderby + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14958861-305e-4a9b-b428-de204cd6781e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-solution/" + google-query: inurl:"/wp-content/plugins/404-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-solution,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.34.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-solution-e8f10c1130d647962cf4e7ae1be8e563.yaml b/nuclei-templates/cve-less/plugins/404-solution-e8f10c1130d647962cf4e7ae1be8e563.yaml new file mode 100644 index 0000000000..dc0f0e2a0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-solution-e8f10c1130d647962cf4e7ae1be8e563.yaml @@ -0,0 +1,58 @@ +id: 404-solution-e8f10c1130d647962cf4e7ae1be8e563 + +info: + name: > + 404 Solution <= 2.34.0 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/477d3d7a-6028-4dd3-b713-6098bfe32832?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-solution/" + google-query: inurl:"/wp-content/plugins/404-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-solution,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.35.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-to-301-1455eb1db51304e088780d96a4de0388.yaml b/nuclei-templates/cve-less/plugins/404-to-301-1455eb1db51304e088780d96a4de0388.yaml new file mode 100644 index 0000000000..14ccfef152 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-to-301-1455eb1db51304e088780d96a4de0388.yaml @@ -0,0 +1,58 @@ +id: 404-to-301-1455eb1db51304e088780d96a4de0388 + +info: + name: > + 404 to 301 <= 2.3.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28624634-9161-4da7-89f3-88ce1d38c3ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-to-301/" + google-query: inurl:"/wp-content/plugins/404-to-301/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-to-301,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-to-301/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-to-301" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-to-301-30cdceb24c9fb6269d5ab38dde655939.yaml b/nuclei-templates/cve-less/plugins/404-to-301-30cdceb24c9fb6269d5ab38dde655939.yaml new file mode 100644 index 0000000000..5bbce83f8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-to-301-30cdceb24c9fb6269d5ab38dde655939.yaml @@ -0,0 +1,58 @@ +id: 404-to-301-30cdceb24c9fb6269d5ab38dde655939 + +info: + name: > + 404 to 301 – Redirect, Log and Notify 404 Errors <= 2.0.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69b2f126-8f57-4bea-b0e9-14b4566ac470?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-to-301/" + google-query: inurl:"/wp-content/plugins/404-to-301/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-to-301,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-to-301/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-to-301" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-to-301-77ebf1c20a9fe589cfb00388461b5ac7.yaml b/nuclei-templates/cve-less/plugins/404-to-301-77ebf1c20a9fe589cfb00388461b5ac7.yaml new file mode 100644 index 0000000000..8ced7aecfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-to-301-77ebf1c20a9fe589cfb00388461b5ac7.yaml @@ -0,0 +1,58 @@ +id: 404-to-301-77ebf1c20a9fe589cfb00388461b5ac7 + +info: + name: > + 404 to 301 <= 3.0.8 - Logs Deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e229ab5e-c9e3-4a7c-ac28-ba35b6abf85e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-to-301/" + google-query: inurl:"/wp-content/plugins/404-to-301/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-to-301,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-to-301/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-to-301" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-to-301-cb580b1f1380796b4c9c6b8e0a7f576c.yaml b/nuclei-templates/cve-less/plugins/404-to-301-cb580b1f1380796b4c9c6b8e0a7f576c.yaml new file mode 100644 index 0000000000..33aeacac2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-to-301-cb580b1f1380796b4c9c6b8e0a7f576c.yaml @@ -0,0 +1,58 @@ +id: 404-to-301-cb580b1f1380796b4c9c6b8e0a7f576c + +info: + name: > + 404 to 301 – Redirect, Log and Notify 404 Errors <= 3.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11177270-cc73-4c65-9f72-8c0a0a89bed5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-to-301/" + google-query: inurl:"/wp-content/plugins/404-to-301/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-to-301,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-to-301/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-to-301" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-to-301-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/404-to-301-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..a69620c811 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-to-301-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: 404-to-301-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-to-301/" + google-query: inurl:"/wp-content/plugins/404-to-301/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-to-301,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-to-301/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-to-301" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-to-301-e5012481eb3358496d9e8266284a0c72.yaml b/nuclei-templates/cve-less/plugins/404-to-301-e5012481eb3358496d9e8266284a0c72.yaml new file mode 100644 index 0000000000..eceff4d990 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-to-301-e5012481eb3358496d9e8266284a0c72.yaml @@ -0,0 +1,58 @@ +id: 404-to-301-e5012481eb3358496d9e8266284a0c72 + +info: + name: > + 404 to 301 <= 3.0.7 - Missing Authorization to Redirect Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05d6b27f-b1e5-4bb8-b7db-f8295a5e0d5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-to-301/" + google-query: inurl:"/wp-content/plugins/404-to-301/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-to-301,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-to-301/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-to-301" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404-to-start-540d765197d5d77b942283129699e946.yaml b/nuclei-templates/cve-less/plugins/404-to-start-540d765197d5d77b942283129699e946.yaml new file mode 100644 index 0000000000..3b0390c149 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404-to-start-540d765197d5d77b942283129699e946.yaml @@ -0,0 +1,58 @@ +id: 404-to-start-540d765197d5d77b942283129699e946 + +info: + name: > + 404 to Start <= 1.6.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d4c5ff9-d4aa-4270-b00b-41353b32c8e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404-to-start/" + google-query: inurl:"/wp-content/plugins/404-to-start/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404-to-start,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404-to-start/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404-to-start" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404like-af8b6c1405ca4fecbb6348cbb779bff6.yaml b/nuclei-templates/cve-less/plugins/404like-af8b6c1405ca4fecbb6348cbb779bff6.yaml new file mode 100644 index 0000000000..1b82cfd840 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404like-af8b6c1405ca4fecbb6348cbb779bff6.yaml @@ -0,0 +1,58 @@ +id: 404like-af8b6c1405ca4fecbb6348cbb779bff6 + +info: + name: > + 404like <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5bcad01-02ca-46a0-9196-df9f2110bc8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404like/" + google-query: inurl:"/wp-content/plugins/404like/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404like,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404like/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404like" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/404s-fb3335fd014953747fe67771d5c2fe67.yaml b/nuclei-templates/cve-less/plugins/404s-fb3335fd014953747fe67771d5c2fe67.yaml new file mode 100644 index 0000000000..eb79c30836 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/404s-fb3335fd014953747fe67771d5c2fe67.yaml @@ -0,0 +1,58 @@ +id: 404s-fb3335fd014953747fe67771d5c2fe67 + +info: + name: > + 404s <= 3.4.9 - Administrator+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ef48df5-dc3f-45d2-87af-35a3a0ed8c2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/404s/" + google-query: inurl:"/wp-content/plugins/404s/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,404s,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/404s/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "404s" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/4ecps-webforms-2d4f6a1b39a4cc9b06569630fa151900.yaml b/nuclei-templates/cve-less/plugins/4ecps-webforms-2d4f6a1b39a4cc9b06569630fa151900.yaml new file mode 100644 index 0000000000..de5b8927f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/4ecps-webforms-2d4f6a1b39a4cc9b06569630fa151900.yaml @@ -0,0 +1,58 @@ +id: 4ecps-webforms-2d4f6a1b39a4cc9b06569630fa151900 + +info: + name: > + 4ECPS Web Forms <= 0.2.17 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/550fcbbd-254d-4b3c-a240-8afcf9f6937e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/4ecps-webforms/" + google-query: inurl:"/wp-content/plugins/4ecps-webforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,4ecps-webforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/4ecps-webforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "4ecps-webforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/4k-icon-fonts-for-visual-composer-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/4k-icon-fonts-for-visual-composer-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..05d6f7a7a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/4k-icon-fonts-for-visual-composer-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: 4k-icon-fonts-for-visual-composer-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/4k-icon-fonts-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/4k-icon-fonts-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,4k-icon-fonts-for-visual-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/4k-icon-fonts-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "4k-icon-fonts-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/5-anker-connect-01a4732a49ff7a9ef4ebc45204cbcc4f.yaml b/nuclei-templates/cve-less/plugins/5-anker-connect-01a4732a49ff7a9ef4ebc45204cbcc4f.yaml new file mode 100644 index 0000000000..72b957a97f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/5-anker-connect-01a4732a49ff7a9ef4ebc45204cbcc4f.yaml @@ -0,0 +1,58 @@ +id: 5-anker-connect-01a4732a49ff7a9ef4ebc45204cbcc4f + +info: + name: > + 5 Anker Connect <= 1.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bc1f99e-1aa8-431a-a2ab-bdee5ece602f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/5-anker-connect/" + google-query: inurl:"/wp-content/plugins/5-anker-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,5-anker-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/5-anker-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "5-anker-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-067c415d5e57c3f7bf3c32e31e7bfdc9.yaml b/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-067c415d5e57c3f7bf3c32e31e7bfdc9.yaml new file mode 100644 index 0000000000..3c0a1d5a3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-067c415d5e57c3f7bf3c32e31e7bfdc9.yaml @@ -0,0 +1,58 @@ +id: 5-stars-rating-funnel-067c415d5e57c3f7bf3c32e31e7bfdc9 + +info: + name: > + 5 Stars Rating Funnel <= 1.2.53 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5093d787-0357-4c28-9d27-8335b10fc499?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/5-stars-rating-funnel/" + google-query: inurl:"/wp-content/plugins/5-stars-rating-funnel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,5-stars-rating-funnel,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/5-stars-rating-funnel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "5-stars-rating-funnel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-078909fc07244cccae3451c5f9a6996f.yaml b/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-078909fc07244cccae3451c5f9a6996f.yaml new file mode 100644 index 0000000000..08f01a75cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-078909fc07244cccae3451c5f9a6996f.yaml @@ -0,0 +1,58 @@ +id: 5-stars-rating-funnel-078909fc07244cccae3451c5f9a6996f + +info: + name: > + 5 Stars Rating Funnel <= 1.2.67 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/461cf8ba-a0d1-4de8-983d-170305e14f97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/5-stars-rating-funnel/" + google-query: inurl:"/wp-content/plugins/5-stars-rating-funnel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,5-stars-rating-funnel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/5-stars-rating-funnel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "5-stars-rating-funnel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-aa9afd9a4b3e913533a4ca30d7c2f62e.yaml b/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-aa9afd9a4b3e913533a4ca30d7c2f62e.yaml new file mode 100644 index 0000000000..dbdf83bdc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/5-stars-rating-funnel-aa9afd9a4b3e913533a4ca30d7c2f62e.yaml @@ -0,0 +1,58 @@ +id: 5-stars-rating-funnel-aa9afd9a4b3e913533a4ca30d7c2f62e + +info: + name: > + 5 star review funnel for Google Reviews, Trustpilot, ProvenExpert and more | RRatingg <= 1.2.67 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caf879a7-650e-4c70-b23a-51cac00f0cc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/5-stars-rating-funnel/" + google-query: inurl:"/wp-content/plugins/5-stars-rating-funnel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,5-stars-rating-funnel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/5-stars-rating-funnel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "5-stars-rating-funnel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/5280-bootstrap-modal-contact-form-4d5bd93e0c27080244733cb180f3f8d5.yaml b/nuclei-templates/cve-less/plugins/5280-bootstrap-modal-contact-form-4d5bd93e0c27080244733cb180f3f8d5.yaml new file mode 100644 index 0000000000..20565b5000 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/5280-bootstrap-modal-contact-form-4d5bd93e0c27080244733cb180f3f8d5.yaml @@ -0,0 +1,58 @@ +id: 5280-bootstrap-modal-contact-form-4d5bd93e0c27080244733cb180f3f8d5 + +info: + name: > + 5280 Bootstrap Modal Contact Form <= 1.0 - Cross-Site Request Forgery to Bulk Delete Messages + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18464483-1d2f-4a4e-a1cc-6c1ddcc2dcf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/5280-bootstrap-modal-contact-form/" + google-query: inurl:"/wp-content/plugins/5280-bootstrap-modal-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,5280-bootstrap-modal-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/5280-bootstrap-modal-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "5280-bootstrap-modal-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/59sec-lite-contact-form-7-push-notifications-on-ios-and-android-535595f4b0854a5ba3ef769bc0a6d8a1.yaml b/nuclei-templates/cve-less/plugins/59sec-lite-contact-form-7-push-notifications-on-ios-and-android-535595f4b0854a5ba3ef769bc0a6d8a1.yaml new file mode 100644 index 0000000000..8c7784548c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/59sec-lite-contact-form-7-push-notifications-on-ios-and-android-535595f4b0854a5ba3ef769bc0a6d8a1.yaml @@ -0,0 +1,58 @@ +id: 59sec-lite-contact-form-7-push-notifications-on-ios-and-android-535595f4b0854a5ba3ef769bc0a6d8a1 + +info: + name: > + THE Leads Management System: 59sec LITE <= 3.4.1 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65aa6694-0ed9-40a4-bd1c-1b51cd5e537d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/59sec-lite-contact-form-7-push-notifications-on-ios-and-android/" + google-query: inurl:"/wp-content/plugins/59sec-lite-contact-form-7-push-notifications-on-ios-and-android/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,59sec-lite-contact-form-7-push-notifications-on-ios-and-android,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/59sec-lite-contact-form-7-push-notifications-on-ios-and-android/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "59sec-lite-contact-form-7-push-notifications-on-ios-and-android" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/8-degree-notification-bar-d7e6e52fbc5100c15dd93975c02af422.yaml b/nuclei-templates/cve-less/plugins/8-degree-notification-bar-d7e6e52fbc5100c15dd93975c02af422.yaml new file mode 100644 index 0000000000..ad54688788 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/8-degree-notification-bar-d7e6e52fbc5100c15dd93975c02af422.yaml @@ -0,0 +1,58 @@ +id: 8-degree-notification-bar-d7e6e52fbc5100c15dd93975c02af422 + +info: + name: > + Notification Bar for WordPress <= 1.1.8 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c49389b5-bf5a-49b8-8d20-404195b50308?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/8-degree-notification-bar/" + google-query: inurl:"/wp-content/plugins/8-degree-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,8-degree-notification-bar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/8-degree-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "8-degree-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/99fy-core-2ade9cd6a231682261bc318b1ed04cfb.yaml b/nuclei-templates/cve-less/plugins/99fy-core-2ade9cd6a231682261bc318b1ed04cfb.yaml new file mode 100644 index 0000000000..533aaf0a74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/99fy-core-2ade9cd6a231682261bc318b1ed04cfb.yaml @@ -0,0 +1,58 @@ +id: 99fy-core-2ade9cd6a231682261bc318b1ed04cfb + +info: + name: > + Free WooCommerce Theme 99fy Extension <= 1.2.7 - Cross-Site Request Forgery leading to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e215a5c-7a01-4a1d-b051-3abf742bf573?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/99fy-core/" + google-query: inurl:"/wp-content/plugins/99fy-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,99fy-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/99fy-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "99fy-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/99robots-header-footer-code-manager-pro-747c4bd1125204cefd447ba68faf21f5.yaml b/nuclei-templates/cve-less/plugins/99robots-header-footer-code-manager-pro-747c4bd1125204cefd447ba68faf21f5.yaml new file mode 100644 index 0000000000..a8d31d9817 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/99robots-header-footer-code-manager-pro-747c4bd1125204cefd447ba68faf21f5.yaml @@ -0,0 +1,58 @@ +id: 99robots-header-footer-code-manager-pro-747c4bd1125204cefd447ba68faf21f5 + +info: + name: > + Header Footer Code Manager Pro <= 1.0.16 - Reflected Cross-Site Scripting via message + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83a35d16-526d-4e45-b2cf-a6858b2b2f21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/99robots-header-footer-code-manager-pro/" + google-query: inurl:"/wp-content/plugins/99robots-header-footer-code-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,99robots-header-footer-code-manager-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/99robots-header-footer-code-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "99robots-header-footer-code-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a-forms-44494ddc52293f35d4e91f03bc8a3bb3.yaml b/nuclei-templates/cve-less/plugins/a-forms-44494ddc52293f35d4e91f03bc8a3bb3.yaml new file mode 100644 index 0000000000..84770e4da3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a-forms-44494ddc52293f35d4e91f03bc8a3bb3.yaml @@ -0,0 +1,58 @@ +id: a-forms-44494ddc52293f35d4e91f03bc8a3bb3 + +info: + name: > + A Forms <= 1.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0755c8f-89c4-45a5-95a4-fcfe985f037f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a-forms/" + google-query: inurl:"/wp-content/plugins/a-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a-staff-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/a-staff-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..4365f5579e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a-staff-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: a-staff-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a-staff/" + google-query: inurl:"/wp-content/plugins/a-staff/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a-staff,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a-staff/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a-staff" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a2-optimized-wp-7a6dd13ed18a2e45d6c2f734b970d2e6.yaml b/nuclei-templates/cve-less/plugins/a2-optimized-wp-7a6dd13ed18a2e45d6c2f734b970d2e6.yaml new file mode 100644 index 0000000000..8a9bb0c875 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a2-optimized-wp-7a6dd13ed18a2e45d6c2f734b970d2e6.yaml @@ -0,0 +1,58 @@ +id: a2-optimized-wp-7a6dd13ed18a2e45d6c2f734b970d2e6 + +info: + name: > + A2 Optimized WP <= 3.0.4 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/463fdbde-1d98-4f52-b835-cba1ae567f4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a2-optimized-wp/" + google-query: inurl:"/wp-content/plugins/a2-optimized-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a2-optimized-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a2-optimized-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a2-optimized-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a3-lazy-load-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/a3-lazy-load-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..42349f131e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a3-lazy-load-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: a3-lazy-load-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a3-lazy-load/" + google-query: inurl:"/wp-content/plugins/a3-lazy-load/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a3-lazy-load,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a3-lazy-load/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a3-lazy-load" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a3-lazy-load-b935aac9392ea74d48c16c20e8b0b995.yaml b/nuclei-templates/cve-less/plugins/a3-lazy-load-b935aac9392ea74d48c16c20e8b0b995.yaml new file mode 100644 index 0000000000..8ca17b0d9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a3-lazy-load-b935aac9392ea74d48c16c20e8b0b995.yaml @@ -0,0 +1,58 @@ +id: a3-lazy-load-b935aac9392ea74d48c16c20e8b0b995 + +info: + name: > + a3rev Multiple Plugins <= Various Versions - Cross-Site Request Forgery to Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9133fa10-036b-4f42-9d0c-8e15d2625f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a3-lazy-load/" + google-query: inurl:"/wp-content/plugins/a3-lazy-load/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a3-lazy-load,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a3-lazy-load/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a3-lazy-load" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a3-portfolio-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/a3-portfolio-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..65cffddaec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a3-portfolio-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: a3-portfolio-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a3-portfolio/" + google-query: inurl:"/wp-content/plugins/a3-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a3-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a3-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a3-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a3-portfolio-69bbdafafddf73eabec5b44d29b3cf8b.yaml b/nuclei-templates/cve-less/plugins/a3-portfolio-69bbdafafddf73eabec5b44d29b3cf8b.yaml new file mode 100644 index 0000000000..d23f46a697 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a3-portfolio-69bbdafafddf73eabec5b44d29b3cf8b.yaml @@ -0,0 +1,58 @@ +id: a3-portfolio-69bbdafafddf73eabec5b44d29b3cf8b + +info: + name: > + a3 Portfolio <= 3.1.0 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a190909-4b0f-4a44-8371-d79f64d323c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a3-portfolio/" + google-query: inurl:"/wp-content/plugins/a3-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a3-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a3-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a3-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a3-portfolio-b935aac9392ea74d48c16c20e8b0b995.yaml b/nuclei-templates/cve-less/plugins/a3-portfolio-b935aac9392ea74d48c16c20e8b0b995.yaml new file mode 100644 index 0000000000..9629fd5dd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a3-portfolio-b935aac9392ea74d48c16c20e8b0b995.yaml @@ -0,0 +1,58 @@ +id: a3-portfolio-b935aac9392ea74d48c16c20e8b0b995 + +info: + name: > + a3rev Multiple Plugins <= Various Versions - Cross-Site Request Forgery to Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9133fa10-036b-4f42-9d0c-8e15d2625f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a3-portfolio/" + google-query: inurl:"/wp-content/plugins/a3-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a3-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a3-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a3-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a3-responsive-slider-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/a3-responsive-slider-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..1805873dcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a3-responsive-slider-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: a3-responsive-slider-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a3-responsive-slider/" + google-query: inurl:"/wp-content/plugins/a3-responsive-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a3-responsive-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a3-responsive-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a3-responsive-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a3-responsive-slider-ae8b89aaa7a588f83d4c4781cadfd7d8.yaml b/nuclei-templates/cve-less/plugins/a3-responsive-slider-ae8b89aaa7a588f83d4c4781cadfd7d8.yaml new file mode 100644 index 0000000000..d62caf52ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a3-responsive-slider-ae8b89aaa7a588f83d4c4781cadfd7d8.yaml @@ -0,0 +1,58 @@ +id: a3-responsive-slider-ae8b89aaa7a588f83d4c4781cadfd7d8 + +info: + name: > + a3 Responsive Slider <= 2.1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a9b4c03-e7ec-48d6-87fe-67e8a5780703?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a3-responsive-slider/" + google-query: inurl:"/wp-content/plugins/a3-responsive-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a3-responsive-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a3-responsive-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a3-responsive-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a3-responsive-slider-b935aac9392ea74d48c16c20e8b0b995.yaml b/nuclei-templates/cve-less/plugins/a3-responsive-slider-b935aac9392ea74d48c16c20e8b0b995.yaml new file mode 100644 index 0000000000..a585a44787 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a3-responsive-slider-b935aac9392ea74d48c16c20e8b0b995.yaml @@ -0,0 +1,58 @@ +id: a3-responsive-slider-b935aac9392ea74d48c16c20e8b0b995 + +info: + name: > + a3rev Multiple Plugins <= Various Versions - Cross-Site Request Forgery to Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9133fa10-036b-4f42-9d0c-8e15d2625f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a3-responsive-slider/" + google-query: inurl:"/wp-content/plugins/a3-responsive-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a3-responsive-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a3-responsive-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a3-responsive-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a4-barcode-generator-1003d8c4cbec4c692768d02c2deb833d.yaml b/nuclei-templates/cve-less/plugins/a4-barcode-generator-1003d8c4cbec4c692768d02c2deb833d.yaml new file mode 100644 index 0000000000..14bca9e72c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a4-barcode-generator-1003d8c4cbec4c692768d02c2deb833d.yaml @@ -0,0 +1,58 @@ +id: a4-barcode-generator-1003d8c4cbec4c692768d02c2deb833d + +info: + name: > + Print Labels with Barcodes. Create price tags, product labels, order labels for WooCommerce <= 3.4.6 - Authenticated(Subscriber+) Stored Cross-Site Scripting via Templates + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2d03b83-c406-4d3f-b6be-015edcc15515?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a4-barcode-generator/" + google-query: inurl:"/wp-content/plugins/a4-barcode-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a4-barcode-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a4-barcode-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a4-barcode-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/a4-barcode-generator-96d45953f77055903959c32a94c71bbf.yaml b/nuclei-templates/cve-less/plugins/a4-barcode-generator-96d45953f77055903959c32a94c71bbf.yaml new file mode 100644 index 0000000000..80fdee693c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/a4-barcode-generator-96d45953f77055903959c32a94c71bbf.yaml @@ -0,0 +1,58 @@ +id: a4-barcode-generator-96d45953f77055903959c32a94c71bbf + +info: + name: > + Print Labels with Barcodes. Create price tags, product labels, order labels for WooCommerce <= 3.4.6 - Improper Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e15d285-aa1d-461d-bdc2-642e7ccd789b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/a4-barcode-generator/" + google-query: inurl:"/wp-content/plugins/a4-barcode-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,a4-barcode-generator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/a4-barcode-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "a4-barcode-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aa-calculator-abc87888690b19dcb77925a4c30ad407.yaml b/nuclei-templates/cve-less/plugins/aa-calculator-abc87888690b19dcb77925a4c30ad407.yaml new file mode 100644 index 0000000000..91bdd49c34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aa-calculator-abc87888690b19dcb77925a4c30ad407.yaml @@ -0,0 +1,58 @@ +id: aa-calculator-abc87888690b19dcb77925a4c30ad407 + +info: + name: > + AA Cash Calculator <= 1.0 - Reflected Cross-Site Scripting via invoice + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/933ea8a2-3d1d-43a3-bb14-52f37576c9e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aa-calculator/" + google-query: inurl:"/wp-content/plugins/aa-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aa-calculator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aa-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aa-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aajoda-testimonials-6d0e53ee77e3c1fef450b5cd709f1ad9.yaml b/nuclei-templates/cve-less/plugins/aajoda-testimonials-6d0e53ee77e3c1fef450b5cd709f1ad9.yaml new file mode 100644 index 0000000000..ddf67fbb4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aajoda-testimonials-6d0e53ee77e3c1fef450b5cd709f1ad9.yaml @@ -0,0 +1,58 @@ +id: aajoda-testimonials-6d0e53ee77e3c1fef450b5cd709f1ad9 + +info: + name: > + Aajoda Testimonials <= 2.2.1 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10f28404-acd0-40de-af42-2970b5b25bde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aajoda-testimonials/" + google-query: inurl:"/wp-content/plugins/aajoda-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aajoda-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aajoda-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aajoda-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aawp-339dac9db5bc9d83f9bdf6846ab3c955.yaml b/nuclei-templates/cve-less/plugins/aawp-339dac9db5bc9d83f9bdf6846ab3c955.yaml new file mode 100644 index 0000000000..7b094f6fab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aawp-339dac9db5bc9d83f9bdf6846ab3c955.yaml @@ -0,0 +1,58 @@ +id: aawp-339dac9db5bc9d83f9bdf6846ab3c955 + +info: + name: > + Amazon Affiliate <= 3.12.2 - Reflected File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e94f9cde-5e8b-4d68-8ede-12d678a370ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aawp/" + google-query: inurl:"/wp-content/plugins/aawp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aawp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aawp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aawp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aawp-39d46e34c8d82019270861865807cb95.yaml b/nuclei-templates/cve-less/plugins/aawp-39d46e34c8d82019270861865807cb95.yaml new file mode 100644 index 0000000000..0ecd25b4d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aawp-39d46e34c8d82019270861865807cb95.yaml @@ -0,0 +1,58 @@ +id: aawp-39d46e34c8d82019270861865807cb95 + +info: + name: > + Amazon Affiliate <= 3.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/903abd7f-6bee-4d96-96c2-f09abbb2eefe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aawp/" + google-query: inurl:"/wp-content/plugins/aawp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aawp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aawp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aawp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ab-google-map-travel-5b4876c37f7fd35309718a01d65b18f0.yaml b/nuclei-templates/cve-less/plugins/ab-google-map-travel-5b4876c37f7fd35309718a01d65b18f0.yaml new file mode 100644 index 0000000000..21d95b8d6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ab-google-map-travel-5b4876c37f7fd35309718a01d65b18f0.yaml @@ -0,0 +1,58 @@ +id: ab-google-map-travel-5b4876c37f7fd35309718a01d65b18f0 + +info: + name: > + AB Google Map Travel (AB-MAP) < 4.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/241073e4-b8f2-4dd3-ad66-6dda8c61b42c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ab-google-map-travel/" + google-query: inurl:"/wp-content/plugins/ab-google-map-travel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ab-google-map-travel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ab-google-map-travel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ab-google-map-travel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ab-press-optimizer-lite-414da17bdb4a780711966608cd7b68aa.yaml b/nuclei-templates/cve-less/plugins/ab-press-optimizer-lite-414da17bdb4a780711966608cd7b68aa.yaml new file mode 100644 index 0000000000..aabbe2eff0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ab-press-optimizer-lite-414da17bdb4a780711966608cd7b68aa.yaml @@ -0,0 +1,58 @@ +id: ab-press-optimizer-lite-414da17bdb4a780711966608cd7b68aa + +info: + name: > + AB Press Optimizer <= 1.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd8f355b-736b-442a-917e-9fa603abb853?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ab-press-optimizer-lite/" + google-query: inurl:"/wp-content/plugins/ab-press-optimizer-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ab-press-optimizer-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ab-press-optimizer-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ab-press-optimizer-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ab-rankings-testing-tool-d05a6b8d7f246d51e5c6639ab5b124d6.yaml b/nuclei-templates/cve-less/plugins/ab-rankings-testing-tool-d05a6b8d7f246d51e5c6639ab5b124d6.yaml new file mode 100644 index 0000000000..0efa5ff4d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ab-rankings-testing-tool-d05a6b8d7f246d51e5c6639ab5b124d6.yaml @@ -0,0 +1,58 @@ +id: ab-rankings-testing-tool-d05a6b8d7f246d51e5c6639ab5b124d6 + +info: + name: > + SEO Scout <= 0.9.83 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44b259c7-ea91-4ab5-a46b-67aec50654c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ab-rankings-testing-tool/" + google-query: inurl:"/wp-content/plugins/ab-rankings-testing-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ab-rankings-testing-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ab-rankings-testing-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ab-rankings-testing-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.83') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/abeta-punchout-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/abeta-punchout-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ce7fdbec98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/abeta-punchout-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: abeta-punchout-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/abeta-punchout/" + google-query: inurl:"/wp-content/plugins/abeta-punchout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,abeta-punchout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/abeta-punchout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "abeta-punchout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/abitgone-commentsafe-5f5e581ab08c36f61f1784ceff23dfca.yaml b/nuclei-templates/cve-less/plugins/abitgone-commentsafe-5f5e581ab08c36f61f1784ceff23dfca.yaml new file mode 100644 index 0000000000..d540cf9b45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/abitgone-commentsafe-5f5e581ab08c36f61f1784ceff23dfca.yaml @@ -0,0 +1,58 @@ +id: abitgone-commentsafe-5f5e581ab08c36f61f1784ceff23dfca + +info: + name: > + aBitGone CommentSafe <= 1.0.0 - Cross-Site Request Forgery to Settings Update and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2375027c-9619-40fc-811d-7f4ba02bee53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/abitgone-commentsafe/" + google-query: inurl:"/wp-content/plugins/abitgone-commentsafe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,abitgone-commentsafe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/abitgone-commentsafe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "abitgone-commentsafe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/about-author-box-0b3e32c5343e2d92c6dd937071e516b1.yaml b/nuclei-templates/cve-less/plugins/about-author-box-0b3e32c5343e2d92c6dd937071e516b1.yaml new file mode 100644 index 0000000000..973e919278 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/about-author-box-0b3e32c5343e2d92c6dd937071e516b1.yaml @@ -0,0 +1,58 @@ +id: about-author-box-0b3e32c5343e2d92c6dd937071e516b1 + +info: + name: > + About Author Box < 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b17e416-7ca5-4447-ad7e-d3da2fddab86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/about-author-box/" + google-query: inurl:"/wp-content/plugins/about-author-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,about-author-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/about-author-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "about-author-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/about-author-c3b408a5f882549523fb91707173e697.yaml b/nuclei-templates/cve-less/plugins/about-author-c3b408a5f882549523fb91707173e697.yaml new file mode 100644 index 0000000000..cbbb439ddb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/about-author-c3b408a5f882549523fb91707173e697.yaml @@ -0,0 +1,58 @@ +id: about-author-c3b408a5f882549523fb91707173e697 + +info: + name: > + About Author <= 1.3.9 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ff67beb-638e-4d74-8d0e-6aece9207bb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/about-author/" + google-query: inurl:"/wp-content/plugins/about-author/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,about-author,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/about-author/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "about-author" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/about-me-3000-d71809a4e98fe91e7030122fe36364ba.yaml b/nuclei-templates/cve-less/plugins/about-me-3000-d71809a4e98fe91e7030122fe36364ba.yaml new file mode 100644 index 0000000000..194c2de2cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/about-me-3000-d71809a4e98fe91e7030122fe36364ba.yaml @@ -0,0 +1,58 @@ +id: about-me-3000-d71809a4e98fe91e7030122fe36364ba + +info: + name: > + About Me 3000 widget <= 2.2.6 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62c1b5ce-cd58-4805-9a40-1af529604406?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/about-me-3000/" + google-query: inurl:"/wp-content/plugins/about-me-3000/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,about-me-3000,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/about-me-3000/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "about-me-3000" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/about-me-3000-e7894ec8416d5b9bca834efe054366ef.yaml b/nuclei-templates/cve-less/plugins/about-me-3000-e7894ec8416d5b9bca834efe054366ef.yaml new file mode 100644 index 0000000000..cac6f9f147 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/about-me-3000-e7894ec8416d5b9bca834efe054366ef.yaml @@ -0,0 +1,58 @@ +id: about-me-3000-e7894ec8416d5b9bca834efe054366ef + +info: + name: > + About Me 3000 widget <= 2.2.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be6f660f-041a-42f2-ab5b-72aedf75727d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/about-me-3000/" + google-query: inurl:"/wp-content/plugins/about-me-3000/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,about-me-3000,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/about-me-3000/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "about-me-3000" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/about-me-a5ad111bbf24e4213c2e76334a25e047.yaml b/nuclei-templates/cve-less/plugins/about-me-a5ad111bbf24e4213c2e76334a25e047.yaml new file mode 100644 index 0000000000..6159e2bff0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/about-me-a5ad111bbf24e4213c2e76334a25e047.yaml @@ -0,0 +1,58 @@ +id: about-me-a5ad111bbf24e4213c2e76334a25e047 + +info: + name: > + About Me <= 1.0.12 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca21320a-ee26-47e9-bbf8-cfbb45d7a882?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/about-me/" + google-query: inurl:"/wp-content/plugins/about-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,about-me,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/about-me/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "about-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/about-rentals-e3ba97fb48a1eae9c0640e6703a15a7c.yaml b/nuclei-templates/cve-less/plugins/about-rentals-e3ba97fb48a1eae9c0640e6703a15a7c.yaml new file mode 100644 index 0000000000..7a5bc17fde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/about-rentals-e3ba97fb48a1eae9c0640e6703a15a7c.yaml @@ -0,0 +1,58 @@ +id: about-rentals-e3ba97fb48a1eae9c0640e6703a15a7c + +info: + name: > + About Rentals <= 1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bde90d33-b36f-4ca9-87c2-f0dab723ed06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/about-rentals/" + google-query: inurl:"/wp-content/plugins/about-rentals/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,about-rentals,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/about-rentals/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "about-rentals" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/absolute-privacy-08a30537532865cd761666366968e42d.yaml b/nuclei-templates/cve-less/plugins/absolute-privacy-08a30537532865cd761666366968e42d.yaml new file mode 100644 index 0000000000..bd7f2dc805 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/absolute-privacy-08a30537532865cd761666366968e42d.yaml @@ -0,0 +1,58 @@ +id: absolute-privacy-08a30537532865cd761666366968e42d + +info: + name: > + Absolute Privacy <= 2.1 - Cross-Site Request Forgery to User Email/Password Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3855e84-b97e-4729-8a48-55f2a2444e2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/absolute-privacy/" + google-query: inurl:"/wp-content/plugins/absolute-privacy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,absolute-privacy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/absolute-privacy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "absolute-privacy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/absolute-privacy-b38c5781d2a93e3491c104d301bd4d0b.yaml b/nuclei-templates/cve-less/plugins/absolute-privacy-b38c5781d2a93e3491c104d301bd4d0b.yaml new file mode 100644 index 0000000000..7e160d190a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/absolute-privacy-b38c5781d2a93e3491c104d301bd4d0b.yaml @@ -0,0 +1,58 @@ +id: absolute-privacy-b38c5781d2a93e3491c104d301bd4d0b + +info: + name: > + Absolute Privacy <= 2.0.5 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6c69a25-8986-4976-8753-ce8e5be311e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/absolute-privacy/" + google-query: inurl:"/wp-content/plugins/absolute-privacy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,absolute-privacy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/absolute-privacy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "absolute-privacy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/absolute-reviews-bcec64a9217ef083d681e74eb6ceccde.yaml b/nuclei-templates/cve-less/plugins/absolute-reviews-bcec64a9217ef083d681e74eb6ceccde.yaml new file mode 100644 index 0000000000..bcbdbbc442 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/absolute-reviews-bcec64a9217ef083d681e74eb6ceccde.yaml @@ -0,0 +1,58 @@ +id: absolute-reviews-bcec64a9217ef083d681e74eb6ceccde + +info: + name: > + Absolute Reviews <= 1.0.8 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec1ee47d-020c-482d-ad6f-663d78e624b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/absolute-reviews/" + google-query: inurl:"/wp-content/plugins/absolute-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,absolute-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/absolute-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "absolute-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/abtest-32bb442297758f740a582a38fb271291.yaml b/nuclei-templates/cve-less/plugins/abtest-32bb442297758f740a582a38fb271291.yaml new file mode 100644 index 0000000000..17d7d56b1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/abtest-32bb442297758f740a582a38fb271291.yaml @@ -0,0 +1,58 @@ +id: abtest-32bb442297758f740a582a38fb271291 + +info: + name: > + A/B Test for WordPress <= 1.0.7 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4592fea7-65c4-45f6-8674-ae5f706db413?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/abtest/" + google-query: inurl:"/wp-content/plugins/abtest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,abtest,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/abtest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "abtest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/abwp-simple-counter-2583c8c1dd1479446cbf085c6134c883.yaml b/nuclei-templates/cve-less/plugins/abwp-simple-counter-2583c8c1dd1479446cbf085c6134c883.yaml new file mode 100644 index 0000000000..6dc0caa791 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/abwp-simple-counter-2583c8c1dd1479446cbf085c6134c883.yaml @@ -0,0 +1,58 @@ +id: abwp-simple-counter-2583c8c1dd1479446cbf085c6134c883 + +info: + name: > + Simple Counter <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb4eb28a-3dd5-4d8d-bef0-53cee7285180?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/abwp-simple-counter/" + google-query: inurl:"/wp-content/plugins/abwp-simple-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,abwp-simple-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/abwp-simple-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "abwp-simple-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/academy-2f3fe53a50f6ba1e34fffa48d4d3ffac.yaml b/nuclei-templates/cve-less/plugins/academy-2f3fe53a50f6ba1e34fffa48d4d3ffac.yaml new file mode 100644 index 0000000000..a1b4700b00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/academy-2f3fe53a50f6ba1e34fffa48d4d3ffac.yaml @@ -0,0 +1,58 @@ +id: academy-2f3fe53a50f6ba1e34fffa48d4d3ffac + +info: + name: > + Academy LMS <= 1.9.16 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/248750b0-0fed-4c31-aeeb-709da3e7e2a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/academy/" + google-query: inurl:"/wp-content/plugins/academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,academy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/academy-74f803f6a35ab9fee5ff5f4a7905da8e.yaml b/nuclei-templates/cve-less/plugins/academy-74f803f6a35ab9fee5ff5f4a7905da8e.yaml new file mode 100644 index 0000000000..9fb980a435 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/academy-74f803f6a35ab9fee5ff5f4a7905da8e.yaml @@ -0,0 +1,58 @@ +id: academy-74f803f6a35ab9fee5ff5f4a7905da8e + +info: + name: > + Academy LMS <= 1.9.16 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceb08ca9-e512-4a97-b323-cd9447b8bcac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/academy/" + google-query: inurl:"/wp-content/plugins/academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,academy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/academy-9f9b469ed3c99cc2601f251ee6ef9e63.yaml b/nuclei-templates/cve-less/plugins/academy-9f9b469ed3c99cc2601f251ee6ef9e63.yaml new file mode 100644 index 0000000000..6fb9bd4a5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/academy-9f9b469ed3c99cc2601f251ee6ef9e63.yaml @@ -0,0 +1,58 @@ +id: academy-9f9b469ed3c99cc2601f251ee6ef9e63 + +info: + name: > + Academy LMS – eLearning and online course solution for WordPress <= 1.9.19 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b150f90a-ccb7-4c19-a4b3-eaf9ec264ba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/academy/" + google-query: inurl:"/wp-content/plugins/academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,academy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-2f9298ab3f6a9cf7ac470aa68de57def.yaml b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-2f9298ab3f6a9cf7ac470aa68de57def.yaml new file mode 100644 index 0000000000..5dd42b0e20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-2f9298ab3f6a9cf7ac470aa68de57def.yaml @@ -0,0 +1,58 @@ +id: accelerated-mobile-pages-2f9298ab3f6a9cf7ac470aa68de57def + +info: + name: > + AMP for WP <= 1.0.93.1 - Authenticated(Contributor+) Arbitrary Post Deletion via amppb_remove_saved_layout_data + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffb70e82-355b-48f3-92d0-19659ed2550e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accelerated-mobile-pages/" + google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accelerated-mobile-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accelerated-mobile-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.93.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-498e3e358d7cb9235d23b7fd787ad310.yaml b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-498e3e358d7cb9235d23b7fd787ad310.yaml new file mode 100644 index 0000000000..0be73c2c75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-498e3e358d7cb9235d23b7fd787ad310.yaml @@ -0,0 +1,58 @@ +id: accelerated-mobile-pages-498e3e358d7cb9235d23b7fd787ad310 + +info: + name: > + AMP for WP <= 0.9.97.19 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ea2964f-9e3a-450b-9724-5a520c73d306?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accelerated-mobile-pages/" + google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accelerated-mobile-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accelerated-mobile-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.97.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-779279c30a67e49a16a563a554fb708b.yaml b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-779279c30a67e49a16a563a554fb708b.yaml new file mode 100644 index 0000000000..6d505f9b16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-779279c30a67e49a16a563a554fb708b.yaml @@ -0,0 +1,58 @@ +id: accelerated-mobile-pages-779279c30a67e49a16a563a554fb708b + +info: + name: > + Accelerated Mobile Pages <= 1.0.88.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/983e8ec0-fec4-4420-8ef6-6bf43881f5f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accelerated-mobile-pages/" + google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accelerated-mobile-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accelerated-mobile-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.88.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml new file mode 100644 index 0000000000..f9b9c085e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml @@ -0,0 +1,58 @@ +id: accelerated-mobile-pages-8f9fba5d47d60ee8f1aec9a71b4f7e8a + +info: + name: > + AMP for WP <= 0.9.97.20 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64a833df-1cb8-40a1-9a8f-c53dcf50c877?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accelerated-mobile-pages/" + google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accelerated-mobile-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accelerated-mobile-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.97.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-adc8f09209828ecd25d3a9013f76dba0.yaml b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-adc8f09209828ecd25d3a9013f76dba0.yaml new file mode 100644 index 0000000000..616791eaf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-adc8f09209828ecd25d3a9013f76dba0.yaml @@ -0,0 +1,58 @@ +id: accelerated-mobile-pages-adc8f09209828ecd25d3a9013f76dba0 + +info: + name: > + Accelerated Mobile Pages <= 1.0.92.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85ca96a6-7992-424b-8b88-9a0751925223?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accelerated-mobile-pages/" + google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accelerated-mobile-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accelerated-mobile-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.92.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-c05da70d5ed77ea30636d59ab804aaa2.yaml b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-c05da70d5ed77ea30636d59ab804aaa2.yaml new file mode 100644 index 0000000000..1f5e856ccb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-c05da70d5ed77ea30636d59ab804aaa2.yaml @@ -0,0 +1,58 @@ +id: accelerated-mobile-pages-c05da70d5ed77ea30636d59ab804aaa2 + +info: + name: > + AMP for WP – Accelerated Mobile Pages <= 1.0.77.31 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/095bee95-d3a7-4203-96eb-90f1f0eab84f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accelerated-mobile-pages/" + google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accelerated-mobile-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accelerated-mobile-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.77.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-c7b7a15003ffbb80a100eb159e64a8bf.yaml b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-c7b7a15003ffbb80a100eb159e64a8bf.yaml new file mode 100644 index 0000000000..ee6f0dc178 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-c7b7a15003ffbb80a100eb159e64a8bf.yaml @@ -0,0 +1,58 @@ +id: accelerated-mobile-pages-c7b7a15003ffbb80a100eb159e64a8bf + +info: + name: > + AMP for WP <= 1.0.77.32 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc6f017d-b0ba-494d-9ad1-8b6cdca48fb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accelerated-mobile-pages/" + google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accelerated-mobile-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accelerated-mobile-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.77.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-d0f1f9dc5f8553a777fe29b0dbac4733.yaml b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-d0f1f9dc5f8553a777fe29b0dbac4733.yaml new file mode 100644 index 0000000000..5017ebad71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accelerated-mobile-pages-d0f1f9dc5f8553a777fe29b0dbac4733.yaml @@ -0,0 +1,58 @@ +id: accelerated-mobile-pages-d0f1f9dc5f8553a777fe29b0dbac4733 + +info: + name: > + AMP for WP – Accelerated Mobile Pages <= 1.0.92 - Authenticated (Contributor+) Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1cae64e-caed-43c0-9a75-9aa4234946a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accelerated-mobile-pages/" + google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accelerated-mobile-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accelerated-mobile-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.92') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/access-category-password-ba769ee3b56a07d054d82d24eca8d984.yaml b/nuclei-templates/cve-less/plugins/access-category-password-ba769ee3b56a07d054d82d24eca8d984.yaml new file mode 100644 index 0000000000..60fdc762f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/access-category-password-ba769ee3b56a07d054d82d24eca8d984.yaml @@ -0,0 +1,58 @@ +id: access-category-password-ba769ee3b56a07d054d82d24eca8d984 + +info: + name: > + Access Category Password <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0b369b4-b107-4207-8d5a-4551a2adf437?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/access-category-password/" + google-query: inurl:"/wp-content/plugins/access-category-password/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,access-category-password,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/access-category-password/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "access-category-password" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/access-code-feeder-5321d52c0d483f1a186be60c117d7779.yaml b/nuclei-templates/cve-less/plugins/access-code-feeder-5321d52c0d483f1a186be60c117d7779.yaml new file mode 100644 index 0000000000..c659235501 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/access-code-feeder-5321d52c0d483f1a186be60c117d7779.yaml @@ -0,0 +1,58 @@ +id: access-code-feeder-5321d52c0d483f1a186be60c117d7779 + +info: + name: > + Access Code Feeder <= 1.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a8127e5-b5e6-4545-9e38-f3fa9daabcf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/access-code-feeder/" + google-query: inurl:"/wp-content/plugins/access-code-feeder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,access-code-feeder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/access-code-feeder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "access-code-feeder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/access-demo-importer-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/plugins/access-demo-importer-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..bc18c34a24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/access-demo-importer-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: access-demo-importer-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/access-demo-importer/" + google-query: inurl:"/wp-content/plugins/access-demo-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,access-demo-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/access-demo-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "access-demo-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/access-demo-importer-87857021bf0d6b4f9e9f9a7926fd73da.yaml b/nuclei-templates/cve-less/plugins/access-demo-importer-87857021bf0d6b4f9e9f9a7926fd73da.yaml new file mode 100644 index 0000000000..da7b30dc34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/access-demo-importer-87857021bf0d6b4f9e9f9a7926fd73da.yaml @@ -0,0 +1,58 @@ +id: access-demo-importer-87857021bf0d6b4f9e9f9a7926fd73da + +info: + name: > + Access Demo Importer <= 1.0.7 - Cross-Site Request Forgery to Data Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f994141-f361-4a0e-99dc-1e1951e1e76e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/access-demo-importer/" + google-query: inurl:"/wp-content/plugins/access-demo-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,access-demo-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/access-demo-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "access-demo-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/access-demo-importer-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/plugins/access-demo-importer-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..80e0d3c39d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/access-demo-importer-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: access-demo-importer-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/access-demo-importer/" + google-query: inurl:"/wp-content/plugins/access-demo-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,access-demo-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/access-demo-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "access-demo-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/access-demo-importer-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/plugins/access-demo-importer-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..c40b4e7d77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/access-demo-importer-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: access-demo-importer-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/access-demo-importer/" + google-query: inurl:"/wp-content/plugins/access-demo-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,access-demo-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/access-demo-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "access-demo-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessally-dbc81bf016cd5e5e4c2433dc1422c4ba.yaml b/nuclei-templates/cve-less/plugins/accessally-dbc81bf016cd5e5e4c2433dc1422c4ba.yaml new file mode 100644 index 0000000000..122e492e42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessally-dbc81bf016cd5e5e4c2433dc1422c4ba.yaml @@ -0,0 +1,58 @@ +id: accessally-dbc81bf016cd5e5e4c2433dc1422c4ba + +info: + name: > + AccessAlly <= 3.5.6 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4ce6cb2-a02a-4b4c-8887-22ee6115509f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessally/" + google-query: inurl:"/wp-content/plugins/accessally/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessally,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessally/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessally" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessally-ec586f38da217e272f237a09e0ca477d.yaml b/nuclei-templates/cve-less/plugins/accessally-ec586f38da217e272f237a09e0ca477d.yaml new file mode 100644 index 0000000000..ec273f7ba9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessally-ec586f38da217e272f237a09e0ca477d.yaml @@ -0,0 +1,58 @@ +id: accessally-ec586f38da217e272f237a09e0ca477d + +info: + name: > + AccessAlly < 3.3.2 - Arbitrary Code Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bde6384-0fcc-4726-a7e5-bad6c3993bce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessally/" + google-query: inurl:"/wp-content/plugins/accessally/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessally,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessally/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessally" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessibe-d4ff7ccda72ef3d478471c54ece0f540.yaml b/nuclei-templates/cve-less/plugins/accessibe-d4ff7ccda72ef3d478471c54ece0f540.yaml new file mode 100644 index 0000000000..a3f3728c0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessibe-d4ff7ccda72ef3d478471c54ece0f540.yaml @@ -0,0 +1,58 @@ +id: accessibe-d4ff7ccda72ef3d478471c54ece0f540 + +info: + name: > + Web Accessibility By accessiBe <= 1.15 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d79ce22-33ef-4dfb-a842-591cd7cedc94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessibe/" + google-query: inurl:"/wp-content/plugins/accessibe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessibe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessibe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessibe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessibility-2d14f404d420f837153fea14d49aa1f8.yaml b/nuclei-templates/cve-less/plugins/accessibility-2d14f404d420f837153fea14d49aa1f8.yaml new file mode 100644 index 0000000000..e1a9f7fb8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessibility-2d14f404d420f837153fea14d49aa1f8.yaml @@ -0,0 +1,58 @@ +id: accessibility-2d14f404d420f837153fea14d49aa1f8 + +info: + name: > + Accessibility <= 1.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/432effd4-5c94-4ef9-bc19-b4eacd082264?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessibility/" + google-query: inurl:"/wp-content/plugins/accessibility/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessibility,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessibility/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessibility" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessibility-7dc4797d3de860817ed6ac2d09e72ea4.yaml b/nuclei-templates/cve-less/plugins/accessibility-7dc4797d3de860817ed6ac2d09e72ea4.yaml new file mode 100644 index 0000000000..8a4555c152 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessibility-7dc4797d3de860817ed6ac2d09e72ea4.yaml @@ -0,0 +1,58 @@ +id: accessibility-7dc4797d3de860817ed6ac2d09e72ea4 + +info: + name: > + Accessibility <= 1.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0de0e5d5-7023-4026-ad82-3c2443569326?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessibility/" + google-query: inurl:"/wp-content/plugins/accessibility/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessibility,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessibility/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessibility" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessibility-c41141bd67c49cd259895cd7c78b521d.yaml b/nuclei-templates/cve-less/plugins/accessibility-c41141bd67c49cd259895cd7c78b521d.yaml new file mode 100644 index 0000000000..897ae9aa23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessibility-c41141bd67c49cd259895cd7c78b521d.yaml @@ -0,0 +1,58 @@ +id: accessibility-c41141bd67c49cd259895cd7c78b521d + +info: + name: > + Accessibility <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scritping + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26237984-d7b5-4a55-91f8-a2816f3d2e94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessibility/" + google-query: inurl:"/wp-content/plugins/accessibility/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessibility,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessibility/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessibility" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessibility-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/accessibility-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..cf88cb4a1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessibility-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: accessibility-checker-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessibility-checker/" + google-query: inurl:"/wp-content/plugins/accessibility-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessibility-checker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessibility-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessibility-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessibility-help-button-a26164aedf80b474ee438ebcd8be6953.yaml b/nuclei-templates/cve-less/plugins/accessibility-help-button-a26164aedf80b474ee438ebcd8be6953.yaml new file mode 100644 index 0000000000..f0c734d03c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessibility-help-button-a26164aedf80b474ee438ebcd8be6953.yaml @@ -0,0 +1,58 @@ +id: accessibility-help-button-a26164aedf80b474ee438ebcd8be6953 + +info: + name: > + Call Now Accessibility Button <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04df6505-46c1-4e66-a363-4ccebacb5e42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessibility-help-button/" + google-query: inurl:"/wp-content/plugins/accessibility-help-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessibility-help-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessibility-help-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessibility-help-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accessibility-widget-7e7c2d3094ebf66ce262024cc34ea145.yaml b/nuclei-templates/cve-less/plugins/accessibility-widget-7e7c2d3094ebf66ce262024cc34ea145.yaml new file mode 100644 index 0000000000..79daca2011 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accessibility-widget-7e7c2d3094ebf66ce262024cc34ea145.yaml @@ -0,0 +1,58 @@ +id: accessibility-widget-7e7c2d3094ebf66ce262024cc34ea145 + +info: + name: > + Accessibility Widget <= 2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b805b1d1-7f3f-4bd8-9f88-eced0b2556f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accessibility-widget/" + google-query: inurl:"/wp-content/plugins/accessibility-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accessibility-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accessibility-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accessibility-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-0259b7e0abb7a82246638a669050bc8a.yaml b/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-0259b7e0abb7a82246638a669050bc8a.yaml new file mode 100644 index 0000000000..79ea554d15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-0259b7e0abb7a82246638a669050bc8a.yaml @@ -0,0 +1,58 @@ +id: accesspress-anonymous-post-0259b7e0abb7a82246638a669050bc8a + +info: + name: > + AccessPress Anonymous Post <= 2.8.4 - Authenticated (Contributor+) Arbitrary Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc727156-28dc-4b0a-b777-52a1bbc72f79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accesspress-anonymous-post/" + google-query: inurl:"/wp-content/plugins/accesspress-anonymous-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accesspress-anonymous-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accesspress-anonymous-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-anonymous-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-ba2dfbd8bd85affc67a7972c0b9842d4.yaml b/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-ba2dfbd8bd85affc67a7972c0b9842d4.yaml new file mode 100644 index 0000000000..8a3370d26c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-ba2dfbd8bd85affc67a7972c0b9842d4.yaml @@ -0,0 +1,58 @@ +id: accesspress-anonymous-post-ba2dfbd8bd85affc67a7972c0b9842d4 + +info: + name: > + AccessPress Anonymous Post = 2.8.0 - Backdoored + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/415ace14-1687-4003-b385-a21a5d5e16a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accesspress-anonymous-post/" + google-query: inurl:"/wp-content/plugins/accesspress-anonymous-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accesspress-anonymous-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accesspress-anonymous-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-anonymous-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-pro-2e117974c1e793e439ba4ca717328fe2.yaml b/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-pro-2e117974c1e793e439ba4ca717328fe2.yaml new file mode 100644 index 0000000000..70b50740ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accesspress-anonymous-post-pro-2e117974c1e793e439ba4ca717328fe2.yaml @@ -0,0 +1,58 @@ +id: accesspress-anonymous-post-pro-2e117974c1e793e439ba4ca717328fe2 + +info: + name: > + AccessPress Anonymous Post Pro <= 3.1.9 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9758a59c-4370-4b26-b32a-004565f28d76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accesspress-anonymous-post-pro/" + google-query: inurl:"/wp-content/plugins/accesspress-anonymous-post-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accesspress-anonymous-post-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accesspress-anonymous-post-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-anonymous-post-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accesspress-facebook-auto-post-8c06a8350a61d118d6e045c1630ddff6.yaml b/nuclei-templates/cve-less/plugins/accesspress-facebook-auto-post-8c06a8350a61d118d6e045c1630ddff6.yaml new file mode 100644 index 0000000000..f1c5fcc113 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accesspress-facebook-auto-post-8c06a8350a61d118d6e045c1630ddff6.yaml @@ -0,0 +1,58 @@ +id: accesspress-facebook-auto-post-8c06a8350a61d118d6e045c1630ddff6 + +info: + name: > + Social Auto Poster <= 2.1.4 - Cross-Site Request Forgery to Plugin Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06daef36-0873-444f-88eb-3ede68f3afdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accesspress-facebook-auto-post/" + google-query: inurl:"/wp-content/plugins/accesspress-facebook-auto-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accesspress-facebook-auto-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accesspress-facebook-auto-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-facebook-auto-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accesspress-social-icons-3129a6f1429e82e60a76e088cdf26794.yaml b/nuclei-templates/cve-less/plugins/accesspress-social-icons-3129a6f1429e82e60a76e088cdf26794.yaml new file mode 100644 index 0000000000..c243163482 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accesspress-social-icons-3129a6f1429e82e60a76e088cdf26794.yaml @@ -0,0 +1,58 @@ +id: accesspress-social-icons-3129a6f1429e82e60a76e088cdf26794 + +info: + name: > + AccessPress Social Icons <= 1.8.0 - Author+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f082ff4a-2adb-461e-875a-b3701cfea074?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accesspress-social-icons/" + google-query: inurl:"/wp-content/plugins/accesspress-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accesspress-social-icons,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accesspress-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accesspress-social-icons-38223592e03cdebd88e125b4e466dd20.yaml b/nuclei-templates/cve-less/plugins/accesspress-social-icons-38223592e03cdebd88e125b4e466dd20.yaml new file mode 100644 index 0000000000..79679f7681 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accesspress-social-icons-38223592e03cdebd88e125b4e466dd20.yaml @@ -0,0 +1,58 @@ +id: accesspress-social-icons-38223592e03cdebd88e125b4e466dd20 + +info: + name: > + AccessPress Social Icons 1.8.2 - Backdoor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df015a51-7eb8-4fbc-839f-bcf6b2e2b1a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accesspress-social-icons/" + google-query: inurl:"/wp-content/plugins/accesspress-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accesspress-social-icons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accesspress-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accesspress-social-icons-c6ab36823a7ccb132d76b57507e4ea5c.yaml b/nuclei-templates/cve-less/plugins/accesspress-social-icons-c6ab36823a7ccb132d76b57507e4ea5c.yaml new file mode 100644 index 0000000000..52cc33b540 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accesspress-social-icons-c6ab36823a7ccb132d76b57507e4ea5c.yaml @@ -0,0 +1,58 @@ +id: accesspress-social-icons-c6ab36823a7ccb132d76b57507e4ea5c + +info: + name: > + AccessPress Social Icons <= 1.6.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/004206fd-c46e-48d7-93f1-884b3261fdb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accesspress-social-icons/" + google-query: inurl:"/wp-content/plugins/accesspress-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accesspress-social-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accesspress-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accesspress-twitter-feed-543905e5a70999b20f996a2b4d8c92c1.yaml b/nuclei-templates/cve-less/plugins/accesspress-twitter-feed-543905e5a70999b20f996a2b4d8c92c1.yaml new file mode 100644 index 0000000000..c2cfb24590 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accesspress-twitter-feed-543905e5a70999b20f996a2b4d8c92c1.yaml @@ -0,0 +1,58 @@ +id: accesspress-twitter-feed-543905e5a70999b20f996a2b4d8c92c1 + +info: + name: > + WP TFeed <= 1.6.9 - Cross-Site Request Forgery via aptf_delete_cache + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73986641-b3a4-438d-90ae-6ff0f6f73f01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accesspress-twitter-feed/" + google-query: inurl:"/wp-content/plugins/accesspress-twitter-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accesspress-twitter-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accesspress-twitter-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-twitter-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accommodation-system-e2e327ed0c82906cdc72ee6a3da6e38d.yaml b/nuclei-templates/cve-less/plugins/accommodation-system-e2e327ed0c82906cdc72ee6a3da6e38d.yaml new file mode 100644 index 0000000000..308ccf42f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accommodation-system-e2e327ed0c82906cdc72ee6a3da6e38d.yaml @@ -0,0 +1,58 @@ +id: accommodation-system-e2e327ed0c82906cdc72ee6a3da6e38d + +info: + name: > + Accommodation System <= 1.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8206d00c-7eb1-4ef2-b3d3-be78d39036db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accommodation-system/" + google-query: inurl:"/wp-content/plugins/accommodation-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accommodation-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accommodation-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accommodation-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordion-and-accordion-slider-124a6a229ba4bdf103aa1881e7bf0b04.yaml b/nuclei-templates/cve-less/plugins/accordion-and-accordion-slider-124a6a229ba4bdf103aa1881e7bf0b04.yaml new file mode 100644 index 0000000000..3d8d5c4b7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordion-and-accordion-slider-124a6a229ba4bdf103aa1881e7bf0b04.yaml @@ -0,0 +1,58 @@ +id: accordion-and-accordion-slider-124a6a229ba4bdf103aa1881e7bf0b04 + +info: + name: > + Accordion and Accordion Slider <= 1.2.4 - Missing Authorization via 'wp_aas_get_attachment_edit_form' and 'wp_aas_save_attachment_data' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c956651-4f5e-4e2d-a0f2-b02d4f25bd68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordion-and-accordion-slider/" + google-query: inurl:"/wp-content/plugins/accordion-and-accordion-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordion-and-accordion-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordion-and-accordion-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordion-and-accordion-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordion-and-accordion-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/accordion-and-accordion-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..bb28bdf65a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordion-and-accordion-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: accordion-and-accordion-slider-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordion-and-accordion-slider/" + google-query: inurl:"/wp-content/plugins/accordion-and-accordion-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordion-and-accordion-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordion-and-accordion-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordion-and-accordion-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordion-eb55b372b5c3928eeddbd79bc1b91ebd.yaml b/nuclei-templates/cve-less/plugins/accordion-eb55b372b5c3928eeddbd79bc1b91ebd.yaml new file mode 100644 index 0000000000..c6aec89799 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordion-eb55b372b5c3928eeddbd79bc1b91ebd.yaml @@ -0,0 +1,58 @@ +id: accordion-eb55b372b5c3928eeddbd79bc1b91ebd + +info: + name: > + Accordion (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f5fa529-4c6e-465e-a281-78ba74e5a718?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordion/" + google-query: inurl:"/wp-content/plugins/accordion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordion,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordion-shortcodes-3091ac7532eaab098f714acca62716d7.yaml b/nuclei-templates/cve-less/plugins/accordion-shortcodes-3091ac7532eaab098f714acca62716d7.yaml new file mode 100644 index 0000000000..7cf7375614 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordion-shortcodes-3091ac7532eaab098f714acca62716d7.yaml @@ -0,0 +1,58 @@ +id: accordion-shortcodes-3091ac7532eaab098f714acca62716d7 + +info: + name: > + Accordion Shortcodes <= 2.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c84075b-4685-4706-91d0-05ce6cd276ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordion-shortcodes/" + google-query: inurl:"/wp-content/plugins/accordion-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordion-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordion-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordion-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordion-slider-9ea3c82ee3ff18eecbc44a826a19457f.yaml b/nuclei-templates/cve-less/plugins/accordion-slider-9ea3c82ee3ff18eecbc44a826a19457f.yaml new file mode 100644 index 0000000000..83b76e20e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordion-slider-9ea3c82ee3ff18eecbc44a826a19457f.yaml @@ -0,0 +1,58 @@ +id: accordion-slider-9ea3c82ee3ff18eecbc44a826a19457f + +info: + name: > + Accordion Slider <= 1.9.6 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dc69bba-39e0-46bd-8cdb-7cf1f7d36282?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordion-slider/" + google-query: inurl:"/wp-content/plugins/accordion-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordion-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordion-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordion-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-0a2080d70a92fba8a8847abac6eea304.yaml b/nuclei-templates/cve-less/plugins/accordions-0a2080d70a92fba8a8847abac6eea304.yaml new file mode 100644 index 0000000000..2a565d3917 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-0a2080d70a92fba8a8847abac6eea304.yaml @@ -0,0 +1,58 @@ +id: accordions-0a2080d70a92fba8a8847abac6eea304 + +info: + name: > + Accordion <= 2.2.96 - Missing Authorization to Authenticated(Contributor+) Post Duplication + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e7e7c70-4d07-4550-9cf8-5135b87b67ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions/" + google-query: inurl:"/wp-content/plugins/accordions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-1948bb7537e0374279551e8dbc2dad83.yaml b/nuclei-templates/cve-less/plugins/accordions-1948bb7537e0374279551e8dbc2dad83.yaml new file mode 100644 index 0000000000..1bd557ffbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-1948bb7537e0374279551e8dbc2dad83.yaml @@ -0,0 +1,58 @@ +id: accordions-1948bb7537e0374279551e8dbc2dad83 + +info: + name: > + Accordion <= 2.2.8 - Unprotected AJAX Action to Stored/Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26d504fe-38f6-4b50-ae07-c50e35fcb9e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions/" + google-query: inurl:"/wp-content/plugins/accordions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-375db66af2081253ff533757f9dca92a.yaml b/nuclei-templates/cve-less/plugins/accordions-375db66af2081253ff533757f9dca92a.yaml new file mode 100644 index 0000000000..4f30a29af3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-375db66af2081253ff533757f9dca92a.yaml @@ -0,0 +1,58 @@ +id: accordions-375db66af2081253ff533757f9dca92a + +info: + name: > + Accordion <= 2.2.29 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57051491-a56b-4a3a-9383-ba63585550be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions/" + google-query: inurl:"/wp-content/plugins/accordions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-eb03f1b5d95ef0a7d7a29907029d610c.yaml b/nuclei-templates/cve-less/plugins/accordions-eb03f1b5d95ef0a7d7a29907029d610c.yaml new file mode 100644 index 0000000000..8d441ec8b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-eb03f1b5d95ef0a7d7a29907029d610c.yaml @@ -0,0 +1,58 @@ +id: accordions-eb03f1b5d95ef0a7d7a29907029d610c + +info: + name: > + Accordion <= 2.2.43 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48758ada-4c7f-4a7f-8b43-535f820e6b3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions/" + google-query: inurl:"/wp-content/plugins/accordions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-1b12a289a671c54e3c29dcf0a118316b.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-1b12a289a671c54e3c29dcf0a118316b.yaml new file mode 100644 index 0000000000..878ae0be7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-1b12a289a671c54e3c29dcf0a118316b.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-1b12a289a671c54e3c29dcf0a118316b + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting via 'rawdata' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0933ea77-2de0-4cd5-a589-a4c1d474f119?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-3b610f84d98a5bc8d0e6aaa3b08f5054.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-3b610f84d98a5bc8d0e6aaa3b08f5054.yaml new file mode 100644 index 0000000000..3c4bbf6df2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-3b610f84d98a5bc8d0e6aaa3b08f5054.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-3b610f84d98a5bc8d0e6aaa3b08f5054 + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting in post_oxi_settings function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a90c51d9-c89a-4164-a732-89434a6e0b8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-4032a78ffdb0269b83ac44db0e50cdc3.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-4032a78ffdb0269b83ac44db0e50cdc3.yaml new file mode 100644 index 0000000000..7dbe5c246b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-4032a78ffdb0269b83ac44db0e50cdc3.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-4032a78ffdb0269b83ac44db0e50cdc3 + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting via 'notice' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e806895-40c9-44f5-97f8-becfa52c2559?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-49cb459f51b461767e5a15017db69d79.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-49cb459f51b461767e5a15017db69d79.yaml new file mode 100644 index 0000000000..406e0727ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-49cb459f51b461767e5a15017db69d79.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-49cb459f51b461767e5a15017db69d79 + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.2 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7a6dee6-b3ff-4325-a356-4a65ab7a0ce5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-4ef1f0520c09d9782f1be91688816f9a.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-4ef1f0520c09d9782f1be91688816f9a.yaml new file mode 100644 index 0000000000..096816394b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-4ef1f0520c09d9782f1be91688816f9a.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-4ef1f0520c09d9782f1be91688816f9a + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting via 'pages' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2294565a-987e-4837-ab22-6e7bff498044?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-4f4db8cd21765548f8ac243b07d65419.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-4f4db8cd21765548f8ac243b07d65419.yaml new file mode 100644 index 0000000000..78ae201e3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-4f4db8cd21765548f8ac243b07d65419.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-4f4db8cd21765548f8ac243b07d65419 + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.3 - Authenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee213b2c-b59d-4563-98d1-a26b1e8e13a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-6e7fd75d5000c1a779cde51d0f7b0d94.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-6e7fd75d5000c1a779cde51d0f7b0d94.yaml new file mode 100644 index 0000000000..422c21710f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-6e7fd75d5000c1a779cde51d0f7b0d94.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-6e7fd75d5000c1a779cde51d0f7b0d94 + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting via 'layouts' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/128f0e5e-96c7-474e-bfc9-ea18536b4a54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-73da8bcc97724050406ff5bdd6471c84.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-73da8bcc97724050406ff5bdd6471c84.yaml new file mode 100644 index 0000000000..b07aa3a6fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-73da8bcc97724050406ff5bdd6471c84.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-73da8bcc97724050406ff5bdd6471c84 + +info: + name: > + Accordions <= 2.3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via Several Parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/401eeb23-bf43-49a8-9c39-4fcd0db57cd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-805e4862296df1b32dd279bbfd5412a7.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-805e4862296df1b32dd279bbfd5412a7.yaml new file mode 100644 index 0000000000..ebbdcbc387 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-805e4862296df1b32dd279bbfd5412a7.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-805e4862296df1b32dd279bbfd5412a7 + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting via 'pages' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee5737b3-de32-4b5c-a9df-7909ad32ec93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-or-faqs-ce7addd0eabe078cf96d1fb6e8d32578.yaml b/nuclei-templates/cve-less/plugins/accordions-or-faqs-ce7addd0eabe078cf96d1fb6e8d32578.yaml new file mode 100644 index 0000000000..3dc01ee873 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-or-faqs-ce7addd0eabe078cf96d1fb6e8d32578.yaml @@ -0,0 +1,58 @@ +id: accordions-or-faqs-ce7addd0eabe078cf96d1fb6e8d32578 + +info: + name: > + Accordions – Multiple Accordions or FAQs Builder <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting via 'license' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9478d3e-d2f9-458b-a6ca-3baef21db60e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-or-faqs/" + google-query: inurl:"/wp-content/plugins/accordions-or-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-or-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-or-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-or-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-wp-5600898416ea4451dceafd9acde6424d.yaml b/nuclei-templates/cve-less/plugins/accordions-wp-5600898416ea4451dceafd9acde6424d.yaml new file mode 100644 index 0000000000..c826615216 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-wp-5600898416ea4451dceafd9acde6424d.yaml @@ -0,0 +1,58 @@ +id: accordions-wp-5600898416ea4451dceafd9acde6424d + +info: + name: > + Accordion <= 2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8ada876-4a8b-494f-9132-d88a71b42c44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-wp/" + google-query: inurl:"/wp-content/plugins/accordions-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accordions-wp-cdf9a047d5c0c62c170cfb4f220b5807.yaml b/nuclei-templates/cve-less/plugins/accordions-wp-cdf9a047d5c0c62c170cfb4f220b5807.yaml new file mode 100644 index 0000000000..0f69e4d6fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accordions-wp-cdf9a047d5c0c62c170cfb4f220b5807.yaml @@ -0,0 +1,58 @@ +id: accordions-wp-cdf9a047d5c0c62c170cfb4f220b5807 + +info: + name: > + Accordion <= 2.6 - Authenticated (Editor+) Stored Cross-Site Scripting via accordion settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff656409-2344-4190-a731-5a282e21375c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accordions-wp/" + google-query: inurl:"/wp-content/plugins/accordions-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accordions-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accordions-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accordions-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/account-manager-woocommerce-b870ae481ac77b6b40f8ab9a7e8f35ed.yaml b/nuclei-templates/cve-less/plugins/account-manager-woocommerce-b870ae481ac77b6b40f8ab9a7e8f35ed.yaml new file mode 100644 index 0000000000..012467516c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/account-manager-woocommerce-b870ae481ac77b6b40f8ab9a7e8f35ed.yaml @@ -0,0 +1,58 @@ +id: account-manager-woocommerce-b870ae481ac77b6b40f8ab9a7e8f35ed + +info: + name: > + Account Manager for WooCommerce <= 2.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/667547a9-0dc5-4810-aba9-025f0c222d24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/account-manager-woocommerce/" + google-query: inurl:"/wp-content/plugins/account-manager-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,account-manager-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/account-manager-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "account-manager-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accredible-certificates-35886a1535b89d1815cbc273329902f1.yaml b/nuclei-templates/cve-less/plugins/accredible-certificates-35886a1535b89d1815cbc273329902f1.yaml new file mode 100644 index 0000000000..52f847010a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accredible-certificates-35886a1535b89d1815cbc273329902f1.yaml @@ -0,0 +1,58 @@ +id: accredible-certificates-35886a1535b89d1815cbc273329902f1 + +info: + name: > + Accredible Certificates & Open Badges <= 1.4.8 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d5ac3df-ddaf-4c78-acd3-baddea42443f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accredible-certificates/" + google-query: inurl:"/wp-content/plugins/accredible-certificates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accredible-certificates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accredible-certificates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accredible-certificates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/accurate-form-data-real-time-form-validation-5c23a6c70aea6e2ef9477919b8442851.yaml b/nuclei-templates/cve-less/plugins/accurate-form-data-real-time-form-validation-5c23a6c70aea6e2ef9477919b8442851.yaml new file mode 100644 index 0000000000..9f37dbbf7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/accurate-form-data-real-time-form-validation-5c23a6c70aea6e2ef9477919b8442851.yaml @@ -0,0 +1,58 @@ +id: accurate-form-data-real-time-form-validation-5c23a6c70aea6e2ef9477919b8442851 + +info: + name: > + WP Accurate Form Data <= 1.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be60b765-3bd6-43dd-8cdc-d9c493a503e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/accurate-form-data-real-time-form-validation/" + google-query: inurl:"/wp-content/plugins/accurate-form-data-real-time-form-validation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,accurate-form-data-real-time-form-validation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/accurate-form-data-real-time-form-validation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accurate-form-data-real-time-form-validation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aceide-66b82cf9b546b0dbf96942572438d94e.yaml b/nuclei-templates/cve-less/plugins/aceide-66b82cf9b546b0dbf96942572438d94e.yaml new file mode 100644 index 0000000000..1704f9b548 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aceide-66b82cf9b546b0dbf96942572438d94e.yaml @@ -0,0 +1,58 @@ +id: aceide-66b82cf9b546b0dbf96942572438d94e + +info: + name: > + AceIDE <= 2.6.2 - Authenticated (Admin+) Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fd179ab-f2ab-4ce3-851f-d6da3f0243c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aceide/" + google-query: inurl:"/wp-content/plugins/aceide/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aceide,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aceide/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aceide" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-better-search-a4fd26323192935dbbcbf3b0527f2fd4.yaml b/nuclei-templates/cve-less/plugins/acf-better-search-a4fd26323192935dbbcbf3b0527f2fd4.yaml new file mode 100644 index 0000000000..48ecefa953 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-better-search-a4fd26323192935dbbcbf3b0527f2fd4.yaml @@ -0,0 +1,58 @@ +id: acf-better-search-a4fd26323192935dbbcbf3b0527f2fd4 + +info: + name: > + ACF Better Search <= 3.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b536563f-b978-4ba6-8a28-d8ee6b87964a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-better-search/" + google-query: inurl:"/wp-content/plugins/acf-better-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-better-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-better-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-better-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/acf-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0c7ee88264 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: acf-blocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-blocks/" + google-query: inurl:"/wp-content/plugins/acf-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-extended-386512462e991dca6695af0141e48ca0.yaml b/nuclei-templates/cve-less/plugins/acf-extended-386512462e991dca6695af0141e48ca0.yaml new file mode 100644 index 0000000000..2b6ad2bd84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-extended-386512462e991dca6695af0141e48ca0.yaml @@ -0,0 +1,58 @@ +id: acf-extended-386512462e991dca6695af0141e48ca0 + +info: + name: > + Advanced Custom Fields: Extended <= 0.8.8.6 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae9cd51f-e6c8-4aec-a044-376075e9540a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-extended/" + google-query: inurl:"/wp-content/plugins/acf-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-extended,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-extended-dea0414e4a9baf8defc1d9528b3ab197.yaml b/nuclei-templates/cve-less/plugins/acf-extended-dea0414e4a9baf8defc1d9528b3ab197.yaml new file mode 100644 index 0000000000..d75ca5e480 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-extended-dea0414e4a9baf8defc1d9528b3ab197.yaml @@ -0,0 +1,58 @@ +id: acf-extended-dea0414e4a9baf8defc1d9528b3ab197 + +info: + name: > + Advanced Custom Fields: Extended <= 0.8.9.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcbe0c72-d518-45d3-a220-896a51071b26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-extended/" + google-query: inurl:"/wp-content/plugins/acf-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-for-woocommerce-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/acf-for-woocommerce-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f278a1a8de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-for-woocommerce-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: acf-for-woocommerce-product-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-for-woocommerce-product/" + google-query: inurl:"/wp-content/plugins/acf-for-woocommerce-product/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-for-woocommerce-product,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-for-woocommerce-product/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-for-woocommerce-product" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-front-end-editor-f830b550290522c771fc5d5f581ec239.yaml b/nuclei-templates/cve-less/plugins/acf-front-end-editor-f830b550290522c771fc5d5f581ec239.yaml new file mode 100644 index 0000000000..72d1d5f1c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-front-end-editor-f830b550290522c771fc5d5f581ec239.yaml @@ -0,0 +1,58 @@ +id: acf-front-end-editor-f830b550290522c771fc5d5f581ec239 + +info: + name: > + ACF Front End Editor <= 2.0.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Content Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e7cbe45-5dd5-4b8f-8504-a52358156838?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-front-end-editor/" + google-query: inurl:"/wp-content/plugins/acf-front-end-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-front-end-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-front-end-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-front-end-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-frontend-display-72069309fe30eff95916a5572e194ede.yaml b/nuclei-templates/cve-less/plugins/acf-frontend-display-72069309fe30eff95916a5572e194ede.yaml new file mode 100644 index 0000000000..576b16abed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-frontend-display-72069309fe30eff95916a5572e194ede.yaml @@ -0,0 +1,58 @@ +id: acf-frontend-display-72069309fe30eff95916a5572e194ede + +info: + name: > + ACF Frontend Display <= 2.0.6 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/205e0b90-0d84-4b16-b968-8ec7770f0695?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-frontend-display/" + google-query: inurl:"/wp-content/plugins/acf-frontend-display/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-frontend-display,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-frontend-display/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-frontend-display" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-frontend-form-element-358ece292f0da9494f24c3c3237a7bf7.yaml b/nuclei-templates/cve-less/plugins/acf-frontend-form-element-358ece292f0da9494f24c3c3237a7bf7.yaml new file mode 100644 index 0000000000..ffaa3d5c95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-frontend-form-element-358ece292f0da9494f24c3c3237a7bf7.yaml @@ -0,0 +1,58 @@ +id: acf-frontend-form-element-358ece292f0da9494f24c3c3237a7bf7 + +info: + name: > + Frontend Admin by DynamiApps Plugin <= 3.18.3 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7815322d-a240-4855-b458-60caa3cec96c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-frontend-form-element/" + google-query: inurl:"/wp-content/plugins/acf-frontend-form-element/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-frontend-form-element,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-frontend-form-element/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-frontend-form-element" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-frontend-form-element-48759f93c52619bbac694a4e94eca96c.yaml b/nuclei-templates/cve-less/plugins/acf-frontend-form-element-48759f93c52619bbac694a4e94eca96c.yaml new file mode 100644 index 0000000000..a76ceadadb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-frontend-form-element-48759f93c52619bbac694a4e94eca96c.yaml @@ -0,0 +1,58 @@ +id: acf-frontend-form-element-48759f93c52619bbac694a4e94eca96c + +info: + name: > + Frontend Admin by DynamiApps <= 3.19.4 - Improper Missing Encryption Exception Handling to Form Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2d22c5d-5ef5-4920-a1b5-e8284394c7e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-frontend-form-element/" + google-query: inurl:"/wp-content/plugins/acf-frontend-form-element/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-frontend-form-element,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-frontend-form-element/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-frontend-form-element" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-frontend-form-element-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/acf-frontend-form-element-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9d87d74093 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-frontend-form-element-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: acf-frontend-form-element-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-frontend-form-element/" + google-query: inurl:"/wp-content/plugins/acf-frontend-form-element/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-frontend-form-element,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-frontend-form-element/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-frontend-form-element" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-image-crop-add-on-a5f89ffe6e75548da5bcc9b8bd527e66.yaml b/nuclei-templates/cve-less/plugins/acf-image-crop-add-on-a5f89ffe6e75548da5bcc9b8bd527e66.yaml new file mode 100644 index 0000000000..ada9a3b03d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-image-crop-add-on-a5f89ffe6e75548da5bcc9b8bd527e66.yaml @@ -0,0 +1,58 @@ +id: acf-image-crop-add-on-a5f89ffe6e75548da5bcc9b8bd527e66 + +info: + name: > + Advanced Custom Fields: Image Crop Add-on <= 1.4.12 - Improper Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27b599af-f1f6-48af-90fe-4fc23b17a4ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-image-crop-add-on/" + google-query: inurl:"/wp-content/plugins/acf-image-crop-add-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-image-crop-add-on,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-image-crop-add-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-image-crop-add-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-on-the-go-e066b94b3267fad45f35322be08f0f07.yaml b/nuclei-templates/cve-less/plugins/acf-on-the-go-e066b94b3267fad45f35322be08f0f07.yaml new file mode 100644 index 0000000000..8484f79190 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-on-the-go-e066b94b3267fad45f35322be08f0f07.yaml @@ -0,0 +1,58 @@ +id: acf-on-the-go-e066b94b3267fad45f35322be08f0f07 + +info: + name: > + ACF On-The-Go <= 1.0.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Content Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46df438c-abff-4cf3-a732-02e0b3196bac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-on-the-go/" + google-query: inurl:"/wp-content/plugins/acf-on-the-go/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-on-the-go,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-on-the-go/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-on-the-go" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-options-importexport-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/acf-options-importexport-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..831f3665b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-options-importexport-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: acf-options-importexport-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-options-importexport/" + google-query: inurl:"/wp-content/plugins/acf-options-importexport/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-options-importexport,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-options-importexport/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-options-importexport" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-quickedit-fields-c99833151ca554dccf2540548a5b3a40.yaml b/nuclei-templates/cve-less/plugins/acf-quickedit-fields-c99833151ca554dccf2540548a5b3a40.yaml new file mode 100644 index 0000000000..306d716d9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-quickedit-fields-c99833151ca554dccf2540548a5b3a40.yaml @@ -0,0 +1,58 @@ +id: acf-quickedit-fields-c99833151ca554dccf2540548a5b3a40 + +info: + name: > + ACF Quick Edit Fields <= 3.2.2 - Authenticated (Contributor+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5954bdc0-09e9-4691-95ff-02f7304514c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-quickedit-fields/" + google-query: inurl:"/wp-content/plugins/acf-quickedit-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-quickedit-fields,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-quickedit-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-quickedit-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acf-to-rest-api-1e33553896157651d598bc5cf39ab65c.yaml b/nuclei-templates/cve-less/plugins/acf-to-rest-api-1e33553896157651d598bc5cf39ab65c.yaml new file mode 100644 index 0000000000..9c1889f315 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acf-to-rest-api-1e33553896157651d598bc5cf39ab65c.yaml @@ -0,0 +1,58 @@ +id: acf-to-rest-api-1e33553896157651d598bc5cf39ab65c + +info: + name: > + ACF to REST API <= 3.2.0 - Insecure direct object reference via permalinks manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/738e5946-65e4-4403-bb23-f84910289a45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acf-to-rest-api/" + google-query: inurl:"/wp-content/plugins/acf-to-rest-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acf-to-rest-api,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acf-to-rest-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acf-to-rest-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ach-for-stripe-plaid-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ach-for-stripe-plaid-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f78acd7f57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ach-for-stripe-plaid-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ach-for-stripe-plaid-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ach-for-stripe-plaid/" + google-query: inurl:"/wp-content/plugins/ach-for-stripe-plaid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ach-for-stripe-plaid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ach-for-stripe-plaid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ach-for-stripe-plaid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acme-fix-images-4ba662d6b707785ba4b6d4f4f14b8096.yaml b/nuclei-templates/cve-less/plugins/acme-fix-images-4ba662d6b707785ba4b6d4f4f14b8096.yaml new file mode 100644 index 0000000000..9a60d5eaa1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acme-fix-images-4ba662d6b707785ba4b6d4f4f14b8096.yaml @@ -0,0 +1,58 @@ +id: acme-fix-images-4ba662d6b707785ba4b6d4f4f14b8096 + +info: + name: > + Acme Fix Images <= 1.0.0 - Missing Authorization via acme_fix_images_ajax_callback + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9047775-2d72-4eb5-9339-419f95aa19b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acme-fix-images/" + google-query: inurl:"/wp-content/plugins/acme-fix-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acme-fix-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acme-fix-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acme-fix-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aco-product-labels-for-woocommerce-3ec6520097de3a68210e828e99c83fad.yaml b/nuclei-templates/cve-less/plugins/aco-product-labels-for-woocommerce-3ec6520097de3a68210e828e99c83fad.yaml new file mode 100644 index 0000000000..fad6001b2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aco-product-labels-for-woocommerce-3ec6520097de3a68210e828e99c83fad.yaml @@ -0,0 +1,58 @@ +id: aco-product-labels-for-woocommerce-3ec6520097de3a68210e828e99c83fad + +info: + name: > + Product Labels For Woocommerce <= 1.5.3 - Authenticated (Shop manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24226595-6ae7-44c2-a159-5b69808273fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aco-product-labels-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/aco-product-labels-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aco-product-labels-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aco-product-labels-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aco-product-labels-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acobot-0f23eed689a75af60a6352d8c9b0e5a6.yaml b/nuclei-templates/cve-less/plugins/acobot-0f23eed689a75af60a6352d8c9b0e5a6.yaml new file mode 100644 index 0000000000..654e7be0ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acobot-0f23eed689a75af60a6352d8c9b0e5a6.yaml @@ -0,0 +1,58 @@ +id: acobot-0f23eed689a75af60a6352d8c9b0e5a6 + +info: + name: > + Acobot Live Chat & Contact Form <= 2.0 - Cross-Site Request Forgery and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c77f6fff-8456-4979-90c3-52078ee12264?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acobot/" + google-query: inurl:"/wp-content/plugins/acobot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acobot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acobot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acobot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/active-directory-integration-a7284d3f83c86c028a5b0cebbf2cf2ad.yaml b/nuclei-templates/cve-less/plugins/active-directory-integration-a7284d3f83c86c028a5b0cebbf2cf2ad.yaml new file mode 100644 index 0000000000..8c1f894dba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/active-directory-integration-a7284d3f83c86c028a5b0cebbf2cf2ad.yaml @@ -0,0 +1,58 @@ +id: active-directory-integration-a7284d3f83c86c028a5b0cebbf2cf2ad + +info: + name: > + Active Directory Integration <= 1.1.8 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba0fdd81-767a-4858-acdb-e60fd5e15aab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/active-directory-integration/" + google-query: inurl:"/wp-content/plugins/active-directory-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,active-directory-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/active-directory-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "active-directory-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activecampaign-for-woocommerce-511e748ac6289331b63ef5c4ea73256a.yaml b/nuclei-templates/cve-less/plugins/activecampaign-for-woocommerce-511e748ac6289331b63ef5c4ea73256a.yaml new file mode 100644 index 0000000000..c3144d82bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activecampaign-for-woocommerce-511e748ac6289331b63ef5c4ea73256a.yaml @@ -0,0 +1,58 @@ +id: activecampaign-for-woocommerce-511e748ac6289331b63ef5c4ea73256a + +info: + name: > + ActiveCampaign for WooCommerce <= 1.9.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0299b95-abbf-43c4-81d0-7c383d92cffe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activecampaign-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/activecampaign-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activecampaign-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activecampaign-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activecampaign-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activecampaign-for-woocommerce-e8ed3a408ffed7b696f1556afff0400c.yaml b/nuclei-templates/cve-less/plugins/activecampaign-for-woocommerce-e8ed3a408ffed7b696f1556afff0400c.yaml new file mode 100644 index 0000000000..2ea8c6da21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activecampaign-for-woocommerce-e8ed3a408ffed7b696f1556afff0400c.yaml @@ -0,0 +1,58 @@ +id: activecampaign-for-woocommerce-e8ed3a408ffed7b696f1556afff0400c + +info: + name: > + ActiveCampaign for WooCommerce <= 1.9.6 - Missing Authorization to Error Log Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09aa2a44-8665-4f70-97a5-2e869c4610a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activecampaign-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/activecampaign-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activecampaign-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activecampaign-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activecampaign-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-0bd5595821e6e021ded7947ef04d5401.yaml b/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-0bd5595821e6e021ded7947ef04d5401.yaml new file mode 100644 index 0000000000..d02ab58b92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-0bd5595821e6e021ded7947ef04d5401.yaml @@ -0,0 +1,58 @@ +id: activecampaign-subscription-forms-0bd5595821e6e021ded7947ef04d5401 + +info: + name: > + ActiveCampaign – Forms, Site Tracking, Live Chat <= 8.1.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47e25cfa-fedf-413a-bfe7-18a1de429bc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activecampaign-subscription-forms/" + google-query: inurl:"/wp-content/plugins/activecampaign-subscription-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activecampaign-subscription-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activecampaign-subscription-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activecampaign-subscription-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-7126916cd15b71eb21f56467461f8ab1.yaml b/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-7126916cd15b71eb21f56467461f8ab1.yaml new file mode 100644 index 0000000000..843c562718 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-7126916cd15b71eb21f56467461f8ab1.yaml @@ -0,0 +1,58 @@ +id: activecampaign-subscription-forms-7126916cd15b71eb21f56467461f8ab1 + +info: + name: > + ActiveCampaign < 8.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/decba9c0-36ee-4f97-9cc8-b56039233d10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activecampaign-subscription-forms/" + google-query: inurl:"/wp-content/plugins/activecampaign-subscription-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activecampaign-subscription-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activecampaign-subscription-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activecampaign-subscription-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-910b5f5663169fdea4f0325e6cf734a0.yaml b/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-910b5f5663169fdea4f0325e6cf734a0.yaml new file mode 100644 index 0000000000..ec460552bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activecampaign-subscription-forms-910b5f5663169fdea4f0325e6cf734a0.yaml @@ -0,0 +1,58 @@ +id: activecampaign-subscription-forms-910b5f5663169fdea4f0325e6cf734a0 + +info: + name: > + ActiveCampaign <= 8.1.14 - Authenticated (Administrator+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3232aaa-189d-42cd-8eec-c167c6aa65f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activecampaign-subscription-forms/" + google-query: inurl:"/wp-content/plugins/activecampaign-subscription-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activecampaign-subscription-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activecampaign-subscription-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activecampaign-subscription-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activedemand-a4ef61682da896a77f77c008966e7b92.yaml b/nuclei-templates/cve-less/plugins/activedemand-a4ef61682da896a77f77c008966e7b92.yaml new file mode 100644 index 0000000000..524e188f42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activedemand-a4ef61682da896a77f77c008966e7b92.yaml @@ -0,0 +1,58 @@ +id: activedemand-a4ef61682da896a77f77c008966e7b92 + +info: + name: > + ActiveDEMAND <= 0.2.41 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5baec449-59f9-47f3-af80-eb31adeacb7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activedemand/" + google-query: inurl:"/wp-content/plugins/activedemand/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activedemand,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activedemand/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activedemand" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activedemand-adf2d29be020721f57ebc8e5c323f1bc.yaml b/nuclei-templates/cve-less/plugins/activedemand-adf2d29be020721f57ebc8e5c323f1bc.yaml new file mode 100644 index 0000000000..e7f2c51a0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activedemand-adf2d29be020721f57ebc8e5c323f1bc.yaml @@ -0,0 +1,58 @@ +id: activedemand-adf2d29be020721f57ebc8e5c323f1bc + +info: + name: > + ActiveDEMAND <= 0.2.27 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/194f71d8-43d7-4a1f-8390-2c1efd0b0a23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activedemand/" + google-query: inurl:"/wp-content/plugins/activedemand/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activedemand,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activedemand/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activedemand" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activehelper-livehelp-98bfd8505d63ab414ff4e674e40520aa.yaml b/nuclei-templates/cve-less/plugins/activehelper-livehelp-98bfd8505d63ab414ff4e674e40520aa.yaml new file mode 100644 index 0000000000..b89013adf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activehelper-livehelp-98bfd8505d63ab414ff4e674e40520aa.yaml @@ -0,0 +1,58 @@ +id: activehelper-livehelp-98bfd8505d63ab414ff4e674e40520aa + +info: + name: > + ActiveHelper LiveHelp Live Chat < 3.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb91188b-71df-4aee-98f1-b77e0a33e01c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activehelper-livehelp/" + google-query: inurl:"/wp-content/plugins/activehelper-livehelp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activehelper-livehelp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activehelper-livehelp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activehelper-livehelp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activity-log-mainwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/activity-log-mainwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6c80df67cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activity-log-mainwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: activity-log-mainwp-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activity-log-mainwp/" + google-query: inurl:"/wp-content/plugins/activity-log-mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activity-log-mainwp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activity-log-mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activity-log-mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activity-reactions-for-buddypress-2764a8f5acae96c89d7440a05722c172.yaml b/nuclei-templates/cve-less/plugins/activity-reactions-for-buddypress-2764a8f5acae96c89d7440a05722c172.yaml new file mode 100644 index 0000000000..be92567d0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activity-reactions-for-buddypress-2764a8f5acae96c89d7440a05722c172.yaml @@ -0,0 +1,58 @@ +id: activity-reactions-for-buddypress-2764a8f5acae96c89d7440a05722c172 + +info: + name: > + Activity Reactions For Buddypress <= 1.0.22 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de3a6e77-47ee-4989-81a0-5447a73185bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activity-reactions-for-buddypress/" + google-query: inurl:"/wp-content/plugins/activity-reactions-for-buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activity-reactions-for-buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activity-reactions-for-buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activity-reactions-for-buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activity-reactions-for-buddypress-f8b3cfa96a6263fb75e4e2e3d0d2b588.yaml b/nuclei-templates/cve-less/plugins/activity-reactions-for-buddypress-f8b3cfa96a6263fb75e4e2e3d0d2b588.yaml new file mode 100644 index 0000000000..e92771db0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activity-reactions-for-buddypress-f8b3cfa96a6263fb75e4e2e3d0d2b588.yaml @@ -0,0 +1,58 @@ +id: activity-reactions-for-buddypress-f8b3cfa96a6263fb75e4e2e3d0d2b588 + +info: + name: > + Activity Reactions For Buddypress <= 1.0.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/218b4564-bfaf-4e65-94c4-b6b15b60b707?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activity-reactions-for-buddypress/" + google-query: inurl:"/wp-content/plugins/activity-reactions-for-buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activity-reactions-for-buddypress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activity-reactions-for-buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activity-reactions-for-buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activitypub-3492aa2f8ff8d594f214ebc3c0f6df74.yaml b/nuclei-templates/cve-less/plugins/activitypub-3492aa2f8ff8d594f214ebc3c0f6df74.yaml new file mode 100644 index 0000000000..2579738e84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activitypub-3492aa2f8ff8d594f214ebc3c0f6df74.yaml @@ -0,0 +1,58 @@ +id: activitypub-3492aa2f8ff8d594f214ebc3c0f6df74 + +info: + name: > + ActivityPub <= 0.17.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Content + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/406951d8-4c61-45b3-a8a2-788921662b6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activitypub/" + google-query: inurl:"/wp-content/plugins/activitypub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activitypub,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activitypub/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activitypub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activitypub-3d9f543216228e07e8805addbdc60815.yaml b/nuclei-templates/cve-less/plugins/activitypub-3d9f543216228e07e8805addbdc60815.yaml new file mode 100644 index 0000000000..05ccd0b883 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activitypub-3d9f543216228e07e8805addbdc60815.yaml @@ -0,0 +1,58 @@ +id: activitypub-3d9f543216228e07e8805addbdc60815 + +info: + name: > + ActivityPub <= 0.17.0 - Authenticated (Subscriber+) Insecure Direct Object Reference to Sensitive Post Title Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1b92249-bc18-4939-aefa-286667f6c003?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activitypub/" + google-query: inurl:"/wp-content/plugins/activitypub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activitypub,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activitypub/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activitypub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activitypub-e408b7193fb2b136537798455a49df5e.yaml b/nuclei-templates/cve-less/plugins/activitypub-e408b7193fb2b136537798455a49df5e.yaml new file mode 100644 index 0000000000..9149e1f2fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activitypub-e408b7193fb2b136537798455a49df5e.yaml @@ -0,0 +1,58 @@ +id: activitypub-e408b7193fb2b136537798455a49df5e + +info: + name: > + ActivityPub <= 0.17.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via User Metadata + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76e35dc6-a4d2-4dca-a186-395f0dd954aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activitypub/" + google-query: inurl:"/wp-content/plugins/activitypub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activitypub,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activitypub/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activitypub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activitypub-ec1e17ee6b9dff2a9b24906383f33988.yaml b/nuclei-templates/cve-less/plugins/activitypub-ec1e17ee6b9dff2a9b24906383f33988.yaml new file mode 100644 index 0000000000..0587dd0285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activitypub-ec1e17ee6b9dff2a9b24906383f33988.yaml @@ -0,0 +1,58 @@ +id: activitypub-ec1e17ee6b9dff2a9b24906383f33988 + +info: + name: > + ActivityPub <= 1.0.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3666a841-711d-4ecf-bb77-f2db4d5817ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activitypub/" + google-query: inurl:"/wp-content/plugins/activitypub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activitypub,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activitypub/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activitypub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activitypub-f60eec61fd032c9a9193cb04ba124ce1.yaml b/nuclei-templates/cve-less/plugins/activitypub-f60eec61fd032c9a9193cb04ba124ce1.yaml new file mode 100644 index 0000000000..00ff7e08d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activitypub-f60eec61fd032c9a9193cb04ba124ce1.yaml @@ -0,0 +1,58 @@ +id: activitypub-f60eec61fd032c9a9193cb04ba124ce1 + +info: + name: > + ActivityPub <= 0.17.0 - Authenticated (Subscriber+) Insecure Direct Object Reference to Sensitive Post Content Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1c6ad5a-bc76-4012-acc6-35f742e0869e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activitypub/" + google-query: inurl:"/wp-content/plugins/activitypub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activitypub,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activitypub/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activitypub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activitytime-a43196491819b1394c39bdcafa720fd3.yaml b/nuclei-templates/cve-less/plugins/activitytime-a43196491819b1394c39bdcafa720fd3.yaml new file mode 100644 index 0000000000..e8184c0a46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activitytime-a43196491819b1394c39bdcafa720fd3.yaml @@ -0,0 +1,58 @@ +id: activitytime-a43196491819b1394c39bdcafa720fd3 + +info: + name: > + WP Sessions Time Monitoring Full Automatic <= 1.0.8 - Unauthenticated SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b50d6fd0-3698-4e16-aa76-0344306bc705?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activitytime/" + google-query: inurl:"/wp-content/plugins/activitytime/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activitytime,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activitytime/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activitytime" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/activitytime-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/activitytime-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0d9be5d4eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/activitytime-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: activitytime-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/activitytime/" + google-query: inurl:"/wp-content/plugins/activitytime/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,activitytime,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/activitytime/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activitytime" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acumbamail-signup-forms-a7783b6874a69305b48413041df4fc03.yaml b/nuclei-templates/cve-less/plugins/acumbamail-signup-forms-a7783b6874a69305b48413041df4fc03.yaml new file mode 100644 index 0000000000..7dccb85d72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acumbamail-signup-forms-a7783b6874a69305b48413041df4fc03.yaml @@ -0,0 +1,58 @@ +id: acumbamail-signup-forms-a7783b6874a69305b48413041df4fc03 + +info: + name: > + Acumbamail < 1.0.4.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8efc5cf-3497-4426-a8a5-740783a7c2c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acumbamail-signup-forms/" + google-query: inurl:"/wp-content/plugins/acumbamail-signup-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acumbamail-signup-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acumbamail-signup-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acumbamail-signup-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acurax-social-media-widget-1ccff55ca83ceb7924ebbc45fc9187e7.yaml b/nuclei-templates/cve-less/plugins/acurax-social-media-widget-1ccff55ca83ceb7924ebbc45fc9187e7.yaml new file mode 100644 index 0000000000..274398758b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acurax-social-media-widget-1ccff55ca83ceb7924ebbc45fc9187e7.yaml @@ -0,0 +1,58 @@ +id: acurax-social-media-widget-1ccff55ca83ceb7924ebbc45fc9187e7 + +info: + name: > + Social Media Widget <= 2.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2540bd75-ba5e-4aaf-9e65-8fc22c8b87cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acurax-social-media-widget/" + google-query: inurl:"/wp-content/plugins/acurax-social-media-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acurax-social-media-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acurax-social-media-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acurax-social-media-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acurax-social-media-widget-6c3ed40b4545418647bb281d1735150e.yaml b/nuclei-templates/cve-less/plugins/acurax-social-media-widget-6c3ed40b4545418647bb281d1735150e.yaml new file mode 100644 index 0000000000..b12c8570ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acurax-social-media-widget-6c3ed40b4545418647bb281d1735150e.yaml @@ -0,0 +1,58 @@ +id: acurax-social-media-widget-6c3ed40b4545418647bb281d1735150e + +info: + name: > + Social Media Widget by Acurax <= 3.2.5 - Cross-Site Request Forgery leading to Cross-Site Scripting via the recordsArray Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af7d935b-05a2-4eaa-af98-4e6a88abab46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acurax-social-media-widget/" + google-query: inurl:"/wp-content/plugins/acurax-social-media-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acurax-social-media-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acurax-social-media-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acurax-social-media-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acurax-social-media-widget-e91f78a4d7f529b6160e3f85bc787127.yaml b/nuclei-templates/cve-less/plugins/acurax-social-media-widget-e91f78a4d7f529b6160e3f85bc787127.yaml new file mode 100644 index 0000000000..047d26ed22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acurax-social-media-widget-e91f78a4d7f529b6160e3f85bc787127.yaml @@ -0,0 +1,58 @@ +id: acurax-social-media-widget-e91f78a4d7f529b6160e3f85bc787127 + +info: + name: > + Social Media Widget by Acurax < 2.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/199a280f-a629-44f5-8ebe-399d86b5e0f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acurax-social-media-widget/" + google-query: inurl:"/wp-content/plugins/acurax-social-media-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acurax-social-media-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acurax-social-media-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acurax-social-media-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acymailing-240aa2bc102d76090c9b42a8f66071ad.yaml b/nuclei-templates/cve-less/plugins/acymailing-240aa2bc102d76090c9b42a8f66071ad.yaml new file mode 100644 index 0000000000..cf68827437 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acymailing-240aa2bc102d76090c9b42a8f66071ad.yaml @@ -0,0 +1,58 @@ +id: acymailing-240aa2bc102d76090c9b42a8f66071ad + +info: + name: > + AcyMailing SMTP Newsletter < 7.5.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1acc256-c8f5-4738-8788-d52b4e2b80ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acymailing/" + google-query: inurl:"/wp-content/plugins/acymailing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acymailing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acymailing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acymailing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/acymailing-9c2165239aea161f40d7ad21814e157b.yaml b/nuclei-templates/cve-less/plugins/acymailing-9c2165239aea161f40d7ad21814e157b.yaml new file mode 100644 index 0000000000..b338c1eea8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/acymailing-9c2165239aea161f40d7ad21814e157b.yaml @@ -0,0 +1,58 @@ +id: acymailing-9c2165239aea161f40d7ad21814e157b + +info: + name: > + AcyMailing SMTP Newsletter <= 8.6.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f82ec7c-72a0-4c3b-8041-c6ad080a48f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/acymailing/" + google-query: inurl:"/wp-content/plugins/acymailing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,acymailing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/acymailing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "acymailing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-blocking-detector-33e33b7e60f5bb1cbc3c1d66bbc57d88.yaml b/nuclei-templates/cve-less/plugins/ad-blocking-detector-33e33b7e60f5bb1cbc3c1d66bbc57d88.yaml new file mode 100644 index 0000000000..5da9d1c758 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-blocking-detector-33e33b7e60f5bb1cbc3c1d66bbc57d88.yaml @@ -0,0 +1,58 @@ +id: ad-blocking-detector-33e33b7e60f5bb1cbc3c1d66bbc57d88 + +info: + name: > + Ad Blocking Detector <= 1.2.1 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/054bb123-132c-4c32-9fd1-a9f289cfdc35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-blocking-detector/" + google-query: inurl:"/wp-content/plugins/ad-blocking-detector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-blocking-detector,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-blocking-detector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-blocking-detector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-buttons-ced2fa1255261a6b95f5e5c089baa7a6.yaml b/nuclei-templates/cve-less/plugins/ad-buttons-ced2fa1255261a6b95f5e5c089baa7a6.yaml new file mode 100644 index 0000000000..47a91bc634 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-buttons-ced2fa1255261a6b95f5e5c089baa7a6.yaml @@ -0,0 +1,58 @@ +id: ad-buttons-ced2fa1255261a6b95f5e5c089baa7a6 + +info: + name: > + Ad Buttons <= 2.3.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5f36574-b4d0-4b67-baea-f5ef5e6618d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-buttons/" + google-query: inurl:"/wp-content/plugins/ad-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-injection-55f4a1b139d90fca33a89ff564faba6b.yaml b/nuclei-templates/cve-less/plugins/ad-injection-55f4a1b139d90fca33a89ff564faba6b.yaml new file mode 100644 index 0000000000..431d9b5e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-injection-55f4a1b139d90fca33a89ff564faba6b.yaml @@ -0,0 +1,58 @@ +id: ad-injection-55f4a1b139d90fca33a89ff564faba6b + +info: + name: > + Ad Injection <= 1.2.0.19 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a07ca145-9349-4961-9e66-4c59ea9b5069?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-injection/" + google-query: inurl:"/wp-content/plugins/ad-injection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-injection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-injection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-injection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-05c7f4b1ec789bf87edb2e9f58b5a516.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-05c7f4b1ec789bf87edb2e9f58b5a516.yaml new file mode 100644 index 0000000000..ab0b917516 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-05c7f4b1ec789bf87edb2e9f58b5a516.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-05c7f4b1ec789bf87edb2e9f58b5a516 + +info: + name: > + Ad Inserter <= 2.7.30 - Unauthenticated Sensitive Information Exposure via ai-debug-processing-fe + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce457c98-c55b-4b71-a80b-393eceb9effd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-05dc7f00a65d6d066b60c74e22d18787.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-05dc7f00a65d6d066b60c74e22d18787.yaml new file mode 100644 index 0000000000..de262adc7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-05dc7f00a65d6d066b60c74e22d18787.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-05dc7f00a65d6d066b60c74e22d18787 + +info: + name: > + Ad Inserter <= 2.4.19 - Authenticated Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e4da578-aa8d-40b4-98c7-3efef911f850?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-085734e6e575cc721d044070dab37117.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-085734e6e575cc721d044070dab37117.yaml new file mode 100644 index 0000000000..d71a70abbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-085734e6e575cc721d044070dab37117.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-085734e6e575cc721d044070dab37117 + +info: + name: > + Ad Inserter Free and Pro <= 2.7.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/573dd1ea-1f2c-4a0b-9496-82d7b65c8db2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-2021111b9f6ef5ab3859ee3ee5bee180.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-2021111b9f6ef5ab3859ee3ee5bee180.yaml new file mode 100644 index 0000000000..b369cb29af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-2021111b9f6ef5ab3859ee3ee5bee180.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-2021111b9f6ef5ab3859ee3ee5bee180 + +info: + name: > + Ad Inserter < 2.7.11 - Authenticated (Admin+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a596c9c4-ceb4-470c-8ad5-986cd62da91e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-79f632cd97a0ebb6e16d846a092aa9f0.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-79f632cd97a0ebb6e16d846a092aa9f0.yaml new file mode 100644 index 0000000000..447e62ebc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-79f632cd97a0ebb6e16d846a092aa9f0.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-79f632cd97a0ebb6e16d846a092aa9f0 + +info: + name: > + Ad Inserter – Ad Manager & AdSense Ads < 1.5.3 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a377ac8-7ef2-4450-9987-4d5c66378023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-b3d92b780aa6d9d512b427a6e681192d.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-b3d92b780aa6d9d512b427a6e681192d.yaml new file mode 100644 index 0000000000..6af1876c4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-b3d92b780aa6d9d512b427a6e681192d.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-b3d92b780aa6d9d512b427a6e681192d + +info: + name: > + Ad Inserter <= 1.5.5 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/427c29e6-9bbe-4094-a2a2-46945525f5b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-c5d0a251b677b3b951be5050c3700b32.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-c5d0a251b677b3b951be5050c3700b32.yaml new file mode 100644 index 0000000000..56c359561e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-c5d0a251b677b3b951be5050c3700b32.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-c5d0a251b677b3b951be5050c3700b32 + +info: + name: > + Ad Inserter <= 2.4.21 - Authenticated Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d17d3ce-2478-498b-8364-75d2449a9b58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-e2189a48266beb6940ada2c357f2ecea.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-e2189a48266beb6940ada2c357f2ecea.yaml new file mode 100644 index 0000000000..60f1fb4d36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-e2189a48266beb6940ada2c357f2ecea.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-e2189a48266beb6940ada2c357f2ecea + +info: + name: > + Ad Inserter <= 2.7.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3798fb5d-f7d6-4a93-8908-c9b1f93bb05a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-e9f3d7aebb0ed7cd4a6a52dea34e70b2.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-e9f3d7aebb0ed7cd4a6a52dea34e70b2.yaml new file mode 100644 index 0000000000..6970550b22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-e9f3d7aebb0ed7cd4a6a52dea34e70b2.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-e9f3d7aebb0ed7cd4a6a52dea34e70b2 + +info: + name: > + Ad Inserter <= 2.7.25 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c94028c-a774-45ac-817d-ad9b966a3b51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-fc176b7bb57291a7a6cb64680552a9c1.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-fc176b7bb57291a7a6cb64680552a9c1.yaml new file mode 100644 index 0000000000..65b88350b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-fc176b7bb57291a7a6cb64680552a9c1.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-fc176b7bb57291a7a6cb64680552a9c1 + +info: + name: > + Ad Inserter <= 2.7.30 - Unauthenticated Sensitive Information Exposure via ai_ajax + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57b3eef3-e165-45ac-89d7-2a2a6529b310?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter/" + google-query: inurl:"/wp-content/plugins/ad-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-pro-085734e6e575cc721d044070dab37117.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-pro-085734e6e575cc721d044070dab37117.yaml new file mode 100644 index 0000000000..38f0813ff8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-pro-085734e6e575cc721d044070dab37117.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-pro-085734e6e575cc721d044070dab37117 + +info: + name: > + Ad Inserter Free and Pro <= 2.7.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/573dd1ea-1f2c-4a0b-9496-82d7b65c8db2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter-pro/" + google-query: inurl:"/wp-content/plugins/ad-inserter-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-inserter-pro-408292faf542bf83787cacdb065a1b67.yaml b/nuclei-templates/cve-less/plugins/ad-inserter-pro-408292faf542bf83787cacdb065a1b67.yaml new file mode 100644 index 0000000000..51e094de9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-inserter-pro-408292faf542bf83787cacdb065a1b67.yaml @@ -0,0 +1,58 @@ +id: ad-inserter-pro-408292faf542bf83787cacdb065a1b67 + +info: + name: > + Ad Inserter Pro <= 2.7.15 - Arbitrary File Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0a81d60-d489-4786-aa21-805a1e2aa198?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-inserter-pro/" + google-query: inurl:"/wp-content/plugins/ad-inserter-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-inserter-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-inserter-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-inserter-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-21d21ac863b5d217214b983983ea0861.yaml b/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-21d21ac863b5d217214b983983ea0861.yaml new file mode 100644 index 0000000000..7c6b55749e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-21d21ac863b5d217214b983983ea0861.yaml @@ -0,0 +1,58 @@ +id: ad-invalid-click-protector-21d21ac863b5d217214b983983ea0861 + +info: + name: > + Ad Invalid Click Protector (AICP) <= 1.2.5.2 - Cross-Site Request Forgery to Arbitrary Ban Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caf61bf9-4b0f-450a-b571-b0fec42e9e39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-invalid-click-protector/" + google-query: inurl:"/wp-content/plugins/ad-invalid-click-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-invalid-click-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-invalid-click-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-invalid-click-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-5b5ec9fb47af5349a4069a8334bed873.yaml b/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-5b5ec9fb47af5349a4069a8334bed873.yaml new file mode 100644 index 0000000000..1ff4b2585c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-5b5ec9fb47af5349a4069a8334bed873.yaml @@ -0,0 +1,58 @@ +id: ad-invalid-click-protector-5b5ec9fb47af5349a4069a8334bed873 + +info: + name: > + Ad Invalid Click Protector (AICP) <= 1.2.5.2 - Reflected Cross-Site Scripting and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/540d2495-7ad4-428c-b86e-9af73d0ebe51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-invalid-click-protector/" + google-query: inurl:"/wp-content/plugins/ad-invalid-click-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-invalid-click-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-invalid-click-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-invalid-click-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-f2687a211e25f95aa3e0981921986366.yaml b/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-f2687a211e25f95aa3e0981921986366.yaml new file mode 100644 index 0000000000..a8a0c945e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-invalid-click-protector-f2687a211e25f95aa3e0981921986366.yaml @@ -0,0 +1,58 @@ +id: ad-invalid-click-protector-f2687a211e25f95aa3e0981921986366 + +info: + name: > + Ad Invalid Click Protector <= 1.2.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf711c64-dd5e-4725-824c-fbe9063916d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-invalid-click-protector/" + google-query: inurl:"/wp-content/plugins/ad-invalid-click-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-invalid-click-protector,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-invalid-click-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-invalid-click-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-minister-8ed4f4b4804b54524ede760d18b29fad.yaml b/nuclei-templates/cve-less/plugins/ad-minister-8ed4f4b4804b54524ede760d18b29fad.yaml new file mode 100644 index 0000000000..fffefae82c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-minister-8ed4f4b4804b54524ede760d18b29fad.yaml @@ -0,0 +1,58 @@ +id: ad-minister-8ed4f4b4804b54524ede760d18b29fad + +info: + name: > + Ad-minister <= 0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6870e237-2c2f-46c7-bf00-b3f1bedb8d8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-minister/" + google-query: inurl:"/wp-content/plugins/ad-minister/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-minister,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-minister/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-minister" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-refresh-control-fd9bc570df9e6e1f10861293d27d4049.yaml b/nuclei-templates/cve-less/plugins/ad-refresh-control-fd9bc570df9e6e1f10861293d27d4049.yaml new file mode 100644 index 0000000000..32239d9229 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-refresh-control-fd9bc570df9e6e1f10861293d27d4049.yaml @@ -0,0 +1,58 @@ +id: ad-refresh-control-fd9bc570df9e6e1f10861293d27d4049 + +info: + name: > + Minimist <= 1.2.5 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f714f97-5e1a-498a-9722-1e4bb883c5c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-refresh-control/" + google-query: inurl:"/wp-content/plugins/ad-refresh-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-refresh-control,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-refresh-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-refresh-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-swapper-62dc43c109e10a4fb2083be6c80b9766.yaml b/nuclei-templates/cve-less/plugins/ad-swapper-62dc43c109e10a4fb2083be6c80b9766.yaml new file mode 100644 index 0000000000..821e27d556 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-swapper-62dc43c109e10a4fb2083be6c80b9766.yaml @@ -0,0 +1,58 @@ +id: ad-swapper-62dc43c109e10a4fb2083be6c80b9766 + +info: + name: > + Zebra_Form PHP library <= 2.9.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4ea0a8-d2f6-4209-b17f-0a26ba664c63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-swapper/" + google-query: inurl:"/wp-content/plugins/ad-swapper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-swapper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-swapper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-swapper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-widget-4889575a9366ba976f9903b70e5fb359.yaml b/nuclei-templates/cve-less/plugins/ad-widget-4889575a9366ba976f9903b70e5fb359.yaml new file mode 100644 index 0000000000..eb6d410d8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-widget-4889575a9366ba976f9903b70e5fb359.yaml @@ -0,0 +1,58 @@ +id: ad-widget-4889575a9366ba976f9903b70e5fb359 + +info: + name: > + WordPress Ad Widget <= 2.11.0 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f31bf9cd-fbf3-4f7a-bddd-ddd44c899710?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-widget/" + google-query: inurl:"/wp-content/plugins/ad-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ad-widget-7559c037fdee829f7bf9775d464accd0.yaml b/nuclei-templates/cve-less/plugins/ad-widget-7559c037fdee829f7bf9775d464accd0.yaml new file mode 100644 index 0000000000..19205dda27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ad-widget-7559c037fdee829f7bf9775d464accd0.yaml @@ -0,0 +1,58 @@ +id: ad-widget-7559c037fdee829f7bf9775d464accd0 + +info: + name: > + WordPress Ad Widget <= 2.20.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9604fccc-ed8b-480b-ab56-ffa341631b52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ad-widget/" + google-query: inurl:"/wp-content/plugins/ad-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ad-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ad-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ad-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adamrob-parallax-scroll-0e52d08abcfaa24832dc556c46587054.yaml b/nuclei-templates/cve-less/plugins/adamrob-parallax-scroll-0e52d08abcfaa24832dc556c46587054.yaml new file mode 100644 index 0000000000..2909e007c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adamrob-parallax-scroll-0e52d08abcfaa24832dc556c46587054.yaml @@ -0,0 +1,58 @@ +id: adamrob-parallax-scroll-0e52d08abcfaa24832dc556c46587054 + +info: + name: > + Parallax Scroll <= 2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/976f9d0e-8ad8-4ce8-8917-b5c7f5a24cbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adamrob-parallax-scroll/" + google-query: inurl:"/wp-content/plugins/adamrob-parallax-scroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adamrob-parallax-scroll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adamrob-parallax-scroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adamrob-parallax-scroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adapta-rgpd-a8caff9400eec85f908551f99981c4c5.yaml b/nuclei-templates/cve-less/plugins/adapta-rgpd-a8caff9400eec85f908551f99981c4c5.yaml new file mode 100644 index 0000000000..6387b4f04d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adapta-rgpd-a8caff9400eec85f908551f99981c4c5.yaml @@ -0,0 +1,58 @@ +id: adapta-rgpd-a8caff9400eec85f908551f99981c4c5 + +info: + name: > + Adapta RGPD <= 1.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/220055ff-683c-47a4-8817-b3e70bb9dc81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adapta-rgpd/" + google-query: inurl:"/wp-content/plugins/adapta-rgpd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adapta-rgpd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adapta-rgpd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adapta-rgpd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adaptive-images-092d91aed0440af0f2ea67a8f6a61ea3.yaml b/nuclei-templates/cve-less/plugins/adaptive-images-092d91aed0440af0f2ea67a8f6a61ea3.yaml new file mode 100644 index 0000000000..e9a02f6e1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adaptive-images-092d91aed0440af0f2ea67a8f6a61ea3.yaml @@ -0,0 +1,58 @@ +id: adaptive-images-092d91aed0440af0f2ea67a8f6a61ea3 + +info: + name: > + Adaptive Images for WordPress <= 0.6.66 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2db06b1-c823-45db-b6f5-b656978cc779?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adaptive-images/" + google-query: inurl:"/wp-content/plugins/adaptive-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adaptive-images,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adaptive-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adaptive-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adaptive-images-2cea449c252db115bc0ec944ee102d56.yaml b/nuclei-templates/cve-less/plugins/adaptive-images-2cea449c252db115bc0ec944ee102d56.yaml new file mode 100644 index 0000000000..3d2dde4bb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adaptive-images-2cea449c252db115bc0ec944ee102d56.yaml @@ -0,0 +1,58 @@ +id: adaptive-images-2cea449c252db115bc0ec944ee102d56 + +info: + name: > + Adaptive Images for WordPress <= 0.6.66 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8d17ee3-73b3-4f58-8d08-14bbf2d9d9d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adaptive-images/" + google-query: inurl:"/wp-content/plugins/adaptive-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adaptive-images,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adaptive-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adaptive-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adaptive-images-c12c2c5f48822779a17dfa51b8772537.yaml b/nuclei-templates/cve-less/plugins/adaptive-images-c12c2c5f48822779a17dfa51b8772537.yaml new file mode 100644 index 0000000000..2729b7a409 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adaptive-images-c12c2c5f48822779a17dfa51b8772537.yaml @@ -0,0 +1,58 @@ +id: adaptive-images-c12c2c5f48822779a17dfa51b8772537 + +info: + name: > + Adaptive Images <= 0.6.68 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d7264bc-7fa1-4f5f-a8bc-0840374b7a08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adaptive-images/" + google-query: inurl:"/wp-content/plugins/adaptive-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adaptive-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adaptive-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adaptive-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adblock-notify-by-bweb-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/adblock-notify-by-bweb-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..cd54d5fc2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adblock-notify-by-bweb-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: adblock-notify-by-bweb-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adblock-notify-by-bweb/" + google-query: inurl:"/wp-content/plugins/adblock-notify-by-bweb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adblock-notify-by-bweb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adblock-notify-by-bweb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adblock-notify-by-bweb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-actions-and-filters-0c9c5d7d8c587d19d97cdd4ed72a25ce.yaml b/nuclei-templates/cve-less/plugins/add-actions-and-filters-0c9c5d7d8c587d19d97cdd4ed72a25ce.yaml new file mode 100644 index 0000000000..704e2c1bbc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-actions-and-filters-0c9c5d7d8c587d19d97cdd4ed72a25ce.yaml @@ -0,0 +1,58 @@ +id: add-actions-and-filters-0c9c5d7d8c587d19d97cdd4ed72a25ce + +info: + name: > + Add Shortcodes Actions And Filters <= 2.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/228de538-90c7-4f7d-a076-dd0a01458e38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-actions-and-filters/" + google-query: inurl:"/wp-content/plugins/add-actions-and-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-actions-and-filters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-actions-and-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-actions-and-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-actions-and-filters-3a2ca32819bf69f7c166bffc53191044.yaml b/nuclei-templates/cve-less/plugins/add-actions-and-filters-3a2ca32819bf69f7c166bffc53191044.yaml new file mode 100644 index 0000000000..af70a7d174 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-actions-and-filters-3a2ca32819bf69f7c166bffc53191044.yaml @@ -0,0 +1,58 @@ +id: add-actions-and-filters-3a2ca32819bf69f7c166bffc53191044 + +info: + name: > + Add Shortcodes Actions And Filters <= 2.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44cb21f9-467a-4119-99fb-5cd21166a334?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-actions-and-filters/" + google-query: inurl:"/wp-content/plugins/add-actions-and-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-actions-and-filters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-actions-and-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-actions-and-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-actions-and-filters-7d55795955a6759ccf7bacae2a8fb7d5.yaml b/nuclei-templates/cve-less/plugins/add-actions-and-filters-7d55795955a6759ccf7bacae2a8fb7d5.yaml new file mode 100644 index 0000000000..49f37aa117 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-actions-and-filters-7d55795955a6759ccf7bacae2a8fb7d5.yaml @@ -0,0 +1,58 @@ +id: add-actions-and-filters-7d55795955a6759ccf7bacae2a8fb7d5 + +info: + name: > + Add Shortcodes Actions And Filters <= 2.0.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4942de17-d141-4a6c-885e-75f540fe21b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-actions-and-filters/" + google-query: inurl:"/wp-content/plugins/add-actions-and-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-actions-and-filters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-actions-and-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-actions-and-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-actions-and-filters-d3a3435dfd803c8984d494bbdacab67a.yaml b/nuclei-templates/cve-less/plugins/add-actions-and-filters-d3a3435dfd803c8984d494bbdacab67a.yaml new file mode 100644 index 0000000000..116ed2fca8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-actions-and-filters-d3a3435dfd803c8984d494bbdacab67a.yaml @@ -0,0 +1,58 @@ +id: add-actions-and-filters-d3a3435dfd803c8984d494bbdacab67a + +info: + name: > + Add Shortcodes Actions And Filters <= 2.10 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b7da6f7-d486-44e5-9eeb-21feb119a48b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-actions-and-filters/" + google-query: inurl:"/wp-content/plugins/add-actions-and-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-actions-and-filters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-actions-and-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-actions-and-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-any-extension-to-pages-b90fc576a88f2023fbf4be0c7e221753.yaml b/nuclei-templates/cve-less/plugins/add-any-extension-to-pages-b90fc576a88f2023fbf4be0c7e221753.yaml new file mode 100644 index 0000000000..4a1961e564 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-any-extension-to-pages-b90fc576a88f2023fbf4be0c7e221753.yaml @@ -0,0 +1,58 @@ +id: add-any-extension-to-pages-b90fc576a88f2023fbf4be0c7e221753 + +info: + name: > + Add Any Extension to Pages <= 1.4 - Cross-Site Request Forgery via aaetp_options_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f49e727-cac4-4a46-b649-5ca48d5e2402?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-any-extension-to-pages/" + google-query: inurl:"/wp-content/plugins/add-any-extension-to-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-any-extension-to-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-any-extension-to-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-any-extension-to-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-any-extension-to-pages-f95a4bd79444a6bb4c86f62647865224.yaml b/nuclei-templates/cve-less/plugins/add-any-extension-to-pages-f95a4bd79444a6bb4c86f62647865224.yaml new file mode 100644 index 0000000000..4b91c0ecda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-any-extension-to-pages-f95a4bd79444a6bb4c86f62647865224.yaml @@ -0,0 +1,58 @@ +id: add-any-extension-to-pages-f95a4bd79444a6bb4c86f62647865224 + +info: + name: > + Add Any Extension to Pages <= 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ad889f7-41cb-461f-8dc1-69236b06fb63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-any-extension-to-pages/" + google-query: inurl:"/wp-content/plugins/add-any-extension-to-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-any-extension-to-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-any-extension-to-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-any-extension-to-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-comments-5f015fc98ebe61708b30f8e106c0dca9.yaml b/nuclei-templates/cve-less/plugins/add-comments-5f015fc98ebe61708b30f8e106c0dca9.yaml new file mode 100644 index 0000000000..11db0485bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-comments-5f015fc98ebe61708b30f8e106c0dca9.yaml @@ -0,0 +1,58 @@ +id: add-comments-5f015fc98ebe61708b30f8e106c0dca9 + +info: + name: > + Add Comments <= 1.0.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4101bd5e-94fb-4ec5-9d25-581c3211ffa7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-comments/" + google-query: inurl:"/wp-content/plugins/add-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-custom-body-class-e958f1600aa0e32635d67ccd172b77c5.yaml b/nuclei-templates/cve-less/plugins/add-custom-body-class-e958f1600aa0e32635d67ccd172b77c5.yaml new file mode 100644 index 0000000000..91e4877155 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-custom-body-class-e958f1600aa0e32635d67ccd172b77c5.yaml @@ -0,0 +1,58 @@ +id: add-custom-body-class-e958f1600aa0e32635d67ccd172b77c5 + +info: + name: > + Add Custom Body Class <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9841b57b-b869-4282-8781-60538f6f269f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-custom-body-class/" + google-query: inurl:"/wp-content/plugins/add-custom-body-class/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-custom-body-class,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-custom-body-class/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-custom-body-class" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-customer-for-woocommerce-073e94466d93432fc20ff7757afbfb89.yaml b/nuclei-templates/cve-less/plugins/add-customer-for-woocommerce-073e94466d93432fc20ff7757afbfb89.yaml new file mode 100644 index 0000000000..16737e7a24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-customer-for-woocommerce-073e94466d93432fc20ff7757afbfb89.yaml @@ -0,0 +1,58 @@ +id: add-customer-for-woocommerce-073e94466d93432fc20ff7757afbfb89 + +info: + name: > + Add Customer for WooCommerce <= 1.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba08695e-009e-434a-9db0-06aa1dd6d57a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-customer-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/add-customer-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-customer-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-customer-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-customer-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-edit-delete-listing-for-member-module-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml b/nuclei-templates/cve-less/plugins/add-edit-delete-listing-for-member-module-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml new file mode 100644 index 0000000000..b6886c173b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-edit-delete-listing-for-member-module-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml @@ -0,0 +1,58 @@ +id: add-edit-delete-listing-for-member-module-1b2dceeb5f112c4d4e1d47bb3fb62e6f + +info: + name: > + Add Edit Delete Listing Module <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2baf528d-a24b-4cad-99c9-5fef9df3fe6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-edit-delete-listing-for-member-module/" + google-query: inurl:"/wp-content/plugins/add-edit-delete-listing-for-member-module/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-edit-delete-listing-for-member-module,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-edit-delete-listing-for-member-module/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-edit-delete-listing-for-member-module" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-expires-headers-a517abb9ae98faf810f5cc111ea3cf8c.yaml b/nuclei-templates/cve-less/plugins/add-expires-headers-a517abb9ae98faf810f5cc111ea3cf8c.yaml new file mode 100644 index 0000000000..4f1a1189f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-expires-headers-a517abb9ae98faf810f5cc111ea3cf8c.yaml @@ -0,0 +1,58 @@ +id: add-expires-headers-a517abb9ae98faf810f5cc111ea3cf8c + +info: + name: > + Add Expires Headers & Optimized Minify <= 2.7 - Cross-Site Request Forgery via [placeholder] + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55e6a968-153e-4d4c-a7be-65650a0c9bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-expires-headers/" + google-query: inurl:"/wp-content/plugins/add-expires-headers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-expires-headers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-expires-headers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-expires-headers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-expires-headers-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/add-expires-headers-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ab4edb8ad7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-expires-headers-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: add-expires-headers-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-expires-headers/" + google-query: inurl:"/wp-content/plugins/add-expires-headers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-expires-headers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-expires-headers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-expires-headers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-facebook-0445d2e77118d710e79ad9b8b4807a1f.yaml b/nuclei-templates/cve-less/plugins/add-facebook-0445d2e77118d710e79ad9b8b4807a1f.yaml new file mode 100644 index 0000000000..7e095ae2d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-facebook-0445d2e77118d710e79ad9b8b4807a1f.yaml @@ -0,0 +1,58 @@ +id: add-facebook-0445d2e77118d710e79ad9b8b4807a1f + +info: + name: > + Social Feed <= 1.5.4.6 - Authenticated (Author+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b145772-624e-4af0-9156-03c483bf8381?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-facebook/" + google-query: inurl:"/wp-content/plugins/add-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-facebook-3329f436b3e9299453177bb21ca6d4b2.yaml b/nuclei-templates/cve-less/plugins/add-facebook-3329f436b3e9299453177bb21ca6d4b2.yaml new file mode 100644 index 0000000000..76ec90ec76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-facebook-3329f436b3e9299453177bb21ca6d4b2.yaml @@ -0,0 +1,58 @@ +id: add-facebook-3329f436b3e9299453177bb21ca6d4b2 + +info: + name: > + Social Feed | All social media in one place <= 1.5.4.6 - Authenticated (Administrator+) Stored Cross-Site Scripting] + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a77675b-5a31-4bc1-b4bd-36dd9a612b7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-facebook/" + google-query: inurl:"/wp-content/plugins/add-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-a100f718edfa547990462b4c8b9cca8f.yaml b/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-a100f718edfa547990462b4c8b9cca8f.yaml new file mode 100644 index 0000000000..b2084bf1f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-a100f718edfa547990462b4c8b9cca8f.yaml @@ -0,0 +1,58 @@ +id: add-fields-to-checkout-page-woocommerce-a100f718edfa547990462b4c8b9cca8f + +info: + name: > + Custom WooCommerce Checkout Fields Editor <= 1.3.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0320c16-de32-484f-b17c-5acf0144a373?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-fields-to-checkout-page-woocommerce/" + google-query: inurl:"/wp-content/plugins/add-fields-to-checkout-page-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-fields-to-checkout-page-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-fields-to-checkout-page-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-fields-to-checkout-page-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ad550ac604 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: add-fields-to-checkout-page-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-fields-to-checkout-page-woocommerce/" + google-query: inurl:"/wp-content/plugins/add-fields-to-checkout-page-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-fields-to-checkout-page-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-fields-to-checkout-page-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-fields-to-checkout-page-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-b9bdab270fe39bf9e158152b28713054.yaml b/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-b9bdab270fe39bf9e158152b28713054.yaml new file mode 100644 index 0000000000..87a720b42a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-b9bdab270fe39bf9e158152b28713054.yaml @@ -0,0 +1,58 @@ +id: add-fields-to-checkout-page-woocommerce-b9bdab270fe39bf9e158152b28713054 + +info: + name: > + Custom WooCommerce Checkout Fields Editor <= 1.3.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a92f44b-6f2b-439c-8245-ace189740425?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-fields-to-checkout-page-woocommerce/" + google-query: inurl:"/wp-content/plugins/add-fields-to-checkout-page-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-fields-to-checkout-page-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-fields-to-checkout-page-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-fields-to-checkout-page-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-d334f4c5640d489b36128befbb9349ee.yaml b/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-d334f4c5640d489b36128befbb9349ee.yaml new file mode 100644 index 0000000000..a8c15ceeac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-fields-to-checkout-page-woocommerce-d334f4c5640d489b36128befbb9349ee.yaml @@ -0,0 +1,58 @@ +id: add-fields-to-checkout-page-woocommerce-d334f4c5640d489b36128befbb9349ee + +info: + name: > + Custom WooCommerce Checkout Fields Editor <= 1.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/698c8c4e-77ca-491c-bdd5-4a3d3b99b1b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-fields-to-checkout-page-woocommerce/" + google-query: inurl:"/wp-content/plugins/add-fields-to-checkout-page-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-fields-to-checkout-page-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-fields-to-checkout-page-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-fields-to-checkout-page-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-from-server-373c3d1e9d0bf3f43f2574269f041f82.yaml b/nuclei-templates/cve-less/plugins/add-from-server-373c3d1e9d0bf3f43f2574269f041f82.yaml new file mode 100644 index 0000000000..d54fe85441 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-from-server-373c3d1e9d0bf3f43f2574269f041f82.yaml @@ -0,0 +1,58 @@ +id: add-from-server-373c3d1e9d0bf3f43f2574269f041f82 + +info: + name: > + Add From Server <= 3.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d9a3ad3-90fa-46bc-b42a-7616c02a8b50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-from-server/" + google-query: inurl:"/wp-content/plugins/add-from-server/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-from-server,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-from-server/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-from-server" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-hierarchy-parent-to-post-d831e3189dd50ede75f49828d65ef488.yaml b/nuclei-templates/cve-less/plugins/add-hierarchy-parent-to-post-d831e3189dd50ede75f49828d65ef488.yaml new file mode 100644 index 0000000000..ea1980c220 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-hierarchy-parent-to-post-d831e3189dd50ede75f49828d65ef488.yaml @@ -0,0 +1,58 @@ +id: add-hierarchy-parent-to-post-d831e3189dd50ede75f49828d65ef488 + +info: + name: > + Add Hierarchy (parent) to post <= 3.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dd1706c-fb3b-4a5d-947a-435954eb0b15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-hierarchy-parent-to-post/" + google-query: inurl:"/wp-content/plugins/add-hierarchy-parent-to-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-hierarchy-parent-to-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-hierarchy-parent-to-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-hierarchy-parent-to-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-instagram-446660b2783c8caadc3d9d08f86fa99d.yaml b/nuclei-templates/cve-less/plugins/add-instagram-446660b2783c8caadc3d9d08f86fa99d.yaml new file mode 100644 index 0000000000..2749c7444c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-instagram-446660b2783c8caadc3d9d08f86fa99d.yaml @@ -0,0 +1,58 @@ +id: add-instagram-446660b2783c8caadc3d9d08f86fa99d + +info: + name: > + Image Social Feed Plugin <= 1.7.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcaa19b0-2d55-4a0c-98e7-9a38488dd922?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-instagram/" + google-query: inurl:"/wp-content/plugins/add-instagram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-instagram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-instagram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-instagram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-link-to-facebook-3bc3a29ed4f22f4e728217981dd51f12.yaml b/nuclei-templates/cve-less/plugins/add-link-to-facebook-3bc3a29ed4f22f4e728217981dd51f12.yaml new file mode 100644 index 0000000000..848169b5f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-link-to-facebook-3bc3a29ed4f22f4e728217981dd51f12.yaml @@ -0,0 +1,58 @@ +id: add-link-to-facebook-3bc3a29ed4f22f4e728217981dd51f12 + +info: + name: > + Add Link to Facebook <= 2.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f32c66b3-b26c-4fe3-9171-ca8780391a2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-link-to-facebook/" + google-query: inurl:"/wp-content/plugins/add-link-to-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-link-to-facebook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-link-to-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-link-to-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-link-to-facebook-8ffb6f085ca0e1f89a621d273438f0fc.yaml b/nuclei-templates/cve-less/plugins/add-link-to-facebook-8ffb6f085ca0e1f89a621d273438f0fc.yaml new file mode 100644 index 0000000000..fd9ab21dc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-link-to-facebook-8ffb6f085ca0e1f89a621d273438f0fc.yaml @@ -0,0 +1,58 @@ +id: add-link-to-facebook-8ffb6f085ca0e1f89a621d273438f0fc + +info: + name: > + Add Link to Facebook <= 1.215 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a60d8102-1f15-4e61-b715-81e2111651a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-link-to-facebook/" + google-query: inurl:"/wp-content/plugins/add-link-to-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-link-to-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-link-to-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-link-to-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.216') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-link-to-facebook-c58905f34c05ba2fa6edde7c71c05f27.yaml b/nuclei-templates/cve-less/plugins/add-link-to-facebook-c58905f34c05ba2fa6edde7c71c05f27.yaml new file mode 100644 index 0000000000..340abc524c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-link-to-facebook-c58905f34c05ba2fa6edde7c71c05f27.yaml @@ -0,0 +1,58 @@ +id: add-link-to-facebook-c58905f34c05ba2fa6edde7c71c05f27 + +info: + name: > + Add Link to Facebook < 2.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd3a2aaa-f911-43ec-9d49-2c04f74e5e8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-link-to-facebook/" + google-query: inurl:"/wp-content/plugins/add-link-to-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-link-to-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-link-to-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-link-to-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-local-avatar-fd5d00c088aafb595097efbcaff18f66.yaml b/nuclei-templates/cve-less/plugins/add-local-avatar-fd5d00c088aafb595097efbcaff18f66.yaml new file mode 100644 index 0000000000..6389fc08c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-local-avatar-fd5d00c088aafb595097efbcaff18f66.yaml @@ -0,0 +1,58 @@ +id: add-local-avatar-fd5d00c088aafb595097efbcaff18f66 + +info: + name: > + Add Local Avatar <= 12.1 - Cross-Site Request Forgery via manage_avatar_cache + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/241da621-b892-4263-8409-a40ac5a1ade3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-local-avatar/" + google-query: inurl:"/wp-content/plugins/add-local-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-local-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-local-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-local-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-multiple-marker-5c12b38e55523c2abb1229db17d7b69c.yaml b/nuclei-templates/cve-less/plugins/add-multiple-marker-5c12b38e55523c2abb1229db17d7b69c.yaml new file mode 100644 index 0000000000..2774f1eb28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-multiple-marker-5c12b38e55523c2abb1229db17d7b69c.yaml @@ -0,0 +1,58 @@ +id: add-multiple-marker-5c12b38e55523c2abb1229db17d7b69c + +info: + name: > + Add Multiple Marker <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50932c88-994d-4904-b075-e48d2cb5bc24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-multiple-marker/" + google-query: inurl:"/wp-content/plugins/add-multiple-marker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-multiple-marker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-multiple-marker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-multiple-marker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-multiple-marker-93ed6654d55bf39f7e0ea24a9224f858.yaml b/nuclei-templates/cve-less/plugins/add-multiple-marker-93ed6654d55bf39f7e0ea24a9224f858.yaml new file mode 100644 index 0000000000..8519c28be4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-multiple-marker-93ed6654d55bf39f7e0ea24a9224f858.yaml @@ -0,0 +1,58 @@ +id: add-multiple-marker-93ed6654d55bf39f7e0ea24a9224f858 + +info: + name: > + Add Multiple Marker <= 1.2 - Missing Authorization Checks to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54cccd61-35d0-432c-8832-28e7928c464d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-multiple-marker/" + google-query: inurl:"/wp-content/plugins/add-multiple-marker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-multiple-marker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-multiple-marker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-multiple-marker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-pinterest-conversion-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/add-pinterest-conversion-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..09aad6c310 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-pinterest-conversion-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: add-pinterest-conversion-tags-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-pinterest-conversion-tags/" + google-query: inurl:"/wp-content/plugins/add-pinterest-conversion-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-pinterest-conversion-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-pinterest-conversion-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-pinterest-conversion-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-pinterest-conversion-tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/add-pinterest-conversion-tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..9e96f29fd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-pinterest-conversion-tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: add-pinterest-conversion-tags-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-pinterest-conversion-tags/" + google-query: inurl:"/wp-content/plugins/add-pinterest-conversion-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-pinterest-conversion-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-pinterest-conversion-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-pinterest-conversion-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-posts-to-pages-64cea71514683366dc6b4c2ffb6a6e72.yaml b/nuclei-templates/cve-less/plugins/add-posts-to-pages-64cea71514683366dc6b4c2ffb6a6e72.yaml new file mode 100644 index 0000000000..4ae0550f84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-posts-to-pages-64cea71514683366dc6b4c2ffb6a6e72.yaml @@ -0,0 +1,58 @@ +id: add-posts-to-pages-64cea71514683366dc6b4c2ffb6a6e72 + +info: + name: > + Add Posts to Pages <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/139b081d-17b1-4e1f-9d22-cf3f9de123f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-posts-to-pages/" + google-query: inurl:"/wp-content/plugins/add-posts-to-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-posts-to-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-posts-to-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-posts-to-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-search-to-menu-0f70db17156622f62eb6b0301d900f5d.yaml b/nuclei-templates/cve-less/plugins/add-search-to-menu-0f70db17156622f62eb6b0301d900f5d.yaml new file mode 100644 index 0000000000..7fbc79f4fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-search-to-menu-0f70db17156622f62eb6b0301d900f5d.yaml @@ -0,0 +1,58 @@ +id: add-search-to-menu-0f70db17156622f62eb6b0301d900f5d + +info: + name: > + Ivory Search <= 5.4 - Multiple Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/736cb9a4-bd43-4aaa-a918-d15ca3ff4dbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-search-to-menu/" + google-query: inurl:"/wp-content/plugins/add-search-to-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-search-to-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-search-to-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-search-to-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-search-to-menu-340c0c43c74f3a05736fcc7f14255c5c.yaml b/nuclei-templates/cve-less/plugins/add-search-to-menu-340c0c43c74f3a05736fcc7f14255c5c.yaml new file mode 100644 index 0000000000..0211d91b2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-search-to-menu-340c0c43c74f3a05736fcc7f14255c5c.yaml @@ -0,0 +1,58 @@ +id: add-search-to-menu-340c0c43c74f3a05736fcc7f14255c5c + +info: + name: > + Ivory Search – WordPress Search Plugin <= 4.5.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6da0a85d-0c6f-40ae-8a3d-85222f0e7cc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-search-to-menu/" + google-query: inurl:"/wp-content/plugins/add-search-to-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-search-to-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-search-to-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-search-to-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-search-to-menu-57689f801f3390e9106eb400e17d855b.yaml b/nuclei-templates/cve-less/plugins/add-search-to-menu-57689f801f3390e9106eb400e17d855b.yaml new file mode 100644 index 0000000000..ab7ff4eea0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-search-to-menu-57689f801f3390e9106eb400e17d855b.yaml @@ -0,0 +1,58 @@ +id: add-search-to-menu-57689f801f3390e9106eb400e17d855b + +info: + name: > + Ivory Search <= 4.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35b9f37c-69e1-437a-97dd-3d3e7a8cd86e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-search-to-menu/" + google-query: inurl:"/wp-content/plugins/add-search-to-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-search-to-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-search-to-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-search-to-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-search-to-menu-57c77fb954904b0b546e721dabd7febb.yaml b/nuclei-templates/cve-less/plugins/add-search-to-menu-57c77fb954904b0b546e721dabd7febb.yaml new file mode 100644 index 0000000000..7e9b7f21e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-search-to-menu-57c77fb954904b0b546e721dabd7febb.yaml @@ -0,0 +1,58 @@ +id: add-search-to-menu-57c77fb954904b0b546e721dabd7febb + +info: + name: > + Ivory Search <= 4.6 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9e3f310-5a5e-4ca8-806d-9a7aacfaf5ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-search-to-menu/" + google-query: inurl:"/wp-content/plugins/add-search-to-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-search-to-menu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-search-to-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-search-to-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-search-to-menu-ab5a0a3bb4872aa99cbafa75e82578af.yaml b/nuclei-templates/cve-less/plugins/add-search-to-menu-ab5a0a3bb4872aa99cbafa75e82578af.yaml new file mode 100644 index 0000000000..e59462090e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-search-to-menu-ab5a0a3bb4872aa99cbafa75e82578af.yaml @@ -0,0 +1,58 @@ +id: add-search-to-menu-ab5a0a3bb4872aa99cbafa75e82578af + +info: + name: > + Ivory Search <= 4.6.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2268be8-f9b8-4028-b681-7793b2bd43f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-search-to-menu/" + google-query: inurl:"/wp-content/plugins/add-search-to-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-search-to-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-search-to-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-search-to-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-search-to-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/add-search-to-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c01c4e7269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-search-to-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: add-search-to-menu-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-search-to-menu/" + google-query: inurl:"/wp-content/plugins/add-search-to-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-search-to-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-search-to-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-search-to-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-search-to-menu-d407a9e1907a7ef46afd85eee39e3c29.yaml b/nuclei-templates/cve-less/plugins/add-search-to-menu-d407a9e1907a7ef46afd85eee39e3c29.yaml new file mode 100644 index 0000000000..15dfc02780 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-search-to-menu-d407a9e1907a7ef46afd85eee39e3c29.yaml @@ -0,0 +1,58 @@ +id: add-search-to-menu-d407a9e1907a7ef46afd85eee39e3c29 + +info: + name: > + Ivory Search <= 5.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1513296-f7f6-468c-ac96-5f55812d943e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-search-to-menu/" + google-query: inurl:"/wp-content/plugins/add-search-to-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-search-to-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-search-to-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-search-to-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-search-to-menu-f9cdd85e870155975fbf07ebd6c11543.yaml b/nuclei-templates/cve-less/plugins/add-search-to-menu-f9cdd85e870155975fbf07ebd6c11543.yaml new file mode 100644 index 0000000000..39f8332e41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-search-to-menu-f9cdd85e870155975fbf07ebd6c11543.yaml @@ -0,0 +1,58 @@ +id: add-search-to-menu-f9cdd85e870155975fbf07ebd6c11543 + +info: + name: > + Ivory Search – WordPress Search Plugin <= 5.5.5 - Missing Authorization to Authenticated (Subscriber+) Index Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc9935d8-7790-457b-88bf-bee5e13b0f5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-search-to-menu/" + google-query: inurl:"/wp-content/plugins/add-search-to-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-search-to-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-search-to-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-search-to-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-social-share-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/add-social-share-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..62056b7f47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-social-share-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: add-social-share-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-social-share/" + google-query: inurl:"/wp-content/plugins/add-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-social-share,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-social-share-buttons-b831673e867a40d3a440f96a21bff239.yaml b/nuclei-templates/cve-less/plugins/add-social-share-buttons-b831673e867a40d3a440f96a21bff239.yaml new file mode 100644 index 0000000000..0d2649fdeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-social-share-buttons-b831673e867a40d3a440f96a21bff239.yaml @@ -0,0 +1,58 @@ +id: add-social-share-buttons-b831673e867a40d3a440f96a21bff239 + +info: + name: > + Add Social Share Buttons for Whatsapp and Viber < 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f596af2-ff83-4c67-a8f0-e4df4a0adbd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-social-share-buttons/" + google-query: inurl:"/wp-content/plugins/add-social-share-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-social-share-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-social-share-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-social-share-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-subtitle-e650ec648b3137d2000a4e41f6b87363.yaml b/nuclei-templates/cve-less/plugins/add-subtitle-e650ec648b3137d2000a4e41f6b87363.yaml new file mode 100644 index 0000000000..295c8a9f99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-subtitle-e650ec648b3137d2000a4e41f6b87363.yaml @@ -0,0 +1,58 @@ +id: add-subtitle-e650ec648b3137d2000a4e41f6b87363 + +info: + name: > + Add Subtitle <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71da4bd0-79d7-42ec-9e79-3a44411c2313?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-subtitle/" + google-query: inurl:"/wp-content/plugins/add-subtitle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-subtitle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-subtitle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-subtitle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-svg-support-for-media-uploader-inventivo-71268622d169b66d5da459dba61f1b1c.yaml b/nuclei-templates/cve-less/plugins/add-svg-support-for-media-uploader-inventivo-71268622d169b66d5da459dba61f1b1c.yaml new file mode 100644 index 0000000000..e8a5eaf7a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-svg-support-for-media-uploader-inventivo-71268622d169b66d5da459dba61f1b1c.yaml @@ -0,0 +1,58 @@ +id: add-svg-support-for-media-uploader-inventivo-71268622d169b66d5da459dba61f1b1c + +info: + name: > + Add SVG Support for Media Uploader | inventivo <= 1.0.5 - Authenticated (Author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca2d1d4-fcf8-4943-b9c5-9560968ae2d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-svg-support-for-media-uploader-inventivo/" + google-query: inurl:"/wp-content/plugins/add-svg-support-for-media-uploader-inventivo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-svg-support-for-media-uploader-inventivo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-svg-support-for-media-uploader-inventivo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-svg-support-for-media-uploader-inventivo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-tabs-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/add-tabs-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..c3e1a9f5b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-tabs-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: add-tabs-xforwc-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-tabs-xforwc/" + google-query: inurl:"/wp-content/plugins/add-tabs-xforwc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-tabs-xforwc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-tabs-xforwc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-tabs-xforwc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-tiktok-advertising-pixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/add-tiktok-advertising-pixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4a45700961 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-tiktok-advertising-pixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: add-tiktok-advertising-pixel-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-tiktok-advertising-pixel/" + google-query: inurl:"/wp-content/plugins/add-tiktok-advertising-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-tiktok-advertising-pixel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-tiktok-advertising-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-tiktok-advertising-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-to-any-3ade8e2913488ed45de5178c94ddcdcc.yaml b/nuclei-templates/cve-less/plugins/add-to-any-3ade8e2913488ed45de5178c94ddcdcc.yaml new file mode 100644 index 0000000000..1330e1c80f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-to-any-3ade8e2913488ed45de5178c94ddcdcc.yaml @@ -0,0 +1,58 @@ +id: add-to-any-3ade8e2913488ed45de5178c94ddcdcc + +info: + name: > + AddToAny Share Buttons <= 1.7.14 - HTTP Host Header Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cc86970-7e63-47d0-9971-ddd0fc992a5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-to-any/" + google-query: inurl:"/wp-content/plugins/add-to-any/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-to-any,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-to-any/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-to-any" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-to-any-6b33e64acf4e555f0136d2c33ebedb80.yaml b/nuclei-templates/cve-less/plugins/add-to-any-6b33e64acf4e555f0136d2c33ebedb80.yaml new file mode 100644 index 0000000000..7306bf3867 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-to-any-6b33e64acf4e555f0136d2c33ebedb80.yaml @@ -0,0 +1,58 @@ +id: add-to-any-6b33e64acf4e555f0136d2c33ebedb80 + +info: + name: > + AddToAny Share Buttons <= 1.7.45 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/791ae60d-f2b7-4a53-9008-35cd2d465124?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-to-any/" + google-query: inurl:"/wp-content/plugins/add-to-any/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-to-any,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-to-any/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-to-any" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-to-any-ae230608473cfc56a303443ba2385f1d.yaml b/nuclei-templates/cve-less/plugins/add-to-any-ae230608473cfc56a303443ba2385f1d.yaml new file mode 100644 index 0000000000..4604f899c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-to-any-ae230608473cfc56a303443ba2385f1d.yaml @@ -0,0 +1,58 @@ +id: add-to-any-ae230608473cfc56a303443ba2385f1d + +info: + name: > + AddToAny Share Buttons <= 1.7.47 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8df4f144-0bf3-457f-8014-f603f7179044?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-to-any/" + google-query: inurl:"/wp-content/plugins/add-to-any/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-to-any,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-to-any/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-to-any" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-to-calendar-button-2e36e1fd5443dd09871a6501069bddbb.yaml b/nuclei-templates/cve-less/plugins/add-to-calendar-button-2e36e1fd5443dd09871a6501069bddbb.yaml new file mode 100644 index 0000000000..3126152c50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-to-calendar-button-2e36e1fd5443dd09871a6501069bddbb.yaml @@ -0,0 +1,58 @@ +id: add-to-calendar-button-2e36e1fd5443dd09871a6501069bddbb + +info: + name: > + Add to Calendar Button <= 1.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60ba7f68-1fe1-4349-a3eb-11a63ae11e38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-to-calendar-button/" + google-query: inurl:"/wp-content/plugins/add-to-calendar-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-to-calendar-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-to-calendar-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-to-calendar-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-to-cart-direct-checkout-for-woocommerce-1f532de1970706b80de4de5a54d3380e.yaml b/nuclei-templates/cve-less/plugins/add-to-cart-direct-checkout-for-woocommerce-1f532de1970706b80de4de5a54d3380e.yaml new file mode 100644 index 0000000000..45d3ffa3ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-to-cart-direct-checkout-for-woocommerce-1f532de1970706b80de4de5a54d3380e.yaml @@ -0,0 +1,58 @@ +id: add-to-cart-direct-checkout-for-woocommerce-1f532de1970706b80de4de5a54d3380e + +info: + name: > + Direct checkout, Add to cart redirect for Woocommerce <= 2.1.48 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc218fb-6c2a-4676-b2d7-86abe01c1530?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-to-cart-direct-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/add-to-cart-direct-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-to-cart-direct-checkout-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-to-cart-direct-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-to-cart-direct-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-to-feedly-9327431607715dc8ad5049b0a62ebe4f.yaml b/nuclei-templates/cve-less/plugins/add-to-feedly-9327431607715dc8ad5049b0a62ebe4f.yaml new file mode 100644 index 0000000000..cdd0453c38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-to-feedly-9327431607715dc8ad5049b0a62ebe4f.yaml @@ -0,0 +1,58 @@ +id: add-to-feedly-9327431607715dc8ad5049b0a62ebe4f + +info: + name: > + Add to Feedly <= 1.2.11 - Authenticated(Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1496ce98-ee19-4f37-9ec7-eb0fafb5df19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-to-feedly/" + google-query: inurl:"/wp-content/plugins/add-to-feedly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-to-feedly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-to-feedly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-to-feedly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-to-home-screen-wp-0eddba28d26b374b7f8490ca46c51c29.yaml b/nuclei-templates/cve-less/plugins/add-to-home-screen-wp-0eddba28d26b374b7f8490ca46c51c29.yaml new file mode 100644 index 0000000000..c24d60d622 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-to-home-screen-wp-0eddba28d26b374b7f8490ca46c51c29.yaml @@ -0,0 +1,58 @@ +id: add-to-home-screen-wp-0eddba28d26b374b7f8490ca46c51c29 + +info: + name: > + Add to home screen WP Plugin <= 2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/145fec62-87a7-4641-9ce4-dca5afb47d69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-to-home-screen-wp/" + google-query: inurl:"/wp-content/plugins/add-to-home-screen-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-to-home-screen-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-to-home-screen-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-to-home-screen-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-twitter-pixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/add-twitter-pixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..aaf26f195e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-twitter-pixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: add-twitter-pixel-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-twitter-pixel/" + google-query: inurl:"/wp-content/plugins/add-twitter-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-twitter-pixel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-twitter-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-twitter-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-user-role-473bd673aad6ebbb1666b1cd91242034.yaml b/nuclei-templates/cve-less/plugins/add-user-role-473bd673aad6ebbb1666b1cd91242034.yaml new file mode 100644 index 0000000000..abd19ac3ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-user-role-473bd673aad6ebbb1666b1cd91242034.yaml @@ -0,0 +1,58 @@ +id: add-user-role-473bd673aad6ebbb1666b1cd91242034 + +info: + name: > + Add User Role <= 0.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e15ca55b-b8e4-4f65-87a4-e13209cfea78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-user-role/" + google-query: inurl:"/wp-content/plugins/add-user-role/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-user-role,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-user-role/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-user-role" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add-widgets-to-page-7c19600be6bfdb748bd3e60c37bbe32a.yaml b/nuclei-templates/cve-less/plugins/add-widgets-to-page-7c19600be6bfdb748bd3e60c37bbe32a.yaml new file mode 100644 index 0000000000..3476d09291 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add-widgets-to-page-7c19600be6bfdb748bd3e60c37bbe32a.yaml @@ -0,0 +1,58 @@ +id: add-widgets-to-page-7c19600be6bfdb748bd3e60c37bbe32a + +info: + name: > + Add Widgets to Page <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6af20a2c-065c-48d5-a95c-2883ceeb50c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add-widgets-to-page/" + google-query: inurl:"/wp-content/plugins/add-widgets-to-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add-widgets-to-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add-widgets-to-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add-widgets-to-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/add2fav-d039001c0af8cb5076be473a89522a72.yaml b/nuclei-templates/cve-less/plugins/add2fav-d039001c0af8cb5076be473a89522a72.yaml new file mode 100644 index 0000000000..a8d8735241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/add2fav-d039001c0af8cb5076be473a89522a72.yaml @@ -0,0 +1,58 @@ +id: add2fav-d039001c0af8cb5076be473a89522a72 + +info: + name: > + add2fav <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7691152e-f962-4d82-b877-df1345b703cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/add2fav/" + google-query: inurl:"/wp-content/plugins/add2fav/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,add2fav,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/add2fav/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "add2fav" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addblockblocker-1e7ddc6e347b7dc14fdbf28e9726a2fd.yaml b/nuclei-templates/cve-less/plugins/addblockblocker-1e7ddc6e347b7dc14fdbf28e9726a2fd.yaml new file mode 100644 index 0000000000..780fa4e4e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addblockblocker-1e7ddc6e347b7dc14fdbf28e9726a2fd.yaml @@ -0,0 +1,58 @@ +id: addblockblocker-1e7ddc6e347b7dc14fdbf28e9726a2fd + +info: + name: > + Adblocker Blocker <= 0.0.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0302a75-217f-4be9-876e-10ede3e3c20d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addblockblocker/" + google-query: inurl:"/wp-content/plugins/addblockblocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addblockblocker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addblockblocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addblockblocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addendio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/addendio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..a510234b96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addendio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: addendio-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addendio/" + google-query: inurl:"/wp-content/plugins/addendio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addendio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addendio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addendio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addfreestats-a3cdd5fc08475bf0155bcdf233d6ccac.yaml b/nuclei-templates/cve-less/plugins/addfreestats-a3cdd5fc08475bf0155bcdf233d6ccac.yaml new file mode 100644 index 0000000000..401679b07f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addfreestats-a3cdd5fc08475bf0155bcdf233d6ccac.yaml @@ -0,0 +1,58 @@ +id: addfreestats-a3cdd5fc08475bf0155bcdf233d6ccac + +info: + name: > + AFS Analytics <= 4.15 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16c70597-32a0-4771-877b-c57cf7550ee7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addfreestats/" + google-query: inurl:"/wp-content/plugins/addfreestats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addfreestats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addfreestats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addfreestats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-abandoned-cart-recovery-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-abandoned-cart-recovery-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..ba21df2f04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-abandoned-cart-recovery-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-abandoned-cart-recovery-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-abandoned-cart-recovery/" + google-query: inurl:"/wp-content/plugins/addify-abandoned-cart-recovery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-abandoned-cart-recovery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-abandoned-cart-recovery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-abandoned-cart-recovery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-checkout-fields-manager-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-checkout-fields-manager-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..24d67107d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-checkout-fields-manager-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-checkout-fields-manager-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-checkout-fields-manager/" + google-query: inurl:"/wp-content/plugins/addify-checkout-fields-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-checkout-fields-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-checkout-fields-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-checkout-fields-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-custom-fields-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-custom-fields-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..eb06ab9d57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-custom-fields-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-custom-fields-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-custom-fields-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/addify-custom-fields-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-custom-fields-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-custom-fields-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-custom-fields-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-custom-order-number-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-custom-order-number-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..38f0e78a38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-custom-order-number-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-custom-order-number-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-custom-order-number/" + google-query: inurl:"/wp-content/plugins/addify-custom-order-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-custom-order-number,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-custom-order-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-custom-order-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-custom-registration-forms-builder-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-custom-registration-forms-builder-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..973c71569c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-custom-registration-forms-builder-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-custom-registration-forms-builder-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-custom-registration-forms-builder/" + google-query: inurl:"/wp-content/plugins/addify-custom-registration-forms-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-custom-registration-forms-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-custom-registration-forms-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-custom-registration-forms-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-free-gifts-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-free-gifts-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..211d7576fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-free-gifts-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-free-gifts-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-free-gifts-woocommerce/" + google-query: inurl:"/wp-content/plugins/addify-free-gifts-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-free-gifts-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-free-gifts-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-free-gifts-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-gift-registry-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-gift-registry-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..e58f16d4df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-gift-registry-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-gift-registry-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-gift-registry-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/addify-gift-registry-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-gift-registry-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-gift-registry-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-gift-registry-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-image-watermark-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-image-watermark-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..27a19dca91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-image-watermark-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-image-watermark-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-image-watermark-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/addify-image-watermark-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-image-watermark-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-image-watermark-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-image-watermark-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-order-approval-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-order-approval-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..4113837a91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-order-approval-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-order-approval-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-order-approval-woocommerce/" + google-query: inurl:"/wp-content/plugins/addify-order-approval-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-order-approval-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-order-approval-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-order-approval-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-order-tracking-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-order-tracking-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..9824619af4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-order-tracking-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-order-tracking-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-order-tracking-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/addify-order-tracking-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-order-tracking-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-order-tracking-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-order-tracking-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-price-calculator-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-price-calculator-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..372fb475d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-price-calculator-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-price-calculator-for-woocommerce-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-price-calculator-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/addify-price-calculator-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-price-calculator-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-price-calculator-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-price-calculator-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-product-dynamic-pricing-and-discounts-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-product-dynamic-pricing-and-discounts-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..c3b8ab439b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-product-dynamic-pricing-and-discounts-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-product-dynamic-pricing-and-discounts-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-product-dynamic-pricing-and-discounts/" + google-query: inurl:"/wp-content/plugins/addify-product-dynamic-pricing-and-discounts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-product-dynamic-pricing-and-discounts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-product-dynamic-pricing-and-discounts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-product-dynamic-pricing-and-discounts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-product-labels-and-stickers-7f2753bfc2a0c6bb0434db7d475ab03d.yaml b/nuclei-templates/cve-less/plugins/addify-product-labels-and-stickers-7f2753bfc2a0c6bb0434db7d475ab03d.yaml new file mode 100644 index 0000000000..e9f1c56bcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-product-labels-and-stickers-7f2753bfc2a0c6bb0434db7d475ab03d.yaml @@ -0,0 +1,58 @@ +id: addify-product-labels-and-stickers-7f2753bfc2a0c6bb0434db7d475ab03d + +info: + name: > + Multiple Addify Plugins <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8065d25-2ded-4021-a53d-204242db0915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-product-labels-and-stickers/" + google-query: inurl:"/wp-content/plugins/addify-product-labels-and-stickers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-product-labels-and-stickers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-product-labels-and-stickers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-product-labels-and-stickers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addify-product-stock-manager-8e787a46ad14cecfaea14ee098f61614.yaml b/nuclei-templates/cve-less/plugins/addify-product-stock-manager-8e787a46ad14cecfaea14ee098f61614.yaml new file mode 100644 index 0000000000..9b2df9a5d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addify-product-stock-manager-8e787a46ad14cecfaea14ee098f61614.yaml @@ -0,0 +1,58 @@ +id: addify-product-stock-manager-8e787a46ad14cecfaea14ee098f61614 + +info: + name: > + Product Stock Manager < 1.0.5 - Missing Authorization and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37ca7081-df1f-4f2e-bb52-7cb87f74fb5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addify-product-stock-manager/" + google-query: inurl:"/wp-content/plugins/addify-product-stock-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addify-product-stock-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addify-product-stock-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addify-product-stock-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/additional-order-filters-for-woocommerce-cd60ae6d86175a2b0663a7f4bb146125.yaml b/nuclei-templates/cve-less/plugins/additional-order-filters-for-woocommerce-cd60ae6d86175a2b0663a7f4bb146125.yaml new file mode 100644 index 0000000000..cd882ec615 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/additional-order-filters-for-woocommerce-cd60ae6d86175a2b0663a7f4bb146125.yaml @@ -0,0 +1,58 @@ +id: additional-order-filters-for-woocommerce-cd60ae6d86175a2b0663a7f4bb146125 + +info: + name: > + Additional Order Filters for WooCommerce <= 1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baa8b5ce-7ef8-4ca8-9957-2c3469f55dda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/additional-order-filters-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/additional-order-filters-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,additional-order-filters-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/additional-order-filters-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "additional-order-filters-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/additional-product-fields-for-woocommerce-f25ce468da2d85a66509b9e029e6fac8.yaml b/nuclei-templates/cve-less/plugins/additional-product-fields-for-woocommerce-f25ce468da2d85a66509b9e029e6fac8.yaml new file mode 100644 index 0000000000..5dc40698b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/additional-product-fields-for-woocommerce-f25ce468da2d85a66509b9e029e6fac8.yaml @@ -0,0 +1,58 @@ +id: additional-product-fields-for-woocommerce-f25ce468da2d85a66509b9e029e6fac8 + +info: + name: > + Extra Product Options Builder for WooCommerce <= 1.2.104 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7c05856-fbee-498d-9e9f-f0a232df6d24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/additional-product-fields-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/additional-product-fields-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,additional-product-fields-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/additional-product-fields-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "additional-product-fields-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.104') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-0ef3f8bd25033cd91b4d106c69c8559b.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-0ef3f8bd25033cd91b4d106c69c8559b.yaml new file mode 100644 index 0000000000..182141acfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-0ef3f8bd25033cd91b4d106c69c8559b.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-0ef3f8bd25033cd91b4d106c69c8559b + +info: + name: > + Elementor Addon Elements <= 1.12.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/472cdbc4-3bfa-4254-b35a-be7ae10782e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-0fb47ccc27ee413d414cd8b0ba979166.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-0fb47ccc27ee413d414cd8b0ba979166.yaml new file mode 100644 index 0000000000..6d75997bdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-0fb47ccc27ee413d414cd8b0ba979166.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-0fb47ccc27ee413d414cd8b0ba979166 + +info: + name: > + Elementor Addon Elements <= 1.12.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ebb5654-ba3e-4f18-8720-a6595a771964?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.12.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-19c52dd7e875a0e50693de27a767788f.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-19c52dd7e875a0e50693de27a767788f.yaml new file mode 100644 index 0000000000..102a17f8b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-19c52dd7e875a0e50693de27a767788f.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-19c52dd7e875a0e50693de27a767788f + +info: + name: > + Elementor Addon Elements <= 1.12.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cb6639d-06ba-4bad-af73-d387a7e3f6b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-214593575ac1d3e95584c0521e8c5928.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-214593575ac1d3e95584c0521e8c5928.yaml new file mode 100644 index 0000000000..3c08838c6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-214593575ac1d3e95584c0521e8c5928.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-214593575ac1d3e95584c0521e8c5928 + +info: + name: > + Elementor Addon Elements <= 1.13.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18e2e0e5-495f-4f55-b7d8-94193fc2ad12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-3546c72d408f5a6ead5d764bba6d4ef6.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-3546c72d408f5a6ead5d764bba6d4ef6.yaml new file mode 100644 index 0000000000..93bf48059d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-3546c72d408f5a6ead5d764bba6d4ef6.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-3546c72d408f5a6ead5d764bba6d4ef6 + +info: + name: > + Elementor Addon Elements <= 1.12.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Content Switcher Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb0888d6-30e6-4957-b270-1968eace462e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-54120e3f5fb914e9169ba2eee6152b5b.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-54120e3f5fb914e9169ba2eee6152b5b.yaml new file mode 100644 index 0000000000..90be7639af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-54120e3f5fb914e9169ba2eee6152b5b.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-54120e3f5fb914e9169ba2eee6152b5b + +info: + name: > + Elementor Addon Elements <= 1.12.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Thumbnail Slider Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/977bab12-969d-4b15-9942-2b17c8541f61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-5934e1315f8774ec64137d0af59055a1.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-5934e1315f8774ec64137d0af59055a1.yaml new file mode 100644 index 0000000000..bb3959d11a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-5934e1315f8774ec64137d0af59055a1.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-5934e1315f8774ec64137d0af59055a1 + +info: + name: > + Elementor Addon Elements <= 1.6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0297cab-8b6f-4e09-b552-4772c6f72c04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-68cc06979ff8bb95723bb04a557ffaae.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-68cc06979ff8bb95723bb04a557ffaae.yaml new file mode 100644 index 0000000000..b42530d733 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-68cc06979ff8bb95723bb04a557ffaae.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-68cc06979ff8bb95723bb04a557ffaae + +info: + name: > + Elementor Addon Elements <= 1.12.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Dual Button Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33d7dc4d-bb41-456a-bd1a-37d8f2aada30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-8305b529a6785da6470d8457740ff920.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-8305b529a6785da6470d8457740ff920.yaml new file mode 100644 index 0000000000..5a520bf764 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-8305b529a6785da6470d8457740ff920.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-8305b529a6785da6470d8457740ff920 + +info: + name: > + Elementor Addon Elements <= 1.13.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abe3cedb-53f3-48ff-a731-df6a83f0da1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-9260b43e6ac9e5101461f0e5b3ca5c55.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-9260b43e6ac9e5101461f0e5b3ca5c55.yaml new file mode 100644 index 0000000000..5c647e4a59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-9260b43e6ac9e5101461f0e5b3ca5c55.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-9260b43e6ac9e5101461f0e5b3ca5c55 + +info: + name: > + Elementor Addon Elements <= 1.12.12 - Authenticated(Contributor+) Stored Cross-Site Scripting via Modal Popup effet + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ba28184-b5c3-4a5c-a376-29b3c6a2aa20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-966b2e78a79b5d63896247b963e8d55a.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-966b2e78a79b5d63896247b963e8d55a.yaml new file mode 100644 index 0000000000..be6596f04f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-966b2e78a79b5d63896247b963e8d55a.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-966b2e78a79b5d63896247b963e8d55a + +info: + name: > + Elementor Addon Elements <= 1.13.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f36fea15-0475-45ee-b913-790db6373aef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-974e69c005824474ea421d11c0a2e8fa.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-974e69c005824474ea421d11c0a2e8fa.yaml new file mode 100644 index 0000000000..afaddeb8d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-974e69c005824474ea421d11c0a2e8fa.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-974e69c005824474ea421d11c0a2e8fa + +info: + name: > + Elementor Addon Elements <= 1.12.12 - Directory Traversal to Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20cd3fff-0488-4bc2-961b-2427925e6a96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-b1bb95f8c4ff39f12ce42050633fe6ba.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-b1bb95f8c4ff39f12ce42050633fe6ba.yaml new file mode 100644 index 0000000000..bff0960bf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-b1bb95f8c4ff39f12ce42050633fe6ba.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-b1bb95f8c4ff39f12ce42050633fe6ba + +info: + name: > + Elementor Addon Elements <= 1.12.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd2bc2e7-960e-40db-9dcc-a6a60117bd83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..30441f5b6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-c1b63cc136f48f5f3766e7772bec95ad.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-c1b63cc136f48f5f3766e7772bec95ad.yaml new file mode 100644 index 0000000000..0396eef810 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-c1b63cc136f48f5f3766e7772bec95ad.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-c1b63cc136f48f5f3766e7772bec95ad + +info: + name: > + Elementor Addon Elements <= 1.11.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11e97adc-b402-4d82-ae39-4dccbd70bcf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-ce4e21b72cfe20823efba4862db87109.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-ce4e21b72cfe20823efba4862db87109.yaml new file mode 100644 index 0000000000..c13a609662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-ce4e21b72cfe20823efba4862db87109.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-ce4e21b72cfe20823efba4862db87109 + +info: + name: > + Elementor Addon Elements <= 1.12.7 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89489218-263f-4157-a5cd-a12bc6a0dfe6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-ea8fafa1914b33a7541d6d71c9272dbd.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-ea8fafa1914b33a7541d6d71c9272dbd.yaml new file mode 100644 index 0000000000..4942e14303 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-ea8fafa1914b33a7541d6d71c9272dbd.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-ea8fafa1914b33a7541d6d71c9272dbd + +info: + name: > + Elementor Addon Elements <= 1.13.2 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via 'Text Separator' and 'Image Compare' Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcc5a611-23bf-499e-8141-684458d9ce3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-f95a6103756f27e103bcf366ca12c670.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-f95a6103756f27e103bcf366ca12c670.yaml new file mode 100644 index 0000000000..7579280b05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-f95a6103756f27e103bcf366ca12c670.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-f95a6103756f27e103bcf366ca12c670 + +info: + name: > + Elementor Addon Elements <= 1.11.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c6fe986-df68-4a62-9a43-5632c622b5fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-fbb7a174a49a3b47cc8ab51df927085f.yaml b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-fbb7a174a49a3b47cc8ab51df927085f.yaml new file mode 100644 index 0000000000..e0c28e7988 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-elements-for-elementor-page-builder-fbb7a174a49a3b47cc8ab51df927085f.yaml @@ -0,0 +1,58 @@ +id: addon-elements-for-elementor-page-builder-fbb7a174a49a3b47cc8ab51df927085f + +info: + name: > + Elementor Addon Elements <= 1.12.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd53b4e1-c6b7-4111-911a-04b14c7a9c4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-elements-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-elements-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addon-library-1b768170ce1555d79635fdd71ff99339.yaml b/nuclei-templates/cve-less/plugins/addon-library-1b768170ce1555d79635fdd71ff99339.yaml new file mode 100644 index 0000000000..5a2dc3ec02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addon-library-1b768170ce1555d79635fdd71ff99339.yaml @@ -0,0 +1,58 @@ +id: addon-library-1b768170ce1555d79635fdd71ff99339 + +info: + name: > + Addon Library <= 1.3.76 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15cf34d8-256b-495e-9385-a5d526bfb335?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addon-library/" + google-query: inurl:"/wp-content/plugins/addon-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addon-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addon-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addon-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-beaver-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/addons-for-beaver-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6992ac78d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-beaver-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: addons-for-beaver-builder-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/addons-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-beaver-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/addons-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7122d2d874 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: addons-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-divi/" + google-query: inurl:"/wp-content/plugins/addons-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-0a02674a461ee92c9bdab38333dc64d2.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-0a02674a461ee92c9bdab38333dc64d2.yaml new file mode 100644 index 0000000000..3e3f61c1f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-0a02674a461ee92c9bdab38333dc64d2.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-0a02674a461ee92c9bdab38333dc64d2 + +info: + name: > + Elementor Addons by Livemesh <= 8.3.6 - Authenticated(Contributor+) Stored Cross-Site Scripting via widget _id attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52d79cdd-739f-4ae9-9214-bc64ca7d8ecb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-3c3007d2c808c5107195ff3e0b9f940c.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-3c3007d2c808c5107195ff3e0b9f940c.yaml new file mode 100644 index 0000000000..df1ac3dd32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-3c3007d2c808c5107195ff3e0b9f940c.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-3c3007d2c808c5107195ff3e0b9f940c + +info: + name: > + Elementor Addons by Livemesh <= 8.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70bda4b7-e442-4956-b3cb-8df96043bcde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-435e5a4b20bcaf9d0c9ffb3797d6604e.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-435e5a4b20bcaf9d0c9ffb3797d6604e.yaml new file mode 100644 index 0000000000..fb294adac0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-435e5a4b20bcaf9d0c9ffb3797d6604e.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-435e5a4b20bcaf9d0c9ffb3797d6604e + +info: + name: > + Livemesh Addons for Elementor <= 7.2.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1280aec-f253-404e-b03c-d1b8416a6e7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-6b0cd31bdd2edf441adfecb677828dc9.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-6b0cd31bdd2edf441adfecb677828dc9.yaml new file mode 100644 index 0000000000..6da296a2a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-6b0cd31bdd2edf441adfecb677828dc9.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-6b0cd31bdd2edf441adfecb677828dc9 + +info: + name: > + Elementor Addons by Livemesh <= 8.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Posts Multislider Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/604975b9-fe2f-4d8f-af13-995f08d72e8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-7278c1d5f51388c1851434ad959c1788.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-7278c1d5f51388c1851434ad959c1788.yaml new file mode 100644 index 0000000000..b7c1407652 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-7278c1d5f51388c1851434ad959c1788.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-7278c1d5f51388c1851434ad959c1788 + +info: + name: > + Elementor Addons by Livemesh <= 8.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Posts Slider Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce6e40e-b090-447a-9bf9-6337d30e7da3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-a2edba0b6f9194a358b22756bbd79a75.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-a2edba0b6f9194a358b22756bbd79a75.yaml new file mode 100644 index 0000000000..cdba605295 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-a2edba0b6f9194a358b22756bbd79a75.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-a2edba0b6f9194a358b22756bbd79a75 + +info: + name: > + Elementor Addons by Livemesh <= 8.3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Display Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69f2fc37-4c02-48da-b1e8-350ecc8ba086?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3bf12ff25e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-c2bef3c139a7a3ae094de8e562cf6429.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-c2bef3c139a7a3ae094de8e562cf6429.yaml new file mode 100644 index 0000000000..17aa39c1db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-c2bef3c139a7a3ae094de8e562cf6429.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-c2bef3c139a7a3ae094de8e562cf6429 + +info: + name: > + Livemesh Addons for Elementor <= 8.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via animated_text_class + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4397c99c-c37d-43da-9285-003ba91d4003?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-c4f6d0a939cffb23c47ad426a3f0d45f.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-c4f6d0a939cffb23c47ad426a3f0d45f.yaml new file mode 100644 index 0000000000..3cec2f9bce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-c4f6d0a939cffb23c47ad426a3f0d45f.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-c4f6d0a939cffb23c47ad426a3f0d45f + +info: + name: > + Elementor Addons by Livemesh <= 8.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Posts Carousel Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96bdd465-e4ca-4a32-b38a-a2a51598a3a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..58d77c30c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-e5a323ffcfde2fc677ad46470b3d50f7.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-e5a323ffcfde2fc677ad46470b3d50f7.yaml new file mode 100644 index 0000000000..d9666944d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-e5a323ffcfde2fc677ad46470b3d50f7.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-e5a323ffcfde2fc677ad46470b3d50f7 + +info: + name: > + Elementor Addons by Livemesh <= 8.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/058d1aa0-2ef6-49a4-b978-43a91c8e55f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-f08da3e42125c87db99ab45bab5c3734.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-f08da3e42125c87db99ab45bab5c3734.yaml new file mode 100644 index 0000000000..04043c1a95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-f08da3e42125c87db99ab45bab5c3734.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-f08da3e42125c87db99ab45bab5c3734 + +info: + name: > + Livemesh Addons for Elementor <= 6.7.1- Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2340ae3-3b22-4b14-9fce-4b845f2866b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-f7fd1f97dac21964944e06746d183317.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-f7fd1f97dac21964944e06746d183317.yaml new file mode 100644 index 0000000000..30e78e0eb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-f7fd1f97dac21964944e06746d183317.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-f7fd1f97dac21964944e06746d183317 + +info: + name: > + Elementor Addons by Livemesh <= 8.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Animated Text Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e28b78c3-c370-4076-836e-9f61acba064c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-elementor-fc5e0217c3dc9969d4594ab0394109b5.yaml b/nuclei-templates/cve-less/plugins/addons-for-elementor-fc5e0217c3dc9969d4594ab0394109b5.yaml new file mode 100644 index 0000000000..4ca1f5303e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-elementor-fc5e0217c3dc9969d4594ab0394109b5.yaml @@ -0,0 +1,58 @@ +id: addons-for-elementor-fc5e0217c3dc9969d4594ab0394109b5 + +info: + name: > + Elementor Addons by Livemesh <= 8.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Team Members Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d37248-d024-4465-a1e6-d8f2d3a2e02f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-visual-composer-43cb177771740873ed7f858ac79c4db6.yaml b/nuclei-templates/cve-less/plugins/addons-for-visual-composer-43cb177771740873ed7f858ac79c4db6.yaml new file mode 100644 index 0000000000..028d55ed04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-visual-composer-43cb177771740873ed7f858ac79c4db6.yaml @@ -0,0 +1,58 @@ +id: addons-for-visual-composer-43cb177771740873ed7f858ac79c4db6 + +info: + name: > + Livemesh Addons for WPBakery Page Builder <= 3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60af0a7c-014b-4f71-9918-7ddc1186bee4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/addons-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-visual-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-visual-composer-92680d6145a8b866d3fbe1493fdcbbd3.yaml b/nuclei-templates/cve-less/plugins/addons-for-visual-composer-92680d6145a8b866d3fbe1493fdcbbd3.yaml new file mode 100644 index 0000000000..817033dfc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-visual-composer-92680d6145a8b866d3fbe1493fdcbbd3.yaml @@ -0,0 +1,58 @@ +id: addons-for-visual-composer-92680d6145a8b866d3fbe1493fdcbbd3 + +info: + name: > + WPBakery Page Builder Addons by Livemesh <= 3.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c07b5c8-7fae-499d-9f6c-9392166f74b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/addons-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-visual-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-visual-composer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/addons-for-visual-composer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..225d44a6b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-visual-composer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: addons-for-visual-composer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/addons-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-visual-composer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addons-for-visual-composer-eb66f71390c85b359c35c7747a93043f.yaml b/nuclei-templates/cve-less/plugins/addons-for-visual-composer-eb66f71390c85b359c35c7747a93043f.yaml new file mode 100644 index 0000000000..00bc427741 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addons-for-visual-composer-eb66f71390c85b359c35c7747a93043f.yaml @@ -0,0 +1,58 @@ +id: addons-for-visual-composer-eb66f71390c85b359c35c7747a93043f + +info: + name: > + Livemesh Addons for WPBakery Page Builder <= 3.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d581a38-736a-497f-aaf7-6da0b2421618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addons-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/addons-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addons-for-visual-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addons-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addons-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/address-autocomplete-using-google-place-api-60d12634c1b8de8d81af0efb8a90411b.yaml b/nuclei-templates/cve-less/plugins/address-autocomplete-using-google-place-api-60d12634c1b8de8d81af0efb8a90411b.yaml new file mode 100644 index 0000000000..ea32fb71a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/address-autocomplete-using-google-place-api-60d12634c1b8de8d81af0efb8a90411b.yaml @@ -0,0 +1,58 @@ +id: address-autocomplete-using-google-place-api-60d12634c1b8de8d81af0efb8a90411b + +info: + name: > + Address Autocomplete Using Google Place Api <= 1.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6c94024-20fb-4cc1-a093-1b9974e61220?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/address-autocomplete-using-google-place-api/" + google-query: inurl:"/wp-content/plugins/address-autocomplete-using-google-place-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,address-autocomplete-using-google-place-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/address-autocomplete-using-google-place-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "address-autocomplete-using-google-place-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/address-email-and-phone-validation-bc6751aa5110381a68bfe443bb0b5c6b.yaml b/nuclei-templates/cve-less/plugins/address-email-and-phone-validation-bc6751aa5110381a68bfe443bb0b5c6b.yaml new file mode 100644 index 0000000000..2493716966 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/address-email-and-phone-validation-bc6751aa5110381a68bfe443bb0b5c6b.yaml @@ -0,0 +1,58 @@ +id: address-email-and-phone-validation-bc6751aa5110381a68bfe443bb0b5c6b + +info: + name: > + PCA Predict <= 1.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1641758d-a7d7-4677-98a6-cb4a6fea0c63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/address-email-and-phone-validation/" + google-query: inurl:"/wp-content/plugins/address-email-and-phone-validation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,address-email-and-phone-validation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/address-email-and-phone-validation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "address-email-and-phone-validation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addthis-400e484570b51dd745ebe0689024ac48.yaml b/nuclei-templates/cve-less/plugins/addthis-400e484570b51dd745ebe0689024ac48.yaml new file mode 100644 index 0000000000..181d9b23b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addthis-400e484570b51dd745ebe0689024ac48.yaml @@ -0,0 +1,58 @@ +id: addthis-400e484570b51dd745ebe0689024ac48 + +info: + name: > + AddThis Sharing Buttons <= 5.0.12 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49ac9c7c-d457-4709-bc10-c3de8b4f097a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addthis/" + google-query: inurl:"/wp-content/plugins/addthis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addthis,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addthis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addthis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addthis-4df8f94a1b3a10a0e93c979447a9e37d.yaml b/nuclei-templates/cve-less/plugins/addthis-4df8f94a1b3a10a0e93c979447a9e37d.yaml new file mode 100644 index 0000000000..98f2c510ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addthis-4df8f94a1b3a10a0e93c979447a9e37d.yaml @@ -0,0 +1,58 @@ +id: addthis-4df8f94a1b3a10a0e93c979447a9e37d + +info: + name: > + AddThis <= 5.0.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76345533-ec81-4a6e-bb20-12449dd63a27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addthis/" + google-query: inurl:"/wp-content/plugins/addthis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addthis,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addthis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addthis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addthis-63618d1b2772f81d989c25189b57727a.yaml b/nuclei-templates/cve-less/plugins/addthis-63618d1b2772f81d989c25189b57727a.yaml new file mode 100644 index 0000000000..01da051d78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addthis-63618d1b2772f81d989c25189b57727a.yaml @@ -0,0 +1,58 @@ +id: addthis-63618d1b2772f81d989c25189b57727a + +info: + name: > + AddThis <= 5.0.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a276d70d-3ad7-49e0-a25c-8089cdd581da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addthis/" + google-query: inurl:"/wp-content/plugins/addthis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addthis,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addthis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addthis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/addthis-f458b6b7d201e75465fa11d780919cd8.yaml b/nuclei-templates/cve-less/plugins/addthis-f458b6b7d201e75465fa11d780919cd8.yaml new file mode 100644 index 0000000000..b7c0aabf1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/addthis-f458b6b7d201e75465fa11d780919cd8.yaml @@ -0,0 +1,58 @@ +id: addthis-f458b6b7d201e75465fa11d780919cd8 + +info: + name: > + WordPress Share Buttons Plugin – AddThis < 2.2.0 - Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c466c0ff-d84b-4536-bea7-ada2a80aad15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/addthis/" + google-query: inurl:"/wp-content/plugins/addthis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,addthis,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/addthis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "addthis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adfoxly-3bb7ea48eda3e0c286b8f4154d1c722a.yaml b/nuclei-templates/cve-less/plugins/adfoxly-3bb7ea48eda3e0c286b8f4154d1c722a.yaml new file mode 100644 index 0000000000..b86c348a73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adfoxly-3bb7ea48eda3e0c286b8f4154d1c722a.yaml @@ -0,0 +1,58 @@ +id: adfoxly-3bb7ea48eda3e0c286b8f4154d1c722a + +info: + name: > + AdFoxly – Ad Manager, AdSense Ads & Ads.txt <= 1.8.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e46513d2-65d0-4215-99a7-051603ec4569?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adfoxly/" + google-query: inurl:"/wp-content/plugins/adfoxly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adfoxly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adfoxly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adfoxly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adfoxly-55491e6388a9facf7c82130d1d7c03fc.yaml b/nuclei-templates/cve-less/plugins/adfoxly-55491e6388a9facf7c82130d1d7c03fc.yaml new file mode 100644 index 0000000000..5c4a4d00ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adfoxly-55491e6388a9facf7c82130d1d7c03fc.yaml @@ -0,0 +1,58 @@ +id: adfoxly-55491e6388a9facf7c82130d1d7c03fc + +info: + name: > + AdFoxly – Ad Manager, AdSense Ads & Ads.txt <= 1.8.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d13ae87-f632-4eb0-bc71-5132ba6a9b13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adfoxly/" + google-query: inurl:"/wp-content/plugins/adfoxly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adfoxly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adfoxly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adfoxly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adfoxly-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/adfoxly-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e513d75967 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adfoxly-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: adfoxly-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adfoxly/" + google-query: inurl:"/wp-content/plugins/adfoxly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adfoxly,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adfoxly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adfoxly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adif-log-search-widget-b022913a2c1b91275126aaf3b57a5b27.yaml b/nuclei-templates/cve-less/plugins/adif-log-search-widget-b022913a2c1b91275126aaf3b57a5b27.yaml new file mode 100644 index 0000000000..26540ab7d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adif-log-search-widget-b022913a2c1b91275126aaf3b57a5b27.yaml @@ -0,0 +1,58 @@ +id: adif-log-search-widget-b022913a2c1b91275126aaf3b57a5b27 + +info: + name: > + ADIF Log Search Widget <= 1.0f - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/067ce322-9d37-4d90-92f3-ca5ada591797?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adif-log-search-widget/" + google-query: inurl:"/wp-content/plugins/adif-log-search-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adif-log-search-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adif-log-search-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adif-log-search-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0f') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adl-post-slider-baea03495f30d429cbcc479e7010d90b.yaml b/nuclei-templates/cve-less/plugins/adl-post-slider-baea03495f30d429cbcc479e7010d90b.yaml new file mode 100644 index 0000000000..70a89e3545 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adl-post-slider-baea03495f30d429cbcc479e7010d90b.yaml @@ -0,0 +1,58 @@ +id: adl-post-slider-baea03495f30d429cbcc479e7010d90b + +info: + name: > + Post Slider <= 1.6.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de3cf63f-ac30-47bb-978d-d3353d06de1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adl-post-slider/" + google-query: inurl:"/wp-content/plugins/adl-post-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adl-post-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adl-post-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adl-post-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adl-team-b4bab111be528a55d6c4bef04962870e.yaml b/nuclei-templates/cve-less/plugins/adl-team-b4bab111be528a55d6c4bef04962870e.yaml new file mode 100644 index 0000000000..5ef07eb554 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adl-team-b4bab111be528a55d6c4bef04962870e.yaml @@ -0,0 +1,58 @@ +id: adl-team-b4bab111be528a55d6c4bef04962870e + +info: + name: > + Team <= 1.2.6 - Authenticated (Contibutor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6921c5a7-4895-40f0-99c4-90f78416820d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adl-team/" + google-query: inurl:"/wp-content/plugins/adl-team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adl-team,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adl-team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adl-team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adl-team-ddd0e9486fe68ad8ba91d2369f80747b.yaml b/nuclei-templates/cve-less/plugins/adl-team-ddd0e9486fe68ad8ba91d2369f80747b.yaml new file mode 100644 index 0000000000..045b36e2e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adl-team-ddd0e9486fe68ad8ba91d2369f80747b.yaml @@ -0,0 +1,58 @@ +id: adl-team-ddd0e9486fe68ad8ba91d2369f80747b + +info: + name: > + Team <= 1.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbece1c4-fbb4-47e5-b5b7-482390bcbd13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adl-team/" + google-query: inurl:"/wp-content/plugins/adl-team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adl-team,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adl-team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adl-team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-and-client-message-after-order-for-woocommerce-5b3434af05805f54d95301c9d2bfe97f.yaml b/nuclei-templates/cve-less/plugins/admin-and-client-message-after-order-for-woocommerce-5b3434af05805f54d95301c9d2bfe97f.yaml new file mode 100644 index 0000000000..218b576b88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-and-client-message-after-order-for-woocommerce-5b3434af05805f54d95301c9d2bfe97f.yaml @@ -0,0 +1,58 @@ +id: admin-and-client-message-after-order-for-woocommerce-5b3434af05805f54d95301c9d2bfe97f + +info: + name: > + OrderConvo <= 12.4 - Missing Authorization to Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6686b67-8648-4f1b-8e05-fa67db60c8aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-and-client-message-after-order-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/admin-and-client-message-after-order-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-and-client-message-after-order-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-and-client-message-after-order-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-and-client-message-after-order-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-bar-7fb9197171618e79a095c113a75de482.yaml b/nuclei-templates/cve-less/plugins/admin-bar-7fb9197171618e79a095c113a75de482.yaml new file mode 100644 index 0000000000..6316d6cccb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-bar-7fb9197171618e79a095c113a75de482.yaml @@ -0,0 +1,58 @@ +id: admin-bar-7fb9197171618e79a095c113a75de482 + +info: + name: > + Admin Bar Remover <= 1.0.2.2 - Missing Authorization to Authenticated (Subscriber+) Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfbf2556-0509-4d8a-8949-494c6bc82ea1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-bar/" + google-query: inurl:"/wp-content/plugins/admin-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-bar-dashboard-control-11e3031fc351fbc9a833e9b97e46b6a6.yaml b/nuclei-templates/cve-less/plugins/admin-bar-dashboard-control-11e3031fc351fbc9a833e9b97e46b6a6.yaml new file mode 100644 index 0000000000..9115bb6f3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-bar-dashboard-control-11e3031fc351fbc9a833e9b97e46b6a6.yaml @@ -0,0 +1,58 @@ +id: admin-bar-dashboard-control-11e3031fc351fbc9a833e9b97e46b6a6 + +info: + name: > + Admin Bar & Dashboard Control <= 1.2.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37aa3d05-79b6-49ea-b698-afa78615e438?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-bar-dashboard-control/" + google-query: inurl:"/wp-content/plugins/admin-bar-dashboard-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-bar-dashboard-control,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-bar-dashboard-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-bar-dashboard-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-block-country-065bc0a5eb0849b7c6a410326eca6499.yaml b/nuclei-templates/cve-less/plugins/admin-block-country-065bc0a5eb0849b7c6a410326eca6499.yaml new file mode 100644 index 0000000000..f13e09075c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-block-country-065bc0a5eb0849b7c6a410326eca6499.yaml @@ -0,0 +1,58 @@ +id: admin-block-country-065bc0a5eb0849b7c6a410326eca6499 + +info: + name: > + Admin Block Country <= 7.1.4 - Cross-Site Request Forgery via admin_block_country_initial_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d3bcd2c-4cdd-4a11-83a5-b727a2b2b6a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-block-country/" + google-query: inurl:"/wp-content/plugins/admin-block-country/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-block-country,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-block-country/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-block-country" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-columns-pro-2cf825b0502a2430e12833bc820c6234.yaml b/nuclei-templates/cve-less/plugins/admin-columns-pro-2cf825b0502a2430e12833bc820c6234.yaml new file mode 100644 index 0000000000..bc9094f00d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-columns-pro-2cf825b0502a2430e12833bc820c6234.yaml @@ -0,0 +1,58 @@ +id: admin-columns-pro-2cf825b0502a2430e12833bc820c6234 + +info: + name: > + Admin Columns Free < 4.3 and Pro < 5.5.1 Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/067a5f6c-7ad1-49ac-a581-b50fa89a5f39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-columns-pro/" + google-query: inurl:"/wp-content/plugins/admin-columns-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-columns-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-columns-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-columns-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-columns-pro-9a1ea12529e15f0a017ce8f0e47401f6.yaml b/nuclei-templates/cve-less/plugins/admin-columns-pro-9a1ea12529e15f0a017ce8f0e47401f6.yaml new file mode 100644 index 0000000000..186bd99b99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-columns-pro-9a1ea12529e15f0a017ce8f0e47401f6.yaml @@ -0,0 +1,58 @@ +id: admin-columns-pro-9a1ea12529e15f0a017ce8f0e47401f6 + +info: + name: > + Admin Columns Free < 4.3.2 and Pro < 5.5.2 Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69654827-842f-483d-ae4c-b9c7ae271f82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-columns-pro/" + google-query: inurl:"/wp-content/plugins/admin-columns-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-columns-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-columns-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-columns-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-css-mu-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/admin-css-mu-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..27bd45f3ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-css-mu-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: admin-css-mu-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-css-mu/" + google-query: inurl:"/wp-content/plugins/admin-css-mu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-css-mu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-css-mu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-css-mu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-custom-login-8e89a9166eb8a31b3f0788c884713593.yaml b/nuclei-templates/cve-less/plugins/admin-custom-login-8e89a9166eb8a31b3f0788c884713593.yaml new file mode 100644 index 0000000000..a8dbd49c13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-custom-login-8e89a9166eb8a31b3f0788c884713593.yaml @@ -0,0 +1,58 @@ +id: admin-custom-login-8e89a9166eb8a31b3f0788c884713593 + +info: + name: > + Admin Custom Login <= 2.4.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f2f34e1-3b08-4e23-a29b-21e61e6a6063?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-custom-login/" + google-query: inurl:"/wp-content/plugins/admin-custom-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-custom-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-custom-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-custom-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-custom-login-a3f7dace6308a168799f4b5efdcbf0fc.yaml b/nuclei-templates/cve-less/plugins/admin-custom-login-a3f7dace6308a168799f4b5efdcbf0fc.yaml new file mode 100644 index 0000000000..c5933aca51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-custom-login-a3f7dace6308a168799f4b5efdcbf0fc.yaml @@ -0,0 +1,58 @@ +id: admin-custom-login-a3f7dace6308a168799f4b5efdcbf0fc + +info: + name: > + Admin Custom Login <= 3.2.7 – Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/349cada2-8154-4429-a47a-1837581da1dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-custom-login/" + google-query: inurl:"/wp-content/plugins/admin-custom-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-custom-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-custom-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-custom-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-font-editor-923aa4370429c541e105a9a0e073bc36.yaml b/nuclei-templates/cve-less/plugins/admin-font-editor-923aa4370429c541e105a9a0e073bc36.yaml new file mode 100644 index 0000000000..b6eb77c4df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-font-editor-923aa4370429c541e105a9a0e073bc36.yaml @@ -0,0 +1,58 @@ +id: admin-font-editor-923aa4370429c541e105a9a0e073bc36 + +info: + name: > + Admin Font Editor <= 1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1c2e4e5-472f-4517-90f0-8f7057d24ef8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-font-editor/" + google-query: inurl:"/wp-content/plugins/admin-font-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-font-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-font-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-font-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-form-86177d3d57734b384c40bd47dc22f497.yaml b/nuclei-templates/cve-less/plugins/admin-form-86177d3d57734b384c40bd47dc22f497.yaml new file mode 100644 index 0000000000..fc10b0d37a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-form-86177d3d57734b384c40bd47dc22f497.yaml @@ -0,0 +1,58 @@ +id: admin-form-86177d3d57734b384c40bd47dc22f497 + +info: + name: > + ADFO – Custom data in admin dashboard <= 1.9.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d797238-f8f3-44d7-8c16-bee23ce12ae0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-form/" + google-query: inurl:"/wp-content/plugins/admin-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-form-ca4f90158895ba65bf2d705fcea04dfc.yaml b/nuclei-templates/cve-less/plugins/admin-form-ca4f90158895ba65bf2d705fcea04dfc.yaml new file mode 100644 index 0000000000..8c65f604ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-form-ca4f90158895ba65bf2d705fcea04dfc.yaml @@ -0,0 +1,58 @@ +id: admin-form-ca4f90158895ba65bf2d705fcea04dfc + +info: + name: > + ADFO – Custom data in admin dashboard <= 1.9.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e61110fc-cc2d-4207-97b6-b21459334216?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-form/" + google-query: inurl:"/wp-content/plugins/admin-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-log-df593141a2030e92d8b8a063fe09a284.yaml b/nuclei-templates/cve-less/plugins/admin-log-df593141a2030e92d8b8a063fe09a284.yaml new file mode 100644 index 0000000000..1c50b23e10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-log-df593141a2030e92d8b8a063fe09a284.yaml @@ -0,0 +1,58 @@ +id: admin-log-df593141a2030e92d8b8a063fe09a284 + +info: + name: > + Admin Log <= 1.50 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63af783b-5593-4f84-8a4b-e4a19d9c994c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-log/" + google-query: inurl:"/wp-content/plugins/admin-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-management-xtended-7c54d0c02ff88e8b029dfc7540d8d088.yaml b/nuclei-templates/cve-less/plugins/admin-management-xtended-7c54d0c02ff88e8b029dfc7540d8d088.yaml new file mode 100644 index 0000000000..a11e076a63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-management-xtended-7c54d0c02ff88e8b029dfc7540d8d088.yaml @@ -0,0 +1,58 @@ +id: admin-management-xtended-7c54d0c02ff88e8b029dfc7540d8d088 + +info: + name: > + Admin Management Xtended <= 2.4.4 - Cross-Site Request Forgery to Post Status Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/281ebead-5a30-4bfb-8280-94faf5d4fc14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-management-xtended/" + google-query: inurl:"/wp-content/plugins/admin-management-xtended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-management-xtended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-management-xtended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-management-xtended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-management-xtended-9639beb38d5d1c45bea1fc0af8299ea1.yaml b/nuclei-templates/cve-less/plugins/admin-management-xtended-9639beb38d5d1c45bea1fc0af8299ea1.yaml new file mode 100644 index 0000000000..fea11a0784 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-management-xtended-9639beb38d5d1c45bea1fc0af8299ea1.yaml @@ -0,0 +1,58 @@ +id: admin-management-xtended-9639beb38d5d1c45bea1fc0af8299ea1 + +info: + name: > + Admin Management Xtended <= 2.4.0 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c6261f-4657-4e6e-ae23-5fa44790aa12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-management-xtended/" + google-query: inurl:"/wp-content/plugins/admin-management-xtended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-management-xtended,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-management-xtended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-management-xtended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-management-xtended-de7a5d3d23cd7a255b8c43340d197b1b.yaml b/nuclei-templates/cve-less/plugins/admin-management-xtended-de7a5d3d23cd7a255b8c43340d197b1b.yaml new file mode 100644 index 0000000000..e2d6f692c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-management-xtended-de7a5d3d23cd7a255b8c43340d197b1b.yaml @@ -0,0 +1,58 @@ +id: admin-management-xtended-de7a5d3d23cd7a255b8c43340d197b1b + +info: + name: > + Admin Management Xtended <= 2.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1878f40e-18f4-448c-bf70-61b4eed1c0ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-management-xtended/" + google-query: inurl:"/wp-content/plugins/admin-management-xtended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-management-xtended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-management-xtended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-management-xtended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-menu-e411bd798191f2720fc8b5639b6efe9d.yaml b/nuclei-templates/cve-less/plugins/admin-menu-e411bd798191f2720fc8b5639b6efe9d.yaml new file mode 100644 index 0000000000..24fc1cf045 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-menu-e411bd798191f2720fc8b5639b6efe9d.yaml @@ -0,0 +1,58 @@ +id: admin-menu-e411bd798191f2720fc8b5639b6efe9d + +info: + name: > + Admin Menu Plugin <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ade7da50-49f3-4026-a2c0-5c23c9b0f0cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-menu/" + google-query: inurl:"/wp-content/plugins/admin-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-menu-editor-b38b7cc5414ae950246e64e87c33ee56.yaml b/nuclei-templates/cve-less/plugins/admin-menu-editor-b38b7cc5414ae950246e64e87c33ee56.yaml new file mode 100644 index 0000000000..e624e3b476 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-menu-editor-b38b7cc5414ae950246e64e87c33ee56.yaml @@ -0,0 +1,58 @@ +id: admin-menu-editor-b38b7cc5414ae950246e64e87c33ee56 + +info: + name: > + Admin Menu Editor <= 1.12 - Cross-Site Request Forgery via ajax_hide_hint() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53fa9be4-a2b3-458c-af6e-d3ada639a622?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-menu-editor/" + google-query: inurl:"/wp-content/plugins/admin-menu-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-menu-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-menu-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-menu-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-menu-restriction-87b8cc0c2911555903ef563ff0be512f.yaml b/nuclei-templates/cve-less/plugins/admin-menu-restriction-87b8cc0c2911555903ef563ff0be512f.yaml new file mode 100644 index 0000000000..5d58ce443e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-menu-restriction-87b8cc0c2911555903ef563ff0be512f.yaml @@ -0,0 +1,58 @@ +id: admin-menu-restriction-87b8cc0c2911555903ef563ff0be512f + +info: + name: > + Admin Menu Editor <= 1.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56f46330-20d2-48f2-8e23-cc8f968db4b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-menu-restriction/" + google-query: inurl:"/wp-content/plugins/admin-menu-restriction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-menu-restriction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-menu-restriction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-menu-restriction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-notices-for-team-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/admin-notices-for-team-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8035379635 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-notices-for-team-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: admin-notices-for-team-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-notices-for-team/" + google-query: inurl:"/wp-content/plugins/admin-notices-for-team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-notices-for-team,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-notices-for-team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-notices-for-team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-notices-for-team-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/admin-notices-for-team-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..ba1f2ce909 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-notices-for-team-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: admin-notices-for-team-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-notices-for-team/" + google-query: inurl:"/wp-content/plugins/admin-notices-for-team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-notices-for-team,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-notices-for-team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-notices-for-team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-pack-by-site-caseiro-b56b643a394756ad5a6e6d10ca73e89c.yaml b/nuclei-templates/cve-less/plugins/admin-pack-by-site-caseiro-b56b643a394756ad5a6e6d10ca73e89c.yaml new file mode 100644 index 0000000000..e1fe737593 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-pack-by-site-caseiro-b56b643a394756ad5a6e6d10ca73e89c.yaml @@ -0,0 +1,58 @@ +id: admin-pack-by-site-caseiro-b56b643a394756ad5a6e6d10ca73e89c + +info: + name: > + Admin Pack by SITE CASEIRO <= 1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c59cfc2-2a2c-4b0b-88f7-f6a96caa25c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-pack-by-site-caseiro/" + google-query: inurl:"/wp-content/plugins/admin-pack-by-site-caseiro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-pack-by-site-caseiro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-pack-by-site-caseiro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-pack-by-site-caseiro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-page-framework-49f7af60a7d6ca8e6785ad7873768f2a.yaml b/nuclei-templates/cve-less/plugins/admin-page-framework-49f7af60a7d6ca8e6785ad7873768f2a.yaml new file mode 100644 index 0000000000..ba5d4d1d6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-page-framework-49f7af60a7d6ca8e6785ad7873768f2a.yaml @@ -0,0 +1,58 @@ +id: admin-page-framework-49f7af60a7d6ca8e6785ad7873768f2a + +info: + name: > + JQueryFileTree <= 2.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f20352f-386f-45ab-b719-8a70f5c11b02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-page-framework/" + google-query: inurl:"/wp-content/plugins/admin-page-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-page-framework,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-page-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-page-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-page-spider-a7d2f24ba1d738c469db3701e7d249a6.yaml b/nuclei-templates/cve-less/plugins/admin-page-spider-a7d2f24ba1d738c469db3701e7d249a6.yaml new file mode 100644 index 0000000000..b13037fb80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-page-spider-a7d2f24ba1d738c469db3701e7d249a6.yaml @@ -0,0 +1,58 @@ +id: admin-page-spider-a7d2f24ba1d738c469db3701e7d249a6 + +info: + name: > + Admin Page Spider <= 3.30 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c33d9295-0c7f-45a0-9d62-4293c8bbef0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-page-spider/" + google-query: inurl:"/wp-content/plugins/admin-page-spider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-page-spider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-page-spider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-page-spider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-renamer-extended-86ca53e4f7322bd713f7a0d173845e67.yaml b/nuclei-templates/cve-less/plugins/admin-renamer-extended-86ca53e4f7322bd713f7a0d173845e67.yaml new file mode 100644 index 0000000000..079c9336aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-renamer-extended-86ca53e4f7322bd713f7a0d173845e67.yaml @@ -0,0 +1,58 @@ +id: admin-renamer-extended-86ca53e4f7322bd713f7a0d173845e67 + +info: + name: > + Admin renamer extended <= 3.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9caf6a8-d7f6-4686-889a-79ba9cf911c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-renamer-extended/" + google-query: inurl:"/wp-content/plugins/admin-renamer-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-renamer-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-renamer-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-renamer-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-1b189d1d5eea3b43d17277dc35a1184f.yaml b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-1b189d1d5eea3b43d17277dc35a1184f.yaml new file mode 100644 index 0000000000..75e224e386 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-1b189d1d5eea3b43d17277dc35a1184f.yaml @@ -0,0 +1,58 @@ +id: admin-side-data-storage-for-contact-form-7-1b189d1d5eea3b43d17277dc35a1184f + +info: + name: > + Admin side data storage for Contact Form 7 <= 1.1.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/172b2191-6595-47dd-bf2d-97dc3d17e5ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-side-data-storage-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-side-data-storage-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-side-data-storage-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-1c83a92e446554fa5dca6a3142ee08a1.yaml b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-1c83a92e446554fa5dca6a3142ee08a1.yaml new file mode 100644 index 0000000000..5ce8ac299e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-1c83a92e446554fa5dca6a3142ee08a1.yaml @@ -0,0 +1,58 @@ +id: admin-side-data-storage-for-contact-form-7-1c83a92e446554fa5dca6a3142ee08a1 + +info: + name: > + Admin side data storage for Contact Form 7 plugin <= 1.1.1 - Missing Authorization to Unauthenticated Read Status Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52e4f79f-1148-4530-8d78-377a7365978a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-side-data-storage-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-side-data-storage-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-side-data-storage-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-338378bbb7402de89fbb870142f8402e.yaml b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-338378bbb7402de89fbb870142f8402e.yaml new file mode 100644 index 0000000000..fc3486811b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-338378bbb7402de89fbb870142f8402e.yaml @@ -0,0 +1,58 @@ +id: admin-side-data-storage-for-contact-form-7-338378bbb7402de89fbb870142f8402e + +info: + name: > + Admin side data storage for Contact Form 7 <= 1.1.1 - Missing Authorization to Unauthenticated Bookmark Status Alteration + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d74040d0-1fee-4906-af6f-a5d842c42fd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-side-data-storage-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-side-data-storage-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-side-data-storage-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-6038d8499b4a66981281a09913dec32b.yaml b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-6038d8499b4a66981281a09913dec32b.yaml new file mode 100644 index 0000000000..d8b0406b0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-6038d8499b4a66981281a09913dec32b.yaml @@ -0,0 +1,58 @@ +id: admin-side-data-storage-for-contact-form-7-6038d8499b4a66981281a09913dec32b + +info: + name: > + Admin side data storage for Contact Form 7 <= 1.1.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bff8172-b879-40b0-a229-a54787baa38a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-side-data-storage-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-side-data-storage-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-side-data-storage-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-7ad427989216bf7651898fa8b21eefdc.yaml b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-7ad427989216bf7651898fa8b21eefdc.yaml new file mode 100644 index 0000000000..6fe4b59d48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-side-data-storage-for-contact-form-7-7ad427989216bf7651898fa8b21eefdc.yaml @@ -0,0 +1,58 @@ +id: admin-side-data-storage-for-contact-form-7-7ad427989216bf7651898fa8b21eefdc + +info: + name: > + Admin side data storage for Contact Form 7 <= 1.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b411a97b-2f1c-4feb-b1c7-bc5a1aab7f33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/admin-side-data-storage-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-side-data-storage-for-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-side-data-storage-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-side-data-storage-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-site-enhancements-66e2a6cfa3da10d668341e96b2f32949.yaml b/nuclei-templates/cve-less/plugins/admin-site-enhancements-66e2a6cfa3da10d668341e96b2f32949.yaml new file mode 100644 index 0000000000..27c6a72e91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-site-enhancements-66e2a6cfa3da10d668341e96b2f32949.yaml @@ -0,0 +1,58 @@ +id: admin-site-enhancements-66e2a6cfa3da10d668341e96b2f32949 + +info: + name: > + Admin and Site Enhancements (ASE) <= 5.7.1 - Password Protection Mode Security Feature Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0abad47f-a806-4cdd-a11f-015b997b5e86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-site-enhancements/" + google-query: inurl:"/wp-content/plugins/admin-site-enhancements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-site-enhancements,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-site-enhancements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-site-enhancements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-word-count-column-00453bee0b2389611473722a70457a0b.yaml b/nuclei-templates/cve-less/plugins/admin-word-count-column-00453bee0b2389611473722a70457a0b.yaml new file mode 100644 index 0000000000..11630a0a61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-word-count-column-00453bee0b2389611473722a70457a0b.yaml @@ -0,0 +1,58 @@ +id: admin-word-count-column-00453bee0b2389611473722a70457a0b + +info: + name: > + Admin Word Count Column <= 2.2 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ed280ba-d7e5-4637-ab84-93dc82c009d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-word-count-column/" + google-query: inurl:"/wp-content/plugins/admin-word-count-column/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-word-count-column,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-word-count-column/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-word-count-column" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/admin-word-count-column-d5cca6b6b2563223e79910114117f74a.yaml b/nuclei-templates/cve-less/plugins/admin-word-count-column-d5cca6b6b2563223e79910114117f74a.yaml new file mode 100644 index 0000000000..1c4f221865 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/admin-word-count-column-d5cca6b6b2563223e79910114117f74a.yaml @@ -0,0 +1,58 @@ +id: admin-word-count-column-d5cca6b6b2563223e79910114117f74a + +info: + name: > + Admin Word Count Column <= 2.2 - Unauthenticated Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7520010f-c402-4fe9-82dc-a973ce446765?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/admin-word-count-column/" + google-query: inurl:"/wp-content/plugins/admin-word-count-column/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,admin-word-count-column,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/admin-word-count-column/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "admin-word-count-column" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminer-3b8ab0bd7f7bcc6cdb534f9d784854fc.yaml b/nuclei-templates/cve-less/plugins/adminer-3b8ab0bd7f7bcc6cdb534f9d784854fc.yaml new file mode 100644 index 0000000000..237a26e02e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminer-3b8ab0bd7f7bcc6cdb534f9d784854fc.yaml @@ -0,0 +1,58 @@ +id: adminer-3b8ab0bd7f7bcc6cdb534f9d784854fc + +info: + name: > + Adminer < 1.4.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8139bc38-2b78-4b02-bce8-c28dd258ee49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminer/" + google-query: inurl:"/wp-content/plugins/adminer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminer-50ccd5d0a1c5b6dd13714f3e3f3f4b8d.yaml b/nuclei-templates/cve-less/plugins/adminer-50ccd5d0a1c5b6dd13714f3e3f3f4b8d.yaml new file mode 100644 index 0000000000..6cee9ee90a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminer-50ccd5d0a1c5b6dd13714f3e3f3f4b8d.yaml @@ -0,0 +1,58 @@ +id: adminer-50ccd5d0a1c5b6dd13714f3e3f3f4b8d + +info: + name: > + Adminer <= 1.4.5 - Security Bypass to Database Login + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/109b4947-f690-4158-9e6a-00f2005a6938?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminer/" + google-query: inurl:"/wp-content/plugins/adminer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminify-01ec13470a183f703d9497a5409e83a8.yaml b/nuclei-templates/cve-less/plugins/adminify-01ec13470a183f703d9497a5409e83a8.yaml new file mode 100644 index 0000000000..e67fec2849 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminify-01ec13470a183f703d9497a5409e83a8.yaml @@ -0,0 +1,58 @@ +id: adminify-01ec13470a183f703d9497a5409e83a8 + +info: + name: > + WP Adminify <= 3.1.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a600f164-7255-4590-8239-2d3e0b445e79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminify/" + google-query: inurl:"/wp-content/plugins/adminify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminify-41758ee37f85a4ada05dbd855bba9b0b.yaml b/nuclei-templates/cve-less/plugins/adminify-41758ee37f85a4ada05dbd855bba9b0b.yaml new file mode 100644 index 0000000000..5e7ef57fe6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminify-41758ee37f85a4ada05dbd855bba9b0b.yaml @@ -0,0 +1,58 @@ +id: adminify-41758ee37f85a4ada05dbd855bba9b0b + +info: + name: > + WP Adminify <= 3.1.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ac72136-7911-4980-92b0-9bf18bed2201?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminify/" + google-query: inurl:"/wp-content/plugins/adminify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminify-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/adminify-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..81ea201c63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminify-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: adminify-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminify/" + google-query: inurl:"/wp-content/plugins/adminify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminify-bc021f50f994b63de0e089ca7983044c.yaml b/nuclei-templates/cve-less/plugins/adminify-bc021f50f994b63de0e089ca7983044c.yaml new file mode 100644 index 0000000000..468654e169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminify-bc021f50f994b63de0e089ca7983044c.yaml @@ -0,0 +1,58 @@ +id: adminify-bc021f50f994b63de0e089ca7983044c + +info: + name: > + WP Adminify <= 3.1.6 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/555dce5e-9868-464a-9cb4-67644cc6a61c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminify/" + google-query: inurl:"/wp-content/plugins/adminify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminimize-98258e7e3672ebda27bdfc41933c5290.yaml b/nuclei-templates/cve-less/plugins/adminimize-98258e7e3672ebda27bdfc41933c5290.yaml new file mode 100644 index 0000000000..e18bce6478 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminimize-98258e7e3672ebda27bdfc41933c5290.yaml @@ -0,0 +1,58 @@ +id: adminimize-98258e7e3672ebda27bdfc41933c5290 + +info: + name: > + Adminimize <= 1.7.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d7fec5d-895e-4366-a31c-248a3daf8937?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminimize/" + google-query: inurl:"/wp-content/plugins/adminimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminimize,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminimize-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml b/nuclei-templates/cve-less/plugins/adminimize-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml new file mode 100644 index 0000000000..bcb9f0e12c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminimize-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml @@ -0,0 +1,58 @@ +id: adminimize-a9a5808c69ac6668bf195f6fcb5a5a1a + +info: + name: > + Adminimize < 1.7.22 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83ad7ab2-4257-4aac-9388-bfcbc2938984?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminimize/" + google-query: inurl:"/wp-content/plugins/adminimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminimize,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/administrator-z-e6db47c78eec7cdfa79fc10eb791885d.yaml b/nuclei-templates/cve-less/plugins/administrator-z-e6db47c78eec7cdfa79fc10eb791885d.yaml new file mode 100644 index 0000000000..cb0cff250f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/administrator-z-e6db47c78eec7cdfa79fc10eb791885d.yaml @@ -0,0 +1,58 @@ +id: administrator-z-e6db47c78eec7cdfa79fc10eb791885d + +info: + name: > + Administrator Z <= 2022.9.28 - Unauthorized File Upload via ACF + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2061a442-eccd-4a57-a5c5-a432fcea8394?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/administrator-z/" + google-query: inurl:"/wp-content/plugins/administrator-z/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,administrator-z,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/administrator-z/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "administrator-z" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2022.9.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminonline-8605679482008c33234e96d6513ed206.yaml b/nuclei-templates/cve-less/plugins/adminonline-8605679482008c33234e96d6513ed206.yaml new file mode 100644 index 0000000000..0ed920dfb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminonline-8605679482008c33234e96d6513ed206.yaml @@ -0,0 +1,58 @@ +id: adminonline-8605679482008c33234e96d6513ed206 + +info: + name: > + AdminOnline (Unspecified Version) - Directly Traversal/Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe926435-ef91-4717-8612-31c053771491?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminonline/" + google-query: inurl:"/wp-content/plugins/adminonline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminonline,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminonline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminonline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adminpad-70956e63e550605d8f25a09facb07794.yaml b/nuclei-templates/cve-less/plugins/adminpad-70956e63e550605d8f25a09facb07794.yaml new file mode 100644 index 0000000000..3b5e999f8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adminpad-70956e63e550605d8f25a09facb07794.yaml @@ -0,0 +1,58 @@ +id: adminpad-70956e63e550605d8f25a09facb07794 + +info: + name: > + AdminPad <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9d545fc-fed0-428a-bad5-a0d7d09c04a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adminpad/" + google-query: inurl:"/wp-content/plugins/adminpad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adminpad,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adminpad/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adminpad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adplugg-9a9ae078aa8492b142c833f71cc23292.yaml b/nuclei-templates/cve-less/plugins/adplugg-9a9ae078aa8492b142c833f71cc23292.yaml new file mode 100644 index 0000000000..4d57500070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adplugg-9a9ae078aa8492b142c833f71cc23292.yaml @@ -0,0 +1,58 @@ +id: adplugg-9a9ae078aa8492b142c833f71cc23292 + +info: + name: > + AdPlugg WordPress Ad Plugin < 1.1.34 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c6ea33f-ee43-4df8-9633-60303b68b859?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adplugg/" + google-query: inurl:"/wp-content/plugins/adplugg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adplugg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adplugg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adplugg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adrotate-1978bcad197f3b110297309bda97f32a.yaml b/nuclei-templates/cve-less/plugins/adrotate-1978bcad197f3b110297309bda97f32a.yaml new file mode 100644 index 0000000000..1118c6ca33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adrotate-1978bcad197f3b110297309bda97f32a.yaml @@ -0,0 +1,58 @@ +id: adrotate-1978bcad197f3b110297309bda97f32a + +info: + name: > + AdRotate – Ad manager & AdSense Ads < 3.6.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96f9c5b3-43b7-46e0-aa0c-a5179a99096b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adrotate/" + google-query: inurl:"/wp-content/plugins/adrotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adrotate,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adrotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adrotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adrotate-1f31d20eb76428666b511698c9ea1c7e.yaml b/nuclei-templates/cve-less/plugins/adrotate-1f31d20eb76428666b511698c9ea1c7e.yaml new file mode 100644 index 0000000000..4a90325fa4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adrotate-1f31d20eb76428666b511698c9ea1c7e.yaml @@ -0,0 +1,58 @@ +id: adrotate-1f31d20eb76428666b511698c9ea1c7e + +info: + name: > + AdRotate – Ad manager & AdSense Ads 3.9 - 3.9.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/941233d8-f382-40a0-81b2-18a682ae07ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adrotate/" + google-query: inurl:"/wp-content/plugins/adrotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adrotate,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adrotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adrotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.9', '<= 3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adrotate-404d802e6aee5b15a871049b9ffff69a.yaml b/nuclei-templates/cve-less/plugins/adrotate-404d802e6aee5b15a871049b9ffff69a.yaml new file mode 100644 index 0000000000..c189b53bfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adrotate-404d802e6aee5b15a871049b9ffff69a.yaml @@ -0,0 +1,58 @@ +id: adrotate-404d802e6aee5b15a871049b9ffff69a + +info: + name: > + AdRotate – Ad manager & AdSense Ads <= 5.8.22 - Authenticated Stored Cross-Site Scripting via Group Names + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07c0516b-ee3a-4a80-8db7-e6372bb294a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adrotate/" + google-query: inurl:"/wp-content/plugins/adrotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adrotate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adrotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adrotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adrotate-a74fb6f00e03de1d4dc066ebae34f69d.yaml b/nuclei-templates/cve-less/plugins/adrotate-a74fb6f00e03de1d4dc066ebae34f69d.yaml new file mode 100644 index 0000000000..447d94328f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adrotate-a74fb6f00e03de1d4dc066ebae34f69d.yaml @@ -0,0 +1,58 @@ +id: adrotate-a74fb6f00e03de1d4dc066ebae34f69d + +info: + name: > + AdRotate Banner Manager <= 5.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f068abb4-cbe6-4698-b547-78503b2a455e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adrotate/" + google-query: inurl:"/wp-content/plugins/adrotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adrotate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adrotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adrotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adrotate-b24e50f88d059b7df802d8ab2740b6f0.yaml b/nuclei-templates/cve-less/plugins/adrotate-b24e50f88d059b7df802d8ab2740b6f0.yaml new file mode 100644 index 0000000000..d719cb3f41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adrotate-b24e50f88d059b7df802d8ab2740b6f0.yaml @@ -0,0 +1,58 @@ +id: adrotate-b24e50f88d059b7df802d8ab2740b6f0 + +info: + name: > + AdRotate – Ad manager & AdSense Ads <= 5.2 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9244775-eab8-4cf4-98bb-97e467dcc5cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adrotate/" + google-query: inurl:"/wp-content/plugins/adrotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adrotate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adrotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adrotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adrotate-d07cf22ef8f576e671dbb7b3eafdf13a.yaml b/nuclei-templates/cve-less/plugins/adrotate-d07cf22ef8f576e671dbb7b3eafdf13a.yaml new file mode 100644 index 0000000000..238106e834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adrotate-d07cf22ef8f576e671dbb7b3eafdf13a.yaml @@ -0,0 +1,58 @@ +id: adrotate-d07cf22ef8f576e671dbb7b3eafdf13a + +info: + name: > + AdRotate – Ad manager & AdSense Ads <= 5.8.22 - Authenticated Stored Cross-Site Scripting via Advert Names + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f226493-4787-4d99-999d-3e3916a8c41d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adrotate/" + google-query: inurl:"/wp-content/plugins/adrotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adrotate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adrotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adrotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adrotate-d9b7905c602159e1d431254ae8993ca0.yaml b/nuclei-templates/cve-less/plugins/adrotate-d9b7905c602159e1d431254ae8993ca0.yaml new file mode 100644 index 0000000000..d0b014212b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adrotate-d9b7905c602159e1d431254ae8993ca0.yaml @@ -0,0 +1,58 @@ +id: adrotate-d9b7905c602159e1d431254ae8993ca0 + +info: + name: > + AdRotate – Ad manager & AdSense Ads <= 5.8.17 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ad7c3d5-fce8-4214-a7f8-5aa2b9fe0934?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adrotate/" + google-query: inurl:"/wp-content/plugins/adrotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adrotate,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adrotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adrotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adrotate-f5d87ece59db37936b3fb9bdb05376cd.yaml b/nuclei-templates/cve-less/plugins/adrotate-f5d87ece59db37936b3fb9bdb05376cd.yaml new file mode 100644 index 0000000000..ad759050f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adrotate-f5d87ece59db37936b3fb9bdb05376cd.yaml @@ -0,0 +1,58 @@ +id: adrotate-f5d87ece59db37936b3fb9bdb05376cd + +info: + name: > + AdRotate < 5.8.4 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9ae337-fd2b-49c1-baac-6540f1152f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adrotate/" + google-query: inurl:"/wp-content/plugins/adrotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adrotate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adrotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adrotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ads-box-6a26301f5fd7c4d97e54e67c3224031f.yaml b/nuclei-templates/cve-less/plugins/ads-box-6a26301f5fd7c4d97e54e67c3224031f.yaml new file mode 100644 index 0000000000..0c4b088880 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ads-box-6a26301f5fd7c4d97e54e67c3224031f.yaml @@ -0,0 +1,58 @@ +id: ads-box-6a26301f5fd7c4d97e54e67c3224031f + +info: + name: > + Ads Box <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ea52e59-d81c-4a3f-953e-34f8214c01d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ads-box/" + google-query: inurl:"/wp-content/plugins/ads-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ads-box,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ads-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ads-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ads-by-datafeedrcom-b6c1a6adb8481fecb3d92549d2f5a5bd.yaml b/nuclei-templates/cve-less/plugins/ads-by-datafeedrcom-b6c1a6adb8481fecb3d92549d2f5a5bd.yaml new file mode 100644 index 0000000000..9944468a64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ads-by-datafeedrcom-b6c1a6adb8481fecb3d92549d2f5a5bd.yaml @@ -0,0 +1,58 @@ +id: ads-by-datafeedrcom-b6c1a6adb8481fecb3d92549d2f5a5bd + +info: + name: > + Ads by datafeedr.com <= 1.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61c71bbf-ddae-4f35-ac8d-9753fb3fb67f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ads-by-datafeedrcom/" + google-query: inurl:"/wp-content/plugins/ads-by-datafeedrcom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ads-by-datafeedrcom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ads-by-datafeedrcom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ads-by-datafeedrcom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ads-by-datafeedrcom-f9c63ff99c5edff8a5bfda2b8b7db0d0.yaml b/nuclei-templates/cve-less/plugins/ads-by-datafeedrcom-f9c63ff99c5edff8a5bfda2b8b7db0d0.yaml new file mode 100644 index 0000000000..5f43e3c7b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ads-by-datafeedrcom-f9c63ff99c5edff8a5bfda2b8b7db0d0.yaml @@ -0,0 +1,58 @@ +id: ads-by-datafeedrcom-f9c63ff99c5edff8a5bfda2b8b7db0d0 + +info: + name: > + Ads by datafeedr.com <= 1.1.3 - Unauthenticated (Limited) Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5412fd87-49bc-445c-8d16-443e38933d1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ads-by-datafeedrcom/" + google-query: inurl:"/wp-content/plugins/ads-by-datafeedrcom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ads-by-datafeedrcom,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ads-by-datafeedrcom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ads-by-datafeedrcom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ads-for-wp-32ccd5e0c657d764432d8a2599e1ffbc.yaml b/nuclei-templates/cve-less/plugins/ads-for-wp-32ccd5e0c657d764432d8a2599e1ffbc.yaml new file mode 100644 index 0000000000..f8763b1bc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ads-for-wp-32ccd5e0c657d764432d8a2599e1ffbc.yaml @@ -0,0 +1,58 @@ +id: ads-for-wp-32ccd5e0c657d764432d8a2599e1ffbc + +info: + name: > + Google Adsense & Banner Ads by AdsforWP < 1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf5fe4c5-0a18-4efb-b492-fad2ae3ca3da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ads-for-wp/" + google-query: inurl:"/wp-content/plugins/ads-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ads-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ads-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ads-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ads-for-wp-97317cfba5a4e1ac31624c57d27d0191.yaml b/nuclei-templates/cve-less/plugins/ads-for-wp-97317cfba5a4e1ac31624c57d27d0191.yaml new file mode 100644 index 0000000000..94ea41129a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ads-for-wp-97317cfba5a4e1ac31624c57d27d0191.yaml @@ -0,0 +1,58 @@ +id: ads-for-wp-97317cfba5a4e1ac31624c57d27d0191 + +info: + name: > + Google Adsense & Banner Ads by AdsforWP <= 1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d36d52e-7247-4f06-ae10-7827ae242983?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ads-for-wp/" + google-query: inurl:"/wp-content/plugins/ads-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ads-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ads-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ads-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ads-invalid-click-protection-d53d7fc7db0d940484e982ea2d1a452b.yaml b/nuclei-templates/cve-less/plugins/ads-invalid-click-protection-d53d7fc7db0d940484e982ea2d1a452b.yaml new file mode 100644 index 0000000000..f35984f811 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ads-invalid-click-protection-d53d7fc7db0d940484e982ea2d1a452b.yaml @@ -0,0 +1,58 @@ +id: ads-invalid-click-protection-d53d7fc7db0d940484e982ea2d1a452b + +info: + name: > + Ads Invalid Click Protection <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0fa8050-6318-4528-8dd4-a3ca5467cfaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ads-invalid-click-protection/" + google-query: inurl:"/wp-content/plugins/ads-invalid-click-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ads-invalid-click-protection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ads-invalid-click-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ads-invalid-click-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ads-txt-admin-2edbd29eb6775e076f4926bb495fbd5f.yaml b/nuclei-templates/cve-less/plugins/ads-txt-admin-2edbd29eb6775e076f4926bb495fbd5f.yaml new file mode 100644 index 0000000000..fb9b909a6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ads-txt-admin-2edbd29eb6775e076f4926bb495fbd5f.yaml @@ -0,0 +1,58 @@ +id: ads-txt-admin-2edbd29eb6775e076f4926bb495fbd5f + +info: + name: > + Ads.txt Admin <= 1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4ec326-3008-45f9-a3d7-59b3676182fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ads-txt-admin/" + google-query: inurl:"/wp-content/plugins/ads-txt-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ads-txt-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ads-txt-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ads-txt-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ads-txt-manager-bc55ea7b509124d1a77831d4400c5030.yaml b/nuclei-templates/cve-less/plugins/ads-txt-manager-bc55ea7b509124d1a77831d4400c5030.yaml new file mode 100644 index 0000000000..209037d97f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ads-txt-manager-bc55ea7b509124d1a77831d4400c5030.yaml @@ -0,0 +1,58 @@ +id: ads-txt-manager-bc55ea7b509124d1a77831d4400c5030 + +info: + name: > + simple-git < 3.16.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46fdd494-8073-4a68-a4ab-1f5767011f67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ads-txt-manager/" + google-query: inurl:"/wp-content/plugins/ads-txt-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ads-txt-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ads-txt-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ads-txt-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adsanity-76eba8cd8a4e862710149dc77a310969.yaml b/nuclei-templates/cve-less/plugins/adsanity-76eba8cd8a4e862710149dc77a310969.yaml new file mode 100644 index 0000000000..6cb763dde3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adsanity-76eba8cd8a4e862710149dc77a310969.yaml @@ -0,0 +1,58 @@ +id: adsanity-76eba8cd8a4e862710149dc77a310969 + +info: + name: > + AdSanity < 1.8.2 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/effd72d2-876d-4f8d-b1e4-5ab38eab401b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adsanity/" + google-query: inurl:"/wp-content/plugins/adsanity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adsanity,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adsanity/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adsanity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adsense-click-fraud-monitoring-a06b9dcd1c61939b7e3171c0fcf7e2b0.yaml b/nuclei-templates/cve-less/plugins/adsense-click-fraud-monitoring-a06b9dcd1c61939b7e3171c0fcf7e2b0.yaml new file mode 100644 index 0000000000..a7068170b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adsense-click-fraud-monitoring-a06b9dcd1c61939b7e3171c0fcf7e2b0.yaml @@ -0,0 +1,58 @@ +id: adsense-click-fraud-monitoring-a06b9dcd1c61939b7e3171c0fcf7e2b0 + +info: + name: > + Adsense Click Fraud Monitoring <= 1.8.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/974b3894-f4e2-49c7-ba92-eaa5be0b4298?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adsense-click-fraud-monitoring/" + google-query: inurl:"/wp-content/plugins/adsense-click-fraud-monitoring/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adsense-click-fraud-monitoring,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adsense-click-fraud-monitoring/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adsense-click-fraud-monitoring" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adsense-deluxe-e6b40723167a263b6dd92aa26e882342.yaml b/nuclei-templates/cve-less/plugins/adsense-deluxe-e6b40723167a263b6dd92aa26e882342.yaml new file mode 100644 index 0000000000..3cd0d19677 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adsense-deluxe-e6b40723167a263b6dd92aa26e882342.yaml @@ -0,0 +1,58 @@ +id: adsense-deluxe-e6b40723167a263b6dd92aa26e882342 + +info: + name: > + AdSense-Deluxe <= 0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d4bd61c-858d-457f-a482-77939fe0caf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adsense-deluxe/" + google-query: inurl:"/wp-content/plugins/adsense-deluxe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adsense-deluxe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adsense-deluxe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adsense-deluxe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adsense-plugin-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml b/nuclei-templates/cve-less/plugins/adsense-plugin-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml new file mode 100644 index 0000000000..917707f4d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adsense-plugin-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml @@ -0,0 +1,58 @@ +id: adsense-plugin-4e7aa84fdbb125f3fa6adbf786ab8d90 + +info: + name: > + AdPush <= 1.43 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fc8deda-9fb3-41e5-850b-5109d4018027?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adsense-plugin/" + google-query: inurl:"/wp-content/plugins/adsense-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adsense-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adsense-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adsense-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adsense-plugin-b0dd2a8da30a77a184664b44d16f014b.yaml b/nuclei-templates/cve-less/plugins/adsense-plugin-b0dd2a8da30a77a184664b44d16f014b.yaml new file mode 100644 index 0000000000..5cacca5ae2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adsense-plugin-b0dd2a8da30a77a184664b44d16f014b.yaml @@ -0,0 +1,58 @@ +id: adsense-plugin-b0dd2a8da30a77a184664b44d16f014b + +info: + name: > + AdPush <= 1.29 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/455d7ee8-9a5a-41f6-b0ae-c55f04b41e52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adsense-plugin/" + google-query: inurl:"/wp-content/plugins/adsense-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adsense-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adsense-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adsense-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adsensei-b30-3fb8a6560a10a77149304b3038078ed0.yaml b/nuclei-templates/cve-less/plugins/adsensei-b30-3fb8a6560a10a77149304b3038078ed0.yaml new file mode 100644 index 0000000000..c14bfadbe1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adsensei-b30-3fb8a6560a10a77149304b3038078ed0.yaml @@ -0,0 +1,58 @@ +id: adsensei-b30-3fb8a6560a10a77149304b3038078ed0 + +info: + name: > + Adsmonetizer <= 3.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d8585df-f933-4bd6-a157-56a51d4f8a4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adsensei-b30/" + google-query: inurl:"/wp-content/plugins/adsensei-b30/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adsensei-b30,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adsensei-b30/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adsensei-b30" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adserve-0be4b8a6e8c5523e50c4255a6c88e58b.yaml b/nuclei-templates/cve-less/plugins/adserve-0be4b8a6e8c5523e50c4255a6c88e58b.yaml new file mode 100644 index 0000000000..2f845e141c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adserve-0be4b8a6e8c5523e50c4255a6c88e58b.yaml @@ -0,0 +1,58 @@ +id: adserve-0be4b8a6e8c5523e50c4255a6c88e58b + +info: + name: > + AdServe < 0.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1d8ae51-5f5e-466d-9994-32c898f01f53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adserve/" + google-query: inurl:"/wp-content/plugins/adserve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adserve,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adserve/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adserve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/adsplacer-26120d11811fdddc12c0808afc461d28.yaml b/nuclei-templates/cve-less/plugins/adsplacer-26120d11811fdddc12c0808afc461d28.yaml new file mode 100644 index 0000000000..aa933801cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/adsplacer-26120d11811fdddc12c0808afc461d28.yaml @@ -0,0 +1,58 @@ +id: adsplacer-26120d11811fdddc12c0808afc461d28 + +info: + name: > + AdsPlace'r – Ad Manager, Inserter, AdSense Ads <= 1.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f20fc354-e93c-4da4-8344-a71b07e04e56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/adsplacer/" + google-query: inurl:"/wp-content/plugins/adsplacer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,adsplacer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/adsplacer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adsplacer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-menu-manager-024bbec9ead04ec628d8ff702c3aabae.yaml b/nuclei-templates/cve-less/plugins/advance-menu-manager-024bbec9ead04ec628d8ff702c3aabae.yaml new file mode 100644 index 0000000000..037bd0982a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-menu-manager-024bbec9ead04ec628d8ff702c3aabae.yaml @@ -0,0 +1,58 @@ +id: advance-menu-manager-024bbec9ead04ec628d8ff702c3aabae + +info: + name: > + Advance Menu Manager <= 3.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf34af9d-4de7-498d-8065-c3cc6818b7c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-menu-manager/" + google-query: inurl:"/wp-content/plugins/advance-menu-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-menu-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-menu-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-menu-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-menu-manager-0f106f68230dd3847df5cac404354f2e.yaml b/nuclei-templates/cve-less/plugins/advance-menu-manager-0f106f68230dd3847df5cac404354f2e.yaml new file mode 100644 index 0000000000..1ec8cc0120 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-menu-manager-0f106f68230dd3847df5cac404354f2e.yaml @@ -0,0 +1,58 @@ +id: advance-menu-manager-0f106f68230dd3847df5cac404354f2e + +info: + name: > + Advanced Menu Manager <= 3.0.6 - Authenticated (Subscriber+) Menu Creation/Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5111eb6-b4b3-4b18-9de3-577c323eaab8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-menu-manager/" + google-query: inurl:"/wp-content/plugins/advance-menu-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-menu-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-menu-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-menu-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-menu-manager-b07982a67f16a7148433f4d658429720.yaml b/nuclei-templates/cve-less/plugins/advance-menu-manager-b07982a67f16a7148433f4d658429720.yaml new file mode 100644 index 0000000000..8a02ec494b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-menu-manager-b07982a67f16a7148433f4d658429720.yaml @@ -0,0 +1,58 @@ +id: advance-menu-manager-b07982a67f16a7148433f4d658429720 + +info: + name: > + Advanced Menu Manager <= 2.9.6 - Cross-Site Request Forgery to Menu Edition + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d5c5511-570e-4048-8c1b-68cfc831f0c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-menu-manager/" + google-query: inurl:"/wp-content/plugins/advance-menu-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-menu-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-menu-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-menu-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-menu-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/advance-menu-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d4a3527d94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-menu-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: advance-menu-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-menu-manager/" + google-query: inurl:"/wp-content/plugins/advance-menu-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-menu-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-menu-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-menu-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-menu-manager-c848309da304f217f6ed4776631e8c6d.yaml b/nuclei-templates/cve-less/plugins/advance-menu-manager-c848309da304f217f6ed4776631e8c6d.yaml new file mode 100644 index 0000000000..61caf254d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-menu-manager-c848309da304f217f6ed4776631e8c6d.yaml @@ -0,0 +1,58 @@ +id: advance-menu-manager-c848309da304f217f6ed4776631e8c6d + +info: + name: > + Advance Menu Manager <= 3.0.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04ad816b-0ac0-44b5-928a-5bb3e36523b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-menu-manager/" + google-query: inurl:"/wp-content/plugins/advance-menu-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-menu-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-menu-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-menu-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-search-223f6e5ecb381f112c575b56d5d37f09.yaml b/nuclei-templates/cve-less/plugins/advance-search-223f6e5ecb381f112c575b56d5d37f09.yaml new file mode 100644 index 0000000000..96172cbf5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-search-223f6e5ecb381f112c575b56d5d37f09.yaml @@ -0,0 +1,58 @@ +id: advance-search-223f6e5ecb381f112c575b56d5d37f09 + +info: + name: > + WP Advanced Search <= 1.1.6 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d253a001-7023-4070-81c5-35d485ffd36c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-search/" + google-query: inurl:"/wp-content/plugins/advance-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-search-65722f234323ee23193cc280e3922176.yaml b/nuclei-templates/cve-less/plugins/advance-search-65722f234323ee23193cc280e3922176.yaml new file mode 100644 index 0000000000..98c85d3779 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-search-65722f234323ee23193cc280e3922176.yaml @@ -0,0 +1,58 @@ +id: advance-search-65722f234323ee23193cc280e3922176 + +info: + name: > + Advance Search <= 1.1.6 - Cross-Site Request Forgery to Shortcode Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac646ea3-f5e5-4fe9-8e43-ceabbf3f3cc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-search/" + google-query: inurl:"/wp-content/plugins/advance-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-search-e5f9122605f16ebf468dfc1c8cf77f37.yaml b/nuclei-templates/cve-less/plugins/advance-search-e5f9122605f16ebf468dfc1c8cf77f37.yaml new file mode 100644 index 0000000000..7f19fb0a4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-search-e5f9122605f16ebf468dfc1c8cf77f37.yaml @@ -0,0 +1,58 @@ +id: advance-search-e5f9122605f16ebf468dfc1c8cf77f37 + +info: + name: > + Advance Search <= 1.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cae72c7e-9bc8-40a7-b125-c9e8c86b14bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-search/" + google-query: inurl:"/wp-content/plugins/advance-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advance-wc-analytics-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/advance-wc-analytics-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e7d98f9bfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advance-wc-analytics-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: advance-wc-analytics-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advance-wc-analytics/" + google-query: inurl:"/wp-content/plugins/advance-wc-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advance-wc-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advance-wc-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advance-wc-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-0254425f076f9a4e04894c3c01bc9caf.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-0254425f076f9a4e04894c3c01bc9caf.yaml new file mode 100644 index 0000000000..8c4592a45c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-0254425f076f9a4e04894c3c01bc9caf.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-0254425f076f9a4e04894c3c01bc9caf + +info: + name: > + Advanced Access Manager <= 5.9.8.1 - Unauthenticated Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55e0f0df-7be2-4e18-988c-2cc558768eff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-1591ae4acd002a80b846e658ca20b8b2.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-1591ae4acd002a80b846e658ca20b8b2.yaml new file mode 100644 index 0000000000..6459885cf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-1591ae4acd002a80b846e658ca20b8b2.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-1591ae4acd002a80b846e658ca20b8b2 + +info: + name: > + Advanced Access Manager <= 6.9.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a752e211-5ae2-4b85-ac01-872dc829d84c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-1c25b9d9b10bd77a049e735bb0a8965a.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-1c25b9d9b10bd77a049e735bb0a8965a.yaml new file mode 100644 index 0000000000..72c7927abc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-1c25b9d9b10bd77a049e735bb0a8965a.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-1c25b9d9b10bd77a049e735bb0a8965a + +info: + name: > + Advanced Access Manager <= 6.9.20 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e96e94f8-f61c-4458-9ede-53bab30502b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-1cbbbacebab6eafbabdd1ea3e6ed8c33.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-1cbbbacebab6eafbabdd1ea3e6ed8c33.yaml new file mode 100644 index 0000000000..17c3b236a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-1cbbbacebab6eafbabdd1ea3e6ed8c33.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-1cbbbacebab6eafbabdd1ea3e6ed8c33 + +info: + name: > + Advanced Access Manager <= 6.9.18 - Authenticated (Author+) Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1eb25ef3-28ea-4f8f-932a-e90ca1914e8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-2239ca03e49ffeb792ff8f7c625fd4da.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-2239ca03e49ffeb792ff8f7c625fd4da.yaml new file mode 100644 index 0000000000..a5ebcd938f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-2239ca03e49ffeb792ff8f7c625fd4da.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-2239ca03e49ffeb792ff8f7c625fd4da + +info: + name: > + Advanced Access Manager <= 6.6.1 - Authenticated Authorization Bypass and Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e6de586-5621-4eb2-8150-cb42562d289f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-22c3c4fbb2c94545987b2da04e166d40.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-22c3c4fbb2c94545987b2da04e166d40.yaml new file mode 100644 index 0000000000..199f530664 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-22c3c4fbb2c94545987b2da04e166d40.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-22c3c4fbb2c94545987b2da04e166d40 + +info: + name: > + Advanced Access Manager <= 3.2.1 - Unrestricted AJAX Actions allowing Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8530affb-0b6e-4b71-acab-3561cccc1855?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-304412fedec296474e9a664baa039b40.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-304412fedec296474e9a664baa039b40.yaml new file mode 100644 index 0000000000..e1996a151f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-304412fedec296474e9a664baa039b40.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-304412fedec296474e9a664baa039b40 + +info: + name: > + Advanced Access Manager <= 6.9.15 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c50b451-519c-4da8-93ce-b84e594e6775?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-3b7a2e7b6f89f58e23d11ffebc1efd41.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-3b7a2e7b6f89f58e23d11ffebc1efd41.yaml new file mode 100644 index 0000000000..7c9c4faceb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-3b7a2e7b6f89f58e23d11ffebc1efd41.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-3b7a2e7b6f89f58e23d11ffebc1efd41 + +info: + name: > + Advanced Access Manager <= 6.9.18 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1bf4f77-9539-4a9f-afec-f43f602c684f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-7d84c9a9ee6bf717c602d3a38e459b86.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-7d84c9a9ee6bf717c602d3a38e459b86.yaml new file mode 100644 index 0000000000..904301fd7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-7d84c9a9ee6bf717c602d3a38e459b86.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-7d84c9a9ee6bf717c602d3a38e459b86 + +info: + name: > + Advanced Access Manager <= 6.6.1 - Authenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c9da9c-8a92-44fd-a35a-4c6d3777901f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-86962de7248a9bc1e25d4d3ee2951f2c.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-86962de7248a9bc1e25d4d3ee2951f2c.yaml new file mode 100644 index 0000000000..52c92094a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-86962de7248a9bc1e25d4d3ee2951f2c.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-86962de7248a9bc1e25d4d3ee2951f2c + +info: + name: > + Advanced Access Manager <= 6.7.9 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f7e0aa7-8834-4ff1-9ced-5d740936c721?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-access-manager-aa18fa16264ca0049a45d96495a5cf8a.yaml b/nuclei-templates/cve-less/plugins/advanced-access-manager-aa18fa16264ca0049a45d96495a5cf8a.yaml new file mode 100644 index 0000000000..1bda99ea64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-access-manager-aa18fa16264ca0049a45d96495a5cf8a.yaml @@ -0,0 +1,58 @@ +id: advanced-access-manager-aa18fa16264ca0049a45d96495a5cf8a + +info: + name: > + Advanced Access Manager <= 2.8.2 - Arbitrary File Overwrite + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b526b331-8c02-44b1-9555-156afe7ad45a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-access-manager/" + google-query: inurl:"/wp-content/plugins/advanced-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-access-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-admin-search-b5af9134a0dd9c46b02e9a0fe6e4c234.yaml b/nuclei-templates/cve-less/plugins/advanced-admin-search-b5af9134a0dd9c46b02e9a0fe6e4c234.yaml new file mode 100644 index 0000000000..4ba30557c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-admin-search-b5af9134a0dd9c46b02e9a0fe6e4c234.yaml @@ -0,0 +1,58 @@ +id: advanced-admin-search-b5af9134a0dd9c46b02e9a0fe6e4c234 + +info: + name: > + Advanced Admin Search <= 1.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bd670f5-390d-4380-b674-8846fde18d6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-admin-search/" + google-query: inurl:"/wp-content/plugins/advanced-admin-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-admin-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-admin-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-admin-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-ads-0ce7e54d96c7e37996c0287c3e487a8b.yaml b/nuclei-templates/cve-less/plugins/advanced-ads-0ce7e54d96c7e37996c0287c3e487a8b.yaml new file mode 100644 index 0000000000..f2f2e0c235 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-ads-0ce7e54d96c7e37996c0287c3e487a8b.yaml @@ -0,0 +1,58 @@ +id: advanced-ads-0ce7e54d96c7e37996c0287c3e487a8b + +info: + name: > + Advanced Ads – Ad Manager & AdSense <= 1.31.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d1fcdb9-215c-415b-bd47-4cbf9258685b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-ads/" + google-query: inurl:"/wp-content/plugins/advanced-ads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-ads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-ads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-ads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-ads-1cb900b8a90233cac04a7870b7e3d8b4.yaml b/nuclei-templates/cve-less/plugins/advanced-ads-1cb900b8a90233cac04a7870b7e3d8b4.yaml new file mode 100644 index 0000000000..6028927be5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-ads-1cb900b8a90233cac04a7870b7e3d8b4.yaml @@ -0,0 +1,58 @@ +id: advanced-ads-1cb900b8a90233cac04a7870b7e3d8b4 + +info: + name: > + Advanced Ads <= 1.17.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32ac72f7-6bcc-4b5d-925a-9c5fc0c1f065?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-ads/" + google-query: inurl:"/wp-content/plugins/advanced-ads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-ads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-ads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-ads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-ads-83e91dab60d5a445ab0bd5d25903d462.yaml b/nuclei-templates/cve-less/plugins/advanced-ads-83e91dab60d5a445ab0bd5d25903d462.yaml new file mode 100644 index 0000000000..859357db18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-ads-83e91dab60d5a445ab0bd5d25903d462.yaml @@ -0,0 +1,58 @@ +id: advanced-ads-83e91dab60d5a445ab0bd5d25903d462 + +info: + name: > + Advanced Ads – Ad Manager & AdSense <= 1.52.1 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f64336f7-ab2a-4e22-a76f-d077c51f9c57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-ads/" + google-query: inurl:"/wp-content/plugins/advanced-ads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-ads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-ads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-ads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.52.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-ads-e81a4620e336feb8f24131c8ad7dbdcc.yaml b/nuclei-templates/cve-less/plugins/advanced-ads-e81a4620e336feb8f24131c8ad7dbdcc.yaml new file mode 100644 index 0000000000..de84e49041 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-ads-e81a4620e336feb8f24131c8ad7dbdcc.yaml @@ -0,0 +1,58 @@ +id: advanced-ads-e81a4620e336feb8f24131c8ad7dbdcc + +info: + name: > + Advanced Ads – Ad Manager & AdSense <= 1.52.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Ad Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ea634b5-72db-428c-96b4-15ef6025ab1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-ads/" + google-query: inurl:"/wp-content/plugins/advanced-ads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-ads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-ads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-ads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.52.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-ajax-page-loader-e6b2b9642eaa28f30036533185d6907f.yaml b/nuclei-templates/cve-less/plugins/advanced-ajax-page-loader-e6b2b9642eaa28f30036533185d6907f.yaml new file mode 100644 index 0000000000..fa5260457d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-ajax-page-loader-e6b2b9642eaa28f30036533185d6907f.yaml @@ -0,0 +1,58 @@ +id: advanced-ajax-page-loader-e6b2b9642eaa28f30036533185d6907f + +info: + name: > + Advanced AJAX Page Loader < 2.7.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/953e10a1-df11-40d3-869c-2974a344630e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-ajax-page-loader/" + google-query: inurl:"/wp-content/plugins/advanced-ajax-page-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-ajax-page-loader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-ajax-page-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-ajax-page-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-booking-calendar-02c5d62eb1659f29fbc55dae8e4463de.yaml b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-02c5d62eb1659f29fbc55dae8e4463de.yaml new file mode 100644 index 0000000000..9ecc4483da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-02c5d62eb1659f29fbc55dae8e4463de.yaml @@ -0,0 +1,58 @@ +id: advanced-booking-calendar-02c5d62eb1659f29fbc55dae8e4463de + +info: + name: > + Advanced Booking Calendar <= 1.6.9 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48949329-8918-4d37-9f3a-1005e99d7e4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-booking-calendar/" + google-query: inurl:"/wp-content/plugins/advanced-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-booking-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-booking-calendar-26d3ea26eccb41307c119c75a4db08cf.yaml b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-26d3ea26eccb41307c119c75a4db08cf.yaml new file mode 100644 index 0000000000..0482895b8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-26d3ea26eccb41307c119c75a4db08cf.yaml @@ -0,0 +1,58 @@ +id: advanced-booking-calendar-26d3ea26eccb41307c119c75a4db08cf + +info: + name: > + Advanced Booking Calendar <= 1.7.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26f4e785-724b-41d3-b479-cb0150e70f9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-booking-calendar/" + google-query: inurl:"/wp-content/plugins/advanced-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-booking-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-booking-calendar-66bcdef39a721f6e9228bf986823abfb.yaml b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-66bcdef39a721f6e9228bf986823abfb.yaml new file mode 100644 index 0000000000..23a7b35c47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-66bcdef39a721f6e9228bf986823abfb.yaml @@ -0,0 +1,58 @@ +id: advanced-booking-calendar-66bcdef39a721f6e9228bf986823abfb + +info: + name: > + Advanced Booking Calendar <= 1.6.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28c8abf2-09e2-43a2-8666-ca2a896bdbbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-booking-calendar/" + google-query: inurl:"/wp-content/plugins/advanced-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-booking-calendar-88053ac7586fc02cd2a372b5e620460b.yaml b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-88053ac7586fc02cd2a372b5e620460b.yaml new file mode 100644 index 0000000000..5820bbcb98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-88053ac7586fc02cd2a372b5e620460b.yaml @@ -0,0 +1,58 @@ +id: advanced-booking-calendar-88053ac7586fc02cd2a372b5e620460b + +info: + name: > + Advanced Booking Calendar <= 1.6.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d1ad58-894c-40ed-968e-9ce64eebba55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-booking-calendar/" + google-query: inurl:"/wp-content/plugins/advanced-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-booking-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-booking-calendar-a9aa77a954191266292b06f87ea42806.yaml b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-a9aa77a954191266292b06f87ea42806.yaml new file mode 100644 index 0000000000..0f7a1b6b80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-a9aa77a954191266292b06f87ea42806.yaml @@ -0,0 +1,58 @@ +id: advanced-booking-calendar-a9aa77a954191266292b06f87ea42806 + +info: + name: > + Advanced Booking Calendar <= 1.7.0 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eee60ee9-ec48-4c09-9905-edd2dbbcccf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-booking-calendar/" + google-query: inurl:"/wp-content/plugins/advanced-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-booking-calendar-d4656841565576de3042f9c9b59d5ada.yaml b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-d4656841565576de3042f9c9b59d5ada.yaml new file mode 100644 index 0000000000..7b34844516 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-d4656841565576de3042f9c9b59d5ada.yaml @@ -0,0 +1,58 @@ +id: advanced-booking-calendar-d4656841565576de3042f9c9b59d5ada + +info: + name: > + Advanced Booking Calendar <= 1.6.6 - Reflected Cross-Site Scripting via calId Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d20bae1-5a94-402b-9001-725b433c9d55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-booking-calendar/" + google-query: inurl:"/wp-content/plugins/advanced-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-booking-calendar-e81bb0ad426b5246d688d9a7f2eaddcb.yaml b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-e81bb0ad426b5246d688d9a7f2eaddcb.yaml new file mode 100644 index 0000000000..3b1b061ae0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-e81bb0ad426b5246d688d9a7f2eaddcb.yaml @@ -0,0 +1,58 @@ +id: advanced-booking-calendar-e81bb0ad426b5246d688d9a7f2eaddcb + +info: + name: > + Advanced Booking Calendar <= 1.7.1 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46c40aed-1df9-4c20-9058-1ae62864fc9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-booking-calendar/" + google-query: inurl:"/wp-content/plugins/advanced-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-booking-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-booking-calendar-ee1cda86ab18e381ca4e90653a705f3b.yaml b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-ee1cda86ab18e381ca4e90653a705f3b.yaml new file mode 100644 index 0000000000..2b4e179aa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-booking-calendar-ee1cda86ab18e381ca4e90653a705f3b.yaml @@ -0,0 +1,58 @@ +id: advanced-booking-calendar-ee1cda86ab18e381ca4e90653a705f3b + +info: + name: > + Advanced Booking Calendar <= 1.7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7794f043-0e0b-4ff3-b2dd-1caff8d7168d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-booking-calendar/" + google-query: inurl:"/wp-content/plugins/advanced-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-category-template-850462c19f63654938faf5f00514f8c4.yaml b/nuclei-templates/cve-less/plugins/advanced-category-template-850462c19f63654938faf5f00514f8c4.yaml new file mode 100644 index 0000000000..e5807a4868 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-category-template-850462c19f63654938faf5f00514f8c4.yaml @@ -0,0 +1,58 @@ +id: advanced-category-template-850462c19f63654938faf5f00514f8c4 + +info: + name: > + Advanced Category Template <= 0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da09b158-3626-455b-b3bc-b1109d0fab2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-category-template/" + google-query: inurl:"/wp-content/plugins/advanced-category-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-category-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-category-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-category-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-category-template-eaf398ea01fd7dda89f0e980c07588c4.yaml b/nuclei-templates/cve-less/plugins/advanced-category-template-eaf398ea01fd7dda89f0e980c07588c4.yaml new file mode 100644 index 0000000000..3f736c36a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-category-template-eaf398ea01fd7dda89f0e980c07588c4.yaml @@ -0,0 +1,58 @@ +id: advanced-category-template-eaf398ea01fd7dda89f0e980c07588c4 + +info: + name: > + Advanced Category Template <= 0.1 - Stored Cross-Site Scripting via Cross-Site Request Forgery in _form.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e18ae7a9-7761-432f-a983-16ff1131c1e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-category-template/" + google-query: inurl:"/wp-content/plugins/advanced-category-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-category-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-category-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-category-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-cf7-db-09b9a87909e1abd2b1771c596b468a9f.yaml b/nuclei-templates/cve-less/plugins/advanced-cf7-db-09b9a87909e1abd2b1771c596b468a9f.yaml new file mode 100644 index 0000000000..004042ab4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-cf7-db-09b9a87909e1abd2b1771c596b468a9f.yaml @@ -0,0 +1,58 @@ +id: advanced-cf7-db-09b9a87909e1abd2b1771c596b468a9f + +info: + name: > + Advanced Contact form 7 DB <= 1.6.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf70f652-5244-421c-8ee6-75719315ed64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-cf7-db/" + google-query: inurl:"/wp-content/plugins/advanced-cf7-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-cf7-db,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-cf7-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-cf7-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-cf7-db-0ac820af26b82917a9384c67560e13a6.yaml b/nuclei-templates/cve-less/plugins/advanced-cf7-db-0ac820af26b82917a9384c67560e13a6.yaml new file mode 100644 index 0000000000..7c15c74f9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-cf7-db-0ac820af26b82917a9384c67560e13a6.yaml @@ -0,0 +1,58 @@ +id: advanced-cf7-db-0ac820af26b82917a9384c67560e13a6 + +info: + name: > + Advanced Contact form 7 DB <= 1.8.6 - Authenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4891fd3f-563b-497a-a5d9-617f4862298b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-cf7-db/" + google-query: inurl:"/wp-content/plugins/advanced-cf7-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-cf7-db,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-cf7-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-cf7-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-cf7-db-4039c397e350c84a436243d9a4f3eab1.yaml b/nuclei-templates/cve-less/plugins/advanced-cf7-db-4039c397e350c84a436243d9a4f3eab1.yaml new file mode 100644 index 0000000000..e10f329fe6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-cf7-db-4039c397e350c84a436243d9a4f3eab1.yaml @@ -0,0 +1,58 @@ +id: advanced-cf7-db-4039c397e350c84a436243d9a4f3eab1 + +info: + name: > + Advanced Contact form 7 DB <= 1.8.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4598202a-f883-44c9-83bf-e8b72e418e3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-cf7-db/" + google-query: inurl:"/wp-content/plugins/advanced-cf7-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-cf7-db,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-cf7-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-cf7-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-cf7-db-cf64bc2fcdc70126dfb7b9884847888f.yaml b/nuclei-templates/cve-less/plugins/advanced-cf7-db-cf64bc2fcdc70126dfb7b9884847888f.yaml new file mode 100644 index 0000000000..c400276d35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-cf7-db-cf64bc2fcdc70126dfb7b9884847888f.yaml @@ -0,0 +1,58 @@ +id: advanced-cf7-db-cf64bc2fcdc70126dfb7b9884847888f + +info: + name: > + Advanced Contact Form 7 DB <= 1.6.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14d48a81-c6b5-415f-8c82-5fd40b2e790a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-cf7-db/" + google-query: inurl:"/wp-content/plugins/advanced-cf7-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-cf7-db,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-cf7-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-cf7-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-7909b368603f8e81e96e69064ab1be28.yaml b/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-7909b368603f8e81e96e69064ab1be28.yaml new file mode 100644 index 0000000000..9d9da5bd2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-7909b368603f8e81e96e69064ab1be28.yaml @@ -0,0 +1,58 @@ +id: advanced-classifieds-and-directory-pro-7909b368603f8e81e96e69064ab1be28 + +info: + name: > + Advanced Classifieds & Directory Pro <= 3.0.0 - Missing Authorization to Arbitrary Attachment Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc5da189-838d-4c0b-a734-283c4da36473?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-classifieds-and-directory-pro/" + google-query: inurl:"/wp-content/plugins/advanced-classifieds-and-directory-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-classifieds-and-directory-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-classifieds-and-directory-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-classifieds-and-directory-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..41b88da645 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: advanced-classifieds-and-directory-pro-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-classifieds-and-directory-pro/" + google-query: inurl:"/wp-content/plugins/advanced-classifieds-and-directory-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-classifieds-and-directory-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-classifieds-and-directory-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-classifieds-and-directory-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..ee6e75c991 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-classifieds-and-directory-pro-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: advanced-classifieds-and-directory-pro-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-classifieds-and-directory-pro/" + google-query: inurl:"/wp-content/plugins/advanced-classifieds-and-directory-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-classifieds-and-directory-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-classifieds-and-directory-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-classifieds-and-directory-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-coupons-for-woocommerce-free-bf87097eab97d5618311a5d6293581ee.yaml b/nuclei-templates/cve-less/plugins/advanced-coupons-for-woocommerce-free-bf87097eab97d5618311a5d6293581ee.yaml new file mode 100644 index 0000000000..bf086e2b0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-coupons-for-woocommerce-free-bf87097eab97d5618311a5d6293581ee.yaml @@ -0,0 +1,58 @@ +id: advanced-coupons-for-woocommerce-free-bf87097eab97d5618311a5d6293581ee + +info: + name: > + Advanced Coupons for WooCommerce Coupons <= 4.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66bd0a9f-66ec-42a5-a123-0a468bb43ed8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-coupons-for-woocommerce-free/" + google-query: inurl:"/wp-content/plugins/advanced-coupons-for-woocommerce-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-coupons-for-woocommerce-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-coupons-for-woocommerce-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-coupons-for-woocommerce-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-cron-manager-330ef9633d0984d1501cc01b4833593f.yaml b/nuclei-templates/cve-less/plugins/advanced-cron-manager-330ef9633d0984d1501cc01b4833593f.yaml new file mode 100644 index 0000000000..409ad4bd37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-cron-manager-330ef9633d0984d1501cc01b4833593f.yaml @@ -0,0 +1,58 @@ +id: advanced-cron-manager-330ef9633d0984d1501cc01b4833593f + +info: + name: > + Advanced Cron Manager – debug & control <= 2.5.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c8faa22-ff1f-4267-b690-a2c51c4807f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-cron-manager/" + google-query: inurl:"/wp-content/plugins/advanced-cron-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-cron-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-cron-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-cron-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-cron-manager-9b156b803761678f004bbe691278814c.yaml b/nuclei-templates/cve-less/plugins/advanced-cron-manager-9b156b803761678f004bbe691278814c.yaml new file mode 100644 index 0000000000..8badad1827 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-cron-manager-9b156b803761678f004bbe691278814c.yaml @@ -0,0 +1,58 @@ +id: advanced-cron-manager-9b156b803761678f004bbe691278814c + +info: + name: > + Advanced Cron Manager <= 2.4.1 - Subscriber+ Arbitrary Events/Schedules Creation/Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/935bf651-888e-4922-81fc-7e2e5a6fe3ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-cron-manager/" + google-query: inurl:"/wp-content/plugins/advanced-cron-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-cron-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-cron-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-cron-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-cron-manager-pro-9b156b803761678f004bbe691278814c.yaml b/nuclei-templates/cve-less/plugins/advanced-cron-manager-pro-9b156b803761678f004bbe691278814c.yaml new file mode 100644 index 0000000000..52fe5def73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-cron-manager-pro-9b156b803761678f004bbe691278814c.yaml @@ -0,0 +1,58 @@ +id: advanced-cron-manager-pro-9b156b803761678f004bbe691278814c + +info: + name: > + Advanced Cron Manager <= 2.4.1 - Subscriber+ Arbitrary Events/Schedules Creation/Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/935bf651-888e-4922-81fc-7e2e5a6fe3ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-cron-manager-pro/" + google-query: inurl:"/wp-content/plugins/advanced-cron-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-cron-manager-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-cron-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-cron-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-currency-switcher-22846449cdda1461ad8961f070d0c8f7.yaml b/nuclei-templates/cve-less/plugins/advanced-currency-switcher-22846449cdda1461ad8961f070d0c8f7.yaml new file mode 100644 index 0000000000..d3d7bb76ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-currency-switcher-22846449cdda1461ad8961f070d0c8f7.yaml @@ -0,0 +1,58 @@ +id: advanced-currency-switcher-22846449cdda1461ad8961f070d0c8f7 + +info: + name: > + Currency Switcher for WordPress <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5867f37-ae58-4f75-828e-bb99b3e5252e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-currency-switcher/" + google-query: inurl:"/wp-content/plugins/advanced-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-27283408ce212ababfa6ab6738bcc33b.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-27283408ce212ababfa6ab6738bcc33b.yaml new file mode 100644 index 0000000000..ac9969ff01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-27283408ce212ababfa6ab6738bcc33b.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-27283408ce212ababfa6ab6738bcc33b + +info: + name: > + Advanced Custom Fields <= 5.12.2 - File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5bab390-1590-44f2-8c65-bc329955ed84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-3a746fc902e2b6559213043452550064.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-3a746fc902e2b6559213043452550064.yaml new file mode 100644 index 0000000000..d2fafdcc34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-3a746fc902e2b6559213043452550064.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-3a746fc902e2b6559213043452550064 + +info: + name: > + Advanced Custom Fields <= 5.10 - Missing Authorization to Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c51889e4-9ca2-4c3f-addb-8285579324f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-5ab0380f0225cb3f813fd2faf9e0804b.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-5ab0380f0225cb3f813fd2faf9e0804b.yaml new file mode 100644 index 0000000000..d328b2c621 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-5ab0380f0225cb3f813fd2faf9e0804b.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-5ab0380f0225cb3f813fd2faf9e0804b + +info: + name: > + Advanced Custom Fields <= 6.0.7 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b13e1916-2a02-4a91-acf1-6e5d7c55bd57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 6.0.0', '<= 6.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-62768c2e4740e3e20150e0c67af690b3.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-62768c2e4740e3e20150e0c67af690b3.yaml new file mode 100644 index 0000000000..33d0ee8189 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-62768c2e4740e3e20150e0c67af690b3.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-62768c2e4740e3e20150e0c67af690b3 + +info: + name: > + Advanced Custom Fields 6.1 - 6.1.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f412bdb0-953d-4375-85c2-b87f3aa77d60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 6.1', '<= 6.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-728081d1e4f34c41ac0cf5df180e962c.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-728081d1e4f34c41ac0cf5df180e962c.yaml new file mode 100644 index 0000000000..7b2a836bc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-728081d1e4f34c41ac0cf5df180e962c.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-728081d1e4f34c41ac0cf5df180e962c + +info: + name: > + Advanced Custom Fields <= 5.7.11 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5eab8a5d-8eb8-495f-a953-b468360cc5d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-72b80dd4bc94210ab9dd3b1876e438ee.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-72b80dd4bc94210ab9dd3b1876e438ee.yaml new file mode 100644 index 0000000000..c54bedbe55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-72b80dd4bc94210ab9dd3b1876e438ee.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-72b80dd4bc94210ab9dd3b1876e438ee + +info: + name: > + Advanced Custom Fields <= 5.8.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70110d50-853d-4972-a5a0-b5c566ba7de6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-73ae88fd78bf0becac09b57aa5f8c767.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-73ae88fd78bf0becac09b57aa5f8c767.yaml new file mode 100644 index 0000000000..7a3fa6e356 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-73ae88fd78bf0becac09b57aa5f8c767.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-73ae88fd78bf0becac09b57aa5f8c767 + +info: + name: > + Advanced Custom Fields <= 6.0.2 - Authenticated (Contributor+) Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b26093a-ffb8-4d22-add1-eecd94f88129?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-74d01cddad4cc8a47fb2dbd74bd23ca7.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-74d01cddad4cc8a47fb2dbd74bd23ca7.yaml new file mode 100644 index 0000000000..62ef148b6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-74d01cddad4cc8a47fb2dbd74bd23ca7.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-74d01cddad4cc8a47fb2dbd74bd23ca7 + +info: + name: > + Advanced Custom Fields <= 3.5.1 - Remote Code Execution via Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dfba044-42f8-44a2-be62-99af9d9094c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-a5138dbd3ab5f7be9499c9facaa915f6.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-a5138dbd3ab5f7be9499c9facaa915f6.yaml new file mode 100644 index 0000000000..7d1ced8f4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-a5138dbd3ab5f7be9499c9facaa915f6.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-a5138dbd3ab5f7be9499c9facaa915f6 + +info: + name: > + Advanced Custom Fields <= 5.12 - Authenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76cd5762-1ad4-4b76-8161-5a4ce4fc8118?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-a56a7a539382d6f88ae2afe6cc65c72c.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-a56a7a539382d6f88ae2afe6cc65c72c.yaml new file mode 100644 index 0000000000..3f3cbd7db0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-a56a7a539382d6f88ae2afe6cc65c72c.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-a56a7a539382d6f88ae2afe6cc65c72c + +info: + name: > + Advanced Custom Fields <= 5.7.7 - Author+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36d37997-ac50-4d00-bc12-f3904483e15f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml new file mode 100644 index 0000000000..d450b5bed3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-a884ba3ced03b9e7f96ca4d17e7aff9b + +info: + name: > + Advanced Custom Fields <= 6.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3593dfd-7b2a-4d01-8af0-725b444dc81b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-d907690c5c767a972864a779d8ced723.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-d907690c5c767a972864a779d8ced723.yaml new file mode 100644 index 0000000000..5a2d9507d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-d907690c5c767a972864a779d8ced723.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-d907690c5c767a972864a779d8ced723 + +info: + name: > + Advanced Custom Fields <= 5.10 - Missing Authorization to Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1eb0852-00ef-489a-aa39-7d8603249deb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-db2d8a1251fb5f78024e34146e92e4d0.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-db2d8a1251fb5f78024e34146e92e4d0.yaml new file mode 100644 index 0000000000..5f6c9e7219 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-db2d8a1251fb5f78024e34146e92e4d0.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-db2d8a1251fb5f78024e34146e92e4d0 + +info: + name: > + Advanced Custom Fields <= 5.10 - Missing Authorization on Option Changes + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/878246f7-17c5-4ea0-a450-27244ace2717?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-ebdf981fa373e4823561a65bb577a1a2.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-ebdf981fa373e4823561a65bb577a1a2.yaml new file mode 100644 index 0000000000..e3a3305e1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-ebdf981fa373e4823561a65bb577a1a2.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-ebdf981fa373e4823561a65bb577a1a2 + +info: + name: > + Advanced Custom Fields (Free and Pro) 5.8.10 to 5.12.5 & 6.0.0 to 6.1.5 - Reflected Cross-Site Scripting via 'post_status' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ae8dcd-00b6-4afc-85bb-6697820bb37c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 6.0.0', '<= 6.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-195a4f0d8d0765a9379e79abc595005a.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-195a4f0d8d0765a9379e79abc595005a.yaml new file mode 100644 index 0000000000..1539ff74fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-195a4f0d8d0765a9379e79abc595005a.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-pro-195a4f0d8d0765a9379e79abc595005a + +info: + name: > + Advanced Custom Fields Pro <= 5.9.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a09771da-a423-42ba-8f59-5c3bd189d9d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-3a746fc902e2b6559213043452550064.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-3a746fc902e2b6559213043452550064.yaml new file mode 100644 index 0000000000..08ee9caa65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-3a746fc902e2b6559213043452550064.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-pro-3a746fc902e2b6559213043452550064 + +info: + name: > + Advanced Custom Fields <= 5.10 - Missing Authorization to Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c51889e4-9ca2-4c3f-addb-8285579324f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-877a1559edb434fbb6761e8bcd1aaf40.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-877a1559edb434fbb6761e8bcd1aaf40.yaml new file mode 100644 index 0000000000..8a96279ff9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-877a1559edb434fbb6761e8bcd1aaf40.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-pro-877a1559edb434fbb6761e8bcd1aaf40 + +info: + name: > + Advanced Custom Fields PRO 6.1 - 6.1.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77876d74-5825-4bd8-812e-87061d0470e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 6.1', '<= 6.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-a5138dbd3ab5f7be9499c9facaa915f6.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-a5138dbd3ab5f7be9499c9facaa915f6.yaml new file mode 100644 index 0000000000..204e458364 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-a5138dbd3ab5f7be9499c9facaa915f6.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-pro-a5138dbd3ab5f7be9499c9facaa915f6 + +info: + name: > + Advanced Custom Fields <= 5.12 - Authenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76cd5762-1ad4-4b76-8161-5a4ce4fc8118?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml new file mode 100644 index 0000000000..5bfaa80868 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-pro-a884ba3ced03b9e7f96ca4d17e7aff9b + +info: + name: > + Advanced Custom Fields <= 6.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3593dfd-7b2a-4d01-8af0-725b444dc81b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-d907690c5c767a972864a779d8ced723.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-d907690c5c767a972864a779d8ced723.yaml new file mode 100644 index 0000000000..a5704d603f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-d907690c5c767a972864a779d8ced723.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-pro-d907690c5c767a972864a779d8ced723 + +info: + name: > + Advanced Custom Fields <= 5.10 - Missing Authorization to Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1eb0852-00ef-489a-aa39-7d8603249deb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-db2d8a1251fb5f78024e34146e92e4d0.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-db2d8a1251fb5f78024e34146e92e4d0.yaml new file mode 100644 index 0000000000..cca5ff5640 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-db2d8a1251fb5f78024e34146e92e4d0.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-pro-db2d8a1251fb5f78024e34146e92e4d0 + +info: + name: > + Advanced Custom Fields <= 5.10 - Missing Authorization on Option Changes + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/878246f7-17c5-4ea0-a450-27244ace2717?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-ebdf981fa373e4823561a65bb577a1a2.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-ebdf981fa373e4823561a65bb577a1a2.yaml new file mode 100644 index 0000000000..fb02c25a93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-pro-ebdf981fa373e4823561a65bb577a1a2.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-pro-ebdf981fa373e4823561a65bb577a1a2 + +info: + name: > + Advanced Custom Fields (Free and Pro) 5.8.10 to 5.12.5 & 6.0.0 to 6.1.5 - Reflected Cross-Site Scripting via 'post_status' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ae8dcd-00b6-4afc-85bb-6697820bb37c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 6.0.0', '<= 6.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-custom-fields-table-field-f0cdadcff316feb53fd77aca416bb2f6.yaml b/nuclei-templates/cve-less/plugins/advanced-custom-fields-table-field-f0cdadcff316feb53fd77aca416bb2f6.yaml new file mode 100644 index 0000000000..178985afd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-custom-fields-table-field-f0cdadcff316feb53fd77aca416bb2f6.yaml @@ -0,0 +1,58 @@ +id: advanced-custom-fields-table-field-f0cdadcff316feb53fd77aca416bb2f6 + +info: + name: > + Advanced Custom Fields: Table Field < 1.1.13 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f19c84c7-9b27-48b0-b648-b5681eff1371?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-custom-fields-table-field/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-table-field/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-custom-fields-table-field,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-table-field/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-custom-fields-table-field" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-database-cleaner-317c2d6753e5308f0908f9dfb1cd475a.yaml b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-317c2d6753e5308f0908f9dfb1cd475a.yaml new file mode 100644 index 0000000000..9a13550fe1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-317c2d6753e5308f0908f9dfb1cd475a.yaml @@ -0,0 +1,58 @@ +id: advanced-database-cleaner-317c2d6753e5308f0908f9dfb1cd475a + +info: + name: > + Advanced Database Cleaner <= 3.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/887ca432-5412-401c-8d4e-52dcb511e5ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-database-cleaner/" + google-query: inurl:"/wp-content/plugins/advanced-database-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-database-cleaner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-database-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-database-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-database-cleaner-655a7a3d142e2b2810e2cbdce0fda49a.yaml b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-655a7a3d142e2b2810e2cbdce0fda49a.yaml new file mode 100644 index 0000000000..0fe330cbdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-655a7a3d142e2b2810e2cbdce0fda49a.yaml @@ -0,0 +1,58 @@ +id: advanced-database-cleaner-655a7a3d142e2b2810e2cbdce0fda49a + +info: + name: > + Advanced Database Cleaner <= 3.0.1 - SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db484c8a-e46d-457b-b634-28d823ff2120?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-database-cleaner/" + google-query: inurl:"/wp-content/plugins/advanced-database-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-database-cleaner,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-database-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-database-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-database-cleaner-662b0d4e06b53c4127af628452071119.yaml b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-662b0d4e06b53c4127af628452071119.yaml new file mode 100644 index 0000000000..e93ee3f116 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-662b0d4e06b53c4127af628452071119.yaml @@ -0,0 +1,58 @@ +id: advanced-database-cleaner-662b0d4e06b53c4127af628452071119 + +info: + name: > + Advanced Database Cleaner <= 3.1.2 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62c46925-8e97-4989-8c2c-56223d6911a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-database-cleaner/" + google-query: inurl:"/wp-content/plugins/advanced-database-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-database-cleaner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-database-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-database-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-database-cleaner-672e25f5e31f63e7bd1671bc45955d6f.yaml b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-672e25f5e31f63e7bd1671bc45955d6f.yaml new file mode 100644 index 0000000000..78d708042b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-672e25f5e31f63e7bd1671bc45955d6f.yaml @@ -0,0 +1,58 @@ +id: advanced-database-cleaner-672e25f5e31f63e7bd1671bc45955d6f + +info: + name: > + Advanced Database Cleaner <= 3.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5947859-df78-475b-89b4-ad2441d9cf63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-database-cleaner/" + google-query: inurl:"/wp-content/plugins/advanced-database-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-database-cleaner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-database-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-database-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-database-cleaner-6bf8881666d7b800c84c385bcfdc33c4.yaml b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-6bf8881666d7b800c84c385bcfdc33c4.yaml new file mode 100644 index 0000000000..e2f5e53965 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-6bf8881666d7b800c84c385bcfdc33c4.yaml @@ -0,0 +1,58 @@ +id: advanced-database-cleaner-6bf8881666d7b800c84c385bcfdc33c4 + +info: + name: > + Advanced Database Cleaner <= 3.1.1 - Cross-Site Request Forgery via aDBc_save_settings_callback + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5af799a4-0aee-4601-943e-82cbc860ede5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-database-cleaner/" + google-query: inurl:"/wp-content/plugins/advanced-database-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-database-cleaner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-database-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-database-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-database-cleaner-f22c4e2a2ebc3ea71e41c368cf894811.yaml b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-f22c4e2a2ebc3ea71e41c368cf894811.yaml new file mode 100644 index 0000000000..2b774679f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-database-cleaner-f22c4e2a2ebc3ea71e41c368cf894811.yaml @@ -0,0 +1,58 @@ +id: advanced-database-cleaner-f22c4e2a2ebc3ea71e41c368cf894811 + +info: + name: > + Advanced Database Cleaner <= 3.1.3 - Authenticated(Administrator+) PHP Object Injection via process_bulk_action + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0b8c24b-3e51-4637-9d8e-da065077d082?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-database-cleaner/" + google-query: inurl:"/wp-content/plugins/advanced-database-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-database-cleaner,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-database-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-database-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-database-replacer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/advanced-database-replacer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..281e279130 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-database-replacer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: advanced-database-replacer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-database-replacer/" + google-query: inurl:"/wp-content/plugins/advanced-database-replacer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-database-replacer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-database-replacer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-database-replacer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dewplayer-9d0309e800290fb37ba28ab13061e40e.yaml b/nuclei-templates/cve-less/plugins/advanced-dewplayer-9d0309e800290fb37ba28ab13061e40e.yaml new file mode 100644 index 0000000000..4bd5a831b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dewplayer-9d0309e800290fb37ba28ab13061e40e.yaml @@ -0,0 +1,58 @@ +id: advanced-dewplayer-9d0309e800290fb37ba28ab13061e40e + +info: + name: > + Advanced Dewplayer < 1.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f319613-2709-449c-9e13-b0f95ee0b88b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dewplayer/" + google-query: inurl:"/wp-content/plugins/advanced-dewplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dewplayer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dewplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dewplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dewplayer-e75a2e4fcc95441946c7906f7e8c8fdf.yaml b/nuclei-templates/cve-less/plugins/advanced-dewplayer-e75a2e4fcc95441946c7906f7e8c8fdf.yaml new file mode 100644 index 0000000000..6731c0516b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dewplayer-e75a2e4fcc95441946c7906f7e8c8fdf.yaml @@ -0,0 +1,58 @@ +id: advanced-dewplayer-e75a2e4fcc95441946c7906f7e8c8fdf + +info: + name: > + Dewplayer <= 1.2 and Advanced Dewplayer < 1.5 - Content Spoofing/Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62687f24-4be2-49de-9a7d-265325b0f72b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dewplayer/" + google-query: inurl:"/wp-content/plugins/advanced-dewplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dewplayer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dewplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dewplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-13af69fc3b4639d4eee1c5f8765f3113.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-13af69fc3b4639d4eee1c5f8765f3113.yaml new file mode 100644 index 0000000000..97065995a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-13af69fc3b4639d4eee1c5f8765f3113.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-13af69fc3b4639d4eee1c5f8765f3113 + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Missing Authorization in migrateProductOnlyToCommon function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59ff3445-0dfd-4a1a-9ac8-d088b8f4dbf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-221eba2ef4992774b45479de6031a5d3.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-221eba2ef4992774b45479de6031a5d3.yaml new file mode 100644 index 0000000000..76e20b6f98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-221eba2ef4992774b45479de6031a5d3.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-221eba2ef4992774b45479de6031a5d3 + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Cross-Site Request Forgery via migrateProductOnlyToCommon function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f062ef2-ef94-47c2-8eba-dc7ff6c2537d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-2b7649bf0d1b33f22a628883cdb8312a.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-2b7649bf0d1b33f22a628883cdb8312a.yaml new file mode 100644 index 0000000000..4156077a89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-2b7649bf0d1b33f22a628883cdb8312a.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-2b7649bf0d1b33f22a628883cdb8312a + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/009a6ae4-e9b5-4199-be25-b60e06dc136b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-37fc83c506180cf381ac5dfbd233eafb.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-37fc83c506180cf381ac5dfbd233eafb.yaml new file mode 100644 index 0000000000..02e5d9db5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-37fc83c506180cf381ac5dfbd233eafb.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-37fc83c506180cf381ac5dfbd233eafb + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.3 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d379721-d629-433d-ba89-a74c9dec537e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-69850835aba43cc07b9062e15e01dfd5.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-69850835aba43cc07b9062e15e01dfd5.yaml new file mode 100644 index 0000000000..8a0e8299b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-69850835aba43cc07b9062e15e01dfd5.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-69850835aba43cc07b9062e15e01dfd5 + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Cross-Site Request Forgery via migrateCommonToProductOnly function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/048768bf-326c-455e-919c-9691d6537062?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-739c3b6a5da1b82e1034ec2752c5a42f.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-739c3b6a5da1b82e1034ec2752c5a42f.yaml new file mode 100644 index 0000000000..5c5054ab3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-739c3b6a5da1b82e1034ec2752c5a42f.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-739c3b6a5da1b82e1034ec2752c5a42f + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84b609a5-d3d6-4a30-b55e-7f7972c64ccb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-9036eb8b1e0f76afba77e37799b01f92.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-9036eb8b1e0f76afba77e37799b01f92.yaml new file mode 100644 index 0000000000..d2b8f5785f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-9036eb8b1e0f76afba77e37799b01f92.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-9036eb8b1e0f76afba77e37799b01f92 + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Missing Authorization in ajaxCalculateSeveralProducts function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f58f994e-0a9b-4b40-9e38-535169c793d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-aa979abd3b3cb9b7bb1cd2ef795b502b.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-aa979abd3b3cb9b7bb1cd2ef795b502b.yaml new file mode 100644 index 0000000000..2de69d3b5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-aa979abd3b3cb9b7bb1cd2ef795b502b.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-aa979abd3b3cb9b7bb1cd2ef795b502b + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5681101f-13c3-4fde-bbde-554810bcbe4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-bb5f8ff13ce89043a17957f4917820c9.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-bb5f8ff13ce89043a17957f4917820c9.yaml new file mode 100644 index 0000000000..55686ac6a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-bb5f8ff13ce89043a17957f4917820c9.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-bb5f8ff13ce89043a17957f4917820c9 + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Cross-Site Request Forgery via handleSubmitAction function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/272c6fbb-bc85-46d9-b139-87534b2a0842?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-bcf8e746293c2a8c7e07a4dcb5e63f07.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-bcf8e746293c2a8c7e07a4dcb5e63f07.yaml new file mode 100644 index 0000000000..7e18cb9cc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-bcf8e746293c2a8c7e07a4dcb5e63f07.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-bcf8e746293c2a8c7e07a4dcb5e63f07 + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Missing Authorization in migrateCommonToProductOnly function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de46743b-2cc6-4a29-bbc4-bc6cfb540e26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-fc8048569d06ebc90ac21a7212b76518.yaml b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-fc8048569d06ebc90ac21a7212b76518.yaml new file mode 100644 index 0000000000..2cab05af63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-dynamic-pricing-for-woocommerce-fc8048569d06ebc90ac21a7212b76518.yaml @@ -0,0 +1,58 @@ +id: advanced-dynamic-pricing-for-woocommerce-fc8048569d06ebc90ac21a7212b76518 + +info: + name: > + Advanced Dynamic Pricing for WooCommerce <= 4.1.5 - Missing Authorization in ajaxCalculatePrice function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cefa293-c934-413e-b946-07e3060472ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-dynamic-pricing-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-dynamic-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-dynamic-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-facebook-twitter-widget-04f6cc7c3ad39880573726a5f936d0a4.yaml b/nuclei-templates/cve-less/plugins/advanced-facebook-twitter-widget-04f6cc7c3ad39880573726a5f936d0a4.yaml new file mode 100644 index 0000000000..ff9ad00e47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-facebook-twitter-widget-04f6cc7c3ad39880573726a5f936d0a4.yaml @@ -0,0 +1,58 @@ +id: advanced-facebook-twitter-widget-04f6cc7c3ad39880573726a5f936d0a4 + +info: + name: > + Advanced Social Feeds Widget & Shortcode <= 1.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cf894fd-37c7-4006-b868-d5d33f66cc5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-facebook-twitter-widget/" + google-query: inurl:"/wp-content/plugins/advanced-facebook-twitter-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-facebook-twitter-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-facebook-twitter-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-facebook-twitter-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-flamingo-608028938d46bc393127dab9f8a1b9fb.yaml b/nuclei-templates/cve-less/plugins/advanced-flamingo-608028938d46bc393127dab9f8a1b9fb.yaml new file mode 100644 index 0000000000..b85cd66656 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-flamingo-608028938d46bc393127dab9f8a1b9fb.yaml @@ -0,0 +1,58 @@ +id: advanced-flamingo-608028938d46bc393127dab9f8a1b9fb + +info: + name: > + Advanced Flamingo <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ce8ad5f-05e8-4279-915a-1c94559d4e56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-flamingo/" + google-query: inurl:"/wp-content/plugins/advanced-flamingo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-flamingo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-flamingo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-flamingo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-floating-content-lite-18a7728320d1ae3570e8bc349a822d19.yaml b/nuclei-templates/cve-less/plugins/advanced-floating-content-lite-18a7728320d1ae3570e8bc349a822d19.yaml new file mode 100644 index 0000000000..eb5232a1f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-floating-content-lite-18a7728320d1ae3570e8bc349a822d19.yaml @@ -0,0 +1,58 @@ +id: advanced-floating-content-lite-18a7728320d1ae3570e8bc349a822d19 + +info: + name: > + Advanced Floating Content Lite <= 1.2.5 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a798ffe0-b81d-4c5f-a864-ed72a5312a16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-floating-content-lite/" + google-query: inurl:"/wp-content/plugins/advanced-floating-content-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-floating-content-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-floating-content-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-floating-content-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-floating-content-lite-f9f9f8843b8a77c541ca723acfae2e44.yaml b/nuclei-templates/cve-less/plugins/advanced-floating-content-lite-f9f9f8843b8a77c541ca723acfae2e44.yaml new file mode 100644 index 0000000000..fb97754bc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-floating-content-lite-f9f9f8843b8a77c541ca723acfae2e44.yaml @@ -0,0 +1,58 @@ +id: advanced-floating-content-lite-f9f9f8843b8a77c541ca723acfae2e44 + +info: + name: > + Advanced Floating Content <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9346103-9773-4cda-9b32-d3ce2076e8fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-floating-content-lite/" + google-query: inurl:"/wp-content/plugins/advanced-floating-content-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-floating-content-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-floating-content-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-floating-content-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-form-integration-78c3981cb87a9d312796397fd5fb8a1d.yaml b/nuclei-templates/cve-less/plugins/advanced-form-integration-78c3981cb87a9d312796397fd5fb8a1d.yaml new file mode 100644 index 0000000000..2ce1c9f313 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-form-integration-78c3981cb87a9d312796397fd5fb8a1d.yaml @@ -0,0 +1,58 @@ +id: advanced-form-integration-78c3981cb87a9d312796397fd5fb8a1d + +info: + name: > + Connect Contact Form 7, WooCommerce To Google Sheets & Other Platforms – Advanced Form Integration <= 1.62.0 - Authenticated (Admin+) Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e9458e4-570e-4871-84ac-380107037b1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-form-integration/" + google-query: inurl:"/wp-content/plugins/advanced-form-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-form-integration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-form-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-form-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.62.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-form-integration-796ca63acc83e02954fe943ab729646a.yaml b/nuclei-templates/cve-less/plugins/advanced-form-integration-796ca63acc83e02954fe943ab729646a.yaml new file mode 100644 index 0000000000..61f56aa2a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-form-integration-796ca63acc83e02954fe943ab729646a.yaml @@ -0,0 +1,58 @@ +id: advanced-form-integration-796ca63acc83e02954fe943ab729646a + +info: + name: > + Advanced Form Integration <= 1.75.0 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5782b71-3234-4e53-9b26-225472f604c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-form-integration/" + google-query: inurl:"/wp-content/plugins/advanced-form-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-form-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-form-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-form-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.76.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-form-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/advanced-form-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..97770bbeb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-form-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: advanced-form-integration-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-form-integration/" + google-query: inurl:"/wp-content/plugins/advanced-form-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-form-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-form-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-form-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.49.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-form-integration-cc61e989c9930149472e4334372ea609.yaml b/nuclei-templates/cve-less/plugins/advanced-form-integration-cc61e989c9930149472e4334372ea609.yaml new file mode 100644 index 0000000000..adeed01044 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-form-integration-cc61e989c9930149472e4334372ea609.yaml @@ -0,0 +1,58 @@ +id: advanced-form-integration-cc61e989c9930149472e4334372ea609 + +info: + name: > + Advanced Form Integration – Connect WooCommerce and Contact Form 7 to Google Sheets and other platforms <= 1.82.0 - SQL Injection to Reflected Cross-Site Scripting via integration_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45d5a677-9b8b-4258-9cfb-101b0f0e6f6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-form-integration/" + google-query: inurl:"/wp-content/plugins/advanced-form-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-form-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-form-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-form-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.82.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-forms-019da25ecceb2c42293b8bf9c83a7180.yaml b/nuclei-templates/cve-less/plugins/advanced-forms-019da25ecceb2c42293b8bf9c83a7180.yaml new file mode 100644 index 0000000000..1cc83e07e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-forms-019da25ecceb2c42293b8bf9c83a7180.yaml @@ -0,0 +1,58 @@ +id: advanced-forms-019da25ecceb2c42293b8bf9c83a7180 + +info: + name: > + Advanced Forms for ACF <= 1.9.3.2 - Missing Authorization to Unauthenticated Form Settings Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b33f2ee-3f20-4494-bdae-3f8cc3c6dc73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-forms/" + google-query: inurl:"/wp-content/plugins/advanced-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-forms-8f7e0f2cdbd50435173e1262f75f15c5.yaml b/nuclei-templates/cve-less/plugins/advanced-forms-8f7e0f2cdbd50435173e1262f75f15c5.yaml new file mode 100644 index 0000000000..0694be0b6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-forms-8f7e0f2cdbd50435173e1262f75f15c5.yaml @@ -0,0 +1,58 @@ +id: advanced-forms-8f7e0f2cdbd50435173e1262f75f15c5 + +info: + name: > + Advanced Forms for ACF <= 1.6.8 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c021686-3c9d-4382-be5c-9d4bf989cdcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-forms/" + google-query: inurl:"/wp-content/plugins/advanced-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-free-flat-shipping-woocommerce-7e6cf0a72223b6dafdbb68257635237d.yaml b/nuclei-templates/cve-less/plugins/advanced-free-flat-shipping-woocommerce-7e6cf0a72223b6dafdbb68257635237d.yaml new file mode 100644 index 0000000000..fca318f9bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-free-flat-shipping-woocommerce-7e6cf0a72223b6dafdbb68257635237d.yaml @@ -0,0 +1,58 @@ +id: advanced-free-flat-shipping-woocommerce-7e6cf0a72223b6dafdbb68257635237d + +info: + name: > + Advanced Flat rate shipping Woocommerce <= 1.6.4.4 - Cross-Site Request Forgery via enableDisable and deletePost + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27b14c6e-44fe-4acb-8058-613f65b6baa4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-free-flat-shipping-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-free-flat-shipping-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-free-flat-shipping-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-free-flat-shipping-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-free-flat-shipping-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-iframe-4d70d402016d1f4b86f60918b22119da.yaml b/nuclei-templates/cve-less/plugins/advanced-iframe-4d70d402016d1f4b86f60918b22119da.yaml new file mode 100644 index 0000000000..4453efd807 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-iframe-4d70d402016d1f4b86f60918b22119da.yaml @@ -0,0 +1,58 @@ +id: advanced-iframe-4d70d402016d1f4b86f60918b22119da + +info: + name: > + Advanced iFrame <= 2024.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/699e5c80-8a11-4f67-8b17-41170d9c6411?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-iframe/" + google-query: inurl:"/wp-content/plugins/advanced-iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2024.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-iframe-5ef4900200b4415e3b14a42418354f64.yaml b/nuclei-templates/cve-less/plugins/advanced-iframe-5ef4900200b4415e3b14a42418354f64.yaml new file mode 100644 index 0000000000..87c7bc2659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-iframe-5ef4900200b4415e3b14a42418354f64.yaml @@ -0,0 +1,58 @@ +id: advanced-iframe-5ef4900200b4415e3b14a42418354f64 + +info: + name: > + Advanced iFrame <= 2023.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9944443-2e71-45c4-8a19-d76863cf66df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-iframe/" + google-query: inurl:"/wp-content/plugins/advanced-iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2023.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-iframe-750d46ec675a067e58f6ca5aa716c8bb.yaml b/nuclei-templates/cve-less/plugins/advanced-iframe-750d46ec675a067e58f6ca5aa716c8bb.yaml new file mode 100644 index 0000000000..4b4d1232d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-iframe-750d46ec675a067e58f6ca5aa716c8bb.yaml @@ -0,0 +1,58 @@ +id: advanced-iframe-750d46ec675a067e58f6ca5aa716c8bb + +info: + name: > + Advanced iFrame <= 2023.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e32c51d-2d96-4545-956f-64f65c54b33b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-iframe/" + google-query: inurl:"/wp-content/plugins/advanced-iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2023.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-iframe-7af7b97a823a315642996f534f0bd2be.yaml b/nuclei-templates/cve-less/plugins/advanced-iframe-7af7b97a823a315642996f534f0bd2be.yaml new file mode 100644 index 0000000000..61d23cdb56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-iframe-7af7b97a823a315642996f534f0bd2be.yaml @@ -0,0 +1,58 @@ +id: advanced-iframe-7af7b97a823a315642996f534f0bd2be + +info: + name: > + Advanced iFrame <= 2021.9 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b72dcc68-df81-47ac-bd73-6aee87611b90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-iframe/" + google-query: inurl:"/wp-content/plugins/advanced-iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2021.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-iframe-8cb4e5d28c572c7b2415f308b23aba3c.yaml b/nuclei-templates/cve-less/plugins/advanced-iframe-8cb4e5d28c572c7b2415f308b23aba3c.yaml new file mode 100644 index 0000000000..2ff87e4d2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-iframe-8cb4e5d28c572c7b2415f308b23aba3c.yaml @@ -0,0 +1,58 @@ +id: advanced-iframe-8cb4e5d28c572c7b2415f308b23aba3c + +info: + name: > + Advanced iFrame <= 2024.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/808ef87d-298c-4622-9fcd-cf879e7157bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-iframe/" + google-query: inurl:"/wp-content/plugins/advanced-iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2024.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-image-sitemap-d3419d10a1c15957810bab79025cae18.yaml b/nuclei-templates/cve-less/plugins/advanced-image-sitemap-d3419d10a1c15957810bab79025cae18.yaml new file mode 100644 index 0000000000..d43fd35332 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-image-sitemap-d3419d10a1c15957810bab79025cae18.yaml @@ -0,0 +1,58 @@ +id: advanced-image-sitemap-d3419d10a1c15957810bab79025cae18 + +info: + name: > + Advanced Image Sitemap <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f89ce1c-3f5e-43cb-9dd2-7ab5880d78d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-image-sitemap/" + google-query: inurl:"/wp-content/plugins/advanced-image-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-image-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-image-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-image-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-import-21d84dd234ad676a469c1b281a9da497.yaml b/nuclei-templates/cve-less/plugins/advanced-import-21d84dd234ad676a469c1b281a9da497.yaml new file mode 100644 index 0000000000..3cac63e1fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-import-21d84dd234ad676a469c1b281a9da497.yaml @@ -0,0 +1,58 @@ +id: advanced-import-21d84dd234ad676a469c1b281a9da497 + +info: + name: > + Advanced Import <= 1.3.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f107496b-020b-4222-91f3-49caba1a39db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-import/" + google-query: inurl:"/wp-content/plugins/advanced-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-4a9af0a7a0f9267c64d43cbcc0f6e60e.yaml b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-4a9af0a7a0f9267c64d43cbcc0f6e60e.yaml new file mode 100644 index 0000000000..37b38afaf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-4a9af0a7a0f9267c64d43cbcc0f6e60e.yaml @@ -0,0 +1,58 @@ +id: advanced-local-pickup-for-woocommerce-4a9af0a7a0f9267c64d43cbcc0f6e60e + +info: + name: > + Advanced Local Pickup for WooCommerce <= 1.5.5 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/125e7ea3-574a-4760-b10b-7a98d94c87a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-local-pickup-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-local-pickup-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-local-pickup-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-local-pickup-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-local-pickup-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-53dce218cb6cdf713c943d61cbe1c885.yaml b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-53dce218cb6cdf713c943d61cbe1c885.yaml new file mode 100644 index 0000000000..d87eccc08f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-53dce218cb6cdf713c943d61cbe1c885.yaml @@ -0,0 +1,58 @@ +id: advanced-local-pickup-for-woocommerce-53dce218cb6cdf713c943d61cbe1c885 + +info: + name: > + Advanced Local Pickup for WooCommerce <= 1.5.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05ff8080-59e5-4d48-a69b-275a89eef758?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-local-pickup-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-local-pickup-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-local-pickup-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-local-pickup-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-local-pickup-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-58a489f667854b233fd61745ace5a1a4.yaml b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-58a489f667854b233fd61745ace5a1a4.yaml new file mode 100644 index 0000000000..7594b1d80e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-58a489f667854b233fd61745ace5a1a4.yaml @@ -0,0 +1,58 @@ +id: advanced-local-pickup-for-woocommerce-58a489f667854b233fd61745ace5a1a4 + +info: + name: > + Advanced Local Pickup for WooCommerce <= 1.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b3fa78c-d97f-43bf-b3e9-47d6aa41b458?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-local-pickup-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-local-pickup-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-local-pickup-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-local-pickup-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-local-pickup-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-bf4905bcfa1e978b4bbdcf9e3f9b15d3.yaml b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-bf4905bcfa1e978b4bbdcf9e3f9b15d3.yaml new file mode 100644 index 0000000000..6a53d9beb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-bf4905bcfa1e978b4bbdcf9e3f9b15d3.yaml @@ -0,0 +1,58 @@ +id: advanced-local-pickup-for-woocommerce-bf4905bcfa1e978b4bbdcf9e3f9b15d3 + +info: + name: > + Advanced Local Pickup for WooCommerce <= 1.6.1 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/575ec3a9-26f7-415b-9df6-d0401557a578?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-local-pickup-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-local-pickup-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-local-pickup-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-local-pickup-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-local-pickup-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-eb7c2afb91d54b1e8be36c66e317f588.yaml b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-eb7c2afb91d54b1e8be36c66e317f588.yaml new file mode 100644 index 0000000000..143b65d1e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-local-pickup-for-woocommerce-eb7c2afb91d54b1e8be36c66e317f588.yaml @@ -0,0 +1,58 @@ +id: advanced-local-pickup-for-woocommerce-eb7c2afb91d54b1e8be36c66e317f588 + +info: + name: > + Advanced Local Pickup for WooCommerce <= 1.6.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22a1920e-2a3f-4996-873d-26e3930e6929?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-local-pickup-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-local-pickup-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-local-pickup-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-local-pickup-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-local-pickup-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-menu-widget-95d0775d6527d5eae5d7126ad333b363.yaml b/nuclei-templates/cve-less/plugins/advanced-menu-widget-95d0775d6527d5eae5d7126ad333b363.yaml new file mode 100644 index 0000000000..282bd7b111 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-menu-widget-95d0775d6527d5eae5d7126ad333b363.yaml @@ -0,0 +1,58 @@ +id: advanced-menu-widget-95d0775d6527d5eae5d7126ad333b363 + +info: + name: > + Advanced Menu Widget <= 0.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5da2dac6-940c-419e-853f-6cfd5d53d427?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-menu-widget/" + google-query: inurl:"/wp-content/plugins/advanced-menu-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-menu-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-menu-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-menu-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-most-recent-posts-mod-b02147be7bebef844df5583704a48a3c.yaml b/nuclei-templates/cve-less/plugins/advanced-most-recent-posts-mod-b02147be7bebef844df5583704a48a3c.yaml new file mode 100644 index 0000000000..c9b3a9d0e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-most-recent-posts-mod-b02147be7bebef844df5583704a48a3c.yaml @@ -0,0 +1,58 @@ +id: advanced-most-recent-posts-mod-b02147be7bebef844df5583704a48a3c + +info: + name: > + Advanced Most Recent Posts Mod <= 1.6.5.2 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43fc4752-7a47-480c-82e2-54821e754f7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-most-recent-posts-mod/" + google-query: inurl:"/wp-content/plugins/advanced-most-recent-posts-mod/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-most-recent-posts-mod,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-most-recent-posts-mod/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-most-recent-posts-mod" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-nocaptcha-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/advanced-nocaptcha-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..916eab3f2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-nocaptcha-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: advanced-nocaptcha-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-nocaptcha-recaptcha/" + google-query: inurl:"/wp-content/plugins/advanced-nocaptcha-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-nocaptcha-recaptcha,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-nocaptcha-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-nocaptcha-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-nocaptcha-recaptcha-cbb68fdfa6e0c8d1d1dcc60eddde34f0.yaml b/nuclei-templates/cve-less/plugins/advanced-nocaptcha-recaptcha-cbb68fdfa6e0c8d1d1dcc60eddde34f0.yaml new file mode 100644 index 0000000000..c32a77cb8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-nocaptcha-recaptcha-cbb68fdfa6e0c8d1d1dcc60eddde34f0.yaml @@ -0,0 +1,58 @@ +id: advanced-nocaptcha-recaptcha-cbb68fdfa6e0c8d1d1dcc60eddde34f0 + +info: + name: > + CAPTCHA 4WP <= 7.0.6.1 - Cross-Site Request Forgery to Local File Inclusion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd97ef7d-80c7-4987-be79-23eb380fa460?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-nocaptcha-recaptcha/" + google-query: inurl:"/wp-content/plugins/advanced-nocaptcha-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-nocaptcha-recaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-nocaptcha-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-nocaptcha-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-51ed12a9f2c55cf6d27dee66a25ab3d5.yaml b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-51ed12a9f2c55cf6d27dee66a25ab3d5.yaml new file mode 100644 index 0000000000..10e5c2e58d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-51ed12a9f2c55cf6d27dee66a25ab3d5.yaml @@ -0,0 +1,58 @@ +id: advanced-page-visit-counter-51ed12a9f2c55cf6d27dee66a25ab3d5 + +info: + name: > + Advanced Page Visit Counter <= 8.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b497a36-4929-413f-abfc-1d81bfaa7889?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-page-visit-counter/" + google-query: inurl:"/wp-content/plugins/advanced-page-visit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-page-visit-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-page-visit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-page-visit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-6868a3f667554717afcb5780d663774e.yaml b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-6868a3f667554717afcb5780d663774e.yaml new file mode 100644 index 0000000000..b4f7e07b26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-6868a3f667554717afcb5780d663774e.yaml @@ -0,0 +1,58 @@ +id: advanced-page-visit-counter-6868a3f667554717afcb5780d663774e + +info: + name: > + Advanced Page Visit Counter <= 8.0.6 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/511f64df-4389-4ad7-b2a4-12dc57714631?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-page-visit-counter/" + google-query: inurl:"/wp-content/plugins/advanced-page-visit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-page-visit-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-page-visit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-page-visit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-6b14dff49fec7b24e0d17d0c9fb34f3e.yaml b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-6b14dff49fec7b24e0d17d0c9fb34f3e.yaml new file mode 100644 index 0000000000..dfa6ea11f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-6b14dff49fec7b24e0d17d0c9fb34f3e.yaml @@ -0,0 +1,58 @@ +id: advanced-page-visit-counter-6b14dff49fec7b24e0d17d0c9fb34f3e + +info: + name: > + Advanced Page Visit Counter <= 5.0.8 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f444568c-fe4c-4fa6-9b83-2d069f851360?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-page-visit-counter/" + google-query: inurl:"/wp-content/plugins/advanced-page-visit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-page-visit-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-page-visit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-page-visit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-9c6b12242aa8d580a35fa22bad685fff.yaml b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-9c6b12242aa8d580a35fa22bad685fff.yaml new file mode 100644 index 0000000000..75d5a16985 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-9c6b12242aa8d580a35fa22bad685fff.yaml @@ -0,0 +1,58 @@ +id: advanced-page-visit-counter-9c6b12242aa8d580a35fa22bad685fff + +info: + name: > + Advanced Page Visit Counter <= 7.1.1 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1810cea5-cfca-4699-bf09-0e474d04acb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-page-visit-counter/" + google-query: inurl:"/wp-content/plugins/advanced-page-visit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-page-visit-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-page-visit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-page-visit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-a606eb221eb05ffe5dadb8dd25fec864.yaml b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-a606eb221eb05ffe5dadb8dd25fec864.yaml new file mode 100644 index 0000000000..68eac5803c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-a606eb221eb05ffe5dadb8dd25fec864.yaml @@ -0,0 +1,58 @@ +id: advanced-page-visit-counter-a606eb221eb05ffe5dadb8dd25fec864 + +info: + name: > + Advanced Page Visit Counter <= 6.1.5 - Subscriber+ Blind SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96a0ca0c-7cd5-4be4-a833-fc15fff62362?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-page-visit-counter/" + google-query: inurl:"/wp-content/plugins/advanced-page-visit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-page-visit-counter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-page-visit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-page-visit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e8df988b4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: advanced-page-visit-counter-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-page-visit-counter/" + google-query: inurl:"/wp-content/plugins/advanced-page-visit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-page-visit-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-page-visit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-page-visit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-fb290f4001663ab9b3572ec6c32d0eb5.yaml b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-fb290f4001663ab9b3572ec6c32d0eb5.yaml new file mode 100644 index 0000000000..52a4a2877e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-page-visit-counter-fb290f4001663ab9b3572ec6c32d0eb5.yaml @@ -0,0 +1,58 @@ +id: advanced-page-visit-counter-fb290f4001663ab9b3572ec6c32d0eb5 + +info: + name: > + Advanced Page Visit Counter <= 6.4.2 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/871e5091-bb20-4a53-83e2-85ed6f26247a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-page-visit-counter/" + google-query: inurl:"/wp-content/plugins/advanced-page-visit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-page-visit-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-page-visit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-page-visit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-popups-b8a8e0d0fe8b5ab801f2a60f0e606d3c.yaml b/nuclei-templates/cve-less/plugins/advanced-popups-b8a8e0d0fe8b5ab801f2a60f0e606d3c.yaml new file mode 100644 index 0000000000..164166c610 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-popups-b8a8e0d0fe8b5ab801f2a60f0e606d3c.yaml @@ -0,0 +1,58 @@ +id: advanced-popups-b8a8e0d0fe8b5ab801f2a60f0e606d3c + +info: + name: > + Advanced Popups <= 1.1.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc7b51e5-6eb7-41ba-add3-f083fb34c5e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-popups/" + google-query: inurl:"/wp-content/plugins/advanced-popups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-popups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-popups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-popups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-post-block-504571f3f4f99ae23a7efdf0aa6a64d7.yaml b/nuclei-templates/cve-less/plugins/advanced-post-block-504571f3f4f99ae23a7efdf0aa6a64d7.yaml new file mode 100644 index 0000000000..a43f6818f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-post-block-504571f3f4f99ae23a7efdf0aa6a64d7.yaml @@ -0,0 +1,58 @@ +id: advanced-post-block-504571f3f4f99ae23a7efdf0aa6a64d7 + +info: + name: > + Advanced Post Block – Display Posts, Pages, or Custom Posts on Your Page <= 1.13.4 - Missing Authorization to Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fb6c221-d885-42b5-977c-39e8608e3e31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-post-block/" + google-query: inurl:"/wp-content/plugins/advanced-post-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-post-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-post-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-post-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-post-list-dd776d5a9d71139420b6706ccdb1e25f.yaml b/nuclei-templates/cve-less/plugins/advanced-post-list-dd776d5a9d71139420b6706ccdb1e25f.yaml new file mode 100644 index 0000000000..46bca7bd0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-post-list-dd776d5a9d71139420b6706ccdb1e25f.yaml @@ -0,0 +1,58 @@ +id: advanced-post-list-dd776d5a9d71139420b6706ccdb1e25f + +info: + name: > + Advanced Post List <= 0.5.6.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07357de3-bbf5-40d3-a171-3b624b572e6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-post-list/" + google-query: inurl:"/wp-content/plugins/advanced-post-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-post-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-post-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-post-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-post-manager-0a56d3b69d6caf51fb2e7fd016d073ab.yaml b/nuclei-templates/cve-less/plugins/advanced-post-manager-0a56d3b69d6caf51fb2e7fd016d073ab.yaml new file mode 100644 index 0000000000..225873ff8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-post-manager-0a56d3b69d6caf51fb2e7fd016d073ab.yaml @@ -0,0 +1,58 @@ +id: advanced-post-manager-0a56d3b69d6caf51fb2e7fd016d073ab + +info: + name: > + Advanced Post Manager <= 4.5.1 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54901d01-241a-4027-ba72-2b983608f9c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-post-manager/" + google-query: inurl:"/wp-content/plugins/advanced-post-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-post-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-post-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-post-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-product-labels-for-woocommerce-949ecf55eab79c7524cfdba1c2344ca4.yaml b/nuclei-templates/cve-less/plugins/advanced-product-labels-for-woocommerce-949ecf55eab79c7524cfdba1c2344ca4.yaml new file mode 100644 index 0000000000..f4d67c3477 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-product-labels-for-woocommerce-949ecf55eab79c7524cfdba1c2344ca4.yaml @@ -0,0 +1,58 @@ +id: advanced-product-labels-for-woocommerce-949ecf55eab79c7524cfdba1c2344ca4 + +info: + name: > + Advanced Product Labels for WooCommerce <= 1.2.3.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ad806df-0a5c-4ef0-a335-2e34c9b62662?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-product-labels-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-product-labels-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-product-labels-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-product-labels-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-product-labels-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-product-labels-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/advanced-product-labels-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..2435980790 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-product-labels-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: advanced-product-labels-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-product-labels-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/advanced-product-labels-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-product-labels-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-product-labels-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-product-labels-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-quiz-1044e73f9f4c90a4318631b027811f47.yaml b/nuclei-templates/cve-less/plugins/advanced-quiz-1044e73f9f4c90a4318631b027811f47.yaml new file mode 100644 index 0000000000..76b5e8476c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-quiz-1044e73f9f4c90a4318631b027811f47.yaml @@ -0,0 +1,58 @@ +id: advanced-quiz-1044e73f9f4c90a4318631b027811f47 + +info: + name: > + Wp-Adv-Quiz <= 1.0.2 - Authenticated (Admin+) Stored Cross-Site Scripting via Quiz Title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9053995a-b1de-427f-b16d-31fa8cd026b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-quiz/" + google-query: inurl:"/wp-content/plugins/advanced-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-quiz-84ca5039f02eeb82650dbead88aee202.yaml b/nuclei-templates/cve-less/plugins/advanced-quiz-84ca5039f02eeb82650dbead88aee202.yaml new file mode 100644 index 0000000000..80b00ba793 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-quiz-84ca5039f02eeb82650dbead88aee202.yaml @@ -0,0 +1,58 @@ +id: advanced-quiz-84ca5039f02eeb82650dbead88aee202 + +info: + name: > + Wp-Adv-Quiz <= 1.0.2 - Authenticated (Admin+) Stored Cross-Site Scripting via Quiz Question and Message + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a5ae9f-b57c-4a71-b976-5975ad086c74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-quiz/" + google-query: inurl:"/wp-content/plugins/advanced-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-recent-posts-aedd5bdd6732fba44f64193c96bef864.yaml b/nuclei-templates/cve-less/plugins/advanced-recent-posts-aedd5bdd6732fba44f64193c96bef864.yaml new file mode 100644 index 0000000000..f72b66ead2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-recent-posts-aedd5bdd6732fba44f64193c96bef864.yaml @@ -0,0 +1,58 @@ +id: advanced-recent-posts-aedd5bdd6732fba44f64193c96bef864 + +info: + name: > + Advanced Recent Posts <= 0.6.14 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62abc1e8-155d-4726-81d3-ed2cc7dd7373?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-recent-posts/" + google-query: inurl:"/wp-content/plugins/advanced-recent-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-recent-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-recent-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-recent-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-schedule-posts-afd12d5545489eccaee099aa3bb1c0d7.yaml b/nuclei-templates/cve-less/plugins/advanced-schedule-posts-afd12d5545489eccaee099aa3bb1c0d7.yaml new file mode 100644 index 0000000000..d804dff744 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-schedule-posts-afd12d5545489eccaee099aa3bb1c0d7.yaml @@ -0,0 +1,58 @@ +id: advanced-schedule-posts-afd12d5545489eccaee099aa3bb1c0d7 + +info: + name: > + Advanced Schedule Posts <= 2.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47122866-8e40-42bc-84ed-60fc81247320?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-schedule-posts/" + google-query: inurl:"/wp-content/plugins/advanced-schedule-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-schedule-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-schedule-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-schedule-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-sermons-564170441cb69873b0d861ef3dcdaa9e.yaml b/nuclei-templates/cve-less/plugins/advanced-sermons-564170441cb69873b0d861ef3dcdaa9e.yaml new file mode 100644 index 0000000000..4778eb2933 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-sermons-564170441cb69873b0d861ef3dcdaa9e.yaml @@ -0,0 +1,58 @@ +id: advanced-sermons-564170441cb69873b0d861ef3dcdaa9e + +info: + name: > + Advanced Sermons <= 3.1 - Reflected Cross-Site Scripting via s + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48f69a86-1007-4565-8311-9e542bd4d66b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-sermons/" + google-query: inurl:"/wp-content/plugins/advanced-sermons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-sermons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-sermons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-sermons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-sermons-88167a3eb5eaecbe4676b38334e8f643.yaml b/nuclei-templates/cve-less/plugins/advanced-sermons-88167a3eb5eaecbe4676b38334e8f643.yaml new file mode 100644 index 0000000000..62f9856015 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-sermons-88167a3eb5eaecbe4676b38334e8f643.yaml @@ -0,0 +1,58 @@ +id: advanced-sermons-88167a3eb5eaecbe4676b38334e8f643 + +info: + name: > + Advanced Sermons <= 3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cff6b26e-bafa-4b85-b7f1-eea9bb4b6476?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-sermons/" + google-query: inurl:"/wp-content/plugins/advanced-sermons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-sermons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-sermons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-sermons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-testimonial-carousel-for-elementor-afe32fcbbc30cab4f3e35a08cf6d7b9b.yaml b/nuclei-templates/cve-less/plugins/advanced-testimonial-carousel-for-elementor-afe32fcbbc30cab4f3e35a08cf6d7b9b.yaml new file mode 100644 index 0000000000..0b5aecc295 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-testimonial-carousel-for-elementor-afe32fcbbc30cab4f3e35a08cf6d7b9b.yaml @@ -0,0 +1,58 @@ +id: advanced-testimonial-carousel-for-elementor-afe32fcbbc30cab4f3e35a08cf6d7b9b + +info: + name: > + Advanced Testimonial Carousel for Elementor <= 3.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/256fb7f0-174a-4766-afd5-bc61e358da85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-testimonial-carousel-for-elementor/" + google-query: inurl:"/wp-content/plugins/advanced-testimonial-carousel-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-testimonial-carousel-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-testimonial-carousel-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-testimonial-carousel-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-text-widget-0bc66019a5442f087e2da571324acbb0.yaml b/nuclei-templates/cve-less/plugins/advanced-text-widget-0bc66019a5442f087e2da571324acbb0.yaml new file mode 100644 index 0000000000..52ebad9a8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-text-widget-0bc66019a5442f087e2da571324acbb0.yaml @@ -0,0 +1,58 @@ +id: advanced-text-widget-0bc66019a5442f087e2da571324acbb0 + +info: + name: > + Advanced Text Widget <= 2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5e011d3-bd0f-46cb-9fb1-af06bcb7e307?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-text-widget/" + google-query: inurl:"/wp-content/plugins/advanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-text-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-text-widget-eec11cac81b9e7efcb35b893f28148cb.yaml b/nuclei-templates/cve-less/plugins/advanced-text-widget-eec11cac81b9e7efcb35b893f28148cb.yaml new file mode 100644 index 0000000000..f054053b66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-text-widget-eec11cac81b9e7efcb35b893f28148cb.yaml @@ -0,0 +1,58 @@ +id: advanced-text-widget-eec11cac81b9e7efcb35b893f28148cb + +info: + name: > + Advanced Text Widget <= 2.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f622e20-2f7e-44ed-8237-fbf25323d2ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-text-widget/" + google-query: inurl:"/wp-content/plugins/advanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-text-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-text-widget-f8ef60664eb207643cf086f83584b3db.yaml b/nuclei-templates/cve-less/plugins/advanced-text-widget-f8ef60664eb207643cf086f83584b3db.yaml new file mode 100644 index 0000000000..124f9450dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-text-widget-f8ef60664eb207643cf086f83584b3db.yaml @@ -0,0 +1,58 @@ +id: advanced-text-widget-f8ef60664eb207643cf086f83584b3db + +info: + name: > + Advanced Text Widget <= 2.1.2 - Missing Authorization via atw_dismiss_admin_notice + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fe1313c-1368-4bcb-9d11-25b948da5547?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-text-widget/" + google-query: inurl:"/wp-content/plugins/advanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-text-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-uploader-501a1f4c716dcfc5dbf27f3bb41b2666.yaml b/nuclei-templates/cve-less/plugins/advanced-uploader-501a1f4c716dcfc5dbf27f3bb41b2666.yaml new file mode 100644 index 0000000000..1ee5ae0dfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-uploader-501a1f4c716dcfc5dbf27f3bb41b2666.yaml @@ -0,0 +1,58 @@ +id: advanced-uploader-501a1f4c716dcfc5dbf27f3bb41b2666 + +info: + name: > + Advanced uploader <= 4.2 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4137b8a6-532a-42fb-aa16-7d1de0e2f11f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-uploader/" + google-query: inurl:"/wp-content/plugins/advanced-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-woo-search-5b7332c185aca9ac9b78f6d0d022fb37.yaml b/nuclei-templates/cve-less/plugins/advanced-woo-search-5b7332c185aca9ac9b78f6d0d022fb37.yaml new file mode 100644 index 0000000000..085165c45f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-woo-search-5b7332c185aca9ac9b78f6d0d022fb37.yaml @@ -0,0 +1,58 @@ +id: advanced-woo-search-5b7332c185aca9ac9b78f6d0d022fb37 + +info: + name: > + Advanced Woo Search <= 2.96 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91358e40-e64f-4e8e-b5a3-7d2133db5fe9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-woo-search/" + google-query: inurl:"/wp-content/plugins/advanced-woo-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-woo-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-woo-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-woo-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-woo-search-8206819943af063a893fdd6fd4e9d3b8.yaml b/nuclei-templates/cve-less/plugins/advanced-woo-search-8206819943af063a893fdd6fd4e9d3b8.yaml new file mode 100644 index 0000000000..e3fe6b6a86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-woo-search-8206819943af063a893fdd6fd4e9d3b8.yaml @@ -0,0 +1,58 @@ +id: advanced-woo-search-8206819943af063a893fdd6fd4e9d3b8 + +info: + name: > + Advanced Woo Search <= 1.68 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4c3f9c5-5086-416b-a601-2890f52547c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-woo-search/" + google-query: inurl:"/wp-content/plugins/advanced-woo-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-woo-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-woo-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-woo-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-woo-search-8e1ec5e631a2487f0c22f50d8172463a.yaml b/nuclei-templates/cve-less/plugins/advanced-woo-search-8e1ec5e631a2487f0c22f50d8172463a.yaml new file mode 100644 index 0000000000..df86ab3033 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-woo-search-8e1ec5e631a2487f0c22f50d8172463a.yaml @@ -0,0 +1,58 @@ +id: advanced-woo-search-8e1ec5e631a2487f0c22f50d8172463a + +info: + name: > + Advanced Woo Search <= 2.00 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/add568d4-d615-40ff-9320-89869f825f81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-woo-search/" + google-query: inurl:"/wp-content/plugins/advanced-woo-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-woo-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-woo-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-woo-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-woo-search-bafdacae26c88640cb6e30b25ba66a73.yaml b/nuclei-templates/cve-less/plugins/advanced-woo-search-bafdacae26c88640cb6e30b25ba66a73.yaml new file mode 100644 index 0000000000..486de26256 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-woo-search-bafdacae26c88640cb6e30b25ba66a73.yaml @@ -0,0 +1,58 @@ +id: advanced-woo-search-bafdacae26c88640cb6e30b25ba66a73 + +info: + name: > + Advanced Woo Search <= 2.77 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4278e9d7-aa1e-47a5-b715-09dae5156303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-woo-search/" + google-query: inurl:"/wp-content/plugins/advanced-woo-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-woo-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-woo-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-woo-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.77') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-wp-columns-46e70ce2d5b65ea57e5b89cf696f0367.yaml b/nuclei-templates/cve-less/plugins/advanced-wp-columns-46e70ce2d5b65ea57e5b89cf696f0367.yaml new file mode 100644 index 0000000000..49c0914e60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-wp-columns-46e70ce2d5b65ea57e5b89cf696f0367.yaml @@ -0,0 +1,58 @@ +id: advanced-wp-columns-46e70ce2d5b65ea57e5b89cf696f0367 + +info: + name: > + Advanced WP Columns <= 2.0.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bde76d9-34f3-46c9-a05a-e5204b661b26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-wp-columns/" + google-query: inurl:"/wp-content/plugins/advanced-wp-columns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-wp-columns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-wp-columns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-wp-columns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-wp-reset-2bd2ae0db95f304cf533ef5905d6a487.yaml b/nuclei-templates/cve-less/plugins/advanced-wp-reset-2bd2ae0db95f304cf533ef5905d6a487.yaml new file mode 100644 index 0000000000..43998f7111 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-wp-reset-2bd2ae0db95f304cf533ef5905d6a487.yaml @@ -0,0 +1,58 @@ +id: advanced-wp-reset-2bd2ae0db95f304cf533ef5905d6a487 + +info: + name: > + Advanced WordPress Reset <= 1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8575c46-e51d-4be9-85bf-024688c4607d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-wp-reset/" + google-query: inurl:"/wp-content/plugins/advanced-wp-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-wp-reset,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-wp-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-wp-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-xml-reader-7e2d3043b2f8338719c38cc2aa7f1e6b.yaml b/nuclei-templates/cve-less/plugins/advanced-xml-reader-7e2d3043b2f8338719c38cc2aa7f1e6b.yaml new file mode 100644 index 0000000000..11f4e69b89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-xml-reader-7e2d3043b2f8338719c38cc2aa7f1e6b.yaml @@ -0,0 +1,58 @@ +id: advanced-xml-reader-7e2d3043b2f8338719c38cc2aa7f1e6b + +info: + name: > + Advanced XML Reader <= 0.3.4 - External Entity Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/120e6a19-fae3-4083-a72e-36867e7eb18a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-xml-reader/" + google-query: inurl:"/wp-content/plugins/advanced-xml-reader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-xml-reader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-xml-reader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-xml-reader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-xml-reader-9c4b4d0de92603aa8d882131c97bd1c6.yaml b/nuclei-templates/cve-less/plugins/advanced-xml-reader-9c4b4d0de92603aa8d882131c97bd1c6.yaml new file mode 100644 index 0000000000..302885592c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-xml-reader-9c4b4d0de92603aa8d882131c97bd1c6.yaml @@ -0,0 +1,58 @@ +id: advanced-xml-reader-9c4b4d0de92603aa8d882131c97bd1c6 + +info: + name: > + Advanced XML Reader Plugin <= 0.3.4 - XML External Entity Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80d976f3-cf78-498e-a3c3-a88624426414?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-xml-reader/" + google-query: inurl:"/wp-content/plugins/advanced-xml-reader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-xml-reader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-xml-reader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-xml-reader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-youtube-channel-pagination-843692451d0aaf769ef716bbf02853d2.yaml b/nuclei-templates/cve-less/plugins/advanced-youtube-channel-pagination-843692451d0aaf769ef716bbf02853d2.yaml new file mode 100644 index 0000000000..e9b635f47a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-youtube-channel-pagination-843692451d0aaf769ef716bbf02853d2.yaml @@ -0,0 +1,58 @@ +id: advanced-youtube-channel-pagination-843692451d0aaf769ef716bbf02853d2 + +info: + name: > + Advanced Youtube Channel Pagination <= 1.0 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91898465-55fa-417c-8f00-ffe118232516?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-youtube-channel-pagination/" + google-query: inurl:"/wp-content/plugins/advanced-youtube-channel-pagination/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-youtube-channel-pagination,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-youtube-channel-pagination/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-youtube-channel-pagination" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/advanced-youtube-channel-pagination-f6df4debeaba888aeb7941d246864164.yaml b/nuclei-templates/cve-less/plugins/advanced-youtube-channel-pagination-f6df4debeaba888aeb7941d246864164.yaml new file mode 100644 index 0000000000..6fb6e02ecb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/advanced-youtube-channel-pagination-f6df4debeaba888aeb7941d246864164.yaml @@ -0,0 +1,58 @@ +id: advanced-youtube-channel-pagination-f6df4debeaba888aeb7941d246864164 + +info: + name: > + Advanced Youtube Channel Pagination <= 1.0 - Cross-Site Request Forgery to Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d858f96-7363-4098-af2d-f6f96fc80071?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-youtube-channel-pagination/" + google-query: inurl:"/wp-content/plugins/advanced-youtube-channel-pagination/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-youtube-channel-pagination,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-youtube-channel-pagination/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-youtube-channel-pagination" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aesop-story-engine-d882520450a9e95c908e1ad71ca03592.yaml b/nuclei-templates/cve-less/plugins/aesop-story-engine-d882520450a9e95c908e1ad71ca03592.yaml new file mode 100644 index 0000000000..c3bf5dfc4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aesop-story-engine-d882520450a9e95c908e1ad71ca03592.yaml @@ -0,0 +1,58 @@ +id: aesop-story-engine-d882520450a9e95c908e1ad71ca03592 + +info: + name: > + Aesop Story Engine <= 2.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93d8277f-3c5a-4024-a7c0-27ccb1a23cfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aesop-story-engine/" + google-query: inurl:"/wp-content/plugins/aesop-story-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aesop-story-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aesop-story-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aesop-story-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/af-companion-2a375b974a759f200b634b44a398013f.yaml b/nuclei-templates/cve-less/plugins/af-companion-2a375b974a759f200b634b44a398013f.yaml new file mode 100644 index 0000000000..b7d4234b89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/af-companion-2a375b974a759f200b634b44a398013f.yaml @@ -0,0 +1,58 @@ +id: af-companion-2a375b974a759f200b634b44a398013f + +info: + name: > + AF Companion <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea5215b3-fd25-4ca5-b651-18c935aa2ca0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/af-companion/" + google-query: inurl:"/wp-content/plugins/af-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,af-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/af-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "af-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.1.0', '<= 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affieasy-c0f8f6f17ac93058fc835ead77535268.yaml b/nuclei-templates/cve-less/plugins/affieasy-c0f8f6f17ac93058fc835ead77535268.yaml new file mode 100644 index 0000000000..582e76f91c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affieasy-c0f8f6f17ac93058fc835ead77535268.yaml @@ -0,0 +1,58 @@ +id: affieasy-c0f8f6f17ac93058fc835ead77535268 + +info: + name: > + AffiEasy <= 1.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ea49a07-022e-4c9a-b1d3-ff900b337067?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affieasy/" + google-query: inurl:"/wp-content/plugins/affieasy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affieasy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affieasy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affieasy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-ads-builder-for-clickbank-products-9960c486a0af8a01fba712be84f42610.yaml b/nuclei-templates/cve-less/plugins/affiliate-ads-builder-for-clickbank-products-9960c486a0af8a01fba712be84f42610.yaml new file mode 100644 index 0000000000..2626c70def --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-ads-builder-for-clickbank-products-9960c486a0af8a01fba712be84f42610.yaml @@ -0,0 +1,58 @@ +id: affiliate-ads-builder-for-clickbank-products-9960c486a0af8a01fba712be84f42610 + +info: + name: > + Affiliate Ads for Clickbank Products < 1.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f66f2ae-af54-4dfa-9cd2-c7ff3a3e865e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-ads-builder-for-clickbank-products/" + google-query: inurl:"/wp-content/plugins/affiliate-ads-builder-for-clickbank-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-ads-builder-for-clickbank-products,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-ads-builder-for-clickbank-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-ads-builder-for-clickbank-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-for-woocommerce-5e2a21e34446161fac44e66bf2f9139e.yaml b/nuclei-templates/cve-less/plugins/affiliate-for-woocommerce-5e2a21e34446161fac44e66bf2f9139e.yaml new file mode 100644 index 0000000000..eeb0028574 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-for-woocommerce-5e2a21e34446161fac44e66bf2f9139e.yaml @@ -0,0 +1,58 @@ +id: affiliate-for-woocommerce-5e2a21e34446161fac44e66bf2f9139e + +info: + name: > + Affiliate For WooCommerce <= 4.7.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c829217a-c5be-4713-bbf4-c1ba829c1187?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/affiliate-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-for-woocommerce-6dc63a693616ad13933a53bb0a4503d9.yaml b/nuclei-templates/cve-less/plugins/affiliate-for-woocommerce-6dc63a693616ad13933a53bb0a4503d9.yaml new file mode 100644 index 0000000000..8ded361845 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-for-woocommerce-6dc63a693616ad13933a53bb0a4503d9.yaml @@ -0,0 +1,58 @@ +id: affiliate-for-woocommerce-6dc63a693616ad13933a53bb0a4503d9 + +info: + name: > + Affiliate For WooCommerce premium <= 4.7.0 - Authenticated Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6c3daf6-2225-4929-8e76-169d680118ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/affiliate-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-links-a7668a1f316cb3a4a10463e8f1f4e787.yaml b/nuclei-templates/cve-less/plugins/affiliate-links-a7668a1f316cb3a4a10463e8f1f4e787.yaml new file mode 100644 index 0000000000..53c6147f26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-links-a7668a1f316cb3a4a10463e8f1f4e787.yaml @@ -0,0 +1,58 @@ +id: affiliate-links-a7668a1f316cb3a4a10463e8f1f4e787 + +info: + name: > + Affiliate Links Lite <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9511d8f1-ab96-4695-aa8c-16a3482a6de4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-links/" + google-query: inurl:"/wp-content/plugins/affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-power-49603be4fe7e1b0e01494ff562e4811f.yaml b/nuclei-templates/cve-less/plugins/affiliate-power-49603be4fe7e1b0e01494ff562e4811f.yaml new file mode 100644 index 0000000000..94d1984cb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-power-49603be4fe7e1b0e01494ff562e4811f.yaml @@ -0,0 +1,58 @@ +id: affiliate-power-49603be4fe7e1b0e01494ff562e4811f + +info: + name: > + Affiliate Power – Sales Tracking for Affiliate Marketers <= 2.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2678d2c6-055e-462e-99da-bdc81bcc3662?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-power/" + google-query: inurl:"/wp-content/plugins/affiliate-power/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-power,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-power/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-power" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-pro-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/affiliate-pro-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..b8384216ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-pro-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: affiliate-pro-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-pro/" + google-query: inurl:"/wp-content/plugins/affiliate-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-solution-5b09bbfafab13caa853913e46666c79b.yaml b/nuclei-templates/cve-less/plugins/affiliate-solution-5b09bbfafab13caa853913e46666c79b.yaml new file mode 100644 index 0000000000..d230b78ea7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-solution-5b09bbfafab13caa853913e46666c79b.yaml @@ -0,0 +1,58 @@ +id: affiliate-solution-5b09bbfafab13caa853913e46666c79b + +info: + name: > + AFFILIATE Solution <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef778a1d-d4ce-47fd-932b-9e86b38e2681?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-solution/" + google-query: inurl:"/wp-content/plugins/affiliate-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-solution,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-4e7b022945e1e84a41ab0b83bedcfe7a.yaml b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-4e7b022945e1e84a41ab0b83bedcfe7a.yaml new file mode 100644 index 0000000000..ed5e8175e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-4e7b022945e1e84a41ab0b83bedcfe7a.yaml @@ -0,0 +1,58 @@ +id: affiliate-toolkit-starter-4e7b022945e1e84a41ab0b83bedcfe7a + +info: + name: > + affiliate-toolkit <= 3.4.2 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9c273a3-c8b5-4f00-8daa-76fa486df0f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-toolkit-starter/" + google-query: inurl:"/wp-content/plugins/affiliate-toolkit-starter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-toolkit-starter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-toolkit-starter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-toolkit-starter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-66e9bc6784c94720522599f8e4bbc15e.yaml b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-66e9bc6784c94720522599f8e4bbc15e.yaml new file mode 100644 index 0000000000..573da6a993 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-66e9bc6784c94720522599f8e4bbc15e.yaml @@ -0,0 +1,58 @@ +id: affiliate-toolkit-starter-66e9bc6784c94720522599f8e4bbc15e + +info: + name: > + affiliate-toolkit – WordPress Affiliate Plugin <= 3.3.9 - Open Redirect via atkpout.php + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06b332de-4f94-47dc-a573-53514adaf5c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-toolkit-starter/" + google-query: inurl:"/wp-content/plugins/affiliate-toolkit-starter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-toolkit-starter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-toolkit-starter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-toolkit-starter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-67b32c2b2aa638ff335d272cd6273e53.yaml b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-67b32c2b2aa638ff335d272cd6273e53.yaml new file mode 100644 index 0000000000..5d198408e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-67b32c2b2aa638ff335d272cd6273e53.yaml @@ -0,0 +1,58 @@ +id: affiliate-toolkit-starter-67b32c2b2aa638ff335d272cd6273e53 + +info: + name: > + affiliate-toolkit – WordPress Affiliate Plugin <= 3.5.4 - Missing Authorization via atkp_create_list + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e256b0-e4e3-4f41-842c-80aa2b80af72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-toolkit-starter/" + google-query: inurl:"/wp-content/plugins/affiliate-toolkit-starter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-toolkit-starter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-toolkit-starter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-toolkit-starter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-6af7c3d9958b5f30ac2537a2fdf59735.yaml b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-6af7c3d9958b5f30ac2537a2fdf59735.yaml new file mode 100644 index 0000000000..7635385b3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-6af7c3d9958b5f30ac2537a2fdf59735.yaml @@ -0,0 +1,58 @@ +id: affiliate-toolkit-starter-6af7c3d9958b5f30ac2537a2fdf59735 + +info: + name: > + affiliate-toolkit – WordPress Affiliate Plugin <= 3.5.4 - Missing Authorization via atkp_import_product + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d4d0176-3b7d-4de5-95ec-365873e6f13b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-toolkit-starter/" + google-query: inurl:"/wp-content/plugins/affiliate-toolkit-starter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-toolkit-starter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-toolkit-starter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-toolkit-starter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-b20121a47df1b1b276886f5bf24ee99b.yaml b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-b20121a47df1b1b276886f5bf24ee99b.yaml new file mode 100644 index 0000000000..637c989c91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-b20121a47df1b1b276886f5bf24ee99b.yaml @@ -0,0 +1,58 @@ +id: affiliate-toolkit-starter-b20121a47df1b1b276886f5bf24ee99b + +info: + name: > + affiliate-toolkit – WordPress Affiliate Plugin <= 3.4.3 - Reflected Cross-Site Scripting via keyword + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f45738b-fff6-438e-8870-508c622c1752?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-toolkit-starter/" + google-query: inurl:"/wp-content/plugins/affiliate-toolkit-starter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-toolkit-starter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-toolkit-starter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-toolkit-starter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-c364b3be5ae879c7f6b82ff2d4ab8d09.yaml b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-c364b3be5ae879c7f6b82ff2d4ab8d09.yaml new file mode 100644 index 0000000000..c4b40fdfd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-c364b3be5ae879c7f6b82ff2d4ab8d09.yaml @@ -0,0 +1,58 @@ +id: affiliate-toolkit-starter-c364b3be5ae879c7f6b82ff2d4ab8d09 + +info: + name: > + affiliate-toolkit <= 3.4.5 - Authenticated (Author+) Stored Cross-Site Scripting via ratings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecae113c-c66a-4f27-bf81-6679a4717ff8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-toolkit-starter/" + google-query: inurl:"/wp-content/plugins/affiliate-toolkit-starter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-toolkit-starter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-toolkit-starter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-toolkit-starter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-fb9e76e2a53a99a1061be745850fe380.yaml b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-fb9e76e2a53a99a1061be745850fe380.yaml new file mode 100644 index 0000000000..d0e562047d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliate-toolkit-starter-fb9e76e2a53a99a1061be745850fe380.yaml @@ -0,0 +1,58 @@ +id: affiliate-toolkit-starter-fb9e76e2a53a99a1061be745850fe380 + +info: + name: > + affiliate-toolkit – WordPress Affiliate Plugin <= 3.3.3 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dda7b14-c341-434b-85f1-029f384c65d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliate-toolkit-starter/" + google-query: inurl:"/wp-content/plugins/affiliate-toolkit-starter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliate-toolkit-starter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliate-toolkit-starter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliate-toolkit-starter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliatebooster-blocks-29fccdeb7b52e0d6f66d4f325a03df63.yaml b/nuclei-templates/cve-less/plugins/affiliatebooster-blocks-29fccdeb7b52e0d6f66d4f325a03df63.yaml new file mode 100644 index 0000000000..e72c750eea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliatebooster-blocks-29fccdeb7b52e0d6f66d4f325a03df63.yaml @@ -0,0 +1,58 @@ +id: affiliatebooster-blocks-29fccdeb7b52e0d6f66d4f325a03df63 + +info: + name: > + Affiliate Booster – Pros & Cons, Notice, and CTA Blocks for Affiliates <= 3.0.5 - Cross-Site Request Forgery via process_bulk_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b9eeb9-7ce4-446d-8ac0-af9cea0c893a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliatebooster-blocks/" + google-query: inurl:"/wp-content/plugins/affiliatebooster-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliatebooster-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliatebooster-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliatebooster-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-0664d46ebb4d5beec24f857df0859063.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-0664d46ebb4d5beec24f857df0859063.yaml new file mode 100644 index 0000000000..2af788e771 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-0664d46ebb4d5beec24f857df0859063.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-0664d46ebb4d5beec24f857df0859063 + +info: + name: > + Affiliates Manager <= 2.9.31 - Cross-Site Request Forgery via multiple AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/756b5e3e-46fa-483e-945a-86166e79d989?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-0b8752438dda7aa69e32a586e9110978.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-0b8752438dda7aa69e32a586e9110978.yaml new file mode 100644 index 0000000000..6444258d8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-0b8752438dda7aa69e32a586e9110978.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-0b8752438dda7aa69e32a586e9110978 + +info: + name: > + Affiliates Manager <= 2.7.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ff58a34-93ab-4e51-b857-fed1107631ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-32ee9eb90ef2a155ebbafe7c599b04ea.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-32ee9eb90ef2a155ebbafe7c599b04ea.yaml new file mode 100644 index 0000000000..fb65b74b31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-32ee9eb90ef2a155ebbafe7c599b04ea.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-32ee9eb90ef2a155ebbafe7c599b04ea + +info: + name: > + Affiliates Manager <= 2.9.13 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecbb40a5-3e33-4084-a19b-daf014ce68c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-33941d22287915d817c6ffb3567c4ed8.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-33941d22287915d817c6ffb3567c4ed8.yaml new file mode 100644 index 0000000000..d3080996af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-33941d22287915d817c6ffb3567c4ed8.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-33941d22287915d817c6ffb3567c4ed8 + +info: + name: > + Affiliates Manager <= 2.8.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d68e74c2-3732-40ae-b589-3a9159aff93d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-5c818a45f2a9dcd466f195a8752dd840.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-5c818a45f2a9dcd466f195a8752dd840.yaml new file mode 100644 index 0000000000..68aba627e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-5c818a45f2a9dcd466f195a8752dd840.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-5c818a45f2a9dcd466f195a8752dd840 + +info: + name: > + Affiliates Manager <= 2.6.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33f07db9-ff4f-4f81-bf32-18b04d19624d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-6e35e7842129d49b737d83e066ce8d1a.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-6e35e7842129d49b737d83e066ce8d1a.yaml new file mode 100644 index 0000000000..82502dcecc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-6e35e7842129d49b737d83e066ce8d1a.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-6e35e7842129d49b737d83e066ce8d1a + +info: + name: > + Affiliates Manager <= 2.9.30 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abc3f352-8568-4649-bf3c-dd0ce0295589?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-9029119eb68fd27e882d54dbd4a742cd.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-9029119eb68fd27e882d54dbd4a742cd.yaml new file mode 100644 index 0000000000..1504092914 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-9029119eb68fd27e882d54dbd4a742cd.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-9029119eb68fd27e882d54dbd4a742cd + +info: + name: > + Affiliates Manager <= 2.9.13 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8582af5-92e9-43ef-836f-d87d5cf827d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-a17b58f6876bd5740a12242958831995.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-a17b58f6876bd5740a12242958831995.yaml new file mode 100644 index 0000000000..fd38670d92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-a17b58f6876bd5740a12242958831995.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-a17b58f6876bd5740a12242958831995 + +info: + name: > + Affiliates Manager <= 2.9.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd37b7a-3ef8-4269-ba3b-665ae34bde26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-c3402d8baeb272f8f57711f60b17c812.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-c3402d8baeb272f8f57711f60b17c812.yaml new file mode 100644 index 0000000000..0b2d265d80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-c3402d8baeb272f8f57711f60b17c812.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-c3402d8baeb272f8f57711f60b17c812 + +info: + name: > + Affiliates Manager <= 2.9.20 - Cross-Site Request Forgery via process_bulk_action() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1a6bdc8-ae74-4d0b-9c47-f4bf69158a44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-d32b9642e142675d1efb9d9aa59869ca.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-d32b9642e142675d1efb9d9aa59869ca.yaml new file mode 100644 index 0000000000..4f56643336 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-d32b9642e142675d1efb9d9aa59869ca.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-d32b9642e142675d1efb9d9aa59869ca + +info: + name: > + Affiliates Manager <= 2.9.34 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/433a03c2-09fd-4ce6-843b-55ad09f4b4f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-e1c03f1ab3bdbb028e55c2429bbfb1ad.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-e1c03f1ab3bdbb028e55c2429bbfb1ad.yaml new file mode 100644 index 0000000000..a23ab4dde8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-e1c03f1ab3bdbb028e55c2429bbfb1ad.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-e1c03f1ab3bdbb028e55c2429bbfb1ad + +info: + name: > + Affiliate Manager <= 2.8.6 - Admin+ SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98adce63-69e6-4a3b-97fe-ecd0480659f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliates-manager-faf4e22f4322606f876df1073bff3e6f.yaml b/nuclei-templates/cve-less/plugins/affiliates-manager-faf4e22f4322606f876df1073bff3e6f.yaml new file mode 100644 index 0000000000..403ac7b7ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliates-manager-faf4e22f4322606f876df1073bff3e6f.yaml @@ -0,0 +1,58 @@ +id: affiliates-manager-faf4e22f4322606f876df1073bff3e6f + +info: + name: > + Affiliates Manager <= 2.9.13 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9d5c661-bc81-4706-b930-6e3309f3d705?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/affiliates-manager/" + google-query: inurl:"/wp-content/plugins/affiliates-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,affiliates-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/affiliates-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affiliates-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliatewp-3205ac6df5d6745a5d1c210179723168.yaml b/nuclei-templates/cve-less/plugins/affiliatewp-3205ac6df5d6745a5d1c210179723168.yaml new file mode 100644 index 0000000000..741e904770 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliatewp-3205ac6df5d6745a5d1c210179723168.yaml @@ -0,0 +1,58 @@ +id: affiliatewp-3205ac6df5d6745a5d1c210179723168 + +info: + name: > + AffiliateWP < 2.0.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c884af7a-cd66-4f38-887d-a782ffb32219?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/AffiliateWP/" + google-query: inurl:"/wp-content/plugins/AffiliateWP/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,AffiliateWP,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/AffiliateWP/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "AffiliateWP" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/affiliatewp-9d0741a170ac5d20bebb10f83abadeaa.yaml b/nuclei-templates/cve-less/plugins/affiliatewp-9d0741a170ac5d20bebb10f83abadeaa.yaml new file mode 100644 index 0000000000..ce911b67ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/affiliatewp-9d0741a170ac5d20bebb10f83abadeaa.yaml @@ -0,0 +1,58 @@ +id: affiliatewp-9d0741a170ac5d20bebb10f83abadeaa + +info: + name: > + AffiliateWP <= 2.14.0 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eab422b8-8cf5-441e-a21f-6a0e1b7642b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/AffiliateWP/" + google-query: inurl:"/wp-content/plugins/AffiliateWP/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,AffiliateWP,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/AffiliateWP/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "AffiliateWP" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/afterpay-gateway-for-woocommerce-33feebd0ce1f9bfb560414c22acd0fc5.yaml b/nuclei-templates/cve-less/plugins/afterpay-gateway-for-woocommerce-33feebd0ce1f9bfb560414c22acd0fc5.yaml new file mode 100644 index 0000000000..123597adfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/afterpay-gateway-for-woocommerce-33feebd0ce1f9bfb560414c22acd0fc5.yaml @@ -0,0 +1,58 @@ +id: afterpay-gateway-for-woocommerce-33feebd0ce1f9bfb560414c22acd0fc5 + +info: + name: > + Afterpay Gateway for WooCommerce <= 3.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86e6a246-557a-42f7-8f1b-b1b914f9f928?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/afterpay-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/afterpay-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,afterpay-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/afterpay-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "afterpay-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/afterpay-gateway-for-woocommerce-936cb1425d1afce350e246d7f6629f3f.yaml b/nuclei-templates/cve-less/plugins/afterpay-gateway-for-woocommerce-936cb1425d1afce350e246d7f6629f3f.yaml new file mode 100644 index 0000000000..be2d47e79c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/afterpay-gateway-for-woocommerce-936cb1425d1afce350e246d7f6629f3f.yaml @@ -0,0 +1,58 @@ +id: afterpay-gateway-for-woocommerce-936cb1425d1afce350e246d7f6629f3f + +info: + name: > + Afterpay Gateway for WooCommerce <= 3.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac381ed7-ff6a-4fbc-965b-80f3804b3c5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/afterpay-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/afterpay-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,afterpay-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/afterpay-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "afterpay-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ag-custom-admin-0fe1889336697580123eb1971e124832.yaml b/nuclei-templates/cve-less/plugins/ag-custom-admin-0fe1889336697580123eb1971e124832.yaml new file mode 100644 index 0000000000..168e372021 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ag-custom-admin-0fe1889336697580123eb1971e124832.yaml @@ -0,0 +1,58 @@ +id: ag-custom-admin-0fe1889336697580123eb1971e124832 + +info: + name: > + AGCA – Custom Dashboard & Login Page <= 7.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c787d28e-c942-415d-8227-ce3e940fd0cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ag-custom-admin/" + google-query: inurl:"/wp-content/plugins/ag-custom-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ag-custom-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ag-custom-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ag-custom-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ag-custom-admin-866cca38d2ecb21a9fd2aaaa55245cfd.yaml b/nuclei-templates/cve-less/plugins/ag-custom-admin-866cca38d2ecb21a9fd2aaaa55245cfd.yaml new file mode 100644 index 0000000000..b8650d4912 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ag-custom-admin-866cca38d2ecb21a9fd2aaaa55245cfd.yaml @@ -0,0 +1,58 @@ +id: ag-custom-admin-866cca38d2ecb21a9fd2aaaa55245cfd + +info: + name: > + Custom Dashboard & Login Page – AGCA <= 6.5.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e10dd0e6-1567-437b-ace7-fae013d66514?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ag-custom-admin/" + google-query: inurl:"/wp-content/plugins/ag-custom-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ag-custom-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ag-custom-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ag-custom-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ag-custom-admin-958209cd1cdd4ea5cb260b87d6b618da.yaml b/nuclei-templates/cve-less/plugins/ag-custom-admin-958209cd1cdd4ea5cb260b87d6b618da.yaml new file mode 100644 index 0000000000..a85a6ab049 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ag-custom-admin-958209cd1cdd4ea5cb260b87d6b618da.yaml @@ -0,0 +1,58 @@ +id: ag-custom-admin-958209cd1cdd4ea5cb260b87d6b618da + +info: + name: > + Absolutely Glamorous Custom Admin <= 6.8 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15f38932-2687-4d71-8793-843058a657d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ag-custom-admin/" + google-query: inurl:"/wp-content/plugins/ag-custom-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ag-custom-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ag-custom-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ag-custom-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ag-custom-admin-b0c570c63a16100d4cac08a03560c9a1.yaml b/nuclei-templates/cve-less/plugins/ag-custom-admin-b0c570c63a16100d4cac08a03560c9a1.yaml new file mode 100644 index 0000000000..636014dd8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ag-custom-admin-b0c570c63a16100d4cac08a03560c9a1.yaml @@ -0,0 +1,58 @@ +id: ag-custom-admin-b0c570c63a16100d4cac08a03560c9a1 + +info: + name: > + Absolutely Glamorous Custom Admin <= 7.2.3 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fae8288-898a-4acd-bbdf-c2fd4f1be1c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ag-custom-admin/" + google-query: inurl:"/wp-content/plugins/ag-custom-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ag-custom-admin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ag-custom-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ag-custom-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ag-custom-admin-c65dc1c886e5406e004d2361f156725f.yaml b/nuclei-templates/cve-less/plugins/ag-custom-admin-c65dc1c886e5406e004d2361f156725f.yaml new file mode 100644 index 0000000000..ab4f690297 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ag-custom-admin-c65dc1c886e5406e004d2361f156725f.yaml @@ -0,0 +1,58 @@ +id: ag-custom-admin-c65dc1c886e5406e004d2361f156725f + +info: + name: > + Custom Dashboard & Login Page < 6.9.5 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f85f2fbb-5bd5-4508-abb0-36543b8ddaa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ag-custom-admin/" + google-query: inurl:"/wp-content/plugins/ag-custom-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ag-custom-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ag-custom-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ag-custom-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/age-gate-6748230cb5270a84b852b5bff3631f4d.yaml b/nuclei-templates/cve-less/plugins/age-gate-6748230cb5270a84b852b5bff3631f4d.yaml new file mode 100644 index 0000000000..cbec391ba8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/age-gate-6748230cb5270a84b852b5bff3631f4d.yaml @@ -0,0 +1,58 @@ +id: age-gate-6748230cb5270a84b852b5bff3631f4d + +info: + name: > + Age Gate <= 2.16.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/103cbd07-4698-4b64-820d-d2df3fce95da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/age-gate/" + google-query: inurl:"/wp-content/plugins/age-gate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,age-gate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/age-gate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "age-gate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/age-gate-97022dfbeffcbfe3aa12e117163569a4.yaml b/nuclei-templates/cve-less/plugins/age-gate-97022dfbeffcbfe3aa12e117163569a4.yaml new file mode 100644 index 0000000000..1a1631465e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/age-gate-97022dfbeffcbfe3aa12e117163569a4.yaml @@ -0,0 +1,58 @@ +id: age-gate-97022dfbeffcbfe3aa12e117163569a4 + +info: + name: > + Age Gate <= 2.17.0 - Cross-Site Scripting via Data Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36304098-fea7-4e67-a138-5670761c6338?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/age-gate/" + google-query: inurl:"/wp-content/plugins/age-gate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,age-gate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/age-gate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "age-gate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/age-gate-fd92bd6a6db4c23807c2430ed1f93f72.yaml b/nuclei-templates/cve-less/plugins/age-gate-fd92bd6a6db4c23807c2430ed1f93f72.yaml new file mode 100644 index 0000000000..77b1859fc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/age-gate-fd92bd6a6db4c23807c2430ed1f93f72.yaml @@ -0,0 +1,58 @@ +id: age-gate-fd92bd6a6db4c23807c2430ed1f93f72 + +info: + name: > + Age Gate <= 2.13.4 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d047fe7-bf00-4f93-91d2-c5da41664bfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/age-gate/" + google-query: inurl:"/wp-content/plugins/age-gate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,age-gate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/age-gate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "age-gate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/age-verification-a5b4dc34f38723a5d47abbf10322cc89.yaml b/nuclei-templates/cve-less/plugins/age-verification-a5b4dc34f38723a5d47abbf10322cc89.yaml new file mode 100644 index 0000000000..772da00cd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/age-verification-a5b4dc34f38723a5d47abbf10322cc89.yaml @@ -0,0 +1,58 @@ +id: age-verification-a5b4dc34f38723a5d47abbf10322cc89 + +info: + name: > + Age Verification <= 0.4 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91021b7f-06d1-4403-81bd-ba082685e58e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/age-verification/" + google-query: inurl:"/wp-content/plugins/age-verification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,age-verification,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/age-verification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "age-verification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/age-verification-screen-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/age-verification-screen-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c7eca075ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/age-verification-screen-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: age-verification-screen-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/age-verification-screen-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/age-verification-screen-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,age-verification-screen-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/age-verification-screen-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "age-verification-screen-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/age-verify-ad680440946c8285b654e4b8c5916390.yaml b/nuclei-templates/cve-less/plugins/age-verify-ad680440946c8285b654e4b8c5916390.yaml new file mode 100644 index 0000000000..93b2c3fd5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/age-verify-ad680440946c8285b654e4b8c5916390.yaml @@ -0,0 +1,58 @@ +id: age-verify-ad680440946c8285b654e4b8c5916390 + +info: + name: > + Age Verify <= 0.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f08c2b-c6e4-431e-bbbd-5dd082b29195?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/age-verify/" + google-query: inurl:"/wp-content/plugins/age-verify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,age-verify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/age-verify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "age-verify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/agenteasy-properties-246a1b75793883d17dc885e0bfc6e4bc.yaml b/nuclei-templates/cve-less/plugins/agenteasy-properties-246a1b75793883d17dc885e0bfc6e4bc.yaml new file mode 100644 index 0000000000..421d2171eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/agenteasy-properties-246a1b75793883d17dc885e0bfc6e4bc.yaml @@ -0,0 +1,58 @@ +id: agenteasy-properties-246a1b75793883d17dc885e0bfc6e4bc + +info: + name: > + AgentEasy Properties <= 1.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fe961c5-de2b-4494-9d89-6bcc7f6d8cd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/agenteasy-properties/" + google-query: inurl:"/wp-content/plugins/agenteasy-properties/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,agenteasy-properties,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/agenteasy-properties/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agenteasy-properties" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/agile-store-locator-589dfcdba354fa240bd819df50a6a8aa.yaml b/nuclei-templates/cve-less/plugins/agile-store-locator-589dfcdba354fa240bd819df50a6a8aa.yaml new file mode 100644 index 0000000000..05217a8c1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/agile-store-locator-589dfcdba354fa240bd819df50a6a8aa.yaml @@ -0,0 +1,58 @@ +id: agile-store-locator-589dfcdba354fa240bd819df50a6a8aa + +info: + name: > + Store Locator WordPress <= 1.4.14 - Authenticated(Administrator+) Directory Traversal to Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cb5c386-eee3-4e88-a827-766a4901f432?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/agile-store-locator/" + google-query: inurl:"/wp-content/plugins/agile-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,agile-store-locator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/agile-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agile-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/agile-store-locator-944ac31152268777f0456da5b0f72ab2.yaml b/nuclei-templates/cve-less/plugins/agile-store-locator-944ac31152268777f0456da5b0f72ab2.yaml new file mode 100644 index 0000000000..af7fbdaaa2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/agile-store-locator-944ac31152268777f0456da5b0f72ab2.yaml @@ -0,0 +1,58 @@ +id: agile-store-locator-944ac31152268777f0456da5b0f72ab2 + +info: + name: > + Store Locator WordPress <= 1.4.12 - Reflected Cross-Site Scripting via 'asl-nounce' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/424a5c60-db14-4a45-8c62-7a11ed377f1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/agile-store-locator/" + google-query: inurl:"/wp-content/plugins/agile-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,agile-store-locator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/agile-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agile-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/agile-store-locator-9a7bc6474013942cb9ad4b06ba961bd0.yaml b/nuclei-templates/cve-less/plugins/agile-store-locator-9a7bc6474013942cb9ad4b06ba961bd0.yaml new file mode 100644 index 0000000000..ce125fb4eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/agile-store-locator-9a7bc6474013942cb9ad4b06ba961bd0.yaml @@ -0,0 +1,58 @@ +id: agile-store-locator-9a7bc6474013942cb9ad4b06ba961bd0 + +info: + name: > + Store Locator WordPress <= 1.4.9 - Authenticated (Editor+) Stored Cross-Site Scripting via 'category_name', 'description', 'description_2' parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dad9de0-5e43-4dfd-a56c-5e9efff35c0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/agile-store-locator/" + google-query: inurl:"/wp-content/plugins/agile-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,agile-store-locator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/agile-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agile-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/agile-store-locator-9bc085475e51bc522ac86c43319af153.yaml b/nuclei-templates/cve-less/plugins/agile-store-locator-9bc085475e51bc522ac86c43319af153.yaml new file mode 100644 index 0000000000..c854d5dc92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/agile-store-locator-9bc085475e51bc522ac86c43319af153.yaml @@ -0,0 +1,58 @@ +id: agile-store-locator-9bc085475e51bc522ac86c43319af153 + +info: + name: > + Store Locator WordPress <= 1.4.5 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62831b8a-2c6c-44cd-9ed1-f188893bed35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/agile-store-locator/" + google-query: inurl:"/wp-content/plugins/agile-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,agile-store-locator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/agile-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agile-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/agile-store-locator-dff478252e53a4d48eba850e27632073.yaml b/nuclei-templates/cve-less/plugins/agile-store-locator-dff478252e53a4d48eba850e27632073.yaml new file mode 100644 index 0000000000..2b866cab9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/agile-store-locator-dff478252e53a4d48eba850e27632073.yaml @@ -0,0 +1,58 @@ +id: agile-store-locator-dff478252e53a4d48eba850e27632073 + +info: + name: > + Store Locator WordPress <= 1.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4e1fe83-678f-4368-9810-16d9cd50b15c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/agile-store-locator/" + google-query: inurl:"/wp-content/plugins/agile-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,agile-store-locator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/agile-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agile-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/agp-font-awesome-collection-6c437d39b10b5c27652f2e2c65e1a8bd.yaml b/nuclei-templates/cve-less/plugins/agp-font-awesome-collection-6c437d39b10b5c27652f2e2c65e1a8bd.yaml new file mode 100644 index 0000000000..24b429d0c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/agp-font-awesome-collection-6c437d39b10b5c27652f2e2c65e1a8bd.yaml @@ -0,0 +1,58 @@ +id: agp-font-awesome-collection-6c437d39b10b5c27652f2e2c65e1a8bd + +info: + name: > + AGP Font Awesome Collection <= 3.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4df1fc3-ea7e-4f41-a5f0-d3928f8add70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/agp-font-awesome-collection/" + google-query: inurl:"/wp-content/plugins/agp-font-awesome-collection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,agp-font-awesome-collection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/agp-font-awesome-collection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agp-font-awesome-collection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/agp-font-awesome-collection-dbfd1d48ef4c46203463363bfd6d7743.yaml b/nuclei-templates/cve-less/plugins/agp-font-awesome-collection-dbfd1d48ef4c46203463363bfd6d7743.yaml new file mode 100644 index 0000000000..112c6945bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/agp-font-awesome-collection-dbfd1d48ef4c46203463363bfd6d7743.yaml @@ -0,0 +1,58 @@ +id: agp-font-awesome-collection-dbfd1d48ef4c46203463363bfd6d7743 + +info: + name: > + AGP Font Awesome Collection <= 3.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abcb2e9f-a6f1-40c3-b419-e2f65ec5dd41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/agp-font-awesome-collection/" + google-query: inurl:"/wp-content/plugins/agp-font-awesome-collection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,agp-font-awesome-collection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/agp-font-awesome-collection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agp-font-awesome-collection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-assistant-by-10web-3a0831746763e4cc6e13a3b507a11959.yaml b/nuclei-templates/cve-less/plugins/ai-assistant-by-10web-3a0831746763e4cc6e13a3b507a11959.yaml new file mode 100644 index 0000000000..16897739fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-assistant-by-10web-3a0831746763e4cc6e13a3b507a11959.yaml @@ -0,0 +1,58 @@ +id: ai-assistant-by-10web-3a0831746763e4cc6e13a3b507a11959 + +info: + name: > + 10Web AI Assistant – AI content writing assistant <= 1.0.18 - Missing Authorization to Arbitrary Plugin Installation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/229245a5-468d-47b9-8f26-d23d593e91da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-assistant-by-10web/" + google-query: inurl:"/wp-content/plugins/ai-assistant-by-10web/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-assistant-by-10web,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-assistant-by-10web/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-assistant-by-10web" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-contact-us-4cb7b1b325a065f19e4694c97bc6e095.yaml b/nuclei-templates/cve-less/plugins/ai-contact-us-4cb7b1b325a065f19e4694c97bc6e095.yaml new file mode 100644 index 0000000000..143bab0fa2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-contact-us-4cb7b1b325a065f19e4694c97bc6e095.yaml @@ -0,0 +1,58 @@ +id: ai-contact-us-4cb7b1b325a065f19e4694c97bc6e095 + +info: + name: > + AI Contact Us Form <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9a65dc9-4c9a-4f19-bd1f-2ca8a6ded18c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-contact-us/" + google-query: inurl:"/wp-content/plugins/ai-contact-us/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-contact-us,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-contact-us/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-contact-us" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-content-writing-assistant-36f9c2eff3f6b6336f95cca8929b8fac.yaml b/nuclei-templates/cve-less/plugins/ai-content-writing-assistant-36f9c2eff3f6b6336f95cca8929b8fac.yaml new file mode 100644 index 0000000000..98138f799c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-content-writing-assistant-36f9c2eff3f6b6336f95cca8929b8fac.yaml @@ -0,0 +1,58 @@ +id: ai-content-writing-assistant-36f9c2eff3f6b6336f95cca8929b8fac + +info: + name: > + AI Content Writing Assistant (Content Writer, ChatGPT, Image Generator) All in One <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3de1bcd7-24a8-4566-819b-d6653344e132?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-content-writing-assistant/" + google-query: inurl:"/wp-content/plugins/ai-content-writing-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-content-writing-assistant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-content-writing-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-content-writing-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-engine-3184746777b9e1e2355cf98fc7ddb576.yaml b/nuclei-templates/cve-less/plugins/ai-engine-3184746777b9e1e2355cf98fc7ddb576.yaml new file mode 100644 index 0000000000..e30a22f62a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-engine-3184746777b9e1e2355cf98fc7ddb576.yaml @@ -0,0 +1,58 @@ +id: ai-engine-3184746777b9e1e2355cf98fc7ddb576 + +info: + name: > + AI Engine: ChatGPT Chatbot, Content Generator, GPT 3 & 4, Ultra-Customizable <= 1.6.82 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d8f59b0-da92-43aa-990d-5271aa40d6b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-engine/" + google-query: inurl:"/wp-content/plugins/ai-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.83') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-engine-780696e15f2e9c20283c58547979c77d.yaml b/nuclei-templates/cve-less/plugins/ai-engine-780696e15f2e9c20283c58547979c77d.yaml new file mode 100644 index 0000000000..bd6a25d9c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-engine-780696e15f2e9c20283c58547979c77d.yaml @@ -0,0 +1,58 @@ +id: ai-engine-780696e15f2e9c20283c58547979c77d + +info: + name: > + AI Engine <= 2.1.4 - Authenticated(Editor+) Arbitrary File Upload via add_image_from_url + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a86f6ed-9755-4265-bc0d-2d0e18e9982f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-engine/" + google-query: inurl:"/wp-content/plugins/ai-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-engine-be2a7ea44bcbe05b9601da197fe2fcd4.yaml b/nuclei-templates/cve-less/plugins/ai-engine-be2a7ea44bcbe05b9601da197fe2fcd4.yaml new file mode 100644 index 0000000000..fc29267830 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-engine-be2a7ea44bcbe05b9601da197fe2fcd4.yaml @@ -0,0 +1,58 @@ +id: ai-engine-be2a7ea44bcbe05b9601da197fe2fcd4 + +info: + name: > + AI Engine: ChatGPT Chatbot <= 1.9.98 - Unauthenticated Arbitrary File Upload via rest_upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3fc4bac-9be0-4a1c-b4bb-4384d80e22f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-engine/" + google-query: inurl:"/wp-content/plugins/ai-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-engine,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-engine-e074a411b9f033a38afc60d73e72553d.yaml b/nuclei-templates/cve-less/plugins/ai-engine-e074a411b9f033a38afc60d73e72553d.yaml new file mode 100644 index 0000000000..7be7d328c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-engine-e074a411b9f033a38afc60d73e72553d.yaml @@ -0,0 +1,58 @@ +id: ai-engine-e074a411b9f033a38afc60d73e72553d + +info: + name: > + AI Engine <= 2.2.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54344300-6288-40bc-b539-3dc9b555ed00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-engine/" + google-query: inurl:"/wp-content/plugins/ai-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-engine-f6ef0668f114bdc3d35c493842c984d6.yaml b/nuclei-templates/cve-less/plugins/ai-engine-f6ef0668f114bdc3d35c493842c984d6.yaml new file mode 100644 index 0000000000..358e3e3263 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-engine-f6ef0668f114bdc3d35c493842c984d6.yaml @@ -0,0 +1,58 @@ +id: ai-engine-f6ef0668f114bdc3d35c493842c984d6 + +info: + name: > + AI Engine <= 2.1.4 - Authenticated (Editor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/206d343d-6ed6-461c-bf7d-cf5011ed956f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-engine/" + google-query: inurl:"/wp-content/plugins/ai-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-engine,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-post-generator-9eed014edec42d5cd4860053e291ce89.yaml b/nuclei-templates/cve-less/plugins/ai-post-generator-9eed014edec42d5cd4860053e291ce89.yaml new file mode 100644 index 0000000000..c26ac2f894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-post-generator-9eed014edec42d5cd4860053e291ce89.yaml @@ -0,0 +1,58 @@ +id: ai-post-generator-9eed014edec42d5cd4860053e291ce89 + +info: + name: > + AI Post Generator | AutoWriter <= 3.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43fc47ca-15ca-4817-b1b8-389245725e73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-post-generator/" + google-query: inurl:"/wp-content/plugins/ai-post-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-post-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-post-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-post-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-twitter-feeds-bec7b3aa816a59f17fd4e32834f42e90.yaml b/nuclei-templates/cve-less/plugins/ai-twitter-feeds-bec7b3aa816a59f17fd4e32834f42e90.yaml new file mode 100644 index 0000000000..19199ad740 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-twitter-feeds-bec7b3aa816a59f17fd4e32834f42e90.yaml @@ -0,0 +1,58 @@ +id: ai-twitter-feeds-bec7b3aa816a59f17fd4e32834f42e90 + +info: + name: > + AI Twitter Feeds (Twitter widget & shortcode) <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84b6f093-afd4-401f-ba82-d5be10b0fff8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-twitter-feeds/" + google-query: inurl:"/wp-content/plugins/ai-twitter-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-twitter-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-twitter-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-twitter-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ai-wp-writer-77df5424b8737ee4b8f9f9f20e1fee34.yaml b/nuclei-templates/cve-less/plugins/ai-wp-writer-77df5424b8737ee4b8f9f9f20e1fee34.yaml new file mode 100644 index 0000000000..601e7a0afd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ai-wp-writer-77df5424b8737ee4b8f9f9f20e1fee34.yaml @@ -0,0 +1,58 @@ +id: ai-wp-writer-77df5424b8737ee4b8f9f9f20e1fee34 + +info: + name: > + AI WP Writer <= 3.6.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d2da608-81a4-47b5-b23d-d18ab7bc2aa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ai-wp-writer/" + google-query: inurl:"/wp-content/plugins/ai-wp-writer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ai-wp-writer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ai-wp-writer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ai-wp-writer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aikit-wordpress-ai-writing-assistant-using-gpt3-9466631ad739782449cdf9fdc36419ff.yaml b/nuclei-templates/cve-less/plugins/aikit-wordpress-ai-writing-assistant-using-gpt3-9466631ad739782449cdf9fdc36419ff.yaml new file mode 100644 index 0000000000..d9db475a75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aikit-wordpress-ai-writing-assistant-using-gpt3-9466631ad739782449cdf9fdc36419ff.yaml @@ -0,0 +1,58 @@ +id: aikit-wordpress-ai-writing-assistant-using-gpt3-9466631ad739782449cdf9fdc36419ff + +info: + name: > + AIKit <= 4.14.1 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d50d0e87-a4be-465b-8cc1-4b56201c9fc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aikit-wordpress-ai-writing-assistant-using-gpt3/" + google-query: inurl:"/wp-content/plugins/aikit-wordpress-ai-writing-assistant-using-gpt3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aikit-wordpress-ai-writing-assistant-using-gpt3,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aikit-wordpress-ai-writing-assistant-using-gpt3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aikit-wordpress-ai-writing-assistant-using-gpt3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aio-time-clock-lite-395ce3ec44ad4bf8f5ea06caea1ca7c5.yaml b/nuclei-templates/cve-less/plugins/aio-time-clock-lite-395ce3ec44ad4bf8f5ea06caea1ca7c5.yaml new file mode 100644 index 0000000000..1b93830bb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aio-time-clock-lite-395ce3ec44ad4bf8f5ea06caea1ca7c5.yaml @@ -0,0 +1,58 @@ +id: aio-time-clock-lite-395ce3ec44ad4bf8f5ea06caea1ca7c5 + +info: + name: > + All in One Time Clok Lite <= 1.3.320 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e5c0282-6d13-4c83-8d1f-c49430f714d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aio-time-clock-lite/" + google-query: inurl:"/wp-content/plugins/aio-time-clock-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aio-time-clock-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aio-time-clock-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aio-time-clock-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.320') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/airpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/airpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3e89a5e796 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/airpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: airpress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/airpress/" + google-query: inurl:"/wp-content/plugins/airpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,airpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/airpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "airpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ait-csv-import-export-11ae27bab87a7fcaf72c7e008d486310.yaml b/nuclei-templates/cve-less/plugins/ait-csv-import-export-11ae27bab87a7fcaf72c7e008d486310.yaml new file mode 100644 index 0000000000..4663dfe382 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ait-csv-import-export-11ae27bab87a7fcaf72c7e008d486310.yaml @@ -0,0 +1,58 @@ +id: ait-csv-import-export-11ae27bab87a7fcaf72c7e008d486310 + +info: + name: > + AIT CSV import/export <= 3.0.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cece751c-400d-42b4-9438-950d5aca51fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ait-csv-import-export/" + google-query: inurl:"/wp-content/plugins/ait-csv-import-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ait-csv-import-export,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ait-csv-import-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ait-csv-import-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-archive-calendar-2689d661f3ccd51f254bc58895e1f11d.yaml b/nuclei-templates/cve-less/plugins/ajax-archive-calendar-2689d661f3ccd51f254bc58895e1f11d.yaml new file mode 100644 index 0000000000..a0aaf83297 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-archive-calendar-2689d661f3ccd51f254bc58895e1f11d.yaml @@ -0,0 +1,58 @@ +id: ajax-archive-calendar-2689d661f3ccd51f254bc58895e1f11d + +info: + name: > + Ajax Archive Calendar <= 2.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/664d22f2-b7a3-42df-9530-4040160ead2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-archive-calendar/" + google-query: inurl:"/wp-content/plugins/ajax-archive-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-archive-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-archive-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-archive-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-bootmodal-login-f3c89d2a491437ada76310350bb04447.yaml b/nuclei-templates/cve-less/plugins/ajax-bootmodal-login-f3c89d2a491437ada76310350bb04447.yaml new file mode 100644 index 0000000000..82469594c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-bootmodal-login-f3c89d2a491437ada76310350bb04447.yaml @@ -0,0 +1,58 @@ +id: ajax-bootmodal-login-f3c89d2a491437ada76310350bb04447 + +info: + name: > + Ajax BootModal Login <= 1.4.3 - CAPTCHA Reuse + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcac3b4e-b80f-4201-9e56-8990013c4ab9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-bootmodal-login/" + google-query: inurl:"/wp-content/plugins/ajax-bootmodal-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-bootmodal-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-bootmodal-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-bootmodal-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-domain-checker-61e6a79f794c5261dca1b1de62bb1bb1.yaml b/nuclei-templates/cve-less/plugins/ajax-domain-checker-61e6a79f794c5261dca1b1de62bb1bb1.yaml new file mode 100644 index 0000000000..968898039b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-domain-checker-61e6a79f794c5261dca1b1de62bb1bb1.yaml @@ -0,0 +1,58 @@ +id: ajax-domain-checker-61e6a79f794c5261dca1b1de62bb1bb1 + +info: + name: > + Ajax Domain Checker <= 1.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/699459a1-d407-4561-9d08-dd5d918ea601?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-domain-checker/" + google-query: inurl:"/wp-content/plugins/ajax-domain-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-domain-checker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-domain-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-domain-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-filter-posts-81e36fcfaba8f47f8b0cb1d0a7f67af8.yaml b/nuclei-templates/cve-less/plugins/ajax-filter-posts-81e36fcfaba8f47f8b0cb1d0a7f67af8.yaml new file mode 100644 index 0000000000..96009a6ce3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-filter-posts-81e36fcfaba8f47f8b0cb1d0a7f67af8.yaml @@ -0,0 +1,58 @@ +id: ajax-filter-posts-81e36fcfaba8f47f8b0cb1d0a7f67af8 + +info: + name: > + Post Grid Master <= 3.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebc0e28-ced8-4fb0-818d-1452faf9660d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-filter-posts/" + google-query: inurl:"/wp-content/plugins/ajax-filter-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-filter-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-filter-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-filter-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-filter-posts-de3ad2c14ae092820725df486681b852.yaml b/nuclei-templates/cve-less/plugins/ajax-filter-posts-de3ad2c14ae092820725df486681b852.yaml new file mode 100644 index 0000000000..527136b44e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-filter-posts-de3ad2c14ae092820725df486681b852.yaml @@ -0,0 +1,58 @@ +id: ajax-filter-posts-de3ad2c14ae092820725df486681b852 + +info: + name: > + Post Grid Master <= 3.4.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb3b8d0b-4e58-408c-9527-dc17f62d3167?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-filter-posts/" + google-query: inurl:"/wp-content/plugins/ajax-filter-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-filter-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-filter-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-filter-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-0d10f95dc02c34323ca2661d596c206b.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-0d10f95dc02c34323ca2661d596c206b.yaml new file mode 100644 index 0000000000..1bdcdd103c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-0d10f95dc02c34323ca2661d596c206b.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-0d10f95dc02c34323ca2661d596c206b + +info: + name: > + WordPress Infinite Scroll – Ajax Load More <= 2.8.1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10e98088-423d-45bb-ae90-51e895d2929b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-1e202ba9a2d031ffbc5309780a3c635a.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-1e202ba9a2d031ffbc5309780a3c635a.yaml new file mode 100644 index 0000000000..38633fd0be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-1e202ba9a2d031ffbc5309780a3c635a.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-1e202ba9a2d031ffbc5309780a3c635a + +info: + name: > + WordPress Infinite Scroll – Ajax Load More <= 5.5.3 - Cross-Site Request Forgery to PHAR Deserialization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/040ae20d-93e3-4c65-ba74-4ff0b5c1afc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-28696fa61d6f901911f226ee59d9bc21.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-28696fa61d6f901911f226ee59d9bc21.yaml new file mode 100644 index 0000000000..9d02f8ad65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-28696fa61d6f901911f226ee59d9bc21.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-28696fa61d6f901911f226ee59d9bc21 + +info: + name: > + Infinite Scroll – Ajax Load More <= 5.5.4 - Authenticated (Admin+) Arbitrary File Read via Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f1cf0f3-faf2-43f7-a641-95bfa5d73ca8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-492664286a6eb9d8fced88f47715604a.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-492664286a6eb9d8fced88f47715604a.yaml new file mode 100644 index 0000000000..db485b0bdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-492664286a6eb9d8fced88f47715604a.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-492664286a6eb9d8fced88f47715604a + +info: + name: > + Ajax Load More plugin < 5.3.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20eff8fc-0572-40b9-ab28-758c7ab8ed73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-4f9a7c8d29cfd4a2c0b16e09a2e378ae.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-4f9a7c8d29cfd4a2c0b16e09a2e378ae.yaml new file mode 100644 index 0000000000..1b2d76ac85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-4f9a7c8d29cfd4a2c0b16e09a2e378ae.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-4f9a7c8d29cfd4a2c0b16e09a2e378ae + +info: + name: > + WordPress Infinite Scroll – Ajax Load More <= 5.5.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8957413c-95e0-49c8-ba8a-02b9b5141e08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-581efb108579060acb9ef33538e40085.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-581efb108579060acb9ef33538e40085.yaml new file mode 100644 index 0000000000..42b6af7ba6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-581efb108579060acb9ef33538e40085.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-581efb108579060acb9ef33538e40085 + +info: + name: > + WordPress Infinite Scroll – Ajax Load More <= 5.5.3 - Authenticated (Admin+) Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d643d07-7533-430b-a1d8-8e66a2a2c5e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-638d34b4766f8e2a63bed27bf53ab9d8.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-638d34b4766f8e2a63bed27bf53ab9d8.yaml new file mode 100644 index 0000000000..4b018a95f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-638d34b4766f8e2a63bed27bf53ab9d8.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-638d34b4766f8e2a63bed27bf53ab9d8 + +info: + name: > + WordPress Infinite Scroll - Ajax Load More <= 5.6.0.2 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9595fa45-6b00-4ee0-89aa-a236dbf82423?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-8d9637ff6f7495cd146495e0fed931b5.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-8d9637ff6f7495cd146495e0fed931b5.yaml new file mode 100644 index 0000000000..e616bc065d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-8d9637ff6f7495cd146495e0fed931b5.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-8d9637ff6f7495cd146495e0fed931b5 + +info: + name: > + Ajax Load More <= 7.0.1 - Authenticated (Admin+) Directory Traversal to Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86090ab4-9f1d-4a92-a302-118524a5ffaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-anything-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-anything-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..bbafc0f259 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-anything-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-anything-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more-anything/" + google-query: inurl:"/wp-content/plugins/ajax-load-more-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more-anything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-anything-d42480a2d6aa4bbbab085fa708ce9549.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-anything-d42480a2d6aa4bbbab085fa708ce9549.yaml new file mode 100644 index 0000000000..6ae8196ba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-anything-d42480a2d6aa4bbbab085fa708ce9549.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-anything-d42480a2d6aa4bbbab085fa708ce9549 + +info: + name: > + Load More Anything <= 3.3.3 - Missing Authorization to Plugin Settings Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/797554c9-7008-451a-8e8d-3242a207347e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more-anything/" + google-query: inurl:"/wp-content/plugins/ajax-load-more-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more-anything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-d42fbc843251d5f50991be5b8b42b3d6.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-d42fbc843251d5f50991be5b8b42b3d6.yaml new file mode 100644 index 0000000000..7df980801e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-d42fbc843251d5f50991be5b8b42b3d6.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-d42fbc843251d5f50991be5b8b42b3d6 + +info: + name: > + Ajax Load More <= 7.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9bbcb41-d604-45ec-a36a-4b41e8f7a508?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-dd9fbf3b8166974e70c88fa52bb178a3.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-dd9fbf3b8166974e70c88fa52bb178a3.yaml new file mode 100644 index 0000000000..205be5d1cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-dd9fbf3b8166974e70c88fa52bb178a3.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-dd9fbf3b8166974e70c88fa52bb178a3 + +info: + name: > + Ajax Load More < 2.11.2 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1bb3ab9-afbb-40e7-967a-45f737777dcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-load-more-ed883dae9c66c1836affaf918e96286d.yaml b/nuclei-templates/cve-less/plugins/ajax-load-more-ed883dae9c66c1836affaf918e96286d.yaml new file mode 100644 index 0000000000..7338a75dc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-load-more-ed883dae9c66c1836affaf918e96286d.yaml @@ -0,0 +1,58 @@ +id: ajax-load-more-ed883dae9c66c1836affaf918e96286d + +info: + name: > + WordPress Infinite Scroll – Ajax Load More <= 6.1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3bcc0aa-281f-4c59-b3de-dde4277cc989?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-load-more/" + google-query: inurl:"/wp-content/plugins/ajax-load-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-load-more,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-load-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-load-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-login-and-registration-modal-popup-d5f5796dec9da2bb7306be7b46162089.yaml b/nuclei-templates/cve-less/plugins/ajax-login-and-registration-modal-popup-d5f5796dec9da2bb7306be7b46162089.yaml new file mode 100644 index 0000000000..dfd825c51e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-login-and-registration-modal-popup-d5f5796dec9da2bb7306be7b46162089.yaml @@ -0,0 +1,58 @@ +id: ajax-login-and-registration-modal-popup-d5f5796dec9da2bb7306be7b46162089 + +info: + name: > + AJAX Login and Registration modal popup + inline form <= 2.23 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9eeee18d-a035-4de6-a2fc-19479387c4df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-login-and-registration-modal-popup/" + google-query: inurl:"/wp-content/plugins/ajax-login-and-registration-modal-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-login-and-registration-modal-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-login-and-registration-modal-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-login-and-registration-modal-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-pagination-2a977820226e88678497823102fe2796.yaml b/nuclei-templates/cve-less/plugins/ajax-pagination-2a977820226e88678497823102fe2796.yaml new file mode 100644 index 0000000000..b30a568a76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-pagination-2a977820226e88678497823102fe2796.yaml @@ -0,0 +1,58 @@ +id: ajax-pagination-2a977820226e88678497823102fe2796 + +info: + name: > + Ajax Pagination (twitter Style) <= 1.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d42eeda5-7034-4544-be97-8064ff6d3185?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-pagination/" + google-query: inurl:"/wp-content/plugins/ajax-pagination/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-pagination,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-pagination/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-pagination" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-random-post-f5f9272c971083b586bc76b67b0f159d.yaml b/nuclei-templates/cve-less/plugins/ajax-random-post-f5f9272c971083b586bc76b67b0f159d.yaml new file mode 100644 index 0000000000..0719113a68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-random-post-f5f9272c971083b586bc76b67b0f159d.yaml @@ -0,0 +1,58 @@ +id: ajax-random-post-f5f9272c971083b586bc76b67b0f159d + +info: + name: > + AJAX Random Post <= 2.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bb13936-cbc0-4cba-bd62-ef6d9728a65a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-random-post/" + google-query: inurl:"/wp-content/plugins/ajax-random-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-random-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-random-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-random-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-random-posts-84109abe067d4816d7c462f3484f1a25.yaml b/nuclei-templates/cve-less/plugins/ajax-random-posts-84109abe067d4816d7c462f3484f1a25.yaml new file mode 100644 index 0000000000..4fb276c06d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-random-posts-84109abe067d4816d7c462f3484f1a25.yaml @@ -0,0 +1,58 @@ +id: ajax-random-posts-84109abe067d4816d7c462f3484f1a25 + +info: + name: > + AJAX Random Posts <= 0.3.3 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17ccf3f5-ac71-4827-bf11-9a5199f8752e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-random-posts/" + google-query: inurl:"/wp-content/plugins/ajax-random-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-random-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-random-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-random-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-6a2b5867f4b2cb8b9df53b8ba2dbfdc3.yaml b/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-6a2b5867f4b2cb8b9df53b8ba2dbfdc3.yaml new file mode 100644 index 0000000000..eac69cdcad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-6a2b5867f4b2cb8b9df53b8ba2dbfdc3.yaml @@ -0,0 +1,58 @@ +id: ajax-search-for-woocommerce-6a2b5867f4b2cb8b9df53b8ba2dbfdc3 + +info: + name: > + FiboSearch <= 1.17.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c171fb-5053-455d-8aa0-db51b80f7a65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ajax-search-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..894c577abd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ajax-search-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ajax-search-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-d03e7c1b36748ce86c160cf6fe252332.yaml b/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-d03e7c1b36748ce86c160cf6fe252332.yaml new file mode 100644 index 0000000000..6d2bf86f3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-for-woocommerce-d03e7c1b36748ce86c160cf6fe252332.yaml @@ -0,0 +1,58 @@ +id: ajax-search-for-woocommerce-d03e7c1b36748ce86c160cf6fe252332 + +info: + name: > + FiboSearch - AJAX Search for WooCommerce <= 1.23.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/880573d8-6dad-4a1b-a5db-33e1dc243062?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ajax-search-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.23.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-lite-150da04fe1b2c2f3039470b8ad6b53ba.yaml b/nuclei-templates/cve-less/plugins/ajax-search-lite-150da04fe1b2c2f3039470b8ad6b53ba.yaml new file mode 100644 index 0000000000..dd17856658 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-lite-150da04fe1b2c2f3039470b8ad6b53ba.yaml @@ -0,0 +1,58 @@ +id: ajax-search-lite-150da04fe1b2c2f3039470b8ad6b53ba + +info: + name: > + Ajax Search Lite < 3.11 - Missing Authorization to Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c439914-1d5a-4607-8e5c-9279fa3b462c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-lite/" + google-query: inurl:"/wp-content/plugins/ajax-search-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-lite-83c0864a3df9b4d7703e76d7c2b55658.yaml b/nuclei-templates/cve-less/plugins/ajax-search-lite-83c0864a3df9b4d7703e76d7c2b55658.yaml new file mode 100644 index 0000000000..99fa412c63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-lite-83c0864a3df9b4d7703e76d7c2b55658.yaml @@ -0,0 +1,58 @@ +id: ajax-search-lite-83c0864a3df9b4d7703e76d7c2b55658 + +info: + name: > + Ajax Search Lite <= 4.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5e6cb50-8262-406b-b01e-37d62a4bd394?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-lite/" + google-query: inurl:"/wp-content/plugins/ajax-search-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-lite-a9cc73f9037d9cdf674a96fc1a0c0e0f.yaml b/nuclei-templates/cve-less/plugins/ajax-search-lite-a9cc73f9037d9cdf674a96fc1a0c0e0f.yaml new file mode 100644 index 0000000000..d400187c79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-lite-a9cc73f9037d9cdf674a96fc1a0c0e0f.yaml @@ -0,0 +1,58 @@ +id: ajax-search-lite-a9cc73f9037d9cdf674a96fc1a0c0e0f + +info: + name: > + Ajax Search Lite <= 4.10.3 - Missing Authorization leading to Authenticated (Subscriber+) Sensitive Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f2c157b-cd5a-459d-8e26-859e686148dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-lite/" + google-query: inurl:"/wp-content/plugins/ajax-search-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-lite-d1c4ab98e28efbbf6dc7bca15dda3762.yaml b/nuclei-templates/cve-less/plugins/ajax-search-lite-d1c4ab98e28efbbf6dc7bca15dda3762.yaml new file mode 100644 index 0000000000..e4617fd063 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-lite-d1c4ab98e28efbbf6dc7bca15dda3762.yaml @@ -0,0 +1,58 @@ +id: ajax-search-lite-d1c4ab98e28efbbf6dc7bca15dda3762 + +info: + name: > + Ajax Search Lite <= 4.11.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19418da4-bef4-4cbc-901c-f2aeee39b3cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-lite/" + google-query: inurl:"/wp-content/plugins/ajax-search-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-lite-ee8c565da649725aad8c04a309fabb54.yaml b/nuclei-templates/cve-less/plugins/ajax-search-lite-ee8c565da649725aad8c04a309fabb54.yaml new file mode 100644 index 0000000000..8b35697b9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-lite-ee8c565da649725aad8c04a309fabb54.yaml @@ -0,0 +1,58 @@ +id: ajax-search-lite-ee8c565da649725aad8c04a309fabb54 + +info: + name: > + Ajax Search Lite < 3.11 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5a1baaa-d593-4559-953c-9393bde8d711?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-lite/" + google-query: inurl:"/wp-content/plugins/ajax-search-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-pro-50dadf64810a03dde8b1e065c3742494.yaml b/nuclei-templates/cve-less/plugins/ajax-search-pro-50dadf64810a03dde8b1e065c3742494.yaml new file mode 100644 index 0000000000..499504bf70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-pro-50dadf64810a03dde8b1e065c3742494.yaml @@ -0,0 +1,58 @@ +id: ajax-search-pro-50dadf64810a03dde8b1e065c3742494 + +info: + name: > + Ajax Search Pro <= 4.26.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1a0d54f-08f7-4ec5-8cfe-6c4a6eb26748?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-pro/" + google-query: inurl:"/wp-content/plugins/ajax-search-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.26.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-pro-a0309fc6dada5d85650b4762bb282066.yaml b/nuclei-templates/cve-less/plugins/ajax-search-pro-a0309fc6dada5d85650b4762bb282066.yaml new file mode 100644 index 0000000000..f722825eb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-pro-a0309fc6dada5d85650b4762bb282066.yaml @@ -0,0 +1,58 @@ +id: ajax-search-pro-a0309fc6dada5d85650b4762bb282066 + +info: + name: > + Ajax Search Pro <= 4.18.7 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96608c76-6dfd-4ff8-b114-070ff6706214?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-pro/" + google-query: inurl:"/wp-content/plugins/ajax-search-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.18.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-pro-a896492161d6d4522e22315d9827d81b.yaml b/nuclei-templates/cve-less/plugins/ajax-search-pro-a896492161d6d4522e22315d9827d81b.yaml new file mode 100644 index 0000000000..a33417f67a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-pro-a896492161d6d4522e22315d9827d81b.yaml @@ -0,0 +1,58 @@ +id: ajax-search-pro-a896492161d6d4522e22315d9827d81b + +info: + name: > + Ajax Search Pro <= 4.18.7 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b34a82c5-4d70-47d3-9a02-7eeaa13ff677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-pro/" + google-query: inurl:"/wp-content/plugins/ajax-search-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.18.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-search-pro-e17e90463e6889aa07cbb8b7927771be.yaml b/nuclei-templates/cve-less/plugins/ajax-search-pro-e17e90463e6889aa07cbb8b7927771be.yaml new file mode 100644 index 0000000000..74352373d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-search-pro-e17e90463e6889aa07cbb8b7927771be.yaml @@ -0,0 +1,58 @@ +id: ajax-search-pro-e17e90463e6889aa07cbb8b7927771be + +info: + name: > + Ajax Search Pro <= 3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ae0d83b-a444-4141-89da-b63ce216db17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-search-pro/" + google-query: inurl:"/wp-content/plugins/ajax-search-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-search-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-search-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-search-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-store-locator-08f39736bf86d4909fd35daa9e56d865.yaml b/nuclei-templates/cve-less/plugins/ajax-store-locator-08f39736bf86d4909fd35daa9e56d865.yaml new file mode 100644 index 0000000000..306c462fd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-store-locator-08f39736bf86d4909fd35daa9e56d865.yaml @@ -0,0 +1,58 @@ +id: ajax-store-locator-08f39736bf86d4909fd35daa9e56d865 + +info: + name: > + Ajax Store Locator <= 1.2 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b40c89e5-d291-45b7-b84a-6fee75e5b7eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-store-locator/" + google-query: inurl:"/wp-content/plugins/ajax-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-store-locator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-store-locator-13897edd701bcc92c64dc07394d89d44.yaml b/nuclei-templates/cve-less/plugins/ajax-store-locator-13897edd701bcc92c64dc07394d89d44.yaml new file mode 100644 index 0000000000..0b053404b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-store-locator-13897edd701bcc92c64dc07394d89d44.yaml @@ -0,0 +1,58 @@ +id: ajax-store-locator-13897edd701bcc92c64dc07394d89d44 + +info: + name: > + AJAX Store Locator <= 1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b456815-ffdf-41fb-b4a8-0f22fd059d34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-store-locator/" + google-query: inurl:"/wp-content/plugins/ajax-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-store-locator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax-thumbnail-rebuild-4fe952dc4f33b2225826338b2a3f9203.yaml b/nuclei-templates/cve-less/plugins/ajax-thumbnail-rebuild-4fe952dc4f33b2225826338b2a3f9203.yaml new file mode 100644 index 0000000000..117902cf8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax-thumbnail-rebuild-4fe952dc4f33b2225826338b2a3f9203.yaml @@ -0,0 +1,58 @@ +id: ajax-thumbnail-rebuild-4fe952dc4f33b2225826338b2a3f9203 + +info: + name: > + AJAX Thumbnail Rebuild <= 1.13 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/039d2a35-fbd9-467b-ae98-2d47ff03fb2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax-thumbnail-rebuild/" + google-query: inurl:"/wp-content/plugins/ajax-thumbnail-rebuild/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax-thumbnail-rebuild,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax-thumbnail-rebuild/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax-thumbnail-rebuild" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ajax_multi_upload-4a0db472e405a72a7a0d1d796c76bfbb.yaml b/nuclei-templates/cve-less/plugins/ajax_multi_upload-4a0db472e405a72a7a0d1d796c76bfbb.yaml new file mode 100644 index 0000000000..4d59170834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ajax_multi_upload-4a0db472e405a72a7a0d1d796c76bfbb.yaml @@ -0,0 +1,58 @@ +id: ajax_multi_upload-4a0db472e405a72a7a0d1d796c76bfbb + +info: + name: > + AJAX Multi Upload <= 1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f20734d-4105-401b-992a-b47d049f70f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ajax_multi_upload/" + google-query: inurl:"/wp-content/plugins/ajax_multi_upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ajax_multi_upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ajax_multi_upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ajax_multi_upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/akismet-0b8de7e6634f1364f8cfc6fe68a06736.yaml b/nuclei-templates/cve-less/plugins/akismet-0b8de7e6634f1364f8cfc6fe68a06736.yaml new file mode 100644 index 0000000000..ff0e0edde8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/akismet-0b8de7e6634f1364f8cfc6fe68a06736.yaml @@ -0,0 +1,58 @@ +id: akismet-0b8de7e6634f1364f8cfc6fe68a06736 + +info: + name: > + Akismet Spam Protection < 2.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e69122ed-8f18-4f2d-ba77-7538c7b6de6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/akismet/" + google-query: inurl:"/wp-content/plugins/akismet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,akismet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/akismet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "akismet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/akismet-cff9e4a18682397642168ab27f023202.yaml b/nuclei-templates/cve-less/plugins/akismet-cff9e4a18682397642168ab27f023202.yaml new file mode 100644 index 0000000000..0fa286786a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/akismet-cff9e4a18682397642168ab27f023202.yaml @@ -0,0 +1,58 @@ +id: akismet-cff9e4a18682397642168ab27f023202 + +info: + name: > + Akismet <= 3.1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51b60e28-fb43-434a-88ca-3c73a8e89d40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/akismet/" + google-query: inurl:"/wp-content/plugins/akismet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,akismet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/akismet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "akismet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/akismet-privacy-policies-7d62761bf9e985cd9ec96ef45ca051b2.yaml b/nuclei-templates/cve-less/plugins/akismet-privacy-policies-7d62761bf9e985cd9ec96ef45ca051b2.yaml new file mode 100644 index 0000000000..1243a92721 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/akismet-privacy-policies-7d62761bf9e985cd9ec96ef45ca051b2.yaml @@ -0,0 +1,58 @@ +id: akismet-privacy-policies-7d62761bf9e985cd9ec96ef45ca051b2 + +info: + name: > + Akismet Privacy Policies <= 2.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a195892b-75d3-4a5d-86e1-4eb4b9f62624?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/akismet-privacy-policies/" + google-query: inurl:"/wp-content/plugins/akismet-privacy-policies/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,akismet-privacy-policies,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/akismet-privacy-policies/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "akismet-privacy-policies" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-1a93903cd8703be96d5ab3384ff96410.yaml b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-1a93903cd8703be96d5ab3384ff96410.yaml new file mode 100644 index 0000000000..d78d717362 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-1a93903cd8703be96d5ab3384ff96410.yaml @@ -0,0 +1,58 @@ +id: albo-pretorio-on-line-1a93903cd8703be96d5ab3384ff96410 + +info: + name: > + Albo Pretorio Online <= 4.6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b186c98e-6a8d-4675-aaaa-c6748319dec1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/albo-pretorio-on-line/" + google-query: inurl:"/wp-content/plugins/albo-pretorio-on-line/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,albo-pretorio-on-line,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/albo-pretorio-on-line/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "albo-pretorio-on-line" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-5dcbe902f6c095827d48543a0e5195b8.yaml b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-5dcbe902f6c095827d48543a0e5195b8.yaml new file mode 100644 index 0000000000..7828bd0d1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-5dcbe902f6c095827d48543a0e5195b8.yaml @@ -0,0 +1,58 @@ +id: albo-pretorio-on-line-5dcbe902f6c095827d48543a0e5195b8 + +info: + name: > + Albo Pretorio Online <= 4.6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1a3ea4c-163f-406c-a819-92d3157fd93f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/albo-pretorio-on-line/" + google-query: inurl:"/wp-content/plugins/albo-pretorio-on-line/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,albo-pretorio-on-line,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/albo-pretorio-on-line/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "albo-pretorio-on-line" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-6838ce604685d145899a0da7953c236d.yaml b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-6838ce604685d145899a0da7953c236d.yaml new file mode 100644 index 0000000000..9c3a6d2ed5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-6838ce604685d145899a0da7953c236d.yaml @@ -0,0 +1,58 @@ +id: albo-pretorio-on-line-6838ce604685d145899a0da7953c236d + +info: + name: > + Albo Pretorio Online <= 4.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fbcd728-d2a2-4787-841d-0ce77356f737?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/albo-pretorio-on-line/" + google-query: inurl:"/wp-content/plugins/albo-pretorio-on-line/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,albo-pretorio-on-line,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/albo-pretorio-on-line/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "albo-pretorio-on-line" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-79d3f2b9565b075a8be7591881880990.yaml b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-79d3f2b9565b075a8be7591881880990.yaml new file mode 100644 index 0000000000..827d1312bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-79d3f2b9565b075a8be7591881880990.yaml @@ -0,0 +1,58 @@ +id: albo-pretorio-on-line-79d3f2b9565b075a8be7591881880990 + +info: + name: > + Albo Pretorio Online <= 4.6.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92f8e3b7-a896-494b-96cd-6ecb8918ebd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/albo-pretorio-on-line/" + google-query: inurl:"/wp-content/plugins/albo-pretorio-on-line/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,albo-pretorio-on-line,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/albo-pretorio-on-line/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "albo-pretorio-on-line" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-c50e397cbcec3a24df13ba5f0440e5c0.yaml b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-c50e397cbcec3a24df13ba5f0440e5c0.yaml new file mode 100644 index 0000000000..73c0719144 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-c50e397cbcec3a24df13ba5f0440e5c0.yaml @@ -0,0 +1,58 @@ +id: albo-pretorio-on-line-c50e397cbcec3a24df13ba5f0440e5c0 + +info: + name: > + Albo Pretorio Online <= 4.6 - Reflected Cross-Site Scripting via 'Errore' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad8f8c41-a3b9-4287-b6b2-489fb77b7553?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/albo-pretorio-on-line/" + google-query: inurl:"/wp-content/plugins/albo-pretorio-on-line/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,albo-pretorio-on-line,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/albo-pretorio-on-line/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "albo-pretorio-on-line" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-dce5f7b0fd01a31b21d6138c4476ff92.yaml b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-dce5f7b0fd01a31b21d6138c4476ff92.yaml new file mode 100644 index 0000000000..fb212ef545 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/albo-pretorio-on-line-dce5f7b0fd01a31b21d6138c4476ff92.yaml @@ -0,0 +1,58 @@ +id: albo-pretorio-on-line-dce5f7b0fd01a31b21d6138c4476ff92 + +info: + name: > + Albo Pretorio Online <= 4.6.6 - Unauthenticated Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3535fad2-9b2d-4721-9e5d-cfe609df00ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/albo-pretorio-on-line/" + google-query: inurl:"/wp-content/plugins/albo-pretorio-on-line/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,albo-pretorio-on-line,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/albo-pretorio-on-line/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "albo-pretorio-on-line" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-20745ffeb0a850e3593a6c35ba6844e0.yaml b/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-20745ffeb0a850e3593a6c35ba6844e0.yaml new file mode 100644 index 0000000000..f9c1cb82bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-20745ffeb0a850e3593a6c35ba6844e0.yaml @@ -0,0 +1,58 @@ +id: album-and-image-gallery-plus-lightbox-20745ffeb0a850e3593a6c35ba6844e0 + +info: + name: > + Album and Image Gallery plus Lightbox <= 1.6.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df1a3425-b1d7-4914-ab19-c215d4e845ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/album-and-image-gallery-plus-lightbox/" + google-query: inurl:"/wp-content/plugins/album-and-image-gallery-plus-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,album-and-image-gallery-plus-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/album-and-image-gallery-plus-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "album-and-image-gallery-plus-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-3d269a7750029141d9d3783312ca3377.yaml b/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-3d269a7750029141d9d3783312ca3377.yaml new file mode 100644 index 0000000000..800d31b6a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-3d269a7750029141d9d3783312ca3377.yaml @@ -0,0 +1,58 @@ +id: album-and-image-gallery-plus-lightbox-3d269a7750029141d9d3783312ca3377 + +info: + name: > + Album and Image Gallery plus Lightbox <= 1.6.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/467a9b16-b57c-417c-b4e1-9f3edc80b5df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/album-and-image-gallery-plus-lightbox/" + google-query: inurl:"/wp-content/plugins/album-and-image-gallery-plus-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,album-and-image-gallery-plus-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/album-and-image-gallery-plus-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "album-and-image-gallery-plus-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2.') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..1e46def60b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/album-and-image-gallery-plus-lightbox-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: album-and-image-gallery-plus-lightbox-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/album-and-image-gallery-plus-lightbox/" + google-query: inurl:"/wp-content/plugins/album-and-image-gallery-plus-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,album-and-image-gallery-plus-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/album-and-image-gallery-plus-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "album-and-image-gallery-plus-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alert-before-your-post-47f5d0213d6a55b30c759752f9fa351e.yaml b/nuclei-templates/cve-less/plugins/alert-before-your-post-47f5d0213d6a55b30c759752f9fa351e.yaml new file mode 100644 index 0000000000..b4e5903208 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alert-before-your-post-47f5d0213d6a55b30c759752f9fa351e.yaml @@ -0,0 +1,58 @@ +id: alert-before-your-post-47f5d0213d6a55b30c759752f9fa351e + +info: + name: > + Alert Before Your Post <= 0.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d7b33c5-ced5-4ce5-acc1-4c3d935f8749?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alert-before-your-post/" + google-query: inurl:"/wp-content/plugins/alert-before-your-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alert-before-your-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alert-before-your-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alert-before-your-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alfred-click-collect-58928e38edbab233a84020a472a44caa.yaml b/nuclei-templates/cve-less/plugins/alfred-click-collect-58928e38edbab233a84020a472a44caa.yaml new file mode 100644 index 0000000000..3a461f4061 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alfred-click-collect-58928e38edbab233a84020a472a44caa.yaml @@ -0,0 +1,58 @@ +id: alfred-click-collect-58928e38edbab233a84020a472a44caa + +info: + name: > + alfred24 Click & Collect <= 1.1.7 - Authenticated (Administrator+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10ef8475-4ec5-4412-97f6-3abdb4442b92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alfred-click-collect/" + google-query: inurl:"/wp-content/plugins/alfred-click-collect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alfred-click-collect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alfred-click-collect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alfred-click-collect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alipay-32ce162d5a195b7dc3b119d3f49907dd.yaml b/nuclei-templates/cve-less/plugins/alipay-32ce162d5a195b7dc3b119d3f49907dd.yaml new file mode 100644 index 0000000000..a2c8696d44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alipay-32ce162d5a195b7dc3b119d3f49907dd.yaml @@ -0,0 +1,58 @@ +id: alipay-32ce162d5a195b7dc3b119d3f49907dd + +info: + name: > + WordPress支付宝Alipay|财付通Tenpay|贝宝PayPal集成插件 <= 3.7.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e27a9cb-0df8-4570-b7b5-7aa6c15d2e43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alipay/" + google-query: inurl:"/wp-content/plugins/alipay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alipay,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alipay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alipay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alipay-e94f4c2cbdc244ce8cd5d182c9382536.yaml b/nuclei-templates/cve-less/plugins/alipay-e94f4c2cbdc244ce8cd5d182c9382536.yaml new file mode 100644 index 0000000000..038d7bbf8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alipay-e94f4c2cbdc244ce8cd5d182c9382536.yaml @@ -0,0 +1,58 @@ +id: alipay-e94f4c2cbdc244ce8cd5d182c9382536 + +info: + name: > + WordPress支付宝Alipay|财付通Tenpay|贝宝PayPal集成插件 < 3.7.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c12074f-9a19-49cb-9d74-b759c7391d3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alipay/" + google-query: inurl:"/wp-content/plugins/alipay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alipay,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alipay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alipay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alkubot-515bfb8e519273db685ebdf46ba27554.yaml b/nuclei-templates/cve-less/plugins/alkubot-515bfb8e519273db685ebdf46ba27554.yaml new file mode 100644 index 0000000000..b5b5be2b80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alkubot-515bfb8e519273db685ebdf46ba27554.yaml @@ -0,0 +1,58 @@ +id: alkubot-515bfb8e519273db685ebdf46ba27554 + +info: + name: > + Alkubot – Gamify discounts, sell more and give less at the right time < 3.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7193b373-a0c9-4cd7-8a53-4f35ceff8f23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alkubot/" + google-query: inurl:"/wp-content/plugins/alkubot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alkubot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alkubot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alkubot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-404-pages-redirect-to-homepage-bef2b57812116d5514b05222293f3067.yaml b/nuclei-templates/cve-less/plugins/all-404-pages-redirect-to-homepage-bef2b57812116d5514b05222293f3067.yaml new file mode 100644 index 0000000000..8ef5ba7ade --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-404-pages-redirect-to-homepage-bef2b57812116d5514b05222293f3067.yaml @@ -0,0 +1,58 @@ +id: all-404-pages-redirect-to-homepage-bef2b57812116d5514b05222293f3067 + +info: + name: > + All 404 Pages Redirect to Homepage <= 1.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de5d5ffc-e76a-4ea9-be68-9ca5f847a363?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-404-pages-redirect-to-homepage/" + google-query: inurl:"/wp-content/plugins/all-404-pages-redirect-to-homepage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-404-pages-redirect-to-homepage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-404-pages-redirect-to-homepage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-404-pages-redirect-to-homepage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-404-redirect-to-homepage-4c92870ff7a0f182a44699dda7bffd35.yaml b/nuclei-templates/cve-less/plugins/all-404-redirect-to-homepage-4c92870ff7a0f182a44699dda7bffd35.yaml new file mode 100644 index 0000000000..65819e5399 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-404-redirect-to-homepage-4c92870ff7a0f182a44699dda7bffd35.yaml @@ -0,0 +1,58 @@ +id: all-404-redirect-to-homepage-4c92870ff7a0f182a44699dda7bffd35 + +info: + name: > + All 404 Redirect to Homepage & Broken images Redirection <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f01c9c8-acd4-44c0-8866-a0a819828006?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-404-redirect-to-homepage/" + google-query: inurl:"/wp-content/plugins/all-404-redirect-to-homepage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-404-redirect-to-homepage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-404-redirect-to-homepage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-404-redirect-to-homepage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-404-redirect-to-homepage-7172bda31ad3e76ec8fc3741d1b4007c.yaml b/nuclei-templates/cve-less/plugins/all-404-redirect-to-homepage-7172bda31ad3e76ec8fc3741d1b4007c.yaml new file mode 100644 index 0000000000..eea9d52102 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-404-redirect-to-homepage-7172bda31ad3e76ec8fc3741d1b4007c.yaml @@ -0,0 +1,58 @@ +id: all-404-redirect-to-homepage-7172bda31ad3e76ec8fc3741d1b4007c + +info: + name: > + All 404 Redirect to Homepage < 1.21 - Reflected Cross-Site Scripting via tab Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8938c153-0640-418b-87ab-ae65d6c80b97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-404-redirect-to-homepage/" + google-query: inurl:"/wp-content/plugins/all-404-redirect-to-homepage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-404-redirect-to-homepage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-404-redirect-to-homepage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-404-redirect-to-homepage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-bootstrap-blocks-9c898a5aa67433abd50514e4cc3473b7.yaml b/nuclei-templates/cve-less/plugins/all-bootstrap-blocks-9c898a5aa67433abd50514e4cc3473b7.yaml new file mode 100644 index 0000000000..02000570c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-bootstrap-blocks-9c898a5aa67433abd50514e4cc3473b7.yaml @@ -0,0 +1,58 @@ +id: all-bootstrap-blocks-9c898a5aa67433abd50514e4cc3473b7 + +info: + name: > + All Bootstrap Blocks <= 1.3.6 - Cross-Site Request Forgery to Plugin Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a7a15ab-4f13-4eb1-aeb5-143230308871?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-bootstrap-blocks/" + google-query: inurl:"/wp-content/plugins/all-bootstrap-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-bootstrap-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-bootstrap-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-bootstrap-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-contact-form-integration-for-elementor-561149d23bc984dc77ee30065a13dd2f.yaml b/nuclei-templates/cve-less/plugins/all-contact-form-integration-for-elementor-561149d23bc984dc77ee30065a13dd2f.yaml new file mode 100644 index 0000000000..389493bf0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-contact-form-integration-for-elementor-561149d23bc984dc77ee30065a13dd2f.yaml @@ -0,0 +1,58 @@ +id: all-contact-form-integration-for-elementor-561149d23bc984dc77ee30065a13dd2f + +info: + name: > + EleForms – All In One Form Integration including DB for Elementor <= 2.9.9.7 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a40ed3c-1f4b-4bf7-b6f4-fc1e145cc989?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-contact-form-integration-for-elementor/" + google-query: inurl:"/wp-content/plugins/all-contact-form-integration-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-contact-form-integration-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-contact-form-integration-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-contact-form-integration-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-contact-form-integration-for-elementor-9aa94eb00cf28342fe9feedacb199d11.yaml b/nuclei-templates/cve-less/plugins/all-contact-form-integration-for-elementor-9aa94eb00cf28342fe9feedacb199d11.yaml new file mode 100644 index 0000000000..1e6a904de7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-contact-form-integration-for-elementor-9aa94eb00cf28342fe9feedacb199d11.yaml @@ -0,0 +1,58 @@ +id: all-contact-form-integration-for-elementor-9aa94eb00cf28342fe9feedacb199d11 + +info: + name: > + EleForms – All In One Form Integration including DB for Elementor <= 2.9.9.7 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cefcd612-0ba8-4225-8f23-817b7220ee7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-contact-form-integration-for-elementor/" + google-query: inurl:"/wp-content/plugins/all-contact-form-integration-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-contact-form-integration-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-contact-form-integration-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-contact-form-integration-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-custom-fields-groups-a9400ef3239db6bee40d5b6dffb3e748.yaml b/nuclei-templates/cve-less/plugins/all-custom-fields-groups-a9400ef3239db6bee40d5b6dffb3e748.yaml new file mode 100644 index 0000000000..ee6c954e42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-custom-fields-groups-a9400ef3239db6bee40d5b6dffb3e748.yaml @@ -0,0 +1,58 @@ +id: all-custom-fields-groups-a9400ef3239db6bee40d5b6dffb3e748 + +info: + name: > + All custom fields & groups <= 1.04 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91e5c89e-85d3-4dda-8b79-e0b4d64e29f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-custom-fields-groups/" + google-query: inurl:"/wp-content/plugins/all-custom-fields-groups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-custom-fields-groups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-custom-fields-groups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-custom-fields-groups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-b2b-for-woocommerce-c0d39693f384de620acf92b953f594c5.yaml b/nuclei-templates/cve-less/plugins/all-in-one-b2b-for-woocommerce-c0d39693f384de620acf92b953f594c5.yaml new file mode 100644 index 0000000000..7aaf619f01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-b2b-for-woocommerce-c0d39693f384de620acf92b953f594c5.yaml @@ -0,0 +1,58 @@ +id: all-in-one-b2b-for-woocommerce-c0d39693f384de620acf92b953f594c5 + +info: + name: > + All in One B2B for WooCommerce <= 1.0.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aab3016d-5834-4b4a-a206-0b626884b335?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-b2b-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/all-in-one-b2b-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-b2b-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-b2b-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-b2b-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-b2b-for-woocommerce-f5e8e2f7e4d09169e169fd3e043e479c.yaml b/nuclei-templates/cve-less/plugins/all-in-one-b2b-for-woocommerce-f5e8e2f7e4d09169e169fd3e043e479c.yaml new file mode 100644 index 0000000000..e28b5f85a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-b2b-for-woocommerce-f5e8e2f7e4d09169e169fd3e043e479c.yaml @@ -0,0 +1,58 @@ +id: all-in-one-b2b-for-woocommerce-f5e8e2f7e4d09169e169fd3e043e479c + +info: + name: > + All in One B2B for WooCommerce <= 1.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd53bc57-b10e-47a7-8c10-96bf1f1e82a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-b2b-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/all-in-one-b2b-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-b2b-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-b2b-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-b2b-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-4cc48166ebcc92ad5083e1d92ba64cf5.yaml b/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-4cc48166ebcc92ad5083e1d92ba64cf5.yaml new file mode 100644 index 0000000000..f2a6c7ebc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-4cc48166ebcc92ad5083e1d92ba64cf5.yaml @@ -0,0 +1,58 @@ +id: all-in-one-event-calendar-4cc48166ebcc92ad5083e1d92ba64cf5 + +info: + name: > + Timely All-in-One Events Calendar < 1.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc8e2524-b77d-447e-aea9-0dfef33809f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-event-calendar/" + google-query: inurl:"/wp-content/plugins/all-in-one-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-event-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-9e62074ce42abae7e7fbef8d4e799261.yaml b/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-9e62074ce42abae7e7fbef8d4e799261.yaml new file mode 100644 index 0000000000..49df501219 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-9e62074ce42abae7e7fbef8d4e799261.yaml @@ -0,0 +1,58 @@ +id: all-in-one-event-calendar-9e62074ce42abae7e7fbef8d4e799261 + +info: + name: > + Timely All-in-One Events Calendar <= 2.5.38 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4f28285-bfa3-4063-bc8b-303db72d0156?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-event-calendar/" + google-query: inurl:"/wp-content/plugins/all-in-one-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-event-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-a2ffb630ad37eb7dbee79aab63fdf2fa.yaml b/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-a2ffb630ad37eb7dbee79aab63fdf2fa.yaml new file mode 100644 index 0000000000..e612fc7b7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-a2ffb630ad37eb7dbee79aab63fdf2fa.yaml @@ -0,0 +1,58 @@ +id: all-in-one-event-calendar-a2ffb630ad37eb7dbee79aab63fdf2fa + +info: + name: > + All-in-One Events Calendar < 1.10 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f23d80ae-a686-4e89-a8c0-648289521c58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-event-calendar/" + google-query: inurl:"/wp-content/plugins/all-in-one-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-event-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-d860722788c4c74050a19c2504b094da.yaml b/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-d860722788c4c74050a19c2504b094da.yaml new file mode 100644 index 0000000000..d837bcc45b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-event-calendar-d860722788c4c74050a19c2504b094da.yaml @@ -0,0 +1,58 @@ +id: all-in-one-event-calendar-d860722788c4c74050a19c2504b094da + +info: + name: > + Timely All-in-One Events Calendar < 1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0089498d-c4b3-4167-8bf4-8d9f68a4cbd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-event-calendar/" + google-query: inurl:"/wp-content/plugins/all-in-one-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-event-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-facebook-like-widget-ab9e9f1fd2829128e3bb4bce435b5cf7.yaml b/nuclei-templates/cve-less/plugins/all-in-one-facebook-like-widget-ab9e9f1fd2829128e3bb4bce435b5cf7.yaml new file mode 100644 index 0000000000..8d7bde3b21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-facebook-like-widget-ab9e9f1fd2829128e3bb4bce435b5cf7.yaml @@ -0,0 +1,58 @@ +id: all-in-one-facebook-like-widget-ab9e9f1fd2829128e3bb4bce435b5cf7 + +info: + name: > + All-in-one Like Widget <= 2.2.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e6fe647-d243-43ba-b619-d181560cb230?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-facebook-like-widget/" + google-query: inurl:"/wp-content/plugins/all-in-one-facebook-like-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-facebook-like-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-facebook-like-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-facebook-like-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-favicon-1d838507fd655633d89fdd3f677085f8.yaml b/nuclei-templates/cve-less/plugins/all-in-one-favicon-1d838507fd655633d89fdd3f677085f8.yaml new file mode 100644 index 0000000000..91fa174e8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-favicon-1d838507fd655633d89fdd3f677085f8.yaml @@ -0,0 +1,58 @@ +id: all-in-one-favicon-1d838507fd655633d89fdd3f677085f8 + +info: + name: > + All In One Favicon <= 4.7 - Authenticated(Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a081788-007e-463b-b757-afefcf4c6e17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-favicon/" + google-query: inurl:"/wp-content/plugins/all-in-one-favicon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-favicon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-favicon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-favicon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-favicon-adf6fd1cec72a101892ceb2db93bece6.yaml b/nuclei-templates/cve-less/plugins/all-in-one-favicon-adf6fd1cec72a101892ceb2db93bece6.yaml new file mode 100644 index 0000000000..97a743c642 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-favicon-adf6fd1cec72a101892ceb2db93bece6.yaml @@ -0,0 +1,58 @@ +id: all-in-one-favicon-adf6fd1cec72a101892ceb2db93bece6 + +info: + name: > + All In One Favicon <= 4.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf9470c9-693b-4f36-91d9-26b2d488b377?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-favicon/" + google-query: inurl:"/wp-content/plugins/all-in-one-favicon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-favicon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-favicon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-favicon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-154de88e6cddd165b6ff204a5922a0ba.yaml b/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-154de88e6cddd165b6ff204a5922a0ba.yaml new file mode 100644 index 0000000000..4760009406 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-154de88e6cddd165b6ff204a5922a0ba.yaml @@ -0,0 +1,58 @@ +id: all-in-one-invite-codes-154de88e6cddd165b6ff204a5922a0ba + +info: + name: > + All in One Invite Codes <= 1.0.15 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63c1e570-c0de-44e0-ac39-0b9006c43efa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-invite-codes/" + google-query: inurl:"/wp-content/plugins/all-in-one-invite-codes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-invite-codes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-invite-codes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-invite-codes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7ba46258b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: all-in-one-invite-codes-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-invite-codes/" + google-query: inurl:"/wp-content/plugins/all-in-one-invite-codes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-invite-codes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-invite-codes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-invite-codes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-bbd2aa17be72216554254e2d8e755d19.yaml b/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-bbd2aa17be72216554254e2d8e755d19.yaml new file mode 100644 index 0000000000..e92f98e641 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-invite-codes-bbd2aa17be72216554254e2d8e755d19.yaml @@ -0,0 +1,58 @@ +id: all-in-one-invite-codes-bbd2aa17be72216554254e2d8e755d19 + +info: + name: > + All in One Invite Codes <= 1.0.14 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/facf765a-ddce-485b-adce-99ee22262951?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-invite-codes/" + google-query: inurl:"/wp-content/plugins/all-in-one-invite-codes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-invite-codes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-invite-codes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-invite-codes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-redirection-3222e9d54de5c7b5bf110a40b9d38190.yaml b/nuclei-templates/cve-less/plugins/all-in-one-redirection-3222e9d54de5c7b5bf110a40b9d38190.yaml new file mode 100644 index 0000000000..c43b1ef7b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-redirection-3222e9d54de5c7b5bf110a40b9d38190.yaml @@ -0,0 +1,58 @@ +id: all-in-one-redirection-3222e9d54de5c7b5bf110a40b9d38190 + +info: + name: > + All In One Redirection <= 2.1.0 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/360a022d-8530-48af-be34-77d6b4b5c19d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-redirection/" + google-query: inurl:"/wp-content/plugins/all-in-one-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-redirection-c5b1505c51ef599dd7a272165d502dfb.yaml b/nuclei-templates/cve-less/plugins/all-in-one-redirection-c5b1505c51ef599dd7a272165d502dfb.yaml new file mode 100644 index 0000000000..bd73a2c802 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-redirection-c5b1505c51ef599dd7a272165d502dfb.yaml @@ -0,0 +1,58 @@ +id: all-in-one-redirection-c5b1505c51ef599dd7a272165d502dfb + +info: + name: > + All In One Redirection <= 2.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5a07a44-98f9-4795-8615-c73a9b161c74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-redirection/" + google-query: inurl:"/wp-content/plugins/all-in-one-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-schemaorg-rich-snippets-2c9c135fa647599d064a59e1f5f46c79.yaml b/nuclei-templates/cve-less/plugins/all-in-one-schemaorg-rich-snippets-2c9c135fa647599d064a59e1f5f46c79.yaml new file mode 100644 index 0000000000..f59c6941ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-schemaorg-rich-snippets-2c9c135fa647599d064a59e1f5f46c79.yaml @@ -0,0 +1,58 @@ +id: all-in-one-schemaorg-rich-snippets-2c9c135fa647599d064a59e1f5f46c79 + +info: + name: > + Schema - All In One Schema Rich Snippets <= 1.6.5 - Cross-Site Request Forgery in rich_snippet_dashboard + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23b018d3-3451-4ae8-b571-07e931ad23df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-schemaorg-rich-snippets/" + google-query: inurl:"/wp-content/plugins/all-in-one-schemaorg-rich-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-schemaorg-rich-snippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-schemaorg-rich-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-schemaorg-rich-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-schemaorg-rich-snippets-4e93731af3497ed66d721b94ba1ecb7d.yaml b/nuclei-templates/cve-less/plugins/all-in-one-schemaorg-rich-snippets-4e93731af3497ed66d721b94ba1ecb7d.yaml new file mode 100644 index 0000000000..fbb6af7f8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-schemaorg-rich-snippets-4e93731af3497ed66d721b94ba1ecb7d.yaml @@ -0,0 +1,58 @@ +id: all-in-one-schemaorg-rich-snippets-4e93731af3497ed66d721b94ba1ecb7d + +info: + name: > + Schema - All In One Schema Rich Snippets <= 1.4.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd54d335-eb9c-4d0a-92c0-13462ef41a85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-schemaorg-rich-snippets/" + google-query: inurl:"/wp-content/plugins/all-in-one-schemaorg-rich-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-schemaorg-rich-snippets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-schemaorg-rich-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-schemaorg-rich-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-1d7ad2d4f9699d8aaf4ebf33922949a2.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-1d7ad2d4f9699d8aaf4ebf33922949a2.yaml new file mode 100644 index 0000000000..79135ea91f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-1d7ad2d4f9699d8aaf4ebf33922949a2.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-1d7ad2d4f9699d8aaf4ebf33922949a2 + +info: + name: > + All in One SEO – Best WordPress SEO Plugin – Easily Improve SEO Rankings & Increase Traffic <= 2.3.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f018e22-bf07-4371-afc1-3e664ea1c5a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-332ad697947dfbdebeb9b4731490be30.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-332ad697947dfbdebeb9b4731490be30.yaml new file mode 100644 index 0000000000..a70785baeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-332ad697947dfbdebeb9b4731490be30.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-332ad697947dfbdebeb9b4731490be30 + +info: + name: > + All in One SEO <= 2.2.4.1 - Privilege Escalation to Arbitrary Post Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcd7204f-d950-4fb8-beb2-d9f619824fa1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-3e5491f9c256bb6627d2d89120b86cd4.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-3e5491f9c256bb6627d2d89120b86cd4.yaml new file mode 100644 index 0000000000..986db23175 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-3e5491f9c256bb6627d2d89120b86cd4.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-3e5491f9c256bb6627d2d89120b86cd4 + +info: + name: > + All in One SEO 4.0.0 - 4.1.5.2 Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16630c5a-802e-404a-b90b-be7b906345b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.0.0', '<= 4.1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-52b9b171189fecca507b9059a4e2fc92.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-52b9b171189fecca507b9059a4e2fc92.yaml new file mode 100644 index 0000000000..b8362dea09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-52b9b171189fecca507b9059a4e2fc92.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-52b9b171189fecca507b9059a4e2fc92 + +info: + name: > + All in One SEO <= 4.2.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/694c120a-d9cb-46a6-be24-9f1530bc2183?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-56c4db12334add5dab088d2ed97db3d6.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-56c4db12334add5dab088d2ed97db3d6.yaml new file mode 100644 index 0000000000..3d23dba3c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-56c4db12334add5dab088d2ed97db3d6.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-56c4db12334add5dab088d2ed97db3d6 + +info: + name: > + All in One SEO <= 2.2.5.1 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39f8c830-9f71-4ca6-8fcc-54769cef878f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-6810465a01d1f9a2f5b95f9fe91e406a.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-6810465a01d1f9a2f5b95f9fe91e406a.yaml new file mode 100644 index 0000000000..323f175393 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-6810465a01d1f9a2f5b95f9fe91e406a.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-6810465a01d1f9a2f5b95f9fe91e406a + +info: + name: > + All in One SEO <= 2.2.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03ddef11-04cb-4639-afb0-f123b339b9ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-6b8b57f1101c92df559274dfef436538.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-6b8b57f1101c92df559274dfef436538.yaml new file mode 100644 index 0000000000..b3dd114e13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-6b8b57f1101c92df559274dfef436538.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-6b8b57f1101c92df559274dfef436538 + +info: + name: > + All in One SEO <= 2.1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55a942b7-5d3e-4ddf-8bc3-61ff90a7fdbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-814d85e88dab797899057f8e016cf74f.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-814d85e88dab797899057f8e016cf74f.yaml new file mode 100644 index 0000000000..cebb5942ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-814d85e88dab797899057f8e016cf74f.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-814d85e88dab797899057f8e016cf74f + +info: + name: > + All in One SEO 4.1.3.1 - 4.1.5.2 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5490dd9-20d5-4cd6-bc09-5da94d3e702f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.1.3.1', '<= 4.1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-996209252b43de8bc510aae02fc9d00b.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-996209252b43de8bc510aae02fc9d00b.yaml new file mode 100644 index 0000000000..03e775a43d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-996209252b43de8bc510aae02fc9d00b.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-996209252b43de8bc510aae02fc9d00b + +info: + name: > + All in One SEO <= 2.0.3 - Cross-Site Scripting via Search Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9885db9-b1eb-4cc6-a7ea-af2c34b1d065?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-9c814d5a9ddaae393720aa3fbf301f85.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-9c814d5a9ddaae393720aa3fbf301f85.yaml new file mode 100644 index 0000000000..681db870ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-9c814d5a9ddaae393720aa3fbf301f85.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-9c814d5a9ddaae393720aa3fbf301f85 + +info: + name: > + All in One SEO <= 4.1.0.1 - Authenticated Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2a98c69-5f76-41f4-8a12-0523285647fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-9cda1ab1353fbdf5592281281da13bfe.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-9cda1ab1353fbdf5592281281da13bfe.yaml new file mode 100644 index 0000000000..c112a3c20a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-9cda1ab1353fbdf5592281281da13bfe.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-9cda1ab1353fbdf5592281281da13bfe + +info: + name: > + All in One SEO Pack <= 2.3.7 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c490e344-66da-4176-bd93-7e07a491bfa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-a64ce08453bed39084d8a2cea93a9117.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-a64ce08453bed39084d8a2cea93a9117.yaml new file mode 100644 index 0000000000..2d245a4a29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-a64ce08453bed39084d8a2cea93a9117.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-a64ce08453bed39084d8a2cea93a9117 + +info: + name: > + All in One SEO Pack <= 3.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/440242e5-832f-4796-9317-b377e1c2fa2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-bc257f9f7078df85b51c2e5181af811d.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-bc257f9f7078df85b51c2e5181af811d.yaml new file mode 100644 index 0000000000..3538757d47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-bc257f9f7078df85b51c2e5181af811d.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-bc257f9f7078df85b51c2e5181af811d + +info: + name: > + All in One SEO <= 2.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60e4c186-5239-464d-be83-1b873f821b3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-c08b2158511f440bda6243887c732dc7.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-c08b2158511f440bda6243887c732dc7.yaml new file mode 100644 index 0000000000..b5ad44cbfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-c08b2158511f440bda6243887c732dc7.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-c08b2158511f440bda6243887c732dc7 + +info: + name: > + All in One SEO Pack <= 4.2.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c13f00e-3048-44cf-8979-2b0b0c508f3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-d92c57db44864e6e406520d1e97fd01f.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-d92c57db44864e6e406520d1e97fd01f.yaml new file mode 100644 index 0000000000..24897a9e3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-d92c57db44864e6e406520d1e97fd01f.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-d92c57db44864e6e406520d1e97fd01f + +info: + name: > + All in One SEO – Best WordPress SEO Plugin – Easily Improve SEO Rankings & Increase Traffic <= 4.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28741ffc-4ff5-4e67-a183-bb5064b6752e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-d9419931966f7a4ced3c49a3cc9a6932.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-d9419931966f7a4ced3c49a3cc9a6932.yaml new file mode 100644 index 0000000000..be596c557d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-d9419931966f7a4ced3c49a3cc9a6932.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-d9419931966f7a4ced3c49a3cc9a6932 + +info: + name: > + All In One SEO Pack <= 3.2.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02cf711b-69af-4869-9ebd-31c657be1bc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-f0ea860f14b0b0ca566ac38e74715e9c.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-f0ea860f14b0b0ca566ac38e74715e9c.yaml new file mode 100644 index 0000000000..6bcad575de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-f0ea860f14b0b0ca566ac38e74715e9c.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-f0ea860f14b0b0ca566ac38e74715e9c + +info: + name: > + All in One SEO <= 2.9.1.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a0c948b-7f14-450e-858a-77c1d3dd0761?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-f74b8b0e3c6cf42f9c7d68f58857b310.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-f74b8b0e3c6cf42f9c7d68f58857b310.yaml new file mode 100644 index 0000000000..b9eb46f6bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-f74b8b0e3c6cf42f9c7d68f58857b310.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-f74b8b0e3c6cf42f9c7d68f58857b310 + +info: + name: > + All in One SEO Pack <= 4.2.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3db97180-9308-4891-9de9-acefe31d088f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-pro-ed79806268ad8e12ebf6df82f872530a.yaml b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-pro-ed79806268ad8e12ebf6df82f872530a.yaml new file mode 100644 index 0000000000..3ae3bb9601 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-seo-pack-pro-ed79806268ad8e12ebf6df82f872530a.yaml @@ -0,0 +1,58 @@ +id: all-in-one-seo-pack-pro-ed79806268ad8e12ebf6df82f872530a + +info: + name: > + All in One SEO Pro <= 4.2.5.1 - Authenticated (Admin+) Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8ef792-c2a8-4fc5-bee7-4de3b6b007c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-seo-pack-pro/" + google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-seo-pack-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-seo-pack-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-social-lite-05ed6188e517a3d4fdb915f7f3265319.yaml b/nuclei-templates/cve-less/plugins/all-in-one-social-lite-05ed6188e517a3d4fdb915f7f3265319.yaml new file mode 100644 index 0000000000..85e93783b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-social-lite-05ed6188e517a3d4fdb915f7f3265319.yaml @@ -0,0 +1,58 @@ +id: all-in-one-social-lite-05ed6188e517a3d4fdb915f7f3265319 + +info: + name: > + All in One Social Lite <= 1.0 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a3da2af-2273-44ff-addd-1ac8a75e1c3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-social-lite/" + google-query: inurl:"/wp-content/plugins/all-in-one-social-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-social-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-social-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-social-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-411b1116f71957083ea7a80c47e56945.yaml b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-411b1116f71957083ea7a80c47e56945.yaml new file mode 100644 index 0000000000..caa690b837 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-411b1116f71957083ea7a80c47e56945.yaml @@ -0,0 +1,58 @@ +id: all-in-one-video-gallery-411b1116f71957083ea7a80c47e56945 + +info: + name: > + All-in-One Video Gallery <= 3.6.4 - Authenticated (Contributor+) Arbitrary File Upload via featured image + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0f295f9-1090-4b10-abc5-3f73c5b4e28d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-video-gallery/" + google-query: inurl:"/wp-content/plugins/all-in-one-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-video-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..20bb223d69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: all-in-one-video-gallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-video-gallery/" + google-query: inurl:"/wp-content/plugins/all-in-one-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-video-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-bcb990d5b998ea9f0d9516d80108b489.yaml b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-bcb990d5b998ea9f0d9516d80108b489.yaml new file mode 100644 index 0000000000..7b650a207a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-bcb990d5b998ea9f0d9516d80108b489.yaml @@ -0,0 +1,58 @@ +id: all-in-one-video-gallery-bcb990d5b998ea9f0d9516d80108b489 + +info: + name: > + All-in-One Video Gallery <= 3.5.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b350a20e-6f86-4760-9092-27a4b365b590?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-video-gallery/" + google-query: inurl:"/wp-content/plugins/all-in-one-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-video-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-cae2253667a3a6e475a01cd76266d7d9.yaml b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-cae2253667a3a6e475a01cd76266d7d9.yaml new file mode 100644 index 0000000000..477760636b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-cae2253667a3a6e475a01cd76266d7d9.yaml @@ -0,0 +1,58 @@ +id: all-in-one-video-gallery-cae2253667a3a6e475a01cd76266d7d9 + +info: + name: > + All-In-One-Gallery <= 2.4.9 - Admin+ Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f840a96-8cda-4237-b445-284b88eaf623?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-video-gallery/" + google-query: inurl:"/wp-content/plugins/all-in-one-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-video-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-d6f77b9c72ad2f48ab3f2230e6326337.yaml b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-d6f77b9c72ad2f48ab3f2230e6326337.yaml new file mode 100644 index 0000000000..daf39135c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-video-gallery-d6f77b9c72ad2f48ab3f2230e6326337.yaml @@ -0,0 +1,58 @@ +id: all-in-one-video-gallery-d6f77b9c72ad2f48ab3f2230e6326337 + +info: + name: > + All-in-One Video Gallery 2.5.8 - 2.6.0 - Arbitrary File Download & Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83b0534e-1b8d-46a8-9698-e7ca73e5ab57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-video-gallery/" + google-query: inurl:"/wp-content/plugins/all-in-one-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-video-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.5.8', '<= 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-webmaster-7851eebfd119dbcb64d57949b00c8e79.yaml b/nuclei-templates/cve-less/plugins/all-in-one-webmaster-7851eebfd119dbcb64d57949b00c8e79.yaml new file mode 100644 index 0000000000..5dd4202377 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-webmaster-7851eebfd119dbcb64d57949b00c8e79.yaml @@ -0,0 +1,58 @@ +id: all-in-one-webmaster-7851eebfd119dbcb64d57949b00c8e79 + +info: + name: > + WP Webmaster < 8.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf0f549d-1d88-415a-81f3-b50f977e2c17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-webmaster/" + google-query: inurl:"/wp-content/plugins/all-in-one-webmaster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-webmaster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-webmaster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-webmaster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-4e8189c76d0d644714db52904b337d1a.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-4e8189c76d0d644714db52904b337d1a.yaml new file mode 100644 index 0000000000..a6b3367364 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-4e8189c76d0d644714db52904b337d1a.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-4e8189c76d0d644714db52904b337d1a + +info: + name: > + All-in-One WP Migration <= 7.58 - Directory Traversal to File Deletion on Windows Hosts + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e58634c3-7fcd-4885-b897-4e6a97fb06ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.58') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-7757d5b35907f5f49944633dfa8351f2.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-7757d5b35907f5f49944633dfa8351f2.yaml new file mode 100644 index 0000000000..6303304379 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-7757d5b35907f5f49944633dfa8351f2.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-7757d5b35907f5f49944633dfa8351f2 + +info: + name: > + All-in-One WP Migration <= 6.97 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10a0abd6-1905-4a90-8488-29d44df7aeb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-7dd77db31c1f92ec3dedef1e96c01885.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-7dd77db31c1f92ec3dedef1e96c01885.yaml new file mode 100644 index 0000000000..809aa65e74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-7dd77db31c1f92ec3dedef1e96c01885.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-7dd77db31c1f92ec3dedef1e96c01885 + +info: + name: > + All-in-One WP Migration <= 2.0.2 - Authorization Bypass to Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66b91fe9-ceb3-485c-bf5f-a672656d4e86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-8f4400345c9597af11e729ad184f888d.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-8f4400345c9597af11e729ad184f888d.yaml new file mode 100644 index 0000000000..1f76015edd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-8f4400345c9597af11e729ad184f888d.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-8f4400345c9597af11e729ad184f888d + +info: + name: > + All-in-One WP Migration <= 6.45 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c9feabc-6a8d-4367-8ea2-cc5284dbc041?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-b0e3894c13ad13c0cec750095d3f0495.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-b0e3894c13ad13c0cec750095d3f0495.yaml new file mode 100644 index 0000000000..2b5f29e6d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-b0e3894c13ad13c0cec750095d3f0495.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-b0e3894c13ad13c0cec750095d3f0495 + +info: + name: > + All-in-One WP Migration <= 7.62 - Unauthenticated Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9040aa36-2d3b-4470-93ae-19ad16fcd929?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-b422384e41850357dd97dbccb4c496f5.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-b422384e41850357dd97dbccb4c496f5.yaml new file mode 100644 index 0000000000..ed0b5801cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-b422384e41850357dd97dbccb4c496f5.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-b422384e41850357dd97dbccb4c496f5 + +info: + name: > + All-in-One WP Migration <= 7.14 - Unauthenticated Backup Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f373a1d5-3d7e-4a0a-af03-28ca6ce6a170?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-baaba4f56b4f175e80057b4999371a96.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-baaba4f56b4f175e80057b4999371a96.yaml new file mode 100644 index 0000000000..961383acc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-baaba4f56b4f175e80057b4999371a96.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-baaba4f56b4f175e80057b4999371a96 + +info: + name: > + All-in-One WP Migration <= 7.62 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66519150-7719-4598-8302-b3437719f0a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-box-extension-9c485cf198874e1abdd12011232fd4df.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-box-extension-9c485cf198874e1abdd12011232fd4df.yaml new file mode 100644 index 0000000000..380f575595 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-box-extension-9c485cf198874e1abdd12011232fd4df.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-box-extension-9c485cf198874e1abdd12011232fd4df + +info: + name: > + Multiple ServMask Plugins <= (Various Versions) - Missing Authorization to Access Token Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86bb44f0-142d-4c4e-8fc5-a50526118130?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration-box-extension/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration-box-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration-box-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration-box-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration-box-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-dropbox-extension-9c485cf198874e1abdd12011232fd4df.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-dropbox-extension-9c485cf198874e1abdd12011232fd4df.yaml new file mode 100644 index 0000000000..a81049be8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-dropbox-extension-9c485cf198874e1abdd12011232fd4df.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-dropbox-extension-9c485cf198874e1abdd12011232fd4df + +info: + name: > + Multiple ServMask Plugins <= (Various Versions) - Missing Authorization to Access Token Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86bb44f0-142d-4c4e-8fc5-a50526118130?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration-dropbox-extension/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration-dropbox-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration-dropbox-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration-dropbox-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration-dropbox-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml new file mode 100644 index 0000000000..71fe46e665 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-e4cd9a4bbacdbb2aa88bdc0cb49786e1 + +info: + name: > + All-in-One WP Migration <= 7.40 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6635ff4d-cbb4-4e78-9df1-1274eaa737aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-f07ffeeb51734bb9713522e8c30b9042.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-f07ffeeb51734bb9713522e8c30b9042.yaml new file mode 100644 index 0000000000..370243567b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-f07ffeeb51734bb9713522e8c30b9042.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-f07ffeeb51734bb9713522e8c30b9042 + +info: + name: > + All-in-One WP Migration <= 2.0.4 - Missing Authorization to Database Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95cd2bae-4ab7-4a0c-bb71-c17b119eaaa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-gdrive-extension-9c485cf198874e1abdd12011232fd4df.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-gdrive-extension-9c485cf198874e1abdd12011232fd4df.yaml new file mode 100644 index 0000000000..3a06e36e69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-gdrive-extension-9c485cf198874e1abdd12011232fd4df.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-gdrive-extension-9c485cf198874e1abdd12011232fd4df + +info: + name: > + Multiple ServMask Plugins <= (Various Versions) - Missing Authorization to Access Token Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86bb44f0-142d-4c4e-8fc5-a50526118130?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration-gdrive-extension/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration-gdrive-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration-gdrive-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration-gdrive-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration-gdrive-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.79') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-onedrive-extension-9c485cf198874e1abdd12011232fd4df.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-onedrive-extension-9c485cf198874e1abdd12011232fd4df.yaml new file mode 100644 index 0000000000..ad8d393bd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-migration-onedrive-extension-9c485cf198874e1abdd12011232fd4df.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-migration-onedrive-extension-9c485cf198874e1abdd12011232fd4df + +info: + name: > + Multiple ServMask Plugins <= (Various Versions) - Missing Authorization to Access Token Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86bb44f0-142d-4c4e-8fc5-a50526118130?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-migration-onedrive-extension/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration-onedrive-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration-onedrive-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration-onedrive-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-migration-onedrive-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.66') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-034278da31b37bb4154e8c34cebfdbb9.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-034278da31b37bb4154e8c34cebfdbb9.yaml new file mode 100644 index 0000000000..2967192e78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-034278da31b37bb4154e8c34cebfdbb9.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-034278da31b37bb4154e8c34cebfdbb9 + +info: + name: > + All In One WP Security & Firewall <= 4.0.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06b92517-5431-43ed-ad3b-80bfd0981b93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-1b948ed195be07fe30ccbe1a13374b86.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-1b948ed195be07fe30ccbe1a13374b86.yaml new file mode 100644 index 0000000000..3ee762ee6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-1b948ed195be07fe30ccbe1a13374b86.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-1b948ed195be07fe30ccbe1a13374b86 + +info: + name: > + All In One WP Security <= 5.2.6 - Cross-Site Request Forgery to IP Blocking + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05991bf2-ee61-4bf7-89df-c2f66db7caec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-1ff113267284bee6f1d42d303e8be7d2.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-1ff113267284bee6f1d42d303e8be7d2.yaml new file mode 100644 index 0000000000..ee5d053562 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-1ff113267284bee6f1d42d303e8be7d2.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-1ff113267284bee6f1d42d303e8be7d2 + +info: + name: > + All-In-One Security <= 5.1.2 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4a5c931-16f8-41b6-b4b6-567aa6c6c90e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-261df4cac42862f9e31db7a040ca080c.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-261df4cac42862f9e31db7a040ca080c.yaml new file mode 100644 index 0000000000..6a14e549c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-261df4cac42862f9e31db7a040ca080c.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-261df4cac42862f9e31db7a040ca080c + +info: + name: > + All In One WP Security & Firewall 5.0.0 - 5.0.7 - Protection Bypass via IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ce4be1b-3807-4ded-80a5-30f2f80db89d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 5.0.0', '<= 5.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-44ac07d5baafaaec1fde2cca5e220010.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-44ac07d5baafaaec1fde2cca5e220010.yaml new file mode 100644 index 0000000000..6475e4ab14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-44ac07d5baafaaec1fde2cca5e220010.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-44ac07d5baafaaec1fde2cca5e220010 + +info: + name: > + All In One WP Security & Firewall <= 3.8.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d3010a9-10fa-40ec-9791-3ac993123f93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-5ac539645eb63c949c47fcaeea5bb661.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-5ac539645eb63c949c47fcaeea5bb661.yaml new file mode 100644 index 0000000000..bf3119e688 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-5ac539645eb63c949c47fcaeea5bb661.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-5ac539645eb63c949c47fcaeea5bb661 + +info: + name: > + All In One WP Security & Firewall <= 3.8.2 - Authenticated Access or Cross-Site Request Forgery leading to SQL Injection via orderby, order Parameters + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/419b20fa-6fea-41d7-9e3d-45ac25b4131f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-5d289d7e578bce569fb34678a49e0c92.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-5d289d7e578bce569fb34678a49e0c92.yaml new file mode 100644 index 0000000000..bb72f87d85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-5d289d7e578bce569fb34678a49e0c92.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-5d289d7e578bce569fb34678a49e0c92 + +info: + name: > + All In One WP Security & Firewall <= 3.9.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32385e77-9629-4aa2-8f1e-9804809fcea3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-63844d0bc7bddede485d089be95f74bf.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-63844d0bc7bddede485d089be95f74bf.yaml new file mode 100644 index 0000000000..2a359785c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-63844d0bc7bddede485d089be95f74bf.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-63844d0bc7bddede485d089be95f74bf + +info: + name: > + All In One WP Security & Firewall <= 4.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f092dae-e298-42e3-b494-fc7b7669b300?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7195efc84ea5b8977b30b3313bab7ab8.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7195efc84ea5b8977b30b3313bab7ab8.yaml new file mode 100644 index 0000000000..22a2588fc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7195efc84ea5b8977b30b3313bab7ab8.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-7195efc84ea5b8977b30b3313bab7ab8 + +info: + name: > + All-In-One Security (AIOS) <= 5.1.4 - Authenticated(Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03bf84e2-c101-416d-a953-c63ecd1dba7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7567c31561b747bfa0cbc91d7005334d.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7567c31561b747bfa0cbc91d7005334d.yaml new file mode 100644 index 0000000000..ce08aea164 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7567c31561b747bfa0cbc91d7005334d.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-7567c31561b747bfa0cbc91d7005334d + +info: + name: > + All In One WP Security & Firewall <= 4.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48b6b9a3-c80d-4fde-9e8c-1f60781b7484?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-797698582c82d4b61a2a10f67de975cd.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-797698582c82d4b61a2a10f67de975cd.yaml new file mode 100644 index 0000000000..8fd076875a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-797698582c82d4b61a2a10f67de975cd.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-797698582c82d4b61a2a10f67de975cd + +info: + name: > + All-In-One Security (AIOS) – Security and Firewall <= 5.0.8 - IP Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de39bad4-858a-4332-8ed0-bfd92a67b9cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7e555f0e951cd13fa43e01d838261f04.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7e555f0e951cd13fa43e01d838261f04.yaml new file mode 100644 index 0000000000..e478c0f99a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-7e555f0e951cd13fa43e01d838261f04.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-7e555f0e951cd13fa43e01d838261f04 + +info: + name: > + All In One WP Security & Firewall <= 4.1.2 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/352a0c8a-22a6-44d9-917c-5fb37569d143?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-873b15a500e300080bf17fdd62b04ccc.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-873b15a500e300080bf17fdd62b04ccc.yaml new file mode 100644 index 0000000000..12e118e8ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-873b15a500e300080bf17fdd62b04ccc.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-873b15a500e300080bf17fdd62b04ccc + +info: + name: > + All In One WP Security & Firewall <= 5.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce340b88-cbab-4ba8-93ae-8790f2348456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-8a165e6adde141141ce45b5b63a01ed2.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-8a165e6adde141141ce45b5b63a01ed2.yaml new file mode 100644 index 0000000000..afed4d6f0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-8a165e6adde141141ce45b5b63a01ed2.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-8a165e6adde141141ce45b5b63a01ed2 + +info: + name: > + All In One WP Security & Firewall <= 4.1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95c59e71-b755-4b39-bd5f-b2b2ac99f934?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-8a8f73a13c6d3fc3aaf61bd1592c30a0.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-8a8f73a13c6d3fc3aaf61bd1592c30a0.yaml new file mode 100644 index 0000000000..3ff1ad0668 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-8a8f73a13c6d3fc3aaf61bd1592c30a0.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-8a8f73a13c6d3fc3aaf61bd1592c30a0 + +info: + name: > + All-In-One Security (AIOS) – Security and Firewall <= 5.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b50772e5-5142-4f50-b5c0-6116a8821cba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-a314db2bc927095a45456b220d0f28ec.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-a314db2bc927095a45456b220d0f28ec.yaml new file mode 100644 index 0000000000..56643b7be3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-a314db2bc927095a45456b220d0f28ec.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-a314db2bc927095a45456b220d0f28ec + +info: + name: > + All In One WP Security & Firewall <= 4.4.10 - Open Redirect and Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a595f862-64af-4055-aa13-5e8f4eb3f721?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-bb860d80b94ca7ade5a2893713f833b5.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-bb860d80b94ca7ade5a2893713f833b5.yaml new file mode 100644 index 0000000000..39dafa1b2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-bb860d80b94ca7ade5a2893713f833b5.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-bb860d80b94ca7ade5a2893713f833b5 + +info: + name: > + All In One WP Security & Firewall <= 3.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1899e5ec-ad87-4182-81b6-3b777d117e93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-c313a41c23d690edbe2cdbf35c825a0d.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-c313a41c23d690edbe2cdbf35c825a0d.yaml new file mode 100644 index 0000000000..a2fffafd99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-c313a41c23d690edbe2cdbf35c825a0d.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-c313a41c23d690edbe2cdbf35c825a0d + +info: + name: > + All In One WP Security & Firewall <= 3.8.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b2e210b-e5e3-46f1-b730-64d970160a5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-c43c8e4dbb43df481e0c6cf7578539a9.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-c43c8e4dbb43df481e0c6cf7578539a9.yaml new file mode 100644 index 0000000000..4b35471021 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-c43c8e4dbb43df481e0c6cf7578539a9.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-c43c8e4dbb43df481e0c6cf7578539a9 + +info: + name: > + All-In-One Security (AIOS) <= 5.1.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3ae55ad-b192-4dde-8a7c-3a4fd71d3475?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-cc351f4beec6cba9fc81f542a275a440.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-cc351f4beec6cba9fc81f542a275a440.yaml new file mode 100644 index 0000000000..1267f60921 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-cc351f4beec6cba9fc81f542a275a440.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-cc351f4beec6cba9fc81f542a275a440 + +info: + name: > + All In One WP Security & Firewall <= 3.9.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b70f5416-06e0-4b6f-b61d-b7c23575a171?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-cf8c3aa457289ad6466208862da0c244.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-cf8c3aa457289ad6466208862da0c244.yaml new file mode 100644 index 0000000000..9b95e481a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-cf8c3aa457289ad6466208862da0c244.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-cf8c3aa457289ad6466208862da0c244 + +info: + name: > + All In One WP Security & Firewall <= 4.0.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/037a8b06-18be-4443-b54c-22f50c89d5b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-d66601db34445c53f772431589140096.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-d66601db34445c53f772431589140096.yaml new file mode 100644 index 0000000000..38b1f0b14e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-d66601db34445c53f772431589140096.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-d66601db34445c53f772431589140096 + +info: + name: > + All In One WP Security & Firewall <= 4.4.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02f8faff-8629-490b-9bc7-378ebffcfd0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-d6e02747846dc962e1ab5d119bbf94ea.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-d6e02747846dc962e1ab5d119bbf94ea.yaml new file mode 100644 index 0000000000..2c56ba50fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-d6e02747846dc962e1ab5d119bbf94ea.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-d6e02747846dc962e1ab5d119bbf94ea + +info: + name: > + All In One WP Security & Firewall <= 5.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fae1b795-8939-4229-8f89-fedf6f320ec1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-df24bb44c8ea32f14d2d1f45017493e8.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-df24bb44c8ea32f14d2d1f45017493e8.yaml new file mode 100644 index 0000000000..485676a433 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-df24bb44c8ea32f14d2d1f45017493e8.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-df24bb44c8ea32f14d2d1f45017493e8 + +info: + name: > + All In One WP Security 5.1.9 - Plaintext Storage of Credentials + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02066dcd-1f2f-4ed3-b1f4-7ea8711918e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '5.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-e1b9583cb78e016115d982acbd157618.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-e1b9583cb78e016115d982acbd157618.yaml new file mode 100644 index 0000000000..cc402b58c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-e1b9583cb78e016115d982acbd157618.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-e1b9583cb78e016115d982acbd157618 + +info: + name: > + All In One WP Security & Firewall <= 4.0.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72505ab0-8545-4735-af15-e8794d0ac9c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-ff26968664379c67bbd03960f230d505.yaml b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-ff26968664379c67bbd03960f230d505.yaml new file mode 100644 index 0000000000..8f36124f93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-in-one-wp-security-and-firewall-ff26968664379c67bbd03960f230d505.yaml @@ -0,0 +1,58 @@ +id: all-in-one-wp-security-and-firewall-ff26968664379c67bbd03960f230d505 + +info: + name: > + All In One WP Security <= 5.2.4 - Protection Bypass of Renamed Login Page via URL Encoding + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63fc381e-ce72-4c90-bb35-daba520be40d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" + google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-security-and-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-in-one-wp-security-and-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-users-messenger-64408a501c37fbcf42b9db6bc5338336.yaml b/nuclei-templates/cve-less/plugins/all-users-messenger-64408a501c37fbcf42b9db6bc5338336.yaml new file mode 100644 index 0000000000..7bd1fa3ee0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-users-messenger-64408a501c37fbcf42b9db6bc5338336.yaml @@ -0,0 +1,58 @@ +id: all-users-messenger-64408a501c37fbcf42b9db6bc5338336 + +info: + name: > + All Users Messenger <= 1.24 - Authenticated (Subscriber+) Insecure Direct Object Reference to Message Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d23541e-bb1c-4fcf-836b-28522a39b018?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-users-messenger/" + google-query: inurl:"/wp-content/plugins/all-users-messenger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-users-messenger,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-users-messenger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-users-messenger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-video-gallery-bc135ea3b74553b0fd14eafbe49bca73.yaml b/nuclei-templates/cve-less/plugins/all-video-gallery-bc135ea3b74553b0fd14eafbe49bca73.yaml new file mode 100644 index 0000000000..fd12e76f11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-video-gallery-bc135ea3b74553b0fd14eafbe49bca73.yaml @@ -0,0 +1,58 @@ +id: all-video-gallery-bc135ea3b74553b0fd14eafbe49bca73 + +info: + name: > + All Video Gallery <= 1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd72ce7e-027c-49bd-8bcf-3ccda2c9b184?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-video-gallery/" + google-query: inurl:"/wp-content/plugins/all-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-video-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all-video-gallery-e6b6d80807708af0a37d88bb4f8862c7.yaml b/nuclei-templates/cve-less/plugins/all-video-gallery-e6b6d80807708af0a37d88bb4f8862c7.yaml new file mode 100644 index 0000000000..155d8d6f4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all-video-gallery-e6b6d80807708af0a37d88bb4f8862c7.yaml @@ -0,0 +1,58 @@ +id: all-video-gallery-e6b6d80807708af0a37d88bb4f8862c7 + +info: + name: > + All Video Gallery Plugin for WordPress <= 1.2 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/142bcbdd-7495-49be-a5b3-8ba1674cd64d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all-video-gallery/" + google-query: inurl:"/wp-content/plugins/all-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all-video-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/all_in_one_carousel-a4f443048ee610edd9a8b4b6992abbfc.yaml b/nuclei-templates/cve-less/plugins/all_in_one_carousel-a4f443048ee610edd9a8b4b6992abbfc.yaml new file mode 100644 index 0000000000..51b5584419 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/all_in_one_carousel-a4f443048ee610edd9a8b4b6992abbfc.yaml @@ -0,0 +1,58 @@ +id: all_in_one_carousel-a4f443048ee610edd9a8b4b6992abbfc + +info: + name: > + All In One Slider <= 1.2.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdb7e239-75c4-480e-a283-dc2354fe3375?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/all_in_one_carousel/" + google-query: inurl:"/wp-content/plugins/all_in_one_carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,all_in_one_carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/all_in_one_carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "all_in_one_carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alley-business-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/alley-business-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..87ac9ab1d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alley-business-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: alley-business-toolkit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alley-business-toolkit/" + google-query: inurl:"/wp-content/plugins/alley-business-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alley-business-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alley-business-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alley-business-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/allow-php-in-posts-and-pages-ab57e6fe4cbafa10ab5f9c2c276102ac.yaml b/nuclei-templates/cve-less/plugins/allow-php-in-posts-and-pages-ab57e6fe4cbafa10ab5f9c2c276102ac.yaml new file mode 100644 index 0000000000..85f7521e3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/allow-php-in-posts-and-pages-ab57e6fe4cbafa10ab5f9c2c276102ac.yaml @@ -0,0 +1,58 @@ +id: allow-php-in-posts-and-pages-ab57e6fe4cbafa10ab5f9c2c276102ac + +info: + name: > + Allow PHP in Posts and Pages <= 3.0.4 - Authenticated (Subscriber+) Remote Code Execution via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d8b4bb6-3715-40c1-8140-7fcf874ccec3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/allow-php-in-posts-and-pages/" + google-query: inurl:"/wp-content/plugins/allow-php-in-posts-and-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,allow-php-in-posts-and-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/allow-php-in-posts-and-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "allow-php-in-posts-and-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/allow-svg-3108293e567a66e53a5d8bbabea561b6.yaml b/nuclei-templates/cve-less/plugins/allow-svg-3108293e567a66e53a5d8bbabea561b6.yaml new file mode 100644 index 0000000000..dd9b0328db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/allow-svg-3108293e567a66e53a5d8bbabea561b6.yaml @@ -0,0 +1,58 @@ +id: allow-svg-3108293e567a66e53a5d8bbabea561b6 + +info: + name: > + Allow SVG <= 1.1 - Authenticated (Author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee725cff-959d-4078-9c2e-2d52bb904ca0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/allow-svg/" + google-query: inurl:"/wp-content/plugins/allow-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,allow-svg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/allow-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "allow-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-31dc7219db80b05f4214d90d08edeba8.yaml b/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-31dc7219db80b05f4214d90d08edeba8.yaml new file mode 100644 index 0000000000..17a6b6fb26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-31dc7219db80b05f4214d90d08edeba8.yaml @@ -0,0 +1,58 @@ +id: allwebmenus-wordpress-menu-plugin-31dc7219db80b05f4214d90d08edeba8 + +info: + name: > + AllWebMenus WordPress Menu Plugin < 1.1.9 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5ab090c-14fd-4d58-a915-fd68e5eaefe1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/allwebmenus-wordpress-menu-plugin/" + google-query: inurl:"/wp-content/plugins/allwebmenus-wordpress-menu-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,allwebmenus-wordpress-menu-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/allwebmenus-wordpress-menu-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "allwebmenus-wordpress-menu-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-3da0a6229596dce00028400fe8617c2b.yaml b/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-3da0a6229596dce00028400fe8617c2b.yaml new file mode 100644 index 0000000000..dc48536fd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-3da0a6229596dce00028400fe8617c2b.yaml @@ -0,0 +1,58 @@ +id: allwebmenus-wordpress-menu-plugin-3da0a6229596dce00028400fe8617c2b + +info: + name: > + AllWebMenus WordPress Menu Plugin <= 1.1.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5754ffd6-81bb-491b-9272-627e8c52a22c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/allwebmenus-wordpress-menu-plugin/" + google-query: inurl:"/wp-content/plugins/allwebmenus-wordpress-menu-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,allwebmenus-wordpress-menu-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/allwebmenus-wordpress-menu-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "allwebmenus-wordpress-menu-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-a8f44d7ac88d056c42286ff4fcb52be6.yaml b/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-a8f44d7ac88d056c42286ff4fcb52be6.yaml new file mode 100644 index 0000000000..8774797f41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/allwebmenus-wordpress-menu-plugin-a8f44d7ac88d056c42286ff4fcb52be6.yaml @@ -0,0 +1,58 @@ +id: allwebmenus-wordpress-menu-plugin-a8f44d7ac88d056c42286ff4fcb52be6 + +info: + name: > + AllWebMenus WordPress Menu Plugin <= 1.1.3 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45b6a72a-9aa9-4d77-b250-575d55538110?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/allwebmenus-wordpress-menu-plugin/" + google-query: inurl:"/wp-content/plugins/allwebmenus-wordpress-menu-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,allwebmenus-wordpress-menu-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/allwebmenus-wordpress-menu-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "allwebmenus-wordpress-menu-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alma-gateway-for-woocommerce-046fbaec2a225aa81dc9d68e003387fa.yaml b/nuclei-templates/cve-less/plugins/alma-gateway-for-woocommerce-046fbaec2a225aa81dc9d68e003387fa.yaml new file mode 100644 index 0000000000..b1bc0b36b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alma-gateway-for-woocommerce-046fbaec2a225aa81dc9d68e003387fa.yaml @@ -0,0 +1,58 @@ +id: alma-gateway-for-woocommerce-046fbaec2a225aa81dc9d68e003387fa + +info: + name: > + Alma – Pay in installments or later for WooCommerce <= 5.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/044d7480-ccd7-4ce8-bb5d-367ba5d0217c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alma-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/alma-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alma-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alma-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alma-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alo-easymail-794ee578d2fea0d37b812494538880ef.yaml b/nuclei-templates/cve-less/plugins/alo-easymail-794ee578d2fea0d37b812494538880ef.yaml new file mode 100644 index 0000000000..9f1c585578 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alo-easymail-794ee578d2fea0d37b812494538880ef.yaml @@ -0,0 +1,58 @@ +id: alo-easymail-794ee578d2fea0d37b812494538880ef + +info: + name: > + ALO EasyMail Newsletter <= 2.9.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06ec9ff7-1dd5-4b9b-8f15-cd9523a708a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alo-easymail/" + google-query: inurl:"/wp-content/plugins/alo-easymail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alo-easymail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alo-easymail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alo-easymail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alo-easymail-a800af3f915adeb03a4c49e2c0c22f5f.yaml b/nuclei-templates/cve-less/plugins/alo-easymail-a800af3f915adeb03a4c49e2c0c22f5f.yaml new file mode 100644 index 0000000000..f0d5fbe91f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alo-easymail-a800af3f915adeb03a4c49e2c0c22f5f.yaml @@ -0,0 +1,58 @@ +id: alo-easymail-a800af3f915adeb03a4c49e2c0c22f5f + +info: + name: > + ALO EasyMail Newsletter <= 2.6.00 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fa3f24e-3e28-4e50-8801-e4f0a089e3a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alo-easymail/" + google-query: inurl:"/wp-content/plugins/alo-easymail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alo-easymail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alo-easymail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alo-easymail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alo-easymail-cc81d0e6c8cdea1ef8a5bdab3d5fd485.yaml b/nuclei-templates/cve-less/plugins/alo-easymail-cc81d0e6c8cdea1ef8a5bdab3d5fd485.yaml new file mode 100644 index 0000000000..5072fcec29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alo-easymail-cc81d0e6c8cdea1ef8a5bdab3d5fd485.yaml @@ -0,0 +1,58 @@ +id: alo-easymail-cc81d0e6c8cdea1ef8a5bdab3d5fd485 + +info: + name: > + ALO EasyMail Newsletter <= 2.6.01 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a68f024d-b80d-4e6c-8420-5e0dde87d8f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alo-easymail/" + google-query: inurl:"/wp-content/plugins/alo-easymail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alo-easymail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alo-easymail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alo-easymail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alojapro-widget-7358f712002614260dfd68c7ec8f6f4a.yaml b/nuclei-templates/cve-less/plugins/alojapro-widget-7358f712002614260dfd68c7ec8f6f4a.yaml new file mode 100644 index 0000000000..c2c4d6c263 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alojapro-widget-7358f712002614260dfd68c7ec8f6f4a.yaml @@ -0,0 +1,58 @@ +id: alojapro-widget-7358f712002614260dfd68c7ec8f6f4a + +info: + name: > + Alojapro Widget <= 1.1.15 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ab1a623-5726-45ca-9667-ed926c5d3364?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alojapro-widget/" + google-query: inurl:"/wp-content/plugins/alojapro-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alojapro-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alojapro-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alojapro-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alphabetic-pagination-090eaec5db6a3b5e9520804055acdec3.yaml b/nuclei-templates/cve-less/plugins/alphabetic-pagination-090eaec5db6a3b5e9520804055acdec3.yaml new file mode 100644 index 0000000000..08dba24aac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alphabetic-pagination-090eaec5db6a3b5e9520804055acdec3.yaml @@ -0,0 +1,58 @@ +id: alphabetic-pagination-090eaec5db6a3b5e9520804055acdec3 + +info: + name: > + Alphabetic Pagination <= 3.0.7 - Missing Authorization to Unauthenticated Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbda16f5-65c2-47cf-8b06-6aa231b8fd11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alphabetic-pagination/" + google-query: inurl:"/wp-content/plugins/alphabetic-pagination/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alphabetic-pagination,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alphabetic-pagination/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alphabetic-pagination" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-23db8271ff8255b01a17c8a3f5ed7743.yaml b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-23db8271ff8255b01a17c8a3f5ed7743.yaml new file mode 100644 index 0000000000..586f53019a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-23db8271ff8255b01a17c8a3f5ed7743.yaml @@ -0,0 +1,58 @@ +id: alpine-photo-tile-for-instagram-23db8271ff8255b01a17c8a3f5ed7743 + +info: + name: > + Alpine PhotoTile for Instagram < 1.2.7.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95265186-ff13-464b-adb9-3cf1753487d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alpine-photo-tile-for-instagram/" + google-query: inurl:"/wp-content/plugins/alpine-photo-tile-for-instagram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alpine-photo-tile-for-instagram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alpine-photo-tile-for-instagram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alpine-photo-tile-for-instagram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-87c10838d1b8a43254afbf05b7f964c2.yaml b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-87c10838d1b8a43254afbf05b7f964c2.yaml new file mode 100644 index 0000000000..6af38f6683 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-87c10838d1b8a43254afbf05b7f964c2.yaml @@ -0,0 +1,58 @@ +id: alpine-photo-tile-for-instagram-87c10838d1b8a43254afbf05b7f964c2 + +info: + name: > + Alpine PhotoTile For Instagram < 1.2.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b313177-d329-40a4-8a90-ce14b5cb90a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alpine-photo-tile-for-instagram/" + google-query: inurl:"/wp-content/plugins/alpine-photo-tile-for-instagram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alpine-photo-tile-for-instagram,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alpine-photo-tile-for-instagram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alpine-photo-tile-for-instagram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..1fcac6c3cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: alpine-photo-tile-for-instagram-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alpine-photo-tile-for-instagram/" + google-query: inurl:"/wp-content/plugins/alpine-photo-tile-for-instagram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alpine-photo-tile-for-instagram,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alpine-photo-tile-for-instagram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alpine-photo-tile-for-instagram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-b1149dab4397624c406a542663f9d6f1.yaml b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-b1149dab4397624c406a542663f9d6f1.yaml new file mode 100644 index 0000000000..2d93e94aac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-instagram-b1149dab4397624c406a542663f9d6f1.yaml @@ -0,0 +1,58 @@ +id: alpine-photo-tile-for-instagram-b1149dab4397624c406a542663f9d6f1 + +info: + name: > + Alpine Photo Tile for Instagram < 1.2.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ad6b011-ffe0-4548-b8e8-d03508960413?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alpine-photo-tile-for-instagram/" + google-query: inurl:"/wp-content/plugins/alpine-photo-tile-for-instagram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alpine-photo-tile-for-instagram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alpine-photo-tile-for-instagram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alpine-photo-tile-for-instagram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-pinterest-56be40d6cceb101df1647cdc9530b1ac.yaml b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-pinterest-56be40d6cceb101df1647cdc9530b1ac.yaml new file mode 100644 index 0000000000..ea010985ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alpine-photo-tile-for-pinterest-56be40d6cceb101df1647cdc9530b1ac.yaml @@ -0,0 +1,58 @@ +id: alpine-photo-tile-for-pinterest-56be40d6cceb101df1647cdc9530b1ac + +info: + name: > + Alpine PhotoTile for Pinterest <= 1.3.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb8d81c3-4a5b-491f-9868-3bb7b431f8e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alpine-photo-tile-for-pinterest/" + google-query: inurl:"/wp-content/plugins/alpine-photo-tile-for-pinterest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alpine-photo-tile-for-pinterest,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alpine-photo-tile-for-pinterest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alpine-photo-tile-for-pinterest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alt-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/alt-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b667cfd536 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alt-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: alt-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alt-manager/" + google-query: inurl:"/wp-content/plugins/alt-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alt-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alt-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alt-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alt-manager-d805d4a834d45dbc023ff957c63ddbf7.yaml b/nuclei-templates/cve-less/plugins/alt-manager-d805d4a834d45dbc023ff957c63ddbf7.yaml new file mode 100644 index 0000000000..e42fd8be7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alt-manager-d805d4a834d45dbc023ff957c63ddbf7.yaml @@ -0,0 +1,58 @@ +id: alt-manager-d805d4a834d45dbc023ff957c63ddbf7 + +info: + name: > + Alt Manager <= 1.6.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aaa041a3-d8e5-4637-b8da-5f07c498685a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alt-manager/" + google-query: inurl:"/wp-content/plugins/alt-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alt-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alt-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alt-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alter-c55830103f810a3363d3fb305910a1b3.yaml b/nuclei-templates/cve-less/plugins/alter-c55830103f810a3363d3fb305910a1b3.yaml new file mode 100644 index 0000000000..1777e678cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alter-c55830103f810a3363d3fb305910a1b3.yaml @@ -0,0 +1,58 @@ +id: alter-c55830103f810a3363d3fb305910a1b3 + +info: + name: > + Alter <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e58a45c4-06cb-4b2b-97f2-a614fc230942?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alter/" + google-query: inurl:"/wp-content/plugins/alter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/altos-connect-62fcd76831b1e2041b5f8a95a5780c32.yaml b/nuclei-templates/cve-less/plugins/altos-connect-62fcd76831b1e2041b5f8a95a5780c32.yaml new file mode 100644 index 0000000000..bb1c4e30e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/altos-connect-62fcd76831b1e2041b5f8a95a5780c32.yaml @@ -0,0 +1,58 @@ +id: altos-connect-62fcd76831b1e2041b5f8a95a5780c32 + +info: + name: > + Altos Connect <= 1.3.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae31fb73-de38-4c30-9348-80373ed6e5cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/altos-connect/" + google-query: inurl:"/wp-content/plugins/altos-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,altos-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/altos-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "altos-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/alttext-ai-39af102f2f1fef516b0141731bd29ae6.yaml b/nuclei-templates/cve-less/plugins/alttext-ai-39af102f2f1fef516b0141731bd29ae6.yaml new file mode 100644 index 0000000000..3df9eb2a10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/alttext-ai-39af102f2f1fef516b0141731bd29ae6.yaml @@ -0,0 +1,58 @@ +id: alttext-ai-39af102f2f1fef516b0141731bd29ae6 + +info: + name: > + Download Alt Text AI <= 1.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/633d6921-eece-4e7a-8ed8-48b7c579b5ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/alttext-ai/" + google-query: inurl:"/wp-content/plugins/alttext-ai/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,alttext-ai,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/alttext-ai/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alttext-ai" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/am-hili-affiliate-manager-for-publishers-d9ed7ea48d292aeb09b5a69dca626c8b.yaml b/nuclei-templates/cve-less/plugins/am-hili-affiliate-manager-for-publishers-d9ed7ea48d292aeb09b5a69dca626c8b.yaml new file mode 100644 index 0000000000..e52d3ecac4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/am-hili-affiliate-manager-for-publishers-d9ed7ea48d292aeb09b5a69dca626c8b.yaml @@ -0,0 +1,58 @@ +id: am-hili-affiliate-manager-for-publishers-d9ed7ea48d292aeb09b5a69dca626c8b + +info: + name: > + AM-HiLi <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0237d64-40db-4e4e-be61-893217135ef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/am-hili-affiliate-manager-for-publishers/" + google-query: inurl:"/wp-content/plugins/am-hili-affiliate-manager-for-publishers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,am-hili-affiliate-manager-for-publishers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/am-hili-affiliate-manager-for-publishers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "am-hili-affiliate-manager-for-publishers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazon-affiliate-link-localizer-aff79341750b1cf6ce299e2e5a87675c.yaml b/nuclei-templates/cve-less/plugins/amazon-affiliate-link-localizer-aff79341750b1cf6ce299e2e5a87675c.yaml new file mode 100644 index 0000000000..969c8a67ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazon-affiliate-link-localizer-aff79341750b1cf6ce299e2e5a87675c.yaml @@ -0,0 +1,58 @@ +id: amazon-affiliate-link-localizer-aff79341750b1cf6ce299e2e5a87675c + +info: + name: > + Amazon Affiliate Link Localizer <= 1.8.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a92926f-c8d2-49c4-b50e-2544fd66fe01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazon-affiliate-link-localizer/" + google-query: inurl:"/wp-content/plugins/amazon-affiliate-link-localizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazon-affiliate-link-localizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazon-affiliate-link-localizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazon-affiliate-link-localizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazon-auto-links-2e0473e7d7a7731e63b2d6908a232799.yaml b/nuclei-templates/cve-less/plugins/amazon-auto-links-2e0473e7d7a7731e63b2d6908a232799.yaml new file mode 100644 index 0000000000..61272327e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazon-auto-links-2e0473e7d7a7731e63b2d6908a232799.yaml @@ -0,0 +1,58 @@ +id: amazon-auto-links-2e0473e7d7a7731e63b2d6908a232799 + +info: + name: > + Auto Amazon Links <= 5.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b2a5938-232e-487c-b31b-f48e2b9acb65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazon-auto-links/" + google-query: inurl:"/wp-content/plugins/amazon-auto-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazon-auto-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazon-auto-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazon-auto-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazon-auto-links-511039b32ead609323c267e9b1ba2e48.yaml b/nuclei-templates/cve-less/plugins/amazon-auto-links-511039b32ead609323c267e9b1ba2e48.yaml new file mode 100644 index 0000000000..161bc40998 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazon-auto-links-511039b32ead609323c267e9b1ba2e48.yaml @@ -0,0 +1,58 @@ +id: amazon-auto-links-511039b32ead609323c267e9b1ba2e48 + +info: + name: > + Amazon Auto Links <= 4.6.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e298663b-746c-40fc-a2ca-cb35d472baab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazon-auto-links/" + google-query: inurl:"/wp-content/plugins/amazon-auto-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazon-auto-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazon-auto-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazon-auto-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazon-auto-links-9d2a99598a00b93d061f40c1f9bcc177.yaml b/nuclei-templates/cve-less/plugins/amazon-auto-links-9d2a99598a00b93d061f40c1f9bcc177.yaml new file mode 100644 index 0000000000..64e8ef27bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazon-auto-links-9d2a99598a00b93d061f40c1f9bcc177.yaml @@ -0,0 +1,58 @@ +id: amazon-auto-links-9d2a99598a00b93d061f40c1f9bcc177 + +info: + name: > + Auto Amazon Links <= 5.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via style + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11ffb8a1-55d2-44c5-bcd2-ba866b94e8bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazon-auto-links/" + google-query: inurl:"/wp-content/plugins/amazon-auto-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazon-auto-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazon-auto-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazon-auto-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazon-einzeltitellinks-179da13f00bd0c1a7dc169b4d93d8c60.yaml b/nuclei-templates/cve-less/plugins/amazon-einzeltitellinks-179da13f00bd0c1a7dc169b4d93d8c60.yaml new file mode 100644 index 0000000000..94ccc60fda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazon-einzeltitellinks-179da13f00bd0c1a7dc169b4d93d8c60.yaml @@ -0,0 +1,58 @@ +id: amazon-einzeltitellinks-179da13f00bd0c1a7dc169b4d93d8c60 + +info: + name: > + Amazon Einzeltitellinks <= 1.3.3 - Cross-Site Request Forgery to Arbitrary Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b2ac807-c6e1-43de-8385-240ccae87e81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazon-einzeltitellinks/" + google-query: inurl:"/wp-content/plugins/amazon-einzeltitellinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazon-einzeltitellinks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazon-einzeltitellinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazon-einzeltitellinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazon-link-e8c6c87a94f00d5eab313cc9a401818b.yaml b/nuclei-templates/cve-less/plugins/amazon-link-e8c6c87a94f00d5eab313cc9a401818b.yaml new file mode 100644 index 0000000000..f205cdade3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazon-link-e8c6c87a94f00d5eab313cc9a401818b.yaml @@ -0,0 +1,58 @@ +id: amazon-link-e8c6c87a94f00d5eab313cc9a401818b + +info: + name: > + Amazon Link <= 3.2.10 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f25cdb02-4624-4a46-a622-28665e1d856e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazon-link/" + google-query: inurl:"/wp-content/plugins/amazon-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazon-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazon-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazon-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazon-product-in-a-post-plugin-604db2886f0075f3ac3cb7f4356d58ef.yaml b/nuclei-templates/cve-less/plugins/amazon-product-in-a-post-plugin-604db2886f0075f3ac3cb7f4356d58ef.yaml new file mode 100644 index 0000000000..eff2c07750 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazon-product-in-a-post-plugin-604db2886f0075f3ac3cb7f4356d58ef.yaml @@ -0,0 +1,58 @@ +id: amazon-product-in-a-post-plugin-604db2886f0075f3ac3cb7f4356d58ef + +info: + name: > + Amazon Product in a Post Plugin < 3.5.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd9e5654-387e-4fc3-a6eb-2eface298a9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazon-product-in-a-post-plugin/" + google-query: inurl:"/wp-content/plugins/amazon-product-in-a-post-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazon-product-in-a-post-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazon-product-in-a-post-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazon-product-in-a-post-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazon-s3-and-cloudfront-13e3b44160360e3746c78b8d29452ac0.yaml b/nuclei-templates/cve-less/plugins/amazon-s3-and-cloudfront-13e3b44160360e3746c78b8d29452ac0.yaml new file mode 100644 index 0000000000..b1fe38d4ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazon-s3-and-cloudfront-13e3b44160360e3746c78b8d29452ac0.yaml @@ -0,0 +1,58 @@ +id: amazon-s3-and-cloudfront-13e3b44160360e3746c78b8d29452ac0 + +info: + name: > + guzzlehttp/psr7 < 1.9.1 & 2.4.5 - Interpretation Conflict + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2638bb80-7066-45c0-ab74-4ba407d50cae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazon-s3-and-cloudfront/" + google-query: inurl:"/wp-content/plugins/amazon-s3-and-cloudfront/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazon-s3-and-cloudfront,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazon-s3-and-cloudfront/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazon-s3-and-cloudfront" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazonify-0b5a4c4a0addd6f794e40840ce70fde3.yaml b/nuclei-templates/cve-less/plugins/amazonify-0b5a4c4a0addd6f794e40840ce70fde3.yaml new file mode 100644 index 0000000000..6a976de0b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazonify-0b5a4c4a0addd6f794e40840ce70fde3.yaml @@ -0,0 +1,58 @@ +id: amazonify-0b5a4c4a0addd6f794e40840ce70fde3 + +info: + name: > + Amazonify <= 0.8.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41adfb58-d79f-40a3-8a7e-f3f08f64659f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazonify/" + google-query: inurl:"/wp-content/plugins/amazonify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazonify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazonify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazonify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazonify-ac651fc6ec7fb9810b883366b31dc14b.yaml b/nuclei-templates/cve-less/plugins/amazonify-ac651fc6ec7fb9810b883366b31dc14b.yaml new file mode 100644 index 0000000000..6ec4ed5d1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazonify-ac651fc6ec7fb9810b883366b31dc14b.yaml @@ -0,0 +1,58 @@ +id: amazonify-ac651fc6ec7fb9810b883366b31dc14b + +info: + name: > + Amazonify <= 0.8.1 - Cross-Site Request Forgery to Amazon Tracking ID Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33f3c466-bdeb-402f-bf34-bc703f35e1e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazonify/" + google-query: inurl:"/wp-content/plugins/amazonify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazonify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazonify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazonify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazonjs-b196a1a5480d68e35f21f441524da412.yaml b/nuclei-templates/cve-less/plugins/amazonjs-b196a1a5480d68e35f21f441524da412.yaml new file mode 100644 index 0000000000..0089d89511 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazonjs-b196a1a5480d68e35f21f441524da412.yaml @@ -0,0 +1,58 @@ +id: amazonjs-b196a1a5480d68e35f21f441524da412 + +info: + name: > + Amazon JS <= 0.10 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f6c20cb-b3a9-41d3-bccf-5b834424a59a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazonjs/" + google-query: inurl:"/wp-content/plugins/amazonjs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazonjs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazonjs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazonjs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amazonsimpleadmin-20e17109f21cb297758d197e8d1110d1.yaml b/nuclei-templates/cve-less/plugins/amazonsimpleadmin-20e17109f21cb297758d197e8d1110d1.yaml new file mode 100644 index 0000000000..76a7d3aadb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amazonsimpleadmin-20e17109f21cb297758d197e8d1110d1.yaml @@ -0,0 +1,58 @@ +id: amazonsimpleadmin-20e17109f21cb297758d197e8d1110d1 + +info: + name: > + Affiliate Super Assistent <= 1.5.1 - Cross-Site Request Forgery to Settings Update and Cache Clearing + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54dbd2f4-717c-4e01-afe4-c8cceca52650?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amazonsimpleadmin/" + google-query: inurl:"/wp-content/plugins/amazonsimpleadmin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amazonsimpleadmin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amazonsimpleadmin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amazonsimpleadmin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amcharts-charts-and-maps-f4919b10c6f7c2a14e1c7d5b8a3f99cb.yaml b/nuclei-templates/cve-less/plugins/amcharts-charts-and-maps-f4919b10c6f7c2a14e1c7d5b8a3f99cb.yaml new file mode 100644 index 0000000000..cc799c1827 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amcharts-charts-and-maps-f4919b10c6f7c2a14e1c7d5b8a3f99cb.yaml @@ -0,0 +1,58 @@ +id: amcharts-charts-and-maps-f4919b10c6f7c2a14e1c7d5b8a3f99cb + +info: + name: > + amCharts: Charts and Maps <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67e3b25e-176f-4a0d-a10d-678ea772ce3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amcharts-charts-and-maps/" + google-query: inurl:"/wp-content/plugins/amcharts-charts-and-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amcharts-charts-and-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amcharts-charts-and-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amcharts-charts-and-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-1dec4b557f1e0bf62d3ecb5bf357937d.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-1dec4b557f1e0bf62d3ecb5bf357937d.yaml new file mode 100644 index 0000000000..09867c9f4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-1dec4b557f1e0bf62d3ecb5bf357937d.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-1dec4b557f1e0bf62d3ecb5bf357937d + +info: + name: > + Booking for Appointments and Events Calendar – Amelia <= 1.0.85 - Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33398af8-7b7f-47e5-b95b-c9faa33d0c80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.85') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-1e74f382f78739ad9a39f07eff336537.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-1e74f382f78739ad9a39f07eff336537.yaml new file mode 100644 index 0000000000..76b53d9aeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-1e74f382f78739ad9a39f07eff336537.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-1e74f382f78739ad9a39f07eff336537 + +info: + name: > + Appointment and Event Booking Calendar for WordPress - Amelia < 1.0.47 - Arbitrary Booking Update and Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60c2e8eb-d01b-44f2-8e0d-009ff00887fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.47') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-21e094c4609ed338d0c6ca8ad2e72ecf.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-21e094c4609ed338d0c6ca8ad2e72ecf.yaml new file mode 100644 index 0000000000..c56fd80b26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-21e094c4609ed338d0c6ca8ad2e72ecf.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-21e094c4609ed338d0c6ca8ad2e72ecf + +info: + name: > + Appointment and Event Booking Calendar for WordPress – Amelia <= 1.0.47 - Information Disclosure and SMS Spam + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a0bf16-1a13-4955-8198-fa195fb65905?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-2578d12fdea00971e02ae66b1e0d46ce.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-2578d12fdea00971e02ae66b1e0d46ce.yaml new file mode 100644 index 0000000000..9687b18446 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-2578d12fdea00971e02ae66b1e0d46ce.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-2578d12fdea00971e02ae66b1e0d46ce + +info: + name: > + Amelia <= 1.0.75 - Unauthenticated Reflected Cross-Site Scripting via 'code' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a41f96d-216f-4e5a-a28d-665b052666fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-2bddc689f5d338bc55ee33baa5dff25d.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-2bddc689f5d338bc55ee33baa5dff25d.yaml new file mode 100644 index 0000000000..08cd9fc439 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-2bddc689f5d338bc55ee33baa5dff25d.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-2bddc689f5d338bc55ee33baa5dff25d + +info: + name: > + Amelia <= 1.0.46 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/694fe940-3d0a-4a71-99d3-bcf3a8010585?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-54e594fa48b562cc05ac1592828d94dd.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-54e594fa48b562cc05ac1592828d94dd.yaml new file mode 100644 index 0000000000..012aa39528 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-54e594fa48b562cc05ac1592828d94dd.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-54e594fa48b562cc05ac1592828d94dd + +info: + name: > + Amelia <= 1.0.95 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea984974-2835-4bad-b7ca-975ad21c80e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-7aade2b2966b32522e64422bd2ebd245.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-7aade2b2966b32522e64422bd2ebd245.yaml new file mode 100644 index 0000000000..c84c1847f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-7aade2b2966b32522e64422bd2ebd245.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-7aade2b2966b32522e64422bd2ebd245 + +info: + name: > + Amelia <= 1.0.98 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39005c38-f60d-44fa-9121-a77039dc34de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-9f5c66adfa528be5333386be21bb61b4.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-9f5c66adfa528be5333386be21bb61b4.yaml new file mode 100644 index 0000000000..5acc9c651d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-9f5c66adfa528be5333386be21bb61b4.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-9f5c66adfa528be5333386be21bb61b4 + +info: + name: > + Amelia <= 1.0.46 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bba7fde9-0718-4681-9a1b-7c77bc0affbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-b59499e53223c5a8b455880f0f73a4d1.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-b59499e53223c5a8b455880f0f73a4d1.yaml new file mode 100644 index 0000000000..b3ef57fdf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-b59499e53223c5a8b455880f0f73a4d1.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-b59499e53223c5a8b455880f0f73a4d1 + +info: + name: > + Booking for Appointments and Events Calendar – Amelia <= 1.0.98 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a849ef2-ad0a-45ea-8827-9a7233b1ca30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-bb8040f6049d728dd727ac789ea87332.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-bb8040f6049d728dd727ac789ea87332.yaml new file mode 100644 index 0000000000..0c1916a342 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-bb8040f6049d728dd727ac789ea87332.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-bb8040f6049d728dd727ac789ea87332 + +info: + name: > + Appointment and Event Booking Calendar - Amelia < 1.0.47 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdd70819-57dd-4a60-9398-68d6b87da3ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.47') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-d7b2973ce1bce5f224e9a3aa96df9db7.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-d7b2973ce1bce5f224e9a3aa96df9db7.yaml new file mode 100644 index 0000000000..3577835e38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-d7b2973ce1bce5f224e9a3aa96df9db7.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-d7b2973ce1bce5f224e9a3aa96df9db7 + +info: + name: > + Booking for Appointments and Events Calendar – Amelia <= 1.0.93 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aafb5402-3553-4c89-86e0-4dd556d86074?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-e3aba66b1c44c2a68545f2079a474dc7.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-e3aba66b1c44c2a68545f2079a474dc7.yaml new file mode 100644 index 0000000000..a66f649cb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-e3aba66b1c44c2a68545f2079a474dc7.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-e3aba66b1c44c2a68545f2079a474dc7 + +info: + name: > + Amelia <= 1.0.46 - Stored Cross Site Scripting via lastName + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73f12f22-c0a4-4010-9634-ce7308254028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ameliabooking-fe66c51cf4d5dab04c1eb481e6c9c787.yaml b/nuclei-templates/cve-less/plugins/ameliabooking-fe66c51cf4d5dab04c1eb481e6c9c787.yaml new file mode 100644 index 0000000000..85e3763ae8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ameliabooking-fe66c51cf4d5dab04c1eb481e6c9c787.yaml @@ -0,0 +1,58 @@ +id: ameliabooking-fe66c51cf4d5dab04c1eb481e6c9c787 + +info: + name: > + Appointment and Event Booking Calendar for WordPress – Amelia < 1.0.49 - Arbitrary Booking Update and Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25a80b0b-2636-45c1-92e5-bd62c8a4ab20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ameliabooking/" + google-query: inurl:"/wp-content/plugins/ameliabooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ameliabooking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ameliabooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ameliabooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.49') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amerisale-re-041f22e2f532a722c98f76a160bb194f.yaml b/nuclei-templates/cve-less/plugins/amerisale-re-041f22e2f532a722c98f76a160bb194f.yaml new file mode 100644 index 0000000000..a35720724e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amerisale-re-041f22e2f532a722c98f76a160bb194f.yaml @@ -0,0 +1,58 @@ +id: amerisale-re-041f22e2f532a722c98f76a160bb194f + +info: + name: > + Amerisale-Re (All Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8958931-36be-47b7-9262-3061cff9be22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amerisale-re/" + google-query: inurl:"/wp-content/plugins/amerisale-re/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amerisale-re,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amerisale-re/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amerisale-re" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amerisale-re-e0853825d6dfb06bad466ce63aac12b9.yaml b/nuclei-templates/cve-less/plugins/amerisale-re-e0853825d6dfb06bad466ce63aac12b9.yaml new file mode 100644 index 0000000000..417d9454f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amerisale-re-e0853825d6dfb06bad466ce63aac12b9.yaml @@ -0,0 +1,58 @@ +id: amerisale-re-e0853825d6dfb06bad466ce63aac12b9 + +info: + name: > + amerisale-re (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/339ab2b6-ca5e-41a8-ad32-9d2a271fb320?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amerisale-re/" + google-query: inurl:"/wp-content/plugins/amerisale-re/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amerisale-re,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amerisale-re/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amerisale-re" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amministrazione-aperta-f5cc690dc04197cd95b8aba840195297.yaml b/nuclei-templates/cve-less/plugins/amministrazione-aperta-f5cc690dc04197cd95b8aba840195297.yaml new file mode 100644 index 0000000000..957a145a49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amministrazione-aperta-f5cc690dc04197cd95b8aba840195297.yaml @@ -0,0 +1,58 @@ +id: amministrazione-aperta-f5cc690dc04197cd95b8aba840195297 + +info: + name: > + Amministrazione Aperta <= 3.7.3 - Admin+ Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c829230-7527-4ae2-a5c8-db2371e4cd5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amministrazione-aperta/" + google-query: inurl:"/wp-content/plugins/amministrazione-aperta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amministrazione-aperta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amministrazione-aperta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amministrazione-aperta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amministrazione-trasparente-810fcfbd5671347d9b568db97f356d26.yaml b/nuclei-templates/cve-less/plugins/amministrazione-trasparente-810fcfbd5671347d9b568db97f356d26.yaml new file mode 100644 index 0000000000..4388946823 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amministrazione-trasparente-810fcfbd5671347d9b568db97f356d26.yaml @@ -0,0 +1,58 @@ +id: amministrazione-trasparente-810fcfbd5671347d9b568db97f356d26 + +info: + name: > + Amministrazione Trasparente <= 7.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6358fc29-5b09-481a-9040-a7890b61f419?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amministrazione-trasparente/" + google-query: inurl:"/wp-content/plugins/amministrazione-trasparente/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amministrazione-trasparente,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amministrazione-trasparente/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amministrazione-trasparente" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amministrazione-trasparente-cd1cf1735f71561e3ab5315052ee03d0.yaml b/nuclei-templates/cve-less/plugins/amministrazione-trasparente-cd1cf1735f71561e3ab5315052ee03d0.yaml new file mode 100644 index 0000000000..dca211cd37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amministrazione-trasparente-cd1cf1735f71561e3ab5315052ee03d0.yaml @@ -0,0 +1,58 @@ +id: amministrazione-trasparente-cd1cf1735f71561e3ab5315052ee03d0 + +info: + name: > + Amministrazione Trasparente <= 8.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ef02ecc-6a7b-4782-a891-a1d66d770c81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amministrazione-trasparente/" + google-query: inurl:"/wp-content/plugins/amministrazione-trasparente/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amministrazione-trasparente,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amministrazione-trasparente/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amministrazione-trasparente" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amp-extensions-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/amp-extensions-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..18ac47e63f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amp-extensions-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: amp-extensions-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amp-extensions/" + google-query: inurl:"/wp-content/plugins/amp-extensions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amp-extensions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amp-extensions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amp-extensions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amp-plus-d58e16875ccf06b26ad1bd06e93be82c.yaml b/nuclei-templates/cve-less/plugins/amp-plus-d58e16875ccf06b26ad1bd06e93be82c.yaml new file mode 100644 index 0000000000..36b49739bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amp-plus-d58e16875ccf06b26ad1bd06e93be82c.yaml @@ -0,0 +1,58 @@ +id: amp-plus-d58e16875ccf06b26ad1bd06e93be82c + +info: + name: > + AMP+ Plus <= 3.0 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/417ff4fd-e514-4366-b9a6-c04d7434eac1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amp-plus/" + google-query: inurl:"/wp-content/plugins/amp-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amp-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amp-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amp-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amp-toolbox-5f6a8d3b6e89855777270ac51874a97a.yaml b/nuclei-templates/cve-less/plugins/amp-toolbox-5f6a8d3b6e89855777270ac51874a97a.yaml new file mode 100644 index 0000000000..959bcfe299 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amp-toolbox-5f6a8d3b6e89855777270ac51874a97a.yaml @@ -0,0 +1,58 @@ +id: amp-toolbox-5f6a8d3b6e89855777270ac51874a97a + +info: + name: > + AMP ToolBox <= 2.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0413f69-7251-4c01-b2e0-c8638d797652?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amp-toolbox/" + google-query: inurl:"/wp-content/plugins/amp-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amp-toolbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amp-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amp-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amp-toolbox-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/amp-toolbox-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..aab4d25c0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amp-toolbox-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: amp-toolbox-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amp-toolbox/" + google-query: inurl:"/wp-content/plugins/amp-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amp-toolbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amp-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amp-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amp-wp-b9058f95d651f92a27bde9c074bdcdbe.yaml b/nuclei-templates/cve-less/plugins/amp-wp-b9058f95d651f92a27bde9c074bdcdbe.yaml new file mode 100644 index 0000000000..056c249939 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amp-wp-b9058f95d651f92a27bde9c074bdcdbe.yaml @@ -0,0 +1,58 @@ +id: amp-wp-b9058f95d651f92a27bde9c074bdcdbe + +info: + name: > + AMP WP <= 1.5.15 - Cross-Site Request Forgery via multiple settings pages + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44dd7b3f-5892-43e1-acf1-61f66db0b4a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amp-wp/" + google-query: inurl:"/wp-content/plugins/amp-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amp-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amp-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amp-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ampedsense-adsense-split-tester-d3d77cd29222cddd45d79ddfc8341b95.yaml b/nuclei-templates/cve-less/plugins/ampedsense-adsense-split-tester-d3d77cd29222cddd45d79ddfc8341b95.yaml new file mode 100644 index 0000000000..3ed4059543 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ampedsense-adsense-split-tester-d3d77cd29222cddd45d79ddfc8341b95.yaml @@ -0,0 +1,58 @@ +id: ampedsense-adsense-split-tester-d3d77cd29222cddd45d79ddfc8341b95 + +info: + name: > + AmpedSense – AdSense Split Tester <= 4.68 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/266bbcab-7d41-4c38-b136-24da61728977?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ampedsense-adsense-split-tester/" + google-query: inurl:"/wp-content/plugins/ampedsense-adsense-split-tester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ampedsense-adsense-split-tester,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ampedsense-adsense-split-tester/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ampedsense-adsense-split-tester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amr-ical-events-list-65248f15aa94ab7dabcc81cdc7d86180.yaml b/nuclei-templates/cve-less/plugins/amr-ical-events-list-65248f15aa94ab7dabcc81cdc7d86180.yaml new file mode 100644 index 0000000000..452a09e1c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amr-ical-events-list-65248f15aa94ab7dabcc81cdc7d86180.yaml @@ -0,0 +1,58 @@ +id: amr-ical-events-list-65248f15aa94ab7dabcc81cdc7d86180 + +info: + name: > + Amr Ical Events Lists <= 6.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4531261-d76e-4419-b915-749c72830608?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amr-ical-events-list/" + google-query: inurl:"/wp-content/plugins/amr-ical-events-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amr-ical-events-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amr-ical-events-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amr-ical-events-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amr-shortcode-any-widget-957e4d84091168909dcf10979c3f829e.yaml b/nuclei-templates/cve-less/plugins/amr-shortcode-any-widget-957e4d84091168909dcf10979c3f829e.yaml new file mode 100644 index 0000000000..e998d74b30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amr-shortcode-any-widget-957e4d84091168909dcf10979c3f829e.yaml @@ -0,0 +1,58 @@ +id: amr-shortcode-any-widget-957e4d84091168909dcf10979c3f829e + +info: + name: > + amr shortcode any widget <= 4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da86c6e0-2cff-4aca-b440-ef3fc1f61324?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amr-shortcode-any-widget/" + google-query: inurl:"/wp-content/plugins/amr-shortcode-any-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amr-shortcode-any-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amr-shortcode-any-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amr-shortcode-any-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amr-users-3b7bdb3a8404e199e1deb34a5f3502a4.yaml b/nuclei-templates/cve-less/plugins/amr-users-3b7bdb3a8404e199e1deb34a5f3502a4.yaml new file mode 100644 index 0000000000..258862be54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amr-users-3b7bdb3a8404e199e1deb34a5f3502a4.yaml @@ -0,0 +1,58 @@ +id: amr-users-3b7bdb3a8404e199e1deb34a5f3502a4 + +info: + name: > + amr users <= 4.59.4 - Authenticated (Subscriber+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/879e7695-3a61-4e65-b102-fcdc63fac688?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amr-users/" + google-query: inurl:"/wp-content/plugins/amr-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amr-users,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amr-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amr-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.59.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amr-users-5ff51e8e3d70f359c04a37d7bd2f99bd.yaml b/nuclei-templates/cve-less/plugins/amr-users-5ff51e8e3d70f359c04a37d7bd2f99bd.yaml new file mode 100644 index 0000000000..0369ad4160 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amr-users-5ff51e8e3d70f359c04a37d7bd2f99bd.yaml @@ -0,0 +1,58 @@ +id: amr-users-5ff51e8e3d70f359c04a37d7bd2f99bd + +info: + name: > + amr users <= 4.59.3 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb87726f-868d-4b2e-b818-d303e695c69c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amr-users/" + google-query: inurl:"/wp-content/plugins/amr-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amr-users,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amr-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amr-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.59.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amty-thumb-recent-post-95db80ffd1d934591e0e0a483a99236e.yaml b/nuclei-templates/cve-less/plugins/amty-thumb-recent-post-95db80ffd1d934591e0e0a483a99236e.yaml new file mode 100644 index 0000000000..57e66df617 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amty-thumb-recent-post-95db80ffd1d934591e0e0a483a99236e.yaml @@ -0,0 +1,58 @@ +id: amty-thumb-recent-post-95db80ffd1d934591e0e0a483a99236e + +info: + name: > + amtyThumb posts <= 8.2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a29b18d4-7b9b-48c9-aea8-88f6a6fc4b29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amty-thumb-recent-post/" + google-query: inurl:"/wp-content/plugins/amty-thumb-recent-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amty-thumb-recent-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amty-thumb-recent-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amty-thumb-recent-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/amtythumb-96de88df50c13b090e6e70188ce8bb28.yaml b/nuclei-templates/cve-less/plugins/amtythumb-96de88df50c13b090e6e70188ce8bb28.yaml new file mode 100644 index 0000000000..54a4b037a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/amtythumb-96de88df50c13b090e6e70188ce8bb28.yaml @@ -0,0 +1,58 @@ +id: amtythumb-96de88df50c13b090e6e70188ce8bb28 + +info: + name: > + amtyThumb <= 4.2.0 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dd45dc7-b37c-42f3-a4b5-c4564174148c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/amtythumb/" + google-query: inurl:"/wp-content/plugins/amtythumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,amtythumb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/amtythumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amtythumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/an-gradebook-054cd3c24ebffa75be93ee2056e1824c.yaml b/nuclei-templates/cve-less/plugins/an-gradebook-054cd3c24ebffa75be93ee2056e1824c.yaml new file mode 100644 index 0000000000..9ba950cfcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/an-gradebook-054cd3c24ebffa75be93ee2056e1824c.yaml @@ -0,0 +1,58 @@ +id: an-gradebook-054cd3c24ebffa75be93ee2056e1824c + +info: + name: > + AN_GradeBook <= 5.0.1 - Authenticated (Subscriber+) SQL Injection via 'id' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60d59753-5b6b-4f3e-8faf-8053750ae05d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/an-gradebook/" + google-query: inurl:"/wp-content/plugins/an-gradebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,an-gradebook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/an-gradebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "an-gradebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/an-gradebook-9da08dd717e53fc804ec0889b3c45692.yaml b/nuclei-templates/cve-less/plugins/an-gradebook-9da08dd717e53fc804ec0889b3c45692.yaml new file mode 100644 index 0000000000..486dfe7cf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/an-gradebook-9da08dd717e53fc804ec0889b3c45692.yaml @@ -0,0 +1,58 @@ +id: an-gradebook-9da08dd717e53fc804ec0889b3c45692 + +info: + name: > + AN_GradeBook <= 5.0.1 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d574ed8b-2887-4a56-9fca-914148095ba1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/an-gradebook/" + google-query: inurl:"/wp-content/plugins/an-gradebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,an-gradebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/an-gradebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "an-gradebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anac-xml-viewer-16ea15328c267590894ffee4442a84eb.yaml b/nuclei-templates/cve-less/plugins/anac-xml-viewer-16ea15328c267590894ffee4442a84eb.yaml new file mode 100644 index 0000000000..074b58bba0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anac-xml-viewer-16ea15328c267590894ffee4442a84eb.yaml @@ -0,0 +1,58 @@ +id: anac-xml-viewer-16ea15328c267590894ffee4442a84eb + +info: + name: > + ANAC XML Viewer <= 1.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9af963ed-8bc5-4b5e-bacd-30a2ef429ce8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anac-xml-viewer/" + google-query: inurl:"/wp-content/plugins/anac-xml-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anac-xml-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anac-xml-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anac-xml-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/analogwp-templates-28932f902044dea62ee1c6a2f1f7a4c4.yaml b/nuclei-templates/cve-less/plugins/analogwp-templates-28932f902044dea62ee1c6a2f1f7a4c4.yaml new file mode 100644 index 0000000000..d26f79fdd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/analogwp-templates-28932f902044dea62ee1c6a2f1f7a4c4.yaml @@ -0,0 +1,58 @@ +id: analogwp-templates-28932f902044dea62ee1c6a2f1f7a4c4 + +info: + name: > + Style Kits <= 1.8.0 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cb08fc1-fb8b-4478-8569-eb9b28aff50b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/analogwp-templates/" + google-query: inurl:"/wp-content/plugins/analogwp-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,analogwp-templates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/analogwp-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "analogwp-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/analytics-cat-7d46d3a81ec6bb63cad62cde0afab07a.yaml b/nuclei-templates/cve-less/plugins/analytics-cat-7d46d3a81ec6bb63cad62cde0afab07a.yaml new file mode 100644 index 0000000000..aa519121d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/analytics-cat-7d46d3a81ec6bb63cad62cde0afab07a.yaml @@ -0,0 +1,58 @@ +id: analytics-cat-7d46d3a81ec6bb63cad62cde0afab07a + +info: + name: > + Analytics Cat – Google Analytics Made Easy <= 1.0.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98c2d04d-c401-411f-8bf0-4aebb1779e8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/analytics-cat/" + google-query: inurl:"/wp-content/plugins/analytics-cat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,analytics-cat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/analytics-cat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "analytics-cat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/analytics-cat-e08a52f680b625be47e9beebec7b3154.yaml b/nuclei-templates/cve-less/plugins/analytics-cat-e08a52f680b625be47e9beebec7b3154.yaml new file mode 100644 index 0000000000..9a60f06e71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/analytics-cat-e08a52f680b625be47e9beebec7b3154.yaml @@ -0,0 +1,58 @@ +id: analytics-cat-e08a52f680b625be47e9beebec7b3154 + +info: + name: > + Fatcat Apps Analytics Cat <= 1.0.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29da4c49-3608-4bff-8184-01dc08752403?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/analytics-cat/" + google-query: inurl:"/wp-content/plugins/analytics-cat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,analytics-cat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/analytics-cat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "analytics-cat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/analytics-counter-1896039bad385dbb49f9bb374ae0e749.yaml b/nuclei-templates/cve-less/plugins/analytics-counter-1896039bad385dbb49f9bb374ae0e749.yaml new file mode 100644 index 0000000000..5d369c426b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/analytics-counter-1896039bad385dbb49f9bb374ae0e749.yaml @@ -0,0 +1,58 @@ +id: analytics-counter-1896039bad385dbb49f9bb374ae0e749 + +info: + name: > + Google Analytics Counter Tracker <= 3.4.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc9dc1c-2d79-4dc3-9fee-be5d591d2400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/analytics-counter/" + google-query: inurl:"/wp-content/plugins/analytics-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,analytics-counter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/analytics-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "analytics-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/analytics-for-wp-5b728c0f0ab67d66edeb4ee534a33e19.yaml b/nuclei-templates/cve-less/plugins/analytics-for-wp-5b728c0f0ab67d66edeb4ee534a33e19.yaml new file mode 100644 index 0000000000..aaea6f61e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/analytics-for-wp-5b728c0f0ab67d66edeb4ee534a33e19.yaml @@ -0,0 +1,58 @@ +id: analytics-for-wp-5b728c0f0ab67d66edeb4ee534a33e19 + +info: + name: > + Analytics for WP <= 1.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da4f5af6-61b2-4983-9096-66f6ff7fc060?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/analytics-for-wp/" + google-query: inurl:"/wp-content/plugins/analytics-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,analytics-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/analytics-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "analytics-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/analytics-insights-13226ec92f273d612bf06ab3bca22c10.yaml b/nuclei-templates/cve-less/plugins/analytics-insights-13226ec92f273d612bf06ab3bca22c10.yaml new file mode 100644 index 0000000000..ea8155dbae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/analytics-insights-13226ec92f273d612bf06ab3bca22c10.yaml @@ -0,0 +1,58 @@ +id: analytics-insights-13226ec92f273d612bf06ab3bca22c10 + +info: + name: > + Analytics Insights <= 6.2 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23a3a4c5-0af0-4b5f-b3c7-bf670efea84f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/analytics-insights/" + google-query: inurl:"/wp-content/plugins/analytics-insights/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,analytics-insights,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/analytics-insights/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "analytics-insights" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/analytics-tracker-8f9bc8ffd93a472c3d732de50d85129c.yaml b/nuclei-templates/cve-less/plugins/analytics-tracker-8f9bc8ffd93a472c3d732de50d85129c.yaml new file mode 100644 index 0000000000..6c793ea91a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/analytics-tracker-8f9bc8ffd93a472c3d732de50d85129c.yaml @@ -0,0 +1,58 @@ +id: analytics-tracker-8f9bc8ffd93a472c3d732de50d85129c + +info: + name: > + Analytics Tracker <= 1.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb14563-7aa6-4703-96ef-95708f08beff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/analytics-tracker/" + google-query: inurl:"/wp-content/plugins/analytics-tracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,analytics-tracker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/analytics-tracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "analytics-tracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anchor-episodes-index-843f515046670d7a382e75e7e4f584c1.yaml b/nuclei-templates/cve-less/plugins/anchor-episodes-index-843f515046670d7a382e75e7e4f584c1.yaml new file mode 100644 index 0000000000..efdcf15854 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anchor-episodes-index-843f515046670d7a382e75e7e4f584c1.yaml @@ -0,0 +1,58 @@ +id: anchor-episodes-index-843f515046670d7a382e75e7e4f584c1 + +info: + name: > + Anchor Episodes Index (Spotify for Podcasters) <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96defcb7-6af1-4fb8-9fa0-231c6776bbc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anchor-episodes-index/" + google-query: inurl:"/wp-content/plugins/anchor-episodes-index/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anchor-episodes-index,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anchor-episodes-index/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anchor-episodes-index" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anfrageformular-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/anfrageformular-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..85a508b6ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anfrageformular-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: anfrageformular-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anfrageformular/" + google-query: inurl:"/wp-content/plugins/anfrageformular/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anfrageformular,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anfrageformular/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anfrageformular" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/angwp-389af4405b0ad50159ccf3ce376f93d6.yaml b/nuclei-templates/cve-less/plugins/angwp-389af4405b0ad50159ccf3ce376f93d6.yaml new file mode 100644 index 0000000000..006057af3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/angwp-389af4405b0ad50159ccf3ce376f93d6.yaml @@ -0,0 +1,58 @@ +id: angwp-389af4405b0ad50159ccf3ce376f93d6 + +info: + name: > + Adning Advertising <= 1.5.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a263b74-e9ae-4fd2-be9b-9b8e9eee5982?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/angwp/" + google-query: inurl:"/wp-content/plugins/angwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,angwp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/angwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "angwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/angwp-4ca7a80c9a74f97dd3daf1874e8c0993.yaml b/nuclei-templates/cve-less/plugins/angwp-4ca7a80c9a74f97dd3daf1874e8c0993.yaml new file mode 100644 index 0000000000..c54c19389d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/angwp-4ca7a80c9a74f97dd3daf1874e8c0993.yaml @@ -0,0 +1,58 @@ +id: angwp-4ca7a80c9a74f97dd3daf1874e8c0993 + +info: + name: > + Adning Advertising <= 1.5.5 - Unauthenticated Arbitrary File Deletion via Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7506429-7f8a-45b5-b1b0-6fdb39599ee5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/angwp/" + google-query: inurl:"/wp-content/plugins/angwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,angwp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/angwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "angwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animal-captcha-94cc1c5140ee3a2bfeb91a422867b0fc.yaml b/nuclei-templates/cve-less/plugins/animal-captcha-94cc1c5140ee3a2bfeb91a422867b0fc.yaml new file mode 100644 index 0000000000..d7fc7c4fa2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animal-captcha-94cc1c5140ee3a2bfeb91a422867b0fc.yaml @@ -0,0 +1,58 @@ +id: animal-captcha-94cc1c5140ee3a2bfeb91a422867b0fc + +info: + name: > + Animal Captcha <= 1.6.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80a627a5-6b76-4525-a76a-ac96986bd21b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animal-captcha/" + google-query: inurl:"/wp-content/plugins/animal-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animal-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animal-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animal-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animate-everything-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/animate-everything-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..09f94bf5f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animate-everything-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: animate-everything-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animate-everything/" + google-query: inurl:"/wp-content/plugins/animate-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animate-everything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animate-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animate-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animate-everything-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/animate-everything-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..6dfc894abb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animate-everything-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: animate-everything-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animate-everything/" + google-query: inurl:"/wp-content/plugins/animate-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animate-everything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animate-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animate-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animate-it-5cb88706cc3e4d4bdffd38343a9f038a.yaml b/nuclei-templates/cve-less/plugins/animate-it-5cb88706cc3e4d4bdffd38343a9f038a.yaml new file mode 100644 index 0000000000..dd14da6bf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animate-it-5cb88706cc3e4d4bdffd38343a9f038a.yaml @@ -0,0 +1,58 @@ +id: animate-it-5cb88706cc3e4d4bdffd38343a9f038a + +info: + name: > + Animate It <= 2.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49b296a5-8721-4835-b2c1-ab45045be595?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animate-it/" + google-query: inurl:"/wp-content/plugins/animate-it/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animate-it,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animate-it/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animate-it" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animate-it-61c977fb1adb33ac70d098207834a351.yaml b/nuclei-templates/cve-less/plugins/animate-it-61c977fb1adb33ac70d098207834a351.yaml new file mode 100644 index 0000000000..bb20472f32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animate-it-61c977fb1adb33ac70d098207834a351.yaml @@ -0,0 +1,58 @@ +id: animate-it-61c977fb1adb33ac70d098207834a351 + +info: + name: > + Animate It <= 2.3.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e51a0db0-0ee0-463b-8d82-81a991ef9222?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animate-it/" + google-query: inurl:"/wp-content/plugins/animate-it/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animate-it,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animate-it/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animate-it" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animate-it-6786cc650f667a015a2cad75459e0a89.yaml b/nuclei-templates/cve-less/plugins/animate-it-6786cc650f667a015a2cad75459e0a89.yaml new file mode 100644 index 0000000000..d075170821 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animate-it-6786cc650f667a015a2cad75459e0a89.yaml @@ -0,0 +1,58 @@ +id: animate-it-6786cc650f667a015a2cad75459e0a89 + +info: + name: > + Animate It <= 2.3.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dadfc9c5-79cb-4e43-bf27-8a7f059190e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animate-it/" + google-query: inurl:"/wp-content/plugins/animate-it/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animate-it,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animate-it/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animate-it" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animate-it-9d4c7c94456d7936525f7973a9574896.yaml b/nuclei-templates/cve-less/plugins/animate-it-9d4c7c94456d7936525f7973a9574896.yaml new file mode 100644 index 0000000000..64b83465c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animate-it-9d4c7c94456d7936525f7973a9574896.yaml @@ -0,0 +1,58 @@ +id: animate-it-9d4c7c94456d7936525f7973a9574896 + +info: + name: > + Animate It! < 2.4.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3335613-1206-4555-8e48-748a336548d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animate-it/" + google-query: inurl:"/wp-content/plugins/animate-it/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animate-it,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animate-it/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animate-it" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animated-counters-4187eb8bb2c5fe78d6c93246f1bd60b8.yaml b/nuclei-templates/cve-less/plugins/animated-counters-4187eb8bb2c5fe78d6c93246f1bd60b8.yaml new file mode 100644 index 0000000000..6a3fa9e60f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animated-counters-4187eb8bb2c5fe78d6c93246f1bd60b8.yaml @@ -0,0 +1,58 @@ +id: animated-counters-4187eb8bb2c5fe78d6c93246f1bd60b8 + +info: + name: > + Animated Counters <= 1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33c2756d-c300-479f-b3aa-8f22c3a70278?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animated-counters/" + google-query: inurl:"/wp-content/plugins/animated-counters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animated-counters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animated-counters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animated-counters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animated-fullscreen-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/animated-fullscreen-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..44309a3bc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animated-fullscreen-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: animated-fullscreen-menu-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animated-fullscreen-menu/" + google-query: inurl:"/wp-content/plugins/animated-fullscreen-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animated-fullscreen-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animated-fullscreen-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animated-fullscreen-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animated-headline-b8a793584d2186fb4e0aa8046771e551.yaml b/nuclei-templates/cve-less/plugins/animated-headline-b8a793584d2186fb4e0aa8046771e551.yaml new file mode 100644 index 0000000000..aec28eec43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animated-headline-b8a793584d2186fb4e0aa8046771e551.yaml @@ -0,0 +1,58 @@ +id: animated-headline-b8a793584d2186fb4e0aa8046771e551 + +info: + name: > + Animated Headline <= 4.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f589b5d-9cdb-4521-bc60-c8f19d0ef982?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animated-headline/" + google-query: inurl:"/wp-content/plugins/animated-headline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animated-headline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animated-headline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animated-headline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animated-number-counters-cf48a696f82d0831c89a84db8271161e.yaml b/nuclei-templates/cve-less/plugins/animated-number-counters-cf48a696f82d0831c89a84db8271161e.yaml new file mode 100644 index 0000000000..154c91e172 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animated-number-counters-cf48a696f82d0831c89a84db8271161e.yaml @@ -0,0 +1,58 @@ +id: animated-number-counters-cf48a696f82d0831c89a84db8271161e + +info: + name: > + Animated Number Counters <= 1.6 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e87ea6b5-4288-4ebb-8a29-e0a179e6b584?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animated-number-counters/" + google-query: inurl:"/wp-content/plugins/animated-number-counters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animated-number-counters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animated-number-counters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animated-number-counters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/animated-typing-effect-8a6899bd3b3c6951efcee5344ca06fff.yaml b/nuclei-templates/cve-less/plugins/animated-typing-effect-8a6899bd3b3c6951efcee5344ca06fff.yaml new file mode 100644 index 0000000000..c9cdb0f556 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/animated-typing-effect-8a6899bd3b3c6951efcee5344ca06fff.yaml @@ -0,0 +1,58 @@ +id: animated-typing-effect-8a6899bd3b3c6951efcee5344ca06fff + +info: + name: > + Typing Effect <= 1.3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db12f986-580e-4e81-8bd2-124393e5d21b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/animated-typing-effect/" + google-query: inurl:"/wp-content/plugins/animated-typing-effect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,animated-typing-effect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/animated-typing-effect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "animated-typing-effect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/annasta-woocommerce-product-filters-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/annasta-woocommerce-product-filters-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..794949214b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/annasta-woocommerce-product-filters-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: annasta-woocommerce-product-filters-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/annasta-woocommerce-product-filters/" + google-query: inurl:"/wp-content/plugins/annasta-woocommerce-product-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,annasta-woocommerce-product-filters,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/annasta-woocommerce-product-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "annasta-woocommerce-product-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/annonces-0f95c70ffc4866d8a15e485bb0d699dd.yaml b/nuclei-templates/cve-less/plugins/annonces-0f95c70ffc4866d8a15e485bb0d699dd.yaml new file mode 100644 index 0000000000..d30b36d920 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/annonces-0f95c70ffc4866d8a15e485bb0d699dd.yaml @@ -0,0 +1,58 @@ +id: annonces-0f95c70ffc4866d8a15e485bb0d699dd + +info: + name: > + Annonces <= 1.2.0.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f821e1e2-9114-4b24-bd87-18ab49aa446e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/annonces/" + google-query: inurl:"/wp-content/plugins/annonces/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,annonces,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/annonces/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "annonces" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/announce-from-the-dashboard-05ea715911776cce9345bba9207f2978.yaml b/nuclei-templates/cve-less/plugins/announce-from-the-dashboard-05ea715911776cce9345bba9207f2978.yaml new file mode 100644 index 0000000000..a10a6c9dd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/announce-from-the-dashboard-05ea715911776cce9345bba9207f2978.yaml @@ -0,0 +1,58 @@ +id: announce-from-the-dashboard-05ea715911776cce9345bba9207f2978 + +info: + name: > + Announce from the Dashboard <= 1.5.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d1cf3b-5631-49bd-a7aa-86de2ee4b5b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/announce-from-the-dashboard/" + google-query: inurl:"/wp-content/plugins/announce-from-the-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,announce-from-the-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/announce-from-the-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "announce-from-the-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/announce-from-the-dashboard-4e902ac20277ef72a0ba4b9fef3685d6.yaml b/nuclei-templates/cve-less/plugins/announce-from-the-dashboard-4e902ac20277ef72a0ba4b9fef3685d6.yaml new file mode 100644 index 0000000000..e4cb13605c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/announce-from-the-dashboard-4e902ac20277ef72a0ba4b9fef3685d6.yaml @@ -0,0 +1,58 @@ +id: announce-from-the-dashboard-4e902ac20277ef72a0ba4b9fef3685d6 + +info: + name: > + Announce from the Dashboard <= 1.5.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b75dce8-3e31-45e8-b193-5df3e4391e56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/announce-from-the-dashboard/" + google-query: inurl:"/wp-content/plugins/announce-from-the-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,announce-from-the-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/announce-from-the-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "announce-from-the-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/announcekit-59df5359f3dd97e1bd86b18fcb289b4e.yaml b/nuclei-templates/cve-less/plugins/announcekit-59df5359f3dd97e1bd86b18fcb289b4e.yaml new file mode 100644 index 0000000000..25c7de28b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/announcekit-59df5359f3dd97e1bd86b18fcb289b4e.yaml @@ -0,0 +1,58 @@ +id: announcekit-59df5359f3dd97e1bd86b18fcb289b4e + +info: + name: > + AnnounceKit <= 2.0.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0417e2d7-0c0a-48e1-bf18-3f5e16b1b8a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/announcekit/" + google-query: inurl:"/wp-content/plugins/announcekit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,announcekit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/announcekit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "announcekit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/announcer-e3632f2772b0c1ed9b46e568946ebc5c.yaml b/nuclei-templates/cve-less/plugins/announcer-e3632f2772b0c1ed9b46e568946ebc5c.yaml new file mode 100644 index 0000000000..147980bd90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/announcer-e3632f2772b0c1ed9b46e568946ebc5c.yaml @@ -0,0 +1,58 @@ +id: announcer-e3632f2772b0c1ed9b46e568946ebc5c + +info: + name: > + Announcer – Notification & message bars <= 6.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5981209b-5dc7-4823-bd90-2f9514beb616?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/announcer/" + google-query: inurl:"/wp-content/plugins/announcer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,announcer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/announcer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "announcer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anonymous-restricted-content-e64c3828b87ac23a870624916c783fb0.yaml b/nuclei-templates/cve-less/plugins/anonymous-restricted-content-e64c3828b87ac23a870624916c783fb0.yaml new file mode 100644 index 0000000000..956d3c94df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anonymous-restricted-content-e64c3828b87ac23a870624916c783fb0.yaml @@ -0,0 +1,58 @@ +id: anonymous-restricted-content-e64c3828b87ac23a870624916c783fb0 + +info: + name: > + Anonymous Restricted Content <= 1.6.2 - Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f478ff7c-7193-4c59-a84f-c7cafff9b6c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anonymous-restricted-content/" + google-query: inurl:"/wp-content/plugins/anonymous-restricted-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anonymous-restricted-content,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anonymous-restricted-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anonymous-restricted-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-36cd8a02716876f0db4708fd488996f4.yaml b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-36cd8a02716876f0db4708fd488996f4.yaml new file mode 100644 index 0000000000..02657c8b7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-36cd8a02716876f0db4708fd488996f4.yaml @@ -0,0 +1,58 @@ +id: another-wordpress-classifieds-plugin-36cd8a02716876f0db4708fd488996f4 + +info: + name: > + AWP Classifieds <= 4.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec395e79-b82a-45c3-a704-a15a5efaf26d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" + google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/another-wordpress-classifieds-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "another-wordpress-classifieds-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-8094d83bdd6a783dc479a31b16dcc2d7.yaml b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-8094d83bdd6a783dc479a31b16dcc2d7.yaml new file mode 100644 index 0000000000..fbe394cce1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-8094d83bdd6a783dc479a31b16dcc2d7.yaml @@ -0,0 +1,58 @@ +id: another-wordpress-classifieds-plugin-8094d83bdd6a783dc479a31b16dcc2d7 + +info: + name: > + AWP Classifieds <= 4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b06a1b66-9057-4f16-878c-4fa66489f0ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" + google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/another-wordpress-classifieds-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "another-wordpress-classifieds-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-a0dc813b81ea3eaaf35abcdfd0e51d08.yaml b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-a0dc813b81ea3eaaf35abcdfd0e51d08.yaml new file mode 100644 index 0000000000..2c5c9f161c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-a0dc813b81ea3eaaf35abcdfd0e51d08.yaml @@ -0,0 +1,58 @@ +id: another-wordpress-classifieds-plugin-a0dc813b81ea3eaaf35abcdfd0e51d08 + +info: + name: > + AWP Classifieds <= 4.3.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/782e954f-1fdf-49fa-97bc-60f8fb8c4ecd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" + google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/another-wordpress-classifieds-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "another-wordpress-classifieds-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-c3d1c94528da88057c08634021981f55.yaml b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-c3d1c94528da88057c08634021981f55.yaml new file mode 100644 index 0000000000..04a1f0d63b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-c3d1c94528da88057c08634021981f55.yaml @@ -0,0 +1,58 @@ +id: another-wordpress-classifieds-plugin-c3d1c94528da88057c08634021981f55 + +info: + name: > + AWP Classifieds <= 4.2.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3de27b2e-2196-4b8e-816c-729462a172d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" + google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/another-wordpress-classifieds-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "another-wordpress-classifieds-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-c888a527d839638dab34ddfabb9982e5.yaml b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-c888a527d839638dab34ddfabb9982e5.yaml new file mode 100644 index 0000000000..3260ed9f41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-c888a527d839638dab34ddfabb9982e5.yaml @@ -0,0 +1,58 @@ +id: another-wordpress-classifieds-plugin-c888a527d839638dab34ddfabb9982e5 + +info: + name: > + WordPress Classifieds Plugin – Ad Directory & Listings by AWP Classifieds < 2.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7613875-b44e-4b91-9a5b-41ea0854cd61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" + google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/another-wordpress-classifieds-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "another-wordpress-classifieds-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-d4f178ca51b9a3854e944ff01429b4d0.yaml b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-d4f178ca51b9a3854e944ff01429b4d0.yaml new file mode 100644 index 0000000000..4fc1287859 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-d4f178ca51b9a3854e944ff01429b4d0.yaml @@ -0,0 +1,58 @@ +id: another-wordpress-classifieds-plugin-d4f178ca51b9a3854e944ff01429b4d0 + +info: + name: > + WordPress Classifieds Plugin – Ad Directory & Listings by AWP Classifieds <= 3.3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a52ed75b-07ce-46dc-8321-d10074ce0f61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" + google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/another-wordpress-classifieds-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "another-wordpress-classifieds-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-f8694c41fb21641e443ef7de9264487a.yaml b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-f8694c41fb21641e443ef7de9264487a.yaml new file mode 100644 index 0000000000..9c4bb6f663 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-f8694c41fb21641e443ef7de9264487a.yaml @@ -0,0 +1,58 @@ +id: another-wordpress-classifieds-plugin-f8694c41fb21641e443ef7de9264487a + +info: + name: > + WordPress Classifieds Plugin – Ad Directory & Listings by AWP Classifieds < 3.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a8de5b1-fefc-40b0-8f4d-435e6bd2f452?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" + google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/another-wordpress-classifieds-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "another-wordpress-classifieds-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml new file mode 100644 index 0000000000..a00db7d55a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/another-wordpress-classifieds-plugin-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml @@ -0,0 +1,58 @@ +id: another-wordpress-classifieds-plugin-fa96cc0ae3ebc5f92e1c1a93f29e6a5e + +info: + name: > + WordPress Classifieds Plugin – Ad Directory & Listings by AWP Classifieds < 3.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd8a4296-8a6e-4455-8a69-87cace9199a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" + google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/another-wordpress-classifieds-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "another-wordpress-classifieds-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/answer-my-question-0c71e628227c3366ba2ba3d967bd6786.yaml b/nuclei-templates/cve-less/plugins/answer-my-question-0c71e628227c3366ba2ba3d967bd6786.yaml new file mode 100644 index 0000000000..7ed5e849f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/answer-my-question-0c71e628227c3366ba2ba3d967bd6786.yaml @@ -0,0 +1,58 @@ +id: answer-my-question-0c71e628227c3366ba2ba3d967bd6786 + +info: + name: > + Answer My Question < 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9f17c2b-ca63-4f71-af0f-7bce09ebeb9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/answer-my-question/" + google-query: inurl:"/wp-content/plugins/answer-my-question/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,answer-my-question,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/answer-my-question/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "answer-my-question" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/answer-my-question-0e6f7731fa395b27ed01a77e157db879.yaml b/nuclei-templates/cve-less/plugins/answer-my-question-0e6f7731fa395b27ed01a77e157db879.yaml new file mode 100644 index 0000000000..d13f838164 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/answer-my-question-0e6f7731fa395b27ed01a77e157db879.yaml @@ -0,0 +1,58 @@ +id: answer-my-question-0e6f7731fa395b27ed01a77e157db879 + +info: + name: > + Answer My Question <= 1.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5f24902-1336-4fcd-b42d-e29526e61b71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/answer-my-question/" + google-query: inurl:"/wp-content/plugins/answer-my-question/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,answer-my-question,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/answer-my-question/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "answer-my-question" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anthologize-ba0f1a7c1e75b12eba4e62626fd27944.yaml b/nuclei-templates/cve-less/plugins/anthologize-ba0f1a7c1e75b12eba4e62626fd27944.yaml new file mode 100644 index 0000000000..77ffe4ec55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anthologize-ba0f1a7c1e75b12eba4e62626fd27944.yaml @@ -0,0 +1,58 @@ +id: anthologize-ba0f1a7c1e75b12eba4e62626fd27944 + +info: + name: > + Anthologize <= 0.8.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7535b43-dcf0-4d00-833a-d9d86b2520d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anthologize/" + google-query: inurl:"/wp-content/plugins/anthologize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anthologize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anthologize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anthologize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anti-plagiarism-77af612ec3dcbb3822b11616df7c8557.yaml b/nuclei-templates/cve-less/plugins/anti-plagiarism-77af612ec3dcbb3822b11616df7c8557.yaml new file mode 100644 index 0000000000..2b3ca1a11e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anti-plagiarism-77af612ec3dcbb3822b11616df7c8557.yaml @@ -0,0 +1,58 @@ +id: anti-plagiarism-77af612ec3dcbb3822b11616df7c8557 + +info: + name: > + Anti Plagiarism <= 3.60 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb6ecb74-b337-4930-a737-f70799607d89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anti-plagiarism/" + google-query: inurl:"/wp-content/plugins/anti-plagiarism/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anti-plagiarism,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anti-plagiarism/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anti-plagiarism" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anti-spam-41cd3278684cd2fa92e7808b44952638.yaml b/nuclei-templates/cve-less/plugins/anti-spam-41cd3278684cd2fa92e7808b44952638.yaml new file mode 100644 index 0000000000..bec23e5233 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anti-spam-41cd3278684cd2fa92e7808b44952638.yaml @@ -0,0 +1,58 @@ +id: anti-spam-41cd3278684cd2fa92e7808b44952638 + +info: + name: > + Titan Anti Spam & Security <= 7.3.0 - IP Spoofing to Protection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3edb95f1-aa82-4b51-957e-2039dd8624e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anti-spam/" + google-query: inurl:"/wp-content/plugins/anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anti-spam,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anti-spam-6dd6322d887c160ebd9dfa555a077a3f.yaml b/nuclei-templates/cve-less/plugins/anti-spam-6dd6322d887c160ebd9dfa555a077a3f.yaml new file mode 100644 index 0000000000..84cc59e95d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anti-spam-6dd6322d887c160ebd9dfa555a077a3f.yaml @@ -0,0 +1,58 @@ +id: anti-spam-6dd6322d887c160ebd9dfa555a077a3f + +info: + name: > + Titan Anti-spam & Security <= 4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d93ce6c-0139-472c-a5ec-21fdf33cd898?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anti-spam/" + google-query: inurl:"/wp-content/plugins/anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anti-spam,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/antihacker-1198314be1810779166a4e03d8729a10.yaml b/nuclei-templates/cve-less/plugins/antihacker-1198314be1810779166a4e03d8729a10.yaml new file mode 100644 index 0000000000..5af8092a81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/antihacker-1198314be1810779166a4e03d8729a10.yaml @@ -0,0 +1,58 @@ +id: antihacker-1198314be1810779166a4e03d8729a10 + +info: + name: > + Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan <= 4.51 - Missing Authorization to Unauthenticated IP Address Whitelist + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d365284-73ac-4730-a83d-9202677cf161?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/antihacker/" + google-query: inurl:"/wp-content/plugins/antihacker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,antihacker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/antihacker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antihacker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/antihacker-52d5b418dd2173338819829d8805e340.yaml b/nuclei-templates/cve-less/plugins/antihacker-52d5b418dd2173338819829d8805e340.yaml new file mode 100644 index 0000000000..f7eef8fd33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/antihacker-52d5b418dd2173338819829d8805e340.yaml @@ -0,0 +1,58 @@ +id: antihacker-52d5b418dd2173338819829d8805e340 + +info: + name: > + Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan <= 4.52 - Missing Authorization to Authenticated (Subscriber+) Table Truncation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b80c8888-e8d6-4458-ae93-8e4182060590?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/antihacker/" + google-query: inurl:"/wp-content/plugins/antihacker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,antihacker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/antihacker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antihacker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/antihacker-6e0c5ff8c6831d302f08813c9570b138.yaml b/nuclei-templates/cve-less/plugins/antihacker-6e0c5ff8c6831d302f08813c9570b138.yaml new file mode 100644 index 0000000000..4b59e4be08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/antihacker-6e0c5ff8c6831d302f08813c9570b138.yaml @@ -0,0 +1,58 @@ +id: antihacker-6e0c5ff8c6831d302f08813c9570b138 + +info: + name: > + Anti Hacker <= 4.19 - Missing Authorization to Arbitrary Plugin Install + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9479c9ff-6da3-4391-802d-9e3eb14eff77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/antihacker/" + google-query: inurl:"/wp-content/plugins/antihacker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,antihacker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/antihacker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antihacker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/antihacker-ee14c893825237703550266d1fea00de.yaml b/nuclei-templates/cve-less/plugins/antihacker-ee14c893825237703550266d1fea00de.yaml new file mode 100644 index 0000000000..d0a2b1e2be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/antihacker-ee14c893825237703550266d1fea00de.yaml @@ -0,0 +1,58 @@ +id: antihacker-ee14c893825237703550266d1fea00de + +info: + name: > + Anti Hacker <= 4.34 - Cross-Site Request Forgery via antihacker_ajax_scan + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8ae5712-09a8-45a4-9f79-3e5b7786e652?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/antihacker/" + google-query: inurl:"/wp-content/plugins/antihacker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,antihacker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/antihacker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antihacker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/antispam-bee-a7e9b1b256d670c7c0f18ffa58157054.yaml b/nuclei-templates/cve-less/plugins/antispam-bee-a7e9b1b256d670c7c0f18ffa58157054.yaml new file mode 100644 index 0000000000..1941390f1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/antispam-bee-a7e9b1b256d670c7c0f18ffa58157054.yaml @@ -0,0 +1,58 @@ +id: antispam-bee-a7e9b1b256d670c7c0f18ffa58157054 + +info: + name: > + Antispam Bee <= 2.11.3 - IP Address Spoofing via get_client_ip + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb102891-b4a8-4089-b70c-43866ad85b7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/antispam-bee/" + google-query: inurl:"/wp-content/plugins/antispam-bee/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,antispam-bee,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/antispam-bee/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antispam-bee" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/antivirus-a436748e8c0a814be61fc5b51906b1d1.yaml b/nuclei-templates/cve-less/plugins/antivirus-a436748e8c0a814be61fc5b51906b1d1.yaml new file mode 100644 index 0000000000..b77298a4ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/antivirus-a436748e8c0a814be61fc5b51906b1d1.yaml @@ -0,0 +1,58 @@ +id: antivirus-a436748e8c0a814be61fc5b51906b1d1 + +info: + name: > + AntiVirus < 1.1 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d49fa2d-0625-40a4-b3dd-13679b806bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/antivirus/" + google-query: inurl:"/wp-content/plugins/antivirus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,antivirus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/antivirus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antivirus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anual-archive-498bbeebfd7d1067e2db21072dfc82ff.yaml b/nuclei-templates/cve-less/plugins/anual-archive-498bbeebfd7d1067e2db21072dfc82ff.yaml new file mode 100644 index 0000000000..c2a90cb973 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anual-archive-498bbeebfd7d1067e2db21072dfc82ff.yaml @@ -0,0 +1,58 @@ +id: anual-archive-498bbeebfd7d1067e2db21072dfc82ff + +info: + name: > + Annual Archive <= 1.6.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f4709b-0560-48c6-a26c-d806311758a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anual-archive/" + google-query: inurl:"/wp-content/plugins/anual-archive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anual-archive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anual-archive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anual-archive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anual-archive-633a7d922fc914b18ddc7d21035ab39d.yaml b/nuclei-templates/cve-less/plugins/anual-archive-633a7d922fc914b18ddc7d21035ab39d.yaml new file mode 100644 index 0000000000..705420be72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anual-archive-633a7d922fc914b18ddc7d21035ab39d.yaml @@ -0,0 +1,58 @@ +id: anual-archive-633a7d922fc914b18ddc7d21035ab39d + +info: + name: > + Annual Archive <= 1.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58ae3a89-200b-475c-8d32-a24502eb95c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anual-archive/" + google-query: inurl:"/wp-content/plugins/anual-archive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anual-archive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anual-archive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anual-archive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anual-archive-c19853d6227a07842c1d1043daa343e2.yaml b/nuclei-templates/cve-less/plugins/anual-archive-c19853d6227a07842c1d1043daa343e2.yaml new file mode 100644 index 0000000000..2377731655 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anual-archive-c19853d6227a07842c1d1043daa343e2.yaml @@ -0,0 +1,58 @@ +id: anual-archive-c19853d6227a07842c1d1043daa343e2 + +info: + name: > + Annual Archive <= 1.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20199c88-1800-4d18-a0ee-0219be77b429?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anual-archive/" + google-query: inurl:"/wp-content/plugins/anual-archive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anual-archive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anual-archive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anual-archive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/any-hostname-3bc0607c56016206aa45fc2de8e660d1.yaml b/nuclei-templates/cve-less/plugins/any-hostname-3bc0607c56016206aa45fc2de8e660d1.yaml new file mode 100644 index 0000000000..9f36233f42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/any-hostname-3bc0607c56016206aa45fc2de8e660d1.yaml @@ -0,0 +1,58 @@ +id: any-hostname-3bc0607c56016206aa45fc2de8e660d1 + +info: + name: > + Any Hostname <= 1.0.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09613e4a-0dbe-430a-ab75-725038218803?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/any-hostname/" + google-query: inurl:"/wp-content/plugins/any-hostname/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,any-hostname,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/any-hostname/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "any-hostname" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/any-popup-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/any-popup-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..18050898f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/any-popup-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: any-popup-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/any-popup/" + google-query: inurl:"/wp-content/plugins/any-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,any-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/any-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "any-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/any-popup-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/any-popup-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..7125202367 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/any-popup-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: any-popup-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/any-popup/" + google-query: inurl:"/wp-content/plugins/any-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,any-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/any-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "any-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anycomment-186957a6ecba5765a080f5c6c5b39bcb.yaml b/nuclei-templates/cve-less/plugins/anycomment-186957a6ecba5765a080f5c6c5b39bcb.yaml new file mode 100644 index 0000000000..02035b4234 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anycomment-186957a6ecba5765a080f5c6c5b39bcb.yaml @@ -0,0 +1,58 @@ +id: anycomment-186957a6ecba5765a080f5c6c5b39bcb + +info: + name: > + AnyComment <= 0.2.17 - Race Condition + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca12f906-d896-428a-a144-a1afe045197b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anycomment/" + google-query: inurl:"/wp-content/plugins/anycomment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anycomment,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anycomment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anycomment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anycomment-b59e16af89b52cabb8769776994f8e59.yaml b/nuclei-templates/cve-less/plugins/anycomment-b59e16af89b52cabb8769776994f8e59.yaml new file mode 100644 index 0000000000..5e9fffd9d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anycomment-b59e16af89b52cabb8769776994f8e59.yaml @@ -0,0 +1,58 @@ +id: anycomment-b59e16af89b52cabb8769776994f8e59 + +info: + name: > + AnyComment <= 0.2.17 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/feecd1f9-a933-43f5-971b-459bb27340d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anycomment/" + google-query: inurl:"/wp-content/plugins/anycomment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anycomment,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anycomment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anycomment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anycomment-d22c70f9ec92b7d76f2eae20313e8d32.yaml b/nuclei-templates/cve-less/plugins/anycomment-d22c70f9ec92b7d76f2eae20313e8d32.yaml new file mode 100644 index 0000000000..313444f596 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anycomment-d22c70f9ec92b7d76f2eae20313e8d32.yaml @@ -0,0 +1,58 @@ +id: anycomment-d22c70f9ec92b7d76f2eae20313e8d32 + +info: + name: > + AnyComment <= 0.3.4 - Open Redirect via redirect parameter + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/786d147b-2013-476b-a684-d070f07a166d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anycomment/" + google-query: inurl:"/wp-content/plugins/anycomment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anycomment,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anycomment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anycomment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anycomment-ee36904a88935929b3b15a0e036819ac.yaml b/nuclei-templates/cve-less/plugins/anycomment-ee36904a88935929b3b15a0e036819ac.yaml new file mode 100644 index 0000000000..079d06710b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anycomment-ee36904a88935929b3b15a0e036819ac.yaml @@ -0,0 +1,58 @@ +id: anycomment-ee36904a88935929b3b15a0e036819ac + +info: + name: > + AnyComment <= 0.0.32 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebbee05c-fd32-4dd9-99d3-716ba604b859?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anycomment/" + google-query: inurl:"/wp-content/plugins/anycomment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anycomment,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anycomment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anycomment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anyfont-01e8465418f355e76abbd3d29a83c487.yaml b/nuclei-templates/cve-less/plugins/anyfont-01e8465418f355e76abbd3d29a83c487.yaml new file mode 100644 index 0000000000..8b8274f2bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anyfont-01e8465418f355e76abbd3d29a83c487.yaml @@ -0,0 +1,58 @@ +id: anyfont-01e8465418f355e76abbd3d29a83c487 + +info: + name: > + Anyfont <= 2.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd97d688-d8af-4598-8faa-97eefad63808?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anyfont/" + google-query: inurl:"/wp-content/plugins/anyfont/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anyfont,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anyfont/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anyfont" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anymind-widget-acdadfe8e1df89f0c7d26ae29b23fa05.yaml b/nuclei-templates/cve-less/plugins/anymind-widget-acdadfe8e1df89f0c7d26ae29b23fa05.yaml new file mode 100644 index 0000000000..03476d7682 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anymind-widget-acdadfe8e1df89f0c7d26ae29b23fa05.yaml @@ -0,0 +1,58 @@ +id: anymind-widget-acdadfe8e1df89f0c7d26ae29b23fa05 + +info: + name: > + AnyMind Widget <= 1.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/174eae70-15d7-4772-8fcd-dc4c0fca5b7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anymind-widget/" + google-query: inurl:"/wp-content/plugins/anymind-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anymind-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anymind-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anymind-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anyvar-180f313b58923b98a121e2e279750680.yaml b/nuclei-templates/cve-less/plugins/anyvar-180f313b58923b98a121e2e279750680.yaml new file mode 100644 index 0000000000..33e47583b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anyvar-180f313b58923b98a121e2e279750680.yaml @@ -0,0 +1,58 @@ +id: anyvar-180f313b58923b98a121e2e279750680 + +info: + name: > + AnyVar <= 0.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/949effee-d99c-4965-9d89-3309d4df66cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anyvar/" + google-query: inurl:"/wp-content/plugins/anyvar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anyvar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anyvar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anyvar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anywhere-elementor-953d7c74a5cb5d227016dedae23e3cfa.yaml b/nuclei-templates/cve-less/plugins/anywhere-elementor-953d7c74a5cb5d227016dedae23e3cfa.yaml new file mode 100644 index 0000000000..0f91a480e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anywhere-elementor-953d7c74a5cb5d227016dedae23e3cfa.yaml @@ -0,0 +1,58 @@ +id: anywhere-elementor-953d7c74a5cb5d227016dedae23e3cfa + +info: + name: > + AnyWhere Elementor <= 1.2.7 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5782439f-a546-45f6-aec7-e600442d3c41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anywhere-elementor/" + google-query: inurl:"/wp-content/plugins/anywhere-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anywhere-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anywhere-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anywhere-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anywhere-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/anywhere-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..517ca4f07e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anywhere-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: anywhere-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anywhere-elementor/" + google-query: inurl:"/wp-content/plugins/anywhere-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anywhere-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anywhere-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anywhere-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/anywhere-flash-embed-881cc93528fb94be5fa214f77b12a3dc.yaml b/nuclei-templates/cve-less/plugins/anywhere-flash-embed-881cc93528fb94be5fa214f77b12a3dc.yaml new file mode 100644 index 0000000000..2951ea2d7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/anywhere-flash-embed-881cc93528fb94be5fa214f77b12a3dc.yaml @@ -0,0 +1,58 @@ +id: anywhere-flash-embed-881cc93528fb94be5fa214f77b12a3dc + +info: + name: > + Anywhere Flash Embed <= 1.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a95d7ff6-55ce-4d63-8433-60cece306628?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/anywhere-flash-embed/" + google-query: inurl:"/wp-content/plugins/anywhere-flash-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,anywhere-flash-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/anywhere-flash-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anywhere-flash-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aoi-tori-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/aoi-tori-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..f588ebf4fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aoi-tori-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: aoi-tori-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aoi-tori/" + google-query: inurl:"/wp-content/plugins/aoi-tori/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aoi-tori,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aoi-tori/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aoi-tori" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ap-custom-testimonial-e046ac5677cd6d59abd3c0371d7c020d.yaml b/nuclei-templates/cve-less/plugins/ap-custom-testimonial-e046ac5677cd6d59abd3c0371d7c020d.yaml new file mode 100644 index 0000000000..768a89a237 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ap-custom-testimonial-e046ac5677cd6d59abd3c0371d7c020d.yaml @@ -0,0 +1,58 @@ +id: ap-custom-testimonial-e046ac5677cd6d59abd3c0371d7c020d + +info: + name: > + Testimonial WordPress Plugin < 1.4.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/171faddd-c60c-4d07-834e-d8149703513b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ap-custom-testimonial/" + google-query: inurl:"/wp-content/plugins/ap-custom-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ap-custom-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ap-custom-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ap-custom-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ap-custom-testimonial-ea71ac2a34dc7248e02bdf91d9e86e30.yaml b/nuclei-templates/cve-less/plugins/ap-custom-testimonial-ea71ac2a34dc7248e02bdf91d9e86e30.yaml new file mode 100644 index 0000000000..3a80e7e938 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ap-custom-testimonial-ea71ac2a34dc7248e02bdf91d9e86e30.yaml @@ -0,0 +1,58 @@ +id: ap-custom-testimonial-ea71ac2a34dc7248e02bdf91d9e86e30 + +info: + name: > + AP Custom Testimonial <= 1.4.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/225900ea-ab59-4864-a65b-583730d2703f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ap-custom-testimonial/" + google-query: inurl:"/wp-content/plugins/ap-custom-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ap-custom-testimonial,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ap-custom-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ap-custom-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ap-mega-menu-415cf9b2f7bbb0e22dd8557e0a6ae54d.yaml b/nuclei-templates/cve-less/plugins/ap-mega-menu-415cf9b2f7bbb0e22dd8557e0a6ae54d.yaml new file mode 100644 index 0000000000..17c5e24337 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ap-mega-menu-415cf9b2f7bbb0e22dd8557e0a6ae54d.yaml @@ -0,0 +1,58 @@ +id: ap-mega-menu-415cf9b2f7bbb0e22dd8557e0a6ae54d + +info: + name: > + Mega Menu <= 3.0.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a99ccde-4c8c-4c77-9199-c21dba35c19f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ap-mega-menu/" + google-query: inurl:"/wp-content/plugins/ap-mega-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ap-mega-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ap-mega-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ap-mega-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ap-pricing-tables-lite-55621d6fc615b8d4a345ef4a0a4b8e73.yaml b/nuclei-templates/cve-less/plugins/ap-pricing-tables-lite-55621d6fc615b8d4a345ef4a0a4b8e73.yaml new file mode 100644 index 0000000000..3f4669eec8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ap-pricing-tables-lite-55621d6fc615b8d4a345ef4a0a4b8e73.yaml @@ -0,0 +1,58 @@ +id: ap-pricing-tables-lite-55621d6fc615b8d4a345ef4a0a4b8e73 + +info: + name: > + AP Pricing Tables Lite <= 1.1.6 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/869e57f8-7524-497a-8d24-bb9f2ee3898b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ap-pricing-tables-lite/" + google-query: inurl:"/wp-content/plugins/ap-pricing-tables-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ap-pricing-tables-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ap-pricing-tables-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ap-pricing-tables-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ap-pricing-tables-lite-dd1e137c703afe40250d4d373711d33b.yaml b/nuclei-templates/cve-less/plugins/ap-pricing-tables-lite-dd1e137c703afe40250d4d373711d33b.yaml new file mode 100644 index 0000000000..eb574d7d03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ap-pricing-tables-lite-dd1e137c703afe40250d4d373711d33b.yaml @@ -0,0 +1,58 @@ +id: ap-pricing-tables-lite-dd1e137c703afe40250d4d373711d33b + +info: + name: > + AP Pricing Tables Lite <= 1.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95f9066c-e0dd-4909-a57b-c52070b135d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ap-pricing-tables-lite/" + google-query: inurl:"/wp-content/plugins/ap-pricing-tables-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ap-pricing-tables-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ap-pricing-tables-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ap-pricing-tables-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aparat-7c5c2b955a800f0567ad6425eb1a8e69.yaml b/nuclei-templates/cve-less/plugins/aparat-7c5c2b955a800f0567ad6425eb1a8e69.yaml new file mode 100644 index 0000000000..2e99449ab1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aparat-7c5c2b955a800f0567ad6425eb1a8e69.yaml @@ -0,0 +1,58 @@ +id: aparat-7c5c2b955a800f0567ad6425eb1a8e69 + +info: + name: > + Aparat <= 1.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d14dd6-ff1c-475b-8cff-efc7736124b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aparat/" + google-query: inurl:"/wp-content/plugins/aparat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aparat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aparat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aparat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apartment-management-00968ba3e8c09884c42e4fbfc8959579.yaml b/nuclei-templates/cve-less/plugins/apartment-management-00968ba3e8c09884c42e4fbfc8959579.yaml new file mode 100644 index 0000000000..19a55b4b52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apartment-management-00968ba3e8c09884c42e4fbfc8959579.yaml @@ -0,0 +1,58 @@ +id: apartment-management-00968ba3e8c09884c42e4fbfc8959579 + +info: + name: > + WPAMS - Apartment Management System for wordpress Theme < 17-07-2019 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02282e33-7e3e-42e1-a7b0-9b5ad326600d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apartment-management/" + google-query: inurl:"/wp-content/plugins/apartment-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apartment-management,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apartment-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apartment-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17-07-2019') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apexchat-da0d789e3ff0c2c8ea9e944c14348b70.yaml b/nuclei-templates/cve-less/plugins/apexchat-da0d789e3ff0c2c8ea9e944c14348b70.yaml new file mode 100644 index 0000000000..a02eb4a13b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apexchat-da0d789e3ff0c2c8ea9e944c14348b70.yaml @@ -0,0 +1,58 @@ +id: apexchat-da0d789e3ff0c2c8ea9e944c14348b70 + +info: + name: > + ApexChat <= 1.3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbe8d164-85c7-444d-80ad-4d03151b939b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apexchat/" + google-query: inurl:"/wp-content/plugins/apexchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apexchat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apexchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apexchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/api-bearer-auth-fee563db4bd1e05c4270644fa9c809a1.yaml b/nuclei-templates/cve-less/plugins/api-bearer-auth-fee563db4bd1e05c4270644fa9c809a1.yaml new file mode 100644 index 0000000000..cef1005bea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/api-bearer-auth-fee563db4bd1e05c4270644fa9c809a1.yaml @@ -0,0 +1,58 @@ +id: api-bearer-auth-fee563db4bd1e05c4270644fa9c809a1 + +info: + name: > + API Bearer Auth < 20190907 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13843a16-7ae3-412d-a2ac-7a5ee556b6e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/api-bearer-auth/" + google-query: inurl:"/wp-content/plugins/api-bearer-auth/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,api-bearer-auth,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/api-bearer-auth/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "api-bearer-auth" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20190907') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/api-bing-map-2018-d02235de5f3ca7c1b60ff50591414693.yaml b/nuclei-templates/cve-less/plugins/api-bing-map-2018-d02235de5f3ca7c1b60ff50591414693.yaml new file mode 100644 index 0000000000..1ac162b97f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/api-bing-map-2018-d02235de5f3ca7c1b60ff50591414693.yaml @@ -0,0 +1,58 @@ +id: api-bing-map-2018-d02235de5f3ca7c1b60ff50591414693 + +info: + name: > + WP Bing Map Pro <= 4.1.4 - Cross-Site Request Forgery via AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5abc627d-2d8e-44e6-8e8e-ad9f55cbb0d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/api-bing-map-2018/" + google-query: inurl:"/wp-content/plugins/api-bing-map-2018/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,api-bing-map-2018,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/api-bing-map-2018/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "api-bing-map-2018" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/api-info-themes-plugins-wp-org-13ae41c5ac5351326da940b1b17232ba.yaml b/nuclei-templates/cve-less/plugins/api-info-themes-plugins-wp-org-13ae41c5ac5351326da940b1b17232ba.yaml new file mode 100644 index 0000000000..25496c2f66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/api-info-themes-plugins-wp-org-13ae41c5ac5351326da940b1b17232ba.yaml @@ -0,0 +1,58 @@ +id: api-info-themes-plugins-wp-org-13ae41c5ac5351326da940b1b17232ba + +info: + name: > + API info for Plugins & Themes from WP.ORG <= 1.04 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34045b62-a4d8-4fa0-ac8b-e1ca8ca72fca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/api-info-themes-plugins-wp-org/" + google-query: inurl:"/wp-content/plugins/api-info-themes-plugins-wp-org/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,api-info-themes-plugins-wp-org,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/api-info-themes-plugins-wp-org/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "api-info-themes-plugins-wp-org" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/api-key-for-google-maps-63bf92bd556ddc7e31ce5d5810bb1772.yaml b/nuclei-templates/cve-less/plugins/api-key-for-google-maps-63bf92bd556ddc7e31ce5d5810bb1772.yaml new file mode 100644 index 0000000000..d685c09b52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/api-key-for-google-maps-63bf92bd556ddc7e31ce5d5810bb1772.yaml @@ -0,0 +1,58 @@ +id: api-key-for-google-maps-63bf92bd556ddc7e31ce5d5810bb1772 + +info: + name: > + API KEY for Google Maps <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/804dafd1-0f18-4248-a243-8b26d161bc85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/api-key-for-google-maps/" + google-query: inurl:"/wp-content/plugins/api-key-for-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,api-key-for-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/api-key-for-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "api-key-for-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/api2cart-bridge-connector-19171308e9a97bd1af9a42e88ced211e.yaml b/nuclei-templates/cve-less/plugins/api2cart-bridge-connector-19171308e9a97bd1af9a42e88ced211e.yaml new file mode 100644 index 0000000000..9fb0316c95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/api2cart-bridge-connector-19171308e9a97bd1af9a42e88ced211e.yaml @@ -0,0 +1,58 @@ +id: api2cart-bridge-connector-19171308e9a97bd1af9a42e88ced211e + +info: + name: > + Api2Cart Bridge Connector <= 1.1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bf6d60f-57ac-4cbc-895f-a7db548cbf67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/api2cart-bridge-connector/" + google-query: inurl:"/wp-content/plugins/api2cart-bridge-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,api2cart-bridge-connector,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/api2cart-bridge-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "api2cart-bridge-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/api2cart-bridge-connector-eade6cf258216cda6b355deeb5801b73.yaml b/nuclei-templates/cve-less/plugins/api2cart-bridge-connector-eade6cf258216cda6b355deeb5801b73.yaml new file mode 100644 index 0000000000..4e513c99e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/api2cart-bridge-connector-eade6cf258216cda6b355deeb5801b73.yaml @@ -0,0 +1,58 @@ +id: api2cart-bridge-connector-eade6cf258216cda6b355deeb5801b73 + +info: + name: > + Api2Cart Bridge Connector <= 1.1.0 - Arbitrary Code Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a69236d1-2164-4702-96e3-abd80fb5ffbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/api2cart-bridge-connector/" + google-query: inurl:"/wp-content/plugins/api2cart-bridge-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,api2cart-bridge-connector,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/api2cart-bridge-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "api2cart-bridge-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apocalypse-meow-2d245ed13c0df226645514583b167c2e.yaml b/nuclei-templates/cve-less/plugins/apocalypse-meow-2d245ed13c0df226645514583b167c2e.yaml new file mode 100644 index 0000000000..b7e97414d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apocalypse-meow-2d245ed13c0df226645514583b167c2e.yaml @@ -0,0 +1,58 @@ +id: apocalypse-meow-2d245ed13c0df226645514583b167c2e + +info: + name: > + Apocalypse Meow 21.1.3 - 21.2.7 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bba4f30f-fc21-4387-a29e-4e4a115d7c3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apocalypse-meow/" + google-query: inurl:"/wp-content/plugins/apocalypse-meow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apocalypse-meow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apocalypse-meow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apocalypse-meow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 21.1.3', '<= 21.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-07d84b9abdb8923fa8bed12fef2c739c.yaml b/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-07d84b9abdb8923fa8bed12fef2c739c.yaml new file mode 100644 index 0000000000..d765e9218c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-07d84b9abdb8923fa8bed12fef2c739c.yaml @@ -0,0 +1,58 @@ +id: apollo13-framework-extensions-07d84b9abdb8923fa8bed12fef2c739c + +info: + name: > + Apollo13 Framework Extensions <= 1.9.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/575b51f4-fed4-4057-9e8b-762fda275ef3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apollo13-framework-extensions/" + google-query: inurl:"/wp-content/plugins/apollo13-framework-extensions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apollo13-framework-extensions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apollo13-framework-extensions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apollo13-framework-extensions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-2c1fdb69500dc831bd46062ddc0d2b02.yaml b/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-2c1fdb69500dc831bd46062ddc0d2b02.yaml new file mode 100644 index 0000000000..8c0d30f056 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-2c1fdb69500dc831bd46062ddc0d2b02.yaml @@ -0,0 +1,58 @@ +id: apollo13-framework-extensions-2c1fdb69500dc831bd46062ddc0d2b02 + +info: + name: > + Apollo13 Framework Extensions <= 1.9.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c5b2ce5-d3bf-4412-b329-470a1115260b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apollo13-framework-extensions/" + google-query: inurl:"/wp-content/plugins/apollo13-framework-extensions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apollo13-framework-extensions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apollo13-framework-extensions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apollo13-framework-extensions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-783d77b98a5b328f4a28ee2d5345a1f8.yaml b/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-783d77b98a5b328f4a28ee2d5345a1f8.yaml new file mode 100644 index 0000000000..108c5c21f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-783d77b98a5b328f4a28ee2d5345a1f8.yaml @@ -0,0 +1,58 @@ +id: apollo13-framework-extensions-783d77b98a5b328f4a28ee2d5345a1f8 + +info: + name: > + Apollo13 Framework Extensions <= 1.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33386b7b-fae3-42a4-96d3-df3cdc342317?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apollo13-framework-extensions/" + google-query: inurl:"/wp-content/plugins/apollo13-framework-extensions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apollo13-framework-extensions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apollo13-framework-extensions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apollo13-framework-extensions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-7c93e57058800cc97d4580d0e8797ab3.yaml b/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-7c93e57058800cc97d4580d0e8797ab3.yaml new file mode 100644 index 0000000000..59546f7739 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apollo13-framework-extensions-7c93e57058800cc97d4580d0e8797ab3.yaml @@ -0,0 +1,58 @@ +id: apollo13-framework-extensions-7c93e57058800cc97d4580d0e8797ab3 + +info: + name: > + Apollo13 Framework Extensions <= 1.8.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e122d75b-0bde-4886-a8e0-d07a535fc967?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apollo13-framework-extensions/" + google-query: inurl:"/wp-content/plugins/apollo13-framework-extensions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apollo13-framework-extensions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apollo13-framework-extensions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apollo13-framework-extensions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/app-ads-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/app-ads-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..adef04aae7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/app-ads-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: app-ads-txt-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/app-ads-txt/" + google-query: inurl:"/wp-content/plugins/app-ads-txt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,app-ads-txt,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/app-ads-txt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "app-ads-txt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/app-builder-41d7dedc3e3a9c3e6b69d336c29a1195.yaml b/nuclei-templates/cve-less/plugins/app-builder-41d7dedc3e3a9c3e6b69d336c29a1195.yaml new file mode 100644 index 0000000000..28893c9b8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/app-builder-41d7dedc3e3a9c3e6b69d336c29a1195.yaml @@ -0,0 +1,58 @@ +id: app-builder-41d7dedc3e3a9c3e6b69d336c29a1195 + +info: + name: > + App Builder <= 3.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62c3f844-ed88-4a6c-a8c2-7b573096ec8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/app-builder/" + google-query: inurl:"/wp-content/plugins/app-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,app-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/app-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "app-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/app-builder-e5e1ea362452a736ee3e514dade0c3d9.yaml b/nuclei-templates/cve-less/plugins/app-builder-e5e1ea362452a736ee3e514dade0c3d9.yaml new file mode 100644 index 0000000000..4f9e9f443c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/app-builder-e5e1ea362452a736ee3e514dade0c3d9.yaml @@ -0,0 +1,58 @@ +id: app-builder-e5e1ea362452a736ee3e514dade0c3d9 + +info: + name: > + App Builder <= 3.8.7 - Open Redirection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0488a421-e725-4b64-94ee-3a81f4bc5451?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/app-builder/" + google-query: inurl:"/wp-content/plugins/app-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,app-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/app-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "app-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appexperts-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/appexperts-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9e1b66b2aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appexperts-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: appexperts-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appexperts/" + google-query: inurl:"/wp-content/plugins/appexperts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appexperts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appexperts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appexperts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apply-online-5543057e7022cfec9b8ae11fa6f72d5e.yaml b/nuclei-templates/cve-less/plugins/apply-online-5543057e7022cfec9b8ae11fa6f72d5e.yaml new file mode 100644 index 0000000000..ac1afc5c16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apply-online-5543057e7022cfec9b8ae11fa6f72d5e.yaml @@ -0,0 +1,58 @@ +id: apply-online-5543057e7022cfec9b8ae11fa6f72d5e + +info: + name: > + ApplyOnline – Application Form Builder and Manager <= 2.5.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3473b5e-2f50-4845-9cfa-d19129f2a430?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apply-online/" + google-query: inurl:"/wp-content/plugins/apply-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apply-online,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apply-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apply-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apply-online-79807fbebc743d8cb1249f7ab347cb5d.yaml b/nuclei-templates/cve-less/plugins/apply-online-79807fbebc743d8cb1249f7ab347cb5d.yaml new file mode 100644 index 0000000000..803105e2fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apply-online-79807fbebc743d8cb1249f7ab347cb5d.yaml @@ -0,0 +1,58 @@ +id: apply-online-79807fbebc743d8cb1249f7ab347cb5d + +info: + name: > + ApplyOnline – Application Form Builder and Manager <= 2.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c704356-e5f7-4b91-a162-647717cbbb7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apply-online/" + google-query: inurl:"/wp-content/plugins/apply-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apply-online,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apply-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apply-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apply-online-acf9697c1a09f246be4d3f2a957b0449.yaml b/nuclei-templates/cve-less/plugins/apply-online-acf9697c1a09f246be4d3f2a957b0449.yaml new file mode 100644 index 0000000000..a190a21299 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apply-online-acf9697c1a09f246be4d3f2a957b0449.yaml @@ -0,0 +1,58 @@ +id: apply-online-acf9697c1a09f246be4d3f2a957b0449 + +info: + name: > + ApplyOnline – Application Form Builder and Manager <= 2.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5dbcc22-ab2e-4114-a7d7-bac01a5c5b3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apply-online/" + google-query: inurl:"/wp-content/plugins/apply-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apply-online,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apply-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apply-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appmysite-989829020debf8c57aef5b384fb5a34d.yaml b/nuclei-templates/cve-less/plugins/appmysite-989829020debf8c57aef5b384fb5a34d.yaml new file mode 100644 index 0000000000..adedb41c98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appmysite-989829020debf8c57aef5b384fb5a34d.yaml @@ -0,0 +1,58 @@ +id: appmysite-989829020debf8c57aef5b384fb5a34d + +info: + name: > + AppMySite <= 3.11.0 - Unauthenticated Information Disclsoure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b9f171f-56d8-4ab9-bf61-0daa7c0d928f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appmysite/" + google-query: inurl:"/wp-content/plugins/appmysite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appmysite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appmysite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appmysite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-08426323208aa24ee3404d3b3ddfff01.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-08426323208aa24ee3404d3b3ddfff01.yaml new file mode 100644 index 0000000000..23bfb88bbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-08426323208aa24ee3404d3b3ddfff01.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-08426323208aa24ee3404d3b3ddfff01 + +info: + name: > + Appointment Booking Calendar <= 1.3.82 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc6d1db-37ae-4198-84bd-944dad4926c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.82') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-08a6dbc5d307f61c67e7655c763c44e3.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-08a6dbc5d307f61c67e7655c763c44e3.yaml new file mode 100644 index 0000000000..81f6fb0d33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-08a6dbc5d307f61c67e7655c763c44e3.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-08a6dbc5d307f61c67e7655c763c44e3 + +info: + name: > + Appointment Booking Calendar <= 1.1.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66ce2d12-8f57-4140-b3cf-0fc8c1c4f3d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-297cb3aa5bbfd9cc7b8af82349a82915.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-297cb3aa5bbfd9cc7b8af82349a82915.yaml new file mode 100644 index 0000000000..c6ac59eb10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-297cb3aa5bbfd9cc7b8af82349a82915.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-297cb3aa5bbfd9cc7b8af82349a82915 + +info: + name: > + Appointment Booking Calendar <= 1.3.34 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/006544c9-09ed-4cda-a903-4e3959fdb676?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-35c4ece0623f219b885fb4f9c4a8296b.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-35c4ece0623f219b885fb4f9c4a8296b.yaml new file mode 100644 index 0000000000..e835a270fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-35c4ece0623f219b885fb4f9c4a8296b.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-35c4ece0623f219b885fb4f9c4a8296b + +info: + name: > + Appointment Booking Calendar <= 1.2.24 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d79df74-bb28-412b-bba1-9f8a40ae981d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-5da504c8dee91299e78459069ad88795.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-5da504c8dee91299e78459069ad88795.yaml new file mode 100644 index 0000000000..14f4029e7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-5da504c8dee91299e78459069ad88795.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-5da504c8dee91299e78459069ad88795 + +info: + name: > + Appointment Booking Calendar <= 1.3.69 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cb1d8a3-91dd-419e-bc4e-57842afeb7b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-6dd0e2469be8342859a9ccb068065a86.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-6dd0e2469be8342859a9ccb068065a86.yaml new file mode 100644 index 0000000000..3187e431ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-6dd0e2469be8342859a9ccb068065a86.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-6dd0e2469be8342859a9ccb068065a86 + +info: + name: > + Appointment Booking Calendar < 1.3.19 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78c19531-550d-4b97-a30d-adcaad43b53b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-771c97465f47602bb9d8eaea8019fba4.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-771c97465f47602bb9d8eaea8019fba4.yaml new file mode 100644 index 0000000000..738d5e6758 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-771c97465f47602bb9d8eaea8019fba4.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-771c97465f47602bb9d8eaea8019fba4 + +info: + name: > + Appointment Booking Calendar <= 1.2.24 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13c9a71f-ec0a-4d4a-be08-787aa22a0fae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-945428d4546aafa998fc04a10d10dbe9.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-945428d4546aafa998fc04a10d10dbe9.yaml new file mode 100644 index 0000000000..4b9c3822e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-945428d4546aafa998fc04a10d10dbe9.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-945428d4546aafa998fc04a10d10dbe9 + +info: + name: > + Appointment Booking Calendar <= 1.1.23 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b704c42-181b-47cb-9df8-3b82f7b830e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-9ab71be11dbcb0181c89ee507de51f30.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-9ab71be11dbcb0181c89ee507de51f30.yaml new file mode 100644 index 0000000000..74a0e0aec6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-9ab71be11dbcb0181c89ee507de51f30.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-9ab71be11dbcb0181c89ee507de51f30 + +info: + name: > + Appointment Booking Calendar <= 1.3.34 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25b26369-76e3-44f0-8275-03fc6fc9705c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-booking-calendar-e90b932522d2fa559539fe55a84e18ea.yaml b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-e90b932522d2fa559539fe55a84e18ea.yaml new file mode 100644 index 0000000000..ab812e9bd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-booking-calendar-e90b932522d2fa559539fe55a84e18ea.yaml @@ -0,0 +1,58 @@ +id: appointment-booking-calendar-e90b932522d2fa559539fe55a84e18ea + +info: + name: > + Appointment Booking Calendar <= 1.1.7 - Multiple Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19f97cc8-4a35-44fd-b9f5-978f5997d08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-booking-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-calendar-1c7dc157fa96adfd05a4bca562cbd9a9.yaml b/nuclei-templates/cve-less/plugins/appointment-calendar-1c7dc157fa96adfd05a4bca562cbd9a9.yaml new file mode 100644 index 0000000000..8489b9d4fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-calendar-1c7dc157fa96adfd05a4bca562cbd9a9.yaml @@ -0,0 +1,58 @@ +id: appointment-calendar-1c7dc157fa96adfd05a4bca562cbd9a9 + +info: + name: > + Appointment Calendar <= 2.9.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baebd08b-1f40-4cb2-8158-c4421af68c06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-calendar-a44ebccf5ee05a1c5c4e60f95c997bb4.yaml b/nuclei-templates/cve-less/plugins/appointment-calendar-a44ebccf5ee05a1c5c4e60f95c997bb4.yaml new file mode 100644 index 0000000000..2273bec1e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-calendar-a44ebccf5ee05a1c5c4e60f95c997bb4.yaml @@ -0,0 +1,58 @@ +id: appointment-calendar-a44ebccf5ee05a1c5c4e60f95c997bb4 + +info: + name: > + Appointment Calendar <= 2.9.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06a92619-5281-414e-8846-be0db38df89d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-calendar-ddf4f66c18523a137871577fe704ba77.yaml b/nuclei-templates/cve-less/plugins/appointment-calendar-ddf4f66c18523a137871577fe704ba77.yaml new file mode 100644 index 0000000000..0ade6ef59b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-calendar-ddf4f66c18523a137871577fe704ba77.yaml @@ -0,0 +1,58 @@ +id: appointment-calendar-ddf4f66c18523a137871577fe704ba77 + +info: + name: > + Appointment Calendar <= 2.7.4 - Multiple Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34bae29d-4617-44c9-8f00-bd581cef4ab1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-calendar/" + google-query: inurl:"/wp-content/plugins/appointment-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-236c93e0abdcaccaa98b96d0eb756aaf.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-236c93e0abdcaccaa98b96d0eb756aaf.yaml new file mode 100644 index 0000000000..b04c61503a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-236c93e0abdcaccaa98b96d0eb756aaf.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-236c93e0abdcaccaa98b96d0eb756aaf + +info: + name: > + Appointment Hour Booking <= 1.3.71 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c332ba8-282e-484e-9ee2-a91c9255bad0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-49498beeab40d799abe54105f37dda52.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-49498beeab40d799abe54105f37dda52.yaml new file mode 100644 index 0000000000..97372bb9d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-49498beeab40d799abe54105f37dda52.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-49498beeab40d799abe54105f37dda52 + +info: + name: > + Appointment Hour Booking <= 1.3.55 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/371fef9c-1f32-4a21-b4f4-1fc364ade5a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-8140e129d8e838ad592a5c184c1cf2c6.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-8140e129d8e838ad592a5c184c1cf2c6.yaml new file mode 100644 index 0000000000..2359f3bab6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-8140e129d8e838ad592a5c184c1cf2c6.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-8140e129d8e838ad592a5c184c1cf2c6 + +info: + name: > + Appointment Hour Booking <= 1.3.72 - Unauthenticated iFrame Injection via Appointment Form + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/870ae326-a7c9-4201-bf0d-0fbda663a694?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-93e983f709a0a8202ff094d785febb7b.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-93e983f709a0a8202ff094d785febb7b.yaml new file mode 100644 index 0000000000..6269347aa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-93e983f709a0a8202ff094d785febb7b.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-93e983f709a0a8202ff094d785febb7b + +info: + name: > + Appointment Hour Booking <= 1.3.16 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75cc74f6-aaab-4d5a-bd71-c238fa74a9bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-aa161d7417ea73aa3cb2b51c21fd83db.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-aa161d7417ea73aa3cb2b51c21fd83db.yaml new file mode 100644 index 0000000000..95c510247f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-aa161d7417ea73aa3cb2b51c21fd83db.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-aa161d7417ea73aa3cb2b51c21fd83db + +info: + name: > + Appointment Hour Booking <= 1.4.56 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6a3ae10-843f-484a-ad6c-221ffece7cc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-b36315e23ade129c61fb07a902fc54b7.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-b36315e23ade129c61fb07a902fc54b7.yaml new file mode 100644 index 0000000000..bc86e9d993 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-b36315e23ade129c61fb07a902fc54b7.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-b36315e23ade129c61fb07a902fc54b7 + +info: + name: > + Appointment Hour Booking <= 1.3.15 Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b53e6c9e-f78f-44e8-ad0f-8cfaaac8b53f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-bb0044840289e8306c7f62e7542e65ad.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-bb0044840289e8306c7f62e7542e65ad.yaml new file mode 100644 index 0000000000..f6bef94b35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-bb0044840289e8306c7f62e7542e65ad.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-bb0044840289e8306c7f62e7542e65ad + +info: + name: > + Appointment Hour Booking <= 1.3.72 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3a77b7a-65ad-4334-99c9-92cc79e60bee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-e18c42540e73da21df0e80ed6910311c.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-e18c42540e73da21df0e80ed6910311c.yaml new file mode 100644 index 0000000000..b2aa20cc34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-e18c42540e73da21df0e80ed6910311c.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-e18c42540e73da21df0e80ed6910311c + +info: + name: > + Appointment Hour Booking – WordPress Booking Plugin <= 1.1.45 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e39044c6-8b72-478d-a762-418b2c58429a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointment-hour-booking-f0cf91bed602f178255f06e47ead86ab.yaml b/nuclei-templates/cve-less/plugins/appointment-hour-booking-f0cf91bed602f178255f06e47ead86ab.yaml new file mode 100644 index 0000000000..f1ef74134f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointment-hour-booking-f0cf91bed602f178255f06e47ead86ab.yaml @@ -0,0 +1,58 @@ +id: appointment-hour-booking-f0cf91bed602f178255f06e47ead86ab + +info: + name: > + Appointment Hour Booking <= 1.3.72 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f62d28bd-fa33-4f0b-a116-5aacc05bfa3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointment-hour-booking/" + google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointment-hour-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointment-hour-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment-hour-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/appointments-8afefefadde8900ab97df32e69f71d32.yaml b/nuclei-templates/cve-less/plugins/appointments-8afefefadde8900ab97df32e69f71d32.yaml new file mode 100644 index 0000000000..192f1305fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/appointments-8afefefadde8900ab97df32e69f71d32.yaml @@ -0,0 +1,58 @@ +id: appointments-8afefefadde8900ab97df32e69f71d32 + +info: + name: > + Appointments <= 2.2.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8f230e-3f96-4efd-806d-72725b960303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/appointments/" + google-query: inurl:"/wp-content/plugins/appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,appointments,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apppresser-2f1276a08770749aab26a12f9e94025f.yaml b/nuclei-templates/cve-less/plugins/apppresser-2f1276a08770749aab26a12f9e94025f.yaml new file mode 100644 index 0000000000..79ca9bcef4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apppresser-2f1276a08770749aab26a12f9e94025f.yaml @@ -0,0 +1,58 @@ +id: apppresser-2f1276a08770749aab26a12f9e94025f + +info: + name: > + AppPresser <= 4.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d999ef8-303e-4707-ace8-64563e899651?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apppresser/" + google-query: inurl:"/wp-content/plugins/apppresser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apppresser,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apppresser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apppresser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apppresser-36235d6783de2113be1f6010065b9add.yaml b/nuclei-templates/cve-less/plugins/apppresser-36235d6783de2113be1f6010065b9add.yaml new file mode 100644 index 0000000000..c32c234239 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apppresser-36235d6783de2113be1f6010065b9add.yaml @@ -0,0 +1,58 @@ +id: apppresser-36235d6783de2113be1f6010065b9add + +info: + name: > + AppPresser <= 4.3.0 - Cross-Site Request Forgery via toggle_logging_callback() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16c7813c-7814-43f1-b051-e7e8690de21e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apppresser/" + google-query: inurl:"/wp-content/plugins/apppresser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apppresser,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apppresser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apppresser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apppresser-3f24de62c55c69c367431f554a182adc.yaml b/nuclei-templates/cve-less/plugins/apppresser-3f24de62c55c69c367431f554a182adc.yaml new file mode 100644 index 0000000000..fe01cba928 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apppresser-3f24de62c55c69c367431f554a182adc.yaml @@ -0,0 +1,58 @@ +id: apppresser-3f24de62c55c69c367431f554a182adc + +info: + name: > + AppPresser <= 4.2.5 - Insecure Password Reset Mechanism + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c44c36a-c4c7-49c2-b750-1589e7840dde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apppresser/" + google-query: inurl:"/wp-content/plugins/apppresser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apppresser,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apppresser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apppresser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apppresser-ee0a89e3e23a3a50f6d12be73524e3c6.yaml b/nuclei-templates/cve-less/plugins/apppresser-ee0a89e3e23a3a50f6d12be73524e3c6.yaml new file mode 100644 index 0000000000..138a3688da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apppresser-ee0a89e3e23a3a50f6d12be73524e3c6.yaml @@ -0,0 +1,58 @@ +id: apppresser-ee0a89e3e23a3a50f6d12be73524e3c6 + +info: + name: > + AppPresser <= 4.3.0 - Cross-Site Request Forgery via force_logging_off() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1417fad0-51a0-4091-8f7b-4e8925fd71a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apppresser/" + google-query: inurl:"/wp-content/plugins/apppresser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apppresser,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apppresser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apppresser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apptha-banner-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/apptha-banner-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..2f44292064 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apptha-banner-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: apptha-banner-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apptha-banner/" + google-query: inurl:"/wp-content/plugins/apptha-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apptha-banner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apptha-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apptha-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apptha-slider-gallery-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/apptha-slider-gallery-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..deef07247c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apptha-slider-gallery-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: apptha-slider-gallery-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apptha-slider-gallery/" + google-query: inurl:"/wp-content/plugins/apptha-slider-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apptha-slider-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apptha-slider-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apptha-slider-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/apptivo-business-site-b0a5bbc946df09d6c3b0cc9fe2eebc81.yaml b/nuclei-templates/cve-less/plugins/apptivo-business-site-b0a5bbc946df09d6c3b0cc9fe2eebc81.yaml new file mode 100644 index 0000000000..084a8c7c03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/apptivo-business-site-b0a5bbc946df09d6c3b0cc9fe2eebc81.yaml @@ -0,0 +1,58 @@ +id: apptivo-business-site-b0a5bbc946df09d6c3b0cc9fe2eebc81 + +info: + name: > + Apptivo Business Site CRM <= 3.0.12 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e570a66a-14f4-4ce9-b820-c54d09dd051d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/apptivo-business-site/" + google-query: inurl:"/wp-content/plugins/apptivo-business-site/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,apptivo-business-site,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/apptivo-business-site/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "apptivo-business-site" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aprils-super-functions-pack-6d5aea08d890e341921e43e6b4a849e2.yaml b/nuclei-templates/cve-less/plugins/aprils-super-functions-pack-6d5aea08d890e341921e43e6b4a849e2.yaml new file mode 100644 index 0000000000..94a23ab3c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aprils-super-functions-pack-6d5aea08d890e341921e43e6b4a849e2.yaml @@ -0,0 +1,58 @@ +id: aprils-super-functions-pack-6d5aea08d890e341921e43e6b4a849e2 + +info: + name: > + April's Super Functions Pack <= 1.4.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb3a7623-ced8-4738-8a95-a3eda7e86ec1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aprils-super-functions-pack/" + google-query: inurl:"/wp-content/plugins/aprils-super-functions-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aprils-super-functions-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aprils-super-functions-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aprils-super-functions-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ar-contactus-34166a606544203d0a234746ff259ddd.yaml b/nuclei-templates/cve-less/plugins/ar-contactus-34166a606544203d0a234746ff259ddd.yaml new file mode 100644 index 0000000000..32af095b6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ar-contactus-34166a606544203d0a234746ff259ddd.yaml @@ -0,0 +1,58 @@ +id: ar-contactus-34166a606544203d0a234746ff259ddd + +info: + name: > + All in One Support Button + Callback Request <= 1.8.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e06ceba5-9c50-442e-9cba-da64a38de00f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ar-contactus/" + google-query: inurl:"/wp-content/plugins/ar-contactus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ar-contactus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ar-contactus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ar-contactus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ar-contactus-5efe3bb103834ebca4e7ce81f7b0fd92.yaml b/nuclei-templates/cve-less/plugins/ar-contactus-5efe3bb103834ebca4e7ce81f7b0fd92.yaml new file mode 100644 index 0000000000..4b3e7455e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ar-contactus-5efe3bb103834ebca4e7ce81f7b0fd92.yaml @@ -0,0 +1,58 @@ +id: ar-contactus-5efe3bb103834ebca4e7ce81f7b0fd92 + +info: + name: > + All in One Support Button + Callback Request <= 1.8.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6abe93e8-b088-49d3-a658-9c6265bfbcdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ar-contactus/" + google-query: inurl:"/wp-content/plugins/ar-contactus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ar-contactus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ar-contactus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ar-contactus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arabic-font-81f4538f2765df23f8b4f561b33039aa.yaml b/nuclei-templates/cve-less/plugins/arabic-font-81f4538f2765df23f8b4f561b33039aa.yaml new file mode 100644 index 0000000000..5421da35d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arabic-font-81f4538f2765df23f8b4f561b33039aa.yaml @@ -0,0 +1,58 @@ +id: arabic-font-81f4538f2765df23f8b4f561b33039aa + +info: + name: > + Arabic Font <= 1.2 Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee2bbe3a-b1d2-4266-af55-35f60ac52733?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arabic-font/" + google-query: inurl:"/wp-content/plugins/arabic-font/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arabic-font,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arabic-font/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arabic-font" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/archives-calendar-widget-e83ff3d04c646c58cf810db301109219.yaml b/nuclei-templates/cve-less/plugins/archives-calendar-widget-e83ff3d04c646c58cf810db301109219.yaml new file mode 100644 index 0000000000..5f7fd52b74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/archives-calendar-widget-e83ff3d04c646c58cf810db301109219.yaml @@ -0,0 +1,58 @@ +id: archives-calendar-widget-e83ff3d04c646c58cf810db301109219 + +info: + name: > + Archives Calendar Widget <= 1.0.15 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ffd695b-33e3-49b6-ad3a-98b2a645f827?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/archives-calendar-widget/" + google-query: inurl:"/wp-content/plugins/archives-calendar-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,archives-calendar-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/archives-calendar-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "archives-calendar-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-1c50317ba4f62105b747a16f1bd9f458.yaml b/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-1c50317ba4f62105b747a16f1bd9f458.yaml new file mode 100644 index 0000000000..691804b0cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-1c50317ba4f62105b747a16f1bd9f458.yaml @@ -0,0 +1,58 @@ +id: archivist-custom-archive-templates-1c50317ba4f62105b747a16f1bd9f458 + +info: + name: > + Archivist – Custom Archive Templates <= 1.7.4 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90333dc7-8bdf-4a59-8001-7eb76b4bc61d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/archivist-custom-archive-templates/" + google-query: inurl:"/wp-content/plugins/archivist-custom-archive-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,archivist-custom-archive-templates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/archivist-custom-archive-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "archivist-custom-archive-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-63705f2cf5933c3d0b8cb680facff791.yaml b/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-63705f2cf5933c3d0b8cb680facff791.yaml new file mode 100644 index 0000000000..bb806d1e1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-63705f2cf5933c3d0b8cb680facff791.yaml @@ -0,0 +1,58 @@ +id: archivist-custom-archive-templates-63705f2cf5933c3d0b8cb680facff791 + +info: + name: > + Archivist – Custom Archive Templates <= 1.7.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e381ad7-efe6-48c4-af3a-22d01d73a065?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/archivist-custom-archive-templates/" + google-query: inurl:"/wp-content/plugins/archivist-custom-archive-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,archivist-custom-archive-templates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/archivist-custom-archive-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "archivist-custom-archive-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-8185273926919177675b90d12fcb9ed0.yaml b/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-8185273926919177675b90d12fcb9ed0.yaml new file mode 100644 index 0000000000..02a57ac073 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-8185273926919177675b90d12fcb9ed0.yaml @@ -0,0 +1,58 @@ +id: archivist-custom-archive-templates-8185273926919177675b90d12fcb9ed0 + +info: + name: > + Archivist – Custom Archive Templates <= 1.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e230f9f-5eda-4362-973b-ada9cf425697?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/archivist-custom-archive-templates/" + google-query: inurl:"/wp-content/plugins/archivist-custom-archive-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,archivist-custom-archive-templates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/archivist-custom-archive-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "archivist-custom-archive-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-97ba3b63c769d26efcad34ad353deecd.yaml b/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-97ba3b63c769d26efcad34ad353deecd.yaml new file mode 100644 index 0000000000..7630e51d14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/archivist-custom-archive-templates-97ba3b63c769d26efcad34ad353deecd.yaml @@ -0,0 +1,58 @@ +id: archivist-custom-archive-templates-97ba3b63c769d26efcad34ad353deecd + +info: + name: > + Archivist – Custom Archive Templates <= 1.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3f59671-0db2-4acf-8e97-a0ead518bebd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/archivist-custom-archive-templates/" + google-query: inurl:"/wp-content/plugins/archivist-custom-archive-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,archivist-custom-archive-templates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/archivist-custom-archive-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "archivist-custom-archive-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arconix-faq-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml b/nuclei-templates/cve-less/plugins/arconix-faq-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml new file mode 100644 index 0000000000..6abb12172c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arconix-faq-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml @@ -0,0 +1,58 @@ +id: arconix-faq-1fa3ecb606b6c8eedf4f6c369e031dd5 + +info: + name: > + Multiple Plugins by tychesoftwares <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a07d293-4c50-4be0-955f-b7c4a0eaef4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arconix-faq/" + google-query: inurl:"/wp-content/plugins/arconix-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arconix-faq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arconix-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arconix-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arconix-shortcodes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml b/nuclei-templates/cve-less/plugins/arconix-shortcodes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml new file mode 100644 index 0000000000..9344ec7206 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arconix-shortcodes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml @@ -0,0 +1,58 @@ +id: arconix-shortcodes-1fa3ecb606b6c8eedf4f6c369e031dd5 + +info: + name: > + Multiple Plugins by tychesoftwares <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a07d293-4c50-4be0-955f-b7c4a0eaef4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arconix-shortcodes/" + google-query: inurl:"/wp-content/plugins/arconix-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arconix-shortcodes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arconix-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arconix-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arconix-shortcodes-2638501c4f697eb3fd2442b86e278a44.yaml b/nuclei-templates/cve-less/plugins/arconix-shortcodes-2638501c4f697eb3fd2442b86e278a44.yaml new file mode 100644 index 0000000000..6856633a47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arconix-shortcodes-2638501c4f697eb3fd2442b86e278a44.yaml @@ -0,0 +1,58 @@ +id: arconix-shortcodes-2638501c4f697eb3fd2442b86e278a44 + +info: + name: > + Arconix Shortcodes <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7575e290-ad31-4c1b-9a89-eaa8b3eda6d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arconix-shortcodes/" + google-query: inurl:"/wp-content/plugins/arconix-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arconix-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arconix-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arconix-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-2a8ab0eb9e4b0b2a994e3256b1961375.yaml b/nuclei-templates/cve-less/plugins/arforms-2a8ab0eb9e4b0b2a994e3256b1961375.yaml new file mode 100644 index 0000000000..abcf5222d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-2a8ab0eb9e4b0b2a994e3256b1961375.yaml @@ -0,0 +1,58 @@ +id: arforms-2a8ab0eb9e4b0b2a994e3256b1961375 + +info: + name: > + ARForms <= 6.4 - Missing Authorization to Arbitrary File Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67cb10e4-5d42-464b-a24f-66811a5d0991?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms/" + google-query: inurl:"/wp-content/plugins/arforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-3e021672a349a4fa909b6c3fa423b85d.yaml b/nuclei-templates/cve-less/plugins/arforms-3e021672a349a4fa909b6c3fa423b85d.yaml new file mode 100644 index 0000000000..12ceb77322 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-3e021672a349a4fa909b6c3fa423b85d.yaml @@ -0,0 +1,58 @@ +id: arforms-3e021672a349a4fa909b6c3fa423b85d + +info: + name: > + ARForms <= 6.4 - Missing Authorization to Arbitrary Plugin Activation/Deactivation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5fba145-5cb6-4ea1-8691-6bad3dcfbcf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms/" + google-query: inurl:"/wp-content/plugins/arforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-7071343c33e807accfdddf119ab9779f.yaml b/nuclei-templates/cve-less/plugins/arforms-7071343c33e807accfdddf119ab9779f.yaml new file mode 100644 index 0000000000..4105315671 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-7071343c33e807accfdddf119ab9779f.yaml @@ -0,0 +1,58 @@ +id: arforms-7071343c33e807accfdddf119ab9779f + +info: + name: > + ARforms <= 6.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce16175a-c58e-4432-80de-7872216ae273?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms/" + google-query: inurl:"/wp-content/plugins/arforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-a0061c960a93fff2adc1360d0d280001.yaml b/nuclei-templates/cve-less/plugins/arforms-a0061c960a93fff2adc1360d0d280001.yaml new file mode 100644 index 0000000000..3b60513276 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-a0061c960a93fff2adc1360d0d280001.yaml @@ -0,0 +1,58 @@ +id: arforms-a0061c960a93fff2adc1360d0d280001 + +info: + name: > + ARforms <= 6.4 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2286e96-59e1-465a-b600-8a88e9e97418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms/" + google-query: inurl:"/wp-content/plugins/arforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-a84b96611f097506467644350038a82b.yaml b/nuclei-templates/cve-less/plugins/arforms-a84b96611f097506467644350038a82b.yaml new file mode 100644 index 0000000000..197087af2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-a84b96611f097506467644350038a82b.yaml @@ -0,0 +1,58 @@ +id: arforms-a84b96611f097506467644350038a82b + +info: + name: > + ARForms <= 6.4 - Missing Authorization to Arbitrary Option Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78c6c5ff-8658-4a3d-be01-2141d1cff8bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms/" + google-query: inurl:"/wp-content/plugins/arforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-form-builder-021b10291895f49c72c52c95a60965eb.yaml b/nuclei-templates/cve-less/plugins/arforms-form-builder-021b10291895f49c72c52c95a60965eb.yaml new file mode 100644 index 0000000000..5886c81e42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-form-builder-021b10291895f49c72c52c95a60965eb.yaml @@ -0,0 +1,58 @@ +id: arforms-form-builder-021b10291895f49c72c52c95a60965eb + +info: + name: > + Contact Form, Survey & Popup Form Plugin for WordPress – ARForms Form Builder < 1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27254411-3ae7-4659-b3c1-1c18911e3bfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms-form-builder/" + google-query: inurl:"/wp-content/plugins/arforms-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-form-builder-2b5549b3c83c7777a1b6e0311c345bd4.yaml b/nuclei-templates/cve-less/plugins/arforms-form-builder-2b5549b3c83c7777a1b6e0311c345bd4.yaml new file mode 100644 index 0000000000..7f29f6cc61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-form-builder-2b5549b3c83c7777a1b6e0311c345bd4.yaml @@ -0,0 +1,58 @@ +id: arforms-form-builder-2b5549b3c83c7777a1b6e0311c345bd4 + +info: + name: > + ARForms Form Builder <= 1.6.4 - Missing Authorization to Authenticated(Subscriber+) Arbitrary Option Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/026f8d9b-a66b-4a59-8375-fba587a4eef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms-form-builder/" + google-query: inurl:"/wp-content/plugins/arforms-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-form-builder-74c47f2edddbb589b4230d596bf5f1e4.yaml b/nuclei-templates/cve-less/plugins/arforms-form-builder-74c47f2edddbb589b4230d596bf5f1e4.yaml new file mode 100644 index 0000000000..638e9948b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-form-builder-74c47f2edddbb589b4230d596bf5f1e4.yaml @@ -0,0 +1,58 @@ +id: arforms-form-builder-74c47f2edddbb589b4230d596bf5f1e4 + +info: + name: > + ARForms Form Builder <= 1.6.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92bdf5c9-37ef-450a-874c-e21a60b03baa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms-form-builder/" + google-query: inurl:"/wp-content/plugins/arforms-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-form-builder-934adbeaa90ed24edd97e3a659c47938.yaml b/nuclei-templates/cve-less/plugins/arforms-form-builder-934adbeaa90ed24edd97e3a659c47938.yaml new file mode 100644 index 0000000000..0c18f4e5d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-form-builder-934adbeaa90ed24edd97e3a659c47938.yaml @@ -0,0 +1,58 @@ +id: arforms-form-builder-934adbeaa90ed24edd97e3a659c47938 + +info: + name: > + ARForms <= 1.5.8 - Unauthenticated Stored Cross-Site Scripting via arf_http_referrer_url + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e349cae-a996-4a32-807a-a98ebcb01edd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms-form-builder/" + google-query: inurl:"/wp-content/plugins/arforms-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-form-builder-b525a1e6aebd5326b1ab0e97e084de90.yaml b/nuclei-templates/cve-less/plugins/arforms-form-builder-b525a1e6aebd5326b1ab0e97e084de90.yaml new file mode 100644 index 0000000000..034bd9221f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-form-builder-b525a1e6aebd5326b1ab0e97e084de90.yaml @@ -0,0 +1,58 @@ +id: arforms-form-builder-b525a1e6aebd5326b1ab0e97e084de90 + +info: + name: > + ARforms <= 3.7.1 - Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9545cff3-fa65-4f2e-8a9f-98d884e5608f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms-form-builder/" + google-query: inurl:"/wp-content/plugins/arforms-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms-form-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-form-builder-b8f70793547b459fbbb5874a8a3de62b.yaml b/nuclei-templates/cve-less/plugins/arforms-form-builder-b8f70793547b459fbbb5874a8a3de62b.yaml new file mode 100644 index 0000000000..44cb538297 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-form-builder-b8f70793547b459fbbb5874a8a3de62b.yaml @@ -0,0 +1,58 @@ +id: arforms-form-builder-b8f70793547b459fbbb5874a8a3de62b + +info: + name: > + Repute ARForms <= 3.5.1 - Unauthenticated Arbitrary File Deletion via Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8f73f1e-8f0a-4c4c-aca2-c9ae9bc4f63d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms-form-builder/" + google-query: inurl:"/wp-content/plugins/arforms-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms-form-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-form-builder-bab973a9aab141bdb4381de471b4752a.yaml b/nuclei-templates/cve-less/plugins/arforms-form-builder-bab973a9aab141bdb4381de471b4752a.yaml new file mode 100644 index 0000000000..cfd602d363 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-form-builder-bab973a9aab141bdb4381de471b4752a.yaml @@ -0,0 +1,58 @@ +id: arforms-form-builder-bab973a9aab141bdb4381de471b4752a + +info: + name: > + ARForms Form Builder <= 1.5.6 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ee7b30f-9d06-421c-af30-f20b774d389e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms-form-builder/" + google-query: inurl:"/wp-content/plugins/arforms-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arforms-form-builder-d033cc97f1c7c8d9b5f748a688df721f.yaml b/nuclei-templates/cve-less/plugins/arforms-form-builder-d033cc97f1c7c8d9b5f748a688df721f.yaml new file mode 100644 index 0000000000..40a29faff4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arforms-form-builder-d033cc97f1c7c8d9b5f748a688df721f.yaml @@ -0,0 +1,58 @@ +id: arforms-form-builder-d033cc97f1c7c8d9b5f748a688df721f + +info: + name: > + ARForms Form Builder <= 1.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20d5ff9e-9920-47c7-aa8d-e4f9f1646080?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arforms-form-builder/" + google-query: inurl:"/wp-content/plugins/arforms-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arforms-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arforms-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arforms-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-adminer-e26e58963c45719b3e25492ec26bb785.yaml b/nuclei-templates/cve-less/plugins/ari-adminer-e26e58963c45719b3e25492ec26bb785.yaml new file mode 100644 index 0000000000..a34177c38d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-adminer-e26e58963c45719b3e25492ec26bb785.yaml @@ -0,0 +1,58 @@ +id: ari-adminer-e26e58963c45719b3e25492ec26bb785 + +info: + name: > + ARI-Adminer <= 1.1.14 - Missing Authorization and No Direct File Access Restrictions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67ad04d4-49ef-4bc4-b3b0-f2752566145e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-adminer/" + google-query: inurl:"/wp-content/plugins/ari-adminer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-adminer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-adminer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-adminer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-cf7-connector-09c79ac5dfe7a7e2777e5c3067dc8b55.yaml b/nuclei-templates/cve-less/plugins/ari-cf7-connector-09c79ac5dfe7a7e2777e5c3067dc8b55.yaml new file mode 100644 index 0000000000..2c4847b249 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-cf7-connector-09c79ac5dfe7a7e2777e5c3067dc8b55.yaml @@ -0,0 +1,58 @@ +id: ari-cf7-connector-09c79ac5dfe7a7e2777e5c3067dc8b55 + +info: + name: > + Contact Form 7 Connector <= 1.2.2 - Cross-Site Request Forgery to Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b437020c-31a3-413e-a1da-b4781da34f10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-cf7-connector/" + google-query: inurl:"/wp-content/plugins/ari-cf7-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-cf7-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-cf7-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-cf7-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-cf7-connector-38ba390551110addf63f2acef704b878.yaml b/nuclei-templates/cve-less/plugins/ari-cf7-connector-38ba390551110addf63f2acef704b878.yaml new file mode 100644 index 0000000000..7a1373830a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-cf7-connector-38ba390551110addf63f2acef704b878.yaml @@ -0,0 +1,58 @@ +id: ari-cf7-connector-38ba390551110addf63f2acef704b878 + +info: + name: > + Contact Form 7 Connector <= 1.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b74a5a4c-250a-46bc-bf08-2dd720de41ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-cf7-connector/" + google-query: inurl:"/wp-content/plugins/ari-cf7-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-cf7-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-cf7-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-cf7-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-cf7-connector-82cf044c6b5c43e07d092f3e03e58313.yaml b/nuclei-templates/cve-less/plugins/ari-cf7-connector-82cf044c6b5c43e07d092f3e03e58313.yaml new file mode 100644 index 0000000000..7934dfee6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-cf7-connector-82cf044c6b5c43e07d092f3e03e58313.yaml @@ -0,0 +1,58 @@ +id: ari-cf7-connector-82cf044c6b5c43e07d092f3e03e58313 + +info: + name: > + Contact Form 7 Connector <= 1.1.13 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d54788a-ebfd-4291-94f2-d220fbf9050a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-cf7-connector/" + google-query: inurl:"/wp-content/plugins/ari-cf7-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-cf7-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-cf7-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-cf7-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-fancy-lightbox-80735d78d7816d8ea105bb7f1037c875.yaml b/nuclei-templates/cve-less/plugins/ari-fancy-lightbox-80735d78d7816d8ea105bb7f1037c875.yaml new file mode 100644 index 0000000000..27e2f0f287 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-fancy-lightbox-80735d78d7816d8ea105bb7f1037c875.yaml @@ -0,0 +1,58 @@ +id: ari-fancy-lightbox-80735d78d7816d8ea105bb7f1037c875 + +info: + name: > + ARI Fancy Lightbox <= 1.3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bc0951e-8ada-4221-b154-101bad33a183?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-fancy-lightbox/" + google-query: inurl:"/wp-content/plugins/ari-fancy-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-fancy-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-fancy-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-fancy-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-stream-quiz-104becea74a63a5fb9c4e033385ae9cb.yaml b/nuclei-templates/cve-less/plugins/ari-stream-quiz-104becea74a63a5fb9c4e033385ae9cb.yaml new file mode 100644 index 0000000000..277e4010b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-stream-quiz-104becea74a63a5fb9c4e033385ae9cb.yaml @@ -0,0 +1,58 @@ +id: ari-stream-quiz-104becea74a63a5fb9c4e033385ae9cb + +info: + name: > + ARI Stream Quiz – WordPress Quizzes Builder <= 1.2.26 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdce01f2-7c79-4b1d-8da2-f6ce118856a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-stream-quiz/" + google-query: inurl:"/wp-content/plugins/ari-stream-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-stream-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-stream-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-stream-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-stream-quiz-3587db01a7a28244ee4173daa03a691b.yaml b/nuclei-templates/cve-less/plugins/ari-stream-quiz-3587db01a7a28244ee4173daa03a691b.yaml new file mode 100644 index 0000000000..3b0924649f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-stream-quiz-3587db01a7a28244ee4173daa03a691b.yaml @@ -0,0 +1,58 @@ +id: ari-stream-quiz-3587db01a7a28244ee4173daa03a691b + +info: + name: > + ARI Stream Quiz <= 1.3.2 - Authenticated(Contributor+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa6fc22e-0d30-4c4b-8c8d-13f04ed1aa7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-stream-quiz/" + google-query: inurl:"/wp-content/plugins/ari-stream-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-stream-quiz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-stream-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-stream-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-stream-quiz-6f4ecb36b96c9dd745bf20e36b1a7043.yaml b/nuclei-templates/cve-less/plugins/ari-stream-quiz-6f4ecb36b96c9dd745bf20e36b1a7043.yaml new file mode 100644 index 0000000000..21eb4a2a3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-stream-quiz-6f4ecb36b96c9dd745bf20e36b1a7043.yaml @@ -0,0 +1,58 @@ +id: ari-stream-quiz-6f4ecb36b96c9dd745bf20e36b1a7043 + +info: + name: > + ARI Stream Quiz <= 1.3.0 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36ad7fe2-0dc9-427d-811b-8fb1fdb78579?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-stream-quiz/" + google-query: inurl:"/wp-content/plugins/ari-stream-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-stream-quiz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-stream-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-stream-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-stream-quiz-83e77c7536580dfcf15705797ee936c4.yaml b/nuclei-templates/cve-less/plugins/ari-stream-quiz-83e77c7536580dfcf15705797ee936c4.yaml new file mode 100644 index 0000000000..3cfb53be66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-stream-quiz-83e77c7536580dfcf15705797ee936c4.yaml @@ -0,0 +1,58 @@ +id: ari-stream-quiz-83e77c7536580dfcf15705797ee936c4 + +info: + name: > + ARI Stream Quiz <= 1.2.32 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45180c8e-0625-4a21-b3a1-673abe52d78f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-stream-quiz/" + google-query: inurl:"/wp-content/plugins/ari-stream-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-stream-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-stream-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-stream-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-stream-quiz-9cc53a2c7c51eb8cc900a2d7b01bfc6a.yaml b/nuclei-templates/cve-less/plugins/ari-stream-quiz-9cc53a2c7c51eb8cc900a2d7b01bfc6a.yaml new file mode 100644 index 0000000000..8d1900f68a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-stream-quiz-9cc53a2c7c51eb8cc900a2d7b01bfc6a.yaml @@ -0,0 +1,58 @@ +id: ari-stream-quiz-9cc53a2c7c51eb8cc900a2d7b01bfc6a + +info: + name: > + ARI Stream Quiz <= 1.2.32 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6c5f933-b71b-4475-abdf-4cffff2a1a6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-stream-quiz/" + google-query: inurl:"/wp-content/plugins/ari-stream-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-stream-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-stream-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-stream-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-stream-quiz-a088cd6d5872bf40384c1e2afa0283ab.yaml b/nuclei-templates/cve-less/plugins/ari-stream-quiz-a088cd6d5872bf40384c1e2afa0283ab.yaml new file mode 100644 index 0000000000..ff2136decd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-stream-quiz-a088cd6d5872bf40384c1e2afa0283ab.yaml @@ -0,0 +1,58 @@ +id: ari-stream-quiz-a088cd6d5872bf40384c1e2afa0283ab + +info: + name: > + ARI Stream Quiz <= 1.2.32 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edb4f4b7-a59c-454b-82b5-d8e91c1c82a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-stream-quiz/" + google-query: inurl:"/wp-content/plugins/ari-stream-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-stream-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-stream-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-stream-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ari-stream-quiz-f630977977a8e3f3533623f6c0f7c890.yaml b/nuclei-templates/cve-less/plugins/ari-stream-quiz-f630977977a8e3f3533623f6c0f7c890.yaml new file mode 100644 index 0000000000..7b13a59e7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ari-stream-quiz-f630977977a8e3f3533623f6c0f7c890.yaml @@ -0,0 +1,58 @@ +id: ari-stream-quiz-f630977977a8e3f3533623f6c0f7c890 + +info: + name: > + ARI Stream Quiz <= 1.2.32 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b758c8a7-6220-4b54-af88-7933a530b5ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ari-stream-quiz/" + google-query: inurl:"/wp-content/plugins/ari-stream-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ari-stream-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ari-stream-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ari-stream-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ark-wysiwyg-comment-editor-2b16886725a873c1bee4cefe26c49349.yaml b/nuclei-templates/cve-less/plugins/ark-wysiwyg-comment-editor-2b16886725a873c1bee4cefe26c49349.yaml new file mode 100644 index 0000000000..6a5d769d68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ark-wysiwyg-comment-editor-2b16886725a873c1bee4cefe26c49349.yaml @@ -0,0 +1,58 @@ +id: ark-wysiwyg-comment-editor-2b16886725a873c1bee4cefe26c49349 + +info: + name: > + ark-commenteditor <= 2.15.6 - iframe Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a1179bc-6f8d-4223-a80b-9834adc08d3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ark-wysiwyg-comment-editor/" + google-query: inurl:"/wp-content/plugins/ark-wysiwyg-comment-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ark-wysiwyg-comment-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ark-wysiwyg-comment-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ark-wysiwyg-comment-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-3ca2d382a221d380504a5d9703316520.yaml b/nuclei-templates/cve-less/plugins/armember-3ca2d382a221d380504a5d9703316520.yaml new file mode 100644 index 0000000000..4db274c5ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-3ca2d382a221d380504a5d9703316520.yaml @@ -0,0 +1,58 @@ +id: armember-3ca2d382a221d380504a5d9703316520 + +info: + name: > + ARMember Premium <= 5.5.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8950b98d-7e7d-4cad-bb3d-d7a5d8edbdf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember/" + google-query: inurl:"/wp-content/plugins/armember/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-744209b23a7e6299f52186bba738be87.yaml b/nuclei-templates/cve-less/plugins/armember-744209b23a7e6299f52186bba738be87.yaml new file mode 100644 index 0000000000..65e73e0135 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-744209b23a7e6299f52186bba738be87.yaml @@ -0,0 +1,58 @@ +id: armember-744209b23a7e6299f52186bba738be87 + +info: + name: > + ARMember Premium <= 5.9.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4363600-666a-4a75-a817-4af679ab400c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember/" + google-query: inurl:"/wp-content/plugins/armember/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-0786d35a357f001d251a3bbf5eef2d35.yaml b/nuclei-templates/cve-less/plugins/armember-membership-0786d35a357f001d251a3bbf5eef2d35.yaml new file mode 100644 index 0000000000..3ad5fc2ab6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-0786d35a357f001d251a3bbf5eef2d35.yaml @@ -0,0 +1,58 @@ +id: armember-membership-0786d35a357f001d251a3bbf5eef2d35 + +info: + name: > + ARMember Lite - Membership Plugin <= 4.0.16 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1022ac4-869e-415a-a7c8-3650421608ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-12b01b43b57b8f272157206cf06dc3ef.yaml b/nuclei-templates/cve-less/plugins/armember-membership-12b01b43b57b8f272157206cf06dc3ef.yaml new file mode 100644 index 0000000000..23b6ed23aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-12b01b43b57b8f272157206cf06dc3ef.yaml @@ -0,0 +1,58 @@ +id: armember-membership-12b01b43b57b8f272157206cf06dc3ef + +info: + name: > + ARMember <= 4.0.10 - Authenticated(Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c681d1ac-a5d0-43f2-a1e4-0684cd56a3b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-2c4f92f87bb9ef6f0a1e7c033135ace0.yaml b/nuclei-templates/cve-less/plugins/armember-membership-2c4f92f87bb9ef6f0a1e7c033135ace0.yaml new file mode 100644 index 0000000000..fecbf18a29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-2c4f92f87bb9ef6f0a1e7c033135ace0.yaml @@ -0,0 +1,58 @@ +id: armember-membership-2c4f92f87bb9ef6f0a1e7c033135ace0 + +info: + name: > + ARMember <= 4.0.24 - Improper Access Control to Sensitive Information Exposure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4e6718-4e1e-44ce-8463-860f0d3d80f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-41830c974de1f3419028654a94a429d1.yaml b/nuclei-templates/cve-less/plugins/armember-membership-41830c974de1f3419028654a94a429d1.yaml new file mode 100644 index 0000000000..259ef7ff3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-41830c974de1f3419028654a94a429d1.yaml @@ -0,0 +1,58 @@ +id: armember-membership-41830c974de1f3419028654a94a429d1 + +info: + name: > + ARMember <= 4.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa2ed43b-cd8f-4d09-8576-d215c835a684?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-4c834bc5fa8008630a55b72e056da47e.yaml b/nuclei-templates/cve-less/plugins/armember-membership-4c834bc5fa8008630a55b72e056da47e.yaml new file mode 100644 index 0000000000..9c9ecd0b6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-4c834bc5fa8008630a55b72e056da47e.yaml @@ -0,0 +1,58 @@ +id: armember-membership-4c834bc5fa8008630a55b72e056da47e + +info: + name: > + ARMember <= 4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd22babc-f1a9-4f50-9756-fe692105dca3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-52377d1fb17ba651463be55fa1b78765.yaml b/nuclei-templates/cve-less/plugins/armember-membership-52377d1fb17ba651463be55fa1b78765.yaml new file mode 100644 index 0000000000..061fffc78a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-52377d1fb17ba651463be55fa1b78765.yaml @@ -0,0 +1,58 @@ +id: armember-membership-52377d1fb17ba651463be55fa1b78765 + +info: + name: > + ARMember <= 4.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42f5f29b-2d83-4b15-82aa-0598f8a2317b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-6cb8297a956ab7d71fae8eaf17eed227.yaml b/nuclei-templates/cve-less/plugins/armember-membership-6cb8297a956ab7d71fae8eaf17eed227.yaml new file mode 100644 index 0000000000..6776a450cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-6cb8297a956ab7d71fae8eaf17eed227.yaml @@ -0,0 +1,58 @@ +id: armember-membership-6cb8297a956ab7d71fae8eaf17eed227 + +info: + name: > + ARMember <= 4.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae865f91-4c2a-4a6b-84a8-bd45c1febdb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-77d3a7baf2067b9573aef8e72c5d2033.yaml b/nuclei-templates/cve-less/plugins/armember-membership-77d3a7baf2067b9573aef8e72c5d2033.yaml new file mode 100644 index 0000000000..7e30fe07e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-77d3a7baf2067b9573aef8e72c5d2033.yaml @@ -0,0 +1,58 @@ +id: armember-membership-77d3a7baf2067b9573aef8e72c5d2033 + +info: + name: > + ARMember <= 4.0.23 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d55b210f-bbed-4206-a109-99f217a2eb67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-928dd303af6c4624ef6e7653fba246d7.yaml b/nuclei-templates/cve-less/plugins/armember-membership-928dd303af6c4624ef6e7653fba246d7.yaml new file mode 100644 index 0000000000..dabbac9536 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-928dd303af6c4624ef6e7653fba246d7.yaml @@ -0,0 +1,58 @@ +id: armember-membership-928dd303af6c4624ef6e7653fba246d7 + +info: + name: > + ARMember <= 3.4.11 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ff230b0-c186-41fc-93a5-2ed90e8aab4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-9650322438fb16b52c4432ecc521bf68.yaml b/nuclei-templates/cve-less/plugins/armember-membership-9650322438fb16b52c4432ecc521bf68.yaml new file mode 100644 index 0000000000..86b5ed57f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-9650322438fb16b52c4432ecc521bf68.yaml @@ -0,0 +1,58 @@ +id: armember-membership-9650322438fb16b52c4432ecc521bf68 + +info: + name: > + ARMember <= 4.0.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88907f28-7b1d-4a5a-b846-67dfd21d6488?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-9b5e7b374f6bba66c7565c0c933eb6f5.yaml b/nuclei-templates/cve-less/plugins/armember-membership-9b5e7b374f6bba66c7565c0c933eb6f5.yaml new file mode 100644 index 0000000000..dee3e0045c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-9b5e7b374f6bba66c7565c0c933eb6f5.yaml @@ -0,0 +1,58 @@ +id: armember-membership-9b5e7b374f6bba66c7565c0c933eb6f5 + +info: + name: > + ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup <= 4.0.26 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4252c092-1276-4f69-88f9-cf78799c725c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-a85248fb3ba2da0688167185e0c87249.yaml b/nuclei-templates/cve-less/plugins/armember-membership-a85248fb3ba2da0688167185e0c87249.yaml new file mode 100644 index 0000000000..94f67b0e0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-a85248fb3ba2da0688167185e0c87249.yaml @@ -0,0 +1,58 @@ +id: armember-membership-a85248fb3ba2da0688167185e0c87249 + +info: + name: > + ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup <= 4.0.30 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80d113aa-7401-4b58-a755-f64146d9fb08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-ab42ec9d60829884112a87fe093b6c61.yaml b/nuclei-templates/cve-less/plugins/armember-membership-ab42ec9d60829884112a87fe093b6c61.yaml new file mode 100644 index 0000000000..04c5adc39f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-ab42ec9d60829884112a87fe093b6c61.yaml @@ -0,0 +1,58 @@ +id: armember-membership-ab42ec9d60829884112a87fe093b6c61 + +info: + name: > + ARMember <= 4.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/668d4bd3-adde-4347-9169-67c3c96e1743?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-cb6fa6f6958986304e8bc18c130022ba.yaml b/nuclei-templates/cve-less/plugins/armember-membership-cb6fa6f6958986304e8bc18c130022ba.yaml new file mode 100644 index 0000000000..3c9c94e70e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-cb6fa6f6958986304e8bc18c130022ba.yaml @@ -0,0 +1,58 @@ +id: armember-membership-cb6fa6f6958986304e8bc18c130022ba + +info: + name: > + ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup <= 4.0.28 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb4487e3-4276-4a7e-bf6f-e8ec49bb29f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-df79548a0cacba87c7dd01e5f2d614e3.yaml b/nuclei-templates/cve-less/plugins/armember-membership-df79548a0cacba87c7dd01e5f2d614e3.yaml new file mode 100644 index 0000000000..91a937a65b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-df79548a0cacba87c7dd01e5f2d614e3.yaml @@ -0,0 +1,58 @@ +id: armember-membership-df79548a0cacba87c7dd01e5f2d614e3 + +info: + name: > + ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup <= 3.4.7 -Authentication Bypass via Password Reset Weakness + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9831ebf6-a6a6-4495-8cda-969c7d7d3a6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-e36fdcdf09b5a64eac64f879dc48947d.yaml b/nuclei-templates/cve-less/plugins/armember-membership-e36fdcdf09b5a64eac64f879dc48947d.yaml new file mode 100644 index 0000000000..dd89ad9814 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-e36fdcdf09b5a64eac64f879dc48947d.yaml @@ -0,0 +1,58 @@ +id: armember-membership-e36fdcdf09b5a64eac64f879dc48947d + +info: + name: > + ARMember <= 3.4.10 - Missing Access Control leading to Authenticated (Subscriber+) Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b128fa23-090e-4449-9202-a1db572e242d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-f134a30b8e43bd6402d66fadc73e7004.yaml b/nuclei-templates/cve-less/plugins/armember-membership-f134a30b8e43bd6402d66fadc73e7004.yaml new file mode 100644 index 0000000000..76044cf768 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-f134a30b8e43bd6402d66fadc73e7004.yaml @@ -0,0 +1,58 @@ +id: armember-membership-f134a30b8e43bd6402d66fadc73e7004 + +info: + name: > + ARMember <= 4.0.27 - Directory Traversal via X-FILENAME + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c8734f5-4d23-454d-bf00-6e9d36982098?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/armember-membership-fe13beada39d84f2847878b7d4da45e8.yaml b/nuclei-templates/cve-less/plugins/armember-membership-fe13beada39d84f2847878b7d4da45e8.yaml new file mode 100644 index 0000000000..8b6185f737 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/armember-membership-fe13beada39d84f2847878b7d4da45e8.yaml @@ -0,0 +1,58 @@ +id: armember-membership-fe13beada39d84f2847878b7d4da45e8 + +info: + name: > + ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup <= 4.0.26 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a59f7a1b-ae58-4015-bb77-814707579847?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/armember-membership/" + google-query: inurl:"/wp-content/plugins/armember-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,armember-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/armember-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "armember-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arprice-responsive-pricing-table-79efca326c7a11854304313bbb2dcff3.yaml b/nuclei-templates/cve-less/plugins/arprice-responsive-pricing-table-79efca326c7a11854304313bbb2dcff3.yaml new file mode 100644 index 0000000000..2a6864c4cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arprice-responsive-pricing-table-79efca326c7a11854304313bbb2dcff3.yaml @@ -0,0 +1,58 @@ +id: arprice-responsive-pricing-table-79efca326c7a11854304313bbb2dcff3 + +info: + name: > + Pricing Table Plugin <= 3.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91286dc8-8015-4adc-9a21-d6187997cef4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arprice-responsive-pricing-table/" + google-query: inurl:"/wp-content/plugins/arprice-responsive-pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arprice-responsive-pricing-table,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arprice-responsive-pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arprice-responsive-pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arprice-responsive-pricing-table-a7def05240ca9e7abb72b7c9c9771694.yaml b/nuclei-templates/cve-less/plugins/arprice-responsive-pricing-table-a7def05240ca9e7abb72b7c9c9771694.yaml new file mode 100644 index 0000000000..2eb6ecda5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arprice-responsive-pricing-table-a7def05240ca9e7abb72b7c9c9771694.yaml @@ -0,0 +1,58 @@ +id: arprice-responsive-pricing-table-a7def05240ca9e7abb72b7c9c9771694 + +info: + name: > + Pricing Table Plugin - < 2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f21f757b-43f8-4371-886c-b9f7fd79c715?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arprice-responsive-pricing-table/" + google-query: inurl:"/wp-content/plugins/arprice-responsive-pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arprice-responsive-pricing-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arprice-responsive-pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arprice-responsive-pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/arscode-ninja-popups-a719159263b63e2be06c98fecd13de77.yaml b/nuclei-templates/cve-less/plugins/arscode-ninja-popups-a719159263b63e2be06c98fecd13de77.yaml new file mode 100644 index 0000000000..28ba22ea68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/arscode-ninja-popups-a719159263b63e2be06c98fecd13de77.yaml @@ -0,0 +1,58 @@ +id: arscode-ninja-popups-a719159263b63e2be06c98fecd13de77 + +info: + name: > + Ninja Popups <= 4.7.5 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7977fbfd-9864-4883-955e-3d5646763b1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/arscode-ninja-popups/" + google-query: inurl:"/wp-content/plugins/arscode-ninja-popups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,arscode-ninja-popups,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/arscode-ninja-popups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arscode-ninja-popups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/art-decoration-shortcode-6866d09139386202bbed5983be370086.yaml b/nuclei-templates/cve-less/plugins/art-decoration-shortcode-6866d09139386202bbed5983be370086.yaml new file mode 100644 index 0000000000..133b02e035 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/art-decoration-shortcode-6866d09139386202bbed5983be370086.yaml @@ -0,0 +1,58 @@ +id: art-decoration-shortcode-6866d09139386202bbed5983be370086 + +info: + name: > + Art Decoration Shortcode <= 1.5.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b974e9e-9897-400c-b145-dc8a2d54b553?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/art-decoration-shortcode/" + google-query: inurl:"/wp-content/plugins/art-decoration-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,art-decoration-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/art-decoration-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "art-decoration-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/art-direction-47deea3f06e73d1d92fa8e2918f9b61e.yaml b/nuclei-templates/cve-less/plugins/art-direction-47deea3f06e73d1d92fa8e2918f9b61e.yaml new file mode 100644 index 0000000000..4bfdff195e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/art-direction-47deea3f06e73d1d92fa8e2918f9b61e.yaml @@ -0,0 +1,58 @@ +id: art-direction-47deea3f06e73d1d92fa8e2918f9b61e + +info: + name: > + Art Direction <= 0.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31a145d5-3c0c-436f-a1ee-afff14ef2140?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/art-direction/" + google-query: inurl:"/wp-content/plugins/art-direction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,art-direction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/art-direction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "art-direction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/artibot-a33517bbb57428ced1cfd6968a2c3a6b.yaml b/nuclei-templates/cve-less/plugins/artibot-a33517bbb57428ced1cfd6968a2c3a6b.yaml new file mode 100644 index 0000000000..be389fea3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/artibot-a33517bbb57428ced1cfd6968a2c3a6b.yaml @@ -0,0 +1,58 @@ +id: artibot-a33517bbb57428ced1cfd6968a2c3a6b + +info: + name: > + ArtiBot Free Chat Bot for WordPress WebSites <= 1.1.6 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/450d0748-93d6-448a-97a2-06fc2f8065b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/artibot/" + google-query: inurl:"/wp-content/plugins/artibot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,artibot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/artibot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "artibot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/artibot-a516963ffdc1c41b00bc8d54c0948a03.yaml b/nuclei-templates/cve-less/plugins/artibot-a516963ffdc1c41b00bc8d54c0948a03.yaml new file mode 100644 index 0000000000..15b7bae5f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/artibot-a516963ffdc1c41b00bc8d54c0948a03.yaml @@ -0,0 +1,58 @@ +id: artibot-a516963ffdc1c41b00bc8d54c0948a03 + +info: + name: > + ArtiBot Free Chat Bot for WordPress WebSites <= 1.1.6 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/848f36de-c62a-45ee-b259-46dab73e4439?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/artibot/" + google-query: inurl:"/wp-content/plugins/artibot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,artibot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/artibot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "artibot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/article-analytics-727442235b3241daec9b8505f42a54a7.yaml b/nuclei-templates/cve-less/plugins/article-analytics-727442235b3241daec9b8505f42a54a7.yaml new file mode 100644 index 0000000000..8c7a68da0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/article-analytics-727442235b3241daec9b8505f42a54a7.yaml @@ -0,0 +1,58 @@ +id: article-analytics-727442235b3241daec9b8505f42a54a7 + +info: + name: > + Article Analytics <= 1.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6abbdecd-782a-44a2-981a-ae6caa50dd6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/article-analytics/" + google-query: inurl:"/wp-content/plugins/article-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,article-analytics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/article-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "article-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/article-directory-6ee3ff55725bf2e5894fc0e814f92fd5.yaml b/nuclei-templates/cve-less/plugins/article-directory-6ee3ff55725bf2e5894fc0e814f92fd5.yaml new file mode 100644 index 0000000000..00f09977b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/article-directory-6ee3ff55725bf2e5894fc0e814f92fd5.yaml @@ -0,0 +1,58 @@ +id: article-directory-6ee3ff55725bf2e5894fc0e814f92fd5 + +info: + name: > + Article Directory <= 1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'publish_terms_text' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a219a232-5ff4-4855-8f29-437ed26b4f34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/article-directory/" + google-query: inurl:"/wp-content/plugins/article-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,article-directory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/article-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "article-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/article-directory-redux-bab2d740e6550ac0744f9a04322bcfe9.yaml b/nuclei-templates/cve-less/plugins/article-directory-redux-bab2d740e6550ac0744f9a04322bcfe9.yaml new file mode 100644 index 0000000000..3e3f380547 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/article-directory-redux-bab2d740e6550ac0744f9a04322bcfe9.yaml @@ -0,0 +1,58 @@ +id: article-directory-redux-bab2d740e6550ac0744f9a04322bcfe9 + +info: + name: > + Article Directory Redux <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63c681e5-3110-4790-a075-4996fa1f2129?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/article-directory-redux/" + google-query: inurl:"/wp-content/plugins/article-directory-redux/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,article-directory-redux,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/article-directory-redux/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "article-directory-redux" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/article2pdf-32331c436a25ac1de1bf5da05cd58308.yaml b/nuclei-templates/cve-less/plugins/article2pdf-32331c436a25ac1de1bf5da05cd58308.yaml new file mode 100644 index 0000000000..bce07f2bf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/article2pdf-32331c436a25ac1de1bf5da05cd58308.yaml @@ -0,0 +1,58 @@ +id: article2pdf-32331c436a25ac1de1bf5da05cd58308 + +info: + name: > + article2pdf 0.24 - 0.27 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0af80be2-b80b-4a25-9df6-a8ae75ad9cdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/article2pdf/" + google-query: inurl:"/wp-content/plugins/article2pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,article2pdf,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/article2pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "article2pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/article2pdf-bc30f477415f000a25c8cf2e28a66988.yaml b/nuclei-templates/cve-less/plugins/article2pdf-bc30f477415f000a25c8cf2e28a66988.yaml new file mode 100644 index 0000000000..640e890269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/article2pdf-bc30f477415f000a25c8cf2e28a66988.yaml @@ -0,0 +1,58 @@ +id: article2pdf-bc30f477415f000a25c8cf2e28a66988 + +info: + name: > + article2pdf <= 0.27 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09fc8d80-8231-4183-9626-c90f4fee5eb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/article2pdf/" + google-query: inurl:"/wp-content/plugins/article2pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,article2pdf,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/article2pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "article2pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/artplacer-widget-ab0a99467dd011ce171b426da9ac5ab8.yaml b/nuclei-templates/cve-less/plugins/artplacer-widget-ab0a99467dd011ce171b426da9ac5ab8.yaml new file mode 100644 index 0000000000..e6dd8490f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/artplacer-widget-ab0a99467dd011ce171b426da9ac5ab8.yaml @@ -0,0 +1,58 @@ +id: artplacer-widget-ab0a99467dd011ce171b426da9ac5ab8 + +info: + name: > + ArtPlacer Widget <= 2.20.6 - Authenticated (Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bff3a160-5238-4478-ab11-3300cac51cf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/artplacer-widget/" + google-query: inurl:"/wp-content/plugins/artplacer-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,artplacer-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/artplacer-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "artplacer-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aruba-hispeed-cache-44de9a2461187be18ff94240ec7b0927.yaml b/nuclei-templates/cve-less/plugins/aruba-hispeed-cache-44de9a2461187be18ff94240ec7b0927.yaml new file mode 100644 index 0000000000..65ce5e920a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aruba-hispeed-cache-44de9a2461187be18ff94240ec7b0927.yaml @@ -0,0 +1,58 @@ +id: aruba-hispeed-cache-44de9a2461187be18ff94240ec7b0927 + +info: + name: > + Aruba HiSpeed Cache <= 2.0.6 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7391dd8c-0170-48c6-8451-9e7a00e268d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aruba-hispeed-cache/" + google-query: inurl:"/wp-content/plugins/aruba-hispeed-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aruba-hispeed-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aruba-hispeed-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aruba-hispeed-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aryo-activity-log-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml b/nuclei-templates/cve-less/plugins/aryo-activity-log-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml new file mode 100644 index 0000000000..63efa167b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aryo-activity-log-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml @@ -0,0 +1,58 @@ +id: aryo-activity-log-55d5b1ab7109cbfd7cdac31ba9a767d2 + +info: + name: > + Activity Log <= 2.4.0 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21614b80-f632-466b-9612-f616bbbc267d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aryo-activity-log/" + google-query: inurl:"/wp-content/plugins/aryo-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aryo-activity-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aryo-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aryo-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aryo-activity-log-70da5885a2f28e43c5e9331e1fdeb92b.yaml b/nuclei-templates/cve-less/plugins/aryo-activity-log-70da5885a2f28e43c5e9331e1fdeb92b.yaml new file mode 100644 index 0000000000..38afeaaac7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aryo-activity-log-70da5885a2f28e43c5e9331e1fdeb92b.yaml @@ -0,0 +1,58 @@ +id: aryo-activity-log-70da5885a2f28e43c5e9331e1fdeb92b + +info: + name: > + Activity Log <= 2.8.3 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/506e4f47-e292-4d19-a7bb-b87d752f4007?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aryo-activity-log/" + google-query: inurl:"/wp-content/plugins/aryo-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aryo-activity-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aryo-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aryo-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aryo-activity-log-7e4338ffecef779ba0a29a7607305ac9.yaml b/nuclei-templates/cve-less/plugins/aryo-activity-log-7e4338ffecef779ba0a29a7607305ac9.yaml new file mode 100644 index 0000000000..1e11f9fb71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aryo-activity-log-7e4338ffecef779ba0a29a7607305ac9.yaml @@ -0,0 +1,58 @@ +id: aryo-activity-log-7e4338ffecef779ba0a29a7607305ac9 + +info: + name: > + Activity Log Plugin < 2.0.4 - Fulle Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97677968-9231-4a6b-ad81-ddb9eb9791dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aryo-activity-log/" + google-query: inurl:"/wp-content/plugins/aryo-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aryo-activity-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aryo-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aryo-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aryo-activity-log-8bb2281b07179f11fd172e832ab240af.yaml b/nuclei-templates/cve-less/plugins/aryo-activity-log-8bb2281b07179f11fd172e832ab240af.yaml new file mode 100644 index 0000000000..4bc090aff7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aryo-activity-log-8bb2281b07179f11fd172e832ab240af.yaml @@ -0,0 +1,58 @@ +id: aryo-activity-log-8bb2281b07179f11fd172e832ab240af + +info: + name: > + Activity Log <= 2.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/633a9cbf-451d-4fd1-822b-ef8966ff9a1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aryo-activity-log/" + google-query: inurl:"/wp-content/plugins/aryo-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aryo-activity-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aryo-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aryo-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aryo-activity-log-be27c4b6992c035b340ec769cdb51351.yaml b/nuclei-templates/cve-less/plugins/aryo-activity-log-be27c4b6992c035b340ec769cdb51351.yaml new file mode 100644 index 0000000000..df797d6655 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aryo-activity-log-be27c4b6992c035b340ec769cdb51351.yaml @@ -0,0 +1,58 @@ +id: aryo-activity-log-be27c4b6992c035b340ec769cdb51351 + +info: + name: > + Activity Log < 2.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ad45c7b-63d2-42ae-a7cf-2d60c6c4ae1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aryo-activity-log/" + google-query: inurl:"/wp-content/plugins/aryo-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aryo-activity-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aryo-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aryo-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aryo-activity-log-d4d7a04a467c657c90f622b79da37f85.yaml b/nuclei-templates/cve-less/plugins/aryo-activity-log-d4d7a04a467c657c90f622b79da37f85.yaml new file mode 100644 index 0000000000..ed0bc8ed4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aryo-activity-log-d4d7a04a467c657c90f622b79da37f85.yaml @@ -0,0 +1,58 @@ +id: aryo-activity-log-d4d7a04a467c657c90f622b79da37f85 + +info: + name: > + Activity Log <= 2.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/218f08d5-c1cb-462c-abc5-d5b41044f8aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aryo-activity-log/" + google-query: inurl:"/wp-content/plugins/aryo-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aryo-activity-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aryo-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aryo-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aryo-activity-log-e186fa859c9eb38cc8ef0cb73e6a43b4.yaml b/nuclei-templates/cve-less/plugins/aryo-activity-log-e186fa859c9eb38cc8ef0cb73e6a43b4.yaml new file mode 100644 index 0000000000..7683fb37c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aryo-activity-log-e186fa859c9eb38cc8ef0cb73e6a43b4.yaml @@ -0,0 +1,58 @@ +id: aryo-activity-log-e186fa859c9eb38cc8ef0cb73e6a43b4 + +info: + name: > + Activity Log 2.3.5 - 2.6.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a94229a-6316-48e7-bcaa-23cb2cc047b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aryo-activity-log/" + google-query: inurl:"/wp-content/plugins/aryo-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aryo-activity-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aryo-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aryo-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.3.5', '<= 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aryo-activity-log-e2708e282bb00df5e2bc3a4493f5868c.yaml b/nuclei-templates/cve-less/plugins/aryo-activity-log-e2708e282bb00df5e2bc3a4493f5868c.yaml new file mode 100644 index 0000000000..ae87778fc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aryo-activity-log-e2708e282bb00df5e2bc3a4493f5868c.yaml @@ -0,0 +1,58 @@ +id: aryo-activity-log-e2708e282bb00df5e2bc3a4493f5868c + +info: + name: > + Activity Log <= 2.8.7 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de821236-f878-46a4-9265-bcf6e8661910?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aryo-activity-log/" + google-query: inurl:"/wp-content/plugins/aryo-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aryo-activity-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aryo-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aryo-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/as-create-pinterest-pinboard-pages-d1f3834e2f95aaed2e601e83a20e5d59.yaml b/nuclei-templates/cve-less/plugins/as-create-pinterest-pinboard-pages-d1f3834e2f95aaed2e601e83a20e5d59.yaml new file mode 100644 index 0000000000..1a8bed506f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/as-create-pinterest-pinboard-pages-d1f3834e2f95aaed2e601e83a20e5d59.yaml @@ -0,0 +1,58 @@ +id: as-create-pinterest-pinboard-pages-d1f3834e2f95aaed2e601e83a20e5d59 + +info: + name: > + AS – Create Pinterest Pinboard Pages <= 1.0 - Authenticated Options Change to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02e8a576-bf00-4da9-9795-bd6b22bb0b19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/as-create-pinterest-pinboard-pages/" + google-query: inurl:"/wp-content/plugins/as-create-pinterest-pinboard-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,as-create-pinterest-pinboard-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/as-create-pinterest-pinboard-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "as-create-pinterest-pinboard-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asf-allow-svg-files-6b99b25706bc10b6938889b6d61c2c79.yaml b/nuclei-templates/cve-less/plugins/asf-allow-svg-files-6b99b25706bc10b6938889b6d61c2c79.yaml new file mode 100644 index 0000000000..a41a64bb9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asf-allow-svg-files-6b99b25706bc10b6938889b6d61c2c79.yaml @@ -0,0 +1,58 @@ +id: asf-allow-svg-files-6b99b25706bc10b6938889b6d61c2c79 + +info: + name: > + Allow SVG Files <= 1.1 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce57a3eb-a71b-4335-9e6c-52648ce00062?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asf-allow-svg-files/" + google-query: inurl:"/wp-content/plugins/asf-allow-svg-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asf-allow-svg-files,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asf-allow-svg-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asf-allow-svg-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asf-allow-svg-files-f31b01af0e36d70ece981a2da79389f8.yaml b/nuclei-templates/cve-less/plugins/asf-allow-svg-files-f31b01af0e36d70ece981a2da79389f8.yaml new file mode 100644 index 0000000000..60d45e44ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asf-allow-svg-files-f31b01af0e36d70ece981a2da79389f8.yaml @@ -0,0 +1,58 @@ +id: asf-allow-svg-files-f31b01af0e36d70ece981a2da79389f8 + +info: + name: > + Allow SVG Files <= 1.0 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e89b33e-fc3c-44e9-823c-e9349147acf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asf-allow-svg-files/" + google-query: inurl:"/wp-content/plugins/asf-allow-svg-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asf-allow-svg-files,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asf-allow-svg-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asf-allow-svg-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asgaros-forum-253ae1868772845aa5a363aeb4a8d859.yaml b/nuclei-templates/cve-less/plugins/asgaros-forum-253ae1868772845aa5a363aeb4a8d859.yaml new file mode 100644 index 0000000000..53d72ed741 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asgaros-forum-253ae1868772845aa5a363aeb4a8d859.yaml @@ -0,0 +1,58 @@ +id: asgaros-forum-253ae1868772845aa5a363aeb4a8d859 + +info: + name: > + Asgaros Forum <= 2.8.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/146b4d69-70bc-4843-b76c-d91de0cefc9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asgaros-forum/" + google-query: inurl:"/wp-content/plugins/asgaros-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asgaros-forum,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asgaros-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asgaros-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asgaros-forum-488a5177633c5d61ff8bef1899fcdb13.yaml b/nuclei-templates/cve-less/plugins/asgaros-forum-488a5177633c5d61ff8bef1899fcdb13.yaml new file mode 100644 index 0000000000..954fbb8b10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asgaros-forum-488a5177633c5d61ff8bef1899fcdb13.yaml @@ -0,0 +1,58 @@ +id: asgaros-forum-488a5177633c5d61ff8bef1899fcdb13 + +info: + name: > + Asgaros Forum <= 2.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3aecc02a-fd49-4743-9d7b-894cf657cbc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asgaros-forum/" + google-query: inurl:"/wp-content/plugins/asgaros-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asgaros-forum,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asgaros-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asgaros-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asgaros-forum-536f8f709fcfc0e34ccf2b79f3c436d7.yaml b/nuclei-templates/cve-less/plugins/asgaros-forum-536f8f709fcfc0e34ccf2b79f3c436d7.yaml new file mode 100644 index 0000000000..31489eaf07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asgaros-forum-536f8f709fcfc0e34ccf2b79f3c436d7.yaml @@ -0,0 +1,58 @@ +id: asgaros-forum-536f8f709fcfc0e34ccf2b79f3c436d7 + +info: + name: > + Asgaros Forums <= 1.15.13 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d39ae72-7d45-4ca9-9de1-8532ec5e043d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asgaros-forum/" + google-query: inurl:"/wp-content/plugins/asgaros-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asgaros-forum,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asgaros-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asgaros-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asgaros-forum-6584898d6200cc68ea0f9c1ee82648c2.yaml b/nuclei-templates/cve-less/plugins/asgaros-forum-6584898d6200cc68ea0f9c1ee82648c2.yaml new file mode 100644 index 0000000000..9f1440fe76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asgaros-forum-6584898d6200cc68ea0f9c1ee82648c2.yaml @@ -0,0 +1,58 @@ +id: asgaros-forum-6584898d6200cc68ea0f9c1ee82648c2 + +info: + name: > + Asgaros Forum <= 1.15.12 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0eae9c5a-8a11-4293-a7e1-2c5d77c75284?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asgaros-forum/" + google-query: inurl:"/wp-content/plugins/asgaros-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asgaros-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asgaros-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asgaros-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asgaros-forum-9f49ea16b14f6c2511df8453564cbeeb.yaml b/nuclei-templates/cve-less/plugins/asgaros-forum-9f49ea16b14f6c2511df8453564cbeeb.yaml new file mode 100644 index 0000000000..16ae838fb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asgaros-forum-9f49ea16b14f6c2511df8453564cbeeb.yaml @@ -0,0 +1,58 @@ +id: asgaros-forum-9f49ea16b14f6c2511df8453564cbeeb + +info: + name: > + Asgaros Forum <= 2.7.0 - Insufficient Authorization to Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63b472fb-c853-4e56-b34c-3cf986c4cf80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asgaros-forum/" + google-query: inurl:"/wp-content/plugins/asgaros-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asgaros-forum,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asgaros-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asgaros-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asgaros-forum-d214d99e51223f558d7540a78be5f43a.yaml b/nuclei-templates/cve-less/plugins/asgaros-forum-d214d99e51223f558d7540a78be5f43a.yaml new file mode 100644 index 0000000000..dbec1b0161 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asgaros-forum-d214d99e51223f558d7540a78be5f43a.yaml @@ -0,0 +1,58 @@ +id: asgaros-forum-d214d99e51223f558d7540a78be5f43a + +info: + name: > + Asgaros Forum <= 1.15.14 - Admin+ SQL Injection via forum_id + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cffaa829-3eee-4390-b3c0-5c0f04ff9e8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asgaros-forum/" + google-query: inurl:"/wp-content/plugins/asgaros-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asgaros-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asgaros-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asgaros-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asgaros-forum-d9dc418339bf1c25423bb7e18f222c8e.yaml b/nuclei-templates/cve-less/plugins/asgaros-forum-d9dc418339bf1c25423bb7e18f222c8e.yaml new file mode 100644 index 0000000000..6f90ed53f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asgaros-forum-d9dc418339bf1c25423bb7e18f222c8e.yaml @@ -0,0 +1,58 @@ +id: asgaros-forum-d9dc418339bf1c25423bb7e18f222c8e + +info: + name: > + Asgaros Forum < 2.0.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6d4e207-9751-4c97-b004-e97c69af81dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asgaros-forum/" + google-query: inurl:"/wp-content/plugins/asgaros-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asgaros-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asgaros-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asgaros-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asgaros-forum-eb11a26c1af4959f22b43b7df59cd527.yaml b/nuclei-templates/cve-less/plugins/asgaros-forum-eb11a26c1af4959f22b43b7df59cd527.yaml new file mode 100644 index 0000000000..a4ac11aafa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asgaros-forum-eb11a26c1af4959f22b43b7df59cd527.yaml @@ -0,0 +1,58 @@ +id: asgaros-forum-eb11a26c1af4959f22b43b7df59cd527 + +info: + name: > + Asgaros Forum <= 2.7.2 - Unauthenticated PHP Object Injection in prepare_unread_status + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02b75034-8db1-465b-837e-014e2c2e8b4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asgaros-forum/" + google-query: inurl:"/wp-content/plugins/asgaros-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asgaros-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asgaros-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asgaros-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ashe-extra-c4ac8ff1dfd268623baae850718c4ab2.yaml b/nuclei-templates/cve-less/plugins/ashe-extra-c4ac8ff1dfd268623baae850718c4ab2.yaml new file mode 100644 index 0000000000..857db36fa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ashe-extra-c4ac8ff1dfd268623baae850718c4ab2.yaml @@ -0,0 +1,58 @@ +id: ashe-extra-c4ac8ff1dfd268623baae850718c4ab2 + +info: + name: > + Ashe Extra <= 1.2.9 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09551d22-c8c2-435c-9d00-bb4833497c16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ashe-extra/" + google-query: inurl:"/wp-content/plugins/ashe-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ashe-extra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ashe-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ashe-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/askapache-firefox-adsense-3ee736065c571005f3aa44af407146c3.yaml b/nuclei-templates/cve-less/plugins/askapache-firefox-adsense-3ee736065c571005f3aa44af407146c3.yaml new file mode 100644 index 0000000000..d549ba1304 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/askapache-firefox-adsense-3ee736065c571005f3aa44af407146c3.yaml @@ -0,0 +1,58 @@ +id: askapache-firefox-adsense-3ee736065c571005f3aa44af407146c3 + +info: + name: > + AskApache Firefox Adsense <= 3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57d863b9-d544-4af5-afbe-268635a8dd98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/askapache-firefox-adsense/" + google-query: inurl:"/wp-content/plugins/askapache-firefox-adsense/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,askapache-firefox-adsense,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/askapache-firefox-adsense/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "askapache-firefox-adsense" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asmember-caf355595af5171fa75c6b8b0c04dfb1.yaml b/nuclei-templates/cve-less/plugins/asmember-caf355595af5171fa75c6b8b0c04dfb1.yaml new file mode 100644 index 0000000000..9a0ec3e3c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asmember-caf355595af5171fa75c6b8b0c04dfb1.yaml @@ -0,0 +1,58 @@ +id: asmember-caf355595af5171fa75c6b8b0c04dfb1 + +info: + name: > + asMember <= 1.5.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c70bb3d6-6acd-46b2-8e47-30be031f73e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asmember/" + google-query: inurl:"/wp-content/plugins/asmember/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asmember,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asmember/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asmember" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aspose-cloud-ebook-generator-2dc16b0147ac9503c18f0e957af766f8.yaml b/nuclei-templates/cve-less/plugins/aspose-cloud-ebook-generator-2dc16b0147ac9503c18f0e957af766f8.yaml new file mode 100644 index 0000000000..7132847d12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aspose-cloud-ebook-generator-2dc16b0147ac9503c18f0e957af766f8.yaml @@ -0,0 +1,58 @@ +id: aspose-cloud-ebook-generator-2dc16b0147ac9503c18f0e957af766f8 + +info: + name: > + Aspose Cloud eBook Generator <= 1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abb41236-d711-41d3-a1cd-2c23467e269a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aspose-cloud-ebook-generator/" + google-query: inurl:"/wp-content/plugins/aspose-cloud-ebook-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aspose-cloud-ebook-generator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aspose-cloud-ebook-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aspose-cloud-ebook-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aspose-doc-exporter-5012da2be4de20cb472aea0abf71670b.yaml b/nuclei-templates/cve-less/plugins/aspose-doc-exporter-5012da2be4de20cb472aea0abf71670b.yaml new file mode 100644 index 0000000000..7c400228fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aspose-doc-exporter-5012da2be4de20cb472aea0abf71670b.yaml @@ -0,0 +1,58 @@ +id: aspose-doc-exporter-5012da2be4de20cb472aea0abf71670b + +info: + name: > + Aspose.Words Exporter <= 6.3.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ced42ce-2009-45f6-81c0-ad9e5a05b381?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aspose-doc-exporter/" + google-query: inurl:"/wp-content/plugins/aspose-doc-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aspose-doc-exporter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aspose-doc-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aspose-doc-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aspose-doc-exporter-615972550ac1ea7b975135922dc13fb0.yaml b/nuclei-templates/cve-less/plugins/aspose-doc-exporter-615972550ac1ea7b975135922dc13fb0.yaml new file mode 100644 index 0000000000..90d022c5f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aspose-doc-exporter-615972550ac1ea7b975135922dc13fb0.yaml @@ -0,0 +1,58 @@ +id: aspose-doc-exporter-615972550ac1ea7b975135922dc13fb0 + +info: + name: > + Aspose.Words – Import and Export word documents < 2.0 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4beafd91-1b89-484b-8053-b1bffdaf163a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aspose-doc-exporter/" + google-query: inurl:"/wp-content/plugins/aspose-doc-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aspose-doc-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aspose-doc-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aspose-doc-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aspose-importer-exporter-f96d2d362df935e9372a6bebea47626c.yaml b/nuclei-templates/cve-less/plugins/aspose-importer-exporter-f96d2d362df935e9372a6bebea47626c.yaml new file mode 100644 index 0000000000..6e9f2c8f4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aspose-importer-exporter-f96d2d362df935e9372a6bebea47626c.yaml @@ -0,0 +1,58 @@ +id: aspose-importer-exporter-f96d2d362df935e9372a6bebea47626c + +info: + name: > + Aspose Importer & Exporter (Discontinued) < 3.0 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b605027a-4d65-4bfe-9daa-5b2f88811bc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aspose-importer-exporter/" + google-query: inurl:"/wp-content/plugins/aspose-importer-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aspose-importer-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aspose-importer-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aspose-importer-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aspose-pdf-exporter-cb307b5a36222abf7cd21b8d59667e63.yaml b/nuclei-templates/cve-less/plugins/aspose-pdf-exporter-cb307b5a36222abf7cd21b8d59667e63.yaml new file mode 100644 index 0000000000..12949ca82c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aspose-pdf-exporter-cb307b5a36222abf7cd21b8d59667e63.yaml @@ -0,0 +1,58 @@ +id: aspose-pdf-exporter-cb307b5a36222abf7cd21b8d59667e63 + +info: + name: > + Aspose.PDF Exporter < 2.0 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a87bbfe-8cf5-4bba-90bc-902071b72bca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aspose-pdf-exporter/" + google-query: inurl:"/wp-content/plugins/aspose-pdf-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aspose-pdf-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aspose-pdf-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aspose-pdf-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/asset-manager-0e47f60cc879dad43442c621e6d5bb62.yaml b/nuclei-templates/cve-less/plugins/asset-manager-0e47f60cc879dad43442c621e6d5bb62.yaml new file mode 100644 index 0000000000..21a1d3da4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/asset-manager-0e47f60cc879dad43442c621e6d5bb62.yaml @@ -0,0 +1,58 @@ +id: asset-manager-0e47f60cc879dad43442c621e6d5bb62 + +info: + name: > + Asset Manager <= 0.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f203f30c-998b-4719-9268-0a78e1dc84be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/asset-manager/" + google-query: inurl:"/wp-content/plugins/asset-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,asset-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/asset-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "asset-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/assistant-aa77d870ecb6d6f531eb842d8f66fa4d.yaml b/nuclei-templates/cve-less/plugins/assistant-aa77d870ecb6d6f531eb842d8f66fa4d.yaml new file mode 100644 index 0000000000..6b19e85ed9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/assistant-aa77d870ecb6d6f531eb842d8f66fa4d.yaml @@ -0,0 +1,58 @@ +id: assistant-aa77d870ecb6d6f531eb842d8f66fa4d + +info: + name: > + Assistant – Every Day Productivity Apps <= 1.4.9.1 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b5a3655-067f-4ef1-baf5-2bbc9719a8cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/assistant/" + google-query: inurl:"/wp-content/plugins/assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,assistant,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/assistant-c365c40f61838d38a40469cd2e67b28b.yaml b/nuclei-templates/cve-less/plugins/assistant-c365c40f61838d38a40469cd2e67b28b.yaml new file mode 100644 index 0000000000..c0cc0acc92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/assistant-c365c40f61838d38a40469cd2e67b28b.yaml @@ -0,0 +1,58 @@ +id: assistant-c365c40f61838d38a40469cd2e67b28b + +info: + name: > + Assistant <= 1.4.3 - Authenticated (Editor+) Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d5ed6cf-ae12-4da5-809f-6a8c61eeb4f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/assistant/" + google-query: inurl:"/wp-content/plugins/assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,assistant,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-addon-1ab112c9db0961813049d1b450f4b178.yaml b/nuclei-templates/cve-less/plugins/astra-addon-1ab112c9db0961813049d1b450f4b178.yaml new file mode 100644 index 0000000000..a809127033 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-addon-1ab112c9db0961813049d1b450f4b178.yaml @@ -0,0 +1,58 @@ +id: astra-addon-1ab112c9db0961813049d1b450f4b178 + +info: + name: > + Astra Pro Addon <= 3.5.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec3dd825-bee3-4d09-bc98-aff665988641?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-addon/" + google-query: inurl:"/wp-content/plugins/astra-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-addon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-addon-349353b08ad0d6204581635fb97a9527.yaml b/nuclei-templates/cve-less/plugins/astra-addon-349353b08ad0d6204581635fb97a9527.yaml new file mode 100644 index 0000000000..f4eea6aa69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-addon-349353b08ad0d6204581635fb97a9527.yaml @@ -0,0 +1,58 @@ +id: astra-addon-349353b08ad0d6204581635fb97a9527 + +info: + name: > + Astra Pro <= 4.3.1 - Authenticated(Contributor+) Remote Code Execution via Metabox + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9769bc3-236f-4c9d-a4ce-544e49eee2ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-addon/" + google-query: inurl:"/wp-content/plugins/astra-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-addon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-bulk-edit-3e0d971821f286a488f83631df3f9e8f.yaml b/nuclei-templates/cve-less/plugins/astra-bulk-edit-3e0d971821f286a488f83631df3f9e8f.yaml new file mode 100644 index 0000000000..769a588174 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-bulk-edit-3e0d971821f286a488f83631df3f9e8f.yaml @@ -0,0 +1,58 @@ +id: astra-bulk-edit-3e0d971821f286a488f83631df3f9e8f + +info: + name: > + Astra Bulk Edit <= 1.2.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2548d5b0-1f1a-4847-a5ea-e3bb6f7a5013?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-bulk-edit/" + google-query: inurl:"/wp-content/plugins/astra-bulk-edit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-bulk-edit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-bulk-edit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-bulk-edit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-import-export-d974f8d1ecb932f30e0efce7f2789451.yaml b/nuclei-templates/cve-less/plugins/astra-import-export-d974f8d1ecb932f30e0efce7f2789451.yaml new file mode 100644 index 0000000000..9b82afaa05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-import-export-d974f8d1ecb932f30e0efce7f2789451.yaml @@ -0,0 +1,58 @@ +id: astra-import-export-d974f8d1ecb932f30e0efce7f2789451 + +info: + name: > + Import / Export Customizer Settings <= 1.0.3 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/194face3-36ac-4137-af9a-0b98f60e3afb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-import-export/" + google-query: inurl:"/wp-content/plugins/astra-import-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-import-export,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-import-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-import-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-pro-sites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml b/nuclei-templates/cve-less/plugins/astra-pro-sites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml new file mode 100644 index 0000000000..900b80b826 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-pro-sites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml @@ -0,0 +1,58 @@ +id: astra-pro-sites-27ee53c7765f3cc7ca36cbf7ac963e20 + +info: + name: > + Starter Templates <= 3.2.5 - Incorrect Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd78e52-f20d-42be-8f68-3d09d5abf837?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-pro-sites/" + google-query: inurl:"/wp-content/plugins/astra-pro-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-pro-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-pro-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-pro-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-pro-sites-53fb886a588d15854380c3b94bdeab19.yaml b/nuclei-templates/cve-less/plugins/astra-pro-sites-53fb886a588d15854380c3b94bdeab19.yaml new file mode 100644 index 0000000000..d83f9393da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-pro-sites-53fb886a588d15854380c3b94bdeab19.yaml @@ -0,0 +1,58 @@ +id: astra-pro-sites-53fb886a588d15854380c3b94bdeab19 + +info: + name: > + Starter Templates <= 3.2.4 - Authenticated (Contributor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0bdbba-2b67-42b9-8c26-115d472aed0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-pro-sites/" + google-query: inurl:"/wp-content/plugins/astra-pro-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-pro-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-pro-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-pro-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-sites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml b/nuclei-templates/cve-less/plugins/astra-sites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml new file mode 100644 index 0000000000..4457c1bdc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-sites-27ee53c7765f3cc7ca36cbf7ac963e20.yaml @@ -0,0 +1,58 @@ +id: astra-sites-27ee53c7765f3cc7ca36cbf7ac963e20 + +info: + name: > + Starter Templates <= 3.2.5 - Incorrect Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd78e52-f20d-42be-8f68-3d09d5abf837?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-sites/" + google-query: inurl:"/wp-content/plugins/astra-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-sites-53fb886a588d15854380c3b94bdeab19.yaml b/nuclei-templates/cve-less/plugins/astra-sites-53fb886a588d15854380c3b94bdeab19.yaml new file mode 100644 index 0000000000..9f114594bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-sites-53fb886a588d15854380c3b94bdeab19.yaml @@ -0,0 +1,58 @@ +id: astra-sites-53fb886a588d15854380c3b94bdeab19 + +info: + name: > + Starter Templates <= 3.2.4 - Authenticated (Contributor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0bdbba-2b67-42b9-8c26-115d472aed0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-sites/" + google-query: inurl:"/wp-content/plugins/astra-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-sites-9449b2c65db0c3fbbcb51d4c753869a4.yaml b/nuclei-templates/cve-less/plugins/astra-sites-9449b2c65db0c3fbbcb51d4c753869a4.yaml new file mode 100644 index 0000000000..a68dfb2bed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-sites-9449b2c65db0c3fbbcb51d4c753869a4.yaml @@ -0,0 +1,58 @@ +id: astra-sites-9449b2c65db0c3fbbcb51d4c753869a4 + +info: + name: > + Starter Templates — Elementor, WordPress & Beaver Builder Templates <= 4.1.6 - Authenticated (Contributor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf5075f9-9658-4a09-bd38-34a72f6560f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-sites/" + google-query: inurl:"/wp-content/plugins/astra-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-sites-b7edfb498be50e4270697b56ff65997c.yaml b/nuclei-templates/cve-less/plugins/astra-sites-b7edfb498be50e4270697b56ff65997c.yaml new file mode 100644 index 0000000000..57e6e2e60a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-sites-b7edfb498be50e4270697b56ff65997c.yaml @@ -0,0 +1,58 @@ +id: astra-sites-b7edfb498be50e4270697b56ff65997c + +info: + name: > + Starter Templates — Elementor, WordPress & Beaver Builder Templates <= 4.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25edb9e8-65ea-41d1-a95f-09be110ec1d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-sites/" + google-query: inurl:"/wp-content/plugins/astra-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-sites,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-sites-dfeeecb3cd427fc07ce343314d55c42c.yaml b/nuclei-templates/cve-less/plugins/astra-sites-dfeeecb3cd427fc07ce343314d55c42c.yaml new file mode 100644 index 0000000000..0f659b82a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-sites-dfeeecb3cd427fc07ce343314d55c42c.yaml @@ -0,0 +1,58 @@ +id: astra-sites-dfeeecb3cd427fc07ce343314d55c42c + +info: + name: > + Starter Templates — Elementor, Gutenberg & Beaver Builder Templates <= 2.7.0 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf4f3f5e-28f7-492c-9d54-4826826bd904?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-sites/" + google-query: inurl:"/wp-content/plugins/astra-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-sites,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/astra-sites-ead0c2fc6bfbbdd6a858fbe0610f5c02.yaml b/nuclei-templates/cve-less/plugins/astra-sites-ead0c2fc6bfbbdd6a858fbe0610f5c02.yaml new file mode 100644 index 0000000000..c2a4d446f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/astra-sites-ead0c2fc6bfbbdd6a858fbe0610f5c02.yaml @@ -0,0 +1,58 @@ +id: astra-sites-ead0c2fc6bfbbdd6a858fbe0610f5c02 + +info: + name: > + Starter Templates — Elementor, WordPress & Beaver Builder Templates <= 3.1.20 - Cross-Site Request Forgery in add_to_favorite + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/568545a4-7f73-4050-9724-d47279c340c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/astra-sites/" + google-query: inurl:"/wp-content/plugins/astra-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,astra-sites,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/astra-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/async-javascript-1487ac20915c63a985fc090bb178b2a8.yaml b/nuclei-templates/cve-less/plugins/async-javascript-1487ac20915c63a985fc090bb178b2a8.yaml new file mode 100644 index 0000000000..b2b42e34f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/async-javascript-1487ac20915c63a985fc090bb178b2a8.yaml @@ -0,0 +1,58 @@ +id: async-javascript-1487ac20915c63a985fc090bb178b2a8 + +info: + name: > + Async JavaScript <= 2.19.07.14 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b133888c-7673-4796-917c-486bff1b6b12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/async-javascript/" + google-query: inurl:"/wp-content/plugins/async-javascript/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,async-javascript,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/async-javascript/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "async-javascript" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.02.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/async-javascript-3a24ca5d79101db2344acd5815fa20cf.yaml b/nuclei-templates/cve-less/plugins/async-javascript-3a24ca5d79101db2344acd5815fa20cf.yaml new file mode 100644 index 0000000000..4d3e5f8c75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/async-javascript-3a24ca5d79101db2344acd5815fa20cf.yaml @@ -0,0 +1,58 @@ +id: async-javascript-3a24ca5d79101db2344acd5815fa20cf + +info: + name: > + Async Javascript <= 2.20.12.09 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0586453-76ec-4ec9-9965-780af7cb31ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/async-javascript/" + google-query: inurl:"/wp-content/plugins/async-javascript/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,async-javascript,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/async-javascript/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "async-javascript" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.12.09') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-70c6c7a80871c323a0d41da757459072.yaml b/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-70c6c7a80871c323a0d41da757459072.yaml new file mode 100644 index 0000000000..5f4b008a48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-70c6c7a80871c323a0d41da757459072.yaml @@ -0,0 +1,58 @@ +id: atarim-visual-collaboration-70c6c7a80871c323a0d41da757459072 + +info: + name: > + Atarim <= 3.9.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc26ce1b-2427-4320-8363-f635ea02aece?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/atarim-visual-collaboration/" + google-query: inurl:"/wp-content/plugins/atarim-visual-collaboration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,atarim-visual-collaboration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/atarim-visual-collaboration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "atarim-visual-collaboration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-79139d2e0a7eb5022bea3408ba7847f1.yaml b/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-79139d2e0a7eb5022bea3408ba7847f1.yaml new file mode 100644 index 0000000000..730cac486e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-79139d2e0a7eb5022bea3408ba7847f1.yaml @@ -0,0 +1,58 @@ +id: atarim-visual-collaboration-79139d2e0a7eb5022bea3408ba7847f1 + +info: + name: > + Atarim - Client Interface <= 3.9.1 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15f3a6e1-6126-4825-b2b1-e40dc5694f43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/atarim-visual-collaboration/" + google-query: inurl:"/wp-content/plugins/atarim-visual-collaboration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,atarim-visual-collaboration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/atarim-visual-collaboration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "atarim-visual-collaboration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-b5350d73ee034ae7067ab3d2b696ae06.yaml b/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-b5350d73ee034ae7067ab3d2b696ae06.yaml new file mode 100644 index 0000000000..dbdad90237 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/atarim-visual-collaboration-b5350d73ee034ae7067ab3d2b696ae06.yaml @@ -0,0 +1,58 @@ +id: atarim-visual-collaboration-b5350d73ee034ae7067ab3d2b696ae06 + +info: + name: > + Atarim <= 3.12 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f5919eb-ac74-4926-9ede-e651bb4463b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/atarim-visual-collaboration/" + google-query: inurl:"/wp-content/plugins/atarim-visual-collaboration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,atarim-visual-collaboration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/atarim-visual-collaboration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "atarim-visual-collaboration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/athlon-manage-calameo-publications-98d9cd4d13fec25657ca94210605c694.yaml b/nuclei-templates/cve-less/plugins/athlon-manage-calameo-publications-98d9cd4d13fec25657ca94210605c694.yaml new file mode 100644 index 0000000000..356ff9e34c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/athlon-manage-calameo-publications-98d9cd4d13fec25657ca94210605c694.yaml @@ -0,0 +1,58 @@ +id: athlon-manage-calameo-publications-98d9cd4d13fec25657ca94210605c694 + +info: + name: > + Manage Calameo Publications by Athlon < 1.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf2f2474-50d6-46da-a97c-731edb514ae5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/athlon-manage-calameo-publications/" + google-query: inurl:"/wp-content/plugins/athlon-manage-calameo-publications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,athlon-manage-calameo-publications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/athlon-manage-calameo-publications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "athlon-manage-calameo-publications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/atlas-knowledge-base-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/atlas-knowledge-base-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..48ca36cee0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/atlas-knowledge-base-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: atlas-knowledge-base-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/atlas-knowledge-base/" + google-query: inurl:"/wp-content/plugins/atlas-knowledge-base/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,atlas-knowledge-base,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/atlas-knowledge-base/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "atlas-knowledge-base" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/atomchat-f021a9b99ee30b184dab1f6f57a36751.yaml b/nuclei-templates/cve-less/plugins/atomchat-f021a9b99ee30b184dab1f6f57a36751.yaml new file mode 100644 index 0000000000..fb909a8595 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/atomchat-f021a9b99ee30b184dab1f6f57a36751.yaml @@ -0,0 +1,58 @@ +id: atomchat-f021a9b99ee30b184dab1f6f57a36751 + +info: + name: > + AtomChat <= 1.1.4 - Missing Authorization via credits REST API Endpoint + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21f917a4-efee-421b-98b1-a9b18c7527d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/atomchat/" + google-query: inurl:"/wp-content/plugins/atomchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,atomchat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/atomchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "atomchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/attendance-manager-b68d1df69fccd4a3fd0f7eef890ed158.yaml b/nuclei-templates/cve-less/plugins/attendance-manager-b68d1df69fccd4a3fd0f7eef890ed158.yaml new file mode 100644 index 0000000000..cf766cc555 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/attendance-manager-b68d1df69fccd4a3fd0f7eef890ed158.yaml @@ -0,0 +1,58 @@ +id: attendance-manager-b68d1df69fccd4a3fd0f7eef890ed158 + +info: + name: > + Attendance Manager <= 0.5.6 - Cross-site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d7440ae-f939-478c-8861-57020537dd44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/attendance-manager/" + google-query: inurl:"/wp-content/plugins/attendance-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,attendance-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/attendance-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "attendance-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/attendance-manager-c52de35daf5b13bbf0e8777d574ea5fc.yaml b/nuclei-templates/cve-less/plugins/attendance-manager-c52de35daf5b13bbf0e8777d574ea5fc.yaml new file mode 100644 index 0000000000..89baec6b8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/attendance-manager-c52de35daf5b13bbf0e8777d574ea5fc.yaml @@ -0,0 +1,58 @@ +id: attendance-manager-c52de35daf5b13bbf0e8777d574ea5fc + +info: + name: > + Attendance Manager <= 0.5.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc221b37-565d-41e4-874c-06015753045f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/attendance-manager/" + google-query: inurl:"/wp-content/plugins/attendance-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,attendance-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/attendance-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "attendance-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/attesa-extra-76e71bc12b464dcb30907399a9d0eccf.yaml b/nuclei-templates/cve-less/plugins/attesa-extra-76e71bc12b464dcb30907399a9d0eccf.yaml new file mode 100644 index 0000000000..e71334af0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/attesa-extra-76e71bc12b464dcb30907399a9d0eccf.yaml @@ -0,0 +1,58 @@ +id: attesa-extra-76e71bc12b464dcb30907399a9d0eccf + +info: + name: > + Attesa Extra <= 1.3.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c33d972f-921b-4b93-a20d-f3f7f6cbd3d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/attesa-extra/" + google-query: inurl:"/wp-content/plugins/attesa-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,attesa-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/attesa-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "attesa-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auctionplugin-47d9c553f76b1db5bf988e755d7f727b.yaml b/nuclei-templates/cve-less/plugins/auctionplugin-47d9c553f76b1db5bf988e755d7f727b.yaml new file mode 100644 index 0000000000..d5a51a0851 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auctionplugin-47d9c553f76b1db5bf988e755d7f727b.yaml @@ -0,0 +1,58 @@ +id: auctionplugin-47d9c553f76b1db5bf988e755d7f727b + +info: + name: > + Woocommerce Wordpress Auctions <= 2.0.1.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b5bdeb8-d5ee-4e30-8aaf-88893abf4145?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auctionPlugin/" + google-query: inurl:"/wp-content/plugins/auctionPlugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auctionPlugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auctionPlugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auctionPlugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/audio-and-video-player-9585db3736e35b2828063fe3229af0e9.yaml b/nuclei-templates/cve-less/plugins/audio-and-video-player-9585db3736e35b2828063fe3229af0e9.yaml new file mode 100644 index 0000000000..b54ca964ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/audio-and-video-player-9585db3736e35b2828063fe3229af0e9.yaml @@ -0,0 +1,58 @@ +id: audio-and-video-player-9585db3736e35b2828063fe3229af0e9 + +info: + name: > + CP Media Player <= 1.1.3 - Cross-Site Request Forgery to Player Deletion and Duplication + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ced380a5-04a6-40c1-a731-0d3b929e4428?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/audio-and-video-player/" + google-query: inurl:"/wp-content/plugins/audio-and-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,audio-and-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/audio-and-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "audio-and-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/audio-d78d8916b5f5bd711472247cd8557306.yaml b/nuclei-templates/cve-less/plugins/audio-d78d8916b5f5bd711472247cd8557306.yaml new file mode 100644 index 0000000000..f8818690d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/audio-d78d8916b5f5bd711472247cd8557306.yaml @@ -0,0 +1,58 @@ +id: audio-d78d8916b5f5bd711472247cd8557306 + +info: + name: > + Audio <= 0.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65329e2c-0ce2-4033-93a8-ba52ae3774c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/audio/" + google-query: inurl:"/wp-content/plugins/audio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,audio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/audio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "audio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/audio-merchant-07cf727b65166fc33c537ed10a4a1542.yaml b/nuclei-templates/cve-less/plugins/audio-merchant-07cf727b65166fc33c537ed10a4a1542.yaml new file mode 100644 index 0000000000..75ebad1e65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/audio-merchant-07cf727b65166fc33c537ed10a4a1542.yaml @@ -0,0 +1,58 @@ +id: audio-merchant-07cf727b65166fc33c537ed10a4a1542 + +info: + name: > + Audio Merchant <= 5.0.4 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06513dfe-f263-48b7-ba01-2c205247095b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/audio-merchant/" + google-query: inurl:"/wp-content/plugins/audio-merchant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,audio-merchant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/audio-merchant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "audio-merchant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/audio-merchant-40a88180b6759feac8abef362a1880e9.yaml b/nuclei-templates/cve-less/plugins/audio-merchant-40a88180b6759feac8abef362a1880e9.yaml new file mode 100644 index 0000000000..f84c987628 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/audio-merchant-40a88180b6759feac8abef362a1880e9.yaml @@ -0,0 +1,58 @@ +id: audio-merchant-40a88180b6759feac8abef362a1880e9 + +info: + name: > + Audio Merchant <= 5.0.4 - Cross-Site Request Forgery to Settings Modifcation and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7911337-57fa-4268-8366-d37ff13fae86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/audio-merchant/" + google-query: inurl:"/wp-content/plugins/audio-merchant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,audio-merchant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/audio-merchant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "audio-merchant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/audio-player-c346700edac77f8ba964672619183f58.yaml b/nuclei-templates/cve-less/plugins/audio-player-c346700edac77f8ba964672619183f58.yaml new file mode 100644 index 0000000000..53d629bad9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/audio-player-c346700edac77f8ba964672619183f58.yaml @@ -0,0 +1,58 @@ +id: audio-player-c346700edac77f8ba964672619183f58 + +info: + name: > + Audio Player <= 2.0.4.5 - Cross-Site Scripting via playerID Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b70b152-eb65-4273-8063-37cfec7ecefb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/audio-player/" + google-query: inurl:"/wp-content/plugins/audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,audio-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/audio-player-with-playlist-ultimate-4a822bfcb4b13bd5154ea0a206a03b5b.yaml b/nuclei-templates/cve-less/plugins/audio-player-with-playlist-ultimate-4a822bfcb4b13bd5154ea0a206a03b5b.yaml new file mode 100644 index 0000000000..223f847ab4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/audio-player-with-playlist-ultimate-4a822bfcb4b13bd5154ea0a206a03b5b.yaml @@ -0,0 +1,58 @@ +id: audio-player-with-playlist-ultimate-4a822bfcb4b13bd5154ea0a206a03b5b + +info: + name: > + Audio Player with Playlist Ultimate <= 1.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7a877d3-69b2-427b-9b5c-fb3ca93b4c09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/audio-player-with-playlist-ultimate/" + google-query: inurl:"/wp-content/plugins/audio-player-with-playlist-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,audio-player-with-playlist-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/audio-player-with-playlist-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "audio-player-with-playlist-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/audio-record-d64db224cd3df0f0072f2a058012253c.yaml b/nuclei-templates/cve-less/plugins/audio-record-d64db224cd3df0f0072f2a058012253c.yaml new file mode 100644 index 0000000000..46f7898a7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/audio-record-d64db224cd3df0f0072f2a058012253c.yaml @@ -0,0 +1,58 @@ +id: audio-record-d64db224cd3df0f0072f2a058012253c + +info: + name: > + Audio Record <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a7f869d-e915-4048-b0e1-36cf25e732f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/audio-record/" + google-query: inurl:"/wp-content/plugins/audio-record/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,audio-record,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/audio-record/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "audio-record" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/audio-video-download-buttons-for-youtube-bb4857408fb36340cc11efff0d796ba5.yaml b/nuclei-templates/cve-less/plugins/audio-video-download-buttons-for-youtube-bb4857408fb36340cc11efff0d796ba5.yaml new file mode 100644 index 0000000000..42f6eeed2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/audio-video-download-buttons-for-youtube-bb4857408fb36340cc11efff0d796ba5.yaml @@ -0,0 +1,58 @@ +id: audio-video-download-buttons-for-youtube-bb4857408fb36340cc11efff0d796ba5 + +info: + name: > + Download buttons for Youtube videos <= 1.03 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66bca09b-7f53-4e7a-a58c-a28ad6a4825e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/audio-video-download-buttons-for-youtube/" + google-query: inurl:"/wp-content/plugins/audio-video-download-buttons-for-youtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,audio-video-download-buttons-for-youtube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/audio-video-download-buttons-for-youtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "audio-video-download-buttons-for-youtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/augmented-reality-5d2387c9183cf43d10d61fd017f20663.yaml b/nuclei-templates/cve-less/plugins/augmented-reality-5d2387c9183cf43d10d61fd017f20663.yaml new file mode 100644 index 0000000000..3052310fb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/augmented-reality-5d2387c9183cf43d10d61fd017f20663.yaml @@ -0,0 +1,58 @@ +id: augmented-reality-5d2387c9183cf43d10d61fd017f20663 + +info: + name: > + Augmented reality plugin <= 1.2.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a96c9047-9dea-4bc7-8982-8983930f7cfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/augmented-reality/" + google-query: inurl:"/wp-content/plugins/augmented-reality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,augmented-reality,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/augmented-reality/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "augmented-reality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auth0-03670bf85bbf904a0e4e7a4b5e5a3b85.yaml b/nuclei-templates/cve-less/plugins/auth0-03670bf85bbf904a0e4e7a4b5e5a3b85.yaml new file mode 100644 index 0000000000..f08233ad21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auth0-03670bf85bbf904a0e4e7a4b5e5a3b85.yaml @@ -0,0 +1,58 @@ +id: auth0-03670bf85bbf904a0e4e7a4b5e5a3b85 + +info: + name: > + Login by Auth0 <= 3.11.3 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30532dc1-5d40-4585-abd2-c08ed0682d72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auth0/" + google-query: inurl:"/wp-content/plugins/auth0/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auth0,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auth0/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auth0" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auth0-2b0533cd6930889b564dac0001232de1.yaml b/nuclei-templates/cve-less/plugins/auth0-2b0533cd6930889b564dac0001232de1.yaml new file mode 100644 index 0000000000..302102ecce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auth0-2b0533cd6930889b564dac0001232de1.yaml @@ -0,0 +1,58 @@ +id: auth0-2b0533cd6930889b564dac0001232de1 + +info: + name: > + Login by Auth0 <= 3.11.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecf36533-1dd1-43d7-b12e-7b425c13530a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auth0/" + google-query: inurl:"/wp-content/plugins/auth0/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auth0,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auth0/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auth0" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auth0-4c3165a51cada8ffcfc130121958fc36.yaml b/nuclei-templates/cve-less/plugins/auth0-4c3165a51cada8ffcfc130121958fc36.yaml new file mode 100644 index 0000000000..9bb7eb30b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auth0-4c3165a51cada8ffcfc130121958fc36.yaml @@ -0,0 +1,58 @@ +id: auth0-4c3165a51cada8ffcfc130121958fc36 + +info: + name: > + Login by Auth0 <= 3.11.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afc6aec8-e486-4c35-9e58-da6e04d88c25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auth0/" + google-query: inurl:"/wp-content/plugins/auth0/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auth0,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auth0/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auth0" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auth0-6bd4ae57c5ef629c5bc1d004189d96b3.yaml b/nuclei-templates/cve-less/plugins/auth0-6bd4ae57c5ef629c5bc1d004189d96b3.yaml new file mode 100644 index 0000000000..725eff7fea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auth0-6bd4ae57c5ef629c5bc1d004189d96b3.yaml @@ -0,0 +1,58 @@ +id: auth0-6bd4ae57c5ef629c5bc1d004189d96b3 + +info: + name: > + Login by Auth0 3.11.0 - 3.11.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/898c2851-27e9-493a-96c7-b6be1c1f5c7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auth0/" + google-query: inurl:"/wp-content/plugins/auth0/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auth0,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auth0/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auth0" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.11.0', '<= 3.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auth0-74d2043a574ab69cbbb11dda595211e3.yaml b/nuclei-templates/cve-less/plugins/auth0-74d2043a574ab69cbbb11dda595211e3.yaml new file mode 100644 index 0000000000..c17b141890 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auth0-74d2043a574ab69cbbb11dda595211e3.yaml @@ -0,0 +1,58 @@ +id: auth0-74d2043a574ab69cbbb11dda595211e3 + +info: + name: > + Login by Auth0 Plugin <= 3.11.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f91992e-33fb-4384-af34-e27f68e1ca6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auth0/" + google-query: inurl:"/wp-content/plugins/auth0/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auth0,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auth0/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auth0" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auth0-90a41beee5735837ff7592583a00d291.yaml b/nuclei-templates/cve-less/plugins/auth0-90a41beee5735837ff7592583a00d291.yaml new file mode 100644 index 0000000000..cffa5fb22f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auth0-90a41beee5735837ff7592583a00d291.yaml @@ -0,0 +1,58 @@ +id: auth0-90a41beee5735837ff7592583a00d291 + +info: + name: > + Login by Auth0 <= 3.11.3 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/155e43f2-d46f-413f-bedd-7ab8905c1c35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auth0/" + google-query: inurl:"/wp-content/plugins/auth0/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auth0,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auth0/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auth0" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/authenticator-ec741bccccea1c86002394aeac45c0a7.yaml b/nuclei-templates/cve-less/plugins/authenticator-ec741bccccea1c86002394aeac45c0a7.yaml new file mode 100644 index 0000000000..e421fbdb41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/authenticator-ec741bccccea1c86002394aeac45c0a7.yaml @@ -0,0 +1,58 @@ +id: authenticator-ec741bccccea1c86002394aeac45c0a7 + +info: + name: > + Authenticator <= 1.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f4df92b-b6b5-441e-a772-fed63cb83bf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/authenticator/" + google-query: inurl:"/wp-content/plugins/authenticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,authenticator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/authenticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "authenticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/authldap-bdd4b664f15822a6a49a236c18fe020b.yaml b/nuclei-templates/cve-less/plugins/authldap-bdd4b664f15822a6a49a236c18fe020b.yaml new file mode 100644 index 0000000000..0ede4bcca8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/authldap-bdd4b664f15822a6a49a236c18fe020b.yaml @@ -0,0 +1,58 @@ +id: authldap-bdd4b664f15822a6a49a236c18fe020b + +info: + name: > + authLdap <= 2.5.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eddce6e0-2ea7-4980-97a7-857b2e1e3b69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/authldap/" + google-query: inurl:"/wp-content/plugins/authldap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,authldap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/authldap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "authldap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/authldap-cc2cca093f03fe71d2f989bb7299a3fb.yaml b/nuclei-templates/cve-less/plugins/authldap-cc2cca093f03fe71d2f989bb7299a3fb.yaml new file mode 100644 index 0000000000..6d1d0f4509 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/authldap-cc2cca093f03fe71d2f989bb7299a3fb.yaml @@ -0,0 +1,58 @@ +id: authldap-cc2cca093f03fe71d2f989bb7299a3fb + +info: + name: > + authLdap <= 2.6.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b91ad8b-79ec-4ef7-bb39-edb06309da5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/authldap/" + google-query: inurl:"/wp-content/plugins/authldap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,authldap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/authldap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "authldap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/author-avatars-2ba7e464285026388de6685dba844dbc.yaml b/nuclei-templates/cve-less/plugins/author-avatars-2ba7e464285026388de6685dba844dbc.yaml new file mode 100644 index 0000000000..7eb0c6eff1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/author-avatars-2ba7e464285026388de6685dba844dbc.yaml @@ -0,0 +1,58 @@ +id: author-avatars-2ba7e464285026388de6685dba844dbc + +info: + name: > + Author Avatars List/Block <= 2.1.17 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7c8380b-02ae-49d2-8c64-debe7f73ee35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/author-avatars/" + google-query: inurl:"/wp-content/plugins/author-avatars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,author-avatars,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/author-avatars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "author-avatars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/author-bio-box-6674d09f375c0a0c6100b633268f7e7c.yaml b/nuclei-templates/cve-less/plugins/author-bio-box-6674d09f375c0a0c6100b633268f7e7c.yaml new file mode 100644 index 0000000000..f13aa35858 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/author-bio-box-6674d09f375c0a0c6100b633268f7e7c.yaml @@ -0,0 +1,58 @@ +id: author-bio-box-6674d09f375c0a0c6100b633268f7e7c + +info: + name: > + Author Bio Box <= 3.3.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35f2d80a-891a-4616-a3f6-01bbf12f5f10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/author-bio-box/" + google-query: inurl:"/wp-content/plugins/author-bio-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,author-bio-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/author-bio-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "author-bio-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/author-chat-e0ff0dcaa5f28679cfbec1f0cc721e5e.yaml b/nuclei-templates/cve-less/plugins/author-chat-e0ff0dcaa5f28679cfbec1f0cc721e5e.yaml new file mode 100644 index 0000000000..664771825c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/author-chat-e0ff0dcaa5f28679cfbec1f0cc721e5e.yaml @@ -0,0 +1,58 @@ +id: author-chat-e0ff0dcaa5f28679cfbec1f0cc721e5e + +info: + name: > + Author Chat <= 1.9.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c78e0b6-bf24-4a23-8501-b26e681a7a4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/author-chat/" + google-query: inurl:"/wp-content/plugins/author-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,author-chat,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/author-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "author-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/authorizer-0dee3aeb64244e66a13f4201e38521ac.yaml b/nuclei-templates/cve-less/plugins/authorizer-0dee3aeb64244e66a13f4201e38521ac.yaml new file mode 100644 index 0000000000..a689da844c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/authorizer-0dee3aeb64244e66a13f4201e38521ac.yaml @@ -0,0 +1,58 @@ +id: authorizer-0dee3aeb64244e66a13f4201e38521ac + +info: + name: > + phpCAS authentication library < 1.6.0 - Service Hostname Discovery Exploitation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d8365a6-dfa2-4753-b655-3c2bcadeae75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/authorizer/" + google-query: inurl:"/wp-content/plugins/authorizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,authorizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/authorizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "authorizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/authors-list-f4f27ef7b51870c2ee29ac141ca3d041.yaml b/nuclei-templates/cve-less/plugins/authors-list-f4f27ef7b51870c2ee29ac141ca3d041.yaml new file mode 100644 index 0000000000..f97e84bf60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/authors-list-f4f27ef7b51870c2ee29ac141ca3d041.yaml @@ -0,0 +1,58 @@ +id: authors-list-f4f27ef7b51870c2ee29ac141ca3d041 + +info: + name: > + Authors List <= 2.0.2 - Reflected Cross-Site Scripting via al_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09f590ad-c99a-4577-a709-98c88d3acc87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/authors-list/" + google-query: inurl:"/wp-content/plugins/authors-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,authors-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/authors-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "authors-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-advance-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/auto-advance-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9db5f09e27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-advance-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: auto-advance-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-advance-for-gravity-forms/" + google-query: inurl:"/wp-content/plugins/auto-advance-for-gravity-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-advance-for-gravity-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-advance-for-gravity-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-advance-for-gravity-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-delete-posts-558370c6db6c7d4d1eb32adfed3a020b.yaml b/nuclei-templates/cve-less/plugins/auto-delete-posts-558370c6db6c7d4d1eb32adfed3a020b.yaml new file mode 100644 index 0000000000..8081315897 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-delete-posts-558370c6db6c7d4d1eb32adfed3a020b.yaml @@ -0,0 +1,58 @@ +id: auto-delete-posts-558370c6db6c7d4d1eb32adfed3a020b + +info: + name: > + Auto Delete Posts <= 1.3.0 - Cross-Site Request Forgery to Arbitrary Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce3ff7f9-ccad-45c0-a278-f66fbb6263ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-delete-posts/" + google-query: inurl:"/wp-content/plugins/auto-delete-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-delete-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-delete-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-delete-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-excerpt-everywhere-9438e07daceade026bfabee5db9fec5f.yaml b/nuclei-templates/cve-less/plugins/auto-excerpt-everywhere-9438e07daceade026bfabee5db9fec5f.yaml new file mode 100644 index 0000000000..5a96590416 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-excerpt-everywhere-9438e07daceade026bfabee5db9fec5f.yaml @@ -0,0 +1,58 @@ +id: auto-excerpt-everywhere-9438e07daceade026bfabee5db9fec5f + +info: + name: > + Auto Excerpt everywhere <= 1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32647c44-389a-4a6d-a32b-e19a35bc2aeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-excerpt-everywhere/" + google-query: inurl:"/wp-content/plugins/auto-excerpt-everywhere/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-excerpt-everywhere,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-excerpt-everywhere/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-excerpt-everywhere" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-hide-admin-bar-1243017811fac8a9f67c1c02c6c11406.yaml b/nuclei-templates/cve-less/plugins/auto-hide-admin-bar-1243017811fac8a9f67c1c02c6c11406.yaml new file mode 100644 index 0000000000..b0eb204e62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-hide-admin-bar-1243017811fac8a9f67c1c02c6c11406.yaml @@ -0,0 +1,58 @@ +id: auto-hide-admin-bar-1243017811fac8a9f67c1c02c6c11406 + +info: + name: > + Auto Hide Admin Bar <= 1.6.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/168ff5ec-52f2-4234-aee4-6d460b72d6c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-hide-admin-bar/" + google-query: inurl:"/wp-content/plugins/auto-hide-admin-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-hide-admin-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-hide-admin-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-hide-admin-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-hyperlink-urls-0886361daf0aecc3d4f4d311809f8748.yaml b/nuclei-templates/cve-less/plugins/auto-hyperlink-urls-0886361daf0aecc3d4f4d311809f8748.yaml new file mode 100644 index 0000000000..d723dff1fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-hyperlink-urls-0886361daf0aecc3d4f4d311809f8748.yaml @@ -0,0 +1,58 @@ +id: auto-hyperlink-urls-0886361daf0aecc3d4f4d311809f8748 + +info: + name: > + Auto-hyperlink URLs <= 5.4.1 - Tab Nabbing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42e8129f-dbbd-4dd3-a7a5-c6242c43dfe8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-hyperlink-urls/" + google-query: inurl:"/wp-content/plugins/auto-hyperlink-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-hyperlink-urls,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-hyperlink-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-hyperlink-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-limit-posts-reloaded-ea1f016fc610b9737d2a2631fc4d6d33.yaml b/nuclei-templates/cve-less/plugins/auto-limit-posts-reloaded-ea1f016fc610b9737d2a2631fc4d6d33.yaml new file mode 100644 index 0000000000..39552b2ff5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-limit-posts-reloaded-ea1f016fc610b9737d2a2631fc4d6d33.yaml @@ -0,0 +1,58 @@ +id: auto-limit-posts-reloaded-ea1f016fc610b9737d2a2631fc4d6d33 + +info: + name: > + Auto Limit Posts Reloaded <= 2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fedf20b2-6c21-4c91-8f79-9cac334a1313?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-limit-posts-reloaded/" + google-query: inurl:"/wp-content/plugins/auto-limit-posts-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-limit-posts-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-limit-posts-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-limit-posts-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-listings-8b6ee3af1a9508cfbedefd1fe07951b6.yaml b/nuclei-templates/cve-less/plugins/auto-listings-8b6ee3af1a9508cfbedefd1fe07951b6.yaml new file mode 100644 index 0000000000..453f6ca185 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-listings-8b6ee3af1a9508cfbedefd1fe07951b6.yaml @@ -0,0 +1,58 @@ +id: auto-listings-8b6ee3af1a9508cfbedefd1fe07951b6 + +info: + name: > + Auto Listings <= 2.6.5 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1a97776-03c7-403d-b803-023647b9d0f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-listings/" + google-query: inurl:"/wp-content/plugins/auto-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-listings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-location-for-wp-job-manager-c35094b437e27c460747dae02d21159c.yaml b/nuclei-templates/cve-less/plugins/auto-location-for-wp-job-manager-c35094b437e27c460747dae02d21159c.yaml new file mode 100644 index 0000000000..29088fb1b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-location-for-wp-job-manager-c35094b437e27c460747dae02d21159c.yaml @@ -0,0 +1,58 @@ +id: auto-location-for-wp-job-manager-c35094b437e27c460747dae02d21159c + +info: + name: > + Auto Location for WP Job Manager via Google <= 1.0 - Authenticated (Administrator+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19a70aa0-7075-4922-8feb-25b7fbe9da42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-location-for-wp-job-manager/" + google-query: inurl:"/wp-content/plugins/auto-location-for-wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-location-for-wp-job-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-location-for-wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-location-for-wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-login-new-user-after-registration-3503792f93b778d8b203c79791005536.yaml b/nuclei-templates/cve-less/plugins/auto-login-new-user-after-registration-3503792f93b778d8b203c79791005536.yaml new file mode 100644 index 0000000000..cd5b7d3700 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-login-new-user-after-registration-3503792f93b778d8b203c79791005536.yaml @@ -0,0 +1,58 @@ +id: auto-login-new-user-after-registration-3503792f93b778d8b203c79791005536 + +info: + name: > + Auto Login New User After Registration <= 1.9.6 - Cross-Site Request Forgery to Settings Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9311c7b6-2c32-4f30-8286-6d59c267c09d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-login-new-user-after-registration/" + google-query: inurl:"/wp-content/plugins/auto-login-new-user-after-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-login-new-user-after-registration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-login-new-user-after-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-login-new-user-after-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-login-new-user-after-registration-cbd733c7ebdd096e6d282497c4c8eb45.yaml b/nuclei-templates/cve-less/plugins/auto-login-new-user-after-registration-cbd733c7ebdd096e6d282497c4c8eb45.yaml new file mode 100644 index 0000000000..6a0e508476 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-login-new-user-after-registration-cbd733c7ebdd096e6d282497c4c8eb45.yaml @@ -0,0 +1,58 @@ +id: auto-login-new-user-after-registration-cbd733c7ebdd096e6d282497c4c8eb45 + +info: + name: > + Auto Login New User After Registration <= 1.9.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via alnuar_auto_login_new_user_after_registration_redirect + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fb82b48-3cf8-47a5-b68d-e37a1823a125?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-login-new-user-after-registration/" + google-query: inurl:"/wp-content/plugins/auto-login-new-user-after-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-login-new-user-after-registration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-login-new-user-after-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-login-new-user-after-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-login-when-resister-8a80eb46c7edc3e736e43babb9e6251b.yaml b/nuclei-templates/cve-less/plugins/auto-login-when-resister-8a80eb46c7edc3e736e43babb9e6251b.yaml new file mode 100644 index 0000000000..5943f1a689 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-login-when-resister-8a80eb46c7edc3e736e43babb9e6251b.yaml @@ -0,0 +1,58 @@ +id: auto-login-when-resister-8a80eb46c7edc3e736e43babb9e6251b + +info: + name: > + Enable/Disable Auto Login when Register <= 1.1.0 Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fa45fa7-b1da-42f0-945b-2a6b0db5ba91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-login-when-resister/" + google-query: inurl:"/wp-content/plugins/auto-login-when-resister/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-login-when-resister,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-login-when-resister/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-login-when-resister" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-more-tag-5181665927ed9da562e36af3ea3ec2fb.yaml b/nuclei-templates/cve-less/plugins/auto-more-tag-5181665927ed9da562e36af3ea3ec2fb.yaml new file mode 100644 index 0000000000..4281e364b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-more-tag-5181665927ed9da562e36af3ea3ec2fb.yaml @@ -0,0 +1,58 @@ +id: auto-more-tag-5181665927ed9da562e36af3ea3ec2fb + +info: + name: > + Auto More Tag <= 4.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f93fb48-3963-4a98-9c70-eef667b254df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-more-tag/" + google-query: inurl:"/wp-content/plugins/auto-more-tag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-more-tag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-more-tag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-more-tag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-post-thumbnail-272755bdeeb1adc01a4352f800652c09.yaml b/nuclei-templates/cve-less/plugins/auto-post-thumbnail-272755bdeeb1adc01a4352f800652c09.yaml new file mode 100644 index 0000000000..3cb536b784 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-post-thumbnail-272755bdeeb1adc01a4352f800652c09.yaml @@ -0,0 +1,58 @@ +id: auto-post-thumbnail-272755bdeeb1adc01a4352f800652c09 + +info: + name: > + Auto Featured Image (Auto Post Thumbnail) <= 4.0.0 - Authenticated (Author+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/309eb1df-728f-404d-a20d-a83a0ab8ed0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-post-thumbnail/" + google-query: inurl:"/wp-content/plugins/auto-post-thumbnail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-post-thumbnail,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-post-thumbnail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-post-thumbnail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-post-thumbnail-4a832155afe3b99c1f4d2882162139df.yaml b/nuclei-templates/cve-less/plugins/auto-post-thumbnail-4a832155afe3b99c1f4d2882162139df.yaml new file mode 100644 index 0000000000..ac008e26d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-post-thumbnail-4a832155afe3b99c1f4d2882162139df.yaml @@ -0,0 +1,58 @@ +id: auto-post-thumbnail-4a832155afe3b99c1f4d2882162139df + +info: + name: > + Auto Featured Image <= 3.9.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/222325e9-3048-45f7-9a66-a713d096d44e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-post-thumbnail/" + google-query: inurl:"/wp-content/plugins/auto-post-thumbnail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-post-thumbnail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-post-thumbnail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-post-thumbnail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-post-thumbnail-eb2326275a758827f7cb2f8622cad6ce.yaml b/nuclei-templates/cve-less/plugins/auto-post-thumbnail-eb2326275a758827f7cb2f8622cad6ce.yaml new file mode 100644 index 0000000000..bf2adbdf81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-post-thumbnail-eb2326275a758827f7cb2f8622cad6ce.yaml @@ -0,0 +1,58 @@ +id: auto-post-thumbnail-eb2326275a758827f7cb2f8622cad6ce + +info: + name: > + Auto Featured Image (Auto Post Thumbnail) <= 3.9.15 - Authenticated (Author+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18ff2556-9e20-42f6-a8fb-b81473c42576?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-post-thumbnail/" + google-query: inurl:"/wp-content/plugins/auto-post-thumbnail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-post-thumbnail,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-post-thumbnail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-post-thumbnail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-poster-d78cf00c59cb04a1784e89b4d96527fd.yaml b/nuclei-templates/cve-less/plugins/auto-poster-d78cf00c59cb04a1784e89b4d96527fd.yaml new file mode 100644 index 0000000000..ca2f4f6178 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-poster-d78cf00c59cb04a1784e89b4d96527fd.yaml @@ -0,0 +1,58 @@ +id: auto-poster-d78cf00c59cb04a1784e89b4d96527fd + +info: + name: > + Auto Poster <= 1.2 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02b24735-0310-4b00-9acc-a05557238697?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-poster/" + google-query: inurl:"/wp-content/plugins/auto-poster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-poster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-poster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-poster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-prune-posts-0853f27900d9d1d4cc0e56f1b61fc316.yaml b/nuclei-templates/cve-less/plugins/auto-prune-posts-0853f27900d9d1d4cc0e56f1b61fc316.yaml new file mode 100644 index 0000000000..4a54bc2291 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-prune-posts-0853f27900d9d1d4cc0e56f1b61fc316.yaml @@ -0,0 +1,58 @@ +id: auto-prune-posts-0853f27900d9d1d4cc0e56f1b61fc316 + +info: + name: > + Auto Prune Posts <= 1.8.0 - Cross-Site Request Forgery via admin_menu + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f15af4eb-5752-4a85-babd-cee7e89c329d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-prune-posts/" + google-query: inurl:"/wp-content/plugins/auto-prune-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-prune-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-prune-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-prune-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-refresh-single-page-176d59252e2a1ced83fc8440cad1b0f5.yaml b/nuclei-templates/cve-less/plugins/auto-refresh-single-page-176d59252e2a1ced83fc8440cad1b0f5.yaml new file mode 100644 index 0000000000..4800e5f9a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-refresh-single-page-176d59252e2a1ced83fc8440cad1b0f5.yaml @@ -0,0 +1,58 @@ +id: auto-refresh-single-page-176d59252e2a1ced83fc8440cad1b0f5 + +info: + name: > + Auto Refresh Single Page <= 1.1 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f8f8d46-d7e7-4b07-9b10-15e579973474?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-refresh-single-page/" + google-query: inurl:"/wp-content/plugins/auto-refresh-single-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-refresh-single-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-refresh-single-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-refresh-single-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-rename-media-on-upload-9eab813e12b4ac048e7bde30bc6ba691.yaml b/nuclei-templates/cve-less/plugins/auto-rename-media-on-upload-9eab813e12b4ac048e7bde30bc6ba691.yaml new file mode 100644 index 0000000000..882d2ab1d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-rename-media-on-upload-9eab813e12b4ac048e7bde30bc6ba691.yaml @@ -0,0 +1,58 @@ +id: auto-rename-media-on-upload-9eab813e12b4ac048e7bde30bc6ba691 + +info: + name: > + Auto Rename Media On Upload <= 1.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25a566ed-9ed6-4c72-9728-49a0edfb5ba5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-rename-media-on-upload/" + google-query: inurl:"/wp-content/plugins/auto-rename-media-on-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-rename-media-on-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-rename-media-on-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-rename-media-on-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-tag-creator-ef92930a59c0704397081e4543f7586d.yaml b/nuclei-templates/cve-less/plugins/auto-tag-creator-ef92930a59c0704397081e4543f7586d.yaml new file mode 100644 index 0000000000..df154dd009 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-tag-creator-ef92930a59c0704397081e4543f7586d.yaml @@ -0,0 +1,58 @@ +id: auto-tag-creator-ef92930a59c0704397081e4543f7586d + +info: + name: > + Auto Tag Creator <= 1.0.2 - Missing Authorization via tag_save_settings_callback + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4b6d2c6-d157-4c4c-b6e1-557b8353c742?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-tag-creator/" + google-query: inurl:"/wp-content/plugins/auto-tag-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-tag-creator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-tag-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-tag-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-thickbox-plus-1fdd6fa4d9b258037503dfcfecd3a543.yaml b/nuclei-templates/cve-less/plugins/auto-thickbox-plus-1fdd6fa4d9b258037503dfcfecd3a543.yaml new file mode 100644 index 0000000000..b54acce9d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-thickbox-plus-1fdd6fa4d9b258037503dfcfecd3a543.yaml @@ -0,0 +1,58 @@ +id: auto-thickbox-plus-1fdd6fa4d9b258037503dfcfecd3a543 + +info: + name: > + Auto ThickBox Plus <= 1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/becee157-8519-4f1f-b369-5f932773f282?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-thickbox-plus/" + google-query: inurl:"/wp-content/plugins/auto-thickbox-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-thickbox-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-thickbox-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-thickbox-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-upload-images-7deebe50bd92a2450bb0ab52d4fabce8.yaml b/nuclei-templates/cve-less/plugins/auto-upload-images-7deebe50bd92a2450bb0ab52d4fabce8.yaml new file mode 100644 index 0000000000..64d7017159 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-upload-images-7deebe50bd92a2450bb0ab52d4fabce8.yaml @@ -0,0 +1,58 @@ +id: auto-upload-images-7deebe50bd92a2450bb0ab52d4fabce8 + +info: + name: > + Auto Upload Images <= 3.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69cf2f28-33ae-441e-95d2-01d187c7745a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-upload-images/" + google-query: inurl:"/wp-content/plugins/auto-upload-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-upload-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-upload-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-upload-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-upload-images-e720f99baaecf49f6cf9a7d54ee9d187.yaml b/nuclei-templates/cve-less/plugins/auto-upload-images-e720f99baaecf49f6cf9a7d54ee9d187.yaml new file mode 100644 index 0000000000..8b915866eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-upload-images-e720f99baaecf49f6cf9a7d54ee9d187.yaml @@ -0,0 +1,58 @@ +id: auto-upload-images-e720f99baaecf49f6cf9a7d54ee9d187 + +info: + name: > + Auto Upload Images <= 3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f8a7933-cc26-47f2-9142-df748add0745?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-upload-images/" + google-query: inurl:"/wp-content/plugins/auto-upload-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-upload-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-upload-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-upload-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auto-youtube-importer-be7901b9f5b68d7364c4afedf93335bf.yaml b/nuclei-templates/cve-less/plugins/auto-youtube-importer-be7901b9f5b68d7364c4afedf93335bf.yaml new file mode 100644 index 0000000000..7b4713ec5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auto-youtube-importer-be7901b9f5b68d7364c4afedf93335bf.yaml @@ -0,0 +1,58 @@ +id: auto-youtube-importer-be7901b9f5b68d7364c4afedf93335bf + +info: + name: > + Auto YouTube Importer <= 1.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff7e7539-6a09-461a-a9a7-33630c396f1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auto-youtube-importer/" + google-query: inurl:"/wp-content/plugins/auto-youtube-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auto-youtube-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auto-youtube-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-youtube-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autocomplete-location-field-contact-form-7-4113301795a9f6abc828e53db152bc61.yaml b/nuclei-templates/cve-less/plugins/autocomplete-location-field-contact-form-7-4113301795a9f6abc828e53db152bc61.yaml new file mode 100644 index 0000000000..a2d6acec96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autocomplete-location-field-contact-form-7-4113301795a9f6abc828e53db152bc61.yaml @@ -0,0 +1,58 @@ +id: autocomplete-location-field-contact-form-7-4113301795a9f6abc828e53db152bc61 + +info: + name: > + Autocomplete Location field Contact Form 7 <= 2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13fd7509-6d61-4eb0-9f85-cc40e074b819?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autocomplete-location-field-contact-form-7/" + google-query: inurl:"/wp-content/plugins/autocomplete-location-field-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autocomplete-location-field-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autocomplete-location-field-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autocomplete-location-field-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autolinks-ad0620cb04a8c4743efa183697178556.yaml b/nuclei-templates/cve-less/plugins/autolinks-ad0620cb04a8c4743efa183697178556.yaml new file mode 100644 index 0000000000..afb42ad17e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autolinks-ad0620cb04a8c4743efa183697178556.yaml @@ -0,0 +1,58 @@ +id: autolinks-ad0620cb04a8c4743efa183697178556 + +info: + name: > + Autolinks <= 1.0.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1197d19-e49f-4d44-8efe-ef8d7e91bce0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autolinks/" + google-query: inurl:"/wp-content/plugins/autolinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autolinks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autolinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autolinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automated-editor-3a906cc64f922d280ee100fae46edd10.yaml b/nuclei-templates/cve-less/plugins/automated-editor-3a906cc64f922d280ee100fae46edd10.yaml new file mode 100644 index 0000000000..7bfe199f97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automated-editor-3a906cc64f922d280ee100fae46edd10.yaml @@ -0,0 +1,58 @@ +id: automated-editor-3a906cc64f922d280ee100fae46edd10 + +info: + name: > + Automated Editor <= 1.3 - Cross-Site Request Forgery via admin menu pages + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27799988-cb2b-41c7-ad9a-aade59d31fa3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automated-editor/" + google-query: inurl:"/wp-content/plugins/automated-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automated-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automated-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automated-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatewoo-4dae001d6d6e08996c09e2836f10b44d.yaml b/nuclei-templates/cve-less/plugins/automatewoo-4dae001d6d6e08996c09e2836f10b44d.yaml new file mode 100644 index 0000000000..4be297beb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatewoo-4dae001d6d6e08996c09e2836f10b44d.yaml @@ -0,0 +1,58 @@ +id: automatewoo-4dae001d6d6e08996c09e2836f10b44d + +info: + name: > + AutomateWoo <= 5.7.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a33c8a80-e11e-403d-9eb0-e1c5b59204b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatewoo/" + google-query: inurl:"/wp-content/plugins/automatewoo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatewoo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatewoo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatewoo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatewoo-62fe87d4141e78303e17a76d693266f0.yaml b/nuclei-templates/cve-less/plugins/automatewoo-62fe87d4141e78303e17a76d693266f0.yaml new file mode 100644 index 0000000000..06eed510e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatewoo-62fe87d4141e78303e17a76d693266f0.yaml @@ -0,0 +1,58 @@ +id: automatewoo-62fe87d4141e78303e17a76d693266f0 + +info: + name: > + AutomateWoo <= 5.7.1 - Authenticated (Shop manager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9202cb4d-7fd4-444d-ab44-8f6d9e68d869?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatewoo/" + google-query: inurl:"/wp-content/plugins/automatewoo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatewoo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatewoo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatewoo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatewoo-ccfc84b5a73050c155c0bdabcf1ece75.yaml b/nuclei-templates/cve-less/plugins/automatewoo-ccfc84b5a73050c155c0bdabcf1ece75.yaml new file mode 100644 index 0000000000..5c225d9291 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatewoo-ccfc84b5a73050c155c0bdabcf1ece75.yaml @@ -0,0 +1,58 @@ +id: automatewoo-ccfc84b5a73050c155c0bdabcf1ece75 + +info: + name: > + AutomateWoo <= 5.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/540de1b8-eb1f-4f9d-b45c-d3d5f11b642d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatewoo/" + google-query: inurl:"/wp-content/plugins/automatewoo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatewoo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatewoo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatewoo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatewoo-d7fca3e11b3b0863de2f43ab6c4390c1.yaml b/nuclei-templates/cve-less/plugins/automatewoo-d7fca3e11b3b0863de2f43ab6c4390c1.yaml new file mode 100644 index 0000000000..ad324da9c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatewoo-d7fca3e11b3b0863de2f43ab6c4390c1.yaml @@ -0,0 +1,58 @@ +id: automatewoo-d7fca3e11b3b0863de2f43ab6c4390c1 + +info: + name: > + AutomateWoo <= 5.7.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb51383f-03c8-4e81-bfed-40fd9f5c4d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatewoo/" + google-query: inurl:"/wp-content/plugins/automatewoo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatewoo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatewoo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatewoo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-domain-changer-61bee7d86e2db9bfd0c620f9695ac8f0.yaml b/nuclei-templates/cve-less/plugins/automatic-domain-changer-61bee7d86e2db9bfd0c620f9695ac8f0.yaml new file mode 100644 index 0000000000..debd8b52c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-domain-changer-61bee7d86e2db9bfd0c620f9695ac8f0.yaml @@ -0,0 +1,58 @@ +id: automatic-domain-changer-61bee7d86e2db9bfd0c620f9695ac8f0 + +info: + name: > + Automatic Domain Changer <= 2.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3839257c-4ba2-442a-8d47-dd5c1e5561a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-domain-changer/" + google-query: inurl:"/wp-content/plugins/automatic-domain-changer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-domain-changer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-domain-changer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-domain-changer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-grid-image-listing-b320e1c5f0dacab6b03f963021265f72.yaml b/nuclei-templates/cve-less/plugins/automatic-grid-image-listing-b320e1c5f0dacab6b03f963021265f72.yaml new file mode 100644 index 0000000000..56298ffc28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-grid-image-listing-b320e1c5f0dacab6b03f963021265f72.yaml @@ -0,0 +1,58 @@ +id: automatic-grid-image-listing-b320e1c5f0dacab6b03f963021265f72 + +info: + name: > + AGIL(Automatic Grid Image Listing) <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a75c179f-236b-4a1b-8566-b74e0c5fda27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-grid-image-listing/" + google-query: inurl:"/wp-content/plugins/automatic-grid-image-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-grid-image-listing,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-grid-image-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-grid-image-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-internal-links-for-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/automatic-internal-links-for-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..028a4057d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-internal-links-for-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: automatic-internal-links-for-seo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-internal-links-for-seo/" + google-query: inurl:"/wp-content/plugins/automatic-internal-links-for-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-internal-links-for-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-internal-links-for-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-internal-links-for-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-pages-for-privacy-policy-terms-about-and-contact-8ce996cc6b76d039a08ff1d01926c151.yaml b/nuclei-templates/cve-less/plugins/automatic-pages-for-privacy-policy-terms-about-and-contact-8ce996cc6b76d039a08ff1d01926c151.yaml new file mode 100644 index 0000000000..e95c6a1887 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-pages-for-privacy-policy-terms-about-and-contact-8ce996cc6b76d039a08ff1d01926c151.yaml @@ -0,0 +1,58 @@ +id: automatic-pages-for-privacy-policy-terms-about-and-contact-8ce996cc6b76d039a08ff1d01926c151 + +info: + name: > + Automatic pages for Privacy Policy, Terms, About, Contact us <= 1.41 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d36d97fb-2fce-4248-8955-7d66919487e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-pages-for-privacy-policy-terms-about-and-contact/" + google-query: inurl:"/wp-content/plugins/automatic-pages-for-privacy-policy-terms-about-and-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-pages-for-privacy-policy-terms-about-and-contact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-pages-for-privacy-policy-terms-about-and-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-pages-for-privacy-policy-terms-about-and-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-post-categories-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/automatic-post-categories-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..e604361162 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-post-categories-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: automatic-post-categories-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-post-categories/" + google-query: inurl:"/wp-content/plugins/automatic-post-categories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-post-categories,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-post-categories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-post-categories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-user-roles-switcher-3117c9f6ca4b5d0c58f750cb4d3a545e.yaml b/nuclei-templates/cve-less/plugins/automatic-user-roles-switcher-3117c9f6ca4b5d0c58f750cb4d3a545e.yaml new file mode 100644 index 0000000000..e2fe5cc5c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-user-roles-switcher-3117c9f6ca4b5d0c58f750cb4d3a545e.yaml @@ -0,0 +1,58 @@ +id: automatic-user-roles-switcher-3117c9f6ca4b5d0c58f750cb4d3a545e + +info: + name: > + Automatic User Roles Switcher <= 1.1.1 - Missing Authorization to Privilege Escalation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd74bcec-df6f-4f82-8f88-6cb1adde35ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-user-roles-switcher/" + google-query: inurl:"/wp-content/plugins/automatic-user-roles-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-user-roles-switcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-user-roles-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-user-roles-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-youtube-gallery-41e70074e724b3d58c82d2325b25db5e.yaml b/nuclei-templates/cve-less/plugins/automatic-youtube-gallery-41e70074e724b3d58c82d2325b25db5e.yaml new file mode 100644 index 0000000000..299d797556 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-youtube-gallery-41e70074e724b3d58c82d2325b25db5e.yaml @@ -0,0 +1,58 @@ +id: automatic-youtube-gallery-41e70074e724b3d58c82d2325b25db5e + +info: + name: > + Automatic YouTube Gallery <= 2.3.3 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a58d45b-c91b-4141-992e-336650d7252b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-youtube-gallery/" + google-query: inurl:"/wp-content/plugins/automatic-youtube-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-youtube-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-youtube-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-youtube-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-youtube-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/automatic-youtube-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dbbd0a7828 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-youtube-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: automatic-youtube-gallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-youtube-gallery/" + google-query: inurl:"/wp-content/plugins/automatic-youtube-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-youtube-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-youtube-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-youtube-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatic-youtube-video-posts-0a33d637c29ba75c2b509bcefbd3461e.yaml b/nuclei-templates/cve-less/plugins/automatic-youtube-video-posts-0a33d637c29ba75c2b509bcefbd3461e.yaml new file mode 100644 index 0000000000..a4451f053b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatic-youtube-video-posts-0a33d637c29ba75c2b509bcefbd3461e.yaml @@ -0,0 +1,58 @@ +id: automatic-youtube-video-posts-0a33d637c29ba75c2b509bcefbd3461e + +info: + name: > + Automatic Youtube Video Posts Plugin <= 5.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a595b3c-2b21-43fe-8d4e-6721f4541c9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatic-youtube-video-posts/" + google-query: inurl:"/wp-content/plugins/automatic-youtube-video-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatic-youtube-video-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatic-youtube-video-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatic-youtube-video-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatorwp-8115d47111d8823e88df213c3ae2493b.yaml b/nuclei-templates/cve-less/plugins/automatorwp-8115d47111d8823e88df213c3ae2493b.yaml new file mode 100644 index 0000000000..12ea3d52c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatorwp-8115d47111d8823e88df213c3ae2493b.yaml @@ -0,0 +1,58 @@ +id: automatorwp-8115d47111d8823e88df213c3ae2493b + +info: + name: > + AutomatorWP <= 2.5.8 - Cross Site Request Forgery via bulk_delete + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ebdf903-828e-4a22-953a-17d85984b576?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatorwp/" + google-query: inurl:"/wp-content/plugins/automatorwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatorwp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatorwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatorwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatorwp-bb200d907df69c9c4fcee1658bb3b23d.yaml b/nuclei-templates/cve-less/plugins/automatorwp-bb200d907df69c9c4fcee1658bb3b23d.yaml new file mode 100644 index 0000000000..3b0c92feef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatorwp-bb200d907df69c9c4fcee1658bb3b23d.yaml @@ -0,0 +1,58 @@ +id: automatorwp-bb200d907df69c9c4fcee1658bb3b23d + +info: + name: > + AutomatorWP <= 2.5.0 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c189a778-0338-408c-bcca-a0ac76d8eb44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatorwp/" + google-query: inurl:"/wp-content/plugins/automatorwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatorwp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatorwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatorwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automatorwp-ecd15bc5f3de0e81bd280c25d15be5a4.yaml b/nuclei-templates/cve-less/plugins/automatorwp-ecd15bc5f3de0e81bd280c25d15be5a4.yaml new file mode 100644 index 0000000000..2a8a60be5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automatorwp-ecd15bc5f3de0e81bd280c25d15be5a4.yaml @@ -0,0 +1,58 @@ +id: automatorwp-ecd15bc5f3de0e81bd280c25d15be5a4 + +info: + name: > + AutomatorWP <= 1.7.5 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b95fe0e-4677-4667-9a84-96801b547088?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automatorwp/" + google-query: inurl:"/wp-content/plugins/automatorwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automatorwp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automatorwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automatorwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/automizy-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/automizy-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bb19258fa2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/automizy-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: automizy-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/automizy-gravity-forms/" + google-query: inurl:"/wp-content/plugins/automizy-gravity-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,automizy-gravity-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/automizy-gravity-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "automizy-gravity-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-4cdab5a4c9d1ef359c9ea3e65c6cdb07.yaml b/nuclei-templates/cve-less/plugins/autoptimize-4cdab5a4c9d1ef359c9ea3e65c6cdb07.yaml new file mode 100644 index 0000000000..c7cd525db5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-4cdab5a4c9d1ef359c9ea3e65c6cdb07.yaml @@ -0,0 +1,58 @@ +id: autoptimize-4cdab5a4c9d1ef359c9ea3e65c6cdb07 + +info: + name: > + Autoptimize <= 3.1.0 - Authenticated (Admin+) Stored Cross-Site Scripting via Critical CSS Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f787cad3-cf99-413a-952f-082fae973bef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-6be16d4dc7a3396a4e2044185bf46f84.yaml b/nuclei-templates/cve-less/plugins/autoptimize-6be16d4dc7a3396a4e2044185bf46f84.yaml new file mode 100644 index 0000000000..4350eaafd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-6be16d4dc7a3396a4e2044185bf46f84.yaml @@ -0,0 +1,58 @@ +id: autoptimize-6be16d4dc7a3396a4e2044185bf46f84 + +info: + name: > + Autoptimize <= 2.7.6 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09152aa7-5c10-416a-aa77-a0cde1b6442e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-75251abfce703752327c7069170783ae.yaml b/nuclei-templates/cve-less/plugins/autoptimize-75251abfce703752327c7069170783ae.yaml new file mode 100644 index 0000000000..fbcaa89536 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-75251abfce703752327c7069170783ae.yaml @@ -0,0 +1,58 @@ +id: autoptimize-75251abfce703752327c7069170783ae + +info: + name: > + Autoptimize <= 3.0.4 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f9d237c-110e-4e71-9d2c-db99358468e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-80c50d46e1edaea1d21acc931b61620b.yaml b/nuclei-templates/cve-less/plugins/autoptimize-80c50d46e1edaea1d21acc931b61620b.yaml new file mode 100644 index 0000000000..e53fc9f9eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-80c50d46e1edaea1d21acc931b61620b.yaml @@ -0,0 +1,58 @@ +id: autoptimize-80c50d46e1edaea1d21acc931b61620b + +info: + name: > + Autoptimize <= 2.1.0 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d4e3560-2208-4122-812e-0c506fe45126?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-967efd081266df53c7d5c10295955cd0.yaml b/nuclei-templates/cve-less/plugins/autoptimize-967efd081266df53c7d5c10295955cd0.yaml new file mode 100644 index 0000000000..cd61d3574c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-967efd081266df53c7d5c10295955cd0.yaml @@ -0,0 +1,58 @@ +id: autoptimize-967efd081266df53c7d5c10295955cd0 + +info: + name: > + Autoptimize <= 2.7.7 - Race Condition leading to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef9a6ef5-368e-40df-9a17-2779e453dfcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-9b6d789ab9054bec8f3668e533e7af06.yaml b/nuclei-templates/cve-less/plugins/autoptimize-9b6d789ab9054bec8f3668e533e7af06.yaml new file mode 100644 index 0000000000..2af21ad115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-9b6d789ab9054bec8f3668e533e7af06.yaml @@ -0,0 +1,58 @@ +id: autoptimize-9b6d789ab9054bec8f3668e533e7af06 + +info: + name: > + Autoptimize <= 2.7.7 - Unsafe File Upload to Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c95210ba-65f6-4bf8-8986-f537f1854d02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-a168ad5542ffc3cded569dbf621954d3.yaml b/nuclei-templates/cve-less/plugins/autoptimize-a168ad5542ffc3cded569dbf621954d3.yaml new file mode 100644 index 0000000000..62e89b467d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-a168ad5542ffc3cded569dbf621954d3.yaml @@ -0,0 +1,58 @@ +id: autoptimize-a168ad5542ffc3cded569dbf621954d3 + +info: + name: > + Autoptimize <= 2.8.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be24d47e-4880-4d7f-9be2-cf8eb1afe888?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-c98cc11ba230cb93eea39872b453bb99.yaml b/nuclei-templates/cve-less/plugins/autoptimize-c98cc11ba230cb93eea39872b453bb99.yaml new file mode 100644 index 0000000000..78f591a26c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-c98cc11ba230cb93eea39872b453bb99.yaml @@ -0,0 +1,58 @@ +id: autoptimize-c98cc11ba230cb93eea39872b453bb99 + +info: + name: > + Autoptimize <= 3.1.6 - Authenticated (Admin+) Stored Cross-Site Scripting via Critical CSS Rules + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d16a3da0-9539-4555-8dfc-65cb4f4d7b4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoptimize-dac1811f2f42b2f9bf0fce4cd043df4e.yaml b/nuclei-templates/cve-less/plugins/autoptimize-dac1811f2f42b2f9bf0fce4cd043df4e.yaml new file mode 100644 index 0000000000..4f58442f9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoptimize-dac1811f2f42b2f9bf0fce4cd043df4e.yaml @@ -0,0 +1,58 @@ +id: autoptimize-dac1811f2f42b2f9bf0fce4cd043df4e + +info: + name: > + Autoptimize <= 2.7.7 - Arbitrary File Upload (and Remote Code Execution) via Import Settings + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/640f2616-f3a5-4be6-901e-848d2d77506e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoptimize/" + google-query: inurl:"/wp-content/plugins/autoptimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoptimize,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoptimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoptimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoresponder-gwa-1baba58fdf15d4d0a7d4d7886ec16e9b.yaml b/nuclei-templates/cve-less/plugins/autoresponder-gwa-1baba58fdf15d4d0a7d4d7886ec16e9b.yaml new file mode 100644 index 0000000000..04dbfbaa4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoresponder-gwa-1baba58fdf15d4d0a7d4d7886ec16e9b.yaml @@ -0,0 +1,58 @@ +id: autoresponder-gwa-1baba58fdf15d4d0a7d4d7886ec16e9b + +info: + name: > + [GWA] AutoResponder <= 2.7.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a21d834-db8a-471f-b062-59ecfbab0dd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoresponder-gwa/" + google-query: inurl:"/wp-content/plugins/autoresponder-gwa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoresponder-gwa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoresponder-gwa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoresponder-gwa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoresponder-gwa-d0a082141e820d78d2c62d7167bca620.yaml b/nuclei-templates/cve-less/plugins/autoresponder-gwa-d0a082141e820d78d2c62d7167bca620.yaml new file mode 100644 index 0000000000..c9d585f364 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoresponder-gwa-d0a082141e820d78d2c62d7167bca620.yaml @@ -0,0 +1,58 @@ +id: autoresponder-gwa-d0a082141e820d78d2c62d7167bca620 + +info: + name: > + [GWA] AutoResponder <= 2.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e278df67-e4d3-416c-ac7d-6e43442dde17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoresponder-gwa/" + google-query: inurl:"/wp-content/plugins/autoresponder-gwa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoresponder-gwa,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoresponder-gwa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoresponder-gwa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autosave-net-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/autosave-net-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..66d4978bc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autosave-net-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: autosave-net-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autosave-net/" + google-query: inurl:"/wp-content/plugins/autosave-net/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autosave-net,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autosave-net/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autosave-net" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoshare-for-twitter-1f6e5011b7adf7858fca1938316d62fe.yaml b/nuclei-templates/cve-less/plugins/autoshare-for-twitter-1f6e5011b7adf7858fca1938316d62fe.yaml new file mode 100644 index 0000000000..eb8cb5e5bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoshare-for-twitter-1f6e5011b7adf7858fca1938316d62fe.yaml @@ -0,0 +1,58 @@ +id: autoshare-for-twitter-1f6e5011b7adf7858fca1938316d62fe + +info: + name: > + decode-uri-component <= 0.2.1 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3147a94-056a-4454-8815-44c0b9d1de81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoshare-for-twitter/" + google-query: inurl:"/wp-content/plugins/autoshare-for-twitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoshare-for-twitter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoshare-for-twitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoshare-for-twitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoshare-for-twitter-73081b1f6f4e13a9e6e969eba5e746fc.yaml b/nuclei-templates/cve-less/plugins/autoshare-for-twitter-73081b1f6f4e13a9e6e969eba5e746fc.yaml new file mode 100644 index 0000000000..8f3736072b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoshare-for-twitter-73081b1f6f4e13a9e6e969eba5e746fc.yaml @@ -0,0 +1,58 @@ +id: autoshare-for-twitter-73081b1f6f4e13a9e6e969eba5e746fc + +info: + name: > + simple-git < 3.15.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c747e6f-31fc-41b0-ba62-f009b5483696?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoshare-for-twitter/" + google-query: inurl:"/wp-content/plugins/autoshare-for-twitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoshare-for-twitter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoshare-for-twitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoshare-for-twitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autoshare-for-twitter-f9078038dec7d199edb0413f76661495.yaml b/nuclei-templates/cve-less/plugins/autoshare-for-twitter-f9078038dec7d199edb0413f76661495.yaml new file mode 100644 index 0000000000..3d86fbf4db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autoshare-for-twitter-f9078038dec7d199edb0413f76661495.yaml @@ -0,0 +1,58 @@ +id: autoshare-for-twitter-f9078038dec7d199edb0413f76661495 + +info: + name: > + Terser < 4.8.1 and 5.0.0-5.14.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d535c069-cfa3-4c41-9a01-b4c4e7c75764?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autoshare-for-twitter/" + google-query: inurl:"/wp-content/plugins/autoshare-for-twitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autoshare-for-twitter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autoshare-for-twitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autoshare-for-twitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/autotitle-for-wordpress-4914e87d81ced1cde016cf120e762a4b.yaml b/nuclei-templates/cve-less/plugins/autotitle-for-wordpress-4914e87d81ced1cde016cf120e762a4b.yaml new file mode 100644 index 0000000000..68fbf75fad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/autotitle-for-wordpress-4914e87d81ced1cde016cf120e762a4b.yaml @@ -0,0 +1,58 @@ +id: autotitle-for-wordpress-4914e87d81ced1cde016cf120e762a4b + +info: + name: > + Autotitle for WordPress <= 1.0.3 - Cross-Site Request Forgery to Settings Update and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/062d906d-5a6e-4180-a2f2-18411334b9a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/autotitle-for-wordpress/" + google-query: inurl:"/wp-content/plugins/autotitle-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,autotitle-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/autotitle-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "autotitle-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-700e36ec39fe3e8c88c494279e29f4d3.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-700e36ec39fe3e8c88c494279e29f4d3.yaml new file mode 100644 index 0000000000..153bba0e6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-700e36ec39fe3e8c88c494279e29f4d3.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-700e36ec39fe3e8c88c494279e29f4d3 + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95d61096-8e44-4b70-a409-c02cb3d1e32c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-730a6fdf4be6bb50ac42ce16cbcc6d77.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-730a6fdf4be6bb50ac42ce16cbcc6d77.yaml new file mode 100644 index 0000000000..a7e4562de9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-730a6fdf4be6bb50ac42ce16cbcc6d77.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-730a6fdf4be6bb50ac42ce16cbcc6d77 + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.10.5 - PHP Objection Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/743f6e8b-4694-4d6a-94db-093162ba94b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-7c56383fa31fa34806b79179038f9c39.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-7c56383fa31fa34806b79179038f9c39.yaml new file mode 100644 index 0000000000..57393277e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-7c56383fa31fa34806b79179038f9c39.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-7c56383fa31fa34806b79179038f9c39 + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Accordion Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4541890-4c0d-4348-91df-42cf4b575514?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-7cb2639ce12fe262360726f38fcd9d92.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-7cb2639ce12fe262360726f38fcd9d92.yaml new file mode 100644 index 0000000000..12eb4c1a43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-7cb2639ce12fe262360726f38fcd9d92.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-7cb2639ce12fe262360726f38fcd9d92 + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'aux_timeline' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe175315-99ef-438a-b5b0-a5f190403116?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-9eb8fddd5a9f0696ed91d545e4dd965c.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-9eb8fddd5a9f0696ed91d545e4dd965c.yaml new file mode 100644 index 0000000000..791a053e24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-9eb8fddd5a9f0696ed91d545e4dd965c.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-9eb8fddd5a9f0696ed91d545e4dd965c + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.14.0 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09437329-f01a-4998-90ec-e4b2e271e896?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-a06dc2822d205c30829a39942b5c0aee.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-a06dc2822d205c30829a39942b5c0aee.yaml new file mode 100644 index 0000000000..5d939285e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-a06dc2822d205c30829a39942b5c0aee.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-a06dc2822d205c30829a39942b5c0aee + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'title_tag' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/546aee7b-60a6-44bc-8664-0e917974cb6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-a3c60d763b55ba109d8e7ef5cc4b73cf.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-a3c60d763b55ba109d8e7ef5cc4b73cf.yaml new file mode 100644 index 0000000000..a09a15ffef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-a3c60d763b55ba109d8e7ef5cc4b73cf.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-a3c60d763b55ba109d8e7ef5cc4b73cf + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bcd2c5e-4969-4530-b3ab-930c5051d8f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-c1fa4ca90d68aef3b1e407c4bbb8f6e9.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-c1fa4ca90d68aef3b1e407c4bbb8f6e9.yaml new file mode 100644 index 0000000000..17d82ba6d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-c1fa4ca90d68aef3b1e407c4bbb8f6e9.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-c1fa4ca90d68aef3b1e407c4bbb8f6e9 + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'aux_gmaps' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3705f028-9c8d-48b1-8950-160e10038294?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-ce1baa6ffb742e3e4c86c030e2aaf287.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-ce1baa6ffb742e3e4c86c030e2aaf287.yaml new file mode 100644 index 0000000000..e7e4dfcfe4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-ce1baa6ffb742e3e4c86c030e2aaf287.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-ce1baa6ffb742e3e4c86c030e2aaf287 + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b3c7359-4de3-485f-b1b4-9e83b95c7f7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-d5f51941abb9e332fec6da6716857cba.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-d5f51941abb9e332fec6da6716857cba.yaml new file mode 100644 index 0000000000..95b33acdfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-d5f51941abb9e332fec6da6716857cba.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-d5f51941abb9e332fec6da6716857cba + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.2 - Authenticated (Subscriber+) PHP Object Injection via auxin_template_control_importer + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0882205-3037-4ada-9e44-ddd55d88fcb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-d69e955ab6caeeb527fcd68ff48fdaa2.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-d69e955ab6caeeb527fcd68ff48fdaa2.yaml new file mode 100644 index 0000000000..5d135efa53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-d69e955ab6caeeb527fcd68ff48fdaa2.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-d69e955ab6caeeb527fcd68ff48fdaa2 + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.9.7 - Reflected Cross-Site-Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/101a3dfd-101e-4ae2-85d1-a6b3c9d6ca71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-d7661df8620c7b906e4301d69849100f.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-d7661df8620c7b906e4301d69849100f.yaml new file mode 100644 index 0000000000..f68487cca8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-d7661df8620c7b906e4301d69849100f.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-d7661df8620c7b906e4301d69849100f + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85551ba1-6d6e-47a0-864f-f9d0a0a11056?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-elements-efcaa0147762fa54393728f49e9affeb.yaml b/nuclei-templates/cve-less/plugins/auxin-elements-efcaa0147762fa54393728f49e9affeb.yaml new file mode 100644 index 0000000000..5a1802db20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-elements-efcaa0147762fa54393728f49e9affeb.yaml @@ -0,0 +1,58 @@ +id: auxin-elements-efcaa0147762fa54393728f49e9affeb + +info: + name: > + Shortcodes and extra features for Phlox theme <= 2.15.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom JS + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e9324ba-1cbf-4326-80b5-7b9d969441ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-elements/" + google-query: inurl:"/wp-content/plugins/auxin-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-portfolio-bd574799289bf82115af4f7319ebe51c.yaml b/nuclei-templates/cve-less/plugins/auxin-portfolio-bd574799289bf82115af4f7319ebe51c.yaml new file mode 100644 index 0000000000..7fad590193 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-portfolio-bd574799289bf82115af4f7319ebe51c.yaml @@ -0,0 +1,58 @@ +id: auxin-portfolio-bd574799289bf82115af4f7319ebe51c + +info: + name: > + Phlox Portfolio <= 2.3.1 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f3f82e-6b1b-4138-b8f3-82e8dcd24479?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-portfolio/" + google-query: inurl:"/wp-content/plugins/auxin-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-portfolio,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auxin-shop-e3bcf24a15914a9cc834e70ea4b9adc8.yaml b/nuclei-templates/cve-less/plugins/auxin-shop-e3bcf24a15914a9cc834e70ea4b9adc8.yaml new file mode 100644 index 0000000000..7b73ad67c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auxin-shop-e3bcf24a15914a9cc834e70ea4b9adc8.yaml @@ -0,0 +1,58 @@ +id: auxin-shop-e3bcf24a15914a9cc834e70ea4b9adc8 + +info: + name: > + Phlox Shop <= 2.0.0 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e11e4bab-f8a9-4ecb-b36e-09a55e47f1ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auxin-shop/" + google-query: inurl:"/wp-content/plugins/auxin-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auxin-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auxin-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auxin-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/auyautochat-for-wp-1c7bd7b413a535860c5a3694b104e04c.yaml b/nuclei-templates/cve-less/plugins/auyautochat-for-wp-1c7bd7b413a535860c5a3694b104e04c.yaml new file mode 100644 index 0000000000..6e5fd554a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/auyautochat-for-wp-1c7bd7b413a535860c5a3694b104e04c.yaml @@ -0,0 +1,58 @@ +id: auyautochat-for-wp-1c7bd7b413a535860c5a3694b104e04c + +info: + name: > + Autochat Automatic Conversation <= 1.1.7 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9ad533d-4ec0-42a0-99fc-75fc59498c94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/auyautochat-for-wp/" + google-query: inurl:"/wp-content/plugins/auyautochat-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,auyautochat-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/auyautochat-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auyautochat-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/availability-calendar-1fa01304932da158500562eabc5ce5d0.yaml b/nuclei-templates/cve-less/plugins/availability-calendar-1fa01304932da158500562eabc5ce5d0.yaml new file mode 100644 index 0000000000..5cd9feaa50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/availability-calendar-1fa01304932da158500562eabc5ce5d0.yaml @@ -0,0 +1,58 @@ +id: availability-calendar-1fa01304932da158500562eabc5ce5d0 + +info: + name: > + Availability Calendar <= 1.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f46ab3d-83fc-46a2-863e-7ce9b5391524?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/availability-calendar/" + google-query: inurl:"/wp-content/plugins/availability-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,availability-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/availability-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "availability-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/availability-calendar-3850f9fd40f943ca2e9ea3445b1f1e23.yaml b/nuclei-templates/cve-less/plugins/availability-calendar-3850f9fd40f943ca2e9ea3445b1f1e23.yaml new file mode 100644 index 0000000000..696e6be391 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/availability-calendar-3850f9fd40f943ca2e9ea3445b1f1e23.yaml @@ -0,0 +1,58 @@ +id: availability-calendar-3850f9fd40f943ca2e9ea3445b1f1e23 + +info: + name: > + Availability Calendar < 1.2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca9bd3a-2489-4672-95c1-9e00d60d6525?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/availability-calendar/" + google-query: inurl:"/wp-content/plugins/availability-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,availability-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/availability-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "availability-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/availability-calendar-562eae7f881850beb009ee88869dd234.yaml b/nuclei-templates/cve-less/plugins/availability-calendar-562eae7f881850beb009ee88869dd234.yaml new file mode 100644 index 0000000000..7b135b3d22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/availability-calendar-562eae7f881850beb009ee88869dd234.yaml @@ -0,0 +1,58 @@ +id: availability-calendar-562eae7f881850beb009ee88869dd234 + +info: + name: > + Availability Calendar <= 1.2.6 - Cross-Site Request Forgery via add_availability_calendar_create_admin_page() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b13388b-19f9-4f5c-9599-efd6ccf978c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/availability-calendar/" + google-query: inurl:"/wp-content/plugins/availability-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,availability-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/availability-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "availability-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/avalex-00e15cae549764aa48f28dd7ae0bb1cd.yaml b/nuclei-templates/cve-less/plugins/avalex-00e15cae549764aa48f28dd7ae0bb1cd.yaml new file mode 100644 index 0000000000..ea8a661033 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/avalex-00e15cae549764aa48f28dd7ae0bb1cd.yaml @@ -0,0 +1,58 @@ +id: avalex-00e15cae549764aa48f28dd7ae0bb1cd + +info: + name: > + avalex – Automatisch sichere Rechtstexte <= 3.0.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7319293e-f921-46d1-aea6-2578d1a251a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/avalex/" + google-query: inurl:"/wp-content/plugins/avalex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,avalex,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/avalex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "avalex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/avalex-9bcf1b21f2afb149521c1b2b2eae8a87.yaml b/nuclei-templates/cve-less/plugins/avalex-9bcf1b21f2afb149521c1b2b2eae8a87.yaml new file mode 100644 index 0000000000..1cf02c3ff9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/avalex-9bcf1b21f2afb149521c1b2b2eae8a87.yaml @@ -0,0 +1,58 @@ +id: avalex-9bcf1b21f2afb149521c1b2b2eae8a87 + +info: + name: > + avalex – Automatisch sichere Rechtstexte <= 3.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a76b224-9b55-4294-8a04-44c94a3115f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/avalex/" + google-query: inurl:"/wp-content/plugins/avalex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,avalex,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/avalex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "avalex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/avartan-slider-lite-d11978412fa07cd9d2358fa468a9d42e.yaml b/nuclei-templates/cve-less/plugins/avartan-slider-lite-d11978412fa07cd9d2358fa468a9d42e.yaml new file mode 100644 index 0000000000..6d8a6951fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/avartan-slider-lite-d11978412fa07cd9d2358fa468a9d42e.yaml @@ -0,0 +1,58 @@ +id: avartan-slider-lite-d11978412fa07cd9d2358fa468a9d42e + +info: + name: > + Avartan Slider Lite <= 1.5.3 - Reflected Cross-Site Scripting via 'asview-nouce' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e78116a6-5ce5-4567-95d4-2c19fc1b085a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/avartan-slider-lite/" + google-query: inurl:"/wp-content/plugins/avartan-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,avartan-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/avartan-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "avartan-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/avchat-3-417e197336cd9f9a0d5cd9505aacac7b.yaml b/nuclei-templates/cve-less/plugins/avchat-3-417e197336cd9f9a0d5cd9505aacac7b.yaml new file mode 100644 index 0000000000..afad1e984a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/avchat-3-417e197336cd9f9a0d5cd9505aacac7b.yaml @@ -0,0 +1,58 @@ +id: avchat-3-417e197336cd9f9a0d5cd9505aacac7b + +info: + name: > + Community Lite Video Chat < 1.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c830689-70bd-42cc-a385-fe8552f342a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/avchat-3/" + google-query: inurl:"/wp-content/plugins/avchat-3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,avchat-3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/avchat-3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "avchat-3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/avcp-28b0382bdb3605846c741b0b29e57d1e.yaml b/nuclei-templates/cve-less/plugins/avcp-28b0382bdb3605846c741b0b29e57d1e.yaml new file mode 100644 index 0000000000..2addd2eeee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/avcp-28b0382bdb3605846c741b0b29e57d1e.yaml @@ -0,0 +1,58 @@ +id: avcp-28b0382bdb3605846c741b0b29e57d1e + +info: + name: > + ANAC XML Bandi di Gara <= 7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/101945f6-d709-4c99-8c80-def9dd2fa636?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/avcp/" + google-query: inurl:"/wp-content/plugins/avcp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,avcp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/avcp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "avcp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/avenirsoft-directdownload-3231c8774c4d66bff9d3f46fb317e754.yaml b/nuclei-templates/cve-less/plugins/avenirsoft-directdownload-3231c8774c4d66bff9d3f46fb317e754.yaml new file mode 100644 index 0000000000..03e7ba3b33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/avenirsoft-directdownload-3231c8774c4d66bff9d3f46fb317e754.yaml @@ -0,0 +1,58 @@ +id: avenirsoft-directdownload-3231c8774c4d66bff9d3f46fb317e754 + +info: + name: > + Avenir-soft Direct Download <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78823184-e90a-4f5c-9f08-5ffc22787f16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/avenirsoft-directdownload/" + google-query: inurl:"/wp-content/plugins/avenirsoft-directdownload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,avenirsoft-directdownload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/avenirsoft-directdownload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "avenirsoft-directdownload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aviary-image-editor-add-on-for-gravity-forms-2837065b3a48acc8f4f2b3e0459274f1.yaml b/nuclei-templates/cve-less/plugins/aviary-image-editor-add-on-for-gravity-forms-2837065b3a48acc8f4f2b3e0459274f1.yaml new file mode 100644 index 0000000000..36e9239819 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aviary-image-editor-add-on-for-gravity-forms-2837065b3a48acc8f4f2b3e0459274f1.yaml @@ -0,0 +1,58 @@ +id: aviary-image-editor-add-on-for-gravity-forms-2837065b3a48acc8f4f2b3e0459274f1 + +info: + name: > + Aviary Image Editor Add-on For Gravity Forms <= 3.0 (Beta r7) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51d3c250-301c-4f91-9fe5-56879a65fde7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aviary-image-editor-add-on-for-gravity-forms/" + google-query: inurl:"/wp-content/plugins/aviary-image-editor-add-on-for-gravity-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aviary-image-editor-add-on-for-gravity-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aviary-image-editor-add-on-for-gravity-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aviary-image-editor-add-on-for-gravity-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0 (Beta r7)') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/avirato-calendar-f27c37237edad62fdf365ba901d07da8.yaml b/nuclei-templates/cve-less/plugins/avirato-calendar-f27c37237edad62fdf365ba901d07da8.yaml new file mode 100644 index 0000000000..2435a36b9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/avirato-calendar-f27c37237edad62fdf365ba901d07da8.yaml @@ -0,0 +1,58 @@ +id: avirato-calendar-f27c37237edad62fdf365ba901d07da8 + +info: + name: > + Avirato hotels online booking engine <= 5.0.5 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b62fb1a8-d62d-4d1f-bcce-a081432b9e61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/avirato-calendar/" + google-query: inurl:"/wp-content/plugins/avirato-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,avirato-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/avirato-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "avirato-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aweber-web-form-widget-16c74e447f178d9a81be3266e07ecdda.yaml b/nuclei-templates/cve-less/plugins/aweber-web-form-widget-16c74e447f178d9a81be3266e07ecdda.yaml new file mode 100644 index 0000000000..d7769886eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aweber-web-form-widget-16c74e447f178d9a81be3266e07ecdda.yaml @@ -0,0 +1,58 @@ +id: aweber-web-form-widget-16c74e447f178d9a81be3266e07ecdda + +info: + name: > + AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth By AWeber <= 7.3.14 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ae3bca-d363-4c4b-809f-0625385bc9a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aweber-web-form-widget/" + google-query: inurl:"/wp-content/plugins/aweber-web-form-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aweber-web-form-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aweber-web-form-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aweber-web-form-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aweber-web-form-widget-cbc652a67aafb71a7a53197a032b3a41.yaml b/nuclei-templates/cve-less/plugins/aweber-web-form-widget-cbc652a67aafb71a7a53197a032b3a41.yaml new file mode 100644 index 0000000000..bf5c06f6f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aweber-web-form-widget-cbc652a67aafb71a7a53197a032b3a41.yaml @@ -0,0 +1,58 @@ +id: aweber-web-form-widget-cbc652a67aafb71a7a53197a032b3a41 + +info: + name: > + AWeber <= 7.3.9 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/397f20d8-2400-4403-8543-f57141378012?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aweber-web-form-widget/" + google-query: inurl:"/wp-content/plugins/aweber-web-form-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aweber-web-form-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aweber-web-form-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aweber-web-form-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-18b2efc80a79b2c683b250abf8605dd3.yaml b/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-18b2efc80a79b2c683b250abf8605dd3.yaml new file mode 100644 index 0000000000..25bb17421e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-18b2efc80a79b2c683b250abf8605dd3.yaml @@ -0,0 +1,58 @@ +id: awesome-filterable-portfolio-18b2efc80a79b2c683b250abf8605dd3 + +info: + name: > + Awesome Filterable Portfolio < 1.9 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bea1f918-d966-4214-8331-e389e4080ca5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-filterable-portfolio/" + google-query: inurl:"/wp-content/plugins/awesome-filterable-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-filterable-portfolio,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-filterable-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-filterable-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-d959830a068b86235ba87177aa38047a.yaml b/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-d959830a068b86235ba87177aa38047a.yaml new file mode 100644 index 0000000000..bb99b0708f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-d959830a068b86235ba87177aa38047a.yaml @@ -0,0 +1,58 @@ +id: awesome-filterable-portfolio-d959830a068b86235ba87177aa38047a + +info: + name: > + Awesome Filterable Portfolio < 1.9 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3c36821-f780-4944-95c9-bcf3bbb73da5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-filterable-portfolio/" + google-query: inurl:"/wp-content/plugins/awesome-filterable-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-filterable-portfolio,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-filterable-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-filterable-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-dd607130eb4cdf70c195f7eed039edc6.yaml b/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-dd607130eb4cdf70c195f7eed039edc6.yaml new file mode 100644 index 0000000000..64f5e3fa31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-dd607130eb4cdf70c195f7eed039edc6.yaml @@ -0,0 +1,58 @@ +id: awesome-filterable-portfolio-dd607130eb4cdf70c195f7eed039edc6 + +info: + name: > + Awesome Filterable Portfolio <= 1.9.7 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b37a2260-0791-435d-8413-2bf68c388906?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-filterable-portfolio/" + google-query: inurl:"/wp-content/plugins/awesome-filterable-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-filterable-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-filterable-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-filterable-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-ff6624786e8e60814d172183c9a7bf5f.yaml b/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-ff6624786e8e60814d172183c9a7bf5f.yaml new file mode 100644 index 0000000000..06d95ef4d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-filterable-portfolio-ff6624786e8e60814d172183c9a7bf5f.yaml @@ -0,0 +1,58 @@ +id: awesome-filterable-portfolio-ff6624786e8e60814d172183c9a7bf5f + +info: + name: > + Awesome Filterable Portfolio <= 1.9.7 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fb9ceb4-84a6-41bc-97e4-5e4e12a6ea15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-filterable-portfolio/" + google-query: inurl:"/wp-content/plugins/awesome-filterable-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-filterable-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-filterable-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-filterable-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/awesome-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e6d3684f34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: awesome-ssl-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-ssl/" + google-query: inurl:"/wp-content/plugins/awesome-ssl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-ssl,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-ssl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-ssl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-1dd9869669e4a7c4f20b2235d2df68c5.yaml b/nuclei-templates/cve-less/plugins/awesome-support-1dd9869669e4a7c4f20b2235d2df68c5.yaml new file mode 100644 index 0000000000..6cd99ff10d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-1dd9869669e4a7c4f20b2235d2df68c5.yaml @@ -0,0 +1,58 @@ +id: awesome-support-1dd9869669e4a7c4f20b2235d2df68c5 + +info: + name: > + Awesome Support – WordPress HelpDesk & Support Plugin <= 6.1.7 - Missing Authorization via editor_html() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4358e2a-b7f6-44b6-a38a-5b27cb15e1cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-1f2a06a643f40ca267bd342499fdc692.yaml b/nuclei-templates/cve-less/plugins/awesome-support-1f2a06a643f40ca267bd342499fdc692.yaml new file mode 100644 index 0000000000..38d9e450f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-1f2a06a643f40ca267bd342499fdc692.yaml @@ -0,0 +1,58 @@ +id: awesome-support-1f2a06a643f40ca267bd342499fdc692 + +info: + name: > + Awesome Support <= 6.0.7 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9771d688-9c96-4ffb-823e-dcdf8b1cbc51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-266ba42edca3ad9aefeac2a819615d83.yaml b/nuclei-templates/cve-less/plugins/awesome-support-266ba42edca3ad9aefeac2a819615d83.yaml new file mode 100644 index 0000000000..3f6a20a0bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-266ba42edca3ad9aefeac2a819615d83.yaml @@ -0,0 +1,58 @@ +id: awesome-support-266ba42edca3ad9aefeac2a819615d83 + +info: + name: > + Awesome Support – WordPress HelpDesk & Support Plugin < 3.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8faecb99-df49-40b5-a5cb-7a8a21cb512c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-41afc2537de7dc4ac1f3ebf67c718802.yaml b/nuclei-templates/cve-less/plugins/awesome-support-41afc2537de7dc4ac1f3ebf67c718802.yaml new file mode 100644 index 0000000000..a94bfdc127 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-41afc2537de7dc4ac1f3ebf67c718802.yaml @@ -0,0 +1,58 @@ +id: awesome-support-41afc2537de7dc4ac1f3ebf67c718802 + +info: + name: > + Awesome Support – WordPress HelpDesk & Support Plugin <= 3.1.6 - Arbitrary Shortcode Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd7916f3-7844-4f3f-87ae-a8a66a9f3dec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-44e9c5f94ff15d80337fbc26acc2f9ad.yaml b/nuclei-templates/cve-less/plugins/awesome-support-44e9c5f94ff15d80337fbc26acc2f9ad.yaml new file mode 100644 index 0000000000..919576a7f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-44e9c5f94ff15d80337fbc26acc2f9ad.yaml @@ -0,0 +1,58 @@ +id: awesome-support-44e9c5f94ff15d80337fbc26acc2f9ad + +info: + name: > + Awesome Support <= 6.1.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd9f1385-6457-4bc9-9c75-0fcd399a5956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/awesome-support-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..1870df95d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: awesome-support-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-4d46668ff9f00851738b6095ebac210e.yaml b/nuclei-templates/cve-less/plugins/awesome-support-4d46668ff9f00851738b6095ebac210e.yaml new file mode 100644 index 0000000000..a02de69fba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-4d46668ff9f00851738b6095ebac210e.yaml @@ -0,0 +1,58 @@ +id: awesome-support-4d46668ff9f00851738b6095ebac210e + +info: + name: > + Awesome Support <= 6.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d69915e9-af9b-4c07-ac43-21c6e350c3c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-57028c13cec1060b66617f5f07c85c6f.yaml b/nuclei-templates/cve-less/plugins/awesome-support-57028c13cec1060b66617f5f07c85c6f.yaml new file mode 100644 index 0000000000..ff8ec3054b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-57028c13cec1060b66617f5f07c85c6f.yaml @@ -0,0 +1,58 @@ +id: awesome-support-57028c13cec1060b66617f5f07c85c6f + +info: + name: > + Awesome Support <= 6.1.6 - Insufficient Authorization via wpas_can_delete_attachments() + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffb8a285-43c6-4956-ad37-484269463b2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-8712cc1632e225c594b19df34ae596ee.yaml b/nuclei-templates/cve-less/plugins/awesome-support-8712cc1632e225c594b19df34ae596ee.yaml new file mode 100644 index 0000000000..e4277c3f16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-8712cc1632e225c594b19df34ae596ee.yaml @@ -0,0 +1,58 @@ +id: awesome-support-8712cc1632e225c594b19df34ae596ee + +info: + name: > + Awesome Support <= 6.1.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbb59e76-5256-4883-b9cf-7c336b4ff8a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-89ce07ac930dc51991979cb98280bbb8.yaml b/nuclei-templates/cve-less/plugins/awesome-support-89ce07ac930dc51991979cb98280bbb8.yaml new file mode 100644 index 0000000000..0af4f603ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-89ce07ac930dc51991979cb98280bbb8.yaml @@ -0,0 +1,58 @@ +id: awesome-support-89ce07ac930dc51991979cb98280bbb8 + +info: + name: > + Awesome Support <= 6.1.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a162132a-f893-42fa-85f1-b42f738891a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-938da0cde8319acbc8cd634349637fad.yaml b/nuclei-templates/cve-less/plugins/awesome-support-938da0cde8319acbc8cd634349637fad.yaml new file mode 100644 index 0000000000..16f0039188 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-938da0cde8319acbc8cd634349637fad.yaml @@ -0,0 +1,58 @@ +id: awesome-support-938da0cde8319acbc8cd634349637fad + +info: + name: > + Awesome Support – WordPress HelpDesk & Support Plugin <= 6.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eba7ab33-bcb6-4ada-ae5f-0df758fc719a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-95ed715a05e3d26da6f74ccbd6ab85ad.yaml b/nuclei-templates/cve-less/plugins/awesome-support-95ed715a05e3d26da6f74ccbd6ab85ad.yaml new file mode 100644 index 0000000000..d3d5b60153 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-95ed715a05e3d26da6f74ccbd6ab85ad.yaml @@ -0,0 +1,58 @@ +id: awesome-support-95ed715a05e3d26da6f74ccbd6ab85ad + +info: + name: > + Awesome Support <= 6.1.4 - Cross-Site Request Forgery via wpas_edit_reply_ajax() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/579b887a-4140-4e12-9a9a-ba52d212b8a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-b26029d3fea40b72701a527b04841a5f.yaml b/nuclei-templates/cve-less/plugins/awesome-support-b26029d3fea40b72701a527b04841a5f.yaml new file mode 100644 index 0000000000..a94946c969 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-b26029d3fea40b72701a527b04841a5f.yaml @@ -0,0 +1,58 @@ +id: awesome-support-b26029d3fea40b72701a527b04841a5f + +info: + name: > + Awesome Support <= 6.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eee27f2c-bc21-4b0f-9de5-da1035c54857?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-b6e9ca61c7913b93778f0505c3d8b45b.yaml b/nuclei-templates/cve-less/plugins/awesome-support-b6e9ca61c7913b93778f0505c3d8b45b.yaml new file mode 100644 index 0000000000..ef4eee8cf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-b6e9ca61c7913b93778f0505c3d8b45b.yaml @@ -0,0 +1,58 @@ +id: awesome-support-b6e9ca61c7913b93778f0505c3d8b45b + +info: + name: > + Awesome Support <= 6.1.5 - Missing Authorization via wpas_load_reply_history + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d713de0-40a4-4926-9942-e5e2bf7434c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-d27639e06760fb0c9830c5a72e87ab5f.yaml b/nuclei-templates/cve-less/plugins/awesome-support-d27639e06760fb0c9830c5a72e87ab5f.yaml new file mode 100644 index 0000000000..329646a1c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-d27639e06760fb0c9830c5a72e87ab5f.yaml @@ -0,0 +1,58 @@ +id: awesome-support-d27639e06760fb0c9830c5a72e87ab5f + +info: + name: > + Awesome Support <= 6.1.4 - Authenticated (Submitter+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f32cd8e4-51bf-4fdf-ae14-155f8661dbdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-d4c78d8203546198e179a467ececd0d8.yaml b/nuclei-templates/cve-less/plugins/awesome-support-d4c78d8203546198e179a467ececd0d8.yaml new file mode 100644 index 0000000000..c80cfa9e3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-d4c78d8203546198e179a467ececd0d8.yaml @@ -0,0 +1,58 @@ +id: awesome-support-d4c78d8203546198e179a467ececd0d8 + +info: + name: > + Awesome Support – WordPress HelpDesk & Support Plugin <= 6.1.7 - Missing Authorization via wpas_get_users() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfb77432-e58d-466e-a366-8b8d7f1b6982?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-de2f88d15a1b5aecd6a16f406646e9a9.yaml b/nuclei-templates/cve-less/plugins/awesome-support-de2f88d15a1b5aecd6a16f406646e9a9.yaml new file mode 100644 index 0000000000..be30e0e756 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-de2f88d15a1b5aecd6a16f406646e9a9.yaml @@ -0,0 +1,58 @@ +id: awesome-support-de2f88d15a1b5aecd6a16f406646e9a9 + +info: + name: > + Awesome Support <= 6.1.4 - Missing Authorization via wpas_edit_reply_ajax() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dec91d7-19cf-480d-871c-427cd1e691a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-e5141ff592bd9997e23b1aad269872cc.yaml b/nuclei-templates/cve-less/plugins/awesome-support-e5141ff592bd9997e23b1aad269872cc.yaml new file mode 100644 index 0000000000..7574603d9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-e5141ff592bd9997e23b1aad269872cc.yaml @@ -0,0 +1,58 @@ +id: awesome-support-e5141ff592bd9997e23b1aad269872cc + +info: + name: > + Awesome Support – WordPress HelpDesk & Support Plugin <= 6.0.13 - Cross-Site Scripting via post_title + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e52f799e-9174-45a2-9ed6-7aedb26b36bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-e5b491b44226f62122b1d1d362aae078.yaml b/nuclei-templates/cve-less/plugins/awesome-support-e5b491b44226f62122b1d1d362aae078.yaml new file mode 100644 index 0000000000..8f9fde4612 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-e5b491b44226f62122b1d1d362aae078.yaml @@ -0,0 +1,58 @@ +id: awesome-support-e5b491b44226f62122b1d1d362aae078 + +info: + name: > + Awesome Support <= 6.1.1 - Insecure Direct Object Reference to (Subscriber+) Ticket Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a94c5e7-a3d6-435b-9d10-0c325a13124f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-support-f3efba04fcdce6cec3efa7cec92aedc6.yaml b/nuclei-templates/cve-less/plugins/awesome-support-f3efba04fcdce6cec3efa7cec92aedc6.yaml new file mode 100644 index 0000000000..e20acba926 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-support-f3efba04fcdce6cec3efa7cec92aedc6.yaml @@ -0,0 +1,58 @@ +id: awesome-support-f3efba04fcdce6cec3efa7cec92aedc6 + +info: + name: > + Awesome Support – WordPress HelpDesk & Support Plugin <= 6.1.7 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8494a0f6-7079-4fba-9901-76932b002c5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-support/" + google-query: inurl:"/wp-content/plugins/awesome-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-weather-24dc0fb35229c989c41ed2754572ea29.yaml b/nuclei-templates/cve-less/plugins/awesome-weather-24dc0fb35229c989c41ed2754572ea29.yaml new file mode 100644 index 0000000000..bc6bb5296a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-weather-24dc0fb35229c989c41ed2754572ea29.yaml @@ -0,0 +1,58 @@ +id: awesome-weather-24dc0fb35229c989c41ed2754572ea29 + +info: + name: > + Awesome Weather Widget <= 3.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf77988-370b-437f-83a0-18a147e3e087?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-weather/" + google-query: inurl:"/wp-content/plugins/awesome-weather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-weather,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-weather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-weather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awesome-weather-906c7d163a05db6b1db16532f52ba291.yaml b/nuclei-templates/cve-less/plugins/awesome-weather-906c7d163a05db6b1db16532f52ba291.yaml new file mode 100644 index 0000000000..6fae3a259e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awesome-weather-906c7d163a05db6b1db16532f52ba291.yaml @@ -0,0 +1,58 @@ +id: awesome-weather-906c7d163a05db6b1db16532f52ba291 + +info: + name: > + Awesome Weather Widget <= 3.0.2 - Reflected Cross-site Scripting via id Parameter + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d261e25-7355-4220-882c-f3266c64252a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awesome-weather/" + google-query: inurl:"/wp-content/plugins/awesome-weather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awesome-weather,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awesome-weather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awesome-weather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awin-data-feed-8c4a0974b3df67f7339b8c6388934e6e.yaml b/nuclei-templates/cve-less/plugins/awin-data-feed-8c4a0974b3df67f7339b8c6388934e6e.yaml new file mode 100644 index 0000000000..bbf03f3a2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awin-data-feed-8c4a0974b3df67f7339b8c6388934e6e.yaml @@ -0,0 +1,58 @@ +id: awin-data-feed-8c4a0974b3df67f7339b8c6388934e6e + +info: + name: > + Awin Data Feed <= 1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c36181aa-39c2-4009-b687-5964a6cc45c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awin-data-feed/" + google-query: inurl:"/wp-content/plugins/awin-data-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awin-data-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awin-data-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awin-data-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/awin-data-feed-b0fddc41ffe057bf823e73bc28d298ac.yaml b/nuclei-templates/cve-less/plugins/awin-data-feed-b0fddc41ffe057bf823e73bc28d298ac.yaml new file mode 100644 index 0000000000..5a41da6fb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/awin-data-feed-b0fddc41ffe057bf823e73bc28d298ac.yaml @@ -0,0 +1,58 @@ +id: awin-data-feed-b0fddc41ffe057bf823e73bc28d298ac + +info: + name: > + Awin Data Feed <= 1.7 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cae284dd-34e0-4dc5-a954-b37935f3cfbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/awin-data-feed/" + google-query: inurl:"/wp-content/plugins/awin-data-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,awin-data-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/awin-data-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awin-data-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/aws-cdn-by-wpadmin-69ff1cf9c2667131344592beac8a2eff.yaml b/nuclei-templates/cve-less/plugins/aws-cdn-by-wpadmin-69ff1cf9c2667131344592beac8a2eff.yaml new file mode 100644 index 0000000000..e3dcba9b4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/aws-cdn-by-wpadmin-69ff1cf9c2667131344592beac8a2eff.yaml @@ -0,0 +1,58 @@ +id: aws-cdn-by-wpadmin-69ff1cf9c2667131344592beac8a2eff + +info: + name: > + WPAdmin AWS CDN <= 2.0.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b039c23-51d4-422a-a57b-59abaeca682c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/aws-cdn-by-wpadmin/" + google-query: inurl:"/wp-content/plugins/aws-cdn-by-wpadmin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,aws-cdn-by-wpadmin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/aws-cdn-by-wpadmin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aws-cdn-by-wpadmin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-6b7b2b04e942b5d2f162bf42039d4c12.yaml b/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-6b7b2b04e942b5d2f162bf42039d4c12.yaml new file mode 100644 index 0000000000..6d755b99ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-6b7b2b04e942b5d2f162bf42039d4c12.yaml @@ -0,0 +1,58 @@ +id: ays-facebook-popup-likebox-6b7b2b04e942b5d2f162bf42039d4c12 + +info: + name: > + Popup Like box <= 3.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e00b187-9a28-45fb-8d4d-e9401d739486?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-facebook-popup-likebox/" + google-query: inurl:"/wp-content/plugins/ays-facebook-popup-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-facebook-popup-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-facebook-popup-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-facebook-popup-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-90c4cbfb7712449319d9759e0ded5087.yaml b/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-90c4cbfb7712449319d9759e0ded5087.yaml new file mode 100644 index 0000000000..332a213112 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-90c4cbfb7712449319d9759e0ded5087.yaml @@ -0,0 +1,58 @@ +id: ays-facebook-popup-likebox-90c4cbfb7712449319d9759e0ded5087 + +info: + name: > + Popup Like box – Page <= 3.7.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87b49bae-05e6-44cd-86a1-8df3249a25f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-facebook-popup-likebox/" + google-query: inurl:"/wp-content/plugins/ays-facebook-popup-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-facebook-popup-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-facebook-popup-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-facebook-popup-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-a5bc98329e35c128c91f3ce8a71c6a41.yaml b/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-a5bc98329e35c128c91f3ce8a71c6a41.yaml new file mode 100644 index 0000000000..0836ffd426 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-a5bc98329e35c128c91f3ce8a71c6a41.yaml @@ -0,0 +1,58 @@ +id: ays-facebook-popup-likebox-a5bc98329e35c128c91f3ce8a71c6a41 + +info: + name: > + Popup Like box – Page Plugin <= 3.5.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a713c7d3-06ce-4d65-9766-2b0331656ae6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-facebook-popup-likebox/" + google-query: inurl:"/wp-content/plugins/ays-facebook-popup-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-facebook-popup-likebox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-facebook-popup-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-facebook-popup-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-c5dca15da955e97b5160cc77880cc971.yaml b/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-c5dca15da955e97b5160cc77880cc971.yaml new file mode 100644 index 0000000000..0f788c13ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-facebook-popup-likebox-c5dca15da955e97b5160cc77880cc971.yaml @@ -0,0 +1,58 @@ +id: ays-facebook-popup-likebox-c5dca15da955e97b5160cc77880cc971 + +info: + name: > + Popup Like box – Page Plugin < 3.5.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1df74d3d-b7c9-4cf8-b1a7-d2b0b4f706d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-facebook-popup-likebox/" + google-query: inurl:"/wp-content/plugins/ays-facebook-popup-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-facebook-popup-likebox,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-facebook-popup-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-facebook-popup-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-248e31ef2c55014a53d3afdb1f6ae07b.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-248e31ef2c55014a53d3afdb1f6ae07b.yaml new file mode 100644 index 0000000000..b34b8411e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-248e31ef2c55014a53d3afdb1f6ae07b.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-248e31ef2c55014a53d3afdb1f6ae07b + +info: + name: > + Popup Box <= 3.8.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22ff0b0c-ffd9-4aae-9e49-069fd1b47f17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-4f73bdbdeaed18569d9edce85c2c628c.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-4f73bdbdeaed18569d9edce85c2c628c.yaml new file mode 100644 index 0000000000..c77fa70255 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-4f73bdbdeaed18569d9edce85c2c628c.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-4f73bdbdeaed18569d9edce85c2c628c + +info: + name: > + Popup Box Pro < 20.9.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27a36e90-9678-4832-9f37-b54fe75f5571?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 7.0.0', '<= 20.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-5174039d89c7d18d794fb10cf1a282f0.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-5174039d89c7d18d794fb10cf1a282f0.yaml new file mode 100644 index 0000000000..e176e2d1af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-5174039d89c7d18d794fb10cf1a282f0.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-5174039d89c7d18d794fb10cf1a282f0 + +info: + name: > + Popup Box <= 3.7.0 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1289ead7-1af1-417d-aa47-7d07268f956c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-5d4640c4264ffacd4152e50de3f3f317.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-5d4640c4264ffacd4152e50de3f3f317.yaml new file mode 100644 index 0000000000..23927c3483 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-5d4640c4264ffacd4152e50de3f3f317.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-5d4640c4264ffacd4152e50de3f3f317 + +info: + name: > + Popup box <= 3.4.4 - Reflected Cross-Site Scripting via 'ays_pb_tab' Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01f60df7-0602-4a00-9905-a91348811dfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-5f0f062620e3c5241de7c7fa9457553a.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-5f0f062620e3c5241de7c7fa9457553a.yaml new file mode 100644 index 0000000000..5b5cf6b184 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-5f0f062620e3c5241de7c7fa9457553a.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-5f0f062620e3c5241de7c7fa9457553a + +info: + name: > + Popup box <= 4.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffae2808-454e-4380-af83-b181cf2e8fbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-74192cf75d7a306906b056f839712e82.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-74192cf75d7a306906b056f839712e82.yaml new file mode 100644 index 0000000000..561bedcf21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-74192cf75d7a306906b056f839712e82.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-74192cf75d7a306906b056f839712e82 + +info: + name: > + Popup Box – Best WordPress Popup Plugin <= 4.3.6 - Missing Authorization to Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e71e3624-ccda-4c9c-90e9-e557dd19b644?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-8198c675532e8f307d66f6e19540bf63.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-8198c675532e8f307d66f6e19540bf63.yaml new file mode 100644 index 0000000000..bd7dda8570 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-8198c675532e8f307d66f6e19540bf63.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-8198c675532e8f307d66f6e19540bf63 + +info: + name: > + Popup box < 2.3.4 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edacede9-8a31-4d7f-b075-8265e3bbe2d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-838e3be64c22dc1203b2c46a22794d70.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-838e3be64c22dc1203b2c46a22794d70.yaml new file mode 100644 index 0000000000..7261a27ce0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-838e3be64c22dc1203b2c46a22794d70.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-838e3be64c22dc1203b2c46a22794d70 + +info: + name: > + Popup Box <= 3.8.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a40bac7-d3b8-486d-938a-30591ff3016c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-c01322d993d29040f70fca990f38339c.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-c01322d993d29040f70fca990f38339c.yaml new file mode 100644 index 0000000000..ca469b8a7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-c01322d993d29040f70fca990f38339c.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-c01322d993d29040f70fca990f38339c + +info: + name: > + Popup Box – Best WordPress Popup Plugin <= 3.7.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b947bd68-2dfa-4637-8f10-39c283fdac70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-c5104058a36ba87cb65f65ec0059bc5e.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-c5104058a36ba87cb65f65ec0059bc5e.yaml new file mode 100644 index 0000000000..1cca7d1bab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-c5104058a36ba87cb65f65ec0059bc5e.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-c5104058a36ba87cb65f65ec0059bc5e + +info: + name: > + Popup box <= 2.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c68cf18-0210-452f-933e-6f1e50323b15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-popup-box-ffda73ee0ac47c439700ae8ebfad208d.yaml b/nuclei-templates/cve-less/plugins/ays-popup-box-ffda73ee0ac47c439700ae8ebfad208d.yaml new file mode 100644 index 0000000000..4b5a70ec0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-popup-box-ffda73ee0ac47c439700ae8ebfad208d.yaml @@ -0,0 +1,58 @@ +id: ays-popup-box-ffda73ee0ac47c439700ae8ebfad208d + +info: + name: > + Popup Box <= 3.7.1 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6dbbb52-4202-4d69-837f-c7d5ca06fab5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-popup-box/" + google-query: inurl:"/wp-content/plugins/ays-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-slider-46069454c6ba944e642bfecf69aa0fc3.yaml b/nuclei-templates/cve-less/plugins/ays-slider-46069454c6ba944e642bfecf69aa0fc3.yaml new file mode 100644 index 0000000000..16f6a26b64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-slider-46069454c6ba944e642bfecf69aa0fc3.yaml @@ -0,0 +1,58 @@ +id: ays-slider-46069454c6ba944e642bfecf69aa0fc3 + +info: + name: > + Image Slider by Ays- Responsive Slider and Carousel < 2.5.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a522fb0b-ce75-4593-90dd-f7c04d2ba9e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-slider/" + google-query: inurl:"/wp-content/plugins/ays-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-slider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ays-slider-e3798772f56ed41206446ba8085ca086.yaml b/nuclei-templates/cve-less/plugins/ays-slider-e3798772f56ed41206446ba8085ca086.yaml new file mode 100644 index 0000000000..88cd795bef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ays-slider-e3798772f56ed41206446ba8085ca086.yaml @@ -0,0 +1,58 @@ +id: ays-slider-e3798772f56ed41206446ba8085ca086 + +info: + name: > + Image Slider by Ays- Responsive Slider and Carousel <= 2.4.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afb032da-11cc-4272-be68-60b6ca6e6ca3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ays-slider/" + google-query: inurl:"/wp-content/plugins/ays-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ays-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ays-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ays-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/azw-woocommerce-file-uploads-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/azw-woocommerce-file-uploads-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b00386b78d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/azw-woocommerce-file-uploads-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: azw-woocommerce-file-uploads-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/azw-woocommerce-file-uploads/" + google-query: inurl:"/wp-content/plugins/azw-woocommerce-file-uploads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,azw-woocommerce-file-uploads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/azw-woocommerce-file-uploads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "azw-woocommerce-file-uploads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/b-slider-f176e53a42ca2011d6f5c8a03ade6f30.yaml b/nuclei-templates/cve-less/plugins/b-slider-f176e53a42ca2011d6f5c8a03ade6f30.yaml new file mode 100644 index 0000000000..53525d6b8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/b-slider-f176e53a42ca2011d6f5c8a03ade6f30.yaml @@ -0,0 +1,58 @@ +id: b-slider-f176e53a42ca2011d6f5c8a03ade6f30 + +info: + name: > + B Slider - Slider for your block editor <= 1.1.12 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cfe91e6-238b-4652-892c-0016c1330088?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/b-slider/" + google-query: inurl:"/wp-content/plugins/b-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,b-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/b-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "b-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/b2bking-wholesale-for-woocommerce-5676c8d193c6c7c7c19f827a6027fe03.yaml b/nuclei-templates/cve-less/plugins/b2bking-wholesale-for-woocommerce-5676c8d193c6c7c7c19f827a6027fe03.yaml new file mode 100644 index 0000000000..97a405590a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/b2bking-wholesale-for-woocommerce-5676c8d193c6c7c7c19f827a6027fe03.yaml @@ -0,0 +1,58 @@ +id: b2bking-wholesale-for-woocommerce-5676c8d193c6c7c7c19f827a6027fe03 + +info: + name: > + B2BKing <= 4.6.00 - Missing Authorization to Authenticated(Subscriber+) Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2e3ac14-1421-49f0-9c60-7f7d5c9d7654?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/b2bking-wholesale-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/b2bking-wholesale-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,b2bking-wholesale-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/b2bking-wholesale-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "b2bking-wholesale-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/b2bking-wholesale-for-woocommerce-eef58a96354df2086d4576efe4313ff1.yaml b/nuclei-templates/cve-less/plugins/b2bking-wholesale-for-woocommerce-eef58a96354df2086d4576efe4313ff1.yaml new file mode 100644 index 0000000000..94d95bdc20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/b2bking-wholesale-for-woocommerce-eef58a96354df2086d4576efe4313ff1.yaml @@ -0,0 +1,58 @@ +id: b2bking-wholesale-for-woocommerce-eef58a96354df2086d4576efe4313ff1 + +info: + name: > + B2BKing <= 4.6.00 - Missing Authorization to Authenticated(Subscriber+) Price Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f2c4c3-73d6-4b3b-8eb3-c494f52dc183?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/b2bking-wholesale-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/b2bking-wholesale-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,b2bking-wholesale-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/b2bking-wholesale-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "b2bking-wholesale-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ba-book-everything-08de41cb2b0c0b28a5deead53bb308d8.yaml b/nuclei-templates/cve-less/plugins/ba-book-everything-08de41cb2b0c0b28a5deead53bb308d8.yaml new file mode 100644 index 0000000000..b50213b92b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ba-book-everything-08de41cb2b0c0b28a5deead53bb308d8.yaml @@ -0,0 +1,58 @@ +id: ba-book-everything-08de41cb2b0c0b28a5deead53bb308d8 + +info: + name: > + BA Book Everything <= 1.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ce06d3-491e-4565-8b26-f33937aee3e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ba-book-everything/" + google-query: inurl:"/wp-content/plugins/ba-book-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ba-book-everything,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ba-book-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ba-book-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ba-book-everything-32308cb2a86eba1af06f28c633448e1e.yaml b/nuclei-templates/cve-less/plugins/ba-book-everything-32308cb2a86eba1af06f28c633448e1e.yaml new file mode 100644 index 0000000000..b150dc9c3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ba-book-everything-32308cb2a86eba1af06f28c633448e1e.yaml @@ -0,0 +1,58 @@ +id: ba-book-everything-32308cb2a86eba1af06f28c633448e1e + +info: + name: > + BA Book Everything <= 1.6.4 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/107c82fa-fcb1-40df-9c53-bc8f23810f2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ba-book-everything/" + google-query: inurl:"/wp-content/plugins/ba-book-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ba-book-everything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ba-book-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ba-book-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ba-book-everything-4012f134749539452de47052e41b95bf.yaml b/nuclei-templates/cve-less/plugins/ba-book-everything-4012f134749539452de47052e41b95bf.yaml new file mode 100644 index 0000000000..6179249bf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ba-book-everything-4012f134749539452de47052e41b95bf.yaml @@ -0,0 +1,58 @@ +id: ba-book-everything-4012f134749539452de47052e41b95bf + +info: + name: > + BA Book Everything <= 1.6.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad374338-2bf4-4322-be5e-b4fe07acf80d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ba-book-everything/" + google-query: inurl:"/wp-content/plugins/ba-book-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ba-book-everything,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ba-book-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ba-book-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ba-book-everything-e548c20619f1bf8ad1418368ebd16e42.yaml b/nuclei-templates/cve-less/plugins/ba-book-everything-e548c20619f1bf8ad1418368ebd16e42.yaml new file mode 100644 index 0000000000..aab1827aac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ba-book-everything-e548c20619f1bf8ad1418368ebd16e42.yaml @@ -0,0 +1,58 @@ +id: ba-book-everything-e548c20619f1bf8ad1418368ebd16e42 + +info: + name: > + BA Book Everything Plugin < 1.3.25 - Cross-Site Scripting and Cross-Frame Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37f47ce1-0657-414d-a491-99f2722a44f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ba-book-everything/" + google-query: inurl:"/wp-content/plugins/ba-book-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ba-book-everything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ba-book-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ba-book-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ba-plus-before-after-image-slider-free-a65ff3a4b26159a2c4e25124ed20b089.yaml b/nuclei-templates/cve-less/plugins/ba-plus-before-after-image-slider-free-a65ff3a4b26159a2c4e25124ed20b089.yaml new file mode 100644 index 0000000000..c8e25ce179 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ba-plus-before-after-image-slider-free-a65ff3a4b26159a2c4e25124ed20b089.yaml @@ -0,0 +1,58 @@ +id: ba-plus-before-after-image-slider-free-a65ff3a4b26159a2c4e25124ed20b089 + +info: + name: > + BA Plus <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ab6f54d-0358-4f0c-aba5-b4053e1a345d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ba-plus-before-after-image-slider-free/" + google-query: inurl:"/wp-content/plugins/ba-plus-before-after-image-slider-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ba-plus-before-after-image-slider-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ba-plus-before-after-image-slider-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ba-plus-before-after-image-slider-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/back-button-widget-9a6e06a6f52e0f7856e09ef8ac51eff2.yaml b/nuclei-templates/cve-less/plugins/back-button-widget-9a6e06a6f52e0f7856e09ef8ac51eff2.yaml new file mode 100644 index 0000000000..000cc5e053 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/back-button-widget-9a6e06a6f52e0f7856e09ef8ac51eff2.yaml @@ -0,0 +1,58 @@ +id: back-button-widget-9a6e06a6f52e0f7856e09ef8ac51eff2 + +info: + name: > + Back Button Widget <= 1.6.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcd28bc3-f893-4eb7-946f-34a2e9c7ff27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/back-button-widget/" + google-query: inurl:"/wp-content/plugins/back-button-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,back-button-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/back-button-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "back-button-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/back-in-stock-notifier-for-woocommerce-c6eded4721823fad177e3bbf3127c4c2.yaml b/nuclei-templates/cve-less/plugins/back-in-stock-notifier-for-woocommerce-c6eded4721823fad177e3bbf3127c4c2.yaml new file mode 100644 index 0000000000..e76da7a488 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/back-in-stock-notifier-for-woocommerce-c6eded4721823fad177e3bbf3127c4c2.yaml @@ -0,0 +1,58 @@ +id: back-in-stock-notifier-for-woocommerce-c6eded4721823fad177e3bbf3127c4c2 + +info: + name: > + Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro <= 5.3.1 - Unauthenticated Arbitrary Shortcode Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7f59489-9bff-4d22-8f99-6ea52d702ecf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/back-in-stock-notifier-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/back-in-stock-notifier-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,back-in-stock-notifier-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/back-in-stock-notifier-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "back-in-stock-notifier-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/back-to-the-top-button-0adc72a8beddf445761ccd2b42cda0f5.yaml b/nuclei-templates/cve-less/plugins/back-to-the-top-button-0adc72a8beddf445761ccd2b42cda0f5.yaml new file mode 100644 index 0000000000..c3a09b566d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/back-to-the-top-button-0adc72a8beddf445761ccd2b42cda0f5.yaml @@ -0,0 +1,58 @@ +id: back-to-the-top-button-0adc72a8beddf445761ccd2b42cda0f5 + +info: + name: > + Back To The Top Button <= 2.1.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed8cd92a-c791-4781-a7bc-9b2a4d559d7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/back-to-the-top-button/" + google-query: inurl:"/wp-content/plugins/back-to-the-top-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,back-to-the-top-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/back-to-the-top-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "back-to-the-top-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backend-designer-8a00d4110806870e5118fa117a1c5da6.yaml b/nuclei-templates/cve-less/plugins/backend-designer-8a00d4110806870e5118fa117a1c5da6.yaml new file mode 100644 index 0000000000..58a2cd3a78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backend-designer-8a00d4110806870e5118fa117a1c5da6.yaml @@ -0,0 +1,58 @@ +id: backend-designer-8a00d4110806870e5118fa117a1c5da6 + +info: + name: > + Backend Designer <= 1.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0829035-7782-456d-acd5-639051d7ebc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backend-designer/" + google-query: inurl:"/wp-content/plugins/backend-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backend-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backend-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backend-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-31705d92f5b0540e46103bf0e8f5290e.yaml b/nuclei-templates/cve-less/plugins/backup-31705d92f5b0540e46103bf0e8f5290e.yaml new file mode 100644 index 0000000000..4edb0b12d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-31705d92f5b0540e46103bf0e8f5290e.yaml @@ -0,0 +1,58 @@ +id: backup-31705d92f5b0540e46103bf0e8f5290e + +info: + name: > + JetBackup – WP Backup, Migrate & Restore <= 1.4.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e2a9d71-21ef-45a1-99ed-477066ce9620?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-506d872307a475af76e6ae5402a1e474.yaml b/nuclei-templates/cve-less/plugins/backup-506d872307a475af76e6ae5402a1e474.yaml new file mode 100644 index 0000000000..48f774602e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-506d872307a475af76e6ae5402a1e474.yaml @@ -0,0 +1,58 @@ +id: backup-506d872307a475af76e6ae5402a1e474 + +info: + name: > + JetBackup – WP Backup, Migrate & Restore <= 1.4.1 - Missing Authorization to Unauthorized Backup Location Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59532447-1d74-4d34-85f5-d89b65a001d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-892437eb68b329dd17b3be2557272f56.yaml b/nuclei-templates/cve-less/plugins/backup-892437eb68b329dd17b3be2557272f56.yaml new file mode 100644 index 0000000000..136da8016b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-892437eb68b329dd17b3be2557272f56.yaml @@ -0,0 +1,58 @@ +id: backup-892437eb68b329dd17b3be2557272f56 + +info: + name: > + Backup Guard <= 1.5.9 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01e8e53c-8d23-4bd3-9291-29f97df7c984?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-8bb122c471113121afc3ab2c199c2c7d.yaml b/nuclei-templates/cve-less/plugins/backup-8bb122c471113121afc3ab2c199c2c7d.yaml new file mode 100644 index 0000000000..493ee189b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-8bb122c471113121afc3ab2c199c2c7d.yaml @@ -0,0 +1,58 @@ +id: backup-8bb122c471113121afc3ab2c199c2c7d + +info: + name: > + JetBackup – WP Backup, Migrate & Restore <= 1.3.9 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae8de00-ba4c-48d2-a566-13dac0bc4312?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-8eae7ffaabe0ed4cfdd5b1537b7b4d67.yaml b/nuclei-templates/cve-less/plugins/backup-8eae7ffaabe0ed4cfdd5b1537b7b4d67.yaml new file mode 100644 index 0000000000..5d45e0dbc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-8eae7ffaabe0ed4cfdd5b1537b7b4d67.yaml @@ -0,0 +1,58 @@ +id: backup-8eae7ffaabe0ed4cfdd5b1537b7b4d67 + +info: + name: > + Backup Guard <= 1.6.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a581d5e-11c3-468a-b4a1-6507f898f5ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-9458fe34c744167704f938702ae6ca24.yaml b/nuclei-templates/cve-less/plugins/backup-9458fe34c744167704f938702ae6ca24.yaml new file mode 100644 index 0000000000..5e5c3ad8c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-9458fe34c744167704f938702ae6ca24.yaml @@ -0,0 +1,58 @@ +id: backup-9458fe34c744167704f938702ae6ca24 + +info: + name: > + BackupGuard <= 1.1.46 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e61c868-b430-4aa6-8664-ae237db73d66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-9b7d6017f1a72f048acef7512ee0eb68.yaml b/nuclei-templates/cve-less/plugins/backup-9b7d6017f1a72f048acef7512ee0eb68.yaml new file mode 100644 index 0000000000..c3be3496dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-9b7d6017f1a72f048acef7512ee0eb68.yaml @@ -0,0 +1,58 @@ +id: backup-9b7d6017f1a72f048acef7512ee0eb68 + +info: + name: > + JetBackup <= 2.0.9.7 - Sensitive Information Exposure via Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd978ac0-42f2-4746-9430-37458375b588?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-and-restore-for-wp-90dcee7cddc408bda7d7da416498432f.yaml b/nuclei-templates/cve-less/plugins/backup-and-restore-for-wp-90dcee7cddc408bda7d7da416498432f.yaml new file mode 100644 index 0000000000..616e7a8e60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-and-restore-for-wp-90dcee7cddc408bda7d7da416498432f.yaml @@ -0,0 +1,58 @@ +id: backup-and-restore-for-wp-90dcee7cddc408bda7d7da416498432f + +info: + name: > + Backup and Restore plugin – WordPress <= 1.0.3 - Authenticated (Admin+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e758b973-dc2f-4bcf-9846-56ddd73f38db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-and-restore-for-wp/" + google-query: inurl:"/wp-content/plugins/backup-and-restore-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-and-restore-for-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-and-restore-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-and-restore-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/backup-backup-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..aafbe165ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: backup-backup-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-5143c97c48d7dbc931ae167f87839db5.yaml b/nuclei-templates/cve-less/plugins/backup-backup-5143c97c48d7dbc931ae167f87839db5.yaml new file mode 100644 index 0000000000..dc55173ff8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-5143c97c48d7dbc931ae167f87839db5.yaml @@ -0,0 +1,58 @@ +id: backup-backup-5143c97c48d7dbc931ae167f87839db5 + +info: + name: > + Backup Migration 1.0.8 - 1.3.9 - Remote File Inclusion via content-dir + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b380283c-0dbb-4d67-9f66-cb7c400c0427?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.8', '<= 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-62786f2608f27a539a0474c4d2ebfa59.yaml b/nuclei-templates/cve-less/plugins/backup-backup-62786f2608f27a539a0474c4d2ebfa59.yaml new file mode 100644 index 0000000000..c2c4016cee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-62786f2608f27a539a0474c4d2ebfa59.yaml @@ -0,0 +1,58 @@ +id: backup-backup-62786f2608f27a539a0474c4d2ebfa59 + +info: + name: > + Backup Migration <= 1.1.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cb4a14a-8bef-4747-ac89-70891f5c44bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-69b19f14e2d5ec73b6d0b29b5ce933ea.yaml b/nuclei-templates/cve-less/plugins/backup-backup-69b19f14e2d5ec73b6d0b29b5ce933ea.yaml new file mode 100644 index 0000000000..888013487d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-69b19f14e2d5ec73b6d0b29b5ce933ea.yaml @@ -0,0 +1,58 @@ +id: backup-backup-69b19f14e2d5ec73b6d0b29b5ce933ea + +info: + name: > + Backup Migration <= 1.3.9 - Authenticated (Admin+) OS Command Injection via url + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/backup-backup-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..b1d19bc908 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: backup-backup-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-87fc5ec6b1d8ce88fa24b6d37dc7769d.yaml b/nuclei-templates/cve-less/plugins/backup-backup-87fc5ec6b1d8ce88fa24b6d37dc7769d.yaml new file mode 100644 index 0000000000..af9650189a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-87fc5ec6b1d8ce88fa24b6d37dc7769d.yaml @@ -0,0 +1,58 @@ +id: backup-backup-87fc5ec6b1d8ce88fa24b6d37dc7769d + +info: + name: > + Backup Migration <= 1.4.3 - Information Exposure via Log Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af870e80-ad9e-4f45-952f-9ffb07ceca9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-a95d754905d3f53fb57a0e2d890050ed.yaml b/nuclei-templates/cve-less/plugins/backup-backup-a95d754905d3f53fb57a0e2d890050ed.yaml new file mode 100644 index 0000000000..95b2d91b0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-a95d754905d3f53fb57a0e2d890050ed.yaml @@ -0,0 +1,58 @@ +id: backup-backup-a95d754905d3f53fb57a0e2d890050ed + +info: + name: > + Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3511ba64-56a3-43d7-8ab8-c6e40e3b686e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-bafe57d5b57ae88c67b8e813c789e809.yaml b/nuclei-templates/cve-less/plugins/backup-backup-bafe57d5b57ae88c67b8e813c789e809.yaml new file mode 100644 index 0000000000..7cf3f6a59c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-bafe57d5b57ae88c67b8e813c789e809.yaml @@ -0,0 +1,58 @@ +id: backup-backup-bafe57d5b57ae88c67b8e813c789e809 + +info: + name: > + Backup Migration <= 1.2.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00274313-9079-4877-b72e-310e312aa814?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-c2f123eeeab4951b42a1cc8fc1528dc5.yaml b/nuclei-templates/cve-less/plugins/backup-backup-c2f123eeeab4951b42a1cc8fc1528dc5.yaml new file mode 100644 index 0000000000..2b7e878187 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-c2f123eeeab4951b42a1cc8fc1528dc5.yaml @@ -0,0 +1,58 @@ +id: backup-backup-c2f123eeeab4951b42a1cc8fc1528dc5 + +info: + name: > + Backup Migration <= 1.2.8 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e80a74f7-7983-4d66-a038-3c57c5d94ea1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/backup-backup-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..fe0803aaf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: backup-backup-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-d0b7defb1dd587ee6e11e3b384bd4e57.yaml b/nuclei-templates/cve-less/plugins/backup-backup-d0b7defb1dd587ee6e11e3b384bd4e57.yaml new file mode 100644 index 0000000000..2ffa5aef30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-d0b7defb1dd587ee6e11e3b384bd4e57.yaml @@ -0,0 +1,58 @@ +id: backup-backup-d0b7defb1dd587ee6e11e3b384bd4e57 + +info: + name: > + Backup Migration <= 1.3.6 - Unauthenticated Arbitrary File Download to Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08801f53-3c57-41a3-a637-4b52637cc612?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-dc13d87f49a5c107f5d523c7a6538ca9.yaml b/nuclei-templates/cve-less/plugins/backup-backup-dc13d87f49a5c107f5d523c7a6538ca9.yaml new file mode 100644 index 0000000000..5d6102e314 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-dc13d87f49a5c107f5d523c7a6538ca9.yaml @@ -0,0 +1,58 @@ +id: backup-backup-dc13d87f49a5c107f5d523c7a6538ca9 + +info: + name: > + Backup Migration <= 1.3.9 - Unauthenticated Path Traversal to Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a3ae696-f67d-4ed2-b307-d2f36b6f188c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-backup-e15cd5eb900eec690c6bd9ba7205617d.yaml b/nuclei-templates/cve-less/plugins/backup-backup-e15cd5eb900eec690c6bd9ba7205617d.yaml new file mode 100644 index 0000000000..15bc0d33c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-backup-e15cd5eb900eec690c6bd9ba7205617d.yaml @@ -0,0 +1,58 @@ +id: backup-backup-e15cd5eb900eec690c6bd9ba7205617d + +info: + name: > + Backup Migration <= 1.3.5 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f661f19d-fdd4-4cd3-8fb3-8b6073d94596?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-backup/" + google-query: inurl:"/wp-content/plugins/backup-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-bolt-e92ff64cb5237b7fef80c551a995240d.yaml b/nuclei-templates/cve-less/plugins/backup-bolt-e92ff64cb5237b7fef80c551a995240d.yaml new file mode 100644 index 0000000000..92ffd7846f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-bolt-e92ff64cb5237b7fef80c551a995240d.yaml @@ -0,0 +1,58 @@ +id: backup-bolt-e92ff64cb5237b7fef80c551a995240d + +info: + name: > + Backup Bolt <= 1.3.0 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/440e2618-5b45-4bad-8a97-2fb1a6e991ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-bolt/" + google-query: inurl:"/wp-content/plugins/backup-bolt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-bolt,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-bolt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-bolt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-by-supsystic-d7479b175a0668ffbe5af726e8c140b2.yaml b/nuclei-templates/cve-less/plugins/backup-by-supsystic-d7479b175a0668ffbe5af726e8c140b2.yaml new file mode 100644 index 0000000000..7d6de03ad9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-by-supsystic-d7479b175a0668ffbe5af726e8c140b2.yaml @@ -0,0 +1,58 @@ +id: backup-by-supsystic-d7479b175a0668ffbe5af726e8c140b2 + +info: + name: > + Backup by Supsystic <= 2.3.11 - Cross-Site Request Forgery to Arbitrary File Download/Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7934c73c-17cf-4cec-a8da-654cee453b8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-by-supsystic/" + google-query: inurl:"/wp-content/plugins/backup-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-e30a273c4e2ac5b93368dcb61feeb896.yaml b/nuclei-templates/cve-less/plugins/backup-e30a273c4e2ac5b93368dcb61feeb896.yaml new file mode 100644 index 0000000000..f854355319 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-e30a273c4e2ac5b93368dcb61feeb896.yaml @@ -0,0 +1,58 @@ +id: backup-e30a273c4e2ac5b93368dcb61feeb896 + +info: + name: > + WordPress Backup and Migrate Plugin – Backup Guard < 1.0.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ee267ff-b650-44a5-994b-3a22d34722e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-ec758abe67d8493d911d656fdfa690f2.yaml b/nuclei-templates/cve-less/plugins/backup-ec758abe67d8493d911d656fdfa690f2.yaml new file mode 100644 index 0000000000..568dc97e49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-ec758abe67d8493d911d656fdfa690f2.yaml @@ -0,0 +1,58 @@ +id: backup-ec758abe67d8493d911d656fdfa690f2 + +info: + name: > + Backup Guard <= 1.1.46 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/463fd745-92ea-4e55-b470-a5f08884169f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup/" + google-query: inurl:"/wp-content/plugins/backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.47') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-scheduler-2042c2ccb1432ca181653532b126746f.yaml b/nuclei-templates/cve-less/plugins/backup-scheduler-2042c2ccb1432ca181653532b126746f.yaml new file mode 100644 index 0000000000..b180b794e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-scheduler-2042c2ccb1432ca181653532b126746f.yaml @@ -0,0 +1,58 @@ +id: backup-scheduler-2042c2ccb1432ca181653532b126746f + +info: + name: > + Backup Scheduler <= 1.5.13 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da0950ad-4d6c-46fe-83c9-c14653fe9f1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-scheduler/" + google-query: inurl:"/wp-content/plugins/backup-scheduler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-scheduler,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-scheduler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-scheduler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-scheduler-897959e22c40ecc199bf5dc5042856a0.yaml b/nuclei-templates/cve-less/plugins/backup-scheduler-897959e22c40ecc199bf5dc5042856a0.yaml new file mode 100644 index 0000000000..3078eb7c19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-scheduler-897959e22c40ecc199bf5dc5042856a0.yaml @@ -0,0 +1,58 @@ +id: backup-scheduler-897959e22c40ecc199bf5dc5042856a0 + +info: + name: > + Backup Scheduler <= 1.5.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85d8bfaa-db94-4c15-8f55-eeefe5882f90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-scheduler/" + google-query: inurl:"/wp-content/plugins/backup-scheduler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-scheduler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-scheduler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-scheduler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backup-wd-38b12fb47f5d220861d665c3785bcfc8.yaml b/nuclei-templates/cve-less/plugins/backup-wd-38b12fb47f5d220861d665c3785bcfc8.yaml new file mode 100644 index 0000000000..99fbef8857 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backup-wd-38b12fb47f5d220861d665c3785bcfc8.yaml @@ -0,0 +1,58 @@ +id: backup-wd-38b12fb47f5d220861d665c3785bcfc8 + +info: + name: > + Backup by 10Web <= 1.0.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c73e6889-78f1-4118-ba76-4cd696d24800?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backup-wd/" + google-query: inurl:"/wp-content/plugins/backup-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backup-wd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backup-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backup-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupbuddy-141ab8478a476872f09ca6589d710d31.yaml b/nuclei-templates/cve-less/plugins/backupbuddy-141ab8478a476872f09ca6589d710d31.yaml new file mode 100644 index 0000000000..c4f5535b40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupbuddy-141ab8478a476872f09ca6589d710d31.yaml @@ -0,0 +1,58 @@ +id: backupbuddy-141ab8478a476872f09ca6589d710d31 + +info: + name: > + BackupBuddy 8.5.8.0 - 8.7.4.1 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91221712-8f66-4c6f-94fb-75c34a7f1fa8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupbuddy/" + google-query: inurl:"/wp-content/plugins/backupbuddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupbuddy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupbuddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupbuddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 8.5.8.0', '<= 8.7.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupbuddy-2a4553829059c88ea2966fb66da7e42a.yaml b/nuclei-templates/cve-less/plugins/backupbuddy-2a4553829059c88ea2966fb66da7e42a.yaml new file mode 100644 index 0000000000..6bbe449c9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupbuddy-2a4553829059c88ea2966fb66da7e42a.yaml @@ -0,0 +1,58 @@ +id: backupbuddy-2a4553829059c88ea2966fb66da7e42a + +info: + name: > + BackupBuddy < 3.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0ea7279-bba3-49c4-b36a-0d51c96a23cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupbuddy/" + google-query: inurl:"/wp-content/plugins/backupbuddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupbuddy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupbuddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupbuddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupbuddy-4644df3f89f37fce826cc2d06ead9821.yaml b/nuclei-templates/cve-less/plugins/backupbuddy-4644df3f89f37fce826cc2d06ead9821.yaml new file mode 100644 index 0000000000..03b49b7bdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupbuddy-4644df3f89f37fce826cc2d06ead9821.yaml @@ -0,0 +1,58 @@ +id: backupbuddy-4644df3f89f37fce826cc2d06ead9821 + +info: + name: > + BackupBuddy <= 8.8.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cb428db-b56b-4c21-b119-ca7a1a95181e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupbuddy/" + google-query: inurl:"/wp-content/plugins/backupbuddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupbuddy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupbuddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupbuddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupbuddy-928b2ae49df36c8a8c06f8fa9afee383.yaml b/nuclei-templates/cve-less/plugins/backupbuddy-928b2ae49df36c8a8c06f8fa9afee383.yaml new file mode 100644 index 0000000000..0e9c0f4109 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupbuddy-928b2ae49df36c8a8c06f8fa9afee383.yaml @@ -0,0 +1,58 @@ +id: backupbuddy-928b2ae49df36c8a8c06f8fa9afee383 + +info: + name: > + BackupBuddy < 3.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dcc3c09-8bd2-4a08-a368-3f406170081e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupbuddy/" + google-query: inurl:"/wp-content/plugins/backupbuddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupbuddy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupbuddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupbuddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupbuddy-a43e4c1368e5181d1a16d6caef32b605.yaml b/nuclei-templates/cve-less/plugins/backupbuddy-a43e4c1368e5181d1a16d6caef32b605.yaml new file mode 100644 index 0000000000..12eda18a1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupbuddy-a43e4c1368e5181d1a16d6caef32b605.yaml @@ -0,0 +1,58 @@ +id: backupbuddy-a43e4c1368e5181d1a16d6caef32b605 + +info: + name: > + BackupBuddy <= 2.2.28 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/481bbdd6-9546-4c1f-a4ec-023ad7b37217?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupbuddy/" + google-query: inurl:"/wp-content/plugins/backupbuddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupbuddy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupbuddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupbuddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupbuddy-bb9a3765668a45566332d836d123f363.yaml b/nuclei-templates/cve-less/plugins/backupbuddy-bb9a3765668a45566332d836d123f363.yaml new file mode 100644 index 0000000000..8372f74593 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupbuddy-bb9a3765668a45566332d836d123f363.yaml @@ -0,0 +1,58 @@ +id: backupbuddy-bb9a3765668a45566332d836d123f363 + +info: + name: > + BackupBuddy < 3.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d893edd0-8a60-43fd-94bb-3b52cea1d00e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupbuddy/" + google-query: inurl:"/wp-content/plugins/backupbuddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupbuddy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupbuddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupbuddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backuply-471be969472b8d0ef26e1ed1be3ca7b8.yaml b/nuclei-templates/cve-less/plugins/backuply-471be969472b8d0ef26e1ed1be3ca7b8.yaml new file mode 100644 index 0000000000..00a8eae916 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backuply-471be969472b8d0ef26e1ed1be3ca7b8.yaml @@ -0,0 +1,58 @@ +id: backuply-471be969472b8d0ef26e1ed1be3ca7b8 + +info: + name: > + Backuply – Backup, Restore, Migrate and Clone <= 1.2.7 - Authenticated (Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be3bd1f2-092c-47c4-a4e4-3365e107c57f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backuply/" + google-query: inurl:"/wp-content/plugins/backuply/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backuply,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backuply/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backuply" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backuply-6cad3fdbb1d6f65f827e62fa999a9d63.yaml b/nuclei-templates/cve-less/plugins/backuply-6cad3fdbb1d6f65f827e62fa999a9d63.yaml new file mode 100644 index 0000000000..b471c6c2f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backuply-6cad3fdbb1d6f65f827e62fa999a9d63.yaml @@ -0,0 +1,58 @@ +id: backuply-6cad3fdbb1d6f65f827e62fa999a9d63 + +info: + name: > + Backuply – Backup, Restore, Migrate and Clone <= 1.2.3 - Authenticated (Administrator+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70effa22-fbf6-44cb-9d1b-8625969c10ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backuply/" + google-query: inurl:"/wp-content/plugins/backuply/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backuply,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backuply/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backuply" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backuply-ea428ee30f7eac0893dba990c7647b20.yaml b/nuclei-templates/cve-less/plugins/backuply-ea428ee30f7eac0893dba990c7647b20.yaml new file mode 100644 index 0000000000..505d1d312f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backuply-ea428ee30f7eac0893dba990c7647b20.yaml @@ -0,0 +1,58 @@ +id: backuply-ea428ee30f7eac0893dba990c7647b20 + +info: + name: > + Backuply - Backup, Restore, Migrate and Clone <= 1.2.6 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f955d88-ab4c-4cf4-a23b-91119d412716?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backuply/" + google-query: inurl:"/wp-content/plugins/backuply/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backuply,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backuply/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backuply" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupwordpress-d55df6ea0549bd5bc1a28b66aeed72e9.yaml b/nuclei-templates/cve-less/plugins/backupwordpress-d55df6ea0549bd5bc1a28b66aeed72e9.yaml new file mode 100644 index 0000000000..95c27de2d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupwordpress-d55df6ea0549bd5bc1a28b66aeed72e9.yaml @@ -0,0 +1,58 @@ +id: backupwordpress-d55df6ea0549bd5bc1a28b66aeed72e9 + +info: + name: > + BackUpWordPress <= 3.13 - Authenticated (Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2805cb0-8913-4487-8445-031b7d920e2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupwordpress/" + google-query: inurl:"/wp-content/plugins/backupwordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupwordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupwordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupwordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupwordpress-f5711bcfafc45228fc0a872f3e3fae05.yaml b/nuclei-templates/cve-less/plugins/backupwordpress-f5711bcfafc45228fc0a872f3e3fae05.yaml new file mode 100644 index 0000000000..dcefec234b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupwordpress-f5711bcfafc45228fc0a872f3e3fae05.yaml @@ -0,0 +1,58 @@ +id: backupwordpress-f5711bcfafc45228fc0a872f3e3fae05 + +info: + name: > + BackupWordPress <= 3.12 - Missing Authorization to Authenticated (Subscriber+) Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/747c86f4-118b-4a9c-899c-e9067d2c7a02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupwordpress/" + google-query: inurl:"/wp-content/plugins/backupwordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupwordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupwordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupwordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backupwordpress-ff88c3f150fa8c25d9c92672f9b00beb.yaml b/nuclei-templates/cve-less/plugins/backupwordpress-ff88c3f150fa8c25d9c92672f9b00beb.yaml new file mode 100644 index 0000000000..d01cf863df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backupwordpress-ff88c3f150fa8c25d9c92672f9b00beb.yaml @@ -0,0 +1,58 @@ +id: backupwordpress-ff88c3f150fa8c25d9c92672f9b00beb + +info: + name: > + BackUpWordPress <= 0.4.2b - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2250fa2d-82f5-4553-a52e-0c43d215aaba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backupwordpress/" + google-query: inurl:"/wp-content/plugins/backupwordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backupwordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backupwordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backupwordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backwpup-1298f4a06721cabe055b21858243d155.yaml b/nuclei-templates/cve-less/plugins/backwpup-1298f4a06721cabe055b21858243d155.yaml new file mode 100644 index 0000000000..697635c74d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backwpup-1298f4a06721cabe055b21858243d155.yaml @@ -0,0 +1,58 @@ +id: backwpup-1298f4a06721cabe055b21858243d155 + +info: + name: > + BackWPup – WordPress Backup Plugin < 1.4.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a7d3b1-ceb7-4ff9-84e4-bc58a597b2cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backwpup/" + google-query: inurl:"/wp-content/plugins/backwpup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backwpup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backwpup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backwpup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backwpup-2bca208b2748ce062cd1cca09cfae994.yaml b/nuclei-templates/cve-less/plugins/backwpup-2bca208b2748ce062cd1cca09cfae994.yaml new file mode 100644 index 0000000000..6c4fa76aec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backwpup-2bca208b2748ce062cd1cca09cfae994.yaml @@ -0,0 +1,58 @@ +id: backwpup-2bca208b2748ce062cd1cca09cfae994 + +info: + name: > + BackWPup <= 4.0.1 - Authenticated (Administrator+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e830fe1e-1171-46da-8ee7-0a6654153f18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backwpup/" + google-query: inurl:"/wp-content/plugins/backwpup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backwpup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backwpup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backwpup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backwpup-356feecea26ff4c40d9fa77a244963ee.yaml b/nuclei-templates/cve-less/plugins/backwpup-356feecea26ff4c40d9fa77a244963ee.yaml new file mode 100644 index 0000000000..e5bfbce811 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backwpup-356feecea26ff4c40d9fa77a244963ee.yaml @@ -0,0 +1,58 @@ +id: backwpup-356feecea26ff4c40d9fa77a244963ee + +info: + name: > + BackWPup < 3.0.13 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc8c0726-82b7-487e-ba9e-7adc892979d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backwpup/" + google-query: inurl:"/wp-content/plugins/backwpup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backwpup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backwpup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backwpup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backwpup-58ee338d74c3490fd7f800caad932984.yaml b/nuclei-templates/cve-less/plugins/backwpup-58ee338d74c3490fd7f800caad932984.yaml new file mode 100644 index 0000000000..d9928550b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backwpup-58ee338d74c3490fd7f800caad932984.yaml @@ -0,0 +1,58 @@ +id: backwpup-58ee338d74c3490fd7f800caad932984 + +info: + name: > + BackWPup <= 3.4.1 - Unauthenticated Backup Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4c58479-2924-4b56-9c27-3bdf4be388a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backwpup/" + google-query: inurl:"/wp-content/plugins/backwpup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backwpup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backwpup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backwpup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backwpup-86bb89c01ac64d331e5e9e535a06cf97.yaml b/nuclei-templates/cve-less/plugins/backwpup-86bb89c01ac64d331e5e9e535a06cf97.yaml new file mode 100644 index 0000000000..8187b5e1ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backwpup-86bb89c01ac64d331e5e9e535a06cf97.yaml @@ -0,0 +1,58 @@ +id: backwpup-86bb89c01ac64d331e5e9e535a06cf97 + +info: + name: > + BackWPup <= 4.0.3 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85abf905-ec47-4847-b3d6-8570fd5eb287?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backwpup/" + google-query: inurl:"/wp-content/plugins/backwpup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backwpup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backwpup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backwpup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backwpup-e260f5dd85134184a7b4e8005c4f1616.yaml b/nuclei-templates/cve-less/plugins/backwpup-e260f5dd85134184a7b4e8005c4f1616.yaml new file mode 100644 index 0000000000..3060421d86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backwpup-e260f5dd85134184a7b4e8005c4f1616.yaml @@ -0,0 +1,58 @@ +id: backwpup-e260f5dd85134184a7b4e8005c4f1616 + +info: + name: > + BackWPup <= 1.7.1 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/515d6e6c-e20d-4fc4-9c56-80020196f2f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backwpup/" + google-query: inurl:"/wp-content/plugins/backwpup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backwpup,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backwpup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backwpup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/backwpup-eaf4d65714ae3e70ffdd0fc233476145.yaml b/nuclei-templates/cve-less/plugins/backwpup-eaf4d65714ae3e70ffdd0fc233476145.yaml new file mode 100644 index 0000000000..752aa22572 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/backwpup-eaf4d65714ae3e70ffdd0fc233476145.yaml @@ -0,0 +1,58 @@ +id: backwpup-eaf4d65714ae3e70ffdd0fc233476145 + +info: + name: > + BackWPup <= 4.0.2 - Plaintext Storage of Backup Destination Password + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bce4f04-e622-468a-ac7e-5903ad50cc13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/backwpup/" + google-query: inurl:"/wp-content/plugins/backwpup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,backwpup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/backwpup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "backwpup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bacola-core-0e249eccad21574e2f41d6b727c12756.yaml b/nuclei-templates/cve-less/plugins/bacola-core-0e249eccad21574e2f41d6b727c12756.yaml new file mode 100644 index 0000000000..bd9347a10b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bacola-core-0e249eccad21574e2f41d6b727c12756.yaml @@ -0,0 +1,58 @@ +id: bacola-core-0e249eccad21574e2f41d6b727c12756 + +info: + name: > + Multiple Plugins by KlbTheme <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fb06315-30ad-4d98-af75-b04933583be7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bacola-core/" + google-query: inurl:"/wp-content/plugins/bacola-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bacola-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bacola-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bacola-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bad-behavior-0638cf0d113b279b6ab4547692f6759f.yaml b/nuclei-templates/cve-less/plugins/bad-behavior-0638cf0d113b279b6ab4547692f6759f.yaml new file mode 100644 index 0000000000..20e66bdca0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bad-behavior-0638cf0d113b279b6ab4547692f6759f.yaml @@ -0,0 +1,58 @@ +id: bad-behavior-0638cf0d113b279b6ab4547692f6759f + +info: + name: > + Bad Behavior < 2.0.47 & 2.2.0 - 2.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4704495-8342-4846-9242-f1eab4de25d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bad-behavior/" + google-query: inurl:"/wp-content/plugins/bad-behavior/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bad-behavior,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bad-behavior/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bad-behavior" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.2.0', '<= 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/badgeos-6a3c999f177d3f3a9005f7b86b4e26cb.yaml b/nuclei-templates/cve-less/plugins/badgeos-6a3c999f177d3f3a9005f7b86b4e26cb.yaml new file mode 100644 index 0000000000..7201af6a8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/badgeos-6a3c999f177d3f3a9005f7b86b4e26cb.yaml @@ -0,0 +1,58 @@ +id: badgeos-6a3c999f177d3f3a9005f7b86b4e26cb + +info: + name: > + BadgeOS <= 3.7.1.6 - Missing Authorization in delete_badgeos_log_entries + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64e0adbc-c524-4f9d-9741-ce69edf888f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/badgeos/" + google-query: inurl:"/wp-content/plugins/badgeos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,badgeos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/badgeos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "badgeos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/badgeos-8e5d590ef949dabd3bb7265d663cdfbb.yaml b/nuclei-templates/cve-less/plugins/badgeos-8e5d590ef949dabd3bb7265d663cdfbb.yaml new file mode 100644 index 0000000000..b9dede12f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/badgeos-8e5d590ef949dabd3bb7265d663cdfbb.yaml @@ -0,0 +1,58 @@ +id: badgeos-8e5d590ef949dabd3bb7265d663cdfbb + +info: + name: > + BadgeOS <= 3.7.1.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d6ddee9-d9c3-4cea-85f1-a1ddd101aac1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/badgeos/" + google-query: inurl:"/wp-content/plugins/badgeos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,badgeos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/badgeos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "badgeos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/badgeos-948fbb4659b9489d63a6dcbbe5ab82b2.yaml b/nuclei-templates/cve-less/plugins/badgeos-948fbb4659b9489d63a6dcbbe5ab82b2.yaml new file mode 100644 index 0000000000..522860d888 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/badgeos-948fbb4659b9489d63a6dcbbe5ab82b2.yaml @@ -0,0 +1,58 @@ +id: badgeos-948fbb4659b9489d63a6dcbbe5ab82b2 + +info: + name: > + BadgeOS <= 3.7.1.6 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary Post Title Overwrite + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dae8e82-e252-48d9-ae1f-62acfcd17e2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/badgeos/" + google-query: inurl:"/wp-content/plugins/badgeos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,badgeos,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/badgeos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "badgeos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/badgeos-99d724e78c6e3ca9e817c7ab41561c22.yaml b/nuclei-templates/cve-less/plugins/badgeos-99d724e78c6e3ca9e817c7ab41561c22.yaml new file mode 100644 index 0000000000..bc33f4a4c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/badgeos-99d724e78c6e3ca9e817c7ab41561c22.yaml @@ -0,0 +1,58 @@ +id: badgeos-99d724e78c6e3ca9e817c7ab41561c22 + +info: + name: > + BadgeOS <= 3.7.1.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/515e62ba-c3b8-42d0-95e3-be347b8851a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/badgeos/" + google-query: inurl:"/wp-content/plugins/badgeos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,badgeos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/badgeos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "badgeos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/badgeos-d8de339d3ac4f62207036cc196c6166a.yaml b/nuclei-templates/cve-less/plugins/badgeos-d8de339d3ac4f62207036cc196c6166a.yaml new file mode 100644 index 0000000000..85b094436e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/badgeos-d8de339d3ac4f62207036cc196c6166a.yaml @@ -0,0 +1,58 @@ +id: badgeos-d8de339d3ac4f62207036cc196c6166a + +info: + name: > + BadgeOS <= 3.7.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b431493-fd96-495b-aaa7-6dfeef04b011?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/badgeos/" + google-query: inurl:"/wp-content/plugins/badgeos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,badgeos,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/badgeos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "badgeos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/badgeos-e1ab43eefd1268f41af50d790136abb5.yaml b/nuclei-templates/cve-less/plugins/badgeos-e1ab43eefd1268f41af50d790136abb5.yaml new file mode 100644 index 0000000000..6afb6467f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/badgeos-e1ab43eefd1268f41af50d790136abb5.yaml @@ -0,0 +1,58 @@ +id: badgeos-e1ab43eefd1268f41af50d790136abb5 + +info: + name: > + BadgeOS <= 3.7.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74a280e1-e4b6-4bd9-882b-d9f185332d61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/badgeos/" + google-query: inurl:"/wp-content/plugins/badgeos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,badgeos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/badgeos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "badgeos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/badgeos-ee566a4e5dfcb43b5aa7224c7fc505bf.yaml b/nuclei-templates/cve-less/plugins/badgeos-ee566a4e5dfcb43b5aa7224c7fc505bf.yaml new file mode 100644 index 0000000000..beb401c689 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/badgeos-ee566a4e5dfcb43b5aa7224c7fc505bf.yaml @@ -0,0 +1,58 @@ +id: badgeos-ee566a4e5dfcb43b5aa7224c7fc505bf + +info: + name: > + BadgeOS <= 3.7.1.6 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebb9e37c-9e8b-429b-b4ef-cd875351852c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/badgeos/" + google-query: inurl:"/wp-content/plugins/badgeos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,badgeos,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/badgeos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "badgeos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/badgeos-ef94b2f85f2ba20fe6f83fee3d6d311f.yaml b/nuclei-templates/cve-less/plugins/badgeos-ef94b2f85f2ba20fe6f83fee3d6d311f.yaml new file mode 100644 index 0000000000..0c4ade0b1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/badgeos-ef94b2f85f2ba20fe6f83fee3d6d311f.yaml @@ -0,0 +1,58 @@ +id: badgeos-ef94b2f85f2ba20fe6f83fee3d6d311f + +info: + name: > + BadgeOS <= 3.7.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bb1be6d-5af9-4b58-a641-05a913548fe7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/badgeos/" + google-query: inurl:"/wp-content/plugins/badgeos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,badgeos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/badgeos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "badgeos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baggage-freight-56e63bf99909025ae251d6417333b36f.yaml b/nuclei-templates/cve-less/plugins/baggage-freight-56e63bf99909025ae251d6417333b36f.yaml new file mode 100644 index 0000000000..7ae50b3199 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baggage-freight-56e63bf99909025ae251d6417333b36f.yaml @@ -0,0 +1,58 @@ +id: baggage-freight-56e63bf99909025ae251d6417333b36f + +info: + name: > + Baggage Freight Shipping Australia <= 0.1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6130d49f-61b7-4b70-b1a5-036346f82650?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baggage-freight/" + google-query: inurl:"/wp-content/plugins/baggage-freight/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baggage-freight,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baggage-freight/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baggage-freight" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baidu-submit-link-9c6d171f6c42d066e20b0847cb9e2d62.yaml b/nuclei-templates/cve-less/plugins/baidu-submit-link-9c6d171f6c42d066e20b0847cb9e2d62.yaml new file mode 100644 index 0000000000..305c6522bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baidu-submit-link-9c6d171f6c42d066e20b0847cb9e2d62.yaml @@ -0,0 +1,58 @@ +id: baidu-submit-link-9c6d171f6c42d066e20b0847cb9e2d62 + +info: + name: > + 多合一搜索自动推送管理插件-支持Baidu/Google/Bing/IndexNow/Yandex/头条 <= 4.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72d18504-7b12-43f0-b2ea-40dbc25912c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baidu-submit-link/" + google-query: inurl:"/wp-content/plugins/baidu-submit-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baidu-submit-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baidu-submit-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baidu-submit-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baidu-tongji-generator-d91574fca4b237a59bfef53213c75bb6.yaml b/nuclei-templates/cve-less/plugins/baidu-tongji-generator-d91574fca4b237a59bfef53213c75bb6.yaml new file mode 100644 index 0000000000..9e9db963d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baidu-tongji-generator-d91574fca4b237a59bfef53213c75bb6.yaml @@ -0,0 +1,58 @@ +id: baidu-tongji-generator-d91574fca4b237a59bfef53213c75bb6 + +info: + name: > + Baidu Tongji generator <= 1.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8438ea46-9ac1-4ef5-a436-e438c35a4321?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baidu-tongji-generator/" + google-query: inurl:"/wp-content/plugins/baidu-tongji-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baidu-tongji-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baidu-tongji-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baidu-tongji-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baidu-tongji-generator-ee80f8c937a77ba9a3b8602ebbefd769.yaml b/nuclei-templates/cve-less/plugins/baidu-tongji-generator-ee80f8c937a77ba9a3b8602ebbefd769.yaml new file mode 100644 index 0000000000..2e301b4d45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baidu-tongji-generator-ee80f8c937a77ba9a3b8602ebbefd769.yaml @@ -0,0 +1,58 @@ +id: baidu-tongji-generator-ee80f8c937a77ba9a3b8602ebbefd769 + +info: + name: > + Baidu Tongji generator <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2b9b6f4-6ee7-498d-9693-a5ae5f7f4719?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baidu-tongji-generator/" + google-query: inurl:"/wp-content/plugins/baidu-tongji-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baidu-tongji-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baidu-tongji-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baidu-tongji-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bamboo-columns-414a4199455e61f63d4f1a06e321a38b.yaml b/nuclei-templates/cve-less/plugins/bamboo-columns-414a4199455e61f63d4f1a06e321a38b.yaml new file mode 100644 index 0000000000..2961450dab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bamboo-columns-414a4199455e61f63d4f1a06e321a38b.yaml @@ -0,0 +1,58 @@ +id: bamboo-columns-414a4199455e61f63d4f1a06e321a38b + +info: + name: > + Bamboo Columns <= 1.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e7b40e4-c80a-4317-acff-77696fd8098f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bamboo-columns/" + google-query: inurl:"/wp-content/plugins/bamboo-columns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bamboo-columns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bamboo-columns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bamboo-columns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ban-users-137251846c7319666c4983642238e856.yaml b/nuclei-templates/cve-less/plugins/ban-users-137251846c7319666c4983642238e856.yaml new file mode 100644 index 0000000000..1539cf7c65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ban-users-137251846c7319666c4983642238e856.yaml @@ -0,0 +1,58 @@ +id: ban-users-137251846c7319666c4983642238e856 + +info: + name: > + BAN Users <= 1.5.3 - Missing Authorization to Authenticated (Subscriber+) Settings Update & Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af6bd2db-47a4-4381-a881-d5f97a159f8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ban-users/" + google-query: inurl:"/wp-content/plugins/ban-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ban-users,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ban-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ban-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bangladeshi-payment-gateways-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/bangladeshi-payment-gateways-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..735ed896d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bangladeshi-payment-gateways-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: bangladeshi-payment-gateways-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bangladeshi-payment-gateways/" + google-query: inurl:"/wp-content/plugins/bangladeshi-payment-gateways/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bangladeshi-payment-gateways,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bangladeshi-payment-gateways/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bangladeshi-payment-gateways" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bangladeshi-payment-gateways-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/bangladeshi-payment-gateways-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..9214aada04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bangladeshi-payment-gateways-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: bangladeshi-payment-gateways-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bangladeshi-payment-gateways/" + google-query: inurl:"/wp-content/plugins/bangladeshi-payment-gateways/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bangladeshi-payment-gateways,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bangladeshi-payment-gateways/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bangladeshi-payment-gateways" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bank-mellat-226ccdc58627d396ab167a357486235f.yaml b/nuclei-templates/cve-less/plugins/bank-mellat-226ccdc58627d396ab167a357486235f.yaml new file mode 100644 index 0000000000..ce5e45efbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bank-mellat-226ccdc58627d396ab167a357486235f.yaml @@ -0,0 +1,58 @@ +id: bank-mellat-226ccdc58627d396ab167a357486235f + +info: + name: > + Bank Mellat <= 1.3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b510ffb-27fe-41f2-8176-676cf9540ee8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bank-mellat/" + google-query: inurl:"/wp-content/plugins/bank-mellat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bank-mellat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bank-mellat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bank-mellat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/banner-cycler-b587c5b6b45c195ebb12bd5f55ed780d.yaml b/nuclei-templates/cve-less/plugins/banner-cycler-b587c5b6b45c195ebb12bd5f55ed780d.yaml new file mode 100644 index 0000000000..4d787083a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/banner-cycler-b587c5b6b45c195ebb12bd5f55ed780d.yaml @@ -0,0 +1,58 @@ +id: banner-cycler-b587c5b6b45c195ebb12bd5f55ed780d + +info: + name: > + Banner Cycler <= 1.4 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc1d7f2-053d-42d4-afb7-6fb69fd71b91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/banner-cycler/" + google-query: inurl:"/wp-content/plugins/banner-cycler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,banner-cycler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/banner-cycler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "banner-cycler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/banner-effect-header-434911a5447ed5d05a669b67b9efd816.yaml b/nuclei-templates/cve-less/plugins/banner-effect-header-434911a5447ed5d05a669b67b9efd816.yaml new file mode 100644 index 0000000000..1db3446841 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/banner-effect-header-434911a5447ed5d05a669b67b9efd816.yaml @@ -0,0 +1,58 @@ +id: banner-effect-header-434911a5447ed5d05a669b67b9efd816 + +info: + name: > + Banner Effect Header <= 1.2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fcd3eec-057a-44f9-a255-e6814a22471b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/banner-effect-header/" + google-query: inurl:"/wp-content/plugins/banner-effect-header/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,banner-effect-header,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/banner-effect-header/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "banner-effect-header" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/banner-effect-header-f7325cb69c59d2a2951bb8ec98779e8d.yaml b/nuclei-templates/cve-less/plugins/banner-effect-header-f7325cb69c59d2a2951bb8ec98779e8d.yaml new file mode 100644 index 0000000000..91d810cc40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/banner-effect-header-f7325cb69c59d2a2951bb8ec98779e8d.yaml @@ -0,0 +1,58 @@ +id: banner-effect-header-f7325cb69c59d2a2951bb8ec98779e8d + +info: + name: > + Banner Effect Header < 1.2.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fd1cbbe-68b8-4a19-aea9-1e943d97c9c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/banner-effect-header/" + google-query: inurl:"/wp-content/plugins/banner-effect-header/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,banner-effect-header,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/banner-effect-header/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "banner-effect-header" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-0167f45d0f324e4791bf42a58fe0f3d4.yaml b/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-0167f45d0f324e4791bf42a58fe0f3d4.yaml new file mode 100644 index 0000000000..a783e87bc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-0167f45d0f324e4791bf42a58fe0f3d4.yaml @@ -0,0 +1,58 @@ +id: banner-management-for-woocommerce-0167f45d0f324e4791bf42a58fe0f3d4 + +info: + name: > + Woocommerce Category Banner Management <= 1.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d02bed5-c45b-46db-a2c2-9c741f8b1dc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/banner-management-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/banner-management-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,banner-management-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/banner-management-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "banner-management-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2acc549392 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: banner-management-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/banner-management-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/banner-management-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,banner-management-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/banner-management-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "banner-management-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-fccced4c8f4a5e0806978ddedbe57a10.yaml b/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-fccced4c8f4a5e0806978ddedbe57a10.yaml new file mode 100644 index 0000000000..09e12b06ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/banner-management-for-woocommerce-fccced4c8f4a5e0806978ddedbe57a10.yaml @@ -0,0 +1,58 @@ +id: banner-management-for-woocommerce-fccced4c8f4a5e0806978ddedbe57a10 + +info: + name: > + Woocommerce Category Banner Management <= 2.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/223a6c35-712a-458c-8708-6981c9041fe1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/banner-management-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/banner-management-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,banner-management-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/banner-management-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "banner-management-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bannerlid-55df23e4f01ef0022903c3f40bc900ce.yaml b/nuclei-templates/cve-less/plugins/bannerlid-55df23e4f01ef0022903c3f40bc900ce.yaml new file mode 100644 index 0000000000..266a2dfcb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bannerlid-55df23e4f01ef0022903c3f40bc900ce.yaml @@ -0,0 +1,58 @@ +id: bannerlid-55df23e4f01ef0022903c3f40bc900ce + +info: + name: > + Bannerlid <= 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/602d1302-138f-4ee4-a36c-179f24a2bf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bannerlid/" + google-query: inurl:"/wp-content/plugins/bannerlid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bannerlid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bannerlid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bannerlid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bannerman-1bdbe0eed23754132ebb7324a7cbafe1.yaml b/nuclei-templates/cve-less/plugins/bannerman-1bdbe0eed23754132ebb7324a7cbafe1.yaml new file mode 100644 index 0000000000..96864f515e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bannerman-1bdbe0eed23754132ebb7324a7cbafe1.yaml @@ -0,0 +1,58 @@ +id: bannerman-1bdbe0eed23754132ebb7324a7cbafe1 + +info: + name: > + BannerMan <= 0.2.4 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e608c75f-dd84-4921-ae61-2bfa5cd717a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bannerman/" + google-query: inurl:"/wp-content/plugins/bannerman/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bannerman,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bannerman/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bannerman" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bannerman-acb1c7356c04fc668153a6e512559aa7.yaml b/nuclei-templates/cve-less/plugins/bannerman-acb1c7356c04fc668153a6e512559aa7.yaml new file mode 100644 index 0000000000..add1296f56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bannerman-acb1c7356c04fc668153a6e512559aa7.yaml @@ -0,0 +1,58 @@ +id: bannerman-acb1c7356c04fc668153a6e512559aa7 + +info: + name: > + BannerMan <= 0.2.4 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c85b895-7a55-45c6-aafb-66c7447be355?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bannerman/" + google-query: inurl:"/wp-content/plugins/bannerman/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bannerman,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bannerman/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bannerman" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/barclaycart-c2aa0d5f18c95dfed2e602c88c079b1b.yaml b/nuclei-templates/cve-less/plugins/barclaycart-c2aa0d5f18c95dfed2e602c88c079b1b.yaml new file mode 100644 index 0000000000..05b7775a1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/barclaycart-c2aa0d5f18c95dfed2e602c88c079b1b.yaml @@ -0,0 +1,58 @@ +id: barclaycart-c2aa0d5f18c95dfed2e602c88c079b1b + +info: + name: > + Barclaycart (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d84ad258-8a0c-44b2-9897-03ad214e8493?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/barclaycart/" + google-query: inurl:"/wp-content/plugins/barclaycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,barclaycart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/barclaycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barclaycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-3fe433fa04cbd74a4139a79417d6ceaa.yaml b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-3fe433fa04cbd74a4139a79417d6ceaa.yaml new file mode 100644 index 0000000000..afd39a26b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-3fe433fa04cbd74a4139a79417d6ceaa.yaml @@ -0,0 +1,58 @@ +id: barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-3fe433fa04cbd74a4139a79417d6ceaa + +info: + name: > + Barcode Scanner with Inventory & Order Manager <= 1.5.4 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c8ba503-db7e-4ac1-898f-a301854db60f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + google-query: inurl:"/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,barcode-scanner-lite-pos-to-manage-products-inventory-and-orders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barcode-scanner-lite-pos-to-manage-products-inventory-and-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-40a18728cfe568ff4c836d2215f1bab4.yaml b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-40a18728cfe568ff4c836d2215f1bab4.yaml new file mode 100644 index 0000000000..29fdb6f7ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-40a18728cfe568ff4c836d2215f1bab4.yaml @@ -0,0 +1,58 @@ +id: barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-40a18728cfe568ff4c836d2215f1bab4 + +info: + name: > + Barcode Scanner with Inventory & Order Manager <= 1.5.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/191759f5-8801-4483-933c-77811b63eb4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + google-query: inurl:"/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,barcode-scanner-lite-pos-to-manage-products-inventory-and-orders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barcode-scanner-lite-pos-to-manage-products-inventory-and-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-6598da95314501b73bd8f49d12607cda.yaml b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-6598da95314501b73bd8f49d12607cda.yaml new file mode 100644 index 0000000000..f1ad2b478f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-6598da95314501b73bd8f49d12607cda.yaml @@ -0,0 +1,58 @@ +id: barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-6598da95314501b73bd8f49d12607cda + +info: + name: > + Barcode Scanner with Inventory & Order Manager <= 1.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e268dfa-7761-4e52-9e97-288c58d2e5c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + google-query: inurl:"/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,barcode-scanner-lite-pos-to-manage-products-inventory-and-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barcode-scanner-lite-pos-to-manage-products-inventory-and-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-762974517202b3d8e87994dd1daef458.yaml b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-762974517202b3d8e87994dd1daef458.yaml new file mode 100644 index 0000000000..56f2f3c43a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-762974517202b3d8e87994dd1daef458.yaml @@ -0,0 +1,58 @@ +id: barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-762974517202b3d8e87994dd1daef458 + +info: + name: > + Barcode Scanner with Inventory & Order Manager <= 1.5.1 - Unauthenticated SQL Injection via userToken + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba18bd0c-ba6c-4f98-ac29-660a79affa6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + google-query: inurl:"/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,barcode-scanner-lite-pos-to-manage-products-inventory-and-orders,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barcode-scanner-lite-pos-to-manage-products-inventory-and-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-91fab9aed123b89a5ffac035c0489ae7.yaml b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-91fab9aed123b89a5ffac035c0489ae7.yaml new file mode 100644 index 0000000000..8c7d3449ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-91fab9aed123b89a5ffac035c0489ae7.yaml @@ -0,0 +1,58 @@ +id: barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-91fab9aed123b89a5ffac035c0489ae7 + +info: + name: > + Barcode Scanner with Inventory & Order Manager <= 1.5.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dffaf909-72f5-466f-8dd0-d46a81402caf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + google-query: inurl:"/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,barcode-scanner-lite-pos-to-manage-products-inventory-and-orders,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barcode-scanner-lite-pos-to-manage-products-inventory-and-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-c1bec35c5489d7d12ae6b841d923b29e.yaml b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-c1bec35c5489d7d12ae6b841d923b29e.yaml new file mode 100644 index 0000000000..e3ba583918 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-c1bec35c5489d7d12ae6b841d923b29e.yaml @@ -0,0 +1,58 @@ +id: barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-c1bec35c5489d7d12ae6b841d923b29e + +info: + name: > + Barcode Scanner with Inventory & Order Manager <= 1.5.1 - Unauthenticated Arbitrary File Upload via uploadFile + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34439db4-1b66-4ccb-bf84-fddef6bc1f88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + google-query: inurl:"/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,barcode-scanner-lite-pos-to-manage-products-inventory-and-orders,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barcode-scanner-lite-pos-to-manage-products-inventory-and-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-ea61aaf0b841c4447233caa711d245e0.yaml b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-ea61aaf0b841c4447233caa711d245e0.yaml new file mode 100644 index 0000000000..e1005ffced --- /dev/null +++ b/nuclei-templates/cve-less/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-ea61aaf0b841c4447233caa711d245e0.yaml @@ -0,0 +1,58 @@ +id: barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-ea61aaf0b841c4447233caa711d245e0 + +info: + name: > + Barcode Scanner with Inventory & Order Manager <= 1.5.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b2c2d52-7d76-4b7a-98e5-d3843720954a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + google-query: inurl:"/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,barcode-scanner-lite-pos-to-manage-products-inventory-and-orders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barcode-scanner-lite-pos-to-manage-products-inventory-and-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/basepress-a5afc25e9a9bba6762e73f63456f868e.yaml b/nuclei-templates/cve-less/plugins/basepress-a5afc25e9a9bba6762e73f63456f868e.yaml new file mode 100644 index 0000000000..e7fbdb9cba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/basepress-a5afc25e9a9bba6762e73f63456f868e.yaml @@ -0,0 +1,58 @@ +id: basepress-a5afc25e9a9bba6762e73f63456f868e + +info: + name: > + Knowledge Base documentation & wiki plugin – BasePress <= 2.16.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc4ec554-f7f5-4c0a-9f86-8d5c74bfe0ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/basepress/" + google-query: inurl:"/wp-content/plugins/basepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,basepress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/basepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "basepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/basepress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/basepress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6b2760ffe8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/basepress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: basepress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/basepress/" + google-query: inurl:"/wp-content/plugins/basepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,basepress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/basepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "basepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/basepress-fdf5e229c491f2ee061576794ec1d5c1.yaml b/nuclei-templates/cve-less/plugins/basepress-fdf5e229c491f2ee061576794ec1d5c1.yaml new file mode 100644 index 0000000000..70a85ed879 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/basepress-fdf5e229c491f2ee061576794ec1d5c1.yaml @@ -0,0 +1,58 @@ +id: basepress-fdf5e229c491f2ee061576794ec1d5c1 + +info: + name: > + Knowledge Base documentation & wiki plugin – BasePress <= 2.16.1 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47f05812-b873-4092-9014-20ca1d0e484a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/basepress/" + google-query: inurl:"/wp-content/plugins/basepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,basepress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/basepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "basepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/basic-interactive-world-map-b5b7bc46aa5c73951c7934c79faf05ff.yaml b/nuclei-templates/cve-less/plugins/basic-interactive-world-map-b5b7bc46aa5c73951c7934c79faf05ff.yaml new file mode 100644 index 0000000000..5030b47436 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/basic-interactive-world-map-b5b7bc46aa5c73951c7934c79faf05ff.yaml @@ -0,0 +1,58 @@ +id: basic-interactive-world-map-b5b7bc46aa5c73951c7934c79faf05ff + +info: + name: > + Basic Interactive World Map <= 2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/321b2b0d-8169-4e80-b86f-2ae29d9b8b7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/basic-interactive-world-map/" + google-query: inurl:"/wp-content/plugins/basic-interactive-world-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,basic-interactive-world-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/basic-interactive-world-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "basic-interactive-world-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baslider-6df2df1f538663a4b281d00b01155047.yaml b/nuclei-templates/cve-less/plugins/baslider-6df2df1f538663a4b281d00b01155047.yaml new file mode 100644 index 0000000000..71e48c7e4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baslider-6df2df1f538663a4b281d00b01155047.yaml @@ -0,0 +1,58 @@ +id: baslider-6df2df1f538663a4b281d00b01155047 + +info: + name: > + Image Slider by NextCode <= 1.1.2 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e340264-7cc0-4598-972f-aaa1fda2096b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baslider/" + google-query: inurl:"/wp-content/plugins/baslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baslider-8d331ddadf2ec92c698925fb701e1625.yaml b/nuclei-templates/cve-less/plugins/baslider-8d331ddadf2ec92c698925fb701e1625.yaml new file mode 100644 index 0000000000..8795859df5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baslider-8d331ddadf2ec92c698925fb701e1625.yaml @@ -0,0 +1,58 @@ +id: baslider-8d331ddadf2ec92c698925fb701e1625 + +info: + name: > + Image Slider by NextCode <= 1.1.2 - Cross-Site Request Forgery to Slide Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce90db0c-d4ca-4b32-8a64-681642aaf032?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baslider/" + google-query: inurl:"/wp-content/plugins/baslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baslider-9ea1bb5d162409cd77ba612423f2f166.yaml b/nuclei-templates/cve-less/plugins/baslider-9ea1bb5d162409cd77ba612423f2f166.yaml new file mode 100644 index 0000000000..e9bcc368f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baslider-9ea1bb5d162409cd77ba612423f2f166.yaml @@ -0,0 +1,58 @@ +id: baslider-9ea1bb5d162409cd77ba612423f2f166 + +info: + name: > + Image Slider by NextCode <= 1.1.2 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07aee352-dfef-4762-a93d-e131737d0535?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baslider/" + google-query: inurl:"/wp-content/plugins/baslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/batch-cat-5fc1378196caf660cea9b35242972f9a.yaml b/nuclei-templates/cve-less/plugins/batch-cat-5fc1378196caf660cea9b35242972f9a.yaml new file mode 100644 index 0000000000..57a3f381bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/batch-cat-5fc1378196caf660cea9b35242972f9a.yaml @@ -0,0 +1,58 @@ +id: batch-cat-5fc1378196caf660cea9b35242972f9a + +info: + name: > + Batch Cat <= 0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2799ede9-1905-44b9-b731-ce5398d561b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/batch-cat/" + google-query: inurl:"/wp-content/plugins/batch-cat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,batch-cat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/batch-cat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "batch-cat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baw-login-logout-menu-4d7cf09bd61a740d1d041e4a547bb223.yaml b/nuclei-templates/cve-less/plugins/baw-login-logout-menu-4d7cf09bd61a740d1d041e4a547bb223.yaml new file mode 100644 index 0000000000..60f1899a60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baw-login-logout-menu-4d7cf09bd61a740d1d041e4a547bb223.yaml @@ -0,0 +1,58 @@ +id: baw-login-logout-menu-4d7cf09bd61a740d1d041e4a547bb223 + +info: + name: > + Login Logout Menu <= 1.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9acb6e7d-990d-4ed7-93ab-79ba94aa9016?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baw-login-logout-menu/" + google-query: inurl:"/wp-content/plugins/baw-login-logout-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baw-login-logout-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baw-login-logout-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baw-login-logout-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/baw-post-views-count-689bba03a0123069bb521d413df5bf54.yaml b/nuclei-templates/cve-less/plugins/baw-post-views-count-689bba03a0123069bb521d413df5bf54.yaml new file mode 100644 index 0000000000..a33a42afb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/baw-post-views-count-689bba03a0123069bb521d413df5bf54.yaml @@ -0,0 +1,58 @@ +id: baw-post-views-count-689bba03a0123069bb521d413df5bf54 + +info: + name: > + Post Views Count <= 3.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36c3107d-f125-4715-999e-8862e4103313?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/baw-post-views-count/" + google-query: inurl:"/wp-content/plugins/baw-post-views-count/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,baw-post-views-count,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/baw-post-views-count/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "baw-post-views-count" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bb-bootstrap-cards-42392b45ae66f65286752e395147b8a3.yaml b/nuclei-templates/cve-less/plugins/bb-bootstrap-cards-42392b45ae66f65286752e395147b8a3.yaml new file mode 100644 index 0000000000..a4726d88db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bb-bootstrap-cards-42392b45ae66f65286752e395147b8a3.yaml @@ -0,0 +1,58 @@ +id: bb-bootstrap-cards-42392b45ae66f65286752e395147b8a3 + +info: + name: > + Cards for Beaver Builder <= 1.1.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via bootstrapcard link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac0dfaac-cce6-45f7-ad5b-d7dcb66453bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bb-bootstrap-cards/" + google-query: inurl:"/wp-content/plugins/bb-bootstrap-cards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bb-bootstrap-cards,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bb-bootstrap-cards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bb-bootstrap-cards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bb-ultimate-addon-1c74e3df9173084b9bb7ea805c234e58.yaml b/nuclei-templates/cve-less/plugins/bb-ultimate-addon-1c74e3df9173084b9bb7ea805c234e58.yaml new file mode 100644 index 0000000000..827c124474 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bb-ultimate-addon-1c74e3df9173084b9bb7ea805c234e58.yaml @@ -0,0 +1,58 @@ +id: bb-ultimate-addon-1c74e3df9173084b9bb7ea805c234e58 + +info: + name: > + Ultimate Addons for Beaver Builder <= 1.35.14 - Authenticated(Contributor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b29048e-cf06-463c-82e0-f1d973e50232?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bb-ultimate-addon/" + google-query: inurl:"/wp-content/plugins/bb-ultimate-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bb-ultimate-addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bb-ultimate-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bb-ultimate-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.35.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bb-ultimate-addon-463ccdd827fdb7cc231455301d2f674b.yaml b/nuclei-templates/cve-less/plugins/bb-ultimate-addon-463ccdd827fdb7cc231455301d2f674b.yaml new file mode 100644 index 0000000000..ef59e50998 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bb-ultimate-addon-463ccdd827fdb7cc231455301d2f674b.yaml @@ -0,0 +1,58 @@ +id: bb-ultimate-addon-463ccdd827fdb7cc231455301d2f674b + +info: + name: > + Ultimate Addons for Beaver Builder <= 1.24.0 - Missing Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86609dfe-2060-4db2-8c5c-4e541302fc50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bb-ultimate-addon/" + google-query: inurl:"/wp-content/plugins/bb-ultimate-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bb-ultimate-addon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bb-ultimate-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bb-ultimate-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bb-ultimate-addon-8495527ac09a59599c4f06adeea443c8.yaml b/nuclei-templates/cve-less/plugins/bb-ultimate-addon-8495527ac09a59599c4f06adeea443c8.yaml new file mode 100644 index 0000000000..96149119b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bb-ultimate-addon-8495527ac09a59599c4f06adeea443c8.yaml @@ -0,0 +1,58 @@ +id: bb-ultimate-addon-8495527ac09a59599c4f06adeea443c8 + +info: + name: > + Ultimate Addons for Beaver Builder <= 1.35.13 - Authenticated(Contributor+) Directory Traversal to Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38a5be0c-f905-4e27-b5c3-8c0606d71a61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bb-ultimate-addon/" + google-query: inurl:"/wp-content/plugins/bb-ultimate-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bb-ultimate-addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bb-ultimate-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bb-ultimate-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.35.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbp-members-only-de02ae500f9a57c33a0ee01cf27ee98f.yaml b/nuclei-templates/cve-less/plugins/bbp-members-only-de02ae500f9a57c33a0ee01cf27ee98f.yaml new file mode 100644 index 0000000000..ff53b7cbcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbp-members-only-de02ae500f9a57c33a0ee01cf27ee98f.yaml @@ -0,0 +1,58 @@ +id: bbp-members-only-de02ae500f9a57c33a0ee01cf27ee98f + +info: + name: > + bbPress Members Only <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f796b282-0012-4d86-914d-72c7707dce42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbp-members-only/" + google-query: inurl:"/wp-content/plugins/bbp-members-only/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbp-members-only,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbp-members-only/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbp-members-only" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbp-move-topics-2d66a242a2a2a1cad4298e09bf72f7ae.yaml b/nuclei-templates/cve-less/plugins/bbp-move-topics-2d66a242a2a2a1cad4298e09bf72f7ae.yaml new file mode 100644 index 0000000000..1f84237e97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbp-move-topics-2d66a242a2a2a1cad4298e09bf72f7ae.yaml @@ -0,0 +1,58 @@ +id: bbp-move-topics-2d66a242a2a2a1cad4298e09bf72f7ae + +info: + name: > + bbPress Move Topics <= 1.1.4 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b23b71d-1231-44ce-b992-5e74ddafb4bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbp-move-topics/" + google-query: inurl:"/wp-content/plugins/bbp-move-topics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbp-move-topics,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbp-move-topics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbp-move-topics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbp-move-topics-7d2d77fb555165867755ecf651af34c0.yaml b/nuclei-templates/cve-less/plugins/bbp-move-topics-7d2d77fb555165867755ecf651af34c0.yaml new file mode 100644 index 0000000000..b511cbc00b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbp-move-topics-7d2d77fb555165867755ecf651af34c0.yaml @@ -0,0 +1,58 @@ +id: bbp-move-topics-7d2d77fb555165867755ecf651af34c0 + +info: + name: > + bbPress Move Topics <= 1.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61bbd7fe-cacf-4390-b976-3b931fc84af3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbp-move-topics/" + google-query: inurl:"/wp-content/plugins/bbp-move-topics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbp-move-topics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbp-move-topics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbp-move-topics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbp-style-pack-a8af060628ffa49f9121f24c1f544243.yaml b/nuclei-templates/cve-less/plugins/bbp-style-pack-a8af060628ffa49f9121f24c1f544243.yaml new file mode 100644 index 0000000000..cc7b5070ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbp-style-pack-a8af060628ffa49f9121f24c1f544243.yaml @@ -0,0 +1,58 @@ +id: bbp-style-pack-a8af060628ffa49f9121f24c1f544243 + +info: + name: > + bbp style pack <= 5.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/169cb1b8-8a37-4a8b-b824-c31ef132b88a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbp-style-pack/" + google-query: inurl:"/wp-content/plugins/bbp-style-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbp-style-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbp-style-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbp-style-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbp-style-pack-b166ccca1e33f4281f58142489d93a0e.yaml b/nuclei-templates/cve-less/plugins/bbp-style-pack-b166ccca1e33f4281f58142489d93a0e.yaml new file mode 100644 index 0000000000..da676d72de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbp-style-pack-b166ccca1e33f4281f58142489d93a0e.yaml @@ -0,0 +1,58 @@ +id: bbp-style-pack-b166ccca1e33f4281f58142489d93a0e + +info: + name: > + bbp style pack <= 5.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49e82146-e8ad-4bc5-94a7-a4ae694b7039?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbp-style-pack/" + google-query: inurl:"/wp-content/plugins/bbp-style-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbp-style-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbp-style-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbp-style-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbp-toolkit-1c16449f8bc6ec80daa181529883284c.yaml b/nuclei-templates/cve-less/plugins/bbp-toolkit-1c16449f8bc6ec80daa181529883284c.yaml new file mode 100644 index 0000000000..18cd572457 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbp-toolkit-1c16449f8bc6ec80daa181529883284c.yaml @@ -0,0 +1,58 @@ +id: bbp-toolkit-1c16449f8bc6ec80daa181529883284c + +info: + name: > + bbPress Toolkit <= 1.0.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11305d35-07d6-4c61-a0c7-035671229f07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbp-toolkit/" + google-query: inurl:"/wp-content/plugins/bbp-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbp-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbp-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbp-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbp-toolkit-f0f195114e43b21943298311709b9cdf.yaml b/nuclei-templates/cve-less/plugins/bbp-toolkit-f0f195114e43b21943298311709b9cdf.yaml new file mode 100644 index 0000000000..59b3a7c263 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbp-toolkit-f0f195114e43b21943298311709b9cdf.yaml @@ -0,0 +1,58 @@ +id: bbp-toolkit-f0f195114e43b21943298311709b9cdf + +info: + name: > + bbPress Toolkit <= 1.0.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a9b2ec2-edbe-45c5-bd36-45a6101356d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbp-toolkit/" + google-query: inurl:"/wp-content/plugins/bbp-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbp-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbp-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbp-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbp-voting-40b2967e127caf7495ebfc36b3279860.yaml b/nuclei-templates/cve-less/plugins/bbp-voting-40b2967e127caf7495ebfc36b3279860.yaml new file mode 100644 index 0000000000..aac83ce104 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbp-voting-40b2967e127caf7495ebfc36b3279860.yaml @@ -0,0 +1,58 @@ +id: bbp-voting-40b2967e127caf7495ebfc36b3279860 + +info: + name: > + bbPress Voting <= 2.1.11.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33adf97e-c0f9-488b-b9cf-e703578c4d1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbp-voting/" + google-query: inurl:"/wp-content/plugins/bbp-voting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbp-voting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbp-voting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbp-voting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbpress-1f87f7a2adf09634e0df0bd21922373b.yaml b/nuclei-templates/cve-less/plugins/bbpress-1f87f7a2adf09634e0df0bd21922373b.yaml new file mode 100644 index 0000000000..cc65f642c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbpress-1f87f7a2adf09634e0df0bd21922373b.yaml @@ -0,0 +1,58 @@ +id: bbpress-1f87f7a2adf09634e0df0bd21922373b + +info: + name: > + bbPress <= 2.5.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ec8a72e-0153-4c2b-bdda-c6474cc2aadb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbpress/" + google-query: inurl:"/wp-content/plugins/bbpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbpress-4cbf85b774e16b710e92618758678558.yaml b/nuclei-templates/cve-less/plugins/bbpress-4cbf85b774e16b710e92618758678558.yaml new file mode 100644 index 0000000000..98d9f3cb7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbpress-4cbf85b774e16b710e92618758678558.yaml @@ -0,0 +1,58 @@ +id: bbpress-4cbf85b774e16b710e92618758678558 + +info: + name: > + bbPress <= 2.6.4 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57be90d8-dab7-49c8-bcdf-32e967ee1716?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbpress/" + google-query: inurl:"/wp-content/plugins/bbpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbpress-50e1ba859aba6574e04bc19be7d2a72d.yaml b/nuclei-templates/cve-less/plugins/bbpress-50e1ba859aba6574e04bc19be7d2a72d.yaml new file mode 100644 index 0000000000..edfe87d61d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbpress-50e1ba859aba6574e04bc19be7d2a72d.yaml @@ -0,0 +1,58 @@ +id: bbpress-50e1ba859aba6574e04bc19be7d2a72d + +info: + name: > + bbPress < 2.5.13 - Unauthenticated Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5097da41-b5e9-4e07-a135-83a7d889fe9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbpress/" + google-query: inurl:"/wp-content/plugins/bbpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbpress-a08c651ad045a182d61e4a734b04e24d.yaml b/nuclei-templates/cve-less/plugins/bbpress-a08c651ad045a182d61e4a734b04e24d.yaml new file mode 100644 index 0000000000..dcc6e6439a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbpress-a08c651ad045a182d61e4a734b04e24d.yaml @@ -0,0 +1,58 @@ +id: bbpress-a08c651ad045a182d61e4a734b04e24d + +info: + name: > + bbPress <= 2.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting via the forums list table + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f20aff55-f9c9-42f7-9c7b-3f4a709f4a60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbpress/" + google-query: inurl:"/wp-content/plugins/bbpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbpress-c2aad2cd7c74971784609bd3b7e968af.yaml b/nuclei-templates/cve-less/plugins/bbpress-c2aad2cd7c74971784609bd3b7e968af.yaml new file mode 100644 index 0000000000..7255f251b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbpress-c2aad2cd7c74971784609bd3b7e968af.yaml @@ -0,0 +1,58 @@ +id: bbpress-c2aad2cd7c74971784609bd3b7e968af + +info: + name: > + bbPress < 2.5.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcb76d10-fc60-4b19-9b47-1b98f8400a96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbpress/" + google-query: inurl:"/wp-content/plugins/bbpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbpress-login-register-links-on-forum-topic-pages-8b2df19f52d17e59f7bf267a5a7cd929.yaml b/nuclei-templates/cve-less/plugins/bbpress-login-register-links-on-forum-topic-pages-8b2df19f52d17e59f7bf267a5a7cd929.yaml new file mode 100644 index 0000000000..7067befbb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbpress-login-register-links-on-forum-topic-pages-8b2df19f52d17e59f7bf267a5a7cd929.yaml @@ -0,0 +1,58 @@ +id: bbpress-login-register-links-on-forum-topic-pages-8b2df19f52d17e59f7bf267a5a7cd929 + +info: + name: > + bbPress Login Register Links On Forum Topic Pages <= 2.7.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ec4e870-dd0f-4ec5-a03c-da47e6c1ef61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbpress-login-register-links-on-forum-topic-pages/" + google-query: inurl:"/wp-content/plugins/bbpress-login-register-links-on-forum-topic-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbpress-login-register-links-on-forum-topic-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbpress-login-register-links-on-forum-topic-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbpress-login-register-links-on-forum-topic-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbpress-post-topics-e9ae76ec6425c2521c80399f801c780e.yaml b/nuclei-templates/cve-less/plugins/bbpress-post-topics-e9ae76ec6425c2521c80399f801c780e.yaml new file mode 100644 index 0000000000..e60ee4cf56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbpress-post-topics-e9ae76ec6425c2521c80399f801c780e.yaml @@ -0,0 +1,58 @@ +id: bbpress-post-topics-e9ae76ec6425c2521c80399f801c780e + +info: + name: > + Post Comments as bbPress Topics <= 2.2.3 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b072278-6627-42b2-a532-c8854c9a4921?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbpress-post-topics/" + google-query: inurl:"/wp-content/plugins/bbpress-post-topics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbpress-post-topics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbpress-post-topics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbpress-post-topics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbresolutions-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bbresolutions-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1092e0d417 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbresolutions-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bbresolutions-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbresolutions/" + google-query: inurl:"/wp-content/plugins/bbresolutions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbresolutions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbresolutions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbresolutions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbs-e-franchise-c3364a727b0ebaebc84adf04bc03aa05.yaml b/nuclei-templates/cve-less/plugins/bbs-e-franchise-c3364a727b0ebaebc84adf04bc03aa05.yaml new file mode 100644 index 0000000000..f615aabb41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbs-e-franchise-c3364a727b0ebaebc84adf04bc03aa05.yaml @@ -0,0 +1,58 @@ +id: bbs-e-franchise-c3364a727b0ebaebc84adf04bc03aa05 + +info: + name: > + BBS e-Franchise < 1.1.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92321a3e-947b-4013-9b36-8bd6ea361f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbs-e-franchise/" + google-query: inurl:"/wp-content/plugins/bbs-e-franchise/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbs-e-franchise,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbs-e-franchise/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbs-e-franchise" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbs-e-popup-47cb3cea5c7ee929fdb9a30f97cd8b93.yaml b/nuclei-templates/cve-less/plugins/bbs-e-popup-47cb3cea5c7ee929fdb9a30f97cd8b93.yaml new file mode 100644 index 0000000000..6ce67290b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbs-e-popup-47cb3cea5c7ee929fdb9a30f97cd8b93.yaml @@ -0,0 +1,58 @@ +id: bbs-e-popup-47cb3cea5c7ee929fdb9a30f97cd8b93 + +info: + name: > + BBS e-Popup <= 2.4.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae5bbd0-2f95-41f3-a484-a9bb21b23b0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbs-e-popup/" + google-query: inurl:"/wp-content/plugins/bbs-e-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbs-e-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbs-e-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbs-e-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbs-e-popup-cf929e621e4b1d597c324db37b74c90e.yaml b/nuclei-templates/cve-less/plugins/bbs-e-popup-cf929e621e4b1d597c324db37b74c90e.yaml new file mode 100644 index 0000000000..7116a1f404 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbs-e-popup-cf929e621e4b1d597c324db37b74c90e.yaml @@ -0,0 +1,58 @@ +id: bbs-e-popup-cf929e621e4b1d597c324db37b74c90e + +info: + name: > + BBS e-Popup <= 2.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f715947-e379-4a05-9ab8-5d9e94ffc136?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbs-e-popup/" + google-query: inurl:"/wp-content/plugins/bbs-e-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbs-e-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbs-e-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbs-e-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bbspoiler-3b3faa72335204be9fd1e5395bb7377e.yaml b/nuclei-templates/cve-less/plugins/bbspoiler-3b3faa72335204be9fd1e5395bb7377e.yaml new file mode 100644 index 0000000000..102ac6a8f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bbspoiler-3b3faa72335204be9fd1e5395bb7377e.yaml @@ -0,0 +1,58 @@ +id: bbspoiler-3b3faa72335204be9fd1e5395bb7377e + +info: + name: > + BBSpoiler <= 2.01 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/789497b1-36cf-4de2-bca0-52c0c2a08f72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbspoiler/" + google-query: inurl:"/wp-content/plugins/bbspoiler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbspoiler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbspoiler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbspoiler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bc-menu-cart-woo-e37de4c1f7c016da27e52bf7ca80605e.yaml b/nuclei-templates/cve-less/plugins/bc-menu-cart-woo-e37de4c1f7c016da27e52bf7ca80605e.yaml new file mode 100644 index 0000000000..1a974fe28a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bc-menu-cart-woo-e37de4c1f7c016da27e52bf7ca80605e.yaml @@ -0,0 +1,58 @@ +id: bc-menu-cart-woo-e37de4c1f7c016da27e52bf7ca80605e + +info: + name: > + BC Menu Bar Cart Icon For WooCommerce By Binary Carpenter <= 1.49.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc626bdb-e962-407c-95c3-3f9e28dc5876?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bc-menu-cart-woo/" + google-query: inurl:"/wp-content/plugins/bc-menu-cart-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bc-menu-cart-woo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bc-menu-cart-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bc-menu-cart-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.49.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bc-woo-custom-thank-you-pages-b81dbbcc402e93364fc6c79f5c55b224.yaml b/nuclei-templates/cve-less/plugins/bc-woo-custom-thank-you-pages-b81dbbcc402e93364fc6c79f5c55b224.yaml new file mode 100644 index 0000000000..5f51eb7615 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bc-woo-custom-thank-you-pages-b81dbbcc402e93364fc6c79f5c55b224.yaml @@ -0,0 +1,58 @@ +id: bc-woo-custom-thank-you-pages-b81dbbcc402e93364fc6c79f5c55b224 + +info: + name: > + Custom Thank You Page Customize For WooCommerce by Binary Carpenter <= 1.4.13 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af6b7cba-56cc-4e78-a3c1-228eecb98120?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bc-woo-custom-thank-you-pages/" + google-query: inurl:"/wp-content/plugins/bc-woo-custom-thank-you-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bc-woo-custom-thank-you-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bc-woo-custom-thank-you-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bc-woo-custom-thank-you-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-613e6d1f73b0e9a2cfb432bf7b65549d.yaml b/nuclei-templates/cve-less/plugins/bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-613e6d1f73b0e9a2cfb432bf7b65549d.yaml new file mode 100644 index 0000000000..06883c7496 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-613e6d1f73b0e9a2cfb432bf7b65549d.yaml @@ -0,0 +1,58 @@ +id: bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-613e6d1f73b0e9a2cfb432bf7b65549d + +info: + name: > + Thanh Toán Quét Mã QR Code Tự Động – MoMo, ViettelPay, VNPay và 40 ngân hàng Việt Nam <= 2.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28bdad82-f09a-461f-b826-3f458f121fea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang/" + google-query: inurl:"/wp-content/plugins/bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bck-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bcorp-shortcodes-e46e0878d80b0d8d4416a50916ac9925.yaml b/nuclei-templates/cve-less/plugins/bcorp-shortcodes-e46e0878d80b0d8d4416a50916ac9925.yaml new file mode 100644 index 0000000000..a144525cdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bcorp-shortcodes-e46e0878d80b0d8d4416a50916ac9925.yaml @@ -0,0 +1,58 @@ +id: bcorp-shortcodes-e46e0878d80b0d8d4416a50916ac9925 + +info: + name: > + BCorp Shortcodes <= 0.23 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94696151-9f99-4847-bd67-8fb77f8b6a0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bcorp-shortcodes/" + google-query: inurl:"/wp-content/plugins/bcorp-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bcorp-shortcodes,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bcorp-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bcorp-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bcs-bertline-book-importer-1c1e9e2dd7e363e8e9eb9d15d5f2b60e.yaml b/nuclei-templates/cve-less/plugins/bcs-bertline-book-importer-1c1e9e2dd7e363e8e9eb9d15d5f2b60e.yaml new file mode 100644 index 0000000000..b126afef29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bcs-bertline-book-importer-1c1e9e2dd7e363e8e9eb9d15d5f2b60e.yaml @@ -0,0 +1,58 @@ +id: bcs-bertline-book-importer-1c1e9e2dd7e363e8e9eb9d15d5f2b60e + +info: + name: > + BCS BatchLine Book Importer <= 1.5.7 - Arbitrary Product Import/Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be0ef9d4-abb0-4801-b847-b84912bc6677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bcs-bertline-book-importer/" + google-query: inurl:"/wp-content/plugins/bcs-bertline-book-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bcs-bertline-book-importer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bcs-bertline-book-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bcs-bertline-book-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-c32e665e9be4b817092efeaf96853d74.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-c32e665e9be4b817092efeaf96853d74.yaml new file mode 100644 index 0000000000..ac4c6e6e5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-c32e665e9be4b817092efeaf96853d74.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-c32e665e9be4b817092efeaf96853d74 + +info: + name: > + Element Pack Pro <= 7.7.4 - Authenticated (Contributor+) Arbitrary File Read and PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41395c95-230d-441a-a261-cd67b95b76e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-46bd5e871ffddefa69b74900fbbdea14.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-46bd5e871ffddefa69b74900fbbdea14.yaml new file mode 100644 index 0000000000..57ce9a92ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-46bd5e871ffddefa69b74900fbbdea14.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-lite-46bd5e871ffddefa69b74900fbbdea14 + +info: + name: > + Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) <= 5.5.6 - Sensitive Information Exposure via element_pack_ajax_search + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39e0fd33-4071-4510-a7d5-b499a8a3543c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-7e6a3b2c412bc3d13ddc87f480a49f5e.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-7e6a3b2c412bc3d13ddc87f480a49f5e.yaml new file mode 100644 index 0000000000..267fb158f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-7e6a3b2c412bc3d13ddc87f480a49f5e.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-lite-7e6a3b2c412bc3d13ddc87f480a49f5e + +info: + name: > + Element Pack Elementor Addons <= 5.5.3 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0aced5de-e9df-4ffe-9d10-93dc3897ef4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-88c402ced2fc7c5811d5e082ac94297b.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-88c402ced2fc7c5811d5e082ac94297b.yaml new file mode 100644 index 0000000000..5547ef2da6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-88c402ced2fc7c5811d5e082ac94297b.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-lite-88c402ced2fc7c5811d5e082ac94297b + +info: + name: > + Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) <= 5.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Panel Slider Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ec6b03c-e594-4b20-9da0-78413048ba70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-91833325e07473e81e8f172735b05fa1.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-91833325e07473e81e8f172735b05fa1.yaml new file mode 100644 index 0000000000..1abd54522e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-91833325e07473e81e8f172735b05fa1.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-lite-91833325e07473e81e8f172735b05fa1 + +info: + name: > + Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) <= 5.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'Custom Gallery' Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a54c2a89-4297-48f5-bbff-e5c20c26a632?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-a5718896caa8539c5806c104b13a2ecf.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-a5718896caa8539c5806c104b13a2ecf.yaml new file mode 100644 index 0000000000..5a9094f364 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-a5718896caa8539c5806c104b13a2ecf.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-lite-a5718896caa8539c5806c104b13a2ecf + +info: + name: > + Element Pack Elementor Addons <= 5.4.11 - Missing Authorization via bdt_duplicate_as_draft + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/164a1e09-e967-450c-8938-84c18ebf267d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-e0e7d7ae87e3b7c89bbdeabc1a752e7d.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-e0e7d7ae87e3b7c89bbdeabc1a752e7d.yaml new file mode 100644 index 0000000000..18b948512a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-e0e7d7ae87e3b7c89bbdeabc1a752e7d.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-lite-e0e7d7ae87e3b7c89bbdeabc1a752e7d + +info: + name: > + Element Pack Elementor Addons <= 5.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/932ba486-d98d-4c16-afe5-3aaf030a1e48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-e5cbcd667f6374a7cacb1531a9b3233c.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-e5cbcd667f6374a7cacb1531a9b3233c.yaml new file mode 100644 index 0000000000..30b1d3e4f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-e5cbcd667f6374a7cacb1531a9b3233c.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-lite-e5cbcd667f6374a7cacb1531a9b3233c + +info: + name: > + Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) <= 5.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Price List Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2edfceaf-e719-4351-8f5c-2d7dd401c84e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-f4f911fdf61cb94da9a5aa199fbba441.yaml b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-f4f911fdf61cb94da9a5aa199fbba441.yaml new file mode 100644 index 0000000000..f938a2b223 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-element-pack-lite-f4f911fdf61cb94da9a5aa199fbba441.yaml @@ -0,0 +1,58 @@ +id: bdthemes-element-pack-lite-f4f911fdf61cb94da9a5aa199fbba441 + +info: + name: > + Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) <= 5.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Trailer Box Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/543c4d52-0e47-4bbb-b53e-dbe3f104734f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-element-pack-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-element-pack-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-element-pack-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-element-pack-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-element-pack-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-332edd099b0a24d5cedbd6ff5e1c921f.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-332edd099b0a24d5cedbd6ff5e1c921f.yaml new file mode 100644 index 0000000000..55b971374b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-332edd099b0a24d5cedbd6ff5e1c921f.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-332edd099b0a24d5cedbd6ff5e1c921f + +info: + name: > + Prime Slider – Addons For Elementor <= 3.13.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b97e41a7-dd0a-41cf-ba74-84b117192088?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-4475ed600e0c7aee761684483f573ae1.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-4475ed600e0c7aee761684483f573ae1.yaml new file mode 100644 index 0000000000..6ea7f654c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-4475ed600e0c7aee761684483f573ae1.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-4475ed600e0c7aee761684483f573ae1 + +info: + name: > + Prime Slider – Addons For Elementor <= 3.11.10 - Incorrect Authorization via bdt_duplicate_as_draft + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/691b7428-73e5-4800-85a1-19daa85aff4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-4856ea4fa23608af898ff19809065029.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-4856ea4fa23608af898ff19809065029.yaml new file mode 100644 index 0000000000..f189416959 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-4856ea4fa23608af898ff19809065029.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-4856ea4fa23608af898ff19809065029 + +info: + name: > + Prime Slider – Addons For Elementor <= 3.13.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Fiestar Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb3ee94-e631-47ee-9f16-6bf7c23abab1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-58cf3685b6d061649f14b9a15a1de69b.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-58cf3685b6d061649f14b9a15a1de69b.yaml new file mode 100644 index 0000000000..572d756147 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-58cf3685b6d061649f14b9a15a1de69b.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-58cf3685b6d061649f14b9a15a1de69b + +info: + name: > + Prime Slider – Addons For Elementor <= 3.13.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7683a91d-8c16-481e-a300-590ac378890a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-7c8990ed736a3cb5113e28a3af38b444.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-7c8990ed736a3cb5113e28a3af38b444.yaml new file mode 100644 index 0000000000..ea54ff8c37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-7c8990ed736a3cb5113e28a3af38b444.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-7c8990ed736a3cb5113e28a3af38b444 + +info: + name: > + Prime Slider – Addons For Elementor <= 3.13.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Mercury Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7da00af0-edd1-4c39-ae33-a0dc21bd25a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-889847d33809b1d03070e688df75ac6b.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-889847d33809b1d03070e688df75ac6b.yaml new file mode 100644 index 0000000000..9741a45c46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-889847d33809b1d03070e688df75ac6b.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-889847d33809b1d03070e688df75ac6b + +info: + name: > + Prime Slider – Addons For Elementor <= 3.13.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Rubix Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09f2cb22-07e2-4fe5-8c2a-9d4420ee26ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-b5d8ae30fccbde3a30e869d152e37902.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-b5d8ae30fccbde3a30e869d152e37902.yaml new file mode 100644 index 0000000000..d44b0ddd05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-b5d8ae30fccbde3a30e869d152e37902.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-b5d8ae30fccbde3a30e869d152e37902 + +info: + name: > + Prime Slider – Addons For Elementor (Revolution of a slider, Hero Slider, Media Slider, Drag Drop Slider, Video Slider, Product Slider, Ecommerce Slider) <= 3.14.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5a2ed81-254e-460c-b3a4-0cb38e089142?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e545ffae98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-c0add8aac27f340c1c289e5c63a1598d.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-c0add8aac27f340c1c289e5c63a1598d.yaml new file mode 100644 index 0000000000..bae6a1ea48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-c0add8aac27f340c1c289e5c63a1598d.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-c0add8aac27f340c1c289e5c63a1598d + +info: + name: > + Prime Slider – Addons For Elementor <= 3.13.2 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85013657-51a6-4d7f-bb9a-aca52d8669bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-dea28b24d7e53b89e98cd471b0652d7a.yaml b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-dea28b24d7e53b89e98cd471b0652d7a.yaml new file mode 100644 index 0000000000..f3f43f6662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdthemes-prime-slider-lite-dea28b24d7e53b89e98cd471b0652d7a.yaml @@ -0,0 +1,58 @@ +id: bdthemes-prime-slider-lite-dea28b24d7e53b89e98cd471b0652d7a + +info: + name: > + Prime Slider – Addons For Elementor (Revolution of a slider, Hero Slider, Ecommerce Slider) <= 3.14.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eba6056-e087-4347-ad36-96501ceb4cdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdthemes-prime-slider-lite/" + google-query: inurl:"/wp-content/plugins/bdthemes-prime-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdthemes-prime-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdthemes-prime-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdthemes-prime-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bdvs-password-reset-1a189dbfcf27a170ebf674465bd67d58.yaml b/nuclei-templates/cve-less/plugins/bdvs-password-reset-1a189dbfcf27a170ebf674465bd67d58.yaml new file mode 100644 index 0000000000..53927dca9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bdvs-password-reset-1a189dbfcf27a170ebf674465bd67d58.yaml @@ -0,0 +1,58 @@ +id: bdvs-password-reset-1a189dbfcf27a170ebf674465bd67d58 + +info: + name: > + Password Reset with Code for WordPress REST API <= 0.0.15 - Weak Password Recovery Mechanism + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f44b9e6d-2f84-45f6-9f74-3f23b03c5a49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bdvs-password-reset/" + google-query: inurl:"/wp-content/plugins/bdvs-password-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bdvs-password-reset,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bdvs-password-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bdvs-password-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/be-popia-compliant-7d6d3ed82fbce25bd8d4d72adc5dbb85.yaml b/nuclei-templates/cve-less/plugins/be-popia-compliant-7d6d3ed82fbce25bd8d4d72adc5dbb85.yaml new file mode 100644 index 0000000000..04a79909fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/be-popia-compliant-7d6d3ed82fbce25bd8d4d72adc5dbb85.yaml @@ -0,0 +1,58 @@ +id: be-popia-compliant-7d6d3ed82fbce25bd8d4d72adc5dbb85 + +info: + name: > + Be POPIA Compliant <= 1.2.0 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eecd1497-c94e-4f67-8cc5-72afffe9fae2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/be-popia-compliant/" + google-query: inurl:"/wp-content/plugins/be-popia-compliant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,be-popia-compliant,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/be-popia-compliant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "be-popia-compliant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/be-popia-compliant-89d00060ada213715ac2f4cc10816ef2.yaml b/nuclei-templates/cve-less/plugins/be-popia-compliant-89d00060ada213715ac2f4cc10816ef2.yaml new file mode 100644 index 0000000000..23e0b25ee5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/be-popia-compliant-89d00060ada213715ac2f4cc10816ef2.yaml @@ -0,0 +1,58 @@ +id: be-popia-compliant-89d00060ada213715ac2f4cc10816ef2 + +info: + name: > + Be POPIA Compliant <= 1.1.5 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fcdd6b5-a273-4916-a894-a753be0a7921?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/be-popia-compliant/" + google-query: inurl:"/wp-content/plugins/be-popia-compliant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,be-popia-compliant,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/be-popia-compliant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "be-popia-compliant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaf-before-and-after-gallery-5866d53824f6a21c318e64067df5b3af.yaml b/nuclei-templates/cve-less/plugins/beaf-before-and-after-gallery-5866d53824f6a21c318e64067df5b3af.yaml new file mode 100644 index 0000000000..388f5ac53d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaf-before-and-after-gallery-5866d53824f6a21c318e64067df5b3af.yaml @@ -0,0 +1,58 @@ +id: beaf-before-and-after-gallery-5866d53824f6a21c318e64067df5b3af + +info: + name: > + BEAF <= 4.5.4 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0bf0bf1-91c3-4f91-b5e4-189944b6a557?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaf-before-and-after-gallery/" + google-query: inurl:"/wp-content/plugins/beaf-before-and-after-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaf-before-and-after-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaf-before-and-after-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaf-before-and-after-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-2f0c52f572204949d9dfa707ba4715b5.yaml b/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-2f0c52f572204949d9dfa707ba4715b5.yaml new file mode 100644 index 0000000000..d166fe6252 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-2f0c52f572204949d9dfa707ba4715b5.yaml @@ -0,0 +1,58 @@ +id: beautiful-and-responsive-cookie-consent-2f0c52f572204949d9dfa707ba4715b5 + +info: + name: > + Beautiful Cookie Consent Banner <= 2.9.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd1b6b89-6c3c-4956-aa99-798ce186eb97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beautiful-and-responsive-cookie-consent/" + google-query: inurl:"/wp-content/plugins/beautiful-and-responsive-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beautiful-and-responsive-cookie-consent,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beautiful-and-responsive-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beautiful-and-responsive-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-4f0dd73da2c5ab7153159044ff19606c.yaml b/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-4f0dd73da2c5ab7153159044ff19606c.yaml new file mode 100644 index 0000000000..fcbcf2d581 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-4f0dd73da2c5ab7153159044ff19606c.yaml @@ -0,0 +1,58 @@ +id: beautiful-and-responsive-cookie-consent-4f0dd73da2c5ab7153159044ff19606c + +info: + name: > + Beautiful Cookie Consent Banner <= 2.10.0 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aee6fea2-dbf6-4155-ba3f-f85ea3520504?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beautiful-and-responsive-cookie-consent/" + google-query: inurl:"/wp-content/plugins/beautiful-and-responsive-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beautiful-and-responsive-cookie-consent,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beautiful-and-responsive-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beautiful-and-responsive-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-e17b32fc1c537aa75c208693d7d1b8f0.yaml b/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-e17b32fc1c537aa75c208693d7d1b8f0.yaml new file mode 100644 index 0000000000..82fcb710d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beautiful-and-responsive-cookie-consent-e17b32fc1c537aa75c208693d7d1b8f0.yaml @@ -0,0 +1,58 @@ +id: beautiful-and-responsive-cookie-consent-e17b32fc1c537aa75c208693d7d1b8f0 + +info: + name: > + Beautiful Cookie Consent Banner <= 2.10.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/542a4079-b1a2-49bc-9ddd-ba7978c9992e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beautiful-and-responsive-cookie-consent/" + google-query: inurl:"/wp-content/plugins/beautiful-and-responsive-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beautiful-and-responsive-cookie-consent,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beautiful-and-responsive-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beautiful-and-responsive-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-03b179e5beb399c252262dca2e1c2a47.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-03b179e5beb399c252262dca2e1c2a47.yaml new file mode 100644 index 0000000000..a239bc98b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-03b179e5beb399c252262dca2e1c2a47.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-03b179e5beb399c252262dca2e1c2a47 + +info: + name: > + Beaver Builder <= 2.5.4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28f0a927-a92e-45ab-8ef3-7a7c9368e1e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-31a5f54f51f59ec02334f6066d4afc3a.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-31a5f54f51f59ec02334f6066d4afc3a.yaml new file mode 100644 index 0000000000..7450db57da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-31a5f54f51f59ec02334f6066d4afc3a.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-31a5f54f51f59ec02334f6066d4afc3a + +info: + name: > + Beaver Builder <= 2.7.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Icon Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26bfef74-214f-4257-afc7-730e82e80946?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-3deace4984f0c809f54b31e2e6aaea40.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-3deace4984f0c809f54b31e2e6aaea40.yaml new file mode 100644 index 0000000000..22e86ad346 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-3deace4984f0c809f54b31e2e6aaea40.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-3deace4984f0c809f54b31e2e6aaea40 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.5.5.2 - Authenticated Stored Cross-Site Scripting via 'caption' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afbf1813-9023-4e3d-989a-19ddd6f6d358?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-49f8c3ec41639ad41107106a61b3b652.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-49f8c3ec41639ad41107106a61b3b652.yaml new file mode 100644 index 0000000000..0b04333cba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-49f8c3ec41639ad41107106a61b3b652.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-49f8c3ec41639ad41107106a61b3b652 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.8.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311170c-db2b-4c23-aa43-98d7e92839bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-4a6425bd134427fc325c845997202a57.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-4a6425bd134427fc325c845997202a57.yaml new file mode 100644 index 0000000000..04fb2049af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-4a6425bd134427fc325c845997202a57.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-4a6425bd134427fc325c845997202a57 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.7.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a13c7a1-f904-41b1-ab7f-2df95c9b2880?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-73d0b7fc0e78937e14e64656fc0eec81.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-73d0b7fc0e78937e14e64656fc0eec81.yaml new file mode 100644 index 0000000000..6c49498778 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-73d0b7fc0e78937e14e64656fc0eec81.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-73d0b7fc0e78937e14e64656fc0eec81 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.7.4.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via Audio Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a49e4f5a-ac9d-4f9b-8de2-c7871da8de35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-811048b3ad2eacb5c29f4e0546b22dd5.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-811048b3ad2eacb5c29f4e0546b22dd5.yaml new file mode 100644 index 0000000000..af04d6ae4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-811048b3ad2eacb5c29f4e0546b22dd5.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-811048b3ad2eacb5c29f4e0546b22dd5 + +info: + name: > + Beaver Builder – WordPress Page Builder (Free & Pro) <= 1.7 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd88b116-0a6e-412b-8d43-024fdf36bcdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a0f8dbe86bd25cb76ecd0536100264a1.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a0f8dbe86bd25cb76ecd0536100264a1.yaml new file mode 100644 index 0000000000..9fce31d385 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a0f8dbe86bd25cb76ecd0536100264a1.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-a0f8dbe86bd25cb76ecd0536100264a1 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.7.4.2 - Reflected (DOM-Based) Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2cc2776-9496-42b5-a242-c572ae5462fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a11c0611909385052cd0aaeced3bbff4.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a11c0611909385052cd0aaeced3bbff4.yaml new file mode 100644 index 0000000000..caceaa6e1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a11c0611909385052cd0aaeced3bbff4.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-a11c0611909385052cd0aaeced3bbff4 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.5.5.2 - Authenticated Stored Cross-Site Scripting via Text Editor + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05de06b1-52bb-47f7-af5e-e9320cf0437f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a48a705bfc66279fa96d49ee01ec64a4.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a48a705bfc66279fa96d49ee01ec64a4.yaml new file mode 100644 index 0000000000..0d2f73e859 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a48a705bfc66279fa96d49ee01ec64a4.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-a48a705bfc66279fa96d49ee01ec64a4 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.7.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96086886-72f4-4a62-8f31-fc20e5240ba4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a4b84494f2ca0459161168fd007453cd.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a4b84494f2ca0459161168fd007453cd.yaml new file mode 100644 index 0000000000..6f21b9c5cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-a4b84494f2ca0459161168fd007453cd.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-a4b84494f2ca0459161168fd007453cd + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.5.5.2 - Authenticated Stored Cross-Site Scripting via Caption - On Hover + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/325dd035-db3d-49b4-a422-7c2c734bfd32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-ac5ea49d172b7aeae239859f4682fe56.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-ac5ea49d172b7aeae239859f4682fe56.yaml new file mode 100644 index 0000000000..b329242dae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-ac5ea49d172b7aeae239859f4682fe56.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-ac5ea49d172b7aeae239859f4682fe56 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.7.4.4 - Authenticated(Contributor+) Stored Cross-Site Scripting via heading tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d62d3ca5-5795-46ef-ad8c-4474ff1e504e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-b00000526bce4d638ca8288e0858fb40.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-b00000526bce4d638ca8288e0858fb40.yaml new file mode 100644 index 0000000000..4e0883b24b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-b00000526bce4d638ca8288e0858fb40.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-b00000526bce4d638ca8288e0858fb40 + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.7.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21d1feae-e70f-439d-8992-f136211fdde0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-c20cb20ff14b1ed9f84a7525784a41bc.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-c20cb20ff14b1ed9f84a7525784a41bc.yaml new file mode 100644 index 0000000000..7628b08298 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-c20cb20ff14b1ed9f84a7525784a41bc.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-c20cb20ff14b1ed9f84a7525784a41bc + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.8.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99960ff7-62e1-4c44-ae8e-ebda3e075781?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-dd8649decc08f39c4790db22c44b5be7.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-dd8649decc08f39c4790db22c44b5be7.yaml new file mode 100644 index 0000000000..0ae1a6d910 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-dd8649decc08f39c4790db22c44b5be7.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-dd8649decc08f39c4790db22c44b5be7 + +info: + name: > + Beaver Builder <= 2.8.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via photo widget crop attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd6ed285-f215-44d3-9db9-9b2bfffee60a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-e9ae67bcdb286ec58db8997d8a78829a.yaml b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-e9ae67bcdb286ec58db8997d8a78829a.yaml new file mode 100644 index 0000000000..ba9bfc7430 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-builder-lite-version-e9ae67bcdb286ec58db8997d8a78829a.yaml @@ -0,0 +1,58 @@ +id: beaver-builder-lite-version-e9ae67bcdb286ec58db8997d8a78829a + +info: + name: > + Beaver Builder – WordPress Page Builder <= 2.5.5.2 - Authenticated Stored Cross-Site Scripting via Image URL + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/797768b3-5e4b-4f6e-8c5b-3513eace447d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-builder-lite-version/" + google-query: inurl:"/wp-content/plugins/beaver-builder-lite-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-builder-lite-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-builder-lite-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-builder-lite-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-themer-b957cb5f454b449f583a6eef42317102.yaml b/nuclei-templates/cve-less/plugins/beaver-themer-b957cb5f454b449f583a6eef42317102.yaml new file mode 100644 index 0000000000..b8997de169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-themer-b957cb5f454b449f583a6eef42317102.yaml @@ -0,0 +1,58 @@ +id: beaver-themer-b957cb5f454b449f583a6eef42317102 + +info: + name: > + Beaver Themer <= 1.4.9 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8428a92-8b0a-4a9a-8f7e-571c252973c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-themer/" + google-query: inurl:"/wp-content/plugins/beaver-themer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-themer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-themer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-themer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beaver-themer-c8a7f0039447f90c8cdf2d5bac0144d4.yaml b/nuclei-templates/cve-less/plugins/beaver-themer-c8a7f0039447f90c8cdf2d5bac0144d4.yaml new file mode 100644 index 0000000000..00bc3c7e36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beaver-themer-c8a7f0039447f90c8cdf2d5bac0144d4.yaml @@ -0,0 +1,58 @@ +id: beaver-themer-c8a7f0039447f90c8cdf2d5bac0144d4 + +info: + name: > + Beaver Themer <= 1.4.9 - Authenticated (Contributor+) Sensitive Information Exposure via shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4165cff7-457d-4790-8678-84c4365a191a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beaver-themer/" + google-query: inurl:"/wp-content/plugins/beaver-themer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beaver-themer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beaver-themer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beaver-themer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/becustom-1b89b5eb4288496d851956ba01f7ee38.yaml b/nuclei-templates/cve-less/plugins/becustom-1b89b5eb4288496d851956ba01f7ee38.yaml new file mode 100644 index 0000000000..c8daa5c082 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/becustom-1b89b5eb4288496d851956ba01f7ee38.yaml @@ -0,0 +1,58 @@ +id: becustom-1b89b5eb4288496d851956ba01f7ee38 + +info: + name: > + Becustom <= 1.0.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83c0e096-f054-4367-a85f-582c0771e3fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/becustom/" + google-query: inurl:"/wp-content/plugins/becustom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,becustom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/becustom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "becustom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beds24-online-booking-362ca4d6e33d614fc53fac12799f63e4.yaml b/nuclei-templates/cve-less/plugins/beds24-online-booking-362ca4d6e33d614fc53fac12799f63e4.yaml new file mode 100644 index 0000000000..733f030b31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beds24-online-booking-362ca4d6e33d614fc53fac12799f63e4.yaml @@ -0,0 +1,58 @@ +id: beds24-online-booking-362ca4d6e33d614fc53fac12799f63e4 + +info: + name: > + Beds24 Online Booking <= 2.0.23 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca5bc2af-394b-4fc1-b6c3-ed9ff0a5959a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beds24-online-booking/" + google-query: inurl:"/wp-content/plugins/beds24-online-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beds24-online-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beds24-online-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beds24-online-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beds24-online-booking-843511a1c7a253d8815f1011e5416ca7.yaml b/nuclei-templates/cve-less/plugins/beds24-online-booking-843511a1c7a253d8815f1011e5416ca7.yaml new file mode 100644 index 0000000000..17632a8608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beds24-online-booking-843511a1c7a253d8815f1011e5416ca7.yaml @@ -0,0 +1,58 @@ +id: beds24-online-booking-843511a1c7a253d8815f1011e5416ca7 + +info: + name: > + Beds24 Online Booking <= 2.0.24 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fc2b2a5-00b0-424e-8678-c6b5cd76baec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beds24-online-booking/" + google-query: inurl:"/wp-content/plugins/beds24-online-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beds24-online-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beds24-online-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beds24-online-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beebee-mini-56db8ce4b9ff6871db6cca64bbbcf0dc.yaml b/nuclei-templates/cve-less/plugins/beebee-mini-56db8ce4b9ff6871db6cca64bbbcf0dc.yaml new file mode 100644 index 0000000000..f0d0e0e853 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beebee-mini-56db8ce4b9ff6871db6cca64bbbcf0dc.yaml @@ -0,0 +1,58 @@ +id: beebee-mini-56db8ce4b9ff6871db6cca64bbbcf0dc + +info: + name: > + Beebee Mini <= 1.2.0 - Unauthorized File Upload via ACF + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27ca0d04-9796-415f-a6e6-7c1752a74fea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beebee-mini/" + google-query: inurl:"/wp-content/plugins/beebee-mini/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beebee-mini,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beebee-mini/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beebee-mini" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/beepress-7d84dd587f6a41715457eb91e2b1b3ae.yaml b/nuclei-templates/cve-less/plugins/beepress-7d84dd587f6a41715457eb91e2b1b3ae.yaml new file mode 100644 index 0000000000..c166aafdec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/beepress-7d84dd587f6a41715457eb91e2b1b3ae.yaml @@ -0,0 +1,58 @@ +id: beepress-7d84dd587f6a41715457eb91e2b1b3ae + +info: + name: > + BeePress <= 6.9.8 - Cross-Site Request Forgery via beepress-pro.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/334839c2-6844-4531-ab16-26f32ddcaba1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/beepress/" + google-query: inurl:"/wp-content/plugins/beepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,beepress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/beepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/before-after-image-slider-c52273b2cf56d5474ff79f10bc5133f6.yaml b/nuclei-templates/cve-less/plugins/before-after-image-slider-c52273b2cf56d5474ff79f10bc5133f6.yaml new file mode 100644 index 0000000000..4a9083d161 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/before-after-image-slider-c52273b2cf56d5474ff79f10bc5133f6.yaml @@ -0,0 +1,58 @@ +id: before-after-image-slider-c52273b2cf56d5474ff79f10bc5133f6 + +info: + name: > + Before After Image Slider WP <= 2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af76e32b-ba7d-4eaa-97c8-ed6a25e8f387?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/before-after-image-slider/" + google-query: inurl:"/wp-content/plugins/before-after-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,before-after-image-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/before-after-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "before-after-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/before-and-after-9868c860ce207929896c4fa67bae9575.yaml b/nuclei-templates/cve-less/plugins/before-and-after-9868c860ce207929896c4fa67bae9575.yaml new file mode 100644 index 0000000000..1cbebcc48d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/before-and-after-9868c860ce207929896c4fa67bae9575.yaml @@ -0,0 +1,58 @@ +id: before-and-after-9868c860ce207929896c4fa67bae9575 + +info: + name: > + Before And After <= 3.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c988b505-d42a-4d23-a641-f2fc8ab9c988?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/before-and-after/" + google-query: inurl:"/wp-content/plugins/before-and-after/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,before-and-after,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/before-and-after/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "before-and-after" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/before-and-after-product-images-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/before-and-after-product-images-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4f9b5d8e33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/before-and-after-product-images-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: before-and-after-product-images-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/before-and-after-product-images-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/before-and-after-product-images-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,before-and-after-product-images-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/before-and-after-product-images-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "before-and-after-product-images-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/before-and-after-product-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/before-and-after-product-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..1ffed73310 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/before-and-after-product-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: before-and-after-product-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/before-and-after-product-images-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/before-and-after-product-images-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,before-and-after-product-images-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/before-and-after-product-images-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "before-and-after-product-images-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bellows-accordion-menu-a2e597896da84d8e5ead12576f9d50bb.yaml b/nuclei-templates/cve-less/plugins/bellows-accordion-menu-a2e597896da84d8e5ead12576f9d50bb.yaml new file mode 100644 index 0000000000..96c33920b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bellows-accordion-menu-a2e597896da84d8e5ead12576f9d50bb.yaml @@ -0,0 +1,58 @@ +id: bellows-accordion-menu-a2e597896da84d8e5ead12576f9d50bb + +info: + name: > + Bellows Accordion Menu <= 1.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50283a4f-ea59-488a-bab0-dd6bc5718556?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bellows-accordion-menu/" + google-query: inurl:"/wp-content/plugins/bellows-accordion-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bellows-accordion-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bellows-accordion-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bellows-accordion-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/benchmark-email-lite-f47f4e7914a77fceef2cac004cb55a1b.yaml b/nuclei-templates/cve-less/plugins/benchmark-email-lite-f47f4e7914a77fceef2cac004cb55a1b.yaml new file mode 100644 index 0000000000..acb8b9866e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/benchmark-email-lite-f47f4e7914a77fceef2cac004cb55a1b.yaml @@ -0,0 +1,58 @@ +id: benchmark-email-lite-f47f4e7914a77fceef2cac004cb55a1b + +info: + name: > + Benchmark Email Lite <= 4.1 - Cross-Site Request Forgery via page_settings() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b52dab9-f518-4b66-ba2d-2e5b4aeb2bb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/benchmark-email-lite/" + google-query: inurl:"/wp-content/plugins/benchmark-email-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,benchmark-email-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/benchmark-email-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "benchmark-email-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bepro-listings-4b7af90d1d419a64b595cd9c1418239a.yaml b/nuclei-templates/cve-less/plugins/bepro-listings-4b7af90d1d419a64b595cd9c1418239a.yaml new file mode 100644 index 0000000000..1862295446 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bepro-listings-4b7af90d1d419a64b595cd9c1418239a.yaml @@ -0,0 +1,58 @@ +id: bepro-listings-4b7af90d1d419a64b595cd9c1418239a + +info: + name: > + BePro Listings <= 2.2.0020 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf88e79b-262e-4fee-9cef-85d96d300972?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bepro-listings/" + google-query: inurl:"/wp-content/plugins/bepro-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bepro-listings,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bepro-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bepro-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0020') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bertha-ai-free-b518bec195877c390c9c609530bbaa4b.yaml b/nuclei-templates/cve-less/plugins/bertha-ai-free-b518bec195877c390c9c609530bbaa4b.yaml new file mode 100644 index 0000000000..15957ecc5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bertha-ai-free-b518bec195877c390c9c609530bbaa4b.yaml @@ -0,0 +1,58 @@ +id: bertha-ai-free-b518bec195877c390c9c609530bbaa4b + +info: + name: > + BERTHA AI Plugin <= 1.11.10.7 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b4630f7-74db-46c4-bf86-f1ff64be3463?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bertha-ai-free/" + google-query: inurl:"/wp-content/plugins/bertha-ai-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bertha-ai-free,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bertha-ai-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bertha-ai-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.10.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/best-restaurant-menu-by-pricelisto-6c6dcf20e63f7dc387f2f85722e8901c.yaml b/nuclei-templates/cve-less/plugins/best-restaurant-menu-by-pricelisto-6c6dcf20e63f7dc387f2f85722e8901c.yaml new file mode 100644 index 0000000000..9549481f66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/best-restaurant-menu-by-pricelisto-6c6dcf20e63f7dc387f2f85722e8901c.yaml @@ -0,0 +1,58 @@ +id: best-restaurant-menu-by-pricelisto-6c6dcf20e63f7dc387f2f85722e8901c + +info: + name: > + Best Restaurant Menu by PriceListo <= 1.3.1 - Cross-Site Request Forgery via menu_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c24f881-52bc-4210-9037-bcdd1e4aa895?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/best-restaurant-menu-by-pricelisto/" + google-query: inurl:"/wp-content/plugins/best-restaurant-menu-by-pricelisto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,best-restaurant-menu-by-pricelisto,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/best-restaurant-menu-by-pricelisto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "best-restaurant-menu-by-pricelisto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/best-woocommerce-feed-339c653ee99c338c15ef4d1eade1d929.yaml b/nuclei-templates/cve-less/plugins/best-woocommerce-feed-339c653ee99c338c15ef4d1eade1d929.yaml new file mode 100644 index 0000000000..8eb7b3acb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/best-woocommerce-feed-339c653ee99c338c15ef4d1eade1d929.yaml @@ -0,0 +1,58 @@ +id: best-woocommerce-feed-339c653ee99c338c15ef4d1eade1d929 + +info: + name: > + Product Feed Manager <= 7.3.15 - Authenticated (Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a20b65a-6d3a-41fc-80c5-94cce0459a6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/best-woocommerce-feed/" + google-query: inurl:"/wp-content/plugins/best-woocommerce-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,best-woocommerce-feed,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/best-woocommerce-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "best-woocommerce-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/best-woocommerce-feed-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/best-woocommerce-feed-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..c756000097 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/best-woocommerce-feed-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: best-woocommerce-feed-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/best-woocommerce-feed/" + google-query: inurl:"/wp-content/plugins/best-woocommerce-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,best-woocommerce-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/best-woocommerce-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "best-woocommerce-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bestbooks-2a2a7cb185c86a125aeb5500ccc53d3d.yaml b/nuclei-templates/cve-less/plugins/bestbooks-2a2a7cb185c86a125aeb5500ccc53d3d.yaml new file mode 100644 index 0000000000..9c06f990e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bestbooks-2a2a7cb185c86a125aeb5500ccc53d3d.yaml @@ -0,0 +1,58 @@ +id: bestbooks-2a2a7cb185c86a125aeb5500ccc53d3d + +info: + name: > + Bestbooks <= 2.6.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd2d82f4-1493-4829-a4e9-adbb98301324?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bestbooks/" + google-query: inurl:"/wp-content/plugins/bestbooks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bestbooks,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bestbooks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bestbooks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-anchor-links-237b2843475a8f4f4f800677c6af1b8b.yaml b/nuclei-templates/cve-less/plugins/better-anchor-links-237b2843475a8f4f4f800677c6af1b8b.yaml new file mode 100644 index 0000000000..2b309d97ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-anchor-links-237b2843475a8f4f4f800677c6af1b8b.yaml @@ -0,0 +1,58 @@ +id: better-anchor-links-237b2843475a8f4f4f800677c6af1b8b + +info: + name: > + Better Anchor Links <= 1.7.5 - Cross-Site Request Forgery via admin/options.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f51ea60-7bda-4627-9b65-d1ff402dfc88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-anchor-links/" + google-query: inurl:"/wp-content/plugins/better-anchor-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-anchor-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-anchor-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-anchor-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-click-to-tweet-88dbd900cde513bacf9820ea94c0e8ec.yaml b/nuclei-templates/cve-less/plugins/better-click-to-tweet-88dbd900cde513bacf9820ea94c0e8ec.yaml new file mode 100644 index 0000000000..a005aa167f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-click-to-tweet-88dbd900cde513bacf9820ea94c0e8ec.yaml @@ -0,0 +1,58 @@ +id: better-click-to-tweet-88dbd900cde513bacf9820ea94c0e8ec + +info: + name: > + Better Click To Tweet <= 5.10.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4c21c56-c424-4667-a281-fa9e7241d8ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-click-to-tweet/" + google-query: inurl:"/wp-content/plugins/better-click-to-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-click-to-tweet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-click-to-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-click-to-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-click-to-tweet-d23e433446769426d4aae17f6fe2a04a.yaml b/nuclei-templates/cve-less/plugins/better-click-to-tweet-d23e433446769426d4aae17f6fe2a04a.yaml new file mode 100644 index 0000000000..166294aaab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-click-to-tweet-d23e433446769426d4aae17f6fe2a04a.yaml @@ -0,0 +1,58 @@ +id: better-click-to-tweet-d23e433446769426d4aae17f6fe2a04a + +info: + name: > + Better Click To Tweet <= 5.10.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd1e59a-a76d-4f6d-9d22-021afd45d9af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-click-to-tweet/" + google-query: inurl:"/wp-content/plugins/better-click-to-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-click-to-tweet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-click-to-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-click-to-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-click-to-tweet-d6f0e617de1a3c82f777a89829211e90.yaml b/nuclei-templates/cve-less/plugins/better-click-to-tweet-d6f0e617de1a3c82f777a89829211e90.yaml new file mode 100644 index 0000000000..82c1b30471 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-click-to-tweet-d6f0e617de1a3c82f777a89829211e90.yaml @@ -0,0 +1,58 @@ +id: better-click-to-tweet-d6f0e617de1a3c82f777a89829211e90 + +info: + name: > + Better Click To Tweet <= 5.10.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04bdc2ef-a7aa-45a7-b600-be832eefa32e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-click-to-tweet/" + google-query: inurl:"/wp-content/plugins/better-click-to-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-click-to-tweet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-click-to-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-click-to-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-comments-7585bdd855a3ce213df577df1a0cf7c5.yaml b/nuclei-templates/cve-less/plugins/better-comments-7585bdd855a3ce213df577df1a0cf7c5.yaml new file mode 100644 index 0000000000..d13ede2c3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-comments-7585bdd855a3ce213df577df1a0cf7c5.yaml @@ -0,0 +1,58 @@ +id: better-comments-7585bdd855a3ce213df577df1a0cf7c5 + +info: + name: > + Better Comments <= 1.5.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78b79a03-f2d0-42bb-a6e9-298c6cdd2ffa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-comments/" + google-query: inurl:"/wp-content/plugins/better-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-comments-cca7855a039dbac1182b0b2fae34c3b0.yaml b/nuclei-templates/cve-less/plugins/better-comments-cca7855a039dbac1182b0b2fae34c3b0.yaml new file mode 100644 index 0000000000..d48e28b5cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-comments-cca7855a039dbac1182b0b2fae34c3b0.yaml @@ -0,0 +1,58 @@ +id: better-comments-cca7855a039dbac1182b0b2fae34c3b0 + +info: + name: > + Better Comments <= 1.5.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4afbe34b-121e-41d2-ab12-c3d70a0d80d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-comments/" + google-query: inurl:"/wp-content/plugins/better-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-delete-revision-fdec0718eabbae53872d03fa70d141a9.yaml b/nuclei-templates/cve-less/plugins/better-delete-revision-fdec0718eabbae53872d03fa70d141a9.yaml new file mode 100644 index 0000000000..bec430deae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-delete-revision-fdec0718eabbae53872d03fa70d141a9.yaml @@ -0,0 +1,58 @@ +id: better-delete-revision-fdec0718eabbae53872d03fa70d141a9 + +info: + name: > + Better Delete Revision <= 1.6.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42156e9f-711a-4592-b92c-d4af845d686a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-delete-revision/" + google-query: inurl:"/wp-content/plugins/better-delete-revision/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-delete-revision,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-delete-revision/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-delete-revision" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-elementor-addons-267d7435385a9582ef7c8199e8931303.yaml b/nuclei-templates/cve-less/plugins/better-elementor-addons-267d7435385a9582ef7c8199e8931303.yaml new file mode 100644 index 0000000000..f67fb432da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-elementor-addons-267d7435385a9582ef7c8199e8931303.yaml @@ -0,0 +1,58 @@ +id: better-elementor-addons-267d7435385a9582ef7c8199e8931303 + +info: + name: > + Better Elementor Addons <= 1.3.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a628eef-937c-4391-afac-22128ec5b51c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-elementor-addons/" + google-query: inurl:"/wp-content/plugins/better-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-elementor-addons-9167001bdde424000d6bf79c1d596a20.yaml b/nuclei-templates/cve-less/plugins/better-elementor-addons-9167001bdde424000d6bf79c1d596a20.yaml new file mode 100644 index 0000000000..71df8b413b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-elementor-addons-9167001bdde424000d6bf79c1d596a20.yaml @@ -0,0 +1,58 @@ +id: better-elementor-addons-9167001bdde424000d6bf79c1d596a20 + +info: + name: > + Better Elementor Addons <= 1.3.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db8437ee-d917-406d-810d-6b7cbe7976c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-elementor-addons/" + google-query: inurl:"/wp-content/plugins/better-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-elementor-addons-b4d70a86acec874506b4ab2dcb06e399.yaml b/nuclei-templates/cve-less/plugins/better-elementor-addons-b4d70a86acec874506b4ab2dcb06e399.yaml new file mode 100644 index 0000000000..bb6fb59cf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-elementor-addons-b4d70a86acec874506b4ab2dcb06e399.yaml @@ -0,0 +1,58 @@ +id: better-elementor-addons-b4d70a86acec874506b4ab2dcb06e399 + +info: + name: > + Better Elementor Addons <= 1.4.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via widget links + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8d7ace3-af34-4951-810b-87923ef2ec30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-elementor-addons/" + google-query: inurl:"/wp-content/plugins/better-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/better-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..154186d090 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: better-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-elementor-addons/" + google-query: inurl:"/wp-content/plugins/better-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-elementor-addons-c71bf414dec349bec3e4220e85ee81e5.yaml b/nuclei-templates/cve-less/plugins/better-elementor-addons-c71bf414dec349bec3e4220e85ee81e5.yaml new file mode 100644 index 0000000000..f3f2c9370e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-elementor-addons-c71bf414dec349bec3e4220e85ee81e5.yaml @@ -0,0 +1,58 @@ +id: better-elementor-addons-c71bf414dec349bec3e4220e85ee81e5 + +info: + name: > + Better Elementor Addons <= 1.4.1 - Authenticated(Contributor+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/437712f5-a493-4625-a314-856f0d0d9758?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-elementor-addons/" + google-query: inurl:"/wp-content/plugins/better-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-follow-button-for-jetpack-bf3890ad3455b3c44beacb3bebc6b11a.yaml b/nuclei-templates/cve-less/plugins/better-follow-button-for-jetpack-bf3890ad3455b3c44beacb3bebc6b11a.yaml new file mode 100644 index 0000000000..348a02e881 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-follow-button-for-jetpack-bf3890ad3455b3c44beacb3bebc6b11a.yaml @@ -0,0 +1,58 @@ +id: better-follow-button-for-jetpack-bf3890ad3455b3c44beacb3bebc6b11a + +info: + name: > + Better Follow Button for Jetpack <= 8.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fec06875-f6b4-4e57-917f-e80ece3744e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-follow-button-for-jetpack/" + google-query: inurl:"/wp-content/plugins/better-follow-button-for-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-follow-button-for-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-follow-button-for-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-follow-button-for-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-font-awesome-1c7d78d4a78d0f2d3396fece72367d31.yaml b/nuclei-templates/cve-less/plugins/better-font-awesome-1c7d78d4a78d0f2d3396fece72367d31.yaml new file mode 100644 index 0000000000..ae5cd6d618 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-font-awesome-1c7d78d4a78d0f2d3396fece72367d31.yaml @@ -0,0 +1,58 @@ +id: better-font-awesome-1c7d78d4a78d0f2d3396fece72367d31 + +info: + name: > + Better Font Awesome <= 2.0.1 - Missing Authorization to Plugin Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1575e301-a26f-485e-bdf3-526b71c8306a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-font-awesome/" + google-query: inurl:"/wp-content/plugins/better-font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-font-awesome,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-font-awesome-367b17bcc7fd153764ffbb7e174fed0a.yaml b/nuclei-templates/cve-less/plugins/better-font-awesome-367b17bcc7fd153764ffbb7e174fed0a.yaml new file mode 100644 index 0000000000..f78449ab16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-font-awesome-367b17bcc7fd153764ffbb7e174fed0a.yaml @@ -0,0 +1,58 @@ +id: better-font-awesome-367b17bcc7fd153764ffbb7e174fed0a + +info: + name: > + Better Font Awesome <= 2.0.1 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d70b9b6-a1f0-4449-8d1a-ae16dbcc844d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-font-awesome/" + google-query: inurl:"/wp-content/plugins/better-font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-font-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-font-awesome-415ed972729f96565976948d92875199.yaml b/nuclei-templates/cve-less/plugins/better-font-awesome-415ed972729f96565976948d92875199.yaml new file mode 100644 index 0000000000..7a600e19ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-font-awesome-415ed972729f96565976948d92875199.yaml @@ -0,0 +1,58 @@ +id: better-font-awesome-415ed972729f96565976948d92875199 + +info: + name: > + Better Font Awesome <= 2.0.1 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f7f9d85-c376-45c5-91ab-559864f598c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-font-awesome/" + google-query: inurl:"/wp-content/plugins/better-font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-font-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-font-awesome-e128c0c0167442ae481665888471e921.yaml b/nuclei-templates/cve-less/plugins/better-font-awesome-e128c0c0167442ae481665888471e921.yaml new file mode 100644 index 0000000000..73bd6452b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-font-awesome-e128c0c0167442ae481665888471e921.yaml @@ -0,0 +1,58 @@ +id: better-font-awesome-e128c0c0167442ae481665888471e921 + +info: + name: > + Better Font Awesome <= 2.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/787ab3f0-c8c4-46cd-bfbe-ac1ca508898a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-font-awesome/" + google-query: inurl:"/wp-content/plugins/better-font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-font-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-messages-wc-vendors-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/better-messages-wc-vendors-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ec24220882 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-messages-wc-vendors-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: better-messages-wc-vendors-integration-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-messages-wc-vendors-integration/" + google-query: inurl:"/wp-content/plugins/better-messages-wc-vendors-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-messages-wc-vendors-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-messages-wc-vendors-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-messages-wc-vendors-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-messages-wcfm-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/better-messages-wcfm-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bed5e3b31f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-messages-wcfm-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: better-messages-wcfm-integration-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-messages-wcfm-integration/" + google-query: inurl:"/wp-content/plugins/better-messages-wcfm-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-messages-wcfm-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-messages-wcfm-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-messages-wcfm-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-robots-txt-0e514fdd87f87b672172ceb862e2efda.yaml b/nuclei-templates/cve-less/plugins/better-robots-txt-0e514fdd87f87b672172ceb862e2efda.yaml new file mode 100644 index 0000000000..4c27e1b997 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-robots-txt-0e514fdd87f87b672172ceb862e2efda.yaml @@ -0,0 +1,58 @@ +id: better-robots-txt-0e514fdd87f87b672172ceb862e2efda + +info: + name: > + Robots.txt optimization <= 1.4.5 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03eed366-c018-44b9-bb72-56911e9957b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-robots-txt/" + google-query: inurl:"/wp-content/plugins/better-robots-txt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-robots-txt,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-robots-txt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-robots-txt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-robots-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/better-robots-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..cd81490482 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-robots-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: better-robots-txt-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-robots-txt/" + google-query: inurl:"/wp-content/plugins/better-robots-txt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-robots-txt,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-robots-txt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-robots-txt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-robots-txt-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/better-robots-txt-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..0d9aad097c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-robots-txt-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: better-robots-txt-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-robots-txt/" + google-query: inurl:"/wp-content/plugins/better-robots-txt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-robots-txt,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-robots-txt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-robots-txt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-rss-widget-e9bfeb55edc6f8bed127152a2312d037.yaml b/nuclei-templates/cve-less/plugins/better-rss-widget-e9bfeb55edc6f8bed127152a2312d037.yaml new file mode 100644 index 0000000000..a4228e362a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-rss-widget-e9bfeb55edc6f8bed127152a2312d037.yaml @@ -0,0 +1,58 @@ +id: better-rss-widget-e9bfeb55edc6f8bed127152a2312d037 + +info: + name: > + Better RSS Widget <= 2.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12660e7a-51fc-42c5-8a09-49df1db51efb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-rss-widget/" + google-query: inurl:"/wp-content/plugins/better-rss-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-rss-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-rss-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-rss-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-1bccfaa95263e0cba6cdbff0fea9a636.yaml b/nuclei-templates/cve-less/plugins/better-search-1bccfaa95263e0cba6cdbff0fea9a636.yaml new file mode 100644 index 0000000000..e1974342bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-1bccfaa95263e0cba6cdbff0fea9a636.yaml @@ -0,0 +1,58 @@ +id: better-search-1bccfaa95263e0cba6cdbff0fea9a636 + +info: + name: > + Better Search <= 2.5.2 - Cross-Site Request Forgery to Settings Import + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfc6c595-dad2-4abc-8187-ed72355273b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search/" + google-query: inurl:"/wp-content/plugins/better-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-283fafa85d866a9f95a9b66cbfa775a5.yaml b/nuclei-templates/cve-less/plugins/better-search-283fafa85d866a9f95a9b66cbfa775a5.yaml new file mode 100644 index 0000000000..8ea06d199a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-283fafa85d866a9f95a9b66cbfa775a5.yaml @@ -0,0 +1,58 @@ +id: better-search-283fafa85d866a9f95a9b66cbfa775a5 + +info: + name: > + Better Search <= 1.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e057a35b-8162-4636-9fd9-419378df1ca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search/" + google-query: inurl:"/wp-content/plugins/better-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-44c47555058dcc87f8d2d8e62dfb89fe.yaml b/nuclei-templates/cve-less/plugins/better-search-44c47555058dcc87f8d2d8e62dfb89fe.yaml new file mode 100644 index 0000000000..50af03d6ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-44c47555058dcc87f8d2d8e62dfb89fe.yaml @@ -0,0 +1,58 @@ +id: better-search-44c47555058dcc87f8d2d8e62dfb89fe + +info: + name: > + Better Search <= 2.5.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7acbcf74-2bae-412b-bf9d-70287a91deea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search/" + google-query: inurl:"/wp-content/plugins/better-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-53aca78c2b71aacc822f7508e26b8d8c.yaml b/nuclei-templates/cve-less/plugins/better-search-53aca78c2b71aacc822f7508e26b8d8c.yaml new file mode 100644 index 0000000000..6df592709f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-53aca78c2b71aacc822f7508e26b8d8c.yaml @@ -0,0 +1,58 @@ +id: better-search-53aca78c2b71aacc822f7508e26b8d8c + +info: + name: > + Better Search < 2.2.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f91414-5035-4cab-81ad-18558fe43500?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search/" + google-query: inurl:"/wp-content/plugins/better-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-6cd471916f03102419bfc2ce43f76e09.yaml b/nuclei-templates/cve-less/plugins/better-search-6cd471916f03102419bfc2ce43f76e09.yaml new file mode 100644 index 0000000000..1caccd3a25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-6cd471916f03102419bfc2ce43f76e09.yaml @@ -0,0 +1,58 @@ +id: better-search-6cd471916f03102419bfc2ce43f76e09 + +info: + name: > + Better Search <= 3.3.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4e1638a-ddfb-44e5-951e-3e779971a3a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search/" + google-query: inurl:"/wp-content/plugins/better-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-d7962457b9f0fe1cda7fdf789451b9d7.yaml b/nuclei-templates/cve-less/plugins/better-search-d7962457b9f0fe1cda7fdf789451b9d7.yaml new file mode 100644 index 0000000000..8098c775b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-d7962457b9f0fe1cda7fdf789451b9d7.yaml @@ -0,0 +1,58 @@ +id: better-search-d7962457b9f0fe1cda7fdf789451b9d7 + +info: + name: > + Better Search <= 3.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7a02502-bc3c-4fd1-b6db-7b3c476c141f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search/" + google-query: inurl:"/wp-content/plugins/better-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-replace-116a3711d1ab72d436ec5c35678ceddf.yaml b/nuclei-templates/cve-less/plugins/better-search-replace-116a3711d1ab72d436ec5c35678ceddf.yaml new file mode 100644 index 0000000000..86dfc0be91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-replace-116a3711d1ab72d436ec5c35678ceddf.yaml @@ -0,0 +1,58 @@ +id: better-search-replace-116a3711d1ab72d436ec5c35678ceddf + +info: + name: > + Better Search Replace <= 1.4.4 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/895f2db1-a2ed-4a17-a4f6-cd13ee8f84af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search-replace/" + google-query: inurl:"/wp-content/plugins/better-search-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search-replace,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-replace-3d5b724b4980f24cb96bdfad9d38ad3d.yaml b/nuclei-templates/cve-less/plugins/better-search-replace-3d5b724b4980f24cb96bdfad9d38ad3d.yaml new file mode 100644 index 0000000000..ebc79f31a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-replace-3d5b724b4980f24cb96bdfad9d38ad3d.yaml @@ -0,0 +1,58 @@ +id: better-search-replace-3d5b724b4980f24cb96bdfad9d38ad3d + +info: + name: > + Better Search Replace <= 1.4 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd2f495e-63fd-49e4-9d6b-320ed007dacb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search-replace/" + google-query: inurl:"/wp-content/plugins/better-search-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search-replace,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-search-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml b/nuclei-templates/cve-less/plugins/better-search-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml new file mode 100644 index 0000000000..3867ce0bda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-search-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml @@ -0,0 +1,58 @@ +id: better-search-tmc-49f7af60a7d6ca8e6785ad7873768f2a + +info: + name: > + JQueryFileTree <= 2.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f20352f-386f-45ab-b719-8a70f5c11b02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-search-tmc/" + google-query: inurl:"/wp-content/plugins/better-search-tmc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-search-tmc,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-search-tmc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-search-tmc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-sharing-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/better-sharing-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1d23e05b91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-sharing-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: better-sharing-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-sharing/" + google-query: inurl:"/wp-content/plugins/better-sharing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-sharing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-sharing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-sharing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-0997b0e1fcb7c16b9cb4f5f402cc298d.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-0997b0e1fcb7c16b9cb4f5f402cc298d.yaml new file mode 100644 index 0000000000..e016e28808 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-0997b0e1fcb7c16b9cb4f5f402cc298d.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-0997b0e1fcb7c16b9cb4f5f402cc298d + +info: + name: > + iThemes Security < 3.2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5350e519-3fa5-4463-b7b4-12bbe6fd5591?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-39b1d1f60ebd078d2064f8fc42a6a86d.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-39b1d1f60ebd078d2064f8fc42a6a86d.yaml new file mode 100644 index 0000000000..4386b18dd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-39b1d1f60ebd078d2064f8fc42a6a86d.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-39b1d1f60ebd078d2064f8fc42a6a86d + +info: + name: > + Better WP Security <= 3.5.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ec45848-33b1-4088-ba06-9a12d291120e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-45704500e2fe99541d5fde0dba82eb44.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-45704500e2fe99541d5fde0dba82eb44.yaml new file mode 100644 index 0000000000..6fba95b9b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-45704500e2fe99541d5fde0dba82eb44.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-45704500e2fe99541d5fde0dba82eb44 + +info: + name: > + iThemes Security < 5.3.5 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9f0689d-aa35-4dfb-b264-5d7378ab1a54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-57328511425c4e523d0fbcd1b2df1e0b.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-57328511425c4e523d0fbcd1b2df1e0b.yaml new file mode 100644 index 0000000000..395eec18dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-57328511425c4e523d0fbcd1b2df1e0b.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-57328511425c4e523d0fbcd1b2df1e0b + +info: + name: > + iThemes Security < 5.3.1 - Insecure Backup/Logfile Generation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32d0f709-192a-4d9f-bfe9-15c1be4c4b95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-5914e98b8f19f72e002d683195cf84b7.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-5914e98b8f19f72e002d683195cf84b7.yaml new file mode 100644 index 0000000000..c05ebc5f1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-5914e98b8f19f72e002d683195cf84b7.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-5914e98b8f19f72e002d683195cf84b7 + +info: + name: > + iThemes Security <= 7.6.1 - Broken Password Mechanism + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5749a496-930a-4e31-968e-0c2a72e03555?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-607c512f0481cf565f88f66597dbe101.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-607c512f0481cf565f88f66597dbe101.yaml new file mode 100644 index 0000000000..cbdbc04fd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-607c512f0481cf565f88f66597dbe101.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-607c512f0481cf565f88f66597dbe101 + +info: + name: > + iThemes Security <= 4.6.12 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6168ee5-5df3-4d79-96bb-95029f2ac54b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-8a1c6c8c0e2f1e2277e0443f4946d572.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-8a1c6c8c0e2f1e2277e0443f4946d572.yaml new file mode 100644 index 0000000000..0a49b8bd74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-8a1c6c8c0e2f1e2277e0443f4946d572.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-8a1c6c8c0e2f1e2277e0443f4946d572 + +info: + name: > + iThemes Security <= 7.0.2 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a355a83-fece-4303-af37-8c01d159776a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-968e9dd9430c57e6055a517f19a3f88f.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-968e9dd9430c57e6055a517f19a3f88f.yaml new file mode 100644 index 0000000000..dc211e8167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-968e9dd9430c57e6055a517f19a3f88f.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-968e9dd9430c57e6055a517f19a3f88f + +info: + name: > + iThemes Security <= 5.6.1 - Sensitive Information Exposure via Diff Response + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a49c8df-0524-41af-b095-b5953e6f68d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-98d2f4e2c6a41f3ef336107b39e46630.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-98d2f4e2c6a41f3ef336107b39e46630.yaml new file mode 100644 index 0000000000..d998c60f14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-98d2f4e2c6a41f3ef336107b39e46630.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-98d2f4e2c6a41f3ef336107b39e46630 + +info: + name: > + Better WP Security <= 3.6.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3e74fb9-edb5-4602-9aac-375701a82f84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-a5079326b62d5c755b0860e79f56c774.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-a5079326b62d5c755b0860e79f56c774.yaml new file mode 100644 index 0000000000..f9885fee47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-a5079326b62d5c755b0860e79f56c774.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-a5079326b62d5c755b0860e79f56c774 + +info: + name: > + iThemes Security < 3.6.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f7014fc-a502-4f72-899f-c21d3ca5e5b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-b5b87b7676de117a8342f94f403bc1ce.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-b5b87b7676de117a8342f94f403bc1ce.yaml new file mode 100644 index 0000000000..9546050413 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-b5b87b7676de117a8342f94f403bc1ce.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-b5b87b7676de117a8342f94f403bc1ce + +info: + name: > + iThemes Security < 7.9.1 and iThemes Security Pro < 6.8.4 - Hidden Login Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21a1a6c2-0eb1-4ee3-abf0-76b84adca01b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-bc0054c93edc82fecefb873208e2d77c.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-bc0054c93edc82fecefb873208e2d77c.yaml new file mode 100644 index 0000000000..52be3b0af2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-bc0054c93edc82fecefb873208e2d77c.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-bc0054c93edc82fecefb873208e2d77c + +info: + name: > + iThemes Security <= 5.6.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8657003f-da37-4169-9f00-262d7f3d9a9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-cc701acb3e47b30801109dacbba292b7.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-cc701acb3e47b30801109dacbba292b7.yaml new file mode 100644 index 0000000000..b54c80b167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-cc701acb3e47b30801109dacbba292b7.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-cc701acb3e47b30801109dacbba292b7 + +info: + name: > + Solid Security Basic <= 9.0.0 - Unauthenticated Login Page Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88163d55-ab97-4697-a25b-d54615e2a843?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-d3827d64e2bdf966f3d9c111c132ea14.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-d3827d64e2bdf966f3d9c111c132ea14.yaml new file mode 100644 index 0000000000..d8fb406c44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-d3827d64e2bdf966f3d9c111c132ea14.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-d3827d64e2bdf966f3d9c111c132ea14 + +info: + name: > + Better WP Security <= 3.2.4 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2ccdafb-39f4-4249-95fa-a3d752c435f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-d859b6b56bcc909202cbeb832d5a6748.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-d859b6b56bcc909202cbeb832d5a6748.yaml new file mode 100644 index 0000000000..a11965dc1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-d859b6b56bcc909202cbeb832d5a6748.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-d859b6b56bcc909202cbeb832d5a6748 + +info: + name: > + iThemes Security <= 8.1.4 - Open Redirection via redirect_to_https + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/047cd34e-f2a1-4643-a1c5-3ead926b83ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-d99359e94988cec585163990a9f996b0.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-d99359e94988cec585163990a9f996b0.yaml new file mode 100644 index 0000000000..5f44465bf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-d99359e94988cec585163990a9f996b0.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-d99359e94988cec585163990a9f996b0 + +info: + name: > + iThemes Security <= 6.9.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b1dc818-75c6-45b7-9f0f-88275cc6e946?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-ed72aeba76ce6c9e43fa074b4806ae70.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-ed72aeba76ce6c9e43fa074b4806ae70.yaml new file mode 100644 index 0000000000..6a5d33d0bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-ed72aeba76ce6c9e43fa074b4806ae70.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-ed72aeba76ce6c9e43fa074b4806ae70 + +info: + name: > + iThemes Security < 3.4.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2137662-d328-4da7-986a-341ff1bdca63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/better-wp-security-f3ca166a2636d3e3f94a1bc3eb68152a.yaml b/nuclei-templates/cve-less/plugins/better-wp-security-f3ca166a2636d3e3f94a1bc3eb68152a.yaml new file mode 100644 index 0000000000..3cee7b67d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/better-wp-security-f3ca166a2636d3e3f94a1bc3eb68152a.yaml @@ -0,0 +1,58 @@ +id: better-wp-security-f3ca166a2636d3e3f94a1bc3eb68152a + +info: + name: > + iThemes Security <= 5.3.5 - Missing Capabilities Check + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/246eea09-abe5-41e9-811e-5cddedbbe01e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/better-wp-security/" + google-query: inurl:"/wp-content/plugins/better-wp-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,better-wp-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/better-wp-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "better-wp-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/betterdocs-757fc98134d873ee7c2bce4cfa1cf695.yaml b/nuclei-templates/cve-less/plugins/betterdocs-757fc98134d873ee7c2bce4cfa1cf695.yaml new file mode 100644 index 0000000000..1d71e04429 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/betterdocs-757fc98134d873ee7c2bce4cfa1cf695.yaml @@ -0,0 +1,58 @@ +id: betterdocs-757fc98134d873ee7c2bce4cfa1cf695 + +info: + name: > + BetterDocs – Best Documentation, FAQ & Knowledge Base Plugin with AI Support & Instant Answer For Elementor & Gutenberg <= 3.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d113191-b550-4752-b536-644206ab56c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/betterdocs/" + google-query: inurl:"/wp-content/plugins/betterdocs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,betterdocs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/betterdocs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betterdocs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/betterdocs-808772ef0715e55e48845eb09fe27708.yaml b/nuclei-templates/cve-less/plugins/betterdocs-808772ef0715e55e48845eb09fe27708.yaml new file mode 100644 index 0000000000..348323baa4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/betterdocs-808772ef0715e55e48845eb09fe27708.yaml @@ -0,0 +1,58 @@ +id: betterdocs-808772ef0715e55e48845eb09fe27708 + +info: + name: > + BetterDocs <= 2.5.2 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a7d6059-4cef-4bd1-a14d-ad544bfaeea3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/betterdocs/" + google-query: inurl:"/wp-content/plugins/betterdocs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,betterdocs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/betterdocs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betterdocs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/betterlinks-7f5e21acda03d1d7fde69a880719d61b.yaml b/nuclei-templates/cve-less/plugins/betterlinks-7f5e21acda03d1d7fde69a880719d61b.yaml new file mode 100644 index 0000000000..dfadfa6605 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/betterlinks-7f5e21acda03d1d7fde69a880719d61b.yaml @@ -0,0 +1,58 @@ +id: betterlinks-7f5e21acda03d1d7fde69a880719d61b + +info: + name: > + BetterLinks – Shorten, Track and Manage any URL <= 1.2.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/793082f8-5b5e-4973-819c-d2f11d1a596e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/betterlinks/" + google-query: inurl:"/wp-content/plugins/betterlinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,betterlinks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/betterlinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betterlinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/betterlinks-f079e6954da62257f11ff80bfdb93326.yaml b/nuclei-templates/cve-less/plugins/betterlinks-f079e6954da62257f11ff80bfdb93326.yaml new file mode 100644 index 0000000000..5ad3a14ab6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/betterlinks-f079e6954da62257f11ff80bfdb93326.yaml @@ -0,0 +1,58 @@ +id: betterlinks-f079e6954da62257f11ff80bfdb93326 + +info: + name: > + BetterLinks <= 1.6.0 - Improper Authorization to Data Import and Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92b8829e-a8eb-4fdb-a772-9efbb5aaeb6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/betterlinks/" + google-query: inurl:"/wp-content/plugins/betterlinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,betterlinks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/betterlinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betterlinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/betteroptin-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/betteroptin-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..eec753fb80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/betteroptin-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: betteroptin-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/betteroptin/" + google-query: inurl:"/wp-content/plugins/betteroptin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,betteroptin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/betteroptin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betteroptin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-0e6fd2b1537d8a018f72311524eaf46b.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-0e6fd2b1537d8a018f72311524eaf46b.yaml new file mode 100644 index 0000000000..6393e3c715 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-0e6fd2b1537d8a018f72311524eaf46b.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-0e6fd2b1537d8a018f72311524eaf46b + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6f7da0b-cc2c-43e5-8ae9-ef7d6d6f0ae9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-23eb31c668264c3c5aee5b4814654a30.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-23eb31c668264c3c5aee5b4814654a30.yaml new file mode 100644 index 0000000000..e8a88fb791 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-23eb31c668264c3c5aee5b4814654a30.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-23eb31c668264c3c5aee5b4814654a30 + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.7.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00fa12c7-5814-45f3-a35e-363cd0920e43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-33bf8f8eb63499d2436cf7f9e5a448fa.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-33bf8f8eb63499d2436cf7f9e5a448fa.yaml new file mode 100644 index 0000000000..48785f53c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-33bf8f8eb63499d2436cf7f9e5a448fa.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-33bf8f8eb63499d2436cf7f9e5a448fa + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4939efc-889a-4d1d-b916-dcf3b064dc81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-3c224c321d9ba7c36132b340a7d491de.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-3c224c321d9ba7c36132b340a7d491de.yaml new file mode 100644 index 0000000000..b87ed76ab8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-3c224c321d9ba7c36132b340a7d491de.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-3c224c321d9ba7c36132b340a7d491de + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba677822-a588-484e-a0aa-a9eda2954d01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-4270b682ebfb5d58e498fa26615a2af8.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-4270b682ebfb5d58e498fa26615a2af8.yaml new file mode 100644 index 0000000000..cbcade6de0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-4270b682ebfb5d58e498fa26615a2af8.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-4270b682ebfb5d58e498fa26615a2af8 + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.7.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1db421d-d935-4441-ae5e-cc01123e80e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-53f4d866310c8c093dd280b48d69df62.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-53f4d866310c8c093dd280b48d69df62.yaml new file mode 100644 index 0000000000..d434e20d0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-53f4d866310c8c093dd280b48d69df62.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-53f4d866310c8c093dd280b48d69df62 + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb6719d8-18d2-4fa3-9b52-ba11cf567bb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-85e7a548980a393d1ae0ce58883c267a.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-85e7a548980a393d1ae0ce58883c267a.yaml new file mode 100644 index 0000000000..97bc9b2b97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-85e7a548980a393d1ae0ce58883c267a.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-85e7a548980a393d1ae0ce58883c267a + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/755b53e4-051a-4a25-8fd9-fe10c28acc25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-a324da45179a3a5384dabaa9a7992990.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-a324da45179a3a5384dabaa9a7992990.yaml new file mode 100644 index 0000000000..bfe85ea9c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-a324da45179a3a5384dabaa9a7992990.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-a324da45179a3a5384dabaa9a7992990 + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7863f63c-11b5-43ac-9d68-8eb9925cdf7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-a4456a392889d99a207556dae46d468a.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-a4456a392889d99a207556dae46d468a.yaml new file mode 100644 index 0000000000..74a6e36a76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-a4456a392889d99a207556dae46d468a.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-a4456a392889d99a207556dae46d468a + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d87d225-7de4-49f8-9cba-391d718af7fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-a749224e64254fa4b744badbc098456b.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-a749224e64254fa4b744badbc098456b.yaml new file mode 100644 index 0000000000..712ba88cfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-a749224e64254fa4b744badbc098456b.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-a749224e64254fa4b744badbc098456b + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ef79c77-53e7-439d-985a-786eb73c44eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-a99d654d3052252ef402e0749a9ce566.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-a99d654d3052252ef402e0749a9ce566.yaml new file mode 100644 index 0000000000..71801dfb00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-a99d654d3052252ef402e0749a9ce566.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-a99d654d3052252ef402e0749a9ce566 + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e77bb0b8-e101-4230-b707-10a3a126192d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-b4b2a249b6f5481511775013e7ebd58b.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-b4b2a249b6f5481511775013e7ebd58b.yaml new file mode 100644 index 0000000000..2dfc2b921e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-b4b2a249b6f5481511775013e7ebd58b.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-b4b2a249b6f5481511775013e7ebd58b + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27bf9abc-b715-442e-9353-ec2154f658c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-b82f68ac873a5cd389e13e2f431350c2.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-b82f68ac873a5cd389e13e2f431350c2.yaml new file mode 100644 index 0000000000..92c8214d50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-b82f68ac873a5cd389e13e2f431350c2.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-b82f68ac873a5cd389e13e2f431350c2 + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.7.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bf798b5-2a5c-42d9-a4b3-d3ed056e1fdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-ee5009aa999f8729af055978227a592d.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-ee5009aa999f8729af055978227a592d.yaml new file mode 100644 index 0000000000..2152b61d91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-ee5009aa999f8729af055978227a592d.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-ee5009aa999f8729af055978227a592d + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea087a7-197b-4dbe-b551-8074a0ea23ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-f39e8e9f12f06ce6e02dc29ac3b8f718.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-f39e8e9f12f06ce6e02dc29ac3b8f718.yaml new file mode 100644 index 0000000000..ce37e5cec3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-f39e8e9f12f06ce6e02dc29ac3b8f718.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-f39e8e9f12f06ce6e02dc29ac3b8f718 + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.5.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92474491-b9fa-49f8-9256-8400af9eef95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bft-autoresponder-fa4a6ca6cb5f0ed29a506220c9fcc52b.yaml b/nuclei-templates/cve-less/plugins/bft-autoresponder-fa4a6ca6cb5f0ed29a506220c9fcc52b.yaml new file mode 100644 index 0000000000..833d972dc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bft-autoresponder-fa4a6ca6cb5f0ed29a506220c9fcc52b.yaml @@ -0,0 +1,58 @@ +id: bft-autoresponder-fa4a6ca6cb5f0ed29a506220c9fcc52b + +info: + name: > + Arigato Autoresponder and Newsletter <= 2.1.7.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4dbab86-926d-4438-8310-19373c9bdd99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bft-autoresponder/" + google-query: inurl:"/wp-content/plugins/bft-autoresponder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bft-autoresponder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bft-autoresponder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bg-biblie-references-9e36b0cf17e47fe4192107564b677097.yaml b/nuclei-templates/cve-less/plugins/bg-biblie-references-9e36b0cf17e47fe4192107564b677097.yaml new file mode 100644 index 0000000000..67ef75efdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bg-biblie-references-9e36b0cf17e47fe4192107564b677097.yaml @@ -0,0 +1,58 @@ +id: bg-biblie-references-9e36b0cf17e47fe4192107564b677097 + +info: + name: > + Bg Bible References <= 3.8.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29c97617-78b1-4798-99a6-488176070e4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bg-biblie-references/" + google-query: inurl:"/wp-content/plugins/bg-biblie-references/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bg-biblie-references,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bg-biblie-references/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bg-biblie-references" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bib2html-94f4e4e5606b83b8d91c368a5ee77e4b.yaml b/nuclei-templates/cve-less/plugins/bib2html-94f4e4e5606b83b8d91c368a5ee77e4b.yaml new file mode 100644 index 0000000000..334fbb9e5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bib2html-94f4e4e5606b83b8d91c368a5ee77e4b.yaml @@ -0,0 +1,58 @@ +id: bib2html-94f4e4e5606b83b8d91c368a5ee77e4b + +info: + name: > + bib2html <= 0.9.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be53bdbd-e797-4198-8ef9-bc01b5da68f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bib2html/" + google-query: inurl:"/wp-content/plugins/bib2html/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bib2html,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bib2html/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bib2html" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bic-media-4f0f10f376030e01ed907ee127ea7f81.yaml b/nuclei-templates/cve-less/plugins/bic-media-4f0f10f376030e01ed907ee127ea7f81.yaml new file mode 100644 index 0000000000..27d5760b0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bic-media-4f0f10f376030e01ed907ee127ea7f81.yaml @@ -0,0 +1,58 @@ +id: bic-media-4f0f10f376030e01ed907ee127ea7f81 + +info: + name: > + BIC Media Widget <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/946bff00-32ff-4d9b-93e1-77e6ee4cd987?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bic-media/" + google-query: inurl:"/wp-content/plugins/bic-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bic-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bic-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bic-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bigbluebutton-985f213479d8daa64d5f4a16ef20cb10.yaml b/nuclei-templates/cve-less/plugins/bigbluebutton-985f213479d8daa64d5f4a16ef20cb10.yaml new file mode 100644 index 0000000000..fe7ce66828 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bigbluebutton-985f213479d8daa64d5f4a16ef20cb10.yaml @@ -0,0 +1,58 @@ +id: bigbluebutton-985f213479d8daa64d5f4a16ef20cb10 + +info: + name: > + BigBlueButton <= 3.0.0-beta.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c799ee5-d8ee-4aec-b9a5-f93c150de6bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bigbluebutton/" + google-query: inurl:"/wp-content/plugins/bigbluebutton/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bigbluebutton,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bigbluebutton/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bigbluebutton" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0-beta.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bigbluebutton-c390ab25927b32a9c95c398ffd819321.yaml b/nuclei-templates/cve-less/plugins/bigbluebutton-c390ab25927b32a9c95c398ffd819321.yaml new file mode 100644 index 0000000000..f5c0330ff4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bigbluebutton-c390ab25927b32a9c95c398ffd819321.yaml @@ -0,0 +1,58 @@ +id: bigbluebutton-c390ab25927b32a9c95c398ffd819321 + +info: + name: > + BigBlueButton <= 3.0.0-beta.4 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f829d21-5347-46ec-9218-2b3cbe7d7b95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bigbluebutton/" + google-query: inurl:"/wp-content/plugins/bigbluebutton/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bigbluebutton,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bigbluebutton/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bigbluebutton" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0-beta.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bigcommerce-a40fe25194e0ab57cda985c21cea16d8.yaml b/nuclei-templates/cve-less/plugins/bigcommerce-a40fe25194e0ab57cda985c21cea16d8.yaml new file mode 100644 index 0000000000..a23b525eb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bigcommerce-a40fe25194e0ab57cda985c21cea16d8.yaml @@ -0,0 +1,58 @@ +id: bigcommerce-a40fe25194e0ab57cda985c21cea16d8 + +info: + name: > + BigCommerce <= 5.0.7 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3a7e0b6-dc6d-4e3a-bb05-12d6ace330df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bigcommerce/" + google-query: inurl:"/wp-content/plugins/bigcommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bigcommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bigcommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bigcommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bigcontact-307decab8c86de849610b37252ca6e15.yaml b/nuclei-templates/cve-less/plugins/bigcontact-307decab8c86de849610b37252ca6e15.yaml new file mode 100644 index 0000000000..810208718a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bigcontact-307decab8c86de849610b37252ca6e15.yaml @@ -0,0 +1,58 @@ +id: bigcontact-307decab8c86de849610b37252ca6e15 + +info: + name: > + BigContact <= 1.5.8 - Cross-Site Request Forgery leading to Plugin Settings Updates + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0403adb-08c4-4697-a7d9-50e39d46cd43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bigcontact/" + google-query: inurl:"/wp-content/plugins/bigcontact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bigcontact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bigcontact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bigcontact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bigcontact-61a7db517f3679fdc65455e830f0b650.yaml b/nuclei-templates/cve-less/plugins/bigcontact-61a7db517f3679fdc65455e830f0b650.yaml new file mode 100644 index 0000000000..d5a1dadd67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bigcontact-61a7db517f3679fdc65455e830f0b650.yaml @@ -0,0 +1,58 @@ +id: bigcontact-61a7db517f3679fdc65455e830f0b650 + +info: + name: > + BigContact Contact Page < 1.4.7 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b53fa6f-7fb8-4643-a365-7630102e7e46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bigcontact/" + google-query: inurl:"/wp-content/plugins/bigcontact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bigcontact,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bigcontact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bigcontact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/billingo-cfe50efdb1ba541e0424c762743e3772.yaml b/nuclei-templates/cve-less/plugins/billingo-cfe50efdb1ba541e0424c762743e3772.yaml new file mode 100644 index 0000000000..959ccbd155 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/billingo-cfe50efdb1ba541e0424c762743e3772.yaml @@ -0,0 +1,58 @@ +id: billingo-cfe50efdb1ba541e0424c762743e3772 + +info: + name: > + Official Integration for Billingo <= 3.3.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37ea39bd-58c5-49f6-9956-8e0089e8192d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/billingo/" + google-query: inurl:"/wp-content/plugins/billingo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,billingo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/billingo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "billingo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bing-site-verification-using-meta-tag-bc281b421f8fff950362929962ab0019.yaml b/nuclei-templates/cve-less/plugins/bing-site-verification-using-meta-tag-bc281b421f8fff950362929962ab0019.yaml new file mode 100644 index 0000000000..d82eb6a779 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bing-site-verification-using-meta-tag-bc281b421f8fff950362929962ab0019.yaml @@ -0,0 +1,58 @@ +id: bing-site-verification-using-meta-tag-bc281b421f8fff950362929962ab0019 + +info: + name: > + Binge Site Verification using Meta Tag <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting via Admin Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b050fa45-05b7-49ff-bb24-179150f3f959?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bing-site-verification-using-meta-tag/" + google-query: inurl:"/wp-content/plugins/bing-site-verification-using-meta-tag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bing-site-verification-using-meta-tag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bing-site-verification-using-meta-tag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bing-site-verification-using-meta-tag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/biometric-login-for-woocommerce-cf14923d0b22ebbc7d1094e134b296e1.yaml b/nuclei-templates/cve-less/plugins/biometric-login-for-woocommerce-cf14923d0b22ebbc7d1094e134b296e1.yaml new file mode 100644 index 0000000000..a2f8aeed9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/biometric-login-for-woocommerce-cf14923d0b22ebbc7d1094e134b296e1.yaml @@ -0,0 +1,58 @@ +id: biometric-login-for-woocommerce-cf14923d0b22ebbc7d1094e134b296e1 + +info: + name: > + Biometric Login for WooCommerce <= 1.0.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b280155e-6d07-448d-922c-4a0ea21f4992?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/biometric-login-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/biometric-login-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,biometric-login-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/biometric-login-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "biometric-login-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bird-feeder-028571cd7473a719693f2daa6ec95f68.yaml b/nuclei-templates/cve-less/plugins/bird-feeder-028571cd7473a719693f2daa6ec95f68.yaml new file mode 100644 index 0000000000..9cacdca738 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bird-feeder-028571cd7473a719693f2daa6ec95f68.yaml @@ -0,0 +1,58 @@ +id: bird-feeder-028571cd7473a719693f2daa6ec95f68 + +info: + name: > + Bird Feeder <= 1.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34728e7a-2242-49fe-a11f-77258e302bab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bird-feeder/" + google-query: inurl:"/wp-content/plugins/bird-feeder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bird-feeder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bird-feeder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bird-feeder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/birthdays-widget-c350cdbcabbf0c6c2cbe275725809f83.yaml b/nuclei-templates/cve-less/plugins/birthdays-widget-c350cdbcabbf0c6c2cbe275725809f83.yaml new file mode 100644 index 0000000000..1660bda676 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/birthdays-widget-c350cdbcabbf0c6c2cbe275725809f83.yaml @@ -0,0 +1,58 @@ +id: birthdays-widget-c350cdbcabbf0c6c2cbe275725809f83 + +info: + name: > + Birthdays Widget <= 1.7.18 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d1e0423-a91b-4096-ad65-19e2d11cfea1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/birthdays-widget/" + google-query: inurl:"/wp-content/plugins/birthdays-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,birthdays-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/birthdays-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "birthdays-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bit-assist-2a0968e3dc51c0d6442ac11d19f9e211.yaml b/nuclei-templates/cve-less/plugins/bit-assist-2a0968e3dc51c0d6442ac11d19f9e211.yaml new file mode 100644 index 0000000000..193bcf3273 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bit-assist-2a0968e3dc51c0d6442ac11d19f9e211.yaml @@ -0,0 +1,58 @@ +id: bit-assist-2a0968e3dc51c0d6442ac11d19f9e211 + +info: + name: > + Bit Assist <= 1.1.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb88e629-6811-4651-99b9-7394e4a787b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bit-assist/" + google-query: inurl:"/wp-content/plugins/bit-assist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bit-assist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bit-assist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bit-assist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bit-assist-5ca89842f69cd4e87dbd74d08645e3d9.yaml b/nuclei-templates/cve-less/plugins/bit-assist-5ca89842f69cd4e87dbd74d08645e3d9.yaml new file mode 100644 index 0000000000..ef7dff778e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bit-assist-5ca89842f69cd4e87dbd74d08645e3d9.yaml @@ -0,0 +1,58 @@ +id: bit-assist-5ca89842f69cd4e87dbd74d08645e3d9 + +info: + name: > + Bit Assist <= 1.1.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77a923d5-b73e-45cf-9617-09b4d5c8bb5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bit-assist/" + google-query: inurl:"/wp-content/plugins/bit-assist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bit-assist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bit-assist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bit-assist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bit-form-9d1eaa00002183482a2bac30ce7a0865.yaml b/nuclei-templates/cve-less/plugins/bit-form-9d1eaa00002183482a2bac30ce7a0865.yaml new file mode 100644 index 0000000000..3c00fbf485 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bit-form-9d1eaa00002183482a2bac30ce7a0865.yaml @@ -0,0 +1,58 @@ +id: bit-form-9d1eaa00002183482a2bac30ce7a0865 + +info: + name: > + Bit Form <= 1.8.1 - Unauthenticated Arbitrary File Upload to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faa3f6ab-43d6-4874-b16e-93abbb4ba72e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bit-form/" + google-query: inurl:"/wp-content/plugins/bit-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bit-form,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bit-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bit-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bit-form-ec6c4566c5b89e861708c86d4c662f99.yaml b/nuclei-templates/cve-less/plugins/bit-form-ec6c4566c5b89e861708c86d4c662f99.yaml new file mode 100644 index 0000000000..6ad3367845 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bit-form-ec6c4566c5b89e861708c86d4c662f99.yaml @@ -0,0 +1,58 @@ +id: bit-form-ec6c4566c5b89e861708c86d4c662f99 + +info: + name: > + Contact Form Builder by Bit Form <= 2.1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cb6384a-f9dc-454c-be39-c2c681e57d36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bit-form/" + google-query: inurl:"/wp-content/plugins/bit-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bit-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bit-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bit-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bit-form-fc27afcbd3ffc5123db575382c98ea40.yaml b/nuclei-templates/cve-less/plugins/bit-form-fc27afcbd3ffc5123db575382c98ea40.yaml new file mode 100644 index 0000000000..eacce6c1a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bit-form-fc27afcbd3ffc5123db575382c98ea40.yaml @@ -0,0 +1,58 @@ +id: bit-form-fc27afcbd3ffc5123db575382c98ea40 + +info: + name: > + Contact Form Builder Plugin: Multi Step Contact Form, Payment Form, Custom Contact Form Plugin by Bit Form <= 2.10.1 - Unauthenticated Insecure Direct Object Reference to Form Submission Alteration + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49ed7d6a-4a65-4efc-90e5-ffa5470d4011?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bit-form/" + google-query: inurl:"/wp-content/plugins/bit-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bit-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bit-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bit-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bitcoin-faucet-1ad3a36baf4c9ef732b67d8d092f21e4.yaml b/nuclei-templates/cve-less/plugins/bitcoin-faucet-1ad3a36baf4c9ef732b67d8d092f21e4.yaml new file mode 100644 index 0000000000..4597fc1105 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bitcoin-faucet-1ad3a36baf4c9ef732b67d8d092f21e4.yaml @@ -0,0 +1,58 @@ +id: bitcoin-faucet-1ad3a36baf4c9ef732b67d8d092f21e4 + +info: + name: > + Bitcoin / Altcoin Faucet <= 1.6.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30f7a858-6caf-44c3-8fc9-476e9fa86543?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bitcoin-faucet/" + google-query: inurl:"/wp-content/plugins/bitcoin-faucet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bitcoin-faucet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bitcoin-faucet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bitcoin-faucet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/biteship-4952fa6645076ab711fade644ad856a2.yaml b/nuclei-templates/cve-less/plugins/biteship-4952fa6645076ab711fade644ad856a2.yaml new file mode 100644 index 0000000000..6457c0b6fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/biteship-4952fa6645076ab711fade644ad856a2.yaml @@ -0,0 +1,58 @@ +id: biteship-4952fa6645076ab711fade644ad856a2 + +info: + name: > + Biteship <= 2.2.24 - Reflected Cross-Site Scripting via biteship_error and biteship_message + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0247ba6-d193-4b7d-969d-0cd239c57faa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/biteship/" + google-query: inurl:"/wp-content/plugins/biteship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,biteship,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/biteship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "biteship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/biteship-a18213c9c980e2ab86f946c3cc789f65.yaml b/nuclei-templates/cve-less/plugins/biteship-a18213c9c980e2ab86f946c3cc789f65.yaml new file mode 100644 index 0000000000..6bd330f4ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/biteship-a18213c9c980e2ab86f946c3cc789f65.yaml @@ -0,0 +1,58 @@ +id: biteship-a18213c9c980e2ab86f946c3cc789f65 + +info: + name: > + Biteship <= 2.2.27 - Authenticated (Shop manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a78c46ac-22dd-48f2-a10b-016205f7e7fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/biteship/" + google-query: inurl:"/wp-content/plugins/biteship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,biteship,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/biteship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "biteship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bitpay-checkout-for-woocommerce-bb0ef31fb16bd70576b63c47a36e1c9e.yaml b/nuclei-templates/cve-less/plugins/bitpay-checkout-for-woocommerce-bb0ef31fb16bd70576b63c47a36e1c9e.yaml new file mode 100644 index 0000000000..7de018085b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bitpay-checkout-for-woocommerce-bb0ef31fb16bd70576b63c47a36e1c9e.yaml @@ -0,0 +1,58 @@ +id: bitpay-checkout-for-woocommerce-bb0ef31fb16bd70576b63c47a36e1c9e + +info: + name: > + BitPay Checkout for WooCommerce <= 4.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea489c69-d4d9-4e05-8cac-25fd17d48506?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bitpay-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/bitpay-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bitpay-checkout-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bitpay-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bitpay-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bizcalendar-web-d5a1c9a6ee7e97f923697ab3631f023c.yaml b/nuclei-templates/cve-less/plugins/bizcalendar-web-d5a1c9a6ee7e97f923697ab3631f023c.yaml new file mode 100644 index 0000000000..2539a8c7bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bizcalendar-web-d5a1c9a6ee7e97f923697ab3631f023c.yaml @@ -0,0 +1,58 @@ +id: bizcalendar-web-d5a1c9a6ee7e97f923697ab3631f023c + +info: + name: > + BizCalendar Web <= 1.1.0.19 - Reflected Cross-Site Scripting via 'tab' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b76b12ed-1bb4-4aa9-ab9f-06084c667f40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bizcalendar-web/" + google-query: inurl:"/wp-content/plugins/bizcalendar-web/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bizcalendar-web,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bizcalendar-web/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bizcalendar-web" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bizlibrary-84478af058257dde74ad587387b8e0c5.yaml b/nuclei-templates/cve-less/plugins/bizlibrary-84478af058257dde74ad587387b8e0c5.yaml new file mode 100644 index 0000000000..4d69c359be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bizlibrary-84478af058257dde74ad587387b8e0c5.yaml @@ -0,0 +1,58 @@ +id: bizlibrary-84478af058257dde74ad587387b8e0c5 + +info: + name: > + BizLibrary <= 1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee7513d9-e76c-4da4-919b-ba376f0c4022?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bizlibrary/" + google-query: inurl:"/wp-content/plugins/bizlibrary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bizlibrary,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bizlibrary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bizlibrary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bj-lazy-load-2a10558db0160ae54882e46d43e98878.yaml b/nuclei-templates/cve-less/plugins/bj-lazy-load-2a10558db0160ae54882e46d43e98878.yaml new file mode 100644 index 0000000000..acfebc46ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bj-lazy-load-2a10558db0160ae54882e46d43e98878.yaml @@ -0,0 +1,58 @@ +id: bj-lazy-load-2a10558db0160ae54882e46d43e98878 + +info: + name: > + BJ Lazy Load < 1.0 - Remote File Inclusion via TimThumb + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/022f6239-67f2-4680-aeed-34c98c953bea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bj-lazy-load/" + google-query: inurl:"/wp-content/plugins/bj-lazy-load/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bj-lazy-load,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bj-lazy-load/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bj-lazy-load" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blackhole-bad-bots-d6d7d32a1720382a929420a5407cae07.yaml b/nuclei-templates/cve-less/plugins/blackhole-bad-bots-d6d7d32a1720382a929420a5407cae07.yaml new file mode 100644 index 0000000000..512cabea23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blackhole-bad-bots-d6d7d32a1720382a929420a5407cae07.yaml @@ -0,0 +1,58 @@ +id: blackhole-bad-bots-d6d7d32a1720382a929420a5407cae07 + +info: + name: > + Blackhole for Bad Bots <= 3.3.1 - Arbitrary IP Address Blocking via IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8447fa0-f994-4de3-b6e7-2fe61e06bed1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blackhole-bad-bots/" + google-query: inurl:"/wp-content/plugins/blackhole-bad-bots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blackhole-bad-bots,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blackhole-bad-bots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blackhole-bad-bots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..86dcad70c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: blaze-slide-show-for-wordpress-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blaze-slide-show-for-wordpress/" + google-query: inurl:"/wp-content/plugins/blaze-slide-show-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blaze-slide-show-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blaze-slide-show-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blaze-slide-show-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-8ba5840f6e2c5e47c69ce5e7a4b52e4d.yaml b/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-8ba5840f6e2c5e47c69ce5e7a4b52e4d.yaml new file mode 100644 index 0000000000..3c09b0f9c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-8ba5840f6e2c5e47c69ce5e7a4b52e4d.yaml @@ -0,0 +1,58 @@ +id: blaze-slide-show-for-wordpress-8ba5840f6e2c5e47c69ce5e7a4b52e4d + +info: + name: > + Blaze Slide Show <= 2.7 - Arbitrary File upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/010300f9-adef-4958-ac77-6ff981833e9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blaze-slide-show-for-wordpress/" + google-query: inurl:"/wp-content/plugins/blaze-slide-show-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blaze-slide-show-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blaze-slide-show-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blaze-slide-show-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-bc595712854b7922ce7b557c9cf5ef0e.yaml b/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-bc595712854b7922ce7b557c9cf5ef0e.yaml new file mode 100644 index 0000000000..ca7e58b368 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blaze-slide-show-for-wordpress-bc595712854b7922ce7b557c9cf5ef0e.yaml @@ -0,0 +1,58 @@ +id: blaze-slide-show-for-wordpress-bc595712854b7922ce7b557c9cf5ef0e + +info: + name: > + Blaze Slideshow <= 2.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ddf6964-e0e7-4093-8aea-ac33f4214122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blaze-slide-show-for-wordpress/" + google-query: inurl:"/wp-content/plugins/blaze-slide-show-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blaze-slide-show-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blaze-slide-show-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blaze-slide-show-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blobinator-2817b00f145ff05ea405982ca6e4d8ab.yaml b/nuclei-templates/cve-less/plugins/blobinator-2817b00f145ff05ea405982ca6e4d8ab.yaml new file mode 100644 index 0000000000..9935a1efd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blobinator-2817b00f145ff05ea405982ca6e4d8ab.yaml @@ -0,0 +1,58 @@ +id: blobinator-2817b00f145ff05ea405982ca6e4d8ab + +info: + name: > + KONTXT Content Advisor <= 2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc886378-cebf-4c0b-a089-62e9469dd954?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blobinator/" + google-query: inurl:"/wp-content/plugins/blobinator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blobinator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blobinator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blobinator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-for-font-awesome-69676cf2f0074a9838e0f912aa1e46f1.yaml b/nuclei-templates/cve-less/plugins/block-for-font-awesome-69676cf2f0074a9838e0f912aa1e46f1.yaml new file mode 100644 index 0000000000..1bf5491117 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-for-font-awesome-69676cf2f0074a9838e0f912aa1e46f1.yaml @@ -0,0 +1,58 @@ +id: block-for-font-awesome-69676cf2f0074a9838e0f912aa1e46f1 + +info: + name: > + Block for Font Awesome <= 1.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d255ca7-37a5-4c1b-84be-356ae3900f7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-for-font-awesome/" + google-query: inurl:"/wp-content/plugins/block-for-font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-for-font-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-for-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-for-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-options-009566ddcb125b1bb12196db82871dc9.yaml b/nuclei-templates/cve-less/plugins/block-options-009566ddcb125b1bb12196db82871dc9.yaml new file mode 100644 index 0000000000..ca16a9ee0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-options-009566ddcb125b1bb12196db82871dc9.yaml @@ -0,0 +1,58 @@ +id: block-options-009566ddcb125b1bb12196db82871dc9 + +info: + name: > + EditorsKit <= 1.40.3 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4528f9a1-7027-4aa9-b006-bea84aa19c84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-options/" + google-query: inurl:"/wp-content/plugins/block-options/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-options,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-options/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-options" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.40.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-options-3b363f50f63e2252e93a4eaf65f7fc9e.yaml b/nuclei-templates/cve-less/plugins/block-options-3b363f50f63e2252e93a4eaf65f7fc9e.yaml new file mode 100644 index 0000000000..04a0783deb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-options-3b363f50f63e2252e93a4eaf65f7fc9e.yaml @@ -0,0 +1,58 @@ +id: block-options-3b363f50f63e2252e93a4eaf65f7fc9e + +info: + name: > + EditorsKit <= 1.31.5 - Authenticated (Contributor+) Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0725c0ac-91a7-4359-b911-a450635b09bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-options/" + google-query: inurl:"/wp-content/plugins/block-options/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-options,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-options/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-options" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-options-b24d1d3e12abe16b131b78c39c76f1e6.yaml b/nuclei-templates/cve-less/plugins/block-options-b24d1d3e12abe16b131b78c39c76f1e6.yaml new file mode 100644 index 0000000000..2ca9a45dc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-options-b24d1d3e12abe16b131b78c39c76f1e6.yaml @@ -0,0 +1,58 @@ +id: block-options-b24d1d3e12abe16b131b78c39c76f1e6 + +info: + name: > + Gutenberg Block Editor Toolkit – EditorsKit <= 1.40.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/814cce39-ef25-4d0f-b793-dca5c873f468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-options/" + google-query: inurl:"/wp-content/plugins/block-options/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-options,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-options/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-options" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.40.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-referer-spam-a9d78c30300919411b59e3816f76e46c.yaml b/nuclei-templates/cve-less/plugins/block-referer-spam-a9d78c30300919411b59e3816f76e46c.yaml new file mode 100644 index 0000000000..8b26cc62bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-referer-spam-a9d78c30300919411b59e3816f76e46c.yaml @@ -0,0 +1,58 @@ +id: block-referer-spam-a9d78c30300919411b59e3816f76e46c + +info: + name: > + Block Referer Spam <= 1.1.9.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd97fba9-513b-46e1-9613-2f64c4272f34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-referer-spam/" + google-query: inurl:"/wp-content/plugins/block-referer-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-referer-spam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-referer-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-referer-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/block-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b9b2a6504f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: block-slider-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-slider/" + google-query: inurl:"/wp-content/plugins/block-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-specific-plugin-updates-5d7f25544963dc4081c5c5f1f1e89a49.yaml b/nuclei-templates/cve-less/plugins/block-specific-plugin-updates-5d7f25544963dc4081c5c5f1f1e89a49.yaml new file mode 100644 index 0000000000..9239d7563c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-specific-plugin-updates-5d7f25544963dc4081c5c5f1f1e89a49.yaml @@ -0,0 +1,58 @@ +id: block-specific-plugin-updates-5d7f25544963dc4081c5c5f1f1e89a49 + +info: + name: > + Block Plugin Update <= 3.3.1 - Cross-Site Request Forgery via bspu_plugin_select.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a998de7-fa46-495c-a4ca-15df4e59457f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-specific-plugin-updates/" + google-query: inurl:"/wp-content/plugins/block-specific-plugin-updates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-specific-plugin-updates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-specific-plugin-updates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-specific-plugin-updates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-styler-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/block-styler-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f8c3634f1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-styler-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: block-styler-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-styler-for-gravity-forms/" + google-query: inurl:"/wp-content/plugins/block-styler-for-gravity-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-styler-for-gravity-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-styler-for-gravity-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-styler-for-gravity-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/block-wp-login-c30d74ab3c1dc1a9e7b14ed816c12f35.yaml b/nuclei-templates/cve-less/plugins/block-wp-login-c30d74ab3c1dc1a9e7b14ed816c12f35.yaml new file mode 100644 index 0000000000..58a5f248c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/block-wp-login-c30d74ab3c1dc1a9e7b14ed816c12f35.yaml @@ -0,0 +1,58 @@ +id: block-wp-login-c30d74ab3c1dc1a9e7b14ed816c12f35 + +info: + name: > + Block WP Login <= 1.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07ea9b9b-e28f-484f-9338-8d40f3f8d6d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/block-wp-login/" + google-query: inurl:"/wp-content/plugins/block-wp-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,block-wp-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/block-wp-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "block-wp-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blocked-in-china-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/blocked-in-china-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4265d6aea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blocked-in-china-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: blocked-in-china-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blocked-in-china/" + google-query: inurl:"/wp-content/plugins/blocked-in-china/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blocked-in-china,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blocked-in-china/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocked-in-china" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blockmeister-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/blockmeister-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..97ecfb98e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blockmeister-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: blockmeister-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blockmeister/" + google-query: inurl:"/wp-content/plugins/blockmeister/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blockmeister,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blockmeister/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blockmeister" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blockonomics-bitcoin-payments-6e2bb03aadc9f84e5afdbf209dfee08d.yaml b/nuclei-templates/cve-less/plugins/blockonomics-bitcoin-payments-6e2bb03aadc9f84e5afdbf209dfee08d.yaml new file mode 100644 index 0000000000..775b29de0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blockonomics-bitcoin-payments-6e2bb03aadc9f84e5afdbf209dfee08d.yaml @@ -0,0 +1,58 @@ +id: blockonomics-bitcoin-payments-6e2bb03aadc9f84e5afdbf209dfee08d + +info: + name: > + WordPress Bitcoin Payments – Blockonomics <= 3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5bcf040-cc43-4b3d-a6fc-d41973725af6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blockonomics-bitcoin-payments/" + google-query: inurl:"/wp-content/plugins/blockonomics-bitcoin-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blockonomics-bitcoin-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blockonomics-bitcoin-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blockonomics-bitcoin-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blockonomics-bitcoin-payments-8a9e3a258561fd11df73e03998dab8aa.yaml b/nuclei-templates/cve-less/plugins/blockonomics-bitcoin-payments-8a9e3a258561fd11df73e03998dab8aa.yaml new file mode 100644 index 0000000000..752f1fe89d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blockonomics-bitcoin-payments-8a9e3a258561fd11df73e03998dab8aa.yaml @@ -0,0 +1,58 @@ +id: blockonomics-bitcoin-payments-8a9e3a258561fd11df73e03998dab8aa + +info: + name: > + WordPress Bitcoin Payments – Blockonomics <= 3.5.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67b14116-8708-401c-a037-4976a360256a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blockonomics-bitcoin-payments/" + google-query: inurl:"/wp-content/plugins/blockonomics-bitcoin-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blockonomics-bitcoin-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blockonomics-bitcoin-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blockonomics-bitcoin-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blocks-3d078edbe634b7f5d57ec87a78fa8d02.yaml b/nuclei-templates/cve-less/plugins/blocks-3d078edbe634b7f5d57ec87a78fa8d02.yaml new file mode 100644 index 0000000000..e3a067f135 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blocks-3d078edbe634b7f5d57ec87a78fa8d02.yaml @@ -0,0 +1,58 @@ +id: blocks-3d078edbe634b7f5d57ec87a78fa8d02 + +info: + name: > + Blocks <= 1.6.42 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66925385-d89e-45c0-a87b-4ad4f7b89d60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blocks/" + google-query: inurl:"/wp-content/plugins/blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blockspare-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/blockspare-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9db1e32375 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blockspare-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: blockspare-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blockspare/" + google-query: inurl:"/wp-content/plugins/blockspare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blockspare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blockspare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blockspare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blocksy-companion-10dffc5e6c324ec1dc8ebf67decddde7.yaml b/nuclei-templates/cve-less/plugins/blocksy-companion-10dffc5e6c324ec1dc8ebf67decddde7.yaml new file mode 100644 index 0000000000..068f61e70e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blocksy-companion-10dffc5e6c324ec1dc8ebf67decddde7.yaml @@ -0,0 +1,58 @@ +id: blocksy-companion-10dffc5e6c324ec1dc8ebf67decddde7 + +info: + name: > + Blocksy Companion <= 2.0.31 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b937cbfb-d43c-4cda-b247-921661cbc0ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blocksy-companion/" + google-query: inurl:"/wp-content/plugins/blocksy-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blocksy-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blocksy-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blocksy-companion-388e6ad87200512eea2e328c413a87c2.yaml b/nuclei-templates/cve-less/plugins/blocksy-companion-388e6ad87200512eea2e328c413a87c2.yaml new file mode 100644 index 0000000000..5498d51ecf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blocksy-companion-388e6ad87200512eea2e328c413a87c2.yaml @@ -0,0 +1,58 @@ +id: blocksy-companion-388e6ad87200512eea2e328c413a87c2 + +info: + name: > + Blocksy Companion <= 1.8.81 - Authenticated(Subscriber+) Sensitive Information Exposure via blocksy_posts shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d31aad1c-89d4-4f71-bfed-a795f7a4f209?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blocksy-companion/" + google-query: inurl:"/wp-content/plugins/blocksy-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blocksy-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blocksy-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blocksy-companion-487e89618ab2c9b35b3c1576f9f20c5d.yaml b/nuclei-templates/cve-less/plugins/blocksy-companion-487e89618ab2c9b35b3c1576f9f20c5d.yaml new file mode 100644 index 0000000000..e01d22a81d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blocksy-companion-487e89618ab2c9b35b3c1576f9f20c5d.yaml @@ -0,0 +1,58 @@ +id: blocksy-companion-487e89618ab2c9b35b3c1576f9f20c5d + +info: + name: > + Blocksy Companion <= 1.8.67 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e485949f-f48e-4a8c-b799-d1a41f36848c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blocksy-companion/" + google-query: inurl:"/wp-content/plugins/blocksy-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blocksy-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blocksy-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blocksy-companion-56a40035beb7c39c52fc3da1e76c20df.yaml b/nuclei-templates/cve-less/plugins/blocksy-companion-56a40035beb7c39c52fc3da1e76c20df.yaml new file mode 100644 index 0000000000..ef76750ada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blocksy-companion-56a40035beb7c39c52fc3da1e76c20df.yaml @@ -0,0 +1,58 @@ +id: blocksy-companion-56a40035beb7c39c52fc3da1e76c20df + +info: + name: > + Blocksy Companion <= 2.0.45 - Authenticated (Contributor+) Stored Cross-Site Scripting via SVG Uploads + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5208529c-4ac3-42a4-82d0-7f4d2e486236?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blocksy-companion/" + google-query: inurl:"/wp-content/plugins/blocksy-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blocksy-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blocksy-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blocksy-companion-a84b51b86b24a12fc85c3fc5e41345c9.yaml b/nuclei-templates/cve-less/plugins/blocksy-companion-a84b51b86b24a12fc85c3fc5e41345c9.yaml new file mode 100644 index 0000000000..6e2bd41e2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blocksy-companion-a84b51b86b24a12fc85c3fc5e41345c9.yaml @@ -0,0 +1,58 @@ +id: blocksy-companion-a84b51b86b24a12fc85c3fc5e41345c9 + +info: + name: > + Blocksy Companion <= 2.0.28 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb15611-85a4-4efb-81e5-7352c348c4a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blocksy-companion/" + google-query: inurl:"/wp-content/plugins/blocksy-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blocksy-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blocksy-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blocksy-companion-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/blocksy-companion-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..896b9bea4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blocksy-companion-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: blocksy-companion-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blocksy-companion/" + google-query: inurl:"/wp-content/plugins/blocksy-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blocksy-companion,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blocksy-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blockypage-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/blockypage-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9fa3f68eb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blockypage-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: blockypage-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blockypage/" + google-query: inurl:"/wp-content/plugins/blockypage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blockypage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blockypage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blockypage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-designer-bbf6652d4e763c9a7fafd94f884696c2.yaml b/nuclei-templates/cve-less/plugins/blog-designer-bbf6652d4e763c9a7fafd94f884696c2.yaml new file mode 100644 index 0000000000..535a24ecc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-designer-bbf6652d4e763c9a7fafd94f884696c2.yaml @@ -0,0 +1,58 @@ +id: blog-designer-bbf6652d4e763c9a7fafd94f884696c2 + +info: + name: > + Blog Designer <=1.8.10 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33727746-4481-4b7f-8d2a-100027b7d1c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-designer/" + google-query: inurl:"/wp-content/plugins/blog-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-designer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-designer-for-post-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/blog-designer-for-post-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..77e0417573 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-designer-for-post-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: blog-designer-for-post-and-widget-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-designer-for-post-and-widget/" + google-query: inurl:"/wp-content/plugins/blog-designer-for-post-and-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-designer-for-post-and-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-designer-for-post-and-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-designer-for-post-and-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-designer-for-post-and-widget-c371054500c25911223fb4e88ae17274.yaml b/nuclei-templates/cve-less/plugins/blog-designer-for-post-and-widget-c371054500c25911223fb4e88ae17274.yaml new file mode 100644 index 0000000000..cadfe775de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-designer-for-post-and-widget-c371054500c25911223fb4e88ae17274.yaml @@ -0,0 +1,58 @@ +id: blog-designer-for-post-and-widget-c371054500c25911223fb4e88ae17274 + +info: + name: > + Blog Designer - Post and Widget <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64694d30-a780-4655-9a65-af1cfa542ccc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-designer-for-post-and-widget/" + google-query: inurl:"/wp-content/plugins/blog-designer-for-post-and-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-designer-for-post-and-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-designer-for-post-and-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-designer-for-post-and-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-designer-pack-940c3e462fa88340681bbbfe05c2ceb9.yaml b/nuclei-templates/cve-less/plugins/blog-designer-pack-940c3e462fa88340681bbbfe05c2ceb9.yaml new file mode 100644 index 0000000000..9536dd2b8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-designer-pack-940c3e462fa88340681bbbfe05c2ceb9.yaml @@ -0,0 +1,58 @@ +id: blog-designer-pack-940c3e462fa88340681bbbfe05c2ceb9 + +info: + name: > + News & Blog Designer Pack – WordPress Blog Plugin <= 3.4.1 - Unauthenticated Remote Code Execution via Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f2bdf11-401a-48af-b1dc-aeeb40b9a384?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-designer-pack/" + google-query: inurl:"/wp-content/plugins/blog-designer-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-designer-pack,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-designer-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-designer-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-designer-pack-95eff066a45135b12edbc92f481f5d74.yaml b/nuclei-templates/cve-less/plugins/blog-designer-pack-95eff066a45135b12edbc92f481f5d74.yaml new file mode 100644 index 0000000000..4f0ba1ccc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-designer-pack-95eff066a45135b12edbc92f481f5d74.yaml @@ -0,0 +1,58 @@ +id: blog-designer-pack-95eff066a45135b12edbc92f481f5d74 + +info: + name: > + News & Blog Designer Pack <= 3.2 - Authenticated (Contributor+) Stored Cross-Site SQcripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c021296-e0e8-481d-a46d-a97934492857?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-designer-pack/" + google-query: inurl:"/wp-content/plugins/blog-designer-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-designer-pack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-designer-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-designer-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-designer-pack-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/blog-designer-pack-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6925fa4a68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-designer-pack-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: blog-designer-pack-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-designer-pack/" + google-query: inurl:"/wp-content/plugins/blog-designer-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-designer-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-designer-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-designer-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-filter-0fe998643673fbc89bdce1d6f1c4acbf.yaml b/nuclei-templates/cve-less/plugins/blog-filter-0fe998643673fbc89bdce1d6f1c4acbf.yaml new file mode 100644 index 0000000000..2c41eb8667 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-filter-0fe998643673fbc89bdce1d6f1c4acbf.yaml @@ -0,0 +1,58 @@ +id: blog-filter-0fe998643673fbc89bdce1d6f1c4acbf + +info: + name: > + Blog Filter <= 1.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b95c1bf7-bb05-44d3-a185-7e38e62b7201?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-filter/" + google-query: inurl:"/wp-content/plugins/blog-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-floating-button-5dd5fb8b74d5846a17aa6d905d9963d8.yaml b/nuclei-templates/cve-less/plugins/blog-floating-button-5dd5fb8b74d5846a17aa6d905d9963d8.yaml new file mode 100644 index 0000000000..58dca58e46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-floating-button-5dd5fb8b74d5846a17aa6d905d9963d8.yaml @@ -0,0 +1,58 @@ +id: blog-floating-button-5dd5fb8b74d5846a17aa6d905d9963d8 + +info: + name: > + Blog Floating Button <= 1.4.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ba56b4c-0573-4911-97a4-a51e867daa75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-floating-button/" + google-query: inurl:"/wp-content/plugins/blog-floating-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-floating-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-floating-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-floating-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-in-blog-97602b372ac2dff313ee6b7601be8c2a.yaml b/nuclei-templates/cve-less/plugins/blog-in-blog-97602b372ac2dff313ee6b7601be8c2a.yaml new file mode 100644 index 0000000000..ebc3d2c591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-in-blog-97602b372ac2dff313ee6b7601be8c2a.yaml @@ -0,0 +1,58 @@ +id: blog-in-blog-97602b372ac2dff313ee6b7601be8c2a + +info: + name: > + Blog-in-Blog <= 1.1.1 - Authenticated (Editor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c6a88c3-18b7-470f-8014-373ead66dcfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-in-blog/" + google-query: inurl:"/wp-content/plugins/blog-in-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-in-blog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-in-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-in-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-in-blog-e95a6a45d70dd7149f957cc2dea209d3.yaml b/nuclei-templates/cve-less/plugins/blog-in-blog-e95a6a45d70dd7149f957cc2dea209d3.yaml new file mode 100644 index 0000000000..77b18d57b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-in-blog-e95a6a45d70dd7149f957cc2dea209d3.yaml @@ -0,0 +1,58 @@ +id: blog-in-blog-e95a6a45d70dd7149f957cc2dea209d3 + +info: + name: > + Blog-in-Blog <= 1.1.1 - Authenticated (Editor+) Local File Inclusion via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d53161ad-cc5f-4433-b288-a8095cdfd7db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-in-blog/" + google-query: inurl:"/wp-content/plugins/blog-in-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-in-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-in-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-in-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-manager-light-2091e63be6d7dbb4cc291d8c18478150.yaml b/nuclei-templates/cve-less/plugins/blog-manager-light-2091e63be6d7dbb4cc291d8c18478150.yaml new file mode 100644 index 0000000000..221a507329 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-manager-light-2091e63be6d7dbb4cc291d8c18478150.yaml @@ -0,0 +1,58 @@ +id: blog-manager-light-2091e63be6d7dbb4cc291d8c18478150 + +info: + name: > + Blog Manager Light <= 1.20 - Cross-Site Request Forgery via bml_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38307432-399e-4887-867c-9eb2a0d90d70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-manager-light/" + google-query: inurl:"/wp-content/plugins/blog-manager-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-manager-light,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-manager-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-manager-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog-sidebar-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/blog-sidebar-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5d643c3aeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog-sidebar-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: blog-sidebar-widget-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog-sidebar-widget/" + google-query: inurl:"/wp-content/plugins/blog-sidebar-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog-sidebar-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog-sidebar-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog-sidebar-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-0e2341ee2d418b0b91267b97433b22e1.yaml b/nuclei-templates/cve-less/plugins/blog2social-0e2341ee2d418b0b91267b97433b22e1.yaml new file mode 100644 index 0000000000..b8c097f1b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-0e2341ee2d418b0b91267b97433b22e1.yaml @@ -0,0 +1,58 @@ +id: blog2social-0e2341ee2d418b0b91267b97433b22e1 + +info: + name: > + Blog2Social: Social Media Auto Post & Scheduler <= 7.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a00147db-2ca5-4290-ae13-27be6119b751?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-21019b02ab939e1588f34c6a653e9f06.yaml b/nuclei-templates/cve-less/plugins/blog2social-21019b02ab939e1588f34c6a653e9f06.yaml new file mode 100644 index 0000000000..bd62f1c0c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-21019b02ab939e1588f34c6a653e9f06.yaml @@ -0,0 +1,58 @@ +id: blog2social-21019b02ab939e1588f34c6a653e9f06 + +info: + name: > + Blog2Social <= 6.9.11 - Missing Authorization to Authenticated (Subscriber+) Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5b8d39c-d307-42c9-a972-29b5521a82a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-3fd3ad86b8b959b5f946903b7447c084.yaml b/nuclei-templates/cve-less/plugins/blog2social-3fd3ad86b8b959b5f946903b7447c084.yaml new file mode 100644 index 0000000000..2ce9d86d4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-3fd3ad86b8b959b5f946903b7447c084.yaml @@ -0,0 +1,58 @@ +id: blog2social-3fd3ad86b8b959b5f946903b7447c084 + +info: + name: > + Blog2Social: Social Media Auto Post & Scheduler <= 5.5.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b5e5b0a-dd6a-401f-86db-940b3386ed21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-5b5598cebbb5b08b875d9ea03d9a72bc.yaml b/nuclei-templates/cve-less/plugins/blog2social-5b5598cebbb5b08b875d9ea03d9a72bc.yaml new file mode 100644 index 0000000000..da029f6db7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-5b5598cebbb5b08b875d9ea03d9a72bc.yaml @@ -0,0 +1,58 @@ +id: blog2social-5b5598cebbb5b08b875d9ea03d9a72bc + +info: + name: > + Blog2Social <= 6.9.9 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6de73c31-a58d-41d9-aaed-2d7853ad1f25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-73117910b29a1c368fce71745504290c.yaml b/nuclei-templates/cve-less/plugins/blog2social-73117910b29a1c368fce71745504290c.yaml new file mode 100644 index 0000000000..4eacd58616 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-73117910b29a1c368fce71745504290c.yaml @@ -0,0 +1,58 @@ +id: blog2social-73117910b29a1c368fce71745504290c + +info: + name: > + Blog2Social: Social Media Auto Post & Scheduler <= 6.3.0 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2812b31d-11c0-4efe-95e2-ea713293dad1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-763aed0421435f4023b6ace21a8f066e.yaml b/nuclei-templates/cve-less/plugins/blog2social-763aed0421435f4023b6ace21a8f066e.yaml new file mode 100644 index 0000000000..f03f164d0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-763aed0421435f4023b6ace21a8f066e.yaml @@ -0,0 +1,58 @@ +id: blog2social-763aed0421435f4023b6ace21a8f066e + +info: + name: > + Blog2Social: Social Media Auto Post & Scheduler < 5.9.0 - Reflected Cross-Site Scripting via b2s_id Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81108abb-69e5-4571-8209-484b4b0f5617?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-98ef59566a56f0d321854bb5454562cb.yaml b/nuclei-templates/cve-less/plugins/blog2social-98ef59566a56f0d321854bb5454562cb.yaml new file mode 100644 index 0000000000..274d29c83b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-98ef59566a56f0d321854bb5454562cb.yaml @@ -0,0 +1,58 @@ +id: blog2social-98ef59566a56f0d321854bb5454562cb + +info: + name: > + Blog2Social <= 6.8.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7817f343-1ed6-4b76-afbe-1054de892422?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-993cbe7cdb99fa0d1ec6b5c0bf18769e.yaml b/nuclei-templates/cve-less/plugins/blog2social-993cbe7cdb99fa0d1ec6b5c0bf18769e.yaml new file mode 100644 index 0000000000..9b45d16c9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-993cbe7cdb99fa0d1ec6b5c0bf18769e.yaml @@ -0,0 +1,58 @@ +id: blog2social-993cbe7cdb99fa0d1ec6b5c0bf18769e + +info: + name: > + Blog2Social <= 6.9.3 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02b61eb1-a93f-4437-87de-d698af8ef9f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-bd94973d379cdc38fafbad6fbe8d2f5c.yaml b/nuclei-templates/cve-less/plugins/blog2social-bd94973d379cdc38fafbad6fbe8d2f5c.yaml new file mode 100644 index 0000000000..2b733e512f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-bd94973d379cdc38fafbad6fbe8d2f5c.yaml @@ -0,0 +1,58 @@ +id: blog2social-bd94973d379cdc38fafbad6fbe8d2f5c + +info: + name: > + Blog2Social: Social Media Auto Post & Scheduler <= 7.4.2 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2dea1bcb-14c2-4ec9-8a4d-087bac2db486?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-cefe6e830adb746b2199d03b92e9b0d3.yaml b/nuclei-templates/cve-less/plugins/blog2social-cefe6e830adb746b2199d03b92e9b0d3.yaml new file mode 100644 index 0000000000..3d686d76cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-cefe6e830adb746b2199d03b92e9b0d3.yaml @@ -0,0 +1,58 @@ +id: blog2social-cefe6e830adb746b2199d03b92e9b0d3 + +info: + name: > + Blog2Social <= 6.9.9 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25baf78e-e9bc-421b-8a66-9571ac3625c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-edba2b974302ba40bc2fe3d88269ff10.yaml b/nuclei-templates/cve-less/plugins/blog2social-edba2b974302ba40bc2fe3d88269ff10.yaml new file mode 100644 index 0000000000..6d19ecd1d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-edba2b974302ba40bc2fe3d88269ff10.yaml @@ -0,0 +1,58 @@ +id: blog2social-edba2b974302ba40bc2fe3d88269ff10 + +info: + name: > + Blog2Social: Social Media Auto Post & Scheduler <= 5.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3dccecb-893c-4746-9047-5c32ca227508?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blog2social-f25219e94e90ee9c8edfde6f7652a267.yaml b/nuclei-templates/cve-less/plugins/blog2social-f25219e94e90ee9c8edfde6f7652a267.yaml new file mode 100644 index 0000000000..72ec91e677 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blog2social-f25219e94e90ee9c8edfde6f7652a267.yaml @@ -0,0 +1,58 @@ +id: blog2social-f25219e94e90ee9c8edfde6f7652a267 + +info: + name: > + Blog2Social: Social Media Auto Post & Scheduler < 5.0.1 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b8655a6-f410-480d-8c45-2527b53fa129?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blog2social/" + google-query: inurl:"/wp-content/plugins/blog2social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blog2social,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blog2social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blog2social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blogger-importer-86bf587683902d78762ff4957c96a94c.yaml b/nuclei-templates/cve-less/plugins/blogger-importer-86bf587683902d78762ff4957c96a94c.yaml new file mode 100644 index 0000000000..78372a1f5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blogger-importer-86bf587683902d78762ff4957c96a94c.yaml @@ -0,0 +1,58 @@ +id: blogger-importer-86bf587683902d78762ff4957c96a94c + +info: + name: > + Blogger Importer <= 0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2c702a5-8677-49f3-8824-1e8345ff54ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blogger-importer/" + google-query: inurl:"/wp-content/plugins/blogger-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blogger-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blogger-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blogger-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blogroll-fun-d0c3cc2d1f4d2b123e52708c762c0240.yaml b/nuclei-templates/cve-less/plugins/blogroll-fun-d0c3cc2d1f4d2b123e52708c762c0240.yaml new file mode 100644 index 0000000000..0c690979a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blogroll-fun-d0c3cc2d1f4d2b123e52708c762c0240.yaml @@ -0,0 +1,58 @@ +id: blogroll-fun-d0c3cc2d1f4d2b123e52708c762c0240 + +info: + name: > + Blogroll Fun – Show Last Post and Last Update Time < 0.8.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b2fa832-ed1b-47e9-b9eb-049541530ab6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blogroll-fun/" + google-query: inurl:"/wp-content/plugins/blogroll-fun/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blogroll-fun,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blogroll-fun/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blogroll-fun" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blogstand-smart-banner-6ccf09aa4f6f92564c1ba185250a9b6d.yaml b/nuclei-templates/cve-less/plugins/blogstand-smart-banner-6ccf09aa4f6f92564c1ba185250a9b6d.yaml new file mode 100644 index 0000000000..069af70061 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blogstand-smart-banner-6ccf09aa4f6f92564c1ba185250a9b6d.yaml @@ -0,0 +1,58 @@ +id: blogstand-smart-banner-6ccf09aa4f6f92564c1ba185250a9b6d + +info: + name: > + Blogstand Banner <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9224b37-d6ce-4847-afb0-9a42c9fa665c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blogstand-smart-banner/" + google-query: inurl:"/wp-content/plugins/blogstand-smart-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blogstand-smart-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blogstand-smart-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blogstand-smart-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blogvault-real-time-backup-81a6f5ecaf1c598cd2e1db2f58c01ff9.yaml b/nuclei-templates/cve-less/plugins/blogvault-real-time-backup-81a6f5ecaf1c598cd2e1db2f58c01ff9.yaml new file mode 100644 index 0000000000..61da522caa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blogvault-real-time-backup-81a6f5ecaf1c598cd2e1db2f58c01ff9.yaml @@ -0,0 +1,58 @@ +id: blogvault-real-time-backup-81a6f5ecaf1c598cd2e1db2f58c01ff9 + +info: + name: > + BlogVault WordPress Backup Plugin 1.40 - 1.44 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01139cbd-1116-4cf8-bdcb-cb182588d093?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blogvault-real-time-backup/" + google-query: inurl:"/wp-content/plugins/blogvault-real-time-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blogvault-real-time-backup,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blogvault-real-time-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blogvault-real-time-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.40', '<= 1.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bloom-a2b478ab05dc0dd0616e45e762ef893a.yaml b/nuclei-templates/cve-less/plugins/bloom-a2b478ab05dc0dd0616e45e762ef893a.yaml new file mode 100644 index 0000000000..6c7b093bd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bloom-a2b478ab05dc0dd0616e45e762ef893a.yaml @@ -0,0 +1,58 @@ +id: bloom-a2b478ab05dc0dd0616e45e762ef893a + +info: + name: > + Elegant Themes Monarch < 1.2.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0195bddf-eafe-45f2-9424-ffa235d9b4dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bloom/" + google-query: inurl:"/wp-content/plugins/bloom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bloom,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bloom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bloom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bloom-a6745ab870958e9a36acad5aaba242da.yaml b/nuclei-templates/cve-less/plugins/bloom-a6745ab870958e9a36acad5aaba242da.yaml new file mode 100644 index 0000000000..def487f112 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bloom-a6745ab870958e9a36acad5aaba242da.yaml @@ -0,0 +1,58 @@ +id: bloom-a6745ab870958e9a36acad5aaba242da + +info: + name: > + Bloom Email Opt-In < 1.1.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d015c7d-bace-4d00-8ba5-1c85acb08d57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bloom/" + google-query: inurl:"/wp-content/plugins/bloom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bloom,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bloom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bloom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blossom-recipe-maker-d5a23abb517a497649fa5fae9ebed1d6.yaml b/nuclei-templates/cve-less/plugins/blossom-recipe-maker-d5a23abb517a497649fa5fae9ebed1d6.yaml new file mode 100644 index 0000000000..f56ab6db79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blossom-recipe-maker-d5a23abb517a497649fa5fae9ebed1d6.yaml @@ -0,0 +1,58 @@ +id: blossom-recipe-maker-d5a23abb517a497649fa5fae9ebed1d6 + +info: + name: > + Blossom Recipe Maker <= 1.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66c0a19a-d94f-4de0-85a8-de7c7e489e33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blossom-recipe-maker/" + google-query: inurl:"/wp-content/plugins/blossom-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blossom-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blossom-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blossom-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blossomthemes-email-newsletter-9c222eb6bd53905ec6dff84bf0b52c03.yaml b/nuclei-templates/cve-less/plugins/blossomthemes-email-newsletter-9c222eb6bd53905ec6dff84bf0b52c03.yaml new file mode 100644 index 0000000000..52e710abd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blossomthemes-email-newsletter-9c222eb6bd53905ec6dff84bf0b52c03.yaml @@ -0,0 +1,58 @@ +id: blossomthemes-email-newsletter-9c222eb6bd53905ec6dff84bf0b52c03 + +info: + name: > + BlossomThemes Email Newsletter <= 2.2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e98b763-29b9-435d-a436-d4df64234b4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blossomthemes-email-newsletter/" + google-query: inurl:"/wp-content/plugins/blossomthemes-email-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blossomthemes-email-newsletter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blossomthemes-email-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blossomthemes-email-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blue-admin-2eb580b3f81928dc01b4da13b3317526.yaml b/nuclei-templates/cve-less/plugins/blue-admin-2eb580b3f81928dc01b4da13b3317526.yaml new file mode 100644 index 0000000000..05e725b386 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blue-admin-2eb580b3f81928dc01b4da13b3317526.yaml @@ -0,0 +1,58 @@ +id: blue-admin-2eb580b3f81928dc01b4da13b3317526 + +info: + name: > + Blue Admin <= 21.06.01 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d79ebec-2a80-4b9a-b6d3-f3e9be30047a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blue-admin/" + google-query: inurl:"/wp-content/plugins/blue-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blue-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blue-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blue-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.06.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blue-triad-ezanalytics-5427934b8eab07d0d5e4f82f464ce7f4.yaml b/nuclei-templates/cve-less/plugins/blue-triad-ezanalytics-5427934b8eab07d0d5e4f82f464ce7f4.yaml new file mode 100644 index 0000000000..d56f84fbe5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blue-triad-ezanalytics-5427934b8eab07d0d5e4f82f464ce7f4.yaml @@ -0,0 +1,58 @@ +id: blue-triad-ezanalytics-5427934b8eab07d0d5e4f82f464ce7f4 + +info: + name: > + Blue Triad EZAnalytics <= 1.0 - Reflected Cross-Site Scripting via 'bt_webid' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cae2bb8-33e7-47b0-861d-b976a67660ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blue-triad-ezanalytics/" + google-query: inurl:"/wp-content/plugins/blue-triad-ezanalytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blue-triad-ezanalytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blue-triad-ezanalytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blue-triad-ezanalytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/blue-wrench-videos-widget-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml b/nuclei-templates/cve-less/plugins/blue-wrench-videos-widget-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml new file mode 100644 index 0000000000..7e383b72da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/blue-wrench-videos-widget-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml @@ -0,0 +1,58 @@ +id: blue-wrench-videos-widget-683c8ae1178fe6f9d3ed4e7dea6abbfa + +info: + name: > + Blue Wrench Video Widget < 2.0.0 - Cross-Site Request Forgery and to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b540fed-e358-485f-8c12-f2241078459a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/blue-wrench-videos-widget/" + google-query: inurl:"/wp-content/plugins/blue-wrench-videos-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,blue-wrench-videos-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/blue-wrench-videos-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blue-wrench-videos-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bluet-keywords-tooltip-generator-7485636761a29a7581b6c5a9a59a849c.yaml b/nuclei-templates/cve-less/plugins/bluet-keywords-tooltip-generator-7485636761a29a7581b6c5a9a59a849c.yaml new file mode 100644 index 0000000000..583ab44537 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bluet-keywords-tooltip-generator-7485636761a29a7581b6c5a9a59a849c.yaml @@ -0,0 +1,58 @@ +id: bluet-keywords-tooltip-generator-7485636761a29a7581b6c5a9a59a849c + +info: + name: > + Tooltipy (tooltips for WP) <= 5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04a79c2c-8178-4311-9c1f-f4eb5128dec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bluet-keywords-tooltip-generator/" + google-query: inurl:"/wp-content/plugins/bluet-keywords-tooltip-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bluet-keywords-tooltip-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bluet-keywords-tooltip-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bluet-keywords-tooltip-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bluet-keywords-tooltip-generator-89c277020720d7e5b4106e25f34686a0.yaml b/nuclei-templates/cve-less/plugins/bluet-keywords-tooltip-generator-89c277020720d7e5b4106e25f34686a0.yaml new file mode 100644 index 0000000000..6eca607dd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bluet-keywords-tooltip-generator-89c277020720d7e5b4106e25f34686a0.yaml @@ -0,0 +1,58 @@ +id: bluet-keywords-tooltip-generator-89c277020720d7e5b4106e25f34686a0 + +info: + name: > + Tooltipy < 5.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7c37c4e-7a01-447c-a1d5-595c2012eb8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bluet-keywords-tooltip-generator/" + google-query: inurl:"/wp-content/plugins/bluet-keywords-tooltip-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bluet-keywords-tooltip-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bluet-keywords-tooltip-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bluet-keywords-tooltip-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bmi-adultkid-calculator-3e4297109cfe1e3292757dea8d3ced9f.yaml b/nuclei-templates/cve-less/plugins/bmi-adultkid-calculator-3e4297109cfe1e3292757dea8d3ced9f.yaml new file mode 100644 index 0000000000..e48929888b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bmi-adultkid-calculator-3e4297109cfe1e3292757dea8d3ced9f.yaml @@ -0,0 +1,58 @@ +id: bmi-adultkid-calculator-3e4297109cfe1e3292757dea8d3ced9f + +info: + name: > + BMI Adult & Kid Calculator <= 1.2.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed494a5a-2edf-43c9-a88a-331448c4e6d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bmi-adultkid-calculator/" + google-query: inurl:"/wp-content/plugins/bmi-adultkid-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bmi-adultkid-calculator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bmi-adultkid-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bmi-adultkid-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bmi-bmr-calculator-08456b78a7e27d7a315067ad64f8b5ca.yaml b/nuclei-templates/cve-less/plugins/bmi-bmr-calculator-08456b78a7e27d7a315067ad64f8b5ca.yaml new file mode 100644 index 0000000000..88b18c64fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bmi-bmr-calculator-08456b78a7e27d7a315067ad64f8b5ca.yaml @@ -0,0 +1,58 @@ +id: bmi-bmr-calculator-08456b78a7e27d7a315067ad64f8b5ca + +info: + name: > + BMI BMR Calculator <= 1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e262772-06b7-4490-a342-5b1abc421b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bmi-bmr-calculator/" + google-query: inurl:"/wp-content/plugins/bmi-bmr-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bmi-bmr-calculator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bmi-bmr-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bmi-bmr-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bmi-calculator-shortcode-0d15cc8e701957684f6f3b30c5023ccf.yaml b/nuclei-templates/cve-less/plugins/bmi-calculator-shortcode-0d15cc8e701957684f6f3b30c5023ccf.yaml new file mode 100644 index 0000000000..388154f723 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bmi-calculator-shortcode-0d15cc8e701957684f6f3b30c5023ccf.yaml @@ -0,0 +1,58 @@ +id: bmi-calculator-shortcode-0d15cc8e701957684f6f3b30c5023ccf + +info: + name: > + BMI Calculator Plugin <= 1.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bf0e224-d8c7-4bf9-b9a3-97545da9d90c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bmi-calculator-shortcode/" + google-query: inurl:"/wp-content/plugins/bmi-calculator-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bmi-calculator-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bmi-calculator-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bmi-calculator-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bne-testimonials-aec5b406433b53e4f92df5e66d0bb478.yaml b/nuclei-templates/cve-less/plugins/bne-testimonials-aec5b406433b53e4f92df5e66d0bb478.yaml new file mode 100644 index 0000000000..cc1f348cf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bne-testimonials-aec5b406433b53e4f92df5e66d0bb478.yaml @@ -0,0 +1,58 @@ +id: bne-testimonials-aec5b406433b53e4f92df5e66d0bb478 + +info: + name: > + BNE Testimonials <= 2.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6c93ec9-668d-4b8d-abc4-edd04cbf9839?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bne-testimonials/" + google-query: inurl:"/wp-content/plugins/bne-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bne-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bne-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bne-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bnfw-659d041771a16c5c0a237cb39f903338.yaml b/nuclei-templates/cve-less/plugins/bnfw-659d041771a16c5c0a237cb39f903338.yaml new file mode 100644 index 0000000000..70dda02e70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bnfw-659d041771a16c5c0a237cb39f903338.yaml @@ -0,0 +1,58 @@ +id: bnfw-659d041771a16c5c0a237cb39f903338 + +info: + name: > + Better Notifications for WP <= 1.8.6 - Email Address Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c675f883-7e6f-43c3-a901-82ed2d2b3772?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bnfw/" + google-query: inurl:"/wp-content/plugins/bnfw/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bnfw,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bnfw/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bnfw" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bnfw-8eba613f6cf1178ae1e4bc455157c83a.yaml b/nuclei-templates/cve-less/plugins/bnfw-8eba613f6cf1178ae1e4bc455157c83a.yaml new file mode 100644 index 0000000000..0491508b55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bnfw-8eba613f6cf1178ae1e4bc455157c83a.yaml @@ -0,0 +1,58 @@ +id: bnfw-8eba613f6cf1178ae1e4bc455157c83a + +info: + name: > + Better Notifications for WP <= 1.9.2 - Cross-Site Request Forgery via handle_actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ddabda2-1e27-4b87-b643-b0166112a890?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bnfw/" + google-query: inurl:"/wp-content/plugins/bnfw/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bnfw,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bnfw/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bnfw" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bng-gateway-for-woocommerce-9c98e07f9de6c1ac362dea3f4f9b98af.yaml b/nuclei-templates/cve-less/plugins/bng-gateway-for-woocommerce-9c98e07f9de6c1ac362dea3f4f9b98af.yaml new file mode 100644 index 0000000000..76ba6e99e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bng-gateway-for-woocommerce-9c98e07f9de6c1ac362dea3f4f9b98af.yaml @@ -0,0 +1,58 @@ +id: bng-gateway-for-woocommerce-9c98e07f9de6c1ac362dea3f4f9b98af + +info: + name: > + BNG Gateway For WooCommerce <= 1.6.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/391e12f7-9521-4ac6-bd78-ac28df72030b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bng-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/bng-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bng-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bng-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bng-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bo-wc-customer-review-watson-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bo-wc-customer-review-watson-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..27152f7cd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bo-wc-customer-review-watson-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bo-wc-customer-review-watson-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bo-wc-customer-review-watson/" + google-query: inurl:"/wp-content/plugins/bo-wc-customer-review-watson/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bo-wc-customer-review-watson,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bo-wc-customer-review-watson/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bo-wc-customer-review-watson" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boilerplate-extension-6d4992572a9f9bd5311ba2254f8b32c1.yaml b/nuclei-templates/cve-less/plugins/boilerplate-extension-6d4992572a9f9bd5311ba2254f8b32c1.yaml new file mode 100644 index 0000000000..5b1ae62b77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boilerplate-extension-6d4992572a9f9bd5311ba2254f8b32c1.yaml @@ -0,0 +1,58 @@ +id: boilerplate-extension-6d4992572a9f9bd5311ba2254f8b32c1 + +info: + name: > + MainWP Boilerplate Extension <= 4.1 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cad4c72d-9374-410a-91b7-5e9aff01738b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boilerplate-extension/" + google-query: inurl:"/wp-content/plugins/boilerplate-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boilerplate-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boilerplate-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boilerplate-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boilerplate-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/boilerplate-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..db42b7096f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boilerplate-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: boilerplate-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boilerplate-extension/" + google-query: inurl:"/wp-content/plugins/boilerplate-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boilerplate-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boilerplate-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boilerplate-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boilerplate-extension-de9c08ef64270e7677f62d388e0cc26e.yaml b/nuclei-templates/cve-less/plugins/boilerplate-extension-de9c08ef64270e7677f62d388e0cc26e.yaml new file mode 100644 index 0000000000..673b4e09fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boilerplate-extension-de9c08ef64270e7677f62d388e0cc26e.yaml @@ -0,0 +1,58 @@ +id: boilerplate-extension-de9c08ef64270e7677f62d388e0cc26e + +info: + name: > + MainWP (Various extensions) - Missing Authorization to Arbitrary Page/Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d589bada-3568-45ed-9f7c-fb14363a617a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boilerplate-extension/" + google-query: inurl:"/wp-content/plugins/boilerplate-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boilerplate-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boilerplate-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boilerplate-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-005e163e7b395198e1ed48634c687240.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-005e163e7b395198e1ed48634c687240.yaml new file mode 100644 index 0000000000..d246f1a621 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-005e163e7b395198e1ed48634c687240.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-005e163e7b395198e1ed48634c687240 + +info: + name: > + Bold Page Builder <= 4.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button URL + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e166a7db-45f7-4a0d-9966-dbec9ade204a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-1c83761e8850a90348fc378dc1547a09.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-1c83761e8850a90348fc378dc1547a09.yaml new file mode 100644 index 0000000000..730d4edca8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-1c83761e8850a90348fc378dc1547a09.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-1c83761e8850a90348fc378dc1547a09 + +info: + name: > + Bold Page Builder <= 4.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via AI Features + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/650b5677-7c70-415f-81bf-12514393e4c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-2109981df34c3c3e10e9a3ff3ab51437.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-2109981df34c3c3e10e9a3ff3ab51437.yaml new file mode 100644 index 0000000000..75b32c3b43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-2109981df34c3c3e10e9a3ff3ab51437.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-2109981df34c3c3e10e9a3ff3ab51437 + +info: + name: > + Bold Page Builder <= 4.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Raw Content + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e71386ea-0546-4aa7-b77a-e1824e80accc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-48cb8d5c20069dd21ff6f85ee4f57b84.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-48cb8d5c20069dd21ff6f85ee4f57b84.yaml new file mode 100644 index 0000000000..7cbd37cbbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-48cb8d5c20069dd21ff6f85ee4f57b84.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-48cb8d5c20069dd21ff6f85ee4f57b84 + +info: + name: > + Bold Page Builder <= 4.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c99f70b-77a6-4bd7-99b1-ad4ec76d50c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-5289bbf92c9bdc3c3c0e4f0086563240.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-5289bbf92c9bdc3c3c0e4f0086563240.yaml new file mode 100644 index 0000000000..5e9388602b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-5289bbf92c9bdc3c3c0e4f0086563240.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-5289bbf92c9bdc3c3c0e4f0086563240 + +info: + name: > + Bold Page Builder <= 4.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Widget URL Attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21fed5a3-1bb2-4581-95b4-badff98bed42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-5b50680d973f4b29013f914d7a1b34f3.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-5b50680d973f4b29013f914d7a1b34f3.yaml new file mode 100644 index 0000000000..cb8b080098 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-5b50680d973f4b29013f914d7a1b34f3.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-5b50680d973f4b29013f914d7a1b34f3 + +info: + name: > + Bold Page Builder <= 3.1.5 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09ac96f8-e138-48fe-bd95-5356fc222004?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-7f9f186670238d7e784b2f81e1301181.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-7f9f186670238d7e784b2f81e1301181.yaml new file mode 100644 index 0000000000..af080d9ae7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-7f9f186670238d7e784b2f81e1301181.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-7f9f186670238d7e784b2f81e1301181 + +info: + name: > + Bold Page Builder <= 4.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via "Price List" Element + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc4a67b-81fa-4ef6-9167-eab5cb9002ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-7fcbda1cfae66ee74a18ccdfe4753dbb.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-7fcbda1cfae66ee74a18ccdfe4753dbb.yaml new file mode 100644 index 0000000000..d0f57d1ebf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-7fcbda1cfae66ee74a18ccdfe4753dbb.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-7fcbda1cfae66ee74a18ccdfe4753dbb + +info: + name: > + Bold Page Builder <= 4.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via bt_bb_price_list Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eed667d2-e53e-47b9-8012-2b9b46022f3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-8b94055b335b8fd181b35e0e5b73b692.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-8b94055b335b8fd181b35e0e5b73b692.yaml new file mode 100644 index 0000000000..3b39929759 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-8b94055b335b8fd181b35e0e5b73b692.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-8b94055b335b8fd181b35e0e5b73b692 + +info: + name: > + Bold Page Builder <= 4.7.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via class + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46e53bf4-49af-45d8-b672-1f9b2f2dd91f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-8e1e2ed917edbc0807da4afd84ddc7ed.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-8e1e2ed917edbc0807da4afd84ddc7ed.yaml new file mode 100644 index 0000000000..3830547af5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-8e1e2ed917edbc0807da4afd84ddc7ed.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-8e1e2ed917edbc0807da4afd84ddc7ed + +info: + name: > + Bold Page Builder <= 4.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Separator Element + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2db39ae2-6c44-4a4c-84de-9b7041bece37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-9f377f95856b4156effc9e05a81da19a.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-9f377f95856b4156effc9e05a81da19a.yaml new file mode 100644 index 0000000000..e3cbf47eda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-9f377f95856b4156effc9e05a81da19a.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-9f377f95856b4156effc9e05a81da19a + +info: + name: > + Bold Page Builder <= 2.3.1 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/684b0166-56fc-433f-ae34-0ff5071e7f05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-b332e32a470aff42684e131c72a2c94a.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-b332e32a470aff42684e131c72a2c94a.yaml new file mode 100644 index 0000000000..f3369b47cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-b332e32a470aff42684e131c72a2c94a.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-b332e32a470aff42684e131c72a2c94a + +info: + name: > + Bold Page Builder <= 4.3.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e25a0df-c548-45d0-8672-c35fbc71e0c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-dd7568e4d3ea5ea32920ba4a6563336b.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-dd7568e4d3ea5ea32920ba4a6563336b.yaml new file mode 100644 index 0000000000..ef90618ad3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-dd7568e4d3ea5ea32920ba4a6563336b.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-dd7568e4d3ea5ea32920ba4a6563336b + +info: + name: > + Bold Page Builder <= 4.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via HTML Tags + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86cf664f-5de1-4692-96b3-2fd8ae35110b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-page-builder-e2f4a51da7010a4270e848488a346f79.yaml b/nuclei-templates/cve-less/plugins/bold-page-builder-e2f4a51da7010a4270e848488a346f79.yaml new file mode 100644 index 0000000000..9a278b7bbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-page-builder-e2f4a51da7010a4270e848488a346f79.yaml @@ -0,0 +1,58 @@ +id: bold-page-builder-e2f4a51da7010a4270e848488a346f79 + +info: + name: > + Bold Page Builder <= 4.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Icon Link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/818d3418-8e14-49b9-a112-8eab9eb3c283?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-page-builder/" + google-query: inurl:"/wp-content/plugins/bold-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-timeline-lite-263cb8027fbba6881585c49ec8985e2c.yaml b/nuclei-templates/cve-less/plugins/bold-timeline-lite-263cb8027fbba6881585c49ec8985e2c.yaml new file mode 100644 index 0000000000..c19ed739d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-timeline-lite-263cb8027fbba6881585c49ec8985e2c.yaml @@ -0,0 +1,58 @@ +id: bold-timeline-lite-263cb8027fbba6881585c49ec8985e2c + +info: + name: > + Bold Timeline Lite <= 1.1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ec4bd64-f13f-4e13-9829-8ccf2b8fd196?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-timeline-lite/" + google-query: inurl:"/wp-content/plugins/bold-timeline-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-timeline-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-timeline-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-timeline-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bold-timeline-lite-d090aa5f37413bd2a82801bde518653e.yaml b/nuclei-templates/cve-less/plugins/bold-timeline-lite-d090aa5f37413bd2a82801bde518653e.yaml new file mode 100644 index 0000000000..3c62102cf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bold-timeline-lite-d090aa5f37413bd2a82801bde518653e.yaml @@ -0,0 +1,58 @@ +id: bold-timeline-lite-d090aa5f37413bd2a82801bde518653e + +info: + name: > + Bold Timeline Lite <= 1.1.9 - Missing Authorization to Admin Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bbabf5e-dbfc-4b01-94ae-0e8fd6b3cc26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bold-timeline-lite/" + google-query: inurl:"/wp-content/plugins/bold-timeline-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bold-timeline-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bold-timeline-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bold-timeline-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boldgrid-backup-a66a38c6ab7f828962843ef151472f92.yaml b/nuclei-templates/cve-less/plugins/boldgrid-backup-a66a38c6ab7f828962843ef151472f92.yaml new file mode 100644 index 0000000000..a6bb214d2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boldgrid-backup-a66a38c6ab7f828962843ef151472f92.yaml @@ -0,0 +1,58 @@ +id: boldgrid-backup-a66a38c6ab7f828962843ef151472f92 + +info: + name: > + Total Upkeep <= 1.15.8 - Improper Authorization to Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/159e14fc-0512-421a-8bbe-d16c0b04ddf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boldgrid-backup/" + google-query: inurl:"/wp-content/plugins/boldgrid-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boldgrid-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boldgrid-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boldgrid-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boldgrid-backup-faa8cb9cb5e4fa47467175ce98c14091.yaml b/nuclei-templates/cve-less/plugins/boldgrid-backup-faa8cb9cb5e4fa47467175ce98c14091.yaml new file mode 100644 index 0000000000..6c8b4cfac1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boldgrid-backup-faa8cb9cb5e4fa47467175ce98c14091.yaml @@ -0,0 +1,58 @@ +id: boldgrid-backup-faa8cb9cb5e4fa47467175ce98c14091 + +info: + name: > + Total Upkeep <= 1.14.13 - Missing Authorization to Authenticated (Subscriber+) Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e346146-1c00-4e03-a6c7-372566d7ffc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boldgrid-backup/" + google-query: inurl:"/wp-content/plugins/boldgrid-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boldgrid-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boldgrid-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boldgrid-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boldgrid-easy-seo-cbd6f11a9e82c5a5f837c5dd0976e92e.yaml b/nuclei-templates/cve-less/plugins/boldgrid-easy-seo-cbd6f11a9e82c5a5f837c5dd0976e92e.yaml new file mode 100644 index 0000000000..5e2e4485bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boldgrid-easy-seo-cbd6f11a9e82c5a5f837c5dd0976e92e.yaml @@ -0,0 +1,58 @@ +id: boldgrid-easy-seo-cbd6f11a9e82c5a5f837c5dd0976e92e + +info: + name: > + BoldGrid Easy SEO – Simple and Effective SEO <= 1.6.14 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d502e617-a59f-4385-b050-3702a1b1ed7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boldgrid-easy-seo/" + google-query: inurl:"/wp-content/plugins/boldgrid-easy-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boldgrid-easy-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boldgrid-easy-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boldgrid-easy-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boldgrid-easy-seo-facd15a60590ce98592dd0da5f942c33.yaml b/nuclei-templates/cve-less/plugins/boldgrid-easy-seo-facd15a60590ce98592dd0da5f942c33.yaml new file mode 100644 index 0000000000..3a8708059d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boldgrid-easy-seo-facd15a60590ce98592dd0da5f942c33.yaml @@ -0,0 +1,58 @@ +id: boldgrid-easy-seo-facd15a60590ce98592dd0da5f942c33 + +info: + name: > + BoldGrid Easy SEO – Simple and Effective SEO <= 1.6.13 - Authenticated(Contributor+) Stored Cross-Site Scripting via Meta Description + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a308fde-1c44-4c34-ace5-6820dc949f53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boldgrid-easy-seo/" + google-query: inurl:"/wp-content/plugins/boldgrid-easy-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boldgrid-easy-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boldgrid-easy-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boldgrid-easy-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bonus-for-woo-d1a09c4c8a10014e2eab3f97a79ce973.yaml b/nuclei-templates/cve-less/plugins/bonus-for-woo-d1a09c4c8a10014e2eab3f97a79ce973.yaml new file mode 100644 index 0000000000..da07c8160a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bonus-for-woo-d1a09c4c8a10014e2eab3f97a79ce973.yaml @@ -0,0 +1,58 @@ +id: bonus-for-woo-d1a09c4c8a10014e2eab3f97a79ce973 + +info: + name: > + Bonus for Woo <= 5.8.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b959b65-16ad-45f9-9ad9-dfc97bda571e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bonus-for-woo/" + google-query: inurl:"/wp-content/plugins/bonus-for-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bonus-for-woo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bonus-for-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bonus-for-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bonuspressx-fa751f89fc374e558e8d01ea059343f2.yaml b/nuclei-templates/cve-less/plugins/bonuspressx-fa751f89fc374e558e8d01ea059343f2.yaml new file mode 100644 index 0000000000..4b7aef2b9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bonuspressx-fa751f89fc374e558e8d01ea059343f2.yaml @@ -0,0 +1,58 @@ +id: bonuspressx-fa751f89fc374e558e8d01ea059343f2 + +info: + name: > + Bonuspressx (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e0b9dd4-d882-4f56-9f6b-2f2955690a05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bonuspressx/" + google-query: inurl:"/wp-content/plugins/bonuspressx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bonuspressx,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bonuspressx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bonuspressx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/book-appointment-online-edbb23e6d1dd3c6d3b98a72a827de16d.yaml b/nuclei-templates/cve-less/plugins/book-appointment-online-edbb23e6d1dd3c6d3b98a72a827de16d.yaml new file mode 100644 index 0000000000..05eefa70dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/book-appointment-online-edbb23e6d1dd3c6d3b98a72a827de16d.yaml @@ -0,0 +1,58 @@ +id: book-appointment-online-edbb23e6d1dd3c6d3b98a72a827de16d + +info: + name: > + Book appointment online <= 1.38 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b8b7ee8-4c11-4353-b664-761955d49b8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/book-appointment-online/" + google-query: inurl:"/wp-content/plugins/book-appointment-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,book-appointment-online,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/book-appointment-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "book-appointment-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/book-buyback-prices-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/book-buyback-prices-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c6a55ce24a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/book-buyback-prices-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: book-buyback-prices-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/book-buyback-prices/" + google-query: inurl:"/wp-content/plugins/book-buyback-prices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,book-buyback-prices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/book-buyback-prices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "book-buyback-prices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/book-press-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/book-press-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9a324231ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/book-press-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: book-press-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/book-press/" + google-query: inurl:"/wp-content/plugins/book-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,book-press,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/book-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "book-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booked-42e35e0cb682e934fb2b734db4cdfce2.yaml b/nuclei-templates/cve-less/plugins/booked-42e35e0cb682e934fb2b734db4cdfce2.yaml new file mode 100644 index 0000000000..a3e47646e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booked-42e35e0cb682e934fb2b734db4cdfce2.yaml @@ -0,0 +1,58 @@ +id: booked-42e35e0cb682e934fb2b734db4cdfce2 + +info: + name: > + Booked <= 2.4 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f917973-e207-4ba3-b61b-e562e884fe0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booked/" + google-query: inurl:"/wp-content/plugins/booked/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booked,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booked/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booked" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booked-fb0b66127fc8d6704716bac309ccc3a7.yaml b/nuclei-templates/cve-less/plugins/booked-fb0b66127fc8d6704716bac309ccc3a7.yaml new file mode 100644 index 0000000000..f0c9dbce83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booked-fb0b66127fc8d6704716bac309ccc3a7.yaml @@ -0,0 +1,58 @@ +id: booked-fb0b66127fc8d6704716bac309ccc3a7 + +info: + name: > + Booked <= 2.2.5 - Missing Authorization on AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cd2ca03-e644-4bcd-b4b1-a547494fed7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booked/" + google-query: inurl:"/wp-content/plugins/booked/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booked,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booked/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booked" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-279486597ac6d210058519567f6297ca.yaml b/nuclei-templates/cve-less/plugins/booking-279486597ac6d210058519567f6297ca.yaml new file mode 100644 index 0000000000..d450dd209c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-279486597ac6d210058519567f6297ca.yaml @@ -0,0 +1,58 @@ +id: booking-279486597ac6d210058519567f6297ca + +info: + name: > + Booking Calendar <= 6.2 - Cross-Site Request Forgery to SQL Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e865324e-a2a2-40fb-8c6a-a89317b59c8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-2f651d26ae436687bdff9a8abab4a173.yaml b/nuclei-templates/cve-less/plugins/booking-2f651d26ae436687bdff9a8abab4a173.yaml new file mode 100644 index 0000000000..a0911f0d03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-2f651d26ae436687bdff9a8abab4a173.yaml @@ -0,0 +1,58 @@ +id: booking-2f651d26ae436687bdff9a8abab4a173 + +info: + name: > + Booking Calendar <= 6.2 - Cross-Site Request Forgery leading to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f36d866-aa94-478b-8b62-0906bc95e413?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-64d2238bd20222d178f28431616be0e3.yaml b/nuclei-templates/cve-less/plugins/booking-64d2238bd20222d178f28431616be0e3.yaml new file mode 100644 index 0000000000..a3d1f7fd33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-64d2238bd20222d178f28431616be0e3.yaml @@ -0,0 +1,58 @@ +id: booking-64d2238bd20222d178f28431616be0e3 + +info: + name: > + Booking Calendar <= 8.4.3 - SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93a4d653-a852-41c1-8942-8f059420aeb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-6a265db2a9121f4da4875337b8e6751f.yaml b/nuclei-templates/cve-less/plugins/booking-6a265db2a9121f4da4875337b8e6751f.yaml new file mode 100644 index 0000000000..b852c49c35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-6a265db2a9121f4da4875337b8e6751f.yaml @@ -0,0 +1,58 @@ +id: booking-6a265db2a9121f4da4875337b8e6751f + +info: + name: > + Booking Calendar <= 6.2 - Authenticated (Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef9d256b-9156-4172-8892-29a26beddb71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-74317d53fd76ca3a1801e928aa95e907.yaml b/nuclei-templates/cve-less/plugins/booking-74317d53fd76ca3a1801e928aa95e907.yaml new file mode 100644 index 0000000000..02f8c52ba3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-74317d53fd76ca3a1801e928aa95e907.yaml @@ -0,0 +1,58 @@ +id: booking-74317d53fd76ca3a1801e928aa95e907 + +info: + name: > + Booking Calendar <= 9.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/982be9d7-fe9f-40c6-a474-fcc2d6455839?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-871ce8145600084845b667e836bf190e.yaml b/nuclei-templates/cve-less/plugins/booking-871ce8145600084845b667e836bf190e.yaml new file mode 100644 index 0000000000..956e24beb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-871ce8145600084845b667e836bf190e.yaml @@ -0,0 +1,58 @@ +id: booking-871ce8145600084845b667e836bf190e + +info: + name: > + Booking Calendar < 4.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0b25726-0b8e-4fce-a986-5f1e176da75a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-882a83d7e6d94e3f6111d1f0063b43d9.yaml b/nuclei-templates/cve-less/plugins/booking-882a83d7e6d94e3f6111d1f0063b43d9.yaml new file mode 100644 index 0000000000..a406114da5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-882a83d7e6d94e3f6111d1f0063b43d9.yaml @@ -0,0 +1,58 @@ +id: booking-882a83d7e6d94e3f6111d1f0063b43d9 + +info: + name: > + Booking Calendar <= 8.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad177f89-2cc0-4ab3-a787-3b0bd3bf3e47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-a720a32e95724b99f716e58fddc9c585.yaml b/nuclei-templates/cve-less/plugins/booking-a720a32e95724b99f716e58fddc9c585.yaml new file mode 100644 index 0000000000..4dc45d4eb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-a720a32e95724b99f716e58fddc9c585.yaml @@ -0,0 +1,58 @@ +id: booking-a720a32e95724b99f716e58fddc9c585 + +info: + name: > + Booking Calendar <= 9.7.3.3 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08814d06-0039-49cc-bcbb-96cb01129e3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-activities-362486302d19ffc4bedbec14216dc7ba.yaml b/nuclei-templates/cve-less/plugins/booking-activities-362486302d19ffc4bedbec14216dc7ba.yaml new file mode 100644 index 0000000000..6d69f231c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-activities-362486302d19ffc4bedbec14216dc7ba.yaml @@ -0,0 +1,58 @@ +id: booking-activities-362486302d19ffc4bedbec14216dc7ba + +info: + name: > + Booking Activities <= 1.15.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45873654-bf0d-4538-b07c-56ed8db3bafb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-activities/" + google-query: inurl:"/wp-content/plugins/booking-activities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-activities,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-activities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-activities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-and-rental-manager-for-woocommerce-de725b70e5d07ce131e255467578f038.yaml b/nuclei-templates/cve-less/plugins/booking-and-rental-manager-for-woocommerce-de725b70e5d07ce131e255467578f038.yaml new file mode 100644 index 0000000000..855b8e8128 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-and-rental-manager-for-woocommerce-de725b70e5d07ce131e255467578f038.yaml @@ -0,0 +1,58 @@ +id: booking-and-rental-manager-for-woocommerce-de725b70e5d07ce131e255467578f038 + +info: + name: > + Booking and Rental Manager <= 1.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e7c629f-e9c6-4254-ba37-46de5206d77d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-and-rental-manager-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booking-and-rental-manager-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-and-rental-manager-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-and-rental-manager-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-and-rental-manager-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-b3c2fa102dc78b18cc1d35e379c8dc7a.yaml b/nuclei-templates/cve-less/plugins/booking-b3c2fa102dc78b18cc1d35e379c8dc7a.yaml new file mode 100644 index 0000000000..c5711a09c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-b3c2fa102dc78b18cc1d35e379c8dc7a.yaml @@ -0,0 +1,58 @@ +id: booking-b3c2fa102dc78b18cc1d35e379c8dc7a + +info: + name: > + Booking Calendar <= 9.7.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f883823f-c225-4cd2-a0f6-39013476ed83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-0cfb154efea7a6cd97d79b7c9bd11b19.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-0cfb154efea7a6cd97d79b7c9bd11b19.yaml new file mode 100644 index 0000000000..096e2b931b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-0cfb154efea7a6cd97d79b7c9bd11b19.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-0cfb154efea7a6cd97d79b7c9bd11b19 + +info: + name: > + Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e84b1f01-1c3b-4498-aea9-02ced5f1109e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-52b3904a98bc3991ae688cb27d9acbe7.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-52b3904a98bc3991ae688cb27d9acbe7.yaml new file mode 100644 index 0000000000..3a8221cdc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-52b3904a98bc3991ae688cb27d9acbe7.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-52b3904a98bc3991ae688cb27d9acbe7 + +info: + name: > + Booking calendar, Appointment Booking System <= 3.2.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb34cb2-ebf8-4913-b8e0-152a436963ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-6a9d80e8fa30f682db502c67279e3ece.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-6a9d80e8fa30f682db502c67279e3ece.yaml new file mode 100644 index 0000000000..547fff68c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-6a9d80e8fa30f682db502c67279e3ece.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-6a9d80e8fa30f682db502c67279e3ece + +info: + name: > + Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b9741c6-4038-45ad-a7b4-fa8f65664f4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-78f758aca2b7adcaf11ee6e697616163.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-78f758aca2b7adcaf11ee6e697616163.yaml new file mode 100644 index 0000000000..ac8d380433 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-78f758aca2b7adcaf11ee6e697616163.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-78f758aca2b7adcaf11ee6e697616163 + +info: + name: > + Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ebc05b6-89dd-4373-a632-75c783716643?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-86234e029258ca45a99eefee2aff4d20.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-86234e029258ca45a99eefee2aff4d20.yaml new file mode 100644 index 0000000000..af906a9724 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-86234e029258ca45a99eefee2aff4d20.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-86234e029258ca45a99eefee2aff4d20 + +info: + name: > + Booking calendar, Appointment Booking System <= 3.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faf5c00e-e92a-4c1f-9081-20cf36ecabbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-88138db1d1aea177c6151b845da287ff.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-88138db1d1aea177c6151b845da287ff.yaml new file mode 100644 index 0000000000..3d6b7bbdba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-88138db1d1aea177c6151b845da287ff.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-88138db1d1aea177c6151b845da287ff + +info: + name: > + Booking Calendar WpDevArt <= 3.2.11 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caa39613-aaf3-4e47-8866-8fda1f7fc15b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-88cc9361682247d3851fe23cf11de139.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-88cc9361682247d3851fe23cf11de139.yaml new file mode 100644 index 0000000000..87e49341da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-88cc9361682247d3851fe23cf11de139.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-88cc9361682247d3851fe23cf11de139 + +info: + name: > + Booking calendar, Appointment Booking System <= 3.2.8 - Multiple Authenticated(Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a02f4fc4-42ca-4f8e-9c28-bfa69644e7b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-aacd8cf9b8bd0dfbb9f05d6cc01da96f.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-aacd8cf9b8bd0dfbb9f05d6cc01da96f.yaml new file mode 100644 index 0000000000..0250c1af57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-aacd8cf9b8bd0dfbb9f05d6cc01da96f.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-aacd8cf9b8bd0dfbb9f05d6cc01da96f + +info: + name: > + Booking calendar, Appointment Booking System < 2.2.3 - Unauthenticated Parameter Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a94708ec-ab09-4604-80ec-5bd85799c6e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-c3498fe08662af21fd3da077be763084.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-c3498fe08662af21fd3da077be763084.yaml new file mode 100644 index 0000000000..ff576caedc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-c3498fe08662af21fd3da077be763084.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-c3498fe08662af21fd3da077be763084 + +info: + name: > + Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20deedff-8980-4ac2-a74e-c52cfe57e839?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-2c05a2f96b41f067812b952900469965.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-2c05a2f96b41f067812b952900469965.yaml new file mode 100644 index 0000000000..eebeec8082 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-2c05a2f96b41f067812b952900469965.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-contact-form-2c05a2f96b41f067812b952900469965 + +info: + name: > + Booking Calendar Contact Form <= 1.2.40 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f4a3d17-d9fd-4ff4-a4b2-43030cdc7739?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar-contact-form/" + google-query: inurl:"/wp-content/plugins/booking-calendar-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-5e09860a3e9bed6cd5fc9927ca9a87b8.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-5e09860a3e9bed6cd5fc9927ca9a87b8.yaml new file mode 100644 index 0000000000..6fae85f51b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-5e09860a3e9bed6cd5fc9927ca9a87b8.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-contact-form-5e09860a3e9bed6cd5fc9927ca9a87b8 + +info: + name: > + Booking Calendar Contact Form < 1.0.24 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5eb066b-8ab4-47e7-b055-4a9d7a897a3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar-contact-form/" + google-query: inurl:"/wp-content/plugins/booking-calendar-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar-contact-form,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-66b0b9e68fee422256033ff3686e7914.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-66b0b9e68fee422256033ff3686e7914.yaml new file mode 100644 index 0000000000..f471284000 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-66b0b9e68fee422256033ff3686e7914.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-contact-form-66b0b9e68fee422256033ff3686e7914 + +info: + name: > + Booking Calendar Contact Form <= 1.2.34 - Missing Authorization to Authenticated (Subscriber+) Feedback Form Submission + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0563d2f0-fb29-4030-8d01-c257dda78241?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar-contact-form/" + google-query: inurl:"/wp-content/plugins/booking-calendar-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-8e9a2657d58363938f72aae51c6cd0a3.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-8e9a2657d58363938f72aae51c6cd0a3.yaml new file mode 100644 index 0000000000..0e0d851052 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-8e9a2657d58363938f72aae51c6cd0a3.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-contact-form-8e9a2657d58363938f72aae51c6cd0a3 + +info: + name: > + Booking Calendar Contact Form <= 1.0.23 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd3bfdc0-8e1b-49e9-b800-cb2dde2d5acb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar-contact-form/" + google-query: inurl:"/wp-content/plugins/booking-calendar-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-ce69ee3276348a391868ff2589e7f8b7.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-ce69ee3276348a391868ff2589e7f8b7.yaml new file mode 100644 index 0000000000..e2b044fcb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-ce69ee3276348a391868ff2589e7f8b7.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-contact-form-ce69ee3276348a391868ff2589e7f8b7 + +info: + name: > + Booking Calendar Contact Form <= 1.0.23 - Shortcode SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffe6cbba-1f4e-4cfc-abc8-0349def7bbf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar-contact-form/" + google-query: inurl:"/wp-content/plugins/booking-calendar-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar-contact-form,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-ea7f2b8cee8445bfd3a6af9dd8ec1877.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-ea7f2b8cee8445bfd3a6af9dd8ec1877.yaml new file mode 100644 index 0000000000..669c86d0b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-contact-form-ea7f2b8cee8445bfd3a6af9dd8ec1877.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-contact-form-ea7f2b8cee8445bfd3a6af9dd8ec1877 + +info: + name: > + Booking Calendar Contact Form <= 1.2.34 - Cross-Site Request Forgery via cpdexbccf_feedback + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09932277-8af3-4790-96f0-fe5af0a0ed29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar-contact-form/" + google-query: inurl:"/wp-content/plugins/booking-calendar-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-d11c386e86541e81dcae4e94a2860a10.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-d11c386e86541e81dcae4e94a2860a10.yaml new file mode 100644 index 0000000000..9205a6b76f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-d11c386e86541e81dcae4e94a2860a10.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-d11c386e86541e81dcae4e94a2860a10 + +info: + name: > + Booking calendar, Appointment Booking System <= 3.2.3 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2675177-8b85-4fb8-ba10-ae02cb5c6c72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-calendar-e44a87677c68a494baa8ed72b523a10f.yaml b/nuclei-templates/cve-less/plugins/booking-calendar-e44a87677c68a494baa8ed72b523a10f.yaml new file mode 100644 index 0000000000..1f99c85515 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-calendar-e44a87677c68a494baa8ed72b523a10f.yaml @@ -0,0 +1,58 @@ +id: booking-calendar-e44a87677c68a494baa8ed72b523a10f + +info: + name: > + Booking calendar, Appointment Booking System <= 3.2.6 - Authenticated (Administrator+) SQL Injection via *_selected + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c44b6e5-7fb2-402e-8c8c-79d811ff0e9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-calendar/" + google-query: inurl:"/wp-content/plugins/booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-e064d299c84a7a932db5e1b086223b4a.yaml b/nuclei-templates/cve-less/plugins/booking-e064d299c84a7a932db5e1b086223b4a.yaml new file mode 100644 index 0000000000..38eccc3d82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-e064d299c84a7a932db5e1b086223b4a.yaml @@ -0,0 +1,58 @@ +id: booking-e064d299c84a7a932db5e1b086223b4a + +info: + name: > + Booking Calendar <= 9.4.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a69576e-4796-421a-b6ee-08a3b40d4805?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-e9dd2b4943d62b4d4eacb38332a5b454.yaml b/nuclei-templates/cve-less/plugins/booking-e9dd2b4943d62b4d4eacb38332a5b454.yaml new file mode 100644 index 0000000000..71962bb515 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-e9dd2b4943d62b4d4eacb38332a5b454.yaml @@ -0,0 +1,58 @@ +id: booking-e9dd2b4943d62b4d4eacb38332a5b454 + +info: + name: > + Booking Calendar <= 9.9 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7802ed1f-138c-4a3d-916c-80fb4f7699b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-eb4b31f33272ec5c989c730f7ccb3d9f.yaml b/nuclei-templates/cve-less/plugins/booking-eb4b31f33272ec5c989c730f7ccb3d9f.yaml new file mode 100644 index 0000000000..5e84bc91cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-eb4b31f33272ec5c989c730f7ccb3d9f.yaml @@ -0,0 +1,58 @@ +id: booking-eb4b31f33272ec5c989c730f7ccb3d9f + +info: + name: > + Booking Calendar <= 9.1 - PHP Object Injection via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55491c64-e4b5-4919-bdcb-7285f2a3c3cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking/" + google-query: inurl:"/wp-content/plugins/booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/booking-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..785f3f2ad1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: booking-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booking-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-manager-701997e59be83cd9ba4ad233278f4aaf.yaml b/nuclei-templates/cve-less/plugins/booking-manager-701997e59be83cd9ba4ad233278f4aaf.yaml new file mode 100644 index 0000000000..3f60a55e79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-manager-701997e59be83cd9ba4ad233278f4aaf.yaml @@ -0,0 +1,58 @@ +id: booking-manager-701997e59be83cd9ba4ad233278f4aaf + +info: + name: > + Booking Manager <= 2.1.5 - Authenticated(Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9829ec10-ad37-4345-b4d6-cd0429b2d8f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-manager/" + google-query: inurl:"/wp-content/plugins/booking-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-manager-ffbb08b3382f9c076d19dfa65caa3e3a.yaml b/nuclei-templates/cve-less/plugins/booking-manager-ffbb08b3382f9c076d19dfa65caa3e3a.yaml new file mode 100644 index 0000000000..a706d3b4d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-manager-ffbb08b3382f9c076d19dfa65caa3e3a.yaml @@ -0,0 +1,58 @@ +id: booking-manager-ffbb08b3382f9c076d19dfa65caa3e3a + +info: + name: > + Booking Manager <= 2.0.28 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9ee709d-6590-4c07-9788-6150733c1691?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-manager/" + google-query: inurl:"/wp-content/plugins/booking-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-package-6104fab3d6323129ecb2671e037b46ea.yaml b/nuclei-templates/cve-less/plugins/booking-package-6104fab3d6323129ecb2671e037b46ea.yaml new file mode 100644 index 0000000000..e540840456 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-package-6104fab3d6323129ecb2671e037b46ea.yaml @@ -0,0 +1,58 @@ +id: booking-package-6104fab3d6323129ecb2671e037b46ea + +info: + name: > + Booking Package <= 1.5.98 - Authorization Bypass to Arbitrary Password Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65166432-a877-4070-94c1-cdaf7e5d7586?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-package/" + google-query: inurl:"/wp-content/plugins/booking-package/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-package,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-package/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-package" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-package-64d367b3cacb5cf8c295e6ccc3504c04.yaml b/nuclei-templates/cve-less/plugins/booking-package-64d367b3cacb5cf8c295e6ccc3504c04.yaml new file mode 100644 index 0000000000..34b1efd5fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-package-64d367b3cacb5cf8c295e6ccc3504c04.yaml @@ -0,0 +1,58 @@ +id: booking-package-64d367b3cacb5cf8c295e6ccc3504c04 + +info: + name: > + Booking Package <= 1.5.28 - Unauthenticated Sensitive Data Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c5a065a-a81e-4963-af54-21f145632bed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-package/" + google-query: inurl:"/wp-content/plugins/booking-package/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-package,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-package/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-package" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-package-6b73dfda9277bb390c84251b69303827.yaml b/nuclei-templates/cve-less/plugins/booking-package-6b73dfda9277bb390c84251b69303827.yaml new file mode 100644 index 0000000000..e7a07c9405 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-package-6b73dfda9277bb390c84251b69303827.yaml @@ -0,0 +1,58 @@ +id: booking-package-6b73dfda9277bb390c84251b69303827 + +info: + name: > + Booking Package <= 1.6.27 - Unauthenticated Price Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b611abb-460c-44d4-9f77-052a208f8d85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-package/" + google-query: inurl:"/wp-content/plugins/booking-package/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-package,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-package/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-package" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-package-bea3389dfa395e208890fd90e5f6c66b.yaml b/nuclei-templates/cve-less/plugins/booking-package-bea3389dfa395e208890fd90e5f6c66b.yaml new file mode 100644 index 0000000000..0d9994ec7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-package-bea3389dfa395e208890fd90e5f6c66b.yaml @@ -0,0 +1,58 @@ +id: booking-package-bea3389dfa395e208890fd90e5f6c66b + +info: + name: > + Booking Package <= 1.6.01 - Reflected Cross-Site Scripting via 'mode' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d460cc34-c8b0-453b-9b6b-3bd53137625a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-package/" + google-query: inurl:"/wp-content/plugins/booking-package/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-package,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-package/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-package" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-package-eb4f476f66236ca8f6047b9846303766.yaml b/nuclei-templates/cve-less/plugins/booking-package-eb4f476f66236ca8f6047b9846303766.yaml new file mode 100644 index 0000000000..7100f3f869 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-package-eb4f476f66236ca8f6047b9846303766.yaml @@ -0,0 +1,58 @@ +id: booking-package-eb4f476f66236ca8f6047b9846303766 + +info: + name: > + Booking Package <= 1.5.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3884cb24-3f46-4feb-a6b9-4445ca8fd0e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-package/" + google-query: inurl:"/wp-content/plugins/booking-package/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-package,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-package/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-package" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-sms-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/cve-less/plugins/booking-sms-167d9672411be44feb72a5175fd0987c.yaml new file mode 100644 index 0000000000..e96caa00c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-sms-167d9672411be44feb72a5175fd0987c.yaml @@ -0,0 +1,58 @@ +id: booking-sms-167d9672411be44feb72a5175fd0987c + +info: + name: > + Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f35a20-ffcf-4413-b1ea-748cd6aa6f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-sms/" + google-query: inurl:"/wp-content/plugins/booking-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-sms-a5d93553709e3d7ff537bf5a7307a899.yaml b/nuclei-templates/cve-less/plugins/booking-sms-a5d93553709e3d7ff537bf5a7307a899.yaml new file mode 100644 index 0000000000..7ab0a6400b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-sms-a5d93553709e3d7ff537bf5a7307a899.yaml @@ -0,0 +1,58 @@ +id: booking-sms-a5d93553709e3d7ff537bf5a7307a899 + +info: + name: > + Booking Calendar - Clockwork SMS <= 1.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cf44639-60ce-4a3c-aa4a-550dd9327039?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-sms/" + google-query: inurl:"/wp-content/plugins/booking-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-system-044e0b800aae833468f672b3d52648b9.yaml b/nuclei-templates/cve-less/plugins/booking-system-044e0b800aae833468f672b3d52648b9.yaml new file mode 100644 index 0000000000..c8c06d0285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-system-044e0b800aae833468f672b3d52648b9.yaml @@ -0,0 +1,58 @@ +id: booking-system-044e0b800aae833468f672b3d52648b9 + +info: + name: > + Pinpoint Booking System – #1 WordPress Booking Plugin < 2.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/437e8d95-2ab3-4cb0-94ca-110f742d6eff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-system/" + google-query: inurl:"/wp-content/plugins/booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-system-18e973bad98be5b94dffe02819323b60.yaml b/nuclei-templates/cve-less/plugins/booking-system-18e973bad98be5b94dffe02819323b60.yaml new file mode 100644 index 0000000000..b867110fc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-system-18e973bad98be5b94dffe02819323b60.yaml @@ -0,0 +1,58 @@ +id: booking-system-18e973bad98be5b94dffe02819323b60 + +info: + name: > + Pinpoint Booking System <= 2.9.9.2.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcd9df9c-e1f8-467a-8f1c-ab5c402004da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-system/" + google-query: inurl:"/wp-content/plugins/booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-system-1cab2d59082ad51ce28485e5e2656cc9.yaml b/nuclei-templates/cve-less/plugins/booking-system-1cab2d59082ad51ce28485e5e2656cc9.yaml new file mode 100644 index 0000000000..7a109d494d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-system-1cab2d59082ad51ce28485e5e2656cc9.yaml @@ -0,0 +1,58 @@ +id: booking-system-1cab2d59082ad51ce28485e5e2656cc9 + +info: + name: > + Pinpoint Booking System – #1 WordPress Booking Plugin <= 1.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2f57c50-f6d1-4583-a75e-17c543ed7fa6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-system/" + google-query: inurl:"/wp-content/plugins/booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-system-38e29be67779459d45a16e8dcf062abc.yaml b/nuclei-templates/cve-less/plugins/booking-system-38e29be67779459d45a16e8dcf062abc.yaml new file mode 100644 index 0000000000..b5c234fd9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-system-38e29be67779459d45a16e8dcf062abc.yaml @@ -0,0 +1,58 @@ +id: booking-system-38e29be67779459d45a16e8dcf062abc + +info: + name: > + Pinpoint Booking System <= 2.9.9.2.8 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b14bc75a-0bfb-4d46-89db-c31fb6bfa7cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-system/" + google-query: inurl:"/wp-content/plugins/booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-system-47ded31f222bc2d2f0264df68174ce6d.yaml b/nuclei-templates/cve-less/plugins/booking-system-47ded31f222bc2d2f0264df68174ce6d.yaml new file mode 100644 index 0000000000..06c2bdaac2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-system-47ded31f222bc2d2f0264df68174ce6d.yaml @@ -0,0 +1,58 @@ +id: booking-system-47ded31f222bc2d2f0264df68174ce6d + +info: + name: > + Pinpoint Booking System <= 2.9.9.4.0 - Cross-Site Request Forgery via initBackEndAJAX + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4dfb4b5-b2a5-40bd-9dfb-863baa563d06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-system/" + google-query: inurl:"/wp-content/plugins/booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-system-7983ddc66df9d17c37dd89bbc4e4f416.yaml b/nuclei-templates/cve-less/plugins/booking-system-7983ddc66df9d17c37dd89bbc4e4f416.yaml new file mode 100644 index 0000000000..fcae6e2d63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-system-7983ddc66df9d17c37dd89bbc4e4f416.yaml @@ -0,0 +1,58 @@ +id: booking-system-7983ddc66df9d17c37dd89bbc4e4f416 + +info: + name: > + Pinpoint Booking System – #1 WordPress Booking Plugin < 1.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9461354-0e69-47d9-a11c-838cfa94be67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-system/" + google-query: inurl:"/wp-content/plugins/booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-system-b9395679d8a85b69727aeef7e08a5667.yaml b/nuclei-templates/cve-less/plugins/booking-system-b9395679d8a85b69727aeef7e08a5667.yaml new file mode 100644 index 0000000000..13a9f513a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-system-b9395679d8a85b69727aeef7e08a5667.yaml @@ -0,0 +1,58 @@ +id: booking-system-b9395679d8a85b69727aeef7e08a5667 + +info: + name: > + Pinpoint Booking System <= 2.9.9.3.4 - Content Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ad895db-5fe9-419b-8884-9a840bd350f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-system/" + google-query: inurl:"/wp-content/plugins/booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-437e935b70b10e1a496119f3d8fbac5b.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-437e935b70b10e1a496119f3d8fbac5b.yaml new file mode 100644 index 0000000000..e575b2c98b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-437e935b70b10e1a496119f3d8fbac5b.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-437e935b70b10e1a496119f3d8fbac5b + +info: + name: > + Booking Ultra Pro <= 1.1.6 - Missing Authorization via save_fields_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c0f8f3-22fe-4139-93bb-0e9bacf9dafb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-5b1c2add49d2a47b01ab11a65c17a099.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-5b1c2add49d2a47b01ab11a65c17a099.yaml new file mode 100644 index 0000000000..a67336f606 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-5b1c2add49d2a47b01ab11a65c17a099.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-5b1c2add49d2a47b01ab11a65c17a099 + +info: + name: > + Booking Ultra Pro <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/701910b7-6da3-40db-a48b-46a93398953a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-7075591051dde0bd8bf5f75302619dd9.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-7075591051dde0bd8bf5f75302619dd9.yaml new file mode 100644 index 0000000000..766d3d04fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-7075591051dde0bd8bf5f75302619dd9.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-7075591051dde0bd8bf5f75302619dd9 + +info: + name: > + Booking Ultra Pro <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cd1b975-ac38-4393-9928-109db507828c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-770cacdb7e6dbbed594d0162d09eaa1e.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-770cacdb7e6dbbed594d0162d09eaa1e.yaml new file mode 100644 index 0000000000..0a84d8a148 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-770cacdb7e6dbbed594d0162d09eaa1e.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-770cacdb7e6dbbed594d0162d09eaa1e + +info: + name: > + Booking Ultra Pro <= 1.1.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6572733-3b3a-49c5-9ee3-52a7ab61c98d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-946e2c8cf66089d544e720fc4e253df1.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-946e2c8cf66089d544e720fc4e253df1.yaml new file mode 100644 index 0000000000..b0d932ebcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-946e2c8cf66089d544e720fc4e253df1.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-946e2c8cf66089d544e720fc4e253df1 + +info: + name: > + Booking Ultra Pro <= 1.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01370a71-2611-4826-b08b-485839ca606a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-a730585b1aab8262e7f092340f9d0036.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-a730585b1aab8262e7f092340f9d0036.yaml new file mode 100644 index 0000000000..931be62f48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-a730585b1aab8262e7f092340f9d0036.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-a730585b1aab8262e7f092340f9d0036 + +info: + name: > + Booking Ultra Pro <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/803e9059-7606-42eb-9193-1a18d57153b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-afe05343ac8d22a01c8645d538528ad3.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-afe05343ac8d22a01c8645d538528ad3.yaml new file mode 100644 index 0000000000..b12ca86e82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-afe05343ac8d22a01c8645d538528ad3.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-afe05343ac8d22a01c8645d538528ad3 + +info: + name: > + Booking Ultra Pro <= 1.1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12d7a152-90cd-4c92-90c4-81c594e6c9ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-b37c04c35cc1fc9903c14f0d3df33b2d.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-b37c04c35cc1fc9903c14f0d3df33b2d.yaml new file mode 100644 index 0000000000..e1a4b19e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-b37c04c35cc1fc9903c14f0d3df33b2d.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-b37c04c35cc1fc9903c14f0d3df33b2d + +info: + name: > + Booking Ultra Pro <= 1.1.8 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd8fb3e9-34eb-4b37-9a7e-00309a1ca81d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booking-ultra-pro-cec3580e3bef11008dce66e6706b0fc0.yaml b/nuclei-templates/cve-less/plugins/booking-ultra-pro-cec3580e3bef11008dce66e6706b0fc0.yaml new file mode 100644 index 0000000000..b8d7d59665 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booking-ultra-pro-cec3580e3bef11008dce66e6706b0fc0.yaml @@ -0,0 +1,58 @@ +id: booking-ultra-pro-cec3580e3bef11008dce66e6706b0fc0 + +info: + name: > + Booking Ultra Pro <= 1.1.12 - Authenticated (Contributor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f65fdde9-1133-4e29-a70a-be977f96acce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booking-ultra-pro/" + google-query: inurl:"/wp-content/plugins/booking-ultra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booking-ultra-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booking-ultra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booking-ultra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingcom-banner-creator-792631ba5cdfc566598ea26dfe895270.yaml b/nuclei-templates/cve-less/plugins/bookingcom-banner-creator-792631ba5cdfc566598ea26dfe895270.yaml new file mode 100644 index 0000000000..782f03d428 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingcom-banner-creator-792631ba5cdfc566598ea26dfe895270.yaml @@ -0,0 +1,58 @@ +id: bookingcom-banner-creator-792631ba5cdfc566598ea26dfe895270 + +info: + name: > + Booking.com Banner Creator <= 1.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2fee7aa-5289-4bf0-b175-5a64b16fdd40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingcom-banner-creator/" + google-query: inurl:"/wp-content/plugins/bookingcom-banner-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingcom-banner-creator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingcom-banner-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingcom-banner-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingcom-product-helper-97d71a5a3da44a42d764845b5a062c1f.yaml b/nuclei-templates/cve-less/plugins/bookingcom-product-helper-97d71a5a3da44a42d764845b5a062c1f.yaml new file mode 100644 index 0000000000..8cc07d6582 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingcom-product-helper-97d71a5a3da44a42d764845b5a062c1f.yaml @@ -0,0 +1,58 @@ +id: bookingcom-product-helper-97d71a5a3da44a42d764845b5a062c1f + +info: + name: > + Booking.com Product Helper <= 1.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1212dfc7-41d4-4c16-960a-7afc882ec4db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingcom-product-helper/" + google-query: inurl:"/wp-content/plugins/bookingcom-product-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingcom-product-helper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingcom-product-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingcom-product-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-31c57dd6605d62ca0d6cd98ec04a3787.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-31c57dd6605d62ca0d6cd98ec04a3787.yaml new file mode 100644 index 0000000000..071eebbf29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-31c57dd6605d62ca0d6cd98ec04a3787.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-31c57dd6605d62ca0d6cd98ec04a3787 + +info: + name: > + BookingPress <= 1.0.72 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1a3cc98-3bee-4d52-a4bf-2a1a284b9311?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-631d4cb99a459c16e4abfaa250ae1a0d.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-631d4cb99a459c16e4abfaa250ae1a0d.yaml new file mode 100644 index 0000000000..1ea4aeb707 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-631d4cb99a459c16e4abfaa250ae1a0d.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-631d4cb99a459c16e4abfaa250ae1a0d + +info: + name: > + BookingPress <= 1.0.76 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/710b8e4e-01de-4e99-8cf2-31abc2419b29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-65f544c282d9d1cc0fbf1f6438a4d682.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-65f544c282d9d1cc0fbf1f6438a4d682.yaml new file mode 100644 index 0000000000..8223162bfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-65f544c282d9d1cc0fbf1f6438a4d682.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-65f544c282d9d1cc0fbf1f6438a4d682 + +info: + name: > + BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin <= 1.0.87 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.87') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-6afeb2ce393f64d78e2ee60294c65cf9.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-6afeb2ce393f64d78e2ee60294c65cf9.yaml new file mode 100644 index 0000000000..b0e6bc0328 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-6afeb2ce393f64d78e2ee60294c65cf9.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-6afeb2ce393f64d78e2ee60294c65cf9 + +info: + name: > + BookingPress <= 1.0.81 - Authenticated (Customer+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a86fc949-6caf-48b7-beda-ca0c653c9b29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-7012d2201a7455c1e6a2f89c3d28d2a8.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-7012d2201a7455c1e6a2f89c3d28d2a8.yaml new file mode 100644 index 0000000000..1583aabc61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-7012d2201a7455c1e6a2f89c3d28d2a8.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-7012d2201a7455c1e6a2f89c3d28d2a8 + +info: + name: > + BookingPress < 1.0.11 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffa0d1ff-a1df-4a90-bfe5-3f4c8a7942c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-7693fcc00d13cef3033e8801e5f162a4.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-7693fcc00d13cef3033e8801e5f162a4.yaml new file mode 100644 index 0000000000..3145f4117d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-7693fcc00d13cef3033e8801e5f162a4.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-7693fcc00d13cef3033e8801e5f162a4 + +info: + name: > + BookingPress <= 1.0.74 - Booking Price Manipulation via bookingpress_confirm_booking + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08f55882-d19f-43a3-a370-17d041493944?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.74') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-8e84c6d55a38a50c9e90b28855791a03.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-8e84c6d55a38a50c9e90b28855791a03.yaml new file mode 100644 index 0000000000..76d0cc81af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-8e84c6d55a38a50c9e90b28855791a03.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-8e84c6d55a38a50c9e90b28855791a03 + +info: + name: > + BookingPress – Appointments Booking Calendar Plugin and Online Scheduling Plugin <= 1.0.13 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/574dd6d8-14df-47b8-bf03-28a3c02b73ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-939a2361df462af629884dcbb9b0b778.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-939a2361df462af629884dcbb9b0b778.yaml new file mode 100644 index 0000000000..f1ff51294f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-939a2361df462af629884dcbb9b0b778.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-939a2361df462af629884dcbb9b0b778 + +info: + name: > + BookingPress <= 1.0.64 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a720ad0e-6194-4df4-951e-e818518e79b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-97d20ad28c50ce54c99b6663434336ca.yaml b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-97d20ad28c50ce54c99b6663434336ca.yaml new file mode 100644 index 0000000000..34c00263da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookingpress-appointment-booking-97d20ad28c50ce54c99b6663434336ca.yaml @@ -0,0 +1,58 @@ +id: bookingpress-appointment-booking-97d20ad28c50ce54c99b6663434336ca + +info: + name: > + BookingPress <= 1.0.30 - Unauthenticated Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8019da67-fd2c-48f8-8983-6fb8fb30510b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookingpress-appointment-booking/" + google-query: inurl:"/wp-content/plugins/bookingpress-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookingpress-appointment-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookingpress-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookingpress-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookit-11aab719a7f95d840a71a26506348060.yaml b/nuclei-templates/cve-less/plugins/bookit-11aab719a7f95d840a71a26506348060.yaml new file mode 100644 index 0000000000..9dbd7b9428 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookit-11aab719a7f95d840a71a26506348060.yaml @@ -0,0 +1,58 @@ +id: bookit-11aab719a7f95d840a71a26506348060 + +info: + name: > + BookIt <= 2.3.7 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd32e46-a4fc-4c10-b546-9f9da75db791?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookit/" + google-query: inurl:"/wp-content/plugins/bookit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookit,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookit-3617ec07999a872e306f9b352b63ebdd.yaml b/nuclei-templates/cve-less/plugins/bookit-3617ec07999a872e306f9b352b63ebdd.yaml new file mode 100644 index 0000000000..add2122656 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookit-3617ec07999a872e306f9b352b63ebdd.yaml @@ -0,0 +1,58 @@ +id: bookit-3617ec07999a872e306f9b352b63ebdd + +info: + name: > + BookIt <= 2.4.3 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4e97c01-7e8a-41b7-90ad-029d8c5fd37c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookit/" + google-query: inurl:"/wp-content/plugins/bookit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bookit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f0185b3bb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bookit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookit/" + google-query: inurl:"/wp-content/plugins/bookit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookit-bc903096388fe8f2ee39329af87a5f0b.yaml b/nuclei-templates/cve-less/plugins/bookit-bc903096388fe8f2ee39329af87a5f0b.yaml new file mode 100644 index 0000000000..7d8d873241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookit-bc903096388fe8f2ee39329af87a5f0b.yaml @@ -0,0 +1,58 @@ +id: bookit-bc903096388fe8f2ee39329af87a5f0b + +info: + name: > + BookIt <=2.4.0 - Price Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9938c7d-ef0d-45a2-900f-ac8bda9ce75a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookit/" + google-query: inurl:"/wp-content/plugins/bookit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-1609915cce06136e2f0af7da1d5a5d40.yaml b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-1609915cce06136e2f0af7da1d5a5d40.yaml new file mode 100644 index 0000000000..2dc3a6252e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-1609915cce06136e2f0af7da1d5a5d40.yaml @@ -0,0 +1,58 @@ +id: bookly-responsive-appointment-booking-tool-1609915cce06136e2f0af7da1d5a5d40 + +info: + name: > + Bookly <= 21.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4cdf774-c93b-4b94-85ba-aa56bf401873?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookly-responsive-appointment-booking-tool/" + google-query: inurl:"/wp-content/plugins/bookly-responsive-appointment-booking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookly-responsive-appointment-booking-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookly-responsive-appointment-booking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookly-responsive-appointment-booking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '21.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-5e7a34d7ec594c161e3b32965c332df1.yaml b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-5e7a34d7ec594c161e3b32965c332df1.yaml new file mode 100644 index 0000000000..52c5c05758 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-5e7a34d7ec594c161e3b32965c332df1.yaml @@ -0,0 +1,58 @@ +id: bookly-responsive-appointment-booking-tool-5e7a34d7ec594c161e3b32965c332df1 + +info: + name: > + Bookly <= 21.7.1 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a7609bf-5b20-440c-9984-eeb26962ada8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookly-responsive-appointment-booking-tool/" + google-query: inurl:"/wp-content/plugins/bookly-responsive-appointment-booking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookly-responsive-appointment-booking-tool,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookly-responsive-appointment-booking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookly-responsive-appointment-booking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-8001bfb6e3adcf1d41f5f6700841da72.yaml b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-8001bfb6e3adcf1d41f5f6700841da72.yaml new file mode 100644 index 0000000000..cc1691f54f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-8001bfb6e3adcf1d41f5f6700841da72.yaml @@ -0,0 +1,58 @@ +id: bookly-responsive-appointment-booking-tool-8001bfb6e3adcf1d41f5f6700841da72 + +info: + name: > + WordPress Online Booking and Scheduling Plugin – Bookly <= 14.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e3931c2-c9b4-412e-941d-840c5bb9be89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookly-responsive-appointment-booking-tool/" + google-query: inurl:"/wp-content/plugins/bookly-responsive-appointment-booking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookly-responsive-appointment-booking-tool,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookly-responsive-appointment-booking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookly-responsive-appointment-booking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-818af94ff212e6efa6d6c820fd265294.yaml b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-818af94ff212e6efa6d6c820fd265294.yaml new file mode 100644 index 0000000000..416d64e0b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-818af94ff212e6efa6d6c820fd265294.yaml @@ -0,0 +1,58 @@ +id: bookly-responsive-appointment-booking-tool-818af94ff212e6efa6d6c820fd265294 + +info: + name: > + Bookly <= 21.5 - Unauthenticated Stored Cross-Site Scripting via Name + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3efbd9d-e2b5-4915-a964-29a49c7fba86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookly-responsive-appointment-booking-tool/" + google-query: inurl:"/wp-content/plugins/bookly-responsive-appointment-booking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookly-responsive-appointment-booking-tool,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookly-responsive-appointment-booking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookly-responsive-appointment-booking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '21.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-8558d7a24f00d0b4c6ef650bca69a892.yaml b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-8558d7a24f00d0b4c6ef650bca69a892.yaml new file mode 100644 index 0000000000..db317b03ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-8558d7a24f00d0b4c6ef650bca69a892.yaml @@ -0,0 +1,58 @@ +id: bookly-responsive-appointment-booking-tool-8558d7a24f00d0b4c6ef650bca69a892 + +info: + name: > + Bookly <= 22.3.1 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ade6f9f2-2a35-4bb0-ab13-33b84394d965?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookly-responsive-appointment-booking-tool/" + google-query: inurl:"/wp-content/plugins/bookly-responsive-appointment-booking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookly-responsive-appointment-booking-tool,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookly-responsive-appointment-booking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookly-responsive-appointment-booking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 22.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-9ae477d5648cc901734eab0eec621bd2.yaml b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-9ae477d5648cc901734eab0eec621bd2.yaml new file mode 100644 index 0000000000..a0f67ba158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-9ae477d5648cc901734eab0eec621bd2.yaml @@ -0,0 +1,58 @@ +id: bookly-responsive-appointment-booking-tool-9ae477d5648cc901734eab0eec621bd2 + +info: + name: > + Bookly <= 20.3 - Staff Member Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd6cddeb-c812-4496-9377-cc8832842c51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookly-responsive-appointment-booking-tool/" + google-query: inurl:"/wp-content/plugins/bookly-responsive-appointment-booking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookly-responsive-appointment-booking-tool,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookly-responsive-appointment-booking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookly-responsive-appointment-booking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-9fa7c4fbd0089213898129a94fb855e3.yaml b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-9fa7c4fbd0089213898129a94fb855e3.yaml new file mode 100644 index 0000000000..1f58018278 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookly-responsive-appointment-booking-tool-9fa7c4fbd0089213898129a94fb855e3.yaml @@ -0,0 +1,58 @@ +id: bookly-responsive-appointment-booking-tool-9fa7c4fbd0089213898129a94fb855e3 + +info: + name: > + WordPress Online Booking and Scheduling Plugin – Bookly <= 22.4.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48ffd408-ef7b-4b78-90c3-e1645d7354b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookly-responsive-appointment-booking-tool/" + google-query: inurl:"/wp-content/plugins/bookly-responsive-appointment-booking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookly-responsive-appointment-booking-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookly-responsive-appointment-booking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookly-responsive-appointment-booking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 22.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookmarkify-2b409575c7974f5c970ac5bf63b20b84.yaml b/nuclei-templates/cve-less/plugins/bookmarkify-2b409575c7974f5c970ac5bf63b20b84.yaml new file mode 100644 index 0000000000..a99390046c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookmarkify-2b409575c7974f5c970ac5bf63b20b84.yaml @@ -0,0 +1,58 @@ +id: bookmarkify-2b409575c7974f5c970ac5bf63b20b84 + +info: + name: > + Bookmarkify <= 1.1.3 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/824b27e8-1f07-4cd0-9335-5860d1b58562?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookmarkify/" + google-query: inurl:"/wp-content/plugins/bookmarkify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookmarkify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookmarkify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookmarkify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/books-papers-01ed1eb8aac2e68ae5c276ba61ed6aed.yaml b/nuclei-templates/cve-less/plugins/books-papers-01ed1eb8aac2e68ae5c276ba61ed6aed.yaml new file mode 100644 index 0000000000..2c398f6d82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/books-papers-01ed1eb8aac2e68ae5c276ba61ed6aed.yaml @@ -0,0 +1,58 @@ +id: books-papers-01ed1eb8aac2e68ae5c276ba61ed6aed + +info: + name: > + Books & Papers <= 0.20210223 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e51eb56-e2f7-433c-8db7-bcf7539aee29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/books-papers/" + google-query: inurl:"/wp-content/plugins/books-papers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,books-papers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/books-papers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "books-papers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.20210223') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookshelf-0e3f0bd6a580d466d037adb8757f5f4f.yaml b/nuclei-templates/cve-less/plugins/bookshelf-0e3f0bd6a580d466d037adb8757f5f4f.yaml new file mode 100644 index 0000000000..790cb380c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookshelf-0e3f0bd6a580d466d037adb8757f5f4f.yaml @@ -0,0 +1,58 @@ +id: bookshelf-0e3f0bd6a580d466d037adb8757f5f4f + +info: + name: > + Bookshelf <= 2.0.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61d6b2b8-dcaa-4419-b61d-4def743def95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookshelf/" + google-query: inurl:"/wp-content/plugins/bookshelf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookshelf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookshelf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookshelf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookshelf-6ab8d1e005858a4b8a6347eda74e7ac7.yaml b/nuclei-templates/cve-less/plugins/bookshelf-6ab8d1e005858a4b8a6347eda74e7ac7.yaml new file mode 100644 index 0000000000..4693f1cd54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookshelf-6ab8d1e005858a4b8a6347eda74e7ac7.yaml @@ -0,0 +1,58 @@ +id: bookshelf-6ab8d1e005858a4b8a6347eda74e7ac7 + +info: + name: > + Bookshelf <= 2.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6a1a2c2-e754-43e5-84b5-579a805c8d71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookshelf/" + google-query: inurl:"/wp-content/plugins/bookshelf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookshelf,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookshelf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookshelf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bookx-a1af99e36ad926e6fbfffb28e9e0b399.yaml b/nuclei-templates/cve-less/plugins/bookx-a1af99e36ad926e6fbfffb28e9e0b399.yaml new file mode 100644 index 0000000000..fdfd5ba97a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bookx-a1af99e36ad926e6fbfffb28e9e0b399.yaml @@ -0,0 +1,58 @@ +id: bookx-a1af99e36ad926e6fbfffb28e9e0b399 + +info: + name: > + BookX <= 1.7 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/424a30d7-4806-4274-8c5e-75dcc12e9f3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bookx/" + google-query: inurl:"/wp-content/plugins/bookx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bookx,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bookx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booqable-rental-reservations-aa0b3a997f2af2400ed5816a52c96615.yaml b/nuclei-templates/cve-less/plugins/booqable-rental-reservations-aa0b3a997f2af2400ed5816a52c96615.yaml new file mode 100644 index 0000000000..2ff78af99e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booqable-rental-reservations-aa0b3a997f2af2400ed5816a52c96615.yaml @@ -0,0 +1,58 @@ +id: booqable-rental-reservations-aa0b3a997f2af2400ed5816a52c96615 + +info: + name: > + Booqable Rental Plugin <= 2.4.15 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16f183a6-b8db-461e-b17d-2faa528ff0ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booqable-rental-reservations/" + google-query: inurl:"/wp-content/plugins/booqable-rental-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booqable-rental-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booqable-rental-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booqable-rental-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-2594adb9a7b091439405e835629ab066.yaml b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-2594adb9a7b091439405e835629ab066.yaml new file mode 100644 index 0000000000..3c43a3ae94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-2594adb9a7b091439405e835629ab066.yaml @@ -0,0 +1,58 @@ +id: booster-elite-for-woocommerce-2594adb9a7b091439405e835629ab066 + +info: + name: > + Booster (<= 5.6.6), Booster Plus (<= 5.6.5), and Booster Elite (<= 1.1.7) for WooCommerce - Cross-Site Request Forgery leading to Arbitrary Custom Role Creation/Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21cc3f71-7591-4111-a58a-d863df74587f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-elite-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-elite-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-elite-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-elite-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-elite-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-2b5138240155c353b3e1835e93054ec3.yaml b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-2b5138240155c353b3e1835e93054ec3.yaml new file mode 100644 index 0000000000..8ab00a1f6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-2b5138240155c353b3e1835e93054ec3.yaml @@ -0,0 +1,58 @@ +id: booster-elite-for-woocommerce-2b5138240155c353b3e1835e93054ec3 + +info: + name: > + Booster Elite for WooCommerce < 7.1.2 - Missing Authorization to Order Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4afcb16-9c97-483f-be48-31b5156bcca3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-elite-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-elite-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-elite-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-elite-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-elite-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c.yaml b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c.yaml new file mode 100644 index 0000000000..f7e91fb52f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c.yaml @@ -0,0 +1,58 @@ +id: booster-elite-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c + +info: + name: > + Booster (<= 6.0.0), Booster Plus (<= 6.0.0), and Booster Elite (<= 6.0.0) for WooCommerce - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0af6e55d-def9-4bb1-ade9-56aa8184961c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-elite-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-elite-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-elite-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-elite-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-elite-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-882bdd3fdb6681642f156a22924c9a36.yaml b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-882bdd3fdb6681642f156a22924c9a36.yaml new file mode 100644 index 0000000000..10707fc95d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-882bdd3fdb6681642f156a22924c9a36.yaml @@ -0,0 +1,58 @@ +id: booster-elite-for-woocommerce-882bdd3fdb6681642f156a22924c9a36 + +info: + name: > + Booster (<= 5.6.2), Booster Plus (< 6.0.0), and Booster Elite (< 6.0.0) for WooCommerce - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4d86204-51df-4adf-aac4-f5e007d9f3c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-elite-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-elite-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-elite-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-elite-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-elite-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-a64fce4b936462ae9966af0a7b1ddcf3.yaml b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-a64fce4b936462ae9966af0a7b1ddcf3.yaml new file mode 100644 index 0000000000..9f34b09a6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-a64fce4b936462ae9966af0a7b1ddcf3.yaml @@ -0,0 +1,58 @@ +id: booster-elite-for-woocommerce-a64fce4b936462ae9966af0a7b1ddcf3 + +info: + name: > + Booster Elite for WooCommerce <= 7.1.2 - Authenticated(Subscriber+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/995a086a-4795-4092-823c-b941445dc361?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-elite-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-elite-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-elite-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-elite-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-elite-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-bd1638a89aa7173589958124d15f2afb.yaml b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-bd1638a89aa7173589958124d15f2afb.yaml new file mode 100644 index 0000000000..365c280101 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-bd1638a89aa7173589958124d15f2afb.yaml @@ -0,0 +1,58 @@ +id: booster-elite-for-woocommerce-bd1638a89aa7173589958124d15f2afb + +info: + name: > + Booster Elite for WooCommerce < 1.1.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60679026-13a3-4702-91a3-876636f3c5bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-elite-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-elite-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-elite-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-elite-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-elite-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-da8ac31a9cff4acdc3e67efcf5be4751.yaml b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-da8ac31a9cff4acdc3e67efcf5be4751.yaml new file mode 100644 index 0000000000..13376924c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-da8ac31a9cff4acdc3e67efcf5be4751.yaml @@ -0,0 +1,58 @@ +id: booster-elite-for-woocommerce-da8ac31a9cff4acdc3e67efcf5be4751 + +info: + name: > + Elite Booster for WooCommerce <= 7.1.7 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c2fb7f-a05b-4852-97eb-7befe880d703?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-elite-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-elite-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-elite-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-elite-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-elite-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-ed8996a111dbc40e1e02c2318552499b.yaml b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-ed8996a111dbc40e1e02c2318552499b.yaml new file mode 100644 index 0000000000..62a6f671e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-elite-for-woocommerce-ed8996a111dbc40e1e02c2318552499b.yaml @@ -0,0 +1,58 @@ +id: booster-elite-for-woocommerce-ed8996a111dbc40e1e02c2318552499b + +info: + name: > + Booster Elite for WooCommerce < 1.1.7 - Authenticated (Admin/Shop Manager+) Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c1e63df-d326-40bf-a428-fdb11150e8d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-elite-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-elite-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-elite-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-elite-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-elite-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-extension-1f9b8670b25d19d8fd0aa7ae1c76967d.yaml b/nuclei-templates/cve-less/plugins/booster-extension-1f9b8670b25d19d8fd0aa7ae1c76967d.yaml new file mode 100644 index 0000000000..5b379f9a68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-extension-1f9b8670b25d19d8fd0aa7ae1c76967d.yaml @@ -0,0 +1,58 @@ +id: booster-extension-1f9b8670b25d19d8fd0aa7ae1c76967d + +info: + name: > + Booster Extension <= 1.2.0 - Basic Information Exposure via booster_extension_authorbox_shortcode_display + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89458095-2efe-4162-961a-7dc80852d312?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-extension/" + google-query: inurl:"/wp-content/plugins/booster-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-for-elementor-37d5b7622ee837d13b79238620e127af.yaml b/nuclei-templates/cve-less/plugins/booster-for-elementor-37d5b7622ee837d13b79238620e127af.yaml new file mode 100644 index 0000000000..5ffcbc3af3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-for-elementor-37d5b7622ee837d13b79238620e127af.yaml @@ -0,0 +1,58 @@ +id: booster-for-elementor-37d5b7622ee837d13b79238620e127af + +info: + name: > + Booster Elementor Addons <= 1.4.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60ee9cfc-016d-45ee-b3f4-da999d093776?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-for-elementor/" + google-query: inurl:"/wp-content/plugins/booster-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-0927d29209569b3fa6ca414e42a83816.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-0927d29209569b3fa6ca414e42a83816.yaml new file mode 100644 index 0000000000..97bc560185 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-0927d29209569b3fa6ca414e42a83816.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-0927d29209569b3fa6ca414e42a83816 + +info: + name: > + Booster Plus for WooCommerce < 7.1.2 - Missing Authorization to Arbitrary Page/Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df65af54-ce55-4c50-8a62-5541a1879ad4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-127ab045dd12eca20b1f05cdaef8b291.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-127ab045dd12eca20b1f05cdaef8b291.yaml new file mode 100644 index 0000000000..b72edbf54f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-127ab045dd12eca20b1f05cdaef8b291.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-127ab045dd12eca20b1f05cdaef8b291 + +info: + name: > + Booster (<= 5.6.6) and Booster Plus (<= 5.6.4) for WooCommerce - Authenticated (Shop Manager+) Information Exposure via Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d8f7252-5e91-4e42-a6a5-056da491b4f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-1fe649382158471b98650df856d70fee.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-1fe649382158471b98650df856d70fee.yaml new file mode 100644 index 0000000000..5da142df20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-1fe649382158471b98650df856d70fee.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-1fe649382158471b98650df856d70fee + +info: + name: > + Booster Plus for WooCommerce < 7.1.2 - Missing Authorization to Order Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38a90190-569f-46d8-bef4-fe28caf5e2fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-2594adb9a7b091439405e835629ab066.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-2594adb9a7b091439405e835629ab066.yaml new file mode 100644 index 0000000000..d000759a51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-2594adb9a7b091439405e835629ab066.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-2594adb9a7b091439405e835629ab066 + +info: + name: > + Booster (<= 5.6.6), Booster Plus (<= 5.6.5), and Booster Elite (<= 1.1.7) for WooCommerce - Cross-Site Request Forgery leading to Arbitrary Custom Role Creation/Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21cc3f71-7591-4111-a58a-d863df74587f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-3ae6c1779315005d2af44a96ee77af2d.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-3ae6c1779315005d2af44a96ee77af2d.yaml new file mode 100644 index 0000000000..c295081167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-3ae6c1779315005d2af44a96ee77af2d.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-3ae6c1779315005d2af44a96ee77af2d + +info: + name: > + Booster for WooCommerce (Free <= 5.6.6, Premium <= 5.6.4) - Cross-Site Request Forgery to File Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3acbdb2a-e7c6-4062-b48a-7035e464edaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c.yaml new file mode 100644 index 0000000000..50ffbd2a42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-58678de90c143fa9b35140b23ca7ba6c + +info: + name: > + Booster (<= 6.0.0), Booster Plus (<= 6.0.0), and Booster Elite (<= 6.0.0) for WooCommerce - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0af6e55d-def9-4bb1-ade9-56aa8184961c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-672dfc933502a4edaa8116764ba522b6.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-672dfc933502a4edaa8116764ba522b6.yaml new file mode 100644 index 0000000000..254262b382 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-672dfc933502a4edaa8116764ba522b6.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-672dfc933502a4edaa8116764ba522b6 + +info: + name: > + Booster Plus for WooCommerce < 7.1.3 - Missing Authorization to Arbitrary Options Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd0a4212-fe04-4c3b-9d78-b1a0bf97e274?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-882bdd3fdb6681642f156a22924c9a36.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-882bdd3fdb6681642f156a22924c9a36.yaml new file mode 100644 index 0000000000..1ba60d3804 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-882bdd3fdb6681642f156a22924c9a36.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-882bdd3fdb6681642f156a22924c9a36 + +info: + name: > + Booster (<= 5.6.2), Booster Plus (< 6.0.0), and Booster Elite (< 6.0.0) for WooCommerce - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4d86204-51df-4adf-aac4-f5e007d9f3c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-f91c2602522656e11d82af368c387634.yaml b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-f91c2602522656e11d82af368c387634.yaml new file mode 100644 index 0000000000..3d2b5f6b8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/booster-plus-for-woocommerce-f91c2602522656e11d82af368c387634.yaml @@ -0,0 +1,58 @@ +id: booster-plus-for-woocommerce-f91c2602522656e11d82af368c387634 + +info: + name: > + Booster for WooCommerce (Free <= 5.6.2 and Premium <= 5.6.0) - Authenticated (Subscriber+) Order Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48784892-443f-452c-9fe9-12e73af1cf7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/booster-plus-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/booster-plus-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,booster-plus-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/booster-plus-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "booster-plus-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..d5e96dd345 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: boostify-header-footer-builder-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boostify-header-footer-builder/" + google-query: inurl:"/wp-content/plugins/boostify-header-footer-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boostify-header-footer-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boostify-header-footer-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boostify-header-footer-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..2c2ab99ae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: boostify-header-footer-builder-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boostify-header-footer-builder/" + google-query: inurl:"/wp-content/plugins/boostify-header-footer-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boostify-header-footer-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boostify-header-footer-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boostify-header-footer-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..a70bfa45bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/boostify-header-footer-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: boostify-header-footer-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/boostify-header-footer-builder/" + google-query: inurl:"/wp-content/plugins/boostify-header-footer-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,boostify-header-footer-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/boostify-header-footer-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boostify-header-footer-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-0063be3832ab01645d83916172a49901.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-0063be3832ab01645d83916172a49901.yaml new file mode 100644 index 0000000000..c6e0f70a3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-0063be3832ab01645d83916172a49901.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-0063be3832ab01645d83916172a49901 + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b1dc849-e306-4c09-a565-14d4e2427c69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-1c682460ea1b975e2214df2ecfd2a316.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-1c682460ea1b975e2214df2ecfd2a316.yaml new file mode 100644 index 0000000000..02185267d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-1c682460ea1b975e2214df2ecfd2a316.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-1c682460ea1b975e2214df2ecfd2a316 + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f97bc19-c600-4819-ae75-d80b119a7575?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-3cdf082bedfada27b24599e0f1cfd2ca.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-3cdf082bedfada27b24599e0f1cfd2ca.yaml new file mode 100644 index 0000000000..d732284804 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-3cdf082bedfada27b24599e0f1cfd2ca.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-3cdf082bedfada27b24599e0f1cfd2ca + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bc2eebb-d232-4aef-94e5-68876bba0f93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-4162fc0aa9f89a19a3b0d9a16f341e8b.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-4162fc0aa9f89a19a3b0d9a16f341e8b.yaml new file mode 100644 index 0000000000..72a4d41293 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-4162fc0aa9f89a19a3b0d9a16f341e8b.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-4162fc0aa9f89a19a3b0d9a16f341e8b + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fab0e10-d388-41d4-a01f-9bbb8c3cfb5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-548b1bf05be2eb1395c8483d4525a9fd.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-548b1bf05be2eb1395c8483d4525a9fd.yaml new file mode 100644 index 0000000000..ca0540390f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-548b1bf05be2eb1395c8483d4525a9fd.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-548b1bf05be2eb1395c8483d4525a9fd + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44b8659a-c88d-44d3-8eab-71b0a49d97b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-56e13ca8937773de3612c03bb63c62f7.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-56e13ca8937773de3612c03bb63c62f7.yaml new file mode 100644 index 0000000000..d276670235 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-56e13ca8937773de3612c03bb63c62f7.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-56e13ca8937773de3612c03bb63c62f7 + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7416f5e2-5c59-4192-a87c-b3174fd84a01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-5baab614c3a64c60d1e33947fef5d35a.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-5baab614c3a64c60d1e33947fef5d35a.yaml new file mode 100644 index 0000000000..952b2e58de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-5baab614c3a64c60d1e33947fef5d35a.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-5baab614c3a64c60d1e33947fef5d35a + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a187fa8b-daf1-4955-92b3-2937d0f6a159?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-9fb1ec0e705e68a81b6b6afdf66e55e5.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-9fb1ec0e705e68a81b6b6afdf66e55e5.yaml new file mode 100644 index 0000000000..742e8dfd06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-9fb1ec0e705e68a81b6b6afdf66e55e5.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-9fb1ec0e705e68a81b6b6afdf66e55e5 + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77122403-5865-40d7-96d5-557147098c4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-b9a97b0935a5ed2529aec7b450e17238.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-b9a97b0935a5ed2529aec7b450e17238.yaml new file mode 100644 index 0000000000..1ba2e103ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-b9a97b0935a5ed2529aec7b450e17238.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-b9a97b0935a5ed2529aec7b450e17238 + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/974a3228-5eab-41be-b3c1-82e71cde8de7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-dac296fb931bf261709dca85eb4e38f9.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-dac296fb931bf261709dca85eb4e38f9.yaml new file mode 100644 index 0000000000..a76b68a5b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-dac296fb931bf261709dca85eb4e38f9.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-dac296fb931bf261709dca85eb4e38f9 + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5235a235-911e-4462-90c5-05b0c7cb45a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-ee646c363ad3189cf7438d75312013e3.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-ee646c363ad3189cf7438d75312013e3.yaml new file mode 100644 index 0000000000..9e3ad383e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-ee646c363ad3189cf7438d75312013e3.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-ee646c363ad3189cf7438d75312013e3 + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e97e603-b864-41ef-98c8-b0304a72ec44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-f8952c598fe28f01e932d940cff08de2.yaml b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-f8952c598fe28f01e932d940cff08de2.yaml new file mode 100644 index 0000000000..6e53c2a4db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bootstrap-shortcodes-f8952c598fe28f01e932d940cff08de2.yaml @@ -0,0 +1,58 @@ +id: bootstrap-shortcodes-f8952c598fe28f01e932d940cff08de2 + +info: + name: > + BootStrap Shortcode <= 3.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7e504ef-9989-468f-9bd0-dd8416f16d85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/border-loading-bar-0355d1e8eb46bcc87e42a81e780a30de.yaml b/nuclei-templates/cve-less/plugins/border-loading-bar-0355d1e8eb46bcc87e42a81e780a30de.yaml new file mode 100644 index 0000000000..ff3c97fabb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/border-loading-bar-0355d1e8eb46bcc87e42a81e780a30de.yaml @@ -0,0 +1,58 @@ +id: border-loading-bar-0355d1e8eb46bcc87e42a81e780a30de + +info: + name: > + Border Loading Bar <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f47d38d2-d388-4a79-a47b-af41cd85e404?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/border-loading-bar/" + google-query: inurl:"/wp-content/plugins/border-loading-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,border-loading-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/border-loading-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "border-loading-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/border-loading-bar-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/border-loading-bar-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..e831eddbc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/border-loading-bar-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: border-loading-bar-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/border-loading-bar/" + google-query: inurl:"/wp-content/plugins/border-loading-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,border-loading-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/border-loading-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "border-loading-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/borderless-2504b2285582e1e86e6e013779bb055f.yaml b/nuclei-templates/cve-less/plugins/borderless-2504b2285582e1e86e6e013779bb055f.yaml new file mode 100644 index 0000000000..6b0a0cb1ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/borderless-2504b2285582e1e86e6e013779bb055f.yaml @@ -0,0 +1,58 @@ +id: borderless-2504b2285582e1e86e6e013779bb055f + +info: + name: > + Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg <= 1.4.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb93a5f2-9bcf-4b06-aad7-ba36c7dea714?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/borderless/" + google-query: inurl:"/wp-content/plugins/borderless/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,borderless,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/borderless/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "borderless" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-activity-filter-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/bp-activity-filter-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..cfe5422525 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-activity-filter-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: bp-activity-filter-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-activity-filter/" + google-query: inurl:"/wp-content/plugins/bp-activity-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-activity-filter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-activity-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-activity-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-activity-social-share-0c3c59a360a5bdbf267be8b305e5b01c.yaml b/nuclei-templates/cve-less/plugins/bp-activity-social-share-0c3c59a360a5bdbf267be8b305e5b01c.yaml new file mode 100644 index 0000000000..f88f3b0aac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-activity-social-share-0c3c59a360a5bdbf267be8b305e5b01c.yaml @@ -0,0 +1,58 @@ +id: bp-activity-social-share-0c3c59a360a5bdbf267be8b305e5b01c + +info: + name: > + Wbcom Designs – BuddyPress Activity Social Share <= 3.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c8152c5-7d72-48a1-9140-8b0341c86023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-activity-social-share/" + google-query: inurl:"/wp-content/plugins/bp-activity-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-activity-social-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-activity-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-activity-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-activity-social-share-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/bp-activity-social-share-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..0888a0e311 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-activity-social-share-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: bp-activity-social-share-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-activity-social-share/" + google-query: inurl:"/wp-content/plugins/bp-activity-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-activity-social-share,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-activity-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-activity-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-27610b5571a30e556b64bf5b8d096808.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-27610b5571a30e556b64bf5b8d096808.yaml new file mode 100644 index 0000000000..77c328ad54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-27610b5571a30e556b64bf5b8d096808.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-27610b5571a30e556b64bf5b8d096808 + +info: + name: > + Better Messages <= 1.9.9.148 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f67ce101-3b4f-45be-9aed-d9055cc09fd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9.148') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-453a8422f88d4cb86f0bfdbbb1968f0b.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-453a8422f88d4cb86f0bfdbbb1968f0b.yaml new file mode 100644 index 0000000000..e2706afbaa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-453a8422f88d4cb86f0bfdbbb1968f0b.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-453a8422f88d4cb86f0bfdbbb1968f0b + +info: + name: > + BP Better Messages <= 1.9.9.37 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c322841a-4134-4c21-8028-0ccacd46335b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-83e4f665f1af2e601634717e68062856.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-83e4f665f1af2e601634717e68062856.yaml new file mode 100644 index 0000000000..8404b5946c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-83e4f665f1af2e601634717e68062856.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-83e4f665f1af2e601634717e68062856 + +info: + name: > + Better Messages <= 1.9.9.148 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e34ec7-eeb2-4966-bac3-c7d4723355d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9.148') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-aa4a0e71714152916ddf88945c46dfa0.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-aa4a0e71714152916ddf88945c46dfa0.yaml new file mode 100644 index 0000000000..d7a8a772a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-aa4a0e71714152916ddf88945c46dfa0.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-aa4a0e71714152916ddf88945c46dfa0 + +info: + name: > + BP Better Messages <= 1.9.9.37 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb89a16c-fae0-4d36-85aa-79beab753cba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9fed75c305 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9.170') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-b9ebb0412655a1be395c1fd4d44393e3.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-b9ebb0412655a1be395c1fd4d44393e3.yaml new file mode 100644 index 0000000000..0a24ec4e48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-b9ebb0412655a1be395c1fd4d44393e3.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-b9ebb0412655a1be395c1fd4d44393e3 + +info: + name: > + BP Better Messages <= 2.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4ccc7f8-c8e0-457a-b437-2a23530a9df4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-bcaba1132a8ac1a695b97d03ca9be0db.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-bcaba1132a8ac1a695b97d03ca9be0db.yaml new file mode 100644 index 0000000000..05ec87924c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-bcaba1132a8ac1a695b97d03ca9be0db.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-bcaba1132a8ac1a695b97d03ca9be0db + +info: + name: > + BP Better Messages <= 2.4.32 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e6327b0-a047-4f8c-8e95-88f2e4b7089f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-c908fd3552b679e573e25a7e48dd7e10.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-c908fd3552b679e573e25a7e48dd7e10.yaml new file mode 100644 index 0000000000..e84f25ba6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-c908fd3552b679e573e25a7e48dd7e10.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-c908fd3552b679e573e25a7e48dd7e10 + +info: + name: > + Better Messages <= 1.9.10.68 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70f2965a-37fe-4b7e-890a-9bf73b5de1c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.10.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-cf8da83f0f83eb1a574fe335e5527411.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-cf8da83f0f83eb1a574fe335e5527411.yaml new file mode 100644 index 0000000000..f7c96e9b7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-cf8da83f0f83eb1a574fe335e5527411.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-cf8da83f0f83eb1a574fe335e5527411 + +info: + name: > + Better Messages <= 1.9.10.68 - Authorization Bypass to Blocking Control Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e7f310e-1e10-44dd-9928-23e63af21fef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.10.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-better-messages-e17bce1a8a59b23cca6c3786e7d0e9d3.yaml b/nuclei-templates/cve-less/plugins/bp-better-messages-e17bce1a8a59b23cca6c3786e7d0e9d3.yaml new file mode 100644 index 0000000000..be96eb85d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-better-messages-e17bce1a8a59b23cca6c3786e7d0e9d3.yaml @@ -0,0 +1,58 @@ +id: bp-better-messages-e17bce1a8a59b23cca6c3786e7d0e9d3 + +info: + name: > + Better Messages <= 1.9.10.57 - Resource Exhaustion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68fee8cb-476d-4962-b830-59fd823329ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-better-messages/" + google-query: inurl:"/wp-content/plugins/bp-better-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-better-messages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-better-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-better-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.10.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-check-in-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/bp-check-in-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..a53ab33302 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-check-in-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: bp-check-in-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-check-in/" + google-query: inurl:"/wp-content/plugins/bp-check-in/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-check-in,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-check-in/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-check-in" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-create-group-type-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/bp-create-group-type-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..aa85089ff8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-create-group-type-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: bp-create-group-type-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-create-group-type/" + google-query: inurl:"/wp-content/plugins/bp-create-group-type/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-create-group-type,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-create-group-type/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-create-group-type" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-gallery-6cdf919648d82bb79f7fd259426a9e61.yaml b/nuclei-templates/cve-less/plugins/bp-gallery-6cdf919648d82bb79f7fd259426a9e61.yaml new file mode 100644 index 0000000000..7aa742e450 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-gallery-6cdf919648d82bb79f7fd259426a9e61.yaml @@ -0,0 +1,58 @@ +id: bp-gallery-6cdf919648d82bb79f7fd259426a9e61 + +info: + name: > + BuddyPress BP Gallery Plus <= 1.2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98527ebf-26a3-4900-84b5-3d2245783e8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-gallery/" + google-query: inurl:"/wp-content/plugins/bp-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-group-documents-2954406cfff461fdbbd41cca0f0b5dbf.yaml b/nuclei-templates/cve-less/plugins/bp-group-documents-2954406cfff461fdbbd41cca0f0b5dbf.yaml new file mode 100644 index 0000000000..f55fa3f882 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-group-documents-2954406cfff461fdbbd41cca0f0b5dbf.yaml @@ -0,0 +1,58 @@ +id: bp-group-documents-2954406cfff461fdbbd41cca0f0b5dbf + +info: + name: > + BP Group Documents <= 1.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db761098-e76a-4be8-8b3d-ec964ecbc01c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-group-documents/" + google-query: inurl:"/wp-content/plugins/bp-group-documents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-group-documents,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-group-documents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-group-documents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-group-documents-377c33087f53eb5bcffb99a599fdc127.yaml b/nuclei-templates/cve-less/plugins/bp-group-documents-377c33087f53eb5bcffb99a599fdc127.yaml new file mode 100644 index 0000000000..9fbb4f8e84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-group-documents-377c33087f53eb5bcffb99a599fdc127.yaml @@ -0,0 +1,58 @@ +id: bp-group-documents-377c33087f53eb5bcffb99a599fdc127 + +info: + name: > + BP Group Documents <= 1.2.1 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d7b8570-96d2-46dc-983c-3933c3fd74cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-group-documents/" + google-query: inurl:"/wp-content/plugins/bp-group-documents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-group-documents,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-group-documents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-group-documents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-group-documents-37fef8959e103795e5217ab4860bd85a.yaml b/nuclei-templates/cve-less/plugins/bp-group-documents-37fef8959e103795e5217ab4860bd85a.yaml new file mode 100644 index 0000000000..b27789d145 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-group-documents-37fef8959e103795e5217ab4860bd85a.yaml @@ -0,0 +1,58 @@ +id: bp-group-documents-37fef8959e103795e5217ab4860bd85a + +info: + name: > + BP Group Documents <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8714f5cc-56c7-4976-b021-956883a2bc73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-group-documents/" + google-query: inurl:"/wp-content/plugins/bp-group-documents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-group-documents,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-group-documents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-group-documents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-group-documents-3a30cbb34610b918136a671069241bbf.yaml b/nuclei-templates/cve-less/plugins/bp-group-documents-3a30cbb34610b918136a671069241bbf.yaml new file mode 100644 index 0000000000..82626261a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-group-documents-3a30cbb34610b918136a671069241bbf.yaml @@ -0,0 +1,58 @@ +id: bp-group-documents-3a30cbb34610b918136a671069241bbf + +info: + name: > + BP Group Documents <= 1.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb299b03-a176-43b3-beca-944c32a5af49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-group-documents/" + google-query: inurl:"/wp-content/plugins/bp-group-documents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-group-documents,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-group-documents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-group-documents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-job-manager-integration-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/bp-job-manager-integration-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..893a362c75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-job-manager-integration-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: bp-job-manager-integration-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-job-manager-integration/" + google-query: inurl:"/wp-content/plugins/bp-job-manager-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-job-manager-integration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-job-manager-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-job-manager-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-profile-search-7be20794431b31f1b6e43bd0f8a27ca0.yaml b/nuclei-templates/cve-less/plugins/bp-profile-search-7be20794431b31f1b6e43bd0f8a27ca0.yaml new file mode 100644 index 0000000000..77ea84b4ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-profile-search-7be20794431b31f1b6e43bd0f8a27ca0.yaml @@ -0,0 +1,58 @@ +id: bp-profile-search-7be20794431b31f1b6e43bd0f8a27ca0 + +info: + name: > + BP Profile Search <= 4.5.3 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d0c144b-609b-4b4a-bfb2-de38b5969a9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-profile-search/" + google-query: inurl:"/wp-content/plugins/bp-profile-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-profile-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-profile-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-profile-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-profile-search-8abf5a60713230c7b3ea5764184f876d.yaml b/nuclei-templates/cve-less/plugins/bp-profile-search-8abf5a60713230c7b3ea5764184f876d.yaml new file mode 100644 index 0000000000..92b37b9596 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-profile-search-8abf5a60713230c7b3ea5764184f876d.yaml @@ -0,0 +1,58 @@ +id: bp-profile-search-8abf5a60713230c7b3ea5764184f876d + +info: + name: > + BP Profile Search <= 5.5 - Reflected Cross-Site Scripting via BPS_FORM + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8051fb03-7c38-4902-bbff-049c270d2be2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-profile-search/" + google-query: inurl:"/wp-content/plugins/bp-profile-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-profile-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-profile-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-profile-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-profile-shortcodes-extra-1c0f40dcfb4caae9a4327cd7172a7b18.yaml b/nuclei-templates/cve-less/plugins/bp-profile-shortcodes-extra-1c0f40dcfb4caae9a4327cd7172a7b18.yaml new file mode 100644 index 0000000000..77b9fc4786 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-profile-shortcodes-extra-1c0f40dcfb4caae9a4327cd7172a7b18.yaml @@ -0,0 +1,58 @@ +id: bp-profile-shortcodes-extra-1c0f40dcfb4caae9a4327cd7172a7b18 + +info: + name: > + BP Profile Shortcodes Extra <= 2.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea9eaca6-3441-4976-8556-0ce288d1a0c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-profile-shortcodes-extra/" + google-query: inurl:"/wp-content/plugins/bp-profile-shortcodes-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-profile-shortcodes-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-profile-shortcodes-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-profile-shortcodes-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-social-connect-93264bce58bf86815d047dde89423fc8.yaml b/nuclei-templates/cve-less/plugins/bp-social-connect-93264bce58bf86815d047dde89423fc8.yaml new file mode 100644 index 0000000000..d7de85bde8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-social-connect-93264bce58bf86815d047dde89423fc8.yaml @@ -0,0 +1,58 @@ +id: bp-social-connect-93264bce58bf86815d047dde89423fc8 + +info: + name: > + BP Social Connect <= 1.5 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44c96df2-530a-4ebe-b722-c606a7b135f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-social-connect/" + google-query: inurl:"/wp-content/plugins/bp-social-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-social-connect,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-social-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-social-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bp-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bb8ed375fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bp-toolkit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-toolkit/" + google-query: inurl:"/wp-content/plugins/bp-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-user-profile-reviews-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/bp-user-profile-reviews-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..fe9a45fb7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-user-profile-reviews-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: bp-user-profile-reviews-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-user-profile-reviews/" + google-query: inurl:"/wp-content/plugins/bp-user-profile-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-user-profile-reviews,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-user-profile-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-user-profile-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bp-user-to-do-list-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/bp-user-to-do-list-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..8b6d67e3b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bp-user-to-do-list-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: bp-user-to-do-list-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bp-user-to-do-list/" + google-query: inurl:"/wp-content/plugins/bp-user-to-do-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bp-user-to-do-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bp-user-to-do-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bp-user-to-do-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bpcustomerio-25ee6eba4f05265a07353f4c20de2e87.yaml b/nuclei-templates/cve-less/plugins/bpcustomerio-25ee6eba4f05265a07353f4c20de2e87.yaml new file mode 100644 index 0000000000..e310a72b5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bpcustomerio-25ee6eba4f05265a07353f4c20de2e87.yaml @@ -0,0 +1,58 @@ +id: bpcustomerio-25ee6eba4f05265a07353f4c20de2e87 + +info: + name: > + BuddyPress Customer.io Analytics Integration <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b910b678-5869-43e6-8993-fcf53fe4c66f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bpcustomerio/" + google-query: inurl:"/wp-content/plugins/bpcustomerio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bpcustomerio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bpcustomerio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bpcustomerio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bradesco-gateway-3dc139e568d48b3719f09d74e5c6ac5a.yaml b/nuclei-templates/cve-less/plugins/bradesco-gateway-3dc139e568d48b3719f09d74e5c6ac5a.yaml new file mode 100644 index 0000000000..ce27cc3368 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bradesco-gateway-3dc139e568d48b3719f09d74e5c6ac5a.yaml @@ -0,0 +1,58 @@ +id: bradesco-gateway-3dc139e568d48b3719f09d74e5c6ac5a + +info: + name: > + Bradesco Gateway <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d2d22bb-e29e-4d4b-a97d-e128777712b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bradesco-gateway/" + google-query: inurl:"/wp-content/plugins/bradesco-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bradesco-gateway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bradesco-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bradesco-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/braftonwordpressplugin-421b45189c95e21b02ed0def677eee30.yaml b/nuclei-templates/cve-less/plugins/braftonwordpressplugin-421b45189c95e21b02ed0def677eee30.yaml new file mode 100644 index 0000000000..569dc1dd42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/braftonwordpressplugin-421b45189c95e21b02ed0def677eee30.yaml @@ -0,0 +1,58 @@ +id: braftonwordpressplugin-421b45189c95e21b02ed0def677eee30 + +info: + name: > + Brafton < 3.4.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12263ca7-41d8-4ef2-b644-ddfcae8c9665?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/BraftonWordpressPlugin/" + google-query: inurl:"/wp-content/plugins/BraftonWordpressPlugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,BraftonWordpressPlugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/BraftonWordpressPlugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "BraftonWordpressPlugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/branda-white-labeling-5394ed5bbbdcf7b65cff8921a9a68e7e.yaml b/nuclei-templates/cve-less/plugins/branda-white-labeling-5394ed5bbbdcf7b65cff8921a9a68e7e.yaml new file mode 100644 index 0000000000..9d2f03eddf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/branda-white-labeling-5394ed5bbbdcf7b65cff8921a9a68e7e.yaml @@ -0,0 +1,58 @@ +id: branda-white-labeling-5394ed5bbbdcf7b65cff8921a9a68e7e + +info: + name: > + Branda – White Label WordPress <= 3.4.8.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3508b46-6920-48b9-9acb-620ea34e07e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/branda-white-labeling/" + google-query: inurl:"/wp-content/plugins/branda-white-labeling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,branda-white-labeling,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/branda-white-labeling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "branda-white-labeling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/branda-white-labeling-7c37f00fa8e3ffb07ac6ec246eebe54b.yaml b/nuclei-templates/cve-less/plugins/branda-white-labeling-7c37f00fa8e3ffb07ac6ec246eebe54b.yaml new file mode 100644 index 0000000000..0051a8e883 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/branda-white-labeling-7c37f00fa8e3ffb07ac6ec246eebe54b.yaml @@ -0,0 +1,58 @@ +id: branda-white-labeling-7c37f00fa8e3ffb07ac6ec246eebe54b + +info: + name: > + Branda <= 3.4.14 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/552bc1cc-df98-4608-a50e-db1381ca8e0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/branda-white-labeling/" + google-query: inurl:"/wp-content/plugins/branda-white-labeling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,branda-white-labeling,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/branda-white-labeling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "branda-white-labeling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/branded-social-images-296dca83f7d30b213a3d42f8baefd9aa.yaml b/nuclei-templates/cve-less/plugins/branded-social-images-296dca83f7d30b213a3d42f8baefd9aa.yaml new file mode 100644 index 0000000000..5eeea8a5ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/branded-social-images-296dca83f7d30b213a3d42f8baefd9aa.yaml @@ -0,0 +1,58 @@ +id: branded-social-images-296dca83f7d30b213a3d42f8baefd9aa + +info: + name: > + Branded Social Images <= 1.1.0 - Missing Authorization leading to Unauthenticated Plugin Settings Updates + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cbc0b70-c8a4-4924-a67f-cea81ab19cdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/branded-social-images/" + google-query: inurl:"/wp-content/plugins/branded-social-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,branded-social-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/branded-social-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "branded-social-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brandfolder-05453cda2259f2ed6f2379bbfd9d67f2.yaml b/nuclei-templates/cve-less/plugins/brandfolder-05453cda2259f2ed6f2379bbfd9d67f2.yaml new file mode 100644 index 0000000000..a9a77e475d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brandfolder-05453cda2259f2ed6f2379bbfd9d67f2.yaml @@ -0,0 +1,58 @@ +id: brandfolder-05453cda2259f2ed6f2379bbfd9d67f2 + +info: + name: > + Brandfolder – Digital Asset Management Simplified. < 3.0.1 - Local/Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/240cc19a-9bae-4e69-a16f-46901daaa945?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brandfolder/" + google-query: inurl:"/wp-content/plugins/brandfolder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brandfolder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brandfolder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brandfolder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brands-for-woocommerce-3bc18921bc6f3f90e04d9001cf0b809e.yaml b/nuclei-templates/cve-less/plugins/brands-for-woocommerce-3bc18921bc6f3f90e04d9001cf0b809e.yaml new file mode 100644 index 0000000000..eaeae51a86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brands-for-woocommerce-3bc18921bc6f3f90e04d9001cf0b809e.yaml @@ -0,0 +1,58 @@ +id: brands-for-woocommerce-3bc18921bc6f3f90e04d9001cf0b809e + +info: + name: > + Brands for WooCommerce <= 3.8.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/996dc1d7-12f8-467d-bf48-a7a82f1c0a41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brands-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/brands-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brands-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brands-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brands-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brands-for-woocommerce-558e7a9aa7fa3c2ac2fdb51e4f62875d.yaml b/nuclei-templates/cve-less/plugins/brands-for-woocommerce-558e7a9aa7fa3c2ac2fdb51e4f62875d.yaml new file mode 100644 index 0000000000..c8c31e5915 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brands-for-woocommerce-558e7a9aa7fa3c2ac2fdb51e4f62875d.yaml @@ -0,0 +1,58 @@ +id: brands-for-woocommerce-558e7a9aa7fa3c2ac2fdb51e4f62875d + +info: + name: > + Brands for WooCommerce <= 3.7.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b6dc426-7066-46fb-886a-0bf005829abf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brands-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/brands-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brands-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brands-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brands-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brands-for-woocommerce-825f1e0aa5ff97544f2d8803cf6504ca.yaml b/nuclei-templates/cve-less/plugins/brands-for-woocommerce-825f1e0aa5ff97544f2d8803cf6504ca.yaml new file mode 100644 index 0000000000..496e3d9c95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brands-for-woocommerce-825f1e0aa5ff97544f2d8803cf6504ca.yaml @@ -0,0 +1,58 @@ +id: brands-for-woocommerce-825f1e0aa5ff97544f2d8803cf6504ca + +info: + name: > + Brands for WooCommerce <= 3.8.2.2 - Missing Authorization to Unauthenticated Order Manipulation and Information Retrieval + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7afbe2b-72a8-40da-bc94-ff2a1b9569b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brands-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/brands-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brands-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brands-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brands-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brands-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/brands-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..fe37819bea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brands-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: brands-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brands-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/brands-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brands-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brands-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brands-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brave-popup-builder-997d1000e8574991f2c13cb7aa2ef7b7.yaml b/nuclei-templates/cve-less/plugins/brave-popup-builder-997d1000e8574991f2c13cb7aa2ef7b7.yaml new file mode 100644 index 0000000000..6fb36d8279 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brave-popup-builder-997d1000e8574991f2c13cb7aa2ef7b7.yaml @@ -0,0 +1,58 @@ +id: brave-popup-builder-997d1000e8574991f2c13cb7aa2ef7b7 + +info: + name: > + Brave Popup Builder <= 0.6.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88cf21c3-52d7-472f-8f55-8e1a5819f133?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brave-popup-builder/" + google-query: inurl:"/wp-content/plugins/brave-popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brave-popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brave-popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brave-popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brave-popup-builder-9cb937babec24c7a5f1e798bac3533ef.yaml b/nuclei-templates/cve-less/plugins/brave-popup-builder-9cb937babec24c7a5f1e798bac3533ef.yaml new file mode 100644 index 0000000000..034a9818a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brave-popup-builder-9cb937babec24c7a5f1e798bac3533ef.yaml @@ -0,0 +1,58 @@ +id: brave-popup-builder-9cb937babec24c7a5f1e798bac3533ef + +info: + name: > + Brave Popup Builder <= 0.6.5 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9511f60-b07d-4601-aa2f-25083b24d9aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brave-popup-builder/" + google-query: inurl:"/wp-content/plugins/brave-popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brave-popup-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brave-popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brave-popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bravo-translate-ce76e5efada5037a3e4a2325d3d70d7f.yaml b/nuclei-templates/cve-less/plugins/bravo-translate-ce76e5efada5037a3e4a2325d3d70d7f.yaml new file mode 100644 index 0000000000..e27f8f2774 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bravo-translate-ce76e5efada5037a3e4a2325d3d70d7f.yaml @@ -0,0 +1,58 @@ +id: bravo-translate-ce76e5efada5037a3e4a2325d3d70d7f + +info: + name: > + Bravo Translate <= 1.2 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f256518c-9a3e-4e6e-8d49-d309e397c14d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bravo-translate/" + google-query: inurl:"/wp-content/plugins/bravo-translate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bravo-translate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bravo-translate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bravo-translate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breadcrumb-27fbae7541522bd11e17939b8913ef50.yaml b/nuclei-templates/cve-less/plugins/breadcrumb-27fbae7541522bd11e17939b8913ef50.yaml new file mode 100644 index 0000000000..2deef2888d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breadcrumb-27fbae7541522bd11e17939b8913ef50.yaml @@ -0,0 +1,58 @@ +id: breadcrumb-27fbae7541522bd11e17939b8913ef50 + +info: + name: > + Breadcrumb <= 1.5.32 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee396f94-8934-47db-9bc8-783a2b20f427?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breadcrumb/" + google-query: inurl:"/wp-content/plugins/breadcrumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breadcrumb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breadcrumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breadcrumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breadcrumb-navxt-32e0114d44072a3612b1116316fc4009.yaml b/nuclei-templates/cve-less/plugins/breadcrumb-navxt-32e0114d44072a3612b1116316fc4009.yaml new file mode 100644 index 0000000000..e0cb6e1a5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breadcrumb-navxt-32e0114d44072a3612b1116316fc4009.yaml @@ -0,0 +1,58 @@ +id: breadcrumb-navxt-32e0114d44072a3612b1116316fc4009 + +info: + name: > + Breadcrumb NavXT <= 6.1.0 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f3c556d-8baf-4d75-a331-51b76ee084ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breadcrumb-navxt/" + google-query: inurl:"/wp-content/plugins/breadcrumb-navxt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breadcrumb-navxt,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breadcrumb-navxt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breadcrumb-navxt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breadcrumb-simple-8507164d3055217cb96ce83c182ad6aa.yaml b/nuclei-templates/cve-less/plugins/breadcrumb-simple-8507164d3055217cb96ce83c182ad6aa.yaml new file mode 100644 index 0000000000..4b8aa045cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breadcrumb-simple-8507164d3055217cb96ce83c182ad6aa.yaml @@ -0,0 +1,58 @@ +id: breadcrumb-simple-8507164d3055217cb96ce83c182ad6aa + +info: + name: > + breadcrumb simple <= 1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/598e38d7-b5a9-43c1-b908-dab8bbe24115?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breadcrumb-simple/" + google-query: inurl:"/wp-content/plugins/breadcrumb-simple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breadcrumb-simple,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breadcrumb-simple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breadcrumb-simple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breadcrumbs-by-menu-49ba2e496df198082592a83af2dd4d61.yaml b/nuclei-templates/cve-less/plugins/breadcrumbs-by-menu-49ba2e496df198082592a83af2dd4d61.yaml new file mode 100644 index 0000000000..abfff57b23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breadcrumbs-by-menu-49ba2e496df198082592a83af2dd4d61.yaml @@ -0,0 +1,58 @@ +id: breadcrumbs-by-menu-49ba2e496df198082592a83af2dd4d61 + +info: + name: > + Breadcrumbs by menu <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d189baf-e0d4-4b23-91b8-0c802941b982?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breadcrumbs-by-menu/" + google-query: inurl:"/wp-content/plugins/breadcrumbs-by-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breadcrumbs-by-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breadcrumbs-by-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breadcrumbs-by-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breadcrumbs-by-menu-d4f39f41edde6809c1e3f1995c35c774.yaml b/nuclei-templates/cve-less/plugins/breadcrumbs-by-menu-d4f39f41edde6809c1e3f1995c35c774.yaml new file mode 100644 index 0000000000..96ceddb16a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breadcrumbs-by-menu-d4f39f41edde6809c1e3f1995c35c774.yaml @@ -0,0 +1,58 @@ +id: breadcrumbs-by-menu-d4f39f41edde6809c1e3f1995c35c774 + +info: + name: > + Breadcrumbs by menu < 1.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0694b4f7-c28d-4456-8157-d20446790f3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breadcrumbs-by-menu/" + google-query: inurl:"/wp-content/plugins/breadcrumbs-by-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breadcrumbs-by-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breadcrumbs-by-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breadcrumbs-by-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breadcrumbs-shortcode-47b99e01cae37cb070ef3a81700bf8b1.yaml b/nuclei-templates/cve-less/plugins/breadcrumbs-shortcode-47b99e01cae37cb070ef3a81700bf8b1.yaml new file mode 100644 index 0000000000..db3380c3b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breadcrumbs-shortcode-47b99e01cae37cb070ef3a81700bf8b1.yaml @@ -0,0 +1,58 @@ +id: breadcrumbs-shortcode-47b99e01cae37cb070ef3a81700bf8b1 + +info: + name: > + Breadcrumbs Shortcode <= 1.44 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/986957ab-7394-457e-9a6f-f6b96b56cd15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breadcrumbs-shortcode/" + google-query: inurl:"/wp-content/plugins/breadcrumbs-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breadcrumbs-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breadcrumbs-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breadcrumbs-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breakdance-b2885ea30200f7cd94ec6f28c25609a5.yaml b/nuclei-templates/cve-less/plugins/breakdance-b2885ea30200f7cd94ec6f28c25609a5.yaml new file mode 100644 index 0000000000..1b212f0508 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breakdance-b2885ea30200f7cd94ec6f28c25609a5.yaml @@ -0,0 +1,58 @@ +id: breakdance-b2885ea30200f7cd94ec6f28c25609a5 + +info: + name: > + Breakdance <= 1.7.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via custom postmeta + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e92a0387-bd09-46d3-9f6c-09f701b9e550?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breakdance/" + google-query: inurl:"/wp-content/plugins/breakdance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breakdance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breakdance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breakdance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breakdance-f5d920633ee9565486368ab785adab3b.yaml b/nuclei-templates/cve-less/plugins/breakdance-f5d920633ee9565486368ab785adab3b.yaml new file mode 100644 index 0000000000..f1a28dfcb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breakdance-f5d920633ee9565486368ab785adab3b.yaml @@ -0,0 +1,58 @@ +id: breakdance-f5d920633ee9565486368ab785adab3b + +info: + name: > + Breakdance <= 1.7.1 - Authenticated (Contributor+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/095b23b7-71ab-41eb-b666-73df2e1a7eb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breakdance/" + google-query: inurl:"/wp-content/plugins/breakdance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breakdance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breakdance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breakdance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breeze-310b89b29fc26cf3b3da141667d5a42b.yaml b/nuclei-templates/cve-less/plugins/breeze-310b89b29fc26cf3b3da141667d5a42b.yaml new file mode 100644 index 0000000000..084c727575 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breeze-310b89b29fc26cf3b3da141667d5a42b.yaml @@ -0,0 +1,58 @@ +id: breeze-310b89b29fc26cf3b3da141667d5a42b + +info: + name: > + Breeze – WordPress Cache Plugin <= 2.0.2 - Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc045440-a8ca-40d3-b198-421b197e6928?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breeze/" + google-query: inurl:"/wp-content/plugins/breeze/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breeze,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breeze/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breeze" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breeze-59a7cb3ce7ab42429819a5af71285080.yaml b/nuclei-templates/cve-less/plugins/breeze-59a7cb3ce7ab42429819a5af71285080.yaml new file mode 100644 index 0000000000..957d90afe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breeze-59a7cb3ce7ab42429819a5af71285080.yaml @@ -0,0 +1,58 @@ +id: breeze-59a7cb3ce7ab42429819a5af71285080 + +info: + name: > + Breeze <= 2.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via breeze_api_token + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c56b1dca-3841-48df-837e-7973940e74e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breeze/" + google-query: inurl:"/wp-content/plugins/breeze/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breeze,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breeze/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breeze" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breeze-d2df0429a7a8c5673deb89d4cce4e2fc.yaml b/nuclei-templates/cve-less/plugins/breeze-d2df0429a7a8c5673deb89d4cce4e2fc.yaml new file mode 100644 index 0000000000..ebf07d92d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breeze-d2df0429a7a8c5673deb89d4cce4e2fc.yaml @@ -0,0 +1,58 @@ +id: breeze-d2df0429a7a8c5673deb89d4cce4e2fc + +info: + name: > + Breeze <= 2.0.8 - Cross-Site Request Forgery via import_json_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80192348-dcf4-4bab-80d1-ae7a4d194270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breeze/" + google-query: inurl:"/wp-content/plugins/breeze/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breeze,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breeze/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breeze" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/breezing-forms-f47477188afe1a9a9b869f9c5c6fafbb.yaml b/nuclei-templates/cve-less/plugins/breezing-forms-f47477188afe1a9a9b869f9c5c6fafbb.yaml new file mode 100644 index 0000000000..23cc955e77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/breezing-forms-f47477188afe1a9a9b869f9c5c6fafbb.yaml @@ -0,0 +1,58 @@ +id: breezing-forms-f47477188afe1a9a9b869f9c5c6fafbb + +info: + name: > + Breezing Forms <= 1.2.7.30 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da025593-ad11-4a48-97e1-d31c6f0e62ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/breezing-forms/" + google-query: inurl:"/wp-content/plugins/breezing-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,breezing-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/breezing-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "breezing-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bricksforge-08c2f711dab885b1524ebbd7b0782f00.yaml b/nuclei-templates/cve-less/plugins/bricksforge-08c2f711dab885b1524ebbd7b0782f00.yaml new file mode 100644 index 0000000000..d7200a474f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bricksforge-08c2f711dab885b1524ebbd7b0782f00.yaml @@ -0,0 +1,58 @@ +id: bricksforge-08c2f711dab885b1524ebbd7b0782f00 + +info: + name: > + Bricksforge <= 2.0.17 - Missing Authorization to Unauthenticated Arbitrary Email Sending + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/701a037d-bbd5-436d-bfc8-394c9dcf6bab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bricksforge/" + google-query: inurl:"/wp-content/plugins/bricksforge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bricksforge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bricksforge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bricksforge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bricksforge-20d94fa7cbaa795926bd10e9c360bcb7.yaml b/nuclei-templates/cve-less/plugins/bricksforge-20d94fa7cbaa795926bd10e9c360bcb7.yaml new file mode 100644 index 0000000000..248e876e54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bricksforge-20d94fa7cbaa795926bd10e9c360bcb7.yaml @@ -0,0 +1,58 @@ +id: bricksforge-20d94fa7cbaa795926bd10e9c360bcb7 + +info: + name: > + Bricksforge <= 2.0.17 - Missing Authorization to Unauthenticated WordPress Settings Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc82745a-f1d3-48fc-ba7b-3ff726edae34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bricksforge/" + google-query: inurl:"/wp-content/plugins/bricksforge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bricksforge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bricksforge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bricksforge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bricksforge-fe10205699bf88a71e4460031e80e0cf.yaml b/nuclei-templates/cve-less/plugins/bricksforge-fe10205699bf88a71e4460031e80e0cf.yaml new file mode 100644 index 0000000000..dfeb6e5b95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bricksforge-fe10205699bf88a71e4460031e80e0cf.yaml @@ -0,0 +1,58 @@ +id: bricksforge-fe10205699bf88a71e4460031e80e0cf + +info: + name: > + Bricksforge <= 2.0.17 - Missing Authorization to Unauthenticated WordPress Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73445d8f-1f9c-4ba7-9e3c-3e6221f3b23e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bricksforge/" + google-query: inurl:"/wp-content/plugins/bricksforge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bricksforge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bricksforge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bricksforge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bridge-core-3b4f016c7ae4d3dd29540472e7fdd513.yaml b/nuclei-templates/cve-less/plugins/bridge-core-3b4f016c7ae4d3dd29540472e7fdd513.yaml new file mode 100644 index 0000000000..0f23b1e636 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bridge-core-3b4f016c7ae4d3dd29540472e7fdd513.yaml @@ -0,0 +1,58 @@ +id: bridge-core-3b4f016c7ae4d3dd29540472e7fdd513 + +info: + name: > + Bridge Core <= 3.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc698c40-4a2b-4dab-93f0-647e4db79d2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bridge-core/" + google-query: inurl:"/wp-content/plugins/bridge-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bridge-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bridge-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bridge-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-223fd164cbed0be2e156fefd83517bf1.yaml b/nuclei-templates/cve-less/plugins/brizy-223fd164cbed0be2e156fefd83517bf1.yaml new file mode 100644 index 0000000000..de55361424 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-223fd164cbed0be2e156fefd83517bf1.yaml @@ -0,0 +1,58 @@ +id: brizy-223fd164cbed0be2e156fefd83517bf1 + +info: + name: > + Brizy Page Builder <= 2.4.18 - IP Address Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-22707a3d55e78cedf2f7dfb41d94bfbd.yaml b/nuclei-templates/cve-less/plugins/brizy-22707a3d55e78cedf2f7dfb41d94bfbd.yaml new file mode 100644 index 0000000000..003934df56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-22707a3d55e78cedf2f7dfb41d94bfbd.yaml @@ -0,0 +1,58 @@ +id: brizy-22707a3d55e78cedf2f7dfb41d94bfbd + +info: + name: > + Brizy Page Builder <= 2.4.1 - Authenticated Stored Cross-Site Scripting via Element URL + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f8f8378-676e-455a-aaad-b80c1a4dc717?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-2731966af274d5e5b3eb099c6bdc40aa.yaml b/nuclei-templates/cve-less/plugins/brizy-2731966af274d5e5b3eb099c6bdc40aa.yaml new file mode 100644 index 0000000000..d55fb2d2fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-2731966af274d5e5b3eb099c6bdc40aa.yaml @@ -0,0 +1,58 @@ +id: brizy-2731966af274d5e5b3eb099c6bdc40aa + +info: + name: > + Brizy < 1.0.126 - Authorization Bypass to Settings Updates + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9495e25d-a5a6-4f25-9363-783626e58a4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.126') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-2ea9b11139987a1bb9095ad4e4be45bc.yaml b/nuclei-templates/cve-less/plugins/brizy-2ea9b11139987a1bb9095ad4e4be45bc.yaml new file mode 100644 index 0000000000..ccc483a686 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-2ea9b11139987a1bb9095ad4e4be45bc.yaml @@ -0,0 +1,58 @@ +id: brizy-2ea9b11139987a1bb9095ad4e4be45bc + +info: + name: > + Brizy - Page Builder < 1.0.114 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba98a282-39ee-4a84-b988-ecfc0c4cd297?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.114') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-44eea350bc1338780b2a377c7a4acfdc.yaml b/nuclei-templates/cve-less/plugins/brizy-44eea350bc1338780b2a377c7a4acfdc.yaml new file mode 100644 index 0000000000..15f62de94e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-44eea350bc1338780b2a377c7a4acfdc.yaml @@ -0,0 +1,58 @@ +id: brizy-44eea350bc1338780b2a377c7a4acfdc + +info: + name: > + Brizy – Page Builder <= 2.4.40 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57dac6de-545f-49e5-9f45-d90a48d6b05f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-475d1ffae41ddc61dae5fe3b295751d5.yaml b/nuclei-templates/cve-less/plugins/brizy-475d1ffae41ddc61dae5fe3b295751d5.yaml new file mode 100644 index 0000000000..b03509b6ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-475d1ffae41ddc61dae5fe3b295751d5.yaml @@ -0,0 +1,58 @@ +id: brizy-475d1ffae41ddc61dae5fe3b295751d5 + +info: + name: > + Brizy Page Builder <= 2.4.1 - Authenticated Stored Cross-Site Scripting via Element Content + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f38fc5ed-d4e7-46a8-9983-9bf28444db99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-4f15003c85cf67398b6ba79713bb96a7.yaml b/nuclei-templates/cve-less/plugins/brizy-4f15003c85cf67398b6ba79713bb96a7.yaml new file mode 100644 index 0000000000..2d08f653b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-4f15003c85cf67398b6ba79713bb96a7.yaml @@ -0,0 +1,58 @@ +id: brizy-4f15003c85cf67398b6ba79713bb96a7 + +info: + name: > + Brizy – Page Builder <= 2.4.40 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e1008ad-daa9-4785-9dd5-4cdeb10d7e59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-51d48891356faa4b5ee750ea40af7e8d.yaml b/nuclei-templates/cve-less/plugins/brizy-51d48891356faa4b5ee750ea40af7e8d.yaml new file mode 100644 index 0000000000..27e7674627 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-51d48891356faa4b5ee750ea40af7e8d.yaml @@ -0,0 +1,58 @@ +id: brizy-51d48891356faa4b5ee750ea40af7e8d + +info: + name: > + Brizy - Page Builder <= 2.3.11 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8774f448-ba63-428c-8a82-b229718fdd10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-7310ba3269deb60929ca945cac8767e0.yaml b/nuclei-templates/cve-less/plugins/brizy-7310ba3269deb60929ca945cac8767e0.yaml new file mode 100644 index 0000000000..1c0a2489b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-7310ba3269deb60929ca945cac8767e0.yaml @@ -0,0 +1,58 @@ +id: brizy-7310ba3269deb60929ca945cac8767e0 + +info: + name: > + Brizy – Page Builder <= 2.4.40 - Authenticated (Contributor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc023c1b-7ec6-45b6-b50a-f0d823065843?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.4.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-7d6d564d16561c7bab08d495e46b51fb.yaml b/nuclei-templates/cve-less/plugins/brizy-7d6d564d16561c7bab08d495e46b51fb.yaml new file mode 100644 index 0000000000..ad9bf19f7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-7d6d564d16561c7bab08d495e46b51fb.yaml @@ -0,0 +1,58 @@ +id: brizy-7d6d564d16561c7bab08d495e46b51fb + +info: + name: > + Brizy – Page Builder <= 2.4.40 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb4b5165-35a6-47e9-922e-b244b0d006e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-827a8d5ffa28fd47c13e94e0a15edf68.yaml b/nuclei-templates/cve-less/plugins/brizy-827a8d5ffa28fd47c13e94e0a15edf68.yaml new file mode 100644 index 0000000000..9bbb73af66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-827a8d5ffa28fd47c13e94e0a15edf68.yaml @@ -0,0 +1,58 @@ +id: brizy-827a8d5ffa28fd47c13e94e0a15edf68 + +info: + name: > + Brizy Page Builder <= 2.3.11 - Incorrect Authorization Checks Allowing Post Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1161f41b-1594-4b1b-8a89-44a5a5a9dca6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.127', '<= 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-9ac7de23b3d67dbdcd278f6e1494759d.yaml b/nuclei-templates/cve-less/plugins/brizy-9ac7de23b3d67dbdcd278f6e1494759d.yaml new file mode 100644 index 0000000000..368b5ef93b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-9ac7de23b3d67dbdcd278f6e1494759d.yaml @@ -0,0 +1,58 @@ +id: brizy-9ac7de23b3d67dbdcd278f6e1494759d + +info: + name: > + Brizy <= 2.4.29 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/546cd218-3f6d-4e8f-83d5-e9aceb6f33ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-a5ce2d4f9e1b1bb323f57b01146d769b.yaml b/nuclei-templates/cve-less/plugins/brizy-a5ce2d4f9e1b1bb323f57b01146d769b.yaml new file mode 100644 index 0000000000..71cfe30e7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-a5ce2d4f9e1b1bb323f57b01146d769b.yaml @@ -0,0 +1,58 @@ +id: brizy-a5ce2d4f9e1b1bb323f57b01146d769b + +info: + name: > + Brizy Page Builder <= 2.3.11 - Authenticated File Upload and Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd56e59b-3879-4ab6-ae9a-7a301ee6aa20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brizy-a6227d9d923140efcf18978d7c277e53.yaml b/nuclei-templates/cve-less/plugins/brizy-a6227d9d923140efcf18978d7c277e53.yaml new file mode 100644 index 0000000000..73f3d4a8eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brizy-a6227d9d923140efcf18978d7c277e53.yaml @@ -0,0 +1,58 @@ +id: brizy-a6227d9d923140efcf18978d7c277e53 + +info: + name: > + Brizy – Page Builder <= 2.4.39 - Authenticated (Contributor+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7673b2ba-5d7a-4ae9-92e7-1a910687fdb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brizy/" + google-query: inurl:"/wp-content/plugins/brizy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brizy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brizy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brizy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-2c732f7d3e8ac28c93dbfa9cd10c3d81.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-2c732f7d3e8ac28c93dbfa9cd10c3d81.yaml new file mode 100644 index 0000000000..53e9de6fed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-2c732f7d3e8ac28c93dbfa9cd10c3d81.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-2c732f7d3e8ac28c93dbfa9cd10c3d81 + +info: + name: > + Broken Link Checker <= 2.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a374d8a-3754-4228-95ed-dc0ba1df40da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker/" + google-query: inurl:"/wp-content/plugins/broken-link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-3120d6067a3e5e251eec4212f4e5aeb5.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-3120d6067a3e5e251eec4212f4e5aeb5.yaml new file mode 100644 index 0000000000..16315fd8c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-3120d6067a3e5e251eec4212f4e5aeb5.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-3120d6067a3e5e251eec4212f4e5aeb5 + +info: + name: > + Broken Link Checker <= 1.10.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94d522bc-9808-435d-804d-e979a6c8be66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker/" + google-query: inurl:"/wp-content/plugins/broken-link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-4673047ca29ad4630d7b8bb30f727df8.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-4673047ca29ad4630d7b8bb30f727df8.yaml new file mode 100644 index 0000000000..655d28273a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-4673047ca29ad4630d7b8bb30f727df8.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-4673047ca29ad4630d7b8bb30f727df8 + +info: + name: > + Broken Link Checker < 1.10.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca6b7886-790a-4f00-855c-6dc913ea01db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker/" + google-query: inurl:"/wp-content/plugins/broken-link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-4787aca2f4649ac09a5532468944b982.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-4787aca2f4649ac09a5532468944b982.yaml new file mode 100644 index 0000000000..1bde49cc27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-4787aca2f4649ac09a5532468944b982.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-4787aca2f4649ac09a5532468944b982 + +info: + name: > + Broken Link Checker <= 1.11.16 - Authenticated (Admin+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62fd472e-208b-48db-8f98-3d935c7a678c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker/" + google-query: inurl:"/wp-content/plugins/broken-link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-64556376243051c6c3bc87690377ce32.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-64556376243051c6c3bc87690377ce32.yaml new file mode 100644 index 0000000000..dce01784da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-64556376243051c6c3bc87690377ce32.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-64556376243051c6c3bc87690377ce32 + +info: + name: > + Broken Link Checker <= 1.11.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58b59e65-420c-45f5-a34c-2d2003f4e3ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker/" + google-query: inurl:"/wp-content/plugins/broken-link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-a9a979661add0df60253539d4415e8c1.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-a9a979661add0df60253539d4415e8c1.yaml new file mode 100644 index 0000000000..f94ca4c92d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-a9a979661add0df60253539d4415e8c1.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-a9a979661add0df60253539d4415e8c1 + +info: + name: > + Broken Link Checker <= 1.11.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a7709fd-bb53-47a6-9fae-d5a6be513b39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker/" + google-query: inurl:"/wp-content/plugins/broken-link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-bada82132f6cbfd33d5760be8742a9cb.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-bada82132f6cbfd33d5760be8742a9cb.yaml new file mode 100644 index 0000000000..ee3e1417d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-bada82132f6cbfd33d5760be8742a9cb.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-bada82132f6cbfd33d5760be8742a9cb + +info: + name: > + Broken Link Checker <= 1.11.19 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9ee4f4e-5098-406c-b712-a2484180a07d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker/" + google-query: inurl:"/wp-content/plugins/broken-link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-e1d1d0387e0e80a55061f8f78f966bcd.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-e1d1d0387e0e80a55061f8f78f966bcd.yaml new file mode 100644 index 0000000000..f38b41c105 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-e1d1d0387e0e80a55061f8f78f966bcd.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-e1d1d0387e0e80a55061f8f78f966bcd + +info: + name: > + Broken Link Checker < 1.10.6 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a334947-296d-4f26-95e1-594487e8b6c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker/" + google-query: inurl:"/wp-content/plugins/broken-link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-checker-for-youtube-e58df3f9e159a90a2b75adb9058879da.yaml b/nuclei-templates/cve-less/plugins/broken-link-checker-for-youtube-e58df3f9e159a90a2b75adb9058879da.yaml new file mode 100644 index 0000000000..7bfd8857a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-checker-for-youtube-e58df3f9e159a90a2b75adb9058879da.yaml @@ -0,0 +1,58 @@ +id: broken-link-checker-for-youtube-e58df3f9e159a90a2b75adb9058879da + +info: + name: > + Broken Link Checker for YouTube <= 1.3 - Cross-Site Request Forgery via plugin_settings_page() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9993d84e-7337-4eda-af3c-039b6d8c8fe6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-checker-for-youtube/" + google-query: inurl:"/wp-content/plugins/broken-link-checker-for-youtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-checker-for-youtube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-checker-for-youtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-checker-for-youtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-finder-ae16dab4cf6e57b86cebb9a4da6eafa8.yaml b/nuclei-templates/cve-less/plugins/broken-link-finder-ae16dab4cf6e57b86cebb9a4da6eafa8.yaml new file mode 100644 index 0000000000..f477bcf30a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-finder-ae16dab4cf6e57b86cebb9a4da6eafa8.yaml @@ -0,0 +1,58 @@ +id: broken-link-finder-ae16dab4cf6e57b86cebb9a4da6eafa8 + +info: + name: > + Broken Link Checker | Finder <= 2.4.2 - Missing Authorization via moblc_auth_save_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4383f41-bd08-4fab-9491-4cf9f7326300?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-finder/" + google-query: inurl:"/wp-content/plugins/broken-link-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-finder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-finder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-manager-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml b/nuclei-templates/cve-less/plugins/broken-link-manager-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml new file mode 100644 index 0000000000..ca2b2c9aa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-manager-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml @@ -0,0 +1,58 @@ +id: broken-link-manager-0e68c0b9eccc4d13ea9a31e72c5947b1 + +info: + name: > + Broken Link Manager < 0.6.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7982828-bc67-48ee-be80-3203b081e29b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-manager/" + google-query: inurl:"/wp-content/plugins/broken-link-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-manager-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml b/nuclei-templates/cve-less/plugins/broken-link-manager-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml new file mode 100644 index 0000000000..600e774573 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-manager-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml @@ -0,0 +1,58 @@ +id: broken-link-manager-426b7dfdb8bc5b0834ad851cf8e9ecfc + +info: + name: > + Broken Link Manager <= 0.4.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bf67b6d-5e72-433d-9e41-9fdf8d99a3ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-manager/" + google-query: inurl:"/wp-content/plugins/broken-link-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-manager-47bfe206cfaf86d87b1c99f3c44195fd.yaml b/nuclei-templates/cve-less/plugins/broken-link-manager-47bfe206cfaf86d87b1c99f3c44195fd.yaml new file mode 100644 index 0000000000..9f223e5644 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-manager-47bfe206cfaf86d87b1c99f3c44195fd.yaml @@ -0,0 +1,58 @@ +id: broken-link-manager-47bfe206cfaf86d87b1c99f3c44195fd + +info: + name: > + Broken Link Manager <= 0.6.5 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05042006-aff6-4ba6-ae67-249dc0dcbb93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-manager/" + google-query: inurl:"/wp-content/plugins/broken-link-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/broken-link-manager-4d4a758d5270914e8644a21140cebd3a.yaml b/nuclei-templates/cve-less/plugins/broken-link-manager-4d4a758d5270914e8644a21140cebd3a.yaml new file mode 100644 index 0000000000..7edbb304a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/broken-link-manager-4d4a758d5270914e8644a21140cebd3a.yaml @@ -0,0 +1,58 @@ +id: broken-link-manager-4d4a758d5270914e8644a21140cebd3a + +info: + name: > + Broken Link Manager < 0.5.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b803ee40-733a-49bf-a134-406747541eb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/broken-link-manager/" + google-query: inurl:"/wp-content/plugins/broken-link-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,broken-link-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/broken-link-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broken-link-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/browser-and-operating-system-finder-48dead1c8e1154d67ccc9e390d285269.yaml b/nuclei-templates/cve-less/plugins/browser-and-operating-system-finder-48dead1c8e1154d67ccc9e390d285269.yaml new file mode 100644 index 0000000000..d2b738a50c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/browser-and-operating-system-finder-48dead1c8e1154d67ccc9e390d285269.yaml @@ -0,0 +1,58 @@ +id: browser-and-operating-system-finder-48dead1c8e1154d67ccc9e390d285269 + +info: + name: > + Browser and Operating System Finder <= 1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff6e6101-8ba5-4cc7-9b02-67a0d9a978b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/browser-and-operating-system-finder/" + google-query: inurl:"/wp-content/plugins/browser-and-operating-system-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,browser-and-operating-system-finder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/browser-and-operating-system-finder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "browser-and-operating-system-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/browser-and-operating-system-finder-99e41ed657ab27362dc617dd94edb65f.yaml b/nuclei-templates/cve-less/plugins/browser-and-operating-system-finder-99e41ed657ab27362dc617dd94edb65f.yaml new file mode 100644 index 0000000000..814014ba1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/browser-and-operating-system-finder-99e41ed657ab27362dc617dd94edb65f.yaml @@ -0,0 +1,58 @@ +id: browser-and-operating-system-finder-99e41ed657ab27362dc617dd94edb65f + +info: + name: > + Browser and Operating System Finder <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d10336c2-656f-40f7-a95a-dbf829c2ce38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/browser-and-operating-system-finder/" + google-query: inurl:"/wp-content/plugins/browser-and-operating-system-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,browser-and-operating-system-finder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/browser-and-operating-system-finder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "browser-and-operating-system-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/browser-shots-e8da5022574661b62f1a47c50584d384.yaml b/nuclei-templates/cve-less/plugins/browser-shots-e8da5022574661b62f1a47c50584d384.yaml new file mode 100644 index 0000000000..49dbcbbd4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/browser-shots-e8da5022574661b62f1a47c50584d384.yaml @@ -0,0 +1,58 @@ +id: browser-shots-e8da5022574661b62f1a47c50584d384 + +info: + name: > + Browser Screenshots < 1.7.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fc1e720-46ba-4f57-8694-551936371e2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/browser-shots/" + google-query: inurl:"/wp-content/plugins/browser-shots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,browser-shots,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/browser-shots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "browser-shots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/browser-theme-color-b6c60215d191e78bbb1469004f73341c.yaml b/nuclei-templates/cve-less/plugins/browser-theme-color-b6c60215d191e78bbb1469004f73341c.yaml new file mode 100644 index 0000000000..4f4477c706 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/browser-theme-color-b6c60215d191e78bbb1469004f73341c.yaml @@ -0,0 +1,58 @@ +id: browser-theme-color-b6c60215d191e78bbb1469004f73341c + +info: + name: > + Browser Theme Color <= 1.3 - Cross-Site Request Forgery via btc_settings_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef4c6f76-4d3e-4ab0-9e12-1df55a8edae5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/browser-theme-color/" + google-query: inurl:"/wp-content/plugins/browser-theme-color/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,browser-theme-color,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/browser-theme-color/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "browser-theme-color" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brute-force-login-protection-48e518f6131232316ecd7bce4c25cf68.yaml b/nuclei-templates/cve-less/plugins/brute-force-login-protection-48e518f6131232316ecd7bce4c25cf68.yaml new file mode 100644 index 0000000000..9936009f24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brute-force-login-protection-48e518f6131232316ecd7bce4c25cf68.yaml @@ -0,0 +1,58 @@ +id: brute-force-login-protection-48e518f6131232316ecd7bce4c25cf68 + +info: + name: > + Brute Force Login Protection <= 1.5.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2d46ac3-6751-475d-8d91-eabbc27a6295?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brute-force-login-protection/" + google-query: inurl:"/wp-content/plugins/brute-force-login-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brute-force-login-protection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brute-force-login-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brute-force-login-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/brutebank-dbb7d441461d213063eb891cf460c431.yaml b/nuclei-templates/cve-less/plugins/brutebank-dbb7d441461d213063eb891cf460c431.yaml new file mode 100644 index 0000000000..56dc59c39f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/brutebank-dbb7d441461d213063eb891cf460c431.yaml @@ -0,0 +1,58 @@ +id: brutebank-dbb7d441461d213063eb891cf460c431 + +info: + name: > + BruteBank - WP Security & Firewall <= 1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef0dc868-f617-408f-9333-ebfee4897701?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/brutebank/" + google-query: inurl:"/wp-content/plugins/brutebank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,brutebank,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/brutebank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brutebank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bs-shortcode-ultimate-c6a7ed723d2b968d4f9df70823302086.yaml b/nuclei-templates/cve-less/plugins/bs-shortcode-ultimate-c6a7ed723d2b968d4f9df70823302086.yaml new file mode 100644 index 0000000000..748d478c38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bs-shortcode-ultimate-c6a7ed723d2b968d4f9df70823302086.yaml @@ -0,0 +1,58 @@ +id: bs-shortcode-ultimate-c6a7ed723d2b968d4f9df70823302086 + +info: + name: > + Bootstrap Shortcodes Ultimate <= 4.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e93efec-371c-4050-b24b-e5e978059549?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bs-shortcode-ultimate/" + google-query: inurl:"/wp-content/plugins/bs-shortcode-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bs-shortcode-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bs-shortcode-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bs-shortcode-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsi-hotel-pro-bfcbe695fa101c3e16c8d87ef093b6cf.yaml b/nuclei-templates/cve-less/plugins/bsi-hotel-pro-bfcbe695fa101c3e16c8d87ef093b6cf.yaml new file mode 100644 index 0000000000..f98415fdf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsi-hotel-pro-bfcbe695fa101c3e16c8d87ef093b6cf.yaml @@ -0,0 +1,58 @@ +id: bsi-hotel-pro-bfcbe695fa101c3e16c8d87ef093b6cf + +info: + name: > + Online Hotel Booking System Pro <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7f947ee-6bb0-455f-9824-effa1164c7b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsi-hotel-pro/" + google-query: inurl:"/wp-content/plugins/bsi-hotel-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsi-hotel-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsi-hotel-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsi-hotel-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsk-contact-form-7-blacklist-ad738a9e4dada70c7860d495c6a31281.yaml b/nuclei-templates/cve-less/plugins/bsk-contact-form-7-blacklist-ad738a9e4dada70c7860d495c6a31281.yaml new file mode 100644 index 0000000000..0a51a3a7a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsk-contact-form-7-blacklist-ad738a9e4dada70c7860d495c6a31281.yaml @@ -0,0 +1,58 @@ +id: bsk-contact-form-7-blacklist-ad738a9e4dada70c7860d495c6a31281 + +info: + name: > + BSK Contact Form 7 Blacklist <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e27b0a8-e052-49ed-8744-a2376aa386f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsk-contact-form-7-blacklist/" + google-query: inurl:"/wp-content/plugins/bsk-contact-form-7-blacklist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsk-contact-form-7-blacklist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsk-contact-form-7-blacklist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsk-contact-form-7-blacklist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsk-gravityforms-blacklist-9d98910f079017bb745e5dfdd7b3a383.yaml b/nuclei-templates/cve-less/plugins/bsk-gravityforms-blacklist-9d98910f079017bb745e5dfdd7b3a383.yaml new file mode 100644 index 0000000000..a370d9c498 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsk-gravityforms-blacklist-9d98910f079017bb745e5dfdd7b3a383.yaml @@ -0,0 +1,58 @@ +id: bsk-gravityforms-blacklist-9d98910f079017bb745e5dfdd7b3a383 + +info: + name: > + BSK Forms Blacklist <= 3.6.2 - Authenticated (Administrator+) SQL Injection via 'order' and 'orderby' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4550681f-d115-4451-9839-7862b84714fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsk-gravityforms-blacklist/" + google-query: inurl:"/wp-content/plugins/bsk-gravityforms-blacklist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsk-gravityforms-blacklist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsk-gravityforms-blacklist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsk-gravityforms-blacklist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsk-gravityforms-blacklist-e0096662f4021341254048a6332cbd3c.yaml b/nuclei-templates/cve-less/plugins/bsk-gravityforms-blacklist-e0096662f4021341254048a6332cbd3c.yaml new file mode 100644 index 0000000000..ec672a670f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsk-gravityforms-blacklist-e0096662f4021341254048a6332cbd3c.yaml @@ -0,0 +1,58 @@ +id: bsk-gravityforms-blacklist-e0096662f4021341254048a6332cbd3c + +info: + name: > + BSK Forms Blacklist <= 3.6.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8283a502-6fb8-43ff-8f46-8afbfdbb22f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsk-gravityforms-blacklist/" + google-query: inurl:"/wp-content/plugins/bsk-gravityforms-blacklist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsk-gravityforms-blacklist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsk-gravityforms-blacklist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsk-gravityforms-blacklist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsk-pdf-manager-127715120e5f598c6f6d3ae7380f9898.yaml b/nuclei-templates/cve-less/plugins/bsk-pdf-manager-127715120e5f598c6f6d3ae7380f9898.yaml new file mode 100644 index 0000000000..3e810a50cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsk-pdf-manager-127715120e5f598c6f6d3ae7380f9898.yaml @@ -0,0 +1,58 @@ +id: bsk-pdf-manager-127715120e5f598c6f6d3ae7380f9898 + +info: + name: > + BSK PDF Manager <= 3.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60de55c6-e4fa-453e-84bd-309f2887e3cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsk-pdf-manager/" + google-query: inurl:"/wp-content/plugins/bsk-pdf-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsk-pdf-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsk-pdf-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsk-pdf-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsk-pdf-manager-3a7bd82599c0011e05818b715925a7ed.yaml b/nuclei-templates/cve-less/plugins/bsk-pdf-manager-3a7bd82599c0011e05818b715925a7ed.yaml new file mode 100644 index 0000000000..6f3b239ba9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsk-pdf-manager-3a7bd82599c0011e05818b715925a7ed.yaml @@ -0,0 +1,58 @@ +id: bsk-pdf-manager-3a7bd82599c0011e05818b715925a7ed + +info: + name: > + BSK PDF Manager <= 1.4 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b748dc9-4d44-41dd-b159-380214e7646a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsk-pdf-manager/" + google-query: inurl:"/wp-content/plugins/bsk-pdf-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsk-pdf-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsk-pdf-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsk-pdf-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsk-pdf-manager-a6117f5c5b129c85596c75822f81da17.yaml b/nuclei-templates/cve-less/plugins/bsk-pdf-manager-a6117f5c5b129c85596c75822f81da17.yaml new file mode 100644 index 0000000000..dd413cd094 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsk-pdf-manager-a6117f5c5b129c85596c75822f81da17.yaml @@ -0,0 +1,58 @@ +id: bsk-pdf-manager-a6117f5c5b129c85596c75822f81da17 + +info: + name: > + BSK PDF Manager <= 3.1.1 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a2ee9bb-ae20-47ae-b792-438bf7be6cc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsk-pdf-manager/" + google-query: inurl:"/wp-content/plugins/bsk-pdf-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsk-pdf-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsk-pdf-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsk-pdf-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsk-pdf-manager-f85f5bca86f0fe8e61b822a458c1b11f.yaml b/nuclei-templates/cve-less/plugins/bsk-pdf-manager-f85f5bca86f0fe8e61b822a458c1b11f.yaml new file mode 100644 index 0000000000..761c8c3400 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsk-pdf-manager-f85f5bca86f0fe8e61b822a458c1b11f.yaml @@ -0,0 +1,58 @@ +id: bsk-pdf-manager-f85f5bca86f0fe8e61b822a458c1b11f + +info: + name: > + BSK PDF Manager 1.3 - 2.9 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/667d964a-dba6-424a-b3f5-af433616c132?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsk-pdf-manager/" + google-query: inurl:"/wp-content/plugins/bsk-pdf-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsk-pdf-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsk-pdf-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsk-pdf-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.3', '<= 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bsuite-596c399ca77f6898f5eb2e3e553223f2.yaml b/nuclei-templates/cve-less/plugins/bsuite-596c399ca77f6898f5eb2e3e553223f2.yaml new file mode 100644 index 0000000000..a4548a7989 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bsuite-596c399ca77f6898f5eb2e3e553223f2.yaml @@ -0,0 +1,58 @@ +id: bsuite-596c399ca77f6898f5eb2e3e553223f2 + +info: + name: > + bSuite <= 5 alpha 2 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dea175f-3728-4aee-9296-1bb595c83925?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bsuite/" + google-query: inurl:"/wp-content/plugins/bsuite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bsuite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bsuite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bsuite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5 alpha 2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bubble-menu-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/bubble-menu-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..7d167259f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bubble-menu-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: bubble-menu-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bubble-menu/" + google-query: inurl:"/wp-content/plugins/bubble-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bubble-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bubble-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bubble-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bubble-menu-7343e5b259d4e1cfb4df95c545aa69f5.yaml b/nuclei-templates/cve-less/plugins/bubble-menu-7343e5b259d4e1cfb4df95c545aa69f5.yaml new file mode 100644 index 0000000000..259c97cca6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bubble-menu-7343e5b259d4e1cfb4df95c545aa69f5.yaml @@ -0,0 +1,58 @@ +id: bubble-menu-7343e5b259d4e1cfb4df95c545aa69f5 + +info: + name: > + Bubble Menu – circle floating menu <= 3.0.1 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02409698-5421-4760-afcd-e53939082bfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bubble-menu/" + google-query: inurl:"/wp-content/plugins/bubble-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bubble-menu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bubble-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bubble-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddybadges-0b4ca30f3ad4ec80ff7de93b32a4ae21.yaml b/nuclei-templates/cve-less/plugins/buddybadges-0b4ca30f3ad4ec80ff7de93b32a4ae21.yaml new file mode 100644 index 0000000000..6ea45aa07e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddybadges-0b4ca30f3ad4ec80ff7de93b32a4ae21.yaml @@ -0,0 +1,58 @@ +id: buddybadges-0b4ca30f3ad4ec80ff7de93b32a4ae21 + +info: + name: > + Buddybadges <= 1.0.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8624f48-9938-4114-a55a-e635ca0dff2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddybadges/" + google-query: inurl:"/wp-content/plugins/buddybadges/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddybadges,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddybadges/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddybadges" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyboss-media-1cf8853774794c9a185058bff3041a9d.yaml b/nuclei-templates/cve-less/plugins/buddyboss-media-1cf8853774794c9a185058bff3041a9d.yaml new file mode 100644 index 0000000000..5f25f5c532 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyboss-media-1cf8853774794c9a185058bff3041a9d.yaml @@ -0,0 +1,58 @@ +id: buddyboss-media-1cf8853774794c9a185058bff3041a9d + +info: + name: > + BuddyBoss Media <= 3.2.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e485f089-689f-4f73-bb0d-eca6815388be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyboss-media/" + google-query: inurl:"/wp-content/plugins/buddyboss-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyboss-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyboss-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyboss-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyboss-platform-122921564a68def720b196881ac65cfb.yaml b/nuclei-templates/cve-less/plugins/buddyboss-platform-122921564a68def720b196881ac65cfb.yaml new file mode 100644 index 0000000000..08d504d25c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyboss-platform-122921564a68def720b196881ac65cfb.yaml @@ -0,0 +1,58 @@ +id: buddyboss-platform-122921564a68def720b196881ac65cfb + +info: + name: > + Buddyboss Platform <= 1.7.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fa97e67-08c1-4553-bada-e4c59f797207?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyboss-platform/" + google-query: inurl:"/wp-content/plugins/buddyboss-platform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyboss-platform,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyboss-platform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyboss-platform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-004b4a4b5a4f50cb7e2b7f31cbe37f6d.yaml b/nuclei-templates/cve-less/plugins/buddyforms-004b4a4b5a4f50cb7e2b7f31cbe37f6d.yaml new file mode 100644 index 0000000000..711f67357f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-004b4a4b5a4f50cb7e2b7f31cbe37f6d.yaml @@ -0,0 +1,58 @@ +id: buddyforms-004b4a4b5a4f50cb7e2b7f31cbe37f6d + +info: + name: > + BuddyForms <= 2.7.7 - PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f6669aa-e53c-45bb-88c4-2e1350993423?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-04719c2aa85ce103d2b347cbc1de6bf9.yaml b/nuclei-templates/cve-less/plugins/buddyforms-04719c2aa85ce103d2b347cbc1de6bf9.yaml new file mode 100644 index 0000000000..ad860c4f65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-04719c2aa85ce103d2b347cbc1de6bf9.yaml @@ -0,0 +1,58 @@ +id: buddyforms-04719c2aa85ce103d2b347cbc1de6bf9 + +info: + name: > + Post, Registration and Profile Form Builder – FrontEnd Editor BuddyForms – Easy WordPress Forms <= 2.2.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/599c6984-5d52-4d0f-86a1-b88f6c9797ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-3c4ad527262d00d607d5c7466a5e3a23.yaml b/nuclei-templates/cve-less/plugins/buddyforms-3c4ad527262d00d607d5c7466a5e3a23.yaml new file mode 100644 index 0000000000..949cf790a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-3c4ad527262d00d607d5c7466a5e3a23.yaml @@ -0,0 +1,58 @@ +id: buddyforms-3c4ad527262d00d607d5c7466a5e3a23 + +info: + name: > + Post, Registration and Profile Form Builder – FrontEnd Editor BuddyForms – Easy WordPress Forms <= 2.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20793de1-468f-4b9d-8e1f-b05dc204c0fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-4f1bcfb6c80585124e17859286f212d2.yaml b/nuclei-templates/cve-less/plugins/buddyforms-4f1bcfb6c80585124e17859286f212d2.yaml new file mode 100644 index 0000000000..cd2e0bb2fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-4f1bcfb6c80585124e17859286f212d2.yaml @@ -0,0 +1,58 @@ +id: buddyforms-4f1bcfb6c80585124e17859286f212d2 + +info: + name: > + Post, Registration and Profile Form Builder – FrontEnd Editor BuddyForms – Easy WordPress Forms <= 2.6.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5d1bd4-da0d-43f4-b28f-4a4a2702b3b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-5a3c975faaff05174a403394f594d251.yaml b/nuclei-templates/cve-less/plugins/buddyforms-5a3c975faaff05174a403394f594d251.yaml new file mode 100644 index 0000000000..984e23d32f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-5a3c975faaff05174a403394f594d251.yaml @@ -0,0 +1,58 @@ +id: buddyforms-5a3c975faaff05174a403394f594d251 + +info: + name: > + Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) <= 2.8.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-6410ce52f11ad48713df208e717c6bdf.yaml b/nuclei-templates/cve-less/plugins/buddyforms-6410ce52f11ad48713df208e717c6bdf.yaml new file mode 100644 index 0000000000..17fe1f2c0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-6410ce52f11ad48713df208e717c6bdf.yaml @@ -0,0 +1,58 @@ +id: buddyforms-6410ce52f11ad48713df208e717c6bdf + +info: + name: > + Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) <= 2.8.7 - Missing Authorization to Unauthenticated Media Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/380c646c-fd95-408a-89eb-3e646768bbc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-6c9eb31202fa41d32a09d5fd559fe8f5.yaml b/nuclei-templates/cve-less/plugins/buddyforms-6c9eb31202fa41d32a09d5fd559fe8f5.yaml new file mode 100644 index 0000000000..c0c6d33424 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-6c9eb31202fa41d32a09d5fd559fe8f5.yaml @@ -0,0 +1,58 @@ +id: buddyforms-6c9eb31202fa41d32a09d5fd559fe8f5 + +info: + name: > + Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) <= 2.8.7 - Missing Authorization to Unauthenticated Media Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d14a90d-65ea-45da-956b-0735e2e2b538?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-acf-6f39f76c23209b8f553defb1d25caa0d.yaml b/nuclei-templates/cve-less/plugins/buddyforms-acf-6f39f76c23209b8f553defb1d25caa0d.yaml new file mode 100644 index 0000000000..4709db0ad1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-acf-6f39f76c23209b8f553defb1d25caa0d.yaml @@ -0,0 +1,58 @@ +id: buddyforms-acf-6f39f76c23209b8f553defb1d25caa0d + +info: + name: > + BuddyForms ACF <= 1.3.8 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd6f4f0d-0e70-459a-8f09-64d1f6f8bb7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms-acf/" + google-query: inurl:"/wp-content/plugins/buddyforms-acf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms-acf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms-acf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms-acf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-b917e284e5115c137684e2852a491ab5.yaml b/nuclei-templates/cve-less/plugins/buddyforms-b917e284e5115c137684e2852a491ab5.yaml new file mode 100644 index 0000000000..7eef7a006e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-b917e284e5115c137684e2852a491ab5.yaml @@ -0,0 +1,58 @@ +id: buddyforms-b917e284e5115c137684e2852a491ab5 + +info: + name: > + BuddyForms <= 2.8.5 - Reflected Cross-Site Scripting via page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/701d6bee-6eb2-4497-bf54-fbc384d9d2e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/buddyforms-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f476284af0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: buddyforms-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-c0fe1fee8a4f48d20fef6e8a451cadaa.yaml b/nuclei-templates/cve-less/plugins/buddyforms-c0fe1fee8a4f48d20fef6e8a451cadaa.yaml new file mode 100644 index 0000000000..4971b5a750 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-c0fe1fee8a4f48d20fef6e8a451cadaa.yaml @@ -0,0 +1,58 @@ +id: buddyforms-c0fe1fee8a4f48d20fef6e8a451cadaa + +info: + name: > + BuddyForms <= 2.7.2 - Authenticated (Contributor+) Stored Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c32eb5b-dc4b-42f6-8454-d2ad57d7051d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/buddyforms-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..322cba5f87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: buddyforms-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-e466bc3583e942d1065171a722796cc7.yaml b/nuclei-templates/cve-less/plugins/buddyforms-e466bc3583e942d1065171a722796cc7.yaml new file mode 100644 index 0000000000..f51a657bd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-e466bc3583e942d1065171a722796cc7.yaml @@ -0,0 +1,58 @@ +id: buddyforms-e466bc3583e942d1065171a722796cc7 + +info: + name: > + BuddyForms <= 2.8.8 - Unauthenticated Arbitrary File Read and Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23d762e9-d43f-4520-a6f1-c920417a2436?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms/" + google-query: inurl:"/wp-content/plugins/buddyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-easypin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/buddyforms-easypin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..27d8588bf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-easypin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: buddyforms-easypin-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms-easypin/" + google-query: inurl:"/wp-content/plugins/buddyforms-easypin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms-easypin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms-easypin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms-easypin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-hook-fields-cff8c4e5924684eb6753231ae69511fb.yaml b/nuclei-templates/cve-less/plugins/buddyforms-hook-fields-cff8c4e5924684eb6753231ae69511fb.yaml new file mode 100644 index 0000000000..40f63b6d9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-hook-fields-cff8c4e5924684eb6753231ae69511fb.yaml @@ -0,0 +1,58 @@ +id: buddyforms-hook-fields-cff8c4e5924684eb6753231ae69511fb + +info: + name: > + BuddyForms Hook Fields <= 1.3.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a49d74a-01a6-4bd9-bc93-0006f9fe9503?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms-hook-fields/" + google-query: inurl:"/wp-content/plugins/buddyforms-hook-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms-hook-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms-hook-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms-hook-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-members-aa1e46c69c06ec911dde69a16f67cb87.yaml b/nuclei-templates/cve-less/plugins/buddyforms-members-aa1e46c69c06ec911dde69a16f67cb87.yaml new file mode 100644 index 0000000000..53a72673f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-members-aa1e46c69c06ec911dde69a16f67cb87.yaml @@ -0,0 +1,58 @@ +id: buddyforms-members-aa1e46c69c06ec911dde69a16f67cb87 + +info: + name: > + BuddyForms Members <= 1.4.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbbd9eda-756b-4fa7-b7b6-d91181cc80d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms-members/" + google-query: inurl:"/wp-content/plugins/buddyforms-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms-members,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddyforms-review-3d4fe5743b4cfd3fb11de9a33d55f7f3.yaml b/nuclei-templates/cve-less/plugins/buddyforms-review-3d4fe5743b4cfd3fb11de9a33d55f7f3.yaml new file mode 100644 index 0000000000..5f52523b1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddyforms-review-3d4fe5743b4cfd3fb11de9a33d55f7f3.yaml @@ -0,0 +1,58 @@ +id: buddyforms-review-3d4fe5743b4cfd3fb11de9a33d55f7f3 + +info: + name: > + BuddyForms Moderation <= 1.4.16 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50c8a20a-66b4-445e-9167-e6fc0e6a1000?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddyforms-review/" + google-query: inurl:"/wp-content/plugins/buddyforms-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddyforms-review,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddyforms-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyforms-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddymeet-848807325cc6df7207551325cd628ce9.yaml b/nuclei-templates/cve-less/plugins/buddymeet-848807325cc6df7207551325cd628ce9.yaml new file mode 100644 index 0000000000..bcfa0a6e81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddymeet-848807325cc6df7207551325cd628ce9.yaml @@ -0,0 +1,58 @@ +id: buddymeet-848807325cc6df7207551325cd628ce9 + +info: + name: > + BuddyMeet <= 2.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75dafb36-7596-492f-a377-32315b1abe33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddymeet/" + google-query: inurl:"/wp-content/plugins/buddymeet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddymeet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddymeet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddymeet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-08cd70ed7dd5c5c6156967f8c0e81815.yaml b/nuclei-templates/cve-less/plugins/buddypress-08cd70ed7dd5c5c6156967f8c0e81815.yaml new file mode 100644 index 0000000000..5d2b66bef0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-08cd70ed7dd5c5c6156967f8c0e81815.yaml @@ -0,0 +1,58 @@ +id: buddypress-08cd70ed7dd5c5c6156967f8c0e81815 + +info: + name: > + BuddyPress <= 5.1.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8457c5e1-9c31-4a1a-a221-36647753a877?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-13a0f9bc92fbfe82f8148720984ec395.yaml b/nuclei-templates/cve-less/plugins/buddypress-13a0f9bc92fbfe82f8148720984ec395.yaml new file mode 100644 index 0000000000..659640d14e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-13a0f9bc92fbfe82f8148720984ec395.yaml @@ -0,0 +1,58 @@ +id: buddypress-13a0f9bc92fbfe82f8148720984ec395 + +info: + name: > + BuddyPress - 1.5-1.5.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a4cc739-0563-4ca2-931d-818a0c285257?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.5', '<= 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-172545cfbc947ee677d3a8bdac5e5224.yaml b/nuclei-templates/cve-less/plugins/buddypress-172545cfbc947ee677d3a8bdac5e5224.yaml new file mode 100644 index 0000000000..5ffe106015 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-172545cfbc947ee677d3a8bdac5e5224.yaml @@ -0,0 +1,58 @@ +id: buddypress-172545cfbc947ee677d3a8bdac5e5224 + +info: + name: > + BuddyPress <= 7.2.1 - Insufficient Privilege De-escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3166549e-b52e-41e8-8b5c-1a1a0558c858?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-1d7f1035caa311db84f335e8b5f7ce3c.yaml b/nuclei-templates/cve-less/plugins/buddypress-1d7f1035caa311db84f335e8b5f7ce3c.yaml new file mode 100644 index 0000000000..1f4e3d7e5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-1d7f1035caa311db84f335e8b5f7ce3c.yaml @@ -0,0 +1,58 @@ +id: buddypress-1d7f1035caa311db84f335e8b5f7ce3c + +info: + name: > + BuddyPress <= 9.0.0 - Information Disclosure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87b26fcf-d0b3-4ab3-92d8-8f1ba72af0a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-1f93d822784f1c50c03c1335049e7dfa.yaml b/nuclei-templates/cve-less/plugins/buddypress-1f93d822784f1c50c03c1335049e7dfa.yaml new file mode 100644 index 0000000000..99fdb78540 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-1f93d822784f1c50c03c1335049e7dfa.yaml @@ -0,0 +1,58 @@ +id: buddypress-1f93d822784f1c50c03c1335049e7dfa + +info: + name: > + BuddyPress 5.0.0-7.2.0 - Privilege Escalation via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3da10da-8de3-4547-abe4-202002728c80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 5.0.0', '<= 7.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-376f3b7be651ac6251ca8825ec683915.yaml b/nuclei-templates/cve-less/plugins/buddypress-376f3b7be651ac6251ca8825ec683915.yaml new file mode 100644 index 0000000000..ee14eb27e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-376f3b7be651ac6251ca8825ec683915.yaml @@ -0,0 +1,58 @@ +id: buddypress-376f3b7be651ac6251ca8825ec683915 + +info: + name: > + BuddyPress <= 11.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b824cab6-d340-487d-90ba-5b554db1da14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-430f35a9a91f48c97c43930a9ef1c8e0.yaml b/nuclei-templates/cve-less/plugins/buddypress-430f35a9a91f48c97c43930a9ef1c8e0.yaml new file mode 100644 index 0000000000..23140ee94e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-430f35a9a91f48c97c43930a9ef1c8e0.yaml @@ -0,0 +1,58 @@ +id: buddypress-430f35a9a91f48c97c43930a9ef1c8e0 + +info: + name: > + BuddyPress <= 12.4.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3657384e-025a-44ad-8b7e-1a2fea17dcc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-533ee8fa484df21d792f06431e1c5c50.yaml b/nuclei-templates/cve-less/plugins/buddypress-533ee8fa484df21d792f06431e1c5c50.yaml new file mode 100644 index 0000000000..1b11427502 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-533ee8fa484df21d792f06431e1c5c50.yaml @@ -0,0 +1,58 @@ +id: buddypress-533ee8fa484df21d792f06431e1c5c50 + +info: + name: > + BuddyPress <= 7.2.0 - Authorization Bypass to Private Message Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/001a7d43-4b00-42e9-bb0c-94a9d5721166?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-5fe17c2fd9a91ee4cda8ff9e79dd3204.yaml b/nuclei-templates/cve-less/plugins/buddypress-5fe17c2fd9a91ee4cda8ff9e79dd3204.yaml new file mode 100644 index 0000000000..3a86ea8fc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-5fe17c2fd9a91ee4cda8ff9e79dd3204.yaml @@ -0,0 +1,58 @@ +id: buddypress-5fe17c2fd9a91ee4cda8ff9e79dd3204 + +info: + name: > + BuddyPress <= 9.0.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40765cfe-a60a-44dc-8cdb-f9c8e42654c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-863062f7cb6b2bf7365f623cc8d292ad.yaml b/nuclei-templates/cve-less/plugins/buddypress-863062f7cb6b2bf7365f623cc8d292ad.yaml new file mode 100644 index 0000000000..3aa5b39c94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-863062f7cb6b2bf7365f623cc8d292ad.yaml @@ -0,0 +1,58 @@ +id: buddypress-863062f7cb6b2bf7365f623cc8d292ad + +info: + name: > + BuddyPress <= 7.2.1 - Missing Authorization to Group Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b4b132-1e27-454d-9ba0-9d1a552e1844?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-88c5b961644bad4c49d63ba50954d1ef.yaml b/nuclei-templates/cve-less/plugins/buddypress-88c5b961644bad4c49d63ba50954d1ef.yaml new file mode 100644 index 0000000000..fa16365575 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-88c5b961644bad4c49d63ba50954d1ef.yaml @@ -0,0 +1,58 @@ +id: buddypress-88c5b961644bad4c49d63ba50954d1ef + +info: + name: > + BuddyPress <= 1.9.1 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd85da97-f62c-4c4e-ae29-dea5aa529f54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-9a2cdadfd3bcbd9bf749adf6574068df.yaml b/nuclei-templates/cve-less/plugins/buddypress-9a2cdadfd3bcbd9bf749adf6574068df.yaml new file mode 100644 index 0000000000..2fdcbd9f99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-9a2cdadfd3bcbd9bf749adf6574068df.yaml @@ -0,0 +1,58 @@ +id: buddypress-9a2cdadfd3bcbd9bf749adf6574068df + +info: + name: > + BuddyPress 2.0 - 2.7.3 - Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a3e2d1c-8879-4def-8861-3d6d8b683b7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0', '<= 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-activity-plus-5f432c656be335dcd6d93a860c52a8ba.yaml b/nuclei-templates/cve-less/plugins/buddypress-activity-plus-5f432c656be335dcd6d93a860c52a8ba.yaml new file mode 100644 index 0000000000..6682e84973 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-activity-plus-5f432c656be335dcd6d93a860c52a8ba.yaml @@ -0,0 +1,58 @@ +id: buddypress-activity-plus-5f432c656be335dcd6d93a860c52a8ba + +info: + name: > + BuddyPress Activity Plus <= 1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8dc9fd0-929e-447f-be05-085be98e4d0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-activity-plus/" + google-query: inurl:"/wp-content/plugins/buddypress-activity-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-activity-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-activity-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-activity-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-af97e64423b75225062fc5e60d8e5fa3.yaml b/nuclei-templates/cve-less/plugins/buddypress-af97e64423b75225062fc5e60d8e5fa3.yaml new file mode 100644 index 0000000000..df8a83dde5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-af97e64423b75225062fc5e60d8e5fa3.yaml @@ -0,0 +1,58 @@ +id: buddypress-af97e64423b75225062fc5e60d8e5fa3 + +info: + name: > + BuddyPress <= 7.2.1 - Missing Authorization to Unauthorized Group Access + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0ca9780-8918-40ff-80c0-62ce483adbae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-b60bae014d152f2a394bd09bd7490303.yaml b/nuclei-templates/cve-less/plugins/buddypress-b60bae014d152f2a394bd09bd7490303.yaml new file mode 100644 index 0000000000..c9fb1994c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-b60bae014d152f2a394bd09bd7490303.yaml @@ -0,0 +1,58 @@ +id: buddypress-b60bae014d152f2a394bd09bd7490303 + +info: + name: > + BuddyPress <= 7.2.0 - Authorization Bypass to Friend Invite + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04601634-d707-44a7-9b5f-46c4b9687469?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-c109037c5bd54b61559d2af24279cf52.yaml b/nuclei-templates/cve-less/plugins/buddypress-c109037c5bd54b61559d2af24279cf52.yaml new file mode 100644 index 0000000000..57a872ed24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-c109037c5bd54b61559d2af24279cf52.yaml @@ -0,0 +1,58 @@ +id: buddypress-c109037c5bd54b61559d2af24279cf52 + +info: + name: > + BuddyPress <= 5.1.0 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed5cf097-1b27-4d20-b7b2-2aa909bce042?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-c3337fb47eeb04c822819fd17c433268.yaml b/nuclei-templates/cve-less/plugins/buddypress-c3337fb47eeb04c822819fd17c433268.yaml new file mode 100644 index 0000000000..a170f120c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-c3337fb47eeb04c822819fd17c433268.yaml @@ -0,0 +1,58 @@ +id: buddypress-c3337fb47eeb04c822819fd17c433268 + +info: + name: > + BuddyPress <= 1.9.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2fe3724-f71c-4548-9410-838c0337f887?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-c4124b2dee30c6d41a48f0a55354e6b6.yaml b/nuclei-templates/cve-less/plugins/buddypress-c4124b2dee30c6d41a48f0a55354e6b6.yaml new file mode 100644 index 0000000000..d9c9c36c86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-c4124b2dee30c6d41a48f0a55354e6b6.yaml @@ -0,0 +1,58 @@ +id: buddypress-c4124b2dee30c6d41a48f0a55354e6b6 + +info: + name: > + BuddyPress <= 6.3.0 - Insufficient Input Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bd169bc-1538-400f-b2cd-0bbcf1fea7ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-cfcbf4a057a79e8a98be0e1376a14728.yaml b/nuclei-templates/cve-less/plugins/buddypress-cfcbf4a057a79e8a98be0e1376a14728.yaml new file mode 100644 index 0000000000..fbeef3bfcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-cfcbf4a057a79e8a98be0e1376a14728.yaml @@ -0,0 +1,58 @@ +id: buddypress-cfcbf4a057a79e8a98be0e1376a14728 + +info: + name: > + BuddyPress - 7.0.0 - 7.2.0 - Insufficient Privilege De-escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d7bcd71-e299-47fe-a749-e72c49b8129e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 7.0.0', '<= 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-check-ins-pro-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/buddypress-check-ins-pro-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..c81c52a2fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-check-ins-pro-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: buddypress-check-ins-pro-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-check-ins-pro/" + google-query: inurl:"/wp-content/plugins/buddypress-check-ins-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-check-ins-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-check-ins-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-check-ins-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-d0fd9cc44e353f2e6039b73677016f83.yaml b/nuclei-templates/cve-less/plugins/buddypress-d0fd9cc44e353f2e6039b73677016f83.yaml new file mode 100644 index 0000000000..3553475bd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-d0fd9cc44e353f2e6039b73677016f83.yaml @@ -0,0 +1,58 @@ +id: buddypress-d0fd9cc44e353f2e6039b73677016f83 + +info: + name: > + BuddyPress <= 7.2.1 - Missing Authorization to Private Post Activity + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/402bbe9c-cf4d-457c-97ac-149e14ea6f47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-docs-8dce3163a90bed75fd5b9e557a28f3b3.yaml b/nuclei-templates/cve-less/plugins/buddypress-docs-8dce3163a90bed75fd5b9e557a28f3b3.yaml new file mode 100644 index 0000000000..d8b6520a56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-docs-8dce3163a90bed75fd5b9e557a28f3b3.yaml @@ -0,0 +1,58 @@ +id: buddypress-docs-8dce3163a90bed75fd5b9e557a28f3b3 + +info: + name: > + BuddyPress Docs <= 1.9.2 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a6c16dd-3681-4867-b608-5501ff9e9331?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-docs/" + google-query: inurl:"/wp-content/plugins/buddypress-docs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-docs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-docs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-docs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-extended-friendship-request-a103c2e3cc97ab522767ac0230b22480.yaml b/nuclei-templates/cve-less/plugins/buddypress-extended-friendship-request-a103c2e3cc97ab522767ac0230b22480.yaml new file mode 100644 index 0000000000..8a7e3e9dfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-extended-friendship-request-a103c2e3cc97ab522767ac0230b22480.yaml @@ -0,0 +1,58 @@ +id: buddypress-extended-friendship-request-a103c2e3cc97ab522767ac0230b22480 + +info: + name: > + BuddyPress Extended Friendship Request < 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fa0b67b-edc8-4f91-bf67-167df63cf7bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-extended-friendship-request/" + google-query: inurl:"/wp-content/plugins/buddypress-extended-friendship-request/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-extended-friendship-request,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-extended-friendship-request/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-extended-friendship-request" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-f3ed5f14a02e2bdcce7190205d484a67.yaml b/nuclei-templates/cve-less/plugins/buddypress-f3ed5f14a02e2bdcce7190205d484a67.yaml new file mode 100644 index 0000000000..e126fbd4a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-f3ed5f14a02e2bdcce7190205d484a67.yaml @@ -0,0 +1,58 @@ +id: buddypress-f3ed5f14a02e2bdcce7190205d484a67 + +info: + name: > + BuddyPress <= 2.3.4 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bed2e86-1cc0-4fed-a44f-0c495c423e22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress/" + google-query: inurl:"/wp-content/plugins/buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-global-search-ed89c8160fc54a5150ed5e4f427981e4.yaml b/nuclei-templates/cve-less/plugins/buddypress-global-search-ed89c8160fc54a5150ed5e4f427981e4.yaml new file mode 100644 index 0000000000..c81ca2ce24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-global-search-ed89c8160fc54a5150ed5e4f427981e4.yaml @@ -0,0 +1,58 @@ +id: buddypress-global-search-ed89c8160fc54a5150ed5e4f427981e4 + +info: + name: > + BuddyPress Global Search <= 1.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f78cc71a-db22-4f5f-9231-52c66561df02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-global-search/" + google-query: inurl:"/wp-content/plugins/buddypress-global-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-global-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-global-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-global-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-hashtag-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/buddypress-hashtag-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..68fa31fd92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-hashtag-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: buddypress-hashtag-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-hashtag/" + google-query: inurl:"/wp-content/plugins/buddypress-hashtag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-hashtag,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-hashtag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-hashtag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-098044594b04ab841c349ed64a192c47.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-098044594b04ab841c349ed64a192c47.yaml new file mode 100644 index 0000000000..bd64f61ef4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-098044594b04ab841c349ed64a192c47.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-098044594b04ab841c349ed64a192c47 + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress < 3.7.19 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1814ad55-0807-4def-b584-6dbbc5d6eb72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-143b187563c9f2554688db0c6157a5d5.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-143b187563c9f2554688db0c6157a5d5.yaml new file mode 100644 index 0000000000..72f00d0d7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-143b187563c9f2554688db0c6157a5d5.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-143b187563c9f2554688db0c6157a5d5 + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress < 3.7.40 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ba74e58-0647-4283-9fa3-428976c54474?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-5185077331b584e736df6ae601c45310.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-5185077331b584e736df6ae601c45310.yaml new file mode 100644 index 0000000000..e025f057b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-5185077331b584e736df6ae601c45310.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-5185077331b584e736df6ae601c45310 + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress WordPress <= 4.6.15 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d619d300-8bba-45a1-bd0a-d82e9066a43d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-58b37148ce0bdaa5522c3559b2f37ff0.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-58b37148ce0bdaa5522c3559b2f37ff0.yaml new file mode 100644 index 0000000000..97ec5fb807 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-58b37148ce0bdaa5522c3559b2f37ff0.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-58b37148ce0bdaa5522c3559b2f37ff0 + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress <= 4.6.15 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb022e51-32fd-403e-a9b3-34114e957020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-85898493501c4d75829911d4553b254e.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-85898493501c4d75829911d4553b254e.yaml new file mode 100644 index 0000000000..945add9159 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-85898493501c4d75829911d4553b254e.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-85898493501c4d75829911d4553b254e + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress <= 4.6.14 - Missing Authorization via export_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cb5df54-a6a7-4c2e-8df0-5d050218622e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-8b2a21b8747d982584ad7e24dffd2d64.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-8b2a21b8747d982584ad7e24dffd2d64.yaml new file mode 100644 index 0000000000..8aa1788702 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-8b2a21b8747d982584ad7e24dffd2d64.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-8b2a21b8747d982584ad7e24dffd2d64 + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress <= 4.2 - Arbitary File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be97e1ca-6c9c-4641-ba7c-bbb14a58d99e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-aeff462ac51a8748cbda344eafd679be.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-aeff462ac51a8748cbda344eafd679be.yaml new file mode 100644 index 0000000000..d959ed3335 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-aeff462ac51a8748cbda344eafd679be.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-aeff462ac51a8748cbda344eafd679be + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress <= 4.6.18 - Authenticated (Contributor+) SQL Injection via rtmedia_gallery Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32b6938a-0566-46c8-8761-0403b3a0e3e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-af05e39beae4ccc85b4b7733a1dfc389.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-af05e39beae4ccc85b4b7733a1dfc389.yaml new file mode 100644 index 0000000000..4ff091e70d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-af05e39beae4ccc85b4b7733a1dfc389.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-af05e39beae4ccc85b4b7733a1dfc389 + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress <= 4.6.14 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be837a77-9b25-43af-aaba-94a8aa59e7e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-c87d935ed7b249bf9a1f11f3472af3e0.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-c87d935ed7b249bf9a1f11f3472af3e0.yaml new file mode 100644 index 0000000000..9dc173d4ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-c87d935ed7b249bf9a1f11f3472af3e0.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-c87d935ed7b249bf9a1f11f3472af3e0 + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress <= 3.10.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b19b0b2-d6cb-4d92-9925-c77d517ddfb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-d489286ed41649bac6a4b978b2c38ed0.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-d489286ed41649bac6a4b978b2c38ed0.yaml new file mode 100644 index 0000000000..23f7d13983 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-d489286ed41649bac6a4b978b2c38ed0.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-d489286ed41649bac6a4b978b2c38ed0 + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress <= 4.6.14 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dfc145e-d2d4-4137-a5c6-dec2ebb41876?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-media-dc0051edab31221e49ae9364dcda380b.yaml b/nuclei-templates/cve-less/plugins/buddypress-media-dc0051edab31221e49ae9364dcda380b.yaml new file mode 100644 index 0000000000..a9358a6d67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-media-dc0051edab31221e49ae9364dcda380b.yaml @@ -0,0 +1,58 @@ +id: buddypress-media-dc0051edab31221e49ae9364dcda380b + +info: + name: > + rtMedia for WordPress, BuddyPress and bbPress <= 4.6.18 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a2420ca-e079-429b-b1f1-47bf1d0a9f71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-media/" + google-query: inurl:"/wp-content/plugins/buddypress-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-sticky-post-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/buddypress-sticky-post-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..a59e78b13d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-sticky-post-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: buddypress-sticky-post-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-sticky-post/" + google-query: inurl:"/wp-content/plugins/buddypress-sticky-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-sticky-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-sticky-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-sticky-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddypress-xprofile-custom-fields-type-5299c25ee2ef36af65c119614434bd1d.yaml b/nuclei-templates/cve-less/plugins/buddypress-xprofile-custom-fields-type-5299c25ee2ef36af65c119614434bd1d.yaml new file mode 100644 index 0000000000..04a2e41c63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddypress-xprofile-custom-fields-type-5299c25ee2ef36af65c119614434bd1d.yaml @@ -0,0 +1,58 @@ +id: buddypress-xprofile-custom-fields-type-5299c25ee2ef36af65c119614434bd1d + +info: + name: > + BuddyPress Xprofile Custom Fields Type <= 2.6.3 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcd463de-ae26-4477-89e1-21f4aada1e86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddypress-xprofile-custom-fields-type/" + google-query: inurl:"/wp-content/plugins/buddypress-xprofile-custom-fields-type/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddypress-xprofile-custom-fields-type,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddypress-xprofile-custom-fields-type/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddypress-xprofile-custom-fields-type" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buddystream-f5631d6e08f23256931384659c340b7c.yaml b/nuclei-templates/cve-less/plugins/buddystream-f5631d6e08f23256931384659c340b7c.yaml new file mode 100644 index 0000000000..2fdf3e3b58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buddystream-f5631d6e08f23256931384659c340b7c.yaml @@ -0,0 +1,58 @@ +id: buddystream-f5631d6e08f23256931384659c340b7c + +info: + name: > + BuddyStream <= 3.6.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e947abb8-be40-4090-80a6-5255692ef693?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buddystream/" + google-query: inurl:"/wp-content/plugins/buddystream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buddystream,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buddystream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddystream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buffer-my-post-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/buffer-my-post-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c0637b19b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buffer-my-post-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: buffer-my-post-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buffer-my-post/" + google-query: inurl:"/wp-content/plugins/buffer-my-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buffer-my-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buffer-my-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buffer-my-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2020.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bug-library-16a4534effaaeb1466ec5e74fc661c70.yaml b/nuclei-templates/cve-less/plugins/bug-library-16a4534effaaeb1466ec5e74fc661c70.yaml new file mode 100644 index 0000000000..96900d7335 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bug-library-16a4534effaaeb1466ec5e74fc661c70.yaml @@ -0,0 +1,58 @@ +id: bug-library-16a4534effaaeb1466ec5e74fc661c70 + +info: + name: > + Bug Library <= 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffe33097-66fc-45f1-bc08-93a2b2234501?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bug-library/" + google-query: inurl:"/wp-content/plugins/bug-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bug-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bug-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bug-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/build-app-online-02a886272dd2cdcd86a1f09e85f56770.yaml b/nuclei-templates/cve-less/plugins/build-app-online-02a886272dd2cdcd86a1f09e85f56770.yaml new file mode 100644 index 0000000000..c1bbc99573 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/build-app-online-02a886272dd2cdcd86a1f09e85f56770.yaml @@ -0,0 +1,58 @@ +id: build-app-online-02a886272dd2cdcd86a1f09e85f56770 + +info: + name: > + Build App Online <= 1.0.18 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f15f85c6-0bba-4bbd-b097-d205b9e0a075?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/build-app-online/" + google-query: inurl:"/wp-content/plugins/build-app-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,build-app-online,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/build-app-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "build-app-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/build-app-online-26189f152df8893b52731b2bdd16e94e.yaml b/nuclei-templates/cve-less/plugins/build-app-online-26189f152df8893b52731b2bdd16e94e.yaml new file mode 100644 index 0000000000..7be0b5cd66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/build-app-online-26189f152df8893b52731b2bdd16e94e.yaml @@ -0,0 +1,58 @@ +id: build-app-online-26189f152df8893b52731b2bdd16e94e + +info: + name: > + Build App Online <= 1.0.19 - Missing Authorization Authenticated(Subscriber+) Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3551218-e272-4c96-94fe-9db0aee0d4f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/build-app-online/" + google-query: inurl:"/wp-content/plugins/build-app-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,build-app-online,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/build-app-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "build-app-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/build-app-online-af6a1540ae3f6f386fc5dcefbac66cbb.yaml b/nuclei-templates/cve-less/plugins/build-app-online-af6a1540ae3f6f386fc5dcefbac66cbb.yaml new file mode 100644 index 0000000000..3a28ba6c2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/build-app-online-af6a1540ae3f6f386fc5dcefbac66cbb.yaml @@ -0,0 +1,58 @@ +id: build-app-online-af6a1540ae3f6f386fc5dcefbac66cbb + +info: + name: > + Build App Online <= 1.0.19 - Account Takeover via Weak Password Reset Mechanism + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/743e40f6-dde3-4d8f-938e-b2a0dcdfb901?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/build-app-online/" + google-query: inurl:"/wp-content/plugins/build-app-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,build-app-online,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/build-app-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "build-app-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/builder-contact-ffaa84c2ddc8dc8e320dfb0fae85b11d.yaml b/nuclei-templates/cve-less/plugins/builder-contact-ffaa84c2ddc8dc8e320dfb0fae85b11d.yaml new file mode 100644 index 0000000000..831dbf31f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/builder-contact-ffaa84c2ddc8dc8e320dfb0fae85b11d.yaml @@ -0,0 +1,58 @@ +id: builder-contact-ffaa84c2ddc8dc8e320dfb0fae85b11d + +info: + name: > + Contact Builder by Themify <= 1.4.5 - Email Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0232a3a5-e91e-4213-8c21-900fc805bad7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/builder-contact/" + google-query: inurl:"/wp-content/plugins/builder-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,builder-contact,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/builder-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "builder-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/builder-style-manager-f87c4c6d53b29231a0f57635f4d257a4.yaml b/nuclei-templates/cve-less/plugins/builder-style-manager-f87c4c6d53b29231a0f57635f4d257a4.yaml new file mode 100644 index 0000000000..e4068691ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/builder-style-manager-f87c4c6d53b29231a0f57635f4d257a4.yaml @@ -0,0 +1,58 @@ +id: builder-style-manager-f87c4c6d53b29231a0f57635f4d257a4 + +info: + name: > + iThemes Builder Style Manager < 0.7.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b761292e-375c-4657-a7a8-e11af28f45fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/builder-style-manager/" + google-query: inurl:"/wp-content/plugins/builder-style-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,builder-style-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/builder-style-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "builder-style-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/builderall-cheetah-for-wp-262146db4fdf9dc0247b51f04e7c7b5d.yaml b/nuclei-templates/cve-less/plugins/builderall-cheetah-for-wp-262146db4fdf9dc0247b51f04e7c7b5d.yaml new file mode 100644 index 0000000000..f249fd7140 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/builderall-cheetah-for-wp-262146db4fdf9dc0247b51f04e7c7b5d.yaml @@ -0,0 +1,58 @@ +id: builderall-cheetah-for-wp-262146db4fdf9dc0247b51f04e7c7b5d + +info: + name: > + Builderall Builder for WordPress <= 2.0.1 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c65519c-06f6-4303-9d22-980dbe36f0b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/builderall-cheetah-for-wp/" + google-query: inurl:"/wp-content/plugins/builderall-cheetah-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,builderall-cheetah-for-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/builderall-cheetah-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "builderall-cheetah-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulgarisation-for-woocommerce-b71f43cf539320adcdf753a5632e031f.yaml b/nuclei-templates/cve-less/plugins/bulgarisation-for-woocommerce-b71f43cf539320adcdf753a5632e031f.yaml new file mode 100644 index 0000000000..291d08c457 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulgarisation-for-woocommerce-b71f43cf539320adcdf753a5632e031f.yaml @@ -0,0 +1,58 @@ +id: bulgarisation-for-woocommerce-b71f43cf539320adcdf753a5632e031f + +info: + name: > + Bulgarisation for WooCommerce <= 3.0.14 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ff1d12e-1129-40d3-8c29-3a46ffc77872?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulgarisation-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/bulgarisation-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulgarisation-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulgarisation-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulgarisation-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulgarisation-for-woocommerce-f361db7993b168bd9190093a1decfa83.yaml b/nuclei-templates/cve-less/plugins/bulgarisation-for-woocommerce-f361db7993b168bd9190093a1decfa83.yaml new file mode 100644 index 0000000000..62ded29139 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulgarisation-for-woocommerce-f361db7993b168bd9190093a1decfa83.yaml @@ -0,0 +1,58 @@ +id: bulgarisation-for-woocommerce-f361db7993b168bd9190093a1decfa83 + +info: + name: > + Bulgarisation for WooCommerce <= 3.0.14 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be759c83-a9df-4858-a724-28006a595404?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulgarisation-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/bulgarisation-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulgarisation-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulgarisation-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulgarisation-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-add-to-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/bulk-add-to-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..0521ce7198 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-add-to-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: bulk-add-to-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-add-to-cart-xforwc/" + google-query: inurl:"/wp-content/plugins/bulk-add-to-cart-xforwc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-add-to-cart-xforwc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-add-to-cart-xforwc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-add-to-cart-xforwc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-attachment-download-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bulk-attachment-download-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9eb1e993f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-attachment-download-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bulk-attachment-download-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-attachment-download/" + google-query: inurl:"/wp-content/plugins/bulk-attachment-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-attachment-download,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-attachment-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-attachment-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-block-converter-c38ba88828239a3fc9d444831fba05d4.yaml b/nuclei-templates/cve-less/plugins/bulk-block-converter-c38ba88828239a3fc9d444831fba05d4.yaml new file mode 100644 index 0000000000..f13b27ade1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-block-converter-c38ba88828239a3fc9d444831fba05d4.yaml @@ -0,0 +1,58 @@ +id: bulk-block-converter-c38ba88828239a3fc9d444831fba05d4 + +info: + name: > + Bulk Block Converter <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69711a11-96c2-458d-87f5-a3d8152ab20c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-block-converter/" + google-query: inurl:"/wp-content/plugins/bulk-block-converter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-block-converter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-block-converter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-block-converter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-change-09f74f7b9db91816c6e2bc32700d99d5.yaml b/nuclei-templates/cve-less/plugins/bulk-change-09f74f7b9db91816c6e2bc32700d99d5.yaml new file mode 100644 index 0000000000..12ad1955e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-change-09f74f7b9db91816c6e2bc32700d99d5.yaml @@ -0,0 +1,58 @@ +id: bulk-change-09f74f7b9db91816c6e2bc32700d99d5 + +info: + name: > + Bulk change of posts terms and post types <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aac6fcee-cb8b-4862-a1f1-9af692ae741f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-change/" + google-query: inurl:"/wp-content/plugins/bulk-change/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-change,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-change/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-change" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-comment-remove-5508f1f637e90aba06cb7afdc5129513.yaml b/nuclei-templates/cve-less/plugins/bulk-comment-remove-5508f1f637e90aba06cb7afdc5129513.yaml new file mode 100644 index 0000000000..ba3ad2d86a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-comment-remove-5508f1f637e90aba06cb7afdc5129513.yaml @@ -0,0 +1,58 @@ +id: bulk-comment-remove-5508f1f637e90aba06cb7afdc5129513 + +info: + name: > + Bulk Comment Remove <= 2 - Cross-Site Request Forgery via brc_admin() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42303b60-cbb5-4176-94f9-b2ed29f59cc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-comment-remove/" + google-query: inurl:"/wp-content/plugins/bulk-comment-remove/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-comment-remove,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-comment-remove/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-comment-remove" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-creator-c3fa207f4b7e44a252f8db84f79dbd3d.yaml b/nuclei-templates/cve-less/plugins/bulk-creator-c3fa207f4b7e44a252f8db84f79dbd3d.yaml new file mode 100644 index 0000000000..74e42f49bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-creator-c3fa207f4b7e44a252f8db84f79dbd3d.yaml @@ -0,0 +1,58 @@ +id: bulk-creator-c3fa207f4b7e44a252f8db84f79dbd3d + +info: + name: > + Bulk Creator <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64abe00c-05b7-4661-b560-bae3957ad3e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-creator/" + google-query: inurl:"/wp-content/plugins/bulk-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-creator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-datetime-change-29b5be50bbb53513769398d4dbd36872.yaml b/nuclei-templates/cve-less/plugins/bulk-datetime-change-29b5be50bbb53513769398d4dbd36872.yaml new file mode 100644 index 0000000000..d6845d687c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-datetime-change-29b5be50bbb53513769398d4dbd36872.yaml @@ -0,0 +1,58 @@ +id: bulk-datetime-change-29b5be50bbb53513769398d4dbd36872 + +info: + name: > + Bulk Datetime Change <= 1.11 - Missing Authorisation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/505e9ba4-a19c-4d51-8ba7-4891bbac603e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-datetime-change/" + google-query: inurl:"/wp-content/plugins/bulk-datetime-change/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-datetime-change,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-datetime-change/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-datetime-change" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-delete-24cf0801a4963f154c38e24267fc828d.yaml b/nuclei-templates/cve-less/plugins/bulk-delete-24cf0801a4963f154c38e24267fc828d.yaml new file mode 100644 index 0000000000..7c2d0d664b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-delete-24cf0801a4963f154c38e24267fc828d.yaml @@ -0,0 +1,58 @@ +id: bulk-delete-24cf0801a4963f154c38e24267fc828d + +info: + name: > + Bulk Delete <= 5.5.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3016491-6a6a-433f-9018-5e84f9e3e37c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-delete/" + google-query: inurl:"/wp-content/plugins/bulk-delete/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-delete,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-delete/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-delete" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-delete-users-by-email-66ff52bda667dbc0abbc88dbfecf89ff.yaml b/nuclei-templates/cve-less/plugins/bulk-delete-users-by-email-66ff52bda667dbc0abbc88dbfecf89ff.yaml new file mode 100644 index 0000000000..2cad380916 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-delete-users-by-email-66ff52bda667dbc0abbc88dbfecf89ff.yaml @@ -0,0 +1,58 @@ +id: bulk-delete-users-by-email-66ff52bda667dbc0abbc88dbfecf89ff + +info: + name: > + Bulk Delete Users by Email <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c9aaa7a-d6a7-488f-9800-7e978a765288?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-delete-users-by-email/" + google-query: inurl:"/wp-content/plugins/bulk-delete-users-by-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-delete-users-by-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-delete-users-by-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-delete-users-by-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-delete-users-by-email-aa16febdbc946ef586052ff28c269ebe.yaml b/nuclei-templates/cve-less/plugins/bulk-delete-users-by-email-aa16febdbc946ef586052ff28c269ebe.yaml new file mode 100644 index 0000000000..64fac66181 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-delete-users-by-email-aa16febdbc946ef586052ff28c269ebe.yaml @@ -0,0 +1,58 @@ +id: bulk-delete-users-by-email-aa16febdbc946ef586052ff28c269ebe + +info: + name: > + Bulk Delete Users by Email <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/712ffe0a-45a5-41c7-a2b9-e88fb381a684?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-delete-users-by-email/" + google-query: inurl:"/wp-content/plugins/bulk-delete-users-by-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-delete-users-by-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-delete-users-by-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-delete-users-by-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-edit-categories-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bulk-edit-categories-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d828ccb47f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-edit-categories-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bulk-edit-categories-tags-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-edit-categories-tags/" + google-query: inurl:"/wp-content/plugins/bulk-edit-categories-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-edit-categories-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-edit-categories-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-edit-categories-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-edit-post-titles-d1e689eb00e15a822c5a4bc69f8d4926.yaml b/nuclei-templates/cve-less/plugins/bulk-edit-post-titles-d1e689eb00e15a822c5a4bc69f8d4926.yaml new file mode 100644 index 0000000000..e988882af1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-edit-post-titles-d1e689eb00e15a822c5a4bc69f8d4926.yaml @@ -0,0 +1,58 @@ +id: bulk-edit-post-titles-d1e689eb00e15a822c5a4bc69f8d4926 + +info: + name: > + Bulk Edit Post Titles <= 5.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbdeaa77-72c9-4afc-8913-7a1e44cdeb82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-edit-post-titles/" + google-query: inurl:"/wp-content/plugins/bulk-edit-post-titles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-edit-post-titles,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-edit-post-titles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-edit-post-titles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-edit-post-titles-e79dfaa6d6a126465f94617b43a94699.yaml b/nuclei-templates/cve-less/plugins/bulk-edit-post-titles-e79dfaa6d6a126465f94617b43a94699.yaml new file mode 100644 index 0000000000..bc2e7d47a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-edit-post-titles-e79dfaa6d6a126465f94617b43a94699.yaml @@ -0,0 +1,58 @@ +id: bulk-edit-post-titles-e79dfaa6d6a126465f94617b43a94699 + +info: + name: > + Bulk Edit Post Titles <= 5.0.0 - Missing Authorization via bulkUpdatePostTitles + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cad19306-6eef-4f80-9442-e7b314b3a873?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-edit-post-titles/" + google-query: inurl:"/wp-content/plugins/bulk-edit-post-titles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-edit-post-titles,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-edit-post-titles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-edit-post-titles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-edit-user-profiles-in-spreadsheet-4f2b194ecb7432206d5e63b6f9923644.yaml b/nuclei-templates/cve-less/plugins/bulk-edit-user-profiles-in-spreadsheet-4f2b194ecb7432206d5e63b6f9923644.yaml new file mode 100644 index 0000000000..2a4ff173db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-edit-user-profiles-in-spreadsheet-4f2b194ecb7432206d5e63b6f9923644.yaml @@ -0,0 +1,58 @@ +id: bulk-edit-user-profiles-in-spreadsheet-4f2b194ecb7432206d5e63b6f9923644 + +info: + name: > + Bulk Edit and Create User Profiles – WP Sheet Editor <= 1.5.13 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc783305-1cd0-4ec1-b4e2-57afeeec8034?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-edit-user-profiles-in-spreadsheet/" + google-query: inurl:"/wp-content/plugins/bulk-edit-user-profiles-in-spreadsheet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-edit-user-profiles-in-spreadsheet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-edit-user-profiles-in-spreadsheet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-edit-user-profiles-in-spreadsheet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-edit-user-profiles-in-spreadsheet-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bulk-edit-user-profiles-in-spreadsheet-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..64bdb3e803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-edit-user-profiles-in-spreadsheet-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bulk-edit-user-profiles-in-spreadsheet-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-edit-user-profiles-in-spreadsheet/" + google-query: inurl:"/wp-content/plugins/bulk-edit-user-profiles-in-spreadsheet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-edit-user-profiles-in-spreadsheet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-edit-user-profiles-in-spreadsheet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-edit-user-profiles-in-spreadsheet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-10360815e5a20aeed5671b4b975451a1.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-10360815e5a20aeed5671b4b975451a1.yaml new file mode 100644 index 0000000000..1a011c0142 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-10360815e5a20aeed5671b4b975451a1.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-10360815e5a20aeed5671b4b975451a1 + +info: + name: > + WOLF <= 1.0.7.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85b439ea-08f9-4b4e-80da-7c5f80bc2818?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-4d37b5938e435e55d1b784b692eb0059.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-4d37b5938e435e55d1b784b692eb0059.yaml new file mode 100644 index 0000000000..c6af1e8731 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-4d37b5938e435e55d1b784b692eb0059.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-4d37b5938e435e55d1b784b692eb0059 + +info: + name: > + WOLF <= 1.0.6 - Authenticated (Subscriber+) Stored Cross-Site Scripting via wpbe_update_page_field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2be16ee8-6bae-44d9-bde7-8e893293c3f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-78b9d1af7b3a60f9f86a06190eb42653.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-78b9d1af7b3a60f9f86a06190eb42653.yaml new file mode 100644 index 0000000000..90686a52b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-78b9d1af7b3a60f9f86a06190eb42653.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-78b9d1af7b3a60f9f86a06190eb42653 + +info: + name: > + WOLF <= 1.0.7 - Cross-Site Request Forgery via create_profile + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98dffc17-ac45-4ccd-ae57-96b36bd02be3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-89b2790236539e015ae4e5bc957d832c.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-89b2790236539e015ae4e5bc957d832c.yaml new file mode 100644 index 0000000000..fcc64901cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-89b2790236539e015ae4e5bc957d832c.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-89b2790236539e015ae4e5bc957d832c + +info: + name: > + WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13c66a8f-b35f-4943-8880-0799b0d150f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-8a1c3cab2f9b4de5abbed7eadb500759.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-8a1c3cab2f9b4de5abbed7eadb500759.yaml new file mode 100644 index 0000000000..873fc51dd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-8a1c3cab2f9b4de5abbed7eadb500759.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-8a1c3cab2f9b4de5abbed7eadb500759 + +info: + name: > + WOLF <= 1.0.6 - Cross-Site Request Forgery via wpbe_update_page_field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a39ca182-981b-4636-acd5-4c8a269858dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml new file mode 100644 index 0000000000..248b85da59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa + +info: + name: > + BEAR <= 1.1.4.1 & WOLF <= 1.0.8.1 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12188a74-b1a6-4aa4-88b4-2d0d0dd32916?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-c2e59525aa8afa93502c3fb0824f336b.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-c2e59525aa8afa93502c3fb0824f336b.yaml new file mode 100644 index 0000000000..4436c9f61a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-c2e59525aa8afa93502c3fb0824f336b.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-c2e59525aa8afa93502c3fb0824f336b + +info: + name: > + WOLF <= 1.0.8 - Unauthenticated Stored Cross-Site Scripting via profile_title + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10339a77-7c1a-4030-9061-15c699545b16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-e34822239e7a06946c13777f1af5a66d.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-e34822239e7a06946c13777f1af5a66d.yaml new file mode 100644 index 0000000000..498ab22645 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-e34822239e7a06946c13777f1af5a66d.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-e34822239e7a06946c13777f1af5a66d + +info: + name: > + WOLF <= 1.0.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b771d76-b79a-4ff2-9433-8d35734a4396?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-editor-fb0e4f9dfbe427b130769e6af2734cfc.yaml b/nuclei-templates/cve-less/plugins/bulk-editor-fb0e4f9dfbe427b130769e6af2734cfc.yaml new file mode 100644 index 0000000000..2f5184e663 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-editor-fb0e4f9dfbe427b130769e6af2734cfc.yaml @@ -0,0 +1,58 @@ +id: bulk-editor-fb0e4f9dfbe427b130769e6af2734cfc + +info: + name: > + WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c48f94b-d193-429a-9383-628ae12bfdf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-editor/" + google-query: inurl:"/wp-content/plugins/bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-image-alt-text-with-yoast-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bulk-image-alt-text-with-yoast-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a4bf6a9149 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-image-alt-text-with-yoast-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bulk-image-alt-text-with-yoast-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-image-alt-text-with-yoast/" + google-query: inurl:"/wp-content/plugins/bulk-image-alt-text-with-yoast/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-image-alt-text-with-yoast,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-image-alt-text-with-yoast/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-image-alt-text-with-yoast" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-image-title-attribute-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bulk-image-title-attribute-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d4594641d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-image-title-attribute-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bulk-image-title-attribute-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-image-title-attribute/" + google-query: inurl:"/wp-content/plugins/bulk-image-title-attribute/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-image-title-attribute,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-image-title-attribute/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-image-title-attribute" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-aab8828fbd21352e7bbaf9cbf0ad1810.yaml b/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-aab8828fbd21352e7bbaf9cbf0ad1810.yaml new file mode 100644 index 0000000000..85218638f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-aab8828fbd21352e7bbaf9cbf0ad1810.yaml @@ -0,0 +1,58 @@ +id: bulk-noindex-nofollow-toolkit-by-mad-fish-aab8828fbd21352e7bbaf9cbf0ad1810 + +info: + name: > + Bulk NoIndex & NoFollow Toolkit <= 2.01 - Reflected Cross-Site Scripting via tab, order, and orderby + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/451d4ecd-f3d7-4029-8d39-85d2a7ed459c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/" + google-query: inurl:"/wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-noindex-nofollow-toolkit-by-mad-fish,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-noindex-nofollow-toolkit-by-mad-fish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-cf39fd16fb8f788c8db751f0dadfb29c.yaml b/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-cf39fd16fb8f788c8db751f0dadfb29c.yaml new file mode 100644 index 0000000000..6ffc414c80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-cf39fd16fb8f788c8db751f0dadfb29c.yaml @@ -0,0 +1,58 @@ +id: bulk-noindex-nofollow-toolkit-by-mad-fish-cf39fd16fb8f788c8db751f0dadfb29c + +info: + name: > + Bulk NoIndex & NoFollow Toolkit <= 1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cb79fbc-705a-4fb4-b441-7fe7ab6dea10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/" + google-query: inurl:"/wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-noindex-nofollow-toolkit-by-mad-fish,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-noindex-nofollow-toolkit-by-mad-fish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-eff805b4d7ec1d79e32d68ca80330ad6.yaml b/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-eff805b4d7ec1d79e32d68ca80330ad6.yaml new file mode 100644 index 0000000000..9772e6232d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish-eff805b4d7ec1d79e32d68ca80330ad6.yaml @@ -0,0 +1,58 @@ +id: bulk-noindex-nofollow-toolkit-by-mad-fish-eff805b4d7ec1d79e32d68ca80330ad6 + +info: + name: > + Bulk NoIndex & NoFollow Toolkit <= 1.42 - Reflected Cross-Site Scripting via 's' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e4f6305-d003-478e-a8ef-0b254084f56f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/" + google-query: inurl:"/wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-noindex-nofollow-toolkit-by-mad-fish,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-noindex-nofollow-toolkit-by-mad-fish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-noindex-nofollow-toolkit-by-mad-fish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-page-creator-8f6754331835c0e520f1fdc12e539318.yaml b/nuclei-templates/cve-less/plugins/bulk-page-creator-8f6754331835c0e520f1fdc12e539318.yaml new file mode 100644 index 0000000000..1a3ac47b51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-page-creator-8f6754331835c0e520f1fdc12e539318.yaml @@ -0,0 +1,58 @@ +id: bulk-page-creator-8f6754331835c0e520f1fdc12e539318 + +info: + name: > + Bulk Page Creator <= 1.1.3 - Cross-Site Request Forgery to Arbitrary Page Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee18df2-75ea-416a-8aa6-139018016b9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-page-creator/" + google-query: inurl:"/wp-content/plugins/bulk-page-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-page-creator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-page-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-page-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-resize-media-bb9fce36721cf5452da89d5517df1cbd.yaml b/nuclei-templates/cve-less/plugins/bulk-resize-media-bb9fce36721cf5452da89d5517df1cbd.yaml new file mode 100644 index 0000000000..232f283dda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-resize-media-bb9fce36721cf5452da89d5517df1cbd.yaml @@ -0,0 +1,58 @@ +id: bulk-resize-media-bb9fce36721cf5452da89d5517df1cbd + +info: + name: > + Bulk Resize Media <= 1.1 - Cross-Site Request Forgery via bulk_resize_resize_image + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/605fbfb9-85d8-43ff-a738-ad1a8a9584c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-resize-media/" + google-query: inurl:"/wp-content/plugins/bulk-resize-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-resize-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-resize-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-resize-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulk-woocommerce-category-creator-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bulk-woocommerce-category-creator-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ed3c2f925d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulk-woocommerce-category-creator-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bulk-woocommerce-category-creator-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulk-woocommerce-category-creator/" + google-query: inurl:"/wp-content/plugins/bulk-woocommerce-category-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulk-woocommerce-category-creator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulk-woocommerce-category-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulk-woocommerce-category-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletin-announcements-0716e418df849204967cfc79352f5ba7.yaml b/nuclei-templates/cve-less/plugins/bulletin-announcements-0716e418df849204967cfc79352f5ba7.yaml new file mode 100644 index 0000000000..32a3f66c91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletin-announcements-0716e418df849204967cfc79352f5ba7.yaml @@ -0,0 +1,58 @@ +id: bulletin-announcements-0716e418df849204967cfc79352f5ba7 + +info: + name: > + Announcement & Notification Banner – Bulletin <= 3.6.0 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d242a466-0611-4e64-8145-29f64100e62b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletin-announcements/" + google-query: inurl:"/wp-content/plugins/bulletin-announcements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletin-announcements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletin-announcements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletin-announcements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletin-announcements-246b8b56564018f48400096509996111.yaml b/nuclei-templates/cve-less/plugins/bulletin-announcements-246b8b56564018f48400096509996111.yaml new file mode 100644 index 0000000000..f1a88b0fda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletin-announcements-246b8b56564018f48400096509996111.yaml @@ -0,0 +1,58 @@ +id: bulletin-announcements-246b8b56564018f48400096509996111 + +info: + name: > + Announcement & Notification Banner – Bulletin <= 3.5.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/337d052c-6ee2-4cd0-8a69-a4b66b25517a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletin-announcements/" + google-query: inurl:"/wp-content/plugins/bulletin-announcements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletin-announcements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletin-announcements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletin-announcements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletin-announcements-5eb89c28ff961004bce910abdba4c1a6.yaml b/nuclei-templates/cve-less/plugins/bulletin-announcements-5eb89c28ff961004bce910abdba4c1a6.yaml new file mode 100644 index 0000000000..1164de6d5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletin-announcements-5eb89c28ff961004bce910abdba4c1a6.yaml @@ -0,0 +1,58 @@ +id: bulletin-announcements-5eb89c28ff961004bce910abdba4c1a6 + +info: + name: > + WordPress Announcement & Notification Banner Plugin – Bulletin <= 3.8.5 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66cd0ed5-070a-4408-9faa-b3d840279f77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletin-announcements/" + google-query: inurl:"/wp-content/plugins/bulletin-announcements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletin-announcements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletin-announcements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletin-announcements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletin-announcements-a1b8f44a7ac7bccab5a1c94f60d1251a.yaml b/nuclei-templates/cve-less/plugins/bulletin-announcements-a1b8f44a7ac7bccab5a1c94f60d1251a.yaml new file mode 100644 index 0000000000..2b4074586e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletin-announcements-a1b8f44a7ac7bccab5a1c94f60d1251a.yaml @@ -0,0 +1,58 @@ +id: bulletin-announcements-a1b8f44a7ac7bccab5a1c94f60d1251a + +info: + name: > + Announcement & Notification Banner – Bulletin <= 3.7.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b808450f-0ebf-4c49-a9e3-f1c1f2b1f632?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletin-announcements/" + google-query: inurl:"/wp-content/plugins/bulletin-announcements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletin-announcements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletin-announcements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletin-announcements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletin-announcements-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/bulletin-announcements-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..343b826afe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletin-announcements-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bulletin-announcements-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletin-announcements/" + google-query: inurl:"/wp-content/plugins/bulletin-announcements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletin-announcements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletin-announcements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletin-announcements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-05b396118a681cd132367b6e58e8468f.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-05b396118a681cd132367b6e58e8468f.yaml new file mode 100644 index 0000000000..2dc12eefdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-05b396118a681cd132367b6e58e8468f.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-05b396118a681cd132367b6e58e8468f + +info: + name: > + BulletProof Security < .52.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/171ee69a-d0d6-4d1e-b477-4d285be918f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< .52.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-123845e838da3a6daa580f3b2ed445cb.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-123845e838da3a6daa580f3b2ed445cb.yaml new file mode 100644 index 0000000000..16ed84cddd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-123845e838da3a6daa580f3b2ed445cb.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-123845e838da3a6daa580f3b2ed445cb + +info: + name: > + BulletProof Security <= .48.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d875969e-3749-4f0b-a807-36609bfca4d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< .48.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-2269359ddd46edefa6d111262722719c.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-2269359ddd46edefa6d111262722719c.yaml new file mode 100644 index 0000000000..3ece106e67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-2269359ddd46edefa6d111262722719c.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-2269359ddd46edefa6d111262722719c + +info: + name: > + BulletProof Security < .51.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0897d622-8e73-4bc0-a5f9-77bf8ddb4f93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< .51.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-42f3a7532bbf8a08643a30303225bc1a.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-42f3a7532bbf8a08643a30303225bc1a.yaml new file mode 100644 index 0000000000..b72c32351f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-42f3a7532bbf8a08643a30303225bc1a.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-42f3a7532bbf8a08643a30303225bc1a + +info: + name: > + BulletProof Security <= 5.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4735c491-9595-42b8-bb1c-1b18c89fcf7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-5dceb192e7c190761b3c97b152cbfe74.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-5dceb192e7c190761b3c97b152cbfe74.yaml new file mode 100644 index 0000000000..1bd4983d84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-5dceb192e7c190761b3c97b152cbfe74.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-5dceb192e7c190761b3c97b152cbfe74 + +info: + name: > + BulletProof Security <= .53.3 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f232f550-f964-4a69-9a80-aa9768149094?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< .53.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-69678c7361dde97e99f926d45953a3db.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-69678c7361dde97e99f926d45953a3db.yaml new file mode 100644 index 0000000000..5cd002e04f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-69678c7361dde97e99f926d45953a3db.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-69678c7361dde97e99f926d45953a3db + +info: + name: > + BulletProof Security < .51.1 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecf73f3a-5f7b-4ef4-a31a-f282b953f294?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< .51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-80f01f8956a520ccda68d02885c8eaae.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-80f01f8956a520ccda68d02885c8eaae.yaml new file mode 100644 index 0000000000..54603fa184 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-80f01f8956a520ccda68d02885c8eaae.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-80f01f8956a520ccda68d02885c8eaae + +info: + name: > + BulletProof Security < .51.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7d475d5-9c00-409c-ac07-276242540123?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< .51.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-8d9d8e003ce03da674f1adc87ce55135.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-8d9d8e003ce03da674f1adc87ce55135.yaml new file mode 100644 index 0000000000..6c4875604d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-8d9d8e003ce03da674f1adc87ce55135.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-8d9d8e003ce03da674f1adc87ce55135 + +info: + name: > + BulletProof Security <= 6.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e66d0c9c-39a2-4f09-b87f-630f1a8054ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-a2ffed6de9ed93ebd568a9a5d4586523.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-a2ffed6de9ed93ebd568a9a5d4586523.yaml new file mode 100644 index 0000000000..a60bdb97b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-a2ffed6de9ed93ebd568a9a5d4586523.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-a2ffed6de9ed93ebd568a9a5d4586523 + +info: + name: > + BulletProof Security <= .53.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eab98c41-f0f2-4953-b9b3-c08e1e92c03a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< .53.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-ae058acace8503cc8d5660ee1d5bf68e.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-ae058acace8503cc8d5660ee1d5bf68e.yaml new file mode 100644 index 0000000000..aed8ac7d98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-ae058acace8503cc8d5660ee1d5bf68e.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-ae058acace8503cc8d5660ee1d5bf68e + +info: + name: > + BulletProof Security < .47.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7448983b-47ad-4a71-84a8-ee1f96b3f6cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< .47.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bulletproof-security-cad2b6b8af5079972fa1531cce991f4d.yaml b/nuclei-templates/cve-less/plugins/bulletproof-security-cad2b6b8af5079972fa1531cce991f4d.yaml new file mode 100644 index 0000000000..92b514afd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bulletproof-security-cad2b6b8af5079972fa1531cce991f4d.yaml @@ -0,0 +1,58 @@ +id: bulletproof-security-cad2b6b8af5079972fa1531cce991f4d + +info: + name: > + BulletProof Security <= 5.7 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcbb6614-09fc-4f41-81f7-d70aa92101bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bulletproof-security/" + google-query: inurl:"/wp-content/plugins/bulletproof-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bulletproof-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bulletproof-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulletproof-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bunnycdn-c7b13d17993dc7e235bed80189f9bc22.yaml b/nuclei-templates/cve-less/plugins/bunnycdn-c7b13d17993dc7e235bed80189f9bc22.yaml new file mode 100644 index 0000000000..6308a36ec5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bunnycdn-c7b13d17993dc7e235bed80189f9bc22.yaml @@ -0,0 +1,58 @@ +id: bunnycdn-c7b13d17993dc7e235bed80189f9bc22 + +info: + name: > + bunny.net – WordPress CDN Plugin <= 2.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a31147b-791c-436f-9407-43485ec2ef50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bunnycdn/" + google-query: inurl:"/wp-content/plugins/bunnycdn/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bunnycdn,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bunnycdn/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bunnycdn" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/burst-pro-106e6826f0718372efc6e503171c8663.yaml b/nuclei-templates/cve-less/plugins/burst-pro-106e6826f0718372efc6e503171c8663.yaml new file mode 100644 index 0000000000..398c45a958 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/burst-pro-106e6826f0718372efc6e503171c8663.yaml @@ -0,0 +1,58 @@ +id: burst-pro-106e6826f0718372efc6e503171c8663 + +info: + name: > + Burst Statistics – Privacy-Friendly Analytics for WordPress 1.4.0 to 1.4.6.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30f8419c-c7b9-4c68-a845-26c0308d76f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/burst-pro/" + google-query: inurl:"/wp-content/plugins/burst-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,burst-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/burst-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "burst-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.4.0', '<= 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/burst-statistics-106e6826f0718372efc6e503171c8663.yaml b/nuclei-templates/cve-less/plugins/burst-statistics-106e6826f0718372efc6e503171c8663.yaml new file mode 100644 index 0000000000..44acc3fae7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/burst-statistics-106e6826f0718372efc6e503171c8663.yaml @@ -0,0 +1,58 @@ +id: burst-statistics-106e6826f0718372efc6e503171c8663 + +info: + name: > + Burst Statistics – Privacy-Friendly Analytics for WordPress 1.4.0 to 1.4.6.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30f8419c-c7b9-4c68-a845-26c0308d76f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/burst-statistics/" + google-query: inurl:"/wp-content/plugins/burst-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,burst-statistics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/burst-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "burst-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.4.0', '<= 1.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/burst-statistics-a36b6c8064388eb19a8195201a1f8d8d.yaml b/nuclei-templates/cve-less/plugins/burst-statistics-a36b6c8064388eb19a8195201a1f8d8d.yaml new file mode 100644 index 0000000000..be940b870c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/burst-statistics-a36b6c8064388eb19a8195201a1f8d8d.yaml @@ -0,0 +1,58 @@ +id: burst-statistics-a36b6c8064388eb19a8195201a1f8d8d + +info: + name: > + Burst Statistics – Privacy-Friendly Analytics for WordPress <= 1.5.6.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via burst_total_pageviews_count + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa587df5-9d96-4cac-ae5d-2a0485a3a789?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/burst-statistics/" + google-query: inurl:"/wp-content/plugins/burst-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,burst-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/burst-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "burst-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/burst-statistics-fd93b73cf46336153d1b2692824ed6b3.yaml b/nuclei-templates/cve-less/plugins/burst-statistics-fd93b73cf46336153d1b2692824ed6b3.yaml new file mode 100644 index 0000000000..d682783e96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/burst-statistics-fd93b73cf46336153d1b2692824ed6b3.yaml @@ -0,0 +1,58 @@ +id: burst-statistics-fd93b73cf46336153d1b2692824ed6b3 + +info: + name: > + Burst Statistics Really Simple Plugins <= 1.5.3 - Authenticated (Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e349f07d-a520-4700-a6e0-25e68c1deeae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/burst-statistics/" + google-query: inurl:"/wp-content/plugins/burst-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,burst-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/burst-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "burst-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bus-ticket-booking-with-seat-reservation-2954a20fc20c80e75db1c146dc2ce5bb.yaml b/nuclei-templates/cve-less/plugins/bus-ticket-booking-with-seat-reservation-2954a20fc20c80e75db1c146dc2ce5bb.yaml new file mode 100644 index 0000000000..1f3707dc87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bus-ticket-booking-with-seat-reservation-2954a20fc20c80e75db1c146dc2ce5bb.yaml @@ -0,0 +1,58 @@ +id: bus-ticket-booking-with-seat-reservation-2954a20fc20c80e75db1c146dc2ce5bb + +info: + name: > + Bus Ticket Booking with Seat Reservation <= 5.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff2855cb-e4a8-4412-af24-4cee03ae2d43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bus-ticket-booking-with-seat-reservation/" + google-query: inurl:"/wp-content/plugins/bus-ticket-booking-with-seat-reservation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bus-ticket-booking-with-seat-reservation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bus-ticket-booking-with-seat-reservation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bus-ticket-booking-with-seat-reservation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bus-ticket-booking-with-seat-reservation-dec87833cedb03a8980db3616c32b95d.yaml b/nuclei-templates/cve-less/plugins/bus-ticket-booking-with-seat-reservation-dec87833cedb03a8980db3616c32b95d.yaml new file mode 100644 index 0000000000..96da5b36f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bus-ticket-booking-with-seat-reservation-dec87833cedb03a8980db3616c32b95d.yaml @@ -0,0 +1,58 @@ +id: bus-ticket-booking-with-seat-reservation-dec87833cedb03a8980db3616c32b95d + +info: + name: > + Bus Ticket Booking with Seat Reservation <= 5.2.5 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9960282-4730-4ee8-b338-adcc57f01cc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bus-ticket-booking-with-seat-reservation/" + google-query: inurl:"/wp-content/plugins/bus-ticket-booking-with-seat-reservation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bus-ticket-booking-with-seat-reservation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bus-ticket-booking-with-seat-reservation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bus-ticket-booking-with-seat-reservation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-5e4c1e870696b3efcdbf85ce990788dc.yaml b/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-5e4c1e870696b3efcdbf85ce990788dc.yaml new file mode 100644 index 0000000000..4ea7d3bc0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-5e4c1e870696b3efcdbf85ce990788dc.yaml @@ -0,0 +1,58 @@ +id: business-card-by-esterox-100-5e4c1e870696b3efcdbf85ce990788dc + +info: + name: > + Business Card <= 1.0.0 - Cross-Site Request Forgery to Category Edit + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0c14e4e-9437-4e98-b720-72d6aab9e05f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-card-by-esterox-100/" + google-query: inurl:"/wp-content/plugins/business-card-by-esterox-100/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-card-by-esterox-100,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-card-by-esterox-100/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-card-by-esterox-100" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-7fc47d45293f896fc846aa4ca502d2b2.yaml b/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-7fc47d45293f896fc846aa4ca502d2b2.yaml new file mode 100644 index 0000000000..cc949ab346 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-7fc47d45293f896fc846aa4ca502d2b2.yaml @@ -0,0 +1,58 @@ +id: business-card-by-esterox-100-7fc47d45293f896fc846aa4ca502d2b2 + +info: + name: > + Business Card <= 1.0.0 - Cross-Site Request Forgery to Category Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef1362b5-576d-4d22-ad5d-89f38e8e3743?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-card-by-esterox-100/" + google-query: inurl:"/wp-content/plugins/business-card-by-esterox-100/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-card-by-esterox-100,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-card-by-esterox-100/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-card-by-esterox-100" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-8c18151f3e9775aa380622b4246d4bad.yaml b/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-8c18151f3e9775aa380622b4246d4bad.yaml new file mode 100644 index 0000000000..248cee9e15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-8c18151f3e9775aa380622b4246d4bad.yaml @@ -0,0 +1,58 @@ +id: business-card-by-esterox-100-8c18151f3e9775aa380622b4246d4bad + +info: + name: > + Business Card <= 1.0.0 - Cross-Site Request Forgery to Arbitrary Card Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/148ca1d5-c20d-40dc-b078-ecd76d4d6c0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-card-by-esterox-100/" + google-query: inurl:"/wp-content/plugins/business-card-by-esterox-100/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-card-by-esterox-100,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-card-by-esterox-100/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-card-by-esterox-100" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-95fc25676cc1a333e3b3171b175734a4.yaml b/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-95fc25676cc1a333e3b3171b175734a4.yaml new file mode 100644 index 0000000000..5092e71b9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-card-by-esterox-100-95fc25676cc1a333e3b3171b175734a4.yaml @@ -0,0 +1,58 @@ +id: business-card-by-esterox-100-95fc25676cc1a333e3b3171b175734a4 + +info: + name: > + Business Card <= 1.0.0 - Cross-Site Request Forgery to Card Edit + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3bad1f8-0351-421e-ab00-015e15643f0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-card-by-esterox-100/" + google-query: inurl:"/wp-content/plugins/business-card-by-esterox-100/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-card-by-esterox-100,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-card-by-esterox-100/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-card-by-esterox-100" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-directory-plugin-167e61af371a8f35ae376105d3215900.yaml b/nuclei-templates/cve-less/plugins/business-directory-plugin-167e61af371a8f35ae376105d3215900.yaml new file mode 100644 index 0000000000..c49d8a7486 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-directory-plugin-167e61af371a8f35ae376105d3215900.yaml @@ -0,0 +1,58 @@ +id: business-directory-plugin-167e61af371a8f35ae376105d3215900 + +info: + name: > + Business Directory Plugin < 5.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2984b9ca-e821-4c23-b792-4d0e54e44a7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-directory-plugin/" + google-query: inurl:"/wp-content/plugins/business-directory-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-directory-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-directory-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-directory-plugin-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml b/nuclei-templates/cve-less/plugins/business-directory-plugin-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml new file mode 100644 index 0000000000..31947d757f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-directory-plugin-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml @@ -0,0 +1,58 @@ +id: business-directory-plugin-3640b3daf83d6cd1e2aa52d4c7a270ac + +info: + name: > + Business Directory Plugin – Easy Listing Directories for WordPress <= 5.11.1 - Cross-Site Request Forgery to Arbitrary Listing Export + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3c8b3fa-dc27-4c00-844f-e95cac028247?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-directory-plugin/" + google-query: inurl:"/wp-content/plugins/business-directory-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-directory-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-directory-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-directory-plugin-3950561f5b69ad2aadeaa54bf293ca85.yaml b/nuclei-templates/cve-less/plugins/business-directory-plugin-3950561f5b69ad2aadeaa54bf293ca85.yaml new file mode 100644 index 0000000000..8571c175b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-directory-plugin-3950561f5b69ad2aadeaa54bf293ca85.yaml @@ -0,0 +1,58 @@ +id: business-directory-plugin-3950561f5b69ad2aadeaa54bf293ca85 + +info: + name: > + Business Directory Plugin <= 5.11.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44e70eb9-f411-49da-b169-a5af8a9ace0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-directory-plugin/" + google-query: inurl:"/wp-content/plugins/business-directory-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-directory-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-directory-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-directory-plugin-3fa1d19f6ab4b3b413035e0d19283cea.yaml b/nuclei-templates/cve-less/plugins/business-directory-plugin-3fa1d19f6ab4b3b413035e0d19283cea.yaml new file mode 100644 index 0000000000..573f41c5df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-directory-plugin-3fa1d19f6ab4b3b413035e0d19283cea.yaml @@ -0,0 +1,58 @@ +id: business-directory-plugin-3fa1d19f6ab4b3b413035e0d19283cea + +info: + name: > + Business Directory Plugin <= 6.3.9 - Missing Authorization via dispatch + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea3c5188-4570-4958-8b2d-69048b10c5f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-directory-plugin/" + google-query: inurl:"/wp-content/plugins/business-directory-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-directory-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-directory-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-directory-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-directory-plugin-6896fd40fd840eb45a889008aea0c67e.yaml b/nuclei-templates/cve-less/plugins/business-directory-plugin-6896fd40fd840eb45a889008aea0c67e.yaml new file mode 100644 index 0000000000..34743a601b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-directory-plugin-6896fd40fd840eb45a889008aea0c67e.yaml @@ -0,0 +1,58 @@ +id: business-directory-plugin-6896fd40fd840eb45a889008aea0c67e + +info: + name: > + Business Directory Plugin <= 6.3.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ab0cad4-1a82-4127-bedb-c0ddfce4ec10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-directory-plugin/" + google-query: inurl:"/wp-content/plugins/business-directory-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-directory-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-directory-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-directory-plugin-70e9f9d703b7871b412f99e0b65bc826.yaml b/nuclei-templates/cve-less/plugins/business-directory-plugin-70e9f9d703b7871b412f99e0b65bc826.yaml new file mode 100644 index 0000000000..7707ec1498 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-directory-plugin-70e9f9d703b7871b412f99e0b65bc826.yaml @@ -0,0 +1,58 @@ +id: business-directory-plugin-70e9f9d703b7871b412f99e0b65bc826 + +info: + name: > + Business Directory Plugin <= 5.11 - Authenticated PHP4 Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e84fbbf-05b0-497b-81d8-1b029d24cddd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-directory-plugin/" + google-query: inurl:"/wp-content/plugins/business-directory-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-directory-plugin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-directory-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-directory-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-directory-plugin-c7ee5314e18860cb525cd22fac24dbf3.yaml b/nuclei-templates/cve-less/plugins/business-directory-plugin-c7ee5314e18860cb525cd22fac24dbf3.yaml new file mode 100644 index 0000000000..4c79c298fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-directory-plugin-c7ee5314e18860cb525cd22fac24dbf3.yaml @@ -0,0 +1,58 @@ +id: business-directory-plugin-c7ee5314e18860cb525cd22fac24dbf3 + +info: + name: > + Business Directory Plugin <= 5.11.1 - Cross-Site Request Forgery to Arbitrary Payment History Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2487a5e-f038-414b-bc88-ed2c7f2c624c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-directory-plugin/" + google-query: inurl:"/wp-content/plugins/business-directory-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-directory-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-directory-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-directory-plugin-f1a649593702eb632f6f553b9ae25e5a.yaml b/nuclei-templates/cve-less/plugins/business-directory-plugin-f1a649593702eb632f6f553b9ae25e5a.yaml new file mode 100644 index 0000000000..87d338f0f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-directory-plugin-f1a649593702eb632f6f553b9ae25e5a.yaml @@ -0,0 +1,58 @@ +id: business-directory-plugin-f1a649593702eb632f6f553b9ae25e5a + +info: + name: > + Business Directory Plugin <= 5.10.1 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35e220c0-1e4d-4365-a1be-de66930fa559?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-directory-plugin/" + google-query: inurl:"/wp-content/plugins/business-directory-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-directory-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-directory-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-hours-indicator-b0f7eacb55c0790170a8a4009593c548.yaml b/nuclei-templates/cve-less/plugins/business-hours-indicator-b0f7eacb55c0790170a8a4009593c548.yaml new file mode 100644 index 0000000000..7fe6a65cab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-hours-indicator-b0f7eacb55c0790170a8a4009593c548.yaml @@ -0,0 +1,58 @@ +id: business-hours-indicator-b0f7eacb55c0790170a8a4009593c548 + +info: + name: > + Business Hours Indicator <= 2.3.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b38d892-6797-43ae-9f17-f8f90222911e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-hours-indicator/" + google-query: inurl:"/wp-content/plugins/business-hours-indicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-hours-indicator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-hours-indicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-hours-indicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-manager-24e7ccbee7ca416ae56183733be3750e.yaml b/nuclei-templates/cve-less/plugins/business-manager-24e7ccbee7ca416ae56183733be3750e.yaml new file mode 100644 index 0000000000..c359c47dda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-manager-24e7ccbee7ca416ae56183733be3750e.yaml @@ -0,0 +1,58 @@ +id: business-manager-24e7ccbee7ca416ae56183733be3750e + +info: + name: > + Business Manager <= 1.4.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94cbd525-de3b-448a-b65b-21c63208b8b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-manager/" + google-query: inurl:"/wp-content/plugins/business-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/business-profile-828427f0b9437525d7829a16b68575dc.yaml b/nuclei-templates/cve-less/plugins/business-profile-828427f0b9437525d7829a16b68575dc.yaml new file mode 100644 index 0000000000..acec43bd87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/business-profile-828427f0b9437525d7829a16b68575dc.yaml @@ -0,0 +1,58 @@ +id: business-profile-828427f0b9437525d7829a16b68575dc + +info: + name: > + Five Star Business Profile and Schema <= 2.1.6 - Subscriber+ Page Creation & Settings Update to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0daeb94-1028-4163-af9d-0a6d7a00269f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/business-profile/" + google-query: inurl:"/wp-content/plugins/business-profile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,business-profile,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/business-profile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-profile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-3e24dfff2b5771f43f4fe5ad4a241e28.yaml b/nuclei-templates/cve-less/plugins/button-3e24dfff2b5771f43f4fe5ad4a241e28.yaml new file mode 100644 index 0000000000..3b23b49713 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-3e24dfff2b5771f43f4fe5ad4a241e28.yaml @@ -0,0 +1,58 @@ +id: button-3e24dfff2b5771f43f4fe5ad4a241e28 + +info: + name: > + Button <= 1.1.27 - Authenticated (Contributor+) PHP Object Injection in button_shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3d26aa4-8bea-48e8-ad14-513690a31831?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button/" + google-query: inurl:"/wp-content/plugins/button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-63f1bf4087d9427b6d24f67f8ffe6d66.yaml b/nuclei-templates/cve-less/plugins/button-63f1bf4087d9427b6d24f67f8ffe6d66.yaml new file mode 100644 index 0000000000..8a5f5eb914 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-63f1bf4087d9427b6d24f67f8ffe6d66.yaml @@ -0,0 +1,58 @@ +id: button-63f1bf4087d9427b6d24f67f8ffe6d66 + +info: + name: > + Button <= 1.1.22 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9905517f-236c-4e98-8026-8d54bf64c7c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button/" + google-query: inurl:"/wp-content/plugins/button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-contact-vr-978cbd8cd586092e7c39e28ce0b70684.yaml b/nuclei-templates/cve-less/plugins/button-contact-vr-978cbd8cd586092e7c39e28ce0b70684.yaml new file mode 100644 index 0000000000..6e0e601a32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-contact-vr-978cbd8cd586092e7c39e28ce0b70684.yaml @@ -0,0 +1,58 @@ +id: button-contact-vr-978cbd8cd586092e7c39e28ce0b70684 + +info: + name: > + Button contact VR <= 4.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/007d8935-974f-4bc4-833e-25ca50a50a29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button-contact-vr/" + google-query: inurl:"/wp-content/plugins/button-contact-vr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button-contact-vr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button-contact-vr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button-contact-vr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-generation-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/button-generation-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..7c46b579ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-generation-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: button-generation-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button-generation/" + google-query: inurl:"/wp-content/plugins/button-generation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button-generation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button-generation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button-generation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-generation-0ad7f5a9c3342b7aeba5a03db14c71d0.yaml b/nuclei-templates/cve-less/plugins/button-generation-0ad7f5a9c3342b7aeba5a03db14c71d0.yaml new file mode 100644 index 0000000000..e2a4ecf8ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-generation-0ad7f5a9c3342b7aeba5a03db14c71d0.yaml @@ -0,0 +1,58 @@ +id: button-generation-0ad7f5a9c3342b7aeba5a03db14c71d0 + +info: + name: > + Button Generator – easily Button Builder <= 2.3.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ac9262a-96a6-439a-a2b0-a05f24654d06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button-generation/" + google-query: inurl:"/wp-content/plugins/button-generation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button-generation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button-generation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button-generation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-generation-0ea9d75794d2c7486ec9098022942b0a.yaml b/nuclei-templates/cve-less/plugins/button-generation-0ea9d75794d2c7486ec9098022942b0a.yaml new file mode 100644 index 0000000000..77f09557b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-generation-0ea9d75794d2c7486ec9098022942b0a.yaml @@ -0,0 +1,58 @@ +id: button-generation-0ea9d75794d2c7486ec9098022942b0a + +info: + name: > + Button Generator – easily Button Builder <= 2.3.5 - Cross-Site Request Forgery in tools-data-base.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af803612-96ae-41ee-8ad3-8f9319b147e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button-generation/" + google-query: inurl:"/wp-content/plugins/button-generation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button-generation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button-generation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button-generation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-generation-42e2e881f29393c821ce6d432bf2a46a.yaml b/nuclei-templates/cve-less/plugins/button-generation-42e2e881f29393c821ce6d432bf2a46a.yaml new file mode 100644 index 0000000000..19ca14d51c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-generation-42e2e881f29393c821ce6d432bf2a46a.yaml @@ -0,0 +1,58 @@ +id: button-generation-42e2e881f29393c821ce6d432bf2a46a + +info: + name: > + Button Generator – easily Button Builder <= 2.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e78097a6-6828-4d62-abf0-995a906ad68b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button-generation/" + google-query: inurl:"/wp-content/plugins/button-generation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button-generation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button-generation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button-generation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-generation-82603c2847e2ca1ee15bc23d829fbc4a.yaml b/nuclei-templates/cve-less/plugins/button-generation-82603c2847e2ca1ee15bc23d829fbc4a.yaml new file mode 100644 index 0000000000..ecfb885c7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-generation-82603c2847e2ca1ee15bc23d829fbc4a.yaml @@ -0,0 +1,58 @@ +id: button-generation-82603c2847e2ca1ee15bc23d829fbc4a + +info: + name: > + Button Generator – easily Button Builder <= 2.3.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73dd286e-5338-42d2-9928-1e14150ccf56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button-generation/" + google-query: inurl:"/wp-content/plugins/button-generation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button-generation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button-generation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button-generation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-generation-913a26462c41f8def73f8a9767771136.yaml b/nuclei-templates/cve-less/plugins/button-generation-913a26462c41f8def73f8a9767771136.yaml new file mode 100644 index 0000000000..62af7c5e08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-generation-913a26462c41f8def73f8a9767771136.yaml @@ -0,0 +1,58 @@ +id: button-generation-913a26462c41f8def73f8a9767771136 + +info: + name: > + Button Generator – easily Button Builder <= 2.3.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b73467de-fb0c-45e3-b3ae-5158b261907b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button-generation/" + google-query: inurl:"/wp-content/plugins/button-generation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button-generation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button-generation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button-generation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/button-generation-fb1c9dec29fbcdf7eb9112a479b097f2.yaml b/nuclei-templates/cve-less/plugins/button-generation-fb1c9dec29fbcdf7eb9112a479b097f2.yaml new file mode 100644 index 0000000000..8a8148e1bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/button-generation-fb1c9dec29fbcdf7eb9112a479b097f2.yaml @@ -0,0 +1,58 @@ +id: button-generation-fb1c9dec29fbcdf7eb9112a479b097f2 + +info: + name: > + Button Generator – easily Button Builder <= 2.3.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88ca14d5-bbdd-4efa-a729-40a73f701aae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/button-generation/" + google-query: inurl:"/wp-content/plugins/button-generation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,button-generation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/button-generation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "button-generation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buttonizer-multifunctional-button-456677c70a49bc1c088cafa5c6ef9da9.yaml b/nuclei-templates/cve-less/plugins/buttonizer-multifunctional-button-456677c70a49bc1c088cafa5c6ef9da9.yaml new file mode 100644 index 0000000000..e4f17bf936 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buttonizer-multifunctional-button-456677c70a49bc1c088cafa5c6ef9da9.yaml @@ -0,0 +1,58 @@ +id: buttonizer-multifunctional-button-456677c70a49bc1c088cafa5c6ef9da9 + +info: + name: > + Buttonizer - Smart Floating Action Button <= 2.5.4 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15aba6ee-8345-401d-adf9-3fde0f5169bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buttonizer-multifunctional-button/" + google-query: inurl:"/wp-content/plugins/buttonizer-multifunctional-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buttonizer-multifunctional-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buttonizer-multifunctional-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buttonizer-multifunctional-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buttonizer-multifunctional-button-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/buttonizer-multifunctional-button-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..80eb13f2d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buttonizer-multifunctional-button-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: buttonizer-multifunctional-button-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buttonizer-multifunctional-button/" + google-query: inurl:"/wp-content/plugins/buttonizer-multifunctional-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buttonizer-multifunctional-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buttonizer-multifunctional-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buttonizer-multifunctional-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buttons-shortcode-and-widget-b4d222d7f6fbba49026992c33a4f820f.yaml b/nuclei-templates/cve-less/plugins/buttons-shortcode-and-widget-b4d222d7f6fbba49026992c33a4f820f.yaml new file mode 100644 index 0000000000..948e02f6c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buttons-shortcode-and-widget-b4d222d7f6fbba49026992c33a4f820f.yaml @@ -0,0 +1,58 @@ +id: buttons-shortcode-and-widget-b4d222d7f6fbba49026992c33a4f820f + +info: + name: > + Buttons Shortcode and Widget <= 1.16 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea6e0856-ba3d-4fa1-ac90-45a51ff994ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buttons-shortcode-and-widget/" + google-query: inurl:"/wp-content/plugins/buttons-shortcode-and-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buttons-shortcode-and-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buttons-shortcode-and-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buttons-shortcode-and-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buttons-x-f3522c3cb0ccfb1220b311f9a238555b.yaml b/nuclei-templates/cve-less/plugins/buttons-x-f3522c3cb0ccfb1220b311f9a238555b.yaml new file mode 100644 index 0000000000..b235f40398 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buttons-x-f3522c3cb0ccfb1220b311f9a238555b.yaml @@ -0,0 +1,58 @@ +id: buttons-x-f3522c3cb0ccfb1220b311f9a238555b + +info: + name: > + Button Builder – Buttons X <= 0.8.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1aea8fe3-7c75-4d3a-847a-ce0d1f9700f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buttons-x/" + google-query: inurl:"/wp-content/plugins/buttons-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buttons-x,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buttons-x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buttons-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buymeacoffee-0caf8903231ef8666af5245315083b74.yaml b/nuclei-templates/cve-less/plugins/buymeacoffee-0caf8903231ef8666af5245315083b74.yaml new file mode 100644 index 0000000000..1cd15bfc4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buymeacoffee-0caf8903231ef8666af5245315083b74.yaml @@ -0,0 +1,58 @@ +id: buymeacoffee-0caf8903231ef8666af5245315083b74 + +info: + name: > + Buy Me a Coffee – Button and Widget Plugin <= 3.6 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9f8948-085b-4ac5-befd-c70085aa23cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buymeacoffee/" + google-query: inurl:"/wp-content/plugins/buymeacoffee/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buymeacoffee,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buymeacoffee/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buymeacoffee" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buymeacoffee-514e5589e35f6de5b251e63d9ba1561e.yaml b/nuclei-templates/cve-less/plugins/buymeacoffee-514e5589e35f6de5b251e63d9ba1561e.yaml new file mode 100644 index 0000000000..f7a9ef182f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buymeacoffee-514e5589e35f6de5b251e63d9ba1561e.yaml @@ -0,0 +1,58 @@ +id: buymeacoffee-514e5589e35f6de5b251e63d9ba1561e + +info: + name: > + Buy Me a Coffee – Button and Widget Plugin <= 3.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6309258e-e4fc-4edf-a771-2d82a9a85a5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buymeacoffee/" + google-query: inurl:"/wp-content/plugins/buymeacoffee/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buymeacoffee,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buymeacoffee/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buymeacoffee" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buymeacoffee-9c9be48d36983f46c1dafc5a934e6547.yaml b/nuclei-templates/cve-less/plugins/buymeacoffee-9c9be48d36983f46c1dafc5a934e6547.yaml new file mode 100644 index 0000000000..e6e686751e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buymeacoffee-9c9be48d36983f46c1dafc5a934e6547.yaml @@ -0,0 +1,58 @@ +id: buymeacoffee-9c9be48d36983f46c1dafc5a934e6547 + +info: + name: > + Buy Me a Coffee – Button and Widget Plugin <= 3.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1c218c6-1599-4dc9-846f-e0ef74821488?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buymeacoffee/" + google-query: inurl:"/wp-content/plugins/buymeacoffee/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buymeacoffee,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buymeacoffee/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buymeacoffee" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buymeacoffee-e74780b7e51cbe82d58b11a6033838ff.yaml b/nuclei-templates/cve-less/plugins/buymeacoffee-e74780b7e51cbe82d58b11a6033838ff.yaml new file mode 100644 index 0000000000..c6d008b27c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buymeacoffee-e74780b7e51cbe82d58b11a6033838ff.yaml @@ -0,0 +1,58 @@ +id: buymeacoffee-e74780b7e51cbe82d58b11a6033838ff + +info: + name: > + Buy Me a Coffee – Button and Widget Plugin <= 3.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8f3ce3d-ae8a-4c0f-a74d-657225a932f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buymeacoffee/" + google-query: inurl:"/wp-content/plugins/buymeacoffee/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buymeacoffee,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buymeacoffee/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buymeacoffee" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/buzzsprout-podcasting-469ce07115e491efc4cb1c8371dce59b.yaml b/nuclei-templates/cve-less/plugins/buzzsprout-podcasting-469ce07115e491efc4cb1c8371dce59b.yaml new file mode 100644 index 0000000000..9889c00956 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/buzzsprout-podcasting-469ce07115e491efc4cb1c8371dce59b.yaml @@ -0,0 +1,58 @@ +id: buzzsprout-podcasting-469ce07115e491efc4cb1c8371dce59b + +info: + name: > + Buzzsprout Podcasting <= 1.8.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be7f8b73-801d-46e8-81c1-8bb0bb576700?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/buzzsprout-podcasting/" + google-query: inurl:"/wp-content/plugins/buzzsprout-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,buzzsprout-podcasting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/buzzsprout-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buzzsprout-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bwl-advanced-faq-manager-1fb9c20f2dc722c53163029233b7680b.yaml b/nuclei-templates/cve-less/plugins/bwl-advanced-faq-manager-1fb9c20f2dc722c53163029233b7680b.yaml new file mode 100644 index 0000000000..52ce549051 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bwl-advanced-faq-manager-1fb9c20f2dc722c53163029233b7680b.yaml @@ -0,0 +1,58 @@ +id: bwl-advanced-faq-manager-1fb9c20f2dc722c53163029233b7680b + +info: + name: > + BWL Advanced FAQ Manager <= 2.0.3 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa66da82-8733-41cb-a276-620577d79e44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bwl-advanced-faq-manager/" + google-query: inurl:"/wp-content/plugins/bwl-advanced-faq-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bwl-advanced-faq-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bwl-advanced-faq-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bwl-advanced-faq-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bwp-google-xml-sitemaps-e5558e0a5f22ef3f76543aa9614d9789.yaml b/nuclei-templates/cve-less/plugins/bwp-google-xml-sitemaps-e5558e0a5f22ef3f76543aa9614d9789.yaml new file mode 100644 index 0000000000..3299dd0ee8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bwp-google-xml-sitemaps-e5558e0a5f22ef3f76543aa9614d9789.yaml @@ -0,0 +1,58 @@ +id: bwp-google-xml-sitemaps-e5558e0a5f22ef3f76543aa9614d9789 + +info: + name: > + Better WordPress Google XML Sitemaps <= 1.4.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5675962-7d7f-46f4-b588-e46af212e9c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bwp-google-xml-sitemaps/" + google-query: inurl:"/wp-content/plugins/bwp-google-xml-sitemaps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bwp-google-xml-sitemaps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bwp-google-xml-sitemaps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bwp-google-xml-sitemaps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bwp-recaptcha-2fe5526a4726214454b149388de7772d.yaml b/nuclei-templates/cve-less/plugins/bwp-recaptcha-2fe5526a4726214454b149388de7772d.yaml new file mode 100644 index 0000000000..a95f80317b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bwp-recaptcha-2fe5526a4726214454b149388de7772d.yaml @@ -0,0 +1,58 @@ +id: bwp-recaptcha-2fe5526a4726214454b149388de7772d + +info: + name: > + Better WordPress reCAPTCHA <= 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/478723c4-cc45-4241-af45-21ee537f1dfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bwp-recaptcha/" + google-query: inurl:"/wp-content/plugins/bwp-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bwp-recaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bwp-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bwp-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-featured-posts-5c14fa33e85650f1c6cb1512fa1848c3.yaml b/nuclei-templates/cve-less/plugins/bws-featured-posts-5c14fa33e85650f1c6cb1512fa1848c3.yaml new file mode 100644 index 0000000000..c2139fc625 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-featured-posts-5c14fa33e85650f1c6cb1512fa1848c3.yaml @@ -0,0 +1,58 @@ +id: bws-featured-posts-5c14fa33e85650f1c6cb1512fa1848c3 + +info: + name: > + Featured Posts by BestWebSoft < 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f10c476-ce0c-4204-8f68-46c12dac1ade?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-featured-posts/" + google-query: inurl:"/wp-content/plugins/bws-featured-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-featured-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-featured-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-featured-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-google-analytics-1758588699ac13a0da770bd7cd456b77.yaml b/nuclei-templates/cve-less/plugins/bws-google-analytics-1758588699ac13a0da770bd7cd456b77.yaml new file mode 100644 index 0000000000..7b169385cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-google-analytics-1758588699ac13a0da770bd7cd456b77.yaml @@ -0,0 +1,58 @@ +id: bws-google-analytics-1758588699ac13a0da770bd7cd456b77 + +info: + name: > + Analytics <= 1.7.0 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9900533-0724-445f-9d56-8a0422479448?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-google-analytics/" + google-query: inurl:"/wp-content/plugins/bws-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-google-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-google-maps-f5ede402fdf5293b860276b605ce4e8f.yaml b/nuclei-templates/cve-less/plugins/bws-google-maps-f5ede402fdf5293b860276b605ce4e8f.yaml new file mode 100644 index 0000000000..714b00a94e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-google-maps-f5ede402fdf5293b860276b605ce4e8f.yaml @@ -0,0 +1,58 @@ +id: bws-google-maps-f5ede402fdf5293b860276b605ce4e8f + +info: + name: > + Maps by BestWebSoft <= 1.3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/419df0c4-1e78-47da-b28d-5ab1cb66729a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-google-maps/" + google-query: inurl:"/wp-content/plugins/bws-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-latest-posts-2af654d4e68b70fada0ba70d7ef43915.yaml b/nuclei-templates/cve-less/plugins/bws-latest-posts-2af654d4e68b70fada0ba70d7ef43915.yaml new file mode 100644 index 0000000000..1c5e02344f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-latest-posts-2af654d4e68b70fada0ba70d7ef43915.yaml @@ -0,0 +1,58 @@ +id: bws-latest-posts-2af654d4e68b70fada0ba70d7ef43915 + +info: + name: > + Latest Posts by BestWebSoft < 0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8580107-bbc1-4d6e-bb72-f1efc404d7b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-latest-posts/" + google-query: inurl:"/wp-content/plugins/bws-latest-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-latest-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-latest-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-latest-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-linkedin-b2f000587e20cf237a45ef2d6036a9a0.yaml b/nuclei-templates/cve-less/plugins/bws-linkedin-b2f000587e20cf237a45ef2d6036a9a0.yaml new file mode 100644 index 0000000000..9b29207696 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-linkedin-b2f000587e20cf237a45ef2d6036a9a0.yaml @@ -0,0 +1,58 @@ +id: bws-linkedin-b2f000587e20cf237a45ef2d6036a9a0 + +info: + name: > + BestWebSoft's LinkedIn < 1.0.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3db65e14-50c6-4afe-84e5-0785fe9bf77a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-linkedin/" + google-query: inurl:"/wp-content/plugins/bws-linkedin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-linkedin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-linkedin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-linkedin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-pinterest-e64b2928f117109f88452f28d939f5ac.yaml b/nuclei-templates/cve-less/plugins/bws-pinterest-e64b2928f117109f88452f28d939f5ac.yaml new file mode 100644 index 0000000000..b6310518aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-pinterest-e64b2928f117109f88452f28d939f5ac.yaml @@ -0,0 +1,58 @@ +id: bws-pinterest-e64b2928f117109f88452f28d939f5ac + +info: + name: > + BestWebSoft's Pinterest <= 1.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b631ba7f-105d-4fe4-9173-4f7eade92d54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-pinterest/" + google-query: inurl:"/wp-content/plugins/bws-pinterest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-pinterest,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-pinterest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-pinterest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-popular-posts-baca13b0bce150bcaf2ee5c05eb2cc1d.yaml b/nuclei-templates/cve-less/plugins/bws-popular-posts-baca13b0bce150bcaf2ee5c05eb2cc1d.yaml new file mode 100644 index 0000000000..ebbe2e7e34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-popular-posts-baca13b0bce150bcaf2ee5c05eb2cc1d.yaml @@ -0,0 +1,58 @@ +id: bws-popular-posts-baca13b0bce150bcaf2ee5c05eb2cc1d + +info: + name: > + Popular Posts by BestWebSoft < 1.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/730dac2b-edc2-4bfc-a1c5-ffeba71308ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-popular-posts/" + google-query: inurl:"/wp-content/plugins/bws-popular-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-popular-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-popular-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-popular-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-smtp-6356cf8af8f87c1115ab1b364de5897a.yaml b/nuclei-templates/cve-less/plugins/bws-smtp-6356cf8af8f87c1115ab1b364de5897a.yaml new file mode 100644 index 0000000000..09848d66cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-smtp-6356cf8af8f87c1115ab1b364de5897a.yaml @@ -0,0 +1,58 @@ +id: bws-smtp-6356cf8af8f87c1115ab1b364de5897a + +info: + name: > + SMTP by BestWebSoft <= 1.0.9 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ff464d0-7aa4-4a79-a8d2-ea51398c40f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-smtp/" + google-query: inurl:"/wp-content/plugins/bws-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bws-testimonials-11832d8ff71b77f5c5443c834508a4b9.yaml b/nuclei-templates/cve-less/plugins/bws-testimonials-11832d8ff71b77f5c5443c834508a4b9.yaml new file mode 100644 index 0000000000..36ca0aa42a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bws-testimonials-11832d8ff71b77f5c5443c834508a4b9.yaml @@ -0,0 +1,58 @@ +id: bws-testimonials-11832d8ff71b77f5c5443c834508a4b9 + +info: + name: > + Testimonials by BestWebSoft <= 0.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba426d2f-aa05-4316-86ca-228f21785f63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bws-testimonials/" + google-query: inurl:"/wp-content/plugins/bws-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bws-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bws-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bws-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bxslider-wp-629a86e61ae281b9190188a5f16e6d8f.yaml b/nuclei-templates/cve-less/plugins/bxslider-wp-629a86e61ae281b9190188a5f16e6d8f.yaml new file mode 100644 index 0000000000..6b7a67670f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bxslider-wp-629a86e61ae281b9190188a5f16e6d8f.yaml @@ -0,0 +1,58 @@ +id: bxslider-wp-629a86e61ae281b9190188a5f16e6d8f + +info: + name: > + BxSlider WP <= 2.0.0 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfa2af3d-ef5a-484b-83a3-552b03b16f4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bxslider-wp/" + google-query: inurl:"/wp-content/plugins/bxslider-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bxslider-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bxslider-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bxslider-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/byconsole-woo-order-delivery-time-9473021a502a63a62049e1b92de7e47f.yaml b/nuclei-templates/cve-less/plugins/byconsole-woo-order-delivery-time-9473021a502a63a62049e1b92de7e47f.yaml new file mode 100644 index 0000000000..11bdae66b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/byconsole-woo-order-delivery-time-9473021a502a63a62049e1b92de7e47f.yaml @@ -0,0 +1,58 @@ +id: byconsole-woo-order-delivery-time-9473021a502a63a62049e1b92de7e47f + +info: + name: > + WooODT Lite <= 2.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ede4b8ad-3c12-4ed8-9eda-806afa580bad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/byconsole-woo-order-delivery-time/" + google-query: inurl:"/wp-content/plugins/byconsole-woo-order-delivery-time/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,byconsole-woo-order-delivery-time,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/byconsole-woo-order-delivery-time/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "byconsole-woo-order-delivery-time" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/byconsole-woo-order-delivery-time-cd5b979265c6693d84b238525b6e2413.yaml b/nuclei-templates/cve-less/plugins/byconsole-woo-order-delivery-time-cd5b979265c6693d84b238525b6e2413.yaml new file mode 100644 index 0000000000..2b8d1397f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/byconsole-woo-order-delivery-time-cd5b979265c6693d84b238525b6e2413.yaml @@ -0,0 +1,58 @@ +id: byconsole-woo-order-delivery-time-cd5b979265c6693d84b238525b6e2413 + +info: + name: > + WooODT Lite <= 2.4.6 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9939f297-e3ca-4d7d-9acd-c416ee2014c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/byconsole-woo-order-delivery-time/" + google-query: inurl:"/wp-content/plugins/byconsole-woo-order-delivery-time/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,byconsole-woo-order-delivery-time,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/byconsole-woo-order-delivery-time/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "byconsole-woo-order-delivery-time" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/bzscore-live-score-192e415b611335b3538e5f2af9fbc394.yaml b/nuclei-templates/cve-less/plugins/bzscore-live-score-192e415b611335b3538e5f2af9fbc394.yaml new file mode 100644 index 0000000000..c8e5c2b602 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/bzscore-live-score-192e415b611335b3538e5f2af9fbc394.yaml @@ -0,0 +1,58 @@ +id: bzscore-live-score-192e415b611335b3538e5f2af9fbc394 + +info: + name: > + BZScore – Live Score <= 1.03 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/438a94c4-a7f2-4c08-960b-e18c19196169?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bzscore-live-score/" + google-query: inurl:"/wp-content/plugins/bzscore-live-score/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bzscore-live-score,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bzscore-live-score/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bzscore-live-score" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cab-fare-calculator-850cdc2bb11e2c84c49d36aadc35f92a.yaml b/nuclei-templates/cve-less/plugins/cab-fare-calculator-850cdc2bb11e2c84c49d36aadc35f92a.yaml new file mode 100644 index 0000000000..38195be3fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cab-fare-calculator-850cdc2bb11e2c84c49d36aadc35f92a.yaml @@ -0,0 +1,58 @@ +id: cab-fare-calculator-850cdc2bb11e2c84c49d36aadc35f92a + +info: + name: > + Cab fare calculator <= 1.0.3 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6990abdc-232f-4c25-8cba-c2639f315434?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cab-fare-calculator/" + google-query: inurl:"/wp-content/plugins/cab-fare-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cab-fare-calculator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cab-fare-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cab-fare-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cab-grid-e859444e797e41b8d664b82e23a899ba.yaml b/nuclei-templates/cve-less/plugins/cab-grid-e859444e797e41b8d664b82e23a899ba.yaml new file mode 100644 index 0000000000..19e4ce3463 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cab-grid-e859444e797e41b8d664b82e23a899ba.yaml @@ -0,0 +1,58 @@ +id: cab-grid-e859444e797e41b8d664b82e23a899ba + +info: + name: > + Cab Grid <= 1.5.15 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09c629b-9908-4548-b828-9e6140ff5670?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cab-grid/" + google-query: inurl:"/wp-content/plugins/cab-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cab-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cab-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cab-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cache-images-0c97fc31b35102d21ddbee9abbb4d9fd.yaml b/nuclei-templates/cve-less/plugins/cache-images-0c97fc31b35102d21ddbee9abbb4d9fd.yaml new file mode 100644 index 0000000000..fe2cff92fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cache-images-0c97fc31b35102d21ddbee9abbb4d9fd.yaml @@ -0,0 +1,58 @@ +id: cache-images-0c97fc31b35102d21ddbee9abbb4d9fd + +info: + name: > + Cache Images <= 3.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94df820c-cafb-4a43-ace1-ec396b1ae6c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cache-images/" + google-query: inurl:"/wp-content/plugins/cache-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cache-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cache-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cache-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cache-images-182ea68949b1ee6faae255d4de23157d.yaml b/nuclei-templates/cve-less/plugins/cache-images-182ea68949b1ee6faae255d4de23157d.yaml new file mode 100644 index 0000000000..b823d13dda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cache-images-182ea68949b1ee6faae255d4de23157d.yaml @@ -0,0 +1,58 @@ +id: cache-images-182ea68949b1ee6faae255d4de23157d + +info: + name: > + Cache Images <= 3.2 - Cross-Site Request Forgery to Image Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4a70eec-ee14-4bef-8d23-5954b1f1baf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cache-images/" + google-query: inurl:"/wp-content/plugins/cache-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cache-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cache-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cache-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caddy-b41c7809a15dd29e69a83cb3726570dc.yaml b/nuclei-templates/cve-less/plugins/caddy-b41c7809a15dd29e69a83cb3726570dc.yaml new file mode 100644 index 0000000000..d973855392 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caddy-b41c7809a15dd29e69a83cb3726570dc.yaml @@ -0,0 +1,58 @@ +id: caddy-b41c7809a15dd29e69a83cb3726570dc + +info: + name: > + Caddy <= 1.9.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b331c32e-7341-458b-80be-574cfa915159?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caddy/" + google-query: inurl:"/wp-content/plugins/caddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caddy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cafe-lite-dddec61512fe66c6bc2775d423f59680.yaml b/nuclei-templates/cve-less/plugins/cafe-lite-dddec61512fe66c6bc2775d423f59680.yaml new file mode 100644 index 0000000000..e1fcfe7325 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cafe-lite-dddec61512fe66c6bc2775d423f59680.yaml @@ -0,0 +1,58 @@ +id: cafe-lite-dddec61512fe66c6bc2775d423f59680 + +info: + name: > + Clever Addons for Elementor <=2.0.15 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a680db1-3db2-4884-b2fe-c6d29457df4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cafe-lite/" + google-query: inurl:"/wp-content/plugins/cafe-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cafe-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cafe-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cafe-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-139d1504f66cd87031fd329a5f49ab94.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-139d1504f66cd87031fd329a5f49ab94.yaml new file mode 100644 index 0000000000..c6d1c0f02d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-139d1504f66cd87031fd329a5f49ab94.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-139d1504f66cd87031fd329a5f49ab94 + +info: + name: > + Calculated Fields Form <= 1.0.11 - Cross-Site Request Forgery to SQL Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c75c156-225c-465a-8d03-35a6669e9c04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-13cb55c1f508982488cee2289cc6f8a4.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-13cb55c1f508982488cee2289cc6f8a4.yaml new file mode 100644 index 0000000000..f06a68b53f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-13cb55c1f508982488cee2289cc6f8a4.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-13cb55c1f508982488cee2289cc6f8a4 + +info: + name: > + Calculated Fields Form <= 1.2.28 - Authenticated (Contributor+) Open Redirect via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85555a8f-5d23-458d-9166-d30f8f0551e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-447e8d03dfe04fdb92ac705bfa6b054a.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-447e8d03dfe04fdb92ac705bfa6b054a.yaml new file mode 100644 index 0000000000..d6379fda6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-447e8d03dfe04fdb92ac705bfa6b054a.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-447e8d03dfe04fdb92ac705bfa6b054a + +info: + name: > + Calculated Fields Form <= 1.2.40 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c879123c-531e-43d8-a7d3-16a3c86b68a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-4b4ac88975e8590a6a5fd0cf4302a336.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-4b4ac88975e8590a6a5fd0cf4302a336.yaml new file mode 100644 index 0000000000..98777337a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-4b4ac88975e8590a6a5fd0cf4302a336.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-4b4ac88975e8590a6a5fd0cf4302a336 + +info: + name: > + Calculated Fields Form <= 1.1.120 - Missing Authorization to Feedback Submission + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9370f05a-9c69-45f4-9fd8-7017bfcf4d1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.120') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-4c3327ab228513e0bba5f6564699d19d.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-4c3327ab228513e0bba5f6564699d19d.yaml new file mode 100644 index 0000000000..97b845d711 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-4c3327ab228513e0bba5f6564699d19d.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-4c3327ab228513e0bba5f6564699d19d + +info: + name: > + Calculated Fields Form Professional <= 5.1.56 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45bfa9fb-f35b-4fd4-8553-cf87bf69df6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-83141551066454cfa3570b7b645030aa.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-83141551066454cfa3570b7b645030aa.yaml new file mode 100644 index 0000000000..982ceebb98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-83141551066454cfa3570b7b645030aa.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-83141551066454cfa3570b7b645030aa + +info: + name: > + Calculated Fields Form <= 1.0.353 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/334ff8d7-1313-4c19-aed3-0c4625b895ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.353') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-a09cb353956813c158f3eacbd53365c2.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-a09cb353956813c158f3eacbd53365c2.yaml new file mode 100644 index 0000000000..799806fa78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-a09cb353956813c158f3eacbd53365c2.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-a09cb353956813c158f3eacbd53365c2 + +info: + name: > + Calculated Fields Form <= 1.1.120 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4785012-d160-42cc-bd06-d9b8e65652a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.120') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-a7620f303af6467e51bdd4f84801b80c.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-a7620f303af6467e51bdd4f84801b80c.yaml new file mode 100644 index 0000000000..a50cc93fa3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-a7620f303af6467e51bdd4f84801b80c.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-a7620f303af6467e51bdd4f84801b80c + +info: + name: > + Calculated Fields Form <= 1.1.150 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2036c08-3aaf-4e41-bcd6-787f4b8fba9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.150') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-b6900545e2e4c40eddb286d1788c8880.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-b6900545e2e4c40eddb286d1788c8880.yaml new file mode 100644 index 0000000000..b2886d61b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-b6900545e2e4c40eddb286d1788c8880.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-b6900545e2e4c40eddb286d1788c8880 + +info: + name: > + Calculated Fields Form <= 1.2.52 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d870ff8d-ea4b-4777-9892-0d9982182b9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculated-fields-form-d066e564c9d177f69ad8edb9aa85d9a0.yaml b/nuclei-templates/cve-less/plugins/calculated-fields-form-d066e564c9d177f69ad8edb9aa85d9a0.yaml new file mode 100644 index 0000000000..be45e058a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculated-fields-form-d066e564c9d177f69ad8edb9aa85d9a0.yaml @@ -0,0 +1,58 @@ +id: calculated-fields-form-d066e564c9d177f69ad8edb9aa85d9a0 + +info: + name: > + Calculated Fields Form <= 1.2.54 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a76116a-1e84-4114-9baa-3986be92d051?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculated-fields-form/" + google-query: inurl:"/wp-content/plugins/calculated-fields-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculated-fields-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculated-fields-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculated-fields-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.54') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculator-builder-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/calculator-builder-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..ab7ee6025f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculator-builder-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: calculator-builder-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculator-builder/" + google-query: inurl:"/wp-content/plugins/calculator-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculator-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculator-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculator-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calculatorpro-calculators-bf9560c62dd0208ea0e7d6c1046859e5.yaml b/nuclei-templates/cve-less/plugins/calculatorpro-calculators-bf9560c62dd0208ea0e7d6c1046859e5.yaml new file mode 100644 index 0000000000..4df33c63cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calculatorpro-calculators-bf9560c62dd0208ea0e7d6c1046859e5.yaml @@ -0,0 +1,58 @@ +id: calculatorpro-calculators-bf9560c62dd0208ea0e7d6c1046859e5 + +info: + name: > + CalculatorPro Calculators <= 1.1.7 - Reflected Cross-Site Scripting via CP_preview_calc + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0de79672-f0ba-42d3-a44a-01b93801d7de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calculatorpro-calculators/" + google-query: inurl:"/wp-content/plugins/calculatorpro-calculators/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calculatorpro-calculators,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calculatorpro-calculators/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calculatorpro-calculators" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caldera-forms-768674b25e725613816286a9dc3c4233.yaml b/nuclei-templates/cve-less/plugins/caldera-forms-768674b25e725613816286a9dc3c4233.yaml new file mode 100644 index 0000000000..318d4fd402 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caldera-forms-768674b25e725613816286a9dc3c4233.yaml @@ -0,0 +1,58 @@ +id: caldera-forms-768674b25e725613816286a9dc3c4233 + +info: + name: > + Caldera Forms <= 1.5.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a9bf519-bc55-411b-836a-fb394e317396?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caldera-forms/" + google-query: inurl:"/wp-content/plugins/caldera-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caldera-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caldera-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caldera-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caldera-forms-7c34573376626471f92815a30e26e5cb.yaml b/nuclei-templates/cve-less/plugins/caldera-forms-7c34573376626471f92815a30e26e5cb.yaml new file mode 100644 index 0000000000..e0f339e518 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caldera-forms-7c34573376626471f92815a30e26e5cb.yaml @@ -0,0 +1,58 @@ +id: caldera-forms-7c34573376626471f92815a30e26e5cb + +info: + name: > + Caldera Forms <= 1.9.6 - Reflected Cross-Site Scripting via cf-api + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2e99867-4992-47b5-a642-abd104eee18f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caldera-forms/" + google-query: inurl:"/wp-content/plugins/caldera-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caldera-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caldera-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caldera-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caldera-forms-b4c4ff584d962e0bfb58568b73a5ecd3.yaml b/nuclei-templates/cve-less/plugins/caldera-forms-b4c4ff584d962e0bfb58568b73a5ecd3.yaml new file mode 100644 index 0000000000..00714fd4eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caldera-forms-b4c4ff584d962e0bfb58568b73a5ecd3.yaml @@ -0,0 +1,58 @@ +id: caldera-forms-b4c4ff584d962e0bfb58568b73a5ecd3 + +info: + name: > + Caldera forms <= 1.9.4 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6838714-4128-47c5-b596-91cfc68abade?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caldera-forms/" + google-query: inurl:"/wp-content/plugins/caldera-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caldera-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caldera-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caldera-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caldera-forms-cc7f0854e90c58e6d36843a97af2d437.yaml b/nuclei-templates/cve-less/plugins/caldera-forms-cc7f0854e90c58e6d36843a97af2d437.yaml new file mode 100644 index 0000000000..8efe9ca66c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caldera-forms-cc7f0854e90c58e6d36843a97af2d437.yaml @@ -0,0 +1,58 @@ +id: caldera-forms-cc7f0854e90c58e6d36843a97af2d437 + +info: + name: > + Caldera Forms <= 1.4.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc3d84f3-bd9d-40e6-bc88-90c840a928c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caldera-forms/" + google-query: inurl:"/wp-content/plugins/caldera-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caldera-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caldera-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caldera-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caldera-forms-dd0b75b6278e9d9ace01e3d0f5ed462a.yaml b/nuclei-templates/cve-less/plugins/caldera-forms-dd0b75b6278e9d9ace01e3d0f5ed462a.yaml new file mode 100644 index 0000000000..888504b6c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caldera-forms-dd0b75b6278e9d9ace01e3d0f5ed462a.yaml @@ -0,0 +1,58 @@ +id: caldera-forms-dd0b75b6278e9d9ace01e3d0f5ed462a + +info: + name: > + Caldera Forms – More Than Contact Forms < 1.4.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/377b8532-61b8-45be-ad7c-c9ff60a7100a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caldera-forms/" + google-query: inurl:"/wp-content/plugins/caldera-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caldera-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caldera-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caldera-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caldera-forms-de09ecc40e8ef125eed740508fee8b16.yaml b/nuclei-templates/cve-less/plugins/caldera-forms-de09ecc40e8ef125eed740508fee8b16.yaml new file mode 100644 index 0000000000..39f09f3b80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caldera-forms-de09ecc40e8ef125eed740508fee8b16.yaml @@ -0,0 +1,58 @@ +id: caldera-forms-de09ecc40e8ef125eed740508fee8b16 + +info: + name: > + Caldera Forms <= 1.5.9.1 - Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa8df7ee-5308-4993-ac49-e2e58f3eaf60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caldera-forms/" + google-query: inurl:"/wp-content/plugins/caldera-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caldera-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caldera-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caldera-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caldera-forms-pro-af5db143583f026b4ec13d0e53264642.yaml b/nuclei-templates/cve-less/plugins/caldera-forms-pro-af5db143583f026b4ec13d0e53264642.yaml new file mode 100644 index 0000000000..0ff900adb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caldera-forms-pro-af5db143583f026b4ec13d0e53264642.yaml @@ -0,0 +1,58 @@ +id: caldera-forms-pro-af5db143583f026b4ec13d0e53264642 + +info: + name: > + Caldera Forms Pro < 1.8.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce834ae1-e05a-4b0e-9d7f-144669437d70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caldera-forms-pro/" + google-query: inurl:"/wp-content/plugins/caldera-forms-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caldera-forms-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caldera-forms-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caldera-forms-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.8', '<= 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calderawp-license-manager-b88cf8c0086678b4179593db6bed64e7.yaml b/nuclei-templates/cve-less/plugins/calderawp-license-manager-b88cf8c0086678b4179593db6bed64e7.yaml new file mode 100644 index 0000000000..7e67b1a287 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calderawp-license-manager-b88cf8c0086678b4179593db6bed64e7.yaml @@ -0,0 +1,58 @@ +id: calderawp-license-manager-b88cf8c0086678b4179593db6bed64e7 + +info: + name: > + CalderaWP License Manager <= 1.2.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fecb12c5-8f8d-4f72-a349-c5df315b523e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calderawp-license-manager/" + google-query: inurl:"/wp-content/plugins/calderawp-license-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calderawp-license-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calderawp-license-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calderawp-license-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendar-05d1ff035c1fc3b076e51a7b5c7af2a9.yaml b/nuclei-templates/cve-less/plugins/calendar-05d1ff035c1fc3b076e51a7b5c7af2a9.yaml new file mode 100644 index 0000000000..3e8f8606f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendar-05d1ff035c1fc3b076e51a7b5c7af2a9.yaml @@ -0,0 +1,58 @@ +id: calendar-05d1ff035c1fc3b076e51a7b5c7af2a9 + +info: + name: > + Calendar < 1.3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff22c969-e580-4290-ab08-7c02b6eac938?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendar/" + google-query: inurl:"/wp-content/plugins/calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendar-2ac1b11dfdd4d8aec9aef19739eee675.yaml b/nuclei-templates/cve-less/plugins/calendar-2ac1b11dfdd4d8aec9aef19739eee675.yaml new file mode 100644 index 0000000000..58f755deb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendar-2ac1b11dfdd4d8aec9aef19739eee675.yaml @@ -0,0 +1,58 @@ +id: calendar-2ac1b11dfdd4d8aec9aef19739eee675 + +info: + name: > + Calendar <= 1.3.14 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0886fa16-4292-4223-af01-9aa1f36490f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendar/" + google-query: inurl:"/wp-content/plugins/calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendar-610a8079730189f1c51d4e425058e93f.yaml b/nuclei-templates/cve-less/plugins/calendar-610a8079730189f1c51d4e425058e93f.yaml new file mode 100644 index 0000000000..d46c8ed68f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendar-610a8079730189f1c51d4e425058e93f.yaml @@ -0,0 +1,58 @@ +id: calendar-610a8079730189f1c51d4e425058e93f + +info: + name: > + Calendar <= 1.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe996511-f29a-4e28-b6de-3633d45b10c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendar/" + google-query: inurl:"/wp-content/plugins/calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendar-8b25a4024805d97b0bbe39b2b083bd09.yaml b/nuclei-templates/cve-less/plugins/calendar-8b25a4024805d97b0bbe39b2b083bd09.yaml new file mode 100644 index 0000000000..8cda852d66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendar-8b25a4024805d97b0bbe39b2b083bd09.yaml @@ -0,0 +1,58 @@ +id: calendar-8b25a4024805d97b0bbe39b2b083bd09 + +info: + name: > + Calendar <= 1.3.10 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e2efbf-11ac-4a85-8136-cb40468089e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendar/" + google-query: inurl:"/wp-content/plugins/calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendar-booking-b0ee79ee6bfacccc5c859ba67a33f0de.yaml b/nuclei-templates/cve-less/plugins/calendar-booking-b0ee79ee6bfacccc5c859ba67a33f0de.yaml new file mode 100644 index 0000000000..39437167de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendar-booking-b0ee79ee6bfacccc5c859ba67a33f0de.yaml @@ -0,0 +1,58 @@ +id: calendar-booking-b0ee79ee6bfacccc5c859ba67a33f0de + +info: + name: > + Scheduling Plugin – Online Booking for WordPress <= 3.5.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71a0aa95-f2a9-4537-a8d1-d78336e36125?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendar-booking/" + google-query: inurl:"/wp-content/plugins/calendar-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendar-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendar-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendar-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendar-event-09740a555ab133389f0f6571fce0ae84.yaml b/nuclei-templates/cve-less/plugins/calendar-event-09740a555ab133389f0f6571fce0ae84.yaml new file mode 100644 index 0000000000..294aca090a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendar-event-09740a555ab133389f0f6571fce0ae84.yaml @@ -0,0 +1,58 @@ +id: calendar-event-09740a555ab133389f0f6571fce0ae84 + +info: + name: > + Event Calendar <= 1.4.6 - Missing Authorization to Event Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3e149dd-636e-47ce-9ade-e1ae337612da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendar-event/" + google-query: inurl:"/wp-content/plugins/calendar-event/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendar-event,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendar-event/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendar-event" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendar-event-cee3839418561c0992d928e881decc00.yaml b/nuclei-templates/cve-less/plugins/calendar-event-cee3839418561c0992d928e881decc00.yaml new file mode 100644 index 0000000000..8579e241ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendar-event-cee3839418561c0992d928e881decc00.yaml @@ -0,0 +1,58 @@ +id: calendar-event-cee3839418561c0992d928e881decc00 + +info: + name: > + Event Calendar <= 1.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/430a981c-7856-493c-bf66-11506b5963a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendar-event/" + google-query: inurl:"/wp-content/plugins/calendar-event/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendar-event,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendar-event/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendar-event" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendar-plugin-27b6ebe3ed4381bb3c55ec596f477456.yaml b/nuclei-templates/cve-less/plugins/calendar-plugin-27b6ebe3ed4381bb3c55ec596f477456.yaml new file mode 100644 index 0000000000..9d870240f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendar-plugin-27b6ebe3ed4381bb3c55ec596f477456.yaml @@ -0,0 +1,58 @@ +id: calendar-plugin-27b6ebe3ed4381bb3c55ec596f477456 + +info: + name: > + Calendar_plugin <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11aa7971-9770-47fc-960e-44fe43321b53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendar-plugin/" + google-query: inurl:"/wp-content/plugins/calendar-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendar-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendar-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendar-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendarista-basic-edition-7ca52430035acd6a97700e0a1293791e.yaml b/nuclei-templates/cve-less/plugins/calendarista-basic-edition-7ca52430035acd6a97700e0a1293791e.yaml new file mode 100644 index 0000000000..669dd8937c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendarista-basic-edition-7ca52430035acd6a97700e0a1293791e.yaml @@ -0,0 +1,58 @@ +id: calendarista-basic-edition-7ca52430035acd6a97700e0a1293791e + +info: + name: > + Calendarista Basic Edition <= 3.0.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b831eb-ab28-4e42-940b-6943d836d230?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendarista-basic-edition/" + google-query: inurl:"/wp-content/plugins/calendarista-basic-edition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendarista-basic-edition,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendarista-basic-edition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendarista-basic-edition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendarista-basic-edition-be21de51738bde44b4ff85eb79707aec.yaml b/nuclei-templates/cve-less/plugins/calendarista-basic-edition-be21de51738bde44b4ff85eb79707aec.yaml new file mode 100644 index 0000000000..2950d5bfa2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendarista-basic-edition-be21de51738bde44b4ff85eb79707aec.yaml @@ -0,0 +1,58 @@ +id: calendarista-basic-edition-be21de51738bde44b4ff85eb79707aec + +info: + name: > + Calendarista Basic Edition <= 3.0.2 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4beb0b7-e287-43bd-b8d1-3aa65e268ead?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendarista-basic-edition/" + google-query: inurl:"/wp-content/plugins/calendarista-basic-edition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendarista-basic-edition,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendarista-basic-edition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendarista-basic-edition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendarista-basic-edition-cc489789b5cb387a9c3918987d9c41fb.yaml b/nuclei-templates/cve-less/plugins/calendarista-basic-edition-cc489789b5cb387a9c3918987d9c41fb.yaml new file mode 100644 index 0000000000..c4fdb286ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendarista-basic-edition-cc489789b5cb387a9c3918987d9c41fb.yaml @@ -0,0 +1,58 @@ +id: calendarista-basic-edition-cc489789b5cb387a9c3918987d9c41fb + +info: + name: > + Calendarista Basic Edition <= 3.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bb90162-314a-4d49-8fd3-2b1b42c5ad63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendarista-basic-edition/" + google-query: inurl:"/wp-content/plugins/calendarista-basic-edition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendarista-basic-edition,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendarista-basic-edition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendarista-basic-edition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/calendarista-dc0d3deddd939ceb7da2b7a2e45dc103.yaml b/nuclei-templates/cve-less/plugins/calendarista-dc0d3deddd939ceb7da2b7a2e45dc103.yaml new file mode 100644 index 0000000000..1c8f560fba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/calendarista-dc0d3deddd939ceb7da2b7a2e45dc103.yaml @@ -0,0 +1,58 @@ +id: calendarista-dc0d3deddd939ceb7da2b7a2e45dc103 + +info: + name: > + Calendarista <= 15.5.7 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/381ea693-3e59-4ecb-a96b-4b58d47298c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/calendarista/" + google-query: inurl:"/wp-content/plugins/calendarista/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,calendarista,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/calendarista/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calendarista" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/call-now-button-f1b22b19f1452ccdd593cc23416c662b.yaml b/nuclei-templates/cve-less/plugins/call-now-button-f1b22b19f1452ccdd593cc23416c662b.yaml new file mode 100644 index 0000000000..5ae3e745a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/call-now-button-f1b22b19f1452ccdd593cc23416c662b.yaml @@ -0,0 +1,58 @@ +id: call-now-button-f1b22b19f1452ccdd593cc23416c662b + +info: + name: > + Call Now Button <= 1.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c00f3c0-8374-4966-9496-dd62f183f75a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/call-now-button/" + google-query: inurl:"/wp-content/plugins/call-now-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,call-now-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/call-now-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "call-now-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/call-now-icon-animate-cfbef64f1e1fba4c3a45a9c3c672157f.yaml b/nuclei-templates/cve-less/plugins/call-now-icon-animate-cfbef64f1e1fba4c3a45a9c3c672157f.yaml new file mode 100644 index 0000000000..06cf247cb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/call-now-icon-animate-cfbef64f1e1fba4c3a45a9c3c672157f.yaml @@ -0,0 +1,58 @@ +id: call-now-icon-animate-cfbef64f1e1fba4c3a45a9c3c672157f + +info: + name: > + Call Now Icon Animate <= 0.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82f5e976-2564-4f8b-96d5-cfac9945737c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/call-now-icon-animate/" + google-query: inurl:"/wp-content/plugins/call-now-icon-animate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,call-now-icon-animate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/call-now-icon-animate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "call-now-icon-animate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/callbook-mobile-bar-2ea25ed58e645deebc4c9ee26219463e.yaml b/nuclei-templates/cve-less/plugins/callbook-mobile-bar-2ea25ed58e645deebc4c9ee26219463e.yaml new file mode 100644 index 0000000000..ed9740415a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/callbook-mobile-bar-2ea25ed58e645deebc4c9ee26219463e.yaml @@ -0,0 +1,58 @@ +id: callbook-mobile-bar-2ea25ed58e645deebc4c9ee26219463e + +info: + name: > + Call&Book Mobile Bar <= 1.2.2 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0df0a4e-282e-483a-8d5e-a192620ed2d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/callbook-mobile-bar/" + google-query: inurl:"/wp-content/plugins/callbook-mobile-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,callbook-mobile-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/callbook-mobile-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "callbook-mobile-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/callrail-phone-call-tracking-1c049cc07d2d3d3aff9e887e6aede6d7.yaml b/nuclei-templates/cve-less/plugins/callrail-phone-call-tracking-1c049cc07d2d3d3aff9e887e6aede6d7.yaml new file mode 100644 index 0000000000..dbd09acbba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/callrail-phone-call-tracking-1c049cc07d2d3d3aff9e887e6aede6d7.yaml @@ -0,0 +1,58 @@ +id: callrail-phone-call-tracking-1c049cc07d2d3d3aff9e887e6aede6d7 + +info: + name: > + CallRail Phone Call Tracking <= 0.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35def866-7460-4cad-8d86-7b9e4905cbe4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/callrail-phone-call-tracking/" + google-query: inurl:"/wp-content/plugins/callrail-phone-call-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,callrail-phone-call-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/callrail-phone-call-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "callrail-phone-call-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/callrail-phone-call-tracking-4e96ec415742df4383d4f15264a5ba1f.yaml b/nuclei-templates/cve-less/plugins/callrail-phone-call-tracking-4e96ec415742df4383d4f15264a5ba1f.yaml new file mode 100644 index 0000000000..1b9ce6556d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/callrail-phone-call-tracking-4e96ec415742df4383d4f15264a5ba1f.yaml @@ -0,0 +1,58 @@ +id: callrail-phone-call-tracking-4e96ec415742df4383d4f15264a5ba1f + +info: + name: > + CallRail Phone Call Tracking <= 0.4.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/452ed03a-2f02-417d-93c9-d883a616a153?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/callrail-phone-call-tracking/" + google-query: inurl:"/wp-content/plugins/callrail-phone-call-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,callrail-phone-call-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/callrail-phone-call-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "callrail-phone-call-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/camera-slideshow-010b13dab325ad4db18460bf37133fe2.yaml b/nuclei-templates/cve-less/plugins/camera-slideshow-010b13dab325ad4db18460bf37133fe2.yaml new file mode 100644 index 0000000000..ecc52fc828 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/camera-slideshow-010b13dab325ad4db18460bf37133fe2.yaml @@ -0,0 +1,58 @@ +id: camera-slideshow-010b13dab325ad4db18460bf37133fe2 + +info: + name: > + Camera slideshow <= 1.4.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c568897-a8ff-4d3d-88b5-b7aeff454cf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/camera-slideshow/" + google-query: inurl:"/wp-content/plugins/camera-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,camera-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/camera-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "camera-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/campaign-monitor-wp-c8dbdfc73ab33e8afe0f3263d7ef0673.yaml b/nuclei-templates/cve-less/plugins/campaign-monitor-wp-c8dbdfc73ab33e8afe0f3263d7ef0673.yaml new file mode 100644 index 0000000000..07f3fe7115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/campaign-monitor-wp-c8dbdfc73ab33e8afe0f3263d7ef0673.yaml @@ -0,0 +1,58 @@ +id: campaign-monitor-wp-c8dbdfc73ab33e8afe0f3263d7ef0673 + +info: + name: > + Campaign Monitor Forms <= 2.5.5 - Missing Authorization to Authenticated(Subscriber+) Options Update via ajax_dismiss_notice + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f11416c-c981-4c85-822c-497ecfaa842d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/campaign-monitor-wp/" + google-query: inurl:"/wp-content/plugins/campaign-monitor-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,campaign-monitor-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/campaign-monitor-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "campaign-monitor-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/campaign-url-builder-a735151e1a4f287ab4567ad75cce9a30.yaml b/nuclei-templates/cve-less/plugins/campaign-url-builder-a735151e1a4f287ab4567ad75cce9a30.yaml new file mode 100644 index 0000000000..89e8cdd57c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/campaign-url-builder-a735151e1a4f287ab4567ad75cce9a30.yaml @@ -0,0 +1,58 @@ +id: campaign-url-builder-a735151e1a4f287ab4567ad75cce9a30 + +info: + name: > + Campaign URL Builder <= 1.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2839fdc-5904-4c3b-894f-7bf7e8b2986a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/campaign-url-builder/" + google-query: inurl:"/wp-content/plugins/campaign-url-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,campaign-url-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/campaign-url-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "campaign-url-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/campaign-url-builder-fdb6580a9b4fe182559a2e3ed6c65f0e.yaml b/nuclei-templates/cve-less/plugins/campaign-url-builder-fdb6580a9b4fe182559a2e3ed6c65f0e.yaml new file mode 100644 index 0000000000..962eea11e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/campaign-url-builder-fdb6580a9b4fe182559a2e3ed6c65f0e.yaml @@ -0,0 +1,58 @@ +id: campaign-url-builder-fdb6580a9b4fe182559a2e3ed6c65f0e + +info: + name: > + Campaign URL Builder <= 1.8.1 - Authenticated (Admin+) Stored Cross-Site Scripting via Create Link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06294c35-6d58-4270-b143-757831fc5da6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/campaign-url-builder/" + google-query: inurl:"/wp-content/plugins/campaign-url-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,campaign-url-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/campaign-url-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "campaign-url-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/camptix-1b1736563be4cd48928200e2f20f46f4.yaml b/nuclei-templates/cve-less/plugins/camptix-1b1736563be4cd48928200e2f20f46f4.yaml new file mode 100644 index 0000000000..f05384d4da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/camptix-1b1736563be4cd48928200e2f20f46f4.yaml @@ -0,0 +1,58 @@ +id: camptix-1b1736563be4cd48928200e2f20f46f4 + +info: + name: > + CampTix Event Ticketing < 1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be091637-0fcb-4d30-8eaa-2fe18d8eb42c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/camptix/" + google-query: inurl:"/wp-content/plugins/camptix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,camptix,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/camptix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "camptix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/camptix-6821f0debd453e2dc059a8ca2d3fede9.yaml b/nuclei-templates/cve-less/plugins/camptix-6821f0debd453e2dc059a8ca2d3fede9.yaml new file mode 100644 index 0000000000..0ec12ee1a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/camptix-6821f0debd453e2dc059a8ca2d3fede9.yaml @@ -0,0 +1,58 @@ +id: camptix-6821f0debd453e2dc059a8ca2d3fede9 + +info: + name: > + CampTix Event Ticketing <= 1.4.2 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/694005fc-7703-4343-a7b4-d36906869df3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/camptix/" + google-query: inurl:"/wp-content/plugins/camptix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,camptix,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/camptix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "camptix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/campus-directory-aefc22c7a60a7d5e0b05b0ef2a479b2b.yaml b/nuclei-templates/cve-less/plugins/campus-directory-aefc22c7a60a7d5e0b05b0ef2a479b2b.yaml new file mode 100644 index 0000000000..c3f5bb05c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/campus-directory-aefc22c7a60a7d5e0b05b0ef2a479b2b.yaml @@ -0,0 +1,58 @@ +id: campus-directory-aefc22c7a60a7d5e0b05b0ef2a479b2b + +info: + name: > + Faculty Staff and Student Directory Plugin – Campus Directory <= 1.7.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/438bbd0f-5204-4a71-9730-efa51d864832?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/campus-directory/" + google-query: inurl:"/wp-content/plugins/campus-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,campus-directory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/campus-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "campus-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cancel-order-request-woocommerce-5b5a80245567937203123aecaa90cc27.yaml b/nuclei-templates/cve-less/plugins/cancel-order-request-woocommerce-5b5a80245567937203123aecaa90cc27.yaml new file mode 100644 index 0000000000..1e14a0bf82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cancel-order-request-woocommerce-5b5a80245567937203123aecaa90cc27.yaml @@ -0,0 +1,58 @@ +id: cancel-order-request-woocommerce-5b5a80245567937203123aecaa90cc27 + +info: + name: > + Cancel order request WooCommerce <= 1.3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f49477f-7a43-489b-8d3c-db8d0efeb596?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cancel-order-request-woocommerce/" + google-query: inurl:"/wp-content/plugins/cancel-order-request-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cancel-order-request-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cancel-order-request-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cancel-order-request-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/candidate-application-form-f979531e448b7af410cfe697c4a56a83.yaml b/nuclei-templates/cve-less/plugins/candidate-application-form-f979531e448b7af410cfe697c4a56a83.yaml new file mode 100644 index 0000000000..2ae4ce4e1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/candidate-application-form-f979531e448b7af410cfe697c4a56a83.yaml @@ -0,0 +1,58 @@ +id: candidate-application-form-f979531e448b7af410cfe697c4a56a83 + +info: + name: > + Candidate Application Form <= 1.3 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1772e79-85c7-4a8e-a5d8-8d73013e6de3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/candidate-application-form/" + google-query: inurl:"/wp-content/plugins/candidate-application-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,candidate-application-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/candidate-application-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "candidate-application-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canto-01407881ecb8410d18cf22fb6eadefa6.yaml b/nuclei-templates/cve-less/plugins/canto-01407881ecb8410d18cf22fb6eadefa6.yaml new file mode 100644 index 0000000000..c832026d23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canto-01407881ecb8410d18cf22fb6eadefa6.yaml @@ -0,0 +1,58 @@ +id: canto-01407881ecb8410d18cf22fb6eadefa6 + +info: + name: > + Canto <= 3.0.4 - Unauthenticated Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a76077c6-700a-4d21-a930-b0d6455d959c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canto/" + google-query: inurl:"/wp-content/plugins/canto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canto,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canto-3a9821f8d5cc2355d8fbcd9465b098d5.yaml b/nuclei-templates/cve-less/plugins/canto-3a9821f8d5cc2355d8fbcd9465b098d5.yaml new file mode 100644 index 0000000000..1ce2c60caf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canto-3a9821f8d5cc2355d8fbcd9465b098d5.yaml @@ -0,0 +1,58 @@ +id: canto-3a9821f8d5cc2355d8fbcd9465b098d5 + +info: + name: > + Canto <= 1.9.0 - Blind Server-Side Request Forgery via tree.php + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c03cf3a2-3be9-44da-a050-a5978eb3eadc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canto/" + google-query: inurl:"/wp-content/plugins/canto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canto,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canto-5bb05314b65c718b289ec510721af0ea.yaml b/nuclei-templates/cve-less/plugins/canto-5bb05314b65c718b289ec510721af0ea.yaml new file mode 100644 index 0000000000..3be503c175 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canto-5bb05314b65c718b289ec510721af0ea.yaml @@ -0,0 +1,58 @@ +id: canto-5bb05314b65c718b289ec510721af0ea + +info: + name: > + Canto <= 3.0.6 - Remote File Inclusion to Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa080b36-01ce-496a-9938-9715f0131e29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canto/" + google-query: inurl:"/wp-content/plugins/canto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canto,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canto-5f3e8a4fee8c983cab0188c7dcf05d7b.yaml b/nuclei-templates/cve-less/plugins/canto-5f3e8a4fee8c983cab0188c7dcf05d7b.yaml new file mode 100644 index 0000000000..18a0653163 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canto-5f3e8a4fee8c983cab0188c7dcf05d7b.yaml @@ -0,0 +1,58 @@ +id: canto-5f3e8a4fee8c983cab0188c7dcf05d7b + +info: + name: > + Canto <= 1.9.0 - Blind Server-Side Request Forgery via download.php + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/904e407c-5ec7-433f-9161-eb4d6d263a97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canto/" + google-query: inurl:"/wp-content/plugins/canto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canto,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canto-62aaab2000dfd7cd8870403602e59565.yaml b/nuclei-templates/cve-less/plugins/canto-62aaab2000dfd7cd8870403602e59565.yaml new file mode 100644 index 0000000000..3df8610825 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canto-62aaab2000dfd7cd8870403602e59565.yaml @@ -0,0 +1,58 @@ +id: canto-62aaab2000dfd7cd8870403602e59565 + +info: + name: > + Canto <= 1.9.0 - Blind Server-Side Request Forgery via get.php + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a330416-f867-4a1a-a692-6003e231ed54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canto/" + google-query: inurl:"/wp-content/plugins/canto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canto,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canto-63e4f5d4e15b76376a440d71c38d9660.yaml b/nuclei-templates/cve-less/plugins/canto-63e4f5d4e15b76376a440d71c38d9660.yaml new file mode 100644 index 0000000000..f6e9d2ece4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canto-63e4f5d4e15b76376a440d71c38d9660.yaml @@ -0,0 +1,58 @@ +id: canto-63e4f5d4e15b76376a440d71c38d9660 + +info: + name: > + Canto <= 1.9.0 - Blind Server-Side Request Forgery via detail.php + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5781420d-b1e0-435f-8bf2-193cc7b095ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canto/" + google-query: inurl:"/wp-content/plugins/canto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canto,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canva-e04c0229e8744dd1a1d90594b9aeb97f.yaml b/nuclei-templates/cve-less/plugins/canva-e04c0229e8744dd1a1d90594b9aeb97f.yaml new file mode 100644 index 0000000000..b2ca852d8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canva-e04c0229e8744dd1a1d90594b9aeb97f.yaml @@ -0,0 +1,58 @@ +id: canva-e04c0229e8744dd1a1d90594b9aeb97f + +info: + name: > + Canva – Design beautiful blog graphics <= 1.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebebe75-155a-4097-95ec-f31c6047f19a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canva/" + google-query: inurl:"/wp-content/plugins/canva/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canva,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canva/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canva" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canvasio3d-light-07f4ebdf99bc6bc543918be1a478a57b.yaml b/nuclei-templates/cve-less/plugins/canvasio3d-light-07f4ebdf99bc6bc543918be1a478a57b.yaml new file mode 100644 index 0000000000..84b85d50bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canvasio3d-light-07f4ebdf99bc6bc543918be1a478a57b.yaml @@ -0,0 +1,58 @@ +id: canvasio3d-light-07f4ebdf99bc6bc543918be1a478a57b + +info: + name: > + Download canvasio3D Light <= 2.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39b8f6d8-bca2-4bf2-93ab-868270df8752?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canvasio3d-light/" + google-query: inurl:"/wp-content/plugins/canvasio3d-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canvasio3d-light,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canvasio3d-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canvasio3d-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/canvasio3d-light-85fcd9779448a368c2c74d702cd2f30d.yaml b/nuclei-templates/cve-less/plugins/canvasio3d-light-85fcd9779448a368c2c74d702cd2f30d.yaml new file mode 100644 index 0000000000..1183ccb340 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/canvasio3d-light-85fcd9779448a368c2c74d702cd2f30d.yaml @@ -0,0 +1,58 @@ +id: canvasio3d-light-85fcd9779448a368c2c74d702cd2f30d + +info: + name: > + Download canvasio3D Light <= 2.5.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11795557-74c0-469a-9751-adc759f9214b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/canvasio3d-light/" + google-query: inurl:"/wp-content/plugins/canvasio3d-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,canvasio3d-light,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/canvasio3d-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canvasio3d-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/capa-aacd4552800caf4d2cb49989fbc6ad61.yaml b/nuclei-templates/cve-less/plugins/capa-aacd4552800caf4d2cb49989fbc6ad61.yaml new file mode 100644 index 0000000000..9f6abd7b72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/capa-aacd4552800caf4d2cb49989fbc6ad61.yaml @@ -0,0 +1,58 @@ +id: capa-aacd4552800caf4d2cb49989fbc6ad61 + +info: + name: > + CaPa Protect <= 0.5.8.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba4e982d-b8ac-4407-97b0-c725b8f43bbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/capa/" + google-query: inurl:"/wp-content/plugins/capa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,capa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/capa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "capa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/capabilities-pro-90e136f1c49e3c12cb6162b882a23711.yaml b/nuclei-templates/cve-less/plugins/capabilities-pro-90e136f1c49e3c12cb6162b882a23711.yaml new file mode 100644 index 0000000000..f5c57d084a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/capabilities-pro-90e136f1c49e3c12cb6162b882a23711.yaml @@ -0,0 +1,58 @@ +id: capabilities-pro-90e136f1c49e3c12cb6162b882a23711 + +info: + name: > + PublishPress Capabilities <= 2.5.1 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6da7046e-2717-4a3c-bba9-88f27de29ede?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/capabilities-pro/" + google-query: inurl:"/wp-content/plugins/capabilities-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,capabilities-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/capabilities-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "capabilities-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/capability-manager-enhanced-7230e34e5bb18f402b20042366cbe3fb.yaml b/nuclei-templates/cve-less/plugins/capability-manager-enhanced-7230e34e5bb18f402b20042366cbe3fb.yaml new file mode 100644 index 0000000000..0674694abc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/capability-manager-enhanced-7230e34e5bb18f402b20042366cbe3fb.yaml @@ -0,0 +1,58 @@ +id: capability-manager-enhanced-7230e34e5bb18f402b20042366cbe3fb + +info: + name: > + PublishPress Capabilities <= 2.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ea36692-2bf3-490d-8293-7de6dcc5e5c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/capability-manager-enhanced/" + google-query: inurl:"/wp-content/plugins/capability-manager-enhanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,capability-manager-enhanced,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/capability-manager-enhanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "capability-manager-enhanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/capability-manager-enhanced-90e136f1c49e3c12cb6162b882a23711.yaml b/nuclei-templates/cve-less/plugins/capability-manager-enhanced-90e136f1c49e3c12cb6162b882a23711.yaml new file mode 100644 index 0000000000..c74210ca75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/capability-manager-enhanced-90e136f1c49e3c12cb6162b882a23711.yaml @@ -0,0 +1,58 @@ +id: capability-manager-enhanced-90e136f1c49e3c12cb6162b882a23711 + +info: + name: > + PublishPress Capabilities <= 2.5.1 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6da7046e-2717-4a3c-bba9-88f27de29ede?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/capability-manager-enhanced/" + google-query: inurl:"/wp-content/plugins/capability-manager-enhanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,capability-manager-enhanced,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/capability-manager-enhanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "capability-manager-enhanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/capability-manager-enhanced-df1f9aa06bdcfa30c9c48b598c66ff46.yaml b/nuclei-templates/cve-less/plugins/capability-manager-enhanced-df1f9aa06bdcfa30c9c48b598c66ff46.yaml new file mode 100644 index 0000000000..e34cff88b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/capability-manager-enhanced-df1f9aa06bdcfa30c9c48b598c66ff46.yaml @@ -0,0 +1,58 @@ +id: capability-manager-enhanced-df1f9aa06bdcfa30c9c48b598c66ff46 + +info: + name: > + PublishPress Capabilities <= 1.5.8 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c48091fc-c11d-4753-9763-e1face3723fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/capability-manager-enhanced/" + google-query: inurl:"/wp-content/plugins/capability-manager-enhanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,capability-manager-enhanced,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/capability-manager-enhanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "capability-manager-enhanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/capability-manager-enhanced-ffa44387e06e48e98303b52781d92b69.yaml b/nuclei-templates/cve-less/plugins/capability-manager-enhanced-ffa44387e06e48e98303b52781d92b69.yaml new file mode 100644 index 0000000000..526b07ca4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/capability-manager-enhanced-ffa44387e06e48e98303b52781d92b69.yaml @@ -0,0 +1,58 @@ +id: capability-manager-enhanced-ffa44387e06e48e98303b52781d92b69 + +info: + name: > + PublishPress Capabilities <= 2.3 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf3df923-9426-4e5b-ba59-eda0b5c18d40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/capability-manager-enhanced/" + google-query: inurl:"/wp-content/plugins/capability-manager-enhanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,capability-manager-enhanced,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/capability-manager-enhanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "capability-manager-enhanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captain-slider-c23ce008dc2473271851552ad5775c2c.yaml b/nuclei-templates/cve-less/plugins/captain-slider-c23ce008dc2473271851552ad5775c2c.yaml new file mode 100644 index 0000000000..c5eaa852a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captain-slider-c23ce008dc2473271851552ad5775c2c.yaml @@ -0,0 +1,58 @@ +id: captain-slider-c23ce008dc2473271851552ad5775c2c + +info: + name: > + Captain Slider <= 1.0.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0936f5b-a0b2-466b-bb92-143db6c32456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captain-slider/" + google-query: inurl:"/wp-content/plugins/captain-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captain-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captain-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captain-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captainform-84e047e46e28d58fa1b7c6a8e2da02e0.yaml b/nuclei-templates/cve-less/plugins/captainform-84e047e46e28d58fa1b7c6a8e2da02e0.yaml new file mode 100644 index 0000000000..dffb57c845 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captainform-84e047e46e28d58fa1b7c6a8e2da02e0.yaml @@ -0,0 +1,58 @@ +id: captainform-84e047e46e28d58fa1b7c6a8e2da02e0 + +info: + name: > + Forms by CaptainForm <= 2.5.3 - Reflected Cross-Site Scripting via REQUEST_URI + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f690ea9-b773-49d4-9fa4-2a8bb7593d62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captainform/" + google-query: inurl:"/wp-content/plugins/captainform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captainform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captainform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captainform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captainform-d6b551c8eebbc07aebd60fb21b086030.yaml b/nuclei-templates/cve-less/plugins/captainform-d6b551c8eebbc07aebd60fb21b086030.yaml new file mode 100644 index 0000000000..5a57765014 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captainform-d6b551c8eebbc07aebd60fb21b086030.yaml @@ -0,0 +1,58 @@ +id: captainform-d6b551c8eebbc07aebd60fb21b086030 + +info: + name: > + Forms by CaptainForm <= 2.5.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5db42c7e-49bc-48ee-8129-b8a0df0c8d98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captainform/" + google-query: inurl:"/wp-content/plugins/captainform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captainform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captainform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captainform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-06e4153293e52f8c9043f9af68520509.yaml b/nuclei-templates/cve-less/plugins/captcha-06e4153293e52f8c9043f9af68520509.yaml new file mode 100644 index 0000000000..be6a4704f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-06e4153293e52f8c9043f9af68520509.yaml @@ -0,0 +1,58 @@ +id: captcha-06e4153293e52f8c9043f9af68520509 + +info: + name: > + Captcha 4.3.6 - 4.4.4 - Plugin Backdoor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cacd31bd-ccc6-49fa-89f1-09f3c5cd9072?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha/" + google-query: inurl:"/wp-content/plugins/captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.3.6', '<= 4.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-37bc6be0c6a9c157c75ceed9ddf9d26e.yaml b/nuclei-templates/cve-less/plugins/captcha-37bc6be0c6a9c157c75ceed9ddf9d26e.yaml new file mode 100644 index 0000000000..67ac42808f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-37bc6be0c6a9c157c75ceed9ddf9d26e.yaml @@ -0,0 +1,58 @@ +id: captcha-37bc6be0c6a9c157c75ceed9ddf9d26e + +info: + name: > + Captcha <= 3.8.1 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3c5d4ed-7a17-4158-b039-322f729dbdde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha/" + google-query: inurl:"/wp-content/plugins/captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-bws-eadf748bcfc719d5710c4f372c6fc3a8.yaml b/nuclei-templates/cve-less/plugins/captcha-bws-eadf748bcfc719d5710c4f372c6fc3a8.yaml new file mode 100644 index 0000000000..7cb9e500bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-bws-eadf748bcfc719d5710c4f372c6fc3a8.yaml @@ -0,0 +1,58 @@ +id: captcha-bws-eadf748bcfc719d5710c4f372c6fc3a8 + +info: + name: > + Captcha by BestWebSoft <= 5.2.0 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d672fcb9-6607-477e-b168-546669886ea4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha-bws/" + google-query: inurl:"/wp-content/plugins/captcha-bws/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha-bws,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha-bws/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha-bws" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-bws-f2483f1e9fa6d9c3c1a5e1dc23e31a6f.yaml b/nuclei-templates/cve-less/plugins/captcha-bws-f2483f1e9fa6d9c3c1a5e1dc23e31a6f.yaml new file mode 100644 index 0000000000..9ea023420e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-bws-f2483f1e9fa6d9c3c1a5e1dc23e31a6f.yaml @@ -0,0 +1,58 @@ +id: captcha-bws-f2483f1e9fa6d9c3c1a5e1dc23e31a6f + +info: + name: > + BestWebSoft Captcha <= 4.0.6 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0490667e-4b82-4687-9354-205c37f13331?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha-bws/" + google-query: inurl:"/wp-content/plugins/captcha-bws/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha-bws,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha-bws/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha-bws" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-c4ac4eb73c727fb730c8ebeb8d318861.yaml b/nuclei-templates/cve-less/plugins/captcha-c4ac4eb73c727fb730c8ebeb8d318861.yaml new file mode 100644 index 0000000000..c08728f040 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-c4ac4eb73c727fb730c8ebeb8d318861.yaml @@ -0,0 +1,58 @@ +id: captcha-c4ac4eb73c727fb730c8ebeb8d318861 + +info: + name: > + Captcha < 4.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f91838e7-8192-455f-ae79-a8c7e7cc06e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha/" + google-query: inurl:"/wp-content/plugins/captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-code-authentication-31a8072de701550e4edcf2604b9e23bf.yaml b/nuclei-templates/cve-less/plugins/captcha-code-authentication-31a8072de701550e4edcf2604b9e23bf.yaml new file mode 100644 index 0000000000..d63a7377b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-code-authentication-31a8072de701550e4edcf2604b9e23bf.yaml @@ -0,0 +1,58 @@ +id: captcha-code-authentication-31a8072de701550e4edcf2604b9e23bf + +info: + name: > + Captcha Code <= 2.7 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66182fc4-863a-4a7b-92a8-2f43717b8579?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha-code-authentication/" + google-query: inurl:"/wp-content/plugins/captcha-code-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha-code-authentication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha-code-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha-code-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-code-authentication-870cf9f4b157c60e42faef24d8dd195e.yaml b/nuclei-templates/cve-less/plugins/captcha-code-authentication-870cf9f4b157c60e42faef24d8dd195e.yaml new file mode 100644 index 0000000000..2acf642540 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-code-authentication-870cf9f4b157c60e42faef24d8dd195e.yaml @@ -0,0 +1,58 @@ +id: captcha-code-authentication-870cf9f4b157c60e42faef24d8dd195e + +info: + name: > + Captcha Code <= 2.9 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1dd3845-a88d-41aa-acf4-66fd1a6819ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha-code-authentication/" + google-query: inurl:"/wp-content/plugins/captcha-code-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha-code-authentication,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha-code-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha-code-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-for-contact-form-7-1aaed89497f863004f63bac937997897.yaml b/nuclei-templates/cve-less/plugins/captcha-for-contact-form-7-1aaed89497f863004f63bac937997897.yaml new file mode 100644 index 0000000000..03e09efba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-for-contact-form-7-1aaed89497f863004f63bac937997897.yaml @@ -0,0 +1,58 @@ +id: captcha-for-contact-form-7-1aaed89497f863004f63bac937997897 + +info: + name: > + Captcha/Honeypot for Contact Form 7 <= 1.11.3 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60e9351a-302b-4a31-8a9c-c0a0b6ee3fcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/captcha-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha-for-contact-form-7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-in-thai-0b74c8fb0ed5d80d8d86412fe0ecefe0.yaml b/nuclei-templates/cve-less/plugins/captcha-in-thai-0b74c8fb0ed5d80d8d86412fe0ecefe0.yaml new file mode 100644 index 0000000000..3f549f7abf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-in-thai-0b74c8fb0ed5d80d8d86412fe0ecefe0.yaml @@ -0,0 +1,58 @@ +id: captcha-in-thai-0b74c8fb0ed5d80d8d86412fe0ecefe0 + +info: + name: > + CAPTCHA in Thai <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81f4f8e8-cac3-4865-a686-212f6c7f7b65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha-in-thai/" + google-query: inurl:"/wp-content/plugins/captcha-in-thai/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha-in-thai,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha-in-thai/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha-in-thai" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-offrepo-e23766eb69c1e01b61ceb05404bdb9f5.yaml b/nuclei-templates/cve-less/plugins/captcha-offrepo-e23766eb69c1e01b61ceb05404bdb9f5.yaml new file mode 100644 index 0000000000..3e03988ccc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-offrepo-e23766eb69c1e01b61ceb05404bdb9f5.yaml @@ -0,0 +1,58 @@ +id: captcha-offrepo-e23766eb69c1e01b61ceb05404bdb9f5 + +info: + name: > + Captcha! <= 2.5d - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f9760f8-459d-4dcf-941d-f8f3f1e266ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha-offrepo/" + google-query: inurl:"/wp-content/plugins/captcha-offrepo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha-offrepo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha-offrepo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha-offrepo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5d') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captcha-them-all-1772bca649ab5b99b71eb70af7333d0b.yaml b/nuclei-templates/cve-less/plugins/captcha-them-all-1772bca649ab5b99b71eb70af7333d0b.yaml new file mode 100644 index 0000000000..5c318725c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captcha-them-all-1772bca649ab5b99b71eb70af7333d0b.yaml @@ -0,0 +1,58 @@ +id: captcha-them-all-1772bca649ab5b99b71eb70af7333d0b + +info: + name: > + Captcha Them All <= 1.3.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e2c83b6-3444-4cd1-82ec-567937c563b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captcha-them-all/" + google-query: inurl:"/wp-content/plugins/captcha-them-all/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captcha-them-all,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captcha-them-all/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captcha-them-all" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captchinoo-captcha-for-login-form-protection-8a7e1f1e76c1a5624370361e3f4014b1.yaml b/nuclei-templates/cve-less/plugins/captchinoo-captcha-for-login-form-protection-8a7e1f1e76c1a5624370361e3f4014b1.yaml new file mode 100644 index 0000000000..3f6b2c57a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captchinoo-captcha-for-login-form-protection-8a7e1f1e76c1a5624370361e3f4014b1.yaml @@ -0,0 +1,58 @@ +id: captchinoo-captcha-for-login-form-protection-8a7e1f1e76c1a5624370361e3f4014b1 + +info: + name: > + Captchinoo, admin login page protection with Google recaptcha <= 2.4 - Cross-Site Request Forgery to Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/245f8eec-d496-4298-800d-ea1120640e2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captchinoo-captcha-for-login-form-protection/" + google-query: inurl:"/wp-content/plugins/captchinoo-captcha-for-login-form-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captchinoo-captcha-for-login-form-protection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captchinoo-captcha-for-login-form-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captchinoo-captcha-for-login-form-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/captchinoo-captcha-for-login-form-protection-cf2f1acbf24407737a2ea0faf858d6e4.yaml b/nuclei-templates/cve-less/plugins/captchinoo-captcha-for-login-form-protection-cf2f1acbf24407737a2ea0faf858d6e4.yaml new file mode 100644 index 0000000000..35cba3eeb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/captchinoo-captcha-for-login-form-protection-cf2f1acbf24407737a2ea0faf858d6e4.yaml @@ -0,0 +1,58 @@ +id: captchinoo-captcha-for-login-form-protection-cf2f1acbf24407737a2ea0faf858d6e4 + +info: + name: > + Captchinoo Captcha <= 2.3 - Missing Authorization to Arbitrary Plugin Installation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d387a5c-717c-4383-af7d-5a5f48628cb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/captchinoo-captcha-for-login-form-protection/" + google-query: inurl:"/wp-content/plugins/captchinoo-captcha-for-login-form-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,captchinoo-captcha-for-login-form-protection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/captchinoo-captcha-for-login-form-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "captchinoo-captcha-for-login-form-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/car-e6c806cffb708ac14203b6a177746aad.yaml b/nuclei-templates/cve-less/plugins/car-e6c806cffb708ac14203b6a177746aad.yaml new file mode 100644 index 0000000000..17b220ee92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/car-e6c806cffb708ac14203b6a177746aad.yaml @@ -0,0 +1,58 @@ +id: car-e6c806cffb708ac14203b6a177746aad + +info: + name: > + Car Rental System <= 1.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4143849-1cd1-4241-acf6-a34aaf7d369c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/car/" + google-query: inurl:"/wp-content/plugins/car/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,car,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/car/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "car" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/car-rental-3827b6d062237203be17d7460bdfff1d.yaml b/nuclei-templates/cve-less/plugins/car-rental-3827b6d062237203be17d7460bdfff1d.yaml new file mode 100644 index 0000000000..00dc57523f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/car-rental-3827b6d062237203be17d7460bdfff1d.yaml @@ -0,0 +1,58 @@ +id: car-rental-3827b6d062237203be17d7460bdfff1d + +info: + name: > + Car Rental by BestWebSoft < 1.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0229b20f-65d7-4f55-a773-fd8da479723c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/car-rental/" + google-query: inurl:"/wp-content/plugins/car-rental/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,car-rental,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/car-rental/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "car-rental" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/car-rental-840d0f5e27379db8cc72bc8207e84fc7.yaml b/nuclei-templates/cve-less/plugins/car-rental-840d0f5e27379db8cc72bc8207e84fc7.yaml new file mode 100644 index 0000000000..fcf598f23a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/car-rental-840d0f5e27379db8cc72bc8207e84fc7.yaml @@ -0,0 +1,58 @@ +id: car-rental-840d0f5e27379db8cc72bc8207e84fc7 + +info: + name: > + Car Rental by BestWebSoft <= 1.1.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8eda641b-eddc-4255-80e4-c77c217f979f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/car-rental/" + google-query: inurl:"/wp-content/plugins/car-rental/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,car-rental,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/car-rental/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "car-rental" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/car-rental-system-ed300225e14e2bc5b42ef0d162dd4c0e.yaml b/nuclei-templates/cve-less/plugins/car-rental-system-ed300225e14e2bc5b42ef0d162dd4c0e.yaml new file mode 100644 index 0000000000..8f4167827f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/car-rental-system-ed300225e14e2bc5b42ef0d162dd4c0e.yaml @@ -0,0 +1,58 @@ +id: car-rental-system-ed300225e14e2bc5b42ef0d162dd4c0e + +info: + name: > + Car Rental System < 3.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cff74b3d-f056-4e9f-a62d-a3d79b4f4d56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/car-rental-system/" + google-query: inurl:"/wp-content/plugins/car-rental-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,car-rental-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/car-rental-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "car-rental-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/card-oracle-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/card-oracle-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e5d5026418 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/card-oracle-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: card-oracle-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/card-oracle/" + google-query: inurl:"/wp-content/plugins/card-oracle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,card-oracle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/card-oracle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "card-oracle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardealer-6b187667244750832b7e539032f73d81.yaml b/nuclei-templates/cve-less/plugins/cardealer-6b187667244750832b7e539032f73d81.yaml new file mode 100644 index 0000000000..a3dc65bd08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardealer-6b187667244750832b7e539032f73d81.yaml @@ -0,0 +1,58 @@ +id: cardealer-6b187667244750832b7e539032f73d81 + +info: + name: > + Car Dealer <= 3.04 - Missing Authorization to Arbitrary Plugin Installation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/621e3b3f-9647-41ec-aa06-e961e3525fea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardealer/" + google-query: inurl:"/wp-content/plugins/cardealer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardealer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardealer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardealer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardealer-87691ec7eeba77afd606ae3cf92f6d8b.yaml b/nuclei-templates/cve-less/plugins/cardealer-87691ec7eeba77afd606ae3cf92f6d8b.yaml new file mode 100644 index 0000000000..4b221c7b67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardealer-87691ec7eeba77afd606ae3cf92f6d8b.yaml @@ -0,0 +1,58 @@ +id: cardealer-87691ec7eeba77afd606ae3cf92f6d8b + +info: + name: > + Car Dealer <= 4.15 - Authenticated (Admin+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db25e8f7-07f2-470e-850e-b8cd3388baea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardealer/" + google-query: inurl:"/wp-content/plugins/cardealer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardealer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardealer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardealer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardgate-24f679f9f324edb55cd9d46a91aafdf6.yaml b/nuclei-templates/cve-less/plugins/cardgate-24f679f9f324edb55cd9d46a91aafdf6.yaml new file mode 100644 index 0000000000..bd54e083f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardgate-24f679f9f324edb55cd9d46a91aafdf6.yaml @@ -0,0 +1,58 @@ +id: cardgate-24f679f9f324edb55cd9d46a91aafdf6 + +info: + name: > + CardGate Payments for WooCommerce <= 3.1.15 - Lack of Origin Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24aadf0c-0266-4c39-ac7b-d6f09053d903?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardgate/" + google-query: inurl:"/wp-content/plugins/cardgate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardgate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardgate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardgate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardinity-free-payment-gateway-for-woocommerce-94b5a2833af1ffbcffb385277b832bff.yaml b/nuclei-templates/cve-less/plugins/cardinity-free-payment-gateway-for-woocommerce-94b5a2833af1ffbcffb385277b832bff.yaml new file mode 100644 index 0000000000..67dff5a7d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardinity-free-payment-gateway-for-woocommerce-94b5a2833af1ffbcffb385277b832bff.yaml @@ -0,0 +1,58 @@ +id: cardinity-free-payment-gateway-for-woocommerce-94b5a2833af1ffbcffb385277b832bff + +info: + name: > + Cardinity Payment Gateway for WooCommerce <= 3.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48b4214f-b722-405e-9bb7-a1faa68f0429?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardinity-free-payment-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cardinity-free-payment-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardinity-free-payment-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardinity-free-payment-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardinity-free-payment-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardoza-3d-tag-cloud-27fde2e6c4a806f7a102ac0a7cda9a14.yaml b/nuclei-templates/cve-less/plugins/cardoza-3d-tag-cloud-27fde2e6c4a806f7a102ac0a7cda9a14.yaml new file mode 100644 index 0000000000..a3c907059e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardoza-3d-tag-cloud-27fde2e6c4a806f7a102ac0a7cda9a14.yaml @@ -0,0 +1,58 @@ +id: cardoza-3d-tag-cloud-27fde2e6c4a806f7a102ac0a7cda9a14 + +info: + name: > + 3D Tag Cloud <= 3.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8540a39-87e4-4a78-abf2-c7e09dbfa4f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardoza-3d-tag-cloud/" + google-query: inurl:"/wp-content/plugins/cardoza-3d-tag-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardoza-3d-tag-cloud,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardoza-3d-tag-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardoza-3d-tag-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardoza-3d-tag-cloud-65f120a185fc7462303fec7b1afa9585.yaml b/nuclei-templates/cve-less/plugins/cardoza-3d-tag-cloud-65f120a185fc7462303fec7b1afa9585.yaml new file mode 100644 index 0000000000..daccbe3fb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardoza-3d-tag-cloud-65f120a185fc7462303fec7b1afa9585.yaml @@ -0,0 +1,58 @@ +id: cardoza-3d-tag-cloud-65f120a185fc7462303fec7b1afa9585 + +info: + name: > + 3D Tag Cloud <= 3.8 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dfa825c-b0f7-4588-9bf8-cd186a5fc0ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardoza-3d-tag-cloud/" + google-query: inurl:"/wp-content/plugins/cardoza-3d-tag-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardoza-3d-tag-cloud,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardoza-3d-tag-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardoza-3d-tag-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardoza-ajax-search-b8b3a3fbd66ce4f7e79e6dafb76c83ed.yaml b/nuclei-templates/cve-less/plugins/cardoza-ajax-search-b8b3a3fbd66ce4f7e79e6dafb76c83ed.yaml new file mode 100644 index 0000000000..be51e72cd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardoza-ajax-search-b8b3a3fbd66ce4f7e79e6dafb76c83ed.yaml @@ -0,0 +1,58 @@ +id: cardoza-ajax-search-b8b3a3fbd66ce4f7e79e6dafb76c83ed + +info: + name: > + Cardoza AJAX Search < 1.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73aa7b26-dbdf-4859-8fb9-f71dc734bb87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardoza-ajax-search/" + google-query: inurl:"/wp-content/plugins/cardoza-ajax-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardoza-ajax-search,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardoza-ajax-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardoza-ajax-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardoza-facebook-like-box-9ad733bd3bff15d00b8cf7407f8d01f4.yaml b/nuclei-templates/cve-less/plugins/cardoza-facebook-like-box-9ad733bd3bff15d00b8cf7407f8d01f4.yaml new file mode 100644 index 0000000000..43e27a86d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardoza-facebook-like-box-9ad733bd3bff15d00b8cf7407f8d01f4.yaml @@ -0,0 +1,58 @@ +id: cardoza-facebook-like-box-9ad733bd3bff15d00b8cf7407f8d01f4 + +info: + name: > + Easy Social Like Box – Popup – Sidebar Widget < 2.8.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9269e358-83cb-42e7-a30d-79f1504e576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardoza-facebook-like-box/" + google-query: inurl:"/wp-content/plugins/cardoza-facebook-like-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardoza-facebook-like-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardoza-facebook-like-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardoza-facebook-like-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-51e3e4afb8caf590d3f3c081b5b24b7d.yaml b/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-51e3e4afb8caf590d3f3c081b5b24b7d.yaml new file mode 100644 index 0000000000..07bd43931d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-51e3e4afb8caf590d3f3c081b5b24b7d.yaml @@ -0,0 +1,58 @@ +id: cardoza-wordpress-poll-51e3e4afb8caf590d3f3c081b5b24b7d + +info: + name: > + WordPress Poll <= 34.05 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21d244f4-f0cd-4d4d-8c6a-edea6b7b8145?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardoza-wordpress-poll/" + google-query: inurl:"/wp-content/plugins/cardoza-wordpress-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardoza-wordpress-poll,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardoza-wordpress-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardoza-wordpress-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 34.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-94d04ee1ef58708b41d6145bfcae5eba.yaml b/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-94d04ee1ef58708b41d6145bfcae5eba.yaml new file mode 100644 index 0000000000..5167e735d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-94d04ee1ef58708b41d6145bfcae5eba.yaml @@ -0,0 +1,58 @@ +id: cardoza-wordpress-poll-94d04ee1ef58708b41d6145bfcae5eba + +info: + name: > + WordPress Poll <= 36 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2facf62b-33cf-4438-a501-f96730077fa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardoza-wordpress-poll/" + google-query: inurl:"/wp-content/plugins/cardoza-wordpress-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardoza-wordpress-poll,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardoza-wordpress-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardoza-wordpress-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-eb36c7e115c0d22d7762853e6f5759cf.yaml b/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-eb36c7e115c0d22d7762853e6f5759cf.yaml new file mode 100644 index 0000000000..5954a15c61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cardoza-wordpress-poll-eb36c7e115c0d22d7762853e6f5759cf.yaml @@ -0,0 +1,58 @@ +id: cardoza-wordpress-poll-eb36c7e115c0d22d7762853e6f5759cf + +info: + name: > + WordPress Poll < 34.06 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d048878-12ae-442a-921d-c02a4e1e3974?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cardoza-wordpress-poll/" + google-query: inurl:"/wp-content/plugins/cardoza-wordpress-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cardoza-wordpress-poll,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cardoza-wordpress-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardoza-wordpress-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 34.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/careerfy-1af02924d8ed846b859206c9bcd93941.yaml b/nuclei-templates/cve-less/plugins/careerfy-1af02924d8ed846b859206c9bcd93941.yaml new file mode 100644 index 0000000000..793b9e14fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/careerfy-1af02924d8ed846b859206c9bcd93941.yaml @@ -0,0 +1,58 @@ +id: careerfy-1af02924d8ed846b859206c9bcd93941 + +info: + name: > + WP JobSearch < 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6290c671-c8e5-4cc3-a233-9fed584ca02f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/careerfy/" + google-query: inurl:"/wp-content/plugins/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,careerfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/careerfy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/careerfy-b6b5ac51737dc25240c45d0d6e3809e0.yaml b/nuclei-templates/cve-less/plugins/careerfy-b6b5ac51737dc25240c45d0d6e3809e0.yaml new file mode 100644 index 0000000000..71421f05ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/careerfy-b6b5ac51737dc25240c45d0d6e3809e0.yaml @@ -0,0 +1,58 @@ +id: careerfy-b6b5ac51737dc25240c45d0d6e3809e0 + +info: + name: > + WP JobSearch <= 1.7.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2a537a9-a1db-465e-8e04-2306e0d6998c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/careerfy/" + google-query: inurl:"/wp-content/plugins/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,careerfy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/careerfy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caret-country-access-limit-cc17c22adecd59067c0b764ef4c8f084.yaml b/nuclei-templates/cve-less/plugins/caret-country-access-limit-cc17c22adecd59067c0b764ef4c8f084.yaml new file mode 100644 index 0000000000..dd41976607 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caret-country-access-limit-cc17c22adecd59067c0b764ef4c8f084.yaml @@ -0,0 +1,58 @@ +id: caret-country-access-limit-cc17c22adecd59067c0b764ef4c8f084 + +info: + name: > + Caret Country Access Limit <= 1.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f8c5853-6e21-4a70-a547-e3f0f4b1d7d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caret-country-access-limit/" + google-query: inurl:"/wp-content/plugins/caret-country-access-limit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caret-country-access-limit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caret-country-access-limit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caret-country-access-limit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/carousel-anything-894cd49c8916bb82c60619f3c2cf8165.yaml b/nuclei-templates/cve-less/plugins/carousel-anything-894cd49c8916bb82c60619f3c2cf8165.yaml new file mode 100644 index 0000000000..7835949f96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/carousel-anything-894cd49c8916bb82c60619f3c2cf8165.yaml @@ -0,0 +1,58 @@ +id: carousel-anything-894cd49c8916bb82c60619f3c2cf8165 + +info: + name: > + Carousel Anything For WPBakery Page Builder <= 2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1921dcf9-d23b-4566-a0e5-9e9d5875ef82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/carousel-anything/" + google-query: inurl:"/wp-content/plugins/carousel-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,carousel-anything,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/carousel-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carousel-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/carousel-ck-3a426a819fa4af21ed44f2fbb809eae0.yaml b/nuclei-templates/cve-less/plugins/carousel-ck-3a426a819fa4af21ed44f2fbb809eae0.yaml new file mode 100644 index 0000000000..c4aff3e3f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/carousel-ck-3a426a819fa4af21ed44f2fbb809eae0.yaml @@ -0,0 +1,58 @@ +id: carousel-ck-3a426a819fa4af21ed44f2fbb809eae0 + +info: + name: > + Carousel CK <= 1.1.0 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b778048c-22e8-42ea-9d60-6e58b31a3035?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/carousel-ck/" + google-query: inurl:"/wp-content/plugins/carousel-ck/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,carousel-ck,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/carousel-ck/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carousel-ck" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/carousel-slider-24a3397fbf299aff4ecd7a231ef53936.yaml b/nuclei-templates/cve-less/plugins/carousel-slider-24a3397fbf299aff4ecd7a231ef53936.yaml new file mode 100644 index 0000000000..0f3d93f66b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/carousel-slider-24a3397fbf299aff4ecd7a231ef53936.yaml @@ -0,0 +1,58 @@ +id: carousel-slider-24a3397fbf299aff4ecd7a231ef53936 + +info: + name: > + Carousel Slider <= 2.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5465eaab-03c0-438a-8553-c1f8b06b82bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/carousel-slider/" + google-query: inurl:"/wp-content/plugins/carousel-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,carousel-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/carousel-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carousel-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/carousel-slider-630df0c98158fef2598199d5ff83a48f.yaml b/nuclei-templates/cve-less/plugins/carousel-slider-630df0c98158fef2598199d5ff83a48f.yaml new file mode 100644 index 0000000000..4d884467d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/carousel-slider-630df0c98158fef2598199d5ff83a48f.yaml @@ -0,0 +1,58 @@ +id: carousel-slider-630df0c98158fef2598199d5ff83a48f + +info: + name: > + Carousel Slider <= 2.2.9 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2857e6c1-f6c4-46fb-9837-a6a6f5e48369?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/carousel-slider/" + google-query: inurl:"/wp-content/plugins/carousel-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,carousel-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/carousel-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carousel-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/carrrot-d0bff2c3c4777b0c5230adf64beddf0b.yaml b/nuclei-templates/cve-less/plugins/carrrot-d0bff2c3c4777b0c5230adf64beddf0b.yaml new file mode 100644 index 0000000000..e511c9c290 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/carrrot-d0bff2c3c4777b0c5230adf64beddf0b.yaml @@ -0,0 +1,58 @@ +id: carrrot-d0bff2c3c4777b0c5230adf64beddf0b + +info: + name: > + Carrot <= 1.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77fa042d-1e4f-4344-bf5a-3860add7aae3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/carrrot/" + google-query: inurl:"/wp-content/plugins/carrrot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,carrrot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/carrrot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carrrot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cars-seller-auto-classifieds-script-67c6ac36101695384c180d0d88713f05.yaml b/nuclei-templates/cve-less/plugins/cars-seller-auto-classifieds-script-67c6ac36101695384c180d0d88713f05.yaml new file mode 100644 index 0000000000..1674de1f90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cars-seller-auto-classifieds-script-67c6ac36101695384c180d0d88713f05.yaml @@ -0,0 +1,58 @@ +id: cars-seller-auto-classifieds-script-67c6ac36101695384c180d0d88713f05 + +info: + name: > + Car Seller - Auto Classifieds Script <= 2.1.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b80c2a5a-49f2-4b93-a1eb-a0be53aa921d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cars-seller-auto-classifieds-script/" + google-query: inurl:"/wp-content/plugins/cars-seller-auto-classifieds-script/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cars-seller-auto-classifieds-script,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cars-seller-auto-classifieds-script/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cars-seller-auto-classifieds-script" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart-lift-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/cart-lift-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..a50e45bf62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart-lift-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: cart-lift-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart-lift/" + google-query: inurl:"/wp-content/plugins/cart-lift/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart-lift,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart-lift/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart-lift" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart-lift-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/cart-lift-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..0753f08ef7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart-lift-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: cart-lift-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart-lift/" + google-query: inurl:"/wp-content/plugins/cart-lift/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart-lift,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart-lift/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart-lift" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart-lift-e8d0684b467b2dbd613cfc306a1e44bc.yaml b/nuclei-templates/cve-less/plugins/cart-lift-e8d0684b467b2dbd613cfc306a1e44bc.yaml new file mode 100644 index 0000000000..1b220ddb46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart-lift-e8d0684b467b2dbd613cfc306a1e44bc.yaml @@ -0,0 +1,58 @@ +id: cart-lift-e8d0684b467b2dbd613cfc306a1e44bc + +info: + name: > + Cart Lift – Abandoned Cart Recovery for WooCommerce and EDD <= 3.1.5 - Reflected Cross-Site Scripting via cart_search + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eebe1bf7-0366-4226-bcbc-027186136008?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart-lift/" + google-query: inurl:"/wp-content/plugins/cart-lift/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart-lift,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart-lift/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart-lift" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart-link-for-woocommerce-691ef5f746f46ce4f71b48e893324dcb.yaml b/nuclei-templates/cve-less/plugins/cart-link-for-woocommerce-691ef5f746f46ce4f71b48e893324dcb.yaml new file mode 100644 index 0000000000..3be1fc08ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart-link-for-woocommerce-691ef5f746f46ce4f71b48e893324dcb.yaml @@ -0,0 +1,58 @@ +id: cart-link-for-woocommerce-691ef5f746f46ce4f71b48e893324dcb + +info: + name: > + Cart Link for WooCommerce <= 2.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3aa537bc-90fa-4d87-9dd5-e32aef4273c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart-link-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cart-link-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart-link-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart-link-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart-link-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart-notices-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/cart-notices-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..1ef54a9566 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart-notices-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: cart-notices-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart-notices-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cart-notices-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart-notices-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart-notices-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart-notices-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart-products-suggestions-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/cart-products-suggestions-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..98d3d4984a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart-products-suggestions-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: cart-products-suggestions-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart-products-suggestions-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cart-products-suggestions-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart-products-suggestions-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart-products-suggestions-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart-products-suggestions-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart-rest-api-for-woocommerce-f86a366b83ee22a3c8a02c83ac209077.yaml b/nuclei-templates/cve-less/plugins/cart-rest-api-for-woocommerce-f86a366b83ee22a3c8a02c83ac209077.yaml new file mode 100644 index 0000000000..93756f82d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart-rest-api-for-woocommerce-f86a366b83ee22a3c8a02c83ac209077.yaml @@ -0,0 +1,58 @@ +id: cart-rest-api-for-woocommerce-f86a366b83ee22a3c8a02c83ac209077 + +info: + name: > + CoCart – Headless ecommerce <= 3.11.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98e8e09c-f2fe-40ab-b1ce-62a1627b6b65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart-rest-api-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cart-rest-api-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart-rest-api-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart-rest-api-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart-rest-api-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart2cart-magento-to-woocommerce-migration-b1456c2b0a44366db809a824b44e5c5b.yaml b/nuclei-templates/cve-less/plugins/cart2cart-magento-to-woocommerce-migration-b1456c2b0a44366db809a824b44e5c5b.yaml new file mode 100644 index 0000000000..ece7f7121c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart2cart-magento-to-woocommerce-migration-b1456c2b0a44366db809a824b44e5c5b.yaml @@ -0,0 +1,58 @@ +id: cart2cart-magento-to-woocommerce-migration-b1456c2b0a44366db809a824b44e5c5b + +info: + name: > + Cart2Cart: Magento to WooCommerce Migration <= 2.0.0 - Missing Authorization via setToken + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d9ab83f-6d0b-4fe4-a121-87b09dcc0953?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart2cart-magento-to-woocommerce-migration/" + google-query: inurl:"/wp-content/plugins/cart2cart-magento-to-woocommerce-migration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart2cart-magento-to-woocommerce-migration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart2cart-magento-to-woocommerce-migration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart2cart-magento-to-woocommerce-migration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart66-lite-06ef746af3d0592e05a038c507873a93.yaml b/nuclei-templates/cve-less/plugins/cart66-lite-06ef746af3d0592e05a038c507873a93.yaml new file mode 100644 index 0000000000..8d7a0db3ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart66-lite-06ef746af3d0592e05a038c507873a93.yaml @@ -0,0 +1,58 @@ +id: cart66-lite-06ef746af3d0592e05a038c507873a93 + +info: + name: > + Cart66 Lite :: WordPress Ecommerce < 1.5.1.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20de9544-b2fe-470c-a7a4-b662b59d6d31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart66-lite/" + google-query: inurl:"/wp-content/plugins/cart66-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart66-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart66-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart66-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart66-lite-412eb3ff2c6b3450ae105bf1638dee64.yaml b/nuclei-templates/cve-less/plugins/cart66-lite-412eb3ff2c6b3450ae105bf1638dee64.yaml new file mode 100644 index 0000000000..a96696a513 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart66-lite-412eb3ff2c6b3450ae105bf1638dee64.yaml @@ -0,0 +1,58 @@ +id: cart66-lite-412eb3ff2c6b3450ae105bf1638dee64 + +info: + name: > + Cart66 Lite :: WordPress Ecommerce <= 1.5.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34d8ecee-ad52-47cd-ac78-4a82aa2ff58a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart66-lite/" + google-query: inurl:"/wp-content/plugins/cart66-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart66-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart66-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart66-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart66-lite-67c99f9c8f327331a1d82c5ff5d685e7.yaml b/nuclei-templates/cve-less/plugins/cart66-lite-67c99f9c8f327331a1d82c5ff5d685e7.yaml new file mode 100644 index 0000000000..4cfc361b73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart66-lite-67c99f9c8f327331a1d82c5ff5d685e7.yaml @@ -0,0 +1,58 @@ +id: cart66-lite-67c99f9c8f327331a1d82c5ff5d685e7 + +info: + name: > + Cart66 Lite :: WordPress Ecommerce < 1.5.1.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d819b54-f057-4875-8e40-f5c77db2e5fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart66-lite/" + google-query: inurl:"/wp-content/plugins/cart66-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart66-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart66-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart66-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart66-lite-70045bd7c712e66fb897584cd45830ed.yaml b/nuclei-templates/cve-less/plugins/cart66-lite-70045bd7c712e66fb897584cd45830ed.yaml new file mode 100644 index 0000000000..5b281aa269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart66-lite-70045bd7c712e66fb897584cd45830ed.yaml @@ -0,0 +1,58 @@ +id: cart66-lite-70045bd7c712e66fb897584cd45830ed + +info: + name: > + Cart66 Lite :: WordPress Ecommerce <= 1.5.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55893639-3b47-4ddc-b896-4b66341a4eba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart66-lite/" + google-query: inurl:"/wp-content/plugins/cart66-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart66-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart66-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart66-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart66-lite-73c7b664803cc72f6ed74c19b2560471.yaml b/nuclei-templates/cve-less/plugins/cart66-lite-73c7b664803cc72f6ed74c19b2560471.yaml new file mode 100644 index 0000000000..ef0f7312c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart66-lite-73c7b664803cc72f6ed74c19b2560471.yaml @@ -0,0 +1,58 @@ +id: cart66-lite-73c7b664803cc72f6ed74c19b2560471 + +info: + name: > + Cart66 Lite :: WordPress Ecommerce < 1.5.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/675c86fb-e01f-4957-a49c-31b96383304f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart66-lite/" + google-query: inurl:"/wp-content/plugins/cart66-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart66-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart66-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart66-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cart66-lite-e1efc7cab467c2f5bb9e0770c86a7f44.yaml b/nuclei-templates/cve-less/plugins/cart66-lite-e1efc7cab467c2f5bb9e0770c86a7f44.yaml new file mode 100644 index 0000000000..fe08d6dfa1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cart66-lite-e1efc7cab467c2f5bb9e0770c86a7f44.yaml @@ -0,0 +1,58 @@ +id: cart66-lite-e1efc7cab467c2f5bb9e0770c86a7f44 + +info: + name: > + Cart66 Lite - WordPress Ecommerce < 1.5.4 - Directory Traversal to Arbitrary File Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d9736e0-1a10-4ea0-a514-62ff49e36c43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cart66-lite/" + google-query: inurl:"/wp-content/plugins/cart66-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cart66-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cart66-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cart66-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartflows-2031b341cdd31868784b73bf44a323dc.yaml b/nuclei-templates/cve-less/plugins/cartflows-2031b341cdd31868784b73bf44a323dc.yaml new file mode 100644 index 0000000000..befc4a925c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartflows-2031b341cdd31868784b73bf44a323dc.yaml @@ -0,0 +1,58 @@ +id: cartflows-2031b341cdd31868784b73bf44a323dc + +info: + name: > + WooCommerce Checkout & Funnel Builder by CartFlows – Create High Converting Stores For WooCommerce <= 1.5.15 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d98c849-4178-4cee-846b-2c136bc56daf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartflows/" + google-query: inurl:"/wp-content/plugins/cartflows/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartflows,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartflows/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartflows" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartflows-2af5d7487ceb106d0bc29f7a8108e53c.yaml b/nuclei-templates/cve-less/plugins/cartflows-2af5d7487ceb106d0bc29f7a8108e53c.yaml new file mode 100644 index 0000000000..b21c1e84ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartflows-2af5d7487ceb106d0bc29f7a8108e53c.yaml @@ -0,0 +1,58 @@ +id: cartflows-2af5d7487ceb106d0bc29f7a8108e53c + +info: + name: > + Funnel Builder <= 1.3.0 - Arbitrary Plugin Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0b95670-0767-4325-88d0-4ae6d7302558?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartflows/" + google-query: inurl:"/wp-content/plugins/cartflows/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartflows,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartflows/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartflows" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartflows-9051aa7c81fdec9135cd53a28b43a964.yaml b/nuclei-templates/cve-less/plugins/cartflows-9051aa7c81fdec9135cd53a28b43a964.yaml new file mode 100644 index 0000000000..e902f26302 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartflows-9051aa7c81fdec9135cd53a28b43a964.yaml @@ -0,0 +1,58 @@ +id: cartflows-9051aa7c81fdec9135cd53a28b43a964 + +info: + name: > + Funnel Builder by CartFlows <= 1.6.12 - Authenticated Stored Cross-Site scripting via FB Pixel ID and Google Analytics ID + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/083d368c-ba38-433a-b499-c00d205bd331?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartflows/" + google-query: inurl:"/wp-content/plugins/cartflows/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartflows,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartflows/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartflows" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartflows-c62d1469eaee8b9fee97540c3f237340.yaml b/nuclei-templates/cve-less/plugins/cartflows-c62d1469eaee8b9fee97540c3f237340.yaml new file mode 100644 index 0000000000..1ce99e4e82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartflows-c62d1469eaee8b9fee97540c3f237340.yaml @@ -0,0 +1,58 @@ +id: cartflows-c62d1469eaee8b9fee97540c3f237340 + +info: + name: > + CartFlows <= 1.11.11 - Insecure Direct Object Reference to Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9002f6e-4345-4908-9cb8-9841a2458eb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartflows/" + google-query: inurl:"/wp-content/plugins/cartflows/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartflows,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartflows/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartflows" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartflows-ef918f495b11d984490181ededbf81f0.yaml b/nuclei-templates/cve-less/plugins/cartflows-ef918f495b11d984490181ededbf81f0.yaml new file mode 100644 index 0000000000..83eb0c29ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartflows-ef918f495b11d984490181ededbf81f0.yaml @@ -0,0 +1,58 @@ +id: cartflows-ef918f495b11d984490181ededbf81f0 + +info: + name: > + Funnel Builder by CartFlows <= 2.0.1 - Authenticated (Editor+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f75e37d-a94e-4103-b706-5fead24f1f73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartflows/" + google-query: inurl:"/wp-content/plugins/cartflows/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartflows,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartflows/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartflows" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartflows-pro-5f1b3c571aefdb13a941afd0f6a1e2f0.yaml b/nuclei-templates/cve-less/plugins/cartflows-pro-5f1b3c571aefdb13a941afd0f6a1e2f0.yaml new file mode 100644 index 0000000000..e4ee292ed6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartflows-pro-5f1b3c571aefdb13a941afd0f6a1e2f0.yaml @@ -0,0 +1,58 @@ +id: cartflows-pro-5f1b3c571aefdb13a941afd0f6a1e2f0 + +info: + name: > + CartFlows Pro <= 1.11.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0631ec9-fb72-4573-a41b-9b6b01aeaae9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartflows-pro/" + google-query: inurl:"/wp-content/plugins/cartflows-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartflows-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartflows-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartflows-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartflows-pro-90187049563f57856c792eeb068a786a.yaml b/nuclei-templates/cve-less/plugins/cartflows-pro-90187049563f57856c792eeb068a786a.yaml new file mode 100644 index 0000000000..b66474dc37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartflows-pro-90187049563f57856c792eeb068a786a.yaml @@ -0,0 +1,58 @@ +id: cartflows-pro-90187049563f57856c792eeb068a786a + +info: + name: > + CartFlows Pro <= 1.11.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85ba90ae-8144-42f0-90db-e7f2638fec47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartflows-pro/" + google-query: inurl:"/wp-content/plugins/cartflows-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartflows-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartflows-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartflows-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartoon-url-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cartoon-url-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a91371927c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartoon-url-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cartoon-url-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartoon-url/" + google-query: inurl:"/wp-content/plugins/cartoon-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartoon-url,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartoon-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartoon-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartpauj-register-captcha-7feee71659763988d044dea046c00a68.yaml b/nuclei-templates/cve-less/plugins/cartpauj-register-captcha-7feee71659763988d044dea046c00a68.yaml new file mode 100644 index 0000000000..0a7520f014 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartpauj-register-captcha-7feee71659763988d044dea046c00a68.yaml @@ -0,0 +1,58 @@ +id: cartpauj-register-captcha-7feee71659763988d044dea046c00a68 + +info: + name: > + Cartpauj Register Captcha <= 1.0.02 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b004132-b2a6-422d-882e-5122708d9709?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartpauj-register-captcha/" + google-query: inurl:"/wp-content/plugins/cartpauj-register-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartpauj-register-captcha,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartpauj-register-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartpauj-register-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cartpops-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cartpops-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c90629d051 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cartpops-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cartpops-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cartpops/" + google-query: inurl:"/wp-content/plugins/cartpops/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cartpops,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cartpops/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cartpops" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/carts-guru-484f6782156958a3ab27ac5661456a24.yaml b/nuclei-templates/cve-less/plugins/carts-guru-484f6782156958a3ab27ac5661456a24.yaml new file mode 100644 index 0000000000..7a65b30310 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/carts-guru-484f6782156958a3ab27ac5661456a24.yaml @@ -0,0 +1,58 @@ +id: carts-guru-484f6782156958a3ab27ac5661456a24 + +info: + name: > + Carts Guru <= 1.4.5 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fcde31b-6a58-4d8a-887f-1b2221b72c77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/carts-guru/" + google-query: inurl:"/wp-content/plugins/carts-guru/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,carts-guru,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/carts-guru/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carts-guru" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cashtomer-652b592a23d9d8ef3233d28a405d4909.yaml b/nuclei-templates/cve-less/plugins/cashtomer-652b592a23d9d8ef3233d28a405d4909.yaml new file mode 100644 index 0000000000..e991cf34c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cashtomer-652b592a23d9d8ef3233d28a405d4909.yaml @@ -0,0 +1,58 @@ +id: cashtomer-652b592a23d9d8ef3233d28a405d4909 + +info: + name: > + Cashtomer <= 1.0.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9965ea42-56c4-4ec9-9159-d971e913469e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cashtomer/" + google-query: inurl:"/wp-content/plugins/cashtomer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cashtomer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cashtomer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cashtomer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-755b5e97b09ddabb36f708e4895b834c.yaml b/nuclei-templates/cve-less/plugins/casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-755b5e97b09ddabb36f708e4895b834c.yaml new file mode 100644 index 0000000000..4489207b01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-755b5e97b09ddabb36f708e4895b834c.yaml @@ -0,0 +1,58 @@ +id: casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang-755b5e97b09ddabb36f708e4895b834c + +info: + name: > + Casso – Tự động xác nhận thanh toán chuyển khoản ngân hàng <= 2.8.6 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edf0760c-356a-4c55-9ccc-9f086dae12b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang/" + google-query: inurl:"/wp-content/plugins/casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "casso-tu-dong-xac-nhan-thanh-toan-chuyen-khoan-ngan-hang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catablog-1319960b548fb4b068018632e6f16db7.yaml b/nuclei-templates/cve-less/plugins/catablog-1319960b548fb4b068018632e6f16db7.yaml new file mode 100644 index 0000000000..b9516bdc32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catablog-1319960b548fb4b068018632e6f16db7.yaml @@ -0,0 +1,58 @@ +id: catablog-1319960b548fb4b068018632e6f16db7 + +info: + name: > + CataBlog <= 1.7.0 - Authenticated (Editor+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8794854d-e931-4a85-b767-2ab81bfcb780?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catablog/" + google-query: inurl:"/wp-content/plugins/catablog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catablog,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catablog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catablog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catablog-1e67f5ab14ff0db89bd5b743da99072c.yaml b/nuclei-templates/cve-less/plugins/catablog-1e67f5ab14ff0db89bd5b743da99072c.yaml new file mode 100644 index 0000000000..04229b63de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catablog-1e67f5ab14ff0db89bd5b743da99072c.yaml @@ -0,0 +1,58 @@ +id: catablog-1e67f5ab14ff0db89bd5b743da99072c + +info: + name: > + CataBlog < 1.6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1d8a9b5-e833-4810-a13a-fd360752e711?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catablog/" + google-query: inurl:"/wp-content/plugins/catablog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catablog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catablog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catablog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catablog-457555c66db611fbfa678adc71e787e6.yaml b/nuclei-templates/cve-less/plugins/catablog-457555c66db611fbfa678adc71e787e6.yaml new file mode 100644 index 0000000000..cd10d96ddc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catablog-457555c66db611fbfa678adc71e787e6.yaml @@ -0,0 +1,58 @@ +id: catablog-457555c66db611fbfa678adc71e787e6 + +info: + name: > + CataBlog <= 1.7.0 - Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18d1ba80-ddf6-4076-bc78-78647b964bcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catablog/" + google-query: inurl:"/wp-content/plugins/catablog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catablog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catablog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catablog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catalog-ba6ce63fd5cf470afef6a6aae7117079.yaml b/nuclei-templates/cve-less/plugins/catalog-ba6ce63fd5cf470afef6a6aae7117079.yaml new file mode 100644 index 0000000000..912762b4f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catalog-ba6ce63fd5cf470afef6a6aae7117079.yaml @@ -0,0 +1,58 @@ +id: catalog-ba6ce63fd5cf470afef6a6aae7117079 + +info: + name: > + SpiderCatalog <= 1.7.3 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53124575-ca94-47d6-b0dd-033ac17c24ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catalog/" + google-query: inurl:"/wp-content/plugins/catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catalog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catalyst-connect-client-portal-0444dd694cfe16cd55e5d0cab9135b80.yaml b/nuclei-templates/cve-less/plugins/catalyst-connect-client-portal-0444dd694cfe16cd55e5d0cab9135b80.yaml new file mode 100644 index 0000000000..5936c3f3dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catalyst-connect-client-portal-0444dd694cfe16cd55e5d0cab9135b80.yaml @@ -0,0 +1,58 @@ +id: catalyst-connect-client-portal-0444dd694cfe16cd55e5d0cab9135b80 + +info: + name: > + Catalyst Connect Zoho CRM Client Portal <= 2.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d63543f9-4865-444f-9a32-3b23e92b0bd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catalyst-connect-client-portal/" + google-query: inurl:"/wp-content/plugins/catalyst-connect-client-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catalyst-connect-client-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catalyst-connect-client-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catalyst-connect-client-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catalyst-connect-client-portal-719aecac015dde0f14f4cf5400965308.yaml b/nuclei-templates/cve-less/plugins/catalyst-connect-client-portal-719aecac015dde0f14f4cf5400965308.yaml new file mode 100644 index 0000000000..1c8ce95ed1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catalyst-connect-client-portal-719aecac015dde0f14f4cf5400965308.yaml @@ -0,0 +1,58 @@ +id: catalyst-connect-client-portal-719aecac015dde0f14f4cf5400965308 + +info: + name: > + Catalyst Connect Zoho CRM Client Portal <= 2.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88cea535-1042-4011-aee9-684d7661e193?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catalyst-connect-client-portal/" + google-query: inurl:"/wp-content/plugins/catalyst-connect-client-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catalyst-connect-client-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catalyst-connect-client-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catalyst-connect-client-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-breadcrumb-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-breadcrumb-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..0d18f435b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-breadcrumb-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-breadcrumb-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-breadcrumb/" + google-query: inurl:"/wp-content/plugins/catch-breadcrumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-breadcrumb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-breadcrumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-breadcrumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-breadcrumb-4ba0680f325fbd064afe994053bfe704.yaml b/nuclei-templates/cve-less/plugins/catch-breadcrumb-4ba0680f325fbd064afe994053bfe704.yaml new file mode 100644 index 0000000000..d39dfbccba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-breadcrumb-4ba0680f325fbd064afe994053bfe704.yaml @@ -0,0 +1,58 @@ +id: catch-breadcrumb-4ba0680f325fbd064afe994053bfe704 + +info: + name: > + Catch Breadcrumb <= 1.5.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4983c2f-f9f6-4bd9-9c38-0ad3756f92b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-breadcrumb/" + google-query: inurl:"/wp-content/plugins/catch-breadcrumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-breadcrumb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-breadcrumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-breadcrumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-duplicate-switcher-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-duplicate-switcher-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..eedd5f5fb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-duplicate-switcher-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-duplicate-switcher-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-duplicate-switcher/" + google-query: inurl:"/wp-content/plugins/catch-duplicate-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-duplicate-switcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-duplicate-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-duplicate-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-gallery-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-gallery-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..780e779d22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-gallery-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-gallery-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-gallery/" + google-query: inurl:"/wp-content/plugins/catch-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-ids-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-ids-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..0bc1a64b11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-ids-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-ids-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-ids/" + google-query: inurl:"/wp-content/plugins/catch-ids/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-ids,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-ids/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-ids" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-import-export-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-import-export-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..ec7d4402b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-import-export-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-import-export-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-import-export/" + google-query: inurl:"/wp-content/plugins/catch-import-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-import-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-import-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-import-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-infinite-scroll-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-infinite-scroll-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..539a010979 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-infinite-scroll-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-infinite-scroll-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-infinite-scroll/" + google-query: inurl:"/wp-content/plugins/catch-infinite-scroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-infinite-scroll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-infinite-scroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-infinite-scroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-instagram-feed-gallery-widget-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-instagram-feed-gallery-widget-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..aa7710bf91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-instagram-feed-gallery-widget-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-instagram-feed-gallery-widget-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-instagram-feed-gallery-widget/" + google-query: inurl:"/wp-content/plugins/catch-instagram-feed-gallery-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-instagram-feed-gallery-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-instagram-feed-gallery-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-instagram-feed-gallery-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-scroll-progress-bar-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-scroll-progress-bar-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..e6b065cc36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-scroll-progress-bar-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-scroll-progress-bar-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-scroll-progress-bar/" + google-query: inurl:"/wp-content/plugins/catch-scroll-progress-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-scroll-progress-bar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-scroll-progress-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-scroll-progress-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-sticky-menu-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-sticky-menu-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..095eb6692c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-sticky-menu-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-sticky-menu-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-sticky-menu/" + google-query: inurl:"/wp-content/plugins/catch-sticky-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-sticky-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-sticky-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-sticky-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-themes-demo-import-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-themes-demo-import-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..ec7ffa8338 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-themes-demo-import-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-themes-demo-import-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-themes-demo-import/" + google-query: inurl:"/wp-content/plugins/catch-themes-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-themes-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-themes-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-themes-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-themes-demo-import-b60d38a6f27b4184d7cf8b134a701e36.yaml b/nuclei-templates/cve-less/plugins/catch-themes-demo-import-b60d38a6f27b4184d7cf8b134a701e36.yaml new file mode 100644 index 0000000000..076b6d984f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-themes-demo-import-b60d38a6f27b4184d7cf8b134a701e36.yaml @@ -0,0 +1,58 @@ +id: catch-themes-demo-import-b60d38a6f27b4184d7cf8b134a701e36 + +info: + name: > + Catch Themes Demo Import <= 2.1 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7f10f62-98cf-4629-9a48-59a42490276d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-themes-demo-import/" + google-query: inurl:"/wp-content/plugins/catch-themes-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-themes-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-themes-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-themes-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-themes-demo-import-ede5967c43f0c429d90aef07bf32832d.yaml b/nuclei-templates/cve-less/plugins/catch-themes-demo-import-ede5967c43f0c429d90aef07bf32832d.yaml new file mode 100644 index 0000000000..b5f0e1ddff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-themes-demo-import-ede5967c43f0c429d90aef07bf32832d.yaml @@ -0,0 +1,58 @@ +id: catch-themes-demo-import-ede5967c43f0c429d90aef07bf32832d + +info: + name: > + Catch Themes Demo Import <= 1.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/007ec879-7241-4dd2-9b81-93e44786bbcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-themes-demo-import/" + google-query: inurl:"/wp-content/plugins/catch-themes-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-themes-demo-import,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-themes-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-themes-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-under-construction-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-under-construction-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..fea087ffa3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-under-construction-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-under-construction-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-under-construction/" + google-query: inurl:"/wp-content/plugins/catch-under-construction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-under-construction,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-under-construction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-under-construction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-web-tools-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/catch-web-tools-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..94ebcd4934 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-web-tools-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: catch-web-tools-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-web-tools/" + google-query: inurl:"/wp-content/plugins/catch-web-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-web-tools,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-web-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-web-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catch-web-tools-c59a23b4a74b5a776a9442e033941d2d.yaml b/nuclei-templates/cve-less/plugins/catch-web-tools-c59a23b4a74b5a776a9442e033941d2d.yaml new file mode 100644 index 0000000000..84945b6281 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catch-web-tools-c59a23b4a74b5a776a9442e033941d2d.yaml @@ -0,0 +1,58 @@ +id: catch-web-tools-c59a23b4a74b5a776a9442e033941d2d + +info: + name: > + Catch Web Tools <= 2.7.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63bced7f-89ec-4c52-9e58-63ef2d311b31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catch-web-tools/" + google-query: inurl:"/wp-content/plugins/catch-web-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catch-web-tools,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catch-web-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catch-web-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/catchers-helpdesk-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/catchers-helpdesk-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..5b64921a4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/catchers-helpdesk-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: catchers-helpdesk-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/catchers-helpdesk/" + google-query: inurl:"/wp-content/plugins/catchers-helpdesk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,catchers-helpdesk,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/catchers-helpdesk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "catchers-helpdesk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categories-gallery-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/categories-gallery-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..27d8fa94fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categories-gallery-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: categories-gallery-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categories-gallery/" + google-query: inurl:"/wp-content/plugins/categories-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categories-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categories-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categories-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categories-gallery-woocommerce-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/categories-gallery-woocommerce-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..7118f969de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categories-gallery-woocommerce-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: categories-gallery-woocommerce-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categories-gallery-woocommerce/" + google-query: inurl:"/wp-content/plugins/categories-gallery-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categories-gallery-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categories-gallery-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categories-gallery-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-2f5fc8a76419fe6bea249f884a02d85d.yaml b/nuclei-templates/cve-less/plugins/categorify-2f5fc8a76419fe6bea249f884a02d85d.yaml new file mode 100644 index 0000000000..36d88c1b34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-2f5fc8a76419fe6bea249f884a02d85d.yaml @@ -0,0 +1,58 @@ +id: categorify-2f5fc8a76419fe6bea249f884a02d85d + +info: + name: > + Categorify <= 1.0.7.4 - Missing Authorization in categorifyAjaxRenameCategory + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9a3dc87-5309-41fe-bfc3-60b5878b6c57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-5151b196e7969f448d1e0346e210bd82.yaml b/nuclei-templates/cve-less/plugins/categorify-5151b196e7969f448d1e0346e210bd82.yaml new file mode 100644 index 0000000000..a711a4acde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-5151b196e7969f448d1e0346e210bd82.yaml @@ -0,0 +1,58 @@ +id: categorify-5151b196e7969f448d1e0346e210bd82 + +info: + name: > + Categorify <= 1.0.7.4 - Cross-Site Request Forgery via categorifyAjaxRenameCategory + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58b29729-e9c3-4d57-affd-6142dfa8cc6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-5f87f741e48b627a6080cd7b2aa94d46.yaml b/nuclei-templates/cve-less/plugins/categorify-5f87f741e48b627a6080cd7b2aa94d46.yaml new file mode 100644 index 0000000000..cd676e5b4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-5f87f741e48b627a6080cd7b2aa94d46.yaml @@ -0,0 +1,58 @@ +id: categorify-5f87f741e48b627a6080cd7b2aa94d46 + +info: + name: > + Categorify <= 1.0.7.4 - Missing Authorization in categorifyAjaxAddCategory + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c74cf-a109-4f77-a740-5a43ccd4e96a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-714c67b8b7c104cb121813dc61b2219b.yaml b/nuclei-templates/cve-less/plugins/categorify-714c67b8b7c104cb121813dc61b2219b.yaml new file mode 100644 index 0000000000..6fb2b7f5db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-714c67b8b7c104cb121813dc61b2219b.yaml @@ -0,0 +1,58 @@ +id: categorify-714c67b8b7c104cb121813dc61b2219b + +info: + name: > + Categorify <= 1.0.7.4 - Cross-Site Request Forgery via categorifyAjaxUpdateFolderPosition + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca28c91-f75e-4691-91cf-459cc9da5ad8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-aca00b4de03dae498ba9e363cc7669df.yaml b/nuclei-templates/cve-less/plugins/categorify-aca00b4de03dae498ba9e363cc7669df.yaml new file mode 100644 index 0000000000..1632acce07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-aca00b4de03dae498ba9e363cc7669df.yaml @@ -0,0 +1,58 @@ +id: categorify-aca00b4de03dae498ba9e363cc7669df + +info: + name: > + Categorify <= 1.0.7.4 - Cross-Site Request Forgery via categorifyAjaxClearCategory + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c2712d-0865-4759-98da-1e11a26f2466?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-b283da624a496380d695ed4b3e4a8065.yaml b/nuclei-templates/cve-less/plugins/categorify-b283da624a496380d695ed4b3e4a8065.yaml new file mode 100644 index 0000000000..c6e8d42af5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-b283da624a496380d695ed4b3e4a8065.yaml @@ -0,0 +1,58 @@ +id: categorify-b283da624a496380d695ed4b3e4a8065 + +info: + name: > + Categorify <= 1.0.7.4 - Cross-Site Request Forgery via categorifyAjaxAddCategory + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78422a30-bdc6-4e7c-a018-c3dc4b4be6a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/categorify-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3d12485182 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: categorify-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-bf5e4013e055d945f3801300e58d2936.yaml b/nuclei-templates/cve-less/plugins/categorify-bf5e4013e055d945f3801300e58d2936.yaml new file mode 100644 index 0000000000..86e002a9da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-bf5e4013e055d945f3801300e58d2936.yaml @@ -0,0 +1,58 @@ +id: categorify-bf5e4013e055d945f3801300e58d2936 + +info: + name: > + Categorify <= 1.0.7.4 - Missing Authorization in categorifyAjaxClearCategory + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acccc6ae-553d-4ed5-8ba9-06a9061d725c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-c408e44047c03520c426eb804c18a88a.yaml b/nuclei-templates/cve-less/plugins/categorify-c408e44047c03520c426eb804c18a88a.yaml new file mode 100644 index 0000000000..89d4605786 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-c408e44047c03520c426eb804c18a88a.yaml @@ -0,0 +1,58 @@ +id: categorify-c408e44047c03520c426eb804c18a88a + +info: + name: > + Categorify <= 1.0.7.4 - Missing Authorization in categorifyAjaxUpdateFolderPosition + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45badd20-1ba8-44be-8a7c-2ce21261e208?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-dd16da990120154a69703f2e9dcba084.yaml b/nuclei-templates/cve-less/plugins/categorify-dd16da990120154a69703f2e9dcba084.yaml new file mode 100644 index 0000000000..5906ff326f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-dd16da990120154a69703f2e9dcba084.yaml @@ -0,0 +1,58 @@ +id: categorify-dd16da990120154a69703f2e9dcba084 + +info: + name: > + Categorify <= 1.0.7.4 - Missing Authorization in categorifyAjaxDeleteCategory + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c63ddc62-a4f1-4da4-a65e-4573369d6c30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/categorify-f9749bdc11799874266b6a084bbe85ae.yaml b/nuclei-templates/cve-less/plugins/categorify-f9749bdc11799874266b6a084bbe85ae.yaml new file mode 100644 index 0000000000..7edbede341 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/categorify-f9749bdc11799874266b6a084bbe85ae.yaml @@ -0,0 +1,58 @@ +id: categorify-f9749bdc11799874266b6a084bbe85ae + +info: + name: > + Categorify <= 1.0.7.4 - Cross-Site Request Forgery via categorifyAjaxDeleteCategory + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08c79118-9dad-44fd-b683-7950276d3808?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/categorify/" + google-query: inurl:"/wp-content/plugins/categorify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,categorify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/categorify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "categorify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-grid-view-gallery-f90056d9800bc9f38b8a269e9be583b2.yaml b/nuclei-templates/cve-less/plugins/category-grid-view-gallery-f90056d9800bc9f38b8a269e9be583b2.yaml new file mode 100644 index 0000000000..1484b61fdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-grid-view-gallery-f90056d9800bc9f38b8a269e9be583b2.yaml @@ -0,0 +1,58 @@ +id: category-grid-view-gallery-f90056d9800bc9f38b8a269e9be583b2 + +info: + name: > + Category Grid View Gallery <= 2.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cf85717-179a-4539-b57d-fccd8d9dda58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-grid-view-gallery/" + google-query: inurl:"/wp-content/plugins/category-grid-view-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-grid-view-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-grid-view-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-grid-view-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-list-portfolio-page-a4aa366f217005e74322ff2bf7a0e182.yaml b/nuclei-templates/cve-less/plugins/category-list-portfolio-page-a4aa366f217005e74322ff2bf7a0e182.yaml new file mode 100644 index 0000000000..ae583edfc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-list-portfolio-page-a4aa366f217005e74322ff2bf7a0e182.yaml @@ -0,0 +1,58 @@ +id: category-list-portfolio-page-a4aa366f217005e74322ff2bf7a0e182 + +info: + name: > + TimThumb <= 1.33 - Remote File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e062c794-1ab7-4d44-95da-40cd401f3a37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-list-portfolio-page/" + google-query: inurl:"/wp-content/plugins/category-list-portfolio-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-list-portfolio-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-list-portfolio-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-list-portfolio-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-page-icons-76db9edf1640ca25c16598ce97e68f02.yaml b/nuclei-templates/cve-less/plugins/category-page-icons-76db9edf1640ca25c16598ce97e68f02.yaml new file mode 100644 index 0000000000..da324de5c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-page-icons-76db9edf1640ca25c16598ce97e68f02.yaml @@ -0,0 +1,58 @@ +id: category-page-icons-76db9edf1640ca25c16598ce97e68f02 + +info: + name: > + Category and Page Icons <= 0.9.1 - Arbitrary File Upload and Deletion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86eb42de-a820-4ba7-99cb-03d068e208a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-page-icons/" + google-query: inurl:"/wp-content/plugins/category-page-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-page-icons,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-page-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-page-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-post-list-widget-4f664c5f9a6ed3cf0ca52dbb21a8c73c.yaml b/nuclei-templates/cve-less/plugins/category-post-list-widget-4f664c5f9a6ed3cf0ca52dbb21a8c73c.yaml new file mode 100644 index 0000000000..f9489aa14d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-post-list-widget-4f664c5f9a6ed3cf0ca52dbb21a8c73c.yaml @@ -0,0 +1,58 @@ +id: category-post-list-widget-4f664c5f9a6ed3cf0ca52dbb21a8c73c + +info: + name: > + Category Post List Widget <= 2.0 - Unauthenticated Stored Cross-Site Scripting via custom_css + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0182ca6c-23f8-4212-bfd8-cb898e98b37b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-post-list-widget/" + google-query: inurl:"/wp-content/plugins/category-post-list-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-post-list-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-post-list-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-post-list-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-post-list-widget-86c2efd6cd386af606e7ebf660f34040.yaml b/nuclei-templates/cve-less/plugins/category-post-list-widget-86c2efd6cd386af606e7ebf660f34040.yaml new file mode 100644 index 0000000000..965a449869 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-post-list-widget-86c2efd6cd386af606e7ebf660f34040.yaml @@ -0,0 +1,58 @@ +id: category-post-list-widget-86c2efd6cd386af606e7ebf660f34040 + +info: + name: > + Category Post List Widget <= 2.0 - Cross-Site Request Forgery via get_cplw_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04ffc248-2b5c-4c64-8bfd-361a8ff6a8af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-post-list-widget/" + google-query: inurl:"/wp-content/plugins/category-post-list-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-post-list-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-post-list-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-post-list-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-seo-meta-tags-37be0ad02414c3e78dc60922e377602e.yaml b/nuclei-templates/cve-less/plugins/category-seo-meta-tags-37be0ad02414c3e78dc60922e377602e.yaml new file mode 100644 index 0000000000..41590993ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-seo-meta-tags-37be0ad02414c3e78dc60922e377602e.yaml @@ -0,0 +1,58 @@ +id: category-seo-meta-tags-37be0ad02414c3e78dc60922e377602e + +info: + name: > + Category SEO Meta Tags <= 2.5 - Cross-Site Request Forgery via csmt_admin_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de6048e7-75c6-44b1-bc68-e36dce936c78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-seo-meta-tags/" + google-query: inurl:"/wp-content/plugins/category-seo-meta-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-seo-meta-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-seo-meta-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-seo-meta-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-seo-meta-tags-44b23b8882e9805e87909dc573565952.yaml b/nuclei-templates/cve-less/plugins/category-seo-meta-tags-44b23b8882e9805e87909dc573565952.yaml new file mode 100644 index 0000000000..1b1de7b257 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-seo-meta-tags-44b23b8882e9805e87909dc573565952.yaml @@ -0,0 +1,58 @@ +id: category-seo-meta-tags-44b23b8882e9805e87909dc573565952 + +info: + name: > + Category SEO Meta Tags <= 2.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6985a8bb-0ad5-4b02-9a95-9dbc6018dec0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-seo-meta-tags/" + google-query: inurl:"/wp-content/plugins/category-seo-meta-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-seo-meta-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-seo-meta-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-seo-meta-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-0ff74c47b60a2c36a0f0a3f6185c5446.yaml b/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-0ff74c47b60a2c36a0f0a3f6185c5446.yaml new file mode 100644 index 0000000000..80e819d6ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-0ff74c47b60a2c36a0f0a3f6185c5446.yaml @@ -0,0 +1,58 @@ +id: category-specific-rss-feed-menu-0ff74c47b60a2c36a0f0a3f6185c5446 + +info: + name: > + Category Specific RSS feed Subscription <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ad5db8f-c3c2-4b76-abc6-3d95e0567ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-specific-rss-feed-menu/" + google-query: inurl:"/wp-content/plugins/category-specific-rss-feed-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-specific-rss-feed-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-specific-rss-feed-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-specific-rss-feed-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-299c560ce9cc99513d88a13d89852030.yaml b/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-299c560ce9cc99513d88a13d89852030.yaml new file mode 100644 index 0000000000..bc249c96e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-299c560ce9cc99513d88a13d89852030.yaml @@ -0,0 +1,58 @@ +id: category-specific-rss-feed-menu-299c560ce9cc99513d88a13d89852030 + +info: + name: > + Category Specific RSS Feed Subscription <= 2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41e5de5d-fea6-4be0-bcf3-b282599317d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-specific-rss-feed-menu/" + google-query: inurl:"/wp-content/plugins/category-specific-rss-feed-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-specific-rss-feed-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-specific-rss-feed-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-specific-rss-feed-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-4f38551b81bcc12b9f18d5f308341508.yaml b/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-4f38551b81bcc12b9f18d5f308341508.yaml new file mode 100644 index 0000000000..a36d35737d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/category-specific-rss-feed-menu-4f38551b81bcc12b9f18d5f308341508.yaml @@ -0,0 +1,58 @@ +id: category-specific-rss-feed-menu-4f38551b81bcc12b9f18d5f308341508 + +info: + name: > + Category Specific RSS feed Subscription <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ac9c146-5065-46fc-b2ae-20b820a8016b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/category-specific-rss-feed-menu/" + google-query: inurl:"/wp-content/plugins/category-specific-rss-feed-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,category-specific-rss-feed-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/category-specific-rss-feed-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "category-specific-rss-feed-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/caxton-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/caxton-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..00ce176b57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/caxton-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: caxton-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/caxton/" + google-query: inurl:"/wp-content/plugins/caxton/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,caxton,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/caxton/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caxton" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.30.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbcurrencyconverter-6ab6a237cf19832f12a2229f950a0a08.yaml b/nuclei-templates/cve-less/plugins/cbcurrencyconverter-6ab6a237cf19832f12a2229f950a0a08.yaml new file mode 100644 index 0000000000..fde494d433 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbcurrencyconverter-6ab6a237cf19832f12a2229f950a0a08.yaml @@ -0,0 +1,58 @@ +id: cbcurrencyconverter-6ab6a237cf19832f12a2229f950a0a08 + +info: + name: > + CBX Currency Converter <= 3.0.3 - Cross-Site Request Forgery leading to Plugin Settings Leakage/Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/711d2c4d-700d-4d6e-911f-99abf86eff32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbcurrencyconverter/" + google-query: inurl:"/wp-content/plugins/cbcurrencyconverter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbcurrencyconverter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbcurrencyconverter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbcurrencyconverter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbi-referral-manager-20bdedbec4b7794610e6cc496e884cca.yaml b/nuclei-templates/cve-less/plugins/cbi-referral-manager-20bdedbec4b7794610e6cc496e884cca.yaml new file mode 100644 index 0000000000..fd0c914cd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbi-referral-manager-20bdedbec4b7794610e6cc496e884cca.yaml @@ -0,0 +1,58 @@ +id: cbi-referral-manager-20bdedbec4b7794610e6cc496e884cca + +info: + name: > + CBI Referral Manager <= 1.2.1 Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bc9d02d-7916-4845-bb9d-f5eb2666b772?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbi-referral-manager/" + google-query: inurl:"/wp-content/plugins/cbi-referral-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbi-referral-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbi-referral-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbi-referral-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbxgooglemap-3af00e1da087fccdad50b389a0a1a76d.yaml b/nuclei-templates/cve-less/plugins/cbxgooglemap-3af00e1da087fccdad50b389a0a1a76d.yaml new file mode 100644 index 0000000000..d40b00829a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbxgooglemap-3af00e1da087fccdad50b389a0a1a76d.yaml @@ -0,0 +1,58 @@ +id: cbxgooglemap-3af00e1da087fccdad50b389a0a1a76d + +info: + name: > + CBX Map for Google Map & OpenStreetMap <= 1.1.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fc860d4-fa26-489a-acd5-edbf7116d817?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbxgooglemap/" + google-query: inurl:"/wp-content/plugins/cbxgooglemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbxgooglemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbxgooglemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbxgooglemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbxgooglemap-4965c11c4afc77625d19c06034b78a11.yaml b/nuclei-templates/cve-less/plugins/cbxgooglemap-4965c11c4afc77625d19c06034b78a11.yaml new file mode 100644 index 0000000000..7ba1c66c52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbxgooglemap-4965c11c4afc77625d19c06034b78a11.yaml @@ -0,0 +1,58 @@ +id: cbxgooglemap-4965c11c4afc77625d19c06034b78a11 + +info: + name: > + CBX Map for Google Map & OpenStreetMap <= 1.1.11 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa5505b7-2d9e-4a03-9655-75d004f53259?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbxgooglemap/" + google-query: inurl:"/wp-content/plugins/cbxgooglemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbxgooglemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbxgooglemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbxgooglemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbxpetition-a3872c1aa8a56f8dfa0964ede1e7d0e0.yaml b/nuclei-templates/cve-less/plugins/cbxpetition-a3872c1aa8a56f8dfa0964ede1e7d0e0.yaml new file mode 100644 index 0000000000..c7af459e2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbxpetition-a3872c1aa8a56f8dfa0964ede1e7d0e0.yaml @@ -0,0 +1,58 @@ +id: cbxpetition-a3872c1aa8a56f8dfa0964ede1e7d0e0 + +info: + name: > + CBX Petition for WordPress <= 1.0.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f380786-7fd8-4a01-b491-63a2c6098a9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbxpetition/" + google-query: inurl:"/wp-content/plugins/cbxpetition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbxpetition,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbxpetition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbxpetition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbxwpbookmark-4eab0b03120e29e0608c25e79fc1f7b1.yaml b/nuclei-templates/cve-less/plugins/cbxwpbookmark-4eab0b03120e29e0608c25e79fc1f7b1.yaml new file mode 100644 index 0000000000..3f675b7913 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbxwpbookmark-4eab0b03120e29e0608c25e79fc1f7b1.yaml @@ -0,0 +1,58 @@ +id: cbxwpbookmark-4eab0b03120e29e0608c25e79fc1f7b1 + +info: + name: > + CBX Bookmark & Favorite <= 1.7.20 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9affd2b9-9576-435e-931d-f60816af0b91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbxwpbookmark/" + google-query: inurl:"/wp-content/plugins/cbxwpbookmark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbxwpbookmark,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbxwpbookmark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbxwpbookmark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbxwpbookmark-7ba99274f1f38a4d9ad4fdbd6398ca72.yaml b/nuclei-templates/cve-less/plugins/cbxwpbookmark-7ba99274f1f38a4d9ad4fdbd6398ca72.yaml new file mode 100644 index 0000000000..300bcef34f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbxwpbookmark-7ba99274f1f38a4d9ad4fdbd6398ca72.yaml @@ -0,0 +1,58 @@ +id: cbxwpbookmark-7ba99274f1f38a4d9ad4fdbd6398ca72 + +info: + name: > + CBX Bookmark & Favorite <= 1.6.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/420c29d6-e712-4891-a2f6-b18f4718b35d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbxwpbookmark/" + google-query: inurl:"/wp-content/plugins/cbxwpbookmark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbxwpbookmark,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbxwpbookmark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbxwpbookmark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbxwpbookmark-c8761ad8d517d60679bd97ecd8a6c050.yaml b/nuclei-templates/cve-less/plugins/cbxwpbookmark-c8761ad8d517d60679bd97ecd8a6c050.yaml new file mode 100644 index 0000000000..8425ab85d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbxwpbookmark-c8761ad8d517d60679bd97ecd8a6c050.yaml @@ -0,0 +1,58 @@ +id: cbxwpbookmark-c8761ad8d517d60679bd97ecd8a6c050 + +info: + name: > + CBX Bookmark & Favorite <= 1.7.21 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04a6f9f1-1a59-482c-8a42-6f41e4c41cb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbxwpbookmark/" + google-query: inurl:"/wp-content/plugins/cbxwpbookmark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbxwpbookmark,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbxwpbookmark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbxwpbookmark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cbxwpbookmark-de7d8d5a0d1dee1ddf8eeecb2547d31f.yaml b/nuclei-templates/cve-less/plugins/cbxwpbookmark-de7d8d5a0d1dee1ddf8eeecb2547d31f.yaml new file mode 100644 index 0000000000..bb36a3cb42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cbxwpbookmark-de7d8d5a0d1dee1ddf8eeecb2547d31f.yaml @@ -0,0 +1,58 @@ +id: cbxwpbookmark-de7d8d5a0d1dee1ddf8eeecb2547d31f + +info: + name: > + CBX Bookmark & Favorite <= 1.7.13 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cddda02e-c36f-4ed8-b3ac-6cb3f17c6ce2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cbxwpbookmark/" + google-query: inurl:"/wp-content/plugins/cbxwpbookmark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cbxwpbookmark,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cbxwpbookmark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cbxwpbookmark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cc-bmi-calculator-3049339e7a57ef7848a40fe1f1e47b95.yaml b/nuclei-templates/cve-less/plugins/cc-bmi-calculator-3049339e7a57ef7848a40fe1f1e47b95.yaml new file mode 100644 index 0000000000..2bf5c06bb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cc-bmi-calculator-3049339e7a57ef7848a40fe1f1e47b95.yaml @@ -0,0 +1,58 @@ +id: cc-bmi-calculator-3049339e7a57ef7848a40fe1f1e47b95 + +info: + name: > + CC BMI Calculator <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed0e7717-d9ac-4333-8e79-fc030a410dab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cc-bmi-calculator/" + google-query: inurl:"/wp-content/plugins/cc-bmi-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cc-bmi-calculator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cc-bmi-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cc-bmi-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cc-child-pages-16f9ec159f7aada4bb87cabf3c4d9411.yaml b/nuclei-templates/cve-less/plugins/cc-child-pages-16f9ec159f7aada4bb87cabf3c4d9411.yaml new file mode 100644 index 0000000000..33da00faff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cc-child-pages-16f9ec159f7aada4bb87cabf3c4d9411.yaml @@ -0,0 +1,58 @@ +id: cc-child-pages-16f9ec159f7aada4bb87cabf3c4d9411 + +info: + name: > + CC Child Pages <= 1.42 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40a94a1e-da9e-4173-a21d-106d859c7f8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cc-child-pages/" + google-query: inurl:"/wp-content/plugins/cc-child-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cc-child-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cc-child-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cc-child-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cc-coming-soon-61f33b76950c42b803451a29637fa07c.yaml b/nuclei-templates/cve-less/plugins/cc-coming-soon-61f33b76950c42b803451a29637fa07c.yaml new file mode 100644 index 0000000000..fe170085c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cc-coming-soon-61f33b76950c42b803451a29637fa07c.yaml @@ -0,0 +1,58 @@ +id: cc-coming-soon-61f33b76950c42b803451a29637fa07c + +info: + name: > + Coming Soon Chop Chop <= 2.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ae4ffe1-ecb6-4bde-8ac4-baeea82a0299?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cc-coming-soon/" + google-query: inurl:"/wp-content/plugins/cc-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cc-coming-soon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cc-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cc-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cc-custom-taxonmy-bc617b508aff51ac43ff170f5e7c19e9.yaml b/nuclei-templates/cve-less/plugins/cc-custom-taxonmy-bc617b508aff51ac43ff170f5e7c19e9.yaml new file mode 100644 index 0000000000..9445d4af3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cc-custom-taxonmy-bc617b508aff51ac43ff170f5e7c19e9.yaml @@ -0,0 +1,58 @@ +id: cc-custom-taxonmy-bc617b508aff51ac43ff170f5e7c19e9 + +info: + name: > + CC Custom Taxonomy <= 1.0.1 - Authenticated (Administrator+) Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/facfa21a-4136-4161-ac39-8b18948ec073?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cc-custom-taxonmy/" + google-query: inurl:"/wp-content/plugins/cc-custom-taxonmy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cc-custom-taxonmy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cc-custom-taxonmy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cc-custom-taxonmy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cdnvote-0c5cfe7358bda15b692d66201e48f291.yaml b/nuclei-templates/cve-less/plugins/cdnvote-0c5cfe7358bda15b692d66201e48f291.yaml new file mode 100644 index 0000000000..ee51229b0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cdnvote-0c5cfe7358bda15b692d66201e48f291.yaml @@ -0,0 +1,58 @@ +id: cdnvote-0c5cfe7358bda15b692d66201e48f291 + +info: + name: > + CDN Vote < 0.4.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dac658b5-4253-4095-9fda-4d3cdc7f7e2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cdnvote/" + google-query: inurl:"/wp-content/plugins/cdnvote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cdnvote,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cdnvote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cdnvote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cds-simple-seo-0a5cc290bf065b9d61dd8d6424548f9c.yaml b/nuclei-templates/cve-less/plugins/cds-simple-seo-0a5cc290bf065b9d61dd8d6424548f9c.yaml new file mode 100644 index 0000000000..41e6d8a525 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cds-simple-seo-0a5cc290bf065b9d61dd8d6424548f9c.yaml @@ -0,0 +1,58 @@ +id: cds-simple-seo-0a5cc290bf065b9d61dd8d6424548f9c + +info: + name: > + Simple SEO <= 1.8.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0c646b7-8f4d-4966-b866-8764ca98af35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cds-simple-seo/" + google-query: inurl:"/wp-content/plugins/cds-simple-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cds-simple-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cds-simple-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cds-simple-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cds-simple-seo-5acab9ad0ccb5e44fc932f6fa0ba244a.yaml b/nuclei-templates/cve-less/plugins/cds-simple-seo-5acab9ad0ccb5e44fc932f6fa0ba244a.yaml new file mode 100644 index 0000000000..4197eea531 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cds-simple-seo-5acab9ad0ccb5e44fc932f6fa0ba244a.yaml @@ -0,0 +1,58 @@ +id: cds-simple-seo-5acab9ad0ccb5e44fc932f6fa0ba244a + +info: + name: > + Simple SEO <= 1.7.91 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bc1c34-15f4-473b-a988-a1c80997e438?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cds-simple-seo/" + google-query: inurl:"/wp-content/plugins/cds-simple-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cds-simple-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cds-simple-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cds-simple-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cds-simple-seo-7a3d9d99e440e4df9bd78305e509f883.yaml b/nuclei-templates/cve-less/plugins/cds-simple-seo-7a3d9d99e440e4df9bd78305e509f883.yaml new file mode 100644 index 0000000000..5eccf4bc3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cds-simple-seo-7a3d9d99e440e4df9bd78305e509f883.yaml @@ -0,0 +1,58 @@ +id: cds-simple-seo-7a3d9d99e440e4df9bd78305e509f883 + +info: + name: > + Simple SEO <= 1.8.12 - Cross-Site Request Forgery to Sitemap Deletion/Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bc34490-66a1-4e43-83a4-b6e680237008?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cds-simple-seo/" + google-query: inurl:"/wp-content/plugins/cds-simple-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cds-simple-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cds-simple-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cds-simple-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cds-simple-seo-901981c5d4aab63f7790ceb08b75d467.yaml b/nuclei-templates/cve-less/plugins/cds-simple-seo-901981c5d4aab63f7790ceb08b75d467.yaml new file mode 100644 index 0000000000..f99cef872c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cds-simple-seo-901981c5d4aab63f7790ceb08b75d467.yaml @@ -0,0 +1,58 @@ +id: cds-simple-seo-901981c5d4aab63f7790ceb08b75d467 + +info: + name: > + Simple SEO <= 2.0.25 - Cross-Site Request Forgery via multiple admin_post functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/053b72c6-07bb-4e9f-ae25-da4bce91ae6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cds-simple-seo/" + google-query: inurl:"/wp-content/plugins/cds-simple-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cds-simple-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cds-simple-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cds-simple-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cds-simple-seo-ad7b2ab497c839e3400fd7b625d4fc3c.yaml b/nuclei-templates/cve-less/plugins/cds-simple-seo-ad7b2ab497c839e3400fd7b625d4fc3c.yaml new file mode 100644 index 0000000000..df1b33d7d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cds-simple-seo-ad7b2ab497c839e3400fd7b625d4fc3c.yaml @@ -0,0 +1,58 @@ +id: cds-simple-seo-ad7b2ab497c839e3400fd7b625d4fc3c + +info: + name: > + Simple SEO <= 1.7.91 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a83f381-a8ce-472d-a202-f7d7f22fd650?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cds-simple-seo/" + google-query: inurl:"/wp-content/plugins/cds-simple-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cds-simple-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cds-simple-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cds-simple-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ceceppa-multilingua-26a1c70f5188aa0c3366f60965527dcc.yaml b/nuclei-templates/cve-less/plugins/ceceppa-multilingua-26a1c70f5188aa0c3366f60965527dcc.yaml new file mode 100644 index 0000000000..91212ee143 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ceceppa-multilingua-26a1c70f5188aa0c3366f60965527dcc.yaml @@ -0,0 +1,58 @@ +id: ceceppa-multilingua-26a1c70f5188aa0c3366f60965527dcc + +info: + name: > + Ceceppa Multilingua <= 1.5.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f21100f4-f655-41e6-a31c-70ce4dfb1ba6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ceceppa-multilingua/" + google-query: inurl:"/wp-content/plugins/ceceppa-multilingua/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ceceppa-multilingua,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ceceppa-multilingua/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ceceppa-multilingua" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf-geoplugin-51cc9e8778ef47abd167df4053287906.yaml b/nuclei-templates/cve-less/plugins/cf-geoplugin-51cc9e8778ef47abd167df4053287906.yaml new file mode 100644 index 0000000000..7a10a2fa0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf-geoplugin-51cc9e8778ef47abd167df4053287906.yaml @@ -0,0 +1,58 @@ +id: cf-geoplugin-51cc9e8778ef47abd167df4053287906 + +info: + name: > + Geo Controller <= 8.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6faf7e36-52d7-4578-bb71-2b64a761692b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf-geoplugin/" + google-query: inurl:"/wp-content/plugins/cf-geoplugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf-geoplugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf-geoplugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf-geoplugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf-geoplugin-682168a7f6b8d8c54e16ca072c08d0b8.yaml b/nuclei-templates/cve-less/plugins/cf-geoplugin-682168a7f6b8d8c54e16ca072c08d0b8.yaml new file mode 100644 index 0000000000..863f7a8e34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf-geoplugin-682168a7f6b8d8c54e16ca072c08d0b8.yaml @@ -0,0 +1,58 @@ +id: cf-geoplugin-682168a7f6b8d8c54e16ca072c08d0b8 + +info: + name: > + Geo Controller <= 8.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7e4dd2c-5f6a-4bce-a46b-7bdd9d460804?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf-geoplugin/" + google-query: inurl:"/wp-content/plugins/cf-geoplugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf-geoplugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf-geoplugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf-geoplugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf-geoplugin-9cb312dcf3076a957034e2392391c1c1.yaml b/nuclei-templates/cve-less/plugins/cf-geoplugin-9cb312dcf3076a957034e2392391c1c1.yaml new file mode 100644 index 0000000000..70e8ae8eb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf-geoplugin-9cb312dcf3076a957034e2392391c1c1.yaml @@ -0,0 +1,58 @@ +id: cf-geoplugin-9cb312dcf3076a957034e2392391c1c1 + +info: + name: > + WordPress Geolocation Plugin – CF Geo Plugin <= 7.13.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23132298-f1de-4085-a76f-f007b8b7de15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf-geoplugin/" + google-query: inurl:"/wp-content/plugins/cf-geoplugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf-geoplugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf-geoplugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf-geoplugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf-geoplugin-dc2ceae7a9d01dd85dd05b54d27673ad.yaml b/nuclei-templates/cve-less/plugins/cf-geoplugin-dc2ceae7a9d01dd85dd05b54d27673ad.yaml new file mode 100644 index 0000000000..e9c03e0b46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf-geoplugin-dc2ceae7a9d01dd85dd05b54d27673ad.yaml @@ -0,0 +1,58 @@ +id: cf-geoplugin-dc2ceae7a9d01dd85dd05b54d27673ad + +info: + name: > + Geo Controller <= 8.6.4 - Unauthenticated PHP Object Injection via shortcode REST API Route + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f00bbab-ef84-42cf-baa7-23c434416981?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf-geoplugin/" + google-query: inurl:"/wp-content/plugins/cf-geoplugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf-geoplugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf-geoplugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf-geoplugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-active-campaign-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-active-campaign-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..d530369f50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-active-campaign-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-active-campaign-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-active-campaign/" + google-query: inurl:"/wp-content/plugins/cf7-active-campaign/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-active-campaign,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-active-campaign/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-active-campaign" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-antispam-e8894e8512ac5d54a44ce89e1645ca1f.yaml b/nuclei-templates/cve-less/plugins/cf7-antispam-e8894e8512ac5d54a44ce89e1645ca1f.yaml new file mode 100644 index 0000000000..a73699ba35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-antispam-e8894e8512ac5d54a44ce89e1645ca1f.yaml @@ -0,0 +1,58 @@ +id: cf7-antispam-e8894e8512ac5d54a44ce89e1645ca1f + +info: + name: > + AntiSpam for Contact Form 7 <= 0.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6b289c2-0e04-43b1-baf1-6a594cc47ea0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-antispam/" + google-query: inurl:"/wp-content/plugins/cf7-antispam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-antispam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-antispam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-antispam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-conditional-fields-5f06348f7bb36613ac049dfd554c46bc.yaml b/nuclei-templates/cve-less/plugins/cf7-conditional-fields-5f06348f7bb36613ac049dfd554c46bc.yaml new file mode 100644 index 0000000000..d0eef57591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-conditional-fields-5f06348f7bb36613ac049dfd554c46bc.yaml @@ -0,0 +1,58 @@ +id: cf7-conditional-fields-5f06348f7bb36613ac049dfd554c46bc + +info: + name: > + Conditional Fields for Contact Form 7 <= 2.4.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a175d2b2-0a35-4c5a-b05b-4d334e444e85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-conditional-fields/" + google-query: inurl:"/wp-content/plugins/cf7-conditional-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-conditional-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-conditional-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-conditional-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-conditional-fields-c2bf3837de0efe09eb976b0292e9ae9c.yaml b/nuclei-templates/cve-less/plugins/cf7-conditional-fields-c2bf3837de0efe09eb976b0292e9ae9c.yaml new file mode 100644 index 0000000000..65018de674 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-conditional-fields-c2bf3837de0efe09eb976b0292e9ae9c.yaml @@ -0,0 +1,58 @@ +id: cf7-conditional-fields-c2bf3837de0efe09eb976b0292e9ae9c + +info: + name: > + Conditional Fields for Contact Form 7 <= 2.4.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cfd8b2d-cf2a-439d-9f9a-dbe499b1cd48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-conditional-fields/" + google-query: inurl:"/wp-content/plugins/cf7-conditional-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-conditional-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-conditional-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-conditional-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-constant-contact-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-constant-contact-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..3a19aaacd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-constant-contact-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-constant-contact-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-constant-contact/" + google-query: inurl:"/wp-content/plugins/cf7-constant-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-constant-contact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-constant-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-constant-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-constant-contact-d8e7f6cb9c19a44c84604c82e55187be.yaml b/nuclei-templates/cve-less/plugins/cf7-constant-contact-d8e7f6cb9c19a44c84604c82e55187be.yaml new file mode 100644 index 0000000000..2c022b2c4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-constant-contact-d8e7f6cb9c19a44c84604c82e55187be.yaml @@ -0,0 +1,58 @@ +id: cf7-constant-contact-d8e7f6cb9c19a44c84604c82e55187be + +info: + name: > + Integration for Contact Form 7 and Constant Contact <= 1.1.4 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c8404d2-7b37-40df-b756-328f827f273d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-constant-contact/" + google-query: inurl:"/wp-content/plugins/cf7-constant-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-constant-contact,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-constant-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-constant-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-constant-contact-fields-mapping-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cf7-constant-contact-fields-mapping-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e04aa56477 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-constant-contact-fields-mapping-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cf7-constant-contact-fields-mapping-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-constant-contact-fields-mapping/" + google-query: inurl:"/wp-content/plugins/cf7-constant-contact-fields-mapping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-constant-contact-fields-mapping,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-constant-contact-fields-mapping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-constant-contact-fields-mapping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-customizer-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/cf7-customizer-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..0b147f06ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-customizer-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: cf7-customizer-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-customizer/" + google-query: inurl:"/wp-content/plugins/cf7-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-database-406a8beae5e2073e89eddace606a906a.yaml b/nuclei-templates/cve-less/plugins/cf7-database-406a8beae5e2073e89eddace606a906a.yaml new file mode 100644 index 0000000000..4024f64976 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-database-406a8beae5e2073e89eddace606a906a.yaml @@ -0,0 +1,58 @@ +id: cf7-database-406a8beae5e2073e89eddace606a906a + +info: + name: > + Database for Contact Form 7 <= 3.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a496d065-5821-4128-9363-79f388fdd246?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-database/" + google-query: inurl:"/wp-content/plugins/cf7-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-database,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-easy-math-captcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cf7-easy-math-captcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d5c1c8ed3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-easy-math-captcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cf7-easy-math-captcha-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-easy-math-captcha/" + google-query: inurl:"/wp-content/plugins/cf7-easy-math-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-easy-math-captcha,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-easy-math-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-easy-math-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-field-validation-779ca838360ffafbdcec116be7a4214b.yaml b/nuclei-templates/cve-less/plugins/cf7-field-validation-779ca838360ffafbdcec116be7a4214b.yaml new file mode 100644 index 0000000000..271fad9ce6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-field-validation-779ca838360ffafbdcec116be7a4214b.yaml @@ -0,0 +1,58 @@ +id: cf7-field-validation-779ca838360ffafbdcec116be7a4214b + +info: + name: > + Contact form 7 Custom validation <= 1.1.3 - Unauthenticated SQL Injection via 'post' + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbfc52a4-6c9d-480b-9247-1513318ff84b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-field-validation/" + google-query: inurl:"/wp-content/plugins/cf7-field-validation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-field-validation,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-field-validation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-field-validation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-file-download-d3779debb6d6eb8ad0d25988128d76ec.yaml b/nuclei-templates/cve-less/plugins/cf7-file-download-d3779debb6d6eb8ad0d25988128d76ec.yaml new file mode 100644 index 0000000000..060140ee49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-file-download-d3779debb6d6eb8ad0d25988128d76ec.yaml @@ -0,0 +1,58 @@ +id: cf7-file-download-d3779debb6d6eb8ad0d25988128d76ec + +info: + name: > + CF7 File Download – File Download for CF7 <= 2.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a04652bc-f815-4840-b791-3fb12d3b4f7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-file-download/" + google-query: inurl:"/wp-content/plugins/cf7-file-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-file-download,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-file-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-file-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-google-map-2da90a041f7dbd6259f3200e335d184b.yaml b/nuclei-templates/cve-less/plugins/cf7-google-map-2da90a041f7dbd6259f3200e335d184b.yaml new file mode 100644 index 0000000000..4fd6cf2033 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-google-map-2da90a041f7dbd6259f3200e335d184b.yaml @@ -0,0 +1,58 @@ +id: cf7-google-map-2da90a041f7dbd6259f3200e335d184b + +info: + name: > + Contact Form 7 extension for Google Map fields <= 1.8.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd3fc3a4-ba32-4c05-bc93-ed7b86c426fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-google-map/" + google-query: inurl:"/wp-content/plugins/cf7-google-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-google-map,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-google-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-google-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml b/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml new file mode 100644 index 0000000000..5881291d16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml @@ -0,0 +1,58 @@ +id: cf7-google-sheets-connector-1ed11c7c0b7e8b4ad6e63123437cef8f + +info: + name: > + CF7 Google Sheets Connector <= 5.0.1 - Reflected Cross-Site Scripting via 'code' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c6b2c4b-5ea5-471d-9114-d2b469b6c59b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-google-sheets-connector/" + google-query: inurl:"/wp-content/plugins/cf7-google-sheets-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-google-sheets-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-google-sheets-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-google-sheets-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-3ba45c08f1c81a3b4f346669dc635f8c.yaml b/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-3ba45c08f1c81a3b4f346669dc635f8c.yaml new file mode 100644 index 0000000000..0d2c164f59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-3ba45c08f1c81a3b4f346669dc635f8c.yaml @@ -0,0 +1,58 @@ +id: cf7-google-sheets-connector-3ba45c08f1c81a3b4f346669dc635f8c + +info: + name: > + CF7 Google Sheets Connector <= 5.0.5 - Unauthenticated Sensitive Information Exposure via Debug Log + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fad510b7-85f4-4cae-aaf0-eb68a32cf1b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-google-sheets-connector/" + google-query: inurl:"/wp-content/plugins/cf7-google-sheets-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-google-sheets-connector,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-google-sheets-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-google-sheets-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-pro-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml b/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-pro-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml new file mode 100644 index 0000000000..961e95e028 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-google-sheets-connector-pro-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml @@ -0,0 +1,58 @@ +id: cf7-google-sheets-connector-pro-1ed11c7c0b7e8b4ad6e63123437cef8f + +info: + name: > + CF7 Google Sheets Connector <= 5.0.1 - Reflected Cross-Site Scripting via 'code' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c6b2c4b-5ea5-471d-9114-d2b469b6c59b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-google-sheets-connector-pro/" + google-query: inurl:"/wp-content/plugins/cf7-google-sheets-connector-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-google-sheets-connector-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-google-sheets-connector-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-google-sheets-connector-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-grid-and-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cf7-grid-and-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ca8a25618e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-grid-and-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cf7-grid-and-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-grid-and-styler-for-divi/" + google-query: inurl:"/wp-content/plugins/cf7-grid-and-styler-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-grid-and-styler-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-grid-and-styler-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-grid-and-styler-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-hubspot-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-hubspot-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..75eb3d1e0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-hubspot-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-hubspot-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-hubspot/" + google-query: inurl:"/wp-content/plugins/cf7-hubspot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-hubspot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-hubspot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-hubspot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-hubspot-78d1a3ea4011830cf6a4045c4e76d9c4.yaml b/nuclei-templates/cve-less/plugins/cf7-hubspot-78d1a3ea4011830cf6a4045c4e76d9c4.yaml new file mode 100644 index 0000000000..3b789ed619 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-hubspot-78d1a3ea4011830cf6a4045c4e76d9c4.yaml @@ -0,0 +1,58 @@ +id: cf7-hubspot-78d1a3ea4011830cf6a4045c4e76d9c4 + +info: + name: > + Integration for Contact Form 7 HubSpot <= 1.2.8 - Open Redirect via state parameter + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a60a9981-c945-4438-a844-f7942b86c4c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-hubspot/" + google-query: inurl:"/wp-content/plugins/cf7-hubspot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-hubspot,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-hubspot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-hubspot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-infusionsoft-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-infusionsoft-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..0560382212 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-infusionsoft-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-infusionsoft-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-infusionsoft/" + google-query: inurl:"/wp-content/plugins/cf7-infusionsoft/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-infusionsoft,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-infusionsoft/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-infusionsoft" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-insightly-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-insightly-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..faef6370fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-insightly-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-insightly-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-insightly/" + google-query: inurl:"/wp-content/plugins/cf7-insightly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-insightly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-insightly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-insightly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-invisible-recaptcha-4e7be8550ac4c225de3b247432067648.yaml b/nuclei-templates/cve-less/plugins/cf7-invisible-recaptcha-4e7be8550ac4c225de3b247432067648.yaml new file mode 100644 index 0000000000..7aa33aaff1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-invisible-recaptcha-4e7be8550ac4c225de3b247432067648.yaml @@ -0,0 +1,58 @@ +id: cf7-invisible-recaptcha-4e7be8550ac4c225de3b247432067648 + +info: + name: > + CF7 Invisible reCAPTCHA <= 1.3.3 - Cross-Site Request Forgery via vsz_cf7_invisible_recaptcha_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fa1048e-bdcd-41d1-a7c4-196731a60843?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-invisible-recaptcha/" + google-query: inurl:"/wp-content/plugins/cf7-invisible-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-invisible-recaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-invisible-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-invisible-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-invisible-recaptcha-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml b/nuclei-templates/cve-less/plugins/cf7-invisible-recaptcha-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml new file mode 100644 index 0000000000..42d9c90f3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-invisible-recaptcha-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml @@ -0,0 +1,58 @@ +id: cf7-invisible-recaptcha-aed7ae7e4d2ac15e64bf03771c3aeb20 + +info: + name: > + CF7 Invisible reCAPTCHA < 1.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a95f73a-eaf7-4b8c-b127-0ceef87c80fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-invisible-recaptcha/" + google-query: inurl:"/wp-content/plugins/cf7-invisible-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-invisible-recaptcha,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-invisible-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-invisible-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-live-preview-a6d4da7080e5e33e606a2bdd628cb1b5.yaml b/nuclei-templates/cve-less/plugins/cf7-live-preview-a6d4da7080e5e33e606a2bdd628cb1b5.yaml new file mode 100644 index 0000000000..0df1304c37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-live-preview-a6d4da7080e5e33e606a2bdd628cb1b5.yaml @@ -0,0 +1,58 @@ +id: cf7-live-preview-a6d4da7080e5e33e606a2bdd628cb1b5 + +info: + name: > + Live Preview for Contact Form 7 <= 1.2.0 - Missing Authorization via update_option + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89dbf14f-1cc8-4a66-b3d3-3568cba9a0aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-live-preview/" + google-query: inurl:"/wp-content/plugins/cf7-live-preview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-live-preview,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-live-preview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-live-preview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-mailchimp-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-mailchimp-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..80a0fe0707 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-mailchimp-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-mailchimp-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-mailchimp/" + google-query: inurl:"/wp-content/plugins/cf7-mailchimp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-mailchimp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-mailchimp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-mailchimp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-redirect-thank-you-page-1adae250456b8ff3c36bf7b47cd9ad26.yaml b/nuclei-templates/cve-less/plugins/cf7-redirect-thank-you-page-1adae250456b8ff3c36bf7b47cd9ad26.yaml new file mode 100644 index 0000000000..3e33680f69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-redirect-thank-you-page-1adae250456b8ff3c36bf7b47cd9ad26.yaml @@ -0,0 +1,58 @@ +id: cf7-redirect-thank-you-page-1adae250456b8ff3c36bf7b47cd9ad26 + +info: + name: > + Contact Form 7 Redirect & Thank You Page <= 1.0.3 - Cross-Site Request Forgery via cf7rl_admin_table + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99f831f2-fb96-4dc8-ba3d-6015fbc7e2e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-redirect-thank-you-page/" + google-query: inurl:"/wp-content/plugins/cf7-redirect-thank-you-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-redirect-thank-you-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-redirect-thank-you-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-redirect-thank-you-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-salesforce-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-salesforce-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..b0c42c7bfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-salesforce-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-salesforce-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-salesforce/" + google-query: inurl:"/wp-content/plugins/cf7-salesforce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-salesforce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-salesforce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-salesforce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-salesforce-f6809789bc3db192511a7eb7008b1a2b.yaml b/nuclei-templates/cve-less/plugins/cf7-salesforce-f6809789bc3db192511a7eb7008b1a2b.yaml new file mode 100644 index 0000000000..093c6bf144 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-salesforce-f6809789bc3db192511a7eb7008b1a2b.yaml @@ -0,0 +1,58 @@ +id: cf7-salesforce-f6809789bc3db192511a7eb7008b1a2b + +info: + name: > + Integration for Contact Form 7 and Salesforce <= 1.3.3 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e64a688c-c150-4b10-81ef-bbe7f6dd1b8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-salesforce/" + google-query: inurl:"/wp-content/plugins/cf7-salesforce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-salesforce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-salesforce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-salesforce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-store-to-db-lite-457136e7a482f19e1fb7eda420cd0512.yaml b/nuclei-templates/cve-less/plugins/cf7-store-to-db-lite-457136e7a482f19e1fb7eda420cd0512.yaml new file mode 100644 index 0000000000..1a58d7e3a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-store-to-db-lite-457136e7a482f19e1fb7eda420cd0512.yaml @@ -0,0 +1,58 @@ +id: cf7-store-to-db-lite-457136e7a482f19e1fb7eda420cd0512 + +info: + name: > + Form Store to DB <= 1.1.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f0f50e0-7015-4f00-880b-6eb94961177f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-store-to-db-lite/" + google-query: inurl:"/wp-content/plugins/cf7-store-to-db-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-store-to-db-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-store-to-db-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-store-to-db-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-styler-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cf7-styler-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..19ebcaf75d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-styler-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cf7-styler-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-styler/" + google-query: inurl:"/wp-content/plugins/cf7-styler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-styler,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-styler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-styler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cf7-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e43e8db087 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cf7-styler-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-styler-for-divi/" + google-query: inurl:"/wp-content/plugins/cf7-styler-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-styler-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-styler-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-styler-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-widget-elementor-0a3c0452d5847fbc8bf97c2978948097.yaml b/nuclei-templates/cve-less/plugins/cf7-widget-elementor-0a3c0452d5847fbc8bf97c2978948097.yaml new file mode 100644 index 0000000000..e583001939 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-widget-elementor-0a3c0452d5847fbc8bf97c2978948097.yaml @@ -0,0 +1,58 @@ +id: cf7-widget-elementor-0a3c0452d5847fbc8bf97c2978948097 + +info: + name: > + Void Contact Form 7 Widget For Elementor Page Builder <= 2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93784c84-93b3-4f43-84a0-5aeed3ba9cfd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-widget-elementor/" + google-query: inurl:"/wp-content/plugins/cf7-widget-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-widget-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-widget-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-widget-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-widget-elementor-f7129e84ad88621ffd1e743ea53941ad.yaml b/nuclei-templates/cve-less/plugins/cf7-widget-elementor-f7129e84ad88621ffd1e743ea53941ad.yaml new file mode 100644 index 0000000000..9a2ee3a112 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-widget-elementor-f7129e84ad88621ffd1e743ea53941ad.yaml @@ -0,0 +1,58 @@ +id: cf7-widget-elementor-f7129e84ad88621ffd1e743ea53941ad + +info: + name: > + Void Contact Form 7 Widget For Elementor Page Builder <= 2.1.1 - Cross-Site Request Forgery in void_cf7_opt_in_user_data_track + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56a2084c-5120-4115-a027-625900d23ebc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-widget-elementor/" + google-query: inurl:"/wp-content/plugins/cf7-widget-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-widget-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-widget-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-widget-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-zendesk-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-zendesk-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..591ae0444e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-zendesk-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-zendesk-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-zendesk/" + google-query: inurl:"/wp-content/plugins/cf7-zendesk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-zendesk,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-zendesk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-zendesk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-zoho-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/cf7-zoho-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..ba77e61d23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-zoho-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: cf7-zoho-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-zoho/" + google-query: inurl:"/wp-content/plugins/cf7-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-zoho,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-zoho-1e95da79eb44567d35aa35ba90fa7af9.yaml b/nuclei-templates/cve-less/plugins/cf7-zoho-1e95da79eb44567d35aa35ba90fa7af9.yaml new file mode 100644 index 0000000000..10d4092a37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-zoho-1e95da79eb44567d35aa35ba90fa7af9.yaml @@ -0,0 +1,58 @@ +id: cf7-zoho-1e95da79eb44567d35aa35ba90fa7af9 + +info: + name: > + Integration for Contact Form 7 and Zoho CRM, Bigin <= 1.2.2 - Cross-Site Request Forgery via settings_page function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb330be-f12c-475c-97b6-745a1e6edb58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-zoho/" + google-query: inurl:"/wp-content/plugins/cf7-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-zoho,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-zoho-22168446272a333f9aeaf32a63eb65ac.yaml b/nuclei-templates/cve-less/plugins/cf7-zoho-22168446272a333f9aeaf32a63eb65ac.yaml new file mode 100644 index 0000000000..ebe5bac721 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-zoho-22168446272a333f9aeaf32a63eb65ac.yaml @@ -0,0 +1,58 @@ +id: cf7-zoho-22168446272a333f9aeaf32a63eb65ac + +info: + name: > + Integration for Contact Form 7 and Zoho CRM, Bigin <= 1.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4a649b0-d5b2-4e4c-833c-01ecf12611a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-zoho/" + google-query: inurl:"/wp-content/plugins/cf7-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-zoho,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cf7-zoho-2fe05eeb0f074422838b91d061a270ed.yaml b/nuclei-templates/cve-less/plugins/cf7-zoho-2fe05eeb0f074422838b91d061a270ed.yaml new file mode 100644 index 0000000000..bb4c98b3bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cf7-zoho-2fe05eeb0f074422838b91d061a270ed.yaml @@ -0,0 +1,58 @@ +id: cf7-zoho-2fe05eeb0f074422838b91d061a270ed + +info: + name: > + Integration for Contact Form 7 and Zoho CRM, Bigin <= 1.2.3 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b4e6dae-f38c-4f5b-ae1d-cf998946c675?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cf7-zoho/" + google-query: inurl:"/wp-content/plugins/cf7-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cf7-zoho,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cf7-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cf7-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms-8e029958bdc3ff72cf62f3277afe0ddc.yaml b/nuclei-templates/cve-less/plugins/cforms-8e029958bdc3ff72cf62f3277afe0ddc.yaml new file mode 100644 index 0000000000..b7aa7a425b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms-8e029958bdc3ff72cf62f3277afe0ddc.yaml @@ -0,0 +1,58 @@ +id: cforms-8e029958bdc3ff72cf62f3277afe0ddc + +info: + name: > + cformsII <= 10.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e7b694f-8926-4bba-be77-42ade5d1c3b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms/" + google-query: inurl:"/wp-content/plugins/cforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms-ad9f5965c16c8246b424703d21435589.yaml b/nuclei-templates/cve-less/plugins/cforms-ad9f5965c16c8246b424703d21435589.yaml new file mode 100644 index 0000000000..4c48f4689f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms-ad9f5965c16c8246b424703d21435589.yaml @@ -0,0 +1,58 @@ +id: cforms-ad9f5965c16c8246b424703d21435589 + +info: + name: > + Cforms <= 10.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cbd3bf0-6b20-41c2-8265-786dbba123d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms/" + google-query: inurl:"/wp-content/plugins/cforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-0a7e50f278580c630584ee885abf7fbb.yaml b/nuclei-templates/cve-less/plugins/cforms2-0a7e50f278580c630584ee885abf7fbb.yaml new file mode 100644 index 0000000000..f94b49a3fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-0a7e50f278580c630584ee885abf7fbb.yaml @@ -0,0 +1,58 @@ +id: cforms2-0a7e50f278580c630584ee885abf7fbb + +info: + name: > + cformsII < 14.6.10 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/361f3fec-7176-4a25-943b-44a44dd77784?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-435be2da19b4391be47c1eff3c320bfa.yaml b/nuclei-templates/cve-less/plugins/cforms2-435be2da19b4391be47c1eff3c320bfa.yaml new file mode 100644 index 0000000000..2d3a7ce500 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-435be2da19b4391be47c1eff3c320bfa.yaml @@ -0,0 +1,58 @@ +id: cforms2-435be2da19b4391be47c1eff3c320bfa + +info: + name: > + CformsII <=11.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a32c6c0c-4a4a-44c7-9724-153467699b3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-6e2fc253c488c9fb6b9867ac9b52ef35.yaml b/nuclei-templates/cve-less/plugins/cforms2-6e2fc253c488c9fb6b9867ac9b52ef35.yaml new file mode 100644 index 0000000000..c5ff6d379b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-6e2fc253c488c9fb6b9867ac9b52ef35.yaml @@ -0,0 +1,58 @@ +id: cforms2-6e2fc253c488c9fb6b9867ac9b52ef35 + +info: + name: > + cformsII <= 14.13.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab3ea93a-521a-45af-ac67-9f4417f3db59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-746dbfeca03bdbf3d2fc4d83e4a0ed40.yaml b/nuclei-templates/cve-less/plugins/cforms2-746dbfeca03bdbf3d2fc4d83e4a0ed40.yaml new file mode 100644 index 0000000000..728d30a1d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-746dbfeca03bdbf3d2fc4d83e4a0ed40.yaml @@ -0,0 +1,58 @@ +id: cforms2-746dbfeca03bdbf3d2fc4d83e4a0ed40 + +info: + name: > + CformsII <= 15.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72800e9b-8e2c-4725-9a87-a9b187ad5967?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-84b6699e5f738c5aa2a22a553abe9531.yaml b/nuclei-templates/cve-less/plugins/cforms2-84b6699e5f738c5aa2a22a553abe9531.yaml new file mode 100644 index 0000000000..e1f489a44b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-84b6699e5f738c5aa2a22a553abe9531.yaml @@ -0,0 +1,58 @@ +id: cforms2-84b6699e5f738c5aa2a22a553abe9531 + +info: + name: > + cformsII <= 14.12.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f533b3a-6d25-4c74-929f-ee4ee3a62926?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-8564fd78eda1e5e95c5755fd00c36fad.yaml b/nuclei-templates/cve-less/plugins/cforms2-8564fd78eda1e5e95c5755fd00c36fad.yaml new file mode 100644 index 0000000000..64388c244b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-8564fd78eda1e5e95c5755fd00c36fad.yaml @@ -0,0 +1,58 @@ +id: cforms2-8564fd78eda1e5e95c5755fd00c36fad + +info: + name: > + CformsII <= 15.0.5 - Unauthenticated stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/097fdc88-9424-4de9-9a03-d4ea724da13f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-9a7daf03bb65349e79adecac5d21db12.yaml b/nuclei-templates/cve-less/plugins/cforms2-9a7daf03bb65349e79adecac5d21db12.yaml new file mode 100644 index 0000000000..fd927c457d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-9a7daf03bb65349e79adecac5d21db12.yaml @@ -0,0 +1,58 @@ +id: cforms2-9a7daf03bb65349e79adecac5d21db12 + +info: + name: > + cformsII <= 15.0.4 - Cross-Site Request Forgery leading to Settings Updates + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5798de72-b589-4474-82b2-df6ef26325a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-b4c6a4aeabe2851a3af8facd90e9e06e.yaml b/nuclei-templates/cve-less/plugins/cforms2-b4c6a4aeabe2851a3af8facd90e9e06e.yaml new file mode 100644 index 0000000000..fc1abd741d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-b4c6a4aeabe2851a3af8facd90e9e06e.yaml @@ -0,0 +1,58 @@ +id: cforms2-b4c6a4aeabe2851a3af8facd90e9e06e + +info: + name: > + CformsII <= 15.0.1 - Unauthenticated HTML Injection & Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acff00f2-586d-474c-8dec-f27c488e9045?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-c746c9817b7b9a6f45f694a27b37baa9.yaml b/nuclei-templates/cve-less/plugins/cforms2-c746c9817b7b9a6f45f694a27b37baa9.yaml new file mode 100644 index 0000000000..fb2d41e47f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-c746c9817b7b9a6f45f694a27b37baa9.yaml @@ -0,0 +1,58 @@ +id: cforms2-c746c9817b7b9a6f45f694a27b37baa9 + +info: + name: > + CformsII <= 14.10.1 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bc58312-ef3d-487b-87fb-9a15a8c6559f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-f8d3e5b9686014f5cd0d4b3b339a644d.yaml b/nuclei-templates/cve-less/plugins/cforms2-f8d3e5b9686014f5cd0d4b3b339a644d.yaml new file mode 100644 index 0000000000..2a2ac871f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-f8d3e5b9686014f5cd0d4b3b339a644d.yaml @@ -0,0 +1,58 @@ +id: cforms2-f8d3e5b9686014f5cd0d4b3b339a644d + +info: + name: > + cformsII < 14.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22356f42-af5e-4479-919c-9ceac42e686f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cforms2-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml b/nuclei-templates/cve-less/plugins/cforms2-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml new file mode 100644 index 0000000000..589bdb7cd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cforms2-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml @@ -0,0 +1,58 @@ +id: cforms2-fe5830586f1fe4c6f5f3c3dcee633ecb + +info: + name: > + cformsII <= 13.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ab2882e-60c6-4eb9-91e7-3be4fa625711?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cforms2/" + google-query: inurl:"/wp-content/plugins/cforms2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cforms2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cforms2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cforms2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cgc-maintenance-mode-16302374c3729c860ad18fd6cf163b27.yaml b/nuclei-templates/cve-less/plugins/cgc-maintenance-mode-16302374c3729c860ad18fd6cf163b27.yaml new file mode 100644 index 0000000000..c0d5b43552 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cgc-maintenance-mode-16302374c3729c860ad18fd6cf163b27.yaml @@ -0,0 +1,58 @@ +id: cgc-maintenance-mode-16302374c3729c860ad18fd6cf163b27 + +info: + name: > + CGC Maintenance Mode <= 1.2 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b05191b-4f4a-487a-9fbf-843a4787511e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cgc-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/cgc-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cgc-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cgc-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cgc-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cgc-maintenance-mode-ba2f4df1d4ab7f80e3d41245c7258128.yaml b/nuclei-templates/cve-less/plugins/cgc-maintenance-mode-ba2f4df1d4ab7f80e3d41245c7258128.yaml new file mode 100644 index 0000000000..c5d0746543 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cgc-maintenance-mode-ba2f4df1d4ab7f80e3d41245c7258128.yaml @@ -0,0 +1,58 @@ +id: cgc-maintenance-mode-ba2f4df1d4ab7f80e3d41245c7258128 + +info: + name: > + CGC Maintenance Mode <= 1.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cd5fa89-ed3b-4ac1-9200-9f5eb26cb534?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cgc-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/cgc-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cgc-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cgc-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cgc-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-160920c3b93078e89551079e7b5eaf71.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-160920c3b93078e89551079e7b5eaf71.yaml new file mode 100644 index 0000000000..336aedffa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-160920c3b93078e89551079e7b5eaf71.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-160920c3b93078e89551079e7b5eaf71 + +info: + name: > + Chained Quiz <= 1.3.2.4 - Cross-Site Request Forgery to Submitted Response Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf96887c-6e0d-43d9-a3f2-88981adb4c98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-18bb670f149f3ce453ab41abb0ba94e6.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-18bb670f149f3ce453ab41abb0ba94e6.yaml new file mode 100644 index 0000000000..b78c728923 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-18bb670f149f3ce453ab41abb0ba94e6.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-18bb670f149f3ce453ab41abb0ba94e6 + +info: + name: > + Chained Quiz <= 1.3.2.2 - Authenticated (Admin+) Stored Cross-Site Scripting via Mailchimp API Key + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93a07027-1068-41fa-bd6b-74ccc0441a16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-1a479aba51042862bdb0c5caaca911dd.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-1a479aba51042862bdb0c5caaca911dd.yaml new file mode 100644 index 0000000000..463e054b3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-1a479aba51042862bdb0c5caaca911dd.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-1a479aba51042862bdb0c5caaca911dd + +info: + name: > + Chained Quiz <= 1.3.2.4 - Cross-Site Request Forgery to Arbitrary Quiz Deletion and Copying + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49333c6b-58f6-4d5a-a605-46484160175a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-2d3408ffedaf3db88a6330ec42f826f9.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-2d3408ffedaf3db88a6330ec42f826f9.yaml new file mode 100644 index 0000000000..614b063a65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-2d3408ffedaf3db88a6330ec42f826f9.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-2d3408ffedaf3db88a6330ec42f826f9 + +info: + name: > + Chained Quiz <= 1.3.2 - Reflected Cross-Site Scripting via datef + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a316c0a-452a-4205-b79b-8bd911016ab2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-3202568d0ef30adfbc4903b533249872.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-3202568d0ef30adfbc4903b533249872.yaml new file mode 100644 index 0000000000..770af0ae59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-3202568d0ef30adfbc4903b533249872.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-3202568d0ef30adfbc4903b533249872 + +info: + name: > + Chained Quiz <= 1.3.2 - Reflected Cross-Site Scripting via emailf + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6781b7b7-c11a-4328-8d14-ffafc2ccb127?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-328d39d28a95cf7b4841489a8ffe5709.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-328d39d28a95cf7b4841489a8ffe5709.yaml new file mode 100644 index 0000000000..abea28fc84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-328d39d28a95cf7b4841489a8ffe5709.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-328d39d28a95cf7b4841489a8ffe5709 + +info: + name: > + Chained Quiz <= 1.0.8.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6ef0c41-e498-4de6-a86a-d23f65a7a824?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-36a32b4cb0e29bcda79b2aacf4de5bad.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-36a32b4cb0e29bcda79b2aacf4de5bad.yaml new file mode 100644 index 0000000000..82607db944 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-36a32b4cb0e29bcda79b2aacf4de5bad.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-36a32b4cb0e29bcda79b2aacf4de5bad + +info: + name: > + Chained Quiz <= 1.3.2 - Reflected Cross-Site Scripting via dnf + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8a49064-ad48-410e-9b32-f94109830ccf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-465e906926b7ad2f7695941c2d2f3545.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-465e906926b7ad2f7695941c2d2f3545.yaml new file mode 100644 index 0000000000..83ea8e9ca1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-465e906926b7ad2f7695941c2d2f3545.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-465e906926b7ad2f7695941c2d2f3545 + +info: + name: > + Chained Quiz <= 1.1.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d553ff1-9f05-47c2-83be-66dba318e63e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-4932bcd4df2882e039a7b09a90097299.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-4932bcd4df2882e039a7b09a90097299.yaml new file mode 100644 index 0000000000..1b8ecbf071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-4932bcd4df2882e039a7b09a90097299.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-4932bcd4df2882e039a7b09a90097299 + +info: + name: > + Chained Quiz <= 1.3.2.2 - Reflected Cross-Site Scripting via dn + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d46edcfe-ab6b-4966-9d85-40a2e2ee3d44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-4a26e6944326e51fbc6f1bb093dd580e.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-4a26e6944326e51fbc6f1bb093dd580e.yaml new file mode 100644 index 0000000000..45bcbc0a6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-4a26e6944326e51fbc6f1bb093dd580e.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-4a26e6944326e51fbc6f1bb093dd580e + +info: + name: > + Chained Quiz < 1.2.7.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e05142e-04a3-483e-a4af-035df3609b9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-4acb85f5976a533776dda534630f7468.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-4acb85f5976a533776dda534630f7468.yaml new file mode 100644 index 0000000000..96dbec0f5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-4acb85f5976a533776dda534630f7468.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-4acb85f5976a533776dda534630f7468 + +info: + name: > + Chained Quiz <= 1.3.2.4 - Cross-Site Request Forgery to Question Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/966a3a33-3d22-4671-8893-7a64ff838f39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-53813c475afa70818392401295ac8091.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-53813c475afa70818392401295ac8091.yaml new file mode 100644 index 0000000000..dd81bda3ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-53813c475afa70818392401295ac8091.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-53813c475afa70818392401295ac8091 + +info: + name: > + Chained Quiz <= 1.3.2.2 - Authenticated (Admin+) Stored Cross-Site Scripting via Facebook App ID + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c031d2a4-d009-4422-a751-b8476e15a808?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-5ad18bbfeb4c12a137de8b17b7553a5c.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-5ad18bbfeb4c12a137de8b17b7553a5c.yaml new file mode 100644 index 0000000000..b86f31d3e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-5ad18bbfeb4c12a137de8b17b7553a5c.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-5ad18bbfeb4c12a137de8b17b7553a5c + +info: + name: > + Chained Quiz <= 0.9.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76a4dbcd-b3f3-48e9-8175-c701837ac2ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-65db5904362ad316155a2ed2c78eb032.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-65db5904362ad316155a2ed2c78eb032.yaml new file mode 100644 index 0000000000..a6cc0ef3eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-65db5904362ad316155a2ed2c78eb032.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-65db5904362ad316155a2ed2c78eb032 + +info: + name: > + Chained Quiz <= 1.3.2.3 - Reflected Cross-Site Scripting via date + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6bb8fea-8b2c-42da-a224-0719a584d92b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-7943d082ee4cf7c0ecdfc0080489be58.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-7943d082ee4cf7c0ecdfc0080489be58.yaml new file mode 100644 index 0000000000..c0f21332c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-7943d082ee4cf7c0ecdfc0080489be58.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-7943d082ee4cf7c0ecdfc0080489be58 + +info: + name: > + Chained Quiz <= 1.3.2 - Reflected Cross-Site Scripting via ipf + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99555021-68f4-4395-978d-ff1bbae9ebd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-95b04656752bb123878499817b8956fb.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-95b04656752bb123878499817b8956fb.yaml new file mode 100644 index 0000000000..79cabf6ca9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-95b04656752bb123878499817b8956fb.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-95b04656752bb123878499817b8956fb + +info: + name: > + Chained Quiz <= 1.3.2.3 - Reflected Cross-Site Scripting via ip + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9145ce0d-311c-4be1-be15-7e1791c17860?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-b648d871623ad477887d3a2ad417ce75.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-b648d871623ad477887d3a2ad417ce75.yaml new file mode 100644 index 0000000000..27fa62de2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-b648d871623ad477887d3a2ad417ce75.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-b648d871623ad477887d3a2ad417ce75 + +info: + name: > + Chained Quiz Plugin < 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc8dc895-8caa-4a37-80f0-3a5516c25dfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-bb66f4ac76af234c75b6841b7c13994a.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-bb66f4ac76af234c75b6841b7c13994a.yaml new file mode 100644 index 0000000000..ef8999b0fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-bb66f4ac76af234c75b6841b7c13994a.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-bb66f4ac76af234c75b6841b7c13994a + +info: + name: > + Chained Quiz <= 1.1.9 -Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3bae191-9395-481c-93bf-b17cf5f87271?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-c2f2835d90a3f3c6d22ed640d7b5a35a.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-c2f2835d90a3f3c6d22ed640d7b5a35a.yaml new file mode 100644 index 0000000000..dddc6c0181 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-c2f2835d90a3f3c6d22ed640d7b5a35a.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-c2f2835d90a3f3c6d22ed640d7b5a35a + +info: + name: > + Chained Quiz <= 1.3.2.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68ec28e8-345c-4017-ab0d-04ac4facd60c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chained-quiz-d0976f5c2f9eb3654eb8c7ee13a935fb.yaml b/nuclei-templates/cve-less/plugins/chained-quiz-d0976f5c2f9eb3654eb8c7ee13a935fb.yaml new file mode 100644 index 0000000000..13bd5afaea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chained-quiz-d0976f5c2f9eb3654eb8c7ee13a935fb.yaml @@ -0,0 +1,58 @@ +id: chained-quiz-d0976f5c2f9eb3654eb8c7ee13a935fb + +info: + name: > + Chained Quiz <= 1.3.2 - Reflected Cross-Site Scripting via pointsf + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b708b72f-d906-47c9-9bf7-a9397956db3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chained-quiz/" + google-query: inurl:"/wp-content/plugins/chained-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chained-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chained-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chained-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chamber-dashboard-business-directory-285685ddf3c4cea5af33e325a30ef210.yaml b/nuclei-templates/cve-less/plugins/chamber-dashboard-business-directory-285685ddf3c4cea5af33e325a30ef210.yaml new file mode 100644 index 0000000000..8e7efdd818 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chamber-dashboard-business-directory-285685ddf3c4cea5af33e325a30ef210.yaml @@ -0,0 +1,58 @@ +id: chamber-dashboard-business-directory-285685ddf3c4cea5af33e325a30ef210 + +info: + name: > + Chamber Dashboard Business Directory < 3.3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2ed28cd-44e6-416a-a252-8341104f5ef3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chamber-dashboard-business-directory/" + google-query: inurl:"/wp-content/plugins/chamber-dashboard-business-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chamber-dashboard-business-directory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chamber-dashboard-business-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chamber-dashboard-business-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chameleon-6c023e252025477e682e7148561b6604.yaml b/nuclei-templates/cve-less/plugins/chameleon-6c023e252025477e682e7148561b6604.yaml new file mode 100644 index 0000000000..a1a8f45408 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chameleon-6c023e252025477e682e7148561b6604.yaml @@ -0,0 +1,58 @@ +id: chameleon-6c023e252025477e682e7148561b6604 + +info: + name: > + Chameleon <= 1.4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc79e104-47c0-4f4a-9a7b-dc0d6337ea05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chameleon/" + google-query: inurl:"/wp-content/plugins/chameleon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chameleon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chameleon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chameleon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chameleon-css-6e87e05f951d4532dd6f6de3b88ad77d.yaml b/nuclei-templates/cve-less/plugins/chameleon-css-6e87e05f951d4532dd6f6de3b88ad77d.yaml new file mode 100644 index 0000000000..36e3e95b43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chameleon-css-6e87e05f951d4532dd6f6de3b88ad77d.yaml @@ -0,0 +1,58 @@ +id: chameleon-css-6e87e05f951d4532dd6f6de3b88ad77d + +info: + name: > + Chameleon CSS <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0363732-0a67-4a58-9b54-6315328c70ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chameleon-css/" + google-query: inurl:"/wp-content/plugins/chameleon-css/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chameleon-css,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chameleon-css/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chameleon-css" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-default-login-logo-url-and-title-85ca7cedd2597831c97a27e7d00fa427.yaml b/nuclei-templates/cve-less/plugins/change-default-login-logo-url-and-title-85ca7cedd2597831c97a27e7d00fa427.yaml new file mode 100644 index 0000000000..d90d23750e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-default-login-logo-url-and-title-85ca7cedd2597831c97a27e7d00fa427.yaml @@ -0,0 +1,58 @@ +id: change-default-login-logo-url-and-title-85ca7cedd2597831c97a27e7d00fa427 + +info: + name: > + Change default login logo,url and title <= 2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c935ec2-c51e-4760-bccc-3a6988bd4262?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-default-login-logo-url-and-title/" + google-query: inurl:"/wp-content/plugins/change-default-login-logo-url-and-title/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-default-login-logo-url-and-title,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-default-login-logo-url-and-title/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-default-login-logo-url-and-title" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-login-logo-dc6848daf0e6078b7f345f206891b945.yaml b/nuclei-templates/cve-less/plugins/change-login-logo-dc6848daf0e6078b7f345f206891b945.yaml new file mode 100644 index 0000000000..90159161b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-login-logo-dc6848daf0e6078b7f345f206891b945.yaml @@ -0,0 +1,58 @@ +id: change-login-logo-dc6848daf0e6078b7f345f206891b945 + +info: + name: > + Change WordPress Login Logo <= 1.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d1e8703-4ad3-42c5-a20d-f1bd31522a8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-login-logo/" + google-query: inurl:"/wp-content/plugins/change-login-logo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-login-logo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-login-logo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-login-logo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-memory-limit-37d8f4614be006df7ea5c5c8ccf22b6a.yaml b/nuclei-templates/cve-less/plugins/change-memory-limit-37d8f4614be006df7ea5c5c8ccf22b6a.yaml new file mode 100644 index 0000000000..cc19ebd100 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-memory-limit-37d8f4614be006df7ea5c5c8ccf22b6a.yaml @@ -0,0 +1,58 @@ +id: change-memory-limit-37d8f4614be006df7ea5c5c8ccf22b6a + +info: + name: > + Change Memory Limit <= 1.0 - Missing Authorization via admin_logic() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eee7344d-5459-4558-a557-d8c5935ecc30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-memory-limit/" + google-query: inurl:"/wp-content/plugins/change-memory-limit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-memory-limit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-memory-limit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-memory-limit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-prices-with-time-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/change-prices-with-time-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6248fa2553 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-prices-with-time-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: change-prices-with-time-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-prices-with-time-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/change-prices-with-time-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-prices-with-time-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-prices-with-time-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-prices-with-time-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-table-prefix-ca722f2c2467f4f9c95321209d16faa6.yaml b/nuclei-templates/cve-less/plugins/change-table-prefix-ca722f2c2467f4f9c95321209d16faa6.yaml new file mode 100644 index 0000000000..55e6316503 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-table-prefix-ca722f2c2467f4f9c95321209d16faa6.yaml @@ -0,0 +1,58 @@ +id: change-table-prefix-ca722f2c2467f4f9c95321209d16faa6 + +info: + name: > + Change Table Prefix <= 2.0 - Cross-Site Request Forgery via change_prefix_form + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d154587-e396-45ba-80ad-b532b612823a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-table-prefix/" + google-query: inurl:"/wp-content/plugins/change-table-prefix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-table-prefix,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-table-prefix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-table-prefix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-uploaded-file-permissions-b3c283ecfc25af9f10f9c937f229f24c.yaml b/nuclei-templates/cve-less/plugins/change-uploaded-file-permissions-b3c283ecfc25af9f10f9c937f229f24c.yaml new file mode 100644 index 0000000000..95bcf6a951 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-uploaded-file-permissions-b3c283ecfc25af9f10f9c937f229f24c.yaml @@ -0,0 +1,58 @@ +id: change-uploaded-file-permissions-b3c283ecfc25af9f10f9c937f229f24c + +info: + name: > + Change Uploaded File Permissions <= 4.0.0 - Cross-Site Request Forgery to Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7a61446-a5ef-44e4-bd64-9c2e844953fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-uploaded-file-permissions/" + google-query: inurl:"/wp-content/plugins/change-uploaded-file-permissions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-uploaded-file-permissions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-uploaded-file-permissions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-uploaded-file-permissions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-wc-price-title-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/change-wc-price-title-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7cb3cac720 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-wc-price-title-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: change-wc-price-title-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-wc-price-title/" + google-query: inurl:"/wp-content/plugins/change-wc-price-title/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-wc-price-title,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-wc-price-title/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-wc-price-title" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-woocommerce-add-to-cart-button-text-a483253d605901e000058299d42af1c9.yaml b/nuclei-templates/cve-less/plugins/change-woocommerce-add-to-cart-button-text-a483253d605901e000058299d42af1c9.yaml new file mode 100644 index 0000000000..f20eeb473f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-woocommerce-add-to-cart-button-text-a483253d605901e000058299d42af1c9.yaml @@ -0,0 +1,58 @@ +id: change-woocommerce-add-to-cart-button-text-a483253d605901e000058299d42af1c9 + +info: + name: > + Change WooCommerce Add To Cart Button Text <= 1.3 - Missing Authorization via rexvs_settings_submit + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d47f5d90-dc7d-4500-a6e6-e585e4a5c11b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-woocommerce-add-to-cart-button-text/" + google-query: inurl:"/wp-content/plugins/change-woocommerce-add-to-cart-button-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-woocommerce-add-to-cart-button-text,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-woocommerce-add-to-cart-button-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-woocommerce-add-to-cart-button-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-wp-admin-login-4490549b2215d97aa7dcad6a865e6752.yaml b/nuclei-templates/cve-less/plugins/change-wp-admin-login-4490549b2215d97aa7dcad6a865e6752.yaml new file mode 100644 index 0000000000..3dc497f227 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-wp-admin-login-4490549b2215d97aa7dcad6a865e6752.yaml @@ -0,0 +1,58 @@ +id: change-wp-admin-login-4490549b2215d97aa7dcad6a865e6752 + +info: + name: > + Change WP Admin Login <= 1.0.9 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/616c8ab8-3200-41fb-9d31-5d36873742cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-wp-admin-login/" + google-query: inurl:"/wp-content/plugins/change-wp-admin-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-wp-admin-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-wp-admin-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-wp-admin-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/change-wp-admin-login-5385baa6493f36fd557c3aebaffd13c8.yaml b/nuclei-templates/cve-less/plugins/change-wp-admin-login-5385baa6493f36fd557c3aebaffd13c8.yaml new file mode 100644 index 0000000000..e88250a436 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/change-wp-admin-login-5385baa6493f36fd557c3aebaffd13c8.yaml @@ -0,0 +1,58 @@ +id: change-wp-admin-login-5385baa6493f36fd557c3aebaffd13c8 + +info: + name: > + Change WP Admin Login <= 1.1.3 - Protection Mechanism Failure to Login Page Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9410b5b8-1bb2-42d7-8d4d-721131d392e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/change-wp-admin-login/" + google-query: inurl:"/wp-content/plugins/change-wp-admin-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,change-wp-admin-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/change-wp-admin-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "change-wp-admin-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/charitable-2242cb39ce05f115de2cf4c2d7f707ea.yaml b/nuclei-templates/cve-less/plugins/charitable-2242cb39ce05f115de2cf4c2d7f707ea.yaml new file mode 100644 index 0000000000..6c247c8ada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/charitable-2242cb39ce05f115de2cf4c2d7f707ea.yaml @@ -0,0 +1,58 @@ +id: charitable-2242cb39ce05f115de2cf4c2d7f707ea + +info: + name: > + Donation Forms by Charitable <= 1.7.0.12 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/522ecc1c-5834-4325-9234-79cf712213f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/charitable/" + google-query: inurl:"/wp-content/plugins/charitable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,charitable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/charitable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "charitable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/charitable-3ebd40bb61580d15dfcd12d2fb7e83aa.yaml b/nuclei-templates/cve-less/plugins/charitable-3ebd40bb61580d15dfcd12d2fb7e83aa.yaml new file mode 100644 index 0000000000..7b1dbbbbc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/charitable-3ebd40bb61580d15dfcd12d2fb7e83aa.yaml @@ -0,0 +1,58 @@ +id: charitable-3ebd40bb61580d15dfcd12d2fb7e83aa + +info: + name: > + Charitable <= 1.7.0.13 - Authenticated(Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbaedb36-6710-48ab-8bb5-e6065fa8df51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/charitable/" + google-query: inurl:"/wp-content/plugins/charitable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,charitable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/charitable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "charitable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/charitable-6af09e3fae008ebc46d2a7e390514583.yaml b/nuclei-templates/cve-less/plugins/charitable-6af09e3fae008ebc46d2a7e390514583.yaml new file mode 100644 index 0000000000..f6e9d2d1ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/charitable-6af09e3fae008ebc46d2a7e390514583.yaml @@ -0,0 +1,58 @@ +id: charitable-6af09e3fae008ebc46d2a7e390514583 + +info: + name: > + Charitable <= 1.7.0.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b3b9576-7c7d-4665-92d5-03aa292cdbbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/charitable/" + google-query: inurl:"/wp-content/plugins/charitable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,charitable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/charitable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "charitable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/charitable-6feaa562e8c22b0716b934987c7ecb18.yaml b/nuclei-templates/cve-less/plugins/charitable-6feaa562e8c22b0716b934987c7ecb18.yaml new file mode 100644 index 0000000000..33670be1e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/charitable-6feaa562e8c22b0716b934987c7ecb18.yaml @@ -0,0 +1,58 @@ +id: charitable-6feaa562e8c22b0716b934987c7ecb18 + +info: + name: > + Charitable – Donation Plugin <= 1.6.50 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8aa8dd6-abff-4c37-98d5-39a924b15651?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/charitable/" + google-query: inurl:"/wp-content/plugins/charitable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,charitable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/charitable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "charitable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/charitable-8a3943e3e4b63a520dbb0168b24f856a.yaml b/nuclei-templates/cve-less/plugins/charitable-8a3943e3e4b63a520dbb0168b24f856a.yaml new file mode 100644 index 0000000000..f24b986529 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/charitable-8a3943e3e4b63a520dbb0168b24f856a.yaml @@ -0,0 +1,58 @@ +id: charitable-8a3943e3e4b63a520dbb0168b24f856a + +info: + name: > + Charitable – Donation Plugin <= 1.6.50 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23a01c60-d843-4fc5-a5fa-677f452008b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/charitable/" + google-query: inurl:"/wp-content/plugins/charitable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,charitable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/charitable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "charitable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/charitable-f4e452921028a365c12034905b529473.yaml b/nuclei-templates/cve-less/plugins/charitable-f4e452921028a365c12034905b529473.yaml new file mode 100644 index 0000000000..d456ea1107 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/charitable-f4e452921028a365c12034905b529473.yaml @@ -0,0 +1,58 @@ +id: charitable-f4e452921028a365c12034905b529473 + +info: + name: > + Charitable <= 1.5.13 - Unauthorized Access to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5be1b4b2-4b33-45d7-82fd-b4d51e16535c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/charitable/" + google-query: inurl:"/wp-content/plugins/charitable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,charitable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/charitable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "charitable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chart-builder-08b024925f5d1dcafa4385a333501904.yaml b/nuclei-templates/cve-less/plugins/chart-builder-08b024925f5d1dcafa4385a333501904.yaml new file mode 100644 index 0000000000..f19a9cfda1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chart-builder-08b024925f5d1dcafa4385a333501904.yaml @@ -0,0 +1,58 @@ +id: chart-builder-08b024925f5d1dcafa4385a333501904 + +info: + name: > + Chart Builder <= 1.9.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18cbf346-91a3-4856-930e-7753eb1470d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chart-builder/" + google-query: inurl:"/wp-content/plugins/chart-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chart-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chart-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chart-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chart-builder-9c920cf674baacb0579f3b1f4946e20e.yaml b/nuclei-templates/cve-less/plugins/chart-builder-9c920cf674baacb0579f3b1f4946e20e.yaml new file mode 100644 index 0000000000..1554bc0336 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chart-builder-9c920cf674baacb0579f3b1f4946e20e.yaml @@ -0,0 +1,58 @@ +id: chart-builder-9c920cf674baacb0579f3b1f4946e20e + +info: + name: > + Chartify <= 2.0.6 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49d0315e-fcb2-4232-8797-0421cf5d3cd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chart-builder/" + google-query: inurl:"/wp-content/plugins/chart-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chart-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chart-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chart-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chat-bee-66589665af0b647ad01185928e32cee5.yaml b/nuclei-templates/cve-less/plugins/chat-bee-66589665af0b647ad01185928e32cee5.yaml new file mode 100644 index 0000000000..37dbd6c9e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chat-bee-66589665af0b647ad01185928e32cee5.yaml @@ -0,0 +1,58 @@ +id: chat-bee-66589665af0b647ad01185928e32cee5 + +info: + name: > + Chat Bee <= 1.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bf4ffaa-5192-4fb6-95d0-d19c4fe45b93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chat-bee/" + google-query: inurl:"/wp-content/plugins/chat-bee/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chat-bee,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chat-bee/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chat-bee" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chat-bubble-036e41317f960475dab82c492d364c11.yaml b/nuclei-templates/cve-less/plugins/chat-bubble-036e41317f960475dab82c492d364c11.yaml new file mode 100644 index 0000000000..72b6624796 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chat-bubble-036e41317f960475dab82c492d364c11.yaml @@ -0,0 +1,58 @@ +id: chat-bubble-036e41317f960475dab82c492d364c11 + +info: + name: > + Chat Bubble <= 2.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61584724-fa1d-4823-af3d-d44501dc1f60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chat-bubble/" + google-query: inurl:"/wp-content/plugins/chat-bubble/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chat-bubble,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chat-bubble/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chat-bubble" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chat-bubble-9273f5ba0fae5fff2a4a50e2ed96c406.yaml b/nuclei-templates/cve-less/plugins/chat-bubble-9273f5ba0fae5fff2a4a50e2ed96c406.yaml new file mode 100644 index 0000000000..2295ac9fd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chat-bubble-9273f5ba0fae5fff2a4a50e2ed96c406.yaml @@ -0,0 +1,58 @@ +id: chat-bubble-9273f5ba0fae5fff2a4a50e2ed96c406 + +info: + name: > + Chat Bubble <= 2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chat-bubble/" + google-query: inurl:"/wp-content/plugins/chat-bubble/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chat-bubble,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chat-bubble/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chat-bubble" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chat-bubble-f0274c328c4fa319248646b0f1fefd1a.yaml b/nuclei-templates/cve-less/plugins/chat-bubble-f0274c328c4fa319248646b0f1fefd1a.yaml new file mode 100644 index 0000000000..469f0d7a9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chat-bubble-f0274c328c4fa319248646b0f1fefd1a.yaml @@ -0,0 +1,58 @@ +id: chat-bubble-f0274c328c4fa319248646b0f1fefd1a + +info: + name: > + Chat Bubble <= 2.3 - Cross-Site Request Forgery via cbb_submit_settings_data + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/206261fa-58b6-4407-b8e1-2315836b6c88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chat-bubble/" + google-query: inurl:"/wp-content/plugins/chat-bubble/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chat-bubble,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chat-bubble/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chat-bubble" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chat-help-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/chat-help-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..0e39f971b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chat-help-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: chat-help-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chat-help/" + google-query: inurl:"/wp-content/plugins/chat-help/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chat-help,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chat-help/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chat-help" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-196434d911f0f2030523284b9ab4ed7d.yaml b/nuclei-templates/cve-less/plugins/chatbot-196434d911f0f2030523284b9ab4ed7d.yaml new file mode 100644 index 0000000000..57212ef9a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-196434d911f0f2030523284b9ab4ed7d.yaml @@ -0,0 +1,58 @@ +id: chatbot-196434d911f0f2030523284b9ab4ed7d + +info: + name: > + AI ChatBot <= 4.8.9 and 4.9.2 - Missing Authorization on AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9db002f-ff41-493a-87b1-5f0b4b07cfc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-2b374eb61066305fce645375b473ec81.yaml b/nuclei-templates/cve-less/plugins/chatbot-2b374eb61066305fce645375b473ec81.yaml new file mode 100644 index 0000000000..0c1a27eb9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-2b374eb61066305fce645375b473ec81.yaml @@ -0,0 +1,58 @@ +id: chatbot-2b374eb61066305fce645375b473ec81 + +info: + name: > + ChatBot <= 4.2.8 - Cross-Site Request Forgery to Stored Cross-Site Scripting and Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04a79a78-a6d3-40ef-9b26-8e2e00534b7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-43f628ea46bf1b19a83b42111a34194e.yaml b/nuclei-templates/cve-less/plugins/chatbot-43f628ea46bf1b19a83b42111a34194e.yaml new file mode 100644 index 0000000000..5dbfd252c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-43f628ea46bf1b19a83b42111a34194e.yaml @@ -0,0 +1,58 @@ +id: chatbot-43f628ea46bf1b19a83b42111a34194e + +info: + name: > + AI ChatBot <= 4.8.9 - Unauthenticated SQL Injection via qc_wpbo_search_response + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ad12146-200b-48e5-82de-7572541edcc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-45a7d47baac99a733e5ee7898a52f7c4.yaml b/nuclei-templates/cve-less/plugins/chatbot-45a7d47baac99a733e5ee7898a52f7c4.yaml new file mode 100644 index 0000000000..685614a5fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-45a7d47baac99a733e5ee7898a52f7c4.yaml @@ -0,0 +1,58 @@ +id: chatbot-45a7d47baac99a733e5ee7898a52f7c4 + +info: + name: > + ChatBot <= 4.4.4 - Unauthenticated Stored Cross-Site Scripting via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56fad8de-6646-4305-83a9-0ed443c3aa7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-4b541be8b8519e80f2cec24d1b2f8ef6.yaml b/nuclei-templates/cve-less/plugins/chatbot-4b541be8b8519e80f2cec24d1b2f8ef6.yaml new file mode 100644 index 0000000000..ba1ddc2ff6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-4b541be8b8519e80f2cec24d1b2f8ef6.yaml @@ -0,0 +1,58 @@ +id: chatbot-4b541be8b8519e80f2cec24d1b2f8ef6 + +info: + name: > + ChatBot <= 5.1.0 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75432cfd-7c0d-4d93-9b62-cac0fd9b49d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-584e49f9f9bb47c562f3e0a8463d6240.yaml b/nuclei-templates/cve-less/plugins/chatbot-584e49f9f9bb47c562f3e0a8463d6240.yaml new file mode 100644 index 0000000000..cc1de1f7e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-584e49f9f9bb47c562f3e0a8463d6240.yaml @@ -0,0 +1,58 @@ +id: chatbot-584e49f9f9bb47c562f3e0a8463d6240 + +info: + name: > + ChatBot 4.7.7 - Authenticated (Administrator+) Stored Cross-Site Scripting in Language Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f5f8bd5-435a-4a53-8fa2-55674f39b78b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-5d770457008ba85c2ccd6a7b3ee7247f.yaml b/nuclei-templates/cve-less/plugins/chatbot-5d770457008ba85c2ccd6a7b3ee7247f.yaml new file mode 100644 index 0000000000..77d1766c7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-5d770457008ba85c2ccd6a7b3ee7247f.yaml @@ -0,0 +1,58 @@ +id: chatbot-5d770457008ba85c2ccd6a7b3ee7247f + +info: + name: > + AI ChatBot <= 4.8.9 and 4.9.2- Authenticated (Subscriber+) Arbitrary File Deletion via qcld_openai_delete_training_file + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b3f4ccb-fcc6-42ec-8e9e-03d69ae7acf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-5eba30f00f0fc37dca7e730267948bfb.yaml b/nuclei-templates/cve-less/plugins/chatbot-5eba30f00f0fc37dca7e730267948bfb.yaml new file mode 100644 index 0000000000..7277587341 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-5eba30f00f0fc37dca7e730267948bfb.yaml @@ -0,0 +1,58 @@ +id: chatbot-5eba30f00f0fc37dca7e730267948bfb + +info: + name: > + AI ChatBot <= 4.8.9 and 4.9.2 - Cross-Site Request Forgery on AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/846bd929-45cd-4e91-b232-ae16dd2b12a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-5ef5a5a8c6cb4692922673fc79eb4970.yaml b/nuclei-templates/cve-less/plugins/chatbot-5ef5a5a8c6cb4692922673fc79eb4970.yaml new file mode 100644 index 0000000000..6b9c083e79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-5ef5a5a8c6cb4692922673fc79eb4970.yaml @@ -0,0 +1,58 @@ +id: chatbot-5ef5a5a8c6cb4692922673fc79eb4970 + +info: + name: > + ChatBot <= 4.4.8 - Unauthenticated Stored Cross-Site Scripting in Admin Dashboard + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4feb8e8-8620-44b9-9e8d-7ea513e168ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-67e61488b97755fd204f3e38d91bbcf2.yaml b/nuclei-templates/cve-less/plugins/chatbot-67e61488b97755fd204f3e38d91bbcf2.yaml new file mode 100644 index 0000000000..88c5134e41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-67e61488b97755fd204f3e38d91bbcf2.yaml @@ -0,0 +1,58 @@ +id: chatbot-67e61488b97755fd204f3e38d91bbcf2 + +info: + name: > + ChatBot <= 4.7.7 - Authenticated (Administrator+) Stored Cross-Site Scripting in FAQ Builder + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cc50245-365a-419d-a85c-fbd658d004ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-711d5e4371b5307e83aafa75e094a16d.yaml b/nuclei-templates/cve-less/plugins/chatbot-711d5e4371b5307e83aafa75e094a16d.yaml new file mode 100644 index 0000000000..d8b4ab82f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-711d5e4371b5307e83aafa75e094a16d.yaml @@ -0,0 +1,58 @@ +id: chatbot-711d5e4371b5307e83aafa75e094a16d + +info: + name: > + AI ChatBot <= 4.4.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdb3fbaa-4d33-4754-848b-77e902ea4a85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-8142bc3541567011d52df62ad2e24883.yaml b/nuclei-templates/cve-less/plugins/chatbot-8142bc3541567011d52df62ad2e24883.yaml new file mode 100644 index 0000000000..4a0907182b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-8142bc3541567011d52df62ad2e24883.yaml @@ -0,0 +1,58 @@ +id: chatbot-8142bc3541567011d52df62ad2e24883 + +info: + name: > + AI ChatBot <= 4.4.7 - Missing Authorization on openai_settings_option_callback + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b33bf55c-0397-44a2-8c18-ea5f8f1e2ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-94f813d00f5c832ee527c5c3251318bb.yaml b/nuclei-templates/cve-less/plugins/chatbot-94f813d00f5c832ee527c5c3251318bb.yaml new file mode 100644 index 0000000000..05cfc8445f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-94f813d00f5c832ee527c5c3251318bb.yaml @@ -0,0 +1,58 @@ +id: chatbot-94f813d00f5c832ee527c5c3251318bb + +info: + name: > + ChatBot <= 4.7.8 - Cross-Site Request Forgery via qc_wp_latest_update_check + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be9522c8-3561-48fe-89ef-62e0fcb085b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-96bcbe0539bed3ce58849487848c2a2e.yaml b/nuclei-templates/cve-less/plugins/chatbot-96bcbe0539bed3ce58849487848c2a2e.yaml new file mode 100644 index 0000000000..8e67054624 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-96bcbe0539bed3ce58849487848c2a2e.yaml @@ -0,0 +1,58 @@ +id: chatbot-96bcbe0539bed3ce58849487848c2a2e + +info: + name: > + AI ChatBot <= 4.5.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c40752df-1337-475b-8b5e-0d171946bfe9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-9f74a97e65247db4961da7465a48826a.yaml b/nuclei-templates/cve-less/plugins/chatbot-9f74a97e65247db4961da7465a48826a.yaml new file mode 100644 index 0000000000..139c5e2d1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-9f74a97e65247db4961da7465a48826a.yaml @@ -0,0 +1,58 @@ +id: chatbot-9f74a97e65247db4961da7465a48826a + +info: + name: > + ChatBot <= 4.7.8 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db1bb11d-4752-42d0-b538-2d2a4c827226?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-a8d129ffa611a0e2860f9a0cb3ae87ba.yaml b/nuclei-templates/cve-less/plugins/chatbot-a8d129ffa611a0e2860f9a0cb3ae87ba.yaml new file mode 100644 index 0000000000..d7a6180b30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-a8d129ffa611a0e2860f9a0cb3ae87ba.yaml @@ -0,0 +1,58 @@ +id: chatbot-a8d129ffa611a0e2860f9a0cb3ae87ba + +info: + name: > + AI ChatBot <= 4.6.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ed1c2a2-54ee-4dc8-a54d-01d7a6dbc22e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-b0f34e3010de519cd369f7b9dbab99cd.yaml b/nuclei-templates/cve-less/plugins/chatbot-b0f34e3010de519cd369f7b9dbab99cd.yaml new file mode 100644 index 0000000000..de2a9d2f76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-b0f34e3010de519cd369f7b9dbab99cd.yaml @@ -0,0 +1,58 @@ +id: chatbot-b0f34e3010de519cd369f7b9dbab99cd + +info: + name: > + ChatBot <= 4.4.6 - Unauthenticated PHP Object Injection via Cookies + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/364fe5b3-561e-4005-a589-c7c2b9e85b99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-c8b00e3a8ae7ee111daecc90a5a50970.yaml b/nuclei-templates/cve-less/plugins/chatbot-c8b00e3a8ae7ee111daecc90a5a50970.yaml new file mode 100644 index 0000000000..8e6df22b9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-c8b00e3a8ae7ee111daecc90a5a50970.yaml @@ -0,0 +1,58 @@ +id: chatbot-c8b00e3a8ae7ee111daecc90a5a50970 + +info: + name: > + AI ChatBot <= 4.5.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9df97805-b425-49b1-86c1-e66213dacd2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-chatgpt-916951fd750c41452dbc03c332006408.yaml b/nuclei-templates/cve-less/plugins/chatbot-chatgpt-916951fd750c41452dbc03c332006408.yaml new file mode 100644 index 0000000000..dd50dd9f91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-chatgpt-916951fd750c41452dbc03c332006408.yaml @@ -0,0 +1,58 @@ +id: chatbot-chatgpt-916951fd750c41452dbc03c332006408 + +info: + name: > + Kognetiks Chatbot for WordPress <= 1.9.9 - Unauthenticated Arbitrary File Upload via chatbot_chatgpt_upload_file_to_assistant Function + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bc33a05-d462-492e-9ea5-cf37b887cc94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot-chatgpt/" + google-query: inurl:"/wp-content/plugins/chatbot-chatgpt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot-chatgpt,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot-chatgpt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot-chatgpt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-d3213062fc9b1a2c7b785c61361d34fc.yaml b/nuclei-templates/cve-less/plugins/chatbot-d3213062fc9b1a2c7b785c61361d34fc.yaml new file mode 100644 index 0000000000..8eb2e34e52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-d3213062fc9b1a2c7b785c61361d34fc.yaml @@ -0,0 +1,58 @@ +id: chatbot-d3213062fc9b1a2c7b785c61361d34fc + +info: + name: > + AI ChatBot <= 4.8.9 and 4.9.2 - Authenticated (Subscriber+) Directory Traversal to Arbitrary File Write via qcld_openai_upload_pagetraining_file + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25199281-5286-4d75-8d27-26ce215e0993?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-dacff2143dd0506c8bdad1a273f67459.yaml b/nuclei-templates/cve-less/plugins/chatbot-dacff2143dd0506c8bdad1a273f67459.yaml new file mode 100644 index 0000000000..3ee1803398 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-dacff2143dd0506c8bdad1a273f67459.yaml @@ -0,0 +1,58 @@ +id: chatbot-dacff2143dd0506c8bdad1a273f67459 + +info: + name: > + ChatBot 4.8.6 - 4.9.6 - Authenticated (Administrator+) Stored Cross-Site Scripting in FAQ Builder + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc305c48-8337-42b7-ad61-61aea8018def?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.8.6', '<= 4.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-e91e697ef1f971cda16c40acfd5a2dfb.yaml b/nuclei-templates/cve-less/plugins/chatbot-e91e697ef1f971cda16c40acfd5a2dfb.yaml new file mode 100644 index 0000000000..4bd7fb02a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-e91e697ef1f971cda16c40acfd5a2dfb.yaml @@ -0,0 +1,58 @@ +id: chatbot-e91e697ef1f971cda16c40acfd5a2dfb + +info: + name: > + ChatBot <= 4.3.0 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ed8f004-f68d-40fb-bca1-b0b92cf24fdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-f715c92150b63b8634910eb743badf7e.yaml b/nuclei-templates/cve-less/plugins/chatbot-f715c92150b63b8634910eb743badf7e.yaml new file mode 100644 index 0000000000..08396c2ab0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-f715c92150b63b8634910eb743badf7e.yaml @@ -0,0 +1,58 @@ +id: chatbot-f715c92150b63b8634910eb743badf7e + +info: + name: > + ChatBot <= 4.4.8 - Authenticated (Subscriber+) Stored Cross-Site Scripting via openai_settings_option_callback + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d69cfed9-7369-40f3-b9a7-0cf2430e8eed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chatbot-fb85a7124dad283264113a73b1162be4.yaml b/nuclei-templates/cve-less/plugins/chatbot-fb85a7124dad283264113a73b1162be4.yaml new file mode 100644 index 0000000000..1c4aa807f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chatbot-fb85a7124dad283264113a73b1162be4.yaml @@ -0,0 +1,58 @@ +id: chatbot-fb85a7124dad283264113a73b1162be4 + +info: + name: > + AI ChatBot <= 4.8.9 - Unauthenticated Sensitive Information Exposure via qcld_wb_chatbot_check_user + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d897daf8-5320-4546-9a63-1d34a15b2a58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chatbot/" + google-query: inurl:"/wp-content/plugins/chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chatbot,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chaty-07056c447bdab5ad6a1bdd36170bd91a.yaml b/nuclei-templates/cve-less/plugins/chaty-07056c447bdab5ad6a1bdd36170bd91a.yaml new file mode 100644 index 0000000000..e9bea36972 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chaty-07056c447bdab5ad6a1bdd36170bd91a.yaml @@ -0,0 +1,58 @@ +id: chaty-07056c447bdab5ad6a1bdd36170bd91a + +info: + name: > + Floating Chat Widget: Contact Icons, Messages, Telegram, Email, SMS, Call Button – Chaty <= 2.8.3 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15705cf2-f396-4b19-b58a-144b000f61e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chaty/" + google-query: inurl:"/wp-content/plugins/chaty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chaty,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chaty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chaty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chaty-1afdb113a8eb638275401757c0567e46.yaml b/nuclei-templates/cve-less/plugins/chaty-1afdb113a8eb638275401757c0567e46.yaml new file mode 100644 index 0000000000..a99e414071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chaty-1afdb113a8eb638275401757c0567e46.yaml @@ -0,0 +1,58 @@ +id: chaty-1afdb113a8eb638275401757c0567e46 + +info: + name: > + Floating Chat Widget <= 3.1.8 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a18baa1d-2400-496d-8e8b-1c3983484706?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chaty/" + google-query: inurl:"/wp-content/plugins/chaty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chaty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chaty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chaty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chaty-54240ff4b4cecbac0ff14d99813212f2.yaml b/nuclei-templates/cve-less/plugins/chaty-54240ff4b4cecbac0ff14d99813212f2.yaml new file mode 100644 index 0000000000..155eef610e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chaty-54240ff4b4cecbac0ff14d99813212f2.yaml @@ -0,0 +1,58 @@ +id: chaty-54240ff4b4cecbac0ff14d99813212f2 + +info: + name: > + Chaty <= 3.0.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3baa0543-cdfb-4699-97ca-eaa83c2494a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chaty/" + google-query: inurl:"/wp-content/plugins/chaty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chaty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chaty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chaty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chaty-63f126067f4ae4bb5668663357185275.yaml b/nuclei-templates/cve-less/plugins/chaty-63f126067f4ae4bb5668663357185275.yaml new file mode 100644 index 0000000000..3b2eab4d72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chaty-63f126067f4ae4bb5668663357185275.yaml @@ -0,0 +1,58 @@ +id: chaty-63f126067f4ae4bb5668663357185275 + +info: + name: > + Chaty <= 3.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36741b46-57ac-402e-bfb1-8424c7e70598?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chaty/" + google-query: inurl:"/wp-content/plugins/chaty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chaty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chaty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chaty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chaty-6fb60bc9485708489fdd72c16e1fb82c.yaml b/nuclei-templates/cve-less/plugins/chaty-6fb60bc9485708489fdd72c16e1fb82c.yaml new file mode 100644 index 0000000000..d62ddfad45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chaty-6fb60bc9485708489fdd72c16e1fb82c.yaml @@ -0,0 +1,58 @@ +id: chaty-6fb60bc9485708489fdd72c16e1fb82c + +info: + name: > + Chaty <= 3.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/361deac0-f675-432c-b7d2-b99f168d476d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chaty/" + google-query: inurl:"/wp-content/plugins/chaty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chaty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chaty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chaty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chaty-6ffb854c265938eec5a761ac2ea74cda.yaml b/nuclei-templates/cve-less/plugins/chaty-6ffb854c265938eec5a761ac2ea74cda.yaml new file mode 100644 index 0000000000..d78245330e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chaty-6ffb854c265938eec5a761ac2ea74cda.yaml @@ -0,0 +1,58 @@ +id: chaty-6ffb854c265938eec5a761ac2ea74cda + +info: + name: > + Floating Chat Widget - Chaty <= 3.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a158653-f80c-48a3-840e-20ee7e85925a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chaty/" + google-query: inurl:"/wp-content/plugins/chaty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chaty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chaty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chaty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chaty-a21592f489772d448729c01eea1a3d4d.yaml b/nuclei-templates/cve-less/plugins/chaty-a21592f489772d448729c01eea1a3d4d.yaml new file mode 100644 index 0000000000..6e6ccc80d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chaty-a21592f489772d448729c01eea1a3d4d.yaml @@ -0,0 +1,58 @@ +id: chaty-a21592f489772d448729c01eea1a3d4d + +info: + name: > + Floating Chat Widget: Contact Icons, Messages, Telegram, Email, SMS, Call Button - Chaty <= 2.8.2 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0716471e-388c-43e5-abc3-84c78569e61a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chaty/" + google-query: inurl:"/wp-content/plugins/chaty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chaty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chaty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chaty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chaty-d2f186fae58d1b5afd77fc5306fc26bf.yaml b/nuclei-templates/cve-less/plugins/chaty-d2f186fae58d1b5afd77fc5306fc26bf.yaml new file mode 100644 index 0000000000..8086fca08f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chaty-d2f186fae58d1b5afd77fc5306fc26bf.yaml @@ -0,0 +1,58 @@ +id: chaty-d2f186fae58d1b5afd77fc5306fc26bf + +info: + name: > + Floating Chat Widget - Chaty <= 3.0.2 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04a937d0-9844-49d1-bcb5-0ee6026c3947?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chaty/" + google-query: inurl:"/wp-content/plugins/chaty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chaty,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chaty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chaty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chauffeur-booking-system-b40844c1e763e67ca14e58da5d8219ab.yaml b/nuclei-templates/cve-less/plugins/chauffeur-booking-system-b40844c1e763e67ca14e58da5d8219ab.yaml new file mode 100644 index 0000000000..99b9046c27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chauffeur-booking-system-b40844c1e763e67ca14e58da5d8219ab.yaml @@ -0,0 +1,58 @@ +id: chauffeur-booking-system-b40844c1e763e67ca14e58da5d8219ab + +info: + name: > + Chauffeur Taxi Booking System for WordPress <= 6.9 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4143febf-92b3-42e7-9499-9ea83d7727d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chauffeur-booking-system/" + google-query: inurl:"/wp-content/plugins/chauffeur-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chauffeur-booking-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chauffeur-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chauffeur-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/check-email-212007d229cb11caf3b5098b0d076057.yaml b/nuclei-templates/cve-less/plugins/check-email-212007d229cb11caf3b5098b0d076057.yaml new file mode 100644 index 0000000000..2fe8dc73d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/check-email-212007d229cb11caf3b5098b0d076057.yaml @@ -0,0 +1,58 @@ +id: check-email-212007d229cb11caf3b5098b0d076057 + +info: + name: > + Check & Log Email <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa4bf7dc-07be-4397-957c-ef0c1d61b40a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/check-email/" + google-query: inurl:"/wp-content/plugins/check-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,check-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/check-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "check-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/check-email-57441a6bd13b11b69e9f1629f83e2faa.yaml b/nuclei-templates/cve-less/plugins/check-email-57441a6bd13b11b69e9f1629f83e2faa.yaml new file mode 100644 index 0000000000..c08c72306b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/check-email-57441a6bd13b11b69e9f1629f83e2faa.yaml @@ -0,0 +1,58 @@ +id: check-email-57441a6bd13b11b69e9f1629f83e2faa + +info: + name: > + Check & Log email <= 1.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9680fed3-e8fe-4845-9807-f139f9e22e79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/check-email/" + google-query: inurl:"/wp-content/plugins/check-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,check-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/check-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "check-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/check-email-88a3c1a86120c49f8c7acdd40fc0ba9b.yaml b/nuclei-templates/cve-less/plugins/check-email-88a3c1a86120c49f8c7acdd40fc0ba9b.yaml new file mode 100644 index 0000000000..e9748865a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/check-email-88a3c1a86120c49f8c7acdd40fc0ba9b.yaml @@ -0,0 +1,58 @@ +id: check-email-88a3c1a86120c49f8c7acdd40fc0ba9b + +info: + name: > + Check & Log Email <= 1.0.2 - Admin+ SQL Injection via Order and OrderBy parameters + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67aee1ec-44af-4904-8a9b-ecfbb8d3b302?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/check-email/" + google-query: inurl:"/wp-content/plugins/check-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,check-email,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/check-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "check-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/check-email-a582597ac626e8033a80d456beb664e8.yaml b/nuclei-templates/cve-less/plugins/check-email-a582597ac626e8033a80d456beb664e8.yaml new file mode 100644 index 0000000000..6207762f07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/check-email-a582597ac626e8033a80d456beb664e8.yaml @@ -0,0 +1,58 @@ +id: check-email-a582597ac626e8033a80d456beb664e8 + +info: + name: > + Check & Log Email <= 0.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33153ebe-65fc-4db8-84fe-df22554be3ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/check-email/" + google-query: inurl:"/wp-content/plugins/check-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,check-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/check-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "check-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/check-email-d739207b5203bbaf9071af23095dbb99.yaml b/nuclei-templates/cve-less/plugins/check-email-d739207b5203bbaf9071af23095dbb99.yaml new file mode 100644 index 0000000000..15cd860c51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/check-email-d739207b5203bbaf9071af23095dbb99.yaml @@ -0,0 +1,58 @@ +id: check-email-d739207b5203bbaf9071af23095dbb99 + +info: + name: > + Check & Log Email <= 1.0.9 - Unauthenticated Hook Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae9307c-680c-43c7-8246-a3e6149c1fb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/check-email/" + google-query: inurl:"/wp-content/plugins/check-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,check-email,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/check-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "check-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checkfront-wp-booking-a9bc73625028a7b9d27c51cb883237c9.yaml b/nuclei-templates/cve-less/plugins/checkfront-wp-booking-a9bc73625028a7b9d27c51cb883237c9.yaml new file mode 100644 index 0000000000..6abdc66651 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checkfront-wp-booking-a9bc73625028a7b9d27c51cb883237c9.yaml @@ -0,0 +1,58 @@ +id: checkfront-wp-booking-a9bc73625028a7b9d27c51cb883237c9 + +info: + name: > + Checkfront Online Booking System <= 3.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc5a8506-b191-4ab3-9c59-4f1150be6a38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checkfront-wp-booking/" + google-query: inurl:"/wp-content/plugins/checkfront-wp-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checkfront-wp-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checkfront-wp-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checkfront-wp-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checklist-d4f973711f83e484b1ab150d8a07fcda.yaml b/nuclei-templates/cve-less/plugins/checklist-d4f973711f83e484b1ab150d8a07fcda.yaml new file mode 100644 index 0000000000..83d835d5fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checklist-d4f973711f83e484b1ab150d8a07fcda.yaml @@ -0,0 +1,58 @@ +id: checklist-d4f973711f83e484b1ab150d8a07fcda + +info: + name: > + Checklist <= 1.1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48b31324-c6a3-4550-939e-06f7b3c7067a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checklist/" + google-query: inurl:"/wp-content/plugins/checklist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checklist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checklist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checklist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checkout-fees-for-woocommerce-d46c47231d5f7c1d21cefa0fd0efa427.yaml b/nuclei-templates/cve-less/plugins/checkout-fees-for-woocommerce-d46c47231d5f7c1d21cefa0fd0efa427.yaml new file mode 100644 index 0000000000..3508a6865b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checkout-fees-for-woocommerce-d46c47231d5f7c1d21cefa0fd0efa427.yaml @@ -0,0 +1,58 @@ +id: checkout-fees-for-woocommerce-d46c47231d5f7c1d21cefa0fd0efa427 + +info: + name: > + Payment Gateway Based Fees and Discounts for WooCommerce <= 2.12.1 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbfe3f7d-d653-421b-a054-a4ab266866c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checkout-fees-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/checkout-fees-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checkout-fees-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checkout-fees-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checkout-fees-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checkout-files-upload-woocommerce-d9b04ea1292b41be830780f6e6d01550.yaml b/nuclei-templates/cve-less/plugins/checkout-files-upload-woocommerce-d9b04ea1292b41be830780f6e6d01550.yaml new file mode 100644 index 0000000000..9a59ac8b4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checkout-files-upload-woocommerce-d9b04ea1292b41be830780f6e6d01550.yaml @@ -0,0 +1,58 @@ +id: checkout-files-upload-woocommerce-d9b04ea1292b41be830780f6e6d01550 + +info: + name: > + Checkout Files Upload for WooCommerce <= 2.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f7c1848-d49f-4f34-8869-3ddbdccdc38f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checkout-files-upload-woocommerce/" + google-query: inurl:"/wp-content/plugins/checkout-files-upload-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checkout-files-upload-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checkout-files-upload-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checkout-files-upload-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checkout-for-paypal-8648ead24f8ede303ab8621f146c3147.yaml b/nuclei-templates/cve-less/plugins/checkout-for-paypal-8648ead24f8ede303ab8621f146c3147.yaml new file mode 100644 index 0000000000..b29d285586 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checkout-for-paypal-8648ead24f8ede303ab8621f146c3147.yaml @@ -0,0 +1,58 @@ +id: checkout-for-paypal-8648ead24f8ede303ab8621f146c3147 + +info: + name: > + Checkout for PayPal <= 1.0.13 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9e998fd-aae7-4e1e-8134-a28670a4704b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checkout-for-paypal/" + google-query: inurl:"/wp-content/plugins/checkout-for-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checkout-for-paypal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checkout-for-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checkout-for-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checkout-mestres-wp-1e6a2a2317e6c0646d9912b475c2283c.yaml b/nuclei-templates/cve-less/plugins/checkout-mestres-wp-1e6a2a2317e6c0646d9912b475c2283c.yaml new file mode 100644 index 0000000000..9d696df628 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checkout-mestres-wp-1e6a2a2317e6c0646d9912b475c2283c.yaml @@ -0,0 +1,58 @@ +id: checkout-mestres-wp-1e6a2a2317e6c0646d9912b475c2283c + +info: + name: > + Checkout Mestres WP <= 7.1.9.6 - Missing Authorization to Unauthenticated Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a52bf70-667b-400f-8912-75fae20a3f5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checkout-mestres-wp/" + google-query: inurl:"/wp-content/plugins/checkout-mestres-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checkout-mestres-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checkout-mestres-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checkout-mestres-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checkout-mestres-wp-d54d63e5f680e91069c2712ba5d24580.yaml b/nuclei-templates/cve-less/plugins/checkout-mestres-wp-d54d63e5f680e91069c2712ba5d24580.yaml new file mode 100644 index 0000000000..af16411db9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checkout-mestres-wp-d54d63e5f680e91069c2712ba5d24580.yaml @@ -0,0 +1,58 @@ +id: checkout-mestres-wp-d54d63e5f680e91069c2712ba5d24580 + +info: + name: > + Checkout Mestres WP <= 7.1.9.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e068573d-bc3e-48de-b4e7-6a0666086ac3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checkout-mestres-wp/" + google-query: inurl:"/wp-content/plugins/checkout-mestres-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checkout-mestres-wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checkout-mestres-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checkout-mestres-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checkout-mestres-wp-e80edd6c2880294918a0f04214b9aef1.yaml b/nuclei-templates/cve-less/plugins/checkout-mestres-wp-e80edd6c2880294918a0f04214b9aef1.yaml new file mode 100644 index 0000000000..fbda053570 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checkout-mestres-wp-e80edd6c2880294918a0f04214b9aef1.yaml @@ -0,0 +1,58 @@ +id: checkout-mestres-wp-e80edd6c2880294918a0f04214b9aef1 + +info: + name: > + Checkout Mestres WP <= 7.1.9.6 - Authentication Bypass via Password Reset + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ad16d1e-e778-4cb4-a15d-ddb906f27762?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checkout-mestres-wp/" + google-query: inurl:"/wp-content/plugins/checkout-mestres-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checkout-mestres-wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checkout-mestres-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checkout-mestres-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/checkout-plugins-stripe-woo-15e030858694c0a02fa97544922bfe88.yaml b/nuclei-templates/cve-less/plugins/checkout-plugins-stripe-woo-15e030858694c0a02fa97544922bfe88.yaml new file mode 100644 index 0000000000..1871101b2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/checkout-plugins-stripe-woo-15e030858694c0a02fa97544922bfe88.yaml @@ -0,0 +1,58 @@ +id: checkout-plugins-stripe-woo-15e030858694c0a02fa97544922bfe88 + +info: + name: > + Stripe Payments For WooCommerce by Checkout Plugins <= 1.4.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af0579f3-09f8-46cc-9ba8-647a8ec83076?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/checkout-plugins-stripe-woo/" + google-query: inurl:"/wp-content/plugins/checkout-plugins-stripe-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,checkout-plugins-stripe-woo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/checkout-plugins-stripe-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "checkout-plugins-stripe-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cherry-plugin-028198ae17f77e0fafdf84b4c3a51484.yaml b/nuclei-templates/cve-less/plugins/cherry-plugin-028198ae17f77e0fafdf84b4c3a51484.yaml new file mode 100644 index 0000000000..b8ab241e73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cherry-plugin-028198ae17f77e0fafdf84b4c3a51484.yaml @@ -0,0 +1,58 @@ +id: cherry-plugin-028198ae17f77e0fafdf84b4c3a51484 + +info: + name: > + Cherry Plugin < 1.2.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa2bc3ae-1162-496b-8bc3-5bee1c0ff702?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cherry-plugin/" + google-query: inurl:"/wp-content/plugins/cherry-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cherry-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cherry-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cherry-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/child-theme-generator-e12bf2fb09ed5e271c0d21b336dc261a.yaml b/nuclei-templates/cve-less/plugins/child-theme-generator-e12bf2fb09ed5e271c0d21b336dc261a.yaml new file mode 100644 index 0000000000..6222d3e6e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/child-theme-generator-e12bf2fb09ed5e271c0d21b336dc261a.yaml @@ -0,0 +1,58 @@ +id: child-theme-generator-e12bf2fb09ed5e271c0d21b336dc261a + +info: + name: > + Child Theme Generator <= 2.2.7 Cross-Site Request Forgery to Arbitrary Folder Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5de937cc-da05-4b95-807d-dc19a8b7d6b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/child-theme-generator/" + google-query: inurl:"/wp-content/plugins/child-theme-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,child-theme-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/child-theme-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "child-theme-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/child-theme-generator-ed864fc86a7fe870d57e87a3dcd3af49.yaml b/nuclei-templates/cve-less/plugins/child-theme-generator-ed864fc86a7fe870d57e87a3dcd3af49.yaml new file mode 100644 index 0000000000..b65bb9522a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/child-theme-generator-ed864fc86a7fe870d57e87a3dcd3af49.yaml @@ -0,0 +1,58 @@ +id: child-theme-generator-ed864fc86a7fe870d57e87a3dcd3af49 + +info: + name: > + Child Theme Generator <= 2.2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73d89f61-e34a-493b-a856-63f1553f3000?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/child-theme-generator/" + google-query: inurl:"/wp-content/plugins/child-theme-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,child-theme-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/child-theme-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "child-theme-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chilexpress-oficial-29ab94320ed945dea921e0756254429b.yaml b/nuclei-templates/cve-less/plugins/chilexpress-oficial-29ab94320ed945dea921e0756254429b.yaml new file mode 100644 index 0000000000..a68f980da8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chilexpress-oficial-29ab94320ed945dea921e0756254429b.yaml @@ -0,0 +1,58 @@ +id: chilexpress-oficial-29ab94320ed945dea921e0756254429b + +info: + name: > + Chilexpress woo oficial <= 1.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0999a738-9fae-4043-99eb-ff222a7608fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chilexpress-oficial/" + google-query: inurl:"/wp-content/plugins/chilexpress-oficial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chilexpress-oficial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chilexpress-oficial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chilexpress-oficial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/choice-payment-gateway-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/choice-payment-gateway-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e02f535223 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/choice-payment-gateway-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: choice-payment-gateway-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/choice-payment-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/choice-payment-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,choice-payment-gateway-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/choice-payment-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "choice-payment-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chopslider-b9df60ed6459d260336415d2d308e184.yaml b/nuclei-templates/cve-less/plugins/chopslider-b9df60ed6459d260336415d2d308e184.yaml new file mode 100644 index 0000000000..bf6c344067 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chopslider-b9df60ed6459d260336415d2d308e184.yaml @@ -0,0 +1,58 @@ +id: chopslider-b9df60ed6459d260336415d2d308e184 + +info: + name: > + Chop Slider 3 <= 3.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1d26326-c5c5-4993-aadf-298759eb873d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chopslider/" + google-query: inurl:"/wp-content/plugins/chopslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chopslider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chopslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chopslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chp-ads-block-detector-8ecff4070b265868b558d6084036a925.yaml b/nuclei-templates/cve-less/plugins/chp-ads-block-detector-8ecff4070b265868b558d6084036a925.yaml new file mode 100644 index 0000000000..287ea7100f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chp-ads-block-detector-8ecff4070b265868b558d6084036a925.yaml @@ -0,0 +1,58 @@ +id: chp-ads-block-detector-8ecff4070b265868b558d6084036a925 + +info: + name: > + CHP Ads Block Detector <= 3.9.4 - Missing Authorization to Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eca64d7-6e33-4b8e-af37-a3e8bbf2b76f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chp-ads-block-detector/" + google-query: inurl:"/wp-content/plugins/chp-ads-block-detector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chp-ads-block-detector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chp-ads-block-detector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chp-ads-block-detector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chp-ads-block-detector-98c26ef05457073952420479d08234d0.yaml b/nuclei-templates/cve-less/plugins/chp-ads-block-detector-98c26ef05457073952420479d08234d0.yaml new file mode 100644 index 0000000000..72c7aa8c41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chp-ads-block-detector-98c26ef05457073952420479d08234d0.yaml @@ -0,0 +1,58 @@ +id: chp-ads-block-detector-98c26ef05457073952420479d08234d0 + +info: + name: > + CHP Ads Block Detector <= 3.9.4 - Cross-Site Request Forgery via chp_abd_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5a9cced-0e5e-4b6e-8291-0a862c9f9523?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chp-ads-block-detector/" + google-query: inurl:"/wp-content/plugins/chp-ads-block-detector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chp-ads-block-detector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chp-ads-block-detector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chp-ads-block-detector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chp-ads-block-detector-a6450bbcf1d391d632396e4291c55731.yaml b/nuclei-templates/cve-less/plugins/chp-ads-block-detector-a6450bbcf1d391d632396e4291c55731.yaml new file mode 100644 index 0000000000..aaabc03bcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chp-ads-block-detector-a6450bbcf1d391d632396e4291c55731.yaml @@ -0,0 +1,58 @@ +id: chp-ads-block-detector-a6450bbcf1d391d632396e4291c55731 + +info: + name: > + CHP Ads Block Detector <= 3.9.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f8514c9-0e11-4e26-ba0b-1d08a990b56c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chp-ads-block-detector/" + google-query: inurl:"/wp-content/plugins/chp-ads-block-detector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chp-ads-block-detector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chp-ads-block-detector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chp-ads-block-detector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/christmas-greetings-d9f5e61a49fbbfbd69a5c0f7460c4648.yaml b/nuclei-templates/cve-less/plugins/christmas-greetings-d9f5e61a49fbbfbd69a5c0f7460c4648.yaml new file mode 100644 index 0000000000..0b17420354 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/christmas-greetings-d9f5e61a49fbbfbd69a5c0f7460c4648.yaml @@ -0,0 +1,58 @@ +id: christmas-greetings-d9f5e61a49fbbfbd69a5c0f7460c4648 + +info: + name: > + Christmas Greetings <= 1.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/466d6087-1e4d-4010-b3c7-87e9e2d64f06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/christmas-greetings/" + google-query: inurl:"/wp-content/plugins/christmas-greetings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,christmas-greetings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/christmas-greetings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "christmas-greetings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chronoforms-0f50287e721edfee647a952371440e59.yaml b/nuclei-templates/cve-less/plugins/chronoforms-0f50287e721edfee647a952371440e59.yaml new file mode 100644 index 0000000000..63d8f63329 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chronoforms-0f50287e721edfee647a952371440e59.yaml @@ -0,0 +1,58 @@ +id: chronoforms-0f50287e721edfee647a952371440e59 + +info: + name: > + Chronoforms <= 7.0.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c02b9b2-b41e-4a30-b69a-9cdae86dd7a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chronoforms/" + google-query: inurl:"/wp-content/plugins/chronoforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chronoforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chronoforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chronoforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/chronosly-events-calendar-32fc78061d3eb7ab5ce33b0356499170.yaml b/nuclei-templates/cve-less/plugins/chronosly-events-calendar-32fc78061d3eb7ab5ce33b0356499170.yaml new file mode 100644 index 0000000000..39b67338fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/chronosly-events-calendar-32fc78061d3eb7ab5ce33b0356499170.yaml @@ -0,0 +1,58 @@ +id: chronosly-events-calendar-32fc78061d3eb7ab5ce33b0356499170 + +info: + name: > + Chronosly Events Calendar <= 2.6.2 - Cross-Site Request Forgery via plugin_settings_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57580c2c-c3de-44a3-b586-f7092c06dc6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/chronosly-events-calendar/" + google-query: inurl:"/wp-content/plugins/chronosly-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,chronosly-events-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/chronosly-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chronosly-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-211d17907ac598fe9fa7fe583c9712b5.yaml b/nuclei-templates/cve-less/plugins/church-admin-211d17907ac598fe9fa7fe583c9712b5.yaml new file mode 100644 index 0000000000..d440e87222 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-211d17907ac598fe9fa7fe583c9712b5.yaml @@ -0,0 +1,58 @@ +id: church-admin-211d17907ac598fe9fa7fe583c9712b5 + +info: + name: > + Church Admin <= 4.1.5 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cc178d7-da99-4fbc-9277-52c6299f0417?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-2552c36873674cea120ccc38e69f7427.yaml b/nuclei-templates/cve-less/plugins/church-admin-2552c36873674cea120ccc38e69f7427.yaml new file mode 100644 index 0000000000..1662f3967f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-2552c36873674cea120ccc38e69f7427.yaml @@ -0,0 +1,58 @@ +id: church-admin-2552c36873674cea120ccc38e69f7427 + +info: + name: > + Church Admin <= 4.1.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62998f65-5c99-490d-829f-4d63a9a20287?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-5730fd190ef48d8c13b621a11b022d51.yaml b/nuclei-templates/cve-less/plugins/church-admin-5730fd190ef48d8c13b621a11b022d51.yaml new file mode 100644 index 0000000000..b5290a9b37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-5730fd190ef48d8c13b621a11b022d51.yaml @@ -0,0 +1,58 @@ +id: church-admin-5730fd190ef48d8c13b621a11b022d51 + +info: + name: > + Church Admin <= 3.4.134 - Cross-Site Request Forgery leading to Plugin Backup Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab78f245-ab2d-4e9a-bd43-caa3afd1366b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.135') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-5b5631c6755ba3e58cfcfbe9ec90f71c.yaml b/nuclei-templates/cve-less/plugins/church-admin-5b5631c6755ba3e58cfcfbe9ec90f71c.yaml new file mode 100644 index 0000000000..834e255984 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-5b5631c6755ba3e58cfcfbe9ec90f71c.yaml @@ -0,0 +1,58 @@ +id: church-admin-5b5631c6755ba3e58cfcfbe9ec90f71c + +info: + name: > + Church Admin <= 4.0.26 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4429eb0-2b9a-4366-9f93-90484872c48e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-5e04848eef304ee1fb47854040c71b18.yaml b/nuclei-templates/cve-less/plugins/church-admin-5e04848eef304ee1fb47854040c71b18.yaml new file mode 100644 index 0000000000..4ee085e98d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-5e04848eef304ee1fb47854040c71b18.yaml @@ -0,0 +1,58 @@ +id: church-admin-5e04848eef304ee1fb47854040c71b18 + +info: + name: > + Church Admin <= 3.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2204017a-0363-4f2f-909a-e0826463477c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-62fad85c6fa5b7fb3d8634d94c62f43f.yaml b/nuclei-templates/cve-less/plugins/church-admin-62fad85c6fa5b7fb3d8634d94c62f43f.yaml new file mode 100644 index 0000000000..2bafe00a4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-62fad85c6fa5b7fb3d8634d94c62f43f.yaml @@ -0,0 +1,58 @@ +id: church-admin-62fad85c6fa5b7fb3d8634d94c62f43f + +info: + name: > + Church Admin <= 4.0.27 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07693689-2f61-41dc-9fa1-b6e5f0073dc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-85e68d609db8f93e17b14e0a7511b5c8.yaml b/nuclei-templates/cve-less/plugins/church-admin-85e68d609db8f93e17b14e0a7511b5c8.yaml new file mode 100644 index 0000000000..578293bc2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-85e68d609db8f93e17b14e0a7511b5c8.yaml @@ -0,0 +1,58 @@ +id: church-admin-85e68d609db8f93e17b14e0a7511b5c8 + +info: + name: > + Church Admin <= 4.1.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/473eab06-67c8-4143-9d00-eb2866f101c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-8c1d8b54955c02df9ba77ea482839214.yaml b/nuclei-templates/cve-less/plugins/church-admin-8c1d8b54955c02df9ba77ea482839214.yaml new file mode 100644 index 0000000000..ea4d793255 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-8c1d8b54955c02df9ba77ea482839214.yaml @@ -0,0 +1,58 @@ +id: church-admin-8c1d8b54955c02df9ba77ea482839214 + +info: + name: > + Church Admin <= 4.0.27 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97312cf2-dcff-466f-a27c-25686216ed04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-be26aafc9c00248210b5b5ec8b8d8831.yaml b/nuclei-templates/cve-less/plugins/church-admin-be26aafc9c00248210b5b5ec8b8d8831.yaml new file mode 100644 index 0000000000..9a61a3bbc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-be26aafc9c00248210b5b5ec8b8d8831.yaml @@ -0,0 +1,58 @@ +id: church-admin-be26aafc9c00248210b5b5ec8b8d8831 + +info: + name: > + Church Admin <= 3.7.56 - Server-Side Request Forgery via church_admin_import_csv + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ff53647-572f-419f-ad39-965658a10263?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-c1356627585be8298fc5154daa83bb1f.yaml b/nuclei-templates/cve-less/plugins/church-admin-c1356627585be8298fc5154daa83bb1f.yaml new file mode 100644 index 0000000000..22f2cf094c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-c1356627585be8298fc5154daa83bb1f.yaml @@ -0,0 +1,58 @@ +id: church-admin-c1356627585be8298fc5154daa83bb1f + +info: + name: > + Church Admin < 1.2550 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fca3dae-43a9-4130-ad04-8624aeb0c26b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2550') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml b/nuclei-templates/cve-less/plugins/church-admin-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml new file mode 100644 index 0000000000..36ad24f542 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml @@ -0,0 +1,58 @@ +id: church-admin-ce1d4ccc883e8bf5f82fe00f2d94fe35 + +info: + name: > + Church Admin < 0.810 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54e7ccaf-2b16-4e36-a8ec-8f1f61193ffd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.810') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-d0a63c61f1af91f397e1af950dda23c4.yaml b/nuclei-templates/cve-less/plugins/church-admin-d0a63c61f1af91f397e1af950dda23c4.yaml new file mode 100644 index 0000000000..4521ca1b96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-d0a63c61f1af91f397e1af950dda23c4.yaml @@ -0,0 +1,58 @@ +id: church-admin-d0a63c61f1af91f397e1af950dda23c4 + +info: + name: > + Church Admin <= 3.7.29 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e85efdc1-cffc-411a-a2f7-6fa1132e2910?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-dada2db55c799a5508c295a160b1fcaf.yaml b/nuclei-templates/cve-less/plugins/church-admin-dada2db55c799a5508c295a160b1fcaf.yaml new file mode 100644 index 0000000000..ebcbf5ac14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-dada2db55c799a5508c295a160b1fcaf.yaml @@ -0,0 +1,58 @@ +id: church-admin-dada2db55c799a5508c295a160b1fcaf + +info: + name: > + Church Admin <= 4.1.17 - Authenticated (Contributor+) Stored Cross-Site Scripting via meta-text + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/379825e2-61bf-4d11-8eea-05ad08200e9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-admin-dd67ce4e359afe3a28fa3105db87a235.yaml b/nuclei-templates/cve-less/plugins/church-admin-dd67ce4e359afe3a28fa3105db87a235.yaml new file mode 100644 index 0000000000..c2d1630cb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-admin-dd67ce4e359afe3a28fa3105db87a235.yaml @@ -0,0 +1,58 @@ +id: church-admin-dd67ce4e359afe3a28fa3105db87a235 + +info: + name: > + Church Admin <= 4.1.18 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a268550-af65-405a-a16a-9083533e4acc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-admin/" + google-query: inurl:"/wp-content/plugins/church-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-management-a6893186307907fca26272a54fd950bf.yaml b/nuclei-templates/cve-less/plugins/church-management-a6893186307907fca26272a54fd950bf.yaml new file mode 100644 index 0000000000..cfb57c992b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-management-a6893186307907fca26272a54fd950bf.yaml @@ -0,0 +1,58 @@ +id: church-management-a6893186307907fca26272a54fd950bf + +info: + name: > + WPCHURCH - Church Management System for Wordpress Theme < 13-07-2019 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25a05249-d899-429b-a7d3-c283c03a48a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-management/" + google-query: inurl:"/wp-content/plugins/church-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-management,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13-07-2019') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/church-theme-content-3e8d1d694647ed5b6d6bc051900f98be.yaml b/nuclei-templates/cve-less/plugins/church-theme-content-3e8d1d694647ed5b6d6bc051900f98be.yaml new file mode 100644 index 0000000000..b2eb276fea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/church-theme-content-3e8d1d694647ed5b6d6bc051900f98be.yaml @@ -0,0 +1,58 @@ +id: church-theme-content-3e8d1d694647ed5b6d6bc051900f98be + +info: + name: > + Church Content – Sermons, Events and More <= 2.6 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9f7f66f-5d58-4a23-8444-805569ec8294?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/church-theme-content/" + google-query: inurl:"/wp-content/plugins/church-theme-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,church-theme-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/church-theme-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "church-theme-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cimy-header-image-rotator-b77d972bfa12e86d544c2057da2d9c61.yaml b/nuclei-templates/cve-less/plugins/cimy-header-image-rotator-b77d972bfa12e86d544c2057da2d9c61.yaml new file mode 100644 index 0000000000..581248d050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cimy-header-image-rotator-b77d972bfa12e86d544c2057da2d9c61.yaml @@ -0,0 +1,58 @@ +id: cimy-header-image-rotator-b77d972bfa12e86d544c2057da2d9c61 + +info: + name: > + Cimy Header Image Rotator <= 6.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cfec2b8-1df0-4f3f-b6cc-ed0adecaeb16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cimy-header-image-rotator/" + google-query: inurl:"/wp-content/plugins/cimy-header-image-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cimy-header-image-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cimy-header-image-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cimy-header-image-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cimy-user-manager-6b907b5178535d26ea12591112bdce4d.yaml b/nuclei-templates/cve-less/plugins/cimy-user-manager-6b907b5178535d26ea12591112bdce4d.yaml new file mode 100644 index 0000000000..555e0358be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cimy-user-manager-6b907b5178535d26ea12591112bdce4d.yaml @@ -0,0 +1,58 @@ +id: cimy-user-manager-6b907b5178535d26ea12591112bdce4d + +info: + name: > + Cimy User Manager < 1.4.4 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/469bf5c9-984e-4107-a8a2-da744a78b8b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cimy-user-manager/" + google-query: inurl:"/wp-content/plugins/cimy-user-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cimy-user-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cimy-user-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cimy-user-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cip4-folder-download-widget-f5f3c9e8239bc353d0388304ee46c783.yaml b/nuclei-templates/cve-less/plugins/cip4-folder-download-widget-f5f3c9e8239bc353d0388304ee46c783.yaml new file mode 100644 index 0000000000..77d9005e42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cip4-folder-download-widget-f5f3c9e8239bc353d0388304ee46c783.yaml @@ -0,0 +1,58 @@ +id: cip4-folder-download-widget-f5f3c9e8239bc353d0388304ee46c783 + +info: + name: > + CIP4 Folder Download Widget < 1.11 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b783b94-7135-49c1-aff2-1c2ea24bbfcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cip4-folder-download-widget/" + google-query: inurl:"/wp-content/plugins/cip4-folder-download-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cip4-folder-download-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cip4-folder-download-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cip4-folder-download-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-42e55306470e6d1ac0240deaf313219c.yaml b/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-42e55306470e6d1ac0240deaf313219c.yaml new file mode 100644 index 0000000000..7496104074 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-42e55306470e6d1ac0240deaf313219c.yaml @@ -0,0 +1,58 @@ +id: circle-image-slider-with-lightbox-42e55306470e6d1ac0240deaf313219c + +info: + name: > + Team Circle Image Slider With Lightbox <= 1.0.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2627ac2b-25a8-480d-ac83-ee0ca323b3a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/circle-image-slider-with-lightbox/" + google-query: inurl:"/wp-content/plugins/circle-image-slider-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,circle-image-slider-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/circle-image-slider-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "circle-image-slider-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-93dba1cadeafcd73215feec69fcf5f63.yaml b/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-93dba1cadeafcd73215feec69fcf5f63.yaml new file mode 100644 index 0000000000..efda4ba972 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-93dba1cadeafcd73215feec69fcf5f63.yaml @@ -0,0 +1,58 @@ +id: circle-image-slider-with-lightbox-93dba1cadeafcd73215feec69fcf5f63 + +info: + name: > + Team Circle Image Slider With Lightbox 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6a54470-fc66-43c5-a523-ddbefd47ee1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/circle-image-slider-with-lightbox/" + google-query: inurl:"/wp-content/plugins/circle-image-slider-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,circle-image-slider-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/circle-image-slider-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "circle-image-slider-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-ef03a122b111711054e748e01eb53a23.yaml b/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-ef03a122b111711054e748e01eb53a23.yaml new file mode 100644 index 0000000000..8904c254ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/circle-image-slider-with-lightbox-ef03a122b111711054e748e01eb53a23.yaml @@ -0,0 +1,58 @@ +id: circle-image-slider-with-lightbox-ef03a122b111711054e748e01eb53a23 + +info: + name: > + Team Circle Image Slider With Lightbox <= 1.0.15 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f160f474-de8d-4120-9f46-a185b035a627?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/circle-image-slider-with-lightbox/" + google-query: inurl:"/wp-content/plugins/circle-image-slider-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,circle-image-slider-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/circle-image-slider-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "circle-image-slider-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/circles-gallery-ae8255f2994549b36706bb9a56ad3c0f.yaml b/nuclei-templates/cve-less/plugins/circles-gallery-ae8255f2994549b36706bb9a56ad3c0f.yaml new file mode 100644 index 0000000000..903f7ab5d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/circles-gallery-ae8255f2994549b36706bb9a56ad3c0f.yaml @@ -0,0 +1,58 @@ +id: circles-gallery-ae8255f2994549b36706bb9a56ad3c0f + +info: + name: > + Circles Gallery <= 1.0.10 - Authenticated (Admin+) Stored Cross-Site Scripting via Admin Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/882caa58-b56f-455f-ab3e-1fd8fd4e10e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/circles-gallery/" + google-query: inurl:"/wp-content/plugins/circles-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,circles-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/circles-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "circles-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/citadela-directory-cbb621b3a6e8313b4fce0a47ef22d371.yaml b/nuclei-templates/cve-less/plugins/citadela-directory-cbb621b3a6e8313b4fce0a47ef22d371.yaml new file mode 100644 index 0000000000..799d1b6b43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/citadela-directory-cbb621b3a6e8313b4fce0a47ef22d371.yaml @@ -0,0 +1,58 @@ +id: citadela-directory-cbb621b3a6e8313b4fce0a47ef22d371 + +info: + name: > + Citadela Listing <= 5.18.1 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/676c8ed5-5a59-413f-af7a-49d6927cd9b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/citadela-directory/" + google-query: inurl:"/wp-content/plugins/citadela-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,citadela-directory,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/citadela-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citadela-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.18.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/citadela-directory-da4e2303d14d4ccfc14a24b1a1b01b04.yaml b/nuclei-templates/cve-less/plugins/citadela-directory-da4e2303d14d4ccfc14a24b1a1b01b04.yaml new file mode 100644 index 0000000000..fc0f6ea940 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/citadela-directory-da4e2303d14d4ccfc14a24b1a1b01b04.yaml @@ -0,0 +1,58 @@ +id: citadela-directory-da4e2303d14d4ccfc14a24b1a1b01b04 + +info: + name: > + Citadela Listing <= 5.18.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/911d083a-57d2-4574-a5b3-b299c368400c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/citadela-directory/" + google-query: inurl:"/wp-content/plugins/citadela-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,citadela-directory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/citadela-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citadela-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.18.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/citizen-space-d8f2805c892cce30b8ee704118111dfd.yaml b/nuclei-templates/cve-less/plugins/citizen-space-d8f2805c892cce30b8ee704118111dfd.yaml new file mode 100644 index 0000000000..eaeeba58a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/citizen-space-d8f2805c892cce30b8ee704118111dfd.yaml @@ -0,0 +1,58 @@ +id: citizen-space-d8f2805c892cce30b8ee704118111dfd + +info: + name: > + Citizen Space <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7c32efa-1872-4302-a947-dc0005080e55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/citizen-space/" + google-query: inurl:"/wp-content/plugins/citizen-space/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,citizen-space,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/citizen-space/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citizen-space" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cits-support-svg-webp-media-upload-4e81e30f96ac2459f5d1b33071468659.yaml b/nuclei-templates/cve-less/plugins/cits-support-svg-webp-media-upload-4e81e30f96ac2459f5d1b33071468659.yaml new file mode 100644 index 0000000000..15eebc4ba3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cits-support-svg-webp-media-upload-4e81e30f96ac2459f5d1b33071468659.yaml @@ -0,0 +1,58 @@ +id: cits-support-svg-webp-media-upload-4e81e30f96ac2459f5d1b33071468659 + +info: + name: > + CITS Support svg, webp Media and TTF,OTF File Upload <= 2.1.0 - Authenticated(Author+) Stored Cross-Site Scripting via SVG Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7d3edf5-245f-42f2-9add-e87de6839ed1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cits-support-svg-webp-media-upload/" + google-query: inurl:"/wp-content/plugins/cits-support-svg-webp-media-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cits-support-svg-webp-media-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cits-support-svg-webp-media-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cits-support-svg-webp-media-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/civicrm-7c25c077af82ab884cd08d532650e9f1.yaml b/nuclei-templates/cve-less/plugins/civicrm-7c25c077af82ab884cd08d532650e9f1.yaml new file mode 100644 index 0000000000..a44263d6bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/civicrm-7c25c077af82ab884cd08d532650e9f1.yaml @@ -0,0 +1,58 @@ +id: civicrm-7c25c077af82ab884cd08d532650e9f1 + +info: + name: > + CiviCRM < 5.28.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82fe99af-f254-4f4f-ac27-3e1997c370f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/civicrm/" + google-query: inurl:"/wp-content/plugins/civicrm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,civicrm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/civicrm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "civicrm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.28.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ckeditor-for-wordpress-e7b1c96e657c95612bee61206db60673.yaml b/nuclei-templates/cve-less/plugins/ckeditor-for-wordpress-e7b1c96e657c95612bee61206db60673.yaml new file mode 100644 index 0000000000..39a485e824 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ckeditor-for-wordpress-e7b1c96e657c95612bee61206db60673.yaml @@ -0,0 +1,58 @@ +id: ckeditor-for-wordpress-e7b1c96e657c95612bee61206db60673 + +info: + name: > + CKEditor for WordPress <= 4.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15f3ca33-50b8-4cd3-bcd1-5a73a3a06fc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ckeditor-for-wordpress/" + google-query: inurl:"/wp-content/plugins/ckeditor-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ckeditor-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ckeditor-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ckeditor-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/claptastic-clap-button-f34bb308bdc8bf0abc4007f19af318c1.yaml b/nuclei-templates/cve-less/plugins/claptastic-clap-button-f34bb308bdc8bf0abc4007f19af318c1.yaml new file mode 100644 index 0000000000..f6520d1c8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/claptastic-clap-button-f34bb308bdc8bf0abc4007f19af318c1.yaml @@ -0,0 +1,58 @@ +id: claptastic-clap-button-f34bb308bdc8bf0abc4007f19af318c1 + +info: + name: > + Claptastic Clap! Button <= 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc267d5-ecea-4732-b716-dfaf63167b81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/claptastic-clap-button/" + google-query: inurl:"/wp-content/plugins/claptastic-clap-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,claptastic-clap-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/claptastic-clap-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "claptastic-clap-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classic-editor-addon-cbd9c033d999d7b582bab8aeab6cd501.yaml b/nuclei-templates/cve-less/plugins/classic-editor-addon-cbd9c033d999d7b582bab8aeab6cd501.yaml new file mode 100644 index 0000000000..589102e8a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classic-editor-addon-cbd9c033d999d7b582bab8aeab6cd501.yaml @@ -0,0 +1,58 @@ +id: classic-editor-addon-cbd9c033d999d7b582bab8aeab6cd501 + +info: + name: > + Classic Editor Addon < 2.6.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e647d1ff-2d2c-43e4-b723-28ed410c4b3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classic-editor-addon/" + google-query: inurl:"/wp-content/plugins/classic-editor-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classic-editor-addon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classic-editor-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classic-editor-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classic-editor-and-classic-widgets-0d765d8e5ca0f1a3232d36cbff05684c.yaml b/nuclei-templates/cve-less/plugins/classic-editor-and-classic-widgets-0d765d8e5ca0f1a3232d36cbff05684c.yaml new file mode 100644 index 0000000000..8ef2aa08d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classic-editor-and-classic-widgets-0d765d8e5ca0f1a3232d36cbff05684c.yaml @@ -0,0 +1,58 @@ +id: classic-editor-and-classic-widgets-0d765d8e5ca0f1a3232d36cbff05684c + +info: + name: > + Classic Editor and Classic Widgets <= 1.2.5 - Cross-Site Request Forgery via render_settings_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce2bef2f-fe28-48ea-8b83-052eebd31622?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classic-editor-and-classic-widgets/" + google-query: inurl:"/wp-content/plugins/classic-editor-and-classic-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classic-editor-and-classic-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classic-editor-and-classic-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classic-editor-and-classic-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-core-94f85d394521a13053659cf48cf14634.yaml b/nuclei-templates/cve-less/plugins/classified-core-94f85d394521a13053659cf48cf14634.yaml new file mode 100644 index 0000000000..e5e7771ee4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-core-94f85d394521a13053659cf48cf14634.yaml @@ -0,0 +1,58 @@ +id: classified-core-94f85d394521a13053659cf48cf14634 + +info: + name: > + Classima < 2.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cfee2e2-3486-4be8-954f-6d7f9b6d54ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-core/" + google-query: inurl:"/wp-content/plugins/classified-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-listing-095d7ac917f72e37e9bb35fbb61b06e5.yaml b/nuclei-templates/cve-less/plugins/classified-listing-095d7ac917f72e37e9bb35fbb61b06e5.yaml new file mode 100644 index 0000000000..74dabbd813 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-listing-095d7ac917f72e37e9bb35fbb61b06e5.yaml @@ -0,0 +1,58 @@ +id: classified-listing-095d7ac917f72e37e9bb35fbb61b06e5 + +info: + name: > + Classified Listing – Classified ads & Business Directory Plugin <= 3.0.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5da4cdd-15c7-41a6-be2f-e31bd407ae05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-listing/" + google-query: inurl:"/wp-content/plugins/classified-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-listing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-listing-4133059c81c533e7538f4a29d7f3ad01.yaml b/nuclei-templates/cve-less/plugins/classified-listing-4133059c81c533e7538f4a29d7f3ad01.yaml new file mode 100644 index 0000000000..9467a7d8d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-listing-4133059c81c533e7538f4a29d7f3ad01.yaml @@ -0,0 +1,58 @@ +id: classified-listing-4133059c81c533e7538f4a29d7f3ad01 + +info: + name: > + Classified Listing <= 2.4.5 - Cross-Site Request Forgery via rtcl_ajax_thumbnail_delete + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2352dce7-5302-4892-9ae2-bf814f029af4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-listing/" + google-query: inurl:"/wp-content/plugins/classified-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-listing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-listing-94f85d394521a13053659cf48cf14634.yaml b/nuclei-templates/cve-less/plugins/classified-listing-94f85d394521a13053659cf48cf14634.yaml new file mode 100644 index 0000000000..b05a66e7b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-listing-94f85d394521a13053659cf48cf14634.yaml @@ -0,0 +1,58 @@ +id: classified-listing-94f85d394521a13053659cf48cf14634 + +info: + name: > + Classima < 2.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cfee2e2-3486-4be8-954f-6d7f9b6d54ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-listing/" + google-query: inurl:"/wp-content/plugins/classified-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-listing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-listing-e39757704ab66d7ab58f6ee33ac96e65.yaml b/nuclei-templates/cve-less/plugins/classified-listing-e39757704ab66d7ab58f6ee33ac96e65.yaml new file mode 100644 index 0000000000..edc27f6161 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-listing-e39757704ab66d7ab58f6ee33ac96e65.yaml @@ -0,0 +1,58 @@ +id: classified-listing-e39757704ab66d7ab58f6ee33ac96e65 + +info: + name: > + Classified Listing <= 3.0.4 - Cross-Site Request Forgery to Account Takeover via rtcl_update_user_account + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5439651e-5557-4b13-813a-4fc0ad876104?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-listing/" + google-query: inurl:"/wp-content/plugins/classified-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-listing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-listing-f4bbfecaa3b9697ac9c466359f202f2b.yaml b/nuclei-templates/cve-less/plugins/classified-listing-f4bbfecaa3b9697ac9c466359f202f2b.yaml new file mode 100644 index 0000000000..3c0a3f8266 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-listing-f4bbfecaa3b9697ac9c466359f202f2b.yaml @@ -0,0 +1,58 @@ +id: classified-listing-f4bbfecaa3b9697ac9c466359f202f2b + +info: + name: > + Classified Listing – Classified ads & Business Directory Plugin <= 3.0.10.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Attachment Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7113b1c-78dc-4648-b14a-52ff6668fd1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-listing/" + google-query: inurl:"/wp-content/plugins/classified-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-listing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-listing-pro-3bf83b01db180da0cd7fc6578f1451d0.yaml b/nuclei-templates/cve-less/plugins/classified-listing-pro-3bf83b01db180da0cd7fc6578f1451d0.yaml new file mode 100644 index 0000000000..f4f1882548 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-listing-pro-3bf83b01db180da0cd7fc6578f1451d0.yaml @@ -0,0 +1,58 @@ +id: classified-listing-pro-3bf83b01db180da0cd7fc6578f1451d0 + +info: + name: > + Classified Listing Pro < 2.0.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc491c2b-0ae2-4002-a745-435a183d8e01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-listing-pro/" + google-query: inurl:"/wp-content/plugins/classified-listing-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-listing-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-listing-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-listing-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-listing-pro-94f85d394521a13053659cf48cf14634.yaml b/nuclei-templates/cve-less/plugins/classified-listing-pro-94f85d394521a13053659cf48cf14634.yaml new file mode 100644 index 0000000000..f28714c697 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-listing-pro-94f85d394521a13053659cf48cf14634.yaml @@ -0,0 +1,58 @@ +id: classified-listing-pro-94f85d394521a13053659cf48cf14634 + +info: + name: > + Classima < 2.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cfee2e2-3486-4be8-954f-6d7f9b6d54ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-listing-pro/" + google-query: inurl:"/wp-content/plugins/classified-listing-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-listing-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-listing-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-listing-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classified-listing-store-94f85d394521a13053659cf48cf14634.yaml b/nuclei-templates/cve-less/plugins/classified-listing-store-94f85d394521a13053659cf48cf14634.yaml new file mode 100644 index 0000000000..227a4c289e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classified-listing-store-94f85d394521a13053659cf48cf14634.yaml @@ -0,0 +1,58 @@ +id: classified-listing-store-94f85d394521a13053659cf48cf14634 + +info: + name: > + Classima < 2.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cfee2e2-3486-4be8-954f-6d7f9b6d54ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classified-listing-store/" + google-query: inurl:"/wp-content/plugins/classified-listing-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classified-listing-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classified-listing-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classified-listing-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/classyfrieds-f47e6eae64c804173012f23d96ac47f1.yaml b/nuclei-templates/cve-less/plugins/classyfrieds-f47e6eae64c804173012f23d96ac47f1.yaml new file mode 100644 index 0000000000..3abc2aa9ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/classyfrieds-f47e6eae64c804173012f23d96ac47f1.yaml @@ -0,0 +1,58 @@ +id: classyfrieds-f47e6eae64c804173012f23d96ac47f1 + +info: + name: > + classyfrieds <= 3.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8185c7a4-3d8e-4a24-9746-536337afbcfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/classyfrieds/" + google-query: inurl:"/wp-content/plugins/classyfrieds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,classyfrieds,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/classyfrieds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classyfrieds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clean-and-simple-contact-form-by-meg-nicholas-9b88069f10fdb904873358d79983304f.yaml b/nuclei-templates/cve-less/plugins/clean-and-simple-contact-form-by-meg-nicholas-9b88069f10fdb904873358d79983304f.yaml new file mode 100644 index 0000000000..56de37e67f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clean-and-simple-contact-form-by-meg-nicholas-9b88069f10fdb904873358d79983304f.yaml @@ -0,0 +1,58 @@ +id: clean-and-simple-contact-form-by-meg-nicholas-9b88069f10fdb904873358d79983304f + +info: + name: > + Contact Form Clean and Simple <= 4.7.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/602c8145-dcf7-4844-8e54-bc50efa307f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clean-and-simple-contact-form-by-meg-nicholas/" + google-query: inurl:"/wp-content/plugins/clean-and-simple-contact-form-by-meg-nicholas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clean-and-simple-contact-form-by-meg-nicholas,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clean-and-simple-contact-form-by-meg-nicholas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clean-and-simple-contact-form-by-meg-nicholas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clean-and-simple-contact-form-by-meg-nicholas-f5690c4ae22224ef33491e3a8f293f4d.yaml b/nuclei-templates/cve-less/plugins/clean-and-simple-contact-form-by-meg-nicholas-f5690c4ae22224ef33491e3a8f293f4d.yaml new file mode 100644 index 0000000000..811a11f3b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clean-and-simple-contact-form-by-meg-nicholas-f5690c4ae22224ef33491e3a8f293f4d.yaml @@ -0,0 +1,58 @@ +id: clean-and-simple-contact-form-by-meg-nicholas-f5690c4ae22224ef33491e3a8f293f4d + +info: + name: > + Contact Form Clean and Simple < 4.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72e7dbe0-0e48-4511-9e35-77af7d3d13e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clean-and-simple-contact-form-by-meg-nicholas/" + google-query: inurl:"/wp-content/plugins/clean-and-simple-contact-form-by-meg-nicholas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clean-and-simple-contact-form-by-meg-nicholas,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clean-and-simple-contact-form-by-meg-nicholas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clean-and-simple-contact-form-by-meg-nicholas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clean-contact-800e55dd995f58ca489269cf15bde8aa.yaml b/nuclei-templates/cve-less/plugins/clean-contact-800e55dd995f58ca489269cf15bde8aa.yaml new file mode 100644 index 0000000000..802a489453 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clean-contact-800e55dd995f58ca489269cf15bde8aa.yaml @@ -0,0 +1,58 @@ +id: clean-contact-800e55dd995f58ca489269cf15bde8aa + +info: + name: > + Clean-Contact <= 1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e96b3d21-edeb-4dec-b13c-3688d3996cb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clean-contact/" + google-query: inurl:"/wp-content/plugins/clean-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clean-contact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clean-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clean-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clean-login-1603de092dffce494eb91c592d08f004.yaml b/nuclei-templates/cve-less/plugins/clean-login-1603de092dffce494eb91c592d08f004.yaml new file mode 100644 index 0000000000..fa2becca68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clean-login-1603de092dffce494eb91c592d08f004.yaml @@ -0,0 +1,58 @@ +id: clean-login-1603de092dffce494eb91c592d08f004 + +info: + name: > + Clean Login <= 1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3436916c-a7ab-4960-8afe-145b3799392e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clean-login/" + google-query: inurl:"/wp-content/plugins/clean-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clean-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clean-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clean-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clean-login-5ac185ae82fe98b391f7b0249d150337.yaml b/nuclei-templates/cve-less/plugins/clean-login-5ac185ae82fe98b391f7b0249d150337.yaml new file mode 100644 index 0000000000..26aaa9ea04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clean-login-5ac185ae82fe98b391f7b0249d150337.yaml @@ -0,0 +1,58 @@ +id: clean-login-5ac185ae82fe98b391f7b0249d150337 + +info: + name: > + Clean Login 1.12.6.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a91e973-f669-49a6-8c74-f6fbc4dc8db9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clean-login/" + google-query: inurl:"/wp-content/plugins/clean-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clean-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clean-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clean-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.12.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clean-login-ac790c964325ea0370bae2df48218a78.yaml b/nuclei-templates/cve-less/plugins/clean-login-ac790c964325ea0370bae2df48218a78.yaml new file mode 100644 index 0000000000..de61252c79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clean-login-ac790c964325ea0370bae2df48218a78.yaml @@ -0,0 +1,58 @@ +id: clean-login-ac790c964325ea0370bae2df48218a78 + +info: + name: > + Clean Login <= 1.13.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/490944a6-96e8-4416-a63b-c7a7ba9172ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clean-login/" + google-query: inurl:"/wp-content/plugins/clean-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clean-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clean-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clean-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clean-login-b85e6f076cf78bc83dad21e66d70a2d9.yaml b/nuclei-templates/cve-less/plugins/clean-login-b85e6f076cf78bc83dad21e66d70a2d9.yaml new file mode 100644 index 0000000000..d6f9ff9ad9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clean-login-b85e6f076cf78bc83dad21e66d70a2d9.yaml @@ -0,0 +1,58 @@ +id: clean-login-b85e6f076cf78bc83dad21e66d70a2d9 + +info: + name: > + Clean Login <= 1.10.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f630773-f65a-44a5-9b84-ea542c78a69a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clean-login/" + google-query: inurl:"/wp-content/plugins/clean-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clean-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clean-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clean-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clean-social-icons-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/clean-social-icons-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8951adcdc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clean-social-icons-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: clean-social-icons-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clean-social-icons/" + google-query: inurl:"/wp-content/plugins/clean-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clean-social-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clean-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clean-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-212daaad6857839ca091cc2dcc90e7c8.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-212daaad6857839ca091cc2dcc90e7c8.yaml new file mode 100644 index 0000000000..01c214dff7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-212daaad6857839ca091cc2dcc90e7c8.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-212daaad6857839ca091cc2dcc90e7c8 + +info: + name: > + Spam protection, AntiSpam, FireWall by CleanTalk <= 5.153.3 - Unauthenticated Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fe50510-6736-4bcf-b62f-0b8d2cb8ff3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.153.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-4459115a144ee37cdfb4079325938d4b.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-4459115a144ee37cdfb4079325938d4b.yaml new file mode 100644 index 0000000000..4816bab8be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-4459115a144ee37cdfb4079325938d4b.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-4459115a144ee37cdfb4079325938d4b + +info: + name: > + Anti-Spam by CleanTalk < 5.149 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67631693-ae8a-4532-a9e3-f21b385131a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.149') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-6ffa9b277924d8aa648b0bee9bf4b06d.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-6ffa9b277924d8aa648b0bee9bf4b06d.yaml new file mode 100644 index 0000000000..1e6377d871 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-6ffa9b277924d8aa648b0bee9bf4b06d.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-6ffa9b277924d8aa648b0bee9bf4b06d + +info: + name: > + Spam protection, AntiSpam, FireWall by CleanTalk <= 6.20 - Cross-Site Request Forgery via apbct_settings__update_account_email + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19dd6670-2813-4944-abcd-c26fb9b82092?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-a8def04824c95aa61e5602395bc3c9b4.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-a8def04824c95aa61e5602395bc3c9b4.yaml new file mode 100644 index 0000000000..e298d2d0fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-a8def04824c95aa61e5602395bc3c9b4.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-a8def04824c95aa61e5602395bc3c9b4 + +info: + name: > + Spam protection, AntiSpam, FireWall by CleanTalk <= 6.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89dab433-91e9-4500-ab40-f4b500e66983?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-ab9f6d0139ba1f196a65f817d6af329b.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-ab9f6d0139ba1f196a65f817d6af329b.yaml new file mode 100644 index 0000000000..a983a7c735 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-ab9f6d0139ba1f196a65f817d6af329b.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-ab9f6d0139ba1f196a65f817d6af329b + +info: + name: > + Spam protection, AntiSpam, FireWall by CleanTalk < 5.22 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d60ea41-c103-4b56-a920-d4b82698d630?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-bf15f8f75324665dbab0a976954762a4.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-bf15f8f75324665dbab0a976954762a4.yaml new file mode 100644 index 0000000000..9862fc1e4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-bf15f8f75324665dbab0a976954762a4.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-bf15f8f75324665dbab0a976954762a4 + +info: + name: > + AntiSpam by CleanTalk <= 5.185 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21e06220-c8f0-4754-ba19-8df519be4038?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.185') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-cde99dbef0431b3a59324e5afac3b480.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-cde99dbef0431b3a59324e5afac3b480.yaml new file mode 100644 index 0000000000..6e4ed0588a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-cde99dbef0431b3a59324e5afac3b480.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-cde99dbef0431b3a59324e5afac3b480 + +info: + name: > + Spam protection, AntiSpam, FireWall by CleanTalk <= 5.173 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebb33fdc-fd89-4d4f-9107-287a64abc150?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.173') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-d289b479a5c784ed3d240622792b7f9a.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-d289b479a5c784ed3d240622792b7f9a.yaml new file mode 100644 index 0000000000..47dc0ec550 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-d289b479a5c784ed3d240622792b7f9a.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-d289b479a5c784ed3d240622792b7f9a + +info: + name: > + Spam protection, AntiSpam, FireWall by CleanTalk <= 5.127.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3855918-960e-487d-9d5f-6dbeba45523e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.127.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-de9d4da93fc4bb5251225efa35d16a3e.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-de9d4da93fc4bb5251225efa35d16a3e.yaml new file mode 100644 index 0000000000..7d9bcf9abc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-de9d4da93fc4bb5251225efa35d16a3e.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-de9d4da93fc4bb5251225efa35d16a3e + +info: + name: > + Spam protection, AntiSpam, FireWall by CleanTalk <= 5.173 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0df6f15f-308f-4397-9a67-6a6dab992568?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.173') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-efa9a2b8677e473b07061cec22c03e03.yaml b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-efa9a2b8677e473b07061cec22c03e03.yaml new file mode 100644 index 0000000000..4d1869561e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleantalk-spam-protect-efa9a2b8677e473b07061cec22c03e03.yaml @@ -0,0 +1,58 @@ +id: cleantalk-spam-protect-efa9a2b8677e473b07061cec22c03e03 + +info: + name: > + Spam protection, AntiSpam, FireWall by CleanTalk <= 6.20 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eb4400d-d629-4c88-9ec5-06da9089f6d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleantalk-spam-protect/" + google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleantalk-spam-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleantalk-spam-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clearfy-0f9dc26252e942e8e9d25b0caef515cf.yaml b/nuclei-templates/cve-less/plugins/clearfy-0f9dc26252e942e8e9d25b0caef515cf.yaml new file mode 100644 index 0000000000..7f2103af29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clearfy-0f9dc26252e942e8e9d25b0caef515cf.yaml @@ -0,0 +1,58 @@ +id: clearfy-0f9dc26252e942e8e9d25b0caef515cf + +info: + name: > + Clearfy Cache <= 2.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42f537db-cb30-4ac6-9cc5-835901a722be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clearfy/" + google-query: inurl:"/wp-content/plugins/clearfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clearfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clearfy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clearfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clearpay-gateway-for-woocommerce-b4be168069ffc18f5624f70fb3431825.yaml b/nuclei-templates/cve-less/plugins/clearpay-gateway-for-woocommerce-b4be168069ffc18f5624f70fb3431825.yaml new file mode 100644 index 0000000000..29c3277c94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clearpay-gateway-for-woocommerce-b4be168069ffc18f5624f70fb3431825.yaml @@ -0,0 +1,58 @@ +id: clearpay-gateway-for-woocommerce-b4be168069ffc18f5624f70fb3431825 + +info: + name: > + Clearpay Gateway for WooCommerce <= 3.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f29a843d-a8c5-4477-b7cc-620b19b5f585?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clearpay-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/clearpay-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clearpay-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clearpay-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clearpay-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clerkio-c0684cce94d057969c2bd8df09557f34.yaml b/nuclei-templates/cve-less/plugins/clerkio-c0684cce94d057969c2bd8df09557f34.yaml new file mode 100644 index 0000000000..5068423a22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clerkio-c0684cce94d057969c2bd8df09557f34.yaml @@ -0,0 +1,58 @@ +id: clerkio-c0684cce94d057969c2bd8df09557f34 + +info: + name: > + Clerk <= 3.8.2 - Authorization Bypass via Insufficient Validation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c929a742-6481-40a0-94b5-76ddb8494896?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clerkio/" + google-query: inurl:"/wp-content/plugins/clerkio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clerkio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clerkio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clerkio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cleverwise-daily-quotes-38c76ee17f970b2f9f7455a9aafdaf8f.yaml b/nuclei-templates/cve-less/plugins/cleverwise-daily-quotes-38c76ee17f970b2f9f7455a9aafdaf8f.yaml new file mode 100644 index 0000000000..b6146370b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cleverwise-daily-quotes-38c76ee17f970b2f9f7455a9aafdaf8f.yaml @@ -0,0 +1,58 @@ +id: cleverwise-daily-quotes-38c76ee17f970b2f9f7455a9aafdaf8f + +info: + name: > + Cleverwise Daily Quotes <= 3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71f7733a-1350-4e22-98d8-28be401aee69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cleverwise-daily-quotes/" + google-query: inurl:"/wp-content/plugins/cleverwise-daily-quotes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cleverwise-daily-quotes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cleverwise-daily-quotes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cleverwise-daily-quotes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-datos-lopd-72faeb48932ddf0ca0fa007188dbfbf8.yaml b/nuclei-templates/cve-less/plugins/click-datos-lopd-72faeb48932ddf0ca0fa007188dbfbf8.yaml new file mode 100644 index 0000000000..7820d5482a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-datos-lopd-72faeb48932ddf0ca0fa007188dbfbf8.yaml @@ -0,0 +1,58 @@ +id: click-datos-lopd-72faeb48932ddf0ca0fa007188dbfbf8 + +info: + name: > + Protección de Datos RGPD <= 3.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eaebcae4-cdf5-4eb7-9246-07185fe62d07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-datos-lopd/" + google-query: inurl:"/wp-content/plugins/click-datos-lopd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-datos-lopd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-datos-lopd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-datos-lopd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-call-or-chat-buttons-7abc665e21c65fbf0435b861d32be85d.yaml b/nuclei-templates/cve-less/plugins/click-to-call-or-chat-buttons-7abc665e21c65fbf0435b861d32be85d.yaml new file mode 100644 index 0000000000..903e605c17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-call-or-chat-buttons-7abc665e21c65fbf0435b861d32be85d.yaml @@ -0,0 +1,58 @@ +id: click-to-call-or-chat-buttons-7abc665e21c65fbf0435b861d32be85d + +info: + name: > + Click to Call or Chat Buttons <= 1.4.0 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92880588-a733-43df-adf6-74fe6291822d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-call-or-chat-buttons/" + google-query: inurl:"/wp-content/plugins/click-to-call-or-chat-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-call-or-chat-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-call-or-chat-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-call-or-chat-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-chat-for-whatsapp-902cce6bbff4fff8307b6fb241b9a8f3.yaml b/nuclei-templates/cve-less/plugins/click-to-chat-for-whatsapp-902cce6bbff4fff8307b6fb241b9a8f3.yaml new file mode 100644 index 0000000000..786836d0ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-chat-for-whatsapp-902cce6bbff4fff8307b6fb241b9a8f3.yaml @@ -0,0 +1,58 @@ +id: click-to-chat-for-whatsapp-902cce6bbff4fff8307b6fb241b9a8f3 + +info: + name: > + Click to Chat – HoliThemes <= 3.35 - Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe25bfef-34f0-4d57-9cba-9dcbf58281c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-chat-for-whatsapp/" + google-query: inurl:"/wp-content/plugins/click-to-chat-for-whatsapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-chat-for-whatsapp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-chat-for-whatsapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-chat-for-whatsapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-chat-for-whatsapp-a875d85b1acd34789210b1b8be6e7c70.yaml b/nuclei-templates/cve-less/plugins/click-to-chat-for-whatsapp-a875d85b1acd34789210b1b8be6e7c70.yaml new file mode 100644 index 0000000000..d04e54d660 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-chat-for-whatsapp-a875d85b1acd34789210b1b8be6e7c70.yaml @@ -0,0 +1,58 @@ +id: click-to-chat-for-whatsapp-a875d85b1acd34789210b1b8be6e7c70 + +info: + name: > + Click to Chat <= 3.18 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19b7cadd-b1b9-4f1d-ab30-78e0b46ad21a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-chat-for-whatsapp/" + google-query: inurl:"/wp-content/plugins/click-to-chat-for-whatsapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-chat-for-whatsapp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-chat-for-whatsapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-chat-for-whatsapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-top-07e8e438f9983a0ea397db3cccfb2a0b.yaml b/nuclei-templates/cve-less/plugins/click-to-top-07e8e438f9983a0ea397db3cccfb2a0b.yaml new file mode 100644 index 0000000000..88738aa98b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-top-07e8e438f9983a0ea397db3cccfb2a0b.yaml @@ -0,0 +1,58 @@ +id: click-to-top-07e8e438f9983a0ea397db3cccfb2a0b + +info: + name: > + Click to top <= 1.2.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da15614b-6619-4ccb-93eb-12923910fb41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-top/" + google-query: inurl:"/wp-content/plugins/click-to-top/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-top,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-top/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-top" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-top-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/click-to-top-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..94622ebe08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-top-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: click-to-top-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-top/" + google-query: inurl:"/wp-content/plugins/click-to-top/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-top,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-top/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-top" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-top-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/click-to-top-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..a2b15e8a05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-top-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: click-to-top-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-top/" + google-query: inurl:"/wp-content/plugins/click-to-top/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-top,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-top/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-top" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-tweet-83ab7ae2d1f6873a9d18c0bfa8619354.yaml b/nuclei-templates/cve-less/plugins/click-to-tweet-83ab7ae2d1f6873a9d18c0bfa8619354.yaml new file mode 100644 index 0000000000..f688ca9826 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-tweet-83ab7ae2d1f6873a9d18c0bfa8619354.yaml @@ -0,0 +1,58 @@ +id: click-to-tweet-83ab7ae2d1f6873a9d18c0bfa8619354 + +info: + name: > + Click To Tweet <= 2.0.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5031140-9a48-43da-b946-00ce9c70258b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-tweet/" + google-query: inurl:"/wp-content/plugins/click-to-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-tweet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-tweet-935ebeacc0c73d89223e844fd2aaeaeb.yaml b/nuclei-templates/cve-less/plugins/click-to-tweet-935ebeacc0c73d89223e844fd2aaeaeb.yaml new file mode 100644 index 0000000000..6266a8774d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-tweet-935ebeacc0c73d89223e844fd2aaeaeb.yaml @@ -0,0 +1,58 @@ +id: click-to-tweet-935ebeacc0c73d89223e844fd2aaeaeb + +info: + name: > + Click To Tweet <= 2.0.14 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7eee591c-2676-479c-ab15-96da10f51ae0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-tweet/" + google-query: inurl:"/wp-content/plugins/click-to-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-tweet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/click-to-tweet-b512f326cf614df599ebd00014aea201.yaml b/nuclei-templates/cve-less/plugins/click-to-tweet-b512f326cf614df599ebd00014aea201.yaml new file mode 100644 index 0000000000..79cb02d7c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/click-to-tweet-b512f326cf614df599ebd00014aea201.yaml @@ -0,0 +1,58 @@ +id: click-to-tweet-b512f326cf614df599ebd00014aea201 + +info: + name: > + Click To Tweet <= 2.0.14 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f765327-3872-46cc-a4f9-40219bf0dd99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/click-to-tweet/" + google-query: inurl:"/wp-content/plugins/click-to-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,click-to-tweet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/click-to-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "click-to-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickbank-ads-clickbank-widget-55592f88afc85caec6c62b369547bd3e.yaml b/nuclei-templates/cve-less/plugins/clickbank-ads-clickbank-widget-55592f88afc85caec6c62b369547bd3e.yaml new file mode 100644 index 0000000000..55a3f3269c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickbank-ads-clickbank-widget-55592f88afc85caec6c62b369547bd3e.yaml @@ -0,0 +1,58 @@ +id: clickbank-ads-clickbank-widget-55592f88afc85caec6c62b369547bd3e + +info: + name: > + ClickBank Affiliate Ads <= 1.20 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3eff7a6f-7098-4298-b399-91974b16fda2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickbank-ads-clickbank-widget/" + google-query: inurl:"/wp-content/plugins/clickbank-ads-clickbank-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickbank-ads-clickbank-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickbank-ads-clickbank-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickbank-ads-clickbank-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickbank-ads-clickbank-widget-b1bcff9d2efb787a948b3f8018f345ae.yaml b/nuclei-templates/cve-less/plugins/clickbank-ads-clickbank-widget-b1bcff9d2efb787a948b3f8018f345ae.yaml new file mode 100644 index 0000000000..80a49dd158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickbank-ads-clickbank-widget-b1bcff9d2efb787a948b3f8018f345ae.yaml @@ -0,0 +1,58 @@ +id: clickbank-ads-clickbank-widget-b1bcff9d2efb787a948b3f8018f345ae + +info: + name: > + ClickBank Affiliate Ads < 1.31 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e579b7fd-141f-4d5f-9e0e-a1e6b985f0b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickbank-ads-clickbank-widget/" + google-query: inurl:"/wp-content/plugins/clickbank-ads-clickbank-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickbank-ads-clickbank-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickbank-ads-clickbank-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickbank-ads-clickbank-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickcease-click-fraud-protection-002091a126b1a7dfb25af78b55c0c684.yaml b/nuclei-templates/cve-less/plugins/clickcease-click-fraud-protection-002091a126b1a7dfb25af78b55c0c684.yaml new file mode 100644 index 0000000000..c94ef1c311 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickcease-click-fraud-protection-002091a126b1a7dfb25af78b55c0c684.yaml @@ -0,0 +1,58 @@ +id: clickcease-click-fraud-protection-002091a126b1a7dfb25af78b55c0c684 + +info: + name: > + ClickCease Click Fraud Protection <= 3.2.4 - Improper Authorization to sensitive information exposure via get_settings + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d572cac-b8e3-4c52-9b35-80fe5ee9e900?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickcease-click-fraud-protection/" + google-query: inurl:"/wp-content/plugins/clickcease-click-fraud-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickcease-click-fraud-protection,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickcease-click-fraud-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickcease-click-fraud-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickcease-click-fraud-protection-006e48b094cc72cebf7417cf47b157bd.yaml b/nuclei-templates/cve-less/plugins/clickcease-click-fraud-protection-006e48b094cc72cebf7417cf47b157bd.yaml new file mode 100644 index 0000000000..ec257d05aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickcease-click-fraud-protection-006e48b094cc72cebf7417cf47b157bd.yaml @@ -0,0 +1,58 @@ +id: clickcease-click-fraud-protection-006e48b094cc72cebf7417cf47b157bd + +info: + name: > + ClickCease Click Fraud Protection <= 3.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e03f95ae-c1ba-4679-888b-055293e1351f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickcease-click-fraud-protection/" + google-query: inurl:"/wp-content/plugins/clickcease-click-fraud-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickcease-click-fraud-protection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickcease-click-fraud-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickcease-click-fraud-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickdesk-live-support-chat-plugin-41d06e1c542cc99b348ba7db58f2c892.yaml b/nuclei-templates/cve-less/plugins/clickdesk-live-support-chat-plugin-41d06e1c542cc99b348ba7db58f2c892.yaml new file mode 100644 index 0000000000..cf22f3ab9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickdesk-live-support-chat-plugin-41d06e1c542cc99b348ba7db58f2c892.yaml @@ -0,0 +1,58 @@ +id: clickdesk-live-support-chat-plugin-41d06e1c542cc99b348ba7db58f2c892 + +info: + name: > + Live Chat from ClickDesk – Live Chat – Help Desk Plugin for Websites <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbcf65b9-0114-46e6-a51f-61d606c68e5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickdesk-live-support-chat-plugin/" + google-query: inurl:"/wp-content/plugins/clickdesk-live-support-chat-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickdesk-live-support-chat-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickdesk-live-support-chat-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickdesk-live-support-chat-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickdesk-live-support-chat-plugin-45e600351b047339fd78ec95bb2976bd.yaml b/nuclei-templates/cve-less/plugins/clickdesk-live-support-chat-plugin-45e600351b047339fd78ec95bb2976bd.yaml new file mode 100644 index 0000000000..e2d123add3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickdesk-live-support-chat-plugin-45e600351b047339fd78ec95bb2976bd.yaml @@ -0,0 +1,58 @@ +id: clickdesk-live-support-chat-plugin-45e600351b047339fd78ec95bb2976bd + +info: + name: > + Live Chat from ClickDesk – Live Chat – Help Desk Plugin for Websites <= 4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/860ce27b-749d-497f-9038-7e035cb3fe1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickdesk-live-support-chat-plugin/" + google-query: inurl:"/wp-content/plugins/clickdesk-live-support-chat-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickdesk-live-support-chat-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickdesk-live-support-chat-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickdesk-live-support-chat-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickervolt-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/clickervolt-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ae0d89c3e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickervolt-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: clickervolt-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickervolt/" + google-query: inurl:"/wp-content/plugins/clickervolt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickervolt,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickervolt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickervolt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickfunnels-6402d67cbcfcbc43cbb160f004d8a96c.yaml b/nuclei-templates/cve-less/plugins/clickfunnels-6402d67cbcfcbc43cbb160f004d8a96c.yaml new file mode 100644 index 0000000000..8a4e0c2ed1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickfunnels-6402d67cbcfcbc43cbb160f004d8a96c.yaml @@ -0,0 +1,58 @@ +id: clickfunnels-6402d67cbcfcbc43cbb160f004d8a96c + +info: + name: > + ClickFunnels <= 3.1.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65581fa6-110f-4ae3-a903-dbf649b44417?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickfunnels/" + google-query: inurl:"/wp-content/plugins/clickfunnels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickfunnels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickfunnels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickfunnels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clickfunnels-b375402f4d94456be8a455efbe0b59a8.yaml b/nuclei-templates/cve-less/plugins/clickfunnels-b375402f4d94456be8a455efbe0b59a8.yaml new file mode 100644 index 0000000000..09fdd41bbc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clickfunnels-b375402f4d94456be8a455efbe0b59a8.yaml @@ -0,0 +1,58 @@ +id: clickfunnels-b375402f4d94456be8a455efbe0b59a8 + +info: + name: > + ClickFunnels <= 3.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3daa3a7d-bb92-41c7-92ad-71f6ff0bb50a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clickfunnels/" + google-query: inurl:"/wp-content/plugins/clickfunnels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clickfunnels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clickfunnels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clickfunnels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clicksold-wordpress-plugin-52312cb9d61651d5626cb5f7632011c0.yaml b/nuclei-templates/cve-less/plugins/clicksold-wordpress-plugin-52312cb9d61651d5626cb5f7632011c0.yaml new file mode 100644 index 0000000000..6c932d09bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clicksold-wordpress-plugin-52312cb9d61651d5626cb5f7632011c0.yaml @@ -0,0 +1,58 @@ +id: clicksold-wordpress-plugin-52312cb9d61651d5626cb5f7632011c0 + +info: + name: > + ClickSold IDX < 1.49 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/676cb664-dd9d-4b6e-80d6-c2afb2298541?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clicksold-wordpress-plugin/" + google-query: inurl:"/wp-content/plugins/clicksold-wordpress-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clicksold-wordpress-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clicksold-wordpress-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clicksold-wordpress-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clicky-8edea37489d7d07897482f68884c7200.yaml b/nuclei-templates/cve-less/plugins/clicky-8edea37489d7d07897482f68884c7200.yaml new file mode 100644 index 0000000000..367e9087b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clicky-8edea37489d7d07897482f68884c7200.yaml @@ -0,0 +1,58 @@ +id: clicky-8edea37489d7d07897482f68884c7200 + +info: + name: > + Clicky by Yoast <= 1.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42d56d6a-365a-4fa2-977f-a1328e0ec1b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clicky/" + google-query: inurl:"/wp-content/plugins/clicky/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clicky,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clicky/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clicky" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clictracker-da7f33487455bd9ca64c5f5b0b3257c0.yaml b/nuclei-templates/cve-less/plugins/clictracker-da7f33487455bd9ca64c5f5b0b3257c0.yaml new file mode 100644 index 0000000000..c1adf24183 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clictracker-da7f33487455bd9ca64c5f5b0b3257c0.yaml @@ -0,0 +1,58 @@ +id: clictracker-da7f33487455bd9ca64c5f5b0b3257c0 + +info: + name: > + WP Clictracker <= 1.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f27853e0-1785-4670-a7b2-f72c19f4a6ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clictracker/" + google-query: inurl:"/wp-content/plugins/clictracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clictracker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clictracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clictracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/client-dash-0f5e9e59b2ad6fbf734b7cc14c76890d.yaml b/nuclei-templates/cve-less/plugins/client-dash-0f5e9e59b2ad6fbf734b7cc14c76890d.yaml new file mode 100644 index 0000000000..2c7210a4ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/client-dash-0f5e9e59b2ad6fbf734b7cc14c76890d.yaml @@ -0,0 +1,58 @@ +id: client-dash-0f5e9e59b2ad6fbf734b7cc14c76890d + +info: + name: > + Client Dash <= 2.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f8839cf-9e48-4981-8a0d-bb0c06cdf441?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/client-dash/" + google-query: inurl:"/wp-content/plugins/client-dash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,client-dash,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/client-dash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "client-dash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/client-dash-1ed96ac73f1ecde8fe792ec7cdde085c.yaml b/nuclei-templates/cve-less/plugins/client-dash-1ed96ac73f1ecde8fe792ec7cdde085c.yaml new file mode 100644 index 0000000000..f675e7875d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/client-dash-1ed96ac73f1ecde8fe792ec7cdde085c.yaml @@ -0,0 +1,58 @@ +id: client-dash-1ed96ac73f1ecde8fe792ec7cdde085c + +info: + name: > + Client Dash <= 2.2.0 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6cd7986-6d3b-426b-a539-8dc11f0d7b04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/client-dash/" + google-query: inurl:"/wp-content/plugins/client-dash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,client-dash,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/client-dash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "client-dash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/client-dash-c20c39f747c7f70cb8ab495d6417a431.yaml b/nuclei-templates/cve-less/plugins/client-dash-c20c39f747c7f70cb8ab495d6417a431.yaml new file mode 100644 index 0000000000..c9d2a7b892 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/client-dash-c20c39f747c7f70cb8ab495d6417a431.yaml @@ -0,0 +1,58 @@ +id: client-dash-c20c39f747c7f70cb8ab495d6417a431 + +info: + name: > + Client Dash <= 2.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af3105ed-d383-4ce6-9317-5762f97b14e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/client-dash/" + google-query: inurl:"/wp-content/plugins/client-dash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,client-dash,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/client-dash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "client-dash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/client-portal-67cb2c3e35f22a85706bb01a35436ed6.yaml b/nuclei-templates/cve-less/plugins/client-portal-67cb2c3e35f22a85706bb01a35436ed6.yaml new file mode 100644 index 0000000000..fadb12c3f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/client-portal-67cb2c3e35f22a85706bb01a35436ed6.yaml @@ -0,0 +1,58 @@ +id: client-portal-67cb2c3e35f22a85706bb01a35436ed6 + +info: + name: > + Client Portal <= 1.1.8 - Cross-Site Request Forgery via cp_create_private_pages_for_all_users + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3319993-6f2c-425d-8cb2-ab26f7a52139?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/client-portal/" + google-query: inurl:"/wp-content/plugins/client-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,client-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/client-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "client-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/client-portal-73ba9c23c0821b68df8f36806d87a69d.yaml b/nuclei-templates/cve-less/plugins/client-portal-73ba9c23c0821b68df8f36806d87a69d.yaml new file mode 100644 index 0000000000..99245d407c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/client-portal-73ba9c23c0821b68df8f36806d87a69d.yaml @@ -0,0 +1,58 @@ +id: client-portal-73ba9c23c0821b68df8f36806d87a69d + +info: + name: > + Client Portal – Private user pages and login <= 1.1.8 - Cross-Site Request Forgery via cp_create_private_pages_for_all_users function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b89185c1-f7f9-47fb-ae8b-ba4c9f4e1d3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/client-portal/" + google-query: inurl:"/wp-content/plugins/client-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,client-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/client-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "client-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/client-portal-suitedash-login-0b15ae4e67ed167e4179722b43d42dc7.yaml b/nuclei-templates/cve-less/plugins/client-portal-suitedash-login-0b15ae4e67ed167e4179722b43d42dc7.yaml new file mode 100644 index 0000000000..2d786c438c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/client-portal-suitedash-login-0b15ae4e67ed167e4179722b43d42dc7.yaml @@ -0,0 +1,58 @@ +id: client-portal-suitedash-login-0b15ae4e67ed167e4179722b43d42dc7 + +info: + name: > + Client Portal : SuiteDash Direct Login <= 1.7.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d10d609-eb0f-492a-be87-2ac7db9c63b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/client-portal-suitedash-login/" + google-query: inurl:"/wp-content/plugins/client-portal-suitedash-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,client-portal-suitedash-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/client-portal-suitedash-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "client-portal-suitedash-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clinicalwp-core-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/clinicalwp-core-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..753b1298f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clinicalwp-core-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: clinicalwp-core-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clinicalwp-core/" + google-query: inurl:"/wp-content/plugins/clinicalwp-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clinicalwp-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clinicalwp-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clinicalwp-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clio-grow-form-cc0d4514b7c79b3cb4d1496328155c24.yaml b/nuclei-templates/cve-less/plugins/clio-grow-form-cc0d4514b7c79b3cb4d1496328155c24.yaml new file mode 100644 index 0000000000..4d60f5cb27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clio-grow-form-cc0d4514b7c79b3cb4d1496328155c24.yaml @@ -0,0 +1,58 @@ +id: clio-grow-form-cc0d4514b7c79b3cb4d1496328155c24 + +info: + name: > + Clio Grow <= 1.0.0 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72835a3e-e842-4146-ae7d-4aea722de11f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clio-grow-form/" + google-query: inurl:"/wp-content/plugins/clio-grow-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clio-grow-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clio-grow-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clio-grow-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clipr-e96b7ac8a29e8b231c1f7265734f9442.yaml b/nuclei-templates/cve-less/plugins/clipr-e96b7ac8a29e8b231c1f7265734f9442.yaml new file mode 100644 index 0000000000..5f0c1da312 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clipr-e96b7ac8a29e8b231c1f7265734f9442.yaml @@ -0,0 +1,58 @@ +id: clipr-e96b7ac8a29e8b231c1f7265734f9442 + +info: + name: > + Clipr <= 1.2.3 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01def852-367b-4f64-9c5a-58dcc3478b2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clipr/" + google-query: inurl:"/wp-content/plugins/clipr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clipr,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clipr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clipr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clipta-video-informer-675c723533131f486896f65ba6a33288.yaml b/nuclei-templates/cve-less/plugins/clipta-video-informer-675c723533131f486896f65ba6a33288.yaml new file mode 100644 index 0000000000..1f8a5440bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clipta-video-informer-675c723533131f486896f65ba6a33288.yaml @@ -0,0 +1,58 @@ +id: clipta-video-informer-675c723533131f486896f65ba6a33288 + +info: + name: > + Clipta Video Informer <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2ac27b5-88d5-43d5-a4bb-c2948ffc50f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clipta-video-informer/" + google-query: inurl:"/wp-content/plugins/clipta-video-informer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clipta-video-informer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clipta-video-informer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clipta-video-informer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cloak-front-end-email-8f88ca251b34c3f9441215db0d0eb986.yaml b/nuclei-templates/cve-less/plugins/cloak-front-end-email-8f88ca251b34c3f9441215db0d0eb986.yaml new file mode 100644 index 0000000000..061ff9103c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cloak-front-end-email-8f88ca251b34c3f9441215db0d0eb986.yaml @@ -0,0 +1,58 @@ +id: cloak-front-end-email-8f88ca251b34c3f9441215db0d0eb986 + +info: + name: > + Cloak Front End Email <= 1.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0eedeba-cdff-4e84-8182-1bebf48c76e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cloak-front-end-email/" + google-query: inurl:"/wp-content/plugins/cloak-front-end-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cloak-front-end-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cloak-front-end-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cloak-front-end-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clock-in-portal-0541b61acd6f59d8dbe0825e7d0780e4.yaml b/nuclei-templates/cve-less/plugins/clock-in-portal-0541b61acd6f59d8dbe0825e7d0780e4.yaml new file mode 100644 index 0000000000..b09af0131a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clock-in-portal-0541b61acd6f59d8dbe0825e7d0780e4.yaml @@ -0,0 +1,58 @@ +id: clock-in-portal-0541b61acd6f59d8dbe0825e7d0780e4 + +info: + name: > + Clock In Portal <= 2.1 - Cross-Site Request Forgery To Staff Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51ce7b71-0a19-48ef-8748-3848742c542b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clock-in-portal/" + google-query: inurl:"/wp-content/plugins/clock-in-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clock-in-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clock-in-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clock-in-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clock-in-portal-300b9d97cc08f164b31a4377dbab9d4c.yaml b/nuclei-templates/cve-less/plugins/clock-in-portal-300b9d97cc08f164b31a4377dbab9d4c.yaml new file mode 100644 index 0000000000..8d1c84ee8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clock-in-portal-300b9d97cc08f164b31a4377dbab9d4c.yaml @@ -0,0 +1,58 @@ +id: clock-in-portal-300b9d97cc08f164b31a4377dbab9d4c + +info: + name: > + Clock In Portal <= 2.1 - Cross-Site Request Forgery to Designation Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc97109c-187f-43b7-b5ed-5afeec5ea8fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clock-in-portal/" + google-query: inurl:"/wp-content/plugins/clock-in-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clock-in-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clock-in-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clock-in-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clock-in-portal-5b61cdb6d6ba8def275e2059b874af65.yaml b/nuclei-templates/cve-less/plugins/clock-in-portal-5b61cdb6d6ba8def275e2059b874af65.yaml new file mode 100644 index 0000000000..04c50c22d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clock-in-portal-5b61cdb6d6ba8def275e2059b874af65.yaml @@ -0,0 +1,58 @@ +id: clock-in-portal-5b61cdb6d6ba8def275e2059b874af65 + +info: + name: > + Clock In Portal <= 2.1 - Cross-Site Request Forgery to Staff Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8ec03c6-6ea9-4017-915a-e10b757d98ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clock-in-portal/" + google-query: inurl:"/wp-content/plugins/clock-in-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clock-in-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clock-in-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clock-in-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clock-in-portal-7e6ed21add5029121985af000727b133.yaml b/nuclei-templates/cve-less/plugins/clock-in-portal-7e6ed21add5029121985af000727b133.yaml new file mode 100644 index 0000000000..b3e92b24d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clock-in-portal-7e6ed21add5029121985af000727b133.yaml @@ -0,0 +1,58 @@ +id: clock-in-portal-7e6ed21add5029121985af000727b133 + +info: + name: > + Clock In Portal <= 2.1 - Cross-Site Request Forgery to Holidays Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c852fa1-698b-4e72-b781-095e2a98df81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clock-in-portal/" + google-query: inurl:"/wp-content/plugins/clock-in-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clock-in-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clock-in-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clock-in-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clock-in-portal-ad4c52a60f74c08cbf0949e67b843c74.yaml b/nuclei-templates/cve-less/plugins/clock-in-portal-ad4c52a60f74c08cbf0949e67b843c74.yaml new file mode 100644 index 0000000000..d2e6eca8a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clock-in-portal-ad4c52a60f74c08cbf0949e67b843c74.yaml @@ -0,0 +1,58 @@ +id: clock-in-portal-ad4c52a60f74c08cbf0949e67b843c74 + +info: + name: > + Clock In Portal <= 2.1 - Cross-Site Request Forgery To Designation Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6b17e90-42df-47ed-9e92-f5f1b990f921?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clock-in-portal/" + google-query: inurl:"/wp-content/plugins/clock-in-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clock-in-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clock-in-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clock-in-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clock-in-portal-df02e428fa69a24d16a3d7cce97f1bcc.yaml b/nuclei-templates/cve-less/plugins/clock-in-portal-df02e428fa69a24d16a3d7cce97f1bcc.yaml new file mode 100644 index 0000000000..ac2eb1420c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clock-in-portal-df02e428fa69a24d16a3d7cce97f1bcc.yaml @@ -0,0 +1,58 @@ +id: clock-in-portal-df02e428fa69a24d16a3d7cce97f1bcc + +info: + name: > + Clock In Portal <= 2.1 - Cross-Site Request Forgery To Holiday Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddc0261d-56ed-47a6-a0b2-0ab5f9dee815?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clock-in-portal/" + google-query: inurl:"/wp-content/plugins/clock-in-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clock-in-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clock-in-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clock-in-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clockwork-two-factor-authentication-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/cve-less/plugins/clockwork-two-factor-authentication-167d9672411be44feb72a5175fd0987c.yaml new file mode 100644 index 0000000000..4e0002426e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clockwork-two-factor-authentication-167d9672411be44feb72a5175fd0987c.yaml @@ -0,0 +1,58 @@ +id: clockwork-two-factor-authentication-167d9672411be44feb72a5175fd0987c + +info: + name: > + Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f35a20-ffcf-4413-b1ea-748cd6aa6f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clockwork-two-factor-authentication/" + google-query: inurl:"/wp-content/plugins/clockwork-two-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clockwork-two-factor-authentication,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clockwork-two-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clockwork-two-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clone-menu-bb2e17c35167609647005349850505d1.yaml b/nuclei-templates/cve-less/plugins/clone-menu-bb2e17c35167609647005349850505d1.yaml new file mode 100644 index 0000000000..92f2d3e855 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clone-menu-bb2e17c35167609647005349850505d1.yaml @@ -0,0 +1,58 @@ +id: clone-menu-bb2e17c35167609647005349850505d1 + +info: + name: > + WP Clone Menu <= 1.0.1 - Missing Authorization to Menu Clone + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bbbefce-4451-410d-bc19-f489318dda4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clone-menu/" + google-query: inurl:"/wp-content/plugins/clone-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clone-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clone-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clone-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clotya-core-0e249eccad21574e2f41d6b727c12756.yaml b/nuclei-templates/cve-less/plugins/clotya-core-0e249eccad21574e2f41d6b727c12756.yaml new file mode 100644 index 0000000000..9880fa5a5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clotya-core-0e249eccad21574e2f41d6b727c12756.yaml @@ -0,0 +1,58 @@ +id: clotya-core-0e249eccad21574e2f41d6b727c12756 + +info: + name: > + Multiple Plugins by KlbTheme <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fb06315-30ad-4d98-af75-b04933583be7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clotya-core/" + google-query: inurl:"/wp-content/plugins/clotya-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clotya-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clotya-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clotya-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cloud-manager-9f8e06f58bb3d62fb41a0d24a3483a49.yaml b/nuclei-templates/cve-less/plugins/cloud-manager-9f8e06f58bb3d62fb41a0d24a3483a49.yaml new file mode 100644 index 0000000000..52e70132bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cloud-manager-9f8e06f58bb3d62fb41a0d24a3483a49.yaml @@ -0,0 +1,58 @@ +id: cloud-manager-9f8e06f58bb3d62fb41a0d24a3483a49 + +info: + name: > + Cloud Manager <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d896366-a85d-49c9-9509-3f7454712474?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cloud-manager/" + google-query: inurl:"/wp-content/plugins/cloud-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cloud-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cloud-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cloud-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cloudflare-54a71a6006d636e1097ee6d46e6ecfe6.yaml b/nuclei-templates/cve-less/plugins/cloudflare-54a71a6006d636e1097ee6d46e6ecfe6.yaml new file mode 100644 index 0000000000..ef740c0611 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cloudflare-54a71a6006d636e1097ee6d46e6ecfe6.yaml @@ -0,0 +1,58 @@ +id: cloudflare-54a71a6006d636e1097ee6d46e6ecfe6 + +info: + name: > + Cloudflare < 1.3.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8d63789-16b3-443b-8dcb-67b1e5e25d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cloudflare/" + google-query: inurl:"/wp-content/plugins/cloudflare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cloudflare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cloudflare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cloudflare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cloudflare-82dd6e10056d4e2acdde095ee3c87000.yaml b/nuclei-templates/cve-less/plugins/cloudflare-82dd6e10056d4e2acdde095ee3c87000.yaml new file mode 100644 index 0000000000..0155998cd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cloudflare-82dd6e10056d4e2acdde095ee3c87000.yaml @@ -0,0 +1,58 @@ +id: cloudflare-82dd6e10056d4e2acdde095ee3c87000 + +info: + name: > + Cloudflare <= 4.12.2 - Missing Authorization via initProxy + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/902c0c84-fcae-4ce4-9885-89fd135a4ffd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cloudflare/" + google-query: inurl:"/wp-content/plugins/cloudflare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cloudflare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cloudflare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cloudflare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.12.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cloudnet-sync-31b36ec0444d32e3c3a9acc4186c5727.yaml b/nuclei-templates/cve-less/plugins/cloudnet-sync-31b36ec0444d32e3c3a9acc4186c5727.yaml new file mode 100644 index 0000000000..410a954c5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cloudnet-sync-31b36ec0444d32e3c3a9acc4186c5727.yaml @@ -0,0 +1,58 @@ +id: cloudnet-sync-31b36ec0444d32e3c3a9acc4186c5727 + +info: + name: > + Download CloudNet360 <= 3.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54b88702-ec41-414b-87f1-1859b130a713?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cloudnet-sync/" + google-query: inurl:"/wp-content/plugins/cloudnet-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cloudnet-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cloudnet-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cloudnet-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clover-online-orders-0f96dcc46121deff356e0d1a5d840b39.yaml b/nuclei-templates/cve-less/plugins/clover-online-orders-0f96dcc46121deff356e0d1a5d840b39.yaml new file mode 100644 index 0000000000..80b7c2c403 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clover-online-orders-0f96dcc46121deff356e0d1a5d840b39.yaml @@ -0,0 +1,58 @@ +id: clover-online-orders-0f96dcc46121deff356e0d1a5d840b39 + +info: + name: > + Smart Online Order for Clover <= 1.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfa62776-0502-49b4-8beb-74bbf7f20633?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clover-online-orders/" + google-query: inurl:"/wp-content/plugins/clover-online-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clover-online-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clover-online-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clover-online-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clover-online-orders-3211ecfd0817984e803716532365c05f.yaml b/nuclei-templates/cve-less/plugins/clover-online-orders-3211ecfd0817984e803716532365c05f.yaml new file mode 100644 index 0000000000..1e8b643d21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clover-online-orders-3211ecfd0817984e803716532365c05f.yaml @@ -0,0 +1,58 @@ +id: clover-online-orders-3211ecfd0817984e803716532365c05f + +info: + name: > + Smart Online Order for Clover <= 1.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06781d74-ed45-432d-8d80-d90918b85e04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clover-online-orders/" + google-query: inurl:"/wp-content/plugins/clover-online-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clover-online-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clover-online-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clover-online-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/clover-online-orders-e55440d3ef9cff783b9861081230c8c6.yaml b/nuclei-templates/cve-less/plugins/clover-online-orders-e55440d3ef9cff783b9861081230c8c6.yaml new file mode 100644 index 0000000000..5db76fa240 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/clover-online-orders-e55440d3ef9cff783b9861081230c8c6.yaml @@ -0,0 +1,58 @@ +id: clover-online-orders-e55440d3ef9cff783b9861081230c8c6 + +info: + name: > + Smart Online Order for Clover <= 1.5.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f1e0dfa-f99a-43d1-bdc9-6fc7a4ea381d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/clover-online-orders/" + google-query: inurl:"/wp-content/plugins/clover-online-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,clover-online-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/clover-online-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clover-online-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/club-management-software-3e4694078ceef16f755ef9eb324edfcb.yaml b/nuclei-templates/cve-less/plugins/club-management-software-3e4694078ceef16f755ef9eb324edfcb.yaml new file mode 100644 index 0000000000..041d37d9bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/club-management-software-3e4694078ceef16f755ef9eb324edfcb.yaml @@ -0,0 +1,58 @@ +id: club-management-software-3e4694078ceef16f755ef9eb324edfcb + +info: + name: > + WordPress Membership SwiftCloud.io <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0bc1909-5002-44ab-9a5e-694c4ef946e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/club-management-software/" + google-query: inurl:"/wp-content/plugins/club-management-software/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,club-management-software,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/club-management-software/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "club-management-software" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cluevo-lms-9424f0d1add83019568a32a2d432a588.yaml b/nuclei-templates/cve-less/plugins/cluevo-lms-9424f0d1add83019568a32a2d432a588.yaml new file mode 100644 index 0000000000..0fcc8208e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cluevo-lms-9424f0d1add83019568a32a2d432a588.yaml @@ -0,0 +1,58 @@ +id: cluevo-lms-9424f0d1add83019568a32a2d432a588 + +info: + name: > + CLUEVO E-Learning Platform <= 1.8.0 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1a0d446-63b6-4265-a542-345d766faf15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cluevo-lms/" + google-query: inurl:"/wp-content/plugins/cluevo-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cluevo-lms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cluevo-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cluevo-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cluevo-lms-f070e8d35eccf1703741e9fc7f61600d.yaml b/nuclei-templates/cve-less/plugins/cluevo-lms-f070e8d35eccf1703741e9fc7f61600d.yaml new file mode 100644 index 0000000000..0b49df6863 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cluevo-lms-f070e8d35eccf1703741e9fc7f61600d.yaml @@ -0,0 +1,58 @@ +id: cluevo-lms-f070e8d35eccf1703741e9fc7f61600d + +info: + name: > + CLUEVO LMS, E-Learning Platform <= 1.10.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/414165a3-78f8-4254-ac24-2de177cad3dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cluevo-lms/" + google-query: inurl:"/wp-content/plugins/cluevo-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cluevo-lms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cluevo-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cluevo-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-ad-changer-1c07181abecff4187bed7fdcd8d1afe4.yaml b/nuclei-templates/cve-less/plugins/cm-ad-changer-1c07181abecff4187bed7fdcd8d1afe4.yaml new file mode 100644 index 0000000000..453add2ba7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-ad-changer-1c07181abecff4187bed7fdcd8d1afe4.yaml @@ -0,0 +1,58 @@ +id: cm-ad-changer-1c07181abecff4187bed7fdcd8d1afe4 + +info: + name: > + CM Ad Changer <= 1.7.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d96c9b04-6850-40ab-8006-81cca8a9dffe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-ad-changer/" + google-query: inurl:"/wp-content/plugins/cm-ad-changer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-ad-changer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-ad-changer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-ad-changer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-ad-changer-5c3ee68d8799e2236b3bc1333dfd2f35.yaml b/nuclei-templates/cve-less/plugins/cm-ad-changer-5c3ee68d8799e2236b3bc1333dfd2f35.yaml new file mode 100644 index 0000000000..b868b47e59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-ad-changer-5c3ee68d8799e2236b3bc1333dfd2f35.yaml @@ -0,0 +1,58 @@ +id: cm-ad-changer-5c3ee68d8799e2236b3bc1333dfd2f35 + +info: + name: > + CM Ad Changer < 1.7.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa181ff8-5324-4782-ad45-4a701ac63b8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-ad-changer/" + google-query: inurl:"/wp-content/plugins/cm-ad-changer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-ad-changer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-ad-changer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-ad-changer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-answers-2ace3607ba6999f91533535a3a2816d7.yaml b/nuclei-templates/cve-less/plugins/cm-answers-2ace3607ba6999f91533535a3a2816d7.yaml new file mode 100644 index 0000000000..9dac0a0af6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-answers-2ace3607ba6999f91533535a3a2816d7.yaml @@ -0,0 +1,58 @@ +id: cm-answers-2ace3607ba6999f91533535a3a2816d7 + +info: + name: > + CM Answers <= 3.1.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b23d276c-69c5-47e0-99bd-f20ff1d45904?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-answers/" + google-query: inurl:"/wp-content/plugins/cm-answers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-answers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-answers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-answers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-0892bb5b73a2988ec7694336ad4f4900.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-0892bb5b73a2988ec7694336ad4f4900.yaml new file mode 100644 index 0000000000..aba38e3048 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-0892bb5b73a2988ec7694336ad4f4900.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-0892bb5b73a2988ec7694336ad4f4900 + +info: + name: > + CM Download Manager < 2.9.1 - Cross-Site Request Forgery via editHeader + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dad1a7c-a5a5-486b-bf15-6fd455e6612c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-16f2bcb5cfa3d079c1a300d23d7f7166.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-16f2bcb5cfa3d079c1a300d23d7f7166.yaml new file mode 100644 index 0000000000..7f15bee79b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-16f2bcb5cfa3d079c1a300d23d7f7166.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-16f2bcb5cfa3d079c1a300d23d7f7166 + +info: + name: > + CM Download Manager <= 2.7.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21dd96e0-8c1c-4593-8a75-079125192001?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-4ad8dd096306cdfdd3b295e2def3a2c7.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-4ad8dd096306cdfdd3b295e2def3a2c7.yaml new file mode 100644 index 0000000000..079f80bb96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-4ad8dd096306cdfdd3b295e2def3a2c7.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-4ad8dd096306cdfdd3b295e2def3a2c7 + +info: + name: > + CM Download Manager < 2.8.0 - Directory Traversal to Arbitrary File Deletion and Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c866b3b7-50cf-41a5-bdc2-60384b15df79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-5fc74cc66f5330c5bc45fdae1ec9ced1.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-5fc74cc66f5330c5bc45fdae1ec9ced1.yaml new file mode 100644 index 0000000000..a28a453e6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-5fc74cc66f5330c5bc45fdae1ec9ced1.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-5fc74cc66f5330c5bc45fdae1ec9ced1 + +info: + name: > + CM Download Manager <= 2.8.5 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f7e2323-42e9-4cc7-b3f4-d133e0073b7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-60df52935f4401dddac85a54784a5e69.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-60df52935f4401dddac85a54784a5e69.yaml new file mode 100644 index 0000000000..52fcdaafe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-60df52935f4401dddac85a54784a5e69.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-60df52935f4401dddac85a54784a5e69 + +info: + name: > + CM Download Manager < 2.9.0 - Cross-Site Request Forgery via unpublishHeader + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6a0d6df-60a6-42e3-9e9b-6171bb589f4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-846117b538ab9ba30f69a12efe0f9e57.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-846117b538ab9ba30f69a12efe0f9e57.yaml new file mode 100644 index 0000000000..72aa8e9371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-846117b538ab9ba30f69a12efe0f9e57.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-846117b538ab9ba30f69a12efe0f9e57 + +info: + name: > + CM Download Manager <= 2.7.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87d064fc-923a-41f1-a14f-09ff91b2aaee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-aa2a9b71c269086e8f022720378d80bb.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-aa2a9b71c269086e8f022720378d80bb.yaml new file mode 100644 index 0000000000..9536ada65a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-aa2a9b71c269086e8f022720378d80bb.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-aa2a9b71c269086e8f022720378d80bb + +info: + name: > + CM Download Manager < 2.9.0 - Cross-Site Request Forgery via delHeader + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e58fe046-0119-48e6-ac90-8b70d7eb9956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-bd35c16b70884879b92d89ef15ca63e5.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-bd35c16b70884879b92d89ef15ca63e5.yaml new file mode 100644 index 0000000000..a5d1760032 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-bd35c16b70884879b92d89ef15ca63e5.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-bd35c16b70884879b92d89ef15ca63e5 + +info: + name: > + CM Download Manager <= 2.0.6 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fabd576c-6990-40a1-9a94-ecb63e2b0189?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-download-manager-ecc77de29f842207c628b7046d3e4a17.yaml b/nuclei-templates/cve-less/plugins/cm-download-manager-ecc77de29f842207c628b7046d3e4a17.yaml new file mode 100644 index 0000000000..e1451fae1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-download-manager-ecc77de29f842207c628b7046d3e4a17.yaml @@ -0,0 +1,58 @@ +id: cm-download-manager-ecc77de29f842207c628b7046d3e4a17 + +info: + name: > + CM Download Manager <= 2.0.3 - Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d517094-8038-4951-b16a-db7bf2c31851?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-download-manager/" + google-query: inurl:"/wp-content/plugins/cm-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-on-demand-search-and-replace-420882c95451d067f82426e7b79441c3.yaml b/nuclei-templates/cve-less/plugins/cm-on-demand-search-and-replace-420882c95451d067f82426e7b79441c3.yaml new file mode 100644 index 0000000000..ec4fee2998 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-on-demand-search-and-replace-420882c95451d067f82426e7b79441c3.yaml @@ -0,0 +1,58 @@ +id: cm-on-demand-search-and-replace-420882c95451d067f82426e7b79441c3 + +info: + name: > + CM On Demand Search And Replace <= 1.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fde1157b-5b99-4e9c-9c51-ebaa0eddfd73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-on-demand-search-and-replace/" + google-query: inurl:"/wp-content/plugins/cm-on-demand-search-and-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-on-demand-search-and-replace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-on-demand-search-and-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-on-demand-search-and-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-on-demand-search-and-replace-514273203d780a9cda87e275d81e2d5f.yaml b/nuclei-templates/cve-less/plugins/cm-on-demand-search-and-replace-514273203d780a9cda87e275d81e2d5f.yaml new file mode 100644 index 0000000000..7472a26b35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-on-demand-search-and-replace-514273203d780a9cda87e275d81e2d5f.yaml @@ -0,0 +1,58 @@ +id: cm-on-demand-search-and-replace-514273203d780a9cda87e275d81e2d5f + +info: + name: > + CM On Demand Search And Replace <= 1.3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3be9ffb4-5614-4a5f-bc2a-38ad626f8e3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-on-demand-search-and-replace/" + google-query: inurl:"/wp-content/plugins/cm-on-demand-search-and-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-on-demand-search-and-replace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-on-demand-search-and-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-on-demand-search-and-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-pop-up-banners-9a8cd1490d53fe02691b7245088ba1a4.yaml b/nuclei-templates/cve-less/plugins/cm-pop-up-banners-9a8cd1490d53fe02691b7245088ba1a4.yaml new file mode 100644 index 0000000000..6fa5b55ad5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-pop-up-banners-9a8cd1490d53fe02691b7245088ba1a4.yaml @@ -0,0 +1,58 @@ +id: cm-pop-up-banners-9a8cd1490d53fe02691b7245088ba1a4 + +info: + name: > + CM Pop-Up banners <= 1.4.10 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9b28209-498f-4319-be87-3f54c64d9ccd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-pop-up-banners/" + google-query: inurl:"/wp-content/plugins/cm-pop-up-banners/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-pop-up-banners,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-pop-up-banners/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-pop-up-banners" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-pop-up-banners-ad88df41b076143465006e1296e02fd7.yaml b/nuclei-templates/cve-less/plugins/cm-pop-up-banners-ad88df41b076143465006e1296e02fd7.yaml new file mode 100644 index 0000000000..8298d31231 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-pop-up-banners-ad88df41b076143465006e1296e02fd7.yaml @@ -0,0 +1,58 @@ +id: cm-pop-up-banners-ad88df41b076143465006e1296e02fd7 + +info: + name: > + CM Pop-Up banners <= 1.5.10 - Authenticated (Subscriber+) SQL Injection via getStatistics + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff29e160-993b-422c-b49b-a216db5a0765?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-pop-up-banners/" + google-query: inurl:"/wp-content/plugins/cm-pop-up-banners/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-pop-up-banners,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-pop-up-banners/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-pop-up-banners" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-registration-pro-53024ed5f0e18aa66d4ebe04f4f0eace.yaml b/nuclei-templates/cve-less/plugins/cm-registration-pro-53024ed5f0e18aa66d4ebe04f4f0eace.yaml new file mode 100644 index 0000000000..fe73c336c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-registration-pro-53024ed5f0e18aa66d4ebe04f4f0eace.yaml @@ -0,0 +1,58 @@ +id: cm-registration-pro-53024ed5f0e18aa66d4ebe04f4f0eace + +info: + name: > + CM Registration Pro <= 3.2.0 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4280654a-9eab-4541-8b82-74086d37d928?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-registration-pro/" + google-query: inurl:"/wp-content/plugins/cm-registration-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-registration-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-registration-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-registration-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-video-lesson-manager-d10884d848b4b49b542895ed8b750487.yaml b/nuclei-templates/cve-less/plugins/cm-video-lesson-manager-d10884d848b4b49b542895ed8b750487.yaml new file mode 100644 index 0000000000..ee641fa121 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-video-lesson-manager-d10884d848b4b49b542895ed8b750487.yaml @@ -0,0 +1,58 @@ +id: cm-video-lesson-manager-d10884d848b4b49b542895ed8b750487 + +info: + name: > + Video Lessons Manager < 1.7.2 and Video Lessons Manager Pro < 3.5.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c9a2045-7d24-4871-b962-32bc0fdf5476?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-video-lesson-manager/" + google-query: inurl:"/wp-content/plugins/cm-video-lesson-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-video-lesson-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-video-lesson-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-video-lesson-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cm-video-lesson-manager-pro-d10884d848b4b49b542895ed8b750487.yaml b/nuclei-templates/cve-less/plugins/cm-video-lesson-manager-pro-d10884d848b4b49b542895ed8b750487.yaml new file mode 100644 index 0000000000..af18fd46b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cm-video-lesson-manager-pro-d10884d848b4b49b542895ed8b750487.yaml @@ -0,0 +1,58 @@ +id: cm-video-lesson-manager-pro-d10884d848b4b49b542895ed8b750487 + +info: + name: > + Video Lessons Manager < 1.7.2 and Video Lessons Manager Pro < 3.5.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c9a2045-7d24-4871-b962-32bc0fdf5476?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cm-video-lesson-manager-pro/" + google-query: inurl:"/wp-content/plugins/cm-video-lesson-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cm-video-lesson-manager-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cm-video-lesson-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cm-video-lesson-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cmb2-8c74a48bb6b992ea1d77056b8703ebf9.yaml b/nuclei-templates/cve-less/plugins/cmb2-8c74a48bb6b992ea1d77056b8703ebf9.yaml new file mode 100644 index 0000000000..23c84db038 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cmb2-8c74a48bb6b992ea1d77056b8703ebf9.yaml @@ -0,0 +1,58 @@ +id: cmb2-8c74a48bb6b992ea1d77056b8703ebf9 + +info: + name: > + CMB2 <= 2.10.1 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3f37ef5-ddf5-4bd5-b6aa-121dda22fb01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cmb2/" + google-query: inurl:"/wp-content/plugins/cmb2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cmb2,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cmb2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cmb2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-166fef08e9b74456a644f0a9d21fb872.yaml b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-166fef08e9b74456a644f0a9d21fb872.yaml new file mode 100644 index 0000000000..31dfd5aa6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-166fef08e9b74456a644f0a9d21fb872.yaml @@ -0,0 +1,58 @@ +id: cmp-coming-soon-maintenance-166fef08e9b74456a644f0a9d21fb872 + +info: + name: > + CMP <= 3.8.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1ef067b-e4b4-4174-b6ff-ec94a7afd55d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cmp-coming-soon-maintenance/" + google-query: inurl:"/wp-content/plugins/cmp-coming-soon-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cmp-coming-soon-maintenance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cmp-coming-soon-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cmp-coming-soon-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-4532b4dbcf2e547347daa5207db523f5.yaml b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-4532b4dbcf2e547347daa5207db523f5.yaml new file mode 100644 index 0000000000..94833aeab8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-4532b4dbcf2e547347daa5207db523f5.yaml @@ -0,0 +1,58 @@ +id: cmp-coming-soon-maintenance-4532b4dbcf2e547347daa5207db523f5 + +info: + name: > + CMP – Coming Soon & Maintenance <= 4.1.10 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fdc2dac-b3ea-40bd-987b-e6c47e74aefc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cmp-coming-soon-maintenance/" + google-query: inurl:"/wp-content/plugins/cmp-coming-soon-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cmp-coming-soon-maintenance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cmp-coming-soon-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cmp-coming-soon-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-8ec76f6766e0fda899f0bc8eebfb4339.yaml b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-8ec76f6766e0fda899f0bc8eebfb4339.yaml new file mode 100644 index 0000000000..42e4d1dc2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-8ec76f6766e0fda899f0bc8eebfb4339.yaml @@ -0,0 +1,58 @@ +id: cmp-coming-soon-maintenance-8ec76f6766e0fda899f0bc8eebfb4339 + +info: + name: > + CMP – Coming Soon & Maintenance <= 4.1.7 - Maintenance Mode Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af955f69-b18c-446e-b05e-6a57a5f16dfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cmp-coming-soon-maintenance/" + google-query: inurl:"/wp-content/plugins/cmp-coming-soon-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cmp-coming-soon-maintenance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cmp-coming-soon-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cmp-coming-soon-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-8ee98246eb8d1e952fa8185b436e76db.yaml b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-8ee98246eb8d1e952fa8185b436e76db.yaml new file mode 100644 index 0000000000..b0da859a71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-8ee98246eb8d1e952fa8185b436e76db.yaml @@ -0,0 +1,58 @@ +id: cmp-coming-soon-maintenance-8ee98246eb8d1e952fa8185b436e76db + +info: + name: > + CMP – Coming Soon & Maintenance Plugin by NiteoThemes <= 4.1.6 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e01b4259-ed8d-44a4-9771-470de45b14a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cmp-coming-soon-maintenance/" + google-query: inurl:"/wp-content/plugins/cmp-coming-soon-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cmp-coming-soon-maintenance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cmp-coming-soon-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cmp-coming-soon-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-a905768098fb049d17090a5880f96add.yaml b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-a905768098fb049d17090a5880f96add.yaml new file mode 100644 index 0000000000..3f7c5e0e5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cmp-coming-soon-maintenance-a905768098fb049d17090a5880f96add.yaml @@ -0,0 +1,58 @@ +id: cmp-coming-soon-maintenance-a905768098fb049d17090a5880f96add + +info: + name: > + CMP - Coming Soon & Maintenance Plugin <= 4.0.18 - Unauthenticated Arbitrary CSS Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4956173-b306-401c-b966-df884e8979e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cmp-coming-soon-maintenance/" + google-query: inurl:"/wp-content/plugins/cmp-coming-soon-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cmp-coming-soon-maintenance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cmp-coming-soon-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cmp-coming-soon-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cms-commander-client-1aebd68acb64b20280f49bb62f1d7be6.yaml b/nuclei-templates/cve-less/plugins/cms-commander-client-1aebd68acb64b20280f49bb62f1d7be6.yaml new file mode 100644 index 0000000000..fcfaf97036 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cms-commander-client-1aebd68acb64b20280f49bb62f1d7be6.yaml @@ -0,0 +1,58 @@ +id: cms-commander-client-1aebd68acb64b20280f49bb62f1d7be6 + +info: + name: > + CMS Commander – Manage Multiple Sites Plugin <= 2.21 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a859505e-87ba-49f0-910b-de6141976f86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cms-commander-client/" + google-query: inurl:"/wp-content/plugins/cms-commander-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cms-commander-client,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cms-commander-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cms-commander-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cms-commander-client-5e8b0e22556acc1ddd3b390056ee15b3.yaml b/nuclei-templates/cve-less/plugins/cms-commander-client-5e8b0e22556acc1ddd3b390056ee15b3.yaml new file mode 100644 index 0000000000..e7d41958d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cms-commander-client-5e8b0e22556acc1ddd3b390056ee15b3.yaml @@ -0,0 +1,58 @@ +id: cms-commander-client-5e8b0e22556acc1ddd3b390056ee15b3 + +info: + name: > + CMS Commander <= 2.287 - Authorization Bypass through Use of Insufficiently Unique Cryptographic Signature + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca37d453-9f9a-46b2-a17f-65a16e3e2ed1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cms-commander-client/" + google-query: inurl:"/wp-content/plugins/cms-commander-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cms-commander-client,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cms-commander-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cms-commander-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.287') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cms-press-a3fcccf439bdac9208ecc47d006e929e.yaml b/nuclei-templates/cve-less/plugins/cms-press-a3fcccf439bdac9208ecc47d006e929e.yaml new file mode 100644 index 0000000000..8cb41efb7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cms-press-a3fcccf439bdac9208ecc47d006e929e.yaml @@ -0,0 +1,58 @@ +id: cms-press-a3fcccf439bdac9208ecc47d006e929e + +info: + name: > + CMS Press <= 0.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/905cb57b-70ec-4324-ae66-9c06d1737939?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cms-press/" + google-query: inurl:"/wp-content/plugins/cms-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cms-press,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cms-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cms-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cms-tree-page-view-664f9708c952ef16850b76782a119235.yaml b/nuclei-templates/cve-less/plugins/cms-tree-page-view-664f9708c952ef16850b76782a119235.yaml new file mode 100644 index 0000000000..8a09200b26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cms-tree-page-view-664f9708c952ef16850b76782a119235.yaml @@ -0,0 +1,58 @@ +id: cms-tree-page-view-664f9708c952ef16850b76782a119235 + +info: + name: > + CMS Tree Page View < 1.4 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13d16955-056d-45c5-b0d1-891767e866b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cms-tree-page-view/" + google-query: inurl:"/wp-content/plugins/cms-tree-page-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cms-tree-page-view,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cms-tree-page-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cms-tree-page-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cms-tree-page-view-72fe0a438fb0e3368285665d2037073e.yaml b/nuclei-templates/cve-less/plugins/cms-tree-page-view-72fe0a438fb0e3368285665d2037073e.yaml new file mode 100644 index 0000000000..2858d62b04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cms-tree-page-view-72fe0a438fb0e3368285665d2037073e.yaml @@ -0,0 +1,58 @@ +id: cms-tree-page-view-72fe0a438fb0e3368285665d2037073e + +info: + name: > + CMS Tree Page View <= 1.6.7 - Reflected Cross-Site Scripting via 'post_type' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19796773-3d5f-458d-aab1-743b6835c71b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cms-tree-page-view/" + google-query: inurl:"/wp-content/plugins/cms-tree-page-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cms-tree-page-view,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cms-tree-page-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cms-tree-page-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cms-tree-page-view-ad3b6e67373c173a68de7fe25df960c3.yaml b/nuclei-templates/cve-less/plugins/cms-tree-page-view-ad3b6e67373c173a68de7fe25df960c3.yaml new file mode 100644 index 0000000000..88830eeeff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cms-tree-page-view-ad3b6e67373c173a68de7fe25df960c3.yaml @@ -0,0 +1,58 @@ +id: cms-tree-page-view-ad3b6e67373c173a68de7fe25df960c3 + +info: + name: > + CMS Tree Page View < 0.8.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f4052ab-ff9e-48a6-8406-72e9b6237668?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cms-tree-page-view/" + google-query: inurl:"/wp-content/plugins/cms-tree-page-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cms-tree-page-view,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cms-tree-page-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cms-tree-page-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cmyee-momentopress-549edad2ce245fbc28f77db9aee80ff6.yaml b/nuclei-templates/cve-less/plugins/cmyee-momentopress-549edad2ce245fbc28f77db9aee80ff6.yaml new file mode 100644 index 0000000000..a95e756dfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cmyee-momentopress-549edad2ce245fbc28f77db9aee80ff6.yaml @@ -0,0 +1,58 @@ +id: cmyee-momentopress-549edad2ce245fbc28f77db9aee80ff6 + +info: + name: > + MomentoPress for Momento360 <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0fdee40-9d60-4657-9e2b-42d548dea1c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cmyee-momentopress/" + google-query: inurl:"/wp-content/plugins/cmyee-momentopress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cmyee-momentopress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cmyee-momentopress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cmyee-momentopress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/co-authors-plus-5fd18b55135c9269021a77a72c48b74a.yaml b/nuclei-templates/cve-less/plugins/co-authors-plus-5fd18b55135c9269021a77a72c48b74a.yaml new file mode 100644 index 0000000000..5bafc859c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/co-authors-plus-5fd18b55135c9269021a77a72c48b74a.yaml @@ -0,0 +1,58 @@ +id: co-authors-plus-5fd18b55135c9269021a77a72c48b74a + +info: + name: > + Co-Authors Plus 3.5 - 3.5.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9743351-9f28-49bf-8b08-85ffbdcfa5f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/co-authors-plus/" + google-query: inurl:"/wp-content/plugins/co-authors-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,co-authors-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/co-authors-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "co-authors-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.5', '<= 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/co-marquage-service-public-a60a30a5dd8e8a555825a7d98c57da43.yaml b/nuclei-templates/cve-less/plugins/co-marquage-service-public-a60a30a5dd8e8a555825a7d98c57da43.yaml new file mode 100644 index 0000000000..b7d8a9e003 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/co-marquage-service-public-a60a30a5dd8e8a555825a7d98c57da43.yaml @@ -0,0 +1,58 @@ +id: co-marquage-service-public-a60a30a5dd8e8a555825a7d98c57da43 + +info: + name: > + Co-marquage service-public.fr <= 0.5.72 - Reflected Cross-Site Scripting via search_term + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ce2dc45-0e23-4fba-8ef3-543db2a02eda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/co-marquage-service-public/" + google-query: inurl:"/wp-content/plugins/co-marquage-service-public/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,co-marquage-service-public,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/co-marquage-service-public/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "co-marquage-service-public" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/co-marquage-service-public-baef1d0e01440a39ac30bd5826a2469a.yaml b/nuclei-templates/cve-less/plugins/co-marquage-service-public-baef1d0e01440a39ac30bd5826a2469a.yaml new file mode 100644 index 0000000000..37b45e0664 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/co-marquage-service-public-baef1d0e01440a39ac30bd5826a2469a.yaml @@ -0,0 +1,58 @@ +id: co-marquage-service-public-baef1d0e01440a39ac30bd5826a2469a + +info: + name: > + Co-marquage service-public.fr <= 0.5.71 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c74209e2-52cc-4ea1-967f-65fb9031e9a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/co-marquage-service-public/" + google-query: inurl:"/wp-content/plugins/co-marquage-service-public/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,co-marquage-service-public,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/co-marquage-service-public/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "co-marquage-service-public" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..949929375d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: co2ok-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/co2ok-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/co2ok-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,co2ok-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/co2ok-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "co2ok-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-c148c7298cbf640c64f29d57d3ad5df1.yaml b/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-c148c7298cbf640c64f29d57d3ad5df1.yaml new file mode 100644 index 0000000000..df8a0c9b09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-c148c7298cbf640c64f29d57d3ad5df1.yaml @@ -0,0 +1,58 @@ +id: co2ok-for-woocommerce-c148c7298cbf640c64f29d57d3ad5df1 + +info: + name: > + CO2ok: carbon offsetting for e-commerce <= 1.0.9.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb0e99c7-003a-4795-8acb-e6dafca34b8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/co2ok-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/co2ok-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,co2ok-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/co2ok-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "co2ok-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..cc00cf6d6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/co2ok-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: co2ok-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/co2ok-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/co2ok-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,co2ok-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/co2ok-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "co2ok-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coblocks-4086933ae9a93ef9f0adb45c61ef5080.yaml b/nuclei-templates/cve-less/plugins/coblocks-4086933ae9a93ef9f0adb45c61ef5080.yaml new file mode 100644 index 0000000000..d98f60c77d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coblocks-4086933ae9a93ef9f0adb45c61ef5080.yaml @@ -0,0 +1,58 @@ +id: coblocks-4086933ae9a93ef9f0adb45c61ef5080 + +info: + name: > + Page Builder Gutenberg Blocks – CoBlocks <= 3.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56d1d152-946f-47c9-b0d5-76513370677f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coblocks/" + google-query: inurl:"/wp-content/plugins/coblocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coblocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coblocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coblocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coblocks-fdd365ece4b9b292b937aee693d1c5a6.yaml b/nuclei-templates/cve-less/plugins/coblocks-fdd365ece4b9b292b937aee693d1c5a6.yaml new file mode 100644 index 0000000000..935ca1e1de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coblocks-fdd365ece4b9b292b937aee693d1c5a6.yaml @@ -0,0 +1,58 @@ +id: coblocks-fdd365ece4b9b292b937aee693d1c5a6 + +info: + name: > + Page Builder Gutenberg Blocks – CoBlocks <= 3.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d692242-4779-449a-94a7-88e202aaefc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coblocks/" + google-query: inurl:"/wp-content/plugins/coblocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coblocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coblocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coblocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/code-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b8aa84f4aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: code-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-manager/" + google-query: inurl:"/wp-content/plugins/code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-snippets-2a2cec7651f5442eb2c1435c40fb232d.yaml b/nuclei-templates/cve-less/plugins/code-snippets-2a2cec7651f5442eb2c1435c40fb232d.yaml new file mode 100644 index 0000000000..332edc6c4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-snippets-2a2cec7651f5442eb2c1435c40fb232d.yaml @@ -0,0 +1,58 @@ +id: code-snippets-2a2cec7651f5442eb2c1435c40fb232d + +info: + name: > + Code Snippets <= 2.14.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caf0d33d-4bfd-460f-b21c-df36b1452b2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-snippets/" + google-query: inurl:"/wp-content/plugins/code-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-snippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-snippets-39bc2edd346e28405d70531e51a8164a.yaml b/nuclei-templates/cve-less/plugins/code-snippets-39bc2edd346e28405d70531e51a8164a.yaml new file mode 100644 index 0000000000..2bf0e033fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-snippets-39bc2edd346e28405d70531e51a8164a.yaml @@ -0,0 +1,58 @@ +id: code-snippets-39bc2edd346e28405d70531e51a8164a + +info: + name: > + Code Snippets <= 2.13.3 - Cross-Site Request Forgery to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b230ff1-4971-4ec5-a0e9-21df90fc6e98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-snippets/" + google-query: inurl:"/wp-content/plugins/code-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-snippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-snippets-495cf5fc28b98b14d2a1a7c5bb6e683a.yaml b/nuclei-templates/cve-less/plugins/code-snippets-495cf5fc28b98b14d2a1a7c5bb6e683a.yaml new file mode 100644 index 0000000000..27c41f8f4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-snippets-495cf5fc28b98b14d2a1a7c5bb6e683a.yaml @@ -0,0 +1,58 @@ +id: code-snippets-495cf5fc28b98b14d2a1a7c5bb6e683a + +info: + name: > + Code Snippets < 2.7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd0c3965-6b35-46a8-8cf0-6726cdb03c8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-snippets/" + google-query: inurl:"/wp-content/plugins/code-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-snippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-snippets-aa298dcdd541921aa6e5a62400773be6.yaml b/nuclei-templates/cve-less/plugins/code-snippets-aa298dcdd541921aa6e5a62400773be6.yaml new file mode 100644 index 0000000000..ac41db773e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-snippets-aa298dcdd541921aa6e5a62400773be6.yaml @@ -0,0 +1,58 @@ +id: code-snippets-aa298dcdd541921aa6e5a62400773be6 + +info: + name: > + Code Snippets <= 3.5.0 - Cross-Site Request Forgery via load + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28aae3d4-c4c4-4cda-9f4b-7f2ea58629aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-snippets/" + google-query: inurl:"/wp-content/plugins/code-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-snippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-snippets-aceeb583ba4064a9ac66804525abc9eb.yaml b/nuclei-templates/cve-less/plugins/code-snippets-aceeb583ba4064a9ac66804525abc9eb.yaml new file mode 100644 index 0000000000..a07a7dbab8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-snippets-aceeb583ba4064a9ac66804525abc9eb.yaml @@ -0,0 +1,58 @@ +id: code-snippets-aceeb583ba4064a9ac66804525abc9eb + +info: + name: > + Code Snippets <= 2.14.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77ff6195-e2e6-49bd-a96e-d2f60b309368?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-snippets/" + google-query: inurl:"/wp-content/plugins/code-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-snippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-snippets-extended-429616022004f10edfb6da5df655ced8.yaml b/nuclei-templates/cve-less/plugins/code-snippets-extended-429616022004f10edfb6da5df655ced8.yaml new file mode 100644 index 0000000000..8fd9959b61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-snippets-extended-429616022004f10edfb6da5df655ced8.yaml @@ -0,0 +1,58 @@ +id: code-snippets-extended-429616022004f10edfb6da5df655ced8 + +info: + name: > + Code Snippets Extended <= 1.4.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21ab1a1e-53f5-4cd2-a9c5-0b0065f14a6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-snippets-extended/" + google-query: inurl:"/wp-content/plugins/code-snippets-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-snippets-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-snippets-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-snippets-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-snippets-extended-989eb9c3cbf3a8a65b24266fa6fa3458.yaml b/nuclei-templates/cve-less/plugins/code-snippets-extended-989eb9c3cbf3a8a65b24266fa6fa3458.yaml new file mode 100644 index 0000000000..9f961a039e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-snippets-extended-989eb9c3cbf3a8a65b24266fa6fa3458.yaml @@ -0,0 +1,58 @@ +id: code-snippets-extended-989eb9c3cbf3a8a65b24266fa6fa3458 + +info: + name: > + Code Snippets Extended <= 1.4.7 - Cross-Site Request Forgery to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c7d208b-84e4-4759-8b61-3ef43c1d0732?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-snippets-extended/" + google-query: inurl:"/wp-content/plugins/code-snippets-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-snippets-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-snippets-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-snippets-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/code-snippets-extended-e82db8a28efe18641f3e717f9b09b84e.yaml b/nuclei-templates/cve-less/plugins/code-snippets-extended-e82db8a28efe18641f3e717f9b09b84e.yaml new file mode 100644 index 0000000000..481a7fd30f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/code-snippets-extended-e82db8a28efe18641f3e717f9b09b84e.yaml @@ -0,0 +1,58 @@ +id: code-snippets-extended-e82db8a28efe18641f3e717f9b09b84e + +info: + name: > + Code Snippets Extended <= 1.4.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fd4fa08-e326-47ab-96b1-be7b702a32ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/code-snippets-extended/" + google-query: inurl:"/wp-content/plugins/code-snippets-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,code-snippets-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/code-snippets-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "code-snippets-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codecolorer-6a2386cdcd3910d335805b9ddf952385.yaml b/nuclei-templates/cve-less/plugins/codecolorer-6a2386cdcd3910d335805b9ddf952385.yaml new file mode 100644 index 0000000000..1e35f5bea1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codecolorer-6a2386cdcd3910d335805b9ddf952385.yaml @@ -0,0 +1,58 @@ +id: codecolorer-6a2386cdcd3910d335805b9ddf952385 + +info: + name: > + CodeColorer <= 0.10.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c78ec44e-c3e4-410e-9937-46657664d6cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codecolorer/" + google-query: inurl:"/wp-content/plugins/codecolorer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codecolorer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codecolorer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codecolorer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codeflavors-vimeo-video-post-lite-d5eb243a63ca847d2586e41fb57f6f14.yaml b/nuclei-templates/cve-less/plugins/codeflavors-vimeo-video-post-lite-d5eb243a63ca847d2586e41fb57f6f14.yaml new file mode 100644 index 0000000000..22d39bca39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codeflavors-vimeo-video-post-lite-d5eb243a63ca847d2586e41fb57f6f14.yaml @@ -0,0 +1,58 @@ +id: codeflavors-vimeo-video-post-lite-d5eb243a63ca847d2586e41fb57f6f14 + +info: + name: > + Vimeotheque <= 2.2.1 - Reflected Cross-Site Scripting via 'view' and 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72256ac2-72a7-4c3c-a892-1f1795671c5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codeflavors-vimeo-video-post-lite/" + google-query: inurl:"/wp-content/plugins/codeflavors-vimeo-video-post-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codeflavors-vimeo-video-post-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codeflavors-vimeo-video-post-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codeflavors-vimeo-video-post-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codelights-shortcodes-and-widgets-4f0e3223d5ea7b01c767c6e564ea2ada.yaml b/nuclei-templates/cve-less/plugins/codelights-shortcodes-and-widgets-4f0e3223d5ea7b01c767c6e564ea2ada.yaml new file mode 100644 index 0000000000..ae4b07b326 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codelights-shortcodes-and-widgets-4f0e3223d5ea7b01c767c6e564ea2ada.yaml @@ -0,0 +1,58 @@ +id: codelights-shortcodes-and-widgets-4f0e3223d5ea7b01c767c6e564ea2ada + +info: + name: > + Sidebar Widgets by CodeLights <= 1.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3feb84c9-fc98-4f59-a124-b6434e5b8a44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codelights-shortcodes-and-widgets/" + google-query: inurl:"/wp-content/plugins/codelights-shortcodes-and-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codelights-shortcodes-and-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codelights-shortcodes-and-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codelights-shortcodes-and-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codelights-shortcodes-and-widgets-5a9c4861ed09ce785a6f69836ddbac67.yaml b/nuclei-templates/cve-less/plugins/codelights-shortcodes-and-widgets-5a9c4861ed09ce785a6f69836ddbac67.yaml new file mode 100644 index 0000000000..8442b530ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codelights-shortcodes-and-widgets-5a9c4861ed09ce785a6f69836ddbac67.yaml @@ -0,0 +1,58 @@ +id: codelights-shortcodes-and-widgets-5a9c4861ed09ce785a6f69836ddbac67 + +info: + name: > + Sidebar Widgets by CodeLights <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baee7e34-0ed0-4702-9ccc-94177b6284c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codelights-shortcodes-and-widgets/" + google-query: inurl:"/wp-content/plugins/codelights-shortcodes-and-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codelights-shortcodes-and-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codelights-shortcodes-and-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codelights-shortcodes-and-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codepeople-post-map-1123677072a0d47589707f79eb0e7e54.yaml b/nuclei-templates/cve-less/plugins/codepeople-post-map-1123677072a0d47589707f79eb0e7e54.yaml new file mode 100644 index 0000000000..f2db53b235 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codepeople-post-map-1123677072a0d47589707f79eb0e7e54.yaml @@ -0,0 +1,58 @@ +id: codepeople-post-map-1123677072a0d47589707f79eb0e7e54 + +info: + name: > + Google Maps CP <= 1.0.43 - Missing Authorization to Authenticated (Subscriber+) Feedback Form Submission + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc9a2639-cec8-408e-9ba2-ffb6c8c7da21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codepeople-post-map/" + google-query: inurl:"/wp-content/plugins/codepeople-post-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codepeople-post-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codepeople-post-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codepeople-post-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codepeople-post-map-d5c941a5e08fc52cf3fcc7e08e2232da.yaml b/nuclei-templates/cve-less/plugins/codepeople-post-map-d5c941a5e08fc52cf3fcc7e08e2232da.yaml new file mode 100644 index 0000000000..a8e4fce9e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codepeople-post-map-d5c941a5e08fc52cf3fcc7e08e2232da.yaml @@ -0,0 +1,58 @@ +id: codepeople-post-map-d5c941a5e08fc52cf3fcc7e08e2232da + +info: + name: > + Google Maps CP <= 1.0.43 - Cross-Site Request Forgery via feedback_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4aed6ba-23a2-46b6-b7e1-7b7e462b1f5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codepeople-post-map/" + google-query: inurl:"/wp-content/plugins/codepeople-post-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codepeople-post-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codepeople-post-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codepeople-post-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codepress-admin-columns-1b44920a5aedb519e7cd543d04a01fe4.yaml b/nuclei-templates/cve-less/plugins/codepress-admin-columns-1b44920a5aedb519e7cd543d04a01fe4.yaml new file mode 100644 index 0000000000..51b12c2061 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codepress-admin-columns-1b44920a5aedb519e7cd543d04a01fe4.yaml @@ -0,0 +1,58 @@ +id: codepress-admin-columns-1b44920a5aedb519e7cd543d04a01fe4 + +info: + name: > + Admin Columns <= 3.4.6 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79ae6c3e-5584-448b-a5c5-0a105377b81d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codepress-admin-columns/" + google-query: inurl:"/wp-content/plugins/codepress-admin-columns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codepress-admin-columns,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codepress-admin-columns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codepress-admin-columns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codepress-admin-columns-2cf825b0502a2430e12833bc820c6234.yaml b/nuclei-templates/cve-less/plugins/codepress-admin-columns-2cf825b0502a2430e12833bc820c6234.yaml new file mode 100644 index 0000000000..ff677051bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codepress-admin-columns-2cf825b0502a2430e12833bc820c6234.yaml @@ -0,0 +1,58 @@ +id: codepress-admin-columns-2cf825b0502a2430e12833bc820c6234 + +info: + name: > + Admin Columns Free < 4.3 and Pro < 5.5.1 Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/067a5f6c-7ad1-49ac-a581-b50fa89a5f39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codepress-admin-columns/" + google-query: inurl:"/wp-content/plugins/codepress-admin-columns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codepress-admin-columns,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codepress-admin-columns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codepress-admin-columns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codepress-admin-columns-9a1ea12529e15f0a017ce8f0e47401f6.yaml b/nuclei-templates/cve-less/plugins/codepress-admin-columns-9a1ea12529e15f0a017ce8f0e47401f6.yaml new file mode 100644 index 0000000000..1e31cc595a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codepress-admin-columns-9a1ea12529e15f0a017ce8f0e47401f6.yaml @@ -0,0 +1,58 @@ +id: codepress-admin-columns-9a1ea12529e15f0a017ce8f0e47401f6 + +info: + name: > + Admin Columns Free < 4.3.2 and Pro < 5.5.2 Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69654827-842f-483d-ae4c-b9c7ae271f82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codepress-admin-columns/" + google-query: inurl:"/wp-content/plugins/codepress-admin-columns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codepress-admin-columns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codepress-admin-columns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codepress-admin-columns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codestyling-localization-4f6e39e80416a527c850a1165c7ace82.yaml b/nuclei-templates/cve-less/plugins/codestyling-localization-4f6e39e80416a527c850a1165c7ace82.yaml new file mode 100644 index 0000000000..40c0a462dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codestyling-localization-4f6e39e80416a527c850a1165c7ace82.yaml @@ -0,0 +1,58 @@ +id: codestyling-localization-4f6e39e80416a527c850a1165c7ace82 + +info: + name: > + Code Styling Localization <= 1.99.19 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d53069a3-5b8e-4ee1-b4da-97ff8f58ab03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codestyling-localization/" + google-query: inurl:"/wp-content/plugins/codestyling-localization/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codestyling-localization,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codestyling-localization/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codestyling-localization" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.99.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codestyling-localization-ddc63b74125a60840010b54470ac437e.yaml b/nuclei-templates/cve-less/plugins/codestyling-localization-ddc63b74125a60840010b54470ac437e.yaml new file mode 100644 index 0000000000..df86121c75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codestyling-localization-ddc63b74125a60840010b54470ac437e.yaml @@ -0,0 +1,58 @@ +id: codestyling-localization-ddc63b74125a60840010b54470ac437e + +info: + name: > + Codestyling Localization <= 1.99.30 - Cross-Site Request Forgery to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed2796b0-0667-451d-9208-272651bc6a4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codestyling-localization/" + google-query: inurl:"/wp-content/plugins/codestyling-localization/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codestyling-localization,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codestyling-localization/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codestyling-localization" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.99.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coditor-3030bade61470958bdc416b0e2c89b83.yaml b/nuclei-templates/cve-less/plugins/coditor-3030bade61470958bdc416b0e2c89b83.yaml new file mode 100644 index 0000000000..e6125abb03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coditor-3030bade61470958bdc416b0e2c89b83.yaml @@ -0,0 +1,58 @@ +id: coditor-3030bade61470958bdc416b0e2c89b83 + +info: + name: > + Coditor <= 1.1 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08e9e7f4-0f25-4bc1-85b7-4b504ed38582?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coditor/" + google-query: inurl:"/wp-content/plugins/coditor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coditor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coditor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coditor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codup-read-only-admin-e0006b9b22f8ac4f0ab20b6b14560c09.yaml b/nuclei-templates/cve-less/plugins/codup-read-only-admin-e0006b9b22f8ac4f0ab20b6b14560c09.yaml new file mode 100644 index 0000000000..060c53d219 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codup-read-only-admin-e0006b9b22f8ac4f0ab20b6b14560c09.yaml @@ -0,0 +1,58 @@ +id: codup-read-only-admin-e0006b9b22f8ac4f0ab20b6b14560c09 + +info: + name: > + Codup Read Only Admin <= 1.1.1.7 - Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2760f65-a981-42f6-b18c-fcf493bd34b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codup-read-only-admin/" + google-query: inurl:"/wp-content/plugins/codup-read-only-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codup-read-only-admin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codup-read-only-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codup-read-only-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codup-woocommerce-dynamic-pricing-table-view-9a51dd537aff6d05f9d6a7c50a359270.yaml b/nuclei-templates/cve-less/plugins/codup-woocommerce-dynamic-pricing-table-view-9a51dd537aff6d05f9d6a7c50a359270.yaml new file mode 100644 index 0000000000..3ba586d225 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codup-woocommerce-dynamic-pricing-table-view-9a51dd537aff6d05f9d6a7c50a359270.yaml @@ -0,0 +1,58 @@ +id: codup-woocommerce-dynamic-pricing-table-view-9a51dd537aff6d05f9d6a7c50a359270 + +info: + name: > + Codup WooCommerce Dynamic Pricing Table View <= 1.2.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ba416c5-47d6-4b05-8a31-af9137e04d2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codup-woocommerce-dynamic-pricing-table-view/" + google-query: inurl:"/wp-content/plugins/codup-woocommerce-dynamic-pricing-table-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codup-woocommerce-dynamic-pricing-table-view,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codup-woocommerce-dynamic-pricing-table-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codup-woocommerce-dynamic-pricing-table-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/codup-wp-freshsales-0a55644b51a5df02f2cc7d960c48224c.yaml b/nuclei-templates/cve-less/plugins/codup-wp-freshsales-0a55644b51a5df02f2cc7d960c48224c.yaml new file mode 100644 index 0000000000..b841cc6a25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/codup-wp-freshsales-0a55644b51a5df02f2cc7d960c48224c.yaml @@ -0,0 +1,58 @@ +id: codup-wp-freshsales-0a55644b51a5df02f2cc7d960c48224c + +info: + name: > + WordPress to Freshsales Integration <= 1.3.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24759d97-2b00-4812-8407-640b545a235a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/codup-wp-freshsales/" + google-query: inurl:"/wp-content/plugins/codup-wp-freshsales/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,codup-wp-freshsales,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/codup-wp-freshsales/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "codup-wp-freshsales" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-01e0b89afcfee7ee0b87257825f06c59.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-01e0b89afcfee7ee0b87257825f06c59.yaml new file mode 100644 index 0000000000..302772dd2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-01e0b89afcfee7ee0b87257825f06c59.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-01e0b89afcfee7ee0b87257825f06c59 + +info: + name: > + Colibri Page Builder <= 1.0.272 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'colibri_breadcrumb_element' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ae4226-0089-47fb-87b9-94e9faf764e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.272') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-06110f65fe21eb76cccfd39d7f91d25b.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-06110f65fe21eb76cccfd39d7f91d25b.yaml new file mode 100644 index 0000000000..914a83820e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-06110f65fe21eb76cccfd39d7f91d25b.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-06110f65fe21eb76cccfd39d7f91d25b + +info: + name: > + Colibri Page Builder <= 1.0.253 - Cross-Site Request Fogery via cp_shortcode_refresh + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5e7a994-c489-4aea-a9bb-898bc92cae4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.253') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-21f9461e5270818af4357d314ab90f57.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-21f9461e5270818af4357d314ab90f57.yaml new file mode 100644 index 0000000000..c9073e278c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-21f9461e5270818af4357d314ab90f57.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-21f9461e5270818af4357d314ab90f57 + +info: + name: > + Colibri Page Builder <= 1.0.248 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9759e1f0-e134-4c7f-88aa-63dbae7067f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.248') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-29c3e0ef4de33c7a54c9e5adeed782a1.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-29c3e0ef4de33c7a54c9e5adeed782a1.yaml new file mode 100644 index 0000000000..2bc12f160b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-29c3e0ef4de33c7a54c9e5adeed782a1.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-29c3e0ef4de33c7a54c9e5adeed782a1 + +info: + name: > + Colibri Page Builder <= 1.0.227 - Authenticated (Administrator+) SQL Injection via post_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c73d4b78-72aa-409a-a787-898179773b82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.227') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-3bb3b1b877c8539475d5edd92db3636e.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-3bb3b1b877c8539475d5edd92db3636e.yaml new file mode 100644 index 0000000000..e01c4679fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-3bb3b1b877c8539475d5edd92db3636e.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-3bb3b1b877c8539475d5edd92db3636e + +info: + name: > + Colibri Page Builder <= 1.0.263 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9466e5f-d8eb-4de4-a1d2-e5ef15bf1e4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.263') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-411de6e419140a33390e4cf84e25eb26.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-411de6e419140a33390e4cf84e25eb26.yaml new file mode 100644 index 0000000000..d5275026ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-411de6e419140a33390e4cf84e25eb26.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-411de6e419140a33390e4cf84e25eb26 + +info: + name: > + Colibri Page Builder <= 1.0.239 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/300b24af-10a1-45b9-87ec-7c98dc94e76b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.239') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-461ccdb0bda3c12c709b07472ce088e7.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-461ccdb0bda3c12c709b07472ce088e7.yaml new file mode 100644 index 0000000000..c4d2efe180 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-461ccdb0bda3c12c709b07472ce088e7.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-461ccdb0bda3c12c709b07472ce088e7 + +info: + name: > + Colibri Page Builder <= 1.0.253 - Cross-Site Request Fogery via extend_builder + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/233a29f5-12bf-4849-9b28-4458a0b0c940?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.253') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-72c77f134254f33afbd956d2661ee799.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-72c77f134254f33afbd956d2661ee799.yaml new file mode 100644 index 0000000000..bb362b76d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-72c77f134254f33afbd956d2661ee799.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-72c77f134254f33afbd956d2661ee799 + +info: + name: > + Colibri Page Builder <= 1.0.272 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'colibri-gallery-slideshow' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5ba832e-98bc-421d-9b60-e6260c408815?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.272') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-7af76cb753c181fa25d318d1a52543d2.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-7af76cb753c181fa25d318d1a52543d2.yaml new file mode 100644 index 0000000000..431fab3aec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-7af76cb753c181fa25d318d1a52543d2.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-7af76cb753c181fa25d318d1a52543d2 + +info: + name: > + Colibri Page Builder <= 1.0.260 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/130637ce-d70a-4831-8b88-a2a6e8a95c42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.260') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-aaee16898f3cb4f4d7a9fcaef31839c3.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-aaee16898f3cb4f4d7a9fcaef31839c3.yaml new file mode 100644 index 0000000000..7cf33a6839 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-aaee16898f3cb4f4d7a9fcaef31839c3.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-aaee16898f3cb4f4d7a9fcaef31839c3 + +info: + name: > + Colibri Page Builder <= 1.0.240 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/532d185c-4384-4b15-a104-42f8d2a1ca23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.240') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colibri-page-builder-f731e8529b33108bde99e03616dec459.yaml b/nuclei-templates/cve-less/plugins/colibri-page-builder-f731e8529b33108bde99e03616dec459.yaml new file mode 100644 index 0000000000..fc2473aa56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colibri-page-builder-f731e8529b33108bde99e03616dec459.yaml @@ -0,0 +1,58 @@ +id: colibri-page-builder-f731e8529b33108bde99e03616dec459 + +info: + name: > + Colibri Page Builder <= 1.0.262 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a066eae-4040-4d76-b730-47d98dc37662?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colibri-page-builder/" + google-query: inurl:"/wp-content/plugins/colibri-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colibri-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colibri-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.262') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/collage-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/collage-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e810cbe070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/collage-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: collage-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/collage-for-divi/" + google-query: inurl:"/wp-content/plugins/collage-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,collage-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/collage-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "collage-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/collect-and-deliver-interface-for-woocommerce-ac850d5730363d3bbd84ae6609135f15.yaml b/nuclei-templates/cve-less/plugins/collect-and-deliver-interface-for-woocommerce-ac850d5730363d3bbd84ae6609135f15.yaml new file mode 100644 index 0000000000..00b123deae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/collect-and-deliver-interface-for-woocommerce-ac850d5730363d3bbd84ae6609135f15.yaml @@ -0,0 +1,58 @@ +id: collect-and-deliver-interface-for-woocommerce-ac850d5730363d3bbd84ae6609135f15 + +info: + name: > + CDI – Collect and Deliver Interface for Woocommerce <= 5.1.9 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94c2dab9-40b3-4863-a5f3-fcaba10d2e20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/collect-and-deliver-interface-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/collect-and-deliver-interface-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,collect-and-deliver-interface-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/collect-and-deliver-interface-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "collect-and-deliver-interface-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/collectchat-a85aa1b9a47ecb9d1b901a00495b06ae.yaml b/nuclei-templates/cve-less/plugins/collectchat-a85aa1b9a47ecb9d1b901a00495b06ae.yaml new file mode 100644 index 0000000000..8d7200be21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/collectchat-a85aa1b9a47ecb9d1b901a00495b06ae.yaml @@ -0,0 +1,58 @@ +id: collectchat-a85aa1b9a47ecb9d1b901a00495b06ae + +info: + name: > + collectchat <= 2.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5afb3c3a-17d1-4cfb-9058-ae6a58e04c6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/collectchat/" + google-query: inurl:"/wp-content/plugins/collectchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,collectchat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/collectchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "collectchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/collectchat-fdf2ccd0e27bd38fe570f70f1b82c105.yaml b/nuclei-templates/cve-less/plugins/collectchat-fdf2ccd0e27bd38fe570f70f1b82c105.yaml new file mode 100644 index 0000000000..eb3f26a8d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/collectchat-fdf2ccd0e27bd38fe570f70f1b82c105.yaml @@ -0,0 +1,58 @@ +id: collectchat-fdf2ccd0e27bd38fe570f70f1b82c105 + +info: + name: > + Chatbot for WordPress <= 2.3.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfd67329-11b1-4f00-a422-bb4833a3181d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/collectchat/" + google-query: inurl:"/wp-content/plugins/collectchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,collectchat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/collectchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "collectchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/college-publisher-import-c719c1fa9d94cb4a4d6e24f4ded47412.yaml b/nuclei-templates/cve-less/plugins/college-publisher-import-c719c1fa9d94cb4a4d6e24f4ded47412.yaml new file mode 100644 index 0000000000..9130acd689 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/college-publisher-import-c719c1fa9d94cb4a4d6e24f4ded47412.yaml @@ -0,0 +1,58 @@ +id: college-publisher-import-c719c1fa9d94cb4a4d6e24f4ded47412 + +info: + name: > + College publisher Import <= 0.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2849cb5-9277-460d-a429-6253c98c1554?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/college-publisher-import/" + google-query: inurl:"/wp-content/plugins/college-publisher-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,college-publisher-import,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/college-publisher-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "college-publisher-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colorful-categories-ce863d77586ccc4b8e169d7ca2f897a8.yaml b/nuclei-templates/cve-less/plugins/colorful-categories-ce863d77586ccc4b8e169d7ca2f897a8.yaml new file mode 100644 index 0000000000..ecc5c72d49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colorful-categories-ce863d77586ccc4b8e169d7ca2f897a8.yaml @@ -0,0 +1,58 @@ +id: colorful-categories-ce863d77586ccc4b8e169d7ca2f897a8 + +info: + name: > + Colorful Categories < 2.0.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62988723-4e58-4eb3-a483-127b23574a40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colorful-categories/" + google-query: inurl:"/wp-content/plugins/colorful-categories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colorful-categories,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colorful-categories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colorful-categories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colorlib-coming-soon-maintenance-699697d906ce98da7e0a75001998e24b.yaml b/nuclei-templates/cve-less/plugins/colorlib-coming-soon-maintenance-699697d906ce98da7e0a75001998e24b.yaml new file mode 100644 index 0000000000..c6c040fba6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colorlib-coming-soon-maintenance-699697d906ce98da7e0a75001998e24b.yaml @@ -0,0 +1,58 @@ +id: colorlib-coming-soon-maintenance-699697d906ce98da7e0a75001998e24b + +info: + name: > + Coming Soon & Maintenance Mode by Colorlib <= 1.0.98 - Administrator+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e85df0dc-d3da-4503-9249-939bb36f18ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colorlib-coming-soon-maintenance/" + google-query: inurl:"/wp-content/plugins/colorlib-coming-soon-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colorlib-coming-soon-maintenance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colorlib-coming-soon-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colorlib-coming-soon-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/colorlib-coming-soon-maintenance-a149337d8133aa025f4ace42f65c06da.yaml b/nuclei-templates/cve-less/plugins/colorlib-coming-soon-maintenance-a149337d8133aa025f4ace42f65c06da.yaml new file mode 100644 index 0000000000..3a58403bc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/colorlib-coming-soon-maintenance-a149337d8133aa025f4ace42f65c06da.yaml @@ -0,0 +1,58 @@ +id: colorlib-coming-soon-maintenance-a149337d8133aa025f4ace42f65c06da + +info: + name: > + Coming Soon & Maintenance Mode by Colorlib <= 1.0.99 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48dc10a9-7bb9-401f-befd-1bf620858825?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/colorlib-coming-soon-maintenance/" + google-query: inurl:"/wp-content/plugins/colorlib-coming-soon-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,colorlib-coming-soon-maintenance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/colorlib-coming-soon-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colorlib-coming-soon-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/column-matic-468f187fbaef8b522a9247e1a677ec05.yaml b/nuclei-templates/cve-less/plugins/column-matic-468f187fbaef8b522a9247e1a677ec05.yaml new file mode 100644 index 0000000000..ea5d5ad11f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/column-matic-468f187fbaef8b522a9247e1a677ec05.yaml @@ -0,0 +1,58 @@ +id: column-matic-468f187fbaef8b522a9247e1a677ec05 + +info: + name: > + Column-Matic <= 1.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dc640c8-3740-4770-b729-fb45ecec2b45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/column-matic/" + google-query: inurl:"/wp-content/plugins/column-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,column-matic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/column-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "column-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comic-easel-919a5f84339755a5d7406eb8d1eb9388.yaml b/nuclei-templates/cve-less/plugins/comic-easel-919a5f84339755a5d7406eb8d1eb9388.yaml new file mode 100644 index 0000000000..6befed762a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comic-easel-919a5f84339755a5d7406eb8d1eb9388.yaml @@ -0,0 +1,58 @@ +id: comic-easel-919a5f84339755a5d7406eb8d1eb9388 + +info: + name: > + Comic Easel <= 1.15 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d38cf4d5-a2b3-46c7-9cbc-777ebf6a68be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comic-easel/" + google-query: inurl:"/wp-content/plugins/comic-easel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comic-easel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comic-easel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comic-easel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comicbookmanagementsystemweeklypicks-d103dcd12252c06ef076f4cb74df842f.yaml b/nuclei-templates/cve-less/plugins/comicbookmanagementsystemweeklypicks-d103dcd12252c06ef076f4cb74df842f.yaml new file mode 100644 index 0000000000..87a22e32ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comicbookmanagementsystemweeklypicks-d103dcd12252c06ef076f4cb74df842f.yaml @@ -0,0 +1,58 @@ +id: comicbookmanagementsystemweeklypicks-d103dcd12252c06ef076f4cb74df842f + +info: + name: > + Comic Book Management System < 2.2.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c387a20-47dd-42d9-bf22-a28c613c5bde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comicbookmanagementsystemweeklypicks/" + google-query: inurl:"/wp-content/plugins/comicbookmanagementsystemweeklypicks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comicbookmanagementsystemweeklypicks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comicbookmanagementsystemweeklypicks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comicbookmanagementsystemweeklypicks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-a811d729e46b4e2f338038f266981191.yaml b/nuclei-templates/cve-less/plugins/coming-soon-a811d729e46b4e2f338038f266981191.yaml new file mode 100644 index 0000000000..c6fd53893b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-a811d729e46b4e2f338038f266981191.yaml @@ -0,0 +1,58 @@ +id: coming-soon-a811d729e46b4e2f338038f266981191 + +info: + name: > + Website Builder by SeedProd <= 6.15.13.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cb5370f-14aa-445d-bda3-62a0dd068fc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon/" + google-query: inurl:"/wp-content/plugins/coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.15.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-by-supsystic-40172980791539d9cbc1458226ed5fdf.yaml b/nuclei-templates/cve-less/plugins/coming-soon-by-supsystic-40172980791539d9cbc1458226ed5fdf.yaml new file mode 100644 index 0000000000..2981ac6901 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-by-supsystic-40172980791539d9cbc1458226ed5fdf.yaml @@ -0,0 +1,58 @@ +id: coming-soon-by-supsystic-40172980791539d9cbc1458226ed5fdf + +info: + name: > + Coming Soon by Supsystic <= 1.7.10 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29e49f76-9769-41c9-aeed-9e2857ebbd25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-by-supsystic/" + google-query: inurl:"/wp-content/plugins/coming-soon-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-by-supsystic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-by-supsystic-c5f1b8086e41aba21eb0fa4dcda314d9.yaml b/nuclei-templates/cve-less/plugins/coming-soon-by-supsystic-c5f1b8086e41aba21eb0fa4dcda314d9.yaml new file mode 100644 index 0000000000..640c2c8763 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-by-supsystic-c5f1b8086e41aba21eb0fa4dcda314d9.yaml @@ -0,0 +1,58 @@ +id: coming-soon-by-supsystic-c5f1b8086e41aba21eb0fa4dcda314d9 + +info: + name: > + Coming Soon by Supsystic <= 1.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48ebeb6a-c585-4ddc-92ab-144f66193991?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-by-supsystic/" + google-query: inurl:"/wp-content/plugins/coming-soon-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-c76087a23749b6d57d9ddfc097bcae08.yaml b/nuclei-templates/cve-less/plugins/coming-soon-c76087a23749b6d57d9ddfc097bcae08.yaml new file mode 100644 index 0000000000..1bd2a70c0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-c76087a23749b6d57d9ddfc097bcae08.yaml @@ -0,0 +1,58 @@ +id: coming-soon-c76087a23749b6d57d9ddfc097bcae08 + +info: + name: > + Coming Soon Page, Under Construction & Maintenance Mode by SeedProd <= 6.15.20 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60c6c9a8-e04d-49e2-96e8-16d7580a3e2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon/" + google-query: inurl:"/wp-content/plugins/coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.15.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-dc8b61de30b02b2cff6abe2f9142cec9.yaml b/nuclei-templates/cve-less/plugins/coming-soon-dc8b61de30b02b2cff6abe2f9142cec9.yaml new file mode 100644 index 0000000000..da2b584b79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-dc8b61de30b02b2cff6abe2f9142cec9.yaml @@ -0,0 +1,58 @@ +id: coming-soon-dc8b61de30b02b2cff6abe2f9142cec9 + +info: + name: > + Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode <= 6.15.21 - Missing Authorization via seedprod_lite_new_lpage + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78d7920b-3e20-43c7-a522-72bac824c2cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon/" + google-query: inurl:"/wp-content/plugins/coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.15.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-fbe96ae280b99abe5e90ec130aefb23d.yaml b/nuclei-templates/cve-less/plugins/coming-soon-fbe96ae280b99abe5e90ec130aefb23d.yaml new file mode 100644 index 0000000000..ffdf2b4c89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-fbe96ae280b99abe5e90ec130aefb23d.yaml @@ -0,0 +1,58 @@ +id: coming-soon-fbe96ae280b99abe5e90ec130aefb23d + +info: + name: > + Coming Soon Page by SeedProd <= 5.1.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caa0f581-3fe8-4b9f-b69c-ec38ee25d697?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon/" + google-query: inurl:"/wp-content/plugins/coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-09f85e9adfb4624c22adfc3bca4cbc18.yaml b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-09f85e9adfb4624c22adfc3bca4cbc18.yaml new file mode 100644 index 0000000000..335fcd0559 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-09f85e9adfb4624c22adfc3bca4cbc18.yaml @@ -0,0 +1,58 @@ +id: coming-soon-maintenance-mode-09f85e9adfb4624c22adfc3bca4cbc18 + +info: + name: > + Coming Soon Maintenance Mode <= 1.0.5 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44e4a1a3-71d0-4cad-9807-f6bbc99ccb13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/coming-soon-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-801d1a90cceafe559a3466d4f67a8f10.yaml b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-801d1a90cceafe559a3466d4f67a8f10.yaml new file mode 100644 index 0000000000..bc33034998 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-801d1a90cceafe559a3466d4f67a8f10.yaml @@ -0,0 +1,58 @@ +id: coming-soon-maintenance-mode-from-acurax-801d1a90cceafe559a3466d4f67a8f10 + +info: + name: > + Under Construction / Maintenance Mode from Acurax <= 2.6 - Authenticated (Subscriber+) Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a75f4eb-698b-4c92-9829-de6c55e21ecb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-maintenance-mode-from-acurax/" + google-query: inurl:"/wp-content/plugins/coming-soon-maintenance-mode-from-acurax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-maintenance-mode-from-acurax,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-maintenance-mode-from-acurax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-maintenance-mode-from-acurax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-89444fbeceae5055dd4381ae452bd0d1.yaml b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-89444fbeceae5055dd4381ae452bd0d1.yaml new file mode 100644 index 0000000000..3cae9fc273 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-89444fbeceae5055dd4381ae452bd0d1.yaml @@ -0,0 +1,58 @@ +id: coming-soon-maintenance-mode-from-acurax-89444fbeceae5055dd4381ae452bd0d1 + +info: + name: > + Under Construction / Maintenance Mode from Acurax <= 2.6 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f28c47e6-a37d-4328-afb2-6a9e6b3fe20a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-maintenance-mode-from-acurax/" + google-query: inurl:"/wp-content/plugins/coming-soon-maintenance-mode-from-acurax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-maintenance-mode-from-acurax,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-maintenance-mode-from-acurax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-maintenance-mode-from-acurax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-90c77c994b57286cd58b89b0a94442a5.yaml b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-90c77c994b57286cd58b89b0a94442a5.yaml new file mode 100644 index 0000000000..8c3f7562c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-from-acurax-90c77c994b57286cd58b89b0a94442a5.yaml @@ -0,0 +1,58 @@ +id: coming-soon-maintenance-mode-from-acurax-90c77c994b57286cd58b89b0a94442a5 + +info: + name: > + Under Construction / Maintenance Mode from Acurax <= 2.6 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/359b8977-6d0d-4856-8d72-17091a420f67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-maintenance-mode-from-acurax/" + google-query: inurl:"/wp-content/plugins/coming-soon-maintenance-mode-from-acurax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-maintenance-mode-from-acurax,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-maintenance-mode-from-acurax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-maintenance-mode-from-acurax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-ready-1e4dc9ccf87cc496477270093047f038.yaml b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-ready-1e4dc9ccf87cc496477270093047f038.yaml new file mode 100644 index 0000000000..ecfe8f0852 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-maintenance-mode-ready-1e4dc9ccf87cc496477270093047f038.yaml @@ -0,0 +1,58 @@ +id: coming-soon-maintenance-mode-ready-1e4dc9ccf87cc496477270093047f038 + +info: + name: > + Ready! Coming Soon <= 0.5.0 Stored Cross-Site Scripting and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/569c8faf-bd2a-4c61-a8c7-d4cab36e5727?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-maintenance-mode-ready/" + google-query: inurl:"/wp-content/plugins/coming-soon-maintenance-mode-ready/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-maintenance-mode-ready,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-maintenance-mode-ready/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-maintenance-mode-ready" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-page-03aed27f86819ca17f9267263897b2d4.yaml b/nuclei-templates/cve-less/plugins/coming-soon-page-03aed27f86819ca17f9267263897b2d4.yaml new file mode 100644 index 0000000000..7c3837cef1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-page-03aed27f86819ca17f9267263897b2d4.yaml @@ -0,0 +1,58 @@ +id: coming-soon-page-03aed27f86819ca17f9267263897b2d4 + +info: + name: > + Coming soon and Maintenance mode <= 3.6.7 - Cross-Site request Forgery to Arbitrary Email Send + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b83e971-7e97-47e3-81a5-ff357692bca2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-page/" + google-query: inurl:"/wp-content/plugins/coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-page-590623a5d7befa81a3dd4c5d938153e0.yaml b/nuclei-templates/cve-less/plugins/coming-soon-page-590623a5d7befa81a3dd4c5d938153e0.yaml new file mode 100644 index 0000000000..3f5cd1dcff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-page-590623a5d7befa81a3dd4c5d938153e0.yaml @@ -0,0 +1,58 @@ +id: coming-soon-page-590623a5d7befa81a3dd4c5d938153e0 + +info: + name: > + Coming soon and Maintenance mode <= 3.6.6 - Missing Authorization to Arbitrary Email Send + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e07649c0-b2eb-421b-95ae-a9530524470a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-page/" + google-query: inurl:"/wp-content/plugins/coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-page-604cc742b0731a1b0e3b91222daa2367.yaml b/nuclei-templates/cve-less/plugins/coming-soon-page-604cc742b0731a1b0e3b91222daa2367.yaml new file mode 100644 index 0000000000..319addf224 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-page-604cc742b0731a1b0e3b91222daa2367.yaml @@ -0,0 +1,58 @@ +id: coming-soon-page-604cc742b0731a1b0e3b91222daa2367 + +info: + name: > + Coming soon and Maintenance mode <= 3.5.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b59ac36c-41b7-46eb-9677-639e45187992?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-page/" + google-query: inurl:"/wp-content/plugins/coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-page-c6f17fa36993cabcda8dd7acf64ac9f3.yaml b/nuclei-templates/cve-less/plugins/coming-soon-page-c6f17fa36993cabcda8dd7acf64ac9f3.yaml new file mode 100644 index 0000000000..b6da40fc68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-page-c6f17fa36993cabcda8dd7acf64ac9f3.yaml @@ -0,0 +1,58 @@ +id: coming-soon-page-c6f17fa36993cabcda8dd7acf64ac9f3 + +info: + name: > + Coming soon and Maintenance mode <= 3.7.3 - IP Address Spoofing via get_real_ip + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fd9c076-d36c-4cda-b636-aa65195956d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-page/" + google-query: inurl:"/wp-content/plugins/coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-wp-22b32b6b74cc9eb676a736f279318419.yaml b/nuclei-templates/cve-less/plugins/coming-soon-wp-22b32b6b74cc9eb676a736f279318419.yaml new file mode 100644 index 0000000000..8e13064d2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-wp-22b32b6b74cc9eb676a736f279318419.yaml @@ -0,0 +1,58 @@ +id: coming-soon-wp-22b32b6b74cc9eb676a736f279318419 + +info: + name: > + Coming Soon, Under Construction & Maintenance Mode By Dazzler <= 2.1.2 - Maintenance Mode Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6dc144cd-7119-477f-9fa1-b00cab215077?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-wp/" + google-query: inurl:"/wp-content/plugins/coming-soon-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soon-wp-c725a8bb61c1af435931beba79cf59e0.yaml b/nuclei-templates/cve-less/plugins/coming-soon-wp-c725a8bb61c1af435931beba79cf59e0.yaml new file mode 100644 index 0000000000..c7f82074d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soon-wp-c725a8bb61c1af435931beba79cf59e0.yaml @@ -0,0 +1,58 @@ +id: coming-soon-wp-c725a8bb61c1af435931beba79cf59e0 + +info: + name: > + Coming Soon, Under Construction & Maintenance Mode By Dazzler <= 1.6.3 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e9506bd-10a6-40ab-8162-cf4fad9cb882?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soon-wp/" + google-query: inurl:"/wp-content/plugins/coming-soon-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soon-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soon-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soon-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coming-soons-943971993cbe3a7f3e1700395fdc37bf.yaml b/nuclei-templates/cve-less/plugins/coming-soons-943971993cbe3a7f3e1700395fdc37bf.yaml new file mode 100644 index 0000000000..06a3296088 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coming-soons-943971993cbe3a7f3e1700395fdc37bf.yaml @@ -0,0 +1,58 @@ +id: coming-soons-943971993cbe3a7f3e1700395fdc37bf + +info: + name: > + Coming Soon – Under Construction <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ff184e6-c36b-4bbb-8dc2-f87d1d800d53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coming-soons/" + google-query: inurl:"/wp-content/plugins/coming-soons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coming-soons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coming-soons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coming-soons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-attachment-9d710f138a80414743d12fd42c3bd26f.yaml b/nuclei-templates/cve-less/plugins/comment-attachment-9d710f138a80414743d12fd42c3bd26f.yaml new file mode 100644 index 0000000000..7d6764df5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-attachment-9d710f138a80414743d12fd42c3bd26f.yaml @@ -0,0 +1,58 @@ +id: comment-attachment-9d710f138a80414743d12fd42c3bd26f + +info: + name: > + Comment Attachment <= 1.5.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2c62f42-b649-4873-a330-4a0f268cab21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-attachment/" + google-query: inurl:"/wp-content/plugins/comment-attachment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-attachment,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-attachment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-attachment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-blacklist-updater-07a92bda75c6219e8b222de62ff37e0a.yaml b/nuclei-templates/cve-less/plugins/comment-blacklist-updater-07a92bda75c6219e8b222de62ff37e0a.yaml new file mode 100644 index 0000000000..07e89fe732 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-blacklist-updater-07a92bda75c6219e8b222de62ff37e0a.yaml @@ -0,0 +1,58 @@ +id: comment-blacklist-updater-07a92bda75c6219e8b222de62ff37e0a + +info: + name: > + Comment Blacklist Updater <= 1.1.0 - Cross-Site Request Forgery via update_blacklist_manual + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc7bab78-4ebb-4be9-8891-1ac0e3ed0af3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-blacklist-updater/" + google-query: inurl:"/wp-content/plugins/comment-blacklist-updater/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-blacklist-updater,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-blacklist-updater/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-blacklist-updater" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-engine-pro-2faa74d51969fb024a7d850a91d6917b.yaml b/nuclei-templates/cve-less/plugins/comment-engine-pro-2faa74d51969fb024a7d850a91d6917b.yaml new file mode 100644 index 0000000000..3087fa3abf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-engine-pro-2faa74d51969fb024a7d850a91d6917b.yaml @@ -0,0 +1,58 @@ +id: comment-engine-pro-2faa74d51969fb024a7d850a91d6917b + +info: + name: > + Comment Engine Pro <= 1.0 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bddba0a8-03cf-441f-9411-f770766b4f63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-engine-pro/" + google-query: inurl:"/wp-content/plugins/comment-engine-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-engine-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-engine-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-engine-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-extra-field-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/comment-extra-field-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..1e7dccaa67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-extra-field-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: comment-extra-field-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-extra-field/" + google-query: inurl:"/wp-content/plugins/comment-extra-field/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-extra-field,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-extra-field/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-extra-field" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-extra-field-f4996fd87f55d8cae08e1a7a083925f5.yaml b/nuclei-templates/cve-less/plugins/comment-extra-field-f4996fd87f55d8cae08e1a7a083925f5.yaml new file mode 100644 index 0000000000..245bc50dc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-extra-field-f4996fd87f55d8cae08e1a7a083925f5.yaml @@ -0,0 +1,58 @@ +id: comment-extra-field-f4996fd87f55d8cae08e1a7a083925f5 + +info: + name: > + Comment Extra Fields <= 1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7240711-e575-41ff-ba39-0255ca2aa9f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-extra-field/" + google-query: inurl:"/wp-content/plugins/comment-extra-field/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-extra-field,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-extra-field/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-extra-field" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-form-c25a227d2616b1e266b27ae90761f594.yaml b/nuclei-templates/cve-less/plugins/comment-form-c25a227d2616b1e266b27ae90761f594.yaml new file mode 100644 index 0000000000..96e81a4f06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-form-c25a227d2616b1e266b27ae90761f594.yaml @@ -0,0 +1,58 @@ +id: comment-form-c25a227d2616b1e266b27ae90761f594 + +info: + name: > + Advanced Comment Form <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd163f14-c638-4185-8e14-f3a03312ee42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-form/" + google-query: inurl:"/wp-content/plugins/comment-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-guestbook-8a14e10c4e61da2c2574a977cb4dd78d.yaml b/nuclei-templates/cve-less/plugins/comment-guestbook-8a14e10c4e61da2c2574a977cb4dd78d.yaml new file mode 100644 index 0000000000..420121f7fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-guestbook-8a14e10c4e61da2c2574a977cb4dd78d.yaml @@ -0,0 +1,58 @@ +id: comment-guestbook-8a14e10c4e61da2c2574a977cb4dd78d + +info: + name: > + Comment Guestbook <= 0.8.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d964e1e-6361-435b-8527-e241f5a28b0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-guestbook/" + google-query: inurl:"/wp-content/plugins/comment-guestbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-guestbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-guestbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-guestbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-highlighter-8912ce3f5c5896ec3ae73a9aecfa4081.yaml b/nuclei-templates/cve-less/plugins/comment-highlighter-8912ce3f5c5896ec3ae73a9aecfa4081.yaml new file mode 100644 index 0000000000..43447b890a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-highlighter-8912ce3f5c5896ec3ae73a9aecfa4081.yaml @@ -0,0 +1,58 @@ +id: comment-highlighter-8912ce3f5c5896ec3ae73a9aecfa4081 + +info: + name: > + Comment Highlighter <= 0.13 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48e3976a-5dfc-44f5-8d01-0bd1b68575be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-highlighter/" + google-query: inurl:"/wp-content/plugins/comment-highlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-highlighter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-highlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-highlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-license-1af6a7823a6a8a142bc89c08631d8f4b.yaml b/nuclei-templates/cve-less/plugins/comment-license-1af6a7823a6a8a142bc89c08631d8f4b.yaml new file mode 100644 index 0000000000..6b4f0c2f3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-license-1af6a7823a6a8a142bc89c08631d8f4b.yaml @@ -0,0 +1,58 @@ +id: comment-license-1af6a7823a6a8a142bc89c08631d8f4b + +info: + name: > + Comment License <= 1.3.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a88e8853-3a52-462b-bde8-658a794545dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-license/" + google-query: inurl:"/wp-content/plugins/comment-license/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-license,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-license/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-license" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-link-remove-7cee7594ab82d9cb202fec2e242ded86.yaml b/nuclei-templates/cve-less/plugins/comment-link-remove-7cee7594ab82d9cb202fec2e242ded86.yaml new file mode 100644 index 0000000000..95c8c43a06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-link-remove-7cee7594ab82d9cb202fec2e242ded86.yaml @@ -0,0 +1,58 @@ +id: comment-link-remove-7cee7594ab82d9cb202fec2e242ded86 + +info: + name: > + Comment Link Remove and Other Comment Tools <= 2.1.4 - Arbitrary Comment Deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9d63462-04ec-4b46-91cf-25b7dd098fc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-link-remove/" + google-query: inurl:"/wp-content/plugins/comment-link-remove/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-link-remove,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-link-remove/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-link-remove" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-press-7231043a73d9377b28caf26dc1e18122.yaml b/nuclei-templates/cve-less/plugins/comment-press-7231043a73d9377b28caf26dc1e18122.yaml new file mode 100644 index 0000000000..bce966153d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-press-7231043a73d9377b28caf26dc1e18122.yaml @@ -0,0 +1,58 @@ +id: comment-press-7231043a73d9377b28caf26dc1e18122 + +info: + name: > + Comment Press <= 2.7.1 - Cross-Frame Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a11216c-868c-4dd9-b6d5-2a772d7d303e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-press/" + google-query: inurl:"/wp-content/plugins/comment-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-press,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-rating-19129120e783dd9166bd324662106d86.yaml b/nuclei-templates/cve-less/plugins/comment-rating-19129120e783dd9166bd324662106d86.yaml new file mode 100644 index 0000000000..0576c08ec2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-rating-19129120e783dd9166bd324662106d86.yaml @@ -0,0 +1,58 @@ +id: comment-rating-19129120e783dd9166bd324662106d86 + +info: + name: > + Comment Rating <= 2.9.32 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05ea5a3c-084a-458f-b0b1-8a9b82e4656a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-rating/" + google-query: inurl:"/wp-content/plugins/comment-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-rating,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-reply-email-2958b08ce41d2a089d276808ef68e4bc.yaml b/nuclei-templates/cve-less/plugins/comment-reply-email-2958b08ce41d2a089d276808ef68e4bc.yaml new file mode 100644 index 0000000000..3a8baa3f56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-reply-email-2958b08ce41d2a089d276808ef68e4bc.yaml @@ -0,0 +1,58 @@ +id: comment-reply-email-2958b08ce41d2a089d276808ef68e4bc + +info: + name: > + Comment Reply Email <= 1.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba7d0ab4-55a5-47f4-b66e-27e963ab2268?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-reply-email/" + google-query: inurl:"/wp-content/plugins/comment-reply-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-reply-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-reply-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-reply-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comment-reply-notification-3aca7cdedcb176c4ccf669f0b5b15aaf.yaml b/nuclei-templates/cve-less/plugins/comment-reply-notification-3aca7cdedcb176c4ccf669f0b5b15aaf.yaml new file mode 100644 index 0000000000..198526686a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comment-reply-notification-3aca7cdedcb176c4ccf669f0b5b15aaf.yaml @@ -0,0 +1,58 @@ +id: comment-reply-notification-3aca7cdedcb176c4ccf669f0b5b15aaf + +info: + name: > + Comment Reply Notification <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27eb0101-b3d1-458d-b7d7-69d92e3a4bb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comment-reply-notification/" + google-query: inurl:"/wp-content/plugins/comment-reply-notification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comment-reply-notification,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comment-reply-notification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comment-reply-notification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/commentator-f1883ea786fe0aa097422eb19ac010d8.yaml b/nuclei-templates/cve-less/plugins/commentator-f1883ea786fe0aa097422eb19ac010d8.yaml new file mode 100644 index 0000000000..d85bcdf7c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/commentator-f1883ea786fe0aa097422eb19ac010d8.yaml @@ -0,0 +1,58 @@ +id: commentator-f1883ea786fe0aa097422eb19ac010d8 + +info: + name: > + Commentator < 2.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c55e1d38-081c-4ef6-aad7-04ef52c6bee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/commentator/" + google-query: inurl:"/wp-content/plugins/commentator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,commentator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/commentator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commentator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/commenter-emails-5a219153bb99d5d72b2a78882890f4e2.yaml b/nuclei-templates/cve-less/plugins/commenter-emails-5a219153bb99d5d72b2a78882890f4e2.yaml new file mode 100644 index 0000000000..26c7796a25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/commenter-emails-5a219153bb99d5d72b2a78882890f4e2.yaml @@ -0,0 +1,58 @@ +id: commenter-emails-5a219153bb99d5d72b2a78882890f4e2 + +info: + name: > + Commenter Emails <= 2.6.1 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faffd8e3-b110-4ba3-98c1-22aee7f19586?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/commenter-emails/" + google-query: inurl:"/wp-content/plugins/commenter-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,commenter-emails,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/commenter-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commenter-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/commenting-feature-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/commenting-feature-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0f17e96fe7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/commenting-feature-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: commenting-feature-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/commenting-feature/" + google-query: inurl:"/wp-content/plugins/commenting-feature/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,commenting-feature,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/commenting-feature/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commenting-feature" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/commentluv-1115fbab8a2d4cca53dfc23d9cb02714.yaml b/nuclei-templates/cve-less/plugins/commentluv-1115fbab8a2d4cca53dfc23d9cb02714.yaml new file mode 100644 index 0000000000..f90a09c38b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/commentluv-1115fbab8a2d4cca53dfc23d9cb02714.yaml @@ -0,0 +1,58 @@ +id: commentluv-1115fbab8a2d4cca53dfc23d9cb02714 + +info: + name: > + CommentLuv < 2.92.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8a8be59-d4c1-4cce-b474-8d885b4d89c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/commentluv/" + google-query: inurl:"/wp-content/plugins/commentluv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,commentluv,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/commentluv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commentluv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.92.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/commentluv-b5d9a629551e35099f17ad23fa529784.yaml b/nuclei-templates/cve-less/plugins/commentluv-b5d9a629551e35099f17ad23fa529784.yaml new file mode 100644 index 0000000000..535ae7f4f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/commentluv-b5d9a629551e35099f17ad23fa529784.yaml @@ -0,0 +1,58 @@ +id: commentluv-b5d9a629551e35099f17ad23fa529784 + +info: + name: > + CommentLuv <= 3.0.4 - Server Side Request Forgery via do_click + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eeef2a59-47a1-4d8d-b815-8c74cc608e6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/commentluv/" + google-query: inurl:"/wp-content/plugins/commentluv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,commentluv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/commentluv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commentluv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-from-facebook-cf20fa8408c9425d9c1e30f3c5cdbbda.yaml b/nuclei-templates/cve-less/plugins/comments-from-facebook-cf20fa8408c9425d9c1e30f3c5cdbbda.yaml new file mode 100644 index 0000000000..a42fbeb608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-from-facebook-cf20fa8408c9425d9c1e30f3c5cdbbda.yaml @@ -0,0 +1,58 @@ +id: comments-from-facebook-cf20fa8408c9425d9c1e30f3c5cdbbda + +info: + name: > + Social comments by WpDevArt <= 2.4.9 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e481c916-0789-4b04-a7f8-dbde554a5e8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-from-facebook/" + google-query: inurl:"/wp-content/plugins/comments-from-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-from-facebook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-from-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-from-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml b/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml new file mode 100644 index 0000000000..865707b66f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml @@ -0,0 +1,58 @@ +id: comments-import-export-woocommerce-0088814ed74fd156e9ee132de51ef1d2 + +info: + name: > + WebToffee Plugins <= (Various Versions) - Arbitrary User Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27ac48a7-52ee-46cb-a6d0-efbd2b516445?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-import-export-woocommerce/" + google-query: inurl:"/wp-content/plugins/comments-import-export-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-import-export-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-import-export-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-import-export-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-ad95e7e9eeb384d7cc8919d4327ff669.yaml b/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-ad95e7e9eeb384d7cc8919d4327ff669.yaml new file mode 100644 index 0000000000..bc80714ce7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-ad95e7e9eeb384d7cc8919d4327ff669.yaml @@ -0,0 +1,58 @@ +id: comments-import-export-woocommerce-ad95e7e9eeb384d7cc8919d4327ff669 + +info: + name: > + WordPress Comments Import & Export <= 2.0.4 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3011f85c-fa30-4ccf-b067-dba45e491acb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-import-export-woocommerce/" + google-query: inurl:"/wp-content/plugins/comments-import-export-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-import-export-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-import-export-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-import-export-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-df538269ee619b35cd6276912789d0c2.yaml b/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-df538269ee619b35cd6276912789d0c2.yaml new file mode 100644 index 0000000000..3ddfa5d4be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-df538269ee619b35cd6276912789d0c2.yaml @@ -0,0 +1,58 @@ +id: comments-import-export-woocommerce-df538269ee619b35cd6276912789d0c2 + +info: + name: > + WordPress Comments Import & Export <= 2.3.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5196a9f2-177d-48e1-b0dc-72e0727132d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-import-export-woocommerce/" + google-query: inurl:"/wp-content/plugins/comments-import-export-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-import-export-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-import-export-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-import-export-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-ec4b91dfb2713f41a9889afeb0c19f09.yaml b/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-ec4b91dfb2713f41a9889afeb0c19f09.yaml new file mode 100644 index 0000000000..0c540331c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-import-export-woocommerce-ec4b91dfb2713f41a9889afeb0c19f09.yaml @@ -0,0 +1,58 @@ +id: comments-import-export-woocommerce-ec4b91dfb2713f41a9889afeb0c19f09 + +info: + name: > + WordPress Comments Import & Export <= 2.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9269c3e7-2495-4665-ad08-d6dcf659db21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-import-export-woocommerce/" + google-query: inurl:"/wp-content/plugins/comments-import-export-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-import-export-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-import-export-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-import-export-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-like-dislike-42b4c4c9ef55b9cbba64c1b7340638c8.yaml b/nuclei-templates/cve-less/plugins/comments-like-dislike-42b4c4c9ef55b9cbba64c1b7340638c8.yaml new file mode 100644 index 0000000000..1e8a44dfc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-like-dislike-42b4c4c9ef55b9cbba64c1b7340638c8.yaml @@ -0,0 +1,58 @@ +id: comments-like-dislike-42b4c4c9ef55b9cbba64c1b7340638c8 + +info: + name: > + Comments Like Dislike <= 1.2.0 - Missing Authorization to Authenticated (Subscriber+) Plugin Setting Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66019297-a8a8-4bbc-99db-4b47066f3e50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-like-dislike/" + google-query: inurl:"/wp-content/plugins/comments-like-dislike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-like-dislike,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-like-dislike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-like-dislike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-like-dislike-857b0e2bae5fe7d9b0d48bfa9ff32d2c.yaml b/nuclei-templates/cve-less/plugins/comments-like-dislike-857b0e2bae5fe7d9b0d48bfa9ff32d2c.yaml new file mode 100644 index 0000000000..1f0146c0f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-like-dislike-857b0e2bae5fe7d9b0d48bfa9ff32d2c.yaml @@ -0,0 +1,58 @@ +id: comments-like-dislike-857b0e2bae5fe7d9b0d48bfa9ff32d2c + +info: + name: > + Comments Like Dislike <= 1.2.2 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33275cdc-21d4-42b7-bd0e-f5154faf2d6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-like-dislike/" + google-query: inurl:"/wp-content/plugins/comments-like-dislike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-like-dislike,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-like-dislike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-like-dislike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-like-dislike-c44115ca320af6609e9d0557523edcce.yaml b/nuclei-templates/cve-less/plugins/comments-like-dislike-c44115ca320af6609e9d0557523edcce.yaml new file mode 100644 index 0000000000..3d693444c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-like-dislike-c44115ca320af6609e9d0557523edcce.yaml @@ -0,0 +1,58 @@ +id: comments-like-dislike-c44115ca320af6609e9d0557523edcce + +info: + name: > + Comments Like Dislike <= 1.1.2 - Add Like/Dislike Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f71e60b9-68e9-408a-8047-7f74b7fb72b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-like-dislike/" + google-query: inurl:"/wp-content/plugins/comments-like-dislike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-like-dislike,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-like-dislike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-like-dislike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-not-replied-to-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/comments-not-replied-to-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bffb899d6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-not-replied-to-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: comments-not-replied-to-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-not-replied-to/" + google-query: inurl:"/wp-content/plugins/comments-not-replied-to/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-not-replied-to,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-not-replied-to/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-not-replied-to" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-ratings-8271075d3a50d2c7e6256973269145fa.yaml b/nuclei-templates/cve-less/plugins/comments-ratings-8271075d3a50d2c7e6256973269145fa.yaml new file mode 100644 index 0000000000..d8f70e06dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-ratings-8271075d3a50d2c7e6256973269145fa.yaml @@ -0,0 +1,58 @@ +id: comments-ratings-8271075d3a50d2c7e6256973269145fa + +info: + name: > + Comments Ratings <= 1.1.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8035484b-dc2f-4d54-802b-b09bd88a8bf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-ratings/" + google-query: inurl:"/wp-content/plugins/comments-ratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-ratings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-ratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-ratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-ratings-8c52e6f03af939f0f311c40af30d7f63.yaml b/nuclei-templates/cve-less/plugins/comments-ratings-8c52e6f03af939f0f311c40af30d7f63.yaml new file mode 100644 index 0000000000..262eb9d75a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-ratings-8c52e6f03af939f0f311c40af30d7f63.yaml @@ -0,0 +1,58 @@ +id: comments-ratings-8c52e6f03af939f0f311c40af30d7f63 + +info: + name: > + Comments Ratings <= 1.1.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5786b859-3ee9-45ab-8926-f4a09e323e3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-ratings/" + google-query: inurl:"/wp-content/plugins/comments-ratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-ratings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-ratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-ratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/comments-ratings-ce5f44b2a1a66b11d6fba979058869f7.yaml b/nuclei-templates/cve-less/plugins/comments-ratings-ce5f44b2a1a66b11d6fba979058869f7.yaml new file mode 100644 index 0000000000..63a7471a9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/comments-ratings-ce5f44b2a1a66b11d6fba979058869f7.yaml @@ -0,0 +1,58 @@ +id: comments-ratings-ce5f44b2a1a66b11d6fba979058869f7 + +info: + name: > + Comments Ratings <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bbf9526-1a82-496e-b762-6fa114ba8d46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/comments-ratings/" + google-query: inurl:"/wp-content/plugins/comments-ratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,comments-ratings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/comments-ratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "comments-ratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/commenttweets-92f3371642f241b95162e034abcbcb33.yaml b/nuclei-templates/cve-less/plugins/commenttweets-92f3371642f241b95162e034abcbcb33.yaml new file mode 100644 index 0000000000..6b6f79e3dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/commenttweets-92f3371642f241b95162e034abcbcb33.yaml @@ -0,0 +1,58 @@ +id: commenttweets-92f3371642f241b95162e034abcbcb33 + +info: + name: > + CommentTweets <= 0.6 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4aab594d-1901-4f88-874c-204578eebda0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/commenttweets/" + google-query: inurl:"/wp-content/plugins/commenttweets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,commenttweets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/commenttweets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commenttweets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/commerce-coinbase-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/commerce-coinbase-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..efb3ada673 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/commerce-coinbase-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: commerce-coinbase-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/commerce-coinbase-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/commerce-coinbase-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,commerce-coinbase-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/commerce-coinbase-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commerce-coinbase-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/commonsbooking-20bdb039adecbb0f3e200e117849b94d.yaml b/nuclei-templates/cve-less/plugins/commonsbooking-20bdb039adecbb0f3e200e117849b94d.yaml new file mode 100644 index 0000000000..fabab3e79d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/commonsbooking-20bdb039adecbb0f3e200e117849b94d.yaml @@ -0,0 +1,58 @@ +id: commonsbooking-20bdb039adecbb0f3e200e117849b94d + +info: + name: > + CommonsBooking < 2.6.8 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a260c173-9d3f-4b2d-b443-86488bd26292?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/commonsbooking/" + google-query: inurl:"/wp-content/plugins/commonsbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,commonsbooking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/commonsbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commonsbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/community-events-39d6469c1d7f12365cd669891d431a45.yaml b/nuclei-templates/cve-less/plugins/community-events-39d6469c1d7f12365cd669891d431a45.yaml new file mode 100644 index 0000000000..8e0113efaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/community-events-39d6469c1d7f12365cd669891d431a45.yaml @@ -0,0 +1,58 @@ +id: community-events-39d6469c1d7f12365cd669891d431a45 + +info: + name: > + Community Events < 1.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f6870fa-e11b-4d59-9008-8b156417e93b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/community-events/" + google-query: inurl:"/wp-content/plugins/community-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,community-events,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/community-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "community-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/community-events-6b9f6e01b27ac33a42a061d16a244031.yaml b/nuclei-templates/cve-less/plugins/community-events-6b9f6e01b27ac33a42a061d16a244031.yaml new file mode 100644 index 0000000000..a87d31d9b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/community-events-6b9f6e01b27ac33a42a061d16a244031.yaml @@ -0,0 +1,58 @@ +id: community-events-6b9f6e01b27ac33a42a061d16a244031 + +info: + name: > + Community Events <= 1.4.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a541f0db-d41f-4827-b311-815cab9f9bf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/community-events/" + google-query: inurl:"/wp-content/plugins/community-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,community-events,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/community-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "community-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/community-events-c74241ceba44be19e7ba6e8fb09c27d6.yaml b/nuclei-templates/cve-less/plugins/community-events-c74241ceba44be19e7ba6e8fb09c27d6.yaml new file mode 100644 index 0000000000..5b53d1355b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/community-events-c74241ceba44be19e7ba6e8fb09c27d6.yaml @@ -0,0 +1,58 @@ +id: community-events-c74241ceba44be19e7ba6e8fb09c27d6 + +info: + name: > + Community Events <= 1.4.8 - Authenticated (Administrator+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e2c40ea-5d0a-4f1c-99e8-ef0b54bbd20a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/community-events/" + google-query: inurl:"/wp-content/plugins/community-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,community-events,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/community-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "community-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/compact-wp-audio-player-313b605e10bb673c24b20248a65978eb.yaml b/nuclei-templates/cve-less/plugins/compact-wp-audio-player-313b605e10bb673c24b20248a65978eb.yaml new file mode 100644 index 0000000000..51657f3788 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/compact-wp-audio-player-313b605e10bb673c24b20248a65978eb.yaml @@ -0,0 +1,58 @@ +id: compact-wp-audio-player-313b605e10bb673c24b20248a65978eb + +info: + name: > + Compact WP Audio Player <= 1.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via fileurl + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4505b5a-de80-41e2-852f-d2290c1e42e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/compact-wp-audio-player/" + google-query: inurl:"/wp-content/plugins/compact-wp-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,compact-wp-audio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/compact-wp-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "compact-wp-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/compact-wp-audio-player-950a80cc7b38cd4c46587704ae88fbc4.yaml b/nuclei-templates/cve-less/plugins/compact-wp-audio-player-950a80cc7b38cd4c46587704ae88fbc4.yaml new file mode 100644 index 0000000000..4f80f498a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/compact-wp-audio-player-950a80cc7b38cd4c46587704ae88fbc4.yaml @@ -0,0 +1,58 @@ +id: compact-wp-audio-player-950a80cc7b38cd4c46587704ae88fbc4 + +info: + name: > + Compact WP Audio Player <= 1.9.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdaf7575-0f72-4436-8a37-b3001890b710?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/compact-wp-audio-player/" + google-query: inurl:"/wp-content/plugins/compact-wp-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,compact-wp-audio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/compact-wp-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "compact-wp-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/compact-wp-audio-player-bd35c1f22ebbbba8b36bd6df988b805a.yaml b/nuclei-templates/cve-less/plugins/compact-wp-audio-player-bd35c1f22ebbbba8b36bd6df988b805a.yaml new file mode 100644 index 0000000000..a7a83da5ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/compact-wp-audio-player-bd35c1f22ebbbba8b36bd6df988b805a.yaml @@ -0,0 +1,58 @@ +id: compact-wp-audio-player-bd35c1f22ebbbba8b36bd6df988b805a + +info: + name: > + Compact WP Audio Player <= 1.9.6 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86cee705-6874-4fcc-b13c-bd20f6e0704b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/compact-wp-audio-player/" + google-query: inurl:"/wp-content/plugins/compact-wp-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,compact-wp-audio-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/compact-wp-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "compact-wp-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/compact-wp-audio-player-ee5672596a78a94ff41b76c62c23328e.yaml b/nuclei-templates/cve-less/plugins/compact-wp-audio-player-ee5672596a78a94ff41b76c62c23328e.yaml new file mode 100644 index 0000000000..aa40d9f0da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/compact-wp-audio-player-ee5672596a78a94ff41b76c62c23328e.yaml @@ -0,0 +1,58 @@ +id: compact-wp-audio-player-ee5672596a78a94ff41b76c62c23328e + +info: + name: > + Compact WP Audio Player <= 1.9.6 - Setting Change via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d82ab22-da6d-4526-a70a-519589b29187?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/compact-wp-audio-player/" + google-query: inurl:"/wp-content/plugins/compact-wp-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,compact-wp-audio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/compact-wp-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "compact-wp-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/companion-auto-update-2bc216cec70480009970bca04436c777.yaml b/nuclei-templates/cve-less/plugins/companion-auto-update-2bc216cec70480009970bca04436c777.yaml new file mode 100644 index 0000000000..dcbff3c7d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/companion-auto-update-2bc216cec70480009970bca04436c777.yaml @@ -0,0 +1,58 @@ +id: companion-auto-update-2bc216cec70480009970bca04436c777 + +info: + name: > + Companion Auto Update <= 3.2.0 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7f3e583-a486-4e25-bc40-e437cf5b3ebd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/companion-auto-update/" + google-query: inurl:"/wp-content/plugins/companion-auto-update/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,companion-auto-update,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/companion-auto-update/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "companion-auto-update" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/companion-auto-update-2e35c0afd479ebddda5688f51cb87b9d.yaml b/nuclei-templates/cve-less/plugins/companion-auto-update-2e35c0afd479ebddda5688f51cb87b9d.yaml new file mode 100644 index 0000000000..a674d839db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/companion-auto-update-2e35c0afd479ebddda5688f51cb87b9d.yaml @@ -0,0 +1,58 @@ +id: companion-auto-update-2e35c0afd479ebddda5688f51cb87b9d + +info: + name: > + Companion Auto Update <= 3.3.5 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d969fb35-2ee9-42ca-a9e8-f6453a1e6be9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/companion-auto-update/" + google-query: inurl:"/wp-content/plugins/companion-auto-update/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,companion-auto-update,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/companion-auto-update/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "companion-auto-update" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/companion-auto-update-df1246639b8669a251f2bf76a6725ade.yaml b/nuclei-templates/cve-less/plugins/companion-auto-update-df1246639b8669a251f2bf76a6725ade.yaml new file mode 100644 index 0000000000..ee5de84f75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/companion-auto-update-df1246639b8669a251f2bf76a6725ade.yaml @@ -0,0 +1,58 @@ +id: companion-auto-update-df1246639b8669a251f2bf76a6725ade + +info: + name: > + Companion Auto Update <= 3.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38bf21c4-bf2e-4096-b4e3-9e3a5a60f1ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/companion-auto-update/" + google-query: inurl:"/wp-content/plugins/companion-auto-update/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,companion-auto-update,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/companion-auto-update/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "companion-auto-update" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/companion-sitemap-generator-3b5f66bc28ba8ff54368e43564c0ea04.yaml b/nuclei-templates/cve-less/plugins/companion-sitemap-generator-3b5f66bc28ba8ff54368e43564c0ea04.yaml new file mode 100644 index 0000000000..ad71671659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/companion-sitemap-generator-3b5f66bc28ba8ff54368e43564c0ea04.yaml @@ -0,0 +1,58 @@ +id: companion-sitemap-generator-3b5f66bc28ba8ff54368e43564c0ea04 + +info: + name: > + Companion Sitemap Generator – HTML & XML <= 3.6.6 - Cross-Site Request Forgery and Local File Inclusion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01c1dd65-4cf9-487f-ae3f-9cfaea177385?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/companion-sitemap-generator/" + google-query: inurl:"/wp-content/plugins/companion-sitemap-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,companion-sitemap-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/companion-sitemap-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "companion-sitemap-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/companion-sitemap-generator-99e9d7c301861638ef81beb6515cc7d4.yaml b/nuclei-templates/cve-less/plugins/companion-sitemap-generator-99e9d7c301861638ef81beb6515cc7d4.yaml new file mode 100644 index 0000000000..2b45584427 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/companion-sitemap-generator-99e9d7c301861638ef81beb6515cc7d4.yaml @@ -0,0 +1,58 @@ +id: companion-sitemap-generator-99e9d7c301861638ef81beb6515cc7d4 + +info: + name: > + Companion Sitemap Generator <= 4.5.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a9df582-0ead-45ff-aeaa-1bee9d470b41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/companion-sitemap-generator/" + google-query: inurl:"/wp-content/plugins/companion-sitemap-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,companion-sitemap-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/companion-sitemap-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "companion-sitemap-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/companion-sitemap-generator-c4c4cf320f9d5a30f314d45c9905f1fd.yaml b/nuclei-templates/cve-less/plugins/companion-sitemap-generator-c4c4cf320f9d5a30f314d45c9905f1fd.yaml new file mode 100644 index 0000000000..08d380daeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/companion-sitemap-generator-c4c4cf320f9d5a30f314d45c9905f1fd.yaml @@ -0,0 +1,58 @@ +id: companion-sitemap-generator-c4c4cf320f9d5a30f314d45c9905f1fd + +info: + name: > + Companion Sitemap Generator <= 4.5.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccf0d482-b4a1-47a8-8741-0970531e9630?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/companion-sitemap-generator/" + google-query: inurl:"/wp-content/plugins/companion-sitemap-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,companion-sitemap-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/companion-sitemap-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "companion-sitemap-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/company-updates-for-linkedin-ae77789cf095ebe5a3c15cc04f8354ae.yaml b/nuclei-templates/cve-less/plugins/company-updates-for-linkedin-ae77789cf095ebe5a3c15cc04f8354ae.yaml new file mode 100644 index 0000000000..2095387de2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/company-updates-for-linkedin-ae77789cf095ebe5a3c15cc04f8354ae.yaml @@ -0,0 +1,58 @@ +id: company-updates-for-linkedin-ae77789cf095ebe5a3c15cc04f8354ae + +info: + name: > + LinkedIn Company Updates <= 1.5.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ce350cb-78ae-4d76-99a7-8a81d342a9c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/company-updates-for-linkedin/" + google-query: inurl:"/wp-content/plugins/company-updates-for-linkedin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,company-updates-for-linkedin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/company-updates-for-linkedin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "company-updates-for-linkedin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/compfight-87dc229e61795edde01adbbcb4d66d06.yaml b/nuclei-templates/cve-less/plugins/compfight-87dc229e61795edde01adbbcb4d66d06.yaml new file mode 100644 index 0000000000..a3967235e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/compfight-87dc229e61795edde01adbbcb4d66d06.yaml @@ -0,0 +1,58 @@ +id: compfight-87dc229e61795edde01adbbcb4d66d06 + +info: + name: > + Compfight < 1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8228b0d-be97-4e7c-8346-d203f7130958?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/compfight/" + google-query: inurl:"/wp-content/plugins/compfight/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,compfight,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/compfight/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "compfight" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/compfight-cb154639cc7c0dc0d262bce9d7d2811e.yaml b/nuclei-templates/cve-less/plugins/compfight-cb154639cc7c0dc0d262bce9d7d2811e.yaml new file mode 100644 index 0000000000..12ca45b679 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/compfight-cb154639cc7c0dc0d262bce9d7d2811e.yaml @@ -0,0 +1,58 @@ +id: compfight-cb154639cc7c0dc0d262bce9d7d2811e + +info: + name: > + Compfight < 1.5 - Cross-Site Scrpting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04afce48-88a0-4d46-af19-a534f89f70d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/compfight/" + google-query: inurl:"/wp-content/plugins/compfight/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,compfight,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/compfight/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "compfight" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complete-gallery-manager-8b102422bdbae79fcfd828ee3dff2e44.yaml b/nuclei-templates/cve-less/plugins/complete-gallery-manager-8b102422bdbae79fcfd828ee3dff2e44.yaml new file mode 100644 index 0000000000..33a47c7c76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complete-gallery-manager-8b102422bdbae79fcfd828ee3dff2e44.yaml @@ -0,0 +1,58 @@ +id: complete-gallery-manager-8b102422bdbae79fcfd828ee3dff2e44 + +info: + name: > + Complete Gallery Manager <= 3.3.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09c59fb5-8264-4277-a821-dbfee0900f64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complete-gallery-manager/" + google-query: inurl:"/wp-content/plugins/complete-gallery-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complete-gallery-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complete-gallery-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complete-gallery-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complete-open-graph-036ea79db83fe96391d5364e9f6a5d01.yaml b/nuclei-templates/cve-less/plugins/complete-open-graph-036ea79db83fe96391d5364e9f6a5d01.yaml new file mode 100644 index 0000000000..aaae529f5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complete-open-graph-036ea79db83fe96391d5364e9f6a5d01.yaml @@ -0,0 +1,58 @@ +id: complete-open-graph-036ea79db83fe96391d5364e9f6a5d01 + +info: + name: > + Complete Open Graph <= 3.4.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f3303db-9ba6-4638-ba96-151cf91db85b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complete-open-graph/" + google-query: inurl:"/wp-content/plugins/complete-open-graph/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complete-open-graph,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complete-open-graph/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complete-open-graph" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-0601046a507e54e46df377f0ecc6ed20.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-0601046a507e54e46df377f0ecc6ed20.yaml new file mode 100644 index 0000000000..a91a0bccc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-0601046a507e54e46df377f0ecc6ed20.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-0601046a507e54e46df377f0ecc6ed20 + +info: + name: > + Complianz | GDPR/CCPA Cookie Consent <= 6.4.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a92d5176-4cf0-4a31-9dcc-a2dc3259d29b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-0ace082d96b626b2ad5accfe37aabeee.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-0ace082d96b626b2ad5accfe37aabeee.yaml new file mode 100644 index 0000000000..2837f93045 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-0ace082d96b626b2ad5accfe37aabeee.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-0ace082d96b626b2ad5accfe37aabeee + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via ajax_script_add + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ef8f39e-6e5d-4ef6-a81d-0b2be3506ec1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-0dd9d84ae74328eec6905560ff06dc90.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-0dd9d84ae74328eec6905560ff06dc90.yaml new file mode 100644 index 0000000000..e67106794e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-0dd9d84ae74328eec6905560ff06dc90.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-0dd9d84ae74328eec6905560ff06dc90 + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via maybe_install_suggested_plugins + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07300429-c445-4d2a-90aa-5072a17f8113?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-20f199eadcf56055af91390c7aa42269.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-20f199eadcf56055af91390c7aa42269.yaml new file mode 100644 index 0000000000..14df288d75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-20f199eadcf56055af91390c7aa42269.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-20f199eadcf56055af91390c7aa42269 + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via ajax_delete_snapshot + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1c106e8-9642-4294-90fd-6838cc551b90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-36baea2a40cd4c21b07e642ec98d1598.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-36baea2a40cd4c21b07e642ec98d1598.yaml new file mode 100644 index 0000000000..45845b7825 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-36baea2a40cd4c21b07e642ec98d1598.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-36baea2a40cd4c21b07e642ec98d1598 + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via run_sync + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5c704f9-4fcb-455e-a1c7-f48d47b12dec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-39d1abff46677c8f4222117f43e45a81.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-39d1abff46677c8f4222117f43e45a81.yaml new file mode 100644 index 0000000000..ee022050d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-39d1abff46677c8f4222117f43e45a81.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-39d1abff46677c8f4222117f43e45a81 + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via cmplz_delete_cookiebanner + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f55af49e-82c8-462b-8c0b-a25e966a27af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-3d78e2be612fb18102a14015e146e5ed.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-3d78e2be612fb18102a14015e146e5ed.yaml new file mode 100644 index 0000000000..5d3736922d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-3d78e2be612fb18102a14015e146e5ed.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-3d78e2be612fb18102a14015e146e5ed + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via ajax_edit_item + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8edaf5ce-6a26-44cc-b4d8-e3b0ccfa9c11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-3faec85547682ca0daca65d7bcfe4f48.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-3faec85547682ca0daca65d7bcfe4f48.yaml new file mode 100644 index 0000000000..dfbdbf347d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-3faec85547682ca0daca65d7bcfe4f48.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-3faec85547682ca0daca65d7bcfe4f48 + +info: + name: > + Complianz <= 6.4.5 (Premium <= 6.4.7) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17ab4800-0afd-4c39-970a-bd8dcc6a8b93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-4df8cf40ac1883817a3463195832ddff.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-4df8cf40ac1883817a3463195832ddff.yaml new file mode 100644 index 0000000000..baa59f7e4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-4df8cf40ac1883817a3463195832ddff.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-4df8cf40ac1883817a3463195832ddff + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via ajax_script_save + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1034f0f4-52e4-4f4c-81fc-51b4720f306a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-52cfe6de8dc0e7f48422a0ddba0a4485.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-52cfe6de8dc0e7f48422a0ddba0a4485.yaml new file mode 100644 index 0000000000..91d062f060 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-52cfe6de8dc0e7f48422a0ddba0a4485.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-52cfe6de8dc0e7f48422a0ddba0a4485 + +info: + name: > + Complianz – GDPR/CCPA Cookie Consent <= 6.5.6 - Cross-Site Request Forgery to Data Request Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b524fc5-4beb-49f6-bafa-c788c6d1d78c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-54ec2b57636fc193223c60655466605e.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-54ec2b57636fc193223c60655466605e.yaml new file mode 100644 index 0000000000..4c1720138d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-54ec2b57636fc193223c60655466605e.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-54ec2b57636fc193223c60655466605e + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via cmplz_duplicate_cookiebanner + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b81559-93a2-4e50-b213-0e22eea8a219?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-5e5f3cf37fc64d7bac2aaac542661852.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-5e5f3cf37fc64d7bac2aaac542661852.yaml new file mode 100644 index 0000000000..b6c33f0395 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-5e5f3cf37fc64d7bac2aaac542661852.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-5e5f3cf37fc64d7bac2aaac542661852 + +info: + name: > + Complianz | GDPR/CCPA Cookie Consent <= 6.5.5 - Authenticated(Administrator+) Stored Cross-site Scripting via settings + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01c1458d-3e38-4dbf-bb65-80465ea6d0ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-6f528eadb66a9354628a303cdece4106.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-6f528eadb66a9354628a303cdece4106.yaml new file mode 100644 index 0000000000..d7a85b0119 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-6f528eadb66a9354628a303cdece4106.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-6f528eadb66a9354628a303cdece4106 + +info: + name: > + Complianz Free <= 6.3.3 & Premium <= 6.3.5 - SQL Injection via Translations + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ea53fb7-9bf8-445b-ad33-f3b6e6ed1665?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-83ba977a44de14ef1ffafdedd6dd629e.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-83ba977a44de14ef1ffafdedd6dd629e.yaml new file mode 100644 index 0000000000..a98ad4cb45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-83ba977a44de14ef1ffafdedd6dd629e.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-83ba977a44de14ef1ffafdedd6dd629e + +info: + name: > + Complianz <= 6.4.4 (Premium <= 6.4.6.1) - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47941722-acaf-4f72-a64d-d01dc5e84adf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-bd01bd53f32252ceb586f6e4a82fddff.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-bd01bd53f32252ceb586f6e4a82fddff.yaml new file mode 100644 index 0000000000..63d62cb199 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-bd01bd53f32252ceb586f6e4a82fddff.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-bd01bd53f32252ceb586f6e4a82fddff + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 5.5.2 - Reflected Cross-Site Scripting via s parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f90656-49cb-4f13-8488-45a601048ade?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-e9c38ea48203d6f34c8dd4e716a1108d.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-e9c38ea48203d6f34c8dd4e716a1108d.yaml new file mode 100644 index 0000000000..63fdd1acd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-e9c38ea48203d6f34c8dd4e716a1108d.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-e9c38ea48203d6f34c8dd4e716a1108d + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.4 - Cross-Site Request Forgery via ajax_create_pages + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74f92bd4-c752-4620-b506-d7588ff2e586?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml new file mode 100644 index 0000000000..1bfdd2d3e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-ec46b5347c7ba7bc9f7cdc74d17b2526 + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7397898c-8d43-4399-9c2b-22f9287aa12d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-3faec85547682ca0daca65d7bcfe4f48.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-3faec85547682ca0daca65d7bcfe4f48.yaml new file mode 100644 index 0000000000..c0f717dc48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-3faec85547682ca0daca65d7bcfe4f48.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-premium-3faec85547682ca0daca65d7bcfe4f48 + +info: + name: > + Complianz <= 6.4.5 (Premium <= 6.4.7) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17ab4800-0afd-4c39-970a-bd8dcc6a8b93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr-premium/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-6f528eadb66a9354628a303cdece4106.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-6f528eadb66a9354628a303cdece4106.yaml new file mode 100644 index 0000000000..f31243651b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-6f528eadb66a9354628a303cdece4106.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-premium-6f528eadb66a9354628a303cdece4106 + +info: + name: > + Complianz Free <= 6.3.3 & Premium <= 6.3.5 - SQL Injection via Translations + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ea53fb7-9bf8-445b-ad33-f3b6e6ed1665?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr-premium/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr-premium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-83ba977a44de14ef1ffafdedd6dd629e.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-83ba977a44de14ef1ffafdedd6dd629e.yaml new file mode 100644 index 0000000000..beee7c0e99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-83ba977a44de14ef1ffafdedd6dd629e.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-premium-83ba977a44de14ef1ffafdedd6dd629e + +info: + name: > + Complianz <= 6.4.4 (Premium <= 6.4.6.1) - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47941722-acaf-4f72-a64d-d01dc5e84adf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr-premium/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml b/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml new file mode 100644 index 0000000000..3023b8d229 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/complianz-gdpr-premium-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml @@ -0,0 +1,58 @@ +id: complianz-gdpr-premium-ec46b5347c7ba7bc9f7cdc74d17b2526 + +info: + name: > + Complianz - GDPR/CCPA Cookie Consent <= 6.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7397898c-8d43-4399-9c2b-22f9287aa12d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/complianz-gdpr-premium/" + google-query: inurl:"/wp-content/plugins/complianz-gdpr-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,complianz-gdpr-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/complianz-gdpr-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "complianz-gdpr-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/computer-repair-shop-23022d4d8e20d83e1b4a708870cdf48e.yaml b/nuclei-templates/cve-less/plugins/computer-repair-shop-23022d4d8e20d83e1b4a708870cdf48e.yaml new file mode 100644 index 0000000000..3defd1a2b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/computer-repair-shop-23022d4d8e20d83e1b4a708870cdf48e.yaml @@ -0,0 +1,58 @@ +id: computer-repair-shop-23022d4d8e20d83e1b4a708870cdf48e + +info: + name: > + CRM WordPress Plugin – RepairBuddy <= 3.72 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/642a6d42-100f-4461-b568-35e089287902?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/computer-repair-shop/" + google-query: inurl:"/wp-content/plugins/computer-repair-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,computer-repair-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/computer-repair-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "computer-repair-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/computer-repair-shop-dececf152f183ba1e4159b4797e96e29.yaml b/nuclei-templates/cve-less/plugins/computer-repair-shop-dececf152f183ba1e4159b4797e96e29.yaml new file mode 100644 index 0000000000..58eb657978 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/computer-repair-shop-dececf152f183ba1e4159b4797e96e29.yaml @@ -0,0 +1,58 @@ +id: computer-repair-shop-dececf152f183ba1e4159b4797e96e29 + +info: + name: > + Computer Repair Shop < 2.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03b1376e-8ef3-4bd2-904b-6819aa21d144?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/computer-repair-shop/" + google-query: inurl:"/wp-content/plugins/computer-repair-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,computer-repair-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/computer-repair-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "computer-repair-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conditional-checkout-fields-for-woocommerce-9b415d0d3fdf05f04e00c8b364d66a56.yaml b/nuclei-templates/cve-less/plugins/conditional-checkout-fields-for-woocommerce-9b415d0d3fdf05f04e00c8b364d66a56.yaml new file mode 100644 index 0000000000..8483faf9b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conditional-checkout-fields-for-woocommerce-9b415d0d3fdf05f04e00c8b364d66a56.yaml @@ -0,0 +1,58 @@ +id: conditional-checkout-fields-for-woocommerce-9b415d0d3fdf05f04e00c8b364d66a56 + +info: + name: > + Conditional Checkout Fields & Edit Checkout Fields for WooCommerce <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fb0cb21-6645-4a28-a78c-d5dbeaddbf21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conditional-checkout-fields-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/conditional-checkout-fields-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conditional-checkout-fields-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conditional-checkout-fields-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conditional-checkout-fields-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conditional-extra-fees-for-woocommerce-216a466c53c0f9dbd8311fa0afa66753.yaml b/nuclei-templates/cve-less/plugins/conditional-extra-fees-for-woocommerce-216a466c53c0f9dbd8311fa0afa66753.yaml new file mode 100644 index 0000000000..4c8d31cf9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conditional-extra-fees-for-woocommerce-216a466c53c0f9dbd8311fa0afa66753.yaml @@ -0,0 +1,58 @@ +id: conditional-extra-fees-for-woocommerce-216a466c53c0f9dbd8311fa0afa66753 + +info: + name: > + Conditional cart fee / Extra charge rule for WooCommerce extra fees <= 1.0.96 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/797840ba-5589-42d6-9d50-52bf8c131d6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conditional-extra-fees-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/conditional-extra-fees-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conditional-extra-fees-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conditional-extra-fees-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conditional-extra-fees-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conditional-menus-134da546d2df4f04ca01066992554ee0.yaml b/nuclei-templates/cve-less/plugins/conditional-menus-134da546d2df4f04ca01066992554ee0.yaml new file mode 100644 index 0000000000..298fe3ec79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conditional-menus-134da546d2df4f04ca01066992554ee0.yaml @@ -0,0 +1,58 @@ +id: conditional-menus-134da546d2df4f04ca01066992554ee0 + +info: + name: > + Conditional Menus <= 1.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57d3506c-8db8-4e1b-9587-7f2bdb632890?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conditional-menus/" + google-query: inurl:"/wp-content/plugins/conditional-menus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conditional-menus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conditional-menus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conditional-menus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conditional-payment-methods-for-woocommerce-47ed991bbc14dda7a2d912876312ff28.yaml b/nuclei-templates/cve-less/plugins/conditional-payment-methods-for-woocommerce-47ed991bbc14dda7a2d912876312ff28.yaml new file mode 100644 index 0000000000..38ed7f33af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conditional-payment-methods-for-woocommerce-47ed991bbc14dda7a2d912876312ff28.yaml @@ -0,0 +1,58 @@ +id: conditional-payment-methods-for-woocommerce-47ed991bbc14dda7a2d912876312ff28 + +info: + name: > + Conditional Payment Methods for WooCommerce <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bf4fe42-435b-449e-bb8c-57cef3b93471?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conditional-payment-methods-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/conditional-payment-methods-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conditional-payment-methods-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conditional-payment-methods-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conditional-payment-methods-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conditional-payments-for-woocommerce-687e0bfbb6d2f1a8953da32fe9e3e746.yaml b/nuclei-templates/cve-less/plugins/conditional-payments-for-woocommerce-687e0bfbb6d2f1a8953da32fe9e3e746.yaml new file mode 100644 index 0000000000..1c1e022503 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conditional-payments-for-woocommerce-687e0bfbb6d2f1a8953da32fe9e3e746.yaml @@ -0,0 +1,58 @@ +id: conditional-payments-for-woocommerce-687e0bfbb6d2f1a8953da32fe9e3e746 + +info: + name: > + Conditional Payments for WooCommerce <= 2.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db15295f-505f-4a0a-bb3a-3ff6daf73008?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conditional-payments-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/conditional-payments-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conditional-payments-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conditional-payments-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conditional-payments-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conditional-shipping-for-woocommerce-f546949dea525a0c95c8895c66b00552.yaml b/nuclei-templates/cve-less/plugins/conditional-shipping-for-woocommerce-f546949dea525a0c95c8895c66b00552.yaml new file mode 100644 index 0000000000..63f074b6a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conditional-shipping-for-woocommerce-f546949dea525a0c95c8895c66b00552.yaml @@ -0,0 +1,58 @@ +id: conditional-shipping-for-woocommerce-f546949dea525a0c95c8895c66b00552 + +info: + name: > + Conditional Shipping for WooCommerce <= 2.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53e2f7d5-ceb3-4c15-a761-a9f7c7585358?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conditional-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/conditional-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conditional-shipping-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conditional-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conditional-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coneblog-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/coneblog-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5bba74f0b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coneblog-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: coneblog-widgets-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coneblog-widgets/" + google-query: inurl:"/wp-content/plugins/coneblog-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coneblog-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coneblog-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coneblog-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conference-scheduler-cf3e255501522f24f949ee2a8f39ee25.yaml b/nuclei-templates/cve-less/plugins/conference-scheduler-cf3e255501522f24f949ee2a8f39ee25.yaml new file mode 100644 index 0000000000..2458958271 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conference-scheduler-cf3e255501522f24f949ee2a8f39ee25.yaml @@ -0,0 +1,58 @@ +id: conference-scheduler-cf3e255501522f24f949ee2a8f39ee25 + +info: + name: > + Conference Scheduler <= 2.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eed6306a-317b-40ed-b7f5-7f930b3509e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conference-scheduler/" + google-query: inurl:"/wp-content/plugins/conference-scheduler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conference-scheduler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conference-scheduler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conference-scheduler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/configurable-tag-cloud-widget-cf1b7f4c03fcd556e540f11fea53f35a.yaml b/nuclei-templates/cve-less/plugins/configurable-tag-cloud-widget-cf1b7f4c03fcd556e540f11fea53f35a.yaml new file mode 100644 index 0000000000..a4d798b928 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/configurable-tag-cloud-widget-cf1b7f4c03fcd556e540f11fea53f35a.yaml @@ -0,0 +1,58 @@ +id: configurable-tag-cloud-widget-cf1b7f4c03fcd556e540f11fea53f35a + +info: + name: > + Configurable Tag Cloud <= 5.2 - Cross-Site Request Forgery via ctc_options_page() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0775b36b-d543-41f9-a20d-f629b40c70d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/configurable-tag-cloud-widget/" + google-query: inurl:"/wp-content/plugins/configurable-tag-cloud-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,configurable-tag-cloud-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/configurable-tag-cloud-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "configurable-tag-cloud-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/configure-smtp-66c31f4c6740f8ad7d7b89dba2cbfd5f.yaml b/nuclei-templates/cve-less/plugins/configure-smtp-66c31f4c6740f8ad7d7b89dba2cbfd5f.yaml new file mode 100644 index 0000000000..f80afa5cb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/configure-smtp-66c31f4c6740f8ad7d7b89dba2cbfd5f.yaml @@ -0,0 +1,58 @@ +id: configure-smtp-66c31f4c6740f8ad7d7b89dba2cbfd5f + +info: + name: > + Configure SMTP <= 3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d770e25-3b76-49a1-896b-adbdd91d1e47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/configure-smtp/" + google-query: inurl:"/wp-content/plugins/configure-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,configure-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/configure-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "configure-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/confirm-data-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/confirm-data-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..78463d6d9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/confirm-data-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: confirm-data-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/confirm-data/" + google-query: inurl:"/wp-content/plugins/confirm-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,confirm-data,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/confirm-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "confirm-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/connect-daily-web-calendar-73dac6bf00e8c2bb53faafd1de73576a.yaml b/nuclei-templates/cve-less/plugins/connect-daily-web-calendar-73dac6bf00e8c2bb53faafd1de73576a.yaml new file mode 100644 index 0000000000..b65012045b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/connect-daily-web-calendar-73dac6bf00e8c2bb53faafd1de73576a.yaml @@ -0,0 +1,58 @@ +id: connect-daily-web-calendar-73dac6bf00e8c2bb53faafd1de73576a + +info: + name: > + connectDaily <= 1.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/650f7232-7279-401d-beb1-26f70c69164b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/connect-daily-web-calendar/" + google-query: inurl:"/wp-content/plugins/connect-daily-web-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,connect-daily-web-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/connect-daily-web-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "connect-daily-web-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/connected-sermons-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/connected-sermons-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9e4c2264d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/connected-sermons-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: connected-sermons-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/connected-sermons/" + google-query: inurl:"/wp-content/plugins/connected-sermons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,connected-sermons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/connected-sermons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "connected-sermons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/connections-1f71cd156c1c7a7919178911b00bc151.yaml b/nuclei-templates/cve-less/plugins/connections-1f71cd156c1c7a7919178911b00bc151.yaml new file mode 100644 index 0000000000..35e7df860d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/connections-1f71cd156c1c7a7919178911b00bc151.yaml @@ -0,0 +1,58 @@ +id: connections-1f71cd156c1c7a7919178911b00bc151 + +info: + name: > + Connections Business Directory <= 10.4.2 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b0d6b1f-5601-4c96-893c-e296511a2996?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/connections/" + google-query: inurl:"/wp-content/plugins/connections/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,connections,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/connections/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "connections" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/connections-2e3f61534eb2162d57847e92682b9bbd.yaml b/nuclei-templates/cve-less/plugins/connections-2e3f61534eb2162d57847e92682b9bbd.yaml new file mode 100644 index 0000000000..628a8e8d46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/connections-2e3f61534eb2162d57847e92682b9bbd.yaml @@ -0,0 +1,58 @@ +id: connections-2e3f61534eb2162d57847e92682b9bbd + +info: + name: > + Connections Business Directory < 0.7.1.6 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54c154a9-e751-4e8f-a26e-7eb208fa7ffe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/connections/" + google-query: inurl:"/wp-content/plugins/connections/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,connections,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/connections/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "connections" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/connections-6869d4da7d1da9e6712437e8840c161b.yaml b/nuclei-templates/cve-less/plugins/connections-6869d4da7d1da9e6712437e8840c161b.yaml new file mode 100644 index 0000000000..c728d97de2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/connections-6869d4da7d1da9e6712437e8840c161b.yaml @@ -0,0 +1,58 @@ +id: connections-6869d4da7d1da9e6712437e8840c161b + +info: + name: > + Connections Business Directory <= 10.4.36 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae40fd4a-8448-48ea-9b31-067643972b44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/connections/" + google-query: inurl:"/wp-content/plugins/connections/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,connections,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/connections/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "connections" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.4.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/connections-b0b49bce1c15ad148a5058e1154b417c.yaml b/nuclei-templates/cve-less/plugins/connections-b0b49bce1c15ad148a5058e1154b417c.yaml new file mode 100644 index 0000000000..aea8bfb61d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/connections-b0b49bce1c15ad148a5058e1154b417c.yaml @@ -0,0 +1,58 @@ +id: connections-b0b49bce1c15ad148a5058e1154b417c + +info: + name: > + Connections Business Directory <= 9.6 - Authenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70f2c885-14b6-4ac3-b819-502bc618d9c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/connections/" + google-query: inurl:"/wp-content/plugins/connections/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,connections,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/connections/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "connections" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/connections-cf74b8fc2d5310123c3eee779bc13fa4.yaml b/nuclei-templates/cve-less/plugins/connections-cf74b8fc2d5310123c3eee779bc13fa4.yaml new file mode 100644 index 0000000000..d2d2ea7eee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/connections-cf74b8fc2d5310123c3eee779bc13fa4.yaml @@ -0,0 +1,58 @@ +id: connections-cf74b8fc2d5310123c3eee779bc13fa4 + +info: + name: > + Connections Business Directory < 8.5.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/070fd387-c0ca-47bf-a37a-530c1ffdb6ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/connections/" + google-query: inurl:"/wp-content/plugins/connections/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,connections,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/connections/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "connections" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/connections-db180c33b0677e46a0a6bb8bb9ad8a71.yaml b/nuclei-templates/cve-less/plugins/connections-db180c33b0677e46a0a6bb8bb9ad8a71.yaml new file mode 100644 index 0000000000..b9398fe0c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/connections-db180c33b0677e46a0a6bb8bb9ad8a71.yaml @@ -0,0 +1,58 @@ +id: connections-db180c33b0677e46a0a6bb8bb9ad8a71 + +info: + name: > + Connections Business Directory < 0.7.9.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce96dab2-70ab-4925-8323-daf65d61c81a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/connections/" + google-query: inurl:"/wp-content/plugins/connections/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,connections,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/connections/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "connections" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/consensu-io-f1b98a2e76b778879a86c711e73365c4.yaml b/nuclei-templates/cve-less/plugins/consensu-io-f1b98a2e76b778879a86c711e73365c4.yaml new file mode 100644 index 0000000000..1a9bae5b18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/consensu-io-f1b98a2e76b778879a86c711e73365c4.yaml @@ -0,0 +1,58 @@ +id: consensu-io-f1b98a2e76b778879a86c711e73365c4 + +info: + name: > + Consensu.io <= 1.0.2 - Missing Authorization via update_config_db() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc1963cc-7e9e-4998-8338-c3e83b70d441?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/consensu-io/" + google-query: inurl:"/wp-content/plugins/consensu-io/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,consensu-io,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/consensu-io/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "consensu-io" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/constant-contact-forms-7651cce817269ea91d5fbe788e52194b.yaml b/nuclei-templates/cve-less/plugins/constant-contact-forms-7651cce817269ea91d5fbe788e52194b.yaml new file mode 100644 index 0000000000..f747743c9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/constant-contact-forms-7651cce817269ea91d5fbe788e52194b.yaml @@ -0,0 +1,58 @@ +id: constant-contact-forms-7651cce817269ea91d5fbe788e52194b + +info: + name: > + Constant Contact Forms <= 2.0.2 - Missing Authorization via constant_contact_privacy_ajax_handler + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8a26695-4793-418b-9a23-6709fe79ea4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/constant-contact-forms/" + google-query: inurl:"/wp-content/plugins/constant-contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,constant-contact-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/constant-contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "constant-contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/constant-contact-forms-903a37844bea1fdaf4cd48ec6980337e.yaml b/nuclei-templates/cve-less/plugins/constant-contact-forms-903a37844bea1fdaf4cd48ec6980337e.yaml new file mode 100644 index 0000000000..8118fabcaa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/constant-contact-forms-903a37844bea1fdaf4cd48ec6980337e.yaml @@ -0,0 +1,58 @@ +id: constant-contact-forms-903a37844bea1fdaf4cd48ec6980337e + +info: + name: > + Constant Contact Forms <= 1.14.0 - Missing Authorization via constant_contact_optin_ajax_handler + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85b6262c-2576-4177-a683-44464dba0978?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/constant-contact-forms/" + google-query: inurl:"/wp-content/plugins/constant-contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,constant-contact-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/constant-contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "constant-contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/constant-contact-forms-b14574939a93e002a63be522534dc429.yaml b/nuclei-templates/cve-less/plugins/constant-contact-forms-b14574939a93e002a63be522534dc429.yaml new file mode 100644 index 0000000000..f62e4380da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/constant-contact-forms-b14574939a93e002a63be522534dc429.yaml @@ -0,0 +1,58 @@ +id: constant-contact-forms-b14574939a93e002a63be522534dc429 + +info: + name: > + Constant Contact Forms <= 1.8.7 Editor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64f4009e-2715-4c58-acbd-e516f1a76646?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/constant-contact-forms/" + google-query: inurl:"/wp-content/plugins/constant-contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,constant-contact-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/constant-contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "constant-contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/constant-contact-forms-by-mailmunch-1a317e1cdbb26d9e49f5aa3bc192b26e.yaml b/nuclei-templates/cve-less/plugins/constant-contact-forms-by-mailmunch-1a317e1cdbb26d9e49f5aa3bc192b26e.yaml new file mode 100644 index 0000000000..3e08b7dc0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/constant-contact-forms-by-mailmunch-1a317e1cdbb26d9e49f5aa3bc192b26e.yaml @@ -0,0 +1,58 @@ +id: constant-contact-forms-by-mailmunch-1a317e1cdbb26d9e49f5aa3bc192b26e + +info: + name: > + Constant Contact Forms by MailMunch <= 2.0.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f8dcbd2-af51-4cc9-9962-53fe644985e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/constant-contact-forms-by-mailmunch/" + google-query: inurl:"/wp-content/plugins/constant-contact-forms-by-mailmunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,constant-contact-forms-by-mailmunch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/constant-contact-forms-by-mailmunch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "constant-contact-forms-by-mailmunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/constant-contact-forms-by-mailmunch-437bae7c2a82ed4347741e0e69e1ae61.yaml b/nuclei-templates/cve-less/plugins/constant-contact-forms-by-mailmunch-437bae7c2a82ed4347741e0e69e1ae61.yaml new file mode 100644 index 0000000000..f3d8aa7386 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/constant-contact-forms-by-mailmunch-437bae7c2a82ed4347741e0e69e1ae61.yaml @@ -0,0 +1,58 @@ +id: constant-contact-forms-by-mailmunch-437bae7c2a82ed4347741e0e69e1ae61 + +info: + name: > + Constant Contact Forms by MailMunch <= 2.0.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a84bd9c8-97bd-4572-8bfa-5191d98c9523?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/constant-contact-forms-by-mailmunch/" + google-query: inurl:"/wp-content/plugins/constant-contact-forms-by-mailmunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,constant-contact-forms-by-mailmunch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/constant-contact-forms-by-mailmunch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "constant-contact-forms-by-mailmunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/constant-contact-forms-d81bd0f10f327ed0fb83b12edeec74bf.yaml b/nuclei-templates/cve-less/plugins/constant-contact-forms-d81bd0f10f327ed0fb83b12edeec74bf.yaml new file mode 100644 index 0000000000..0cb12ba368 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/constant-contact-forms-d81bd0f10f327ed0fb83b12edeec74bf.yaml @@ -0,0 +1,58 @@ +id: constant-contact-forms-d81bd0f10f327ed0fb83b12edeec74bf + +info: + name: > + Constant Contact Forms <= 2.4.2 - Information Disclosure via Log Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2990b307-2b07-4daf-917b-d9587253cbeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/constant-contact-forms/" + google-query: inurl:"/wp-content/plugins/constant-contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,constant-contact-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/constant-contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "constant-contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-bank-433ffdc26cf2c66e4eeb88d840e46a11.yaml b/nuclei-templates/cve-less/plugins/contact-bank-433ffdc26cf2c66e4eeb88d840e46a11.yaml new file mode 100644 index 0000000000..5fc88530da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-bank-433ffdc26cf2c66e4eeb88d840e46a11.yaml @@ -0,0 +1,58 @@ +id: contact-bank-433ffdc26cf2c66e4eeb88d840e46a11 + +info: + name: > + Contact Bank <= 2.0.225 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e680ed2-36a9-4ca4-8865-4ce58bf8f5d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-bank/" + google-query: inurl:"/wp-content/plugins/contact-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-bank,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.226') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-bank-6d98c218699b93985ac97a3eec99201e.yaml b/nuclei-templates/cve-less/plugins/contact-bank-6d98c218699b93985ac97a3eec99201e.yaml new file mode 100644 index 0000000000..5ee1008625 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-bank-6d98c218699b93985ac97a3eec99201e.yaml @@ -0,0 +1,58 @@ +id: contact-bank-6d98c218699b93985ac97a3eec99201e + +info: + name: > + Contact Bank – Contact Form Builder for WordPress <= 2.0.19 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14039d7d-bd5a-4c6b-96b0-46f86536e085?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-bank/" + google-query: inurl:"/wp-content/plugins/contact-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/contact-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..0ab357f329 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: contact-bank-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-bank/" + google-query: inurl:"/wp-content/plugins/contact-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.227') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-bank-dde9696bf354d3e3e05b50e1d6ec9e01.yaml b/nuclei-templates/cve-less/plugins/contact-bank-dde9696bf354d3e3e05b50e1d6ec9e01.yaml new file mode 100644 index 0000000000..09f16dbba3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-bank-dde9696bf354d3e3e05b50e1d6ec9e01.yaml @@ -0,0 +1,58 @@ +id: contact-bank-dde9696bf354d3e3e05b50e1d6ec9e01 + +info: + name: > + Contact Bank – Contact Form Builder for WordPress < 2.1.23 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6278c70a-7b25-45f0-bc64-ecb231e1bf55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-bank/" + google-query: inurl:"/wp-content/plugins/contact-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-bank,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-bank-e445dff1dbcdaa9bae7b0592b35676e6.yaml b/nuclei-templates/cve-less/plugins/contact-bank-e445dff1dbcdaa9bae7b0592b35676e6.yaml new file mode 100644 index 0000000000..9594409b50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-bank-e445dff1dbcdaa9bae7b0592b35676e6.yaml @@ -0,0 +1,58 @@ +id: contact-bank-e445dff1dbcdaa9bae7b0592b35676e6 + +info: + name: > + Contact Bank <= 3.0.30 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a367b5a-cfba-41fa-9243-256a391a4661?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-bank/" + google-query: inurl:"/wp-content/plugins/contact-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-bank,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-bank-faf9b6b6bd7098d550180128b47f75fe.yaml b/nuclei-templates/cve-less/plugins/contact-bank-faf9b6b6bd7098d550180128b47f75fe.yaml new file mode 100644 index 0000000000..cc2804f812 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-bank-faf9b6b6bd7098d550180128b47f75fe.yaml @@ -0,0 +1,58 @@ +id: contact-bank-faf9b6b6bd7098d550180128b47f75fe + +info: + name: > + Contact Bank – Contact Form Builder for WordPress <= 2.0.69 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e560fb5f-0548-4b3e-9f8d-9e80af364c04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-bank/" + google-query: inurl:"/wp-content/plugins/contact-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-1ff3b8d002a210c8bcbac1471cb6f6f6.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-1ff3b8d002a210c8bcbac1471cb6f6f6.yaml new file mode 100644 index 0000000000..7a54c35b2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-1ff3b8d002a210c8bcbac1471cb6f6f6.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-1ff3b8d002a210c8bcbac1471cb6f6f6 + +info: + name: > + Contact Form 7 < 3.7.2 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e421cb35-e9f4-43f3-a39e-d51d197bc279?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7/" + google-query: inurl:"/wp-content/plugins/contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-325454a71c0c17adfea3794a8a7a9236.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-325454a71c0c17adfea3794a8a7a9236.yaml new file mode 100644 index 0000000000..5818669799 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-325454a71c0c17adfea3794a8a7a9236.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-325454a71c0c17adfea3794a8a7a9236 + +info: + name: > + Contact Form 7 <= 3.5.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92298f2d-aced-4177-b6e8-36e153e9c930?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7/" + google-query: inurl:"/wp-content/plugins/contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-6e59234554b04ec8d40e5e3ef21541b6.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-6e59234554b04ec8d40e5e3ef21541b6.yaml new file mode 100644 index 0000000000..be9082f023 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-6e59234554b04ec8d40e5e3ef21541b6.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-6e59234554b04ec8d40e5e3ef21541b6 + +info: + name: > + Contact Form 7 <= 5.0.3 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1814d2ad-73b1-4440-9cd6-7c5c569c4fb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7/" + google-query: inurl:"/wp-content/plugins/contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-7f88047eb913450e01c938cb65d8b8a9.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-7f88047eb913450e01c938cb65d8b8a9.yaml new file mode 100644 index 0000000000..c3516a1ee5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-7f88047eb913450e01c938cb65d8b8a9.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-7f88047eb913450e01c938cb65d8b8a9 + +info: + name: > + Contact Form 7 <= 5.3.1 - Arbitrary File Upload via Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2f54e8d-9e81-4902-9111-b826ef5da164?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7/" + google-query: inurl:"/wp-content/plugins/contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-8d379cb370e88332eb6d842ed734aa6a.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-8d379cb370e88332eb6d842ed734aa6a.yaml new file mode 100644 index 0000000000..3079a66109 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-8d379cb370e88332eb6d842ed734aa6a.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-8d379cb370e88332eb6d842ed734aa6a + +info: + name: > + Contact Form 7 <= 5.8.3 - Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d7fb020-6acb-445e-a46b-bdb5aaf8f2b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7/" + google-query: inurl:"/wp-content/plugins/contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-datepicker-dd80fd1aa8e8ecdfc56af18872d295e2.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-datepicker-dd80fd1aa8e8ecdfc56af18872d295e2.yaml new file mode 100644 index 0000000000..aa62e2302f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-datepicker-dd80fd1aa8e8ecdfc56af18872d295e2.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-datepicker-dd80fd1aa8e8ecdfc56af18872d295e2 + +info: + name: > + Contact Form 7 Datepicker <= 2.6.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6da4cf6-4b3b-4015-9106-b2a4467f34f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-datepicker/" + google-query: inurl:"/wp-content/plugins/contact-form-7-datepicker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-datepicker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-datepicker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-datepicker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-8ba7976e3e4bdeede76b4a3300e51140.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-8ba7976e3e4bdeede76b4a3300e51140.yaml new file mode 100644 index 0000000000..22e7a5bd71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-8ba7976e3e4bdeede76b4a3300e51140.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-dynamic-text-extension-8ba7976e3e4bdeede76b4a3300e51140 + +info: + name: > + Contact Form 7 Dynamic Text Extension <= 2.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa821005-9593-4a84-b4b4-af746da4d6b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-dynamic-text-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-dynamic-text-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-dynamic-text-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-dynamic-text-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-dynamic-text-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-ad3bf812c0907ec51a65ebf62ff94eb1.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-ad3bf812c0907ec51a65ebf62ff94eb1.yaml new file mode 100644 index 0000000000..ff61d5f666 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-ad3bf812c0907ec51a65ebf62ff94eb1.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-dynamic-text-extension-ad3bf812c0907ec51a65ebf62ff94eb1 + +info: + name: > + Contact Form 7 – Dynamic Text Extension <= 4.1.0 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3f1d836-da32-414f-9f2b-d485c44b2486?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-dynamic-text-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-dynamic-text-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-dynamic-text-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-dynamic-text-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-dynamic-text-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-f69e0ba733c2c24bc554eac9c924b265.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-f69e0ba733c2c24bc554eac9c924b265.yaml new file mode 100644 index 0000000000..e2b56d5068 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-dynamic-text-extension-f69e0ba733c2c24bc554eac9c924b265.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-dynamic-text-extension-f69e0ba733c2c24bc554eac9c924b265 + +info: + name: > + Contact Form 7 Dynamic Text Extension < 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59cefa5d-f270-48e1-bb3e-98f710a055d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-dynamic-text-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-dynamic-text-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-dynamic-text-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-dynamic-text-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-dynamic-text-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-f9c76f792a0cb9c9d573c3bb2df06a93.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-f9c76f792a0cb9c9d573c3bb2df06a93.yaml new file mode 100644 index 0000000000..bc15212530 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-f9c76f792a0cb9c9d573c3bb2df06a93.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-f9c76f792a0cb9c9d573c3bb2df06a93 + +info: + name: > + Contact Form 7 <= 5.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5bf4972-424a-4470-a0bc-7dcc95378e0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7/" + google-query: inurl:"/wp-content/plugins/contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-integrations-4d9d22b8536ad510aca448861c4763dd.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-integrations-4d9d22b8536ad510aca448861c4763dd.yaml new file mode 100644 index 0000000000..cecda71bfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-integrations-4d9d22b8536ad510aca448861c4763dd.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-integrations-4d9d22b8536ad510aca448861c4763dd + +info: + name: > + Contact Form 7 Integrations 1.0 - 1.3.10 - Multiple Cross-Site scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd4446b0-3274-46c7-865a-0a168acb960f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-integrations/" + google-query: inurl:"/wp-content/plugins/contact-form-7-integrations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-integrations,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-integrations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-integrations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0', '<= 1.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-mailchimp-extension-01288e737e4ae077215c04412343fc17.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-mailchimp-extension-01288e737e4ae077215c04412343fc17.yaml new file mode 100644 index 0000000000..0beb180dac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-mailchimp-extension-01288e737e4ae077215c04412343fc17.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-mailchimp-extension-01288e737e4ae077215c04412343fc17 + +info: + name: > + Contact Form 7 Extension For Mailchimp <= 0.5.70 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9f5be49-e099-4862-af9d-4ddbb6decfc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-mailchimp-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-mailchimp-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-mailchimp-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-mailchimp-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-mailchimp-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-mailchimp-extension-905c45437d6ba639495cb537666e1306.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-mailchimp-extension-905c45437d6ba639495cb537666e1306.yaml new file mode 100644 index 0000000000..3fc1b0ed82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-mailchimp-extension-905c45437d6ba639495cb537666e1306.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-mailchimp-extension-905c45437d6ba639495cb537666e1306 + +info: + name: > + Contact Form 7 Extension For Mailchimp <= 0.5.70 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bed25977-040e-4427-b1e3-e9be9733b31f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-mailchimp-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-mailchimp-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-mailchimp-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-mailchimp-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-mailchimp-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-multi-step-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-multi-step-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..73607d347d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-multi-step-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-multi-step-module-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-multi-step-module/" + google-query: inurl:"/wp-content/plugins/contact-form-7-multi-step-module/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-multi-step-module,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-multi-step-module/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-multi-step-module" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-multi-step-module-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-multi-step-module-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..dd8e7288db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-multi-step-module-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-multi-step-module-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-multi-step-module/" + google-query: inurl:"/wp-content/plugins/contact-form-7-multi-step-module/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-multi-step-module,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-multi-step-module/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-multi-step-module" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-newsletter-60ccaab36d8d291d989ebdd0beef30b5.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-newsletter-60ccaab36d8d291d989ebdd0beef30b5.yaml new file mode 100644 index 0000000000..ba0eabbdef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-newsletter-60ccaab36d8d291d989ebdd0beef30b5.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-newsletter-60ccaab36d8d291d989ebdd0beef30b5 + +info: + name: > + Contact Form 7 Newsletter <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ecf2247-5861-4206-9329-f0389a35076b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-newsletter/" + google-query: inurl:"/wp-content/plugins/contact-form-7-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-46d92974df5823a07d95144ce4cc0f85.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-46d92974df5823a07d95144ce4cc0f85.yaml new file mode 100644 index 0000000000..9d3e32348b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-46d92974df5823a07d95144ce4cc0f85.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-paypal-add-on-46d92974df5823a07d95144ce4cc0f85 + +info: + name: > + Contact Form 7 – PayPal & Stripe Add-on <= 1.9.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0c13b83-6885-46db-bf33-0b2b63ff06db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-paypal-add-on/" + google-query: inurl:"/wp-content/plugins/contact-form-7-paypal-add-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-paypal-add-on,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-paypal-add-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-paypal-add-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-a742d112c80df865f27dc03fd5bad80a.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-a742d112c80df865f27dc03fd5bad80a.yaml new file mode 100644 index 0000000000..ff0fefadde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-a742d112c80df865f27dc03fd5bad80a.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-paypal-add-on-a742d112c80df865f27dc03fd5bad80a + +info: + name: > + Easy PayPal & Stripe Buy Now Button <= 1.8.3 & Contact Form 7 – PayPal & Stripe Add-on <= 2.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5276227-9bd4-4ad8-a6b7-ac7d05e8b056?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-paypal-add-on/" + google-query: inurl:"/wp-content/plugins/contact-form-7-paypal-add-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-paypal-add-on,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-paypal-add-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-paypal-add-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-d4ad0651fbd050ca5d0c0b31b84449cb.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-d4ad0651fbd050ca5d0c0b31b84449cb.yaml new file mode 100644 index 0000000000..2f1268369c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-paypal-add-on-d4ad0651fbd050ca5d0c0b31b84449cb.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-paypal-add-on-d4ad0651fbd050ca5d0c0b31b84449cb + +info: + name: > + Contact Form 7 – PayPal & Stripe Add-on <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99be8703-b462-4589-9918-76c0ebbb3bcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-paypal-add-on/" + google-query: inurl:"/wp-content/plugins/contact-form-7-paypal-add-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-paypal-add-on,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-paypal-add-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-paypal-add-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-simple-recaptcha-14d0e5668206cef97d18962e8ae7b83f.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-simple-recaptcha-14d0e5668206cef97d18962e8ae7b83f.yaml new file mode 100644 index 0000000000..bf15548f1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-simple-recaptcha-14d0e5668206cef97d18962e8ae7b83f.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-simple-recaptcha-14d0e5668206cef97d18962e8ae7b83f + +info: + name: > + Contact Form 7 Captcha <= 0.0.8 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d2236cd-dfed-42d0-a77f-4573e74a4781?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-simple-recaptcha/" + google-query: inurl:"/wp-content/plugins/contact-form-7-simple-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-simple-recaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-simple-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-simple-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-simple-recaptcha-8adb7b06ec664dfb56f6f7d6b4e86d31.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-simple-recaptcha-8adb7b06ec664dfb56f6f7d6b4e86d31.yaml new file mode 100644 index 0000000000..63b0086131 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-simple-recaptcha-8adb7b06ec664dfb56f6f7d6b4e86d31.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-simple-recaptcha-8adb7b06ec664dfb56f6f7d6b4e86d31 + +info: + name: > + Contact Form 7 Captcha <= 0.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24e8513c-f8d4-4e32-8212-191f5b5893b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-simple-recaptcha/" + google-query: inurl:"/wp-content/plugins/contact-form-7-simple-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-simple-recaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-simple-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-simple-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-skins-2914c51da091e199d25a3dc8786db638.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-skins-2914c51da091e199d25a3dc8786db638.yaml new file mode 100644 index 0000000000..dca2e05d2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-skins-2914c51da091e199d25a3dc8786db638.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-skins-2914c51da091e199d25a3dc8786db638 + +info: + name: > + Contact Form 7 Skins <= 2.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7df753a-5399-45ff-894f-8f35868fe072?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-skins/" + google-query: inurl:"/wp-content/plugins/contact-form-7-skins/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-skins,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-skins/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-skins" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-sms-addon-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-sms-addon-167d9672411be44feb72a5175fd0987c.yaml new file mode 100644 index 0000000000..211fc6fe3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-sms-addon-167d9672411be44feb72a5175fd0987c.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-sms-addon-167d9672411be44feb72a5175fd0987c + +info: + name: > + Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f35a20-ffcf-4413-b1ea-748cd6aa6f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-sms-addon/" + google-query: inurl:"/wp-content/plugins/contact-form-7-sms-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-sms-addon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-sms-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-sms-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-sms-addon-be2731d38b6a95683208b89df2a4165d.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-sms-addon-be2731d38b6a95683208b89df2a4165d.yaml new file mode 100644 index 0000000000..63009a50cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-sms-addon-be2731d38b6a95683208b89df2a4165d.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-sms-addon-be2731d38b6a95683208b89df2a4165d + +info: + name: > + Contact Form 7 – Clockwork SMS < 2.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3c5aafc-e75a-472e-9b62-10bb5a9da9b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-sms-addon/" + google-query: inurl:"/wp-content/plugins/contact-form-7-sms-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-sms-addon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-sms-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-sms-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-style-a1fcf6f91e16b2992432e60b1b4c9234.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-style-a1fcf6f91e16b2992432e60b1b4c9234.yaml new file mode 100644 index 0000000000..aef8a64fb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-style-a1fcf6f91e16b2992432e60b1b4c9234.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-style-a1fcf6f91e16b2992432e60b1b4c9234 + +info: + name: > + Contact Form 7 Style <= 3.1.9 Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7b540b9-cdf1-40ea-b693-c237e76c0958?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-style/" + google-query: inurl:"/wp-content/plugins/contact-form-7-style/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-style,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-style/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-style" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-style-ea1c126ca110ea032d6fcb986fdd350e.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-style-ea1c126ca110ea032d6fcb986fdd350e.yaml new file mode 100644 index 0000000000..95e7eae120 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-style-ea1c126ca110ea032d6fcb986fdd350e.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-style-ea1c126ca110ea032d6fcb986fdd350e + +info: + name: > + Contact Form 7 Style <= 3.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2972cdaf-2d0a-4b55-b4f5-ccf01ff5352c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-style/" + google-query: inurl:"/wp-content/plugins/contact-form-7-style/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-style,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-style/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-style" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-6fadcf5f17b5915346db50e851606480.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-6fadcf5f17b5915346db50e851606480.yaml new file mode 100644 index 0000000000..795fa538f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-6fadcf5f17b5915346db50e851606480.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-to-database-extension-6fadcf5f17b5915346db50e851606480 + +info: + name: > + Contact Form DB <= 2.8.29 - Cross-site request forgery via a request in the CF7DBPluginSubmissions page to wp-admin/admin.php + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/642012fa-28a5-46dc-a68f-3a4ce1cbced3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-to-database-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-to-database-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-to-database-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-to-database-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-7b879cd01e55c6fb3c0d10afee385802.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-7b879cd01e55c6fb3c0d10afee385802.yaml new file mode 100644 index 0000000000..9ff0114407 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-7b879cd01e55c6fb3c0d10afee385802.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-to-database-extension-7b879cd01e55c6fb3c0d10afee385802 + +info: + name: > + Contact Form DB <= 2.8.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a06812c5-43db-4c32-a9fb-f7b86900a741?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-to-database-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-to-database-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-to-database-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-to-database-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-9307d10c2323b14a9686cf4c27778940.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-9307d10c2323b14a9686cf4c27778940.yaml new file mode 100644 index 0000000000..ffaa778f97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-9307d10c2323b14a9686cf4c27778940.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-to-database-extension-9307d10c2323b14a9686cf4c27778940 + +info: + name: > + Contact Form 7 to Database Extension 2.10.32 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c694f5e5-43eb-453c-98d7-0d575d53df1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-to-database-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-to-database-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-to-database-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-to-database-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.10.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-b08c80c889936db0e80107b8d6e7f7c2.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-b08c80c889936db0e80107b8d6e7f7c2.yaml new file mode 100644 index 0000000000..688ddf1aeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-b08c80c889936db0e80107b8d6e7f7c2.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-to-database-extension-b08c80c889936db0e80107b8d6e7f7c2 + +info: + name: > + Contact Form DB <= 2.8.26 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecb40bc2-aff5-4ced-8ded-1505d7b9db45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-to-database-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-to-database-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-to-database-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-to-database-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-b47f4196237e18a984049178586c33fe.yaml b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-b47f4196237e18a984049178586c33fe.yaml new file mode 100644 index 0000000000..acfe1b5896 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-7-to-database-extension-b47f4196237e18a984049178586c33fe.yaml @@ -0,0 +1,58 @@ +id: contact-form-7-to-database-extension-b47f4196237e18a984049178586c33fe + +info: + name: > + Contact Form DB <= 2.8.19 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f210f6b-091f-45bf-be1e-872db3ab7b59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-7-to-database-extension/" + google-query: inurl:"/wp-content/plugins/contact-form-7-to-database-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-7-to-database-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-7-to-database-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-add-2d5c4c1875b8b7afff532ee362cb19b6.yaml b/nuclei-templates/cve-less/plugins/contact-form-add-2d5c4c1875b8b7afff532ee362cb19b6.yaml new file mode 100644 index 0000000000..6d8065d825 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-add-2d5c4c1875b8b7afff532ee362cb19b6.yaml @@ -0,0 +1,58 @@ +id: contact-form-add-2d5c4c1875b8b7afff532ee362cb19b6 + +info: + name: > + Form Builder <= 1.9.8.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39041c15-dc85-49bc-b5d1-5b4bff05397b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-add/" + google-query: inurl:"/wp-content/plugins/contact-form-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-add,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-add-2fc7a8d84b84e65f1ccfb4b2642e31b7.yaml b/nuclei-templates/cve-less/plugins/contact-form-add-2fc7a8d84b84e65f1ccfb4b2642e31b7.yaml new file mode 100644 index 0000000000..9ae1ed63ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-add-2fc7a8d84b84e65f1ccfb4b2642e31b7.yaml @@ -0,0 +1,58 @@ +id: contact-form-add-2fc7a8d84b84e65f1ccfb4b2642e31b7 + +info: + name: > + Form Builder | Create Responsive Contact Forms <= 1.9.8.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ca760ea-e062-413e-ac92-520922129937?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-add/" + google-query: inurl:"/wp-content/plugins/contact-form-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-add,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-add-7688a1f2aea8d38e34484935054bb963.yaml b/nuclei-templates/cve-less/plugins/contact-form-add-7688a1f2aea8d38e34484935054bb963.yaml new file mode 100644 index 0000000000..d90d81a19a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-add-7688a1f2aea8d38e34484935054bb963.yaml @@ -0,0 +1,58 @@ +id: contact-form-add-7688a1f2aea8d38e34484935054bb963 + +info: + name: > + Form Builder <= 1.9.9.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f8a69ba-2663-4c54-8aef-4c5b0f851186?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-add/" + google-query: inurl:"/wp-content/plugins/contact-form-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-add,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-add-b5a086a164f76d9f65ec8c84b98c931b.yaml b/nuclei-templates/cve-less/plugins/contact-form-add-b5a086a164f76d9f65ec8c84b98c931b.yaml new file mode 100644 index 0000000000..fe2080cb42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-add-b5a086a164f76d9f65ec8c84b98c931b.yaml @@ -0,0 +1,58 @@ +id: contact-form-add-b5a086a164f76d9f65ec8c84b98c931b + +info: + name: > + Form Builder <= 1.9.9.0 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/432807d0-64d8-49b1-a4ab-33aa8fbc5189?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-add/" + google-query: inurl:"/wp-content/plugins/contact-form-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-add,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-advanced-database-7d7f5d445c1f890434d5685044d9c36e.yaml b/nuclei-templates/cve-less/plugins/contact-form-advanced-database-7d7f5d445c1f890434d5685044d9c36e.yaml new file mode 100644 index 0000000000..485873cd11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-advanced-database-7d7f5d445c1f890434d5685044d9c36e.yaml @@ -0,0 +1,58 @@ +id: contact-form-advanced-database-7d7f5d445c1f890434d5685044d9c36e + +info: + name: > + Contact Form Advanced Database <= 1.0.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a54038e1-e9e4-48aa-b368-e8d9ec687e85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-advanced-database/" + google-query: inurl:"/wp-content/plugins/contact-form-advanced-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-advanced-database,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-advanced-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-advanced-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-builder-0dd2df3f5b8d5d1265b1558506e0a48b.yaml b/nuclei-templates/cve-less/plugins/contact-form-builder-0dd2df3f5b8d5d1265b1558506e0a48b.yaml new file mode 100644 index 0000000000..620d8970d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-builder-0dd2df3f5b8d5d1265b1558506e0a48b.yaml @@ -0,0 +1,58 @@ +id: contact-form-builder-0dd2df3f5b8d5d1265b1558506e0a48b + +info: + name: > + WDContactFormBuilder <= 1.0.68 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c190c2d7-961b-4643-a7fe-6d4a22b0d5d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-builder/" + google-query: inurl:"/wp-content/plugins/contact-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-builder-e751943c96e8083bbd38ea46395e441a.yaml b/nuclei-templates/cve-less/plugins/contact-form-builder-e751943c96e8083bbd38ea46395e441a.yaml new file mode 100644 index 0000000000..69a1ad1d56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-builder-e751943c96e8083bbd38ea46395e441a.yaml @@ -0,0 +1,58 @@ +id: contact-form-builder-e751943c96e8083bbd38ea46395e441a + +info: + name: > + WDContactFormBuilder <= 1.0.24 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d55c2b8-c05e-419b-8c2d-8c07c8655c17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-builder/" + google-query: inurl:"/wp-content/plugins/contact-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-builder-eff7610d5a81227a5c58edb7e81bb7b8.yaml b/nuclei-templates/cve-less/plugins/contact-form-builder-eff7610d5a81227a5c58edb7e81bb7b8.yaml new file mode 100644 index 0000000000..821ad5d4e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-builder-eff7610d5a81227a5c58edb7e81bb7b8.yaml @@ -0,0 +1,58 @@ +id: contact-form-builder-eff7610d5a81227a5c58edb7e81bb7b8 + +info: + name: > + WDContactFormBuilder <= 1.0.72 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7152253a-7bb8-4b5c-bffd-86e46df54b7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-builder/" + google-query: inurl:"/wp-content/plugins/contact-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-2fa0b1455e44ce08beb9843b8aba88e0.yaml b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-2fa0b1455e44ce08beb9843b8aba88e0.yaml new file mode 100644 index 0000000000..f83aa20a50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-2fa0b1455e44ce08beb9843b8aba88e0.yaml @@ -0,0 +1,58 @@ +id: contact-form-by-supsystic-2fa0b1455e44ce08beb9843b8aba88e0 + +info: + name: > + Contact Form by Supsystic <= 1.7.14 - Reflected Cross-Site scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b48e0cc-5691-4df0-81ef-72f47d29ce30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-by-supsystic/" + google-query: inurl:"/wp-content/plugins/contact-form-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-by-supsystic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-3f35ac18f9207e0d36c74b4e353744ff.yaml b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-3f35ac18f9207e0d36c74b4e353744ff.yaml new file mode 100644 index 0000000000..f5ae210a69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-3f35ac18f9207e0d36c74b4e353744ff.yaml @@ -0,0 +1,58 @@ +id: contact-form-by-supsystic-3f35ac18f9207e0d36c74b4e353744ff + +info: + name: > + Contact Form by Supsystic < 1.7.20 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e53e70f-45fc-41a6-8436-a8b14f7685d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-by-supsystic/" + google-query: inurl:"/wp-content/plugins/contact-form-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-4d5e40c3dba04c280b662fef0150a3f4.yaml b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-4d5e40c3dba04c280b662fef0150a3f4.yaml new file mode 100644 index 0000000000..c80fe9bc9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-4d5e40c3dba04c280b662fef0150a3f4.yaml @@ -0,0 +1,58 @@ +id: contact-form-by-supsystic-4d5e40c3dba04c280b662fef0150a3f4 + +info: + name: > + Contact Form by Supsystic <= 1.7.24 - Cross-Site Request Forgery via AJAX action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c387b07-baf6-4c62-943e-4bd121160ceb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-by-supsystic/" + google-query: inurl:"/wp-content/plugins/contact-form-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-8496d75762eb7cc39ecc911adbe09233.yaml b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-8496d75762eb7cc39ecc911adbe09233.yaml new file mode 100644 index 0000000000..393e0c03b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-8496d75762eb7cc39ecc911adbe09233.yaml @@ -0,0 +1,58 @@ +id: contact-form-by-supsystic-8496d75762eb7cc39ecc911adbe09233 + +info: + name: > + Contact Form by Supsystic <= 1.7.10 - SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d6629e9-ab43-4eca-9340-5691421ab19d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-by-supsystic/" + google-query: inurl:"/wp-content/plugins/contact-form-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-by-supsystic,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-8aec4bc7a4f45a1f32781336a736062d.yaml b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-8aec4bc7a4f45a1f32781336a736062d.yaml new file mode 100644 index 0000000000..d87810390b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-by-supsystic-8aec4bc7a4f45a1f32781336a736062d.yaml @@ -0,0 +1,58 @@ +id: contact-form-by-supsystic-8aec4bc7a4f45a1f32781336a736062d + +info: + name: > + Contact Form by Supsystic <= 1.7.28 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16dc1927-2171-4234-805b-6e4eed99fa90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-by-supsystic/" + google-query: inurl:"/wp-content/plugins/contact-form-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-cfdb7-1870dbf4bb41dccecc97cff36f308cb8.yaml b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-1870dbf4bb41dccecc97cff36f308cb8.yaml new file mode 100644 index 0000000000..3914265ddb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-1870dbf4bb41dccecc97cff36f308cb8.yaml @@ -0,0 +1,58 @@ +id: contact-form-cfdb7-1870dbf4bb41dccecc97cff36f308cb8 + +info: + name: > + Contact Form 7 Database Addon – CFDB7 <= 1.2.6.8 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/995a6c1d-fb49-4953-9828-f6594ac45fa7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-cfdb7/" + google-query: inurl:"/wp-content/plugins/contact-form-cfdb7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-cfdb7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-cfdb7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-cfdb7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-cfdb7-4804713458840c235ae2e000980eb782.yaml b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-4804713458840c235ae2e000980eb782.yaml new file mode 100644 index 0000000000..dcedd05fe5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-4804713458840c235ae2e000980eb782.yaml @@ -0,0 +1,58 @@ +id: contact-form-cfdb7-4804713458840c235ae2e000980eb782 + +info: + name: > + Contact Form 7 Database Addon <= 1.2.5.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22f79a03-9195-4d5d-a189-9b5e1d3307c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-cfdb7/" + google-query: inurl:"/wp-content/plugins/contact-form-cfdb7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-cfdb7,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-cfdb7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-cfdb7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-cfdb7-75518625380bcaa62f1a02064912f140.yaml b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-75518625380bcaa62f1a02064912f140.yaml new file mode 100644 index 0000000000..fca0ccddd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-75518625380bcaa62f1a02064912f140.yaml @@ -0,0 +1,58 @@ +id: contact-form-cfdb7-75518625380bcaa62f1a02064912f140 + +info: + name: > + Contact Form 7 Database Addon <= 1.2.6.3 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15679ce4-984a-4933-86c5-c8349b03abf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-cfdb7/" + google-query: inurl:"/wp-content/plugins/contact-form-cfdb7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-cfdb7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-cfdb7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-cfdb7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-cfdb7-75ff620cd218a38029d3e52c745f6285.yaml b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-75ff620cd218a38029d3e52c745f6285.yaml new file mode 100644 index 0000000000..234220b409 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-75ff620cd218a38029d3e52c745f6285.yaml @@ -0,0 +1,58 @@ +id: contact-form-cfdb7-75ff620cd218a38029d3e52c745f6285 + +info: + name: > + Contact Form 7 Database Addon – CFDB7 plugin <= 1.2.5.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f2c46f7-b7c9-41a5-8cf9-61a683c3922c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-cfdb7/" + google-query: inurl:"/wp-content/plugins/contact-form-cfdb7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-cfdb7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-cfdb7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-cfdb7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-cfdb7-7a93aae5a1b0a527454a7a7e7a2079a6.yaml b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-7a93aae5a1b0a527454a7a7e7a2079a6.yaml new file mode 100644 index 0000000000..a859a002bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-7a93aae5a1b0a527454a7a7e7a2079a6.yaml @@ -0,0 +1,58 @@ +id: contact-form-cfdb7-7a93aae5a1b0a527454a7a7e7a2079a6 + +info: + name: > + Contact Form 7 Database Addon <= 1.2.5.4 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83e53dc4-84fe-4835-aaea-b72dfe8f7475?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-cfdb7/" + google-query: inurl:"/wp-content/plugins/contact-form-cfdb7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-cfdb7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-cfdb7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-cfdb7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-cfdb7-a479da98606812ed965dd3889c1983c1.yaml b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-a479da98606812ed965dd3889c1983c1.yaml new file mode 100644 index 0000000000..3403935bb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-cfdb7-a479da98606812ed965dd3889c1983c1.yaml @@ -0,0 +1,58 @@ +id: contact-form-cfdb7-a479da98606812ed965dd3889c1983c1 + +info: + name: > + Contact Form 7 Database Addon – CFDB7 <= 1.2.6.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e9ba1cb-62f5-4d6a-9727-ae62bb0edb98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-cfdb7/" + google-query: inurl:"/wp-content/plugins/contact-form-cfdb7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-cfdb7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-cfdb7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-cfdb7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-check-tester-8399de040479bedb6b313106c99e1459.yaml b/nuclei-templates/cve-less/plugins/contact-form-check-tester-8399de040479bedb6b313106c99e1459.yaml new file mode 100644 index 0000000000..8ec1cca749 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-check-tester-8399de040479bedb6b313106c99e1459.yaml @@ -0,0 +1,58 @@ +id: contact-form-check-tester-8399de040479bedb6b313106c99e1459 + +info: + name: > + Contact Form Check Tester <= 1.0.2 - Authenticated (Subscriber+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1313c714-d4d4-4ec8-bae8-99af0cee2f43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-check-tester/" + google-query: inurl:"/wp-content/plugins/contact-form-check-tester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-check-tester,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-check-tester/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-check-tester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..b41af39a17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-0ae9ca018a23708b259b56e1909be0dd.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-0ae9ca018a23708b259b56e1909be0dd.yaml new file mode 100644 index 0000000000..f73fdfc93e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-0ae9ca018a23708b259b56e1909be0dd.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-0ae9ca018a23708b259b56e1909be0dd + +info: + name: > + Contact Form Entries <= 1.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ffeec7b-cd4d-4555-acc0-22b44f237da6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-11d2084b4b4824db42a1247a4ad4b029.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-11d2084b4b4824db42a1247a4ad4b029.yaml new file mode 100644 index 0000000000..02bb20255f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-11d2084b4b4824db42a1247a4ad4b029.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-11d2084b4b4824db42a1247a4ad4b029 + +info: + name: > + Contact Form Entries <= 1.1.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38e40a74-c4b7-4960-880d-a14e77fe1904?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-27391e149ab2871748f52ce997dd4e34.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-27391e149ab2871748f52ce997dd4e34.yaml new file mode 100644 index 0000000000..e040f39d32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-27391e149ab2871748f52ce997dd4e34.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-27391e149ab2871748f52ce997dd4e34 + +info: + name: > + Contact Form Entries <= 1.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via vx-entries shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51986a76-933b-4c25-af79-d0c3f9e1d513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-4b0e1b091043f35eaaaa251df8ddc4b2.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-4b0e1b091043f35eaaaa251df8ddc4b2.yaml new file mode 100644 index 0000000000..dfe366dd19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-4b0e1b091043f35eaaaa251df8ddc4b2.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-4b0e1b091043f35eaaaa251df8ddc4b2 + +info: + name: > + Database for Contact Form 7, WPforms, Elementor forms <= 1.3.8 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adbc23b3-fa9d-4303-8283-1cabb2a6bb71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-572e59930dcc24f750ce3dae22510652.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-572e59930dcc24f750ce3dae22510652.yaml new file mode 100644 index 0000000000..e8a88c047d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-572e59930dcc24f750ce3dae22510652.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-572e59930dcc24f750ce3dae22510652 + +info: + name: > + Contact Form Entries <= 1.3.0 - Authenticated (Contributor+) SQL Injection via shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b475ada-3b31-40a3-9a81-5a7b1a1e190a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-7e31455dbe1dd61224e4a9a69904e9bc.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-7e31455dbe1dd61224e4a9a69904e9bc.yaml new file mode 100644 index 0000000000..178623e735 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-7e31455dbe1dd61224e4a9a69904e9bc.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-7e31455dbe1dd61224e4a9a69904e9bc + +info: + name: > + Contact Form Entries <= 1.2.9 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e345e3a-a3d4-4533-b8bb-90795f991cbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-a7ecc95184b3ade18a4afbbf2cc86f31.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-a7ecc95184b3ade18a4afbbf2cc86f31.yaml new file mode 100644 index 0000000000..896e23d895 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-a7ecc95184b3ade18a4afbbf2cc86f31.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-a7ecc95184b3ade18a4afbbf2cc86f31 + +info: + name: > + Database for Contact Form 7, WPforms, Elementor forms <= 1.3.3 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4528b63-8d8e-44a4-a71f-2ad1636ac93c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-b1d3b6bac2cc1e1f3e245ca1837d27ff.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-b1d3b6bac2cc1e1f3e245ca1837d27ff.yaml new file mode 100644 index 0000000000..8124c9d297 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-b1d3b6bac2cc1e1f3e245ca1837d27ff.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-b1d3b6bac2cc1e1f3e245ca1837d27ff + +info: + name: > + Contact Form Entries <= 1.3.2 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/120313be-9f98-4448-9f5d-a77186a6ff08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-entries-c8150190c374645707abe44442dd04c9.yaml b/nuclei-templates/cve-less/plugins/contact-form-entries-c8150190c374645707abe44442dd04c9.yaml new file mode 100644 index 0000000000..72d18187fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-entries-c8150190c374645707abe44442dd04c9.yaml @@ -0,0 +1,58 @@ +id: contact-form-entries-c8150190c374645707abe44442dd04c9 + +info: + name: > + Contact Form Entries – Contact Form 7, WPforms and more <= 1.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83d46dce-b218-49ed-85ee-0e8d2a391eb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-entries/" + google-query: inurl:"/wp-content/plugins/contact-form-entries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-entries,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-entries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-entries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-generator-4493ed5056e4671039baf554adba702c.yaml b/nuclei-templates/cve-less/plugins/contact-form-generator-4493ed5056e4671039baf554adba702c.yaml new file mode 100644 index 0000000000..ace7e53628 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-generator-4493ed5056e4671039baf554adba702c.yaml @@ -0,0 +1,58 @@ +id: contact-form-generator-4493ed5056e4671039baf554adba702c + +info: + name: > + Contact Form Generator <= 2.7.1 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa586468-d6ff-46a3-97f3-e2e1d365e5b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-generator/" + google-query: inurl:"/wp-content/plugins/contact-form-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-generator-45055b7313617f4962d20d0d3cd73e8b.yaml b/nuclei-templates/cve-less/plugins/contact-form-generator-45055b7313617f4962d20d0d3cd73e8b.yaml new file mode 100644 index 0000000000..b8a308c263 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-generator-45055b7313617f4962d20d0d3cd73e8b.yaml @@ -0,0 +1,58 @@ +id: contact-form-generator-45055b7313617f4962d20d0d3cd73e8b + +info: + name: > + Contact Form Generator : Creative form builder for WordPress <= 2.1.86 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb57de9-210e-4983-965b-9a74ca10c494?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-generator/" + google-query: inurl:"/wp-content/plugins/contact-form-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.86') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-generator-60c9bfea8eebe4996b281df81354bfeb.yaml b/nuclei-templates/cve-less/plugins/contact-form-generator-60c9bfea8eebe4996b281df81354bfeb.yaml new file mode 100644 index 0000000000..c8c1e4df16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-generator-60c9bfea8eebe4996b281df81354bfeb.yaml @@ -0,0 +1,58 @@ +id: contact-form-generator-60c9bfea8eebe4996b281df81354bfeb + +info: + name: > + Contact Form Generator <= 2.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acdac8a7-6ac5-481d-a636-dd791fda89a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-generator/" + google-query: inurl:"/wp-content/plugins/contact-form-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-integrated-with-google-maps-9b4261e2d1c94c9960e52f01252bbfd4.yaml b/nuclei-templates/cve-less/plugins/contact-form-integrated-with-google-maps-9b4261e2d1c94c9960e52f01252bbfd4.yaml new file mode 100644 index 0000000000..6dc7664b64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-integrated-with-google-maps-9b4261e2d1c94c9960e52f01252bbfd4.yaml @@ -0,0 +1,58 @@ +id: contact-form-integrated-with-google-maps-9b4261e2d1c94c9960e52f01252bbfd4 + +info: + name: > + Contact Form Integrated With Google Maps 1.0 - 2.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68b202f7-fff1-4056-9b5b-b42b25189706?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-integrated-with-google-maps/" + google-query: inurl:"/wp-content/plugins/contact-form-integrated-with-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-integrated-with-google-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-integrated-with-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-integrated-with-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0', '<= 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-lite-3ecd0cc847951c575bdce3ab52ae1765.yaml b/nuclei-templates/cve-less/plugins/contact-form-lite-3ecd0cc847951c575bdce3ab52ae1765.yaml new file mode 100644 index 0000000000..ada4377d4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-lite-3ecd0cc847951c575bdce3ab52ae1765.yaml @@ -0,0 +1,58 @@ +id: contact-form-lite-3ecd0cc847951c575bdce3ab52ae1765 + +info: + name: > + Contact Form Plugin <= 4.0.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07f97b57-4258-4bd0-88f0-851e87dfd061?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-lite/" + google-query: inurl:"/wp-content/plugins/contact-form-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-lite-97d382f4c9bc6b17c25a76a092e5b852.yaml b/nuclei-templates/cve-less/plugins/contact-form-lite-97d382f4c9bc6b17c25a76a092e5b852.yaml new file mode 100644 index 0000000000..7a3d5d894c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-lite-97d382f4c9bc6b17c25a76a092e5b852.yaml @@ -0,0 +1,58 @@ +id: contact-form-lite-97d382f4c9bc6b17c25a76a092e5b852 + +info: + name: > + Easy Contact Form Lite <= 1.1.23 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93427a3a-8cbe-4aa7-93e2-c6807bc3390c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-lite/" + google-query: inurl:"/wp-content/plugins/contact-form-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-maker-5530cad0a9767bd88d96d829bf733779.yaml b/nuclei-templates/cve-less/plugins/contact-form-maker-5530cad0a9767bd88d96d829bf733779.yaml new file mode 100644 index 0000000000..d5a4da4aa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-maker-5530cad0a9767bd88d96d829bf733779.yaml @@ -0,0 +1,58 @@ +id: contact-form-maker-5530cad0a9767bd88d96d829bf733779 + +info: + name: > + Contact Form Maker <= 1.13.23 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb56c071-d7b9-40e0-8cc5-2dd48c93b8cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-maker/" + google-query: inurl:"/wp-content/plugins/contact-form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-maker-60c3cd16f2597496a4651e0715286bc1.yaml b/nuclei-templates/cve-less/plugins/contact-form-maker-60c3cd16f2597496a4651e0715286bc1.yaml new file mode 100644 index 0000000000..e7545d4d33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-maker-60c3cd16f2597496a4651e0715286bc1.yaml @@ -0,0 +1,58 @@ +id: contact-form-maker-60c3cd16f2597496a4651e0715286bc1 + +info: + name: > + Contact Form Maker <= 1.7.30 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ef8bf27-3b20-4d90-8d29-b9713d2c41d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-maker/" + google-query: inurl:"/wp-content/plugins/contact-form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-maker-b9705619b7c26905bbb7df74ccb4fdad.yaml b/nuclei-templates/cve-less/plugins/contact-form-maker-b9705619b7c26905bbb7df74ccb4fdad.yaml new file mode 100644 index 0000000000..a2c5747407 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-maker-b9705619b7c26905bbb7df74ccb4fdad.yaml @@ -0,0 +1,58 @@ +id: contact-form-maker-b9705619b7c26905bbb7df74ccb4fdad + +info: + name: > + Contact Form by WD <= 1.13.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55852490-7087-41b8-9848-758e443ae04b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-maker/" + google-query: inurl:"/wp-content/plugins/contact-form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-maker-e46317cbf2f40aac373a74fb30f51dde.yaml b/nuclei-templates/cve-less/plugins/contact-form-maker-e46317cbf2f40aac373a74fb30f51dde.yaml new file mode 100644 index 0000000000..9547c9bfbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-maker-e46317cbf2f40aac373a74fb30f51dde.yaml @@ -0,0 +1,58 @@ +id: contact-form-maker-e46317cbf2f40aac373a74fb30f51dde + +info: + name: > + Contact Form by WD – responsive drag & drop contact form builder tool <= 1.7.18 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca24e26-149f-4805-9097-f7d11485a690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-maker/" + google-query: inurl:"/wp-content/plugins/contact-form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-manager-362c09e706e4df3c312dbda6ffdf171c.yaml b/nuclei-templates/cve-less/plugins/contact-form-manager-362c09e706e4df3c312dbda6ffdf171c.yaml new file mode 100644 index 0000000000..a508fc8f34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-manager-362c09e706e4df3c312dbda6ffdf171c.yaml @@ -0,0 +1,58 @@ +id: contact-form-manager-362c09e706e4df3c312dbda6ffdf171c + +info: + name: > + Contact Form Manager <= 1.4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1ecfa60-9b43-4b70-bd60-278dfb0e7dbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-manager/" + google-query: inurl:"/wp-content/plugins/contact-form-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-manager-bf314fdb968b7a1f09514983e27476f9.yaml b/nuclei-templates/cve-less/plugins/contact-form-manager-bf314fdb968b7a1f09514983e27476f9.yaml new file mode 100644 index 0000000000..f49ac4cd7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-manager-bf314fdb968b7a1f09514983e27476f9.yaml @@ -0,0 +1,58 @@ +id: contact-form-manager-bf314fdb968b7a1f09514983e27476f9 + +info: + name: > + Contact Form Manager <= 1.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f268974a-db92-42d2-9e1d-f990ea067740?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-manager/" + google-query: inurl:"/wp-content/plugins/contact-form-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-manager-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml b/nuclei-templates/cve-less/plugins/contact-form-manager-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml new file mode 100644 index 0000000000..c8323dd6a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-manager-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml @@ -0,0 +1,58 @@ +id: contact-form-manager-dd0f7c53e188e7bf56ca28fcdda5f28e + +info: + name: > + Contact Form Manager <= 1.4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/365ec9c9-7bf4-4e5c-953e-58e3a7150cdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-manager/" + google-query: inurl:"/wp-content/plugins/contact-form-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-multi-78a680d0afadd06452bb6d0bff3dabe2.yaml b/nuclei-templates/cve-less/plugins/contact-form-multi-78a680d0afadd06452bb6d0bff3dabe2.yaml new file mode 100644 index 0000000000..22ada87e7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-multi-78a680d0afadd06452bb6d0bff3dabe2.yaml @@ -0,0 +1,58 @@ +id: contact-form-multi-78a680d0afadd06452bb6d0bff3dabe2 + +info: + name: > + Contact Form Multi by BestWebSoft – Multiple Forms Plugin for Single WordPress Website < 1.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/887ccf72-9ae1-4b7e-9f62-253dea459652?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-multi/" + google-query: inurl:"/wp-content/plugins/contact-form-multi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-multi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-multi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-multi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-0c860e72b162cc9055e799dc4f8c2b43.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-0c860e72b162cc9055e799dc4f8c2b43.yaml new file mode 100644 index 0000000000..05ac718b82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-0c860e72b162cc9055e799dc4f8c2b43.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-0c860e72b162cc9055e799dc4f8c2b43 + +info: + name: > + Contact Form By BestWebSoft<= 3.34 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a58685a5-d57a-42c9-86c7-344015952885?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-28ac556db560c4dbe8e302546acf1314.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-28ac556db560c4dbe8e302546acf1314.yaml new file mode 100644 index 0000000000..ffd9e8e6ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-28ac556db560c4dbe8e302546acf1314.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-28ac556db560c4dbe8e302546acf1314 + +info: + name: > + Contact Form by BestWebSoft – Advanced Contact Us Form Builder for WordPress <= 4.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed43e0ee-0b0e-4367-ba33-a8f08fafcd33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-32db8ca06e20ab6daa51c97bb6564bc7.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-32db8ca06e20ab6daa51c97bb6564bc7.yaml new file mode 100644 index 0000000000..21df2869d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-32db8ca06e20ab6daa51c97bb6564bc7.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-32db8ca06e20ab6daa51c97bb6564bc7 + +info: + name: > + Advanced Contact Us Form Builder for WordPress <= 4.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7c36911-4afe-4ac7-9a76-7365bb86f81c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-7d2288f1e4c8fb646fdb55a372b6200a.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-7d2288f1e4c8fb646fdb55a372b6200a.yaml new file mode 100644 index 0000000000..620152addc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-7d2288f1e4c8fb646fdb55a372b6200a.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-7d2288f1e4c8fb646fdb55a372b6200a + +info: + name: > + Contact Form by BestWebSoft <= 3.95 - ReflectedCross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e283a5a-98b7-464e-9426-cb414f3e3abf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-b2200c29280205b8f648b84224e222a3.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-b2200c29280205b8f648b84224e222a3.yaml new file mode 100644 index 0000000000..4c82902231 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-b2200c29280205b8f648b84224e222a3.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-b2200c29280205b8f648b84224e222a3 + +info: + name: > + Contact Form by BestWebSoft <= 4.2.8 - Reflected Cross-Site Scripting via cntctfrm_contact_address + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5eb66ca3-768e-4d8c-a0fa-74e78250aee3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-b74320f496d843edce06a2ca91d6d756.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-b74320f496d843edce06a2ca91d6d756.yaml new file mode 100644 index 0000000000..29fd669df1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-b74320f496d843edce06a2ca91d6d756.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-b74320f496d843edce06a2ca91d6d756 + +info: + name: > + Contact Form Plugin <= 3.81 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8b47cc6-437b-45c9-b263-ee43c7ec7d14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-bfef76276701b6af6e198a50eb02c42f.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-bfef76276701b6af6e198a50eb02c42f.yaml new file mode 100644 index 0000000000..b1aded0a78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-bfef76276701b6af6e198a50eb02c42f.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-bfef76276701b6af6e198a50eb02c42f + +info: + name: > + Contact Form <= 3.82 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/274e5568-b600-4085-8406-9f9d5d4fc35a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.82') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-db0677cd0c6ea98a43e8b2ad4b143537.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-db0677cd0c6ea98a43e8b2ad4b143537.yaml new file mode 100644 index 0000000000..55c52fe078 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-db0677cd0c6ea98a43e8b2ad4b143537.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-db0677cd0c6ea98a43e8b2ad4b143537 + +info: + name: > + Contact Form by BestWebSoft <= 3.51 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73a15b12-20d5-4448-b69c-9a577ff907b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-plugin-dddf3ae843aadf68e8fa30f4a8366d3d.yaml b/nuclei-templates/cve-less/plugins/contact-form-plugin-dddf3ae843aadf68e8fa30f4a8366d3d.yaml new file mode 100644 index 0000000000..5988469cc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-plugin-dddf3ae843aadf68e8fa30f4a8366d3d.yaml @@ -0,0 +1,58 @@ +id: contact-form-plugin-dddf3ae843aadf68e8fa30f4a8366d3d + +info: + name: > + Contact Form by BestWebSoft <= 4.2.8 - Reflected Cross-Site Scripting via cntctfrm_contact_subject + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28524702-3428-4fca-afe8-71b3f2dd983d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-plugin/" + google-query: inurl:"/wp-content/plugins/contact-form-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-ready-91e28682a12b6a160969ea8bdc14d2e1.yaml b/nuclei-templates/cve-less/plugins/contact-form-ready-91e28682a12b6a160969ea8bdc14d2e1.yaml new file mode 100644 index 0000000000..02116580ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-ready-91e28682a12b6a160969ea8bdc14d2e1.yaml @@ -0,0 +1,58 @@ +id: contact-form-ready-91e28682a12b6a160969ea8bdc14d2e1 + +info: + name: > + Contact Form <= 2.0.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bdba43c-0156-4a6b-b7b9-3f74b506e8f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-ready/" + google-query: inurl:"/wp-content/plugins/contact-form-ready/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-ready,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-ready/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-ready" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-submissions-5591c3e066a7e4066f46ad9259d47c7a.yaml b/nuclei-templates/cve-less/plugins/contact-form-submissions-5591c3e066a7e4066f46ad9259d47c7a.yaml new file mode 100644 index 0000000000..9e4ae3e8b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-submissions-5591c3e066a7e4066f46ad9259d47c7a.yaml @@ -0,0 +1,58 @@ +id: contact-form-submissions-5591c3e066a7e4066f46ad9259d47c7a + +info: + name: > + Contact Form Submissions <= 1.7.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cb02d7c-5014-46e9-9d4c-c207e58a1b0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-submissions/" + google-query: inurl:"/wp-content/plugins/contact-form-submissions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-submissions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-submissions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-submissions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-submissions-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml b/nuclei-templates/cve-less/plugins/contact-form-submissions-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml new file mode 100644 index 0000000000..6608b4e90a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-submissions-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml @@ -0,0 +1,58 @@ +id: contact-form-submissions-fa320a52a4bd2b6a6f52aad5ce1ea74d + +info: + name: > + Contact Form Submissions <= 1.7 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ab883bf-d6b4-4b0e-b8f4-69e6c0f90c70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-submissions/" + google-query: inurl:"/wp-content/plugins/contact-form-submissions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-submissions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-submissions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-submissions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-any-api-23ce5fe03a72b8b92f4c0373c289ac85.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-any-api-23ce5fe03a72b8b92f4c0373c289ac85.yaml new file mode 100644 index 0000000000..e1091d5f0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-any-api-23ce5fe03a72b8b92f4c0373c289ac85.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-any-api-23ce5fe03a72b8b92f4c0373c289ac85 + +info: + name: > + Contact Form to Any API <= 1.1.8 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2912f693-c8fd-48f7-8030-5e1f0edd715f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-any-api/" + google-query: inurl:"/wp-content/plugins/contact-form-to-any-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-any-api,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-any-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-any-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-any-api-2cc77b5ea4b45b7ee724687c14467261.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-any-api-2cc77b5ea4b45b7ee724687c14467261.yaml new file mode 100644 index 0000000000..ed52f82169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-any-api-2cc77b5ea4b45b7ee724687c14467261.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-any-api-2cc77b5ea4b45b7ee724687c14467261 + +info: + name: > + Contact Form to Any API <= 1.1.2 - Authenticated (Administrator+) SQL Injection via 'form_id' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fc6c23c-1c5c-4fd8-aeea-8eb431e33b39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-any-api/" + google-query: inurl:"/wp-content/plugins/contact-form-to-any-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-any-api,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-any-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-any-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-any-api-d34228fe0ea5aea58ceb8ad3c32ed940.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-any-api-d34228fe0ea5aea58ceb8ad3c32ed940.yaml new file mode 100644 index 0000000000..7cd25c78f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-any-api-d34228fe0ea5aea58ceb8ad3c32ed940.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-any-api-d34228fe0ea5aea58ceb8ad3c32ed940 + +info: + name: > + Contact Form to Any API <= 1.1.6 - Missing Authorization via delete_cf7_records() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4a7c647-4c57-499a-8e46-ca273985bd6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-any-api/" + google-query: inurl:"/wp-content/plugins/contact-form-to-any-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-any-api,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-any-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-any-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-db-008dc0e9968f6799131ae4b8b208b112.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-db-008dc0e9968f6799131ae4b8b208b112.yaml new file mode 100644 index 0000000000..bb78a963a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-db-008dc0e9968f6799131ae4b8b208b112.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-db-008dc0e9968f6799131ae4b8b208b112 + +info: + name: > + Contact Form to DB <= 1.5.6 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98e47920-fb99-478d-9d6c-1612e8b4aca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-db/" + google-query: inurl:"/wp-content/plugins/contact-form-to-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-db,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-db-0bc37b5f5d5498d8771db41a1e16a982.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-db-0bc37b5f5d5498d8771db41a1e16a982.yaml new file mode 100644 index 0000000000..1905e43b7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-db-0bc37b5f5d5498d8771db41a1e16a982.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-db-0bc37b5f5d5498d8771db41a1e16a982 + +info: + name: > + Contact Form to DB by BestWebSoft <= 1.7.0 - Authenticated (Contributor+) SQL Injection via cntctfrmtdb_department + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba317acb-d45c-42c0-b5fb-b163bcd59340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-db/" + google-query: inurl:"/wp-content/plugins/contact-form-to-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-db,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-db-681fa4a6fa6cb7b76b53c0bb6085cace.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-db-681fa4a6fa6cb7b76b53c0bb6085cace.yaml new file mode 100644 index 0000000000..3b8d60a4ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-db-681fa4a6fa6cb7b76b53c0bb6085cace.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-db-681fa4a6fa6cb7b76b53c0bb6085cace + +info: + name: > + Contact Form to DB <= 1.7.0 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19b21013-136a-41b0-a667-39f23ccedf2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-db/" + google-query: inurl:"/wp-content/plugins/contact-form-to-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-db,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-db-74041a1cd73f08568e0ec3ed47a172de.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-db-74041a1cd73f08568e0ec3ed47a172de.yaml new file mode 100644 index 0000000000..d978893902 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-db-74041a1cd73f08568e0ec3ed47a172de.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-db-74041a1cd73f08568e0ec3ed47a172de + +info: + name: > + Contact Form to DB by BestWebSoft <= 1.7.1 - Authenticated (Administrator+) SQL Injection via 's' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0e582e3-9ca3-4601-81f2-cb6ef827a468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-db/" + google-query: inurl:"/wp-content/plugins/contact-form-to-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-db,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-19c454491469bb4baac868d543f48c48.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-19c454491469bb4baac868d543f48c48.yaml new file mode 100644 index 0000000000..50c170ac97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-19c454491469bb4baac868d543f48c48.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-19c454491469bb4baac868d543f48c48 + +info: + name: > + Contact Form Email <= 1.2.65 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4515507c-a0a4-4e45-8112-fedd117e425f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.66') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-2c888a383975451b85f071f96c07a849.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-2c888a383975451b85f071f96c07a849.yaml new file mode 100644 index 0000000000..172e8a3005 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-2c888a383975451b85f071f96c07a849.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-2c888a383975451b85f071f96c07a849 + +info: + name: > + Contact Form Email <= 1.2.65 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52ac7ccf-89fd-47d3-ba61-7bcf84908a57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-334f4f62624615af2cc14829ff37be7b.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-334f4f62624615af2cc14829ff37be7b.yaml new file mode 100644 index 0000000000..69f0c5bc64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-334f4f62624615af2cc14829ff37be7b.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-334f4f62624615af2cc14829ff37be7b + +info: + name: > + Contact Form Email <= 1.3.41 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b637ebfd-c273-428b-985c-6f5b6a03f263?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-441ea60f05f966e781a45c27f0c1432d.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-441ea60f05f966e781a45c27f0c1432d.yaml new file mode 100644 index 0000000000..76ffd9561a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-441ea60f05f966e781a45c27f0c1432d.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-441ea60f05f966e781a45c27f0c1432d + +info: + name: > + Contact Form Email <= 1.3.11 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa9450a4-2b96-45e4-b2dc-9a4b26449d19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-523f9782716d9d1f6a85039ec487ef5a.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-523f9782716d9d1f6a85039ec487ef5a.yaml new file mode 100644 index 0000000000..cdec2e45c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-523f9782716d9d1f6a85039ec487ef5a.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-523f9782716d9d1f6a85039ec487ef5a + +info: + name: > + Contact Form Email <= 1.2.65 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cab2f0d7-f288-4462-b2a7-7a999cd47466?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-73e00ca7db916ed6c728c1ea942e0577.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-73e00ca7db916ed6c728c1ea942e0577.yaml new file mode 100644 index 0000000000..b3b174b611 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-73e00ca7db916ed6c728c1ea942e0577.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-73e00ca7db916ed6c728c1ea942e0577 + +info: + name: > + Contact Form Email <= 1.3.43 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86f67129-2042-4dff-85de-e189e9f6b53d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-97fdf4928bbd76fae340c4c5446a338a.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-97fdf4928bbd76fae340c4c5446a338a.yaml new file mode 100644 index 0000000000..d7c52eddcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-97fdf4928bbd76fae340c4c5446a338a.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-97fdf4928bbd76fae340c4c5446a338a + +info: + name: > + Contact Form Email <= 1.3.44 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1daaab1a-ce0e-461d-940e-27b5b3f60e32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-9dea660ab98d663f0efe8a0b1c33b059.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-9dea660ab98d663f0efe8a0b1c33b059.yaml new file mode 100644 index 0000000000..ccba25e05b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-9dea660ab98d663f0efe8a0b1c33b059.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-9dea660ab98d663f0efe8a0b1c33b059 + +info: + name: > + Contact Form Email <= 1.3.31 - Cross-Site Request Forgery to Feedback Submission + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce6ea115-941e-482f-a2a4-95293ff10a69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-b66a39c48610a87259a172e4f5cf2fee.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-b66a39c48610a87259a172e4f5cf2fee.yaml new file mode 100644 index 0000000000..abedbb6a6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-b66a39c48610a87259a172e4f5cf2fee.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-b66a39c48610a87259a172e4f5cf2fee + +info: + name: > + Contact Form Email <= 1.3.24 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96b58c2c-f292-4a48-bd1e-c33cf464c1ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-c7e1acab172697ab915921160c7d0087.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-c7e1acab172697ab915921160c7d0087.yaml new file mode 100644 index 0000000000..a413e949c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-c7e1acab172697ab915921160c7d0087.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-c7e1acab172697ab915921160c7d0087 + +info: + name: > + Contact Form Email <= 1.3.37 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d5c6566-a890-4b95-b349-3874eb57b45a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-c9506f63ff82213ed0ffcd809196c6f9.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-c9506f63ff82213ed0ffcd809196c6f9.yaml new file mode 100644 index 0000000000..3a16f49c2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-c9506f63ff82213ed0ffcd809196c6f9.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-c9506f63ff82213ed0ffcd809196c6f9 + +info: + name: > + Contact Form Email < 1.1.48 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c77295f3-0a37-4fa8-a375-b4bd3dc55945?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-f34034c5adff9e3ed6de1b8ed77cfaad.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-f34034c5adff9e3ed6de1b8ed77cfaad.yaml new file mode 100644 index 0000000000..b79e89da49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-f34034c5adff9e3ed6de1b8ed77cfaad.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-f34034c5adff9e3ed6de1b8ed77cfaad + +info: + name: > + Contact Form Email < 1.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0850b88-09f0-4da8-a9be-1b4aacf610e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-to-email-fa3064d32c24f2074e60835d6d0ebe62.yaml b/nuclei-templates/cve-less/plugins/contact-form-to-email-fa3064d32c24f2074e60835d6d0ebe62.yaml new file mode 100644 index 0000000000..aa83f32db2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-to-email-fa3064d32c24f2074e60835d6d0ebe62.yaml @@ -0,0 +1,58 @@ +id: contact-form-to-email-fa3064d32c24f2074e60835d6d0ebe62 + +info: + name: > + Contact Form Email <= 1.3.31 - Missing Authorization to Feedback Submission + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9596c243-4099-420a-aa2a-381b6299f927?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-to-email/" + google-query: inurl:"/wp-content/plugins/contact-form-to-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-to-email,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-to-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-to-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-6c834138798466361126510722b04f6a.yaml b/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-6c834138798466361126510722b04f6a.yaml new file mode 100644 index 0000000000..e85f692e48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-6c834138798466361126510722b04f6a.yaml @@ -0,0 +1,58 @@ +id: contact-form-with-a-meeting-scheduler-by-vcita-6c834138798466361126510722b04f6a + +info: + name: > + Contact Form Builder by vcita <= 4.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12ce97ba-8053-481f-bcd7-05d5e8292adb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-with-a-meeting-scheduler-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-with-a-meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-87393b6cbe65ceec06a5ec19e419100f.yaml b/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-87393b6cbe65ceec06a5ec19e419100f.yaml new file mode 100644 index 0000000000..c2c4ab78c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-87393b6cbe65ceec06a5ec19e419100f.yaml @@ -0,0 +1,58 @@ +id: contact-form-with-a-meeting-scheduler-by-vcita-87393b6cbe65ceec06a5ec19e419100f + +info: + name: > + Contact Form and Calls To Action by vcita <= 2.6.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2345c972-9fd4-4709-8bde-315ab54f60e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-with-a-meeting-scheduler-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-with-a-meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-c64d112b09ccd6fd1b8f5dd595338d1e.yaml b/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-c64d112b09ccd6fd1b8f5dd595338d1e.yaml new file mode 100644 index 0000000000..2eaae7892f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-with-a-meeting-scheduler-by-vcita-c64d112b09ccd6fd1b8f5dd595338d1e.yaml @@ -0,0 +1,58 @@ +id: contact-form-with-a-meeting-scheduler-by-vcita-c64d112b09ccd6fd1b8f5dd595338d1e + +info: + name: > + Contact Form Builder by vcita <= 4.9.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61c39f5f-3b17-4e4d-824e-241159a73400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-with-a-meeting-scheduler-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-with-a-meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-with-a-meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-with-captcha-cae1c922212fa7c1549f820e13a75cb7.yaml b/nuclei-templates/cve-less/plugins/contact-form-with-captcha-cae1c922212fa7c1549f820e13a75cb7.yaml new file mode 100644 index 0000000000..3254f9d5b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-with-captcha-cae1c922212fa7c1549f820e13a75cb7.yaml @@ -0,0 +1,58 @@ +id: contact-form-with-captcha-cae1c922212fa7c1549f820e13a75cb7 + +info: + name: > + Contact Form With Captcha <= 1.6.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f618a350-e089-40f7-b731-7ffb9ece30b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-with-captcha/" + google-query: inurl:"/wp-content/plugins/contact-form-with-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-with-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-with-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-with-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-with-captcha-e81493486edc65b51a46933e4d69c1ae.yaml b/nuclei-templates/cve-less/plugins/contact-form-with-captcha-e81493486edc65b51a46933e4d69c1ae.yaml new file mode 100644 index 0000000000..1f7477c126 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-with-captcha-e81493486edc65b51a46933e4d69c1ae.yaml @@ -0,0 +1,58 @@ +id: contact-form-with-captcha-e81493486edc65b51a46933e4d69c1ae + +info: + name: > + Contact Form With Captcha <= 1.6.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e30187da-c25d-4651-a32d-abdc6da53978?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-with-captcha/" + google-query: inurl:"/wp-content/plugins/contact-form-with-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-with-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-with-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-with-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-form-x-3ac76b892c0315db178c6ad3b771092a.yaml b/nuclei-templates/cve-less/plugins/contact-form-x-3ac76b892c0315db178c6ad3b771092a.yaml new file mode 100644 index 0000000000..9af50dc091 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-form-x-3ac76b892c0315db178c6ad3b771092a.yaml @@ -0,0 +1,58 @@ +id: contact-form-x-3ac76b892c0315db178c6ad3b771092a + +info: + name: > + Contact Form X <= 2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b996e76-770f-41cc-9601-4e1a3e0127bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-form-x/" + google-query: inurl:"/wp-content/plugins/contact-form-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-form-x,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-form-x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-form-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-14cc2ff52c2662c5bebf9121075ccf4f.yaml b/nuclei-templates/cve-less/plugins/contact-forms-14cc2ff52c2662c5bebf9121075ccf4f.yaml new file mode 100644 index 0000000000..105f570ba7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-14cc2ff52c2662c5bebf9121075ccf4f.yaml @@ -0,0 +1,58 @@ +id: contact-forms-14cc2ff52c2662c5bebf9121075ccf4f + +info: + name: > + Cimatti Contact Forms <= 1.4.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09952b56-a064-46f9-b037-be86cf6df781?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms/" + google-query: inurl:"/wp-content/plugins/contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-6077f7a94c87d9a1b005a233e3c6fd5d.yaml b/nuclei-templates/cve-less/plugins/contact-forms-6077f7a94c87d9a1b005a233e3c6fd5d.yaml new file mode 100644 index 0000000000..c9c3a582ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-6077f7a94c87d9a1b005a233e3c6fd5d.yaml @@ -0,0 +1,58 @@ +id: contact-forms-6077f7a94c87d9a1b005a233e3c6fd5d + +info: + name: > + Contact Forms by Cimatti <= 1.8.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41c71f86-a2f7-4e0e-9145-ba50830f6dba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms/" + google-query: inurl:"/wp-content/plugins/contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-6dcd6771f1f0746a16b380bac310ab87.yaml b/nuclei-templates/cve-less/plugins/contact-forms-6dcd6771f1f0746a16b380bac310ab87.yaml new file mode 100644 index 0000000000..f56e9422d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-6dcd6771f1f0746a16b380bac310ab87.yaml @@ -0,0 +1,58 @@ +id: contact-forms-6dcd6771f1f0746a16b380bac310ab87 + +info: + name: > + Contact Forms by Cimatti <= 1.6.0 - Cross-Site Request Forgery via accua_forms_list_page_table + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab795923-2ec0-49eb-a911-56a74d90ca3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms/" + google-query: inurl:"/wp-content/plugins/contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-79bb03ced62c925cc3980f7773c8b468.yaml b/nuclei-templates/cve-less/plugins/contact-forms-79bb03ced62c925cc3980f7773c8b468.yaml new file mode 100644 index 0000000000..1ddbf8ef08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-79bb03ced62c925cc3980f7773c8b468.yaml @@ -0,0 +1,58 @@ +id: contact-forms-79bb03ced62c925cc3980f7773c8b468 + +info: + name: > + Contact Forms by Cimatti <= 1.7.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ef2196d-3617-44ba-a8c5-dc1b45408293?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms/" + google-query: inurl:"/wp-content/plugins/contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-8da30969bcacb440bbb986e6162d8445.yaml b/nuclei-templates/cve-less/plugins/contact-forms-8da30969bcacb440bbb986e6162d8445.yaml new file mode 100644 index 0000000000..e817e39060 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-8da30969bcacb440bbb986e6162d8445.yaml @@ -0,0 +1,58 @@ +id: contact-forms-8da30969bcacb440bbb986e6162d8445 + +info: + name: > + WordPress Contact Forms by Cimatti <= 1.5.7 - Cross-Site Request Forgery via _accua_forms_form_edit_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f80a1f13-c1b9-4259-8d96-71a3cbcaf4ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms/" + google-query: inurl:"/wp-content/plugins/contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-20311a33f3f379efbba8f0342b6a65da.yaml b/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-20311a33f3f379efbba8f0342b6a65da.yaml new file mode 100644 index 0000000000..c769da9e64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-20311a33f3f379efbba8f0342b6a65da.yaml @@ -0,0 +1,58 @@ +id: contact-forms-anti-spam-20311a33f3f379efbba8f0342b6a65da + +info: + name: > + Maspik – Spam blacklist <= 0.9.2 - Unauthenticated Stored Cross-Site Scripting via efas_add_to_log + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8db52ce-fbc3-4fe1-b9b4-cb2ce7d88a67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms-anti-spam/" + google-query: inurl:"/wp-content/plugins/contact-forms-anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms-anti-spam,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms-anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms-anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-87058e9c1b26afbdd8a6e1c7e1f576f5.yaml b/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-87058e9c1b26afbdd8a6e1c7e1f576f5.yaml new file mode 100644 index 0000000000..26d135df68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-87058e9c1b26afbdd8a6e1c7e1f576f5.yaml @@ -0,0 +1,58 @@ +id: contact-forms-anti-spam-87058e9c1b26afbdd8a6e1c7e1f576f5 + +info: + name: > + Maspik – Spam blacklist <= 0.10.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1703f90-17ad-4988-a60c-e56f88f3a317?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms-anti-spam/" + google-query: inurl:"/wp-content/plugins/contact-forms-anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms-anti-spam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms-anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms-anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-cac5b9f1e3e6750110efd6bb6787f157.yaml b/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-cac5b9f1e3e6750110efd6bb6787f157.yaml new file mode 100644 index 0000000000..b345f8797a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-cac5b9f1e3e6750110efd6bb6787f157.yaml @@ -0,0 +1,58 @@ +id: contact-forms-anti-spam-cac5b9f1e3e6750110efd6bb6787f157 + +info: + name: > + Maspik – Spam blacklist <= 0.7.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0206aead-d146-453d-99ed-3870f7dfdae9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms-anti-spam/" + google-query: inurl:"/wp-content/plugins/contact-forms-anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms-anti-spam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms-anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms-anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-ff4c8819921d9a081116a64b6a2918f8.yaml b/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-ff4c8819921d9a081116a64b6a2918f8.yaml new file mode 100644 index 0000000000..ff52b4f717 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-anti-spam-ff4c8819921d9a081116a64b6a2918f8.yaml @@ -0,0 +1,58 @@ +id: contact-forms-anti-spam-ff4c8819921d9a081116a64b6a2918f8 + +info: + name: > + Maspik – Spam blacklist <= 0.10.3 - Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3a8273e-2439-4138-941e-379d130e0c74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms-anti-spam/" + google-query: inurl:"/wp-content/plugins/contact-forms-anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms-anti-spam,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms-anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms-anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-bb71699aa4349b6b3064f95e45538058.yaml b/nuclei-templates/cve-less/plugins/contact-forms-bb71699aa4349b6b3064f95e45538058.yaml new file mode 100644 index 0000000000..ced234f7f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-bb71699aa4349b6b3064f95e45538058.yaml @@ -0,0 +1,58 @@ +id: contact-forms-bb71699aa4349b6b3064f95e45538058 + +info: + name: > + WordPress Contact Forms by Cimatti <= 1.5.4 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4b2587a-e84e-4149-b9ac-ecf36451f815?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms/" + google-query: inurl:"/wp-content/plugins/contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-builder-e7eeb43a188e099bb735454caeee5ee1.yaml b/nuclei-templates/cve-less/plugins/contact-forms-builder-e7eeb43a188e099bb735454caeee5ee1.yaml new file mode 100644 index 0000000000..66d5ea7eaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-builder-e7eeb43a188e099bb735454caeee5ee1.yaml @@ -0,0 +1,58 @@ +id: contact-forms-builder-e7eeb43a188e099bb735454caeee5ee1 + +info: + name: > + Contact Form Builder, Contact Widget <= 2.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43ea0665-2c6e-4c78-8bc5-056f47f190ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms-builder/" + google-query: inurl:"/wp-content/plugins/contact-forms-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-forms-f0c94fb1e754e56b41cc5bd812bd2131.yaml b/nuclei-templates/cve-less/plugins/contact-forms-f0c94fb1e754e56b41cc5bd812bd2131.yaml new file mode 100644 index 0000000000..8421f45c6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-forms-f0c94fb1e754e56b41cc5bd812bd2131.yaml @@ -0,0 +1,58 @@ +id: contact-forms-f0c94fb1e754e56b41cc5bd812bd2131 + +info: + name: > + Contact Forms by Cimatti <= 1.5.4 - Reflected Cross-Site Scripting via 'form-field-id', 'edit-fid', 'id', 'name', 'type', 'description' Parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b512f9a9-6c83-416c-bacc-ee3bba8dfe29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-forms/" + google-query: inurl:"/wp-content/plugins/contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-list-572bae7edaf128953359cfe6de03a4a0.yaml b/nuclei-templates/cve-less/plugins/contact-list-572bae7edaf128953359cfe6de03a4a0.yaml new file mode 100644 index 0000000000..6952e688f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-list-572bae7edaf128953359cfe6de03a4a0.yaml @@ -0,0 +1,58 @@ +id: contact-list-572bae7edaf128953359cfe6de03a4a0 + +info: + name: > + Contact List – Easy Business Directory, Staff Directory and Address Book Plugin <= 2.9.41 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/926246a7-2f0d-4472-ae0a-fa3d95e5810f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-list/" + google-query: inurl:"/wp-content/plugins/contact-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-list-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/contact-list-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3f47ab3778 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-list-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: contact-list-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-list/" + google-query: inurl:"/wp-content/plugins/contact-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..cd0be3cbd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: contact-us-page-contact-people-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-us-page-contact-people/" + google-query: inurl:"/wp-content/plugins/contact-us-page-contact-people/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-us-page-contact-people,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-us-page-contact-people/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-us-page-contact-people" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-500d22096689e74a2a7a6d680b428339.yaml b/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-500d22096689e74a2a7a6d680b428339.yaml new file mode 100644 index 0000000000..817fe11197 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-500d22096689e74a2a7a6d680b428339.yaml @@ -0,0 +1,58 @@ +id: contact-us-page-contact-people-500d22096689e74a2a7a6d680b428339 + +info: + name: > + Contact Us Page – Contact People <= 3.6.1 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2ce98c3-b0a5-4b6b-ac3c-26e0a3195944?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-us-page-contact-people/" + google-query: inurl:"/wp-content/plugins/contact-us-page-contact-people/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-us-page-contact-people,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-us-page-contact-people/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-us-page-contact-people" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-b847bc73a92d46d668812fa6ef8e89b3.yaml b/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-b847bc73a92d46d668812fa6ef8e89b3.yaml new file mode 100644 index 0000000000..1c4bb1b347 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-b847bc73a92d46d668812fa6ef8e89b3.yaml @@ -0,0 +1,58 @@ +id: contact-us-page-contact-people-b847bc73a92d46d668812fa6ef8e89b3 + +info: + name: > + Contact Us Page – Contact People <= 3.7.0 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cec03d3-0e80-4025-b782-1ce9c3237569?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-us-page-contact-people/" + google-query: inurl:"/wp-content/plugins/contact-us-page-contact-people/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-us-page-contact-people,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-us-page-contact-people/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-us-page-contact-people" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-b935aac9392ea74d48c16c20e8b0b995.yaml b/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-b935aac9392ea74d48c16c20e8b0b995.yaml new file mode 100644 index 0000000000..2df6e4665e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-us-page-contact-people-b935aac9392ea74d48c16c20e8b0b995.yaml @@ -0,0 +1,58 @@ +id: contact-us-page-contact-people-b935aac9392ea74d48c16c20e8b0b995 + +info: + name: > + a3rev Multiple Plugins <= Various Versions - Cross-Site Request Forgery to Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9133fa10-036b-4f42-9d0c-8e15d2625f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-us-page-contact-people/" + google-query: inurl:"/wp-content/plugins/contact-us-page-contact-people/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-us-page-contact-people,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-us-page-contact-people/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-us-page-contact-people" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contact-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/contact-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..eb01705095 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contact-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: contact-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contact-widgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/contact-widgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contact-widgets-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contact-widgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contact-widgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contactme-96de724cebfb88ce342c3f1cd99b7f35.yaml b/nuclei-templates/cve-less/plugins/contactme-96de724cebfb88ce342c3f1cd99b7f35.yaml new file mode 100644 index 0000000000..e7c2bfe3d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contactme-96de724cebfb88ce342c3f1cd99b7f35.yaml @@ -0,0 +1,58 @@ +id: contactme-96de724cebfb88ce342c3f1cd99b7f35 + +info: + name: > + Contact Form by ContactMe.com <= 2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/904f8881-1513-43b7-a9cf-1b81d8493b12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contactme/" + google-query: inurl:"/wp-content/plugins/contactme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contactme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contactme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contactme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contempo-real-estate-custom-posts-989d7e2b18423ced6908cb91d5240631.yaml b/nuclei-templates/cve-less/plugins/contempo-real-estate-custom-posts-989d7e2b18423ced6908cb91d5240631.yaml new file mode 100644 index 0000000000..60e030db0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contempo-real-estate-custom-posts-989d7e2b18423ced6908cb91d5240631.yaml @@ -0,0 +1,58 @@ +id: contempo-real-estate-custom-posts-989d7e2b18423ced6908cb91d5240631 + +info: + name: > + Contempo Real Estate Custom Posts <= 3.2.6 - Unauthorized File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6635db72-8302-421d-9011-7eabb57c43a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contempo-real-estate-custom-posts/" + google-query: inurl:"/wp-content/plugins/contempo-real-estate-custom-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contempo-real-estate-custom-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contempo-real-estate-custom-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contempo-real-estate-custom-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-audit-a03a0aef3cdb2ee1e486094cc570f1e0.yaml b/nuclei-templates/cve-less/plugins/content-audit-a03a0aef3cdb2ee1e486094cc570f1e0.yaml new file mode 100644 index 0000000000..38b4dcdd29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-audit-a03a0aef3cdb2ee1e486094cc570f1e0.yaml @@ -0,0 +1,58 @@ +id: content-audit-a03a0aef3cdb2ee1e486094cc570f1e0 + +info: + name: > + Content Audit <= 1.9.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c801dfe6-a39f-4212-9cd7-71ef921c43ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-audit/" + google-query: inurl:"/wp-content/plugins/content-audit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-audit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-audit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-audit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-audit-bdf28a131c7bd7c8afd4060cccc1802a.yaml b/nuclei-templates/cve-less/plugins/content-audit-bdf28a131c7bd7c8afd4060cccc1802a.yaml new file mode 100644 index 0000000000..4508cc7ff8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-audit-bdf28a131c7bd7c8afd4060cccc1802a.yaml @@ -0,0 +1,58 @@ +id: content-audit-bdf28a131c7bd7c8afd4060cccc1802a + +info: + name: > + Content Audit <= 1.6.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/436dc261-66b8-4b6c-9932-82513c3e5461?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-audit/" + google-query: inurl:"/wp-content/plugins/content-audit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-audit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-audit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-audit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-aware-sidebars-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/content-aware-sidebars-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a287872aba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-aware-sidebars-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: content-aware-sidebars-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-aware-sidebars/" + google-query: inurl:"/wp-content/plugins/content-aware-sidebars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-aware-sidebars,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-aware-sidebars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-aware-sidebars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.17.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-aware-sidebars-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/content-aware-sidebars-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..2d5d7b91ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-aware-sidebars-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: content-aware-sidebars-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-aware-sidebars/" + google-query: inurl:"/wp-content/plugins/content-aware-sidebars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-aware-sidebars,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-aware-sidebars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-aware-sidebars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-cards-3504e7e5ce554ea17877d4ad4d619862.yaml b/nuclei-templates/cve-less/plugins/content-cards-3504e7e5ce554ea17877d4ad4d619862.yaml new file mode 100644 index 0000000000..44b6971427 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-cards-3504e7e5ce554ea17877d4ad4d619862.yaml @@ -0,0 +1,58 @@ +id: content-cards-3504e7e5ce554ea17877d4ad4d619862 + +info: + name: > + Content Cards <= 0.9.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/054f6ed4-75fc-4431-9249-48f41860d682?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-cards/" + google-query: inurl:"/wp-content/plugins/content-cards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-cards,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-cards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-cards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-cards-c0ae11bcf65a3a05752255a9835cc822.yaml b/nuclei-templates/cve-less/plugins/content-cards-c0ae11bcf65a3a05752255a9835cc822.yaml new file mode 100644 index 0000000000..c6f156c5ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-cards-c0ae11bcf65a3a05752255a9835cc822.yaml @@ -0,0 +1,58 @@ +id: content-cards-c0ae11bcf65a3a05752255a9835cc822 + +info: + name: > + Content Cards <= 0.9.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e7d10ab-2525-407b-b814-ef7d884d5287?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-cards/" + google-query: inurl:"/wp-content/plugins/content-cards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-cards,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-cards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-cards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-collector-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/content-collector-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..aedbb692c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-collector-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: content-collector-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-collector/" + google-query: inurl:"/wp-content/plugins/content-collector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-collector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-collector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-collector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-control-65043d39bf222f68f6c9850d424ae1bf.yaml b/nuclei-templates/cve-less/plugins/content-control-65043d39bf222f68f6c9850d424ae1bf.yaml new file mode 100644 index 0000000000..044c412620 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-control-65043d39bf222f68f6c9850d424ae1bf.yaml @@ -0,0 +1,58 @@ +id: content-control-65043d39bf222f68f6c9850d424ae1bf + +info: + name: > + Content Control <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6e8d21a-8c67-4e35-b18e-e100f31b2863?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-control/" + google-query: inurl:"/wp-content/plugins/content-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-control,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-control-6cd803f0fa2a9a46d6f2307a3acf4872.yaml b/nuclei-templates/cve-less/plugins/content-control-6cd803f0fa2a9a46d6f2307a3acf4872.yaml new file mode 100644 index 0000000000..3be9fdc706 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-control-6cd803f0fa2a9a46d6f2307a3acf4872.yaml @@ -0,0 +1,58 @@ +id: content-control-6cd803f0fa2a9a46d6f2307a3acf4872 + +info: + name: > + Content Control <= 2.1.0 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a14cce74-6432-4b92-85c8-8b899e4248fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-control/" + google-query: inurl:"/wp-content/plugins/content-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-control,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-egg-b1d431b2d71fecfb14bc9d5f71e53d5a.yaml b/nuclei-templates/cve-less/plugins/content-egg-b1d431b2d71fecfb14bc9d5f71e53d5a.yaml new file mode 100644 index 0000000000..4d6bc0cf19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-egg-b1d431b2d71fecfb14bc9d5f71e53d5a.yaml @@ -0,0 +1,58 @@ +id: content-egg-b1d431b2d71fecfb14bc9d5f71e53d5a + +info: + name: > + Content Egg <= 5.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c26ecf2-f5bb-427f-9f09-6b3d1fb5da3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-egg/" + google-query: inurl:"/wp-content/plugins/content-egg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-egg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-egg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-egg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-egg-e3ab5ea87cccc6d9dbd7e7c3ec127075.yaml b/nuclei-templates/cve-less/plugins/content-egg-e3ab5ea87cccc6d9dbd7e7c3ec127075.yaml new file mode 100644 index 0000000000..e9da1d783d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-egg-e3ab5ea87cccc6d9dbd7e7c3ec127075.yaml @@ -0,0 +1,58 @@ +id: content-egg-e3ab5ea87cccc6d9dbd7e7c3ec127075 + +info: + name: > + Content Egg <= 5.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/925ca72b-3761-42e5-aace-b31d42bc9a73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-egg/" + google-query: inurl:"/wp-content/plugins/content-egg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-egg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-egg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-egg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-excel-importer-d376b4d580b7428d3bfbfcb6ac5ff40d.yaml b/nuclei-templates/cve-less/plugins/content-excel-importer-d376b4d580b7428d3bfbfcb6ac5ff40d.yaml new file mode 100644 index 0000000000..38d214fd81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-excel-importer-d376b4d580b7428d3bfbfcb6ac5ff40d.yaml @@ -0,0 +1,58 @@ +id: content-excel-importer-d376b4d580b7428d3bfbfcb6ac5ff40d + +info: + name: > + Import Content in WordPress & WooCommerce with Excel <= 4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a8cb8ef-a2e5-47ef-8d8c-759ed83a015b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-excel-importer/" + google-query: inurl:"/wp-content/plugins/content-excel-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-excel-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-excel-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-excel-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-grabber-d1c8ca034f832b8e22c96845d2890940.yaml b/nuclei-templates/cve-less/plugins/content-grabber-d1c8ca034f832b8e22c96845d2890940.yaml new file mode 100644 index 0000000000..b314934b5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-grabber-d1c8ca034f832b8e22c96845d2890940.yaml @@ -0,0 +1,58 @@ +id: content-grabber-d1c8ca034f832b8e22c96845d2890940 + +info: + name: > + Content Grabber <= 1.0 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cd3c84b-dacc-44e8-a236-bfc80e6dceba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-grabber/" + google-query: inurl:"/wp-content/plugins/content-grabber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-grabber,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-grabber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-grabber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-mask-1c3db202ed4136234a7dba357e335f3e.yaml b/nuclei-templates/cve-less/plugins/content-mask-1c3db202ed4136234a7dba357e335f3e.yaml new file mode 100644 index 0000000000..f50863ce0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-mask-1c3db202ed4136234a7dba357e335f3e.yaml @@ -0,0 +1,58 @@ +id: content-mask-1c3db202ed4136234a7dba357e335f3e + +info: + name: > + Content Mask <= 1.8.4 - Authenticated (Subscriber+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/267d2b02-6365-4553-9809-bc3a8b070c7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-mask/" + google-query: inurl:"/wp-content/plugins/content-mask/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-mask,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-mask/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-mask" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-protector-0585d1bea582d0ee6fb87cab95609406.yaml b/nuclei-templates/cve-less/plugins/content-protector-0585d1bea582d0ee6fb87cab95609406.yaml new file mode 100644 index 0000000000..2dd7bb9979 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-protector-0585d1bea582d0ee6fb87cab95609406.yaml @@ -0,0 +1,58 @@ +id: content-protector-0585d1bea582d0ee6fb87cab95609406 + +info: + name: > + Passster <= 4.2.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via content_protector Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/880f1f3f-857c-46da-a65c-082348260f89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-protector/" + google-query: inurl:"/wp-content/plugins/content-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-protector-457bded7758897bb7b11c24dee26d4c2.yaml b/nuclei-templates/cve-less/plugins/content-protector-457bded7758897bb7b11c24dee26d4c2.yaml new file mode 100644 index 0000000000..f8f2f5870d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-protector-457bded7758897bb7b11c24dee26d4c2.yaml @@ -0,0 +1,58 @@ +id: content-protector-457bded7758897bb7b11c24dee26d4c2 + +info: + name: > + Passster <= 3.5.5.8 - Missing Authentication leading to Sensitive Information Disclosure (Private Post Leakage) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ac2559a-c622-417c-a655-e92e8ac96770?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-protector/" + google-query: inurl:"/wp-content/plugins/content-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-protector,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-protector-5a70a8d7dfb4ee35e96ebed234af90de.yaml b/nuclei-templates/cve-less/plugins/content-protector-5a70a8d7dfb4ee35e96ebed234af90de.yaml new file mode 100644 index 0000000000..872b3f939c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-protector-5a70a8d7dfb4ee35e96ebed234af90de.yaml @@ -0,0 +1,58 @@ +id: content-protector-5a70a8d7dfb4ee35e96ebed234af90de + +info: + name: > + Passster <= 3.5.5.5.1 - Insecure Password Storage to Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97dd7e1a-9189-4a35-9cd0-e80b5d9a0e9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-protector/" + google-query: inurl:"/wp-content/plugins/content-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-protector,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-protector-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/content-protector-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b9f3fbcb7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-protector-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: content-protector-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-protector/" + google-query: inurl:"/wp-content/plugins/content-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-protector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-protector-bd26cb20f513a11738059a698b560137.yaml b/nuclei-templates/cve-less/plugins/content-protector-bd26cb20f513a11738059a698b560137.yaml new file mode 100644 index 0000000000..198c871309 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-protector-bd26cb20f513a11738059a698b560137.yaml @@ -0,0 +1,58 @@ +id: content-protector-bd26cb20f513a11738059a698b560137 + +info: + name: > + Passster – Password Protect Pages and Content <= 4.2.6.2 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00b81467-8d00-4816-895a-89d67c541c17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-protector/" + google-query: inurl:"/wp-content/plugins/content-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-protector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-protector-d2daaa3d964f6f32895fca6e21e6cab6.yaml b/nuclei-templates/cve-less/plugins/content-protector-d2daaa3d964f6f32895fca6e21e6cab6.yaml new file mode 100644 index 0000000000..ea0bfb848e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-protector-d2daaa3d964f6f32895fca6e21e6cab6.yaml @@ -0,0 +1,58 @@ +id: content-protector-d2daaa3d964f6f32895fca6e21e6cab6 + +info: + name: > + Passster – Password Protection <= 3.5.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b60e693-472e-48ba-81c7-869c9b255762?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-protector/" + google-query: inurl:"/wp-content/plugins/content-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-repeater-8bc6ce24c222c874630a145ef16e8d93.yaml b/nuclei-templates/cve-less/plugins/content-repeater-8bc6ce24c222c874630a145ef16e8d93.yaml new file mode 100644 index 0000000000..e26da1334c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-repeater-8bc6ce24c222c874630a145ef16e8d93.yaml @@ -0,0 +1,58 @@ +id: content-repeater-8bc6ce24c222c874630a145ef16e8d93 + +info: + name: > + Content Repeater – Custom Posts Simplified <= 1.1.13 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9ad3a88-fcfd-45c5-a23d-ca544cad3ab2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-repeater/" + google-query: inurl:"/wp-content/plugins/content-repeater/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-repeater,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-repeater/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-repeater" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-repeater-ab2b677573aede58b8661a8c8b875adf.yaml b/nuclei-templates/cve-less/plugins/content-repeater-ab2b677573aede58b8661a8c8b875adf.yaml new file mode 100644 index 0000000000..87f844966c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-repeater-ab2b677573aede58b8661a8c8b875adf.yaml @@ -0,0 +1,58 @@ +id: content-repeater-ab2b677573aede58b8661a8c8b875adf + +info: + name: > + Content Repeater <= 1.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21ae9136-a60c-483d-bdf4-b0c55796560d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-repeater/" + google-query: inurl:"/wp-content/plugins/content-repeater/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-repeater,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-repeater/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-repeater" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-restrictor-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/content-restrictor-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f685c27d45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-restrictor-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: content-restrictor-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-restrictor-for-divi/" + google-query: inurl:"/wp-content/plugins/content-restrictor-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-restrictor-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-restrictor-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-restrictor-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-slide-8acf2c0ab08c8e98004387e8ebf54bb0.yaml b/nuclei-templates/cve-less/plugins/content-slide-8acf2c0ab08c8e98004387e8ebf54bb0.yaml new file mode 100644 index 0000000000..480699b533 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-slide-8acf2c0ab08c8e98004387e8ebf54bb0.yaml @@ -0,0 +1,58 @@ +id: content-slide-8acf2c0ab08c8e98004387e8ebf54bb0 + +info: + name: > + Content Slide <= 1.4.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d767b710-0bef-4f36-8edd-eccd845a2b07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-slide/" + google-query: inurl:"/wp-content/plugins/content-slide/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-slide,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-slide/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-slide" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-slide-d36d80c800d370d4009d1b192f222cc5.yaml b/nuclei-templates/cve-less/plugins/content-slide-d36d80c800d370d4009d1b192f222cc5.yaml new file mode 100644 index 0000000000..f0c256853a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-slide-d36d80c800d370d4009d1b192f222cc5.yaml @@ -0,0 +1,58 @@ +id: content-slide-d36d80c800d370d4009d1b192f222cc5 + +info: + name: > + WordPress Content Slide <= 1.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca4c05-b9fc-4932-be4b-beb57ca3bb7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-slide/" + google-query: inurl:"/wp-content/plugins/content-slide/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-slide,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-slide/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-slide" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-staging-a29cb4528fb3dd359faf1d68a8cf9ee1.yaml b/nuclei-templates/cve-less/plugins/content-staging-a29cb4528fb3dd359faf1d68a8cf9ee1.yaml new file mode 100644 index 0000000000..db000a33ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-staging-a29cb4528fb3dd359faf1d68a8cf9ee1.yaml @@ -0,0 +1,58 @@ +id: content-staging-a29cb4528fb3dd359faf1d68a8cf9ee1 + +info: + name: > + Content Staging <= 2.0.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8270ef0-7c98-4bb1-af83-bdcc2c7867ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-staging/" + google-query: inurl:"/wp-content/plugins/content-staging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-staging,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-staging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-staging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-text-slider-on-post-321e86531ce3a7401f2a887940f1ca1d.yaml b/nuclei-templates/cve-less/plugins/content-text-slider-on-post-321e86531ce3a7401f2a887940f1ca1d.yaml new file mode 100644 index 0000000000..5076342330 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-text-slider-on-post-321e86531ce3a7401f2a887940f1ca1d.yaml @@ -0,0 +1,58 @@ +id: content-text-slider-on-post-321e86531ce3a7401f2a887940f1ca1d + +info: + name: > + Content text slider on post < 6.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51a49b5b-c0a3-4aac-84cc-6e1ebf3a442e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-text-slider-on-post/" + google-query: inurl:"/wp-content/plugins/content-text-slider-on-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-text-slider-on-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-text-slider-on-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-text-slider-on-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-32b155c617c0c335f9330107a2737ef9.yaml b/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-32b155c617c0c335f9330107a2737ef9.yaml new file mode 100644 index 0000000000..270f35918a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-32b155c617c0c335f9330107a2737ef9.yaml @@ -0,0 +1,58 @@ +id: content-views-query-and-display-post-page-32b155c617c0c335f9330107a2737ef9 + +info: + name: > + Content Views – Post Grid & Filter, Recent Posts, Category Posts, & More (Gutenberg Blocks and Shortcode) <= 3.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via pagingType Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65504747-7f1b-43f9-be4d-48b9547e7c45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-views-query-and-display-post-page/" + google-query: inurl:"/wp-content/plugins/content-views-query-and-display-post-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-views-query-and-display-post-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-views-query-and-display-post-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-views-query-and-display-post-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-96403daec96064716d990b4ed68fc604.yaml b/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-96403daec96064716d990b4ed68fc604.yaml new file mode 100644 index 0000000000..3ccd8a1366 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-96403daec96064716d990b4ed68fc604.yaml @@ -0,0 +1,58 @@ +id: content-views-query-and-display-post-page-96403daec96064716d990b4ed68fc604 + +info: + name: > + Content Views <= 3.6.2 - Authenticated(Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa4377a8-bcf4-45ba-824b-3505bd8e8c61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-views-query-and-display-post-page/" + google-query: inurl:"/wp-content/plugins/content-views-query-and-display-post-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-views-query-and-display-post-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-views-query-and-display-post-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-views-query-and-display-post-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-f50e7448551c79441add3846b2a5874b.yaml b/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-f50e7448551c79441add3846b2a5874b.yaml new file mode 100644 index 0000000000..57a12c9bff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-views-query-and-display-post-page-f50e7448551c79441add3846b2a5874b.yaml @@ -0,0 +1,58 @@ +id: content-views-query-and-display-post-page-f50e7448551c79441add3846b2a5874b + +info: + name: > + Content Views – Post Grid & Filter, Recent Posts, Category Posts, & More (Gutenberg Blocks and Shortcode) <= 3.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Widget Post Overlay + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5666da4a-ffb6-47ed-8b48-a80f09dd2501?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-views-query-and-display-post-page/" + google-query: inurl:"/wp-content/plugins/content-views-query-and-display-post-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-views-query-and-display-post-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-views-query-and-display-post-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-views-query-and-display-post-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content-warning-v2-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/content-warning-v2-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6dcad09659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content-warning-v2-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: content-warning-v2-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content-warning-v2/" + google-query: inurl:"/wp-content/plugins/content-warning-v2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content-warning-v2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content-warning-v2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content-warning-v2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/content_timeline-7f9ad1d6a2154bddb398590843df9930.yaml b/nuclei-templates/cve-less/plugins/content_timeline-7f9ad1d6a2154bddb398590843df9930.yaml new file mode 100644 index 0000000000..d97f1ee0f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/content_timeline-7f9ad1d6a2154bddb398590843df9930.yaml @@ -0,0 +1,58 @@ +id: content_timeline-7f9ad1d6a2154bddb398590843df9930 + +info: + name: > + Content Timeline <= 4.4.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c66d88a1-0936-40c4-adcf-ad79b9c57a80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/content_timeline/" + google-query: inurl:"/wp-content/plugins/content_timeline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,content_timeline,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/content_timeline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "content_timeline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contentboxes-eaa7c0a2d867f267f85dfa358433a0fa.yaml b/nuclei-templates/cve-less/plugins/contentboxes-eaa7c0a2d867f267f85dfa358433a0fa.yaml new file mode 100644 index 0000000000..59d4b8b12f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contentboxes-eaa7c0a2d867f267f85dfa358433a0fa.yaml @@ -0,0 +1,58 @@ +id: contentboxes-eaa7c0a2d867f267f85dfa358433a0fa + +info: + name: > + Contentboxes <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b1329b6-ae1f-4a46-8435-5023c5c130f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contentboxes/" + google-query: inurl:"/wp-content/plugins/contentboxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contentboxes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contentboxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contentboxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contentstudio-573a62057c81ca4962d570ce03558e74.yaml b/nuclei-templates/cve-less/plugins/contentstudio-573a62057c81ca4962d570ce03558e74.yaml new file mode 100644 index 0000000000..76fcc0c103 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contentstudio-573a62057c81ca4962d570ce03558e74.yaml @@ -0,0 +1,58 @@ +id: contentstudio-573a62057c81ca4962d570ce03558e74 + +info: + name: > + ContentStudio <= 1.1.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4039a27-0100-49c5-8dce-cf015a08ef04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contentstudio/" + google-query: inurl:"/wp-content/plugins/contentstudio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contentstudio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contentstudio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contentstudio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contentstudio-64bd1922f633605cf49031a3735ffb86.yaml b/nuclei-templates/cve-less/plugins/contentstudio-64bd1922f633605cf49031a3735ffb86.yaml new file mode 100644 index 0000000000..9854498ee9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contentstudio-64bd1922f633605cf49031a3735ffb86.yaml @@ -0,0 +1,58 @@ +id: contentstudio-64bd1922f633605cf49031a3735ffb86 + +info: + name: > + ContentStudio <= 1.2.5 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c31828dc-ef94-4895-8395-a5d52a0a82bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contentstudio/" + google-query: inurl:"/wp-content/plugins/contentstudio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contentstudio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contentstudio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contentstudio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contentstudio-93d0c9fb7bc094c24fb138bae4f602fc.yaml b/nuclei-templates/cve-less/plugins/contentstudio-93d0c9fb7bc094c24fb138bae4f602fc.yaml new file mode 100644 index 0000000000..a76bc63fc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contentstudio-93d0c9fb7bc094c24fb138bae4f602fc.yaml @@ -0,0 +1,58 @@ +id: contentstudio-93d0c9fb7bc094c24fb138bae4f602fc + +info: + name: > + ContentStudio <= 1.2.5 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62eb136f-3cb0-40dc-a154-015a7fa1077b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contentstudio/" + google-query: inurl:"/wp-content/plugins/contentstudio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contentstudio,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contentstudio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contentstudio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contentstudio-9dbce4bd062a39cef5c1a852c279047e.yaml b/nuclei-templates/cve-less/plugins/contentstudio-9dbce4bd062a39cef5c1a852c279047e.yaml new file mode 100644 index 0000000000..7fb7f7841f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contentstudio-9dbce4bd062a39cef5c1a852c279047e.yaml @@ -0,0 +1,58 @@ +id: contentstudio-9dbce4bd062a39cef5c1a852c279047e + +info: + name: > + ContentStudio <= 1.2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52db8d41-859a-4d68-8b83-3d3af8f1bf64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contentstudio/" + google-query: inurl:"/wp-content/plugins/contentstudio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contentstudio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contentstudio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contentstudio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-code-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/contest-code-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f6bb01d6e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-code-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: contest-code-checker-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-code-checker/" + google-query: inurl:"/wp-content/plugins/contest-code-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-code-checker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-code-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-code-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml new file mode 100644 index 0000000000..6515d0b920 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-1ac52ae7a1da8b0bd7a9bd3597d76efd + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via addCountS + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f185709e-0d13-48d3-9c15-03466b72dac2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-1fcba72eb855bf7a2b762f45f8e9327d.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-1fcba72eb855bf7a2b762f45f8e9327d.yaml new file mode 100644 index 0000000000..425d581dab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-1fcba72eb855bf7a2b762f45f8e9327d.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-1fcba72eb855bf7a2b762f45f8e9327d + +info: + name: > + Photos and Files Contest Gallery <= 21.3.4 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79fb4f24-8a59-4e57-b583-c87ee2493cdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-2613b63d2aee689ccf6be1c1b97a178f.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-2613b63d2aee689ccf6be1c1b97a178f.yaml new file mode 100644 index 0000000000..a2477d325b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-2613b63d2aee689ccf6be1c1b97a178f.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-2613b63d2aee689ccf6be1c1b97a178f + +info: + name: > + Contest Gallery <= 21.3.4 - Authenticated (Author+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ed63de5-ef65-4e90-afc1-b7a075e99316?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml new file mode 100644 index 0000000000..2616f0cf7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-4b9ef62a2d3dd2d1bbf6db4d54a3bb14 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_multiple_files_for_post + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b1b1a55-7872-456f-a754-023aad354359?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-4f98def5aafbaedc907582ddf709a1ef.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-4f98def5aafbaedc907582ddf709a1ef.yaml new file mode 100644 index 0000000000..2488c1971b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-4f98def5aafbaedc907582ddf709a1ef.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-4f98def5aafbaedc907582ddf709a1ef + +info: + name: > + Contest Gallery <= 19.1.5 - Authenticated (Author+) SQL Injection via upload[] + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf24ee30-7d9f-47c3-bc2a-1c3c92971ba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-534d85fc0380423c37750b4f71b369b0.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-534d85fc0380423c37750b4f71b369b0.yaml new file mode 100644 index 0000000000..9a4bf76a31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-534d85fc0380423c37750b4f71b369b0.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-534d85fc0380423c37750b4f71b369b0 + +info: + name: > + Photos and Files Contest Gallery <= 21.3.2 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d3150b3-fba1-4e89-8f4e-b6c605227395?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-53642a245d326d7cbf44af5789554e3c.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-53642a245d326d7cbf44af5789554e3c.yaml new file mode 100644 index 0000000000..8e718c6ef3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-53642a245d326d7cbf44af5789554e3c.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-53642a245d326d7cbf44af5789554e3c + +info: + name: > + Contest Gallery <= 21.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dbd3b23-cebc-4212-bcae-c6f23031c040?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-53bd8ee68daf44e8898790dff3d4d891.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-53bd8ee68daf44e8898790dff3d4d891.yaml new file mode 100644 index 0000000000..bfcdfc3176 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-53bd8ee68daf44e8898790dff3d4d891.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-53bd8ee68daf44e8898790dff3d4d891 + +info: + name: > + Contest Gallery <= 13.1.0.9 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f745f9-c44e-4458-9381-f639c842a31e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-53c528c4b38bd34834da864bf5436a73.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-53c528c4b38bd34834da864bf5436a73.yaml new file mode 100644 index 0000000000..17f92f889d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-53c528c4b38bd34834da864bf5436a73.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-53c528c4b38bd34834da864bf5436a73 + +info: + name: > + Contest Gallery <= 19.1.5 - Authenticated (Author+) SQL Injection via cg_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b24625d7-2a38-451b-ab79-a1d9c5b8822a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-5e73e241c87c5dbc4d6ce35aa938828e.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-5e73e241c87c5dbc4d6ce35aa938828e.yaml new file mode 100644 index 0000000000..b0268805ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-5e73e241c87c5dbc4d6ce35aa938828e.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-5e73e241c87c5dbc4d6ce35aa938828e + +info: + name: > + Contest Gallery <= 21.2.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4ed8c6e-5f80-4360-9478-fff49b1fee94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-757bd659f9146e7fed02497d3559c2e8.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-757bd659f9146e7fed02497d3559c2e8.yaml new file mode 100644 index 0000000000..18feb81bac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-757bd659f9146e7fed02497d3559c2e8.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-757bd659f9146e7fed02497d3559c2e8 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_copy_start + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/407d8ebe-f3fc-433a-856f-de2ad4e58b9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-89931846724982da840bead82e16369b.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-89931846724982da840bead82e16369b.yaml new file mode 100644 index 0000000000..ce83fc7b85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-89931846724982da840bead82e16369b.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-89931846724982da840bead82e16369b + +info: + name: > + Contest Gallery – Photo Contest Plugin for WordPress <= 10.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb4b6d33-82cd-4c41-ba54-dbc7fe5f6ac6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-8a640d3ed297a8a63d17c701796646c2.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-8a640d3ed297a8a63d17c701796646c2.yaml new file mode 100644 index 0000000000..46e0024bb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-8a640d3ed297a8a63d17c701796646c2.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-8a640d3ed297a8a63d17c701796646c2 + +info: + name: > + Contest Gallery <= 19.1.5 - Unauthenticated SQL Injection via user_id + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a0fa7f6-cc1a-45fe-881d-694c81b841c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml new file mode 100644 index 0000000000..68a76b06c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-8df0bbe5e4c9e759af91d2ae7c77ecd4 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via option_id GET + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/691eb4c1-18ba-433b-8725-70f2ecf89b0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-8e81f52602da7d34f1be2c2a8e304501.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-8e81f52602da7d34f1be2c2a8e304501.yaml new file mode 100644 index 0000000000..33854f86d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-8e81f52602da7d34f1be2c2a8e304501.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-8e81f52602da7d34f1be2c2a8e304501 + +info: + name: > + Photos and Files Contest Gallery – Contact Form, Upload Form, Social Share and Voting Competition Plugin for WordPress <= 21.3.0 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ef37e72-f98f-4df6-8adb-514690350a82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-9580adf700b409fcf11b1b8ce6a8f986.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-9580adf700b409fcf11b1b8ce6a8f986.yaml new file mode 100644 index 0000000000..cfa2dfdf6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-9580adf700b409fcf11b1b8ce6a8f986.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-9580adf700b409fcf11b1b8ce6a8f986 + +info: + name: > + Contest Gallery < 21.2.8.1 - Unauthenticated Stored Cross-Site Scripting via headers + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e3c9f08-9e73-4791-b6ca-2c8b9dc3fb81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-9ac93e930052c6b551d522a1a37f90fe.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-9ac93e930052c6b551d522a1a37f90fe.yaml new file mode 100644 index 0000000000..c7a420ffc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-9ac93e930052c6b551d522a1a37f90fe.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-9ac93e930052c6b551d522a1a37f90fe + +info: + name: > + Contest Gallery <= 19.1.4.1 - Unauthenticated SQL Injection via cg_Fields + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10e05707-02cb-42de-8399-4556d76b01b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-9c0847af71db5cbde2297c6d8117181e.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-9c0847af71db5cbde2297c6d8117181e.yaml new file mode 100644 index 0000000000..dc15af09fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-9c0847af71db5cbde2297c6d8117181e.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-9c0847af71db5cbde2297c6d8117181e + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_activate and cg_deactivate + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d080f5b-6646-47ef-8ae7-8b94270f9f59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-a3fa9aa05831cbe48f93e588aa23d79b.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-a3fa9aa05831cbe48f93e588aa23d79b.yaml new file mode 100644 index 0000000000..ee5ceadfde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-a3fa9aa05831cbe48f93e588aa23d79b.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-a3fa9aa05831cbe48f93e588aa23d79b + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via option_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31196bdf-2ddd-49ea-840d-8fd78611629e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-aa986981c75263be7a2313fe5bb981c0.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-aa986981c75263be7a2313fe5bb981c0.yaml new file mode 100644 index 0000000000..1bca1930a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-aa986981c75263be7a2313fe5bb981c0.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-aa986981c75263be7a2313fe5bb981c0 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_option_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/213fde1b-13dc-442a-8f48-4b1074155a6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-adf21f96bc20b891592eb95e06429f24.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-adf21f96bc20b891592eb95e06429f24.yaml new file mode 100644 index 0000000000..68fbd1ef8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-adf21f96bc20b891592eb95e06429f24.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-adf21f96bc20b891592eb95e06429f24 + +info: + name: > + Contest Gallery – Files Upload and Contest Plugin for WordPress <= 17.0.4 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f9d8bbe-205f-44b6-a0c6-89b9135e6363?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-b3fb140ad00234395ef28e4892077821.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-b3fb140ad00234395ef28e4892077821.yaml new file mode 100644 index 0000000000..9f8de01139 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-b3fb140ad00234395ef28e4892077821.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-b3fb140ad00234395ef28e4892077821 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_copy_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e9672b1-6d00-45bc-91ef-0c5583b5306e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-c747e3cc597300516c2ada9764e8c1be.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-c747e3cc597300516c2ada9764e8c1be.yaml new file mode 100644 index 0000000000..2b86335cda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-c747e3cc597300516c2ada9764e8c1be.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-c747e3cc597300516c2ada9764e8c1be + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_row + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75c6697c-bc1d-456f-baee-ee9c57e40d21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-cad4f56715717797069f7a87850b72f0.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-cad4f56715717797069f7a87850b72f0.yaml new file mode 100644 index 0000000000..d2c6137aa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-cad4f56715717797069f7a87850b72f0.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-cad4f56715717797069f7a87850b72f0 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via wp_user_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/250788a8-55d1-416b-bf1c-2170e8483ccc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-cadc46493e5e64619719bfd06035e262.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-cadc46493e5e64619719bfd06035e262.yaml new file mode 100644 index 0000000000..92a0438190 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-cadc46493e5e64619719bfd06035e262.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-cadc46493e5e64619719bfd06035e262 + +info: + name: > + Contest Gallery (Pro) <= 19.1.5 - SQL Injection via option_id + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7fcda2b-d679-44af-9592-4a96a0115a08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-cd8aaefa2a1be6647748a924e3adf35e.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-cd8aaefa2a1be6647748a924e3adf35e.yaml new file mode 100644 index 0000000000..808f2cd6cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-cd8aaefa2a1be6647748a924e3adf35e.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-cd8aaefa2a1be6647748a924e3adf35e + +info: + name: > + Contest Gallery – Photo Contest Plugin for WordPress <= 13.1.0.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3184c304-52d3-4baa-b3c2-90957e1d8e79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-e13fa86cb5f0a76818b71a18a333569e.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-e13fa86cb5f0a76818b71a18a333569e.yaml new file mode 100644 index 0000000000..9f56adda8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-e13fa86cb5f0a76818b71a18a333569e.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-e13fa86cb5f0a76818b71a18a333569e + +info: + name: > + Contest Gallery <= 13.1.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f36af71c-78af-402c-9d3a-3752368e7584?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-f0c828ee470540e4c37a94d5e7637488.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-f0c828ee470540e4c37a94d5e7637488.yaml new file mode 100644 index 0000000000..1890b545f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-f0c828ee470540e4c37a94d5e7637488.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-f0c828ee470540e4c37a94d5e7637488 + +info: + name: > + Contest Gallery < 13.1.0.7 - Authenticated Email Address Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7759b209-4211-4ee5-ae7a-42645f5d5e96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-f468941db7d975cc4bd3298b085b669f.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-f468941db7d975cc4bd3298b085b669f.yaml new file mode 100644 index 0000000000..d1c8ccae7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-f468941db7d975cc4bd3298b085b669f.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-f468941db7d975cc4bd3298b085b669f + +info: + name: > + Contest Gallery <= 21.3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b0c54f2-3942-48bd-b821-b66a57fd1506?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-f4eafb52aedd774a77d6abb99f32e10c.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-f4eafb52aedd774a77d6abb99f32e10c.yaml new file mode 100644 index 0000000000..6b1f981319 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-f4eafb52aedd774a77d6abb99f32e10c.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-f4eafb52aedd774a77d6abb99f32e10c + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_order + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f946251-c7be-4ef6-885f-8b378c0c234c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-f99fe05b2429bd9e4943506324d48d85.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-f99fe05b2429bd9e4943506324d48d85.yaml new file mode 100644 index 0000000000..8b3e44867e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-f99fe05b2429bd9e4943506324d48d85.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-f99fe05b2429bd9e4943506324d48d85 + +info: + name: > + Contest Gallery <= 17.0.4 - Authenticated (Author+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9b90e03-cdaa-4bd3-9afd-5d5c91a17962?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-feebbbe6815c937983c3b7fc4e387586.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-feebbbe6815c937983c3b7fc4e387586.yaml new file mode 100644 index 0000000000..9c10a884fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-feebbbe6815c937983c3b7fc4e387586.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-feebbbe6815c937983c3b7fc4e387586 + +info: + name: > + Contest Gallery <= 21.2.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2b5213d-fdc5-4c98-9a05-15d83bd7308f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery/" + google-query: inurl:"/wp-content/plugins/contest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml new file mode 100644 index 0000000000..b2f814791c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-1ac52ae7a1da8b0bd7a9bd3597d76efd + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via addCountS + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f185709e-0d13-48d3-9c15-03466b72dac2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml new file mode 100644 index 0000000000..8ba1185cf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-4b9ef62a2d3dd2d1bbf6db4d54a3bb14 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_multiple_files_for_post + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b1b1a55-7872-456f-a754-023aad354359?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-4f98def5aafbaedc907582ddf709a1ef.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-4f98def5aafbaedc907582ddf709a1ef.yaml new file mode 100644 index 0000000000..f22c4f91f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-4f98def5aafbaedc907582ddf709a1ef.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-4f98def5aafbaedc907582ddf709a1ef + +info: + name: > + Contest Gallery <= 19.1.5 - Authenticated (Author+) SQL Injection via upload[] + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf24ee30-7d9f-47c3-bc2a-1c3c92971ba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-53c528c4b38bd34834da864bf5436a73.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-53c528c4b38bd34834da864bf5436a73.yaml new file mode 100644 index 0000000000..426e4d1e4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-53c528c4b38bd34834da864bf5436a73.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-53c528c4b38bd34834da864bf5436a73 + +info: + name: > + Contest Gallery <= 19.1.5 - Authenticated (Author+) SQL Injection via cg_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b24625d7-2a38-451b-ab79-a1d9c5b8822a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-757bd659f9146e7fed02497d3559c2e8.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-757bd659f9146e7fed02497d3559c2e8.yaml new file mode 100644 index 0000000000..71773b37ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-757bd659f9146e7fed02497d3559c2e8.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-757bd659f9146e7fed02497d3559c2e8 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_copy_start + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/407d8ebe-f3fc-433a-856f-de2ad4e58b9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-82c2c907402b124f31a2f373f11be562.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-82c2c907402b124f31a2f373f11be562.yaml new file mode 100644 index 0000000000..c54e1bb920 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-82c2c907402b124f31a2f373f11be562.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-82c2c907402b124f31a2f373f11be562 + +info: + name: > + Contest Gallery Pro <= 19.1.4.1 - Authenticated (Administrator+) SQL Injection via wp_user_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4284c31c-fa58-49fe-89ed-35d7b1bd6ec8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-8a640d3ed297a8a63d17c701796646c2.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-8a640d3ed297a8a63d17c701796646c2.yaml new file mode 100644 index 0000000000..e791183dc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-8a640d3ed297a8a63d17c701796646c2.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-8a640d3ed297a8a63d17c701796646c2 + +info: + name: > + Contest Gallery <= 19.1.5 - Unauthenticated SQL Injection via user_id + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a0fa7f6-cc1a-45fe-881d-694c81b841c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml new file mode 100644 index 0000000000..3e1e2eab90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-8df0bbe5e4c9e759af91d2ae7c77ecd4 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via option_id GET + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/691eb4c1-18ba-433b-8725-70f2ecf89b0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-9ac93e930052c6b551d522a1a37f90fe.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-9ac93e930052c6b551d522a1a37f90fe.yaml new file mode 100644 index 0000000000..e5eeaed34a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-9ac93e930052c6b551d522a1a37f90fe.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-9ac93e930052c6b551d522a1a37f90fe + +info: + name: > + Contest Gallery <= 19.1.4.1 - Unauthenticated SQL Injection via cg_Fields + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10e05707-02cb-42de-8399-4556d76b01b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-9c0847af71db5cbde2297c6d8117181e.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-9c0847af71db5cbde2297c6d8117181e.yaml new file mode 100644 index 0000000000..1936d5653c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-9c0847af71db5cbde2297c6d8117181e.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-9c0847af71db5cbde2297c6d8117181e + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_activate and cg_deactivate + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d080f5b-6646-47ef-8ae7-8b94270f9f59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-a3fa9aa05831cbe48f93e588aa23d79b.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-a3fa9aa05831cbe48f93e588aa23d79b.yaml new file mode 100644 index 0000000000..799a2bccb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-a3fa9aa05831cbe48f93e588aa23d79b.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-a3fa9aa05831cbe48f93e588aa23d79b + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via option_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31196bdf-2ddd-49ea-840d-8fd78611629e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-aa986981c75263be7a2313fe5bb981c0.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-aa986981c75263be7a2313fe5bb981c0.yaml new file mode 100644 index 0000000000..4feecdea5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-aa986981c75263be7a2313fe5bb981c0.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-aa986981c75263be7a2313fe5bb981c0 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_option_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/213fde1b-13dc-442a-8f48-4b1074155a6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-b3fb140ad00234395ef28e4892077821.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-b3fb140ad00234395ef28e4892077821.yaml new file mode 100644 index 0000000000..660d157334 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-b3fb140ad00234395ef28e4892077821.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-b3fb140ad00234395ef28e4892077821 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_copy_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e9672b1-6d00-45bc-91ef-0c5583b5306e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-c747e3cc597300516c2ada9764e8c1be.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-c747e3cc597300516c2ada9764e8c1be.yaml new file mode 100644 index 0000000000..cf66e8b19a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-c747e3cc597300516c2ada9764e8c1be.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-c747e3cc597300516c2ada9764e8c1be + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_row + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75c6697c-bc1d-456f-baee-ee9c57e40d21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-cad4f56715717797069f7a87850b72f0.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-cad4f56715717797069f7a87850b72f0.yaml new file mode 100644 index 0000000000..32730ea8f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-cad4f56715717797069f7a87850b72f0.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-cad4f56715717797069f7a87850b72f0 + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via wp_user_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/250788a8-55d1-416b-bf1c-2170e8483ccc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-cadc46493e5e64619719bfd06035e262.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-cadc46493e5e64619719bfd06035e262.yaml new file mode 100644 index 0000000000..b953230240 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-cadc46493e5e64619719bfd06035e262.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-cadc46493e5e64619719bfd06035e262 + +info: + name: > + Contest Gallery (Pro) <= 19.1.5 - SQL Injection via option_id + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7fcda2b-d679-44af-9592-4a96a0115a08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contest-gallery-pro-f4eafb52aedd774a77d6abb99f32e10c.yaml b/nuclei-templates/cve-less/plugins/contest-gallery-pro-f4eafb52aedd774a77d6abb99f32e10c.yaml new file mode 100644 index 0000000000..d09c2ae5ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contest-gallery-pro-f4eafb52aedd774a77d6abb99f32e10c.yaml @@ -0,0 +1,58 @@ +id: contest-gallery-pro-f4eafb52aedd774a77d6abb99f32e10c + +info: + name: > + Contest Gallery <= 19.1.4.1 - Authenticated (Author+) SQL Injection via cg_order + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f946251-c7be-4ef6-885f-8b378c0c234c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contest-gallery-pro/" + google-query: inurl:"/wp-content/plugins/contest-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contest-gallery-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contest-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contest-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contests-from-rewards-fuel-45ed5bc2a620f7b73012888c5d094ada.yaml b/nuclei-templates/cve-less/plugins/contests-from-rewards-fuel-45ed5bc2a620f7b73012888c5d094ada.yaml new file mode 100644 index 0000000000..083b736c79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contests-from-rewards-fuel-45ed5bc2a620f7b73012888c5d094ada.yaml @@ -0,0 +1,58 @@ +id: contests-from-rewards-fuel-45ed5bc2a620f7b73012888c5d094ada + +info: + name: > + Contests by Rewards Fuel <= 2.0.64 - Authenticated (Contributor+) Stored Cross-Site Scripting via update_rewards_fuel_api_key + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9eeec949-e440-4df3-8c26-db92498cada3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contests-from-rewards-fuel/" + google-query: inurl:"/wp-content/plugins/contests-from-rewards-fuel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contests-from-rewards-fuel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contests-from-rewards-fuel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contests-from-rewards-fuel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contests-from-rewards-fuel-7445eca3ede10516578f424839049031.yaml b/nuclei-templates/cve-less/plugins/contests-from-rewards-fuel-7445eca3ede10516578f424839049031.yaml new file mode 100644 index 0000000000..f01fb27c08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contests-from-rewards-fuel-7445eca3ede10516578f424839049031.yaml @@ -0,0 +1,58 @@ +id: contests-from-rewards-fuel-7445eca3ede10516578f424839049031 + +info: + name: > + Contests by Rewards Fuel <= 2.0.62 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/689f3667-2dda-40a8-8627-d38c6c6816fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contests-from-rewards-fuel/" + google-query: inurl:"/wp-content/plugins/contests-from-rewards-fuel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contests-from-rewards-fuel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contests-from-rewards-fuel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contests-from-rewards-fuel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contextual-adminbar-color-aaa55eb82dbd089503acfbd59b1c1516.yaml b/nuclei-templates/cve-less/plugins/contextual-adminbar-color-aaa55eb82dbd089503acfbd59b1c1516.yaml new file mode 100644 index 0000000000..8c4d17c1e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contextual-adminbar-color-aaa55eb82dbd089503acfbd59b1c1516.yaml @@ -0,0 +1,58 @@ +id: contextual-adminbar-color-aaa55eb82dbd089503acfbd59b1c1516 + +info: + name: > + Contextual Adminbar Color <= 0.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db3a9106-2d90-44fe-a86b-9ea882f56eb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contextual-adminbar-color/" + google-query: inurl:"/wp-content/plugins/contextual-adminbar-color/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contextual-adminbar-color,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contextual-adminbar-color/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contextual-adminbar-color" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contextual-related-posts-3e85c71c88d12aeaac665ff72e05dcde.yaml b/nuclei-templates/cve-less/plugins/contextual-related-posts-3e85c71c88d12aeaac665ff72e05dcde.yaml new file mode 100644 index 0000000000..09465e2ca3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contextual-related-posts-3e85c71c88d12aeaac665ff72e05dcde.yaml @@ -0,0 +1,58 @@ +id: contextual-related-posts-3e85c71c88d12aeaac665ff72e05dcde + +info: + name: > + Contextual Related Posts < 1.8.10.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead6a38-b495-47d2-8d40-1f17e64fd1ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contextual-related-posts/" + google-query: inurl:"/wp-content/plugins/contextual-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contextual-related-posts,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contextual-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contextual-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contextual-related-posts-507e2521f54c5e6ca19bac49a7a788fa.yaml b/nuclei-templates/cve-less/plugins/contextual-related-posts-507e2521f54c5e6ca19bac49a7a788fa.yaml new file mode 100644 index 0000000000..128088ce4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contextual-related-posts-507e2521f54c5e6ca19bac49a7a788fa.yaml @@ -0,0 +1,58 @@ +id: contextual-related-posts-507e2521f54c5e6ca19bac49a7a788fa + +info: + name: > + Contextual Related Posts <= 1.8.6 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81a7afc0-05be-4966-b762-081ef553d4e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contextual-related-posts/" + google-query: inurl:"/wp-content/plugins/contextual-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contextual-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contextual-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contextual-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contextual-related-posts-5edac4e24aea010bac0d630a89afdf47.yaml b/nuclei-templates/cve-less/plugins/contextual-related-posts-5edac4e24aea010bac0d630a89afdf47.yaml new file mode 100644 index 0000000000..e039445e81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contextual-related-posts-5edac4e24aea010bac0d630a89afdf47.yaml @@ -0,0 +1,58 @@ +id: contextual-related-posts-5edac4e24aea010bac0d630a89afdf47 + +info: + name: > + Contextual Related Posts <= 3.3.1 - Missing Authorization in crp_ajax_clearcache + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37b5fcfd-654b-4151-9494-551799464c7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contextual-related-posts/" + google-query: inurl:"/wp-content/plugins/contextual-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contextual-related-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contextual-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contextual-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contextual-related-posts-ab86f3a4c1a5f2be4ec7926458a9f257.yaml b/nuclei-templates/cve-less/plugins/contextual-related-posts-ab86f3a4c1a5f2be4ec7926458a9f257.yaml new file mode 100644 index 0000000000..da9d5f1186 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contextual-related-posts-ab86f3a4c1a5f2be4ec7926458a9f257.yaml @@ -0,0 +1,58 @@ +id: contextual-related-posts-ab86f3a4c1a5f2be4ec7926458a9f257 + +info: + name: > + Contextual Related Posts <= 3.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9af843e-dcbb-4b09-b131-4e470c006d38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contextual-related-posts/" + google-query: inurl:"/wp-content/plugins/contextual-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contextual-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contextual-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contextual-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contextual-related-posts-b2db28211fa50e37f6b6bfd260ae4ccb.yaml b/nuclei-templates/cve-less/plugins/contextual-related-posts-b2db28211fa50e37f6b6bfd260ae4ccb.yaml new file mode 100644 index 0000000000..7156509476 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contextual-related-posts-b2db28211fa50e37f6b6bfd260ae4ccb.yaml @@ -0,0 +1,58 @@ +id: contextual-related-posts-b2db28211fa50e37f6b6bfd260ae4ccb + +info: + name: > + Contextual Related Posts <= 2.9.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d93006ac-037f-4291-b945-afa38358a037?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contextual-related-posts/" + google-query: inurl:"/wp-content/plugins/contextual-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contextual-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contextual-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contextual-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contextual-related-posts-ea8b272e63e8b928e0d82ce3f2c7b461.yaml b/nuclei-templates/cve-less/plugins/contextual-related-posts-ea8b272e63e8b928e0d82ce3f2c7b461.yaml new file mode 100644 index 0000000000..9e815e926d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contextual-related-posts-ea8b272e63e8b928e0d82ce3f2c7b461.yaml @@ -0,0 +1,58 @@ +id: contextual-related-posts-ea8b272e63e8b928e0d82ce3f2c7b461 + +info: + name: > + Contextual Related Posts <= 3.3.1 - Cross-Site Request Forgery in crpClearCache + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca8f4f6b-756b-4511-9e48-e41a872a9dad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contextual-related-posts/" + google-query: inurl:"/wp-content/plugins/contextual-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contextual-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contextual-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contextual-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contexture-page-security-9a80eb4e9ae6ba3b2c9128c9152fe450.yaml b/nuclei-templates/cve-less/plugins/contexture-page-security-9a80eb4e9ae6ba3b2c9128c9152fe450.yaml new file mode 100644 index 0000000000..b8165594a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contexture-page-security-9a80eb4e9ae6ba3b2c9128c9152fe450.yaml @@ -0,0 +1,58 @@ +id: contexture-page-security-9a80eb4e9ae6ba3b2c9128c9152fe450 + +info: + name: > + Page Security & Membership <= 1.5.15 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddbc76d0-23cd-4f49-939b-b8f19ff55d5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contexture-page-security/" + google-query: inurl:"/wp-content/plugins/contexture-page-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contexture-page-security,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contexture-page-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contexture-page-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/continuous-announcement-scroller-bbd95e8edaa114935e8c46570e7cf3d6.yaml b/nuclei-templates/cve-less/plugins/continuous-announcement-scroller-bbd95e8edaa114935e8c46570e7cf3d6.yaml new file mode 100644 index 0000000000..af5d900610 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/continuous-announcement-scroller-bbd95e8edaa114935e8c46570e7cf3d6.yaml @@ -0,0 +1,58 @@ +id: continuous-announcement-scroller-bbd95e8edaa114935e8c46570e7cf3d6 + +info: + name: > + Continuous announcement scroller <= 13.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d88eb628-09c9-451c-b5ae-f26a93514447?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/continuous-announcement-scroller/" + google-query: inurl:"/wp-content/plugins/continuous-announcement-scroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,continuous-announcement-scroller,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/continuous-announcement-scroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "continuous-announcement-scroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/continuous-image-carousel-with-lightbox-4afaae0eb67cba7aee3bb7f48388cd03.yaml b/nuclei-templates/cve-less/plugins/continuous-image-carousel-with-lightbox-4afaae0eb67cba7aee3bb7f48388cd03.yaml new file mode 100644 index 0000000000..1e433b8285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/continuous-image-carousel-with-lightbox-4afaae0eb67cba7aee3bb7f48388cd03.yaml @@ -0,0 +1,58 @@ +id: continuous-image-carousel-with-lightbox-4afaae0eb67cba7aee3bb7f48388cd03 + +info: + name: > + Continuous Image Carousel With Lightbox <= 1.0.15 - Reflected Cross-Site Scripting via search_term, order_by and order_pos + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b4651d8-dad7-4f6f-a47d-2095b9d2bdca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/continuous-image-carousel-with-lightbox/" + google-query: inurl:"/wp-content/plugins/continuous-image-carousel-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,continuous-image-carousel-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/continuous-image-carousel-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "continuous-image-carousel-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/continuous-image-carousel-with-lightbox-d1d5a17953a33d04ba0957e7769eee44.yaml b/nuclei-templates/cve-less/plugins/continuous-image-carousel-with-lightbox-d1d5a17953a33d04ba0957e7769eee44.yaml new file mode 100644 index 0000000000..ab83ad0fd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/continuous-image-carousel-with-lightbox-d1d5a17953a33d04ba0957e7769eee44.yaml @@ -0,0 +1,58 @@ +id: continuous-image-carousel-with-lightbox-d1d5a17953a33d04ba0957e7769eee44 + +info: + name: > + Continuous Image Carousel With Lightbox <= 1.0.15 - Reflected Cross-Site Scripting via search_term, order_by and order_pos + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a196177-2786-4f6d-8076-f0232e4d5a5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/continuous-image-carousel-with-lightbox/" + google-query: inurl:"/wp-content/plugins/continuous-image-carousel-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,continuous-image-carousel-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/continuous-image-carousel-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "continuous-image-carousel-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contractor-contact-form-website-to-workflow-tool-9a55a55c80f33af03798b4f5b44c2509.yaml b/nuclei-templates/cve-less/plugins/contractor-contact-form-website-to-workflow-tool-9a55a55c80f33af03798b4f5b44c2509.yaml new file mode 100644 index 0000000000..02774e0158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contractor-contact-form-website-to-workflow-tool-9a55a55c80f33af03798b4f5b44c2509.yaml @@ -0,0 +1,58 @@ +id: contractor-contact-form-website-to-workflow-tool-9a55a55c80f33af03798b4f5b44c2509 + +info: + name: > + Contractor Contact Form Website to Workflow Tool <= 4.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da4684b8-20f6-4dc1-8f29-d79f64ccb9d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contractor-contact-form-website-to-workflow-tool/" + google-query: inurl:"/wp-content/plugins/contractor-contact-form-website-to-workflow-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contractor-contact-form-website-to-workflow-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contractor-contact-form-website-to-workflow-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contractor-contact-form-website-to-workflow-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/control-block-patterns-c4ae84dae7d5de9c58b9c493377ad809.yaml b/nuclei-templates/cve-less/plugins/control-block-patterns-c4ae84dae7d5de9c58b9c493377ad809.yaml new file mode 100644 index 0000000000..5678017a5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/control-block-patterns-c4ae84dae7d5de9c58b9c493377ad809.yaml @@ -0,0 +1,58 @@ +id: control-block-patterns-c4ae84dae7d5de9c58b9c493377ad809 + +info: + name: > + Build & Control Block Patterns – Boost up Gutenberg Editor <= 1.3.5.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38f09a45-2b11-47c7-af16-c7f9c3a46e0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/control-block-patterns/" + google-query: inurl:"/wp-content/plugins/control-block-patterns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,control-block-patterns,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/control-block-patterns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "control-block-patterns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/controlled-admin-access-a7fbc15e992c578892e165c742bd4873.yaml b/nuclei-templates/cve-less/plugins/controlled-admin-access-a7fbc15e992c578892e165c742bd4873.yaml new file mode 100644 index 0000000000..753af34923 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/controlled-admin-access-a7fbc15e992c578892e165c742bd4873.yaml @@ -0,0 +1,58 @@ +id: controlled-admin-access-a7fbc15e992c578892e165c742bd4873 + +info: + name: > + Controlled Admin Access <= 1.5.1 - Improper Access Control & Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/505b1f87-52c6-439c-a108-e2003971dc07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/controlled-admin-access/" + google-query: inurl:"/wp-content/plugins/controlled-admin-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,controlled-admin-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/controlled-admin-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "controlled-admin-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/controlled-admin-access-c49ea2c86d8c93655dddbd6be61fd77e.yaml b/nuclei-templates/cve-less/plugins/controlled-admin-access-c49ea2c86d8c93655dddbd6be61fd77e.yaml new file mode 100644 index 0000000000..845ade5377 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/controlled-admin-access-c49ea2c86d8c93655dddbd6be61fd77e.yaml @@ -0,0 +1,58 @@ +id: controlled-admin-access-c49ea2c86d8c93655dddbd6be61fd77e + +info: + name: > + Controlled Admin Access < 1.5.6 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c57211a-f59d-4379-b09e-7c6049a6b04d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/controlled-admin-access/" + google-query: inurl:"/wp-content/plugins/controlled-admin-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,controlled-admin-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/controlled-admin-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "controlled-admin-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-hd-flv-player-931a68fe7b31a6c4742b24a2e8784e8f.yaml b/nuclei-templates/cve-less/plugins/contus-hd-flv-player-931a68fe7b31a6c4742b24a2e8784e8f.yaml new file mode 100644 index 0000000000..738294ca7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-hd-flv-player-931a68fe7b31a6c4742b24a2e8784e8f.yaml @@ -0,0 +1,58 @@ +id: contus-hd-flv-player-931a68fe7b31a6c4742b24a2e8784e8f + +info: + name: > + HD FLV Player <= 1.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f24af4f2-bb05-4833-a2bc-771143970e00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-hd-flv-player/" + google-query: inurl:"/wp-content/plugins/contus-hd-flv-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-hd-flv-player,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-hd-flv-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-hd-flv-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-comments-5f9367f594e64f78f39747766e36b5a7.yaml b/nuclei-templates/cve-less/plugins/contus-video-comments-5f9367f594e64f78f39747766e36b5a7.yaml new file mode 100644 index 0000000000..a9f74c995a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-comments-5f9367f594e64f78f39747766e36b5a7.yaml @@ -0,0 +1,58 @@ +id: contus-video-comments-5f9367f594e64f78f39747766e36b5a7 + +info: + name: > + Contus Video Comments <= 1.0 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69bdd5e6-1334-42bc-a13f-215eb61733e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-comments/" + google-query: inurl:"/wp-content/plugins/contus-video-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-comments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-comments-c9875ec40b4bfff20efe07d7ffbd5d06.yaml b/nuclei-templates/cve-less/plugins/contus-video-comments-c9875ec40b4bfff20efe07d7ffbd5d06.yaml new file mode 100644 index 0000000000..caacc81dee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-comments-c9875ec40b4bfff20efe07d7ffbd5d06.yaml @@ -0,0 +1,58 @@ +id: contus-video-comments-c9875ec40b4bfff20efe07d7ffbd5d06 + +info: + name: > + Contus Video Comments <= 1.0 - Remote File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16af4d96-e7e0-4b13-90a5-ddf62909271a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-comments/" + google-query: inurl:"/wp-content/plugins/contus-video-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-comments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-gallery-27521f4f3d223c8b6a8b829305f4c5c6.yaml b/nuclei-templates/cve-less/plugins/contus-video-gallery-27521f4f3d223c8b6a8b829305f4c5c6.yaml new file mode 100644 index 0000000000..cfd386aba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-gallery-27521f4f3d223c8b6a8b829305f4c5c6.yaml @@ -0,0 +1,58 @@ +id: contus-video-gallery-27521f4f3d223c8b6a8b829305f4c5c6 + +info: + name: > + Wordpress Video Gallery <= 2.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c035ac71-54f9-471b-93f3-6bd6a5b86ab2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-gallery/" + google-query: inurl:"/wp-content/plugins/contus-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-gallery-2cb21cf10e585cd5925c48e682cf6673.yaml b/nuclei-templates/cve-less/plugins/contus-video-gallery-2cb21cf10e585cd5925c48e682cf6673.yaml new file mode 100644 index 0000000000..39f1f904fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-gallery-2cb21cf10e585cd5925c48e682cf6673.yaml @@ -0,0 +1,58 @@ +id: contus-video-gallery-2cb21cf10e585cd5925c48e682cf6673 + +info: + name: > + WORDPRESS VIDEO GALLERY <= 2.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c96507cf-3c2d-4516-92f5-d08384aa6b1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-gallery/" + google-query: inurl:"/wp-content/plugins/contus-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-gallery-439a38f99b97f598550cea829cc025f1.yaml b/nuclei-templates/cve-less/plugins/contus-video-gallery-439a38f99b97f598550cea829cc025f1.yaml new file mode 100644 index 0000000000..41f89894c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-gallery-439a38f99b97f598550cea829cc025f1.yaml @@ -0,0 +1,58 @@ +id: contus-video-gallery-439a38f99b97f598550cea829cc025f1 + +info: + name: > + WORDPRESS VIDEO GALLERY < 2.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/775860e5-87c9-4878-a629-d7a7cd0cbf1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-gallery/" + google-query: inurl:"/wp-content/plugins/contus-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-gallery-5a110fd311341876d97192705d1ff40f.yaml b/nuclei-templates/cve-less/plugins/contus-video-gallery-5a110fd311341876d97192705d1ff40f.yaml new file mode 100644 index 0000000000..cee7e4ae01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-gallery-5a110fd311341876d97192705d1ff40f.yaml @@ -0,0 +1,58 @@ +id: contus-video-gallery-5a110fd311341876d97192705d1ff40f + +info: + name: > + WORDPRESS VIDEO GALLERY <= 2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eff91bd-efc2-4e54-b871-df567ca99bca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-gallery/" + google-query: inurl:"/wp-content/plugins/contus-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-gallery-61ac26890db9b6da684b026a500b1abb.yaml b/nuclei-templates/cve-less/plugins/contus-video-gallery-61ac26890db9b6da684b026a500b1abb.yaml new file mode 100644 index 0000000000..3e0095984d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-gallery-61ac26890db9b6da684b026a500b1abb.yaml @@ -0,0 +1,58 @@ +id: contus-video-gallery-61ac26890db9b6da684b026a500b1abb + +info: + name: > + WORDPRESS VIDEO GALLERY <= 3.0 - Improper Access Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/029c3606-caba-4964-aefd-6000a1b4832d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-gallery/" + google-query: inurl:"/wp-content/plugins/contus-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-gallery-e26e50c2a1f74878104460c1a935b34d.yaml b/nuclei-templates/cve-less/plugins/contus-video-gallery-e26e50c2a1f74878104460c1a935b34d.yaml new file mode 100644 index 0000000000..04a00405c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-gallery-e26e50c2a1f74878104460c1a935b34d.yaml @@ -0,0 +1,58 @@ +id: contus-video-gallery-e26e50c2a1f74878104460c1a935b34d + +info: + name: > + WordPress Video Gallery < 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54553005-1869-4334-92ec-e37e8935d769?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-gallery/" + google-query: inurl:"/wp-content/plugins/contus-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/contus-video-galleryversion-10-e4eebb35f2461b3cc651ea0b61f79101.yaml b/nuclei-templates/cve-less/plugins/contus-video-galleryversion-10-e4eebb35f2461b3cc651ea0b61f79101.yaml new file mode 100644 index 0000000000..72e45079dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/contus-video-galleryversion-10-e4eebb35f2461b3cc651ea0b61f79101.yaml @@ -0,0 +1,58 @@ +id: contus-video-galleryversion-10-e4eebb35f2461b3cc651ea0b61f79101 + +info: + name: > + Contus Video Gallery <= 1.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b443610-416c-41d6-9449-9e20f719af06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/contus-video-galleryversion-10/" + google-query: inurl:"/wp-content/plugins/contus-video-galleryversion-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,contus-video-galleryversion-10,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/contus-video-galleryversion-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "contus-video-galleryversion-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conversador-2888b8004776c21ebddecea6ec731145.yaml b/nuclei-templates/cve-less/plugins/conversador-2888b8004776c21ebddecea6ec731145.yaml new file mode 100644 index 0000000000..c080037fe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conversador-2888b8004776c21ebddecea6ec731145.yaml @@ -0,0 +1,58 @@ +id: conversador-2888b8004776c21ebddecea6ec731145 + +info: + name: > + Conversador <= 2.61 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2b62226-cf9b-4713-9734-67bf1c48895b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conversador/" + google-query: inurl:"/wp-content/plugins/conversador/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conversador,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conversador/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conversador" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conversation-watson-a48a527c714ec711ca739eed07091779.yaml b/nuclei-templates/cve-less/plugins/conversation-watson-a48a527c714ec711ca739eed07091779.yaml new file mode 100644 index 0000000000..543d7c99be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conversation-watson-a48a527c714ec711ca739eed07091779.yaml @@ -0,0 +1,58 @@ +id: conversation-watson-a48a527c714ec711ca739eed07091779 + +info: + name: > + Chatbot with IBM Watson < 0.8.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/257aba03-bb41-4798-b62c-b51310d70264?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conversation-watson/" + google-query: inurl:"/wp-content/plugins/conversation-watson/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conversation-watson,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conversation-watson/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conversation-watson" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conversational-forms-1c83e2fc407fdbaee8e0a7b1d33de8b3.yaml b/nuclei-templates/cve-less/plugins/conversational-forms-1c83e2fc407fdbaee8e0a7b1d33de8b3.yaml new file mode 100644 index 0000000000..931b4e1a4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conversational-forms-1c83e2fc407fdbaee8e0a7b1d33de8b3.yaml @@ -0,0 +1,58 @@ +id: conversational-forms-1c83e2fc407fdbaee8e0a7b1d33de8b3 + +info: + name: > + Conversational Forms for ChatBot <= 1.1.8 - Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54db4d53-7c4f-47d9-811d-8282eaf2d074?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conversational-forms/" + google-query: inurl:"/wp-content/plugins/conversational-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conversational-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conversational-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conversational-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conversational-forms-22b31e4572f874fba75c72ff00d007de.yaml b/nuclei-templates/cve-less/plugins/conversational-forms-22b31e4572f874fba75c72ff00d007de.yaml new file mode 100644 index 0000000000..b010a77241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conversational-forms-22b31e4572f874fba75c72ff00d007de.yaml @@ -0,0 +1,58 @@ +id: conversational-forms-22b31e4572f874fba75c72ff00d007de + +info: + name: > + Conversational Forms for ChatBot <= 1.1.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/028a90c7-ded7-45ad-90ea-9f1a7d3743a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conversational-forms/" + google-query: inurl:"/wp-content/plugins/conversational-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conversational-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conversational-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conversational-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conversational-forms-d06ae0bd2926a035277d571533319f2e.yaml b/nuclei-templates/cve-less/plugins/conversational-forms-d06ae0bd2926a035277d571533319f2e.yaml new file mode 100644 index 0000000000..4eb0cdb4e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conversational-forms-d06ae0bd2926a035277d571533319f2e.yaml @@ -0,0 +1,58 @@ +id: conversational-forms-d06ae0bd2926a035277d571533319f2e + +info: + name: > + Conversational Forms for ChatBot <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2251c72-cc98-477e-bd4d-0e134b86acce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conversational-forms/" + google-query: inurl:"/wp-content/plugins/conversational-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conversational-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conversational-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conversational-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conversion-de-moneda-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/conversion-de-moneda-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..24ff5e23c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conversion-de-moneda-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: conversion-de-moneda-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conversion-de-moneda/" + google-query: inurl:"/wp-content/plugins/conversion-de-moneda/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conversion-de-moneda,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conversion-de-moneda/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conversion-de-moneda" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conversionninja-f35417e8a6d1f5736025e50e8ca1a9dc.yaml b/nuclei-templates/cve-less/plugins/conversionninja-f35417e8a6d1f5736025e50e8ca1a9dc.yaml new file mode 100644 index 0000000000..e4ea4c32db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conversionninja-f35417e8a6d1f5736025e50e8ca1a9dc.yaml @@ -0,0 +1,58 @@ +id: conversionninja-f35417e8a6d1f5736025e50e8ca1a9dc + +info: + name: > + Conversion Ninja (Unspecified Version) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1877f94c-3761-4af2-b093-cd2a4e60d63b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conversionninja/" + google-query: inurl:"/wp-content/plugins/conversionninja/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conversionninja,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conversionninja/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conversionninja" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convert-post-types-8cfa5c88e9f41fa81abd69a4c0a4495b.yaml b/nuclei-templates/cve-less/plugins/convert-post-types-8cfa5c88e9f41fa81abd69a4c0a4495b.yaml new file mode 100644 index 0000000000..00de0fdeea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convert-post-types-8cfa5c88e9f41fa81abd69a4c0a4495b.yaml @@ -0,0 +1,58 @@ +id: convert-post-types-8cfa5c88e9f41fa81abd69a4c0a4495b + +info: + name: > + Convert Post Types <= 1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9de2fe9-c1d7-4898-806d-68628061a98d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convert-post-types/" + google-query: inurl:"/wp-content/plugins/convert-post-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convert-post-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convert-post-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convert-post-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convert-post-types-c58d543f66167e9552cf6cc989b83b2e.yaml b/nuclei-templates/cve-less/plugins/convert-post-types-c58d543f66167e9552cf6cc989b83b2e.yaml new file mode 100644 index 0000000000..e2e2cda3b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convert-post-types-c58d543f66167e9552cf6cc989b83b2e.yaml @@ -0,0 +1,58 @@ +id: convert-post-types-c58d543f66167e9552cf6cc989b83b2e + +info: + name: > + Convert Post Types <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a434d66-ac97-4801-8985-047dcc7c3eb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convert-post-types/" + google-query: inurl:"/wp-content/plugins/convert-post-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convert-post-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convert-post-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convert-post-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convert-to-blocks-fd9bc570df9e6e1f10861293d27d4049.yaml b/nuclei-templates/cve-less/plugins/convert-to-blocks-fd9bc570df9e6e1f10861293d27d4049.yaml new file mode 100644 index 0000000000..ae68722c57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convert-to-blocks-fd9bc570df9e6e1f10861293d27d4049.yaml @@ -0,0 +1,58 @@ +id: convert-to-blocks-fd9bc570df9e6e1f10861293d27d4049 + +info: + name: > + Minimist <= 1.2.5 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f714f97-5e1a-498a-9722-1e4bb883c5c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convert-to-blocks/" + google-query: inurl:"/wp-content/plugins/convert-to-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convert-to-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convert-to-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convert-to-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertbox-auto-embed-8451bc0b3344f88890ab58dfe6424c23.yaml b/nuclei-templates/cve-less/plugins/convertbox-auto-embed-8451bc0b3344f88890ab58dfe6424c23.yaml new file mode 100644 index 0000000000..66966a0ec0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertbox-auto-embed-8451bc0b3344f88890ab58dfe6424c23.yaml @@ -0,0 +1,58 @@ +id: convertbox-auto-embed-8451bc0b3344f88890ab58dfe6424c23 + +info: + name: > + ConvertBox Auto Embed WordPress plugin <= 1.0.19 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8a4e9b8-9794-48b7-8c53-cfad37ed530c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertbox-auto-embed/" + google-query: inurl:"/wp-content/plugins/convertbox-auto-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertbox-auto-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertbox-auto-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertbox-auto-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertful-0f483e5b57556e64c6fcbf6984188e67.yaml b/nuclei-templates/cve-less/plugins/convertful-0f483e5b57556e64c6fcbf6984188e67.yaml new file mode 100644 index 0000000000..c3a67b037f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertful-0f483e5b57556e64c6fcbf6984188e67.yaml @@ -0,0 +1,58 @@ +id: convertful-0f483e5b57556e64c6fcbf6984188e67 + +info: + name: > + Convertful – Your Ultimate On-Site Conversion Tool <= 2.5 - Missing Authorization via add_woo_coupon + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e8c311e-7cf2-4aaf-8059-30f872475ee5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertful/" + google-query: inurl:"/wp-content/plugins/convertful/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertful,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertful/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertful" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertkit-530ef54f0cce1110a26e13d9009961ab.yaml b/nuclei-templates/cve-less/plugins/convertkit-530ef54f0cce1110a26e13d9009961ab.yaml new file mode 100644 index 0000000000..37ef78f6c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertkit-530ef54f0cce1110a26e13d9009961ab.yaml @@ -0,0 +1,58 @@ +id: convertkit-530ef54f0cce1110a26e13d9009961ab + +info: + name: > + ConvertKit <= 2.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf3a16b6-7256-4fad-b3f2-d1d9d833f45e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertkit/" + google-query: inurl:"/wp-content/plugins/convertkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertkit-5ccba34100497998aa68e15dc82c8875.yaml b/nuclei-templates/cve-less/plugins/convertkit-5ccba34100497998aa68e15dc82c8875.yaml new file mode 100644 index 0000000000..e150a5ad48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertkit-5ccba34100497998aa68e15dc82c8875.yaml @@ -0,0 +1,58 @@ +id: convertkit-5ccba34100497998aa68e15dc82c8875 + +info: + name: > + ConvertKit <= 2.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/443ceb13-bc6e-4d8d-a415-1a0d4fecf38e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertkit/" + google-query: inurl:"/wp-content/plugins/convertkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertkit-a064b7a7a37c845ee9c4b53a944b4505.yaml b/nuclei-templates/cve-less/plugins/convertkit-a064b7a7a37c845ee9c4b53a944b4505.yaml new file mode 100644 index 0000000000..a0d45f06f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertkit-a064b7a7a37c845ee9c4b53a944b4505.yaml @@ -0,0 +1,58 @@ +id: convertkit-a064b7a7a37c845ee9c4b53a944b4505 + +info: + name: > + ConvertKit <= 2.4.5 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dd3c146-534f-41be-b805-7eef2483614e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertkit/" + google-query: inurl:"/wp-content/plugins/convertkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertkit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertplug-3445f10edb771a060415612c26e8b8f1.yaml b/nuclei-templates/cve-less/plugins/convertplug-3445f10edb771a060415612c26e8b8f1.yaml new file mode 100644 index 0000000000..a6098b088d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertplug-3445f10edb771a060415612c26e8b8f1.yaml @@ -0,0 +1,58 @@ +id: convertplug-3445f10edb771a060415612c26e8b8f1 + +info: + name: > + ConvertPlug <= 3.5.25 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca3259b-bf0e-4b4a-815f-1eb399b8b674?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertplug/" + google-query: inurl:"/wp-content/plugins/convertplug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertplug,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertplug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertplug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertplug-350d1c9101b958bff14b2cd20f908108.yaml b/nuclei-templates/cve-less/plugins/convertplug-350d1c9101b958bff14b2cd20f908108.yaml new file mode 100644 index 0000000000..3b5de213f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertplug-350d1c9101b958bff14b2cd20f908108.yaml @@ -0,0 +1,58 @@ +id: convertplug-350d1c9101b958bff14b2cd20f908108 + +info: + name: > + ConvertPlus <= 3.4.4 - Unauthorized Account Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1836b1e-6c37-4a07-ac29-687d2eebd3ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertplug/" + google-query: inurl:"/wp-content/plugins/convertplug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertplug,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertplug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertplug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertplug-c180a9b603d8380fb7d1168376590f63.yaml b/nuclei-templates/cve-less/plugins/convertplug-c180a9b603d8380fb7d1168376590f63.yaml new file mode 100644 index 0000000000..af52caf19c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertplug-c180a9b603d8380fb7d1168376590f63.yaml @@ -0,0 +1,58 @@ +id: convertplug-c180a9b603d8380fb7d1168376590f63 + +info: + name: > + ConvertPlug <= 3.5.25 - Missing Authorization to Authenticated (Subscriber+) Limited Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cd72420-dca1-455d-92a6-a178b4b26eab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertplug/" + google-query: inurl:"/wp-content/plugins/convertplug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertplug,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertplug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertplug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertplug-f630b1d3cc9f84151af09d692a508d8b.yaml b/nuclei-templates/cve-less/plugins/convertplug-f630b1d3cc9f84151af09d692a508d8b.yaml new file mode 100644 index 0000000000..a48b160155 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertplug-f630b1d3cc9f84151af09d692a508d8b.yaml @@ -0,0 +1,58 @@ +id: convertplug-f630b1d3cc9f84151af09d692a508d8b + +info: + name: > + ConvertPlug <= 3.4.2 - Unauthenticated Administrator Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/268b77b9-af1d-41c8-9f24-99b60eb04cc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertplug/" + google-query: inurl:"/wp-content/plugins/convertplug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertplug,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertplug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertplug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/convertpro-144ed0d6a5cb015106c17c6c273b534a.yaml b/nuclei-templates/cve-less/plugins/convertpro-144ed0d6a5cb015106c17c6c273b534a.yaml new file mode 100644 index 0000000000..aa3692937a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/convertpro-144ed0d6a5cb015106c17c6c273b534a.yaml @@ -0,0 +1,58 @@ +id: convertpro-144ed0d6a5cb015106c17c6c273b534a + +info: + name: > + Convert Pro <= 1.7.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44f2a414-245b-4c2d-a7ef-ca33b399f6b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/convertpro/" + google-query: inurl:"/wp-content/plugins/convertpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,convertpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/convertpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "convertpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/conveythis-translate-553b8c0b3cbb1236b177498b5b57ae88.yaml b/nuclei-templates/cve-less/plugins/conveythis-translate-553b8c0b3cbb1236b177498b5b57ae88.yaml new file mode 100644 index 0000000000..a5909b85fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/conveythis-translate-553b8c0b3cbb1236b177498b5b57ae88.yaml @@ -0,0 +1,58 @@ +id: conveythis-translate-553b8c0b3cbb1236b177498b5b57ae88 + +info: + name: > + Language Translate Widget for WordPress – ConveyThis <= 223 - Unauthenticated Stored Cross-Site Scripting via api_key + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/093af92e-bbc2-463a-8547-0e48fb356655?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/conveythis-translate/" + google-query: inurl:"/wp-content/plugins/conveythis-translate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,conveythis-translate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/conveythis-translate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "conveythis-translate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 223') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cooked-13669a276e19b8811f99e2913ccb5a23.yaml b/nuclei-templates/cve-less/plugins/cooked-13669a276e19b8811f99e2913ccb5a23.yaml new file mode 100644 index 0000000000..0ce378355d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cooked-13669a276e19b8811f99e2913ccb5a23.yaml @@ -0,0 +1,58 @@ +id: cooked-13669a276e19b8811f99e2913ccb5a23 + +info: + name: > + Cooked <= 1.7.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3eab1e93-ecf1-4ac6-95b0-9a58c2de867a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cooked/" + google-query: inurl:"/wp-content/plugins/cooked/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cooked,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cooked/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cooked" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cooked-6e286583f72963c211e1187360769087.yaml b/nuclei-templates/cve-less/plugins/cooked-6e286583f72963c211e1187360769087.yaml new file mode 100644 index 0000000000..938d2944c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cooked-6e286583f72963c211e1187360769087.yaml @@ -0,0 +1,58 @@ +id: cooked-6e286583f72963c211e1187360769087 + +info: + name: > + Cooked <= 1.7.14 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76ba273d-0919-45b3-8044-b8f0ff3972ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cooked/" + google-query: inurl:"/wp-content/plugins/cooked/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cooked,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cooked/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cooked" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cooked-pro-48bbdd821c29a9665fc692ef526172c1.yaml b/nuclei-templates/cve-less/plugins/cooked-pro-48bbdd821c29a9665fc692ef526172c1.yaml new file mode 100644 index 0000000000..41e97f0245 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cooked-pro-48bbdd821c29a9665fc692ef526172c1.yaml @@ -0,0 +1,58 @@ +id: cooked-pro-48bbdd821c29a9665fc692ef526172c1 + +info: + name: > + Cooked Pro <= 1.7.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3553044e-c109-4e6d-8ba1-f0d5cd1f72ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cooked-pro/" + google-query: inurl:"/wp-content/plugins/cooked-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cooked-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cooked-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cooked-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cooked-pro-e81fd7787c96dcecf9ab7ed7e0fa064a.yaml b/nuclei-templates/cve-less/plugins/cooked-pro-e81fd7787c96dcecf9ab7ed7e0fa064a.yaml new file mode 100644 index 0000000000..26176a413a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cooked-pro-e81fd7787c96dcecf9ab7ed7e0fa064a.yaml @@ -0,0 +1,58 @@ +id: cooked-pro-e81fd7787c96dcecf9ab7ed7e0fa064a + +info: + name: > + Cooked Pro < 1.7.5.7 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fb09a77-aba1-422c-961b-dc2c7ce82320?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cooked-pro/" + google-query: inurl:"/wp-content/plugins/cooked-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cooked-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cooked-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cooked-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-bar-13b25bc0903a03574dd9d52d17a8d7fb.yaml b/nuclei-templates/cve-less/plugins/cookie-bar-13b25bc0903a03574dd9d52d17a8d7fb.yaml new file mode 100644 index 0000000000..1a50f6cd64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-bar-13b25bc0903a03574dd9d52d17a8d7fb.yaml @@ -0,0 +1,58 @@ +id: cookie-bar-13b25bc0903a03574dd9d52d17a8d7fb + +info: + name: > + Cookie Bar <= 1.8.8 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11401ad7-6064-475c-92f6-ce72a56e9a83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-bar/" + google-query: inurl:"/wp-content/plugins/cookie-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-bar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-bar-5f63dbab28102f21dce668e1dd09a569.yaml b/nuclei-templates/cve-less/plugins/cookie-bar-5f63dbab28102f21dce668e1dd09a569.yaml new file mode 100644 index 0000000000..c4292795ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-bar-5f63dbab28102f21dce668e1dd09a569.yaml @@ -0,0 +1,58 @@ +id: cookie-bar-5f63dbab28102f21dce668e1dd09a569 + +info: + name: > + Cookie Bar <= 2.0 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80afca9d-8f9c-412f-b2dd-f0078ec8173c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-bar/" + google-query: inurl:"/wp-content/plugins/cookie-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-consent-box-0a7db26507a2752830d796f872bfc74f.yaml b/nuclei-templates/cve-less/plugins/cookie-consent-box-0a7db26507a2752830d796f872bfc74f.yaml new file mode 100644 index 0000000000..440a9a7dcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-consent-box-0a7db26507a2752830d796f872bfc74f.yaml @@ -0,0 +1,58 @@ +id: cookie-consent-box-0a7db26507a2752830d796f872bfc74f + +info: + name: > + GDPR Cookie Consent Notice Box <= 1.1.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f44b8e21-4bfd-487f-96f1-d264d335f54f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-consent-box/" + google-query: inurl:"/wp-content/plugins/cookie-consent-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-consent-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-consent-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-consent-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-law-bar-daa176383a0d1a1f03b0870eb52cd5ab.yaml b/nuclei-templates/cve-less/plugins/cookie-law-bar-daa176383a0d1a1f03b0870eb52cd5ab.yaml new file mode 100644 index 0000000000..84855a646c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-law-bar-daa176383a0d1a1f03b0870eb52cd5ab.yaml @@ -0,0 +1,58 @@ +id: cookie-law-bar-daa176383a0d1a1f03b0870eb52cd5ab + +info: + name: > + Cookie Law Bar <= 1.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f65cb1f6-e72e-4848-b72c-99b83e5401e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-law-bar/" + google-query: inurl:"/wp-content/plugins/cookie-law-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-law-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-law-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-law-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-law-info-c794524768b79fbeacb43dc638d96e23.yaml b/nuclei-templates/cve-less/plugins/cookie-law-info-c794524768b79fbeacb43dc638d96e23.yaml new file mode 100644 index 0000000000..2e60a9103a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-law-info-c794524768b79fbeacb43dc638d96e23.yaml @@ -0,0 +1,58 @@ +id: cookie-law-info-c794524768b79fbeacb43dc638d96e23 + +info: + name: > + GDPR Cookie Consent & Compliance Notice <= 1.8.2 - Authenticated Stored Cross-Site Scripting and Authorization Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2f3c007-6ecc-4003-87ed-352984b9a83c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-law-info/" + google-query: inurl:"/wp-content/plugins/cookie-law-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-law-info,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-law-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-law-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-notice-4871efeec934efc06ef8f938e4a88d59.yaml b/nuclei-templates/cve-less/plugins/cookie-notice-4871efeec934efc06ef8f938e4a88d59.yaml new file mode 100644 index 0000000000..bb2e7c7425 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-notice-4871efeec934efc06ef8f938e4a88d59.yaml @@ -0,0 +1,58 @@ +id: cookie-notice-4871efeec934efc06ef8f938e4a88d59 + +info: + name: > + Cookie Notice & Compliance for GDPR / CCPA <= 2.4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'cookies_revoke_shortcode' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/914de8f3-e052-4256-af14-4a08eaa464b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-notice/" + google-query: inurl:"/wp-content/plugins/cookie-notice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-notice,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-notice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-notice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-notice-94366e72b8b16247e4525177a190a390.yaml b/nuclei-templates/cve-less/plugins/cookie-notice-94366e72b8b16247e4525177a190a390.yaml new file mode 100644 index 0000000000..6b5c7a8ea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-notice-94366e72b8b16247e4525177a190a390.yaml @@ -0,0 +1,58 @@ +id: cookie-notice-94366e72b8b16247e4525177a190a390 + +info: + name: > + Cookie Notice & Compliance for GDPR / CCPA <= 2.4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'cookies_policy_link' Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95acec2a-ba1b-4b61-a4d6-3b0250a32835?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-notice/" + google-query: inurl:"/wp-content/plugins/cookie-notice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-notice,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-notice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-notice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-notice-and-consent-banner-0f75bb052c76ac287df6a3cedb6cbaf7.yaml b/nuclei-templates/cve-less/plugins/cookie-notice-and-consent-banner-0f75bb052c76ac287df6a3cedb6cbaf7.yaml new file mode 100644 index 0000000000..a4d9714935 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-notice-and-consent-banner-0f75bb052c76ac287df6a3cedb6cbaf7.yaml @@ -0,0 +1,58 @@ +id: cookie-notice-and-consent-banner-0f75bb052c76ac287df6a3cedb6cbaf7 + +info: + name: > + Cookie Notice & Consent Banner for GDPR & CCPA Compliance <= 1.7.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67e0e59d-879c-434f-9ffb-1b97d8105bfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-notice-and-consent-banner/" + google-query: inurl:"/wp-content/plugins/cookie-notice-and-consent-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-notice-and-consent-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-notice-and-consent-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-notice-and-consent-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-notice-consent-bd04f483d63aabca8f2d0d86dcbe84f9.yaml b/nuclei-templates/cve-less/plugins/cookie-notice-consent-bd04f483d63aabca8f2d0d86dcbe84f9.yaml new file mode 100644 index 0000000000..4e8c4cba31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-notice-consent-bd04f483d63aabca8f2d0d86dcbe84f9.yaml @@ -0,0 +1,58 @@ +id: cookie-notice-consent-bd04f483d63aabca8f2d0d86dcbe84f9 + +info: + name: > + Cookie Notice & Consent 1.6.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/489dc156-b8cb-4e08-a847-73a891398d5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-notice-consent/" + google-query: inurl:"/wp-content/plugins/cookie-notice-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-notice-consent,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-notice-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-notice-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-notice-f08aff12bfc66296ae4f842e638dd13b.yaml b/nuclei-templates/cve-less/plugins/cookie-notice-f08aff12bfc66296ae4f842e638dd13b.yaml new file mode 100644 index 0000000000..6c1462811d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-notice-f08aff12bfc66296ae4f842e638dd13b.yaml @@ -0,0 +1,58 @@ +id: cookie-notice-f08aff12bfc66296ae4f842e638dd13b + +info: + name: > + Cookie Notice & Compliance for GDPR / CCPA <= 2.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eeae71a6-53b2-4eab-82c0-d23cff3f0f7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-notice/" + google-query: inurl:"/wp-content/plugins/cookie-notice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-notice,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-notice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-notice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookie-params-72e30d516064ff268f270b89142b1d08.yaml b/nuclei-templates/cve-less/plugins/cookie-params-72e30d516064ff268f270b89142b1d08.yaml new file mode 100644 index 0000000000..d348564c68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookie-params-72e30d516064ff268f270b89142b1d08.yaml @@ -0,0 +1,58 @@ +id: cookie-params-72e30d516064ff268f270b89142b1d08 + +info: + name: > + Cookie Params <= 0.2 - Reflected Cross-Site Scripting and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a31ab564-48b7-44f7-a1da-226222c3fd7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookie-params/" + google-query: inurl:"/wp-content/plugins/cookie-params/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookie-params,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookie-params/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookie-params" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookiebot-88740e25cc28fba39de089d7afe48b02.yaml b/nuclei-templates/cve-less/plugins/cookiebot-88740e25cc28fba39de089d7afe48b02.yaml new file mode 100644 index 0000000000..95af7477f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookiebot-88740e25cc28fba39de089d7afe48b02.yaml @@ -0,0 +1,58 @@ +id: cookiebot-88740e25cc28fba39de089d7afe48b02 + +info: + name: > + Cookiebot | GDPR/CCPA Compliant Cookie Consent and Control <= 3.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/765df8f4-438c-41b6-ac74-494f1b74cf33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookiebot/" + google-query: inurl:"/wp-content/plugins/cookiebot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookiebot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookiebot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookiebot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookiehub-2606febac98b5b77708f94f9707ab5ad.yaml b/nuclei-templates/cve-less/plugins/cookiehub-2606febac98b5b77708f94f9707ab5ad.yaml new file mode 100644 index 0000000000..2f6cc9f5ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookiehub-2606febac98b5b77708f94f9707ab5ad.yaml @@ -0,0 +1,58 @@ +id: cookiehub-2606febac98b5b77708f94f9707ab5ad + +info: + name: > + CookieHub <= 1.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46122be7-5e88-4656-8944-a747f5cdc69e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookiehub/" + google-query: inurl:"/wp-content/plugins/cookiehub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookiehub,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookiehub/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookiehub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookiemonster-5b40ee65b1caa7d96e4e60846451b515.yaml b/nuclei-templates/cve-less/plugins/cookiemonster-5b40ee65b1caa7d96e4e60846451b515.yaml new file mode 100644 index 0000000000..b47e50fc60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookiemonster-5b40ee65b1caa7d96e4e60846451b515.yaml @@ -0,0 +1,58 @@ +id: cookiemonster-5b40ee65b1caa7d96e4e60846451b515 + +info: + name: > + Cookie Monster <= 1.51 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f040075-83a0-4c9a-8d93-99aa36606b31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookiemonster/" + google-query: inurl:"/wp-content/plugins/cookiemonster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookiemonster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookiemonster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookiemonster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookies-and-content-security-policy-f0ed757a74607e0e7be560cb144e0abe.yaml b/nuclei-templates/cve-less/plugins/cookies-and-content-security-policy-f0ed757a74607e0e7be560cb144e0abe.yaml new file mode 100644 index 0000000000..347bd532b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookies-and-content-security-policy-f0ed757a74607e0e7be560cb144e0abe.yaml @@ -0,0 +1,58 @@ +id: cookies-and-content-security-policy-f0ed757a74607e0e7be560cb144e0abe + +info: + name: > + Cookies and Content Security Policy <= 2.15 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79e68c5b-1f1a-4af3-acf4-1a38f2d72424?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookies-and-content-security-policy/" + google-query: inurl:"/wp-content/plugins/cookies-and-content-security-policy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookies-and-content-security-policy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookies-and-content-security-policy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookies-and-content-security-policy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cookies-by-jm-b9008bcb5ccd36f2981a1df579798a3b.yaml b/nuclei-templates/cve-less/plugins/cookies-by-jm-b9008bcb5ccd36f2981a1df579798a3b.yaml new file mode 100644 index 0000000000..536a254202 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cookies-by-jm-b9008bcb5ccd36f2981a1df579798a3b.yaml @@ -0,0 +1,58 @@ +id: cookies-by-jm-b9008bcb5ccd36f2981a1df579798a3b + +info: + name: > + Cookies by JM <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3aa2a693-831b-44e7-b158-99fecf6506be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cookies-by-jm/" + google-query: inurl:"/wp-content/plugins/cookies-by-jm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cookies-by-jm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cookies-by-jm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cookies-by-jm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cool-facebook-page-feed-timeline-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/cool-facebook-page-feed-timeline-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..7059ec0c45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cool-facebook-page-feed-timeline-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: cool-facebook-page-feed-timeline-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cool-facebook-page-feed-timeline/" + google-query: inurl:"/wp-content/plugins/cool-facebook-page-feed-timeline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cool-facebook-page-feed-timeline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cool-facebook-page-feed-timeline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cool-facebook-page-feed-timeline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cool-tag-cloud-02f969afa585249fd7cbd8abedb25b46.yaml b/nuclei-templates/cve-less/plugins/cool-tag-cloud-02f969afa585249fd7cbd8abedb25b46.yaml new file mode 100644 index 0000000000..7a65d8f54d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cool-tag-cloud-02f969afa585249fd7cbd8abedb25b46.yaml @@ -0,0 +1,58 @@ +id: cool-tag-cloud-02f969afa585249fd7cbd8abedb25b46 + +info: + name: > + Cool Tag Cloud <= 2.25 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbd5dc98-ac5b-4548-9f98-faa91f5b1e2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cool-tag-cloud/" + google-query: inurl:"/wp-content/plugins/cool-tag-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cool-tag-cloud,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cool-tag-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cool-tag-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cool-timeline-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/cool-timeline-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..e5d66db23a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cool-timeline-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: cool-timeline-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cool-timeline/" + google-query: inurl:"/wp-content/plugins/cool-timeline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cool-timeline,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cool-timeline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cool-timeline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cool-timeline-6ce37c385f3376e7926c7b8faa81bc2f.yaml b/nuclei-templates/cve-less/plugins/cool-timeline-6ce37c385f3376e7926c7b8faa81bc2f.yaml new file mode 100644 index 0000000000..e1efb26d4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cool-timeline-6ce37c385f3376e7926c7b8faa81bc2f.yaml @@ -0,0 +1,58 @@ +id: cool-timeline-6ce37c385f3376e7926c7b8faa81bc2f + +info: + name: > + Cool Timeline (Horizontal & Vertical Timeline) <= 2.0.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ce7c895-e94c-46bd-9de1-f5fde29c3475?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cool-timeline/" + google-query: inurl:"/wp-content/plugins/cool-timeline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cool-timeline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cool-timeline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cool-timeline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cool-video-gallery-1a5984e73d9bda9668de2c9f32433df9.yaml b/nuclei-templates/cve-less/plugins/cool-video-gallery-1a5984e73d9bda9668de2c9f32433df9.yaml new file mode 100644 index 0000000000..0f5954bbb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cool-video-gallery-1a5984e73d9bda9668de2c9f32433df9.yaml @@ -0,0 +1,58 @@ +id: cool-video-gallery-1a5984e73d9bda9668de2c9f32433df9 + +info: + name: > + Cool Video Gallery <= 1.9 - Authenticated Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f098d66f-43a6-44e9-b836-2994d2c97782?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cool-video-gallery/" + google-query: inurl:"/wp-content/plugins/cool-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cool-video-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cool-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cool-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coolclock-d3f53759db6cbb2a0f47408beaf6dbd0.yaml b/nuclei-templates/cve-less/plugins/coolclock-d3f53759db6cbb2a0f47408beaf6dbd0.yaml new file mode 100644 index 0000000000..441fde557e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coolclock-d3f53759db6cbb2a0f47408beaf6dbd0.yaml @@ -0,0 +1,58 @@ +id: coolclock-d3f53759db6cbb2a0f47408beaf6dbd0 + +info: + name: > + CoolClock <= 4.3.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bb45de4-2c83-4c77-aec0-f28ade966468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coolclock/" + google-query: inurl:"/wp-content/plugins/coolclock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coolclock,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coolclock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coolclock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copify-d08d0840632760096f6b8acd75a58e66.yaml b/nuclei-templates/cve-less/plugins/copify-d08d0840632760096f6b8acd75a58e66.yaml new file mode 100644 index 0000000000..0ee3649de2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copify-d08d0840632760096f6b8acd75a58e66.yaml @@ -0,0 +1,58 @@ +id: copify-d08d0840632760096f6b8acd75a58e66 + +info: + name: > + Copify <= 1.3.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e92c6374-d11d-458c-b089-0ee79c33e4a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copify/" + google-query: inurl:"/wp-content/plugins/copify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-delete-posts-1b358fe1178e63af268bdd4f6a81f5be.yaml b/nuclei-templates/cve-less/plugins/copy-delete-posts-1b358fe1178e63af268bdd4f6a81f5be.yaml new file mode 100644 index 0000000000..9251a0f820 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-delete-posts-1b358fe1178e63af268bdd4f6a81f5be.yaml @@ -0,0 +1,58 @@ +id: copy-delete-posts-1b358fe1178e63af268bdd4f6a81f5be + +info: + name: > + Duplicate Post <= 1.4.1 - Cross-Site Request Forgery via 'cdp_action_handling' AJAX action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8c8d839-d2a4-4b2a-ad61-a3cda7826636?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-delete-posts/" + google-query: inurl:"/wp-content/plugins/copy-delete-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-delete-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-delete-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-delete-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-delete-posts-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/copy-delete-posts-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..54f4bd0886 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-delete-posts-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: copy-delete-posts-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-delete-posts/" + google-query: inurl:"/wp-content/plugins/copy-delete-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-delete-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-delete-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-delete-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-delete-posts-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/copy-delete-posts-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..a95bd3efe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-delete-posts-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: copy-delete-posts-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-delete-posts/" + google-query: inurl:"/wp-content/plugins/copy-delete-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-delete-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-delete-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-delete-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-delete-posts-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/copy-delete-posts-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..0540e9761f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-delete-posts-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: copy-delete-posts-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-delete-posts/" + google-query: inurl:"/wp-content/plugins/copy-delete-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-delete-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-delete-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-delete-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-delete-posts-f8c9b929aeaeb9c8fafdde93d3c6755f.yaml b/nuclei-templates/cve-less/plugins/copy-delete-posts-f8c9b929aeaeb9c8fafdde93d3c6755f.yaml new file mode 100644 index 0000000000..707b1186fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-delete-posts-f8c9b929aeaeb9c8fafdde93d3c6755f.yaml @@ -0,0 +1,58 @@ +id: copy-delete-posts-f8c9b929aeaeb9c8fafdde93d3c6755f + +info: + name: > + Duplicate Post WordPress Plugin <= 1.1.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7a0b40b-560a-4f2a-ad6d-6b2284fd5f25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-delete-posts/" + google-query: inurl:"/wp-content/plugins/copy-delete-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-delete-posts,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-delete-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-delete-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-me-0605116109dea812447b77431db29f66.yaml b/nuclei-templates/cve-less/plugins/copy-me-0605116109dea812447b77431db29f66.yaml new file mode 100644 index 0000000000..eaf33f15c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-me-0605116109dea812447b77431db29f66.yaml @@ -0,0 +1,58 @@ +id: copy-me-0605116109dea812447b77431db29f66 + +info: + name: > + copy-me <= 1.0.0 - Missing Authorization & Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ff866c0-1b4c-4ad8-bde3-353ed0f44f42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-me/" + google-query: inurl:"/wp-content/plugins/copy-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-me,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-me/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-or-move-comments-3199c52f1f975758dfffb8998d727e53.yaml b/nuclei-templates/cve-less/plugins/copy-or-move-comments-3199c52f1f975758dfffb8998d727e53.yaml new file mode 100644 index 0000000000..66477069c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-or-move-comments-3199c52f1f975758dfffb8998d727e53.yaml @@ -0,0 +1,58 @@ +id: copy-or-move-comments-3199c52f1f975758dfffb8998d727e53 + +info: + name: > + Copy Or Move Comments <= 5.0.4 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2b020c3-0eb9-4ff1-b94e-e32452695b5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-or-move-comments/" + google-query: inurl:"/wp-content/plugins/copy-or-move-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-or-move-comments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-or-move-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-or-move-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-or-move-comments-4c213df5dc6174e79a79df8f8e0cad2a.yaml b/nuclei-templates/cve-less/plugins/copy-or-move-comments-4c213df5dc6174e79a79df8f8e0cad2a.yaml new file mode 100644 index 0000000000..9df7a4079b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-or-move-comments-4c213df5dc6174e79a79df8f8e0cad2a.yaml @@ -0,0 +1,58 @@ +id: copy-or-move-comments-4c213df5dc6174e79a79df8f8e0cad2a + +info: + name: > + Copy or Move Comments < 1.0.1 - Cross-Site Scripting and SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb32a095-7d2b-4a57-9d91-f79fb3486f9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-or-move-comments/" + google-query: inurl:"/wp-content/plugins/copy-or-move-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-or-move-comments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-or-move-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-or-move-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-or-move-comments-7b6f5ddd1a73a6079392a4dafa7418fb.yaml b/nuclei-templates/cve-less/plugins/copy-or-move-comments-7b6f5ddd1a73a6079392a4dafa7418fb.yaml new file mode 100644 index 0000000000..ad8d11dd6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-or-move-comments-7b6f5ddd1a73a6079392a4dafa7418fb.yaml @@ -0,0 +1,58 @@ +id: copy-or-move-comments-7b6f5ddd1a73a6079392a4dafa7418fb + +info: + name: > + Copy Or Move Comments <= 5.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a7bf74b-1dc7-4159-a874-29694fe5895e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-or-move-comments/" + google-query: inurl:"/wp-content/plugins/copy-or-move-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-or-move-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-or-move-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-or-move-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copy-the-code-54ab7472cf90fa30b87c2b5f7b48020b.yaml b/nuclei-templates/cve-less/plugins/copy-the-code-54ab7472cf90fa30b87c2b5f7b48020b.yaml new file mode 100644 index 0000000000..80c33632a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copy-the-code-54ab7472cf90fa30b87c2b5f7b48020b.yaml @@ -0,0 +1,58 @@ +id: copy-the-code-54ab7472cf90fa30b87c2b5f7b48020b + +info: + name: > + Copy Anything to Clipboard <= 2.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e834a211-ccc8-4a30-a15d-879ba34184e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copy-the-code/" + google-query: inurl:"/wp-content/plugins/copy-the-code/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copy-the-code,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copy-the-code/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copy-the-code" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/copyrightpro-04bb0fa287a9e5d3f21854cb26990e9b.yaml b/nuclei-templates/cve-less/plugins/copyrightpro-04bb0fa287a9e5d3f21854cb26990e9b.yaml new file mode 100644 index 0000000000..0314bf043e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/copyrightpro-04bb0fa287a9e5d3f21854cb26990e9b.yaml @@ -0,0 +1,58 @@ +id: copyrightpro-04bb0fa287a9e5d3f21854cb26990e9b + +info: + name: > + CopyRightPro <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83b48cfc-04e7-4929-8da2-cf6beee6d88e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/copyrightpro/" + google-query: inurl:"/wp-content/plugins/copyrightpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,copyrightpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/copyrightpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "copyrightpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/core-control-eeca82a89fbac0124d669de2f8301089.yaml b/nuclei-templates/cve-less/plugins/core-control-eeca82a89fbac0124d669de2f8301089.yaml new file mode 100644 index 0000000000..263edefe05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/core-control-eeca82a89fbac0124d669de2f8301089.yaml @@ -0,0 +1,58 @@ +id: core-control-eeca82a89fbac0124d669de2f8301089 + +info: + name: > + Core Control <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d92ce83-03de-4981-8d90-0b8d2a2d16ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/core-control/" + google-query: inurl:"/wp-content/plugins/core-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,core-control,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/core-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "core-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/core-web-vitals-pagespeed-booster-848d3b967ba51cd5adfd6ee6af7f2576.yaml b/nuclei-templates/cve-less/plugins/core-web-vitals-pagespeed-booster-848d3b967ba51cd5adfd6ee6af7f2576.yaml new file mode 100644 index 0000000000..e8a91ecdca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/core-web-vitals-pagespeed-booster-848d3b967ba51cd5adfd6ee6af7f2576.yaml @@ -0,0 +1,58 @@ +id: core-web-vitals-pagespeed-booster-848d3b967ba51cd5adfd6ee6af7f2576 + +info: + name: > + Core Web Vitals & PageSpeed Booster <= 1.0.12 - Open Redirect via _wp_http_referer + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fe374ff-85eb-4285-8d51-71e9275613cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/core-web-vitals-pagespeed-booster/" + google-query: inurl:"/wp-content/plugins/core-web-vitals-pagespeed-booster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,core-web-vitals-pagespeed-booster,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/core-web-vitals-pagespeed-booster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "core-web-vitals-pagespeed-booster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coreactivity-90b890e5600ae938f133578a1bc1190d.yaml b/nuclei-templates/cve-less/plugins/coreactivity-90b890e5600ae938f133578a1bc1190d.yaml new file mode 100644 index 0000000000..56571e6ae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coreactivity-90b890e5600ae938f133578a1bc1190d.yaml @@ -0,0 +1,58 @@ +id: coreactivity-90b890e5600ae938f133578a1bc1190d + +info: + name: > + coreActivity <= 2.0.1 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c17ba3-4fc8-439c-8ce3-bd95d7ed2474?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coreactivity/" + google-query: inurl:"/wp-content/plugins/coreactivity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coreactivity,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coreactivity/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coreactivity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coreactivity-d3a19cbbaa27911e489d78dc5e2a05f1.yaml b/nuclei-templates/cve-less/plugins/coreactivity-d3a19cbbaa27911e489d78dc5e2a05f1.yaml new file mode 100644 index 0000000000..17ae0ac9f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coreactivity-d3a19cbbaa27911e489d78dc5e2a05f1.yaml @@ -0,0 +1,58 @@ +id: coreactivity-d3a19cbbaa27911e489d78dc5e2a05f1 + +info: + name: > + coreActivity <= 1.8 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2432a0a-d262-4460-bd2d-2cb200d51f6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coreactivity/" + google-query: inurl:"/wp-content/plugins/coreactivity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coreactivity,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coreactivity/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coreactivity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/corner-ad-34e1ea4c84115991aa9040d8463cc384.yaml b/nuclei-templates/cve-less/plugins/corner-ad-34e1ea4c84115991aa9040d8463cc384.yaml new file mode 100644 index 0000000000..f506cfb69a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/corner-ad-34e1ea4c84115991aa9040d8463cc384.yaml @@ -0,0 +1,58 @@ +id: corner-ad-34e1ea4c84115991aa9040d8463cc384 + +info: + name: > + Corner Ad <= 1.0.56 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a6c5e9a-754f-41c8-b27b-caa133b5070f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/corner-ad/" + google-query: inurl:"/wp-content/plugins/corner-ad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,corner-ad,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/corner-ad/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "corner-ad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/corner-ad-490cf4e76b6c86f1bd637de80c3840f0.yaml b/nuclei-templates/cve-less/plugins/corner-ad-490cf4e76b6c86f1bd637de80c3840f0.yaml new file mode 100644 index 0000000000..085e6a2a4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/corner-ad-490cf4e76b6c86f1bd637de80c3840f0.yaml @@ -0,0 +1,58 @@ +id: corner-ad-490cf4e76b6c86f1bd637de80c3840f0 + +info: + name: > + Corner Ad < 1.0.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efd81ba5-b9e6-493a-a6a4-55c9e2971378?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/corner-ad/" + google-query: inurl:"/wp-content/plugins/corner-ad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,corner-ad,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/corner-ad/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "corner-ad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/corner-ad-927cbb958df998dc837f34fcb0cea909.yaml b/nuclei-templates/cve-less/plugins/corner-ad-927cbb958df998dc837f34fcb0cea909.yaml new file mode 100644 index 0000000000..abf2051f03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/corner-ad-927cbb958df998dc837f34fcb0cea909.yaml @@ -0,0 +1,58 @@ +id: corner-ad-927cbb958df998dc837f34fcb0cea909 + +info: + name: > + Corner Ad <= 1.0.53 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b85e9bf4-0006-402a-ae46-a02fa854d995?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/corner-ad/" + google-query: inurl:"/wp-content/plugins/corner-ad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,corner-ad,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/corner-ad/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "corner-ad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cornerstone-df57edbeaacf1839941749d528a6f8bc.yaml b/nuclei-templates/cve-less/plugins/cornerstone-df57edbeaacf1839941749d528a6f8bc.yaml new file mode 100644 index 0000000000..132cb0e91b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cornerstone-df57edbeaacf1839941749d528a6f8bc.yaml @@ -0,0 +1,58 @@ +id: cornerstone-df57edbeaacf1839941749d528a6f8bc + +info: + name: > + Cornerstone <= 0.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f75dfef-b30f-45a5-ba3e-cb82c1443800?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cornerstone/" + google-query: inurl:"/wp-content/plugins/cornerstone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cornerstone,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cornerstone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cornerstone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cornerstone-e6194f3012a16cad12df41e5eff8a678.yaml b/nuclei-templates/cve-less/plugins/cornerstone-e6194f3012a16cad12df41e5eff8a678.yaml new file mode 100644 index 0000000000..1e28c4443e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cornerstone-e6194f3012a16cad12df41e5eff8a678.yaml @@ -0,0 +1,58 @@ +id: cornerstone-e6194f3012a16cad12df41e5eff8a678 + +info: + name: > + Cornerstone <= 0.8.0 - Reflected Cross-Site Scripting via PHP_SELF + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c18a9b8-5041-4451-a3cc-91952c234d9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cornerstone/" + google-query: inurl:"/wp-content/plugins/cornerstone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cornerstone,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cornerstone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cornerstone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/corona-virus-covid-19-banner-e740d0f5f3811a1aac1ce94a356e0d8f.yaml b/nuclei-templates/cve-less/plugins/corona-virus-covid-19-banner-e740d0f5f3811a1aac1ce94a356e0d8f.yaml new file mode 100644 index 0000000000..fa06c76579 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/corona-virus-covid-19-banner-e740d0f5f3811a1aac1ce94a356e0d8f.yaml @@ -0,0 +1,58 @@ +id: corona-virus-covid-19-banner-e740d0f5f3811a1aac1ce94a356e0d8f + +info: + name: > + Corona Virus (COVID-19) Banner & Live Data <= 1.7.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8773fa6e-6e81-4565-a9be-36ad0ea6ac88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/corona-virus-covid-19-banner/" + google-query: inurl:"/wp-content/plugins/corona-virus-covid-19-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,corona-virus-covid-19-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/corona-virus-covid-19-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "corona-virus-covid-19-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/correos-express-0395bd0434174482278f530635a1d70c.yaml b/nuclei-templates/cve-less/plugins/correos-express-0395bd0434174482278f530635a1d70c.yaml new file mode 100644 index 0000000000..66f0b1380d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/correos-express-0395bd0434174482278f530635a1d70c.yaml @@ -0,0 +1,58 @@ +id: correos-express-0395bd0434174482278f530635a1d70c + +info: + name: > + CorreosExpress <= 2.6.0 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7126e39a-f3aa-4815-b039-485995d6bba3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/correos-express/" + google-query: inurl:"/wp-content/plugins/correos-express/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,correos-express,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/correos-express/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "correos-express" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/correos-oficial-ef4882c3d4c4772ce7530ff30b7b1640.yaml b/nuclei-templates/cve-less/plugins/correos-oficial-ef4882c3d4c4772ce7530ff30b7b1640.yaml new file mode 100644 index 0000000000..bd1ceccef9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/correos-oficial-ef4882c3d4c4772ce7530ff30b7b1640.yaml @@ -0,0 +1,58 @@ +id: correos-oficial-ef4882c3d4c4772ce7530ff30b7b1640 + +info: + name: > + Correos Oficial <= 1.3.0.0 - Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eed2941-d9fe-4020-b1ab-fb0885f47d80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/correos-oficial/" + google-query: inurl:"/wp-content/plugins/correos-oficial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,correos-oficial,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/correos-oficial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "correos-oficial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coru-lfmember-55f7bc7dbafb42aecc9f8ebab372d604.yaml b/nuclei-templates/cve-less/plugins/coru-lfmember-55f7bc7dbafb42aecc9f8ebab372d604.yaml new file mode 100644 index 0000000000..53d5fcba3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coru-lfmember-55f7bc7dbafb42aecc9f8ebab372d604.yaml @@ -0,0 +1,58 @@ +id: coru-lfmember-55f7bc7dbafb42aecc9f8ebab372d604 + +info: + name: > + Coru LFMember <= 1.0.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46226921-a445-4fb7-9c90-bd2d6841dec7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coru-lfmember/" + google-query: inurl:"/wp-content/plugins/coru-lfmember/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coru-lfmember,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coru-lfmember/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coru-lfmember" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coru-lfmember-62e533687797ef0b9325ac92a155944b.yaml b/nuclei-templates/cve-less/plugins/coru-lfmember-62e533687797ef0b9325ac92a155944b.yaml new file mode 100644 index 0000000000..e9f781f285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coru-lfmember-62e533687797ef0b9325ac92a155944b.yaml @@ -0,0 +1,58 @@ +id: coru-lfmember-62e533687797ef0b9325ac92a155944b + +info: + name: > + Coru LFMember <= 1.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12f7f9a0-96b0-4a61-b763-12ff679bf43d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coru-lfmember/" + google-query: inurl:"/wp-content/plugins/coru-lfmember/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coru-lfmember,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coru-lfmember/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coru-lfmember" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coschedule-by-todaymade-515b13054c00d74df0dd204b8f66cac0.yaml b/nuclei-templates/cve-less/plugins/coschedule-by-todaymade-515b13054c00d74df0dd204b8f66cac0.yaml new file mode 100644 index 0000000000..1e200d0226 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coschedule-by-todaymade-515b13054c00d74df0dd204b8f66cac0.yaml @@ -0,0 +1,58 @@ +id: coschedule-by-todaymade-515b13054c00d74df0dd204b8f66cac0 + +info: + name: > + CoSchedule <= 3.3.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca55a7a0-da31-4d3f-845b-80f89ffbadf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coschedule-by-todaymade/" + google-query: inurl:"/wp-content/plugins/coschedule-by-todaymade/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coschedule-by-todaymade,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coschedule-by-todaymade/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coschedule-by-todaymade" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cosmetsy-core-0e249eccad21574e2f41d6b727c12756.yaml b/nuclei-templates/cve-less/plugins/cosmetsy-core-0e249eccad21574e2f41d6b727c12756.yaml new file mode 100644 index 0000000000..9deb01a85b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cosmetsy-core-0e249eccad21574e2f41d6b727c12756.yaml @@ -0,0 +1,58 @@ +id: cosmetsy-core-0e249eccad21574e2f41d6b727c12756 + +info: + name: > + Multiple Plugins by KlbTheme <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fb06315-30ad-4d98-af75-b04933583be7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cosmetsy-core/" + google-query: inurl:"/wp-content/plugins/cosmetsy-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cosmetsy-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cosmetsy-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cosmetsy-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cost-calculator-builder-7ea277ec9b125c8bb0dc05cbc37ef294.yaml b/nuclei-templates/cve-less/plugins/cost-calculator-builder-7ea277ec9b125c8bb0dc05cbc37ef294.yaml new file mode 100644 index 0000000000..528c0529cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cost-calculator-builder-7ea277ec9b125c8bb0dc05cbc37ef294.yaml @@ -0,0 +1,58 @@ +id: cost-calculator-builder-7ea277ec9b125c8bb0dc05cbc37ef294 + +info: + name: > + Cost Calculator Builder <= 3.1.42 - Improper Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94d60fcb-a542-41a9-b6ac-6ac2607068aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cost-calculator-builder/" + google-query: inurl:"/wp-content/plugins/cost-calculator-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cost-calculator-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cost-calculator-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cost-calculator-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cost-calculator-builder-pro-2a7584a9fe53a3524213cd8679c71b87.yaml b/nuclei-templates/cve-less/plugins/cost-calculator-builder-pro-2a7584a9fe53a3524213cd8679c71b87.yaml new file mode 100644 index 0000000000..5191ce57b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cost-calculator-builder-pro-2a7584a9fe53a3524213cd8679c71b87.yaml @@ -0,0 +1,58 @@ +id: cost-calculator-builder-pro-2a7584a9fe53a3524213cd8679c71b87 + +info: + name: > + Cost Calculator Builder Pro <= 3.1.67 - Unauthenticated Cross-Site Scripting via SVG Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/526add70-4fcf-44d1-b4d8-4cc35652b1f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cost-calculator-builder-pro/" + google-query: inurl:"/wp-content/plugins/cost-calculator-builder-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cost-calculator-builder-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cost-calculator-builder-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cost-calculator-builder-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-1da3bff2b929ee79b3408ef2cf734abb.yaml b/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-1da3bff2b929ee79b3408ef2cf734abb.yaml new file mode 100644 index 0000000000..1a6e887769 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-1da3bff2b929ee79b3408ef2cf734abb.yaml @@ -0,0 +1,58 @@ +id: cost-of-goods-for-woocommerce-1da3bff2b929ee79b3408ef2cf734abb + +info: + name: > + Cost of Goods for WooCommerce <= 2.8.6 - Cross-Site Request Forgery in save_costs + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee50731f-696f-4e9f-a930-05b2b23752de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cost-of-goods-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cost-of-goods-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cost-of-goods-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cost-of-goods-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cost-of-goods-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-bdd35485646018dc29c3dede2e0cfc31.yaml b/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-bdd35485646018dc29c3dede2e0cfc31.yaml new file mode 100644 index 0000000000..28e97e4bf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-bdd35485646018dc29c3dede2e0cfc31.yaml @@ -0,0 +1,58 @@ +id: cost-of-goods-for-woocommerce-bdd35485646018dc29c3dede2e0cfc31 + +info: + name: > + Cost of Goods for WooCommerce <= 2.8.6 - Missing Authorization in save_costs + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/984ca0d3-26c3-40cf-8e77-2ec1e3b89ce2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cost-of-goods-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cost-of-goods-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cost-of-goods-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cost-of-goods-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cost-of-goods-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-c1f81ab3aa2788ffb3caf7e813611f11.yaml b/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-c1f81ab3aa2788ffb3caf7e813611f11.yaml new file mode 100644 index 0000000000..0f0cae3405 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cost-of-goods-for-woocommerce-c1f81ab3aa2788ffb3caf7e813611f11.yaml @@ -0,0 +1,58 @@ +id: cost-of-goods-for-woocommerce-c1f81ab3aa2788ffb3caf7e813611f11 + +info: + name: > + Cost of Goods Sold (COGS): Cost & Profit Calculator for WooCommerce <= 3.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d13d072e-9c9c-4a32-b9f4-7d15dc704b50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cost-of-goods-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cost-of-goods-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cost-of-goods-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cost-of-goods-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cost-of-goods-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-1424f14be2dcb113b8417a6cefda326b.yaml b/nuclei-templates/cve-less/plugins/count-per-day-1424f14be2dcb113b8417a6cefda326b.yaml new file mode 100644 index 0000000000..e6426ba703 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-1424f14be2dcb113b8417a6cefda326b.yaml @@ -0,0 +1,58 @@ +id: count-per-day-1424f14be2dcb113b8417a6cefda326b + +info: + name: > + Count per Day <= 3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d48c52b-f42f-4c25-892f-3cce9ed8cbee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-178ad27fec6356c0ff4786fef5ed9b55.yaml b/nuclei-templates/cve-less/plugins/count-per-day-178ad27fec6356c0ff4786fef5ed9b55.yaml new file mode 100644 index 0000000000..a1b6a479c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-178ad27fec6356c0ff4786fef5ed9b55.yaml @@ -0,0 +1,58 @@ +id: count-per-day-178ad27fec6356c0ff4786fef5ed9b55 + +info: + name: > + Count per Day < 3.2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a1a727e-3b06-41ca-b684-f31d48f685c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-39efec1d687062290aa82ba498987905.yaml b/nuclei-templates/cve-less/plugins/count-per-day-39efec1d687062290aa82ba498987905.yaml new file mode 100644 index 0000000000..7dcd456081 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-39efec1d687062290aa82ba498987905.yaml @@ -0,0 +1,58 @@ +id: count-per-day-39efec1d687062290aa82ba498987905 + +info: + name: > + Count per Day <= 3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30eda147-f02a-4b3c-a51c-665aa4c75c93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-3d16ca713159983964ffa612b7a2f5b4.yaml b/nuclei-templates/cve-less/plugins/count-per-day-3d16ca713159983964ffa612b7a2f5b4.yaml new file mode 100644 index 0000000000..1ac8c4d101 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-3d16ca713159983964ffa612b7a2f5b4.yaml @@ -0,0 +1,58 @@ +id: count-per-day-3d16ca713159983964ffa612b7a2f5b4 + +info: + name: > + Count per Day <= 3.1 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/102ed3c9-33ed-462a-83df-5a57f2621780?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-5980acc6b3204929292de13732c438ae.yaml b/nuclei-templates/cve-less/plugins/count-per-day-5980acc6b3204929292de13732c438ae.yaml new file mode 100644 index 0000000000..3504e1ba4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-5980acc6b3204929292de13732c438ae.yaml @@ -0,0 +1,58 @@ +id: count-per-day-5980acc6b3204929292de13732c438ae + +info: + name: > + Count per Day < 3.5.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffa90aae-c512-4e7f-a041-e3e41cb8a1d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-8219532133f7917d1e83bbff3f75f37b.yaml b/nuclei-templates/cve-less/plugins/count-per-day-8219532133f7917d1e83bbff3f75f37b.yaml new file mode 100644 index 0000000000..b16fdcc537 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-8219532133f7917d1e83bbff3f75f37b.yaml @@ -0,0 +1,58 @@ +id: count-per-day-8219532133f7917d1e83bbff3f75f37b + +info: + name: > + Count per Day < 3.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/721f7c9e-34f3-4c41-992d-df35b56f95cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-95e1c7301e20b06d93d00a27ff0164ee.yaml b/nuclei-templates/cve-less/plugins/count-per-day-95e1c7301e20b06d93d00a27ff0164ee.yaml new file mode 100644 index 0000000000..0d2cbe19c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-95e1c7301e20b06d93d00a27ff0164ee.yaml @@ -0,0 +1,58 @@ +id: count-per-day-95e1c7301e20b06d93d00a27ff0164ee + +info: + name: > + Count per Day < 3.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2ea39fb-5adc-4666-95da-b25024ca32d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-ba663052cd3e15a64b57c5574e6284ee.yaml b/nuclei-templates/cve-less/plugins/count-per-day-ba663052cd3e15a64b57c5574e6284ee.yaml new file mode 100644 index 0000000000..9d9b0282b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-ba663052cd3e15a64b57c5574e6284ee.yaml @@ -0,0 +1,58 @@ +id: count-per-day-ba663052cd3e15a64b57c5574e6284ee + +info: + name: > + Count Per Day <= 3.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6b3e014-fb08-41e9-a667-b70f96602134?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-ecd06ad3b241a40ab31e78d6ecc1667e.yaml b/nuclei-templates/cve-less/plugins/count-per-day-ecd06ad3b241a40ab31e78d6ecc1667e.yaml new file mode 100644 index 0000000000..e4ceccd759 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-ecd06ad3b241a40ab31e78d6ecc1667e.yaml @@ -0,0 +1,58 @@ +id: count-per-day-ecd06ad3b241a40ab31e78d6ecc1667e + +info: + name: > + Count per Day Plugin < 3.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9d4ac3d-08ec-4783-8ccd-d64ab07d5d7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/count-per-day-fe9a4afd9a7e82aa5eb0f999cd08a3fe.yaml b/nuclei-templates/cve-less/plugins/count-per-day-fe9a4afd9a7e82aa5eb0f999cd08a3fe.yaml new file mode 100644 index 0000000000..e0161782ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/count-per-day-fe9a4afd9a7e82aa5eb0f999cd08a3fe.yaml @@ -0,0 +1,58 @@ +id: count-per-day-fe9a4afd9a7e82aa5eb0f999cd08a3fe + +info: + name: > + Count Per Day <= 3.2.3 - Path Disclosure and Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7612b680-fb4a-4c5a-aa46-fb3473da78b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/count-per-day/" + google-query: inurl:"/wp-content/plugins/count-per-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,count-per-day,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/count-per-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "count-per-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-builder-1400c910950cfb3abe9cd7aa01e509c4.yaml b/nuclei-templates/cve-less/plugins/countdown-builder-1400c910950cfb3abe9cd7aa01e509c4.yaml new file mode 100644 index 0000000000..65d4798680 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-builder-1400c910950cfb3abe9cd7aa01e509c4.yaml @@ -0,0 +1,58 @@ +id: countdown-builder-1400c910950cfb3abe9cd7aa01e509c4 + +info: + name: > + Countdown & Clock <= 2.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/022e4506-fe49-469d-ae48-641f121fc53b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-builder/" + google-query: inurl:"/wp-content/plugins/countdown-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-builder-2e3506811e52ec17c7634c4366161915.yaml b/nuclei-templates/cve-less/plugins/countdown-builder-2e3506811e52ec17c7634c4366161915.yaml new file mode 100644 index 0000000000..c1d058d744 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-builder-2e3506811e52ec17c7634c4366161915.yaml @@ -0,0 +1,58 @@ +id: countdown-builder-2e3506811e52ec17c7634c4366161915 + +info: + name: > + Countdown, Coming Soon, Maintenance – Countdown & Clock <= 2.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fa62862-5b98-4864-9bf1-4e05deedeb9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-builder/" + google-query: inurl:"/wp-content/plugins/countdown-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-builder-8078b4f9949ef9f89bc0fb06a9571b7f.yaml b/nuclei-templates/cve-less/plugins/countdown-builder-8078b4f9949ef9f89bc0fb06a9571b7f.yaml new file mode 100644 index 0000000000..ff28775c31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-builder-8078b4f9949ef9f89bc0fb06a9571b7f.yaml @@ -0,0 +1,58 @@ +id: countdown-builder-8078b4f9949ef9f89bc0fb06a9571b7f + +info: + name: > + Countdown & Clock <= 2.3.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24ba8d30-843f-4178-9b10-3c3dc720205c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-builder/" + google-query: inurl:"/wp-content/plugins/countdown-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-builder-9fa44d8d4f03281cc0e3d7ac38bce0cf.yaml b/nuclei-templates/cve-less/plugins/countdown-builder-9fa44d8d4f03281cc0e3d7ac38bce0cf.yaml new file mode 100644 index 0000000000..7b5569f059 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-builder-9fa44d8d4f03281cc0e3d7ac38bce0cf.yaml @@ -0,0 +1,58 @@ +id: countdown-builder-9fa44d8d4f03281cc0e3d7ac38bce0cf + +info: + name: > + Countdown & Clock <= 2.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38191721-8d5d-4a13-8271-c7ca96c3f6b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-builder/" + google-query: inurl:"/wp-content/plugins/countdown-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-builder-a8426729df158cf9f48bc7ffef172f3b.yaml b/nuclei-templates/cve-less/plugins/countdown-builder-a8426729df158cf9f48bc7ffef172f3b.yaml new file mode 100644 index 0000000000..6aa057ee54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-builder-a8426729df158cf9f48bc7ffef172f3b.yaml @@ -0,0 +1,58 @@ +id: countdown-builder-a8426729df158cf9f48bc7ffef172f3b + +info: + name: > + Countdown & Clock <= 2.3.2 - Pro Features Lock Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca7f72bf-5271-42a2-99cb-3021f10ea5f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-builder/" + google-query: inurl:"/wp-content/plugins/countdown-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-builder-fc7104705e7470f1c2f9c7438b20c375.yaml b/nuclei-templates/cve-less/plugins/countdown-builder-fc7104705e7470f1c2f9c7438b20c375.yaml new file mode 100644 index 0000000000..6da39b0430 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-builder-fc7104705e7470f1c2f9c7438b20c375.yaml @@ -0,0 +1,58 @@ +id: countdown-builder-fc7104705e7470f1c2f9c7438b20c375 + +info: + name: > + Countdown, Coming Soon, Maintenance – Countdown & Clock <= 2.3.9.5 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfec9303-bdc5-4ba7-90dd-0c7559459d23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-builder/" + google-query: inurl:"/wp-content/plugins/countdown-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/countdown-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..9c8b30bb41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: countdown-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-for-the-events-calendar/" + google-query: inurl:"/wp-content/plugins/countdown-for-the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-for-the-events-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-for-the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-for-the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-timer-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/countdown-timer-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..132dd09059 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-timer-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: countdown-timer-ultimate-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-timer-ultimate/" + google-query: inurl:"/wp-content/plugins/countdown-timer-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-timer-ultimate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-timer-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-timer-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-wpdevart-extended-a267ad47aaacbda283b13d30d0de08e1.yaml b/nuclei-templates/cve-less/plugins/countdown-wpdevart-extended-a267ad47aaacbda283b13d30d0de08e1.yaml new file mode 100644 index 0000000000..a733e2c969 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-wpdevart-extended-a267ad47aaacbda283b13d30d0de08e1.yaml @@ -0,0 +1,58 @@ +id: countdown-wpdevart-extended-a267ad47aaacbda283b13d30d0de08e1 + +info: + name: > + Countdown and CountUp, WooCommerce Sales Timers <= 1.5.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbf9a765-3718-4957-aa18-562654824fbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-wpdevart-extended/" + google-query: inurl:"/wp-content/plugins/countdown-wpdevart-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-wpdevart-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-wpdevart-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-wpdevart-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/countdown-wpdevart-extended-c8561a6d177892f154af9b7c10500c01.yaml b/nuclei-templates/cve-less/plugins/countdown-wpdevart-extended-c8561a6d177892f154af9b7c10500c01.yaml new file mode 100644 index 0000000000..ee540bf479 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/countdown-wpdevart-extended-c8561a6d177892f154af9b7c10500c01.yaml @@ -0,0 +1,58 @@ +id: countdown-wpdevart-extended-c8561a6d177892f154af9b7c10500c01 + +info: + name: > + Countdown and CountUp, WooCommerce Sales Timer <= 1.8.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1ec113c-d11f-4b0b-8d4a-46d37687b3b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/countdown-wpdevart-extended/" + google-query: inurl:"/wp-content/plugins/countdown-wpdevart-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,countdown-wpdevart-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/countdown-wpdevart-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "countdown-wpdevart-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/counter-box-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/counter-box-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..21cf012657 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/counter-box-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: counter-box-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/counter-box/" + google-query: inurl:"/wp-content/plugins/counter-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,counter-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/counter-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "counter-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/counter-box-ac3838985ebca1d5500d58f039c66d50.yaml b/nuclei-templates/cve-less/plugins/counter-box-ac3838985ebca1d5500d58f039c66d50.yaml new file mode 100644 index 0000000000..ebf81bf136 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/counter-box-ac3838985ebca1d5500d58f039c66d50.yaml @@ -0,0 +1,58 @@ +id: counter-box-ac3838985ebca1d5500d58f039c66d50 + +info: + name: > + Counter Box – WordPress plugin for countdown, timer, counter <= 1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c154cc4b-f0b9-4c3e-8e74-9bfa6de62d2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/counter-box/" + google-query: inurl:"/wp-content/plugins/counter-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,counter-box,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/counter-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "counter-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/counter-box-cb0d923b3f440d22cb21cc4f45b630a7.yaml b/nuclei-templates/cve-less/plugins/counter-box-cb0d923b3f440d22cb21cc4f45b630a7.yaml new file mode 100644 index 0000000000..6414f628e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/counter-box-cb0d923b3f440d22cb21cc4f45b630a7.yaml @@ -0,0 +1,58 @@ +id: counter-box-cb0d923b3f440d22cb21cc4f45b630a7 + +info: + name: > + Counter Box – WordPress plugin for countdown, timer, counter <= 1.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9f71433-7b86-46c7-b91e-bc59679f0351?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/counter-box/" + google-query: inurl:"/wp-content/plugins/counter-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,counter-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/counter-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "counter-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/counter-box-d41f2371740382f5fe12f9b2729e260d.yaml b/nuclei-templates/cve-less/plugins/counter-box-d41f2371740382f5fe12f9b2729e260d.yaml new file mode 100644 index 0000000000..86b48629ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/counter-box-d41f2371740382f5fe12f9b2729e260d.yaml @@ -0,0 +1,58 @@ +id: counter-box-d41f2371740382f5fe12f9b2729e260d + +info: + name: > + Counter Box <= 1.1.1 - Authenticated Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbd76c3d-028a-48e3-9a80-1a8da934d097?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/counter-box/" + google-query: inurl:"/wp-content/plugins/counter-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,counter-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/counter-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "counter-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/counter-box-e218b5d377826292a46ae91919228725.yaml b/nuclei-templates/cve-less/plugins/counter-box-e218b5d377826292a46ae91919228725.yaml new file mode 100644 index 0000000000..fc906d5441 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/counter-box-e218b5d377826292a46ae91919228725.yaml @@ -0,0 +1,58 @@ +id: counter-box-e218b5d377826292a46ae91919228725 + +info: + name: > + Counter Box <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/332f8a7e-2342-4b77-a7d6-17137e432b5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/counter-box/" + google-query: inurl:"/wp-content/plugins/counter-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,counter-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/counter-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "counter-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/counter-yandex-metrica-ffdf4101e49b7fe440cdcd6bd244561e.yaml b/nuclei-templates/cve-less/plugins/counter-yandex-metrica-ffdf4101e49b7fe440cdcd6bd244561e.yaml new file mode 100644 index 0000000000..06e71b1651 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/counter-yandex-metrica-ffdf4101e49b7fe440cdcd6bd244561e.yaml @@ -0,0 +1,58 @@ +id: counter-yandex-metrica-ffdf4101e49b7fe440cdcd6bd244561e + +info: + name: > + Yandex Metrica Counter <= 1.4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/173661aa-6895-41d6-8869-6abfd2eadf31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/counter-yandex-metrica/" + google-query: inurl:"/wp-content/plugins/counter-yandex-metrica/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,counter-yandex-metrica,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/counter-yandex-metrica/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "counter-yandex-metrica" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/country-state-city-auto-dropdown-b77c5c4f0c4cc702e5668e3bdfcce6f7.yaml b/nuclei-templates/cve-less/plugins/country-state-city-auto-dropdown-b77c5c4f0c4cc702e5668e3bdfcce6f7.yaml new file mode 100644 index 0000000000..bff04cae7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/country-state-city-auto-dropdown-b77c5c4f0c4cc702e5668e3bdfcce6f7.yaml @@ -0,0 +1,58 @@ +id: country-state-city-auto-dropdown-b77c5c4f0c4cc702e5668e3bdfcce6f7 + +info: + name: > + Country State City Dropdown CF7 <= 2.7.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08ccd4a3-ea1f-49b3-b4ce-ab1e247e1f76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/country-state-city-auto-dropdown/" + google-query: inurl:"/wp-content/plugins/country-state-city-auto-dropdown/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,country-state-city-auto-dropdown,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/country-state-city-auto-dropdown/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "country-state-city-auto-dropdown" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coupon-creator-143ae01b8a1b2078f71457c5b9d33fd9.yaml b/nuclei-templates/cve-less/plugins/coupon-creator-143ae01b8a1b2078f71457c5b9d33fd9.yaml new file mode 100644 index 0000000000..3193d2c0b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coupon-creator-143ae01b8a1b2078f71457c5b9d33fd9.yaml @@ -0,0 +1,58 @@ +id: coupon-creator-143ae01b8a1b2078f71457c5b9d33fd9 + +info: + name: > + Coupon Creator <= 3.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab57f010-4fd2-40c2-950f-c03888521c8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coupon-creator/" + google-query: inurl:"/wp-content/plugins/coupon-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coupon-creator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coupon-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coupon-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coupon-referral-program-8e1c97786e963545019da486b6c3016e.yaml b/nuclei-templates/cve-less/plugins/coupon-referral-program-8e1c97786e963545019da486b6c3016e.yaml new file mode 100644 index 0000000000..3d117482d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coupon-referral-program-8e1c97786e963545019da486b6c3016e.yaml @@ -0,0 +1,58 @@ +id: coupon-referral-program-8e1c97786e963545019da486b6c3016e + +info: + name: > + Coupon Referral Program <= 1.7.2 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e556ca2-1b83-4589-bff8-64323eb594e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coupon-referral-program/" + google-query: inurl:"/wp-content/plugins/coupon-referral-program/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coupon-referral-program,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coupon-referral-program/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coupon-referral-program" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coupon-referral-program-eb26b5bf441be9e4d97a8d78bbf90a65.yaml b/nuclei-templates/cve-less/plugins/coupon-referral-program-eb26b5bf441be9e4d97a8d78bbf90a65.yaml new file mode 100644 index 0000000000..190f36ada1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coupon-referral-program-eb26b5bf441be9e4d97a8d78bbf90a65.yaml @@ -0,0 +1,58 @@ +id: coupon-referral-program-eb26b5bf441be9e4d97a8d78bbf90a65 + +info: + name: > + Coupon Referral Program <= 1.7.2 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6015e204-1e07-4c75-ad22-969045934468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coupon-referral-program/" + google-query: inurl:"/wp-content/plugins/coupon-referral-program/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coupon-referral-program,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coupon-referral-program/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coupon-referral-program" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coupon-reveal-button-058f94a7273615ab6b78bfcaa4aea16c.yaml b/nuclei-templates/cve-less/plugins/coupon-reveal-button-058f94a7273615ab6b78bfcaa4aea16c.yaml new file mode 100644 index 0000000000..ba822dbb90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coupon-reveal-button-058f94a7273615ab6b78bfcaa4aea16c.yaml @@ -0,0 +1,58 @@ +id: coupon-reveal-button-058f94a7273615ab6b78bfcaa4aea16c + +info: + name: > + Coupon & Discount Code Reveal Button <= 1.2.5 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a108f8bf-a77c-4f29-a63b-c535a054dcaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coupon-reveal-button/" + google-query: inurl:"/wp-content/plugins/coupon-reveal-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coupon-reveal-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coupon-reveal-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coupon-reveal-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coupon-tab-for-directorypress-pp-4496d2c0aaf13ede3ac3df8bc6db376f.yaml b/nuclei-templates/cve-less/plugins/coupon-tab-for-directorypress-pp-4496d2c0aaf13ede3ac3df8bc6db376f.yaml new file mode 100644 index 0000000000..f572125628 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coupon-tab-for-directorypress-pp-4496d2c0aaf13ede3ac3df8bc6db376f.yaml @@ -0,0 +1,58 @@ +id: coupon-tab-for-directorypress-pp-4496d2c0aaf13ede3ac3df8bc6db376f + +info: + name: > + Coupon Tab for DirectoryPress (pp-coupon-tab) <= 0.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22b16275-f46b-4338-b95f-1939ec85316d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coupon-tab-for-directorypress-pp/" + google-query: inurl:"/wp-content/plugins/coupon-tab-for-directorypress-pp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coupon-tab-for-directorypress-pp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coupon-tab-for-directorypress-pp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coupon-tab-for-directorypress-pp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/coupon-zen-110c4d87a801a711ff37411fb7b2a2b0.yaml b/nuclei-templates/cve-less/plugins/coupon-zen-110c4d87a801a711ff37411fb7b2a2b0.yaml new file mode 100644 index 0000000000..5b30a9e025 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/coupon-zen-110c4d87a801a711ff37411fb7b2a2b0.yaml @@ -0,0 +1,58 @@ +id: coupon-zen-110c4d87a801a711ff37411fb7b2a2b0 + +info: + name: > + Coupon Zen <= 1.0.5 - Cross-Site Request Forgery to Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53d39276-5d92-4a5b-848d-33aefb18a970?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/coupon-zen/" + google-query: inurl:"/wp-content/plugins/coupon-zen/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,coupon-zen,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/coupon-zen/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coupon-zen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/court-reservation-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/court-reservation-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0b5dde4b82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/court-reservation-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: court-reservation-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/court-reservation/" + google-query: inurl:"/wp-content/plugins/court-reservation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,court-reservation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/court-reservation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "court-reservation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-blocks-b6fdd6c618695aebb9014f9dd705ea55.yaml b/nuclei-templates/cve-less/plugins/cp-blocks-b6fdd6c618695aebb9014f9dd705ea55.yaml new file mode 100644 index 0000000000..5a995d0a1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-blocks-b6fdd6c618695aebb9014f9dd705ea55.yaml @@ -0,0 +1,58 @@ +id: cp-blocks-b6fdd6c618695aebb9014f9dd705ea55 + +info: + name: > + CP Blocks <= 1.0.14 - Authenticated Stored Cross-Site Scripting via License ID settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a69fa8-c2a8-4d63-8db4-823122632b3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-blocks/" + google-query: inurl:"/wp-content/plugins/cp-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-blocks-b8cbfee14c6231d74725cad73dbf5ac2.yaml b/nuclei-templates/cve-less/plugins/cp-blocks-b8cbfee14c6231d74725cad73dbf5ac2.yaml new file mode 100644 index 0000000000..d842272a04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-blocks-b8cbfee14c6231d74725cad73dbf5ac2.yaml @@ -0,0 +1,58 @@ +id: cp-blocks-b8cbfee14c6231d74725cad73dbf5ac2 + +info: + name: > + CP Blocks <= 1.0.20 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35cd1788-1756-4d03-8f6f-e5e4153e3f4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-blocks/" + google-query: inurl:"/wp-content/plugins/cp-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-33bb20c48315e8c455839c78ef66e1b1.yaml b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-33bb20c48315e8c455839c78ef66e1b1.yaml new file mode 100644 index 0000000000..bc576bc540 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-33bb20c48315e8c455839c78ef66e1b1.yaml @@ -0,0 +1,58 @@ +id: cp-contact-form-with-paypal-33bb20c48315e8c455839c78ef66e1b1 + +info: + name: > + CP Contact Form with PayPal < 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5137244c-584f-4b48-869a-b6669c84eaac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" + google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-contact-form-with-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-contact-form-with-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-4612690a2b5b9e2adc467251d2200410.yaml b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-4612690a2b5b9e2adc467251d2200410.yaml new file mode 100644 index 0000000000..3eeecbcc3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-4612690a2b5b9e2adc467251d2200410.yaml @@ -0,0 +1,58 @@ +id: cp-contact-form-with-paypal-4612690a2b5b9e2adc467251d2200410 + +info: + name: > + CP Contact Form with PayPal < 1.1.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bacd7942-99f6-46e0-85ef-863ab1bdfa6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" + google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-contact-form-with-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-contact-form-with-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-beee0c1304e0da531df84f8029d7259b.yaml b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-beee0c1304e0da531df84f8029d7259b.yaml new file mode 100644 index 0000000000..8354c6f336 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-beee0c1304e0da531df84f8029d7259b.yaml @@ -0,0 +1,58 @@ +id: cp-contact-form-with-paypal-beee0c1304e0da531df84f8029d7259b + +info: + name: > + CP Contact Form with PayPal <= 1.3.01 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9c20584-d791-4788-8dc3-77069b92601f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" + google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-contact-form-with-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-contact-form-with-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-c94ec523ba103bad6a372ee7e463bd4f.yaml b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-c94ec523ba103bad6a372ee7e463bd4f.yaml new file mode 100644 index 0000000000..e8c14e1398 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-c94ec523ba103bad6a372ee7e463bd4f.yaml @@ -0,0 +1,58 @@ +id: cp-contact-form-with-paypal-c94ec523ba103bad6a372ee7e463bd4f + +info: + name: > + CP Contact Form with PayPal <= 1.3.01 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f26fcef3-6d94-46f6-9832-bdb03b6cb867?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" + google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-contact-form-with-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-contact-form-with-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-e62ea330281841ac90814f51a2e6e358.yaml b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-e62ea330281841ac90814f51a2e6e358.yaml new file mode 100644 index 0000000000..726bf50095 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-contact-form-with-paypal-e62ea330281841ac90814f51a2e6e358.yaml @@ -0,0 +1,58 @@ +id: cp-contact-form-with-paypal-e62ea330281841ac90814f51a2e6e358 + +info: + name: > + CP Contact Form with Paypal <= 1.3.34 - Authenticated Feedback Submission + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ba56d68-e104-4a79-b5b4-627f9617043b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" + google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-contact-form-with-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-contact-form-with-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-easy-form-builder-7cb4dee16a7431d0aa1859c958e33f53.yaml b/nuclei-templates/cve-less/plugins/cp-easy-form-builder-7cb4dee16a7431d0aa1859c958e33f53.yaml new file mode 100644 index 0000000000..71f2cfc6d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-easy-form-builder-7cb4dee16a7431d0aa1859c958e33f53.yaml @@ -0,0 +1,58 @@ +id: cp-easy-form-builder-7cb4dee16a7431d0aa1859c958e33f53 + +info: + name: > + Form Builder CP <= 1.2.31 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15e86f80-b18c-42f7-bc41-6a3112cbb162?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-easy-form-builder/" + google-query: inurl:"/wp-content/plugins/cp-easy-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-easy-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-easy-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-easy-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-image-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/cp-image-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..e91c87f7fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-image-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: cp-image-gallery-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-image-gallery/" + google-query: inurl:"/wp-content/plugins/cp-image-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-image-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-image-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-image-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-image-store-49c455ef861d32e49a005dd8ccd33e8b.yaml b/nuclei-templates/cve-less/plugins/cp-image-store-49c455ef861d32e49a005dd8ccd33e8b.yaml new file mode 100644 index 0000000000..b97e2c4b08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-image-store-49c455ef861d32e49a005dd8ccd33e8b.yaml @@ -0,0 +1,58 @@ +id: cp-image-store-49c455ef861d32e49a005dd8ccd33e8b + +info: + name: > + CP Image Store with Slideshow <= 1.0.67 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ded1b46e-b4b0-4f0d-929e-e1caf93576a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-image-store/" + google-query: inurl:"/wp-content/plugins/cp-image-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-image-store,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-image-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-image-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-image-store-536b5e2cfc2a08abc865e016e5e97cd1.yaml b/nuclei-templates/cve-less/plugins/cp-image-store-536b5e2cfc2a08abc865e016e5e97cd1.yaml new file mode 100644 index 0000000000..711ec389f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-image-store-536b5e2cfc2a08abc865e016e5e97cd1.yaml @@ -0,0 +1,58 @@ +id: cp-image-store-536b5e2cfc2a08abc865e016e5e97cd1 + +info: + name: > + CP Image Store with Slideshow < 1.0.7 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d49bd587-26fc-48fb-86aa-a043a5938d43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-image-store/" + google-query: inurl:"/wp-content/plugins/cp-image-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-image-store,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-image-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-image-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-image-store-9bd2beaa8992d85480d64ba226ec3b74.yaml b/nuclei-templates/cve-less/plugins/cp-image-store-9bd2beaa8992d85480d64ba226ec3b74.yaml new file mode 100644 index 0000000000..bf066d19d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-image-store-9bd2beaa8992d85480d64ba226ec3b74.yaml @@ -0,0 +1,58 @@ +id: cp-image-store-9bd2beaa8992d85480d64ba226ec3b74 + +info: + name: > + CP Image Store with Slideshow < 1.0.6 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24c78d62-c2d0-4699-bd80-e8deef301eb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-image-store/" + google-query: inurl:"/wp-content/plugins/cp-image-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-image-store,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-image-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-image-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-00da8a794f6f0b78648d305ed7e6dd04.yaml b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-00da8a794f6f0b78648d305ed7e6dd04.yaml new file mode 100644 index 0000000000..abd99e24f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-00da8a794f6f0b78648d305ed7e6dd04.yaml @@ -0,0 +1,58 @@ +id: cp-multi-view-calendar-00da8a794f6f0b78648d305ed7e6dd04 + +info: + name: > + Calendar Event Multi View <= 1.3.99 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66351875-42d7-45f4-a47f-22e3e26b2770?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-multi-view-calendar/" + google-query: inurl:"/wp-content/plugins/cp-multi-view-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-multi-view-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-multi-view-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-multi-view-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-0bfff3a27e6168b67b0fbc2473230506.yaml b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-0bfff3a27e6168b67b0fbc2473230506.yaml new file mode 100644 index 0000000000..f8533a568c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-0bfff3a27e6168b67b0fbc2473230506.yaml @@ -0,0 +1,58 @@ +id: cp-multi-view-calendar-0bfff3a27e6168b67b0fbc2473230506 + +info: + name: > + Calendar Event Multi View < 1.0.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7085e16a-cdf3-4467-b957-23ab372416e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-multi-view-calendar/" + google-query: inurl:"/wp-content/plugins/cp-multi-view-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-multi-view-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-multi-view-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-multi-view-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-184f300745326a1b6a8a5b5650121584.yaml b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-184f300745326a1b6a8a5b5650121584.yaml new file mode 100644 index 0000000000..843b7d413a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-184f300745326a1b6a8a5b5650121584.yaml @@ -0,0 +1,58 @@ +id: cp-multi-view-calendar-184f300745326a1b6a8a5b5650121584 + +info: + name: > + Calendar Event Multi View <= 1.4.06 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/488bafe4-746a-4531-95ac-30d17ace2239?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-multi-view-calendar/" + google-query: inurl:"/wp-content/plugins/cp-multi-view-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-multi-view-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-multi-view-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-multi-view-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-43693b5261d7e0528a3c7e646e9f1d6c.yaml b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-43693b5261d7e0528a3c7e646e9f1d6c.yaml new file mode 100644 index 0000000000..7187a52aac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-43693b5261d7e0528a3c7e646e9f1d6c.yaml @@ -0,0 +1,58 @@ +id: cp-multi-view-calendar-43693b5261d7e0528a3c7e646e9f1d6c + +info: + name: > + CP Multi View Event Calendar <= 1.4.13 - Insufficient Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13d0eb8a-5b63-460e-b4ba-a3ed80c84fc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-multi-view-calendar/" + google-query: inurl:"/wp-content/plugins/cp-multi-view-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-multi-view-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-multi-view-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-multi-view-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-7f3bbc96f4be604cf6114ca81b08ca3f.yaml b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-7f3bbc96f4be604cf6114ca81b08ca3f.yaml new file mode 100644 index 0000000000..2836149d62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-multi-view-calendar-7f3bbc96f4be604cf6114ca81b08ca3f.yaml @@ -0,0 +1,58 @@ +id: cp-multi-view-calendar-7f3bbc96f4be604cf6114ca81b08ca3f + +info: + name: > + CP Multi View Event Calendar <= 1.4.10 - Missing Authentication leading to Authenticated (Subscriber+) Private Form Submission + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49ebff14-ce09-4607-8246-50ae028957f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-multi-view-calendar/" + google-query: inurl:"/wp-content/plugins/cp-multi-view-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-multi-view-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-multi-view-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-multi-view-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-polls-49a01bc79b6fdfb5a76a16441b827dc7.yaml b/nuclei-templates/cve-less/plugins/cp-polls-49a01bc79b6fdfb5a76a16441b827dc7.yaml new file mode 100644 index 0000000000..21ef6dc203 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-polls-49a01bc79b6fdfb5a76a16441b827dc7.yaml @@ -0,0 +1,58 @@ +id: cp-polls-49a01bc79b6fdfb5a76a16441b827dc7 + +info: + name: > + Polls CP <= 1.0.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed1f3d5a-9551-421e-8f38-416976a704ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-polls/" + google-query: inurl:"/wp-content/plugins/cp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-polls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-polls-51f0935847f259142e562e47f27b4145.yaml b/nuclei-templates/cve-less/plugins/cp-polls-51f0935847f259142e562e47f27b4145.yaml new file mode 100644 index 0000000000..3bd0c7318e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-polls-51f0935847f259142e562e47f27b4145.yaml @@ -0,0 +1,58 @@ +id: cp-polls-51f0935847f259142e562e47f27b4145 + +info: + name: > + CP Polls <= 1.0.71 - Unauthenticated Poll Limit Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c80de83-3996-4048-8aa3-3611b002fc01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-polls/" + google-query: inurl:"/wp-content/plugins/cp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-polls,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-polls-87b936573487d2a82b44f72e3ce646b8.yaml b/nuclei-templates/cve-less/plugins/cp-polls-87b936573487d2a82b44f72e3ce646b8.yaml new file mode 100644 index 0000000000..0f3ef6b6b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-polls-87b936573487d2a82b44f72e3ce646b8.yaml @@ -0,0 +1,58 @@ +id: cp-polls-87b936573487d2a82b44f72e3ce646b8 + +info: + name: > + Polls CP < 1.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e3e73b4-591d-4520-afd5-44e2bb76e4f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-polls/" + google-query: inurl:"/wp-content/plugins/cp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-polls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-polls-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml b/nuclei-templates/cve-less/plugins/cp-polls-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml new file mode 100644 index 0000000000..aba9c1196a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-polls-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml @@ -0,0 +1,58 @@ +id: cp-polls-ab3c3e9805ecb63c9f5865d7cc04e6fb + +info: + name: > + Polls CP < 1.0.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3137db18-6032-4ba5-9790-c1a7a95072b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-polls/" + google-query: inurl:"/wp-content/plugins/cp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-polls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-polls-e2d507e5368356b0023e6347145e20b6.yaml b/nuclei-templates/cve-less/plugins/cp-polls-e2d507e5368356b0023e6347145e20b6.yaml new file mode 100644 index 0000000000..289eb30c8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-polls-e2d507e5368356b0023e6347145e20b6.yaml @@ -0,0 +1,58 @@ +id: cp-polls-e2d507e5368356b0023e6347145e20b6 + +info: + name: > + CP Polls <= 1.0.71 - Unauthenticated Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f28d7659-9244-4da8-97e9-4539d7d874f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-polls/" + google-query: inurl:"/wp-content/plugins/cp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-polls,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-reservation-calendar-264c8b14fe403c6cf4002aa9134524ee.yaml b/nuclei-templates/cve-less/plugins/cp-reservation-calendar-264c8b14fe403c6cf4002aa9134524ee.yaml new file mode 100644 index 0000000000..0861587722 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-reservation-calendar-264c8b14fe403c6cf4002aa9134524ee.yaml @@ -0,0 +1,58 @@ +id: cp-reservation-calendar-264c8b14fe403c6cf4002aa9134524ee + +info: + name: > + CP Reservation Calendar < 1.1.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f93ecf7-ba49-47f6-abe3-33e3bc6e7054?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-reservation-calendar/" + google-query: inurl:"/wp-content/plugins/cp-reservation-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-reservation-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-reservation-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-reservation-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-simple-newsletter-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cp-simple-newsletter-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3a9857d036 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-simple-newsletter-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cp-simple-newsletter-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-simple-newsletter/" + google-query: inurl:"/wp-content/plugins/cp-simple-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-simple-newsletter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-simple-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-simple-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cp-simple-newsletter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/cp-simple-newsletter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..bf05a9edd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cp-simple-newsletter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: cp-simple-newsletter-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cp-simple-newsletter/" + google-query: inurl:"/wp-content/plugins/cp-simple-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cp-simple-newsletter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cp-simple-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cp-simple-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpl-8f2565646e20d8caed1d049227635516.yaml b/nuclei-templates/cve-less/plugins/cpl-8f2565646e20d8caed1d049227635516.yaml new file mode 100644 index 0000000000..4bbc7313e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpl-8f2565646e20d8caed1d049227635516.yaml @@ -0,0 +1,58 @@ +id: cpl-8f2565646e20d8caed1d049227635516 + +info: + name: > + Copperleaf Photolog <= 0.16- SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cccbdb49-d423-4955-a078-ae0acdb79804?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpl/" + google-query: inurl:"/wp-content/plugins/cpl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpl,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpo-companion-1cb9694a410b975eefa3459fd9bd670b.yaml b/nuclei-templates/cve-less/plugins/cpo-companion-1cb9694a410b975eefa3459fd9bd670b.yaml new file mode 100644 index 0000000000..2dd6b408a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpo-companion-1cb9694a410b975eefa3459fd9bd670b.yaml @@ -0,0 +1,58 @@ +id: cpo-companion-1cb9694a410b975eefa3459fd9bd670b + +info: + name: > + CPO Companion <= 1.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e5a4ebe-5d01-4d5e-b62b-a264b61fc6ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpo-companion/" + google-query: inurl:"/wp-content/plugins/cpo-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpo-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpo-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpo-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpo-companion-4e988801588842dadfebdadb774a426e.yaml b/nuclei-templates/cve-less/plugins/cpo-companion-4e988801588842dadfebdadb774a426e.yaml new file mode 100644 index 0000000000..6a764614ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpo-companion-4e988801588842dadfebdadb774a426e.yaml @@ -0,0 +1,58 @@ +id: cpo-companion-4e988801588842dadfebdadb774a426e + +info: + name: > + CPO Companion <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/920dbe31-ccbd-4ad9-9c5f-f7389c1b4318?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpo-companion/" + google-query: inurl:"/wp-content/plugins/cpo-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpo-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpo-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpo-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpo-companion-a426d8604178ea06fd441814d816d538.yaml b/nuclei-templates/cve-less/plugins/cpo-companion-a426d8604178ea06fd441814d816d538.yaml new file mode 100644 index 0000000000..b7f7a523d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpo-companion-a426d8604178ea06fd441814d816d538.yaml @@ -0,0 +1,58 @@ +id: cpo-companion-a426d8604178ea06fd441814d816d538 + +info: + name: > + CPO Companion <= 1.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9195ac7e-2995-44d0-b5c6-8ffb47395f24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpo-companion/" + google-query: inurl:"/wp-content/plugins/cpo-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpo-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpo-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpo-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpo-content-types-20277bf2aad5677f3f9bd4eac5f630c9.yaml b/nuclei-templates/cve-less/plugins/cpo-content-types-20277bf2aad5677f3f9bd4eac5f630c9.yaml new file mode 100644 index 0000000000..a556ea00f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpo-content-types-20277bf2aad5677f3f9bd4eac5f630c9.yaml @@ -0,0 +1,58 @@ +id: cpo-content-types-20277bf2aad5677f3f9bd4eac5f630c9 + +info: + name: > + CPO Content Types <= 1.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d0b1e05-0e28-4cf5-a278-ea91b6c9d253?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpo-content-types/" + google-query: inurl:"/wp-content/plugins/cpo-content-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpo-content-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpo-content-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpo-content-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpo-shortcodes-95b40623fcd88a0f55eead954c03a159.yaml b/nuclei-templates/cve-less/plugins/cpo-shortcodes-95b40623fcd88a0f55eead954c03a159.yaml new file mode 100644 index 0000000000..79aa16fa1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpo-shortcodes-95b40623fcd88a0f55eead954c03a159.yaml @@ -0,0 +1,58 @@ +id: cpo-shortcodes-95b40623fcd88a0f55eead954c03a159 + +info: + name: > + CPO Shortcodes <= 1.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8ba38c3-51d2-43a7-89ff-c72a8edc946b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpo-shortcodes/" + google-query: inurl:"/wp-content/plugins/cpo-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpo-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpo-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpo-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpo-shortcodes-f0281688d74f818cfad7334eba1cc561.yaml b/nuclei-templates/cve-less/plugins/cpo-shortcodes-f0281688d74f818cfad7334eba1cc561.yaml new file mode 100644 index 0000000000..549bebe0be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpo-shortcodes-f0281688d74f818cfad7334eba1cc561.yaml @@ -0,0 +1,58 @@ +id: cpo-shortcodes-f0281688d74f818cfad7334eba1cc561 + +info: + name: > + CPO Shortcodes <= 1.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/978159d3-39b2-49b7-a59a-2da72f1792fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpo-shortcodes/" + google-query: inurl:"/wp-content/plugins/cpo-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpo-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpo-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpo-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpt-bootstrap-carousel-690a69806e87114ee81f4affa15549cd.yaml b/nuclei-templates/cve-less/plugins/cpt-bootstrap-carousel-690a69806e87114ee81f4affa15549cd.yaml new file mode 100644 index 0000000000..cf057a9080 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpt-bootstrap-carousel-690a69806e87114ee81f4affa15549cd.yaml @@ -0,0 +1,58 @@ +id: cpt-bootstrap-carousel-690a69806e87114ee81f4affa15549cd + +info: + name: > + CPT Bootstrap Carousel <= 1.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a78321b7-b62b-40ab-a15d-037ebd905d8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpt-bootstrap-carousel/" + google-query: inurl:"/wp-content/plugins/cpt-bootstrap-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpt-bootstrap-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpt-bootstrap-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpt-bootstrap-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpt-bootstrap-carousel-e983f7dc1644cbc367524173b0bfd556.yaml b/nuclei-templates/cve-less/plugins/cpt-bootstrap-carousel-e983f7dc1644cbc367524173b0bfd556.yaml new file mode 100644 index 0000000000..b1888c6425 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpt-bootstrap-carousel-e983f7dc1644cbc367524173b0bfd556.yaml @@ -0,0 +1,58 @@ +id: cpt-bootstrap-carousel-e983f7dc1644cbc367524173b0bfd556 + +info: + name: > + CPT Bootstrap Carousel <= 1.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44370988-3c55-490e-b428-da9cb6df1a4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpt-bootstrap-carousel/" + google-query: inurl:"/wp-content/plugins/cpt-bootstrap-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpt-bootstrap-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpt-bootstrap-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpt-bootstrap-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpt-shortcode-62cbd308ef66719516de2026de43669c.yaml b/nuclei-templates/cve-less/plugins/cpt-shortcode-62cbd308ef66719516de2026de43669c.yaml new file mode 100644 index 0000000000..b6e95e072f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpt-shortcode-62cbd308ef66719516de2026de43669c.yaml @@ -0,0 +1,58 @@ +id: cpt-shortcode-62cbd308ef66719516de2026de43669c + +info: + name: > + CPT Shortcode Generator <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4782d4ea-3d79-40d2-850d-1a7583267616?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpt-shortcode/" + google-query: inurl:"/wp-content/plugins/cpt-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpt-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpt-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpt-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpt-shortcode-f4d676108d638d4ae50c1c8a6da03c12.yaml b/nuclei-templates/cve-less/plugins/cpt-shortcode-f4d676108d638d4ae50c1c8a6da03c12.yaml new file mode 100644 index 0000000000..d84fac388e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpt-shortcode-f4d676108d638d4ae50c1c8a6da03c12.yaml @@ -0,0 +1,58 @@ +id: cpt-shortcode-f4d676108d638d4ae50c1c8a6da03c12 + +info: + name: > + CPT Shortcode Generator <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6125a8e6-4c87-4136-ba39-c3a089948733?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpt-shortcode/" + google-query: inurl:"/wp-content/plugins/cpt-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpt-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpt-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpt-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cpt-speakers-0fbf5aeb9219f7fac5b857b809c640a1.yaml b/nuclei-templates/cve-less/plugins/cpt-speakers-0fbf5aeb9219f7fac5b857b809c640a1.yaml new file mode 100644 index 0000000000..065e28f0c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cpt-speakers-0fbf5aeb9219f7fac5b857b809c640a1.yaml @@ -0,0 +1,58 @@ +id: cpt-speakers-0fbf5aeb9219f7fac5b857b809c640a1 + +info: + name: > + CPT – Speakers <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae7c41fd-6ad6-49da-a213-686157e029d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cpt-speakers/" + google-query: inurl:"/wp-content/plugins/cpt-speakers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cpt-speakers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cpt-speakers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cpt-speakers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crafty-social-buttons-10ee5b6870d72574cd2ceacdf76db39e.yaml b/nuclei-templates/cve-less/plugins/crafty-social-buttons-10ee5b6870d72574cd2ceacdf76db39e.yaml new file mode 100644 index 0000000000..424b05534e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crafty-social-buttons-10ee5b6870d72574cd2ceacdf76db39e.yaml @@ -0,0 +1,58 @@ +id: crafty-social-buttons-10ee5b6870d72574cd2ceacdf76db39e + +info: + name: > + Crafty Social Buttons < 1.5.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07d1c715-3620-4b82-a883-57b24c8cd031?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crafty-social-buttons/" + google-query: inurl:"/wp-content/plugins/crafty-social-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crafty-social-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crafty-social-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crafty-social-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/craw-data-ba3212d4cf255eee79a1e340ae3eb317.yaml b/nuclei-templates/cve-less/plugins/craw-data-ba3212d4cf255eee79a1e340ae3eb317.yaml new file mode 100644 index 0000000000..858a892495 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/craw-data-ba3212d4cf255eee79a1e340ae3eb317.yaml @@ -0,0 +1,58 @@ +id: craw-data-ba3212d4cf255eee79a1e340ae3eb317 + +info: + name: > + Craw Data <= 1.0.0 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8fe569a-62dd-4be5-915d-de589663658f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/craw-data/" + google-query: inurl:"/wp-content/plugins/craw-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,craw-data,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/craw-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "craw-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-3b77b21efbe327e0220e81411dd8c94e.yaml b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-3b77b21efbe327e0220e81411dd8c94e.yaml new file mode 100644 index 0000000000..81f12899dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-3b77b21efbe327e0220e81411dd8c94e.yaml @@ -0,0 +1,58 @@ +id: crayon-syntax-highlighter-3b77b21efbe327e0220e81411dd8c94e + +info: + name: > + Crayon Syntax Highlighter 2.0 - 2.6.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cd49c60-e845-4dbb-b6b1-bd59aa1bb3ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crayon-syntax-highlighter/" + google-query: inurl:"/wp-content/plugins/crayon-syntax-highlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crayon-syntax-highlighter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crayon-syntax-highlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crayon-syntax-highlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0', '<= 2.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-7a054d832bcd0e60bc0c72161b137fa9.yaml b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-7a054d832bcd0e60bc0c72161b137fa9.yaml new file mode 100644 index 0000000000..143c133cda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-7a054d832bcd0e60bc0c72161b137fa9.yaml @@ -0,0 +1,58 @@ +id: crayon-syntax-highlighter-7a054d832bcd0e60bc0c72161b137fa9 + +info: + name: > + Crayon Syntax Highlighter Plugin <= 1.13 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eff47e59-9a2c-424f-b138-47fcf554c06b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crayon-syntax-highlighter/" + google-query: inurl:"/wp-content/plugins/crayon-syntax-highlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crayon-syntax-highlighter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crayon-syntax-highlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crayon-syntax-highlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-8031f45dad82be856d692bf4a86bc7d0.yaml b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-8031f45dad82be856d692bf4a86bc7d0.yaml new file mode 100644 index 0000000000..ca955cfb3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-8031f45dad82be856d692bf4a86bc7d0.yaml @@ -0,0 +1,58 @@ +id: crayon-syntax-highlighter-8031f45dad82be856d692bf4a86bc7d0 + +info: + name: > + Crayon Syntax Highlighter <= 2.6.10 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6de7a25-3079-4023-9faa-7a63952afe25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crayon-syntax-highlighter/" + google-query: inurl:"/wp-content/plugins/crayon-syntax-highlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crayon-syntax-highlighter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crayon-syntax-highlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crayon-syntax-highlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-a24d4eae978465f1c7539ec2afb5d89a.yaml b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-a24d4eae978465f1c7539ec2afb5d89a.yaml new file mode 100644 index 0000000000..2912fbe6ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-a24d4eae978465f1c7539ec2afb5d89a.yaml @@ -0,0 +1,58 @@ +id: crayon-syntax-highlighter-a24d4eae978465f1c7539ec2afb5d89a + +info: + name: > + Crayon Syntax Highlighter < 2.8.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd4336a9-35db-4994-9e2a-5ed9b51a74ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crayon-syntax-highlighter/" + google-query: inurl:"/wp-content/plugins/crayon-syntax-highlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crayon-syntax-highlighter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crayon-syntax-highlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crayon-syntax-highlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-b80148cb4f7c1ba75ee55b0181d810f7.yaml b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-b80148cb4f7c1ba75ee55b0181d810f7.yaml new file mode 100644 index 0000000000..e068bb5e1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-b80148cb4f7c1ba75ee55b0181d810f7.yaml @@ -0,0 +1,58 @@ +id: crayon-syntax-highlighter-b80148cb4f7c1ba75ee55b0181d810f7 + +info: + name: > + Crayon Syntax Highlighter <= 2.8.4 - Authenticated (Contributor+) Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/527f75f1-6361-4e16-8ae4-d38ca4589811?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crayon-syntax-highlighter/" + google-query: inurl:"/wp-content/plugins/crayon-syntax-highlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crayon-syntax-highlighter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crayon-syntax-highlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crayon-syntax-highlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-d47618ad7b3ff873ed22aa3e5efab3e0.yaml b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-d47618ad7b3ff873ed22aa3e5efab3e0.yaml new file mode 100644 index 0000000000..60dfe6e57b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crayon-syntax-highlighter-d47618ad7b3ff873ed22aa3e5efab3e0.yaml @@ -0,0 +1,58 @@ +id: crayon-syntax-highlighter-d47618ad7b3ff873ed22aa3e5efab3e0 + +info: + name: > + Crayon Syntax Highlighter <= 2.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/225ea5b3-08a9-40c2-a755-7783475946c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crayon-syntax-highlighter/" + google-query: inurl:"/wp-content/plugins/crayon-syntax-highlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crayon-syntax-highlighter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crayon-syntax-highlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crayon-syntax-highlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crazy-bone-cbc819d180f6774324bc2ec20985637c.yaml b/nuclei-templates/cve-less/plugins/crazy-bone-cbc819d180f6774324bc2ec20985637c.yaml new file mode 100644 index 0000000000..b2054ef8e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crazy-bone-cbc819d180f6774324bc2ec20985637c.yaml @@ -0,0 +1,58 @@ +id: crazy-bone-cbc819d180f6774324bc2ec20985637c + +info: + name: > + Crazy Bone <= 0.6.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e3f4e4f-6781-4134-b0ba-3625d7009d0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crazy-bone/" + google-query: inurl:"/wp-content/plugins/crazy-bone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crazy-bone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crazy-bone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crazy-bone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crazy-bone-fc9bfd70a66ba0377d47424bbce696e0.yaml b/nuclei-templates/cve-less/plugins/crazy-bone-fc9bfd70a66ba0377d47424bbce696e0.yaml new file mode 100644 index 0000000000..ebaa126c0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crazy-bone-fc9bfd70a66ba0377d47424bbce696e0.yaml @@ -0,0 +1,58 @@ +id: crazy-bone-fc9bfd70a66ba0377d47424bbce696e0 + +info: + name: > + Crazy Bone < 0.6.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99dfacb4-f784-4e8d-b411-7cab7683c7c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crazy-bone/" + google-query: inurl:"/wp-content/plugins/crazy-bone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crazy-bone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crazy-bone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crazy-bone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/create-block-theme-aba320cfa8d843f5c52f809a638b1428.yaml b/nuclei-templates/cve-less/plugins/create-block-theme-aba320cfa8d843f5c52f809a638b1428.yaml new file mode 100644 index 0000000000..9d314ab2e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/create-block-theme-aba320cfa8d843f5c52f809a638b1428.yaml @@ -0,0 +1,58 @@ +id: create-block-theme-aba320cfa8d843f5c52f809a638b1428 + +info: + name: > + Create Block Theme <= 1.2.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2637e273-a308-4033-be5a-2f778f8df282?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/create-block-theme/" + google-query: inurl:"/wp-content/plugins/create-block-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,create-block-theme,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/create-block-theme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "create-block-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/creative-addons-for-elementor-20f6bee077964f1739b79a57d0927952.yaml b/nuclei-templates/cve-less/plugins/creative-addons-for-elementor-20f6bee077964f1739b79a57d0927952.yaml new file mode 100644 index 0000000000..5fa2fb6f66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/creative-addons-for-elementor-20f6bee077964f1739b79a57d0927952.yaml @@ -0,0 +1,58 @@ +id: creative-addons-for-elementor-20f6bee077964f1739b79a57d0927952 + +info: + name: > + Creative Addons for Elementor <= 1.5.12 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33581898-067b-445c-8ad0-12ff4778a13c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/creative-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/creative-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,creative-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/creative-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "creative-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/creative-image-slider-57ebfd8af23d19d638563ef7a40bf411.yaml b/nuclei-templates/cve-less/plugins/creative-image-slider-57ebfd8af23d19d638563ef7a40bf411.yaml new file mode 100644 index 0000000000..644bc2fb11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/creative-image-slider-57ebfd8af23d19d638563ef7a40bf411.yaml @@ -0,0 +1,58 @@ +id: creative-image-slider-57ebfd8af23d19d638563ef7a40bf411 + +info: + name: > + Creative Image Slider – Responsive Slider Plugin <= 2.1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd6cc95c-451b-4ad7-bb5b-bbb9bc3c89c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/creative-image-slider/" + google-query: inurl:"/wp-content/plugins/creative-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,creative-image-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/creative-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "creative-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-20e49640b2d172fe60c3e66f7c5c2961.yaml b/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-20e49640b2d172fe60c3e66f7c5c2961.yaml new file mode 100644 index 0000000000..b89fa73ce9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-20e49640b2d172fe60c3e66f7c5c2961.yaml @@ -0,0 +1,58 @@ +id: creative-mail-by-constant-contact-20e49640b2d172fe60c3e66f7c5c2961 + +info: + name: > + Creative Mail <= 1.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8a67cad-b52d-4294-9c27-13b1dc1f2e59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/creative-mail-by-constant-contact/" + google-query: inurl:"/wp-content/plugins/creative-mail-by-constant-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,creative-mail-by-constant-contact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/creative-mail-by-constant-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "creative-mail-by-constant-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-883ac125446954bc56b63a659310e326.yaml b/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-883ac125446954bc56b63a659310e326.yaml new file mode 100644 index 0000000000..3ba891ca64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-883ac125446954bc56b63a659310e326.yaml @@ -0,0 +1,58 @@ +id: creative-mail-by-constant-contact-883ac125446954bc56b63a659310e326 + +info: + name: > + Creative Mail <= 1.5.4 - Cross-Site Request Forgery to Settings Disconnect + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d143cefc-e387-47bd-aff6-a2099f704d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/creative-mail-by-constant-contact/" + google-query: inurl:"/wp-content/plugins/creative-mail-by-constant-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,creative-mail-by-constant-contact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/creative-mail-by-constant-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "creative-mail-by-constant-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-f890a87599d700193f94857dcecd8b3d.yaml b/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-f890a87599d700193f94857dcecd8b3d.yaml new file mode 100644 index 0000000000..8fea9a7063 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/creative-mail-by-constant-contact-f890a87599d700193f94857dcecd8b3d.yaml @@ -0,0 +1,58 @@ +id: creative-mail-by-constant-contact-f890a87599d700193f94857dcecd8b3d + +info: + name: > + Creative Mail <= 1.5.4 - Cross-Site Request Forgery to Plugin Deactivation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23a20e57-0228-4e37-a105-e693c05a0a24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/creative-mail-by-constant-contact/" + google-query: inurl:"/wp-content/plugins/creative-mail-by-constant-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,creative-mail-by-constant-contact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/creative-mail-by-constant-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "creative-mail-by-constant-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/credit-tracker-1adc9982ddc5e20d6e411f5dbc1caf02.yaml b/nuclei-templates/cve-less/plugins/credit-tracker-1adc9982ddc5e20d6e411f5dbc1caf02.yaml new file mode 100644 index 0000000000..b18cdee0d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/credit-tracker-1adc9982ddc5e20d6e411f5dbc1caf02.yaml @@ -0,0 +1,58 @@ +id: credit-tracker-1adc9982ddc5e20d6e411f5dbc1caf02 + +info: + name: > + Credit Tracker <= 1.1.17 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b611f3ba-ac36-49fc-a75f-10003c5ca955?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/credit-tracker/" + google-query: inurl:"/wp-content/plugins/credit-tracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,credit-tracker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/credit-tracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "credit-tracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/credova-financial-bed2d5e11413b5522569fa9192fcca60.yaml b/nuclei-templates/cve-less/plugins/credova-financial-bed2d5e11413b5522569fa9192fcca60.yaml new file mode 100644 index 0000000000..b5cd3c72d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/credova-financial-bed2d5e11413b5522569fa9192fcca60.yaml @@ -0,0 +1,58 @@ +id: credova-financial-bed2d5e11413b5522569fa9192fcca60 + +info: + name: > + Credova_Financial <= 1.4.8 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/034246b2-e123-480d-afaf-cce9d42f1f03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/credova-financial/" + google-query: inurl:"/wp-content/plugins/credova-financial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,credova-financial,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/credova-financial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "credova-financial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crelly-slider-11611891705bb620b2fbc93feb153c11.yaml b/nuclei-templates/cve-less/plugins/crelly-slider-11611891705bb620b2fbc93feb153c11.yaml new file mode 100644 index 0000000000..9d2ffc68de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crelly-slider-11611891705bb620b2fbc93feb153c11.yaml @@ -0,0 +1,58 @@ +id: crelly-slider-11611891705bb620b2fbc93feb153c11 + +info: + name: > + Crelly Slider <= 1.3.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9fbd7ee-cfd0-4621-9eb9-df0202657ce9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crelly-slider/" + google-query: inurl:"/wp-content/plugins/crelly-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crelly-slider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crelly-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crelly-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crelly-slider-4ff3f91a93b3247cebd7620836598b68.yaml b/nuclei-templates/cve-less/plugins/crelly-slider-4ff3f91a93b3247cebd7620836598b68.yaml new file mode 100644 index 0000000000..b3be3c5c50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crelly-slider-4ff3f91a93b3247cebd7620836598b68.yaml @@ -0,0 +1,58 @@ +id: crelly-slider-4ff3f91a93b3247cebd7620836598b68 + +info: + name: > + Crelly Slider <= 1.4.5 - Authenticated (Subscriber+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4acc1fd2-0024-4c35-b8c6-94203b91e985?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crelly-slider/" + google-query: inurl:"/wp-content/plugins/crelly-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crelly-slider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crelly-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crelly-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crelly-slider-c49e2e06de0a40bb63220fc2a17c181a.yaml b/nuclei-templates/cve-less/plugins/crelly-slider-c49e2e06de0a40bb63220fc2a17c181a.yaml new file mode 100644 index 0000000000..fc365c13c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crelly-slider-c49e2e06de0a40bb63220fc2a17c181a.yaml @@ -0,0 +1,58 @@ +id: crelly-slider-c49e2e06de0a40bb63220fc2a17c181a + +info: + name: > + Crelly Slider <= 1.1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/473ff00e-e045-4b66-b0af-89d666de4de8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crelly-slider/" + google-query: inurl:"/wp-content/plugins/crelly-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crelly-slider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crelly-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crelly-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crelly-slider-f264ee9267574176bc2aef0a4dad14ac.yaml b/nuclei-templates/cve-less/plugins/crelly-slider-f264ee9267574176bc2aef0a4dad14ac.yaml new file mode 100644 index 0000000000..8e80254ab7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crelly-slider-f264ee9267574176bc2aef0a4dad14ac.yaml @@ -0,0 +1,58 @@ +id: crelly-slider-f264ee9267574176bc2aef0a4dad14ac + +info: + name: > + Crelly Slider <= 1.4.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a885e5db-dc84-46db-960e-63f62709e1b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crelly-slider/" + google-query: inurl:"/wp-content/plugins/crelly-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crelly-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crelly-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crelly-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crisp-2b1c5b57df30a34984198b5c1016c519.yaml b/nuclei-templates/cve-less/plugins/crisp-2b1c5b57df30a34984198b5c1016c519.yaml new file mode 100644 index 0000000000..c7eb95c0b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crisp-2b1c5b57df30a34984198b5c1016c519.yaml @@ -0,0 +1,58 @@ +id: crisp-2b1c5b57df30a34984198b5c1016c519 + +info: + name: > + Crisp <= 0.44 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e97d9dd-7d4a-4862-abba-6e8816bbbe9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crisp/" + google-query: inurl:"/wp-content/plugins/crisp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crisp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crisp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crisp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crisp-3e9db5ca5f74e03bc884849a472e7363.yaml b/nuclei-templates/cve-less/plugins/crisp-3e9db5ca5f74e03bc884849a472e7363.yaml new file mode 100644 index 0000000000..31e3fbf6a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crisp-3e9db5ca5f74e03bc884849a472e7363.yaml @@ -0,0 +1,58 @@ +id: crisp-3e9db5ca5f74e03bc884849a472e7363 + +info: + name: > + Crisp Live Chat <= 0.31 Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bcc8b84-34ac-4f8f-9a74-43b230877e92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crisp/" + google-query: inurl:"/wp-content/plugins/crisp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crisp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crisp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crisp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-customer-relationship-management-by-vcita-6c0eb1e7574e09726dcd946f510854bd.yaml b/nuclei-templates/cve-less/plugins/crm-customer-relationship-management-by-vcita-6c0eb1e7574e09726dcd946f510854bd.yaml new file mode 100644 index 0000000000..851ce6cabe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-customer-relationship-management-by-vcita-6c0eb1e7574e09726dcd946f510854bd.yaml @@ -0,0 +1,58 @@ +id: crm-customer-relationship-management-by-vcita-6c0eb1e7574e09726dcd946f510854bd + +info: + name: > + CRM and Lead Management by vcita <= 2.6.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f75c6bf-1b93-49d5-b5fb-e59b4e67432f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-customer-relationship-management-by-vcita/" + google-query: inurl:"/wp-content/plugins/crm-customer-relationship-management-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-customer-relationship-management-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-customer-relationship-management-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-customer-relationship-management-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-customer-relationship-management-by-vcita-8a9c908ec048eb5db70aedddafa15d74.yaml b/nuclei-templates/cve-less/plugins/crm-customer-relationship-management-by-vcita-8a9c908ec048eb5db70aedddafa15d74.yaml new file mode 100644 index 0000000000..787c2b761e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-customer-relationship-management-by-vcita-8a9c908ec048eb5db70aedddafa15d74.yaml @@ -0,0 +1,58 @@ +id: crm-customer-relationship-management-by-vcita-8a9c908ec048eb5db70aedddafa15d74 + +info: + name: > + CRM and Lead Management by vcita <= 2.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e26ccd06-22e0-4d91-a53a-df6ead8a8e3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-customer-relationship-management-by-vcita/" + google-query: inurl:"/wp-content/plugins/crm-customer-relationship-management-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-customer-relationship-management-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-customer-relationship-management-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-customer-relationship-management-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-memberships-f670252b93de10e17e15c533cbe48519.yaml b/nuclei-templates/cve-less/plugins/crm-memberships-f670252b93de10e17e15c533cbe48519.yaml new file mode 100644 index 0000000000..74336cec43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-memberships-f670252b93de10e17e15c533cbe48519.yaml @@ -0,0 +1,58 @@ +id: crm-memberships-f670252b93de10e17e15c533cbe48519 + +info: + name: > + CRM Memberships <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07c3c8d9-64c9-4d16-9a35-8477b358123f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-memberships/" + google-query: inurl:"/wp-content/plugins/crm-memberships/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-memberships,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-memberships/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-memberships" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-perks-forms-5b58119863530e15cb2cb1eb0cca6c45.yaml b/nuclei-templates/cve-less/plugins/crm-perks-forms-5b58119863530e15cb2cb1eb0cca6c45.yaml new file mode 100644 index 0000000000..ed8d84d4fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-perks-forms-5b58119863530e15cb2cb1eb0cca6c45.yaml @@ -0,0 +1,58 @@ +id: crm-perks-forms-5b58119863530e15cb2cb1eb0cca6c45 + +info: + name: > + CRM Perks Forms <= 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/793df609-77bb-47fd-8383-93884675f217?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-perks-forms/" + google-query: inurl:"/wp-content/plugins/crm-perks-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-perks-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-perks-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-perks-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-perks-forms-6323dfe519d667ba98cb2cb3a674b49d.yaml b/nuclei-templates/cve-less/plugins/crm-perks-forms-6323dfe519d667ba98cb2cb3a674b49d.yaml new file mode 100644 index 0000000000..a85a55e01f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-perks-forms-6323dfe519d667ba98cb2cb3a674b49d.yaml @@ -0,0 +1,58 @@ +id: crm-perks-forms-6323dfe519d667ba98cb2cb3a674b49d + +info: + name: > + CRM Perks Forms <= 1.1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22e09431-dd71-4a90-84ba-4b676ec8ccb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-perks-forms/" + google-query: inurl:"/wp-content/plugins/crm-perks-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-perks-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-perks-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-perks-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-perks-forms-84e13e367dca55445350e25af8c4c3b9.yaml b/nuclei-templates/cve-less/plugins/crm-perks-forms-84e13e367dca55445350e25af8c4c3b9.yaml new file mode 100644 index 0000000000..3459059996 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-perks-forms-84e13e367dca55445350e25af8c4c3b9.yaml @@ -0,0 +1,58 @@ +id: crm-perks-forms-84e13e367dca55445350e25af8c4c3b9 + +info: + name: > + CRM Perks Forms <= 1.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de11636b-a051-4e76-bc26-ed76f66fe0df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-perks-forms/" + google-query: inurl:"/wp-content/plugins/crm-perks-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-perks-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-perks-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-perks-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-perks-forms-aa8353adb3620cf0044ffd866cd1ea46.yaml b/nuclei-templates/cve-less/plugins/crm-perks-forms-aa8353adb3620cf0044ffd866cd1ea46.yaml new file mode 100644 index 0000000000..84f7ee0656 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-perks-forms-aa8353adb3620cf0044ffd866cd1ea46.yaml @@ -0,0 +1,58 @@ +id: crm-perks-forms-aa8353adb3620cf0044ffd866cd1ea46 + +info: + name: > + CRM Perks Forms <= 1.1.4 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3abba90-9503-484e-bc2b-c6105bec698b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-perks-forms/" + google-query: inurl:"/wp-content/plugins/crm-perks-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-perks-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-perks-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-perks-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-perks-forms-c0c58834ca90dc6201d9f559b76ed213.yaml b/nuclei-templates/cve-less/plugins/crm-perks-forms-c0c58834ca90dc6201d9f559b76ed213.yaml new file mode 100644 index 0000000000..f54698ffd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-perks-forms-c0c58834ca90dc6201d9f559b76ed213.yaml @@ -0,0 +1,58 @@ +id: crm-perks-forms-c0c58834ca90dc6201d9f559b76ed213 + +info: + name: > + CRM Perks Forms <= 1.1.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e84d50e1-65fe-4323-981f-e2ae6da0ddab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-perks-forms/" + google-query: inurl:"/wp-content/plugins/crm-perks-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-perks-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-perks-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-perks-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crm-perks-forms-f99e157b145b06140fa576ea488dbce3.yaml b/nuclei-templates/cve-less/plugins/crm-perks-forms-f99e157b145b06140fa576ea488dbce3.yaml new file mode 100644 index 0000000000..f799207269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crm-perks-forms-f99e157b145b06140fa576ea488dbce3.yaml @@ -0,0 +1,58 @@ +id: crm-perks-forms-f99e157b145b06140fa576ea488dbce3 + +info: + name: > + CRM Perks Forms <= 1.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca954d68-18a5-47e2-af56-261c7a55b017?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crm-perks-forms/" + google-query: inurl:"/wp-content/plugins/crm-perks-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crm-perks-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crm-perks-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crm-perks-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crony-0a163e61bcc69936d2e5119ad16f6e94.yaml b/nuclei-templates/cve-less/plugins/crony-0a163e61bcc69936d2e5119ad16f6e94.yaml new file mode 100644 index 0000000000..ee21480201 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crony-0a163e61bcc69936d2e5119ad16f6e94.yaml @@ -0,0 +1,58 @@ +id: crony-0a163e61bcc69936d2e5119ad16f6e94 + +info: + name: > + Crony Cronjob Manager <= 0.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29b81e96-d950-405a-abcb-c457e104b86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crony/" + google-query: inurl:"/wp-content/plugins/crony/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crony,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crony/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crony" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crony-44c866df4156e18647ea081befd62b4f.yaml b/nuclei-templates/cve-less/plugins/crony-44c866df4156e18647ea081befd62b4f.yaml new file mode 100644 index 0000000000..117d1e39d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crony-44c866df4156e18647ea081befd62b4f.yaml @@ -0,0 +1,58 @@ +id: crony-44c866df4156e18647ea081befd62b4f + +info: + name: > + Crony Cronjob Manager < 0.4.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b86ff40d-45dd-4cb6-9a4e-16aaf1d35196?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crony/" + google-query: inurl:"/wp-content/plugins/crony/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crony,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crony/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crony" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cross-linker-6efe820f12fb9f3137c56cee070730c7.yaml b/nuclei-templates/cve-less/plugins/cross-linker-6efe820f12fb9f3137c56cee070730c7.yaml new file mode 100644 index 0000000000..049bb95ec7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cross-linker-6efe820f12fb9f3137c56cee070730c7.yaml @@ -0,0 +1,58 @@ +id: cross-linker-6efe820f12fb9f3137c56cee070730c7 + +info: + name: > + Cross-Linker <= 3.0.1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/009899d4-4139-43ea-a7a1-dc3a1a9ea1e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cross-linker/" + google-query: inurl:"/wp-content/plugins/cross-linker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cross-linker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cross-linker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cross-linker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cross-rss-477b707e65a4938013b3152b7f4ee656.yaml b/nuclei-templates/cve-less/plugins/cross-rss-477b707e65a4938013b3152b7f4ee656.yaml new file mode 100644 index 0000000000..ca3aadfcf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cross-rss-477b707e65a4938013b3152b7f4ee656.yaml @@ -0,0 +1,58 @@ +id: cross-rss-477b707e65a4938013b3152b7f4ee656 + +info: + name: > + Cross-RSS <= 1.7 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca72924f-23fc-42ef-9556-8fb9f5e88add?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cross-rss/" + google-query: inurl:"/wp-content/plugins/cross-rss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cross-rss,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cross-rss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cross-rss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crossslide-jquery-plugin-for-wordpress-66a96d7ee2557e873f3475f1e86dd229.yaml b/nuclei-templates/cve-less/plugins/crossslide-jquery-plugin-for-wordpress-66a96d7ee2557e873f3475f1e86dd229.yaml new file mode 100644 index 0000000000..0c8c476b90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crossslide-jquery-plugin-for-wordpress-66a96d7ee2557e873f3475f1e86dd229.yaml @@ -0,0 +1,58 @@ +id: crossslide-jquery-plugin-for-wordpress-66a96d7ee2557e873f3475f1e86dd229 + +info: + name: > + CrossSlide jQuery Plugin <= 2.0.5 - Multiple Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14d44753-fbfb-4538-b8ae-0e2a13b14c8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crossslide-jquery-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/crossslide-jquery-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crossslide-jquery-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crossslide-jquery-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crossslide-jquery-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryout-serious-slider-059632153ccb2185cede1112e5adabf5.yaml b/nuclei-templates/cve-less/plugins/cryout-serious-slider-059632153ccb2185cede1112e5adabf5.yaml new file mode 100644 index 0000000000..460526336f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryout-serious-slider-059632153ccb2185cede1112e5adabf5.yaml @@ -0,0 +1,58 @@ +id: cryout-serious-slider-059632153ccb2185cede1112e5adabf5 + +info: + name: > + Serious Slider <= 1.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41aeb465-48c2-48db-90ea-186ceeac6753?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryout-serious-slider/" + google-query: inurl:"/wp-content/plugins/cryout-serious-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryout-serious-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryout-serious-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryout-serious-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crypto-converter-widget-306b847d2e6035c47912eb7c67152660.yaml b/nuclei-templates/cve-less/plugins/crypto-converter-widget-306b847d2e6035c47912eb7c67152660.yaml new file mode 100644 index 0000000000..788fda1a5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crypto-converter-widget-306b847d2e6035c47912eb7c67152660.yaml @@ -0,0 +1,58 @@ +id: crypto-converter-widget-306b847d2e6035c47912eb7c67152660 + +info: + name: > + Crypto Converter Widget <= 1.8.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04d9c206-b40d-436a-93f3-bd7e3bb49892?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crypto-converter-widget/" + google-query: inurl:"/wp-content/plugins/crypto-converter-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crypto-converter-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crypto-converter-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crypto-converter-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/crypto-converter-widget-56a618b5c71170cabc6b19e08404193b.yaml b/nuclei-templates/cve-less/plugins/crypto-converter-widget-56a618b5c71170cabc6b19e08404193b.yaml new file mode 100644 index 0000000000..4982da068e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/crypto-converter-widget-56a618b5c71170cabc6b19e08404193b.yaml @@ -0,0 +1,58 @@ +id: crypto-converter-widget-56a618b5c71170cabc6b19e08404193b + +info: + name: > + Crypto Converter Widget <= 1.8.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d621869c-31f7-4243-9815-f6d1bbe469e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/crypto-converter-widget/" + google-query: inurl:"/wp-content/plugins/crypto-converter-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,crypto-converter-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/crypto-converter-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crypto-converter-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..062c87f08a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency/" + google-query: inurl:"/wp-content/plugins/cryptocurrency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..6a5582e9c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency/" + google-query: inurl:"/wp-content/plugins/cryptocurrency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-donation-box-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-donation-box-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..e8a1187e05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-donation-box-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-donation-box-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-donation-box/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-donation-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-donation-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-donation-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-donation-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-donation-box-6c67c1bd228e1520f2b8d5bf20bbed3b.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-donation-box-6c67c1bd228e1520f2b8d5bf20bbed3b.yaml new file mode 100644 index 0000000000..3ac78c23d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-donation-box-6c67c1bd228e1520f2b8d5bf20bbed3b.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-donation-box-6c67c1bd228e1520f2b8d5bf20bbed3b + +info: + name: > + Cryptocurrency Donation Box – Bitcoin & Crypto Donations <= 2.2.7 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c98430d-0881-4f45-b934-c393739ef71c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-donation-box/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-donation-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-donation-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-donation-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-donation-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..4d9871bdad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-price-ticker-widget-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-price-ticker-widget/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-price-ticker-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-price-ticker-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-price-ticker-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-price-ticker-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-ad516406623ae6ecf9dab15916a4b830.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-ad516406623ae6ecf9dab15916a4b830.yaml new file mode 100644 index 0000000000..e535fca1ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-ad516406623ae6ecf9dab15916a4b830.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-price-ticker-widget-ad516406623ae6ecf9dab15916a4b830 + +info: + name: > + Cryptocurrency Widgets – Price Ticker & Coins List <= 2.6.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dec2855c-71a8-46b2-819a-d85cd11a1a24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-price-ticker-widget/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-price-ticker-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-price-ticker-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-price-ticker-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-price-ticker-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-bdc2096d72e0a42fecec9d81de2115f0.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-bdc2096d72e0a42fecec9d81de2115f0.yaml new file mode 100644 index 0000000000..07d812a563 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-bdc2096d72e0a42fecec9d81de2115f0.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-price-ticker-widget-bdc2096d72e0a42fecec9d81de2115f0 + +info: + name: > + Cryptocurrency Widgets – Price Ticker & Coins List 2.0 - 2.6.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0603621-4521-4eb0-b4dd-e2257c133cee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-price-ticker-widget/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-price-ticker-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-price-ticker-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-price-ticker-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-price-ticker-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0', '<= 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-d5383d4e717242611eb588cd04425c5a.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-d5383d4e717242611eb588cd04425c5a.yaml new file mode 100644 index 0000000000..40505a6795 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-price-ticker-widget-d5383d4e717242611eb588cd04425c5a.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-price-ticker-widget-d5383d4e717242611eb588cd04425c5a + +info: + name: > + Cryptocurrency Widgets – Price Ticker & Coins List <= 2.6.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3c371fc-4cf0-478e-b6ae-3bb258c5062e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-price-ticker-widget/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-price-ticker-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-price-ticker-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-price-ticker-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-price-ticker-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-prices-c5c657b48dcb3ae9c728f121d2d0aa85.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-prices-c5c657b48dcb3ae9c728f121d2d0aa85.yaml new file mode 100644 index 0000000000..2354d1f9eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-prices-c5c657b48dcb3ae9c728f121d2d0aa85.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-prices-c5c657b48dcb3ae9c728f121d2d0aa85 + +info: + name: > + Cryptocurrency All-in-One <= 3.0.19 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7492cffe-6e17-4c59-8979-2fa168b4f41d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-prices/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-prices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-prices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-prices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-prices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-pricing-list-204c631f27f2150998aee71c01b37779.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-pricing-list-204c631f27f2150998aee71c01b37779.yaml new file mode 100644 index 0000000000..3e2c19bdf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-pricing-list-204c631f27f2150998aee71c01b37779.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-pricing-list-204c631f27f2150998aee71c01b37779 + +info: + name: > + Cryptocurrency Pricing list and Ticker <= 1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dd95956-d86b-4198-a3b9-d5d9308f36dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-pricing-list/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-pricing-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-pricing-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-pricing-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-pricing-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-product-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-product-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e0beca16a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-product-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-product-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-product-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-product-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-product-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-product-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-product-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.14.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-for-elementor-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-for-elementor-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..beeb8071fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-for-elementor-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-widgets-for-elementor-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-widgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-widgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-widgets-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-widgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-widgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-pack-b49e5a0564db1b49d18da40f1e13555b.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-pack-b49e5a0564db1b49d18da40f1e13555b.yaml new file mode 100644 index 0000000000..305a6ebf72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-pack-b49e5a0564db1b49d18da40f1e13555b.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-widgets-pack-b49e5a0564db1b49d18da40f1e13555b + +info: + name: > + Cryptocurrency Widgets Pack <= 1.8.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8064526f-edd3-43e4-9732-47b25ab256fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-widgets-pack/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-widgets-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-widgets-pack,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-widgets-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-widgets-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-pack-e0f9049a8a7ec17a668bbeb16a71bba1.yaml b/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-pack-e0f9049a8a7ec17a668bbeb16a71bba1.yaml new file mode 100644 index 0000000000..c50bbb62b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptocurrency-widgets-pack-e0f9049a8a7ec17a668bbeb16a71bba1.yaml @@ -0,0 +1,58 @@ +id: cryptocurrency-widgets-pack-e0f9049a8a7ec17a668bbeb16a71bba1 + +info: + name: > + Cryptocurrency Widgets Pack <= 2.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3f173b6-f039-4865-8882-8ef7d1f88413?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptocurrency-widgets-pack/" + google-query: inurl:"/wp-content/plugins/cryptocurrency-widgets-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptocurrency-widgets-pack,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptocurrency-widgets-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptocurrency-widgets-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cryptographp-6fe350acb2d7b08afd5696f747d0413e.yaml b/nuclei-templates/cve-less/plugins/cryptographp-6fe350acb2d7b08afd5696f747d0413e.yaml new file mode 100644 index 0000000000..ce39507c8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cryptographp-6fe350acb2d7b08afd5696f747d0413e.yaml @@ -0,0 +1,58 @@ +id: cryptographp-6fe350acb2d7b08afd5696f747d0413e + +info: + name: > + Cryptographp <= 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/120514af-41d8-49ca-be87-28c7d4777fee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cryptographp/" + google-query: inurl:"/wp-content/plugins/cryptographp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cryptographp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cryptographp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cryptographp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/csprite-2707f1b08a4a34c3e1947ca39cd73e06.yaml b/nuclei-templates/cve-less/plugins/csprite-2707f1b08a4a34c3e1947ca39cd73e06.yaml new file mode 100644 index 0000000000..cdd5ec3b5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/csprite-2707f1b08a4a34c3e1947ca39cd73e06.yaml @@ -0,0 +1,58 @@ +id: csprite-2707f1b08a4a34c3e1947ca39cd73e06 + +info: + name: > + CSprite <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5da3a4f-7084-4ba9-89c9-5a480efc7eca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/csprite/" + google-query: inurl:"/wp-content/plugins/csprite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,csprite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/csprite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "csprite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/css-adder-by-agence-press-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/css-adder-by-agence-press-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..7d987b0dcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/css-adder-by-agence-press-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: css-adder-by-agence-press-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/css-adder-by-agence-press/" + google-query: inurl:"/wp-content/plugins/css-adder-by-agence-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,css-adder-by-agence-press,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/css-adder-by-agence-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "css-adder-by-agence-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/css-hero-c65a895d58bf856765c9e28ed468f2ea.yaml b/nuclei-templates/cve-less/plugins/css-hero-c65a895d58bf856765c9e28ed468f2ea.yaml new file mode 100644 index 0000000000..ac0dc39423 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/css-hero-c65a895d58bf856765c9e28ed468f2ea.yaml @@ -0,0 +1,58 @@ +id: css-hero-c65a895d58bf856765c9e28ed468f2ea + +info: + name: > + CSS Hero <= 4.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffb97fa2-456c-4bc4-a09c-54daa17be3e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/css-hero/" + google-query: inurl:"/wp-content/plugins/css-hero/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,css-hero,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/css-hero/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "css-hero" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/css-javascript-toolbox-72b05538a975fe47e341442f2bdeeabf.yaml b/nuclei-templates/cve-less/plugins/css-javascript-toolbox-72b05538a975fe47e341442f2bdeeabf.yaml new file mode 100644 index 0000000000..b6af677231 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/css-javascript-toolbox-72b05538a975fe47e341442f2bdeeabf.yaml @@ -0,0 +1,58 @@ +id: css-javascript-toolbox-72b05538a975fe47e341442f2bdeeabf + +info: + name: > + CSS & JavaScript Toolbox <= 11.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ace85b25-251b-4549-8f6e-1a1494cbabb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/css-javascript-toolbox/" + google-query: inurl:"/wp-content/plugins/css-javascript-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,css-javascript-toolbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/css-javascript-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "css-javascript-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/css-javascript-toolbox-b07fb9d1ee02580a27668ece326b4ac3.yaml b/nuclei-templates/cve-less/plugins/css-javascript-toolbox-b07fb9d1ee02580a27668ece326b4ac3.yaml new file mode 100644 index 0000000000..1ea367e660 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/css-javascript-toolbox-b07fb9d1ee02580a27668ece326b4ac3.yaml @@ -0,0 +1,58 @@ +id: css-javascript-toolbox-b07fb9d1ee02580a27668ece326b4ac3 + +info: + name: > + CSS & JavaScript Toolbox <= 8.4.1 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/868b7492-c550-4c06-adb0-3478eb7d9b55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/css-javascript-toolbox/" + google-query: inurl:"/wp-content/plugins/css-javascript-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,css-javascript-toolbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/css-javascript-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "css-javascript-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/css-js-manager-61c2b811bcc6041f6a82b35f50d9b2b3.yaml b/nuclei-templates/cve-less/plugins/css-js-manager-61c2b811bcc6041f6a82b35f50d9b2b3.yaml new file mode 100644 index 0000000000..a83feaddec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/css-js-manager-61c2b811bcc6041f6a82b35f50d9b2b3.yaml @@ -0,0 +1,58 @@ +id: css-js-manager-61c2b811bcc6041f6a82b35f50d9b2b3 + +info: + name: > + CSS JS Manager <= 2.4.49 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f167c3c5-df35-456c-a5f1-139cc3c02ffb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/css-js-manager/" + google-query: inurl:"/wp-content/plugins/css-js-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,css-js-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/css-js-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "css-js-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.49') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/css3-rotating-words-035f7dbab49cd7102e78202706c7a9af.yaml b/nuclei-templates/cve-less/plugins/css3-rotating-words-035f7dbab49cd7102e78202706c7a9af.yaml new file mode 100644 index 0000000000..82a8038d4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/css3-rotating-words-035f7dbab49cd7102e78202706c7a9af.yaml @@ -0,0 +1,58 @@ +id: css3-rotating-words-035f7dbab49cd7102e78202706c7a9af + +info: + name: > + Animated Rotating Words <= 5.4 - Cross-Site Request Forgery via save_admin_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b7008f-07fc-4f8a-b214-8ac0c4cf6d99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/css3-rotating-words/" + google-query: inurl:"/wp-content/plugins/css3-rotating-words/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,css3-rotating-words,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/css3-rotating-words/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "css3-rotating-words" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/css3-rotating-words-8fa029836e390a41910a91e1df99c734.yaml b/nuclei-templates/cve-less/plugins/css3-rotating-words-8fa029836e390a41910a91e1df99c734.yaml new file mode 100644 index 0000000000..627eceef1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/css3-rotating-words-8fa029836e390a41910a91e1df99c734.yaml @@ -0,0 +1,58 @@ +id: css3-rotating-words-8fa029836e390a41910a91e1df99c734 + +info: + name: > + Animated Rotating Words <= 5.4 - Missing Authorization via save_admin_options + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d9786e-4ce3-42d6-a0d6-8eb863103d5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/css3-rotating-words/" + google-query: inurl:"/wp-content/plugins/css3-rotating-words/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,css3-rotating-words,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/css3-rotating-words/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "css3-rotating-words" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/csv-import-2adda436491ee9e5c0c2e9ccffab9afe.yaml b/nuclei-templates/cve-less/plugins/csv-import-2adda436491ee9e5c0c2e9ccffab9afe.yaml new file mode 100644 index 0000000000..bb1b0c8766 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/csv-import-2adda436491ee9e5c0c2e9ccffab9afe.yaml @@ -0,0 +1,58 @@ +id: csv-import-2adda436491ee9e5c0c2e9ccffab9afe + +info: + name: > + CSV Import <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92a9ca70-2867-433a-932e-191ed7f01945?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/csv-import/" + google-query: inurl:"/wp-content/plugins/csv-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,csv-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/csv-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "csv-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/csv-import-export-888fd755a466f61b6b5975477e6bfb5b.yaml b/nuclei-templates/cve-less/plugins/csv-import-export-888fd755a466f61b6b5975477e6bfb5b.yaml new file mode 100644 index 0000000000..c89cc4ce3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/csv-import-export-888fd755a466f61b6b5975477e6bfb5b.yaml @@ -0,0 +1,58 @@ +id: csv-import-export-888fd755a466f61b6b5975477e6bfb5b + +info: + name: > + CSV Import Export <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7036400d-022c-4e7e-a463-6ac6f5373474?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/csv-import-export/" + google-query: inurl:"/wp-content/plugins/csv-import-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,csv-import-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/csv-import-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "csv-import-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/csv-importer-87391130a959fbd6c64c577ce3bb974c.yaml b/nuclei-templates/cve-less/plugins/csv-importer-87391130a959fbd6c64c577ce3bb974c.yaml new file mode 100644 index 0000000000..c9abfa9f08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/csv-importer-87391130a959fbd6c64c577ce3bb974c.yaml @@ -0,0 +1,58 @@ +id: csv-importer-87391130a959fbd6c64c577ce3bb974c + +info: + name: > + CSV Importer <= 0.3.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/252153ec-3811-484a-984f-eeb6ed9229a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/csv-importer/" + google-query: inurl:"/wp-content/plugins/csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,csv-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/csv2wpec-coupon-f4d3fb2528b229e51486f812ddf75b90.yaml b/nuclei-templates/cve-less/plugins/csv2wpec-coupon-f4d3fb2528b229e51486f812ddf75b90.yaml new file mode 100644 index 0000000000..6f6584f126 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/csv2wpec-coupon-f4d3fb2528b229e51486f812ddf75b90.yaml @@ -0,0 +1,58 @@ +id: csv2wpec-coupon-f4d3fb2528b229e51486f812ddf75b90 + +info: + name: > + Csv2WPeC Coupon <= 1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24a88f20-ddc4-4544-ac18-ed538ecfa1c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/csv2wpec-coupon/" + google-query: inurl:"/wp-content/plugins/csv2wpec-coupon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,csv2wpec-coupon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/csv2wpec-coupon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "csv2wpec-coupon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ct-commerce-62cb33b4f205d311d390e62fba25cd36.yaml b/nuclei-templates/cve-less/plugins/ct-commerce-62cb33b4f205d311d390e62fba25cd36.yaml new file mode 100644 index 0000000000..9ac4be4898 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ct-commerce-62cb33b4f205d311d390e62fba25cd36.yaml @@ -0,0 +1,58 @@ +id: ct-commerce-62cb33b4f205d311d390e62fba25cd36 + +info: + name: > + CT Commerce <= 2.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/399109be-7efe-428e-a9b8-7a68864b2790?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ct-commerce/" + google-query: inurl:"/wp-content/plugins/ct-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ct-commerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ct-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ct-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ct-ultimate-gdpr-949e3c48d41e3ab6ec3beff5ca3c241d.yaml b/nuclei-templates/cve-less/plugins/ct-ultimate-gdpr-949e3c48d41e3ab6ec3beff5ca3c241d.yaml new file mode 100644 index 0000000000..61eb98c708 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ct-ultimate-gdpr-949e3c48d41e3ab6ec3beff5ca3c241d.yaml @@ -0,0 +1,58 @@ +id: ct-ultimate-gdpr-949e3c48d41e3ab6ec3beff5ca3c241d + +info: + name: > + Ultimate GDPR & CCPA <= 2.4 - Unauthenticated Settings Import & Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40e2e8fb-ea36-4602-bead-8daf75d6dfb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ct-ultimate-gdpr/" + google-query: inurl:"/wp-content/plugins/ct-ultimate-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ct-ultimate-gdpr,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ct-ultimate-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ct-ultimate-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cta-0fa73cd35698d01b3ea111a06727a347.yaml b/nuclei-templates/cve-less/plugins/cta-0fa73cd35698d01b3ea111a06727a347.yaml new file mode 100644 index 0000000000..f266b002f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cta-0fa73cd35698d01b3ea111a06727a347.yaml @@ -0,0 +1,58 @@ +id: cta-0fa73cd35698d01b3ea111a06727a347 + +info: + name: > + WordPress Calls to Action < 2.2.8 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/346a49ff-4e61-466b-b1fe-98cf5766accb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cta/" + google-query: inurl:"/wp-content/plugins/cta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cta-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml b/nuclei-templates/cve-less/plugins/cta-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml new file mode 100644 index 0000000000..4fc873859f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cta-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml @@ -0,0 +1,58 @@ +id: cta-7ebd0ae08ee9eace1c6d1e72c60c16e5 + +info: + name: > + WordPress Calls to Action < 2.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ac2e50-1eef-46e6-8d57-c9d2dc04f933?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cta/" + google-query: inurl:"/wp-content/plugins/cta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ctt-expresso-para-woocommerce-7f12ff16273eb990bb45ef4156cd86e1.yaml b/nuclei-templates/cve-less/plugins/ctt-expresso-para-woocommerce-7f12ff16273eb990bb45ef4156cd86e1.yaml new file mode 100644 index 0000000000..fd40c2a97a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ctt-expresso-para-woocommerce-7f12ff16273eb990bb45ef4156cd86e1.yaml @@ -0,0 +1,58 @@ +id: ctt-expresso-para-woocommerce-7f12ff16273eb990bb45ef4156cd86e1 + +info: + name: > + CTT Expresso para WooCommerce <= 3.2.11 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/598768fe-e36d-48d8-925e-64513f36b18b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ctt-expresso-para-woocommerce/" + google-query: inurl:"/wp-content/plugins/ctt-expresso-para-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ctt-expresso-para-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ctt-expresso-para-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ctt-expresso-para-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cube-slider-bee7ee097d9c2854b2e0df3652ff1065.yaml b/nuclei-templates/cve-less/plugins/cube-slider-bee7ee097d9c2854b2e0df3652ff1065.yaml new file mode 100644 index 0000000000..d1fbc97d0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cube-slider-bee7ee097d9c2854b2e0df3652ff1065.yaml @@ -0,0 +1,58 @@ +id: cube-slider-bee7ee097d9c2854b2e0df3652ff1065 + +info: + name: > + CUBE SLIDER <= 1.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57ebde8e-dd1f-4a33-9c7b-6c9e2060d1ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cube-slider/" + google-query: inurl:"/wp-content/plugins/cube-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cube-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cube-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cube-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cubewp-framework-c805577cc74fac959884880eefb7ff71.yaml b/nuclei-templates/cve-less/plugins/cubewp-framework-c805577cc74fac959884880eefb7ff71.yaml new file mode 100644 index 0000000000..13bde4e50c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cubewp-framework-c805577cc74fac959884880eefb7ff71.yaml @@ -0,0 +1,58 @@ +id: cubewp-framework-c805577cc74fac959884880eefb7ff71 + +info: + name: > + CubeWP – All-in-One Dynamic Content Framework <= 1.1.12 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bef7dcd-920b-4aee-b227-c7eec9fe73fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cubewp-framework/" + google-query: inurl:"/wp-content/plugins/cubewp-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cubewp-framework,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cubewp-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cubewp-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/culqi-checkout-36e8e0f9a5511d98ca66f925304a3a33.yaml b/nuclei-templates/cve-less/plugins/culqi-checkout-36e8e0f9a5511d98ca66f925304a3a33.yaml new file mode 100644 index 0000000000..3dcbddec7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/culqi-checkout-36e8e0f9a5511d98ca66f925304a3a33.yaml @@ -0,0 +1,58 @@ +id: culqi-checkout-36e8e0f9a5511d98ca66f925304a3a33 + +info: + name: > + Culqi <= 3.0.14 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61206bfb-1669-4c67-a9bd-ba3a20ceb810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/culqi-checkout/" + google-query: inurl:"/wp-content/plugins/culqi-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,culqi-checkout,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/culqi-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "culqi-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/culture-object-b758c0c37fd1d990bf9268c1c848eb10.yaml b/nuclei-templates/cve-less/plugins/culture-object-b758c0c37fd1d990bf9268c1c848eb10.yaml new file mode 100644 index 0000000000..8277ee528a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/culture-object-b758c0c37fd1d990bf9268c1c848eb10.yaml @@ -0,0 +1,58 @@ +id: culture-object-b758c0c37fd1d990bf9268c1c848eb10 + +info: + name: > + Culture Object <= 4.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04aa7307-03c6-42f9-8219-fb6002c85050?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/culture-object/" + google-query: inurl:"/wp-content/plugins/culture-object/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,culture-object,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/culture-object/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "culture-object" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-converter-calculator-d34575a4acf043c178e1c507a8583e51.yaml b/nuclei-templates/cve-less/plugins/currency-converter-calculator-d34575a4acf043c178e1c507a8583e51.yaml new file mode 100644 index 0000000000..185ec2b5ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-converter-calculator-d34575a4acf043c178e1c507a8583e51.yaml @@ -0,0 +1,58 @@ +id: currency-converter-calculator-d34575a4acf043c178e1c507a8583e51 + +info: + name: > + Currency Converter Calculator <= 1.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a423266-89e1-422d-b1e3-6368051eb2fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-converter-calculator/" + google-query: inurl:"/wp-content/plugins/currency-converter-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-converter-calculator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-converter-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-converter-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-converter-widget-07141f22dbd69d711616f0823783fd10.yaml b/nuclei-templates/cve-less/plugins/currency-converter-widget-07141f22dbd69d711616f0823783fd10.yaml new file mode 100644 index 0000000000..bfa2250803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-converter-widget-07141f22dbd69d711616f0823783fd10.yaml @@ -0,0 +1,58 @@ +id: currency-converter-widget-07141f22dbd69d711616f0823783fd10 + +info: + name: > + Currency Converter Widget <= 3.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47f051dd-138c-4c71-8a92-150c9ffd3601?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-converter-widget/" + google-query: inurl:"/wp-content/plugins/currency-converter-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-converter-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-converter-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-converter-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-exchange-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/currency-exchange-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..b59e90d1ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-exchange-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: currency-exchange-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-exchange-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/currency-exchange-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-exchange-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-exchange-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-exchange-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-per-product-for-woocommerce-1435e710f882ca24fd63e6f30e30c39b.yaml b/nuclei-templates/cve-less/plugins/currency-per-product-for-woocommerce-1435e710f882ca24fd63e6f30e30c39b.yaml new file mode 100644 index 0000000000..3ee84f3a2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-per-product-for-woocommerce-1435e710f882ca24fd63e6f30e30c39b.yaml @@ -0,0 +1,58 @@ +id: currency-per-product-for-woocommerce-1435e710f882ca24fd63e6f30e30c39b + +info: + name: > + Currency per Product for WooCommerce <= 1.6.0 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/570e72de-1f6a-4bbe-9df1-f0d1ca290a0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-per-product-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/currency-per-product-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-per-product-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-per-product-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-per-product-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-switcher-181f8727807ba64411fbc27b7d06a7f7.yaml b/nuclei-templates/cve-less/plugins/currency-switcher-181f8727807ba64411fbc27b7d06a7f7.yaml new file mode 100644 index 0000000000..91478e1cdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-switcher-181f8727807ba64411fbc27b7d06a7f7.yaml @@ -0,0 +1,58 @@ +id: currency-switcher-181f8727807ba64411fbc27b7d06a7f7 + +info: + name: > + WPCS – WordPress Currency Switcher Professional <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be054481-89b4-47d8-ad06-8622edea367f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-switcher/" + google-query: inurl:"/wp-content/plugins/currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-switcher-24c409175b75dd74bfd113d5f584dc08.yaml b/nuclei-templates/cve-less/plugins/currency-switcher-24c409175b75dd74bfd113d5f584dc08.yaml new file mode 100644 index 0000000000..856a1b4b53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-switcher-24c409175b75dd74bfd113d5f584dc08.yaml @@ -0,0 +1,58 @@ +id: currency-switcher-24c409175b75dd74bfd113d5f584dc08 + +info: + name: > + Currency Switcher <= 1.1.6 - Cross-site request forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a56a838-5dfa-477a-92b2-fdac3d1ab2af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-switcher/" + google-query: inurl:"/wp-content/plugins/currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-switcher,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-switcher-2d27e10efdfec8fc58acf4cf64107b4a.yaml b/nuclei-templates/cve-less/plugins/currency-switcher-2d27e10efdfec8fc58acf4cf64107b4a.yaml new file mode 100644 index 0000000000..bed5e1bc85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-switcher-2d27e10efdfec8fc58acf4cf64107b4a.yaml @@ -0,0 +1,58 @@ +id: currency-switcher-2d27e10efdfec8fc58acf4cf64107b4a + +info: + name: > + WPCS – WordPress Currency Switcher Professional <= 1.1.9 - Missing Authorization to Arbitrary Custom Drop-Down Currency Switcher Editing + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c79242-5c89-40c0-abcc-c112f7a64a74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-switcher/" + google-query: inurl:"/wp-content/plugins/currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-switcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-switcher-666b2fb2c881bde28dcf6538f4e79c83.yaml b/nuclei-templates/cve-less/plugins/currency-switcher-666b2fb2c881bde28dcf6538f4e79c83.yaml new file mode 100644 index 0000000000..8324c3a9df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-switcher-666b2fb2c881bde28dcf6538f4e79c83.yaml @@ -0,0 +1,58 @@ +id: currency-switcher-666b2fb2c881bde28dcf6538f4e79c83 + +info: + name: > + WPCS – WordPress Currency Switcher Professional <= 1.1.9 - Missing Authorization to Arbitrary Custom Drop-Down Currency Switcher Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc44c95e-9ca0-46d0-8315-72612ef3f855?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-switcher/" + google-query: inurl:"/wp-content/plugins/currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-switcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-switcher-8355052ed50773dfc024174bf5f762ad.yaml b/nuclei-templates/cve-less/plugins/currency-switcher-8355052ed50773dfc024174bf5f762ad.yaml new file mode 100644 index 0000000000..048069a9f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-switcher-8355052ed50773dfc024174bf5f762ad.yaml @@ -0,0 +1,58 @@ +id: currency-switcher-8355052ed50773dfc024174bf5f762ad + +info: + name: > + WPCS <= 1.2.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2227cde8-5ed6-44dd-80cc-2a85aaa172c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-switcher/" + google-query: inurl:"/wp-content/plugins/currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-switcher-d88f90595d62f553e29356fc831883af.yaml b/nuclei-templates/cve-less/plugins/currency-switcher-d88f90595d62f553e29356fc831883af.yaml new file mode 100644 index 0000000000..2f19e9e3a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-switcher-d88f90595d62f553e29356fc831883af.yaml @@ -0,0 +1,58 @@ +id: currency-switcher-d88f90595d62f553e29356fc831883af + +info: + name: > + WPCS – WordPress Currency Switcher Professional <= 1.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72a06690-f40a-472b-b9d1-985a49b914b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-switcher/" + google-query: inurl:"/wp-content/plugins/currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-switcher-fc8e4381ea5ebd79c418e0830ad7aa41.yaml b/nuclei-templates/cve-less/plugins/currency-switcher-fc8e4381ea5ebd79c418e0830ad7aa41.yaml new file mode 100644 index 0000000000..ba9326190e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-switcher-fc8e4381ea5ebd79c418e0830ad7aa41.yaml @@ -0,0 +1,58 @@ +id: currency-switcher-fc8e4381ea5ebd79c418e0830ad7aa41 + +info: + name: > + WPCS – WordPress Currency Switcher Professional <= 1.1.9 - Missing Authorization to Custom Drop-Down Currency Switcher Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd6b5d6d-5f5b-4b38-a25a-02cc1c041d37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-switcher/" + google-query: inurl:"/wp-content/plugins/currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-switcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/currency-switcher-woocommerce-57f78642fa9cede94bd35b0316b99b78.yaml b/nuclei-templates/cve-less/plugins/currency-switcher-woocommerce-57f78642fa9cede94bd35b0316b99b78.yaml new file mode 100644 index 0000000000..ed26212038 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/currency-switcher-woocommerce-57f78642fa9cede94bd35b0316b99b78.yaml @@ -0,0 +1,58 @@ +id: currency-switcher-woocommerce-57f78642fa9cede94bd35b0316b99b78 + +info: + name: > + Currency Switcher <= 2.11.1 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f9863b2-177d-4b72-8337-90fbedfd5b54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/currency-switcher-woocommerce/" + google-query: inurl:"/wp-content/plugins/currency-switcher-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,currency-switcher-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/currency-switcher-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "currency-switcher-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/current-book-538fbd9fdeb83d5c5aab2ed683914a16.yaml b/nuclei-templates/cve-less/plugins/current-book-538fbd9fdeb83d5c5aab2ed683914a16.yaml new file mode 100644 index 0000000000..1d7dff5f37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/current-book-538fbd9fdeb83d5c5aab2ed683914a16.yaml @@ -0,0 +1,58 @@ +id: current-book-538fbd9fdeb83d5c5aab2ed683914a16 + +info: + name: > + Current Book <= 1.0.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffde541b-5e2b-437b-a123-8522beca52ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/current-book/" + google-query: inurl:"/wp-content/plugins/current-book/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,current-book,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/current-book/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "current-book" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/current-menu-item-for-custom-post-types-8cec5dcdfbdfde2c1732a5fcb98c3da8.yaml b/nuclei-templates/cve-less/plugins/current-menu-item-for-custom-post-types-8cec5dcdfbdfde2c1732a5fcb98c3da8.yaml new file mode 100644 index 0000000000..d6d7811a49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/current-menu-item-for-custom-post-types-8cec5dcdfbdfde2c1732a5fcb98c3da8.yaml @@ -0,0 +1,58 @@ +id: current-menu-item-for-custom-post-types-8cec5dcdfbdfde2c1732a5fcb98c3da8 + +info: + name: > + Current Menu Item for Custom Post Types <= 1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d75f1475-fa81-4eed-87da-0a0fa48ac082?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/current-menu-item-for-custom-post-types/" + google-query: inurl:"/wp-content/plugins/current-menu-item-for-custom-post-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,current-menu-item-for-custom-post-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/current-menu-item-for-custom-post-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "current-menu-item-for-custom-post-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/current-template-name-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/current-template-name-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..6bc9493717 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/current-template-name-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: current-template-name-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/current-template-name/" + google-query: inurl:"/wp-content/plugins/current-template-name/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,current-template-name,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/current-template-name/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "current-template-name" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/curtain-546cde9b90f17421631d383528055da0.yaml b/nuclei-templates/cve-less/plugins/curtain-546cde9b90f17421631d383528055da0.yaml new file mode 100644 index 0000000000..1250522b33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/curtain-546cde9b90f17421631d383528055da0.yaml @@ -0,0 +1,58 @@ +id: curtain-546cde9b90f17421631d383528055da0 + +info: + name: > + Curtain < 1.0.2 - Unauthenticated Maintenance Mode Enabled/Disable + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ef5a8f1-ed3c-48bb-9554-b42e9e8d645d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/curtain/" + google-query: inurl:"/wp-content/plugins/curtain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,curtain,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/curtain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "curtain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/curtain-c8c8f457de7ea311efa222b66a51a434.yaml b/nuclei-templates/cve-less/plugins/curtain-c8c8f457de7ea311efa222b66a51a434.yaml new file mode 100644 index 0000000000..4a9079498a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/curtain-c8c8f457de7ea311efa222b66a51a434.yaml @@ -0,0 +1,58 @@ +id: curtain-c8c8f457de7ea311efa222b66a51a434 + +info: + name: > + Curtain <= 1.0.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e25a511-f176-4532-bb9f-a7a3134ee29a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/curtain/" + google-query: inurl:"/wp-content/plugins/curtain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,curtain,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/curtain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "curtain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-030f26819c32911a473f408d586efb1e.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-030f26819c32911a473f408d586efb1e.yaml new file mode 100644 index 0000000000..d2ea7708bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-030f26819c32911a473f408d586efb1e.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-030f26819c32911a473f408d586efb1e + +info: + name: > + Custom 404 Pro <= 3.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4aceec4-4832-4d83-98b3-f705c391b0c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-200c405b0773aa3952229a5ad35202ef.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-200c405b0773aa3952229a5ad35202ef.yaml new file mode 100644 index 0000000000..44f04b5500 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-200c405b0773aa3952229a5ad35202ef.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-200c405b0773aa3952229a5ad35202ef + +info: + name: > + Custom 404 Pro <= 3.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/968920b9-febf-4d76-a16b-f27954cd72e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-67e917a11cbf398c051530dabd0fa5db.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-67e917a11cbf398c051530dabd0fa5db.yaml new file mode 100644 index 0000000000..1cc7bb8e3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-67e917a11cbf398c051530dabd0fa5db.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-67e917a11cbf398c051530dabd0fa5db + +info: + name: > + Custom 404 Pro <= 3.7.2 - Reflected Cross-Site Scripting via 's' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e5bdc92-e682-4121-9ba5-167742f61138?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-68585d4bba03002044d20ac970108ad9.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-68585d4bba03002044d20ac970108ad9.yaml new file mode 100644 index 0000000000..a65560d1f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-68585d4bba03002044d20ac970108ad9.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-68585d4bba03002044d20ac970108ad9 + +info: + name: > + Custom 404 Pro <= 3.8.1 - Reflected Cross-Site Scripting via 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d90dad3-d7ef-4060-8328-fd551cee92e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-96f5c1ab6101dad2bb86f8e89d978872.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-96f5c1ab6101dad2bb86f8e89d978872.yaml new file mode 100644 index 0000000000..ef357a36a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-96f5c1ab6101dad2bb86f8e89d978872.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-96f5c1ab6101dad2bb86f8e89d978872 + +info: + name: > + Custom 404 Pro <= 3.8.0 - Unauthenticated SQL Injection via 's' + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebacd411-6def-4026-a619-5e08a181507b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-a40f47bd3665fa9aac14a11f65a2ad01.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-a40f47bd3665fa9aac14a11f65a2ad01.yaml new file mode 100644 index 0000000000..8ccf4d881d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-a40f47bd3665fa9aac14a11f65a2ad01.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-a40f47bd3665fa9aac14a11f65a2ad01 + +info: + name: > + Custom 404 Pro <= 3.7.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d22fb2e8-bb61-49bc-9fab-8f7c58339a69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-b5d35374c7a9af094e4ec14c748dcfa5.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-b5d35374c7a9af094e4ec14c748dcfa5.yaml new file mode 100644 index 0000000000..a58907abe7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-b5d35374c7a9af094e4ec14c748dcfa5.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-b5d35374c7a9af094e4ec14c748dcfa5 + +info: + name: > + Custom 404 Pro <= 3.10.0 - Unauthenticated Stored Cross-Site Scripting via logging + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1106e7b2-eac7-459d-8eb3-fe84c76f3b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-c4be63bba4a89fa3e83779737577feda.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-c4be63bba4a89fa3e83779737577feda.yaml new file mode 100644 index 0000000000..6a9389b8bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-c4be63bba4a89fa3e83779737577feda.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-c4be63bba4a89fa3e83779737577feda + +info: + name: > + Custom 404 Pro <= 3.7.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20d989d9-6bf0-4f9f-acf4-b4c3452855cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-404-pro-f1094be99ae561ef22eac5b48376079f.yaml b/nuclei-templates/cve-less/plugins/custom-404-pro-f1094be99ae561ef22eac5b48376079f.yaml new file mode 100644 index 0000000000..6a2363fa98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-404-pro-f1094be99ae561ef22eac5b48376079f.yaml @@ -0,0 +1,58 @@ +id: custom-404-pro-f1094be99ae561ef22eac5b48376079f + +info: + name: > + Custom 404 Pro <= 3.2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/856f8b5f-809e-4ce2-8ef1-3ed169bc2b19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-404-pro/" + google-query: inurl:"/wp-content/plugins/custom-404-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-404-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-404-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-404-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-add-user-f2aee954ea519a4193f03af67cb64cc8.yaml b/nuclei-templates/cve-less/plugins/custom-add-user-f2aee954ea519a4193f03af67cb64cc8.yaml new file mode 100644 index 0000000000..9142c4a1ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-add-user-f2aee954ea519a4193f03af67cb64cc8.yaml @@ -0,0 +1,58 @@ +id: custom-add-user-f2aee954ea519a4193f03af67cb64cc8 + +info: + name: > + Custom Add User <= 2.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15672f90-3192-452c-a4f2-be6db00b7888?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-add-user/" + google-query: inurl:"/wp-content/plugins/custom-add-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-add-user,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-add-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-add-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-admin-login-styler-wpzest-0e96d2ec3c953050a17aaa45bf8227cd.yaml b/nuclei-templates/cve-less/plugins/custom-admin-login-styler-wpzest-0e96d2ec3c953050a17aaa45bf8227cd.yaml new file mode 100644 index 0000000000..9e0dbecee1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-admin-login-styler-wpzest-0e96d2ec3c953050a17aaa45bf8227cd.yaml @@ -0,0 +1,58 @@ +id: custom-admin-login-styler-wpzest-0e96d2ec3c953050a17aaa45bf8227cd + +info: + name: > + Custom Admin Login Page | WPZest <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/906dcf2a-6be1-4966-9a70-1ef9a8f1017d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-admin-login-styler-wpzest/" + google-query: inurl:"/wp-content/plugins/custom-admin-login-styler-wpzest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-admin-login-styler-wpzest,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-admin-login-styler-wpzest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-admin-login-styler-wpzest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-admin-page-991c1eac5fa7c61140560d60fd4bd8b2.yaml b/nuclei-templates/cve-less/plugins/custom-admin-page-991c1eac5fa7c61140560d60fd4bd8b2.yaml new file mode 100644 index 0000000000..827708e304 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-admin-page-991c1eac5fa7c61140560d60fd4bd8b2.yaml @@ -0,0 +1,58 @@ +id: custom-admin-page-991c1eac5fa7c61140560d60fd4bd8b2 + +info: + name: > + Custom Admin Page by BestWebSoft <= 0.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a6c4945-68d3-4ce9-b00c-40591fa15ada?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-admin-page/" + google-query: inurl:"/wp-content/plugins/custom-admin-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-admin-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-admin-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-admin-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-background-e463f937915a727f73f93451bc29c7b3.yaml b/nuclei-templates/cve-less/plugins/custom-background-e463f937915a727f73f93451bc29c7b3.yaml new file mode 100644 index 0000000000..bd18312c00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-background-e463f937915a727f73f93451bc29c7b3.yaml @@ -0,0 +1,58 @@ +id: custom-background-e463f937915a727f73f93451bc29c7b3 + +info: + name: > + Custom Background <= 3.2.2.67929 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b65cdbe0-e258-4bb5-9a36-cbf57b75ce77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-background/" + google-query: inurl:"/wp-content/plugins/custom-background/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-background,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-background/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-background" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2.67929') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-banners-3a4fdaa86716f7a2bccd54fbc792c9e7.yaml b/nuclei-templates/cve-less/plugins/custom-banners-3a4fdaa86716f7a2bccd54fbc792c9e7.yaml new file mode 100644 index 0000000000..5ae5344c74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-banners-3a4fdaa86716f7a2bccd54fbc792c9e7.yaml @@ -0,0 +1,58 @@ +id: custom-banners-3a4fdaa86716f7a2bccd54fbc792c9e7 + +info: + name: > + Custom Banners <= 3.2.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f4c086d-8209-4212-9d91-67238c1a9143?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-banners/" + google-query: inurl:"/wp-content/plugins/custom-banners/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-banners,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-banners/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-banners" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-banners-75a7478c504eb31e010492e08d11afbc.yaml b/nuclei-templates/cve-less/plugins/custom-banners-75a7478c504eb31e010492e08d11afbc.yaml new file mode 100644 index 0000000000..66cd6cafb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-banners-75a7478c504eb31e010492e08d11afbc.yaml @@ -0,0 +1,58 @@ +id: custom-banners-75a7478c504eb31e010492e08d11afbc + +info: + name: > + Custom Banners < 2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6de66ee-08f6-47f6-b6d1-edbf7bea70d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-banners/" + google-query: inurl:"/wp-content/plugins/custom-banners/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-banners,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-banners/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-banners" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-base-terms-59797dde213a6367a6157622c3715782.yaml b/nuclei-templates/cve-less/plugins/custom-base-terms-59797dde213a6367a6157622c3715782.yaml new file mode 100644 index 0000000000..adc5b460a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-base-terms-59797dde213a6367a6157622c3715782.yaml @@ -0,0 +1,58 @@ +id: custom-base-terms-59797dde213a6367a6157622c3715782 + +info: + name: > + Custom Base Terms <= 1.0.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'base' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6292935-a67e-4b59-9b3c-0b71365193b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-base-terms/" + google-query: inurl:"/wp-content/plugins/custom-base-terms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-base-terms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-base-terms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-base-terms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-codes-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/custom-codes-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9815d457cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-codes-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: custom-codes-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-codes/" + google-query: inurl:"/wp-content/plugins/custom-codes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-codes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-codes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-codes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-colors-for-real-estate-manager-26658d0497122e0a7345c841c1d21163.yaml b/nuclei-templates/cve-less/plugins/custom-colors-for-real-estate-manager-26658d0497122e0a7345c841c1d21163.yaml new file mode 100644 index 0000000000..a794a2f0d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-colors-for-real-estate-manager-26658d0497122e0a7345c841c1d21163.yaml @@ -0,0 +1,58 @@ +id: custom-colors-for-real-estate-manager-26658d0497122e0a7345c841c1d21163 + +info: + name: > + Custom Colors for Real Estate Manager <= 1.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcc96838-dde5-49f2-ac73-977a8347c455?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-colors-for-real-estate-manager/" + google-query: inurl:"/wp-content/plugins/custom-colors-for-real-estate-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-colors-for-real-estate-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-colors-for-real-estate-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-colors-for-real-estate-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-contact-forms-b5107e8a16fdf42082a09176739d6a43.yaml b/nuclei-templates/cve-less/plugins/custom-contact-forms-b5107e8a16fdf42082a09176739d6a43.yaml new file mode 100644 index 0000000000..3d87caf1ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-contact-forms-b5107e8a16fdf42082a09176739d6a43.yaml @@ -0,0 +1,58 @@ +id: custom-contact-forms-b5107e8a16fdf42082a09176739d6a43 + +info: + name: > + Custom Contact Forms <= 5.1.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d3bfb78-0538-4627-a206-8d8b5b200bc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-contact-forms/" + google-query: inurl:"/wp-content/plugins/custom-contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-contact-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-contact-forms-cc09a89f63ab3cefb7813241a6ecaf00.yaml b/nuclei-templates/cve-less/plugins/custom-contact-forms-cc09a89f63ab3cefb7813241a6ecaf00.yaml new file mode 100644 index 0000000000..284ff753e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-contact-forms-cc09a89f63ab3cefb7813241a6ecaf00.yaml @@ -0,0 +1,58 @@ +id: custom-contact-forms-cc09a89f63ab3cefb7813241a6ecaf00 + +info: + name: > + Custom Contact Forms Plugin <= 5.1.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5454bc2-0581-45bd-8dbc-5a2819202690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-contact-forms/" + google-query: inurl:"/wp-content/plugins/custom-contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-contact-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-content-by-country-d5a15b7cded52d19f32afbdd2169bb8f.yaml b/nuclei-templates/cve-less/plugins/custom-content-by-country-d5a15b7cded52d19f32afbdd2169bb8f.yaml new file mode 100644 index 0000000000..c513d8be25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-content-by-country-d5a15b7cded52d19f32afbdd2169bb8f.yaml @@ -0,0 +1,58 @@ +id: custom-content-by-country-d5a15b7cded52d19f32afbdd2169bb8f + +info: + name: > + Custom Content by Country <= 3.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b84cc59-3820-4aba-a2d7-fa884b46c5b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-content-by-country/" + google-query: inurl:"/wp-content/plugins/custom-content-by-country/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-content-by-country,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-content-by-country/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-content-by-country" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-content-shortcode-250d58918649c83e91a9349c1cb1cbf0.yaml b/nuclei-templates/cve-less/plugins/custom-content-shortcode-250d58918649c83e91a9349c1cb1cbf0.yaml new file mode 100644 index 0000000000..31ab64b866 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-content-shortcode-250d58918649c83e91a9349c1cb1cbf0.yaml @@ -0,0 +1,58 @@ +id: custom-content-shortcode-250d58918649c83e91a9349c1cb1cbf0 + +info: + name: > + Custom Content Shortcode <= 4.0.2 - Authenticated (Contributor+) Local File Inclusion via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d245dc6c-c579-4e28-a953-9227261911d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-content-shortcode/" + google-query: inurl:"/wp-content/plugins/custom-content-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-content-shortcode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-content-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-content-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-content-shortcode-2c26192ebe7847230519e6e8ccb48b5f.yaml b/nuclei-templates/cve-less/plugins/custom-content-shortcode-2c26192ebe7847230519e6e8ccb48b5f.yaml new file mode 100644 index 0000000000..e9a63b5d2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-content-shortcode-2c26192ebe7847230519e6e8ccb48b5f.yaml @@ -0,0 +1,58 @@ +id: custom-content-shortcode-2c26192ebe7847230519e6e8ccb48b5f + +info: + name: > + Custom Content Shortcode <= 4.0.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53459a4d-6ffd-46bf-926a-761db4cfb50c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-content-shortcode/" + google-query: inurl:"/wp-content/plugins/custom-content-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-content-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-content-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-content-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-content-shortcode-bdd19c036429e94932241df6aef820bd.yaml b/nuclei-templates/cve-less/plugins/custom-content-shortcode-bdd19c036429e94932241df6aef820bd.yaml new file mode 100644 index 0000000000..0304b65294 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-content-shortcode-bdd19c036429e94932241df6aef820bd.yaml @@ -0,0 +1,58 @@ +id: custom-content-shortcode-bdd19c036429e94932241df6aef820bd + +info: + name: > + Custom Content Shortcode <= 3.8.8 - Unauthorised Arbitrary Post Metadata Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d2e3252-454c-47a2-a09d-5d0474c82e2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-content-shortcode/" + google-query: inurl:"/wp-content/plugins/custom-content-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-content-shortcode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-content-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-content-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-content-shortcode-ef34cbe0110e2c6603d8d105d71a9566.yaml b/nuclei-templates/cve-less/plugins/custom-content-shortcode-ef34cbe0110e2c6603d8d105d71a9566.yaml new file mode 100644 index 0000000000..b3091b580d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-content-shortcode-ef34cbe0110e2c6603d8d105d71a9566.yaml @@ -0,0 +1,58 @@ +id: custom-content-shortcode-ef34cbe0110e2c6603d8d105d71a9566 + +info: + name: > + Custom Content Shortcode <= 4.0.1 - Authenticated Arbitrary File Access / Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2a825e4-3ffc-4412-81f4-6992dbbe756b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-content-shortcode/" + google-query: inurl:"/wp-content/plugins/custom-content-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-content-shortcode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-content-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-content-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-content-shortcode-fe4470deb32fffc7ae711831b5c4f60c.yaml b/nuclei-templates/cve-less/plugins/custom-content-shortcode-fe4470deb32fffc7ae711831b5c4f60c.yaml new file mode 100644 index 0000000000..5a7f44e222 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-content-shortcode-fe4470deb32fffc7ae711831b5c4f60c.yaml @@ -0,0 +1,58 @@ +id: custom-content-shortcode-fe4470deb32fffc7ae711831b5c4f60c + +info: + name: > + Custom Content Shortcode <= 4.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c26e2aea-835e-4462-b4e3-99d2caf3a014?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-content-shortcode/" + google-query: inurl:"/wp-content/plugins/custom-content-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-content-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-content-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-content-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-content-type-manager-262dd6c0036b365e35ff5544b3d1cf02.yaml b/nuclei-templates/cve-less/plugins/custom-content-type-manager-262dd6c0036b365e35ff5544b3d1cf02.yaml new file mode 100644 index 0000000000..10bba8cc58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-content-type-manager-262dd6c0036b365e35ff5544b3d1cf02.yaml @@ -0,0 +1,58 @@ +id: custom-content-type-manager-262dd6c0036b365e35ff5544b3d1cf02 + +info: + name: > + Custom Content Type Manager <= 0.9.8.5 - Authenticated (Admin+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdb483db-56f7-4d12-9022-46c829091cc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-content-type-manager/" + google-query: inurl:"/wp-content/plugins/custom-content-type-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-content-type-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-content-type-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-content-type-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-content-type-manager-b81d401412f069e93cf6d2de27788cec.yaml b/nuclei-templates/cve-less/plugins/custom-content-type-manager-b81d401412f069e93cf6d2de27788cec.yaml new file mode 100644 index 0000000000..21ec7709bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-content-type-manager-b81d401412f069e93cf6d2de27788cec.yaml @@ -0,0 +1,58 @@ +id: custom-content-type-manager-b81d401412f069e93cf6d2de27788cec + +info: + name: > + Custom Content Type Manager 0.9.8.7 - 0.9.8.8 - Malicious Backdoor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1b6fe67-cbd8-438f-8e06-d0f25eddc81a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-content-type-manager/" + google-query: inurl:"/wp-content/plugins/custom-content-type-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-content-type-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-content-type-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-content-type-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.9.8.7', '<= 0.9.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-css-ae09c1b4732804e06d23d0fb90974789.yaml b/nuclei-templates/cve-less/plugins/custom-css-ae09c1b4732804e06d23d0fb90974789.yaml new file mode 100644 index 0000000000..3f3aae2f64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-css-ae09c1b4732804e06d23d0fb90974789.yaml @@ -0,0 +1,58 @@ +id: custom-css-ae09c1b4732804e06d23d0fb90974789 + +info: + name: > + Custom CSS, JS & PHP <= 2.0.7 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d21dc02f-789c-497e-9d01-02fa49bf9e30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-css/" + google-query: inurl:"/wp-content/plugins/custom-css/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-css,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-css/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-css" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-css-js-237f33dd283cbe8ba991ef6c6d099f49.yaml b/nuclei-templates/cve-less/plugins/custom-css-js-237f33dd283cbe8ba991ef6c6d099f49.yaml new file mode 100644 index 0000000000..8aae6ff082 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-css-js-237f33dd283cbe8ba991ef6c6d099f49.yaml @@ -0,0 +1,58 @@ +id: custom-css-js-237f33dd283cbe8ba991ef6c6d099f49 + +info: + name: > + Simple Custom CSS and JS <= 3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01c9f196-bcf1-401b-992a-e7a60f9447f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-css-js/" + google-query: inurl:"/wp-content/plugins/custom-css-js/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-css-js,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-css-js/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-css-js" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-css-pro-ee68c39b627e562f2e3f279eade2d8f3.yaml b/nuclei-templates/cve-less/plugins/custom-css-pro-ee68c39b627e562f2e3f279eade2d8f3.yaml new file mode 100644 index 0000000000..a6194bb388 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-css-pro-ee68c39b627e562f2e3f279eade2d8f3.yaml @@ -0,0 +1,58 @@ +id: custom-css-pro-ee68c39b627e562f2e3f279eade2d8f3 + +info: + name: > + Custom CSS Pro <= 1.0.3 - Cross-site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bb785cf-9924-4b47-ac89-5273c6ba8ee6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-css-pro/" + google-query: inurl:"/wp-content/plugins/custom-css-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-css-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-css-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-css-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-dashboard-widgets-521091f698c90705cd994fe26c1eef68.yaml b/nuclei-templates/cve-less/plugins/custom-dashboard-widgets-521091f698c90705cd994fe26c1eef68.yaml new file mode 100644 index 0000000000..70b53bd231 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-dashboard-widgets-521091f698c90705cd994fe26c1eef68.yaml @@ -0,0 +1,58 @@ +id: custom-dashboard-widgets-521091f698c90705cd994fe26c1eef68 + +info: + name: > + Custom Dashboard Widgets <= 1.3.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting via cdw_DashboardWidgets + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3208426a-379d-46b9-a9e7-654604169929?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-dashboard-widgets/" + google-query: inurl:"/wp-content/plugins/custom-dashboard-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-dashboard-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-dashboard-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-dashboard-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-email-options-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/custom-email-options-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..0637b1ddc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-email-options-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: custom-email-options-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-email-options/" + google-query: inurl:"/wp-content/plugins/custom-email-options/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-email-options,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-email-options/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-email-options" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-facebook-feed-167f18c0fe5e035801a709b220b7d533.yaml b/nuclei-templates/cve-less/plugins/custom-facebook-feed-167f18c0fe5e035801a709b220b7d533.yaml new file mode 100644 index 0000000000..c7b7d8860b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-facebook-feed-167f18c0fe5e035801a709b220b7d533.yaml @@ -0,0 +1,58 @@ +id: custom-facebook-feed-167f18c0fe5e035801a709b220b7d533 + +info: + name: > + Smash Balloon Social Post Feed <= 4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01889c7b-f47b-4caf-8e35-4f8af188426e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-facebook-feed/" + google-query: inurl:"/wp-content/plugins/custom-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-facebook-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-facebook-feed-4c7bbe6117155e4a798748fa2ed8fb9c.yaml b/nuclei-templates/cve-less/plugins/custom-facebook-feed-4c7bbe6117155e4a798748fa2ed8fb9c.yaml new file mode 100644 index 0000000000..b628c4e766 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-facebook-feed-4c7bbe6117155e4a798748fa2ed8fb9c.yaml @@ -0,0 +1,58 @@ +id: custom-facebook-feed-4c7bbe6117155e4a798748fa2ed8fb9c + +info: + name: > + Smash Balloon Social Post Feed <= 2.19.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a2c96a1-bbab-41ed-aafd-6a6f569242f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-facebook-feed/" + google-query: inurl:"/wp-content/plugins/custom-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-facebook-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.19.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-facebook-feed-4f470840b5c22d9fdd8f597a9956aef0.yaml b/nuclei-templates/cve-less/plugins/custom-facebook-feed-4f470840b5c22d9fdd8f597a9956aef0.yaml new file mode 100644 index 0000000000..bb6bd7ca7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-facebook-feed-4f470840b5c22d9fdd8f597a9956aef0.yaml @@ -0,0 +1,58 @@ +id: custom-facebook-feed-4f470840b5c22d9fdd8f597a9956aef0 + +info: + name: > + Smash Balloon Social Post Feed <= 4.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fb28dab-1c65-47da-98f7-9eecf5f7466d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-facebook-feed/" + google-query: inurl:"/wp-content/plugins/custom-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-facebook-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-facebook-feed-58a423ad62b9e5f8da38c911a8b01c5e.yaml b/nuclei-templates/cve-less/plugins/custom-facebook-feed-58a423ad62b9e5f8da38c911a8b01c5e.yaml new file mode 100644 index 0000000000..85958d7791 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-facebook-feed-58a423ad62b9e5f8da38c911a8b01c5e.yaml @@ -0,0 +1,58 @@ +id: custom-facebook-feed-58a423ad62b9e5f8da38c911a8b01c5e + +info: + name: > + Smash Balloon Social Post Feed <= 4.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/623b139e-c5a1-4d2e-b05c-72707f421ef8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-facebook-feed/" + google-query: inurl:"/wp-content/plugins/custom-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-facebook-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-facebook-feed-ac43cf44566479227a4aa05f1f51c953.yaml b/nuclei-templates/cve-less/plugins/custom-facebook-feed-ac43cf44566479227a4aa05f1f51c953.yaml new file mode 100644 index 0000000000..9b7e90d696 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-facebook-feed-ac43cf44566479227a4aa05f1f51c953.yaml @@ -0,0 +1,58 @@ +id: custom-facebook-feed-ac43cf44566479227a4aa05f1f51c953 + +info: + name: > + Smash Balloon Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0efff314-b14f-4af4-b225-ba7e41d01b2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-facebook-feed/" + google-query: inurl:"/wp-content/plugins/custom-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-facebook-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-facebook-feed-da6dd99d1493b082c05d60ab888f9ef0.yaml b/nuclei-templates/cve-less/plugins/custom-facebook-feed-da6dd99d1493b082c05d60ab888f9ef0.yaml new file mode 100644 index 0000000000..d29cd413a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-facebook-feed-da6dd99d1493b082c05d60ab888f9ef0.yaml @@ -0,0 +1,58 @@ +id: custom-facebook-feed-da6dd99d1493b082c05d60ab888f9ef0 + +info: + name: > + Smash Balloon Social Post Feed <= 4.0 - Arbitrary Plugin Settings Update to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74fac72d-6f16-475c-bc80-e77968dd23ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-facebook-feed/" + google-query: inurl:"/wp-content/plugins/custom-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-facebook-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-bulk-editor-5dbb9b01c1ce63e54b37aeec51a21a8e.yaml b/nuclei-templates/cve-less/plugins/custom-field-bulk-editor-5dbb9b01c1ce63e54b37aeec51a21a8e.yaml new file mode 100644 index 0000000000..3f096eb97e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-bulk-editor-5dbb9b01c1ce63e54b37aeec51a21a8e.yaml @@ -0,0 +1,58 @@ +id: custom-field-bulk-editor-5dbb9b01c1ce63e54b37aeec51a21a8e + +info: + name: > + Custom Field Bulk Editor <= 1.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e127217-fd2a-4b8b-a6a5-85e246bc1289?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-bulk-editor/" + google-query: inurl:"/wp-content/plugins/custom-field-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-finder-38fb53416dee6ab7b6bba5cadf55c4c5.yaml b/nuclei-templates/cve-less/plugins/custom-field-finder-38fb53416dee6ab7b6bba5cadf55c4c5.yaml new file mode 100644 index 0000000000..e2cbb18fd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-finder-38fb53416dee6ab7b6bba5cadf55c4c5.yaml @@ -0,0 +1,58 @@ +id: custom-field-finder-38fb53416dee6ab7b6bba5cadf55c4c5 + +info: + name: > + Custom field finder <= 0.3 - Authenticated (Author+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfc78684-fdb7-4ce1-8464-0d057b48a7fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-finder/" + google-query: inurl:"/wp-content/plugins/custom-field-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-finder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-finder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-for-wp-job-manager-1b076d88024e9e8fa50fb517fb49e6d5.yaml b/nuclei-templates/cve-less/plugins/custom-field-for-wp-job-manager-1b076d88024e9e8fa50fb517fb49e6d5.yaml new file mode 100644 index 0000000000..50fcffbc65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-for-wp-job-manager-1b076d88024e9e8fa50fb517fb49e6d5.yaml @@ -0,0 +1,58 @@ +id: custom-field-for-wp-job-manager-1b076d88024e9e8fa50fb517fb49e6d5 + +info: + name: > + Custom Field For WP Job Manager <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f504434-2de9-4d2e-848d-6c7fc0880672?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-for-wp-job-manager/" + google-query: inurl:"/wp-content/plugins/custom-field-for-wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-for-wp-job-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-for-wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-for-wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-for-wp-job-manager-c6eebad0122883aa540363f1389d9ced.yaml b/nuclei-templates/cve-less/plugins/custom-field-for-wp-job-manager-c6eebad0122883aa540363f1389d9ced.yaml new file mode 100644 index 0000000000..667433dfb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-for-wp-job-manager-c6eebad0122883aa540363f1389d9ced.yaml @@ -0,0 +1,58 @@ +id: custom-field-for-wp-job-manager-c6eebad0122883aa540363f1389d9ced + +info: + name: > + Custom Field For WP Job Manager <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e651766b-705d-415d-90bc-8b4f4418222c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-for-wp-job-manager/" + google-query: inurl:"/wp-content/plugins/custom-field-for-wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-for-wp-job-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-for-wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-for-wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-suite-30ced7d36e2903b8ecf83d1c6ae8e869.yaml b/nuclei-templates/cve-less/plugins/custom-field-suite-30ced7d36e2903b8ecf83d1c6ae8e869.yaml new file mode 100644 index 0000000000..4fef46c5ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-suite-30ced7d36e2903b8ecf83d1c6ae8e869.yaml @@ -0,0 +1,58 @@ +id: custom-field-suite-30ced7d36e2903b8ecf83d1c6ae8e869 + +info: + name: > + Custom Field Suite <= 2.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8e967ce-fd36-44de-acca-c1985642ee5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-suite/" + google-query: inurl:"/wp-content/plugins/custom-field-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-suite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-suite-5914d2a62c6e9fda2e52358bd6a051ee.yaml b/nuclei-templates/cve-less/plugins/custom-field-suite-5914d2a62c6e9fda2e52358bd6a051ee.yaml new file mode 100644 index 0000000000..7caba9be5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-suite-5914d2a62c6e9fda2e52358bd6a051ee.yaml @@ -0,0 +1,58 @@ +id: custom-field-suite-5914d2a62c6e9fda2e52358bd6a051ee + +info: + name: > + Custom Field Suite <= 2.6.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a15946b-c4df-43e8-9e1d-7a8367cfda6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-suite/" + google-query: inurl:"/wp-content/plugins/custom-field-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-suite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-suite-aeb1af030c75596a2eb738838b5e8bf8.yaml b/nuclei-templates/cve-less/plugins/custom-field-suite-aeb1af030c75596a2eb738838b5e8bf8.yaml new file mode 100644 index 0000000000..08af3a5d9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-suite-aeb1af030c75596a2eb738838b5e8bf8.yaml @@ -0,0 +1,58 @@ +id: custom-field-suite-aeb1af030c75596a2eb738838b5e8bf8 + +info: + name: > + Custom Field Suite <= 2.5.14 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e4fec06-13d3-49ce-afe5-8dca15cf1f0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-suite/" + google-query: inurl:"/wp-content/plugins/custom-field-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-suite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-suite-f388cd40277e7ac72bbf02fcf8235c63.yaml b/nuclei-templates/cve-less/plugins/custom-field-suite-f388cd40277e7ac72bbf02fcf8235c63.yaml new file mode 100644 index 0000000000..dad666a488 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-suite-f388cd40277e7ac72bbf02fcf8235c63.yaml @@ -0,0 +1,58 @@ +id: custom-field-suite-f388cd40277e7ac72bbf02fcf8235c63 + +info: + name: > + Custom Field Suite <= 2.6.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ab546cc-b099-4d26-bf42-785952fcfd8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-suite/" + google-query: inurl:"/wp-content/plugins/custom-field-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-suite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-suite-f70de88be0d0ac1b3e5a362aa6fdf31c.yaml b/nuclei-templates/cve-less/plugins/custom-field-suite-f70de88be0d0ac1b3e5a362aa6fdf31c.yaml new file mode 100644 index 0000000000..e56dd420a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-suite-f70de88be0d0ac1b3e5a362aa6fdf31c.yaml @@ -0,0 +1,58 @@ +id: custom-field-suite-f70de88be0d0ac1b3e5a362aa6fdf31c + +info: + name: > + Custom Field Suite <= 2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0793a054-b213-4519-bc30-ce835979248b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-suite/" + google-query: inurl:"/wp-content/plugins/custom-field-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-suite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-template-41a8bca5b4e509ff5992617799743aa0.yaml b/nuclei-templates/cve-less/plugins/custom-field-template-41a8bca5b4e509ff5992617799743aa0.yaml new file mode 100644 index 0000000000..5aaf541124 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-template-41a8bca5b4e509ff5992617799743aa0.yaml @@ -0,0 +1,58 @@ +id: custom-field-template-41a8bca5b4e509ff5992617799743aa0 + +info: + name: > + Custom Field Template <= 2.5.7 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22a5020a-ab81-43be-b160-082347a2a2d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-template/" + google-query: inurl:"/wp-content/plugins/custom-field-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-template,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-template-994931528097feea63f63eaaf2d7d1d0.yaml b/nuclei-templates/cve-less/plugins/custom-field-template-994931528097feea63f63eaaf2d7d1d0.yaml new file mode 100644 index 0000000000..3bf9c835ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-template-994931528097feea63f63eaaf2d7d1d0.yaml @@ -0,0 +1,58 @@ +id: custom-field-template-994931528097feea63f63eaaf2d7d1d0 + +info: + name: > + Custom Field Template <= 2.5.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3444c4b0-4619-482f-8313-d3006aa1e845?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-template/" + google-query: inurl:"/wp-content/plugins/custom-field-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-template-bf719546b14904a6ed90c49ad64d0d09.yaml b/nuclei-templates/cve-less/plugins/custom-field-template-bf719546b14904a6ed90c49ad64d0d09.yaml new file mode 100644 index 0000000000..999d4ef2ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-template-bf719546b14904a6ed90c49ad64d0d09.yaml @@ -0,0 +1,58 @@ +id: custom-field-template-bf719546b14904a6ed90c49ad64d0d09 + +info: + name: > + Custom Field Template <= 2.5.8 - Cross-Site Request Forgery via Plugin Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b55853e1-2f20-417f-b07e-eda758eaed32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-template/" + google-query: inurl:"/wp-content/plugins/custom-field-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-template-d21e7c2b8075bc32648e9e728716b83f.yaml b/nuclei-templates/cve-less/plugins/custom-field-template-d21e7c2b8075bc32648e9e728716b83f.yaml new file mode 100644 index 0000000000..747d345202 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-template-d21e7c2b8075bc32648e9e728716b83f.yaml @@ -0,0 +1,58 @@ +id: custom-field-template-d21e7c2b8075bc32648e9e728716b83f + +info: + name: > + Custom Field Template <= 2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via $search_label + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec47ffee-0599-4f16-a71d-d17dcfe9b183?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-template/" + google-query: inurl:"/wp-content/plugins/custom-field-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-field-template-e43554bdd9278f30da878de76ec696d2.yaml b/nuclei-templates/cve-less/plugins/custom-field-template-e43554bdd9278f30da878de76ec696d2.yaml new file mode 100644 index 0000000000..88eab53c6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-field-template-e43554bdd9278f30da878de76ec696d2.yaml @@ -0,0 +1,58 @@ +id: custom-field-template-e43554bdd9278f30da878de76ec696d2 + +info: + name: > + Custom Field Template <= 2.5.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/752a07c4-ae88-4152-b449-68228a54604a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-field-template/" + google-query: inurl:"/wp-content/plugins/custom-field-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-field-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-field-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-field-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-fields-search-f6d418df63a84992a5e6e409836b9a8e.yaml b/nuclei-templates/cve-less/plugins/custom-fields-search-f6d418df63a84992a5e6e409836b9a8e.yaml new file mode 100644 index 0000000000..55b30f7b24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-fields-search-f6d418df63a84992a5e6e409836b9a8e.yaml @@ -0,0 +1,58 @@ +id: custom-fields-search-f6d418df63a84992a5e6e409836b9a8e + +info: + name: > + Custom Fields Search by BestWebSoft < 1.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73442cf9-615a-47a0-860e-fb8263ae65ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-fields-search/" + google-query: inurl:"/wp-content/plugins/custom-fields-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-fields-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-fields-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-fields-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-fields-shortcode-8199a4f2b40a6eabf0daf50bba86ea3b.yaml b/nuclei-templates/cve-less/plugins/custom-fields-shortcode-8199a4f2b40a6eabf0daf50bba86ea3b.yaml new file mode 100644 index 0000000000..fba49cb98d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-fields-shortcode-8199a4f2b40a6eabf0daf50bba86ea3b.yaml @@ -0,0 +1,58 @@ +id: custom-fields-shortcode-8199a4f2b40a6eabf0daf50bba86ea3b + +info: + name: > + Custom fields shortcode <= 0.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99d3d5aa-dd82-415a-bc40-9d2c677d9248?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-fields-shortcode/" + google-query: inurl:"/wp-content/plugins/custom-fields-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-fields-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-fields-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-fields-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-font-uploader-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/custom-font-uploader-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..cb2510b948 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-font-uploader-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: custom-font-uploader-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-font-uploader/" + google-query: inurl:"/wp-content/plugins/custom-font-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-font-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-font-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-font-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-global-variables-1e3e94ac66c9cccf9af54623829f9f1e.yaml b/nuclei-templates/cve-less/plugins/custom-global-variables-1e3e94ac66c9cccf9af54623829f9f1e.yaml new file mode 100644 index 0000000000..f4ccb16104 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-global-variables-1e3e94ac66c9cccf9af54623829f9f1e.yaml @@ -0,0 +1,58 @@ +id: custom-global-variables-1e3e94ac66c9cccf9af54623829f9f1e + +info: + name: > + Custom Global Variables <= 1.0.5 - Stored Cross-Site Scripting via 'name' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec6f2c0d-4d92-4982-995d-5d8a9866b888?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-global-variables/" + google-query: inurl:"/wp-content/plugins/custom-global-variables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-global-variables,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-global-variables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-global-variables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-header-images-efdfea6c2ba24e39c6bc0574220a9327.yaml b/nuclei-templates/cve-less/plugins/custom-header-images-efdfea6c2ba24e39c6bc0574220a9327.yaml new file mode 100644 index 0000000000..0cd2d76a4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-header-images-efdfea6c2ba24e39c6bc0574220a9327.yaml @@ -0,0 +1,58 @@ +id: custom-header-images-efdfea6c2ba24e39c6bc0574220a9327 + +info: + name: > + Custom Header Images <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0beaa7ce-40aa-429e-80fd-d04e75489b92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-header-images/" + google-query: inurl:"/wp-content/plugins/custom-header-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-header-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-header-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-header-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-landing-pages-leadmagic-c0cb327a973fcb4e19ac20c22cf757a3.yaml b/nuclei-templates/cve-less/plugins/custom-landing-pages-leadmagic-c0cb327a973fcb4e19ac20c22cf757a3.yaml new file mode 100644 index 0000000000..e12ccf9dae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-landing-pages-leadmagic-c0cb327a973fcb4e19ac20c22cf757a3.yaml @@ -0,0 +1,58 @@ +id: custom-landing-pages-leadmagic-c0cb327a973fcb4e19ac20c22cf757a3 + +info: + name: > + User Registration, Login & Landing Pages <= 1.2.7 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82173c1b-dce8-4713-87c7-2c54ba8cc02c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-landing-pages-leadmagic/" + google-query: inurl:"/wp-content/plugins/custom-landing-pages-leadmagic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-landing-pages-leadmagic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-landing-pages-leadmagic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-landing-pages-leadmagic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-login-325931d9fc1c27761908e3875605b580.yaml b/nuclei-templates/cve-less/plugins/custom-login-325931d9fc1c27761908e3875605b580.yaml new file mode 100644 index 0000000000..fbb6cad81b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-login-325931d9fc1c27761908e3875605b580.yaml @@ -0,0 +1,58 @@ +id: custom-login-325931d9fc1c27761908e3875605b580 + +info: + name: > + Custom Login <= 4.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b23afc11-c31d-4569-8f4b-8141eef7b3d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-login/" + google-query: inurl:"/wp-content/plugins/custom-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-login-admin-front-end-css-with-multisite-support-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/custom-login-admin-front-end-css-with-multisite-support-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..a6a838a13c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-login-admin-front-end-css-with-multisite-support-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: custom-login-admin-front-end-css-with-multisite-support-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-login-admin-front-end-css-with-multisite-support/" + google-query: inurl:"/wp-content/plugins/custom-login-admin-front-end-css-with-multisite-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-login-admin-front-end-css-with-multisite-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-login-admin-front-end-css-with-multisite-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-login-admin-front-end-css-with-multisite-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-login-redirect-58218c3064ab4e32ea67258adcb97a88.yaml b/nuclei-templates/cve-less/plugins/custom-login-redirect-58218c3064ab4e32ea67258adcb97a88.yaml new file mode 100644 index 0000000000..def1a4fe8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-login-redirect-58218c3064ab4e32ea67258adcb97a88.yaml @@ -0,0 +1,58 @@ +id: custom-login-redirect-58218c3064ab4e32ea67258adcb97a88 + +info: + name: > + Custom Login Redirect <= 1.0.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfeee1b9-2490-40ad-a49c-f18ed7b11070?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-login-redirect/" + google-query: inurl:"/wp-content/plugins/custom-login-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-login-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-login-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-login-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-map-afd7cbc1a6da1a4ae770134f7fa61d59.yaml b/nuclei-templates/cve-less/plugins/custom-map-afd7cbc1a6da1a4ae770134f7fa61d59.yaml new file mode 100644 index 0000000000..2945db2ba4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-map-afd7cbc1a6da1a4ae770134f7fa61d59.yaml @@ -0,0 +1,58 @@ +id: custom-map-afd7cbc1a6da1a4ae770134f7fa61d59 + +info: + name: > + Custom Map <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2694fd0-0ad6-4b64-b332-aa7bc2f74cd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-map/" + google-query: inurl:"/wp-content/plugins/custom-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-map,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-metas-bfcebe2d4bbc5af7082ecf54e71037c9.yaml b/nuclei-templates/cve-less/plugins/custom-metas-bfcebe2d4bbc5af7082ecf54e71037c9.yaml new file mode 100644 index 0000000000..a2adedcf51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-metas-bfcebe2d4bbc5af7082ecf54e71037c9.yaml @@ -0,0 +1,58 @@ +id: custom-metas-bfcebe2d4bbc5af7082ecf54e71037c9 + +info: + name: > + Custom Metas <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f5413be-76b8-457c-9236-3ef760f46d40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-metas/" + google-query: inurl:"/wp-content/plugins/custom-metas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-metas,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-metas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-metas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-more-link-complete-38be090459bf4011b3b41398d60796a6.yaml b/nuclei-templates/cve-less/plugins/custom-more-link-complete-38be090459bf4011b3b41398d60796a6.yaml new file mode 100644 index 0000000000..af8d16a967 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-more-link-complete-38be090459bf4011b3b41398d60796a6.yaml @@ -0,0 +1,58 @@ +id: custom-more-link-complete-38be090459bf4011b3b41398d60796a6 + +info: + name: > + Custom More Link Complete <= 1.4.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/698079d0-b539-431c-98c3-c69d0352d214?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-more-link-complete/" + google-query: inurl:"/wp-content/plugins/custom-more-link-complete/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-more-link-complete,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-more-link-complete/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-more-link-complete" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-my-account-for-woocommerce-8d1f98a443fa11a68eb0fbc9dc6290fa.yaml b/nuclei-templates/cve-less/plugins/custom-my-account-for-woocommerce-8d1f98a443fa11a68eb0fbc9dc6290fa.yaml new file mode 100644 index 0000000000..92e1674874 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-my-account-for-woocommerce-8d1f98a443fa11a68eb0fbc9dc6290fa.yaml @@ -0,0 +1,58 @@ +id: custom-my-account-for-woocommerce-8d1f98a443fa11a68eb0fbc9dc6290fa + +info: + name: > + Custom My Account for Woocommerce <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd00c5cc-1a28-4d94-815d-46219ce0e0e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-my-account-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/custom-my-account-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-my-account-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-my-account-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-my-account-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-options-plus-6a0d7503e007dc4edef85efcc548b100.yaml b/nuclei-templates/cve-less/plugins/custom-options-plus-6a0d7503e007dc4edef85efcc548b100.yaml new file mode 100644 index 0000000000..4192cd1a8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-options-plus-6a0d7503e007dc4edef85efcc548b100.yaml @@ -0,0 +1,58 @@ +id: custom-options-plus-6a0d7503e007dc4edef85efcc548b100 + +info: + name: > + Custom Options Plus <= 1.8.1 - Cross-Site Request Forgery via custom_options_plus_adm + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97c8858a-f05d-4159-b914-4e6ae9bf0d79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-options-plus/" + google-query: inurl:"/wp-content/plugins/custom-options-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-options-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-options-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-options-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-order-numbers-for-woocommerce-74ba5cc85102289a5d0b78a359268c6a.yaml b/nuclei-templates/cve-less/plugins/custom-order-numbers-for-woocommerce-74ba5cc85102289a5d0b78a359268c6a.yaml new file mode 100644 index 0000000000..57e1c02fe9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-order-numbers-for-woocommerce-74ba5cc85102289a5d0b78a359268c6a.yaml @@ -0,0 +1,58 @@ +id: custom-order-numbers-for-woocommerce-74ba5cc85102289a5d0b78a359268c6a + +info: + name: > + Custom Order Numbers for WooCommerce <= 1.6.0 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/981908d3-e1e7-4093-a2ee-69aa50127731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-order-numbers-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/custom-order-numbers-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-order-numbers-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-order-numbers-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-order-numbers-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-order-numbers-for-woocommerce-8f61fbaad0ace89497c5a7515dc4a1eb.yaml b/nuclei-templates/cve-less/plugins/custom-order-numbers-for-woocommerce-8f61fbaad0ace89497c5a7515dc4a1eb.yaml new file mode 100644 index 0000000000..07599b92e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-order-numbers-for-woocommerce-8f61fbaad0ace89497c5a7515dc4a1eb.yaml @@ -0,0 +1,58 @@ +id: custom-order-numbers-for-woocommerce-8f61fbaad0ace89497c5a7515dc4a1eb + +info: + name: > + Custom Order Numbers for WooCommerce <= 1.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d19800a-bff3-414f-a809-0159f49d263a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-order-numbers-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/custom-order-numbers-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-order-numbers-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-order-numbers-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-order-numbers-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-order-statuses-for-woocommerce-2862da944ba4b374cef11881cc898ccb.yaml b/nuclei-templates/cve-less/plugins/custom-order-statuses-for-woocommerce-2862da944ba4b374cef11881cc898ccb.yaml new file mode 100644 index 0000000000..3cd49f0aef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-order-statuses-for-woocommerce-2862da944ba4b374cef11881cc898ccb.yaml @@ -0,0 +1,58 @@ +id: custom-order-statuses-for-woocommerce-2862da944ba4b374cef11881cc898ccb + +info: + name: > + Custom Order Statuses for WooCommerce <= 1.5.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0981349-e627-4a3c-9972-01111a6b6140?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-order-statuses-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/custom-order-statuses-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-order-statuses-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-order-statuses-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-order-statuses-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-order-statuses-for-woocommerce-a9ddfb16bfebca41780e91a8896bacce.yaml b/nuclei-templates/cve-less/plugins/custom-order-statuses-for-woocommerce-a9ddfb16bfebca41780e91a8896bacce.yaml new file mode 100644 index 0000000000..ae112402c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-order-statuses-for-woocommerce-a9ddfb16bfebca41780e91a8896bacce.yaml @@ -0,0 +1,58 @@ +id: custom-order-statuses-for-woocommerce-a9ddfb16bfebca41780e91a8896bacce + +info: + name: > + Custom Order Statuses for WooCommerce <= 1.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6dadbb0-1ebe-43ff-b220-0c93d0f51d87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-order-statuses-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/custom-order-statuses-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-order-statuses-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-order-statuses-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-order-statuses-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-order-statuses-woocommerce-bab11b77c0b278513f67c7444868950c.yaml b/nuclei-templates/cve-less/plugins/custom-order-statuses-woocommerce-bab11b77c0b278513f67c7444868950c.yaml new file mode 100644 index 0000000000..a70a4198bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-order-statuses-woocommerce-bab11b77c0b278513f67c7444868950c.yaml @@ -0,0 +1,58 @@ +id: custom-order-statuses-woocommerce-bab11b77c0b278513f67c7444868950c + +info: + name: > + Custom Order Status for WooCommerce <= 2.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab2a4903-2c69-48da-bd4a-79b39b78806c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-order-statuses-woocommerce/" + google-query: inurl:"/wp-content/plugins/custom-order-statuses-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-order-statuses-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-order-statuses-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-order-statuses-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-page-templates-by-vegacorp-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/custom-page-templates-by-vegacorp-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..49ebe2333c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-page-templates-by-vegacorp-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: custom-page-templates-by-vegacorp-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-page-templates-by-vegacorp/" + google-query: inurl:"/wp-content/plugins/custom-page-templates-by-vegacorp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-page-templates-by-vegacorp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-page-templates-by-vegacorp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-page-templates-by-vegacorp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-permalinks-a4a1da4d7b74087a323eb167fd7b89be.yaml b/nuclei-templates/cve-less/plugins/custom-permalinks-a4a1da4d7b74087a323eb167fd7b89be.yaml new file mode 100644 index 0000000000..6bb477a3a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-permalinks-a4a1da4d7b74087a323eb167fd7b89be.yaml @@ -0,0 +1,58 @@ +id: custom-permalinks-a4a1da4d7b74087a323eb167fd7b89be + +info: + name: > + Custom Permalinks <= 1.1 -Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d1a12b9-ac2e-4c60-8dd5-484944bb0ab8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-permalinks/" + google-query: inurl:"/wp-content/plugins/custom-permalinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-permalinks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-permalinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-permalinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-permalinks-b5323eb3191a74d0ae4ca412560414da.yaml b/nuclei-templates/cve-less/plugins/custom-permalinks-b5323eb3191a74d0ae4ca412560414da.yaml new file mode 100644 index 0000000000..6943e5cadb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-permalinks-b5323eb3191a74d0ae4ca412560414da.yaml @@ -0,0 +1,58 @@ +id: custom-permalinks-b5323eb3191a74d0ae4ca412560414da + +info: + name: > + Custom Permalinks <= 1.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c9a5613-770f-4294-997e-17fd5194ab70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-permalinks/" + google-query: inurl:"/wp-content/plugins/custom-permalinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-permalinks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-permalinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-permalinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-type-cpt-cusom-taxonomy-ct-manager-2ec0e7698cdea1d83725ecb0fba1cce8.yaml b/nuclei-templates/cve-less/plugins/custom-post-type-cpt-cusom-taxonomy-ct-manager-2ec0e7698cdea1d83725ecb0fba1cce8.yaml new file mode 100644 index 0000000000..ad65ce3a1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-type-cpt-cusom-taxonomy-ct-manager-2ec0e7698cdea1d83725ecb0fba1cce8.yaml @@ -0,0 +1,58 @@ +id: custom-post-type-cpt-cusom-taxonomy-ct-manager-2ec0e7698cdea1d83725ecb0fba1cce8 + +info: + name: > + Custom Post Type and Taxonomy GUI Manager <= 1.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26c75a0a-8590-4ac7-814e-29e0c2d0822e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-type-cpt-cusom-taxonomy-ct-manager/" + google-query: inurl:"/wp-content/plugins/custom-post-type-cpt-cusom-taxonomy-ct-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-type-cpt-cusom-taxonomy-ct-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-type-cpt-cusom-taxonomy-ct-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-type-cpt-cusom-taxonomy-ct-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-type-generator-b832c46935cda704a801fdf109478436.yaml b/nuclei-templates/cve-less/plugins/custom-post-type-generator-b832c46935cda704a801fdf109478436.yaml new file mode 100644 index 0000000000..ebabb0a6fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-type-generator-b832c46935cda704a801fdf109478436.yaml @@ -0,0 +1,58 @@ +id: custom-post-type-generator-b832c46935cda704a801fdf109478436 + +info: + name: > + Custom Post Type Generator <= 2.4.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23a2b1ac-2183-48ae-8376-fb950fe83fd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-type-generator/" + google-query: inurl:"/wp-content/plugins/custom-post-type-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-type-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-type-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-type-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-type-list-shortcode-7a94ec5884e06f0a302f2bb4d1ea7e80.yaml b/nuclei-templates/cve-less/plugins/custom-post-type-list-shortcode-7a94ec5884e06f0a302f2bb4d1ea7e80.yaml new file mode 100644 index 0000000000..9c82330857 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-type-list-shortcode-7a94ec5884e06f0a302f2bb4d1ea7e80.yaml @@ -0,0 +1,58 @@ +id: custom-post-type-list-shortcode-7a94ec5884e06f0a302f2bb4d1ea7e80 + +info: + name: > + Custom Post Type List Shortcode <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b702f507-475a-4d45-8bb1-635f5f377c88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-type-list-shortcode/" + google-query: inurl:"/wp-content/plugins/custom-post-type-list-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-type-list-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-type-list-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-type-list-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-type-page-template-41234e0f9201b9670d0979855b89255d.yaml b/nuclei-templates/cve-less/plugins/custom-post-type-page-template-41234e0f9201b9670d0979855b89255d.yaml new file mode 100644 index 0000000000..ce037fc60c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-type-page-template-41234e0f9201b9670d0979855b89255d.yaml @@ -0,0 +1,58 @@ +id: custom-post-type-page-template-41234e0f9201b9670d0979855b89255d + +info: + name: > + Custom Post Type Page Template <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ff05617-61b1-4d1f-9230-c771f23d3283?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-type-page-template/" + google-query: inurl:"/wp-content/plugins/custom-post-type-page-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-type-page-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-type-page-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-type-page-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-type-relations-e40fd02f8747cfe679a9add88aabc8af.yaml b/nuclei-templates/cve-less/plugins/custom-post-type-relations-e40fd02f8747cfe679a9add88aabc8af.yaml new file mode 100644 index 0000000000..2dcace51ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-type-relations-e40fd02f8747cfe679a9add88aabc8af.yaml @@ -0,0 +1,58 @@ +id: custom-post-type-relations-e40fd02f8747cfe679a9add88aabc8af + +info: + name: > + Custom Post Type Relations <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74cc9d91-5b6a-48fc-8bd1-01100b45ffdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-type-relations/" + google-query: inurl:"/wp-content/plugins/custom-post-type-relations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-type-relations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-type-relations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-type-relations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-type-ui-797454d6297b04e0aa32a4dcc6b7a524.yaml b/nuclei-templates/cve-less/plugins/custom-post-type-ui-797454d6297b04e0aa32a4dcc6b7a524.yaml new file mode 100644 index 0000000000..0ad020e97e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-type-ui-797454d6297b04e0aa32a4dcc6b7a524.yaml @@ -0,0 +1,58 @@ +id: custom-post-type-ui-797454d6297b04e0aa32a4dcc6b7a524 + +info: + name: > + Custom Post Type UI <= 1.13.4 - Cross-Site Request Forgery to Sensitive Information Exposure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f28afb93-b72a-4a56-994b-144124202147?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-type-ui/" + google-query: inurl:"/wp-content/plugins/custom-post-type-ui/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-type-ui,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-type-ui/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-type-ui" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-type-ui-cc0bb9dcf67e5af12d7fa45c43bf04f1.yaml b/nuclei-templates/cve-less/plugins/custom-post-type-ui-cc0bb9dcf67e5af12d7fa45c43bf04f1.yaml new file mode 100644 index 0000000000..6f6be6dad9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-type-ui-cc0bb9dcf67e5af12d7fa45c43bf04f1.yaml @@ -0,0 +1,58 @@ +id: custom-post-type-ui-cc0bb9dcf67e5af12d7fa45c43bf04f1 + +info: + name: > + Custom Post Type UI <= 1.7.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08115f30-f38b-4c13-803e-5de873f83a17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-type-ui/" + google-query: inurl:"/wp-content/plugins/custom-post-type-ui/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-type-ui,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-type-ui/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-type-ui" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-types-03278634b9340d2d49106fefa161e7cd.yaml b/nuclei-templates/cve-less/plugins/custom-post-types-03278634b9340d2d49106fefa161e7cd.yaml new file mode 100644 index 0000000000..eaba490e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-types-03278634b9340d2d49106fefa161e7cd.yaml @@ -0,0 +1,58 @@ +id: custom-post-types-03278634b9340d2d49106fefa161e7cd + +info: + name: > + Custom post types <= 5.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58ee5f31-7d10-4772-929c-98249a351342?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-types/" + google-query: inurl:"/wp-content/plugins/custom-post-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-types-134091eb792475d128936c227b127601.yaml b/nuclei-templates/cve-less/plugins/custom-post-types-134091eb792475d128936c227b127601.yaml new file mode 100644 index 0000000000..f3bb60ef57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-types-134091eb792475d128936c227b127601.yaml @@ -0,0 +1,58 @@ +id: custom-post-types-134091eb792475d128936c227b127601 + +info: + name: > + Custom post types, Custom Fields & more <= 5.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b1449a9-6c89-4dec-8107-86cf8a295025?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-types/" + google-query: inurl:"/wp-content/plugins/custom-post-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-types-dc2b0f4dde9149582362d961339fc430.yaml b/nuclei-templates/cve-less/plugins/custom-post-types-dc2b0f4dde9149582362d961339fc430.yaml new file mode 100644 index 0000000000..cb5f183572 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-types-dc2b0f4dde9149582362d961339fc430.yaml @@ -0,0 +1,58 @@ +id: custom-post-types-dc2b0f4dde9149582362d961339fc430 + +info: + name: > + Custom post types <= 4.0.12 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb94520e-a99d-4e34-b174-e01898de0978?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-types/" + google-query: inurl:"/wp-content/plugins/custom-post-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-post-view-generator-ba5dfaad8cf69b254b291ccd03ab7c28.yaml b/nuclei-templates/cve-less/plugins/custom-post-view-generator-ba5dfaad8cf69b254b291ccd03ab7c28.yaml new file mode 100644 index 0000000000..80a3d90818 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-post-view-generator-ba5dfaad8cf69b254b291ccd03ab7c28.yaml @@ -0,0 +1,58 @@ +id: custom-post-view-generator-ba5dfaad8cf69b254b291ccd03ab7c28 + +info: + name: > + Custom Post View Generator <= 0.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf9d2008-a397-413d-868d-23afb55a8947?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-post-view-generator/" + google-query: inurl:"/wp-content/plugins/custom-post-view-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-post-view-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-post-view-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-post-view-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-and-login-forms-with-new-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/custom-registration-and-login-forms-with-new-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5ca05731cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-and-login-forms-with-new-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: custom-registration-and-login-forms-with-new-recaptcha-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-and-login-forms-with-new-recaptcha/" + google-query: inurl:"/wp-content/plugins/custom-registration-and-login-forms-with-new-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-and-login-forms-with-new-recaptcha,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-and-login-forms-with-new-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-and-login-forms-with-new-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-and-login-forms-with-new-recaptcha-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/custom-registration-and-login-forms-with-new-recaptcha-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..17379ed245 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-and-login-forms-with-new-recaptcha-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: custom-registration-and-login-forms-with-new-recaptcha-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-and-login-forms-with-new-recaptcha/" + google-query: inurl:"/wp-content/plugins/custom-registration-and-login-forms-with-new-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-and-login-forms-with-new-recaptcha,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-and-login-forms-with-new-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-and-login-forms-with-new-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-03faf5c8e4483bcb72677008477fdf8f.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-03faf5c8e4483bcb72677008477fdf8f.yaml new file mode 100644 index 0000000000..4485d78a9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-03faf5c8e4483bcb72677008477fdf8f.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-03faf5c8e4483bcb72677008477fdf8f + +info: + name: > + RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login <= 5.3.1.0 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6478cdbc-a20e-4fe2-bbd6-8a550e5da895?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-12554d58fa3f58e451e08d638496a899.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-12554d58fa3f58e451e08d638496a899.yaml new file mode 100644 index 0000000000..2ef29e8bac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-12554d58fa3f58e451e08d638496a899.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-12554d58fa3f58e451e08d638496a899 + +info: + name: > + RegistrationMagic - Custom Registration Forms <= 3.8.0.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fde9239-edac-4f85-be12-80825595a332?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-161c815356a117f2a7d79bcb200b7ff9.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-161c815356a117f2a7d79bcb200b7ff9.yaml new file mode 100644 index 0000000000..0c7244ea94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-161c815356a117f2a7d79bcb200b7ff9.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-161c815356a117f2a7d79bcb200b7ff9 + +info: + name: > + RegistrationMagic <= 5.2.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dcde10d-4eb7-42fe-926e-05e56affc521?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-1ae4dd533f16291d906e419f9b6a90b5.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-1ae4dd533f16291d906e419f9b6a90b5.yaml new file mode 100644 index 0000000000..d755fa07c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-1ae4dd533f16291d906e419f9b6a90b5.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-1ae4dd533f16291d906e419f9b6a90b5 + +info: + name: > + RegistrationMagic <= 5.0.1.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8ba4a74-6649-4566-b9d5-19662539158b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-1d190b0241a92bf4c0712f3b939e7393.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-1d190b0241a92bf4c0712f3b939e7393.yaml new file mode 100644 index 0000000000..b46ff2e60e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-1d190b0241a92bf4c0712f3b939e7393.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-1d190b0241a92bf4c0712f3b939e7393 + +info: + name: > + RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Authenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/241dc2e4-b079-407b-b610-c40b23d038cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-405ccafee5e024bd55baaadb07fd61d0.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-405ccafee5e024bd55baaadb07fd61d0.yaml new file mode 100644 index 0000000000..9cd28217c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-405ccafee5e024bd55baaadb07fd61d0.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-405ccafee5e024bd55baaadb07fd61d0 + +info: + name: > + RegistrationMagic - Custom Registration Forms <= 3.7.9.2 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2b79193-f8fc-4ea2-8973-fe292cfb926b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-49f8b17fd3f7202d469cd36057801698.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-49f8b17fd3f7202d469cd36057801698.yaml new file mode 100644 index 0000000000..134a8b15c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-49f8b17fd3f7202d469cd36057801698.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-49f8b17fd3f7202d469cd36057801698 + +info: + name: > + RegistrationMagic <= 5.1.9.2 - Missing Authorization to Unauthenticated Content Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fde0ab44-a354-4cbe-8548-0e5c08529082?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-4a6f7a73f2b2510b444077fe0160d05b.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-4a6f7a73f2b2510b444077fe0160d05b.yaml new file mode 100644 index 0000000000..7bcb9ee367 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-4a6f7a73f2b2510b444077fe0160d05b.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-4a6f7a73f2b2510b444077fe0160d05b + +info: + name: > + RegistrationMagic <= 5.2.5.0 - Form Submission Limit Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86ebb3d1-5fd1-48cb-95b7-f82014323f01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-4ebf8466ab7647227779ddf8d6ac3494.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-4ebf8466ab7647227779ddf8d6ac3494.yaml new file mode 100644 index 0000000000..3a3cfd92bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-4ebf8466ab7647227779ddf8d6ac3494.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-4ebf8466ab7647227779ddf8d6ac3494 + +info: + name: > + RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Authenticated Settings and User Data Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f7d16d2-ecc0-4352-b7b9-2c3242f43dbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-560537cf7e37552cc5fc20cab905a672.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-560537cf7e37552cc5fc20cab905a672.yaml new file mode 100644 index 0000000000..9f86a9989e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-560537cf7e37552cc5fc20cab905a672.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-560537cf7e37552cc5fc20cab905a672 + +info: + name: > + RegistrationMagic <= 5.2.1.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87ec5542-b6e7-4b18-a3ec-c258e749d32e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-5b9008ba421c01f99bc8a2b66d06c955.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-5b9008ba421c01f99bc8a2b66d06c955.yaml new file mode 100644 index 0000000000..7b03e7aaf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-5b9008ba421c01f99bc8a2b66d06c955.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-5b9008ba421c01f99bc8a2b66d06c955 + +info: + name: > + RegistrationMagic <= 5.3.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6da046f-a16f-4a93-b3c6-04270538b7a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-5d65a7992972ebe63734d1fdf7ce6dcd.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-5d65a7992972ebe63734d1fdf7ce6dcd.yaml new file mode 100644 index 0000000000..54e45a744e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-5d65a7992972ebe63734d1fdf7ce6dcd.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-5d65a7992972ebe63734d1fdf7ce6dcd + +info: + name: > + RegistrationMagic - Custom Registration Forms, User Registration and User Login Plugin <= 4.6.0.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b71b187-2e05-4bea-9177-cbf66fe08a44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-66c19504108f80a4369db438b2de733d.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-66c19504108f80a4369db438b2de733d.yaml new file mode 100644 index 0000000000..898218611b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-66c19504108f80a4369db438b2de733d.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-66c19504108f80a4369db438b2de733d + +info: + name: > + RegistrationMagic <= 5.2.5.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9396c350-d72e-472b-8cbc-44edce557256?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-750b74705bdff8d7fe8b29d226f6a7fb.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-750b74705bdff8d7fe8b29d226f6a7fb.yaml new file mode 100644 index 0000000000..610f376757 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-750b74705bdff8d7fe8b29d226f6a7fb.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-750b74705bdff8d7fe8b29d226f6a7fb + +info: + name: > + RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Authenticated Settings Import to Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7939401-822c-4d27-9d8c-c5680165e6a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-7db9573a3e8af958ed29c7bf6f04dd8e.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-7db9573a3e8af958ed29c7bf6f04dd8e.yaml new file mode 100644 index 0000000000..488981c26a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-7db9573a3e8af958ed29c7bf6f04dd8e.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-7db9573a3e8af958ed29c7bf6f04dd8e + +info: + name: > + RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login <= 5.3.0.0 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/766e3966-157a-4db3-9179-813032343f76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-813e709d3dd48a31f481e32297dc8503.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-813e709d3dd48a31f481e32297dc8503.yaml new file mode 100644 index 0000000000..c0f85058ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-813e709d3dd48a31f481e32297dc8503.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-813e709d3dd48a31f481e32297dc8503 + +info: + name: > + RegistrationMagic <= 5.3.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24f2eafc-c8eb-4d78-af5e-1a589d7e4d21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-85fa0155b108ebd593447d4fb927111e.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-85fa0155b108ebd593447d4fb927111e.yaml new file mode 100644 index 0000000000..73a69ce2dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-85fa0155b108ebd593447d4fb927111e.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-85fa0155b108ebd593447d4fb927111e + +info: + name: > + RegistrationMagic <= 5.0.1.7 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbd978fd-f759-4983-90b0-af7338e21d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-8e70f80b9a0aef35cef45454a2e20325.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-8e70f80b9a0aef35cef45454a2e20325.yaml new file mode 100644 index 0000000000..77f77ca906 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-8e70f80b9a0aef35cef45454a2e20325.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-8e70f80b9a0aef35cef45454a2e20325 + +info: + name: > + RegistrationMagic - Custom Registration Forms <= 3.7.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f6883e4-3de6-4ca9-a26c-0b4f3bd5b70f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml new file mode 100644 index 0000000000..36965aec75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-8f8b97c7d5c0b9ba282a6dfa6a5c0131 + +info: + name: > + RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Authenticated Email Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a023cdc5-3814-4120-86b2-6a60d385f898?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-98507312be61996148f27924ae96d00e.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-98507312be61996148f27924ae96d00e.yaml new file mode 100644 index 0000000000..be54671925 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-98507312be61996148f27924ae96d00e.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-98507312be61996148f27924ae96d00e + +info: + name: > + RegistrationMagic <= 5.2.4.1 - Reflected Cross-Site Scripting via section_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d010e55-d57a-49f7-a991-76b676b88f1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-a93b511e834ddd2e10f787cf551e0214.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-a93b511e834ddd2e10f787cf551e0214.yaml new file mode 100644 index 0000000000..2307740a5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-a93b511e834ddd2e10f787cf551e0214.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-a93b511e834ddd2e10f787cf551e0214 + +info: + name: > + RegistrationMagic <= 5.0.2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52efc168-fed9-45c6-9a2c-1e3a198f71f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-bb05c43d4858d2cd6e99aeda4ad6534f.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-bb05c43d4858d2cd6e99aeda4ad6534f.yaml new file mode 100644 index 0000000000..478db4212b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-bb05c43d4858d2cd6e99aeda4ad6534f.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-bb05c43d4858d2cd6e99aeda4ad6534f + +info: + name: > + RegistrationMagic <= 5.2.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d041b14-0d05-4bfe-bd5c-7e06d7b108b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-bc39873d86ab4150675c8c4fc220361f.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-bc39873d86ab4150675c8c4fc220361f.yaml new file mode 100644 index 0000000000..0072a1080a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-bc39873d86ab4150675c8c4fc220361f.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-bc39873d86ab4150675c8c4fc220361f + +info: + name: > + RegistrationMagic <= 5.1.9.2 - Cross-Site Request Forgery leading to Form Metadata Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcfb3a6e-7b58-4568-8439-e9c68a2223b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-d2f77ed0cac474a6437fa2cee0cecb6e.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-d2f77ed0cac474a6437fa2cee0cecb6e.yaml new file mode 100644 index 0000000000..59ed890d6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-d2f77ed0cac474a6437fa2cee0cecb6e.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-d2f77ed0cac474a6437fa2cee0cecb6e + +info: + name: > + RegistrationMagic Plugin <= 5.2.4.5 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b378df7-b182-4a56-a7fa-3228c06f960f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e04842ca04263f6508eb41a6732d11e2.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e04842ca04263f6508eb41a6732d11e2.yaml new file mode 100644 index 0000000000..244bf35582 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e04842ca04263f6508eb41a6732d11e2.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-e04842ca04263f6508eb41a6732d11e2 + +info: + name: > + Registration Magic <= 5.0.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/547e5814-0201-4dbf-9d2d-8028ca055402?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e518e10775fef314a3432a0ef6a78cf1.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e518e10775fef314a3432a0ef6a78cf1.yaml new file mode 100644 index 0000000000..d1930fca6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e518e10775fef314a3432a0ef6a78cf1.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-e518e10775fef314a3432a0ef6a78cf1 + +info: + name: > + RegistrationMagic <= 5.2.5.0 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b37b57c-4a11-4971-b38f-12c70d71b76b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e8759c1eba32b6985f221d449c7045d7.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e8759c1eba32b6985f221d449c7045d7.yaml new file mode 100644 index 0000000000..b5b008bd01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-e8759c1eba32b6985f221d449c7045d7.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-e8759c1eba32b6985f221d449c7045d7 + +info: + name: > + RegistrationMagic <= 5.2.5.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26d70dee-c098-40f1-962a-db56791ae221?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-eab40a7edf5f2e1a98131d79813fdf48.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-eab40a7edf5f2e1a98131d79813fdf48.yaml new file mode 100644 index 0000000000..e99b212010 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-eab40a7edf5f2e1a98131d79813fdf48.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-eab40a7edf5f2e1a98131d79813fdf48 + +info: + name: > + RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Cross-Site Request Forgery to Settings Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c23d163-1053-403f-80bc-ea8f76fff4e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-f0faf18308a797e616df68af878bf053.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-f0faf18308a797e616df68af878bf053.yaml new file mode 100644 index 0000000000..f81cc79a8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-f0faf18308a797e616df68af878bf053.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-f0faf18308a797e616df68af878bf053 + +info: + name: > + RegistrationMagic <= 5.1.9.2 - Improper Authorization to Price Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/feeb70e4-b602-40ce-bdeb-d947c6b6784d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-f7a999ea17927c5e9ebebc775b43318c.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-f7a999ea17927c5e9ebebc775b43318c.yaml new file mode 100644 index 0000000000..477fb90180 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-f7a999ea17927c5e9ebebc775b43318c.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-f7a999ea17927c5e9ebebc775b43318c + +info: + name: > + RegistrationMagic – Custom Registration Forms, User Registration and User Login Plugin <= 4.6.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d46f8e8a-80cb-4407-ac07-f4c93be691b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-fcd65c8735954219062dc7bc27977dbf.yaml b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-fcd65c8735954219062dc7bc27977dbf.yaml new file mode 100644 index 0000000000..a16512cc4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-registration-form-builder-with-submission-manager-fcd65c8735954219062dc7bc27977dbf.yaml @@ -0,0 +1,58 @@ +id: custom-registration-form-builder-with-submission-manager-fcd65c8735954219062dc7bc27977dbf + +info: + name: > + RegistrationMagic <= 5.2.0.5 - Authenticated (Admin+) Insecure Direct Object Reference to Arbitrary User Password Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfbc406b-49af-419e-adeb-0510794b7e3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-registration-form-builder-with-submission-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-registration-form-builder-with-submission-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-scroll-bar-designer-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/custom-scroll-bar-designer-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..c08158baf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-scroll-bar-designer-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: custom-scroll-bar-designer-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-scroll-bar-designer/" + google-query: inurl:"/wp-content/plugins/custom-scroll-bar-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-scroll-bar-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-scroll-bar-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-scroll-bar-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-search-plugin-ea2aae884b82aaf10a9b6d9e08e6be98.yaml b/nuclei-templates/cve-less/plugins/custom-search-plugin-ea2aae884b82aaf10a9b6d9e08e6be98.yaml new file mode 100644 index 0000000000..37efe21fbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-search-plugin-ea2aae884b82aaf10a9b6d9e08e6be98.yaml @@ -0,0 +1,58 @@ +id: custom-search-plugin-ea2aae884b82aaf10a9b6d9e08e6be98 + +info: + name: > + Custom Search by BestWebSoft <= 1.35 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/711a7307-0a7a-4640-8d88-5c370b0156de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-search-plugin/" + google-query: inurl:"/wp-content/plugins/custom-search-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-search-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-search-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-search-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-searchable-data-entry-system-503f25d9a3f350dbb09e33967b718028.yaml b/nuclei-templates/cve-less/plugins/custom-searchable-data-entry-system-503f25d9a3f350dbb09e33967b718028.yaml new file mode 100644 index 0000000000..2ee590e867 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-searchable-data-entry-system-503f25d9a3f350dbb09e33967b718028.yaml @@ -0,0 +1,58 @@ +id: custom-searchable-data-entry-system-503f25d9a3f350dbb09e33967b718028 + +info: + name: > + Custom Searchable Data Entry System <= 1.7.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eada519e-a647-4425-9e41-b8527b592c8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-searchable-data-entry-system/" + google-query: inurl:"/wp-content/plugins/custom-searchable-data-entry-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-searchable-data-entry-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-searchable-data-entry-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-searchable-data-entry-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-searchable-data-entry-system-6c2c1aea05bf11797b06068cda5033db.yaml b/nuclei-templates/cve-less/plugins/custom-searchable-data-entry-system-6c2c1aea05bf11797b06068cda5033db.yaml new file mode 100644 index 0000000000..27a5096ece --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-searchable-data-entry-system-6c2c1aea05bf11797b06068cda5033db.yaml @@ -0,0 +1,58 @@ +id: custom-searchable-data-entry-system-6c2c1aea05bf11797b06068cda5033db + +info: + name: > + Custom Searchable Data Entry System <= 1.7.1 - Unauthenticated Database Wiping + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/245d89e5-52cc-44b1-a858-0ca0aacb4e26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-searchable-data-entry-system/" + google-query: inurl:"/wp-content/plugins/custom-searchable-data-entry-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-searchable-data-entry-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-searchable-data-entry-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-searchable-data-entry-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-settings-73efd5c8bcd4c1bfe4df6f8b395749d7.yaml b/nuclei-templates/cve-less/plugins/custom-settings-73efd5c8bcd4c1bfe4df6f8b395749d7.yaml new file mode 100644 index 0000000000..32432e58b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-settings-73efd5c8bcd4c1bfe4df6f8b395749d7.yaml @@ -0,0 +1,58 @@ +id: custom-settings-73efd5c8bcd4c1bfe4df6f8b395749d7 + +info: + name: > + WordPress Custom Settings <= 1.0 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23f7f4ad-f9d5-44b7-8354-5145b003fd20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-settings/" + google-query: inurl:"/wp-content/plugins/custom-settings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-settings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-settings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-settings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-share-buttons-with-floating-sidebar-e1e48d10961945b3a2fc571529bab9c7.yaml b/nuclei-templates/cve-less/plugins/custom-share-buttons-with-floating-sidebar-e1e48d10961945b3a2fc571529bab9c7.yaml new file mode 100644 index 0000000000..f5852c7274 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-share-buttons-with-floating-sidebar-e1e48d10961945b3a2fc571529bab9c7.yaml @@ -0,0 +1,58 @@ +id: custom-share-buttons-with-floating-sidebar-e1e48d10961945b3a2fc571529bab9c7 + +info: + name: > + Custom Share Buttons with Floating Sidebar <= 4.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5628fb28-03fd-407d-874e-7801b17098f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-share-buttons-with-floating-sidebar/" + google-query: inurl:"/wp-content/plugins/custom-share-buttons-with-floating-sidebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-share-buttons-with-floating-sidebar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-share-buttons-with-floating-sidebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-share-buttons-with-floating-sidebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-sidebars-4274bbe3c0d27bb54b9223f6af8827e7.yaml b/nuclei-templates/cve-less/plugins/custom-sidebars-4274bbe3c0d27bb54b9223f6af8827e7.yaml new file mode 100644 index 0000000000..548014001b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-sidebars-4274bbe3c0d27bb54b9223f6af8827e7.yaml @@ -0,0 +1,58 @@ +id: custom-sidebars-4274bbe3c0d27bb54b9223f6af8827e7 + +info: + name: > + Custom Sidebars < 2.1.0.2 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/239bdac1-c14b-42ff-bee5-130d0bf3394c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-sidebars/" + google-query: inurl:"/wp-content/plugins/custom-sidebars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-sidebars,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-sidebars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-sidebars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-sidebars-aea09105f0f61d6ceb820ac11ed09e51.yaml b/nuclei-templates/cve-less/plugins/custom-sidebars-aea09105f0f61d6ceb820ac11ed09e51.yaml new file mode 100644 index 0000000000..72c2bb56ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-sidebars-aea09105f0f61d6ceb820ac11ed09e51.yaml @@ -0,0 +1,58 @@ +id: custom-sidebars-aea09105f0f61d6ceb820ac11ed09e51 + +info: + name: > + Custom Sidebars <= 3.0.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eee88bc6-b7e3-4eff-afc7-59b9a1cc9d2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-sidebars/" + google-query: inurl:"/wp-content/plugins/custom-sidebars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-sidebars,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-sidebars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-sidebars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-sidebars-e7cf3375d8a38efd1be42356dbb74de4.yaml b/nuclei-templates/cve-less/plugins/custom-sidebars-e7cf3375d8a38efd1be42356dbb74de4.yaml new file mode 100644 index 0000000000..6cd1fcaf69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-sidebars-e7cf3375d8a38efd1be42356dbb74de4.yaml @@ -0,0 +1,58 @@ +id: custom-sidebars-e7cf3375d8a38efd1be42356dbb74de4 + +info: + name: > + Custom Sidebars <= 3.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aff4d42c-133e-4ca8-9664-6878a22f7058?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-sidebars/" + google-query: inurl:"/wp-content/plugins/custom-sidebars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-sidebars,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-sidebars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-sidebars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-simple-rss-c55993b506252ecc7087422b008f250c.yaml b/nuclei-templates/cve-less/plugins/custom-simple-rss-c55993b506252ecc7087422b008f250c.yaml new file mode 100644 index 0000000000..4b195a4fc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-simple-rss-c55993b506252ecc7087422b008f250c.yaml @@ -0,0 +1,58 @@ +id: custom-simple-rss-c55993b506252ecc7087422b008f250c + +info: + name: > + Custom Simple RSS < 2.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ee333a6-6b4b-4abb-9fc9-1afd9598b321?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-simple-rss/" + google-query: inurl:"/wp-content/plugins/custom-simple-rss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-simple-rss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-simple-rss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-simple-rss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-sub-menus-f50829abfd0ab0292550a897d206e4fb.yaml b/nuclei-templates/cve-less/plugins/custom-sub-menus-f50829abfd0ab0292550a897d206e4fb.yaml new file mode 100644 index 0000000000..1af7caa484 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-sub-menus-f50829abfd0ab0292550a897d206e4fb.yaml @@ -0,0 +1,58 @@ +id: custom-sub-menus-f50829abfd0ab0292550a897d206e4fb + +info: + name: > + Custom Menu <= 1.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c70206d-5c4a-4068-8182-e93378c26350?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-sub-menus/" + google-query: inurl:"/wp-content/plugins/custom-sub-menus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-sub-menus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-sub-menus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-sub-menus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-text-selection-colors-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/custom-text-selection-colors-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..f7389dd5af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-text-selection-colors-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: custom-text-selection-colors-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-text-selection-colors/" + google-query: inurl:"/wp-content/plugins/custom-text-selection-colors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-text-selection-colors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-text-selection-colors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-text-selection-colors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-tinymce-shortcode-button-f62cbc07d0c97caefc6751d0180dc663.yaml b/nuclei-templates/cve-less/plugins/custom-tinymce-shortcode-button-f62cbc07d0c97caefc6751d0180dc663.yaml new file mode 100644 index 0000000000..0e29ff6ddd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-tinymce-shortcode-button-f62cbc07d0c97caefc6751d0180dc663.yaml @@ -0,0 +1,58 @@ +id: custom-tinymce-shortcode-button-f62cbc07d0c97caefc6751d0180dc663 + +info: + name: > + Custom TinyMCE Shortcode Button <= 1.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f5bc5cc-fe96-48f6-b9c9-a2b9d83406b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-tinymce-shortcode-button/" + google-query: inurl:"/wp-content/plugins/custom-tinymce-shortcode-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-tinymce-shortcode-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-tinymce-shortcode-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-tinymce-shortcode-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-twitter-feeds-05b7197cf734fac5f20338febaf0428b.yaml b/nuclei-templates/cve-less/plugins/custom-twitter-feeds-05b7197cf734fac5f20338febaf0428b.yaml new file mode 100644 index 0000000000..7fe6858a50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-twitter-feeds-05b7197cf734fac5f20338febaf0428b.yaml @@ -0,0 +1,58 @@ +id: custom-twitter-feeds-05b7197cf734fac5f20338febaf0428b + +info: + name: > + Custom Twitter Feeds – A Tweets Widget or X Feed Widget <= 2.2.1 - Cross-Site Request Forgery to Plugin Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29e2ff11-053b-45cc-adf1-d276f1ee576e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-twitter-feeds/" + google-query: inurl:"/wp-content/plugins/custom-twitter-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-twitter-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-twitter-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-twitter-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-twitter-feeds-0787c7b553a6a5c88dae74eba6fc4fd1.yaml b/nuclei-templates/cve-less/plugins/custom-twitter-feeds-0787c7b553a6a5c88dae74eba6fc4fd1.yaml new file mode 100644 index 0000000000..779c79d1ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-twitter-feeds-0787c7b553a6a5c88dae74eba6fc4fd1.yaml @@ -0,0 +1,58 @@ +id: custom-twitter-feeds-0787c7b553a6a5c88dae74eba6fc4fd1 + +info: + name: > + Custom Twitter Feeds (Tweets Widget) <= 1.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5a5f8c2-3fd6-4d31-a3b5-60bdb8c18491?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-twitter-feeds/" + google-query: inurl:"/wp-content/plugins/custom-twitter-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-twitter-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-twitter-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-twitter-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-twitter-feeds-ac43cf44566479227a4aa05f1f51c953.yaml b/nuclei-templates/cve-less/plugins/custom-twitter-feeds-ac43cf44566479227a4aa05f1f51c953.yaml new file mode 100644 index 0000000000..b8f9338f50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-twitter-feeds-ac43cf44566479227a4aa05f1f51c953.yaml @@ -0,0 +1,58 @@ +id: custom-twitter-feeds-ac43cf44566479227a4aa05f1f51c953 + +info: + name: > + Smash Balloon Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0efff314-b14f-4af4-b225-ba7e41d01b2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-twitter-feeds/" + google-query: inurl:"/wp-content/plugins/custom-twitter-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-twitter-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-twitter-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-twitter-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/custom-user-css-6543643d1ea175fa61a5d758cd6fec45.yaml b/nuclei-templates/cve-less/plugins/custom-user-css-6543643d1ea175fa61a5d758cd6fec45.yaml new file mode 100644 index 0000000000..e2038f60de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/custom-user-css-6543643d1ea175fa61a5d758cd6fec45.yaml @@ -0,0 +1,58 @@ +id: custom-user-css-6543643d1ea175fa61a5d758cd6fec45 + +info: + name: > + Custom User CSS <= 0.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b53ed24-2821-440f-9aba-69d75b7459a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/custom-user-css/" + google-query: inurl:"/wp-content/plugins/custom-user-css/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,custom-user-css,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/custom-user-css/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-user-css" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-area-5946d00520fcf71340c79730911fdae4.yaml b/nuclei-templates/cve-less/plugins/customer-area-5946d00520fcf71340c79730911fdae4.yaml new file mode 100644 index 0000000000..22eb68f56f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-area-5946d00520fcf71340c79730911fdae4.yaml @@ -0,0 +1,58 @@ +id: customer-area-5946d00520fcf71340c79730911fdae4 + +info: + name: > + WP Customer Area <= 8.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/567d62ec-e868-45e2-b07a-8cc661d7c5e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-area/" + google-query: inurl:"/wp-content/plugins/customer-area/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-area,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-area/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-area" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-area-638180480b8e5ea2f7bb663f12fd87db.yaml b/nuclei-templates/cve-less/plugins/customer-area-638180480b8e5ea2f7bb663f12fd87db.yaml new file mode 100644 index 0000000000..6aeaf02eb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-area-638180480b8e5ea2f7bb663f12fd87db.yaml @@ -0,0 +1,58 @@ +id: customer-area-638180480b8e5ea2f7bb663f12fd87db + +info: + name: > + WP Customer Area <= 8.2.0 - Insecure Direct Object Reference to Account Address Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc0087a8-ec3a-4c16-8ce3-d346ae0ca58d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-area/" + google-query: inurl:"/wp-content/plugins/customer-area/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-area,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-area/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-area" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-area-64194ddc20aa7461447b4d03da264c07.yaml b/nuclei-templates/cve-less/plugins/customer-area-64194ddc20aa7461447b4d03da264c07.yaml new file mode 100644 index 0000000000..3eab08d8f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-area-64194ddc20aa7461447b4d03da264c07.yaml @@ -0,0 +1,58 @@ +id: customer-area-64194ddc20aa7461447b4d03da264c07 + +info: + name: > + WP Customer Area <= 8.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad5aeea0-ba5a-488a-9087-9b7567f31c70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-area/" + google-query: inurl:"/wp-content/plugins/customer-area/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-area,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-area/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-area" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-area-88e7e4a086d6356c7121d61d5de285a2.yaml b/nuclei-templates/cve-less/plugins/customer-area-88e7e4a086d6356c7121d61d5de285a2.yaml new file mode 100644 index 0000000000..171074698c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-area-88e7e4a086d6356c7121d61d5de285a2.yaml @@ -0,0 +1,58 @@ +id: customer-area-88e7e4a086d6356c7121d61d5de285a2 + +info: + name: > + WP Customer Area <= 8.2.1 - Insecure Direct Object Reference to Address Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32713069-ea40-46ef-a789-9646eab2e651?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-area/" + google-query: inurl:"/wp-content/plugins/customer-area/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-area,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-area/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-area" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-area-f9650549fbf42fb03bc206714accabe1.yaml b/nuclei-templates/cve-less/plugins/customer-area-f9650549fbf42fb03bc206714accabe1.yaml new file mode 100644 index 0000000000..2327996aaa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-area-f9650549fbf42fb03bc206714accabe1.yaml @@ -0,0 +1,58 @@ +id: customer-area-f9650549fbf42fb03bc206714accabe1 + +info: + name: > + WP Customer Area <= 7.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec015f49-cdb6-4a08-81cd-6fa505086537?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-area/" + google-query: inurl:"/wp-content/plugins/customer-area/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-area,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-area/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-area" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-chat-facebook-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/customer-chat-facebook-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..8ffcc132c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-chat-facebook-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: customer-chat-facebook-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-chat-facebook/" + google-query: inurl:"/wp-content/plugins/customer-chat-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-chat-facebook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-chat-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-chat-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-collector-for-woocommerce-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-collector-for-woocommerce-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..942ace9696 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-collector-for-woocommerce-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-collector-for-woocommerce-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-collector-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-collector-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-collector-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-collector-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-collector-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-03f52e4edfa7408cb52c9d72fc195004.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-03f52e4edfa7408cb52c9d72fc195004.yaml new file mode 100644 index 0000000000..65d9337d56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-03f52e4edfa7408cb52c9d72fc195004.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-03f52e4edfa7408cb52c9d72fc195004 + +info: + name: > + Customer Reviews for WooCommerce <= 5.15.0 - Authenticated (Subscriber+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6e7b44c-fe94-493b-846b-57c40e00d8fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-087ab6a6409aed64b5c6d0e8d25ec639.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-087ab6a6409aed64b5c6d0e8d25ec639.yaml new file mode 100644 index 0000000000..bf40a68622 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-087ab6a6409aed64b5c6d0e8d25ec639.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-087ab6a6409aed64b5c6d0e8d25ec639 + +info: + name: > + Customer Reviews for WooCommerce <= 5.46.0 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Email Sending + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0e80e63-f4f7-44cc-ae29-72e7847d7448?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.46.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-2d6698f89f32609adbc6e12eed98ca62.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-2d6698f89f32609adbc6e12eed98ca62.yaml new file mode 100644 index 0000000000..55f6d25594 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-2d6698f89f32609adbc6e12eed98ca62.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-2d6698f89f32609adbc6e12eed98ca62 + +info: + name: > + Customer Reviews for WooCommerce <= 5.38.9 - Authenticated (Author+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4af801db-44a6-4cd3-bd1a-3125490c8c48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.38.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-33080b0d5149a7811a842330fcd02a9a.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-33080b0d5149a7811a842330fcd02a9a.yaml new file mode 100644 index 0000000000..69450dfbde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-33080b0d5149a7811a842330fcd02a9a.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-33080b0d5149a7811a842330fcd02a9a + +info: + name: > + Customer Reviews for WooCommerce <= 5.16.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f00ef5c1-1025-489c-a294-a87e10afde2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-34547cf35ff55eca1aec11c82238db2e.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-34547cf35ff55eca1aec11c82238db2e.yaml new file mode 100644 index 0000000000..1605f569f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-34547cf35ff55eca1aec11c82238db2e.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-34547cf35ff55eca1aec11c82238db2e + +info: + name: > + Customer Reviews for WooCommerce <= 5.38.12 - Improper Authorization via submit_review + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4420c334-1ea4-4549-b391-150702abc2f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.38.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-5b09804fb0f54f039756dc2dbfaca10d.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-5b09804fb0f54f039756dc2dbfaca10d.yaml new file mode 100644 index 0000000000..33e0f99d64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-5b09804fb0f54f039756dc2dbfaca10d.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-5b09804fb0f54f039756dc2dbfaca10d + +info: + name: > + Customer Reviews for WooCommerce <= 5.46.0 - Missing Authorization to Authenticated (Subscriber+) Coupon Search + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/881e8096-e75f-49a7-87ed-c230e93ea378?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.46.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-704e8a4e646ad70dffa4b5a4a231b7e5.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-704e8a4e646ad70dffa4b5a4a231b7e5.yaml new file mode 100644 index 0000000000..7ddbc93722 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-704e8a4e646ad70dffa4b5a4a231b7e5.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-704e8a4e646ad70dffa4b5a4a231b7e5 + +info: + name: > + Customer Reviews for WooCommerce <= 5.38.1 - Missing Authorization via CR_Manual + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e093d1f-9c5a-44f8-bc27-9c320e220358?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.38.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-72807f145d4d787ee0d78e0f3adf0196.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-72807f145d4d787ee0d78e0f3adf0196.yaml new file mode 100644 index 0000000000..c0f2a1c39a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-72807f145d4d787ee0d78e0f3adf0196.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-72807f145d4d787ee0d78e0f3adf0196 + +info: + name: > + Customer Reviews for WooCommerce <= 5.36.0 - Missing Authorization in Reviews Exporter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d60f3da1-1184-4629-880c-ce3893fb55a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.36.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-aba3e00a2a63250607e79d5288cb4fd8.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-aba3e00a2a63250607e79d5288cb4fd8.yaml new file mode 100644 index 0000000000..97d161e5be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-aba3e00a2a63250607e79d5288cb4fd8.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-aba3e00a2a63250607e79d5288cb4fd8 + +info: + name: > + Customer Reviews for WooCommerce <= 5.3.5 - Multiple Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b0a47e0-5be1-418c-afdf-8bb2d784bcc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b2de750c81241fb9f0e6cca06ae6f2a3.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b2de750c81241fb9f0e6cca06ae6f2a3.yaml new file mode 100644 index 0000000000..ab8ea0a4b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b2de750c81241fb9f0e6cca06ae6f2a3.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-b2de750c81241fb9f0e6cca06ae6f2a3 + +info: + name: > + Customer Reviews for WooCommerce <= 5.38.1 - Cross-Site Request Forgery via manual review reminders + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b243722e-6510-48bd-be26-95ccbe79fa57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.38.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b617065e23c3fb2d068c8fc7c1e18a76.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b617065e23c3fb2d068c8fc7c1e18a76.yaml new file mode 100644 index 0000000000..df7a5d5189 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b617065e23c3fb2d068c8fc7c1e18a76.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-b617065e23c3fb2d068c8fc7c1e18a76 + +info: + name: > + Customer Reviews for WooCommerce <= 5.47.0 - Reflected Cross-Site Scripting via 's' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3489038-2833-4080-b802-5733afab5de8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.47.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b9103fa25ff1df562a7ef31b16b8ad03.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b9103fa25ff1df562a7ef31b16b8ad03.yaml new file mode 100644 index 0000000000..20a9de5e79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-b9103fa25ff1df562a7ef31b16b8ad03.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-b9103fa25ff1df562a7ef31b16b8ad03 + +info: + name: > + Customer Reviews for WooCommerce <= 5.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43100062-c6bd-4d08-a88b-fbcf24f7e605?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-c4c5307df5e11c4cb59893ef8ef58c8a.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-c4c5307df5e11c4cb59893ef8ef58c8a.yaml new file mode 100644 index 0000000000..279a64e3e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-c4c5307df5e11c4cb59893ef8ef58c8a.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-c4c5307df5e11c4cb59893ef8ef58c8a + +info: + name: > + Customer Reviews for WooCommerce <= 5.38.1 - Missing Authorization via manual review reminders + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6e2710f-f51a-487d-a4bb-a19f614ff254?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.38.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-ccbfe5f4150b2a60a0b0de9e47423628.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-ccbfe5f4150b2a60a0b0de9e47423628.yaml new file mode 100644 index 0000000000..9df8c7a0e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-ccbfe5f4150b2a60a0b0de9e47423628.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-ccbfe5f4150b2a60a0b0de9e47423628 + +info: + name: > + Customer Reviews for WooCommerce <= 5.3.5 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34eaee0f-7a5b-4496-a5c8-5f6c69e24417?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-d87bb9dcf525660329cf7bc1593d3596.yaml b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-d87bb9dcf525660329cf7bc1593d3596.yaml new file mode 100644 index 0000000000..d8e5921f95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customer-reviews-woocommerce-d87bb9dcf525660329cf7bc1593d3596.yaml @@ -0,0 +1,58 @@ +id: customer-reviews-woocommerce-d87bb9dcf525660329cf7bc1593d3596 + +info: + name: > + Customer Reviews for WooCommerce <= 5.36.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5429fb1-7072-4a00-8fb3-48d4f876417f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customer-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/customer-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customer-reviews-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customer-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customer-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.36.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customify-e6ebb86ebbdc2c2465c0fad6241913af.yaml b/nuclei-templates/cve-less/plugins/customify-e6ebb86ebbdc2c2465c0fad6241913af.yaml new file mode 100644 index 0000000000..176de7b848 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customify-e6ebb86ebbdc2c2465c0fad6241913af.yaml @@ -0,0 +1,58 @@ +id: customify-e6ebb86ebbdc2c2465c0fad6241913af + +info: + name: > + Customify <= 2.10.4 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b1c0ee5-5329-411c-8030-14bec586d74d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customify/" + google-query: inurl:"/wp-content/plugins/customify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customify-sites-c0b24144ee5f50c90a86d55930aab983.yaml b/nuclei-templates/cve-less/plugins/customify-sites-c0b24144ee5f50c90a86d55930aab983.yaml new file mode 100644 index 0000000000..40cb130cb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customify-sites-c0b24144ee5f50c90a86d55930aab983.yaml @@ -0,0 +1,58 @@ +id: customify-sites-c0b24144ee5f50c90a86d55930aab983 + +info: + name: > + Customify Site Library <= 0.0.9 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dbf982f-c83f-4980-b758-9e241e0de67b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customify-sites/" + google-query: inurl:"/wp-content/plugins/customify-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customify-sites,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customify-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customify-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customily-v2-43a2744fa82afcde1f284cbd5aa55b86.yaml b/nuclei-templates/cve-less/plugins/customily-v2-43a2744fa82afcde1f284cbd5aa55b86.yaml new file mode 100644 index 0000000000..c0e58a3b70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customily-v2-43a2744fa82afcde1f284cbd5aa55b86.yaml @@ -0,0 +1,58 @@ +id: customily-v2-43a2744fa82afcde1f284cbd5aa55b86 + +info: + name: > + Customily Product Personalizer <= 1.23.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f8aa38b-85c5-45a7-b5cd-9ecd43a3c340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customily-v2/" + google-query: inurl:"/wp-content/plugins/customily-v2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customily-v2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customily-v2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customily-v2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customize-login-aa4710021e6cea364e343185a5562523.yaml b/nuclei-templates/cve-less/plugins/customize-login-aa4710021e6cea364e343185a5562523.yaml new file mode 100644 index 0000000000..5da4c3fb04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customize-login-aa4710021e6cea364e343185a5562523.yaml @@ -0,0 +1,58 @@ +id: customize-login-aa4710021e6cea364e343185a5562523 + +info: + name: > + WP Customize Login <= 1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58b8e6f5-5cf8-4dbb-89e9-69266bdc1a30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customize-login/" + google-query: inurl:"/wp-content/plugins/customize-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customize-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customize-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customize-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customize-login-image-cdd44eb1f0b901b8f5061171a068c613.yaml b/nuclei-templates/cve-less/plugins/customize-login-image-cdd44eb1f0b901b8f5061171a068c613.yaml new file mode 100644 index 0000000000..9688c01065 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customize-login-image-cdd44eb1f0b901b8f5061171a068c613.yaml @@ -0,0 +1,58 @@ +id: customize-login-image-cdd44eb1f0b901b8f5061171a068c613 + +info: + name: > + Customize Login Image <= 3.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f9b02c1-2cd7-48ee-b568-4c42bc0ded96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customize-login-image/" + google-query: inurl:"/wp-content/plugins/customize-login-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customize-login-image,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customize-login-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customize-login-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customize-my-account-for-woocommerce-c07ce33288471d0dce242b9d0edc14b3.yaml b/nuclei-templates/cve-less/plugins/customize-my-account-for-woocommerce-c07ce33288471d0dce242b9d0edc14b3.yaml new file mode 100644 index 0000000000..f1cfd867eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customize-my-account-for-woocommerce-c07ce33288471d0dce242b9d0edc14b3.yaml @@ -0,0 +1,58 @@ +id: customize-my-account-for-woocommerce-c07ce33288471d0dce242b9d0edc14b3 + +info: + name: > + Customize My Account for WooCommerce <= 1.8.3 - Cross-Site Request Forgery via restore_my_account_tabs + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f79f9385-f8d1-44a0-9e53-7576a9453163?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customize-my-account-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/customize-my-account-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customize-my-account-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customize-my-account-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customize-my-account-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customizer-export-import-6aade0ab1cd3e84f1c328d12c13c28e5.yaml b/nuclei-templates/cve-less/plugins/customizer-export-import-6aade0ab1cd3e84f1c328d12c13c28e5.yaml new file mode 100644 index 0000000000..12a0c6d921 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customizer-export-import-6aade0ab1cd3e84f1c328d12c13c28e5.yaml @@ -0,0 +1,58 @@ +id: customizer-export-import-6aade0ab1cd3e84f1c328d12c13c28e5 + +info: + name: > + Customizer Export/Import <= 0.9.5 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd7312ec-9654-4ddc-aec6-71c7e684fac0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customizer-export-import/" + google-query: inurl:"/wp-content/plugins/customizer-export-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customizer-export-import,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customizer-export-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customizer-export-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/customizer-export-import-c7389b248c40364239ac72c9e1e9985e.yaml b/nuclei-templates/cve-less/plugins/customizer-export-import-c7389b248c40364239ac72c9e1e9985e.yaml new file mode 100644 index 0000000000..4afb5b4345 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/customizer-export-import-c7389b248c40364239ac72c9e1e9985e.yaml @@ -0,0 +1,58 @@ +id: customizer-export-import-c7389b248c40364239ac72c9e1e9985e + +info: + name: > + Customizer Export/Import <= 0.9.4 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72fadfa8-4b53-4661-8b6c-69cdb79d3fd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/customizer-export-import/" + google-query: inurl:"/wp-content/plugins/customizer-export-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,customizer-export-import,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/customizer-export-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customizer-export-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cwicly-62e4a961ffac0b881f8af1cc15505b69.yaml b/nuclei-templates/cve-less/plugins/cwicly-62e4a961ffac0b881f8af1cc15505b69.yaml new file mode 100644 index 0000000000..4b03067878 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cwicly-62e4a961ffac0b881f8af1cc15505b69.yaml @@ -0,0 +1,58 @@ +id: cwicly-62e4a961ffac0b881f8af1cc15505b69 + +info: + name: > + Cwicly <= 1.4.0.2 - Authenticated (Contributor+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21bcb740-6340-4ff7-815f-539175936ca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cwicly/" + google-query: inurl:"/wp-content/plugins/cwicly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cwicly,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cwicly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cwicly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cww-companion-3712f3d2b17172eb0c737744e9767b9d.yaml b/nuclei-templates/cve-less/plugins/cww-companion-3712f3d2b17172eb0c737744e9767b9d.yaml new file mode 100644 index 0000000000..3f5128b80f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cww-companion-3712f3d2b17172eb0c737744e9767b9d.yaml @@ -0,0 +1,58 @@ +id: cww-companion-3712f3d2b17172eb0c737744e9767b9d + +info: + name: > + CWW Companion <= 1.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d82d43b9-4c70-4525-88ba-eec7c81a62c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cww-companion/" + google-query: inurl:"/wp-content/plugins/cww-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cww-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cww-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cww-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cybersoldier-a97afd1d52e8ec7c0950d3b4bfa966dc.yaml b/nuclei-templates/cve-less/plugins/cybersoldier-a97afd1d52e8ec7c0950d3b4bfa966dc.yaml new file mode 100644 index 0000000000..77a97d4b29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cybersoldier-a97afd1d52e8ec7c0950d3b4bfa966dc.yaml @@ -0,0 +1,58 @@ +id: cybersoldier-a97afd1d52e8ec7c0950d3b4bfa966dc + +info: + name: > + Cybersoldier < 1.7.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/606b9002-5f3a-49ef-9714-49eeac86f800?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cybersoldier/" + google-query: inurl:"/wp-content/plugins/cybersoldier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cybersoldier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cybersoldier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cybersoldier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cyberus-key-589eb0de3c09a1f6b4b85bf3ecf20784.yaml b/nuclei-templates/cve-less/plugins/cyberus-key-589eb0de3c09a1f6b4b85bf3ecf20784.yaml new file mode 100644 index 0000000000..727cf4fc21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cyberus-key-589eb0de3c09a1f6b4b85bf3ecf20784.yaml @@ -0,0 +1,58 @@ +id: cyberus-key-589eb0de3c09a1f6b4b85bf3ecf20784 + +info: + name: > + Cyberus Key <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'uid' in 'cyberkey_settings' Plugin Setting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf5e5eaf-b42d-49b9-8f55-6025e64748c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cyberus-key/" + google-query: inurl:"/wp-content/plugins/cyberus-key/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cyberus-key,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cyberus-key/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cyberus-key" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cyberus-key-ebb0aac77c202e0b9298617914b34a43.yaml b/nuclei-templates/cve-less/plugins/cyberus-key-ebb0aac77c202e0b9298617914b34a43.yaml new file mode 100644 index 0000000000..74c08ad7ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cyberus-key-ebb0aac77c202e0b9298617914b34a43.yaml @@ -0,0 +1,58 @@ +id: cyberus-key-ebb0aac77c202e0b9298617914b34a43 + +info: + name: > + Cyberus Key <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3944b2d-c431-4a53-b4e2-740480e746d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cyberus-key/" + google-query: inurl:"/wp-content/plugins/cyberus-key/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cyberus-key,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cyberus-key/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cyberus-key" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cyclone-slider-225f7f3db7dcaeda4fe6b0e7795cf610.yaml b/nuclei-templates/cve-less/plugins/cyclone-slider-225f7f3db7dcaeda4fe6b0e7795cf610.yaml new file mode 100644 index 0000000000..28a5bd3e69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cyclone-slider-225f7f3db7dcaeda4fe6b0e7795cf610.yaml @@ -0,0 +1,58 @@ +id: cyclone-slider-225f7f3db7dcaeda4fe6b0e7795cf610 + +info: + name: > + Cyclone Slider <= 3.2.0 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96bc0d9b-1f03-48d4-aa99-954e92e77c04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cyclone-slider/" + google-query: inurl:"/wp-content/plugins/cyclone-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cyclone-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cyclone-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cyclone-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cyklodev-wp-notify-e785890064729677b76cdb50e8ed4af9.yaml b/nuclei-templates/cve-less/plugins/cyklodev-wp-notify-e785890064729677b76cdb50e8ed4af9.yaml new file mode 100644 index 0000000000..606c118af6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cyklodev-wp-notify-e785890064729677b76cdb50e8ed4af9.yaml @@ -0,0 +1,58 @@ +id: cyklodev-wp-notify-e785890064729677b76cdb50e8ed4af9 + +info: + name: > + Cyklodev WP Notify <= 1.3.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f6f8412-f1b1-4566-ad31-f006c19de948?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cyklodev-wp-notify/" + google-query: inurl:"/wp-content/plugins/cyklodev-wp-notify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cyklodev-wp-notify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cyklodev-wp-notify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cyklodev-wp-notify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cyr3lat-dfe9d916adc4339b514e6f246a1ff502.yaml b/nuclei-templates/cve-less/plugins/cyr3lat-dfe9d916adc4339b514e6f246a1ff502.yaml new file mode 100644 index 0000000000..9ba0e9c756 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cyr3lat-dfe9d916adc4339b514e6f246a1ff502.yaml @@ -0,0 +1,58 @@ +id: cyr3lat-dfe9d916adc4339b514e6f246a1ff502 + +info: + name: > + Cyr to Lat <= 3.5 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c29130-1b42-4edd-ad62-6f635e03ae31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cyr3lat/" + google-query: inurl:"/wp-content/plugins/cyr3lat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cyr3lat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cyr3lat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cyr3lat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/cysteme-finder-d8cba654f3eadea699e2d001c5aee33d.yaml b/nuclei-templates/cve-less/plugins/cysteme-finder-d8cba654f3eadea699e2d001c5aee33d.yaml new file mode 100644 index 0000000000..b540a9643f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/cysteme-finder-d8cba654f3eadea699e2d001c5aee33d.yaml @@ -0,0 +1,58 @@ +id: cysteme-finder-d8cba654f3eadea699e2d001c5aee33d + +info: + name: > + CYSTEME Finder <= 1.3 - Arbitrary File Upload/Read + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c3fe714-94c9-47ea-b073-a082e4713977?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cysteme-finder/" + google-query: inurl:"/wp-content/plugins/cysteme-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cysteme-finder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cysteme-finder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cysteme-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/d-bargain-416f60ea7c83625605d6748aec7fe39d.yaml b/nuclei-templates/cve-less/plugins/d-bargain-416f60ea7c83625605d6748aec7fe39d.yaml new file mode 100644 index 0000000000..9fa58e52b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/d-bargain-416f60ea7c83625605d6748aec7fe39d.yaml @@ -0,0 +1,58 @@ +id: d-bargain-416f60ea7c83625605d6748aec7fe39d + +info: + name: > + DBargain <= 3.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3ab817c-3677-4251-adaf-f340bf4c5336?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/d-bargain/" + google-query: inurl:"/wp-content/plugins/d-bargain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,d-bargain,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/d-bargain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "d-bargain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/da-reactions-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/da-reactions-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b1715cdd60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/da-reactions-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: da-reactions-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/da-reactions/" + google-query: inurl:"/wp-content/plugins/da-reactions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,da-reactions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/da-reactions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "da-reactions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daext-autolinks-manager-5325e87d52794ad590ce110a225276ac.yaml b/nuclei-templates/cve-less/plugins/daext-autolinks-manager-5325e87d52794ad590ce110a225276ac.yaml new file mode 100644 index 0000000000..f14cc6dad1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daext-autolinks-manager-5325e87d52794ad590ce110a225276ac.yaml @@ -0,0 +1,58 @@ +id: daext-autolinks-manager-5325e87d52794ad590ce110a225276ac + +info: + name: > + Autolinks Manager <= 1.10.04 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec5d29e-43e2-4cd3-8164-94b01fab4d64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daext-autolinks-manager/" + google-query: inurl:"/wp-content/plugins/daext-autolinks-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daext-autolinks-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daext-autolinks-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daext-autolinks-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daggerhart-openid-connect-generic-203fbe5cb049e55d1de84283cabe5bc1.yaml b/nuclei-templates/cve-less/plugins/daggerhart-openid-connect-generic-203fbe5cb049e55d1de84283cabe5bc1.yaml new file mode 100644 index 0000000000..82ae83d211 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daggerhart-openid-connect-generic-203fbe5cb049e55d1de84283cabe5bc1.yaml @@ -0,0 +1,58 @@ +id: daggerhart-openid-connect-generic-203fbe5cb049e55d1de84283cabe5bc1 + +info: + name: > + OpenID Connect Generic Client 3.8.0-3.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2f94d61-a3ec-4e25-bbd0-651b553b9c7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daggerhart-openid-connect-generic/" + google-query: inurl:"/wp-content/plugins/daggerhart-openid-connect-generic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daggerhart-openid-connect-generic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daggerhart-openid-connect-generic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daggerhart-openid-connect-generic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.8.0', '<= 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daily-inspiration-generator-01b11fa90adbc20afc1174f440091c8c.yaml b/nuclei-templates/cve-less/plugins/daily-inspiration-generator-01b11fa90adbc20afc1174f440091c8c.yaml new file mode 100644 index 0000000000..9e908ddcdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daily-inspiration-generator-01b11fa90adbc20afc1174f440091c8c.yaml @@ -0,0 +1,58 @@ +id: daily-inspiration-generator-01b11fa90adbc20afc1174f440091c8c + +info: + name: > + Daily Inspiration Generator <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc56fe18-f0f4-4f7b-96c2-40d376e0fd74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daily-inspiration-generator/" + google-query: inurl:"/wp-content/plugins/daily-inspiration-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daily-inspiration-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daily-inspiration-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daily-inspiration-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daily-inspiration-generator-bc0818b74a63c7ccc5e71ee4877ab3c0.yaml b/nuclei-templates/cve-less/plugins/daily-inspiration-generator-bc0818b74a63c7ccc5e71ee4877ab3c0.yaml new file mode 100644 index 0000000000..7aa043783d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daily-inspiration-generator-bc0818b74a63c7ccc5e71ee4877ab3c0.yaml @@ -0,0 +1,58 @@ +id: daily-inspiration-generator-bc0818b74a63c7ccc5e71ee4877ab3c0 + +info: + name: > + Daily Inspiration Generator <= 2.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03733eb8-63c7-4798-9d87-e80a6112da6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daily-inspiration-generator/" + google-query: inurl:"/wp-content/plugins/daily-inspiration-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daily-inspiration-generator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daily-inspiration-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daily-inspiration-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-1924e010841990f8a5472d7ce0d4475a.yaml b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-1924e010841990f8a5472d7ce0d4475a.yaml new file mode 100644 index 0000000000..49028ee69c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-1924e010841990f8a5472d7ce0d4475a.yaml @@ -0,0 +1,58 @@ +id: daily-prayer-time-for-mosques-1924e010841990f8a5472d7ce0d4475a + +info: + name: > + Daily Prayer Time <= 2021.08.09 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d62d0971-c4bc-40f7-80b4-a3d54ce4f3ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daily-prayer-time-for-mosques/" + google-query: inurl:"/wp-content/plugins/daily-prayer-time-for-mosques/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daily-prayer-time-for-mosques,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daily-prayer-time-for-mosques/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daily-prayer-time-for-mosques" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2021.08.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-1c709780f30cba2883c1f114a8ebe301.yaml b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-1c709780f30cba2883c1f114a8ebe301.yaml new file mode 100644 index 0000000000..adf59dd246 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-1c709780f30cba2883c1f114a8ebe301.yaml @@ -0,0 +1,58 @@ +id: daily-prayer-time-for-mosques-1c709780f30cba2883c1f114a8ebe301 + +info: + name: > + Daily Prayer Time <= 2023.10.13 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0ccd265-2e64-4b23-a032-aaeb9941df34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daily-prayer-time-for-mosques/" + google-query: inurl:"/wp-content/plugins/daily-prayer-time-for-mosques/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daily-prayer-time-for-mosques,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daily-prayer-time-for-mosques/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daily-prayer-time-for-mosques" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2023.10.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-2af4f586d3d7a602ecd50af91c2499d1.yaml b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-2af4f586d3d7a602ecd50af91c2499d1.yaml new file mode 100644 index 0000000000..873bb0c512 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-2af4f586d3d7a602ecd50af91c2499d1.yaml @@ -0,0 +1,58 @@ +id: daily-prayer-time-for-mosques-2af4f586d3d7a602ecd50af91c2499d1 + +info: + name: > + Daily Prayer Time <= 2023.03.08 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9060bb2a-b9d9-466d-bb8d-14173a51d145?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daily-prayer-time-for-mosques/" + google-query: inurl:"/wp-content/plugins/daily-prayer-time-for-mosques/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daily-prayer-time-for-mosques,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daily-prayer-time-for-mosques/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daily-prayer-time-for-mosques" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2023.03.08') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-3824f011eab5214f502db246222a2a64.yaml b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-3824f011eab5214f502db246222a2a64.yaml new file mode 100644 index 0000000000..1d17683f26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-3824f011eab5214f502db246222a2a64.yaml @@ -0,0 +1,58 @@ +id: daily-prayer-time-for-mosques-3824f011eab5214f502db246222a2a64 + +info: + name: > + Daily Prayer Time <= 2023.03.20 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95691873-a16a-4e41-9456-41fa07efd6ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daily-prayer-time-for-mosques/" + google-query: inurl:"/wp-content/plugins/daily-prayer-time-for-mosques/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daily-prayer-time-for-mosques,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daily-prayer-time-for-mosques/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daily-prayer-time-for-mosques" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2023.03.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-efb19c791feda5e8b127998d60bcf234.yaml b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-efb19c791feda5e8b127998d60bcf234.yaml new file mode 100644 index 0000000000..3a92dbc543 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daily-prayer-time-for-mosques-efb19c791feda5e8b127998d60bcf234.yaml @@ -0,0 +1,58 @@ +id: daily-prayer-time-for-mosques-efb19c791feda5e8b127998d60bcf234 + +info: + name: > + Daily Prayer Time < 2022.03.01 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab46b494-e7c5-42fd-9906-2a7a529e2794?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daily-prayer-time-for-mosques/" + google-query: inurl:"/wp-content/plugins/daily-prayer-time-for-mosques/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daily-prayer-time-for-mosques,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daily-prayer-time-for-mosques/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daily-prayer-time-for-mosques" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2022.03.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dancepress-trwa-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/dancepress-trwa-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c9919c81ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dancepress-trwa-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: dancepress-trwa-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dancepress-trwa/" + google-query: inurl:"/wp-content/plugins/dancepress-trwa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dancepress-trwa,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dancepress-trwa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dancepress-trwa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dandyid-services-9018d0e2961530505f24475e2d5e362f.yaml b/nuclei-templates/cve-less/plugins/dandyid-services-9018d0e2961530505f24475e2d5e362f.yaml new file mode 100644 index 0000000000..d080624b4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dandyid-services-9018d0e2961530505f24475e2d5e362f.yaml @@ -0,0 +1,58 @@ +id: dandyid-services-9018d0e2961530505f24475e2d5e362f + +info: + name: > + DandyID Services <= 1.5.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd1c1c0-0eb4-430d-a65b-9bf30a7dd52a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dandyid-services/" + google-query: inurl:"/wp-content/plugins/dandyid-services/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dandyid-services,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dandyid-services/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dandyid-services" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dans-gcal-1c6832c32d7ec7d1a800137a443af3a0.yaml b/nuclei-templates/cve-less/plugins/dans-gcal-1c6832c32d7ec7d1a800137a443af3a0.yaml new file mode 100644 index 0000000000..bca40ad105 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dans-gcal-1c6832c32d7ec7d1a800137a443af3a0.yaml @@ -0,0 +1,58 @@ +id: dans-gcal-1c6832c32d7ec7d1a800137a443af3a0 + +info: + name: > + Dan's Embedder for Google Calendar <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbca88e0-1563-43cb-adf4-4f89856a07d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dans-gcal/" + google-query: inurl:"/wp-content/plugins/dans-gcal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dans-gcal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dans-gcal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dans-gcal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dark-mode-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/dark-mode-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..2270f168c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dark-mode-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: dark-mode-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dark-mode/" + google-query: inurl:"/wp-content/plugins/dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dark-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dark-mode-1955d2bf9e3369181a1e0d457e568aab.yaml b/nuclei-templates/cve-less/plugins/dark-mode-1955d2bf9e3369181a1e0d457e568aab.yaml new file mode 100644 index 0000000000..03e121a931 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dark-mode-1955d2bf9e3369181a1e0d457e568aab.yaml @@ -0,0 +1,58 @@ +id: dark-mode-1955d2bf9e3369181a1e0d457e568aab + +info: + name: > + WP Markdown Editor (Formerly Dark Mode) < 1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52af7568-061d-4352-b85c-11f9829bc8a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dark-mode/" + google-query: inurl:"/wp-content/plugins/dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dark-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dark-mode-854c79af36aba0da3346494de4eaf39a.yaml b/nuclei-templates/cve-less/plugins/dark-mode-854c79af36aba0da3346494de4eaf39a.yaml new file mode 100644 index 0000000000..aef06e0a84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dark-mode-854c79af36aba0da3346494de4eaf39a.yaml @@ -0,0 +1,58 @@ +id: dark-mode-854c79af36aba0da3346494de4eaf39a + +info: + name: > + WP Markdown Editor (Formerly Dark Mode) < 1.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6830f98b-21f8-4089-9091-1dcd31697425?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dark-mode/" + google-query: inurl:"/wp-content/plugins/dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dark-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..037f31e987 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dark-mode/" + google-query: inurl:"/wp-content/plugins/dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dark-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/darklup-lite-wp-dark-mode-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/darklup-lite-wp-dark-mode-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..3391f8d431 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/darklup-lite-wp-dark-mode-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: darklup-lite-wp-dark-mode-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/darklup-lite-wp-dark-mode/" + google-query: inurl:"/wp-content/plugins/darklup-lite-wp-dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,darklup-lite-wp-dark-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/darklup-lite-wp-dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "darklup-lite-wp-dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/darklup-lite-wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/darklup-lite-wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..5f76bfdade --- /dev/null +++ b/nuclei-templates/cve-less/plugins/darklup-lite-wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: darklup-lite-wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/darklup-lite-wp-dark-mode/" + google-query: inurl:"/wp-content/plugins/darklup-lite-wp-dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,darklup-lite-wp-dark-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/darklup-lite-wp-dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "darklup-lite-wp-dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dashboard-to-do-list-59a2c5c80739fa0eba22f8a13d17e144.yaml b/nuclei-templates/cve-less/plugins/dashboard-to-do-list-59a2c5c80739fa0eba22f8a13d17e144.yaml new file mode 100644 index 0000000000..fd9d44781d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dashboard-to-do-list-59a2c5c80739fa0eba22f8a13d17e144.yaml @@ -0,0 +1,58 @@ +id: dashboard-to-do-list-59a2c5c80739fa0eba22f8a13d17e144 + +info: + name: > + Dashboard To-Do List <= 1.3.1 - Cross-Site Request Forgery via ardtdw_widgetupdate() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbc8cc43-8509-44e5-bd16-367eca02c24e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dashboard-to-do-list/" + google-query: inurl:"/wp-content/plugins/dashboard-to-do-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dashboard-to-do-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dashboard-to-do-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dashboard-to-do-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..3df90aded4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: dashboard-welcome-for-elementor-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dashboard-welcome-for-elementor/" + google-query: inurl:"/wp-content/plugins/dashboard-welcome-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dashboard-welcome-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dashboard-welcome-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dashboard-welcome-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..acf87fb07a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: dashboard-welcome-for-elementor-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dashboard-welcome-for-elementor/" + google-query: inurl:"/wp-content/plugins/dashboard-welcome-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dashboard-welcome-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dashboard-welcome-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dashboard-welcome-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..b4b3c677d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dashboard-welcome-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: dashboard-welcome-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dashboard-welcome-for-elementor/" + google-query: inurl:"/wp-content/plugins/dashboard-welcome-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dashboard-welcome-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dashboard-welcome-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dashboard-welcome-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dashboard-widgets-suite-2f94c3f833650d494dcd027c8f5b2a1d.yaml b/nuclei-templates/cve-less/plugins/dashboard-widgets-suite-2f94c3f833650d494dcd027c8f5b2a1d.yaml new file mode 100644 index 0000000000..d625c875d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dashboard-widgets-suite-2f94c3f833650d494dcd027c8f5b2a1d.yaml @@ -0,0 +1,58 @@ +id: dashboard-widgets-suite-2f94c3f833650d494dcd027c8f5b2a1d + +info: + name: > + Dashboard Widgets Suite <= 3.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/503a44ed-25c2-4178-aeec-756c5b533e04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dashboard-widgets-suite/" + google-query: inurl:"/wp-content/plugins/dashboard-widgets-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dashboard-widgets-suite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dashboard-widgets-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dashboard-widgets-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dashboard-widgets-suite-669f088fb31a1c784e368a7e51016243.yaml b/nuclei-templates/cve-less/plugins/dashboard-widgets-suite-669f088fb31a1c784e368a7e51016243.yaml new file mode 100644 index 0000000000..232493f1db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dashboard-widgets-suite-669f088fb31a1c784e368a7e51016243.yaml @@ -0,0 +1,58 @@ +id: dashboard-widgets-suite-669f088fb31a1c784e368a7e51016243 + +info: + name: > + Dashboard Widgets Suite <= 3.4.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cba77ced-412e-4461-8d2a-980371c78a17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dashboard-widgets-suite/" + google-query: inurl:"/wp-content/plugins/dashboard-widgets-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dashboard-widgets-suite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dashboard-widgets-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dashboard-widgets-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dashicons-cpt-38a12cf4a56d072e88962074fdeb9b47.yaml b/nuclei-templates/cve-less/plugins/dashicons-cpt-38a12cf4a56d072e88962074fdeb9b47.yaml new file mode 100644 index 0000000000..114f0cf189 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dashicons-cpt-38a12cf4a56d072e88962074fdeb9b47.yaml @@ -0,0 +1,58 @@ +id: dashicons-cpt-38a12cf4a56d072e88962074fdeb9b47 + +info: + name: > + Dashicons + Custom Post Types <= 1.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22d58028-a12c-4d72-b275-ba37a58dc10d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dashicons-cpt/" + google-query: inurl:"/wp-content/plugins/dashicons-cpt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dashicons-cpt,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dashicons-cpt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dashicons-cpt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dashylite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/dashylite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0429df61d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dashylite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: dashylite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dashylite/" + google-query: inurl:"/wp-content/plugins/dashylite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dashylite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dashylite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dashylite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-22fbc746f561f8f03289b13752af9220.yaml b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-22fbc746f561f8f03289b13752af9220.yaml new file mode 100644 index 0000000000..eb8ee2133e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-22fbc746f561f8f03289b13752af9220.yaml @@ -0,0 +1,58 @@ +id: data-tables-generator-by-supsystic-22fbc746f561f8f03289b13752af9220 + +info: + name: > + Data Tables Generator by Supsystic <= 1.9.99 - Time-Based Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/121a3b46-0b31-4f28-b98e-fc06760548ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/data-tables-generator-by-supsystic/" + google-query: inurl:"/wp-content/plugins/data-tables-generator-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/data-tables-generator-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "data-tables-generator-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-384cfba7d4e3422564ffd94f08c53230.yaml b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-384cfba7d4e3422564ffd94f08c53230.yaml new file mode 100644 index 0000000000..6ed7b9c5a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-384cfba7d4e3422564ffd94f08c53230.yaml @@ -0,0 +1,58 @@ +id: data-tables-generator-by-supsystic-384cfba7d4e3422564ffd94f08c53230 + +info: + name: > + Data Tables Generator by Supsystic <= 1.9.91 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/406857f1-6bd6-4888-b5c5-d2c8be1b8ef9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/data-tables-generator-by-supsystic/" + google-query: inurl:"/wp-content/plugins/data-tables-generator-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/data-tables-generator-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "data-tables-generator-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-3ca2d0288841fb102eec504b49f4dc79.yaml b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-3ca2d0288841fb102eec504b49f4dc79.yaml new file mode 100644 index 0000000000..9f52521b3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-3ca2d0288841fb102eec504b49f4dc79.yaml @@ -0,0 +1,58 @@ +id: data-tables-generator-by-supsystic-3ca2d0288841fb102eec504b49f4dc79 + +info: + name: > + Data Tables Generator by Supsystic <= 1.9.91 - Missing Authorization on AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56f9d46f-5c21-4e8e-8e77-c96c4a0562d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/data-tables-generator-by-supsystic/" + google-query: inurl:"/wp-content/plugins/data-tables-generator-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/data-tables-generator-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "data-tables-generator-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-7bb51482172811e3c51edf370ad2cde3.yaml b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-7bb51482172811e3c51edf370ad2cde3.yaml new file mode 100644 index 0000000000..5bc360e542 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-7bb51482172811e3c51edf370ad2cde3.yaml @@ -0,0 +1,58 @@ +id: data-tables-generator-by-supsystic-7bb51482172811e3c51edf370ad2cde3 + +info: + name: > + Data Tables Generator By Supsystic <= 1.10.19 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c788d06-6a80-4e34-92bb-b87f21916810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/data-tables-generator-by-supsystic/" + google-query: inurl:"/wp-content/plugins/data-tables-generator-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/data-tables-generator-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "data-tables-generator-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-c639be60406ab3b6aefe17af97aa1a3c.yaml b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-c639be60406ab3b6aefe17af97aa1a3c.yaml new file mode 100644 index 0000000000..771a1a8db4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-c639be60406ab3b6aefe17af97aa1a3c.yaml @@ -0,0 +1,58 @@ +id: data-tables-generator-by-supsystic-c639be60406ab3b6aefe17af97aa1a3c + +info: + name: > + Data Tables Generator by Supsystic <= 1.10.31 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c61b3a7-25a9-4890-a294-378883ebe11d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/data-tables-generator-by-supsystic/" + google-query: inurl:"/wp-content/plugins/data-tables-generator-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/data-tables-generator-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "data-tables-generator-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-c974ccf1587cec2eccea9add62a9571f.yaml b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-c974ccf1587cec2eccea9add62a9571f.yaml new file mode 100644 index 0000000000..91f054061f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/data-tables-generator-by-supsystic-c974ccf1587cec2eccea9add62a9571f.yaml @@ -0,0 +1,58 @@ +id: data-tables-generator-by-supsystic-c974ccf1587cec2eccea9add62a9571f + +info: + name: > + Data Tables Generator by Supsystic <= 1.10.25 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae98e3bd-f663-4609-92ed-ed0431047d85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/data-tables-generator-by-supsystic/" + google-query: inurl:"/wp-content/plugins/data-tables-generator-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/data-tables-generator-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "data-tables-generator-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/database-backups-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml b/nuclei-templates/cve-less/plugins/database-backups-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml new file mode 100644 index 0000000000..8ca57a3296 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/database-backups-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml @@ -0,0 +1,58 @@ +id: database-backups-e75e8a53a3e5f421e8dff4ebc1472f1b + +info: + name: > + Database Backups <= 1.2.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0cae039-e112-48b4-8e8b-f617108601df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/database-backups/" + google-query: inurl:"/wp-content/plugins/database-backups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,database-backups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/database-backups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "database-backups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/database-browser-e2758e6d7a956b70bbb3456d32eb61ef.yaml b/nuclei-templates/cve-less/plugins/database-browser-e2758e6d7a956b70bbb3456d32eb61ef.yaml new file mode 100644 index 0000000000..c4783f901d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/database-browser-e2758e6d7a956b70bbb3456d32eb61ef.yaml @@ -0,0 +1,58 @@ +id: database-browser-e2758e6d7a956b70bbb3456d32eb61ef + +info: + name: > + Database Browser <= 1.4.4 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/546d4f19-0e6f-447b-95c9-d86291477c80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/database-browser/" + google-query: inurl:"/wp-content/plugins/database-browser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,database-browser,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/database-browser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "database-browser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/database-cleaner-8497dd1697d238f17e5ca2e374ee6979.yaml b/nuclei-templates/cve-less/plugins/database-cleaner-8497dd1697d238f17e5ca2e374ee6979.yaml new file mode 100644 index 0000000000..5576ccd3ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/database-cleaner-8497dd1697d238f17e5ca2e374ee6979.yaml @@ -0,0 +1,58 @@ +id: database-cleaner-8497dd1697d238f17e5ca2e374ee6979 + +info: + name: > + Database Cleaner <= 0.9.8 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4031f857-9712-4f4a-93e8-0b01f9a9c32d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/database-cleaner/" + google-query: inurl:"/wp-content/plugins/database-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,database-cleaner,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/database-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "database-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/database-collation-fix-fcc1a4da03b48b602844cc8edd8898d5.yaml b/nuclei-templates/cve-less/plugins/database-collation-fix-fcc1a4da03b48b602844cc8edd8898d5.yaml new file mode 100644 index 0000000000..5fe4b8cfca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/database-collation-fix-fcc1a4da03b48b602844cc8edd8898d5.yaml @@ -0,0 +1,58 @@ +id: database-collation-fix-fcc1a4da03b48b602844cc8edd8898d5 + +info: + name: > + Database Collation Fix <= 1.2.7 - Cross-Site Request Forgery via admin_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31612b4b-a75f-4fa4-831b-43f62a8d5fad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/database-collation-fix/" + google-query: inurl:"/wp-content/plugins/database-collation-fix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,database-collation-fix,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/database-collation-fix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "database-collation-fix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/database-for-cf7-95d14048da02f26059f2e07a39b028ec.yaml b/nuclei-templates/cve-less/plugins/database-for-cf7-95d14048da02f26059f2e07a39b028ec.yaml new file mode 100644 index 0000000000..09d230031e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/database-for-cf7-95d14048da02f26059f2e07a39b028ec.yaml @@ -0,0 +1,58 @@ +id: database-for-cf7-95d14048da02f26059f2e07a39b028ec + +info: + name: > + Database for CF7 <= 1.2.4 - Missing Authorization via wpcf7db_delete AJAX action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fcaab95-7940-45f9-a3c2-c3b0dc540b61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/database-for-cf7/" + google-query: inurl:"/wp-content/plugins/database-for-cf7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,database-for-cf7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/database-for-cf7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "database-for-cf7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/database-peek-f5177dce5f851a784de6243f1a4812de.yaml b/nuclei-templates/cve-less/plugins/database-peek-f5177dce5f851a784de6243f1a4812de.yaml new file mode 100644 index 0000000000..44c0a563df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/database-peek-f5177dce5f851a784de6243f1a4812de.yaml @@ -0,0 +1,58 @@ +id: database-peek-f5177dce5f851a784de6243f1a4812de + +info: + name: > + Database Peek <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/205d639c-6fc9-425c-b7ec-89217e02a028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/database-peek/" + google-query: inurl:"/wp-content/plugins/database-peek/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,database-peek,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/database-peek/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "database-peek" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/database-sync-2aec16dd65c0e6d2c91755c0d886efa6.yaml b/nuclei-templates/cve-less/plugins/database-sync-2aec16dd65c0e6d2c91755c0d886efa6.yaml new file mode 100644 index 0000000000..d6d86c17ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/database-sync-2aec16dd65c0e6d2c91755c0d886efa6.yaml @@ -0,0 +1,58 @@ +id: database-sync-2aec16dd65c0e6d2c91755c0d886efa6 + +info: + name: > + Database Sync < 0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/578b17d4-16cf-449a-9d99-cd9a0f7a8418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/database-sync/" + google-query: inurl:"/wp-content/plugins/database-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,database-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/database-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "database-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/date-time-picker-field-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/date-time-picker-field-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e546967230 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/date-time-picker-field-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: date-time-picker-field-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/date-time-picker-field/" + google-query: inurl:"/wp-content/plugins/date-time-picker-field/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,date-time-picker-field,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/date-time-picker-field/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "date-time-picker-field" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daves-wordpress-live-search-00d2f835919a4763491bb6e0afc99ba1.yaml b/nuclei-templates/cve-less/plugins/daves-wordpress-live-search-00d2f835919a4763491bb6e0afc99ba1.yaml new file mode 100644 index 0000000000..8e2de95ab0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daves-wordpress-live-search-00d2f835919a4763491bb6e0afc99ba1.yaml @@ -0,0 +1,58 @@ +id: daves-wordpress-live-search-00d2f835919a4763491bb6e0afc99ba1 + +info: + name: > + Dave's WordPress Live Search <= 4.8.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/046ecbe5-4b2f-40d3-8585-4d4230ba33f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daves-wordpress-live-search/" + google-query: inurl:"/wp-content/plugins/daves-wordpress-live-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daves-wordpress-live-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daves-wordpress-live-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daves-wordpress-live-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/daves-wordpress-live-search-7110928090e9f383ac11ab04f9355ce4.yaml b/nuclei-templates/cve-less/plugins/daves-wordpress-live-search-7110928090e9f383ac11ab04f9355ce4.yaml new file mode 100644 index 0000000000..6929c9d68c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/daves-wordpress-live-search-7110928090e9f383ac11ab04f9355ce4.yaml @@ -0,0 +1,58 @@ +id: daves-wordpress-live-search-7110928090e9f383ac11ab04f9355ce4 + +info: + name: > + Dave's WordPress Live Search <= 4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3003bd3b-aee5-4bac-9a62-e747f544d2bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/daves-wordpress-live-search/" + google-query: inurl:"/wp-content/plugins/daves-wordpress-live-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,daves-wordpress-live-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/daves-wordpress-live-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daves-wordpress-live-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dazzlersoft-teams-a68d2dddb296088b38bf42abce9933d3.yaml b/nuclei-templates/cve-less/plugins/dazzlersoft-teams-a68d2dddb296088b38bf42abce9933d3.yaml new file mode 100644 index 0000000000..8366d0e8ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dazzlersoft-teams-a68d2dddb296088b38bf42abce9933d3.yaml @@ -0,0 +1,58 @@ +id: dazzlersoft-teams-a68d2dddb296088b38bf42abce9933d3 + +info: + name: > + Team Members Showcase <= 1.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad88c661-601c-411f-9495-2c3b8a568c6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dazzlersoft-teams/" + google-query: inurl:"/wp-content/plugins/dazzlersoft-teams/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dazzlersoft-teams,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dazzlersoft-teams/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dazzlersoft-teams" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/db-backup-3d0fd8af5f0a8aec16cd6e87b25d281e.yaml b/nuclei-templates/cve-less/plugins/db-backup-3d0fd8af5f0a8aec16cd6e87b25d281e.yaml new file mode 100644 index 0000000000..7ba28ca081 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/db-backup-3d0fd8af5f0a8aec16cd6e87b25d281e.yaml @@ -0,0 +1,58 @@ +id: db-backup-3d0fd8af5f0a8aec16cd6e87b25d281e + +info: + name: > + DB Backup < 5.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faaade72-35d9-4597-812b-758fa2641472?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/db-backup/" + google-query: inurl:"/wp-content/plugins/db-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,db-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/db-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "db-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dbox-slider-lite-801a0dacfdb031773ac30c73693f41e6.yaml b/nuclei-templates/cve-less/plugins/dbox-slider-lite-801a0dacfdb031773ac30c73693f41e6.yaml new file mode 100644 index 0000000000..8fa6c166f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dbox-slider-lite-801a0dacfdb031773ac30c73693f41e6.yaml @@ -0,0 +1,58 @@ +id: dbox-slider-lite-801a0dacfdb031773ac30c73693f41e6 + +info: + name: > + Dbox 3D Slider Lite <= 1.2.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb3aa518-ef12-4168-a524-ad36397f67cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dbox-slider-lite/" + google-query: inurl:"/wp-content/plugins/dbox-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dbox-slider-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dbox-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dbox-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-050701771ca0e37751fe39d80669e4d1.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-050701771ca0e37751fe39d80669e4d1.yaml new file mode 100644 index 0000000000..84c7e6650b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-050701771ca0e37751fe39d80669e4d1.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-050701771ca0e37751fe39d80669e4d1 + +info: + name: > + WC Marketplace <= 4.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b42ba6a-b618-4633-9372-879c3253a956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-0cabe3cbdd9087635cb4a8e92f2b6354.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-0cabe3cbdd9087635cb4a8e92f2b6354.yaml new file mode 100644 index 0000000000..9b85edcd5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-0cabe3cbdd9087635cb4a8e92f2b6354.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-0cabe3cbdd9087635cb4a8e92f2b6354 + +info: + name: > + Multivendor Marketplace Solution for WooCommerce – WC Marketplace <= 3.8.11.8 - Multiple Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61bd2f32-23a2-4dfe-90f3-81d597b97592?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-115f84062be09f43cd6446e8e537d648.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-115f84062be09f43cd6446e8e537d648.yaml new file mode 100644 index 0000000000..3a623b98ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-115f84062be09f43cd6446e8e537d648.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-115f84062be09f43cd6446e8e537d648 + +info: + name: > + MultiVendorX – MultiVendor Marketplace Solution For WooCommerce <= 3.5.7 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c3d9fa7-8ea2-4213-8b28-2ca9191a8223?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-2a540cf7d36146a7007600dc4f010b65.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-2a540cf7d36146a7007600dc4f010b65.yaml new file mode 100644 index 0000000000..efeb7a3f8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-2a540cf7d36146a7007600dc4f010b65.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-2a540cf7d36146a7007600dc4f010b65 + +info: + name: > + Multivendor Marketplace Solution for WooCommerce – WC Marketplace <= 3.8.11.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a4d8b76-8fb0-4239-ac4b-4ef4428be02b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-3813d137aafb06301157470b18da5221.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-3813d137aafb06301157470b18da5221.yaml new file mode 100644 index 0000000000..4bf362879e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-3813d137aafb06301157470b18da5221.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-3813d137aafb06301157470b18da5221 + +info: + name: > + WC Marketplace <= 4.0.23 - Missing Authorization via mvx_save_dashpages + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cdc0096-8e21-4b82-b9d0-961f48907a09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-8cf78197e7d698f2f23c8fbd16dab60a.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-8cf78197e7d698f2f23c8fbd16dab60a.yaml new file mode 100644 index 0000000000..6f8c95ff39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-8cf78197e7d698f2f23c8fbd16dab60a.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-8cf78197e7d698f2f23c8fbd16dab60a + +info: + name: > + Multivendor Marketplace Solution for WooCommerce – WC Marketplace <= 3.8.11.8 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4752b3a7-dbb0-4326-bfff-b94dd55b4bf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-c1eaaf83160125db463b30ba85a87fdc.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-c1eaaf83160125db463b30ba85a87fdc.yaml new file mode 100644 index 0000000000..66fc71b620 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-c1eaaf83160125db463b30ba85a87fdc.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-c1eaaf83160125db463b30ba85a87fdc + +info: + name: > + MultiVendorX <= 4.0.25 - Improper Authorization on REST Routes via 'save_settings_permission' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afd9046c-5b6a-411e-8e66-ff1ba60d7f9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-d57f8fd6151dd1d65a65a746b8a04b7a.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-d57f8fd6151dd1d65a65a746b8a04b7a.yaml new file mode 100644 index 0000000000..e0178f02ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-d57f8fd6151dd1d65a65a746b8a04b7a.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-d57f8fd6151dd1d65a65a746b8a04b7a + +info: + name: > + WC Marketplace <= 4.1.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9049ac31-b79a-4872-a522-2930fb1dfea6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-d637554edf1f6a8734fd4d40ddaa76fb.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-d637554edf1f6a8734fd4d40ddaa76fb.yaml new file mode 100644 index 0000000000..830c7d96e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-d637554edf1f6a8734fd4d40ddaa76fb.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-d637554edf1f6a8734fd4d40ddaa76fb + +info: + name: > + Multivendor Marketplace Solution for WooCommerce <= 3.7.3 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24f13f9a-b240-4e32-9f12-117dbe7ecac4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-df1e63906c41c42e055b484618d26045.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-df1e63906c41c42e055b484618d26045.yaml new file mode 100644 index 0000000000..62dc30b504 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-df1e63906c41c42e055b484618d26045.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-df1e63906c41c42e055b484618d26045 + +info: + name: > + MultiVendorX Marketplace <= 4.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26e07115-efee-4db5-ba24-25a063286e90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-e66894a498d5cc4419643171ae03b827.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-e66894a498d5cc4419643171ae03b827.yaml new file mode 100644 index 0000000000..6c9e0c86f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-e66894a498d5cc4419643171ae03b827.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-e66894a498d5cc4419643171ae03b827 + +info: + name: > + Multivendor Marketplace Solution for WooCommerce – WC Marketplace < 3.8.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb6bfe31-0c90-4aca-8165-b30507f18ea5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-fb02750d498a9fe091fa40a841ae2cde.yaml b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-fb02750d498a9fe091fa40a841ae2cde.yaml new file mode 100644 index 0000000000..742a251f93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dc-woocommerce-multi-vendor-fb02750d498a9fe091fa40a841ae2cde.yaml @@ -0,0 +1,58 @@ +id: dc-woocommerce-multi-vendor-fb02750d498a9fe091fa40a841ae2cde + +info: + name: > + Multivendor Marketplace Solution for WooCommerce – WC Marketplace <= 3.8.11.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f42c8a0-2dbc-4902-83e4-d9d9ea441e1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dc-woocommerce-multi-vendor/" + google-query: inurl:"/wp-content/plugins/dc-woocommerce-multi-vendor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dc-woocommerce-multi-vendor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dc-woocommerce-multi-vendor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dc-woocommerce-multi-vendor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dd-post-carousel-90dc0d96ef7711389c28489eadab8c4d.yaml b/nuclei-templates/cve-less/plugins/dd-post-carousel-90dc0d96ef7711389c28489eadab8c4d.yaml new file mode 100644 index 0000000000..a278fc0d51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dd-post-carousel-90dc0d96ef7711389c28489eadab8c4d.yaml @@ -0,0 +1,58 @@ +id: dd-post-carousel-90dc0d96ef7711389c28489eadab8c4d + +info: + name: > + Custom Post Carousels with Owl <= 1.4.6 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a89f795d-246d-4a3c-a7a7-5c9867d7a01e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dd-post-carousel/" + google-query: inurl:"/wp-content/plugins/dd-post-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dd-post-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dd-post-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dd-post-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dd-rating-ab9e9f7a6a475ad09ac9f13cde54db19.yaml b/nuclei-templates/cve-less/plugins/dd-rating-ab9e9f7a6a475ad09ac9f13cde54db19.yaml new file mode 100644 index 0000000000..6be9cc37fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dd-rating-ab9e9f7a6a475ad09ac9f13cde54db19.yaml @@ -0,0 +1,58 @@ +id: dd-rating-ab9e9f7a6a475ad09ac9f13cde54db19 + +info: + name: > + DD Rating <= 1.7.1 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad62fd9b-fbd5-4e3d-b910-29143c6813b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dd-rating/" + google-query: inurl:"/wp-content/plugins/dd-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dd-rating,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dd-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dd-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/deal-of-the-day-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/deal-of-the-day-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f19e60f588 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/deal-of-the-day-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: deal-of-the-day-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/deal-of-the-day/" + google-query: inurl:"/wp-content/plugins/deal-of-the-day/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,deal-of-the-day,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/deal-of-the-day/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "deal-of-the-day" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress-88fee3d667cc75ecb76505d8552cdca3.yaml b/nuclei-templates/cve-less/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress-88fee3d667cc75ecb76505d8552cdca3.yaml new file mode 100644 index 0000000000..4b7621eb4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress-88fee3d667cc75ecb76505d8552cdca3.yaml @@ -0,0 +1,58 @@ +id: deans-fckeditor-with-pwwangs-code-plugin-for-wordpress-88fee3d667cc75ecb76505d8552cdca3 + +info: + name: > + Dean's FCKEditor <= 1.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4080bb7-9197-4c93-bcb1-cf7b5833771a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,deans-fckeditor-with-pwwangs-code-plugin-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/deans-fckeditor-with-pwwangs-code-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "deans-fckeditor-with-pwwangs-code-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dearpdf-lite-68faa1f3e16f9348cbcda9eee2cb1dfc.yaml b/nuclei-templates/cve-less/plugins/dearpdf-lite-68faa1f3e16f9348cbcda9eee2cb1dfc.yaml new file mode 100644 index 0000000000..66c18dcb41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dearpdf-lite-68faa1f3e16f9348cbcda9eee2cb1dfc.yaml @@ -0,0 +1,58 @@ +id: dearpdf-lite-68faa1f3e16f9348cbcda9eee2cb1dfc + +info: + name: > + PDF Viewer & 3D PDF Flipbook – DearPDF <= 2.0.38 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/317b2035-e5c7-47a9-a76c-11157127b6c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dearpdf-lite/" + google-query: inurl:"/wp-content/plugins/dearpdf-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dearpdf-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dearpdf-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dearpdf-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dearpdf-lite-6fd235aefa59090c5fd7d5db3ca17c7f.yaml b/nuclei-templates/cve-less/plugins/dearpdf-lite-6fd235aefa59090c5fd7d5db3ca17c7f.yaml new file mode 100644 index 0000000000..c73a3f2e13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dearpdf-lite-6fd235aefa59090c5fd7d5db3ca17c7f.yaml @@ -0,0 +1,58 @@ +id: dearpdf-lite-6fd235aefa59090c5fd7d5db3ca17c7f + +info: + name: > + PDF Viewer & 3D PDF Flipbook – DearPDF <= 2.0.38 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b9aa41e-34bf-4bfb-a341-e101e3771f7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dearpdf-lite/" + google-query: inurl:"/wp-content/plugins/dearpdf-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dearpdf-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dearpdf-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dearpdf-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-assistant-7341f9a401e387eb541b7f0ce957b3d9.yaml b/nuclei-templates/cve-less/plugins/debug-assistant-7341f9a401e387eb541b7f0ce957b3d9.yaml new file mode 100644 index 0000000000..cdc5626a57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-assistant-7341f9a401e387eb541b7f0ce957b3d9.yaml @@ -0,0 +1,58 @@ +id: debug-assistant-7341f9a401e387eb541b7f0ce957b3d9 + +info: + name: > + Debug Assistant <= 1.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4421782-8a7a-4bca-8c5a-7152dfafe902?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-assistant/" + google-query: inurl:"/wp-content/plugins/debug-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-assistant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-assistant-c4cb405587c7aac808cc9a0330f4a287.yaml b/nuclei-templates/cve-less/plugins/debug-assistant-c4cb405587c7aac808cc9a0330f4a287.yaml new file mode 100644 index 0000000000..26062b1a86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-assistant-c4cb405587c7aac808cc9a0330f4a287.yaml @@ -0,0 +1,58 @@ +id: debug-assistant-c4cb405587c7aac808cc9a0330f4a287 + +info: + name: > + Debug Assistant <= 1.4 - Cross-Site Request Forgery via imlt_create_admin + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/429ce9e6-e51b-4f1e-8e26-f679b08d68d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-assistant/" + google-query: inurl:"/wp-content/plugins/debug-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-assistant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-bar-9f879610fe035743b89a5d4d742c5ccf.yaml b/nuclei-templates/cve-less/plugins/debug-bar-9f879610fe035743b89a5d4d742c5ccf.yaml new file mode 100644 index 0000000000..5e9c424bb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-bar-9f879610fe035743b89a5d4d742c5ccf.yaml @@ -0,0 +1,58 @@ +id: debug-bar-9f879610fe035743b89a5d4d742c5ccf + +info: + name: > + Debug Bar <= 0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af71ca13-781d-49ca-948c-03d52d91d11b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-bar/" + google-query: inurl:"/wp-content/plugins/debug-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-bar-elasticpress-cc44bf442001983fd2f67014928f8289.yaml b/nuclei-templates/cve-less/plugins/debug-bar-elasticpress-cc44bf442001983fd2f67014928f8289.yaml new file mode 100644 index 0000000000..ffe2350dab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-bar-elasticpress-cc44bf442001983fd2f67014928f8289.yaml @@ -0,0 +1,58 @@ +id: debug-bar-elasticpress-cc44bf442001983fd2f67014928f8289 + +info: + name: > + Debug Bar ElasticPress <= 2.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5414259c-339d-41fe-a0dc-4d4e4d966e15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-bar-elasticpress/" + google-query: inurl:"/wp-content/plugins/debug-bar-elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-bar-elasticpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-bar-elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-bar-elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-d2a83c1dca589216a7517243ae0b440b.yaml b/nuclei-templates/cve-less/plugins/debug-d2a83c1dca589216a7517243ae0b440b.yaml new file mode 100644 index 0000000000..63092cee64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-d2a83c1dca589216a7517243ae0b440b.yaml @@ -0,0 +1,58 @@ +id: debug-d2a83c1dca589216a7517243ae0b440b + +info: + name: > + Debug <= 1.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa7276bb-6a9b-4cbd-8333-14c4dfac4108?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug/" + google-query: inurl:"/wp-content/plugins/debug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-functions-time-1bf084d49ccfb289b9614422c0f6cfe7.yaml b/nuclei-templates/cve-less/plugins/debug-functions-time-1bf084d49ccfb289b9614422c0f6cfe7.yaml new file mode 100644 index 0000000000..57f443ab6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-functions-time-1bf084d49ccfb289b9614422c0f6cfe7.yaml @@ -0,0 +1,58 @@ +id: debug-functions-time-1bf084d49ccfb289b9614422c0f6cfe7 + +info: + name: > + Find Slow Functions & Actions & Filters & Hooks <= 1.40 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cce4a7cc-d93c-4d0e-ba63-b73bee0ea181?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-functions-time/" + google-query: inurl:"/wp-content/plugins/debug-functions-time/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-functions-time,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-functions-time/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-functions-time" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-log-manager-5aedf0ec7cb5703a0c4feb9fa97466c2.yaml b/nuclei-templates/cve-less/plugins/debug-log-manager-5aedf0ec7cb5703a0c4feb9fa97466c2.yaml new file mode 100644 index 0000000000..c33303fc8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-log-manager-5aedf0ec7cb5703a0c4feb9fa97466c2.yaml @@ -0,0 +1,58 @@ +id: debug-log-manager-5aedf0ec7cb5703a0c4feb9fa97466c2 + +info: + name: > + Debug Log Manager <= 2.3.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16d1eb4a-c68a-43b9-a514-d8751687709a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-log-manager/" + google-query: inurl:"/wp-content/plugins/debug-log-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-log-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-log-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-log-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-log-manager-815fdb5c2ecc295dab6e7b3bac455dda.yaml b/nuclei-templates/cve-less/plugins/debug-log-manager-815fdb5c2ecc295dab6e7b3bac455dda.yaml new file mode 100644 index 0000000000..0c9ac4c653 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-log-manager-815fdb5c2ecc295dab6e7b3bac455dda.yaml @@ -0,0 +1,58 @@ +id: debug-log-manager-815fdb5c2ecc295dab6e7b3bac455dda + +info: + name: > + Debug Log Manager <= 2.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e539549-1125-4b0e-aa3c-c8844041c23a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-log-manager/" + google-query: inurl:"/wp-content/plugins/debug-log-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-log-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-log-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-log-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-log-manager-b42518648b89a6c8b5bea17f9a27b0ef.yaml b/nuclei-templates/cve-less/plugins/debug-log-manager-b42518648b89a6c8b5bea17f9a27b0ef.yaml new file mode 100644 index 0000000000..59b500396c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-log-manager-b42518648b89a6c8b5bea17f9a27b0ef.yaml @@ -0,0 +1,58 @@ +id: debug-log-manager-b42518648b89a6c8b5bea17f9a27b0ef + +info: + name: > + Debug Log Manager <= 2.3.1 - Missing Authorization via toggle_debugging + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48cb5d7b-afbc-4387-ad32-13d2fcb19061?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-log-manager/" + google-query: inurl:"/wp-content/plugins/debug-log-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-log-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-log-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-log-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-log-manager-cdec87c9979cc4a76acefcf4b849c659.yaml b/nuclei-templates/cve-less/plugins/debug-log-manager-cdec87c9979cc4a76acefcf4b849c659.yaml new file mode 100644 index 0000000000..0d850d3c24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-log-manager-cdec87c9979cc4a76acefcf4b849c659.yaml @@ -0,0 +1,58 @@ +id: debug-log-manager-cdec87c9979cc4a76acefcf4b849c659 + +info: + name: > + Debug Log Manager <= 2.2.2 - Directory Listing to Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53dfe8e5-5f13-4c8c-a62e-9da57379da7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-log-manager/" + google-query: inurl:"/wp-content/plugins/debug-log-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-log-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-log-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-log-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-log-manager-f18de85deaea25c6fbd01540999d6426.yaml b/nuclei-templates/cve-less/plugins/debug-log-manager-f18de85deaea25c6fbd01540999d6426.yaml new file mode 100644 index 0000000000..9a3e09206d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-log-manager-f18de85deaea25c6fbd01540999d6426.yaml @@ -0,0 +1,58 @@ +id: debug-log-manager-f18de85deaea25c6fbd01540999d6426 + +info: + name: > + Debug Log Manager <= 2.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33a54cae-0fa3-4c25-bf81-8423f5e01e84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-log-manager/" + google-query: inurl:"/wp-content/plugins/debug-log-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-log-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-log-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-log-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/debug-meta-data-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml b/nuclei-templates/cve-less/plugins/debug-meta-data-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml new file mode 100644 index 0000000000..3517ec77ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/debug-meta-data-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml @@ -0,0 +1,58 @@ +id: debug-meta-data-6ecc3e1b29dcd6c7c18d4d37331ca11a + +info: + name: > + Debug Meta Data <= 1.1.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34c98bb0-2e28-4ed4-8848-04edb66eef96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/debug-meta-data/" + google-query: inurl:"/wp-content/plugins/debug-meta-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,debug-meta-data,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/debug-meta-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "debug-meta-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/decalog-2701fe0e6794c06d119a81cdcc54c2d8.yaml b/nuclei-templates/cve-less/plugins/decalog-2701fe0e6794c06d119a81cdcc54c2d8.yaml new file mode 100644 index 0000000000..94031dd260 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/decalog-2701fe0e6794c06d119a81cdcc54c2d8.yaml @@ -0,0 +1,58 @@ +id: decalog-2701fe0e6794c06d119a81cdcc54c2d8 + +info: + name: > + DecaLog <= 3.9.0 - Authenticated (Admin+) SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c458e6d6-28ba-4465-ace2-5da9e99ca2c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/decalog/" + google-query: inurl:"/wp-content/plugins/decalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,decalog,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/decalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "decalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/decalog-4cad88483ff2a2bf5cf9989b8721b221.yaml b/nuclei-templates/cve-less/plugins/decalog-4cad88483ff2a2bf5cf9989b8721b221.yaml new file mode 100644 index 0000000000..60f6f606cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/decalog-4cad88483ff2a2bf5cf9989b8721b221.yaml @@ -0,0 +1,58 @@ +id: decalog-4cad88483ff2a2bf5cf9989b8721b221 + +info: + name: > + DecaLog <= 3.7.0 - Cross-Site Request Forgery via get_settings_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5de953ee-8a01-4372-a376-74a4cff674ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/decalog/" + google-query: inurl:"/wp-content/plugins/decalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,decalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/decalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "decalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/decon-wp-sms-09af6d4d8c4435a3e0935a8eb5df6c7f.yaml b/nuclei-templates/cve-less/plugins/decon-wp-sms-09af6d4d8c4435a3e0935a8eb5df6c7f.yaml new file mode 100644 index 0000000000..e598ed560b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/decon-wp-sms-09af6d4d8c4435a3e0935a8eb5df6c7f.yaml @@ -0,0 +1,58 @@ +id: decon-wp-sms-09af6d4d8c4435a3e0935a8eb5df6c7f + +info: + name: > + Decon WP SMS <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3bd7b0e-aae3-4ac9-b092-3101da441e1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/decon-wp-sms/" + google-query: inurl:"/wp-content/plugins/decon-wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,decon-wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/decon-wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "decon-wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/decorator-woocommerce-email-customizer-1f3875e7da43782ec8defe59eb7968b1.yaml b/nuclei-templates/cve-less/plugins/decorator-woocommerce-email-customizer-1f3875e7da43782ec8defe59eb7968b1.yaml new file mode 100644 index 0000000000..329630c2b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/decorator-woocommerce-email-customizer-1f3875e7da43782ec8defe59eb7968b1.yaml @@ -0,0 +1,58 @@ +id: decorator-woocommerce-email-customizer-1f3875e7da43782ec8defe59eb7968b1 + +info: + name: > + Decorator - WooCommerce Email Customizer <= 1.2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db664d0a-a58d-4d8b-ae0a-074f32d8710c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/decorator-woocommerce-email-customizer/" + google-query: inurl:"/wp-content/plugins/decorator-woocommerce-email-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,decorator-woocommerce-email-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/decorator-woocommerce-email-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "decorator-woocommerce-email-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/deeper-comments-349bcd84d9f8de30085279d049beebc1.yaml b/nuclei-templates/cve-less/plugins/deeper-comments-349bcd84d9f8de30085279d049beebc1.yaml new file mode 100644 index 0000000000..d133239834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/deeper-comments-349bcd84d9f8de30085279d049beebc1.yaml @@ -0,0 +1,58 @@ +id: deeper-comments-349bcd84d9f8de30085279d049beebc1 + +info: + name: > + Deeper Comments <= 2.1.1 - Missing Authorization to Authenticated(Subscriber+) Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1cbe675-4c0f-430a-b2db-85ba8605d172?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/deeper-comments/" + google-query: inurl:"/wp-content/plugins/deeper-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,deeper-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/deeper-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "deeper-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/defa-online-image-protector-13bfe589bdd47f65243e9b0ade34cdf3.yaml b/nuclei-templates/cve-less/plugins/defa-online-image-protector-13bfe589bdd47f65243e9b0ade34cdf3.yaml new file mode 100644 index 0000000000..60e044d12e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/defa-online-image-protector-13bfe589bdd47f65243e9b0ade34cdf3.yaml @@ -0,0 +1,58 @@ +id: defa-online-image-protector-13bfe589bdd47f65243e9b0ade34cdf3 + +info: + name: > + Defa Online Image Protector Free Edition <= 3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8b69e14-1c21-4f52-a1fb-6da34b00b1fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/defa-online-image-protector/" + google-query: inurl:"/wp-content/plugins/defa-online-image-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,defa-online-image-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/defa-online-image-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "defa-online-image-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/defender-security-709a1cb6d6df454bb23d66adb846b221.yaml b/nuclei-templates/cve-less/plugins/defender-security-709a1cb6d6df454bb23d66adb846b221.yaml new file mode 100644 index 0000000000..6c5387dab2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/defender-security-709a1cb6d6df454bb23d66adb846b221.yaml @@ -0,0 +1,58 @@ +id: defender-security-709a1cb6d6df454bb23d66adb846b221 + +info: + name: > + Defender Security <= 4.2.0 - Masked Login Area Security Feature Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66122be6-7c28-44cc-a8dd-7b2ec64346f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/defender-security/" + google-query: inurl:"/wp-content/plugins/defender-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,defender-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/defender-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "defender-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/defender-security-b3243229c8f5a6b1156c39447c936dd3.yaml b/nuclei-templates/cve-less/plugins/defender-security-b3243229c8f5a6b1156c39447c936dd3.yaml new file mode 100644 index 0000000000..efdec16a8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/defender-security-b3243229c8f5a6b1156c39447c936dd3.yaml @@ -0,0 +1,58 @@ +id: defender-security-b3243229c8f5a6b1156c39447c936dd3 + +info: + name: > + Defender Security <= 3.3.2 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/662ca451-5c69-4973-afc8-5dc1caf57ad7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/defender-security/" + google-query: inurl:"/wp-content/plugins/defender-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,defender-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/defender-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "defender-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/defender-security-c1ef6631b77d67c9c8c86d2d8178a478.yaml b/nuclei-templates/cve-less/plugins/defender-security-c1ef6631b77d67c9c8c86d2d8178a478.yaml new file mode 100644 index 0000000000..9734679b8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/defender-security-c1ef6631b77d67c9c8c86d2d8178a478.yaml @@ -0,0 +1,58 @@ +id: defender-security-c1ef6631b77d67c9c8c86d2d8178a478 + +info: + name: > + Defender Security <= 4.0.2 - Hide Login Page Feature Protection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08dee232-7373-4da4-9c2c-c3aa52f9b588?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/defender-security/" + google-query: inurl:"/wp-content/plugins/defender-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,defender-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/defender-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "defender-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/defender-security-c321ccd5d4d39fbb513def54b28e9e2a.yaml b/nuclei-templates/cve-less/plugins/defender-security-c321ccd5d4d39fbb513def54b28e9e2a.yaml new file mode 100644 index 0000000000..e37891d3ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/defender-security-c321ccd5d4d39fbb513def54b28e9e2a.yaml @@ -0,0 +1,58 @@ +id: defender-security-c321ccd5d4d39fbb513def54b28e9e2a + +info: + name: > + Defender Security <= 4.1.0 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94c8979a-db2e-490f-b055-cdf19a48cf73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/defender-security/" + google-query: inurl:"/wp-content/plugins/defender-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,defender-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/defender-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "defender-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/defender-security-d7852421719681a9a67e3d9678703a82.yaml b/nuclei-templates/cve-less/plugins/defender-security-d7852421719681a9a67e3d9678703a82.yaml new file mode 100644 index 0000000000..157026990d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/defender-security-d7852421719681a9a67e3d9678703a82.yaml @@ -0,0 +1,58 @@ +id: defender-security-d7852421719681a9a67e3d9678703a82 + +info: + name: > + Defender Security <= 4.4.1 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e014d8b6-9ce3-40ec-862e-ab5f220f1b6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/defender-security/" + google-query: inurl:"/wp-content/plugins/defender-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,defender-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/defender-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "defender-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/defender-security-ef25625daa30e1c21a7eef5298a77b22.yaml b/nuclei-templates/cve-less/plugins/defender-security-ef25625daa30e1c21a7eef5298a77b22.yaml new file mode 100644 index 0000000000..e84704fb0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/defender-security-ef25625daa30e1c21a7eef5298a77b22.yaml @@ -0,0 +1,58 @@ +id: defender-security-ef25625daa30e1c21a7eef5298a77b22 + +info: + name: > + Defender Security <= 2.4.6 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e772fbbe-33d5-46fa-a041-ab07d3f9318f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/defender-security/" + google-query: inurl:"/wp-content/plugins/defender-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,defender-security,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/defender-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "defender-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-all-comments-9ba6d95c0360c569d14b9d24ed1b35ed.yaml b/nuclei-templates/cve-less/plugins/delete-all-comments-9ba6d95c0360c569d14b9d24ed1b35ed.yaml new file mode 100644 index 0000000000..596cc52600 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-all-comments-9ba6d95c0360c569d14b9d24ed1b35ed.yaml @@ -0,0 +1,58 @@ +id: delete-all-comments-9ba6d95c0360c569d14b9d24ed1b35ed + +info: + name: > + Delete All Comments <= 2.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1e98d2d-20b1-4fff-96d4-0fb8e0d2615a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-all-comments/" + google-query: inurl:"/wp-content/plugins/delete-all-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-all-comments,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-all-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-all-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-all-comments-easily-e054a1d4839545a4a78c6e2e05d738b6.yaml b/nuclei-templates/cve-less/plugins/delete-all-comments-easily-e054a1d4839545a4a78c6e2e05d738b6.yaml new file mode 100644 index 0000000000..23f34866c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-all-comments-easily-e054a1d4839545a4a78c6e2e05d738b6.yaml @@ -0,0 +1,58 @@ +id: delete-all-comments-easily-e054a1d4839545a4a78c6e2e05d738b6 + +info: + name: > + Delete All Comments Easily <= 1.3 - All Comments Deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f562b4c-8934-45fd-b9a4-eeb3a6bcf609?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-all-comments-easily/" + google-query: inurl:"/wp-content/plugins/delete-all-comments-easily/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-all-comments-easily,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-all-comments-easily/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-all-comments-easily" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-all-comments-of-website-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/delete-all-comments-of-website-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..98b7ea264c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-all-comments-of-website-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: delete-all-comments-of-website-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-all-comments-of-website/" + google-query: inurl:"/wp-content/plugins/delete-all-comments-of-website/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-all-comments-of-website,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-all-comments-of-website/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-all-comments-of-website" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-custom-fields-348c099c8d52b86e029274e932206d2d.yaml b/nuclei-templates/cve-less/plugins/delete-custom-fields-348c099c8d52b86e029274e932206d2d.yaml new file mode 100644 index 0000000000..12524a0c13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-custom-fields-348c099c8d52b86e029274e932206d2d.yaml @@ -0,0 +1,58 @@ +id: delete-custom-fields-348c099c8d52b86e029274e932206d2d + +info: + name: > + Delete Custom Fields <= 0.3.1 - Cross-Site Request Forgery to Post Meta Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c13ba1df-25fa-4cc8-9745-2d6f6168788a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-custom-fields/" + google-query: inurl:"/wp-content/plugins/delete-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-custom-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-duplicate-posts-7b26661f47c6a54bac357fc46b5b57fd.yaml b/nuclei-templates/cve-less/plugins/delete-duplicate-posts-7b26661f47c6a54bac357fc46b5b57fd.yaml new file mode 100644 index 0000000000..4301754ca5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-duplicate-posts-7b26661f47c6a54bac357fc46b5b57fd.yaml @@ -0,0 +1,58 @@ +id: delete-duplicate-posts-7b26661f47c6a54bac357fc46b5b57fd + +info: + name: > + Delete Duplicate Posts <= 4.8.9 - Missing Authorization via AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f603a25f-7d56-4cf4-89aa-de87ee49522a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-duplicate-posts/" + google-query: inurl:"/wp-content/plugins/delete-duplicate-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-duplicate-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-duplicate-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-duplicate-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-duplicate-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/delete-duplicate-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3f09932369 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-duplicate-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: delete-duplicate-posts-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-duplicate-posts/" + google-query: inurl:"/wp-content/plugins/delete-duplicate-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-duplicate-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-duplicate-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-duplicate-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-duplicate-posts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/delete-duplicate-posts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..ec7b38b063 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-duplicate-posts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: delete-duplicate-posts-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-duplicate-posts/" + google-query: inurl:"/wp-content/plugins/delete-duplicate-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-duplicate-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-duplicate-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-duplicate-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-me-da29ae9abf29175dd27fb6efb7642506.yaml b/nuclei-templates/cve-less/plugins/delete-me-da29ae9abf29175dd27fb6efb7642506.yaml new file mode 100644 index 0000000000..3998ae3bed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-me-da29ae9abf29175dd27fb6efb7642506.yaml @@ -0,0 +1,58 @@ +id: delete-me-da29ae9abf29175dd27fb6efb7642506 + +info: + name: > + Delete Me <= 3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a5123a7-8eb4-481e-88fe-6310be37a077?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-me/" + google-query: inurl:"/wp-content/plugins/delete-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-me,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-me/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-old-orders-7dc8aae42850432c949900f96b92f1dc.yaml b/nuclei-templates/cve-less/plugins/delete-old-orders-7dc8aae42850432c949900f96b92f1dc.yaml new file mode 100644 index 0000000000..76f1b1a438 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-old-orders-7dc8aae42850432c949900f96b92f1dc.yaml @@ -0,0 +1,58 @@ +id: delete-old-orders-7dc8aae42850432c949900f96b92f1dc + +info: + name: > + Delete Old Order <= 0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32a24a9d-b902-4a66-83d5-c8e3b8dd7923?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-old-orders/" + google-query: inurl:"/wp-content/plugins/delete-old-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-old-orders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-old-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-old-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-old-posts-programmatically-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/delete-old-posts-programmatically-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..285b21a92c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-old-posts-programmatically-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: delete-old-posts-programmatically-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-old-posts-programmatically/" + google-query: inurl:"/wp-content/plugins/delete-old-posts-programmatically/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-old-posts-programmatically,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-old-posts-programmatically/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-old-posts-programmatically" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-post-revisions-on-single-click-7898f5c5139842babbcbee2306b1e703.yaml b/nuclei-templates/cve-less/plugins/delete-post-revisions-on-single-click-7898f5c5139842babbcbee2306b1e703.yaml new file mode 100644 index 0000000000..1dcbbc35dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-post-revisions-on-single-click-7898f5c5139842babbcbee2306b1e703.yaml @@ -0,0 +1,58 @@ +id: delete-post-revisions-on-single-click-7898f5c5139842babbcbee2306b1e703 + +info: + name: > + Delete Post Revisions In WordPress <= 4.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1946a48-c1d6-4ca9-909f-0d4b78c25c36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-post-revisions-on-single-click/" + google-query: inurl:"/wp-content/plugins/delete-post-revisions-on-single-click/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-post-revisions-on-single-click,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-post-revisions-on-single-click/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-post-revisions-on-single-click" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delete-usermetas-12a6d01f8c93264a681f271c8f676a9a.yaml b/nuclei-templates/cve-less/plugins/delete-usermetas-12a6d01f8c93264a681f271c8f676a9a.yaml new file mode 100644 index 0000000000..41cb76b42e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delete-usermetas-12a6d01f8c93264a681f271c8f676a9a.yaml @@ -0,0 +1,58 @@ +id: delete-usermetas-12a6d01f8c93264a681f271c8f676a9a + +info: + name: > + Delete Usermetas <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23b46e5b-ce1e-4215-921c-edea7fd6c56a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delete-usermetas/" + google-query: inurl:"/wp-content/plugins/delete-usermetas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delete-usermetas,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delete-usermetas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delete-usermetas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delhivery-logistics-courier-c21b3a23e799a524e3a35bb5025290a6.yaml b/nuclei-templates/cve-less/plugins/delhivery-logistics-courier-c21b3a23e799a524e3a35bb5025290a6.yaml new file mode 100644 index 0000000000..d5dab9a8bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delhivery-logistics-courier-c21b3a23e799a524e3a35bb5025290a6.yaml @@ -0,0 +1,58 @@ +id: delhivery-logistics-courier-c21b3a23e799a524e3a35bb5025290a6 + +info: + name: > + Delhivery Logistics Courier <= 1.0.107 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90465354-0174-4f85-a66b-589d9408c3c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delhivery-logistics-courier/" + google-query: inurl:"/wp-content/plugins/delhivery-logistics-courier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delhivery-logistics-courier,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delhivery-logistics-courier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delhivery-logistics-courier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.107') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delicious-recipes-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/delicious-recipes-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..447d058b19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delicious-recipes-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: delicious-recipes-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delicious-recipes/" + google-query: inurl:"/wp-content/plugins/delicious-recipes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delicious-recipes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delicious-recipes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delicious-recipes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delightful-downloads-49f7af60a7d6ca8e6785ad7873768f2a.yaml b/nuclei-templates/cve-less/plugins/delightful-downloads-49f7af60a7d6ca8e6785ad7873768f2a.yaml new file mode 100644 index 0000000000..1f315048d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delightful-downloads-49f7af60a7d6ca8e6785ad7873768f2a.yaml @@ -0,0 +1,58 @@ +id: delightful-downloads-49f7af60a7d6ca8e6785ad7873768f2a + +info: + name: > + JQueryFileTree <= 2.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f20352f-386f-45ab-b719-8a70f5c11b02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delightful-downloads/" + google-query: inurl:"/wp-content/plugins/delightful-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delightful-downloads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delightful-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delightful-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delivery-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/delivery-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f9fa281a69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delivery-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: delivery-woo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delivery-woo/" + google-query: inurl:"/wp-content/plugins/delivery-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delivery-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delivery-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delivery-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delucks-seo-5457d1ce3892ed5603310b359ae787b8.yaml b/nuclei-templates/cve-less/plugins/delucks-seo-5457d1ce3892ed5603310b359ae787b8.yaml new file mode 100644 index 0000000000..5efe061892 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delucks-seo-5457d1ce3892ed5603310b359ae787b8.yaml @@ -0,0 +1,58 @@ +id: delucks-seo-5457d1ce3892ed5603310b359ae787b8 + +info: + name: > + DELUCKS SEO <= 2.5.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4653f0fd-5369-4e3c-9bce-3f4200c0bddb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delucks-seo/" + google-query: inurl:"/wp-content/plugins/delucks-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delucks-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delucks-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delucks-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/delucks-seo-9ff713bb61b0eb3f270aa06433895190.yaml b/nuclei-templates/cve-less/plugins/delucks-seo-9ff713bb61b0eb3f270aa06433895190.yaml new file mode 100644 index 0000000000..e1e6fd51e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/delucks-seo-9ff713bb61b0eb3f270aa06433895190.yaml @@ -0,0 +1,58 @@ +id: delucks-seo-9ff713bb61b0eb3f270aa06433895190 + +info: + name: > + DELUCKS SEO < 2.1.8 - Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aaa2f738-4764-467c-9544-889ca8ba73d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/delucks-seo/" + google-query: inurl:"/wp-content/plugins/delucks-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,delucks-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/delucks-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "delucks-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demo-my-wordpress-507a6642fe4ac3f015f5c85064630dbd.yaml b/nuclei-templates/cve-less/plugins/demo-my-wordpress-507a6642fe4ac3f015f5c85064630dbd.yaml new file mode 100644 index 0000000000..7ca88b934c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demo-my-wordpress-507a6642fe4ac3f015f5c85064630dbd.yaml @@ -0,0 +1,58 @@ +id: demo-my-wordpress-507a6642fe4ac3f015f5c85064630dbd + +info: + name: > + Demo My WordPress <= 1.0.9.1 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc57d762-1e26-4980-ac82-ba35bf252ef8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demo-my-wordpress/" + google-query: inurl:"/wp-content/plugins/demo-my-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demo-my-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demo-my-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demo-my-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/democracy-poll-2e7b0b07966525201b04f4b815659d00.yaml b/nuclei-templates/cve-less/plugins/democracy-poll-2e7b0b07966525201b04f4b815659d00.yaml new file mode 100644 index 0000000000..257496057a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/democracy-poll-2e7b0b07966525201b04f4b815659d00.yaml @@ -0,0 +1,58 @@ +id: democracy-poll-2e7b0b07966525201b04f4b815659d00 + +info: + name: > + Democracy Poll < 5.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56acae44-6f22-440c-bee1-4cd3831a99ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/democracy-poll/" + google-query: inurl:"/wp-content/plugins/democracy-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,democracy-poll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/democracy-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "democracy-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/democracy-poll-9547ac03aa22594531f4f7ecb05105d2.yaml b/nuclei-templates/cve-less/plugins/democracy-poll-9547ac03aa22594531f4f7ecb05105d2.yaml new file mode 100644 index 0000000000..98bf496e13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/democracy-poll-9547ac03aa22594531f4f7ecb05105d2.yaml @@ -0,0 +1,58 @@ +id: democracy-poll-9547ac03aa22594531f4f7ecb05105d2 + +info: + name: > + Democracy Poll <= 6.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b29144f7-08cb-4703-a977-4fece763abbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/democracy-poll/" + google-query: inurl:"/wp-content/plugins/democracy-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,democracy-poll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/democracy-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "democracy-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/democracy-poll-a76e6fad4bf5d5ba93f81a78338ef54e.yaml b/nuclei-templates/cve-less/plugins/democracy-poll-a76e6fad4bf5d5ba93f81a78338ef54e.yaml new file mode 100644 index 0000000000..f740d34594 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/democracy-poll-a76e6fad4bf5d5ba93f81a78338ef54e.yaml @@ -0,0 +1,58 @@ +id: democracy-poll-a76e6fad4bf5d5ba93f81a78338ef54e + +info: + name: > + Democracy Poll <= 5.3.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9567f63-9161-49a3-9b94-dd6dee5a5628?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/democracy-poll/" + google-query: inurl:"/wp-content/plugins/democracy-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,democracy-poll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/democracy-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "democracy-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-address-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-address-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7e5e750808 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-address-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-address-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-address/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-address/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-address,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-address/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-address" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-address-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-address-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..b65cb9b73f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-address-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-address-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-address/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-address/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-address,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-address/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-address" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-categories-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-categories-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..2a32076d5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-categories-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-categories-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-categories/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-categories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-categories,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-categories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-categories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 201704251008') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-classify-on-publish-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-classify-on-publish-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..eea48e0e5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-classify-on-publish-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-classify-on-publish-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-classify-on-publish/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-classify-on-publish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-classify-on-publish,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-classify-on-publish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-classify-on-publish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 201703020805') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-grid-archive-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-grid-archive-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..645aead75a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-grid-archive-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-grid-archive-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-grid-archive/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-grid-archive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-grid-archive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-grid-archive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-grid-archive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-grid-archive-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-grid-archive-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..7916a47b1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-grid-archive-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-grid-archive-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-grid-archive/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-grid-archive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-grid-archive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-grid-archive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-grid-archive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-media-tools-auto-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-media-tools-auto-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..debc10e64f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-media-tools-auto-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-media-tools-auto-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-media-tools-auto/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-media-tools-auto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-media-tools-auto,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-media-tools-auto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-media-tools-auto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-media-tools-auto-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-media-tools-auto-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..d0347ebe62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-media-tools-auto-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-media-tools-auto-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-media-tools-auto/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-media-tools-auto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-media-tools-auto,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-media-tools-auto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-media-tools-auto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demomentsomtres-wp-export-5c8e28251cab5b1205b7a87c4a2a1426.yaml b/nuclei-templates/cve-less/plugins/demomentsomtres-wp-export-5c8e28251cab5b1205b7a87c4a2a1426.yaml new file mode 100644 index 0000000000..504ab1a296 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demomentsomtres-wp-export-5c8e28251cab5b1205b7a87c4a2a1426.yaml @@ -0,0 +1,58 @@ +id: demomentsomtres-wp-export-5c8e28251cab5b1205b7a87c4a2a1426 + +info: + name: > + DeMomentSomTres WordPress Export Posts With Images <= 20220825 - Missing Authorization to Blog Data Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a43ec32-ed48-4590-8fef-c4f460ffcabc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demomentsomtres-wp-export/" + google-query: inurl:"/wp-content/plugins/demomentsomtres-wp-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demomentsomtres-wp-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demomentsomtres-wp-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demomentsomtres-wp-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20220825') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demon-image-annotation-13d81033dab55eac53421a579e93f29f.yaml b/nuclei-templates/cve-less/plugins/demon-image-annotation-13d81033dab55eac53421a579e93f29f.yaml new file mode 100644 index 0000000000..36bb51483c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demon-image-annotation-13d81033dab55eac53421a579e93f29f.yaml @@ -0,0 +1,58 @@ +id: demon-image-annotation-13d81033dab55eac53421a579e93f29f + +info: + name: > + demon image annotation <= 5.0 - Improper Input Restriction Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac5549ec-f931-4b13-b5f9-0d6f3e53aae4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demon-image-annotation/" + google-query: inurl:"/wp-content/plugins/demon-image-annotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demon-image-annotation,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demon-image-annotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demon-image-annotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demon-image-annotation-14a6574b6d9fc13262269a727d440dc3.yaml b/nuclei-templates/cve-less/plugins/demon-image-annotation-14a6574b6d9fc13262269a727d440dc3.yaml new file mode 100644 index 0000000000..1907f1eca0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demon-image-annotation-14a6574b6d9fc13262269a727d440dc3.yaml @@ -0,0 +1,58 @@ +id: demon-image-annotation-14a6574b6d9fc13262269a727d440dc3 + +info: + name: > + demon image annotation <= 4.7 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/052dce55-c02d-4e66-b500-bf6160a5b188?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demon-image-annotation/" + google-query: inurl:"/wp-content/plugins/demon-image-annotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demon-image-annotation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demon-image-annotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demon-image-annotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0', '<= 4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/demon-image-annotation-9c1a7ab296fd9381f729867ce6c145d6.yaml b/nuclei-templates/cve-less/plugins/demon-image-annotation-9c1a7ab296fd9381f729867ce6c145d6.yaml new file mode 100644 index 0000000000..a809ee5602 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/demon-image-annotation-9c1a7ab296fd9381f729867ce6c145d6.yaml @@ -0,0 +1,58 @@ +id: demon-image-annotation-9c1a7ab296fd9381f729867ce6c145d6 + +info: + name: > + Demon image annotation <= 5.3 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f093dfc8-8a2f-4614-b7c1-4fbf1afa9589?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/demon-image-annotation/" + google-query: inurl:"/wp-content/plugins/demon-image-annotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,demon-image-annotation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/demon-image-annotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "demon-image-annotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/denk-internet-solutions-2e3087c002dc76b9a7567526587e8736.yaml b/nuclei-templates/cve-less/plugins/denk-internet-solutions-2e3087c002dc76b9a7567526587e8736.yaml new file mode 100644 index 0000000000..fd5aa1e379 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/denk-internet-solutions-2e3087c002dc76b9a7567526587e8736.yaml @@ -0,0 +1,58 @@ +id: denk-internet-solutions-2e3087c002dc76b9a7567526587e8736 + +info: + name: > + Actueel Financieel Nieuws – Denk Internet Solutions <= 5.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e0ad29a-b7a0-407e-8fb0-0917b8671afb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/denk-internet-solutions/" + google-query: inurl:"/wp-content/plugins/denk-internet-solutions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,denk-internet-solutions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/denk-internet-solutions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "denk-internet-solutions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/deny-all-firewall-b61c46947c98daf3d7e5aee079c69c53.yaml b/nuclei-templates/cve-less/plugins/deny-all-firewall-b61c46947c98daf3d7e5aee079c69c53.yaml new file mode 100644 index 0000000000..8a2c57f5b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/deny-all-firewall-b61c46947c98daf3d7e5aee079c69c53.yaml @@ -0,0 +1,58 @@ +id: deny-all-firewall-b61c46947c98daf3d7e5aee079c69c53 + +info: + name: > + Deny All Firewall <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0b60313-042b-4e85-a117-9abd95824402?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/deny-all-firewall/" + google-query: inurl:"/wp-content/plugins/deny-all-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,deny-all-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/deny-all-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "deny-all-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/depicter-27cd6d77b0299e752388a04327a5ef2a.yaml b/nuclei-templates/cve-less/plugins/depicter-27cd6d77b0299e752388a04327a5ef2a.yaml new file mode 100644 index 0000000000..7e8d836bd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/depicter-27cd6d77b0299e752388a04327a5ef2a.yaml @@ -0,0 +1,58 @@ +id: depicter-27cd6d77b0299e752388a04327a5ef2a + +info: + name: > + Depicter Slider – Responsive Image Slider, Video Slider & Post Slider <= 2.0.6 - Cross-Site Request Forgery via save + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c907ea-3ab4-4674-8945-ade4f6ff2679?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/depicter/" + google-query: inurl:"/wp-content/plugins/depicter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,depicter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/depicter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "depicter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/depicter-69e238d5564cebaab229183900098117.yaml b/nuclei-templates/cve-less/plugins/depicter-69e238d5564cebaab229183900098117.yaml new file mode 100644 index 0000000000..36f9cb340c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/depicter-69e238d5564cebaab229183900098117.yaml @@ -0,0 +1,58 @@ +id: depicter-69e238d5564cebaab229183900098117 + +info: + name: > + Depicter Slider <= 1.9.0 - Missing Authorization on 'make' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed79e382-acb4-4348-9bc6-b44ec0d75fb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/depicter/" + google-query: inurl:"/wp-content/plugins/depicter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,depicter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/depicter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "depicter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/design-approval-system-eaff27608bcf6deda804f06712a1b098.yaml b/nuclei-templates/cve-less/plugins/design-approval-system-eaff27608bcf6deda804f06712a1b098.yaml new file mode 100644 index 0000000000..2d9eacff0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/design-approval-system-eaff27608bcf6deda804f06712a1b098.yaml @@ -0,0 +1,58 @@ +id: design-approval-system-eaff27608bcf6deda804f06712a1b098 + +info: + name: > + Design Approval System <= 3.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a52dc13f-50b3-4aa3-9924-beb75351673e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/design-approval-system/" + google-query: inurl:"/wp-content/plugins/design-approval-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,design-approval-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/design-approval-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "design-approval-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dethemekit-for-elementor-9e56ce0a564cde270ffad1e5997baa50.yaml b/nuclei-templates/cve-less/plugins/dethemekit-for-elementor-9e56ce0a564cde270ffad1e5997baa50.yaml new file mode 100644 index 0000000000..039b936424 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dethemekit-for-elementor-9e56ce0a564cde270ffad1e5997baa50.yaml @@ -0,0 +1,58 @@ +id: dethemekit-for-elementor-9e56ce0a564cde270ffad1e5997baa50 + +info: + name: > + DethemeKit For Elementor <= 1.5.5.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b3c77d8-0e90-41ee-b7e4-6160f1d5760f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dethemekit-for-elementor/" + google-query: inurl:"/wp-content/plugins/dethemekit-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dethemekit-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dethemekit-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dethemekit-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dethemekit-for-elementor-f509147c445359dac8de4743426be1bb.yaml b/nuclei-templates/cve-less/plugins/dethemekit-for-elementor-f509147c445359dac8de4743426be1bb.yaml new file mode 100644 index 0000000000..db314716fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dethemekit-for-elementor-f509147c445359dac8de4743426be1bb.yaml @@ -0,0 +1,58 @@ +id: dethemekit-for-elementor-f509147c445359dac8de4743426be1bb + +info: + name: > + DethemeKit For Elementor <= 2.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2132d5b4-583d-46c0-be5e-6664bee9cad2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dethemekit-for-elementor/" + google-query: inurl:"/wp-content/plugins/dethemekit-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dethemekit-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dethemekit-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dethemekit-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/devbuddy-twitter-feed-539276d00e4422db414565e796e54c45.yaml b/nuclei-templates/cve-less/plugins/devbuddy-twitter-feed-539276d00e4422db414565e796e54c45.yaml new file mode 100644 index 0000000000..930abf2351 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/devbuddy-twitter-feed-539276d00e4422db414565e796e54c45.yaml @@ -0,0 +1,58 @@ +id: devbuddy-twitter-feed-539276d00e4422db414565e796e54c45 + +info: + name: > + DevBuddy Twitter Feed <= 4.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92a20a1f-6403-4561-acd8-5b076fe2999f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/devbuddy-twitter-feed/" + google-query: inurl:"/wp-content/plugins/devbuddy-twitter-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,devbuddy-twitter-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/devbuddy-twitter-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "devbuddy-twitter-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/devformatter-26f3ee9e0b5d3d296c77f279bcf1dce7.yaml b/nuclei-templates/cve-less/plugins/devformatter-26f3ee9e0b5d3d296c77f279bcf1dce7.yaml new file mode 100644 index 0000000000..f40aaa5e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/devformatter-26f3ee9e0b5d3d296c77f279bcf1dce7.yaml @@ -0,0 +1,58 @@ +id: devformatter-26f3ee9e0b5d3d296c77f279bcf1dce7 + +info: + name: > + Developer Formatter < 2013.0.1.41 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/938be2d0-1e56-42d5-874e-574e78a44932?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/devformatter/" + google-query: inurl:"/wp-content/plugins/devformatter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,devformatter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/devformatter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "devformatter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2013.0.1.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/device-theme-switcher-b029a1561cc2b382c267a1eedf8dbeeb.yaml b/nuclei-templates/cve-less/plugins/device-theme-switcher-b029a1561cc2b382c267a1eedf8dbeeb.yaml new file mode 100644 index 0000000000..e142e3bc22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/device-theme-switcher-b029a1561cc2b382c267a1eedf8dbeeb.yaml @@ -0,0 +1,58 @@ +id: device-theme-switcher-b029a1561cc2b382c267a1eedf8dbeeb + +info: + name: > + Plugin Name: Device Theme Switcher <= 3.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d64d711-f2d9-4447-9ac1-80c5ea51c23e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/device-theme-switcher/" + google-query: inurl:"/wp-content/plugins/device-theme-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,device-theme-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/device-theme-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "device-theme-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/devices-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/devices-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..110678cd8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/devices-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: devices-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/devices/" + google-query: inurl:"/wp-content/plugins/devices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,devices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/devices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "devices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dewplayer-flash-mp3-player-1da0a6197b1106904178e0b8178f3b2f.yaml b/nuclei-templates/cve-less/plugins/dewplayer-flash-mp3-player-1da0a6197b1106904178e0b8178f3b2f.yaml new file mode 100644 index 0000000000..d2039d9064 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dewplayer-flash-mp3-player-1da0a6197b1106904178e0b8178f3b2f.yaml @@ -0,0 +1,58 @@ +id: dewplayer-flash-mp3-player-1da0a6197b1106904178e0b8178f3b2f + +info: + name: > + Dewplayer <= 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3e0f601-d445-4805-858a-8ad1ce9e62df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dewplayer-flash-mp3-player/" + google-query: inurl:"/wp-content/plugins/dewplayer-flash-mp3-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dewplayer-flash-mp3-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dewplayer-flash-mp3-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dewplayer-flash-mp3-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dewplayer-flash-mp3-player-e75a2e4fcc95441946c7906f7e8c8fdf.yaml b/nuclei-templates/cve-less/plugins/dewplayer-flash-mp3-player-e75a2e4fcc95441946c7906f7e8c8fdf.yaml new file mode 100644 index 0000000000..1b25cf01de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dewplayer-flash-mp3-player-e75a2e4fcc95441946c7906f7e8c8fdf.yaml @@ -0,0 +1,58 @@ +id: dewplayer-flash-mp3-player-e75a2e4fcc95441946c7906f7e8c8fdf + +info: + name: > + Dewplayer <= 1.2 and Advanced Dewplayer < 1.5 - Content Spoofing/Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62687f24-4be2-49de-9a7d-265325b0f72b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dewplayer-flash-mp3-player/" + google-query: inurl:"/wp-content/plugins/dewplayer-flash-mp3-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dewplayer-flash-mp3-player,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dewplayer-flash-mp3-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dewplayer-flash-mp3-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dexs-pm-system-9badde4161dcfe466c75ad211f71fa17.yaml b/nuclei-templates/cve-less/plugins/dexs-pm-system-9badde4161dcfe466c75ad211f71fa17.yaml new file mode 100644 index 0000000000..ba03f916a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dexs-pm-system-9badde4161dcfe466c75ad211f71fa17.yaml @@ -0,0 +1,58 @@ +id: dexs-pm-system-9badde4161dcfe466c75ad211f71fa17 + +info: + name: > + Dexs PM System <= 1.0.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9985992-e64c-4292-9738-cd38fb44a6f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dexs-pm-system/" + google-query: inurl:"/wp-content/plugins/dexs-pm-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dexs-pm-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dexs-pm-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dexs-pm-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dh-anti-adblocker-57412b2a8ecc09f7b642fb706ae35e4e.yaml b/nuclei-templates/cve-less/plugins/dh-anti-adblocker-57412b2a8ecc09f7b642fb706ae35e4e.yaml new file mode 100644 index 0000000000..e38780746e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dh-anti-adblocker-57412b2a8ecc09f7b642fb706ae35e4e.yaml @@ -0,0 +1,58 @@ +id: dh-anti-adblocker-57412b2a8ecc09f7b642fb706ae35e4e + +info: + name: > + DH – Anti AdBlocker <= 36 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f79d3938-bf85-4e0d-80a3-2ff365482d36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dh-anti-adblocker/" + google-query: inurl:"/wp-content/plugins/dh-anti-adblocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dh-anti-adblocker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dh-anti-adblocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dh-anti-adblocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dhtmlxspreadsheet-c9ddd0481037c81ec76638f9cdd36097.yaml b/nuclei-templates/cve-less/plugins/dhtmlxspreadsheet-c9ddd0481037c81ec76638f9cdd36097.yaml new file mode 100644 index 0000000000..9f5686b53a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dhtmlxspreadsheet-c9ddd0481037c81ec76638f9cdd36097.yaml @@ -0,0 +1,58 @@ +id: dhtmlxspreadsheet-c9ddd0481037c81ec76638f9cdd36097 + +info: + name: > + dhtmlxSpreadsheet <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97bff7aa-d304-4ccd-bfca-d3f18568df6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dhtmlxspreadsheet/" + google-query: inurl:"/wp-content/plugins/dhtmlxspreadsheet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dhtmlxspreadsheet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dhtmlxspreadsheet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dhtmlxspreadsheet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dialogs-06cd483feacb2d314abff2ed5eebff85.yaml b/nuclei-templates/cve-less/plugins/dialogs-06cd483feacb2d314abff2ed5eebff85.yaml new file mode 100644 index 0000000000..6b36bf34a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dialogs-06cd483feacb2d314abff2ed5eebff85.yaml @@ -0,0 +1,58 @@ +id: dialogs-06cd483feacb2d314abff2ed5eebff85 + +info: + name: > + Dialogs <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d79ad4c-6b7e-4bf9-93af-76b8c3599d47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dialogs/" + google-query: inurl:"/wp-content/plugins/dialogs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dialogs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dialogs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dialogs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/diary-availability-calendar-93b21f556464132da5e236e1e43ab9a3.yaml b/nuclei-templates/cve-less/plugins/diary-availability-calendar-93b21f556464132da5e236e1e43ab9a3.yaml new file mode 100644 index 0000000000..613040cfde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/diary-availability-calendar-93b21f556464132da5e236e1e43ab9a3.yaml @@ -0,0 +1,58 @@ +id: diary-availability-calendar-93b21f556464132da5e236e1e43ab9a3 + +info: + name: > + Diary & Availability Calendar <= 1.0.3 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7e83cee-f2c6-4de0-8801-fb63398f98fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/diary-availability-calendar/" + google-query: inurl:"/wp-content/plugins/diary-availability-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,diary-availability-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/diary-availability-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "diary-availability-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/different-menus-in-different-pages-793865077bcac4ea4b5fe53bac436ec4.yaml b/nuclei-templates/cve-less/plugins/different-menus-in-different-pages-793865077bcac4ea4b5fe53bac436ec4.yaml new file mode 100644 index 0000000000..674e093534 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/different-menus-in-different-pages-793865077bcac4ea4b5fe53bac436ec4.yaml @@ -0,0 +1,58 @@ +id: different-menus-in-different-pages-793865077bcac4ea4b5fe53bac436ec4 + +info: + name: > + Different Menu in Different Pages – Control Menu Visibility (All in One) <= 2.3.2 - Missing Authorization to Menu Duplication + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f9d4d86-9d5f-4888-9cc4-d55c117ae4ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/different-menus-in-different-pages/" + google-query: inurl:"/wp-content/plugins/different-menus-in-different-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,different-menus-in-different-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/different-menus-in-different-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "different-menus-in-different-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digg-digg-20201ad3e5b2ef096de0c5e50dbc6858.yaml b/nuclei-templates/cve-less/plugins/digg-digg-20201ad3e5b2ef096de0c5e50dbc6858.yaml new file mode 100644 index 0000000000..5347c90921 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digg-digg-20201ad3e5b2ef096de0c5e50dbc6858.yaml @@ -0,0 +1,58 @@ +id: digg-digg-20201ad3e5b2ef096de0c5e50dbc6858 + +info: + name: > + Digg Digg < 5.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5df8983e-16c9-4a23-9bf4-331d70384e74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digg-digg/" + google-query: inurl:"/wp-content/plugins/digg-digg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digg-digg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digg-digg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digg-digg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digiproveblog-a302b746a2ef51c079999dc7f35e46c2.yaml b/nuclei-templates/cve-less/plugins/digiproveblog-a302b746a2ef51c079999dc7f35e46c2.yaml new file mode 100644 index 0000000000..c553b3ce65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digiproveblog-a302b746a2ef51c079999dc7f35e46c2.yaml @@ -0,0 +1,58 @@ +id: digiproveblog-a302b746a2ef51c079999dc7f35e46c2 + +info: + name: > + Copyright Proof <= 4.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/487a6c5e-226b-4b30-a402-bd5132d17ea8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digiproveblog/" + google-query: inurl:"/wp-content/plugins/digiproveblog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digiproveblog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digiproveblog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digiproveblog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digirisk-23a7b6466caf75eb82c1916af3aba873.yaml b/nuclei-templates/cve-less/plugins/digirisk-23a7b6466caf75eb82c1916af3aba873.yaml new file mode 100644 index 0000000000..8121c20079 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digirisk-23a7b6466caf75eb82c1916af3aba873.yaml @@ -0,0 +1,58 @@ +id: digirisk-23a7b6466caf75eb82c1916af3aba873 + +info: + name: > + Digirisk 6.0.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d41355ed-77d0-48b3-bbb3-4cc3b4df4b2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digirisk/" + google-query: inurl:"/wp-content/plugins/digirisk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digirisk,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digirisk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digirisk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '6.0.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digital-climate-strike-wp-5cb36e2cb4718da1f24cc088fdc5e522.yaml b/nuclei-templates/cve-less/plugins/digital-climate-strike-wp-5cb36e2cb4718da1f24cc088fdc5e522.yaml new file mode 100644 index 0000000000..97408b3886 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digital-climate-strike-wp-5cb36e2cb4718da1f24cc088fdc5e522.yaml @@ -0,0 +1,58 @@ +id: digital-climate-strike-wp-5cb36e2cb4718da1f24cc088fdc5e522 + +info: + name: > + Digital Climate Strike WP <= 1.0.0 - Malicious Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5294af95-e85f-4425-9c4b-0a92dfac4bd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digital-climate-strike-wp/" + google-query: inurl:"/wp-content/plugins/digital-climate-strike-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digital-climate-strike-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digital-climate-strike-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-climate-strike-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-317667951b7644dbd1a4529b628afac3.yaml b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-317667951b7644dbd1a4529b628afac3.yaml new file mode 100644 index 0000000000..a425673afb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-317667951b7644dbd1a4529b628afac3.yaml @@ -0,0 +1,58 @@ +id: digital-publications-by-supsystic-317667951b7644dbd1a4529b628afac3 + +info: + name: > + Digital Publications by Supsystic <= 1.7.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/763f0c23-49c8-4e7a-b1c1-d33eb5b1b7c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digital-publications-by-supsystic/" + google-query: inurl:"/wp-content/plugins/digital-publications-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digital-publications-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digital-publications-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-publications-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-4de4b5fb4c51e07373cc17e285c57285.yaml b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-4de4b5fb4c51e07373cc17e285c57285.yaml new file mode 100644 index 0000000000..7bd9ad8392 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-4de4b5fb4c51e07373cc17e285c57285.yaml @@ -0,0 +1,58 @@ +id: digital-publications-by-supsystic-4de4b5fb4c51e07373cc17e285c57285 + +info: + name: > + Digital Publications by Supsystic <= 1.6.12 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/592b1df5-74d5-4414-aacb-7497f0f307f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digital-publications-by-supsystic/" + google-query: inurl:"/wp-content/plugins/digital-publications-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digital-publications-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digital-publications-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-publications-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-739db2cc0c9500d655d27c730225e398.yaml b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-739db2cc0c9500d655d27c730225e398.yaml new file mode 100644 index 0000000000..d1d38572a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-739db2cc0c9500d655d27c730225e398.yaml @@ -0,0 +1,58 @@ +id: digital-publications-by-supsystic-739db2cc0c9500d655d27c730225e398 + +info: + name: > + Digital Publications by Supsystic <= 1.7.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/277942cb-f4ca-4197-8f61-2e0cb03115a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digital-publications-by-supsystic/" + google-query: inurl:"/wp-content/plugins/digital-publications-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digital-publications-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digital-publications-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-publications-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-eadc3f836bcbd93a1ac6bfbe3a4ccd12.yaml b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-eadc3f836bcbd93a1ac6bfbe3a4ccd12.yaml new file mode 100644 index 0000000000..f30478d74f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-eadc3f836bcbd93a1ac6bfbe3a4ccd12.yaml @@ -0,0 +1,58 @@ +id: digital-publications-by-supsystic-eadc3f836bcbd93a1ac6bfbe3a4ccd12 + +info: + name: > + Digital Publications by Supsystic <= 1.7.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bd803c7-c120-4967-84e3-5f97fc35a79e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digital-publications-by-supsystic/" + google-query: inurl:"/wp-content/plugins/digital-publications-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digital-publications-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digital-publications-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-publications-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-f0509869323a911d6d3e4dec2a00653a.yaml b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-f0509869323a911d6d3e4dec2a00653a.yaml new file mode 100644 index 0000000000..7ebfdb2257 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-f0509869323a911d6d3e4dec2a00653a.yaml @@ -0,0 +1,58 @@ +id: digital-publications-by-supsystic-f0509869323a911d6d3e4dec2a00653a + +info: + name: > + Digital Publications by Supsystic <= 1.7.6 - Cross-Site Request Forgery via AJAX action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2304e4dc-0dc6-4ded-b8e6-8d76d70f63d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digital-publications-by-supsystic/" + google-query: inurl:"/wp-content/plugins/digital-publications-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digital-publications-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digital-publications-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-publications-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-f546fb5d8bed24f06bc4f3f7768fcf06.yaml b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-f546fb5d8bed24f06bc4f3f7768fcf06.yaml new file mode 100644 index 0000000000..9c90fe21de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digital-publications-by-supsystic-f546fb5d8bed24f06bc4f3f7768fcf06.yaml @@ -0,0 +1,58 @@ +id: digital-publications-by-supsystic-f546fb5d8bed24f06bc4f3f7768fcf06 + +info: + name: > + Digital Publications by Supsystic <= 1.7.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdea1999-a282-4374-a093-5cbd5b05497a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digital-publications-by-supsystic/" + google-query: inurl:"/wp-content/plugins/digital-publications-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digital-publications-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digital-publications-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-publications-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/digits-b7d7504fc6882ec831aaed54e5e753c7.yaml b/nuclei-templates/cve-less/plugins/digits-b7d7504fc6882ec831aaed54e5e753c7.yaml new file mode 100644 index 0000000000..acbc4dde79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/digits-b7d7504fc6882ec831aaed54e5e753c7.yaml @@ -0,0 +1,58 @@ +id: digits-b7d7504fc6882ec831aaed54e5e753c7 + +info: + name: > + Digits <= 8.4.1 - Cross-Site Request Forgery to Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84f2afb4-f1c6-4313-8958-38f1b5140a67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/digits/" + google-query: inurl:"/wp-content/plugins/digits/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,digits,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/digits/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digits" + part: body + + - type: dsl + dsl: + - compare_versions(version, '8.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/direct-checkout-for-woocommerce-5db488a5ce4a9b749eec8867f89dee42.yaml b/nuclei-templates/cve-less/plugins/direct-checkout-for-woocommerce-5db488a5ce4a9b749eec8867f89dee42.yaml new file mode 100644 index 0000000000..d4c67c5d7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/direct-checkout-for-woocommerce-5db488a5ce4a9b749eec8867f89dee42.yaml @@ -0,0 +1,58 @@ +id: direct-checkout-for-woocommerce-5db488a5ce4a9b749eec8867f89dee42 + +info: + name: > + Direct Checkout for WooCommerce – Skip Cart with Buy Buttons <= 1.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73e19ad5-97a9-4c0d-a350-eb556bf20772?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/direct-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/direct-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,direct-checkout-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/direct-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "direct-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directdownload-386a2527052ae342a58190f18af94ea3.yaml b/nuclei-templates/cve-less/plugins/directdownload-386a2527052ae342a58190f18af94ea3.yaml new file mode 100644 index 0000000000..d96fc8b16d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directdownload-386a2527052ae342a58190f18af94ea3.yaml @@ -0,0 +1,58 @@ +id: directdownload-386a2527052ae342a58190f18af94ea3 + +info: + name: > + Direct Download for Woocommerce < 1.16 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5804da94-1dee-47f8-930b-c5413d5506b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directdownload/" + google-query: inurl:"/wp-content/plugins/directdownload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directdownload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directdownload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directdownload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directories-a6efeec3a539abed47ad7c21c911bb3f.yaml b/nuclei-templates/cve-less/plugins/directories-a6efeec3a539abed47ad7c21c911bb3f.yaml new file mode 100644 index 0000000000..4a2697bf44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directories-a6efeec3a539abed47ad7c21c911bb3f.yaml @@ -0,0 +1,58 @@ +id: directories-a6efeec3a539abed47ad7c21c911bb3f + +info: + name: > + DirectoriesPro by SabaiApps <= 1.3.45 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b864aa4-f7e0-4910-b950-ef8b1190c5ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directories/" + google-query: inurl:"/wp-content/plugins/directories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directories,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directories-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml b/nuclei-templates/cve-less/plugins/directories-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml new file mode 100644 index 0000000000..006cddec5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directories-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml @@ -0,0 +1,58 @@ +id: directories-f9f8b8101f4a39f1a6ed5a0936c6104f + +info: + name: > + DirectoriesPro Plugin by SabaiApps <= 1.3.45 - Cross-Site Scripting via _drts_form_build_id, _t_ Parameters + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65e68147-84cc-4b2d-85b9-e5b7bde2e604?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directories/" + google-query: inurl:"/wp-content/plugins/directories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directories,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-01ea85ddd8a050d4ed49539de0e44b17.yaml b/nuclei-templates/cve-less/plugins/directorist-01ea85ddd8a050d4ed49539de0e44b17.yaml new file mode 100644 index 0000000000..6fb2ef8274 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-01ea85ddd8a050d4ed49539de0e44b17.yaml @@ -0,0 +1,58 @@ +id: directorist-01ea85ddd8a050d4ed49539de0e44b17 + +info: + name: > + Directorist <= 7.5.4 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary Post Deletion in listing_task + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b47edd57-cac7-463f-88cc-8922f1b34612?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-0a59eb8864ee4a82b1288b61fa9c3b30.yaml b/nuclei-templates/cve-less/plugins/directorist-0a59eb8864ee4a82b1288b61fa9c3b30.yaml new file mode 100644 index 0000000000..bf06b01e17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-0a59eb8864ee4a82b1288b61fa9c3b30.yaml @@ -0,0 +1,58 @@ +id: directorist-0a59eb8864ee4a82b1288b61fa9c3b30 + +info: + name: > + Directorist <= 7.7.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab233ceb-270c-4694-9cf9-2de8ddfcbbfd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-0ac5cc81243c959ab88705244a2988b3.yaml b/nuclei-templates/cve-less/plugins/directorist-0ac5cc81243c959ab88705244a2988b3.yaml new file mode 100644 index 0000000000..3621d0b14b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-0ac5cc81243c959ab88705244a2988b3.yaml @@ -0,0 +1,58 @@ +id: directorist-0ac5cc81243c959ab88705244a2988b3 + +info: + name: > + Directorist – WordPress Business Directory Plugin with Classified Ads Listings <= 7.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec03840e-807b-4a9c-87e7-a1560b8b7f5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-1187996edf4177af89ef3ea40b60db53.yaml b/nuclei-templates/cve-less/plugins/directorist-1187996edf4177af89ef3ea40b60db53.yaml new file mode 100644 index 0000000000..8ce48c81a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-1187996edf4177af89ef3ea40b60db53.yaml @@ -0,0 +1,58 @@ +id: directorist-1187996edf4177af89ef3ea40b60db53 + +info: + name: > + Directorist <= 7.2.2 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f52ec39-18d8-41eb-8712-7369680b8a58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-133afc4fd6bf43efcd46913bc74537a5.yaml b/nuclei-templates/cve-less/plugins/directorist-133afc4fd6bf43efcd46913bc74537a5.yaml new file mode 100644 index 0000000000..1dd5acf720 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-133afc4fd6bf43efcd46913bc74537a5.yaml @@ -0,0 +1,58 @@ +id: directorist-133afc4fd6bf43efcd46913bc74537a5 + +info: + name: > + Directorist <= 7.0.6.1 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41896fb5-1b6b-4a35-b3e9-9c4b5215b153?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/directorist-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..9ff8aa5268 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: directorist-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-2cbbaa813e0954a798f362d364a25dbe.yaml b/nuclei-templates/cve-less/plugins/directorist-2cbbaa813e0954a798f362d364a25dbe.yaml new file mode 100644 index 0000000000..2918f82327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-2cbbaa813e0954a798f362d364a25dbe.yaml @@ -0,0 +1,58 @@ +id: directorist-2cbbaa813e0954a798f362d364a25dbe + +info: + name: > + Directorist <= 7.3.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b20fa367-a12f-402a-a74a-2bb5fe090036?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-3ca2c37cf2bcc2a6f7bd7d384d01930f.yaml b/nuclei-templates/cve-less/plugins/directorist-3ca2c37cf2bcc2a6f7bd7d384d01930f.yaml new file mode 100644 index 0000000000..8f5e7c1b50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-3ca2c37cf2bcc2a6f7bd7d384d01930f.yaml @@ -0,0 +1,58 @@ +id: directorist-3ca2c37cf2bcc2a6f7bd7d384d01930f + +info: + name: > + Directorist <= 7.4.2.1 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary User Password Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86ff2412-23c6-450e-b351-ba994d68aae6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-50115b9c428a5ad33912876ac3e59d68.yaml b/nuclei-templates/cve-less/plugins/directorist-50115b9c428a5ad33912876ac3e59d68.yaml new file mode 100644 index 0000000000..a57040a607 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-50115b9c428a5ad33912876ac3e59d68.yaml @@ -0,0 +1,58 @@ +id: directorist-50115b9c428a5ad33912876ac3e59d68 + +info: + name: > + Directorist <= 7.5.4 - Authenticated (Subscriber+) Arbitrary User Password Reset to Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01943559-e05b-4dca-b322-d880b2729ee7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-6547c1d240217acd0e74acb8773a56d3.yaml b/nuclei-templates/cve-less/plugins/directorist-6547c1d240217acd0e74acb8773a56d3.yaml new file mode 100644 index 0000000000..ce2b6e481d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-6547c1d240217acd0e74acb8773a56d3.yaml @@ -0,0 +1,58 @@ +id: directorist-6547c1d240217acd0e74acb8773a56d3 + +info: + name: > + Directorist <= 7.4.3 - Authenticated (Subscriber+) Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df0b25cb-5233-412d-8704-63f037b4fcec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-9461e6fbc59ff2af30e33bb31e92efcb.yaml b/nuclei-templates/cve-less/plugins/directorist-9461e6fbc59ff2af30e33bb31e92efcb.yaml new file mode 100644 index 0000000000..f273bb6249 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-9461e6fbc59ff2af30e33bb31e92efcb.yaml @@ -0,0 +1,58 @@ +id: directorist-9461e6fbc59ff2af30e33bb31e92efcb + +info: + name: > + Directorist <= 7.8.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0655cd61-8ebe-47f8-a21b-6311c98a7193?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-9576bd28245508413e199ad3d8acfb19.yaml b/nuclei-templates/cve-less/plugins/directorist-9576bd28245508413e199ad3d8acfb19.yaml new file mode 100644 index 0000000000..4c98d10190 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-9576bd28245508413e199ad3d8acfb19.yaml @@ -0,0 +1,58 @@ +id: directorist-9576bd28245508413e199ad3d8acfb19 + +info: + name: > + Directorist <= 7.5.3 - Authenticated (Administrator+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e571ded0-ea7a-40ec-b90b-c5009b463d87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-a3e8c0ce1e12ba9e5616261592070d69.yaml b/nuclei-templates/cve-less/plugins/directorist-a3e8c0ce1e12ba9e5616261592070d69.yaml new file mode 100644 index 0000000000..186c9f4cf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-a3e8c0ce1e12ba9e5616261592070d69.yaml @@ -0,0 +1,58 @@ +id: directorist-a3e8c0ce1e12ba9e5616261592070d69 + +info: + name: > + Directorist <= 7.8.4 - Missing Authorization to Unauthenticated Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa26e958-4850-451b-88eb-d48fc0c7feb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorist-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/directorist-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..246220f52a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorist-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: directorist-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorist/" + google-query: inurl:"/wp-content/plugins/directorist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directory-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/directory-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..ba1b060af1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directory-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: directory-pro-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directory-pro/" + google-query: inurl:"/wp-content/plugins/directory-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directory-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directory-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directory-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorypress-63e9460ae343812c425f6b6a9cf8cd2b.yaml b/nuclei-templates/cve-less/plugins/directorypress-63e9460ae343812c425f6b6a9cf8cd2b.yaml new file mode 100644 index 0000000000..16b8097fe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorypress-63e9460ae343812c425f6b6a9cf8cd2b.yaml @@ -0,0 +1,58 @@ +id: directorypress-63e9460ae343812c425f6b6a9cf8cd2b + +info: + name: > + DirectoryPress – Business Directory And Classified Ad Listing <= 3.6.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14acb770-9a32-4308-993d-a3d3dec91f78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorypress/" + google-query: inurl:"/wp-content/plugins/directorypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorypress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/directorypress-95913a8fbfffbbc5d9172b93ca770d6c.yaml b/nuclei-templates/cve-less/plugins/directorypress-95913a8fbfffbbc5d9172b93ca770d6c.yaml new file mode 100644 index 0000000000..332bb86ecf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/directorypress-95913a8fbfffbbc5d9172b93ca770d6c.yaml @@ -0,0 +1,58 @@ +id: directorypress-95913a8fbfffbbc5d9172b93ca770d6c + +info: + name: > + DirectoryPress <= 3.6.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f75f83bf-3c86-44e9-b535-cd721061ee93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/directorypress/" + google-query: inurl:"/wp-content/plugins/directorypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,directorypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/directorypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "directorypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dirtysuds-embed-pdf-ed0ef3463be2d5aaf2ed1f44e5427cec.yaml b/nuclei-templates/cve-less/plugins/dirtysuds-embed-pdf-ed0ef3463be2d5aaf2ed1f44e5427cec.yaml new file mode 100644 index 0000000000..0bf9fc4601 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dirtysuds-embed-pdf-ed0ef3463be2d5aaf2ed1f44e5427cec.yaml @@ -0,0 +1,58 @@ +id: dirtysuds-embed-pdf-ed0ef3463be2d5aaf2ed1f44e5427cec + +info: + name: > + Embed PDF <= 1.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2af76ad6-9c78-4b44-b104-d66f0014b5cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dirtysuds-embed-pdf/" + google-query: inurl:"/wp-content/plugins/dirtysuds-embed-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dirtysuds-embed-pdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dirtysuds-embed-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dirtysuds-embed-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disable-comments-20729b5326c844ceb8ab014ad17df6e2.yaml b/nuclei-templates/cve-less/plugins/disable-comments-20729b5326c844ceb8ab014ad17df6e2.yaml new file mode 100644 index 0000000000..df3aa55adf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disable-comments-20729b5326c844ceb8ab014ad17df6e2.yaml @@ -0,0 +1,58 @@ +id: disable-comments-20729b5326c844ceb8ab014ad17df6e2 + +info: + name: > + Disable Comments – Remove Comments & Stop Spam [Multi-Site Support] < 1.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b530d1a3-dd3c-4efb-9cff-39b6908f11c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disable-comments/" + google-query: inurl:"/wp-content/plugins/disable-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disable-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disable-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disable-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disable-comments-wpz-51b13cbe3f0c79746e5808bdafa8107c.yaml b/nuclei-templates/cve-less/plugins/disable-comments-wpz-51b13cbe3f0c79746e5808bdafa8107c.yaml new file mode 100644 index 0000000000..93f25491b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disable-comments-wpz-51b13cbe3f0c79746e5808bdafa8107c.yaml @@ -0,0 +1,58 @@ +id: disable-comments-wpz-51b13cbe3f0c79746e5808bdafa8107c + +info: + name: > + Disable Comments | WPZest <= 1.51 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ef0410-3f8d-40e1-9188-43ec4e7077cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disable-comments-wpz/" + google-query: inurl:"/wp-content/plugins/disable-comments-wpz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disable-comments-wpz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disable-comments-wpz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disable-comments-wpz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disable-image-right-click-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/disable-image-right-click-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..b59bd74e2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disable-image-right-click-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: disable-image-right-click-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disable-image-right-click/" + google-query: inurl:"/wp-content/plugins/disable-image-right-click/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disable-image-right-click,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disable-image-right-click/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disable-image-right-click" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disable-right-click-for-wp-675306159873a1cd00d34f2536abffba.yaml b/nuclei-templates/cve-less/plugins/disable-right-click-for-wp-675306159873a1cd00d34f2536abffba.yaml new file mode 100644 index 0000000000..ee86895f52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disable-right-click-for-wp-675306159873a1cd00d34f2536abffba.yaml @@ -0,0 +1,58 @@ +id: disable-right-click-for-wp-675306159873a1cd00d34f2536abffba + +info: + name: > + Disable Right Click For WP <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44e61ac0-f420-4603-a81f-031a22e01927?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disable-right-click-for-wp/" + google-query: inurl:"/wp-content/plugins/disable-right-click-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disable-right-click-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disable-right-click-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disable-right-click-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disable-update-notifications-d95a2dcd05217531d4ed458d73ee033a.yaml b/nuclei-templates/cve-less/plugins/disable-update-notifications-d95a2dcd05217531d4ed458d73ee033a.yaml new file mode 100644 index 0000000000..4a672e63a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disable-update-notifications-d95a2dcd05217531d4ed458d73ee033a.yaml @@ -0,0 +1,58 @@ +id: disable-update-notifications-d95a2dcd05217531d4ed458d73ee033a + +info: + name: > + Disable WordPress Update Notifications <= 2.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/658ba848-fbfe-4cee-b997-77bc4cae53dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disable-update-notifications/" + google-query: inurl:"/wp-content/plugins/disable-update-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disable-update-notifications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disable-update-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disable-update-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disable-user-login-3955cce33eb34bd1a4fd37bd19c83679.yaml b/nuclei-templates/cve-less/plugins/disable-user-login-3955cce33eb34bd1a4fd37bd19c83679.yaml new file mode 100644 index 0000000000..1b2f4a4c4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disable-user-login-3955cce33eb34bd1a4fd37bd19c83679.yaml @@ -0,0 +1,58 @@ +id: disable-user-login-3955cce33eb34bd1a4fd37bd19c83679 + +info: + name: > + Disable User Login <= 1.3.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/056819fb-7087-4794-9936-312ab54c96cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disable-user-login/" + google-query: inurl:"/wp-content/plugins/disable-user-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disable-user-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disable-user-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disable-user-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disabler-ae33a39eb3dc9b47978010832e99346a.yaml b/nuclei-templates/cve-less/plugins/disabler-ae33a39eb3dc9b47978010832e99346a.yaml new file mode 100644 index 0000000000..1f9767f826 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disabler-ae33a39eb3dc9b47978010832e99346a.yaml @@ -0,0 +1,58 @@ +id: disabler-ae33a39eb3dc9b47978010832e99346a + +info: + name: > + Disabler <= 3.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1375c43c-498f-4d68-ac9c-201592d26919?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disabler/" + google-query: inurl:"/wp-content/plugins/disabler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disabler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disabler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disabler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/display-admin-page-on-frontend-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/display-admin-page-on-frontend-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..483d623e24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/display-admin-page-on-frontend-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: display-admin-page-on-frontend-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/display-admin-page-on-frontend/" + google-query: inurl:"/wp-content/plugins/display-admin-page-on-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,display-admin-page-on-frontend,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/display-admin-page-on-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "display-admin-page-on-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/display-custom-post-5b28a734c59e3ed66297833eac37980a.yaml b/nuclei-templates/cve-less/plugins/display-custom-post-5b28a734c59e3ed66297833eac37980a.yaml new file mode 100644 index 0000000000..9071ade3ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/display-custom-post-5b28a734c59e3ed66297833eac37980a.yaml @@ -0,0 +1,58 @@ +id: display-custom-post-5b28a734c59e3ed66297833eac37980a + +info: + name: > + Display Custom Post <= 2.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18531eed-3150-424c-970c-5975afe7546a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/display-custom-post/" + google-query: inurl:"/wp-content/plugins/display-custom-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,display-custom-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/display-custom-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "display-custom-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/display-metadata-7d1a4c06854607da91f0cfd973b64e55.yaml b/nuclei-templates/cve-less/plugins/display-metadata-7d1a4c06854607da91f0cfd973b64e55.yaml new file mode 100644 index 0000000000..bb5c03e021 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/display-metadata-7d1a4c06854607da91f0cfd973b64e55.yaml @@ -0,0 +1,58 @@ +id: display-metadata-7d1a4c06854607da91f0cfd973b64e55 + +info: + name: > + Display post meta, term meta, comment meta, and user meta <= 0.4.1 - Authenticated(Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/display-metadata/" + google-query: inurl:"/wp-content/plugins/display-metadata/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,display-metadata,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/display-metadata/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "display-metadata" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/display-post-metadata-68e029abe789ad7c1ac8726ecdc73f1e.yaml b/nuclei-templates/cve-less/plugins/display-post-metadata-68e029abe789ad7c1ac8726ecdc73f1e.yaml new file mode 100644 index 0000000000..6c1963a765 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/display-post-metadata-68e029abe789ad7c1ac8726ecdc73f1e.yaml @@ -0,0 +1,58 @@ +id: display-post-metadata-68e029abe789ad7c1ac8726ecdc73f1e + +info: + name: > + Display Post Metadata <= 1.4.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca17fd4a-fd14-46e6-9348-19b74fec5df8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/display-post-metadata/" + google-query: inurl:"/wp-content/plugins/display-post-metadata/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,display-post-metadata,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/display-post-metadata/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "display-post-metadata" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/display-widget-773a62e129bb5aeb2d87a5f158085367.yaml b/nuclei-templates/cve-less/plugins/display-widget-773a62e129bb5aeb2d87a5f158085367.yaml new file mode 100644 index 0000000000..1bde9f1429 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/display-widget-773a62e129bb5aeb2d87a5f158085367.yaml @@ -0,0 +1,58 @@ +id: display-widget-773a62e129bb5aeb2d87a5f158085367 + +info: + name: > + Display Widgets < 2.7 - SEO Spam Injection (Hidden Functionality) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e582fa40-b03e-4194-b612-d139e981cce2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/display-widget/" + google-query: inurl:"/wp-content/plugins/display-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,display-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/display-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "display-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/display-widgets-c88811f07a28a64dae50ff3a4d1213f5.yaml b/nuclei-templates/cve-less/plugins/display-widgets-c88811f07a28a64dae50ff3a4d1213f5.yaml new file mode 100644 index 0000000000..f71b2f914c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/display-widgets-c88811f07a28a64dae50ff3a4d1213f5.yaml @@ -0,0 +1,58 @@ +id: display-widgets-c88811f07a28a64dae50ff3a4d1213f5 + +info: + name: > + Display Widgets <= 2.03 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/179c4920-5a03-4cf4-9e77-a814c3004769?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/display-widgets/" + google-query: inurl:"/wp-content/plugins/display-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,display-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/display-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "display-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disqus-comment-system-0472db32aec7a9d3b04657389befed31.yaml b/nuclei-templates/cve-less/plugins/disqus-comment-system-0472db32aec7a9d3b04657389befed31.yaml new file mode 100644 index 0000000000..43c3b7198f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disqus-comment-system-0472db32aec7a9d3b04657389befed31.yaml @@ -0,0 +1,58 @@ +id: disqus-comment-system-0472db32aec7a9d3b04657389befed31 + +info: + name: > + Disqus Comment System < 2.76 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7476f2c-c32f-4ff7-ad32-70cf68387342?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disqus-comment-system/" + google-query: inurl:"/wp-content/plugins/disqus-comment-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disqus-comment-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disqus-comment-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disqus-comment-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disqus-comment-system-10705e3d714d3c8649004193cb95f340.yaml b/nuclei-templates/cve-less/plugins/disqus-comment-system-10705e3d714d3c8649004193cb95f340.yaml new file mode 100644 index 0000000000..4496b08c66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disqus-comment-system-10705e3d714d3c8649004193cb95f340.yaml @@ -0,0 +1,58 @@ +id: disqus-comment-system-10705e3d714d3c8649004193cb95f340 + +info: + name: > + Disqus Comment System < 2.68 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec864830-2c8b-4ae4-9c45-3624d0be7d24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disqus-comment-system/" + google-query: inurl:"/wp-content/plugins/disqus-comment-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disqus-comment-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disqus-comment-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disqus-comment-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disqus-comment-system-6e244b00897597cd6328a4e5cd1875e2.yaml b/nuclei-templates/cve-less/plugins/disqus-comment-system-6e244b00897597cd6328a4e5cd1875e2.yaml new file mode 100644 index 0000000000..c4a9b6d510 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disqus-comment-system-6e244b00897597cd6328a4e5cd1875e2.yaml @@ -0,0 +1,58 @@ +id: disqus-comment-system-6e244b00897597cd6328a4e5cd1875e2 + +info: + name: > + Disqus Comment System < 2.79 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa60ed7c-baf3-4308-b4bf-1baa928d8e37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disqus-comment-system/" + google-query: inurl:"/wp-content/plugins/disqus-comment-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disqus-comment-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disqus-comment-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disqus-comment-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.79') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disqus-comment-system-7a1c147c4cb293f32f92c2501e47596f.yaml b/nuclei-templates/cve-less/plugins/disqus-comment-system-7a1c147c4cb293f32f92c2501e47596f.yaml new file mode 100644 index 0000000000..229c6df8c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disqus-comment-system-7a1c147c4cb293f32f92c2501e47596f.yaml @@ -0,0 +1,58 @@ +id: disqus-comment-system-7a1c147c4cb293f32f92c2501e47596f + +info: + name: > + Disqus Comment System < 2.76 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2020323-b08d-4a5c-818f-1c440e057e75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disqus-comment-system/" + google-query: inurl:"/wp-content/plugins/disqus-comment-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disqus-comment-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disqus-comment-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disqus-comment-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disqus-comment-system-bf623412f81fa76fc573618af8d6d1f2.yaml b/nuclei-templates/cve-less/plugins/disqus-comment-system-bf623412f81fa76fc573618af8d6d1f2.yaml new file mode 100644 index 0000000000..c345b2dae6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disqus-comment-system-bf623412f81fa76fc573618af8d6d1f2.yaml @@ -0,0 +1,58 @@ +id: disqus-comment-system-bf623412f81fa76fc573618af8d6d1f2 + +info: + name: > + Disqus Comment System < 2.76 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ec2f684-fa04-4201-a826-1eed328821de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disqus-comment-system/" + google-query: inurl:"/wp-content/plugins/disqus-comment-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disqus-comment-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disqus-comment-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disqus-comment-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/disqus-conditional-load-764235f1dad8997c7feda04c94cf2850.yaml b/nuclei-templates/cve-less/plugins/disqus-conditional-load-764235f1dad8997c7feda04c94cf2850.yaml new file mode 100644 index 0000000000..91e8f1c7ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/disqus-conditional-load-764235f1dad8997c7feda04c94cf2850.yaml @@ -0,0 +1,58 @@ +id: disqus-conditional-load-764235f1dad8997c7feda04c94cf2850 + +info: + name: > + Disqus Conditional Load <= 11.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings. + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/762190dc-cd19-4bc1-8204-9219881d95e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/disqus-conditional-load/" + google-query: inurl:"/wp-content/plugins/disqus-conditional-load/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,disqus-conditional-load,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/disqus-conditional-load/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "disqus-conditional-load" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ditty-news-ticker-2fe97b6a7d11daeda44ed66f389013e0.yaml b/nuclei-templates/cve-less/plugins/ditty-news-ticker-2fe97b6a7d11daeda44ed66f389013e0.yaml new file mode 100644 index 0000000000..9986d6d3b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ditty-news-ticker-2fe97b6a7d11daeda44ed66f389013e0.yaml @@ -0,0 +1,58 @@ +id: ditty-news-ticker-2fe97b6a7d11daeda44ed66f389013e0 + +info: + name: > + Ditty <= 3.1.24 - Missing Authorization via save_ditty_permissions_check + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08630dfd-df43-4a5a-8fc7-ba8ff753db3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ditty-news-ticker/" + google-query: inurl:"/wp-content/plugins/ditty-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ditty-news-ticker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ditty-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ditty-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ditty-news-ticker-4d06425a78ba626ae09d9e74b3028b1c.yaml b/nuclei-templates/cve-less/plugins/ditty-news-ticker-4d06425a78ba626ae09d9e74b3028b1c.yaml new file mode 100644 index 0000000000..390cb807d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ditty-news-ticker-4d06425a78ba626ae09d9e74b3028b1c.yaml @@ -0,0 +1,58 @@ +id: ditty-news-ticker-4d06425a78ba626ae09d9e74b3028b1c + +info: + name: > + Ditty <= 3.1.24 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cabf7aae-0673-4358-a2df-0ca22c8432b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ditty-news-ticker/" + google-query: inurl:"/wp-content/plugins/ditty-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ditty-news-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ditty-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ditty-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ditty-news-ticker-4fab6ad196fce7e90d2e5e9e3343b264.yaml b/nuclei-templates/cve-less/plugins/ditty-news-ticker-4fab6ad196fce7e90d2e5e9e3343b264.yaml new file mode 100644 index 0000000000..abb3b22682 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ditty-news-ticker-4fab6ad196fce7e90d2e5e9e3343b264.yaml @@ -0,0 +1,58 @@ +id: ditty-news-ticker-4fab6ad196fce7e90d2e5e9e3343b264 + +info: + name: > + Ditty (formerly Ditty News Ticker) <= 3.0.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e647fcde-e36a-4432-abec-73e414991e96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ditty-news-ticker/" + google-query: inurl:"/wp-content/plugins/ditty-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ditty-news-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ditty-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ditty-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ditty-news-ticker-b0853238e27436d970fc9e4c9b697d95.yaml b/nuclei-templates/cve-less/plugins/ditty-news-ticker-b0853238e27436d970fc9e4c9b697d95.yaml new file mode 100644 index 0000000000..f3492e2d57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ditty-news-ticker-b0853238e27436d970fc9e4c9b697d95.yaml @@ -0,0 +1,58 @@ +id: ditty-news-ticker-b0853238e27436d970fc9e4c9b697d95 + +info: + name: > + Ditty <= 3.1.35 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/426280c1-0ecb-4973-915e-bb63ac240bca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ditty-news-ticker/" + google-query: inurl:"/wp-content/plugins/ditty-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ditty-news-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ditty-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ditty-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ditty-news-ticker-cb44b891144850987aa067ef65bfd80b.yaml b/nuclei-templates/cve-less/plugins/ditty-news-ticker-cb44b891144850987aa067ef65bfd80b.yaml new file mode 100644 index 0000000000..49c8f8acef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ditty-news-ticker-cb44b891144850987aa067ef65bfd80b.yaml @@ -0,0 +1,58 @@ +id: ditty-news-ticker-cb44b891144850987aa067ef65bfd80b + +info: + name: > + Ditty <= 3.0.32 - Authenticated (Contributor+) Stored Cross-Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef8697a2-7c58-43be-aaa9-05273fc3114b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ditty-news-ticker/" + google-query: inurl:"/wp-content/plugins/ditty-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ditty-news-ticker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ditty-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ditty-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ditty-news-ticker-f95f25f2a333f8597e744c121fcbe5fe.yaml b/nuclei-templates/cve-less/plugins/ditty-news-ticker-f95f25f2a333f8597e744c121fcbe5fe.yaml new file mode 100644 index 0000000000..7042e99392 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ditty-news-ticker-f95f25f2a333f8597e744c121fcbe5fe.yaml @@ -0,0 +1,58 @@ +id: ditty-news-ticker-f95f25f2a333f8597e744c121fcbe5fe + +info: + name: > + Ditty – Responsive News Tickers, Sliders, and Lists <= 3.1.38 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f00b138-5c4b-4f75-94b1-82721cba2668?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ditty-news-ticker/" + google-query: inurl:"/wp-content/plugins/ditty-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ditty-news-ticker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ditty-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ditty-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ditty-news-ticker-f9974cc25b2b5474809876c63c837de9.yaml b/nuclei-templates/cve-less/plugins/ditty-news-ticker-f9974cc25b2b5474809876c63c837de9.yaml new file mode 100644 index 0000000000..74c0467312 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ditty-news-ticker-f9974cc25b2b5474809876c63c837de9.yaml @@ -0,0 +1,58 @@ +id: ditty-news-ticker-f9974cc25b2b5474809876c63c837de9 + +info: + name: > + Ditty – Responsive News Tickers, Sliders, and Lists <= 3.1.31 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3233f6f-7488-43ed-a626-b2150c5516fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ditty-news-ticker/" + google-query: inurl:"/wp-content/plugins/ditty-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ditty-news-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ditty-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ditty-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/divebook-2fd703146be88e52db7e37909148b8fe.yaml b/nuclei-templates/cve-less/plugins/divebook-2fd703146be88e52db7e37909148b8fe.yaml new file mode 100644 index 0000000000..5f13465cf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/divebook-2fd703146be88e52db7e37909148b8fe.yaml @@ -0,0 +1,58 @@ +id: divebook-2fd703146be88e52db7e37909148b8fe + +info: + name: > + DiveBook <= 1.1.4 - Improper Access Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebb76379-0cac-47c6-a0eb-34780bc837bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/divebook/" + google-query: inurl:"/wp-content/plugins/divebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,divebook,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/divebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "divebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/divebook-5a66a977b640a93acacfabeb4be863f1.yaml b/nuclei-templates/cve-less/plugins/divebook-5a66a977b640a93acacfabeb4be863f1.yaml new file mode 100644 index 0000000000..8c728cd581 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/divebook-5a66a977b640a93acacfabeb4be863f1.yaml @@ -0,0 +1,58 @@ +id: divebook-5a66a977b640a93acacfabeb4be863f1 + +info: + name: > + DiveBook <= 1.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e850aca1-72b3-4436-bc35-2d52c439a7b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/divebook/" + google-query: inurl:"/wp-content/plugins/divebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,divebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/divebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "divebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/divebook-8f2eed89cd34dbb395902a31efbdb53c.yaml b/nuclei-templates/cve-less/plugins/divebook-8f2eed89cd34dbb395902a31efbdb53c.yaml new file mode 100644 index 0000000000..d5c69ff0ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/divebook-8f2eed89cd34dbb395902a31efbdb53c.yaml @@ -0,0 +1,58 @@ +id: divebook-8f2eed89cd34dbb395902a31efbdb53c + +info: + name: > + DiveBook <= 1.1.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23239fc1-8683-446e-bc61-03d819edf99d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/divebook/" + google-query: inurl:"/wp-content/plugins/divebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,divebook,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/divebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "divebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/divi-builder-344bde3518beec69cf32525065cbb92a.yaml b/nuclei-templates/cve-less/plugins/divi-builder-344bde3518beec69cf32525065cbb92a.yaml new file mode 100644 index 0000000000..4635eeedb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/divi-builder-344bde3518beec69cf32525065cbb92a.yaml @@ -0,0 +1,58 @@ +id: divi-builder-344bde3518beec69cf32525065cbb92a + +info: + name: > + Elegant Themes Divi 3.23 - 4.0.9, Divi Extra 2.23 - 4.0.9, Divi Builder 2.23 - 4.0.9 - PHP Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82ce66d0-dc53-4433-b499-30bfd48efaf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/divi-builder/" + google-query: inurl:"/wp-content/plugins/divi-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,divi-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/divi-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "divi-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.23', '<= 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/divi-builder-4f3dfe26281afe74af18534af8dcf024.yaml b/nuclei-templates/cve-less/plugins/divi-builder-4f3dfe26281afe74af18534af8dcf024.yaml new file mode 100644 index 0000000000..d40db160c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/divi-builder-4f3dfe26281afe74af18534af8dcf024.yaml @@ -0,0 +1,58 @@ +id: divi-builder-4f3dfe26281afe74af18534af8dcf024 + +info: + name: > + Elegant Themes Divi Theme, Extra Theme, Divi Page Builder <= 4.25.0 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efac70f6-d959-41f7-bdef-d554f1c9133e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/divi-builder/" + google-query: inurl:"/wp-content/plugins/divi-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,divi-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/divi-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "divi-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.25.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/divi-builder-a2b478ab05dc0dd0616e45e762ef893a.yaml b/nuclei-templates/cve-less/plugins/divi-builder-a2b478ab05dc0dd0616e45e762ef893a.yaml new file mode 100644 index 0000000000..bb2db8fe3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/divi-builder-a2b478ab05dc0dd0616e45e762ef893a.yaml @@ -0,0 +1,58 @@ +id: divi-builder-a2b478ab05dc0dd0616e45e762ef893a + +info: + name: > + Elegant Themes Monarch < 1.2.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0195bddf-eafe-45f2-9424-ffa235d9b4dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/divi-builder/" + google-query: inurl:"/wp-content/plugins/divi-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,divi-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/divi-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "divi-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/divi-builder-aabb704338c74a997901edf2f42d1b76.yaml b/nuclei-templates/cve-less/plugins/divi-builder-aabb704338c74a997901edf2f42d1b76.yaml new file mode 100644 index 0000000000..3ad32d066e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/divi-builder-aabb704338c74a997901edf2f42d1b76.yaml @@ -0,0 +1,58 @@ +id: divi-builder-aabb704338c74a997901edf2f42d1b76 + +info: + name: > + Elegant Themes (Various Versions) - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1295f1a0-1f5a-4707-96cc-c408a6819e87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/divi-builder/" + google-query: inurl:"/wp-content/plugins/divi-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,divi-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/divi-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "divi-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/divi-builder-ec458e7be91893393a96a7bb4f01d557.yaml b/nuclei-templates/cve-less/plugins/divi-builder-ec458e7be91893393a96a7bb4f01d557.yaml new file mode 100644 index 0000000000..172da39506 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/divi-builder-ec458e7be91893393a96a7bb4f01d557.yaml @@ -0,0 +1,58 @@ +id: divi-builder-ec458e7be91893393a96a7bb4f01d557 + +info: + name: > + Elegant Themes (Multiple Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e03bc79-b42e-4015-8476-2b0488c71028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/divi-builder/" + google-query: inurl:"/wp-content/plugins/divi-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,divi-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/divi-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "divi-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dj-email-publish-e6640ec95c6580e68f9599cfab145307.yaml b/nuclei-templates/cve-less/plugins/dj-email-publish-e6640ec95c6580e68f9599cfab145307.yaml new file mode 100644 index 0000000000..abfe49d833 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dj-email-publish-e6640ec95c6580e68f9599cfab145307.yaml @@ -0,0 +1,58 @@ +id: dj-email-publish-e6640ec95c6580e68f9599cfab145307 + +info: + name: > + DJ EmailPublish <= 1.7.2 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f18a07f-c7de-49ac-9a11-f9cbc48b125a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dj-email-publish/" + google-query: inurl:"/wp-content/plugins/dj-email-publish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dj-email-publish,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dj-email-publish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dj-email-publish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-03f17f31cd71196d3e8108e1dfd1705d.yaml b/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-03f17f31cd71196d3e8108e1dfd1705d.yaml new file mode 100644 index 0000000000..9b9f6e8417 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-03f17f31cd71196d3e8108e1dfd1705d.yaml @@ -0,0 +1,58 @@ +id: dk-pricr-responsive-pricing-table-03f17f31cd71196d3e8108e1dfd1705d + +info: + name: > + Responsive Pricing Table <= 5.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a530a55-44d7-4f78-9cbd-513ef290908a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dk-pricr-responsive-pricing-table/" + google-query: inurl:"/wp-content/plugins/dk-pricr-responsive-pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dk-pricr-responsive-pricing-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dk-pricr-responsive-pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dk-pricr-responsive-pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-05afb40274ed6e7e7ee85f9181367788.yaml b/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-05afb40274ed6e7e7ee85f9181367788.yaml new file mode 100644 index 0000000000..a6ef886526 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-05afb40274ed6e7e7ee85f9181367788.yaml @@ -0,0 +1,58 @@ +id: dk-pricr-responsive-pricing-table-05afb40274ed6e7e7ee85f9181367788 + +info: + name: > + Responsive Pricing Table <= 5.1.10 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75a1f49d-2352-40f0-a830-7cff0e5163f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dk-pricr-responsive-pricing-table/" + google-query: inurl:"/wp-content/plugins/dk-pricr-responsive-pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dk-pricr-responsive-pricing-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dk-pricr-responsive-pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dk-pricr-responsive-pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-932d8591d976abf910e4179bc489f078.yaml b/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-932d8591d976abf910e4179bc489f078.yaml new file mode 100644 index 0000000000..a9835eb0e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-932d8591d976abf910e4179bc489f078.yaml @@ -0,0 +1,58 @@ +id: dk-pricr-responsive-pricing-table-932d8591d976abf910e4179bc489f078 + +info: + name: > + Responsive Pricing Table < 5.1.8 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fb7dd8f-6258-46e1-9cc5-87ec73d5736c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dk-pricr-responsive-pricing-table/" + google-query: inurl:"/wp-content/plugins/dk-pricr-responsive-pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dk-pricr-responsive-pricing-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dk-pricr-responsive-pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dk-pricr-responsive-pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-c74224b712fc0c2fb7b3dedfadd9ee64.yaml b/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-c74224b712fc0c2fb7b3dedfadd9ee64.yaml new file mode 100644 index 0000000000..4904efc09f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dk-pricr-responsive-pricing-table-c74224b712fc0c2fb7b3dedfadd9ee64.yaml @@ -0,0 +1,58 @@ +id: dk-pricr-responsive-pricing-table-c74224b712fc0c2fb7b3dedfadd9ee64 + +info: + name: > + Responsive Pricing Table <= 5.1.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b90c0a2-19b2-4846-9f62-2b02d28cc13b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dk-pricr-responsive-pricing-table/" + google-query: inurl:"/wp-content/plugins/dk-pricr-responsive-pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dk-pricr-responsive-pricing-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dk-pricr-responsive-pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dk-pricr-responsive-pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dm-albums-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/dm-albums-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..e9d23e794f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dm-albums-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: dm-albums-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dm-albums/" + google-query: inurl:"/wp-content/plugins/dm-albums/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dm-albums,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dm-albums/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dm-albums" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dm-albums-f74320833916c503bc8924181a242988.yaml b/nuclei-templates/cve-less/plugins/dm-albums-f74320833916c503bc8924181a242988.yaml new file mode 100644 index 0000000000..1d9391d6bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dm-albums-f74320833916c503bc8924181a242988.yaml @@ -0,0 +1,58 @@ +id: dm-albums-f74320833916c503bc8924181a242988 + +info: + name: > + DM Albums <= 1.9.2 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc83b0ff-7228-466a-b831-53cca252a3f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dm-albums/" + google-query: inurl:"/wp-content/plugins/dm-albums/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dm-albums,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dm-albums/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dm-albums" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dmca-watermarker-e4bec7dd7a04a9998930ce7422960fa5.yaml b/nuclei-templates/cve-less/plugins/dmca-watermarker-e4bec7dd7a04a9998930ce7422960fa5.yaml new file mode 100644 index 0000000000..aa4c888971 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dmca-watermarker-e4bec7dd7a04a9998930ce7422960fa5.yaml @@ -0,0 +1,58 @@ +id: dmca-watermarker-e4bec7dd7a04a9998930ce7422960fa5 + +info: + name: > + DMCA WaterMarker < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59be2283-1356-48aa-bbda-f796fd799330?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dmca-watermarker/" + google-query: inurl:"/wp-content/plugins/dmca-watermarker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dmca-watermarker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dmca-watermarker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dmca-watermarker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dmsguestbook-0720f12ed328d9f8394eeb8c7b25a318.yaml b/nuclei-templates/cve-less/plugins/dmsguestbook-0720f12ed328d9f8394eeb8c7b25a318.yaml new file mode 100644 index 0000000000..4e0f697d7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dmsguestbook-0720f12ed328d9f8394eeb8c7b25a318.yaml @@ -0,0 +1,58 @@ +id: dmsguestbook-0720f12ed328d9f8394eeb8c7b25a318 + +info: + name: > + DMSGuestbook < 1.9.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/607a5846-4112-4f0d-b353-68903b2a4cb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dmsguestbook/" + google-query: inurl:"/wp-content/plugins/dmsguestbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dmsguestbook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dmsguestbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dmsguestbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dmsguestbook-2b7d96b5ce8ab425f2e121a2dd72ecf0.yaml b/nuclei-templates/cve-less/plugins/dmsguestbook-2b7d96b5ce8ab425f2e121a2dd72ecf0.yaml new file mode 100644 index 0000000000..0a1baaf1db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dmsguestbook-2b7d96b5ce8ab425f2e121a2dd72ecf0.yaml @@ -0,0 +1,58 @@ +id: dmsguestbook-2b7d96b5ce8ab425f2e121a2dd72ecf0 + +info: + name: > + DMSGuestbook <= 1.8.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a70a91f3-ec87-472a-9cb0-98c874b7825f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dmsguestbook/" + google-query: inurl:"/wp-content/plugins/dmsguestbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dmsguestbook,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dmsguestbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dmsguestbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dmsguestbook-464fda924b91446d67088565fa366b6b.yaml b/nuclei-templates/cve-less/plugins/dmsguestbook-464fda924b91446d67088565fa366b6b.yaml new file mode 100644 index 0000000000..d7d26fb5a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dmsguestbook-464fda924b91446d67088565fa366b6b.yaml @@ -0,0 +1,58 @@ +id: dmsguestbook-464fda924b91446d67088565fa366b6b + +info: + name: > + DMSGuestbook < 1.9.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbe4688e-19a4-412a-8fe3-167badcfafdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dmsguestbook/" + google-query: inurl:"/wp-content/plugins/dmsguestbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dmsguestbook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dmsguestbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dmsguestbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dmsguestbook-81cd7c7b4d1173a363d79c9374f22f96.yaml b/nuclei-templates/cve-less/plugins/dmsguestbook-81cd7c7b4d1173a363d79c9374f22f96.yaml new file mode 100644 index 0000000000..708c39ef94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dmsguestbook-81cd7c7b4d1173a363d79c9374f22f96.yaml @@ -0,0 +1,58 @@ +id: dmsguestbook-81cd7c7b4d1173a363d79c9374f22f96 + +info: + name: > + DMSGuestbook <= 1.7.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46706adb-fc2e-47d4-b1ff-748b89b1decf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dmsguestbook/" + google-query: inurl:"/wp-content/plugins/dmsguestbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dmsguestbook,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dmsguestbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dmsguestbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dnui-delete-not-used-image-wordpress-0d2acb1823da711b074d38421e878cbc.yaml b/nuclei-templates/cve-less/plugins/dnui-delete-not-used-image-wordpress-0d2acb1823da711b074d38421e878cbc.yaml new file mode 100644 index 0000000000..9154eca06d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dnui-delete-not-used-image-wordpress-0d2acb1823da711b074d38421e878cbc.yaml @@ -0,0 +1,58 @@ +id: dnui-delete-not-used-image-wordpress-0d2acb1823da711b074d38421e878cbc + +info: + name: > + DNUI <= 2.8.1 - Cross-Site Request Forgery leading to Unused Image Deletion and Database Image Access + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de5397c2-b23c-412a-b419-e36023daa989?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dnui-delete-not-used-image-wordpress/" + google-query: inurl:"/wp-content/plugins/dnui-delete-not-used-image-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dnui-delete-not-used-image-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dnui-delete-not-used-image-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dnui-delete-not-used-image-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/docket-cache-f17846666f850b5a719df18ee77ef5bc.yaml b/nuclei-templates/cve-less/plugins/docket-cache-f17846666f850b5a719df18ee77ef5bc.yaml new file mode 100644 index 0000000000..39ff4d6780 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/docket-cache-f17846666f850b5a719df18ee77ef5bc.yaml @@ -0,0 +1,58 @@ +id: docket-cache-f17846666f850b5a719df18ee77ef5bc + +info: + name: > + Docket Cache – Object Cache Accelerator <= 21.08.01 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/834ff44a-4259-49a5-bad3-26fce393fb98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/docket-cache/" + google-query: inurl:"/wp-content/plugins/docket-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,docket-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/docket-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "docket-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.08.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/docollipics-faustball-de-2b530454070b0701fff7ade24fa23420.yaml b/nuclei-templates/cve-less/plugins/docollipics-faustball-de-2b530454070b0701fff7ade24fa23420.yaml new file mode 100644 index 0000000000..f25287662e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/docollipics-faustball-de-2b530454070b0701fff7ade24fa23420.yaml @@ -0,0 +1,58 @@ +id: docollipics-faustball-de-2b530454070b0701fff7ade24fa23420 + +info: + name: > + Tabellen von faustball.com <= 2.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7417e25-be35-4134-9d38-f8ee91f0d1cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/docollipics-faustball-de/" + google-query: inurl:"/wp-content/plugins/docollipics-faustball-de/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,docollipics-faustball-de,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/docollipics-faustball-de/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "docollipics-faustball-de" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/doctor-listing-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/doctor-listing-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..c6b335cf21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/doctor-listing-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: doctor-listing-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/doctor-listing/" + google-query: inurl:"/wp-content/plugins/doctor-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,doctor-listing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/doctor-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doctor-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/document-emberdder-9726bedc4772feb78308da203819877a.yaml b/nuclei-templates/cve-less/plugins/document-emberdder-9726bedc4772feb78308da203819877a.yaml new file mode 100644 index 0000000000..c7bc90eaed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/document-emberdder-9726bedc4772feb78308da203819877a.yaml @@ -0,0 +1,58 @@ +id: document-emberdder-9726bedc4772feb78308da203819877a + +info: + name: > + Document Embedder < 1.7.6 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/041851d8-99ce-48a6-8ff5-85418d8807be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/document-emberdder/" + google-query: inurl:"/wp-content/plugins/document-emberdder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,document-emberdder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/document-emberdder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "document-emberdder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/document-emberdder-ab269c118fc3257cdc712b5cba24b2d9.yaml b/nuclei-templates/cve-less/plugins/document-emberdder-ab269c118fc3257cdc712b5cba24b2d9.yaml new file mode 100644 index 0000000000..26482f8cd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/document-emberdder-ab269c118fc3257cdc712b5cba24b2d9.yaml @@ -0,0 +1,58 @@ +id: document-emberdder-ab269c118fc3257cdc712b5cba24b2d9 + +info: + name: > + Document Embedder <= 1.7.8 - Subscriber+ Arbitrary Private/Draft Post Title Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1baf7c7e-b5e9-40b5-9c96-abe6ebcf2b2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/document-emberdder/" + google-query: inurl:"/wp-content/plugins/document-emberdder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,document-emberdder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/document-emberdder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "document-emberdder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/documentor-lite-d8a488996304707ccbeb5881d0d3a2c5.yaml b/nuclei-templates/cve-less/plugins/documentor-lite-d8a488996304707ccbeb5881d0d3a2c5.yaml new file mode 100644 index 0000000000..fb3fcd2da5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/documentor-lite-d8a488996304707ccbeb5881d0d3a2c5.yaml @@ -0,0 +1,58 @@ +id: documentor-lite-d8a488996304707ccbeb5881d0d3a2c5 + +info: + name: > + Documentor – Create Product Documentation <= 1.5.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da51b3ef-b12f-4af0-90b7-1ea61595b661?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/documentor-lite/" + google-query: inurl:"/wp-content/plugins/documentor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,documentor-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/documentor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "documentor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dofollow-case-by-case-945f1c78b2a3586f190550f87e150c27.yaml b/nuclei-templates/cve-less/plugins/dofollow-case-by-case-945f1c78b2a3586f190550f87e150c27.yaml new file mode 100644 index 0000000000..244543b76b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dofollow-case-by-case-945f1c78b2a3586f190550f87e150c27.yaml @@ -0,0 +1,58 @@ +id: dofollow-case-by-case-945f1c78b2a3586f190550f87e150c27 + +info: + name: > + DoFollow Case by Case <= 3.4.2 Cross-Site Request Forgery via getEmail and getUrl + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60c63be2-dd17-4224-ba96-ba30ed0b25ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dofollow-case-by-case/" + google-query: inurl:"/wp-content/plugins/dofollow-case-by-case/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dofollow-case-by-case,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dofollow-case-by-case/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dofollow-case-by-case" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dokan-lite-3a87cd2c194cd815db2ec636b84e643a.yaml b/nuclei-templates/cve-less/plugins/dokan-lite-3a87cd2c194cd815db2ec636b84e643a.yaml new file mode 100644 index 0000000000..9a7e434f7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dokan-lite-3a87cd2c194cd815db2ec636b84e643a.yaml @@ -0,0 +1,58 @@ +id: dokan-lite-3a87cd2c194cd815db2ec636b84e643a + +info: + name: > + Dokan <= 3.7.12 - Authenticated (Vendor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4967c95-8eb6-4c9b-ae6e-082dbc6af7f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dokan-lite/" + google-query: inurl:"/wp-content/plugins/dokan-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dokan-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dokan-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dokan-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dokan-lite-5ad44d8edf07e29935fd9f2a379a8bdf.yaml b/nuclei-templates/cve-less/plugins/dokan-lite-5ad44d8edf07e29935fd9f2a379a8bdf.yaml new file mode 100644 index 0000000000..ebd6eaebff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dokan-lite-5ad44d8edf07e29935fd9f2a379a8bdf.yaml @@ -0,0 +1,58 @@ +id: dokan-lite-5ad44d8edf07e29935fd9f2a379a8bdf + +info: + name: > + Dokan <= 3.6.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18e8f72b-daa0-4a9f-a67b-d9be9a0862d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dokan-lite/" + google-query: inurl:"/wp-content/plugins/dokan-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dokan-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dokan-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dokan-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dokan-lite-7cae0337ec5d8357b2096a13255ff0e5.yaml b/nuclei-templates/cve-less/plugins/dokan-lite-7cae0337ec5d8357b2096a13255ff0e5.yaml new file mode 100644 index 0000000000..ea457533b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dokan-lite-7cae0337ec5d8357b2096a13255ff0e5.yaml @@ -0,0 +1,58 @@ +id: dokan-lite-7cae0337ec5d8357b2096a13255ff0e5 + +info: + name: > + Dokan <= 3.0.8 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/894c875a-078f-4c1f-83d2-4a6e4a309c3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dokan-lite/" + google-query: inurl:"/wp-content/plugins/dokan-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dokan-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dokan-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dokan-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dokan-lite-83ceb85b9d98ac0ba31cc54d7c02a615.yaml b/nuclei-templates/cve-less/plugins/dokan-lite-83ceb85b9d98ac0ba31cc54d7c02a615.yaml new file mode 100644 index 0000000000..a5e6855766 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dokan-lite-83ceb85b9d98ac0ba31cc54d7c02a615.yaml @@ -0,0 +1,58 @@ +id: dokan-lite-83ceb85b9d98ac0ba31cc54d7c02a615 + +info: + name: > + Dokan <= 3.7.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e4d84ad-ab02-45b1-aecb-dc2c08c097fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dokan-lite/" + google-query: inurl:"/wp-content/plugins/dokan-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dokan-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dokan-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dokan-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dokan-lite-98e27e4b860cdb80f775d8dcf8849471.yaml b/nuclei-templates/cve-less/plugins/dokan-lite-98e27e4b860cdb80f775d8dcf8849471.yaml new file mode 100644 index 0000000000..788e6595bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dokan-lite-98e27e4b860cdb80f775d8dcf8849471.yaml @@ -0,0 +1,58 @@ +id: dokan-lite-98e27e4b860cdb80f775d8dcf8849471 + +info: + name: > + Dokan <= 3.6.3 - Authenticated (Vendor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2da02a0e-4bc5-4dc6-b46e-7e74e0eb36dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dokan-lite/" + google-query: inurl:"/wp-content/plugins/dokan-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dokan-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dokan-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dokan-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dokan-lite-e63e30ec60f147aa93db545efe75d6f6.yaml b/nuclei-templates/cve-less/plugins/dokan-lite-e63e30ec60f147aa93db545efe75d6f6.yaml new file mode 100644 index 0000000000..dff3b9e803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dokan-lite-e63e30ec60f147aa93db545efe75d6f6.yaml @@ -0,0 +1,58 @@ +id: dokan-lite-e63e30ec60f147aa93db545efe75d6f6 + +info: + name: > + Dokan <=3.7.19 - Authenticated(Shop Manager+) PHP Object Injection via create_dummy_vendor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1597859c-2808-4e0f-aa8d-4e2727728e22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dokan-lite/" + google-query: inurl:"/wp-content/plugins/dokan-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dokan-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dokan-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dokan-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dologin-3e791f294648bb07f6f5d09991cd807c.yaml b/nuclei-templates/cve-less/plugins/dologin-3e791f294648bb07f6f5d09991cd807c.yaml new file mode 100644 index 0000000000..087fa4614b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dologin-3e791f294648bb07f6f5d09991cd807c.yaml @@ -0,0 +1,58 @@ +id: dologin-3e791f294648bb07f6f5d09991cd807c + +info: + name: > + DoLogin Security <= 3.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad34d657-da59-46ff-a54a-64e6c8974b69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dologin/" + google-query: inurl:"/wp-content/plugins/dologin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dologin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dologin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dologin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dologin-76c4f32766bf14b6bbf96fbeaaac68ab.yaml b/nuclei-templates/cve-less/plugins/dologin-76c4f32766bf14b6bbf96fbeaaac68ab.yaml new file mode 100644 index 0000000000..7b58cbf7c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dologin-76c4f32766bf14b6bbf96fbeaaac68ab.yaml @@ -0,0 +1,58 @@ +id: dologin-76c4f32766bf14b6bbf96fbeaaac68ab + +info: + name: > + DoLogin Security <= 3.7 - Missing Authorization on Dashboard Widget + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24e2b96c-665f-4616-ac99-1a2b1b0a9ccd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dologin/" + google-query: inurl:"/wp-content/plugins/dologin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dologin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dologin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dologin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dologin-9b93ca969f1fec7d267bf68ade76e649.yaml b/nuclei-templates/cve-less/plugins/dologin-9b93ca969f1fec7d267bf68ade76e649.yaml new file mode 100644 index 0000000000..0891db279c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dologin-9b93ca969f1fec7d267bf68ade76e649.yaml @@ -0,0 +1,58 @@ +id: dologin-9b93ca969f1fec7d267bf68ade76e649 + +info: + name: > + DoLogin Security <= 3.6 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/def06edd-ea4f-4b49-9902-b179d40e4133?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dologin/" + google-query: inurl:"/wp-content/plugins/dologin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dologin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dologin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dologin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dologin-bd8336f3b7891bca7cf2acd9eb9176f8.yaml b/nuclei-templates/cve-less/plugins/dologin-bd8336f3b7891bca7cf2acd9eb9176f8.yaml new file mode 100644 index 0000000000..62d1f1bae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dologin-bd8336f3b7891bca7cf2acd9eb9176f8.yaml @@ -0,0 +1,58 @@ +id: dologin-bd8336f3b7891bca7cf2acd9eb9176f8 + +info: + name: > + DoLogin Security <= 3.7.1 - Missing Authorization via REST Endpoints + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af93f4f5-4c6d-4178-b7f7-c66c341bde87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dologin/" + google-query: inurl:"/wp-content/plugins/dologin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dologin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dologin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dologin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/domain-check-7bb785cc55f83f670623beb2518f8d46.yaml b/nuclei-templates/cve-less/plugins/domain-check-7bb785cc55f83f670623beb2518f8d46.yaml new file mode 100644 index 0000000000..ab5d0bdcde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/domain-check-7bb785cc55f83f670623beb2518f8d46.yaml @@ -0,0 +1,58 @@ +id: domain-check-7bb785cc55f83f670623beb2518f8d46 + +info: + name: > + Domain Check <= 1.0.16 - Reflected Cross-Site Scripting via domain + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6b3d91c-591b-444d-888b-1b443e72afca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/domain-check/" + google-query: inurl:"/wp-content/plugins/domain-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,domain-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/domain-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "domain-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/domain-mapping-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/domain-mapping-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4e10e4e726 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/domain-mapping-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: domain-mapping-system-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/domain-mapping-system/" + google-query: inurl:"/wp-content/plugins/domain-mapping-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,domain-mapping-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/domain-mapping-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "domain-mapping-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/domain-replace-c2b0322b1c47551232078fdb7ec624e5.yaml b/nuclei-templates/cve-less/plugins/domain-replace-c2b0322b1c47551232078fdb7ec624e5.yaml new file mode 100644 index 0000000000..8d6303a49a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/domain-replace-c2b0322b1c47551232078fdb7ec624e5.yaml @@ -0,0 +1,58 @@ +id: domain-replace-c2b0322b1c47551232078fdb7ec624e5 + +info: + name: > + Domain Replace <= 1.3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad81c6b6-dbf5-40a3-894d-e2fbab69d38a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/domain-replace/" + google-query: inurl:"/wp-content/plugins/domain-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,domain-replace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/domain-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "domain-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/don8-147a2c380c511ff89f6007b5ad85a430.yaml b/nuclei-templates/cve-less/plugins/don8-147a2c380c511ff89f6007b5ad85a430.yaml new file mode 100644 index 0000000000..3d2f1f19cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/don8-147a2c380c511ff89f6007b5ad85a430.yaml @@ -0,0 +1,58 @@ +id: don8-147a2c380c511ff89f6007b5ad85a430 + +info: + name: > + Don8 <= 0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9b2b094-9a2d-4c73-be5f-b2a6f3da9233?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/don8/" + google-query: inurl:"/wp-content/plugins/don8/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,don8,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/don8/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "don8" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donate-button-d64691e54ed9f4bd04f9e5d0a049bc80.yaml b/nuclei-templates/cve-less/plugins/donate-button-d64691e54ed9f4bd04f9e5d0a049bc80.yaml new file mode 100644 index 0000000000..cd9f676fae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donate-button-d64691e54ed9f4bd04f9e5d0a049bc80.yaml @@ -0,0 +1,58 @@ +id: donate-button-d64691e54ed9f4bd04f9e5d0a049bc80 + +info: + name: > + Donate by BestWebSoft – Donations Acception Extention for WordPress < 2.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e599393b-f009-4a3f-a89e-6219ecf33efc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donate-button/" + google-query: inurl:"/wp-content/plugins/donate-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donate-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donate-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donate-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donate-extra-bf2a986ee34d32b284b49248c2116049.yaml b/nuclei-templates/cve-less/plugins/donate-extra-bf2a986ee34d32b284b49248c2116049.yaml new file mode 100644 index 0000000000..93de07ad9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donate-extra-bf2a986ee34d32b284b49248c2116049.yaml @@ -0,0 +1,58 @@ +id: donate-extra-bf2a986ee34d32b284b49248c2116049 + +info: + name: > + Donate Extra <= 2.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93c940a5-1145-47ac-b55f-bf346719e584?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donate-extra/" + google-query: inurl:"/wp-content/plugins/donate-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donate-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donate-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donate-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donate-with-qrcode-53c85ef54b387a398b144244c40bd611.yaml b/nuclei-templates/cve-less/plugins/donate-with-qrcode-53c85ef54b387a398b144244c40bd611.yaml new file mode 100644 index 0000000000..1e38f91c31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donate-with-qrcode-53c85ef54b387a398b144244c40bd611.yaml @@ -0,0 +1,58 @@ +id: donate-with-qrcode-53c85ef54b387a398b144244c40bd611 + +info: + name: > + Donate With QRCode <= 1.4.5 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97c441c3-ae8b-4b7a-8480-da81c0f339ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donate-with-qrcode/" + google-query: inurl:"/wp-content/plugins/donate-with-qrcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donate-with-qrcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donate-with-qrcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donate-with-qrcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donate-with-qrcode-737595c2ea3449d9afc6f182f87c2e0c.yaml b/nuclei-templates/cve-less/plugins/donate-with-qrcode-737595c2ea3449d9afc6f182f87c2e0c.yaml new file mode 100644 index 0000000000..1e565e56c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donate-with-qrcode-737595c2ea3449d9afc6f182f87c2e0c.yaml @@ -0,0 +1,58 @@ +id: donate-with-qrcode-737595c2ea3449d9afc6f182f87c2e0c + +info: + name: > + Donate With QRCode <= 1.4.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a4c327c-f756-4f50-8121-363791c6bd8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donate-with-qrcode/" + google-query: inurl:"/wp-content/plugins/donate-with-qrcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donate-with-qrcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donate-with-qrcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donate-with-qrcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donation-button-2930d925944c874731b469b90d98e5da.yaml b/nuclei-templates/cve-less/plugins/donation-button-2930d925944c874731b469b90d98e5da.yaml new file mode 100644 index 0000000000..837c889f62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donation-button-2930d925944c874731b469b90d98e5da.yaml @@ -0,0 +1,58 @@ +id: donation-button-2930d925944c874731b469b90d98e5da + +info: + name: > + Donation Button <= 4.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2b809f5-0384-43f5-8839-67bf059360eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donation-button/" + google-query: inurl:"/wp-content/plugins/donation-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donation-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donation-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donation-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donation-button-40014647f15550cd9dd8d5556a2d8ae1.yaml b/nuclei-templates/cve-less/plugins/donation-button-40014647f15550cd9dd8d5556a2d8ae1.yaml new file mode 100644 index 0000000000..65f33c7167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donation-button-40014647f15550cd9dd8d5556a2d8ae1.yaml @@ -0,0 +1,58 @@ +id: donation-button-40014647f15550cd9dd8d5556a2d8ae1 + +info: + name: > + Donation Button <= 4.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b35e5228-7f1a-43e1-b65d-d13bdd6bcfaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donation-button/" + google-query: inurl:"/wp-content/plugins/donation-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donation-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donation-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donation-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donation-thermometer-11d8842f155c393e0c8cf7dd8d4ce45b.yaml b/nuclei-templates/cve-less/plugins/donation-thermometer-11d8842f155c393e0c8cf7dd8d4ce45b.yaml new file mode 100644 index 0000000000..78267c5eff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donation-thermometer-11d8842f155c393e0c8cf7dd8d4ce45b.yaml @@ -0,0 +1,58 @@ +id: donation-thermometer-11d8842f155c393e0c8cf7dd8d4ce45b + +info: + name: > + Donation Thermometer <= 2.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc67ff08-b660-477a-9457-b681cf0381f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donation-thermometer/" + google-query: inurl:"/wp-content/plugins/donation-thermometer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donation-thermometer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donation-thermometer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donation-thermometer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donations-block-28e3179254b4fd139125a16ede646345.yaml b/nuclei-templates/cve-less/plugins/donations-block-28e3179254b4fd139125a16ede646345.yaml new file mode 100644 index 0000000000..d755432e2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donations-block-28e3179254b4fd139125a16ede646345.yaml @@ -0,0 +1,58 @@ +id: donations-block-28e3179254b4fd139125a16ede646345 + +info: + name: > + Donation Block For PayPal <= 2.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5e60125-35e2-4d6d-8ea7-078df0b9e55f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donations-block/" + google-query: inurl:"/wp-content/plugins/donations-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donations-block,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donations-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donations-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donations-for-woocommerce-89b8de7fceb27a44be5a7a24e0cb685a.yaml b/nuclei-templates/cve-less/plugins/donations-for-woocommerce-89b8de7fceb27a44be5a7a24e0cb685a.yaml new file mode 100644 index 0000000000..bffab1ff05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donations-for-woocommerce-89b8de7fceb27a44be5a7a24e0cb685a.yaml @@ -0,0 +1,58 @@ +id: donations-for-woocommerce-89b8de7fceb27a44be5a7a24e0cb685a + +info: + name: > + Potent Donations for WooCommerce <= 1.1.9 - Cross-Site Request Forgery in hm_wcdon_admin_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98358366-7cb0-40ae-a931-10985c916af1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donations-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/donations-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donations-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donations-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donations-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/doneren-met-mollie-5d341faba5a243bc1f91722340667935.yaml b/nuclei-templates/cve-less/plugins/doneren-met-mollie-5d341faba5a243bc1f91722340667935.yaml new file mode 100644 index 0000000000..e8449ff7b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/doneren-met-mollie-5d341faba5a243bc1f91722340667935.yaml @@ -0,0 +1,58 @@ +id: doneren-met-mollie-5d341faba5a243bc1f91722340667935 + +info: + name: > + Doneren met Mollie <= 2.8.4 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed99a056-42c6-4540-950e-12f8b547b64d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/doneren-met-mollie/" + google-query: inurl:"/wp-content/plugins/doneren-met-mollie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,doneren-met-mollie,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/doneren-met-mollie/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doneren-met-mollie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/doneren-met-mollie-c68aefc2513365ae0004ad9eeebe270b.yaml b/nuclei-templates/cve-less/plugins/doneren-met-mollie-c68aefc2513365ae0004ad9eeebe270b.yaml new file mode 100644 index 0000000000..0e601bb7fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/doneren-met-mollie-c68aefc2513365ae0004ad9eeebe270b.yaml @@ -0,0 +1,58 @@ +id: doneren-met-mollie-c68aefc2513365ae0004ad9eeebe270b + +info: + name: > + Doneren met Mollie <= 2.10.2 - Unauthenticated Reflected Cross-Site Scripting via search + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f494ca7-3f2f-4535-92ff-1ed5c469bf45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/doneren-met-mollie/" + google-query: inurl:"/wp-content/plugins/doneren-met-mollie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,doneren-met-mollie,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/doneren-met-mollie/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doneren-met-mollie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donorbox-donation-form-074326e7470f284764101e6fc9e53f79.yaml b/nuclei-templates/cve-less/plugins/donorbox-donation-form-074326e7470f284764101e6fc9e53f79.yaml new file mode 100644 index 0000000000..6fe9593b58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donorbox-donation-form-074326e7470f284764101e6fc9e53f79.yaml @@ -0,0 +1,58 @@ +id: donorbox-donation-form-074326e7470f284764101e6fc9e53f79 + +info: + name: > + Donorbox – Free Recurring Donation Form <= 7.1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4aea6ac-0b36-481c-aa22-db96665404f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donorbox-donation-form/" + google-query: inurl:"/wp-content/plugins/donorbox-donation-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donorbox-donation-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donorbox-donation-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donorbox-donation-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/donorbox-donation-form-4667942accde23610dd8e0b089b22f23.yaml b/nuclei-templates/cve-less/plugins/donorbox-donation-form-4667942accde23610dd8e0b089b22f23.yaml new file mode 100644 index 0000000000..03a00ce227 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/donorbox-donation-form-4667942accde23610dd8e0b089b22f23.yaml @@ -0,0 +1,58 @@ +id: donorbox-donation-form-4667942accde23610dd8e0b089b22f23 + +info: + name: > + Donorbox <= 7.1.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a660b7b8-550e-42d7-b15a-0ab2aa501623?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/donorbox-donation-form/" + google-query: inurl:"/wp-content/plugins/donorbox-donation-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,donorbox-donation-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/donorbox-donation-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "donorbox-donation-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dont-muck-my-markup-2ead875f47442aad0463d1658f74b76e.yaml b/nuclei-templates/cve-less/plugins/dont-muck-my-markup-2ead875f47442aad0463d1658f74b76e.yaml new file mode 100644 index 0000000000..e9bcffc109 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dont-muck-my-markup-2ead875f47442aad0463d1658f74b76e.yaml @@ -0,0 +1,58 @@ +id: dont-muck-my-markup-2ead875f47442aad0463d1658f74b76e + +info: + name: > + Don't Muck My Markup <= 1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1390c22-3c8d-47f1-b225-1bcbc215832a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dont-muck-my-markup/" + google-query: inurl:"/wp-content/plugins/dont-muck-my-markup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dont-muck-my-markup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dont-muck-my-markup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dont-muck-my-markup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-4cda745fb6b624bf244c2f741ab1add8.yaml b/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-4cda745fb6b624bf244c2f741ab1add8.yaml new file mode 100644 index 0000000000..ee2886368e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-4cda745fb6b624bf244c2f741ab1add8.yaml @@ -0,0 +1,58 @@ +id: doofinder-for-woocommerce-4cda745fb6b624bf244c2f741ab1add8 + +info: + name: > + Doofinder for WooCommerce <= 2.1.7 - Reflected Cross-Site Scripting via tab + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e46a2031-e304-43fb-85bf-ec9abf0b2f90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/doofinder-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/doofinder-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,doofinder-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/doofinder-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doofinder-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-5e9722517850435a4c6751ba68e3f182.yaml b/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-5e9722517850435a4c6751ba68e3f182.yaml new file mode 100644 index 0000000000..0cd2fb029b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-5e9722517850435a4c6751ba68e3f182.yaml @@ -0,0 +1,58 @@ +id: doofinder-for-woocommerce-5e9722517850435a4c6751ba68e3f182 + +info: + name: > + Doofinder for WooCommerce <= 2.0.33 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad50e216-f522-4294-a4dc-7f3bd52820b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/doofinder-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/doofinder-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,doofinder-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/doofinder-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doofinder-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-ccf7ae7c58d11c91be50450cab57d66e.yaml b/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-ccf7ae7c58d11c91be50450cab57d66e.yaml new file mode 100644 index 0000000000..233e4c8049 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-ccf7ae7c58d11c91be50450cab57d66e.yaml @@ -0,0 +1,58 @@ +id: doofinder-for-woocommerce-ccf7ae7c58d11c91be50450cab57d66e + +info: + name: > + Doofinder for WooCommerce <= 2.1.8 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13159a71-c183-4fc2-98af-8b9e60508a1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/doofinder-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/doofinder-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,doofinder-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/doofinder-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doofinder-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-dbc6d35b9d97e2d76a522059041b4184.yaml b/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-dbc6d35b9d97e2d76a522059041b4184.yaml new file mode 100644 index 0000000000..c3dc75c57b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/doofinder-for-woocommerce-dbc6d35b9d97e2d76a522059041b4184.yaml @@ -0,0 +1,58 @@ +id: doofinder-for-woocommerce-dbc6d35b9d97e2d76a522059041b4184 + +info: + name: > + Doofinder for WooCommerce <= 1.5.49 - Unauthenticated Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7414779e-7241-4ab2-9b1f-34c3e1acc66b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/doofinder-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/doofinder-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,doofinder-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/doofinder-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doofinder-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.49') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/double-opt-in-for-download-1963440e9d46a424a870f14bf4b601ac.yaml b/nuclei-templates/cve-less/plugins/double-opt-in-for-download-1963440e9d46a424a870f14bf4b601ac.yaml new file mode 100644 index 0000000000..7810d81415 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/double-opt-in-for-download-1963440e9d46a424a870f14bf4b601ac.yaml @@ -0,0 +1,58 @@ +id: double-opt-in-for-download-1963440e9d46a424a870f14bf4b601ac + +info: + name: > + Double Opt-In for Download <= 2.0.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8b544ba-8530-4c00-a8a8-b24d8b68a33a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/double-opt-in-for-download/" + google-query: inurl:"/wp-content/plugins/double-opt-in-for-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,double-opt-in-for-download,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/double-opt-in-for-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "double-opt-in-for-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/double-opt-in-for-download-de1a73429738ac6f52decf46ff2bdf86.yaml b/nuclei-templates/cve-less/plugins/double-opt-in-for-download-de1a73429738ac6f52decf46ff2bdf86.yaml new file mode 100644 index 0000000000..df700d1b9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/double-opt-in-for-download-de1a73429738ac6f52decf46ff2bdf86.yaml @@ -0,0 +1,58 @@ +id: double-opt-in-for-download-de1a73429738ac6f52decf46ff2bdf86 + +info: + name: > + Double Opt-In for Download <= 2.0.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/540ac650-6bfd-4ee2-b3c8-b6444a209b6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/double-opt-in-for-download/" + google-query: inurl:"/wp-content/plugins/double-opt-in-for-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,double-opt-in-for-download,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/double-opt-in-for-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "double-opt-in-for-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dovetail-9a176796080675b246543fba168c027a.yaml b/nuclei-templates/cve-less/plugins/dovetail-9a176796080675b246543fba168c027a.yaml new file mode 100644 index 0000000000..c1aa1f56a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dovetail-9a176796080675b246543fba168c027a.yaml @@ -0,0 +1,58 @@ +id: dovetail-9a176796080675b246543fba168c027a + +info: + name: > + Dovetail <= 1.2.13 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52983bf6-908a-4287-b89e-cd09b4c48efe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dovetail/" + google-query: inurl:"/wp-content/plugins/dovetail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dovetail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dovetail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dovetail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/down-as-pdf-7cecc34bfe19dc68894d7b020addf743.yaml b/nuclei-templates/cve-less/plugins/down-as-pdf-7cecc34bfe19dc68894d7b020addf743.yaml new file mode 100644 index 0000000000..fe63302886 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/down-as-pdf-7cecc34bfe19dc68894d7b020addf743.yaml @@ -0,0 +1,58 @@ +id: down-as-pdf-7cecc34bfe19dc68894d7b020addf743 + +info: + name: > + Hacklog Down As PDF <= 2.3.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cad85e1-9af0-44fa-97c7-a108b30891e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/down-as-pdf/" + google-query: inurl:"/wp-content/plugins/down-as-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,down-as-pdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/down-as-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "down-as-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-attachments-6f48b6d420d1eeb4f46e78496cf4eb1b.yaml b/nuclei-templates/cve-less/plugins/download-attachments-6f48b6d420d1eeb4f46e78496cf4eb1b.yaml new file mode 100644 index 0000000000..d057389f6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-attachments-6f48b6d420d1eeb4f46e78496cf4eb1b.yaml @@ -0,0 +1,58 @@ +id: download-attachments-6f48b6d420d1eeb4f46e78496cf4eb1b + +info: + name: > + Download Attachments <= 1.2.24 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e977be1-d346-4fcc-89a5-332cbd010d18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-attachments/" + google-query: inurl:"/wp-content/plugins/download-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-attachments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-from-files-c619d56801748dba6948ad0822abf51a.yaml b/nuclei-templates/cve-less/plugins/download-from-files-c619d56801748dba6948ad0822abf51a.yaml new file mode 100644 index 0000000000..234f37d89c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-from-files-c619d56801748dba6948ad0822abf51a.yaml @@ -0,0 +1,58 @@ +id: download-from-files-c619d56801748dba6948ad0822abf51a + +info: + name: > + Download from files <= 1.48 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6f68bfd-36c3-45f5-a50b-6803b5967e52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-from-files/" + google-query: inurl:"/wp-content/plugins/download-from-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-from-files,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-from-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-from-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-info-page-3f433c20605e0478560f661cae839ad8.yaml b/nuclei-templates/cve-less/plugins/download-info-page-3f433c20605e0478560f661cae839ad8.yaml new file mode 100644 index 0000000000..54e4edc4ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-info-page-3f433c20605e0478560f661cae839ad8.yaml @@ -0,0 +1,58 @@ +id: download-info-page-3f433c20605e0478560f661cae839ad8 + +info: + name: > + WP资源下载管理 <= 1.3.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa7aad43-54b4-4b9f-9584-292e40be71bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-info-page/" + google-query: inurl:"/wp-content/plugins/download-info-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-info-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-info-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-info-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-010922f26f33a94ab231b7f0fdab049f.yaml b/nuclei-templates/cve-less/plugins/download-manager-010922f26f33a94ab231b7f0fdab049f.yaml new file mode 100644 index 0000000000..71e52c1538 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-010922f26f33a94ab231b7f0fdab049f.yaml @@ -0,0 +1,58 @@ +id: download-manager-010922f26f33a94ab231b7f0fdab049f + +info: + name: > + WordPress Download Manager <= 3.1.24 - Authenticated File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cde1f4d-0212-48b1-a0ef-ba923c37ab50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-02ae4a0720867671dd11925e4a221a75.yaml b/nuclei-templates/cve-less/plugins/download-manager-02ae4a0720867671dd11925e4a221a75.yaml new file mode 100644 index 0000000000..03fa0c8a17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-02ae4a0720867671dd11925e4a221a75.yaml @@ -0,0 +1,58 @@ +id: download-manager-02ae4a0720867671dd11925e4a221a75 + +info: + name: > + WordPress Download Manager <= 2.9.45 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f52aede5-21c3-46b9-800e-860a677a4b90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-03366e13fcca1db85a35f2268a00796c.yaml b/nuclei-templates/cve-less/plugins/download-manager-03366e13fcca1db85a35f2268a00796c.yaml new file mode 100644 index 0000000000..b904a04847 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-03366e13fcca1db85a35f2268a00796c.yaml @@ -0,0 +1,58 @@ +id: download-manager-03366e13fcca1db85a35f2268a00796c + +info: + name: > + Download Manager <= 2.8.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7d381af-bb2a-43cb-9e5d-0b3d0e5f88f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-07b6f9539cc79b55c833c05dca993fdb.yaml b/nuclei-templates/cve-less/plugins/download-manager-07b6f9539cc79b55c833c05dca993fdb.yaml new file mode 100644 index 0000000000..faea53f474 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-07b6f9539cc79b55c833c05dca993fdb.yaml @@ -0,0 +1,58 @@ +id: download-manager-07b6f9539cc79b55c833c05dca993fdb + +info: + name: > + WordPress Download Manager <= 2.7.2 - Authenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/567782f9-a050-4e68-9491-e038d7e383f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-08c891f98b2f8faaecf3787ed0733081.yaml b/nuclei-templates/cve-less/plugins/download-manager-08c891f98b2f8faaecf3787ed0733081.yaml new file mode 100644 index 0000000000..0c349b9944 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-08c891f98b2f8faaecf3787ed0733081.yaml @@ -0,0 +1,58 @@ +id: download-manager-08c891f98b2f8faaecf3787ed0733081 + +info: + name: > + Download Manager <= 3.2.43 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d72604e-23ef-4a69-8839-cf8ff4aef3bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-0fbbdf117a58185e2bf8aba144015927.yaml b/nuclei-templates/cve-less/plugins/download-manager-0fbbdf117a58185e2bf8aba144015927.yaml new file mode 100644 index 0000000000..e580e06958 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-0fbbdf117a58185e2bf8aba144015927.yaml @@ -0,0 +1,58 @@ +id: download-manager-0fbbdf117a58185e2bf8aba144015927 + +info: + name: > + WordPress Download Manager < 3.1.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ccc8f3b-9028-45db-8db2-574736fe3ccb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-1c63696c8009b48d027fd7d86fee0dcb.yaml b/nuclei-templates/cve-less/plugins/download-manager-1c63696c8009b48d027fd7d86fee0dcb.yaml new file mode 100644 index 0000000000..7e99090b41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-1c63696c8009b48d027fd7d86fee0dcb.yaml @@ -0,0 +1,58 @@ +id: download-manager-1c63696c8009b48d027fd7d86fee0dcb + +info: + name: > + Download Manager <= 3.2.70 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a66bc196-e5f8-46b4-a81c-c888eb64021c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-22e8c4993187acede41bbad9c3b9081a.yaml b/nuclei-templates/cve-less/plugins/download-manager-22e8c4993187acede41bbad9c3b9081a.yaml new file mode 100644 index 0000000000..5daf713d05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-22e8c4993187acede41bbad9c3b9081a.yaml @@ -0,0 +1,58 @@ +id: download-manager-22e8c4993187acede41bbad9c3b9081a + +info: + name: > + WordPress Download Manager <= 2.7.4 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e491592-a17f-4789-8faa-d2a60b8ced70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-300ac7058f885b1b1ecbf0131074eaf1.yaml b/nuclei-templates/cve-less/plugins/download-manager-300ac7058f885b1b1ecbf0131074eaf1.yaml new file mode 100644 index 0000000000..459b6bb377 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-300ac7058f885b1b1ecbf0131074eaf1.yaml @@ -0,0 +1,58 @@ +id: download-manager-300ac7058f885b1b1ecbf0131074eaf1 + +info: + name: > + Download Manager <= 3.2.48 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41b3a62c-9586-4c87-828a-584dfe386a37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-30d61c53466fa58934f9b72c5790a166.yaml b/nuclei-templates/cve-less/plugins/download-manager-30d61c53466fa58934f9b72c5790a166.yaml new file mode 100644 index 0000000000..e27c16d97e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-30d61c53466fa58934f9b72c5790a166.yaml @@ -0,0 +1,58 @@ +id: download-manager-30d61c53466fa58934f9b72c5790a166 + +info: + name: > + Download Manager <= 3.2.54 - Authenticated (Admin+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e2527d4-750d-4e36-ae27-920105958c21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-31395bccdb490b805531cabc85d6de58.yaml b/nuclei-templates/cve-less/plugins/download-manager-31395bccdb490b805531cabc85d6de58.yaml new file mode 100644 index 0000000000..6d6fa5abf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-31395bccdb490b805531cabc85d6de58.yaml @@ -0,0 +1,58 @@ +id: download-manager-31395bccdb490b805531cabc85d6de58 + +info: + name: > + Download Manager <= 3.2.49 - Authenticated (Contributor+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/471957f6-54c1-4268-b2e1-8efa391dcaec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.49') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-31bb9a1a6021af8a029348a6ecc96852.yaml b/nuclei-templates/cve-less/plugins/download-manager-31bb9a1a6021af8a029348a6ecc96852.yaml new file mode 100644 index 0000000000..cf34746fc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-31bb9a1a6021af8a029348a6ecc96852.yaml @@ -0,0 +1,58 @@ +id: download-manager-31bb9a1a6021af8a029348a6ecc96852 + +info: + name: > + Download Manager <= 3.2.46 - Contributor+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b399929a-db33-419f-9218-b86ee88a9f1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-3654cd4919a2027fb17d521b494ff35a.yaml b/nuclei-templates/cve-less/plugins/download-manager-3654cd4919a2027fb17d521b494ff35a.yaml new file mode 100644 index 0000000000..9d5fb6cd69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-3654cd4919a2027fb17d521b494ff35a.yaml @@ -0,0 +1,58 @@ +id: download-manager-3654cd4919a2027fb17d521b494ff35a + +info: + name: > + WordPress Download Manager <= 2.7.94 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3247bb3-3d9a-49b5-99ec-f4b305d37ae5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-36d2ad9a774b3ffdb359958bc8b37040.yaml b/nuclei-templates/cve-less/plugins/download-manager-36d2ad9a774b3ffdb359958bc8b37040.yaml new file mode 100644 index 0000000000..2d2d578618 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-36d2ad9a774b3ffdb359958bc8b37040.yaml @@ -0,0 +1,58 @@ +id: download-manager-36d2ad9a774b3ffdb359958bc8b37040 + +info: + name: > + WordPress Download Manager < 2.9.51 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97690bde-f2c6-429b-8d5a-51bee4a981ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-37c94bc66c005be68e2dea455cb8d54d.yaml b/nuclei-templates/cve-less/plugins/download-manager-37c94bc66c005be68e2dea455cb8d54d.yaml new file mode 100644 index 0000000000..edf24776da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-37c94bc66c005be68e2dea455cb8d54d.yaml @@ -0,0 +1,58 @@ +id: download-manager-37c94bc66c005be68e2dea455cb8d54d + +info: + name: > + Download Manager <= 2.8.7 - Sensitive Information Disclosure via Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/639bf20c-04d4-49e5-8da1-685421a6f63a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-46f8f7fca478042503cff5486b63739f.yaml b/nuclei-templates/cve-less/plugins/download-manager-46f8f7fca478042503cff5486b63739f.yaml new file mode 100644 index 0000000000..967a184cc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-46f8f7fca478042503cff5486b63739f.yaml @@ -0,0 +1,58 @@ +id: download-manager-46f8f7fca478042503cff5486b63739f + +info: + name: > + Download Manager <= 3.2.38 - Unauthenticated Brute Force of File Master Key + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/feb056b0-5ea0-4257-8d58-0e29b3c304bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-4e4181a37474e6c9ba0613d6b7881b76.yaml b/nuclei-templates/cve-less/plugins/download-manager-4e4181a37474e6c9ba0613d6b7881b76.yaml new file mode 100644 index 0000000000..58a2430e29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-4e4181a37474e6c9ba0613d6b7881b76.yaml @@ -0,0 +1,58 @@ +id: download-manager-4e4181a37474e6c9ba0613d6b7881b76 + +info: + name: > + WordPress Download Manager < 3.1.23 - Arbitrary Asset Manager Usage + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d700580-1374-4a17-a6b3-59ba1d063030?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-5425379653c5c62de7cbdf4b522ef322.yaml b/nuclei-templates/cve-less/plugins/download-manager-5425379653c5c62de7cbdf4b522ef322.yaml new file mode 100644 index 0000000000..35f1d25bdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-5425379653c5c62de7cbdf4b522ef322.yaml @@ -0,0 +1,58 @@ +id: download-manager-5425379653c5c62de7cbdf4b522ef322 + +info: + name: > + WordPress Download Manager <= 2.9.49 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf90d284-9db8-464b-ae01-f1979408b351?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-6811835f1b3b62a667088ec060a91ec5.yaml b/nuclei-templates/cve-less/plugins/download-manager-6811835f1b3b62a667088ec060a91ec5.yaml new file mode 100644 index 0000000000..2287b006c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-6811835f1b3b62a667088ec060a91ec5.yaml @@ -0,0 +1,58 @@ +id: download-manager-6811835f1b3b62a667088ec060a91ec5 + +info: + name: > + Download Manager <= 3.2.50 - Authenticated (Contributor+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3c9c798-8545-475e-879b-7e44dac493f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-6855332cd5767d389db903e31b1c4f88.yaml b/nuclei-templates/cve-less/plugins/download-manager-6855332cd5767d389db903e31b1c4f88.yaml new file mode 100644 index 0000000000..0cf29fa16d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-6855332cd5767d389db903e31b1c4f88.yaml @@ -0,0 +1,58 @@ +id: download-manager-6855332cd5767d389db903e31b1c4f88 + +info: + name: > + Download Manager <= 3.2.59 - Refleced Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10b46c11-1b34-4da4-a24d-103c663ca315?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-6aa900a875605d12f51c36a7aee68e0c.yaml b/nuclei-templates/cve-less/plugins/download-manager-6aa900a875605d12f51c36a7aee68e0c.yaml new file mode 100644 index 0000000000..d37c2c961f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-6aa900a875605d12f51c36a7aee68e0c.yaml @@ -0,0 +1,58 @@ +id: download-manager-6aa900a875605d12f51c36a7aee68e0c + +info: + name: > + WordPress Download Manager <= 3.1.24 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/776fc47e-a86c-43dc-8d5e-50273c4411b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-7367ffe725d32472b793d84e3d0fe0d9.yaml b/nuclei-templates/cve-less/plugins/download-manager-7367ffe725d32472b793d84e3d0fe0d9.yaml new file mode 100644 index 0000000000..26dd8c8aec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-7367ffe725d32472b793d84e3d0fe0d9.yaml @@ -0,0 +1,58 @@ +id: download-manager-7367ffe725d32472b793d84e3d0fe0d9 + +info: + name: > + Download Manager <= 2.5.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd7c442f-5c91-4c52-933a-8a6fb7adca8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-7381977dcbbf38890f97270b77e9814a.yaml b/nuclei-templates/cve-less/plugins/download-manager-7381977dcbbf38890f97270b77e9814a.yaml new file mode 100644 index 0000000000..c55a7b4464 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-7381977dcbbf38890f97270b77e9814a.yaml @@ -0,0 +1,58 @@ +id: download-manager-7381977dcbbf38890f97270b77e9814a + +info: + name: > + WordPress Download Manager <= 2.9.93 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b602f33-ae2f-4349-a8be-901a9eec91c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-7db5ef531b59fcf315c55f77b9b8f6fb.yaml b/nuclei-templates/cve-less/plugins/download-manager-7db5ef531b59fcf315c55f77b9b8f6fb.yaml new file mode 100644 index 0000000000..c05f305f1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-7db5ef531b59fcf315c55f77b9b8f6fb.yaml @@ -0,0 +1,58 @@ +id: download-manager-7db5ef531b59fcf315c55f77b9b8f6fb + +info: + name: > + WordPress Download Manager <= 2.9.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79b5883b-a3be-497e-b911-7dc39e7fb418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-83ab5d6545a91728c424846b6a566917.yaml b/nuclei-templates/cve-less/plugins/download-manager-83ab5d6545a91728c424846b6a566917.yaml new file mode 100644 index 0000000000..417dad256d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-83ab5d6545a91728c424846b6a566917.yaml @@ -0,0 +1,58 @@ +id: download-manager-83ab5d6545a91728c424846b6a566917 + +info: + name: > + Download Manager <= 2.8.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c59cddfb-c434-4a69-9c1c-7d58f022c1aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-899169b3fe14c55dc2775d2907a0f4d5.yaml b/nuclei-templates/cve-less/plugins/download-manager-899169b3fe14c55dc2775d2907a0f4d5.yaml new file mode 100644 index 0000000000..d97bd4f16e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-899169b3fe14c55dc2775d2907a0f4d5.yaml @@ -0,0 +1,58 @@ +id: download-manager-899169b3fe14c55dc2775d2907a0f4d5 + +info: + name: > + Download Manager < 2.5.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/446b160a-299e-4f91-bd49-02a7a16b6e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-8c46bf632b1c3634dd29de610dae2727.yaml b/nuclei-templates/cve-less/plugins/download-manager-8c46bf632b1c3634dd29de610dae2727.yaml new file mode 100644 index 0000000000..9efa3ad2f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-8c46bf632b1c3634dd29de610dae2727.yaml @@ -0,0 +1,58 @@ +id: download-manager-8c46bf632b1c3634dd29de610dae2727 + +info: + name: > + WordPress Download Manager < 3.1.19 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed40b874-68e2-49f3-95b0-653600394e78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-93730c80f26663486b577cf1ff9df8f4.yaml b/nuclei-templates/cve-less/plugins/download-manager-93730c80f26663486b577cf1ff9df8f4.yaml new file mode 100644 index 0000000000..80a923a403 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-93730c80f26663486b577cf1ff9df8f4.yaml @@ -0,0 +1,58 @@ +id: download-manager-93730c80f26663486b577cf1ff9df8f4 + +info: + name: > + Download Manager <= 3.2.43 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cace29fd-95d0-48ea-8dfa-6fd12dd9ccbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-93832a5ea647bdf515b56a86b8d86d79.yaml b/nuclei-templates/cve-less/plugins/download-manager-93832a5ea647bdf515b56a86b8d86d79.yaml new file mode 100644 index 0000000000..099f46ee8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-93832a5ea647bdf515b56a86b8d86d79.yaml @@ -0,0 +1,58 @@ +id: download-manager-93832a5ea647bdf515b56a86b8d86d79 + +info: + name: > + Download Manager <= 3.2.82 - Unauthenticated Password Leak + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f9cece7-a158-41ae-816b-1054da830724?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.82') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-9a4aa24f23eceeee8bc7c02ddb1c2cce.yaml b/nuclei-templates/cve-less/plugins/download-manager-9a4aa24f23eceeee8bc7c02ddb1c2cce.yaml new file mode 100644 index 0000000000..94accfe8af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-9a4aa24f23eceeee8bc7c02ddb1c2cce.yaml @@ -0,0 +1,58 @@ +id: download-manager-9a4aa24f23eceeee8bc7c02ddb1c2cce + +info: + name: > + Download Manager <= 3.2.34 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8f24fae-6a8b-4c67-a204-c085ae43552f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-9b3649e551e8d75fa74f183c3fac393e.yaml b/nuclei-templates/cve-less/plugins/download-manager-9b3649e551e8d75fa74f183c3fac393e.yaml new file mode 100644 index 0000000000..0d9467a4ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-9b3649e551e8d75fa74f183c3fac393e.yaml @@ -0,0 +1,58 @@ +id: download-manager-9b3649e551e8d75fa74f183c3fac393e + +info: + name: > + Download Manager Pro <= 6.2.9 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88d80702-a987-4b12-a003-2fa564fda409?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.0', '<= 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-a251d6368bb7c15c47f1a00b82a60c06.yaml b/nuclei-templates/cve-less/plugins/download-manager-a251d6368bb7c15c47f1a00b82a60c06.yaml new file mode 100644 index 0000000000..3e6aaa33cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-a251d6368bb7c15c47f1a00b82a60c06.yaml @@ -0,0 +1,58 @@ +id: download-manager-a251d6368bb7c15c47f1a00b82a60c06 + +info: + name: > + Download Manager <= 3.2.49 - IP Blocking Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9611732-67aa-4940-8df1-c0ed7baad985?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.49') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-b1861af38d12189832b1b119b32a79ef.yaml b/nuclei-templates/cve-less/plugins/download-manager-b1861af38d12189832b1b119b32a79ef.yaml new file mode 100644 index 0000000000..e39487d2f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-b1861af38d12189832b1b119b32a79ef.yaml @@ -0,0 +1,58 @@ +id: download-manager-b1861af38d12189832b1b119b32a79ef + +info: + name: > + Download Manager <= 2.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a6390d2-58cd-468e-9936-e16954e2d3ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-baeb593e80daf8c0e9aa6de629d61f7e.yaml b/nuclei-templates/cve-less/plugins/download-manager-baeb593e80daf8c0e9aa6de629d61f7e.yaml new file mode 100644 index 0000000000..171c0dc499 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-baeb593e80daf8c0e9aa6de629d61f7e.yaml @@ -0,0 +1,58 @@ +id: download-manager-baeb593e80daf8c0e9aa6de629d61f7e + +info: + name: > + Download Manager <= 3.2.84 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b3608ca-8ed6-46ff-8e57-d8b68f91b9f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.84') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-bc9258a94f7c2dba9bd7d9f332571167.yaml b/nuclei-templates/cve-less/plugins/download-manager-bc9258a94f7c2dba9bd7d9f332571167.yaml new file mode 100644 index 0000000000..f5fc8df63c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-bc9258a94f7c2dba9bd7d9f332571167.yaml @@ -0,0 +1,58 @@ +id: download-manager-bc9258a94f7c2dba9bd7d9f332571167 + +info: + name: > + WordPress Download Manager <= 3.2.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a73d326-cd27-4719-8c26-3aa5dce837c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-c1281bc3be6489439619d6a7c7e1abac.yaml b/nuclei-templates/cve-less/plugins/download-manager-c1281bc3be6489439619d6a7c7e1abac.yaml new file mode 100644 index 0000000000..3da6e7db72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-c1281bc3be6489439619d6a7c7e1abac.yaml @@ -0,0 +1,58 @@ +id: download-manager-c1281bc3be6489439619d6a7c7e1abac + +info: + name: > + Download Manager <= 3.2.84 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb0da20-99f1-4bf1-8b30-3c8d15bf9679?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.84') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-c202e0ac545cb4289f68113596303c38.yaml b/nuclei-templates/cve-less/plugins/download-manager-c202e0ac545cb4289f68113596303c38.yaml new file mode 100644 index 0000000000..2b607f0729 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-c202e0ac545cb4289f68113596303c38.yaml @@ -0,0 +1,58 @@ +id: download-manager-c202e0ac545cb4289f68113596303c38 + +info: + name: > + Download Manager <= 3.2.61 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07a31d5c-b8c5-4523-8883-ba1e919c0ab1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-ca1ac4d2663fee70b0283b8708b4ae50.yaml b/nuclei-templates/cve-less/plugins/download-manager-ca1ac4d2663fee70b0283b8708b4ae50.yaml new file mode 100644 index 0000000000..918e6ed5e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-ca1ac4d2663fee70b0283b8708b4ae50.yaml @@ -0,0 +1,58 @@ +id: download-manager-ca1ac4d2663fee70b0283b8708b4ae50 + +info: + name: > + Download Manager <= 3.2.70 - Insufficient Authorization to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b48bc632-c825-48e0-8766-3ac59e5b87c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-cb8528ea228de7c195be74b03a1cf056.yaml b/nuclei-templates/cve-less/plugins/download-manager-cb8528ea228de7c195be74b03a1cf056.yaml new file mode 100644 index 0000000000..4eaa1c156e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-cb8528ea228de7c195be74b03a1cf056.yaml @@ -0,0 +1,58 @@ +id: download-manager-cb8528ea228de7c195be74b03a1cf056 + +info: + name: > + Download Manager <= 3.2.48 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/228147c2-97c6-4910-b9b2-d6ca62fc1760?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-cf4fa8f0c990098bbe171db8d667a080.yaml b/nuclei-templates/cve-less/plugins/download-manager-cf4fa8f0c990098bbe171db8d667a080.yaml new file mode 100644 index 0000000000..91318734e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-cf4fa8f0c990098bbe171db8d667a080.yaml @@ -0,0 +1,58 @@ +id: download-manager-cf4fa8f0c990098bbe171db8d667a080 + +info: + name: > + WordPress Download Manager <= 3.2.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5a03e67-f36f-441a-a2fd-a545efa06c00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-da52023c7620366d69c94922efd73968.yaml b/nuclei-templates/cve-less/plugins/download-manager-da52023c7620366d69c94922efd73968.yaml new file mode 100644 index 0000000000..ead5fb4835 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-da52023c7620366d69c94922efd73968.yaml @@ -0,0 +1,58 @@ +id: download-manager-da52023c7620366d69c94922efd73968 + +info: + name: > + Download Manager <= 3.1.17 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06738434-ccd4-4e87-8163-d56ff3b4b5c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-dc6aa910a851ae74e5606d96e36b1052.yaml b/nuclei-templates/cve-less/plugins/download-manager-dc6aa910a851ae74e5606d96e36b1052.yaml new file mode 100644 index 0000000000..ae04ce787d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-dc6aa910a851ae74e5606d96e36b1052.yaml @@ -0,0 +1,58 @@ +id: download-manager-dc6aa910a851ae74e5606d96e36b1052 + +info: + name: > + WordPress Download Manager <= 2.9.51 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44c31db3-6dfa-4d42-9c3b-73dde9bc49b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-dc8ff7d3332154eb2062f549788da3cc.yaml b/nuclei-templates/cve-less/plugins/download-manager-dc8ff7d3332154eb2062f549788da3cc.yaml new file mode 100644 index 0000000000..e2336f33f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-dc8ff7d3332154eb2062f549788da3cc.yaml @@ -0,0 +1,58 @@ +id: download-manager-dc8ff7d3332154eb2062f549788da3cc + +info: + name: > + Download Manager <= 3.2.48 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4654609e-ed3e-4268-a9a4-80bc563e0a64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-de1ce77814c2edc391436dd273126a1e.yaml b/nuclei-templates/cve-less/plugins/download-manager-de1ce77814c2edc391436dd273126a1e.yaml new file mode 100644 index 0000000000..c6a34c855d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-de1ce77814c2edc391436dd273126a1e.yaml @@ -0,0 +1,58 @@ +id: download-manager-de1ce77814c2edc391436dd273126a1e + +info: + name: > + Download Manager <= 3.2.85 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cdd64a4-040b-4dc9-a8df-dbecfeb928c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.85') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-de94c31f4187177567b889a40327a1d3.yaml b/nuclei-templates/cve-less/plugins/download-manager-de94c31f4187177567b889a40327a1d3.yaml new file mode 100644 index 0000000000..8317b8d74f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-de94c31f4187177567b889a40327a1d3.yaml @@ -0,0 +1,58 @@ +id: download-manager-de94c31f4187177567b889a40327a1d3 + +info: + name: > + WordPress Download Manager <= 2.9.96 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cad5274f-0d73-425d-bdfb-478c77d55d6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.97') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-e505994846479615d49d4f4342d7b65f.yaml b/nuclei-templates/cve-less/plugins/download-manager-e505994846479615d49d4f4342d7b65f.yaml new file mode 100644 index 0000000000..409872b7d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-e505994846479615d49d4f4342d7b65f.yaml @@ -0,0 +1,58 @@ +id: download-manager-e505994846479615d49d4f4342d7b65f + +info: + name: > + Download Manager <= 3.2.42 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79fcf18e-39f7-42f2-90e4-3a5bac3382e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-e5651ec96e6ca99165a7dcf4611fe4ad.yaml b/nuclei-templates/cve-less/plugins/download-manager-e5651ec96e6ca99165a7dcf4611fe4ad.yaml new file mode 100644 index 0000000000..6f37c90096 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-e5651ec96e6ca99165a7dcf4611fe4ad.yaml @@ -0,0 +1,58 @@ +id: download-manager-e5651ec96e6ca99165a7dcf4611fe4ad + +info: + name: > + WordPress Download Manager <= 3.2.33 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed6e0136-f4fa-4739-b02d-b53091991e58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-e6a59e2d8dcc1e62ef50ded882a3c3af.yaml b/nuclei-templates/cve-less/plugins/download-manager-e6a59e2d8dcc1e62ef50ded882a3c3af.yaml new file mode 100644 index 0000000000..17e2e29116 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-e6a59e2d8dcc1e62ef50ded882a3c3af.yaml @@ -0,0 +1,58 @@ +id: download-manager-e6a59e2d8dcc1e62ef50ded882a3c3af + +info: + name: > + Download Manager <= 3.2.53 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/332b8d96-89b2-473b-9186-239e49f5b064?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-manager-edb73da37a786109cf2a1c2cf12e6eb7.yaml b/nuclei-templates/cve-less/plugins/download-manager-edb73da37a786109cf2a1c2cf12e6eb7.yaml new file mode 100644 index 0000000000..dc2812215d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-manager-edb73da37a786109cf2a1c2cf12e6eb7.yaml @@ -0,0 +1,58 @@ +id: download-manager-edb73da37a786109cf2a1c2cf12e6eb7 + +info: + name: > + WordPress Download Manager <= 3.2.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d8499a-a630-4c2b-9381-78ac83da119d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-manager/" + google-query: inurl:"/wp-content/plugins/download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-media-43eedc047028750edf0998930243bbd6.yaml b/nuclei-templates/cve-less/plugins/download-media-43eedc047028750edf0998930243bbd6.yaml new file mode 100644 index 0000000000..92f85611e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-media-43eedc047028750edf0998930243bbd6.yaml @@ -0,0 +1,58 @@ +id: download-media-43eedc047028750edf0998930243bbd6 + +info: + name: > + Download Media <= 1.4.2 - Missing Authorization via generate_link_for_media + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f4f7cb9-22ef-46fb-bb0a-98fe9af32d38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-media/" + google-query: inurl:"/wp-content/plugins/download-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-2ee20ef00c8dffbd5ed7b6a797548996.yaml b/nuclei-templates/cve-less/plugins/download-monitor-2ee20ef00c8dffbd5ed7b6a797548996.yaml new file mode 100644 index 0000000000..2fb7e789b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-2ee20ef00c8dffbd5ed7b6a797548996.yaml @@ -0,0 +1,58 @@ +id: download-monitor-2ee20ef00c8dffbd5ed7b6a797548996 + +info: + name: > + Download Monitor <= 4.5.97 - Authenticated (Administrator+) Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aa0dfdf-95b0-48a2-8281-1872b99b87d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.97') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-2f1f33bfd002c22ab758b0590571cc4a.yaml b/nuclei-templates/cve-less/plugins/download-monitor-2f1f33bfd002c22ab758b0590571cc4a.yaml new file mode 100644 index 0000000000..bd0c3c025b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-2f1f33bfd002c22ab758b0590571cc4a.yaml @@ -0,0 +1,58 @@ +id: download-monitor-2f1f33bfd002c22ab758b0590571cc4a + +info: + name: > + Download Monitor <= 1.9.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c320e437-c1b4-4ccf-9dfd-55ba9c810534?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-395b4caea34d0aadd182993cecde5b31.yaml b/nuclei-templates/cve-less/plugins/download-monitor-395b4caea34d0aadd182993cecde5b31.yaml new file mode 100644 index 0000000000..f8e7b9eece --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-395b4caea34d0aadd182993cecde5b31.yaml @@ -0,0 +1,58 @@ +id: download-monitor-395b4caea34d0aadd182993cecde5b31 + +info: + name: > + Download Monitor <= 4.7.51 - Missing Authorization to Unauthenticated Data Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9000c52-fdd7-43e2-ae6a-9f127c4a9fcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-5c72e030a59da55164488a0121d8367a.yaml b/nuclei-templates/cve-less/plugins/download-monitor-5c72e030a59da55164488a0121d8367a.yaml new file mode 100644 index 0000000000..907f6fbdcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-5c72e030a59da55164488a0121d8367a.yaml @@ -0,0 +1,58 @@ +id: download-monitor-5c72e030a59da55164488a0121d8367a + +info: + name: > + Download Monitor <= 4.8.3 - Authenticated(Subscriber+) Arbitrary File Upload via upload_file + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/657b1b7b-eac2-4935-a50f-0849c4e96b16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-8d4bf28803761cae038f398e0f1dd848.yaml b/nuclei-templates/cve-less/plugins/download-monitor-8d4bf28803761cae038f398e0f1dd848.yaml new file mode 100644 index 0000000000..307d943d59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-8d4bf28803761cae038f398e0f1dd848.yaml @@ -0,0 +1,58 @@ +id: download-monitor-8d4bf28803761cae038f398e0f1dd848 + +info: + name: > + Download Monitor <= 4.5.9 - Authenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ce15d38-c5bc-441b-976a-60a3e90b5a30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-9156a008e8a44bce922b7f9ab6484346.yaml b/nuclei-templates/cve-less/plugins/download-monitor-9156a008e8a44bce922b7f9ab6484346.yaml new file mode 100644 index 0000000000..108c32bbf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-9156a008e8a44bce922b7f9ab6484346.yaml @@ -0,0 +1,58 @@ +id: download-monitor-9156a008e8a44bce922b7f9ab6484346 + +info: + name: > + Download Monitor <= 4.4.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/748d01ca-9dd5-4d03-88e7-e80932744fdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-937f60d959f194bc06ade3d9414194fa.yaml b/nuclei-templates/cve-less/plugins/download-monitor-937f60d959f194bc06ade3d9414194fa.yaml new file mode 100644 index 0000000000..012965eaeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-937f60d959f194bc06ade3d9414194fa.yaml @@ -0,0 +1,58 @@ +id: download-monitor-937f60d959f194bc06ade3d9414194fa + +info: + name: > + Download Monitor <= 1.6.3 - Directory Listing to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f71ab7bb-886a-4661-92b5-d9ac52901494?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-94ab1a5e48ccfc01b2ab43a21b16e2fe.yaml b/nuclei-templates/cve-less/plugins/download-monitor-94ab1a5e48ccfc01b2ab43a21b16e2fe.yaml new file mode 100644 index 0000000000..7bd7938886 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-94ab1a5e48ccfc01b2ab43a21b16e2fe.yaml @@ -0,0 +1,58 @@ +id: download-monitor-94ab1a5e48ccfc01b2ab43a21b16e2fe + +info: + name: > + Download Monitor <= 3.3.5.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5df79e6-649e-4213-b2ff-bc994b372224?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-95ac055a4400e480693a1f956a7737eb.yaml b/nuclei-templates/cve-less/plugins/download-monitor-95ac055a4400e480693a1f956a7737eb.yaml new file mode 100644 index 0000000000..06f4d73b99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-95ac055a4400e480693a1f956a7737eb.yaml @@ -0,0 +1,58 @@ +id: download-monitor-95ac055a4400e480693a1f956a7737eb + +info: + name: > + Download Monitor <= 4.7.2 - Authenticated Directory Traversal to Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f7fa5a4-07d7-4815-b393-871568777b0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-9c43290fa22148f68ff47d72abec5161.yaml b/nuclei-templates/cve-less/plugins/download-monitor-9c43290fa22148f68ff47d72abec5161.yaml new file mode 100644 index 0000000000..de0253ac8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-9c43290fa22148f68ff47d72abec5161.yaml @@ -0,0 +1,58 @@ +id: download-monitor-9c43290fa22148f68ff47d72abec5161 + +info: + name: > + Download Monitor < 1.7.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8305be9c-cad5-4bbc-beab-0730a9abe1d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-9ecbfebe7e10d279275667a070df122b.yaml b/nuclei-templates/cve-less/plugins/download-monitor-9ecbfebe7e10d279275667a070df122b.yaml new file mode 100644 index 0000000000..94465fb539 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-9ecbfebe7e10d279275667a070df122b.yaml @@ -0,0 +1,58 @@ +id: download-monitor-9ecbfebe7e10d279275667a070df122b + +info: + name: > + Download Monitor <= 4.9.4 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/105ae6be-2cb7-4ab2-8e4c-5d3ff84c5b9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-a760bafd1cd95a91af8a27215ef05ba2.yaml b/nuclei-templates/cve-less/plugins/download-monitor-a760bafd1cd95a91af8a27215ef05ba2.yaml new file mode 100644 index 0000000000..70b960c1a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-a760bafd1cd95a91af8a27215ef05ba2.yaml @@ -0,0 +1,58 @@ +id: download-monitor-a760bafd1cd95a91af8a27215ef05ba2 + +info: + name: > + Download Monitor < 3.3.6.2 - Cross-Site Scripting via p Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/134b6e4d-c38f-4d52-b6dd-fd49ea0e6581?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-bdf53bf0d4580f34f6ebb2e5285d2f9e.yaml b/nuclei-templates/cve-less/plugins/download-monitor-bdf53bf0d4580f34f6ebb2e5285d2f9e.yaml new file mode 100644 index 0000000000..31c6336611 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-bdf53bf0d4580f34f6ebb2e5285d2f9e.yaml @@ -0,0 +1,58 @@ +id: download-monitor-bdf53bf0d4580f34f6ebb2e5285d2f9e + +info: + name: > + Download Monitor <= 4.4.6 - Authenticated (Admin+) Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b515142-4e04-4570-b5cb-18261974c659?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-c5272b0ed6c4fa11625cff04681b3b2d.yaml b/nuclei-templates/cve-less/plugins/download-monitor-c5272b0ed6c4fa11625cff04681b3b2d.yaml new file mode 100644 index 0000000000..70066d9fa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-c5272b0ed6c4fa11625cff04681b3b2d.yaml @@ -0,0 +1,58 @@ +id: download-monitor-c5272b0ed6c4fa11625cff04681b3b2d + +info: + name: > + Download Monitor <= 2.0.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4770441f-5d8b-4edb-93e3-d2d73f145d26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-cae783a6ecd0d5e0f3f782adb9bd7358.yaml b/nuclei-templates/cve-less/plugins/download-monitor-cae783a6ecd0d5e0f3f782adb9bd7358.yaml new file mode 100644 index 0000000000..874aee488d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-cae783a6ecd0d5e0f3f782adb9bd7358.yaml @@ -0,0 +1,58 @@ +id: download-monitor-cae783a6ecd0d5e0f3f782adb9bd7358 + +info: + name: > + Download Monitor < 3.3.6.2 - Cross-Site Scripting via sort Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1774b9b6-b98b-410c-98eb-326eda53adca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-ce4d8c6c1d15b00a6a80a41c19c0a53f.yaml b/nuclei-templates/cve-less/plugins/download-monitor-ce4d8c6c1d15b00a6a80a41c19c0a53f.yaml new file mode 100644 index 0000000000..965aa98632 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-ce4d8c6c1d15b00a6a80a41c19c0a53f.yaml @@ -0,0 +1,58 @@ +id: download-monitor-ce4d8c6c1d15b00a6a80a41c19c0a53f + +info: + name: > + Download Monitor <= 4.8.1 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a03f0780-796c-41a3-8f06-04f76e0da2da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-d953e0cc8d7eb1063dec9efaeff900d0.yaml b/nuclei-templates/cve-less/plugins/download-monitor-d953e0cc8d7eb1063dec9efaeff900d0.yaml new file mode 100644 index 0000000000..e4016dac9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-d953e0cc8d7eb1063dec9efaeff900d0.yaml @@ -0,0 +1,58 @@ +id: download-monitor-d953e0cc8d7eb1063dec9efaeff900d0 + +info: + name: > + Download Monitor <= 1.6.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93cb6d59-6654-4ce1-b65f-0e162ae58bac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-e38136ce40ff372555239319f35c2227.yaml b/nuclei-templates/cve-less/plugins/download-monitor-e38136ce40ff372555239319f35c2227.yaml new file mode 100644 index 0000000000..59fc87abc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-e38136ce40ff372555239319f35c2227.yaml @@ -0,0 +1,58 @@ +id: download-monitor-e38136ce40ff372555239319f35c2227 + +info: + name: > + Download Monitor <= 4.7.60 - Sensitive Information Exposure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddf67d69-f362-4380-a396-300c7edbd9f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-e73148573c5807bdfaeaab5f8604f081.yaml b/nuclei-templates/cve-less/plugins/download-monitor-e73148573c5807bdfaeaab5f8604f081.yaml new file mode 100644 index 0000000000..20383072e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-e73148573c5807bdfaeaab5f8604f081.yaml @@ -0,0 +1,58 @@ +id: download-monitor-e73148573c5807bdfaeaab5f8604f081 + +info: + name: > + Download Monitor <= 4.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/306facf0-b1e4-4ba7-9462-f94af01d628d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-ee37641121dd5ca3e58a921bd679af5c.yaml b/nuclei-templates/cve-less/plugins/download-monitor-ee37641121dd5ca3e58a921bd679af5c.yaml new file mode 100644 index 0000000000..14e6ae5f28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-ee37641121dd5ca3e58a921bd679af5c.yaml @@ -0,0 +1,58 @@ +id: download-monitor-ee37641121dd5ca3e58a921bd679af5c + +info: + name: > + Download Monitor <= 4.4.4 - Admin+ SQL Injection via orderby parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96b68824-3080-4959-a7d7-43d29c5c4119?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-monitor-fa3ec4c554fb01ca3485de73728dd008.yaml b/nuclei-templates/cve-less/plugins/download-monitor-fa3ec4c554fb01ca3485de73728dd008.yaml new file mode 100644 index 0000000000..22bf85a506 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-monitor-fa3ec4c554fb01ca3485de73728dd008.yaml @@ -0,0 +1,58 @@ +id: download-monitor-fa3ec4c554fb01ca3485de73728dd008 + +info: + name: > + Download Monitor <= 4.7.60 - Missing Authorization to Authenticated Data Export + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d58f34b-5bd7-4be6-a7ce-b0769bec9aad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-monitor/" + google-query: inurl:"/wp-content/plugins/download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-now-for-woocommerce-d82977967e8370fff3f7aa446912e4fd.yaml b/nuclei-templates/cve-less/plugins/download-now-for-woocommerce-d82977967e8370fff3f7aa446912e4fd.yaml new file mode 100644 index 0000000000..7004924caf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-now-for-woocommerce-d82977967e8370fff3f7aa446912e4fd.yaml @@ -0,0 +1,58 @@ +id: download-now-for-woocommerce-d82977967e8370fff3f7aa446912e4fd + +info: + name: > + Free Downloads WooCommerce <= 3.5.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1793922f-c03a-4b66-a2e0-5729f0d4c4d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-now-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/download-now-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-now-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-now-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-now-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-plugin-10e0131bc3cbf1f9a7e37ed7d5c2a1cf.yaml b/nuclei-templates/cve-less/plugins/download-plugin-10e0131bc3cbf1f9a7e37ed7d5c2a1cf.yaml new file mode 100644 index 0000000000..d7fc63ab3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-plugin-10e0131bc3cbf1f9a7e37ed7d5c2a1cf.yaml @@ -0,0 +1,58 @@ +id: download-plugin-10e0131bc3cbf1f9a7e37ed7d5c2a1cf + +info: + name: > + Download Plugin < 1.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/585a7332-b063-463c-8077-68a860e14df2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-plugin/" + google-query: inurl:"/wp-content/plugins/download-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-plugin-8a3bfba63e8785572c67f2c51b59a6d0.yaml b/nuclei-templates/cve-less/plugins/download-plugin-8a3bfba63e8785572c67f2c51b59a6d0.yaml new file mode 100644 index 0000000000..999b444f04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-plugin-8a3bfba63e8785572c67f2c51b59a6d0.yaml @@ -0,0 +1,58 @@ +id: download-plugin-8a3bfba63e8785572c67f2c51b59a6d0 + +info: + name: > + Download Plugin <= 1.6.2 - Missing Authorization and Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/634bec5f-e511-4047-9a46-09147ccc3a25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-plugin/" + google-query: inurl:"/wp-content/plugins/download-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-plugin-e331a48b9ae531e85ab7c6eb7fe0575f.yaml b/nuclei-templates/cve-less/plugins/download-plugin-e331a48b9ae531e85ab7c6eb7fe0575f.yaml new file mode 100644 index 0000000000..e7e1024abf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-plugin-e331a48b9ae531e85ab7c6eb7fe0575f.yaml @@ -0,0 +1,58 @@ +id: download-plugin-e331a48b9ae531e85ab7c6eb7fe0575f + +info: + name: > + Download Plugin <= 2.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e48639e-01bb-4980-be6f-bcea3dd16fc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-plugin/" + google-query: inurl:"/wp-content/plugins/download-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-plugins-dashboard-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml b/nuclei-templates/cve-less/plugins/download-plugins-dashboard-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml new file mode 100644 index 0000000000..4a71beb5f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-plugins-dashboard-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml @@ -0,0 +1,58 @@ +id: download-plugins-dashboard-5c3c1a4d657c9a945c9b03f1e7ed6d15 + +info: + name: > + Download Plugins and Themes from Dashboard <= 1.5.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8a13d5-911a-4c25-8d5a-391146971c0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-plugins-dashboard/" + google-query: inurl:"/wp-content/plugins/download-plugins-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-plugins-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-plugins-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-plugins-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-shortcode-075f2aa698fd0722386a96df1a3100c2.yaml b/nuclei-templates/cve-less/plugins/download-shortcode-075f2aa698fd0722386a96df1a3100c2.yaml new file mode 100644 index 0000000000..d1f3e174d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-shortcode-075f2aa698fd0722386a96df1a3100c2.yaml @@ -0,0 +1,58 @@ +id: download-shortcode-075f2aa698fd0722386a96df1a3100c2 + +info: + name: > + Download Shortcode <= 0.2.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bae7516-e9dd-4c0c-b687-9cbe09b4c8bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-shortcode/" + google-query: inurl:"/wp-content/plugins/download-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-shortcode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-theme-132341ac397ed9029ecd03f993b8bfaa.yaml b/nuclei-templates/cve-less/plugins/download-theme-132341ac397ed9029ecd03f993b8bfaa.yaml new file mode 100644 index 0000000000..906f19a758 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-theme-132341ac397ed9029ecd03f993b8bfaa.yaml @@ -0,0 +1,58 @@ +id: download-theme-132341ac397ed9029ecd03f993b8bfaa + +info: + name: > + Download Theme <= 1.0.9 - Cross-Site Request Forgery via dtwap_download() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50ca7cf8-bb47-42ea-badc-8bfe0328cbb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-theme/" + google-query: inurl:"/wp-content/plugins/download-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-theme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/download-zip-attachments-dd3d09b236f4e0306f62e328db6df55a.yaml b/nuclei-templates/cve-less/plugins/download-zip-attachments-dd3d09b236f4e0306f62e328db6df55a.yaml new file mode 100644 index 0000000000..3e23aea270 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/download-zip-attachments-dd3d09b236f4e0306f62e328db6df55a.yaml @@ -0,0 +1,58 @@ +id: download-zip-attachments-dd3d09b236f4e0306f62e328db6df55a + +info: + name: > + Download ZIP Attachments <= 1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad4784ce-38f2-49b7-8323-ce08a16a311b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/download-zip-attachments/" + google-query: inurl:"/wp-content/plugins/download-zip-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,download-zip-attachments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/download-zip-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "download-zip-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/downloader-tiktok-92fda4d05082e41cb8ccd1d0178b61a6.yaml b/nuclei-templates/cve-less/plugins/downloader-tiktok-92fda4d05082e41cb8ccd1d0178b61a6.yaml new file mode 100644 index 0000000000..4bdc18f97f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/downloader-tiktok-92fda4d05082e41cb8ccd1d0178b61a6.yaml @@ -0,0 +1,58 @@ +id: downloader-tiktok-92fda4d05082e41cb8ccd1d0178b61a6 + +info: + name: > + Video Downloader for TikTok < 1.4 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80e85c7e-41e5-4b21-aa99-aa2097dfc4a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/downloader-tiktok/" + google-query: inurl:"/wp-content/plugins/downloader-tiktok/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,downloader-tiktok,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/downloader-tiktok/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "downloader-tiktok" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/downloader-tiktok-e50a1a1ba5097a77ccf546f0f88efdf8.yaml b/nuclei-templates/cve-less/plugins/downloader-tiktok-e50a1a1ba5097a77ccf546f0f88efdf8.yaml new file mode 100644 index 0000000000..48c6049228 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/downloader-tiktok-e50a1a1ba5097a77ccf546f0f88efdf8.yaml @@ -0,0 +1,58 @@ +id: downloader-tiktok-e50a1a1ba5097a77ccf546f0f88efdf8 + +info: + name: > + Video Downloader for TikTok < 1.4 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9aae623-abff-4216-981f-dcd13f367a8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/downloader-tiktok/" + google-query: inurl:"/wp-content/plugins/downloader-tiktok/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,downloader-tiktok,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/downloader-tiktok/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "downloader-tiktok" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/downloadmanager-90ce5b5c6d8ae42fe1a7818063e130ea.yaml b/nuclei-templates/cve-less/plugins/downloadmanager-90ce5b5c6d8ae42fe1a7818063e130ea.yaml new file mode 100644 index 0000000000..82bb58c9f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/downloadmanager-90ce5b5c6d8ae42fe1a7818063e130ea.yaml @@ -0,0 +1,58 @@ +id: downloadmanager-90ce5b5c6d8ae42fe1a7818063e130ea + +info: + name: > + Download Manager <= 3.2.82 - Password Protected File Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38fd8881-94f6-4330-a519-7582e253e057?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/downloadmanager/" + google-query: inurl:"/wp-content/plugins/downloadmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,downloadmanager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/downloadmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "downloadmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.82') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/downloads-manager-4995a23c57ea82d00ee47f5cbb214fc8.yaml b/nuclei-templates/cve-less/plugins/downloads-manager-4995a23c57ea82d00ee47f5cbb214fc8.yaml new file mode 100644 index 0000000000..54557ab8f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/downloads-manager-4995a23c57ea82d00ee47f5cbb214fc8.yaml @@ -0,0 +1,58 @@ +id: downloads-manager-4995a23c57ea82d00ee47f5cbb214fc8 + +info: + name: > + Downloads Manager <= 0.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b458323-5fca-4fed-8c98-dfe69fd7a997?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/downloads-manager/" + google-query: inurl:"/wp-content/plugins/downloads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,downloads-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/downloads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "downloads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dp-maintenance-mode-lite-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/dp-maintenance-mode-lite-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..f75287859b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dp-maintenance-mode-lite-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: dp-maintenance-mode-lite-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dp-maintenance-mode-lite/" + google-query: inurl:"/wp-content/plugins/dp-maintenance-mode-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dp-maintenance-mode-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dp-maintenance-mode-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dp-maintenance-mode-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dpt-oauth-client-809d63af1f69964de8a6d451fb63eac3.yaml b/nuclei-templates/cve-less/plugins/dpt-oauth-client-809d63af1f69964de8a6d451fb63eac3.yaml new file mode 100644 index 0000000000..85225e8763 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dpt-oauth-client-809d63af1f69964de8a6d451fb63eac3.yaml @@ -0,0 +1,58 @@ +id: dpt-oauth-client-809d63af1f69964de8a6d451fb63eac3 + +info: + name: > + OAuth Client by DigitialPixies <= 1.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c643074-d57e-4878-b61d-2790ce9dadaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dpt-oauth-client/" + google-query: inurl:"/wp-content/plugins/dpt-oauth-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dpt-oauth-client,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dpt-oauth-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dpt-oauth-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dpt-oauth-client-c6fe3e98ca720b92fad33bdf271aacdd.yaml b/nuclei-templates/cve-less/plugins/dpt-oauth-client-c6fe3e98ca720b92fad33bdf271aacdd.yaml new file mode 100644 index 0000000000..c6d7accdbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dpt-oauth-client-c6fe3e98ca720b92fad33bdf271aacdd.yaml @@ -0,0 +1,58 @@ +id: dpt-oauth-client-c6fe3e98ca720b92fad33bdf271aacdd + +info: + name: > + OAuth Client by DigitialPixies <= 1.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb4d6d2c-a69d-492e-a2d5-fabfaef82f68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dpt-oauth-client/" + google-query: inurl:"/wp-content/plugins/dpt-oauth-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dpt-oauth-client,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dpt-oauth-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dpt-oauth-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dracula-dark-mode-e474bd135ff4b7c6170c11705966b7d8.yaml b/nuclei-templates/cve-less/plugins/dracula-dark-mode-e474bd135ff4b7c6170c11705966b7d8.yaml new file mode 100644 index 0000000000..64a98aa7a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dracula-dark-mode-e474bd135ff4b7c6170c11705966b7d8.yaml @@ -0,0 +1,58 @@ +id: dracula-dark-mode-e474bd135ff4b7c6170c11705966b7d8 + +info: + name: > + Dracula Dark Mode - The Revolutionary Dark Mode Plugin For WordPress <= 1.0.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb2918c4-b9b5-4cc3-a4fa-625944984a20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dracula-dark-mode/" + google-query: inurl:"/wp-content/plugins/dracula-dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dracula-dark-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dracula-dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dracula-dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-form-builder-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-form-builder-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3c876dcdb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-form-builder-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-form-builder-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-form-builder-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-form-builder-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-form-builder-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-form-builder-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-form-builder-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-0ef90759a645e5a0a85f1ab3e04c6459.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-0ef90759a645e5a0a85f1ab3e04c6459.yaml new file mode 100644 index 0000000000..d87ce88da6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-0ef90759a645e5a0a85f1ab3e04c6459.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-contact-form-7-0ef90759a645e5a0a85f1ab3e04c6459 + +info: + name: > + Drag and Drop Multiple File Upload – Contact Form 7 <= 1.3.6.4 - File Upload Size Limit Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fd46539-a55e-45ab-93b2-6a1703a91271?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-contact-form-7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-230e494196dc43c26e1062437fc400cf.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-230e494196dc43c26e1062437fc400cf.yaml new file mode 100644 index 0000000000..18c0802cb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-230e494196dc43c26e1062437fc400cf.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-contact-form-7-230e494196dc43c26e1062437fc400cf + +info: + name: > + Drag and Drop Multiple File Upload - Contact Form 7 <= 1.3.7.3 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b3be300-5b7f-4844-8637-1bb8c939ed4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-contact-form-7,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-3a4354d7b58ccedc4bd821a299d4d814.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-3a4354d7b58ccedc4bd821a299d4d814.yaml new file mode 100644 index 0000000000..05e0aab4da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-3a4354d7b58ccedc4bd821a299d4d814.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-contact-form-7-3a4354d7b58ccedc4bd821a299d4d814 + +info: + name: > + Drag and Drop Multiple File Upload - Contact Form 7 <= 1.3.6.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbaba6cb-a829-4c07-b068-bdcb6a646450?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-7e7eb2b24e63bfc8cd18835a55a41f43.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-7e7eb2b24e63bfc8cd18835a55a41f43.yaml new file mode 100644 index 0000000000..f2a4eab5c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-7e7eb2b24e63bfc8cd18835a55a41f43.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-contact-form-7-7e7eb2b24e63bfc8cd18835a55a41f43 + +info: + name: > + Drag and Drop Multiple File Upload - Contact Form 7 <= 1.3.3.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/023910d0-c2eb-41cd-9d42-606c4cbb8059?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-contact-form-7,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-c5b846fbda39bbc2b213c6450fb38da1.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-c5b846fbda39bbc2b213c6450fb38da1.yaml new file mode 100644 index 0000000000..e5e2e2bf52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-c5b846fbda39bbc2b213c6450fb38da1.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-contact-form-7-c5b846fbda39bbc2b213c6450fb38da1 + +info: + name: > + Drag and Drop Multiple File Upload – Contact Form 7 <= 1.3.6.5 - Cross-Site Request Forgery in dnd_upload_cf7_upload and dnd_codedropz_upload_delete + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8b1015f-6825-4813-b5db-71f1c1e88310?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-dfa883323c53046606f4e4db00277596.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-dfa883323c53046606f4e4db00277596.yaml new file mode 100644 index 0000000000..e3c57822ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-contact-form-7-dfa883323c53046606f4e4db00277596.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-contact-form-7-dfa883323c53046606f4e4db00277596 + +info: + name: > + Drag and Drop Multiple File Upload – Contact Form 7 <= 1.3.7.7 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/153cb585-4eea-4959-85b1-2487be11f116?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-contact-form-7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-0921939ba9d36b3bc7ef6782c794b5c5.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-0921939ba9d36b3bc7ef6782c794b5c5.yaml new file mode 100644 index 0000000000..3ea68da732 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-0921939ba9d36b3bc7ef6782c794b5c5.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-for-woocommerce-0921939ba9d36b3bc7ef6782c794b5c5 + +info: + name: > + Drag and Drop Multiple File Upload for WooCommerce <= 1.0.8 - Missing Authorization in upload and delete_file + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1baa7b7a-49b5-48bd-b45f-31fae707c199?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-7ae73592996d92a88095adedd13bc8f2.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-7ae73592996d92a88095adedd13bc8f2.yaml new file mode 100644 index 0000000000..56c3d60bc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-7ae73592996d92a88095adedd13bc8f2.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-for-woocommerce-7ae73592996d92a88095adedd13bc8f2 + +info: + name: > + Drag and Drop Multiple File Upload for WooCommerce <= 1.0.8 - Cross-Site Request Forgery in upload and delete_file + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7087221f-c092-4803-8725-687ffbbbd941?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-b6756a6cb324fb647e3fbdda3c2bb0bf.yaml b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-b6756a6cb324fb647e3fbdda3c2bb0bf.yaml new file mode 100644 index 0000000000..cac2b2b7b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-and-drop-multiple-file-upload-for-woocommerce-b6756a6cb324fb647e3fbdda3c2bb0bf.yaml @@ -0,0 +1,58 @@ +id: drag-and-drop-multiple-file-upload-for-woocommerce-b6756a6cb324fb647e3fbdda3c2bb0bf + +info: + name: > + Drag and Drop Multiple File Upload for WooCommerce <= 1.1.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abc8ee11-c149-4a2b-a388-7bd234c2cc64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-and-drop-multiple-file-upload-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-and-drop-multiple-file-upload-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-n-drop-upload-cf7-pro-538294a6deb271080d96f98811f3c4f6.yaml b/nuclei-templates/cve-less/plugins/drag-n-drop-upload-cf7-pro-538294a6deb271080d96f98811f3c4f6.yaml new file mode 100644 index 0000000000..3950d2817d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-n-drop-upload-cf7-pro-538294a6deb271080d96f98811f3c4f6.yaml @@ -0,0 +1,58 @@ +id: drag-n-drop-upload-cf7-pro-538294a6deb271080d96f98811f3c4f6 + +info: + name: > + Drag and Drop Multiple File Upload PRO <= 2.10.9 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1add47ea-6a7b-443a-b31d-3bb6c0d5d72d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-n-drop-upload-cf7-pro/" + google-query: inurl:"/wp-content/plugins/drag-n-drop-upload-cf7-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-n-drop-upload-cf7-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-n-drop-upload-cf7-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-n-drop-upload-cf7-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drag-n-drop-upload-cf7-pro-a9a7c8e5b6f35ebf19a42e787080a55e.yaml b/nuclei-templates/cve-less/plugins/drag-n-drop-upload-cf7-pro-a9a7c8e5b6f35ebf19a42e787080a55e.yaml new file mode 100644 index 0000000000..f8c05bc63d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drag-n-drop-upload-cf7-pro-a9a7c8e5b6f35ebf19a42e787080a55e.yaml @@ -0,0 +1,58 @@ +id: drag-n-drop-upload-cf7-pro-a9a7c8e5b6f35ebf19a42e787080a55e + +info: + name: > + Drag and Drop Multiple File Upload PRO - Contact Form 7 Standard <= 5.0.6.3 and <= 2.11.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60ae8b8f-bc65-40df-b6ae-4ec8e328dbe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drag-n-drop-upload-cf7-pro/" + google-query: inurl:"/wp-content/plugins/drag-n-drop-upload-cf7-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drag-n-drop-upload-cf7-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drag-n-drop-upload-cf7-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drag-n-drop-upload-cf7-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 5.0', '<= 5.0.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dragfy-addons-for-elementor-93d3ba9b108e1112ee15e322299a4fea.yaml b/nuclei-templates/cve-less/plugins/dragfy-addons-for-elementor-93d3ba9b108e1112ee15e322299a4fea.yaml new file mode 100644 index 0000000000..70c53c3eee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dragfy-addons-for-elementor-93d3ba9b108e1112ee15e322299a4fea.yaml @@ -0,0 +1,58 @@ +id: dragfy-addons-for-elementor-93d3ba9b108e1112ee15e322299a4fea + +info: + name: > + Dragfy Addons for Elementor <= 1.0.2 - Missing Authorization via save_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7caaaaef-075b-44f6-8809-a02d5f034f26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dragfy-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/dragfy-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dragfy-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dragfy-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dragfy-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/draw-attention-02fac00b4da69e9fe78fc7130f860fe9.yaml b/nuclei-templates/cve-less/plugins/draw-attention-02fac00b4da69e9fe78fc7130f860fe9.yaml new file mode 100644 index 0000000000..d022abd11b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/draw-attention-02fac00b4da69e9fe78fc7130f860fe9.yaml @@ -0,0 +1,58 @@ +id: draw-attention-02fac00b4da69e9fe78fc7130f860fe9 + +info: + name: > + Draw Attention <= 2.0.11 - Missing Authorization to Arbitrary Post Featured Image Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18530601-a294-448c-a1b2-c3995f9042ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/draw-attention/" + google-query: inurl:"/wp-content/plugins/draw-attention/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,draw-attention,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/draw-attention/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "draw-attention" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/draw-attention-791dd23f996b2b0738face7fcbca2b1b.yaml b/nuclei-templates/cve-less/plugins/draw-attention-791dd23f996b2b0738face7fcbca2b1b.yaml new file mode 100644 index 0000000000..8b2da6300f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/draw-attention-791dd23f996b2b0738face7fcbca2b1b.yaml @@ -0,0 +1,58 @@ +id: draw-attention-791dd23f996b2b0738face7fcbca2b1b + +info: + name: > + Draw Attention <= 2.0.15 - Improper Access Control via register_cpt + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d635669-ee85-4fb5-8238-3edb3bbb8fb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/draw-attention/" + google-query: inurl:"/wp-content/plugins/draw-attention/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,draw-attention,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/draw-attention/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "draw-attention" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drawblog-ae76e34d6e644abc4667be59d0e2e0dc.yaml b/nuclei-templates/cve-less/plugins/drawblog-ae76e34d6e644abc4667be59d0e2e0dc.yaml new file mode 100644 index 0000000000..7453031b69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drawblog-ae76e34d6e644abc4667be59d0e2e0dc.yaml @@ -0,0 +1,58 @@ +id: drawblog-ae76e34d6e644abc4667be59d0e2e0dc + +info: + name: > + DrawBlog <= 0.90 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fde163fa-2dbf-43bc-8edc-cbbab2a35bd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drawblog/" + google-query: inurl:"/wp-content/plugins/drawblog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drawblog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drawblog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drawblog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.90') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drawblog-d1894aa72265b74c9b59e10ca93f4375.yaml b/nuclei-templates/cve-less/plugins/drawblog-d1894aa72265b74c9b59e10ca93f4375.yaml new file mode 100644 index 0000000000..ce5beed768 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drawblog-d1894aa72265b74c9b59e10ca93f4375.yaml @@ -0,0 +1,58 @@ +id: drawblog-d1894aa72265b74c9b59e10ca93f4375 + +info: + name: > + DrawBlog < 0.81 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05448e64-6179-4409-a197-7cdc3c4f1563?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drawblog/" + google-query: inurl:"/wp-content/plugins/drawblog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drawblog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drawblog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drawblog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drawit-697b1f32d4ef6920c80a41e74d1c7116.yaml b/nuclei-templates/cve-less/plugins/drawit-697b1f32d4ef6920c80a41e74d1c7116.yaml new file mode 100644 index 0000000000..fa0658be6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drawit-697b1f32d4ef6920c80a41e74d1c7116.yaml @@ -0,0 +1,58 @@ +id: drawit-697b1f32d4ef6920c80a41e74d1c7116 + +info: + name: > + DrawIt (draw.io) <= 1.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddde9db5-3ed7-42f7-97c1-4ff9b9d1f627?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drawit/" + google-query: inurl:"/wp-content/plugins/drawit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drawit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drawit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drawit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dreamgrow-scroll-triggered-box-b33caca512f21869a1112d26d070a67d.yaml b/nuclei-templates/cve-less/plugins/dreamgrow-scroll-triggered-box-b33caca512f21869a1112d26d070a67d.yaml new file mode 100644 index 0000000000..e2614141ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dreamgrow-scroll-triggered-box-b33caca512f21869a1112d26d070a67d.yaml @@ -0,0 +1,58 @@ +id: dreamgrow-scroll-triggered-box-b33caca512f21869a1112d26d070a67d + +info: + name: > + Scroll Triggered Box <= 2.3 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b92c3d68-2e3e-4500-8da9-f89373126445?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dreamgrow-scroll-triggered-box/" + google-query: inurl:"/wp-content/plugins/dreamgrow-scroll-triggered-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dreamgrow-scroll-triggered-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dreamgrow-scroll-triggered-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dreamgrow-scroll-triggered-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drip-feed-content-extended-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/drip-feed-content-extended-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..47d5c5439e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drip-feed-content-extended-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: drip-feed-content-extended-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drip-feed-content-extended-for-learndash/" + google-query: inurl:"/wp-content/plugins/drip-feed-content-extended-for-learndash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drip-feed-content-extended-for-learndash,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drip-feed-content-extended-for-learndash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drip-feed-content-extended-for-learndash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/droit-dark-mode-8fff7b43d5e853aae2c55c13111f8f63.yaml b/nuclei-templates/cve-less/plugins/droit-dark-mode-8fff7b43d5e853aae2c55c13111f8f63.yaml new file mode 100644 index 0000000000..a39c88ed44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/droit-dark-mode-8fff7b43d5e853aae2c55c13111f8f63.yaml @@ -0,0 +1,58 @@ +id: droit-dark-mode-8fff7b43d5e853aae2c55c13111f8f63 + +info: + name: > + Droit Dark Mode <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3afaa85-9eb5-4cc4-883a-11d42504a8e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/droit-dark-mode/" + google-query: inurl:"/wp-content/plugins/droit-dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,droit-dark-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/droit-dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "droit-dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/droit-elementor-addons-b0e1b65089f5019f1d7bcee627168a5a.yaml b/nuclei-templates/cve-less/plugins/droit-elementor-addons-b0e1b65089f5019f1d7bcee627168a5a.yaml new file mode 100644 index 0000000000..e835ccd959 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/droit-elementor-addons-b0e1b65089f5019f1d7bcee627168a5a.yaml @@ -0,0 +1,58 @@ +id: droit-elementor-addons-b0e1b65089f5019f1d7bcee627168a5a + +info: + name: > + Droit Elementor Addons <= 3.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b49fd1-2d1e-4083-bc1d-010a9c8f4c2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/droit-elementor-addons/" + google-query: inurl:"/wp-content/plugins/droit-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,droit-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/droit-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "droit-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/droit-elementor-addons-e42d0569342324174ad2b7b5b34acfd1.yaml b/nuclei-templates/cve-less/plugins/droit-elementor-addons-e42d0569342324174ad2b7b5b34acfd1.yaml new file mode 100644 index 0000000000..729b7428e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/droit-elementor-addons-e42d0569342324174ad2b7b5b34acfd1.yaml @@ -0,0 +1,58 @@ +id: droit-elementor-addons-e42d0569342324174ad2b7b5b34acfd1 + +info: + name: > + Droit Elementor Addons – Widgets, Blocks, Templates Library For Elementor Builder <= 3.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed0a9db6-24bd-48ba-befa-ce537304ab52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/droit-elementor-addons/" + google-query: inurl:"/wp-content/plugins/droit-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,droit-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/droit-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "droit-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drop-shadow-boxes-7907c4688f5f43998579c328082a69f9.yaml b/nuclei-templates/cve-less/plugins/drop-shadow-boxes-7907c4688f5f43998579c328082a69f9.yaml new file mode 100644 index 0000000000..e5e7f44a6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drop-shadow-boxes-7907c4688f5f43998579c328082a69f9.yaml @@ -0,0 +1,58 @@ +id: drop-shadow-boxes-7907c4688f5f43998579c328082a69f9 + +info: + name: > + Drop Shadow Boxes <= 1.7.13 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0b3911c-a960-4f28-b289-389b26282741?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drop-shadow-boxes/" + google-query: inurl:"/wp-content/plugins/drop-shadow-boxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drop-shadow-boxes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drop-shadow-boxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drop-shadow-boxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drop-shadow-boxes-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/drop-shadow-boxes-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c467235074 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drop-shadow-boxes-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: drop-shadow-boxes-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drop-shadow-boxes/" + google-query: inurl:"/wp-content/plugins/drop-shadow-boxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drop-shadow-boxes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drop-shadow-boxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drop-shadow-boxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drop-shadow-boxes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/drop-shadow-boxes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..05e23e5234 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drop-shadow-boxes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: drop-shadow-boxes-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drop-shadow-boxes/" + google-query: inurl:"/wp-content/plugins/drop-shadow-boxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drop-shadow-boxes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drop-shadow-boxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drop-shadow-boxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drop-shadow-boxes-e9fd5a8f4cb940c05dfbd60e736ab50a.yaml b/nuclei-templates/cve-less/plugins/drop-shadow-boxes-e9fd5a8f4cb940c05dfbd60e736ab50a.yaml new file mode 100644 index 0000000000..fc260b95e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drop-shadow-boxes-e9fd5a8f4cb940c05dfbd60e736ab50a.yaml @@ -0,0 +1,58 @@ +id: drop-shadow-boxes-e9fd5a8f4cb940c05dfbd60e736ab50a + +info: + name: > + Drop Shadow Boxes <= 1.7.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f2b4ac7-f888-408b-a77a-bd73ac8e967d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drop-shadow-boxes/" + google-query: inurl:"/wp-content/plugins/drop-shadow-boxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drop-shadow-boxes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drop-shadow-boxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drop-shadow-boxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropbox-folder-share-0508c37bf22986b5e27ea5c3d8bc9c4d.yaml b/nuclei-templates/cve-less/plugins/dropbox-folder-share-0508c37bf22986b5e27ea5c3d8bc9c4d.yaml new file mode 100644 index 0000000000..17ea678a2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropbox-folder-share-0508c37bf22986b5e27ea5c3d8bc9c4d.yaml @@ -0,0 +1,58 @@ +id: dropbox-folder-share-0508c37bf22986b5e27ea5c3d8bc9c4d + +info: + name: > + Dropbox Folder Share <= 1.9.7 - Unauthenticated Server-Side Request Forgery via 'link' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d62bd2bd-db01-479f-89e4-8031d69a912f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropbox-folder-share/" + google-query: inurl:"/wp-content/plugins/dropbox-folder-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropbox-folder-share,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropbox-folder-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropbox-folder-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropbox-folder-share-fc82d74dbac5a3353b964b24a832d1d9.yaml b/nuclei-templates/cve-less/plugins/dropbox-folder-share-fc82d74dbac5a3353b964b24a832d1d9.yaml new file mode 100644 index 0000000000..d7a7f953b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropbox-folder-share-fc82d74dbac5a3353b964b24a832d1d9.yaml @@ -0,0 +1,58 @@ +id: dropbox-folder-share-fc82d74dbac5a3353b964b24a832d1d9 + +info: + name: > + Dropbox Folder Share <= 1.9.7 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/647a2f27-092a-4db1-932d-87ae8c2efcca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropbox-folder-share/" + google-query: inurl:"/wp-content/plugins/dropbox-folder-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropbox-folder-share,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropbox-folder-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropbox-folder-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropdown-and-scrollable-text-10e7110787ae61a1849daa9fe6489aae.yaml b/nuclei-templates/cve-less/plugins/dropdown-and-scrollable-text-10e7110787ae61a1849daa9fe6489aae.yaml new file mode 100644 index 0000000000..79fc1ebde8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropdown-and-scrollable-text-10e7110787ae61a1849daa9fe6489aae.yaml @@ -0,0 +1,58 @@ +id: dropdown-and-scrollable-text-10e7110787ae61a1849daa9fe6489aae + +info: + name: > + Dropdown and scrollable Text <= 2.0 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/586c8952-a427-47f8-8d2d-117e527b0f74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropdown-and-scrollable-text/" + google-query: inurl:"/wp-content/plugins/dropdown-and-scrollable-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropdown-and-scrollable-text,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropdown-and-scrollable-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropdown-and-scrollable-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropdown-and-scrollable-text-746ab5fca61ed161758f284f4d55f254.yaml b/nuclei-templates/cve-less/plugins/dropdown-and-scrollable-text-746ab5fca61ed161758f284f4d55f254.yaml new file mode 100644 index 0000000000..71f849362d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropdown-and-scrollable-text-746ab5fca61ed161758f284f4d55f254.yaml @@ -0,0 +1,58 @@ +id: dropdown-and-scrollable-text-746ab5fca61ed161758f284f4d55f254 + +info: + name: > + Dropdown and scrollable Text <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8cf9350-d207-49ae-865a-b2e016b41b55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropdown-and-scrollable-text/" + google-query: inurl:"/wp-content/plugins/dropdown-and-scrollable-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropdown-and-scrollable-text,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropdown-and-scrollable-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropdown-and-scrollable-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropdown-menu-widget-16dc3f3aa085dd7f2e3dfd536ed2021e.yaml b/nuclei-templates/cve-less/plugins/dropdown-menu-widget-16dc3f3aa085dd7f2e3dfd536ed2021e.yaml new file mode 100644 index 0000000000..a98abbb98d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropdown-menu-widget-16dc3f3aa085dd7f2e3dfd536ed2021e.yaml @@ -0,0 +1,58 @@ +id: dropdown-menu-widget-16dc3f3aa085dd7f2e3dfd536ed2021e + +info: + name: > + Dropdown Menu Widget <= 1.9.7 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f18437c-2258-4f5b-a114-fb099f115f2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropdown-menu-widget/" + google-query: inurl:"/wp-content/plugins/dropdown-menu-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropdown-menu-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropdown-menu-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropdown-menu-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropdown-menu-widget-831ca3a67ae53eee79512c998867b523.yaml b/nuclei-templates/cve-less/plugins/dropdown-menu-widget-831ca3a67ae53eee79512c998867b523.yaml new file mode 100644 index 0000000000..872bd5e16f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropdown-menu-widget-831ca3a67ae53eee79512c998867b523.yaml @@ -0,0 +1,58 @@ +id: dropdown-menu-widget-831ca3a67ae53eee79512c998867b523 + +info: + name: > + Dropdown Menu Widget <= 1.9.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66b86375-81e3-4ac8-90e3-8ae34c28c1c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropdown-menu-widget/" + google-query: inurl:"/wp-content/plugins/dropdown-menu-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropdown-menu-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropdown-menu-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropdown-menu-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropdown-menu-widget-9ca1c6bce5ebff9e9681d52ce2748227.yaml b/nuclei-templates/cve-less/plugins/dropdown-menu-widget-9ca1c6bce5ebff9e9681d52ce2748227.yaml new file mode 100644 index 0000000000..e701c80576 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropdown-menu-widget-9ca1c6bce5ebff9e9681d52ce2748227.yaml @@ -0,0 +1,58 @@ +id: dropdown-menu-widget-9ca1c6bce5ebff9e9681d52ce2748227 + +info: + name: > + Dropdown Menu Widget <= 1.9.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c6e9884-0b60-4ea8-b042-55cf0fb6a6d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropdown-menu-widget/" + google-query: inurl:"/wp-content/plugins/dropdown-menu-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropdown-menu-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropdown-menu-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropdown-menu-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropdown-multisite-selector-7156ef80890822c55e70bd957b9a6411.yaml b/nuclei-templates/cve-less/plugins/dropdown-multisite-selector-7156ef80890822c55e70bd957b9a6411.yaml new file mode 100644 index 0000000000..e6cdc0886e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropdown-multisite-selector-7156ef80890822c55e70bd957b9a6411.yaml @@ -0,0 +1,58 @@ +id: dropdown-multisite-selector-7156ef80890822c55e70bd957b9a6411 + +info: + name: > + Dropdown Multisite selector <= 0.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/212e33f8-438b-4781-913f-a4f9f6d24a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropdown-multisite-selector/" + google-query: inurl:"/wp-content/plugins/dropdown-multisite-selector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropdown-multisite-selector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropdown-multisite-selector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropdown-multisite-selector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dropshipping-xox-e89dd0c73fdc543da4d63a7803ee9a97.yaml b/nuclei-templates/cve-less/plugins/dropshipping-xox-e89dd0c73fdc543da4d63a7803ee9a97.yaml new file mode 100644 index 0000000000..ade403f150 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dropshipping-xox-e89dd0c73fdc543da4d63a7803ee9a97.yaml @@ -0,0 +1,58 @@ +id: dropshipping-xox-e89dd0c73fdc543da4d63a7803ee9a97 + +info: + name: > + Dropshix < 4.0.14 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0999244-4097-4e8c-8f7e-4accd7727d69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dropshipping-xox/" + google-query: inurl:"/wp-content/plugins/dropshipping-xox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dropshipping-xox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dropshipping-xox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dropshipping-xox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/drug-search-62dc43c109e10a4fb2083be6c80b9766.yaml b/nuclei-templates/cve-less/plugins/drug-search-62dc43c109e10a4fb2083be6c80b9766.yaml new file mode 100644 index 0000000000..7b10a45aa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/drug-search-62dc43c109e10a4fb2083be6c80b9766.yaml @@ -0,0 +1,58 @@ +id: drug-search-62dc43c109e10a4fb2083be6c80b9766 + +info: + name: > + Zebra_Form PHP library <= 2.9.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4ea0a8-d2f6-4209-b17f-0a26ba664c63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/drug-search/" + google-query: inurl:"/wp-content/plugins/drug-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,drug-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/drug-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "drug-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ds-suit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ds-suit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..847d24401f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ds-suit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ds-suit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ds-suit/" + google-query: inurl:"/wp-content/plugins/ds-suit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ds-suit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ds-suit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ds-suit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-1a5f08a913b9e66bca4a1d7c16d1cb52.yaml b/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-1a5f08a913b9e66bca4a1d7c16d1cb52.yaml new file mode 100644 index 0000000000..679dc31748 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-1a5f08a913b9e66bca4a1d7c16d1cb52.yaml @@ -0,0 +1,58 @@ +id: dsgvo-all-in-one-for-wp-1a5f08a913b9e66bca4a1d7c16d1cb52 + +info: + name: > + DSGVO All in one for WP <= 4.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05fe1929-9e39-4b2f-a3fc-e692267d731b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dsgvo-all-in-one-for-wp/" + google-query: inurl:"/wp-content/plugins/dsgvo-all-in-one-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dsgvo-all-in-one-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dsgvo-all-in-one-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dsgvo-all-in-one-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-295363837d1454c8802423d79b02460d.yaml b/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-295363837d1454c8802423d79b02460d.yaml new file mode 100644 index 0000000000..acdaca101b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-295363837d1454c8802423d79b02460d.yaml @@ -0,0 +1,58 @@ +id: dsgvo-all-in-one-for-wp-295363837d1454c8802423d79b02460d + +info: + name: > + DSGVO All in one for WP <= 3.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac7aca5f-657d-45a9-bb10-f3e75dc3eeba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dsgvo-all-in-one-for-wp/" + google-query: inurl:"/wp-content/plugins/dsgvo-all-in-one-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dsgvo-all-in-one-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dsgvo-all-in-one-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dsgvo-all-in-one-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-b82caad6c0c8bf440388b6328560de71.yaml b/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-b82caad6c0c8bf440388b6328560de71.yaml new file mode 100644 index 0000000000..f044d472c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dsgvo-all-in-one-for-wp-b82caad6c0c8bf440388b6328560de71.yaml @@ -0,0 +1,58 @@ +id: dsgvo-all-in-one-for-wp-b82caad6c0c8bf440388b6328560de71 + +info: + name: > + DSGVO All in one for WP <= 4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f31a42c1-afb7-4a44-b4e8-f68c622bc43e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dsgvo-all-in-one-for-wp/" + google-query: inurl:"/wp-content/plugins/dsgvo-all-in-one-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dsgvo-all-in-one-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dsgvo-all-in-one-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dsgvo-all-in-one-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dsgvo-youtube-eeffd2576729af4c20ea0d0989cea07e.yaml b/nuclei-templates/cve-less/plugins/dsgvo-youtube-eeffd2576729af4c20ea0d0989cea07e.yaml new file mode 100644 index 0000000000..bf6955cfc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dsgvo-youtube-eeffd2576729af4c20ea0d0989cea07e.yaml @@ -0,0 +1,58 @@ +id: dsgvo-youtube-eeffd2576729af4c20ea0d0989cea07e + +info: + name: > + DSGVO Youtube <= 1.4.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c9cc5d4-7ddc-4af7-b433-7d75db739970?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dsgvo-youtube/" + google-query: inurl:"/wp-content/plugins/dsgvo-youtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dsgvo-youtube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dsgvo-youtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dsgvo-youtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dsidxpress-d1ad636a904712d275c068316d9921ca.yaml b/nuclei-templates/cve-less/plugins/dsidxpress-d1ad636a904712d275c068316d9921ca.yaml new file mode 100644 index 0000000000..54d610fbf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dsidxpress-d1ad636a904712d275c068316d9921ca.yaml @@ -0,0 +1,58 @@ +id: dsidxpress-d1ad636a904712d275c068316d9921ca + +info: + name: > + dsIDXpress < 2.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8d67bc0-8c21-43e8-bdcc-1235eca94fa7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dsidxpress/" + google-query: inurl:"/wp-content/plugins/dsidxpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dsidxpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dsidxpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dsidxpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dsp_dating-98886bf050f4aa01cda5000bdbc8e584.yaml b/nuclei-templates/cve-less/plugins/dsp_dating-98886bf050f4aa01cda5000bdbc8e584.yaml new file mode 100644 index 0000000000..74687bd0c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dsp_dating-98886bf050f4aa01cda5000bdbc8e584.yaml @@ -0,0 +1,58 @@ +id: dsp_dating-98886bf050f4aa01cda5000bdbc8e584 + +info: + name: > + WPDating <= 7.4.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74ee6bf0-7091-40b8-a3e7-9ba1411b7ea4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dsp_dating/" + google-query: inurl:"/wp-content/plugins/dsp_dating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dsp_dating,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dsp_dating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dsp_dating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dsp_dating-a4b85243ad36c1329732b5275f246278.yaml b/nuclei-templates/cve-less/plugins/dsp_dating-a4b85243ad36c1329732b5275f246278.yaml new file mode 100644 index 0000000000..5f8486da27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dsp_dating-a4b85243ad36c1329732b5275f246278.yaml @@ -0,0 +1,58 @@ +id: dsp_dating-a4b85243ad36c1329732b5275f246278 + +info: + name: > + WPDating <= 7.4.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79ef7b33-ea6b-4cf2-bed4-8177927ab650?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dsp_dating/" + google-query: inurl:"/wp-content/plugins/dsp_dating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dsp_dating,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dsp_dating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dsp_dating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dssearchagent-wordpress-edition-42d462182add4a54a9067be955a98019.yaml b/nuclei-templates/cve-less/plugins/dssearchagent-wordpress-edition-42d462182add4a54a9067be955a98019.yaml new file mode 100644 index 0000000000..11abc48279 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dssearchagent-wordpress-edition-42d462182add4a54a9067be955a98019.yaml @@ -0,0 +1,58 @@ +id: dssearchagent-wordpress-edition-42d462182add4a54a9067be955a98019 + +info: + name: > + dsSearchAgent: WordPress Edition <= 1.0-beta10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c7b4263-0c7b-4a1a-b168-88e6591c82bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dssearchagent-wordpress-edition/" + google-query: inurl:"/wp-content/plugins/dssearchagent-wordpress-edition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dssearchagent-wordpress-edition,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dssearchagent-wordpress-edition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dssearchagent-wordpress-edition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0-beta10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dsubscribers-58dabace517bb3fd14d9bc2e6628a726.yaml b/nuclei-templates/cve-less/plugins/dsubscribers-58dabace517bb3fd14d9bc2e6628a726.yaml new file mode 100644 index 0000000000..234ef719f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dsubscribers-58dabace517bb3fd14d9bc2e6628a726.yaml @@ -0,0 +1,58 @@ +id: dsubscribers-58dabace517bb3fd14d9bc2e6628a726 + +info: + name: > + DSubscribers < 1.2.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e604d56-572f-4d60-b5ad-14c02ba9cc94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dsubscribers/" + google-query: inurl:"/wp-content/plugins/dsubscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dsubscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dsubscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dsubscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dtabs-bdf306cf1fa53c2e200c922d232a9b13.yaml b/nuclei-templates/cve-less/plugins/dtabs-bdf306cf1fa53c2e200c922d232a9b13.yaml new file mode 100644 index 0000000000..aab1887d23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dtabs-bdf306cf1fa53c2e200c922d232a9b13.yaml @@ -0,0 +1,58 @@ +id: dtabs-bdf306cf1fa53c2e200c922d232a9b13 + +info: + name: > + dTabs <= 1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b847d10d-254b-40e5-b5f9-1391834d63b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dtabs/" + google-query: inurl:"/wp-content/plugins/dtabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dtabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dtabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dtabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dtracker-53b973a947651cec1a2155ab2e3c223a.yaml b/nuclei-templates/cve-less/plugins/dtracker-53b973a947651cec1a2155ab2e3c223a.yaml new file mode 100644 index 0000000000..ca763016e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dtracker-53b973a947651cec1a2155ab2e3c223a.yaml @@ -0,0 +1,58 @@ +id: dtracker-53b973a947651cec1a2155ab2e3c223a + +info: + name: > + DTracker <= 1.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03b9187e-022a-48c1-a79c-c4629357de5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dtracker/" + google-query: inurl:"/wp-content/plugins/dtracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dtracker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dtracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dtracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dtracker-78c62de2a8f7c6f108d2de7498401127.yaml b/nuclei-templates/cve-less/plugins/dtracker-78c62de2a8f7c6f108d2de7498401127.yaml new file mode 100644 index 0000000000..7d3949f1f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dtracker-78c62de2a8f7c6f108d2de7498401127.yaml @@ -0,0 +1,58 @@ +id: dtracker-78c62de2a8f7c6f108d2de7498401127 + +info: + name: > + DTracker <= 1.5 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/907a02b8-6965-4d0b-b4bf-c8fc0201ee12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dtracker/" + google-query: inurl:"/wp-content/plugins/dtracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dtracker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dtracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dtracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dtracker-8fe2149458ea063852f82a98766c0a1b.yaml b/nuclei-templates/cve-less/plugins/dtracker-8fe2149458ea063852f82a98766c0a1b.yaml new file mode 100644 index 0000000000..13d737de55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dtracker-8fe2149458ea063852f82a98766c0a1b.yaml @@ -0,0 +1,58 @@ +id: dtracker-8fe2149458ea063852f82a98766c0a1b + +info: + name: > + Dtracker <= 1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f24db166-93d6-4a61-a8fe-455eebde0777?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dtracker/" + google-query: inurl:"/wp-content/plugins/dtracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dtracker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dtracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dtracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dtracker-e60c9facdf470d59f212ff7b56e40a91.yaml b/nuclei-templates/cve-less/plugins/dtracker-e60c9facdf470d59f212ff7b56e40a91.yaml new file mode 100644 index 0000000000..f86b8e9a3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dtracker-e60c9facdf470d59f212ff7b56e40a91.yaml @@ -0,0 +1,58 @@ +id: dtracker-e60c9facdf470d59f212ff7b56e40a91 + +info: + name: > + DTracker <= 1.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1782c82-bfdb-4104-a3f5-b1a07aede555?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dtracker/" + google-query: inurl:"/wp-content/plugins/dtracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dtracker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dtracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dtracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duitku-social-payment-gateway-3f2cad5626e189b4a9fbbf4f777a78e7.yaml b/nuclei-templates/cve-less/plugins/duitku-social-payment-gateway-3f2cad5626e189b4a9fbbf4f777a78e7.yaml new file mode 100644 index 0000000000..003713e778 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duitku-social-payment-gateway-3f2cad5626e189b4a9fbbf4f777a78e7.yaml @@ -0,0 +1,58 @@ +id: duitku-social-payment-gateway-3f2cad5626e189b4a9fbbf4f777a78e7 + +info: + name: > + Duitku Payment Gateway <= 2.11.6 - Missing Authorization via check_duitku_response + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a33de35f-1c9d-4fc9-9be8-0a1c7d9352ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duitku-social-payment-gateway/" + google-query: inurl:"/wp-content/plugins/duitku-social-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duitku-social-payment-gateway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duitku-social-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duitku-social-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dukapress-9517b97fe7566a06a9d352900cf24cf1.yaml b/nuclei-templates/cve-less/plugins/dukapress-9517b97fe7566a06a9d352900cf24cf1.yaml new file mode 100644 index 0000000000..280375ba8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dukapress-9517b97fe7566a06a9d352900cf24cf1.yaml @@ -0,0 +1,58 @@ +id: dukapress-9517b97fe7566a06a9d352900cf24cf1 + +info: + name: > + DukaPress < 2.5.4 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c226d83-2886-4b7c-978c-ad723709145f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dukapress/" + google-query: inurl:"/wp-content/plugins/dukapress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dukapress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dukapress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dukapress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dukapress-9c5144d0854754a379c2d4994fc71dd3.yaml b/nuclei-templates/cve-less/plugins/dukapress-9c5144d0854754a379c2d4994fc71dd3.yaml new file mode 100644 index 0000000000..02541b47ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dukapress-9c5144d0854754a379c2d4994fc71dd3.yaml @@ -0,0 +1,58 @@ +id: dukapress-9c5144d0854754a379c2d4994fc71dd3 + +info: + name: > + DukaPress <= 2.5.9 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d98d1782-a6cc-403a-b0fa-43282daa1136?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dukapress/" + google-query: inurl:"/wp-content/plugins/dukapress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dukapress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dukapress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dukapress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duofaq-responsive-flat-simple-faq-eb38ab4fa2ba998f57df5784c60738ed.yaml b/nuclei-templates/cve-less/plugins/duofaq-responsive-flat-simple-faq-eb38ab4fa2ba998f57df5784c60738ed.yaml new file mode 100644 index 0000000000..16039fbaea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duofaq-responsive-flat-simple-faq-eb38ab4fa2ba998f57df5784c60738ed.yaml @@ -0,0 +1,58 @@ +id: duofaq-responsive-flat-simple-faq-eb38ab4fa2ba998f57df5784c60738ed + +info: + name: > + duoFAQ - Responsive, Flat, Simple FAQ <= 1.4.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ba4e993-bf75-4570-bd9d-003339f4e214?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duofaq-responsive-flat-simple-faq/" + google-query: inurl:"/wp-content/plugins/duofaq-responsive-flat-simple-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duofaq-responsive-flat-simple-faq,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duofaq-responsive-flat-simple-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duofaq-responsive-flat-simple-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dupeoff-9a41ab0a37a3b754d3385603b40bbab6.yaml b/nuclei-templates/cve-less/plugins/dupeoff-9a41ab0a37a3b754d3385603b40bbab6.yaml new file mode 100644 index 0000000000..25ac08afcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dupeoff-9a41ab0a37a3b754d3385603b40bbab6.yaml @@ -0,0 +1,58 @@ +id: dupeoff-9a41ab0a37a3b754d3385603b40bbab6 + +info: + name: > + DupeOff <= 1.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e615833a-0408-4e39-b63d-075bff39a9bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dupeoff/" + google-query: inurl:"/wp-content/plugins/dupeoff/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dupeoff,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dupeoff/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dupeoff" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-page-2d87c0364307edea9fea6b2a2be6834f.yaml b/nuclei-templates/cve-less/plugins/duplicate-page-2d87c0364307edea9fea6b2a2be6834f.yaml new file mode 100644 index 0000000000..63c33b7216 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-page-2d87c0364307edea9fea6b2a2be6834f.yaml @@ -0,0 +1,58 @@ +id: duplicate-page-2d87c0364307edea9fea6b2a2be6834f + +info: + name: > + Duplicate Page Plugins <= (Various Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76044985-477c-4d62-aec3-1905add0a9e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-page/" + google-query: inurl:"/wp-content/plugins/duplicate-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-page,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-page-and-post-1de4b637fd30a0c0161a02bf0be995dc.yaml b/nuclei-templates/cve-less/plugins/duplicate-page-and-post-1de4b637fd30a0c0161a02bf0be995dc.yaml new file mode 100644 index 0000000000..ef9fb7267d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-page-and-post-1de4b637fd30a0c0161a02bf0be995dc.yaml @@ -0,0 +1,58 @@ +id: duplicate-page-and-post-1de4b637fd30a0c0161a02bf0be995dc + +info: + name: > + Duplicate Page and Post <= 2.1.1 - Malicious Backdoor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/113554f9-b8f0-4bdd-be90-0093fb520022?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-page-and-post/" + google-query: inurl:"/wp-content/plugins/duplicate-page-and-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-page-and-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-page-and-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-page-and-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-page-d66fba0caf4197da913cda06e8bae43e.yaml b/nuclei-templates/cve-less/plugins/duplicate-page-d66fba0caf4197da913cda06e8bae43e.yaml new file mode 100644 index 0000000000..e60b988ed7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-page-d66fba0caf4197da913cda06e8bae43e.yaml @@ -0,0 +1,58 @@ +id: duplicate-page-d66fba0caf4197da913cda06e8bae43e + +info: + name: > + Duplicate Page <= 4.4.1 Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43df6d4d-960e-4eb7-809b-684ba0d67f58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-page/" + google-query: inurl:"/wp-content/plugins/duplicate-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-page-fd184e22776918171b2daf7b166b3579.yaml b/nuclei-templates/cve-less/plugins/duplicate-page-fd184e22776918171b2daf7b166b3579.yaml new file mode 100644 index 0000000000..4d8a1ea70c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-page-fd184e22776918171b2daf7b166b3579.yaml @@ -0,0 +1,58 @@ +id: duplicate-page-fd184e22776918171b2daf7b166b3579 + +info: + name: > + Duplicate Page <= 3.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ed9a5df-90d0-4abe-be1c-49c50a6b48b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-page/" + google-query: inurl:"/wp-content/plugins/duplicate-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-page,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-page-or-post-b4ec89e0637e2a12e7606215722e4f54.yaml b/nuclei-templates/cve-less/plugins/duplicate-page-or-post-b4ec89e0637e2a12e7606215722e4f54.yaml new file mode 100644 index 0000000000..fddb4fe4ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-page-or-post-b4ec89e0637e2a12e7606215722e4f54.yaml @@ -0,0 +1,58 @@ +id: duplicate-page-or-post-b4ec89e0637e2a12e7606215722e4f54 + +info: + name: > + Duplicate Page or Post <= 1.5.0 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5182843b-03d0-4b0b-ba97-8e9602916c5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-page-or-post/" + google-query: inurl:"/wp-content/plugins/duplicate-page-or-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-page-or-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-page-or-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-page-or-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-post-11953d0632dfa94f70f928a189af1971.yaml b/nuclei-templates/cve-less/plugins/duplicate-post-11953d0632dfa94f70f928a189af1971.yaml new file mode 100644 index 0000000000..04c946813a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-post-11953d0632dfa94f70f928a189af1971.yaml @@ -0,0 +1,58 @@ +id: duplicate-post-11953d0632dfa94f70f928a189af1971 + +info: + name: > + Yoast Duplicate Post <= 2.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cefe584-c1b0-418c-bade-ca4092807b1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-post/" + google-query: inurl:"/wp-content/plugins/duplicate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-post,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-post-4fd25d208fa1eb71c396970325cd56c1.yaml b/nuclei-templates/cve-less/plugins/duplicate-post-4fd25d208fa1eb71c396970325cd56c1.yaml new file mode 100644 index 0000000000..ecd03ed48d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-post-4fd25d208fa1eb71c396970325cd56c1.yaml @@ -0,0 +1,58 @@ +id: duplicate-post-4fd25d208fa1eb71c396970325cd56c1 + +info: + name: > + Yoast Duplicate Post <= 2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68263c7d-6da0-46b2-bb78-45acf615359d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-post/" + google-query: inurl:"/wp-content/plugins/duplicate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-post-517e55dfe7f60b7457c238ed215d0a10.yaml b/nuclei-templates/cve-less/plugins/duplicate-post-517e55dfe7f60b7457c238ed215d0a10.yaml new file mode 100644 index 0000000000..e2f24455da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-post-517e55dfe7f60b7457c238ed215d0a10.yaml @@ -0,0 +1,58 @@ +id: duplicate-post-517e55dfe7f60b7457c238ed215d0a10 + +info: + name: > + Yoast Duplicate Post <= 3.2.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32272237-43c1-4b77-b586-9fad4af279e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-post/" + google-query: inurl:"/wp-content/plugins/duplicate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-post-page-menu-custom-post-type-373dd0a06bd13b32d55487814dbab124.yaml b/nuclei-templates/cve-less/plugins/duplicate-post-page-menu-custom-post-type-373dd0a06bd13b32d55487814dbab124.yaml new file mode 100644 index 0000000000..e7f0393bd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-post-page-menu-custom-post-type-373dd0a06bd13b32d55487814dbab124.yaml @@ -0,0 +1,58 @@ +id: duplicate-post-page-menu-custom-post-type-373dd0a06bd13b32d55487814dbab124 + +info: + name: > + Duplicate Post Page Menu & Custom Post Type <= 2.3.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44e84fd9-bc83-4780-ab7a-8898a8c5c78a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-post-page-menu-custom-post-type/" + google-query: inurl:"/wp-content/plugins/duplicate-post-page-menu-custom-post-type/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-post-page-menu-custom-post-type,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-post-page-menu-custom-post-type/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-post-page-menu-custom-post-type" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-post-page-menu-custom-post-type-87909a557eede328b649d626c4448f38.yaml b/nuclei-templates/cve-less/plugins/duplicate-post-page-menu-custom-post-type-87909a557eede328b649d626c4448f38.yaml new file mode 100644 index 0000000000..871264d54a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-post-page-menu-custom-post-type-87909a557eede328b649d626c4448f38.yaml @@ -0,0 +1,58 @@ +id: duplicate-post-page-menu-custom-post-type-87909a557eede328b649d626c4448f38 + +info: + name: > + Duplicate Post Page Menu & Custom Post Type <= 2.3.1 - Missing Authorization to Post Duplication + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6bb08e8-9ef5-41db-a111-c377a5dfae77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-post-page-menu-custom-post-type/" + google-query: inurl:"/wp-content/plugins/duplicate-post-page-menu-custom-post-type/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-post-page-menu-custom-post-type,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-post-page-menu-custom-post-type/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-post-page-menu-custom-post-type" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-theme-0924f82ec3f5be000a2e6547a544a598.yaml b/nuclei-templates/cve-less/plugins/duplicate-theme-0924f82ec3f5be000a2e6547a544a598.yaml new file mode 100644 index 0000000000..f7c6deb2b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-theme-0924f82ec3f5be000a2e6547a544a598.yaml @@ -0,0 +1,58 @@ +id: duplicate-theme-0924f82ec3f5be000a2e6547a544a598 + +info: + name: > + Duplicate Theme <= 0.1.6 - Cross-Site Request Forgery via themeDuplicationAction + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d93e0175-db55-42ab-8475-cd0f47e5dcbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-theme/" + google-query: inurl:"/wp-content/plugins/duplicate-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-theme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-variations-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/duplicate-variations-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3495ae2fd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-variations-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: duplicate-variations-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-variations-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/duplicate-variations-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-variations-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-variations-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-variations-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-2d87c0364307edea9fea6b2a2be6834f.yaml b/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-2d87c0364307edea9fea6b2a2be6834f.yaml new file mode 100644 index 0000000000..a89f27e40c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-2d87c0364307edea9fea6b2a2be6834f.yaml @@ -0,0 +1,58 @@ +id: duplicate-wp-page-post-2d87c0364307edea9fea6b2a2be6834f + +info: + name: > + Duplicate Page Plugins <= (Various Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76044985-477c-4d62-aec3-1905add0a9e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-wp-page-post/" + google-query: inurl:"/wp-content/plugins/duplicate-wp-page-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-wp-page-post,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-wp-page-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-wp-page-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-79f880a7e6c6b5f19edddfee4238c580.yaml b/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-79f880a7e6c6b5f19edddfee4238c580.yaml new file mode 100644 index 0000000000..51f65b1444 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-79f880a7e6c6b5f19edddfee4238c580.yaml @@ -0,0 +1,58 @@ +id: duplicate-wp-page-post-79f880a7e6c6b5f19edddfee4238c580 + +info: + name: > + Duplicate Page and Post <= 2.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad5a13d9-5ba4-4e66-8374-f45bcd6c716f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-wp-page-post/" + google-query: inurl:"/wp-content/plugins/duplicate-wp-page-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-wp-page-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-wp-page-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-wp-page-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-e4d1ad7c2888a8ba91b50fa79c134af9.yaml b/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-e4d1ad7c2888a8ba91b50fa79c134af9.yaml new file mode 100644 index 0000000000..0d5c822a6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicate-wp-page-post-e4d1ad7c2888a8ba91b50fa79c134af9.yaml @@ -0,0 +1,58 @@ +id: duplicate-wp-page-post-e4d1ad7c2888a8ba91b50fa79c134af9 + +info: + name: > + Duplicate Page and Post <= 2.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8ac3187-b065-434e-9051-d13330dd3da5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicate-wp-page-post/" + google-query: inurl:"/wp-content/plugins/duplicate-wp-page-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicate-wp-page-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicate-wp-page-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicate-wp-page-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-000a2d156aed05fdee1d26c9317df353.yaml b/nuclei-templates/cve-less/plugins/duplicator-000a2d156aed05fdee1d26c9317df353.yaml new file mode 100644 index 0000000000..0279839fdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-000a2d156aed05fdee1d26c9317df353.yaml @@ -0,0 +1,58 @@ +id: duplicator-000a2d156aed05fdee1d26c9317df353 + +info: + name: > + Duplicator < 1.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f753961-3eeb-402d-876f-4a4dea41a96a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-0244633df1d46b9b703b5c746fbc6e51.yaml b/nuclei-templates/cve-less/plugins/duplicator-0244633df1d46b9b703b5c746fbc6e51.yaml new file mode 100644 index 0000000000..e59c5b48b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-0244633df1d46b9b703b5c746fbc6e51.yaml @@ -0,0 +1,58 @@ +id: duplicator-0244633df1d46b9b703b5c746fbc6e51 + +info: + name: > + Duplicator – WordPress Migration Plugin <= 0.4.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b69831e-19ab-4812-b657-dc4febe15077?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-195b7c4b6c3a0504f0fb2ed5065020a7.yaml b/nuclei-templates/cve-less/plugins/duplicator-195b7c4b6c3a0504f0fb2ed5065020a7.yaml new file mode 100644 index 0000000000..7ec03aa285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-195b7c4b6c3a0504f0fb2ed5065020a7.yaml @@ -0,0 +1,58 @@ +id: duplicator-195b7c4b6c3a0504f0fb2ed5065020a7 + +info: + name: > + Duplicator <= 1.5.7 - Cross-Site Request Forgery via views/tools/diagnostics/information.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/416da5d4-3d47-443b-a82c-c059c38f5218?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-22105b80b6b00742d7d1393ced18465f.yaml b/nuclei-templates/cve-less/plugins/duplicator-22105b80b6b00742d7d1393ced18465f.yaml new file mode 100644 index 0000000000..08f62594fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-22105b80b6b00742d7d1393ced18465f.yaml @@ -0,0 +1,58 @@ +id: duplicator-22105b80b6b00742d7d1393ced18465f + +info: + name: > + Duplicator <= 0.5.14 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3762cd92-604a-4dac-a09e-6b4a08c4d804?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-2d581ac63f9fa320743d3174a6ca4961.yaml b/nuclei-templates/cve-less/plugins/duplicator-2d581ac63f9fa320743d3174a6ca4961.yaml new file mode 100644 index 0000000000..9d018ae7a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-2d581ac63f9fa320743d3174a6ca4961.yaml @@ -0,0 +1,58 @@ +id: duplicator-2d581ac63f9fa320743d3174a6ca4961 + +info: + name: > + Duplicator <= 1.2.41 - Sensitive Information Disclosure leading to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aff754d6-8624-4068-8e31-738f6041d3a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-2e6e6e36243681b3cf144f17aaebf064.yaml b/nuclei-templates/cve-less/plugins/duplicator-2e6e6e36243681b3cf144f17aaebf064.yaml new file mode 100644 index 0000000000..44ec198f8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-2e6e6e36243681b3cf144f17aaebf064.yaml @@ -0,0 +1,58 @@ +id: duplicator-2e6e6e36243681b3cf144f17aaebf064 + +info: + name: > + Duplicator <= 1.2.32 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/010ce1c3-dd07-4ed6-8908-0909c0842be8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-435788aa8fd2d67e24f049a6e4d48777.yaml b/nuclei-templates/cve-less/plugins/duplicator-435788aa8fd2d67e24f049a6e4d48777.yaml new file mode 100644 index 0000000000..9cea955f7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-435788aa8fd2d67e24f049a6e4d48777.yaml @@ -0,0 +1,58 @@ +id: duplicator-435788aa8fd2d67e24f049a6e4d48777 + +info: + name: > + Duplicator – WordPress Migration Plugin <= 1.4.7 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/843ef712-6ca6-44d2-825f-7ce9a82d74e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-45ca25ef969a9c785b481aa6dd42b6ce.yaml b/nuclei-templates/cve-less/plugins/duplicator-45ca25ef969a9c785b481aa6dd42b6ce.yaml new file mode 100644 index 0000000000..2f560c33a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-45ca25ef969a9c785b481aa6dd42b6ce.yaml @@ -0,0 +1,58 @@ +id: duplicator-45ca25ef969a9c785b481aa6dd42b6ce + +info: + name: > + Duplicator – WordPress Migration Plugin <= 1.4.7 - Unauthenticated Backup Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5136409-d843-4774-afe7-211a23f65da9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-718986dcd5947a1beb7efad526e28827.yaml b/nuclei-templates/cve-less/plugins/duplicator-718986dcd5947a1beb7efad526e28827.yaml new file mode 100644 index 0000000000..535b1df0d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-718986dcd5947a1beb7efad526e28827.yaml @@ -0,0 +1,58 @@ +id: duplicator-718986dcd5947a1beb7efad526e28827 + +info: + name: > + Duplicator <= 1.2.28 – Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bdf7b10-6a3e-47aa-86ae-479b4cd29c49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-84e8025814ede80f77a1696e5326822b.yaml b/nuclei-templates/cve-less/plugins/duplicator-84e8025814ede80f77a1696e5326822b.yaml new file mode 100644 index 0000000000..37a78f4bb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-84e8025814ede80f77a1696e5326822b.yaml @@ -0,0 +1,58 @@ +id: duplicator-84e8025814ede80f77a1696e5326822b + +info: + name: > + Duplicator < 1.3.28 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9ae9aba-fa0e-4a3d-a970-e45216685cc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-988ed918d003525e19a036e7fba12cab.yaml b/nuclei-templates/cve-less/plugins/duplicator-988ed918d003525e19a036e7fba12cab.yaml new file mode 100644 index 0000000000..4376846baf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-988ed918d003525e19a036e7fba12cab.yaml @@ -0,0 +1,58 @@ +id: duplicator-988ed918d003525e19a036e7fba12cab + +info: + name: > + Duplicator <= 0.5.26 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06905738-7e1c-4d1a-97d2-f68f978ad8ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-9b8a6c665915ed37184ee04d4ad10c93.yaml b/nuclei-templates/cve-less/plugins/duplicator-9b8a6c665915ed37184ee04d4ad10c93.yaml new file mode 100644 index 0000000000..d2461d4de7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-9b8a6c665915ed37184ee04d4ad10c93.yaml @@ -0,0 +1,58 @@ +id: duplicator-9b8a6c665915ed37184ee04d4ad10c93 + +info: + name: > + Duplicator < 0.5.10 - Arbitrary Backup Creation and Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b85b44ed-94cd-4d85-bcc5-60b50cdb94f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-cf9463289c46f678c704f21fa0d76e71.yaml b/nuclei-templates/cve-less/plugins/duplicator-cf9463289c46f678c704f21fa0d76e71.yaml new file mode 100644 index 0000000000..1cadc0e31c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-cf9463289c46f678c704f21fa0d76e71.yaml @@ -0,0 +1,58 @@ +id: duplicator-cf9463289c46f678c704f21fa0d76e71 + +info: + name: > + Duplicator <= 1.5.7 AND Duplicator Pro < 4.5.14.2 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f7a88c-a09b-46ac-b345-139c2d20a3d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-fa14deacc63665329cc2a6a4da97d369.yaml b/nuclei-templates/cve-less/plugins/duplicator-fa14deacc63665329cc2a6a4da97d369.yaml new file mode 100644 index 0000000000..f5f47f94a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-fa14deacc63665329cc2a6a4da97d369.yaml @@ -0,0 +1,58 @@ +id: duplicator-fa14deacc63665329cc2a6a4da97d369 + +info: + name: > + Duplicator < 1.3.0 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5757abd-33dc-4751-bc55-afd944ff2341?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-pro-84e8025814ede80f77a1696e5326822b.yaml b/nuclei-templates/cve-less/plugins/duplicator-pro-84e8025814ede80f77a1696e5326822b.yaml new file mode 100644 index 0000000000..d927816904 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-pro-84e8025814ede80f77a1696e5326822b.yaml @@ -0,0 +1,58 @@ +id: duplicator-pro-84e8025814ede80f77a1696e5326822b + +info: + name: > + Duplicator < 1.3.28 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9ae9aba-fa0e-4a3d-a970-e45216685cc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator-pro/" + google-query: inurl:"/wp-content/plugins/duplicator-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-pro-cf9463289c46f678c704f21fa0d76e71.yaml b/nuclei-templates/cve-less/plugins/duplicator-pro-cf9463289c46f678c704f21fa0d76e71.yaml new file mode 100644 index 0000000000..bf589da3be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-pro-cf9463289c46f678c704f21fa0d76e71.yaml @@ -0,0 +1,58 @@ +id: duplicator-pro-cf9463289c46f678c704f21fa0d76e71 + +info: + name: > + Duplicator <= 1.5.7 AND Duplicator Pro < 4.5.14.2 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f7a88c-a09b-46ac-b345-139c2d20a3d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator-pro/" + google-query: inurl:"/wp-content/plugins/duplicator-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.14.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duplicator-pro-de0ba6f29dfa0f03254fb0a76e6f99c6.yaml b/nuclei-templates/cve-less/plugins/duplicator-pro-de0ba6f29dfa0f03254fb0a76e6f99c6.yaml new file mode 100644 index 0000000000..55f61205ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duplicator-pro-de0ba6f29dfa0f03254fb0a76e6f99c6.yaml @@ -0,0 +1,58 @@ +id: duplicator-pro-de0ba6f29dfa0f03254fb0a76e6f99c6 + +info: + name: > + Duplicator Pro <= 4.5.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1426bebe-d3c4-4f83-9b50-fae8c2373209?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duplicator-pro/" + google-query: inurl:"/wp-content/plugins/duplicator-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duplicator-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duplicator-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duplicator-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-7adc7eb8c094a09a98664c4579c84eb8.yaml b/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-7adc7eb8c094a09a98664c4579c84eb8.yaml new file mode 100644 index 0000000000..84a818f705 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-7adc7eb8c094a09a98664c4579c84eb8.yaml @@ -0,0 +1,58 @@ +id: duracelltomi-google-tag-manager-7adc7eb8c094a09a98664c4579c84eb8 + +info: + name: > + Google Tag Manager for WordPress (GTM4WP) <= 1.15.1 - Stored Cross-Site Scripting via Content Element ID + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/202c14d0-9207-47cb-9410-ca4c70d7b6d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duracelltomi-google-tag-manager/" + google-query: inurl:"/wp-content/plugins/duracelltomi-google-tag-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duracelltomi-google-tag-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duracelltomi-google-tag-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duracelltomi-google-tag-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-9cdc8d9b3ff8215825fa26b48709bf41.yaml b/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-9cdc8d9b3ff8215825fa26b48709bf41.yaml new file mode 100644 index 0000000000..09ef2ced56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-9cdc8d9b3ff8215825fa26b48709bf41.yaml @@ -0,0 +1,58 @@ +id: duracelltomi-google-tag-manager-9cdc8d9b3ff8215825fa26b48709bf41 + +info: + name: > + Google Tag Manager for WordPress <= 1.15 - Reflected Cross-Site Scripting via Site Search + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0435ae14-c1fd-4611-acbe-5f3bafd4bb6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duracelltomi-google-tag-manager/" + google-query: inurl:"/wp-content/plugins/duracelltomi-google-tag-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duracelltomi-google-tag-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duracelltomi-google-tag-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duracelltomi-google-tag-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-b6ecb92e579cb07e36e2314084112219.yaml b/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-b6ecb92e579cb07e36e2314084112219.yaml new file mode 100644 index 0000000000..9e1fba4b64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/duracelltomi-google-tag-manager-b6ecb92e579cb07e36e2314084112219.yaml @@ -0,0 +1,58 @@ +id: duracelltomi-google-tag-manager-b6ecb92e579cb07e36e2314084112219 + +info: + name: > + Google Tag Manager for WordPress <= 1.15 - Cross-Site Scripting via Cloudflare Country Code + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79a41b84-2e19-46eb-9f6b-5155da0b15cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/duracelltomi-google-tag-manager/" + google-query: inurl:"/wp-content/plugins/duracelltomi-google-tag-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,duracelltomi-google-tag-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/duracelltomi-google-tag-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "duracelltomi-google-tag-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dvs-custom-notification-668be2a6a44dad3bba943de0f544a515.yaml b/nuclei-templates/cve-less/plugins/dvs-custom-notification-668be2a6a44dad3bba943de0f544a515.yaml new file mode 100644 index 0000000000..ac945cb0e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dvs-custom-notification-668be2a6a44dad3bba943de0f544a515.yaml @@ -0,0 +1,58 @@ +id: dvs-custom-notification-668be2a6a44dad3bba943de0f544a515 + +info: + name: > + DVS Custom Notification <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36d02d5f-d534-4567-9587-1f6e4b21ca90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dvs-custom-notification/" + google-query: inurl:"/wp-content/plugins/dvs-custom-notification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dvs-custom-notification,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dvs-custom-notification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dvs-custom-notification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dw-promobar-6ebbfbf7f4ff52ef90502e505dd10d64.yaml b/nuclei-templates/cve-less/plugins/dw-promobar-6ebbfbf7f4ff52ef90502e505dd10d64.yaml new file mode 100644 index 0000000000..bcbf6e37d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dw-promobar-6ebbfbf7f4ff52ef90502e505dd10d64.yaml @@ -0,0 +1,58 @@ +id: dw-promobar-6ebbfbf7f4ff52ef90502e505dd10d64 + +info: + name: > + DW Promobar <= 1.0.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c101b579-de72-4f33-8fd2-7fcd7c25044c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dw-promobar/" + google-query: inurl:"/wp-content/plugins/dw-promobar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dw-promobar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dw-promobar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dw-promobar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dw-question-answer-515c6f7cdb52a3563e73406fbbc7b42a.yaml b/nuclei-templates/cve-less/plugins/dw-question-answer-515c6f7cdb52a3563e73406fbbc7b42a.yaml new file mode 100644 index 0000000000..b2bf61dbf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dw-question-answer-515c6f7cdb52a3563e73406fbbc7b42a.yaml @@ -0,0 +1,58 @@ +id: dw-question-answer-515c6f7cdb52a3563e73406fbbc7b42a + +info: + name: > + DW Question & Answer < 1.4.2.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4170426-b418-48ec-8233-1ca1aca60473?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dw-question-answer/" + google-query: inurl:"/wp-content/plugins/dw-question-answer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dw-question-answer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dw-question-answer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dw-question-answer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dw-question-answer-5c4144b3a2f4c4a33c4c23a4eb7aa6d3.yaml b/nuclei-templates/cve-less/plugins/dw-question-answer-5c4144b3a2f4c4a33c4c23a4eb7aa6d3.yaml new file mode 100644 index 0000000000..b21fd42e67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dw-question-answer-5c4144b3a2f4c4a33c4c23a4eb7aa6d3.yaml @@ -0,0 +1,58 @@ +id: dw-question-answer-5c4144b3a2f4c4a33c4c23a4eb7aa6d3 + +info: + name: > + DW Question & Answer <= 1.5.8 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9852e499-f413-4218-9bac-6c2be62ecc32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dw-question-answer/" + google-query: inurl:"/wp-content/plugins/dw-question-answer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dw-question-answer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dw-question-answer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dw-question-answer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dw-question-answer-pro-076d6aabf5652856b3ecd43b1d4071c7.yaml b/nuclei-templates/cve-less/plugins/dw-question-answer-pro-076d6aabf5652856b3ecd43b1d4071c7.yaml new file mode 100644 index 0000000000..3a38bf78cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dw-question-answer-pro-076d6aabf5652856b3ecd43b1d4071c7.yaml @@ -0,0 +1,58 @@ +id: dw-question-answer-pro-076d6aabf5652856b3ecd43b1d4071c7 + +info: + name: > + DW Question & Answer Pro <= 1.3.4 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c58fa0a0-0b22-42df-8d3a-c3de78e12aa7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dw-question-answer-pro/" + google-query: inurl:"/wp-content/plugins/dw-question-answer-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dw-question-answer-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dw-question-answer-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dw-question-answer-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dw-question-answer-pro-b9a51b76cf54230b7233fe27914bddd2.yaml b/nuclei-templates/cve-less/plugins/dw-question-answer-pro-b9a51b76cf54230b7233fe27914bddd2.yaml new file mode 100644 index 0000000000..8342967921 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dw-question-answer-pro-b9a51b76cf54230b7233fe27914bddd2.yaml @@ -0,0 +1,58 @@ +id: dw-question-answer-pro-b9a51b76cf54230b7233fe27914bddd2 + +info: + name: > + DW Question & Answer Pro <= 1.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3282244f-2b5f-4795-9f3f-461c4fd2e296?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dw-question-answer-pro/" + google-query: inurl:"/wp-content/plugins/dw-question-answer-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dw-question-answer-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dw-question-answer-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dw-question-answer-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dwnldr-266cec63957d7dffbe45528e32eb40a1.yaml b/nuclei-templates/cve-less/plugins/dwnldr-266cec63957d7dffbe45528e32eb40a1.yaml new file mode 100644 index 0000000000..e35bc6c8c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dwnldr-266cec63957d7dffbe45528e32eb40a1.yaml @@ -0,0 +1,58 @@ +id: dwnldr-266cec63957d7dffbe45528e32eb40a1 + +info: + name: > + dwnldr < 1.01 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e98b1bc7-8dcb-4fcf-9238-598ce53e443e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dwnldr/" + google-query: inurl:"/wp-content/plugins/dwnldr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dwnldr,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dwnldr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dwnldr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dx-auto-save-images-d54d87fc848bb0b810cc40fffbda1954.yaml b/nuclei-templates/cve-less/plugins/dx-auto-save-images-d54d87fc848bb0b810cc40fffbda1954.yaml new file mode 100644 index 0000000000..284dbd6ec4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dx-auto-save-images-d54d87fc848bb0b810cc40fffbda1954.yaml @@ -0,0 +1,58 @@ +id: dx-auto-save-images-d54d87fc848bb0b810cc40fffbda1954 + +info: + name: > + DX-auto-save-images <= 1.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f2fb51b-984c-4b82-98d4-9a681a1855a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dx-auto-save-images/" + google-query: inurl:"/wp-content/plugins/dx-auto-save-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dx-auto-save-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dx-auto-save-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dx-auto-save-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dx-delete-attached-media-8b0729074646bdcd5148e643a832f062.yaml b/nuclei-templates/cve-less/plugins/dx-delete-attached-media-8b0729074646bdcd5148e643a832f062.yaml new file mode 100644 index 0000000000..f853c8ecf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dx-delete-attached-media-8b0729074646bdcd5148e643a832f062.yaml @@ -0,0 +1,58 @@ +id: dx-delete-attached-media-8b0729074646bdcd5148e643a832f062 + +info: + name: > + DX Delete Attached Media <= 2.0.2 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b78004e-caa5-4478-ba16-5f1a10e31541?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dx-delete-attached-media/" + google-query: inurl:"/wp-content/plugins/dx-delete-attached-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dx-delete-attached-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dx-delete-attached-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dx-delete-attached-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dx-delete-attached-media-f556636fbe9fc4c5e3ffdb7df7f017ee.yaml b/nuclei-templates/cve-less/plugins/dx-delete-attached-media-f556636fbe9fc4c5e3ffdb7df7f017ee.yaml new file mode 100644 index 0000000000..70a76c1672 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dx-delete-attached-media-f556636fbe9fc4c5e3ffdb7df7f017ee.yaml @@ -0,0 +1,58 @@ +id: dx-delete-attached-media-f556636fbe9fc4c5e3ffdb7df7f017ee + +info: + name: > + DX Delete Attached Media <= 2.0.5.1 - Cross-Site Request Forgery via add_to_base + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/961d6d1d-46e8-489f-ac5f-51b55c5a0460?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dx-delete-attached-media/" + google-query: inurl:"/wp-content/plugins/dx-delete-attached-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dx-delete-attached-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dx-delete-attached-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dx-delete-attached-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dx-share-selection-34871fd2757b31ede448958147d678fa.yaml b/nuclei-templates/cve-less/plugins/dx-share-selection-34871fd2757b31ede448958147d678fa.yaml new file mode 100644 index 0000000000..599aa0fa1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dx-share-selection-34871fd2757b31ede448958147d678fa.yaml @@ -0,0 +1,58 @@ +id: dx-share-selection-34871fd2757b31ede448958147d678fa + +info: + name: > + DX Share Selection <= 1.4 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a85fe7f-2d28-4509-99f2-875cb63c6500?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dx-share-selection/" + google-query: inurl:"/wp-content/plugins/dx-share-selection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dx-share-selection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dx-share-selection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dx-share-selection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dx-watermark-bee89c93ea84d7cced331403d3d3e739.yaml b/nuclei-templates/cve-less/plugins/dx-watermark-bee89c93ea84d7cced331403d3d3e739.yaml new file mode 100644 index 0000000000..b4ede0deb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dx-watermark-bee89c93ea84d7cced331403d3d3e739.yaml @@ -0,0 +1,58 @@ +id: dx-watermark-bee89c93ea84d7cced331403d3d3e739 + +info: + name: > + DX-Watermark <= 1.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18a9953c-e3a0-46ee-9a53-984c411ce408?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dx-watermark/" + google-query: inurl:"/wp-content/plugins/dx-watermark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dx-watermark,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dx-watermark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dx-watermark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-content-for-elementor-698a88e923e2d2acd18664fa1b6321ce.yaml b/nuclei-templates/cve-less/plugins/dynamic-content-for-elementor-698a88e923e2d2acd18664fa1b6321ce.yaml new file mode 100644 index 0000000000..7480d368b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-content-for-elementor-698a88e923e2d2acd18664fa1b6321ce.yaml @@ -0,0 +1,58 @@ +id: dynamic-content-for-elementor-698a88e923e2d2acd18664fa1b6321ce + +info: + name: > + Dynamic Content for Elementor < 2.12.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77a85024-33ff-4056-89f6-991182d71b80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-content-for-elementor/" + google-query: inurl:"/wp-content/plugins/dynamic-content-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-content-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-content-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-content-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-font-replacement-4wp-06fd5383f7580e13dbd892fe4cb03a32.yaml b/nuclei-templates/cve-less/plugins/dynamic-font-replacement-4wp-06fd5383f7580e13dbd892fe4cb03a32.yaml new file mode 100644 index 0000000000..78a3045be2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-font-replacement-4wp-06fd5383f7580e13dbd892fe4cb03a32.yaml @@ -0,0 +1,58 @@ +id: dynamic-font-replacement-4wp-06fd5383f7580e13dbd892fe4cb03a32 + +info: + name: > + Dynamic Font Replacement DFR4WP EN <= 1.3 EN - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c978a252-1f77-4c8d-b51a-04ed3493ee34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-font-replacement-4wp/" + google-query: inurl:"/wp-content/plugins/dynamic-font-replacement-4wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-font-replacement-4wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-font-replacement-4wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-font-replacement-4wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3 EN') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-font-replacement-4wp-a7d48453e4893aefdc76f2106309c64c.yaml b/nuclei-templates/cve-less/plugins/dynamic-font-replacement-4wp-a7d48453e4893aefdc76f2106309c64c.yaml new file mode 100644 index 0000000000..a9bd10f811 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-font-replacement-4wp-a7d48453e4893aefdc76f2106309c64c.yaml @@ -0,0 +1,58 @@ +id: dynamic-font-replacement-4wp-a7d48453e4893aefdc76f2106309c64c + +info: + name: > + Dynamic Font Replacement DFR4WP EN <= 1.3 EN - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6843939b-889f-45d7-9758-4b76a20d15f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-font-replacement-4wp/" + google-query: inurl:"/wp-content/plugins/dynamic-font-replacement-4wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-font-replacement-4wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-font-replacement-4wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-font-replacement-4wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3 EN') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-qr-code-generator-4446ca17737c11e44353bd7340e7ea63.yaml b/nuclei-templates/cve-less/plugins/dynamic-qr-code-generator-4446ca17737c11e44353bd7340e7ea63.yaml new file mode 100644 index 0000000000..f62a76dd0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-qr-code-generator-4446ca17737c11e44353bd7340e7ea63.yaml @@ -0,0 +1,58 @@ +id: dynamic-qr-code-generator-4446ca17737c11e44353bd7340e7ea63 + +info: + name: > + Dynamic QR Code Generator <= 0.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65f30cd4-1d47-4ebe-a6de-acdb3a813c9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-qr-code-generator/" + google-query: inurl:"/wp-content/plugins/dynamic-qr-code-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-qr-code-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-qr-code-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-qr-code-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-visibility-for-elementor-a835e225538d98a6a0f49f942c25b6a5.yaml b/nuclei-templates/cve-less/plugins/dynamic-visibility-for-elementor-a835e225538d98a6a0f49f942c25b6a5.yaml new file mode 100644 index 0000000000..290317e38e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-visibility-for-elementor-a835e225538d98a6a0f49f942c25b6a5.yaml @@ -0,0 +1,58 @@ +id: dynamic-visibility-for-elementor-a835e225538d98a6a0f49f942c25b6a5 + +info: + name: > + Dynamic Visibility for Elementor <= 5.0.5 - Missing Authorization to Authenticated(Subscriber+) Post Visibility Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e704333-ad88-42c9-b632-babc9d54cb13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-visibility-for-elementor/" + google-query: inurl:"/wp-content/plugins/dynamic-visibility-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-visibility-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-visibility-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-visibility-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-widgets-57ca0f970f541262d55b26c7692e76e4.yaml b/nuclei-templates/cve-less/plugins/dynamic-widgets-57ca0f970f541262d55b26c7692e76e4.yaml new file mode 100644 index 0000000000..1ae0f1551c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-widgets-57ca0f970f541262d55b26c7692e76e4.yaml @@ -0,0 +1,58 @@ +id: dynamic-widgets-57ca0f970f541262d55b26c7692e76e4 + +info: + name: > + Dynamic Widgets <= 1.5.1 - Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3027edb-770a-43d8-8abe-e9d9a51f4ab3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-widgets/" + google-query: inurl:"/wp-content/plugins/dynamic-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-widgets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-widgets-7c8cf3109f4d4b196459b75b96aa728e.yaml b/nuclei-templates/cve-less/plugins/dynamic-widgets-7c8cf3109f4d4b196459b75b96aa728e.yaml new file mode 100644 index 0000000000..319d65984f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-widgets-7c8cf3109f4d4b196459b75b96aa728e.yaml @@ -0,0 +1,58 @@ +id: dynamic-widgets-7c8cf3109f4d4b196459b75b96aa728e + +info: + name: > + Dynamic Widgets <= 1.5.10 - Refletced Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88f78dd8-f720-4c10-98e8-bd7d522c3ceb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-widgets/" + google-query: inurl:"/wp-content/plugins/dynamic-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-widgets-a4d9b1fab913268578f318671b68ca36.yaml b/nuclei-templates/cve-less/plugins/dynamic-widgets-a4d9b1fab913268578f318671b68ca36.yaml new file mode 100644 index 0000000000..01dd9d25ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-widgets-a4d9b1fab913268578f318671b68ca36.yaml @@ -0,0 +1,58 @@ +id: dynamic-widgets-a4d9b1fab913268578f318671b68ca36 + +info: + name: > + Dynamic Widgets <= 1.5.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4a546a-1c15-4fc5-a2ae-8640457a0c22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-widgets/" + google-query: inurl:"/wp-content/plugins/dynamic-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamic-widgets-d5d0747062745dca3a4a43c62a5b0669.yaml b/nuclei-templates/cve-less/plugins/dynamic-widgets-d5d0747062745dca3a4a43c62a5b0669.yaml new file mode 100644 index 0000000000..2a3e5f3c7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamic-widgets-d5d0747062745dca3a4a43c62a5b0669.yaml @@ -0,0 +1,58 @@ +id: dynamic-widgets-d5d0747062745dca3a4a43c62a5b0669 + +info: + name: > + Dynamic Widgets <= 1.5.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46271ab0-5f24-4cdb-9e1f-12db7bcbea6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamic-widgets/" + google-query: inurl:"/wp-content/plugins/dynamic-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamic-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamic-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamic-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dynamically-register-sidebars-5127fd9a578ab8f75789be1aab665dea.yaml b/nuclei-templates/cve-less/plugins/dynamically-register-sidebars-5127fd9a578ab8f75789be1aab665dea.yaml new file mode 100644 index 0000000000..68ac4e4bfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dynamically-register-sidebars-5127fd9a578ab8f75789be1aab665dea.yaml @@ -0,0 +1,58 @@ +id: dynamically-register-sidebars-5127fd9a578ab8f75789be1aab665dea + +info: + name: > + Dynamically Register Sidebars <= 1.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e6b39da-26d4-4615-b6c7-68909bdf0a61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dynamically-register-sidebars/" + google-query: inurl:"/wp-content/plugins/dynamically-register-sidebars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dynamically-register-sidebars,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dynamically-register-sidebars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dynamically-register-sidebars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dyslexiefont-53a08acd73ef559302d82929e1a8c837.yaml b/nuclei-templates/cve-less/plugins/dyslexiefont-53a08acd73ef559302d82929e1a8c837.yaml new file mode 100644 index 0000000000..8eb97bffa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dyslexiefont-53a08acd73ef559302d82929e1a8c837.yaml @@ -0,0 +1,58 @@ +id: dyslexiefont-53a08acd73ef559302d82929e1a8c837 + +info: + name: > + Dyslexiefont Free <= 1.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d75f6c80-ffbf-47a5-9180-5153b705cb28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dyslexiefont/" + google-query: inurl:"/wp-content/plugins/dyslexiefont/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dyslexiefont,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dyslexiefont/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dyslexiefont" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dyslexiefont-e3c56661b9733debd3e6fea53555b839.yaml b/nuclei-templates/cve-less/plugins/dyslexiefont-e3c56661b9733debd3e6fea53555b839.yaml new file mode 100644 index 0000000000..a576df2168 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dyslexiefont-e3c56661b9733debd3e6fea53555b839.yaml @@ -0,0 +1,58 @@ +id: dyslexiefont-e3c56661b9733debd3e6fea53555b839 + +info: + name: > + Dyslexiefont Free <= 0.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1610b3dd-582e-4ff2-956a-95845361c66b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dyslexiefont/" + google-query: inurl:"/wp-content/plugins/dyslexiefont/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dyslexiefont,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dyslexiefont/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dyslexiefont" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dzs-videogallery-415af7715839a7a4186f1ea1fe3682a1.yaml b/nuclei-templates/cve-less/plugins/dzs-videogallery-415af7715839a7a4186f1ea1fe3682a1.yaml new file mode 100644 index 0000000000..83f9447aec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dzs-videogallery-415af7715839a7a4186f1ea1fe3682a1.yaml @@ -0,0 +1,58 @@ +id: dzs-videogallery-415af7715839a7a4186f1ea1fe3682a1 + +info: + name: > + DZS Video Gallery < 7.95 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d546f05-4aad-49c8-aefd-9f5d10529be5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dzs-videogallery/" + google-query: inurl:"/wp-content/plugins/dzs-videogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dzs-videogallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dzs-videogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dzs-videogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dzs-videogallery-b558d2c101e0c756483bb33734bc9369.yaml b/nuclei-templates/cve-less/plugins/dzs-videogallery-b558d2c101e0c756483bb33734bc9369.yaml new file mode 100644 index 0000000000..75035ea178 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dzs-videogallery-b558d2c101e0c756483bb33734bc9369.yaml @@ -0,0 +1,58 @@ +id: dzs-videogallery-b558d2c101e0c756483bb33734bc9369 + +info: + name: > + DZS Video Gallery <= 3.1.3 - Limited Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/582e2896-d800-4d73-8cef-8af76cba1ba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dzs-videogallery/" + google-query: inurl:"/wp-content/plugins/dzs-videogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dzs-videogallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dzs-videogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dzs-videogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dzs-videogallery-bf282437cadf1ae50cc09a36bacba2a9.yaml b/nuclei-templates/cve-less/plugins/dzs-videogallery-bf282437cadf1ae50cc09a36bacba2a9.yaml new file mode 100644 index 0000000000..90b1f27f3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dzs-videogallery-bf282437cadf1ae50cc09a36bacba2a9.yaml @@ -0,0 +1,58 @@ +id: dzs-videogallery-bf282437cadf1ae50cc09a36bacba2a9 + +info: + name: > + DZS Video Gallery <= 8.60 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/101f8390-7fd1-427d-a62e-83c527adedec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dzs-videogallery/" + google-query: inurl:"/wp-content/plugins/dzs-videogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dzs-videogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dzs-videogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dzs-videogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dzs-videogallery-e983e659503cdb77c86c6aa843d06bc4.yaml b/nuclei-templates/cve-less/plugins/dzs-videogallery-e983e659503cdb77c86c6aa843d06bc4.yaml new file mode 100644 index 0000000000..2c50ddfc77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dzs-videogallery-e983e659503cdb77c86c6aa843d06bc4.yaml @@ -0,0 +1,58 @@ +id: dzs-videogallery-e983e659503cdb77c86c6aa843d06bc4 + +info: + name: > + DZS Video Gallery < 7.95 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/675b029a-70f2-434d-8d14-0b9e9c02bd6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dzs-videogallery/" + google-query: inurl:"/wp-content/plugins/dzs-videogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dzs-videogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dzs-videogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dzs-videogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dzs-videogallery-f017982e52e64f946ac9c5f02ed762a4.yaml b/nuclei-templates/cve-less/plugins/dzs-videogallery-f017982e52e64f946ac9c5f02ed762a4.yaml new file mode 100644 index 0000000000..6f32a7a463 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dzs-videogallery-f017982e52e64f946ac9c5f02ed762a4.yaml @@ -0,0 +1,58 @@ +id: dzs-videogallery-f017982e52e64f946ac9c5f02ed762a4 + +info: + name: > + DZS Video Gallery <= 9.63 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a09e351-8326-4b31-bba5-5da34b417843?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dzs-videogallery/" + google-query: inurl:"/wp-content/plugins/dzs-videogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dzs-videogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dzs-videogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dzs-videogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dzs-zoomsounds-b343996b367c5fa680b75a4664349ae7.yaml b/nuclei-templates/cve-less/plugins/dzs-zoomsounds-b343996b367c5fa680b75a4664349ae7.yaml new file mode 100644 index 0000000000..c09bdab5e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dzs-zoomsounds-b343996b367c5fa680b75a4664349ae7.yaml @@ -0,0 +1,58 @@ +id: dzs-zoomsounds-b343996b367c5fa680b75a4664349ae7 + +info: + name: > + ZoomSounds <= 2.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fcb1237-5d96-47f6-9f0c-3a0fd72ca91f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dzs-zoomsounds/" + google-query: inurl:"/wp-content/plugins/dzs-zoomsounds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dzs-zoomsounds,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dzs-zoomsounds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dzs-zoomsounds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dzs-zoomsounds-bb0c16eac19b4817493c1c038ee23819.yaml b/nuclei-templates/cve-less/plugins/dzs-zoomsounds-bb0c16eac19b4817493c1c038ee23819.yaml new file mode 100644 index 0000000000..47e91067ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dzs-zoomsounds-bb0c16eac19b4817493c1c038ee23819.yaml @@ -0,0 +1,58 @@ +id: dzs-zoomsounds-bb0c16eac19b4817493c1c038ee23819 + +info: + name: > + ZoomSounds <= 5.96 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/262e3bb3-bc83-4d0b-8056-9f94ec141b8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dzs-zoomsounds/" + google-query: inurl:"/wp-content/plugins/dzs-zoomsounds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dzs-zoomsounds,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dzs-zoomsounds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dzs-zoomsounds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/dzs-zoomsounds-bf8cf019bdb5cedf2f07acf0dbbd9293.yaml b/nuclei-templates/cve-less/plugins/dzs-zoomsounds-bf8cf019bdb5cedf2f07acf0dbbd9293.yaml new file mode 100644 index 0000000000..c6ae28f58f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/dzs-zoomsounds-bf8cf019bdb5cedf2f07acf0dbbd9293.yaml @@ -0,0 +1,58 @@ +id: dzs-zoomsounds-bf8cf019bdb5cedf2f07acf0dbbd9293 + +info: + name: > + ZoomSounds - WordPress Wave Audio Player with Playlist <= 6.45 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cffeac2c-8ca3-44f7-b54c-3c23b7a849a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/dzs-zoomsounds/" + google-query: inurl:"/wp-content/plugins/dzs-zoomsounds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,dzs-zoomsounds,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/dzs-zoomsounds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dzs-zoomsounds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e-search-bbab653de7c22eabac485618a7984b27.yaml b/nuclei-templates/cve-less/plugins/e-search-bbab653de7c22eabac485618a7984b27.yaml new file mode 100644 index 0000000000..c05da98bf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e-search-bbab653de7c22eabac485618a7984b27.yaml @@ -0,0 +1,58 @@ +id: e-search-bbab653de7c22eabac485618a7984b27 + +info: + name: > + E Search <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67e1f412-3b3d-4b36-b4ff-557c4790362a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e-search/" + google-query: inurl:"/wp-content/plugins/e-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e-search-d9ec6670d2ff89bdcf34f0cd3338db3d.yaml b/nuclei-templates/cve-less/plugins/e-search-d9ec6670d2ff89bdcf34f0cd3338db3d.yaml new file mode 100644 index 0000000000..87a4877328 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e-search-d9ec6670d2ff89bdcf34f0cd3338db3d.yaml @@ -0,0 +1,58 @@ +id: e-search-d9ec6670d2ff89bdcf34f0cd3338db3d + +info: + name: > + E-Search <= 1.0 - Reflected Cross-Site Scripting via title_az parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cae1194-2247-44bf-a1a0-0cb0068f56e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e-search/" + google-query: inurl:"/wp-content/plugins/e-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e-signature-9090b82ec6bee567e560b8e108d3dc16.yaml b/nuclei-templates/cve-less/plugins/e-signature-9090b82ec6bee567e560b8e108d3dc16.yaml new file mode 100644 index 0000000000..99548a86c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e-signature-9090b82ec6bee567e560b8e108d3dc16.yaml @@ -0,0 +1,58 @@ +id: e-signature-9090b82ec6bee567e560b8e108d3dc16 + +info: + name: > + e-signature < 1.5.6.8 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03be4344-d388-4357-8a2e-c3b9c8b83017?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e-signature/" + google-query: inurl:"/wp-content/plugins/e-signature/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e-signature,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e-signature/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e-signature" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e-unlocked-student-result-46393c1e973f37162a617bc152661e74.yaml b/nuclei-templates/cve-less/plugins/e-unlocked-student-result-46393c1e973f37162a617bc152661e74.yaml new file mode 100644 index 0000000000..c589ffeaf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e-unlocked-student-result-46393c1e973f37162a617bc152661e74.yaml @@ -0,0 +1,58 @@ +id: e-unlocked-student-result-46393c1e973f37162a617bc152661e74 + +info: + name: > + E Unlocked - Student Result <= 1.0.4 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec7b77d8-490e-4eaf-a9df-54de63f128d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e-unlocked-student-result/" + google-query: inurl:"/wp-content/plugins/e-unlocked-student-result/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e-unlocked-student-result,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e-unlocked-student-result/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e-unlocked-student-result" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e2pdf-4c337287b3ea29b58d22de863f5e59bf.yaml b/nuclei-templates/cve-less/plugins/e2pdf-4c337287b3ea29b58d22de863f5e59bf.yaml new file mode 100644 index 0000000000..b4c5486ce1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e2pdf-4c337287b3ea29b58d22de863f5e59bf.yaml @@ -0,0 +1,58 @@ +id: e2pdf-4c337287b3ea29b58d22de863f5e59bf + +info: + name: > + e2pdf < 1.20.20 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ec401d8-bbdf-4be6-bcc5-51f8c8ec7cfd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e2pdf/" + google-query: inurl:"/wp-content/plugins/e2pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e2pdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e2pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e2pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e2pdf-a6097b32439b60cacd59d47b3a1c8c61.yaml b/nuclei-templates/cve-less/plugins/e2pdf-a6097b32439b60cacd59d47b3a1c8c61.yaml new file mode 100644 index 0000000000..513d9d4a2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e2pdf-a6097b32439b60cacd59d47b3a1c8c61.yaml @@ -0,0 +1,58 @@ +id: e2pdf-a6097b32439b60cacd59d47b3a1c8c61 + +info: + name: > + E2Pdf <= 1.20.18 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea7f654b-88d1-4ed8-bab0-701e2e66e060?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e2pdf/" + google-query: inurl:"/wp-content/plugins/e2pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e2pdf,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e2pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e2pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e2pdf-aa33e37a5a268fafeb4ae3c73aa43c7a.yaml b/nuclei-templates/cve-less/plugins/e2pdf-aa33e37a5a268fafeb4ae3c73aa43c7a.yaml new file mode 100644 index 0000000000..43a4f6bf46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e2pdf-aa33e37a5a268fafeb4ae3c73aa43c7a.yaml @@ -0,0 +1,58 @@ +id: e2pdf-aa33e37a5a268fafeb4ae3c73aa43c7a + +info: + name: > + E2Pdf <= 1.20.23 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f0ed355-b5c8-4143-b391-7436d67ba0de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e2pdf/" + google-query: inurl:"/wp-content/plugins/e2pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e2pdf,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e2pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e2pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e2pdf-cc85fecce61e81ebcfd16fc13ed35220.yaml b/nuclei-templates/cve-less/plugins/e2pdf-cc85fecce61e81ebcfd16fc13ed35220.yaml new file mode 100644 index 0000000000..7d4ea45f6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e2pdf-cc85fecce61e81ebcfd16fc13ed35220.yaml @@ -0,0 +1,58 @@ +id: e2pdf-cc85fecce61e81ebcfd16fc13ed35220 + +info: + name: > + E2Pdf <= 1.16.44 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5748252-d02a-463b-abb4-537144ccd608?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e2pdf/" + google-query: inurl:"/wp-content/plugins/e2pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e2pdf,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e2pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e2pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e2pdf-d89b8d067839983b7d38b29c3f8dcaaa.yaml b/nuclei-templates/cve-less/plugins/e2pdf-d89b8d067839983b7d38b29c3f8dcaaa.yaml new file mode 100644 index 0000000000..2a187f94c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e2pdf-d89b8d067839983b7d38b29c3f8dcaaa.yaml @@ -0,0 +1,58 @@ +id: e2pdf-d89b8d067839983b7d38b29c3f8dcaaa + +info: + name: > + E2Pdf <= 1.20.25 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03faec37-2cce-4e14-92f2-d941ab1b4ce9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e2pdf/" + google-query: inurl:"/wp-content/plugins/e2pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e2pdf,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e2pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e2pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/e2pdf-e3339c8e6a8ccbe16b78f0e2c9ca3674.yaml b/nuclei-templates/cve-less/plugins/e2pdf-e3339c8e6a8ccbe16b78f0e2c9ca3674.yaml new file mode 100644 index 0000000000..98acbf566f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/e2pdf-e3339c8e6a8ccbe16b78f0e2c9ca3674.yaml @@ -0,0 +1,58 @@ +id: e2pdf-e3339c8e6a8ccbe16b78f0e2c9ca3674 + +info: + name: > + e2pdf <= 1.20.27 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56f146e8-ec70-45c4-9ff2-94cb44fef5c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/e2pdf/" + google-query: inurl:"/wp-content/plugins/e2pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,e2pdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/e2pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "e2pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ean-for-woocommerce-4e6a565e3f0523a8457d5186515c7331.yaml b/nuclei-templates/cve-less/plugins/ean-for-woocommerce-4e6a565e3f0523a8457d5186515c7331.yaml new file mode 100644 index 0000000000..88fb117fa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ean-for-woocommerce-4e6a565e3f0523a8457d5186515c7331.yaml @@ -0,0 +1,58 @@ +id: ean-for-woocommerce-4e6a565e3f0523a8457d5186515c7331 + +info: + name: > + EAN for WooCommerce <= 4.9.2 - Insecure Direct Object Reference to Sensitve Information Exposure via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17b20df5-4adf-47ce-bddf-2ec0b9499de8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ean-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ean-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ean-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ean-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ean-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ean-for-woocommerce-7aa0e1773e8e5c34cf563aa138c0d2da.yaml b/nuclei-templates/cve-less/plugins/ean-for-woocommerce-7aa0e1773e8e5c34cf563aa138c0d2da.yaml new file mode 100644 index 0000000000..187d9f2050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ean-for-woocommerce-7aa0e1773e8e5c34cf563aa138c0d2da.yaml @@ -0,0 +1,58 @@ +id: ean-for-woocommerce-7aa0e1773e8e5c34cf563aa138c0d2da + +info: + name: > + EAN for WooCommerce <= 4.8.9 - Authenticated (Shop Manager+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13be8a88-bcd3-4ce9-9538-e93c78323456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ean-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ean-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ean-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ean-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ean-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ean-for-woocommerce-c34557dbe7e75a157fffc6005c83f4ba.yaml b/nuclei-templates/cve-less/plugins/ean-for-woocommerce-c34557dbe7e75a157fffc6005c83f4ba.yaml new file mode 100644 index 0000000000..b6c5adef6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ean-for-woocommerce-c34557dbe7e75a157fffc6005c83f4ba.yaml @@ -0,0 +1,58 @@ +id: ean-for-woocommerce-c34557dbe7e75a157fffc6005c83f4ba + +info: + name: > + EAN for WooCommerce <= 4.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via alg_wc_ean_product_meta Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d798406b-2b7f-4ca0-8d05-8aff4bf44dd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ean-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ean-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ean-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ean-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ean-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ean-for-woocommerce-c623741b8b5dbd96eac005af1ef14987.yaml b/nuclei-templates/cve-less/plugins/ean-for-woocommerce-c623741b8b5dbd96eac005af1ef14987.yaml new file mode 100644 index 0000000000..69363c5254 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ean-for-woocommerce-c623741b8b5dbd96eac005af1ef14987.yaml @@ -0,0 +1,58 @@ +id: ean-for-woocommerce-c623741b8b5dbd96eac005af1ef14987 + +info: + name: > + EAN for WooCommerce <= 4.4.2 - Authenticated (Contributor+ )Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c77ef86e-ea5b-46fc-a3d7-d11a20f3f871?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ean-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ean-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ean-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ean-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ean-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easily-generate-rest-api-url-667161af8562bbf0616cde527e940c70.yaml b/nuclei-templates/cve-less/plugins/easily-generate-rest-api-url-667161af8562bbf0616cde527e940c70.yaml new file mode 100644 index 0000000000..9da0ba5fda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easily-generate-rest-api-url-667161af8562bbf0616cde527e940c70.yaml @@ -0,0 +1,58 @@ +id: easily-generate-rest-api-url-667161af8562bbf0616cde527e940c70 + +info: + name: > + Easily Generate Rest API Url <= 1.0.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7e58c6d-5b95-4b22-a7fc-e5e8324ed52a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easily-generate-rest-api-url/" + google-query: inurl:"/wp-content/plugins/easily-generate-rest-api-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easily-generate-rest-api-url,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easily-generate-rest-api-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easily-generate-rest-api-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easing-slider-28d8e466f42a7ea620fa3fe2f98c9634.yaml b/nuclei-templates/cve-less/plugins/easing-slider-28d8e466f42a7ea620fa3fe2f98c9634.yaml new file mode 100644 index 0000000000..879ad9000f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easing-slider-28d8e466f42a7ea620fa3fe2f98c9634.yaml @@ -0,0 +1,58 @@ +id: easing-slider-28d8e466f42a7ea620fa3fe2f98c9634 + +info: + name: > + Easing Slider <= 3.0.8 - Missing Authorization to Unauthenticated Settings Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e04a2f8-5071-4c85-b4f8-cb914ee509b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easing-slider/" + google-query: inurl:"/wp-content/plugins/easing-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easing-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easing-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easing-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easing-slider-7a859a74f0e39d83ee989a269a737923.yaml b/nuclei-templates/cve-less/plugins/easing-slider-7a859a74f0e39d83ee989a269a737923.yaml new file mode 100644 index 0000000000..f25dbcc651 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easing-slider-7a859a74f0e39d83ee989a269a737923.yaml @@ -0,0 +1,58 @@ +id: easing-slider-7a859a74f0e39d83ee989a269a737923 + +info: + name: > + Easing Slider <= 2.2.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/019f4735-a25c-46c7-8a7d-55351197bdf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easing-slider/" + google-query: inurl:"/wp-content/plugins/easing-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easing-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easing-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easing-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-accordion-free-3253e2e7de1175aa67f3d6d5696567c5.yaml b/nuclei-templates/cve-less/plugins/easy-accordion-free-3253e2e7de1175aa67f3d6d5696567c5.yaml new file mode 100644 index 0000000000..9fa5bd392c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-accordion-free-3253e2e7de1175aa67f3d6d5696567c5.yaml @@ -0,0 +1,58 @@ +id: easy-accordion-free-3253e2e7de1175aa67f3d6d5696567c5 + +info: + name: > + Easy Accordion <= 2.0.21 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c4f9958-0e5a-483c-926e-ceaee00ffa45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-accordion-free/" + google-query: inurl:"/wp-content/plugins/easy-accordion-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-accordion-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-accordion-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-accordion-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-accordion-free-5c300627494a1ad1099275af163a3e49.yaml b/nuclei-templates/cve-less/plugins/easy-accordion-free-5c300627494a1ad1099275af163a3e49.yaml new file mode 100644 index 0000000000..4bad8736aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-accordion-free-5c300627494a1ad1099275af163a3e49.yaml @@ -0,0 +1,58 @@ +id: easy-accordion-free-5c300627494a1ad1099275af163a3e49 + +info: + name: > + Easy Accordion – Best Accordion FAQ Plugin for WordPress <= 2.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88f2fa28-5bb2-4633-b2bc-27cc6a4e304c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-accordion-free/" + google-query: inurl:"/wp-content/plugins/easy-accordion-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-accordion-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-accordion-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-accordion-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-accordion-free-6139caeaed9293c95d17b26944e3e8d5.yaml b/nuclei-templates/cve-less/plugins/easy-accordion-free-6139caeaed9293c95d17b26944e3e8d5.yaml new file mode 100644 index 0000000000..2ba3a8da4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-accordion-free-6139caeaed9293c95d17b26944e3e8d5.yaml @@ -0,0 +1,58 @@ +id: easy-accordion-free-6139caeaed9293c95d17b26944e3e8d5 + +info: + name: > + Easy Accordion <= 2.1.20 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dab93f3-8068-4655-aa3d-a9f4c8dc9d61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-accordion-free/" + google-query: inurl:"/wp-content/plugins/easy-accordion-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-accordion-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-accordion-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-accordion-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-ad-manager-70088a82bdb29c81346c08fa9d47c687.yaml b/nuclei-templates/cve-less/plugins/easy-ad-manager-70088a82bdb29c81346c08fa9d47c687.yaml new file mode 100644 index 0000000000..374319eff3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-ad-manager-70088a82bdb29c81346c08fa9d47c687.yaml @@ -0,0 +1,58 @@ +id: easy-ad-manager-70088a82bdb29c81346c08fa9d47c687 + +info: + name: > + Easy Ad Manager <= 1.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7750f70-e79c-45fb-b792-ba6a4da59964?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-ad-manager/" + google-query: inurl:"/wp-content/plugins/easy-ad-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-ad-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-ad-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-ad-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-admin-menu-3b5f830cc2d293978dbe39244d121ee0.yaml b/nuclei-templates/cve-less/plugins/easy-admin-menu-3b5f830cc2d293978dbe39244d121ee0.yaml new file mode 100644 index 0000000000..85dd2de8cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-admin-menu-3b5f830cc2d293978dbe39244d121ee0.yaml @@ -0,0 +1,58 @@ +id: easy-admin-menu-3b5f830cc2d293978dbe39244d121ee0 + +info: + name: > + Easy Admin Menu <= 1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fefab999-12e0-4866-a5a2-60f8faa64f89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-admin-menu/" + google-query: inurl:"/wp-content/plugins/easy-admin-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-admin-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-admin-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-admin-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-adsense-lite-b9d3eb363a683c73c14fb5271b86198a.yaml b/nuclei-templates/cve-less/plugins/easy-adsense-lite-b9d3eb363a683c73c14fb5271b86198a.yaml new file mode 100644 index 0000000000..e5c361c856 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-adsense-lite-b9d3eb363a683c73c14fb5271b86198a.yaml @@ -0,0 +1,58 @@ +id: easy-adsense-lite-b9d3eb363a683c73c14fb5271b86198a + +info: + name: > + Easy Plugin for AdSense < 6.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e9bac4c-3a07-4a76-b2bd-365aae455086?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-adsense-lite/" + google-query: inurl:"/wp-content/plugins/easy-adsense-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-adsense-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-adsense-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-adsense-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-affiliate-links-4e96720039ccc700f05ab77c703ff32b.yaml b/nuclei-templates/cve-less/plugins/easy-affiliate-links-4e96720039ccc700f05ab77c703ff32b.yaml new file mode 100644 index 0000000000..6d4c34f842 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-affiliate-links-4e96720039ccc700f05ab77c703ff32b.yaml @@ -0,0 +1,58 @@ +id: easy-affiliate-links-4e96720039ccc700f05ab77c703ff32b + +info: + name: > + Easy Affiliate Links <= 3.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d30e813-010f-4881-8b8e-f3d62d928c57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-affiliate-links/" + google-query: inurl:"/wp-content/plugins/easy-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-affiliate-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-age-verify-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-age-verify-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..71a01284bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-age-verify-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-age-verify-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-age-verify/" + google-query: inurl:"/wp-content/plugins/easy-age-verify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-age-verify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-age-verify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-age-verify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-appointments-2302a07c8ff1ee9859f41cba989fe323.yaml b/nuclei-templates/cve-less/plugins/easy-appointments-2302a07c8ff1ee9859f41cba989fe323.yaml new file mode 100644 index 0000000000..28df6294f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-appointments-2302a07c8ff1ee9859f41cba989fe323.yaml @@ -0,0 +1,58 @@ +id: easy-appointments-2302a07c8ff1ee9859f41cba989fe323 + +info: + name: > + Easy Appointments <= 3.11.18 - Insufficient Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0d8ac01-ac73-47ea-839b-edc820436f27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-appointments/" + google-query: inurl:"/wp-content/plugins/easy-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-appointments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-appointments-84cb3311236885a9e904cbe429619629.yaml b/nuclei-templates/cve-less/plugins/easy-appointments-84cb3311236885a9e904cbe429619629.yaml new file mode 100644 index 0000000000..95f9999fc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-appointments-84cb3311236885a9e904cbe429619629.yaml @@ -0,0 +1,58 @@ +id: easy-appointments-84cb3311236885a9e904cbe429619629 + +info: + name: > + Easy Appointments < 1.12.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f62045b-4fb7-4dde-8d3c-d04b4e5e4810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-appointments/" + google-query: inurl:"/wp-content/plugins/easy-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-appointments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-appointments-afa229bd02db847384791980963680d0.yaml b/nuclei-templates/cve-less/plugins/easy-appointments-afa229bd02db847384791980963680d0.yaml new file mode 100644 index 0000000000..d28beb4eb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-appointments-afa229bd02db847384791980963680d0.yaml @@ -0,0 +1,58 @@ +id: easy-appointments-afa229bd02db847384791980963680d0 + +info: + name: > + Easy Appointments <= 3.11.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfe8d13b-f387-4c82-ba9f-efadda18c882?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-appointments/" + google-query: inurl:"/wp-content/plugins/easy-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-appointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-appointments-b4ee9cff24049609b5e28a42cf47dee5.yaml b/nuclei-templates/cve-less/plugins/easy-appointments-b4ee9cff24049609b5e28a42cf47dee5.yaml new file mode 100644 index 0000000000..dc26b83b92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-appointments-b4ee9cff24049609b5e28a42cf47dee5.yaml @@ -0,0 +1,58 @@ +id: easy-appointments-b4ee9cff24049609b5e28a42cf47dee5 + +info: + name: > + Easy Appointments <= 3.11.18 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e1514c8-3752-4d0a-87a3-3f245a7cb914?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-appointments/" + google-query: inurl:"/wp-content/plugins/easy-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-appointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-appointments-e2ec209c741fed7cc95066eb8c9d077f.yaml b/nuclei-templates/cve-less/plugins/easy-appointments-e2ec209c741fed7cc95066eb8c9d077f.yaml new file mode 100644 index 0000000000..c1454464cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-appointments-e2ec209c741fed7cc95066eb8c9d077f.yaml @@ -0,0 +1,58 @@ +id: easy-appointments-e2ec209c741fed7cc95066eb8c9d077f + +info: + name: > + Easy Appointments <= 3.10.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3906c668-6a0a-4beb-8ed9-08f661ce82cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-appointments/" + google-query: inurl:"/wp-content/plugins/easy-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-appointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-appointments-e5114063e08dd4dd3989e0a929dd3452.yaml b/nuclei-templates/cve-less/plugins/easy-appointments-e5114063e08dd4dd3989e0a929dd3452.yaml new file mode 100644 index 0000000000..615fd59d50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-appointments-e5114063e08dd4dd3989e0a929dd3452.yaml @@ -0,0 +1,58 @@ +id: easy-appointments-e5114063e08dd4dd3989e0a929dd3452 + +info: + name: > + Easy Appointments <= 3.11.9 - Cross-Site Request Forgery via multiple AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/461cec8c-77e4-4f20-8dff-c4f675dc235f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-appointments/" + google-query: inurl:"/wp-content/plugins/easy-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-appointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-author-image-b69273626856756974f9cdee241ed8f7.yaml b/nuclei-templates/cve-less/plugins/easy-author-image-b69273626856756974f9cdee241ed8f7.yaml new file mode 100644 index 0000000000..e7dc80c4d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-author-image-b69273626856756974f9cdee241ed8f7.yaml @@ -0,0 +1,58 @@ +id: easy-author-image-b69273626856756974f9cdee241ed8f7 + +info: + name: > + Easy Author Image <= 1.5 - Email Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ec6211b-783b-4375-972b-adcaf9f9f526?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-author-image/" + google-query: inurl:"/wp-content/plugins/easy-author-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-author-image,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-author-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-author-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-banners-bbb1e092b9ae97dcfd27d316846c9ee9.yaml b/nuclei-templates/cve-less/plugins/easy-banners-bbb1e092b9ae97dcfd27d316846c9ee9.yaml new file mode 100644 index 0000000000..696704f636 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-banners-bbb1e092b9ae97dcfd27d316846c9ee9.yaml @@ -0,0 +1,58 @@ +id: easy-banners-bbb1e092b9ae97dcfd27d316846c9ee9 + +info: + name: > + Easy Banners <= 1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea25e80-af12-4845-b505-16654a68b009?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-banners/" + google-query: inurl:"/wp-content/plugins/easy-banners/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-banners,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-banners/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-banners" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-bet-49c0957ce7beb86c6cd3610ef85cd2a3.yaml b/nuclei-templates/cve-less/plugins/easy-bet-49c0957ce7beb86c6cd3610ef85cd2a3.yaml new file mode 100644 index 0000000000..bbbc00fc40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-bet-49c0957ce7beb86c6cd3610ef85cd2a3.yaml @@ -0,0 +1,58 @@ +id: easy-bet-49c0957ce7beb86c6cd3610ef85cd2a3 + +info: + name: > + Easy Bet <= 1.0.2 - Authenticated(Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a833fe01-caf5-434a-82f9-8d3ac755a66f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-bet/" + google-query: inurl:"/wp-content/plugins/easy-bet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-bet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-bet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-bet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-bootstrap-shortcodes-05c1130a0be4b028fb1b748819924a55.yaml b/nuclei-templates/cve-less/plugins/easy-bootstrap-shortcodes-05c1130a0be4b028fb1b748819924a55.yaml new file mode 100644 index 0000000000..f69fdac638 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-bootstrap-shortcodes-05c1130a0be4b028fb1b748819924a55.yaml @@ -0,0 +1,58 @@ +id: easy-bootstrap-shortcodes-05c1130a0be4b028fb1b748819924a55 + +info: + name: > + Easy Bootstrap Shortcode <= 4.5.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6245d74b-89ad-4229-8c99-dbfeaa048400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-bootstrap-shortcodes/" + google-query: inurl:"/wp-content/plugins/easy-bootstrap-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-bootstrap-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-bootstrap-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-bootstrap-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-call-now-d24e798e6ecdde0cd2e6b3ca9f8356c6.yaml b/nuclei-templates/cve-less/plugins/easy-call-now-d24e798e6ecdde0cd2e6b3ca9f8356c6.yaml new file mode 100644 index 0000000000..37492e3459 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-call-now-d24e798e6ecdde0cd2e6b3ca9f8356c6.yaml @@ -0,0 +1,58 @@ +id: easy-call-now-d24e798e6ecdde0cd2e6b3ca9f8356c6 + +info: + name: > + Easy Call Now by ThikShare <= 1.1.0 - Cross-Site Request Forgery via settings_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bd8c4e5-ef53-47e8-8658-291509e9b987?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-call-now/" + google-query: inurl:"/wp-content/plugins/easy-call-now/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-call-now,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-call-now/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-call-now" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-captcha-20715ecda27605f90ac0c1717bd4bb1b.yaml b/nuclei-templates/cve-less/plugins/easy-captcha-20715ecda27605f90ac0c1717bd4bb1b.yaml new file mode 100644 index 0000000000..5826f6ec88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-captcha-20715ecda27605f90ac0c1717bd4bb1b.yaml @@ -0,0 +1,58 @@ +id: easy-captcha-20715ecda27605f90ac0c1717bd4bb1b + +info: + name: > + Easy Captcha <= 1.0 - Missing Authorization via easy_captcha_update_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8efe2ccf-33cb-4db3-bc3d-ead826adb7d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-captcha/" + google-query: inurl:"/wp-content/plugins/easy-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-captcha,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-captcha-b7a34904a121ea28e68ab7539af86648.yaml b/nuclei-templates/cve-less/plugins/easy-captcha-b7a34904a121ea28e68ab7539af86648.yaml new file mode 100644 index 0000000000..25902877ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-captcha-b7a34904a121ea28e68ab7539af86648.yaml @@ -0,0 +1,58 @@ +id: easy-captcha-b7a34904a121ea28e68ab7539af86648 + +info: + name: > + Easy Captcha <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd73cf64-289d-4401-bef7-9a4398a85055?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-captcha/" + google-query: inurl:"/wp-content/plugins/easy-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-career-openings-2dcf73eb82f83432e780c74c23beb2a4.yaml b/nuclei-templates/cve-less/plugins/easy-career-openings-2dcf73eb82f83432e780c74c23beb2a4.yaml new file mode 100644 index 0000000000..c52140797b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-career-openings-2dcf73eb82f83432e780c74c23beb2a4.yaml @@ -0,0 +1,58 @@ +id: easy-career-openings-2dcf73eb82f83432e780c74c23beb2a4 + +info: + name: > + Easy Career Opening <= 0.4 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d541f86a-744e-498e-bfab-b1a917c6ac49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-career-openings/" + google-query: inurl:"/wp-content/plugins/easy-career-openings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-career-openings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-career-openings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-career-openings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-career-openings-7367b780672b9eb9abb37fcbb3fea6b1.yaml b/nuclei-templates/cve-less/plugins/easy-career-openings-7367b780672b9eb9abb37fcbb3fea6b1.yaml new file mode 100644 index 0000000000..60b8402894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-career-openings-7367b780672b9eb9abb37fcbb3fea6b1.yaml @@ -0,0 +1,58 @@ +id: easy-career-openings-7367b780672b9eb9abb37fcbb3fea6b1 + +info: + name: > + Easy Career Openings <= 0.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c97b31bc-75d6-40af-bf4a-714ea69d2c28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-career-openings/" + google-query: inurl:"/wp-content/plugins/easy-career-openings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-career-openings,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-career-openings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-career-openings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-code-snippets-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-code-snippets-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..693b71872a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-code-snippets-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-code-snippets-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-code-snippets/" + google-query: inurl:"/wp-content/plugins/easy-code-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-code-snippets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-code-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-code-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-code-snippets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/easy-code-snippets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..474e3c71d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-code-snippets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: easy-code-snippets-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-code-snippets/" + google-query: inurl:"/wp-content/plugins/easy-code-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-code-snippets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-code-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-code-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-coming-soon-4b7a2f690ab23a9c56fa493203cfb340.yaml b/nuclei-templates/cve-less/plugins/easy-coming-soon-4b7a2f690ab23a9c56fa493203cfb340.yaml new file mode 100644 index 0000000000..9d784177d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-coming-soon-4b7a2f690ab23a9c56fa493203cfb340.yaml @@ -0,0 +1,58 @@ +id: easy-coming-soon-4b7a2f690ab23a9c56fa493203cfb340 + +info: + name: > + Easy Coming Soon <= 2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e46139c8-dd7e-4904-81b2-283952cea9b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-coming-soon/" + google-query: inurl:"/wp-content/plugins/easy-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-coming-soon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-coming-soon-a73a6cac5bd5a80c6a22adb8c250c687.yaml b/nuclei-templates/cve-less/plugins/easy-coming-soon-a73a6cac5bd5a80c6a22adb8c250c687.yaml new file mode 100644 index 0000000000..8064031845 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-coming-soon-a73a6cac5bd5a80c6a22adb8c250c687.yaml @@ -0,0 +1,58 @@ +id: easy-coming-soon-a73a6cac5bd5a80c6a22adb8c250c687 + +info: + name: > + Easy Coming Soon <= 1.6.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1053ff60-469f-4940-a865-35ed28fc769a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-coming-soon/" + google-query: inurl:"/wp-content/plugins/easy-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-coming-soon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-coming-soon-ea0ca66e9eeeaa433f8d74bce5e52c45.yaml b/nuclei-templates/cve-less/plugins/easy-coming-soon-ea0ca66e9eeeaa433f8d74bce5e52c45.yaml new file mode 100644 index 0000000000..120ad7abd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-coming-soon-ea0ca66e9eeeaa433f8d74bce5e52c45.yaml @@ -0,0 +1,58 @@ +id: easy-coming-soon-ea0ca66e9eeeaa433f8d74bce5e52c45 + +info: + name: > + Easy Coming Soon < 1.8.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c12538bc-6e7d-4d47-8e5b-65574ed26ec4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-coming-soon/" + google-query: inurl:"/wp-content/plugins/easy-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-coming-soon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-contact-form-pro-7ddd7913775f2842bdb03b5dd83ed7fe.yaml b/nuclei-templates/cve-less/plugins/easy-contact-form-pro-7ddd7913775f2842bdb03b5dd83ed7fe.yaml new file mode 100644 index 0000000000..4ee707427c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-contact-form-pro-7ddd7913775f2842bdb03b5dd83ed7fe.yaml @@ -0,0 +1,58 @@ +id: easy-contact-form-pro-7ddd7913775f2842bdb03b5dd83ed7fe + +info: + name: > + Easy Contact Form Pro < 1.1.1.9 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10ede689-4434-47fc-bf94-ca6da678ae01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-contact-form-pro/" + google-query: inurl:"/wp-content/plugins/easy-contact-form-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-contact-form-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-contact-form-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-contact-form-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-contact-form-solution-ec82173ebd40f930fa2890b83a9358a8.yaml b/nuclei-templates/cve-less/plugins/easy-contact-form-solution-ec82173ebd40f930fa2890b83a9358a8.yaml new file mode 100644 index 0000000000..a2ee7016a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-contact-form-solution-ec82173ebd40f930fa2890b83a9358a8.yaml @@ -0,0 +1,58 @@ +id: easy-contact-form-solution-ec82173ebd40f930fa2890b83a9358a8 + +info: + name: > + Easy Contact Form Solution <= 1.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02b9a40a-2fb6-4d75-b4b4-a83b95df90e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-contact-form-solution/" + google-query: inurl:"/wp-content/plugins/easy-contact-form-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-contact-form-solution,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-contact-form-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-contact-form-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-cookie-law-5d8f13ec518cdd664ccdf095210c75bb.yaml b/nuclei-templates/cve-less/plugins/easy-cookie-law-5d8f13ec518cdd664ccdf095210c75bb.yaml new file mode 100644 index 0000000000..0795c8c305 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-cookie-law-5d8f13ec518cdd664ccdf095210c75bb.yaml @@ -0,0 +1,58 @@ +id: easy-cookie-law-5d8f13ec518cdd664ccdf095210c75bb + +info: + name: > + Easy Cookie Law <= 3.1 - Cross-Site Request Forgery via 'ecl_options' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40487921-b9eb-4a18-b6f5-194611d2ef82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-cookie-law/" + google-query: inurl:"/wp-content/plugins/easy-cookie-law/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-cookie-law,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-cookie-law/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-cookie-law" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-cookies-policy-217c5fbd6c523ea432120eff4f82682f.yaml b/nuclei-templates/cve-less/plugins/easy-cookies-policy-217c5fbd6c523ea432120eff4f82682f.yaml new file mode 100644 index 0000000000..79ef3514c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-cookies-policy-217c5fbd6c523ea432120eff4f82682f.yaml @@ -0,0 +1,58 @@ +id: easy-cookies-policy-217c5fbd6c523ea432120eff4f82682f + +info: + name: > + Easy Cookies Policy <= 1.6.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8f7a00e-9cb4-4640-bda9-0cd7341d0c41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-cookies-policy/" + google-query: inurl:"/wp-content/plugins/easy-cookies-policy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-cookies-policy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-cookies-policy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-cookies-policy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-countdowner-13544ef8fd49a172f51f21a85f5f216f.yaml b/nuclei-templates/cve-less/plugins/easy-countdowner-13544ef8fd49a172f51f21a85f5f216f.yaml new file mode 100644 index 0000000000..e09b22623c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-countdowner-13544ef8fd49a172f51f21a85f5f216f.yaml @@ -0,0 +1,58 @@ +id: easy-countdowner-13544ef8fd49a172f51f21a85f5f216f + +info: + name: > + Easy CountDowner <= 1.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39c751c7-0480-4b92-bebb-a69114d79378?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-countdowner/" + google-query: inurl:"/wp-content/plugins/easy-countdowner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-countdowner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-countdowner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-countdowner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-custom-auto-excerpt-0574327d2925f2e5b1baa6cdafa54603.yaml b/nuclei-templates/cve-less/plugins/easy-custom-auto-excerpt-0574327d2925f2e5b1baa6cdafa54603.yaml new file mode 100644 index 0000000000..c722a0682d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-custom-auto-excerpt-0574327d2925f2e5b1baa6cdafa54603.yaml @@ -0,0 +1,58 @@ +id: easy-custom-auto-excerpt-0574327d2925f2e5b1baa6cdafa54603 + +info: + name: > + Easy Custom Auto Excerpt < 2.4.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32ca6e56-add9-4024-831f-5dfa5130a7d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-custom-auto-excerpt/" + google-query: inurl:"/wp-content/plugins/easy-custom-auto-excerpt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-custom-auto-excerpt,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-custom-auto-excerpt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-custom-auto-excerpt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-custom-auto-excerpt-8bbf318086664bbd3967cf3760be4186.yaml b/nuclei-templates/cve-less/plugins/easy-custom-auto-excerpt-8bbf318086664bbd3967cf3760be4186.yaml new file mode 100644 index 0000000000..0ec4c73acf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-custom-auto-excerpt-8bbf318086664bbd3967cf3760be4186.yaml @@ -0,0 +1,58 @@ +id: easy-custom-auto-excerpt-8bbf318086664bbd3967cf3760be4186 + +info: + name: > + Easy Custom Auto Excerpt <= 2.4.12 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c1e1fe4-23be-4f66-ae9f-cabb83811b71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-custom-auto-excerpt/" + google-query: inurl:"/wp-content/plugins/easy-custom-auto-excerpt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-custom-auto-excerpt,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-custom-auto-excerpt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-custom-auto-excerpt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-custom-js-and-css-0c5db1a026616a3fe0b1bcd649ed11ac.yaml b/nuclei-templates/cve-less/plugins/easy-custom-js-and-css-0c5db1a026616a3fe0b1bcd649ed11ac.yaml new file mode 100644 index 0000000000..f26d30bae8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-custom-js-and-css-0c5db1a026616a3fe0b1bcd649ed11ac.yaml @@ -0,0 +1,58 @@ +id: easy-custom-js-and-css-0c5db1a026616a3fe0b1bcd649ed11ac + +info: + name: > + Easy Custom JS And CSS <= 1.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d68ea19-9592-483a-a5fd-635819f9b863?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-custom-js-and-css/" + google-query: inurl:"/wp-content/plugins/easy-custom-js-and-css/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-custom-js-and-css,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-custom-js-and-css/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-custom-js-and-css" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-227b9ec56c4c7cc21d26de58db461ac5.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-227b9ec56c4c7cc21d26de58db461ac5.yaml new file mode 100644 index 0000000000..9aa818a733 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-227b9ec56c4c7cc21d26de58db461ac5.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-227b9ec56c4c7cc21d26de58db461ac5 + +info: + name: > + Easy Digital Downloads <= 3.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44777529-660f-4038-bbee-566ca3a8d24e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-3e264890774be501312d562a2e66b9a4.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-3e264890774be501312d562a2e66b9a4.yaml new file mode 100644 index 0000000000..79f36c1773 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-3e264890774be501312d562a2e66b9a4.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-3e264890774be501312d562a2e66b9a4 + +info: + name: > + Easy Digital Downloads <= 3.1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbce48b2-aa7c-4c92-8df8-ee3a17336e97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-47dc8b23e46c86e99fa06304aa8794ea.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-47dc8b23e46c86e99fa06304aa8794ea.yaml new file mode 100644 index 0000000000..820c0df62a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-47dc8b23e46c86e99fa06304aa8794ea.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-47dc8b23e46c86e99fa06304aa8794ea + +info: + name: > + Easy Digital Downloads 3.1 - 3.1.1.4.1 - Unauthenticated Arbitrary Password Reset to Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3e07c8-8fd0-4966-8276-aece794b75b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.1', '<= 3.1.1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-4ada8035109d6dc47e94b2c651edea20.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-4ada8035109d6dc47e94b2c651edea20.yaml new file mode 100644 index 0000000000..97f00e124f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-4ada8035109d6dc47e94b2c651edea20.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-4ada8035109d6dc47e94b2c651edea20 + +info: + name: > + Easy Digital Downloads (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/456f038c-85a4-426e-b9e0-3acf91f9b93a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.3', '<= 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-50401a72166a704fa2626edd9085598a.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-50401a72166a704fa2626edd9085598a.yaml new file mode 100644 index 0000000000..34c0b767a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-50401a72166a704fa2626edd9085598a.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-50401a72166a704fa2626edd9085598a + +info: + name: > + Easy Digital Downloads <= 3.1.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da94a7dc-f666-44fd-9f76-e610cbd2b610?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-54c8692b5e555318ec75bfc89238f380.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-54c8692b5e555318ec75bfc89238f380.yaml new file mode 100644 index 0000000000..608ab6d564 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-54c8692b5e555318ec75bfc89238f380.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-54c8692b5e555318ec75bfc89238f380 + +info: + name: > + Easy Digital Downloads < 3.1.0.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/508b6466-2786-4d6b-9ab2-772050af4803?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-58382c0384c54d2d71e941fcf6b84e29.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-58382c0384c54d2d71e941fcf6b84e29.yaml new file mode 100644 index 0000000000..67a62dea88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-58382c0384c54d2d71e941fcf6b84e29.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-58382c0384c54d2d71e941fcf6b84e29 + +info: + name: > + Easy Digital Downloads <= 3.1.0.1.1 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4966f96-713c-471f-8f36-55977a547f12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml new file mode 100644 index 0000000000..9b362387b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-58ad5ca81c9faa1c9bf4e8d6a87f5f2f + +info: + name: > + Easy Digital Downloads – Simple eCommerce for Selling Digital Files <= 2.9.15 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82259b54-0313-41a2-ace4-41e583b93e8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-592d413a31d24bf2ca8e9ee4d3ed0b4b.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-592d413a31d24bf2ca8e9ee4d3ed0b4b.yaml new file mode 100644 index 0000000000..d3c4a0bbaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-592d413a31d24bf2ca8e9ee4d3ed0b4b.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-592d413a31d24bf2ca8e9ee4d3ed0b4b + +info: + name: > + Easy Digital Downloads – Sell Digital Files & Subscriptions (eCommerce Store + Payments Made Easy) <= 3.2.9 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0837ba20-4b47-4cc8-9eb3-322289513d79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-5c1e1909a38a10b277a3614b15cb89af.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-5c1e1909a38a10b277a3614b15cb89af.yaml new file mode 100644 index 0000000000..64f507d6c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-5c1e1909a38a10b277a3614b15cb89af.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-5c1e1909a38a10b277a3614b15cb89af + +info: + name: > + Easy Digital Downloads – Simple eCommerce for Selling Digital Files <= 2.10.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a6b87a8-2ebf-4db6-bf09-e9642708b2aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-66c19845dbec142651f3cf03a994c153.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-66c19845dbec142651f3cf03a994c153.yaml new file mode 100644 index 0000000000..ac1be10a23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-66c19845dbec142651f3cf03a994c153.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-66c19845dbec142651f3cf03a994c153 + +info: + name: > + Easy Digital Downloads <= 3.1.1.4.2 - Cross-Site Request Forgery via edd_trigger_upgrades + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3adcb85-efc5-429c-8a06-9bfb472d668f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-6b70f3503530aa0d1601aef153ce564c.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-6b70f3503530aa0d1601aef153ce564c.yaml new file mode 100644 index 0000000000..04422f505e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-6b70f3503530aa0d1601aef153ce564c.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-6b70f3503530aa0d1601aef153ce564c + +info: + name: > + Easy Digital Downloads – Simple eCommerce for Selling Digital Files <= 2.3.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c6a4c5f-7a02-4c53-a0ba-a2c7f592a3a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-836a97e413451f2556144747548f5aed.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-836a97e413451f2556144747548f5aed.yaml new file mode 100644 index 0000000000..5d8d921442 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-836a97e413451f2556144747548f5aed.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-836a97e413451f2556144747548f5aed + +info: + name: > + Easy Digital Downloads <= 2.5.7 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4cd5c42-bba2-4900-b450-a575c0007402?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-8bf5f3c88eae040df5c93bb90ba373a1.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-8bf5f3c88eae040df5c93bb90ba373a1.yaml new file mode 100644 index 0000000000..4f4a991e43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-8bf5f3c88eae040df5c93bb90ba373a1.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-8bf5f3c88eae040df5c93bb90ba373a1 + +info: + name: > + Easy Digital Downloads <= 2.11.5 - Admin+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/301d273e-5cd2-49b8-b2ce-b30731ab4550?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-a03c78c6dbe166da7722da09ee707752.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-a03c78c6dbe166da7722da09ee707752.yaml new file mode 100644 index 0000000000..d75e00acf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-a03c78c6dbe166da7722da09ee707752.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-a03c78c6dbe166da7722da09ee707752 + +info: + name: > + Easy Digital Downloads <= 2.10.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0aa2a10-da05-41e4-bbfa-938341919b5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-a21c37325364d975a3c7e649a4cca551.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-a21c37325364d975a3c7e649a4cca551.yaml new file mode 100644 index 0000000000..5fffc2de1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-a21c37325364d975a3c7e649a4cca551.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-a21c37325364d975a3c7e649a4cca551 + +info: + name: > + Easy Digital Downloads <= 3.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d19a9c96-918f-4f19-82a9-badd5765cea3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-a5ae13191d707f6528df2db00d64b11b.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-a5ae13191d707f6528df2db00d64b11b.yaml new file mode 100644 index 0000000000..dc75a73da8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-a5ae13191d707f6528df2db00d64b11b.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-a5ae13191d707f6528df2db00d64b11b + +info: + name: > + Easy Digital Downloads <= 2.11.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14ad420b-df09-48de-8e36-d8edf0647837?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-a71d6df449db20ab9c26824728336769.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-a71d6df449db20ab9c26824728336769.yaml new file mode 100644 index 0000000000..6b82d1b47e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-a71d6df449db20ab9c26824728336769.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-a71d6df449db20ab9c26824728336769 + +info: + name: > + Easy Digital Downloads – Simple eCommerce for Selling Digital Files <= 2.3.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be60027e-9d6a-4740-b20c-6be3e115d9fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.3', '<= 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-b058df7a8fa1af7735771ea488135ed7.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-b058df7a8fa1af7735771ea488135ed7.yaml new file mode 100644 index 0000000000..a34c5511b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-b058df7a8fa1af7735771ea488135ed7.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-b058df7a8fa1af7735771ea488135ed7 + +info: + name: > + Easy Digital Downloads – Simple eCommerce for Selling Digital Files <= 2.11.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/670e92d6-4136-48f1-88d1-69a9fa772a65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-bc7e0ce97309f84318e7a566c436b814.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-bc7e0ce97309f84318e7a566c436b814.yaml new file mode 100644 index 0000000000..73f1678a4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-bc7e0ce97309f84318e7a566c436b814.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-bc7e0ce97309f84318e7a566c436b814 + +info: + name: > + Easy Digital Downloads <= 3.0.1 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1e563e1-5381-4353-aa09-b09971b830c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-bd2f40761a0dbf1803fa7290e415ab2f.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-bd2f40761a0dbf1803fa7290e415ab2f.yaml new file mode 100644 index 0000000000..b30bad7599 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-bd2f40761a0dbf1803fa7290e415ab2f.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-bd2f40761a0dbf1803fa7290e415ab2f + +info: + name: > + Easy Digital Downloads <= 2.11.7 - Cross-Site Request Forgery to Arbitrary Post Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea99795f-45fa-4d4c-a6bd-2197b58efcb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-c9e09cee2b4a638d5cce1b20a666e2e7.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-c9e09cee2b4a638d5cce1b20a666e2e7.yaml new file mode 100644 index 0000000000..09041f06b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-c9e09cee2b4a638d5cce1b20a666e2e7.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-c9e09cee2b4a638d5cce1b20a666e2e7 + +info: + name: > + Easy Digital Downloads <= 2.10.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5226241-dbf4-42e5-b9f4-77da125fa810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-da73522010deacccd257b4e9a1315635.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-da73522010deacccd257b4e9a1315635.yaml new file mode 100644 index 0000000000..88352c5275 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-da73522010deacccd257b4e9a1315635.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-da73522010deacccd257b4e9a1315635 + +info: + name: > + Easy Digital Downloads <= 3.2.6 - Authenticated(Shop Manager+) Stored Cross-Site Scripting via variable pricing options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ec207cd-cae5-4950-bbc8-d28f108b4ae7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-f04987be0566d1eab3eaf27afc6eec08.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-f04987be0566d1eab3eaf27afc6eec08.yaml new file mode 100644 index 0000000000..6c62d63557 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-f04987be0566d1eab3eaf27afc6eec08.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-f04987be0566d1eab3eaf27afc6eec08 + +info: + name: > + Easy Digital Downloads <= 2.11.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56a362f3-dc4e-454d-9d94-9f4cb540d4b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-digital-downloads-htaccess-editor-c7caaada028e0b85fc2ec25ebcdc9cfe.yaml b/nuclei-templates/cve-less/plugins/easy-digital-downloads-htaccess-editor-c7caaada028e0b85fc2ec25ebcdc9cfe.yaml new file mode 100644 index 0000000000..5a23110a17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-digital-downloads-htaccess-editor-c7caaada028e0b85fc2ec25ebcdc9cfe.yaml @@ -0,0 +1,58 @@ +id: easy-digital-downloads-htaccess-editor-c7caaada028e0b85fc2ec25ebcdc9cfe + +info: + name: > + Easy Digital Downloads – htaccess Editor < 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/090c1ba1-1b73-4c83-a17f-993293c5621b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-digital-downloads-htaccess-editor/" + google-query: inurl:"/wp-content/plugins/easy-digital-downloads-htaccess-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-digital-downloads-htaccess-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-digital-downloads-htaccess-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-digital-downloads-htaccess-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-event-calendar-35d6cb483985201ac59c669cec20a881.yaml b/nuclei-templates/cve-less/plugins/easy-event-calendar-35d6cb483985201ac59c669cec20a881.yaml new file mode 100644 index 0000000000..48cea43c24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-event-calendar-35d6cb483985201ac59c669cec20a881.yaml @@ -0,0 +1,58 @@ +id: easy-event-calendar-35d6cb483985201ac59c669cec20a881 + +info: + name: > + Easy Event calendar <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57dda8e6-54d1-41db-a54d-4a5d635e23b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-event-calendar/" + google-query: inurl:"/wp-content/plugins/easy-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-event-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-like-box-97fb5b5839a832ac7ff02fb0d708c5d7.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-like-box-97fb5b5839a832ac7ff02fb0d708c5d7.yaml new file mode 100644 index 0000000000..f48b9ca0e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-like-box-97fb5b5839a832ac7ff02fb0d708c5d7.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-like-box-97fb5b5839a832ac7ff02fb0d708c5d7 + +info: + name: > + Easy Social Box / Page Plugin <= 4.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f051566-ac84-4ab6-b0ce-4dbcafc09d67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-like-box/" + google-query: inurl:"/wp-content/plugins/easy-facebook-like-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-like-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-like-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-like-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-09160f3fbb1916544cfbb6eb640a286b.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-09160f3fbb1916544cfbb6eb640a286b.yaml new file mode 100644 index 0000000000..db800299bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-09160f3fbb1916544cfbb6eb640a286b.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-09160f3fbb1916544cfbb6eb640a286b + +info: + name: > + Easy Social Feed <= 6.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aaf62045-b9ce-40d7-92b3-7ab683e5a08c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-308ac408c3111d0f21a07a5be08fe876.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-308ac408c3111d0f21a07a5be08fe876.yaml new file mode 100644 index 0000000000..1d3afe0f8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-308ac408c3111d0f21a07a5be08fe876.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-308ac408c3111d0f21a07a5be08fe876 + +info: + name: > + Easy Social Feed <= 6.5.1 - Missing Authorization via hide_free_sidebar() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4ffb3ef-9d77-463f-92c4-4bc799ac16aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-455ef09d7d7d2085e1e76af071d802ad.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-455ef09d7d7d2085e1e76af071d802ad.yaml new file mode 100644 index 0000000000..a178fe3be3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-455ef09d7d7d2085e1e76af071d802ad.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-455ef09d7d7d2085e1e76af071d802ad + +info: + name: > + Easy Social Feed <= 6.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a586bab-df87-4e21-9b05-994c4fc991de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-566c183277ddddc5541276b2514b770a.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-566c183277ddddc5541276b2514b770a.yaml new file mode 100644 index 0000000000..7eb1573284 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-566c183277ddddc5541276b2514b770a.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-566c183277ddddc5541276b2514b770a + +info: + name: > + Easy Social Feed <= 6.5.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9381244-5ab9-4927-8e18-d6030a399d7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-5e1243e1e25d813c82b94fbe494798e2.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-5e1243e1e25d813c82b94fbe494798e2.yaml new file mode 100644 index 0000000000..a2006912f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-5e1243e1e25d813c82b94fbe494798e2.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-5e1243e1e25d813c82b94fbe494798e2 + +info: + name: > + Easy Social Feed <= 6.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via fb_appid + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ce726da-4860-4809-b579-9ec0d31a2fb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-6a4b9abd38157d4627731558a0b86be9.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-6a4b9abd38157d4627731558a0b86be9.yaml new file mode 100644 index 0000000000..bffb44f7ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-6a4b9abd38157d4627731558a0b86be9.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-6a4b9abd38157d4627731558a0b86be9 + +info: + name: > + Easy Social Feed <= 6.5.2 - Missing Authorization to Settings Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3deee9b5-2e36-447d-a492-e22e3dc6a5ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-6fdd9a10958cc151010736328ad8d63f.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-6fdd9a10958cc151010736328ad8d63f.yaml new file mode 100644 index 0000000000..a1bbd8ce45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-6fdd9a10958cc151010736328ad8d63f.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-6fdd9a10958cc151010736328ad8d63f + +info: + name: > + Easy Social Feed <= 6.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/262dcea7-3ac4-43ee-90d7-91f200c3496c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-7e2aa27b61aaa1e5ca65bdc32112a6a9.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-7e2aa27b61aaa1e5ca65bdc32112a6a9.yaml new file mode 100644 index 0000000000..3755ef4c28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-7e2aa27b61aaa1e5ca65bdc32112a6a9.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-7e2aa27b61aaa1e5ca65bdc32112a6a9 + +info: + name: > + Easy Social Feed – Social Photos Gallery – Post Feed – Like Box <= 6.5.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b76bddf3-96ad-4bb0-a37b-33b451da6713?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f559ab1b10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-dcded48546674d8a7147bd7b9ee5af2d.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-dcded48546674d8a7147bd7b9ee5af2d.yaml new file mode 100644 index 0000000000..bd3786cf3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-dcded48546674d8a7147bd7b9ee5af2d.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-dcded48546674d8a7147bd7b9ee5af2d + +info: + name: > + Easy Social Feed <= 6.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24c7e7da-39b4-4969-b24f-be7a8628236b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-facebook-likebox-f32c6b2b7d3eb58c4682087aa288b3f1.yaml b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-f32c6b2b7d3eb58c4682087aa288b3f1.yaml new file mode 100644 index 0000000000..011d82800b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-facebook-likebox-f32c6b2b7d3eb58c4682087aa288b3f1.yaml @@ -0,0 +1,58 @@ +id: easy-facebook-likebox-f32c6b2b7d3eb58c4682087aa288b3f1 + +info: + name: > + Easy Social Feed <= 6.3.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7df85c11-6308-4b23-8c41-eea6bff5ca50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/easy-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-fancybox-192f3751511f8b242f0945f1aac116aa.yaml b/nuclei-templates/cve-less/plugins/easy-fancybox-192f3751511f8b242f0945f1aac116aa.yaml new file mode 100644 index 0000000000..0a96f4531d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-fancybox-192f3751511f8b242f0945f1aac116aa.yaml @@ -0,0 +1,58 @@ +id: easy-fancybox-192f3751511f8b242f0945f1aac116aa + +info: + name: > + Easy Fancybox <= 1.8.17 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b85306d-ffb6-487d-a981-6fc04b27e751?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-fancybox/" + google-query: inurl:"/wp-content/plugins/easy-fancybox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-fancybox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-fancybox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-fancybox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-faq-with-expanding-text-7ed4275b69b36875b8deb7c4de847800.yaml b/nuclei-templates/cve-less/plugins/easy-faq-with-expanding-text-7ed4275b69b36875b8deb7c4de847800.yaml new file mode 100644 index 0000000000..ba30985be9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-faq-with-expanding-text-7ed4275b69b36875b8deb7c4de847800.yaml @@ -0,0 +1,58 @@ +id: easy-faq-with-expanding-text-7ed4275b69b36875b8deb7c4de847800 + +info: + name: > + Easy FAQ with Expanding Text <= 3.2.8.3.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b20e5257-1fb7-40b4-8ad8-798372b60972?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-faq-with-expanding-text/" + google-query: inurl:"/wp-content/plugins/easy-faq-with-expanding-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-faq-with-expanding-text,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-faq-with-expanding-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-faq-with-expanding-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-form-2e8ccf164adc8951aa826c00f9317ffc.yaml b/nuclei-templates/cve-less/plugins/easy-form-2e8ccf164adc8951aa826c00f9317ffc.yaml new file mode 100644 index 0000000000..261bfeb19a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-form-2e8ccf164adc8951aa826c00f9317ffc.yaml @@ -0,0 +1,58 @@ +id: easy-form-2e8ccf164adc8951aa826c00f9317ffc + +info: + name: > + Easy Form by AYS <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/765b09ef-dd6d-4c4e-a381-7bb0dc8d6652?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-form/" + google-query: inurl:"/wp-content/plugins/easy-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-form-423b3ffaad4575c3793b54bac37f4ca7.yaml b/nuclei-templates/cve-less/plugins/easy-form-423b3ffaad4575c3793b54bac37f4ca7.yaml new file mode 100644 index 0000000000..ab7fcb49c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-form-423b3ffaad4575c3793b54bac37f4ca7.yaml @@ -0,0 +1,58 @@ +id: easy-form-423b3ffaad4575c3793b54bac37f4ca7 + +info: + name: > + Easy Form by AYS <= 1.3.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee595f48-b72f-4569-a248-7dbd0b9152ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-form/" + google-query: inurl:"/wp-content/plugins/easy-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-form-builder-9f2fa558a3b450f42672af408bb3b106.yaml b/nuclei-templates/cve-less/plugins/easy-form-builder-9f2fa558a3b450f42672af408bb3b106.yaml new file mode 100644 index 0000000000..551b7ff5e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-form-builder-9f2fa558a3b450f42672af408bb3b106.yaml @@ -0,0 +1,58 @@ +id: easy-form-builder-9f2fa558a3b450f42672af408bb3b106 + +info: + name: > + Easy Form Builder <= 3.3.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a018ba2b-8188-41f9-bdab-64cae3362e0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-form-builder/" + google-query: inurl:"/wp-content/plugins/easy-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-form-builder-bdcfb7f870a9c9d99dad2a66d5149c6d.yaml b/nuclei-templates/cve-less/plugins/easy-form-builder-bdcfb7f870a9c9d99dad2a66d5149c6d.yaml new file mode 100644 index 0000000000..b3f0017a0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-form-builder-bdcfb7f870a9c9d99dad2a66d5149c6d.yaml @@ -0,0 +1,58 @@ +id: easy-form-builder-bdcfb7f870a9c9d99dad2a66d5149c6d + +info: + name: > + Easy Form Builder <= 3.7.4 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4257d4ca-0e92-4d2f-b65b-dff9d7d48cb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-form-builder/" + google-query: inurl:"/wp-content/plugins/easy-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-form-builder-by-bitware-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml b/nuclei-templates/cve-less/plugins/easy-form-builder-by-bitware-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml new file mode 100644 index 0000000000..81f5009610 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-form-builder-by-bitware-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml @@ -0,0 +1,58 @@ +id: easy-form-builder-by-bitware-1cdb0a1c4888e43e483d5ba8e84b6d9c + +info: + name: > + Easy Form Builder <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1af5f7be-cfe2-4e0b-ae84-e44095644d84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-form-builder-by-bitware/" + google-query: inurl:"/wp-content/plugins/easy-form-builder-by-bitware/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-form-builder-by-bitware,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-form-builder-by-bitware/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-form-builder-by-bitware" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-gallery-slideshow-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/easy-gallery-slideshow-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..f21730d251 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-gallery-slideshow-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: easy-gallery-slideshow-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-gallery-slideshow/" + google-query: inurl:"/wp-content/plugins/easy-gallery-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-gallery-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-gallery-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-gallery-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-google-analytics-for-wordpress-da9bd5e9b4433e9c21c5e76b9f3bc74b.yaml b/nuclei-templates/cve-less/plugins/easy-google-analytics-for-wordpress-da9bd5e9b4433e9c21c5e76b9f3bc74b.yaml new file mode 100644 index 0000000000..097b8d537d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-google-analytics-for-wordpress-da9bd5e9b4433e9c21c5e76b9f3bc74b.yaml @@ -0,0 +1,58 @@ +id: easy-google-analytics-for-wordpress-da9bd5e9b4433e9c21c5e76b9f3bc74b + +info: + name: > + Easy Google Analytics for WordPress <= 1.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37e707ef-fe66-4c21-9c37-7b65fb7690db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/easy-google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-google-analytics-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-google-map-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/easy-google-map-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..fb6123c072 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-google-map-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: easy-google-map-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-google-map/" + google-query: inurl:"/wp-content/plugins/easy-google-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-google-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-google-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-google-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-hide-login-5db1bc17d104f6fabd7d82e060cec486.yaml b/nuclei-templates/cve-less/plugins/easy-hide-login-5db1bc17d104f6fabd7d82e060cec486.yaml new file mode 100644 index 0000000000..ebdc0a246d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-hide-login-5db1bc17d104f6fabd7d82e060cec486.yaml @@ -0,0 +1,58 @@ +id: easy-hide-login-5db1bc17d104f6fabd7d82e060cec486 + +info: + name: > + Easy Hide Login <= 1.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42fff63c-62ec-466e-9a05-60d76f80039e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-hide-login/" + google-query: inurl:"/wp-content/plugins/easy-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-hide-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-hide-login-6046df75d04ba248b7035ff17b16ffc4.yaml b/nuclei-templates/cve-less/plugins/easy-hide-login-6046df75d04ba248b7035ff17b16ffc4.yaml new file mode 100644 index 0000000000..b13d07b8ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-hide-login-6046df75d04ba248b7035ff17b16ffc4.yaml @@ -0,0 +1,58 @@ +id: easy-hide-login-6046df75d04ba248b7035ff17b16ffc4 + +info: + name: > + Easy Hide Login <= 1.0.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/745cf98c-ad3a-4ec9-9ee8-ae817d5d7358?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-hide-login/" + google-query: inurl:"/wp-content/plugins/easy-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-hide-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-justified-gallery-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/easy-justified-gallery-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..d840c62487 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-justified-gallery-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: easy-justified-gallery-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-justified-gallery/" + google-query: inurl:"/wp-content/plugins/easy-justified-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-justified-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-justified-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-justified-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-login-styler-7876e3e9a0cea227500debf5d1a1674e.yaml b/nuclei-templates/cve-less/plugins/easy-login-styler-7876e3e9a0cea227500debf5d1a1674e.yaml new file mode 100644 index 0000000000..b8722cdb8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-login-styler-7876e3e9a0cea227500debf5d1a1674e.yaml @@ -0,0 +1,58 @@ +id: easy-login-styler-7876e3e9a0cea227500debf5d1a1674e + +info: + name: > + Easy Login Styler – White Label Admin Login Page for WordPress <= 1.0.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb65d61-c7e1-4884-8b10-a26df504724c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-login-styler/" + google-query: inurl:"/wp-content/plugins/easy-login-styler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-login-styler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-login-styler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-login-styler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-login-woocommerce-0f5164e7f48c30d96cada976fe71bf72.yaml b/nuclei-templates/cve-less/plugins/easy-login-woocommerce-0f5164e7f48c30d96cada976fe71bf72.yaml new file mode 100644 index 0000000000..2b3a227600 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-login-woocommerce-0f5164e7f48c30d96cada976fe71bf72.yaml @@ -0,0 +1,58 @@ +id: easy-login-woocommerce-0f5164e7f48c30d96cada976fe71bf72 + +info: + name: > + Login/Signup Popup ( Inline Form + Woocommerce ) <= 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b8ea0b1-5050-43fc-8b80-b6a501a607fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-login-woocommerce/" + google-query: inurl:"/wp-content/plugins/easy-login-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-login-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-login-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-login-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-login-woocommerce-16223cc2976f7faa5fb929bf7546e0a0.yaml b/nuclei-templates/cve-less/plugins/easy-login-woocommerce-16223cc2976f7faa5fb929bf7546e0a0.yaml new file mode 100644 index 0000000000..5c883bd369 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-login-woocommerce-16223cc2976f7faa5fb929bf7546e0a0.yaml @@ -0,0 +1,58 @@ +id: easy-login-woocommerce-16223cc2976f7faa5fb929bf7546e0a0 + +info: + name: > + Login/Signup Popup <= 2.2 - Cross-Site Request Forgery to Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc6d943d-32c0-45d7-9de9-b576199e6fe7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-login-woocommerce/" + google-query: inurl:"/wp-content/plugins/easy-login-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-login-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-login-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-login-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-login-woocommerce-b0368c6bddefa3eda18f57518ede7d9e.yaml b/nuclei-templates/cve-less/plugins/easy-login-woocommerce-b0368c6bddefa3eda18f57518ede7d9e.yaml new file mode 100644 index 0000000000..6f8a0bca06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-login-woocommerce-b0368c6bddefa3eda18f57518ede7d9e.yaml @@ -0,0 +1,58 @@ +id: easy-login-woocommerce-b0368c6bddefa3eda18f57518ede7d9e + +info: + name: > + Login/Signup Popup <= 2.3 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fa62b8f-1c2f-4bc9-9f2a-8b9765c2d30d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-login-woocommerce/" + google-query: inurl:"/wp-content/plugins/easy-login-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-login-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-login-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-login-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-login-woocommerce-eb7a1f00c95af7d29372c7231c49405b.yaml b/nuclei-templates/cve-less/plugins/easy-login-woocommerce-eb7a1f00c95af7d29372c7231c49405b.yaml new file mode 100644 index 0000000000..fe5ca04210 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-login-woocommerce-eb7a1f00c95af7d29372c7231c49405b.yaml @@ -0,0 +1,58 @@ +id: easy-login-woocommerce-eb7a1f00c95af7d29372c7231c49405b + +info: + name: > + Login/Signup Popup < 1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96d264fe-e7e1-4eec-b235-9d288bc5a22f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-login-woocommerce/" + google-query: inurl:"/wp-content/plugins/easy-login-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-login-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-login-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-login-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-maintenance-mode-coming-soon-c6f7d89996a803ee8eb7814d6f5734cd.yaml b/nuclei-templates/cve-less/plugins/easy-maintenance-mode-coming-soon-c6f7d89996a803ee8eb7814d6f5734cd.yaml new file mode 100644 index 0000000000..40b023b3dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-maintenance-mode-coming-soon-c6f7d89996a803ee8eb7814d6f5734cd.yaml @@ -0,0 +1,58 @@ +id: easy-maintenance-mode-coming-soon-c6f7d89996a803ee8eb7814d6f5734cd + +info: + name: > + Easy Maintenance Mode <= 1.4.2 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a12f472-0ae1-4c3c-b7e3-85f637fe58c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-maintenance-mode-coming-soon/" + google-query: inurl:"/wp-content/plugins/easy-maintenance-mode-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-maintenance-mode-coming-soon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-maintenance-mode-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-maintenance-mode-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-marijuana-age-verify-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-marijuana-age-verify-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..074468220e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-marijuana-age-verify-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-marijuana-age-verify-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-marijuana-age-verify/" + google-query: inurl:"/wp-content/plugins/easy-marijuana-age-verify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-marijuana-age-verify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-marijuana-age-verify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-marijuana-age-verify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-media-download-61b9b26895ba1396cd862550f59dfb02.yaml b/nuclei-templates/cve-less/plugins/easy-media-download-61b9b26895ba1396cd862550f59dfb02.yaml new file mode 100644 index 0000000000..a96ab9201b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-media-download-61b9b26895ba1396cd862550f59dfb02.yaml @@ -0,0 +1,58 @@ +id: easy-media-download-61b9b26895ba1396cd862550f59dfb02 + +info: + name: > + Easy Media Download <= 1.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7def307b-5788-4cb4-82a4-517c5c9fe500?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-media-download/" + google-query: inurl:"/wp-content/plugins/easy-media-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-media-download,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-media-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-media-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-media-download-91ba8b6ec0e7e434577621e62a4faeec.yaml b/nuclei-templates/cve-less/plugins/easy-media-download-91ba8b6ec0e7e434577621e62a4faeec.yaml new file mode 100644 index 0000000000..defd0f9415 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-media-download-91ba8b6ec0e7e434577621e62a4faeec.yaml @@ -0,0 +1,58 @@ +id: easy-media-download-91ba8b6ec0e7e434577621e62a4faeec + +info: + name: > + Easy Media Download <= 1.1.5 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1e38cdc-7bc5-4963-9ebe-efd6c6ea228d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-media-download/" + google-query: inurl:"/wp-content/plugins/easy-media-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-media-download,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-media-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-media-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-media-gallery-28fafed38b204e7345a98c45e56c485e.yaml b/nuclei-templates/cve-less/plugins/easy-media-gallery-28fafed38b204e7345a98c45e56c485e.yaml new file mode 100644 index 0000000000..47d5019839 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-media-gallery-28fafed38b204e7345a98c45e56c485e.yaml @@ -0,0 +1,58 @@ +id: easy-media-gallery-28fafed38b204e7345a98c45e56c485e + +info: + name: > + Gallery – Photo Albums Plugin < 1.2.29 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bf7a5c3-f30d-42d6-91f9-8eb11089a499?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-media-gallery/" + google-query: inurl:"/wp-content/plugins/easy-media-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-media-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-media-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-media-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-media-gallery-34f7f8a09e65787efd781e2d41901d93.yaml b/nuclei-templates/cve-less/plugins/easy-media-gallery-34f7f8a09e65787efd781e2d41901d93.yaml new file mode 100644 index 0000000000..891cccf235 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-media-gallery-34f7f8a09e65787efd781e2d41901d93.yaml @@ -0,0 +1,58 @@ +id: easy-media-gallery-34f7f8a09e65787efd781e2d41901d93 + +info: + name: > + Gallery – Photo Albums Plugin < 1.3.03 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e438a090-1a73-450d-9325-276e45eee9ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-media-gallery/" + google-query: inurl:"/wp-content/plugins/easy-media-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-media-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-media-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-media-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-media-gallery-e35ccf6a5d1ddada5f10422331d300df.yaml b/nuclei-templates/cve-less/plugins/easy-media-gallery-e35ccf6a5d1ddada5f10422331d300df.yaml new file mode 100644 index 0000000000..5bf2d3b23a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-media-gallery-e35ccf6a5d1ddada5f10422331d300df.yaml @@ -0,0 +1,58 @@ +id: easy-media-gallery-e35ccf6a5d1ddada5f10422331d300df + +info: + name: > + Gallery – Photo Albums Plugin < 1.3.47 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42030492-5802-42db-b88b-8a0f1552de12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-media-gallery/" + google-query: inurl:"/wp-content/plugins/easy-media-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-media-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-media-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-media-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-media-gallery-pro-9bee1adcf88eccf5bdf4a140784b69db.yaml b/nuclei-templates/cve-less/plugins/easy-media-gallery-pro-9bee1adcf88eccf5bdf4a140784b69db.yaml new file mode 100644 index 0000000000..b3cb065f94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-media-gallery-pro-9bee1adcf88eccf5bdf4a140784b69db.yaml @@ -0,0 +1,58 @@ +id: easy-media-gallery-pro-9bee1adcf88eccf5bdf4a140784b69db + +info: + name: > + Easy Media Gallery Pro <= 1.2.59 - Cross-Site Request Forgery and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35d80441-6cbe-4bd4-a891-a4a1d24c77ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-media-gallery-pro/" + google-query: inurl:"/wp-content/plugins/easy-media-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-media-gallery-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-media-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-media-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-media-replace-1f6ddf0ce56b9b9d3d870c2c339aeff1.yaml b/nuclei-templates/cve-less/plugins/easy-media-replace-1f6ddf0ce56b9b9d3d870c2c339aeff1.yaml new file mode 100644 index 0000000000..51fcca3aff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-media-replace-1f6ddf0ce56b9b9d3d870c2c339aeff1.yaml @@ -0,0 +1,58 @@ +id: easy-media-replace-1f6ddf0ce56b9b9d3d870c2c339aeff1 + +info: + name: > + Easy Media Replace <= 0.1.3 - Authenticated (Author+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abb4af63-37fe-49b7-8f70-ac9c7e47e939?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-media-replace/" + google-query: inurl:"/wp-content/plugins/easy-media-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-media-replace,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-media-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-media-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-modal-c2574a7a9b79ad452c99c332f592fe5f.yaml b/nuclei-templates/cve-less/plugins/easy-modal-c2574a7a9b79ad452c99c332f592fe5f.yaml new file mode 100644 index 0000000000..663b4f1aae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-modal-c2574a7a9b79ad452c99c332f592fe5f.yaml @@ -0,0 +1,58 @@ +id: easy-modal-c2574a7a9b79ad452c99c332f592fe5f + +info: + name: > + Easy Modal < 2.1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b82f5da-42ef-40b4-bfa4-26b88a3328db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-modal/" + google-query: inurl:"/wp-content/plugins/easy-modal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-modal,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-modal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-modal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-modal-f615078fb53a8f47f20c6cb2792c121c.yaml b/nuclei-templates/cve-less/plugins/easy-modal-f615078fb53a8f47f20c6cb2792c121c.yaml new file mode 100644 index 0000000000..21d1e317c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-modal-f615078fb53a8f47f20c6cb2792c121c.yaml @@ -0,0 +1,58 @@ +id: easy-modal-f615078fb53a8f47f20c6cb2792c121c + +info: + name: > + Easy Modal < 2.1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4757590a-f5dc-48d6-aef1-80158f728b6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-modal/" + google-query: inurl:"/wp-content/plugins/easy-modal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-modal,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-modal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-modal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-newsletter-signups-2b77677bf3f1770d1f2637876cb7abee.yaml b/nuclei-templates/cve-less/plugins/easy-newsletter-signups-2b77677bf3f1770d1f2637876cb7abee.yaml new file mode 100644 index 0000000000..e4708febfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-newsletter-signups-2b77677bf3f1770d1f2637876cb7abee.yaml @@ -0,0 +1,58 @@ +id: easy-newsletter-signups-2b77677bf3f1770d1f2637876cb7abee + +info: + name: > + Easy Newsletter Signups <= 1.0.4 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2799c74a-4ebf-4996-b681-08c32bf07114?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-newsletter-signups/" + google-query: inurl:"/wp-content/plugins/easy-newsletter-signups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-newsletter-signups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-newsletter-signups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-newsletter-signups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-newsletter-signups-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-newsletter-signups-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c43e2dd8ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-newsletter-signups-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-newsletter-signups-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-newsletter-signups/" + google-query: inurl:"/wp-content/plugins/easy-newsletter-signups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-newsletter-signups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-newsletter-signups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-newsletter-signups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-newsletter-signups-e1e05c3d687b12217db0b7b57b7d94d7.yaml b/nuclei-templates/cve-less/plugins/easy-newsletter-signups-e1e05c3d687b12217db0b7b57b7d94d7.yaml new file mode 100644 index 0000000000..69b64992bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-newsletter-signups-e1e05c3d687b12217db0b7b57b7d94d7.yaml @@ -0,0 +1,58 @@ +id: easy-newsletter-signups-e1e05c3d687b12217db0b7b57b7d94d7 + +info: + name: > + Easy Newsletter Signups <= 1.0.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/288946ae-6e58-42e6-89d1-8951539728d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-newsletter-signups/" + google-query: inurl:"/wp-content/plugins/easy-newsletter-signups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-newsletter-signups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-newsletter-signups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-newsletter-signups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-org-chart-c452417a821be37f2cab44c35d2fb224.yaml b/nuclei-templates/cve-less/plugins/easy-org-chart-c452417a821be37f2cab44c35d2fb224.yaml new file mode 100644 index 0000000000..34a532f895 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-org-chart-c452417a821be37f2cab44c35d2fb224.yaml @@ -0,0 +1,58 @@ +id: easy-org-chart-c452417a821be37f2cab44c35d2fb224 + +info: + name: > + Easy Org Chart <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43d141e3-1e62-4126-b914-bdc98577de3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-org-chart/" + google-query: inurl:"/wp-content/plugins/easy-org-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-org-chart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-org-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-org-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-panorama-0fb85e5ea92cfc0152cd39c07cc97431.yaml b/nuclei-templates/cve-less/plugins/easy-panorama-0fb85e5ea92cfc0152cd39c07cc97431.yaml new file mode 100644 index 0000000000..c4c305865b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-panorama-0fb85e5ea92cfc0152cd39c07cc97431.yaml @@ -0,0 +1,58 @@ +id: easy-panorama-0fb85e5ea92cfc0152cd39c07cc97431 + +info: + name: > + Easy Panorama <= 1.1.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/783829c2-fe09-44a1-bbb5-2a694ad816ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-panorama/" + google-query: inurl:"/wp-content/plugins/easy-panorama/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-panorama,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-panorama/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-panorama" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-paypal-donation-00976904f98e30f11e675f02667fdeb3.yaml b/nuclei-templates/cve-less/plugins/easy-paypal-donation-00976904f98e30f11e675f02667fdeb3.yaml new file mode 100644 index 0000000000..c625bb78df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-paypal-donation-00976904f98e30f11e675f02667fdeb3.yaml @@ -0,0 +1,58 @@ +id: easy-paypal-donation-00976904f98e30f11e675f02667fdeb3 + +info: + name: > + Accept Donations with PayPal <= 1.3.3 - Arbitrary Post Deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/641e52d1-d046-4c15-9624-3b1919cd674f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-paypal-donation/" + google-query: inurl:"/wp-content/plugins/easy-paypal-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-paypal-donation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-paypal-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-paypal-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-paypal-donation-516b66dc7087b091ef77c6757e58f44f.yaml b/nuclei-templates/cve-less/plugins/easy-paypal-donation-516b66dc7087b091ef77c6757e58f44f.yaml new file mode 100644 index 0000000000..aa2cfa3567 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-paypal-donation-516b66dc7087b091ef77c6757e58f44f.yaml @@ -0,0 +1,58 @@ +id: easy-paypal-donation-516b66dc7087b091ef77c6757e58f44f + +info: + name: > + Accept Donations with PayPal <= 1.3 - Reflected Cross-Site Scripting via Page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38f536ae-70b7-4882-8a61-609d774a68db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-paypal-donation/" + google-query: inurl:"/wp-content/plugins/easy-paypal-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-paypal-donation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-paypal-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-paypal-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-paypal-donation-83b7e3214e301bc8ce0a2ff3a2e28649.yaml b/nuclei-templates/cve-less/plugins/easy-paypal-donation-83b7e3214e301bc8ce0a2ff3a2e28649.yaml new file mode 100644 index 0000000000..eeff144894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-paypal-donation-83b7e3214e301bc8ce0a2ff3a2e28649.yaml @@ -0,0 +1,58 @@ +id: easy-paypal-donation-83b7e3214e301bc8ce0a2ff3a2e28649 + +info: + name: > + Paypal Donation <= 1.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0ec4f27-2057-468e-bfcd-818c50952cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-paypal-donation/" + google-query: inurl:"/wp-content/plugins/easy-paypal-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-paypal-donation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-paypal-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-paypal-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-paypal-donation-89760f3ab457772708d08bbbb7ce1092.yaml b/nuclei-templates/cve-less/plugins/easy-paypal-donation-89760f3ab457772708d08bbbb7ce1092.yaml new file mode 100644 index 0000000000..20af818e5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-paypal-donation-89760f3ab457772708d08bbbb7ce1092.yaml @@ -0,0 +1,58 @@ +id: easy-paypal-donation-89760f3ab457772708d08bbbb7ce1092 + +info: + name: > + Paypal Donation <= 1.3.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d7860bf-3f3d-4bd2-82b0-7bb94d00ff30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-paypal-donation/" + google-query: inurl:"/wp-content/plugins/easy-paypal-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-paypal-donation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-paypal-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-paypal-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-paypal-donation-96fff1abfd750f8db5e7b15f8178a35a.yaml b/nuclei-templates/cve-less/plugins/easy-paypal-donation-96fff1abfd750f8db5e7b15f8178a35a.yaml new file mode 100644 index 0000000000..0279ccd592 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-paypal-donation-96fff1abfd750f8db5e7b15f8178a35a.yaml @@ -0,0 +1,58 @@ +id: easy-paypal-donation-96fff1abfd750f8db5e7b15f8178a35a + +info: + name: > + Accept Donations with PayPal <= 1.3.0 Cross-Site Request Forgery to Post Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7220537-aad0-48e0-81f1-7104ec15ffbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-paypal-donation/" + google-query: inurl:"/wp-content/plugins/easy-paypal-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-paypal-donation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-paypal-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-paypal-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-paypal-events-tickets-68062d9660942c9a08865e495ee36651.yaml b/nuclei-templates/cve-less/plugins/easy-paypal-events-tickets-68062d9660942c9a08865e495ee36651.yaml new file mode 100644 index 0000000000..2d1fb06da6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-paypal-events-tickets-68062d9660942c9a08865e495ee36651.yaml @@ -0,0 +1,58 @@ +id: easy-paypal-events-tickets-68062d9660942c9a08865e495ee36651 + +info: + name: > + Easy PayPal Events <= 1.1.6 - Reflected Cross-Site Scripting via Page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/387515f7-5c03-4902-9671-3ea9f6a1a66b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-paypal-events-tickets/" + google-query: inurl:"/wp-content/plugins/easy-paypal-events-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-paypal-events-tickets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-paypal-events-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-paypal-events-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-paypal-shopping-cart-6956ece992f5fba93947f810cb6c0062.yaml b/nuclei-templates/cve-less/plugins/easy-paypal-shopping-cart-6956ece992f5fba93947f810cb6c0062.yaml new file mode 100644 index 0000000000..b43596d9e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-paypal-shopping-cart-6956ece992f5fba93947f810cb6c0062.yaml @@ -0,0 +1,58 @@ +id: easy-paypal-shopping-cart-6956ece992f5fba93947f810cb6c0062 + +info: + name: > + Easy PayPal Shopping Cart <= 1.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf6e3552-9616-4da1-8d8e-a6144ba1d0a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-paypal-shopping-cart/" + google-query: inurl:"/wp-content/plugins/easy-paypal-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-paypal-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-paypal-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-paypal-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-paypal-shopping-cart-db5362134a2d7eadd5e40de928930826.yaml b/nuclei-templates/cve-less/plugins/easy-paypal-shopping-cart-db5362134a2d7eadd5e40de928930826.yaml new file mode 100644 index 0000000000..15cc242ef5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-paypal-shopping-cart-db5362134a2d7eadd5e40de928930826.yaml @@ -0,0 +1,58 @@ +id: easy-paypal-shopping-cart-db5362134a2d7eadd5e40de928930826 + +info: + name: > + Easy PayPal Shopping Cart <= 1.1.9 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6045475f-f95a-4618-82ed-e42637d1c1d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-paypal-shopping-cart/" + google-query: inurl:"/wp-content/plugins/easy-paypal-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-paypal-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-paypal-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-paypal-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-pdf-restaurant-menu-upload-40be5fedd5539e32999075c425fecfed.yaml b/nuclei-templates/cve-less/plugins/easy-pdf-restaurant-menu-upload-40be5fedd5539e32999075c425fecfed.yaml new file mode 100644 index 0000000000..900537c0a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-pdf-restaurant-menu-upload-40be5fedd5539e32999075c425fecfed.yaml @@ -0,0 +1,58 @@ +id: easy-pdf-restaurant-menu-upload-40be5fedd5539e32999075c425fecfed + +info: + name: > + Easy restaurant menu manager <= 1.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/816573b7-e720-4470-a929-a6cad0d73dc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-pdf-restaurant-menu-upload/" + google-query: inurl:"/wp-content/plugins/easy-pdf-restaurant-menu-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-pdf-restaurant-menu-upload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-pdf-restaurant-menu-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-pdf-restaurant-menu-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-photo-album-a16becf994c4a5d0fc37834e1a2c1f32.yaml b/nuclei-templates/cve-less/plugins/easy-photo-album-a16becf994c4a5d0fc37834e1a2c1f32.yaml new file mode 100644 index 0000000000..b80755ddd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-photo-album-a16becf994c4a5d0fc37834e1a2c1f32.yaml @@ -0,0 +1,58 @@ +id: easy-photo-album-a16becf994c4a5d0fc37834e1a2c1f32 + +info: + name: > + Easy Photo Album <= 1.1.5 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40e09aec-48af-4bf9-9254-b34bad7008c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-photo-album/" + google-query: inurl:"/wp-content/plugins/easy-photo-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-photo-album,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-photo-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-photo-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-pie-coming-soon-8e2fcddafd26ffe986aba71521006509.yaml b/nuclei-templates/cve-less/plugins/easy-pie-coming-soon-8e2fcddafd26ffe986aba71521006509.yaml new file mode 100644 index 0000000000..f14e453888 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-pie-coming-soon-8e2fcddafd26ffe986aba71521006509.yaml @@ -0,0 +1,58 @@ +id: easy-pie-coming-soon-8e2fcddafd26ffe986aba71521006509 + +info: + name: > + EZP Coming Soon Page <= 1.0.7.3 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05614ee6-ce14-44fe-a819-8f116563dbdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-pie-coming-soon/" + google-query: inurl:"/wp-content/plugins/easy-pie-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-pie-coming-soon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-pie-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-pie-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-pie-coming-soon-f58f1d8f11140c3bf88a5bed98434fc1.yaml b/nuclei-templates/cve-less/plugins/easy-pie-coming-soon-f58f1d8f11140c3bf88a5bed98434fc1.yaml new file mode 100644 index 0000000000..0b43488962 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-pie-coming-soon-f58f1d8f11140c3bf88a5bed98434fc1.yaml @@ -0,0 +1,58 @@ +id: easy-pie-coming-soon-f58f1d8f11140c3bf88a5bed98434fc1 + +info: + name: > + Easy Pie Coming Soon < 1.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c7fa6ca-a573-4c84-af44-d9d799741728?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-pie-coming-soon/" + google-query: inurl:"/wp-content/plugins/easy-pie-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-pie-coming-soon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-pie-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-pie-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-pie-maintenance-mode-276fdddefb69d404e325809486a9c5a4.yaml b/nuclei-templates/cve-less/plugins/easy-pie-maintenance-mode-276fdddefb69d404e325809486a9c5a4.yaml new file mode 100644 index 0000000000..b355db0d93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-pie-maintenance-mode-276fdddefb69d404e325809486a9c5a4.yaml @@ -0,0 +1,58 @@ +id: easy-pie-maintenance-mode-276fdddefb69d404e325809486a9c5a4 + +info: + name: > + EZP Maintenance Mode <= 1.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac1239c9-72a6-44d8-911f-70a528c66c62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-pie-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/easy-pie-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-pie-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-pie-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-pie-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-popup-show-eb0df5a7745874fdf5ef88eb67a5ec63.yaml b/nuclei-templates/cve-less/plugins/easy-popup-show-eb0df5a7745874fdf5ef88eb67a5ec63.yaml new file mode 100644 index 0000000000..2a74fa9927 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-popup-show-eb0df5a7745874fdf5ef88eb67a5ec63.yaml @@ -0,0 +1,58 @@ +id: easy-popup-show-eb0df5a7745874fdf5ef88eb67a5ec63 + +info: + name: > + Easy PopUp Show <= 0.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28d622b3-e8a7-4a3b-9f0b-e344b085284d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-popup-show/" + google-query: inurl:"/wp-content/plugins/easy-popup-show/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-popup-show,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-popup-show/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-popup-show" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-post-types-75e8a53ab865623ebf98c15a4f6ef027.yaml b/nuclei-templates/cve-less/plugins/easy-post-types-75e8a53ab865623ebf98c15a4f6ef027.yaml new file mode 100644 index 0000000000..3cf6d061f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-post-types-75e8a53ab865623ebf98c15a4f6ef027.yaml @@ -0,0 +1,58 @@ +id: easy-post-types-75e8a53ab865623ebf98c15a4f6ef027 + +info: + name: > + WP Easy Post Types < 1.4.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63af18df-a3e4-48e6-be84-15d33edf3b46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-post-types/" + google-query: inurl:"/wp-content/plugins/easy-post-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-post-types,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-post-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-post-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-post-views-count-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-post-views-count-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c532514e4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-post-views-count-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-post-views-count-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-post-views-count/" + google-query: inurl:"/wp-content/plugins/easy-post-views-count/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-post-views-count,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-post-views-count/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-post-views-count" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-prayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-prayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..683e7b98f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-prayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-prayer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-prayer/" + google-query: inurl:"/wp-content/plugins/easy-prayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-prayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-prayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-prayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-preloader-8a961b077a643c6dcf8e7dd2b515541b.yaml b/nuclei-templates/cve-less/plugins/easy-preloader-8a961b077a643c6dcf8e7dd2b515541b.yaml new file mode 100644 index 0000000000..479b391ba0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-preloader-8a961b077a643c6dcf8e7dd2b515541b.yaml @@ -0,0 +1,58 @@ +id: easy-preloader-8a961b077a643c6dcf8e7dd2b515541b + +info: + name: > + Easy Preloader <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27f09e0e-ddd0-4440-9a58-a7fc60b49776?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-preloader/" + google-query: inurl:"/wp-content/plugins/easy-preloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-preloader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-preloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-preloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-pricing-tables-2c80874fb8fd4cd567be9f10e0fc4aab.yaml b/nuclei-templates/cve-less/plugins/easy-pricing-tables-2c80874fb8fd4cd567be9f10e0fc4aab.yaml new file mode 100644 index 0000000000..f4934d5069 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-pricing-tables-2c80874fb8fd4cd567be9f10e0fc4aab.yaml @@ -0,0 +1,58 @@ +id: easy-pricing-tables-2c80874fb8fd4cd567be9f10e0fc4aab + +info: + name: > + Easy Pricing Tables <= 3.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55b08fca-65af-4535-aa94-a9bfaef67b4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-pricing-tables/" + google-query: inurl:"/wp-content/plugins/easy-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-pricing-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-pricing-tables-8074409c2ea9229ad0a8c825dc05c21d.yaml b/nuclei-templates/cve-less/plugins/easy-pricing-tables-8074409c2ea9229ad0a8c825dc05c21d.yaml new file mode 100644 index 0000000000..e3fcb945cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-pricing-tables-8074409c2ea9229ad0a8c825dc05c21d.yaml @@ -0,0 +1,58 @@ +id: easy-pricing-tables-8074409c2ea9229ad0a8c825dc05c21d + +info: + name: > + Easy Pricing Tables <= 3.1.2 - Arbitrary Post Removal via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd64b4cb-955a-4942-9837-bdf0e6a1b48a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-pricing-tables/" + google-query: inurl:"/wp-content/plugins/easy-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-pricing-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-pricing-tables-99e94192bf6d19eb379533764c917cb6.yaml b/nuclei-templates/cve-less/plugins/easy-pricing-tables-99e94192bf6d19eb379533764c917cb6.yaml new file mode 100644 index 0000000000..3de10359f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-pricing-tables-99e94192bf6d19eb379533764c917cb6.yaml @@ -0,0 +1,58 @@ +id: easy-pricing-tables-99e94192bf6d19eb379533764c917cb6 + +info: + name: > + Easy Pricing Tables <= 3.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa51a7b8-be74-450f-afb8-6a6c5c8afaa4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-pricing-tables/" + google-query: inurl:"/wp-content/plugins/easy-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-pricing-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-pricing-tables-e4f1d5f5dc814ad4d0bdfba0ea143852.yaml b/nuclei-templates/cve-less/plugins/easy-pricing-tables-e4f1d5f5dc814ad4d0bdfba0ea143852.yaml new file mode 100644 index 0000000000..2dadabd517 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-pricing-tables-e4f1d5f5dc814ad4d0bdfba0ea143852.yaml @@ -0,0 +1,58 @@ +id: easy-pricing-tables-e4f1d5f5dc814ad4d0bdfba0ea143852 + +info: + name: > + Easy Pricing Tables <= 3.1.2 - Author+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f09584f9-7ea3-4cfb-bbdf-7ca241e64bb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-pricing-tables/" + google-query: inurl:"/wp-content/plugins/easy-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-pricing-tables,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-property-listings-19a8a46d3531a17a737d3cfe8d4f708e.yaml b/nuclei-templates/cve-less/plugins/easy-property-listings-19a8a46d3531a17a737d3cfe8d4f708e.yaml new file mode 100644 index 0000000000..bd1f2ca5a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-property-listings-19a8a46d3531a17a737d3cfe8d4f708e.yaml @@ -0,0 +1,58 @@ +id: easy-property-listings-19a8a46d3531a17a737d3cfe8d4f708e + +info: + name: > + Easy Property Listings <= 3.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8af7c85-977f-41aa-acbe-293dfa913577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-property-listings/" + google-query: inurl:"/wp-content/plugins/easy-property-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-property-listings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-property-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-property-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-property-listings-7e74a978e0fcd8ce34e332a78ac6415d.yaml b/nuclei-templates/cve-less/plugins/easy-property-listings-7e74a978e0fcd8ce34e332a78ac6415d.yaml new file mode 100644 index 0000000000..88ac7ef72a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-property-listings-7e74a978e0fcd8ce34e332a78ac6415d.yaml @@ -0,0 +1,58 @@ +id: easy-property-listings-7e74a978e0fcd8ce34e332a78ac6415d + +info: + name: > + Easy Property Listings <= 3.5.2 - Authenticated(Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7ac96db-2d9a-4eaf-8916-a02e3e64ca4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-property-listings/" + google-query: inurl:"/wp-content/plugins/easy-property-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-property-listings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-property-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-property-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-property-listings-e049cf9cff2a64ed7bf022044d018fad.yaml b/nuclei-templates/cve-less/plugins/easy-property-listings-e049cf9cff2a64ed7bf022044d018fad.yaml new file mode 100644 index 0000000000..63b2bfc2ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-property-listings-e049cf9cff2a64ed7bf022044d018fad.yaml @@ -0,0 +1,58 @@ +id: easy-property-listings-e049cf9cff2a64ed7bf022044d018fad + +info: + name: > + Easy Property Listings < 3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/516261b5-4356-40e1-9418-3243086bc1b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-property-listings/" + google-query: inurl:"/wp-content/plugins/easy-property-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-property-listings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-property-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-property-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-property-listings-f26d5492f0770f1b4f41cabb1dbfd120.yaml b/nuclei-templates/cve-less/plugins/easy-property-listings-f26d5492f0770f1b4f41cabb1dbfd120.yaml new file mode 100644 index 0000000000..afd32177fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-property-listings-f26d5492f0770f1b4f41cabb1dbfd120.yaml @@ -0,0 +1,58 @@ +id: easy-property-listings-f26d5492f0770f1b4f41cabb1dbfd120 + +info: + name: > + Easy Property Listings <= 3.5.3 - Missing Authorization via epl_update_listing_coordinates() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6647856b-19f2-475a-8d45-d33c7b3a8f92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-property-listings/" + google-query: inurl:"/wp-content/plugins/easy-property-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-property-listings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-property-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-property-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-redirect-manager-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml b/nuclei-templates/cve-less/plugins/easy-redirect-manager-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml new file mode 100644 index 0000000000..de21f8a6e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-redirect-manager-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml @@ -0,0 +1,58 @@ +id: easy-redirect-manager-ced2dcf72a4e26ecb3f884cfc4438e2f + +info: + name: > + Easy Redirect Manager <= 2.18.18 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e57ba2b-a95c-4410-9ba6-a66c6da36883?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-redirect-manager/" + google-query: inurl:"/wp-content/plugins/easy-redirect-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-redirect-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-redirect-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-redirect-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-registration-forms-1988ed1c56a6e8e4ba81a01e51929328.yaml b/nuclei-templates/cve-less/plugins/easy-registration-forms-1988ed1c56a6e8e4ba81a01e51929328.yaml new file mode 100644 index 0000000000..b4d3dc3cfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-registration-forms-1988ed1c56a6e8e4ba81a01e51929328.yaml @@ -0,0 +1,58 @@ +id: easy-registration-forms-1988ed1c56a6e8e4ba81a01e51929328 + +info: + name: > + Easy Registration Forms <= 2.0.6 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43a60896-3b88-4b36-b6d9-46812b8ba35b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-registration-forms/" + google-query: inurl:"/wp-content/plugins/easy-registration-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-registration-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-registration-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-registration-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-registration-forms-3cf0c7158d6fa6e72389913fb8e96f48.yaml b/nuclei-templates/cve-less/plugins/easy-registration-forms-3cf0c7158d6fa6e72389913fb8e96f48.yaml new file mode 100644 index 0000000000..f65fee7245 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-registration-forms-3cf0c7158d6fa6e72389913fb8e96f48.yaml @@ -0,0 +1,58 @@ +id: easy-registration-forms-3cf0c7158d6fa6e72389913fb8e96f48 + +info: + name: > + Easy Registration Forms <= 2.1.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d794052-1ba2-4772-bc15-5d9732e015e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-registration-forms/" + google-query: inurl:"/wp-content/plugins/easy-registration-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-registration-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-registration-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-registration-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-registration-forms-d3595d30820755045dbe80d57c0f600c.yaml b/nuclei-templates/cve-less/plugins/easy-registration-forms-d3595d30820755045dbe80d57c0f600c.yaml new file mode 100644 index 0000000000..5166c9d0f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-registration-forms-d3595d30820755045dbe80d57c0f600c.yaml @@ -0,0 +1,58 @@ +id: easy-registration-forms-d3595d30820755045dbe80d57c0f600c + +info: + name: > + Easy Registration Forms <= 2.1.1 - Authenticated (Subscriber+) Information Disclosure via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/562fe11f-36a0-4f23-9eed-50ada7ab2961?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-registration-forms/" + google-query: inurl:"/wp-content/plugins/easy-registration-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-registration-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-registration-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-registration-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-set-favicon-c65d467c803cb05436e2b506583569bb.yaml b/nuclei-templates/cve-less/plugins/easy-set-favicon-c65d467c803cb05436e2b506583569bb.yaml new file mode 100644 index 0000000000..f7078fc3e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-set-favicon-c65d467c803cb05436e2b506583569bb.yaml @@ -0,0 +1,58 @@ +id: easy-set-favicon-c65d467c803cb05436e2b506583569bb + +info: + name: > + Easy Set Favicon <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/825af974-dccd-4409-8f22-fa70240b0c66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-set-favicon/" + google-query: inurl:"/wp-content/plugins/easy-set-favicon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-set-favicon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-set-favicon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-set-favicon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-settings-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-settings-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..766edfeb99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-settings-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-settings-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-settings-for-learndash/" + google-query: inurl:"/wp-content/plugins/easy-settings-for-learndash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-settings-for-learndash,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-settings-for-learndash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-settings-for-learndash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-sign-up-c3d61b837adb4506fbea73b489e751f0.yaml b/nuclei-templates/cve-less/plugins/easy-sign-up-c3d61b837adb4506fbea73b489e751f0.yaml new file mode 100644 index 0000000000..0632e87319 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-sign-up-c3d61b837adb4506fbea73b489e751f0.yaml @@ -0,0 +1,58 @@ +id: easy-sign-up-c3d61b837adb4506fbea73b489e751f0 + +info: + name: > + Easy Sign Up <= 3.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af718d65-9f8f-4ed8-80ed-e7ed34169016?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-sign-up/" + google-query: inurl:"/wp-content/plugins/easy-sign-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-sign-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-sign-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-sign-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-slider-revolution-97f7a332ae5645762ec8464bbe228dfc.yaml b/nuclei-templates/cve-less/plugins/easy-slider-revolution-97f7a332ae5645762ec8464bbe228dfc.yaml new file mode 100644 index 0000000000..a9a5234560 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-slider-revolution-97f7a332ae5645762ec8464bbe228dfc.yaml @@ -0,0 +1,58 @@ +id: easy-slider-revolution-97f7a332ae5645762ec8464bbe228dfc + +info: + name: > + Easy Slider Revolution <= 1.0.0 - Authenticated (Author+) Stored Cross-Site Scripting via esrcpt_slider_allow_iframes_filter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14a20f9c-cf5a-4d57-b723-ad29a12c8881?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-slider-revolution/" + google-query: inurl:"/wp-content/plugins/easy-slider-revolution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-slider-revolution,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-slider-revolution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-slider-revolution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-smooth-scroll-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-smooth-scroll-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bc0bac953c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-smooth-scroll-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-smooth-scroll-links-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-smooth-scroll-links/" + google-query: inurl:"/wp-content/plugins/easy-smooth-scroll-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-smooth-scroll-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-smooth-scroll-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-smooth-scroll-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-41e74ccfba32267621605ffd0d327b1c.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-41e74ccfba32267621605ffd0d327b1c.yaml new file mode 100644 index 0000000000..58cba79468 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-41e74ccfba32267621605ffd0d327b1c.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-41e74ccfba32267621605ffd0d327b1c + +info: + name: > + Easy Social Icons <= 3.0.8 – Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ef3a657-28ce-4a27-b4d8-617db8027ffc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-4e29bf7b20e2afded2580d5e1afd403a.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-4e29bf7b20e2afded2580d5e1afd403a.yaml new file mode 100644 index 0000000000..2683722a76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-4e29bf7b20e2afded2580d5e1afd403a.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-4e29bf7b20e2afded2580d5e1afd403a + +info: + name: > + Easy Social Icons <= 3.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86c3ef76-d4d0-4106-850f-88e9ea176979?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-61a927bc340bb105a879f38c8d71f797.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-61a927bc340bb105a879f38c8d71f797.yaml new file mode 100644 index 0000000000..cf8d6395bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-61a927bc340bb105a879f38c8d71f797.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-61a927bc340bb105a879f38c8d71f797 + +info: + name: > + Easy Social Icons <= 3.1.3 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97c7b0bc-4c73-4330-851a-2d6d6d0b62c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-65f22b1513e1da3131ee1c2793b0624c.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-65f22b1513e1da3131ee1c2793b0624c.yaml new file mode 100644 index 0000000000..52f553531b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-65f22b1513e1da3131ee1c2793b0624c.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-65f22b1513e1da3131ee1c2793b0624c + +info: + name: > + Easy Social Icons <= 1.2.3.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/feab189a-bd89-461d-b553-f137b8032e94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-882e0143754f55aaf4f3cb06c8d13293.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-882e0143754f55aaf4f3cb06c8d13293.yaml new file mode 100644 index 0000000000..53b98b2ea8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-882e0143754f55aaf4f3cb06c8d13293.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-882e0143754f55aaf4f3cb06c8d13293 + +info: + name: > + Easy Social Icons <= 3.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f38aca5-0d69-421e-a3f2-d12cd593a88a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-9cfadb72ed62a1496ef5a1550e74d7ca.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-9cfadb72ed62a1496ef5a1550e74d7ca.yaml new file mode 100644 index 0000000000..b6e607de9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-9cfadb72ed62a1496ef5a1550e74d7ca.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-9cfadb72ed62a1496ef5a1550e74d7ca + +info: + name: > + Easy Social Icons <= 3.1.4 - Admin+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dfa84ed-0edf-4a75-8ec3-986c3880353c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-d9a381f55de2cbcc100fd4387b57379e.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-d9a381f55de2cbcc100fd4387b57379e.yaml new file mode 100644 index 0000000000..80bf98dae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-d9a381f55de2cbcc100fd4387b57379e.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-d9a381f55de2cbcc100fd4387b57379e + +info: + name: > + Easy Social Icons <= 3.2.0 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c59871cc-2d62-4eea-a78b-19810570c47d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-eb06b36db83cd57ff46c8ecced75bb58.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-eb06b36db83cd57ff46c8ecced75bb58.yaml new file mode 100644 index 0000000000..2ab4325474 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-eb06b36db83cd57ff46c8ecced75bb58.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-eb06b36db83cd57ff46c8ecced75bb58 + +info: + name: > + Easy Social Icons <= 3.2.2 - Admin+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cca16945-f230-4d0d-9f40-eabd5bf42e30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-ecb72206512391b63853fcec98ca443c.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-ecb72206512391b63853fcec98ca443c.yaml new file mode 100644 index 0000000000..0d4bd97fd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-ecb72206512391b63853fcec98ca443c.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-ecb72206512391b63853fcec98ca443c + +info: + name: > + Easy Social Icons <= 3.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab888ee1-bdc2-4b8b-9b16-a7d146f123df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-f326c6f978051192fcd3f58deac7c7e7.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-f326c6f978051192fcd3f58deac7c7e7.yaml new file mode 100644 index 0000000000..156951b40c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-f326c6f978051192fcd3f58deac7c7e7.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-f326c6f978051192fcd3f58deac7c7e7 + +info: + name: > + Easy Social Icons <= 3.2.0 - Authenticated (Admin+) Cross-Site Scripting and Missing Authorization Checks + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc4f2fd3-ed6b-4fe4-b300-02b1b35ebb7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-f48220ff86f125e37c7a8dfee9752f3b.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-f48220ff86f125e37c7a8dfee9752f3b.yaml new file mode 100644 index 0000000000..ae35fd27ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-f48220ff86f125e37c7a8dfee9752f3b.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-f48220ff86f125e37c7a8dfee9752f3b + +info: + name: > + Easy Social Icons <= 3.2.4 - Missing Authorization via cnss_save_ajax_order + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3bdc0c4-34fb-43cc-ba2b-340347bca146?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-icons-f8dda67401c83c106e4913ae42963922.yaml b/nuclei-templates/cve-less/plugins/easy-social-icons-f8dda67401c83c106e4913ae42963922.yaml new file mode 100644 index 0000000000..ecfde8607d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-icons-f8dda67401c83c106e4913ae42963922.yaml @@ -0,0 +1,58 @@ +id: easy-social-icons-f8dda67401c83c106e4913ae42963922 + +info: + name: > + Easy Social Icons <= 1.2.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f00a12ed-d8c2-40b2-b0c8-71507469ee95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-icons/" + google-query: inurl:"/wp-content/plugins/easy-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-share-buttons-for-wordpress-7046ef2cfb73e30aa27cd120b026bf95.yaml b/nuclei-templates/cve-less/plugins/easy-social-share-buttons-for-wordpress-7046ef2cfb73e30aa27cd120b026bf95.yaml new file mode 100644 index 0000000000..a82a3995ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-share-buttons-for-wordpress-7046ef2cfb73e30aa27cd120b026bf95.yaml @@ -0,0 +1,58 @@ +id: easy-social-share-buttons-for-wordpress-7046ef2cfb73e30aa27cd120b026bf95 + +info: + name: > + Easy Social Share Buttons for WordPress <= 3.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5a71d0a-e00f-4794-acc2-834334d5b336?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-share-buttons-for-wordpress/" + google-query: inurl:"/wp-content/plugins/easy-social-share-buttons-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-share-buttons-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-share-buttons-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-share-buttons-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-47b99cb97f68327c811e482acf82f22d.yaml b/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-47b99cb97f68327c811e482acf82f22d.yaml new file mode 100644 index 0000000000..44e99bec58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-47b99cb97f68327c811e482acf82f22d.yaml @@ -0,0 +1,58 @@ +id: easy-social-share-buttons3-47b99cb97f68327c811e482acf82f22d + +info: + name: > + Easy Social Share Buttons <= 9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/797faa73-401d-492c-a99d-0724df57b6e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-share-buttons3/" + google-query: inurl:"/wp-content/plugins/easy-social-share-buttons3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-share-buttons3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-share-buttons3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-share-buttons3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-731324aeee016bb6f029892372fbf4ce.yaml b/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-731324aeee016bb6f029892372fbf4ce.yaml new file mode 100644 index 0000000000..2a68cd8281 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-731324aeee016bb6f029892372fbf4ce.yaml @@ -0,0 +1,58 @@ +id: easy-social-share-buttons3-731324aeee016bb6f029892372fbf4ce + +info: + name: > + Easy Social Share Buttons <= 9.4 - Authenticated (Subscriber+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fc28132-eae6-4082-988c-2d9e56ff1283?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-share-buttons3/" + google-query: inurl:"/wp-content/plugins/easy-social-share-buttons3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-share-buttons3,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-share-buttons3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-share-buttons3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-d90e5ac159925d0ab3971b3b6d358c41.yaml b/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-d90e5ac159925d0ab3971b3b6d358c41.yaml new file mode 100644 index 0000000000..292e34645e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-social-share-buttons3-d90e5ac159925d0ab3971b3b6d358c41.yaml @@ -0,0 +1,58 @@ +id: easy-social-share-buttons3-d90e5ac159925d0ab3971b3b6d358c41 + +info: + name: > + Easy Social Share Buttons <= 9.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22b742d7-e9fe-48ea-ae7f-579bd3c32c44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-social-share-buttons3/" + google-query: inurl:"/wp-content/plugins/easy-social-share-buttons3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-social-share-buttons3,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-social-share-buttons3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-social-share-buttons3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..1436067959 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: easy-sticky-sidebar-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-sticky-sidebar/" + google-query: inurl:"/wp-content/plugins/easy-sticky-sidebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-sticky-sidebar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-sticky-sidebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-sticky-sidebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-98193019af2a73f9695ff639de4023e0.yaml b/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-98193019af2a73f9695ff639de4023e0.yaml new file mode 100644 index 0000000000..8600463741 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-98193019af2a73f9695ff639de4023e0.yaml @@ -0,0 +1,58 @@ +id: easy-sticky-sidebar-98193019af2a73f9695ff639de4023e0 + +info: + name: > + WordPress CTA <= 1.5.8 - Missing Authorization via Multiple AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a65a1f25-04e5-4ca3-9b2d-1b78254a8871?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-sticky-sidebar/" + google-query: inurl:"/wp-content/plugins/easy-sticky-sidebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-sticky-sidebar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-sticky-sidebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-sticky-sidebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..4769623608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-sticky-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: easy-sticky-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-sticky-sidebar/" + google-query: inurl:"/wp-content/plugins/easy-sticky-sidebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-sticky-sidebar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-sticky-sidebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-sticky-sidebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-student-results-429ff280452993df8646f6def7c9d328.yaml b/nuclei-templates/cve-less/plugins/easy-student-results-429ff280452993df8646f6def7c9d328.yaml new file mode 100644 index 0000000000..83f03e5c54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-student-results-429ff280452993df8646f6def7c9d328.yaml @@ -0,0 +1,58 @@ +id: easy-student-results-429ff280452993df8646f6def7c9d328 + +info: + name: > + Easy Student Results <= 2.2.8 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1efe450-d081-421e-95c3-f2d79c328a33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-student-results/" + google-query: inurl:"/wp-content/plugins/easy-student-results/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-student-results,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-student-results/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-student-results" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-student-results-c4969b59b8b4cdf482f721bc206c229a.yaml b/nuclei-templates/cve-less/plugins/easy-student-results-c4969b59b8b4cdf482f721bc206c229a.yaml new file mode 100644 index 0000000000..b14b0de87f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-student-results-c4969b59b8b4cdf482f721bc206c229a.yaml @@ -0,0 +1,58 @@ +id: easy-student-results-c4969b59b8b4cdf482f721bc206c229a + +info: + name: > + Easy Student Results <= 2.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da5ba18a-97ec-42c5-a7c4-ca38611c1fcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-student-results/" + google-query: inurl:"/wp-content/plugins/easy-student-results/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-student-results,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-student-results/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-student-results" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-svg-73a4ba5237a6c747115a7db7e60454a1.yaml b/nuclei-templates/cve-less/plugins/easy-svg-73a4ba5237a6c747115a7db7e60454a1.yaml new file mode 100644 index 0000000000..c0572a26b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-svg-73a4ba5237a6c747115a7db7e60454a1.yaml @@ -0,0 +1,58 @@ +id: easy-svg-73a4ba5237a6c747115a7db7e60454a1 + +info: + name: > + Easy SVG Support <= 3.2.0 - Cross-Site Scripting via SVG Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e736e75-5ad4-4773-b1f7-358dc74848f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-svg/" + google-query: inurl:"/wp-content/plugins/easy-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-svg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-svg-image-allow-99ad02b61917183fbf0c75dc39e4e9c8.yaml b/nuclei-templates/cve-less/plugins/easy-svg-image-allow-99ad02b61917183fbf0c75dc39e4e9c8.yaml new file mode 100644 index 0000000000..a12d3205f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-svg-image-allow-99ad02b61917183fbf0c75dc39e4e9c8.yaml @@ -0,0 +1,58 @@ +id: easy-svg-image-allow-99ad02b61917183fbf0c75dc39e4e9c8 + +info: + name: > + Easy SVG Allow <= 1.0 - Authenticated (Author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a766b5b-e21e-4009-86d9-7f0a5c91ed51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-svg-image-allow/" + google-query: inurl:"/wp-content/plugins/easy-svg-image-allow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-svg-image-allow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-svg-image-allow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-svg-image-allow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-table-1d7d7c5febd898bd86b248bdd1c64ad3.yaml b/nuclei-templates/cve-less/plugins/easy-table-1d7d7c5febd898bd86b248bdd1c64ad3.yaml new file mode 100644 index 0000000000..83bf9c4169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-table-1d7d7c5febd898bd86b248bdd1c64ad3.yaml @@ -0,0 +1,58 @@ +id: easy-table-1d7d7c5febd898bd86b248bdd1c64ad3 + +info: + name: > + Easy Table <= 1.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea0d5859-7304-4d65-9ba9-679d0fc3c3fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-table/" + google-query: inurl:"/wp-content/plugins/easy-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-table-365c4967f8ed82c8fe8be419a127bb67.yaml b/nuclei-templates/cve-less/plugins/easy-table-365c4967f8ed82c8fe8be419a127bb67.yaml new file mode 100644 index 0000000000..222ef291ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-table-365c4967f8ed82c8fe8be419a127bb67.yaml @@ -0,0 +1,58 @@ +id: easy-table-365c4967f8ed82c8fe8be419a127bb67 + +info: + name: > + Easy Table <= 1.5.2 - Authenticated Stored Cross-Site Scripting via easy-table-test-area parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4f77508-b1e6-4a13-b384-f086ec64fe85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-table/" + google-query: inurl:"/wp-content/plugins/easy-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-table-booking-86987ea9b36773133771b8d624c0f2b6.yaml b/nuclei-templates/cve-less/plugins/easy-table-booking-86987ea9b36773133771b8d624c0f2b6.yaml new file mode 100644 index 0000000000..dc7d220b88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-table-booking-86987ea9b36773133771b8d624c0f2b6.yaml @@ -0,0 +1,58 @@ +id: easy-table-booking-86987ea9b36773133771b8d624c0f2b6 + +info: + name: > + Easy Restaurant Table Booking <= 1.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1492440d-c6c8-46c0-bc88-c9e3f9933ad4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-table-booking/" + google-query: inurl:"/wp-content/plugins/easy-table-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-table-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-table-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-table-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-table-of-contents-3d0e7652c5954cde6070c6634683929c.yaml b/nuclei-templates/cve-less/plugins/easy-table-of-contents-3d0e7652c5954cde6070c6634683929c.yaml new file mode 100644 index 0000000000..c4bc2b1327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-table-of-contents-3d0e7652c5954cde6070c6634683929c.yaml @@ -0,0 +1,58 @@ +id: easy-table-of-contents-3d0e7652c5954cde6070c6634683929c + +info: + name: > + Easy Table of Contents <= 2.0.45.2 - Missing Authorization via eztoc_reset_options_to_default + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff937860-c4e0-4172-9f0f-d66578fa7203?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-table-of-contents/" + google-query: inurl:"/wp-content/plugins/easy-table-of-contents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-table-of-contents,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-table-of-contents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-table-of-contents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.45.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-team-manager-1ff79c544d50f2338de3189197eb1777.yaml b/nuclei-templates/cve-less/plugins/easy-team-manager-1ff79c544d50f2338de3189197eb1777.yaml new file mode 100644 index 0000000000..efb6526a09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-team-manager-1ff79c544d50f2338de3189197eb1777.yaml @@ -0,0 +1,58 @@ +id: easy-team-manager-1ff79c544d50f2338de3189197eb1777 + +info: + name: > + Easy Team Manager <= 1.3.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2407d25-75da-4a04-8a39-04cb1711ae33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-team-manager/" + google-query: inurl:"/wp-content/plugins/easy-team-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-team-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-team-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-team-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonial-manager-6fbfd79bf661b65b2359132741b885f3.yaml b/nuclei-templates/cve-less/plugins/easy-testimonial-manager-6fbfd79bf661b65b2359132741b885f3.yaml new file mode 100644 index 0000000000..37022faf49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonial-manager-6fbfd79bf661b65b2359132741b885f3.yaml @@ -0,0 +1,58 @@ +id: easy-testimonial-manager-6fbfd79bf661b65b2359132741b885f3 + +info: + name: > + Easy Testimonial Manager <= 1.2.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e0426e9-f6d8-40aa-9ceb-a3e5515ac316?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonial-manager/" + google-query: inurl:"/wp-content/plugins/easy-testimonial-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonial-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonial-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonial-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonial-rotator-13b96d2f8807051b1c5765c2cfc941c7.yaml b/nuclei-templates/cve-less/plugins/easy-testimonial-rotator-13b96d2f8807051b1c5765c2cfc941c7.yaml new file mode 100644 index 0000000000..6caad98088 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonial-rotator-13b96d2f8807051b1c5765c2cfc941c7.yaml @@ -0,0 +1,58 @@ +id: easy-testimonial-rotator-13b96d2f8807051b1c5765c2cfc941c7 + +info: + name: > + Easy Testimonial Slider and Form <= 1.0.15 - Unauthenticated Reflected Cross-Site Scripting via search_term + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6b16ffe-1c65-49d3-9e30-407bc75d7d49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonial-rotator/" + google-query: inurl:"/wp-content/plugins/easy-testimonial-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonial-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonial-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonial-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonial-rotator-95ad70daa5a42e22046c057a639de555.yaml b/nuclei-templates/cve-less/plugins/easy-testimonial-rotator-95ad70daa5a42e22046c057a639de555.yaml new file mode 100644 index 0000000000..c03ee767da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonial-rotator-95ad70daa5a42e22046c057a639de555.yaml @@ -0,0 +1,58 @@ +id: easy-testimonial-rotator-95ad70daa5a42e22046c057a639de555 + +info: + name: > + Easy Testimonial Slider and Form <= 1.0.18 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01da1829-e3f4-4246-ae3d-72377c4b232e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonial-rotator/" + google-query: inurl:"/wp-content/plugins/easy-testimonial-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonial-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonial-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonial-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonials-139542bed79cb071600ed5c3c1e9d45c.yaml b/nuclei-templates/cve-less/plugins/easy-testimonials-139542bed79cb071600ed5c3c1e9d45c.yaml new file mode 100644 index 0000000000..07f648fc23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonials-139542bed79cb071600ed5c3c1e9d45c.yaml @@ -0,0 +1,58 @@ +id: easy-testimonials-139542bed79cb071600ed5c3c1e9d45c + +info: + name: > + Easy Testimonials <= 3.5.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/537acaf7-8d44-484d-9516-774a3de5573f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonials/" + google-query: inurl:"/wp-content/plugins/easy-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonials,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonials-386d494fe731db6879e7d8ca94c86cd4.yaml b/nuclei-templates/cve-less/plugins/easy-testimonials-386d494fe731db6879e7d8ca94c86cd4.yaml new file mode 100644 index 0000000000..87d0bb2222 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonials-386d494fe731db6879e7d8ca94c86cd4.yaml @@ -0,0 +1,58 @@ +id: easy-testimonials-386d494fe731db6879e7d8ca94c86cd4 + +info: + name: > + Easy Testimonials <= 3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33512495-91d6-4efe-9c76-484ab07874f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonials/" + google-query: inurl:"/wp-content/plugins/easy-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonials-3e13ae2b6b41b4f67d87446a43e49fcf.yaml b/nuclei-templates/cve-less/plugins/easy-testimonials-3e13ae2b6b41b4f67d87446a43e49fcf.yaml new file mode 100644 index 0000000000..bc9ba48894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonials-3e13ae2b6b41b4f67d87446a43e49fcf.yaml @@ -0,0 +1,58 @@ +id: easy-testimonials-3e13ae2b6b41b4f67d87446a43e49fcf + +info: + name: > + Easy Testimonials <= 3.6.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8da49c2e-576c-490b-b812-96d15b6d2b1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonials/" + google-query: inurl:"/wp-content/plugins/easy-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonials-63f488767eed871fd699454a474174aa.yaml b/nuclei-templates/cve-less/plugins/easy-testimonials-63f488767eed871fd699454a474174aa.yaml new file mode 100644 index 0000000000..021631b3c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonials-63f488767eed871fd699454a474174aa.yaml @@ -0,0 +1,58 @@ +id: easy-testimonials-63f488767eed871fd699454a474174aa + +info: + name: > + Easy Testimonials <= 3.5.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b47f9624-1829-42b7-8afb-fe25b234df72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonials/" + google-query: inurl:"/wp-content/plugins/easy-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonials-6fa4b95e95d113650666ff28a08a093d.yaml b/nuclei-templates/cve-less/plugins/easy-testimonials-6fa4b95e95d113650666ff28a08a093d.yaml new file mode 100644 index 0000000000..d9858a59ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonials-6fa4b95e95d113650666ff28a08a093d.yaml @@ -0,0 +1,58 @@ +id: easy-testimonials-6fa4b95e95d113650666ff28a08a093d + +info: + name: > + Easy Testimonials <= 1.36.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff9cfa56-e178-4de7-9e6b-e0a520153eb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonials/" + google-query: inurl:"/wp-content/plugins/easy-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonials-aeef249fc57afd724305e4aa12ba4e2c.yaml b/nuclei-templates/cve-less/plugins/easy-testimonials-aeef249fc57afd724305e4aa12ba4e2c.yaml new file mode 100644 index 0000000000..85a98e3fcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonials-aeef249fc57afd724305e4aa12ba4e2c.yaml @@ -0,0 +1,58 @@ +id: easy-testimonials-aeef249fc57afd724305e4aa12ba4e2c + +info: + name: > + Easy Testimonials <= 3.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42e54e09-242f-49ab-9fff-a9ffc62dd4bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonials/" + google-query: inurl:"/wp-content/plugins/easy-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-testimonials-ded406378489866866417fd6ec210840.yaml b/nuclei-templates/cve-less/plugins/easy-testimonials-ded406378489866866417fd6ec210840.yaml new file mode 100644 index 0000000000..f23b51c13c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-testimonials-ded406378489866866417fd6ec210840.yaml @@ -0,0 +1,58 @@ +id: easy-testimonials-ded406378489866866417fd6ec210840 + +info: + name: > + Easy Testimonials <= 3.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3a5d7c3-b9dd-46e8-92e2-455ef1394b50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-testimonials/" + google-query: inurl:"/wp-content/plugins/easy-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-testimonials,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-textillate-2411b4426d78f7ca35565f6c5d4b0e5b.yaml b/nuclei-templates/cve-less/plugins/easy-textillate-2411b4426d78f7ca35565f6c5d4b0e5b.yaml new file mode 100644 index 0000000000..822ecd4d57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-textillate-2411b4426d78f7ca35565f6c5d4b0e5b.yaml @@ -0,0 +1,58 @@ +id: easy-textillate-2411b4426d78f7ca35565f6c5d4b0e5b + +info: + name: > + Easy Textillate <= 2.01 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66529116-7b0e-4e2f-96f1-a4d91fa7f956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-textillate/" + google-query: inurl:"/wp-content/plugins/easy-textillate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-textillate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-textillate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-textillate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-textillate-52d571dc3064574a067b92facc54ed54.yaml b/nuclei-templates/cve-less/plugins/easy-textillate-52d571dc3064574a067b92facc54ed54.yaml new file mode 100644 index 0000000000..d293e19b71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-textillate-52d571dc3064574a067b92facc54ed54.yaml @@ -0,0 +1,58 @@ +id: easy-textillate-52d571dc3064574a067b92facc54ed54 + +info: + name: > + Easy Textillate <= 2.02 - Authenticated(Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cee8cd9-7fa9-4154-9d74-ab54da18e521?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-textillate/" + google-query: inurl:"/wp-content/plugins/easy-textillate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-textillate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-textillate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-textillate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-tiktok-feed-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-tiktok-feed-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1fae4d3142 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-tiktok-feed-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-tiktok-feed-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-tiktok-feed/" + google-query: inurl:"/wp-content/plugins/easy-tiktok-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-tiktok-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-tiktok-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-tiktok-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-twitter-feeds-376e635d9c344dbb946b8ae2b1699cff.yaml b/nuclei-templates/cve-less/plugins/easy-twitter-feeds-376e635d9c344dbb946b8ae2b1699cff.yaml new file mode 100644 index 0000000000..904fde9b8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-twitter-feeds-376e635d9c344dbb946b8ae2b1699cff.yaml @@ -0,0 +1,58 @@ +id: easy-twitter-feeds-376e635d9c344dbb946b8ae2b1699cff + +info: + name: > + Easy Twitter Feed < 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad9272e3-fa81-440e-8d77-207145123ad2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-twitter-feeds/" + google-query: inurl:"/wp-content/plugins/easy-twitter-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-twitter-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-twitter-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-twitter-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-under-construction-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-under-construction-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..10dc67dff4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-under-construction-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-under-construction-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-under-construction/" + google-query: inurl:"/wp-content/plugins/easy-under-construction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-under-construction,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-under-construction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-under-construction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-video-player-b2f775a90d3415bc2313e385ff781703.yaml b/nuclei-templates/cve-less/plugins/easy-video-player-b2f775a90d3415bc2313e385ff781703.yaml new file mode 100644 index 0000000000..fbe0f4b642 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-video-player-b2f775a90d3415bc2313e385ff781703.yaml @@ -0,0 +1,58 @@ +id: easy-video-player-b2f775a90d3415bc2313e385ff781703 + +info: + name: > + Easy Video Player <= 1.2.2.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd28f7f0-ed52-45d0-8d97-5ff95d17eb26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-video-player/" + google-query: inurl:"/wp-content/plugins/easy-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-video-player-cdfd3455a6f46d912895a672ab21e1b5.yaml b/nuclei-templates/cve-less/plugins/easy-video-player-cdfd3455a6f46d912895a672ab21e1b5.yaml new file mode 100644 index 0000000000..bbade5b7f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-video-player-cdfd3455a6f46d912895a672ab21e1b5.yaml @@ -0,0 +1,58 @@ +id: easy-video-player-cdfd3455a6f46d912895a672ab21e1b5 + +info: + name: > + Easy Video Player <= 1.2.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/996b5e29-beea-4678-8596-04e96a343584?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-video-player/" + google-query: inurl:"/wp-content/plugins/easy-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-video-reviews-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/easy-video-reviews-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..fd879981b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-video-reviews-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: easy-video-reviews-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-video-reviews/" + google-query: inurl:"/wp-content/plugins/easy-video-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-video-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-video-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-video-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-video-reviews-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/easy-video-reviews-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..2e7c528a94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-video-reviews-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: easy-video-reviews-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-video-reviews/" + google-query: inurl:"/wp-content/plugins/easy-video-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-video-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-video-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-video-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-watermark-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/easy-watermark-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..9e15b82917 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-watermark-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: easy-watermark-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-watermark/" + google-query: inurl:"/wp-content/plugins/easy-watermark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-watermark,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-watermark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-watermark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-wp-cleaner-7334a0dc3d35cec714b6fff3c35d6fab.yaml b/nuclei-templates/cve-less/plugins/easy-wp-cleaner-7334a0dc3d35cec714b6fff3c35d6fab.yaml new file mode 100644 index 0000000000..5b39941d48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-wp-cleaner-7334a0dc3d35cec714b6fff3c35d6fab.yaml @@ -0,0 +1,58 @@ +id: easy-wp-cleaner-7334a0dc3d35cec714b6fff3c35d6fab + +info: + name: > + Easy WP Cleaner <= 1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4c2689d-be51-4907-b624-c85da39f545d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-wp-cleaner/" + google-query: inurl:"/wp-content/plugins/easy-wp-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-wp-cleaner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-wp-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-wp-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-wp-smtp-3c68c1399fad8442e05257bec4405849.yaml b/nuclei-templates/cve-less/plugins/easy-wp-smtp-3c68c1399fad8442e05257bec4405849.yaml new file mode 100644 index 0000000000..4166d95207 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-wp-smtp-3c68c1399fad8442e05257bec4405849.yaml @@ -0,0 +1,58 @@ +id: easy-wp-smtp-3c68c1399fad8442e05257bec4405849 + +info: + name: > + Easy WP SMTP <= 1.3.9 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-wp-smtp/" + google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-wp-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-wp-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-wp-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-wp-smtp-3fc9a3fcf79cc1897ce2e887e3d3f73c.yaml b/nuclei-templates/cve-less/plugins/easy-wp-smtp-3fc9a3fcf79cc1897ce2e887e3d3f73c.yaml new file mode 100644 index 0000000000..bc08bfbf9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-wp-smtp-3fc9a3fcf79cc1897ce2e887e3d3f73c.yaml @@ -0,0 +1,58 @@ +id: easy-wp-smtp-3fc9a3fcf79cc1897ce2e887e3d3f73c + +info: + name: > + Easy WP SMTP <= 1.4.9 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc972855-6bd5-43cd-96e6-3b1aa1c6255b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-wp-smtp/" + google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-wp-smtp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-wp-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-wp-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-wp-smtp-9a16f7dd8fd77a0633f39e5cb1c0fe95.yaml b/nuclei-templates/cve-less/plugins/easy-wp-smtp-9a16f7dd8fd77a0633f39e5cb1c0fe95.yaml new file mode 100644 index 0000000000..f323f16135 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-wp-smtp-9a16f7dd8fd77a0633f39e5cb1c0fe95.yaml @@ -0,0 +1,58 @@ +id: easy-wp-smtp-9a16f7dd8fd77a0633f39e5cb1c0fe95 + +info: + name: > + Easy WP SMTP <= 1.5.1 - Authenticated (Admin+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/748220a6-9882-458c-8f80-a928f449c400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-wp-smtp/" + google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-wp-smtp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-wp-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-wp-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-wp-smtp-bc7fc430ade2f2b736ad2cc1fe4fe700.yaml b/nuclei-templates/cve-less/plugins/easy-wp-smtp-bc7fc430ade2f2b736ad2cc1fe4fe700.yaml new file mode 100644 index 0000000000..8c22351dee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-wp-smtp-bc7fc430ade2f2b736ad2cc1fe4fe700.yaml @@ -0,0 +1,58 @@ +id: easy-wp-smtp-bc7fc430ade2f2b736ad2cc1fe4fe700 + +info: + name: > + Easy WP SMTP <= 1.4.2 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/837eea49-0b2c-46b4-a325-526d7c143fdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-wp-smtp/" + google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-wp-smtp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-wp-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-wp-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-wp-smtp-c7d1f2ed116b346313eed1fb0d2a8296.yaml b/nuclei-templates/cve-less/plugins/easy-wp-smtp-c7d1f2ed116b346313eed1fb0d2a8296.yaml new file mode 100644 index 0000000000..ef82d35bfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-wp-smtp-c7d1f2ed116b346313eed1fb0d2a8296.yaml @@ -0,0 +1,58 @@ +id: easy-wp-smtp-c7d1f2ed116b346313eed1fb0d2a8296 + +info: + name: > + Easy WP SMTP <= 1.5.1 - Authenticated (Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94f0041d-eed6-4980-a7b8-f7410ca68e67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-wp-smtp/" + google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-wp-smtp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-wp-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-wp-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-wp-smtp-e3ac7cfb196d6042fdf4cb82d4ed4384.yaml b/nuclei-templates/cve-less/plugins/easy-wp-smtp-e3ac7cfb196d6042fdf4cb82d4ed4384.yaml new file mode 100644 index 0000000000..f455b5dc85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-wp-smtp-e3ac7cfb196d6042fdf4cb82d4ed4384.yaml @@ -0,0 +1,58 @@ +id: easy-wp-smtp-e3ac7cfb196d6042fdf4cb82d4ed4384 + +info: + name: > + Easy WP SMTP <= 1.5.1 - Authenticated (Admin+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75e02357-391a-4f21-9024-ca4a0ea24d50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-wp-smtp/" + google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-wp-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-wp-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-wp-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-wp-smtp-e3f24a45c97373cce269e0ae75379f47.yaml b/nuclei-templates/cve-less/plugins/easy-wp-smtp-e3f24a45c97373cce269e0ae75379f47.yaml new file mode 100644 index 0000000000..78913b59b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-wp-smtp-e3f24a45c97373cce269e0ae75379f47.yaml @@ -0,0 +1,58 @@ +id: easy-wp-smtp-e3f24a45c97373cce269e0ae75379f47 + +info: + name: > + Easy WP SMTP <= 1.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b94f7ca-9848-4fd5-848b-e341258f9c47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-wp-smtp/" + google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-wp-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-wp-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-wp-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy-zillow-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easy-zillow-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4970c332fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy-zillow-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easy-zillow-reviews-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-zillow-reviews/" + google-query: inurl:"/wp-content/plugins/easy-zillow-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-zillow-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-zillow-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-zillow-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy2map-164bec1494162189ba7115d5dd5c222b.yaml b/nuclei-templates/cve-less/plugins/easy2map-164bec1494162189ba7115d5dd5c222b.yaml new file mode 100644 index 0000000000..aac3e13ac3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy2map-164bec1494162189ba7115d5dd5c222b.yaml @@ -0,0 +1,58 @@ +id: easy2map-164bec1494162189ba7115d5dd5c222b + +info: + name: > + Easy2Map <= 1.2.9 - Directory Traversal and Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f5b4f9a-4067-4514-9027-b645921d807f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy2map/" + google-query: inurl:"/wp-content/plugins/easy2map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy2map,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy2map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy2map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy2map-281571699228cab1d5beb867576443c8.yaml b/nuclei-templates/cve-less/plugins/easy2map-281571699228cab1d5beb867576443c8.yaml new file mode 100644 index 0000000000..d483ac518e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy2map-281571699228cab1d5beb867576443c8.yaml @@ -0,0 +1,58 @@ +id: easy2map-281571699228cab1d5beb867576443c8 + +info: + name: > + Easy2Map <= 1.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3cc99df-b709-40e7-a911-ea19f5af2c82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy2map/" + google-query: inurl:"/wp-content/plugins/easy2map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy2map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy2map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy2map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy2map-ad10f6931e20f26aa8f27ac8a7f0eba7.yaml b/nuclei-templates/cve-less/plugins/easy2map-ad10f6931e20f26aa8f27ac8a7f0eba7.yaml new file mode 100644 index 0000000000..8020117f6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy2map-ad10f6931e20f26aa8f27ac8a7f0eba7.yaml @@ -0,0 +1,58 @@ +id: easy2map-ad10f6931e20f26aa8f27ac8a7f0eba7 + +info: + name: > + Easy2Map <= 1.2.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd25026-f507-47f0-bf4e-5b58c37f398c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy2map/" + google-query: inurl:"/wp-content/plugins/easy2map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy2map,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy2map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy2map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy2map-d7ec8c507a9ed2e2307abe588cfe9f0d.yaml b/nuclei-templates/cve-less/plugins/easy2map-d7ec8c507a9ed2e2307abe588cfe9f0d.yaml new file mode 100644 index 0000000000..ff79b89e86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy2map-d7ec8c507a9ed2e2307abe588cfe9f0d.yaml @@ -0,0 +1,58 @@ +id: easy2map-d7ec8c507a9ed2e2307abe588cfe9f0d + +info: + name: > + Easy2Map <= 1.2.4 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97c07a3e-4538-4e0f-a597-6b843ff7feb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy2map/" + google-query: inurl:"/wp-content/plugins/easy2map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy2map,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy2map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy2map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy2map-photos-02351a704f122ed7e237be1c0b97be24.yaml b/nuclei-templates/cve-less/plugins/easy2map-photos-02351a704f122ed7e237be1c0b97be24.yaml new file mode 100644 index 0000000000..53d6f3ffd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy2map-photos-02351a704f122ed7e237be1c0b97be24.yaml @@ -0,0 +1,58 @@ +id: easy2map-photos-02351a704f122ed7e237be1c0b97be24 + +info: + name: > + Easy2Map Photos <= 1.0.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af7163da-79b3-45df-a33c-01367205bb6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy2map-photos/" + google-query: inurl:"/wp-content/plugins/easy2map-photos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy2map-photos,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy2map-photos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy2map-photos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easy2map-photos-e1e2d018531f7235196dc9a4085ec51e.yaml b/nuclei-templates/cve-less/plugins/easy2map-photos-e1e2d018531f7235196dc9a4085ec51e.yaml new file mode 100644 index 0000000000..390105d5bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easy2map-photos-e1e2d018531f7235196dc9a4085ec51e.yaml @@ -0,0 +1,58 @@ +id: easy2map-photos-e1e2d018531f7235196dc9a4085ec51e + +info: + name: > + Easy2map-photos <= 1.0.9 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ef8906b-be0a-45d2-b1ec-6f480306d9f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy2map-photos/" + google-query: inurl:"/wp-content/plugins/easy2map-photos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy2map-photos,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy2map-photos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy2map-photos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyappointments-38d608cacdc80db417ded65078eef410.yaml b/nuclei-templates/cve-less/plugins/easyappointments-38d608cacdc80db417ded65078eef410.yaml new file mode 100644 index 0000000000..9d54c5ec54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyappointments-38d608cacdc80db417ded65078eef410.yaml @@ -0,0 +1,58 @@ +id: easyappointments-38d608cacdc80db417ded65078eef410 + +info: + name: > + Easy!Appointments <= 1.3.1 - Authenticated(Subscriber+) Arbitrary File Deletion via 'disconnect' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35fc9a16-3775-48c0-82af-692974f54c33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyappointments/" + google-query: inurl:"/wp-content/plugins/easyappointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyappointments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyappointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyappointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyappointments-72000fe0c780a49eca561c11357809c0.yaml b/nuclei-templates/cve-less/plugins/easyappointments-72000fe0c780a49eca561c11357809c0.yaml new file mode 100644 index 0000000000..633cd03076 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyappointments-72000fe0c780a49eca561c11357809c0.yaml @@ -0,0 +1,58 @@ +id: easyappointments-72000fe0c780a49eca561c11357809c0 + +info: + name: > + Easy!Appointments < 1.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b002e40-712d-4c3f-b168-9132e7b77e60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyappointments/" + google-query: inurl:"/wp-content/plugins/easyappointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyappointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyappointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyappointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyappointments-f934be2103cf424f8b0313022bdc21ec.yaml b/nuclei-templates/cve-less/plugins/easyappointments-f934be2103cf424f8b0313022bdc21ec.yaml new file mode 100644 index 0000000000..648f3b8f12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyappointments-f934be2103cf424f8b0313022bdc21ec.yaml @@ -0,0 +1,58 @@ +id: easyappointments-f934be2103cf424f8b0313022bdc21ec + +info: + name: > + Easy!Appointments <= 1.3.2 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87c99299-d23b-4cab-b2dc-abeed89155ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyappointments/" + google-query: inurl:"/wp-content/plugins/easyappointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyappointments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyappointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyappointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyazon-78a77e4a1a5aa34cbb515f8d429a5d22.yaml b/nuclei-templates/cve-less/plugins/easyazon-78a77e4a1a5aa34cbb515f8d429a5d22.yaml new file mode 100644 index 0000000000..6ff674e5e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyazon-78a77e4a1a5aa34cbb515f8d429a5d22.yaml @@ -0,0 +1,58 @@ +id: easyazon-78a77e4a1a5aa34cbb515f8d429a5d22 + +info: + name: > + EasyAzon – Amazon Associates Affiliate <= 5.1.0 - Missing Authorization on AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91ba93de-4c5f-4611-8296-adfc85c8dd2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyazon/" + google-query: inurl:"/wp-content/plugins/easyazon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyazon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyazon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyazon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyevent-3155b6afdeb6949fabf56095cff40791.yaml b/nuclei-templates/cve-less/plugins/easyevent-3155b6afdeb6949fabf56095cff40791.yaml new file mode 100644 index 0000000000..3a6abe0a96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyevent-3155b6afdeb6949fabf56095cff40791.yaml @@ -0,0 +1,58 @@ +id: easyevent-3155b6afdeb6949fabf56095cff40791 + +info: + name: > + EasyEvent <= 1.0.0 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0868b6ba-3b73-4b8a-a8b4-3cea8771ba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyevent/" + google-query: inurl:"/wp-content/plugins/easyevent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyevent,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyevent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyevent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyjobs-1a89597b1bd6bb139b0cbb0c2a6cdcf9.yaml b/nuclei-templates/cve-less/plugins/easyjobs-1a89597b1bd6bb139b0cbb0c2a6cdcf9.yaml new file mode 100644 index 0000000000..8f0c2b4d69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyjobs-1a89597b1bd6bb139b0cbb0c2a6cdcf9.yaml @@ -0,0 +1,58 @@ +id: easyjobs-1a89597b1bd6bb139b0cbb0c2a6cdcf9 + +info: + name: > + easy.jobs <= 2.4.6 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33cdd58b-9e5e-492e-a211-78de592f0663?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyjobs/" + google-query: inurl:"/wp-content/plugins/easyjobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyjobs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyjobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyjobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyjobs-a9798158db571367ab5f6fcdec40a746.yaml b/nuclei-templates/cve-less/plugins/easyjobs-a9798158db571367ab5f6fcdec40a746.yaml new file mode 100644 index 0000000000..8129244fd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyjobs-a9798158db571367ab5f6fcdec40a746.yaml @@ -0,0 +1,58 @@ +id: easyjobs-a9798158db571367ab5f6fcdec40a746 + +info: + name: > + EasyJobs <= 1.4.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c4b62b-c8b1-40b8-b250-d9da94208c62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyjobs/" + google-query: inurl:"/wp-content/plugins/easyjobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyjobs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyjobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyjobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easylogo-27956200aea3cb3bd27e1108bb27c97b.yaml b/nuclei-templates/cve-less/plugins/easylogo-27956200aea3cb3bd27e1108bb27c97b.yaml new file mode 100644 index 0000000000..ba88dc06f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easylogo-27956200aea3cb3bd27e1108bb27c97b.yaml @@ -0,0 +1,58 @@ +id: easylogo-27956200aea3cb3bd27e1108bb27c97b + +info: + name: > + Easy Logo <= 1.9.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2181ede3-d8ac-4b62-98e5-7f4448a8cee4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easylogo/" + google-query: inurl:"/wp-content/plugins/easylogo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easylogo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easylogo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easylogo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easync-booking-1ab98d23b8f5715db32cf93509d555f7.yaml b/nuclei-templates/cve-less/plugins/easync-booking-1ab98d23b8f5715db32cf93509d555f7.yaml new file mode 100644 index 0000000000..55cb2eab90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easync-booking-1ab98d23b8f5715db32cf93509d555f7.yaml @@ -0,0 +1,58 @@ +id: easync-booking-1ab98d23b8f5715db32cf93509d555f7 + +info: + name: > + Free Booking Plugin for Hotels, Restaurant and Car Rental – eaSYNC <= 1.1.15 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0295711d-5da6-4e28-9151-b0ce762c7eb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easync-booking/" + google-query: inurl:"/wp-content/plugins/easync-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easync-booking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easync-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easync-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easync-booking-ad05fb4f71116fd5943d1a28593a9d80.yaml b/nuclei-templates/cve-less/plugins/easync-booking-ad05fb4f71116fd5943d1a28593a9d80.yaml new file mode 100644 index 0000000000..492b0e1e60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easync-booking-ad05fb4f71116fd5943d1a28593a9d80.yaml @@ -0,0 +1,58 @@ +id: easync-booking-ad05fb4f71116fd5943d1a28593a9d80 + +info: + name: > + eaSYNC <= 1.3.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2148809e-b7fe-4104-b70f-d4137c85e92f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easync-booking/" + google-query: inurl:"/wp-content/plugins/easync-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easync-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easync-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easync-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easync-booking-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/easync-booking-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..90e22dea58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easync-booking-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: easync-booking-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easync-booking/" + google-query: inurl:"/wp-content/plugins/easync-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easync-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easync-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easync-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyrecipe-a78a16c3432adee203e9f1b257d4b189.yaml b/nuclei-templates/cve-less/plugins/easyrecipe-a78a16c3432adee203e9f1b257d4b189.yaml new file mode 100644 index 0000000000..daff67130d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyrecipe-a78a16c3432adee203e9f1b257d4b189.yaml @@ -0,0 +1,58 @@ +id: easyrecipe-a78a16c3432adee203e9f1b257d4b189 + +info: + name: > + EasyRecipe <= 3.5.3251 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35906df7-5eaf-494a-8184-48e2ca22301e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyrecipe/" + google-query: inurl:"/wp-content/plugins/easyrecipe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyrecipe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyrecipe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyrecipe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3251') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyrotator-for-wordpress-078c8808dfcbfebd119f13a67915c352.yaml b/nuclei-templates/cve-less/plugins/easyrotator-for-wordpress-078c8808dfcbfebd119f13a67915c352.yaml new file mode 100644 index 0000000000..6dd359988b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyrotator-for-wordpress-078c8808dfcbfebd119f13a67915c352.yaml @@ -0,0 +1,58 @@ +id: easyrotator-for-wordpress-078c8808dfcbfebd119f13a67915c352 + +info: + name: > + EasyRotator for WordPress <= 1.0.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3041e28e-d965-4672-ab10-8b1f3d874f19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyrotator-for-wordpress/" + google-query: inurl:"/wp-content/plugins/easyrotator-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyrotator-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyrotator-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyrotator-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easyship-woocommerce-shipping-rates-a80bdd8568c61aa45e987adfac4d1b71.yaml b/nuclei-templates/cve-less/plugins/easyship-woocommerce-shipping-rates-a80bdd8568c61aa45e987adfac4d1b71.yaml new file mode 100644 index 0000000000..9dfc83a408 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easyship-woocommerce-shipping-rates-a80bdd8568c61aa45e987adfac4d1b71.yaml @@ -0,0 +1,58 @@ +id: easyship-woocommerce-shipping-rates-a80bdd8568c61aa45e987adfac4d1b71 + +info: + name: > + Easyship WooCommerce Shipping Rates <= 0.8.9 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/788fdee8-2eae-437e-8a8d-1d01776cbe6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easyship-woocommerce-shipping-rates/" + google-query: inurl:"/wp-content/plugins/easyship-woocommerce-shipping-rates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easyship-woocommerce-shipping-rates,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easyship-woocommerce-shipping-rates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easyship-woocommerce-shipping-rates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/easysqueezepage-98fa09468510e4f3d608da204df8d702.yaml b/nuclei-templates/cve-less/plugins/easysqueezepage-98fa09468510e4f3d608da204df8d702.yaml new file mode 100644 index 0000000000..e52d7de532 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/easysqueezepage-98fa09468510e4f3d608da204df8d702.yaml @@ -0,0 +1,58 @@ +id: easysqueezepage-98fa09468510e4f3d608da204df8d702 + +info: + name: > + VideoJS (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d73f773-f084-40da-b18f-8b30b0d0c08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/EasySqueezePage/" + google-query: inurl:"/wp-content/plugins/EasySqueezePage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,EasySqueezePage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/EasySqueezePage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "EasySqueezePage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eazydocs-15118c222c3d3efe10e0b60b12d7cf6e.yaml b/nuclei-templates/cve-less/plugins/eazydocs-15118c222c3d3efe10e0b60b12d7cf6e.yaml new file mode 100644 index 0000000000..5dd86ba4db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eazydocs-15118c222c3d3efe10e0b60b12d7cf6e.yaml @@ -0,0 +1,58 @@ +id: eazydocs-15118c222c3d3efe10e0b60b12d7cf6e + +info: + name: > + EazyDocs 2.3.8 - 2.3.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1a2a09d-b50e-499d-8cfd-6e2884e66127?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eazydocs/" + google-query: inurl:"/wp-content/plugins/eazydocs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eazydocs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eazydocs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eazydocs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.3.8', '<= 2.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eazydocs-19e34a16c1a810dff7996ec5d94f691f.yaml b/nuclei-templates/cve-less/plugins/eazydocs-19e34a16c1a810dff7996ec5d94f691f.yaml new file mode 100644 index 0000000000..f15a4d4719 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eazydocs-19e34a16c1a810dff7996ec5d94f691f.yaml @@ -0,0 +1,58 @@ +id: eazydocs-19e34a16c1a810dff7996ec5d94f691f + +info: + name: > + EazyDocs <= 2.3.5 - Unauthenticated Stored Cross-Site Scripting via edit_doc_one_page + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38145ad1-f441-40a4-9e92-6837cfeba656?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eazydocs/" + google-query: inurl:"/wp-content/plugins/eazydocs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eazydocs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eazydocs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eazydocs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eazydocs-405b16e90fe11a6da428eb58c52f2070.yaml b/nuclei-templates/cve-less/plugins/eazydocs-405b16e90fe11a6da428eb58c52f2070.yaml new file mode 100644 index 0000000000..208edf3f22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eazydocs-405b16e90fe11a6da428eb58c52f2070.yaml @@ -0,0 +1,58 @@ +id: eazydocs-405b16e90fe11a6da428eb58c52f2070 + +info: + name: > + EazyDocs <= 2.3.5 - Missing Authorization via doc_one_page and edit_doc_one_page + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ec64507-b77e-4685-978f-7408fe8db5ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eazydocs/" + google-query: inurl:"/wp-content/plugins/eazydocs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eazydocs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eazydocs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eazydocs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eazydocs-be6b3b7884ff27a71c7f24387abeb572.yaml b/nuclei-templates/cve-less/plugins/eazydocs-be6b3b7884ff27a71c7f24387abeb572.yaml new file mode 100644 index 0000000000..c366152511 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eazydocs-be6b3b7884ff27a71c7f24387abeb572.yaml @@ -0,0 +1,58 @@ +id: eazydocs-be6b3b7884ff27a71c7f24387abeb572 + +info: + name: > + EazyDocs <= 2.3.3 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/296f8a23-8223-4d9c-a238-d93fcd5abd87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eazydocs/" + google-query: inurl:"/wp-content/plugins/eazydocs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eazydocs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eazydocs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eazydocs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ebay-feeds-for-wordpress-08485cb22c15bc9351789c0be0e79565.yaml b/nuclei-templates/cve-less/plugins/ebay-feeds-for-wordpress-08485cb22c15bc9351789c0be0e79565.yaml new file mode 100644 index 0000000000..20c824c2f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ebay-feeds-for-wordpress-08485cb22c15bc9351789c0be0e79565.yaml @@ -0,0 +1,58 @@ +id: ebay-feeds-for-wordpress-08485cb22c15bc9351789c0be0e79565 + +info: + name: > + WP eBay Product Feeds <= 3.3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4d552a7-499f-4946-b0ec-5f733c01a365?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ebay-feeds-for-wordpress/" + google-query: inurl:"/wp-content/plugins/ebay-feeds-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ebay-feeds-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ebay-feeds-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebay-feeds-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ebay-feeds-for-wordpress-492078688f68b5c1a6aec5a98ed76f29.yaml b/nuclei-templates/cve-less/plugins/ebay-feeds-for-wordpress-492078688f68b5c1a6aec5a98ed76f29.yaml new file mode 100644 index 0000000000..2092a30355 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ebay-feeds-for-wordpress-492078688f68b5c1a6aec5a98ed76f29.yaml @@ -0,0 +1,58 @@ +id: ebay-feeds-for-wordpress-492078688f68b5c1a6aec5a98ed76f29 + +info: + name: > + WP eBay Product Feeds < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6a1e7c1-0ff1-4d59-ac60-35790bf0318e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ebay-feeds-for-wordpress/" + google-query: inurl:"/wp-content/plugins/ebay-feeds-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ebay-feeds-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ebay-feeds-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebay-feeds-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ebecas-994e6758795c8c6e11e9f43c7bd4ac1c.yaml b/nuclei-templates/cve-less/plugins/ebecas-994e6758795c8c6e11e9f43c7bd4ac1c.yaml new file mode 100644 index 0000000000..15269222c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ebecas-994e6758795c8c6e11e9f43c7bd4ac1c.yaml @@ -0,0 +1,58 @@ +id: ebecas-994e6758795c8c6e11e9f43c7bd4ac1c + +info: + name: > + eBecas <= 3.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33770bfd-c481-4e18-838b-89a5fb5b15f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ebecas/" + google-query: inurl:"/wp-content/plugins/ebecas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ebecas,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ebecas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebecas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ebook-download-6ad6b5074b24fa1505e13d3a89bb00ed.yaml b/nuclei-templates/cve-less/plugins/ebook-download-6ad6b5074b24fa1505e13d3a89bb00ed.yaml new file mode 100644 index 0000000000..1fe19fee9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ebook-download-6ad6b5074b24fa1505e13d3a89bb00ed.yaml @@ -0,0 +1,58 @@ +id: ebook-download-6ad6b5074b24fa1505e13d3a89bb00ed + +info: + name: > + Zedna eBook download < 1.2 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07aee46a-a32d-4d31-9541-4e183299b09c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ebook-download/" + google-query: inurl:"/wp-content/plugins/ebook-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ebook-download,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ebook-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebook-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ebook-store-0b18a98b24cbdb105ec0fbddf0f9fc1f.yaml b/nuclei-templates/cve-less/plugins/ebook-store-0b18a98b24cbdb105ec0fbddf0f9fc1f.yaml new file mode 100644 index 0000000000..808aceba9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ebook-store-0b18a98b24cbdb105ec0fbddf0f9fc1f.yaml @@ -0,0 +1,58 @@ +id: ebook-store-0b18a98b24cbdb105ec0fbddf0f9fc1f + +info: + name: > + Ebook Store < 5.78 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/097f6887-e15f-4e35-ab12-1115630e13cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ebook-store/" + google-query: inurl:"/wp-content/plugins/ebook-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ebook-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ebook-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebook-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.78') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ebook-store-898935c481a1816ebd33c0960cec20d4.yaml b/nuclei-templates/cve-less/plugins/ebook-store-898935c481a1816ebd33c0960cec20d4.yaml new file mode 100644 index 0000000000..cd45cde381 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ebook-store-898935c481a1816ebd33c0960cec20d4.yaml @@ -0,0 +1,58 @@ +id: ebook-store-898935c481a1816ebd33c0960cec20d4 + +info: + name: > + Ebook Store <= 5.788 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e36eed5b-f76d-451e-a0f8-fd4b91bcf9f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ebook-store/" + google-query: inurl:"/wp-content/plugins/ebook-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ebook-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ebook-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebook-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.788') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ebook-store-b6e604dc0c4bb898e75726aff1be1de2.yaml b/nuclei-templates/cve-less/plugins/ebook-store-b6e604dc0c4bb898e75726aff1be1de2.yaml new file mode 100644 index 0000000000..dc4bf88c50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ebook-store-b6e604dc0c4bb898e75726aff1be1de2.yaml @@ -0,0 +1,58 @@ +id: ebook-store-b6e604dc0c4bb898e75726aff1be1de2 + +info: + name: > + Ebook Store <= 5.8001 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ad4949-b7e8-4c50-af64-c59e053cfd0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ebook-store/" + google-query: inurl:"/wp-content/plugins/ebook-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ebook-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ebook-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebook-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8001') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ebook-store-e077433f57a559397a844ed63a88920a.yaml b/nuclei-templates/cve-less/plugins/ebook-store-e077433f57a559397a844ed63a88920a.yaml new file mode 100644 index 0000000000..06f146601e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ebook-store-e077433f57a559397a844ed63a88920a.yaml @@ -0,0 +1,58 @@ +id: ebook-store-e077433f57a559397a844ed63a88920a + +info: + name: > + Ebook Store <= 5.775 - Missing Authorization via ebook_store_export_orders + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4b17cce-bb52-4125-8c85-6da15517275f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ebook-store/" + google-query: inurl:"/wp-content/plugins/ebook-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ebook-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ebook-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebook-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.775') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/echo-knowledge-base-90823deeda228cab8f47ba8bfd583141.yaml b/nuclei-templates/cve-less/plugins/echo-knowledge-base-90823deeda228cab8f47ba8bfd583141.yaml new file mode 100644 index 0000000000..4baa157822 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/echo-knowledge-base-90823deeda228cab8f47ba8bfd583141.yaml @@ -0,0 +1,58 @@ +id: echo-knowledge-base-90823deeda228cab8f47ba8bfd583141 + +info: + name: > + Knowledge Base for Documentation, FAQs with AI Assistance <= 11.30.2 - Unauthenticated PHP Object Injection in is_article_recently_viewed + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41cfe1d7-2fab-413c-80e5-40d77133d229?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/echo-knowledge-base/" + google-query: inurl:"/wp-content/plugins/echo-knowledge-base/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,echo-knowledge-base,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/echo-knowledge-base/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "echo-knowledge-base" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.30.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/echosign-0dc068ee145b8173a92e905141be0d9e.yaml b/nuclei-templates/cve-less/plugins/echosign-0dc068ee145b8173a92e905141be0d9e.yaml new file mode 100644 index 0000000000..3821c21db5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/echosign-0dc068ee145b8173a92e905141be0d9e.yaml @@ -0,0 +1,58 @@ +id: echosign-0dc068ee145b8173a92e905141be0d9e + +info: + name: > + Echo Sign < 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3fc1686-06a0-4d48-bb79-470e63cd3600?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/echosign/" + google-query: inurl:"/wp-content/plugins/echosign/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,echosign,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/echosign/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "echosign" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/echosign-9cf68cc8a68a2c81ff64f2eb044f1190.yaml b/nuclei-templates/cve-less/plugins/echosign-9cf68cc8a68a2c81ff64f2eb044f1190.yaml new file mode 100644 index 0000000000..1b6909ab94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/echosign-9cf68cc8a68a2c81ff64f2eb044f1190.yaml @@ -0,0 +1,58 @@ +id: echosign-9cf68cc8a68a2c81ff64f2eb044f1190 + +info: + name: > + Echo Sign < 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3302110-60ae-4ad1-8a8c-3511027da3a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/echosign/" + google-query: inurl:"/wp-content/plugins/echosign/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,echosign,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/echosign/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "echosign" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-0e1a3b18a1b946d1c273b3cccc408050.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-0e1a3b18a1b946d1c273b3cccc408050.yaml new file mode 100644 index 0000000000..f06b753ada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-0e1a3b18a1b946d1c273b3cccc408050.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-0e1a3b18a1b946d1c273b3cccc408050 + +info: + name: > + eCommerce Product Catalog Plugin for WordPress <= 3.3.32 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc15bc48-31f6-4829-8f9b-cd2d1c7c5280?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-292ccea97458e988671a2f5d1ab07fab.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-292ccea97458e988671a2f5d1ab07fab.yaml new file mode 100644 index 0000000000..a71ffe54ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-292ccea97458e988671a2f5d1ab07fab.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-292ccea97458e988671a2f5d1ab07fab + +info: + name: > + eCommerce Product Catalog Plugin for WordPress <= 2.9.43 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2eb963dd-41c3-43cd-afb7-1be054829ea3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-2ab97a490ab3483a1ecd9eeb3292652a.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-2ab97a490ab3483a1ecd9eeb3292652a.yaml new file mode 100644 index 0000000000..47ed399f6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-2ab97a490ab3483a1ecd9eeb3292652a.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-2ab97a490ab3483a1ecd9eeb3292652a + +info: + name: > + eCommerce Product Catalog Plugin for WordPress <= 3.0.69 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f447d25-1a38-48fe-8079-5ff425382046?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-3319cf0ede499d0a15c5de919fc4d867.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-3319cf0ede499d0a15c5de919fc4d867.yaml new file mode 100644 index 0000000000..e36381b363 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-3319cf0ede499d0a15c5de919fc4d867.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-3319cf0ede499d0a15c5de919fc4d867 + +info: + name: > + eCommerce Product Catalog Plugin for WordPress <= 3.0.17 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12ecf3d5-1457-405a-8856-517c7d2f2db1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-656ddddc75a5e8d95a513d12188cc2a1.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-656ddddc75a5e8d95a513d12188cc2a1.yaml new file mode 100644 index 0000000000..df459bf208 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-656ddddc75a5e8d95a513d12188cc2a1.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-656ddddc75a5e8d95a513d12188cc2a1 + +info: + name: > + eCommerce Product Catalog <= 3.0.71 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56abcad2-5be0-422c-a33f-91bc123364e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-6956e38d645c6fe5f56835ed84bbc61b.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-6956e38d645c6fe5f56835ed84bbc61b.yaml new file mode 100644 index 0000000000..a11837a320 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-6956e38d645c6fe5f56835ed84bbc61b.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-6956e38d645c6fe5f56835ed84bbc61b + +info: + name: > + eCommerce Product Catalog <= 3.0.71 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed42e29f-d263-43fc-b06e-b7aaaa7622f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-908797ba849f02597e888316e5bb0c25.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-908797ba849f02597e888316e5bb0c25.yaml new file mode 100644 index 0000000000..b17cb056d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-908797ba849f02597e888316e5bb0c25.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-908797ba849f02597e888316e5bb0c25 + +info: + name: > + eCommerce Product Catalog Plugin for WordPress <= 3.0.70 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67e3096e-7641-4f95-9e16-c1b45028c7eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-90a088835020a5c787dfade0eee8a2e0.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-90a088835020a5c787dfade0eee8a2e0.yaml new file mode 100644 index 0000000000..67d7923143 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-90a088835020a5c787dfade0eee8a2e0.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-90a088835020a5c787dfade0eee8a2e0 + +info: + name: > + eCommerce Product Catalog plugin for WordPress <= 3.3.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26b7438e-438b-41eb-9458-2fba8ab1964d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9daff448e161c27a1010bad80a987a15.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9daff448e161c27a1010bad80a987a15.yaml new file mode 100644 index 0000000000..5671996043 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9daff448e161c27a1010bad80a987a15.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-9daff448e161c27a1010bad80a987a15 + +info: + name: > + eCommerce Product Catalog for WordPress <= 3.3.26 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39695b53-9af7-42f0-8bde-3969398a7186?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9f4117fe62888ab2f2b714ed12570706.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9f4117fe62888ab2f2b714ed12570706.yaml new file mode 100644 index 0000000000..044ed70467 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9f4117fe62888ab2f2b714ed12570706.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-9f4117fe62888ab2f2b714ed12570706 + +info: + name: > + eCommerce Product Catalog <= 3.0.38 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5eba6825-9a3a-4af5-8d8a-9439ab374cc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9f6d47d07822136b59fe192df481593b.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9f6d47d07822136b59fe192df481593b.yaml new file mode 100644 index 0000000000..84b7f35957 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-9f6d47d07822136b59fe192df481593b.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-9f6d47d07822136b59fe192df481593b + +info: + name: > + eCommerce Product Catalog <= 3.3.28 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5c0ff52-57c2-447f-bb22-2079607c3217?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-cbd1d41b26b0296545c9edd7581d3ebc.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-cbd1d41b26b0296545c9edd7581d3ebc.yaml new file mode 100644 index 0000000000..25f2d80acf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-cbd1d41b26b0296545c9edd7581d3ebc.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-cbd1d41b26b0296545c9edd7581d3ebc + +info: + name: > + eCommerce Product Catalog <= 3.3.26 - Sensitive Information Exposure via CSV Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b48b9170-4dd9-4004-a081-488cafbc7597?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-f239cdbdbea64adf739686a8765fc6ab.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-f239cdbdbea64adf739686a8765fc6ab.yaml new file mode 100644 index 0000000000..8b50dd06c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-f239cdbdbea64adf739686a8765fc6ab.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-f239cdbdbea64adf739686a8765fc6ab + +info: + name: > + Vulnerability: eCommerce Product Catalog plugin for WordPress <= 3.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46db2d07-66a6-4d9e-b0fd-ddf6119ba5be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-fae58dcbc303cd1d67051f496ccc1326.yaml b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-fae58dcbc303cd1d67051f496ccc1326.yaml new file mode 100644 index 0000000000..9953d7edb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-product-catalog-fae58dcbc303cd1d67051f496ccc1326.yaml @@ -0,0 +1,58 @@ +id: ecommerce-product-catalog-fae58dcbc303cd1d67051f496ccc1326 + +info: + name: > + eCommerce Product Catalog for WordPress <= 3.3.25 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba70f811-543f-4da4-ba45-715dbd6be6be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-product-catalog/" + google-query: inurl:"/wp-content/plugins/ecommerce-product-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-product-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-product-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-product-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecommerce-two-factor-authentication-95ef764b37cb71c966879176967dfe4f.yaml b/nuclei-templates/cve-less/plugins/ecommerce-two-factor-authentication-95ef764b37cb71c966879176967dfe4f.yaml new file mode 100644 index 0000000000..996276ecf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecommerce-two-factor-authentication-95ef764b37cb71c966879176967dfe4f.yaml @@ -0,0 +1,58 @@ +id: ecommerce-two-factor-authentication-95ef764b37cb71c966879176967dfe4f + +info: + name: > + Ecommerce - Two Factor Authentication <= 1.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84f10360-3c8b-487e-9213-dbdf1e41cbe7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecommerce-two-factor-authentication/" + google-query: inurl:"/wp-content/plugins/ecommerce-two-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecommerce-two-factor-authentication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecommerce-two-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecommerce-two-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecpay-logistics-for-woocommerce-fa186d1e1ec1e8fa099b44e363e81256.yaml b/nuclei-templates/cve-less/plugins/ecpay-logistics-for-woocommerce-fa186d1e1ec1e8fa099b44e363e81256.yaml new file mode 100644 index 0000000000..89cdbb4a86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecpay-logistics-for-woocommerce-fa186d1e1ec1e8fa099b44e363e81256.yaml @@ -0,0 +1,58 @@ +id: ecpay-logistics-for-woocommerce-fa186d1e1ec1e8fa099b44e363e81256 + +info: + name: > + ECPay Logistics for WooCommerce <= 1.2.181030 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68d71bd0-176c-4eee-99c2-9b591d6f70d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecpay-logistics-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ecpay-logistics-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecpay-logistics-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecpay-logistics-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecpay-logistics-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.181030') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-106c0a7404df198e82204052394ad569.yaml b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-106c0a7404df198e82204052394ad569.yaml new file mode 100644 index 0000000000..b0146c4dd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-106c0a7404df198e82204052394ad569.yaml @@ -0,0 +1,58 @@ +id: ecwid-shopping-cart-106c0a7404df198e82204052394ad569 + +info: + name: > + Ecwid Ecommerce Shopping Cart <= 6.10.22 - Insufficient Access Control on Multiple AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8a12e1d-f46a-499e-bfd6-185d5b955071?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecwid-shopping-cart/" + google-query: inurl:"/wp-content/plugins/ecwid-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecwid-shopping-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecwid-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecwid-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-3bc18d019b91d2de29e8f02de7016b9b.yaml b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-3bc18d019b91d2de29e8f02de7016b9b.yaml new file mode 100644 index 0000000000..42216a03e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-3bc18d019b91d2de29e8f02de7016b9b.yaml @@ -0,0 +1,58 @@ +id: ecwid-shopping-cart-3bc18d019b91d2de29e8f02de7016b9b + +info: + name: > + Ecwid Ecommerce Shopping Cart <= 6.12.3 - Missing Authorization on multiple functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3d5bc99-2b55-4e19-8304-e56f3d4a2f1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecwid-shopping-cart/" + google-query: inurl:"/wp-content/plugins/ecwid-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecwid-shopping-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecwid-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecwid-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.12.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-46eb2de249c5ae6cf9fd3c49e21bb4bd.yaml b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-46eb2de249c5ae6cf9fd3c49e21bb4bd.yaml new file mode 100644 index 0000000000..a9d21ab49e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-46eb2de249c5ae6cf9fd3c49e21bb4bd.yaml @@ -0,0 +1,58 @@ +id: ecwid-shopping-cart-46eb2de249c5ae6cf9fd3c49e21bb4bd + +info: + name: > + Ecwid Ecommerce Shopping Cart <= 6.11.3 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f02cc66-7782-45fe-ae5e-340ff7ae1fe9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecwid-shopping-cart/" + google-query: inurl:"/wp-content/plugins/ecwid-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecwid-shopping-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecwid-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecwid-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-b6af58199f4bb361c122e5469834d6a6.yaml b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-b6af58199f4bb361c122e5469834d6a6.yaml new file mode 100644 index 0000000000..72ab5f4e47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-b6af58199f4bb361c122e5469834d6a6.yaml @@ -0,0 +1,58 @@ +id: ecwid-shopping-cart-b6af58199f4bb361c122e5469834d6a6 + +info: + name: > + Ecwid Shopping Cart <= 6.11.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8c530e2-ce42-40f3-82ab-1df9089a5407?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecwid-shopping-cart/" + google-query: inurl:"/wp-content/plugins/ecwid-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecwid-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecwid-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecwid-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.11.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-cbb1fea9bfad5a9264ec67a1ffb3cfd0.yaml b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-cbb1fea9bfad5a9264ec67a1ffb3cfd0.yaml new file mode 100644 index 0000000000..2bbd6405fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-cbb1fea9bfad5a9264ec67a1ffb3cfd0.yaml @@ -0,0 +1,58 @@ +id: ecwid-shopping-cart-cbb1fea9bfad5a9264ec67a1ffb3cfd0 + +info: + name: > + Ecwid Ecommerce Shopping Cart <= 6.10.23 - Cross-Site Request Forgery to Settings/Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/757938f4-c6ef-4152-a0d6-f14d2a043c85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecwid-shopping-cart/" + google-query: inurl:"/wp-content/plugins/ecwid-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecwid-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecwid-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecwid-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-d5b7868baeed541383a9080a76f80c46.yaml b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-d5b7868baeed541383a9080a76f80c46.yaml new file mode 100644 index 0000000000..849b8695ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-d5b7868baeed541383a9080a76f80c46.yaml @@ -0,0 +1,58 @@ +id: ecwid-shopping-cart-d5b7868baeed541383a9080a76f80c46 + +info: + name: > + Ecwid Ecommerce Shopping Cart <= 4.4.3 - Unauthenticated PHP Object injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af5a58d1-946a-451b-bc8b-a397345ae89a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecwid-shopping-cart/" + google-query: inurl:"/wp-content/plugins/ecwid-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecwid-shopping-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecwid-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecwid-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-e67a592d479a1912f830dde99db21328.yaml b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-e67a592d479a1912f830dde99db21328.yaml new file mode 100644 index 0000000000..2fc803c665 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-e67a592d479a1912f830dde99db21328.yaml @@ -0,0 +1,58 @@ +id: ecwid-shopping-cart-e67a592d479a1912f830dde99db21328 + +info: + name: > + Ecwid Ecommerce Shopping Cart <= 6.12.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db5d6cc9-24d7-42bf-905e-4c3764c659ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecwid-shopping-cart/" + google-query: inurl:"/wp-content/plugins/ecwid-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecwid-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecwid-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecwid-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.12.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-e96409adbbb169ea331189d4d409f4de.yaml b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-e96409adbbb169ea331189d4d409f4de.yaml new file mode 100644 index 0000000000..ba6a78f673 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ecwid-shopping-cart-e96409adbbb169ea331189d4d409f4de.yaml @@ -0,0 +1,58 @@ +id: ecwid-shopping-cart-e96409adbbb169ea331189d4d409f4de + +info: + name: > + Ecwid Ecommerce Shopping Cart <= 6.12.10 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e10127aa-a5a5-4394-8b54-b57ba1369d77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ecwid-shopping-cart/" + google-query: inurl:"/wp-content/plugins/ecwid-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ecwid-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ecwid-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecwid-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.12.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-amazon-s3-188892e32d2c439c02d6eec7a4adfdb5.yaml b/nuclei-templates/cve-less/plugins/edd-amazon-s3-188892e32d2c439c02d6eec7a4adfdb5.yaml new file mode 100644 index 0000000000..9b9395711c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-amazon-s3-188892e32d2c439c02d6eec7a4adfdb5.yaml @@ -0,0 +1,58 @@ +id: edd-amazon-s3-188892e32d2c439c02d6eec7a4adfdb5 + +info: + name: > + Easy Digital Downloads – Amazon S3 <= 2.1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcfca0fe-5b15-4276-896a-9ad12b9a9478?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-amazon-s3/" + google-query: inurl:"/wp-content/plugins/edd-amazon-s3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-amazon-s3,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-amazon-s3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-amazon-s3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-attach-accounts-to-orders-aff649abeaf4857a79fa8884fa07fcd1.yaml b/nuclei-templates/cve-less/plugins/edd-attach-accounts-to-orders-aff649abeaf4857a79fa8884fa07fcd1.yaml new file mode 100644 index 0000000000..16e62687f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-attach-accounts-to-orders-aff649abeaf4857a79fa8884fa07fcd1.yaml @@ -0,0 +1,58 @@ +id: edd-attach-accounts-to-orders-aff649abeaf4857a79fa8884fa07fcd1 + +info: + name: > + Easy Digital Downloads – Attach Accounts to Orders <= 2.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/980d1726-375f-41b2-a67c-1b934e20312c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-attach-accounts-to-orders/" + google-query: inurl:"/wp-content/plugins/edd-attach-accounts-to-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-attach-accounts-to-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-attach-accounts-to-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-attach-accounts-to-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-cashapp-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/edd-cashapp-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ac02b90526 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-cashapp-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: edd-cashapp-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-cashapp/" + google-query: inurl:"/wp-content/plugins/edd-cashapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-cashapp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-cashapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-cashapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-commissions-dccce9109c5a84af7a34cbb0742260bc.yaml b/nuclei-templates/cve-less/plugins/edd-commissions-dccce9109c5a84af7a34cbb0742260bc.yaml new file mode 100644 index 0000000000..bc9b9c262f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-commissions-dccce9109c5a84af7a34cbb0742260bc.yaml @@ -0,0 +1,58 @@ +id: edd-commissions-dccce9109c5a84af7a34cbb0742260bc + +info: + name: > + Easy Digital Downloads – Commissions <= 3.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf356066-fb25-4f6a-8600-91c7f1d098bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-commissions/" + google-query: inurl:"/wp-content/plugins/edd-commissions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-commissions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-commissions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-commissions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-conditional-success-redirects-3b1d00a18f864c139ec613a9e0ffecf2.yaml b/nuclei-templates/cve-less/plugins/edd-conditional-success-redirects-3b1d00a18f864c139ec613a9e0ffecf2.yaml new file mode 100644 index 0000000000..c072a79fc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-conditional-success-redirects-3b1d00a18f864c139ec613a9e0ffecf2.yaml @@ -0,0 +1,58 @@ +id: edd-conditional-success-redirects-3b1d00a18f864c139ec613a9e0ffecf2 + +info: + name: > + Easy Digital Downloads – Conditional Success Redirects < 1.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ce8258f-64f7-4d5e-870a-973500eed0eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-conditional-success-redirects/" + google-query: inurl:"/wp-content/plugins/edd-conditional-success-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-conditional-success-redirects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-conditional-success-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-conditional-success-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-content-restriction-d192f8275b2c7772bc52294d4963918a.yaml b/nuclei-templates/cve-less/plugins/edd-content-restriction-d192f8275b2c7772bc52294d4963918a.yaml new file mode 100644 index 0000000000..0c8330cd70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-content-restriction-d192f8275b2c7772bc52294d4963918a.yaml @@ -0,0 +1,58 @@ +id: edd-content-restriction-d192f8275b2c7772bc52294d4963918a + +info: + name: > + Easy Digital Downloads – Content Restriction <= 2.0.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0485897-4d1d-442d-9c81-4b4bb40e3983?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-content-restriction/" + google-query: inurl:"/wp-content/plugins/edd-content-restriction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-content-restriction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-content-restriction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-content-restriction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-courses-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/edd-courses-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..9199f48fdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-courses-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: edd-courses-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-courses/" + google-query: inurl:"/wp-content/plugins/edd-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-courses,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-cross-sell-and-upsell-e8637d731d41eb4cc5029aaa77c50673.yaml b/nuclei-templates/cve-less/plugins/edd-cross-sell-and-upsell-e8637d731d41eb4cc5029aaa77c50673.yaml new file mode 100644 index 0000000000..b39a5b0368 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-cross-sell-and-upsell-e8637d731d41eb4cc5029aaa77c50673.yaml @@ -0,0 +1,58 @@ +id: edd-cross-sell-and-upsell-e8637d731d41eb4cc5029aaa77c50673 + +info: + name: > + Easy Digital Downloads - Cross-Sell and Upsell <= 1.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0f2fe23-c77c-4e24-a1e4-0aa3697370e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-cross-sell-and-upsell/" + google-query: inurl:"/wp-content/plugins/edd-cross-sell-and-upsell/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-cross-sell-and-upsell,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-cross-sell-and-upsell/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-cross-sell-and-upsell" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-favorites-4f94094a1cb01e1f7943775986788b65.yaml b/nuclei-templates/cve-less/plugins/edd-favorites-4f94094a1cb01e1f7943775986788b65.yaml new file mode 100644 index 0000000000..71348524f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-favorites-4f94094a1cb01e1f7943775986788b65.yaml @@ -0,0 +1,58 @@ +id: edd-favorites-4f94094a1cb01e1f7943775986788b65 + +info: + name: > + Easy Digital Downloads – Favorites <= 1.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33836cee-c3f6-4c49-9acb-7c8f00839fdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-favorites/" + google-query: inurl:"/wp-content/plugins/edd-favorites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-favorites,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-favorites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-favorites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-free-downloads-96ff2499f32e58024088e6b7c6dc3990.yaml b/nuclei-templates/cve-less/plugins/edd-free-downloads-96ff2499f32e58024088e6b7c6dc3990.yaml new file mode 100644 index 0000000000..4571f54a95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-free-downloads-96ff2499f32e58024088e6b7c6dc3990.yaml @@ -0,0 +1,58 @@ +id: edd-free-downloads-96ff2499f32e58024088e6b7c6dc3990 + +info: + name: > + Easy Digital Downloads – Free Downloads <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f203fb35-e217-4912-aa80-0bb6b3de1830?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-free-downloads/" + google-query: inurl:"/wp-content/plugins/edd-free-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-free-downloads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-free-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-free-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-invoices-61717663c17e62c7f08a76483f0eeff3.yaml b/nuclei-templates/cve-less/plugins/edd-invoices-61717663c17e62c7f08a76483f0eeff3.yaml new file mode 100644 index 0000000000..090c8d4658 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-invoices-61717663c17e62c7f08a76483f0eeff3.yaml @@ -0,0 +1,58 @@ +id: edd-invoices-61717663c17e62c7f08a76483f0eeff3 + +info: + name: > + Easy Digital Downloads – Invoices <= 1.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca8c676a-144c-4809-b8f6-50cb9e1390b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-invoices/" + google-query: inurl:"/wp-content/plugins/edd-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-invoices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-invoices-d21243f7c0461744fbee4b3ace491e32.yaml b/nuclei-templates/cve-less/plugins/edd-invoices-d21243f7c0461744fbee4b3ace491e32.yaml new file mode 100644 index 0000000000..82ea8f878c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-invoices-d21243f7c0461744fbee4b3ace491e32.yaml @@ -0,0 +1,58 @@ +id: edd-invoices-d21243f7c0461744fbee4b3ace491e32 + +info: + name: > + Easy Digital Downloads – PDF Invoices < 1.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e83475e-03fc-47b8-b23c-a7b16641351b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-invoices/" + google-query: inurl:"/wp-content/plugins/edd-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-invoices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-manual-purchases-ece0f7db12607af6e93bd47b255fcaad.yaml b/nuclei-templates/cve-less/plugins/edd-manual-purchases-ece0f7db12607af6e93bd47b255fcaad.yaml new file mode 100644 index 0000000000..378d216cb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-manual-purchases-ece0f7db12607af6e93bd47b255fcaad.yaml @@ -0,0 +1,58 @@ +id: edd-manual-purchases-ece0f7db12607af6e93bd47b255fcaad + +info: + name: > + Easy Digital Downloads – Manual Purchases < 1.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdaea9be-64ef-4567-ae17-08ae44293b5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-manual-purchases/" + google-query: inurl:"/wp-content/plugins/edd-manual-purchases/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-manual-purchases,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-manual-purchases/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-manual-purchases" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-pdf-stamper-7028a373145887022c971f45128fcdba.yaml b/nuclei-templates/cve-less/plugins/edd-pdf-stamper-7028a373145887022c971f45128fcdba.yaml new file mode 100644 index 0000000000..60ce425fe8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-pdf-stamper-7028a373145887022c971f45128fcdba.yaml @@ -0,0 +1,58 @@ +id: edd-pdf-stamper-7028a373145887022c971f45128fcdba + +info: + name: > + Easy Digital Downloads – PDF Stamper <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/438f98f7-b966-4e07-a62e-a918cce3f6c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-pdf-stamper/" + google-query: inurl:"/wp-content/plugins/edd-pdf-stamper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-pdf-stamper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-pdf-stamper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-pdf-stamper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-per-product-emails-d51efaf8de0ecaf24f9a181bc5d20bee.yaml b/nuclei-templates/cve-less/plugins/edd-per-product-emails-d51efaf8de0ecaf24f9a181bc5d20bee.yaml new file mode 100644 index 0000000000..3b3b8c24a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-per-product-emails-d51efaf8de0ecaf24f9a181bc5d20bee.yaml @@ -0,0 +1,58 @@ +id: edd-per-product-emails-d51efaf8de0ecaf24f9a181bc5d20bee + +info: + name: > + Easy Digital Downloads – Per Product Emails < 1.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29125de3-eeed-4537-8915-e8100d2e65ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-per-product-emails/" + google-query: inurl:"/wp-content/plugins/edd-per-product-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-per-product-emails,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-per-product-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-per-product-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-product-reviews-2a6ac5f100690b8d0b4a16d1c12f679f.yaml b/nuclei-templates/cve-less/plugins/edd-product-reviews-2a6ac5f100690b8d0b4a16d1c12f679f.yaml new file mode 100644 index 0000000000..dd56f21f25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-product-reviews-2a6ac5f100690b8d0b4a16d1c12f679f.yaml @@ -0,0 +1,58 @@ +id: edd-product-reviews-2a6ac5f100690b8d0b4a16d1c12f679f + +info: + name: > + Easy Digital Downloads – Product Reviews <= 1.3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d88a7c35-fe98-48eb-960b-0e4f8fcab4cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-product-reviews/" + google-query: inurl:"/wp-content/plugins/edd-product-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-product-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-product-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-product-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-pushover-notifications-0a523ea5e4a860d6c23793246d1e5019.yaml b/nuclei-templates/cve-less/plugins/edd-pushover-notifications-0a523ea5e4a860d6c23793246d1e5019.yaml new file mode 100644 index 0000000000..f99aa719e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-pushover-notifications-0a523ea5e4a860d6c23793246d1e5019.yaml @@ -0,0 +1,58 @@ +id: edd-pushover-notifications-0a523ea5e4a860d6c23793246d1e5019 + +info: + name: > + Easy Digital Downloads – Pushover notifications <= 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b17c5b5e-26d9-485d-881e-bd4414f29f1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-pushover-notifications/" + google-query: inurl:"/wp-content/plugins/edd-pushover-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-pushover-notifications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-pushover-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-pushover-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-qr-codes-4bf1b8de6af96f98a7a1f3714d0ed32c.yaml b/nuclei-templates/cve-less/plugins/edd-qr-codes-4bf1b8de6af96f98a7a1f3714d0ed32c.yaml new file mode 100644 index 0000000000..791f96d7e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-qr-codes-4bf1b8de6af96f98a7a1f3714d0ed32c.yaml @@ -0,0 +1,58 @@ +id: edd-qr-codes-4bf1b8de6af96f98a7a1f3714d0ed32c + +info: + name: > + Easy Digital Downloads – QR Codes <= 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef08c1ad-fc85-4154-8634-21c506436317?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-qr-codes/" + google-query: inurl:"/wp-content/plugins/edd-qr-codes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-qr-codes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-qr-codes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-qr-codes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-recount-earnings-5c7b076501be3d3c98666ffe30ae6a26.yaml b/nuclei-templates/cve-less/plugins/edd-recount-earnings-5c7b076501be3d3c98666ffe30ae6a26.yaml new file mode 100644 index 0000000000..d87e9df12e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-recount-earnings-5c7b076501be3d3c98666ffe30ae6a26.yaml @@ -0,0 +1,58 @@ +id: edd-recount-earnings-5c7b076501be3d3c98666ffe30ae6a26 + +info: + name: > + Easy Digital Downloads – Recount Earnings <= 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34a46c3a-22f9-4f61-844b-dd03c5208be7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-recount-earnings/" + google-query: inurl:"/wp-content/plugins/edd-recount-earnings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-recount-earnings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-recount-earnings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-recount-earnings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-recurring-payments-099ead226109d18c4bc71e3d4e743b55.yaml b/nuclei-templates/cve-less/plugins/edd-recurring-payments-099ead226109d18c4bc71e3d4e743b55.yaml new file mode 100644 index 0000000000..62fd325650 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-recurring-payments-099ead226109d18c4bc71e3d4e743b55.yaml @@ -0,0 +1,58 @@ +id: edd-recurring-payments-099ead226109d18c4bc71e3d4e743b55 + +info: + name: > + Easy Digital Downloads – Recurring Payments <= 2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f958ed28-0520-47c7-9b60-94e7c6504d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-recurring-payments/" + google-query: inurl:"/wp-content/plugins/edd-recurring-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-recurring-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-recurring-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-recurring-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-software-licensing-52e4049030db45f1344545c480f7a4ef.yaml b/nuclei-templates/cve-less/plugins/edd-software-licensing-52e4049030db45f1344545c480f7a4ef.yaml new file mode 100644 index 0000000000..9776035472 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-software-licensing-52e4049030db45f1344545c480f7a4ef.yaml @@ -0,0 +1,58 @@ +id: edd-software-licensing-52e4049030db45f1344545c480f7a4ef + +info: + name: > + Easy Digital Downloads – Software Licensing < 3.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a9f17e3-f1cf-44c5-a4eb-38b43b00f912?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-software-licensing/" + google-query: inurl:"/wp-content/plugins/edd-software-licensing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-software-licensing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-software-licensing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-software-licensing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-tab-manager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/edd-tab-manager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..5011b02991 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-tab-manager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: edd-tab-manager-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-tab-manager/" + google-query: inurl:"/wp-content/plugins/edd-tab-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-tab-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-tab-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-tab-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-upload-file-268f9394678ef20df569fe0eb2e92a44.yaml b/nuclei-templates/cve-less/plugins/edd-upload-file-268f9394678ef20df569fe0eb2e92a44.yaml new file mode 100644 index 0000000000..a53dc9b52e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-upload-file-268f9394678ef20df569fe0eb2e92a44.yaml @@ -0,0 +1,58 @@ +id: edd-upload-file-268f9394678ef20df569fe0eb2e92a44 + +info: + name: > + Easy Digital Downloads – Upload File <= 1.0.4 - Arbitrary File Upload/Deletion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/186517cd-e444-457a-9e10-583f41595511?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-upload-file/" + google-query: inurl:"/wp-content/plugins/edd-upload-file/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-upload-file,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-upload-file/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-upload-file" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-venmo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/edd-venmo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ff55c4d413 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-venmo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: edd-venmo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-venmo/" + google-query: inurl:"/wp-content/plugins/edd-venmo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-venmo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-venmo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-venmo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edd-wish-lists-0633b5d5c2288fd164f50f774a52dac5.yaml b/nuclei-templates/cve-less/plugins/edd-wish-lists-0633b5d5c2288fd164f50f774a52dac5.yaml new file mode 100644 index 0000000000..29171a020b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edd-wish-lists-0633b5d5c2288fd164f50f774a52dac5.yaml @@ -0,0 +1,58 @@ +id: edd-wish-lists-0633b5d5c2288fd164f50f774a52dac5 + +info: + name: > + Easy Digital Downloads – Wish Lists < 1.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0d96341-049c-4554-946b-12e2bf3e972e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edd-wish-lists/" + google-query: inurl:"/wp-content/plugins/edd-wish-lists/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edd-wish-lists,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edd-wish-lists/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edd-wish-lists" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edge-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/edge-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c906680f6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edge-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: edge-gallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edge-gallery/" + google-query: inurl:"/wp-content/plugins/edge-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edge-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edge-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edge-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edit-comments-7b827ab34d96ee14e9116ea8db988679.yaml b/nuclei-templates/cve-less/plugins/edit-comments-7b827ab34d96ee14e9116ea8db988679.yaml new file mode 100644 index 0000000000..d48d70a286 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edit-comments-7b827ab34d96ee14e9116ea8db988679.yaml @@ -0,0 +1,58 @@ +id: edit-comments-7b827ab34d96ee14e9116ea8db988679 + +info: + name: > + Edit Comments <= 0.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7c94c68-bf3c-49b0-b7eb-39374c6002aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edit-comments/" + google-query: inurl:"/wp-content/plugins/edit-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edit-comments,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edit-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edit-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edit-comments-b54ef55c09174d7838779006173ea01a.yaml b/nuclei-templates/cve-less/plugins/edit-comments-b54ef55c09174d7838779006173ea01a.yaml new file mode 100644 index 0000000000..912f70d86d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edit-comments-b54ef55c09174d7838779006173ea01a.yaml @@ -0,0 +1,58 @@ +id: edit-comments-b54ef55c09174d7838779006173ea01a + +info: + name: > + Edit Comments <= 0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a93ecaf-582d-4689-ba1f-52731c4b1ab7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edit-comments/" + google-query: inurl:"/wp-content/plugins/edit-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edit-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edit-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edit-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edit-comments-xt-c955d255994c77fa2afb0b159f25b5a9.yaml b/nuclei-templates/cve-less/plugins/edit-comments-xt-c955d255994c77fa2afb0b159f25b5a9.yaml new file mode 100644 index 0000000000..55450fe1b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edit-comments-xt-c955d255994c77fa2afb0b159f25b5a9.yaml @@ -0,0 +1,58 @@ +id: edit-comments-xt-c955d255994c77fa2afb0b159f25b5a9 + +info: + name: > + Edit Comments XT <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00622a39-7230-4263-8e25-b0917df80191?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edit-comments-xt/" + google-query: inurl:"/wp-content/plugins/edit-comments-xt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edit-comments-xt,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edit-comments-xt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edit-comments-xt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/editable-table-3f51c790e689dcb447adc1ee79fee545.yaml b/nuclei-templates/cve-less/plugins/editable-table-3f51c790e689dcb447adc1ee79fee545.yaml new file mode 100644 index 0000000000..853c2b3a96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/editable-table-3f51c790e689dcb447adc1ee79fee545.yaml @@ -0,0 +1,58 @@ +id: editable-table-3f51c790e689dcb447adc1ee79fee545 + +info: + name: > + Editable Table Simple Fast FrontEnd From Sql tables <= 0.1.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70aaef82-c93b-4f2b-8d57-6c28d45942ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/editable-table/" + google-query: inurl:"/wp-content/plugins/editable-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,editable-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/editable-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "editable-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/editorial-calendar-a85ca9a2b7f246b28c6ccf181717216e.yaml b/nuclei-templates/cve-less/plugins/editorial-calendar-a85ca9a2b7f246b28c6ccf181717216e.yaml new file mode 100644 index 0000000000..e5b1c6325a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/editorial-calendar-a85ca9a2b7f246b28c6ccf181717216e.yaml @@ -0,0 +1,58 @@ +id: editorial-calendar-a85ca9a2b7f246b28c6ccf181717216e + +info: + name: > + Editorial Calendar <= 3.7.12 - Authenticated (Contributor+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f01ad95-7a51-408c-917f-4350dbeabb2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/editorial-calendar/" + google-query: inurl:"/wp-content/plugins/editorial-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,editorial-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/editorial-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "editorial-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/editorial-calendar-b0561191aff3bb3e5af8336a71c1ffcc.yaml b/nuclei-templates/cve-less/plugins/editorial-calendar-b0561191aff3bb3e5af8336a71c1ffcc.yaml new file mode 100644 index 0000000000..dbb19044bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/editorial-calendar-b0561191aff3bb3e5af8336a71c1ffcc.yaml @@ -0,0 +1,58 @@ +id: editorial-calendar-b0561191aff3bb3e5af8336a71c1ffcc + +info: + name: > + Editorial Calendar <= 3.8.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via edcal_saveoptions AJAX action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3dac7b6-512d-4fd6-8294-f0b1c0a2efd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/editorial-calendar/" + google-query: inurl:"/wp-content/plugins/editorial-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,editorial-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/editorial-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "editorial-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/editorial-calendar-c978227ed54be6d80dbe1ecf4f522c4f.yaml b/nuclei-templates/cve-less/plugins/editorial-calendar-c978227ed54be6d80dbe1ecf4f522c4f.yaml new file mode 100644 index 0000000000..5593f0672c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/editorial-calendar-c978227ed54be6d80dbe1ecf4f522c4f.yaml @@ -0,0 +1,58 @@ +id: editorial-calendar-c978227ed54be6d80dbe1ecf4f522c4f + +info: + name: > + Editorial Calendar <= 2.6 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58f9ba6c-1754-4da2-8bfd-b473c7928805?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/editorial-calendar/" + google-query: inurl:"/wp-content/plugins/editorial-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,editorial-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/editorial-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "editorial-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edoc-employee-application-4f76a0450248571403ef40c78dab60dd.yaml b/nuclei-templates/cve-less/plugins/edoc-employee-application-4f76a0450248571403ef40c78dab60dd.yaml new file mode 100644 index 0000000000..6ceb0c9668 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edoc-employee-application-4f76a0450248571403ef40c78dab60dd.yaml @@ -0,0 +1,58 @@ +id: edoc-employee-application-4f76a0450248571403ef40c78dab60dd + +info: + name: > + eDoc Employee Job Application <= 1.13 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbfbd7c2-7a46-4292-9173-f90298a7fcc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edoc-employee-application/" + google-query: inurl:"/wp-content/plugins/edoc-employee-application/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edoc-employee-application,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edoc-employee-application/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edoc-employee-application" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/educare-029b8e032e0fc0a8b295cb9989f4bc4f.yaml b/nuclei-templates/cve-less/plugins/educare-029b8e032e0fc0a8b295cb9989f4bc4f.yaml new file mode 100644 index 0000000000..d93cbe5e7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/educare-029b8e032e0fc0a8b295cb9989f4bc4f.yaml @@ -0,0 +1,58 @@ +id: educare-029b8e032e0fc0a8b295cb9989f4bc4f + +info: + name: > + Educare <= 1.4.6 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ad16964-3d0a-4769-a167-5ec62486bfe9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/educare/" + google-query: inurl:"/wp-content/plugins/educare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,educare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/educare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "educare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/educare-cf9e561567f8ec0f7f05155ec9df9eb6.yaml b/nuclei-templates/cve-less/plugins/educare-cf9e561567f8ec0f7f05155ec9df9eb6.yaml new file mode 100644 index 0000000000..6eaae10eb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/educare-cf9e561567f8ec0f7f05155ec9df9eb6.yaml @@ -0,0 +1,58 @@ +id: educare-cf9e561567f8ec0f7f05155ec9df9eb6 + +info: + name: > + Educare – Students & Result Management System <= 1.4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5292fcb2-4084-42e6-b78b-62e36123829a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/educare/" + google-query: inurl:"/wp-content/plugins/educare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,educare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/educare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "educare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/education-addon-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/education-addon-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..319023ba60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/education-addon-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: education-addon-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/education-addon/" + google-query: inurl:"/wp-content/plugins/education-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,education-addon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/education-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "education-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edwiser-bridge-44337a15956fb6efe76c43a84f40d4df.yaml b/nuclei-templates/cve-less/plugins/edwiser-bridge-44337a15956fb6efe76c43a84f40d4df.yaml new file mode 100644 index 0000000000..b9a5a7d521 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edwiser-bridge-44337a15956fb6efe76c43a84f40d4df.yaml @@ -0,0 +1,58 @@ +id: edwiser-bridge-44337a15956fb6efe76c43a84f40d4df + +info: + name: > + Edwiser Bridge <= 3.0.2 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4fc23cb-e443-4c8e-b1a0-b8eefbb25dae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edwiser-bridge/" + google-query: inurl:"/wp-content/plugins/edwiser-bridge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edwiser-bridge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edwiser-bridge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edwiser-bridge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edwiser-bridge-a97648905a16e731980d6d512636856b.yaml b/nuclei-templates/cve-less/plugins/edwiser-bridge-a97648905a16e731980d6d512636856b.yaml new file mode 100644 index 0000000000..d7f9be1f40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edwiser-bridge-a97648905a16e731980d6d512636856b.yaml @@ -0,0 +1,58 @@ +id: edwiser-bridge-a97648905a16e731980d6d512636856b + +info: + name: > + Edwiser Bridge <= 3.0.5 - Authentication Bypass due to Missing Empty Value Check + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6969d281-f280-4714-9859-38ac66e9cc60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edwiser-bridge/" + google-query: inurl:"/wp-content/plugins/edwiser-bridge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edwiser-bridge,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edwiser-bridge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edwiser-bridge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/edwiser-bridge-e57ee015b5a3bc1cbb61b42c2d7af862.yaml b/nuclei-templates/cve-less/plugins/edwiser-bridge-e57ee015b5a3bc1cbb61b42c2d7af862.yaml new file mode 100644 index 0000000000..363ae8ab2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/edwiser-bridge-e57ee015b5a3bc1cbb61b42c2d7af862.yaml @@ -0,0 +1,58 @@ +id: edwiser-bridge-e57ee015b5a3bc1cbb61b42c2d7af862 + +info: + name: > + Edwiser Bridge <= 2.0.6 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6450dafd-5992-4831-87af-e5e47cc8663e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/edwiser-bridge/" + google-query: inurl:"/wp-content/plugins/edwiser-bridge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,edwiser-bridge,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/edwiser-bridge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edwiser-bridge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eelv-newsletter-777e4f42d98591ca2b51ba0e588ed585.yaml b/nuclei-templates/cve-less/plugins/eelv-newsletter-777e4f42d98591ca2b51ba0e588ed585.yaml new file mode 100644 index 0000000000..ae8fd73823 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eelv-newsletter-777e4f42d98591ca2b51ba0e588ed585.yaml @@ -0,0 +1,58 @@ +id: eelv-newsletter-777e4f42d98591ca2b51ba0e588ed585 + +info: + name: > + EELV Newsletter <= 3.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4013a22a-701b-43ef-90fb-f8eddf65acf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eelv-newsletter/" + google-query: inurl:"/wp-content/plugins/eelv-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eelv-newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eelv-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eelv-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eelv-newsletter-77b95b2fd3fc9982f02a243980235615.yaml b/nuclei-templates/cve-less/plugins/eelv-newsletter-77b95b2fd3fc9982f02a243980235615.yaml new file mode 100644 index 0000000000..26f044f34e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eelv-newsletter-77b95b2fd3fc9982f02a243980235615.yaml @@ -0,0 +1,58 @@ +id: eelv-newsletter-77b95b2fd3fc9982f02a243980235615 + +info: + name: > + EELV Newsletter <= 4.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84888ea6-122d-4480-8262-d87c33113bd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eelv-newsletter/" + google-query: inurl:"/wp-content/plugins/eelv-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eelv-newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eelv-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eelv-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eelv-newsletter-af90005e3634d51c613c584f0861c0a2.yaml b/nuclei-templates/cve-less/plugins/eelv-newsletter-af90005e3634d51c613c584f0861c0a2.yaml new file mode 100644 index 0000000000..e45098c5e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eelv-newsletter-af90005e3634d51c613c584f0861c0a2.yaml @@ -0,0 +1,58 @@ +id: eelv-newsletter-af90005e3634d51c613c584f0861c0a2 + +info: + name: > + EELV Newsletter < 4.6.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10c41b59-c83e-4f72-8b20-10db731e23c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eelv-newsletter/" + google-query: inurl:"/wp-content/plugins/eelv-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eelv-newsletter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eelv-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eelv-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eexamhall-64357c63e9789d2ab1bb69c47d5337ab.yaml b/nuclei-templates/cve-less/plugins/eexamhall-64357c63e9789d2ab1bb69c47d5337ab.yaml new file mode 100644 index 0000000000..34a323ff66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eexamhall-64357c63e9789d2ab1bb69c47d5337ab.yaml @@ -0,0 +1,58 @@ +id: eexamhall-64357c63e9789d2ab1bb69c47d5337ab + +info: + name: > + eExamhall <= 4.0 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d80d583f-42c8-48fb-b757-88346c740b0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eexamhall/" + google-query: inurl:"/wp-content/plugins/eexamhall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eexamhall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eexamhall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eexamhall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/efence-e5f4c0414a585004ed1f35745c5931f6.yaml b/nuclei-templates/cve-less/plugins/efence-e5f4c0414a585004ed1f35745c5931f6.yaml new file mode 100644 index 0000000000..4d25e10f0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/efence-e5f4c0414a585004ed1f35745c5931f6.yaml @@ -0,0 +1,58 @@ +id: efence-e5f4c0414a585004ed1f35745c5931f6 + +info: + name: > + efence <= 1.3.2 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0f5e62-aa81-4a2e-8187-917391548a31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/efence/" + google-query: inurl:"/wp-content/plugins/efence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,efence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/efence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "efence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eg-attachments-f006ae96918e8c435b20f1e9d28e9e41.yaml b/nuclei-templates/cve-less/plugins/eg-attachments-f006ae96918e8c435b20f1e9d28e9e41.yaml new file mode 100644 index 0000000000..9c11440937 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eg-attachments-f006ae96918e8c435b20f1e9d28e9e41.yaml @@ -0,0 +1,58 @@ +id: eg-attachments-f006ae96918e8c435b20f1e9d28e9e41 + +info: + name: > + EG-Attachments <= 2.1.3 - Reflected Cross-Site Scripting via 'paged' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b63ccc9a-222d-4119-909b-d04bab78d663?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eg-attachments/" + google-query: inurl:"/wp-content/plugins/eg-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eg-attachments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eg-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eg-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ehive-account-details-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/ehive-account-details-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..6514c18e1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ehive-account-details-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: ehive-account-details-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ehive-account-details/" + google-query: inurl:"/wp-content/plugins/ehive-account-details/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ehive-account-details,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ehive-account-details/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ehive-account-details" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ehive-object-details-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/ehive-object-details-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..2dfe38a4d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ehive-object-details-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: ehive-object-details-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ehive-object-details/" + google-query: inurl:"/wp-content/plugins/ehive-object-details/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ehive-object-details,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ehive-object-details/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ehive-object-details" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elastic-email-sender-7666fb1e1d2345dc70da7aee12ac3253.yaml b/nuclei-templates/cve-less/plugins/elastic-email-sender-7666fb1e1d2345dc70da7aee12ac3253.yaml new file mode 100644 index 0000000000..0f05506141 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elastic-email-sender-7666fb1e1d2345dc70da7aee12ac3253.yaml @@ -0,0 +1,58 @@ +id: elastic-email-sender-7666fb1e1d2345dc70da7aee12ac3253 + +info: + name: > + Elastic Email Sender <= 1.2.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/106a604f-0bff-444e-9d76-f6508bcc0cea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elastic-email-sender/" + google-query: inurl:"/wp-content/plugins/elastic-email-sender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elastic-email-sender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elastic-email-sender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elastic-email-sender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elasticpress-0046efcaf372ceea3cbda093fc9866d7.yaml b/nuclei-templates/cve-less/plugins/elasticpress-0046efcaf372ceea3cbda093fc9866d7.yaml new file mode 100644 index 0000000000..849c63246a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elasticpress-0046efcaf372ceea3cbda093fc9866d7.yaml @@ -0,0 +1,58 @@ +id: elasticpress-0046efcaf372ceea3cbda093fc9866d7 + +info: + name: > + webpack JS package <= 5.75.0 - Sandbox Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cda31a4-4c79-4567-a527-6510c31d2843?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elasticpress/" + google-query: inurl:"/wp-content/plugins/elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elasticpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elasticpress-1951707b594e6f4a4e8e4243b43c9841.yaml b/nuclei-templates/cve-less/plugins/elasticpress-1951707b594e6f4a4e8e4243b43c9841.yaml new file mode 100644 index 0000000000..107ccc5d83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elasticpress-1951707b594e6f4a4e8e4243b43c9841.yaml @@ -0,0 +1,58 @@ +id: elasticpress-1951707b594e6f4a4e8e4243b43c9841 + +info: + name: > + loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb93138-f2f9-4a3f-a0a2-d79a315c44f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elasticpress/" + google-query: inurl:"/wp-content/plugins/elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elasticpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elasticpress-54bc1daf26907dc59a5c7876a142ff1b.yaml b/nuclei-templates/cve-less/plugins/elasticpress-54bc1daf26907dc59a5c7876a142ff1b.yaml new file mode 100644 index 0000000000..6936e9c7c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elasticpress-54bc1daf26907dc59a5c7876a142ff1b.yaml @@ -0,0 +1,58 @@ +id: elasticpress-54bc1daf26907dc59a5c7876a142ff1b + +info: + name: > + loader-utils (JS package) < 2.0.3 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45a49dca-2ed2-44cf-a0fe-0f1440a78cc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elasticpress/" + google-query: inurl:"/wp-content/plugins/elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elasticpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elasticpress-5dc312330e1225a6fb2a9d319cc31d3c.yaml b/nuclei-templates/cve-less/plugins/elasticpress-5dc312330e1225a6fb2a9d319cc31d3c.yaml new file mode 100644 index 0000000000..87f148a026 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elasticpress-5dc312330e1225a6fb2a9d319cc31d3c.yaml @@ -0,0 +1,58 @@ +id: elasticpress-5dc312330e1225a6fb2a9d319cc31d3c + +info: + name: > + ElasticPress <= 3.5.3 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ab8eb9d-1427-4e99-8986-179147e0862e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elasticpress/" + google-query: inurl:"/wp-content/plugins/elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elasticpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elasticpress-73081b1f6f4e13a9e6e969eba5e746fc.yaml b/nuclei-templates/cve-less/plugins/elasticpress-73081b1f6f4e13a9e6e969eba5e746fc.yaml new file mode 100644 index 0000000000..cd8252f4dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elasticpress-73081b1f6f4e13a9e6e969eba5e746fc.yaml @@ -0,0 +1,58 @@ +id: elasticpress-73081b1f6f4e13a9e6e969eba5e746fc + +info: + name: > + simple-git < 3.15.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c747e6f-31fc-41b0-ba62-f009b5483696?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elasticpress/" + google-query: inurl:"/wp-content/plugins/elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elasticpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elasticpress-7522c596e66132396decc40456fc3c0b.yaml b/nuclei-templates/cve-less/plugins/elasticpress-7522c596e66132396decc40456fc3c0b.yaml new file mode 100644 index 0000000000..983066d42d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elasticpress-7522c596e66132396decc40456fc3c0b.yaml @@ -0,0 +1,58 @@ +id: elasticpress-7522c596e66132396decc40456fc3c0b + +info: + name: > + Moment.js <= 2.29.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0315f5de-7a46-4e16-b080-557ddfd180a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elasticpress/" + google-query: inurl:"/wp-content/plugins/elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elasticpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elasticpress-bd26ccd939104e13f73f569b312459d6.yaml b/nuclei-templates/cve-less/plugins/elasticpress-bd26ccd939104e13f73f569b312459d6.yaml new file mode 100644 index 0000000000..9baa174a58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elasticpress-bd26ccd939104e13f73f569b312459d6.yaml @@ -0,0 +1,58 @@ +id: elasticpress-bd26ccd939104e13f73f569b312459d6 + +info: + name: > + loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2954a007-37ac-4811-a258-b3fdd738043f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elasticpress/" + google-query: inurl:"/wp-content/plugins/elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elasticpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elasticpress-c3dca1d1ef3a946c9ddf3e33caa00021.yaml b/nuclei-templates/cve-less/plugins/elasticpress-c3dca1d1ef3a946c9ddf3e33caa00021.yaml new file mode 100644 index 0000000000..6cfb3c20af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elasticpress-c3dca1d1ef3a946c9ddf3e33caa00021.yaml @@ -0,0 +1,58 @@ +id: elasticpress-c3dca1d1ef3a946c9ddf3e33caa00021 + +info: + name: > + terser (JS Package) < 5.14.2 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c08c10-7358-4618-b892-7d222ba460de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elasticpress/" + google-query: inurl:"/wp-content/plugins/elasticpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elasticpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elasticpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasticpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ele-blog-fd2502bc424033ec4b34f2309e987add.yaml b/nuclei-templates/cve-less/plugins/ele-blog-fd2502bc424033ec4b34f2309e987add.yaml new file mode 100644 index 0000000000..81d2c3720e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ele-blog-fd2502bc424033ec4b34f2309e987add.yaml @@ -0,0 +1,58 @@ +id: ele-blog-fd2502bc424033ec4b34f2309e987add + +info: + name: > + Eleblog – Elementor Blog And Magazine Addons <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ffb494a-e9b3-46f5-825a-35ad88d5d6fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ele-blog/" + google-query: inurl:"/wp-content/plugins/ele-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ele-blog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ele-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ele-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/electric-studio-client-login-f63b97efbb567f61e36df93bf47a02fe.yaml b/nuclei-templates/cve-less/plugins/electric-studio-client-login-f63b97efbb567f61e36df93bf47a02fe.yaml new file mode 100644 index 0000000000..bb754ad25d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/electric-studio-client-login-f63b97efbb567f61e36df93bf47a02fe.yaml @@ -0,0 +1,58 @@ +id: electric-studio-client-login-f63b97efbb567f61e36df93bf47a02fe + +info: + name: > + Electric Studio Client Login <= 0.8.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e797c0ca-f348-4d9c-815e-0c1756686690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/electric-studio-client-login/" + google-query: inurl:"/wp-content/plugins/electric-studio-client-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,electric-studio-client-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/electric-studio-client-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "electric-studio-client-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elegant-custom-fonts-f10c9b43de964c20f74a052f0a107e7c.yaml b/nuclei-templates/cve-less/plugins/elegant-custom-fonts-f10c9b43de964c20f74a052f0a107e7c.yaml new file mode 100644 index 0000000000..d084e7eb1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elegant-custom-fonts-f10c9b43de964c20f74a052f0a107e7c.yaml @@ -0,0 +1,58 @@ +id: elegant-custom-fonts-f10c9b43de964c20f74a052f0a107e7c + +info: + name: > + Elegant Custom Fonts <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dadb6bf5-dbbd-4afb-8783-f6880dec2cbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elegant-custom-fonts/" + google-query: inurl:"/wp-content/plugins/elegant-custom-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elegant-custom-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elegant-custom-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elegant-custom-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/element-ready-lite-e8533877c8cc904267c19512d475d608.yaml b/nuclei-templates/cve-less/plugins/element-ready-lite-e8533877c8cc904267c19512d475d608.yaml new file mode 100644 index 0000000000..8fabf86f80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/element-ready-lite-e8533877c8cc904267c19512d475d608.yaml @@ -0,0 +1,58 @@ +id: element-ready-lite-e8533877c8cc904267c19512d475d608 + +info: + name: > + ElementsReady Addons for Elementor <= 5.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/530ccf41-f596-4783-b177-36fc9a3a6e81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/element-ready-lite/" + google-query: inurl:"/wp-content/plugins/element-ready-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,element-ready-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/element-ready-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "element-ready-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementinvader-addons-for-elementor-1b9ddc8767486e6841efc7560084f93c.yaml b/nuclei-templates/cve-less/plugins/elementinvader-addons-for-elementor-1b9ddc8767486e6841efc7560084f93c.yaml new file mode 100644 index 0000000000..220ac3e30f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementinvader-addons-for-elementor-1b9ddc8767486e6841efc7560084f93c.yaml @@ -0,0 +1,58 @@ +id: elementinvader-addons-for-elementor-1b9ddc8767486e6841efc7560084f93c + +info: + name: > + ElementInvader Addons for Elementor <= 1.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40a272dc-cb2a-472f-be42-733efcb2fa61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementinvader-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/elementinvader-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementinvader-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementinvader-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementinvader-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-03fe440b02e44feccf06b79164360aca.yaml b/nuclei-templates/cve-less/plugins/elementor-03fe440b02e44feccf06b79164360aca.yaml new file mode 100644 index 0000000000..ee11da7960 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-03fe440b02e44feccf06b79164360aca.yaml @@ -0,0 +1,58 @@ +id: elementor-03fe440b02e44feccf06b79164360aca + +info: + name: > + Elementor Website Builder <= 3.5.5 - Unauthenticated DOM-based Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7f08d0a-b3ac-4363-ba6e-91a8e13605ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-151a3d01fba73eb2e03af896af5366b4.yaml b/nuclei-templates/cve-less/plugins/elementor-151a3d01fba73eb2e03af896af5366b4.yaml new file mode 100644 index 0000000000..dc16c89bf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-151a3d01fba73eb2e03af896af5366b4.yaml @@ -0,0 +1,58 @@ +id: elementor-151a3d01fba73eb2e03af896af5366b4 + +info: + name: > + Elementor Website Builder <= 2.9.13 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c43e292b-8344-4842-bed1-32e7f8cb992b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-1f2c4e6dec405aef3fd5e6566d223430.yaml b/nuclei-templates/cve-less/plugins/elementor-1f2c4e6dec405aef3fd5e6566d223430.yaml new file mode 100644 index 0000000000..a40a2a338b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-1f2c4e6dec405aef3fd5e6566d223430.yaml @@ -0,0 +1,58 @@ +id: elementor-1f2c4e6dec405aef3fd5e6566d223430 + +info: + name: > + Elementor Website Builder <= 2.7.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e41384f-1dec-418b-be48-fc61def5ca28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-26fe6330bdb19cfffb8c82c950ab810e.yaml b/nuclei-templates/cve-less/plugins/elementor-26fe6330bdb19cfffb8c82c950ab810e.yaml new file mode 100644 index 0000000000..a078c104ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-26fe6330bdb19cfffb8c82c950ab810e.yaml @@ -0,0 +1,58 @@ +id: elementor-26fe6330bdb19cfffb8c82c950ab810e + +info: + name: > + Elementor Website Builder <= 2.8.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d021636e-2d23-4fb3-baf7-0f40d4ade3db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-287536d4e13889455f637b6c851d2004.yaml b/nuclei-templates/cve-less/plugins/elementor-287536d4e13889455f637b6c851d2004.yaml new file mode 100644 index 0000000000..c51c4e4887 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-287536d4e13889455f637b6c851d2004.yaml @@ -0,0 +1,58 @@ +id: elementor-287536d4e13889455f637b6c851d2004 + +info: + name: > + Elementor <= 3.13.2 Authenticated(Contributor+) Arbitrary Post Type Creation via save_item + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/525cb51c-23f1-446f-a247-0f69ec5029d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-2a3ca00c5df2d9ec07efb3c8b755e2fe.yaml b/nuclei-templates/cve-less/plugins/elementor-2a3ca00c5df2d9ec07efb3c8b755e2fe.yaml new file mode 100644 index 0000000000..88affdc733 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-2a3ca00c5df2d9ec07efb3c8b755e2fe.yaml @@ -0,0 +1,58 @@ +id: elementor-2a3ca00c5df2d9ec07efb3c8b755e2fe + +info: + name: > + Elementor Website Builder – More than Just a Page Builder <= 3.18.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via get_image_alt + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4473d3f6-e324-40f5-b92b-167f76b17332?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-2f027571e136822dc3132e7a5b6f47eb.yaml b/nuclei-templates/cve-less/plugins/elementor-2f027571e136822dc3132e7a5b6f47eb.yaml new file mode 100644 index 0000000000..52dfceb433 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-2f027571e136822dc3132e7a5b6f47eb.yaml @@ -0,0 +1,58 @@ +id: elementor-2f027571e136822dc3132e7a5b6f47eb + +info: + name: > + Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via title_html_tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14dd84e5-69fa-4de9-b72c-dfedfd85582c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-5076d4232fcfbe5d646915f67652404a.yaml b/nuclei-templates/cve-less/plugins/elementor-5076d4232fcfbe5d646915f67652404a.yaml new file mode 100644 index 0000000000..c6a6ab0b31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-5076d4232fcfbe5d646915f67652404a.yaml @@ -0,0 +1,58 @@ +id: elementor-5076d4232fcfbe5d646915f67652404a + +info: + name: > + Elementor Website Builder <= 2.8.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee27a988-6afd-4da7-a750-0af801d7fa15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-5721e5b5b859df336ecc013b38726f93.yaml b/nuclei-templates/cve-less/plugins/elementor-5721e5b5b859df336ecc013b38726f93.yaml new file mode 100644 index 0000000000..aadb52ae0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-5721e5b5b859df336ecc013b38726f93.yaml @@ -0,0 +1,58 @@ +id: elementor-5721e5b5b859df336ecc013b38726f93 + +info: + name: > + Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via header_size + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90f96795-8df7-4388-b58e-fc3611bc215c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.1.0', '<= 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-5ccd429722cafafb64349730f5cc0669.yaml b/nuclei-templates/cve-less/plugins/elementor-5ccd429722cafafb64349730f5cc0669.yaml new file mode 100644 index 0000000000..409b2225aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-5ccd429722cafafb64349730f5cc0669.yaml @@ -0,0 +1,58 @@ +id: elementor-5ccd429722cafafb64349730f5cc0669 + +info: + name: > + Elementor <= 3.13.1 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b66e2537-f187-4237-b248-f8a361f9cb00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-5e6768e991caa45e72cc5f93d69cc8a5.yaml b/nuclei-templates/cve-less/plugins/elementor-5e6768e991caa45e72cc5f93d69cc8a5.yaml new file mode 100644 index 0000000000..f9df448b82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-5e6768e991caa45e72cc5f93d69cc8a5.yaml @@ -0,0 +1,58 @@ +id: elementor-5e6768e991caa45e72cc5f93d69cc8a5 + +info: + name: > + Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via html_tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e264af7c-84bb-4bfa-a433-39dd94a9d83b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.1.0', '<= 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-5f7ca58c2ad3d25f19da443baa193352.yaml b/nuclei-templates/cve-less/plugins/elementor-5f7ca58c2ad3d25f19da443baa193352.yaml new file mode 100644 index 0000000000..333c063750 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-5f7ca58c2ad3d25f19da443baa193352.yaml @@ -0,0 +1,58 @@ +id: elementor-5f7ca58c2ad3d25f19da443baa193352 + +info: + name: > + Elementor Website Builder <= 2.9.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e8822cd-5ced-42d5-907e-72066d8fb835?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-660b23de83aeeb4aa32118217df234cf.yaml b/nuclei-templates/cve-less/plugins/elementor-660b23de83aeeb4aa32118217df234cf.yaml new file mode 100644 index 0000000000..93be6178c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-660b23de83aeeb4aa32118217df234cf.yaml @@ -0,0 +1,58 @@ +id: elementor-660b23de83aeeb4aa32118217df234cf + +info: + name: > + Elementor Website Builder <= 3.0.13 - Unrestricted SVG Uploads + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3999c48f-bae6-48ea-b35f-d8307d9c3898?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-669dc6b32158d01ea3af647aee0ce2e6.yaml b/nuclei-templates/cve-less/plugins/elementor-669dc6b32158d01ea3af647aee0ce2e6.yaml new file mode 100644 index 0000000000..85a569088d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-669dc6b32158d01ea3af647aee0ce2e6.yaml @@ -0,0 +1,58 @@ +id: elementor-669dc6b32158d01ea3af647aee0ce2e6 + +info: + name: > + Elementor <= 3.5.4 - DOM-Based iFrame Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b00290ee-ad63-4544-818a-c0d7471e60fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-727d2f92da48e178eefceef10fd279f0.yaml b/nuclei-templates/cve-less/plugins/elementor-727d2f92da48e178eefceef10fd279f0.yaml new file mode 100644 index 0000000000..17dc1b4972 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-727d2f92da48e178eefceef10fd279f0.yaml @@ -0,0 +1,58 @@ +id: elementor-727d2f92da48e178eefceef10fd279f0 + +info: + name: > + Elementor Website Builder <= 2.9.7 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42db52ae-f881-4082-b475-8577a28641c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-7df4e23827630859e3a047cf49f19af4.yaml b/nuclei-templates/cve-less/plugins/elementor-7df4e23827630859e3a047cf49f19af4.yaml new file mode 100644 index 0000000000..508e489891 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-7df4e23827630859e3a047cf49f19af4.yaml @@ -0,0 +1,58 @@ +id: elementor-7df4e23827630859e3a047cf49f19af4 + +info: + name: > + Elementor <= 3.12.1 - Authenticated(Administrator+) SQL Injection via 'replace_urls' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7bd173c-dc61-4cc6-b42f-311acf728080?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-88f2e8b62006d8f70eead27b7d5c23f7.yaml b/nuclei-templates/cve-less/plugins/elementor-88f2e8b62006d8f70eead27b7d5c23f7.yaml new file mode 100644 index 0000000000..d43205acb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-88f2e8b62006d8f70eead27b7d5c23f7.yaml @@ -0,0 +1,58 @@ +id: elementor-88f2e8b62006d8f70eead27b7d5c23f7 + +info: + name: > + Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via title_size Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51887d22-2cfa-46b8-822c-9e6e183de4ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-8f2ebff96481ee5356699783e44b68ea.yaml b/nuclei-templates/cve-less/plugins/elementor-8f2ebff96481ee5356699783e44b68ea.yaml new file mode 100644 index 0000000000..02a6a0a582 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-8f2ebff96481ee5356699783e44b68ea.yaml @@ -0,0 +1,58 @@ +id: elementor-8f2ebff96481ee5356699783e44b68ea + +info: + name: > + Elementor Website Builder <= 2.9.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/877a42c9-958d-46ed-8f9a-5972bd5f43f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-95ed8c023906e2f70f01592d99282d0b.yaml b/nuclei-templates/cve-less/plugins/elementor-95ed8c023906e2f70f01592d99282d0b.yaml new file mode 100644 index 0000000000..c03034096c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-95ed8c023906e2f70f01592d99282d0b.yaml @@ -0,0 +1,58 @@ +id: elementor-95ed8c023906e2f70f01592d99282d0b + +info: + name: > + Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via title_size + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37f60fe5-2ece-48aa-8005-e220541bdd62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.1.0', '<= 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-97ebb96fdd3db87faf02d7c0a7e706c7.yaml b/nuclei-templates/cve-less/plugins/elementor-97ebb96fdd3db87faf02d7c0a7e706c7.yaml new file mode 100644 index 0000000000..2f3da4a480 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-97ebb96fdd3db87faf02d7c0a7e706c7.yaml @@ -0,0 +1,58 @@ +id: elementor-97ebb96fdd3db87faf02d7c0a7e706c7 + +info: + name: > + Elementor Website Builder – More than Just a Page Builder <= 3.20.2 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via Path Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8d7448a-b8a6-4b0b-92df-a15272fc56bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-98c8e6a6d80acb851afcee0bde588eea.yaml b/nuclei-templates/cve-less/plugins/elementor-98c8e6a6d80acb851afcee0bde588eea.yaml new file mode 100644 index 0000000000..31e9cb4335 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-98c8e6a6d80acb851afcee0bde588eea.yaml @@ -0,0 +1,58 @@ +id: elementor-98c8e6a6d80acb851afcee0bde588eea + +info: + name: > + Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via html_tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4feed0da-f5b1-47eb-9454-8539f62335fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.1.0', '<= 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-b165aaaa725c1983b238dd197ed1a7e5.yaml b/nuclei-templates/cve-less/plugins/elementor-b165aaaa725c1983b238dd197ed1a7e5.yaml new file mode 100644 index 0000000000..f38e037992 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-b165aaaa725c1983b238dd197ed1a7e5.yaml @@ -0,0 +1,58 @@ +id: elementor-b165aaaa725c1983b238dd197ed1a7e5 + +info: + name: > + Elementor Website Builder <= 2.9.5 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/249caa5b-c1b0-4b72-98f3-31bbb574c834?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-b58bfdaaa39d4e7d694c40523cac0a71.yaml b/nuclei-templates/cve-less/plugins/elementor-b58bfdaaa39d4e7d694c40523cac0a71.yaml new file mode 100644 index 0000000000..bfd7e666e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-b58bfdaaa39d4e7d694c40523cac0a71.yaml @@ -0,0 +1,58 @@ +id: elementor-b58bfdaaa39d4e7d694c40523cac0a71 + +info: + name: > + Elementor Website Builder <= 3.16.4 - Missing Authorization to Arbitrary Attachment Read + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c873c76a-144e-4945-8fa2-c9ffe0e3c061?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-bdfd3cb15fc22fa823679d0ba1d3fc73.yaml b/nuclei-templates/cve-less/plugins/elementor-bdfd3cb15fc22fa823679d0ba1d3fc73.yaml new file mode 100644 index 0000000000..1211354be9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-bdfd3cb15fc22fa823679d0ba1d3fc73.yaml @@ -0,0 +1,58 @@ +id: elementor-bdfd3cb15fc22fa823679d0ba1d3fc73 + +info: + name: > + Elementor <= 3.18.1 - Authenticated(Contributor+) Arbitrary File Upload to Remote Code Execution via Template Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b6d0a38-ac28-41c9-9da1-b30b3657b463?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.18.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-c04510d8ae6604902066b55cfed338f7.yaml b/nuclei-templates/cve-less/plugins/elementor-c04510d8ae6604902066b55cfed338f7.yaml new file mode 100644 index 0000000000..1617f55236 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-c04510d8ae6604902066b55cfed338f7.yaml @@ -0,0 +1,58 @@ +id: elementor-c04510d8ae6604902066b55cfed338f7 + +info: + name: > + Elementor Website Builder <= 2.9.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2e39fe4-8c22-4da6-8cb6-737ddd4dc36e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-cba36394f848d0e615f1c12018c52329.yaml b/nuclei-templates/cve-less/plugins/elementor-cba36394f848d0e615f1c12018c52329.yaml new file mode 100644 index 0000000000..f588df3cc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-cba36394f848d0e615f1c12018c52329.yaml @@ -0,0 +1,58 @@ +id: elementor-cba36394f848d0e615f1c12018c52329 + +info: + name: > + Elementor Website Builder <= 1.7.12 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d847e26b-8c11-4612-84d7-ff319ca374dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-d16f5d5a117e59e23a5a604664dfe044.yaml b/nuclei-templates/cve-less/plugins/elementor-d16f5d5a117e59e23a5a604664dfe044.yaml new file mode 100644 index 0000000000..8f32aed77a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-d16f5d5a117e59e23a5a604664dfe044.yaml @@ -0,0 +1,58 @@ +id: elementor-d16f5d5a117e59e23a5a604664dfe044 + +info: + name: > + Elementor Website Builder <= 2.7.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2ef8ee4-7388-4263-ad6a-bb043b09c97c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-e1d6d92659e9b697c29f278d3aacc568.yaml b/nuclei-templates/cve-less/plugins/elementor-e1d6d92659e9b697c29f278d3aacc568.yaml new file mode 100644 index 0000000000..bbfacc9d89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-e1d6d92659e9b697c29f278d3aacc568.yaml @@ -0,0 +1,58 @@ +id: elementor-e1d6d92659e9b697c29f278d3aacc568 + +info: + name: > + Elementor Website Builder <= 3.4.7 - DOM-based Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/175b64d3-0abd-4a65-b419-d6248a7deb2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.1.0', '<= 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-ed7ec795a9e5769e2593c8bc7106e945.yaml b/nuclei-templates/cve-less/plugins/elementor-ed7ec795a9e5769e2593c8bc7106e945.yaml new file mode 100644 index 0000000000..1c05d8a37d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-ed7ec795a9e5769e2593c8bc7106e945.yaml @@ -0,0 +1,58 @@ +id: elementor-ed7ec795a9e5769e2593c8bc7106e945 + +info: + name: > + Elementor Website Builder <= 3.16.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via get_inline_svg() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b44ef21f-464e-487a-ba5a-fe889e4c488c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-fa47ef3a071af26f7cb8467307b46f4c.yaml b/nuclei-templates/cve-less/plugins/elementor-fa47ef3a071af26f7cb8467307b46f4c.yaml new file mode 100644 index 0000000000..49e07417a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-fa47ef3a071af26f7cb8467307b46f4c.yaml @@ -0,0 +1,58 @@ +id: elementor-fa47ef3a071af26f7cb8467307b46f4c + +info: + name: > + Elementor <= 3.19.0 - Authenticated(Contributor+) Arbitrary File Deletion and PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4915b769-9499-40ac-835e-279e3a910558?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-fe43bc61a2c4502126731a0d72fb43ba.yaml b/nuclei-templates/cve-less/plugins/elementor-fe43bc61a2c4502126731a0d72fb43ba.yaml new file mode 100644 index 0000000000..d2d2dd0c9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-fe43bc61a2c4502126731a0d72fb43ba.yaml @@ -0,0 +1,58 @@ +id: elementor-fe43bc61a2c4502126731a0d72fb43ba + +info: + name: > + Elementor Website Builder 3.6.0 - 3.6.2 - Missing Authorization to Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2421108-d4b0-480e-a020-95712cdfae8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor/" + google-query: inurl:"/wp-content/plugins/elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.6.0', '<= 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-0f93fc1c537d4354bd5e942ea05347cf.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-0f93fc1c537d4354bd5e942ea05347cf.yaml new file mode 100644 index 0000000000..caa4aac433 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-0f93fc1c537d4354bd5e942ea05347cf.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-0f93fc1c537d4354bd5e942ea05347cf + +info: + name: > + Elementor Pro <= 3.19.2 - Authenticated (Contributor+) Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecc8996a-d95c-4711-ac7d-523f5100c7fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-25aa395084f363ecfd02447bcee9b684.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-25aa395084f363ecfd02447bcee9b684.yaml new file mode 100644 index 0000000000..63fd7fa149 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-25aa395084f363ecfd02447bcee9b684.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-25aa395084f363ecfd02447bcee9b684 + +info: + name: > + Elementor Website Builder Pro <= 3.20.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Navigation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de1742d4-f498-4ad4-b6a1-88cb60e83afc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.20.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-4227a0d8303b8be51d7b7784befed50f.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-4227a0d8303b8be51d7b7784befed50f.yaml new file mode 100644 index 0000000000..33b829e5d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-4227a0d8303b8be51d7b7784befed50f.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-4227a0d8303b8be51d7b7784befed50f + +info: + name: > + Elementor Website Builder Pro <= 3.20.1 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via video_html_tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54970085-5206-45b6-adcf-11e6dd4cd633?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.20.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-495b1b12b50b14325e42d32d8b21fb76.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-495b1b12b50b14325e42d32d8b21fb76.yaml new file mode 100644 index 0000000000..f21352347a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-495b1b12b50b14325e42d32d8b21fb76.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-495b1b12b50b14325e42d32d8b21fb76 + +info: + name: > + Elementor Pro <= 3.11.6 - Authenticated(Subscriber+) Privilege Escalation via update_page_option + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/570474f2-c118-45e1-a237-c70b849b2d3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-500730a31af9acbaf8945d735529d69e.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-500730a31af9acbaf8945d735529d69e.yaml new file mode 100644 index 0000000000..375bce3197 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-500730a31af9acbaf8945d735529d69e.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-500730a31af9acbaf8945d735529d69e + +info: + name: > + Elementor Pro <= 3.13.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cba362e-c1e3-4840-941f-b8af8469f771?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-52d465c21905272814a823dbfaac019a.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-52d465c21905272814a823dbfaac019a.yaml new file mode 100644 index 0000000000..0eb7066867 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-52d465c21905272814a823dbfaac019a.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-52d465c21905272814a823dbfaac019a + +info: + name: > + Elementor Website Builder Pro <= 3.20.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Form Widget SVGZ File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecd01ea6-9476-47e1-9959-3f8d9ce1c1f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.20.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-5ecb61edb8f014ffed25792497a59fa8.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-5ecb61edb8f014ffed25792497a59fa8.yaml new file mode 100644 index 0000000000..6239924458 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-5ecb61edb8f014ffed25792497a59fa8.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-5ecb61edb8f014ffed25792497a59fa8 + +info: + name: > + Elementor Website Builder Pro <= 3.20.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8698d6dd-7376-4d29-8a5c-21c239a7aa03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.20.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-68b5f15989ca60b284d4dce6601af76b.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-68b5f15989ca60b284d4dce6601af76b.yaml new file mode 100644 index 0000000000..c362489abb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-68b5f15989ca60b284d4dce6601af76b.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-68b5f15989ca60b284d4dce6601af76b + +info: + name: > + Elementor Pro <= 2.9.3 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ec997c8-3f47-45c8-8fa2-019b01c97c94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-6b5638f86300bb8cb925bbc8ddae3c32.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-6b5638f86300bb8cb925bbc8ddae3c32.yaml new file mode 100644 index 0000000000..eb77caf928 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-6b5638f86300bb8cb925bbc8ddae3c32.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-6b5638f86300bb8cb925bbc8ddae3c32 + +info: + name: > + Elementor Website Builder Pro <= 3.20.1 - Authententicated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/531954dd-ed3f-4626-adab-c1bba8407c89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.20.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-74f6871329004558f0dbc4c0f34288a7.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-74f6871329004558f0dbc4c0f34288a7.yaml new file mode 100644 index 0000000000..a5fb4e968d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-74f6871329004558f0dbc4c0f34288a7.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-74f6871329004558f0dbc4c0f34288a7 + +info: + name: > + Elementor Website Builder Pro <= 3.21.0 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d5d47bd-4f05-4dc7-84c1-f7bc1196ee16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-d8cb62391dd6a20fc4b59fa893c8943a.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-d8cb62391dd6a20fc4b59fa893c8943a.yaml new file mode 100644 index 0000000000..4ee0f53b5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-d8cb62391dd6a20fc4b59fa893c8943a.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-d8cb62391dd6a20fc4b59fa893c8943a + +info: + name: > + Elementor Pro <= 2.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e340f400-1d20-4fa1-9cc7-8c0f49075bc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementor-pro-f9bf203df336a8e0915eb488a89feed1.yaml b/nuclei-templates/cve-less/plugins/elementor-pro-f9bf203df336a8e0915eb488a89feed1.yaml new file mode 100644 index 0000000000..324234e67d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementor-pro-f9bf203df336a8e0915eb488a89feed1.yaml @@ -0,0 +1,58 @@ +id: elementor-pro-f9bf203df336a8e0915eb488a89feed1 + +info: + name: > + Elementor Pro <= 3.0.5 - Authenticated Remote Code Execution in Dynamic OOO Widget + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ef3f7a2-4ed2-4235-8a6b-f2a5cf288029?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementor-pro/" + google-query: inurl:"/wp-content/plugins/elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementor-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elements-for-lifterlms-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/elements-for-lifterlms-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..27b57bf9b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elements-for-lifterlms-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: elements-for-lifterlms-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elements-for-lifterlms/" + google-query: inurl:"/wp-content/plugins/elements-for-lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elements-for-lifterlms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elements-for-lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elements-for-lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elements-plus-3da99f6ccd8b569aa4895183dacec31a.yaml b/nuclei-templates/cve-less/plugins/elements-plus-3da99f6ccd8b569aa4895183dacec31a.yaml new file mode 100644 index 0000000000..60c24ef280 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elements-plus-3da99f6ccd8b569aa4895183dacec31a.yaml @@ -0,0 +1,58 @@ +id: elements-plus-3da99f6ccd8b569aa4895183dacec31a + +info: + name: > + Elements Plus! <= 2.16.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via widget links + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9efb7dc8-d0a1-4707-a465-6a55b2d4a426?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elements-plus/" + google-query: inurl:"/wp-content/plugins/elements-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elements-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elements-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elements-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elements-plus-c23e4efbffee4d6fedc761f6f4283de6.yaml b/nuclei-templates/cve-less/plugins/elements-plus-c23e4efbffee4d6fedc761f6f4283de6.yaml new file mode 100644 index 0000000000..29f9b08575 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elements-plus-c23e4efbffee4d6fedc761f6f4283de6.yaml @@ -0,0 +1,58 @@ +id: elements-plus-c23e4efbffee4d6fedc761f6f4283de6 + +info: + name: > + Elements Plus! <= 2.16.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7812dd30-2896-45a7-8920-92ea061f4da3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elements-plus/" + google-query: inurl:"/wp-content/plugins/elements-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elements-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elements-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elements-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-7b0e7eea2756aa9a3fb9bd9d76ac83fe.yaml b/nuclei-templates/cve-less/plugins/elementskit-7b0e7eea2756aa9a3fb9bd9d76ac83fe.yaml new file mode 100644 index 0000000000..bc01f4057a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-7b0e7eea2756aa9a3fb9bd9d76ac83fe.yaml @@ -0,0 +1,58 @@ +id: elementskit-7b0e7eea2756aa9a3fb9bd9d76ac83fe + +info: + name: > + ElementsKit Pro <= 3.6.0 - Authenticated (Contributor+) Local File Inclusion via Price Menu, Hotspot, and Advanced Toggle Widgets + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit/" + google-query: inurl:"/wp-content/plugins/elementskit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-7ccdd8fc797e3fab9fea1a77280ae2aa.yaml b/nuclei-templates/cve-less/plugins/elementskit-7ccdd8fc797e3fab9fea1a77280ae2aa.yaml new file mode 100644 index 0000000000..513b949282 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-7ccdd8fc797e3fab9fea1a77280ae2aa.yaml @@ -0,0 +1,58 @@ +id: elementskit-7ccdd8fc797e3fab9fea1a77280ae2aa + +info: + name: > + ElementsKit Pro <= 3.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'ekit_btn_id' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e4b14f-0f55-47bc-8e40-19b262e50561?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit/" + google-query: inurl:"/wp-content/plugins/elementskit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-01583a85c3bb765e7b9d1e3e575dd138.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-01583a85c3bb765e7b9d1e3e575dd138.yaml new file mode 100644 index 0000000000..f8a13527c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-01583a85c3bb765e7b9d1e3e575dd138.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-01583a85c3bb765e7b9d1e3e575dd138 + +info: + name: > + Elements kit Elementor addons <= 2.9.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ff589ec-756d-4183-8bb8-61dae9be7c5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-55933111032f4be98ad6ab7b8ab899fc.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-55933111032f4be98ad6ab7b8ab899fc.yaml new file mode 100644 index 0000000000..de35ca8ee4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-55933111032f4be98ad6ab7b8ab899fc.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-55933111032f4be98ad6ab7b8ab899fc + +info: + name: > + ElementsKit Elementor addons <= 3.0.3 - Authenticated(Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e724394d-97aa-42e4-b36e-6e49bfefa2f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-7a76232802e20b0ab3fa4ab939317696.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-7a76232802e20b0ab3fa4ab939317696.yaml new file mode 100644 index 0000000000..81535f0b8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-7a76232802e20b0ab3fa4ab939317696.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-7a76232802e20b0ab3fa4ab939317696 + +info: + name: > + ElementsKit Elementor addons <= 3.0.6 - Authenticated (Contributor+) Local File Inclusion in render_raw + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/413e6326-14c6-4734-8adc-114a7842c574?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-8951eb99c398a311cfe985bad4ff4e0c.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-8951eb99c398a311cfe985bad4ff4e0c.yaml new file mode 100644 index 0000000000..2836329fa4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-8951eb99c398a311cfe985bad4ff4e0c.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-8951eb99c398a311cfe985bad4ff4e0c + +info: + name: > + ElementsKit Elementor addons <= 3.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c44ad9-e61e-4f29-9c0b-7c0a89b0c8da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-998f619282ed25afacc39847ff214ad0.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-998f619282ed25afacc39847ff214ad0.yaml new file mode 100644 index 0000000000..b4f2246bf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-998f619282ed25afacc39847ff214ad0.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-998f619282ed25afacc39847ff214ad0 + +info: + name: > + ElementsKit Elementor addons <= 3.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1822fd58-0dba-4b15-9702-32e3aa4405b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-a391f7553cca71ac204345c2d728e50d.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-a391f7553cca71ac204345c2d728e50d.yaml new file mode 100644 index 0000000000..f4aeba4246 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-a391f7553cca71ac204345c2d728e50d.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-a391f7553cca71ac204345c2d728e50d + +info: + name: > + ElementsKit Elementor addons <= 3.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Accordion Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be4ce3e6-8baa-419f-a48e-4256c306fbc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-b5aa1e2113ade8542174b19f6a7b50fe.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-b5aa1e2113ade8542174b19f6a7b50fe.yaml new file mode 100644 index 0000000000..a669551733 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-b5aa1e2113ade8542174b19f6a7b50fe.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-b5aa1e2113ade8542174b19f6a7b50fe + +info: + name: > + Elements Kit Lite/Pro <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75d5366e-2908-4b8d-9ee2-1f11e483add1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-b81f70d3babfec3365a985059b1ef475.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-b81f70d3babfec3365a985059b1ef475.yaml new file mode 100644 index 0000000000..3a7e4e0e8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-b81f70d3babfec3365a985059b1ef475.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-b81f70d3babfec3365a985059b1ef475 + +info: + name: > + ElementsKit Elementor addons 3.0.7 - 3.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Accordion Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93dcbab7-fdf5-4631-8605-77f8f190512d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.7', '<= 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-c5f80f50585482477dae3983763ad356.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-c5f80f50585482477dae3983763ad356.yaml new file mode 100644 index 0000000000..6ccb3e2b04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-c5f80f50585482477dae3983763ad356.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-c5f80f50585482477dae3983763ad356 + +info: + name: > + ElementsKit Elementor addons <= 3.1.0 - Authenticated (Contributor+) Local File Inclusion via Onepage Scroll Module + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6158ec37-a6fb-42f9-bab6-bf547ea28ea0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-cebcb9a4981e79bfafb93e65195f6976.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-cebcb9a4981e79bfafb93e65195f6976.yaml new file mode 100644 index 0000000000..c176d7b834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-cebcb9a4981e79bfafb93e65195f6976.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-cebcb9a4981e79bfafb93e65195f6976 + +info: + name: > + ElementsKit Lite <= 3.0.3 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff4ae5c8-d164-4c2f-9bf3-83934c22cf4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elementskit-lite-e064b41fe8a39fcee76359d8531bca53.yaml b/nuclei-templates/cve-less/plugins/elementskit-lite-e064b41fe8a39fcee76359d8531bca53.yaml new file mode 100644 index 0000000000..1488ba0d1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elementskit-lite-e064b41fe8a39fcee76359d8531bca53.yaml @@ -0,0 +1,58 @@ +id: elementskit-lite-e064b41fe8a39fcee76359d8531bca53 + +info: + name: > + ElementsKit Elementor addons <= 3.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf195cca-4e07-41ff-bf26-9ad5fca3635d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elementskit-lite/" + google-query: inurl:"/wp-content/plugins/elementskit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elementskit-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elementskit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elementskit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elespare-e41adc177b897ccc45ae52e5f4de56b3.yaml b/nuclei-templates/cve-less/plugins/elespare-e41adc177b897ccc45ae52e5f4de56b3.yaml new file mode 100644 index 0000000000..82855da667 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elespare-e41adc177b897ccc45ae52e5f4de56b3.yaml @@ -0,0 +1,58 @@ +id: elespare-e41adc177b897ccc45ae52e5f4de56b3 + +info: + name: > + Elespare – Build Your Blog, News & Magazine Websites with Expert-Designed Template Kits. One Click Import: No Coding Skills Required! <= 2.1.2 - Missing Authorization to Subscriber+ Arbitrary Post Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f94efa6-b88b-442d-8162-f03efa7f2f65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elespare/" + google-query: inurl:"/wp-content/plugins/elespare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elespare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elespare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elespare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-1ceda12447caf192b9b71c29d944dec3.yaml b/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-1ceda12447caf192b9b71c29d944dec3.yaml new file mode 100644 index 0000000000..de1a44cf87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-1ceda12447caf192b9b71c29d944dec3.yaml @@ -0,0 +1,58 @@ +id: elex-woocommerce-dynamic-pricing-and-discounts-1ceda12447caf192b9b71c29d944dec3 + +info: + name: > + ELEX WooCommerce Dynamic Pricing and Discounts <= 2.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6fd7da8-d203-4076-8c7d-b8532d9d0bed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/" + google-query: inurl:"/wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elex-woocommerce-dynamic-pricing-and-discounts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elex-woocommerce-dynamic-pricing-and-discounts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-5803c54654296625cc9282007e3bc732.yaml b/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-5803c54654296625cc9282007e3bc732.yaml new file mode 100644 index 0000000000..765f5ba213 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-5803c54654296625cc9282007e3bc732.yaml @@ -0,0 +1,58 @@ +id: elex-woocommerce-dynamic-pricing-and-discounts-5803c54654296625cc9282007e3bc732 + +info: + name: > + ELEX WooCommerce Dynamic Pricing and Discounts <= 2.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24ddc594-e06b-4559-acb0-9a3277579bb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/" + google-query: inurl:"/wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elex-woocommerce-dynamic-pricing-and-discounts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elex-woocommerce-dynamic-pricing-and-discounts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-a95a041f663a4c62aff19b3c367f951b.yaml b/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-a95a041f663a4c62aff19b3c367f951b.yaml new file mode 100644 index 0000000000..b34092bb3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elex-woocommerce-dynamic-pricing-and-discounts-a95a041f663a4c62aff19b3c367f951b.yaml @@ -0,0 +1,58 @@ +id: elex-woocommerce-dynamic-pricing-and-discounts-a95a041f663a4c62aff19b3c367f951b + +info: + name: > + ELEX WooCommerce Dynamic Pricing and Discounts <= 2.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca13db03-74ee-4fdf-96ea-28219f9324e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/" + google-query: inurl:"/wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elex-woocommerce-dynamic-pricing-and-discounts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elex-woocommerce-dynamic-pricing-and-discounts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elex-woocommerce-dynamic-pricing-and-discounts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/elex-woocommerce-google-product-feed-plugin-basic-f5c3c86270b1863c3fa6b0703e6d1b39.yaml b/nuclei-templates/cve-less/plugins/elex-woocommerce-google-product-feed-plugin-basic-f5c3c86270b1863c3fa6b0703e6d1b39.yaml new file mode 100644 index 0000000000..a1141bfbf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/elex-woocommerce-google-product-feed-plugin-basic-f5c3c86270b1863c3fa6b0703e6d1b39.yaml @@ -0,0 +1,58 @@ +id: elex-woocommerce-google-product-feed-plugin-basic-f5c3c86270b1863c3fa6b0703e6d1b39 + +info: + name: > + ELEX WooCommerce Google Shopping (Google Product Feed) <= 1.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ef7d891-0efa-45e5-ad16-2f34fc017c8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/elex-woocommerce-google-product-feed-plugin-basic/" + google-query: inurl:"/wp-content/plugins/elex-woocommerce-google-product-feed-plugin-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,elex-woocommerce-google-product-feed-plugin-basic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/elex-woocommerce-google-product-feed-plugin-basic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elex-woocommerce-google-product-feed-plugin-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ellipsis-human-presence-technology-e298d4cd6c60e1657aca279370a259b7.yaml b/nuclei-templates/cve-less/plugins/ellipsis-human-presence-technology-e298d4cd6c60e1657aca279370a259b7.yaml new file mode 100644 index 0000000000..364409eeab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ellipsis-human-presence-technology-e298d4cd6c60e1657aca279370a259b7.yaml @@ -0,0 +1,58 @@ +id: ellipsis-human-presence-technology-e298d4cd6c60e1657aca279370a259b7 + +info: + name: > + Human Presence – Stop Form Spam Without ReCaptcha < 2.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33e010dd-d9b2-410c-8397-638def946fbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ellipsis-human-presence-technology/" + google-query: inurl:"/wp-content/plugins/ellipsis-human-presence-technology/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ellipsis-human-presence-technology,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ellipsis-human-presence-technology/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ellipsis-human-presence-technology" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/emag-marketplace-connector-3b02e02d41cec8d9db34b3c05317b116.yaml b/nuclei-templates/cve-less/plugins/emag-marketplace-connector-3b02e02d41cec8d9db34b3c05317b116.yaml new file mode 100644 index 0000000000..f01c2393a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/emag-marketplace-connector-3b02e02d41cec8d9db34b3c05317b116.yaml @@ -0,0 +1,58 @@ +id: emag-marketplace-connector-3b02e02d41cec8d9db34b3c05317b116 + +info: + name: > + Emag Marketplace Connector < 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddc889bf-8062-4a2c-9d50-d1c76a3c3386?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/emag-marketplace-connector/" + google-query: inurl:"/wp-content/plugins/emag-marketplace-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,emag-marketplace-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/emag-marketplace-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "emag-marketplace-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-address-encoder-b24c287a46f17f82649a53242631be85.yaml b/nuclei-templates/cve-less/plugins/email-address-encoder-b24c287a46f17f82649a53242631be85.yaml new file mode 100644 index 0000000000..fe811907c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-address-encoder-b24c287a46f17f82649a53242631be85.yaml @@ -0,0 +1,58 @@ +id: email-address-encoder-b24c287a46f17f82649a53242631be85 + +info: + name: > + Email Address Encoder 1.0.22 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab5b7dc4-113d-4f58-956e-2a9284e1e25e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-address-encoder/" + google-query: inurl:"/wp-content/plugins/email-address-encoder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-address-encoder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-address-encoder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-address-encoder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-artillery-20b7ddc5d1ffcbeda215596162f60f8b.yaml b/nuclei-templates/cve-less/plugins/email-artillery-20b7ddc5d1ffcbeda215596162f60f8b.yaml new file mode 100644 index 0000000000..8e4e8591b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-artillery-20b7ddc5d1ffcbeda215596162f60f8b.yaml @@ -0,0 +1,58 @@ +id: email-artillery-20b7ddc5d1ffcbeda215596162f60f8b + +info: + name: > + Email Artillery (MASS EMAIL) <= 4.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cbb309c-015b-4bdb-917a-a67e028484e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-artillery/" + google-query: inurl:"/wp-content/plugins/email-artillery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-artillery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-artillery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-artillery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-artillery-4d82961305a08da281f47753834e6ed4.yaml b/nuclei-templates/cve-less/plugins/email-artillery-4d82961305a08da281f47753834e6ed4.yaml new file mode 100644 index 0000000000..3a321262aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-artillery-4d82961305a08da281f47753834e6ed4.yaml @@ -0,0 +1,58 @@ +id: email-artillery-4d82961305a08da281f47753834e6ed4 + +info: + name: > + Email Artillery (MASS EMAIL) <= 4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13cb5c62-34fb-4bbc-b42a-cc8a16d51258?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-artillery/" + google-query: inurl:"/wp-content/plugins/email-artillery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-artillery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-artillery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-artillery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-artillery-5969d2a7887ae66d8279d64632cb1bda.yaml b/nuclei-templates/cve-less/plugins/email-artillery-5969d2a7887ae66d8279d64632cb1bda.yaml new file mode 100644 index 0000000000..1bb27d266e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-artillery-5969d2a7887ae66d8279d64632cb1bda.yaml @@ -0,0 +1,58 @@ +id: email-artillery-5969d2a7887ae66d8279d64632cb1bda + +info: + name: > + Email Artillery (MASS EMAIL) <= 4.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63af91ef-54ef-4322-9931-a0d29dbd2aec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-artillery/" + google-query: inurl:"/wp-content/plugins/email-artillery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-artillery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-artillery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-artillery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-artillery-9c1eeb6cb8e2181d2e2a015c65a4f34a.yaml b/nuclei-templates/cve-less/plugins/email-artillery-9c1eeb6cb8e2181d2e2a015c65a4f34a.yaml new file mode 100644 index 0000000000..d870a09fdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-artillery-9c1eeb6cb8e2181d2e2a015c65a4f34a.yaml @@ -0,0 +1,58 @@ +id: email-artillery-9c1eeb6cb8e2181d2e2a015c65a4f34a + +info: + name: > + Email Artillery (MASS EMAIL) <= 4.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/472b523f-b987-4da0-8533-54ae076d7a6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-artillery/" + google-query: inurl:"/wp-content/plugins/email-artillery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-artillery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-artillery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-artillery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-before-download-21e4ce5a3bfca4114f19fea4e07cedff.yaml b/nuclei-templates/cve-less/plugins/email-before-download-21e4ce5a3bfca4114f19fea4e07cedff.yaml new file mode 100644 index 0000000000..18dc54baa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-before-download-21e4ce5a3bfca4114f19fea4e07cedff.yaml @@ -0,0 +1,58 @@ +id: email-before-download-21e4ce5a3bfca4114f19fea4e07cedff + +info: + name: > + Email Before Download <= 3.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbeb32a8-5acf-4a68-859d-98652e8ff5d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-before-download/" + google-query: inurl:"/wp-content/plugins/email-before-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-before-download,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-before-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-before-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-before-download-5ea0c3651c9da8625cccc634cc64b098.yaml b/nuclei-templates/cve-less/plugins/email-before-download-5ea0c3651c9da8625cccc634cc64b098.yaml new file mode 100644 index 0000000000..0fcd169b00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-before-download-5ea0c3651c9da8625cccc634cc64b098.yaml @@ -0,0 +1,58 @@ +id: email-before-download-5ea0c3651c9da8625cccc634cc64b098 + +info: + name: > + Email Before Download <= 3.6 - SMTP Header Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52dc69e7-d4c0-492e-a334-54464fc963fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-before-download/" + google-query: inurl:"/wp-content/plugins/email-before-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-before-download,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-before-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-before-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-before-download-6ebfe44ebffa047243d43e4d8e8b6f78.yaml b/nuclei-templates/cve-less/plugins/email-before-download-6ebfe44ebffa047243d43e4d8e8b6f78.yaml new file mode 100644 index 0000000000..6918034749 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-before-download-6ebfe44ebffa047243d43e4d8e8b6f78.yaml @@ -0,0 +1,58 @@ +id: email-before-download-6ebfe44ebffa047243d43e4d8e8b6f78 + +info: + name: > + Email Before Download <= 6.7 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f08ad322-6458-4608-b53a-6aaed38a9ef2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-before-download/" + google-query: inurl:"/wp-content/plugins/email-before-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-before-download,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-before-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-before-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-before-download-a2870e76b912e745a86653be4b4db558.yaml b/nuclei-templates/cve-less/plugins/email-before-download-a2870e76b912e745a86653be4b4db558.yaml new file mode 100644 index 0000000000..1fda15139d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-before-download-a2870e76b912e745a86653be4b4db558.yaml @@ -0,0 +1,58 @@ +id: email-before-download-a2870e76b912e745a86653be4b4db558 + +info: + name: > + Email Before Download <= 3.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/743d7370-cf33-481c-8d0a-c6f969e38b42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-before-download/" + google-query: inurl:"/wp-content/plugins/email-before-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-before-download,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-before-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-before-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-before-download-ccee5c3d44686cfe8d0fc73e53e58d49.yaml b/nuclei-templates/cve-less/plugins/email-before-download-ccee5c3d44686cfe8d0fc73e53e58d49.yaml new file mode 100644 index 0000000000..fc4c1e69c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-before-download-ccee5c3d44686cfe8d0fc73e53e58d49.yaml @@ -0,0 +1,58 @@ +id: email-before-download-ccee5c3d44686cfe8d0fc73e53e58d49 + +info: + name: > + Email Before Download <= 6.9.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa918a65-0021-4c32-9f6d-d978926c3ef3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-before-download/" + google-query: inurl:"/wp-content/plugins/email-before-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-before-download,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-before-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-before-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-customizer-for-woocommerce-2dc01355a72cc0cc9990304f23aef74b.yaml b/nuclei-templates/cve-less/plugins/email-customizer-for-woocommerce-2dc01355a72cc0cc9990304f23aef74b.yaml new file mode 100644 index 0000000000..f51f8cbb51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-customizer-for-woocommerce-2dc01355a72cc0cc9990304f23aef74b.yaml @@ -0,0 +1,58 @@ +id: email-customizer-for-woocommerce-2dc01355a72cc0cc9990304f23aef74b + +info: + name: > + Email Customizer for WooCommerce | Drag and Drop Email Templates Builder <= 2.6.0 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e25015c9-d764-44b2-ad54-edf5d248e56c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-customizer-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/email-customizer-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-customizer-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-customizer-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-customizer-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-customizer-woocommerce-240ee5ac158ce434b1247f54a6208c44.yaml b/nuclei-templates/cve-less/plugins/email-customizer-woocommerce-240ee5ac158ce434b1247f54a6208c44.yaml new file mode 100644 index 0000000000..ce60d32916 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-customizer-woocommerce-240ee5ac158ce434b1247f54a6208c44.yaml @@ -0,0 +1,58 @@ +id: email-customizer-woocommerce-240ee5ac158ce434b1247f54a6208c44 + +info: + name: > + Visual Email Designer for WooCommerce <= 1.7.1 - Authenticated (Author+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/039b7dcc-fad6-4bc1-b0f9-7e888eb54412?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-customizer-woocommerce/" + google-query: inurl:"/wp-content/plugins/email-customizer-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-customizer-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-customizer-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-customizer-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-download-link-6fee77016a00b31c59636a01ae709575.yaml b/nuclei-templates/cve-less/plugins/email-download-link-6fee77016a00b31c59636a01ae709575.yaml new file mode 100644 index 0000000000..b617253eb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-download-link-6fee77016a00b31c59636a01ae709575.yaml @@ -0,0 +1,58 @@ +id: email-download-link-6fee77016a00b31c59636a01ae709575 + +info: + name: > + Email download link <= 3.7 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29d6df4e-eaf6-42ec-8cd9-7cf86908f4ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-download-link/" + google-query: inurl:"/wp-content/plugins/email-download-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-download-link,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-download-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-download-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-encoder-bundle-39cc187a3eccc87804cc421fe29b611f.yaml b/nuclei-templates/cve-less/plugins/email-encoder-bundle-39cc187a3eccc87804cc421fe29b611f.yaml new file mode 100644 index 0000000000..15da44f2cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-encoder-bundle-39cc187a3eccc87804cc421fe29b611f.yaml @@ -0,0 +1,58 @@ +id: email-encoder-bundle-39cc187a3eccc87804cc421fe29b611f + +info: + name: > + Email Encoder <= 2.1.1 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69025975-9fb7-47a7-9dea-68f4c01d5fdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-encoder-bundle/" + google-query: inurl:"/wp-content/plugins/email-encoder-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-encoder-bundle,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-encoder-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-encoder-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-encoder-bundle-83be75cbe83d286de0e56bf13cde5945.yaml b/nuclei-templates/cve-less/plugins/email-encoder-bundle-83be75cbe83d286de0e56bf13cde5945.yaml new file mode 100644 index 0000000000..b306d9cc4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-encoder-bundle-83be75cbe83d286de0e56bf13cde5945.yaml @@ -0,0 +1,58 @@ +id: email-encoder-bundle-83be75cbe83d286de0e56bf13cde5945 + +info: + name: > + Email Encoder – Protect Email Addresses and Phone Numbers <= 2.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78da1f88-2446-4ea5-9437-a118324ab6c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-encoder-bundle/" + google-query: inurl:"/wp-content/plugins/email-encoder-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-encoder-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-encoder-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-encoder-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-encoder-bundle-8e9ca596ac830dab2177a8b85d591379.yaml b/nuclei-templates/cve-less/plugins/email-encoder-bundle-8e9ca596ac830dab2177a8b85d591379.yaml new file mode 100644 index 0000000000..84ec6b187f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-encoder-bundle-8e9ca596ac830dab2177a8b85d591379.yaml @@ -0,0 +1,58 @@ +id: email-encoder-bundle-8e9ca596ac830dab2177a8b85d591379 + +info: + name: > + Email Encoder < 1.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52ac7e85-0a01-41f0-b753-7858a859705f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-encoder-bundle/" + google-query: inurl:"/wp-content/plugins/email-encoder-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-encoder-bundle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-encoder-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-encoder-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-encoder-bundle-9a66ad8b0967001fd55d0d45f6e42869.yaml b/nuclei-templates/cve-less/plugins/email-encoder-bundle-9a66ad8b0967001fd55d0d45f6e42869.yaml new file mode 100644 index 0000000000..041ced031b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-encoder-bundle-9a66ad8b0967001fd55d0d45f6e42869.yaml @@ -0,0 +1,58 @@ +id: email-encoder-bundle-9a66ad8b0967001fd55d0d45f6e42869 + +info: + name: > + Email Encoder – Protect Email Addresses and Phone Numbers <= 2.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5afe6ea-93b8-4782-8593-76468e370a45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-encoder-bundle/" + google-query: inurl:"/wp-content/plugins/email-encoder-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-encoder-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-encoder-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-encoder-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-encoder-bundle-9c882237ff7863bee4225b027eaf1086.yaml b/nuclei-templates/cve-less/plugins/email-encoder-bundle-9c882237ff7863bee4225b027eaf1086.yaml new file mode 100644 index 0000000000..09d1c527c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-encoder-bundle-9c882237ff7863bee4225b027eaf1086.yaml @@ -0,0 +1,58 @@ +id: email-encoder-bundle-9c882237ff7863bee4225b027eaf1086 + +info: + name: > + Email Encoder <= 2.1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e90f04e4-eb4c-4822-89c6-79f553987c37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-encoder-bundle/" + google-query: inurl:"/wp-content/plugins/email-encoder-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-encoder-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-encoder-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-encoder-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-encoder-bundle-c754ba54f7d343b7382e51da7c21880e.yaml b/nuclei-templates/cve-less/plugins/email-encoder-bundle-c754ba54f7d343b7382e51da7c21880e.yaml new file mode 100644 index 0000000000..bf5331cc11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-encoder-bundle-c754ba54f7d343b7382e51da7c21880e.yaml @@ -0,0 +1,58 @@ +id: email-encoder-bundle-c754ba54f7d343b7382e51da7c21880e + +info: + name: > + Email Encoder Bundle <= 2.1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09f328f6-8a66-46bf-80d9-3ffeaecfec32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-encoder-bundle/" + google-query: inurl:"/wp-content/plugins/email-encoder-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-encoder-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-encoder-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-encoder-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-header-footer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/email-header-footer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9f6f8a3c50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-header-footer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: email-header-footer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-header-footer/" + google-query: inurl:"/wp-content/plugins/email-header-footer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-header-footer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-header-footer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-header-footer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-log-628e104d3a4b1ff3a2f651b79f8f25d3.yaml b/nuclei-templates/cve-less/plugins/email-log-628e104d3a4b1ff3a2f651b79f8f25d3.yaml new file mode 100644 index 0000000000..6ae8020fb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-log-628e104d3a4b1ff3a2f651b79f8f25d3.yaml @@ -0,0 +1,58 @@ +id: email-log-628e104d3a4b1ff3a2f651b79f8f25d3 + +info: + name: > + Email Log <= 2.2.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cf570e4-7cae-4adc-ac3e-84225d74da39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-log/" + google-query: inurl:"/wp-content/plugins/email-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-log-ed713a06b3f7e4b3455b2dcdb9972457.yaml b/nuclei-templates/cve-less/plugins/email-log-ed713a06b3f7e4b3455b2dcdb9972457.yaml new file mode 100644 index 0000000000..85ab7673e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-log-ed713a06b3f7e4b3455b2dcdb9972457.yaml @@ -0,0 +1,58 @@ +id: email-log-ed713a06b3f7e4b3455b2dcdb9972457 + +info: + name: > + Email Log <= 2.4.6 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ca4fa28-53b0-4bc4-99f8-fa6dfa14d500?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-log/" + google-query: inurl:"/wp-content/plugins/email-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-log-f236054487317139ae48591f97952a0e.yaml b/nuclei-templates/cve-less/plugins/email-log-f236054487317139ae48591f97952a0e.yaml new file mode 100644 index 0000000000..7bb7b35be4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-log-f236054487317139ae48591f97952a0e.yaml @@ -0,0 +1,58 @@ +id: email-log-f236054487317139ae48591f97952a0e + +info: + name: > + Email Log <= 2.4.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6042e3d9-cced-43b8-8b3c-eaca9855b842?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-log/" + google-query: inurl:"/wp-content/plugins/email-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-my-posts-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/email-my-posts-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..a4e0c25ac4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-my-posts-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: email-my-posts-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-my-posts/" + google-query: inurl:"/wp-content/plugins/email-my-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-my-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-my-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-my-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-newsletter-72825f3aadd86474681e72f8f4d9931a.yaml b/nuclei-templates/cve-less/plugins/email-newsletter-72825f3aadd86474681e72f8f4d9931a.yaml new file mode 100644 index 0000000000..896a6b318a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-newsletter-72825f3aadd86474681e72f8f4d9931a.yaml @@ -0,0 +1,58 @@ +id: email-newsletter-72825f3aadd86474681e72f8f4d9931a + +info: + name: > + Email Newsletter <= 20.13.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74f8af2b-69fb-41db-b978-62709322aed3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-newsletter/" + google-query: inurl:"/wp-content/plugins/email-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20.13.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-newsletter-8a46b53d95feeaadec01fb4ec558c983.yaml b/nuclei-templates/cve-less/plugins/email-newsletter-8a46b53d95feeaadec01fb4ec558c983.yaml new file mode 100644 index 0000000000..dc8e10a32c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-newsletter-8a46b53d95feeaadec01fb4ec558c983.yaml @@ -0,0 +1,58 @@ +id: email-newsletter-8a46b53d95feeaadec01fb4ec558c983 + +info: + name: > + Email Newsletter <= 8.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37053b53-8308-4e54-99c2-7616ed8cb379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-newsletter/" + google-query: inurl:"/wp-content/plugins/email-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-newsletter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-newsletter-faced947f330f89d07bbb1dcb1b4213e.yaml b/nuclei-templates/cve-less/plugins/email-newsletter-faced947f330f89d07bbb1dcb1b4213e.yaml new file mode 100644 index 0000000000..0e3b8f7eac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-newsletter-faced947f330f89d07bbb1dcb1b4213e.yaml @@ -0,0 +1,58 @@ +id: email-newsletter-faced947f330f89d07bbb1dcb1b4213e + +info: + name: > + Email Newsletter <= 20.15 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f41eecf8-dad9-4f98-91f5-c6ac472b8810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-newsletter/" + google-query: inurl:"/wp-content/plugins/email-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-newsletter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-4eac7176009c682727808e01e866ef23.yaml b/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-4eac7176009c682727808e01e866ef23.yaml new file mode 100644 index 0000000000..652a285c1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-4eac7176009c682727808e01e866ef23.yaml @@ -0,0 +1,58 @@ +id: email-posts-to-subscribers-4eac7176009c682727808e01e866ef23 + +info: + name: > + Email posts to subscribers <= 6.2 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7730d670-d270-4755-bc9a-550498a28edb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-posts-to-subscribers/" + google-query: inurl:"/wp-content/plugins/email-posts-to-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-posts-to-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-posts-to-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-posts-to-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-70d540971be97a9211e2d9d5341f5f1e.yaml b/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-70d540971be97a9211e2d9d5341f5f1e.yaml new file mode 100644 index 0000000000..f83161322e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-70d540971be97a9211e2d9d5341f5f1e.yaml @@ -0,0 +1,58 @@ +id: email-posts-to-subscribers-70d540971be97a9211e2d9d5341f5f1e + +info: + name: > + Email posts to subscribers <= 6.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51f73041-927d-42da-92cc-14242a397356?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-posts-to-subscribers/" + google-query: inurl:"/wp-content/plugins/email-posts-to-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-posts-to-subscribers,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-posts-to-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-posts-to-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-8758f22404dd62cde026b1679050e44a.yaml b/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-8758f22404dd62cde026b1679050e44a.yaml new file mode 100644 index 0000000000..4d114f9079 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-posts-to-subscribers-8758f22404dd62cde026b1679050e44a.yaml @@ -0,0 +1,58 @@ +id: email-posts-to-subscribers-8758f22404dd62cde026b1679050e44a + +info: + name: > + Email posts to subscribers <= 6.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e818a5db-acb7-4b16-80b1-939904e93791?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-posts-to-subscribers/" + google-query: inurl:"/wp-content/plugins/email-posts-to-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-posts-to-subscribers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-posts-to-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-posts-to-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-queue-b0b27aeca24eecebb185da8072b76690.yaml b/nuclei-templates/cve-less/plugins/email-queue-b0b27aeca24eecebb185da8072b76690.yaml new file mode 100644 index 0000000000..c0149a8f15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-queue-b0b27aeca24eecebb185da8072b76690.yaml @@ -0,0 +1,58 @@ +id: email-queue-b0b27aeca24eecebb185da8072b76690 + +info: + name: > + Email Queue by BestWebSoft < 1.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/153a9a08-66b3-40fd-963d-93058c863a80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-queue/" + google-query: inurl:"/wp-content/plugins/email-queue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-queue,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-queue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-queue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribe-42d0690a93913679d6541673c2295e13.yaml b/nuclei-templates/cve-less/plugins/email-subscribe-42d0690a93913679d6541673c2295e13.yaml new file mode 100644 index 0000000000..6c31dfb3d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribe-42d0690a93913679d6541673c2295e13.yaml @@ -0,0 +1,58 @@ +id: email-subscribe-42d0690a93913679d6541673c2295e13 + +info: + name: > + Email Subscription Popup <= 1.2.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14ffe10e-e1a6-4752-9ff9-d2b01a49521e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribe/" + google-query: inurl:"/wp-content/plugins/email-subscribe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribe-61d643ab5e58be99a89f898a95037035.yaml b/nuclei-templates/cve-less/plugins/email-subscribe-61d643ab5e58be99a89f898a95037035.yaml new file mode 100644 index 0000000000..f8102efdc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribe-61d643ab5e58be99a89f898a95037035.yaml @@ -0,0 +1,58 @@ +id: email-subscribe-61d643ab5e58be99a89f898a95037035 + +info: + name: > + Email Subscription Popup <= 1.2.20 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce2a438c-8506-4f07-ac1d-b682ad5a038b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribe/" + google-query: inurl:"/wp-content/plugins/email-subscribe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribe-630f34845af5e5fc95882bb14f5c2a50.yaml b/nuclei-templates/cve-less/plugins/email-subscribe-630f34845af5e5fc95882bb14f5c2a50.yaml new file mode 100644 index 0000000000..0bbdafd376 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribe-630f34845af5e5fc95882bb14f5c2a50.yaml @@ -0,0 +1,58 @@ +id: email-subscribe-630f34845af5e5fc95882bb14f5c2a50 + +info: + name: > + Email Subscription Popup <= 1.2.18 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f84814e-f7b7-4228-b331-63027a0770af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribe/" + google-query: inurl:"/wp-content/plugins/email-subscribe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribe-7d502a4de060d367bcc9b0de4a22c634.yaml b/nuclei-templates/cve-less/plugins/email-subscribe-7d502a4de060d367bcc9b0de4a22c634.yaml new file mode 100644 index 0000000000..6ddf556b83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribe-7d502a4de060d367bcc9b0de4a22c634.yaml @@ -0,0 +1,58 @@ +id: email-subscribe-7d502a4de060d367bcc9b0de4a22c634 + +info: + name: > + Email Subscription Popup <= 1.2.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63b30d03-43d2-4696-aa36-8b39ec2c4ed0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribe/" + google-query: inurl:"/wp-content/plugins/email-subscribe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscriber-59026d3a8bc5d6798f6f8303efbe2f34.yaml b/nuclei-templates/cve-less/plugins/email-subscriber-59026d3a8bc5d6798f6f8303efbe2f34.yaml new file mode 100644 index 0000000000..a2d4a962d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscriber-59026d3a8bc5d6798f6f8303efbe2f34.yaml @@ -0,0 +1,58 @@ +id: email-subscriber-59026d3a8bc5d6798f6f8303efbe2f34 + +info: + name: > + Email Subscriber <= 1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d501415-39ab-4c2a-bcd3-fda97b7a3235?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscriber/" + google-query: inurl:"/wp-content/plugins/email-subscriber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscriber,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscriber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscriber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-030bdddcac86d2bf18f94090df9f83ed.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-030bdddcac86d2bf18f94090df9f83ed.yaml new file mode 100644 index 0000000000..0c4268490e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-030bdddcac86d2bf18f94090df9f83ed.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-030bdddcac86d2bf18f94090df9f83ed + +info: + name: > + Icegram Express <= 5.5.2 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8077d07-acaf-40f2-bc0f-e28a44ead94c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-13af706509ed275951fca2f87c67ca91.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-13af706509ed275951fca2f87c67ca91.yaml new file mode 100644 index 0000000000..6646b0f9c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-13af706509ed275951fca2f87c67ca91.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-13af706509ed275951fca2f87c67ca91 + +info: + name: > + Email Subscribers & Newsletters < 2.9.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01d19333-d315-4715-8365-719260ae0ee4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-250405dd7d7ac0936ba8e7cd74ae07f6.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-250405dd7d7ac0936ba8e7cd74ae07f6.yaml new file mode 100644 index 0000000000..de16bc2aca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-250405dd7d7ac0936ba8e7cd74ae07f6.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-250405dd7d7ac0936ba8e7cd74ae07f6 + +info: + name: > + Email Subscribers & Newsletters <= 4.5.5 - Unauthenticated Email Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/715dc265-253e-4409-b57d-474d3740adbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-3042e18a6deb29dac6c8bd45ef1b1544.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-3042e18a6deb29dac6c8bd45ef1b1544.yaml new file mode 100644 index 0000000000..45a0fd8d45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-3042e18a6deb29dac6c8bd45ef1b1544.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-3042e18a6deb29dac6c8bd45ef1b1544 + +info: + name: > + Email Subscribers & Newsletters <= 4.2.2 - Missing Authorization to Test Email + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a04870e0-41c8-464b-b30e-0bf7900e1433?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-44b2c7a52835b66ee714b700c4849cf7.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-44b2c7a52835b66ee714b700c4849cf7.yaml new file mode 100644 index 0000000000..6b65e3d323 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-44b2c7a52835b66ee714b700c4849cf7.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-44b2c7a52835b66ee714b700c4849cf7 + +info: + name: > + Email Subscribers & Newsletters <= 3.4.7 - Unauthenticated Subscriber Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/802c83c6-4da2-4286-b1a3-f964cf5e789a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-52ad0bdca5afebb4c884c4a9d304e243.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-52ad0bdca5afebb4c884c4a9d304e243.yaml new file mode 100644 index 0000000000..3d50371ee3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-52ad0bdca5afebb4c884c4a9d304e243.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-52ad0bdca5afebb4c884c4a9d304e243 + +info: + name: > + Icegram Email Subscribers & Newsletters <= 4.5.0 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61b28b8c-4588-4b4e-85e8-d3d37b791f3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-611a77108bb5f90997b0fce9e22206d7.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-611a77108bb5f90997b0fce9e22206d7.yaml new file mode 100644 index 0000000000..83bc9c0c2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-611a77108bb5f90997b0fce9e22206d7.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-611a77108bb5f90997b0fce9e22206d7 + +info: + name: > + Email Subscribers & Newsletters <= 4.2.2 - Unauthenticated File Download w/ Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c77b0d79-5738-4ce2-b219-cb557216890f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-648aa8a954870cce461eed81133035e4.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-648aa8a954870cce461eed81133035e4.yaml new file mode 100644 index 0000000000..60be0c8dac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-648aa8a954870cce461eed81133035e4.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-648aa8a954870cce461eed81133035e4 + +info: + name: > + Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0ca6ac4-0d89-4601-94fc-cce5a0af9c56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-64ebdeacfb7857f81240b567b724e6b3.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-64ebdeacfb7857f81240b567b724e6b3.yaml new file mode 100644 index 0000000000..8b9b570aa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-64ebdeacfb7857f81240b567b724e6b3.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-64ebdeacfb7857f81240b567b724e6b3 + +info: + name: > + Icegram Express <= 5.4.19 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbf85cbc-88fa-4430-b005-a1f1e141241b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-6d5548494ee66c8a74f29f22d03a7935.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-6d5548494ee66c8a74f29f22d03a7935.yaml new file mode 100644 index 0000000000..2b5759fb1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-6d5548494ee66c8a74f29f22d03a7935.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-6d5548494ee66c8a74f29f22d03a7935 + +info: + name: > + Email Subscribers & Newsletters < 4.3.1 - Unauthenticated Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00187815-6706-4ec9-a566-4836de0d17c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-827bc1bb21b15b99a01d332b7037ec11.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-827bc1bb21b15b99a01d332b7037ec11.yaml new file mode 100644 index 0000000000..0cb1738130 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-827bc1bb21b15b99a01d332b7037ec11.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-827bc1bb21b15b99a01d332b7037ec11 + +info: + name: > + Email Subscribers & Newsletters <= 4.1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/933d8f1a-ae6e-4c49-92bc-a0b6bd3a0598?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-865ecb5d1f3a9d92057b3c2510337cb0.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-865ecb5d1f3a9d92057b3c2510337cb0.yaml new file mode 100644 index 0000000000..78482d7593 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-865ecb5d1f3a9d92057b3c2510337cb0.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-865ecb5d1f3a9d92057b3c2510337cb0 + +info: + name: > + Email Subscribers & Newsletters <= 3.4.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/083cc89e-0352-44ff-abcb-87f3c5375a31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-880b88155b22c7b6bb28fecc96be5e0e.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-880b88155b22c7b6bb28fecc96be5e0e.yaml new file mode 100644 index 0000000000..4b1a236e38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-880b88155b22c7b6bb28fecc96be5e0e.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-880b88155b22c7b6bb28fecc96be5e0e + +info: + name: > + Icegram Email Subscribers & Newsletters Plugin for WordPress <= 4.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd154b26-985b-4e72-976f-1858a783c667?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-9ac9f5b4519b4e9d1529f25c11daa2ab.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-9ac9f5b4519b4e9d1529f25c11daa2ab.yaml new file mode 100644 index 0000000000..7ccc1e1325 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-9ac9f5b4519b4e9d1529f25c11daa2ab.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-9ac9f5b4519b4e9d1529f25c11daa2ab + +info: + name: > + Email Subscribers & Newsletters <= 4.2.2 - Unauthenticated Option Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff5d8f5f-c7af-4789-9920-a09d2733b8ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-9fe142798845207512b358a2cd4c8c4d.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-9fe142798845207512b358a2cd4c8c4d.yaml new file mode 100644 index 0000000000..ec4d1781e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-9fe142798845207512b358a2cd4c8c4d.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-9fe142798845207512b358a2cd4c8c4d + +info: + name: > + Icegram Express <= 5.7.14 - Authenticated (Administrator+) Cross-Site Scripting via CSV import + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/159ddb06-e7c4-4279-a8a1-c78a02e15891?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-a1ba03b1aedf70c25268c48aaf5fa097.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-a1ba03b1aedf70c25268c48aaf5fa097.yaml new file mode 100644 index 0000000000..8949808a5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-a1ba03b1aedf70c25268c48aaf5fa097.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-a1ba03b1aedf70c25268c48aaf5fa097 + +info: + name: > + Email Subscribers & Newsletters <= 5.7.11 - Reflected Cross-Site Scripting via campaign_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a84d6f64-9ebb-4773-a9c1-8f23fb2801a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-aa4af80a7f91093ad7b6f879bc08fdf0.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-aa4af80a7f91093ad7b6f879bc08fdf0.yaml new file mode 100644 index 0000000000..b589df4f1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-aa4af80a7f91093ad7b6f879bc08fdf0.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-aa4af80a7f91093ad7b6f879bc08fdf0 + +info: + name: > + Email Subscribers & Newsletters <= 4.1.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e999e0f-463c-4676-ad18-f4b467bc4bfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-abc4377868fee7cd682ebf8a6fc03b43.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-abc4377868fee7cd682ebf8a6fc03b43.yaml new file mode 100644 index 0000000000..9a08d3c276 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-abc4377868fee7cd682ebf8a6fc03b43.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-abc4377868fee7cd682ebf8a6fc03b43 + +info: + name: > + Email Subscribers & Newsletters <= 4.2.2 - Cross-Site Request Forgery on Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2152db7-be9a-4e09-97cf-60445d87b576?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-b5e4b4063141fbe3f98d4c057142e54f.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-b5e4b4063141fbe3f98d4c057142e54f.yaml new file mode 100644 index 0000000000..79e04ed188 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-b5e4b4063141fbe3f98d4c057142e54f.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-b5e4b4063141fbe3f98d4c057142e54f + +info: + name: > + Email Subscribers & Newsletters <= 5.3.1 - Authenticated (or Cross-Site Request Forgery) Blind SQL Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b9e3aaf-5182-4622-9b5b-d67af200e2b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-bbb33bf45ae299a4c2e1d54441bd6458.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-bbb33bf45ae299a4c2e1d54441bd6458.yaml new file mode 100644 index 0000000000..18d8483c4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-bbb33bf45ae299a4c2e1d54441bd6458.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-bbb33bf45ae299a4c2e1d54441bd6458 + +info: + name: > + Email Subscribers & Newsletters <= 5.7.13 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d09d8ac7-67f4-490b-8d09-6811f132fede?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml new file mode 100644 index 0000000000..3fa1321c55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-f324ead36f3eeb3ed11630cd0ba7e8ed + +info: + name: > + Email Subscribers & Newsletters <= 4.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49008e63-d369-49b8-9dd7-3dff6dbea17c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-subscribers-fedbaf9b75c3966253ac9d4ff4472b7e.yaml b/nuclei-templates/cve-less/plugins/email-subscribers-fedbaf9b75c3966253ac9d4ff4472b7e.yaml new file mode 100644 index 0000000000..f6f0c6523e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-subscribers-fedbaf9b75c3966253ac9d4ff4472b7e.yaml @@ -0,0 +1,58 @@ +id: email-subscribers-fedbaf9b75c3966253ac9d4ff4472b7e + +info: + name: > + Icegram Express <= 5.6.23 - Authenticated (Administrator+) Directory Traversal to Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/417186ba-36ef-4d06-bbcd-e85eb9219689?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-subscribers/" + google-query: inurl:"/wp-content/plugins/email-subscribers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-subscribers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-subscribers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-subscribers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-templates-57946d1dd6e11e1c396ef81b832dc135.yaml b/nuclei-templates/cve-less/plugins/email-templates-57946d1dd6e11e1c396ef81b832dc135.yaml new file mode 100644 index 0000000000..b67b068382 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-templates-57946d1dd6e11e1c396ef81b832dc135.yaml @@ -0,0 +1,58 @@ +id: email-templates-57946d1dd6e11e1c396ef81b832dc135 + +info: + name: > + Email Templates <= 1.3 - HTML Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5c449f1-4715-4033-b0a3-6a8ca968aabc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-templates/" + google-query: inurl:"/wp-content/plugins/email-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-templates,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-templates-917b82f603a027a526dfc9cab63f789f.yaml b/nuclei-templates/cve-less/plugins/email-templates-917b82f603a027a526dfc9cab63f789f.yaml new file mode 100644 index 0000000000..bf8400b332 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-templates-917b82f603a027a526dfc9cab63f789f.yaml @@ -0,0 +1,58 @@ +id: email-templates-917b82f603a027a526dfc9cab63f789f + +info: + name: > + Email Templates <= 1.4.2 - Cross-Site Request Forgery via send_test_email + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3e1851a-9545-4687-b58b-5cdad3291525?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-templates/" + google-query: inurl:"/wp-content/plugins/email-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-templates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-tracker-1bc28fb76a1a4ab68d85fdb49a0d308f.yaml b/nuclei-templates/cve-less/plugins/email-tracker-1bc28fb76a1a4ab68d85fdb49a0d308f.yaml new file mode 100644 index 0000000000..de6896716f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-tracker-1bc28fb76a1a4ab68d85fdb49a0d308f.yaml @@ -0,0 +1,58 @@ +id: email-tracker-1bc28fb76a1a4ab68d85fdb49a0d308f + +info: + name: > + Email Tracker – Email Tracking Plugin to track Emails for Open and Email Links Click (Compatible with WooCommerce) < 5.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dc733ec-6cc8-40fc-b4c4-1fad4bcd9f21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-tracker/" + google-query: inurl:"/wp-content/plugins/email-tracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-tracker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-tracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-tracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-tracker-2aa4582e387e2f0aff6a161bf2999899.yaml b/nuclei-templates/cve-less/plugins/email-tracker-2aa4582e387e2f0aff6a161bf2999899.yaml new file mode 100644 index 0000000000..72489dcf59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-tracker-2aa4582e387e2f0aff6a161bf2999899.yaml @@ -0,0 +1,58 @@ +id: email-tracker-2aa4582e387e2f0aff6a161bf2999899 + +info: + name: > + Email Tracker <= 5.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac86043d-caf9-4c25-86b2-0e063c21b2d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-tracker/" + google-query: inurl:"/wp-content/plugins/email-tracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-tracker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-tracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-tracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-tracker-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/email-tracker-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..afdaff4e89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-tracker-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: email-tracker-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-tracker/" + google-query: inurl:"/wp-content/plugins/email-tracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-tracker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-tracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-tracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-users-6a64d101ff5229efb2db9bdfe2f53def.yaml b/nuclei-templates/cve-less/plugins/email-users-6a64d101ff5229efb2db9bdfe2f53def.yaml new file mode 100644 index 0000000000..b0761f537b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-users-6a64d101ff5229efb2db9bdfe2f53def.yaml @@ -0,0 +1,58 @@ +id: email-users-6a64d101ff5229efb2db9bdfe2f53def + +info: + name: > + Email Users < 4.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77f0c100-1e33-4f18-80df-ed607faba5f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-users/" + google-query: inurl:"/wp-content/plugins/email-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-users,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-users-6dc4bc21ff707a1d11a058362ed03503.yaml b/nuclei-templates/cve-less/plugins/email-users-6dc4bc21ff707a1d11a058362ed03503.yaml new file mode 100644 index 0000000000..28e28de328 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-users-6dc4bc21ff707a1d11a058362ed03503.yaml @@ -0,0 +1,58 @@ +id: email-users-6dc4bc21ff707a1d11a058362ed03503 + +info: + name: > + Email Users <= 4.7.5 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5176d862-577b-4a37-9da3-9ba106f77d6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-users/" + google-query: inurl:"/wp-content/plugins/email-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-users,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-users-ccda15a5bf6159295fcd2e55b40f1e6b.yaml b/nuclei-templates/cve-less/plugins/email-users-ccda15a5bf6159295fcd2e55b40f1e6b.yaml new file mode 100644 index 0000000000..382652d32f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-users-ccda15a5bf6159295fcd2e55b40f1e6b.yaml @@ -0,0 +1,58 @@ +id: email-users-ccda15a5bf6159295fcd2e55b40f1e6b + +info: + name: > + Email Users <= 4.8.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25c44a00-da56-41f8-bd4f-c15bede6da58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-users/" + google-query: inurl:"/wp-content/plugins/email-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-users,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-users-f8b327a38c9f793227404396765e7078.yaml b/nuclei-templates/cve-less/plugins/email-users-f8b327a38c9f793227404396765e7078.yaml new file mode 100644 index 0000000000..e0e69adee6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-users-f8b327a38c9f793227404396765e7078.yaml @@ -0,0 +1,58 @@ +id: email-users-f8b327a38c9f793227404396765e7078 + +info: + name: > + Email Users <= 4.8.8 - Arbitrary Settings Update via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8a1127c-308d-4347-bd42-2071b906e247?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-users/" + google-query: inurl:"/wp-content/plugins/email-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-users,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/email-verification-for-woocommerce-pro-ee48551d5debb82650756b153a85ffe4.yaml b/nuclei-templates/cve-less/plugins/email-verification-for-woocommerce-pro-ee48551d5debb82650756b153a85ffe4.yaml new file mode 100644 index 0000000000..8a7242e494 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/email-verification-for-woocommerce-pro-ee48551d5debb82650756b153a85ffe4.yaml @@ -0,0 +1,58 @@ +id: email-verification-for-woocommerce-pro-ee48551d5debb82650756b153a85ffe4 + +info: + name: > + Email Verification for WooCommerce <= 1.8.1 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85bd9922-3316-4fd0-b31e-c3ca5ab8a79d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/email-verification-for-woocommerce-pro/" + google-query: inurl:"/wp-content/plugins/email-verification-for-woocommerce-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,email-verification-for-woocommerce-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/email-verification-for-woocommerce-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "email-verification-for-woocommerce-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/emails-blacklist-everest-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/emails-blacklist-everest-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..65be50c42a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/emails-blacklist-everest-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: emails-blacklist-everest-forms-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/emails-blacklist-everest-forms/" + google-query: inurl:"/wp-content/plugins/emails-blacklist-everest-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,emails-blacklist-everest-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/emails-blacklist-everest-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "emails-blacklist-everest-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/emails-verification-for-woocommerce-4a3c747c05de1c383de7ec2aa84fdb32.yaml b/nuclei-templates/cve-less/plugins/emails-verification-for-woocommerce-4a3c747c05de1c383de7ec2aa84fdb32.yaml new file mode 100644 index 0000000000..c941421256 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/emails-verification-for-woocommerce-4a3c747c05de1c383de7ec2aa84fdb32.yaml @@ -0,0 +1,58 @@ +id: emails-verification-for-woocommerce-4a3c747c05de1c383de7ec2aa84fdb32 + +info: + name: > + Customer Email Verification for WooCommerce <= 2.7.4 - Email Verification and Authentication Bypass due to Insufficient Randomness + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebae4b18-5b5f-45c3-86e2-02eefd7abdb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/emails-verification-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/emails-verification-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,emails-verification-for-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/emails-verification-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "emails-verification-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/emails-verification-for-woocommerce-ee48551d5debb82650756b153a85ffe4.yaml b/nuclei-templates/cve-less/plugins/emails-verification-for-woocommerce-ee48551d5debb82650756b153a85ffe4.yaml new file mode 100644 index 0000000000..755611d887 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/emails-verification-for-woocommerce-ee48551d5debb82650756b153a85ffe4.yaml @@ -0,0 +1,58 @@ +id: emails-verification-for-woocommerce-ee48551d5debb82650756b153a85ffe4 + +info: + name: > + Email Verification for WooCommerce <= 1.8.1 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85bd9922-3316-4fd0-b31e-c3ca5ab8a79d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/emails-verification-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/emails-verification-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,emails-verification-for-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/emails-verification-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "emails-verification-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-any-document-da04799a8ee55b9edffd7e84cb258c78.yaml b/nuclei-templates/cve-less/plugins/embed-any-document-da04799a8ee55b9edffd7e84cb258c78.yaml new file mode 100644 index 0000000000..d69504493c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-any-document-da04799a8ee55b9edffd7e84cb258c78.yaml @@ -0,0 +1,58 @@ +id: embed-any-document-da04799a8ee55b9edffd7e84cb258c78 + +info: + name: > + Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files <= 2.7.1 - Authenticated (Author+) Stored Cross-Site Scripting via SVG files + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eebe37bf-2983-47c0-afd8-0aa3e7982196?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-any-document/" + google-query: inurl:"/wp-content/plugins/embed-any-document/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-any-document,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-any-document/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-any-document" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-articles-f3817a5409bd2eea88bc7efe16cd9b30.yaml b/nuclei-templates/cve-less/plugins/embed-articles-f3817a5409bd2eea88bc7efe16cd9b30.yaml new file mode 100644 index 0000000000..111ab833c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-articles-f3817a5409bd2eea88bc7efe16cd9b30.yaml @@ -0,0 +1,58 @@ +id: embed-articles-f3817a5409bd2eea88bc7efe16cd9b30 + +info: + name: > + Embed Articles <= 7.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/643cca2d-5a9a-4561-adf8-af9f0b3b0242?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-articles/" + google-query: inurl:"/wp-content/plugins/embed-articles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-articles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-articles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-articles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-calendly-scheduling-6520a4a851336aa904cc04b7b33623a5.yaml b/nuclei-templates/cve-less/plugins/embed-calendly-scheduling-6520a4a851336aa904cc04b7b33623a5.yaml new file mode 100644 index 0000000000..e87d59defb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-calendly-scheduling-6520a4a851336aa904cc04b7b33623a5.yaml @@ -0,0 +1,58 @@ +id: embed-calendly-scheduling-6520a4a851336aa904cc04b7b33623a5 + +info: + name: > + Embed Calendly <= 3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1bf83df-7a1f-4572-9c8d-1013750d51d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-calendly-scheduling/" + google-query: inurl:"/wp-content/plugins/embed-calendly-scheduling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-calendly-scheduling,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-calendly-scheduling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-calendly-scheduling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-comment-images-ce946f2b4359bb7fac48391b993074ae.yaml b/nuclei-templates/cve-less/plugins/embed-comment-images-ce946f2b4359bb7fac48391b993074ae.yaml new file mode 100644 index 0000000000..60c608051e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-comment-images-ce946f2b4359bb7fac48391b993074ae.yaml @@ -0,0 +1,58 @@ +id: embed-comment-images-ce946f2b4359bb7fac48391b993074ae + +info: + name: > + Embed Images in Comments < 0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7088e84-a138-452b-bc4d-8ca9427ca8ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-comment-images/" + google-query: inurl:"/wp-content/plugins/embed-comment-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-comment-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-comment-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-comment-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-form-22880b987be0b07f46689049fd2458ff.yaml b/nuclei-templates/cve-less/plugins/embed-form-22880b987be0b07f46689049fd2458ff.yaml new file mode 100644 index 0000000000..e5244ecd88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-form-22880b987be0b07f46689049fd2458ff.yaml @@ -0,0 +1,58 @@ +id: embed-form-22880b987be0b07f46689049fd2458ff + +info: + name: > + Jotform Online Forms <= 1.3.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90c34a01-a0d1-4305-b74b-b5a568a42b13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-form/" + google-query: inurl:"/wp-content/plugins/embed-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-google-fonts-48e682e482ecb4079ded015fff88c4de.yaml b/nuclei-templates/cve-less/plugins/embed-google-fonts-48e682e482ecb4079ded015fff88c4de.yaml new file mode 100644 index 0000000000..447126a905 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-google-fonts-48e682e482ecb4079ded015fff88c4de.yaml @@ -0,0 +1,58 @@ +id: embed-google-fonts-48e682e482ecb4079ded015fff88c4de + +info: + name: > + Embed Google Fonts <= 3.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec6ea6e7-9c43-4b58-a1df-947a3aa7cd54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-google-fonts/" + google-query: inurl:"/wp-content/plugins/embed-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-google-fonts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-google-photos-album-easily-83ccb1e8ea2bc379358acbb752bc4542.yaml b/nuclei-templates/cve-less/plugins/embed-google-photos-album-easily-83ccb1e8ea2bc379358acbb752bc4542.yaml new file mode 100644 index 0000000000..113e35db1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-google-photos-album-easily-83ccb1e8ea2bc379358acbb752bc4542.yaml @@ -0,0 +1,58 @@ +id: embed-google-photos-album-easily-83ccb1e8ea2bc379358acbb752bc4542 + +info: + name: > + Embed Google Photos album <= 2.1.9 - Authenticated (Contributor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a090167-0ea9-47f9-be8f-fe392da9ec38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-google-photos-album-easily/" + google-query: inurl:"/wp-content/plugins/embed-google-photos-album-easily/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-google-photos-album-easily,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-google-photos-album-easily/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-google-photos-album-easily" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-office-viewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/embed-office-viewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6d7d5ebbb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-office-viewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: embed-office-viewer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-office-viewer/" + google-query: inurl:"/wp-content/plugins/embed-office-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-office-viewer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-office-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-office-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-power-bi-30c71081d6f65fd865fd605bc8ca0520.yaml b/nuclei-templates/cve-less/plugins/embed-power-bi-30c71081d6f65fd865fd605bc8ca0520.yaml new file mode 100644 index 0000000000..6c6427fe41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-power-bi-30c71081d6f65fd865fd605bc8ca0520.yaml @@ -0,0 +1,58 @@ +id: embed-power-bi-30c71081d6f65fd865fd605bc8ca0520 + +info: + name: > + Power BI Embedded for WordPress <= 1.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae048156-f6a0-41c3-8853-ea439eac10a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-power-bi/" + google-query: inurl:"/wp-content/plugins/embed-power-bi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-power-bi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-power-bi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-power-bi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-privacy-bf9717887c7854e5283687233b3eaf88.yaml b/nuclei-templates/cve-less/plugins/embed-privacy-bf9717887c7854e5283687233b3eaf88.yaml new file mode 100644 index 0000000000..7908430a34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-privacy-bf9717887c7854e5283687233b3eaf88.yaml @@ -0,0 +1,58 @@ +id: embed-privacy-bf9717887c7854e5283687233b3eaf88 + +info: + name: > + Embed Privacy <= 1.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26d9dfc7-151c-4b32-9ae4-3085d08f137c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-privacy/" + google-query: inurl:"/wp-content/plugins/embed-privacy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-privacy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-privacy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-privacy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-swagger-92781f05f816d6c99cfd35413990ba55.yaml b/nuclei-templates/cve-less/plugins/embed-swagger-92781f05f816d6c99cfd35413990ba55.yaml new file mode 100644 index 0000000000..76fd655002 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-swagger-92781f05f816d6c99cfd35413990ba55.yaml @@ -0,0 +1,58 @@ +id: embed-swagger-92781f05f816d6c99cfd35413990ba55 + +info: + name: > + Embed Swagger <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df54a888-fe7a-43ef-a77f-fb6e3401defe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-swagger/" + google-query: inurl:"/wp-content/plugins/embed-swagger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-swagger,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-swagger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-swagger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embed-youtube-video-d936ad16c92f96a8d361e8354b08642f.yaml b/nuclei-templates/cve-less/plugins/embed-youtube-video-d936ad16c92f96a8d361e8354b08642f.yaml new file mode 100644 index 0000000000..57fe6e3004 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embed-youtube-video-d936ad16c92f96a8d361e8354b08642f.yaml @@ -0,0 +1,58 @@ +id: embed-youtube-video-d936ad16c92f96a8d361e8354b08642f + +info: + name: > + Embed Youtube Video <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdec0d79-a78a-499d-a7d0-94b65bfb84bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embed-youtube-video/" + google-query: inurl:"/wp-content/plugins/embed-youtube-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embed-youtube-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embed-youtube-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embed-youtube-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedalbum-pro-db16305504754334b65159ac40ded503.yaml b/nuclei-templates/cve-less/plugins/embedalbum-pro-db16305504754334b65159ac40ded503.yaml new file mode 100644 index 0000000000..3f7862f6ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedalbum-pro-db16305504754334b65159ac40ded503.yaml @@ -0,0 +1,58 @@ +id: embedalbum-pro-db16305504754334b65159ac40ded503 + +info: + name: > + EmbedSocial – Social Media Feeds, Reviews and Galleries = 1.1.27 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0aeef472-0f09-458f-a0dc-b7de190b9b6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedalbum-pro/" + google-query: inurl:"/wp-content/plugins/embedalbum-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedalbum-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedalbum-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedalbum-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedded-video-with-link-2330137ae1ec8d7b8306559ca1c520ca.yaml b/nuclei-templates/cve-less/plugins/embedded-video-with-link-2330137ae1ec8d7b8306559ca1c520ca.yaml new file mode 100644 index 0000000000..48e897826b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedded-video-with-link-2330137ae1ec8d7b8306559ca1c520ca.yaml @@ -0,0 +1,58 @@ +id: embedded-video-with-link-2330137ae1ec8d7b8306559ca1c520ca + +info: + name: > + Embedded Video <= 4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dd8dac6-b969-498a-a1f8-2a00009ae1d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedded-video-with-link/" + google-query: inurl:"/wp-content/plugins/embedded-video-with-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedded-video-with-link,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedded-video-with-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedded-video-with-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedplus-for-wordpress-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/embedplus-for-wordpress-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..21e234b864 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedplus-for-wordpress-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: embedplus-for-wordpress-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedplus-for-wordpress/" + google-query: inurl:"/wp-content/plugins/embedplus-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedplus-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedplus-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedplus-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-115e00c651433aced451e63d84a0be40.yaml b/nuclei-templates/cve-less/plugins/embedpress-115e00c651433aced451e63d84a0be40.yaml new file mode 100644 index 0000000000..134731d132 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-115e00c651433aced451e63d84a0be40.yaml @@ -0,0 +1,58 @@ +id: embedpress-115e00c651433aced451e63d84a0be40 + +info: + name: > + EmbedPress <= 3.7.3 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1033b4d-82a0-4484-aebf-f35d6a2a9a13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-1d3dbd02fa5b7205872c8a687215c897.yaml b/nuclei-templates/cve-less/plugins/embedpress-1d3dbd02fa5b7205872c8a687215c897.yaml new file mode 100644 index 0000000000..03a1c98ed5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-1d3dbd02fa5b7205872c8a687215c897.yaml @@ -0,0 +1,58 @@ +id: embedpress-1d3dbd02fa5b7205872c8a687215c897 + +info: + name: > + EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor <= 3.9.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via Wistia Block + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48511d1a-2fd5-4be4-8409-e99d4aadcdfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-1f31c2ba6ee46d152a9920d8ef0adb22.yaml b/nuclei-templates/cve-less/plugins/embedpress-1f31c2ba6ee46d152a9920d8ef0adb22.yaml new file mode 100644 index 0000000000..1cce41783a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-1f31c2ba6ee46d152a9920d8ef0adb22.yaml @@ -0,0 +1,58 @@ +id: embedpress-1f31c2ba6ee46d152a9920d8ef0adb22 + +info: + name: > + EmbedPress – Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor <= 3.9.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceae0115-268c-401b-876b-3477d10c10e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-1fc5887f904fbbe1b31241f4769801b5.yaml b/nuclei-templates/cve-less/plugins/embedpress-1fc5887f904fbbe1b31241f4769801b5.yaml new file mode 100644 index 0000000000..2b0b636104 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-1fc5887f904fbbe1b31241f4769801b5.yaml @@ -0,0 +1,58 @@ +id: embedpress-1fc5887f904fbbe1b31241f4769801b5 + +info: + name: > + EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor <= 3.9.12 - Authenticated (Contributor+) Stored Cross-site Scripting via 'embedpress_doc_custom_color' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b67927-5993-4e21-af52-8ebe7fee48ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-3c6a3e77a7ff2e2c086feda205237c52.yaml b/nuclei-templates/cve-less/plugins/embedpress-3c6a3e77a7ff2e2c086feda205237c52.yaml new file mode 100644 index 0000000000..895f681ae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-3c6a3e77a7ff2e2c086feda205237c52.yaml @@ -0,0 +1,58 @@ +id: embedpress-3c6a3e77a7ff2e2c086feda205237c52 + +info: + name: > + EmbedPress <= 3.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d41fb15c-9e0b-46d2-b60b-4213facc02a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-55354669981e5b8e2367ee7fd327c426.yaml b/nuclei-templates/cve-less/plugins/embedpress-55354669981e5b8e2367ee7fd327c426.yaml new file mode 100644 index 0000000000..7166ba721a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-55354669981e5b8e2367ee7fd327c426.yaml @@ -0,0 +1,58 @@ +id: embedpress-55354669981e5b8e2367ee7fd327c426 + +info: + name: > + EmbedPress Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor <= 3.9.16 - Authenticated (Contributor+) Stored Cross-Site Scripting via id Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2af03168-9344-4db0-9b69-2ad1fdb6d472?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-70a205acd44742a9f8e261e79a40ad0f.yaml b/nuclei-templates/cve-less/plugins/embedpress-70a205acd44742a9f8e261e79a40ad0f.yaml new file mode 100644 index 0000000000..6b3ced1a88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-70a205acd44742a9f8e261e79a40ad0f.yaml @@ -0,0 +1,58 @@ +id: embedpress-70a205acd44742a9f8e261e79a40ad0f + +info: + name: > + EmbedPress <= 3.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/631d200f-7b0b-4105-b91e-030af459ba99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-735922333648d19765f3918bee1c33f6.yaml b/nuclei-templates/cve-less/plugins/embedpress-735922333648d19765f3918bee1c33f6.yaml new file mode 100644 index 0000000000..6a968a0313 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-735922333648d19765f3918bee1c33f6.yaml @@ -0,0 +1,58 @@ +id: embedpress-735922333648d19765f3918bee1c33f6 + +info: + name: > + EmbedPress <= 3.8.2 - Missing Authorization to Authenticated (Subscriber+) Plugin Settings Delete via admin_post_remove and remove_private_data + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fa2ec9e-2859-4a96-9e33-9e22d37e544f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-7ebfb915654b21bb1907517d4349fa05.yaml b/nuclei-templates/cve-less/plugins/embedpress-7ebfb915654b21bb1907517d4349fa05.yaml new file mode 100644 index 0000000000..01afd4c835 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-7ebfb915654b21bb1907517d4349fa05.yaml @@ -0,0 +1,58 @@ +id: embedpress-7ebfb915654b21bb1907517d4349fa05 + +info: + name: > + EmbedPress <= 3.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b340eda1-e9d2-40b6-89f9-41d995ce3555?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-880737228fe55f5d920474a43f87af97.yaml b/nuclei-templates/cve-less/plugins/embedpress-880737228fe55f5d920474a43f87af97.yaml new file mode 100644 index 0000000000..fee3589d2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-880737228fe55f5d920474a43f87af97.yaml @@ -0,0 +1,58 @@ +id: embedpress-880737228fe55f5d920474a43f87af97 + +info: + name: > + EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor <= 3.9.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via EmbedPress PDF Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6189368d-5925-4c84-9f0f-694b9ebcd45e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-8d8dc52792f8d60124d8fa4fa4f53a0c.yaml b/nuclei-templates/cve-less/plugins/embedpress-8d8dc52792f8d60124d8fa4fa4f53a0c.yaml new file mode 100644 index 0000000000..66679a57bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-8d8dc52792f8d60124d8fa4fa4f53a0c.yaml @@ -0,0 +1,58 @@ +id: embedpress-8d8dc52792f8d60124d8fa4fa4f53a0c + +info: + name: > + EmbedPress <= 3.9.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ce738ee-bbb6-462a-aeae-0523200e320f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-af797cbd3361f1f4f2cd0edf1a785a5a.yaml b/nuclei-templates/cve-less/plugins/embedpress-af797cbd3361f1f4f2cd0edf1a785a5a.yaml new file mode 100644 index 0000000000..3daf2a893d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-af797cbd3361f1f4f2cd0edf1a785a5a.yaml @@ -0,0 +1,58 @@ +id: embedpress-af797cbd3361f1f4f2cd0edf1a785a5a + +info: + name: > + EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor <= 3.9.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Youtube Block + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a427c798-f546-4ca1-98ab-32b433ee5b59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-c976de4a293db59cf9e14c118fa6d0c4.yaml b/nuclei-templates/cve-less/plugins/embedpress-c976de4a293db59cf9e14c118fa6d0c4.yaml new file mode 100644 index 0000000000..0337706d78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-c976de4a293db59cf9e14c118fa6d0c4.yaml @@ -0,0 +1,58 @@ +id: embedpress-c976de4a293db59cf9e14c118fa6d0c4 + +info: + name: > + EmbedPress <= 3.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41edf49a-18a2-4cf0-b498-738e77287b90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-cefa3854b69334bef3c2d36906bda58c.yaml b/nuclei-templates/cve-less/plugins/embedpress-cefa3854b69334bef3c2d36906bda58c.yaml new file mode 100644 index 0000000000..7a454fad09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-cefa3854b69334bef3c2d36906bda58c.yaml @@ -0,0 +1,58 @@ +id: embedpress-cefa3854b69334bef3c2d36906bda58c + +info: + name: > + EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor <= 3.9.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/778d8443-fc0f-4e97-8460-e5ceee8b62a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-e1343ff86b6c5b93b675136f5cf7bf16.yaml b/nuclei-templates/cve-less/plugins/embedpress-e1343ff86b6c5b93b675136f5cf7bf16.yaml new file mode 100644 index 0000000000..58dc3c8ae9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-e1343ff86b6c5b93b675136f5cf7bf16.yaml @@ -0,0 +1,58 @@ +id: embedpress-e1343ff86b6c5b93b675136f5cf7bf16 + +info: + name: > + EmbedPress <= 3.9.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7cf1c70-9778-4b50-b494-d0b1d0277b35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-e6bef9cbc42ae7e22a44d23e311b7552.yaml b/nuclei-templates/cve-less/plugins/embedpress-e6bef9cbc42ae7e22a44d23e311b7552.yaml new file mode 100644 index 0000000000..88369ed2a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-e6bef9cbc42ae7e22a44d23e311b7552.yaml @@ -0,0 +1,58 @@ +id: embedpress-e6bef9cbc42ae7e22a44d23e311b7552 + +info: + name: > + EmbedPress <= 3.8.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36ba23ea-7e79-4048-8030-7ed6b2ff45a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-ebf721c6b992d7c7bdcbf869b188ed93.yaml b/nuclei-templates/cve-less/plugins/embedpress-ebf721c6b992d7c7bdcbf869b188ed93.yaml new file mode 100644 index 0000000000..af0d1189a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-ebf721c6b992d7c7bdcbf869b188ed93.yaml @@ -0,0 +1,58 @@ +id: embedpress-ebf721c6b992d7c7bdcbf869b188ed93 + +info: + name: > + EmbedPress <= 3.9.8 - Authenticated(Contributor+) Stored Cross-Site Scripting via Google Calendar Widget Link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d4568c8-f58c-4c37-94b9-6154e5c46928?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-ef5a725ea594e708f6f726a1ed538862.yaml b/nuclei-templates/cve-less/plugins/embedpress-ef5a725ea594e708f6f726a1ed538862.yaml new file mode 100644 index 0000000000..382aba97b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-ef5a725ea594e708f6f726a1ed538862.yaml @@ -0,0 +1,58 @@ +id: embedpress-ef5a725ea594e708f6f726a1ed538862 + +info: + name: > + EmbedPress <= 3.9.8 - Missing Authorization via handle_calendly_data + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be33065e-dae8-44cf-9f8a-f9971f2743ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedpress-f70dc70f946daa66696d6fbc7263d880.yaml b/nuclei-templates/cve-less/plugins/embedpress-f70dc70f946daa66696d6fbc7263d880.yaml new file mode 100644 index 0000000000..9a2e0c726b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedpress-f70dc70f946daa66696d6fbc7263d880.yaml @@ -0,0 +1,58 @@ +id: embedpress-f70dc70f946daa66696d6fbc7263d880 + +info: + name: > + EmbedPress <= 3.9.12 - Authenticated(Contributor+) Stored Cross-Site Scripting via Widget Attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce3f1310-4d2e-45aa-a3ee-3972a6a31c2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedpress/" + google-query: inurl:"/wp-content/plugins/embedpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/embedstories-a14026f64e5ecc9508ff272952e95205.yaml b/nuclei-templates/cve-less/plugins/embedstories-a14026f64e5ecc9508ff272952e95205.yaml new file mode 100644 index 0000000000..17bb808b3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/embedstories-a14026f64e5ecc9508ff272952e95205.yaml @@ -0,0 +1,58 @@ +id: embedstories-a14026f64e5ecc9508ff272952e95205 + +info: + name: > + EmbedStories <= 0.7.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a452cb6f-8381-4f23-b808-3473db159894?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/embedstories/" + google-query: inurl:"/wp-content/plugins/embedstories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,embedstories,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/embedstories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "embedstories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/emc2-custom-help-videos-dac97f512e0af4b1c598ff6f32c574aa.yaml b/nuclei-templates/cve-less/plugins/emc2-custom-help-videos-dac97f512e0af4b1c598ff6f32c574aa.yaml new file mode 100644 index 0000000000..d5fd0740b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/emc2-custom-help-videos-dac97f512e0af4b1c598ff6f32c574aa.yaml @@ -0,0 +1,58 @@ +id: emc2-custom-help-videos-dac97f512e0af4b1c598ff6f32c574aa + +info: + name: > + EMC2 Custom Help Videos <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa9bf653-5932-4a7b-a004-4d4b21c034a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/emc2-custom-help-videos/" + google-query: inurl:"/wp-content/plugins/emc2-custom-help-videos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,emc2-custom-help-videos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/emc2-custom-help-videos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "emc2-custom-help-videos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-accessibility-66918096b133f0822c2cd20e34605973.yaml b/nuclei-templates/cve-less/plugins/enable-accessibility-66918096b133f0822c2cd20e34605973.yaml new file mode 100644 index 0000000000..bd2b6496b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-accessibility-66918096b133f0822c2cd20e34605973.yaml @@ -0,0 +1,58 @@ +id: enable-accessibility-66918096b133f0822c2cd20e34605973 + +info: + name: > + Enable Accessibility <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0b8c4c3-eba2-4c20-b790-48eceeba898e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-accessibility/" + google-query: inurl:"/wp-content/plugins/enable-accessibility/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-accessibility,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-accessibility/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-accessibility" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-media-replace-47f4114397364fc89b3a25b4215574b4.yaml b/nuclei-templates/cve-less/plugins/enable-media-replace-47f4114397364fc89b3a25b4215574b4.yaml new file mode 100644 index 0000000000..96fe21f6de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-media-replace-47f4114397364fc89b3a25b4215574b4.yaml @@ -0,0 +1,58 @@ +id: enable-media-replace-47f4114397364fc89b3a25b4215574b4 + +info: + name: > + Enable Media Replace <= 3.6.3 - Authenticated (Administrator+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea56f0a1-7359-4beb-aae6-e2a3757ec8cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-media-replace/" + google-query: inurl:"/wp-content/plugins/enable-media-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-media-replace,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-media-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-media-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-media-replace-bbc7fa54925890b55e253bb27ea68d3f.yaml b/nuclei-templates/cve-less/plugins/enable-media-replace-bbc7fa54925890b55e253bb27ea68d3f.yaml new file mode 100644 index 0000000000..54213db3dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-media-replace-bbc7fa54925890b55e253bb27ea68d3f.yaml @@ -0,0 +1,58 @@ +id: enable-media-replace-bbc7fa54925890b55e253bb27ea68d3f + +info: + name: > + Enable Media Replace <= 4.1.2 - Authenticated(Author+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e7e6445-c1c5-48a8-a76d-819f2db1efc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-media-replace/" + google-query: inurl:"/wp-content/plugins/enable-media-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-media-replace,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-media-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-media-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-media-replace-dead64d1305225210f2390b6b61b5201.yaml b/nuclei-templates/cve-less/plugins/enable-media-replace-dead64d1305225210f2390b6b61b5201.yaml new file mode 100644 index 0000000000..428bf62b58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-media-replace-dead64d1305225210f2390b6b61b5201.yaml @@ -0,0 +1,58 @@ +id: enable-media-replace-dead64d1305225210f2390b6b61b5201 + +info: + name: > + Enable Media Replace <= 4.0.1 - Authenticated (Author+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38a079c8-181c-4bd8-a45d-e132711029ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-media-replace/" + google-query: inurl:"/wp-content/plugins/enable-media-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-media-replace,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-media-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-media-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-media-replace-deb23a0fc9d87cc73b65165406099d91.yaml b/nuclei-templates/cve-less/plugins/enable-media-replace-deb23a0fc9d87cc73b65165406099d91.yaml new file mode 100644 index 0000000000..90fc22100c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-media-replace-deb23a0fc9d87cc73b65165406099d91.yaml @@ -0,0 +1,58 @@ +id: enable-media-replace-deb23a0fc9d87cc73b65165406099d91 + +info: + name: > + Enable Media Replace <= 4.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37d8218-6059-46f2-a5d9-d7c22486211e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-media-replace/" + google-query: inurl:"/wp-content/plugins/enable-media-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-media-replace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-media-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-media-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-svg-de18c34baf9718449b89d0d38543217b.yaml b/nuclei-templates/cve-less/plugins/enable-svg-de18c34baf9718449b89d0d38543217b.yaml new file mode 100644 index 0000000000..a41696780a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-svg-de18c34baf9718449b89d0d38543217b.yaml @@ -0,0 +1,58 @@ +id: enable-svg-de18c34baf9718449b89d0d38543217b + +info: + name: > + Enable SVG <= 1.3.1 - Cross-Site Scripting via SVG + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad979f36-319f-48ce-a620-5ea9ae5401eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-svg/" + google-query: inurl:"/wp-content/plugins/enable-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-svg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-svg-uploads-a61a2dfac8b16f216b2c313ed531d97e.yaml b/nuclei-templates/cve-less/plugins/enable-svg-uploads-a61a2dfac8b16f216b2c313ed531d97e.yaml new file mode 100644 index 0000000000..e88f5f7ccb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-svg-uploads-a61a2dfac8b16f216b2c313ed531d97e.yaml @@ -0,0 +1,58 @@ +id: enable-svg-uploads-a61a2dfac8b16f216b2c313ed531d97e + +info: + name: > + Enable SVG Uploads <= 2.1.5 - Authenticated (Author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58354ce0-e166-431a-9fac-6c6d81e39e88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-svg-uploads/" + google-query: inurl:"/wp-content/plugins/enable-svg-uploads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-svg-uploads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-svg-uploads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-svg-uploads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-165d37e436f1584c4d3db5b3ec68fd79.yaml b/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-165d37e436f1584c4d3db5b3ec68fd79.yaml new file mode 100644 index 0000000000..d701d7ff17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-165d37e436f1584c4d3db5b3ec68fd79.yaml @@ -0,0 +1,58 @@ +id: enable-svg-webp-ico-upload-165d37e436f1584c4d3db5b3ec68fd79 + +info: + name: > + Enable SVG, WebP & ICO Upload <= 1.0.3 - Authenticated (Author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6df7bd57-7d2f-4098-b2d0-ffb2e8ed5868?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-svg-webp-ico-upload/" + google-query: inurl:"/wp-content/plugins/enable-svg-webp-ico-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-svg-webp-ico-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-svg-webp-ico-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-svg-webp-ico-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-653a3ab56e5af63ff26288de711fb273.yaml b/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-653a3ab56e5af63ff26288de711fb273.yaml new file mode 100644 index 0000000000..c9aead87ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-653a3ab56e5af63ff26288de711fb273.yaml @@ -0,0 +1,58 @@ +id: enable-svg-webp-ico-upload-653a3ab56e5af63ff26288de711fb273 + +info: + name: > + Enable SVG, WebP & ICO Upload <= 1.0.2 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f47c6c4-2d74-4f37-8232-d54d5f0c24cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-svg-webp-ico-upload/" + google-query: inurl:"/wp-content/plugins/enable-svg-webp-ico-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-svg-webp-ico-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-svg-webp-ico-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-svg-webp-ico-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-ac9050df076297964363495b9c075e7f.yaml b/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-ac9050df076297964363495b9c075e7f.yaml new file mode 100644 index 0000000000..9efdf65865 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-svg-webp-ico-upload-ac9050df076297964363495b9c075e7f.yaml @@ -0,0 +1,58 @@ +id: enable-svg-webp-ico-upload-ac9050df076297964363495b9c075e7f + +info: + name: > + Enable SVG, WebP & ICO Upload <= 1.0.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb14a79a-32ba-4d7a-b706-4e602a25e9cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-svg-webp-ico-upload/" + google-query: inurl:"/wp-content/plugins/enable-svg-webp-ico-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-svg-webp-ico-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-svg-webp-ico-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-svg-webp-ico-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enable-wp-debug-from-admin-dashboard-f01cd050c27f35f17165fc03a0fa92ef.yaml b/nuclei-templates/cve-less/plugins/enable-wp-debug-from-admin-dashboard-f01cd050c27f35f17165fc03a0fa92ef.yaml new file mode 100644 index 0000000000..a87cd7daf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enable-wp-debug-from-admin-dashboard-f01cd050c27f35f17165fc03a0fa92ef.yaml @@ -0,0 +1,58 @@ +id: enable-wp-debug-from-admin-dashboard-f01cd050c27f35f17165fc03a0fa92ef + +info: + name: > + Debug Bar <= 1.85 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12081e8c-7aec-4450-a1a6-15250e7037f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enable-wp-debug-from-admin-dashboard/" + google-query: inurl:"/wp-content/plugins/enable-wp-debug-from-admin-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enable-wp-debug-from-admin-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enable-wp-debug-from-admin-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enable-wp-debug-from-admin-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.85') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/encrypted-blog-0f455cd91b4366e91443512f4a924b14.yaml b/nuclei-templates/cve-less/plugins/encrypted-blog-0f455cd91b4366e91443512f4a924b14.yaml new file mode 100644 index 0000000000..2d2e8f5d4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/encrypted-blog-0f455cd91b4366e91443512f4a924b14.yaml @@ -0,0 +1,58 @@ +id: encrypted-blog-0f455cd91b4366e91443512f4a924b14 + +info: + name: > + Encrypted Blog <= 0.0.6.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a309d8d3-bc1c-4301-8da9-ce7df7c2f76f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/encrypted-blog/" + google-query: inurl:"/wp-content/plugins/encrypted-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,encrypted-blog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/encrypted-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "encrypted-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/encrypted-blog-b92dc57dcec5014fa09f88c38e362f1b.yaml b/nuclei-templates/cve-less/plugins/encrypted-blog-b92dc57dcec5014fa09f88c38e362f1b.yaml new file mode 100644 index 0000000000..b2cfb040a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/encrypted-blog-b92dc57dcec5014fa09f88c38e362f1b.yaml @@ -0,0 +1,58 @@ +id: encrypted-blog-b92dc57dcec5014fa09f88c38e362f1b + +info: + name: > + Encrypted Blog <= 0.0.6.2 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33a26790-1fb8-4088-87dc-e026a28f205d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/encrypted-blog/" + google-query: inurl:"/wp-content/plugins/encrypted-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,encrypted-blog,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/encrypted-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "encrypted-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/encrypted-contact-form-2fb0bdf5e86e962a718dd05b2ce83f93.yaml b/nuclei-templates/cve-less/plugins/encrypted-contact-form-2fb0bdf5e86e962a718dd05b2ce83f93.yaml new file mode 100644 index 0000000000..8437486837 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/encrypted-contact-form-2fb0bdf5e86e962a718dd05b2ce83f93.yaml @@ -0,0 +1,58 @@ +id: encrypted-contact-form-2fb0bdf5e86e962a718dd05b2ce83f93 + +info: + name: > + Encrypted Contact Form < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac3a359c-bdcf-42c5-9e54-c704a358b561?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/encrypted-contact-form/" + google-query: inurl:"/wp-content/plugins/encrypted-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,encrypted-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/encrypted-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "encrypted-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/english-wp-admin-450ea91a4d60d7431414f8be13b7c9b7.yaml b/nuclei-templates/cve-less/plugins/english-wp-admin-450ea91a4d60d7431414f8be13b7c9b7.yaml new file mode 100644 index 0000000000..5967d99b7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/english-wp-admin-450ea91a4d60d7431414f8be13b7c9b7.yaml @@ -0,0 +1,58 @@ +id: english-wp-admin-450ea91a4d60d7431414f8be13b7c9b7 + +info: + name: > + English WordPress Admin <= 1.5.1.1 - Unauthenticated Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bd007fd-eee9-4c3c-b509-63e180e3fd28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/english-wp-admin/" + google-query: inurl:"/wp-content/plugins/english-wp-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,english-wp-admin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/english-wp-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "english-wp-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-catalog-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/enhanced-catalog-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..0cc64b330d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-catalog-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: enhanced-catalog-images-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-catalog-images-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/enhanced-catalog-images-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-catalog-images-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-catalog-images-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-catalog-images-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-3a5678cecd4cbb7e481b97acb528f036.yaml b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-3a5678cecd4cbb7e481b97acb528f036.yaml new file mode 100644 index 0000000000..fc31854ac0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-3a5678cecd4cbb7e481b97acb528f036.yaml @@ -0,0 +1,58 @@ +id: enhanced-e-commerce-for-woocommerce-store-3a5678cecd4cbb7e481b97acb528f036 + +info: + name: > + Conversios.io <= 6.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ad84e6e-5498-4bf1-b662-15b7628ceba2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + google-query: inurl:"/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-e-commerce-for-woocommerce-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-e-commerce-for-woocommerce-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-88bf9af12ef5e38595f378ad9f2dcf87.yaml b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-88bf9af12ef5e38595f378ad9f2dcf87.yaml new file mode 100644 index 0000000000..5bf3e0e568 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-88bf9af12ef5e38595f378ad9f2dcf87.yaml @@ -0,0 +1,58 @@ +id: enhanced-e-commerce-for-woocommerce-store-88bf9af12ef5e38595f378ad9f2dcf87 + +info: + name: > + Conversios.io - Google Analytics and Google Shopping plugin for WooCommerce <= 4.6.1 Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92f6f3f7-c49b-4290-806f-6add333159b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + google-query: inurl:"/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-e-commerce-for-woocommerce-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-e-commerce-for-woocommerce-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-9549871153d587a10461e3eb973b5757.yaml b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-9549871153d587a10461e3eb973b5757.yaml new file mode 100644 index 0000000000..3fb575c6d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-9549871153d587a10461e3eb973b5757.yaml @@ -0,0 +1,58 @@ +id: enhanced-e-commerce-for-woocommerce-store-9549871153d587a10461e3eb973b5757 + +info: + name: > + Conversios.io <= 6.5.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae007dc0-9ac7-459d-bfe6-bcde87028b14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + google-query: inurl:"/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-e-commerce-for-woocommerce-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-e-commerce-for-woocommerce-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-9c674f0198c44bbc3b97237db4078df1.yaml b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-9c674f0198c44bbc3b97237db4078df1.yaml new file mode 100644 index 0000000000..50b26740fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-9c674f0198c44bbc3b97237db4078df1.yaml @@ -0,0 +1,58 @@ +id: enhanced-e-commerce-for-woocommerce-store-9c674f0198c44bbc3b97237db4078df1 + +info: + name: > + All-in-one Google Analytics, Pixels and Product Feed Manager for WooCommerce <= 5.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aae70da2-fcd8-4e33-8f38-5e19e0c14733?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + google-query: inurl:"/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-e-commerce-for-woocommerce-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-e-commerce-for-woocommerce-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-ad1bab22a9b739c47d96ab770ca5f753.yaml b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-ad1bab22a9b739c47d96ab770ca5f753.yaml new file mode 100644 index 0000000000..2d4d7c37fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-ad1bab22a9b739c47d96ab770ca5f753.yaml @@ -0,0 +1,58 @@ +id: enhanced-e-commerce-for-woocommerce-store-ad1bab22a9b739c47d96ab770ca5f753 + +info: + name: > + Conversios.io <= 6.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7d1c57c-7aa2-4317-94ac-3fc48f87b98c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + google-query: inurl:"/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-e-commerce-for-woocommerce-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-e-commerce-for-woocommerce-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-d482e085c2e103ed9accb9a0cd94ae4d.yaml b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-d482e085c2e103ed9accb9a0cd94ae4d.yaml new file mode 100644 index 0000000000..3d074bde20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-d482e085c2e103ed9accb9a0cd94ae4d.yaml @@ -0,0 +1,58 @@ +id: enhanced-e-commerce-for-woocommerce-store-d482e085c2e103ed9accb9a0cd94ae4d + +info: + name: > + Conversios <= 7.0.7 - Authenticated (Subscriber+) SQL Injection via ee_syncProductCategory + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c30801d1-9335-4bba-b344-f0ff57cecf84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + google-query: inurl:"/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-e-commerce-for-woocommerce-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-e-commerce-for-woocommerce-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-ed938d6748a55c68d3afc00fc2604d10.yaml b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-ed938d6748a55c68d3afc00fc2604d10.yaml new file mode 100644 index 0000000000..30d25e4fbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-e-commerce-for-woocommerce-store-ed938d6748a55c68d3afc00fc2604d10.yaml @@ -0,0 +1,58 @@ +id: enhanced-e-commerce-for-woocommerce-store-ed938d6748a55c68d3afc00fc2604d10 + +info: + name: > + Conversios – Google Analytics 4 (GA4), Meta Pixel & more Via Google Tag Manager For WooCommerce <= 7.0.7 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7eb7d499-28ba-48ef-9798-b7c8cbb7aa3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + google-query: inurl:"/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-e-commerce-for-woocommerce-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-e-commerce-for-woocommerce-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-e-commerce-for-woocommerce-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-media-library-6039d2569df090d7d3093a78e0441287.yaml b/nuclei-templates/cve-less/plugins/enhanced-media-library-6039d2569df090d7d3093a78e0441287.yaml new file mode 100644 index 0000000000..52b91962c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-media-library-6039d2569df090d7d3093a78e0441287.yaml @@ -0,0 +1,58 @@ +id: enhanced-media-library-6039d2569df090d7d3093a78e0441287 + +info: + name: > + Enhanced Media Library <= 2.8.9 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b30ecb-e3ce-4092-841b-3a1b2553596a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-media-library/" + google-query: inurl:"/wp-content/plugins/enhanced-media-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-media-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-media-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-media-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-plugin-admin-7b7a151dfcca0b5faecc4b73e9e5942a.yaml b/nuclei-templates/cve-less/plugins/enhanced-plugin-admin-7b7a151dfcca0b5faecc4b73e9e5942a.yaml new file mode 100644 index 0000000000..68c21ea87e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-plugin-admin-7b7a151dfcca0b5faecc4b73e9e5942a.yaml @@ -0,0 +1,58 @@ +id: enhanced-plugin-admin-7b7a151dfcca0b5faecc4b73e9e5942a + +info: + name: > + Enhanced Plugin Admin <= 1.16 - Cross-Site Request Forgery via epa_options_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b5bc030-7739-4eb4-b85d-99e5d0f2643a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-plugin-admin/" + google-query: inurl:"/wp-content/plugins/enhanced-plugin-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-plugin-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-plugin-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-plugin-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-plugin-admin-f1a2d10749ea560492c49064688b416f.yaml b/nuclei-templates/cve-less/plugins/enhanced-plugin-admin-f1a2d10749ea560492c49064688b416f.yaml new file mode 100644 index 0000000000..1cb06191e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-plugin-admin-f1a2d10749ea560492c49064688b416f.yaml @@ -0,0 +1,58 @@ +id: enhanced-plugin-admin-f1a2d10749ea560492c49064688b416f + +info: + name: > + Enhanced Admin Plugin < 1.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13e8f16b-b5a3-4be1-9557-e11cd9ffaea7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-plugin-admin/" + google-query: inurl:"/wp-content/plugins/enhanced-plugin-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-plugin-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-plugin-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-plugin-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-text-widget-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/enhanced-text-widget-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..d404f05aec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-text-widget-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: enhanced-text-widget-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-text-widget/" + google-query: inurl:"/wp-content/plugins/enhanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-text-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-text-widget-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/enhanced-text-widget-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..adf7c64703 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-text-widget-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: enhanced-text-widget-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-text-widget/" + google-query: inurl:"/wp-content/plugins/enhanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-text-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-text-widget-a9a1d45bfcbca6c173ea125c110bda5d.yaml b/nuclei-templates/cve-less/plugins/enhanced-text-widget-a9a1d45bfcbca6c173ea125c110bda5d.yaml new file mode 100644 index 0000000000..c14fe23589 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-text-widget-a9a1d45bfcbca6c173ea125c110bda5d.yaml @@ -0,0 +1,58 @@ +id: enhanced-text-widget-a9a1d45bfcbca6c173ea125c110bda5d + +info: + name: > + Enhanced Text Widget <= 1.6.3 - Missing Authorization via etw_hide_admin_notification_callback + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25122475-fc2c-4a8c-90d3-f4a85fb3a8cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-text-widget/" + google-query: inurl:"/wp-content/plugins/enhanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-text-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-text-widget-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/enhanced-text-widget-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..8a841347d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-text-widget-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: enhanced-text-widget-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-text-widget/" + google-query: inurl:"/wp-content/plugins/enhanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-text-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-text-widget-d68b3bd827fa2538356da72861992193.yaml b/nuclei-templates/cve-less/plugins/enhanced-text-widget-d68b3bd827fa2538356da72861992193.yaml new file mode 100644 index 0000000000..2abb90a329 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-text-widget-d68b3bd827fa2538356da72861992193.yaml @@ -0,0 +1,58 @@ +id: enhanced-text-widget-d68b3bd827fa2538356da72861992193 + +info: + name: > + Enhanced Text Widget <= 1.6.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f42b59e-42a3-4c1d-805d-dfe8c692223e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-text-widget/" + google-query: inurl:"/wp-content/plugins/enhanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-text-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-text-widget-d8eaeaf9f69a4b2de6a788086b60bfc0.yaml b/nuclei-templates/cve-less/plugins/enhanced-text-widget-d8eaeaf9f69a4b2de6a788086b60bfc0.yaml new file mode 100644 index 0000000000..dc97db849a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-text-widget-d8eaeaf9f69a4b2de6a788086b60bfc0.yaml @@ -0,0 +1,58 @@ +id: enhanced-text-widget-d8eaeaf9f69a4b2de6a788086b60bfc0 + +info: + name: > + Enhanced Text Widget <= 1.5.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7487f72c-9852-4651-a848-239d4882bbf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-text-widget/" + google-query: inurl:"/wp-content/plugins/enhanced-text-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-text-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-text-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-text-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-543a621cb0bf8b18bfbda7bc7ee7cfa1.yaml b/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-543a621cb0bf8b18bfbda7bc7ee7cfa1.yaml new file mode 100644 index 0000000000..26d613b902 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-543a621cb0bf8b18bfbda7bc7ee7cfa1.yaml @@ -0,0 +1,58 @@ +id: enhanced-tooltipglossary-543a621cb0bf8b18bfbda7bc7ee7cfa1 + +info: + name: > + CM Tooltip Glossary – Better SEO and UEX for your WP site <= 3.1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5463a730-a8cf-40c9-83fc-3e451e4db1c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-tooltipglossary/" + google-query: inurl:"/wp-content/plugins/enhanced-tooltipglossary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-tooltipglossary,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-tooltipglossary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-5597c388852b3462017f5bc3ca0328fd.yaml b/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-5597c388852b3462017f5bc3ca0328fd.yaml new file mode 100644 index 0000000000..34af958d3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-5597c388852b3462017f5bc3ca0328fd.yaml @@ -0,0 +1,58 @@ +id: enhanced-tooltipglossary-5597c388852b3462017f5bc3ca0328fd + +info: + name: > + CM Tooltip Glossary – Better SEO and UEX for your WP site <= 3.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb1576f8-0586-4ad8-befb-b502d30fab52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-tooltipglossary/" + google-query: inurl:"/wp-content/plugins/enhanced-tooltipglossary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-tooltipglossary,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-tooltipglossary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-6bc3c65cb1ca8d7f84584a1599bace9a.yaml b/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-6bc3c65cb1ca8d7f84584a1599bace9a.yaml new file mode 100644 index 0000000000..5426fc1977 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-6bc3c65cb1ca8d7f84584a1599bace9a.yaml @@ -0,0 +1,58 @@ +id: enhanced-tooltipglossary-6bc3c65cb1ca8d7f84584a1599bace9a + +info: + name: > + CM Tooltip Glossary <= 3.9.20 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f4ac2c0-2c22-431c-b892-b4bf6a7319ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-tooltipglossary/" + google-query: inurl:"/wp-content/plugins/enhanced-tooltipglossary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-tooltipglossary,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-tooltipglossary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-7c07c1ab091dafa6dc739a4dcb0453d1.yaml b/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-7c07c1ab091dafa6dc739a4dcb0453d1.yaml new file mode 100644 index 0000000000..341294923a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-tooltipglossary-7c07c1ab091dafa6dc739a4dcb0453d1.yaml @@ -0,0 +1,58 @@ +id: enhanced-tooltipglossary-7c07c1ab091dafa6dc739a4dcb0453d1 + +info: + name: > + CM Tooltip Glossary – Powerful Glossary Plugin <= 4.2.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3e2ddde-1421-4352-b93a-1492574f624e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-tooltipglossary/" + google-query: inurl:"/wp-content/plugins/enhanced-tooltipglossary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-tooltipglossary,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-tooltipglossary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-wordpress-contactform-71e56d0f97e8b4d7649e09ad58dd5927.yaml b/nuclei-templates/cve-less/plugins/enhanced-wordpress-contactform-71e56d0f97e8b4d7649e09ad58dd5927.yaml new file mode 100644 index 0000000000..8614f29e75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-wordpress-contactform-71e56d0f97e8b4d7649e09ad58dd5927.yaml @@ -0,0 +1,58 @@ +id: enhanced-wordpress-contactform-71e56d0f97e8b4d7649e09ad58dd5927 + +info: + name: > + Enhanced WP Contact Form <= 2.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e91a6bd-05ae-4088-8c1f-bc5598545606?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-wordpress-contactform/" + google-query: inurl:"/wp-content/plugins/enhanced-wordpress-contactform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-wordpress-contactform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-wordpress-contactform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-wordpress-contactform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enhanced-wordpress-contactform-d2114b88fcc067766472c75899b7fa23.yaml b/nuclei-templates/cve-less/plugins/enhanced-wordpress-contactform-d2114b88fcc067766472c75899b7fa23.yaml new file mode 100644 index 0000000000..05dd50dd00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enhanced-wordpress-contactform-d2114b88fcc067766472c75899b7fa23.yaml @@ -0,0 +1,58 @@ +id: enhanced-wordpress-contactform-d2114b88fcc067766472c75899b7fa23 + +info: + name: > + Enhanced WP Contact Form <= 2.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71548a7f-43a5-4f71-8add-45f675e8aa66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enhanced-wordpress-contactform/" + google-query: inurl:"/wp-content/plugins/enhanced-wordpress-contactform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enhanced-wordpress-contactform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-wordpress-contactform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enhanced-wordpress-contactform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enigma-chartjs-1d70e5d002efa976ab87b56edcf9f0b9.yaml b/nuclei-templates/cve-less/plugins/enigma-chartjs-1d70e5d002efa976ab87b56edcf9f0b9.yaml new file mode 100644 index 0000000000..93f8ada980 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enigma-chartjs-1d70e5d002efa976ab87b56edcf9f0b9.yaml @@ -0,0 +1,58 @@ +id: enigma-chartjs-1d70e5d002efa976ab87b56edcf9f0b9 + +info: + name: > + Chartjs <= 2023.2 - Authenticated(Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e1864e7-bd3b-431f-9a9d-378b376298f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enigma-chartjs/" + google-query: inurl:"/wp-content/plugins/enigma-chartjs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enigma-chartjs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enigma-chartjs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enigma-chartjs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2023.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enigma-chartjs-ace575e194919fed8a75c5778dd0bfab.yaml b/nuclei-templates/cve-less/plugins/enigma-chartjs-ace575e194919fed8a75c5778dd0bfab.yaml new file mode 100644 index 0000000000..1f147c1f56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enigma-chartjs-ace575e194919fed8a75c5778dd0bfab.yaml @@ -0,0 +1,58 @@ +id: enigma-chartjs-ace575e194919fed8a75c5778dd0bfab + +info: + name: > + Chartjs <= 2023.2 - Authenticated(Editor+) Stored Cross-Site Scripting via chart + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd5a1ab9-8d59-464a-a227-9f6ee768e35c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enigma-chartjs/" + google-query: inurl:"/wp-content/plugins/enigma-chartjs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enigma-chartjs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enigma-chartjs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enigma-chartjs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2023.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel-47817571e00845c157bd7b162b48263f.yaml b/nuclei-templates/cve-less/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel-47817571e00845c157bd7b162b48263f.yaml new file mode 100644 index 0000000000..c085dea4c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel-47817571e00845c157bd7b162b48263f.yaml @@ -0,0 +1,58 @@ +id: enjoy-instagram-instagram-responsive-images-gallery-and-carousel-47817571e00845c157bd7b162b48263f + +info: + name: > + Enjoy Social Feed plugin for WordPress website <= 6.2.2 - Missing Authorization to Database Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57ef2e79-08b7-4e2a-ae63-957d197e24ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel/" + google-query: inurl:"/wp-content/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enjoy-instagram-instagram-responsive-images-gallery-and-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enjoy-instagram-instagram-responsive-images-gallery-and-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel-8100bca7f40bd5eec7ce73b26e775600.yaml b/nuclei-templates/cve-less/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel-8100bca7f40bd5eec7ce73b26e775600.yaml new file mode 100644 index 0000000000..ecf00eecdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel-8100bca7f40bd5eec7ce73b26e775600.yaml @@ -0,0 +1,58 @@ +id: enjoy-instagram-instagram-responsive-images-gallery-and-carousel-8100bca7f40bd5eec7ce73b26e775600 + +info: + name: > + Enjoy Social Feed <= 6.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c20ff80c-75da-4879-ba1c-e14edf779f58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel/" + google-query: inurl:"/wp-content/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enjoy-instagram-instagram-responsive-images-gallery-and-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enjoy-instagram-instagram-responsive-images-gallery-and-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enjoy-instagram-instagram-responsive-images-gallery-and-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enl-newsletter-450d379738a3ed762b9b5b46fb6f58a1.yaml b/nuclei-templates/cve-less/plugins/enl-newsletter-450d379738a3ed762b9b5b46fb6f58a1.yaml new file mode 100644 index 0000000000..58561e0cc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enl-newsletter-450d379738a3ed762b9b5b46fb6f58a1.yaml @@ -0,0 +1,58 @@ +id: enl-newsletter-450d379738a3ed762b9b5b46fb6f58a1 + +info: + name: > + ENL Newsletter <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfec4c31-ba09-4832-a095-4ca5f5192674?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enl-newsletter/" + google-query: inurl:"/wp-content/plugins/enl-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enl-newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enl-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enl-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enl-newsletter-84f324614693ea073f92a44e128e4cc4.yaml b/nuclei-templates/cve-less/plugins/enl-newsletter-84f324614693ea073f92a44e128e4cc4.yaml new file mode 100644 index 0000000000..143178ed5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enl-newsletter-84f324614693ea073f92a44e128e4cc4.yaml @@ -0,0 +1,58 @@ +id: enl-newsletter-84f324614693ea073f92a44e128e4cc4 + +info: + name: > + ENL Newsletter <= 1.0.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/419270e7-c781-41fe-9893-473074825b36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enl-newsletter/" + google-query: inurl:"/wp-content/plugins/enl-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enl-newsletter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enl-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enl-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enl-newsletter-9e2d3a35dbbc0898dce1216c2073fa6e.yaml b/nuclei-templates/cve-less/plugins/enl-newsletter-9e2d3a35dbbc0898dce1216c2073fa6e.yaml new file mode 100644 index 0000000000..28e89204ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enl-newsletter-9e2d3a35dbbc0898dce1216c2073fa6e.yaml @@ -0,0 +1,58 @@ +id: enl-newsletter-9e2d3a35dbbc0898dce1216c2073fa6e + +info: + name: > + ENL Newsletter <= 1.0.1 - Cross-Site Request Forgery to Campaign Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/891a625e-8248-4d21-a796-bf0cff6fc253?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enl-newsletter/" + google-query: inurl:"/wp-content/plugins/enl-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enl-newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enl-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enl-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enl-newsletter-eca3d823dd426887bd9194913fe758fe.yaml b/nuclei-templates/cve-less/plugins/enl-newsletter-eca3d823dd426887bd9194913fe758fe.yaml new file mode 100644 index 0000000000..f60df3afed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enl-newsletter-eca3d823dd426887bd9194913fe758fe.yaml @@ -0,0 +1,58 @@ +id: enl-newsletter-eca3d823dd426887bd9194913fe758fe + +info: + name: > + ENL Newsletter <= 1.0.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0298f5e6-36b6-4005-b6ef-d38f2f86f0b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enl-newsletter/" + google-query: inurl:"/wp-content/plugins/enl-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enl-newsletter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enl-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enl-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enqueue-anything-a1f55b7e935f65d8ec08ab5f8854d26f.yaml b/nuclei-templates/cve-less/plugins/enqueue-anything-a1f55b7e935f65d8ec08ab5f8854d26f.yaml new file mode 100644 index 0000000000..d649da2447 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enqueue-anything-a1f55b7e935f65d8ec08ab5f8854d26f.yaml @@ -0,0 +1,58 @@ +id: enqueue-anything-a1f55b7e935f65d8ec08ab5f8854d26f + +info: + name: > + Enqueue Anything <= 1.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e353d938-8844-41dc-96dc-7e2facf96446?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enqueue-anything/" + google-query: inurl:"/wp-content/plugins/enqueue-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enqueue-anything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enqueue-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enqueue-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enquiry-quotation-for-woocommerce-e5a8f42155cebe6939f0ccac8621a6a2.yaml b/nuclei-templates/cve-less/plugins/enquiry-quotation-for-woocommerce-e5a8f42155cebe6939f0ccac8621a6a2.yaml new file mode 100644 index 0000000000..fbf096b9e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enquiry-quotation-for-woocommerce-e5a8f42155cebe6939f0ccac8621a6a2.yaml @@ -0,0 +1,58 @@ +id: enquiry-quotation-for-woocommerce-e5a8f42155cebe6939f0ccac8621a6a2 + +info: + name: > + Product Enquiry for WooCommerce <= 2.2.12 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/889986f8-224e-4af4-a1d2-ef4b04a7e83f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enquiry-quotation-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/enquiry-quotation-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enquiry-quotation-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enquiry-quotation-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enquiry-quotation-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enteraddons-0e079d604a8bf155d8a2cb48193c6100.yaml b/nuclei-templates/cve-less/plugins/enteraddons-0e079d604a8bf155d8a2cb48193c6100.yaml new file mode 100644 index 0000000000..b150db2054 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enteraddons-0e079d604a8bf155d8a2cb48193c6100.yaml @@ -0,0 +1,58 @@ +id: enteraddons-0e079d604a8bf155d8a2cb48193c6100 + +info: + name: > + Enter Addons – Ultimate Template Builder for Elementor <= 2.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Animation Title widget img tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29cc82cb-f3fd-4de5-9731-7ceb1212b0f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enteraddons/" + google-query: inurl:"/wp-content/plugins/enteraddons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enteraddons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enteraddons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enteraddons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/enteraddons-82e1dbec0eac00504fe2d5c8d1c53a7b.yaml b/nuclei-templates/cve-less/plugins/enteraddons-82e1dbec0eac00504fe2d5c8d1c53a7b.yaml new file mode 100644 index 0000000000..52c208f13b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/enteraddons-82e1dbec0eac00504fe2d5c8d1c53a7b.yaml @@ -0,0 +1,58 @@ +id: enteraddons-82e1dbec0eac00504fe2d5c8d1c53a7b + +info: + name: > + Enter Addons – Ultimate Template Builder for Elementor <= 2.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Heading widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62a4dd6a-f970-483e-b1a8-d57f604b7b66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/enteraddons/" + google-query: inurl:"/wp-content/plugins/enteraddons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,enteraddons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/enteraddons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enteraddons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envato-elements-e259392e4e0f5c005c71447bf33a289e.yaml b/nuclei-templates/cve-less/plugins/envato-elements-e259392e4e0f5c005c71447bf33a289e.yaml new file mode 100644 index 0000000000..73e81056bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envato-elements-e259392e4e0f5c005c71447bf33a289e.yaml @@ -0,0 +1,58 @@ +id: envato-elements-e259392e4e0f5c005c71447bf33a289e + +info: + name: > + Envato Elements <= 2.0.10 & Template Kit <= 1.0.13 - Authenticated (Contributor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68fe17e2-d5ab-4ebd-a5c6-d65cea327abd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envato-elements/" + google-query: inurl:"/wp-content/plugins/envato-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envato-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envato-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envato-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-514cd5f6862b902abdfe45e0c2ceab5f.yaml b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-514cd5f6862b902abdfe45e0c2ceab5f.yaml new file mode 100644 index 0000000000..e662bd139d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-514cd5f6862b902abdfe45e0c2ceab5f.yaml @@ -0,0 +1,58 @@ +id: envialosimple-email-marketing-y-newsletters-gratis-514cd5f6862b902abdfe45e0c2ceab5f + +info: + name: > + EnvíaloSimple <= 2.1 Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13245eab-9a72-44d7-bbcd-a0d3e2879814?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + google-query: inurl:"/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envialosimple-email-marketing-y-newsletters-gratis,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envialosimple-email-marketing-y-newsletters-gratis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-6b955e7831b4476315ace7bb8d5f3ecb.yaml b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-6b955e7831b4476315ace7bb8d5f3ecb.yaml new file mode 100644 index 0000000000..13f34664b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-6b955e7831b4476315ace7bb8d5f3ecb.yaml @@ -0,0 +1,58 @@ +id: envialosimple-email-marketing-y-newsletters-gratis-6b955e7831b4476315ace7bb8d5f3ecb + +info: + name: > + EnvíaloSimple: Email Marketing y Newsletters <= 2.3 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b39abc8-9281-4d58-a9ec-877c5bae805a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + google-query: inurl:"/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envialosimple-email-marketing-y-newsletters-gratis,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envialosimple-email-marketing-y-newsletters-gratis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-77c5f9441620c4484058d80cea50d864.yaml b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-77c5f9441620c4484058d80cea50d864.yaml new file mode 100644 index 0000000000..30120262c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-77c5f9441620c4484058d80cea50d864.yaml @@ -0,0 +1,58 @@ +id: envialosimple-email-marketing-y-newsletters-gratis-77c5f9441620c4484058d80cea50d864 + +info: + name: > + EnvíaloSimple: Email Marketing y Newsletters <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dee07a1-9f48-4e8f-89dc-99270f55f17c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + google-query: inurl:"/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envialosimple-email-marketing-y-newsletters-gratis,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envialosimple-email-marketing-y-newsletters-gratis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-b6be086ceb5c1e62386aaf5cf54e66b3.yaml b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-b6be086ceb5c1e62386aaf5cf54e66b3.yaml new file mode 100644 index 0000000000..cc93adbec0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-b6be086ceb5c1e62386aaf5cf54e66b3.yaml @@ -0,0 +1,58 @@ +id: envialosimple-email-marketing-y-newsletters-gratis-b6be086ceb5c1e62386aaf5cf54e66b3 + +info: + name: > + EnvíaloSimple <= 2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c533277-5cea-419f-93ec-e510c0fbd75d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + google-query: inurl:"/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envialosimple-email-marketing-y-newsletters-gratis,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envialosimple-email-marketing-y-newsletters-gratis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-e9f65fad0edf93964d95edc6a82cf394.yaml b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-e9f65fad0edf93964d95edc6a82cf394.yaml new file mode 100644 index 0000000000..c6b1acde3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envialosimple-email-marketing-y-newsletters-gratis-e9f65fad0edf93964d95edc6a82cf394.yaml @@ -0,0 +1,58 @@ +id: envialosimple-email-marketing-y-newsletters-gratis-e9f65fad0edf93964d95edc6a82cf394 + +info: + name: > + EnvialoSimple: Email Marketing y Newsletters < 1.98 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1032227b-f2bc-4fc5-bc8d-91a84c631680?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + google-query: inurl:"/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envialosimple-email-marketing-y-newsletters-gratis,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envialosimple-email-marketing-y-newsletters-gratis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.97') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envira-gallery-lite-493dd00fbad457efffd98380feee37ad.yaml b/nuclei-templates/cve-less/plugins/envira-gallery-lite-493dd00fbad457efffd98380feee37ad.yaml new file mode 100644 index 0000000000..f4b46379c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envira-gallery-lite-493dd00fbad457efffd98380feee37ad.yaml @@ -0,0 +1,58 @@ +id: envira-gallery-lite-493dd00fbad457efffd98380feee37ad + +info: + name: > + Envira Photo Gallery <= 1.7.6 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f05b82c3-bb29-494e-a020-427cb1a816a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envira-gallery-lite/" + google-query: inurl:"/wp-content/plugins/envira-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envira-gallery-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envira-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envira-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envira-gallery-lite-91259d563d9ff9cc3660b0bcf5beec5d.yaml b/nuclei-templates/cve-less/plugins/envira-gallery-lite-91259d563d9ff9cc3660b0bcf5beec5d.yaml new file mode 100644 index 0000000000..7701687cf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envira-gallery-lite-91259d563d9ff9cc3660b0bcf5beec5d.yaml @@ -0,0 +1,58 @@ +id: envira-gallery-lite-91259d563d9ff9cc3660b0bcf5beec5d + +info: + name: > + Gallery Plugin for WordPress – Envira Photo Gallery <= 1.8.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ae9392a-591c-4be0-9f90-aa6ec81d3a10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envira-gallery-lite/" + google-query: inurl:"/wp-content/plugins/envira-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envira-gallery-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envira-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envira-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envira-gallery-lite-cc4dabd01e1338fc09aa2ef444904587.yaml b/nuclei-templates/cve-less/plugins/envira-gallery-lite-cc4dabd01e1338fc09aa2ef444904587.yaml new file mode 100644 index 0000000000..1ab36e70fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envira-gallery-lite-cc4dabd01e1338fc09aa2ef444904587.yaml @@ -0,0 +1,58 @@ +id: envira-gallery-lite-cc4dabd01e1338fc09aa2ef444904587 + +info: + name: > + Envira Gallery Lite <= 1.8.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98361cfd-1277-43fd-b0da-db2549628383?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envira-gallery-lite/" + google-query: inurl:"/wp-content/plugins/envira-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envira-gallery-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envira-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envira-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envira-gallery-lite-d0a21350c57dcbddba5f33bc0580065b.yaml b/nuclei-templates/cve-less/plugins/envira-gallery-lite-d0a21350c57dcbddba5f33bc0580065b.yaml new file mode 100644 index 0000000000..beb7f1a429 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envira-gallery-lite-d0a21350c57dcbddba5f33bc0580065b.yaml @@ -0,0 +1,58 @@ +id: envira-gallery-lite-d0a21350c57dcbddba5f33bc0580065b + +info: + name: > + Envira Gallery Lite <= 1.8.7.2 - Missing Authorization to Gallery Modification via envira_gallery_insert_images + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40655278-6915-4a76-ac2d-bb161d3cee92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envira-gallery-lite/" + google-query: inurl:"/wp-content/plugins/envira-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envira-gallery-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envira-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envira-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-99a74c6c9556a6c727c6aed622ee1c96.yaml b/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-99a74c6c9556a6c727c6aed622ee1c96.yaml new file mode 100644 index 0000000000..0df5d0e9de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-99a74c6c9556a6c727c6aed622ee1c96.yaml @@ -0,0 +1,58 @@ +id: envo-elementor-for-woocommerce-99a74c6c9556a6c727c6aed622ee1c96 + +info: + name: > + Envo's Elementor Templates & Widgets for WooCommerce <= 1.4.4 - Cross-Site Request Forgery via ajax_theme_activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6504ae5c-a36d-495e-aa93-40a3753857c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envo-elementor-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/envo-elementor-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envo-elementor-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envo-elementor-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envo-elementor-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-aa0d08f997d780bef53fffda596a65a2.yaml b/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-aa0d08f997d780bef53fffda596a65a2.yaml new file mode 100644 index 0000000000..752ac74fde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-aa0d08f997d780bef53fffda596a65a2.yaml @@ -0,0 +1,58 @@ +id: envo-elementor-for-woocommerce-aa0d08f997d780bef53fffda596a65a2 + +info: + name: > + Envo's Elementor Templates & Widgets for WooCommerce <= 1.4.4 - Missing Authorization via templates_ajax_request + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/996c7433-dd82-4216-86b9-005f43c06c3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envo-elementor-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/envo-elementor-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envo-elementor-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envo-elementor-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envo-elementor-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-da8d9bf1ad46e0cc886ba0015417b54e.yaml b/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-da8d9bf1ad46e0cc886ba0015417b54e.yaml new file mode 100644 index 0000000000..7735098c00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envo-elementor-for-woocommerce-da8d9bf1ad46e0cc886ba0015417b54e.yaml @@ -0,0 +1,58 @@ +id: envo-elementor-for-woocommerce-da8d9bf1ad46e0cc886ba0015417b54e + +info: + name: > + Envo's Elementor Templates & Widgets for WooCommerce <= 1.4.4 - Cross-Site Request Forgery via ajax_plugin_activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cca71257-05dc-43d5-8de6-faf0a2feab2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envo-elementor-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/envo-elementor-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envo-elementor-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envo-elementor-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envo-elementor-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envo-extra-8eea52e06c2c0dbad4e62c3bcac5c0df.yaml b/nuclei-templates/cve-less/plugins/envo-extra-8eea52e06c2c0dbad4e62c3bcac5c0df.yaml new file mode 100644 index 0000000000..5ca17c9194 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envo-extra-8eea52e06c2c0dbad4e62c3bcac5c0df.yaml @@ -0,0 +1,58 @@ +id: envo-extra-8eea52e06c2c0dbad4e62c3bcac5c0df + +info: + name: > + Envo Extra <= 1.8.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f709fca2-b7b6-4567-8055-1156f510d1ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envo-extra/" + google-query: inurl:"/wp-content/plugins/envo-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envo-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envo-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envo-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/envo-extra-c26f84b3b737dca9d0e2ab2c400f43b7.yaml b/nuclei-templates/cve-less/plugins/envo-extra-c26f84b3b737dca9d0e2ab2c400f43b7.yaml new file mode 100644 index 0000000000..500cf56f2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/envo-extra-c26f84b3b737dca9d0e2ab2c400f43b7.yaml @@ -0,0 +1,58 @@ +id: envo-extra-c26f84b3b737dca9d0e2ab2c400f43b7 + +info: + name: > + Envo Extra <= 1.8.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bfda384-2b39-471d-bf2a-4a8f580ddd1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/envo-extra/" + google-query: inurl:"/wp-content/plugins/envo-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,envo-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/envo-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envo-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eonet-manual-user-approve-bce2c57392aa12eefee039fe25226280.yaml b/nuclei-templates/cve-less/plugins/eonet-manual-user-approve-bce2c57392aa12eefee039fe25226280.yaml new file mode 100644 index 0000000000..c0602eced4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eonet-manual-user-approve-bce2c57392aa12eefee039fe25226280.yaml @@ -0,0 +1,58 @@ +id: eonet-manual-user-approve-bce2c57392aa12eefee039fe25226280 + +info: + name: > + Eonet Manual User Approve <= 2.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b696e0b-d4e1-4a81-9204-929100ade073?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eonet-manual-user-approve/" + google-query: inurl:"/wp-content/plugins/eonet-manual-user-approve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eonet-manual-user-approve,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eonet-manual-user-approve/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eonet-manual-user-approve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/epoll-wp-voting-17700405f02a76d34273fd6f63bdac56.yaml b/nuclei-templates/cve-less/plugins/epoll-wp-voting-17700405f02a76d34273fd6f63bdac56.yaml new file mode 100644 index 0000000000..fab769e04d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/epoll-wp-voting-17700405f02a76d34273fd6f63bdac56.yaml @@ -0,0 +1,58 @@ +id: epoll-wp-voting-17700405f02a76d34273fd6f63bdac56 + +info: + name: > + WP Poll Maker <= 3.1 - Authenticated (Subscriber+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59c41620-c6f3-4728-a849-156c5f0ca1a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/epoll-wp-voting/" + google-query: inurl:"/wp-content/plugins/epoll-wp-voting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,epoll-wp-voting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/epoll-wp-voting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "epoll-wp-voting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/epoll-wp-voting-8119e5403d3a32487dee582a940781b5.yaml b/nuclei-templates/cve-less/plugins/epoll-wp-voting-8119e5403d3a32487dee582a940781b5.yaml new file mode 100644 index 0000000000..6cc007d160 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/epoll-wp-voting-8119e5403d3a32487dee582a940781b5.yaml @@ -0,0 +1,58 @@ +id: epoll-wp-voting-8119e5403d3a32487dee582a940781b5 + +info: + name: > + Poll Maker <= 3.4 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c2707ae-8dc0-417c-be4b-83db7dda9c76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/epoll-wp-voting/" + google-query: inurl:"/wp-content/plugins/epoll-wp-voting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,epoll-wp-voting,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/epoll-wp-voting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "epoll-wp-voting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/epoll-wp-voting-e39a71ad2e4c4fe07f9341861c3e2c8f.yaml b/nuclei-templates/cve-less/plugins/epoll-wp-voting-e39a71ad2e4c4fe07f9341861c3e2c8f.yaml new file mode 100644 index 0000000000..66b563c97c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/epoll-wp-voting-e39a71ad2e4c4fe07f9341861c3e2c8f.yaml @@ -0,0 +1,58 @@ +id: epoll-wp-voting-e39a71ad2e4c4fe07f9341861c3e2c8f + +info: + name: > + WP Poll Maker <= 3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9fe2885-d9ef-4506-945a-69bdddf41718?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/epoll-wp-voting/" + google-query: inurl:"/wp-content/plugins/epoll-wp-voting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,epoll-wp-voting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/epoll-wp-voting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "epoll-wp-voting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eprolo-dropshipping-ad0ff157f5be17af68fa4347894dd5e7.yaml b/nuclei-templates/cve-less/plugins/eprolo-dropshipping-ad0ff157f5be17af68fa4347894dd5e7.yaml new file mode 100644 index 0000000000..639322dbee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eprolo-dropshipping-ad0ff157f5be17af68fa4347894dd5e7.yaml @@ -0,0 +1,58 @@ +id: eprolo-dropshipping-ad0ff157f5be17af68fa4347894dd5e7 + +info: + name: > + EPROLO Dropshipping <= 1.7.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77f12178-dc92-41fe-a289-222e83f72a27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eprolo-dropshipping/" + google-query: inurl:"/wp-content/plugins/eprolo-dropshipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eprolo-dropshipping,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eprolo-dropshipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eprolo-dropshipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eps-301-redirects-535590a7d632fa42d8031b5da47799b7.yaml b/nuclei-templates/cve-less/plugins/eps-301-redirects-535590a7d632fa42d8031b5da47799b7.yaml new file mode 100644 index 0000000000..6a47316cfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eps-301-redirects-535590a7d632fa42d8031b5da47799b7.yaml @@ -0,0 +1,58 @@ +id: eps-301-redirects-535590a7d632fa42d8031b5da47799b7 + +info: + name: > + 301 Redirects - Easy Redirect Manager <= 2.72 - Cross-Site Request Forgery via dismiss_notice + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2253cb38-3688-4e4d-afd1-582c8743c89a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eps-301-redirects/" + google-query: inurl:"/wp-content/plugins/eps-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eps-301-redirects,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eps-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eps-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eps-301-redirects-60796296d5bd5b2c076a796a73e81fc7.yaml b/nuclei-templates/cve-less/plugins/eps-301-redirects-60796296d5bd5b2c076a796a73e81fc7.yaml new file mode 100644 index 0000000000..ba2a855094 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eps-301-redirects-60796296d5bd5b2c076a796a73e81fc7.yaml @@ -0,0 +1,58 @@ +id: eps-301-redirects-60796296d5bd5b2c076a796a73e81fc7 + +info: + name: > + 301 Redirects - Easy Redirect Manager < 2.51 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e7b24b5-13e4-4164-8462-fd81b1033f2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eps-301-redirects/" + google-query: inurl:"/wp-content/plugins/eps-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eps-301-redirects,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eps-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eps-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eps-301-redirects-65fec51a84e4dae8b6ac8a6f543cb922.yaml b/nuclei-templates/cve-less/plugins/eps-301-redirects-65fec51a84e4dae8b6ac8a6f543cb922.yaml new file mode 100644 index 0000000000..d24823efd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eps-301-redirects-65fec51a84e4dae8b6ac8a6f543cb922.yaml @@ -0,0 +1,58 @@ +id: eps-301-redirects-65fec51a84e4dae8b6ac8a6f543cb922 + +info: + name: > + 301 Redirects - Easy Redirect Manager <= 2.40 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fe758c4-027f-4667-a22a-9e859894a40f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eps-301-redirects/" + google-query: inurl:"/wp-content/plugins/eps-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eps-301-redirects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eps-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eps-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ere-recently-viewed-c28abeb41bd6624cef6af021a381a425.yaml b/nuclei-templates/cve-less/plugins/ere-recently-viewed-c28abeb41bd6624cef6af021a381a425.yaml new file mode 100644 index 0000000000..ddb5d06dd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ere-recently-viewed-c28abeb41bd6624cef6af021a381a425.yaml @@ -0,0 +1,58 @@ +id: ere-recently-viewed-c28abeb41bd6624cef6af021a381a425 + +info: + name: > + ERE Recently Viewed <= 1.3 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7332fe2e-9bef-42b7-946e-4a2ee812ca26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ere-recently-viewed/" + google-query: inurl:"/wp-content/plugins/ere-recently-viewed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ere-recently-viewed,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ere-recently-viewed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ere-recently-viewed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-1bd28f72c9296305fff71e613d0c8c82.yaml b/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-1bd28f72c9296305fff71e613d0c8c82.yaml new file mode 100644 index 0000000000..50dc1234dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-1bd28f72c9296305fff71e613d0c8c82.yaml @@ -0,0 +1,58 @@ +id: erident-custom-login-and-dashboard-1bd28f72c9296305fff71e613d0c8c82 + +info: + name: > + Erident Custom Login and Dashboard <= 3.4.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7fb6233-3f58-4237-aaaf-4bc60c5cc8ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erident-custom-login-and-dashboard/" + google-query: inurl:"/wp-content/plugins/erident-custom-login-and-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erident-custom-login-and-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erident-custom-login-and-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erident-custom-login-and-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-b76f995a16535082b5686ca7f787e057.yaml b/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-b76f995a16535082b5686ca7f787e057.yaml new file mode 100644 index 0000000000..1229781624 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-b76f995a16535082b5686ca7f787e057.yaml @@ -0,0 +1,58 @@ +id: erident-custom-login-and-dashboard-b76f995a16535082b5686ca7f787e057 + +info: + name: > + Erident Custom Login & Dashboard <= 3.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bed2531-1a7d-49d9-91c9-d9e7357e5613?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erident-custom-login-and-dashboard/" + google-query: inurl:"/wp-content/plugins/erident-custom-login-and-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erident-custom-login-and-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erident-custom-login-and-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erident-custom-login-and-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-bd06eea54f94d4f00b121a93f672de21.yaml b/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-bd06eea54f94d4f00b121a93f672de21.yaml new file mode 100644 index 0000000000..047ae1e6a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erident-custom-login-and-dashboard-bd06eea54f94d4f00b121a93f672de21.yaml @@ -0,0 +1,58 @@ +id: erident-custom-login-and-dashboard-bd06eea54f94d4f00b121a93f672de21 + +info: + name: > + Erident Custom Login and Dashboard <= 3.5.8 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb714378-ed60-4bf1-8c9c-b37515ddb353?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erident-custom-login-and-dashboard/" + google-query: inurl:"/wp-content/plugins/erident-custom-login-and-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erident-custom-login-and-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erident-custom-login-and-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erident-custom-login-and-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erocket-9babf2cf45788c102d8f9d4588bf3e93.yaml b/nuclei-templates/cve-less/plugins/erocket-9babf2cf45788c102d8f9d4588bf3e93.yaml new file mode 100644 index 0000000000..1f01aefb9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erocket-9babf2cf45788c102d8f9d4588bf3e93.yaml @@ -0,0 +1,58 @@ +id: erocket-9babf2cf45788c102d8f9d4588bf3e93 + +info: + name: > + eRocket <= 1.2.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb9b8f3a-6f49-455d-99c6-cdf5671af49d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erocket/" + google-query: inurl:"/wp-content/plugins/erocket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erocket,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erocket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erocket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-2a4cf068be66f271c3b3f52be6e940ba.yaml b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-2a4cf068be66f271c3b3f52be6e940ba.yaml new file mode 100644 index 0000000000..98229d89af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-2a4cf068be66f271c3b3f52be6e940ba.yaml @@ -0,0 +1,58 @@ +id: eroom-zoom-meetings-webinar-2a4cf068be66f271c3b3f52be6e940ba + +info: + name: > + eRoom – Zoom Meetings & Webinar <= 1.3.7 - Unauthorized Setting Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89a23d5a-7728-403e-b654-595d92c20b66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eroom-zoom-meetings-webinar/" + google-query: inurl:"/wp-content/plugins/eroom-zoom-meetings-webinar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eroom-zoom-meetings-webinar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eroom-zoom-meetings-webinar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eroom-zoom-meetings-webinar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-5ea4e509f820ba7667284a234b2ed4c9.yaml b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-5ea4e509f820ba7667284a234b2ed4c9.yaml new file mode 100644 index 0000000000..320c26d476 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-5ea4e509f820ba7667284a234b2ed4c9.yaml @@ -0,0 +1,58 @@ +id: eroom-zoom-meetings-webinar-5ea4e509f820ba7667284a234b2ed4c9 + +info: + name: > + eRoom – Zoom Meetings & Webinar <= 1.4.18 - Missing Authorization to Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60e0fd59-a69c-4ddf-80cd-4312d2689397?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eroom-zoom-meetings-webinar/" + google-query: inurl:"/wp-content/plugins/eroom-zoom-meetings-webinar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eroom-zoom-meetings-webinar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eroom-zoom-meetings-webinar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eroom-zoom-meetings-webinar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-cfb7ab3df6961d91dd158fd90d7552c0.yaml b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-cfb7ab3df6961d91dd158fd90d7552c0.yaml new file mode 100644 index 0000000000..03cae41da8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-cfb7ab3df6961d91dd158fd90d7552c0.yaml @@ -0,0 +1,58 @@ +id: eroom-zoom-meetings-webinar-cfb7ab3df6961d91dd158fd90d7552c0 + +info: + name: > + eRoom – Zoom Meetings & Webinar <= 1.3.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/317b1bac-cd9c-4eac-b42b-d7719ecd135c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eroom-zoom-meetings-webinar/" + google-query: inurl:"/wp-content/plugins/eroom-zoom-meetings-webinar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eroom-zoom-meetings-webinar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eroom-zoom-meetings-webinar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eroom-zoom-meetings-webinar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-d77ed1e2b83213ba479b850a5dfc79e1.yaml b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-d77ed1e2b83213ba479b850a5dfc79e1.yaml new file mode 100644 index 0000000000..a852381cea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-d77ed1e2b83213ba479b850a5dfc79e1.yaml @@ -0,0 +1,58 @@ +id: eroom-zoom-meetings-webinar-d77ed1e2b83213ba479b850a5dfc79e1 + +info: + name: > + eRoom – Zoom Meetings & Webinar <= 1.3.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce695f15-557c-47b1-a5c4-ce68cc84d721?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eroom-zoom-meetings-webinar/" + google-query: inurl:"/wp-content/plugins/eroom-zoom-meetings-webinar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eroom-zoom-meetings-webinar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eroom-zoom-meetings-webinar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eroom-zoom-meetings-webinar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-e081d559a96dc283eb19909827c9469c.yaml b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-e081d559a96dc283eb19909827c9469c.yaml new file mode 100644 index 0000000000..a0531414b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eroom-zoom-meetings-webinar-e081d559a96dc283eb19909827c9469c.yaml @@ -0,0 +1,58 @@ +id: eroom-zoom-meetings-webinar-e081d559a96dc283eb19909827c9469c + +info: + name: > + eRoom – Zoom Meetings & Webinar <= 1.4.6 - Missing Authorization via stm_wpcfto_get_settings_callback + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e0767a8-9e82-4ce4-9df9-19b458dc5ce0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eroom-zoom-meetings-webinar/" + google-query: inurl:"/wp-content/plugins/eroom-zoom-meetings-webinar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eroom-zoom-meetings-webinar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eroom-zoom-meetings-webinar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eroom-zoom-meetings-webinar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-028f2396fc3224cdf799828543a80de4.yaml b/nuclei-templates/cve-less/plugins/erp-028f2396fc3224cdf799828543a80de4.yaml new file mode 100644 index 0000000000..1a2b03ed7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-028f2396fc3224cdf799828543a80de4.yaml @@ -0,0 +1,58 @@ +id: erp-028f2396fc3224cdf799828543a80de4 + +info: + name: > + WP ERP <= 1.12.6 - Missing Authorization via admin notice dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/048277c4-f313-484d-a330-420e0682eee2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-1ecaadeb4176f89b0523e2b0bb90c06a.yaml b/nuclei-templates/cve-less/plugins/erp-1ecaadeb4176f89b0523e2b0bb90c06a.yaml new file mode 100644 index 0000000000..bada1b11ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-1ecaadeb4176f89b0523e2b0bb90c06a.yaml @@ -0,0 +1,58 @@ +id: erp-1ecaadeb4176f89b0523e2b0bb90c06a + +info: + name: > + WP ERP <= 1.12.8 - Authenticated (Accounting manager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7d85921-9d70-4812-9c5f-11ee1d0821be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-28fd0d7c469dc40d11dbc75326d45936.yaml b/nuclei-templates/cve-less/plugins/erp-28fd0d7c469dc40d11dbc75326d45936.yaml new file mode 100644 index 0000000000..6d764a6085 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-28fd0d7c469dc40d11dbc75326d45936.yaml @@ -0,0 +1,58 @@ +id: erp-28fd0d7c469dc40d11dbc75326d45936 + +info: + name: > + WP ERP <= 1.12.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a073c2f1-88d3-4410-b9f5-45b04becbfcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-2c7b7c699deb0493bc338eec94d29af3.yaml b/nuclei-templates/cve-less/plugins/erp-2c7b7c699deb0493bc338eec94d29af3.yaml new file mode 100644 index 0000000000..261782ecb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-2c7b7c699deb0493bc338eec94d29af3.yaml @@ -0,0 +1,58 @@ +id: erp-2c7b7c699deb0493bc338eec94d29af3 + +info: + name: > + WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting <= 1.12.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97964ebd-be0b-4187-b393-17edf4ba5caf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-3b72f620df35cbae939967377ac621cd.yaml b/nuclei-templates/cve-less/plugins/erp-3b72f620df35cbae939967377ac621cd.yaml new file mode 100644 index 0000000000..9cb42f8a34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-3b72f620df35cbae939967377ac621cd.yaml @@ -0,0 +1,58 @@ +id: erp-3b72f620df35cbae939967377ac621cd + +info: + name: > + WP ERP <= 1.12.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5863e9b-3f98-41ea-97ed-26563493cffd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-4ba36f479c72328d41a5d7367a3a95ba.yaml b/nuclei-templates/cve-less/plugins/erp-4ba36f479c72328d41a5d7367a3a95ba.yaml new file mode 100644 index 0000000000..c659ad9024 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-4ba36f479c72328d41a5d7367a3a95ba.yaml @@ -0,0 +1,58 @@ +id: erp-4ba36f479c72328d41a5d7367a3a95ba + +info: + name: > + WP ERP <= 1.12.9 - Authenticated (Accounting Manager+) SQL Injection via id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ba06f9-de51-49ea-87c1-4583e939314b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-4cd083213286b4e4a8589cde5bcde660.yaml b/nuclei-templates/cve-less/plugins/erp-4cd083213286b4e4a8589cde5bcde660.yaml new file mode 100644 index 0000000000..cae224afc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-4cd083213286b4e4a8589cde5bcde660.yaml @@ -0,0 +1,58 @@ +id: erp-4cd083213286b4e4a8589cde5bcde660 + +info: + name: > + WP ERP <= 1.12.9 - Authenticated (AccountingManager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4e04650-624a-4440-b166-8de0f24bb1dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-8acf66d52cca352214a80a527274b5a4.yaml b/nuclei-templates/cve-less/plugins/erp-8acf66d52cca352214a80a527274b5a4.yaml new file mode 100644 index 0000000000..8bd08331e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-8acf66d52cca352214a80a527274b5a4.yaml @@ -0,0 +1,58 @@ +id: erp-8acf66d52cca352214a80a527274b5a4 + +info: + name: > + WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting <= 1.6.3 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01b90498-0ddb-4eb3-b76d-de30ed03d7d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-b10ae50c79331d4dcb069789ed2ad609.yaml b/nuclei-templates/cve-less/plugins/erp-b10ae50c79331d4dcb069789ed2ad609.yaml new file mode 100644 index 0000000000..565224114e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-b10ae50c79331d4dcb069789ed2ad609.yaml @@ -0,0 +1,58 @@ +id: erp-b10ae50c79331d4dcb069789ed2ad609 + +info: + name: > + WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting <= 1.12.9 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79da7239-0343-465e-8dda-44ff440939c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-b7e69e83c8c59004ad0e6d101ab301ac.yaml b/nuclei-templates/cve-less/plugins/erp-b7e69e83c8c59004ad0e6d101ab301ac.yaml new file mode 100644 index 0000000000..1ebf129f60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-b7e69e83c8c59004ad0e6d101ab301ac.yaml @@ -0,0 +1,58 @@ +id: erp-b7e69e83c8c59004ad0e6d101ab301ac + +info: + name: > + WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting <= 1.13.1 - Authenticated (AccountingManager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94772de9-6ab8-45ff-8b56-19b50a81b66f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-d1b821dbb873ab8f28cd2cb8f033062c.yaml b/nuclei-templates/cve-less/plugins/erp-d1b821dbb873ab8f28cd2cb8f033062c.yaml new file mode 100644 index 0000000000..695c90dbac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-d1b821dbb873ab8f28cd2cb8f033062c.yaml @@ -0,0 +1,58 @@ +id: erp-d1b821dbb873ab8f28cd2cb8f033062c + +info: + name: > + WP ERP <= 1.12.3 - Authenticated (Administrator+) SQL Injection via 'type' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e0c77a6-08fd-4d54-8ecd-6e5fe0e03e14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-d1fe516e72277a6efd50d79a0cef3b2d.yaml b/nuclei-templates/cve-less/plugins/erp-d1fe516e72277a6efd50d79a0cef3b2d.yaml new file mode 100644 index 0000000000..4fd19382d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-d1fe516e72277a6efd50d79a0cef3b2d.yaml @@ -0,0 +1,58 @@ +id: erp-d1fe516e72277a6efd50d79a0cef3b2d + +info: + name: > + WP ERP <= 1.12.9 - Authenticated (Accounting Manager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/592440ab-60ac-419f-b615-e5617460aea9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/erp-e196c6551f9d36abf1354b03caa3e5d1.yaml b/nuclei-templates/cve-less/plugins/erp-e196c6551f9d36abf1354b03caa3e5d1.yaml new file mode 100644 index 0000000000..8d427998bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/erp-e196c6551f9d36abf1354b03caa3e5d1.yaml @@ -0,0 +1,58 @@ +id: erp-e196c6551f9d36abf1354b03caa3e5d1 + +info: + name: > + WP ERP <=1.10.5 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35cc980b-9c52-4f0b-aeb2-4afa6efacd8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/erp/" + google-query: inurl:"/wp-content/plugins/erp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,erp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/erp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "erp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/error-log-monitor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/error-log-monitor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a7f67b348d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/error-log-monitor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: error-log-monitor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/error-log-monitor/" + google-query: inurl:"/wp-content/plugins/error-log-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,error-log-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/error-log-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "error-log-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/error-log-monitor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/error-log-monitor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..6bfc31feb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/error-log-monitor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: error-log-monitor-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/error-log-monitor/" + google-query: inurl:"/wp-content/plugins/error-log-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,error-log-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/error-log-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "error-log-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/error-log-viewer-379b9f1826ea14bff8cb3dd2f951214d.yaml b/nuclei-templates/cve-less/plugins/error-log-viewer-379b9f1826ea14bff8cb3dd2f951214d.yaml new file mode 100644 index 0000000000..41ecbfeb28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/error-log-viewer-379b9f1826ea14bff8cb3dd2f951214d.yaml @@ -0,0 +1,58 @@ +id: error-log-viewer-379b9f1826ea14bff8cb3dd2f951214d + +info: + name: > + Error Log Viewer <= 1.1.1 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37bfc71f-e1f9-4374-ab65-9b1c321ff386?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/error-log-viewer/" + google-query: inurl:"/wp-content/plugins/error-log-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,error-log-viewer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/error-log-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "error-log-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/error-log-viewer-4c143b0897524c6ae94ca24b5d894e6a.yaml b/nuclei-templates/cve-less/plugins/error-log-viewer-4c143b0897524c6ae94ca24b5d894e6a.yaml new file mode 100644 index 0000000000..044df1f289 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/error-log-viewer-4c143b0897524c6ae94ca24b5d894e6a.yaml @@ -0,0 +1,58 @@ +id: error-log-viewer-4c143b0897524c6ae94ca24b5d894e6a + +info: + name: > + Error Log Viewer by BestWebSoft <= 1.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9fc747c-3b13-4a49-a181-fe6a952a4ce3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/error-log-viewer/" + google-query: inurl:"/wp-content/plugins/error-log-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,error-log-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/error-log-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "error-log-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/error-log-viewer-85f600cb7a38ce6985c36103e27ab0e2.yaml b/nuclei-templates/cve-less/plugins/error-log-viewer-85f600cb7a38ce6985c36103e27ab0e2.yaml new file mode 100644 index 0000000000..2107a0d4c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/error-log-viewer-85f600cb7a38ce6985c36103e27ab0e2.yaml @@ -0,0 +1,58 @@ +id: error-log-viewer-85f600cb7a38ce6985c36103e27ab0e2 + +info: + name: > + Error Log Viewer by BestWebSoft < 1.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce4fd12c-824c-44b9-a5be-d2f1abf79acc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/error-log-viewer/" + google-query: inurl:"/wp-content/plugins/error-log-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,error-log-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/error-log-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "error-log-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/error-log-viewer-a66a4d5df510beea3bf0ab3d3982bdad.yaml b/nuclei-templates/cve-less/plugins/error-log-viewer-a66a4d5df510beea3bf0ab3d3982bdad.yaml new file mode 100644 index 0000000000..cdd6d5d978 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/error-log-viewer-a66a4d5df510beea3bf0ab3d3982bdad.yaml @@ -0,0 +1,58 @@ +id: error-log-viewer-a66a4d5df510beea3bf0ab3d3982bdad + +info: + name: > + Error Log Viewer <= 1.1.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07c719fd-690e-42e6-90ac-c4d55553a7cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/error-log-viewer/" + google-query: inurl:"/wp-content/plugins/error-log-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,error-log-viewer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/error-log-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "error-log-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eshop-4712ac1bb5ac602fc210b88a33fdaf9f.yaml b/nuclei-templates/cve-less/plugins/eshop-4712ac1bb5ac602fc210b88a33fdaf9f.yaml new file mode 100644 index 0000000000..dbc66a71e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eshop-4712ac1bb5ac602fc210b88a33fdaf9f.yaml @@ -0,0 +1,58 @@ +id: eshop-4712ac1bb5ac602fc210b88a33fdaf9f + +info: + name: > + eshop <= 6.3.13 - Cross-Site Forgery Request and Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33823749-e977-4c91-b8c4-d9774ba46dd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eshop/" + google-query: inurl:"/wp-content/plugins/eshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eshop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eshop-6b1f692527a7829aa26f6946e0d77ddd.yaml b/nuclei-templates/cve-less/plugins/eshop-6b1f692527a7829aa26f6946e0d77ddd.yaml new file mode 100644 index 0000000000..f7ab5fdde1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eshop-6b1f692527a7829aa26f6946e0d77ddd.yaml @@ -0,0 +1,58 @@ +id: eshop-6b1f692527a7829aa26f6946e0d77ddd + +info: + name: > + eShop <= 6.3.14 - Multiple SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa8f75dc-7ecd-498d-b41a-e788b4d4bcdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eshop/" + google-query: inurl:"/wp-content/plugins/eshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eshop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eshop-7e99952543b7586dc6b3250a2122b0f9.yaml b/nuclei-templates/cve-less/plugins/eshop-7e99952543b7586dc6b3250a2122b0f9.yaml new file mode 100644 index 0000000000..0acc5d7212 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eshop-7e99952543b7586dc6b3250a2122b0f9.yaml @@ -0,0 +1,58 @@ +id: eshop-7e99952543b7586dc6b3250a2122b0f9 + +info: + name: > + eShop <= 6.3.14 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef4a7a20-663e-4e6a-af23-e8a87b18521e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eshop/" + google-query: inurl:"/wp-content/plugins/eshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eshop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eshop-b63e841ec4f7ba03a92d7fcbed9249bc.yaml b/nuclei-templates/cve-less/plugins/eshop-b63e841ec4f7ba03a92d7fcbed9249bc.yaml new file mode 100644 index 0000000000..373b205a94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eshop-b63e841ec4f7ba03a92d7fcbed9249bc.yaml @@ -0,0 +1,58 @@ +id: eshop-b63e841ec4f7ba03a92d7fcbed9249bc + +info: + name: > + eShop <= 6.3.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/093dc35d-3d7d-4fa4-af57-835b96df8984?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eshop/" + google-query: inurl:"/wp-content/plugins/eshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eshop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eshop-e18e1098e91136cecbeb6e29db3c0caa.yaml b/nuclei-templates/cve-less/plugins/eshop-e18e1098e91136cecbeb6e29db3c0caa.yaml new file mode 100644 index 0000000000..88a696652c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eshop-e18e1098e91136cecbeb6e29db3c0caa.yaml @@ -0,0 +1,58 @@ +id: eshop-e18e1098e91136cecbeb6e29db3c0caa + +info: + name: > + eShop < 6.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4838c2ad-87e0-4140-81bb-7d39d7a704dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eshop/" + google-query: inurl:"/wp-content/plugins/eshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eshop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eshop-magic-2a97bfdfd8781ee071e1eb3b8b605769.yaml b/nuclei-templates/cve-less/plugins/eshop-magic-2a97bfdfd8781ee071e1eb3b8b605769.yaml new file mode 100644 index 0000000000..7cb6412e94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eshop-magic-2a97bfdfd8781ee071e1eb3b8b605769.yaml @@ -0,0 +1,58 @@ +id: eshop-magic-2a97bfdfd8781ee071e1eb3b8b605769 + +info: + name: > + Eshop Magic < 0.2 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2363a40-b627-44da-af8e-98821685c3ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eshop-magic/" + google-query: inurl:"/wp-content/plugins/eshop-magic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eshop-magic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eshop-magic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eshop-magic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-elementor-298ee3ac56fa2818652ccdcf0f94081c.yaml b/nuclei-templates/cve-less/plugins/essential-addons-elementor-298ee3ac56fa2818652ccdcf0f94081c.yaml new file mode 100644 index 0000000000..1fce64e545 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-elementor-298ee3ac56fa2818652ccdcf0f94081c.yaml @@ -0,0 +1,58 @@ +id: essential-addons-elementor-298ee3ac56fa2818652ccdcf0f94081c + +info: + name: > + Essential Addons for Elementor Pro <= 5.8.11 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'title_html_tag' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fdad62e-d43a-4eb8-a637-0a257f3f18d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-elementor/" + google-query: inurl:"/wp-content/plugins/essential-addons-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-elementor-4efdbc3738e2b809632b64ac3cda51fe.yaml b/nuclei-templates/cve-less/plugins/essential-addons-elementor-4efdbc3738e2b809632b64ac3cda51fe.yaml new file mode 100644 index 0000000000..01994dc10b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-elementor-4efdbc3738e2b809632b64ac3cda51fe.yaml @@ -0,0 +1,58 @@ +id: essential-addons-elementor-4efdbc3738e2b809632b64ac3cda51fe + +info: + name: > + Essential Addons for Elementor Pro <= 5.4.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8f86293-a32f-49a6-8c8c-d37354ab040a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-elementor/" + google-query: inurl:"/wp-content/plugins/essential-addons-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-elementor-f34ebd6d445ec4bbd536ce24fec37483.yaml b/nuclei-templates/cve-less/plugins/essential-addons-elementor-f34ebd6d445ec4bbd536ce24fec37483.yaml new file mode 100644 index 0000000000..d6ee013e50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-elementor-f34ebd6d445ec4bbd536ce24fec37483.yaml @@ -0,0 +1,58 @@ +id: essential-addons-elementor-f34ebd6d445ec4bbd536ce24fec37483 + +info: + name: > + Essential Addons for Elementor Pro <= 5.4.8 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1a193b7-21e5-4f57-aaa6-e55c79f8e957?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-elementor/" + google-query: inurl:"/wp-content/plugins/essential-addons-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1015b09d99817c2106e43f3451c30ac1.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1015b09d99817c2106e43f3451c30ac1.yaml new file mode 100644 index 0000000000..7048c92868 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1015b09d99817c2106e43f3451c30ac1.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-1015b09d99817c2106e43f3451c30ac1 + +info: + name: > + Essential Addons for Elementor <= 4.6.4 - Authenticated (Contributor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be098ee9-b749-4908-85e8-e717d019609a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1a4b02751bb2128579758045cc80caa1.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1a4b02751bb2128579758045cc80caa1.yaml new file mode 100644 index 0000000000..3d7592f908 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1a4b02751bb2128579758045cc80caa1.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-1a4b02751bb2128579758045cc80caa1 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Accordion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2ff2cc6-b584-442b-890b-033a0a047c24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1a9b2b84b94bf133577af40ec3afb2be.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1a9b2b84b94bf133577af40ec3afb2be.yaml new file mode 100644 index 0000000000..41d478c485 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-1a9b2b84b94bf133577af40ec3afb2be.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-1a9b2b84b94bf133577af40ec3afb2be + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image URl + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/417baa1c-29f0-4fec-8008-5b52359b3328?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-200d6c881afb4e097be1558e49c07780.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-200d6c881afb4e097be1558e49c07780.yaml new file mode 100644 index 0000000000..8bb78c6368 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-200d6c881afb4e097be1558e49c07780.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-200d6c881afb4e097be1558e49c07780 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Filterable Gallery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fafdd087-9637-41df-bc5a-97e1a02ea744?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-24bb86aa2326eca80531d492521a5d29.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-24bb86aa2326eca80531d492521a5d29.yaml new file mode 100644 index 0000000000..ea85873c17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-24bb86aa2326eca80531d492521a5d29.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-24bb86aa2326eca80531d492521a5d29 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.19 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'Interactive Circles' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91f50b65-f001-4c73-bfe3-1aed3fc10d26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-3336686541cab0beb9c572eb91b49251.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-3336686541cab0beb9c572eb91b49251.yaml new file mode 100644 index 0000000000..dcd7a2f31f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-3336686541cab0beb9c572eb91b49251.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-3336686541cab0beb9c572eb91b49251 + +info: + name: > + Essential Addons for Elementor <= 5.0.4 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/014f1aae-10a0-4bc8-b176-dbdad94a6ad8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.0', '<= 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-622d5312417c1581aa63ff2faa690a9c.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-622d5312417c1581aa63ff2faa690a9c.yaml new file mode 100644 index 0000000000..f36c278b78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-622d5312417c1581aa63ff2faa690a9c.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-622d5312417c1581aa63ff2faa690a9c + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.17 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23a66e6b-cec0-4110-9bef-a5d41ce1c954?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-641fbcb7693eaa3a03da6b383765a523.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-641fbcb7693eaa3a03da6b383765a523.yaml new file mode 100644 index 0000000000..42ab4325d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-641fbcb7693eaa3a03da6b383765a523.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-641fbcb7693eaa3a03da6b383765a523 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.13 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f96d7f-aeca-4959-9573-0fb6402de007?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-73185f41beb88e54f54a80787c1d789a.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-73185f41beb88e54f54a80787c1d789a.yaml new file mode 100644 index 0000000000..f4dc8dc75e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-73185f41beb88e54f54a80787c1d789a.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-73185f41beb88e54f54a80787c1d789a + +info: + name: > + Essential Addons for Elementor Lite <= 4.5.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de614bbd-42ae-4c2a-aec6-31245124de76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-84d7b8eee39d9201723ad33de86e3865.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-84d7b8eee39d9201723ad33de86e3865.yaml new file mode 100644 index 0000000000..abf5aebebc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-84d7b8eee39d9201723ad33de86e3865.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-84d7b8eee39d9201723ad33de86e3865 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43014ecd-72d9-44cc-be24-c0c9790ddc20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-8bd60d8d3ae1eb23eefce0f380d89e1c.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-8bd60d8d3ae1eb23eefce0f380d89e1c.yaml new file mode 100644 index 0000000000..5b5d4b6272 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-8bd60d8d3ae1eb23eefce0f380d89e1c.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-8bd60d8d3ae1eb23eefce0f380d89e1c + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Data Table + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81a48c61-4191-4252-9230-9df8fc5e3443?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-8e520f19b2730c335f2344f32b135ff7.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-8e520f19b2730c335f2344f32b135ff7.yaml new file mode 100644 index 0000000000..b1a29df9fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-8e520f19b2730c335f2344f32b135ff7.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-8e520f19b2730c335f2344f32b135ff7 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af8bee01-15bc-485e-8b01-8b68b199b34d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-9319000e1757d81a7b4d434242e3b0b6.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-9319000e1757d81a7b4d434242e3b0b6.yaml new file mode 100644 index 0000000000..ef5a42b53f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-9319000e1757d81a7b4d434242e3b0b6.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-9319000e1757d81a7b4d434242e3b0b6 + +info: + name: > + Essential Addons for Elementor <= 4.6.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/283fb581-8b61-4008-a5c4-2e1490fab33e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b435c087d203d9fb2850a517c55bcc97.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b435c087d203d9fb2850a517c55bcc97.yaml new file mode 100644 index 0000000000..cd1851d5ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b435c087d203d9fb2850a517c55bcc97.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-b435c087d203d9fb2850a517c55bcc97 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.15 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d604f7a-947c-43f4-bba6-e7e98b2d7844?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b4aa2ee32c8d094c0d7d3b9c1a221104.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b4aa2ee32c8d094c0d7d3b9c1a221104.yaml new file mode 100644 index 0000000000..871019149a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b4aa2ee32c8d094c0d7d3b9c1a221104.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-b4aa2ee32c8d094c0d7d3b9c1a221104 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baa92aee-a0a0-45d4-aa12-1449a829930c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b90105c25730b4d746a6acc92069913e.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b90105c25730b4d746a6acc92069913e.yaml new file mode 100644 index 0000000000..4ea84a2a44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-b90105c25730b4d746a6acc92069913e.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-b90105c25730b4d746a6acc92069913e + +info: + name: > + Essential Addons for Elementor <= 5.9.13 - Authenticated (Author+) PHP Object Injection via error_resetpassword + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/342049e5-834e-4867-8174-01ca7bb0caa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-baba429a98395d144623d60921070685.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-baba429a98395d144623d60921070685.yaml new file mode 100644 index 0000000000..0038dd14b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-baba429a98395d144623d60921070685.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-baba429a98395d144623d60921070685 + +info: + name: > + Essential Addons for Elementor <= 5.7.1 - Unauthenticated Arbitrary Password Reset to Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e988d042-147c-4782-b728-71f5a50cecd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c784400f0eb0916fb123587bb1f7a008.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c784400f0eb0916fb123587bb1f7a008.yaml new file mode 100644 index 0000000000..1d71799a47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c784400f0eb0916fb123587bb1f7a008.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-c784400f0eb0916fb123587bb1f7a008 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/875db71d-c799-40b9-95e1-74d53046b0a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c7afeb04136868c455da71b1177f088f.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c7afeb04136868c455da71b1177f088f.yaml new file mode 100644 index 0000000000..1d1680df88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c7afeb04136868c455da71b1177f088f.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-c7afeb04136868c455da71b1177f088f + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e770e98-3c13-4e37-b51b-4c39bce2cb42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c900b7eac90dcb368c77b66b5bee17b3.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c900b7eac90dcb368c77b66b5bee17b3.yaml new file mode 100644 index 0000000000..a77d7bae8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c900b7eac90dcb368c77b66b5bee17b3.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-c900b7eac90dcb368c77b66b5bee17b3 + +info: + name: > + Essential Addons for Elementor <= 5.9.14 - Authenticated (Contributor+) Store Cross-Site Scripting via Widget URL Attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa5bdaf9-fbde-40d4-a72a-fd24489818b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c945e86e64bc195e431c6da83e2cc2c3.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c945e86e64bc195e431c6da83e2cc2c3.yaml new file mode 100644 index 0000000000..ba3f83ff88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-c945e86e64bc195e431c6da83e2cc2c3.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-c945e86e64bc195e431c6da83e2cc2c3 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.4 - Authenticated (Contributor+) Stored Cross-Site Scritping + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c00ff4bd-d846-4e3f-95ed-2a6430c47ebf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-cbede89175ad7b3a47d5ac8fb29d35bb.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-cbede89175ad7b3a47d5ac8fb29d35bb.yaml new file mode 100644 index 0000000000..87048126f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-cbede89175ad7b3a47d5ac8fb29d35bb.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-cbede89175ad7b3a47d5ac8fb29d35bb + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Event Calendar + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12dc9e63-17bb-4755-be3c-ae8b26edd3cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d36603d2844e0ef2710cb2cbe62e45a6.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d36603d2844e0ef2710cb2cbe62e45a6.yaml new file mode 100644 index 0000000000..b2d2455545 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d36603d2844e0ef2710cb2cbe62e45a6.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-d36603d2844e0ef2710cb2cbe62e45a6 + +info: + name: > + Essential Addons for Elementor Lite <= 5.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8869a4fc-279f-4828-a271-8680d037fa85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d4efcf3c752e65b8bb0f68965ff8309b.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d4efcf3c752e65b8bb0f68965ff8309b.yaml new file mode 100644 index 0000000000..bb8d2df539 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d4efcf3c752e65b8bb0f68965ff8309b.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-d4efcf3c752e65b8bb0f68965ff8309b + +info: + name: > + Essential Addons For Elementor <=5.8.1 - Unauthenticated MailChimp API Key Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e007c713-74bc-4ff5-a198-70dcc8a8ee68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d621d242ab564fd8e6e924445af60a72.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d621d242ab564fd8e6e924445af60a72.yaml new file mode 100644 index 0000000000..c6b7115feb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-d621d242ab564fd8e6e924445af60a72.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-d621d242ab564fd8e6e924445af60a72 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7242d808-9c33-4b3f-bda6-b4b72ca37de9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-da6c348f533c2442c083b7568ed9771b.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-da6c348f533c2442c083b7568ed9771b.yaml new file mode 100644 index 0000000000..6bc15d5c39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-da6c348f533c2442c083b7568ed9771b.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-da6c348f533c2442c083b7568ed9771b + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.15 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cf3190c-e247-4bcc-99e0-2ab2d2fa0590?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-e5a55bdcc25518bd7b994104c01d9391.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-e5a55bdcc25518bd7b994104c01d9391.yaml new file mode 100644 index 0000000000..316fbd9cc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-e5a55bdcc25518bd7b994104c01d9391.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-e5a55bdcc25518bd7b994104c01d9391 + +info: + name: > + Essential Addons for Elementor <= 5.8.8 - Authenticated (Contributor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c13701e-424d-462f-b152-4dc5ad3ef197?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-e9df6b62593e703fd734b693ccc67b68.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-e9df6b62593e703fd734b693ccc67b68.yaml new file mode 100644 index 0000000000..27a6d66ca2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-e9df6b62593e703fd734b693ccc67b68.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-e9df6b62593e703fd734b693ccc67b68 + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.19 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'Dual Color Header', 'Event Calendar', & 'Advanced Data Table' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21e12c72-7898-4896-9852-ebb10e5f9a3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-eeb15b3523994497219c24e4ab9f075e.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-eeb15b3523994497219c24e4ab9f075e.yaml new file mode 100644 index 0000000000..17f020bc6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-eeb15b3523994497219c24e4ab9f075e.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-eeb15b3523994497219c24e4ab9f075e + +info: + name: > + Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.15 - Authenticated (Contributor+) Stored Cross-Site Scripting via Filterable Gallery & Interactive Circle + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-fd0c27ea93cffb5177b96e76bbc2aa5f.yaml b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-fd0c27ea93cffb5177b96e76bbc2aa5f.yaml new file mode 100644 index 0000000000..37cbc7f663 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-addons-for-elementor-lite-fd0c27ea93cffb5177b96e76bbc2aa5f.yaml @@ -0,0 +1,58 @@ +id: essential-addons-for-elementor-lite-fd0c27ea93cffb5177b96e76bbc2aa5f + +info: + name: > + Essential Addons for Elementor <= 5.9.19 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via Several Widgets + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57ed6c7e-ca8d-476d-adce-905b2cd2eda8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" + google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-addons-for-elementor-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-addons-for-elementor-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-1092f82974f0d44c05422ba456183db5.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-1092f82974f0d44c05422ba456183db5.yaml new file mode 100644 index 0000000000..bc2f045931 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-1092f82974f0d44c05422ba456183db5.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-1092f82974f0d44c05422ba456183db5 + +info: + name: > + Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates <= 4.4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f969cb24-734f-46e5-a74d-fddf8e61e096?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-6092ac059aadb6e2fb447935fafb717a.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-6092ac059aadb6e2fb447935fafb717a.yaml new file mode 100644 index 0000000000..b7c321559f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-6092ac059aadb6e2fb447935fafb717a.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-6092ac059aadb6e2fb447935fafb717a + +info: + name: > + Essential Blocks for Gutenberg <= 4.2.0 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2136e1c-5f69-434d-bdc7-72a144da744b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-61d212d2e307b78bf3e793271bc28e50.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-61d212d2e307b78bf3e793271bc28e50.yaml new file mode 100644 index 0000000000..9e45c8a439 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-61d212d2e307b78bf3e793271bc28e50.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-61d212d2e307b78bf3e793271bc28e50 + +info: + name: > + Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates <= 4.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86364b6f-dec8-48d8-9d2d-de1ee4901872?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-65769acec1aefbf22b461433a4ab976c.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-65769acec1aefbf22b461433a4ab976c.yaml new file mode 100644 index 0000000000..adaca1a9fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-65769acec1aefbf22b461433a4ab976c.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-65769acec1aefbf22b461433a4ab976c + +info: + name: > + Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates <= 4.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfcd59ae-085f-47d2-a4d2-2d1239f035d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-670002c777730edbb2cb892efe1340bc.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-670002c777730edbb2cb892efe1340bc.yaml new file mode 100644 index 0000000000..becb9844b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-670002c777730edbb2cb892efe1340bc.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-670002c777730edbb2cb892efe1340bc + +info: + name: > + Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates <= 4.5.9 - Authenticated (Contributor+) DOM-Based Cross-Site Scripting via "Social Icons" Block + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b226067-0287-4f7e-9415-dc3c83f2fd27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-6bd5ec9d4799550acfbe6978f43129c9.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-6bd5ec9d4799550acfbe6978f43129c9.yaml new file mode 100644 index 0000000000..689052dce0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-6bd5ec9d4799550acfbe6978f43129c9.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-6bd5ec9d4799550acfbe6978f43129c9 + +info: + name: > + Essential Blocks for Gutenberg <= 4.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8aa0eada-dc6c-4cd5-9ced-f162416ec439?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-7daa2f9a38772e28d5c088d50297e34a.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-7daa2f9a38772e28d5c088d50297e34a.yaml new file mode 100644 index 0000000000..02eb8b6f7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-7daa2f9a38772e28d5c088d50297e34a.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-7daa2f9a38772e28d5c088d50297e34a + +info: + name: > + Essential Blocks <= 4.0.6 - Missing Authorization via get + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0be8c668-0f1c-4f83-8a71-49c8bb9b67ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-809bef969b735d714b42168e6770e1c0.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-809bef969b735d714b42168e6770e1c0.yaml new file mode 100644 index 0000000000..bd3b588f3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-809bef969b735d714b42168e6770e1c0.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-809bef969b735d714b42168e6770e1c0 + +info: + name: > + Essential Blocks <= 4.0.6 - Cross-Site Request Forgery via save + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d38d41c7-8786-4145-9591-3e24eff3b79c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-86a5e7d3d7ed00baf83310ad8f227a5e.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-86a5e7d3d7ed00baf83310ad8f227a5e.yaml new file mode 100644 index 0000000000..6664a7403d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-86a5e7d3d7ed00baf83310ad8f227a5e.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-86a5e7d3d7ed00baf83310ad8f227a5e + +info: + name: > + Essential Blocks for Gutenberg <= 4.4.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/569b5522-8f38-454b-a8b5-12e3959c3348?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-8e520ae3c19cbf656f990691a6cb724f.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-8e520ae3c19cbf656f990691a6cb724f.yaml new file mode 100644 index 0000000000..f9cc269694 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-8e520ae3c19cbf656f990691a6cb724f.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-8e520ae3c19cbf656f990691a6cb724f + +info: + name: > + Essential Blocks for Gutenberg <= 3.8.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ddfd5d9-a7e4-42a8-8419-9a35b4781d3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-9de5506c980e28c9e55c18a88ab23a5f.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-9de5506c980e28c9e55c18a88ab23a5f.yaml new file mode 100644 index 0000000000..82507d5f9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-9de5506c980e28c9e55c18a88ab23a5f.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-9de5506c980e28c9e55c18a88ab23a5f + +info: + name: > + Essential Blocks <= 4.0.6 - Missing Authorization via save + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8bf0933-1c97-4374-b323-c55b91fe4d27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-b8c50e487b4b0337b88f73b897d2ea2b.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-b8c50e487b4b0337b88f73b897d2ea2b.yaml new file mode 100644 index 0000000000..1ac1450a26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-b8c50e487b4b0337b88f73b897d2ea2b.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-b8c50e487b4b0337b88f73b897d2ea2b + +info: + name: > + Essential Blocks <= 4.0.6 - Missing Authorization via template_count + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9efc782a-ec61-4741-81fd-a263a2739e16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-cc9e9a844434f90c7c28fe24a22a2f2b.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-cc9e9a844434f90c7c28fe24a22a2f2b.yaml new file mode 100644 index 0000000000..da983a32e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-cc9e9a844434f90c7c28fe24a22a2f2b.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-cc9e9a844434f90c7c28fe24a22a2f2b + +info: + name: > + Essential Blocks for Gutenberg <= 4.2.0 - Incorrect Authorization Checks + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eca703ec-645c-4d12-ae57-75db14e08f3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-d11264f27a09e4fdbe795eb60f43ac5c.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-d11264f27a09e4fdbe795eb60f43ac5c.yaml new file mode 100644 index 0000000000..04405758e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-d11264f27a09e4fdbe795eb60f43ac5c.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-d11264f27a09e4fdbe795eb60f43ac5c + +info: + name: > + Essential Blocks <= 4.4.2 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c52435f3-cc1c-4d3a-a664-a07e60fad6ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-daec7d39bacac9f0d791f41eb89b64b4.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-daec7d39bacac9f0d791f41eb89b64b4.yaml new file mode 100644 index 0000000000..2f3272ba68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-daec7d39bacac9f0d791f41eb89b64b4.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-daec7d39bacac9f0d791f41eb89b64b4 + +info: + name: > + Essential Blocks <= 4.2.0 - Unauthenticated PHP Object Injection via queries + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af468f83-d6ad-474c-bf7f-c4eeb6df1b54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-de6bb81e5776b8853821078d5af9e37e.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-de6bb81e5776b8853821078d5af9e37e.yaml new file mode 100644 index 0000000000..6e89c53c4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-de6bb81e5776b8853821078d5af9e37e.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-de6bb81e5776b8853821078d5af9e37e + +info: + name: > + Essential Blocks <= 4.2.0 - Unauthenticated PHP Object Injection via products + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ede7a25-9bb2-408e-b7fb-e5bd4f594351?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-ec83c952597cd4d48032e81f82ee4086.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-ec83c952597cd4d48032e81f82ee4086.yaml new file mode 100644 index 0000000000..61af464bd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-ec83c952597cd4d48032e81f82ee4086.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-ec83c952597cd4d48032e81f82ee4086 + +info: + name: > + Essential Blocks <= 4.0.6 - Missing Authorization via templates + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad2c1ab6-5c78-4317-b5e7-c86e2eebeb4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks/" + google-query: inurl:"/wp-content/plugins/essential-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-pro-daec7d39bacac9f0d791f41eb89b64b4.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-pro-daec7d39bacac9f0d791f41eb89b64b4.yaml new file mode 100644 index 0000000000..8412b9dc00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-pro-daec7d39bacac9f0d791f41eb89b64b4.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-pro-daec7d39bacac9f0d791f41eb89b64b4 + +info: + name: > + Essential Blocks <= 4.2.0 - Unauthenticated PHP Object Injection via queries + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af468f83-d6ad-474c-bf7f-c4eeb6df1b54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks-pro/" + google-query: inurl:"/wp-content/plugins/essential-blocks-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-blocks-pro-de6bb81e5776b8853821078d5af9e37e.yaml b/nuclei-templates/cve-less/plugins/essential-blocks-pro-de6bb81e5776b8853821078d5af9e37e.yaml new file mode 100644 index 0000000000..ca38544676 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-blocks-pro-de6bb81e5776b8853821078d5af9e37e.yaml @@ -0,0 +1,58 @@ +id: essential-blocks-pro-de6bb81e5776b8853821078d5af9e37e + +info: + name: > + Essential Blocks <= 4.2.0 - Unauthenticated PHP Object Injection via products + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ede7a25-9bb2-408e-b7fb-e5bd4f594351?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-blocks-pro/" + google-query: inurl:"/wp-content/plugins/essential-blocks-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-blocks-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-blocks-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-blocks-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-content-types-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/essential-content-types-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..6cd5444943 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-content-types-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: essential-content-types-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-content-types/" + google-query: inurl:"/wp-content/plugins/essential-content-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-content-types,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-content-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-content-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-grid-252d8b0817c1504c9d368093cbed6570.yaml b/nuclei-templates/cve-less/plugins/essential-grid-252d8b0817c1504c9d368093cbed6570.yaml new file mode 100644 index 0000000000..a5597c82b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-grid-252d8b0817c1504c9d368093cbed6570.yaml @@ -0,0 +1,58 @@ +id: essential-grid-252d8b0817c1504c9d368093cbed6570 + +info: + name: > + Essential Grid <= 3.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02eadae8-7aa6-42f5-b807-9ed82332fa72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-grid/" + google-query: inurl:"/wp-content/plugins/essential-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-grid-615a59dfb372c45c35b57f6455c9a01a.yaml b/nuclei-templates/cve-less/plugins/essential-grid-615a59dfb372c45c35b57f6455c9a01a.yaml new file mode 100644 index 0000000000..6be98022c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-grid-615a59dfb372c45c35b57f6455c9a01a.yaml @@ -0,0 +1,58 @@ +id: essential-grid-615a59dfb372c45c35b57f6455c9a01a + +info: + name: > + Essential Grid <= 3.1.1 - Unauthenticated Private Post Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adadac1e-3d92-41a5-90d4-b2028c8c40c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-grid/" + google-query: inurl:"/wp-content/plugins/essential-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-grid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-grid-ffdce410a6a7ddacc9790163fef8faa4.yaml b/nuclei-templates/cve-less/plugins/essential-grid-ffdce410a6a7ddacc9790163fef8faa4.yaml new file mode 100644 index 0000000000..5a21e4974e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-grid-ffdce410a6a7ddacc9790163fef8faa4.yaml @@ -0,0 +1,58 @@ +id: essential-grid-ffdce410a6a7ddacc9790163fef8faa4 + +info: + name: > + Essential Grid <= 3.0.18 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/326618eb-186b-44a2-a779-00d5366bfff2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-grid/" + google-query: inurl:"/wp-content/plugins/essential-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-grid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-real-estate-00a2a2e9797fc1a0dfdb2c0093e34725.yaml b/nuclei-templates/cve-less/plugins/essential-real-estate-00a2a2e9797fc1a0dfdb2c0093e34725.yaml new file mode 100644 index 0000000000..c8e459f0f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-real-estate-00a2a2e9797fc1a0dfdb2c0093e34725.yaml @@ -0,0 +1,58 @@ +id: essential-real-estate-00a2a2e9797fc1a0dfdb2c0093e34725 + +info: + name: > + Essential Real Estate <= 4.3.5 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fd93a48-72ab-4475-a25d-d68c98939533?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-real-estate/" + google-query: inurl:"/wp-content/plugins/essential-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-real-estate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-real-estate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-real-estate-495047757cee7d3f3cdfc2d78c597016.yaml b/nuclei-templates/cve-less/plugins/essential-real-estate-495047757cee7d3f3cdfc2d78c597016.yaml new file mode 100644 index 0000000000..01f2989a77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-real-estate-495047757cee7d3f3cdfc2d78c597016.yaml @@ -0,0 +1,58 @@ +id: essential-real-estate-495047757cee7d3f3cdfc2d78c597016 + +info: + name: > + Essential Real Estate <= 3.9.5 - Reflected Cross-Site-Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e959ac0-e5ac-4d28-8161-311d952b993c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-real-estate/" + google-query: inurl:"/wp-content/plugins/essential-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-real-estate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-real-estate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-real-estate-530a5f39017e1b56e85add8e46eb1fc3.yaml b/nuclei-templates/cve-less/plugins/essential-real-estate-530a5f39017e1b56e85add8e46eb1fc3.yaml new file mode 100644 index 0000000000..3d93b1cb29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-real-estate-530a5f39017e1b56e85add8e46eb1fc3.yaml @@ -0,0 +1,58 @@ +id: essential-real-estate-530a5f39017e1b56e85add8e46eb1fc3 + +info: + name: > + Essential Real Estate <= 1.7.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c5a4705-1bad-4ea9-9102-dc2780a61ac7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-real-estate/" + google-query: inurl:"/wp-content/plugins/essential-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-real-estate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-real-estate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-real-estate-54b8dea2a513397d549565f2d6307194.yaml b/nuclei-templates/cve-less/plugins/essential-real-estate-54b8dea2a513397d549565f2d6307194.yaml new file mode 100644 index 0000000000..98f80b40d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-real-estate-54b8dea2a513397d549565f2d6307194.yaml @@ -0,0 +1,58 @@ +id: essential-real-estate-54b8dea2a513397d549565f2d6307194 + +info: + name: > + Essential Real Estate <= 4.3.5 - Missing Authorization to Denial of Service + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74fa5a77-3c66-4aa5-aa58-3e608e3cba70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-real-estate/" + google-query: inurl:"/wp-content/plugins/essential-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-real-estate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-real-estate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-real-estate-79c84a24ae01cae4e07f5d580bc271de.yaml b/nuclei-templates/cve-less/plugins/essential-real-estate-79c84a24ae01cae4e07f5d580bc271de.yaml new file mode 100644 index 0000000000..1ccf705810 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-real-estate-79c84a24ae01cae4e07f5d580bc271de.yaml @@ -0,0 +1,58 @@ +id: essential-real-estate-79c84a24ae01cae4e07f5d580bc271de + +info: + name: > + Essential Real Estate <= 4.3.5 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb2ce22-077b-41dd-a2ff-cc1db9d20d38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-real-estate/" + google-query: inurl:"/wp-content/plugins/essential-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-real-estate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-real-estate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-real-estate-f1165caf4055b6656a8778038c98cf59.yaml b/nuclei-templates/cve-less/plugins/essential-real-estate-f1165caf4055b6656a8778038c98cf59.yaml new file mode 100644 index 0000000000..7fc916a527 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-real-estate-f1165caf4055b6656a8778038c98cf59.yaml @@ -0,0 +1,58 @@ +id: essential-real-estate-f1165caf4055b6656a8778038c98cf59 + +info: + name: > + Essential Real Estate <= 3.9.6 - Reflected Cross-Site-Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27205ad8-991f-4011-b1fd-759829acabd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-real-estate/" + google-query: inurl:"/wp-content/plugins/essential-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-real-estate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-real-estate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/essential-widgets-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/essential-widgets-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..76a5b3cdd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/essential-widgets-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: essential-widgets-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/essential-widgets/" + google-query: inurl:"/wp-content/plugins/essential-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,essential-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/essential-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essential-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/estatik-2dab9495e3032fc043db0a21d11fd446.yaml b/nuclei-templates/cve-less/plugins/estatik-2dab9495e3032fc043db0a21d11fd446.yaml new file mode 100644 index 0000000000..f6d86789f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/estatik-2dab9495e3032fc043db0a21d11fd446.yaml @@ -0,0 +1,58 @@ +id: estatik-2dab9495e3032fc043db0a21d11fd446 + +info: + name: > + Estatik <= 2.3.0 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54b3eaf4-5f45-4b94-8a7b-03da76d6ea83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/estatik/" + google-query: inurl:"/wp-content/plugins/estatik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,estatik,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/estatik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "estatik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/estatik-4a2a3f2d6fcad8ba2e9fd4989dbe6a53.yaml b/nuclei-templates/cve-less/plugins/estatik-4a2a3f2d6fcad8ba2e9fd4989dbe6a53.yaml new file mode 100644 index 0000000000..8f9f1183e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/estatik-4a2a3f2d6fcad8ba2e9fd4989dbe6a53.yaml @@ -0,0 +1,58 @@ +id: estatik-4a2a3f2d6fcad8ba2e9fd4989dbe6a53 + +info: + name: > + Estatik <= 2.2.5 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64188179-1d7d-476f-866c-62bc10c85a3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/estatik/" + google-query: inurl:"/wp-content/plugins/estatik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,estatik,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/estatik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "estatik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/estatik-735edcca81533a941d73b22fd3c790b1.yaml b/nuclei-templates/cve-less/plugins/estatik-735edcca81533a941d73b22fd3c790b1.yaml new file mode 100644 index 0000000000..5167bc9001 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/estatik-735edcca81533a941d73b22fd3c790b1.yaml @@ -0,0 +1,58 @@ +id: estatik-735edcca81533a941d73b22fd3c790b1 + +info: + name: > + Estatik Real Estate Plugin <= 4.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/720d1d50-06ae-4b47-ac64-115c00d81223?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/estatik/" + google-query: inurl:"/wp-content/plugins/estatik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,estatik,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/estatik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "estatik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/estatik-c13a04653b2bd4332fed19d99c861058.yaml b/nuclei-templates/cve-less/plugins/estatik-c13a04653b2bd4332fed19d99c861058.yaml new file mode 100644 index 0000000000..f44ff0b27e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/estatik-c13a04653b2bd4332fed19d99c861058.yaml @@ -0,0 +1,58 @@ +id: estatik-c13a04653b2bd4332fed19d99c861058 + +info: + name: > + Estatik Real Estate Plugin <= 4.1.0 - Missing Authorization to Limited Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae6a00ef-1a3f-47cd-9e55-f28b74999198?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/estatik/" + google-query: inurl:"/wp-content/plugins/estatik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,estatik,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/estatik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "estatik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/estatik-dffb7325ebaf69230baa15ff0c7b5c62.yaml b/nuclei-templates/cve-less/plugins/estatik-dffb7325ebaf69230baa15ff0c7b5c62.yaml new file mode 100644 index 0000000000..cf864376e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/estatik-dffb7325ebaf69230baa15ff0c7b5c62.yaml @@ -0,0 +1,58 @@ +id: estatik-dffb7325ebaf69230baa15ff0c7b5c62 + +info: + name: > + Estatik Real Estate Plugin <= 4.1.0 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce0dcbe6-9231-45d9-9658-5d775e02cfcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/estatik/" + google-query: inurl:"/wp-content/plugins/estatik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,estatik,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/estatik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "estatik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/estatik-mortgage-calculator-4963e2b8018a63e397cd2fd1ef358d47.yaml b/nuclei-templates/cve-less/plugins/estatik-mortgage-calculator-4963e2b8018a63e397cd2fd1ef358d47.yaml new file mode 100644 index 0000000000..f4e931e2c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/estatik-mortgage-calculator-4963e2b8018a63e397cd2fd1ef358d47.yaml @@ -0,0 +1,58 @@ +id: estatik-mortgage-calculator-4963e2b8018a63e397cd2fd1ef358d47 + +info: + name: > + WordPress Mortgage Calculator Estatik <= 2.0.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ce9dd21-3c89-4ddd-9022-f1edf1224e2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/estatik-mortgage-calculator/" + google-query: inurl:"/wp-content/plugins/estatik-mortgage-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,estatik-mortgage-calculator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/estatik-mortgage-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "estatik-mortgage-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/estatik-mortgage-calculator-b9268068741b5afa10930c2a68504f76.yaml b/nuclei-templates/cve-less/plugins/estatik-mortgage-calculator-b9268068741b5afa10930c2a68504f76.yaml new file mode 100644 index 0000000000..e6b37989ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/estatik-mortgage-calculator-b9268068741b5afa10930c2a68504f76.yaml @@ -0,0 +1,58 @@ +id: estatik-mortgage-calculator-b9268068741b5afa10930c2a68504f76 + +info: + name: > + Mortgage Calculator Estatik <= 2.0.7 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb73e92b-b807-4406-b378-cef6cff9eb82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/estatik-mortgage-calculator/" + google-query: inurl:"/wp-content/plugins/estatik-mortgage-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,estatik-mortgage-calculator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/estatik-mortgage-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "estatik-mortgage-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/et-core-plugin-2b061e047e658e61d8ebbd4e7e809bba.yaml b/nuclei-templates/cve-less/plugins/et-core-plugin-2b061e047e658e61d8ebbd4e7e809bba.yaml new file mode 100644 index 0000000000..421166433a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/et-core-plugin-2b061e047e658e61d8ebbd4e7e809bba.yaml @@ -0,0 +1,58 @@ +id: et-core-plugin-2b061e047e658e61d8ebbd4e7e809bba + +info: + name: > + XStore Core <= 5.3.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46bc15d6-dc1b-40ec-8bb9-5342a4f84372?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/et-core-plugin/" + google-query: inurl:"/wp-content/plugins/et-core-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,et-core-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/et-core-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "et-core-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/et-core-plugin-3e529ad3f40187427736b7fab3732fc7.yaml b/nuclei-templates/cve-less/plugins/et-core-plugin-3e529ad3f40187427736b7fab3732fc7.yaml new file mode 100644 index 0000000000..52aeda20a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/et-core-plugin-3e529ad3f40187427736b7fab3732fc7.yaml @@ -0,0 +1,58 @@ +id: et-core-plugin-3e529ad3f40187427736b7fab3732fc7 + +info: + name: > + XStore Core <= 5.3.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/050b6ad4-f1e4-403f-9e0e-7fc18504f661?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/et-core-plugin/" + google-query: inurl:"/wp-content/plugins/et-core-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,et-core-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/et-core-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "et-core-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/et-core-plugin-4a822947b182a8ad769234c031d65105.yaml b/nuclei-templates/cve-less/plugins/et-core-plugin-4a822947b182a8ad769234c031d65105.yaml new file mode 100644 index 0000000000..6b05fc8534 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/et-core-plugin-4a822947b182a8ad769234c031d65105.yaml @@ -0,0 +1,58 @@ +id: et-core-plugin-4a822947b182a8ad769234c031d65105 + +info: + name: > + XStore Core <= 5.3.5 - Authenticated (Subscriber+) Limited Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4167f0ad-aeef-4525-82c9-336f9f48a55e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/et-core-plugin/" + google-query: inurl:"/wp-content/plugins/et-core-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,et-core-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/et-core-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "et-core-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/et-core-plugin-67b6d13fd5c91dcaea1d0b5a3d6ef9e6.yaml b/nuclei-templates/cve-less/plugins/et-core-plugin-67b6d13fd5c91dcaea1d0b5a3d6ef9e6.yaml new file mode 100644 index 0000000000..dae2398194 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/et-core-plugin-67b6d13fd5c91dcaea1d0b5a3d6ef9e6.yaml @@ -0,0 +1,58 @@ +id: et-core-plugin-67b6d13fd5c91dcaea1d0b5a3d6ef9e6 + +info: + name: > + XStore Core <= 5.3.5 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba502aac-13f7-40e2-9672-bf26a0fefef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/et-core-plugin/" + google-query: inurl:"/wp-content/plugins/et-core-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,et-core-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/et-core-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "et-core-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/et-core-plugin-69dc88dae2977364ee23f133476679d5.yaml b/nuclei-templates/cve-less/plugins/et-core-plugin-69dc88dae2977364ee23f133476679d5.yaml new file mode 100644 index 0000000000..b787243fa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/et-core-plugin-69dc88dae2977364ee23f133476679d5.yaml @@ -0,0 +1,58 @@ +id: et-core-plugin-69dc88dae2977364ee23f133476679d5 + +info: + name: > + XStore Core <= 5.3.5 - Authenticated (Subscriber+) Limited Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6986569-a273-4aea-bc74-ef7277781661?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/et-core-plugin/" + google-query: inurl:"/wp-content/plugins/et-core-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,et-core-plugin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/et-core-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "et-core-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/et-core-plugin-778530516424ce1a3968690bf84c44c4.yaml b/nuclei-templates/cve-less/plugins/et-core-plugin-778530516424ce1a3968690bf84c44c4.yaml new file mode 100644 index 0000000000..7711faaf23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/et-core-plugin-778530516424ce1a3968690bf84c44c4.yaml @@ -0,0 +1,58 @@ +id: et-core-plugin-778530516424ce1a3968690bf84c44c4 + +info: + name: > + XStore Core <= 5.3.5 - Authenticated (Subscriber+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/856e3e77-d330-4fa0-9f07-f77a56dbb5bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/et-core-plugin/" + google-query: inurl:"/wp-content/plugins/et-core-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,et-core-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/et-core-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "et-core-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/et-core-plugin-7c1fbc71424269552780f75d587dc6d3.yaml b/nuclei-templates/cve-less/plugins/et-core-plugin-7c1fbc71424269552780f75d587dc6d3.yaml new file mode 100644 index 0000000000..789dd605dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/et-core-plugin-7c1fbc71424269552780f75d587dc6d3.yaml @@ -0,0 +1,58 @@ +id: et-core-plugin-7c1fbc71424269552780f75d587dc6d3 + +info: + name: > + XStore Core <= 5.3.5 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7019b542-9b9a-4d16-94a0-412cccf1e6eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/et-core-plugin/" + google-query: inurl:"/wp-content/plugins/et-core-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,et-core-plugin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/et-core-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "et-core-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/et-core-plugin-dfb4659d00ee25c056f5c89962f45122.yaml b/nuclei-templates/cve-less/plugins/et-core-plugin-dfb4659d00ee25c056f5c89962f45122.yaml new file mode 100644 index 0000000000..7a0f75a023 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/et-core-plugin-dfb4659d00ee25c056f5c89962f45122.yaml @@ -0,0 +1,58 @@ +id: et-core-plugin-dfb4659d00ee25c056f5c89962f45122 + +info: + name: > + XStore Core <= 5.3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02399fc5-fe74-4ee5-ac63-78d971d2f99e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/et-core-plugin/" + google-query: inurl:"/wp-content/plugins/et-core-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,et-core-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/et-core-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "et-core-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ether-and-erc20-tokens-woocommerce-payment-gateway-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ether-and-erc20-tokens-woocommerce-payment-gateway-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..49610a75c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ether-and-erc20-tokens-woocommerce-payment-gateway-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ether-and-erc20-tokens-woocommerce-payment-gateway-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ether-and-erc20-tokens-woocommerce-payment-gateway/" + google-query: inurl:"/wp-content/plugins/ether-and-erc20-tokens-woocommerce-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ether-and-erc20-tokens-woocommerce-payment-gateway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ether-and-erc20-tokens-woocommerce-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ether-and-erc20-tokens-woocommerce-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.12.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ethereum-wallet-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ethereum-wallet-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a5cb4eced9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ethereum-wallet-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ethereum-wallet-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ethereum-wallet/" + google-query: inurl:"/wp-content/plugins/ethereum-wallet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ethereum-wallet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ethereum-wallet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ethereum-wallet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ethereumico-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ethereumico-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..21f139ad08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ethereumico-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ethereumico-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ethereumico/" + google-query: inurl:"/wp-content/plugins/ethereumico/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ethereumico,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ethereumico/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ethereumico" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ethpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ethpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..335f52e335 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ethpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ethpress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ethpress/" + google-query: inurl:"/wp-content/plugins/ethpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ethpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ethpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ethpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/etsy-shop-006e837e29a04be28f23fcb621fc7c5f.yaml b/nuclei-templates/cve-less/plugins/etsy-shop-006e837e29a04be28f23fcb621fc7c5f.yaml new file mode 100644 index 0000000000..d840e4d2c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/etsy-shop-006e837e29a04be28f23fcb621fc7c5f.yaml @@ -0,0 +1,58 @@ +id: etsy-shop-006e837e29a04be28f23fcb621fc7c5f + +info: + name: > + Etsy Shop <= 3.0.3 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/474494ad-6713-4167-b40d-c29c533f169e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/etsy-shop/" + google-query: inurl:"/wp-content/plugins/etsy-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,etsy-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/etsy-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "etsy-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/etsy-shop-12af00d20d6054e6e52d985c87c55f02.yaml b/nuclei-templates/cve-less/plugins/etsy-shop-12af00d20d6054e6e52d985c87c55f02.yaml new file mode 100644 index 0000000000..bdda18a876 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/etsy-shop-12af00d20d6054e6e52d985c87c55f02.yaml @@ -0,0 +1,58 @@ +id: etsy-shop-12af00d20d6054e6e52d985c87c55f02 + +info: + name: > + Etsy Shop <= 3.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4696f7a-8b87-4376-b4c9-596eca30b38c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/etsy-shop/" + google-query: inurl:"/wp-content/plugins/etsy-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,etsy-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/etsy-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "etsy-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eu-cookie-law-0598f02cdb42ad5878825a4305d0cd60.yaml b/nuclei-templates/cve-less/plugins/eu-cookie-law-0598f02cdb42ad5878825a4305d0cd60.yaml new file mode 100644 index 0000000000..a48974a3cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eu-cookie-law-0598f02cdb42ad5878825a4305d0cd60.yaml @@ -0,0 +1,58 @@ +id: eu-cookie-law-0598f02cdb42ad5878825a4305d0cd60 + +info: + name: > + EU Cookie Law <= 3.1.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e7cde2e-28e6-417a-900a-38d0a77800d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eu-cookie-law/" + google-query: inurl:"/wp-content/plugins/eu-cookie-law/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eu-cookie-law,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eu-cookie-law/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eu-cookie-law" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eu-cookie-law-7bd73acb3e7a0bf377aeb77c95eb6b8a.yaml b/nuclei-templates/cve-less/plugins/eu-cookie-law-7bd73acb3e7a0bf377aeb77c95eb6b8a.yaml new file mode 100644 index 0000000000..0b9de74306 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eu-cookie-law-7bd73acb3e7a0bf377aeb77c95eb6b8a.yaml @@ -0,0 +1,58 @@ +id: eu-cookie-law-7bd73acb3e7a0bf377aeb77c95eb6b8a + +info: + name: > + EU Cookie Law <= 3.1.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15ec3b68-0461-4b99-81e1-0d776b97a4eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eu-cookie-law/" + google-query: inurl:"/wp-content/plugins/eu-cookie-law/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eu-cookie-law,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eu-cookie-law/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eu-cookie-law" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eupago-gateway-for-woocommerce-138945608ab96d8fde0710ddccd28d61.yaml b/nuclei-templates/cve-less/plugins/eupago-gateway-for-woocommerce-138945608ab96d8fde0710ddccd28d61.yaml new file mode 100644 index 0000000000..6645983edb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eupago-gateway-for-woocommerce-138945608ab96d8fde0710ddccd28d61.yaml @@ -0,0 +1,58 @@ +id: eupago-gateway-for-woocommerce-138945608ab96d8fde0710ddccd28d61 + +info: + name: > + Eupago Gateway For Woocommerce <= 3.1.9 - Cross-Site Request Forgery via eupago_page_content + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f1dcec6-1fcf-40e8-a15b-647b7161b6b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eupago-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/eupago-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eupago-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eupago-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eupago-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/evaluate-c206b1ef471fcab481cc325e40071db1.yaml b/nuclei-templates/cve-less/plugins/evaluate-c206b1ef471fcab481cc325e40071db1.yaml new file mode 100644 index 0000000000..5d07919ebe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/evaluate-c206b1ef471fcab481cc325e40071db1.yaml @@ -0,0 +1,58 @@ +id: evaluate-c206b1ef471fcab481cc325e40071db1 + +info: + name: > + Evaluate <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b11f2ad4-5a89-4387-a307-350cead20491?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/evaluate/" + google-query: inurl:"/wp-content/plugins/evaluate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,evaluate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/evaluate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "evaluate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/evarisk-f472ae87189b5e53003e503dd6fa0b7e.yaml b/nuclei-templates/cve-less/plugins/evarisk-f472ae87189b5e53003e503dd6fa0b7e.yaml new file mode 100644 index 0000000000..6272260de9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/evarisk-f472ae87189b5e53003e503dd6fa0b7e.yaml @@ -0,0 +1,58 @@ +id: evarisk-f472ae87189b5e53003e503dd6fa0b7e + +info: + name: > + Evarisk <= 5.1.5.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aff4f695-3c3b-48ee-8de1-674b588f332f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/evarisk/" + google-query: inurl:"/wp-content/plugins/evarisk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,evarisk,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/evarisk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "evarisk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-calendar-wd-209b175b2921345ce72870696dcb5d5d.yaml b/nuclei-templates/cve-less/plugins/event-calendar-wd-209b175b2921345ce72870696dcb5d5d.yaml new file mode 100644 index 0000000000..ac4f963a55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-calendar-wd-209b175b2921345ce72870696dcb5d5d.yaml @@ -0,0 +1,58 @@ +id: event-calendar-wd-209b175b2921345ce72870696dcb5d5d + +info: + name: > + EventCalendar <= 1.1.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3a5bb9c-0fc3-4a1b-8b4d-a700cbf9dacc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-calendar-wd/" + google-query: inurl:"/wp-content/plugins/event-calendar-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-calendar-wd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-calendar-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-calendar-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-calendar-wd-47b8a1ee1f8560846764b32bfc0f5385.yaml b/nuclei-templates/cve-less/plugins/event-calendar-wd-47b8a1ee1f8560846764b32bfc0f5385.yaml new file mode 100644 index 0000000000..09fd6e3736 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-calendar-wd-47b8a1ee1f8560846764b32bfc0f5385.yaml @@ -0,0 +1,58 @@ +id: event-calendar-wd-47b8a1ee1f8560846764b32bfc0f5385 + +info: + name: > + Event Calendar <= 1.1.44 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d5a0c05-736f-4fb9-9358-894977664bf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-calendar-wd/" + google-query: inurl:"/wp-content/plugins/event-calendar-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-calendar-wd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-calendar-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-calendar-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-calendar-wd-4f2124ce38e5b11836dd224eb87f80c1.yaml b/nuclei-templates/cve-less/plugins/event-calendar-wd-4f2124ce38e5b11836dd224eb87f80c1.yaml new file mode 100644 index 0000000000..00ec10ebe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-calendar-wd-4f2124ce38e5b11836dd224eb87f80c1.yaml @@ -0,0 +1,58 @@ +id: event-calendar-wd-4f2124ce38e5b11836dd224eb87f80c1 + +info: + name: > + EventCalendar < 1.0.94 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5860fe2a-edb4-4542-9a87-d0ab6819dd77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-calendar-wd/" + google-query: inurl:"/wp-content/plugins/event-calendar-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-calendar-wd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-calendar-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-calendar-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-calendar-wd-c04a7619437a5f30e58f107b65d00343.yaml b/nuclei-templates/cve-less/plugins/event-calendar-wd-c04a7619437a5f30e58f107b65d00343.yaml new file mode 100644 index 0000000000..5158879069 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-calendar-wd-c04a7619437a5f30e58f107b65d00343.yaml @@ -0,0 +1,58 @@ +id: event-calendar-wd-c04a7619437a5f30e58f107b65d00343 + +info: + name: > + Event Calendar <= 1.1.50 - Subscriber+ Event Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/835941f1-e2f6-41aa-9a46-cdbeb5741d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-calendar-wd/" + google-query: inurl:"/wp-content/plugins/event-calendar-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-calendar-wd,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-calendar-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-calendar-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-calendar-wd-f5b60cb69c042e53c0624a4896969936.yaml b/nuclei-templates/cve-less/plugins/event-calendar-wd-f5b60cb69c042e53c0624a4896969936.yaml new file mode 100644 index 0000000000..9e63cb0d5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-calendar-wd-f5b60cb69c042e53c0624a4896969936.yaml @@ -0,0 +1,58 @@ +id: event-calendar-wd-f5b60cb69c042e53c0624a4896969936 + +info: + name: > + EventCalendar <= 1.1.45 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d430b33-1607-46b3-8780-ac5cfbb7d6ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-calendar-wd/" + google-query: inurl:"/wp-content/plugins/event-calendar-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-calendar-wd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-calendar-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-calendar-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-calendar-wd-f87eb9062acaa622ccaad44a0da4055e.yaml b/nuclei-templates/cve-less/plugins/event-calendar-wd-f87eb9062acaa622ccaad44a0da4055e.yaml new file mode 100644 index 0000000000..1a979887ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-calendar-wd-f87eb9062acaa622ccaad44a0da4055e.yaml @@ -0,0 +1,58 @@ +id: event-calendar-wd-f87eb9062acaa622ccaad44a0da4055e + +info: + name: > + Event Calendar <= 1.1.50 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f773ef2f-c33d-414e-9c2f-df22b9d00234?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-calendar-wd/" + google-query: inurl:"/wp-content/plugins/event-calendar-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-calendar-wd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-calendar-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-calendar-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-easy-calendar-204a4a5eb1bb83f22931c8d30c356316.yaml b/nuclei-templates/cve-less/plugins/event-easy-calendar-204a4a5eb1bb83f22931c8d30c356316.yaml new file mode 100644 index 0000000000..3f8135ade5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-easy-calendar-204a4a5eb1bb83f22931c8d30c356316.yaml @@ -0,0 +1,58 @@ +id: event-easy-calendar-204a4a5eb1bb83f22931c8d30c356316 + +info: + name: > + Event Easy Calendar <= 1.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c911773-79f5-4d91-b0f9-a05bc17516b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-easy-calendar/" + google-query: inurl:"/wp-content/plugins/event-easy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-easy-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-easy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-easy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-easy-calendar-c4cddbbbf9510f7f05b91c86dc3dade6.yaml b/nuclei-templates/cve-less/plugins/event-easy-calendar-c4cddbbbf9510f7f05b91c86dc3dade6.yaml new file mode 100644 index 0000000000..e08423349a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-easy-calendar-c4cddbbbf9510f7f05b91c86dc3dade6.yaml @@ -0,0 +1,58 @@ +id: event-easy-calendar-c4cddbbbf9510f7f05b91c86dc3dade6 + +info: + name: > + Event Easy Calendar <= 1.0.0 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a620810d-1b2a-4f2e-943c-aacc493f0c5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-easy-calendar/" + google-query: inurl:"/wp-content/plugins/event-easy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-easy-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-easy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-easy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-espresso-core-64738de487a64bb84aa49f1cb2905c9b.yaml b/nuclei-templates/cve-less/plugins/event-espresso-core-64738de487a64bb84aa49f1cb2905c9b.yaml new file mode 100644 index 0000000000..207354bd6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-espresso-core-64738de487a64bb84aa49f1cb2905c9b.yaml @@ -0,0 +1,58 @@ +id: event-espresso-core-64738de487a64bb84aa49f1cb2905c9b + +info: + name: > + Event Espresso Core <= 4.10.6.p - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0cf53e3-1d5b-4f02-b1a1-61f6fc3ffe58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-espresso-core/" + google-query: inurl:"/wp-content/plugins/event-espresso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-espresso-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-espresso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-espresso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.6.p') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-espresso-decaf-58a3697a69c8ed53be8155b2e125899c.yaml b/nuclei-templates/cve-less/plugins/event-espresso-decaf-58a3697a69c8ed53be8155b2e125899c.yaml new file mode 100644 index 0000000000..d58c050076 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-espresso-decaf-58a3697a69c8ed53be8155b2e125899c.yaml @@ -0,0 +1,58 @@ +id: event-espresso-decaf-58a3697a69c8ed53be8155b2e125899c + +info: + name: > + Event Espresso 4 Decaf <= 4.10.11 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89d3a9da-2496-4f75-ad8f-65629f198fe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-espresso-decaf/" + google-query: inurl:"/wp-content/plugins/event-espresso-decaf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-espresso-decaf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-espresso-decaf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-espresso-decaf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-espresso-decaf-b570b273a03a0fa29b5a4d4db2c58011.yaml b/nuclei-templates/cve-less/plugins/event-espresso-decaf-b570b273a03a0fa29b5a4d4db2c58011.yaml new file mode 100644 index 0000000000..ac56a117c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-espresso-decaf-b570b273a03a0fa29b5a4d4db2c58011.yaml @@ -0,0 +1,58 @@ +id: event-espresso-decaf-b570b273a03a0fa29b5a4d4db2c58011 + +info: + name: > + Event Espresso 4 Decaf <= 4.10.44.decaf - Feature Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d55f10f3-5484-4b90-80da-3d91f409fe04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-espresso-decaf/" + google-query: inurl:"/wp-content/plugins/event-espresso-decaf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-espresso-decaf,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-espresso-decaf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-espresso-decaf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.44.decaf') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-espresso-free-11785a74a8a2ea2253fb0fe61f67d120.yaml b/nuclei-templates/cve-less/plugins/event-espresso-free-11785a74a8a2ea2253fb0fe61f67d120.yaml new file mode 100644 index 0000000000..e3f6e51794 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-espresso-free-11785a74a8a2ea2253fb0fe61f67d120.yaml @@ -0,0 +1,58 @@ +id: event-espresso-free-11785a74a8a2ea2253fb0fe61f67d120 + +info: + name: > + Event Espresso Free/Lite <= 3.1.37.12.L - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa14909c-58f6-40f1-af50-eb1a0d2333de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-espresso-free/" + google-query: inurl:"/wp-content/plugins/event-espresso-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-espresso-free,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-espresso-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-espresso-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.37.12.L') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-espresso-free-3faf59fe255a23ab6371375fbe88c459.yaml b/nuclei-templates/cve-less/plugins/event-espresso-free-3faf59fe255a23ab6371375fbe88c459.yaml new file mode 100644 index 0000000000..888f97351f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-espresso-free-3faf59fe255a23ab6371375fbe88c459.yaml @@ -0,0 +1,58 @@ +id: event-espresso-free-3faf59fe255a23ab6371375fbe88c459 + +info: + name: > + Event Expresso Free <= 3.1.37.11.L - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39f12569-ff89-4c6b-afcf-a8c4421749cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-espresso-free/" + google-query: inurl:"/wp-content/plugins/event-espresso-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-espresso-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-espresso-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-espresso-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.37.11.L') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-geek-895b9710054cceeb59eef3658e032c99.yaml b/nuclei-templates/cve-less/plugins/event-geek-895b9710054cceeb59eef3658e032c99.yaml new file mode 100644 index 0000000000..4743bab577 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-geek-895b9710054cceeb59eef3658e032c99.yaml @@ -0,0 +1,58 @@ +id: event-geek-895b9710054cceeb59eef3658e032c99 + +info: + name: > + Event Geek <= 2.5.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/961b2b60-2026-42fc-be55-e7023e8ef3df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-geek/" + google-query: inurl:"/wp-content/plugins/event-geek/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-geek,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-geek/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-geek" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-list-1b4409ad110c3c389ee584578fde5c3f.yaml b/nuclei-templates/cve-less/plugins/event-list-1b4409ad110c3c389ee584578fde5c3f.yaml new file mode 100644 index 0000000000..ede74f0ed5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-list-1b4409ad110c3c389ee584578fde5c3f.yaml @@ -0,0 +1,58 @@ +id: event-list-1b4409ad110c3c389ee584578fde5c3f + +info: + name: > + Event List <= 0.7.9 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6153d71e-66c8-49d1-80d8-6a121883172d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-list/" + google-query: inurl:"/wp-content/plugins/event-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-list-8aead4340d12e591a0e0e1fb46dd9226.yaml b/nuclei-templates/cve-less/plugins/event-list-8aead4340d12e591a0e0e1fb46dd9226.yaml new file mode 100644 index 0000000000..c695cde118 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-list-8aead4340d12e591a0e0e1fb46dd9226.yaml @@ -0,0 +1,58 @@ +id: event-list-8aead4340d12e591a0e0e1fb46dd9226 + +info: + name: > + Event List < 0.8.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69693a9a-fc9e-49ea-8c41-438ee6af7ee8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-list/" + google-query: inurl:"/wp-content/plugins/event-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-list-b6feac7a7902db970215a4fc933d4825.yaml b/nuclei-templates/cve-less/plugins/event-list-b6feac7a7902db970215a4fc933d4825.yaml new file mode 100644 index 0000000000..c701ec23aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-list-b6feac7a7902db970215a4fc933d4825.yaml @@ -0,0 +1,58 @@ +id: event-list-b6feac7a7902db970215a4fc933d4825 + +info: + name: > + Event List < 0.7.9 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71d657d4-b326-4655-808a-913bbc9a8d1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-list/" + google-query: inurl:"/wp-content/plugins/event-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-monster-2ce3da9cb13ca01fe4975c718c0361d4.yaml b/nuclei-templates/cve-less/plugins/event-monster-2ce3da9cb13ca01fe4975c718c0361d4.yaml new file mode 100644 index 0000000000..28668efb60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-monster-2ce3da9cb13ca01fe4975c718c0361d4.yaml @@ -0,0 +1,58 @@ +id: event-monster-2ce3da9cb13ca01fe4975c718c0361d4 + +info: + name: > + Event Monster <= 1.2.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb9ca8e0-741c-4763-b677-61f16e5a3b50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-monster/" + google-query: inurl:"/wp-content/plugins/event-monster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-monster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-monster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-monster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-monster-5b36fd20286674ebec29c5f8c3b598c9.yaml b/nuclei-templates/cve-less/plugins/event-monster-5b36fd20286674ebec29c5f8c3b598c9.yaml new file mode 100644 index 0000000000..b390860607 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-monster-5b36fd20286674ebec29c5f8c3b598c9.yaml @@ -0,0 +1,58 @@ +id: event-monster-5b36fd20286674ebec29c5f8c3b598c9 + +info: + name: > + Event Management Tickets Booking <= 1.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f4f2317-945e-4fd8-8a0b-981b88a8412c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-monster/" + google-query: inurl:"/wp-content/plugins/event-monster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-monster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-monster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-monster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-monster-6be2333e24bb1c10a3a6c889899366b0.yaml b/nuclei-templates/cve-less/plugins/event-monster-6be2333e24bb1c10a3a6c889899366b0.yaml new file mode 100644 index 0000000000..541c24b426 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-monster-6be2333e24bb1c10a3a6c889899366b0.yaml @@ -0,0 +1,58 @@ +id: event-monster-6be2333e24bb1c10a3a6c889899366b0 + +info: + name: > + Event Monster – Event Management, Tickets Booking, Upcoming Event <= 1.1.20 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/018912c2-befc-403c-8e60-161580e84f55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-monster/" + google-query: inurl:"/wp-content/plugins/event-monster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-monster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-monster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-monster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-monster-7d599c9ff2fd0f7d53f1daad762aa4e5.yaml b/nuclei-templates/cve-less/plugins/event-monster-7d599c9ff2fd0f7d53f1daad762aa4e5.yaml new file mode 100644 index 0000000000..6b197a0087 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-monster-7d599c9ff2fd0f7d53f1daad762aa4e5.yaml @@ -0,0 +1,58 @@ +id: event-monster-7d599c9ff2fd0f7d53f1daad762aa4e5 + +info: + name: > + Event Management Tickets Booking By Event Monster Plugin < 1.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baa063b7-8b79-4de3-84b1-6dec024fa395?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-monster/" + google-query: inurl:"/wp-content/plugins/event-monster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-monster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-monster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-monster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-monster-86218768d044c8a0a41ad3c63743810a.yaml b/nuclei-templates/cve-less/plugins/event-monster-86218768d044c8a0a41ad3c63743810a.yaml new file mode 100644 index 0000000000..4231e6adc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-monster-86218768d044c8a0a41ad3c63743810a.yaml @@ -0,0 +1,58 @@ +id: event-monster-86218768d044c8a0a41ad3c63743810a + +info: + name: > + Event Monster <= 1.3.4 - Authenticated(Contributor+) PHP Object Injection via Custom Meta + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d7b3f1-a133-4678-b2d9-3f9951cbc005?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-monster/" + google-query: inurl:"/wp-content/plugins/event-monster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-monster,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-monster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-monster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-notifier-a1a48fe23ddfed810a2068245669c30f.yaml b/nuclei-templates/cve-less/plugins/event-notifier-a1a48fe23ddfed810a2068245669c30f.yaml new file mode 100644 index 0000000000..4baa33f0c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-notifier-a1a48fe23ddfed810a2068245669c30f.yaml @@ -0,0 +1,58 @@ +id: event-notifier-a1a48fe23ddfed810a2068245669c30f + +info: + name: > + Event Notifier <= 1.2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/181be35c-0aec-48b0-a43b-181284cdb2e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-notifier/" + google-query: inurl:"/wp-content/plugins/event-notifier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-notifier,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-notifier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-notifier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-page-templates-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/event-page-templates-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..70adf6df77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-page-templates-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: event-page-templates-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-page-templates-addon-for-the-events-calendar/" + google-query: inurl:"/wp-content/plugins/event-page-templates-addon-for-the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-page-templates-addon-for-the-events-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-page-templates-addon-for-the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-page-templates-addon-for-the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-post-7d0df8a0008135defe46e0244de6dafd.yaml b/nuclei-templates/cve-less/plugins/event-post-7d0df8a0008135defe46e0244de6dafd.yaml new file mode 100644 index 0000000000..2d6a1399d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-post-7d0df8a0008135defe46e0244de6dafd.yaml @@ -0,0 +1,58 @@ +id: event-post-7d0df8a0008135defe46e0244de6dafd + +info: + name: > + Event post <= 5.9.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a92b96b-ecbc-4414-8e42-04b5c3a02131?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-post/" + google-query: inurl:"/wp-content/plugins/event-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-registration-3ce5735f215e4140f8aa361ffb4589b3.yaml b/nuclei-templates/cve-less/plugins/event-registration-3ce5735f215e4140f8aa361ffb4589b3.yaml new file mode 100644 index 0000000000..ddd83f5082 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-registration-3ce5735f215e4140f8aa361ffb4589b3.yaml @@ -0,0 +1,58 @@ +id: event-registration-3ce5735f215e4140f8aa361ffb4589b3 + +info: + name: > + Event Registration <= 6.02.02 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/952e299a-5cec-444b-8359-3e7d8dec3ccb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-registration/" + google-query: inurl:"/wp-content/plugins/event-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-registration,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.02.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-registration-9d8bac7e00ea2ec60ec3b7aebc38c2af.yaml b/nuclei-templates/cve-less/plugins/event-registration-9d8bac7e00ea2ec60ec3b7aebc38c2af.yaml new file mode 100644 index 0000000000..7122853a9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-registration-9d8bac7e00ea2ec60ec3b7aebc38c2af.yaml @@ -0,0 +1,58 @@ +id: event-registration-9d8bac7e00ea2ec60ec3b7aebc38c2af + +info: + name: > + Event Registration <= 6.02.02 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c5bb593-59b5-4760-8d54-14d7665c7e7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-registration/" + google-query: inurl:"/wp-content/plugins/event-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-registration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.02.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-registration-b3acf24261888a93af1e07d21be14713.yaml b/nuclei-templates/cve-less/plugins/event-registration-b3acf24261888a93af1e07d21be14713.yaml new file mode 100644 index 0000000000..90be9113ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-registration-b3acf24261888a93af1e07d21be14713.yaml @@ -0,0 +1,58 @@ +id: event-registration-b3acf24261888a93af1e07d21be14713 + +info: + name: > + Event Registration <= 6.02.02 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adb87ef2-8741-4144-b414-56e82dd35c89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-registration/" + google-query: inurl:"/wp-content/plugins/event-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-registration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.02.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-registration-calendar-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3.yaml b/nuclei-templates/cve-less/plugins/event-registration-calendar-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3.yaml new file mode 100644 index 0000000000..afbf3f8ac1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-registration-calendar-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3.yaml @@ -0,0 +1,58 @@ +id: event-registration-calendar-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3 + +info: + name: > + Event Registration Calendar By vcita <= 1.3.1 & Online Payments – Get Paid with PayPal, Square & Stripe <= 3.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ab05954-9999-43ff-8e3c-a987e2da1956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-registration-calendar-by-vcita/" + google-query: inurl:"/wp-content/plugins/event-registration-calendar-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-registration-calendar-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-registration-calendar-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-registration-calendar-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-registration-calendar-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml b/nuclei-templates/cve-less/plugins/event-registration-calendar-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml new file mode 100644 index 0000000000..8f8f69f70d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-registration-calendar-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml @@ -0,0 +1,58 @@ +id: event-registration-calendar-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4 + +info: + name: > + Event Registration Calendar By vcita <= 1.3.1 & Online Payments – Get Paid with PayPal, Square & Stripe <= 3.9.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/207b40fa-2062-48d6-990b-f05cbbf8fb8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-registration-calendar-by-vcita/" + google-query: inurl:"/wp-content/plugins/event-registration-calendar-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-registration-calendar-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-registration-calendar-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-registration-calendar-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-registration-e5636efc611147282df108916f2ce8de.yaml b/nuclei-templates/cve-less/plugins/event-registration-e5636efc611147282df108916f2ce8de.yaml new file mode 100644 index 0000000000..aec3b4c368 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-registration-e5636efc611147282df108916f2ce8de.yaml @@ -0,0 +1,58 @@ +id: event-registration-e5636efc611147282df108916f2ce8de + +info: + name: > + Event Registration < 6.00.03 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd328738-7467-4f30-83bb-9e1c836fa940?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-registration/" + google-query: inurl:"/wp-content/plugins/event-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-registration,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.00.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-2581131a04f529b6a1d76a0e92f4b955.yaml b/nuclei-templates/cve-less/plugins/event-tickets-2581131a04f529b6a1d76a0e92f4b955.yaml new file mode 100644 index 0000000000..dca26840d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-2581131a04f529b6a1d76a0e92f4b955.yaml @@ -0,0 +1,58 @@ +id: event-tickets-2581131a04f529b6a1d76a0e92f4b955 + +info: + name: > + Event Tickets and Registration <= 5.8.0 Events Tickets Plus <= 5.9.0 - Authenticated (Contributor+) Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c9d08f5-7c94-40e7-979f-023456aeb54e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets/" + google-query: inurl:"/wp-content/plugins/event-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-2f07eb6c891e38765db750c63d86a120.yaml b/nuclei-templates/cve-less/plugins/event-tickets-2f07eb6c891e38765db750c63d86a120.yaml new file mode 100644 index 0000000000..1106c14df5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-2f07eb6c891e38765db750c63d86a120.yaml @@ -0,0 +1,58 @@ +id: event-tickets-2f07eb6c891e38765db750c63d86a120 + +info: + name: > + Event Tickets and Registration <= 5.8.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7839847-2637-4a0d-bfc1-5f80b8433e24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets/" + google-query: inurl:"/wp-content/plugins/event-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/event-tickets-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7f708c1cbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: event-tickets-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets/" + google-query: inurl:"/wp-content/plugins/event-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-c4921b839172d2af0f48284749d41b1d.yaml b/nuclei-templates/cve-less/plugins/event-tickets-c4921b839172d2af0f48284749d41b1d.yaml new file mode 100644 index 0000000000..29f5cf4120 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-c4921b839172d2af0f48284749d41b1d.yaml @@ -0,0 +1,58 @@ +id: event-tickets-c4921b839172d2af0f48284749d41b1d + +info: + name: > + Event Tickets <= 4.10.7.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e25914f-f2c6-4224-a2f4-0b691d1e77aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets/" + google-query: inurl:"/wp-content/plugins/event-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-cb6c55d4733797bb415d8f13c3aeab2d.yaml b/nuclei-templates/cve-less/plugins/event-tickets-cb6c55d4733797bb415d8f13c3aeab2d.yaml new file mode 100644 index 0000000000..362257c2d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-cb6c55d4733797bb415d8f13c3aeab2d.yaml @@ -0,0 +1,58 @@ +id: event-tickets-cb6c55d4733797bb415d8f13c3aeab2d + +info: + name: > + Event Tickets and Registration <= 5.8.2 - Improper Authorization to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e42dd1c-adf7-471a-a14a-9038c56413a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets/" + google-query: inurl:"/wp-content/plugins/event-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-f8870005841795b1f61974063b04cd70.yaml b/nuclei-templates/cve-less/plugins/event-tickets-f8870005841795b1f61974063b04cd70.yaml new file mode 100644 index 0000000000..31d87386f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-f8870005841795b1f61974063b04cd70.yaml @@ -0,0 +1,58 @@ +id: event-tickets-f8870005841795b1f61974063b04cd70 + +info: + name: > + Event Tickets <= 5.2.1 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9ce2107-18bd-4331-bd8e-578f56fdebf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets/" + google-query: inurl:"/wp-content/plugins/event-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-plus-2581131a04f529b6a1d76a0e92f4b955.yaml b/nuclei-templates/cve-less/plugins/event-tickets-plus-2581131a04f529b6a1d76a0e92f4b955.yaml new file mode 100644 index 0000000000..d20317d8d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-plus-2581131a04f529b6a1d76a0e92f4b955.yaml @@ -0,0 +1,58 @@ +id: event-tickets-plus-2581131a04f529b6a1d76a0e92f4b955 + +info: + name: > + Event Tickets and Registration <= 5.8.0 Events Tickets Plus <= 5.9.0 - Authenticated (Contributor+) Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c9d08f5-7c94-40e7-979f-023456aeb54e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets-plus/" + google-query: inurl:"/wp-content/plugins/event-tickets-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-plus-4df3cdb7c674def16735b8e037827c43.yaml b/nuclei-templates/cve-less/plugins/event-tickets-plus-4df3cdb7c674def16735b8e037827c43.yaml new file mode 100644 index 0000000000..8ca0df39e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-plus-4df3cdb7c674def16735b8e037827c43.yaml @@ -0,0 +1,58 @@ +id: event-tickets-plus-4df3cdb7c674def16735b8e037827c43 + +info: + name: > + Events Tickets Plus <= 5.9.0 - Missing Authorization to Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28e16994-a03f-4b3a-9f45-e6b0a1334c98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets-plus/" + google-query: inurl:"/wp-content/plugins/event-tickets-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/event-tickets-with-ticket-scanner-eb93d0fd8aabb59ccf2ece6d36890f6a.yaml b/nuclei-templates/cve-less/plugins/event-tickets-with-ticket-scanner-eb93d0fd8aabb59ccf2ece6d36890f6a.yaml new file mode 100644 index 0000000000..595d1da69f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/event-tickets-with-ticket-scanner-eb93d0fd8aabb59ccf2ece6d36890f6a.yaml @@ -0,0 +1,58 @@ +id: event-tickets-with-ticket-scanner-eb93d0fd8aabb59ccf2ece6d36890f6a + +info: + name: > + Event Tickets with Ticket Scanner <= 1.5.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec40d89-9caa-44dc-8577-00fa6463348c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-tickets-with-ticket-scanner/" + google-query: inurl:"/wp-content/plugins/event-tickets-with-ticket-scanner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-tickets-with-ticket-scanner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-tickets-with-ticket-scanner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-tickets-with-ticket-scanner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventify-5dad00a11bede1ceffdac71757dc57c7.yaml b/nuclei-templates/cve-less/plugins/eventify-5dad00a11bede1ceffdac71757dc57c7.yaml new file mode 100644 index 0000000000..178a2e3d20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventify-5dad00a11bede1ceffdac71757dc57c7.yaml @@ -0,0 +1,58 @@ +id: eventify-5dad00a11bede1ceffdac71757dc57c7 + +info: + name: > + Eventify - Simple Events <= 1.7.f - SQL Injection via eventid + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65b8e9b3-6078-4a78-86f9-7251c1978199?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventify/" + google-query: inurl:"/wp-content/plugins/eventify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventify,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.f') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventify-a2935a109cadc5c6b15de3c6e258096e.yaml b/nuclei-templates/cve-less/plugins/eventify-a2935a109cadc5c6b15de3c6e258096e.yaml new file mode 100644 index 0000000000..7c5f78b520 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventify-a2935a109cadc5c6b15de3c6e258096e.yaml @@ -0,0 +1,58 @@ +id: eventify-a2935a109cadc5c6b15de3c6e258096e + +info: + name: > + Eventify <= 2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b95749b-c522-42cd-aa99-36bdf15541c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventify/" + google-query: inurl:"/wp-content/plugins/eventify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-187d65743de5f807e3a3561c30924b2f.yaml b/nuclei-templates/cve-less/plugins/eventon-187d65743de5f807e3a3561c30924b2f.yaml new file mode 100644 index 0000000000..4cceb15b96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-187d65743de5f807e3a3561c30924b2f.yaml @@ -0,0 +1,58 @@ +id: eventon-187d65743de5f807e3a3561c30924b2f + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin Pro <= 4.5.4 & Free <= 2.2.7 - Cross-Site Request Forgery via evo_eventpost_update_meta + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8e9a333-a6b7-4b5e-93c1-b95566e5d6fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-2c733617d0e1924a092044fd73aaa5a5.yaml b/nuclei-templates/cve-less/plugins/eventon-2c733617d0e1924a092044fd73aaa5a5.yaml new file mode 100644 index 0000000000..60ff684ba0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-2c733617d0e1924a092044fd73aaa5a5.yaml @@ -0,0 +1,58 @@ +id: eventon-2c733617d0e1924a092044fd73aaa5a5 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.7 (Free) - Missing Authorization via config_virtual_event + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae603d27-aea5-49d9-beab-db18746ffe87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-34378358cea5d52c68afc57717376111.yaml b/nuclei-templates/cve-less/plugins/eventon-34378358cea5d52c68afc57717376111.yaml new file mode 100644 index 0000000000..5431a4e626 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-34378358cea5d52c68afc57717376111.yaml @@ -0,0 +1,58 @@ +id: eventon-34378358cea5d52c68afc57717376111 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.7 (Free) - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec2daf19-51ef-4e1b-becb-252955a61523?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-40551e34986076f096f391a092597f50.yaml b/nuclei-templates/cve-less/plugins/eventon-40551e34986076f096f391a092597f50.yaml new file mode 100644 index 0000000000..9309d5ff9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-40551e34986076f096f391a092597f50.yaml @@ -0,0 +1,58 @@ +id: eventon-40551e34986076f096f391a092597f50 + +info: + name: > + EventON <= 4.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0d5b1a5-0078-402b-b834-8091bfc02dd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-4534912fcab3ecf2a9fe501762efc225.yaml b/nuclei-templates/cve-less/plugins/eventon-4534912fcab3ecf2a9fe501762efc225.yaml new file mode 100644 index 0000000000..ac3fc63d9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-4534912fcab3ecf2a9fe501762efc225.yaml @@ -0,0 +1,58 @@ +id: eventon-4534912fcab3ecf2a9fe501762efc225 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.7 (Free) - Missing Authorization via get_virtual_users + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2994fbb-29b0-4725-a046-edeca4bcbcd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-537515ca49a9f4b41a11d36cd380e6f4.yaml b/nuclei-templates/cve-less/plugins/eventon-537515ca49a9f4b41a11d36cd380e6f4.yaml new file mode 100644 index 0000000000..08f41b36df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-537515ca49a9f4b41a11d36cd380e6f4.yaml @@ -0,0 +1,58 @@ +id: eventon-537515ca49a9f4b41a11d36cd380e6f4 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin Pro <= 4.5.4 & Free <= 2.2.7 - Missing Authorization to Arbitrary Post Meta Update via evo_eventpost_update_meta + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19f94c4f-145b-4058-aabd-06525fce3cea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-68358961295abb7462ad91426e0c3310.yaml b/nuclei-templates/cve-less/plugins/eventon-68358961295abb7462ad91426e0c3310.yaml new file mode 100644 index 0000000000..7c6fc90365 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-68358961295abb7462ad91426e0c3310.yaml @@ -0,0 +1,58 @@ +id: eventon-68358961295abb7462ad91426e0c3310 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.8 (Free) - Cross-Site Request Forgery via save_virtual_event_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fcc3a82-f116-446e-9e5f-4f074e20403b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-6c5fd9bdbd84a5f94cf449613dea61df.yaml b/nuclei-templates/cve-less/plugins/eventon-6c5fd9bdbd84a5f94cf449613dea61df.yaml new file mode 100644 index 0000000000..3a525ac6a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-6c5fd9bdbd84a5f94cf449613dea61df.yaml @@ -0,0 +1,58 @@ +id: eventon-6c5fd9bdbd84a5f94cf449613dea61df + +info: + name: > + EventON <= 2.1 - Insecure Direct Object Reference to Unauthorized Post Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1485dda6-bf83-4076-80c9-dc7ea9d58155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-83c99024de6733ef722985ade6213db3.yaml b/nuclei-templates/cve-less/plugins/eventon-83c99024de6733ef722985ade6213db3.yaml new file mode 100644 index 0000000000..4318fcb3ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-83c99024de6733ef722985ade6213db3.yaml @@ -0,0 +1,58 @@ +id: eventon-83c99024de6733ef722985ade6213db3 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.7 (Free) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67fc4141-7875-459b-98d8-d14e0a6f566c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-9a365d69136d08070aadedc43ca85c95.yaml b/nuclei-templates/cve-less/plugins/eventon-9a365d69136d08070aadedc43ca85c95.yaml new file mode 100644 index 0000000000..b30a4afad6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-9a365d69136d08070aadedc43ca85c95.yaml @@ -0,0 +1,58 @@ +id: eventon-9a365d69136d08070aadedc43ca85c95 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.8 (Pro) & <= 2.2.7 (Free) - Missing Authorization via eventon_save_virtual_event_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/220ca462-6a5b-440e-badf-d253e2b6b1f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-bfc5e831d060dfacf2a5fc44dc2fba98.yaml b/nuclei-templates/cve-less/plugins/eventon-bfc5e831d060dfacf2a5fc44dc2fba98.yaml new file mode 100644 index 0000000000..93982bd665 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-bfc5e831d060dfacf2a5fc44dc2fba98.yaml @@ -0,0 +1,58 @@ +id: eventon-bfc5e831d060dfacf2a5fc44dc2fba98 + +info: + name: > + EventON <= 3.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/577b4738-fa58-44b2-a8e7-ef59925f26a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon/" + google-query: inurl:"/wp-content/plugins/eventon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-187d65743de5f807e3a3561c30924b2f.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-187d65743de5f807e3a3561c30924b2f.yaml new file mode 100644 index 0000000000..a8ad3d7c44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-187d65743de5f807e3a3561c30924b2f.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-187d65743de5f807e3a3561c30924b2f + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin Pro <= 4.5.4 & Free <= 2.2.7 - Cross-Site Request Forgery via evo_eventpost_update_meta + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8e9a333-a6b7-4b5e-93c1-b95566e5d6fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-2c733617d0e1924a092044fd73aaa5a5.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-2c733617d0e1924a092044fd73aaa5a5.yaml new file mode 100644 index 0000000000..8479981dd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-2c733617d0e1924a092044fd73aaa5a5.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-2c733617d0e1924a092044fd73aaa5a5 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.7 (Free) - Missing Authorization via config_virtual_event + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae603d27-aea5-49d9-beab-db18746ffe87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-32a06eefdb3abe2eefd8adc33ab67b7c.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-32a06eefdb3abe2eefd8adc33ab67b7c.yaml new file mode 100644 index 0000000000..56c66b8924 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-32a06eefdb3abe2eefd8adc33ab67b7c.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-32a06eefdb3abe2eefd8adc33ab67b7c + +info: + name: > + EventON <= 2.1.7 - Authenticated (Admin+) HTML Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f9bd960-01ef-41dd-ab05-0a5f734484a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-34378358cea5d52c68afc57717376111.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-34378358cea5d52c68afc57717376111.yaml new file mode 100644 index 0000000000..5f55c46c52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-34378358cea5d52c68afc57717376111.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-34378358cea5d52c68afc57717376111 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.7 (Free) - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec2daf19-51ef-4e1b-becb-252955a61523?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-4534912fcab3ecf2a9fe501762efc225.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-4534912fcab3ecf2a9fe501762efc225.yaml new file mode 100644 index 0000000000..af2871d3b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-4534912fcab3ecf2a9fe501762efc225.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-4534912fcab3ecf2a9fe501762efc225 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.7 (Free) - Missing Authorization via get_virtual_users + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2994fbb-29b0-4725-a046-edeca4bcbcd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-537515ca49a9f4b41a11d36cd380e6f4.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-537515ca49a9f4b41a11d36cd380e6f4.yaml new file mode 100644 index 0000000000..bcf859e0d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-537515ca49a9f4b41a11d36cd380e6f4.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-537515ca49a9f4b41a11d36cd380e6f4 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin Pro <= 4.5.4 & Free <= 2.2.7 - Missing Authorization to Arbitrary Post Meta Update via evo_eventpost_update_meta + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19f94c4f-145b-4058-aabd-06525fce3cea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-68358961295abb7462ad91426e0c3310.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-68358961295abb7462ad91426e0c3310.yaml new file mode 100644 index 0000000000..f83409c3b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-68358961295abb7462ad91426e0c3310.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-68358961295abb7462ad91426e0c3310 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.8 (Free) - Cross-Site Request Forgery via save_virtual_event_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fcc3a82-f116-446e-9e5f-4f074e20403b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-6c5fd9bdbd84a5f94cf449613dea61df.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-6c5fd9bdbd84a5f94cf449613dea61df.yaml new file mode 100644 index 0000000000..2add528d1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-6c5fd9bdbd84a5f94cf449613dea61df.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-6c5fd9bdbd84a5f94cf449613dea61df + +info: + name: > + EventON <= 2.1 - Insecure Direct Object Reference to Unauthorized Post Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1485dda6-bf83-4076-80c9-dc7ea9d58155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-83c99024de6733ef722985ade6213db3.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-83c99024de6733ef722985ade6213db3.yaml new file mode 100644 index 0000000000..e3892f780a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-83c99024de6733ef722985ade6213db3.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-83c99024de6733ef722985ade6213db3 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.4 (Pro) & <= 2.2.7 (Free) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67fc4141-7875-459b-98d8-d14e0a6f566c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-9854f6b7648b36ab18b7baf1bd96dfc8.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-9854f6b7648b36ab18b7baf1bd96dfc8.yaml new file mode 100644 index 0000000000..1840a64c25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-9854f6b7648b36ab18b7baf1bd96dfc8.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-9854f6b7648b36ab18b7baf1bd96dfc8 + +info: + name: > + EventON <= 2.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/115ad0b2-febe-485a-8fb5-9bd6edc37ef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-9a365d69136d08070aadedc43ca85c95.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-9a365d69136d08070aadedc43ca85c95.yaml new file mode 100644 index 0000000000..d4ae21259d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-9a365d69136d08070aadedc43ca85c95.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-9a365d69136d08070aadedc43ca85c95 + +info: + name: > + EventON - WordPress Virtual Event Calendar Plugin <= 4.5.8 (Pro) & <= 2.2.7 (Free) - Missing Authorization via eventon_save_virtual_event_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/220ca462-6a5b-440e-badf-d253e2b6b1f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-b285571aa8961228c020fb748a563a39.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-b285571aa8961228c020fb748a563a39.yaml new file mode 100644 index 0000000000..2f12768b0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-b285571aa8961228c020fb748a563a39.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-b285571aa8961228c020fb748a563a39 + +info: + name: > + EventON <= 2.1 - Missing Authorization to Event Access + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dba3f3a6-3f55-4f4e-98e4-bb98d9c94bdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-eb5eba3fb055e3f1a65941e7a11b92d0.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-eb5eba3fb055e3f1a65941e7a11b92d0.yaml new file mode 100644 index 0000000000..8f8227baeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-eb5eba3fb055e3f1a65941e7a11b92d0.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-eb5eba3fb055e3f1a65941e7a11b92d0 + +info: + name: > + EventON <= 2.2.14 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a044983-1ec7-464b-aa5d-d479be45bb1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-lite-fb01f61580a3daa6743e2536b3904a23.yaml b/nuclei-templates/cve-less/plugins/eventon-lite-fb01f61580a3daa6743e2536b3904a23.yaml new file mode 100644 index 0000000000..4287f24630 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-lite-fb01f61580a3daa6743e2536b3904a23.yaml @@ -0,0 +1,58 @@ +id: eventon-lite-fb01f61580a3daa6743e2536b3904a23 + +info: + name: > + EventON <= 2.1.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bba6567f-457b-44fd-993a-3f5380a2c3fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-lite/" + google-query: inurl:"/wp-content/plugins/eventon-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventon-rsvp-e0185b582d68cb517dbdd113cf354faa.yaml b/nuclei-templates/cve-less/plugins/eventon-rsvp-e0185b582d68cb517dbdd113cf354faa.yaml new file mode 100644 index 0000000000..efd0b489b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventon-rsvp-e0185b582d68cb517dbdd113cf354faa.yaml @@ -0,0 +1,58 @@ +id: eventon-rsvp-e0185b582d68cb517dbdd113cf354faa + +info: + name: > + RSVP Events <= 2.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aac9be6c-7498-482e-8c38-da17a2c7f00a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventon-rsvp/" + google-query: inurl:"/wp-content/plugins/eventon-rsvp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventon-rsvp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventon-rsvp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventon-rsvp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-0518a583283f442e889b7000a0f04a7c.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-0518a583283f442e889b7000a0f04a7c.yaml new file mode 100644 index 0000000000..de129e65b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-0518a583283f442e889b7000a0f04a7c.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-0518a583283f442e889b7000a0f04a7c + +info: + name: > + EventPrime – Events Calendar, Bookings and Tickets <= 3.4.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Email Sending + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/346049ca-1bc5-4e02-9f38-d1f64338709d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-0ce22c0fe7f774ad920004b34c3c97f2.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-0ce22c0fe7f774ad920004b34c3c97f2.yaml new file mode 100644 index 0000000000..8605199f73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-0ce22c0fe7f774ad920004b34c3c97f2.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-0ce22c0fe7f774ad920004b34c3c97f2 + +info: + name: > + EventPrime <= 3.3.2 - Improper Server-Side Checks to Booking Payment Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98ef80a3-4d57-45ae-87cf-d5768b26c27e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3bc30bc01f7305f10a41312e9c39291f.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3bc30bc01f7305f10a41312e9c39291f.yaml new file mode 100644 index 0000000000..b479132334 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3bc30bc01f7305f10a41312e9c39291f.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-3bc30bc01f7305f10a41312e9c39291f + +info: + name: > + EventPrime <= 3.3.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3d71289-e5a3-4145-817f-c2cac8405202?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3d6ad1520c77aad1133699654b17aff7.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3d6ad1520c77aad1133699654b17aff7.yaml new file mode 100644 index 0000000000..7ffd1c32ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3d6ad1520c77aad1133699654b17aff7.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-3d6ad1520c77aad1133699654b17aff7 + +info: + name: > + EventPrime <= 3.3.5 - Missing Authorization to Private Event Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5baea929-0c46-4a43-b2af-367c0b5037bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3fbde3febf513db2a577aee06321eb0b.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3fbde3febf513db2a577aee06321eb0b.yaml new file mode 100644 index 0000000000..7456ca05e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-3fbde3febf513db2a577aee06321eb0b.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-3fbde3febf513db2a577aee06321eb0b + +info: + name: > + EventPrime – Events Calendar, Bookings and Tickets <= 3.4.1 - Missing Authorization to Authenticated (Subscriber+) Event Export + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39da62be-e630-48cd-b732-80ed3d337638?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-42040b470560c747a13bf2788592d50b.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-42040b470560c747a13bf2788592d50b.yaml new file mode 100644 index 0000000000..887820496e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-42040b470560c747a13bf2788592d50b.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-42040b470560c747a13bf2788592d50b + +info: + name: > + EventPrime – Events Calendar, Bookings and Tickets <= 3.4.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5278afb-9db3-4b1d-bb2f-e6595f0ac6dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-4d3269fa7a276b2eee412016f196b38c.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-4d3269fa7a276b2eee412016f196b38c.yaml new file mode 100644 index 0000000000..8690cca447 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-4d3269fa7a276b2eee412016f196b38c.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-4d3269fa7a276b2eee412016f196b38c + +info: + name: > + EventPrime < 3.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8ffdd43-b353-4296-bcb6-978751aae1b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-5484a37a07e396bedb80a8478f30a008.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-5484a37a07e396bedb80a8478f30a008.yaml new file mode 100644 index 0000000000..b3eb969cc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-5484a37a07e396bedb80a8478f30a008.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-5484a37a07e396bedb80a8478f30a008 + +info: + name: > + EventPrime <= 2.8.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22479c6a-83ea-4c09-b192-4384ffbdcbf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-5610b8d447f64bccab677eca7d6526f5.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-5610b8d447f64bccab677eca7d6526f5.yaml new file mode 100644 index 0000000000..31e40106b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-5610b8d447f64bccab677eca7d6526f5.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-5610b8d447f64bccab677eca7d6526f5 + +info: + name: > + EventPrime – Events Calendar, Bookings and Tickets <= 3.4.1 - Missing Authorization to Authenticated (Subscriber+) Attendee List Retrieval + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d266b6ee-24ec-4363-a986-5ccd4db5ae3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-7e0a85cefa9d78b7f58f293d006f3397.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-7e0a85cefa9d78b7f58f293d006f3397.yaml new file mode 100644 index 0000000000..6bbe5e3b71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-7e0a85cefa9d78b7f58f293d006f3397.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-7e0a85cefa9d78b7f58f293d006f3397 + +info: + name: > + EventPrime – Events Calendar, Bookings and Tickets <= 3.4.2 - Unauthenticated Booking Payment Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/765d0933-8db2-471c-ad4e-e19d3b4ff015?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-7faa6bde45e1f2f5ce5eafbc2fbeb516.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-7faa6bde45e1f2f5ce5eafbc2fbeb516.yaml new file mode 100644 index 0000000000..c76c37df81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-7faa6bde45e1f2f5ce5eafbc2fbeb516.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-7faa6bde45e1f2f5ce5eafbc2fbeb516 + +info: + name: > + EventPrime <= 3.3.9 - Improper Input Validation via save_event_booking + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17cbcf67-f10d-41bc-acf7-98e5d99b50af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-8aeb2b8f9fd8f5408bc5cbce23cde23a.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-8aeb2b8f9fd8f5408bc5cbce23cde23a.yaml new file mode 100644 index 0000000000..f9eb1cb688 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-8aeb2b8f9fd8f5408bc5cbce23cde23a.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-8aeb2b8f9fd8f5408bc5cbce23cde23a + +info: + name: > + EventPrime – Events Calendar, Bookings and Tickets <= 3.4.2 - Missing Authorization to Arbitrary Post Overwrite + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/351926d4-a9be-4fbd-bdf2-8bbff41d97ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-98364cc3fafc257904edef9d7b1a931a.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-98364cc3fafc257904edef9d7b1a931a.yaml new file mode 100644 index 0000000000..7a2bdc5e98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-98364cc3fafc257904edef9d7b1a931a.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-98364cc3fafc257904edef9d7b1a931a + +info: + name: > + EventPrime – Events Calendar, Bookings and Tickets <= 3.4.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e82e1c5-0ed4-4dee-9990-976591693eb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-aaa60a656a1631ccb0bbf7769cde29dc.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-aaa60a656a1631ccb0bbf7769cde29dc.yaml new file mode 100644 index 0000000000..fcfaf2ea33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-aaa60a656a1631ccb0bbf7769cde29dc.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-aaa60a656a1631ccb0bbf7769cde29dc + +info: + name: > + EventPrime <= 3.1.5 - Reflected Cross-Site Scripting via 'event_id' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/399848fd-e9f6-40e4-bfeb-08f53eb511c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-c14577a628b19f58f816579d213106ef.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-c14577a628b19f58f816579d213106ef.yaml new file mode 100644 index 0000000000..9ae5f8a27c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-c14577a628b19f58f816579d213106ef.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-c14577a628b19f58f816579d213106ef + +info: + name: > + EventPrime <= 3.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0aad7f55-d1f0-45f9-ba8b-74170c32374f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-d1b60cf010a4c4b99d620cf0f040e27a.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-d1b60cf010a4c4b99d620cf0f040e27a.yaml new file mode 100644 index 0000000000..bb6b036e2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-d1b60cf010a4c4b99d620cf0f040e27a.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-d1b60cf010a4c4b99d620cf0f040e27a + +info: + name: > + EventPrime – Modern Events Calendar, Bookings and Tickets <= 3.3.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5124be64-6679-4dc5-8117-55c73ae91489?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-d621f315674a851e95757dca3af1ff0a.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-d621f315674a851e95757dca3af1ff0a.yaml new file mode 100644 index 0000000000..cef3da61fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-d621f315674a851e95757dca3af1ff0a.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-d621f315674a851e95757dca3af1ff0a + +info: + name: > + EventPrime <= 2.8.6 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fdd0a4c-ce47-44bc-b9a5-a8f2af12da85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-e40a3e8ea03e0231ec1106a753934528.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-e40a3e8ea03e0231ec1106a753934528.yaml new file mode 100644 index 0000000000..3b556884f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-e40a3e8ea03e0231ec1106a753934528.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-e40a3e8ea03e0231ec1106a753934528 + +info: + name: > + EventPrime <= 3.3.4 - Missing Authorization to Booking Price Maniputlation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9516e64c-1959-4980-9a96-c6f5f1baa6f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-ee51cf1fa55e4a9d226a63dcaad1a260.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-ee51cf1fa55e4a9d226a63dcaad1a260.yaml new file mode 100644 index 0000000000..e3ac9502d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-ee51cf1fa55e4a9d226a63dcaad1a260.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-ee51cf1fa55e4a9d226a63dcaad1a260 + +info: + name: > + EventPrime < 3.2.0 - Reflected HTML Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed881d06-e652-45ac-8f56-c2db9e403485?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-ef2d23d82a10c333e2eaaf91d1a798ba.yaml b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-ef2d23d82a10c333e2eaaf91d1a798ba.yaml new file mode 100644 index 0000000000..d74b605ddb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventprime-event-calendar-management-ef2d23d82a10c333e2eaaf91d1a798ba.yaml @@ -0,0 +1,58 @@ +id: eventprime-event-calendar-management-ef2d23d82a10c333e2eaaf91d1a798ba + +info: + name: > + EventPrime < 3.2.0 - Reflected Cross-Site Scripting via keyword and ep_filter_date + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/766e34a9-ed95-4049-ba48-0bf69134e4ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventprime-event-calendar-management/" + google-query: inurl:"/wp-content/plugins/eventprime-event-calendar-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventprime-event-calendar-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventprime-event-calendar-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventprime-event-calendar-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventr-3555e671fb855ca8a86dbba28248a06b.yaml b/nuclei-templates/cve-less/plugins/eventr-3555e671fb855ca8a86dbba28248a06b.yaml new file mode 100644 index 0000000000..3ff633d7cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventr-3555e671fb855ca8a86dbba28248a06b.yaml @@ -0,0 +1,58 @@ +id: eventr-3555e671fb855ca8a86dbba28248a06b + +info: + name: > + eventr <= 1.02.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b26d61de-651c-43de-ba90-33ef170755e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventr/" + google-query: inurl:"/wp-content/plugins/eventr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventr,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.02.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eventr-55a68c58c48b9986849ddaa1407aa30f.yaml b/nuclei-templates/cve-less/plugins/eventr-55a68c58c48b9986849ddaa1407aa30f.yaml new file mode 100644 index 0000000000..08eabb2803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eventr-55a68c58c48b9986849ddaa1407aa30f.yaml @@ -0,0 +1,58 @@ +id: eventr-55a68c58c48b9986849ddaa1407aa30f + +info: + name: > + Eventr <= 1.02.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29adf3d2-b3a4-43f3-9aaa-bd2cf6cd115b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eventr/" + google-query: inurl:"/wp-content/plugins/eventr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eventr,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eventr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.02.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-2ad357ed5ae7046d44da5210b6526312.yaml b/nuclei-templates/cve-less/plugins/events-2ad357ed5ae7046d44da5210b6526312.yaml new file mode 100644 index 0000000000..6594cb01e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-2ad357ed5ae7046d44da5210b6526312.yaml @@ -0,0 +1,58 @@ +id: events-2ad357ed5ae7046d44da5210b6526312 + +info: + name: > + WP Events Calendar Plugin <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e630401-0409-443c-944d-553a372d150d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events/" + google-query: inurl:"/wp-content/plugins/events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-addon-for-elementor-8162890ff35ac91aaaabb28f65bfd97b.yaml b/nuclei-templates/cve-less/plugins/events-addon-for-elementor-8162890ff35ac91aaaabb28f65bfd97b.yaml new file mode 100644 index 0000000000..71b6472e3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-addon-for-elementor-8162890ff35ac91aaaabb28f65bfd97b.yaml @@ -0,0 +1,58 @@ +id: events-addon-for-elementor-8162890ff35ac91aaaabb28f65bfd97b + +info: + name: > + Events Addon for Elementor <= 2.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5256ef2b-e1fc-4746-b35e-07a265f47f95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/events-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-addon-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-addon-for-elementor-a83b5885cc29169b3a804ccaa82ed3fd.yaml b/nuclei-templates/cve-less/plugins/events-addon-for-elementor-a83b5885cc29169b3a804ccaa82ed3fd.yaml new file mode 100644 index 0000000000..d43a35bbff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-addon-for-elementor-a83b5885cc29169b3a804ccaa82ed3fd.yaml @@ -0,0 +1,58 @@ +id: events-addon-for-elementor-a83b5885cc29169b3a804ccaa82ed3fd + +info: + name: > + Events Addon for Elementor <= 2.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7f52e71-da35-4b46-b658-d293f81b5dc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/events-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-addon-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/events-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5add2428a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: events-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/events-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-addon-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-calendar-registration-booking-by-events-plus-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/events-calendar-registration-booking-by-events-plus-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ee81c552be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-calendar-registration-booking-by-events-plus-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: events-calendar-registration-booking-by-events-plus-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-calendar-registration-booking-by-events-plus/" + google-query: inurl:"/wp-content/plugins/events-calendar-registration-booking-by-events-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-calendar-registration-booking-by-events-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-calendar-registration-booking-by-events-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-calendar-registration-booking-by-events-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-made-easy-2f7fd4d18b200014ffe6ce74713f97bf.yaml b/nuclei-templates/cve-less/plugins/events-made-easy-2f7fd4d18b200014ffe6ce74713f97bf.yaml new file mode 100644 index 0000000000..9a0232265f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-made-easy-2f7fd4d18b200014ffe6ce74713f97bf.yaml @@ -0,0 +1,58 @@ +id: events-made-easy-2f7fd4d18b200014ffe6ce74713f97bf + +info: + name: > + Events Made Easy < 1.5.50 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/914e17ce-ab09-4e9f-9466-0ed21712cf66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-made-easy/" + google-query: inurl:"/wp-content/plugins/events-made-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-made-easy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-made-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-made-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-made-easy-6f97964629a2d8890727a9938703cfc3.yaml b/nuclei-templates/cve-less/plugins/events-made-easy-6f97964629a2d8890727a9938703cfc3.yaml new file mode 100644 index 0000000000..8303109052 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-made-easy-6f97964629a2d8890727a9938703cfc3.yaml @@ -0,0 +1,58 @@ +id: events-made-easy-6f97964629a2d8890727a9938703cfc3 + +info: + name: > + Events Made Easy <= 2.3.14 - Authenticated (Subscriber+) SQL Injection via 'search_name' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2550461-2546-4dc4-85ff-decf2fca3f10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-made-easy/" + google-query: inurl:"/wp-content/plugins/events-made-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-made-easy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-made-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-made-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-made-easy-9bcf64c7dbe781ab40d3670dc81b8e8c.yaml b/nuclei-templates/cve-less/plugins/events-made-easy-9bcf64c7dbe781ab40d3670dc81b8e8c.yaml new file mode 100644 index 0000000000..fadf56b5aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-made-easy-9bcf64c7dbe781ab40d3670dc81b8e8c.yaml @@ -0,0 +1,58 @@ +id: events-made-easy-9bcf64c7dbe781ab40d3670dc81b8e8c + +info: + name: > + Events Made Easy <= 2.3.16 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a9e62de-3e70-424f-b8e5-2a5f07ca182d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-made-easy/" + google-query: inurl:"/wp-content/plugins/events-made-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-made-easy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-made-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-made-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-made-easy-a5068346d1e00e358b18b96ff80d8028.yaml b/nuclei-templates/cve-less/plugins/events-made-easy-a5068346d1e00e358b18b96ff80d8028.yaml new file mode 100644 index 0000000000..c122a2d86f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-made-easy-a5068346d1e00e358b18b96ff80d8028.yaml @@ -0,0 +1,58 @@ +id: events-made-easy-a5068346d1e00e358b18b96ff80d8028 + +info: + name: > + Events Made Easy <= 2.2.23 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a4488c8-7138-4046-88ea-84f9462eec93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-made-easy/" + google-query: inurl:"/wp-content/plugins/events-made-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-made-easy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-made-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-made-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-made-easy-c2b3f954259c6ede40d68798a9520dde.yaml b/nuclei-templates/cve-less/plugins/events-made-easy-c2b3f954259c6ede40d68798a9520dde.yaml new file mode 100644 index 0000000000..ada49a8982 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-made-easy-c2b3f954259c6ede40d68798a9520dde.yaml @@ -0,0 +1,58 @@ +id: events-made-easy-c2b3f954259c6ede40d68798a9520dde + +info: + name: > + Events Made Easy <= 2.2.80 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/613f4bd1-e29a-4853-84a2-3e1437f06d33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-made-easy/" + google-query: inurl:"/wp-content/plugins/events-made-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-made-easy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-made-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-made-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.80') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-made-easy-df8b0e3e82913bd73f66e923babf0341.yaml b/nuclei-templates/cve-less/plugins/events-made-easy-df8b0e3e82913bd73f66e923babf0341.yaml new file mode 100644 index 0000000000..0f8f1e0cf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-made-easy-df8b0e3e82913bd73f66e923babf0341.yaml @@ -0,0 +1,58 @@ +id: events-made-easy-df8b0e3e82913bd73f66e923babf0341 + +info: + name: > + Events Made Easy <= 1.6.20 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/deba9cd0-2c7e-4789-8499-977c694aba8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-made-easy/" + google-query: inurl:"/wp-content/plugins/events-made-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-made-easy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-made-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-made-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-made-easy-fb606eac6f1cd09b63793985561a9ded.yaml b/nuclei-templates/cve-less/plugins/events-made-easy-fb606eac6f1cd09b63793985561a9ded.yaml new file mode 100644 index 0000000000..f392922d39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-made-easy-fb606eac6f1cd09b63793985561a9ded.yaml @@ -0,0 +1,58 @@ +id: events-made-easy-fb606eac6f1cd09b63793985561a9ded + +info: + name: > + Events Made Easy <= 2.2.35 - Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb23c4d7-d9be-4162-bb7b-8a74f3c339eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-made-easy/" + google-query: inurl:"/wp-content/plugins/events-made-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-made-easy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-made-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-made-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-1c184d32846ab99f4fc87c2987b808cb.yaml b/nuclei-templates/cve-less/plugins/events-manager-1c184d32846ab99f4fc87c2987b808cb.yaml new file mode 100644 index 0000000000..23266e8796 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-1c184d32846ab99f4fc87c2987b808cb.yaml @@ -0,0 +1,58 @@ +id: events-manager-1c184d32846ab99f4fc87c2987b808cb + +info: + name: > + Events Manager <= 6.4.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0538999-0a09-4d24-a530-a32fb5b4e5e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-33af423ffa646dbaa07cc6063b09bc62.yaml b/nuclei-templates/cve-less/plugins/events-manager-33af423ffa646dbaa07cc6063b09bc62.yaml new file mode 100644 index 0000000000..448789b050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-33af423ffa646dbaa07cc6063b09bc62.yaml @@ -0,0 +1,58 @@ +id: events-manager-33af423ffa646dbaa07cc6063b09bc62 + +info: + name: > + Events Manager <= 6.4.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95ded4bf-9964-4bb3-b6e5-5ad37360f87d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-3f14554541d5c07fa1b8df4c175de3d3.yaml b/nuclei-templates/cve-less/plugins/events-manager-3f14554541d5c07fa1b8df4c175de3d3.yaml new file mode 100644 index 0000000000..c62abfb705 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-3f14554541d5c07fa1b8df4c175de3d3.yaml @@ -0,0 +1,58 @@ +id: events-manager-3f14554541d5c07fa1b8df4c175de3d3 + +info: + name: > + Events Manager < 5.5.7.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df4ad83f-280e-46fa-ad47-3822fa67b10d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-60e9ce57276e284607640edd3669122a.yaml b/nuclei-templates/cve-less/plugins/events-manager-60e9ce57276e284607640edd3669122a.yaml new file mode 100644 index 0000000000..d2cfffc6e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-60e9ce57276e284607640edd3669122a.yaml @@ -0,0 +1,58 @@ +id: events-manager-60e9ce57276e284607640edd3669122a + +info: + name: > + Events Manager <= 5.5.7.1 - Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb66378c-4e64-4f05-a466-72a3c2d0b330?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-644174d3b6cb573b8ad1e776e7aafb01.yaml b/nuclei-templates/cve-less/plugins/events-manager-644174d3b6cb573b8ad1e776e7aafb01.yaml new file mode 100644 index 0000000000..eea1c9b1d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-644174d3b6cb573b8ad1e776e7aafb01.yaml @@ -0,0 +1,58 @@ +id: events-manager-644174d3b6cb573b8ad1e776e7aafb01 + +info: + name: > + Events Manager <= 6.4.6.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eb0aa16-a269-4297-861f-6bad88066c68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-6fb53b909e681612242b9b19b0af96e9.yaml b/nuclei-templates/cve-less/plugins/events-manager-6fb53b909e681612242b9b19b0af96e9.yaml new file mode 100644 index 0000000000..5d761b10dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-6fb53b909e681612242b9b19b0af96e9.yaml @@ -0,0 +1,58 @@ +id: events-manager-6fb53b909e681612242b9b19b0af96e9 + +info: + name: > + Events Manager <= 5.9.7.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/156e64f2-87a4-40a0-bac8-3dc1f702b0a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-7961a00c8fec25ebf767309437be3781.yaml b/nuclei-templates/cve-less/plugins/events-manager-7961a00c8fec25ebf767309437be3781.yaml new file mode 100644 index 0000000000..232d49cb47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-7961a00c8fec25ebf767309437be3781.yaml @@ -0,0 +1,58 @@ +id: events-manager-7961a00c8fec25ebf767309437be3781 + +info: + name: > + Events Manager <= 5.9.7.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2244c29-9d79-47d5-b077-bf04a9199cdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-7f61d132e9ad7bb4333f632fb4ac561f.yaml b/nuclei-templates/cve-less/plugins/events-manager-7f61d132e9ad7bb4333f632fb4ac561f.yaml new file mode 100644 index 0000000000..59800f963c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-7f61d132e9ad7bb4333f632fb4ac561f.yaml @@ -0,0 +1,58 @@ +id: events-manager-7f61d132e9ad7bb4333f632fb4ac561f + +info: + name: > + Events Manager < 5.5.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a43ffb6e-8044-4496-9496-11fa8e52a044?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-83ef28839c75055ae7537f111049194c.yaml b/nuclei-templates/cve-less/plugins/events-manager-83ef28839c75055ae7537f111049194c.yaml new file mode 100644 index 0000000000..a662b5cb9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-83ef28839c75055ae7537f111049194c.yaml @@ -0,0 +1,58 @@ +id: events-manager-83ef28839c75055ae7537f111049194c + +info: + name: > + Events Manager <= 5.9.7.3 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0ccb39b-faf1-428b-bfa7-c30d402bd34d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-944355331d4d9eab9649c96fbc1339dc.yaml b/nuclei-templates/cve-less/plugins/events-manager-944355331d4d9eab9649c96fbc1339dc.yaml new file mode 100644 index 0000000000..4931d5a171 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-944355331d4d9eab9649c96fbc1339dc.yaml @@ -0,0 +1,58 @@ +id: events-manager-944355331d4d9eab9649c96fbc1339dc + +info: + name: > + Events Manager < 5.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/207f7684-aeee-4267-ba29-ca9aacc0a690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-96287411a0b4f9828a8db098282ac68f.yaml b/nuclei-templates/cve-less/plugins/events-manager-96287411a0b4f9828a8db098282ac68f.yaml new file mode 100644 index 0000000000..7641bd57b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-96287411a0b4f9828a8db098282ac68f.yaml @@ -0,0 +1,58 @@ +id: events-manager-96287411a0b4f9828a8db098282ac68f + +info: + name: > + Events Manager <= 6.4.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86351e2c-8c5a-4d71-bd73-d5ae1f03038f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-9691566897b1cf3f102fa4ca66fa2b90.yaml b/nuclei-templates/cve-less/plugins/events-manager-9691566897b1cf3f102fa4ca66fa2b90.yaml new file mode 100644 index 0000000000..8d2750ddf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-9691566897b1cf3f102fa4ca66fa2b90.yaml @@ -0,0 +1,58 @@ +id: events-manager-9691566897b1cf3f102fa4ca66fa2b90 + +info: + name: > + Events Manager <= 5.9.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/249acca6-49b4-4ddf-af75-31f68921fc19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-9dd081367b7c3b91dad73b336bd866df.yaml b/nuclei-templates/cve-less/plugins/events-manager-9dd081367b7c3b91dad73b336bd866df.yaml new file mode 100644 index 0000000000..c11222bd26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-9dd081367b7c3b91dad73b336bd866df.yaml @@ -0,0 +1,58 @@ +id: events-manager-9dd081367b7c3b91dad73b336bd866df + +info: + name: > + Events Manager <= 6.4.6.4 - Authenticated(Administator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6288fddf-926f-4506-94de-696e0a23766d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-ad055d1685348a8fa4aef50dfdf0211f.yaml b/nuclei-templates/cve-less/plugins/events-manager-ad055d1685348a8fa4aef50dfdf0211f.yaml new file mode 100644 index 0000000000..01615c5e6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-ad055d1685348a8fa4aef50dfdf0211f.yaml @@ -0,0 +1,58 @@ +id: events-manager-ad055d1685348a8fa4aef50dfdf0211f + +info: + name: > + Events Manager < 5.3.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cb95e28-449b-4ed7-9c44-ade171e0ecee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-af430c9858b5bde975d56075509bcf57.yaml b/nuclei-templates/cve-less/plugins/events-manager-af430c9858b5bde975d56075509bcf57.yaml new file mode 100644 index 0000000000..354e49ee1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-af430c9858b5bde975d56075509bcf57.yaml @@ -0,0 +1,58 @@ +id: events-manager-af430c9858b5bde975d56075509bcf57 + +info: + name: > + Events Manager <= 5.5.7.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee4e08e0-25b7-47b2-9ec2-de93afc437a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-b1f45416f5a631250c26ec095bcb39a3.yaml b/nuclei-templates/cve-less/plugins/events-manager-b1f45416f5a631250c26ec095bcb39a3.yaml new file mode 100644 index 0000000000..2cdaab1f03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-b1f45416f5a631250c26ec095bcb39a3.yaml @@ -0,0 +1,58 @@ +id: events-manager-b1f45416f5a631250c26ec095bcb39a3 + +info: + name: > + Events Manager < 5.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e247c919-6210-4769-9022-d7f7a0178f14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-bb7f415bbeb4b2bf0d001b37770eebf6.yaml b/nuclei-templates/cve-less/plugins/events-manager-bb7f415bbeb4b2bf0d001b37770eebf6.yaml new file mode 100644 index 0000000000..49347d60a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-bb7f415bbeb4b2bf0d001b37770eebf6.yaml @@ -0,0 +1,58 @@ +id: events-manager-bb7f415bbeb4b2bf0d001b37770eebf6 + +info: + name: > + Events Manager <= 6.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9053cf91-0af1-44f8-9fdf-7ecbd457545b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-bf648a28f236904436ac42427351efb1.yaml b/nuclei-templates/cve-less/plugins/events-manager-bf648a28f236904436ac42427351efb1.yaml new file mode 100644 index 0000000000..68659dd0a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-bf648a28f236904436ac42427351efb1.yaml @@ -0,0 +1,58 @@ +id: events-manager-bf648a28f236904436ac42427351efb1 + +info: + name: > + Events Manager <= 5.8.1.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/738a9651-974e-4861-be7a-2d9b191d582b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-e1116b6e664ddbf85fd8a65fd5661abf.yaml b/nuclei-templates/cve-less/plugins/events-manager-e1116b6e664ddbf85fd8a65fd5661abf.yaml new file mode 100644 index 0000000000..4f05c1ee75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-e1116b6e664ddbf85fd8a65fd5661abf.yaml @@ -0,0 +1,58 @@ +id: events-manager-e1116b6e664ddbf85fd8a65fd5661abf + +info: + name: > + Events Manager < 5.9.7.2 & Events Manager Pro < 2.6.7.2 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74b81d31-8ee6-47cf-a5e8-3cf0900ebea0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-e976dbcc632c2ee3b143a7604910e2c0.yaml b/nuclei-templates/cve-less/plugins/events-manager-e976dbcc632c2ee3b143a7604910e2c0.yaml new file mode 100644 index 0000000000..c27aec27c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-e976dbcc632c2ee3b143a7604910e2c0.yaml @@ -0,0 +1,58 @@ +id: events-manager-e976dbcc632c2ee3b143a7604910e2c0 + +info: + name: > + Events Manager <= 5.3.6 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efd25f74-3c4a-4f5a-8c81-f1d42ca2a541?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-eb6226c8060abd8c26fc61f24da2a61e.yaml b/nuclei-templates/cve-less/plugins/events-manager-eb6226c8060abd8c26fc61f24da2a61e.yaml new file mode 100644 index 0000000000..620bedbca7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-eb6226c8060abd8c26fc61f24da2a61e.yaml @@ -0,0 +1,58 @@ +id: events-manager-eb6226c8060abd8c26fc61f24da2a61e + +info: + name: > + Events Manager <= 5.5.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/734b6ae0-b2f6-4bad-a6d3-bef48fd8cdd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-eb8f98aa61e3c3db7506a6098f7ccbda.yaml b/nuclei-templates/cve-less/plugins/events-manager-eb8f98aa61e3c3db7506a6098f7ccbda.yaml new file mode 100644 index 0000000000..91fa6c34c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-eb8f98aa61e3c3db7506a6098f7ccbda.yaml @@ -0,0 +1,58 @@ +id: events-manager-eb8f98aa61e3c3db7506a6098f7ccbda + +info: + name: > + Events Manager < 5.3.5 & Events Manager Pro < 2.2.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c4d2829-9f99-4a2d-9bde-476fae2c99a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-ee6754b66c3dcc79f507ad42121825d8.yaml b/nuclei-templates/cve-less/plugins/events-manager-ee6754b66c3dcc79f507ad42121825d8.yaml new file mode 100644 index 0000000000..26e1d39a26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-ee6754b66c3dcc79f507ad42121825d8.yaml @@ -0,0 +1,58 @@ +id: events-manager-ee6754b66c3dcc79f507ad42121825d8 + +info: + name: > + Events Manager <= 5.9.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94d2eaed-048b-40b6-9880-fa32fbb66f92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-fb28659ef74c6816e9ff94aaba73e076.yaml b/nuclei-templates/cve-less/plugins/events-manager-fb28659ef74c6816e9ff94aaba73e076.yaml new file mode 100644 index 0000000000..2e5699ade3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-fb28659ef74c6816e9ff94aaba73e076.yaml @@ -0,0 +1,58 @@ +id: events-manager-fb28659ef74c6816e9ff94aaba73e076 + +info: + name: > + Events Manager <= 5.8.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73241750-cd21-4eee-9d43-8c5e26f9b9cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-pro-e1116b6e664ddbf85fd8a65fd5661abf.yaml b/nuclei-templates/cve-less/plugins/events-manager-pro-e1116b6e664ddbf85fd8a65fd5661abf.yaml new file mode 100644 index 0000000000..c94c3f8777 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-pro-e1116b6e664ddbf85fd8a65fd5661abf.yaml @@ -0,0 +1,58 @@ +id: events-manager-pro-e1116b6e664ddbf85fd8a65fd5661abf + +info: + name: > + Events Manager < 5.9.7.2 & Events Manager Pro < 2.6.7.2 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74b81d31-8ee6-47cf-a5e8-3cf0900ebea0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager-pro/" + google-query: inurl:"/wp-content/plugins/events-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-manager-pro-eb8f98aa61e3c3db7506a6098f7ccbda.yaml b/nuclei-templates/cve-less/plugins/events-manager-pro-eb8f98aa61e3c3db7506a6098f7ccbda.yaml new file mode 100644 index 0000000000..e637bacfe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-manager-pro-eb8f98aa61e3c3db7506a6098f7ccbda.yaml @@ -0,0 +1,58 @@ +id: events-manager-pro-eb8f98aa61e3c3db7506a6098f7ccbda + +info: + name: > + Events Manager < 5.3.5 & Events Manager Pro < 2.2.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c4d2829-9f99-4a2d-9bde-476fae2c99a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-manager-pro/" + google-query: inurl:"/wp-content/plugins/events-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-manager-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-notification-bar-addon-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/events-notification-bar-addon-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..77542eb299 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-notification-bar-addon-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: events-notification-bar-addon-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-notification-bar-addon/" + google-query: inurl:"/wp-content/plugins/events-notification-bar-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-notification-bar-addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-notification-bar-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-notification-bar-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-search-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/events-search-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..54cf6e655a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-search-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: events-search-addon-for-the-events-calendar-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-search-addon-for-the-events-calendar/" + google-query: inurl:"/wp-content/plugins/events-search-addon-for-the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-search-addon-for-the-events-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-search-addon-for-the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-search-addon-for-the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/events-widgets-for-elementor-and-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/events-widgets-for-elementor-and-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..009c1092b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/events-widgets-for-elementor-and-the-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: events-widgets-for-elementor-and-the-events-calendar-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/events-widgets-for-elementor-and-the-events-calendar/" + google-query: inurl:"/wp-content/plugins/events-widgets-for-elementor-and-the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,events-widgets-for-elementor-and-the-events-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/events-widgets-for-elementor-and-the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "events-widgets-for-elementor-and-the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ever-compare-29989c774c0deb7fd695ddb2569712e6.yaml b/nuclei-templates/cve-less/plugins/ever-compare-29989c774c0deb7fd695ddb2569712e6.yaml new file mode 100644 index 0000000000..7280158ba8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ever-compare-29989c774c0deb7fd695ddb2569712e6.yaml @@ -0,0 +1,58 @@ +id: ever-compare-29989c774c0deb7fd695ddb2569712e6 + +info: + name: > + Ever Compare <= 1.2.3 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/702aa972-7b74-4417-8d33-a26c3831934f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ever-compare/" + google-query: inurl:"/wp-content/plugins/ever-compare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ever-compare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ever-compare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ever-compare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everest-backup-5c5b5355efecc468361938b2443e7783.yaml b/nuclei-templates/cve-less/plugins/everest-backup-5c5b5355efecc468361938b2443e7783.yaml new file mode 100644 index 0000000000..9bc5130beb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everest-backup-5c5b5355efecc468361938b2443e7783.yaml @@ -0,0 +1,58 @@ +id: everest-backup-5c5b5355efecc468361938b2443e7783 + +info: + name: > + Everest Backup <= 2.2.4 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52b13188-5630-4ae9-9b2b-bd4dcadd240a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everest-backup/" + google-query: inurl:"/wp-content/plugins/everest-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everest-backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everest-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everest-backup-a3c1423112a235a586d65da99a810a94.yaml b/nuclei-templates/cve-less/plugins/everest-backup-a3c1423112a235a586d65da99a810a94.yaml new file mode 100644 index 0000000000..8c00508d0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everest-backup-a3c1423112a235a586d65da99a810a94.yaml @@ -0,0 +1,58 @@ +id: everest-backup-a3c1423112a235a586d65da99a810a94 + +info: + name: > + Everest Backup <= 2.1.9 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31a54705-99e8-4e41-bf57-9365ab387228?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everest-backup/" + google-query: inurl:"/wp-content/plugins/everest-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everest-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everest-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everest-forms-0234441805a1275e4ae695da76693b08.yaml b/nuclei-templates/cve-less/plugins/everest-forms-0234441805a1275e4ae695da76693b08.yaml new file mode 100644 index 0000000000..4b1482ba75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everest-forms-0234441805a1275e4ae695da76693b08.yaml @@ -0,0 +1,58 @@ +id: everest-forms-0234441805a1275e4ae695da76693b08 + +info: + name: > + Everest Forms <= 2.0.3 - Unauthorized Form Submission via Disabled Forms + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc3d49c5-3054-4e1f-b571-6591a0b31d69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everest-forms/" + google-query: inurl:"/wp-content/plugins/everest-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everest-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everest-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everest-forms-5c3a1e24593bd044c08416c2f87d02e7.yaml b/nuclei-templates/cve-less/plugins/everest-forms-5c3a1e24593bd044c08416c2f87d02e7.yaml new file mode 100644 index 0000000000..cd65d8c362 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everest-forms-5c3a1e24593bd044c08416c2f87d02e7.yaml @@ -0,0 +1,58 @@ +id: everest-forms-5c3a1e24593bd044c08416c2f87d02e7 + +info: + name: > + Everest Forms <= 1.7.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5d67eb3-c399-437e-a504-2ccdda7c7882?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everest-forms/" + google-query: inurl:"/wp-content/plugins/everest-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everest-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everest-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everest-forms-7d693e04f09654267524d7ec908313ae.yaml b/nuclei-templates/cve-less/plugins/everest-forms-7d693e04f09654267524d7ec908313ae.yaml new file mode 100644 index 0000000000..8bf9cd9020 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everest-forms-7d693e04f09654267524d7ec908313ae.yaml @@ -0,0 +1,58 @@ +id: everest-forms-7d693e04f09654267524d7ec908313ae + +info: + name: > + Everest Forms <= 2.0.7 - Unauthenticated Server-Side Request Forgery via font_url + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4561441-d147-4c02-a837-c1656e17627d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everest-forms/" + google-query: inurl:"/wp-content/plugins/everest-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everest-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everest-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everest-forms-baf3d29a2681cdd1e172041c4de8c0ca.yaml b/nuclei-templates/cve-less/plugins/everest-forms-baf3d29a2681cdd1e172041c4de8c0ca.yaml new file mode 100644 index 0000000000..ddbb0490d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everest-forms-baf3d29a2681cdd1e172041c4de8c0ca.yaml @@ -0,0 +1,58 @@ +id: everest-forms-baf3d29a2681cdd1e172041c4de8c0ca + +info: + name: > + Contact Form, Drag and Drop Form Builder for WordPress – Everest Forms <= 1.4.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d5256ea-61ba-4b2d-90d6-714176bc19aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everest-forms/" + google-query: inurl:"/wp-content/plugins/everest-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everest-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everest-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everest-forms-f3431b49cff580f3171934059274a2a5.yaml b/nuclei-templates/cve-less/plugins/everest-forms-f3431b49cff580f3171934059274a2a5.yaml new file mode 100644 index 0000000000..bfb4dcbcca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everest-forms-f3431b49cff580f3171934059274a2a5.yaml @@ -0,0 +1,58 @@ +id: everest-forms-f3431b49cff580f3171934059274a2a5 + +info: + name: > + Everest Forms <= 2.0.4.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/381ec612-2086-4925-98cd-652a6c2ac081?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everest-forms/" + google-query: inurl:"/wp-content/plugins/everest-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everest-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everest-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/evergreen-content-poster-8c8032347c8a676583142ccf856ffd1b.yaml b/nuclei-templates/cve-less/plugins/evergreen-content-poster-8c8032347c8a676583142ccf856ffd1b.yaml new file mode 100644 index 0000000000..5dad2154c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/evergreen-content-poster-8c8032347c8a676583142ccf856ffd1b.yaml @@ -0,0 +1,58 @@ +id: evergreen-content-poster-8c8032347c8a676583142ccf856ffd1b + +info: + name: > + Evergreen Content Poster <= 1.4.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/232e6464-bd6c-4086-989a-00b84056c431?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/evergreen-content-poster/" + google-query: inurl:"/wp-content/plugins/evergreen-content-poster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,evergreen-content-poster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/evergreen-content-poster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "evergreen-content-poster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/evergreen-content-poster-92de377343f9b56c26e4f5ac1766852a.yaml b/nuclei-templates/cve-less/plugins/evergreen-content-poster-92de377343f9b56c26e4f5ac1766852a.yaml new file mode 100644 index 0000000000..6269a36a22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/evergreen-content-poster-92de377343f9b56c26e4f5ac1766852a.yaml @@ -0,0 +1,58 @@ +id: evergreen-content-poster-92de377343f9b56c26e4f5ac1766852a + +info: + name: > + Evergreen Content Poster <= 1.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7b67c83-7fb7-4bac-a8eb-7fc318f2ff50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/evergreen-content-poster/" + google-query: inurl:"/wp-content/plugins/evergreen-content-poster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,evergreen-content-poster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/evergreen-content-poster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "evergreen-content-poster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/evergreen-content-poster-d6daa696f95c257bf8628b3447d01ec3.yaml b/nuclei-templates/cve-less/plugins/evergreen-content-poster-d6daa696f95c257bf8628b3447d01ec3.yaml new file mode 100644 index 0000000000..befc11d023 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/evergreen-content-poster-d6daa696f95c257bf8628b3447d01ec3.yaml @@ -0,0 +1,58 @@ +id: evergreen-content-poster-d6daa696f95c257bf8628b3447d01ec3 + +info: + name: > + Evergreen Content Poster <= 1.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa31e932-7fbf-4933-9747-bd7427db7f5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/evergreen-content-poster/" + google-query: inurl:"/wp-content/plugins/evergreen-content-poster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,evergreen-content-poster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/evergreen-content-poster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "evergreen-content-poster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everlightbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/everlightbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..348920940d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everlightbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: everlightbox-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everlightbox/" + google-query: inurl:"/wp-content/plugins/everlightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everlightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everlightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everlightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/everse-starter-sites-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/everse-starter-sites-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a42f88ee1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/everse-starter-sites-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: everse-starter-sites-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/everse-starter-sites/" + google-query: inurl:"/wp-content/plugins/everse-starter-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,everse-starter-sites,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/everse-starter-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everse-starter-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ewww-image-optimizer-3213ee891b4642b7b3ba63568830b33f.yaml b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-3213ee891b4642b7b3ba63568830b33f.yaml new file mode 100644 index 0000000000..5e78a8eb44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-3213ee891b4642b7b3ba63568830b33f.yaml @@ -0,0 +1,58 @@ +id: ewww-image-optimizer-3213ee891b4642b7b3ba63568830b33f + +info: + name: > + EWWW Image Optimizer <= 7.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/074d7b46-60e0-4d4a-904a-696ac7948a35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ewww-image-optimizer/" + google-query: inurl:"/wp-content/plugins/ewww-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ewww-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ewww-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ewww-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ewww-image-optimizer-508fae9ebaeb3994eeeea08dc7389cbc.yaml b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-508fae9ebaeb3994eeeea08dc7389cbc.yaml new file mode 100644 index 0000000000..e7736d7859 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-508fae9ebaeb3994eeeea08dc7389cbc.yaml @@ -0,0 +1,58 @@ +id: ewww-image-optimizer-508fae9ebaeb3994eeeea08dc7389cbc + +info: + name: > + EWWW Image Optimizer <= 7.2.0 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7d08bfd-9861-4e21-a696-25b00233ad94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ewww-image-optimizer/" + google-query: inurl:"/wp-content/plugins/ewww-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ewww-image-optimizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ewww-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ewww-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ewww-image-optimizer-9693067e67d7ff6cc419426aa56eeabf.yaml b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-9693067e67d7ff6cc419426aa56eeabf.yaml new file mode 100644 index 0000000000..cf5dcf2e2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-9693067e67d7ff6cc419426aa56eeabf.yaml @@ -0,0 +1,58 @@ +id: ewww-image-optimizer-9693067e67d7ff6cc419426aa56eeabf + +info: + name: > + EWWW Image Optimizer <= 2.8.4 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ffac29d-d1cc-4d5d-aff8-0cb639a1e3d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ewww-image-optimizer/" + google-query: inurl:"/wp-content/plugins/ewww-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ewww-image-optimizer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ewww-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ewww-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ewww-image-optimizer-da711e4ca0aefdf6c9cb2b9eee9b6839.yaml b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-da711e4ca0aefdf6c9cb2b9eee9b6839.yaml new file mode 100644 index 0000000000..1eb6058edf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-da711e4ca0aefdf6c9cb2b9eee9b6839.yaml @@ -0,0 +1,58 @@ +id: ewww-image-optimizer-da711e4ca0aefdf6c9cb2b9eee9b6839 + +info: + name: > + EWWW Image Optimizer <= 5.8.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ef33e3c-187a-45d9-9dac-0895dce34216?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ewww-image-optimizer/" + google-query: inurl:"/wp-content/plugins/ewww-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ewww-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ewww-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ewww-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ewww-image-optimizer-e39053204ece48a5897a197753f103d3.yaml b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-e39053204ece48a5897a197753f103d3.yaml new file mode 100644 index 0000000000..d651ed4d03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-e39053204ece48a5897a197753f103d3.yaml @@ -0,0 +1,58 @@ +id: ewww-image-optimizer-e39053204ece48a5897a197753f103d3 + +info: + name: > + EWWW Image Optimizer <= 7.2.0 - Unauthenticated Sensitive Information Exposure via Debug Log + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d20ff1a8-8794-41e1-9e66-1cda90f9ff77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ewww-image-optimizer/" + google-query: inurl:"/wp-content/plugins/ewww-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ewww-image-optimizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ewww-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ewww-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ewww-image-optimizer-fc7819dbc087612847b613b7048bbd69.yaml b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-fc7819dbc087612847b613b7048bbd69.yaml new file mode 100644 index 0000000000..59582b19dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ewww-image-optimizer-fc7819dbc087612847b613b7048bbd69.yaml @@ -0,0 +1,58 @@ +id: ewww-image-optimizer-fc7819dbc087612847b613b7048bbd69 + +info: + name: > + EWWW Image Optimizer <= 2.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5b24f80-d3a4-452b-bc83-3576bdc62829?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ewww-image-optimizer/" + google-query: inurl:"/wp-content/plugins/ewww-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ewww-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ewww-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ewww-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/examapp-1c6e8ef696086c4cf5cf1464c84048ce.yaml b/nuclei-templates/cve-less/plugins/examapp-1c6e8ef696086c4cf5cf1464c84048ce.yaml new file mode 100644 index 0000000000..c267da97cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/examapp-1c6e8ef696086c4cf5cf1464c84048ce.yaml @@ -0,0 +1,58 @@ +id: examapp-1c6e8ef696086c4cf5cf1464c84048ce + +info: + name: > + IBPS Online Exam Plugin for WordPress <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81c80424-3ecb-4740-b458-00a983f35298?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/examapp/" + google-query: inurl:"/wp-content/plugins/examapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,examapp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/examapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "examapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/examapp-1cb146595e5a6af092ba6cf697572ca5.yaml b/nuclei-templates/cve-less/plugins/examapp-1cb146595e5a6af092ba6cf697572ca5.yaml new file mode 100644 index 0000000000..e66fd9f72a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/examapp-1cb146595e5a6af092ba6cf697572ca5.yaml @@ -0,0 +1,58 @@ +id: examapp-1cb146595e5a6af092ba6cf697572ca5 + +info: + name: > + IBPS Online Exam <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/160740a2-f5e1-49d6-a380-e6bf33646300?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/examapp/" + google-query: inurl:"/wp-content/plugins/examapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,examapp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/examapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "examapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-2checkout-d7709cb27cfd7779480afac87a08fa8a.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-2checkout-d7709cb27cfd7779480afac87a08fa8a.yaml new file mode 100644 index 0000000000..40679ce7b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-2checkout-d7709cb27cfd7779480afac87a08fa8a.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-2checkout-d7709cb27cfd7779480afac87a08fa8a + +info: + name: > + 2Checkout Add-on for iThemes Exchange < 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca036121-072c-4944-84e9-3b8b69f3e17c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-2checkout/" + google-query: inurl:"/wp-content/plugins/exchange-addon-2checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-2checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-2checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-2checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-authorize-net-de87b01d88a6a2f904015f5ea84ebf1e.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-authorize-net-de87b01d88a6a2f904015f5ea84ebf1e.yaml new file mode 100644 index 0000000000..78b14b4a22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-authorize-net-de87b01d88a6a2f904015f5ea84ebf1e.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-authorize-net-de87b01d88a6a2f904015f5ea84ebf1e + +info: + name: > + Authorize.net Add-on for iThemes Exchange < 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d3e6c49-e686-463c-bc50-b0ce94702075?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-authorize-net/" + google-query: inurl:"/wp-content/plugins/exchange-addon-authorize-net/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-authorize-net,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-authorize-net/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-authorize-net" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-custom-url-tracking-34e10a41c5c20c0cdcc396ab3433b41a.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-custom-url-tracking-34e10a41c5c20c0cdcc396ab3433b41a.yaml new file mode 100644 index 0000000000..9d8e47b4f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-custom-url-tracking-34e10a41c5c20c0cdcc396ab3433b41a.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-custom-url-tracking-34e10a41c5c20c0cdcc396ab3433b41a + +info: + name: > + Exchange Addon Custom URL Tracking < 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffc2e04f-6e71-4783-bded-7d7782e2e84e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-custom-url-tracking/" + google-query: inurl:"/wp-content/plugins/exchange-addon-custom-url-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-custom-url-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-custom-url-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-custom-url-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-easy-canadian-sales-taxes-5d1048d4b4ff4e9d4fc21662470b4351.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-easy-canadian-sales-taxes-5d1048d4b4ff4e9d4fc21662470b4351.yaml new file mode 100644 index 0000000000..e3a9c844bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-easy-canadian-sales-taxes-5d1048d4b4ff4e9d4fc21662470b4351.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-easy-canadian-sales-taxes-5d1048d4b4ff4e9d4fc21662470b4351 + +info: + name: > + Easy Canadian Sales Taxes Add-On for iThemes Exchange < 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8059ea88-55b9-423e-9827-075d0aa90938?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-easy-canadian-sales-taxes/" + google-query: inurl:"/wp-content/plugins/exchange-addon-easy-canadian-sales-taxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-easy-canadian-sales-taxes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-easy-canadian-sales-taxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-easy-canadian-sales-taxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-easy-eu-vat-taxes-7dbba6eb5e75b04ea05ba2ba683d8c34.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-easy-eu-vat-taxes-7dbba6eb5e75b04ea05ba2ba683d8c34.yaml new file mode 100644 index 0000000000..55f9b15191 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-easy-eu-vat-taxes-7dbba6eb5e75b04ea05ba2ba683d8c34.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-easy-eu-vat-taxes-7dbba6eb5e75b04ea05ba2ba683d8c34 + +info: + name: > + Easy EU Value Added (VAT) Taxes < 1.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d6faee0-716e-4aa9-a841-5231c7aaff21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-easy-eu-vat-taxes/" + google-query: inurl:"/wp-content/plugins/exchange-addon-easy-eu-vat-taxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-easy-eu-vat-taxes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-easy-eu-vat-taxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-easy-eu-vat-taxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-easy-us-sales-taxes-4c3c3f049b1bc0e13ddc430f9c3318dc.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-easy-us-sales-taxes-4c3c3f049b1bc0e13ddc430f9c3318dc.yaml new file mode 100644 index 0000000000..8b910add88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-easy-us-sales-taxes-4c3c3f049b1bc0e13ddc430f9c3318dc.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-easy-us-sales-taxes-4c3c3f049b1bc0e13ddc430f9c3318dc + +info: + name: > + Easy US Sales Taxes Add-on for iThemes Exchange < 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c55487f9-dc8a-41a0-b052-625665c1543f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-easy-us-sales-taxes/" + google-query: inurl:"/wp-content/plugins/exchange-addon-easy-us-sales-taxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-easy-us-sales-taxes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-easy-us-sales-taxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-easy-us-sales-taxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-invoices-fce7ebf61e0bbaa70b1a47fedc604d75.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-invoices-fce7ebf61e0bbaa70b1a47fedc604d75.yaml new file mode 100644 index 0000000000..5b9dd8c07c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-invoices-fce7ebf61e0bbaa70b1a47fedc604d75.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-invoices-fce7ebf61e0bbaa70b1a47fedc604d75 + +info: + name: > + Exchange Addon Invoices < 1.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/642f0ad9-1085-4590-b736-9dd88440d047?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-invoices/" + google-query: inurl:"/wp-content/plugins/exchange-addon-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-invoices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-manual-purchases-4b04963b90b4f582746b4536b75f0fd9.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-manual-purchases-4b04963b90b4f582746b4536b75f0fd9.yaml new file mode 100644 index 0000000000..45cc24577c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-manual-purchases-4b04963b90b4f582746b4536b75f0fd9.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-manual-purchases-4b04963b90b4f582746b4536b75f0fd9 + +info: + name: > + Manual Purchases < 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2bc0449-b5cc-403b-a943-f53d0d9c663a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-manual-purchases/" + google-query: inurl:"/wp-content/plugins/exchange-addon-manual-purchases/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-manual-purchases,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-manual-purchases/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-manual-purchases" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-membership-8167878f448149a825352a74752a3f9b.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-membership-8167878f448149a825352a74752a3f9b.yaml new file mode 100644 index 0000000000..32f99d47f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-membership-8167878f448149a825352a74752a3f9b.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-membership-8167878f448149a825352a74752a3f9b + +info: + name: > + Exchange Addon Membership < 1.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eab729ed-ec00-4be1-a738-fce8a4f26100?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-membership/" + google-query: inurl:"/wp-content/plugins/exchange-addon-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-paypal-pro-bf5b301e59797812833300e7fc88f201.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-paypal-pro-bf5b301e59797812833300e7fc88f201.yaml new file mode 100644 index 0000000000..1f0ce2e027 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-paypal-pro-bf5b301e59797812833300e7fc88f201.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-paypal-pro-bf5b301e59797812833300e7fc88f201 + +info: + name: > + PayPal Pro Add-on for iThemes Exchange < 1.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1507628c-4a81-47de-a06f-a5d573eebffb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-paypal-pro/" + google-query: inurl:"/wp-content/plugins/exchange-addon-paypal-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-paypal-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-paypal-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-paypal-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-stripe-b13a4a7fbd4cd3ebf80c43d8be8323aa.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-stripe-b13a4a7fbd4cd3ebf80c43d8be8323aa.yaml new file mode 100644 index 0000000000..e324885b51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-stripe-b13a4a7fbd4cd3ebf80c43d8be8323aa.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-stripe-b13a4a7fbd4cd3ebf80c43d8be8323aa + +info: + name: > + Stripe Add-on for iThemes Exchange < 1.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b3ce7e7-c816-49d3-b794-91b71cb3e9c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-stripe/" + google-query: inurl:"/wp-content/plugins/exchange-addon-stripe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-stripe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-stripe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-stripe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-addon-table-rate-shipping-3a6771ca38d2c7d158262d9fbdbb7826.yaml b/nuclei-templates/cve-less/plugins/exchange-addon-table-rate-shipping-3a6771ca38d2c7d158262d9fbdbb7826.yaml new file mode 100644 index 0000000000..683e9e1b0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-addon-table-rate-shipping-3a6771ca38d2c7d158262d9fbdbb7826.yaml @@ -0,0 +1,58 @@ +id: exchange-addon-table-rate-shipping-3a6771ca38d2c7d158262d9fbdbb7826 + +info: + name: > + Exchange Addon Table Rate Shipping < 1.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a03792a-7e14-41c6-a60c-cb5d389f7539?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-addon-table-rate-shipping/" + google-query: inurl:"/wp-content/plugins/exchange-addon-table-rate-shipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-addon-table-rate-shipping,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-addon-table-rate-shipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-addon-table-rate-shipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exchange-rates-widget-776b8b2ca961da26b6b406dc75d9298e.yaml b/nuclei-templates/cve-less/plugins/exchange-rates-widget-776b8b2ca961da26b6b406dc75d9298e.yaml new file mode 100644 index 0000000000..b81ce592c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exchange-rates-widget-776b8b2ca961da26b6b406dc75d9298e.yaml @@ -0,0 +1,58 @@ +id: exchange-rates-widget-776b8b2ca961da26b6b406dc75d9298e + +info: + name: > + Exchange Rates Widget <= 1.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2970bea4-4641-4885-b996-2bf0b848e1ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exchange-rates-widget/" + google-query: inurl:"/wp-content/plugins/exchange-rates-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exchange-rates-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exchange-rates-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exchange-rates-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-007d55abdcc3037b38fa1f4866ebcef6.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-007d55abdcc3037b38fa1f4866ebcef6.yaml new file mode 100644 index 0000000000..78b485a4dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-007d55abdcc3037b38fa1f4866ebcef6.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-007d55abdcc3037b38fa1f4866ebcef6 + +info: + name: > + Exclusive Addons Elementor <= 2.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6ba3ce1-7c50-4e9d-b9e0-bcefc9ca74fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-03413c94281e9bdcb28cf85f17f56cbd.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-03413c94281e9bdcb28cf85f17f56cbd.yaml new file mode 100644 index 0000000000..e9829a5b64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-03413c94281e9bdcb28cf85f17f56cbd.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-03413c94281e9bdcb28cf85f17f56cbd + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Covid-19 Stats Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d44ecf8a-d19a-403a-96c7-89e223a5cc22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..ea93a40647 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-26c4a41ab859ae4dbf470aba313f594b.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-26c4a41ab859ae4dbf470aba313f594b.yaml new file mode 100644 index 0000000000..c27afb1d23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-26c4a41ab859ae4dbf470aba313f594b.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-26c4a41ab859ae4dbf470aba313f594b + +info: + name: > + Exclusive Addons for Elementor <= 2.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64792dd9-f16b-4929-a2ba-a6f53b2e975f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-27f5aa34f1beb8f61eb1e953a98567c3.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-27f5aa34f1beb8f61eb1e953a98567c3.yaml new file mode 100644 index 0000000000..0e663adaa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-27f5aa34f1beb8f61eb1e953a98567c3.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-27f5aa34f1beb8f61eb1e953a98567c3 + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Call to Action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/206c5736-d9d9-4029-afdf-d76251cc81ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-2f36bf28ff455df3f6e5bee8596dc834.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-2f36bf28ff455df3f6e5bee8596dc834.yaml new file mode 100644 index 0000000000..ed3c55b322 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-2f36bf28ff455df3f6e5bee8596dc834.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-2f36bf28ff455df3f6e5bee8596dc834 + +info: + name: > + Exclusive Addons for Elementor <= 2.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c5cdc3f-eaa6-4d0b-9e75-5483c723e15a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-34bbbe6df5443652a8ecc2885cf36469.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-34bbbe6df5443652a8ecc2885cf36469.yaml new file mode 100644 index 0000000000..4a1ee0a726 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-34bbbe6df5443652a8ecc2885cf36469.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-34bbbe6df5443652a8ecc2885cf36469 + +info: + name: > + Exclusive Addons Elementor <= 2.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75da181d-3162-448f-afb8-dc05748184f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-4ab49877e45f4a964303177554e78a85.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-4ab49877e45f4a964303177554e78a85.yaml new file mode 100644 index 0000000000..6745a1f6ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-4ab49877e45f4a964303177554e78a85.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-4ab49877e45f4a964303177554e78a85 + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Timer Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f40956e0-6e5c-4965-84f8-2420ad14a299?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-824dccfdb78b425ce34b0edfaef506c4.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-824dccfdb78b425ce34b0edfaef506c4.yaml new file mode 100644 index 0000000000..03c4cf3071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-824dccfdb78b425ce34b0edfaef506c4.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-824dccfdb78b425ce34b0edfaef506c4 + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Call To Action Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a12acf0-932e-4dff-9da6-9fbace11dbe1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..3454f5f857 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-8639b20a2b1f76694c89791c1b2d91eb.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-8639b20a2b1f76694c89791c1b2d91eb.yaml new file mode 100644 index 0000000000..b7ebdafc8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-8639b20a2b1f76694c89791c1b2d91eb.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-8639b20a2b1f76694c89791c1b2d91eb + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Expired Title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76b987f1-2524-498a-a02c-a3ca390026e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-b68fc6d974fd5ff5ec00e24e4a23388f.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-b68fc6d974fd5ff5ec00e24e4a23388f.yaml new file mode 100644 index 0000000000..3ce13d20ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-b68fc6d974fd5ff5ec00e24e4a23388f.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-b68fc6d974fd5ff5ec00e24e4a23388f + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via InfoBox + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9ad2dff-0c6d-4d91-a35d-803b97def01f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..6b6ffcf635 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-ba61abda2c1a03aab77d7d30f615bf9e.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-ba61abda2c1a03aab77d7d30f615bf9e.yaml new file mode 100644 index 0000000000..f57301b7ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-ba61abda2c1a03aab77d7d30f615bf9e.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-ba61abda2c1a03aab77d7d30f615bf9e + +info: + name: > + Exclusive Addons Elementor <= 2.6.9.1 - Missing Authorization to Post Duplication + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eae9b960-36b1-4b83-855a-d1beaa60a93f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-d0e696248d665e9f0a517c6587bde743.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-d0e696248d665e9f0a517c6587bde743.yaml new file mode 100644 index 0000000000..f6770e7b83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-d0e696248d665e9f0a517c6587bde743.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-d0e696248d665e9f0a517c6587bde743 + +info: + name: > + Exclusive Addons for Elementor <= 2.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Link Anything + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/925b0a86-ed23-471c-84e2-ae78a01b1876?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-dc46778586f851feacb609ba4df93bd9.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-dc46778586f851feacb609ba4df93bd9.yaml new file mode 100644 index 0000000000..5d2ab71d6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-dc46778586f851feacb609ba4df93bd9.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-dc46778586f851feacb609ba4df93bd9 + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3011b783-e4b4-45d2-81af-2f8d166a30ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-f3fab83347fba28adb4199c2198991f2.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-f3fab83347fba28adb4199c2198991f2.yaml new file mode 100644 index 0000000000..7ad73f5b7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-f3fab83347fba28adb4199c2198991f2.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-f3fab83347fba28adb4199c2198991f2 + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b87fe3d-a88d-477a-8d91-4d7c2dba4a43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-f6158c89533171b67393d05399849800.yaml b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-f6158c89533171b67393d05399849800.yaml new file mode 100644 index 0000000000..386a597f4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-addons-for-elementor-f6158c89533171b67393d05399849800.yaml @@ -0,0 +1,58 @@ +id: exclusive-addons-for-elementor-f6158c89533171b67393d05399849800 + +info: + name: > + Exclusive Addons for Elementor <= 2.6.9.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via Post Grid + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bd53172-ddfa-481a-818d-626b9db6fe41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-team-for-elementor-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/exclusive-team-for-elementor-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..08eee5bef9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-team-for-elementor-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: exclusive-team-for-elementor-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-team-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-team-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-team-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-team-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-team-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exclusive-team-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/exclusive-team-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..33746c60c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exclusive-team-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: exclusive-team-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exclusive-team-for-elementor/" + google-query: inurl:"/wp-content/plugins/exclusive-team-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exclusive-team-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exclusive-team-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exclusive-team-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exit-intent-popups-by-optimonk-f9d8d4d48e517849984915b0fb71d1b5.yaml b/nuclei-templates/cve-less/plugins/exit-intent-popups-by-optimonk-f9d8d4d48e517849984915b0fb71d1b5.yaml new file mode 100644 index 0000000000..8bd6449298 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exit-intent-popups-by-optimonk-f9d8d4d48e517849984915b0fb71d1b5.yaml @@ -0,0 +1,58 @@ +id: exit-intent-popups-by-optimonk-f9d8d4d48e517849984915b0fb71d1b5 + +info: + name: > + Exit Popups & Onsite Retargeting by OptiMonk <= 2.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfa8328b-5932-4396-b0ef-e16a7ec3b365?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exit-intent-popups-by-optimonk/" + google-query: inurl:"/wp-content/plugins/exit-intent-popups-by-optimonk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exit-intent-popups-by-optimonk,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exit-intent-popups-by-optimonk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exit-intent-popups-by-optimonk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exit-popup-show-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/exit-popup-show-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..8c310b2492 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exit-popup-show-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: exit-popup-show-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exit-popup-show/" + google-query: inurl:"/wp-content/plugins/exit-popup-show/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exit-popup-show,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exit-popup-show/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exit-popup-show" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exit-strategy-c407ae94c2e09109c54e22295b58f6a2.yaml b/nuclei-templates/cve-less/plugins/exit-strategy-c407ae94c2e09109c54e22295b58f6a2.yaml new file mode 100644 index 0000000000..19b5346736 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exit-strategy-c407ae94c2e09109c54e22295b58f6a2.yaml @@ -0,0 +1,58 @@ +id: exit-strategy-c407ae94c2e09109c54e22295b58f6a2 + +info: + name: > + WordPress Exit Strategy <= 1.55 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c7115f9-a0b0-43ed-9153-a9fe87176e4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exit-strategy/" + google-query: inurl:"/wp-content/plugins/exit-strategy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exit-strategy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exit-strategy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exit-strategy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exmage-wp-image-links-83161de0c1fd793802b927949569bb1f.yaml b/nuclei-templates/cve-less/plugins/exmage-wp-image-links-83161de0c1fd793802b927949569bb1f.yaml new file mode 100644 index 0000000000..fa6e91814a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exmage-wp-image-links-83161de0c1fd793802b927949569bb1f.yaml @@ -0,0 +1,58 @@ +id: exmage-wp-image-links-83161de0c1fd793802b927949569bb1f + +info: + name: > + EXMAGE – WordPress Image Links <= 1.0.6 - Admin+ Blind SSRF + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dd1ded1-8966-4247-ab75-17980f00f9b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exmage-wp-image-links/" + google-query: inurl:"/wp-content/plugins/exmage-wp-image-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exmage-wp-image-links,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exmage-wp-image-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exmage-wp-image-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/expand-maker-20e2ffcefe24845b4b4e6344c91c5c95.yaml b/nuclei-templates/cve-less/plugins/expand-maker-20e2ffcefe24845b4b4e6344c91c5c95.yaml new file mode 100644 index 0000000000..f4433e733a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/expand-maker-20e2ffcefe24845b4b4e6344c91c5c95.yaml @@ -0,0 +1,58 @@ +id: expand-maker-20e2ffcefe24845b4b4e6344c91c5c95 + +info: + name: > + Read More & Accordion <= 3.2.6.1 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73ab9f95-05cc-47fc-bfcb-1787f6f80789?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/expand-maker/" + google-query: inurl:"/wp-content/plugins/expand-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,expand-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/expand-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "expand-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/expire-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/expire-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..06773b7734 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/expire-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: expire-tags-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/expire-tags/" + google-query: inurl:"/wp-content/plugins/expire-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,expire-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/expire-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "expire-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/expire-tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/expire-tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..c52a4132ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/expire-tags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: expire-tags-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/expire-tags/" + google-query: inurl:"/wp-content/plugins/expire-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,expire-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/expire-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "expire-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/expivi-434bdc3a2d6d4c7bf3a3c2d6bf17f8ff.yaml b/nuclei-templates/cve-less/plugins/expivi-434bdc3a2d6d4c7bf3a3c2d6bf17f8ff.yaml new file mode 100644 index 0000000000..3a3a0deda1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/expivi-434bdc3a2d6d4c7bf3a3c2d6bf17f8ff.yaml @@ -0,0 +1,58 @@ +id: expivi-434bdc3a2d6d4c7bf3a3c2d6bf17f8ff + +info: + name: > + Product Configurator for WooCommerce <= 1.2.31 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79766bb2-a796-48b4-afb5-520303a73739?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/expivi/" + google-query: inurl:"/wp-content/plugins/expivi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,expivi,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/expivi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "expivi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exploit-scanner-4a16fbddd32289a9425b6c977263e9d5.yaml b/nuclei-templates/cve-less/plugins/exploit-scanner-4a16fbddd32289a9425b6c977263e9d5.yaml new file mode 100644 index 0000000000..40098f4073 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exploit-scanner-4a16fbddd32289a9425b6c977263e9d5.yaml @@ -0,0 +1,58 @@ +id: exploit-scanner-4a16fbddd32289a9425b6c977263e9d5 + +info: + name: > + Exploit Scanner <= 1.3.3 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34618970-a4b6-456b-9d01-a09e7a977724?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exploit-scanner/" + google-query: inurl:"/wp-content/plugins/exploit-scanner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exploit-scanner,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exploit-scanner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exploit-scanner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-all-urls-171d0fe1d81993f6ce1992662fece84b.yaml b/nuclei-templates/cve-less/plugins/export-all-urls-171d0fe1d81993f6ce1992662fece84b.yaml new file mode 100644 index 0000000000..efdefda3da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-all-urls-171d0fe1d81993f6ce1992662fece84b.yaml @@ -0,0 +1,58 @@ +id: export-all-urls-171d0fe1d81993f6ce1992662fece84b + +info: + name: > + Export All URLs <= 4.2 - Cross-Site Request Forgery to Sensitive Data Export + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ac8e551-7995-4201-b711-87773da1be9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-all-urls/" + google-query: inurl:"/wp-content/plugins/export-all-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-all-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-all-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-all-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-all-urls-4f798a978754f7760bf888652cfdf4e3.yaml b/nuclei-templates/cve-less/plugins/export-all-urls-4f798a978754f7760bf888652cfdf4e3.yaml new file mode 100644 index 0000000000..86bded33f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-all-urls-4f798a978754f7760bf888652cfdf4e3.yaml @@ -0,0 +1,58 @@ +id: export-all-urls-4f798a978754f7760bf888652cfdf4e3 + +info: + name: > + Export All URLs <= 4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a7afe2c-13ca-4df4-89c9-1544db016cdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-all-urls/" + google-query: inurl:"/wp-content/plugins/export-all-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-all-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-all-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-all-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-all-urls-a2bd93b9a3b512bd46c713fd9b617e38.yaml b/nuclei-templates/cve-less/plugins/export-all-urls-a2bd93b9a3b512bd46c713fd9b617e38.yaml new file mode 100644 index 0000000000..040de2d4fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-all-urls-a2bd93b9a3b512bd46c713fd9b617e38.yaml @@ -0,0 +1,58 @@ +id: export-all-urls-a2bd93b9a3b512bd46c713fd9b617e38 + +info: + name: > + Export All URLs <= 4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/066c9327-6d72-41f9-895e-d14fe6471832?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-all-urls/" + google-query: inurl:"/wp-content/plugins/export-all-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-all-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-all-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-all-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-all-urls-b5b013b649a98c215832bbde298896e0.yaml b/nuclei-templates/cve-less/plugins/export-all-urls-b5b013b649a98c215832bbde298896e0.yaml new file mode 100644 index 0000000000..d0190e79f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-all-urls-b5b013b649a98c215832bbde298896e0.yaml @@ -0,0 +1,58 @@ +id: export-all-urls-b5b013b649a98c215832bbde298896e0 + +info: + name: > + Export All URLs <= 4.1 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c14b1d49-efea-4c09-9448-533223c6d2e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-all-urls/" + google-query: inurl:"/wp-content/plugins/export-all-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-all-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-all-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-all-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-all-urls-e300fc2b33c3e4cbe76c5a5f26d2b663.yaml b/nuclei-templates/cve-less/plugins/export-all-urls-e300fc2b33c3e4cbe76c5a5f26d2b663.yaml new file mode 100644 index 0000000000..50d21086d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-all-urls-e300fc2b33c3e4cbe76c5a5f26d2b663.yaml @@ -0,0 +1,58 @@ +id: export-all-urls-e300fc2b33c3e4cbe76c5a5f26d2b663 + +info: + name: > + Export All URLs <= 4.3 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2493a2f8-d4e4-4c42-b748-5632b96b085e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-all-urls/" + google-query: inurl:"/wp-content/plugins/export-all-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-all-urls,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-all-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-all-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-import-menus-554b3becffafc2d7533a6574bfe4f7de.yaml b/nuclei-templates/cve-less/plugins/export-import-menus-554b3becffafc2d7533a6574bfe4f7de.yaml new file mode 100644 index 0000000000..9c7ef80ace --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-import-menus-554b3becffafc2d7533a6574bfe4f7de.yaml @@ -0,0 +1,58 @@ +id: export-import-menus-554b3becffafc2d7533a6574bfe4f7de + +info: + name: > + Export Import Menus <= 1.8.0 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d74efb03-4a1c-4163-bd79-ef17975a609e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-import-menus/" + google-query: inurl:"/wp-content/plugins/export-import-menus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-import-menus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-import-menus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-import-menus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-media-urls-04fd004ccf778c74722c06c23011f3f9.yaml b/nuclei-templates/cve-less/plugins/export-media-urls-04fd004ccf778c74722c06c23011f3f9.yaml new file mode 100644 index 0000000000..b55deb5e68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-media-urls-04fd004ccf778c74722c06c23011f3f9.yaml @@ -0,0 +1,58 @@ +id: export-media-urls-04fd004ccf778c74722c06c23011f3f9 + +info: + name: > + Export Media URLs <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b121abf-3842-43ac-a3dc-bde6d5e0b263?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-media-urls/" + google-query: inurl:"/wp-content/plugins/export-media-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-media-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-media-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-media-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-post-info-0bf76c13f5d059f24c33a04b1579ea8d.yaml b/nuclei-templates/cve-less/plugins/export-post-info-0bf76c13f5d059f24c33a04b1579ea8d.yaml new file mode 100644 index 0000000000..e7145c0bab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-post-info-0bf76c13f5d059f24c33a04b1579ea8d.yaml @@ -0,0 +1,58 @@ +id: export-post-info-0bf76c13f5d059f24c33a04b1579ea8d + +info: + name: > + Export Post Info <= 1.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890f83dc-d8d2-4fb2-a04a-c7b70d104b49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-post-info/" + google-query: inurl:"/wp-content/plugins/export-post-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-post-info,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-post-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-post-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-post-info-80eb51ecba5ec678d038fbafb9f76a3a.yaml b/nuclei-templates/cve-less/plugins/export-post-info-80eb51ecba5ec678d038fbafb9f76a3a.yaml new file mode 100644 index 0000000000..0fa8c7f3a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-post-info-80eb51ecba5ec678d038fbafb9f76a3a.yaml @@ -0,0 +1,58 @@ +id: export-post-info-80eb51ecba5ec678d038fbafb9f76a3a + +info: + name: > + Export Post Info <= 1.2.0 - Authenticated (Author+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e033dd4a-bc82-403a-82aa-cd8516290f4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-post-info/" + google-query: inurl:"/wp-content/plugins/export-post-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-post-info,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-post-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-post-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-to-text-96700f83c035e921aa6f4f1cc307643f.yaml b/nuclei-templates/cve-less/plugins/export-to-text-96700f83c035e921aa6f4f1cc307643f.yaml new file mode 100644 index 0000000000..412b3230a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-to-text-96700f83c035e921aa6f4f1cc307643f.yaml @@ -0,0 +1,58 @@ +id: export-to-text-96700f83c035e921aa6f4f1cc307643f + +info: + name: > + Export to Text <= 2.4 - Unauthenticated Post Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19bd105a-823d-4a85-87e1-54291274a842?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-to-text/" + google-query: inurl:"/wp-content/plugins/export-to-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-to-text,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-to-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-to-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-users-947efea3054054e672bdea86aa02538b.yaml b/nuclei-templates/cve-less/plugins/export-users-947efea3054054e672bdea86aa02538b.yaml new file mode 100644 index 0000000000..2be92b1414 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-users-947efea3054054e672bdea86aa02538b.yaml @@ -0,0 +1,58 @@ +id: export-users-947efea3054054e672bdea86aa02538b + +info: + name: > + Export Users to CSV < 1.4 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa309da6-6552-43e4-aeea-f822493dd029?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-users/" + google-query: inurl:"/wp-content/plugins/export-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-users,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-users-data-csv-e05fa458a1f240ccb4e1b67dcb2e1cc1.yaml b/nuclei-templates/cve-less/plugins/export-users-data-csv-e05fa458a1f240ccb4e1b67dcb2e1cc1.yaml new file mode 100644 index 0000000000..9a36a910ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-users-data-csv-e05fa458a1f240ccb4e1b67dcb2e1cc1.yaml @@ -0,0 +1,58 @@ +id: export-users-data-csv-e05fa458a1f240ccb4e1b67dcb2e1cc1 + +info: + name: > + Export Users Data CSV <= 2.1 - Authenticated (Subscriber+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a53430c1-7a2d-4c05-94ee-691e06759797?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-users-data-csv/" + google-query: inurl:"/wp-content/plugins/export-users-data-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-users-data-csv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-users-data-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-users-data-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-users-data-distinct-8972c0084426af137e3ac2a4f9b562c5.yaml b/nuclei-templates/cve-less/plugins/export-users-data-distinct-8972c0084426af137e3ac2a4f9b562c5.yaml new file mode 100644 index 0000000000..a71ceeb7c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-users-data-distinct-8972c0084426af137e3ac2a4f9b562c5.yaml @@ -0,0 +1,58 @@ +id: export-users-data-distinct-8972c0084426af137e3ac2a4f9b562c5 + +info: + name: > + Export Users Data Distinct <= 1.3 - Authenticated (Subscriber+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03a1724c-8fea-4e9f-a4a1-9de236e1f15a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-users-data-distinct/" + google-query: inurl:"/wp-content/plugins/export-users-data-distinct/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-users-data-distinct,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-users-data-distinct/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-users-data-distinct" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-users-to-csv-6f6838754144cfba3c6bd90cbbf7e92a.yaml b/nuclei-templates/cve-less/plugins/export-users-to-csv-6f6838754144cfba3c6bd90cbbf7e92a.yaml new file mode 100644 index 0000000000..27310715fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-users-to-csv-6f6838754144cfba3c6bd90cbbf7e92a.yaml @@ -0,0 +1,58 @@ +id: export-users-to-csv-6f6838754144cfba3c6bd90cbbf7e92a + +info: + name: > + Export Users to CSV <= 1.1.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fc72cff-b708-4fa2-a734-481446641a61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-users-to-csv/" + google-query: inurl:"/wp-content/plugins/export-users-to-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-users-to-csv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-users-to-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-users-to-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-woocommerce-466267eb695f096848ba3c66efa093ba.yaml b/nuclei-templates/cve-less/plugins/export-woocommerce-466267eb695f096848ba3c66efa093ba.yaml new file mode 100644 index 0000000000..7c7fc84009 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-woocommerce-466267eb695f096848ba3c66efa093ba.yaml @@ -0,0 +1,58 @@ +id: export-woocommerce-466267eb695f096848ba3c66efa093ba + +info: + name: > + Products & Order Export for WooCommerce <= 2.0.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da1f68a5-8ca7-4744-9b73-09e767072885?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-woocommerce/" + google-query: inurl:"/wp-content/plugins/export-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-woocommerce-9c4ed2f25624ef8c0b44e775a33394e9.yaml b/nuclei-templates/cve-less/plugins/export-woocommerce-9c4ed2f25624ef8c0b44e775a33394e9.yaml new file mode 100644 index 0000000000..002655667f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-woocommerce-9c4ed2f25624ef8c0b44e775a33394e9.yaml @@ -0,0 +1,58 @@ +id: export-woocommerce-9c4ed2f25624ef8c0b44e775a33394e9 + +info: + name: > + Products, Order & Customers Export for WooCommerce <= 2.0.10 - Reflected Cross-Site Scripting via date parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eac8685b-8ed9-432d-8912-b66bd62c950f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-woocommerce/" + google-query: inurl:"/wp-content/plugins/export-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-woocommerce-customer-list-555fded38156b09a0ae4a96c58cecb2d.yaml b/nuclei-templates/cve-less/plugins/export-woocommerce-customer-list-555fded38156b09a0ae4a96c58cecb2d.yaml new file mode 100644 index 0000000000..4834d581f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-woocommerce-customer-list-555fded38156b09a0ae4a96c58cecb2d.yaml @@ -0,0 +1,58 @@ +id: export-woocommerce-customer-list-555fded38156b09a0ae4a96c58cecb2d + +info: + name: > + Export customers list csv for WooCommerce <= 2.0.67 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cede7e6f-e3e8-479b-9c7b-91c390ed3936?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-woocommerce-customer-list/" + google-query: inurl:"/wp-content/plugins/export-woocommerce-customer-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-woocommerce-customer-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-woocommerce-customer-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-woocommerce-customer-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-wp-page-to-static-html-40abb9e32e5d663357bcdf2c7ce0ff79.yaml b/nuclei-templates/cve-less/plugins/export-wp-page-to-static-html-40abb9e32e5d663357bcdf2c7ce0ff79.yaml new file mode 100644 index 0000000000..14f356fb7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-wp-page-to-static-html-40abb9e32e5d663357bcdf2c7ce0ff79.yaml @@ -0,0 +1,58 @@ +id: export-wp-page-to-static-html-40abb9e32e5d663357bcdf2c7ce0ff79 + +info: + name: > + Export WP Page to Static HTML/CSS <= 2.1.9 - Cross-Site Request Forgery via Multiple AJAX Actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7781e20b-c258-4bfd-9050-75a50a335628?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-wp-page-to-static-html/" + google-query: inurl:"/wp-content/plugins/export-wp-page-to-static-html/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-wp-page-to-static-html,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-wp-page-to-static-html/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-wp-page-to-static-html" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/export-wp-page-to-static-html-96488db43481ee059de402cf95554483.yaml b/nuclei-templates/cve-less/plugins/export-wp-page-to-static-html-96488db43481ee059de402cf95554483.yaml new file mode 100644 index 0000000000..12c4b171ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/export-wp-page-to-static-html-96488db43481ee059de402cf95554483.yaml @@ -0,0 +1,58 @@ +id: export-wp-page-to-static-html-96488db43481ee059de402cf95554483 + +info: + name: > + Export WP Page to Static HTML/CSS <= 2.1.9 - Missing Authorization via Multiple AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47cb48aa-b556-4f25-ac68-ff0a812972c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/export-wp-page-to-static-html/" + google-query: inurl:"/wp-content/plugins/export-wp-page-to-static-html/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,export-wp-page-to-static-html,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/export-wp-page-to-static-html/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "export-wp-page-to-static-html" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exportfeed-for-woocommerce-google-product-feed-b2d6fe0a5065d0107b2198e03dfa4409.yaml b/nuclei-templates/cve-less/plugins/exportfeed-for-woocommerce-google-product-feed-b2d6fe0a5065d0107b2198e03dfa4409.yaml new file mode 100644 index 0000000000..69d0aa8d06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exportfeed-for-woocommerce-google-product-feed-b2d6fe0a5065d0107b2198e03dfa4409.yaml @@ -0,0 +1,58 @@ +id: exportfeed-for-woocommerce-google-product-feed-b2d6fe0a5065d0107b2198e03dfa4409 + +info: + name: > + Sync WooCommerce Product feed to Google Shopping <= 1.2.4 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eee9e199-00c6-4640-bd7c-e1316e2bba51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exportfeed-for-woocommerce-google-product-feed/" + google-query: inurl:"/wp-content/plugins/exportfeed-for-woocommerce-google-product-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exportfeed-for-woocommerce-google-product-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exportfeed-for-woocommerce-google-product-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exportfeed-for-woocommerce-google-product-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exportfeed-for-woocommerce-product-to-etsy-2b0c3de81abe87f7163c2ade96d864cf.yaml b/nuclei-templates/cve-less/plugins/exportfeed-for-woocommerce-product-to-etsy-2b0c3de81abe87f7163c2ade96d864cf.yaml new file mode 100644 index 0000000000..0fdcff1928 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exportfeed-for-woocommerce-product-to-etsy-2b0c3de81abe87f7163c2ade96d864cf.yaml @@ -0,0 +1,58 @@ +id: exportfeed-for-woocommerce-product-to-etsy-2b0c3de81abe87f7163c2ade96d864cf + +info: + name: > + WooCommerce Etsy Integration <= 3.3.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99489cc0-2e73-4d55-b95f-46d574897fac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exportfeed-for-woocommerce-product-to-etsy/" + google-query: inurl:"/wp-content/plugins/exportfeed-for-woocommerce-product-to-etsy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exportfeed-for-woocommerce-product-to-etsy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exportfeed-for-woocommerce-product-to-etsy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exportfeed-for-woocommerce-product-to-etsy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exportfeed-list-woocommerce-products-on-ebay-store-e3d531049fbe8d4cfc0687a776a83ff1.yaml b/nuclei-templates/cve-less/plugins/exportfeed-list-woocommerce-products-on-ebay-store-e3d531049fbe8d4cfc0687a776a83ff1.yaml new file mode 100644 index 0000000000..2d7b33a473 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exportfeed-list-woocommerce-products-on-ebay-store-e3d531049fbe8d4cfc0687a776a83ff1.yaml @@ -0,0 +1,58 @@ +id: exportfeed-list-woocommerce-products-on-ebay-store-e3d531049fbe8d4cfc0687a776a83ff1 + +info: + name: > + ExportFeed <= 2.0.1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32179cca-2253-49c7-89f7-aa48bcfad716?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exportfeed-list-woocommerce-products-on-ebay-store/" + google-query: inurl:"/wp-content/plugins/exportfeed-list-woocommerce-products-on-ebay-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exportfeed-list-woocommerce-products-on-ebay-store,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exportfeed-list-woocommerce-products-on-ebay-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exportfeed-list-woocommerce-products-on-ebay-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exports-and-reports-cfd16ad8dc5bcf726c8b8727896a65ef.yaml b/nuclei-templates/cve-less/plugins/exports-and-reports-cfd16ad8dc5bcf726c8b8727896a65ef.yaml new file mode 100644 index 0000000000..f97959b48e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exports-and-reports-cfd16ad8dc5bcf726c8b8727896a65ef.yaml @@ -0,0 +1,58 @@ +id: exports-and-reports-cfd16ad8dc5bcf726c8b8727896a65ef + +info: + name: > + Exports and Reports <= 0.9.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dc41ac8-1126-4fcc-942e-89e15b1ebfb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exports-and-reports/" + google-query: inurl:"/wp-content/plugins/exports-and-reports/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exports-and-reports,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exports-and-reports/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exports-and-reports" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/express-shop-3e4167472cc19aa7d5c770b7ff08e85b.yaml b/nuclei-templates/cve-less/plugins/express-shop-3e4167472cc19aa7d5c770b7ff08e85b.yaml new file mode 100644 index 0000000000..0b848fd5ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/express-shop-3e4167472cc19aa7d5c770b7ff08e85b.yaml @@ -0,0 +1,58 @@ +id: express-shop-3e4167472cc19aa7d5c770b7ff08e85b + +info: + name: > + Express Shop <= 4.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12849d7e-1685-4e03-be0c-0672545fcd2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/express-shop/" + google-query: inurl:"/wp-content/plugins/express-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,express-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/express-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "express-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exquisite-paypal-donation-d864c9b876d3aee646e414b358c69b64.yaml b/nuclei-templates/cve-less/plugins/exquisite-paypal-donation-d864c9b876d3aee646e414b358c69b64.yaml new file mode 100644 index 0000000000..d9c9fee0df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exquisite-paypal-donation-d864c9b876d3aee646e414b358c69b64.yaml @@ -0,0 +1,58 @@ +id: exquisite-paypal-donation-d864c9b876d3aee646e414b358c69b64 + +info: + name: > + Exquisite PayPal Donation <= v2.0.0 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46f7dc18-fc07-400a-bb79-0d9821299023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exquisite-paypal-donation/" + google-query: inurl:"/wp-content/plugins/exquisite-paypal-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exquisite-paypal-donation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exquisite-paypal-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exquisite-paypal-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extend-filter-products-by-price-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/extend-filter-products-by-price-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..86cd74d008 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extend-filter-products-by-price-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: extend-filter-products-by-price-widget-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extend-filter-products-by-price-widget/" + google-query: inurl:"/wp-content/plugins/extend-filter-products-by-price-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extend-filter-products-by-price-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extend-filter-products-by-price-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extend-filter-products-by-price-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extended-evaluation-for-statify-a6e54ba491e72f796e7b6e74aa4dfebc.yaml b/nuclei-templates/cve-less/plugins/extended-evaluation-for-statify-a6e54ba491e72f796e7b6e74aa4dfebc.yaml new file mode 100644 index 0000000000..79025efdeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extended-evaluation-for-statify-a6e54ba491e72f796e7b6e74aa4dfebc.yaml @@ -0,0 +1,58 @@ +id: extended-evaluation-for-statify-a6e54ba491e72f796e7b6e74aa4dfebc + +info: + name: > + Statify – Extended Evaluation <= 2.6.3 - Authenticated (Admin+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35027df9-ae55-453f-bb42-4b2664d66293?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extended-evaluation-for-statify/" + google-query: inurl:"/wp-content/plugins/extended-evaluation-for-statify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extended-evaluation-for-statify,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extended-evaluation-for-statify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extended-evaluation-for-statify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extended-post-status-c787c6531ee0637047c0b6f0c28238e9.yaml b/nuclei-templates/cve-less/plugins/extended-post-status-c787c6531ee0637047c0b6f0c28238e9.yaml new file mode 100644 index 0000000000..5557377ac2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extended-post-status-c787c6531ee0637047c0b6f0c28238e9.yaml @@ -0,0 +1,58 @@ +id: extended-post-status-c787c6531ee0637047c0b6f0c28238e9 + +info: + name: > + Extended Post Status <= 1.0.19 - Missing Authorization via wp_insert_post_data + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6369b41-d93f-4959-8fad-be69ef724b24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extended-post-status/" + google-query: inurl:"/wp-content/plugins/extended-post-status/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extended-post-status,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extended-post-status/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extended-post-status" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extensions-for-cf7-b10d47efef131454e92762a235006179.yaml b/nuclei-templates/cve-less/plugins/extensions-for-cf7-b10d47efef131454e92762a235006179.yaml new file mode 100644 index 0000000000..75cafb85d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extensions-for-cf7-b10d47efef131454e92762a235006179.yaml @@ -0,0 +1,58 @@ +id: extensions-for-cf7-b10d47efef131454e92762a235006179 + +info: + name: > + Extensions For CF7 <= 2.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05144b8d-2dad-4a40-abe7-ecde837ec350?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extensions-for-cf7/" + google-query: inurl:"/wp-content/plugins/extensions-for-cf7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extensions-for-cf7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extensions-for-cf7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extensions-for-cf7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extensions-for-cf7-d198bd5481953eb6029357e7049666d3.yaml b/nuclei-templates/cve-less/plugins/extensions-for-cf7-d198bd5481953eb6029357e7049666d3.yaml new file mode 100644 index 0000000000..e4a5d2f7ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extensions-for-cf7-d198bd5481953eb6029357e7049666d3.yaml @@ -0,0 +1,58 @@ +id: extensions-for-cf7-d198bd5481953eb6029357e7049666d3 + +info: + name: > + Extensions For CF7 <= 3.0.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bad00612-d98e-4b5e-88e8-664064588bdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extensions-for-cf7/" + google-query: inurl:"/wp-content/plugins/extensions-for-cf7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extensions-for-cf7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extensions-for-cf7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extensions-for-cf7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extensions-leaflet-map-e5ccc984a06602c5eeeca3eee991fc34.yaml b/nuclei-templates/cve-less/plugins/extensions-leaflet-map-e5ccc984a06602c5eeeca3eee991fc34.yaml new file mode 100644 index 0000000000..660f66ffe1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extensions-leaflet-map-e5ccc984a06602c5eeeca3eee991fc34.yaml @@ -0,0 +1,58 @@ +id: extensions-leaflet-map-e5ccc984a06602c5eeeca3eee991fc34 + +info: + name: > + Extensions for Leaflet Map <= 3.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e332a52-071c-4725-99db-3cc10ee50230?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extensions-leaflet-map/" + google-query: inurl:"/wp-content/plugins/extensions-leaflet-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extensions-leaflet-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extensions-leaflet-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extensions-leaflet-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extensive-vc-addon-8b8ebcc1129f204595ea40775fe38d9a.yaml b/nuclei-templates/cve-less/plugins/extensive-vc-addon-8b8ebcc1129f204595ea40775fe38d9a.yaml new file mode 100644 index 0000000000..eb7dd89307 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extensive-vc-addon-8b8ebcc1129f204595ea40775fe38d9a.yaml @@ -0,0 +1,58 @@ +id: extensive-vc-addon-8b8ebcc1129f204595ea40775fe38d9a + +info: + name: > + Extensive VC Addons for WPBakery page builder <= 1.9 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c85fa04e-477e-4ac9-b112-02b2ab18ca32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extensive-vc-addon/" + google-query: inurl:"/wp-content/plugins/extensive-vc-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extensive-vc-addon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extensive-vc-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extensive-vc-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/external-media-090b5ab75971c1cf3354717d50e20576.yaml b/nuclei-templates/cve-less/plugins/external-media-090b5ab75971c1cf3354717d50e20576.yaml new file mode 100644 index 0000000000..6486afedde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/external-media-090b5ab75971c1cf3354717d50e20576.yaml @@ -0,0 +1,58 @@ +id: external-media-090b5ab75971c1cf3354717d50e20576 + +info: + name: > + External Media <= 1.0.36 - Authenticated(Author+) File Upload to Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39a3450e-f3c2-4c89-985d-28e23eb433dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/external-media/" + google-query: inurl:"/wp-content/plugins/external-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,external-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/external-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "external-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/external-media-2b23e7bc36f5649501747aa394af6972.yaml b/nuclei-templates/cve-less/plugins/external-media-2b23e7bc36f5649501747aa394af6972.yaml new file mode 100644 index 0000000000..9a2d45e074 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/external-media-2b23e7bc36f5649501747aa394af6972.yaml @@ -0,0 +1,58 @@ +id: external-media-2b23e7bc36f5649501747aa394af6972 + +info: + name: > + External Media <= 1.0.35 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2121162-68db-47c4-80f6-222f013f48c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/external-media/" + google-query: inurl:"/wp-content/plugins/external-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,external-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/external-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "external-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/external-media-937a14986e699492c9c7f6e0e211e4a4.yaml b/nuclei-templates/cve-less/plugins/external-media-937a14986e699492c9c7f6e0e211e4a4.yaml new file mode 100644 index 0000000000..6e3dc4601d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/external-media-937a14986e699492c9c7f6e0e211e4a4.yaml @@ -0,0 +1,58 @@ +id: external-media-937a14986e699492c9c7f6e0e211e4a4 + +info: + name: > + External Media <= 1.0.33 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8f31b4b-c8d8-4028-b419-f8396a5cb2a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/external-media/" + google-query: inurl:"/wp-content/plugins/external-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,external-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/external-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "external-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/external-media-without-import-47882f7a2bc08ac13c7e58b547c2a0c7.yaml b/nuclei-templates/cve-less/plugins/external-media-without-import-47882f7a2bc08ac13c7e58b547c2a0c7.yaml new file mode 100644 index 0000000000..dbe409b83f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/external-media-without-import-47882f7a2bc08ac13c7e58b547c2a0c7.yaml @@ -0,0 +1,58 @@ +id: external-media-without-import-47882f7a2bc08ac13c7e58b547c2a0c7 + +info: + name: > + External Media without Import <= 1.1.2 - Authenticated (Subscriber+) Blind Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e330894-9a15-4ce3-b388-90fda3d98f8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/external-media-without-import/" + google-query: inurl:"/wp-content/plugins/external-media-without-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,external-media-without-import,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/external-media-without-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "external-media-without-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/external-media-without-import-55f57d9ee6e02fda2c4bc79302123377.yaml b/nuclei-templates/cve-less/plugins/external-media-without-import-55f57d9ee6e02fda2c4bc79302123377.yaml new file mode 100644 index 0000000000..63d63d213b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/external-media-without-import-55f57d9ee6e02fda2c4bc79302123377.yaml @@ -0,0 +1,58 @@ +id: external-media-without-import-55f57d9ee6e02fda2c4bc79302123377 + +info: + name: > + External Media without Import < 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdaaffa7-eb5e-4cb9-aa26-12cfeb7dabd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/external-media-without-import/" + google-query: inurl:"/wp-content/plugins/external-media-without-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,external-media-without-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/external-media-without-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "external-media-without-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/external-url-as-post-featured-image-thumbnail-ad8d7c66fc9bf90a2896ae8bbda63697.yaml b/nuclei-templates/cve-less/plugins/external-url-as-post-featured-image-thumbnail-ad8d7c66fc9bf90a2896ae8bbda63697.yaml new file mode 100644 index 0000000000..5cc8b2df88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/external-url-as-post-featured-image-thumbnail-ad8d7c66fc9bf90a2896ae8bbda63697.yaml @@ -0,0 +1,58 @@ +id: external-url-as-post-featured-image-thumbnail-ad8d7c66fc9bf90a2896ae8bbda63697 + +info: + name: > + External url as post Featured Image <= 2.02 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e012d7a0-46f9-4f3b-a178-2d06655fd441?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/external-url-as-post-featured-image-thumbnail/" + google-query: inurl:"/wp-content/plugins/external-url-as-post-featured-image-thumbnail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,external-url-as-post-featured-image-thumbnail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/external-url-as-post-featured-image-thumbnail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "external-url-as-post-featured-image-thumbnail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/external-video-for-everybody-98fa09468510e4f3d608da204df8d702.yaml b/nuclei-templates/cve-less/plugins/external-video-for-everybody-98fa09468510e4f3d608da204df8d702.yaml new file mode 100644 index 0000000000..5b7ccbed17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/external-video-for-everybody-98fa09468510e4f3d608da204df8d702.yaml @@ -0,0 +1,58 @@ +id: external-video-for-everybody-98fa09468510e4f3d608da204df8d702 + +info: + name: > + VideoJS (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d73f773-f084-40da-b18f-8b30b0d0c08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/external-video-for-everybody/" + google-query: inurl:"/wp-content/plugins/external-video-for-everybody/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,external-video-for-everybody,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/external-video-for-everybody/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "external-video-for-everybody" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/external-videos-c96e975122963919f6930b9c017e5991.yaml b/nuclei-templates/cve-less/plugins/external-videos-c96e975122963919f6930b9c017e5991.yaml new file mode 100644 index 0000000000..a732341a10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/external-videos-c96e975122963919f6930b9c017e5991.yaml @@ -0,0 +1,58 @@ +id: external-videos-c96e975122963919f6930b9c017e5991 + +info: + name: > + External Videos <= 2.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/168e8512-d551-47f9-bc2b-c458180a6d13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/external-videos/" + google-query: inurl:"/wp-content/plugins/external-videos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,external-videos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/external-videos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "external-videos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extra-product-options-for-woocommerce-17ad0651e8a5c8de6d9430b66387dde0.yaml b/nuclei-templates/cve-less/plugins/extra-product-options-for-woocommerce-17ad0651e8a5c8de6d9430b66387dde0.yaml new file mode 100644 index 0000000000..02aa2808f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extra-product-options-for-woocommerce-17ad0651e8a5c8de6d9430b66387dde0.yaml @@ -0,0 +1,58 @@ +id: extra-product-options-for-woocommerce-17ad0651e8a5c8de6d9430b66387dde0 + +info: + name: > + Extra Product Options for WooCommerce <= 3.0.3 - Authenticated (Shop manager+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/393a856e-dc13-4fb6-8ff3-5880631953c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extra-product-options-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/extra-product-options-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extra-product-options-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extra-product-options-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extra-product-options-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extra-user-details-d6041cf221293372ef1d7c4da6af5933.yaml b/nuclei-templates/cve-less/plugins/extra-user-details-d6041cf221293372ef1d7c4da6af5933.yaml new file mode 100644 index 0000000000..1f0cd8d2a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extra-user-details-d6041cf221293372ef1d7c4da6af5933.yaml @@ -0,0 +1,58 @@ +id: extra-user-details-d6041cf221293372ef1d7c4da6af5933 + +info: + name: > + Extra User Details <= 0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81463022-c075-40e8-962d-b2ca27fd4f70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extra-user-details/" + google-query: inurl:"/wp-content/plugins/extra-user-details/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extra-user-details,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extra-user-details/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extra-user-details" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/extra-user-details-ff2f93ef83cef5530210b6c4053efbfa.yaml b/nuclei-templates/cve-less/plugins/extra-user-details-ff2f93ef83cef5530210b6c4053efbfa.yaml new file mode 100644 index 0000000000..b4f924fe7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/extra-user-details-ff2f93ef83cef5530210b6c4053efbfa.yaml @@ -0,0 +1,58 @@ +id: extra-user-details-ff2f93ef83cef5530210b6c4053efbfa + +info: + name: > + Extra User Details <= 0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2362dea-8c4a-426f-9482-b7e19b8f5f4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/extra-user-details/" + google-query: inurl:"/wp-content/plugins/extra-user-details/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,extra-user-details,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/extra-user-details/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extra-user-details" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/exxp-wp-21d6fb0129ec0276cbb256583b4e5048.yaml b/nuclei-templates/cve-less/plugins/exxp-wp-21d6fb0129ec0276cbb256583b4e5048.yaml new file mode 100644 index 0000000000..f6ed5cfdb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/exxp-wp-21d6fb0129ec0276cbb256583b4e5048.yaml @@ -0,0 +1,58 @@ +id: exxp-wp-21d6fb0129ec0276cbb256583b4e5048 + +info: + name: > + Exxp <= 2.6.9 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0de75f3f-1e6b-42ea-9f08-54c32e37b4c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/exxp-wp/" + google-query: inurl:"/wp-content/plugins/exxp-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,exxp-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/exxp-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exxp-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/eyes-only-user-access-shortcode-6ae4507849a8e19efb73377acf163d95.yaml b/nuclei-templates/cve-less/plugins/eyes-only-user-access-shortcode-6ae4507849a8e19efb73377acf163d95.yaml new file mode 100644 index 0000000000..2637724ca0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/eyes-only-user-access-shortcode-6ae4507849a8e19efb73377acf163d95.yaml @@ -0,0 +1,58 @@ +id: eyes-only-user-access-shortcode-6ae4507849a8e19efb73377acf163d95 + +info: + name: > + Eyes Only: User Access Shortcode <= 1.8.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bbc181f-318e-48ea-a2f7-c668ad15c8a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/eyes-only-user-access-shortcode/" + google-query: inurl:"/wp-content/plugins/eyes-only-user-access-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,eyes-only-user-access-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/eyes-only-user-access-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eyes-only-user-access-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ez-form-calculator-ce2576aadbb4f84195b6b6013f98bb8b.yaml b/nuclei-templates/cve-less/plugins/ez-form-calculator-ce2576aadbb4f84195b6b6013f98bb8b.yaml new file mode 100644 index 0000000000..706f5d60ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ez-form-calculator-ce2576aadbb4f84195b6b6013f98bb8b.yaml @@ -0,0 +1,58 @@ +id: ez-form-calculator-ce2576aadbb4f84195b6b6013f98bb8b + +info: + name: > + EZ Form Calculator <= 2.14.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ba1844f-96fb-458e-b428-bbc896977cd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ez-form-calculator/" + google-query: inurl:"/wp-content/plugins/ez-form-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ez-form-calculator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ez-form-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ez-form-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ez-portfolio-05d549bbf43422565845abd53d01ba98.yaml b/nuclei-templates/cve-less/plugins/ez-portfolio-05d549bbf43422565845abd53d01ba98.yaml new file mode 100644 index 0000000000..3c477c46cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ez-portfolio-05d549bbf43422565845abd53d01ba98.yaml @@ -0,0 +1,58 @@ +id: ez-portfolio-05d549bbf43422565845abd53d01ba98 + +info: + name: > + EZ Portfolio (Unmaintained) < 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc9973a-4b5f-4efb-8df5-df1cbf9fe3b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ez-portfolio/" + google-query: inurl:"/wp-content/plugins/ez-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ez-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ez-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ez-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ezoic-integration-26aceda847c1eb3f25bb17474245905f.yaml b/nuclei-templates/cve-less/plugins/ezoic-integration-26aceda847c1eb3f25bb17474245905f.yaml new file mode 100644 index 0000000000..189956db33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ezoic-integration-26aceda847c1eb3f25bb17474245905f.yaml @@ -0,0 +1,58 @@ +id: ezoic-integration-26aceda847c1eb3f25bb17474245905f + +info: + name: > + Ezoic <= 2.8.8 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18368ad4-4c35-4b08-8297-2ebdf1bb6e46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ezoic-integration/" + google-query: inurl:"/wp-content/plugins/ezoic-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ezoic-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ezoic-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ezoic-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ezoic-integration-f68243f27ec6cdc816f3b8c11a5b90ea.yaml b/nuclei-templates/cve-less/plugins/ezoic-integration-f68243f27ec6cdc816f3b8c11a5b90ea.yaml new file mode 100644 index 0000000000..3cc98db375 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ezoic-integration-f68243f27ec6cdc816f3b8c11a5b90ea.yaml @@ -0,0 +1,58 @@ +id: ezoic-integration-f68243f27ec6cdc816f3b8c11a5b90ea + +info: + name: > + Ezoic <= 2.8.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f082a21e-0239-45fc-a7f2-9600f215783a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ezoic-integration/" + google-query: inurl:"/wp-content/plugins/ezoic-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ezoic-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ezoic-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ezoic-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ezpz-one-click-backup-d1f60a6312b998075106906482a83fc4.yaml b/nuclei-templates/cve-less/plugins/ezpz-one-click-backup-d1f60a6312b998075106906482a83fc4.yaml new file mode 100644 index 0000000000..dc824dec55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ezpz-one-click-backup-d1f60a6312b998075106906482a83fc4.yaml @@ -0,0 +1,58 @@ +id: ezpz-one-click-backup-d1f60a6312b998075106906482a83fc4 + +info: + name: > + EZPZ One Click Backup <= 12.03.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4acd261-d924-46d5-8aef-49b026cba8ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ezpz-one-click-backup/" + google-query: inurl:"/wp-content/plugins/ezpz-one-click-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ezpz-one-click-backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ezpz-one-click-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ezpz-one-click-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.03.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ezpz-one-click-backup-d8d381cfd52ebd0caccc2d10110d0603.yaml b/nuclei-templates/cve-less/plugins/ezpz-one-click-backup-d8d381cfd52ebd0caccc2d10110d0603.yaml new file mode 100644 index 0000000000..90c54285c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ezpz-one-click-backup-d8d381cfd52ebd0caccc2d10110d0603.yaml @@ -0,0 +1,58 @@ +id: ezpz-one-click-backup-d8d381cfd52ebd0caccc2d10110d0603 + +info: + name: > + EZPZ One Click Backup <= 12.03.10 - Unauthenticated Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf24216c-7882-4359-b526-44d845de0249?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ezpz-one-click-backup/" + google-query: inurl:"/wp-content/plugins/ezpz-one-click-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ezpz-one-click-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ezpz-one-click-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ezpz-one-click-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.03.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/f4-improvements-0ef9782b82fa8d84264b6b12b21ce750.yaml b/nuclei-templates/cve-less/plugins/f4-improvements-0ef9782b82fa8d84264b6b12b21ce750.yaml new file mode 100644 index 0000000000..d2abc77d2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/f4-improvements-0ef9782b82fa8d84264b6b12b21ce750.yaml @@ -0,0 +1,58 @@ +id: f4-improvements-0ef9782b82fa8d84264b6b12b21ce750 + +info: + name: > + F4 Improvements <= 1.8.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f628801-8c11-4464-a440-879f97949bf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/f4-improvements/" + google-query: inurl:"/wp-content/plugins/f4-improvements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,f4-improvements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/f4-improvements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "f4-improvements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-button-plugin-74a3d8f89352734cafb21e0108e82a16.yaml b/nuclei-templates/cve-less/plugins/facebook-button-plugin-74a3d8f89352734cafb21e0108e82a16.yaml new file mode 100644 index 0000000000..423aa850ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-button-plugin-74a3d8f89352734cafb21e0108e82a16.yaml @@ -0,0 +1,58 @@ +id: facebook-button-plugin-74a3d8f89352734cafb21e0108e82a16 + +info: + name: > + BestWebSoft's Like & Share – Posts, Pages and Widget Social Extension plugin for WordPress < 2.5.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/305f9e72-3a3f-4b22-8097-f37b1a1ebe1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-button-plugin/" + google-query: inurl:"/wp-content/plugins/facebook-button-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-button-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-button-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-button-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-button-plugin-9c248fffb99934b64b2404b3183ad52f.yaml b/nuclei-templates/cve-less/plugins/facebook-button-plugin-9c248fffb99934b64b2404b3183ad52f.yaml new file mode 100644 index 0000000000..a549586065 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-button-plugin-9c248fffb99934b64b2404b3183ad52f.yaml @@ -0,0 +1,58 @@ +id: facebook-button-plugin-9c248fffb99934b64b2404b3183ad52f + +info: + name: > + BestWebSoft's Like & Share <= 2.73 - Unauthenticated Password Protected Post Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a36310c-8a61-40aa-9520-89ead37553c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-button-plugin/" + google-query: inurl:"/wp-content/plugins/facebook-button-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-button-plugin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-button-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-button-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-by-weblizar-281277016a09cf7dcda0f71c2e15f07f.yaml b/nuclei-templates/cve-less/plugins/facebook-by-weblizar-281277016a09cf7dcda0f71c2e15f07f.yaml new file mode 100644 index 0000000000..e18e30195c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-by-weblizar-281277016a09cf7dcda0f71c2e15f07f.yaml @@ -0,0 +1,58 @@ +id: facebook-by-weblizar-281277016a09cf7dcda0f71c2e15f07f + +info: + name: > + Social LikeBox & Feed <= 2.8.4 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c5b6501-23c5-401b-815d-1729594e6a59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-by-weblizar/" + google-query: inurl:"/wp-content/plugins/facebook-by-weblizar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-by-weblizar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-by-weblizar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-by-weblizar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-comment-by-vivacity-ec95efd2e63d9d89b0c3d769bde2a40b.yaml b/nuclei-templates/cve-less/plugins/facebook-comment-by-vivacity-ec95efd2e63d9d89b0c3d769bde2a40b.yaml new file mode 100644 index 0000000000..0d7208eacb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-comment-by-vivacity-ec95efd2e63d9d89b0c3d769bde2a40b.yaml @@ -0,0 +1,58 @@ +id: facebook-comment-by-vivacity-ec95efd2e63d9d89b0c3d769bde2a40b + +info: + name: > + Comments by Startbit <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/602b3b9c-76a7-4b0b-8aad-e554c2fd6910?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-comment-by-vivacity/" + google-query: inurl:"/wp-content/plugins/facebook-comment-by-vivacity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-comment-by-vivacity,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-comment-by-vivacity/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-comment-by-vivacity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-45d861039b945e03d43af50c9dafa301.yaml b/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-45d861039b945e03d43af50c9dafa301.yaml new file mode 100644 index 0000000000..455d97c4ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-45d861039b945e03d43af50c9dafa301.yaml @@ -0,0 +1,58 @@ +id: facebook-conversion-pixel-45d861039b945e03d43af50c9dafa301 + +info: + name: > + Pixel Cat – Conversion Pixel Manager <= 2.6.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42901dcd-d318-4a37-b70f-bf6c5c58769d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-conversion-pixel/" + google-query: inurl:"/wp-content/plugins/facebook-conversion-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-conversion-pixel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-conversion-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-conversion-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-be8a9fdeffbc92f43f8c28b524c398bc.yaml b/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-be8a9fdeffbc92f43f8c28b524c398bc.yaml new file mode 100644 index 0000000000..1399500a26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-be8a9fdeffbc92f43f8c28b524c398bc.yaml @@ -0,0 +1,58 @@ +id: facebook-conversion-pixel-be8a9fdeffbc92f43f8c28b524c398bc + +info: + name: > + Pixel Cat – Conversion Pixel Manager <= 2.6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98be1eb8-ee7d-4a39-b70f-5037b651ba96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-conversion-pixel/" + google-query: inurl:"/wp-content/plugins/facebook-conversion-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-conversion-pixel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-conversion-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-conversion-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-e7103d15c56bf4b3a7eff2cebe3d9729.yaml b/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-e7103d15c56bf4b3a7eff2cebe3d9729.yaml new file mode 100644 index 0000000000..f839fef46a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-conversion-pixel-e7103d15c56bf4b3a7eff2cebe3d9729.yaml @@ -0,0 +1,58 @@ +id: facebook-conversion-pixel-e7103d15c56bf4b3a7eff2cebe3d9729 + +info: + name: > + Pixel Cat Lite <= 2.6.2 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f8af7fd-5800-4179-849e-a7ffaf8c3ad4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-conversion-pixel/" + google-query: inurl:"/wp-content/plugins/facebook-conversion-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-conversion-pixel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-conversion-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-conversion-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-fan-page-widget-c912d868bff6df29fc1013dc04c342d0.yaml b/nuclei-templates/cve-less/plugins/facebook-fan-page-widget-c912d868bff6df29fc1013dc04c342d0.yaml new file mode 100644 index 0000000000..83048e4d93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-fan-page-widget-c912d868bff6df29fc1013dc04c342d0.yaml @@ -0,0 +1,58 @@ +id: facebook-fan-page-widget-c912d868bff6df29fc1013dc04c342d0 + +info: + name: > + Fan Page Widget by ThemeNcode <= 2.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b66ef488-0efe-43dd-8938-a1881ed2560a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-fan-page-widget/" + google-query: inurl:"/wp-content/plugins/facebook-fan-page-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-fan-page-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-fan-page-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-fan-page-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-for-woocommerce-9534faef8d85288ee99452de6c7c430a.yaml b/nuclei-templates/cve-less/plugins/facebook-for-woocommerce-9534faef8d85288ee99452de6c7c430a.yaml new file mode 100644 index 0000000000..d88072581b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-for-woocommerce-9534faef8d85288ee99452de6c7c430a.yaml @@ -0,0 +1,58 @@ +id: facebook-for-woocommerce-9534faef8d85288ee99452de6c7c430a + +info: + name: > + Facebook for WooCommerce <= 1.9.12 - Cross-Site Request Forgery allowing Option Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/655b3a54-34b1-4c1a-a1b5-51d87e3134d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/facebook-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-for-woocommerce-d27b9b5016915435f37e3d3e6a022f76.yaml b/nuclei-templates/cve-less/plugins/facebook-for-woocommerce-d27b9b5016915435f37e3d3e6a022f76.yaml new file mode 100644 index 0000000000..406fbc33bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-for-woocommerce-d27b9b5016915435f37e3d3e6a022f76.yaml @@ -0,0 +1,58 @@ +id: facebook-for-woocommerce-d27b9b5016915435f37e3d3e6a022f76 + +info: + name: > + Facebook for WooCommerce <= 1.9.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/010df788-42cf-4455-9f5f-b23d03905afb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/facebook-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-like-send-button-3ff2a2ae71a0269c8c6a199dba440423.yaml b/nuclei-templates/cve-less/plugins/facebook-like-send-button-3ff2a2ae71a0269c8c6a199dba440423.yaml new file mode 100644 index 0000000000..c2e2a1b6e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-like-send-button-3ff2a2ae71a0269c8c6a199dba440423.yaml @@ -0,0 +1,58 @@ +id: facebook-like-send-button-3ff2a2ae71a0269c8c6a199dba440423 + +info: + name: > + Peadig's Like & Share Button <= 1.1.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d8e0ad2-3cfb-443f-9958-9639d0745dd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-like-send-button/" + google-query: inurl:"/wp-content/plugins/facebook-like-send-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-like-send-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-like-send-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-like-send-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-likebox-widget-and-shortcode-81e5332e3881680e9eac9f42ea7f36ca.yaml b/nuclei-templates/cve-less/plugins/facebook-likebox-widget-and-shortcode-81e5332e3881680e9eac9f42ea7f36ca.yaml new file mode 100644 index 0000000000..84116df81b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-likebox-widget-and-shortcode-81e5332e3881680e9eac9f42ea7f36ca.yaml @@ -0,0 +1,58 @@ +id: facebook-likebox-widget-and-shortcode-81e5332e3881680e9eac9f42ea7f36ca + +info: + name: > + Profile Box Shortcode And Widget <= 1.2.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b3d68d9-fa82-4be3-8692-39a9dc216d17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-likebox-widget-and-shortcode/" + google-query: inurl:"/wp-content/plugins/facebook-likebox-widget-and-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-likebox-widget-and-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-likebox-widget-and-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-likebox-widget-and-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-members-72f73bf14c806744336e445356e6090f.yaml b/nuclei-templates/cve-less/plugins/facebook-members-72f73bf14c806744336e445356e6090f.yaml new file mode 100644 index 0000000000..b0dc81ac2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-members-72f73bf14c806744336e445356e6090f.yaml @@ -0,0 +1,58 @@ +id: facebook-members-72f73bf14c806744336e445356e6090f + +info: + name: > + Facebook Members < 5.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0652b19c-52c8-4d77-973f-1e93a5ba811c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-members/" + google-query: inurl:"/wp-content/plugins/facebook-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-messenger-customer-chat-abee8752b50a21f5a90a04b4599caff2.yaml b/nuclei-templates/cve-less/plugins/facebook-messenger-customer-chat-abee8752b50a21f5a90a04b4599caff2.yaml new file mode 100644 index 0000000000..552efb0bab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-messenger-customer-chat-abee8752b50a21f5a90a04b4599caff2.yaml @@ -0,0 +1,58 @@ +id: facebook-messenger-customer-chat-abee8752b50a21f5a90a04b4599caff2 + +info: + name: > + Facebook Chat Plugin <= 1.5 - Missing Capabilities Check + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36ae4183-5fa7-484c-b858-5df10ae3d3f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-messenger-customer-chat/" + google-query: inurl:"/wp-content/plugins/facebook-messenger-customer-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-messenger-customer-chat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-messenger-customer-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-messenger-customer-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-messenger-customer-chat-dda14d0945970dcd1c739d9bb84285fc.yaml b/nuclei-templates/cve-less/plugins/facebook-messenger-customer-chat-dda14d0945970dcd1c739d9bb84285fc.yaml new file mode 100644 index 0000000000..274d65d302 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-messenger-customer-chat-dda14d0945970dcd1c739d9bb84285fc.yaml @@ -0,0 +1,58 @@ +id: facebook-messenger-customer-chat-dda14d0945970dcd1c739d9bb84285fc + +info: + name: > + Facebook Chat Plugin <= 1.2 - Cross-Site Request Forgery to Site Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edd1396b-02f6-4292-82df-76c5eeecfe20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-messenger-customer-chat/" + google-query: inurl:"/wp-content/plugins/facebook-messenger-customer-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-messenger-customer-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-messenger-customer-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-messenger-customer-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-page-feed-graph-api-cfdb8d7325e93947d2061002a4b258f4.yaml b/nuclei-templates/cve-less/plugins/facebook-page-feed-graph-api-cfdb8d7325e93947d2061002a4b258f4.yaml new file mode 100644 index 0000000000..ad1ac55080 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-page-feed-graph-api-cfdb8d7325e93947d2061002a4b258f4.yaml @@ -0,0 +1,58 @@ +id: facebook-page-feed-graph-api-cfdb8d7325e93947d2061002a4b258f4 + +info: + name: > + Mongoose Page Plugin <= 1.8.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fbb7a39-936b-48f1-97f1-46dc23180b00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-page-feed-graph-api/" + google-query: inurl:"/wp-content/plugins/facebook-page-feed-graph-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-page-feed-graph-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-page-feed-graph-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-page-feed-graph-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-page-photo-gallery-358b0cd776c979c59cab288ffb33dfa2.yaml b/nuclei-templates/cve-less/plugins/facebook-page-photo-gallery-358b0cd776c979c59cab288ffb33dfa2.yaml new file mode 100644 index 0000000000..fcba9e3a23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-page-photo-gallery-358b0cd776c979c59cab288ffb33dfa2.yaml @@ -0,0 +1,58 @@ +id: facebook-page-photo-gallery-358b0cd776c979c59cab288ffb33dfa2 + +info: + name: > + Facebook Page Photo Gallery <= 2.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f23bec2-6079-41f6-99c1-80b0b47797ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-page-photo-gallery/" + google-query: inurl:"/wp-content/plugins/facebook-page-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-page-photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-page-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-page-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-pagelike-widget-f5225829b9851280f9730cc7388f8c93.yaml b/nuclei-templates/cve-less/plugins/facebook-pagelike-widget-f5225829b9851280f9730cc7388f8c93.yaml new file mode 100644 index 0000000000..b5b37d3675 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-pagelike-widget-f5225829b9851280f9730cc7388f8c93.yaml @@ -0,0 +1,58 @@ +id: facebook-pagelike-widget-f5225829b9851280f9730cc7388f8c93 + +info: + name: > + Widget for Social Page Feeds <= 6.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b08f457-0864-41e0-b45e-cbd597d87752?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-pagelike-widget/" + google-query: inurl:"/wp-content/plugins/facebook-pagelike-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-pagelike-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-pagelike-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-pagelike-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/facebook-wall-and-social-integration-0c15ed5f69fa39b17ef98a0065e40d8c.yaml b/nuclei-templates/cve-less/plugins/facebook-wall-and-social-integration-0c15ed5f69fa39b17ef98a0065e40d8c.yaml new file mode 100644 index 0000000000..0bfa911dde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/facebook-wall-and-social-integration-0c15ed5f69fa39b17ef98a0065e40d8c.yaml @@ -0,0 +1,58 @@ +id: facebook-wall-and-social-integration-0c15ed5f69fa39b17ef98a0065e40d8c + +info: + name: > + Mitsol Social Post Feed <= 1.10 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86264c7d-d1a5-4f3a-872f-b27a94d796e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/facebook-wall-and-social-integration/" + google-query: inurl:"/wp-content/plugins/facebook-wall-and-social-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,facebook-wall-and-social-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/facebook-wall-and-social-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "facebook-wall-and-social-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/faculty-weekly-schedule-49f7af60a7d6ca8e6785ad7873768f2a.yaml b/nuclei-templates/cve-less/plugins/faculty-weekly-schedule-49f7af60a7d6ca8e6785ad7873768f2a.yaml new file mode 100644 index 0000000000..efe38ab103 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/faculty-weekly-schedule-49f7af60a7d6ca8e6785ad7873768f2a.yaml @@ -0,0 +1,58 @@ +id: faculty-weekly-schedule-49f7af60a7d6ca8e6785ad7873768f2a + +info: + name: > + JQueryFileTree <= 2.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f20352f-386f-45ab-b719-8a70f5c11b02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/faculty-weekly-schedule/" + google-query: inurl:"/wp-content/plugins/faculty-weekly-schedule/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,faculty-weekly-schedule,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/faculty-weekly-schedule/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "faculty-weekly-schedule" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/falang-32c41bb49a17f6a6d495a0dfbe10790b.yaml b/nuclei-templates/cve-less/plugins/falang-32c41bb49a17f6a6d495a0dfbe10790b.yaml new file mode 100644 index 0000000000..42837f18fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/falang-32c41bb49a17f6a6d495a0dfbe10790b.yaml @@ -0,0 +1,58 @@ +id: falang-32c41bb49a17f6a6d495a0dfbe10790b + +info: + name: > + Falang multilanguage <= 1.3.47 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03c8a13e-7484-40f1-907f-f3a5ace9f7e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/falang/" + google-query: inurl:"/wp-content/plugins/falang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,falang,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/falang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "falang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.47') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/falang-8f62194e57a27510760b3cae99e669fe.yaml b/nuclei-templates/cve-less/plugins/falang-8f62194e57a27510760b3cae99e669fe.yaml new file mode 100644 index 0000000000..33edab6fa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/falang-8f62194e57a27510760b3cae99e669fe.yaml @@ -0,0 +1,58 @@ +id: falang-8f62194e57a27510760b3cae99e669fe + +info: + name: > + Falang multilanguage for WordPress <= 1.3.49 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b62949fd-d73f-4c42-82c7-c29986bca1da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/falang/" + google-query: inurl:"/wp-content/plugins/falang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,falang,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/falang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "falang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.49') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/falang-d0610fbd136beeb3618a2a0d3d1b4015.yaml b/nuclei-templates/cve-less/plugins/falang-d0610fbd136beeb3618a2a0d3d1b4015.yaml new file mode 100644 index 0000000000..d6660cf61b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/falang-d0610fbd136beeb3618a2a0d3d1b4015.yaml @@ -0,0 +1,58 @@ +id: falang-d0610fbd136beeb3618a2a0d3d1b4015 + +info: + name: > + Falang multilanguage <= 1.3.39 - Cross-Site Request Forgery via add_language + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac10b30d-1fe3-46f4-a4fc-fa2acd7f9db4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/falang/" + google-query: inurl:"/wp-content/plugins/falang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,falang,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/falang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "falang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/falang-d9e8ea266e8afee7a81a9944bddd705c.yaml b/nuclei-templates/cve-less/plugins/falang-d9e8ea266e8afee7a81a9944bddd705c.yaml new file mode 100644 index 0000000000..e6d43cc571 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/falang-d9e8ea266e8afee7a81a9944bddd705c.yaml @@ -0,0 +1,58 @@ +id: falang-d9e8ea266e8afee7a81a9944bddd705c + +info: + name: > + Falang multilanguage for WordPress < 1.3.18 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04917cfe-2bfb-48cf-a060-ca3bfde8eba1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/falang/" + google-query: inurl:"/wp-content/plugins/falang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,falang,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/falang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "falang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/famethemes-demo-importer-f93b5106a9e7f989d008def1a9504779.yaml b/nuclei-templates/cve-less/plugins/famethemes-demo-importer-f93b5106a9e7f989d008def1a9504779.yaml new file mode 100644 index 0000000000..7cdef51ccc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/famethemes-demo-importer-f93b5106a9e7f989d008def1a9504779.yaml @@ -0,0 +1,58 @@ +id: famethemes-demo-importer-f93b5106a9e7f989d008def1a9504779 + +info: + name: > + FameTheme Demo Importer <= 1.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09f450bb-28c1-4c1e-ae13-afd53759e02f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/famethemes-demo-importer/" + google-query: inurl:"/wp-content/plugins/famethemes-demo-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,famethemes-demo-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/famethemes-demo-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "famethemes-demo-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancier-author-box-7e3662ab11c3565756d75a405c4e3374.yaml b/nuclei-templates/cve-less/plugins/fancier-author-box-7e3662ab11c3565756d75a405c4e3374.yaml new file mode 100644 index 0000000000..d1cef1d285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancier-author-box-7e3662ab11c3565756d75a405c4e3374.yaml @@ -0,0 +1,58 @@ +id: fancier-author-box-7e3662ab11c3565756d75a405c4e3374 + +info: + name: > + Fancier Author Box by ThematoSoup <= 1.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90706a16-cd71-4040-ab0e-be8649110d3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancier-author-box/" + google-query: inurl:"/wp-content/plugins/fancier-author-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancier-author-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancier-author-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancier-author-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-cats-19f75dda03c1e9e919da72ec8c14ca5f.yaml b/nuclei-templates/cve-less/plugins/fancy-cats-19f75dda03c1e9e919da72ec8c14ca5f.yaml new file mode 100644 index 0000000000..83e1881a89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-cats-19f75dda03c1e9e919da72ec8c14ca5f.yaml @@ -0,0 +1,58 @@ +id: fancy-cats-19f75dda03c1e9e919da72ec8c14ca5f + +info: + name: > + Fancy Cats <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5872a69d-3314-4900-8f7b-bcbd8787a9fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-cats/" + google-query: inurl:"/wp-content/plugins/fancy-cats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-cats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-cats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-cats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-elementor-flipbox-4eb5559b22a18e9337a5880d5e2f32aa.yaml b/nuclei-templates/cve-less/plugins/fancy-elementor-flipbox-4eb5559b22a18e9337a5880d5e2f32aa.yaml new file mode 100644 index 0000000000..86eea8298b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-elementor-flipbox-4eb5559b22a18e9337a5880d5e2f32aa.yaml @@ -0,0 +1,58 @@ +id: fancy-elementor-flipbox-4eb5559b22a18e9337a5880d5e2f32aa + +info: + name: > + Fancy Elementor Flipbox <= 2.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Fancy Elementor Flipbox Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c877ac24-a6da-4e61-a669-a0224c9e3bb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-elementor-flipbox/" + google-query: inurl:"/wp-content/plugins/fancy-elementor-flipbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-elementor-flipbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-elementor-flipbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-elementor-flipbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-facebook-comments-0cc8ff0d29654f0f83c0bf1830dddb43.yaml b/nuclei-templates/cve-less/plugins/fancy-facebook-comments-0cc8ff0d29654f0f83c0bf1830dddb43.yaml new file mode 100644 index 0000000000..93a2db6d39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-facebook-comments-0cc8ff0d29654f0f83c0bf1830dddb43.yaml @@ -0,0 +1,58 @@ +id: fancy-facebook-comments-0cc8ff0d29654f0f83c0bf1830dddb43 + +info: + name: > + Fancy Comments WordPress <= 1.2.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21597f22-2690-4a3d-965f-bc99326b7e64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-facebook-comments/" + google-query: inurl:"/wp-content/plugins/fancy-facebook-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-facebook-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-facebook-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-facebook-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-facebook-comments-cedfa6f88d2bc9a6561954401e5a9b61.yaml b/nuclei-templates/cve-less/plugins/fancy-facebook-comments-cedfa6f88d2bc9a6561954401e5a9b61.yaml new file mode 100644 index 0000000000..cddf05b0b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-facebook-comments-cedfa6f88d2bc9a6561954401e5a9b61.yaml @@ -0,0 +1,58 @@ +id: fancy-facebook-comments-cedfa6f88d2bc9a6561954401e5a9b61 + +info: + name: > + WordPress Fancy Comments <= 1.2.10 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2508adc4-2a2f-4b6c-9b5a-da85d94226a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-facebook-comments/" + google-query: inurl:"/wp-content/plugins/fancy-facebook-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-facebook-comments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-facebook-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-facebook-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-gallery-d80de73f9f6546e4a52cda1c1451f11a.yaml b/nuclei-templates/cve-less/plugins/fancy-gallery-d80de73f9f6546e4a52cda1c1451f11a.yaml new file mode 100644 index 0000000000..54ffc2dfd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-gallery-d80de73f9f6546e4a52cda1c1451f11a.yaml @@ -0,0 +1,58 @@ +id: fancy-gallery-d80de73f9f6546e4a52cda1c1451f11a + +info: + name: > + Gallery Manager <= 1.5.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26766830-c772-46a3-a045-7bfbb530b50a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-gallery/" + google-query: inurl:"/wp-content/plugins/fancy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-16fc618536c8b0d70612472b29c155c9.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-16fc618536c8b0d70612472b29c155c9.yaml new file mode 100644 index 0000000000..d4cee5eccd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-16fc618536c8b0d70612472b29c155c9.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-16fc618536c8b0d70612472b29c155c9 + +info: + name: > + Fancy Product Designer <= 4.7.5 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/232a274f-c194-4c5b-a1a8-899a822e47fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-29abd196b81aad745cf652b3ba722e02.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-29abd196b81aad745cf652b3ba722e02.yaml new file mode 100644 index 0000000000..5fea03ad94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-29abd196b81aad745cf652b3ba722e02.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-29abd196b81aad745cf652b3ba722e02 + +info: + name: > + Fancy Product Designer <= 4.5.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a80c306e-323b-4ab4-955b-4e264625731c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-39de068f6a175124d260efb8485f212d.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-39de068f6a175124d260efb8485f212d.yaml new file mode 100644 index 0000000000..dfcfd612bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-39de068f6a175124d260efb8485f212d.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-39de068f6a175124d260efb8485f212d + +info: + name: > + Fancy Product Designer <= 4.6.9 - Insufficient Authorization on Mulitple AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/644624d8-c193-4ee6-bc82-7ccda5d7f2ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-4db617a8e70c447eb683850e9e2a4ba2.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-4db617a8e70c447eb683850e9e2a4ba2.yaml new file mode 100644 index 0000000000..dfcc7fc6ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-4db617a8e70c447eb683850e9e2a4ba2.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-4db617a8e70c447eb683850e9e2a4ba2 + +info: + name: > + Fancy Product Designer <= 4.6.9 - Insufficient Authorization to Arbitrary Options Update via fpd_update_options + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea097cb7-85f4-4b6d-9f29-bc2636993f21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-4e867da6f1b40e5f079dbf8385eca830.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-4e867da6f1b40e5f079dbf8385eca830.yaml new file mode 100644 index 0000000000..26d39a105d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-4e867da6f1b40e5f079dbf8385eca830.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-4e867da6f1b40e5f079dbf8385eca830 + +info: + name: > + Fancy Product Designer <= 6.1.4 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7167a731-8677-4ae2-a790-00a8295c9191?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-9feb5154944f3d4b90bd9e0974af5d4e.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-9feb5154944f3d4b90bd9e0974af5d4e.yaml new file mode 100644 index 0000000000..21b51551d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-9feb5154944f3d4b90bd9e0974af5d4e.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-9feb5154944f3d4b90bd9e0974af5d4e + +info: + name: > + Fancy Product Designer < 6.1.81 - Authenticated (Admin+) Stored Cross-Site Scripting via Product Title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f032d32-9e7d-4510-b4ea-4b57c0b80977?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-af9dbe3dcd6f267d4b1ed941cf9ecbc0.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-af9dbe3dcd6f267d4b1ed941cf9ecbc0.yaml new file mode 100644 index 0000000000..8f0f2eba85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-af9dbe3dcd6f267d4b1ed941cf9ecbc0.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-af9dbe3dcd6f267d4b1ed941cf9ecbc0 + +info: + name: > + Fancy Product Designer <= 6.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d23ac5df-3331-47e0-94b7-53ac8f228935?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-d07dd36048efbcee10cf1bb88265d662.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-d07dd36048efbcee10cf1bb88265d662.yaml new file mode 100644 index 0000000000..5c097d4e65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-d07dd36048efbcee10cf1bb88265d662.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-d07dd36048efbcee10cf1bb88265d662 + +info: + name: > + Fancy Product Designer <= 4.6.8 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb4674e-71e4-43db-ad9e-36ab15432149?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-d8e9444efeb93debc442fb77c567fbad.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-d8e9444efeb93debc442fb77c567fbad.yaml new file mode 100644 index 0000000000..b77ee1a706 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-d8e9444efeb93debc442fb77c567fbad.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-d8e9444efeb93debc442fb77c567fbad + +info: + name: > + Fancy Product Designer <= 4.7.4 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17dd97b6-a186-4351-b08b-1eff696e25b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancy-product-designer-fccc44e164a0cbb0e0c232ae976cbb5f.yaml b/nuclei-templates/cve-less/plugins/fancy-product-designer-fccc44e164a0cbb0e0c232ae976cbb5f.yaml new file mode 100644 index 0000000000..42e524a991 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancy-product-designer-fccc44e164a0cbb0e0c232ae976cbb5f.yaml @@ -0,0 +1,58 @@ +id: fancy-product-designer-fccc44e164a0cbb0e0c232ae976cbb5f + +info: + name: > + Fancy Product Designer < 6.1.81 - Authenticated (Admin+) Stored Cross-Site Scripting via License Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eda538ef-c053-4347-b345-d5d03db25a01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancy-product-designer/" + google-query: inurl:"/wp-content/plugins/fancy-product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancy-product-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancy-product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancy-product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancybox-for-wordpress-b8e3a07576df90727675ec278a1f9eb2.yaml b/nuclei-templates/cve-less/plugins/fancybox-for-wordpress-b8e3a07576df90727675ec278a1f9eb2.yaml new file mode 100644 index 0000000000..a26300647e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancybox-for-wordpress-b8e3a07576df90727675ec278a1f9eb2.yaml @@ -0,0 +1,58 @@ +id: fancybox-for-wordpress-b8e3a07576df90727675ec278a1f9eb2 + +info: + name: > + FancyBox for WordPress <= 3.0.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/646e3a57-92e1-4502-a0dd-8921e99cfe2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancybox-for-wordpress/" + google-query: inurl:"/wp-content/plugins/fancybox-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancybox-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancybox-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancybox-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancybox-for-wordpress-f5917cabea5f4d2844b07d04e1880958.yaml b/nuclei-templates/cve-less/plugins/fancybox-for-wordpress-f5917cabea5f4d2844b07d04e1880958.yaml new file mode 100644 index 0000000000..05e44d5e96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancybox-for-wordpress-f5917cabea5f4d2844b07d04e1880958.yaml @@ -0,0 +1,58 @@ +id: fancybox-for-wordpress-f5917cabea5f4d2844b07d04e1880958 + +info: + name: > + FancyBox for WordPress 3.0.2 - 3.3.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55f8d7e6-7bcd-4556-932b-7bf422db0b39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancybox-for-wordpress/" + google-query: inurl:"/wp-content/plugins/fancybox-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancybox-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancybox-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancybox-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.2', '<= 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fancyflickr-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/fancyflickr-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..f8c1a72e3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fancyflickr-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: fancyflickr-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fancyflickr/" + google-query: inurl:"/wp-content/plugins/fancyflickr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fancyflickr,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fancyflickr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fancyflickr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fantastic-content-protector-free-36f733a53254d69782057e16be93c1ec.yaml b/nuclei-templates/cve-less/plugins/fantastic-content-protector-free-36f733a53254d69782057e16be93c1ec.yaml new file mode 100644 index 0000000000..c0649218cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fantastic-content-protector-free-36f733a53254d69782057e16be93c1ec.yaml @@ -0,0 +1,58 @@ +id: fantastic-content-protector-free-36f733a53254d69782057e16be93c1ec + +info: + name: > + Fantastic Content Protector Free <= 2.6 - Missing Authorization via update_setting_fantastic_content_protector + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b93f8036-4a89-45e6-b86f-9d57e1662a35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fantastic-content-protector-free/" + google-query: inurl:"/wp-content/plugins/fantastic-content-protector-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fantastic-content-protector-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fantastic-content-protector-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fantastic-content-protector-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/faq-builder-ays-050ac633edcdd8103878bb1a391274ca.yaml b/nuclei-templates/cve-less/plugins/faq-builder-ays-050ac633edcdd8103878bb1a391274ca.yaml new file mode 100644 index 0000000000..568ea3fe42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/faq-builder-ays-050ac633edcdd8103878bb1a391274ca.yaml @@ -0,0 +1,58 @@ +id: faq-builder-ays-050ac633edcdd8103878bb1a391274ca + +info: + name: > + FAQ Builder AYS <= 1.3.5 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0a2a379-bd33-4c7d-8b79-e48a2df7e281?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/faq-builder-ays/" + google-query: inurl:"/wp-content/plugins/faq-builder-ays/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,faq-builder-ays,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/faq-builder-ays/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "faq-builder-ays" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/faq-for-woocommerce-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/faq-for-woocommerce-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..ee2168510b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/faq-for-woocommerce-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: faq-for-woocommerce-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/faq-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/faq-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,faq-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/faq-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "faq-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/faq-manager-with-structured-data-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/faq-manager-with-structured-data-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8c08bf7995 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/faq-manager-with-structured-data-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: faq-manager-with-structured-data-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/faq-manager-with-structured-data/" + google-query: inurl:"/wp-content/plugins/faq-manager-with-structured-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,faq-manager-with-structured-data,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/faq-manager-with-structured-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "faq-manager-with-structured-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/faq-wd-37ac09d863363372a10edf05c9e9e76f.yaml b/nuclei-templates/cve-less/plugins/faq-wd-37ac09d863363372a10edf05c9e9e76f.yaml new file mode 100644 index 0000000000..3054b4d179 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/faq-wd-37ac09d863363372a10edf05c9e9e76f.yaml @@ -0,0 +1,58 @@ +id: faq-wd-37ac09d863363372a10edf05c9e9e76f + +info: + name: > + 10WebFAQ <= 1.0.14 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd879bd9-d195-4146-b9dc-3ba7252645de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/faq-wd/" + google-query: inurl:"/wp-content/plugins/faq-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,faq-wd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/faq-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "faq-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/faqs-manager-45db54965982ed46b91f5576d8c56bfa.yaml b/nuclei-templates/cve-less/plugins/faqs-manager-45db54965982ed46b91f5576d8c56bfa.yaml new file mode 100644 index 0000000000..b90ce1c7da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/faqs-manager-45db54965982ed46b91f5576d8c56bfa.yaml @@ -0,0 +1,58 @@ +id: faqs-manager-45db54965982ed46b91f5576d8c56bfa + +info: + name: > + FAQs Manager <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ad2b168-5874-4b0f-8710-d9ed9afc54bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/faqs-manager/" + google-query: inurl:"/wp-content/plugins/faqs-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,faqs-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/faqs-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "faqs-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/faqs-manager-7a87807daec2011fba4e64fcc9f8c9ff.yaml b/nuclei-templates/cve-less/plugins/faqs-manager-7a87807daec2011fba4e64fcc9f8c9ff.yaml new file mode 100644 index 0000000000..56c1840f65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/faqs-manager-7a87807daec2011fba4e64fcc9f8c9ff.yaml @@ -0,0 +1,58 @@ +id: faqs-manager-7a87807daec2011fba4e64fcc9f8c9ff + +info: + name: > + FAQs Manager <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c0c6cb5-2cc7-4790-9338-11211974d5fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/faqs-manager/" + google-query: inurl:"/wp-content/plugins/faqs-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,faqs-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/faqs-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "faqs-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/faqs-manager-8cda9bfd3e2c450e7c2c0a786c763ffc.yaml b/nuclei-templates/cve-less/plugins/faqs-manager-8cda9bfd3e2c450e7c2c0a786c763ffc.yaml new file mode 100644 index 0000000000..6208bafc3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/faqs-manager-8cda9bfd3e2c450e7c2c0a786c763ffc.yaml @@ -0,0 +1,58 @@ +id: faqs-manager-8cda9bfd3e2c450e7c2c0a786c763ffc + +info: + name: > + FAQs Manager <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51634a0c-f979-403b-80b0-8e3a65e7ad35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/faqs-manager/" + google-query: inurl:"/wp-content/plugins/faqs-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,faqs-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/faqs-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "faqs-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/far-future-expiry-header-77b48f1e08249dfc6423fc64fae31250.yaml b/nuclei-templates/cve-less/plugins/far-future-expiry-header-77b48f1e08249dfc6423fc64fae31250.yaml new file mode 100644 index 0000000000..ed52b1b9f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/far-future-expiry-header-77b48f1e08249dfc6423fc64fae31250.yaml @@ -0,0 +1,58 @@ +id: far-future-expiry-header-77b48f1e08249dfc6423fc64fae31250 + +info: + name: > + Far Future Expiry Header <= 1.4 - Plugin's Settings Update via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68e6675e-b9f4-41e5-8ebf-abab53f5d542?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/far-future-expiry-header/" + google-query: inurl:"/wp-content/plugins/far-future-expiry-header/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,far-future-expiry-header,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/far-future-expiry-header/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "far-future-expiry-header" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fareharbor-64d859df68bf3f0a0838ef413ae7d21e.yaml b/nuclei-templates/cve-less/plugins/fareharbor-64d859df68bf3f0a0838ef413ae7d21e.yaml new file mode 100644 index 0000000000..2d3e829f8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fareharbor-64d859df68bf3f0a0838ef413ae7d21e.yaml @@ -0,0 +1,58 @@ +id: fareharbor-64d859df68bf3f0a0838ef413ae7d21e + +info: + name: > + FareHarbor for WordPress <= 3.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42ad6fef-4280-45db-a3e2-6d7522751fa7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fareharbor/" + google-query: inurl:"/wp-content/plugins/fareharbor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fareharbor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fareharbor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fareharbor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fareharbor-bb190962067ba33976cc3f88e434b44c.yaml b/nuclei-templates/cve-less/plugins/fareharbor-bb190962067ba33976cc3f88e434b44c.yaml new file mode 100644 index 0000000000..3f6dcf159d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fareharbor-bb190962067ba33976cc3f88e434b44c.yaml @@ -0,0 +1,58 @@ +id: fareharbor-bb190962067ba33976cc3f88e434b44c + +info: + name: > + FareHarbor for WordPress <= 3.6.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b40165b-17e3-4b87-8d0d-90d60ba4bf81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fareharbor/" + google-query: inurl:"/wp-content/plugins/fareharbor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fareharbor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fareharbor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fareharbor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/fast-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..db82b2af75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: fast-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/fast-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-checkout-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-custom-social-share-by-codebard-67c3c53f919818b53462cf301e3b0e2a.yaml b/nuclei-templates/cve-less/plugins/fast-custom-social-share-by-codebard-67c3c53f919818b53462cf301e3b0e2a.yaml new file mode 100644 index 0000000000..4f7fc74dea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-custom-social-share-by-codebard-67c3c53f919818b53462cf301e3b0e2a.yaml @@ -0,0 +1,58 @@ +id: fast-custom-social-share-by-codebard-67c3c53f919818b53462cf301e3b0e2a + +info: + name: > + Fast Custom Social Share by CodeBard <= 1.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3eece451-65a3-4c9d-a8eb-05f6f3e2d1d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-custom-social-share-by-codebard/" + google-query: inurl:"/wp-content/plugins/fast-custom-social-share-by-codebard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-custom-social-share-by-codebard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-custom-social-share-by-codebard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-custom-social-share-by-codebard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-flow-dashboard-02b84b42a8b3e6e7dc009b5046e38b5a.yaml b/nuclei-templates/cve-less/plugins/fast-flow-dashboard-02b84b42a8b3e6e7dc009b5046e38b5a.yaml new file mode 100644 index 0000000000..a02f8a5fc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-flow-dashboard-02b84b42a8b3e6e7dc009b5046e38b5a.yaml @@ -0,0 +1,58 @@ +id: fast-flow-dashboard-02b84b42a8b3e6e7dc009b5046e38b5a + +info: + name: > + Fast Flow <= 1.2.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39bbe18a-0212-4bfe-861f-2a213d67baec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-flow-dashboard/" + google-query: inurl:"/wp-content/plugins/fast-flow-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-flow-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-flow-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-flow-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-flow-dashboard-b95feef4ddcb37164d4f7af73136c4f2.yaml b/nuclei-templates/cve-less/plugins/fast-flow-dashboard-b95feef4ddcb37164d4f7af73136c4f2.yaml new file mode 100644 index 0000000000..b527a01220 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-flow-dashboard-b95feef4ddcb37164d4f7af73136c4f2.yaml @@ -0,0 +1,58 @@ +id: fast-flow-dashboard-b95feef4ddcb37164d4f7af73136c4f2 + +info: + name: > + Fast Flow <= 1.2.12 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1eeea385-734c-4403-8886-e3ad6dc47140?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-flow-dashboard/" + google-query: inurl:"/wp-content/plugins/fast-flow-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-flow-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-flow-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-flow-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-flow-dashboard-f6258bc363d2da9cfcc2e756e12cfc0e.yaml b/nuclei-templates/cve-less/plugins/fast-flow-dashboard-f6258bc363d2da9cfcc2e756e12cfc0e.yaml new file mode 100644 index 0000000000..06e1c2d0b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-flow-dashboard-f6258bc363d2da9cfcc2e756e12cfc0e.yaml @@ -0,0 +1,58 @@ +id: fast-flow-dashboard-f6258bc363d2da9cfcc2e756e12cfc0e + +info: + name: > + Fast Flow <= 1.2.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/370e816c-920a-4e53-a2f8-afe2806c9df3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-flow-dashboard/" + google-query: inurl:"/wp-content/plugins/fast-flow-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-flow-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-flow-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-flow-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-image-adder-de501746396265e937381399a0559403.yaml b/nuclei-templates/cve-less/plugins/fast-image-adder-de501746396265e937381399a0559403.yaml new file mode 100644 index 0000000000..f59c103cb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-image-adder-de501746396265e937381399a0559403.yaml @@ -0,0 +1,58 @@ +id: fast-image-adder-de501746396265e937381399a0559403 + +info: + name: > + Fast Image Adder < 1.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a330f907-37d5-484c-94c5-b8d191796cd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-image-adder/" + google-query: inurl:"/wp-content/plugins/fast-image-adder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-image-adder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-image-adder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-image-adder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-search-powered-by-solr-10798c3024f1dbe228591af7cfe4af9e.yaml b/nuclei-templates/cve-less/plugins/fast-search-powered-by-solr-10798c3024f1dbe228591af7cfe4af9e.yaml new file mode 100644 index 0000000000..9738931007 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-search-powered-by-solr-10798c3024f1dbe228591af7cfe4af9e.yaml @@ -0,0 +1,58 @@ +id: fast-search-powered-by-solr-10798c3024f1dbe228591af7cfe4af9e + +info: + name: > + Sunny Search <= 1.0.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f1902e7-66e9-417f-97ba-4db766cf29f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-search-powered-by-solr/" + google-query: inurl:"/wp-content/plugins/fast-search-powered-by-solr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-search-powered-by-solr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-search-powered-by-solr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-search-powered-by-solr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-search-powered-by-solr-6c441629c885cb1da3fc16e4bca4f23b.yaml b/nuclei-templates/cve-less/plugins/fast-search-powered-by-solr-6c441629c885cb1da3fc16e4bca4f23b.yaml new file mode 100644 index 0000000000..2a33c04aa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-search-powered-by-solr-6c441629c885cb1da3fc16e4bca4f23b.yaml @@ -0,0 +1,58 @@ +id: fast-search-powered-by-solr-6c441629c885cb1da3fc16e4bca4f23b + +info: + name: > + Sunny Search <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b977e3f8-46e7-4294-ab5c-e42e81c900e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-search-powered-by-solr/" + google-query: inurl:"/wp-content/plugins/fast-search-powered-by-solr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-search-powered-by-solr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-search-powered-by-solr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-search-powered-by-solr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-velocity-minify-eaab2de07f74987f7d28979a545e7860.yaml b/nuclei-templates/cve-less/plugins/fast-velocity-minify-eaab2de07f74987f7d28979a545e7860.yaml new file mode 100644 index 0000000000..f0c136e9cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-velocity-minify-eaab2de07f74987f7d28979a545e7860.yaml @@ -0,0 +1,58 @@ +id: fast-velocity-minify-eaab2de07f74987f7d28979a545e7860 + +info: + name: > + Fast Velocity Minify <= 2.7.6 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea13aebb-c853-4828-8d7f-b607aa83b702?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-velocity-minify/" + google-query: inurl:"/wp-content/plugins/fast-velocity-minify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-velocity-minify,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-velocity-minify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-velocity-minify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/fast-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b0fa378b16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: fast-wp-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-wp/" + google-query: inurl:"/wp-content/plugins/fast-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-wp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/fast-wp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..123eae26bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-wp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: fast-wp-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-wp/" + google-query: inurl:"/wp-content/plugins/fast-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fast-wp-speed-3cef17acd88883b32927f0569aa64da5.yaml b/nuclei-templates/cve-less/plugins/fast-wp-speed-3cef17acd88883b32927f0569aa64da5.yaml new file mode 100644 index 0000000000..a50062b433 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fast-wp-speed-3cef17acd88883b32927f0569aa64da5.yaml @@ -0,0 +1,58 @@ +id: fast-wp-speed-3cef17acd88883b32927f0569aa64da5 + +info: + name: > + Fast WP Speed <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd5a3d4b-6e8b-4abe-9f38-58accada2f57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fast-wp-speed/" + google-query: inurl:"/wp-content/plugins/fast-wp-speed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fast-wp-speed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fast-wp-speed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fast-wp-speed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fastdup-039ae8d5d3a67b23c1725f1bdffda73f.yaml b/nuclei-templates/cve-less/plugins/fastdup-039ae8d5d3a67b23c1725f1bdffda73f.yaml new file mode 100644 index 0000000000..c00f305ef6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fastdup-039ae8d5d3a67b23c1725f1bdffda73f.yaml @@ -0,0 +1,58 @@ +id: fastdup-039ae8d5d3a67b23c1725f1bdffda73f + +info: + name: > + FastDup <= 2.1.9 - Sensitive Information Exposure via Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fb646c4-6269-4354-b3a6-872c6303a6d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fastdup/" + google-query: inurl:"/wp-content/plugins/fastdup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fastdup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fastdup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fastdup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fastdup-3f7e597b394edb376b06e6e36b03a12d.yaml b/nuclei-templates/cve-less/plugins/fastdup-3f7e597b394edb376b06e6e36b03a12d.yaml new file mode 100644 index 0000000000..53df7d31c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fastdup-3f7e597b394edb376b06e6e36b03a12d.yaml @@ -0,0 +1,58 @@ +id: fastdup-3f7e597b394edb376b06e6e36b03a12d + +info: + name: > + FastDup <= 2.1.7 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8261317-462b-49c5-9526-20b695895e49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fastdup/" + google-query: inurl:"/wp-content/plugins/fastdup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fastdup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fastdup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fastdup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fastly-c285ca083315515fededeb2a0a197394.yaml b/nuclei-templates/cve-less/plugins/fastly-c285ca083315515fededeb2a0a197394.yaml new file mode 100644 index 0000000000..63c0229d69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fastly-c285ca083315515fededeb2a0a197394.yaml @@ -0,0 +1,58 @@ +id: fastly-c285ca083315515fededeb2a0a197394 + +info: + name: > + Fastly <= 0.97 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0042d5ba-62de-404e-9516-67cae618f684?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fastly/" + google-query: inurl:"/wp-content/plugins/fastly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fastly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fastly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fastly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.97') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fat-rat-collect-c3880379f0826cf949058267ed182aec.yaml b/nuclei-templates/cve-less/plugins/fat-rat-collect-c3880379f0826cf949058267ed182aec.yaml new file mode 100644 index 0000000000..d0396e7cf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fat-rat-collect-c3880379f0826cf949058267ed182aec.yaml @@ -0,0 +1,58 @@ +id: fat-rat-collect-c3880379f0826cf949058267ed182aec + +info: + name: > + Fat Rat Collect <= 2.6.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/279cebb5-4be4-485a-92c7-e0bcc961f93e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fat-rat-collect/" + google-query: inurl:"/wp-content/plugins/fat-rat-collect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fat-rat-collect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fat-rat-collect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fat-rat-collect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fatal-error-notify-2c794f20622aac748763bd2f16b2b33a.yaml b/nuclei-templates/cve-less/plugins/fatal-error-notify-2c794f20622aac748763bd2f16b2b33a.yaml new file mode 100644 index 0000000000..7521883834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fatal-error-notify-2c794f20622aac748763bd2f16b2b33a.yaml @@ -0,0 +1,58 @@ +id: fatal-error-notify-2c794f20622aac748763bd2f16b2b33a + +info: + name: > + Fatal Error Notify <= 1.5.2 - Cross-Site Request Forgery to Test Error Email Sending + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08b75cac-7b1d-4bed-a1b7-bd1e872f2b4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fatal-error-notify/" + google-query: inurl:"/wp-content/plugins/fatal-error-notify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fatal-error-notify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fatal-error-notify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fatal-error-notify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fatal-error-notify-e34616bfa39928844a257bee23d26881.yaml b/nuclei-templates/cve-less/plugins/fatal-error-notify-e34616bfa39928844a257bee23d26881.yaml new file mode 100644 index 0000000000..94ae4a1c27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fatal-error-notify-e34616bfa39928844a257bee23d26881.yaml @@ -0,0 +1,58 @@ +id: fatal-error-notify-e34616bfa39928844a257bee23d26881 + +info: + name: > + Fatal Error Notify <= 1.5.2 - Missing Authorization to Test Error Email Sending + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50499cd6-0e27-494a-892c-5ca827d4433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fatal-error-notify/" + google-query: inurl:"/wp-content/plugins/fatal-error-notify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fatal-error-notify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fatal-error-notify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fatal-error-notify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fathom-analytics-b1767ac6c4058810b3f215f7aa0668ab.yaml b/nuclei-templates/cve-less/plugins/fathom-analytics-b1767ac6c4058810b3f215f7aa0668ab.yaml new file mode 100644 index 0000000000..3a5d45b335 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fathom-analytics-b1767ac6c4058810b3f215f7aa0668ab.yaml @@ -0,0 +1,58 @@ +id: fathom-analytics-b1767ac6c4058810b3f215f7aa0668ab + +info: + name: > + Fathom Analytics <= 3.0.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/728cec6e-a246-4e2c-a906-750518bae0a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fathom-analytics/" + google-query: inurl:"/wp-content/plugins/fathom-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fathom-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fathom-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fathom-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fathom-analytics-cf309d1aebaaa67d40cb82a03fbd96af.yaml b/nuclei-templates/cve-less/plugins/fathom-analytics-cf309d1aebaaa67d40cb82a03fbd96af.yaml new file mode 100644 index 0000000000..036986b2b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fathom-analytics-cf309d1aebaaa67d40cb82a03fbd96af.yaml @@ -0,0 +1,58 @@ +id: fathom-analytics-cf309d1aebaaa67d40cb82a03fbd96af + +info: + name: > + Fathom Analytics <= 3.0.7 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3343d96-ca52-46a6-b464-cd2e5375d10f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fathom-analytics/" + google-query: inurl:"/wp-content/plugins/fathom-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fathom-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fathom-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fathom-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fattura24-0997377af0d71afd8bec87a13519fcf6.yaml b/nuclei-templates/cve-less/plugins/fattura24-0997377af0d71afd8bec87a13519fcf6.yaml new file mode 100644 index 0000000000..82dae98a11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fattura24-0997377af0d71afd8bec87a13519fcf6.yaml @@ -0,0 +1,58 @@ +id: fattura24-0997377af0d71afd8bec87a13519fcf6 + +info: + name: > + Fattura24 <= 6.2.7 - Reflected Cross-Site Scripting via 'id' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a19bff99-b680-40a6-8a5c-7a0233b293ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fattura24/" + google-query: inurl:"/wp-content/plugins/fattura24/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fattura24,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fattura24/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fattura24" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-04adb1c439e43352ed4b6cca99f5cd66.yaml b/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-04adb1c439e43352ed4b6cca99f5cd66.yaml new file mode 100644 index 0000000000..85be978a61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-04adb1c439e43352ed4b6cca99f5cd66.yaml @@ -0,0 +1,58 @@ +id: favicon-by-realfavicongenerator-04adb1c439e43352ed4b6cca99f5cd66 + +info: + name: > + Favicon by RealFaviconGenerator <= 1.3.22 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ebc4c47-a286-4135-90ee-eccad8579661?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/favicon-by-realfavicongenerator/" + google-query: inurl:"/wp-content/plugins/favicon-by-realfavicongenerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,favicon-by-realfavicongenerator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/favicon-by-realfavicongenerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "favicon-by-realfavicongenerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-2a790c8bfc2f91a748cff8286de5f526.yaml b/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-2a790c8bfc2f91a748cff8286de5f526.yaml new file mode 100644 index 0000000000..f5a47aeb52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-2a790c8bfc2f91a748cff8286de5f526.yaml @@ -0,0 +1,58 @@ +id: favicon-by-realfavicongenerator-2a790c8bfc2f91a748cff8286de5f526 + +info: + name: > + Favicon by RealFaviconGenerator <= 1.2.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b78e1e8-2298-4889-955c-e9b7472ffbff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/favicon-by-realfavicongenerator/" + google-query: inurl:"/wp-content/plugins/favicon-by-realfavicongenerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,favicon-by-realfavicongenerator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/favicon-by-realfavicongenerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "favicon-by-realfavicongenerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-c944b74833c9d564f3c694b934416df0.yaml b/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-c944b74833c9d564f3c694b934416df0.yaml new file mode 100644 index 0000000000..1b49208a16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-c944b74833c9d564f3c694b934416df0.yaml @@ -0,0 +1,58 @@ +id: favicon-by-realfavicongenerator-c944b74833c9d564f3c694b934416df0 + +info: + name: > + Favicon by RealFaviconGenerator <= 1.3.21 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b14cada2-5d04-47a1-b648-048fcbabd2b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/favicon-by-realfavicongenerator/" + google-query: inurl:"/wp-content/plugins/favicon-by-realfavicongenerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,favicon-by-realfavicongenerator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/favicon-by-realfavicongenerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "favicon-by-realfavicongenerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-d2c74ce8c17fcc02d9a06b8743990dd7.yaml b/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-d2c74ce8c17fcc02d9a06b8743990dd7.yaml new file mode 100644 index 0000000000..3563c98757 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/favicon-by-realfavicongenerator-d2c74ce8c17fcc02d9a06b8743990dd7.yaml @@ -0,0 +1,58 @@ +id: favicon-by-realfavicongenerator-d2c74ce8c17fcc02d9a06b8743990dd7 + +info: + name: > + Favicon <= 1.3.29 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a5d59da-dcac-44b4-a697-38eef650c6de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/favicon-by-realfavicongenerator/" + google-query: inurl:"/wp-content/plugins/favicon-by-realfavicongenerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,favicon-by-realfavicongenerator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/favicon-by-realfavicongenerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "favicon-by-realfavicongenerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/favicon-rotator-7a9bf969e6086f1f35cf7f6bd6e6d0d3.yaml b/nuclei-templates/cve-less/plugins/favicon-rotator-7a9bf969e6086f1f35cf7f6bd6e6d0d3.yaml new file mode 100644 index 0000000000..4ad400a10b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/favicon-rotator-7a9bf969e6086f1f35cf7f6bd6e6d0d3.yaml @@ -0,0 +1,58 @@ +id: favicon-rotator-7a9bf969e6086f1f35cf7f6bd6e6d0d3 + +info: + name: > + Favicon Rotator <= 1.2.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4197dd30-bfd8-4d6c-80f5-b13e3844adf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/favicon-rotator/" + google-query: inurl:"/wp-content/plugins/favicon-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,favicon-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/favicon-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "favicon-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/favicon-switcher-0f224f68bb34d36af769db2549696ba9.yaml b/nuclei-templates/cve-less/plugins/favicon-switcher-0f224f68bb34d36af769db2549696ba9.yaml new file mode 100644 index 0000000000..c27a86d97d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/favicon-switcher-0f224f68bb34d36af769db2549696ba9.yaml @@ -0,0 +1,58 @@ +id: favicon-switcher-0f224f68bb34d36af769db2549696ba9 + +info: + name: > + FavIcon Switcher <= 1.2.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e900c98-5ab1-4674-b820-553c44df7c02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/favicon-switcher/" + google-query: inurl:"/wp-content/plugins/favicon-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,favicon-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/favicon-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "favicon-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/favorites-46a2cdc68c7e07f12ed856fe3a47afc0.yaml b/nuclei-templates/cve-less/plugins/favorites-46a2cdc68c7e07f12ed856fe3a47afc0.yaml new file mode 100644 index 0000000000..71380ac8f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/favorites-46a2cdc68c7e07f12ed856fe3a47afc0.yaml @@ -0,0 +1,58 @@ +id: favorites-46a2cdc68c7e07f12ed856fe3a47afc0 + +info: + name: > + Favorites <= 2.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38a87046-9a46-40c2-b10d-d1a7d5ef8742?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/favorites/" + google-query: inurl:"/wp-content/plugins/favorites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,favorites,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/favorites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "favorites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/favorites-f2c467fe9ec6884b9a3fd8b065881ed3.yaml b/nuclei-templates/cve-less/plugins/favorites-f2c467fe9ec6884b9a3fd8b065881ed3.yaml new file mode 100644 index 0000000000..42a90e5ac7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/favorites-f2c467fe9ec6884b9a3fd8b065881ed3.yaml @@ -0,0 +1,58 @@ +id: favorites-f2c467fe9ec6884b9a3fd8b065881ed3 + +info: + name: > + Favorites <= 2.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bd03cd0-34f0-491c-8247-79656eba32a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/favorites/" + google-query: inurl:"/wp-content/plugins/favorites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,favorites,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/favorites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "favorites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fb-messenger-live-chat-13667cae5910c516f9b6358e59dc09f8.yaml b/nuclei-templates/cve-less/plugins/fb-messenger-live-chat-13667cae5910c516f9b6358e59dc09f8.yaml new file mode 100644 index 0000000000..1f75bc9b6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fb-messenger-live-chat-13667cae5910c516f9b6358e59dc09f8.yaml @@ -0,0 +1,58 @@ +id: fb-messenger-live-chat-13667cae5910c516f9b6358e59dc09f8 + +info: + name: > + Live Chat with Messenger Customer Chat <= 1.4.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/465f29c0-99b9-4f7d-9817-3d3a49a2d943?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fb-messenger-live-chat/" + google-query: inurl:"/wp-content/plugins/fb-messenger-live-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fb-messenger-live-chat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fb-messenger-live-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fb-messenger-live-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fbgorilla-b397f1751be329a0c2dee713557b74c5.yaml b/nuclei-templates/cve-less/plugins/fbgorilla-b397f1751be329a0c2dee713557b74c5.yaml new file mode 100644 index 0000000000..0c1adb8c35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fbgorilla-b397f1751be329a0c2dee713557b74c5.yaml @@ -0,0 +1,58 @@ +id: fbgorilla-b397f1751be329a0c2dee713557b74c5 + +info: + name: > + FBGorilla (All Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7183288f-47f1-477b-974d-e5e21c170d0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fbgorilla/" + google-query: inurl:"/wp-content/plugins/fbgorilla/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fbgorilla,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fbgorilla/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fbgorilla" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fbpromotions-26cfa8bd44fa751562e056cb1d39d345.yaml b/nuclei-templates/cve-less/plugins/fbpromotions-26cfa8bd44fa751562e056cb1d39d345.yaml new file mode 100644 index 0000000000..85d0c78d2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fbpromotions-26cfa8bd44fa751562e056cb1d39d345.yaml @@ -0,0 +1,58 @@ +id: fbpromotions-26cfa8bd44fa751562e056cb1d39d345 + +info: + name: > + Bugs Go Viral : Facebook Promotion Generator <= 1.3.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9259875-c63f-48ed-a3c8-4d6d0ffe8004?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fbpromotions/" + google-query: inurl:"/wp-content/plugins/fbpromotions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fbpromotions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fbpromotions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fbpromotions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fbsurveypro-2298bd051dab3ee548414fe72135c13f.yaml b/nuclei-templates/cve-less/plugins/fbsurveypro-2298bd051dab3ee548414fe72135c13f.yaml new file mode 100644 index 0000000000..d40b71b715 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fbsurveypro-2298bd051dab3ee548414fe72135c13f.yaml @@ -0,0 +1,58 @@ +id: fbsurveypro-2298bd051dab3ee548414fe72135c13f + +info: + name: > + Facebook Survey Pro <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/187df8e0-80f0-4805-823b-80627b76db2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fbsurveypro/" + google-query: inurl:"/wp-content/plugins/fbsurveypro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fbsurveypro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fbsurveypro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fbsurveypro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fcchat-50a85ccbd8f65581857b36c230e78a0e.yaml b/nuclei-templates/cve-less/plugins/fcchat-50a85ccbd8f65581857b36c230e78a0e.yaml new file mode 100644 index 0000000000..330fb9888b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fcchat-50a85ccbd8f65581857b36c230e78a0e.yaml @@ -0,0 +1,58 @@ +id: fcchat-50a85ccbd8f65581857b36c230e78a0e + +info: + name: > + FCChat Widget < 2.2.13.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8e849fb-76e0-427a-8e05-d340add1c150?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fcchat/" + google-query: inurl:"/wp-content/plugins/fcchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fcchat,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fcchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fcchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.13.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fd-elementor-imagebox-c24b6fa8b7a5214338fb56e211d63730.yaml b/nuclei-templates/cve-less/plugins/fd-elementor-imagebox-c24b6fa8b7a5214338fb56e211d63730.yaml new file mode 100644 index 0000000000..c3181c9b0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fd-elementor-imagebox-c24b6fa8b7a5214338fb56e211d63730.yaml @@ -0,0 +1,58 @@ +id: fd-elementor-imagebox-c24b6fa8b7a5214338fb56e211d63730 + +info: + name: > + Elementor ImageBox <= 1.2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e24c8f4-32c9-4c21-88d9-588913cbb474?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fd-elementor-imagebox/" + google-query: inurl:"/wp-content/plugins/fd-elementor-imagebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fd-elementor-imagebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fd-elementor-imagebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fd-elementor-imagebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feather-login-page-466b2b2c45e70711b7c7f49150c81d51.yaml b/nuclei-templates/cve-less/plugins/feather-login-page-466b2b2c45e70711b7c7f49150c81d51.yaml new file mode 100644 index 0000000000..ff061bea57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feather-login-page-466b2b2c45e70711b7c7f49150c81d51.yaml @@ -0,0 +1,58 @@ +id: feather-login-page-466b2b2c45e70711b7c7f49150c81d51 + +info: + name: > + Feather Login Page <= 1.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1a85bc2-0b00-4635-86f6-26e96cc0616e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feather-login-page/" + google-query: inurl:"/wp-content/plugins/feather-login-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feather-login-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feather-login-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feather-login-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feather-login-page-5f677e9c4742e755f3a729c6304d8024.yaml b/nuclei-templates/cve-less/plugins/feather-login-page-5f677e9c4742e755f3a729c6304d8024.yaml new file mode 100644 index 0000000000..d989723f59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feather-login-page-5f677e9c4742e755f3a729c6304d8024.yaml @@ -0,0 +1,58 @@ +id: feather-login-page-5f677e9c4742e755f3a729c6304d8024 + +info: + name: > + Feather Login Page <= 1.1.5 - Cross-Site Request Forgery via saveData() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89d42a87-6adc-43e6-868f-b9b2c51ed8e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feather-login-page/" + google-query: inurl:"/wp-content/plugins/feather-login-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feather-login-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feather-login-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feather-login-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feather-login-page-a766deff845672c22971718a646cf246.yaml b/nuclei-templates/cve-less/plugins/feather-login-page-a766deff845672c22971718a646cf246.yaml new file mode 100644 index 0000000000..f18aca3f3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feather-login-page-a766deff845672c22971718a646cf246.yaml @@ -0,0 +1,58 @@ +id: feather-login-page-a766deff845672c22971718a646cf246 + +info: + name: > + Feather Login Page 1.0.7 - 1.1.1 - Missing Authorization to Non-Arbitrary User Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d58a6a4-de2c-485f-a8b0-7a7d144fbf3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feather-login-page/" + google-query: inurl:"/wp-content/plugins/feather-login-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feather-login-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feather-login-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feather-login-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.7', '<= 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feather-login-page-a8cea4062eea92bba71d4c0d54416fa2.yaml b/nuclei-templates/cve-less/plugins/feather-login-page-a8cea4062eea92bba71d4c0d54416fa2.yaml new file mode 100644 index 0000000000..d505120ee4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feather-login-page-a8cea4062eea92bba71d4c0d54416fa2.yaml @@ -0,0 +1,58 @@ +id: feather-login-page-a8cea4062eea92bba71d4c0d54416fa2 + +info: + name: > + Feather Login Page 1.0.7 - 1.1.1 - Cross-Site Request Forgery to Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12560b8e-9c47-4f7f-ac9c-d86f17914ba3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feather-login-page/" + google-query: inurl:"/wp-content/plugins/feather-login-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feather-login-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feather-login-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feather-login-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.7', '<= 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feather-login-page-d93191ee66b814104763b1eec2af5866.yaml b/nuclei-templates/cve-less/plugins/feather-login-page-d93191ee66b814104763b1eec2af5866.yaml new file mode 100644 index 0000000000..d6a8e53186 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feather-login-page-d93191ee66b814104763b1eec2af5866.yaml @@ -0,0 +1,58 @@ +id: feather-login-page-d93191ee66b814104763b1eec2af5866 + +info: + name: > + Feather Login Page 1.0.7 - 1.1.1 - Missing Authorization to Authentication Bypass and Privilege Escalation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ab2178-7438-43ef-961e-b54d0d230f4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feather-login-page/" + google-query: inurl:"/wp-content/plugins/feather-login-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feather-login-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feather-login-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feather-login-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.7', '<= 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feature-comments-785672d467101767144e711ae7fe2d35.yaml b/nuclei-templates/cve-less/plugins/feature-comments-785672d467101767144e711ae7fe2d35.yaml new file mode 100644 index 0000000000..f5ffa30bc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feature-comments-785672d467101767144e711ae7fe2d35.yaml @@ -0,0 +1,58 @@ +id: feature-comments-785672d467101767144e711ae7fe2d35 + +info: + name: > + Featured Comments < 1.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23b5cc65-70d2-46b1-a37a-97af231aff51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feature-comments/" + google-query: inurl:"/wp-content/plugins/feature-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feature-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feature-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feature-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feature-comments-80de44f32a39260a4242f01334cdbfd5.yaml b/nuclei-templates/cve-less/plugins/feature-comments-80de44f32a39260a4242f01334cdbfd5.yaml new file mode 100644 index 0000000000..07a66d5609 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feature-comments-80de44f32a39260a4242f01334cdbfd5.yaml @@ -0,0 +1,58 @@ +id: feature-comments-80de44f32a39260a4242f01334cdbfd5 + +info: + name: > + Featured Comments < 1.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8107ed0c-c4eb-4704-9261-4e320e10cdb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feature-comments/" + google-query: inurl:"/wp-content/plugins/feature-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feature-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feature-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feature-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-caption-b18da97ec3842241538c439eaed13219.yaml b/nuclei-templates/cve-less/plugins/featured-image-caption-b18da97ec3842241538c439eaed13219.yaml new file mode 100644 index 0000000000..375335c6b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-caption-b18da97ec3842241538c439eaed13219.yaml @@ -0,0 +1,58 @@ +id: featured-image-caption-b18da97ec3842241538c439eaed13219 + +info: + name: > + Featured Image Caption <= 0.8.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c43a88c-6374-414f-97ae-26ba15d75cdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-caption/" + google-query: inurl:"/wp-content/plugins/featured-image-caption/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-caption,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-caption/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-caption" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-from-url-229d47673c8d48ef0cc745a328967153.yaml b/nuclei-templates/cve-less/plugins/featured-image-from-url-229d47673c8d48ef0cc745a328967153.yaml new file mode 100644 index 0000000000..a5e9481420 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-from-url-229d47673c8d48ef0cc745a328967153.yaml @@ -0,0 +1,58 @@ +id: featured-image-from-url-229d47673c8d48ef0cc745a328967153 + +info: + name: > + Featured Image from URL <= 2.7.7 - Missing Authorization on REST API routes + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4270a5c2-abc0-4505-9683-030dc08a462d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-from-url/" + google-query: inurl:"/wp-content/plugins/featured-image-from-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-from-url,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-from-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-from-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-from-url-3f695144fde56e5e68c9d7f131f8380c.yaml b/nuclei-templates/cve-less/plugins/featured-image-from-url-3f695144fde56e5e68c9d7f131f8380c.yaml new file mode 100644 index 0000000000..7cb0a1e924 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-from-url-3f695144fde56e5e68c9d7f131f8380c.yaml @@ -0,0 +1,58 @@ +id: featured-image-from-url-3f695144fde56e5e68c9d7f131f8380c + +info: + name: > + Featured Image from URL (FIFU) <= 3.9.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09ed1806-31b9-4851-99b1-a30eef4979a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-from-url/" + google-query: inurl:"/wp-content/plugins/featured-image-from-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-from-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-from-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-from-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-from-url-7420b38eef61601a8533cd300d3acef6.yaml b/nuclei-templates/cve-less/plugins/featured-image-from-url-7420b38eef61601a8533cd300d3acef6.yaml new file mode 100644 index 0000000000..ca0efc9b1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-from-url-7420b38eef61601a8533cd300d3acef6.yaml @@ -0,0 +1,58 @@ +id: featured-image-from-url-7420b38eef61601a8533cd300d3acef6 + +info: + name: > + Featured Image from URL (FIFU) <= 4.0.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89ea4709-f637-4932-9dbd-8b3fccab45a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-from-url/" + google-query: inurl:"/wp-content/plugins/featured-image-from-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-from-url,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-from-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-from-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-from-url-ec1b9ba6cd34426926dd05163ef9cdaf.yaml b/nuclei-templates/cve-less/plugins/featured-image-from-url-ec1b9ba6cd34426926dd05163ef9cdaf.yaml new file mode 100644 index 0000000000..48b5affd50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-from-url-ec1b9ba6cd34426926dd05163ef9cdaf.yaml @@ -0,0 +1,58 @@ +id: featured-image-from-url-ec1b9ba6cd34426926dd05163ef9cdaf + +info: + name: > + Featured Image from URL (FIFU) <= 4.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via fifu_input_url + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d1ea1c5-6a9e-4b77-bfdf-62e50d4a4c03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-from-url/" + google-query: inurl:"/wp-content/plugins/featured-image-from-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-from-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-from-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-from-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-from-url-f05edbcd117bd78991a113d104243207.yaml b/nuclei-templates/cve-less/plugins/featured-image-from-url-f05edbcd117bd78991a113d104243207.yaml new file mode 100644 index 0000000000..8629b103f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-from-url-f05edbcd117bd78991a113d104243207.yaml @@ -0,0 +1,58 @@ +id: featured-image-from-url-f05edbcd117bd78991a113d104243207 + +info: + name: > + Featured Image from URL (FIFU) <= 4.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via featured image alt text + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4d5ae93-000e-4001-adfa-c11058032469?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-from-url/" + google-query: inurl:"/wp-content/plugins/featured-image-from-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-from-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-from-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-from-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-pro-03f178f78e73af9717f96f4261197534.yaml b/nuclei-templates/cve-less/plugins/featured-image-pro-03f178f78e73af9717f96f4261197534.yaml new file mode 100644 index 0000000000..5cf71b09c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-pro-03f178f78e73af9717f96f4261197534.yaml @@ -0,0 +1,58 @@ +id: featured-image-pro-03f178f78e73af9717f96f4261197534 + +info: + name: > + Featured Image Pro Post Grid <= 5.14 - Reflected Cross-Site Scripting via page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1efb9215-542b-46a1-b358-f3d27339a920?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-pro/" + google-query: inurl:"/wp-content/plugins/featured-image-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/featured-image-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4c421f9ff2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: featured-image-toolkit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-toolkit/" + google-query: inurl:"/wp-content/plugins/featured-image-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-image-toolkit-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/featured-image-toolkit-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..462de17991 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-image-toolkit-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: featured-image-toolkit-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-image-toolkit/" + google-query: inurl:"/wp-content/plugins/featured-image-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-image-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-image-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-image-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-images-for-rss-feeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/featured-images-for-rss-feeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b9c10e1b0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-images-for-rss-feeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: featured-images-for-rss-feeds-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-images-for-rss-feeds/" + google-query: inurl:"/wp-content/plugins/featured-images-for-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-images-for-rss-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-images-for-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-images-for-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-post-creative-947aab9c660d0a41bcf7e37fa45491b8.yaml b/nuclei-templates/cve-less/plugins/featured-post-creative-947aab9c660d0a41bcf7e37fa45491b8.yaml new file mode 100644 index 0000000000..3bbc1b4bfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-post-creative-947aab9c660d0a41bcf7e37fa45491b8.yaml @@ -0,0 +1,58 @@ +id: featured-post-creative-947aab9c660d0a41bcf7e37fa45491b8 + +info: + name: > + Featured Post Creative <= 1.2.7 - Missing Authorization via wpfp_update_featured_post + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61585a02-fe7b-4a54-959f-346e4e0d6658?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-post-creative/" + google-query: inurl:"/wp-content/plugins/featured-post-creative/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-post-creative,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-post-creative/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-post-creative" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-post-creative-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/featured-post-creative-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..4a53278ad6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-post-creative-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: featured-post-creative-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-post-creative/" + google-query: inurl:"/wp-content/plugins/featured-post-creative/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-post-creative,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-post-creative/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-post-creative" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-post-creative-d494024f4c91e4cd37b950448b8c612e.yaml b/nuclei-templates/cve-less/plugins/featured-post-creative-d494024f4c91e4cd37b950448b8c612e.yaml new file mode 100644 index 0000000000..8af5454181 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-post-creative-d494024f4c91e4cd37b950448b8c612e.yaml @@ -0,0 +1,58 @@ +id: featured-post-creative-d494024f4c91e4cd37b950448b8c612e + +info: + name: > + Featured Post Creative <= 1.2.7 - Cross-Site Request Forgery via wpfp_update_featured_post + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33a47156-ee93-4b59-9f73-56be5c9e3b00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-post-creative/" + google-query: inurl:"/wp-content/plugins/featured-post-creative/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-post-creative,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-post-creative/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-post-creative" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featured-products-first-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/featured-products-first-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ca462b9d6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featured-products-first-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: featured-products-first-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featured-products-first-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/featured-products-first-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featured-products-first-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featured-products-first-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featured-products-first-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/featurific-for-wordpress-9bc357ece2cde706b261987c1bf85bfa.yaml b/nuclei-templates/cve-less/plugins/featurific-for-wordpress-9bc357ece2cde706b261987c1bf85bfa.yaml new file mode 100644 index 0000000000..9974e4aa21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/featurific-for-wordpress-9bc357ece2cde706b261987c1bf85bfa.yaml @@ -0,0 +1,58 @@ +id: featurific-for-wordpress-9bc357ece2cde706b261987c1bf85bfa + +info: + name: > + Featurific For WordPress <= 1.6.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b76734b-96ed-4643-b11b-bba0f0f228ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/featurific-for-wordpress/" + google-query: inurl:"/wp-content/plugins/featurific-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,featurific-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/featurific-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "featurific-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-changer-2344762ab01ebc08578d7b685bed6e58.yaml b/nuclei-templates/cve-less/plugins/feed-changer-2344762ab01ebc08578d7b685bed6e58.yaml new file mode 100644 index 0000000000..335639a273 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-changer-2344762ab01ebc08578d7b685bed6e58.yaml @@ -0,0 +1,58 @@ +id: feed-changer-2344762ab01ebc08578d7b685bed6e58 + +info: + name: > + Feed Changer <= 0.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9198ffe4-2f9e-4d80-9f5d-cf967b3feb43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-changer/" + google-query: inurl:"/wp-content/plugins/feed-changer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-changer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-changer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-changer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-instagram-lite-44a3ea00d7c2ac41df4b3a6ac3cf83ba.yaml b/nuclei-templates/cve-less/plugins/feed-instagram-lite-44a3ea00d7c2ac41df4b3a6ac3cf83ba.yaml new file mode 100644 index 0000000000..eb3e822627 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-instagram-lite-44a3ea00d7c2ac41df4b3a6ac3cf83ba.yaml @@ -0,0 +1,58 @@ +id: feed-instagram-lite-44a3ea00d7c2ac41df4b3a6ac3cf83ba + +info: + name: > + Gallery for Social Photo <= 1.0.0.27 - Cross-Site Request Forgery to Post Duplication + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6683edc-8c77-446c-bd7e-e97b8c5d0c57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-instagram-lite/" + google-query: inurl:"/wp-content/plugins/feed-instagram-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-instagram-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-instagram-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-instagram-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-instagram-lite-6358c61bb5cba311cb2b24aa2921d29a.yaml b/nuclei-templates/cve-less/plugins/feed-instagram-lite-6358c61bb5cba311cb2b24aa2921d29a.yaml new file mode 100644 index 0000000000..4a7713c54c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-instagram-lite-6358c61bb5cba311cb2b24aa2921d29a.yaml @@ -0,0 +1,58 @@ +id: feed-instagram-lite-6358c61bb5cba311cb2b24aa2921d29a + +info: + name: > + Gallery for Social Photo <= 1.0.0.25 - Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c906a988-ad45-49cc-9d77-6b501445ddc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-instagram-lite/" + google-query: inurl:"/wp-content/plugins/feed-instagram-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-instagram-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-instagram-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-instagram-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-gallery-5556a133daa1113e5966da5001155a19.yaml b/nuclei-templates/cve-less/plugins/feed-them-gallery-5556a133daa1113e5966da5001155a19.yaml new file mode 100644 index 0000000000..a7eb8cad16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-gallery-5556a133daa1113e5966da5001155a19.yaml @@ -0,0 +1,58 @@ +id: feed-them-gallery-5556a133daa1113e5966da5001155a19 + +info: + name: > + Feed Them Gallery <= 1.1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed866cda-2244-4172-a8bd-63005bbee4fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-gallery/" + google-query: inurl:"/wp-content/plugins/feed-them-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-193e887d8efbd63f7ee64b85c4a576a5.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-193e887d8efbd63f7ee64b85c4a576a5.yaml new file mode 100644 index 0000000000..b26ff677b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-193e887d8efbd63f7ee64b85c4a576a5.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-193e887d8efbd63f7ee64b85c4a576a5 + +info: + name: > + Feed Them Social – for Twitter feed, Youtube and more <= 2.9.9 - Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d07eefc-f406-4da4-addb-559caa6dc208?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-2476012a7e618bdb63629cf9e6f2cc39.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-2476012a7e618bdb63629cf9e6f2cc39.yaml new file mode 100644 index 0000000000..49d02071df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-2476012a7e618bdb63629cf9e6f2cc39.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-2476012a7e618bdb63629cf9e6f2cc39 + +info: + name: > + Feed Them Social <= 3.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/736d08ca-3f65-4232-96a9-303bafbf3471?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-274b8b119cea9c35028782c46e1417bd.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-274b8b119cea9c35028782c46e1417bd.yaml new file mode 100644 index 0000000000..37f30c3f8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-274b8b119cea9c35028782c46e1417bd.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-274b8b119cea9c35028782c46e1417bd + +info: + name: > + Feed Them Social – for Twitter feed, Youtube and more <= 2.9.8.5 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8599cb81-4f51-40b5-a0aa-5d27f2ae085d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-59dd174ba212cc11295537a27e4487d1.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-59dd174ba212cc11295537a27e4487d1.yaml new file mode 100644 index 0000000000..02b16abed3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-59dd174ba212cc11295537a27e4487d1.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-59dd174ba212cc11295537a27e4487d1 + +info: + name: > + Feed Them Social <= 4.2.0 - Cross-Site Request Forgery via review_nag_check + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e86152a6-cd8d-4466-bcc5-830413500e12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-60a7c7c6011ce03cafef9a29fbcdf397.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-60a7c7c6011ce03cafef9a29fbcdf397.yaml new file mode 100644 index 0000000000..546f2940f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-60a7c7c6011ce03cafef9a29fbcdf397.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-60a7c7c6011ce03cafef9a29fbcdf397 + +info: + name: > + Feed Them Social <= 4.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/057ab824-8071-4c3c-9a57-f9a0043a9ad5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-9019681407afd47da5b4816b7ae1001d.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-9019681407afd47da5b4816b7ae1001d.yaml new file mode 100644 index 0000000000..d6c336e965 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-9019681407afd47da5b4816b7ae1001d.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-9019681407afd47da5b4816b7ae1001d + +info: + name: > + Feed Them Social – for Twitter feed, Youtube and more <= 2.9.8.5 - Unauthenticated PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50bcea94-b12a-4b31-b0c1-bba834ea9bd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-9573f0bb03be4cafb0dc4630394c3c88.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-9573f0bb03be4cafb0dc4630394c3c88.yaml new file mode 100644 index 0000000000..2c5b832882 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-9573f0bb03be4cafb0dc4630394c3c88.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-9573f0bb03be4cafb0dc4630394c3c88 + +info: + name: > + Feed Them Social <= 1.6.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5d69895-2fe6-40cf-8d4d-aa274067495a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-9d9f62e188b5181406f57379c674b86e.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-9d9f62e188b5181406f57379c674b86e.yaml new file mode 100644 index 0000000000..9b5320d73f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-9d9f62e188b5181406f57379c674b86e.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-9d9f62e188b5181406f57379c674b86e + +info: + name: > + Feed Them Social – for Twitter feed, Youtube and more <= 2.9.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa9c2a67-e254-4dde-9f58-81281e98cdb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-a23e521e782f280a44a30c5f1b1f5875.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-a23e521e782f280a44a30c5f1b1f5875.yaml new file mode 100644 index 0000000000..472777ddc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-a23e521e782f280a44a30c5f1b1f5875.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-a23e521e782f280a44a30c5f1b1f5875 + +info: + name: > + Feed Them Social <= 1.6.9 - Arbitrary Shortcode Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67c7e67e-3e68-4f49-9d81-fa0ed451376e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-b04dd0f6bbdb43801b1ffc8fb55026f1.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-b04dd0f6bbdb43801b1ffc8fb55026f1.yaml new file mode 100644 index 0000000000..5a7b6202aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-b04dd0f6bbdb43801b1ffc8fb55026f1.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-b04dd0f6bbdb43801b1ffc8fb55026f1 + +info: + name: > + Feed Them Social – for Twitter feed, Youtube and more <= 2.9.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b000835-7f9d-44b4-92a3-ffce6e06d2ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-d72ce46972faf10b71efe8ec5768d82c.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-d72ce46972faf10b71efe8ec5768d82c.yaml new file mode 100644 index 0000000000..35bd24c432 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-d72ce46972faf10b71efe8ec5768d82c.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-d72ce46972faf10b71efe8ec5768d82c + +info: + name: > + Feed Them Social – Page, Post, Video, and Photo Galleries <= 2.8.6 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fcbe3d1-449c-4135-bbf5-9ea9236e5328?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-e4fb6d249b711115cf1c72af2ed8bb4d.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-e4fb6d249b711115cf1c72af2ed8bb4d.yaml new file mode 100644 index 0000000000..1286999ef1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-e4fb6d249b711115cf1c72af2ed8bb4d.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-e4fb6d249b711115cf1c72af2ed8bb4d + +info: + name: > + Feed Them Social – for Twitter feed, Youtube and more <= 2.9.9 - Cross-Site Request Forgery to Settings update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97460a9c-e996-4170-afa3-47db9097f3f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feed-them-social-fafa2caced18a7c0c4666d573df5d9d1.yaml b/nuclei-templates/cve-less/plugins/feed-them-social-fafa2caced18a7c0c4666d573df5d9d1.yaml new file mode 100644 index 0000000000..5e8fccb44b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feed-them-social-fafa2caced18a7c0c4666d573df5d9d1.yaml @@ -0,0 +1,58 @@ +id: feed-them-social-fafa2caced18a7c0c4666d573df5d9d1 + +info: + name: > + Feed Them Social – for Twitter feed, Youtube and more <= 2.9.9 - Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cf5879f-82ae-41de-b220-aaec45c96c87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feed-them-social/" + google-query: inurl:"/wp-content/plugins/feed-them-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feed-them-social,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feed-them-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feed-them-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedback-suite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/feedback-suite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ba7a54d71d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedback-suite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: feedback-suite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedback-suite/" + google-query: inurl:"/wp-content/plugins/feedback-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedback-suite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedback-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedback-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedback-suite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/feedback-suite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..b7604d827d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedback-suite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: feedback-suite-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedback-suite/" + google-query: inurl:"/wp-content/plugins/feedback-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedback-suite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedback-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedback-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedbackscout-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/feedbackscout-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8828e7054e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedbackscout-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: feedbackscout-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedbackscout/" + google-query: inurl:"/wp-content/plugins/feedbackscout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedbackscout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedbackscout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedbackscout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..2d009c8db0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: feedburner-alternative-and-rss-redirect-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedburner-alternative-and-rss-redirect/" + google-query: inurl:"/wp-content/plugins/feedburner-alternative-and-rss-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedburner-alternative-and-rss-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedburner-alternative-and-rss-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedburner-alternative-and-rss-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..9703fb1b2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: feedburner-alternative-and-rss-redirect-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedburner-alternative-and-rss-redirect/" + google-query: inurl:"/wp-content/plugins/feedburner-alternative-and-rss-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedburner-alternative-and-rss-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedburner-alternative-and-rss-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedburner-alternative-and-rss-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..6b54a25a82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedburner-alternative-and-rss-redirect-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: feedburner-alternative-and-rss-redirect-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedburner-alternative-and-rss-redirect/" + google-query: inurl:"/wp-content/plugins/feedburner-alternative-and-rss-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedburner-alternative-and-rss-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedburner-alternative-and-rss-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedburner-alternative-and-rss-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedburner-feedsmith-95305525d7820973fed879d8dfc49664.yaml b/nuclei-templates/cve-less/plugins/feedburner-feedsmith-95305525d7820973fed879d8dfc49664.yaml new file mode 100644 index 0000000000..394324b6f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedburner-feedsmith-95305525d7820973fed879d8dfc49664.yaml @@ -0,0 +1,58 @@ +id: feedburner-feedsmith-95305525d7820973fed879d8dfc49664 + +info: + name: > + FeedBurner FeedSmith <= 2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0c72033-ab9b-49bb-be28-e09a810137fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedburner-feedsmith/" + google-query: inurl:"/wp-content/plugins/feedburner-feedsmith/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedburner-feedsmith,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedburner-feedsmith/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedburner-feedsmith" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedfocal-033552000c57d4d0e9b8f1077c9a1953.yaml b/nuclei-templates/cve-less/plugins/feedfocal-033552000c57d4d0e9b8f1077c9a1953.yaml new file mode 100644 index 0000000000..9aed720e56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedfocal-033552000c57d4d0e9b8f1077c9a1953.yaml @@ -0,0 +1,58 @@ +id: feedfocal-033552000c57d4d0e9b8f1077c9a1953 + +info: + name: > + FeedFocal <= 1.2.2 - Missing Authorization via feedfocal_api_setup REST function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/489fe6ac-5437-44a2-93dc-00e75eefbc45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedfocal/" + google-query: inurl:"/wp-content/plugins/feedfocal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedfocal,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedfocal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedfocal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedlist-f30fee0809d10f803c0d4d592f397270.yaml b/nuclei-templates/cve-less/plugins/feedlist-f30fee0809d10f803c0d4d592f397270.yaml new file mode 100644 index 0000000000..1775d6ffc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedlist-f30fee0809d10f803c0d4d592f397270.yaml @@ -0,0 +1,58 @@ +id: feedlist-f30fee0809d10f803c0d4d592f397270 + +info: + name: > + FeedList <= 2.61.03 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae135c3-2b2b-4cd2-a17b-3b1e9de9dbac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedlist/" + google-query: inurl:"/wp-content/plugins/feedlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedlist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.61.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedpress-generator-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/feedpress-generator-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dea9d2616d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedpress-generator-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: feedpress-generator-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedpress-generator/" + google-query: inurl:"/wp-content/plugins/feedpress-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedpress-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedpress-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedpress-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feeds-for-youtube-50baee01b43a26ee8e4d58a0c9e6da8f.yaml b/nuclei-templates/cve-less/plugins/feeds-for-youtube-50baee01b43a26ee8e4d58a0c9e6da8f.yaml new file mode 100644 index 0000000000..538fb03fe8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feeds-for-youtube-50baee01b43a26ee8e4d58a0c9e6da8f.yaml @@ -0,0 +1,58 @@ +id: feeds-for-youtube-50baee01b43a26ee8e4d58a0c9e6da8f + +info: + name: > + Feeds for YouTube <= 2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376e2638-a873-4142-ad7d-067ae3333709?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feeds-for-youtube/" + google-query: inurl:"/wp-content/plugins/feeds-for-youtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feeds-for-youtube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feeds-for-youtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feeds-for-youtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feeds-for-youtube-ac43cf44566479227a4aa05f1f51c953.yaml b/nuclei-templates/cve-less/plugins/feeds-for-youtube-ac43cf44566479227a4aa05f1f51c953.yaml new file mode 100644 index 0000000000..d72078bccb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feeds-for-youtube-ac43cf44566479227a4aa05f1f51c953.yaml @@ -0,0 +1,58 @@ +id: feeds-for-youtube-ac43cf44566479227a4aa05f1f51c953 + +info: + name: > + Smash Balloon Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0efff314-b14f-4af4-b225-ba7e41d01b2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feeds-for-youtube/" + google-query: inurl:"/wp-content/plugins/feeds-for-youtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feeds-for-youtube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feeds-for-youtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feeds-for-youtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedstats-de-0cb6e32bbaac252186a04f8bf825e2e9.yaml b/nuclei-templates/cve-less/plugins/feedstats-de-0cb6e32bbaac252186a04f8bf825e2e9.yaml new file mode 100644 index 0000000000..ab27c66999 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedstats-de-0cb6e32bbaac252186a04f8bf825e2e9.yaml @@ -0,0 +1,58 @@ +id: feedstats-de-0cb6e32bbaac252186a04f8bf825e2e9 + +info: + name: > + FeedStats < 2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd903ec3-893e-4dd8-ad90-2e25a926ac4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedstats-de/" + google-query: inurl:"/wp-content/plugins/feedstats-de/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedstats-de,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedstats-de/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedstats-de" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedweb-42c984330043ff937717eb97d232bbd2.yaml b/nuclei-templates/cve-less/plugins/feedweb-42c984330043ff937717eb97d232bbd2.yaml new file mode 100644 index 0000000000..f8bf1b96ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedweb-42c984330043ff937717eb97d232bbd2.yaml @@ -0,0 +1,58 @@ +id: feedweb-42c984330043ff937717eb97d232bbd2 + +info: + name: > + Feedweb <= 3.0.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcb756d0-425e-48ae-bd7f-ec9404679aea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedweb/" + google-query: inurl:"/wp-content/plugins/feedweb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedweb,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedweb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedweb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedweb-42f14cb098faa7900818b46106b42afa.yaml b/nuclei-templates/cve-less/plugins/feedweb-42f14cb098faa7900818b46106b42afa.yaml new file mode 100644 index 0000000000..506e799730 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedweb-42f14cb098faa7900818b46106b42afa.yaml @@ -0,0 +1,58 @@ +id: feedweb-42f14cb098faa7900818b46106b42afa + +info: + name: > + Feedweb < 1.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa3d4308-0e34-4749-a7da-935d416ad2d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedweb/" + google-query: inurl:"/wp-content/plugins/feedweb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedweb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedweb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedweb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedweb-57aa4255793b420daa78a4aa19aedeff.yaml b/nuclei-templates/cve-less/plugins/feedweb-57aa4255793b420daa78a4aa19aedeff.yaml new file mode 100644 index 0000000000..30e695c40e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedweb-57aa4255793b420daa78a4aa19aedeff.yaml @@ -0,0 +1,58 @@ +id: feedweb-57aa4255793b420daa78a4aa19aedeff + +info: + name: > + Feedweb <= 3.0.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/267119ab-4129-4c27-bfaf-0b9916623695?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedweb/" + google-query: inurl:"/wp-content/plugins/feedweb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedweb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedweb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedweb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedwordpress-1790bee47ee796caaff632f15b4d5f1f.yaml b/nuclei-templates/cve-less/plugins/feedwordpress-1790bee47ee796caaff632f15b4d5f1f.yaml new file mode 100644 index 0000000000..c47b03717a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedwordpress-1790bee47ee796caaff632f15b4d5f1f.yaml @@ -0,0 +1,58 @@ +id: feedwordpress-1790bee47ee796caaff632f15b4d5f1f + +info: + name: > + FeedWordPress < 2015.0426 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9178920-d865-45d3-bfdf-b8ad207d4546?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedwordpress/" + google-query: inurl:"/wp-content/plugins/feedwordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedwordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedwordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedwordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2014.0805') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedwordpress-4cd6dbf8c953f54b11c7fded30755c74.yaml b/nuclei-templates/cve-less/plugins/feedwordpress-4cd6dbf8c953f54b11c7fded30755c74.yaml new file mode 100644 index 0000000000..ce209ea8b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedwordpress-4cd6dbf8c953f54b11c7fded30755c74.yaml @@ -0,0 +1,58 @@ +id: feedwordpress-4cd6dbf8c953f54b11c7fded30755c74 + +info: + name: > + FeedWordPress <= 2021.0713 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96320410-48e2-42a6-9a1e-1641c1229256?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedwordpress/" + google-query: inurl:"/wp-content/plugins/feedwordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedwordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedwordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedwordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2021.0713') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedwordpress-6729304530e54584e7440ebda94579e0.yaml b/nuclei-templates/cve-less/plugins/feedwordpress-6729304530e54584e7440ebda94579e0.yaml new file mode 100644 index 0000000000..c8d6647d73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedwordpress-6729304530e54584e7440ebda94579e0.yaml @@ -0,0 +1,58 @@ +id: feedwordpress-6729304530e54584e7440ebda94579e0 + +info: + name: > + FeedWordPress <= 2022.0222 - Insecure Direct Object Referece + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedwordpress/" + google-query: inurl:"/wp-content/plugins/feedwordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedwordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedwordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedwordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2022.0222') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedwordpress-a5bd104322a21c6fe50fb764879c5682.yaml b/nuclei-templates/cve-less/plugins/feedwordpress-a5bd104322a21c6fe50fb764879c5682.yaml new file mode 100644 index 0000000000..0e2646365d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedwordpress-a5bd104322a21c6fe50fb764879c5682.yaml @@ -0,0 +1,58 @@ +id: feedwordpress-a5bd104322a21c6fe50fb764879c5682 + +info: + name: > + FeedWordPress < 2015.0514 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da95086a-6ae2-4b4d-8312-78e3800ded7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedwordpress/" + google-query: inurl:"/wp-content/plugins/feedwordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedwordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedwordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedwordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2015.0514') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedwordpress-de2b65d20701ca8d9c4d34a5b9680868.yaml b/nuclei-templates/cve-less/plugins/feedwordpress-de2b65d20701ca8d9c4d34a5b9680868.yaml new file mode 100644 index 0000000000..f461fba935 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedwordpress-de2b65d20701ca8d9c4d34a5b9680868.yaml @@ -0,0 +1,58 @@ +id: feedwordpress-de2b65d20701ca8d9c4d34a5b9680868 + +info: + name: > + FeedWordPress < 2015.0514 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/108a2ea3-a612-46a2-b29a-7ae794f8470c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedwordpress/" + google-query: inurl:"/wp-content/plugins/feedwordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedwordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedwordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedwordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2015.0514') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-49fc80b8d756a56dfe95c5a6032f1087.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-49fc80b8d756a56dfe95c5a6032f1087.yaml new file mode 100644 index 0000000000..8f93c4bd67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-49fc80b8d756a56dfe95c5a6032f1087.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-49fc80b8d756a56dfe95c5a6032f1087 + +info: + name: > + RSS Aggregator by Feedzy <= 4.4.2 - Missing Authorization to Arbitrary Page Creation and Publication + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/181edcec-a57d-4516-935d-6777d2de77ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-507b936e6df45800b9063c2207c957aa.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-507b936e6df45800b9063c2207c957aa.yaml new file mode 100644 index 0000000000..b20a5c52ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-507b936e6df45800b9063c2207c957aa.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-507b936e6df45800b9063c2207c957aa + +info: + name: > + RSS Aggregator by Feedzy <= 4.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d78ac022-6f07-4da5-a657-cafa78dc1845?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-566fe474170295f900e413573209c71a.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-566fe474170295f900e413573209c71a.yaml new file mode 100644 index 0000000000..36d36ba185 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-566fe474170295f900e413573209c71a.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-566fe474170295f900e413573209c71a + +info: + name: > + RSS Aggregator by Feedzy <= 4.4.2 - Authenticated(Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf57aeaa-e37e-4b22-aeaa-f0a9f4877484?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-915f28ed1e0ddfda2fff50d4304f5401.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-915f28ed1e0ddfda2fff50d4304f5401.yaml new file mode 100644 index 0000000000..e063535d03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-915f28ed1e0ddfda2fff50d4304f5401.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-915f28ed1e0ddfda2fff50d4304f5401 + +info: + name: > + RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 4.3.2 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a713d897-c549-4e0d-9cb3-7002ef2b127f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..71672026a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-9e24f5f31aefd98727b13ebb0dfe3151.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-9e24f5f31aefd98727b13ebb0dfe3151.yaml new file mode 100644 index 0000000000..699a3617e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-9e24f5f31aefd98727b13ebb0dfe3151.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-9e24f5f31aefd98727b13ebb0dfe3151 + +info: + name: > + RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 4.4.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98053141-fe97-4bd4-b820-b6cca3426109?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-a371f0288a138d0c57e459d338c39157.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-a371f0288a138d0c57e459d338c39157.yaml new file mode 100644 index 0000000000..aa0a14fc52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-a371f0288a138d0c57e459d338c39157.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-a371f0288a138d0c57e459d338c39157 + +info: + name: > + RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 4.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Error Message + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d25e85f-28f7-4cc5-9856-25cc5aaf1418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-a69ba668991cc895684ef6a2a0130022.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-a69ba668991cc895684ef6a2a0130022.yaml new file mode 100644 index 0000000000..86e396dd34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-a69ba668991cc895684ef6a2a0130022.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-a69ba668991cc895684ef6a2a0130022 + +info: + name: > + RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 4.3.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2cdf4e5-0a40-42ca-b5ac-78511fdd2b77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-dc84242672f23048124ef1d4e4b55e53.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-dc84242672f23048124ef1d4e4b55e53.yaml new file mode 100644 index 0000000000..eb5100822a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-dc84242672f23048124ef1d4e4b55e53.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-dc84242672f23048124ef1d4e4b55e53 + +info: + name: > + RSS Aggregator by Feedzy <= 3.4.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3b916dc-3b94-4319-a805-0ea99d14429f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-e0ef3d1097adeccc2f12bfdbdbab9d9c.yaml b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-e0ef3d1097adeccc2f12bfdbdbab9d9c.yaml new file mode 100644 index 0000000000..18051415a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/feedzy-rss-feeds-e0ef3d1097adeccc2f12bfdbdbab9d9c.yaml @@ -0,0 +1,58 @@ +id: feedzy-rss-feeds-e0ef3d1097adeccc2f12bfdbdbab9d9c + +info: + name: > + RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 4.4.7 - Authenticated(Contributor+) Blind Server-Side Request Forgery (SSRF) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46978e1d-7adb-49f6-8e41-093f177c9a4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/feedzy-rss-feeds/" + google-query: inurl:"/wp-content/plugins/feedzy-rss-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,feedzy-rss-feeds,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/feedzy-rss-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feedzy-rss-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fg-drupal-to-wp-6124da6a0c9e2e52db4d825fb2c383a6.yaml b/nuclei-templates/cve-less/plugins/fg-drupal-to-wp-6124da6a0c9e2e52db4d825fb2c383a6.yaml new file mode 100644 index 0000000000..39945c099b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fg-drupal-to-wp-6124da6a0c9e2e52db4d825fb2c383a6.yaml @@ -0,0 +1,58 @@ +id: fg-drupal-to-wp-6124da6a0c9e2e52db4d825fb2c383a6 + +info: + name: > + FG Drupal to WordPress <= 3.70.3 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/426554d8-e6dc-496f-adce-61a22880a4c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fg-drupal-to-wp/" + google-query: inurl:"/wp-content/plugins/fg-drupal-to-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fg-drupal-to-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fg-drupal-to-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fg-drupal-to-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.70.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fg-drupal-to-wp-bb1647b449a57413306bcf1ebbfb2090.yaml b/nuclei-templates/cve-less/plugins/fg-drupal-to-wp-bb1647b449a57413306bcf1ebbfb2090.yaml new file mode 100644 index 0000000000..e63c3600b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fg-drupal-to-wp-bb1647b449a57413306bcf1ebbfb2090.yaml @@ -0,0 +1,58 @@ +id: fg-drupal-to-wp-bb1647b449a57413306bcf1ebbfb2090 + +info: + name: > + FG Drupal to WordPress <= 3.67.0 - Cross-Site Request Forgery via ajax_importer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc34ff1-1b7e-4974-907a-745911df5dc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fg-drupal-to-wp/" + google-query: inurl:"/wp-content/plugins/fg-drupal-to-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fg-drupal-to-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fg-drupal-to-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fg-drupal-to-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.67.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-1e37c7574b8a6b340ccf9300cdecf15e.yaml b/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-1e37c7574b8a6b340ccf9300cdecf15e.yaml new file mode 100644 index 0000000000..5a8367a4c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-1e37c7574b8a6b340ccf9300cdecf15e.yaml @@ -0,0 +1,58 @@ +id: fg-joomla-to-wordpress-1e37c7574b8a6b340ccf9300cdecf15e + +info: + name: > + FG Joomla to WordPress <= 4.20.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab87321b-d326-498d-9a75-44692258cae6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fg-joomla-to-wordpress/" + google-query: inurl:"/wp-content/plugins/fg-joomla-to-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fg-joomla-to-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fg-joomla-to-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fg-joomla-to-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-bb1647b449a57413306bcf1ebbfb2090.yaml b/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-bb1647b449a57413306bcf1ebbfb2090.yaml new file mode 100644 index 0000000000..108edb3186 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-bb1647b449a57413306bcf1ebbfb2090.yaml @@ -0,0 +1,58 @@ +id: fg-joomla-to-wordpress-bb1647b449a57413306bcf1ebbfb2090 + +info: + name: > + FG Drupal to WordPress <= 3.67.0 - Cross-Site Request Forgery via ajax_importer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc34ff1-1b7e-4974-907a-745911df5dc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fg-joomla-to-wordpress/" + google-query: inurl:"/wp-content/plugins/fg-joomla-to-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fg-joomla-to-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fg-joomla-to-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fg-joomla-to-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-e50a4295f2c4d9bb583975552d8db6c3.yaml b/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-e50a4295f2c4d9bb583975552d8db6c3.yaml new file mode 100644 index 0000000000..f2924de7e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fg-joomla-to-wordpress-e50a4295f2c4d9bb583975552d8db6c3.yaml @@ -0,0 +1,58 @@ +id: fg-joomla-to-wordpress-e50a4295f2c4d9bb583975552d8db6c3 + +info: + name: > + FG Joomla to WordPress < 3.31.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8806a1b7-03c9-40a8-a1ef-f122329e0443?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fg-joomla-to-wordpress/" + google-query: inurl:"/wp-content/plugins/fg-joomla-to-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fg-joomla-to-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fg-joomla-to-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fg-joomla-to-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.31.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-0eeffa23476d007efd123124288a7278.yaml b/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-0eeffa23476d007efd123124288a7278.yaml new file mode 100644 index 0000000000..7d78f5f02e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-0eeffa23476d007efd123124288a7278.yaml @@ -0,0 +1,58 @@ +id: fg-prestashop-to-woocommerce-0eeffa23476d007efd123124288a7278 + +info: + name: > + FG PrestaShop to WooCommerce <= 4.45.1 - Unauthenticated Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9df6792-d208-44c9-b04b-00e86d76cbfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fg-prestashop-to-woocommerce/" + google-query: inurl:"/wp-content/plugins/fg-prestashop-to-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fg-prestashop-to-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fg-prestashop-to-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fg-prestashop-to-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.45.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-39c8c0331c249c6c886fabcd8bbe5a6c.yaml b/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-39c8c0331c249c6c886fabcd8bbe5a6c.yaml new file mode 100644 index 0000000000..799bfa53ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-39c8c0331c249c6c886fabcd8bbe5a6c.yaml @@ -0,0 +1,58 @@ +id: fg-prestashop-to-woocommerce-39c8c0331c249c6c886fabcd8bbe5a6c + +info: + name: > + FG PrestaShop to WooCommerce Plugin <= 3.19.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5e70f6f-fc83-4c89-a1d5-35f188e0fd90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fg-prestashop-to-woocommerce/" + google-query: inurl:"/wp-content/plugins/fg-prestashop-to-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fg-prestashop-to-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fg-prestashop-to-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fg-prestashop-to-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-bb1647b449a57413306bcf1ebbfb2090.yaml b/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-bb1647b449a57413306bcf1ebbfb2090.yaml new file mode 100644 index 0000000000..ea6d85dc77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fg-prestashop-to-woocommerce-bb1647b449a57413306bcf1ebbfb2090.yaml @@ -0,0 +1,58 @@ +id: fg-prestashop-to-woocommerce-bb1647b449a57413306bcf1ebbfb2090 + +info: + name: > + FG Drupal to WordPress <= 3.67.0 - Cross-Site Request Forgery via ajax_importer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc34ff1-1b7e-4974-907a-745911df5dc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fg-prestashop-to-woocommerce/" + google-query: inurl:"/wp-content/plugins/fg-prestashop-to-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fg-prestashop-to-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fg-prestashop-to-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fg-prestashop-to-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.44.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fgallery-565b56570e9a0eaaf33a27883cc6e4ea.yaml b/nuclei-templates/cve-less/plugins/fgallery-565b56570e9a0eaaf33a27883cc6e4ea.yaml new file mode 100644 index 0000000000..f746cc843e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fgallery-565b56570e9a0eaaf33a27883cc6e4ea.yaml @@ -0,0 +1,58 @@ +id: fgallery-565b56570e9a0eaaf33a27883cc6e4ea + +info: + name: > + fGallery 2.4.1 - SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96e2ba3d-4e6d-42b8-832c-03ef4915cadb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fgallery/" + google-query: inurl:"/wp-content/plugins/fgallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fgallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fgallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fgallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fgallery_plus-6d8e5755418ddfddd7f22418d88b935e.yaml b/nuclei-templates/cve-less/plugins/fgallery_plus-6d8e5755418ddfddd7f22418d88b935e.yaml new file mode 100644 index 0000000000..7e3b71cfec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fgallery_plus-6d8e5755418ddfddd7f22418d88b935e.yaml @@ -0,0 +1,58 @@ +id: fgallery_plus-6d8e5755418ddfddd7f22418d88b935e + +info: + name: > + FGallery Plus (All Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7fef895-95d3-4106-94f1-52f8044c3b62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fgallery_plus/" + google-query: inurl:"/wp-content/plugins/fgallery_plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fgallery_plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fgallery_plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fgallery_plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-away-466048d1971518e0b30eb580a52cc9ff.yaml b/nuclei-templates/cve-less/plugins/file-away-466048d1971518e0b30eb580a52cc9ff.yaml new file mode 100644 index 0000000000..f3bc8444a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-away-466048d1971518e0b30eb580a52cc9ff.yaml @@ -0,0 +1,58 @@ +id: file-away-466048d1971518e0b30eb580a52cc9ff + +info: + name: > + File Away <= 3.9.9.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f78dd75-d853-4b16-843e-e0c9c55a103c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-away/" + google-query: inurl:"/wp-content/plugins/file-away/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-away,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-away/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-away" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.9.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-gallery-2ff1bc044255f45b7cf3b45392cb2e17.yaml b/nuclei-templates/cve-less/plugins/file-gallery-2ff1bc044255f45b7cf3b45392cb2e17.yaml new file mode 100644 index 0000000000..b85a679342 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-gallery-2ff1bc044255f45b7cf3b45392cb2e17.yaml @@ -0,0 +1,58 @@ +id: file-gallery-2ff1bc044255f45b7cf3b45392cb2e17 + +info: + name: > + File Gallery <= 1.8.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via file_gallery_shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c11be4ba-1bed-4234-b475-468394b7be90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-gallery/" + google-query: inurl:"/wp-content/plugins/file-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-gallery-9030229f25561b555ab5bd8cf6a1c26d.yaml b/nuclei-templates/cve-less/plugins/file-gallery-9030229f25561b555ab5bd8cf6a1c26d.yaml new file mode 100644 index 0000000000..1bfe6a4eba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-gallery-9030229f25561b555ab5bd8cf6a1c26d.yaml @@ -0,0 +1,58 @@ +id: file-gallery-9030229f25561b555ab5bd8cf6a1c26d + +info: + name: > + File Gallery < 1.7.9.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54bdacd9-49e4-4f45-99bb-baa9eba97ecf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-gallery/" + google-query: inurl:"/wp-content/plugins/file-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-gallery-bb0f68d3ec28f4af1bec229baa1a1db9.yaml b/nuclei-templates/cve-less/plugins/file-gallery-bb0f68d3ec28f4af1bec229baa1a1db9.yaml new file mode 100644 index 0000000000..e3a9c7cb42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-gallery-bb0f68d3ec28f4af1bec229baa1a1db9.yaml @@ -0,0 +1,58 @@ +id: file-gallery-bb0f68d3ec28f4af1bec229baa1a1db9 + +info: + name: > + File Gallery <= 1.8.5.4 - Reflected Cross-Site Scripting via post_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b51caf3-eff4-491f-b354-7d8939548a64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-gallery/" + google-query: inurl:"/wp-content/plugins/file-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-manager-48a8d2f0d5a63315df776c831690e09c.yaml b/nuclei-templates/cve-less/plugins/file-manager-48a8d2f0d5a63315df776c831690e09c.yaml new file mode 100644 index 0000000000..32ebac0bcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-manager-48a8d2f0d5a63315df776c831690e09c.yaml @@ -0,0 +1,58 @@ +id: file-manager-48a8d2f0d5a63315df776c831690e09c + +info: + name: > + Bit File Manager <= 5.2.7 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24458c37-ebcc-471b-9044-78f24667f7a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-manager/" + google-query: inurl:"/wp-content/plugins/file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-manager-5c40de81086d557f84896e9d9e366a14.yaml b/nuclei-templates/cve-less/plugins/file-manager-5c40de81086d557f84896e9d9e366a14.yaml new file mode 100644 index 0000000000..f544ac6b36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-manager-5c40de81086d557f84896e9d9e366a14.yaml @@ -0,0 +1,58 @@ +id: file-manager-5c40de81086d557f84896e9d9e366a14 + +info: + name: > + File Manager <= 6.3 - Authenticated (Admin+) Arbitrary OS File Access via Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/640b1800-3b59-4b06-a803-08cb76d62d99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-manager/" + google-query: inurl:"/wp-content/plugins/file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-manager-7e2f90e6940d531b994c0538fa57bc34.yaml b/nuclei-templates/cve-less/plugins/file-manager-7e2f90e6940d531b994c0538fa57bc34.yaml new file mode 100644 index 0000000000..079b11893e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-manager-7e2f90e6940d531b994c0538fa57bc34.yaml @@ -0,0 +1,58 @@ +id: file-manager-7e2f90e6940d531b994c0538fa57bc34 + +info: + name: > + Bit File Manager <= 5.0.0 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ae27c4-0381-4622-90e8-f4fee29767a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-manager/" + google-query: inurl:"/wp-content/plugins/file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-manager-80453d1eac09488f23a96583710827a5.yaml b/nuclei-templates/cve-less/plugins/file-manager-80453d1eac09488f23a96583710827a5.yaml new file mode 100644 index 0000000000..d805fda24d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-manager-80453d1eac09488f23a96583710827a5.yaml @@ -0,0 +1,58 @@ +id: file-manager-80453d1eac09488f23a96583710827a5 + +info: + name: > + Bit File Manager – 100% free file manager for WordPress <= 5.2.2 - Subscriber+ Arbitrary File Creation/Upload/Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02a6428f-beef-4491-ab5f-130a9e7924c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-manager/" + google-query: inurl:"/wp-content/plugins/file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-manager-advanced-1ced58320fa56965f50860e215f3e06d.yaml b/nuclei-templates/cve-less/plugins/file-manager-advanced-1ced58320fa56965f50860e215f3e06d.yaml new file mode 100644 index 0000000000..8c03aa322e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-manager-advanced-1ced58320fa56965f50860e215f3e06d.yaml @@ -0,0 +1,58 @@ +id: file-manager-advanced-1ced58320fa56965f50860e215f3e06d + +info: + name: > + Advanced File Manager <= 5.1 - Authenticated(Administrator+) Arbitrary File and Folder Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceba35c3-16b0-4366-b33c-603bdc2c1006?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-manager-advanced/" + google-query: inurl:"/wp-content/plugins/file-manager-advanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-manager-advanced,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-manager-advanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-manager-advanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-manager-advanced-shortcode-07670443f68f4b9a28c2be946c910346.yaml b/nuclei-templates/cve-less/plugins/file-manager-advanced-shortcode-07670443f68f4b9a28c2be946c910346.yaml new file mode 100644 index 0000000000..842b4ca198 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-manager-advanced-shortcode-07670443f68f4b9a28c2be946c910346.yaml @@ -0,0 +1,58 @@ +id: file-manager-advanced-shortcode-07670443f68f4b9a28c2be946c910346 + +info: + name: > + File Manager Advanced Shortcode WordPress <= 2.3.2 - Unauthenticated Arbitrary File Upload to Remote Code Execution via Shortcode + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea40d06e-672c-42db-9378-d382de5838d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-manager-advanced-shortcode/" + google-query: inurl:"/wp-content/plugins/file-manager-advanced-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-manager-advanced-shortcode,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-manager-advanced-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-manager-advanced-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-manager-bd5e0701ad8f9d787d4f03d3c90929d9.yaml b/nuclei-templates/cve-less/plugins/file-manager-bd5e0701ad8f9d787d4f03d3c90929d9.yaml new file mode 100644 index 0000000000..f1b0331679 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-manager-bd5e0701ad8f9d787d4f03d3c90929d9.yaml @@ -0,0 +1,58 @@ +id: file-manager-bd5e0701ad8f9d787d4f03d3c90929d9 + +info: + name: > + Bit File Manager <= 4.1.4 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37052cb9-8479-4004-9161-65f37028ae10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-manager/" + google-query: inurl:"/wp-content/plugins/file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/file-renaming-on-upload-ca9ee22d1cc41a724720db8fe33326bf.yaml b/nuclei-templates/cve-less/plugins/file-renaming-on-upload-ca9ee22d1cc41a724720db8fe33326bf.yaml new file mode 100644 index 0000000000..2f31002ebe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/file-renaming-on-upload-ca9ee22d1cc41a724720db8fe33326bf.yaml @@ -0,0 +1,58 @@ +id: file-renaming-on-upload-ca9ee22d1cc41a724720db8fe33326bf + +info: + name: > + File Renaming on Upload <= 2.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/550c3f56-d188-4be1-82cd-db076c09cf61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/file-renaming-on-upload/" + google-query: inurl:"/wp-content/plugins/file-renaming-on-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,file-renaming-on-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/file-renaming-on-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "file-renaming-on-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filebird-1298f4e0dd08f4cb0ce7e4baa39d0151.yaml b/nuclei-templates/cve-less/plugins/filebird-1298f4e0dd08f4cb0ce7e4baa39d0151.yaml new file mode 100644 index 0000000000..ebbe035658 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filebird-1298f4e0dd08f4cb0ce7e4baa39d0151.yaml @@ -0,0 +1,58 @@ +id: filebird-1298f4e0dd08f4cb0ce7e4baa39d0151 + +info: + name: > + Filebird 4.7.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2491d502-8087-4e95-b047-a3b196322d94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filebird/" + google-query: inurl:"/wp-content/plugins/filebird/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filebird,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filebird/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filebird" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filebird-16b2d22f9ed4777d1430ed12968eaafe.yaml b/nuclei-templates/cve-less/plugins/filebird-16b2d22f9ed4777d1430ed12968eaafe.yaml new file mode 100644 index 0000000000..f4694289e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filebird-16b2d22f9ed4777d1430ed12968eaafe.yaml @@ -0,0 +1,58 @@ +id: filebird-16b2d22f9ed4777d1430ed12968eaafe + +info: + name: > + FileBird – WordPress Media Library Folders & File Manager <= 5.6.3 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/129cc3b0-4f48-4846-902e-be5cd339f537?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filebird/" + google-query: inurl:"/wp-content/plugins/filebird/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filebird,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filebird/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filebird" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filebird-4e2e155c281ae60022e2ed5429179c85.yaml b/nuclei-templates/cve-less/plugins/filebird-4e2e155c281ae60022e2ed5429179c85.yaml new file mode 100644 index 0000000000..ab73f662d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filebird-4e2e155c281ae60022e2ed5429179c85.yaml @@ -0,0 +1,58 @@ +id: filebird-4e2e155c281ae60022e2ed5429179c85 + +info: + name: > + Filebird <= 5.1.4 - Missing Authorization via resAdminPermissionsCheck + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5a6e9f4-dbc3-4af0-b9e4-4c9ad7b5fe9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filebird/" + google-query: inurl:"/wp-content/plugins/filebird/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filebird,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filebird/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filebird" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filebird-61cc715601cb540fc69b978e74da1091.yaml b/nuclei-templates/cve-less/plugins/filebird-61cc715601cb540fc69b978e74da1091.yaml new file mode 100644 index 0000000000..0287848602 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filebird-61cc715601cb540fc69b978e74da1091.yaml @@ -0,0 +1,58 @@ +id: filebird-61cc715601cb540fc69b978e74da1091 + +info: + name: > + FileBird – WordPress Media Library Folders & File Manager <= 5.6.3 - Authenticated (Author+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82cde234-ae87-438f-911e-bdd0e3ac1132?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filebird/" + google-query: inurl:"/wp-content/plugins/filebird/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filebird,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filebird/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filebird" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filebird-7d0952eb6cd34263da0c111b4d2da259.yaml b/nuclei-templates/cve-less/plugins/filebird-7d0952eb6cd34263da0c111b4d2da259.yaml new file mode 100644 index 0000000000..44da41b7f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filebird-7d0952eb6cd34263da0c111b4d2da259.yaml @@ -0,0 +1,58 @@ +id: filebird-7d0952eb6cd34263da0c111b4d2da259 + +info: + name: > + FileBird <= 5.6.0 - Authenticated(Administrator+) Stored Cross-Site Scripting via Folder Import + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47f04985-dd9b-449f-8b4c-9811fe7e4a96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filebird/" + google-query: inurl:"/wp-content/plugins/filebird/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filebird,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filebird/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filebird" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filedownload-16949f85deca6c76da36cc5d46cabd06.yaml b/nuclei-templates/cve-less/plugins/filedownload-16949f85deca6c76da36cc5d46cabd06.yaml new file mode 100644 index 0000000000..422ff06662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filedownload-16949f85deca6c76da36cc5d46cabd06.yaml @@ -0,0 +1,58 @@ +id: filedownload-16949f85deca6c76da36cc5d46cabd06 + +info: + name: > + filedownload plugin <= 1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b79fa47-f045-44e9-84b8-60aa3a302dac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filedownload/" + google-query: inurl:"/wp-content/plugins/filedownload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filedownload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filedownload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filedownload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filedownload-e3e5ad58c58ff0e4a41d1a39f9aad248.yaml b/nuclei-templates/cve-less/plugins/filedownload-e3e5ad58c58ff0e4a41d1a39f9aad248.yaml new file mode 100644 index 0000000000..37609e71ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filedownload-e3e5ad58c58ff0e4a41d1a39f9aad248.yaml @@ -0,0 +1,58 @@ +id: filedownload-e3e5ad58c58ff0e4a41d1a39f9aad248 + +info: + name: > + filedownload < 1.4 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24d081e3-4291-427c-bf2c-726d93aa00ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filedownload/" + google-query: inurl:"/wp-content/plugins/filedownload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filedownload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filedownload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filedownload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filedownload-f50c03151ba977d208d9edbd82053474.yaml b/nuclei-templates/cve-less/plugins/filedownload-f50c03151ba977d208d9edbd82053474.yaml new file mode 100644 index 0000000000..005cb457a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filedownload-f50c03151ba977d208d9edbd82053474.yaml @@ -0,0 +1,58 @@ +id: filedownload-f50c03151ba977d208d9edbd82053474 + +info: + name: > + File Download <= 1.4 - Open Proxy + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1e98579-6e23-4309-9db5-e47d1e77ab07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filedownload/" + google-query: inurl:"/wp-content/plugins/filedownload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filedownload,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filedownload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filedownload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fileorganizer-d61a99b7dbe136f85e3e2b350556f349.yaml b/nuclei-templates/cve-less/plugins/fileorganizer-d61a99b7dbe136f85e3e2b350556f349.yaml new file mode 100644 index 0000000000..5494ef2f39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fileorganizer-d61a99b7dbe136f85e3e2b350556f349.yaml @@ -0,0 +1,58 @@ +id: fileorganizer-d61a99b7dbe136f85e3e2b350556f349 + +info: + name: > + FileOrganizer <= 1.0.3 - Authenticated (Admin+) Arbitrary File Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11c9124d-80e0-435d-9eb4-901c4f481a6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fileorganizer/" + google-query: inurl:"/wp-content/plugins/fileorganizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fileorganizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fileorganizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fileorganizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fileorganizer-fe85729fdce83d2abcd870326a089bf5.yaml b/nuclei-templates/cve-less/plugins/fileorganizer-fe85729fdce83d2abcd870326a089bf5.yaml new file mode 100644 index 0000000000..8a7d206bd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fileorganizer-fe85729fdce83d2abcd870326a089bf5.yaml @@ -0,0 +1,58 @@ +id: fileorganizer-fe85729fdce83d2abcd870326a089bf5 + +info: + name: > + FileOrganizer and FileOrganizer Pro <= 1.0.6 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffaefd79-57a7-43b8-af1c-e108567eba67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fileorganizer/" + google-query: inurl:"/wp-content/plugins/fileorganizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fileorganizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fileorganizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fileorganizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/files-download-delay-83711b9f4415eeef12b96843272e6f77.yaml b/nuclei-templates/cve-less/plugins/files-download-delay-83711b9f4415eeef12b96843272e6f77.yaml new file mode 100644 index 0000000000..a3eac3a84e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/files-download-delay-83711b9f4415eeef12b96843272e6f77.yaml @@ -0,0 +1,58 @@ +id: files-download-delay-83711b9f4415eeef12b96843272e6f77 + +info: + name: > + Files Download Delay <= 1.0.6 - Missing Authorization to Settings Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/570942bf-49b1-4217-abc6-5e83f27d9824?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/files-download-delay/" + google-query: inurl:"/wp-content/plugins/files-download-delay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,files-download-delay,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/files-download-delay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "files-download-delay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filester-0fbaccf0dcc3983d2d26c8ef7aee1143.yaml b/nuclei-templates/cve-less/plugins/filester-0fbaccf0dcc3983d2d26c8ef7aee1143.yaml new file mode 100644 index 0000000000..114c937912 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filester-0fbaccf0dcc3983d2d26c8ef7aee1143.yaml @@ -0,0 +1,58 @@ +id: filester-0fbaccf0dcc3983d2d26c8ef7aee1143 + +info: + name: > + File Manager Pro – Filester <= 1.8 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99b2e3c3-b5e5-4648-81c8-da2f42ceec66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filester/" + google-query: inurl:"/wp-content/plugins/filester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filester,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filester/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filester-3a0b06a228abc56684c0fecc37877b4c.yaml b/nuclei-templates/cve-less/plugins/filester-3a0b06a228abc56684c0fecc37877b4c.yaml new file mode 100644 index 0000000000..c09cefa8af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filester-3a0b06a228abc56684c0fecc37877b4c.yaml @@ -0,0 +1,58 @@ +id: filester-3a0b06a228abc56684c0fecc37877b4c + +info: + name: > + File Manager Pro – Filester - <= 1.7.6 - Cross-Site Request Forgery to Arbitrary File Rename + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfbc7af2-1e2c-4aaf-b73c-870f7519aff1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filester/" + google-query: inurl:"/wp-content/plugins/filester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filester,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filester/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filester-a9fb42c2dd47680db83577cec894ace4.yaml b/nuclei-templates/cve-less/plugins/filester-a9fb42c2dd47680db83577cec894ace4.yaml new file mode 100644 index 0000000000..688db448fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filester-a9fb42c2dd47680db83577cec894ace4.yaml @@ -0,0 +1,58 @@ +id: filester-a9fb42c2dd47680db83577cec894ace4 + +info: + name: > + File Manager Pro <= 1.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/927696bd-bf0c-4f15-9b06-21c3d0a11aed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filester/" + google-query: inurl:"/wp-content/plugins/filester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filester,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filester/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fileviewer-beab7dee3648c51c868a41f9c4244298.yaml b/nuclei-templates/cve-less/plugins/fileviewer-beab7dee3648c51c868a41f9c4244298.yaml new file mode 100644 index 0000000000..bc225ddaf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fileviewer-beab7dee3648c51c868a41f9c4244298.yaml @@ -0,0 +1,58 @@ +id: fileviewer-beab7dee3648c51c868a41f9c4244298 + +info: + name: > + Fileviewer <= 2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57f56362-da35-44ae-b1f5-4f5a6c21930e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fileviewer/" + google-query: inurl:"/wp-content/plugins/fileviewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fileviewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fileviewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fileviewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filr-protection-3978ba038f6fabf500896400bafac46f.yaml b/nuclei-templates/cve-less/plugins/filr-protection-3978ba038f6fabf500896400bafac46f.yaml new file mode 100644 index 0000000000..f779d802ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filr-protection-3978ba038f6fabf500896400bafac46f.yaml @@ -0,0 +1,58 @@ +id: filr-protection-3978ba038f6fabf500896400bafac46f + +info: + name: > + Filr – Secure document library <= 1.2.3.5 - Authenticated (Author+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee23629c-6147-4527-929f-8c932cd7d7a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filr-protection/" + google-query: inurl:"/wp-content/plugins/filr-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filr-protection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filr-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filr-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filr-protection-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/filr-protection-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bca322d547 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filr-protection-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: filr-protection-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filr-protection/" + google-query: inurl:"/wp-content/plugins/filr-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filr-protection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filr-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filr-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filr-protection-e71ba64e3ce13e58bab0fc3eb80546e8.yaml b/nuclei-templates/cve-less/plugins/filr-protection-e71ba64e3ce13e58bab0fc3eb80546e8.yaml new file mode 100644 index 0000000000..d0276d16d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filr-protection-e71ba64e3ce13e58bab0fc3eb80546e8.yaml @@ -0,0 +1,58 @@ +id: filr-protection-e71ba64e3ce13e58bab0fc3eb80546e8 + +info: + name: > + Filr – Secure document library <= 1.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02d4bc64-d05d-4151-bc38-523cbb2ef60c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filr-protection/" + google-query: inurl:"/wp-content/plugins/filr-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filr-protection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filr-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filr-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filter-custom-fields-taxonomies-light-7ec734b1370cfa2c11baf0ce838e63f7.yaml b/nuclei-templates/cve-less/plugins/filter-custom-fields-taxonomies-light-7ec734b1370cfa2c11baf0ce838e63f7.yaml new file mode 100644 index 0000000000..047c7d381a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filter-custom-fields-taxonomies-light-7ec734b1370cfa2c11baf0ce838e63f7.yaml @@ -0,0 +1,58 @@ +id: filter-custom-fields-taxonomies-light-7ec734b1370cfa2c11baf0ce838e63f7 + +info: + name: > + Filter Custom Fields & Taxonomies Light <= 1.05 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/880e5752-cc69-4c38-bd00-a3b8517e5fa6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filter-custom-fields-taxonomies-light/" + google-query: inurl:"/wp-content/plugins/filter-custom-fields-taxonomies-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filter-custom-fields-taxonomies-light,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filter-custom-fields-taxonomies-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filter-custom-fields-taxonomies-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filter-custom-fields-taxonomies-light-8cd6ae2b6361cbc9077a21e229786a98.yaml b/nuclei-templates/cve-less/plugins/filter-custom-fields-taxonomies-light-8cd6ae2b6361cbc9077a21e229786a98.yaml new file mode 100644 index 0000000000..0ff1232b54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filter-custom-fields-taxonomies-light-8cd6ae2b6361cbc9077a21e229786a98.yaml @@ -0,0 +1,58 @@ +id: filter-custom-fields-taxonomies-light-8cd6ae2b6361cbc9077a21e229786a98 + +info: + name: > + Filter Custom Fields & Taxonomies Light <= 1.05 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80f39182-9835-4bd5-b3cd-41fe20983e1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filter-custom-fields-taxonomies-light/" + google-query: inurl:"/wp-content/plugins/filter-custom-fields-taxonomies-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filter-custom-fields-taxonomies-light,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filter-custom-fields-taxonomies-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filter-custom-fields-taxonomies-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filter-gallery-cf862152b16dd1f39286055ed51b17b7.yaml b/nuclei-templates/cve-less/plugins/filter-gallery-cf862152b16dd1f39286055ed51b17b7.yaml new file mode 100644 index 0000000000..7cb5721fe7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filter-gallery-cf862152b16dd1f39286055ed51b17b7.yaml @@ -0,0 +1,58 @@ +id: filter-gallery-cf862152b16dd1f39286055ed51b17b7 + +info: + name: > + WordPress Filter Gallery Plugin <= 0.1.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cea044c-3117-4722-a696-5b7368d31d63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filter-gallery/" + google-query: inurl:"/wp-content/plugins/filter-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filter-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filter-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filter-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filter-portfolio-gallery-aa602beb5c908376cceff63e3f2e405f.yaml b/nuclei-templates/cve-less/plugins/filter-portfolio-gallery-aa602beb5c908376cceff63e3f2e405f.yaml new file mode 100644 index 0000000000..0c831f5360 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filter-portfolio-gallery-aa602beb5c908376cceff63e3f2e405f.yaml @@ -0,0 +1,58 @@ +id: filter-portfolio-gallery-aa602beb5c908376cceff63e3f2e405f + +info: + name: > + Filter Portfolio Gallery <= 1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb291c79-8b8e-476b-b6e4-e8428bf60d6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filter-portfolio-gallery/" + google-query: inurl:"/wp-content/plugins/filter-portfolio-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filter-portfolio-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filter-portfolio-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filter-portfolio-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/filtre-de-surveillance-gouvernemental-a80892f45393695704153e2580e1d74c.yaml b/nuclei-templates/cve-less/plugins/filtre-de-surveillance-gouvernemental-a80892f45393695704153e2580e1d74c.yaml new file mode 100644 index 0000000000..ba73a2aa44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/filtre-de-surveillance-gouvernemental-a80892f45393695704153e2580e1d74c.yaml @@ -0,0 +1,58 @@ +id: filtre-de-surveillance-gouvernemental-a80892f45393695704153e2580e1d74c + +info: + name: > + Filtre de surveillance gouvernemental <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86616f56-74cb-4ceb-95ce-fbd4a3842edd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filtre-de-surveillance-gouvernemental/" + google-query: inurl:"/wp-content/plugins/filtre-de-surveillance-gouvernemental/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filtre-de-surveillance-gouvernemental,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filtre-de-surveillance-gouvernemental/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filtre-de-surveillance-gouvernemental" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-40a15a1270025c5cb430a29eea6824ae.yaml b/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-40a15a1270025c5cb430a29eea6824ae.yaml new file mode 100644 index 0000000000..41c62235ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-40a15a1270025c5cb430a29eea6824ae.yaml @@ -0,0 +1,58 @@ +id: final-tiles-grid-gallery-lite-40a15a1270025c5cb430a29eea6824ae + +info: + name: > + Image Photo Gallery Final Tiles Grid <= 3.5.2 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba44ec7c-7c71-4c19-8b1e-5d78bb3a3a03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/final-tiles-grid-gallery-lite/" + google-query: inurl:"/wp-content/plugins/final-tiles-grid-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,final-tiles-grid-gallery-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/final-tiles-grid-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "final-tiles-grid-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-45a46be6bf0ef23f92774359273b99be.yaml b/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-45a46be6bf0ef23f92774359273b99be.yaml new file mode 100644 index 0000000000..992ddb1800 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-45a46be6bf0ef23f92774359273b99be.yaml @@ -0,0 +1,58 @@ +id: final-tiles-grid-gallery-lite-45a46be6bf0ef23f92774359273b99be + +info: + name: > + Final Tiles Gallery <= 3.4.18 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/656bf2b4-1930-4e96-b92b-01593889a43f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/final-tiles-grid-gallery-lite/" + google-query: inurl:"/wp-content/plugins/final-tiles-grid-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,final-tiles-grid-gallery-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/final-tiles-grid-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "final-tiles-grid-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8ef286043c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: final-tiles-grid-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/final-tiles-grid-gallery-lite/" + google-query: inurl:"/wp-content/plugins/final-tiles-grid-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,final-tiles-grid-gallery-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/final-tiles-grid-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "final-tiles-grid-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..c2ea6f456a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/final-tiles-grid-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: final-tiles-grid-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/final-tiles-grid-gallery-lite/" + google-query: inurl:"/wp-content/plugins/final-tiles-grid-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,final-tiles-grid-gallery-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/final-tiles-grid-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "final-tiles-grid-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/final-user-wp-frontend-user-profiles-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/final-user-wp-frontend-user-profiles-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..6e3e6d9d9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/final-user-wp-frontend-user-profiles-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: final-user-wp-frontend-user-profiles-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/final-user-wp-frontend-user-profiles/" + google-query: inurl:"/wp-content/plugins/final-user-wp-frontend-user-profiles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,final-user-wp-frontend-user-profiles,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/final-user-wp-frontend-user-profiles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "final-user-wp-frontend-user-profiles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-13f75b4807aa41447c76b6287198f0e6.yaml b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-13f75b4807aa41447c76b6287198f0e6.yaml new file mode 100644 index 0000000000..3b8aeb72f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-13f75b4807aa41447c76b6287198f0e6.yaml @@ -0,0 +1,58 @@ +id: finale-woocommerce-sales-countdown-timer-discount-13f75b4807aa41447c76b6287198f0e6 + +info: + name: > + NextMove Lite – Thank You Page for WooCommerce & Finale Lite – Sales Countdown Timer & Discount for WooCommerce <= 2.17.0 - Missing Authorization to Unauthenticated System Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d9332be-2cf0-46cd-81e4-6436aeec0f83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + google-query: inurl:"/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,finale-woocommerce-sales-countdown-timer-discount,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "finale-woocommerce-sales-countdown-timer-discount" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-281ba59699e771f7b8298c529c863776.yaml b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-281ba59699e771f7b8298c529c863776.yaml new file mode 100644 index 0000000000..7072b37325 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-281ba59699e771f7b8298c529c863776.yaml @@ -0,0 +1,58 @@ +id: finale-woocommerce-sales-countdown-timer-discount-281ba59699e771f7b8298c529c863776 + +info: + name: > + Finale Lite <= 2.16.0 - Missing Authorization to Content Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/725bce1b-ec76-411d-928c-2aea47867292?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + google-query: inurl:"/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,finale-woocommerce-sales-countdown-timer-discount,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "finale-woocommerce-sales-countdown-timer-discount" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-942278840325a3151a90aba61723bd9e.yaml b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-942278840325a3151a90aba61723bd9e.yaml new file mode 100644 index 0000000000..e93af8b89b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-942278840325a3151a90aba61723bd9e.yaml @@ -0,0 +1,58 @@ +id: finale-woocommerce-sales-countdown-timer-discount-942278840325a3151a90aba61723bd9e + +info: + name: > + Finale WooCommerce Sale Countdown <= 2.9.0 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/603b1f0e-185c-4a0a-a6a2-c63105b2c9f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + google-query: inurl:"/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,finale-woocommerce-sales-countdown-timer-discount,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "finale-woocommerce-sales-countdown-timer-discount" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-b2f9a3131a92b1faa45907be05feafe5.yaml b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-b2f9a3131a92b1faa45907be05feafe5.yaml new file mode 100644 index 0000000000..8c7015a396 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-b2f9a3131a92b1faa45907be05feafe5.yaml @@ -0,0 +1,58 @@ +id: finale-woocommerce-sales-countdown-timer-discount-b2f9a3131a92b1faa45907be05feafe5 + +info: + name: > + Finale Lite <= 2.18.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa290a4b-06b6-4057-ae56-1c0b74b2ee5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + google-query: inurl:"/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,finale-woocommerce-sales-countdown-timer-discount,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "finale-woocommerce-sales-countdown-timer-discount" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-b7d8017025d96230e362095b35be8556.yaml b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-b7d8017025d96230e362095b35be8556.yaml new file mode 100644 index 0000000000..fc5e03367e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/finale-woocommerce-sales-countdown-timer-discount-b7d8017025d96230e362095b35be8556.yaml @@ -0,0 +1,58 @@ +id: finale-woocommerce-sales-countdown-timer-discount-b7d8017025d96230e362095b35be8556 + +info: + name: > + Finale Lite <= 2.18.0 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation and Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d80199a2-8a12-44f7-ba20-169d7af88c26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + google-query: inurl:"/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,finale-woocommerce-sales-countdown-timer-discount,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/finale-woocommerce-sales-countdown-timer-discount/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "finale-woocommerce-sales-countdown-timer-discount" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/finalist-65e3ebcdd517173ee2482f46a1239a5c.yaml b/nuclei-templates/cve-less/plugins/finalist-65e3ebcdd517173ee2482f46a1239a5c.yaml new file mode 100644 index 0000000000..1bf69f8478 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/finalist-65e3ebcdd517173ee2482f46a1239a5c.yaml @@ -0,0 +1,58 @@ +id: finalist-65e3ebcdd517173ee2482f46a1239a5c + +info: + name: > + Finalist (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30b4b98e-c566-4249-85a4-bfb0b5d5ac5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/finalist/" + google-query: inurl:"/wp-content/plugins/finalist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,finalist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/finalist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "finalist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/finalist-e0bf790da76322058f44ef1673072476.yaml b/nuclei-templates/cve-less/plugins/finalist-e0bf790da76322058f44ef1673072476.yaml new file mode 100644 index 0000000000..2697af0247 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/finalist-e0bf790da76322058f44ef1673072476.yaml @@ -0,0 +1,58 @@ +id: finalist-e0bf790da76322058f44ef1673072476 + +info: + name: > + Finalist (All Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b10a4561-1724-4e98-bff2-ca5416b217dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/finalist/" + google-query: inurl:"/wp-content/plugins/finalist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,finalist,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/finalist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "finalist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/find-and-replace-all-3a24a068d1ed9da16159938c4295f7f7.yaml b/nuclei-templates/cve-less/plugins/find-and-replace-all-3a24a068d1ed9da16159938c4295f7f7.yaml new file mode 100644 index 0000000000..cc588a78e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/find-and-replace-all-3a24a068d1ed9da16159938c4295f7f7.yaml @@ -0,0 +1,58 @@ +id: find-and-replace-all-3a24a068d1ed9da16159938c4295f7f7 + +info: + name: > + Find and Replace All <= 1.3 - Cross-Site Request Forgery to Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f4f188f-ca84-44df-9738-d61094c2e695?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/find-and-replace-all/" + google-query: inurl:"/wp-content/plugins/find-and-replace-all/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,find-and-replace-all,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/find-and-replace-all/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "find-and-replace-all" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/find-and-replace-all-951a6c1e508507cf69c6b78271828a61.yaml b/nuclei-templates/cve-less/plugins/find-and-replace-all-951a6c1e508507cf69c6b78271828a61.yaml new file mode 100644 index 0000000000..e4ce41dac1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/find-and-replace-all-951a6c1e508507cf69c6b78271828a61.yaml @@ -0,0 +1,58 @@ +id: find-and-replace-all-951a6c1e508507cf69c6b78271828a61 + +info: + name: > + Find and Replace All <= 1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/336eb1fb-dc94-417d-b9b6-488c105aab1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/find-and-replace-all/" + google-query: inurl:"/wp-content/plugins/find-and-replace-all/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,find-and-replace-all,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/find-and-replace-all/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "find-and-replace-all" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/find-and-replace-all-ef26eea08cd48a0673b556bc7ad08135.yaml b/nuclei-templates/cve-less/plugins/find-and-replace-all-ef26eea08cd48a0673b556bc7ad08135.yaml new file mode 100644 index 0000000000..8d58ebc12c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/find-and-replace-all-ef26eea08cd48a0673b556bc7ad08135.yaml @@ -0,0 +1,58 @@ +id: find-and-replace-all-ef26eea08cd48a0673b556bc7ad08135 + +info: + name: > + Find and Replace All <= 1.3 - Cross-Site Request Forgery to Arbitrary Content Replacement + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ed74f7f-d629-4d07-b73e-eaa78f11ea70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/find-and-replace-all/" + google-query: inurl:"/wp-content/plugins/find-and-replace-all/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,find-and-replace-all,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/find-and-replace-all/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "find-and-replace-all" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/find-any-think-de57c9c6347745d9dac6d12ee00f13b8.yaml b/nuclei-templates/cve-less/plugins/find-any-think-de57c9c6347745d9dac6d12ee00f13b8.yaml new file mode 100644 index 0000000000..e3b17ef4d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/find-any-think-de57c9c6347745d9dac6d12ee00f13b8.yaml @@ -0,0 +1,58 @@ +id: find-any-think-de57c9c6347745d9dac6d12ee00f13b8 + +info: + name: > + WPMK Ajax Finder <= 1.0.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d063d01-5f67-4c7f-ab71-01708456e82b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/find-any-think/" + google-query: inurl:"/wp-content/plugins/find-any-think/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,find-any-think,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/find-any-think/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "find-any-think" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/find-duplicates-4976580f662d856b0ec790e30c784e5a.yaml b/nuclei-templates/cve-less/plugins/find-duplicates-4976580f662d856b0ec790e30c784e5a.yaml new file mode 100644 index 0000000000..bccaefcf06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/find-duplicates-4976580f662d856b0ec790e30c784e5a.yaml @@ -0,0 +1,58 @@ +id: find-duplicates-4976580f662d856b0ec790e30c784e5a + +info: + name: > + Find Duplicates <= 1.4.6 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/466eec4a-8aac-4b0d-ba18-9667aa70de5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/find-duplicates/" + google-query: inurl:"/wp-content/plugins/find-duplicates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,find-duplicates,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/find-duplicates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "find-duplicates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/find-my-blocks-032b6d67d90bdb80edcbded91586f3c0.yaml b/nuclei-templates/cve-less/plugins/find-my-blocks-032b6d67d90bdb80edcbded91586f3c0.yaml new file mode 100644 index 0000000000..2fa887cadd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/find-my-blocks-032b6d67d90bdb80edcbded91586f3c0.yaml @@ -0,0 +1,58 @@ +id: find-my-blocks-032b6d67d90bdb80edcbded91586f3c0 + +info: + name: > + Find My Blocks < 3.4.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a8a202-e44a-4874-9e7a-c8224edd8591?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/find-my-blocks/" + google-query: inurl:"/wp-content/plugins/find-my-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,find-my-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/find-my-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "find-my-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/findeo-41837fb37d737478db2ea9f3e428404e.yaml b/nuclei-templates/cve-less/plugins/findeo-41837fb37d737478db2ea9f3e428404e.yaml new file mode 100644 index 0000000000..ff15f2619d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/findeo-41837fb37d737478db2ea9f3e428404e.yaml @@ -0,0 +1,58 @@ +id: findeo-41837fb37d737478db2ea9f3e428404e + +info: + name: > + Realteo <= 1.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cb81956-856a-49cc-a437-a2094d958b5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/findeo/" + google-query: inurl:"/wp-content/plugins/findeo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,findeo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/findeo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "findeo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/findeo-d1bbc50d843df9b465aead854697cdc8.yaml b/nuclei-templates/cve-less/plugins/findeo-d1bbc50d843df9b465aead854697cdc8.yaml new file mode 100644 index 0000000000..45b427f2d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/findeo-d1bbc50d843df9b465aead854697cdc8.yaml @@ -0,0 +1,58 @@ +id: findeo-d1bbc50d843df9b465aead854697cdc8 + +info: + name: > + Realteo < 1.2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72f3541e-e589-4f21-ab51-89dba704b271?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/findeo/" + google-query: inurl:"/wp-content/plugins/findeo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,findeo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/findeo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "findeo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/firestats-116359fea7fe1422fcee6d92fc7e8d15.yaml b/nuclei-templates/cve-less/plugins/firestats-116359fea7fe1422fcee6d92fc7e8d15.yaml new file mode 100644 index 0000000000..404a07682b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/firestats-116359fea7fe1422fcee6d92fc7e8d15.yaml @@ -0,0 +1,58 @@ +id: firestats-116359fea7fe1422fcee6d92fc7e8d15 + +info: + name: > + FireStats <1.6.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcc59efb-5ecd-4822-998c-6c79fbeb4c3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/firestats/" + google-query: inurl:"/wp-content/plugins/firestats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,firestats,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/firestats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "firestats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/firestats-8d2b8d85e3990e663a1d1eeba9e988ea.yaml b/nuclei-templates/cve-less/plugins/firestats-8d2b8d85e3990e663a1d1eeba9e988ea.yaml new file mode 100644 index 0000000000..833facc49d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/firestats-8d2b8d85e3990e663a1d1eeba9e988ea.yaml @@ -0,0 +1,58 @@ +id: firestats-8d2b8d85e3990e663a1d1eeba9e988ea + +info: + name: > + FireStats < 1.6.2 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05544f69-bc9b-4270-80c9-96afe4793cb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/firestats/" + google-query: inurl:"/wp-content/plugins/firestats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,firestats,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/firestats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "firestats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/first-graders-toolbox-7b6c4a5d491c136298d22f463e5441b8.yaml b/nuclei-templates/cve-less/plugins/first-graders-toolbox-7b6c4a5d491c136298d22f463e5441b8.yaml new file mode 100644 index 0000000000..867875f95d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/first-graders-toolbox-7b6c4a5d491c136298d22f463e5441b8.yaml @@ -0,0 +1,58 @@ +id: first-graders-toolbox-7b6c4a5d491c136298d22f463e5441b8 + +info: + name: > + 1 click disable all <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7c98de6-7e76-48f3-aa79-57bf4f387428?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/first-graders-toolbox/" + google-query: inurl:"/wp-content/plugins/first-graders-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,first-graders-toolbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/first-graders-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "first-graders-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/first-order-discount-woocommerce-1249a65de4506f62402e8cab0fdcd2b8.yaml b/nuclei-templates/cve-less/plugins/first-order-discount-woocommerce-1249a65de4506f62402e8cab0fdcd2b8.yaml new file mode 100644 index 0000000000..d01e49b809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/first-order-discount-woocommerce-1249a65de4506f62402e8cab0fdcd2b8.yaml @@ -0,0 +1,58 @@ +id: first-order-discount-woocommerce-1249a65de4506f62402e8cab0fdcd2b8 + +info: + name: > + First Order Discount Woocommerce <= 1.21 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9d161a3-eb9f-447f-b2d2-b8b193678d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/first-order-discount-woocommerce/" + google-query: inurl:"/wp-content/plugins/first-order-discount-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,first-order-discount-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/first-order-discount-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "first-order-discount-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fitness-calculators-642950df2f7522b38841579e45f2fa32.yaml b/nuclei-templates/cve-less/plugins/fitness-calculators-642950df2f7522b38841579e45f2fa32.yaml new file mode 100644 index 0000000000..0e2dc31e11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fitness-calculators-642950df2f7522b38841579e45f2fa32.yaml @@ -0,0 +1,58 @@ +id: fitness-calculators-642950df2f7522b38841579e45f2fa32 + +info: + name: > + Fitness calculators plugin <= 2.0.8 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aafbdd50-c78b-4aad-a3e2-f1339d698e77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fitness-calculators/" + google-query: inurl:"/wp-content/plugins/fitness-calculators/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fitness-calculators,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fitness-calculators/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fitness-calculators" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fitness-calculators-99086c0a0b024a064c1e5677b2106531.yaml b/nuclei-templates/cve-less/plugins/fitness-calculators-99086c0a0b024a064c1e5677b2106531.yaml new file mode 100644 index 0000000000..d9f858a517 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fitness-calculators-99086c0a0b024a064c1e5677b2106531.yaml @@ -0,0 +1,58 @@ +id: fitness-calculators-99086c0a0b024a064c1e5677b2106531 + +info: + name: > + Fitness Calculators <= 1.9.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/659f5a99-84f4-44b0-8546-445831c7e0d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fitness-calculators/" + google-query: inurl:"/wp-content/plugins/fitness-calculators/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fitness-calculators,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fitness-calculators/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fitness-calculators" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fitness-trainer-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/fitness-trainer-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..ec0d3fd618 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fitness-trainer-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: fitness-trainer-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fitness-trainer/" + google-query: inurl:"/wp-content/plugins/fitness-trainer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fitness-trainer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fitness-trainer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fitness-trainer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/five-minute-webshop-22c242de8477403c11aa170395108645.yaml b/nuclei-templates/cve-less/plugins/five-minute-webshop-22c242de8477403c11aa170395108645.yaml new file mode 100644 index 0000000000..6d75811dfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/five-minute-webshop-22c242de8477403c11aa170395108645.yaml @@ -0,0 +1,58 @@ +id: five-minute-webshop-22c242de8477403c11aa170395108645 + +info: + name: > + Five Minute Webshop <= 1.3.2 - Authenticated (Admin+) SQL Injection via orderby + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/213b6dec-a64d-4597-a079-8fb82df9c8b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/five-minute-webshop/" + google-query: inurl:"/wp-content/plugins/five-minute-webshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,five-minute-webshop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/five-minute-webshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "five-minute-webshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/five-minute-webshop-8eccbee0dd1899147fba577f29a00bda.yaml b/nuclei-templates/cve-less/plugins/five-minute-webshop-8eccbee0dd1899147fba577f29a00bda.yaml new file mode 100644 index 0000000000..e8e5a97635 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/five-minute-webshop-8eccbee0dd1899147fba577f29a00bda.yaml @@ -0,0 +1,58 @@ +id: five-minute-webshop-8eccbee0dd1899147fba577f29a00bda + +info: + name: > + Five Minute Webshop <= 1.3.2 - Authenticated (Admin+) SQL Injection via id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a7298ae-e1e6-4d3f-b4fb-9f9db9f3832d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/five-minute-webshop/" + google-query: inurl:"/wp-content/plugins/five-minute-webshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,five-minute-webshop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/five-minute-webshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "five-minute-webshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/five-star-ratings-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/five-star-ratings-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1680c03e45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/five-star-ratings-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: five-star-ratings-shortcode-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/five-star-ratings-shortcode/" + google-query: inurl:"/wp-content/plugins/five-star-ratings-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,five-star-ratings-shortcode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/five-star-ratings-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "five-star-ratings-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fix-my-feed-rss-repair-2a21d5a31d3b98e1018a3dbbd691f093.yaml b/nuclei-templates/cve-less/plugins/fix-my-feed-rss-repair-2a21d5a31d3b98e1018a3dbbd691f093.yaml new file mode 100644 index 0000000000..f56c05e105 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fix-my-feed-rss-repair-2a21d5a31d3b98e1018a3dbbd691f093.yaml @@ -0,0 +1,58 @@ +id: fix-my-feed-rss-repair-2a21d5a31d3b98e1018a3dbbd691f093 + +info: + name: > + Fix My Feed RSS Repair <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/038742d8-3da9-4e2a-bbd4-9ed6b31e8767?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fix-my-feed-rss-repair/" + google-query: inurl:"/wp-content/plugins/fix-my-feed-rss-repair/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fix-my-feed-rss-repair,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fix-my-feed-rss-repair/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fix-my-feed-rss-repair" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fixed-html-toolbar-39995b4a98bd80010d8be7d8f66f2d38.yaml b/nuclei-templates/cve-less/plugins/fixed-html-toolbar-39995b4a98bd80010d8be7d8f66f2d38.yaml new file mode 100644 index 0000000000..f43d039918 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fixed-html-toolbar-39995b4a98bd80010d8be7d8f66f2d38.yaml @@ -0,0 +1,58 @@ +id: fixed-html-toolbar-39995b4a98bd80010d8be7d8f66f2d38 + +info: + name: > + Fixed HTML Toolbar <= 1.0.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31e11aff-056f-47c4-b5d1-c67af350585d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fixed-html-toolbar/" + google-query: inurl:"/wp-content/plugins/fixed-html-toolbar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fixed-html-toolbar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fixed-html-toolbar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fixed-html-toolbar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fixedly-6698c76500688159e50581d2fa14052b.yaml b/nuclei-templates/cve-less/plugins/fixedly-6698c76500688159e50581d2fa14052b.yaml new file mode 100644 index 0000000000..555c086abd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fixedly-6698c76500688159e50581d2fa14052b.yaml @@ -0,0 +1,58 @@ +id: fixedly-6698c76500688159e50581d2fa14052b + +info: + name: > + Fixedly Media Gallery <= 1.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97cdcc23-4f63-4976-bc47-805d5dbbee09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fixedly/" + google-query: inurl:"/wp-content/plugins/fixedly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fixedly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fixedly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fixedly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fl3r-feelbox-30d0f494aa8b20416d51df052e0c844e.yaml b/nuclei-templates/cve-less/plugins/fl3r-feelbox-30d0f494aa8b20416d51df052e0c844e.yaml new file mode 100644 index 0000000000..ad129fc8e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fl3r-feelbox-30d0f494aa8b20416d51df052e0c844e.yaml @@ -0,0 +1,58 @@ +id: fl3r-feelbox-30d0f494aa8b20416d51df052e0c844e + +info: + name: > + FL3R FeelBox <= 8.1 - Cross-Site Request Forgery leading to Plugin Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a830d58-14e8-4929-a0f8-08ee4efae340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fl3r-feelbox/" + google-query: inurl:"/wp-content/plugins/fl3r-feelbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fl3r-feelbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fl3r-feelbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fl3r-feelbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fl3r-feelbox-7a1fe9dbd3e35a123780e19c329830c8.yaml b/nuclei-templates/cve-less/plugins/fl3r-feelbox-7a1fe9dbd3e35a123780e19c329830c8.yaml new file mode 100644 index 0000000000..02cdd04320 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fl3r-feelbox-7a1fe9dbd3e35a123780e19c329830c8.yaml @@ -0,0 +1,58 @@ +id: fl3r-feelbox-7a1fe9dbd3e35a123780e19c329830c8 + +info: + name: > + FL3R FeelBox <= 8.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e770d1fc-b941-4f0f-87ee-8b0c9edb640b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fl3r-feelbox/" + google-query: inurl:"/wp-content/plugins/fl3r-feelbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fl3r-feelbox,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fl3r-feelbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fl3r-feelbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8..1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fl3r-feelbox-817d9bd5ced767540dd82a3d7ff4067c.yaml b/nuclei-templates/cve-less/plugins/fl3r-feelbox-817d9bd5ced767540dd82a3d7ff4067c.yaml new file mode 100644 index 0000000000..fe4f37a491 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fl3r-feelbox-817d9bd5ced767540dd82a3d7ff4067c.yaml @@ -0,0 +1,58 @@ +id: fl3r-feelbox-817d9bd5ced767540dd82a3d7ff4067c + +info: + name: > + FL3R FeelBox <= 8.1 - Cross-Site Request Forgery leading to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ab311f-26c1-4165-80bc-512348fcc0c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fl3r-feelbox/" + google-query: inurl:"/wp-content/plugins/fl3r-feelbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fl3r-feelbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fl3r-feelbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fl3r-feelbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flagallery-skins-ca01974b82faf04d95b2178a85b29c88.yaml b/nuclei-templates/cve-less/plugins/flagallery-skins-ca01974b82faf04d95b2178a85b29c88.yaml new file mode 100644 index 0000000000..a2730a999a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flagallery-skins-ca01974b82faf04d95b2178a85b29c88.yaml @@ -0,0 +1,58 @@ +id: flagallery-skins-ca01974b82faf04d95b2178a85b29c88 + +info: + name: > + Flagallery-skins <= 1.1.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1decdfd8-a2e8-49af-ade8-01d19814b6fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flagallery-skins/" + google-query: inurl:"/wp-content/plugins/flagallery-skins/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flagallery-skins,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flagallery-skins/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flagallery-skins" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flagem-ba981dbbf1ea06bbf2969e39bd0742cb.yaml b/nuclei-templates/cve-less/plugins/flagem-ba981dbbf1ea06bbf2969e39bd0742cb.yaml new file mode 100644 index 0000000000..7b80f00f33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flagem-ba981dbbf1ea06bbf2969e39bd0742cb.yaml @@ -0,0 +1,58 @@ +id: flagem-ba981dbbf1ea06bbf2969e39bd0742cb + +info: + name: > + FlagEm (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a45d62f-bd41-4a69-be61-c4d6a7ec555c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/FlagEm/" + google-query: inurl:"/wp-content/plugins/FlagEm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,FlagEm,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/FlagEm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "FlagEm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flamingo-841259aa92d69f1fd000aa64627b9b99.yaml b/nuclei-templates/cve-less/plugins/flamingo-841259aa92d69f1fd000aa64627b9b99.yaml new file mode 100644 index 0000000000..841b8b503f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flamingo-841259aa92d69f1fd000aa64627b9b99.yaml @@ -0,0 +1,58 @@ +id: flamingo-841259aa92d69f1fd000aa64627b9b99 + +info: + name: > + Flamingo <= 2.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78760d4d-04fc-4a6c-8c0d-6bf897335651?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flamingo/" + google-query: inurl:"/wp-content/plugins/flamingo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flamingo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flamingo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flamingo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-0b070c6bccd03db5dad9fdc1c059c617.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-0b070c6bccd03db5dad9fdc1c059c617.yaml new file mode 100644 index 0000000000..a200e3a885 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-0b070c6bccd03db5dad9fdc1c059c617.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-0b070c6bccd03db5dad9fdc1c059c617 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio < 1.57 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55773c6c-85e8-4023-8dd6-4feb0f6254b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-0ba2e71f2a03b9577c68d8acb58a10a7.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-0ba2e71f2a03b9577c68d8acb58a10a7.yaml new file mode 100644 index 0000000000..128f59c660 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-0ba2e71f2a03b9577c68d8acb58a10a7.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-0ba2e71f2a03b9577c68d8acb58a10a7 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio <= 2.00 - Arbitrary File Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e21d279-aa83-42ff-9906-bc61dc4aba52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-201957a4954f30a5d4ed40f134fba1c6.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-201957a4954f30a5d4ed40f134fba1c6.yaml new file mode 100644 index 0000000000..659070774e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-201957a4954f30a5d4ed40f134fba1c6.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-201957a4954f30a5d4ed40f134fba1c6 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio < 4.25 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56382dd8-7f02-4544-a530-31c012407ab7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-311ab6afdc9cf3bb4b0014cc35739998.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-311ab6afdc9cf3bb4b0014cc35739998.yaml new file mode 100644 index 0000000000..a7e906e9ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-311ab6afdc9cf3bb4b0014cc35739998.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-311ab6afdc9cf3bb4b0014cc35739998 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio < 3.1.0 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d5ef392-6aea-4fab-95ce-d36d1cd17026?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-4a78286f0fa257bf74920260dae5103f.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-4a78286f0fa257bf74920260dae5103f.yaml new file mode 100644 index 0000000000..0fc8281081 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-4a78286f0fa257bf74920260dae5103f.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-4a78286f0fa257bf74920260dae5103f + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio < 2.72 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/582a536c-950e-424b-80a7-83608d220b87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-5a8f9f4e46e4e9903571445b91cbd00c.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-5a8f9f4e46e4e9903571445b91cbd00c.yaml new file mode 100644 index 0000000000..29fe9f63dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-5a8f9f4e46e4e9903571445b91cbd00c.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-5a8f9f4e46e4e9903571445b91cbd00c + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio <= 2.00 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4c1f966-aa10-45cc-9fb0-2e703dd3098e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-9c64f5e45af7ae21167a588c42aec386.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-9c64f5e45af7ae21167a588c42aec386.yaml new file mode 100644 index 0000000000..000ec362bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-9c64f5e45af7ae21167a588c42aec386.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-9c64f5e45af7ae21167a588c42aec386 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio <= 1.72 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e1e6fb1-af66-460e-9fb1-8d14a8cbbea5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-a6b7b9dbed28e3619b6105ab67bf1f0c.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-a6b7b9dbed28e3619b6105ab67bf1f0c.yaml new file mode 100644 index 0000000000..0eb8bde440 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-a6b7b9dbed28e3619b6105ab67bf1f0c.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-a6b7b9dbed28e3619b6105ab67bf1f0c + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio <= 2.55 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/928b4c4f-0614-410a-857b-90037770cfbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-aeed8f75983d5d3eda35b4e52588c591.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-aeed8f75983d5d3eda35b4e52588c591.yaml new file mode 100644 index 0000000000..81cdb23c10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-aeed8f75983d5d3eda35b4e52588c591.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-aeed8f75983d5d3eda35b4e52588c591 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio < 2.53 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1197a66e-4557-458f-b8fd-b7a8e7586817?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-bf1b5f8a23a62c1a6be7914495f430b8.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-bf1b5f8a23a62c1a6be7914495f430b8.yaml new file mode 100644 index 0000000000..1e89d9c656 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-bf1b5f8a23a62c1a6be7914495f430b8.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-bf1b5f8a23a62c1a6be7914495f430b8 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio < 2.53 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c648ea4-7df6-4a77-9bc5-bd3c18979250?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-daf27b66517334d1a8886ba5982e7461.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-daf27b66517334d1a8886ba5982e7461.yaml new file mode 100644 index 0000000000..e5db31cacd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-daf27b66517334d1a8886ba5982e7461.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-daf27b66517334d1a8886ba5982e7461 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio <= 2.00 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a08ea797-a836-4a21-bfca-2c05810d25cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-e026b5a6041ce1f13dd851a463a892ee.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-e026b5a6041ce1f13dd851a463a892ee.yaml new file mode 100644 index 0000000000..dcce51a694 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-e026b5a6041ce1f13dd851a463a892ee.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-e026b5a6041ce1f13dd851a463a892ee + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio <= 0.59 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b884d3c9-7d84-44eb-9e94-b415625b479d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-album-gallery-eca8e288e4dc717ec25c774372f69b42.yaml b/nuclei-templates/cve-less/plugins/flash-album-gallery-eca8e288e4dc717ec25c774372f69b42.yaml new file mode 100644 index 0000000000..3ebf7301b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-album-gallery-eca8e288e4dc717ec25c774372f69b42.yaml @@ -0,0 +1,58 @@ +id: flash-album-gallery-eca8e288e4dc717ec25c774372f69b42 + +info: + name: > + Album and Image Gallery with Lightbox – Flagallery Photo Portfolio <= 6.1.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f6ee92e-4ccb-41b3-855f-adbfae4888ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-album-gallery/" + google-query: inurl:"/wp-content/plugins/flash-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-album-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-photo-gallery-b3551195333886afba6c43fd173acb65.yaml b/nuclei-templates/cve-less/plugins/flash-photo-gallery-b3551195333886afba6c43fd173acb65.yaml new file mode 100644 index 0000000000..a9ff7e52f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-photo-gallery-b3551195333886afba6c43fd173acb65.yaml @@ -0,0 +1,58 @@ +id: flash-photo-gallery-b3551195333886afba6c43fd173acb65 + +info: + name: > + Flash Photo Gallery <= 0.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b57fbe8-0c8d-4ddb-8768-03ed354b2d21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-photo-gallery/" + google-query: inurl:"/wp-content/plugins/flash-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-player-widget-fba24244e7e4f0de151661ff65df04c0.yaml b/nuclei-templates/cve-less/plugins/flash-player-widget-fba24244e7e4f0de151661ff65df04c0.yaml new file mode 100644 index 0000000000..1e6c46cf6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-player-widget-fba24244e7e4f0de151661ff65df04c0.yaml @@ -0,0 +1,58 @@ +id: flash-player-widget-fba24244e7e4f0de151661ff65df04c0 + +info: + name: > + Flash player widget <= 1.3 - Content Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/938e8f54-56f0-4066-bc78-ebfc2abe0743?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-player-widget/" + google-query: inurl:"/wp-content/plugins/flash-player-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-player-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-player-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-player-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flash-video-player-e36d4622c7c94ab3537e4da3e23c5c2d.yaml b/nuclei-templates/cve-less/plugins/flash-video-player-e36d4622c7c94ab3537e4da3e23c5c2d.yaml new file mode 100644 index 0000000000..799d0dbef0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flash-video-player-e36d4622c7c94ab3537e4da3e23c5c2d.yaml @@ -0,0 +1,58 @@ +id: flash-video-player-e36d4622c7c94ab3537e4da3e23c5c2d + +info: + name: > + Flash Video Player <= 5.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d3bb015-5a01-4450-80d3-c37d5d7d8926?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flash-video-player/" + google-query: inurl:"/wp-content/plugins/flash-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flash-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flash-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flash-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flat-preloader-18d1a7d6e453e6e958428b87d731de75.yaml b/nuclei-templates/cve-less/plugins/flat-preloader-18d1a7d6e453e6e958428b87d731de75.yaml new file mode 100644 index 0000000000..51586f5b57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flat-preloader-18d1a7d6e453e6e958428b87d731de75.yaml @@ -0,0 +1,58 @@ +id: flat-preloader-18d1a7d6e453e6e958428b87d731de75 + +info: + name: > + Flat Preloader <= 1.5.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2a61a12-df0c-47a2-ba39-b70dbfaddf0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flat-preloader/" + google-query: inurl:"/wp-content/plugins/flat-preloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flat-preloader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flat-preloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flat-preloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flat-preloader-49a588fa69586f2484ce1bba5358bbd9.yaml b/nuclei-templates/cve-less/plugins/flat-preloader-49a588fa69586f2484ce1bba5358bbd9.yaml new file mode 100644 index 0000000000..98bec5d344 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flat-preloader-49a588fa69586f2484ce1bba5358bbd9.yaml @@ -0,0 +1,58 @@ +id: flat-preloader-49a588fa69586f2484ce1bba5358bbd9 + +info: + name: > + Flat Preloader < 1.5.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1832b11a-0706-438a-9a25-d384ac49d2bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flat-preloader/" + google-query: inurl:"/wp-content/plugins/flat-preloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flat-preloader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flat-preloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flat-preloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flatpm-wp-783b91bae7d265f558a1870f59bc1ef0.yaml b/nuclei-templates/cve-less/plugins/flatpm-wp-783b91bae7d265f558a1870f59bc1ef0.yaml new file mode 100644 index 0000000000..fbaff5e75b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flatpm-wp-783b91bae7d265f558a1870f59bc1ef0.yaml @@ -0,0 +1,58 @@ +id: flatpm-wp-783b91bae7d265f558a1870f59bc1ef0 + +info: + name: > + FlatPM < 3.1.05 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ae9640f-b088-4d9f-9ced-6bf7940345a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flatpm-wp/" + google-query: inurl:"/wp-content/plugins/flatpm-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flatpm-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flatpm-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flatpm-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flatpm-wp-b7ea054dad22d02b62197c8fa3fba822.yaml b/nuclei-templates/cve-less/plugins/flatpm-wp-b7ea054dad22d02b62197c8fa3fba822.yaml new file mode 100644 index 0000000000..0c14c723f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flatpm-wp-b7ea054dad22d02b62197c8fa3fba822.yaml @@ -0,0 +1,58 @@ +id: flatpm-wp-b7ea054dad22d02b62197c8fa3fba822 + +info: + name: > + Flat PM <= 2.661 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a15fd2da-5897-4eb8-81c3-79e800e94122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flatpm-wp/" + google-query: inurl:"/wp-content/plugins/flatpm-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flatpm-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flatpm-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flatpm-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.661') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flattr-466a1f62f3b9e3cbc883b22ebc0c11de.yaml b/nuclei-templates/cve-less/plugins/flattr-466a1f62f3b9e3cbc883b22ebc0c11de.yaml new file mode 100644 index 0000000000..8ac57e3f61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flattr-466a1f62f3b9e3cbc883b22ebc0c11de.yaml @@ -0,0 +1,58 @@ +id: flattr-466a1f62f3b9e3cbc883b22ebc0c11de + +info: + name: > + Flattr <= 1.2.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52f98de0-ad91-4b5a-91ef-6fe705f2bf60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flattr/" + google-query: inurl:"/wp-content/plugins/flattr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flattr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flattr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flattr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexi-8180b2e535d97180306ef769873324d8.yaml b/nuclei-templates/cve-less/plugins/flexi-8180b2e535d97180306ef769873324d8.yaml new file mode 100644 index 0000000000..46624c410a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexi-8180b2e535d97180306ef769873324d8.yaml @@ -0,0 +1,58 @@ +id: flexi-8180b2e535d97180306ef769873324d8 + +info: + name: > + Flexi - Guest Submit < 4.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e7a78e1-8c1a-4fb4-9959-d8fb7f9ee917?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexi/" + google-query: inurl:"/wp-content/plugins/flexi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexi-quote-rotator-13464676c956740d86ef6b835803b913.yaml b/nuclei-templates/cve-less/plugins/flexi-quote-rotator-13464676c956740d86ef6b835803b913.yaml new file mode 100644 index 0000000000..a3218ea9b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexi-quote-rotator-13464676c956740d86ef6b835803b913.yaml @@ -0,0 +1,58 @@ +id: flexi-quote-rotator-13464676c956740d86ef6b835803b913 + +info: + name: > + Flexi Quote Rotator <= 0.9.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f25b355a-edeb-4d88-8419-ab0d716ec5bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexi-quote-rotator/" + google-query: inurl:"/wp-content/plugins/flexi-quote-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexi-quote-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexi-quote-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexi-quote-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexi-quote-rotator-8041e4418d6dd5832b9d268c12d84f0f.yaml b/nuclei-templates/cve-less/plugins/flexi-quote-rotator-8041e4418d6dd5832b9d268c12d84f0f.yaml new file mode 100644 index 0000000000..ae85caf097 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexi-quote-rotator-8041e4418d6dd5832b9d268c12d84f0f.yaml @@ -0,0 +1,58 @@ +id: flexi-quote-rotator-8041e4418d6dd5832b9d268c12d84f0f + +info: + name: > + Flexi Quote Rotator <= 0.9.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cfeed0f-ab3e-4b35-9b69-08cc7e7ffb45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexi-quote-rotator/" + google-query: inurl:"/wp-content/plugins/flexi-quote-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexi-quote-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexi-quote-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexi-quote-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-captcha-5ba06f6e9e576d3b96edab291a35b673.yaml b/nuclei-templates/cve-less/plugins/flexible-captcha-5ba06f6e9e576d3b96edab291a35b673.yaml new file mode 100644 index 0000000000..0e61a8cace --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-captcha-5ba06f6e9e576d3b96edab291a35b673.yaml @@ -0,0 +1,58 @@ +id: flexible-captcha-5ba06f6e9e576d3b96edab291a35b673 + +info: + name: > + Flexible Captcha <= 4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efbcac1c-854c-4521-848a-d403bc27328f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-captcha/" + google-query: inurl:"/wp-content/plugins/flexible-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-checkout-fields-313211003f16b9f4f6fba43486ffd622.yaml b/nuclei-templates/cve-less/plugins/flexible-checkout-fields-313211003f16b9f4f6fba43486ffd622.yaml new file mode 100644 index 0000000000..0092c5aed3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-checkout-fields-313211003f16b9f4f6fba43486ffd622.yaml @@ -0,0 +1,58 @@ +id: flexible-checkout-fields-313211003f16b9f4f6fba43486ffd622 + +info: + name: > + Flexible Checkout Fields for WooCommerce <= 2.3.1 - Unauthenticated Arbitrary Plugin Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd12a952-2e99-41f7-b74c-55c2b7d8deed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-checkout-fields/" + google-query: inurl:"/wp-content/plugins/flexible-checkout-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-checkout-fields,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-checkout-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-checkout-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-checkout-fields-af1c4837148181f6207e66eb6c3b9ff3.yaml b/nuclei-templates/cve-less/plugins/flexible-checkout-fields-af1c4837148181f6207e66eb6c3b9ff3.yaml new file mode 100644 index 0000000000..be4a4f4724 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-checkout-fields-af1c4837148181f6207e66eb6c3b9ff3.yaml @@ -0,0 +1,58 @@ +id: flexible-checkout-fields-af1c4837148181f6207e66eb6c3b9ff3 + +info: + name: > + Flexible Checkout Fields for WooCommerce <= 4.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99e332d8-92a4-4643-a63c-3642bab0b007?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-checkout-fields/" + google-query: inurl:"/wp-content/plugins/flexible-checkout-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-checkout-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-checkout-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-checkout-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-custom-post-type-9fb1e67eb818f983f8dbfc23b2a0c064.yaml b/nuclei-templates/cve-less/plugins/flexible-custom-post-type-9fb1e67eb818f983f8dbfc23b2a0c064.yaml new file mode 100644 index 0000000000..d95bb8ba5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-custom-post-type-9fb1e67eb818f983f8dbfc23b2a0c064.yaml @@ -0,0 +1,58 @@ +id: flexible-custom-post-type-9fb1e67eb818f983f8dbfc23b2a0c064 + +info: + name: > + Flexible Custom Post Type < 0.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd8f5406-bbd2-44ab-9d98-3857216efc28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-custom-post-type/" + google-query: inurl:"/wp-content/plugins/flexible-custom-post-type/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-custom-post-type,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-custom-post-type/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-custom-post-type" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-elementor-panel-7dea148c446a704ce10e41cb5e2e70c3.yaml b/nuclei-templates/cve-less/plugins/flexible-elementor-panel-7dea148c446a704ce10e41cb5e2e70c3.yaml new file mode 100644 index 0000000000..38cf6c8a4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-elementor-panel-7dea148c446a704ce10e41cb5e2e70c3.yaml @@ -0,0 +1,58 @@ +id: flexible-elementor-panel-7dea148c446a704ce10e41cb5e2e70c3 + +info: + name: > + Flexible Elementor Panel <= 2.3.8 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e5381fe-940b-404e-b2f2-1fd1c4ee5d78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-elementor-panel/" + google-query: inurl:"/wp-content/plugins/flexible-elementor-panel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-elementor-panel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-elementor-panel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-elementor-panel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-shipping-0a20e0340c90c0e3abffd4151b1ac5e4.yaml b/nuclei-templates/cve-less/plugins/flexible-shipping-0a20e0340c90c0e3abffd4151b1ac5e4.yaml new file mode 100644 index 0000000000..ab11d7e477 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-shipping-0a20e0340c90c0e3abffd4151b1ac5e4.yaml @@ -0,0 +1,58 @@ +id: flexible-shipping-0a20e0340c90c0e3abffd4151b1ac5e4 + +info: + name: > + Table Rate Shipping Method for WooCommerce by Flexible Shipping <= 4.11.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3363149f-a522-49a1-94c8-a3bcd865f911?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-shipping/" + google-query: inurl:"/wp-content/plugins/flexible-shipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-shipping,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-shipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-shipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-shipping-cb1263fe7cf23ae55fdda5b42af76fdf.yaml b/nuclei-templates/cve-less/plugins/flexible-shipping-cb1263fe7cf23ae55fdda5b42af76fdf.yaml new file mode 100644 index 0000000000..ebda470a26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-shipping-cb1263fe7cf23ae55fdda5b42af76fdf.yaml @@ -0,0 +1,58 @@ +id: flexible-shipping-cb1263fe7cf23ae55fdda5b42af76fdf + +info: + name: > + Flexible Shipping <= 4.24.15 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb879587-6210-4e23-8f02-9ce93a271962?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-shipping/" + google-query: inurl:"/wp-content/plugins/flexible-shipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-shipping,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-shipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-shipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.24.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-shipping-ups-6b12163f0814856a86494d984e656633.yaml b/nuclei-templates/cve-less/plugins/flexible-shipping-ups-6b12163f0814856a86494d984e656633.yaml new file mode 100644 index 0000000000..7b8acf6725 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-shipping-ups-6b12163f0814856a86494d984e656633.yaml @@ -0,0 +1,58 @@ +id: flexible-shipping-ups-6b12163f0814856a86494d984e656633 + +info: + name: > + WooCommerce UPS Shipping – Live Rates and Access Points <= 2.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2183a22-fba5-48d2-a68a-6914f04fb902?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-shipping-ups/" + google-query: inurl:"/wp-content/plugins/flexible-shipping-ups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-shipping-ups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-shipping-ups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-shipping-ups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-shipping-usps-4e5d4a35614ae6a4ee59ec1f48b231d3.yaml b/nuclei-templates/cve-less/plugins/flexible-shipping-usps-4e5d4a35614ae6a4ee59ec1f48b231d3.yaml new file mode 100644 index 0000000000..2b20d667fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-shipping-usps-4e5d4a35614ae6a4ee59ec1f48b231d3.yaml @@ -0,0 +1,58 @@ +id: flexible-shipping-usps-4e5d4a35614ae6a4ee59ec1f48b231d3 + +info: + name: > + USPS Shipping for WooCommerce – Live Rates <= 1.9.4 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0da1ed2-3ffc-4da8-a8b4-8f5544ed157b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-shipping-usps/" + google-query: inurl:"/wp-content/plugins/flexible-shipping-usps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-shipping-usps,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-shipping-usps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-shipping-usps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-shipping-usps-addd443476959ed1e0edf984e54a6c38.yaml b/nuclei-templates/cve-less/plugins/flexible-shipping-usps-addd443476959ed1e0edf984e54a6c38.yaml new file mode 100644 index 0000000000..4c9c09ad34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-shipping-usps-addd443476959ed1e0edf984e54a6c38.yaml @@ -0,0 +1,58 @@ +id: flexible-shipping-usps-addd443476959ed1e0edf984e54a6c38 + +info: + name: > + USPS Shipping for WooCommerce – Live Rates <= 1.9.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4083d48-a1a8-4ab7-a67f-308bbbbcb4d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-shipping-usps/" + google-query: inurl:"/wp-content/plugins/flexible-shipping-usps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-shipping-usps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-shipping-usps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-shipping-usps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flexible-woocommerce-checkout-field-editor-40dad92f1e274f70a2212adefbc68e38.yaml b/nuclei-templates/cve-less/plugins/flexible-woocommerce-checkout-field-editor-40dad92f1e274f70a2212adefbc68e38.yaml new file mode 100644 index 0000000000..58d5969b87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flexible-woocommerce-checkout-field-editor-40dad92f1e274f70a2212adefbc68e38.yaml @@ -0,0 +1,58 @@ +id: flexible-woocommerce-checkout-field-editor-40dad92f1e274f70a2212adefbc68e38 + +info: + name: > + Flexible Woocommerce Checkout Field Editor <= 2.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5947f7cb-de84-4a62-bef7-cbeb1f20bb72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flexible-woocommerce-checkout-field-editor/" + google-query: inurl:"/wp-content/plugins/flexible-woocommerce-checkout-field-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flexible-woocommerce-checkout-field-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flexible-woocommerce-checkout-field-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flexible-woocommerce-checkout-field-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flickr-gallery-227a216c8593797eea57e8ea91304372.yaml b/nuclei-templates/cve-less/plugins/flickr-gallery-227a216c8593797eea57e8ea91304372.yaml new file mode 100644 index 0000000000..5e1d392e7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flickr-gallery-227a216c8593797eea57e8ea91304372.yaml @@ -0,0 +1,58 @@ +id: flickr-gallery-227a216c8593797eea57e8ea91304372 + +info: + name: > + Flickr Gallery <= 1.5.2 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b52ae51d-7b9a-4047-82bf-723ea87d2375?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flickr-gallery/" + google-query: inurl:"/wp-content/plugins/flickr-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flickr-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flickr-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flickr-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flickr-justified-gallery-43150c91e86c385735f6eec13fd0a597.yaml b/nuclei-templates/cve-less/plugins/flickr-justified-gallery-43150c91e86c385735f6eec13fd0a597.yaml new file mode 100644 index 0000000000..68c99a9fbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flickr-justified-gallery-43150c91e86c385735f6eec13fd0a597.yaml @@ -0,0 +1,58 @@ +id: flickr-justified-gallery-43150c91e86c385735f6eec13fd0a597 + +info: + name: > + Flickr Justified Gallery < 3.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43e72eef-4e66-4789-959b-163c9cbea584?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flickr-justified-gallery/" + google-query: inurl:"/wp-content/plugins/flickr-justified-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flickr-justified-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flickr-justified-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flickr-justified-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flickr-justified-gallery-601901ac64242d401542d9abeeaae03f.yaml b/nuclei-templates/cve-less/plugins/flickr-justified-gallery-601901ac64242d401542d9abeeaae03f.yaml new file mode 100644 index 0000000000..9d43f72838 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flickr-justified-gallery-601901ac64242d401542d9abeeaae03f.yaml @@ -0,0 +1,58 @@ +id: flickr-justified-gallery-601901ac64242d401542d9abeeaae03f + +info: + name: > + Flickr Justified Gallery <= 3.5 - Cross-Site Request Forgery via fjgwpp_settings() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76a1d39e-8d69-4507-b75c-d376a2122d15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flickr-justified-gallery/" + google-query: inurl:"/wp-content/plugins/flickr-justified-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flickr-justified-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flickr-justified-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flickr-justified-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flickr-picture-backup-f8ecc349c28ee0e39936813fba025244.yaml b/nuclei-templates/cve-less/plugins/flickr-picture-backup-f8ecc349c28ee0e39936813fba025244.yaml new file mode 100644 index 0000000000..d6b444f04c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flickr-picture-backup-f8ecc349c28ee0e39936813fba025244.yaml @@ -0,0 +1,58 @@ +id: flickr-picture-backup-f8ecc349c28ee0e39936813fba025244 + +info: + name: > + flickr-picture-backup <= 0.7 - Arbitrary file upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4240c04b-cad3-496f-b12f-7718bb498fe0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flickr-picture-backup/" + google-query: inurl:"/wp-content/plugins/flickr-picture-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flickr-picture-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flickr-picture-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flickr-picture-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flickr-rss-0e4fc74efc949999cf345512b761619e.yaml b/nuclei-templates/cve-less/plugins/flickr-rss-0e4fc74efc949999cf345512b761619e.yaml new file mode 100644 index 0000000000..7f58082d3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flickr-rss-0e4fc74efc949999cf345512b761619e.yaml @@ -0,0 +1,58 @@ +id: flickr-rss-0e4fc74efc949999cf345512b761619e + +info: + name: > + flickrRSS <= 5.3.1 - Cross-Site Scripting via flickrRSS_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b90503b-6186-48b5-a85a-3602f318872e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flickr-rss/" + google-query: inurl:"/wp-content/plugins/flickr-rss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flickr-rss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flickr-rss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flickr-rss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flickr-rss-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml b/nuclei-templates/cve-less/plugins/flickr-rss-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml new file mode 100644 index 0000000000..e92003b31e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flickr-rss-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml @@ -0,0 +1,58 @@ +id: flickr-rss-3bc9ed0b3cbfe53ac89e5748fc0bf57c + +info: + name: > + flickrRSS <= 5.3.1 - Cross-Site Scripting via flickrRSS_tags + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8a598cf-bdd6-4249-a367-e3e8c6e3ef15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flickr-rss/" + google-query: inurl:"/wp-content/plugins/flickr-rss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flickr-rss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flickr-rss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flickr-rss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flickr-rss-4f5e1d138ae43eaa500111874f55d52e.yaml b/nuclei-templates/cve-less/plugins/flickr-rss-4f5e1d138ae43eaa500111874f55d52e.yaml new file mode 100644 index 0000000000..d1a8275732 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flickr-rss-4f5e1d138ae43eaa500111874f55d52e.yaml @@ -0,0 +1,58 @@ +id: flickr-rss-4f5e1d138ae43eaa500111874f55d52e + +info: + name: > + flickrRSS <= 5.3.1 - Cross-Site Scripting via flickrRSS_set + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8f91e58-942c-417f-ad82-5bd99ab5e81a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flickr-rss/" + google-query: inurl:"/wp-content/plugins/flickr-rss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flickr-rss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flickr-rss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flickr-rss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flickr-rss-ab05255cd8fd175d06143e7aa3177450.yaml b/nuclei-templates/cve-less/plugins/flickr-rss-ab05255cd8fd175d06143e7aa3177450.yaml new file mode 100644 index 0000000000..944fcaa9c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flickr-rss-ab05255cd8fd175d06143e7aa3177450.yaml @@ -0,0 +1,58 @@ +id: flickr-rss-ab05255cd8fd175d06143e7aa3177450 + +info: + name: > + flickrRSS <= 5.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68cc2aec-f21d-482d-a8bd-bbc60f593cb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flickr-rss/" + google-query: inurl:"/wp-content/plugins/flickr-rss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flickr-rss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flickr-rss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flickr-rss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flight-search-widget-blocks-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/flight-search-widget-blocks-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..c4244f7b90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flight-search-widget-blocks-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: flight-search-widget-blocks-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flight-search-widget-blocks/" + google-query: inurl:"/wp-content/plugins/flight-search-widget-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flight-search-widget-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flight-search-widget-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flight-search-widget-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flightlog-019716f1cdfed62fc1f8666dedb59747.yaml b/nuclei-templates/cve-less/plugins/flightlog-019716f1cdfed62fc1f8666dedb59747.yaml new file mode 100644 index 0000000000..cffe27bca0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flightlog-019716f1cdfed62fc1f8666dedb59747.yaml @@ -0,0 +1,58 @@ +id: flightlog-019716f1cdfed62fc1f8666dedb59747 + +info: + name: > + FlightLog <= 3.0.2 - Authenticated (Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60b16755-ac0e-4069-b21a-cca003fecbdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flightlog/" + google-query: inurl:"/wp-content/plugins/flightlog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flightlog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flightlog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flightlog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flipbook-0aa04e52bba38f5b04642c8395b8c974.yaml b/nuclei-templates/cve-less/plugins/flipbook-0aa04e52bba38f5b04642c8395b8c974.yaml new file mode 100644 index 0000000000..5a3d949727 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flipbook-0aa04e52bba38f5b04642c8395b8c974.yaml @@ -0,0 +1,58 @@ +id: flipbook-0aa04e52bba38f5b04642c8395b8c974 + +info: + name: > + FlipBook <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/589fa6f2-fa60-4bdc-9692-50d5591ceb93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flipbook/" + google-query: inurl:"/wp-content/plugins/flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flipbook,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flo-forms-31993563048effdc0827881e9344d84c.yaml b/nuclei-templates/cve-less/plugins/flo-forms-31993563048effdc0827881e9344d84c.yaml new file mode 100644 index 0000000000..bed965e008 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flo-forms-31993563048effdc0827881e9344d84c.yaml @@ -0,0 +1,58 @@ +id: flo-forms-31993563048effdc0827881e9344d84c + +info: + name: > + Flo Forms <= 1.0.41 - Missing Authorization via flo_send_test_email + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04401d7e-996d-4b46-b391-bfb0b065900b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flo-forms/" + google-query: inurl:"/wp-content/plugins/flo-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flo-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flo-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flo-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flo-forms-bbbaa8f4798af45f432fee689b1a5feb.yaml b/nuclei-templates/cve-less/plugins/flo-forms-bbbaa8f4798af45f432fee689b1a5feb.yaml new file mode 100644 index 0000000000..c00bdf4afc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flo-forms-bbbaa8f4798af45f432fee689b1a5feb.yaml @@ -0,0 +1,58 @@ +id: flo-forms-bbbaa8f4798af45f432fee689b1a5feb + +info: + name: > + Flo Forms <= 1.0.40 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdd35d61-0777-4e64-8a51-55fe928e75ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flo-forms/" + google-query: inurl:"/wp-content/plugins/flo-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flo-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flo-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flo-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flo-forms-ec6ef7f01d456e74c1ef5bcee54d14d6.yaml b/nuclei-templates/cve-less/plugins/flo-forms-ec6ef7f01d456e74c1ef5bcee54d14d6.yaml new file mode 100644 index 0000000000..f1b53b4c3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flo-forms-ec6ef7f01d456e74c1ef5bcee54d14d6.yaml @@ -0,0 +1,58 @@ +id: flo-forms-ec6ef7f01d456e74c1ef5bcee54d14d6 + +info: + name: > + Flo Forms – Easy Drag & Drop Form Builder <= 1.0.35 - Options Change to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a175e103-ab89-404b-8736-94d0d93d6cf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flo-forms/" + google-query: inurl:"/wp-content/plugins/flo-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flo-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flo-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flo-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flo-launch-9447e0c2ffa1a53245e3f3fb0bac226a.yaml b/nuclei-templates/cve-less/plugins/flo-launch-9447e0c2ffa1a53245e3f3fb0bac226a.yaml new file mode 100644 index 0000000000..5d84dae2f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flo-launch-9447e0c2ffa1a53245e3f3fb0bac226a.yaml @@ -0,0 +1,58 @@ +id: flo-launch-9447e0c2ffa1a53245e3f3fb0bac226a + +info: + name: > + FloLaunch <= 2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdd2919-396b-41ff-ae92-1b6fee5c6f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flo-launch/" + google-query: inurl:"/wp-content/plugins/flo-launch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flo-launch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flo-launch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flo-launch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/float-menu-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/float-menu-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..0c06011b87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/float-menu-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: float-menu-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/float-menu/" + google-query: inurl:"/wp-content/plugins/float-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,float-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/float-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "float-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/float-menu-5fb9bec95a707650ef979fd037b97227.yaml b/nuclei-templates/cve-less/plugins/float-menu-5fb9bec95a707650ef979fd037b97227.yaml new file mode 100644 index 0000000000..639bc19868 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/float-menu-5fb9bec95a707650ef979fd037b97227.yaml @@ -0,0 +1,58 @@ +id: float-menu-5fb9bec95a707650ef979fd037b97227 + +info: + name: > + Float menu <= 5.0.2 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b6739b5-0df4-49b2-a655-4f0cff5886b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/float-menu/" + google-query: inurl:"/wp-content/plugins/float-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,float-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/float-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "float-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/float-menu-c5eebb4553286e34a5dfcc1fcfb216a1.yaml b/nuclei-templates/cve-less/plugins/float-menu-c5eebb4553286e34a5dfcc1fcfb216a1.yaml new file mode 100644 index 0000000000..cc51de7c75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/float-menu-c5eebb4553286e34a5dfcc1fcfb216a1.yaml @@ -0,0 +1,58 @@ +id: float-menu-c5eebb4553286e34a5dfcc1fcfb216a1 + +info: + name: > + Float menu – awesome floating side menu <= 6.0 - Cross-Site Request Forgery to Menu Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2959ae2f-ef16-45d8-920f-56b141ad955e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/float-menu/" + google-query: inurl:"/wp-content/plugins/float-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,float-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/float-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "float-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/float-menu-cfe127cd973bbf2d8609c8c59c7606df.yaml b/nuclei-templates/cve-less/plugins/float-menu-cfe127cd973bbf2d8609c8c59c7606df.yaml new file mode 100644 index 0000000000..d0562bb55c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/float-menu-cfe127cd973bbf2d8609c8c59c7606df.yaml @@ -0,0 +1,58 @@ +id: float-menu-cfe127cd973bbf2d8609c8c59c7606df + +info: + name: > + Float Menu <= 4.3 - Arbitrary Menu Deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b15a2ddb-ed74-4ac3-8cfb-e8553dad90d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/float-menu/" + google-query: inurl:"/wp-content/plugins/float-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,float-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/float-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "float-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/float-to-top-button-402db9fc1f91d6a610e9186418e3f339.yaml b/nuclei-templates/cve-less/plugins/float-to-top-button-402db9fc1f91d6a610e9186418e3f339.yaml new file mode 100644 index 0000000000..081cd52a4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/float-to-top-button-402db9fc1f91d6a610e9186418e3f339.yaml @@ -0,0 +1,58 @@ +id: float-to-top-button-402db9fc1f91d6a610e9186418e3f339 + +info: + name: > + Float to Top Button <= 2.3.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70fee28f-7a2b-4d57-9fca-04a805dca3f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/float-to-top-button/" + google-query: inurl:"/wp-content/plugins/float-to-top-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,float-to-top-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/float-to-top-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "float-to-top-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/float-to-top-button-974e55fea877636d350ce5211a9f2278.yaml b/nuclei-templates/cve-less/plugins/float-to-top-button-974e55fea877636d350ce5211a9f2278.yaml new file mode 100644 index 0000000000..561e577aaa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/float-to-top-button-974e55fea877636d350ce5211a9f2278.yaml @@ -0,0 +1,58 @@ +id: float-to-top-button-974e55fea877636d350ce5211a9f2278 + +info: + name: > + Float to Top Button <= 2.3.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c80cbad-39ea-4f75-a025-6b9667560845?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/float-to-top-button/" + google-query: inurl:"/wp-content/plugins/float-to-top-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,float-to-top-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/float-to-top-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "float-to-top-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-action-button-54e58fd9cb8b4f0c4759deb7ef963895.yaml b/nuclei-templates/cve-less/plugins/floating-action-button-54e58fd9cb8b4f0c4759deb7ef963895.yaml new file mode 100644 index 0000000000..61dc524a63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-action-button-54e58fd9cb8b4f0c4759deb7ef963895.yaml @@ -0,0 +1,58 @@ +id: floating-action-button-54e58fd9cb8b4f0c4759deb7ef963895 + +info: + name: > + Floating Action Button <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42b2d840-4e8b-4027-ab3b-78b17c9ed9aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-action-button/" + google-query: inurl:"/wp-content/plugins/floating-action-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-action-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-action-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-action-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-action-button-9d446cc2ded70f849208be8a7ce22b70.yaml b/nuclei-templates/cve-less/plugins/floating-action-button-9d446cc2ded70f849208be8a7ce22b70.yaml new file mode 100644 index 0000000000..39baa55b97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-action-button-9d446cc2ded70f849208be8a7ce22b70.yaml @@ -0,0 +1,58 @@ +id: floating-action-button-9d446cc2ded70f849208be8a7ce22b70 + +info: + name: > + Floating Action Button <= <=1.2.1 - Cross-Site Request Forgery to Settings Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14bf654e-c4f1-4267-811e-6d796c14834a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-action-button/" + google-query: inurl:"/wp-content/plugins/floating-action-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-action-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-action-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-action-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-action-button-b9b78bba7eb30618f125288c162ade39.yaml b/nuclei-templates/cve-less/plugins/floating-action-button-b9b78bba7eb30618f125288c162ade39.yaml new file mode 100644 index 0000000000..800244ea9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-action-button-b9b78bba7eb30618f125288c162ade39.yaml @@ -0,0 +1,58 @@ +id: floating-action-button-b9b78bba7eb30618f125288c162ade39 + +info: + name: > + Floating Action Button <= 1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74841c33-83fa-465e-a5a9-88c34bbc9f6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-action-button/" + google-query: inurl:"/wp-content/plugins/floating-action-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-action-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-action-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-action-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-button-ef334e622eec391697c0d5a0070dc0e8.yaml b/nuclei-templates/cve-less/plugins/floating-button-ef334e622eec391697c0d5a0070dc0e8.yaml new file mode 100644 index 0000000000..49b7a7cabe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-button-ef334e622eec391697c0d5a0070dc0e8.yaml @@ -0,0 +1,58 @@ +id: floating-button-ef334e622eec391697c0d5a0070dc0e8 + +info: + name: > + Floating Button <= 6.0 - Cross-Site Request Forgery via process_bulk_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20151f80-c25f-482e-a2b0-34607dba9d1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-button/" + google-query: inurl:"/wp-content/plugins/floating-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/floating-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..ac1f2644bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: floating-cart-xforwc-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-cart-xforwc/" + google-query: inurl:"/wp-content/plugins/floating-cart-xforwc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-cart-xforwc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-cart-xforwc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-cart-xforwc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-div-f7eaf9b938a6df4b39be6616b2432caf.yaml b/nuclei-templates/cve-less/plugins/floating-div-f7eaf9b938a6df4b39be6616b2432caf.yaml new file mode 100644 index 0000000000..e3a16edad1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-div-f7eaf9b938a6df4b39be6616b2432caf.yaml @@ -0,0 +1,58 @@ +id: floating-div-f7eaf9b938a6df4b39be6616b2432caf + +info: + name: > + Floating Div <= 3.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa63a325-9e0e-4ce2-996d-37a0637b0471?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-div/" + google-query: inurl:"/wp-content/plugins/floating-div/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-div,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-div/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-div" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/floating-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e0391c99ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: floating-links-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-links/" + google-query: inurl:"/wp-content/plugins/floating-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-social-bar-6a69a2fa108e4cf956a3388af5834004.yaml b/nuclei-templates/cve-less/plugins/floating-social-bar-6a69a2fa108e4cf956a3388af5834004.yaml new file mode 100644 index 0000000000..0f9c0d5292 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-social-bar-6a69a2fa108e4cf956a3388af5834004.yaml @@ -0,0 +1,58 @@ +id: floating-social-bar-6a69a2fa108e4cf956a3388af5834004 + +info: + name: > + Floating Social Bar <= 1.1.6 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d1e9de3-da94-4f90-b72a-b38d5d131246?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-social-bar/" + google-query: inurl:"/wp-content/plugins/floating-social-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-social-bar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-social-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-social-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-social-bar-6f67eba72e7035f4406a73d70218218a.yaml b/nuclei-templates/cve-less/plugins/floating-social-bar-6f67eba72e7035f4406a73d70218218a.yaml new file mode 100644 index 0000000000..0999e7924f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-social-bar-6f67eba72e7035f4406a73d70218218a.yaml @@ -0,0 +1,58 @@ +id: floating-social-bar-6f67eba72e7035f4406a73d70218218a + +info: + name: > + Floating Social Bar < 1.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd1a98d4-bf67-4678-b30b-ca13e63c665a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-social-bar/" + google-query: inurl:"/wp-content/plugins/floating-social-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-social-bar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-social-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-social-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-social-media-icon-3b1c84fb06bbfd928bb6bd8a2dc656bc.yaml b/nuclei-templates/cve-less/plugins/floating-social-media-icon-3b1c84fb06bbfd928bb6bd8a2dc656bc.yaml new file mode 100644 index 0000000000..544190f38e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-social-media-icon-3b1c84fb06bbfd928bb6bd8a2dc656bc.yaml @@ -0,0 +1,58 @@ +id: floating-social-media-icon-3b1c84fb06bbfd928bb6bd8a2dc656bc + +info: + name: > + Social Media Flying Icons | Floating Social Media Icon <= 4.3.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e86ab1ea-5b3c-4a14-9de1-3bae14f587c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-social-media-icon/" + google-query: inurl:"/wp-content/plugins/floating-social-media-icon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-social-media-icon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-social-media-icon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-social-media-icon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-social-media-links-19cad25687c6e57a8844f7bbbe3532db.yaml b/nuclei-templates/cve-less/plugins/floating-social-media-links-19cad25687c6e57a8844f7bbbe3532db.yaml new file mode 100644 index 0000000000..b743cc6adb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-social-media-links-19cad25687c6e57a8844f7bbbe3532db.yaml @@ -0,0 +1,58 @@ +id: floating-social-media-links-19cad25687c6e57a8844f7bbbe3532db + +info: + name: > + Floating Social Media Links < 1.4.3 - Remote File Inclusion via fsml-admin.js.php wpp parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecd35d5a-5270-4132-bc62-d75da5141313?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-social-media-links/" + google-query: inurl:"/wp-content/plugins/floating-social-media-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-social-media-links,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-social-media-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-social-media-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-social-media-links-fabad8f9edf3a10c2fd048960f486a0d.yaml b/nuclei-templates/cve-less/plugins/floating-social-media-links-fabad8f9edf3a10c2fd048960f486a0d.yaml new file mode 100644 index 0000000000..2fe1f839da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-social-media-links-fabad8f9edf3a10c2fd048960f486a0d.yaml @@ -0,0 +1,58 @@ +id: floating-social-media-links-fabad8f9edf3a10c2fd048960f486a0d + +info: + name: > + Floating Social Media Links < 1.4.3 - Remote File Inclusion via fsml-hideshow.js.php wpp parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43d1f708-58bd-4d42-b8dd-0c1247546577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-social-media-links/" + google-query: inurl:"/wp-content/plugins/floating-social-media-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-social-media-links,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-social-media-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-social-media-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-tweets-0d30322e95e68bf61a096904e3379311.yaml b/nuclei-templates/cve-less/plugins/floating-tweets-0d30322e95e68bf61a096904e3379311.yaml new file mode 100644 index 0000000000..2becb89421 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-tweets-0d30322e95e68bf61a096904e3379311.yaml @@ -0,0 +1,58 @@ +id: floating-tweets-0d30322e95e68bf61a096904e3379311 + +info: + name: > + Floating Tweets <= 1.0.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/502cf45c-1350-4534-a806-6e248912ef6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-tweets/" + google-query: inurl:"/wp-content/plugins/floating-tweets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-tweets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-tweets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-tweets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/floating-tweets-1e72c31c8795449e9c06e927fb97a2d9.yaml b/nuclei-templates/cve-less/plugins/floating-tweets-1e72c31c8795449e9c06e927fb97a2d9.yaml new file mode 100644 index 0000000000..07e2139832 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/floating-tweets-1e72c31c8795449e9c06e927fb97a2d9.yaml @@ -0,0 +1,58 @@ +id: floating-tweets-1e72c31c8795449e9c06e927fb97a2d9 + +info: + name: > + Floating Tweets <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db6995d1-8060-40cb-9e35-2baea4e39072?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/floating-tweets/" + google-query: inurl:"/wp-content/plugins/floating-tweets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,floating-tweets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/floating-tweets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "floating-tweets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flog-59446fd68b7784d882498e25f909137d.yaml b/nuclei-templates/cve-less/plugins/flog-59446fd68b7784d882498e25f909137d.yaml new file mode 100644 index 0000000000..1855493ec9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flog-59446fd68b7784d882498e25f909137d.yaml @@ -0,0 +1,58 @@ +id: flog-59446fd68b7784d882498e25f909137d + +info: + name: > + Flog <= 0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be16c229-1092-4090-83bc-38e42f6377b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flog/" + google-query: inurl:"/wp-content/plugins/flog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flow-flow-social-streams-765a9fd486d65b41296bb2e40f26d4d3.yaml b/nuclei-templates/cve-less/plugins/flow-flow-social-streams-765a9fd486d65b41296bb2e40f26d4d3.yaml new file mode 100644 index 0000000000..58c08d3a63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flow-flow-social-streams-765a9fd486d65b41296bb2e40f26d4d3.yaml @@ -0,0 +1,58 @@ +id: flow-flow-social-streams-765a9fd486d65b41296bb2e40f26d4d3 + +info: + name: > + Flow-Flow Social Feed Stream <= 3.0.71 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74a33813-ca5a-4cf4-9d36-b71ca76b8915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flow-flow-social-streams/" + google-query: inurl:"/wp-content/plugins/flow-flow-social-streams/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flow-flow-social-streams,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flow-flow-social-streams/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flow-flow-social-streams" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flower-delivery-by-florist-one-4d590f8cfc3cb04affd33a6ac18e5217.yaml b/nuclei-templates/cve-less/plugins/flower-delivery-by-florist-one-4d590f8cfc3cb04affd33a6ac18e5217.yaml new file mode 100644 index 0000000000..7862f80166 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flower-delivery-by-florist-one-4d590f8cfc3cb04affd33a6ac18e5217.yaml @@ -0,0 +1,58 @@ +id: flower-delivery-by-florist-one-4d590f8cfc3cb04affd33a6ac18e5217 + +info: + name: > + Flower Delivery by Florist One <= 3.5.8 - (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0ba19a2-0a30-4346-88a2-d1166ab13388?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flower-delivery-by-florist-one/" + google-query: inurl:"/wp-content/plugins/flower-delivery-by-florist-one/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flower-delivery-by-florist-one,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flower-delivery-by-florist-one/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flower-delivery-by-florist-one" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flowfact-wp-connector-a645bae2135580862fc251332e7ccf27.yaml b/nuclei-templates/cve-less/plugins/flowfact-wp-connector-a645bae2135580862fc251332e7ccf27.yaml new file mode 100644 index 0000000000..49a4b5cd37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flowfact-wp-connector-a645bae2135580862fc251332e7ccf27.yaml @@ -0,0 +1,58 @@ +id: flowfact-wp-connector-a645bae2135580862fc251332e7ccf27 + +info: + name: > + FLOWFACT WP Connector <= 2.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4b61b5b-e5e8-41d4-bf37-d9427a204ea6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flowfact-wp-connector/" + google-query: inurl:"/wp-content/plugins/flowfact-wp-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flowfact-wp-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flowfact-wp-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flowfact-wp-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flowpaper-lite-pdf-flipbook-652d56be5b505867587dc16b9cc45713.yaml b/nuclei-templates/cve-less/plugins/flowpaper-lite-pdf-flipbook-652d56be5b505867587dc16b9cc45713.yaml new file mode 100644 index 0000000000..398110a4fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flowpaper-lite-pdf-flipbook-652d56be5b505867587dc16b9cc45713.yaml @@ -0,0 +1,58 @@ +id: flowpaper-lite-pdf-flipbook-652d56be5b505867587dc16b9cc45713 + +info: + name: > + flowpaper <= 1.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e59b75cf-491a-4894-8a4a-567832b47048?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flowpaper-lite-pdf-flipbook/" + google-query: inurl:"/wp-content/plugins/flowpaper-lite-pdf-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flowpaper-lite-pdf-flipbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flowpaper-lite-pdf-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flowpaper-lite-pdf-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flowpaper-lite-pdf-flipbook-d7435fb5e236cc613a20b63eff30b011.yaml b/nuclei-templates/cve-less/plugins/flowpaper-lite-pdf-flipbook-d7435fb5e236cc613a20b63eff30b011.yaml new file mode 100644 index 0000000000..e8da1091e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flowpaper-lite-pdf-flipbook-d7435fb5e236cc613a20b63eff30b011.yaml @@ -0,0 +1,58 @@ +id: flowpaper-lite-pdf-flipbook-d7435fb5e236cc613a20b63eff30b011 + +info: + name: > + flowpaper <= 2.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31d6288d-87f0-4822-b3f4-541f70cf99fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flowpaper-lite-pdf-flipbook/" + google-query: inurl:"/wp-content/plugins/flowpaper-lite-pdf-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flowpaper-lite-pdf-flipbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flowpaper-lite-pdf-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flowpaper-lite-pdf-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flowplayer6-video-player-91cbfc58418f178a67da5f57d5fe8aa8.yaml b/nuclei-templates/cve-less/plugins/flowplayer6-video-player-91cbfc58418f178a67da5f57d5fe8aa8.yaml new file mode 100644 index 0000000000..a6d327759a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flowplayer6-video-player-91cbfc58418f178a67da5f57d5fe8aa8.yaml @@ -0,0 +1,58 @@ +id: flowplayer6-video-player-91cbfc58418f178a67da5f57d5fe8aa8 + +info: + name: > + Flowerplayer Video Player <= 1.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21d0af22-ecce-4533-ba5d-46d6f49fff52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flowplayer6-video-player/" + google-query: inurl:"/wp-content/plugins/flowplayer6-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flowplayer6-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flowplayer6-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flowplayer6-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluent-crm-2021aef7227818f1c21db36c31bdbd79.yaml b/nuclei-templates/cve-less/plugins/fluent-crm-2021aef7227818f1c21db36c31bdbd79.yaml new file mode 100644 index 0000000000..a95b037afa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluent-crm-2021aef7227818f1c21db36c31bdbd79.yaml @@ -0,0 +1,58 @@ +id: fluent-crm-2021aef7227818f1c21db36c31bdbd79 + +info: + name: > + Fluent CRM <= 2.8.44 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35b1853f-0c19-4fc8-8878-9e8a9330f76a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluent-crm/" + google-query: inurl:"/wp-content/plugins/fluent-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluent-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluent-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluent-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluent-crm-bb26b6ff3e85d19e956ebfa35e2cc95c.yaml b/nuclei-templates/cve-less/plugins/fluent-crm-bb26b6ff3e85d19e956ebfa35e2cc95c.yaml new file mode 100644 index 0000000000..d82fb0f9e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluent-crm-bb26b6ff3e85d19e956ebfa35e2cc95c.yaml @@ -0,0 +1,58 @@ +id: fluent-crm-bb26b6ff3e85d19e956ebfa35e2cc95c + +info: + name: > + FluentCRM - Marketing Automation For WordPress <= 2.8.01 - Insufficient Use of Hash as Authorization Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de6da87e-8f7d-4120-8a1b-390ef7733d84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluent-crm/" + google-query: inurl:"/wp-content/plugins/fluent-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluent-crm,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluent-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluent-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluent-security-09c9894def0e25d05735b59cb11535d0.yaml b/nuclei-templates/cve-less/plugins/fluent-security-09c9894def0e25d05735b59cb11535d0.yaml new file mode 100644 index 0000000000..e55a8dddac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluent-security-09c9894def0e25d05735b59cb11535d0.yaml @@ -0,0 +1,58 @@ +id: fluent-security-09c9894def0e25d05735b59cb11535d0 + +info: + name: > + FluentAuth <= 1.0.1 - IP Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b4f563c-a17b-4d69-9e94-7287da976e85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluent-security/" + google-query: inurl:"/wp-content/plugins/fluent-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluent-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluent-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluent-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluent-smtp-a0c235af0e0f30fc06e113ce304c9fbb.yaml b/nuclei-templates/cve-less/plugins/fluent-smtp-a0c235af0e0f30fc06e113ce304c9fbb.yaml new file mode 100644 index 0000000000..abad356d62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluent-smtp-a0c235af0e0f30fc06e113ce304c9fbb.yaml @@ -0,0 +1,58 @@ +id: fluent-smtp-a0c235af0e0f30fc06e113ce304c9fbb + +info: + name: > + FluentSMTP <= 2.2.4 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa47a794-e5ce-491d-a10b-c7c5718aa853?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluent-smtp/" + google-query: inurl:"/wp-content/plugins/fluent-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluent-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluent-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluent-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluent-smtp-b77eedd011caf310b24c6086fb4f9f02.yaml b/nuclei-templates/cve-less/plugins/fluent-smtp-b77eedd011caf310b24c6086fb4f9f02.yaml new file mode 100644 index 0000000000..48232b3084 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluent-smtp-b77eedd011caf310b24c6086fb4f9f02.yaml @@ -0,0 +1,58 @@ +id: fluent-smtp-b77eedd011caf310b24c6086fb4f9f02 + +info: + name: > + FluentSMTP <= 2.2.2 - Authenticated (Author+) Stored Cross-Site Scripting via Email Logs + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/803c32e9-665c-40a0-b52d-f2c0b8fbe931?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluent-smtp/" + google-query: inurl:"/wp-content/plugins/fluent-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluent-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluent-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluent-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluent-smtp-e7db547069bdcddc296155dd435cd330.yaml b/nuclei-templates/cve-less/plugins/fluent-smtp-e7db547069bdcddc296155dd435cd330.yaml new file mode 100644 index 0000000000..2e022a9aff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluent-smtp-e7db547069bdcddc296155dd435cd330.yaml @@ -0,0 +1,58 @@ +id: fluent-smtp-e7db547069bdcddc296155dd435cd330 + +info: + name: > + FluentSMTP <= 2.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b99248e9-b34f-4f99-9db1-a4dc2dd45b9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluent-smtp/" + google-query: inurl:"/wp-content/plugins/fluent-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluent-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluent-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluent-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluent-support-239bba6a118f3c2dcf8340e2790b882b.yaml b/nuclei-templates/cve-less/plugins/fluent-support-239bba6a118f3c2dcf8340e2790b882b.yaml new file mode 100644 index 0000000000..a61b2273e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluent-support-239bba6a118f3c2dcf8340e2790b882b.yaml @@ -0,0 +1,58 @@ +id: fluent-support-239bba6a118f3c2dcf8340e2790b882b + +info: + name: > + Fluent Support <= 1.7.6 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8909dafa-3383-405e-a264-f0770e6714a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluent-support/" + google-query: inurl:"/wp-content/plugins/fluent-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluent-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluent-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluent-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluent-support-da98de7f074ffd80f7cb587c569cdd12.yaml b/nuclei-templates/cve-less/plugins/fluent-support-da98de7f074ffd80f7cb587c569cdd12.yaml new file mode 100644 index 0000000000..ebe923f93e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluent-support-da98de7f074ffd80f7cb587c569cdd12.yaml @@ -0,0 +1,58 @@ +id: fluent-support-da98de7f074ffd80f7cb587c569cdd12 + +info: + name: > + Fluent Support <= 1.5.7 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcf54e27-e2d1-4d87-8eb6-2881054b70fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluent-support/" + google-query: inurl:"/wp-content/plugins/fluent-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluent-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluent-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluent-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluentform-31bfcad1a946ead477cc4d9cae0f33ff.yaml b/nuclei-templates/cve-less/plugins/fluentform-31bfcad1a946ead477cc4d9cae0f33ff.yaml new file mode 100644 index 0000000000..535abdc989 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluentform-31bfcad1a946ead477cc4d9cae0f33ff.yaml @@ -0,0 +1,58 @@ +id: fluentform-31bfcad1a946ead477cc4d9cae0f33ff + +info: + name: > + Fluent Forms <= 5.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4050403-6b8c-4023-b170-39f3cb68583e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluentform/" + google-query: inurl:"/wp-content/plugins/fluentform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluentform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluentform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluentform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluentform-4e36da2b6076ab0fa4395c3975079942.yaml b/nuclei-templates/cve-less/plugins/fluentform-4e36da2b6076ab0fa4395c3975079942.yaml new file mode 100644 index 0000000000..2e6a523a3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluentform-4e36da2b6076ab0fa4395c3975079942.yaml @@ -0,0 +1,58 @@ +id: fluentform-4e36da2b6076ab0fa4395c3975079942 + +info: + name: > + WP Fluent Forms < 3.6.67 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e039295-2ccf-450c-8f2a-d113117b9dce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluentform/" + google-query: inurl:"/wp-content/plugins/fluentform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluentform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluentform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluentform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluentform-7505baf43f2a97f13623d8a9e01f067a.yaml b/nuclei-templates/cve-less/plugins/fluentform-7505baf43f2a97f13623d8a9e01f067a.yaml new file mode 100644 index 0000000000..99c1653df8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluentform-7505baf43f2a97f13623d8a9e01f067a.yaml @@ -0,0 +1,58 @@ +id: fluentform-7505baf43f2a97f13623d8a9e01f067a + +info: + name: > + FluentForm <= 4.3.25 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/954e7509-3ebf-429a-8c65-9825ea190d53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluentform/" + google-query: inurl:"/wp-content/plugins/fluentform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluentform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluentform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluentform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluentform-768d5a8c5da389ebb9689ad662d253aa.yaml b/nuclei-templates/cve-less/plugins/fluentform-768d5a8c5da389ebb9689ad662d253aa.yaml new file mode 100644 index 0000000000..33cc81c873 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluentform-768d5a8c5da389ebb9689ad662d253aa.yaml @@ -0,0 +1,58 @@ +id: fluentform-768d5a8c5da389ebb9689ad662d253aa + +info: + name: > + Contact Form for Plugin by Fluent Forms <= 5.0.8 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20f31e48-0dbb-498a-a400-681cacea7c9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluentform/" + google-query: inurl:"/wp-content/plugins/fluentform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluentform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluentform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluentform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluentform-875a676a20644f9b257dd61453cbe7b9.yaml b/nuclei-templates/cve-less/plugins/fluentform-875a676a20644f9b257dd61453cbe7b9.yaml new file mode 100644 index 0000000000..bfefa970d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluentform-875a676a20644f9b257dd61453cbe7b9.yaml @@ -0,0 +1,58 @@ +id: fluentform-875a676a20644f9b257dd61453cbe7b9 + +info: + name: > + Fluent Forms <= 5.1.5 - Authenticated(Administrator+) Stored Cross-Site Scripting via imported form title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0348d465-f351-4c52-b293-8b3b058292b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluentform/" + google-query: inurl:"/wp-content/plugins/fluentform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluentform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluentform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluentform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluentform-a7309b89079395b33b2cb7915ba03d32.yaml b/nuclei-templates/cve-less/plugins/fluentform-a7309b89079395b33b2cb7915ba03d32.yaml new file mode 100644 index 0000000000..1296bf454d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluentform-a7309b89079395b33b2cb7915ba03d32.yaml @@ -0,0 +1,58 @@ +id: fluentform-a7309b89079395b33b2cb7915ba03d32 + +info: + name: > + FluentForms <= 4.3.24 - Authenticated(Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b79a851-1212-4a9c-89fe-b5f2d50ec18c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluentform/" + google-query: inurl:"/wp-content/plugins/fluentform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluentform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluentform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluentform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluentform-f587eb392e2056a4aa7f3a9cfdb47c3a.yaml b/nuclei-templates/cve-less/plugins/fluentform-f587eb392e2056a4aa7f3a9cfdb47c3a.yaml new file mode 100644 index 0000000000..06935d950c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluentform-f587eb392e2056a4aa7f3a9cfdb47c3a.yaml @@ -0,0 +1,58 @@ +id: fluentform-f587eb392e2056a4aa7f3a9cfdb47c3a + +info: + name: > + Contact Form Plugin by FluentForm <= 4.3.12 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e6a1af3-d53c-4e23-95d2-3b799bc10827?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluentform/" + google-query: inurl:"/wp-content/plugins/fluentform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluentform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluentform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluentform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluentforms-pdf-150204c3648be383cc7b37e155a5d6bc.yaml b/nuclei-templates/cve-less/plugins/fluentforms-pdf-150204c3648be383cc7b37e155a5d6bc.yaml new file mode 100644 index 0000000000..72db327d32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluentforms-pdf-150204c3648be383cc7b37e155a5d6bc.yaml @@ -0,0 +1,58 @@ +id: fluentforms-pdf-150204c3648be383cc7b37e155a5d6bc + +info: + name: > + PDF Generator For Fluent Forms <= 1.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6675c48-43d4-4394-a4a3-f753bdaa5c4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluentforms-pdf/" + google-query: inurl:"/wp-content/plugins/fluentforms-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluentforms-pdf,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluentforms-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluentforms-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluid-accessible-ui-options-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/fluid-accessible-ui-options-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..844182ffca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluid-accessible-ui-options-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: fluid-accessible-ui-options-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluid-accessible-ui-options/" + google-query: inurl:"/wp-content/plugins/fluid-accessible-ui-options/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluid-accessible-ui-options,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluid-accessible-ui-options/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluid-accessible-ui-options" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluid-checkout-b225e6cc75e518b2d58ee3c68b1bcc48.yaml b/nuclei-templates/cve-less/plugins/fluid-checkout-b225e6cc75e518b2d58ee3c68b1bcc48.yaml new file mode 100644 index 0000000000..4372a56a31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluid-checkout-b225e6cc75e518b2d58ee3c68b1bcc48.yaml @@ -0,0 +1,58 @@ +id: fluid-checkout-b225e6cc75e518b2d58ee3c68b1bcc48 + +info: + name: > + Fluid Checkout for WooCommerce – Lite <= 2.3.1 - Cross-Site Request Forgery via dismiss_notice + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c8caf17-7844-4f26-b989-d29593b3ffda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluid-checkout/" + google-query: inurl:"/wp-content/plugins/fluid-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluid-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluid-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluid-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-656ffc00f499b97cc92334beba62fc4e.yaml b/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-656ffc00f499b97cc92334beba62fc4e.yaml new file mode 100644 index 0000000000..11f6f3425b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-656ffc00f499b97cc92334beba62fc4e.yaml @@ -0,0 +1,58 @@ +id: fluid-responsive-slideshow-656ffc00f499b97cc92334beba62fc4e + +info: + name: > + Fluid Responsive Slideshow < 2.2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9d58fde-54f6-4892-b5ed-2029593c3fa4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluid-responsive-slideshow/" + google-query: inurl:"/wp-content/plugins/fluid-responsive-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluid-responsive-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluid-responsive-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluid-responsive-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-bd607ad7864f2c8f03d9043c5fbd64bb.yaml b/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-bd607ad7864f2c8f03d9043c5fbd64bb.yaml new file mode 100644 index 0000000000..ffe340e63e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-bd607ad7864f2c8f03d9043c5fbd64bb.yaml @@ -0,0 +1,58 @@ +id: fluid-responsive-slideshow-bd607ad7864f2c8f03d9043c5fbd64bb + +info: + name: > + Fluid Responsive Slideshow < 2.2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8009f10-85d0-4798-8b6b-c1e4452139af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluid-responsive-slideshow/" + google-query: inurl:"/wp-content/plugins/fluid-responsive-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluid-responsive-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluid-responsive-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluid-responsive-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-d0db0236c8bb93bbd9849f985e9c57df.yaml b/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-d0db0236c8bb93bbd9849f985e9c57df.yaml new file mode 100644 index 0000000000..7f51c325ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fluid-responsive-slideshow-d0db0236c8bb93bbd9849f985e9c57df.yaml @@ -0,0 +1,58 @@ +id: fluid-responsive-slideshow-d0db0236c8bb93bbd9849f985e9c57df + +info: + name: > + Fluid Responsive Slideshow < 2.2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc910c27-d83c-4f3d-b491-f3e169d8f25f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fluid-responsive-slideshow/" + google-query: inurl:"/wp-content/plugins/fluid-responsive-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fluid-responsive-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fluid-responsive-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fluid-responsive-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flv-embed-797a8ec8d14a7095c1401c88381f0455.yaml b/nuclei-templates/cve-less/plugins/flv-embed-797a8ec8d14a7095c1401c88381f0455.yaml new file mode 100644 index 0000000000..6ee6aa044d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flv-embed-797a8ec8d14a7095c1401c88381f0455.yaml @@ -0,0 +1,58 @@ +id: flv-embed-797a8ec8d14a7095c1401c88381f0455 + +info: + name: > + FLV Embed <= 1.2.1 - Cross-Site Request Forgery to Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c5a982-74ba-4a54-8c95-515a628f9c39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flv-embed/" + google-query: inurl:"/wp-content/plugins/flv-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flv-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flv-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flv-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flying-press-473a1cc0b0ec6c93a83a85cc6eeee218.yaml b/nuclei-templates/cve-less/plugins/flying-press-473a1cc0b0ec6c93a83a85cc6eeee218.yaml new file mode 100644 index 0000000000..7fad10671c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flying-press-473a1cc0b0ec6c93a83a85cc6eeee218.yaml @@ -0,0 +1,58 @@ +id: flying-press-473a1cc0b0ec6c93a83a85cc6eeee218 + +info: + name: > + FlyingPress <= 3.9.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d1d541b-7010-4dbf-9b1c-d59c84390065?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flying-press/" + google-query: inurl:"/wp-content/plugins/flying-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flying-press,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flying-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flying-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flynsarmy-iframe-shortcode-60b8d6d9997cb1264cf24cce0caa381a.yaml b/nuclei-templates/cve-less/plugins/flynsarmy-iframe-shortcode-60b8d6d9997cb1264cf24cce0caa381a.yaml new file mode 100644 index 0000000000..c36e27be9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flynsarmy-iframe-shortcode-60b8d6d9997cb1264cf24cce0caa381a.yaml @@ -0,0 +1,58 @@ +id: flynsarmy-iframe-shortcode-60b8d6d9997cb1264cf24cce0caa381a + +info: + name: > + IFrame Shortcode <= 1.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f28b1b2-e751-423e-b4c5-893778eebf3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flynsarmy-iframe-shortcode/" + google-query: inurl:"/wp-content/plugins/flynsarmy-iframe-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flynsarmy-iframe-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flynsarmy-iframe-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flynsarmy-iframe-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/flyzoo-b142fb65f777c01f09af0b6a529becd3.yaml b/nuclei-templates/cve-less/plugins/flyzoo-b142fb65f777c01f09af0b6a529becd3.yaml new file mode 100644 index 0000000000..760d1a5909 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/flyzoo-b142fb65f777c01f09af0b6a529becd3.yaml @@ -0,0 +1,58 @@ +id: flyzoo-b142fb65f777c01f09af0b6a529becd3 + +info: + name: > + Flyzoo Chat <= 2.3.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74ea8f1e-d6ff-4a32-b8bf-5d4c8e69433e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/flyzoo/" + google-query: inurl:"/wp-content/plugins/flyzoo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,flyzoo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/flyzoo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flyzoo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fma-additional-registration-attributes-f0a4fb1ab5ad45a43505bfb864975940.yaml b/nuclei-templates/cve-less/plugins/fma-additional-registration-attributes-f0a4fb1ab5ad45a43505bfb864975940.yaml new file mode 100644 index 0000000000..57e2096dbc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fma-additional-registration-attributes-f0a4fb1ab5ad45a43505bfb864975940.yaml @@ -0,0 +1,58 @@ +id: fma-additional-registration-attributes-f0a4fb1ab5ad45a43505bfb864975940 + +info: + name: > + WooCommerce Custom Registration Form <= 1.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8459c436-0c4d-40e6-a30d-94b8ac50df83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fma-additional-registration-attributes/" + google-query: inurl:"/wp-content/plugins/fma-additional-registration-attributes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fma-additional-registration-attributes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fma-additional-registration-attributes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fma-additional-registration-attributes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fma-products-tabs-pro-c2b59c8389d71cf87b7fb1296201832f.yaml b/nuclei-templates/cve-less/plugins/fma-products-tabs-pro-c2b59c8389d71cf87b7fb1296201832f.yaml new file mode 100644 index 0000000000..a3299772c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fma-products-tabs-pro-c2b59c8389d71cf87b7fb1296201832f.yaml @@ -0,0 +1,58 @@ +id: fma-products-tabs-pro-c2b59c8389d71cf87b7fb1296201832f + +info: + name: > + Woocommerce Tabs Plugin, Add Custom Product Tabs <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00f5812d-661e-4206-8c3d-127bc3d48961?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fma-products-tabs-pro/" + google-query: inurl:"/wp-content/plugins/fma-products-tabs-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fma-products-tabs-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fma-products-tabs-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fma-products-tabs-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fmoblog-572454d38450937113117ff602a4e326.yaml b/nuclei-templates/cve-less/plugins/fmoblog-572454d38450937113117ff602a4e326.yaml new file mode 100644 index 0000000000..2ccd300363 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fmoblog-572454d38450937113117ff602a4e326.yaml @@ -0,0 +1,58 @@ +id: fmoblog-572454d38450937113117ff602a4e326 + +info: + name: > + fMoblog <= 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/509c881d-22bc-473f-b57b-4ec3ddf6abaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fmoblog/" + google-query: inurl:"/wp-content/plugins/fmoblog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fmoblog,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fmoblog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fmoblog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/focus-on-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/focus-on-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c482d1dfb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/focus-on-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: focus-on-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/focus-on-reviews-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/focus-on-reviews-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,focus-on-reviews-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/focus-on-reviews-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "focus-on-reviews-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/folders-0a3b78fadad1468caa114f49c5837f3b.yaml b/nuclei-templates/cve-less/plugins/folders-0a3b78fadad1468caa114f49c5837f3b.yaml new file mode 100644 index 0000000000..6b1e4638ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/folders-0a3b78fadad1468caa114f49c5837f3b.yaml @@ -0,0 +1,58 @@ +id: folders-0a3b78fadad1468caa114f49c5837f3b + +info: + name: > + Folders Pro <= 3.0.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting via User First Name and Last Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/daa48b64-6f89-40be-a31f-31d1481dfc91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/folders/" + google-query: inurl:"/wp-content/plugins/folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/folders-346a08b5e01ce0a0fe29178ae41386f7.yaml b/nuclei-templates/cve-less/plugins/folders-346a08b5e01ce0a0fe29178ae41386f7.yaml new file mode 100644 index 0000000000..09c94ff671 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/folders-346a08b5e01ce0a0fe29178ae41386f7.yaml @@ -0,0 +1,58 @@ +id: folders-346a08b5e01ce0a0fe29178ae41386f7 + +info: + name: > + Folders <= 2.9.2 - Authenticated (Author+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35afef52-350c-4b61-b9c0-3ae2572f81fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/folders/" + google-query: inurl:"/wp-content/plugins/folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/folders-aa05d3117d6e609391e83e8b970f2625.yaml b/nuclei-templates/cve-less/plugins/folders-aa05d3117d6e609391e83e8b970f2625.yaml new file mode 100644 index 0000000000..02b63e2f39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/folders-aa05d3117d6e609391e83e8b970f2625.yaml @@ -0,0 +1,58 @@ +id: folders-aa05d3117d6e609391e83e8b970f2625 + +info: + name: > + Folders <= 2.9.2 - Authenticated (Author+) Arbitrary File Upload in handle_folders_file_upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ab28410-76c5-43cb-b87a-c99f8867167c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/folders/" + google-query: inurl:"/wp-content/plugins/folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foliopress-wysiwyg-6d24ca924659d60813d0c9beab91c29b.yaml b/nuclei-templates/cve-less/plugins/foliopress-wysiwyg-6d24ca924659d60813d0c9beab91c29b.yaml new file mode 100644 index 0000000000..6ccc59b210 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foliopress-wysiwyg-6d24ca924659d60813d0c9beab91c29b.yaml @@ -0,0 +1,58 @@ +id: foliopress-wysiwyg-6d24ca924659d60813d0c9beab91c29b + +info: + name: > + Foliopress WYSIWYG < 2.6.16 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b045cef-c17c-4e6e-ab84-c0466a5a90ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foliopress-wysiwyg/" + google-query: inurl:"/wp-content/plugins/foliopress-wysiwyg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foliopress-wysiwyg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foliopress-wysiwyg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foliopress-wysiwyg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foliopress-wysiwyg-93eb8e1633c7ed38fbc4ff339a075742.yaml b/nuclei-templates/cve-less/plugins/foliopress-wysiwyg-93eb8e1633c7ed38fbc4ff339a075742.yaml new file mode 100644 index 0000000000..8a678a6f78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foliopress-wysiwyg-93eb8e1633c7ed38fbc4ff339a075742.yaml @@ -0,0 +1,58 @@ +id: foliopress-wysiwyg-93eb8e1633c7ed38fbc4ff339a075742 + +info: + name: > + Foliopress WYSIWYG < 2.6.8.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3908a923-1174-4cb4-a1e3-51b9d098dc29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foliopress-wysiwyg/" + google-query: inurl:"/wp-content/plugins/foliopress-wysiwyg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foliopress-wysiwyg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foliopress-wysiwyg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foliopress-wysiwyg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/follow-me-de62fa1091876ce7733352db2cec2f12.yaml b/nuclei-templates/cve-less/plugins/follow-me-de62fa1091876ce7733352db2cec2f12.yaml new file mode 100644 index 0000000000..84be8ea283 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/follow-me-de62fa1091876ce7733352db2cec2f12.yaml @@ -0,0 +1,58 @@ +id: follow-me-de62fa1091876ce7733352db2cec2f12 + +info: + name: > + Follow Me Plugin <= 3.1.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25fab7b3-59ce-44ca-83fa-bd25b7f31af0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/follow-me/" + google-query: inurl:"/wp-content/plugins/follow-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,follow-me,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/follow-me/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "follow-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-awesome-4-menus-335b776cd554e8913d4f10e98e262ec0.yaml b/nuclei-templates/cve-less/plugins/font-awesome-4-menus-335b776cd554e8913d4f10e98e262ec0.yaml new file mode 100644 index 0000000000..c45e1c5b49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-awesome-4-menus-335b776cd554e8913d4f10e98e262ec0.yaml @@ -0,0 +1,58 @@ +id: font-awesome-4-menus-335b776cd554e8913d4f10e98e262ec0 + +info: + name: > + Font Awesome 4 Menus <= 4.7.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f13a1c9-db26-4243-b8ee-f25eac51afa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-awesome-4-menus/" + google-query: inurl:"/wp-content/plugins/font-awesome-4-menus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-awesome-4-menus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-awesome-4-menus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-awesome-4-menus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-awesome-4-menus-bb75a2fa99f691c300cd6cf18948e14d.yaml b/nuclei-templates/cve-less/plugins/font-awesome-4-menus-bb75a2fa99f691c300cd6cf18948e14d.yaml new file mode 100644 index 0000000000..aea0e24b38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-awesome-4-menus-bb75a2fa99f691c300cd6cf18948e14d.yaml @@ -0,0 +1,58 @@ +id: font-awesome-4-menus-bb75a2fa99f691c300cd6cf18948e14d + +info: + name: > + Font Awesome 4 Menus <= 4.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc59510c-6eaf-4526-8acb-c07e39923ad9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-awesome-4-menus/" + google-query: inurl:"/wp-content/plugins/font-awesome-4-menus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-awesome-4-menus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-awesome-4-menus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-awesome-4-menus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-awesome-7115ada113c9b929bcb0dd07d0bf9d4f.yaml b/nuclei-templates/cve-less/plugins/font-awesome-7115ada113c9b929bcb0dd07d0bf9d4f.yaml new file mode 100644 index 0000000000..8c166f7371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-awesome-7115ada113c9b929bcb0dd07d0bf9d4f.yaml @@ -0,0 +1,58 @@ +id: font-awesome-7115ada113c9b929bcb0dd07d0bf9d4f + +info: + name: > + Font Awesome <= 4.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36759c8a-351b-448c-a79e-05465e99b4c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-awesome/" + google-query: inurl:"/wp-content/plugins/font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-awesome-84fec46332999a5ca815e7af241174bf.yaml b/nuclei-templates/cve-less/plugins/font-awesome-84fec46332999a5ca815e7af241174bf.yaml new file mode 100644 index 0000000000..d8b6b16e51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-awesome-84fec46332999a5ca815e7af241174bf.yaml @@ -0,0 +1,58 @@ +id: font-awesome-84fec46332999a5ca815e7af241174bf + +info: + name: > + Font Awesome 4.0.0-rc15 and 4.0.0-rc16 - API Token Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4783eff5-b7cf-4342-b762-85f745c38ec8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-awesome/" + google-query: inurl:"/wp-content/plugins/font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-awesome,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.0.0-rc16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-awesome-integration-238d49dd6e9480e47ebe9505e3055120.yaml b/nuclei-templates/cve-less/plugins/font-awesome-integration-238d49dd6e9480e47ebe9505e3055120.yaml new file mode 100644 index 0000000000..50f799f3fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-awesome-integration-238d49dd6e9480e47ebe9505e3055120.yaml @@ -0,0 +1,58 @@ +id: font-awesome-integration-238d49dd6e9480e47ebe9505e3055120 + +info: + name: > + Font Awesome Integration <= 5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2791f48-895f-4099-87ec-41aaac2494a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-awesome-integration/" + google-query: inurl:"/wp-content/plugins/font-awesome-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-awesome-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-awesome-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-awesome-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-awesome-more-icons-a57182d433f774a0b7467b555b805817.yaml b/nuclei-templates/cve-less/plugins/font-awesome-more-icons-a57182d433f774a0b7467b555b805817.yaml new file mode 100644 index 0000000000..4950956768 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-awesome-more-icons-a57182d433f774a0b7467b555b805817.yaml @@ -0,0 +1,58 @@ +id: font-awesome-more-icons-a57182d433f774a0b7467b555b805817 + +info: + name: > + Font Awesome More Icons <= 3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15947764-a070-4715-bd44-cb79b62ed59d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-awesome-more-icons/" + google-query: inurl:"/wp-content/plugins/font-awesome-more-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-awesome-more-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-awesome-more-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-awesome-more-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-d9e88eed1e0b07c2c560dc1223a88aca.yaml b/nuclei-templates/cve-less/plugins/font-d9e88eed1e0b07c2c560dc1223a88aca.yaml new file mode 100644 index 0000000000..01498e3a82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-d9e88eed1e0b07c2c560dc1223a88aca.yaml @@ -0,0 +1,58 @@ +id: font-d9e88eed1e0b07c2c560dc1223a88aca + +info: + name: > + Font <= 7.5 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba0de040-5906-4a67-9306-7e6e65cca78f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font/" + google-query: inurl:"/wp-content/plugins/font/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-farsi-bbb0e39e4c65975737c298f09a794bf6.yaml b/nuclei-templates/cve-less/plugins/font-farsi-bbb0e39e4c65975737c298f09a794bf6.yaml new file mode 100644 index 0000000000..d0b8c6e133 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-farsi-bbb0e39e4c65975737c298f09a794bf6.yaml @@ -0,0 +1,58 @@ +id: font-farsi-bbb0e39e4c65975737c298f09a794bf6 + +info: + name: > + Font Farsi <= 1.6.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec96107-ae41-4886-8a46-5a2d6dd62aae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-farsi/" + google-query: inurl:"/wp-content/plugins/font-farsi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-farsi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-farsi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-farsi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-organizer-92b1dcacf113aa7d72bfd995bd3a58b5.yaml b/nuclei-templates/cve-less/plugins/font-organizer-92b1dcacf113aa7d72bfd995bd3a58b5.yaml new file mode 100644 index 0000000000..2996c0ef45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-organizer-92b1dcacf113aa7d72bfd995bd3a58b5.yaml @@ -0,0 +1,58 @@ +id: font-organizer-92b1dcacf113aa7d72bfd995bd3a58b5 + +info: + name: > + Font Organizer <= 2.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3447c0ff-865c-4d94-9f33-a1824bf23794?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-organizer/" + google-query: inurl:"/wp-content/plugins/font-organizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-organizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-organizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-organizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/font-uploader-272e6d95680eac64b1944ce8c40ac5b7.yaml b/nuclei-templates/cve-less/plugins/font-uploader-272e6d95680eac64b1944ce8c40ac5b7.yaml new file mode 100644 index 0000000000..3287e1cdd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/font-uploader-272e6d95680eac64b1944ce8c40ac5b7.yaml @@ -0,0 +1,58 @@ +id: font-uploader-272e6d95680eac64b1944ce8c40ac5b7 + +info: + name: > + Font Uploader <= 1.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1069434a-b8cb-4e29-995d-f31b18d1843f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/font-uploader/" + google-query: inurl:"/wp-content/plugins/font-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,font-uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/font-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "font-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fontific-7524f5b14f92599cfeabd0dc20123b14.yaml b/nuclei-templates/cve-less/plugins/fontific-7524f5b14f92599cfeabd0dc20123b14.yaml new file mode 100644 index 0000000000..e91fe0f64a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fontific-7524f5b14f92599cfeabd0dc20123b14.yaml @@ -0,0 +1,58 @@ +id: fontific-7524f5b14f92599cfeabd0dc20123b14 + +info: + name: > + Fontific | Google Fonts <= 0.1.6 - Cross-Site Request Forgery via ajax_fontific_save_all + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/177a2bda-6c40-4ff6-a53f-e6b2a8408d8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fontific/" + google-query: inurl:"/wp-content/plugins/fontific/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fontific,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fontific/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fontific" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fontiran-64d4e8ad6ebfa8f809457010fe938c57.yaml b/nuclei-templates/cve-less/plugins/fontiran-64d4e8ad6ebfa8f809457010fe938c57.yaml new file mode 100644 index 0000000000..8849d34800 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fontiran-64d4e8ad6ebfa8f809457010fe938c57.yaml @@ -0,0 +1,58 @@ +id: fontiran-64d4e8ad6ebfa8f809457010fe938c57 + +info: + name: > + Fontiran <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/701bf711-d692-4eb1-8459-befa62264b97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fontiran/" + google-query: inurl:"/wp-content/plugins/fontiran/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fontiran,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fontiran/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fontiran" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fontiran-aeb0a88f1527e615e946ee4307c56d67.yaml b/nuclei-templates/cve-less/plugins/fontiran-aeb0a88f1527e615e946ee4307c56d67.yaml new file mode 100644 index 0000000000..04aa3194db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fontiran-aeb0a88f1527e615e946ee4307c56d67.yaml @@ -0,0 +1,58 @@ +id: fontiran-aeb0a88f1527e615e946ee4307c56d67 + +info: + name: > + Fontiran <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c35bffb2-f805-48d6-938a-cb5142eac3b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fontiran/" + google-query: inurl:"/wp-content/plugins/fontiran/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fontiran,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fontiran/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fontiran" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fontiran-ed8d60dbc212a2488ceb5fdf43131cd0.yaml b/nuclei-templates/cve-less/plugins/fontiran-ed8d60dbc212a2488ceb5fdf43131cd0.yaml new file mode 100644 index 0000000000..67ddbdede2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fontiran-ed8d60dbc212a2488ceb5fdf43131cd0.yaml @@ -0,0 +1,58 @@ +id: fontiran-ed8d60dbc212a2488ceb5fdf43131cd0 + +info: + name: > + Fontiran <= 2.1 - Missing Authorization via fi_add_rule and fi_delete_webfont_php + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/518b005d-5a5d-4fec-bb3a-1657af354ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fontiran/" + google-query: inurl:"/wp-content/plugins/fontiran/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fontiran,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fontiran/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fontiran" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fontmeister-315cb3873f38dcb4432456cd1e63a724.yaml b/nuclei-templates/cve-less/plugins/fontmeister-315cb3873f38dcb4432456cd1e63a724.yaml new file mode 100644 index 0000000000..2f635a49e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fontmeister-315cb3873f38dcb4432456cd1e63a724.yaml @@ -0,0 +1,58 @@ +id: fontmeister-315cb3873f38dcb4432456cd1e63a724 + +info: + name: > + FontMeister <= 1.08 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bd5c774-2c5b-47d5-9eae-614f2a1b8529?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fontmeister/" + google-query: inurl:"/wp-content/plugins/fontmeister/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fontmeister,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fontmeister/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fontmeister" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.08') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fontsampler-a0f4536ea7bd1323c1b7b95c9e4b018e.yaml b/nuclei-templates/cve-less/plugins/fontsampler-a0f4536ea7bd1323c1b7b95c9e4b018e.yaml new file mode 100644 index 0000000000..da45bd4215 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fontsampler-a0f4536ea7bd1323c1b7b95c9e4b018e.yaml @@ -0,0 +1,58 @@ +id: fontsampler-a0f4536ea7bd1323c1b7b95c9e4b018e + +info: + name: > + Fontsampler <= 0.4.12 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca132d26-e927-41f1-be57-0c3bdeace2e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fontsampler/" + google-query: inurl:"/wp-content/plugins/fontsampler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fontsampler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fontsampler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fontsampler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fontsy-f11e331f492b99109760c26e69316ddd.yaml b/nuclei-templates/cve-less/plugins/fontsy-f11e331f492b99109760c26e69316ddd.yaml new file mode 100644 index 0000000000..c936654a60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fontsy-f11e331f492b99109760c26e69316ddd.yaml @@ -0,0 +1,58 @@ +id: fontsy-f11e331f492b99109760c26e69316ddd + +info: + name: > + Fontsy <= 1.8.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dabd12b9-c07d-4a5d-bec3-905b90ff0dbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fontsy/" + google-query: inurl:"/wp-content/plugins/fontsy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fontsy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fontsy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fontsy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foobar-notifications-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/foobar-notifications-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ecd5ebdff8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foobar-notifications-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: foobar-notifications-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foobar-notifications-lite/" + google-query: inurl:"/wp-content/plugins/foobar-notifications-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foobar-notifications-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foobar-notifications-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foobar-notifications-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foobox-image-lightbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/foobox-image-lightbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8b7c2e627a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foobox-image-lightbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: foobox-image-lightbox-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foobox-image-lightbox/" + google-query: inurl:"/wp-content/plugins/foobox-image-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foobox-image-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foobox-image-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foobox-image-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foobox-image-lightbox-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/foobox-image-lightbox-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..7f5d217073 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foobox-image-lightbox-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: foobox-image-lightbox-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foobox-image-lightbox/" + google-query: inurl:"/wp-content/plugins/foobox-image-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foobox-image-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foobox-image-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foobox-image-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/food-and-drink-menu-414dd30601a3a8e396da28322c360c9c.yaml b/nuclei-templates/cve-less/plugins/food-and-drink-menu-414dd30601a3a8e396da28322c360c9c.yaml new file mode 100644 index 0000000000..615e0ceb75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/food-and-drink-menu-414dd30601a3a8e396da28322c360c9c.yaml @@ -0,0 +1,58 @@ +id: food-and-drink-menu-414dd30601a3a8e396da28322c360c9c + +info: + name: > + Five Star Restaurant Menu <= 2.4.14 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1769ed5-5f56-4b70-af36-c60119f0a356?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/food-and-drink-menu/" + google-query: inurl:"/wp-content/plugins/food-and-drink-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,food-and-drink-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/food-and-drink-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "food-and-drink-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/food-and-drink-menu-428e92a2be0374fb9f50d3efefc780e0.yaml b/nuclei-templates/cve-less/plugins/food-and-drink-menu-428e92a2be0374fb9f50d3efefc780e0.yaml new file mode 100644 index 0000000000..8e7838aaf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/food-and-drink-menu-428e92a2be0374fb9f50d3efefc780e0.yaml @@ -0,0 +1,58 @@ +id: food-and-drink-menu-428e92a2be0374fb9f50d3efefc780e0 + +info: + name: > + Five Star Restaurant Menu and Food Ordering <= 2.4.10 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1cd5209-7959-49ae-a363-5fb4f06e2aec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/food-and-drink-menu/" + google-query: inurl:"/wp-content/plugins/food-and-drink-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,food-and-drink-menu,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/food-and-drink-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "food-and-drink-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/food-and-drink-menu-58e8eb6b48043724a61dbfbade728e2c.yaml b/nuclei-templates/cve-less/plugins/food-and-drink-menu-58e8eb6b48043724a61dbfbade728e2c.yaml new file mode 100644 index 0000000000..3f02596aad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/food-and-drink-menu-58e8eb6b48043724a61dbfbade728e2c.yaml @@ -0,0 +1,58 @@ +id: food-and-drink-menu-58e8eb6b48043724a61dbfbade728e2c + +info: + name: > + Restaurant Menu and Food Ordering by Five Star Plugins <= 2.4.6 - Cross-Site Request Forgery via maybe_duplicate_item + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/044c34da-ee4e-4c18-bf9e-96a49a5ea7d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/food-and-drink-menu/" + google-query: inurl:"/wp-content/plugins/food-and-drink-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,food-and-drink-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/food-and-drink-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "food-and-drink-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/food-and-drink-menu-7a6e12751a5fafd18d6d56977b5ab766.yaml b/nuclei-templates/cve-less/plugins/food-and-drink-menu-7a6e12751a5fafd18d6d56977b5ab766.yaml new file mode 100644 index 0000000000..b0f96ba36b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/food-and-drink-menu-7a6e12751a5fafd18d6d56977b5ab766.yaml @@ -0,0 +1,58 @@ +id: food-and-drink-menu-7a6e12751a5fafd18d6d56977b5ab766 + +info: + name: > + Five Star Restaurant Menu <= 2.2.0 - Unauthenticated Arbitrary Object Deserialization leading to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b110a6c-fd6d-4c00-bdd6-08fce116b937?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/food-and-drink-menu/" + google-query: inurl:"/wp-content/plugins/food-and-drink-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,food-and-drink-menu,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/food-and-drink-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "food-and-drink-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/food-store-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/food-store-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..18dd71822d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/food-store-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: food-store-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/food-store/" + google-query: inurl:"/wp-content/plugins/food-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,food-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/food-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "food-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/food-store-bb49a04965cd07c7ab0e642d989a68a5.yaml b/nuclei-templates/cve-less/plugins/food-store-bb49a04965cd07c7ab0e642d989a68a5.yaml new file mode 100644 index 0000000000..89a2c7c3f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/food-store-bb49a04965cd07c7ab0e642d989a68a5.yaml @@ -0,0 +1,58 @@ +id: food-store-bb49a04965cd07c7ab0e642d989a68a5 + +info: + name: > + Food Store < 1.3.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f2d149b-fe63-4fa3-b840-02dc8c5f9323?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/food-store/" + google-query: inurl:"/wp-content/plugins/food-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,food-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/food-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "food-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-21a95839a8ab979ff0016f6fbedc5a1e.yaml b/nuclei-templates/cve-less/plugins/foogallery-21a95839a8ab979ff0016f6fbedc5a1e.yaml new file mode 100644 index 0000000000..2104f86903 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-21a95839a8ab979ff0016f6fbedc5a1e.yaml @@ -0,0 +1,58 @@ +id: foogallery-21a95839a8ab979ff0016f6fbedc5a1e + +info: + name: > + FooGallery <= 2.2.35 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7181056-d2ee-4c0f-b9a8-fdb7ad042a6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-2c9cfaa1b4268406a1d78df84c0cb895.yaml b/nuclei-templates/cve-less/plugins/foogallery-2c9cfaa1b4268406a1d78df84c0cb895.yaml new file mode 100644 index 0000000000..e132324929 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-2c9cfaa1b4268406a1d78df84c0cb895.yaml @@ -0,0 +1,58 @@ +id: foogallery-2c9cfaa1b4268406a1d78df84c0cb895 + +info: + name: > + Best WordPress Gallery Plugin – FooGallery <= 2.4.7 -Authenticated(Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d17d9610-d0fd-419d-a7ea-e9c313f1c542?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-3ced01544afaf258ab773262adacbb46.yaml b/nuclei-templates/cve-less/plugins/foogallery-3ced01544afaf258ab773262adacbb46.yaml new file mode 100644 index 0000000000..e70dd23a19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-3ced01544afaf258ab773262adacbb46.yaml @@ -0,0 +1,58 @@ +id: foogallery-3ced01544afaf258ab773262adacbb46 + +info: + name: > + FooGallery <= 2.4.14 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2edeb63-56ad-45e7-9e85-cdf0a8ef41e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-7acb842ebb36fed3d48b7a27908aad70.yaml b/nuclei-templates/cve-less/plugins/foogallery-7acb842ebb36fed3d48b7a27908aad70.yaml new file mode 100644 index 0000000000..de283e9823 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-7acb842ebb36fed3d48b7a27908aad70.yaml @@ -0,0 +1,58 @@ +id: foogallery-7acb842ebb36fed3d48b7a27908aad70 + +info: + name: > + FooGallery <= 1.8.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6a9ae9e-17f2-4fcb-8428-f6bf1a500bc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-84b774dce1ed446fe61865bc9717d231.yaml b/nuclei-templates/cve-less/plugins/foogallery-84b774dce1ed446fe61865bc9717d231.yaml new file mode 100644 index 0000000000..86aa58e705 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-84b774dce1ed446fe61865bc9717d231.yaml @@ -0,0 +1,58 @@ +id: foogallery-84b774dce1ed446fe61865bc9717d231 + +info: + name: > + FooGallery <= 2.0.34 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13c22ad6-eecb-4f05-9dce-76a721b4744c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-a94721f1db6a21d7268903bae3160d03.yaml b/nuclei-templates/cve-less/plugins/foogallery-a94721f1db6a21d7268903bae3160d03.yaml new file mode 100644 index 0000000000..2d550f3237 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-a94721f1db6a21d7268903bae3160d03.yaml @@ -0,0 +1,58 @@ +id: foogallery-a94721f1db6a21d7268903bae3160d03 + +info: + name: > + FooGallery Premium <= 2.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dce8ac32-cab8-4e05-bf6f-cc348d0c9472?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-b1493cf8f77a9e357e523e1844c8f281.yaml b/nuclei-templates/cve-less/plugins/foogallery-b1493cf8f77a9e357e523e1844c8f281.yaml new file mode 100644 index 0000000000..c74bf1fa62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-b1493cf8f77a9e357e523e1844c8f281.yaml @@ -0,0 +1,58 @@ +id: foogallery-b1493cf8f77a9e357e523e1844c8f281 + +info: + name: > + FooGallery <= 2.2.44 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fd495e8-d7e8-4949-b7aa-43ef40063ca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/foogallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2725a6def1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: foogallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-c4af1e64fbcb95f3b91e16ac0f449bf5.yaml b/nuclei-templates/cve-less/plugins/foogallery-c4af1e64fbcb95f3b91e16ac0f449bf5.yaml new file mode 100644 index 0000000000..a6367871e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-c4af1e64fbcb95f3b91e16ac0f449bf5.yaml @@ -0,0 +1,58 @@ +id: foogallery-c4af1e64fbcb95f3b91e16ac0f449bf5 + +info: + name: > + FooGallery <= 2.4.14 - Authenticated (Author+) Stored Cross-Site Scripting via Image Attachment Fields + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d4aeb1-0a4f-49f1-b5a9-b582e271eae1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/foogallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..d1b23845e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: foogallery-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-d1db79cb95565d6ad4b74843ef9d4999.yaml b/nuclei-templates/cve-less/plugins/foogallery-d1db79cb95565d6ad4b74843ef9d4999.yaml new file mode 100644 index 0000000000..81ff9ba316 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-d1db79cb95565d6ad4b74843ef9d4999.yaml @@ -0,0 +1,58 @@ +id: foogallery-d1db79cb95565d6ad4b74843ef9d4999 + +info: + name: > + FooGallery <= 2.2.44 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d58ca75a-f425-477d-8e48-a5d600543578?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-ea2db66e943b1038a7ee25bf53b0dcc6.yaml b/nuclei-templates/cve-less/plugins/foogallery-ea2db66e943b1038a7ee25bf53b0dcc6.yaml new file mode 100644 index 0000000000..bdec8d41b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-ea2db66e943b1038a7ee25bf53b0dcc6.yaml @@ -0,0 +1,58 @@ +id: foogallery-ea2db66e943b1038a7ee25bf53b0dcc6 + +info: + name: > + FooGallery <= 1.9.24 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42b24b41-c520-4bb8-ba56-6f35500ee90e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery/" + google-query: inurl:"/wp-content/plugins/foogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foogallery-premium-a94721f1db6a21d7268903bae3160d03.yaml b/nuclei-templates/cve-less/plugins/foogallery-premium-a94721f1db6a21d7268903bae3160d03.yaml new file mode 100644 index 0000000000..731daa6f46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foogallery-premium-a94721f1db6a21d7268903bae3160d03.yaml @@ -0,0 +1,58 @@ +id: foogallery-premium-a94721f1db6a21d7268903bae3160d03 + +info: + name: > + FooGallery Premium <= 2.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dce8ac32-cab8-4e05-bf6f-cc348d0c9472?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foogallery-premium/" + google-query: inurl:"/wp-content/plugins/foogallery-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foogallery-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foogallery-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foogallery-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/football-live-scores-2d57f425ae40c364bab73a19021c28f3.yaml b/nuclei-templates/cve-less/plugins/football-live-scores-2d57f425ae40c364bab73a19021c28f3.yaml new file mode 100644 index 0000000000..bfb2017dfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/football-live-scores-2d57f425ae40c364bab73a19021c28f3.yaml @@ -0,0 +1,58 @@ +id: football-live-scores-2d57f425ae40c364bab73a19021c28f3 + +info: + name: > + Football Live Scores <= 1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b4203f-7301-4ab6-b7a1-c43516bea477?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/football-live-scores/" + google-query: inurl:"/wp-content/plugins/football-live-scores/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,football-live-scores,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/football-live-scores/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "football-live-scores" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/football-pool-749aff0fcc167e558bca750035ba1596.yaml b/nuclei-templates/cve-less/plugins/football-pool-749aff0fcc167e558bca750035ba1596.yaml new file mode 100644 index 0000000000..ce39e2d498 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/football-pool-749aff0fcc167e558bca750035ba1596.yaml @@ -0,0 +1,58 @@ +id: football-pool-749aff0fcc167e558bca750035ba1596 + +info: + name: > + Football pool <= 2.11.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff150706-5fbf-4881-976b-89fdaf637fb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/football-pool/" + google-query: inurl:"/wp-content/plugins/football-pool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,football-pool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/football-pool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "football-pool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/football-pool-924ca2bb4d17021fd01ade1e50b5f40f.yaml b/nuclei-templates/cve-less/plugins/football-pool-924ca2bb4d17021fd01ade1e50b5f40f.yaml new file mode 100644 index 0000000000..d9e4988c97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/football-pool-924ca2bb4d17021fd01ade1e50b5f40f.yaml @@ -0,0 +1,58 @@ +id: football-pool-924ca2bb4d17021fd01ade1e50b5f40f + +info: + name: > + Football Pool < 2.6.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23311ce1-0e94-4bff-8d92-388ccc600506?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/football-pool/" + google-query: inurl:"/wp-content/plugins/football-pool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,football-pool,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/football-pool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "football-pool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/footer-putter-947ad0b5d0e7c6896eb25c5ba15abe34.yaml b/nuclei-templates/cve-less/plugins/footer-putter-947ad0b5d0e7c6896eb25c5ba15abe34.yaml new file mode 100644 index 0000000000..cfc8608d19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/footer-putter-947ad0b5d0e7c6896eb25c5ba15abe34.yaml @@ -0,0 +1,58 @@ +id: footer-putter-947ad0b5d0e7c6896eb25c5ba15abe34 + +info: + name: > + Footer Putter <= 6.1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/688353c9-e4e5-4717-9651-15d05248554f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/footer-putter/" + google-query: inurl:"/wp-content/plugins/footer-putter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,footer-putter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/footer-putter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "footer-putter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/footer-text-51f5cc0d0e28df647c1c9e27826141db.yaml b/nuclei-templates/cve-less/plugins/footer-text-51f5cc0d0e28df647c1c9e27826141db.yaml new file mode 100644 index 0000000000..b94aee8fbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/footer-text-51f5cc0d0e28df647c1c9e27826141db.yaml @@ -0,0 +1,58 @@ +id: footer-text-51f5cc0d0e28df647c1c9e27826141db + +info: + name: > + Footer Text <= 2.0.3 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a12ccd08-ee29-4fb9-9075-cf71dc488ffc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/footer-text/" + google-query: inurl:"/wp-content/plugins/footer-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,footer-text,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/footer-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "footer-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/for-the-visually-impaired-1288b290469ac9f6682339ae7faeb1d6.yaml b/nuclei-templates/cve-less/plugins/for-the-visually-impaired-1288b290469ac9f6682339ae7faeb1d6.yaml new file mode 100644 index 0000000000..6c2b77b3fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/for-the-visually-impaired-1288b290469ac9f6682339ae7faeb1d6.yaml @@ -0,0 +1,58 @@ +id: for-the-visually-impaired-1288b290469ac9f6682339ae7faeb1d6 + +info: + name: > + For the visually impaired <= 0.58 - Cross-Site Request Forgery to Plugin Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56976e5f-13e9-45e3-8cd1-7ac5f34f4248?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/for-the-visually-impaired/" + google-query: inurl:"/wp-content/plugins/for-the-visually-impaired/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,for-the-visually-impaired,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/for-the-visually-impaired/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "for-the-visually-impaired" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.58') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/force-first-last-9e22e51baaf99f342eddf6b6b8fb87ea.yaml b/nuclei-templates/cve-less/plugins/force-first-last-9e22e51baaf99f342eddf6b6b8fb87ea.yaml new file mode 100644 index 0000000000..d411299a41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/force-first-last-9e22e51baaf99f342eddf6b6b8fb87ea.yaml @@ -0,0 +1,58 @@ +id: force-first-last-9e22e51baaf99f342eddf6b6b8fb87ea + +info: + name: > + Force First and Last Name as Display Name <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27d579d5-a4d2-45f7-a7bb-8f384d851d7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/force-first-last/" + google-query: inurl:"/wp-content/plugins/force-first-last/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,force-first-last,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/force-first-last/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "force-first-last" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/force-sell-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/force-sell-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..33da7b434f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/force-sell-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: force-sell-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/force-sell-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/force-sell-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,force-sell-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/force-sell-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "force-sell-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forcefield-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/forcefield-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..cd99ff57da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forcefield-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: forcefield-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forcefield/" + google-query: inurl:"/wp-content/plugins/forcefield/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forcefield,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forcefield/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forcefield" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forget-about-shortcode-buttons-53da943f73d7c6e6cd21ccb312450cb4.yaml b/nuclei-templates/cve-less/plugins/forget-about-shortcode-buttons-53da943f73d7c6e6cd21ccb312450cb4.yaml new file mode 100644 index 0000000000..f0b3125caa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forget-about-shortcode-buttons-53da943f73d7c6e6cd21ccb312450cb4.yaml @@ -0,0 +1,58 @@ +id: forget-about-shortcode-buttons-53da943f73d7c6e6cd21ccb312450cb4 + +info: + name: > + Forget About Shortcode Buttons <= 2.1.2 - Missing Authorization via fasc_buttons + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/212dd123-42d4-4dd2-a2e2-bf0c43e805bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forget-about-shortcode-buttons/" + google-query: inurl:"/wp-content/plugins/forget-about-shortcode-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forget-about-shortcode-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forget-about-shortcode-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forget-about-shortcode-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forget-about-shortcode-buttons-bb70f2562e10a695ac872c839d1985e9.yaml b/nuclei-templates/cve-less/plugins/forget-about-shortcode-buttons-bb70f2562e10a695ac872c839d1985e9.yaml new file mode 100644 index 0000000000..6e2ab6ad0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forget-about-shortcode-buttons-bb70f2562e10a695ac872c839d1985e9.yaml @@ -0,0 +1,58 @@ +id: forget-about-shortcode-buttons-bb70f2562e10a695ac872c839d1985e9 + +info: + name: > + Forget About Shortcode Buttons <= 1.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9faa9bd1-c7a8-4d8b-9f92-3a0aa9adbc03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forget-about-shortcode-buttons/" + google-query: inurl:"/wp-content/plugins/forget-about-shortcode-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forget-about-shortcode-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forget-about-shortcode-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forget-about-shortcode-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-block-3972eede365a3539d1345b6e32b15ffa.yaml b/nuclei-templates/cve-less/plugins/form-block-3972eede365a3539d1345b6e32b15ffa.yaml new file mode 100644 index 0000000000..9015dfbb4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-block-3972eede365a3539d1345b6e32b15ffa.yaml @@ -0,0 +1,58 @@ +id: form-block-3972eede365a3539d1345b6e32b15ffa + +info: + name: > + Form Block <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb18d6d8-28e5-4125-9209-a71403f678f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-block/" + google-query: inurl:"/wp-content/plugins/form-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-block,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-forms-96b39b472ca8eccbec11e47f253c80b8.yaml b/nuclei-templates/cve-less/plugins/form-forms-96b39b472ca8eccbec11e47f253c80b8.yaml new file mode 100644 index 0000000000..2e2b6057d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-forms-96b39b472ca8eccbec11e47f253c80b8.yaml @@ -0,0 +1,58 @@ +id: form-forms-96b39b472ca8eccbec11e47f253c80b8 + +info: + name: > + Form – Contact Form <= 1.2.0 - Administrator+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da4f81c5-c796-4052-ac1a-007a1e8f5a50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-forms/" + google-query: inurl:"/wp-content/plugins/form-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-lightbox-df96a9df0511094bf94be89ac1740d20.yaml b/nuclei-templates/cve-less/plugins/form-lightbox-df96a9df0511094bf94be89ac1740d20.yaml new file mode 100644 index 0000000000..acff1101d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-lightbox-df96a9df0511094bf94be89ac1740d20.yaml @@ -0,0 +1,58 @@ +id: form-lightbox-df96a9df0511094bf94be89ac1740d20 + +info: + name: > + Form Lightbox <= 2.1 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c63048ad-3d37-402e-8e61-415d2d6caa69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-lightbox/" + google-query: inurl:"/wp-content/plugins/form-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-lightbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-0e2b9d12590d3c7b14c8e22b3d6f6056.yaml b/nuclei-templates/cve-less/plugins/form-maker-0e2b9d12590d3c7b14c8e22b3d6f6056.yaml new file mode 100644 index 0000000000..fd4a1be672 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-0e2b9d12590d3c7b14c8e22b3d6f6056.yaml @@ -0,0 +1,58 @@ +id: form-maker-0e2b9d12590d3c7b14c8e22b3d6f6056 + +info: + name: > + Form Maker by 10Web <= 1.12.21 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7317d716-39e0-40d6-92a8-e59bd8470e5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-2420cc8c52f0171d8c5b49b0e53cd69a.yaml b/nuclei-templates/cve-less/plugins/form-maker-2420cc8c52f0171d8c5b49b0e53cd69a.yaml new file mode 100644 index 0000000000..e8311279aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-2420cc8c52f0171d8c5b49b0e53cd69a.yaml @@ -0,0 +1,58 @@ +id: form-maker-2420cc8c52f0171d8c5b49b0e53cd69a + +info: + name: > + Form Maker <= 1.13.59 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c3091eb-a2e7-4fc2-9f5c-5d6d582bbb89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-3a5958dc81689a4069c9b57ecbde177c.yaml b/nuclei-templates/cve-less/plugins/form-maker-3a5958dc81689a4069c9b57ecbde177c.yaml new file mode 100644 index 0000000000..93abb02d73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-3a5958dc81689a4069c9b57ecbde177c.yaml @@ -0,0 +1,58 @@ +id: form-maker-3a5958dc81689a4069c9b57ecbde177c + +info: + name: > + Form Maker <= 1.15.20 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46525a06-f3a4-4c78-ba32-4b937e1dbac6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-51b281937ca7291e3b4a94f5ec043e64.yaml b/nuclei-templates/cve-less/plugins/form-maker-51b281937ca7291e3b4a94f5ec043e64.yaml new file mode 100644 index 0000000000..806c135957 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-51b281937ca7291e3b4a94f5ec043e64.yaml @@ -0,0 +1,58 @@ +id: form-maker-51b281937ca7291e3b4a94f5ec043e64 + +info: + name: > + Form Maker by 10Web <= 1.15.19 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c691d129-35db-4de8-a28e-5e77347e2280?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-54830c75db088a14f125745f43fdb1f9.yaml b/nuclei-templates/cve-less/plugins/form-maker-54830c75db088a14f125745f43fdb1f9.yaml new file mode 100644 index 0000000000..1d1e3b5d38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-54830c75db088a14f125745f43fdb1f9.yaml @@ -0,0 +1,58 @@ +id: form-maker-54830c75db088a14f125745f43fdb1f9 + +info: + name: > + Form Maker by 10Web <= 1.15.18 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b1db6b8-f005-488f-b2cc-667acc700b0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-5ab78d017180c321a2a306a692c78211.yaml b/nuclei-templates/cve-less/plugins/form-maker-5ab78d017180c321a2a306a692c78211.yaml new file mode 100644 index 0000000000..ade9df4b27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-5ab78d017180c321a2a306a692c78211.yaml @@ -0,0 +1,58 @@ +id: form-maker-5ab78d017180c321a2a306a692c78211 + +info: + name: > + Form Maker by 10Web <= 1.15.24 - Authenticated (Subscriber+) Stored Self-Based Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af1075a5-9efa-4b86-9798-6dbafcba4db5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-844eff1dfca0f37b0344bfc8951dcee9.yaml b/nuclei-templates/cve-less/plugins/form-maker-844eff1dfca0f37b0344bfc8951dcee9.yaml new file mode 100644 index 0000000000..ce8d1e3de1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-844eff1dfca0f37b0344bfc8951dcee9.yaml @@ -0,0 +1,58 @@ +id: form-maker-844eff1dfca0f37b0344bfc8951dcee9 + +info: + name: > + Form Maker by 10Web <= 1.15.18 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05b434f7-6bce-4ad0-bd12-db5b01f14953?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-9efd1cc18514c55bcfc7bb0b901e8474.yaml b/nuclei-templates/cve-less/plugins/form-maker-9efd1cc18514c55bcfc7bb0b901e8474.yaml new file mode 100644 index 0000000000..39b33262ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-9efd1cc18514c55bcfc7bb0b901e8474.yaml @@ -0,0 +1,58 @@ +id: form-maker-9efd1cc18514c55bcfc7bb0b901e8474 + +info: + name: > + Form Maker by 10Web < 1.13.40 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2a59015-eb29-44fe-bc21-ba8832ac750b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-b107934a8aab930d1fab2cf0f27d13f6.yaml b/nuclei-templates/cve-less/plugins/form-maker-b107934a8aab930d1fab2cf0f27d13f6.yaml new file mode 100644 index 0000000000..53ea45062b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-b107934a8aab930d1fab2cf0f27d13f6.yaml @@ -0,0 +1,58 @@ +id: form-maker-b107934a8aab930d1fab2cf0f27d13f6 + +info: + name: > + Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder <= 1.15.23 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8921ea7f-5e27-4f05-b338-1c16366a8c8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-b584bc3add37b438ea9f7d52a53c499d.yaml b/nuclei-templates/cve-less/plugins/form-maker-b584bc3add37b438ea9f7d52a53c499d.yaml new file mode 100644 index 0000000000..3b80cf7c62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-b584bc3add37b438ea9f7d52a53c499d.yaml @@ -0,0 +1,58 @@ +id: form-maker-b584bc3add37b438ea9f7d52a53c499d + +info: + name: > + Form Maker by 10Web <= 1.13.2 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93ff1634-d520-4895-8822-2dbfa7b5e030?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-bac514b6f0b1f8c0997d58523192fc7a.yaml b/nuclei-templates/cve-less/plugins/form-maker-bac514b6f0b1f8c0997d58523192fc7a.yaml new file mode 100644 index 0000000000..20207ed766 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-bac514b6f0b1f8c0997d58523192fc7a.yaml @@ -0,0 +1,58 @@ +id: form-maker-bac514b6f0b1f8c0997d58523192fc7a + +info: + name: > + Form Maker <= 1.15.16 - Missing Authorization in check_score + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f0eac1e-4988-4b73-bf13-c959b0dc11e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-bc7687f3a38eb76862d41bf156e272e2.yaml b/nuclei-templates/cve-less/plugins/form-maker-bc7687f3a38eb76862d41bf156e272e2.yaml new file mode 100644 index 0000000000..fd98cfea13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-bc7687f3a38eb76862d41bf156e272e2.yaml @@ -0,0 +1,58 @@ +id: form-maker-bc7687f3a38eb76862d41bf156e272e2 + +info: + name: > + Form Maker by 10Web <= 1.13.4 - Cross-Site Request Forgery to Local File Inclusion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59c1b745-7559-4b80-9118-152ee2340c47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-c060cdd161613c35be3451870d488386.yaml b/nuclei-templates/cve-less/plugins/form-maker-c060cdd161613c35be3451870d488386.yaml new file mode 100644 index 0000000000..cbfad2f2cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-c060cdd161613c35be3451870d488386.yaml @@ -0,0 +1,58 @@ +id: form-maker-c060cdd161613c35be3451870d488386 + +info: + name: > + Form-Maker (twb_form-maker) <= 1.15.21 - Cross-Site Request Forgery to Limited Code Execution via Execute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d55c832b-f558-4e8a-8301-33dd38d39ef1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-c4e27cd6ca86640ba05f8d3c2423655f.yaml b/nuclei-templates/cve-less/plugins/form-maker-c4e27cd6ca86640ba05f8d3c2423655f.yaml new file mode 100644 index 0000000000..00eb3cfca1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-c4e27cd6ca86640ba05f8d3c2423655f.yaml @@ -0,0 +1,58 @@ +id: form-maker-c4e27cd6ca86640ba05f8d3c2423655f + +info: + name: > + Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder <= 1.15.22 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5652f9c3-3cc9-4541-8209-40117b4d25d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-e23a8ff0f941885439bb6eaa6879d8d2.yaml b/nuclei-templates/cve-less/plugins/form-maker-e23a8ff0f941885439bb6eaa6879d8d2.yaml new file mode 100644 index 0000000000..1682188272 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-e23a8ff0f941885439bb6eaa6879d8d2.yaml @@ -0,0 +1,58 @@ +id: form-maker-e23a8ff0f941885439bb6eaa6879d8d2 + +info: + name: > + Form Maker <= 1.15.5 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0506f360-17c3-4cc8-9ac7-988c056c3caf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-f99ce34ee4393dd151b2436ea69250e6.yaml b/nuclei-templates/cve-less/plugins/form-maker-f99ce34ee4393dd151b2436ea69250e6.yaml new file mode 100644 index 0000000000..20fa380415 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-f99ce34ee4393dd151b2436ea69250e6.yaml @@ -0,0 +1,58 @@ +id: form-maker-f99ce34ee4393dd151b2436ea69250e6 + +info: + name: > + Form Maker by 10Web <= 1.13.35 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9347dafb-1789-4855-b09e-2a1ef5f7f2c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-maker-fd28c2a8a8ece88ce28c75cf84e47383.yaml b/nuclei-templates/cve-less/plugins/form-maker-fd28c2a8a8ece88ce28c75cf84e47383.yaml new file mode 100644 index 0000000000..5591d07e9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-maker-fd28c2a8a8ece88ce28c75cf84e47383.yaml @@ -0,0 +1,58 @@ +id: form-maker-fd28c2a8a8ece88ce28c75cf84e47383 + +info: + name: > + Form Maker <= 1.14.11 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c547a2b-98fb-4936-88a5-31e5c879a364?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-maker/" + google-query: inurl:"/wp-content/plugins/form-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-to-chat-08841c16939c6ce6bfc6679725ea1281.yaml b/nuclei-templates/cve-less/plugins/form-to-chat-08841c16939c6ce6bfc6679725ea1281.yaml new file mode 100644 index 0000000000..517c40f2ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-to-chat-08841c16939c6ce6bfc6679725ea1281.yaml @@ -0,0 +1,58 @@ +id: form-to-chat-08841c16939c6ce6bfc6679725ea1281 + +info: + name: > + Form to Chat App <= 1.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6efb471-3f6a-4ec0-a2cd-fc1154d48ef5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-to-chat/" + google-query: inurl:"/wp-content/plugins/form-to-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-to-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-to-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-to-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-vibes-b7888b843ebf167b77c4d303a6db54de.yaml b/nuclei-templates/cve-less/plugins/form-vibes-b7888b843ebf167b77c4d303a6db54de.yaml new file mode 100644 index 0000000000..5337cc1df6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-vibes-b7888b843ebf167b77c4d303a6db54de.yaml @@ -0,0 +1,58 @@ +id: form-vibes-b7888b843ebf167b77c4d303a6db54de + +info: + name: > + Form Vibes <= 1.4.5 - Authenticated (Admininstrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/066e9f46-83a5-4a2f-ae09-6d06c5c66817?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-vibes/" + google-query: inurl:"/wp-content/plugins/form-vibes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-vibes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-vibes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-vibes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/form-vibes-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/form-vibes-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..acf599f1e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/form-vibes-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: form-vibes-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-vibes/" + google-query: inurl:"/wp-content/plugins/form-vibes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-vibes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-vibes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-vibes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formassembly-web-forms-14ef39181771488f76a78ebc7f182128.yaml b/nuclei-templates/cve-less/plugins/formassembly-web-forms-14ef39181771488f76a78ebc7f182128.yaml new file mode 100644 index 0000000000..752ec4f0c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formassembly-web-forms-14ef39181771488f76a78ebc7f182128.yaml @@ -0,0 +1,58 @@ +id: formassembly-web-forms-14ef39181771488f76a78ebc7f182128 + +info: + name: > + WP-FormAssembly <= 2.0.5 - Authenticated (Contributor+) Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/724a1790-811a-4ec5-a664-a22e6b72fba1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formassembly-web-forms/" + google-query: inurl:"/wp-content/plugins/formassembly-web-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formassembly-web-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formassembly-web-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formassembly-web-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formassembly-web-forms-40b17fbc397976bb918c3ad479c78a68.yaml b/nuclei-templates/cve-less/plugins/formassembly-web-forms-40b17fbc397976bb918c3ad479c78a68.yaml new file mode 100644 index 0000000000..68925c02b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formassembly-web-forms-40b17fbc397976bb918c3ad479c78a68.yaml @@ -0,0 +1,58 @@ +id: formassembly-web-forms-40b17fbc397976bb918c3ad479c78a68 + +info: + name: > + WP-FormAssembly <= 2.0.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60db100b-7a09-4ac1-81ec-9b400c9cce47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formassembly-web-forms/" + google-query: inurl:"/wp-content/plugins/formassembly-web-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formassembly-web-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formassembly-web-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formassembly-web-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formassembly-web-forms-a6ec47cf9956948a6246629d44179127.yaml b/nuclei-templates/cve-less/plugins/formassembly-web-forms-a6ec47cf9956948a6246629d44179127.yaml new file mode 100644 index 0000000000..0aba954a0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formassembly-web-forms-a6ec47cf9956948a6246629d44179127.yaml @@ -0,0 +1,58 @@ +id: formassembly-web-forms-a6ec47cf9956948a6246629d44179127 + +info: + name: > + WP-FormAssembly <= 2.0.8 - Limited Server Side Request Forgery via 'formassembly' shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/288853b8-7523-472e-8406-257ffb3bd5ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formassembly-web-forms/" + google-query: inurl:"/wp-content/plugins/formassembly-web-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formassembly-web-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formassembly-web-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formassembly-web-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formassembly-web-forms-d46aeb2acb3fb066be1f4ef24cb7b7ca.yaml b/nuclei-templates/cve-less/plugins/formassembly-web-forms-d46aeb2acb3fb066be1f4ef24cb7b7ca.yaml new file mode 100644 index 0000000000..b4d2c9a857 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formassembly-web-forms-d46aeb2acb3fb066be1f4ef24cb7b7ca.yaml @@ -0,0 +1,58 @@ +id: formassembly-web-forms-d46aeb2acb3fb066be1f4ef24cb7b7ca + +info: + name: > + WP-FormAssembly <= 2.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3b164e0-de2e-40d5-935e-31f5bebd87cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formassembly-web-forms/" + google-query: inurl:"/wp-content/plugins/formassembly-web-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formassembly-web-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formassembly-web-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formassembly-web-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formbuilder-15f3ff2fd895a09890b1601370ff17ff.yaml b/nuclei-templates/cve-less/plugins/formbuilder-15f3ff2fd895a09890b1601370ff17ff.yaml new file mode 100644 index 0000000000..a2145c1db0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formbuilder-15f3ff2fd895a09890b1601370ff17ff.yaml @@ -0,0 +1,58 @@ +id: formbuilder-15f3ff2fd895a09890b1601370ff17ff + +info: + name: > + FormBuilder <= 1.05 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61737fea-cf91-4a08-bfec-363aeaca21f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formbuilder/" + google-query: inurl:"/wp-content/plugins/formbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formbuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formbuilder-681334888d5905413f6f1159a30d2417.yaml b/nuclei-templates/cve-less/plugins/formbuilder-681334888d5905413f6f1159a30d2417.yaml new file mode 100644 index 0000000000..bef518661a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formbuilder-681334888d5905413f6f1159a30d2417.yaml @@ -0,0 +1,58 @@ +id: formbuilder-681334888d5905413f6f1159a30d2417 + +info: + name: > + FormBuilder < 1.08 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae1d155-deb4-4847-858b-37b5cd9ac1c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formbuilder/" + google-query: inurl:"/wp-content/plugins/formbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formbuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formbuilder-860302baac60a4494cef29bab34e785b.yaml b/nuclei-templates/cve-less/plugins/formbuilder-860302baac60a4494cef29bab34e785b.yaml new file mode 100644 index 0000000000..e9ff33c241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formbuilder-860302baac60a4494cef29bab34e785b.yaml @@ -0,0 +1,58 @@ +id: formbuilder-860302baac60a4494cef29bab34e785b + +info: + name: > + FormBuilder < 1.08 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a613e56-54c0-4bf5-b87f-0e4e507c1337?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formbuilder/" + google-query: inurl:"/wp-content/plugins/formbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formbuilder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.08') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formbuilder-a6e4580408df1cc0fd425db3d3f61102.yaml b/nuclei-templates/cve-less/plugins/formbuilder-a6e4580408df1cc0fd425db3d3f61102.yaml new file mode 100644 index 0000000000..eed211686e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formbuilder-a6e4580408df1cc0fd425db3d3f61102.yaml @@ -0,0 +1,58 @@ +id: formbuilder-a6e4580408df1cc0fd425db3d3f61102 + +info: + name: > + FormBuilder <= 0.90 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed74aebc-9d52-4fac-b308-97765db62d3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formbuilder/" + google-query: inurl:"/wp-content/plugins/formbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formbuilder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.90') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formbuilder-e6475f7f5f871801f1bd4ec02d738d77.yaml b/nuclei-templates/cve-less/plugins/formbuilder-e6475f7f5f871801f1bd4ec02d738d77.yaml new file mode 100644 index 0000000000..6d5e7047cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formbuilder-e6475f7f5f871801f1bd4ec02d738d77.yaml @@ -0,0 +1,58 @@ +id: formbuilder-e6475f7f5f871801f1bd4ec02d738d77 + +info: + name: > + FormBuilder <= 1.08 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2df2312c-56d7-4899-8342-6f6cf62298e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formbuilder/" + google-query: inurl:"/wp-content/plugins/formbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formbuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.08') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-b8e20e75d15dbb751b7fb081ab7cf785.yaml b/nuclei-templates/cve-less/plugins/formcraft-b8e20e75d15dbb751b7fb081ab7cf785.yaml new file mode 100644 index 0000000000..f14c06ffa3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-b8e20e75d15dbb751b7fb081ab7cf785.yaml @@ -0,0 +1,58 @@ +id: formcraft-b8e20e75d15dbb751b7fb081ab7cf785 + +info: + name: > + Formcraft (Unknown Versions) - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ddfb494-1a63-4958-849e-392eec09615d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft/" + google-query: inurl:"/wp-content/plugins/formcraft/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-fd631c53e7ca7d0431606810665ee5df.yaml b/nuclei-templates/cve-less/plugins/formcraft-fd631c53e7ca7d0431606810665ee5df.yaml new file mode 100644 index 0000000000..2960ca97db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-fd631c53e7ca7d0431606810665ee5df.yaml @@ -0,0 +1,58 @@ +id: formcraft-fd631c53e7ca7d0431606810665ee5df + +info: + name: > + FormCraft <= 1.3.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5a26786-2b15-43ce-a992-fd8cc9cf5600?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft/" + google-query: inurl:"/wp-content/plugins/formcraft/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-02ff6e8f4c50ebc35c46ebd6a0282258.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-02ff6e8f4c50ebc35c46ebd6a0282258.yaml new file mode 100644 index 0000000000..66aa9775bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-02ff6e8f4c50ebc35c46ebd6a0282258.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-02ff6e8f4c50ebc35c46ebd6a0282258 + +info: + name: > + FormCraft Basic <= 1.2.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c648fbb1-cc12-4334-b334-0f784542ab6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-0793f0361460e084aa156d291ce75eb6.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-0793f0361460e084aa156d291ce75eb6.yaml new file mode 100644 index 0000000000..8415c7a4de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-0793f0361460e084aa156d291ce75eb6.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-0793f0361460e084aa156d291ce75eb6 + +info: + name: > + FormCraft Basic 1.0.5 - SQL Injection via id Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55f507c4-8589-4fdb-92c2-935d38054817?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-27f44594eb9e99ef9e1059fc3d01b99d.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-27f44594eb9e99ef9e1059fc3d01b99d.yaml new file mode 100644 index 0000000000..cfbae34813 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-27f44594eb9e99ef9e1059fc3d01b99d.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-27f44594eb9e99ef9e1059fc3d01b99d + +info: + name: > + FormCraft <= 1.2.7 - Missing Authorization via formcraft_nag_update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25d5735a-8eed-4b4a-9bbe-9e42fb18ddf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-527f36f790da1a74645e814e4fe52934.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-527f36f790da1a74645e814e4fe52934.yaml new file mode 100644 index 0000000000..6bfb7828da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-527f36f790da1a74645e814e4fe52934.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-527f36f790da1a74645e814e4fe52934 + +info: + name: > + FormCraft <= 1.2.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via fcb shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf17a817-6f61-43d5-9da2-58fbbef458d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml new file mode 100644 index 0000000000..75eabafa9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-5fa24ba82d6b7dec5ee5fc8a5b73d9f8 + +info: + name: > + FormCraft <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f49408da-79d5-4653-b4c2-a9247f597380?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-8ab11785066028af40a069df806e2ad0.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-8ab11785066028af40a069df806e2ad0.yaml new file mode 100644 index 0000000000..16c2e9236a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-8ab11785066028af40a069df806e2ad0.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-8ab11785066028af40a069df806e2ad0 + +info: + name: > + FormCraft <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77a2d64f-852f-4cc2-9905-98c8f0930817?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-98163a520e2e6ad1b536bf4759e7aff4.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-98163a520e2e6ad1b536bf4759e7aff4.yaml new file mode 100644 index 0000000000..cf328222e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-98163a520e2e6ad1b536bf4759e7aff4.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-98163a520e2e6ad1b536bf4759e7aff4 + +info: + name: > + FormCraft Premium <= 3.9.6 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72b4f6bb-59dd-453c-b089-4777dcefb11f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-d35055f56360f454d611ea478b5c8142.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-d35055f56360f454d611ea478b5c8142.yaml new file mode 100644 index 0000000000..40c12cb68e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-d35055f56360f454d611ea478b5c8142.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-d35055f56360f454d611ea478b5c8142 + +info: + name: > + Formcraft3 <= 3.8.27 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d23a02-11b6-4674-a13a-884de2d51ed7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft-form-builder-e2849c772d6e6f64d56860e36e54564f.yaml b/nuclei-templates/cve-less/plugins/formcraft-form-builder-e2849c772d6e6f64d56860e36e54564f.yaml new file mode 100644 index 0000000000..379478d3a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft-form-builder-e2849c772d6e6f64d56860e36e54564f.yaml @@ -0,0 +1,58 @@ +id: formcraft-form-builder-e2849c772d6e6f64d56860e36e54564f + +info: + name: > + FormCraft <= 1.2.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c17967a4-20df-4b23-973f-591a0caeea39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft-form-builder/" + google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formcraft3-633d0b293826c4a61b61e1d3210e0346.yaml b/nuclei-templates/cve-less/plugins/formcraft3-633d0b293826c4a61b61e1d3210e0346.yaml new file mode 100644 index 0000000000..56d9e7ab73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formcraft3-633d0b293826c4a61b61e1d3210e0346.yaml @@ -0,0 +1,58 @@ +id: formcraft3-633d0b293826c4a61b61e1d3210e0346 + +info: + name: > + Premium WordPress Form Builder <= 3.2.31 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d943691-66cf-4018-9eb6-5f20db0a95a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formcraft3/" + google-query: inurl:"/wp-content/plugins/formcraft3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formcraft3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formcraft3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formcraft3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formfacade-240756f87690e8bd859858034bc8c975.yaml b/nuclei-templates/cve-less/plugins/formfacade-240756f87690e8bd859858034bc8c975.yaml new file mode 100644 index 0000000000..612f32e998 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formfacade-240756f87690e8bd859858034bc8c975.yaml @@ -0,0 +1,58 @@ +id: formfacade-240756f87690e8bd859858034bc8c975 + +info: + name: > + FormFacade <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94a4123b-c21b-4f3e-b1cc-96c8f07c3fc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formfacade/" + google-query: inurl:"/wp-content/plugins/formfacade/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formfacade,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formfacade/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formfacade" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formforall-76bb7b1a62378179c2a3a748f3a4ef7c.yaml b/nuclei-templates/cve-less/plugins/formforall-76bb7b1a62378179c2a3a748f3a4ef7c.yaml new file mode 100644 index 0000000000..765d80a841 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formforall-76bb7b1a62378179c2a3a748f3a4ef7c.yaml @@ -0,0 +1,58 @@ +id: formforall-76bb7b1a62378179c2a3a748f3a4ef7c + +info: + name: > + Contact form Form For All <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abe2f596-b2c3-49d3-b646-0f4b64f15674?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formforall/" + google-query: inurl:"/wp-content/plugins/formforall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formforall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formforall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formforall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formget-contact-form-2abba35343647b8a829e092f6dec80ee.yaml b/nuclei-templates/cve-less/plugins/formget-contact-form-2abba35343647b8a829e092f6dec80ee.yaml new file mode 100644 index 0000000000..cfa4e3e8c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formget-contact-form-2abba35343647b8a829e092f6dec80ee.yaml @@ -0,0 +1,58 @@ +id: formget-contact-form-2abba35343647b8a829e092f6dec80ee + +info: + name: > + Contact Form by FormGet <= 5.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdd73289-f292-4903-951e-6a89049d39a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formget-contact-form/" + google-query: inurl:"/wp-content/plugins/formget-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formget-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formget-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formget-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formget-contact-form-d7ca1dd38546745c43c763574d903819.yaml b/nuclei-templates/cve-less/plugins/formget-contact-form-d7ca1dd38546745c43c763574d903819.yaml new file mode 100644 index 0000000000..bc368c7a39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formget-contact-form-d7ca1dd38546745c43c763574d903819.yaml @@ -0,0 +1,58 @@ +id: formget-contact-form-d7ca1dd38546745c43c763574d903819 + +info: + name: > + Contact Form by FormGet < 5.3.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cede59f9-611f-4da4-8140-181bd0a469d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formget-contact-form/" + google-query: inurl:"/wp-content/plugins/formget-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formget-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formget-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formget-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-03587c706609d69bad10e8dac47e2f3e.yaml b/nuclei-templates/cve-less/plugins/formidable-03587c706609d69bad10e8dac47e2f3e.yaml new file mode 100644 index 0000000000..1c1d481a87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-03587c706609d69bad10e8dac47e2f3e.yaml @@ -0,0 +1,58 @@ +id: formidable-03587c706609d69bad10e8dac47e2f3e + +info: + name: > + Formidable Form Builder <= 5.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02649a9e-036a-47fe-ab1a-26caf4f2be27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-08ccf69c17927ada744879c1923c390b.yaml b/nuclei-templates/cve-less/plugins/formidable-08ccf69c17927ada744879c1923c390b.yaml new file mode 100644 index 0000000000..8088f3c86a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-08ccf69c17927ada744879c1923c390b.yaml @@ -0,0 +1,58 @@ +id: formidable-08ccf69c17927ada744879c1923c390b + +info: + name: > + Formidable Form Builder <= 5.0.06 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dde57a98-06d5-4a3c-b100-170e9c339908?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-15c563e3f7d22cf323cc481f61b9eb8b.yaml b/nuclei-templates/cve-less/plugins/formidable-15c563e3f7d22cf323cc481f61b9eb8b.yaml new file mode 100644 index 0000000000..e6592d8d6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-15c563e3f7d22cf323cc481f61b9eb8b.yaml @@ -0,0 +1,58 @@ +id: formidable-15c563e3f7d22cf323cc481f61b9eb8b + +info: + name: > + Formidable Form Builder <= 4.02 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e19f4cb9-09ec-4711-a799-1ba809f2eda8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.02.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-437b9be662132aed2b43b674efcda98c.yaml b/nuclei-templates/cve-less/plugins/formidable-437b9be662132aed2b43b674efcda98c.yaml new file mode 100644 index 0000000000..af2d5a9071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-437b9be662132aed2b43b674efcda98c.yaml @@ -0,0 +1,58 @@ +id: formidable-437b9be662132aed2b43b674efcda98c + +info: + name: > + Formidable Form Builder <= 4.09.04 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef5028a0-6a5a-40ad-92df-ffc988cad389?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.09.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-46dd5dfacc34a4878325b7ee6f68202a.yaml b/nuclei-templates/cve-less/plugins/formidable-46dd5dfacc34a4878325b7ee6f68202a.yaml new file mode 100644 index 0000000000..5a932451e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-46dd5dfacc34a4878325b7ee6f68202a.yaml @@ -0,0 +1,58 @@ +id: formidable-46dd5dfacc34a4878325b7ee6f68202a + +info: + name: > + Formidable Form Builder < 2.05.03 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0e6f20a-3a5c-4782-9852-9891b93d765f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.05.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-50b07daf945144cbfd99133630410da2.yaml b/nuclei-templates/cve-less/plugins/formidable-50b07daf945144cbfd99133630410da2.yaml new file mode 100644 index 0000000000..1f83414208 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-50b07daf945144cbfd99133630410da2.yaml @@ -0,0 +1,58 @@ +id: formidable-50b07daf945144cbfd99133630410da2 + +info: + name: > + Formidable Form Builder <= 5.5.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b647a6c5-3710-43ec-bf31-87b5a26d54b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-586f376968c226db0dcaf5061868b9ec.yaml b/nuclei-templates/cve-less/plugins/formidable-586f376968c226db0dcaf5061868b9ec.yaml new file mode 100644 index 0000000000..81af88d22d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-586f376968c226db0dcaf5061868b9ec.yaml @@ -0,0 +1,58 @@ +id: formidable-586f376968c226db0dcaf5061868b9ec + +info: + name: > + Formidable Form Builder < 2.05.03 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7600fe1-94e4-4e3e-a9a6-ff3589813715?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.05.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-5ec297ac46cc1d40266a5ad0daa61699.yaml b/nuclei-templates/cve-less/plugins/formidable-5ec297ac46cc1d40266a5ad0daa61699.yaml new file mode 100644 index 0000000000..04e9783996 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-5ec297ac46cc1d40266a5ad0daa61699.yaml @@ -0,0 +1,58 @@ +id: formidable-5ec297ac46cc1d40266a5ad0daa61699 + +info: + name: > + Formidable Forms <= 6.7.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b983d22b-6cd2-4450-99e2-88bb149091fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-5f864ea73d67dbc167ed3ae723a536cd.yaml b/nuclei-templates/cve-less/plugins/formidable-5f864ea73d67dbc167ed3ae723a536cd.yaml new file mode 100644 index 0000000000..fcf93c5dcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-5f864ea73d67dbc167ed3ae723a536cd.yaml @@ -0,0 +1,58 @@ +id: formidable-5f864ea73d67dbc167ed3ae723a536cd + +info: + name: > + Formidable Form Builder < 2.05.03 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/900fcaab-2424-4ae8-af18-95659db0dbe3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.05.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-6c309d4fe4a7c00ec9f13abe6fdd70cc.yaml b/nuclei-templates/cve-less/plugins/formidable-6c309d4fe4a7c00ec9f13abe6fdd70cc.yaml new file mode 100644 index 0000000000..b081fc26aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-6c309d4fe4a7c00ec9f13abe6fdd70cc.yaml @@ -0,0 +1,58 @@ +id: formidable-6c309d4fe4a7c00ec9f13abe6fdd70cc + +info: + name: > + Formidable Forms <= 5.5.4 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f28feb11-7e28-4b97-b529-f6d266c3e534?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-75cfe0d86b035fdf1639773082de267a.yaml b/nuclei-templates/cve-less/plugins/formidable-75cfe0d86b035fdf1639773082de267a.yaml new file mode 100644 index 0000000000..b826c44074 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-75cfe0d86b035fdf1639773082de267a.yaml @@ -0,0 +1,58 @@ +id: formidable-75cfe0d86b035fdf1639773082de267a + +info: + name: > + Formidable Forms <= 6.7 - HTML Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff294b0f-97fe-4d27-bf93-f5bbb57ac1f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-77ecffd079fc8a0b13b180178795f1cd.yaml b/nuclei-templates/cve-less/plugins/formidable-77ecffd079fc8a0b13b180178795f1cd.yaml new file mode 100644 index 0000000000..8b2f957121 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-77ecffd079fc8a0b13b180178795f1cd.yaml @@ -0,0 +1,58 @@ +id: formidable-77ecffd079fc8a0b13b180178795f1cd + +info: + name: > + Formidable Forms <= 6.1.2 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7db04a93-a384-4093-8cab-6f1d6822f625?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-961c6f8ac9568871bace8745083a3696.yaml b/nuclei-templates/cve-less/plugins/formidable-961c6f8ac9568871bace8745083a3696.yaml new file mode 100644 index 0000000000..0f0b4866c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-961c6f8ac9568871bace8745083a3696.yaml @@ -0,0 +1,58 @@ +id: formidable-961c6f8ac9568871bace8745083a3696 + +info: + name: > + Formidable Form Builder <= 1.07.11 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d97b6f64-a596-4c83-8ab5-98b4b246897f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.07.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-987b044c3bb6f7d497d7cc053aa32728.yaml b/nuclei-templates/cve-less/plugins/formidable-987b044c3bb6f7d497d7cc053aa32728.yaml new file mode 100644 index 0000000000..2df063478a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-987b044c3bb6f7d497d7cc053aa32728.yaml @@ -0,0 +1,58 @@ +id: formidable-987b044c3bb6f7d497d7cc053aa32728 + +info: + name: > + Formidable Forms <= 6.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47e402c3-e06c-4ac9-8c60-5666cb1101ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-a29260605777cb6f82b580e66c46fcb9.yaml b/nuclei-templates/cve-less/plugins/formidable-a29260605777cb6f82b580e66c46fcb9.yaml new file mode 100644 index 0000000000..fa76698644 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-a29260605777cb6f82b580e66c46fcb9.yaml @@ -0,0 +1,58 @@ +id: formidable-a29260605777cb6f82b580e66c46fcb9 + +info: + name: > + Formidable Forms <= 6.3 - Authenticated (Subscriber+) Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9f060bd-029a-462e-b308-8366e82be383?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-aed9f1a9cf9e76b014fa4ceef2236366.yaml b/nuclei-templates/cve-less/plugins/formidable-aed9f1a9cf9e76b014fa4ceef2236366.yaml new file mode 100644 index 0000000000..ebfaf61b43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-aed9f1a9cf9e76b014fa4ceef2236366.yaml @@ -0,0 +1,58 @@ +id: formidable-aed9f1a9cf9e76b014fa4ceef2236366 + +info: + name: > + Formidable Form Builder < 2.05.03 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27616d9e-c1eb-489f-ace7-76c0e5be2597?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.05.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-b198b20134bc1a80b2134b7e32b1d9f4.yaml b/nuclei-templates/cve-less/plugins/formidable-b198b20134bc1a80b2134b7e32b1d9f4.yaml new file mode 100644 index 0000000000..700eac1bfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-b198b20134bc1a80b2134b7e32b1d9f4.yaml @@ -0,0 +1,58 @@ +id: formidable-b198b20134bc1a80b2134b7e32b1d9f4 + +info: + name: > + Formidable Form Builder <= 2.0.21 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faed1198-b8c4-46b1-b6a6-5fc35cd7bdf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-f8715414342ae577e0f9a96507f17db4.yaml b/nuclei-templates/cve-less/plugins/formidable-f8715414342ae577e0f9a96507f17db4.yaml new file mode 100644 index 0000000000..40495debcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-f8715414342ae577e0f9a96507f17db4.yaml @@ -0,0 +1,58 @@ +id: formidable-f8715414342ae577e0f9a96507f17db4 + +info: + name: > + Formidable Forms <= 6.0.1 - IP Spoofing via HTTP header + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/909b5421-210d-427a-94a0-e1ea25880cec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable/" + google-query: inurl:"/wp-content/plugins/formidable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-registration-96ed0838fd20f84264d3c063e2ba926e.yaml b/nuclei-templates/cve-less/plugins/formidable-registration-96ed0838fd20f84264d3c063e2ba926e.yaml new file mode 100644 index 0000000000..d09f993c21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-registration-96ed0838fd20f84264d3c063e2ba926e.yaml @@ -0,0 +1,58 @@ +id: formidable-registration-96ed0838fd20f84264d3c063e2ba926e + +info: + name: > + Formidable Registration <= 2.11 - Authenticated (Contributor+) Arbitrary User Password Reset To Account Takeover + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfc04273-0d72-4b18-bcb5-eb1530aefcc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable-registration/" + google-query: inurl:"/wp-content/plugins/formidable-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable-registration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidable-sms-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/cve-less/plugins/formidable-sms-167d9672411be44feb72a5175fd0987c.yaml new file mode 100644 index 0000000000..c18d58d801 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidable-sms-167d9672411be44feb72a5175fd0987c.yaml @@ -0,0 +1,58 @@ +id: formidable-sms-167d9672411be44feb72a5175fd0987c + +info: + name: > + Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f35a20-ffcf-4413-b1ea-748cd6aa6f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidable-sms/" + google-query: inurl:"/wp-content/plugins/formidable-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidable-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidable-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidable-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formidablepro-2-pdf-f2bfced9bfd91f1f83f4f10d9e2a4e2c.yaml b/nuclei-templates/cve-less/plugins/formidablepro-2-pdf-f2bfced9bfd91f1f83f4f10d9e2a4e2c.yaml new file mode 100644 index 0000000000..0b7c60b007 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formidablepro-2-pdf-f2bfced9bfd91f1f83f4f10d9e2a4e2c.yaml @@ -0,0 +1,58 @@ +id: formidablepro-2-pdf-f2bfced9bfd91f1f83f4f10d9e2a4e2c + +info: + name: > + Formidable PRO2PDF <= 3.09 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f6ca11-abfb-4f87-a9f7-0321f1de9abe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formidablepro-2-pdf/" + google-query: inurl:"/wp-content/plugins/formidablepro-2-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formidablepro-2-pdf,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formidablepro-2-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formidablepro-2-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.09') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formilla-chat-and-marketing-b49deb95fc00559c0721d2c968358861.yaml b/nuclei-templates/cve-less/plugins/formilla-chat-and-marketing-b49deb95fc00559c0721d2c968358861.yaml new file mode 100644 index 0000000000..9ae2fdff9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formilla-chat-and-marketing-b49deb95fc00559c0721d2c968358861.yaml @@ -0,0 +1,58 @@ +id: formilla-chat-and-marketing-b49deb95fc00559c0721d2c968358861 + +info: + name: > + Formilla Chat and Marketing Automation <= 1.0 - Authenticated (Administrator+) Cross-Site Scripting via 'FormillaToolsID' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5436d14-cbb5-420f-9f3a-698ce59c1e1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formilla-chat-and-marketing/" + google-query: inurl:"/wp-content/plugins/formilla-chat-and-marketing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formilla-chat-and-marketing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formilla-chat-and-marketing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formilla-chat-and-marketing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formilla-edge-ecf9407059e3582708411befde00831c.yaml b/nuclei-templates/cve-less/plugins/formilla-edge-ecf9407059e3582708411befde00831c.yaml new file mode 100644 index 0000000000..1ca166dcc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formilla-edge-ecf9407059e3582708411befde00831c.yaml @@ -0,0 +1,58 @@ +id: formilla-edge-ecf9407059e3582708411befde00831c + +info: + name: > + Formilla Edge <= 1.0 - Authenticated (Administrator+) Cross-Site Scripting via 'FormillaPluginID' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59f7a1b2-f718-40e7-8030-b9212edf71b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formilla-edge/" + google-query: inurl:"/wp-content/plugins/formilla-edge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formilla-edge,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formilla-edge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formilla-edge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formilla-live-chat-309fdaa44a67ee8c05b1363fafbc2e7a.yaml b/nuclei-templates/cve-less/plugins/formilla-live-chat-309fdaa44a67ee8c05b1363fafbc2e7a.yaml new file mode 100644 index 0000000000..10817798e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formilla-live-chat-309fdaa44a67ee8c05b1363fafbc2e7a.yaml @@ -0,0 +1,58 @@ +id: formilla-live-chat-309fdaa44a67ee8c05b1363fafbc2e7a + +info: + name: > + Formilla Live Chat <= 1.3.0 - Authenticated (Administrator+) Cross-Site Scripting via 'FormillaID' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/044e110d-2435-41b8-8aec-917c329b944c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formilla-live-chat/" + google-query: inurl:"/wp-content/plugins/formilla-live-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formilla-live-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formilla-live-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formilla-live-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-0b29757be7c9544b9f5309f3b1be1e0d.yaml b/nuclei-templates/cve-less/plugins/forminator-0b29757be7c9544b9f5309f3b1be1e0d.yaml new file mode 100644 index 0000000000..3896d555eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-0b29757be7c9544b9f5309f3b1be1e0d.yaml @@ -0,0 +1,58 @@ +id: forminator-0b29757be7c9544b9f5309f3b1be1e0d + +info: + name: > + Forminator <= 1.22.1 - Missing Authorization on 'hubspot_support_request' AJAX function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0cb4434-94c5-42a9-bd86-869058dcbf67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-183d4dac6eb372129600913c83567fc9.yaml b/nuclei-templates/cve-less/plugins/forminator-183d4dac6eb372129600913c83567fc9.yaml new file mode 100644 index 0000000000..b918052a67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-183d4dac6eb372129600913c83567fc9.yaml @@ -0,0 +1,58 @@ +id: forminator-183d4dac6eb372129600913c83567fc9 + +info: + name: > + Forminator <= 1.14.11 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e558100a-5866-4e7f-bae7-47a1f492ab27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-1c0b534ade0c088d820f904818d49367.yaml b/nuclei-templates/cve-less/plugins/forminator-1c0b534ade0c088d820f904818d49367.yaml new file mode 100644 index 0000000000..81b464017e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-1c0b534ade0c088d820f904818d49367.yaml @@ -0,0 +1,58 @@ +id: forminator-1c0b534ade0c088d820f904818d49367 + +info: + name: > + Forminator <= 1.23.3 - Race Condition to Multiple Poll Voting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a40cb2da-dc13-4e20-9602-a4e6c2eade43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-26f35acb3c0f14eb0fe591953d190a10.yaml b/nuclei-templates/cve-less/plugins/forminator-26f35acb3c0f14eb0fe591953d190a10.yaml new file mode 100644 index 0000000000..043d5cbd3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-26f35acb3c0f14eb0fe591953d190a10.yaml @@ -0,0 +1,58 @@ +id: forminator-26f35acb3c0f14eb0fe591953d190a10 + +info: + name: > + Forminator Plugin <= 1.5.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efe6c4aa-5e5d-4e3b-8a38-f85e163a9e00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-286f623357d476ca932bc8210895d763.yaml b/nuclei-templates/cve-less/plugins/forminator-286f623357d476ca932bc8210895d763.yaml new file mode 100644 index 0000000000..367de0de02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-286f623357d476ca932bc8210895d763.yaml @@ -0,0 +1,58 @@ +id: forminator-286f623357d476ca932bc8210895d763 + +info: + name: > + Forminator <= 1.24.6 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cd87da6-1f4c-4a15-8ebb-6e0f8ef72513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-292cb08d9cd5bb1cf7550652732f7a0a.yaml b/nuclei-templates/cve-less/plugins/forminator-292cb08d9cd5bb1cf7550652732f7a0a.yaml new file mode 100644 index 0000000000..fe3797c60f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-292cb08d9cd5bb1cf7550652732f7a0a.yaml @@ -0,0 +1,58 @@ +id: forminator-292cb08d9cd5bb1cf7550652732f7a0a + +info: + name: > + Forminator – Contact Form, Payment Form & Custom Form Builder <= 1.27.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f34b94f-ea72-4a42-abea-2f2eb565ffdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-42f191921072c4fed5defc1af6bdccae.yaml b/nuclei-templates/cve-less/plugins/forminator-42f191921072c4fed5defc1af6bdccae.yaml new file mode 100644 index 0000000000..178efea56a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-42f191921072c4fed5defc1af6bdccae.yaml @@ -0,0 +1,58 @@ +id: forminator-42f191921072c4fed5defc1af6bdccae + +info: + name: > + Forminator – Contact Form, Payment Form & Custom Form Builder <= 1.29.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via forminator_form Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19439622-6396-4f10-ab71-aa243b6812fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-64248c162e0a07dde805cd870763a3a0.yaml b/nuclei-templates/cve-less/plugins/forminator-64248c162e0a07dde805cd870763a3a0.yaml new file mode 100644 index 0000000000..95c81bf48d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-64248c162e0a07dde805cd870763a3a0.yaml @@ -0,0 +1,58 @@ +id: forminator-64248c162e0a07dde805cd870763a3a0 + +info: + name: > + Forminator Plugin <= 1.5.3.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f88286b9-16b2-42a9-b8c6-0a6fe6c136ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-7753a7f9705bcf7c075ba8ba61f788d8.yaml b/nuclei-templates/cve-less/plugins/forminator-7753a7f9705bcf7c075ba8ba61f788d8.yaml new file mode 100644 index 0000000000..bd41d4eecc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-7753a7f9705bcf7c075ba8ba61f788d8.yaml @@ -0,0 +1,58 @@ +id: forminator-7753a7f9705bcf7c075ba8ba61f788d8 + +info: + name: > + Forminator – Contact Form, Payment Form & Custom Form Builder <= 1.13.4 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdee0cd8-b83b-4436-aebe-533f5af03ef1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-7ff8aa4516f6800dd9ef07a8f731d28e.yaml b/nuclei-templates/cve-less/plugins/forminator-7ff8aa4516f6800dd9ef07a8f731d28e.yaml new file mode 100644 index 0000000000..359527a521 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-7ff8aa4516f6800dd9ef07a8f731d28e.yaml @@ -0,0 +1,58 @@ +id: forminator-7ff8aa4516f6800dd9ef07a8f731d28e + +info: + name: > + Forminator <= 1.15.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97cbf2d7-2fdc-4c10-872d-add54687dd9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-8893a21ace79666845ab488b8953c970.yaml b/nuclei-templates/cve-less/plugins/forminator-8893a21ace79666845ab488b8953c970.yaml new file mode 100644 index 0000000000..3ce899c818 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-8893a21ace79666845ab488b8953c970.yaml @@ -0,0 +1,58 @@ +id: forminator-8893a21ace79666845ab488b8953c970 + +info: + name: > + Forminator <= 1.28.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f58d5464-b12d-4d01-985a-68854b0b2fdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.28.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-950d0fecfa65a978eebec0d58fd1e9bc.yaml b/nuclei-templates/cve-less/plugins/forminator-950d0fecfa65a978eebec0d58fd1e9bc.yaml new file mode 100644 index 0000000000..096ef42702 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-950d0fecfa65a978eebec0d58fd1e9bc.yaml @@ -0,0 +1,58 @@ +id: forminator-950d0fecfa65a978eebec0d58fd1e9bc + +info: + name: > + Forminator <= 1.22.1 - Missing Authorization on 'load_recaptcha_preview' AJAX function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/718e54f5-f040-42d6-958d-255d905615d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-956616cf620f8b1a830cdf6f68014a5e.yaml b/nuclei-templates/cve-less/plugins/forminator-956616cf620f8b1a830cdf6f68014a5e.yaml new file mode 100644 index 0000000000..79ba3d0ce3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-956616cf620f8b1a830cdf6f68014a5e.yaml @@ -0,0 +1,58 @@ +id: forminator-956616cf620f8b1a830cdf6f68014a5e + +info: + name: > + Forminator <= 1.27.0 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13cfa202-ab90-46c0-ab53-00995bfdcaa3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.27.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-a6cb8bb474a298f0d13061a17830eac9.yaml b/nuclei-templates/cve-less/plugins/forminator-a6cb8bb474a298f0d13061a17830eac9.yaml new file mode 100644 index 0000000000..98a1405830 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-a6cb8bb474a298f0d13061a17830eac9.yaml @@ -0,0 +1,58 @@ +id: forminator-a6cb8bb474a298f0d13061a17830eac9 + +info: + name: > + Forminator <= 1.22.1 - Missing Authorization on 'load_hcaptcha_preview' AJAX function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ef15cb1-b320-42d9-a2fd-afff2ec8a93b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-bc2f6ff7db9bb1af0cb3049e6fc69b8c.yaml b/nuclei-templates/cve-less/plugins/forminator-bc2f6ff7db9bb1af0cb3049e6fc69b8c.yaml new file mode 100644 index 0000000000..6656cf9100 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-bc2f6ff7db9bb1af0cb3049e6fc69b8c.yaml @@ -0,0 +1,58 @@ +id: forminator-bc2f6ff7db9bb1af0cb3049e6fc69b8c + +info: + name: > + Forminator <= 1.29.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/224233bc-68f3-40e4-8182-4831ccce93fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-bd19f19c61a0ea2da7f41821ae297426.yaml b/nuclei-templates/cve-less/plugins/forminator-bd19f19c61a0ea2da7f41821ae297426.yaml new file mode 100644 index 0000000000..6b93be6622 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-bd19f19c61a0ea2da7f41821ae297426.yaml @@ -0,0 +1,58 @@ +id: forminator-bd19f19c61a0ea2da7f41821ae297426 + +info: + name: > + Forminator <= 1.29.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a6fbb60-811a-4763-b301-694bc8d387e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-e8992ee7cc3a04876d739dcede33aada.yaml b/nuclei-templates/cve-less/plugins/forminator-e8992ee7cc3a04876d739dcede33aada.yaml new file mode 100644 index 0000000000..84d2b5b598 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-e8992ee7cc3a04876d739dcede33aada.yaml @@ -0,0 +1,58 @@ +id: forminator-e8992ee7cc3a04876d739dcede33aada + +info: + name: > + Forminator <= 1.29.0 - Unauthenticated Stored Cross-Site Scripting via File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23feb72c-7e6f-436b-b56e-dc6185302d31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-ee384374dcb64224451204e7db1b00fc.yaml b/nuclei-templates/cve-less/plugins/forminator-ee384374dcb64224451204e7db1b00fc.yaml new file mode 100644 index 0000000000..d5964bc014 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-ee384374dcb64224451204e7db1b00fc.yaml @@ -0,0 +1,58 @@ +id: forminator-ee384374dcb64224451204e7db1b00fc + +info: + name: > + Forminator <= 1.15.2 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d68ab8b-38c8-47aa-8b69-8cebe0a8d24e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forminator-f4febcd0f8092108616f41cc252ca605.yaml b/nuclei-templates/cve-less/plugins/forminator-f4febcd0f8092108616f41cc252ca605.yaml new file mode 100644 index 0000000000..99604eb3bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forminator-f4febcd0f8092108616f41cc252ca605.yaml @@ -0,0 +1,58 @@ +id: forminator-f4febcd0f8092108616f41cc252ca605 + +info: + name: > + Forminator <= 1.24.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00272fe2-52aa-4183-8b57-6b51ad57c657?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forminator/" + google-query: inurl:"/wp-content/plugins/forminator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forminator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forminator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forminator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forms-ada-form-builder-95a617be3572708cabf012c967fad83d.yaml b/nuclei-templates/cve-less/plugins/forms-ada-form-builder-95a617be3572708cabf012c967fad83d.yaml new file mode 100644 index 0000000000..d970b69b39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forms-ada-form-builder-95a617be3572708cabf012c967fad83d.yaml @@ -0,0 +1,58 @@ +id: forms-ada-form-builder-95a617be3572708cabf012c967fad83d + +info: + name: > + Forms Ada <= 1.0 - Reflected Cross-Site Scripting via 'p' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54e330e7-d305-4254-a9e9-4d7f2c54c51c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forms-ada-form-builder/" + google-query: inurl:"/wp-content/plugins/forms-ada-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forms-ada-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forms-ada-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forms-ada-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forms-by-made-it-12ca01b6bd94ae75bcfa758e16b20678.yaml b/nuclei-templates/cve-less/plugins/forms-by-made-it-12ca01b6bd94ae75bcfa758e16b20678.yaml new file mode 100644 index 0000000000..0ce3ec9acd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forms-by-made-it-12ca01b6bd94ae75bcfa758e16b20678.yaml @@ -0,0 +1,58 @@ +id: forms-by-made-it-12ca01b6bd94ae75bcfa758e16b20678 + +info: + name: > + Forms <= 1.12.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3424c187-cf71-41f0-abb8-f0e843750465?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forms-by-made-it/" + google-query: inurl:"/wp-content/plugins/forms-by-made-it/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forms-by-made-it,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forms-by-made-it/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forms-by-made-it" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forms-for-campaign-monitor-d0f30576bf7c027192f1b193ba41eddc.yaml b/nuclei-templates/cve-less/plugins/forms-for-campaign-monitor-d0f30576bf7c027192f1b193ba41eddc.yaml new file mode 100644 index 0000000000..8f4512ee0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forms-for-campaign-monitor-d0f30576bf7c027192f1b193ba41eddc.yaml @@ -0,0 +1,58 @@ +id: forms-for-campaign-monitor-d0f30576bf7c027192f1b193ba41eddc + +info: + name: > + Campaign Monitor for WordPress <= 2.8.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4d7cab5-1641-4ed3-92c7-ad7594dcb74b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forms-for-campaign-monitor/" + google-query: inurl:"/wp-content/plugins/forms-for-campaign-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forms-for-campaign-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forms-for-campaign-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forms-for-campaign-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forms-gutenberg-41cad88ff79d9f1a300cb623d000ffea.yaml b/nuclei-templates/cve-less/plugins/forms-gutenberg-41cad88ff79d9f1a300cb623d000ffea.yaml new file mode 100644 index 0000000000..96ce9fd2a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forms-gutenberg-41cad88ff79d9f1a300cb623d000ffea.yaml @@ -0,0 +1,58 @@ +id: forms-gutenberg-41cad88ff79d9f1a300cb623d000ffea + +info: + name: > + Gutenberg Forms <= 2.2.8.3 - Authenticated(Subscriber+) Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5964dd2a-e388-4454-89f6-aa71e1734d35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forms-gutenberg/" + google-query: inurl:"/wp-content/plugins/forms-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forms-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forms-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forms-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forms-to-zapier-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/forms-to-zapier-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..34468db2ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forms-to-zapier-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: forms-to-zapier-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forms-to-zapier/" + google-query: inurl:"/wp-content/plugins/forms-to-zapier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forms-to-zapier,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forms-to-zapier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forms-to-zapier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forms-to-zapier-fdb7464284f0e3f92d05bc404992df2d.yaml b/nuclei-templates/cve-less/plugins/forms-to-zapier-fdb7464284f0e3f92d05bc404992df2d.yaml new file mode 100644 index 0000000000..537b9dd04c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forms-to-zapier-fdb7464284f0e3f92d05bc404992df2d.yaml @@ -0,0 +1,58 @@ +id: forms-to-zapier-fdb7464284f0e3f92d05bc404992df2d + +info: + name: > + Forms to Zapier, Integromat, IFTTT, Workato, Automate.io, elastic.io, Built.io, APIANT, Webhook <= 1.1.12 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80303684-5e10-474b-b6be-a63327015826?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forms-to-zapier/" + google-query: inurl:"/wp-content/plugins/forms-to-zapier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forms-to-zapier,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forms-to-zapier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forms-to-zapier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formsite-064670bf29900df44464bedf16a7db27.yaml b/nuclei-templates/cve-less/plugins/formsite-064670bf29900df44464bedf16a7db27.yaml new file mode 100644 index 0000000000..5ce96d8d44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formsite-064670bf29900df44464bedf16a7db27.yaml @@ -0,0 +1,58 @@ +id: formsite-064670bf29900df44464bedf16a7db27 + +info: + name: > + Formsite | Embed online forms to collect orders, registrations, leads, and surveys <= 1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/518174ec-44f5-4b5c-a326-0fb2aa661c86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formsite/" + google-query: inurl:"/wp-content/plugins/formsite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formsite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formsite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formsite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formzu-wp-69291e6d8dee217b57f3dde758dcad0f.yaml b/nuclei-templates/cve-less/plugins/formzu-wp-69291e6d8dee217b57f3dde758dcad0f.yaml new file mode 100644 index 0000000000..d796b9f60e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formzu-wp-69291e6d8dee217b57f3dde758dcad0f.yaml @@ -0,0 +1,58 @@ +id: formzu-wp-69291e6d8dee217b57f3dde758dcad0f + +info: + name: > + Formzu WP <= 1.6.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ee73abf-0ab8-48ab-bd94-18ed66f877fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formzu-wp/" + google-query: inurl:"/wp-content/plugins/formzu-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formzu-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formzu-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formzu-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/formzu-wp-f48987de7fcf2018d5328a03cdd21065.yaml b/nuclei-templates/cve-less/plugins/formzu-wp-f48987de7fcf2018d5328a03cdd21065.yaml new file mode 100644 index 0000000000..392f503738 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/formzu-wp-f48987de7fcf2018d5328a03cdd21065.yaml @@ -0,0 +1,58 @@ +id: formzu-wp-f48987de7fcf2018d5328a03cdd21065 + +info: + name: > + Formzu WP <= 1.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/497e0784-8953-4726-929a-7d5ef129e98e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/formzu-wp/" + google-query: inurl:"/wp-content/plugins/formzu-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,formzu-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/formzu-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "formzu-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forum-server-0856197f54ebc4b1a325747e3d0ab80c.yaml b/nuclei-templates/cve-less/plugins/forum-server-0856197f54ebc4b1a325747e3d0ab80c.yaml new file mode 100644 index 0000000000..fa1c91da80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forum-server-0856197f54ebc4b1a325747e3d0ab80c.yaml @@ -0,0 +1,58 @@ +id: forum-server-0856197f54ebc4b1a325747e3d0ab80c + +info: + name: > + WP Forum Server < 1.7.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4a6c1e4-635f-4d4d-87a4-8eeded25f07f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forum-server/" + google-query: inurl:"/wp-content/plugins/forum-server/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forum-server,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forum-server/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forum-server" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forum-server-399de5e730909b7373d74d984520d5d0.yaml b/nuclei-templates/cve-less/plugins/forum-server-399de5e730909b7373d74d984520d5d0.yaml new file mode 100644 index 0000000000..3895e99636 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forum-server-399de5e730909b7373d74d984520d5d0.yaml @@ -0,0 +1,58 @@ +id: forum-server-399de5e730909b7373d74d984520d5d0 + +info: + name: > + WP Forum Server <= 1.6.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85dc6513-90cb-433d-8f8f-5b56b4a76897?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forum-server/" + google-query: inurl:"/wp-content/plugins/forum-server/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forum-server,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forum-server/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forum-server" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forum-server-8cba549bfba1e71b314fc0d37ea95e7a.yaml b/nuclei-templates/cve-less/plugins/forum-server-8cba549bfba1e71b314fc0d37ea95e7a.yaml new file mode 100644 index 0000000000..03c3d0281f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forum-server-8cba549bfba1e71b314fc0d37ea95e7a.yaml @@ -0,0 +1,58 @@ +id: forum-server-8cba549bfba1e71b314fc0d37ea95e7a + +info: + name: > + WP Forum Server <= 1.7.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/190106bd-05ac-4a8f-b7a5-a042092a5713?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forum-server/" + google-query: inurl:"/wp-content/plugins/forum-server/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forum-server,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forum-server/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forum-server" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forum-server-a4cdd9300b8e89d6cefce68027bae177.yaml b/nuclei-templates/cve-less/plugins/forum-server-a4cdd9300b8e89d6cefce68027bae177.yaml new file mode 100644 index 0000000000..8ff205529e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forum-server-a4cdd9300b8e89d6cefce68027bae177.yaml @@ -0,0 +1,58 @@ +id: forum-server-a4cdd9300b8e89d6cefce68027bae177 + +info: + name: > + WP Forum Server < 1.7.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65db2345-4b55-466c-b148-7d954de96a87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forum-server/" + google-query: inurl:"/wp-content/plugins/forum-server/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forum-server,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forum-server/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forum-server" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/forym-befc35f26a9ced6d8b2225ecf15d9b2e.yaml b/nuclei-templates/cve-less/plugins/forym-befc35f26a9ced6d8b2225ecf15d9b2e.yaml new file mode 100644 index 0000000000..c9e6e366f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/forym-befc35f26a9ced6d8b2225ecf15d9b2e.yaml @@ -0,0 +1,58 @@ +id: forym-befc35f26a9ced6d8b2225ecf15d9b2e + +info: + name: > + Forym <= 1.5.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24349a73-d543-433b-9f7c-b12f914fc80f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/forym/" + google-query: inurl:"/wp-content/plugins/forym/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,forym,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/forym/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "forym" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fossura-tag-miner-18c927eeaab747daf8dbc085388c3619.yaml b/nuclei-templates/cve-less/plugins/fossura-tag-miner-18c927eeaab747daf8dbc085388c3619.yaml new file mode 100644 index 0000000000..a9f809955c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fossura-tag-miner-18c927eeaab747daf8dbc085388c3619.yaml @@ -0,0 +1,58 @@ +id: fossura-tag-miner-18c927eeaab747daf8dbc085388c3619 + +info: + name: > + Tag Miner (Automatic Tag Extraction) < 1.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a07a643e-1a4b-47fe-9e4a-b4cc070bce74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fossura-tag-miner/" + google-query: inurl:"/wp-content/plugins/fossura-tag-miner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fossura-tag-miner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fossura-tag-miner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fossura-tag-miner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fossura-tag-miner-b1f4f06fa1d08e23be33495079a7bf7e.yaml b/nuclei-templates/cve-less/plugins/fossura-tag-miner-b1f4f06fa1d08e23be33495079a7bf7e.yaml new file mode 100644 index 0000000000..b2d268ace1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fossura-tag-miner-b1f4f06fa1d08e23be33495079a7bf7e.yaml @@ -0,0 +1,58 @@ +id: fossura-tag-miner-b1f4f06fa1d08e23be33495079a7bf7e + +info: + name: > + Tag Miner (Automatic Tag Extraction) < 1.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dafd1821-1f37-4193-b4bf-19a3d2d15946?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fossura-tag-miner/" + google-query: inurl:"/wp-content/plugins/fossura-tag-miner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fossura-tag-miner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fossura-tag-miner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fossura-tag-miner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fotobook-7418be2024d99eec31c5374180cc36ac.yaml b/nuclei-templates/cve-less/plugins/fotobook-7418be2024d99eec31c5374180cc36ac.yaml new file mode 100644 index 0000000000..4ba9a14712 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fotobook-7418be2024d99eec31c5374180cc36ac.yaml @@ -0,0 +1,58 @@ +id: fotobook-7418be2024d99eec31c5374180cc36ac + +info: + name: > + Fotobook <= 3.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4580748-f5dc-4f05-81d2-a8e9b76a7a7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fotobook/" + google-query: inurl:"/wp-content/plugins/fotobook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fotobook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fotobook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fotobook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fotomoto-8e8e8d42c36c4d2147a0654eb00c12ca.yaml b/nuclei-templates/cve-less/plugins/fotomoto-8e8e8d42c36c4d2147a0654eb00c12ca.yaml new file mode 100644 index 0000000000..00f4193bd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fotomoto-8e8e8d42c36c4d2147a0654eb00c12ca.yaml @@ -0,0 +1,58 @@ +id: fotomoto-8e8e8d42c36c4d2147a0654eb00c12ca + +info: + name: > + Fotomoto <= 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fbeee6b-cbc0-462e-96ba-2fd4f54786b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fotomoto/" + google-query: inurl:"/wp-content/plugins/fotomoto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fotomoto,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fotomoto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fotomoto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foursquare-checkins-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml b/nuclei-templates/cve-less/plugins/foursquare-checkins-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml new file mode 100644 index 0000000000..7e9f1a7a34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foursquare-checkins-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml @@ -0,0 +1,58 @@ +id: foursquare-checkins-9b7bc1f0f7f491c09d5edf25ce5f3958 + +info: + name: > + FourSquare Checkins < 1.3 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32d80824-c420-40e8-8c07-fb17b1b50644?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foursquare-checkins/" + google-query: inurl:"/wp-content/plugins/foursquare-checkins/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foursquare-checkins,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foursquare-checkins/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foursquare-checkins" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foxypress-05da59639245e73e5006b3b27fd29b5e.yaml b/nuclei-templates/cve-less/plugins/foxypress-05da59639245e73e5006b3b27fd29b5e.yaml new file mode 100644 index 0000000000..edcd298109 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foxypress-05da59639245e73e5006b3b27fd29b5e.yaml @@ -0,0 +1,58 @@ +id: foxypress-05da59639245e73e5006b3b27fd29b5e + +info: + name: > + FoxyPress <= 0.4.2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8da0b944-aa60-489b-8622-44b325fcd242?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foxypress/" + google-query: inurl:"/wp-content/plugins/foxypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foxypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foxypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foxypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foxypress-1ea57d4028638a993e3a1865c1c429fb.yaml b/nuclei-templates/cve-less/plugins/foxypress-1ea57d4028638a993e3a1865c1c429fb.yaml new file mode 100644 index 0000000000..b5e2f9f49e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foxypress-1ea57d4028638a993e3a1865c1c429fb.yaml @@ -0,0 +1,58 @@ +id: foxypress-1ea57d4028638a993e3a1865c1c429fb + +info: + name: > + FoxyPress < 0.4.2.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d759d7ab-74d5-4195-9258-7281f49b5132?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foxypress/" + google-query: inurl:"/wp-content/plugins/foxypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foxypress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foxypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foxypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foxypress-28cc3b436a054be9278bf9f654cf7298.yaml b/nuclei-templates/cve-less/plugins/foxypress-28cc3b436a054be9278bf9f654cf7298.yaml new file mode 100644 index 0000000000..c596ca3325 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foxypress-28cc3b436a054be9278bf9f654cf7298.yaml @@ -0,0 +1,58 @@ +id: foxypress-28cc3b436a054be9278bf9f654cf7298 + +info: + name: > + FoxyPress <= 0.4.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/398ebe7e-b0a7-47d8-b2f2-61973182f520?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foxypress/" + google-query: inurl:"/wp-content/plugins/foxypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foxypress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foxypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foxypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foxypress-4392c790af392965f4ef8691acb00317.yaml b/nuclei-templates/cve-less/plugins/foxypress-4392c790af392965f4ef8691acb00317.yaml new file mode 100644 index 0000000000..158f1cc737 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foxypress-4392c790af392965f4ef8691acb00317.yaml @@ -0,0 +1,58 @@ +id: foxypress-4392c790af392965f4ef8691acb00317 + +info: + name: > + FoxyPress <= 0.4.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4301666c-98a5-4028-978f-f50e5b8f4a6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foxypress/" + google-query: inurl:"/wp-content/plugins/foxypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foxypress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foxypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foxypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foxypress-7b0b2b71a9f90e73601e91cbead48f87.yaml b/nuclei-templates/cve-less/plugins/foxypress-7b0b2b71a9f90e73601e91cbead48f87.yaml new file mode 100644 index 0000000000..d8e07cda63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foxypress-7b0b2b71a9f90e73601e91cbead48f87.yaml @@ -0,0 +1,58 @@ +id: foxypress-7b0b2b71a9f90e73601e91cbead48f87 + +info: + name: > + FoxyPress <= 0.4.2.7 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4325e51-5d57-4763-a6c4-29c67330bdbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foxypress/" + google-query: inurl:"/wp-content/plugins/foxypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foxypress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foxypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foxypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foxypress-7ca06934a2b333b70b714ef75d613d92.yaml b/nuclei-templates/cve-less/plugins/foxypress-7ca06934a2b333b70b714ef75d613d92.yaml new file mode 100644 index 0000000000..f54053fd19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foxypress-7ca06934a2b333b70b714ef75d613d92.yaml @@ -0,0 +1,58 @@ +id: foxypress-7ca06934a2b333b70b714ef75d613d92 + +info: + name: > + FoxyPress <= 0.4.2.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fbc88da-8944-433c-b94d-9604ffe13d8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foxypress/" + google-query: inurl:"/wp-content/plugins/foxypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foxypress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foxypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foxypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foxyshop-3853fc9827dc572851bdba569b2c07ee.yaml b/nuclei-templates/cve-less/plugins/foxyshop-3853fc9827dc572851bdba569b2c07ee.yaml new file mode 100644 index 0000000000..b2faf6cc43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foxyshop-3853fc9827dc572851bdba569b2c07ee.yaml @@ -0,0 +1,58 @@ +id: foxyshop-3853fc9827dc572851bdba569b2c07ee + +info: + name: > + FoxyShop <= 4.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5af2f2a8-ab10-4623-abcd-234017424ab9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foxyshop/" + google-query: inurl:"/wp-content/plugins/foxyshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foxyshop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foxyshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foxyshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foxyshop-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/foxyshop-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..18d22f2cf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foxyshop-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: foxyshop-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foxyshop/" + google-query: inurl:"/wp-content/plugins/foxyshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foxyshop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foxyshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foxyshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/foyer-b150ed41da888a826e21d66b48bee30f.yaml b/nuclei-templates/cve-less/plugins/foyer-b150ed41da888a826e21d66b48bee30f.yaml new file mode 100644 index 0000000000..90b3e5538e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/foyer-b150ed41da888a826e21d66b48bee30f.yaml @@ -0,0 +1,58 @@ +id: foyer-b150ed41da888a826e21d66b48bee30f + +info: + name: > + Foyer <= 1.7.5 - Content Injection via Improper Access Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97344674-15df-45e6-9906-f21a9920a6e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/foyer/" + google-query: inurl:"/wp-content/plugins/foyer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,foyer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/foyer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foyer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/free-comments-for-wordpress-vuukle-bc5c2979003bab8e2b8da8b35bec03cb.yaml b/nuclei-templates/cve-less/plugins/free-comments-for-wordpress-vuukle-bc5c2979003bab8e2b8da8b35bec03cb.yaml new file mode 100644 index 0000000000..65e200b64a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/free-comments-for-wordpress-vuukle-bc5c2979003bab8e2b8da8b35bec03cb.yaml @@ -0,0 +1,58 @@ +id: free-comments-for-wordpress-vuukle-bc5c2979003bab8e2b8da8b35bec03cb + +info: + name: > + Vuukle Comments, Reactions, Share Bar, Revenue <= 3.4.31 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff28f33f-85d1-4987-975b-ee3bbcb394f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/free-comments-for-wordpress-vuukle/" + google-query: inurl:"/wp-content/plugins/free-comments-for-wordpress-vuukle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,free-comments-for-wordpress-vuukle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/free-comments-for-wordpress-vuukle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "free-comments-for-wordpress-vuukle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/free-counter-5e704515f93be9a32478b5bfd42a6016.yaml b/nuclei-templates/cve-less/plugins/free-counter-5e704515f93be9a32478b5bfd42a6016.yaml new file mode 100644 index 0000000000..316a700cfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/free-counter-5e704515f93be9a32478b5bfd42a6016.yaml @@ -0,0 +1,58 @@ +id: free-counter-5e704515f93be9a32478b5bfd42a6016 + +info: + name: > + Free counter <= 1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/011fad07-0235-41e1-83b5-09588dd63d50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/free-counter/" + google-query: inurl:"/wp-content/plugins/free-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,free-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/free-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "free-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/free-event-banner-47d3ad7250426f9e950984c71ba1d1f7.yaml b/nuclei-templates/cve-less/plugins/free-event-banner-47d3ad7250426f9e950984c71ba1d1f7.yaml new file mode 100644 index 0000000000..419680f9dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/free-event-banner-47d3ad7250426f9e950984c71ba1d1f7.yaml @@ -0,0 +1,58 @@ +id: free-event-banner-47d3ad7250426f9e950984c71ba1d1f7 + +info: + name: > + Event Banner <= 1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c500c5b-04b9-47d7-9296-dd5378cd5ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/free-event-banner/" + google-query: inurl:"/wp-content/plugins/free-event-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,free-event-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/free-event-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "free-event-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/free-facebook-reviews-and-recommendations-widgets-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/free-facebook-reviews-and-recommendations-widgets-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..96669bcef2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/free-facebook-reviews-and-recommendations-widgets-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: free-facebook-reviews-and-recommendations-widgets-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/free-facebook-reviews-and-recommendations-widgets/" + google-query: inurl:"/wp-content/plugins/free-facebook-reviews-and-recommendations-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,free-facebook-reviews-and-recommendations-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/free-facebook-reviews-and-recommendations-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "free-facebook-reviews-and-recommendations-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/free-google-fonts-e969b7015915e405c8b6916d239e090c.yaml b/nuclei-templates/cve-less/plugins/free-google-fonts-e969b7015915e405c8b6916d239e090c.yaml new file mode 100644 index 0000000000..f1a02e65c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/free-google-fonts-e969b7015915e405c8b6916d239e090c.yaml @@ -0,0 +1,58 @@ +id: free-google-fonts-e969b7015915e405c8b6916d239e090c + +info: + name: > + Google Fonts For WordPress <= 3.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94712f92-5045-420b-9d6d-59a4c031e998?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/free-google-fonts/" + google-query: inurl:"/wp-content/plugins/free-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,free-google-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/free-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "free-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-2199233b48f19d9d270781cada038885.yaml b/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-2199233b48f19d9d270781cada038885.yaml new file mode 100644 index 0000000000..e43c9903f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-2199233b48f19d9d270781cada038885.yaml @@ -0,0 +1,58 @@ +id: free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-2199233b48f19d9d270781cada038885 + +info: + name: > + WP Lead Plus X <= 0.98 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81f993ec-9a7f-4e55-bc88-ea832ce49773?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/" + google-query: inurl:"/wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,free-sales-funnel-squeeze-pages-landing-page-builder-templates-make,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "free-sales-funnel-squeeze-pages-landing-page-builder-templates-make" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-47ea4a03f1b0e77aad4910db22ee3336.yaml b/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-47ea4a03f1b0e77aad4910db22ee3336.yaml new file mode 100644 index 0000000000..2b4562265a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-47ea4a03f1b0e77aad4910db22ee3336.yaml @@ -0,0 +1,58 @@ +id: free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-47ea4a03f1b0e77aad4910db22ee3336 + +info: + name: > + WP Lead Plus X <= 0.99 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddb97db0-cbf3-42be-a5c7-12fc2a2bc9e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/" + google-query: inurl:"/wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,free-sales-funnel-squeeze-pages-landing-page-builder-templates-make,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "free-sales-funnel-squeeze-pages-landing-page-builder-templates-make" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-5b689436673a442f720046bb44c5bd16.yaml b/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-5b689436673a442f720046bb44c5bd16.yaml new file mode 100644 index 0000000000..0f911b63ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-5b689436673a442f720046bb44c5bd16.yaml @@ -0,0 +1,58 @@ +id: free-sales-funnel-squeeze-pages-landing-page-builder-templates-make-5b689436673a442f720046bb44c5bd16 + +info: + name: > + WordPress Landing Page – Squeeze Page – Responsive Landing Page Builder Free – WP Lead Plus X <= 0.98 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cfe69ae-2d42-484e-9c35-672394219ec2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/" + google-query: inurl:"/wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,free-sales-funnel-squeeze-pages-landing-page-builder-templates-make,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "free-sales-funnel-squeeze-pages-landing-page-builder-templates-make" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freemage-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/freemage-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..b1327034ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freemage-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: freemage-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freemage/" + google-query: inurl:"/wp-content/plugins/freemage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freemage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freemage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freemage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freemind-wp-browser-76c5ff841d2dc96506f10e16c9ef0103.yaml b/nuclei-templates/cve-less/plugins/freemind-wp-browser-76c5ff841d2dc96506f10e16c9ef0103.yaml new file mode 100644 index 0000000000..0445b9c42f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freemind-wp-browser-76c5ff841d2dc96506f10e16c9ef0103.yaml @@ -0,0 +1,58 @@ +id: freemind-wp-browser-76c5ff841d2dc96506f10e16c9ef0103 + +info: + name: > + FreeMind WP Browser <= 1.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5f3e34d-07fb-4e49-a4e2-f8e92301b35e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freemind-wp-browser/" + google-query: inurl:"/wp-content/plugins/freemind-wp-browser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freemind-wp-browser,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freemind-wp-browser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freemind-wp-browser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freesoul-deactivate-plugins-1cfbdd673750e91f71ee06cc181559e1.yaml b/nuclei-templates/cve-less/plugins/freesoul-deactivate-plugins-1cfbdd673750e91f71ee06cc181559e1.yaml new file mode 100644 index 0000000000..ba8d0a0d83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freesoul-deactivate-plugins-1cfbdd673750e91f71ee06cc181559e1.yaml @@ -0,0 +1,58 @@ +id: freesoul-deactivate-plugins-1cfbdd673750e91f71ee06cc181559e1 + +info: + name: > + Freesoul Deactivate Plugins <= 1.9.4.0 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c4eb735-46bc-4eed-9d9a-b3bd42d18eed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freesoul-deactivate-plugins/" + google-query: inurl:"/wp-content/plugins/freesoul-deactivate-plugins/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freesoul-deactivate-plugins,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freesoul-deactivate-plugins/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freesoul-deactivate-plugins" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freesoul-deactivate-plugins-5097af34e8087d4348de3729aa8f3d5b.yaml b/nuclei-templates/cve-less/plugins/freesoul-deactivate-plugins-5097af34e8087d4348de3729aa8f3d5b.yaml new file mode 100644 index 0000000000..19879f7c89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freesoul-deactivate-plugins-5097af34e8087d4348de3729aa8f3d5b.yaml @@ -0,0 +1,58 @@ +id: freesoul-deactivate-plugins-5097af34e8087d4348de3729aa8f3d5b + +info: + name: > + Freesoul Deactivate Plugins <= 2.1.3 - Cross-Site Request Forgery via eos_dp_pro_delete_transient + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2949ff1-5c69-4189-99a9-e50c65c78461?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freesoul-deactivate-plugins/" + google-query: inurl:"/wp-content/plugins/freesoul-deactivate-plugins/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freesoul-deactivate-plugins,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freesoul-deactivate-plugins/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freesoul-deactivate-plugins" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fresh-page-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/fresh-page-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..9ae79e8e68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fresh-page-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: fresh-page-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fresh-page/" + google-query: inurl:"/wp-content/plugins/fresh-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fresh-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fresh-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fresh-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freshdesk-support-1d392651d303b5509be666b562dfa310.yaml b/nuclei-templates/cve-less/plugins/freshdesk-support-1d392651d303b5509be666b562dfa310.yaml new file mode 100644 index 0000000000..0ec5f9f161 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freshdesk-support-1d392651d303b5509be666b562dfa310.yaml @@ -0,0 +1,58 @@ +id: freshdesk-support-1d392651d303b5509be666b562dfa310 + +info: + name: > + Freshdesk (official) <= 1.7 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6f20fc3-41e5-4220-ac8b-54eb11719f07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freshdesk-support/" + google-query: inurl:"/wp-content/plugins/freshdesk-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freshdesk-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freshdesk-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freshdesk-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freshdesk-support-7b87f2683ffda077fe6e0a14f3353b96.yaml b/nuclei-templates/cve-less/plugins/freshdesk-support-7b87f2683ffda077fe6e0a14f3353b96.yaml new file mode 100644 index 0000000000..399286dc7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freshdesk-support-7b87f2683ffda077fe6e0a14f3353b96.yaml @@ -0,0 +1,58 @@ +id: freshdesk-support-7b87f2683ffda077fe6e0a14f3353b96 + +info: + name: > + Freshdesk (official) <= 2.3.6 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36d2fbbf-ea0e-4785-9b83-b642e59c713d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freshdesk-support/" + google-query: inurl:"/wp-content/plugins/freshdesk-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freshdesk-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freshdesk-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freshdesk-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freshdesk-support-7c89a34e4a8d83c3780278094a4e89a3.yaml b/nuclei-templates/cve-less/plugins/freshdesk-support-7c89a34e4a8d83c3780278094a4e89a3.yaml new file mode 100644 index 0000000000..23719a113e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freshdesk-support-7c89a34e4a8d83c3780278094a4e89a3.yaml @@ -0,0 +1,58 @@ +id: freshdesk-support-7c89a34e4a8d83c3780278094a4e89a3 + +info: + name: > + Freshdesk (official) <= 2.3.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a226790-0774-43f6-a476-a2dac7ae153b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freshdesk-support/" + google-query: inurl:"/wp-content/plugins/freshdesk-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freshdesk-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freshdesk-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freshdesk-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freshmail-integration-df35942c96b3dddb6612a4cd575a5663.yaml b/nuclei-templates/cve-less/plugins/freshmail-integration-df35942c96b3dddb6612a4cd575a5663.yaml new file mode 100644 index 0000000000..bcac64e6bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freshmail-integration-df35942c96b3dddb6612a4cd575a5663.yaml @@ -0,0 +1,58 @@ +id: freshmail-integration-df35942c96b3dddb6612a4cd575a5663 + +info: + name: > + FreshMail For WordPress <= 2.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10ffe689-143a-4232-8094-45844dc5262b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freshmail-integration/" + google-query: inurl:"/wp-content/plugins/freshmail-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freshmail-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freshmail-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freshmail-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freshmail-integration-fc5d9e94a9531f198a2342d8d3133a1e.yaml b/nuclei-templates/cve-less/plugins/freshmail-integration-fc5d9e94a9531f198a2342d8d3133a1e.yaml new file mode 100644 index 0000000000..e15651f086 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freshmail-integration-fc5d9e94a9531f198a2342d8d3133a1e.yaml @@ -0,0 +1,58 @@ +id: freshmail-integration-fc5d9e94a9531f198a2342d8d3133a1e + +info: + name: > + FreshMail For WordPress <= 2.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e87fe70d-5ac3-40ee-a8d0-601d7b417562?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freshmail-integration/" + google-query: inurl:"/wp-content/plugins/freshmail-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freshmail-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freshmail-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freshmail-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freshmail-newsletter-65920cbefe2613a05348e64d8746a7b6.yaml b/nuclei-templates/cve-less/plugins/freshmail-newsletter-65920cbefe2613a05348e64d8746a7b6.yaml new file mode 100644 index 0000000000..71b8fc6df7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freshmail-newsletter-65920cbefe2613a05348e64d8746a7b6.yaml @@ -0,0 +1,58 @@ +id: freshmail-newsletter-65920cbefe2613a05348e64d8746a7b6 + +info: + name: > + Freshmail for WordPress <= 1.5.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db4dbbbe-1edb-47a6-8d11-8a019e05dfae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freshmail-newsletter/" + google-query: inurl:"/wp-content/plugins/freshmail-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freshmail-newsletter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freshmail-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freshmail-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/freshmail-newsletter-f59240064f03e8205e770b15917de7bd.yaml b/nuclei-templates/cve-less/plugins/freshmail-newsletter-f59240064f03e8205e770b15917de7bd.yaml new file mode 100644 index 0000000000..05bc3708dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/freshmail-newsletter-f59240064f03e8205e770b15917de7bd.yaml @@ -0,0 +1,58 @@ +id: freshmail-newsletter-f59240064f03e8205e770b15917de7bd + +info: + name: > + Freshmail <= 1.5.8 - Multiple SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5fee6e4-b985-4190-953b-133bc90e47da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/freshmail-newsletter/" + google-query: inurl:"/wp-content/plugins/freshmail-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,freshmail-newsletter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/freshmail-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freshmail-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/friechat-d27688edaecd2e6ea6e4e18925595027.yaml b/nuclei-templates/cve-less/plugins/friechat-d27688edaecd2e6ea6e4e18925595027.yaml new file mode 100644 index 0000000000..7b6230cbf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/friechat-d27688edaecd2e6ea6e4e18925595027.yaml @@ -0,0 +1,58 @@ +id: friechat-d27688edaecd2e6ea6e4e18925595027 + +info: + name: > + FrieChat - WordPress Chat Plugin < 1.0.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c542b535-f75c-4f63-a3d8-7f80139ac97e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/friechat/" + google-query: inurl:"/wp-content/plugins/friechat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,friechat,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/friechat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "friechat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/friends-5ca6e072da0718d54bf45a16b11714b0.yaml b/nuclei-templates/cve-less/plugins/friends-5ca6e072da0718d54bf45a16b11714b0.yaml new file mode 100644 index 0000000000..b32fcaa65f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/friends-5ca6e072da0718d54bf45a16b11714b0.yaml @@ -0,0 +1,58 @@ +id: friends-5ca6e072da0718d54bf45a16b11714b0 + +info: + name: > + Friends <= 2.8.5 - Authenticated (Admin+) Blind Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72e1fbce-86ae-4518-a613-7c322193acf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/friends/" + google-query: inurl:"/wp-content/plugins/friends/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,friends,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/friends/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "friends" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-editor-442cb89e3902ba64d65dffe5c1dfe1c2.yaml b/nuclei-templates/cve-less/plugins/front-editor-442cb89e3902ba64d65dffe5c1dfe1c2.yaml new file mode 100644 index 0000000000..66b439e13c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-editor-442cb89e3902ba64d65dffe5c1dfe1c2.yaml @@ -0,0 +1,58 @@ +id: front-editor-442cb89e3902ba64d65dffe5c1dfe1c2 + +info: + name: > + Front User Submit | Front Editor <= 3.7.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f34722fb-e852-4194-b839-7d885d212fc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-editor/" + google-query: inurl:"/wp-content/plugins/front-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-editor-61e60e72ae19f21a2374d506ca4c56c0.yaml b/nuclei-templates/cve-less/plugins/front-editor-61e60e72ae19f21a2374d506ca4c56c0.yaml new file mode 100644 index 0000000000..44b1dab275 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-editor-61e60e72ae19f21a2374d506ca4c56c0.yaml @@ -0,0 +1,58 @@ +id: front-editor-61e60e72ae19f21a2374d506ca4c56c0 + +info: + name: > + Front User Submit | Front Editor <= 3.8.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bc03b4a-f7ec-4827-b914-0560b9268b6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-editor/" + google-query: inurl:"/wp-content/plugins/front-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-editor-6d00e8bb2297cf89cd61e97ee33f9584.yaml b/nuclei-templates/cve-less/plugins/front-editor-6d00e8bb2297cf89cd61e97ee33f9584.yaml new file mode 100644 index 0000000000..2860c0d3ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-editor-6d00e8bb2297cf89cd61e97ee33f9584.yaml @@ -0,0 +1,58 @@ +id: front-editor-6d00e8bb2297cf89cd61e97ee33f9584 + +info: + name: > + Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor <= 4.4.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82eb759f-e8d5-40c6-998f-f6981d9d6644?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-editor/" + google-query: inurl:"/wp-content/plugins/front-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/front-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..839dea8b7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: front-editor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-editor/" + google-query: inurl:"/wp-content/plugins/front-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-editor-daaaa272b2f5cd2cb1ddbf8cf5560d23.yaml b/nuclei-templates/cve-less/plugins/front-editor-daaaa272b2f5cd2cb1ddbf8cf5560d23.yaml new file mode 100644 index 0000000000..81db7e6111 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-editor-daaaa272b2f5cd2cb1ddbf8cf5560d23.yaml @@ -0,0 +1,58 @@ +id: front-editor-daaaa272b2f5cd2cb1ddbf8cf5560d23 + +info: + name: > + Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor <= 4.3.0 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfea441c-2e77-47fa-8f6e-8d17d0c90ebe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-editor/" + google-query: inurl:"/wp-content/plugins/front-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-end-editor-eff7f0485f433e2b60a3d36ae5c865fc.yaml b/nuclei-templates/cve-less/plugins/front-end-editor-eff7f0485f433e2b60a3d36ae5c865fc.yaml new file mode 100644 index 0000000000..0735db78d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-end-editor-eff7f0485f433e2b60a3d36ae5c865fc.yaml @@ -0,0 +1,58 @@ +id: front-end-editor-eff7f0485f433e2b60a3d36ae5c865fc + +info: + name: > + Front-end Editor < 2.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f271c2e7-9d58-4dea-95d3-3ffc4ec7c3b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-end-editor/" + google-query: inurl:"/wp-content/plugins/front-end-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-end-editor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-end-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-end-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-end-only-users-64fa318eea101296cd3a97fbe96ebb75.yaml b/nuclei-templates/cve-less/plugins/front-end-only-users-64fa318eea101296cd3a97fbe96ebb75.yaml new file mode 100644 index 0000000000..62472d0665 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-end-only-users-64fa318eea101296cd3a97fbe96ebb75.yaml @@ -0,0 +1,58 @@ +id: front-end-only-users-64fa318eea101296cd3a97fbe96ebb75 + +info: + name: > + Front End Users <= 3.2.27 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e076e054-6a0b-4c08-b0cc-bd3a5b0751e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-end-only-users/" + google-query: inurl:"/wp-content/plugins/front-end-only-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-end-only-users,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-end-only-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-end-only-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-end-only-users-9934720aa2c12ee56875eafe6d4b5c05.yaml b/nuclei-templates/cve-less/plugins/front-end-only-users-9934720aa2c12ee56875eafe6d4b5c05.yaml new file mode 100644 index 0000000000..8080e03a25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-end-only-users-9934720aa2c12ee56875eafe6d4b5c05.yaml @@ -0,0 +1,58 @@ +id: front-end-only-users-9934720aa2c12ee56875eafe6d4b5c05 + +info: + name: > + Front End Users <= 3.2.24 - Missing Authorization to Unauthenticated Registered User Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ccfafaf-902f-4142-90b3-9f70800eb377?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-end-only-users/" + google-query: inurl:"/wp-content/plugins/front-end-only-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-end-only-users,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-end-only-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-end-only-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-end-only-users-b32372bcfcf7108428ee834bd234fb8e.yaml b/nuclei-templates/cve-less/plugins/front-end-only-users-b32372bcfcf7108428ee834bd234fb8e.yaml new file mode 100644 index 0000000000..7b0efdf03b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-end-only-users-b32372bcfcf7108428ee834bd234fb8e.yaml @@ -0,0 +1,58 @@ +id: front-end-only-users-b32372bcfcf7108428ee834bd234fb8e + +info: + name: > + Front End Users <= 3.2.24 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee13399f-0fc9-40f3-93f5-34c913d54aa0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-end-only-users/" + google-query: inurl:"/wp-content/plugins/front-end-only-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-end-only-users,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-end-only-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-end-only-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-end-pm-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/front-end-pm-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dc42a4892b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-end-pm-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: front-end-pm-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-end-pm/" + google-query: inurl:"/wp-content/plugins/front-end-pm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-end-pm,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-end-pm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-end-pm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-end-pm-d25fbd06f353d86f93a0e72e7cf70e64.yaml b/nuclei-templates/cve-less/plugins/front-end-pm-d25fbd06f353d86f93a0e72e7cf70e64.yaml new file mode 100644 index 0000000000..f98a3ba874 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-end-pm-d25fbd06f353d86f93a0e72e7cf70e64.yaml @@ -0,0 +1,58 @@ +id: front-end-pm-d25fbd06f353d86f93a0e72e7cf70e64 + +info: + name: > + Front End PM < 11.4.3 - Sensitive Information Exposure via Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8250c277-200a-4808-98ae-ede169aad3fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-end-pm/" + google-query: inurl:"/wp-content/plugins/front-end-pm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-end-pm,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-end-pm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-end-pm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/front-end-upload-457418759b22f908312742a3d8bc5f67.yaml b/nuclei-templates/cve-less/plugins/front-end-upload-457418759b22f908312742a3d8bc5f67.yaml new file mode 100644 index 0000000000..1b7f009283 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/front-end-upload-457418759b22f908312742a3d8bc5f67.yaml @@ -0,0 +1,58 @@ +id: front-end-upload-457418759b22f908312742a3d8bc5f67 + +info: + name: > + Front End Upload < 0.5.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c77619cd-8d14-42b9-a536-cf39c50e714a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/front-end-upload/" + google-query: inurl:"/wp-content/plugins/front-end-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,front-end-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/front-end-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "front-end-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/frontend-admin-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/frontend-admin-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0e98fb78d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/frontend-admin-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: frontend-admin-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/frontend-admin/" + google-query: inurl:"/wp-content/plugins/frontend-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,frontend-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/frontend-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "frontend-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/frontend-dashboard-ab5a35988c81716c4246b4eebac9618b.yaml b/nuclei-templates/cve-less/plugins/frontend-dashboard-ab5a35988c81716c4246b4eebac9618b.yaml new file mode 100644 index 0000000000..41c7461470 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/frontend-dashboard-ab5a35988c81716c4246b4eebac9618b.yaml @@ -0,0 +1,58 @@ +id: frontend-dashboard-ab5a35988c81716c4246b4eebac9618b + +info: + name: > + Frontend Dashboard <= 2.2.2 - + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2e96557-7341-4da9-81ca-2bd17a85559e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/frontend-dashboard/" + google-query: inurl:"/wp-content/plugins/frontend-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,frontend-dashboard,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/frontend-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "frontend-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/frontend-dashboard-d5fd81597164f2848144dc46b48d8bc3.yaml b/nuclei-templates/cve-less/plugins/frontend-dashboard-d5fd81597164f2848144dc46b48d8bc3.yaml new file mode 100644 index 0000000000..dfab40efc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/frontend-dashboard-d5fd81597164f2848144dc46b48d8bc3.yaml @@ -0,0 +1,58 @@ +id: frontend-dashboard-d5fd81597164f2848144dc46b48d8bc3 + +info: + name: > + Frontend Dashboard <= 2.2.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9ca2479-10ce-42ec-a9f3-0f91119d9525?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/frontend-dashboard/" + google-query: inurl:"/wp-content/plugins/frontend-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,frontend-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/frontend-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "frontend-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/frontend-group-restriction-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/frontend-group-restriction-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e2eedaeb34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/frontend-group-restriction-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: frontend-group-restriction-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/frontend-group-restriction-for-learndash/" + google-query: inurl:"/wp-content/plugins/frontend-group-restriction-for-learndash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,frontend-group-restriction-for-learndash,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/frontend-group-restriction-for-learndash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "frontend-group-restriction-for-learndash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/frontend-uploader-5804085185dabeb708155bde523d6d27.yaml b/nuclei-templates/cve-less/plugins/frontend-uploader-5804085185dabeb708155bde523d6d27.yaml new file mode 100644 index 0000000000..c3d08fcde4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/frontend-uploader-5804085185dabeb708155bde523d6d27.yaml @@ -0,0 +1,58 @@ +id: frontend-uploader-5804085185dabeb708155bde523d6d27 + +info: + name: > + Frontend Uploader < 0.9.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a0974a5-cfed-4d4d-ae91-f74d9cd531e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/frontend-uploader/" + google-query: inurl:"/wp-content/plugins/frontend-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,frontend-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/frontend-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "frontend-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/frontend-uploader-968d2b25d7330f5b3338dbe58174f4a6.yaml b/nuclei-templates/cve-less/plugins/frontend-uploader-968d2b25d7330f5b3338dbe58174f4a6.yaml new file mode 100644 index 0000000000..74988f5e1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/frontend-uploader-968d2b25d7330f5b3338dbe58174f4a6.yaml @@ -0,0 +1,58 @@ +id: frontend-uploader-968d2b25d7330f5b3338dbe58174f4a6 + +info: + name: > + Frontend Uploader <= 1.3.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/770f3c25-effb-40ea-bd1c-7874c456ab0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/frontend-uploader/" + google-query: inurl:"/wp-content/plugins/frontend-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,frontend-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/frontend-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "frontend-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/frontier-post-2bc2ba180bc24d4dc3efaf03022e4d70.yaml b/nuclei-templates/cve-less/plugins/frontier-post-2bc2ba180bc24d4dc3efaf03022e4d70.yaml new file mode 100644 index 0000000000..4809064cfd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/frontier-post-2bc2ba180bc24d4dc3efaf03022e4d70.yaml @@ -0,0 +1,58 @@ +id: frontier-post-2bc2ba180bc24d4dc3efaf03022e4d70 + +info: + name: > + Frontier Post <= 6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24ef5844-93d6-4ba3-bd0a-b8837bbd7baf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/frontier-post/" + google-query: inurl:"/wp-content/plugins/frontier-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,frontier-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/frontier-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "frontier-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/frontpage-manager-ec922857042222c2b2c5391db25ce37a.yaml b/nuclei-templates/cve-less/plugins/frontpage-manager-ec922857042222c2b2c5391db25ce37a.yaml new file mode 100644 index 0000000000..242f4bbffb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/frontpage-manager-ec922857042222c2b2c5391db25ce37a.yaml @@ -0,0 +1,58 @@ +id: frontpage-manager-ec922857042222c2b2c5391db25ce37a + +info: + name: > + Frontpage Manager <= 1.3 - Cross-Site Request Forgery via admin_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/953f4838-d0d5-4546-ac97-c1b442236c5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/frontpage-manager/" + google-query: inurl:"/wp-content/plugins/frontpage-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,frontpage-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/frontpage-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "frontpage-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fs-license-manager-28e4059a1c8041c52ed2e0e28f51c1c6.yaml b/nuclei-templates/cve-less/plugins/fs-license-manager-28e4059a1c8041c52ed2e0e28f51c1c6.yaml new file mode 100644 index 0000000000..2069358a5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fs-license-manager-28e4059a1c8041c52ed2e0e28f51c1c6.yaml @@ -0,0 +1,58 @@ +id: fs-license-manager-28e4059a1c8041c52ed2e0e28f51c1c6 + +info: + name: > + WooCommerce License Manager <= 5.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e67b6467-b96b-431c-9a0d-91919ab1c138?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fs-license-manager/" + google-query: inurl:"/wp-content/plugins/fs-license-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fs-license-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fs-license-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fs-license-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fs-real-estate-plugin-be1a1ff24188695237f37e3ff16d42cc.yaml b/nuclei-templates/cve-less/plugins/fs-real-estate-plugin-be1a1ff24188695237f37e3ff16d42cc.yaml new file mode 100644 index 0000000000..dfced1e3f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fs-real-estate-plugin-be1a1ff24188695237f37e3ff16d42cc.yaml @@ -0,0 +1,58 @@ +id: fs-real-estate-plugin-be1a1ff24188695237f37e3ff16d42cc + +info: + name: > + FireStorm Professional Real Estate Plugin <= 2.06.03 - SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/854e5d70-f42f-48c4-b1bb-687610f86cfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fs-real-estate-plugin/" + google-query: inurl:"/wp-content/plugins/fs-real-estate-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fs-real-estate-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fs-real-estate-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fs-real-estate-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.06.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fs-shopping-cart-41d0ef3672db9c552872805c429ef89f.yaml b/nuclei-templates/cve-less/plugins/fs-shopping-cart-41d0ef3672db9c552872805c429ef89f.yaml new file mode 100644 index 0000000000..72c32a3fea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fs-shopping-cart-41d0ef3672db9c552872805c429ef89f.yaml @@ -0,0 +1,58 @@ +id: fs-shopping-cart-41d0ef3672db9c552872805c429ef89f + +info: + name: > + FireStorm Shopping Cart eCommerce Plugin <= 2.07.02 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87e408c4-55da-4765-8ca6-e709b9045c8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fs-shopping-cart/" + google-query: inurl:"/wp-content/plugins/fs-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fs-shopping-cart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fs-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fs-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.07.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fscf-sms-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/cve-less/plugins/fscf-sms-167d9672411be44feb72a5175fd0987c.yaml new file mode 100644 index 0000000000..84f8d760cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fscf-sms-167d9672411be44feb72a5175fd0987c.yaml @@ -0,0 +1,58 @@ +id: fscf-sms-167d9672411be44feb72a5175fd0987c + +info: + name: > + Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f35a20-ffcf-4413-b1ea-748cd6aa6f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fscf-sms/" + google-query: inurl:"/wp-content/plugins/fscf-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fscf-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fscf-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fscf-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fsflex-local-fonts-4ccd73756d3ff800ac0459f5347027d3.yaml b/nuclei-templates/cve-less/plugins/fsflex-local-fonts-4ccd73756d3ff800ac0459f5347027d3.yaml new file mode 100644 index 0000000000..73ee6f1cb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fsflex-local-fonts-4ccd73756d3ff800ac0459f5347027d3.yaml @@ -0,0 +1,58 @@ +id: fsflex-local-fonts-4ccd73756d3ff800ac0459f5347027d3 + +info: + name: > + Flex Local Fonts <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5744ed4-f150-48a6-9f5d-d49f9d4c8454?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fsflex-local-fonts/" + google-query: inurl:"/wp-content/plugins/fsflex-local-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fsflex-local-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fsflex-local-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fsflex-local-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ftp-access-3fbce7126258b6f86e3d8d39cbcb69cc.yaml b/nuclei-templates/cve-less/plugins/ftp-access-3fbce7126258b6f86e3d8d39cbcb69cc.yaml new file mode 100644 index 0000000000..0034038c7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ftp-access-3fbce7126258b6f86e3d8d39cbcb69cc.yaml @@ -0,0 +1,58 @@ +id: ftp-access-3fbce7126258b6f86e3d8d39cbcb69cc + +info: + name: > + FTP Access <= 1.0 - Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a1e0d55-2894-450b-afaf-134a13512403?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ftp-access/" + google-query: inurl:"/wp-content/plugins/ftp-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ftp-access,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ftp-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ftp-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fudousan-plugin-65a4435f7b10b8d8206ed3ab27dff439.yaml b/nuclei-templates/cve-less/plugins/fudousan-plugin-65a4435f7b10b8d8206ed3ab27dff439.yaml new file mode 100644 index 0000000000..ee9339ab0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fudousan-plugin-65a4435f7b10b8d8206ed3ab27dff439.yaml @@ -0,0 +1,58 @@ +id: fudousan-plugin-65a4435f7b10b8d8206ed3ab27dff439 + +info: + name: > + Fudousan Plugin <= 5.7.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/413fa88f-1f06-4386-9cc1-53009da939d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fudousan-plugin/" + google-query: inurl:"/wp-content/plugins/fudousan-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fudousan-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fudousan-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fudousan-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/full-customer-1e47a59c0ad1f7f985e2120ccff4f8d1.yaml b/nuclei-templates/cve-less/plugins/full-customer-1e47a59c0ad1f7f985e2120ccff4f8d1.yaml new file mode 100644 index 0000000000..610429303c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/full-customer-1e47a59c0ad1f7f985e2120ccff4f8d1.yaml @@ -0,0 +1,58 @@ +id: full-customer-1e47a59c0ad1f7f985e2120ccff4f8d1 + +info: + name: > + FULL - Customer <= 2.2.3 - Authenticated(Subscriber+) Improper Authorization to Arbitrary Plugin Installation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9799df3f-e34e-42a7-8a72-fa57682f7014?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/full-customer/" + google-query: inurl:"/wp-content/plugins/full-customer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,full-customer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/full-customer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "full-customer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/full-customer-cb4a0a7493c7105139c64a6aefea1dd1.yaml b/nuclei-templates/cve-less/plugins/full-customer-cb4a0a7493c7105139c64a6aefea1dd1.yaml new file mode 100644 index 0000000000..6dc74da443 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/full-customer-cb4a0a7493c7105139c64a6aefea1dd1.yaml @@ -0,0 +1,58 @@ +id: full-customer-cb4a0a7493c7105139c64a6aefea1dd1 + +info: + name: > + FULL - Customer <= 2.2.3 - Authenticated(Subscriber+) Information Disclosure via Health Check + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a77d0fb5-8829-407d-a40a-169cf0c5f837?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/full-customer/" + google-query: inurl:"/wp-content/plugins/full-customer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,full-customer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/full-customer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "full-customer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/full-page-blog-designer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/full-page-blog-designer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9fb0f27910 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/full-page-blog-designer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: full-page-blog-designer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/full-page-blog-designer/" + google-query: inurl:"/wp-content/plugins/full-page-blog-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,full-page-blog-designer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/full-page-blog-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "full-page-blog-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/full-site-editing-405731b58f15425302771df60a27b5be.yaml b/nuclei-templates/cve-less/plugins/full-site-editing-405731b58f15425302771df60a27b5be.yaml new file mode 100644 index 0000000000..291bc53366 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/full-site-editing-405731b58f15425302771df60a27b5be.yaml @@ -0,0 +1,58 @@ +id: full-site-editing-405731b58f15425302771df60a27b5be + +info: + name: > + WordPress.com Editing Toolkit <= 3.78784 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b54307fb-ecbc-4742-9deb-59dbb85b4a7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/full-site-editing/" + google-query: inurl:"/wp-content/plugins/full-site-editing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,full-site-editing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/full-site-editing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "full-site-editing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.78784') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/full-width-responsive-slider-wp-c94b94b1075a77552263f3a72928ed0c.yaml b/nuclei-templates/cve-less/plugins/full-width-responsive-slider-wp-c94b94b1075a77552263f3a72928ed0c.yaml new file mode 100644 index 0000000000..a37d232147 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/full-width-responsive-slider-wp-c94b94b1075a77552263f3a72928ed0c.yaml @@ -0,0 +1,58 @@ +id: full-width-responsive-slider-wp-c94b94b1075a77552263f3a72928ed0c + +info: + name: > + Full Width Banner Slider Wp <= 1.1.7 - Reflected Cross-Site Scripting via search_term + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb4bb127-360d-4f17-9da9-f7be17140ff3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/full-width-responsive-slider-wp/" + google-query: inurl:"/wp-content/plugins/full-width-responsive-slider-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,full-width-responsive-slider-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/full-width-responsive-slider-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "full-width-responsive-slider-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fullscreen-galleria-5800bdb88427729dfe9beda3923c95e4.yaml b/nuclei-templates/cve-less/plugins/fullscreen-galleria-5800bdb88427729dfe9beda3923c95e4.yaml new file mode 100644 index 0000000000..8a3eccaeb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fullscreen-galleria-5800bdb88427729dfe9beda3923c95e4.yaml @@ -0,0 +1,58 @@ +id: fullscreen-galleria-5800bdb88427729dfe9beda3923c95e4 + +info: + name: > + Fullscreen Galleria <= 1.6.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efb0c7d9-0e93-404b-9032-54d64cfcd4c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fullscreen-galleria/" + google-query: inurl:"/wp-content/plugins/fullscreen-galleria/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fullscreen-galleria,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fullscreen-galleria/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fullscreen-galleria" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fulltext-search-b0298fb4feee8bd9ed9da9efccd4ef90.yaml b/nuclei-templates/cve-less/plugins/fulltext-search-b0298fb4feee8bd9ed9da9efccd4ef90.yaml new file mode 100644 index 0000000000..aad8d5a128 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fulltext-search-b0298fb4feee8bd9ed9da9efccd4ef90.yaml @@ -0,0 +1,58 @@ +id: fulltext-search-b0298fb4feee8bd9ed9da9efccd4ef90 + +info: + name: > + WP Fast Total Search <= 1.59.211 - Authenticated (Contributor+) Stored Cross-Site Scripting via WPFTS Live Search Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec4d27d6-b54f-4fac-9a49-6798da4f0acc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fulltext-search/" + google-query: inurl:"/wp-content/plugins/fulltext-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fulltext-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fulltext-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fulltext-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.59.211') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fullworks-anti-spam-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/fullworks-anti-spam-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8b306cecb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fullworks-anti-spam-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: fullworks-anti-spam-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fullworks-anti-spam/" + google-query: inurl:"/wp-content/plugins/fullworks-anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fullworks-anti-spam,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fullworks-anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fullworks-anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funcaptcha-7c2f84ceedf786d66412b2ddd9745e29.yaml b/nuclei-templates/cve-less/plugins/funcaptcha-7c2f84ceedf786d66412b2ddd9745e29.yaml new file mode 100644 index 0000000000..b45a1c4789 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funcaptcha-7c2f84ceedf786d66412b2ddd9745e29.yaml @@ -0,0 +1,58 @@ +id: funcaptcha-7c2f84ceedf786d66412b2ddd9745e29 + +info: + name: > + FunCaptcha – Anti-Spam CAPTCHA < 0.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f9bf252-dcfb-4142-8301-1a5b565e975a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funcaptcha/" + google-query: inurl:"/wp-content/plugins/funcaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funcaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funcaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funcaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnel-builder-156cbee34f493f34443d5f3b942f355c.yaml b/nuclei-templates/cve-less/plugins/funnel-builder-156cbee34f493f34443d5f3b942f355c.yaml new file mode 100644 index 0000000000..ccce079578 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnel-builder-156cbee34f493f34443d5f3b942f355c.yaml @@ -0,0 +1,58 @@ +id: funnel-builder-156cbee34f493f34443d5f3b942f355c + +info: + name: > + Funnel Builder for WordPress by FunnelKit <= 2.14.3 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf172a41-31dc-4864-9385-53decdc70aeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnel-builder/" + google-query: inurl:"/wp-content/plugins/funnel-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnel-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnel-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnel-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-1389f4413b4c34ddc59ef4e67e6f0a3f.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-1389f4413b4c34ddc59ef4e67e6f0a3f.yaml new file mode 100644 index 0000000000..13da86ea8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-1389f4413b4c34ddc59ef4e67e6f0a3f.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-1389f4413b4c34ddc59ef4e67e6f0a3f + +info: + name: > + Funnelforms Free <= 3.4 - Missing Authorization to Enable/Disable Dark Mode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccb34b44-9fa4-4ebe-b217-b2a42920247f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-1d54b8b23176b36e6deb663d5a8ceaf5.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-1d54b8b23176b36e6deb663d5a8ceaf5.yaml new file mode 100644 index 0000000000..8f0e1c0690 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-1d54b8b23176b36e6deb663d5a8ceaf5.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-1d54b8b23176b36e6deb663d5a8ceaf5 + +info: + name: > + Funnelforms Free <= 3.4 - Missing Authorization to Post Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/816f5fc1-e4e6-4c0d-b222-fe733f026e33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-21adcc5933f66f0dc2a717df7e950d3b.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-21adcc5933f66f0dc2a717df7e950d3b.yaml new file mode 100644 index 0000000000..e1c73dfd0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-21adcc5933f66f0dc2a717df7e950d3b.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-21adcc5933f66f0dc2a717df7e950d3b + +info: + name: > + Funnelforms Free <= 3.4 - Missing Authorization to New Category Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ec3051e-a5e4-48ee-8f8e-eb5dbc482f33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-51b13423fa98551af760a9195cddd0e6.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-51b13423fa98551af760a9195cddd0e6.yaml new file mode 100644 index 0000000000..284543c946 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-51b13423fa98551af760a9195cddd0e6.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-51b13423fa98551af760a9195cddd0e6 + +info: + name: > + Funnelforms Free <= 3.4 - Cross-Site Request Forgery to Arbitrary Post Duplication + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d35ec0f0-fa7a-4531-b5f7-5adcf2af051c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-5627877412d66448db75b857038f84e0.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-5627877412d66448db75b857038f84e0.yaml new file mode 100644 index 0000000000..25d87b0755 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-5627877412d66448db75b857038f84e0.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-5627877412d66448db75b857038f84e0 + +info: + name: > + Funnelforms Free <= 3.4 - Cross-Site Request Forgery to Arbitrary Post Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72e4428b-d2cd-471f-9821-947f4601fd64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-706745fef06bc5b6b3083d2b8e19d2e9.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-706745fef06bc5b6b3083d2b8e19d2e9.yaml new file mode 100644 index 0000000000..4699df2c1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-706745fef06bc5b6b3083d2b8e19d2e9.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-706745fef06bc5b6b3083d2b8e19d2e9 + +info: + name: > + Funnelforms Free <= 3.3.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebcbf872-1420-4a57-a4b4-8a52ba74e0a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-7e168d2cbd20b0d5ec60c962781efa94.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-7e168d2cbd20b0d5ec60c962781efa94.yaml new file mode 100644 index 0000000000..a497d53b5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-7e168d2cbd20b0d5ec60c962781efa94.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-7e168d2cbd20b0d5ec60c962781efa94 + +info: + name: > + Funnelforms Free <= 3.4 - Missing Authorization to Test Email Sending + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64248d15-e6a7-442f-b269-e9f629d297d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-8cbb632e23e9fd1207c7a31fa3fa33cd.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-8cbb632e23e9fd1207c7a31fa3fa33cd.yaml new file mode 100644 index 0000000000..ad9ca9d354 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-8cbb632e23e9fd1207c7a31fa3fa33cd.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-8cbb632e23e9fd1207c7a31fa3fa33cd + +info: + name: > + Funnelforms Free <= 3.4 - Missing Authorization to Arbitrary Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/400fe58b-8203-4fd5-a3d3-d30eb1b8cd85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-a0259835bb015f0f8ae0efa060f9f185.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-a0259835bb015f0f8ae0efa060f9f185.yaml new file mode 100644 index 0000000000..2e39458d4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-a0259835bb015f0f8ae0efa060f9f185.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-a0259835bb015f0f8ae0efa060f9f185 + +info: + name: > + Funnelforms Free <= 3.4 - Missing Authorization to Category Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/992fc98f-4b23-4596-81fb-5543d82fd615?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-e1ad7ec25f4d848d78b5d1ca911d7ff1.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-e1ad7ec25f4d848d78b5d1ca911d7ff1.yaml new file mode 100644 index 0000000000..e9e9919d4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-e1ad7ec25f4d848d78b5d1ca911d7ff1.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-e1ad7ec25f4d848d78b5d1ca911d7ff1 + +info: + name: > + Funnelforms Free <= 3.4 - Missing Authorization to Arbitrary Post Duplication + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2719afc-e52c-4fcc-b030-2f6aaddb5ab9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/funnelforms-free-e27d960770a662cb31ee7005dde8fb3c.yaml b/nuclei-templates/cve-less/plugins/funnelforms-free-e27d960770a662cb31ee7005dde8fb3c.yaml new file mode 100644 index 0000000000..7543908e72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/funnelforms-free-e27d960770a662cb31ee7005dde8fb3c.yaml @@ -0,0 +1,58 @@ +id: funnelforms-free-e27d960770a662cb31ee7005dde8fb3c + +info: + name: > + Funnelforms Free <= 3.4 - Missing Authorization to Category Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/148794ea-3bc9-4084-bdb9-6ee63a781a39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/funnelforms-free/" + google-query: inurl:"/wp-content/plugins/funnelforms-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,funnelforms-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/funnelforms-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "funnelforms-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/furikake-2513be2180efb8a9d99cb3b019874a28.yaml b/nuclei-templates/cve-less/plugins/furikake-2513be2180efb8a9d99cb3b019874a28.yaml new file mode 100644 index 0000000000..85ea07c9b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/furikake-2513be2180efb8a9d99cb3b019874a28.yaml @@ -0,0 +1,58 @@ +id: furikake-2513be2180efb8a9d99cb3b019874a28 + +info: + name: > + furikake <= 0.1.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9083d875-ff86-4f18-ad63-368bcb269ad9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/furikake/" + google-query: inurl:"/wp-content/plugins/furikake/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,furikake,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/furikake/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "furikake" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/furnob-core-0e249eccad21574e2f41d6b727c12756.yaml b/nuclei-templates/cve-less/plugins/furnob-core-0e249eccad21574e2f41d6b727c12756.yaml new file mode 100644 index 0000000000..7b3d876fa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/furnob-core-0e249eccad21574e2f41d6b727c12756.yaml @@ -0,0 +1,58 @@ +id: furnob-core-0e249eccad21574e2f41d6b727c12756 + +info: + name: > + Multiple Plugins by KlbTheme <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fb06315-30ad-4d98-af75-b04933583be7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/furnob-core/" + google-query: inurl:"/wp-content/plugins/furnob-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,furnob-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/furnob-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "furnob-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..d8cf3f5376 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: fuse-social-floating-sidebar-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fuse-social-floating-sidebar/" + google-query: inurl:"/wp-content/plugins/fuse-social-floating-sidebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fuse-social-floating-sidebar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fuse-social-floating-sidebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fuse-social-floating-sidebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..14ca033da6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: fuse-social-floating-sidebar-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fuse-social-floating-sidebar/" + google-query: inurl:"/wp-content/plugins/fuse-social-floating-sidebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fuse-social-floating-sidebar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fuse-social-floating-sidebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fuse-social-floating-sidebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a179ef22f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fuse-social-floating-sidebar-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: fuse-social-floating-sidebar-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fuse-social-floating-sidebar/" + google-query: inurl:"/wp-content/plugins/fuse-social-floating-sidebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fuse-social-floating-sidebar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fuse-social-floating-sidebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fuse-social-floating-sidebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fusion-builder-5a8b95e9d623c8f7e9c70ff9c8a761a0.yaml b/nuclei-templates/cve-less/plugins/fusion-builder-5a8b95e9d623c8f7e9c70ff9c8a761a0.yaml new file mode 100644 index 0000000000..9908b7bc86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fusion-builder-5a8b95e9d623c8f7e9c70ff9c8a761a0.yaml @@ -0,0 +1,58 @@ +id: fusion-builder-5a8b95e9d623c8f7e9c70ff9c8a761a0 + +info: + name: > + Fusion Builder <= 3.11.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35b3a82a-4391-41b0-b434-691743c5ff4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fusion-builder/" + google-query: inurl:"/wp-content/plugins/fusion-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fusion-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fusion-builder/languages/fusion-builder.pot" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fusion-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fusion-builder-b40b112aba812047c066895073435f9d.yaml b/nuclei-templates/cve-less/plugins/fusion-builder-b40b112aba812047c066895073435f9d.yaml new file mode 100644 index 0000000000..a0235b6ecd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fusion-builder-b40b112aba812047c066895073435f9d.yaml @@ -0,0 +1,58 @@ +id: fusion-builder-b40b112aba812047c066895073435f9d + +info: + name: > + Fusion Builder <= 3.11.1 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c734aa9-ee9e-4605-a4b8-5075ce4b941f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fusion-builder/" + google-query: inurl:"/wp-content/plugins/fusion-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fusion-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fusion-builder/languages/fusion-builder.pot" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fusion-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fusion-builder-b63d60bf3f2f663ff16710a1b09d1b70.yaml b/nuclei-templates/cve-less/plugins/fusion-builder-b63d60bf3f2f663ff16710a1b09d1b70.yaml new file mode 100644 index 0000000000..1650a8cbb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fusion-builder-b63d60bf3f2f663ff16710a1b09d1b70.yaml @@ -0,0 +1,58 @@ +id: fusion-builder-b63d60bf3f2f663ff16710a1b09d1b70 + +info: + name: > + Fusion Builder <= 3.11.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05220967-dd42-4cb9-9c2f-9c7ac3c0926b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fusion-builder/" + google-query: inurl:"/wp-content/plugins/fusion-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fusion-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fusion-builder/languages/fusion-builder.pot" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fusion-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fusion-builder-c1980d476739c222c7099c91e363860a.yaml b/nuclei-templates/cve-less/plugins/fusion-builder-c1980d476739c222c7099c91e363860a.yaml new file mode 100644 index 0000000000..2266611fb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fusion-builder-c1980d476739c222c7099c91e363860a.yaml @@ -0,0 +1,58 @@ +id: fusion-builder-c1980d476739c222c7099c91e363860a + +info: + name: > + Fusion Builder <= 3.11.1 - Reflected Cross-Site Scripting via User Register Element + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b173523a-e79d-4d2d-af67-5372576df220?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fusion-builder/" + google-query: inurl:"/wp-content/plugins/fusion-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fusion-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fusion-builder/languages/fusion-builder.pot" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fusion-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fusion-builder-d882958bab372a69d811837406b3986e.yaml b/nuclei-templates/cve-less/plugins/fusion-builder-d882958bab372a69d811837406b3986e.yaml new file mode 100644 index 0000000000..8f7ccfad89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fusion-builder-d882958bab372a69d811837406b3986e.yaml @@ -0,0 +1,58 @@ +id: fusion-builder-d882958bab372a69d811837406b3986e + +info: + name: > + Fusion Builder <= 3.6.1 & Avada <= 7.6.1 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad3de7e6-a080-4ce8-aa27-21e7f8fdb2c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fusion-builder/" + google-query: inurl:"/wp-content/plugins/fusion-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fusion-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fusion-builder/languages/fusion-builder.pot" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Project-Id-Version: Avada Builder ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fusion-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fusion-engage-b1b7cfcecf2de0389a1fca46f626041b.yaml b/nuclei-templates/cve-less/plugins/fusion-engage-b1b7cfcecf2de0389a1fca46f626041b.yaml new file mode 100644 index 0000000000..768093f8f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fusion-engage-b1b7cfcecf2de0389a1fca46f626041b.yaml @@ -0,0 +1,58 @@ +id: fusion-engage-b1b7cfcecf2de0389a1fca46f626041b + +info: + name: > + Fusion Engage <= 1.0.5 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c342fe87-59f3-43e9-8694-cc2551650a91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fusion-engage/" + google-query: inurl:"/wp-content/plugins/fusion-engage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fusion-engage,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fusion-engage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fusion-engage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fusionspan-impexium-single-sign-on-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/fusionspan-impexium-single-sign-on-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6ce7e281c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fusionspan-impexium-single-sign-on-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: fusionspan-impexium-single-sign-on-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fusionspan-impexium-single-sign-on/" + google-query: inurl:"/wp-content/plugins/fusionspan-impexium-single-sign-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fusionspan-impexium-single-sign-on,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fusionspan-impexium-single-sign-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fusionspan-impexium-single-sign-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/futurio-extra-12800057837655525254001463af7107.yaml b/nuclei-templates/cve-less/plugins/futurio-extra-12800057837655525254001463af7107.yaml new file mode 100644 index 0000000000..84a16f3f72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/futurio-extra-12800057837655525254001463af7107.yaml @@ -0,0 +1,58 @@ +id: futurio-extra-12800057837655525254001463af7107 + +info: + name: > + Futurio Extra <= 1.6.2 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/460b5388-4862-475d-9557-f8da2d5a84f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/futurio-extra/" + google-query: inurl:"/wp-content/plugins/futurio-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,futurio-extra,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/futurio-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "futurio-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/futurio-extra-3fb7396e595eda0e4c64d906babd7ea9.yaml b/nuclei-templates/cve-less/plugins/futurio-extra-3fb7396e595eda0e4c64d906babd7ea9.yaml new file mode 100644 index 0000000000..4dfb641d1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/futurio-extra-3fb7396e595eda0e4c64d906babd7ea9.yaml @@ -0,0 +1,58 @@ +id: futurio-extra-3fb7396e595eda0e4c64d906babd7ea9 + +info: + name: > + Futurio Extra <= 1.6.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f5a3ed2-1db2-47e4-9aca-8fb197174342?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/futurio-extra/" + google-query: inurl:"/wp-content/plugins/futurio-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,futurio-extra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/futurio-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "futurio-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/futurio-extra-d4fcc9d0c55735e1818ea178387ac0a1.yaml b/nuclei-templates/cve-less/plugins/futurio-extra-d4fcc9d0c55735e1818ea178387ac0a1.yaml new file mode 100644 index 0000000000..a74f3f37ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/futurio-extra-d4fcc9d0c55735e1818ea178387ac0a1.yaml @@ -0,0 +1,58 @@ +id: futurio-extra-d4fcc9d0c55735e1818ea178387ac0a1 + +info: + name: > + Futurio Extra <= 1.9.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b156379a-fbb8-4fc0-9cc0-534b131bf785?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/futurio-extra/" + google-query: inurl:"/wp-content/plugins/futurio-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,futurio-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/futurio-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "futurio-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/futurio-extra-fbe0be2fd36d543628c64e13771b878d.yaml b/nuclei-templates/cve-less/plugins/futurio-extra-fbe0be2fd36d543628c64e13771b878d.yaml new file mode 100644 index 0000000000..385e2294e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/futurio-extra-fbe0be2fd36d543628c64e13771b878d.yaml @@ -0,0 +1,58 @@ +id: futurio-extra-fbe0be2fd36d543628c64e13771b878d + +info: + name: > + Futurio Extra <= 1.8.2 - Cross-Site Request Forgery via 'futurio_extra_reset_mod' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f765e21e-938a-4110-8fdf-12315e2a79cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/futurio-extra/" + google-query: inurl:"/wp-content/plugins/futurio-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,futurio-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/futurio-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "futurio-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-21b5e2cc1773e8a375d4b06283f1f75c.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-21b5e2cc1773e8a375d4b06283f1f75c.yaml new file mode 100644 index 0000000000..6bb559d581 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-21b5e2cc1773e8a375d4b06283f1f75c.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-21b5e2cc1773e8a375d4b06283f1f75c + +info: + name: > + FV Flowplayer Video Player <= 7.5.15.727 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/510c26b8-01d6-4d3c-91fd-15963152fdf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.15.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-2bb90ae2c9eb7a663eb0156580d59a88.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-2bb90ae2c9eb7a663eb0156580d59a88.yaml new file mode 100644 index 0000000000..dbcf18327b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-2bb90ae2c9eb7a663eb0156580d59a88.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-2bb90ae2c9eb7a663eb0156580d59a88 + +info: + name: > + FV Flowplayer Video Player <= 7.3.14.727 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f301908-d491-492f-9347-432c462de286?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.15.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-2bd4aedc10e6362f1d46031adf65b2b5.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-2bd4aedc10e6362f1d46031adf65b2b5.yaml new file mode 100644 index 0000000000..0b77d99645 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-2bd4aedc10e6362f1d46031adf65b2b5.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-2bd4aedc10e6362f1d46031adf65b2b5 + +info: + name: > + FV Flowplayer Video Player <= 7.5.30.7210 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56bbf263-149b-4419-9745-39dc147026a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.30.7210') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-31f01989f88bd51c1337d3cf6dfb5acb.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-31f01989f88bd51c1337d3cf6dfb5acb.yaml new file mode 100644 index 0000000000..c6e05426d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-31f01989f88bd51c1337d3cf6dfb5acb.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-31f01989f88bd51c1337d3cf6dfb5acb + +info: + name: > + FV Flowplayer Video Player <= 7.5.41.7212 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/616b34e8-d853-4176-9fda-427fc9900b97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.41.7212') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-351dfe17aa9c41d161fbfba3138330fd.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-351dfe17aa9c41d161fbfba3138330fd.yaml new file mode 100644 index 0000000000..0e0c939b76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-351dfe17aa9c41d161fbfba3138330fd.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-351dfe17aa9c41d161fbfba3138330fd + +info: + name: > + FV Flowplayer Video Player <= 7.5.44.7212 - Authenticated (Contributor+) Arbitrary Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/360010f3-9053-4c69-a4e8-12f0c77ba746?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.44.7212') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-3af842e4b028602d05da06af8493bf21.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-3af842e4b028602d05da06af8493bf21.yaml new file mode 100644 index 0000000000..925461c16e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-3af842e4b028602d05da06af8493bf21.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-3af842e4b028602d05da06af8493bf21 + +info: + name: > + FV Flowplayer Video Player 6.1.2 - 6.6.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7f294af-7702-4762-806b-2abdb1454a7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 6.1.2', '<= 6.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-4ec113a2f6c7cc34cbdb0b48aa39a566.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-4ec113a2f6c7cc34cbdb0b48aa39a566.yaml new file mode 100644 index 0000000000..9537fab67d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-4ec113a2f6c7cc34cbdb0b48aa39a566.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-4ec113a2f6c7cc34cbdb0b48aa39a566 + +info: + name: > + FV Flowplayer Video Player <= 6.0.3.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3325317-4ce7-468d-aee7-9b40fdf61d3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-4f8b60559007de9693d6bd6dbd7b9937.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-4f8b60559007de9693d6bd6dbd7b9937.yaml new file mode 100644 index 0000000000..35155e82ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-4f8b60559007de9693d6bd6dbd7b9937.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-4f8b60559007de9693d6bd6dbd7b9937 + +info: + name: > + FV Flowplayer Video Player <= 7.5.37.7212 - Insufficient Input Validation to Unauthenticated Stored Cross-Site Scripting and Arbitrary Usermeta Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c55ca7d4-6bc0-49c9-8ce0-50fff8775a76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.37.7212') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-61c688c55eb7ee42da571c3fb1a2e6d3.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-61c688c55eb7ee42da571c3fb1a2e6d3.yaml new file mode 100644 index 0000000000..6f3057740c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-61c688c55eb7ee42da571c3fb1a2e6d3.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-61c688c55eb7ee42da571c3fb1a2e6d3 + +info: + name: > + FV Flowplayer Video Player <= 7.5.43.7212 - Authenticated (Subscriber+) Server-side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3eec839-9009-48de-80c8-911dc9b545ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.43.7212') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-730bcdecc23fd71d57d0ec1ba0d53342.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-730bcdecc23fd71d57d0ec1ba0d53342.yaml new file mode 100644 index 0000000000..d809a86b7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-730bcdecc23fd71d57d0ec1ba0d53342.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-730bcdecc23fd71d57d0ec1ba0d53342 + +info: + name: > + FV Flowplayer Video Player <= 7.3.18.727 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/232dd4fa-748e-4b65-8b78-7b2d8e9831aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.18.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-768117af17895fd2573e769996b5a89f.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-768117af17895fd2573e769996b5a89f.yaml new file mode 100644 index 0000000000..8d79dd09d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-768117af17895fd2573e769996b5a89f.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-768117af17895fd2573e769996b5a89f + +info: + name: > + FV Flowplayer Video Player <= 7.5.41.7212 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24ebaf12-cf7c-4bc3-b028-27ee4b6b2a45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.41.7212') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-8269712f8aa3f2f54a5b3b611a3288b4.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-8269712f8aa3f2f54a5b3b611a3288b4.yaml new file mode 100644 index 0000000000..172ec773b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-8269712f8aa3f2f54a5b3b611a3288b4.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-8269712f8aa3f2f54a5b3b611a3288b4 + +info: + name: > + FV Flowplayer Video Player <= 7.4.37.727 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0e28aca-b95f-4041-a1ea-4be84dc55923?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.37.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-86d0c991bc6dd85c8051863807fe1299.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-86d0c991bc6dd85c8051863807fe1299.yaml new file mode 100644 index 0000000000..c9bcf3159e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-86d0c991bc6dd85c8051863807fe1299.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-86d0c991bc6dd85c8051863807fe1299 + +info: + name: > + FV Flowplayer Video Player <= 7.3.13.727 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcad7322-a5d9-4d72-9983-276f9c05c27d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.13.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-8e904d0aa5c673b4683d6e95c3e351f3.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-8e904d0aa5c673b4683d6e95c3e351f3.yaml new file mode 100644 index 0000000000..bcf449742a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-8e904d0aa5c673b4683d6e95c3e351f3.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-8e904d0aa5c673b4683d6e95c3e351f3 + +info: + name: > + FV Flowplayer Video Player <= 1.2.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/118b9d85-1246-47f7-bdef-af47075576f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-9a7b3a67156b47fe25586e8e0cb89d8a.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-9a7b3a67156b47fe25586e8e0cb89d8a.yaml new file mode 100644 index 0000000000..9bb5be3b85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-9a7b3a67156b47fe25586e8e0cb89d8a.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-9a7b3a67156b47fe25586e8e0cb89d8a + +info: + name: > + FV Flowplayer Video Player <= 7.3.14.727 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9729ebf5-ef78-4ef4-81d4-165f422c3847?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.15.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-b90e27dda3a054f2561634700611d64f.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-b90e27dda3a054f2561634700611d64f.yaml new file mode 100644 index 0000000000..dbce0226a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-b90e27dda3a054f2561634700611d64f.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-b90e27dda3a054f2561634700611d64f + +info: + name: > + FV Flowplayer Video Player <= 7.3.14.727 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b7220a4-7178-42f7-978b-96eae777b134?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.15.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-b964392d781e5af12807956a1b25e48d.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-b964392d781e5af12807956a1b25e48d.yaml new file mode 100644 index 0000000000..c4576b27d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-b964392d781e5af12807956a1b25e48d.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-b964392d781e5af12807956a1b25e48d + +info: + name: > + FV Flowplayer Video Player <= 7.2.0.727 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb613de8-d298-471f-b585-2da3b5500f10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.0.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-bb35779f0545e4fee400784885c47aca.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-bb35779f0545e4fee400784885c47aca.yaml new file mode 100644 index 0000000000..64c286892a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-bb35779f0545e4fee400784885c47aca.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-bb35779f0545e4fee400784885c47aca + +info: + name: > + FV Flowplayer Video Player 7.5.0.727 - 7.5.2.727 - Reflected Cross-Site Scripting via player_id Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b795352-fad8-485e-bd1b-68c0913555e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 7.5.0.727', '<= 7.5.2.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-bcc5b5d302cff6b12bb3e0ee2db5fa04.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-bcc5b5d302cff6b12bb3e0ee2db5fa04.yaml new file mode 100644 index 0000000000..09aa474a92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-bcc5b5d302cff6b12bb3e0ee2db5fa04.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-bcc5b5d302cff6b12bb3e0ee2db5fa04 + +info: + name: > + FV Flowplayer Video Player <= 7.5.32.7212 - Reflected Cross-Site Scripting via id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b78834c-cb13-4698-aa19-65f8c6874c8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.32.7212') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-cf91d34b3b4f074c5504390aafe5f2f2.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-cf91d34b3b4f074c5504390aafe5f2f2.yaml new file mode 100644 index 0000000000..86820e4510 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-cf91d34b3b4f074c5504390aafe5f2f2.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-cf91d34b3b4f074c5504390aafe5f2f2 + +info: + name: > + FV Flowplayer Video Player <= 7.3.14.727 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a337765-b6ea-4c2a-9f1a-e408a9444b88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.14.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-d173f6ac48d7132b733f53a51a70ac65.yaml b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-d173f6ac48d7132b733f53a51a70ac65.yaml new file mode 100644 index 0000000000..3333b65504 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fv-wordpress-flowplayer-d173f6ac48d7132b733f53a51a70ac65.yaml @@ -0,0 +1,58 @@ +id: fv-wordpress-flowplayer-d173f6ac48d7132b733f53a51a70ac65 + +info: + name: > + FV Flowplayer Video Player <= 7.5.18.727 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7aa1f57-44c2-45ec-87a3-483f8dc9a957?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" + google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fv-wordpress-flowplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fv-wordpress-flowplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.18.727') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fx-private-site-34e9fd3c5efdc1de6fe7fe47accd8e24.yaml b/nuclei-templates/cve-less/plugins/fx-private-site-34e9fd3c5efdc1de6fe7fe47accd8e24.yaml new file mode 100644 index 0000000000..434549ad0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fx-private-site-34e9fd3c5efdc1de6fe7fe47accd8e24.yaml @@ -0,0 +1,58 @@ +id: fx-private-site-34e9fd3c5efdc1de6fe7fe47accd8e24 + +info: + name: > + f(x) Private Site <= 1.2.1 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79c3abc6-68fa-4c51-88fa-03ab7d26cc4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fx-private-site/" + google-query: inurl:"/wp-content/plugins/fx-private-site/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fx-private-site,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fx-private-site/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fx-private-site" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/fx-toc-14de97dccf48252d3b3ac5a2e5d0250f.yaml b/nuclei-templates/cve-less/plugins/fx-toc-14de97dccf48252d3b3ac5a2e5d0250f.yaml new file mode 100644 index 0000000000..a2d4dbf665 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/fx-toc-14de97dccf48252d3b3ac5a2e5d0250f.yaml @@ -0,0 +1,58 @@ +id: fx-toc-14de97dccf48252d3b3ac5a2e5d0250f + +info: + name: > + f(x) TOC <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09479df1-ff7e-4df8-9aea-8c7622ecea4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/fx-toc/" + google-query: inurl:"/wp-content/plugins/fx-toc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,fx-toc,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/fx-toc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fx-toc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/g-auto-hyperlink-7e1dd5ec2f3ce921814a97005e4bdef0.yaml b/nuclei-templates/cve-less/plugins/g-auto-hyperlink-7e1dd5ec2f3ce921814a97005e4bdef0.yaml new file mode 100644 index 0000000000..8ae8d413f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/g-auto-hyperlink-7e1dd5ec2f3ce921814a97005e4bdef0.yaml @@ -0,0 +1,58 @@ +id: g-auto-hyperlink-7e1dd5ec2f3ce921814a97005e4bdef0 + +info: + name: > + G Auto-Hyperlink <= 1.0.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67aa489c-5c54-4163-bc32-5d3ac9ba4e33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/g-auto-hyperlink/" + google-query: inurl:"/wp-content/plugins/g-auto-hyperlink/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,g-auto-hyperlink,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/g-auto-hyperlink/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "g-auto-hyperlink" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/g-business-reviews-rating-1ad67757b830dbb081c0f3324889f2b5.yaml b/nuclei-templates/cve-less/plugins/g-business-reviews-rating-1ad67757b830dbb081c0f3324889f2b5.yaml new file mode 100644 index 0000000000..effdec86d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/g-business-reviews-rating-1ad67757b830dbb081c0f3324889f2b5.yaml @@ -0,0 +1,58 @@ +id: g-business-reviews-rating-1ad67757b830dbb081c0f3324889f2b5 + +info: + name: > + Reviews and Rating – Google My Business <= 4.14 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5494cac6-1b52-43a3-995d-fc2a150edfdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/g-business-reviews-rating/" + google-query: inurl:"/wp-content/plugins/g-business-reviews-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,g-business-reviews-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/g-business-reviews-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "g-business-reviews-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/g-lock-double-opt-in-manager-9f4658b745b189d37014521dd6a95fe4.yaml b/nuclei-templates/cve-less/plugins/g-lock-double-opt-in-manager-9f4658b745b189d37014521dd6a95fe4.yaml new file mode 100644 index 0000000000..391ba955b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/g-lock-double-opt-in-manager-9f4658b745b189d37014521dd6a95fe4.yaml @@ -0,0 +1,58 @@ +id: g-lock-double-opt-in-manager-9f4658b745b189d37014521dd6a95fe4 + +info: + name: > + G-Lock Double Opt-in Manager <= 2.6.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a58644a-c678-41e7-8020-d2f2c247682f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/g-lock-double-opt-in-manager/" + google-query: inurl:"/wp-content/plugins/g-lock-double-opt-in-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,g-lock-double-opt-in-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/g-lock-double-opt-in-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "g-lock-double-opt-in-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/g-web-shop-2ae1fc13f687fb015528a3ff66e09125.yaml b/nuclei-templates/cve-less/plugins/g-web-shop-2ae1fc13f687fb015528a3ff66e09125.yaml new file mode 100644 index 0000000000..73e4cd04ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/g-web-shop-2ae1fc13f687fb015528a3ff66e09125.yaml @@ -0,0 +1,58 @@ +id: g-web-shop-2ae1fc13f687fb015528a3ff66e09125 + +info: + name: > + Zingiri Web Shop <= 2.2.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8247acc4-04dc-463a-906a-f6085116cf40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/g-web-shop/" + google-query: inurl:"/wp-content/plugins/g-web-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,g-web-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/g-web-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "g-web-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ga-backend-tracking-779d1e87dc368b31bfafa7f1aaae4f82.yaml b/nuclei-templates/cve-less/plugins/ga-backend-tracking-779d1e87dc368b31bfafa7f1aaae4f82.yaml new file mode 100644 index 0000000000..6c131046ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ga-backend-tracking-779d1e87dc368b31bfafa7f1aaae4f82.yaml @@ -0,0 +1,58 @@ +id: ga-backend-tracking-779d1e87dc368b31bfafa7f1aaae4f82 + +info: + name: > + Cookieless Backend Server Tracking for Google Analytics – WordPress Plugin < 1.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b089114-b403-4e42-a578-c1f3b100978f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ga-backend-tracking/" + google-query: inurl:"/wp-content/plugins/ga-backend-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ga-backend-tracking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ga-backend-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ga-backend-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ga-for-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ga-for-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..67d7853530 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ga-for-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ga-for-wp-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ga-for-wp/" + google-query: inurl:"/wp-content/plugins/ga-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ga-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ga-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ga-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ga-universal-f581daf73a2ae47926782b6731f30bca.yaml b/nuclei-templates/cve-less/plugins/ga-universal-f581daf73a2ae47926782b6731f30bca.yaml new file mode 100644 index 0000000000..ddc3e41dc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ga-universal-f581daf73a2ae47926782b6731f30bca.yaml @@ -0,0 +1,58 @@ +id: ga-universal-f581daf73a2ae47926782b6731f30bca + +info: + name: > + GA Universal < 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e953bc0-a934-43fc-8147-4555dde069cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ga-universal/" + google-query: inurl:"/wp-content/plugins/ga-universal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ga-universal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ga-universal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ga-universal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/galleria-0e933dc304f8275920849e5d36373b4d.yaml b/nuclei-templates/cve-less/plugins/galleria-0e933dc304f8275920849e5d36373b4d.yaml new file mode 100644 index 0000000000..70c3b04f6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/galleria-0e933dc304f8275920849e5d36373b4d.yaml @@ -0,0 +1,58 @@ +id: galleria-0e933dc304f8275920849e5d36373b4d + +info: + name: > + Galleria <= 1.0.3 - Cross-Site Request Forgery via showOptionsPage + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea85fa9a-78ea-4017-b72e-49db7eafa11e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/galleria/" + google-query: inurl:"/wp-content/plugins/galleria/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,galleria,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/galleria/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "galleria" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-album-0430b26f7f80d13db884ab9b0a5b4920.yaml b/nuclei-templates/cve-less/plugins/gallery-album-0430b26f7f80d13db884ab9b0a5b4920.yaml new file mode 100644 index 0000000000..87b0ad926d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-album-0430b26f7f80d13db884ab9b0a5b4920.yaml @@ -0,0 +1,58 @@ +id: gallery-album-0430b26f7f80d13db884ab9b0a5b4920 + +info: + name: > + Gallery – Image and Video Gallery with Thumbnails < 1.2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40937e18-3828-4e36-8bc1-5b8eb4838c3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-album/" + google-query: inurl:"/wp-content/plugins/gallery-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-album,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-album-09c2db1952a267095a68cf64b0164363.yaml b/nuclei-templates/cve-less/plugins/gallery-album-09c2db1952a267095a68cf64b0164363.yaml new file mode 100644 index 0000000000..69561632e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-album-09c2db1952a267095a68cf64b0164363.yaml @@ -0,0 +1,58 @@ +id: gallery-album-09c2db1952a267095a68cf64b0164363 + +info: + name: > + Gallery – Image and Video Gallery with Thumbnails <= 1.9.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2628b02e-5685-4e25-a786-4542ecbe874a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-album/" + google-query: inurl:"/wp-content/plugins/gallery-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-album,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-album-1aaed1324faa189ffbfd4d07f45be185.yaml b/nuclei-templates/cve-less/plugins/gallery-album-1aaed1324faa189ffbfd4d07f45be185.yaml new file mode 100644 index 0000000000..56164422a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-album-1aaed1324faa189ffbfd4d07f45be185.yaml @@ -0,0 +1,58 @@ +id: gallery-album-1aaed1324faa189ffbfd4d07f45be185 + +info: + name: > + Responsive Image Gallery, Gallery Album <= 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e07593a-3d12-4afe-a21e-fc85bd6d4bef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-album/" + google-query: inurl:"/wp-content/plugins/gallery-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-album,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-album-63a9e6e007af9bec52f4b9f80d04c841.yaml b/nuclei-templates/cve-less/plugins/gallery-album-63a9e6e007af9bec52f4b9f80d04c841.yaml new file mode 100644 index 0000000000..150352b07d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-album-63a9e6e007af9bec52f4b9f80d04c841.yaml @@ -0,0 +1,58 @@ +id: gallery-album-63a9e6e007af9bec52f4b9f80d04c841 + +info: + name: > + Gallery – Image and Video Gallery with Thumbnails <= 2.0.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/091d306d-cce4-426e-a18f-38bdaa802264?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-album/" + google-query: inurl:"/wp-content/plugins/gallery-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-album,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-album-63e26d4ba1974966e333b4b151a2c5df.yaml b/nuclei-templates/cve-less/plugins/gallery-album-63e26d4ba1974966e333b4b151a2c5df.yaml new file mode 100644 index 0000000000..8cc235388b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-album-63e26d4ba1974966e333b4b151a2c5df.yaml @@ -0,0 +1,58 @@ +id: gallery-album-63e26d4ba1974966e333b4b151a2c5df + +info: + name: > + Responsive Image Gallery, Gallery Album <= 2.0.3 - Missing Authorization via Multiple AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb08cf02-4766-4093-9306-3b4581f54f77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-album/" + google-query: inurl:"/wp-content/plugins/gallery-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-album,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-album-c181e74f647f3ed52bab481a97159011.yaml b/nuclei-templates/cve-less/plugins/gallery-album-c181e74f647f3ed52bab481a97159011.yaml new file mode 100644 index 0000000000..968eb42123 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-album-c181e74f647f3ed52bab481a97159011.yaml @@ -0,0 +1,58 @@ +id: gallery-album-c181e74f647f3ed52bab481a97159011 + +info: + name: > + Responsive Image Gallery, Gallery Album <= 2.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66efc65e-48d3-4ef9-a369-51448e47686a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-album/" + google-query: inurl:"/wp-content/plugins/gallery-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-album,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-album-d39f34ed184a71d23a5de1e368d430bb.yaml b/nuclei-templates/cve-less/plugins/gallery-album-d39f34ed184a71d23a5de1e368d430bb.yaml new file mode 100644 index 0000000000..2737e32e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-album-d39f34ed184a71d23a5de1e368d430bb.yaml @@ -0,0 +1,58 @@ +id: gallery-album-d39f34ed184a71d23a5de1e368d430bb + +info: + name: > + Responsive Image Gallery, Gallery Album <= 2.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21322495-a709-45a9-b8df-c3a3aeb1f260?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-album/" + google-query: inurl:"/wp-content/plugins/gallery-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-album,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-album-f65c67e968e15596bef3448601bb7b39.yaml b/nuclei-templates/cve-less/plugins/gallery-album-f65c67e968e15596bef3448601bb7b39.yaml new file mode 100644 index 0000000000..4b619063ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-album-f65c67e968e15596bef3448601bb7b39.yaml @@ -0,0 +1,58 @@ +id: gallery-album-f65c67e968e15596bef3448601bb7b39 + +info: + name: > + Responsive Image Gallery, Gallery Album <= 2.0.3 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa9e4635-43f8-4f3c-b62c-628e74028f7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-album/" + google-query: inurl:"/wp-content/plugins/gallery-album/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-album,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-album/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-album" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-bank-12287cbd7ce878e9fd3267a0e01cf78a.yaml b/nuclei-templates/cve-less/plugins/gallery-bank-12287cbd7ce878e9fd3267a0e01cf78a.yaml new file mode 100644 index 0000000000..79efd211d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-bank-12287cbd7ce878e9fd3267a0e01cf78a.yaml @@ -0,0 +1,58 @@ +id: gallery-bank-12287cbd7ce878e9fd3267a0e01cf78a + +info: + name: > + Gallery Bank – WordPress Photo Gallery <= 3.0.101 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13e7c4ab-7856-41a5-8cd9-4f8118af534d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-bank/" + google-query: inurl:"/wp-content/plugins/gallery-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-bank,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.101') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-bank-26bba1e52907934fbc2f76bbe8677ffb.yaml b/nuclei-templates/cve-less/plugins/gallery-bank-26bba1e52907934fbc2f76bbe8677ffb.yaml new file mode 100644 index 0000000000..434fd6511d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-bank-26bba1e52907934fbc2f76bbe8677ffb.yaml @@ -0,0 +1,58 @@ +id: gallery-bank-26bba1e52907934fbc2f76bbe8677ffb + +info: + name: > + Gallery Bank – WordPress Photo Gallery Plugin <= 3.0.229 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48c6efc9-6c53-4ac9-8f99-62fbab0599ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-bank/" + google-query: inurl:"/wp-content/plugins/gallery-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-bank,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.330') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-bank-3d1b14fe6d8db25f44038aa7941ff8ce.yaml b/nuclei-templates/cve-less/plugins/gallery-bank-3d1b14fe6d8db25f44038aa7941ff8ce.yaml new file mode 100644 index 0000000000..406206b51c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-bank-3d1b14fe6d8db25f44038aa7941ff8ce.yaml @@ -0,0 +1,58 @@ +id: gallery-bank-3d1b14fe6d8db25f44038aa7941ff8ce + +info: + name: > + Gallery Bank – WordPress Photo Gallery Plugin < 3.0.70 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b96c5ba8-e0a6-42b9-8ba1-637d52476d64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-bank/" + google-query: inurl:"/wp-content/plugins/gallery-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-bank,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-bank-4ba873ea604974c0a71c72511e63ccc8.yaml b/nuclei-templates/cve-less/plugins/gallery-bank-4ba873ea604974c0a71c72511e63ccc8.yaml new file mode 100644 index 0000000000..2ec3488b06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-bank-4ba873ea604974c0a71c72511e63ccc8.yaml @@ -0,0 +1,58 @@ +id: gallery-bank-4ba873ea604974c0a71c72511e63ccc8 + +info: + name: > + Gallery Bank – WordPress Photo Gallery Plugin <= 4.0.50 - Stored Cross-Site Scripting via Gallery Description + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/915708c5-c958-4c4d-8d94-b93b1bea6013?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-bank/" + google-query: inurl:"/wp-content/plugins/gallery-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/gallery-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..340001dc33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: gallery-bank-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-bank/" + google-query: inurl:"/wp-content/plugins/gallery-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.229') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-bank-b559946f964d6a635744aa2ff8d7bc1d.yaml b/nuclei-templates/cve-less/plugins/gallery-bank-b559946f964d6a635744aa2ff8d7bc1d.yaml new file mode 100644 index 0000000000..51f687182e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-bank-b559946f964d6a635744aa2ff8d7bc1d.yaml @@ -0,0 +1,58 @@ +id: gallery-bank-b559946f964d6a635744aa2ff8d7bc1d + +info: + name: > + Gallery Bank – WordPress Photo Gallery Plugin < 2.0.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4d41f7f-f0c6-4e50-bf5f-37ee25415f43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-bank/" + google-query: inurl:"/wp-content/plugins/gallery-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-bank,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-bank-b975729e6f64f7e39a41858a9d4457f9.yaml b/nuclei-templates/cve-less/plugins/gallery-bank-b975729e6f64f7e39a41858a9d4457f9.yaml new file mode 100644 index 0000000000..5d22f206c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-bank-b975729e6f64f7e39a41858a9d4457f9.yaml @@ -0,0 +1,58 @@ +id: gallery-bank-b975729e6f64f7e39a41858a9d4457f9 + +info: + name: > + Gallery Bank – WordPress Photo Gallery Plugin < 3.0.61 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb2e9370-f50e-4792-99f6-4678e0256a56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-bank/" + google-query: inurl:"/wp-content/plugins/gallery-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-bank,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-bank-bb9ff775c7105fbb3a95361f39741664.yaml b/nuclei-templates/cve-less/plugins/gallery-bank-bb9ff775c7105fbb3a95361f39741664.yaml new file mode 100644 index 0000000000..e8393134e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-bank-bb9ff775c7105fbb3a95361f39741664.yaml @@ -0,0 +1,58 @@ +id: gallery-bank-bb9ff775c7105fbb3a95361f39741664 + +info: + name: > + Gallery Bank – WordPress Photo Gallery Plugin <= 4.0.50 - Stored Cross-Site Scripting via Media Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6dfe91d5-305b-414a-bbed-23c089be6176?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-bank/" + google-query: inurl:"/wp-content/plugins/gallery-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-box-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/gallery-box-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..5faa1539b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-box-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: gallery-box-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-box/" + google-query: inurl:"/wp-content/plugins/gallery-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-box-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/gallery-box-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..6cdaf21ac3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-box-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: gallery-box-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-box/" + google-query: inurl:"/wp-content/plugins/gallery-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-box-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/gallery-box-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..c2a0654baf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-box-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: gallery-box-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-box/" + google-query: inurl:"/wp-content/plugins/gallery-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-by-supsystic-2f3164fe48781902f2ffb82e4c682a7b.yaml b/nuclei-templates/cve-less/plugins/gallery-by-supsystic-2f3164fe48781902f2ffb82e4c682a7b.yaml new file mode 100644 index 0000000000..0063e8267e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-by-supsystic-2f3164fe48781902f2ffb82e4c682a7b.yaml @@ -0,0 +1,58 @@ +id: gallery-by-supsystic-2f3164fe48781902f2ffb82e4c682a7b + +info: + name: > + Photo Gallery by Supsystic <= 1.8.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b91f3db6-5331-48d4-9c79-9ecba0870be2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-by-supsystic/" + google-query: inurl:"/wp-content/plugins/gallery-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-by-supsystic-3eb246a84ff094c4b5dad08106b186b3.yaml b/nuclei-templates/cve-less/plugins/gallery-by-supsystic-3eb246a84ff094c4b5dad08106b186b3.yaml new file mode 100644 index 0000000000..4f94d7876d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-by-supsystic-3eb246a84ff094c4b5dad08106b186b3.yaml @@ -0,0 +1,58 @@ +id: gallery-by-supsystic-3eb246a84ff094c4b5dad08106b186b3 + +info: + name: > + Photo Gallery by Supsystic <= 1.15.5 - Cross-Site Request Forgery to Plugin Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28fe3ec0-5e62-4a52-890d-e05b7d5bf531?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-by-supsystic/" + google-query: inurl:"/wp-content/plugins/gallery-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-by-supsystic-a442b3cb4140cc0565b34b0085780b5e.yaml b/nuclei-templates/cve-less/plugins/gallery-by-supsystic-a442b3cb4140cc0565b34b0085780b5e.yaml new file mode 100644 index 0000000000..dafd9b4371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-by-supsystic-a442b3cb4140cc0565b34b0085780b5e.yaml @@ -0,0 +1,58 @@ +id: gallery-by-supsystic-a442b3cb4140cc0565b34b0085780b5e + +info: + name: > + Photo Gallery by Supsystic <= 1.15.16 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/185c9962-aa4a-4049-acdb-3f439c420c5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-by-supsystic/" + google-query: inurl:"/wp-content/plugins/gallery-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-categories-86cf39a9caff1b0d57622ce3a08c77ef.yaml b/nuclei-templates/cve-less/plugins/gallery-categories-86cf39a9caff1b0d57622ce3a08c77ef.yaml new file mode 100644 index 0000000000..680b7fa5ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-categories-86cf39a9caff1b0d57622ce3a08c77ef.yaml @@ -0,0 +1,58 @@ +id: gallery-categories-86cf39a9caff1b0d57622ce3a08c77ef + +info: + name: > + Gallery Categories by BestWebSoft < 1.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c538318-4c6f-4610-b4d4-a20005148d23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-categories/" + google-query: inurl:"/wp-content/plugins/gallery-categories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-categories,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-categories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-categories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-factory-lite-9266ca4886b0c646b2489433a5137061.yaml b/nuclei-templates/cve-less/plugins/gallery-factory-lite-9266ca4886b0c646b2489433a5137061.yaml new file mode 100644 index 0000000000..62f29c308f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-factory-lite-9266ca4886b0c646b2489433a5137061.yaml @@ -0,0 +1,58 @@ +id: gallery-factory-lite-9266ca4886b0c646b2489433a5137061 + +info: + name: > + Gallery Factory Lite <= 2.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2b8e295-4183-4f84-801f-da9ffa6efce2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-factory-lite/" + google-query: inurl:"/wp-content/plugins/gallery-factory-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-factory-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-factory-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-factory-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-from-files-5888c8dd3a2fb05785315dbed1e6a3d3.yaml b/nuclei-templates/cve-less/plugins/gallery-from-files-5888c8dd3a2fb05785315dbed1e6a3d3.yaml new file mode 100644 index 0000000000..dfb640aaaa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-from-files-5888c8dd3a2fb05785315dbed1e6a3d3.yaml @@ -0,0 +1,58 @@ +id: gallery-from-files-5888c8dd3a2fb05785315dbed1e6a3d3 + +info: + name: > + Gallery From Files <= 1.60 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30ea46c1-bb29-49b8-b161-e61f13167ff4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-from-files/" + google-query: inurl:"/wp-content/plugins/gallery-from-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-from-files,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-from-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-from-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-from-files-edf0c0f62c894ee6b53dbdcb9d2b787f.yaml b/nuclei-templates/cve-less/plugins/gallery-from-files-edf0c0f62c894ee6b53dbdcb9d2b787f.yaml new file mode 100644 index 0000000000..0193cb5ce4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-from-files-edf0c0f62c894ee6b53dbdcb9d2b787f.yaml @@ -0,0 +1,58 @@ +id: gallery-from-files-edf0c0f62c894ee6b53dbdcb9d2b787f + +info: + name: > + Gallery from files <= 1.60 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d76b08c3-0d28-4e81-8843-5afded9efaa6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-from-files/" + google-query: inurl:"/wp-content/plugins/gallery-from-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-from-files,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-from-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-from-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-image-gallery-photo-c27095e826fc99d4e3ff59487183eb49.yaml b/nuclei-templates/cve-less/plugins/gallery-image-gallery-photo-c27095e826fc99d4e3ff59487183eb49.yaml new file mode 100644 index 0000000000..3f51c64b49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-image-gallery-photo-c27095e826fc99d4e3ff59487183eb49.yaml @@ -0,0 +1,58 @@ +id: gallery-image-gallery-photo-c27095e826fc99d4e3ff59487183eb49 + +info: + name: > + Image Gallery – Grid Gallery <= 1.1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3dc1dd6-7f35-4771-a795-f0e37088dfda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-image-gallery-photo/" + google-query: inurl:"/wp-content/plugins/gallery-image-gallery-photo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-image-gallery-photo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-image-gallery-photo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-image-gallery-photo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-0ea6dc2d83fc938ad05b8877c6963a76.yaml b/nuclei-templates/cve-less/plugins/gallery-images-0ea6dc2d83fc938ad05b8877c6963a76.yaml new file mode 100644 index 0000000000..927185f538 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-0ea6dc2d83fc938ad05b8877c6963a76.yaml @@ -0,0 +1,58 @@ +id: gallery-images-0ea6dc2d83fc938ad05b8877c6963a76 + +info: + name: > + Image Gallery - Responsive Photo Gallery <= 1.7.0 - Reflected Cross-Site Scripting via thumbtext + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22a0f10f-0a67-4f4a-99db-a625bec20bdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images/" + google-query: inurl:"/wp-content/plugins/gallery-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-1b866013a286b8267be128b4354cf380.yaml b/nuclei-templates/cve-less/plugins/gallery-images-1b866013a286b8267be128b4354cf380.yaml new file mode 100644 index 0000000000..e727c46547 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-1b866013a286b8267be128b4354cf380.yaml @@ -0,0 +1,58 @@ +id: gallery-images-1b866013a286b8267be128b4354cf380 + +info: + name: > + Image Gallery - Responsive Photo Gallery <= 1.0.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9a2d45c-397f-4a2b-9d7f-760b7d561c2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images/" + google-query: inurl:"/wp-content/plugins/gallery-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-7029424562dcabc51ba988c294ceda39.yaml b/nuclei-templates/cve-less/plugins/gallery-images-7029424562dcabc51ba988c294ceda39.yaml new file mode 100644 index 0000000000..12a3acfca8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-7029424562dcabc51ba988c294ceda39.yaml @@ -0,0 +1,58 @@ +id: gallery-images-7029424562dcabc51ba988c294ceda39 + +info: + name: > + Image Gallery - Responsive Photo Gallery <= 1.9.57 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7456ce70-dfa1-46b4-af9e-8185c4f7e5f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images/" + google-query: inurl:"/wp-content/plugins/gallery-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-96e3c207dd79a77d8603f9b27ced710c.yaml b/nuclei-templates/cve-less/plugins/gallery-images-96e3c207dd79a77d8603f9b27ced710c.yaml new file mode 100644 index 0000000000..5da9f3d31f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-96e3c207dd79a77d8603f9b27ced710c.yaml @@ -0,0 +1,58 @@ +id: gallery-images-96e3c207dd79a77d8603f9b27ced710c + +info: + name: > + Huge-IT gallery-images <= 1.8.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/189d22e0-c16a-48ab-a278-a132cd1057b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images/" + google-query: inurl:"/wp-content/plugins/gallery-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-ape-04b351a32ea4d9e14665cfe5ee1edb27.yaml b/nuclei-templates/cve-less/plugins/gallery-images-ape-04b351a32ea4d9e14665cfe5ee1edb27.yaml new file mode 100644 index 0000000000..01f172ce42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-ape-04b351a32ea4d9e14665cfe5ee1edb27.yaml @@ -0,0 +1,58 @@ +id: gallery-images-ape-04b351a32ea4d9e14665cfe5ee1edb27 + +info: + name: > + Gallery Images Ape <= 2.2.8 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78e35c10-2480-4b23-8f5c-a196ccdc71f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images-ape/" + google-query: inurl:"/wp-content/plugins/gallery-images-ape/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images-ape,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images-ape/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images-ape" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-ape-8f53c25a7439725994fa29007a578b4d.yaml b/nuclei-templates/cve-less/plugins/gallery-images-ape-8f53c25a7439725994fa29007a578b4d.yaml new file mode 100644 index 0000000000..9a67dace2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-ape-8f53c25a7439725994fa29007a578b4d.yaml @@ -0,0 +1,58 @@ +id: gallery-images-ape-8f53c25a7439725994fa29007a578b4d + +info: + name: > + Gallery Images Ape <= 2.0.6 - Authenticated Plugin Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfd6c2b8-b00c-49d1-930f-50397e742ac5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images-ape/" + google-query: inurl:"/wp-content/plugins/gallery-images-ape/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images-ape,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images-ape/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images-ape" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-ape-8f81c40c56a58242ce344610c4f30138.yaml b/nuclei-templates/cve-less/plugins/gallery-images-ape-8f81c40c56a58242ce344610c4f30138.yaml new file mode 100644 index 0000000000..903f98cf3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-ape-8f81c40c56a58242ce344610c4f30138.yaml @@ -0,0 +1,58 @@ +id: gallery-images-ape-8f81c40c56a58242ce344610c4f30138 + +info: + name: > + Gallery Images Ape <= 1.6.14 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8945cd7a-4185-4f0f-b56b-8ddd193dfed7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images-ape/" + google-query: inurl:"/wp-content/plugins/gallery-images-ape/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images-ape,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images-ape/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images-ape" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-ape-e82a3788d5ee1ba0ec33b3e0db2276c0.yaml b/nuclei-templates/cve-less/plugins/gallery-images-ape-e82a3788d5ee1ba0ec33b3e0db2276c0.yaml new file mode 100644 index 0000000000..8609b1c015 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-ape-e82a3788d5ee1ba0ec33b3e0db2276c0.yaml @@ -0,0 +1,58 @@ +id: gallery-images-ape-e82a3788d5ee1ba0ec33b3e0db2276c0 + +info: + name: > + Gallery Images Ape <= 2.2.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae63e7d-c5a2-4e8d-96e8-5d3c9c9ea1bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images-ape/" + google-query: inurl:"/wp-content/plugins/gallery-images-ape/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images-ape,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images-ape/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images-ape" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-b0c335beb11203f2fde885332ec9ff70.yaml b/nuclei-templates/cve-less/plugins/gallery-images-b0c335beb11203f2fde885332ec9ff70.yaml new file mode 100644 index 0000000000..e5d15be20b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-b0c335beb11203f2fde885332ec9ff70.yaml @@ -0,0 +1,58 @@ +id: gallery-images-b0c335beb11203f2fde885332ec9ff70 + +info: + name: > + Image Gallery – Responsive Photo Gallery <= 1.7.0 - Reflected Cross-Site Scripting via linkbutton + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f0b212a-969b-4cd3-a31c-40b9ff9dce5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images/" + google-query: inurl:"/wp-content/plugins/gallery-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-c8299f7372dc1e4660eef2d2e7182331.yaml b/nuclei-templates/cve-less/plugins/gallery-images-c8299f7372dc1e4660eef2d2e7182331.yaml new file mode 100644 index 0000000000..10d7526758 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-c8299f7372dc1e4660eef2d2e7182331.yaml @@ -0,0 +1,58 @@ +id: gallery-images-c8299f7372dc1e4660eef2d2e7182331 + +info: + name: > + Image Gallery - Responsive Photo Gallery <= 1.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd21b3fb-656d-4060-b7c6-e0b8e79afb4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images/" + google-query: inurl:"/wp-content/plugins/gallery-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-images-e236a1e5d3fb64e88e0ebd90fb6e2c1d.yaml b/nuclei-templates/cve-less/plugins/gallery-images-e236a1e5d3fb64e88e0ebd90fb6e2c1d.yaml new file mode 100644 index 0000000000..b3077f89d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-images-e236a1e5d3fb64e88e0ebd90fb6e2c1d.yaml @@ -0,0 +1,58 @@ +id: gallery-images-e236a1e5d3fb64e88e0ebd90fb6e2c1d + +info: + name: > + Image Gallery - Responsive Photo Gallery < 2.0.6 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3b954e6-cf5d-4451-b770-777d116edd90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-images/" + google-query: inurl:"/wp-content/plugins/gallery-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-metabox-24e92d0b5bd4d59ca9bd929ad9b17b1d.yaml b/nuclei-templates/cve-less/plugins/gallery-metabox-24e92d0b5bd4d59ca9bd929ad9b17b1d.yaml new file mode 100644 index 0000000000..cb33aa5883 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-metabox-24e92d0b5bd4d59ca9bd929ad9b17b1d.yaml @@ -0,0 +1,58 @@ +id: gallery-metabox-24e92d0b5bd4d59ca9bd929ad9b17b1d + +info: + name: > + Gallery Metabox <= 1.5 - Missing Authorization via gallery_remove + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faad339f-96d6-4937-a1f3-9d2d19bc6395?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-metabox/" + google-query: inurl:"/wp-content/plugins/gallery-metabox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-metabox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-metabox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-metabox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-metabox-9aa66e8181d06c3879c9f7626061f74d.yaml b/nuclei-templates/cve-less/plugins/gallery-metabox-9aa66e8181d06c3879c9f7626061f74d.yaml new file mode 100644 index 0000000000..c2ce0444d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-metabox-9aa66e8181d06c3879c9f7626061f74d.yaml @@ -0,0 +1,58 @@ +id: gallery-metabox-9aa66e8181d06c3879c9f7626061f74d + +info: + name: > + Gallery Metabox <= 1.5 - Cross-Site Request Forgery via gallery_remove + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f8b1103-71b2-421e-bcbe-f2716b59e367?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-metabox/" + google-query: inurl:"/wp-content/plugins/gallery-metabox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-metabox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-metabox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-metabox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-metabox-b4794af8b89126f30163809c87b8527e.yaml b/nuclei-templates/cve-less/plugins/gallery-metabox-b4794af8b89126f30163809c87b8527e.yaml new file mode 100644 index 0000000000..5afa45386f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-metabox-b4794af8b89126f30163809c87b8527e.yaml @@ -0,0 +1,58 @@ +id: gallery-metabox-b4794af8b89126f30163809c87b8527e + +info: + name: > + Gallery Metabox <= 1.5 - Missing Authorization via refresh_metabox + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/951e4651-56d6-474d-84b3-5a7cfc357b9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-metabox/" + google-query: inurl:"/wp-content/plugins/gallery-metabox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-metabox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-metabox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-metabox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-objects-94bac6252ee86efbe8c51ab00926a8e1.yaml b/nuclei-templates/cve-less/plugins/gallery-objects-94bac6252ee86efbe8c51ab00926a8e1.yaml new file mode 100644 index 0000000000..853add9061 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-objects-94bac6252ee86efbe8c51ab00926a8e1.yaml @@ -0,0 +1,58 @@ +id: gallery-objects-94bac6252ee86efbe8c51ab00926a8e1 + +info: + name: > + Gallery Objects <= 0.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c42203bc-3f69-44d2-b165-abb55937f65b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-objects/" + google-query: inurl:"/wp-content/plugins/gallery-objects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-objects,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-objects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-objects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-photo-gallery-12173e4cbd316d08ac752e946b4c8207.yaml b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-12173e4cbd316d08ac752e946b4c8207.yaml new file mode 100644 index 0000000000..665bbc5cc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-12173e4cbd316d08ac752e946b4c8207.yaml @@ -0,0 +1,58 @@ +id: gallery-photo-gallery-12173e4cbd316d08ac752e946b4c8207 + +info: + name: > + Photo Gallery by Ays – Responsive Image Gallery <= 4.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ec30511-40cb-433e-977c-df5be8c3d8f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-photo-gallery/" + google-query: inurl:"/wp-content/plugins/gallery-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-photo-gallery-2e53d704a68a2528570d9bc04622f7a7.yaml b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-2e53d704a68a2528570d9bc04622f7a7.yaml new file mode 100644 index 0000000000..c0702fad18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-2e53d704a68a2528570d9bc04622f7a7.yaml @@ -0,0 +1,58 @@ +id: gallery-photo-gallery-2e53d704a68a2528570d9bc04622f7a7 + +info: + name: > + Photo Gallery by Ays - Responsive Image Gallery <= 4.4.3 - Authenticated Blind SQL Injections + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36c32212-0d52-435e-bb6a-39ea07363a86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-photo-gallery/" + google-query: inurl:"/wp-content/plugins/gallery-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-photo-gallery-75a867eaf135888f5843d1ae423e6546.yaml b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-75a867eaf135888f5843d1ae423e6546.yaml new file mode 100644 index 0000000000..691aa1dae3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-75a867eaf135888f5843d1ae423e6546.yaml @@ -0,0 +1,58 @@ +id: gallery-photo-gallery-75a867eaf135888f5843d1ae423e6546 + +info: + name: > + Photo Gallery by Ays <= 5.1.3 - Reflected Cross-Site Scripting via ays_gpg_settings_tab + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db48a271-e649-4dbe-901b-aa55eba9123b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-photo-gallery/" + google-query: inurl:"/wp-content/plugins/gallery-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-photo-gallery-a359586a63676f31e06ba6a30e86f44d.yaml b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-a359586a63676f31e06ba6a30e86f44d.yaml new file mode 100644 index 0000000000..4215eb9f44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-a359586a63676f31e06ba6a30e86f44d.yaml @@ -0,0 +1,58 @@ +id: gallery-photo-gallery-a359586a63676f31e06ba6a30e86f44d + +info: + name: > + Photo Gallery by Ays – Responsive Image Gallery < 1.0.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79b631a0-08a7-460f-8668-0b10b42f12d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-photo-gallery/" + google-query: inurl:"/wp-content/plugins/gallery-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-photo-gallery-a43fcf2bf2b295c7f15edda834277892.yaml b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-a43fcf2bf2b295c7f15edda834277892.yaml new file mode 100644 index 0000000000..b5780f933f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-a43fcf2bf2b295c7f15edda834277892.yaml @@ -0,0 +1,58 @@ +id: gallery-photo-gallery-a43fcf2bf2b295c7f15edda834277892 + +info: + name: > + Photo Gallery by Ays <= 5.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb35b27f-e938-4a51-b441-887d23b7082a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-photo-gallery/" + google-query: inurl:"/wp-content/plugins/gallery-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-photo-gallery-b15f1d58fa6bd5d27fb5b07cf543a238.yaml b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-b15f1d58fa6bd5d27fb5b07cf543a238.yaml new file mode 100644 index 0000000000..bf08be552f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-b15f1d58fa6bd5d27fb5b07cf543a238.yaml @@ -0,0 +1,58 @@ +id: gallery-photo-gallery-b15f1d58fa6bd5d27fb5b07cf543a238 + +info: + name: > + Photo Gallery by Ays <= 5.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21f710ee-5040-4916-9fde-efc6d3b90943?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-photo-gallery/" + google-query: inurl:"/wp-content/plugins/gallery-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-photo-gallery-e682fc7edfbf166bd5ea5731aa2a90ff.yaml b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-e682fc7edfbf166bd5ea5731aa2a90ff.yaml new file mode 100644 index 0000000000..964d198f57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-photo-gallery-e682fc7edfbf166bd5ea5731aa2a90ff.yaml @@ -0,0 +1,58 @@ +id: gallery-photo-gallery-e682fc7edfbf166bd5ea5731aa2a90ff + +info: + name: > + Photo Gallery by Ays <= 5.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca62b54e-dde6-440f-bed9-db320179269e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-photo-gallery/" + google-query: inurl:"/wp-content/plugins/gallery-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-plugin-123e18f5d341b41bb59091344f2c4c88.yaml b/nuclei-templates/cve-less/plugins/gallery-plugin-123e18f5d341b41bb59091344f2c4c88.yaml new file mode 100644 index 0000000000..47a5b57613 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-plugin-123e18f5d341b41bb59091344f2c4c88.yaml @@ -0,0 +1,58 @@ +id: gallery-plugin-123e18f5d341b41bb59091344f2c4c88 + +info: + name: > + Gallery by BestWebSoft <= 4.6.9 - Authenticated (Author+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbfbb06c-f048-4912-9ff7-59aa10bc96bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-plugin/" + google-query: inurl:"/wp-content/plugins/gallery-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-plugin-3c52a879e5c7f6b209aeea9f28acf059.yaml b/nuclei-templates/cve-less/plugins/gallery-plugin-3c52a879e5c7f6b209aeea9f28acf059.yaml new file mode 100644 index 0000000000..94a6103267 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-plugin-3c52a879e5c7f6b209aeea9f28acf059.yaml @@ -0,0 +1,58 @@ +id: gallery-plugin-3c52a879e5c7f6b209aeea9f28acf059 + +info: + name: > + Gallery by BestWebSoft <= 4.6.9 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94868d48-2d36-49f1-9da1-7965ecaeae3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-plugin/" + google-query: inurl:"/wp-content/plugins/gallery-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-plugin-5fd70893ee93b2581f3496673936c180.yaml b/nuclei-templates/cve-less/plugins/gallery-plugin-5fd70893ee93b2581f3496673936c180.yaml new file mode 100644 index 0000000000..c10848abbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-plugin-5fd70893ee93b2581f3496673936c180.yaml @@ -0,0 +1,58 @@ +id: gallery-plugin-5fd70893ee93b2581f3496673936c180 + +info: + name: > + Gallery by BestWebSoft – Customizable Image and Photo Galleries for WordPress < 4.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a6d72d0-f262-46a1-91c7-1c34ab995614?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-plugin/" + google-query: inurl:"/wp-content/plugins/gallery-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-plugin-db5c08fdc8b62ebeda31a66adc0254db.yaml b/nuclei-templates/cve-less/plugins/gallery-plugin-db5c08fdc8b62ebeda31a66adc0254db.yaml new file mode 100644 index 0000000000..610f42cbe7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-plugin-db5c08fdc8b62ebeda31a66adc0254db.yaml @@ -0,0 +1,58 @@ +id: gallery-plugin-db5c08fdc8b62ebeda31a66adc0254db + +info: + name: > + Gallery by BestWebSoft – Customizable Image and Photo Galleries for WordPress <= 4.6.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3adf6b20-110f-4057-9fab-5248e9c18555?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-plugin/" + google-query: inurl:"/wp-content/plugins/gallery-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-portfolio-e03fc6f95e1cd7a63c181eae0df5daef.yaml b/nuclei-templates/cve-less/plugins/gallery-portfolio-e03fc6f95e1cd7a63c181eae0df5daef.yaml new file mode 100644 index 0000000000..ae1a4045b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-portfolio-e03fc6f95e1cd7a63c181eae0df5daef.yaml @@ -0,0 +1,58 @@ +id: gallery-portfolio-e03fc6f95e1cd7a63c181eae0df5daef + +info: + name: > + Gallery Portfolio <= 1.4.6 - Missing Authorization via Multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96112707-04ca-4647-9008-31954764486f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-portfolio/" + google-query: inurl:"/wp-content/plugins/gallery-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-portfolio-eea2926eb15d95f90b3df3b2873dbe1c.yaml b/nuclei-templates/cve-less/plugins/gallery-portfolio-eea2926eb15d95f90b3df3b2873dbe1c.yaml new file mode 100644 index 0000000000..24eb1bd225 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-portfolio-eea2926eb15d95f90b3df3b2873dbe1c.yaml @@ -0,0 +1,58 @@ +id: gallery-portfolio-eea2926eb15d95f90b3df3b2873dbe1c + +info: + name: > + Portfolio Gallery – Responsive Image Gallery <= 1.4.5 - Missing Authorization to Arbitrary Gallery Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a4e66e0-85a6-4e9f-8ed7-b7ee8e75aae6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-portfolio/" + google-query: inurl:"/wp-content/plugins/gallery-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-video-4499af25b68b47ad188a0b7fb55c9dba.yaml b/nuclei-templates/cve-less/plugins/gallery-video-4499af25b68b47ad188a0b7fb55c9dba.yaml new file mode 100644 index 0000000000..8b83f39a2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-video-4499af25b68b47ad188a0b7fb55c9dba.yaml @@ -0,0 +1,58 @@ +id: gallery-video-4499af25b68b47ad188a0b7fb55c9dba + +info: + name: > + Gallery - Video Gallery and YouTube Gallery <= 2.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02699ada-f4bf-45c4-89e8-018dfff40ac1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-video/" + google-query: inurl:"/wp-content/plugins/gallery-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-video,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-video-f4a5dffea18f1f7d8c2a38499c203636.yaml b/nuclei-templates/cve-less/plugins/gallery-video-f4a5dffea18f1f7d8c2a38499c203636.yaml new file mode 100644 index 0000000000..8c73c89570 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-video-f4a5dffea18f1f7d8c2a38499c203636.yaml @@ -0,0 +1,58 @@ +id: gallery-video-f4a5dffea18f1f7d8c2a38499c203636 + +info: + name: > + Gallery - Video Gallery and YouTube Gallery <= 1.7.01 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba8625eb-b710-4dd5-b08f-d212e2fd9013?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-video/" + google-query: inurl:"/wp-content/plugins/gallery-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-videos-724aa916d7f99f934199d401cd079892.yaml b/nuclei-templates/cve-less/plugins/gallery-videos-724aa916d7f99f934199d401cd079892.yaml new file mode 100644 index 0000000000..573dcc3474 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-videos-724aa916d7f99f934199d401cd079892.yaml @@ -0,0 +1,58 @@ +id: gallery-videos-724aa916d7f99f934199d401cd079892 + +info: + name: > + Video Gallery – YouTube Gallery <= 1.7.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fc8436b-f787-41dd-8404-9e85cca38cdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-videos/" + google-query: inurl:"/wp-content/plugins/gallery-videos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-videos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-videos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-videos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-videos-c6bd3ba187d60fb65a038a39af19f9cc.yaml b/nuclei-templates/cve-less/plugins/gallery-videos-c6bd3ba187d60fb65a038a39af19f9cc.yaml new file mode 100644 index 0000000000..8f795dbe1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-videos-c6bd3ba187d60fb65a038a39af19f9cc.yaml @@ -0,0 +1,58 @@ +id: gallery-videos-c6bd3ba187d60fb65a038a39af19f9cc + +info: + name: > + Video Gallery – YouTube Gallery <= 1.7.6 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88f9f4db-b15b-43d4-918a-a4c83e5735d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-videos/" + google-query: inurl:"/wp-content/plugins/gallery-videos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-videos,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-videos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-videos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-videos-ff831311ec70debdd240fd0dff910b29.yaml b/nuclei-templates/cve-less/plugins/gallery-videos-ff831311ec70debdd240fd0dff910b29.yaml new file mode 100644 index 0000000000..d91a03bdf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-videos-ff831311ec70debdd240fd0dff910b29.yaml @@ -0,0 +1,58 @@ +id: gallery-videos-ff831311ec70debdd240fd0dff910b29 + +info: + name: > + Video Gallery – YouTube Gallery <= 2.1.4 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8382051-ae17-4719-94b5-3cfb0b5e82b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-videos/" + google-query: inurl:"/wp-content/plugins/gallery-videos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-videos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-videos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-videos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gallery-with-thumbnail-slider-1a1fe1dc5dd307bb721b18dad6e53951.yaml b/nuclei-templates/cve-less/plugins/gallery-with-thumbnail-slider-1a1fe1dc5dd307bb721b18dad6e53951.yaml new file mode 100644 index 0000000000..319ff99dd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gallery-with-thumbnail-slider-1a1fe1dc5dd307bb721b18dad6e53951.yaml @@ -0,0 +1,58 @@ +id: gallery-with-thumbnail-slider-1a1fe1dc5dd307bb721b18dad6e53951 + +info: + name: > + Gallery with thumbnail slider <= 6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/552a5d94-8727-4840-8be1-ab165ddf4eae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gallery-with-thumbnail-slider/" + google-query: inurl:"/wp-content/plugins/gallery-with-thumbnail-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gallery-with-thumbnail-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gallery-with-thumbnail-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gallery-with-thumbnail-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/game-server-status-4860564c39627d424628b36fd20f6fbc.yaml b/nuclei-templates/cve-less/plugins/game-server-status-4860564c39627d424628b36fd20f6fbc.yaml new file mode 100644 index 0000000000..7737647484 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/game-server-status-4860564c39627d424628b36fd20f6fbc.yaml @@ -0,0 +1,58 @@ +id: game-server-status-4860564c39627d424628b36fd20f6fbc + +info: + name: > + Game Server Status <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3da37b4d-3dd7-450f-8169-28141eeb19c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/game-server-status/" + google-query: inurl:"/wp-content/plugins/game-server-status/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,game-server-status,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/game-server-status/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "game-server-status" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/game-tabs-50466a7332e4b48f14aef77f62be1c1a.yaml b/nuclei-templates/cve-less/plugins/game-tabs-50466a7332e4b48f14aef77f62be1c1a.yaml new file mode 100644 index 0000000000..08861e642a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/game-tabs-50466a7332e4b48f14aef77f62be1c1a.yaml @@ -0,0 +1,58 @@ +id: game-tabs-50466a7332e4b48f14aef77f62be1c1a + +info: + name: > + Game Tabs <= 0.4.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9103c67c-d75f-469d-94f1-ce7877384417?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/game-tabs/" + google-query: inurl:"/wp-content/plugins/game-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,game-tabs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/game-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "game-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamepress-5807ecea1e37da73a8c0fe20adcb6628.yaml b/nuclei-templates/cve-less/plugins/gamepress-5807ecea1e37da73a8c0fe20adcb6628.yaml new file mode 100644 index 0000000000..0b2c84fc27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamepress-5807ecea1e37da73a8c0fe20adcb6628.yaml @@ -0,0 +1,58 @@ +id: gamepress-5807ecea1e37da73a8c0fe20adcb6628 + +info: + name: > + GamePress – The Game Database Plugin <= 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10818590-6412-458f-a473-b24dc0b293dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamepress/" + google-query: inurl:"/wp-content/plugins/gamepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamepress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-2b733e03ac956657b279c0c2e7178248.yaml b/nuclei-templates/cve-less/plugins/gamipress-2b733e03ac956657b279c0c2e7178248.yaml new file mode 100644 index 0000000000..8d6c11aaf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-2b733e03ac956657b279c0c2e7178248.yaml @@ -0,0 +1,58 @@ +id: gamipress-2b733e03ac956657b279c0c2e7178248 + +info: + name: > + GamiPress <= 2.5.6 - Missing Authorization to User Points Updates + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c2ce765-018a-4292-b150-7905723d1335?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress/" + google-query: inurl:"/wp-content/plugins/gamipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-492436f7297ddc822ae54e1a5df2c7c8.yaml b/nuclei-templates/cve-less/plugins/gamipress-492436f7297ddc822ae54e1a5df2c7c8.yaml new file mode 100644 index 0000000000..06b92d4b45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-492436f7297ddc822ae54e1a5df2c7c8.yaml @@ -0,0 +1,58 @@ +id: gamipress-492436f7297ddc822ae54e1a5df2c7c8 + +info: + name: > + GamiPress <= 6.8.8 - Broken Access Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ba1100e-8669-4105-b8d7-27c0b81c0856?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress/" + google-query: inurl:"/wp-content/plugins/gamipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-a3e63c6c1c70f9733ff90ef830f2ba25.yaml b/nuclei-templates/cve-less/plugins/gamipress-a3e63c6c1c70f9733ff90ef830f2ba25.yaml new file mode 100644 index 0000000000..c40be68a70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-a3e63c6c1c70f9733ff90ef830f2ba25.yaml @@ -0,0 +1,58 @@ +id: gamipress-a3e63c6c1c70f9733ff90ef830f2ba25 + +info: + name: > + GamiPress <= 2.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c6b7dca-dd82-45b4-b9e2-0b44201396e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress/" + google-query: inurl:"/wp-content/plugins/gamipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-aec7b68517be6133995e008e368392d0.yaml b/nuclei-templates/cve-less/plugins/gamipress-aec7b68517be6133995e008e368392d0.yaml new file mode 100644 index 0000000000..2b5bf8b71a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-aec7b68517be6133995e008e368392d0.yaml @@ -0,0 +1,58 @@ +id: gamipress-aec7b68517be6133995e008e368392d0 + +info: + name: > + GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress <= 6.8.6 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f357fe2a-aa24-42cd-ac2c-c948e18a4710?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress/" + google-query: inurl:"/wp-content/plugins/gamipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-b5027c0ff3d1a1043ee2d2b4a208d677.yaml b/nuclei-templates/cve-less/plugins/gamipress-b5027c0ff3d1a1043ee2d2b4a208d677.yaml new file mode 100644 index 0000000000..231763a250 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-b5027c0ff3d1a1043ee2d2b4a208d677.yaml @@ -0,0 +1,58 @@ +id: gamipress-b5027c0ff3d1a1043ee2d2b4a208d677 + +info: + name: > + GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress <= 6.9.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/720a3525-01dd-4cfd-9403-2bc3f87df618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress/" + google-query: inurl:"/wp-content/plugins/gamipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-button-778205eb09884149dafbca785f8423fc.yaml b/nuclei-templates/cve-less/plugins/gamipress-button-778205eb09884149dafbca785f8423fc.yaml new file mode 100644 index 0000000000..4a50d5b95b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-button-778205eb09884149dafbca785f8423fc.yaml @@ -0,0 +1,58 @@ +id: gamipress-button-778205eb09884149dafbca785f8423fc + +info: + name: > + GamiPress – Button <= 1.0.7 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af39e563-5d88-460d-b02d-1aaa111c89dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress-button/" + google-query: inurl:"/wp-content/plugins/gamipress-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-button-c617abebc11fcaba875f8bc2aad4995e.yaml b/nuclei-templates/cve-less/plugins/gamipress-button-c617abebc11fcaba875f8bc2aad4995e.yaml new file mode 100644 index 0000000000..dd0cdf4714 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-button-c617abebc11fcaba875f8bc2aad4995e.yaml @@ -0,0 +1,58 @@ +id: gamipress-button-c617abebc11fcaba875f8bc2aad4995e + +info: + name: > + GamiPress – Button <= 1.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eedced7b-bda4-4292-8e87-fc3e37e4868b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress-button/" + google-query: inurl:"/wp-content/plugins/gamipress-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-d1724e13d2fdf6a25faad25727547d93.yaml b/nuclei-templates/cve-less/plugins/gamipress-d1724e13d2fdf6a25faad25727547d93.yaml new file mode 100644 index 0000000000..1743774123 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-d1724e13d2fdf6a25faad25727547d93.yaml @@ -0,0 +1,58 @@ +id: gamipress-d1724e13d2fdf6a25faad25727547d93 + +info: + name: > + GamiPress <= 6.8.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b68b6736-6552-4115-9702-bd178846544c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress/" + google-query: inurl:"/wp-content/plugins/gamipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-dcab95fd687427a84724b3b04c96af59.yaml b/nuclei-templates/cve-less/plugins/gamipress-dcab95fd687427a84724b3b04c96af59.yaml new file mode 100644 index 0000000000..4427a7a8c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-dcab95fd687427a84724b3b04c96af59.yaml @@ -0,0 +1,58 @@ +id: gamipress-dcab95fd687427a84724b3b04c96af59 + +info: + name: > + GamiPress <= 2.5.7 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b097ab2-7675-4409-b22a-ad70cee35ab1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress/" + google-query: inurl:"/wp-content/plugins/gamipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-de9f8e0363804898afa8fe7d0b301fdf.yaml b/nuclei-templates/cve-less/plugins/gamipress-de9f8e0363804898afa8fe7d0b301fdf.yaml new file mode 100644 index 0000000000..b2f9be005f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-de9f8e0363804898afa8fe7d0b301fdf.yaml @@ -0,0 +1,58 @@ +id: gamipress-de9f8e0363804898afa8fe7d0b301fdf + +info: + name: > + GamiPress <= 2.5.6 - Cross-Site Request Forgery to User Earnings Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff4b757a-9ede-496b-b559-cf952d39fe70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress/" + google-query: inurl:"/wp-content/plugins/gamipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-vimeo-integration-164be8fbabac441285f1a369205bd8e3.yaml b/nuclei-templates/cve-less/plugins/gamipress-vimeo-integration-164be8fbabac441285f1a369205bd8e3.yaml new file mode 100644 index 0000000000..666f50ca8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-vimeo-integration-164be8fbabac441285f1a369205bd8e3.yaml @@ -0,0 +1,58 @@ +id: gamipress-vimeo-integration-164be8fbabac441285f1a369205bd8e3 + +info: + name: > + GamiPress – Vimeo integration <= 1.0.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73aebd68-4f36-4999-844c-f09b10462ef8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress-vimeo-integration/" + google-query: inurl:"/wp-content/plugins/gamipress-vimeo-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress-vimeo-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress-vimeo-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress-vimeo-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gamipress-youtube-integration-808442071b530e99e27528108f7402f0.yaml b/nuclei-templates/cve-less/plugins/gamipress-youtube-integration-808442071b530e99e27528108f7402f0.yaml new file mode 100644 index 0000000000..ec1a12fcc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gamipress-youtube-integration-808442071b530e99e27528108f7402f0.yaml @@ -0,0 +1,58 @@ +id: gamipress-youtube-integration-808442071b530e99e27528108f7402f0 + +info: + name: > + GamiPress – Youtube integration <= 1.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb74a917-2dfb-4229-a72a-9c3d1f9a6324?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gamipress-youtube-integration/" + google-query: inurl:"/wp-content/plugins/gamipress-youtube-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gamipress-youtube-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gamipress-youtube-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gamipress-youtube-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gantry-5e536ce02840d623d389b9ee218020ac.yaml b/nuclei-templates/cve-less/plugins/gantry-5e536ce02840d623d389b9ee218020ac.yaml new file mode 100644 index 0000000000..1c44a476d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gantry-5e536ce02840d623d389b9ee218020ac.yaml @@ -0,0 +1,58 @@ +id: gantry-5e536ce02840d623d389b9ee218020ac + +info: + name: > + Gantry 4 Framework <= 4.1.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aeca3b6-6b1b-40b5-8824-de4a90c7ddc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gantry/" + google-query: inurl:"/wp-content/plugins/gantry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gantry,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gantry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gantry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gappointments-3337ca8e284defa05fd45bda9b3ec176.yaml b/nuclei-templates/cve-less/plugins/gappointments-3337ca8e284defa05fd45bda9b3ec176.yaml new file mode 100644 index 0000000000..7ed40359d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gappointments-3337ca8e284defa05fd45bda9b3ec176.yaml @@ -0,0 +1,58 @@ +id: gappointments-3337ca8e284defa05fd45bda9b3ec176 + +info: + name: > + gAppointments <= 1.9.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20a6a58f-b6c0-4132-932b-c6def8e9e7c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gAppointments/" + google-query: inurl:"/wp-content/plugins/gAppointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gAppointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gAppointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gAppointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gappointments-fdce74da2fc29d9a1b7b66e598acdde8.yaml b/nuclei-templates/cve-less/plugins/gappointments-fdce74da2fc29d9a1b7b66e598acdde8.yaml new file mode 100644 index 0000000000..76bb754d2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gappointments-fdce74da2fc29d9a1b7b66e598acdde8.yaml @@ -0,0 +1,58 @@ +id: gappointments-fdce74da2fc29d9a1b7b66e598acdde8 + +info: + name: > + gAppointments - Appointment booking addon for Gravity Forms <= 1.9.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19983f79-b439-4bb0-8f29-8312f1ff9791?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gAppointments/" + google-query: inurl:"/wp-content/plugins/gAppointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gAppointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gAppointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gAppointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/garagesale-a274fd2664073f0162156778e8dac986.yaml b/nuclei-templates/cve-less/plugins/garagesale-a274fd2664073f0162156778e8dac986.yaml new file mode 100644 index 0000000000..8198a47fde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/garagesale-a274fd2664073f0162156778e8dac986.yaml @@ -0,0 +1,58 @@ +id: garagesale-a274fd2664073f0162156778e8dac986 + +info: + name: > + GarageSale < 1.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1ed7ed0-5bcd-42ca-ab56-70ebd3d3c63a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/garagesale/" + google-query: inurl:"/wp-content/plugins/garagesale/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,garagesale,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/garagesale/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "garagesale" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/garden-gnome-package-597aa63a54783e43984bca6c0a5bda16.yaml b/nuclei-templates/cve-less/plugins/garden-gnome-package-597aa63a54783e43984bca6c0a5bda16.yaml new file mode 100644 index 0000000000..8fb2a4c19c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/garden-gnome-package-597aa63a54783e43984bca6c0a5bda16.yaml @@ -0,0 +1,58 @@ +id: garden-gnome-package-597aa63a54783e43984bca6c0a5bda16 + +info: + name: > + Garden Gnome Package <= 2.2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c7385c7-47de-4511-b474-7415c3977aa8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/garden-gnome-package/" + google-query: inurl:"/wp-content/plugins/garden-gnome-package/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,garden-gnome-package,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/garden-gnome-package/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "garden-gnome-package" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/garees-flickr-feed-00a6e702537059b82f7d21b3c6087796.yaml b/nuclei-templates/cve-less/plugins/garees-flickr-feed-00a6e702537059b82f7d21b3c6087796.yaml new file mode 100644 index 0000000000..f1ce32d907 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/garees-flickr-feed-00a6e702537059b82f7d21b3c6087796.yaml @@ -0,0 +1,58 @@ +id: garees-flickr-feed-00a6e702537059b82f7d21b3c6087796 + +info: + name: > + Garee's Flickr Feed <= 0.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50912c68-1bc8-4792-b624-4edda17ae43f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/garees-flickr-feed/" + google-query: inurl:"/wp-content/plugins/garees-flickr-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,garees-flickr-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/garees-flickr-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "garees-flickr-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gb-gallery-slideshow-5951232c0f20a63b311a79c589b973af.yaml b/nuclei-templates/cve-less/plugins/gb-gallery-slideshow-5951232c0f20a63b311a79c589b973af.yaml new file mode 100644 index 0000000000..b8a6df59d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gb-gallery-slideshow-5951232c0f20a63b311a79c589b973af.yaml @@ -0,0 +1,58 @@ +id: gb-gallery-slideshow-5951232c0f20a63b311a79c589b973af + +info: + name: > + GB Gallery Slideshow <= 1.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb85341a-0253-41b2-992e-9202cb3e0f2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gb-gallery-slideshow/" + google-query: inurl:"/wp-content/plugins/gb-gallery-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gb-gallery-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gb-gallery-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gb-gallery-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gbteamstats-41dad8547a4dae3a9d56539c297d8d0a.yaml b/nuclei-templates/cve-less/plugins/gbteamstats-41dad8547a4dae3a9d56539c297d8d0a.yaml new file mode 100644 index 0000000000..e3b35e1b1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gbteamstats-41dad8547a4dae3a9d56539c297d8d0a.yaml @@ -0,0 +1,58 @@ +id: gbteamstats-41dad8547a4dae3a9d56539c297d8d0a + +info: + name: > + GB Team Stats <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bad3803-77c3-4c9f-906c-ba5b1886c997?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gbteamstats/" + google-query: inurl:"/wp-content/plugins/gbteamstats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gbteamstats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gbteamstats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gbteamstats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gc-testimonials-673bbf1cbb44b5f720028f2010c7e907.yaml b/nuclei-templates/cve-less/plugins/gc-testimonials-673bbf1cbb44b5f720028f2010c7e907.yaml new file mode 100644 index 0000000000..ceb2b294a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gc-testimonials-673bbf1cbb44b5f720028f2010c7e907.yaml @@ -0,0 +1,58 @@ +id: gc-testimonials-673bbf1cbb44b5f720028f2010c7e907 + +info: + name: > + GC Testimonials <= 1.3.2 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dd7eb74-20ec-4949-9ba2-34081849d7f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gc-testimonials/" + google-query: inurl:"/wp-content/plugins/gc-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gc-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gc-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gc-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-16c5aaa4049ec9cf0dce63beccb79a30.yaml b/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-16c5aaa4049ec9cf0dce63beccb79a30.yaml new file mode 100644 index 0000000000..508064025f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-16c5aaa4049ec9cf0dce63beccb79a30.yaml @@ -0,0 +1,58 @@ +id: gd-bbpress-attachments-16c5aaa4049ec9cf0dce63beccb79a30 + +info: + name: > + GD bbPress Attachments < 2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a1f91a3-6b8d-4be4-817c-9c88d2349723?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-bbpress-attachments/" + google-query: inurl:"/wp-content/plugins/gd-bbpress-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-bbpress-attachments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-bbpress-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-bbpress-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-6edbfbf441adea692ef285720c58a9cd.yaml b/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-6edbfbf441adea692ef285720c58a9cd.yaml new file mode 100644 index 0000000000..bc0fd544a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-6edbfbf441adea692ef285720c58a9cd.yaml @@ -0,0 +1,58 @@ +id: gd-bbpress-attachments-6edbfbf441adea692ef285720c58a9cd + +info: + name: > + GD bbPress Attachments <= 4.3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/642c03f4-f12c-4ae2-a4ab-4f49d6bd033c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-bbpress-attachments/" + google-query: inurl:"/wp-content/plugins/gd-bbpress-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-bbpress-attachments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-bbpress-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-bbpress-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-b5416cf2ccfb117fc0f1b193a5863e11.yaml b/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-b5416cf2ccfb117fc0f1b193a5863e11.yaml new file mode 100644 index 0000000000..b6eee55632 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-b5416cf2ccfb117fc0f1b193a5863e11.yaml @@ -0,0 +1,58 @@ +id: gd-bbpress-attachments-b5416cf2ccfb117fc0f1b193a5863e11 + +info: + name: > + GD bbPress Attachments < 2.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25543955-15b0-4dda-9636-c116db7f2838?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-bbpress-attachments/" + google-query: inurl:"/wp-content/plugins/gd-bbpress-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-bbpress-attachments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-bbpress-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-bbpress-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-fd5091b9ca6d56c1bb46823f06a6b82d.yaml b/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-fd5091b9ca6d56c1bb46823f06a6b82d.yaml new file mode 100644 index 0000000000..3e4daeff5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-bbpress-attachments-fd5091b9ca6d56c1bb46823f06a6b82d.yaml @@ -0,0 +1,58 @@ +id: gd-bbpress-attachments-fd5091b9ca6d56c1bb46823f06a6b82d + +info: + name: > + GD bbPress Attachments <= 2.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c62cb055-2816-40dc-b25b-395d7e230c9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-bbpress-attachments/" + google-query: inurl:"/wp-content/plugins/gd-bbpress-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-bbpress-attachments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-bbpress-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-bbpress-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-mail-queue-859e2f1c3d7c5202926f95b0d25e1db8.yaml b/nuclei-templates/cve-less/plugins/gd-mail-queue-859e2f1c3d7c5202926f95b0d25e1db8.yaml new file mode 100644 index 0000000000..e41a071b7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-mail-queue-859e2f1c3d7c5202926f95b0d25e1db8.yaml @@ -0,0 +1,58 @@ +id: gd-mail-queue-859e2f1c3d7c5202926f95b0d25e1db8 + +info: + name: > + GD Mail Queue <= 3.9.3 - Unauthenticated Stored Cross-Site Scripting via Email + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b668f45-c7fb-481b-bc8e-115e5b7248c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-mail-queue/" + google-query: inurl:"/wp-content/plugins/gd-mail-queue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-mail-queue,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-mail-queue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-mail-queue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-mylist-8ac9cdbd4cf7676c20528abcd5d7ef87.yaml b/nuclei-templates/cve-less/plugins/gd-mylist-8ac9cdbd4cf7676c20528abcd5d7ef87.yaml new file mode 100644 index 0000000000..3f68eba4ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-mylist-8ac9cdbd4cf7676c20528abcd5d7ef87.yaml @@ -0,0 +1,58 @@ +id: gd-mylist-8ac9cdbd4cf7676c20528abcd5d7ef87 + +info: + name: > + GD Mylist <= 1.1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2110dbe-a625-4fa5-8426-8f11b3c33844?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-mylist/" + google-query: inurl:"/wp-content/plugins/gd-mylist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-mylist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-mylist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-mylist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-034ab84e882013699ca86030c39bb7c1.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-034ab84e882013699ca86030c39bb7c1.yaml new file mode 100644 index 0000000000..5b12d4fb1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-034ab84e882013699ca86030c39bb7c1.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-034ab84e882013699ca86030c39bb7c1 + +info: + name: > + GD Rating System <= 2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c14f473f-ca49-4610-b5df-9eb0e064ece5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-202b289fdef0d266d30f1e52a074682a.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-202b289fdef0d266d30f1e52a074682a.yaml new file mode 100644 index 0000000000..7bae2c677b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-202b289fdef0d266d30f1e52a074682a.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-202b289fdef0d266d30f1e52a074682a + +info: + name: > + GD Rating System <= 2.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44210443-26f8-4626-aee2-4a19d87fdd43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-363e85a87b5e31a1dda22e9466545bd8.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-363e85a87b5e31a1dda22e9466545bd8.yaml new file mode 100644 index 0000000000..85c8ff01db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-363e85a87b5e31a1dda22e9466545bd8.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-363e85a87b5e31a1dda22e9466545bd8 + +info: + name: > + GD Rating System <= 2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccf80f2d-3d2d-4fe6-a4c4-5a850cf5bdc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-4aea8831d45ac7f2974ea4162d22b445.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-4aea8831d45ac7f2974ea4162d22b445.yaml new file mode 100644 index 0000000000..b91cb77a04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-4aea8831d45ac7f2974ea4162d22b445.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-4aea8831d45ac7f2974ea4162d22b445 + +info: + name: > + GD Rating System < 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10ac9e80-7aa9-4cc5-ad37-f15f8d12ed16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-567c0bab82561630aea9403749f896f8.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-567c0bab82561630aea9403749f896f8.yaml new file mode 100644 index 0000000000..015cf3bb1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-567c0bab82561630aea9403749f896f8.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-567c0bab82561630aea9403749f896f8 + +info: + name: > + GD Rating System <= 2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8e768a4-09ac-4772-9e5d-b9f63bac208c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-651523e243c6fa14f5b8ba27b9c0bb50.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-651523e243c6fa14f5b8ba27b9c0bb50.yaml new file mode 100644 index 0000000000..ab23db0430 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-651523e243c6fa14f5b8ba27b9c0bb50.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-651523e243c6fa14f5b8ba27b9c0bb50 + +info: + name: > + GD Rating System <= 2.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6351d3f7-2d10-4fcf-b7c1-88ce529cd9f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-79116f6e6f3436dd311270ae51db9449.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-79116f6e6f3436dd311270ae51db9449.yaml new file mode 100644 index 0000000000..5a6532c40f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-79116f6e6f3436dd311270ae51db9449.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-79116f6e6f3436dd311270ae51db9449 + +info: + name: > + GD Rating System <= 2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1a7e39a-5fd1-4bb3-9cd9-4bded794f8f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-96454af8a6ce5f0b120ae58c0cde8af3.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-96454af8a6ce5f0b120ae58c0cde8af3.yaml new file mode 100644 index 0000000000..c12e2992d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-96454af8a6ce5f0b120ae58c0cde8af3.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-96454af8a6ce5f0b120ae58c0cde8af3 + +info: + name: > + GD Rating System <= 3.5.0 - Unauthenticated Stored Cross-Site Scripting via IP + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0b3662d-e369-4978-aa7a-debbb3ee37e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-d24dbe0a4be4e84f6cf2d04eb17d95aa.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-d24dbe0a4be4e84f6cf2d04eb17d95aa.yaml new file mode 100644 index 0000000000..98e9885088 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-d24dbe0a4be4e84f6cf2d04eb17d95aa.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-d24dbe0a4be4e84f6cf2d04eb17d95aa + +info: + name: > + GD Rating System <= 2.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0d6c8dc-d32b-4ac8-8b0d-6d7ecbac86b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-rating-system-f7fd1a8bc5d53786fd5110511a3a1b47.yaml b/nuclei-templates/cve-less/plugins/gd-rating-system-f7fd1a8bc5d53786fd5110511a3a1b47.yaml new file mode 100644 index 0000000000..f2497cdbf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-rating-system-f7fd1a8bc5d53786fd5110511a3a1b47.yaml @@ -0,0 +1,58 @@ +id: gd-rating-system-f7fd1a8bc5d53786fd5110511a3a1b47 + +info: + name: > + GD Rating System <= 2.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47687614-bd79-44fd-bc82-eaa801c1387d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-rating-system/" + google-query: inurl:"/wp-content/plugins/gd-rating-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-rating-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-rating-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-rating-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-security-headers-626d7835b20c4c891b207d32709f9d9a.yaml b/nuclei-templates/cve-less/plugins/gd-security-headers-626d7835b20c4c891b207d32709f9d9a.yaml new file mode 100644 index 0000000000..3ee16adfea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-security-headers-626d7835b20c4c891b207d32709f9d9a.yaml @@ -0,0 +1,58 @@ +id: gd-security-headers-626d7835b20c4c891b207d32709f9d9a + +info: + name: > + GD Security Headers <= 1.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce32ecf-6995-4794-8559-2f84533ecf50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-security-headers/" + google-query: inurl:"/wp-content/plugins/gd-security-headers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-security-headers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-security-headers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-security-headers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-security-headers-c051ed74380d85e155152ed23876ff43.yaml b/nuclei-templates/cve-less/plugins/gd-security-headers-c051ed74380d85e155152ed23876ff43.yaml new file mode 100644 index 0000000000..323fa982f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-security-headers-c051ed74380d85e155152ed23876ff43.yaml @@ -0,0 +1,58 @@ +id: gd-security-headers-c051ed74380d85e155152ed23876ff43 + +info: + name: > + GD Security Headers <= 1.7 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b556bb3b-0fea-48a9-a893-3ad015559f3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-security-headers/" + google-query: inurl:"/wp-content/plugins/gd-security-headers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-security-headers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-security-headers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-security-headers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-star-rating-0b148460306247418981fb91f92502a9.yaml b/nuclei-templates/cve-less/plugins/gd-star-rating-0b148460306247418981fb91f92502a9.yaml new file mode 100644 index 0000000000..a7c2b272ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-star-rating-0b148460306247418981fb91f92502a9.yaml @@ -0,0 +1,58 @@ +id: gd-star-rating-0b148460306247418981fb91f92502a9 + +info: + name: > + GD Star Rating <= 1.9.22 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/211634f6-afc4-4841-8851-6c56a248af95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-star-rating/" + google-query: inurl:"/wp-content/plugins/gd-star-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-star-rating,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-star-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-star-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-star-rating-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml b/nuclei-templates/cve-less/plugins/gd-star-rating-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml new file mode 100644 index 0000000000..4db60c3675 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-star-rating-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml @@ -0,0 +1,58 @@ +id: gd-star-rating-5ce9260c9b6d59d0d80e5fb0cb039b07 + +info: + name: > + GD Star Rating <= 1.9.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1432907e-bcd0-498f-9356-f269a252bc4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-star-rating/" + google-query: inurl:"/wp-content/plugins/gd-star-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-star-rating,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-star-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-star-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-star-rating-df4cd9fee3d0d59fcdf3318f36c11feb.yaml b/nuclei-templates/cve-less/plugins/gd-star-rating-df4cd9fee3d0d59fcdf3318f36c11feb.yaml new file mode 100644 index 0000000000..e3a7e8f5ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-star-rating-df4cd9fee3d0d59fcdf3318f36c11feb.yaml @@ -0,0 +1,58 @@ +id: gd-star-rating-df4cd9fee3d0d59fcdf3318f36c11feb + +info: + name: > + GD Star Rating < 1.9.17 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf852d93-6d56-46a2-aebc-b222b1b73fb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-star-rating/" + google-query: inurl:"/wp-content/plugins/gd-star-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-star-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-star-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-star-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gd-star-rating-ff4f16d3b72060599b9ed34018f0f5e7.yaml b/nuclei-templates/cve-less/plugins/gd-star-rating-ff4f16d3b72060599b9ed34018f0f5e7.yaml new file mode 100644 index 0000000000..08e0166428 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gd-star-rating-ff4f16d3b72060599b9ed34018f0f5e7.yaml @@ -0,0 +1,58 @@ +id: gd-star-rating-ff4f16d3b72060599b9ed34018f0f5e7 + +info: + name: > + GD Star Rating <= 1.9.22 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2e6f09e-0ebc-47e3-84f3-9aede2781f42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gd-star-rating/" + google-query: inurl:"/wp-content/plugins/gd-star-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gd-star-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gd-star-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gd-star-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdeslon-affiliate-shop-d3c451e9553be70e313576f0e6fdb8a8.yaml b/nuclei-templates/cve-less/plugins/gdeslon-affiliate-shop-d3c451e9553be70e313576f0e6fdb8a8.yaml new file mode 100644 index 0000000000..2808365b36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdeslon-affiliate-shop-d3c451e9553be70e313576f0e6fdb8a8.yaml @@ -0,0 +1,58 @@ +id: gdeslon-affiliate-shop-d3c451e9553be70e313576f0e6fdb8a8 + +info: + name: > + GdeSlon Affiliate Shop <= 1.5.5 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6e26846-9fcf-4078-9b45-660463ec5b04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdeslon-affiliate-shop/" + google-query: inurl:"/wp-content/plugins/gdeslon-affiliate-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdeslon-affiliate-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdeslon-affiliate-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdeslon-affiliate-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-compliance-52a132f231403e0d19dffecc858bc7bc.yaml b/nuclei-templates/cve-less/plugins/gdpr-compliance-52a132f231403e0d19dffecc858bc7bc.yaml new file mode 100644 index 0000000000..95f7f8917a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-compliance-52a132f231403e0d19dffecc858bc7bc.yaml @@ -0,0 +1,58 @@ +id: gdpr-compliance-52a132f231403e0d19dffecc858bc7bc + +info: + name: > + GDPR Compliance <= 1.2.5 - Authenticated (Subscriber+) Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b56076bd-4a15-4857-9443-b36eed66d5c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-compliance/" + google-query: inurl:"/wp-content/plugins/gdpr-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-compliance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-compliance-by-supsystic-d52f1aa2c59f42390d8192c949633ea4.yaml b/nuclei-templates/cve-less/plugins/gdpr-compliance-by-supsystic-d52f1aa2c59f42390d8192c949633ea4.yaml new file mode 100644 index 0000000000..31dcb57c3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-compliance-by-supsystic-d52f1aa2c59f42390d8192c949633ea4.yaml @@ -0,0 +1,58 @@ +id: gdpr-compliance-by-supsystic-d52f1aa2c59f42390d8192c949633ea4 + +info: + name: > + GDPR Cookie Consent by Supsystic <= 2.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/158a63c1-1b2e-4fbf-ac86-43471ba8ebc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-compliance-by-supsystic/" + google-query: inurl:"/wp-content/plugins/gdpr-compliance-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-compliance-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-compliance-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-compliance-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-compliance-cookie-consent-f512a45803d4900b6bd2ce597a679e7f.yaml b/nuclei-templates/cve-less/plugins/gdpr-compliance-cookie-consent-f512a45803d4900b6bd2ce597a679e7f.yaml new file mode 100644 index 0000000000..4b81c47953 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-compliance-cookie-consent-f512a45803d4900b6bd2ce597a679e7f.yaml @@ -0,0 +1,58 @@ +id: gdpr-compliance-cookie-consent-f512a45803d4900b6bd2ce597a679e7f + +info: + name: > + GDPR Compliance & Cookie Consent <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/052b345a-7b71-4de5-9bf8-8b81cc1b4e77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-compliance-cookie-consent/" + google-query: inurl:"/wp-content/plugins/gdpr-compliance-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-compliance-cookie-consent,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-compliance-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-compliance-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-cookie-compliance-42ff6519960f311906ae3110cd3f6c64.yaml b/nuclei-templates/cve-less/plugins/gdpr-cookie-compliance-42ff6519960f311906ae3110cd3f6c64.yaml new file mode 100644 index 0000000000..4ab615c58c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-cookie-compliance-42ff6519960f311906ae3110cd3f6c64.yaml @@ -0,0 +1,58 @@ +id: gdpr-cookie-compliance-42ff6519960f311906ae3110cd3f6c64 + +info: + name: > + GDPR Cookie Compliance <= 4.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9116d719-f536-4b8a-9e73-9a8a922f8a35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-cookie-compliance/" + google-query: inurl:"/wp-content/plugins/gdpr-cookie-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-cookie-compliance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-cookie-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-cookie-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-cookie-compliance-ebc9a2de114d9ab75adedbcfdade473e.yaml b/nuclei-templates/cve-less/plugins/gdpr-cookie-compliance-ebc9a2de114d9ab75adedbcfdade473e.yaml new file mode 100644 index 0000000000..9c5e84f7c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-cookie-compliance-ebc9a2de114d9ab75adedbcfdade473e.yaml @@ -0,0 +1,58 @@ +id: gdpr-cookie-compliance-ebc9a2de114d9ab75adedbcfdade473e + +info: + name: > + GDPR Cookie Compliance <= 4.12.4 - Cross-Site Request Forgery to License Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f847a61-4378-4b04-8eb4-99ef36417b6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-cookie-compliance/" + google-query: inurl:"/wp-content/plugins/gdpr-cookie-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-cookie-compliance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-cookie-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-cookie-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.12.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-6fafcaccee81c5d3208247d34dd3565c.yaml b/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-6fafcaccee81c5d3208247d34dd3565c.yaml new file mode 100644 index 0000000000..b99c28f182 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-6fafcaccee81c5d3208247d34dd3565c.yaml @@ -0,0 +1,58 @@ +id: gdpr-cookie-consent-6fafcaccee81c5d3208247d34dd3565c + +info: + name: > + WP Cookie Notice for GDPR, CCPA & ePrivacy Consent <= 2.2.5 - Authenticated(Administrator+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d178852-53bc-440b-8217-67ae68749349?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-cookie-consent/" + google-query: inurl:"/wp-content/plugins/gdpr-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-cookie-consent,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-74ceb3dd0e91d385e16d6cd94c463dea.yaml b/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-74ceb3dd0e91d385e16d6cd94c463dea.yaml new file mode 100644 index 0000000000..1789a29b3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-74ceb3dd0e91d385e16d6cd94c463dea.yaml @@ -0,0 +1,58 @@ +id: gdpr-cookie-consent-74ceb3dd0e91d385e16d6cd94c463dea + +info: + name: > + WP Cookie Consent ( for GDPR, CCPA & ePrivacy ) <= 3.0.2 - Missing Authorization to Unauthenticated Arbitrary Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b9abbf1-d9f5-4406-9d0c-bc2f9891d0e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-cookie-consent/" + google-query: inurl:"/wp-content/plugins/gdpr-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-cookie-consent,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..35a563a727 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-cookie-consent-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: gdpr-cookie-consent-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-cookie-consent/" + google-query: inurl:"/wp-content/plugins/gdpr-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-cookie-consent,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gdpr-data-request-form-aafc1366408bf54fb9b81d829a07db37.yaml b/nuclei-templates/cve-less/plugins/gdpr-data-request-form-aafc1366408bf54fb9b81d829a07db37.yaml new file mode 100644 index 0000000000..6ddd8b4811 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gdpr-data-request-form-aafc1366408bf54fb9b81d829a07db37.yaml @@ -0,0 +1,58 @@ +id: gdpr-data-request-form-aafc1366408bf54fb9b81d829a07db37 + +info: + name: > + GDPR Data Request Form <= 1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0b8fd44-75af-4fb8-bcc1-94cb5fc9e4eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gdpr-data-request-form/" + google-query: inurl:"/wp-content/plugins/gdpr-data-request-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gdpr-data-request-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gdpr-data-request-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gdpr-data-request-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gecka-terms-thumbnails-3ddf708feedcea3e47167b185d508195.yaml b/nuclei-templates/cve-less/plugins/gecka-terms-thumbnails-3ddf708feedcea3e47167b185d508195.yaml new file mode 100644 index 0000000000..2c4d1d0b94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gecka-terms-thumbnails-3ddf708feedcea3e47167b185d508195.yaml @@ -0,0 +1,58 @@ +id: gecka-terms-thumbnails-3ddf708feedcea3e47167b185d508195 + +info: + name: > + Gecka Terms Thumbnails <= 1.1 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07abe182-370f-4241-9631-387a7930f2f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gecka-terms-thumbnails/" + google-query: inurl:"/wp-content/plugins/gecka-terms-thumbnails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gecka-terms-thumbnails,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gecka-terms-thumbnails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gecka-terms-thumbnails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/genealogical-tree-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/genealogical-tree-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..eff3f1e190 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/genealogical-tree-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: genealogical-tree-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/genealogical-tree/" + google-query: inurl:"/wp-content/plugins/genealogical-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,genealogical-tree,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/genealogical-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "genealogical-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/generate-child-theme-14f53d257d97b80a7d3d574dcba76821.yaml b/nuclei-templates/cve-less/plugins/generate-child-theme-14f53d257d97b80a7d3d574dcba76821.yaml new file mode 100644 index 0000000000..6d4d2c52d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/generate-child-theme-14f53d257d97b80a7d3d574dcba76821.yaml @@ -0,0 +1,58 @@ +id: generate-child-theme-14f53d257d97b80a7d3d574dcba76821 + +info: + name: > + Generate Child Theme <= 2.0 - Cross-Site Request Forgery via process_create_form() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d67b1a6c-001d-452e-861c-0e5c7ab465dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/generate-child-theme/" + google-query: inurl:"/wp-content/plugins/generate-child-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,generate-child-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/generate-child-theme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "generate-child-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/generate-child-theme-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/generate-child-theme-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..db863d6538 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/generate-child-theme-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: generate-child-theme-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/generate-child-theme/" + google-query: inurl:"/wp-content/plugins/generate-child-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,generate-child-theme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/generate-child-theme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "generate-child-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/generate-dummy-posts-177a143182cd744b54e19a39a4cfbfd2.yaml b/nuclei-templates/cve-less/plugins/generate-dummy-posts-177a143182cd744b54e19a39a4cfbfd2.yaml new file mode 100644 index 0000000000..65f7bf5f67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/generate-dummy-posts-177a143182cd744b54e19a39a4cfbfd2.yaml @@ -0,0 +1,58 @@ +id: generate-dummy-posts-177a143182cd744b54e19a39a4cfbfd2 + +info: + name: > + Generate Dummy Posts <= 1.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d797f36-f485-4049-83f0-01d0cb409a92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/generate-dummy-posts/" + google-query: inurl:"/wp-content/plugins/generate-dummy-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,generate-dummy-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/generate-dummy-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "generate-dummy-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/generate-pdf-using-contact-form-7-213c6c67e9f7d7367e5fa5ff895afa34.yaml b/nuclei-templates/cve-less/plugins/generate-pdf-using-contact-form-7-213c6c67e9f7d7367e5fa5ff895afa34.yaml new file mode 100644 index 0000000000..6f5e750933 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/generate-pdf-using-contact-form-7-213c6c67e9f7d7367e5fa5ff895afa34.yaml @@ -0,0 +1,58 @@ +id: generate-pdf-using-contact-form-7-213c6c67e9f7d7367e5fa5ff895afa34 + +info: + name: > + Generate PDF using Contact Form 7 <= 3.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39f1ddd0-c26b-4754-a78a-c64fab75f238?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/generate-pdf-using-contact-form-7/" + google-query: inurl:"/wp-content/plugins/generate-pdf-using-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,generate-pdf-using-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/generate-pdf-using-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "generate-pdf-using-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/generateblocks-207f8d3483b6bc918c2a6bbcc21fd35b.yaml b/nuclei-templates/cve-less/plugins/generateblocks-207f8d3483b6bc918c2a6bbcc21fd35b.yaml new file mode 100644 index 0000000000..9c5a84bedc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/generateblocks-207f8d3483b6bc918c2a6bbcc21fd35b.yaml @@ -0,0 +1,58 @@ +id: generateblocks-207f8d3483b6bc918c2a6bbcc21fd35b + +info: + name: > + GenerateBlocks <= 1.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffd3ecc8-8b76-453f-b2e9-a9c70c58edbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/generateblocks/" + google-query: inurl:"/wp-content/plugins/generateblocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,generateblocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/generateblocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "generateblocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/generateblocks-74b40b0063e22d99daacbf3fd60ee7a2.yaml b/nuclei-templates/cve-less/plugins/generateblocks-74b40b0063e22d99daacbf3fd60ee7a2.yaml new file mode 100644 index 0000000000..e01adb0238 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/generateblocks-74b40b0063e22d99daacbf3fd60ee7a2.yaml @@ -0,0 +1,58 @@ +id: generateblocks-74b40b0063e22d99daacbf3fd60ee7a2 + +info: + name: > + GenerateBlocks <= 1.8.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62f19301-2311-4989-a5f2-9f845b72dd54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/generateblocks/" + google-query: inurl:"/wp-content/plugins/generateblocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,generateblocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/generateblocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "generateblocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/generatepress-premium-616c8823c1cd69f1db936287f2d1fa7d.yaml b/nuclei-templates/cve-less/plugins/generatepress-premium-616c8823c1cd69f1db936287f2d1fa7d.yaml new file mode 100644 index 0000000000..2389e75041 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/generatepress-premium-616c8823c1cd69f1db936287f2d1fa7d.yaml @@ -0,0 +1,58 @@ +id: generatepress-premium-616c8823c1cd69f1db936287f2d1fa7d + +info: + name: > + GeneratePress Premium <= 2.3.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via Custom Meta + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dcd48b8-ec9e-44b4-b531-95940adbd100?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/generatepress-premium/" + google-query: inurl:"/wp-content/plugins/generatepress-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,generatepress-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/generatepress-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "generatepress-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/genesis-blocks-81d04df7ff5b0fa9ae3cc7f6b2f9eb6d.yaml b/nuclei-templates/cve-less/plugins/genesis-blocks-81d04df7ff5b0fa9ae3cc7f6b2f9eb6d.yaml new file mode 100644 index 0000000000..93c9fc3c36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/genesis-blocks-81d04df7ff5b0fa9ae3cc7f6b2f9eb6d.yaml @@ -0,0 +1,58 @@ +id: genesis-blocks-81d04df7ff5b0fa9ae3cc7f6b2f9eb6d + +info: + name: > + Genesis Blocks <= 3.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Content + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce116ee1-f0ea-469b-8c17-8c17c76fdc66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/genesis-blocks/" + google-query: inurl:"/wp-content/plugins/genesis-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,genesis-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/genesis-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "genesis-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/genesis-blocks-cc71ce3f07c7a7f6d2e0e309f25463b5.yaml b/nuclei-templates/cve-less/plugins/genesis-blocks-cc71ce3f07c7a7f6d2e0e309f25463b5.yaml new file mode 100644 index 0000000000..3c54d7ac96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/genesis-blocks-cc71ce3f07c7a7f6d2e0e309f25463b5.yaml @@ -0,0 +1,58 @@ +id: genesis-blocks-cc71ce3f07c7a7f6d2e0e309f25463b5 + +info: + name: > + Genesis Blocks <= 3.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via postTitleTag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4eef7f0-5f09-4618-a3f8-a9e8dabef334?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/genesis-blocks/" + google-query: inurl:"/wp-content/plugins/genesis-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,genesis-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/genesis-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "genesis-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/genesis-columns-advanced-c0043e4e0fc4abc274a0b7326af041c1.yaml b/nuclei-templates/cve-less/plugins/genesis-columns-advanced-c0043e4e0fc4abc274a0b7326af041c1.yaml new file mode 100644 index 0000000000..c691bd4802 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/genesis-columns-advanced-c0043e4e0fc4abc274a0b7326af041c1.yaml @@ -0,0 +1,58 @@ +id: genesis-columns-advanced-c0043e4e0fc4abc274a0b7326af041c1 + +info: + name: > + Genesis Columns Advanced <= 2.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef6b80c1-7f5e-4f8d-964a-a9c9c4f2a882?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/genesis-columns-advanced/" + google-query: inurl:"/wp-content/plugins/genesis-columns-advanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,genesis-columns-advanced,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/genesis-columns-advanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "genesis-columns-advanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/genesis-simple-love-d3a9e47377e2967a1d3f37559f1438da.yaml b/nuclei-templates/cve-less/plugins/genesis-simple-love-d3a9e47377e2967a1d3f37559f1438da.yaml new file mode 100644 index 0000000000..b1e14ce402 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/genesis-simple-love-d3a9e47377e2967a1d3f37559f1438da.yaml @@ -0,0 +1,58 @@ +id: genesis-simple-love-d3a9e47377e2967a1d3f37559f1438da + +info: + name: > + Genesis Simple Love <= 2.0 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55abf798-f336-4262-9f52-4526a4bae15a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/genesis-simple-love/" + google-query: inurl:"/wp-content/plugins/genesis-simple-love/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,genesis-simple-love,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/genesis-simple-love/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "genesis-simple-love" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/genie-wp-favicon-a934a7b75723aefc4d34e91dfaf7a31f.yaml b/nuclei-templates/cve-less/plugins/genie-wp-favicon-a934a7b75723aefc4d34e91dfaf7a31f.yaml new file mode 100644 index 0000000000..d6ffaf2143 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/genie-wp-favicon-a934a7b75723aefc4d34e91dfaf7a31f.yaml @@ -0,0 +1,58 @@ +id: genie-wp-favicon-a934a7b75723aefc4d34e91dfaf7a31f + +info: + name: > + Genie WP Favicon <= 0.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f35c4e21-a6d6-4821-a415-2ff40ea76f99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/genie-wp-favicon/" + google-query: inurl:"/wp-content/plugins/genie-wp-favicon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,genie-wp-favicon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/genie-wp-favicon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "genie-wp-favicon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/genki-pre-publish-reminder-d4ee747485499e50fea0ef44831d0b48.yaml b/nuclei-templates/cve-less/plugins/genki-pre-publish-reminder-d4ee747485499e50fea0ef44831d0b48.yaml new file mode 100644 index 0000000000..ab639d5fa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/genki-pre-publish-reminder-d4ee747485499e50fea0ef44831d0b48.yaml @@ -0,0 +1,58 @@ +id: genki-pre-publish-reminder-d4ee747485499e50fea0ef44831d0b48 + +info: + name: > + Genki Pre-Publish Reminder <= 1.4.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b86ae0-93f0-4035-80c3-b3a713077b32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/genki-pre-publish-reminder/" + google-query: inurl:"/wp-content/plugins/genki-pre-publish-reminder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,genki-pre-publish-reminder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/genki-pre-publish-reminder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "genki-pre-publish-reminder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geo-mashup-381d6cb0faea51f097b85258ee0a1587.yaml b/nuclei-templates/cve-less/plugins/geo-mashup-381d6cb0faea51f097b85258ee0a1587.yaml new file mode 100644 index 0000000000..991bcfaefb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geo-mashup-381d6cb0faea51f097b85258ee0a1587.yaml @@ -0,0 +1,58 @@ +id: geo-mashup-381d6cb0faea51f097b85258ee0a1587 + +info: + name: > + Geo Mashup - < 1.10.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4e812f2-78f2-4dde-96ec-2ee114ebaa60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geo-mashup/" + google-query: inurl:"/wp-content/plugins/geo-mashup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geo-mashup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geo-mashup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geo-mashup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geo-mashup-887adced0648142cd9b714a8cbded6f3.yaml b/nuclei-templates/cve-less/plugins/geo-mashup-887adced0648142cd9b714a8cbded6f3.yaml new file mode 100644 index 0000000000..c95f883bbc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geo-mashup-887adced0648142cd9b714a8cbded6f3.yaml @@ -0,0 +1,58 @@ +id: geo-mashup-887adced0648142cd9b714a8cbded6f3 + +info: + name: > + Geo Mashup < 1.8.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b7073e8-10cf-4fe0-9eb6-f9acd509598c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geo-mashup/" + google-query: inurl:"/wp-content/plugins/geo-mashup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geo-mashup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geo-mashup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geo-mashup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geo-mashup-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/geo-mashup-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4cd3981893 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geo-mashup-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: geo-mashup-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geo-mashup/" + google-query: inurl:"/wp-content/plugins/geo-mashup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geo-mashup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geo-mashup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geo-mashup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geo-my-wp-9764fa1268021fb445ed7c1cafd9a12b.yaml b/nuclei-templates/cve-less/plugins/geo-my-wp-9764fa1268021fb445ed7c1cafd9a12b.yaml new file mode 100644 index 0000000000..6bfac8d6c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geo-my-wp-9764fa1268021fb445ed7c1cafd9a12b.yaml @@ -0,0 +1,58 @@ +id: geo-my-wp-9764fa1268021fb445ed7c1cafd9a12b + +info: + name: > + GEO my WordPress <= 4.0.2 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94f118c3-d470-43c4-a61a-1ec998694880?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geo-my-wp/" + google-query: inurl:"/wp-content/plugins/geo-my-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geo-my-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geo-my-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geo-my-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geo-my-wp-fcc1cf4316d93103b20ebe799631fe04.yaml b/nuclei-templates/cve-less/plugins/geo-my-wp-fcc1cf4316d93103b20ebe799631fe04.yaml new file mode 100644 index 0000000000..1e18deca46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geo-my-wp-fcc1cf4316d93103b20ebe799631fe04.yaml @@ -0,0 +1,58 @@ +id: geo-my-wp-fcc1cf4316d93103b20ebe799631fe04 + +info: + name: > + GEO my WordPress <= 4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a96ac71f-3dae-40eb-9268-d56688a5aa64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geo-my-wp/" + google-query: inurl:"/wp-content/plugins/geo-my-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geo-my-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geo-my-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geo-my-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geo-my-wp-ff66d6fc13b6cfdb064978e366821aab.yaml b/nuclei-templates/cve-less/plugins/geo-my-wp-ff66d6fc13b6cfdb064978e366821aab.yaml new file mode 100644 index 0000000000..76884ce84f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geo-my-wp-ff66d6fc13b6cfdb064978e366821aab.yaml @@ -0,0 +1,58 @@ +id: geo-my-wp-ff66d6fc13b6cfdb064978e366821aab + +info: + name: > + GEO my WordPress <= 4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d9d7cab-c840-469f-ba2d-f81c785ffb8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geo-my-wp/" + google-query: inurl:"/wp-content/plugins/geo-my-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geo-my-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geo-my-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geo-my-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geo-redirector-7ff4f760c301092254ff0a3e49a089e0.yaml b/nuclei-templates/cve-less/plugins/geo-redirector-7ff4f760c301092254ff0a3e49a089e0.yaml new file mode 100644 index 0000000000..4647507cb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geo-redirector-7ff4f760c301092254ff0a3e49a089e0.yaml @@ -0,0 +1,58 @@ +id: geo-redirector-7ff4f760c301092254ff0a3e49a089e0 + +info: + name: > + GEO Redirector <= 1.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34a6c9af-1616-4b5d-8660-4f141bdd25c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geo-redirector/" + google-query: inurl:"/wp-content/plugins/geo-redirector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geo-redirector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geo-redirector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geo-redirector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geo-request-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/geo-request-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..511cd7990f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geo-request-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: geo-request-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geo-request/" + google-query: inurl:"/wp-content/plugins/geo-request/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geo-request,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geo-request/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geo-request" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geodir_location_manager-f6027704921a329e98184819d6ebf0b2.yaml b/nuclei-templates/cve-less/plugins/geodir_location_manager-f6027704921a329e98184819d6ebf0b2.yaml new file mode 100644 index 0000000000..6bf23c88b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geodir_location_manager-f6027704921a329e98184819d6ebf0b2.yaml @@ -0,0 +1,58 @@ +id: geodir_location_manager-f6027704921a329e98184819d6ebf0b2 + +info: + name: > + Location Manager < 2.1.0.10 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/855ca8f0-5078-48ec-a5d0-3f43a217a91e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geodir_location_manager/" + google-query: inurl:"/wp-content/plugins/geodir_location_manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geodir_location_manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geodir_location_manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geodir_location_manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geodirectory-0c1c0e5907f82c480480fd236d7507d7.yaml b/nuclei-templates/cve-less/plugins/geodirectory-0c1c0e5907f82c480480fd236d7507d7.yaml new file mode 100644 index 0000000000..a3b82c0ffe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geodirectory-0c1c0e5907f82c480480fd236d7507d7.yaml @@ -0,0 +1,58 @@ +id: geodirectory-0c1c0e5907f82c480480fd236d7507d7 + +info: + name: > + GeoDirectory <= 2.2.21 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb4b1871-7c13-4f7c-93b5-d5254f89da8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geodirectory/" + google-query: inurl:"/wp-content/plugins/geodirectory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geodirectory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geodirectory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geodirectory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geodirectory-10faa8f7dbe39946fc1591dc4a29cfc1.yaml b/nuclei-templates/cve-less/plugins/geodirectory-10faa8f7dbe39946fc1591dc4a29cfc1.yaml new file mode 100644 index 0000000000..be507e0a0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geodirectory-10faa8f7dbe39946fc1591dc4a29cfc1.yaml @@ -0,0 +1,58 @@ +id: geodirectory-10faa8f7dbe39946fc1591dc4a29cfc1 + +info: + name: > + GeoDirectory <= 2.1.1.2 - Authenticated (admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd8a61d1-904d-4027-8f27-6e3018862d9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geodirectory/" + google-query: inurl:"/wp-content/plugins/geodirectory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geodirectory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geodirectory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geodirectory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geodirectory-7539302587926b426117aef883b56a59.yaml b/nuclei-templates/cve-less/plugins/geodirectory-7539302587926b426117aef883b56a59.yaml new file mode 100644 index 0000000000..7cd6d812b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geodirectory-7539302587926b426117aef883b56a59.yaml @@ -0,0 +1,58 @@ +id: geodirectory-7539302587926b426117aef883b56a59 + +info: + name: > + GeoDirectory <= 2.3.28 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3d48aca-3db5-4585-bd71-5548f3b36ea1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geodirectory/" + google-query: inurl:"/wp-content/plugins/geodirectory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geodirectory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geodirectory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geodirectory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geodirectory-88d4547a92050d1b28fb4357c26c8ac0.yaml b/nuclei-templates/cve-less/plugins/geodirectory-88d4547a92050d1b28fb4357c26c8ac0.yaml new file mode 100644 index 0000000000..9858053a29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geodirectory-88d4547a92050d1b28fb4357c26c8ac0.yaml @@ -0,0 +1,58 @@ +id: geodirectory-88d4547a92050d1b28fb4357c26c8ac0 + +info: + name: > + GeoDirectory – WordPress Business Directory Plugin, or Classified Directory <= 2.3.48 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'gd_single_tabs' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a91e786-f570-4c6c-b1c7-0110774cb808?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geodirectory/" + google-query: inurl:"/wp-content/plugins/geodirectory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geodirectory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geodirectory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geodirectory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geodirectory-ba7c20e930a8487a26eac0cfe90c0f74.yaml b/nuclei-templates/cve-less/plugins/geodirectory-ba7c20e930a8487a26eac0cfe90c0f74.yaml new file mode 100644 index 0000000000..a9f1ec1eb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geodirectory-ba7c20e930a8487a26eac0cfe90c0f74.yaml @@ -0,0 +1,58 @@ +id: geodirectory-ba7c20e930a8487a26eac0cfe90c0f74 + +info: + name: > + GeoDirectory <= 2.3.28 - Authenticated (Administrator+) SQL Injection via orderby + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bcd61d4-4775-4297-b7f5-664991fcd6d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geodirectory/" + google-query: inurl:"/wp-content/plugins/geodirectory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geodirectory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geodirectory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geodirectory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geodirectory-db82d66ee6f616f5c7fafadef247b8d1.yaml b/nuclei-templates/cve-less/plugins/geodirectory-db82d66ee6f616f5c7fafadef247b8d1.yaml new file mode 100644 index 0000000000..89d2d20b27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geodirectory-db82d66ee6f616f5c7fafadef247b8d1.yaml @@ -0,0 +1,58 @@ +id: geodirectory-db82d66ee6f616f5c7fafadef247b8d1 + +info: + name: > + GeoDirectory <= 2.2.23 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81fa4987-d019-4d0c-a002-eceef956161e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geodirectory/" + google-query: inurl:"/wp-content/plugins/geodirectory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geodirectory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geodirectory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geodirectory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/geodirectory-ff356638666fdb58f191f55340cbf4f0.yaml b/nuclei-templates/cve-less/plugins/geodirectory-ff356638666fdb58f191f55340cbf4f0.yaml new file mode 100644 index 0000000000..e3a4145c84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/geodirectory-ff356638666fdb58f191f55340cbf4f0.yaml @@ -0,0 +1,58 @@ +id: geodirectory-ff356638666fdb58f191f55340cbf4f0 + +info: + name: > + GeoDirectory <= 2.2.19 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee11d9e5-64d5-49b4-b5f5-b76605250028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/geodirectory/" + google-query: inurl:"/wp-content/plugins/geodirectory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,geodirectory,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/geodirectory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geodirectory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gestion-pymes-ea5c3acfd64b155268d32c3228d1c82f.yaml b/nuclei-templates/cve-less/plugins/gestion-pymes-ea5c3acfd64b155268d32c3228d1c82f.yaml new file mode 100644 index 0000000000..db31acf1c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gestion-pymes-ea5c3acfd64b155268d32c3228d1c82f.yaml @@ -0,0 +1,58 @@ +id: gestion-pymes-ea5c3acfd64b155268d32c3228d1c82f + +info: + name: > + Gestion-Pymes <= 1.5.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/165bf4d4-0f97-4c51-bc55-ad14f3e4aae9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gestion-pymes/" + google-query: inurl:"/wp-content/plugins/gestion-pymes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gestion-pymes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gestion-pymes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gestion-pymes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-0bdfa552c8e79eb2f1a91f087f9bcf9b.yaml b/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-0bdfa552c8e79eb2f1a91f087f9bcf9b.yaml new file mode 100644 index 0000000000..f1a77f405c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-0bdfa552c8e79eb2f1a91f087f9bcf9b.yaml @@ -0,0 +1,58 @@ +id: gestpay-for-woocommerce-0bdfa552c8e79eb2f1a91f087f9bcf9b + +info: + name: > + Gestpay for WooCommerce <= 20221130 - Cross-Site Request Forgery (CSRF) via ajax_delete_card + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7561a71a-c3f0-45f1-8230-2c17cbeff916?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gestpay-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/gestpay-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gestpay-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gestpay-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gestpay-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20221130') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-5d5a5e01ff4136d5ff903d7e1aa12854.yaml b/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-5d5a5e01ff4136d5ff903d7e1aa12854.yaml new file mode 100644 index 0000000000..959e95f0e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-5d5a5e01ff4136d5ff903d7e1aa12854.yaml @@ -0,0 +1,58 @@ +id: gestpay-for-woocommerce-5d5a5e01ff4136d5ff903d7e1aa12854 + +info: + name: > + Gestpay for WooCommerce <= 20221130 - Cross-Site Request Forgery (CSRF) via ajax_unset_default_card + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44b62b99-99eb-424b-a04a-9bbacf5fbbaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gestpay-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/gestpay-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gestpay-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gestpay-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gestpay-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20221130') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-6e53023aaed1d0ca3bd9def3a29a1431.yaml b/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-6e53023aaed1d0ca3bd9def3a29a1431.yaml new file mode 100644 index 0000000000..371b64d61e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gestpay-for-woocommerce-6e53023aaed1d0ca3bd9def3a29a1431.yaml @@ -0,0 +1,58 @@ +id: gestpay-for-woocommerce-6e53023aaed1d0ca3bd9def3a29a1431 + +info: + name: > + Gestpay for WooCommerce <= 20221130 - Cross-Site Request Forgery (CSRF) via ajax_set_default_card + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d3a6650-5be0-4162-93eb-369538a2ebc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gestpay-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/gestpay-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gestpay-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gestpay-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gestpay-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20221130') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-custom-field-values-328e4fc27caed74ff806a419cfdcc0b7.yaml b/nuclei-templates/cve-less/plugins/get-custom-field-values-328e4fc27caed74ff806a419cfdcc0b7.yaml new file mode 100644 index 0000000000..f6c5e93341 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-custom-field-values-328e4fc27caed74ff806a419cfdcc0b7.yaml @@ -0,0 +1,58 @@ +id: get-custom-field-values-328e4fc27caed74ff806a419cfdcc0b7 + +info: + name: > + Get Custom Field Values <= 4.0.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via Custom Meta Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66e55302-f889-4054-817f-aadbdd3c88de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-custom-field-values/" + google-query: inurl:"/wp-content/plugins/get-custom-field-values/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-custom-field-values,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-custom-field-values/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-custom-field-values" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-custom-field-values-5e4bd8f4b7fcafa58897d3309b84db77.yaml b/nuclei-templates/cve-less/plugins/get-custom-field-values-5e4bd8f4b7fcafa58897d3309b84db77.yaml new file mode 100644 index 0000000000..5a0fc4263d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-custom-field-values-5e4bd8f4b7fcafa58897d3309b84db77.yaml @@ -0,0 +1,58 @@ +id: get-custom-field-values-5e4bd8f4b7fcafa58897d3309b84db77 + +info: + name: > + Get Custom Field Values < 4.0 - Arbitrary Post Metadata Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ff1ca68-7c71-4442-b27f-12743fc39b37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-custom-field-values/" + google-query: inurl:"/wp-content/plugins/get-custom-field-values/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-custom-field-values,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-custom-field-values/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-custom-field-values" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-custom-field-values-a48251c3741e5bdda10cc3847e3d84b2.yaml b/nuclei-templates/cve-less/plugins/get-custom-field-values-a48251c3741e5bdda10cc3847e3d84b2.yaml new file mode 100644 index 0000000000..00d6745112 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-custom-field-values-a48251c3741e5bdda10cc3847e3d84b2.yaml @@ -0,0 +1,58 @@ +id: get-custom-field-values-a48251c3741e5bdda10cc3847e3d84b2 + +info: + name: > + Get Custom Field Values <= 4.0.0 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d52779e-3c86-4823-af0e-6f8d55d35e90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-custom-field-values/" + google-query: inurl:"/wp-content/plugins/get-custom-field-values/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-custom-field-values,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-custom-field-values/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-custom-field-values" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-custom-field-values-c4a2060e848f8147ede668274113eb5f.yaml b/nuclei-templates/cve-less/plugins/get-custom-field-values-c4a2060e848f8147ede668274113eb5f.yaml new file mode 100644 index 0000000000..7526dbc4f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-custom-field-values-c4a2060e848f8147ede668274113eb5f.yaml @@ -0,0 +1,58 @@ +id: get-custom-field-values-c4a2060e848f8147ede668274113eb5f + +info: + name: > + Get Custom Field Values <= 4.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e0fd85a-2164-4b83-822e-845662591a78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-custom-field-values/" + google-query: inurl:"/wp-content/plugins/get-custom-field-values/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-custom-field-values,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-custom-field-values/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-custom-field-values" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-directions-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/get-directions-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d7a9ce55af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-directions-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: get-directions-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-directions/" + google-query: inurl:"/wp-content/plugins/get-directions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-directions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-directions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-directions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-site-to-phone-by-qr-code-6a303c02814b33d00fcce0ecb738b831.yaml b/nuclei-templates/cve-less/plugins/get-site-to-phone-by-qr-code-6a303c02814b33d00fcce0ecb738b831.yaml new file mode 100644 index 0000000000..d569ec188c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-site-to-phone-by-qr-code-6a303c02814b33d00fcce0ecb738b831.yaml @@ -0,0 +1,58 @@ +id: get-site-to-phone-by-qr-code-6a303c02814b33d00fcce0ecb738b831 + +info: + name: > + Showing URL in QR Code <= 0.0.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e10babc-fc65-46f9-8b88-95b00f66d01b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-site-to-phone-by-qr-code/" + google-query: inurl:"/wp-content/plugins/get-site-to-phone-by-qr-code/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-site-to-phone-by-qr-code,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-site-to-phone-by-qr-code/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-site-to-phone-by-qr-code" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-url-cron-4320598ebb7d4a6b9802a276c7f0a6be.yaml b/nuclei-templates/cve-less/plugins/get-url-cron-4320598ebb7d4a6b9802a276c7f0a6be.yaml new file mode 100644 index 0000000000..0089656482 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-url-cron-4320598ebb7d4a6b9802a276c7f0a6be.yaml @@ -0,0 +1,58 @@ +id: get-url-cron-4320598ebb7d4a6b9802a276c7f0a6be + +info: + name: > + Get URL Cron <= 1.4.7 - Missing Authorization via geturlcron_action_handle + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/766003e7-712e-481b-b09d-91d62a325718?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-url-cron/" + google-query: inurl:"/wp-content/plugins/get-url-cron/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-url-cron,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-url-cron/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-url-cron" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-url-cron-a757fd116b9febd3ec3b6bc44f01bcb5.yaml b/nuclei-templates/cve-less/plugins/get-url-cron-a757fd116b9febd3ec3b6bc44f01bcb5.yaml new file mode 100644 index 0000000000..8a4cf653f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-url-cron-a757fd116b9febd3ec3b6bc44f01bcb5.yaml @@ -0,0 +1,58 @@ +id: get-url-cron-a757fd116b9febd3ec3b6bc44f01bcb5 + +info: + name: > + Get URL Cron <= 1.4.7 - Cross-Site Request Forgery via geturlcron_action_handle + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/934b2767-eae4-4c2d-a635-2e6a27fd9f49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-url-cron/" + google-query: inurl:"/wp-content/plugins/get-url-cron/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-url-cron,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-url-cron/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-url-cron" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/get-your-number-eceee40ae071bd0838ed35de0f0e77bb.yaml b/nuclei-templates/cve-less/plugins/get-your-number-eceee40ae071bd0838ed35de0f0e77bb.yaml new file mode 100644 index 0000000000..acad3e9698 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/get-your-number-eceee40ae071bd0838ed35de0f0e77bb.yaml @@ -0,0 +1,58 @@ +id: get-your-number-eceee40ae071bd0838ed35de0f0e77bb + +info: + name: > + Get Your Number <= 1.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fb9dc9f-1ba5-4a2c-bead-3c3a6deb61b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/get-your-number/" + google-query: inurl:"/wp-content/plugins/get-your-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,get-your-number,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/get-your-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "get-your-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getresponse-integration-318af4e7ad8fddddeacf6d8489b19638.yaml b/nuclei-templates/cve-less/plugins/getresponse-integration-318af4e7ad8fddddeacf6d8489b19638.yaml new file mode 100644 index 0000000000..5a74172ec0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getresponse-integration-318af4e7ad8fddddeacf6d8489b19638.yaml @@ -0,0 +1,58 @@ +id: getresponse-integration-318af4e7ad8fddddeacf6d8489b19638 + +info: + name: > + GetResponse for WordPress <= 5.5.31 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a2782de-3ce2-4626-84c4-58c1ff454753?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getresponse-integration/" + google-query: inurl:"/wp-content/plugins/getresponse-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getresponse-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getresponse-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getresponse-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getresponse-integration-9fa773be7e5cdf580182e19b1f6e77fb.yaml b/nuclei-templates/cve-less/plugins/getresponse-integration-9fa773be7e5cdf580182e19b1f6e77fb.yaml new file mode 100644 index 0000000000..8d84cde1ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getresponse-integration-9fa773be7e5cdf580182e19b1f6e77fb.yaml @@ -0,0 +1,58 @@ +id: getresponse-integration-9fa773be7e5cdf580182e19b1f6e77fb + +info: + name: > + GetResponse <= 5.5.19 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2331a587-b731-43d9-b813-9f08efc60bfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getresponse-integration/" + google-query: inurl:"/wp-content/plugins/getresponse-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getresponse-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getresponse-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getresponse-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getresponse-integration-ecee6fe6f960c3e32d930eed8f81ac9e.yaml b/nuclei-templates/cve-less/plugins/getresponse-integration-ecee6fe6f960c3e32d930eed8f81ac9e.yaml new file mode 100644 index 0000000000..e89201be1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getresponse-integration-ecee6fe6f960c3e32d930eed8f81ac9e.yaml @@ -0,0 +1,58 @@ +id: getresponse-integration-ecee6fe6f960c3e32d930eed8f81ac9e + +info: + name: > + GetResponse for WordPress <= 5.5.35 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/680219f5-631e-4318-bf1b-598947bec7d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getresponse-integration/" + google-query: inurl:"/wp-content/plugins/getresponse-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getresponse-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getresponse-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getresponse-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gettext-override-translations-c3ee6aa7cf2263de71bab964716588bf.yaml b/nuclei-templates/cve-less/plugins/gettext-override-translations-c3ee6aa7cf2263de71bab964716588bf.yaml new file mode 100644 index 0000000000..330e685763 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gettext-override-translations-c3ee6aa7cf2263de71bab964716588bf.yaml @@ -0,0 +1,58 @@ +id: gettext-override-translations-c3ee6aa7cf2263de71bab964716588bf + +info: + name: > + Gettext override translations <= 1.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f782dd7-df49-4c3b-b6d9-de618ab32b87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gettext-override-translations/" + google-query: inurl:"/wp-content/plugins/gettext-override-translations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gettext-override-translations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gettext-override-translations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gettext-override-translations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getwid-7da918d3fc3e2e8630ac4c982d69874d.yaml b/nuclei-templates/cve-less/plugins/getwid-7da918d3fc3e2e8630ac4c982d69874d.yaml new file mode 100644 index 0000000000..302896b110 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getwid-7da918d3fc3e2e8630ac4c982d69874d.yaml @@ -0,0 +1,58 @@ +id: getwid-7da918d3fc3e2e8630ac4c982d69874d + +info: + name: > + Getwid – Gutenberg Blocks <= 2.0.7 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via 'Countdown' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4770184-1b96-490c-b506-f648ab3ed764?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getwid/" + google-query: inurl:"/wp-content/plugins/getwid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getwid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getwid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getwid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getwid-860548571db1d3ac7f3a8905c5f28f8d.yaml b/nuclei-templates/cve-less/plugins/getwid-860548571db1d3ac7f3a8905c5f28f8d.yaml new file mode 100644 index 0000000000..444411afe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getwid-860548571db1d3ac7f3a8905c5f28f8d.yaml @@ -0,0 +1,58 @@ +id: getwid-860548571db1d3ac7f3a8905c5f28f8d + +info: + name: > + Getwid – Gutenberg Blocks <= 2.0.5 - Authenticated(Contributor+) Stored Cross-Site Scripting via Block Content + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cbe4748-6e87-4332-b84f-615aec67bcec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getwid/" + google-query: inurl:"/wp-content/plugins/getwid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getwid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getwid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getwid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getwid-9bf910117bdf6862d3ee1c26c92e6b91.yaml b/nuclei-templates/cve-less/plugins/getwid-9bf910117bdf6862d3ee1c26c92e6b91.yaml new file mode 100644 index 0000000000..53c9e4cfcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getwid-9bf910117bdf6862d3ee1c26c92e6b91.yaml @@ -0,0 +1,58 @@ +id: getwid-9bf910117bdf6862d3ee1c26c92e6b91 + +info: + name: > + Getwid – Gutenberg Blocks <= 2.0.4 - Missing Authorization to Recaptcha API Key Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/774c00fb-82cd-44ca-bf96-3f6dfd1977d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getwid/" + google-query: inurl:"/wp-content/plugins/getwid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getwid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getwid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getwid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getwid-ad0428bf7ab47783f2af074da8078ee3.yaml b/nuclei-templates/cve-less/plugins/getwid-ad0428bf7ab47783f2af074da8078ee3.yaml new file mode 100644 index 0000000000..7eace4ac62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getwid-ad0428bf7ab47783f2af074da8078ee3.yaml @@ -0,0 +1,58 @@ +id: getwid-ad0428bf7ab47783f2af074da8078ee3 + +info: + name: > + Getwid – Gutenberg Blocks <= 2.0.2 - Improper Input Validation to Arbitrary Email Sending to Admin + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1158081c-97da-4026-be16-994f4e41c92f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getwid/" + google-query: inurl:"/wp-content/plugins/getwid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getwid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getwid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getwid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getwid-c31135ea82eaff9efa9c5f32111bb6e0.yaml b/nuclei-templates/cve-less/plugins/getwid-c31135ea82eaff9efa9c5f32111bb6e0.yaml new file mode 100644 index 0000000000..85ce8a3a32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getwid-c31135ea82eaff9efa9c5f32111bb6e0.yaml @@ -0,0 +1,58 @@ +id: getwid-c31135ea82eaff9efa9c5f32111bb6e0 + +info: + name: > + Getwid – Gutenberg Blocks <= 1.8.3 - Authenticated(Subscriber+) Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c2a942-c14c-4b59-92a7-6946b2e4731b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getwid/" + google-query: inurl:"/wp-content/plugins/getwid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getwid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getwid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getwid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getwid-caf19b99b78c33b145556e4b8cd07050.yaml b/nuclei-templates/cve-less/plugins/getwid-caf19b99b78c33b145556e4b8cd07050.yaml new file mode 100644 index 0000000000..72aeca6f24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getwid-caf19b99b78c33b145556e4b8cd07050.yaml @@ -0,0 +1,58 @@ +id: getwid-caf19b99b78c33b145556e4b8cd07050 + +info: + name: > + Getwid – Gutenberg Blocks <= 2.0.4 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d317f2c7-06f3-4875-9f9b-eb7f450aa2f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getwid/" + google-query: inurl:"/wp-content/plugins/getwid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getwid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getwid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getwid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getwid-d8609ca02744156f56f17a032b07e7ab.yaml b/nuclei-templates/cve-less/plugins/getwid-d8609ca02744156f56f17a032b07e7ab.yaml new file mode 100644 index 0000000000..9db50267c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getwid-d8609ca02744156f56f17a032b07e7ab.yaml @@ -0,0 +1,58 @@ +id: getwid-d8609ca02744156f56f17a032b07e7ab + +info: + name: > + Getwid – Gutenberg Blocks <= 1.8.3 - Improper Authorization via get_remote_templates REST endpoint + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cd64ab0-007b-4778-9d92-06e530638fad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getwid/" + google-query: inurl:"/wp-content/plugins/getwid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getwid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getwid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getwid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/getyourguide-ticketing-e01c69283b147d24245068f3ebce49d9.yaml b/nuclei-templates/cve-less/plugins/getyourguide-ticketing-e01c69283b147d24245068f3ebce49d9.yaml new file mode 100644 index 0000000000..a462620960 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/getyourguide-ticketing-e01c69283b147d24245068f3ebce49d9.yaml @@ -0,0 +1,58 @@ +id: getyourguide-ticketing-e01c69283b147d24245068f3ebce49d9 + +info: + name: > + GetYourGuide Ticketing <= 1.0.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af22365c-7d4b-48f3-b33d-d627169fda6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/getyourguide-ticketing/" + google-query: inurl:"/wp-content/plugins/getyourguide-ticketing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,getyourguide-ticketing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/getyourguide-ticketing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "getyourguide-ticketing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-block-ips-8cf1834702b06ccbceec487f6fa13222.yaml b/nuclei-templates/cve-less/plugins/gf-block-ips-8cf1834702b06ccbceec487f6fa13222.yaml new file mode 100644 index 0000000000..1e46abef8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-block-ips-8cf1834702b06ccbceec487f6fa13222.yaml @@ -0,0 +1,58 @@ +id: gf-block-ips-8cf1834702b06ccbceec487f6fa13222 + +info: + name: > + Block IPs for Gravity Forms <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19958187-7eb1-479e-bd36-d40974ae65ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-block-ips/" + google-query: inurl:"/wp-content/plugins/gf-block-ips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-block-ips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-block-ips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-block-ips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-constant-contact-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-constant-contact-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..a80df19a8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-constant-contact-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-constant-contact-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-constant-contact/" + google-query: inurl:"/wp-content/plugins/gf-constant-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-constant-contact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-constant-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-constant-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-dynamics-crm-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-dynamics-crm-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..509f066e86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-dynamics-crm-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-dynamics-crm-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-dynamics-crm/" + google-query: inurl:"/wp-content/plugins/gf-dynamics-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-dynamics-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-dynamics-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-dynamics-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-freshdesk-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-freshdesk-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..7124b1bd3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-freshdesk-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-freshdesk-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-freshdesk/" + google-query: inurl:"/wp-content/plugins/gf-freshdesk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-freshdesk,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-freshdesk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-freshdesk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-hubspot-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-hubspot-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..6035a71602 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-hubspot-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-hubspot-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-hubspot/" + google-query: inurl:"/wp-content/plugins/gf-hubspot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-hubspot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-hubspot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-hubspot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-infusionsoft-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-infusionsoft-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..24a56ad4e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-infusionsoft-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-infusionsoft-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-infusionsoft/" + google-query: inurl:"/wp-content/plugins/gf-infusionsoft/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-infusionsoft,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-infusionsoft/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-infusionsoft" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-insightly-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-insightly-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..0856423a88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-insightly-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-insightly-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-insightly/" + google-query: inurl:"/wp-content/plugins/gf-insightly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-insightly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-insightly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-insightly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-salesforce-crmperks-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-salesforce-crmperks-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..4578f18942 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-salesforce-crmperks-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-salesforce-crmperks-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-salesforce-crmperks/" + google-query: inurl:"/wp-content/plugins/gf-salesforce-crmperks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-salesforce-crmperks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-salesforce-crmperks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-salesforce-crmperks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-zendesk-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-zendesk-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..b7a9cc9f1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-zendesk-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-zendesk-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-zendesk/" + google-query: inurl:"/wp-content/plugins/gf-zendesk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-zendesk,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-zendesk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-zendesk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gf-zoho-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/gf-zoho-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..4b140ec7d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gf-zoho-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: gf-zoho-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gf-zoho/" + google-query: inurl:"/wp-content/plugins/gf-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gf-zoho,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gf-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gf-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gfirem-action-after-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/gfirem-action-after-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..929ef86a70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gfirem-action-after-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: gfirem-action-after-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gfirem-action-after/" + google-query: inurl:"/wp-content/plugins/gfirem-action-after/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gfirem-action-after,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gfirem-action-after/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gfirem-action-after" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gfirem-action-after-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/gfirem-action-after-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..833dba9202 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gfirem-action-after-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: gfirem-action-after-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gfirem-action-after/" + google-query: inurl:"/wp-content/plugins/gfirem-action-after/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gfirem-action-after,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gfirem-action-after/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gfirem-action-after" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gfirem-advance-search-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/gfirem-advance-search-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e7611a6254 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gfirem-advance-search-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: gfirem-advance-search-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gfirem-advance-search/" + google-query: inurl:"/wp-content/plugins/gfirem-advance-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gfirem-advance-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gfirem-advance-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gfirem-advance-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gfirem-advance-search-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/gfirem-advance-search-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..7f941b7cf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gfirem-advance-search-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: gfirem-advance-search-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gfirem-advance-search/" + google-query: inurl:"/wp-content/plugins/gfirem-advance-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gfirem-advance-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gfirem-advance-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gfirem-advance-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gfirem-fields-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/gfirem-fields-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d2da321a30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gfirem-fields-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: gfirem-fields-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gfirem-fields/" + google-query: inurl:"/wp-content/plugins/gfirem-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gfirem-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gfirem-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gfirem-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gfirem-fields-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/gfirem-fields-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..311c01fdc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gfirem-fields-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: gfirem-fields-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gfirem-fields/" + google-query: inurl:"/wp-content/plugins/gfirem-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gfirem-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gfirem-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gfirem-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gg-woo-feed-53d09e4ac030b1b8d99973338cf6e155.yaml b/nuclei-templates/cve-less/plugins/gg-woo-feed-53d09e4ac030b1b8d99973338cf6e155.yaml new file mode 100644 index 0000000000..321034d4e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gg-woo-feed-53d09e4ac030b1b8d99973338cf6e155.yaml @@ -0,0 +1,58 @@ +id: gg-woo-feed-53d09e4ac030b1b8d99973338cf6e155 + +info: + name: > + GTG Product Feed for Shopping <= 1.2.8 - Missing Authorization to Unauthenticated Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce6b9b0a-e82e-459a-bddf-1c9354bcec00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gg-woo-feed/" + google-query: inurl:"/wp-content/plugins/gg-woo-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gg-woo-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gg-woo-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gg-woo-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gg-woo-feed-e977a8524d61ac2824626ef17aa0bef1.yaml b/nuclei-templates/cve-less/plugins/gg-woo-feed-e977a8524d61ac2824626ef17aa0bef1.yaml new file mode 100644 index 0000000000..5c2a15a3ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gg-woo-feed-e977a8524d61ac2824626ef17aa0bef1.yaml @@ -0,0 +1,58 @@ +id: gg-woo-feed-e977a8524d61ac2824626ef17aa0bef1 + +info: + name: > + GG Woo Feed for WooCommerce Shopping Feed <= 1.2.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e65bafd-471a-498a-a6ac-1bc87d25de67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gg-woo-feed/" + google-query: inurl:"/wp-content/plugins/gg-woo-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gg-woo-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gg-woo-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gg-woo-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ghost-9e13f21f3e18faff07670530f9d58cc5.yaml b/nuclei-templates/cve-less/plugins/ghost-9e13f21f3e18faff07670530f9d58cc5.yaml new file mode 100644 index 0000000000..6c243a700e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ghost-9e13f21f3e18faff07670530f9d58cc5.yaml @@ -0,0 +1,58 @@ +id: ghost-9e13f21f3e18faff07670530f9d58cc5 + +info: + name: > + Ghost <= 0.5.5 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acde5693-53fe-47b8-ad0b-6799ab63d0c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ghost/" + google-query: inurl:"/wp-content/plugins/ghost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ghost,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ghost/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ghost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gi-media-library-e7b7f002bb331eb26b796fe9ad1b013f.yaml b/nuclei-templates/cve-less/plugins/gi-media-library-e7b7f002bb331eb26b796fe9ad1b013f.yaml new file mode 100644 index 0000000000..3f2fba01b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gi-media-library-e7b7f002bb331eb26b796fe9ad1b013f.yaml @@ -0,0 +1,58 @@ +id: gi-media-library-e7b7f002bb331eb26b796fe9ad1b013f + +info: + name: > + GI-Media Library < 3.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f80c3b9-5148-42eb-9137-9c538184cda3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gi-media-library/" + google-query: inurl:"/wp-content/plugins/gi-media-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gi-media-library,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gi-media-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gi-media-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-certificate-creator-992e494cb586ae82d8a59467cf03e6c8.yaml b/nuclei-templates/cve-less/plugins/gift-certificate-creator-992e494cb586ae82d8a59467cf03e6c8.yaml new file mode 100644 index 0000000000..f00fa3d9f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-certificate-creator-992e494cb586ae82d8a59467cf03e6c8.yaml @@ -0,0 +1,58 @@ +id: gift-certificate-creator-992e494cb586ae82d8a59467cf03e6c8 + +info: + name: > + Gift Certificate Creator <= 1.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8b1a124-ad3a-4f17-9913-88bfda26dca9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-certificate-creator/" + google-query: inurl:"/wp-content/plugins/gift-certificate-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-certificate-creator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-certificate-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-certificate-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-message-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/gift-message-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..67fec5da25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-message-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: gift-message-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-message-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/gift-message-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-message-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-message-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-message-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-up-22c8ae258ee7ee9005a864a39bda5496.yaml b/nuclei-templates/cve-less/plugins/gift-up-22c8ae258ee7ee9005a864a39bda5496.yaml new file mode 100644 index 0000000000..91a6d0cb11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-up-22c8ae258ee7ee9005a864a39bda5496.yaml @@ -0,0 +1,58 @@ +id: gift-up-22c8ae258ee7ee9005a864a39bda5496 + +info: + name: > + Gift Up 2.21.3 - Cross-Site Request Forgery via consume_post + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e8d9909-7b98-4d98-8293-0c30eebc6c7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-up/" + google-query: inurl:"/wp-content/plugins/gift-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.21.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-up-904193396d39b8d655b88d4dbe19e726.yaml b/nuclei-templates/cve-less/plugins/gift-up-904193396d39b8d655b88d4dbe19e726.yaml new file mode 100644 index 0000000000..edcfefd762 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-up-904193396d39b8d655b88d4dbe19e726.yaml @@ -0,0 +1,58 @@ +id: gift-up-904193396d39b8d655b88d4dbe19e726 + +info: + name: > + Gift Up 2.21.3 - Cross-Site Request Forgery via consume_post + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95abec2d-a03a-4b07-8890-18568650c41f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-up/" + google-query: inurl:"/wp-content/plugins/gift-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.21.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-up-a045ed71aa954e6a2d839e45661eb192.yaml b/nuclei-templates/cve-less/plugins/gift-up-a045ed71aa954e6a2d839e45661eb192.yaml new file mode 100644 index 0000000000..90b8ca34c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-up-a045ed71aa954e6a2d839e45661eb192.yaml @@ -0,0 +1,58 @@ +id: gift-up-a045ed71aa954e6a2d839e45661eb192 + +info: + name: > + Gift Up Gift Cards for WordPress and WooCommerce <= 2.20.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e498706-3dbe-4c48-9c0d-0d90677aba0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-up/" + google-query: inurl:"/wp-content/plugins/gift-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-voucher-1d5b9796eabe8ef0a97f7ac244be1692.yaml b/nuclei-templates/cve-less/plugins/gift-voucher-1d5b9796eabe8ef0a97f7ac244be1692.yaml new file mode 100644 index 0000000000..717aa3e2b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-voucher-1d5b9796eabe8ef0a97f7ac244be1692.yaml @@ -0,0 +1,58 @@ +id: gift-voucher-1d5b9796eabe8ef0a97f7ac244be1692 + +info: + name: > + Gift Cards (Gift Vouchers and Packages) <= 4.3.5 - Cross-Site Request Forgery in new_voucher_template.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0007d830-2e68-4c2f-8fac-f4363bc2d73d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-voucher/" + google-query: inurl:"/wp-content/plugins/gift-voucher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-voucher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-voucher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-voucher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-voucher-61fd2c4906855d53e38dbebcbfd74fb6.yaml b/nuclei-templates/cve-less/plugins/gift-voucher-61fd2c4906855d53e38dbebcbfd74fb6.yaml new file mode 100644 index 0000000000..1fdeb186c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-voucher-61fd2c4906855d53e38dbebcbfd74fb6.yaml @@ -0,0 +1,58 @@ +id: gift-voucher-61fd2c4906855d53e38dbebcbfd74fb6 + +info: + name: > + Gift Cards (Gift Vouchers and Packages) <= 4.3.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a10a3f01-082d-4a94-89c6-b5b46891aa4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-voucher/" + google-query: inurl:"/wp-content/plugins/gift-voucher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-voucher,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-voucher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-voucher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-voucher-8d18a006f7e8ea1576808227f78fb4e8.yaml b/nuclei-templates/cve-less/plugins/gift-voucher-8d18a006f7e8ea1576808227f78fb4e8.yaml new file mode 100644 index 0000000000..bf9316eb07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-voucher-8d18a006f7e8ea1576808227f78fb4e8.yaml @@ -0,0 +1,58 @@ +id: gift-voucher-8d18a006f7e8ea1576808227f78fb4e8 + +info: + name: > + Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported) < 4.1.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c42428c6-5d9d-4679-91fe-8ec6f3a3bf9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-voucher/" + google-query: inurl:"/wp-content/plugins/gift-voucher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-voucher,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-voucher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-voucher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gift-voucher-cda43c8c429473025c851831200494f7.yaml b/nuclei-templates/cve-less/plugins/gift-voucher-cda43c8c429473025c851831200494f7.yaml new file mode 100644 index 0000000000..55c1932b11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gift-voucher-cda43c8c429473025c851831200494f7.yaml @@ -0,0 +1,58 @@ +id: gift-voucher-cda43c8c429473025c851831200494f7 + +info: + name: > + Gift Vouchers <= 4.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d86c720b-ede6-4789-ba83-2d035e1641bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gift-voucher/" + google-query: inurl:"/wp-content/plugins/gift-voucher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gift-voucher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gift-voucher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gift-voucher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gigpress-13393dad61452f7f4e21c0de558fed80.yaml b/nuclei-templates/cve-less/plugins/gigpress-13393dad61452f7f4e21c0de558fed80.yaml new file mode 100644 index 0000000000..f04635f2ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gigpress-13393dad61452f7f4e21c0de558fed80.yaml @@ -0,0 +1,58 @@ +id: gigpress-13393dad61452f7f4e21c0de558fed80 + +info: + name: > + GigPress <= 2.3.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f4a9f9f-a342-4053-b4e0-cbaa9796e4ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gigpress/" + google-query: inurl:"/wp-content/plugins/gigpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gigpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gigpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gigpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gigpress-1a55c20ce9650829e57b6e448599ddb2.yaml b/nuclei-templates/cve-less/plugins/gigpress-1a55c20ce9650829e57b6e448599ddb2.yaml new file mode 100644 index 0000000000..61216342ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gigpress-1a55c20ce9650829e57b6e448599ddb2.yaml @@ -0,0 +1,58 @@ +id: gigpress-1a55c20ce9650829e57b6e448599ddb2 + +info: + name: > + GigPress <= 2.3.10 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9124240d-e540-4a59-a4c5-c4279bb39399?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gigpress/" + google-query: inurl:"/wp-content/plugins/gigpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gigpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gigpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gigpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gigpress-6a1e5a3fb07b5d9291ff1e62a0f08cd2.yaml b/nuclei-templates/cve-less/plugins/gigpress-6a1e5a3fb07b5d9291ff1e62a0f08cd2.yaml new file mode 100644 index 0000000000..7efe35ad97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gigpress-6a1e5a3fb07b5d9291ff1e62a0f08cd2.yaml @@ -0,0 +1,58 @@ +id: gigpress-6a1e5a3fb07b5d9291ff1e62a0f08cd2 + +info: + name: > + GigPress <= 2.3.28 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb1dc7e4-a339-4760-9f63-aaa6590bd5e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gigpress/" + google-query: inurl:"/wp-content/plugins/gigpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gigpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gigpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gigpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gigpress-9b85cc5dac11e87b56eb1483e446220f.yaml b/nuclei-templates/cve-less/plugins/gigpress-9b85cc5dac11e87b56eb1483e446220f.yaml new file mode 100644 index 0000000000..e8ac8063fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gigpress-9b85cc5dac11e87b56eb1483e446220f.yaml @@ -0,0 +1,58 @@ +id: gigpress-9b85cc5dac11e87b56eb1483e446220f + +info: + name: > + GigPress <= 2.3.29 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/035d9433-08db-4849-aae3-735be9f82f52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gigpress/" + google-query: inurl:"/wp-content/plugins/gigpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gigpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gigpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gigpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gigpress-df29a94c579971159744f58c90d00e43.yaml b/nuclei-templates/cve-less/plugins/gigpress-df29a94c579971159744f58c90d00e43.yaml new file mode 100644 index 0000000000..812adc0ee9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gigpress-df29a94c579971159744f58c90d00e43.yaml @@ -0,0 +1,58 @@ +id: gigpress-df29a94c579971159744f58c90d00e43 + +info: + name: > + GigPress <= 2.3.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be4f5da0-77ec-41eb-85bd-c019e71d4c9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gigpress/" + google-query: inurl:"/wp-content/plugins/gigpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gigpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gigpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gigpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gigpress-f31fcdd6accb0c61ba4b73c6a548d97d.yaml b/nuclei-templates/cve-less/plugins/gigpress-f31fcdd6accb0c61ba4b73c6a548d97d.yaml new file mode 100644 index 0000000000..a668605410 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gigpress-f31fcdd6accb0c61ba4b73c6a548d97d.yaml @@ -0,0 +1,58 @@ +id: gigpress-f31fcdd6accb0c61ba4b73c6a548d97d + +info: + name: > + GigPress <= 2.3.27 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37a4a181-82ba-43bd-9caf-3a56cacb86a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gigpress/" + google-query: inurl:"/wp-content/plugins/gigpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gigpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gigpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gigpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giphypress-43352935e72ef2b8411f13007515e249.yaml b/nuclei-templates/cve-less/plugins/giphypress-43352935e72ef2b8411f13007515e249.yaml new file mode 100644 index 0000000000..5948fe3170 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giphypress-43352935e72ef2b8411f13007515e249.yaml @@ -0,0 +1,58 @@ +id: giphypress-43352935e72ef2b8411f13007515e249 + +info: + name: > + Giphypress <= 1.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5c29af7-f607-429a-9a1e-f8701fbb9e7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giphypress/" + google-query: inurl:"/wp-content/plugins/giphypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giphypress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giphypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giphypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gistpress-4e01c0b287f81a38f8a747fdacd53194.yaml b/nuclei-templates/cve-less/plugins/gistpress-4e01c0b287f81a38f8a747fdacd53194.yaml new file mode 100644 index 0000000000..d5ea0643d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gistpress-4e01c0b287f81a38f8a747fdacd53194.yaml @@ -0,0 +1,58 @@ +id: gistpress-4e01c0b287f81a38f8a747fdacd53194 + +info: + name: > + GistPress < 3.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5607882d-9112-45f9-bee0-a0c077419187?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gistpress/" + google-query: inurl:"/wp-content/plugins/gistpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gistpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gistpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gistpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-21444ea062027be7746ee8919a0751f7.yaml b/nuclei-templates/cve-less/plugins/give-21444ea062027be7746ee8919a0751f7.yaml new file mode 100644 index 0000000000..bacd231c1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-21444ea062027be7746ee8919a0751f7.yaml @@ -0,0 +1,58 @@ +id: give-21444ea062027be7746ee8919a0751f7 + +info: + name: > + GiveWP <= 2.25.1 - Cross-Site Request Forgery via process_bulk_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9939ffe-a5d5-45cb-b673-665acf1ff09d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-23e584511800cbedd4aa2481d8e724dc.yaml b/nuclei-templates/cve-less/plugins/give-23e584511800cbedd4aa2481d8e724dc.yaml new file mode 100644 index 0000000000..3493e168a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-23e584511800cbedd4aa2481d8e724dc.yaml @@ -0,0 +1,58 @@ +id: give-23e584511800cbedd4aa2481d8e724dc + +info: + name: > + GiveWP <= 2.25.1 - Cross-Site Request Forgery to Cross-Site Scripting via render_dropdown + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a0381b1-9b63-41cb-8125-d22274b98867?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-24d7c262b4ff77236f6549957f02bcd3.yaml b/nuclei-templates/cve-less/plugins/give-24d7c262b4ff77236f6549957f02bcd3.yaml new file mode 100644 index 0000000000..61791c8476 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-24d7c262b4ff77236f6549957f02bcd3.yaml @@ -0,0 +1,58 @@ +id: give-24d7c262b4ff77236f6549957f02bcd3 + +info: + name: > + GiveWP <= 2.5.4 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4794858f-ebaf-4adf-ab08-309964c18c00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-37be249d4dba046bd5576085cbb2729e.yaml b/nuclei-templates/cve-less/plugins/give-37be249d4dba046bd5576085cbb2729e.yaml new file mode 100644 index 0000000000..fe7dc13e36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-37be249d4dba046bd5576085cbb2729e.yaml @@ -0,0 +1,58 @@ +id: give-37be249d4dba046bd5576085cbb2729e + +info: + name: > + GiveWP <= 2.20.2 - Authenticated Arbitrary File Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53ddfd2d-7af1-4561-ab76-5cb3238e8f8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-3f68b15356bc4e3e423989f19f97e89a.yaml b/nuclei-templates/cve-less/plugins/give-3f68b15356bc4e3e423989f19f97e89a.yaml new file mode 100644 index 0000000000..2d39eea459 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-3f68b15356bc4e3e423989f19f97e89a.yaml @@ -0,0 +1,58 @@ +id: give-3f68b15356bc4e3e423989f19f97e89a + +info: + name: > + GiveWP <= 2.23.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89a9d925-6ca3-481f-ba7d-ea9869d51b52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-513ec2f375998d3060fe3f60b69501e3.yaml b/nuclei-templates/cve-less/plugins/give-513ec2f375998d3060fe3f60b69501e3.yaml new file mode 100644 index 0000000000..c1fe776115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-513ec2f375998d3060fe3f60b69501e3.yaml @@ -0,0 +1,58 @@ +id: give-513ec2f375998d3060fe3f60b69501e3 + +info: + name: > + GiveWP <= 2.33.3 - Cross-Site Request Forgery to plugin installation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc5c511f-dc79-468b-a107-cdf50999faf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-533fb5a34390cf0e65d667182e77a256.yaml b/nuclei-templates/cve-less/plugins/give-533fb5a34390cf0e65d667182e77a256.yaml new file mode 100644 index 0000000000..6d112423b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-533fb5a34390cf0e65d667182e77a256.yaml @@ -0,0 +1,58 @@ +id: give-533fb5a34390cf0e65d667182e77a256 + +info: + name: > + GiveWP <= 3.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8bf1d64-8012-4588-9897-aa8bb0cacfb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-54db66d2a717e7bcc7922961c9407af7.yaml b/nuclei-templates/cve-less/plugins/give-54db66d2a717e7bcc7922961c9407af7.yaml new file mode 100644 index 0000000000..bc35b33ef2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-54db66d2a717e7bcc7922961c9407af7.yaml @@ -0,0 +1,58 @@ +id: give-54db66d2a717e7bcc7922961c9407af7 + +info: + name: > + GiveWP <= 2.25.1 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6368c397-0570-4304-a764-869bacc526c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-560e75b141006ad846ab2e105e9e507e.yaml b/nuclei-templates/cve-less/plugins/give-560e75b141006ad846ab2e105e9e507e.yaml new file mode 100644 index 0000000000..a3f16cf649 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-560e75b141006ad846ab2e105e9e507e.yaml @@ -0,0 +1,58 @@ +id: give-560e75b141006ad846ab2e105e9e507e + +info: + name: > + GiveWP <= 2.25.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via give_form_grid shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5f7a07-8117-4305-a72c-6afed80b6bcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-57ba3dbc250a048ad4a278836ea777a0.yaml b/nuclei-templates/cve-less/plugins/give-57ba3dbc250a048ad4a278836ea777a0.yaml new file mode 100644 index 0000000000..921c88e546 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-57ba3dbc250a048ad4a278836ea777a0.yaml @@ -0,0 +1,58 @@ +id: give-57ba3dbc250a048ad4a278836ea777a0 + +info: + name: > + GiveWP <= 3.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d74d71a8-774a-4ebb-b254-0e65a8044319?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-57de8ad14c220bdfc73bc2840b43e6e3.yaml b/nuclei-templates/cve-less/plugins/give-57de8ad14c220bdfc73bc2840b43e6e3.yaml new file mode 100644 index 0000000000..e2b383ffb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-57de8ad14c220bdfc73bc2840b43e6e3.yaml @@ -0,0 +1,58 @@ +id: give-57de8ad14c220bdfc73bc2840b43e6e3 + +info: + name: > + GiveWP <= 2.5.9 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/818ef655-aef3-4808-88ae-ecf2ba209d67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-5b936937c8c0c4c278a2b778b73bea89.yaml b/nuclei-templates/cve-less/plugins/give-5b936937c8c0c4c278a2b778b73bea89.yaml new file mode 100644 index 0000000000..14938fe091 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-5b936937c8c0c4c278a2b778b73bea89.yaml @@ -0,0 +1,58 @@ +id: give-5b936937c8c0c4c278a2b778b73bea89 + +info: + name: > + GiveWP <= 2.10.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a5bf903-9da0-46fd-8134-3abe8e97e3b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-6377ab76651d16deea08b67670c91822.yaml b/nuclei-templates/cve-less/plugins/give-6377ab76651d16deea08b67670c91822.yaml new file mode 100644 index 0000000000..2a6a38d05c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-6377ab76651d16deea08b67670c91822.yaml @@ -0,0 +1,58 @@ +id: give-6377ab76651d16deea08b67670c91822 + +info: + name: > + GiveWP <= 2.25.1 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b30261e0-1fa1-4794-98f6-851532b7615c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-65b42f995ea206de9225157157d7a733.yaml b/nuclei-templates/cve-less/plugins/give-65b42f995ea206de9225157157d7a733.yaml new file mode 100644 index 0000000000..b203d54539 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-65b42f995ea206de9225157157d7a733.yaml @@ -0,0 +1,58 @@ +id: give-65b42f995ea206de9225157157d7a733 + +info: + name: > + GiveWP <= 2.25.1 - Cross-Site Request Forgery via save + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb7ec7ad-797b-4a5c-9b1c-31284083faef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-709d37fdda47f80274e76b38e4a9b3f0.yaml b/nuclei-templates/cve-less/plugins/give-709d37fdda47f80274e76b38e4a9b3f0.yaml new file mode 100644 index 0000000000..b9c78e20bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-709d37fdda47f80274e76b38e4a9b3f0.yaml @@ -0,0 +1,58 @@ +id: give-709d37fdda47f80274e76b38e4a9b3f0 + +info: + name: > + GiveWP <= 2.33.3 - Cross-Site Request Forgery to Stripe Integration Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bff8dea-6971-47d4-bd2c-0821687033e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-78446893c956fc1d75ddd7c2d7c876e7.yaml b/nuclei-templates/cve-less/plugins/give-78446893c956fc1d75ddd7c2d7c876e7.yaml new file mode 100644 index 0000000000..11b2f9e764 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-78446893c956fc1d75ddd7c2d7c876e7.yaml @@ -0,0 +1,58 @@ +id: give-78446893c956fc1d75ddd7c2d7c876e7 + +info: + name: > + GiveWP <= 2.25.1 - Authenticated (Admin+) Server-Side Request Forgery via give_get_content_by_ajax_handler + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2379a029-cc0d-4fa2-9aeb-47a4abd6b51a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-7bb21adc4bf975d211fca6969dfaddaa.yaml b/nuclei-templates/cve-less/plugins/give-7bb21adc4bf975d211fca6969dfaddaa.yaml new file mode 100644 index 0000000000..e09d8c58e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-7bb21adc4bf975d211fca6969dfaddaa.yaml @@ -0,0 +1,58 @@ +id: give-7bb21adc4bf975d211fca6969dfaddaa + +info: + name: > + GiveWP – Donation Plugin and Fundraising Platform <= 2.20.2 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/addae413-1fc5-427f-a5ef-3da705cbeb5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-7d75f8931c3f52f53c2af82cabb73968.yaml b/nuclei-templates/cve-less/plugins/give-7d75f8931c3f52f53c2af82cabb73968.yaml new file mode 100644 index 0000000000..429de8e117 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-7d75f8931c3f52f53c2af82cabb73968.yaml @@ -0,0 +1,58 @@ +id: give-7d75f8931c3f52f53c2af82cabb73968 + +info: + name: > + GiveWP <= 2.25.2 - Cross-Site Request Forgery via give_ajax_delete_payment_note + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2dc1a04-5503-412b-92e7-ed86910abd92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-7dd2e84c6e70296a48fc2b4acb29199c.yaml b/nuclei-templates/cve-less/plugins/give-7dd2e84c6e70296a48fc2b4acb29199c.yaml new file mode 100644 index 0000000000..4413f729e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-7dd2e84c6e70296a48fc2b4acb29199c.yaml @@ -0,0 +1,58 @@ +id: give-7dd2e84c6e70296a48fc2b4acb29199c + +info: + name: > + GiveWP <= 2.25.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ea02dd5-d837-471c-aa6a-264ffcedd55d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-7e1c91d2fe86a0149b73baa7bbb169af.yaml b/nuclei-templates/cve-less/plugins/give-7e1c91d2fe86a0149b73baa7bbb169af.yaml new file mode 100644 index 0000000000..7d82dd114e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-7e1c91d2fe86a0149b73baa7bbb169af.yaml @@ -0,0 +1,58 @@ +id: give-7e1c91d2fe86a0149b73baa7bbb169af + +info: + name: > + GiveWP <= 2.33.3 - Cross-Site Request Forgery to plugin deactivation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e32d9104-5a39-4455-b76a-e24ae787bdfd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-81dceb70d6b123bc1dd5fda793f142c3.yaml b/nuclei-templates/cve-less/plugins/give-81dceb70d6b123bc1dd5fda793f142c3.yaml new file mode 100644 index 0000000000..f52526edd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-81dceb70d6b123bc1dd5fda793f142c3.yaml @@ -0,0 +1,58 @@ +id: give-81dceb70d6b123bc1dd5fda793f142c3 + +info: + name: > + GiveWP <= 2.23.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a20f582-10e7-4530-8d3c-9bc1e844badd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-85f432bf2dbf8ba147f83f3469bc9104.yaml b/nuclei-templates/cve-less/plugins/give-85f432bf2dbf8ba147f83f3469bc9104.yaml new file mode 100644 index 0000000000..c085b05584 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-85f432bf2dbf8ba147f83f3469bc9104.yaml @@ -0,0 +1,58 @@ +id: give-85f432bf2dbf8ba147f83f3469bc9104 + +info: + name: > + GiveWP <= 2.25.1 - Authenticated (Contributor+) Arbitrary Content Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9af1429-32c5-4907-acf4-83efc6727bb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-86bbc19d9e21d4915eb630a058d87bcf.yaml b/nuclei-templates/cve-less/plugins/give-86bbc19d9e21d4915eb630a058d87bcf.yaml new file mode 100644 index 0000000000..a14397420d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-86bbc19d9e21d4915eb630a058d87bcf.yaml @@ -0,0 +1,58 @@ +id: give-86bbc19d9e21d4915eb630a058d87bcf + +info: + name: > + GiveWP – Donation Plugin and Fundraising Platform <= 3.6.1 -- Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61901d83-0d05-4be8-a318-43bea086293a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-87bce74e2816b9152b22f0db777f7371.yaml b/nuclei-templates/cve-less/plugins/give-87bce74e2816b9152b22f0db777f7371.yaml new file mode 100644 index 0000000000..95f8b51a8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-87bce74e2816b9152b22f0db777f7371.yaml @@ -0,0 +1,58 @@ +id: give-87bce74e2816b9152b22f0db777f7371 + +info: + name: > + GiveWP – Donation Plugin and Fundraising Platform <= 3.4.2 - Authenticated (GiveWP Manager+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dc7bc0a-b209-431f-a9f1-f850b1a1d1b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-941ef3ed4e3d287ad92a76b5c6b10f89.yaml b/nuclei-templates/cve-less/plugins/give-941ef3ed4e3d287ad92a76b5c6b10f89.yaml new file mode 100644 index 0000000000..d7d4eb8557 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-941ef3ed4e3d287ad92a76b5c6b10f89.yaml @@ -0,0 +1,58 @@ +id: give-941ef3ed4e3d287ad92a76b5c6b10f89 + +info: + name: > + Give - Donation Plugin <= 2.33.0 - Authenticated(Give Manager+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22ff4b09-063b-425e-9d59-be2e5d283186?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-943637fa687cb5cc701289f6e9276a36.yaml b/nuclei-templates/cve-less/plugins/give-943637fa687cb5cc701289f6e9276a36.yaml new file mode 100644 index 0000000000..f294c170d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-943637fa687cb5cc701289f6e9276a36.yaml @@ -0,0 +1,58 @@ +id: give-943637fa687cb5cc701289f6e9276a36 + +info: + name: > + GiveWP <= 2.25.2 - Cross-Site Request Forgery via give_ajax_store_payment_note + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d09a0b62-6556-4be5-a6f2-0cb0edcced3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-9507ea5164d4b920f9f2c716985b7a19.yaml b/nuclei-templates/cve-less/plugins/give-9507ea5164d4b920f9f2c716985b7a19.yaml new file mode 100644 index 0000000000..e271520924 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-9507ea5164d4b920f9f2c716985b7a19.yaml @@ -0,0 +1,58 @@ +id: give-9507ea5164d4b920f9f2c716985b7a19 + +info: + name: > + GiveWP - Donation Plugin and Fundraising Platform <= 2.5.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/715b0d61-1fac-4039-b18c-e9371788c24c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-a0dbcf6f52eae1325b0e855594e29c09.yaml b/nuclei-templates/cve-less/plugins/give-a0dbcf6f52eae1325b0e855594e29c09.yaml new file mode 100644 index 0000000000..89d59e0c5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-a0dbcf6f52eae1325b0e855594e29c09.yaml @@ -0,0 +1,58 @@ +id: give-a0dbcf6f52eae1325b0e855594e29c09 + +info: + name: > + GiveWP <= 2.3.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb0b24b6-38da-4650-b542-a31ba8c98fb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-b1b366ca92b9c54e2c2fcc9208d3c99a.yaml b/nuclei-templates/cve-less/plugins/give-b1b366ca92b9c54e2c2fcc9208d3c99a.yaml new file mode 100644 index 0000000000..884803b017 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-b1b366ca92b9c54e2c2fcc9208d3c99a.yaml @@ -0,0 +1,58 @@ +id: give-b1b366ca92b9c54e2c2fcc9208d3c99a + +info: + name: > + GiveWP – Donation Plugin and Fundraising Platform <= 3.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1710f84-e3c1-4fbc-841e-c7c9ccf3a2e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-b9cdb37818419e5c667c4243ff011f5d.yaml b/nuclei-templates/cve-less/plugins/give-b9cdb37818419e5c667c4243ff011f5d.yaml new file mode 100644 index 0000000000..2bf619f7b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-b9cdb37818419e5c667c4243ff011f5d.yaml @@ -0,0 +1,58 @@ +id: give-b9cdb37818419e5c667c4243ff011f5d + +info: + name: > + GiveWP <= 2.11.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/498087da-3887-475a-9796-676ee1d1fb99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-c2ccbf305342f3ecbc58cb5dfedcc25d.yaml b/nuclei-templates/cve-less/plugins/give-c2ccbf305342f3ecbc58cb5dfedcc25d.yaml new file mode 100644 index 0000000000..8bc8137f62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-c2ccbf305342f3ecbc58cb5dfedcc25d.yaml @@ -0,0 +1,58 @@ +id: give-c2ccbf305342f3ecbc58cb5dfedcc25d + +info: + name: > + GiveWP <= 2.25.3 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fa8c406-e64d-4093-a102-436ecfb7dd76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-cafa6e63a423db5471d38a13d54d5840.yaml b/nuclei-templates/cve-less/plugins/give-cafa6e63a423db5471d38a13d54d5840.yaml new file mode 100644 index 0000000000..1c38b082df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-cafa6e63a423db5471d38a13d54d5840.yaml @@ -0,0 +1,58 @@ +id: give-cafa6e63a423db5471d38a13d54d5840 + +info: + name: > + GiveWP <= 2.17.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f90f5f35-ed84-4284-be21-15bfaf10175f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-d338bda5ac65a8a3ce38070f7a58731b.yaml b/nuclei-templates/cve-less/plugins/give-d338bda5ac65a8a3ce38070f7a58731b.yaml new file mode 100644 index 0000000000..850be765c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-d338bda5ac65a8a3ce38070f7a58731b.yaml @@ -0,0 +1,58 @@ +id: give-d338bda5ac65a8a3ce38070f7a58731b + +info: + name: > + GiveWP <= 2.25.1 - Cross-Site Request Forgery via give_cache_flush + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c820003b-8f30-4557-a282-e3ad7e403062?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-d69efeae16b0ba8318e8a9d732208aec.yaml b/nuclei-templates/cve-less/plugins/give-d69efeae16b0ba8318e8a9d732208aec.yaml new file mode 100644 index 0000000000..10aeafc6b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-d69efeae16b0ba8318e8a9d732208aec.yaml @@ -0,0 +1,58 @@ +id: give-d69efeae16b0ba8318e8a9d732208aec + +info: + name: > + GiveWP <= 2.4.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c177440a-4575-4202-be16-ac7ab0fbb90b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-e6953b327d094d1df94ac78f97ce3f1a.yaml b/nuclei-templates/cve-less/plugins/give-e6953b327d094d1df94ac78f97ce3f1a.yaml new file mode 100644 index 0000000000..d84b8215b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-e6953b327d094d1df94ac78f97ce3f1a.yaml @@ -0,0 +1,58 @@ +id: give-e6953b327d094d1df94ac78f97ce3f1a + +info: + name: > + GiveWP <= 2.17.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad7e3fe0-561e-40d8-b22c-bf8e7675b87f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-e8c206cd1f26f528590d564824a60ae5.yaml b/nuclei-templates/cve-less/plugins/give-e8c206cd1f26f528590d564824a60ae5.yaml new file mode 100644 index 0000000000..9e934941c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-e8c206cd1f26f528590d564824a60ae5.yaml @@ -0,0 +1,58 @@ +id: give-e8c206cd1f26f528590d564824a60ae5 + +info: + name: > + GiveWP – Donation Plugin and Fundraising Platform < 0.8.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40f79195-23e7-4091-9dcb-8b787f0606f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-ed46e202f3a956c555880fedcaa0b829.yaml b/nuclei-templates/cve-less/plugins/give-ed46e202f3a956c555880fedcaa0b829.yaml new file mode 100644 index 0000000000..93fa922b40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-ed46e202f3a956c555880fedcaa0b829.yaml @@ -0,0 +1,58 @@ +id: give-ed46e202f3a956c555880fedcaa0b829 + +info: + name: > + GiveWP <= 2.21.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50b811e0-c1f4-4970-a340-8c1619456e29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.21.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-f373f6f19e01f5b1868c8800fb906e71.yaml b/nuclei-templates/cve-less/plugins/give-f373f6f19e01f5b1868c8800fb906e71.yaml new file mode 100644 index 0000000000..a9268c9c18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-f373f6f19e01f5b1868c8800fb906e71.yaml @@ -0,0 +1,58 @@ +id: give-f373f6f19e01f5b1868c8800fb906e71 + +info: + name: > + GiveWP <= 2.17.2 - Reflected Cross-Site Scripting via Import Tool + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ccf6945-6f18-410b-9f1a-6d52a3cdda1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-f58e0252abf68aa36c1bcaab03cbf89f.yaml b/nuclei-templates/cve-less/plugins/give-f58e0252abf68aa36c1bcaab03cbf89f.yaml new file mode 100644 index 0000000000..b14ce9cfef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-f58e0252abf68aa36c1bcaab03cbf89f.yaml @@ -0,0 +1,58 @@ +id: give-f58e0252abf68aa36c1bcaab03cbf89f + +info: + name: > + GiveWP 2.4.0 - 2.9.7 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85198759-0b9c-4c8a-b650-ad268d0cb784?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.4.0', '<= 2.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-fa1fef40b905a2c3c8c8c056ae496c09.yaml b/nuclei-templates/cve-less/plugins/give-fa1fef40b905a2c3c8c8c056ae496c09.yaml new file mode 100644 index 0000000000..05e3970e5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-fa1fef40b905a2c3c8c8c056ae496c09.yaml @@ -0,0 +1,58 @@ +id: give-fa1fef40b905a2c3c8c8c056ae496c09 + +info: + name: > + GiveWP <= 2.33.1 - Missing Authorization via handleBeforeGateway + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b6b1b7e-2ba4-4b72-9e3d-b54c00437cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/give-fbf0d51e53f3797d566b99247fa5f5d8.yaml b/nuclei-templates/cve-less/plugins/give-fbf0d51e53f3797d566b99247fa5f5d8.yaml new file mode 100644 index 0000000000..ccbc67908a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/give-fbf0d51e53f3797d566b99247fa5f5d8.yaml @@ -0,0 +1,58 @@ +id: give-fbf0d51e53f3797d566b99247fa5f5d8 + +info: + name: > + GiveWP – Donation Plugin and Fundraising Platform <= 2.21.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dc26eaa-2da5-4cd6-b613-4da2faad0f3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/give/" + google-query: inurl:"/wp-content/plugins/give/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,give,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/give/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "give" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.21.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveasap-3a84f9286ec25d34a996b5cb4ee829c4.yaml b/nuclei-templates/cve-less/plugins/giveasap-3a84f9286ec25d34a996b5cb4ee829c4.yaml new file mode 100644 index 0000000000..8c6e04a224 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveasap-3a84f9286ec25d34a996b5cb4ee829c4.yaml @@ -0,0 +1,58 @@ +id: giveasap-3a84f9286ec25d34a996b5cb4ee829c4 + +info: + name: > + Simple Giveaways <= 2.46.0 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/721f8943-5d59-41ee-935e-999dff2e590d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveasap/" + google-query: inurl:"/wp-content/plugins/giveasap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveasap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveasap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveasap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.46.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveasap-3d832eae81d276110b2fb05b6aea23b7.yaml b/nuclei-templates/cve-less/plugins/giveasap-3d832eae81d276110b2fb05b6aea23b7.yaml new file mode 100644 index 0000000000..3d2b71dd4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveasap-3d832eae81d276110b2fb05b6aea23b7.yaml @@ -0,0 +1,58 @@ +id: giveasap-3d832eae81d276110b2fb05b6aea23b7 + +info: + name: > + Simple Giveaways <= 2.45.0 - Authenticated(Admin+) Stored Cross-Site Scripting via form fields + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91552a9b-d46b-4a75-b096-8f28bdd9fb56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveasap/" + google-query: inurl:"/wp-content/plugins/giveasap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveasap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveasap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveasap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.45.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveasap-6e765eeed6905cf3916d16fe5425c306.yaml b/nuclei-templates/cve-less/plugins/giveasap-6e765eeed6905cf3916d16fe5425c306.yaml new file mode 100644 index 0000000000..7503d53dad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveasap-6e765eeed6905cf3916d16fe5425c306.yaml @@ -0,0 +1,58 @@ +id: giveasap-6e765eeed6905cf3916d16fe5425c306 + +info: + name: > + Simple Giveaways <= 2.36.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a43db90-2a9e-4223-bf55-fef1a6bb2280?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveasap/" + google-query: inurl:"/wp-content/plugins/giveasap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveasap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveasap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveasap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.36.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveasap-7cc7ed508e00e037806456d02a30380e.yaml b/nuclei-templates/cve-less/plugins/giveasap-7cc7ed508e00e037806456d02a30380e.yaml new file mode 100644 index 0000000000..33e3f043fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveasap-7cc7ed508e00e037806456d02a30380e.yaml @@ -0,0 +1,58 @@ +id: giveasap-7cc7ed508e00e037806456d02a30380e + +info: + name: > + Simple Giveaways <= 2.46 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8390ab61-197a-4eb7-a589-47bf46a0e123?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveasap/" + google-query: inurl:"/wp-content/plugins/giveasap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveasap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveasap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveasap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveasap-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/giveasap-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0e472d7ae6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveasap-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: giveasap-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveasap/" + google-query: inurl:"/wp-content/plugins/giveasap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveasap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveasap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveasap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.42.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveasap-c518ac9593781d65f764a219f04b0aec.yaml b/nuclei-templates/cve-less/plugins/giveasap-c518ac9593781d65f764a219f04b0aec.yaml new file mode 100644 index 0000000000..827db2c5bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveasap-c518ac9593781d65f764a219f04b0aec.yaml @@ -0,0 +1,58 @@ +id: giveasap-c518ac9593781d65f764a219f04b0aec + +info: + name: > + Simple Giveaways <= 2.45.0 - Authenticated (Admin+) Stored Cross-Site Scripting via Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86991143-d4e7-4114-b219-0deedd084858?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveasap/" + google-query: inurl:"/wp-content/plugins/giveasap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveasap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveasap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveasap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.45.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveasap-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/giveasap-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..d329720b52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveasap-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: giveasap-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveasap/" + google-query: inurl:"/wp-content/plugins/giveasap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveasap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveasap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveasap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveasap-fece4721182fa2d84ab761adf04133ca.yaml b/nuclei-templates/cve-less/plugins/giveasap-fece4721182fa2d84ab761adf04133ca.yaml new file mode 100644 index 0000000000..a1f1d885f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveasap-fece4721182fa2d84ab761adf04133ca.yaml @@ -0,0 +1,58 @@ +id: giveasap-fece4721182fa2d84ab761adf04133ca + +info: + name: > + Simple Giveaways <= 2.45.0 - Authenticated (Editor+) Stored Cross-Site Scripting via Form, Prize, and Sharing Method Fields + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/240691c4-35c5-40e1-b1ab-a500ffcdac73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveasap/" + google-query: inurl:"/wp-content/plugins/giveasap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveasap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveasap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveasap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.45.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveaway-26c15735f9b04a66bec91df3a0d7b981.yaml b/nuclei-templates/cve-less/plugins/giveaway-26c15735f9b04a66bec91df3a0d7b981.yaml new file mode 100644 index 0000000000..18770274ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveaway-26c15735f9b04a66bec91df3a0d7b981.yaml @@ -0,0 +1,58 @@ +id: giveaway-26c15735f9b04a66bec91df3a0d7b981 + +info: + name: > + Giveaway <= 1.2.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b02ab0cf-8bdf-4415-bae3-2193c3d75741?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveaway/" + google-query: inurl:"/wp-content/plugins/giveaway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveaway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveaway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveaway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveaways-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/giveaways-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ce680c8210 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveaways-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: giveaways-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveaways-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/giveaways-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveaways-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveaways-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveaways-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/giveaways-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/giveaways-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..48bb24e5ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/giveaways-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: giveaways-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/giveaways-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/giveaways-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,giveaways-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/giveaways-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "giveaways-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/glass-6881e52d7cf04ebe1617491d26006f2c.yaml b/nuclei-templates/cve-less/plugins/glass-6881e52d7cf04ebe1617491d26006f2c.yaml new file mode 100644 index 0000000000..b7dedc4191 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/glass-6881e52d7cf04ebe1617491d26006f2c.yaml @@ -0,0 +1,58 @@ +id: glass-6881e52d7cf04ebe1617491d26006f2c + +info: + name: > + Glass <= 1.3.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f3448ad-61b3-4eac-a5ba-9bea41c85fd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/glass/" + google-query: inurl:"/wp-content/plugins/glass/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,glass,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/glass/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "glass" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/global-content-blocks-6765f94f6a40bfeac4a799a7a22b461e.yaml b/nuclei-templates/cve-less/plugins/global-content-blocks-6765f94f6a40bfeac4a799a7a22b461e.yaml new file mode 100644 index 0000000000..c7481fbec5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/global-content-blocks-6765f94f6a40bfeac4a799a7a22b461e.yaml @@ -0,0 +1,58 @@ +id: global-content-blocks-6765f94f6a40bfeac4a799a7a22b461e + +info: + name: > + Global Content Blocks <= 2.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28e74811-aae8-4276-abb1-cbe4fbcfd08b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/global-content-blocks/" + google-query: inurl:"/wp-content/plugins/global-content-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,global-content-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/global-content-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "global-content-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/global-elementor-buttons-13ea368d9bd0647c7fbc9fa83359351c.yaml b/nuclei-templates/cve-less/plugins/global-elementor-buttons-13ea368d9bd0647c7fbc9fa83359351c.yaml new file mode 100644 index 0000000000..dbd1ee7f64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/global-elementor-buttons-13ea368d9bd0647c7fbc9fa83359351c.yaml @@ -0,0 +1,58 @@ +id: global-elementor-buttons-13ea368d9bd0647c7fbc9fa83359351c + +info: + name: > + Global Elementor Buttons <= 1.1.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via button link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d84f9b06-9127-4526-8f17-21608ec2f601?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/global-elementor-buttons/" + google-query: inurl:"/wp-content/plugins/global-elementor-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,global-elementor-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/global-elementor-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "global-elementor-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/global-flash-galleries-08c393c21c576ae1c41fe91d54e7e9e1.yaml b/nuclei-templates/cve-less/plugins/global-flash-galleries-08c393c21c576ae1c41fe91d54e7e9e1.yaml new file mode 100644 index 0000000000..c27ebfb36f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/global-flash-galleries-08c393c21c576ae1c41fe91d54e7e9e1.yaml @@ -0,0 +1,58 @@ +id: global-flash-galleries-08c393c21c576ae1c41fe91d54e7e9e1 + +info: + name: > + Global Flash Gallery <= 0.15.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4624d197-db90-41ee-a3d5-a83a0dbf6b7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/global-flash-galleries/" + google-query: inurl:"/wp-content/plugins/global-flash-galleries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,global-flash-galleries,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/global-flash-galleries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "global-flash-galleries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.15.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/global-flash-galleries-7ae34f6008db08976405a2c0ef63df74.yaml b/nuclei-templates/cve-less/plugins/global-flash-galleries-7ae34f6008db08976405a2c0ef63df74.yaml new file mode 100644 index 0000000000..2aaf82bda2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/global-flash-galleries-7ae34f6008db08976405a2c0ef63df74.yaml @@ -0,0 +1,58 @@ +id: global-flash-galleries-7ae34f6008db08976405a2c0ef63df74 + +info: + name: > + Global Flash Gallery <= 0.15.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08c14611-c785-484d-9fdf-7d71c39f63df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/global-flash-galleries/" + google-query: inurl:"/wp-content/plugins/global-flash-galleries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,global-flash-galleries,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/global-flash-galleries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "global-flash-galleries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.15.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/global-flash-galleries-95f3b505db0bb5acbcaf86e1dd39e4eb.yaml b/nuclei-templates/cve-less/plugins/global-flash-galleries-95f3b505db0bb5acbcaf86e1dd39e4eb.yaml new file mode 100644 index 0000000000..1980d4e127 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/global-flash-galleries-95f3b505db0bb5acbcaf86e1dd39e4eb.yaml @@ -0,0 +1,58 @@ +id: global-flash-galleries-95f3b505db0bb5acbcaf86e1dd39e4eb + +info: + name: > + Global Flash Gallery < 0.13.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92c5c282-9193-41b3-9c1e-cd700765f346?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/global-flash-galleries/" + google-query: inurl:"/wp-content/plugins/global-flash-galleries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,global-flash-galleries,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/global-flash-galleries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "global-flash-galleries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/global-income-stats-from-freemius-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/global-income-stats-from-freemius-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..9b4bb5010f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/global-income-stats-from-freemius-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: global-income-stats-from-freemius-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/global-income-stats-from-freemius/" + google-query: inurl:"/wp-content/plugins/global-income-stats-from-freemius/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,global-income-stats-from-freemius,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/global-income-stats-from-freemius/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "global-income-stats-from-freemius" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/global-multisite-search-76fd12ad8b7b78037046699e5ffa0377.yaml b/nuclei-templates/cve-less/plugins/global-multisite-search-76fd12ad8b7b78037046699e5ffa0377.yaml new file mode 100644 index 0000000000..6d0f615b94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/global-multisite-search-76fd12ad8b7b78037046699e5ffa0377.yaml @@ -0,0 +1,58 @@ +id: global-multisite-search-76fd12ad8b7b78037046699e5ffa0377 + +info: + name: > + Global Multisite Search <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f70e1b6-2963-43f6-b60f-65830d030d79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/global-multisite-search/" + google-query: inurl:"/wp-content/plugins/global-multisite-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,global-multisite-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/global-multisite-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "global-multisite-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/glorious-services-support-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/glorious-services-support-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f0cf32e3bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/glorious-services-support-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: glorious-services-support-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/glorious-services-support/" + google-query: inurl:"/wp-content/plugins/glorious-services-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,glorious-services-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/glorious-services-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "glorious-services-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/glorious-sites-installer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/glorious-sites-installer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b10c7efffa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/glorious-sites-installer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: glorious-sites-installer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/glorious-sites-installer/" + google-query: inurl:"/wp-content/plugins/glorious-sites-installer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,glorious-sites-installer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/glorious-sites-installer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "glorious-sites-installer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/glossary-by-codeat-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/glossary-by-codeat-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b17b477dc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/glossary-by-codeat-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: glossary-by-codeat-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/glossary-by-codeat/" + google-query: inurl:"/wp-content/plugins/glossary-by-codeat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,glossary-by-codeat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/glossary-by-codeat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "glossary-by-codeat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/glossary-by-codeat-bc0cf3a754a6fbdff0b7d35751f27209.yaml b/nuclei-templates/cve-less/plugins/glossary-by-codeat-bc0cf3a754a6fbdff0b7d35751f27209.yaml new file mode 100644 index 0000000000..a3c70248e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/glossary-by-codeat-bc0cf3a754a6fbdff0b7d35751f27209.yaml @@ -0,0 +1,58 @@ +id: glossary-by-codeat-bc0cf3a754a6fbdff0b7d35751f27209 + +info: + name: > + Glossary <= 2.1.27 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c21c12b1-763e-4c01-bd41-5e2d0b34a50f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/glossary-by-codeat/" + google-query: inurl:"/wp-content/plugins/glossary-by-codeat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,glossary-by-codeat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/glossary-by-codeat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "glossary-by-codeat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gm-woo-product-list-widget-8b27cef0936a142b64091e4a3cd8f0d4.yaml b/nuclei-templates/cve-less/plugins/gm-woo-product-list-widget-8b27cef0936a142b64091e4a3cd8f0d4.yaml new file mode 100644 index 0000000000..c1e87adabe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gm-woo-product-list-widget-8b27cef0936a142b64091e4a3cd8f0d4.yaml @@ -0,0 +1,58 @@ +id: gm-woo-product-list-widget-8b27cef0936a142b64091e4a3cd8f0d4 + +info: + name: > + Product list Widget for Woocommerce <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a0f2774-4677-45a1-9c86-240a6e35f7af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gm-woo-product-list-widget/" + google-query: inurl:"/wp-content/plugins/gm-woo-product-list-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gm-woo-product-list-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gm-woo-product-list-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gm-woo-product-list-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-628e944f1865bad285b75e5824e5bb82.yaml b/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-628e944f1865bad285b75e5824e5bb82.yaml new file mode 100644 index 0000000000..066c60a712 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-628e944f1865bad285b75e5824e5bb82.yaml @@ -0,0 +1,58 @@ +id: gm-woocommerce-quote-popup-628e944f1865bad285b75e5824e5bb82 + +info: + name: > + Product Enquiry for WooCommerce <= 3.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d19e6433-c248-44ff-97a9-0f351eb77763?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gm-woocommerce-quote-popup/" + google-query: inurl:"/wp-content/plugins/gm-woocommerce-quote-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gm-woocommerce-quote-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gm-woocommerce-quote-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gm-woocommerce-quote-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-9f96211fdf4dfb4e1d26bfe2d1c36496.yaml b/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-9f96211fdf4dfb4e1d26bfe2d1c36496.yaml new file mode 100644 index 0000000000..94202fbebb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-9f96211fdf4dfb4e1d26bfe2d1c36496.yaml @@ -0,0 +1,58 @@ +id: gm-woocommerce-quote-popup-9f96211fdf4dfb4e1d26bfe2d1c36496 + +info: + name: > + Product Enquiry for WooCommerce <= 3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f18b7523-fa8f-4c5d-acd7-db0e2135c796?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gm-woocommerce-quote-popup/" + google-query: inurl:"/wp-content/plugins/gm-woocommerce-quote-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gm-woocommerce-quote-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gm-woocommerce-quote-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gm-woocommerce-quote-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-bc43f57bd35ee24fbcd374ea171e9e72.yaml b/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-bc43f57bd35ee24fbcd374ea171e9e72.yaml new file mode 100644 index 0000000000..2d39bf7627 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-bc43f57bd35ee24fbcd374ea171e9e72.yaml @@ -0,0 +1,58 @@ +id: gm-woocommerce-quote-popup-bc43f57bd35ee24fbcd374ea171e9e72 + +info: + name: > + Product Enquiry for WooCommerce <= 3.1 - Unauthenticated Stored Cross-Site Scripting via name + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6840add4-62db-4b99-b48b-0b51aa2451b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gm-woocommerce-quote-popup/" + google-query: inurl:"/wp-content/plugins/gm-woocommerce-quote-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gm-woocommerce-quote-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gm-woocommerce-quote-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gm-woocommerce-quote-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-d4e0a798d434cb0cbde1a32f973bc629.yaml b/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-d4e0a798d434cb0cbde1a32f973bc629.yaml new file mode 100644 index 0000000000..c0032816ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gm-woocommerce-quote-popup-d4e0a798d434cb0cbde1a32f973bc629.yaml @@ -0,0 +1,58 @@ +id: gm-woocommerce-quote-popup-d4e0a798d434cb0cbde1a32f973bc629 + +info: + name: > + Product Enquiry for WooCommerce <= 3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f37cc9d0-345e-4ab7-ae99-d9d7fee6c1e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gm-woocommerce-quote-popup/" + google-query: inurl:"/wp-content/plugins/gm-woocommerce-quote-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gm-woocommerce-quote-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gm-woocommerce-quote-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gm-woocommerce-quote-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gmace-573c28c014e533996385e54c5801eb5e.yaml b/nuclei-templates/cve-less/plugins/gmace-573c28c014e533996385e54c5801eb5e.yaml new file mode 100644 index 0000000000..24b762ecec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gmace-573c28c014e533996385e54c5801eb5e.yaml @@ -0,0 +1,58 @@ +id: gmace-573c28c014e533996385e54c5801eb5e + +info: + name: > + GMAce <= 1.5.2 - Cross-Site Request Forgery via gmace_manager_client + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6e82b46-0b10-45fe-949e-dd94dd8656c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gmace/" + google-query: inurl:"/wp-content/plugins/gmace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gmace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gmace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gmace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gmace-91afdd80e105f88c419657c28ec390b7.yaml b/nuclei-templates/cve-less/plugins/gmace-91afdd80e105f88c419657c28ec390b7.yaml new file mode 100644 index 0000000000..944d5ccf09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gmace-91afdd80e105f88c419657c28ec390b7.yaml @@ -0,0 +1,58 @@ +id: gmace-91afdd80e105f88c419657c28ec390b7 + +info: + name: > + GMAce <= 1.5.2 - Authenticated(Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3523535-6938-4922-8126-8386861ca512?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gmace/" + google-query: inurl:"/wp-content/plugins/gmace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gmace,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gmace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gmace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gmace-99958bc5af6b387619c59f0368c5fbd3.yaml b/nuclei-templates/cve-less/plugins/gmace-99958bc5af6b387619c59f0368c5fbd3.yaml new file mode 100644 index 0000000000..a6bd81ba48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gmace-99958bc5af6b387619c59f0368c5fbd3.yaml @@ -0,0 +1,58 @@ +id: gmace-99958bc5af6b387619c59f0368c5fbd3 + +info: + name: > + GMAce <= 1.5.2 - Cross-Site Request Forgery to Arbitrary File Modification (Creation/Overwrite/Deletion) + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826b3913-9a37-4e15-80fd-b35cefb51af8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gmace/" + google-query: inurl:"/wp-content/plugins/gmace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gmace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gmace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gmace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gmap-embed-3d3b0b33d5d87ca799b6b79195a4eb93.yaml b/nuclei-templates/cve-less/plugins/gmap-embed-3d3b0b33d5d87ca799b6b79195a4eb93.yaml new file mode 100644 index 0000000000..2aa235aa0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gmap-embed-3d3b0b33d5d87ca799b6b79195a4eb93.yaml @@ -0,0 +1,58 @@ +id: gmap-embed-3d3b0b33d5d87ca799b6b79195a4eb93 + +info: + name: > + WP Google Map <= 1.8.3 - Arbitrary Post Deletion and Plugin Settings Update via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7af6721-4886-4bec-8931-992881310f26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gmap-embed/" + google-query: inurl:"/wp-content/plugins/gmap-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gmap-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gmap-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gmap-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gmap-embed-72366184b67914a0825758added672d3.yaml b/nuclei-templates/cve-less/plugins/gmap-embed-72366184b67914a0825758added672d3.yaml new file mode 100644 index 0000000000..78f4516535 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gmap-embed-72366184b67914a0825758added672d3.yaml @@ -0,0 +1,58 @@ +id: gmap-embed-72366184b67914a0825758added672d3 + +info: + name: > + WP Google Map <= 1.8.0 - Subscriber+ Arbitrary Post Deletion and Plugin Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19e6bd3b-8d03-4617-8be2-3cdaeb85fac0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gmap-embed/" + google-query: inurl:"/wp-content/plugins/gmap-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gmap-embed,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gmap-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gmap-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gmap-embed-a2596cd818b9e76da96ce78707638a4c.yaml b/nuclei-templates/cve-less/plugins/gmap-embed-a2596cd818b9e76da96ce78707638a4c.yaml new file mode 100644 index 0000000000..c8a405cab5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gmap-embed-a2596cd818b9e76da96ce78707638a4c.yaml @@ -0,0 +1,58 @@ +id: gmap-embed-a2596cd818b9e76da96ce78707638a4c + +info: + name: > + WP Google Map <= 1.8.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58da5adc-bb2e-409d-a623-12b19e6da138?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gmap-embed/" + google-query: inurl:"/wp-content/plugins/gmap-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gmap-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gmap-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gmap-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gmap-embed-cf16a38393f700cdb2be76a3ca5de2f2.yaml b/nuclei-templates/cve-less/plugins/gmap-embed-cf16a38393f700cdb2be76a3ca5de2f2.yaml new file mode 100644 index 0000000000..31d40cb817 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gmap-embed-cf16a38393f700cdb2be76a3ca5de2f2.yaml @@ -0,0 +1,58 @@ +id: gmap-embed-cf16a38393f700cdb2be76a3ca5de2f2 + +info: + name: > + WP Google Map <= 1.7.6 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdb3cdf8-7563-4ccd-83fe-7ebd13fa7936?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gmap-embed/" + google-query: inurl:"/wp-content/plugins/gmap-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gmap-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gmap-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gmap-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gn-publisher-8fa57ae72750b34eb12df59c3f8bd733.yaml b/nuclei-templates/cve-less/plugins/gn-publisher-8fa57ae72750b34eb12df59c3f8bd733.yaml new file mode 100644 index 0000000000..6d8c14a07c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gn-publisher-8fa57ae72750b34eb12df59c3f8bd733.yaml @@ -0,0 +1,58 @@ +id: gn-publisher-8fa57ae72750b34eb12df59c3f8bd733 + +info: + name: > + GN Publisher <= 1.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a4ee97c-63cd-4a5e-a112-6d4c4c627a57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gn-publisher/" + google-query: inurl:"/wp-content/plugins/gn-publisher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gn-publisher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gn-publisher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gn-publisher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gnu-mailman-integration-e9b21730376128cd6be89ff8a65d542e.yaml b/nuclei-templates/cve-less/plugins/gnu-mailman-integration-e9b21730376128cd6be89ff8a65d542e.yaml new file mode 100644 index 0000000000..d616aac98d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gnu-mailman-integration-e9b21730376128cd6be89ff8a65d542e.yaml @@ -0,0 +1,58 @@ +id: gnu-mailman-integration-e9b21730376128cd6be89ff8a65d542e + +info: + name: > + GNU-Mailman Integration <= 1.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3edc40b7-5cf6-413b-80c5-b001934bedc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gnu-mailman-integration/" + google-query: inurl:"/wp-content/plugins/gnu-mailman-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gnu-mailman-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gnu-mailman-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gnu-mailman-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gnucommerce-24f4d698ab0a491686fe5ba91eade3a1.yaml b/nuclei-templates/cve-less/plugins/gnucommerce-24f4d698ab0a491686fe5ba91eade3a1.yaml new file mode 100644 index 0000000000..8551c62dd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gnucommerce-24f4d698ab0a491686fe5ba91eade3a1.yaml @@ -0,0 +1,58 @@ +id: gnucommerce-24f4d698ab0a491686fe5ba91eade3a1 + +info: + name: > + GNUCommerce < 0.5.7-BETA - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5e6817c-02e7-4d28-9446-c316a9ff8cbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gnucommerce/" + google-query: inurl:"/wp-content/plugins/gnucommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gnucommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gnucommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gnucommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.7-beta') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gnucommerce-3151dcfef62c493c56c6489173f8c7fe.yaml b/nuclei-templates/cve-less/plugins/gnucommerce-3151dcfef62c493c56c6489173f8c7fe.yaml new file mode 100644 index 0000000000..c24029985f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gnucommerce-3151dcfef62c493c56c6489173f8c7fe.yaml @@ -0,0 +1,58 @@ +id: gnucommerce-3151dcfef62c493c56c6489173f8c7fe + +info: + name: > + GNUCommerce < 1.4.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bbdbd0f-19cc-4a1e-9167-fbdb6d45ffbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gnucommerce/" + google-query: inurl:"/wp-content/plugins/gnucommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gnucommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gnucommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gnucommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/go-fetch-jobs-jobengine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/go-fetch-jobs-jobengine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..436e534a76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/go-fetch-jobs-jobengine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: go-fetch-jobs-jobengine-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/go-fetch-jobs-jobengine/" + google-query: inurl:"/wp-content/plugins/go-fetch-jobs-jobengine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,go-fetch-jobs-jobengine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/go-fetch-jobs-jobengine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "go-fetch-jobs-jobengine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/go-fetch-jobs-wp-job-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/go-fetch-jobs-wp-job-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e058ef0dd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/go-fetch-jobs-wp-job-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: go-fetch-jobs-wp-job-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/go-fetch-jobs-wp-job-manager/" + google-query: inurl:"/wp-content/plugins/go-fetch-jobs-wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,go-fetch-jobs-wp-job-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/go-fetch-jobs-wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "go-fetch-jobs-wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/go-viral-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/go-viral-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7009b59f14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/go-viral-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: go-viral-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/go-viral/" + google-query: inurl:"/wp-content/plugins/go-viral/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,go-viral,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/go-viral/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "go-viral" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/go_pricing-6b34c883ba2362a8ae8903a4773f143d.yaml b/nuclei-templates/cve-less/plugins/go_pricing-6b34c883ba2362a8ae8903a4773f143d.yaml new file mode 100644 index 0000000000..b130b7eaee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/go_pricing-6b34c883ba2362a8ae8903a4773f143d.yaml @@ -0,0 +1,58 @@ +id: go_pricing-6b34c883ba2362a8ae8903a4773f143d + +info: + name: > + Go Pricing - WordPress Responsive Pricing Tables <= 3.3.19 - Improper Authorization to Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/477c6fa2-16a8-4461-b4d4-d087e13e3ca7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/go_pricing/" + google-query: inurl:"/wp-content/plugins/go_pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,go_pricing,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/go_pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "go_pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/go_pricing-b5e2905f3fa25ed5a268cff184f71b6b.yaml b/nuclei-templates/cve-less/plugins/go_pricing-b5e2905f3fa25ed5a268cff184f71b6b.yaml new file mode 100644 index 0000000000..ea61eec7b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/go_pricing-b5e2905f3fa25ed5a268cff184f71b6b.yaml @@ -0,0 +1,58 @@ +id: go_pricing-b5e2905f3fa25ed5a268cff184f71b6b + +info: + name: > + Go Pricing - WordPress Responsive Pricing Tables <= 3.3.19 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c3d4c96-63a7-4f3b-a9ac-095be241f840?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/go_pricing/" + google-query: inurl:"/wp-content/plugins/go_pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,go_pricing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/go_pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "go_pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/go_pricing-c0501d6ec7222ce135cf1060e0209955.yaml b/nuclei-templates/cve-less/plugins/go_pricing-c0501d6ec7222ce135cf1060e0209955.yaml new file mode 100644 index 0000000000..f85317ee2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/go_pricing-c0501d6ec7222ce135cf1060e0209955.yaml @@ -0,0 +1,58 @@ +id: go_pricing-c0501d6ec7222ce135cf1060e0209955 + +info: + name: > + Go Pricing - WordPress Responsive Pricing Tables <= 3.3.19 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7686b11-97a8-4f09-bbfa-d77120cc35b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/go_pricing/" + google-query: inurl:"/wp-content/plugins/go_pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,go_pricing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/go_pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "go_pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/go_pricing-d934ac1748b53a01cebaf8d5ba82ca90.yaml b/nuclei-templates/cve-less/plugins/go_pricing-d934ac1748b53a01cebaf8d5ba82ca90.yaml new file mode 100644 index 0000000000..8e63a8de16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/go_pricing-d934ac1748b53a01cebaf8d5ba82ca90.yaml @@ -0,0 +1,58 @@ +id: go_pricing-d934ac1748b53a01cebaf8d5ba82ca90 + +info: + name: > + Go Pricing - WordPress Responsive Pricing Tables <= 3.3.19 - Missing Authorization to Limited Privilege Granting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5779914a-a168-4835-8aea-e0ab2b3be4f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/go_pricing/" + google-query: inurl:"/wp-content/plugins/go_pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,go_pricing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/go_pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "go_pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gocodes-613714f5c2e87c49430822b55db25b79.yaml b/nuclei-templates/cve-less/plugins/gocodes-613714f5c2e87c49430822b55db25b79.yaml new file mode 100644 index 0000000000..a79a49d41a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gocodes-613714f5c2e87c49430822b55db25b79.yaml @@ -0,0 +1,58 @@ +id: gocodes-613714f5c2e87c49430822b55db25b79 + +info: + name: > + GoCodes <= 1.3.5 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92c88e7f-9393-4e44-8a1d-314f6560bf63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gocodes/" + google-query: inurl:"/wp-content/plugins/gocodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gocodes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gocodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gocodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gocodes-e2b3a3b43a72a2751316fff54c8d6a22.yaml b/nuclei-templates/cve-less/plugins/gocodes-e2b3a3b43a72a2751316fff54c8d6a22.yaml new file mode 100644 index 0000000000..daf2d6371a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gocodes-e2b3a3b43a72a2751316fff54c8d6a22.yaml @@ -0,0 +1,58 @@ +id: gocodes-e2b3a3b43a72a2751316fff54c8d6a22 + +info: + name: > + GoCodes <= 1.3.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f6683c7-182a-4cd9-be6e-9832f01c3c71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gocodes/" + google-query: inurl:"/wp-content/plugins/gocodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gocodes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gocodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gocodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/godaddy-email-marketing-sign-up-forms-e6ae143c6a0d21493b73e68beda81a51.yaml b/nuclei-templates/cve-less/plugins/godaddy-email-marketing-sign-up-forms-e6ae143c6a0d21493b73e68beda81a51.yaml new file mode 100644 index 0000000000..85815611be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/godaddy-email-marketing-sign-up-forms-e6ae143c6a0d21493b73e68beda81a51.yaml @@ -0,0 +1,58 @@ +id: godaddy-email-marketing-sign-up-forms-e6ae143c6a0d21493b73e68beda81a51 + +info: + name: > + GoDaddy Email Marketing <= 1.4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8d9d19e-a080-40e9-8a71-01888393f618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/godaddy-email-marketing-sign-up-forms/" + google-query: inurl:"/wp-content/plugins/godaddy-email-marketing-sign-up-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,godaddy-email-marketing-sign-up-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/godaddy-email-marketing-sign-up-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "godaddy-email-marketing-sign-up-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/godaddy-email-marketing-sign-up-forms-f63791a8b82a8db6f6f51f822aa27ea8.yaml b/nuclei-templates/cve-less/plugins/godaddy-email-marketing-sign-up-forms-f63791a8b82a8db6f6f51f822aa27ea8.yaml new file mode 100644 index 0000000000..50a19eaa9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/godaddy-email-marketing-sign-up-forms-f63791a8b82a8db6f6f51f822aa27ea8.yaml @@ -0,0 +1,58 @@ +id: godaddy-email-marketing-sign-up-forms-f63791a8b82a8db6f6f51f822aa27ea8 + +info: + name: > + GoDaddy Email Marketing < 1.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfb53b61-f476-4b92-b87a-de10e18428a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/godaddy-email-marketing-sign-up-forms/" + google-query: inurl:"/wp-content/plugins/godaddy-email-marketing-sign-up-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,godaddy-email-marketing-sign-up-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/godaddy-email-marketing-sign-up-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "godaddy-email-marketing-sign-up-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gold-price-chart-widget-af9b404439d9589515c5ec4e6d7f1ef0.yaml b/nuclei-templates/cve-less/plugins/gold-price-chart-widget-af9b404439d9589515c5ec4e6d7f1ef0.yaml new file mode 100644 index 0000000000..21162c4448 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gold-price-chart-widget-af9b404439d9589515c5ec4e6d7f1ef0.yaml @@ -0,0 +1,58 @@ +id: gold-price-chart-widget-af9b404439d9589515c5ec4e6d7f1ef0 + +info: + name: > + Live Gold Price & Silver Price Charts Widgets <= 2.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c53ebf2f-44ab-4d0f-ac3d-c08806c07343?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gold-price-chart-widget/" + google-query: inurl:"/wp-content/plugins/gold-price-chart-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gold-price-chart-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gold-price-chart-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gold-price-chart-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/good-bad-comments-50f3d46f270e4758bbe32a2e3166c5bc.yaml b/nuclei-templates/cve-less/plugins/good-bad-comments-50f3d46f270e4758bbe32a2e3166c5bc.yaml new file mode 100644 index 0000000000..d3e327f37e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/good-bad-comments-50f3d46f270e4758bbe32a2e3166c5bc.yaml @@ -0,0 +1,58 @@ +id: good-bad-comments-50f3d46f270e4758bbe32a2e3166c5bc + +info: + name: > + Good & Bad Comments <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8546d5d-3ac0-4eb6-9502-07f2590a943b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/good-bad-comments/" + google-query: inurl:"/wp-content/plugins/good-bad-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,good-bad-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/good-bad-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "good-bad-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/good-reviews-wp-600afe426493b29bf5509da4cbb82add.yaml b/nuclei-templates/cve-less/plugins/good-reviews-wp-600afe426493b29bf5509da4cbb82add.yaml new file mode 100644 index 0000000000..92bcf3e5bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/good-reviews-wp-600afe426493b29bf5509da4cbb82add.yaml @@ -0,0 +1,58 @@ +id: good-reviews-wp-600afe426493b29bf5509da4cbb82add + +info: + name: > + Five Star Restaurant Reviews <= 2.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Review URL + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fe44e46-dfbf-4286-889c-606280d62218?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/good-reviews-wp/" + google-query: inurl:"/wp-content/plugins/good-reviews-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,good-reviews-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/good-reviews-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "good-reviews-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/goodbarber-59bc60dbb95a640744a1b35b77853c09.yaml b/nuclei-templates/cve-less/plugins/goodbarber-59bc60dbb95a640744a1b35b77853c09.yaml new file mode 100644 index 0000000000..12a47b77cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/goodbarber-59bc60dbb95a640744a1b35b77853c09.yaml @@ -0,0 +1,58 @@ +id: goodbarber-59bc60dbb95a640744a1b35b77853c09 + +info: + name: > + GoodBarber <= 1.0.23 - Cross-Site Request Forgery via admin_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57774f93-e6c0-46e6-8019-eab00b2b48ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/goodbarber/" + google-query: inurl:"/wp-content/plugins/goodbarber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,goodbarber,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/goodbarber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goodbarber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/goodlms-29cf41f615f87d85b5f82475c8720a9f.yaml b/nuclei-templates/cve-less/plugins/goodlms-29cf41f615f87d85b5f82475c8720a9f.yaml new file mode 100644 index 0000000000..17b0f0e31b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/goodlms-29cf41f615f87d85b5f82475c8720a9f.yaml @@ -0,0 +1,58 @@ +id: goodlms-29cf41f615f87d85b5f82475c8720a9f + +info: + name: > + Good LMS <= 2.1.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6629e1a9-3b28-4c8c-95d4-3c0011a7364a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/goodlms/" + google-query: inurl:"/wp-content/plugins/goodlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,goodlms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/goodlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goodlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/goodnews5-cf8879fce150bfeedade2a46a11300d9.yaml b/nuclei-templates/cve-less/plugins/goodnews5-cf8879fce150bfeedade2a46a11300d9.yaml new file mode 100644 index 0000000000..0084e1d89d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/goodnews5-cf8879fce150bfeedade2a46a11300d9.yaml @@ -0,0 +1,58 @@ +id: goodnews5-cf8879fce150bfeedade2a46a11300d9 + +info: + name: > + Goodnews – Responsive WordPress News/Magazine | News / Editorial <= 5.11.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e903c6-36f1-45cb-8164-23a8d1ca3966?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/goodnews5/" + google-query: inurl:"/wp-content/plugins/goodnews5/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,goodnews5,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/goodnews5/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goodnews5" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/goods-catalog-5354899032ab4aab5f7e436527798ae7.yaml b/nuclei-templates/cve-less/plugins/goods-catalog-5354899032ab4aab5f7e436527798ae7.yaml new file mode 100644 index 0000000000..3b7653ed85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/goods-catalog-5354899032ab4aab5f7e436527798ae7.yaml @@ -0,0 +1,58 @@ +id: goods-catalog-5354899032ab4aab5f7e436527798ae7 + +info: + name: > + Goods Catalog <= 2.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21542a9e-efa2-4655-b076-d282e3678fdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/goods-catalog/" + google-query: inurl:"/wp-content/plugins/goods-catalog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,goods-catalog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/goods-catalog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goods-catalog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-adsense-and-hotel-booking-9de4f56ad1c8638320783f6629c2489f.yaml b/nuclei-templates/cve-less/plugins/google-adsense-and-hotel-booking-9de4f56ad1c8638320783f6629c2489f.yaml new file mode 100644 index 0000000000..3d2a5f7467 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-adsense-and-hotel-booking-9de4f56ad1c8638320783f6629c2489f.yaml @@ -0,0 +1,58 @@ +id: google-adsense-and-hotel-booking-9de4f56ad1c8638320783f6629c2489f + +info: + name: > + Google Adsense and Hotel Booking <= 1.05 - Open Proxy + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97416640-c076-4f5e-9119-adbca2fcc495?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-adsense-and-hotel-booking/" + google-query: inurl:"/wp-content/plugins/google-adsense-and-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-adsense-and-hotel-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-adsense-and-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-adsense-and-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analyticator-0d1a8a5f1814698e05f7c343a752da34.yaml b/nuclei-templates/cve-less/plugins/google-analyticator-0d1a8a5f1814698e05f7c343a752da34.yaml new file mode 100644 index 0000000000..ea6591182d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analyticator-0d1a8a5f1814698e05f7c343a752da34.yaml @@ -0,0 +1,58 @@ +id: google-analyticator-0d1a8a5f1814698e05f7c343a752da34 + +info: + name: > + Google Analyticator <= 5.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a0ce4fa-24d7-4c41-a003-999ff9f45a42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analyticator/" + google-query: inurl:"/wp-content/plugins/google-analyticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analyticator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analyticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analyticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analyticator-43b0481b51b9c335093961e5a3ab3d80.yaml b/nuclei-templates/cve-less/plugins/google-analyticator-43b0481b51b9c335093961e5a3ab3d80.yaml new file mode 100644 index 0000000000..7433ba0303 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analyticator-43b0481b51b9c335093961e5a3ab3d80.yaml @@ -0,0 +1,58 @@ +id: google-analyticator-43b0481b51b9c335093961e5a3ab3d80 + +info: + name: > + Google Analyticator <= 6.4.9.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c74ea5e-e25a-4b78-b04c-ed66992d4d80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analyticator/" + google-query: inurl:"/wp-content/plugins/google-analyticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analyticator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analyticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analyticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analyticator-b8c54b7d77df783a3aa06fe35c635411.yaml b/nuclei-templates/cve-less/plugins/google-analyticator-b8c54b7d77df783a3aa06fe35c635411.yaml new file mode 100644 index 0000000000..e7b1a7b77d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analyticator-b8c54b7d77df783a3aa06fe35c635411.yaml @@ -0,0 +1,58 @@ +id: google-analyticator-b8c54b7d77df783a3aa06fe35c635411 + +info: + name: > + Google Analyticator <= 6.5.5 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1523ba0-9cac-43e2-9441-4d02fbaaf705?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analyticator/" + google-query: inurl:"/wp-content/plugins/google-analyticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analyticator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analyticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analyticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analyticator-c101bbb0e470de09f2d621ebb65fb72c.yaml b/nuclei-templates/cve-less/plugins/google-analyticator-c101bbb0e470de09f2d621ebb65fb72c.yaml new file mode 100644 index 0000000000..0eab3091a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analyticator-c101bbb0e470de09f2d621ebb65fb72c.yaml @@ -0,0 +1,58 @@ +id: google-analyticator-c101bbb0e470de09f2d621ebb65fb72c + +info: + name: > + Google Analyticator <= 6.4.9.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fddf084-2be2-4359-b318-a483dee0bd4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analyticator/" + google-query: inurl:"/wp-content/plugins/google-analyticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analyticator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analyticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analyticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analyticator-d27196962105bff471a16f16aa617461.yaml b/nuclei-templates/cve-less/plugins/google-analyticator-d27196962105bff471a16f16aa617461.yaml new file mode 100644 index 0000000000..3c622920f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analyticator-d27196962105bff471a16f16aa617461.yaml @@ -0,0 +1,58 @@ +id: google-analyticator-d27196962105bff471a16f16aa617461 + +info: + name: > + Google Analyticator <= 6.5.5 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfcc3d8c-c36a-4994-aa79-99953d9adfc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analyticator/" + google-query: inurl:"/wp-content/plugins/google-analyticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analyticator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analyticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analyticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-dashboard-575dc6634917d2a883d4c89ee0a2b4b7.yaml b/nuclei-templates/cve-less/plugins/google-analytics-dashboard-575dc6634917d2a883d4c89ee0a2b4b7.yaml new file mode 100644 index 0000000000..71cf1325d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-dashboard-575dc6634917d2a883d4c89ee0a2b4b7.yaml @@ -0,0 +1,58 @@ +id: google-analytics-dashboard-575dc6634917d2a883d4c89ee0a2b4b7 + +info: + name: > + Google Analytics Dashboard <= 2.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c4797a6-43c1-4183-95ec-4e150a1d774a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-dashboard/" + google-query: inurl:"/wp-content/plugins/google-analytics-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-dashboard-for-wp-0afedca0afb43a5850c9c8a9aae6b215.yaml b/nuclei-templates/cve-less/plugins/google-analytics-dashboard-for-wp-0afedca0afb43a5850c9c8a9aae6b215.yaml new file mode 100644 index 0000000000..03586653c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-dashboard-for-wp-0afedca0afb43a5850c9c8a9aae6b215.yaml @@ -0,0 +1,58 @@ +id: google-analytics-dashboard-for-wp-0afedca0afb43a5850c9c8a9aae6b215 + +info: + name: > + ExactMetrics <= 7.12.0 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9456921-e56a-402f-a80a-fd5659b9aac6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-dashboard-for-wp/" + google-query: inurl:"/wp-content/plugins/google-analytics-dashboard-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-dashboard-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-dashboard-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-dashboard-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-dashboard-for-wp-9084030bbc61cd11a5b8832a564811a7.yaml b/nuclei-templates/cve-less/plugins/google-analytics-dashboard-for-wp-9084030bbc61cd11a5b8832a564811a7.yaml new file mode 100644 index 0000000000..6c53695b6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-dashboard-for-wp-9084030bbc61cd11a5b8832a564811a7.yaml @@ -0,0 +1,58 @@ +id: google-analytics-dashboard-for-wp-9084030bbc61cd11a5b8832a564811a7 + +info: + name: > + ExactMetrics <= 7.14.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/687c86af-915e-4028-910e-ab83bcd86a1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-dashboard-for-wp/" + google-query: inurl:"/wp-content/plugins/google-analytics-dashboard-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-dashboard-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-dashboard-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-dashboard-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.14.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-01178f6672a2045cbc07066e22c4b9ed.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-01178f6672a2045cbc07066e22c4b9ed.yaml new file mode 100644 index 0000000000..7d51e09d85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-01178f6672a2045cbc07066e22c4b9ed.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-01178f6672a2045cbc07066e22c4b9ed + +info: + name: > + MonsterInsights – Google Analytics Dashboard for WordPress <= 5.3.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e9dcedd-aa81-47c4-9fc5-cecc7bc394b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-49a596fa960c73e741b497015244d412.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-49a596fa960c73e741b497015244d412.yaml new file mode 100644 index 0000000000..21c38c8dbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-49a596fa960c73e741b497015244d412.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-49a596fa960c73e741b497015244d412 + +info: + name: > + Google Analytics by Monster Insights <= 8.14.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c87a80ad-27bf-404d-8adf-9acc91354515?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-4c07ee1f8d9ca7766b852300f804ffcc.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-4c07ee1f8d9ca7766b852300f804ffcc.yaml new file mode 100644 index 0000000000..d6d144187c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-4c07ee1f8d9ca7766b852300f804ffcc.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-4c07ee1f8d9ca7766b852300f804ffcc + +info: + name: > + MonsterInsights – Google Analytics Dashboard for WordPress <= 7.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/247f6b86-767b-479f-90d4-79345699dd59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-4db70895ddb744990c478a4f72d2b5cc.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-4db70895ddb744990c478a4f72d2b5cc.yaml new file mode 100644 index 0000000000..6a47e901cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-4db70895ddb744990c478a4f72d2b5cc.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-4db70895ddb744990c478a4f72d2b5cc + +info: + name: > + MonsterInsights - Google Analytics Dashboard for WordPress <= 5.4.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b6fa5c6-e9a9-45c6-a02b-3630d8ef130e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-5d2c8f0682b9df406ab0b4c99151d03e.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-5d2c8f0682b9df406ab0b4c99151d03e.yaml new file mode 100644 index 0000000000..9e0e0ee97b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-5d2c8f0682b9df406ab0b4c99151d03e.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-5d2c8f0682b9df406ab0b4c99151d03e + +info: + name: > + MonsterInsights <= 8.12.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e28daa5-cdbb-464c-99d5-09a924c01b41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-6589f8f5c2b9c61e1e02d46bf871ed81.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-6589f8f5c2b9c61e1e02d46bf871ed81.yaml new file mode 100644 index 0000000000..1c232b20f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-6589f8f5c2b9c61e1e02d46bf871ed81.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-6589f8f5c2b9c61e1e02d46bf871ed81 + +info: + name: > + Google Analytics by Monster Insights <= 8.21.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81099cdc-bce6-4ee6-b819-c3925acf96a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-728945e5b2000023cafe3f37e7d91f51.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-728945e5b2000023cafe3f37e7d91f51.yaml new file mode 100644 index 0000000000..b2db83a552 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-728945e5b2000023cafe3f37e7d91f51.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-728945e5b2000023cafe3f37e7d91f51 + +info: + name: > + MonsterInsights – Google Analytics Dashboard for WordPress <= 5.3.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a53a1178-7267-4d7f-ad9e-2906c05b8fe0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-76e9ddecba440119067c8918ef300454.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-76e9ddecba440119067c8918ef300454.yaml new file mode 100644 index 0000000000..eda94ba3a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-76e9ddecba440119067c8918ef300454.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-76e9ddecba440119067c8918ef300454 + +info: + name: > + MonsterInsights – Google Analytics Dashboard for WordPress (Website Stats Made Easy) <= 5.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c40773d-3a2f-46b6-861e-608d662250da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-89e45ac29496786a2f26bbad510d04b9.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-89e45ac29496786a2f26bbad510d04b9.yaml new file mode 100644 index 0000000000..44915a6f86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-89e45ac29496786a2f26bbad510d04b9.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-89e45ac29496786a2f26bbad510d04b9 + +info: + name: > + MonsterInsights <= 8.9.0 - Unauthenticated Stored Cross-Site Scripting via Google Analytics + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0388853e-4bf8-4627-876a-b842e7016de3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-d4b13be2a36ff961aada7107a748559a.yaml b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-d4b13be2a36ff961aada7107a748559a.yaml new file mode 100644 index 0000000000..e943d56d77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-for-wordpress-d4b13be2a36ff961aada7107a748559a.yaml @@ -0,0 +1,58 @@ +id: google-analytics-for-wordpress-d4b13be2a36ff961aada7107a748559a + +info: + name: > + MonsterInsights – Google Analytics Dashboard for WordPress (Website Stats Made Easy) <= 5.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5178f7ee-d7e3-4cd1-8cc2-121d217e66fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" + google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-mu-1622f7025c888065199677a7f8c3a0a4.yaml b/nuclei-templates/cve-less/plugins/google-analytics-mu-1622f7025c888065199677a7f8c3a0a4.yaml new file mode 100644 index 0000000000..cf640f8cb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-mu-1622f7025c888065199677a7f8c3a0a4.yaml @@ -0,0 +1,58 @@ +id: google-analytics-mu-1622f7025c888065199677a7f8c3a0a4 + +info: + name: > + Google Analytics MU < 2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66f71de2-055d-42f0-9eb1-145c64f44d5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-mu/" + google-query: inurl:"/wp-content/plugins/google-analytics-mu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-mu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-mu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-mu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-opt-out-7173b1dd80c7cb39c8dbdccb921d11e8.yaml b/nuclei-templates/cve-less/plugins/google-analytics-opt-out-7173b1dd80c7cb39c8dbdccb921d11e8.yaml new file mode 100644 index 0000000000..f9d2bdf2d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-opt-out-7173b1dd80c7cb39c8dbdccb921d11e8.yaml @@ -0,0 +1,58 @@ +id: google-analytics-opt-out-7173b1dd80c7cb39c8dbdccb921d11e8 + +info: + name: > + Google Analytics Opt-Out <= 2.3.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a90ea845-9f7f-4a89-887d-cf4337f8471f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-opt-out/" + google-query: inurl:"/wp-content/plugins/google-analytics-opt-out/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-opt-out,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-opt-out/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-opt-out" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-premium-c8bc852e0f629926f8c3b976dbc68f47.yaml b/nuclei-templates/cve-less/plugins/google-analytics-premium-c8bc852e0f629926f8c3b976dbc68f47.yaml new file mode 100644 index 0000000000..5e92eac9b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-premium-c8bc852e0f629926f8c3b976dbc68f47.yaml @@ -0,0 +1,58 @@ +id: google-analytics-premium-c8bc852e0f629926f8c3b976dbc68f47 + +info: + name: > + MonsterInsights Pro <= 8.14.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72c5d1b1-00bf-4352-b885-a8a7875c2bc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-premium/" + google-query: inurl:"/wp-content/plugins/google-analytics-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.14.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-analytics-top-posts-widget-6bd671fcc5c9744eb02b51b3543e258d.yaml b/nuclei-templates/cve-less/plugins/google-analytics-top-posts-widget-6bd671fcc5c9744eb02b51b3543e258d.yaml new file mode 100644 index 0000000000..7935e9c8b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-analytics-top-posts-widget-6bd671fcc5c9744eb02b51b3543e258d.yaml @@ -0,0 +1,58 @@ +id: google-analytics-top-posts-widget-6bd671fcc5c9744eb02b51b3543e258d + +info: + name: > + Google Analytics Top Content Widget <= 1.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4522480a-dfbf-4ff4-93c2-68b8cc15367c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-analytics-top-posts-widget/" + google-query: inurl:"/wp-content/plugins/google-analytics-top-posts-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-analytics-top-posts-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-analytics-top-posts-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-analytics-top-posts-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-apps-login-a6981c5b5578853614f986e96039441b.yaml b/nuclei-templates/cve-less/plugins/google-apps-login-a6981c5b5578853614f986e96039441b.yaml new file mode 100644 index 0000000000..0bfcbae37d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-apps-login-a6981c5b5578853614f986e96039441b.yaml @@ -0,0 +1,58 @@ +id: google-apps-login-a6981c5b5578853614f986e96039441b + +info: + name: > + Google Apps Login <= 3.4.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08ffb478-7280-4fbc-bc5f-482c1348091e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-apps-login/" + google-query: inurl:"/wp-content/plugins/google-apps-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-apps-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-apps-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-apps-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-authenticator-b920d1982fb42696fbafb9ceffabe1a9.yaml b/nuclei-templates/cve-less/plugins/google-authenticator-b920d1982fb42696fbafb9ceffabe1a9.yaml new file mode 100644 index 0000000000..c76d29ce3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-authenticator-b920d1982fb42696fbafb9ceffabe1a9.yaml @@ -0,0 +1,58 @@ +id: google-authenticator-b920d1982fb42696fbafb9ceffabe1a9 + +info: + name: > + Google Authenticator <= 0.47 - Improper Authentication + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3bbc23b-94af-4f4f-8b5f-6af41108fd93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-authenticator/" + google-query: inurl:"/wp-content/plugins/google-authenticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-authenticator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-authenticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-authenticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.47') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-calendar-events-1dfb76723d09fb5ee2cf36729147fd09.yaml b/nuclei-templates/cve-less/plugins/google-calendar-events-1dfb76723d09fb5ee2cf36729147fd09.yaml new file mode 100644 index 0000000000..db6ce47b73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-calendar-events-1dfb76723d09fb5ee2cf36729147fd09.yaml @@ -0,0 +1,58 @@ +id: google-calendar-events-1dfb76723d09fb5ee2cf36729147fd09 + +info: + name: > + Google Calendar Events <= 3.2.5 - Cross-Site Request Forgery via bulk_actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1218ed3b-badc-464e-adbc-76fb4f6af008?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-calendar-events/" + google-query: inurl:"/wp-content/plugins/google-calendar-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-calendar-events,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-calendar-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-calendar-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-calendar-events-553b08020eb3e25f2e938865afb49062.yaml b/nuclei-templates/cve-less/plugins/google-calendar-events-553b08020eb3e25f2e938865afb49062.yaml new file mode 100644 index 0000000000..3e50fec063 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-calendar-events-553b08020eb3e25f2e938865afb49062.yaml @@ -0,0 +1,58 @@ +id: google-calendar-events-553b08020eb3e25f2e938865afb49062 + +info: + name: > + Simple Calendar <= 3.2.4 - Cross-Site Request Forgery via duplicate_feed + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38adede2-73ca-470c-8ace-4f5bbec51d28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-calendar-events/" + google-query: inurl:"/wp-content/plugins/google-calendar-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-calendar-events,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-calendar-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-calendar-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-calendar-events-da47dd8f1298c3b7dee167384f30a8a6.yaml b/nuclei-templates/cve-less/plugins/google-calendar-events-da47dd8f1298c3b7dee167384f30a8a6.yaml new file mode 100644 index 0000000000..c854164351 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-calendar-events-da47dd8f1298c3b7dee167384f30a8a6.yaml @@ -0,0 +1,58 @@ +id: google-calendar-events-da47dd8f1298c3b7dee167384f30a8a6 + +info: + name: > + Simple Calendar – Google Calendar Plugin < 2.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31dcf302-9334-476c-a0e2-d8a31bcbbe5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-calendar-events/" + google-query: inurl:"/wp-content/plugins/google-calendar-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-calendar-events,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-calendar-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-calendar-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-calendar-events-f9c0cef6c82321c823029b4f47ad6ec5.yaml b/nuclei-templates/cve-less/plugins/google-calendar-events-f9c0cef6c82321c823029b4f47ad6ec5.yaml new file mode 100644 index 0000000000..e8310129b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-calendar-events-f9c0cef6c82321c823029b4f47ad6ec5.yaml @@ -0,0 +1,58 @@ +id: google-calendar-events-f9c0cef6c82321c823029b4f47ad6ec5 + +info: + name: > + Simple Calendar <= 3.1.42 - Cross-Site Request Forgery to Transient Cache Clearing + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/248b74d3-5228-473d-a79a-743566898606?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-calendar-events/" + google-query: inurl:"/wp-content/plugins/google-calendar-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-calendar-events,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-calendar-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-calendar-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-calendar-events-fc53f712d57ef35888a981283b03a790.yaml b/nuclei-templates/cve-less/plugins/google-calendar-events-fc53f712d57ef35888a981283b03a790.yaml new file mode 100644 index 0000000000..b06d36cc72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-calendar-events-fc53f712d57ef35888a981283b03a790.yaml @@ -0,0 +1,58 @@ +id: google-calendar-events-fc53f712d57ef35888a981283b03a790 + +info: + name: > + Google Calendar Events <= 3.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c04d19fb-57b3-4361-bad3-eed98f693939?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-calendar-events/" + google-query: inurl:"/wp-content/plugins/google-calendar-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-calendar-events,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-calendar-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-calendar-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-captcha-598cb96d3fc3853eb8776df6e751f4a4.yaml b/nuclei-templates/cve-less/plugins/google-captcha-598cb96d3fc3853eb8776df6e751f4a4.yaml new file mode 100644 index 0000000000..ac7afd1c33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-captcha-598cb96d3fc3853eb8776df6e751f4a4.yaml @@ -0,0 +1,58 @@ +id: google-captcha-598cb96d3fc3853eb8776df6e751f4a4 + +info: + name: > + reCaptcha by BestWebSoft < 1.28 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/169f2767-da20-4199-9997-438a62f6aee4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-captcha/" + google-query: inurl:"/wp-content/plugins/google-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-captcha-6bc609f0d38e102f4943d0a60410cf7f.yaml b/nuclei-templates/cve-less/plugins/google-captcha-6bc609f0d38e102f4943d0a60410cf7f.yaml new file mode 100644 index 0000000000..a63ac92894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-captcha-6bc609f0d38e102f4943d0a60410cf7f.yaml @@ -0,0 +1,58 @@ +id: google-captcha-6bc609f0d38e102f4943d0a60410cf7f + +info: + name: > + reCaptcha by BestWebSoft <= 1.12 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35df1ab9-58c1-4270-96ef-bbb2c7ac7af6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-captcha/" + google-query: inurl:"/wp-content/plugins/google-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-captcha,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-document-embedder-0058c9636ab9a993ffe8aa9657a05d60.yaml b/nuclei-templates/cve-less/plugins/google-document-embedder-0058c9636ab9a993ffe8aa9657a05d60.yaml new file mode 100644 index 0000000000..ddc15f66ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-document-embedder-0058c9636ab9a993ffe8aa9657a05d60.yaml @@ -0,0 +1,58 @@ +id: google-document-embedder-0058c9636ab9a993ffe8aa9657a05d60 + +info: + name: > + Google Doc Embedder <= 2.5.18 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2e80e6f-08e7-426b-9797-97483c3dc410?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-document-embedder/" + google-query: inurl:"/wp-content/plugins/google-document-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-document-embedder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-document-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-document-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-document-embedder-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml b/nuclei-templates/cve-less/plugins/google-document-embedder-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml new file mode 100644 index 0000000000..093e45879d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-document-embedder-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml @@ -0,0 +1,58 @@ +id: google-document-embedder-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c + +info: + name: > + Google Doc Embedder <= 2.6.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/872a6264-f0e2-4936-a942-172a99892672?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-document-embedder/" + google-query: inurl:"/wp-content/plugins/google-document-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-document-embedder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-document-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-document-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-document-embedder-0e4cfd2e84d3d4a0dcd341ba876cfae7.yaml b/nuclei-templates/cve-less/plugins/google-document-embedder-0e4cfd2e84d3d4a0dcd341ba876cfae7.yaml new file mode 100644 index 0000000000..edcc77639a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-document-embedder-0e4cfd2e84d3d4a0dcd341ba876cfae7.yaml @@ -0,0 +1,58 @@ +id: google-document-embedder-0e4cfd2e84d3d4a0dcd341ba876cfae7 + +info: + name: > + Google Doc Embedder < 2.5.4 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/982817f8-c85c-4e25-a33a-6fbf3ab06808?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-document-embedder/" + google-query: inurl:"/wp-content/plugins/google-document-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-document-embedder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-document-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-document-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-document-embedder-4201a049c4e3da0f1f472f8fab792578.yaml b/nuclei-templates/cve-less/plugins/google-document-embedder-4201a049c4e3da0f1f472f8fab792578.yaml new file mode 100644 index 0000000000..52bf698925 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-document-embedder-4201a049c4e3da0f1f472f8fab792578.yaml @@ -0,0 +1,58 @@ +id: google-document-embedder-4201a049c4e3da0f1f472f8fab792578 + +info: + name: > + Google Doc Embedder <= 2.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aaf9bb4-bafe-415f-923d-041ef80cabac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-document-embedder/" + google-query: inurl:"/wp-content/plugins/google-document-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-document-embedder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-document-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-document-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-document-embedder-96e3c232ce32c0e385509a8011930dfa.yaml b/nuclei-templates/cve-less/plugins/google-document-embedder-96e3c232ce32c0e385509a8011930dfa.yaml new file mode 100644 index 0000000000..93864f621a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-document-embedder-96e3c232ce32c0e385509a8011930dfa.yaml @@ -0,0 +1,58 @@ +id: google-document-embedder-96e3c232ce32c0e385509a8011930dfa + +info: + name: > + Google Doc Embedder <= 2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8f6d1cb-330b-4405-9249-4dd1c0e98922?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-document-embedder/" + google-query: inurl:"/wp-content/plugins/google-document-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-document-embedder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-document-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-document-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-document-embedder-cc3e06da44808e338c8d593b5ba332ad.yaml b/nuclei-templates/cve-less/plugins/google-document-embedder-cc3e06da44808e338c8d593b5ba332ad.yaml new file mode 100644 index 0000000000..7f786efde8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-document-embedder-cc3e06da44808e338c8d593b5ba332ad.yaml @@ -0,0 +1,58 @@ +id: google-document-embedder-cc3e06da44808e338c8d593b5ba332ad + +info: + name: > + Google Doc Embedder <= 2.6.4 - Authenticated (Contributor+) Blind Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75e55138-b091-4113-89da-e1ca45fb99ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-document-embedder/" + google-query: inurl:"/wp-content/plugins/google-document-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-document-embedder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-document-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-document-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-document-embedder-fdf6e35f0fe8eb69bf51476cf88fe9b7.yaml b/nuclei-templates/cve-less/plugins/google-document-embedder-fdf6e35f0fe8eb69bf51476cf88fe9b7.yaml new file mode 100644 index 0000000000..2c1ea30e96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-document-embedder-fdf6e35f0fe8eb69bf51476cf88fe9b7.yaml @@ -0,0 +1,58 @@ +id: google-document-embedder-fdf6e35f0fe8eb69bf51476cf88fe9b7 + +info: + name: > + Google Doc Embedder < 2.5.17 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/146c8783-ba59-41da-9e95-7401865b7b8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-document-embedder/" + google-query: inurl:"/wp-content/plugins/google-document-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-document-embedder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-document-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-document-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-image-sitemap-533a62c8ac6b0ab46c7891e8ab20865e.yaml b/nuclei-templates/cve-less/plugins/google-image-sitemap-533a62c8ac6b0ab46c7891e8ab20865e.yaml new file mode 100644 index 0000000000..8b0422b014 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-image-sitemap-533a62c8ac6b0ab46c7891e8ab20865e.yaml @@ -0,0 +1,58 @@ +id: google-image-sitemap-533a62c8ac6b0ab46c7891e8ab20865e + +info: + name: > + Google XML Sitemap for Images <= 2.1.3 - Cross-Site Request Forgery via image_sitemap_generate + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1165c68d-3da4-45f3-b054-4904e54d18ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-image-sitemap/" + google-query: inurl:"/wp-content/plugins/google-image-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-image-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-image-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-image-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-language-translator-18429af9c071c8309e034a7d4d00a8e6.yaml b/nuclei-templates/cve-less/plugins/google-language-translator-18429af9c071c8309e034a7d4d00a8e6.yaml new file mode 100644 index 0000000000..f0dc640e51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-language-translator-18429af9c071c8309e034a7d4d00a8e6.yaml @@ -0,0 +1,58 @@ +id: google-language-translator-18429af9c071c8309e034a7d4d00a8e6 + +info: + name: > + Google Language Translator <= 6.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa2bd74a-563a-4a2d-b1d7-b3678db82b00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-language-translator/" + google-query: inurl:"/wp-content/plugins/google-language-translator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-language-translator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-language-translator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-language-translator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-language-translator-1cc23bdae3a780fc80463f59518007e6.yaml b/nuclei-templates/cve-less/plugins/google-language-translator-1cc23bdae3a780fc80463f59518007e6.yaml new file mode 100644 index 0000000000..3e7acd51d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-language-translator-1cc23bdae3a780fc80463f59518007e6.yaml @@ -0,0 +1,58 @@ +id: google-language-translator-1cc23bdae3a780fc80463f59518007e6 + +info: + name: > + Google Language Translator <= 6.0.19 - Missing Authorization via admin notifications + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91e7e93d-348b-40d7-b803-5dbd7c6a684a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-language-translator/" + google-query: inurl:"/wp-content/plugins/google-language-translator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-language-translator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-language-translator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-language-translator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-language-translator-202ca74fdc1ed676814ee60bc8ef09cc.yaml b/nuclei-templates/cve-less/plugins/google-language-translator-202ca74fdc1ed676814ee60bc8ef09cc.yaml new file mode 100644 index 0000000000..e6e62ebcda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-language-translator-202ca74fdc1ed676814ee60bc8ef09cc.yaml @@ -0,0 +1,58 @@ +id: google-language-translator-202ca74fdc1ed676814ee60bc8ef09cc + +info: + name: > + Google Language Translator <= 6.0.20 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec894433-53c8-4d04-bb8a-92c66cbd2ce7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-language-translator/" + google-query: inurl:"/wp-content/plugins/google-language-translator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-language-translator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-language-translator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-language-translator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-language-translator-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml b/nuclei-templates/cve-less/plugins/google-language-translator-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml new file mode 100644 index 0000000000..a7dc007731 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-language-translator-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml @@ -0,0 +1,58 @@ +id: google-language-translator-a6e38c48f14b76ed761e5c6ec8e4f3ac + +info: + name: > + Google Language Translator <= 5.0.05 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68aba88f-e7f9-42d7-9dea-045e7fef7056?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-language-translator/" + google-query: inurl:"/wp-content/plugins/google-language-translator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-language-translator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-language-translator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-language-translator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-language-translator-b8c86f67e83059075ac727a634aa1bcf.yaml b/nuclei-templates/cve-less/plugins/google-language-translator-b8c86f67e83059075ac727a634aa1bcf.yaml new file mode 100644 index 0000000000..ee70d43782 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-language-translator-b8c86f67e83059075ac727a634aa1bcf.yaml @@ -0,0 +1,58 @@ +id: google-language-translator-b8c86f67e83059075ac727a634aa1bcf + +info: + name: > + Translate WordPress - Google Language Translator <= 6.0.11 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f862575-afd8-4e38-8780-40e86ad9b5da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-language-translator/" + google-query: inurl:"/wp-content/plugins/google-language-translator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-language-translator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-language-translator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-language-translator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-language-translator-c7a8789e2e14665dec08cabfa7ba8238.yaml b/nuclei-templates/cve-less/plugins/google-language-translator-c7a8789e2e14665dec08cabfa7ba8238.yaml new file mode 100644 index 0000000000..f27effc9e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-language-translator-c7a8789e2e14665dec08cabfa7ba8238.yaml @@ -0,0 +1,58 @@ +id: google-language-translator-c7a8789e2e14665dec08cabfa7ba8238 + +info: + name: > + Google Language Translator <= 6.0.9 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5653f1aa-06da-4208-afa2-19ef31b8be2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-language-translator/" + google-query: inurl:"/wp-content/plugins/google-language-translator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-language-translator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-language-translator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-language-translator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-language-translator-d02f0d7121f40075980c3a177c578c3f.yaml b/nuclei-templates/cve-less/plugins/google-language-translator-d02f0d7121f40075980c3a177c578c3f.yaml new file mode 100644 index 0000000000..587db66a29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-language-translator-d02f0d7121f40075980c3a177c578c3f.yaml @@ -0,0 +1,58 @@ +id: google-language-translator-d02f0d7121f40075980c3a177c578c3f + +info: + name: > + Translate WordPress with GTranslate <= 2.9.8 & Translate WordPress – Google Language Translator <= 6.0.13 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff21e539-8ba0-4edd-a90c-27a4cd1cdbc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-language-translator/" + google-query: inurl:"/wp-content/plugins/google-language-translator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-language-translator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-language-translator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-language-translator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-language-translator-e0be71e8989abd7e932a8db49d3c409c.yaml b/nuclei-templates/cve-less/plugins/google-language-translator-e0be71e8989abd7e932a8db49d3c409c.yaml new file mode 100644 index 0000000000..974458b47d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-language-translator-e0be71e8989abd7e932a8db49d3c409c.yaml @@ -0,0 +1,58 @@ +id: google-language-translator-e0be71e8989abd7e932a8db49d3c409c + +info: + name: > + Google Language Translator <= 4.0.9 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea3afa3c-9a88-4f91-a74a-04306639feb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-language-translator/" + google-query: inurl:"/wp-content/plugins/google-language-translator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-language-translator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-language-translator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-language-translator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-map-generator-6f56f1f427bde5f9933ce31042034bce.yaml b/nuclei-templates/cve-less/plugins/google-map-generator-6f56f1f427bde5f9933ce31042034bce.yaml new file mode 100644 index 0000000000..1540150a3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-map-generator-6f56f1f427bde5f9933ce31042034bce.yaml @@ -0,0 +1,58 @@ +id: google-map-generator-6f56f1f427bde5f9933ce31042034bce + +info: + name: > + Google Map Generator <= 1.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71130bae-d871-43b5-81cd-b8459c8db316?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-map-generator/" + google-query: inurl:"/wp-content/plugins/google-map-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-map-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-map-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-map-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-map-shortcode-4863dac3dc1435179890da283e476787.yaml b/nuclei-templates/cve-less/plugins/google-map-shortcode-4863dac3dc1435179890da283e476787.yaml new file mode 100644 index 0000000000..4dff5de626 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-map-shortcode-4863dac3dc1435179890da283e476787.yaml @@ -0,0 +1,58 @@ +id: google-map-shortcode-4863dac3dc1435179890da283e476787 + +info: + name: > + Google Map Shortcode <= 3.1.2 - Cross-Site Request Forgery to Plugin Setting Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3f05af5-35f5-4813-b8a3-bb90709af677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-map-shortcode/" + google-query: inurl:"/wp-content/plugins/google-map-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-map-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-map-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-map-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-map-shortcode-5a9c8ffeceece98dba6df9f5a0d59a78.yaml b/nuclei-templates/cve-less/plugins/google-map-shortcode-5a9c8ffeceece98dba6df9f5a0d59a78.yaml new file mode 100644 index 0000000000..c7a79edae2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-map-shortcode-5a9c8ffeceece98dba6df9f5a0d59a78.yaml @@ -0,0 +1,58 @@ +id: google-map-shortcode-5a9c8ffeceece98dba6df9f5a0d59a78 + +info: + name: > + Google Map Shortcode <= 3.1.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f6656e2-35f5-41d8-a330-7904c296ba29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-map-shortcode/" + google-query: inurl:"/wp-content/plugins/google-map-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-map-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-map-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-map-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-map-shortcode-95846903ce77a5ec41c1ed6e6284de3b.yaml b/nuclei-templates/cve-less/plugins/google-map-shortcode-95846903ce77a5ec41c1ed6e6284de3b.yaml new file mode 100644 index 0000000000..b197ea0097 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-map-shortcode-95846903ce77a5ec41c1ed6e6284de3b.yaml @@ -0,0 +1,58 @@ +id: google-map-shortcode-95846903ce77a5ec41c1ed6e6284de3b + +info: + name: > + Google Map Shortcode <= 3.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbd4983f-bf92-45c3-95a6-6f5e39bca228?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-map-shortcode/" + google-query: inurl:"/wp-content/plugins/google-map-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-map-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-map-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-map-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-map-wp-2d526bfd90ad711e245aa63d352c09e2.yaml b/nuclei-templates/cve-less/plugins/google-map-wp-2d526bfd90ad711e245aa63d352c09e2.yaml new file mode 100644 index 0000000000..de583e8501 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-map-wp-2d526bfd90ad711e245aa63d352c09e2.yaml @@ -0,0 +1,58 @@ +id: google-map-wp-2d526bfd90ad711e245aa63d352c09e2 + +info: + name: > + Google Map <= 2.2.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46b3f3fb-5bd5-4af4-a281-647ad0b8e992?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-map-wp/" + google-query: inurl:"/wp-content/plugins/google-map-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-map-wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-map-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-map-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-116826aae00eabc027157d14465768bc.yaml b/nuclei-templates/cve-less/plugins/google-maps-116826aae00eabc027157d14465768bc.yaml new file mode 100644 index 0000000000..bd8288c0a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-116826aae00eabc027157d14465768bc.yaml @@ -0,0 +1,58 @@ +id: google-maps-116826aae00eabc027157d14465768bc + +info: + name: > + Google Maps <= 2.1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cc96e83-28d9-4c6e-876f-23f1836ffd74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps/" + google-query: inurl:"/wp-content/plugins/google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-advanced-bad18eab263a0541b49dc3dae830d379.yaml b/nuclei-templates/cve-less/plugins/google-maps-advanced-bad18eab263a0541b49dc3dae830d379.yaml new file mode 100644 index 0000000000..89d2d29085 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-advanced-bad18eab263a0541b49dc3dae830d379.yaml @@ -0,0 +1,58 @@ +id: google-maps-advanced-bad18eab263a0541b49dc3dae830d379 + +info: + name: > + Inline Google Maps <= 5.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91aa1f4c-ace7-43a4-a9e6-82c15e00d0eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-advanced/" + google-query: inurl:"/wp-content/plugins/google-maps-advanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-advanced,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-advanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-advanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-anywhere-d6efc23acaa92418f6d5991825096389.yaml b/nuclei-templates/cve-less/plugins/google-maps-anywhere-d6efc23acaa92418f6d5991825096389.yaml new file mode 100644 index 0000000000..a9fa6311e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-anywhere-d6efc23acaa92418f6d5991825096389.yaml @@ -0,0 +1,58 @@ +id: google-maps-anywhere-d6efc23acaa92418f6d5991825096389 + +info: + name: > + Google Maps Anywhere <= 1.2.6.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dda8e76-22aa-400b-b4c1-b24e6e1141ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-anywhere/" + google-query: inurl:"/wp-content/plugins/google-maps-anywhere/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-anywhere,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-anywhere/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-anywhere" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-easy-066b2e83656aa18020e2e218de1f2a94.yaml b/nuclei-templates/cve-less/plugins/google-maps-easy-066b2e83656aa18020e2e218de1f2a94.yaml new file mode 100644 index 0000000000..ee4d2f3cc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-easy-066b2e83656aa18020e2e218de1f2a94.yaml @@ -0,0 +1,58 @@ +id: google-maps-easy-066b2e83656aa18020e2e218de1f2a94 + +info: + name: > + Easy Google Maps <= 1.11.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ca7b7c0-a94e-47ff-996d-4c7bbd62f0de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-easy/" + google-query: inurl:"/wp-content/plugins/google-maps-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-easy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-easy-071e46b1422bc01b590261a3c5a56383.yaml b/nuclei-templates/cve-less/plugins/google-maps-easy-071e46b1422bc01b590261a3c5a56383.yaml new file mode 100644 index 0000000000..131943e9b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-easy-071e46b1422bc01b590261a3c5a56383.yaml @@ -0,0 +1,58 @@ +id: google-maps-easy-071e46b1422bc01b590261a3c5a56383 + +info: + name: > + Google Maps Easy <= 1.9.33 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/586137a5-8758-400e-a66a-2382f8633578?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-easy/" + google-query: inurl:"/wp-content/plugins/google-maps-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-easy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-easy-8055046b14f7ace81067cd61a7af0ffb.yaml b/nuclei-templates/cve-less/plugins/google-maps-easy-8055046b14f7ace81067cd61a7af0ffb.yaml new file mode 100644 index 0000000000..4f3cc545e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-easy-8055046b14f7ace81067cd61a7af0ffb.yaml @@ -0,0 +1,58 @@ +id: google-maps-easy-8055046b14f7ace81067cd61a7af0ffb + +info: + name: > + Easy Google Maps <= 1.11.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee52c6c0-c69e-46c4-9e4b-94aa69c00737?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-easy/" + google-query: inurl:"/wp-content/plugins/google-maps-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-easy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-easy-c19921f21d9136f2954ea974f2d3b3d7.yaml b/nuclei-templates/cve-less/plugins/google-maps-easy-c19921f21d9136f2954ea974f2d3b3d7.yaml new file mode 100644 index 0000000000..303f2504ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-easy-c19921f21d9136f2954ea974f2d3b3d7.yaml @@ -0,0 +1,58 @@ +id: google-maps-easy-c19921f21d9136f2954ea974f2d3b3d7 + +info: + name: > + Easy Google Maps <= 1.9.31 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fe79ca5-2811-44eb-a340-a41383f9d42e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-easy/" + google-query: inurl:"/wp-content/plugins/google-maps-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-easy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-easy-f4c5da0c9249d69bad94272b808223ea.yaml b/nuclei-templates/cve-less/plugins/google-maps-easy-f4c5da0c9249d69bad94272b808223ea.yaml new file mode 100644 index 0000000000..c527c85582 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-easy-f4c5da0c9249d69bad94272b808223ea.yaml @@ -0,0 +1,58 @@ +id: google-maps-easy-f4c5da0c9249d69bad94272b808223ea + +info: + name: > + Easy Google Maps <= 1.11.7 - Cross-Site Request Forgery via AJAX action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ea4ca00-185b-4f5d-9c5c-f81ba4edad05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-easy/" + google-query: inurl:"/wp-content/plugins/google-maps-easy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-easy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-easy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-easy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-in-posts-ed62eec06fc25731ee3527890a026d6c.yaml b/nuclei-templates/cve-less/plugins/google-maps-in-posts-ed62eec06fc25731ee3527890a026d6c.yaml new file mode 100644 index 0000000000..7eb0d3585d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-in-posts-ed62eec06fc25731ee3527890a026d6c.yaml @@ -0,0 +1,58 @@ +id: google-maps-in-posts-ed62eec06fc25731ee3527890a026d6c + +info: + name: > + Google Maps in Posts <= 1.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5a827b1-7f66-4a24-9e31-c3f3e36b4772?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-in-posts/" + google-query: inurl:"/wp-content/plugins/google-maps-in-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-in-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-in-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-in-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-ready-42f393afcc63e1048ce48bee1feb1c00.yaml b/nuclei-templates/cve-less/plugins/google-maps-ready-42f393afcc63e1048ce48bee1feb1c00.yaml new file mode 100644 index 0000000000..3beabb7718 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-ready-42f393afcc63e1048ce48bee1feb1c00.yaml @@ -0,0 +1,58 @@ +id: google-maps-ready-42f393afcc63e1048ce48bee1feb1c00 + +info: + name: > + Ready! Google Maps <= 1.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db5764f7-3e5e-4a0f-8280-c851ccb7dbc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-ready/" + google-query: inurl:"/wp-content/plugins/google-maps-ready/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-ready,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-ready/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-ready" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-v3-shortcode-e258e8570aa5a2a07663517678c9341e.yaml b/nuclei-templates/cve-less/plugins/google-maps-v3-shortcode-e258e8570aa5a2a07663517678c9341e.yaml new file mode 100644 index 0000000000..160a2251bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-v3-shortcode-e258e8570aa5a2a07663517678c9341e.yaml @@ -0,0 +1,58 @@ +id: google-maps-v3-shortcode-e258e8570aa5a2a07663517678c9341e + +info: + name: > + Google Maps v3 Shortcode <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15123d5f-eb24-46e3-81ec-7dd4f108a42d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-v3-shortcode/" + google-query: inurl:"/wp-content/plugins/google-maps-v3-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-v3-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-v3-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-v3-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-widget-47ea06b51e4d84465dbdc7ce5332226e.yaml b/nuclei-templates/cve-less/plugins/google-maps-widget-47ea06b51e4d84465dbdc7ce5332226e.yaml new file mode 100644 index 0000000000..9c27ffa27f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-widget-47ea06b51e4d84465dbdc7ce5332226e.yaml @@ -0,0 +1,58 @@ +id: google-maps-widget-47ea06b51e4d84465dbdc7ce5332226e + +info: + name: > + Maps Widget for Google Maps <= 4.24 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de871598-e4e7-49f6-8530-68243544c06c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-widget/" + google-query: inurl:"/wp-content/plugins/google-maps-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-maps-widget-ec849d78c688b2190e2b3aabcf591070.yaml b/nuclei-templates/cve-less/plugins/google-maps-widget-ec849d78c688b2190e2b3aabcf591070.yaml new file mode 100644 index 0000000000..9579ed5930 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-maps-widget-ec849d78c688b2190e2b3aabcf591070.yaml @@ -0,0 +1,58 @@ +id: google-maps-widget-ec849d78c688b2190e2b3aabcf591070 + +info: + name: > + Maps Widget for Google Maps <= 4.23 - Cross-Site Request Forgery via dismiss_notice + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0472804e-00cc-4c4c-97aa-86f433f65782?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-maps-widget/" + google-query: inurl:"/wp-content/plugins/google-maps-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-maps-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-maps-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-maps-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-mobile-sitemap-5229e60b10dc0cc0da445f82bd6aaa7c.yaml b/nuclei-templates/cve-less/plugins/google-mobile-sitemap-5229e60b10dc0cc0da445f82bd6aaa7c.yaml new file mode 100644 index 0000000000..c030e0959a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-mobile-sitemap-5229e60b10dc0cc0da445f82bd6aaa7c.yaml @@ -0,0 +1,58 @@ +id: google-mobile-sitemap-5229e60b10dc0cc0da445f82bd6aaa7c + +info: + name: > + Google XML Sitemap for Mobile <= 1.6.1 - Cross-Site Request Forgery via mobile_sitemap_generate + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2b0c5f9-b734-41e6-8ecb-4cf3d891ddb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-mobile-sitemap/" + google-query: inurl:"/wp-content/plugins/google-mobile-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-mobile-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-mobile-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-mobile-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-news-sitemap-d6ab389c616dfd2cb30cbd7db8473c95.yaml b/nuclei-templates/cve-less/plugins/google-news-sitemap-d6ab389c616dfd2cb30cbd7db8473c95.yaml new file mode 100644 index 0000000000..aa51b84cbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-news-sitemap-d6ab389c616dfd2cb30cbd7db8473c95.yaml @@ -0,0 +1,58 @@ +id: google-news-sitemap-d6ab389c616dfd2cb30cbd7db8473c95 + +info: + name: > + Andrea Pernici News Sitemap for Google <= 1.0.16 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49a0c45e-781e-4d2e-a9e8-a54ff8ef6131?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-news-sitemap/" + google-query: inurl:"/wp-content/plugins/google-news-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-news-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-news-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-news-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-one-487e1c477d62c893e7844e96f9998b9b.yaml b/nuclei-templates/cve-less/plugins/google-one-487e1c477d62c893e7844e96f9998b9b.yaml new file mode 100644 index 0000000000..fd22e616dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-one-487e1c477d62c893e7844e96f9998b9b.yaml @@ -0,0 +1,58 @@ +id: google-one-487e1c477d62c893e7844e96f9998b9b + +info: + name: > + Google +1 by BestWebSoft < 1.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44af8ced-5ea4-4bdb-a664-c5b58d683d23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-one/" + google-query: inurl:"/wp-content/plugins/google-one/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-one,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-one/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-one" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-pagespeed-insights-151d3e08592a36d4136c6e83ca9b4d33.yaml b/nuclei-templates/cve-less/plugins/google-pagespeed-insights-151d3e08592a36d4136c6e83ca9b4d33.yaml new file mode 100644 index 0000000000..389b3305ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-pagespeed-insights-151d3e08592a36d4136c6e83ca9b4d33.yaml @@ -0,0 +1,58 @@ +id: google-pagespeed-insights-151d3e08592a36d4136c6e83ca9b4d33 + +info: + name: > + Insights from Google PageSpeed <= 4.0.6 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8440240-f652-4372-9ed8-f3eb3b8336e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-pagespeed-insights/" + google-query: inurl:"/wp-content/plugins/google-pagespeed-insights/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-pagespeed-insights,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-pagespeed-insights/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-pagespeed-insights" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-pagespeed-insights-69c002483424de642a83eb654d8e112a.yaml b/nuclei-templates/cve-less/plugins/google-pagespeed-insights-69c002483424de642a83eb654d8e112a.yaml new file mode 100644 index 0000000000..1bc4896d14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-pagespeed-insights-69c002483424de642a83eb654d8e112a.yaml @@ -0,0 +1,58 @@ +id: google-pagespeed-insights-69c002483424de642a83eb654d8e112a + +info: + name: > + Google Pagespeed Insights <= 4.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8e245f-2458-4ffe-8e73-bed61331f39d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-pagespeed-insights/" + google-query: inurl:"/wp-content/plugins/google-pagespeed-insights/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-pagespeed-insights,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-pagespeed-insights/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-pagespeed-insights" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-seo-author-snippets-3b1e2a032a6f302e2ccd9d18f56d17aa.yaml b/nuclei-templates/cve-less/plugins/google-seo-author-snippets-3b1e2a032a6f302e2ccd9d18f56d17aa.yaml new file mode 100644 index 0000000000..d2f1b559c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-seo-author-snippets-3b1e2a032a6f302e2ccd9d18f56d17aa.yaml @@ -0,0 +1,58 @@ +id: google-seo-author-snippets-3b1e2a032a6f302e2ccd9d18f56d17aa + +info: + name: > + Google SEO Pressor for Rich snippets <= 1.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ba98b0b-0772-4871-9892-c6354ceaf614?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-seo-author-snippets/" + google-query: inurl:"/wp-content/plugins/google-seo-author-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-seo-author-snippets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-seo-author-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-seo-author-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-shortlink-cc49f2dcb06843ad833fab55b1a84dab.yaml b/nuclei-templates/cve-less/plugins/google-shortlink-cc49f2dcb06843ad833fab55b1a84dab.yaml new file mode 100644 index 0000000000..3dc9610382 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-shortlink-cc49f2dcb06843ad833fab55b1a84dab.yaml @@ -0,0 +1,58 @@ +id: google-shortlink-cc49f2dcb06843ad833fab55b1a84dab + +info: + name: > + Shortlink by BestWebSoft < 1.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/281c49d3-078a-4fdc-9720-dac6b3a32892?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-shortlink/" + google-query: inurl:"/wp-content/plugins/google-shortlink/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-shortlink,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-shortlink/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-shortlink" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-site-kit-ce48369642b01844ccbae0e0917885a1.yaml b/nuclei-templates/cve-less/plugins/google-site-kit-ce48369642b01844ccbae0e0917885a1.yaml new file mode 100644 index 0000000000..d206ce1ff4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-site-kit-ce48369642b01844ccbae0e0917885a1.yaml @@ -0,0 +1,58 @@ +id: google-site-kit-ce48369642b01844ccbae0e0917885a1 + +info: + name: > + Site Kit by Google <= 1.7.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e358c32d-6d0b-421d-9746-aafa1252dcea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-site-kit/" + google-query: inurl:"/wp-content/plugins/google-site-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-site-kit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-site-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-site-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-site-verification-using-meta-tag-27da99993e67f1ff7087f357854cd3f5.yaml b/nuclei-templates/cve-less/plugins/google-site-verification-using-meta-tag-27da99993e67f1ff7087f357854cd3f5.yaml new file mode 100644 index 0000000000..a2313357aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-site-verification-using-meta-tag-27da99993e67f1ff7087f357854cd3f5.yaml @@ -0,0 +1,58 @@ +id: google-site-verification-using-meta-tag-27da99993e67f1ff7087f357854cd3f5 + +info: + name: > + Google Site Verification plugin using Meta Tag <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecfdd114-b7bb-45bf-84df-a92f10b2fd81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-site-verification-using-meta-tag/" + google-query: inurl:"/wp-content/plugins/google-site-verification-using-meta-tag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-site-verification-using-meta-tag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-site-verification-using-meta-tag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-site-verification-using-meta-tag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-sitemap-generator-877bab778ddda7032844b19d4fdbee7a.yaml b/nuclei-templates/cve-less/plugins/google-sitemap-generator-877bab778ddda7032844b19d4fdbee7a.yaml new file mode 100644 index 0000000000..d67bf141c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-sitemap-generator-877bab778ddda7032844b19d4fdbee7a.yaml @@ -0,0 +1,58 @@ +id: google-sitemap-generator-877bab778ddda7032844b19d4fdbee7a + +info: + name: > + XML Sitemaps <= 4.0.9 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a82c5ca7-5fe5-4817-bf5c-ee7779eb4427?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-sitemap-generator/" + google-query: inurl:"/wp-content/plugins/google-sitemap-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-sitemap-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-sitemap-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-sitemap-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-sitemap-generator-a8343a6c54d23e35a66b54c79a6e406e.yaml b/nuclei-templates/cve-less/plugins/google-sitemap-generator-a8343a6c54d23e35a66b54c79a6e406e.yaml new file mode 100644 index 0000000000..6e5bfd05b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-sitemap-generator-a8343a6c54d23e35a66b54c79a6e406e.yaml @@ -0,0 +1,58 @@ +id: google-sitemap-generator-a8343a6c54d23e35a66b54c79a6e406e + +info: + name: > + XML Sitemaps <= 4.1.1 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/455b0b34-1421-46eb-8fcf-3b68c5068249?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-sitemap-generator/" + google-query: inurl:"/wp-content/plugins/google-sitemap-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-sitemap-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-sitemap-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-sitemap-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-sitemap-plugin-a9e88406cdac203530a27cd9ede9dcf0.yaml b/nuclei-templates/cve-less/plugins/google-sitemap-plugin-a9e88406cdac203530a27cd9ede9dcf0.yaml new file mode 100644 index 0000000000..4e0e99bbc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-sitemap-plugin-a9e88406cdac203530a27cd9ede9dcf0.yaml @@ -0,0 +1,58 @@ +id: google-sitemap-plugin-a9e88406cdac203530a27cd9ede9dcf0 + +info: + name: > + Sitemap by BestWebSoft – WordPress XML Site Map Page Generator Plugin < 3.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e409a4af-9998-4b77-8f6b-50ae1b70da2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-sitemap-plugin/" + google-query: inurl:"/wp-content/plugins/google-sitemap-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-sitemap-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-sitemap-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-sitemap-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-typography-cff018203a21cbec2137aca8bbff35f1.yaml b/nuclei-templates/cve-less/plugins/google-typography-cff018203a21cbec2137aca8bbff35f1.yaml new file mode 100644 index 0000000000..2027725d34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-typography-cff018203a21cbec2137aca8bbff35f1.yaml @@ -0,0 +1,58 @@ +id: google-typography-cff018203a21cbec2137aca8bbff35f1 + +info: + name: > + Google Typography <= 1.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e00ae4-68a6-4835-8dd7-da5dc104feba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-typography/" + google-query: inurl:"/wp-content/plugins/google-typography/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-typography,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-typography/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-typography" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/google-xml-sitemaps-generator-1f82fcaacb5a6d3e18b98a66c9d7e3ab.yaml b/nuclei-templates/cve-less/plugins/google-xml-sitemaps-generator-1f82fcaacb5a6d3e18b98a66c9d7e3ab.yaml new file mode 100644 index 0000000000..5d49c9b994 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/google-xml-sitemaps-generator-1f82fcaacb5a6d3e18b98a66c9d7e3ab.yaml @@ -0,0 +1,58 @@ +id: google-xml-sitemaps-generator-1f82fcaacb5a6d3e18b98a66c9d7e3ab + +info: + name: > + Google XML Sitemaps Generator < 3.2.9 - Authenticated (Admin+) PHP Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/874130f0-7dc9-49fe-a7b0-e0be432799bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/google-xml-sitemaps-generator/" + google-query: inurl:"/wp-content/plugins/google-xml-sitemaps-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,google-xml-sitemaps-generator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/google-xml-sitemaps-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "google-xml-sitemaps-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/googlealertandtwitterplugin-3c3cbbdb8196193ef05917779fb71864.yaml b/nuclei-templates/cve-less/plugins/googlealertandtwitterplugin-3c3cbbdb8196193ef05917779fb71864.yaml new file mode 100644 index 0000000000..b4143f2b74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/googlealertandtwitterplugin-3c3cbbdb8196193ef05917779fb71864.yaml @@ -0,0 +1,58 @@ +id: googlealertandtwitterplugin-3c3cbbdb8196193ef05917779fb71864 + +info: + name: > + Google Alert and Twitter Plugin <= 3.1.5 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/181e41d6-1599-4229-ace8-0bdb5735858f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/GoogleAlertandtwitterplugin/" + google-query: inurl:"/wp-content/plugins/GoogleAlertandtwitterplugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,GoogleAlertandtwitterplugin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/GoogleAlertandtwitterplugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "GoogleAlertandtwitterplugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/googleanalytics-2207307382a7e5b71273a639c041b28d.yaml b/nuclei-templates/cve-less/plugins/googleanalytics-2207307382a7e5b71273a639c041b28d.yaml new file mode 100644 index 0000000000..3762a3523a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/googleanalytics-2207307382a7e5b71273a639c041b28d.yaml @@ -0,0 +1,58 @@ +id: googleanalytics-2207307382a7e5b71273a639c041b28d + +info: + name: > + ShareThis Dashboard for Google Analytics <= 3.1.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e343489-4969-4a16-9741-34de93c8b06e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/googleanalytics/" + google-query: inurl:"/wp-content/plugins/googleanalytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,googleanalytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/googleanalytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "googleanalytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/googleanalytics-d7f99b9c49c835552d523fc996a914ba.yaml b/nuclei-templates/cve-less/plugins/googleanalytics-d7f99b9c49c835552d523fc996a914ba.yaml new file mode 100644 index 0000000000..aa4a39098c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/googleanalytics-d7f99b9c49c835552d523fc996a914ba.yaml @@ -0,0 +1,58 @@ +id: googleanalytics-d7f99b9c49c835552d523fc996a914ba + +info: + name: > + ShareThis Dashboard for Google Analytics <= 2.5.1 - Reflected Cross-Site Scripting via ga_action parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da89e8f9-3843-4d72-92b2-cd2f717510cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/googleanalytics/" + google-query: inurl:"/wp-content/plugins/googleanalytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,googleanalytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/googleanalytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "googleanalytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/googmonify-c684be52691ba8cf475f40cbe594a992.yaml b/nuclei-templates/cve-less/plugins/googmonify-c684be52691ba8cf475f40cbe594a992.yaml new file mode 100644 index 0000000000..6199b4e5bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/googmonify-c684be52691ba8cf475f40cbe594a992.yaml @@ -0,0 +1,58 @@ +id: googmonify-c684be52691ba8cf475f40cbe594a992 + +info: + name: > + Googmonify <= 0.5.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff70f7aa-4c2c-4693-8b1f-d6e3ebbb0dad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/googmonify/" + google-query: inurl:"/wp-content/plugins/googmonify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,googmonify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/googmonify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "googmonify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/goolytics-simple-google-analytics-733ee63acd3da1891d75d0f23730ff92.yaml b/nuclei-templates/cve-less/plugins/goolytics-simple-google-analytics-733ee63acd3da1891d75d0f23730ff92.yaml new file mode 100644 index 0000000000..41aaf220da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/goolytics-simple-google-analytics-733ee63acd3da1891d75d0f23730ff92.yaml @@ -0,0 +1,58 @@ +id: goolytics-simple-google-analytics-733ee63acd3da1891d75d0f23730ff92 + +info: + name: > + Goolytics – Simple Google Analytics <= 1.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccf2bd2a-6041-49ca-8ff9-d8541b2d2b73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/goolytics-simple-google-analytics/" + google-query: inurl:"/wp-content/plugins/goolytics-simple-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,goolytics-simple-google-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/goolytics-simple-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goolytics-simple-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotmls-0a0cd233b0f3cbcbaa65976cd56fef34.yaml b/nuclei-templates/cve-less/plugins/gotmls-0a0cd233b0f3cbcbaa65976cd56fef34.yaml new file mode 100644 index 0000000000..a43012d2aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotmls-0a0cd233b0f3cbcbaa65976cd56fef34.yaml @@ -0,0 +1,58 @@ +id: gotmls-0a0cd233b0f3cbcbaa65976cd56fef34 + +info: + name: > + Anti-Malware Security and Brute-Force Firewall <= 4.20.95 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e9ef3dd-9055-4f9f-b3af-6bf34c06292a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotmls/" + google-query: inurl:"/wp-content/plugins/gotmls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotmls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotmls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotmls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.20.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotmls-0c5d9c3d25fdcac52f9189c83dcf8aeb.yaml b/nuclei-templates/cve-less/plugins/gotmls-0c5d9c3d25fdcac52f9189c83dcf8aeb.yaml new file mode 100644 index 0000000000..899bc63659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotmls-0c5d9c3d25fdcac52f9189c83dcf8aeb.yaml @@ -0,0 +1,58 @@ +id: gotmls-0c5d9c3d25fdcac52f9189c83dcf8aeb + +info: + name: > + Anti-Malware Security and Brute-Force Firewall <= 4.15.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14ccd915-a513-45a4-84d3-b2b1fb893f1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotmls/" + google-query: inurl:"/wp-content/plugins/gotmls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotmls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotmls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotmls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotmls-1a3ebcec002fbbf2625550387d2d42c9.yaml b/nuclei-templates/cve-less/plugins/gotmls-1a3ebcec002fbbf2625550387d2d42c9.yaml new file mode 100644 index 0000000000..dfcdadd391 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotmls-1a3ebcec002fbbf2625550387d2d42c9.yaml @@ -0,0 +1,58 @@ +id: gotmls-1a3ebcec002fbbf2625550387d2d42c9 + +info: + name: > + Anti-Malware Security and Brute-Force Firewall <= 4.21.85 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2826ac2-bb1c-4aee-ba3f-c77825fc395c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotmls/" + google-query: inurl:"/wp-content/plugins/gotmls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotmls,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotmls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotmls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.21.85') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotmls-217282597c372f234ba0f9d1d76dc65e.yaml b/nuclei-templates/cve-less/plugins/gotmls-217282597c372f234ba0f9d1d76dc65e.yaml new file mode 100644 index 0000000000..3fb9099004 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotmls-217282597c372f234ba0f9d1d76dc65e.yaml @@ -0,0 +1,58 @@ +id: gotmls-217282597c372f234ba0f9d1d76dc65e + +info: + name: > + Anti-Malware Security and Brute-Force Firewall <= 4.20.93 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9a70e02-fdbc-43ee-9382-101391f363a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotmls/" + google-query: inurl:"/wp-content/plugins/gotmls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotmls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotmls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotmls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.20.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotmls-708df63ef726347251d17af873084641.yaml b/nuclei-templates/cve-less/plugins/gotmls-708df63ef726347251d17af873084641.yaml new file mode 100644 index 0000000000..c162cbaa83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotmls-708df63ef726347251d17af873084641.yaml @@ -0,0 +1,58 @@ +id: gotmls-708df63ef726347251d17af873084641 + +info: + name: > + Anti-Malware Security and Brute-Force Firewall <= 4.15.17 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d76229c9-39e6-48ab-b038-be40b36aa7bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotmls/" + google-query: inurl:"/wp-content/plugins/gotmls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotmls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotmls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotmls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotmls-73c5b47663cb5585bace1d303c16cc9b.yaml b/nuclei-templates/cve-less/plugins/gotmls-73c5b47663cb5585bace1d303c16cc9b.yaml new file mode 100644 index 0000000000..ce80771ed7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotmls-73c5b47663cb5585bace1d303c16cc9b.yaml @@ -0,0 +1,58 @@ +id: gotmls-73c5b47663cb5585bace1d303c16cc9b + +info: + name: > + Anti-Malware Security and Brute-Force Firewall <= 4.21.74 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07e9ae6a-7734-40ee-9287-ae0a99b1fc31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotmls/" + google-query: inurl:"/wp-content/plugins/gotmls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotmls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotmls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotmls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.21.74') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotmls-dad4d79fe3688c4dbc2389dd7cd7a0c1.yaml b/nuclei-templates/cve-less/plugins/gotmls-dad4d79fe3688c4dbc2389dd7cd7a0c1.yaml new file mode 100644 index 0000000000..b687bad458 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotmls-dad4d79fe3688c4dbc2389dd7cd7a0c1.yaml @@ -0,0 +1,58 @@ +id: gotmls-dad4d79fe3688c4dbc2389dd7cd7a0c1 + +info: + name: > + Anti-Malware Security and Brute-Force Firewall <= 4.15.22 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3408bdfd-6337-4c26-b0f2-377375d0e52c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotmls/" + google-query: inurl:"/wp-content/plugins/gotmls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotmls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotmls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotmls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotmls-ee46b680e67f5e4398b3104a6e695606.yaml b/nuclei-templates/cve-less/plugins/gotmls-ee46b680e67f5e4398b3104a6e695606.yaml new file mode 100644 index 0000000000..1a00e1ba6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotmls-ee46b680e67f5e4398b3104a6e695606.yaml @@ -0,0 +1,58 @@ +id: gotmls-ee46b680e67f5e4398b3104a6e695606 + +info: + name: > + Anti-Malware Security and Brute-Force Firewall <= 4.21.96 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7e81331-0b39-4490-8624-38078b3d5420?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotmls/" + google-query: inurl:"/wp-content/plugins/gotmls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotmls,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotmls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotmls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.21.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gotowp-1dba374d8f67142177f857791fc4897a.yaml b/nuclei-templates/cve-less/plugins/gotowp-1dba374d8f67142177f857791fc4897a.yaml new file mode 100644 index 0000000000..d7bb2d2ea0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gotowp-1dba374d8f67142177f857791fc4897a.yaml @@ -0,0 +1,58 @@ +id: gotowp-1dba374d8f67142177f857791fc4897a + +info: + name: > + GoToWP <= 5.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d07dcb9-ec8c-4f38-b5c2-2f4020a1c610?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gotowp/" + google-query: inurl:"/wp-content/plugins/gotowp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gotowp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gotowp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gotowp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gourl-bitcoin-payment-gateway-paid-downloads-membership-3063b8281af6ebc7aeb1fd5ad46fb58d.yaml b/nuclei-templates/cve-less/plugins/gourl-bitcoin-payment-gateway-paid-downloads-membership-3063b8281af6ebc7aeb1fd5ad46fb58d.yaml new file mode 100644 index 0000000000..b6cd71c042 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gourl-bitcoin-payment-gateway-paid-downloads-membership-3063b8281af6ebc7aeb1fd5ad46fb58d.yaml @@ -0,0 +1,58 @@ +id: gourl-bitcoin-payment-gateway-paid-downloads-membership-3063b8281af6ebc7aeb1fd5ad46fb58d + +info: + name: > + GoUrl Bitcoin Payment Gateway & Paid Downloads & Membership <= 1.4.13 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4d99e64-1daf-4349-9702-341f05a65c21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gourl-bitcoin-payment-gateway-paid-downloads-membership/" + google-query: inurl:"/wp-content/plugins/gourl-bitcoin-payment-gateway-paid-downloads-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gourl-bitcoin-payment-gateway-paid-downloads-membership,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gourl-bitcoin-payment-gateway-paid-downloads-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gourl-bitcoin-payment-gateway-paid-downloads-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gp-unique-id-0baa6a08e33ce425ecc59984cf3322d5.yaml b/nuclei-templates/cve-less/plugins/gp-unique-id-0baa6a08e33ce425ecc59984cf3322d5.yaml new file mode 100644 index 0000000000..6a793422a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gp-unique-id-0baa6a08e33ce425ecc59984cf3322d5.yaml @@ -0,0 +1,58 @@ +id: gp-unique-id-0baa6a08e33ce425ecc59984cf3322d5 + +info: + name: > + GP Unique ID <= 1.5.5 - Unauthenticated Form Submission Unique ID Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26db2d25-01b8-49c5-a4d6-284780ac97bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gp-unique-id/" + google-query: inurl:"/wp-content/plugins/gp-unique-id/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gp-unique-id,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gp-unique-id/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gp-unique-id" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gps-plotter-b434181ec4dda3f7c495c50067c97199.yaml b/nuclei-templates/cve-less/plugins/gps-plotter-b434181ec4dda3f7c495c50067c97199.yaml new file mode 100644 index 0000000000..b4cd9eefe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gps-plotter-b434181ec4dda3f7c495c50067c97199.yaml @@ -0,0 +1,58 @@ +id: gps-plotter-b434181ec4dda3f7c495c50067c97199 + +info: + name: > + GPS Plotter <= 5.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca449d15-b05e-4341-99b0-472a14cab8f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gps-plotter/" + google-query: inurl:"/wp-content/plugins/gps-plotter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gps-plotter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gps-plotter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gps-plotter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-045152e75b1009ce745fb0f25f86d898.yaml b/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-045152e75b1009ce745fb0f25f86d898.yaml new file mode 100644 index 0000000000..cc728f0b97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-045152e75b1009ce745fb0f25f86d898.yaml @@ -0,0 +1,58 @@ +id: gpt3-ai-content-generator-045152e75b1009ce745fb0f25f86d898 + +info: + name: > + GPT AI Power <= 1.4.37 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e1aa14-b762-40ea-9a64-b1ecb6ed7153?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gpt3-ai-content-generator/" + google-query: inurl:"/wp-content/plugins/gpt3-ai-content-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gpt3-ai-content-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gpt3-ai-content-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gpt3-ai-content-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-57ecfed8d0fb67d406684f95901e8e61.yaml b/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-57ecfed8d0fb67d406684f95901e8e61.yaml new file mode 100644 index 0000000000..5315916342 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-57ecfed8d0fb67d406684f95901e8e61.yaml @@ -0,0 +1,58 @@ +id: gpt3-ai-content-generator-57ecfed8d0fb67d406684f95901e8e61 + +info: + name: > + GPT3 AI Content Writer <= 1.8.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5511c5f4-b71c-484b-ab6f-2389a29809cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gpt3-ai-content-generator/" + google-query: inurl:"/wp-content/plugins/gpt3-ai-content-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gpt3-ai-content-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gpt3-ai-content-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gpt3-ai-content-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-e9e7f1f63804b5a7bd339f4d7bcd16e9.yaml b/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-e9e7f1f63804b5a7bd339f4d7bcd16e9.yaml new file mode 100644 index 0000000000..9a794245ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gpt3-ai-content-generator-e9e7f1f63804b5a7bd339f4d7bcd16e9.yaml @@ -0,0 +1,58 @@ +id: gpt3-ai-content-generator-e9e7f1f63804b5a7bd339f4d7bcd16e9 + +info: + name: > + AI Power: Complete AI Pack – Powered by GPT-4 <= 1.8.1 - Missing Authorization to Sensitive Data Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f95c288-7710-46aa-898b-a923afa7a4ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gpt3-ai-content-generator/" + google-query: inurl:"/wp-content/plugins/gpt3-ai-content-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gpt3-ai-content-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gpt3-ai-content-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gpt3-ai-content-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gracemedia-media-player-639b65f134f2ebc0900152991d7d173d.yaml b/nuclei-templates/cve-less/plugins/gracemedia-media-player-639b65f134f2ebc0900152991d7d173d.yaml new file mode 100644 index 0000000000..269a74ddfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gracemedia-media-player-639b65f134f2ebc0900152991d7d173d.yaml @@ -0,0 +1,58 @@ +id: gracemedia-media-player-639b65f134f2ebc0900152991d7d173d + +info: + name: > + GraceMedia Media Player <= 1.0 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c024c77-31a8-45b8-9fcb-7ba729bec32c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gracemedia-media-player/" + google-query: inurl:"/wp-content/plugins/gracemedia-media-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gracemedia-media-player,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gracemedia-media-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gracemedia-media-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gradient-text-widget-for-elementor-2b7b5dc8c00ef5d0c5596161adf932c4.yaml b/nuclei-templates/cve-less/plugins/gradient-text-widget-for-elementor-2b7b5dc8c00ef5d0c5596161adf932c4.yaml new file mode 100644 index 0000000000..8201d51518 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gradient-text-widget-for-elementor-2b7b5dc8c00ef5d0c5596161adf932c4.yaml @@ -0,0 +1,58 @@ +id: gradient-text-widget-for-elementor-2b7b5dc8c00ef5d0c5596161adf932c4 + +info: + name: > + Gradient Text Widget for Elementor <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32dd7de3-980d-4ade-988d-a483f16a19df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gradient-text-widget-for-elementor/" + google-query: inurl:"/wp-content/plugins/gradient-text-widget-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gradient-text-widget-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gradient-text-widget-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gradient-text-widget-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grand-media-0825ff9121c6db183cc7a8611f4eccae.yaml b/nuclei-templates/cve-less/plugins/grand-media-0825ff9121c6db183cc7a8611f4eccae.yaml new file mode 100644 index 0000000000..0f888b9339 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grand-media-0825ff9121c6db183cc7a8611f4eccae.yaml @@ -0,0 +1,58 @@ +id: grand-media-0825ff9121c6db183cc7a8611f4eccae + +info: + name: > + Gmedia Photo Gallery < 0.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f787e299-21f8-4662-935a-ff1e25c7d275?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grand-media/" + google-query: inurl:"/wp-content/plugins/grand-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grand-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grand-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grand-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grand-media-3d97f53ad1e035f606fd358779aba41f.yaml b/nuclei-templates/cve-less/plugins/grand-media-3d97f53ad1e035f606fd358779aba41f.yaml new file mode 100644 index 0000000000..0e16967af7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grand-media-3d97f53ad1e035f606fd358779aba41f.yaml @@ -0,0 +1,58 @@ +id: grand-media-3d97f53ad1e035f606fd358779aba41f + +info: + name: > + Gmedia Photo Gallery <= 1.18.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c9f657b-82a5-40da-9e9a-95ea6f62d895?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grand-media/" + google-query: inurl:"/wp-content/plugins/grand-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grand-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grand-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grand-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grand-media-6c30ef6dc07bdb8e5463fc4ceb947996.yaml b/nuclei-templates/cve-less/plugins/grand-media-6c30ef6dc07bdb8e5463fc4ceb947996.yaml new file mode 100644 index 0000000000..5ba3678731 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grand-media-6c30ef6dc07bdb8e5463fc4ceb947996.yaml @@ -0,0 +1,58 @@ +id: grand-media-6c30ef6dc07bdb8e5463fc4ceb947996 + +info: + name: > + Gmedia Photo Gallery <= 1.6.4 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a161bd23-0b82-49ef-b3cc-a117823ec8a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grand-media/" + google-query: inurl:"/wp-content/plugins/grand-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grand-media,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grand-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grand-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grand-media-6f4811a1962934f7bbd6ba6e69c49111.yaml b/nuclei-templates/cve-less/plugins/grand-media-6f4811a1962934f7bbd6ba6e69c49111.yaml new file mode 100644 index 0000000000..69e7a19ba8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grand-media-6f4811a1962934f7bbd6ba6e69c49111.yaml @@ -0,0 +1,58 @@ +id: grand-media-6f4811a1962934f7bbd6ba6e69c49111 + +info: + name: > + Gmedia Photo Gallery <= 1.6.4 - Open Proxy + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/408cd4a7-d850-40fb-9b46-9381815c1222?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grand-media/" + google-query: inurl:"/wp-content/plugins/grand-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grand-media,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grand-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grand-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grand-media-7f68709b4a4df440a41bc04d703e3fb6.yaml b/nuclei-templates/cve-less/plugins/grand-media-7f68709b4a4df440a41bc04d703e3fb6.yaml new file mode 100644 index 0000000000..da9289f9ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grand-media-7f68709b4a4df440a41bc04d703e3fb6.yaml @@ -0,0 +1,58 @@ +id: grand-media-7f68709b4a4df440a41bc04d703e3fb6 + +info: + name: > + Gmedia Photo Gallery < 1.2.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/094c5011-41f6-420b-b566-e77fd55d9011?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grand-media/" + google-query: inurl:"/wp-content/plugins/grand-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grand-media,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grand-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grand-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grand-media-eb694b6f549de02c7bd8c2f716c1cbc2.yaml b/nuclei-templates/cve-less/plugins/grand-media-eb694b6f549de02c7bd8c2f716c1cbc2.yaml new file mode 100644 index 0000000000..7d1cac29e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grand-media-eb694b6f549de02c7bd8c2f716c1cbc2.yaml @@ -0,0 +1,58 @@ +id: grand-media-eb694b6f549de02c7bd8c2f716c1cbc2 + +info: + name: > + Gmedia Photo Gallery <= 1.6.4 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adb4644c-6ef6-4899-b0f1-2629ffacd19c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grand-media/" + google-query: inurl:"/wp-content/plugins/grand-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grand-media,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grand-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grand-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grand-media-f89c8645dfcff6d7c8daa63e313b40dd.yaml b/nuclei-templates/cve-less/plugins/grand-media-f89c8645dfcff6d7c8daa63e313b40dd.yaml new file mode 100644 index 0000000000..19b258e7d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grand-media-f89c8645dfcff6d7c8daa63e313b40dd.yaml @@ -0,0 +1,58 @@ +id: grand-media-f89c8645dfcff6d7c8daa63e313b40dd + +info: + name: > + Gmedia Photo Gallery <= 1.6.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ad0eed1-777a-432b-a190-b8a7ed10d71a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grand-media/" + google-query: inurl:"/wp-content/plugins/grand-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grand-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grand-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grand-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grand-media-feb8ea008986699e99b1ae18448b79c3.yaml b/nuclei-templates/cve-less/plugins/grand-media-feb8ea008986699e99b1ae18448b79c3.yaml new file mode 100644 index 0000000000..c8b296bd29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grand-media-feb8ea008986699e99b1ae18448b79c3.yaml @@ -0,0 +1,58 @@ +id: grand-media-feb8ea008986699e99b1ae18448b79c3 + +info: + name: > + Gmedia Photo Gallery < 1.20.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c74d5ad-30f3-4fde-b240-97318fc3c7d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grand-media/" + google-query: inurl:"/wp-content/plugins/grand-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grand-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grand-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grand-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/graphina-elementor-charts-and-graphs-a96bb943a1852ea0b2e688a3b3910413.yaml b/nuclei-templates/cve-less/plugins/graphina-elementor-charts-and-graphs-a96bb943a1852ea0b2e688a3b3910413.yaml new file mode 100644 index 0000000000..87fa93d853 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/graphina-elementor-charts-and-graphs-a96bb943a1852ea0b2e688a3b3910413.yaml @@ -0,0 +1,58 @@ +id: graphina-elementor-charts-and-graphs-a96bb943a1852ea0b2e688a3b3910413 + +info: + name: > + Graphina – Elementor Charts and Graphs <= 1.8.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multiple Widgets + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1febe2d8-d354-4c78-a611-c1bb0937e53d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/graphina-elementor-charts-and-graphs/" + google-query: inurl:"/wp-content/plugins/graphina-elementor-charts-and-graphs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,graphina-elementor-charts-and-graphs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/graphina-elementor-charts-and-graphs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "graphina-elementor-charts-and-graphs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce-b4bd8b09c6fbcb29788bc8bbefcbcdc0.yaml b/nuclei-templates/cve-less/plugins/gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce-b4bd8b09c6fbcb29788bc8bbefcbcdc0.yaml new file mode 100644 index 0000000000..18910713bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce-b4bd8b09c6fbcb29788bc8bbefcbcdc0.yaml @@ -0,0 +1,58 @@ +id: gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce-b4bd8b09c6fbcb29788bc8bbefcbcdc0 + +info: + name: > + Gratisfaction <= 4.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f2135ab-ef76-4539-81ad-51abc4e051ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gratisfaction-all-in-one-loyalty-contests-referral-program-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravitate-qa-tracker-cd3644678d89d82305da7906f47bab11.yaml b/nuclei-templates/cve-less/plugins/gravitate-qa-tracker-cd3644678d89d82305da7906f47bab11.yaml new file mode 100644 index 0000000000..ec5e033901 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravitate-qa-tracker-cd3644678d89d82305da7906f47bab11.yaml @@ -0,0 +1,58 @@ +id: gravitate-qa-tracker-cd3644678d89d82305da7906f47bab11 + +info: + name: > + Gravitate QA Tracker <= 1.2.1 - Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ef64118-b388-4260-930b-6a31992d4076?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravitate-qa-tracker/" + google-query: inurl:"/wp-content/plugins/gravitate-qa-tracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravitate-qa-tracker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravitate-qa-tracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravitate-qa-tracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravity-file-ajax-upload-free-aae4ca7abb59e5c604f97c05e398cdb3.yaml b/nuclei-templates/cve-less/plugins/gravity-file-ajax-upload-free-aae4ca7abb59e5c604f97c05e398cdb3.yaml new file mode 100644 index 0000000000..9d7603e327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravity-file-ajax-upload-free-aae4ca7abb59e5c604f97c05e398cdb3.yaml @@ -0,0 +1,58 @@ +id: gravity-file-ajax-upload-free-aae4ca7abb59e5c604f97c05e398cdb3 + +info: + name: > + Gravity Upload Ajax <= 1.1 - Unrestricted File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38bcb908-1e6e-44be-9cf5-72dcfa4c4a4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravity-file-ajax-upload-free/" + google-query: inurl:"/wp-content/plugins/gravity-file-ajax-upload-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravity-file-ajax-upload-free,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravity-file-ajax-upload-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravity-file-ajax-upload-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravity-forms-dps-pxpay-c5c10bf83837ad294aabcbed9d694122.yaml b/nuclei-templates/cve-less/plugins/gravity-forms-dps-pxpay-c5c10bf83837ad294aabcbed9d694122.yaml new file mode 100644 index 0000000000..6e8a8d3d7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravity-forms-dps-pxpay-c5c10bf83837ad294aabcbed9d694122.yaml @@ -0,0 +1,58 @@ +id: gravity-forms-dps-pxpay-c5c10bf83837ad294aabcbed9d694122 + +info: + name: > + GF Windcave Free <= 1.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d33df4e4-6ac7-499a-9d43-d19e287f7689?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravity-forms-dps-pxpay/" + google-query: inurl:"/wp-content/plugins/gravity-forms-dps-pxpay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravity-forms-dps-pxpay,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravity-forms-dps-pxpay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravity-forms-dps-pxpay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravity-forms-pdf-extended-67df3c9c3b7aab97d6fc038c36b94164.yaml b/nuclei-templates/cve-less/plugins/gravity-forms-pdf-extended-67df3c9c3b7aab97d6fc038c36b94164.yaml new file mode 100644 index 0000000000..454d921d53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravity-forms-pdf-extended-67df3c9c3b7aab97d6fc038c36b94164.yaml @@ -0,0 +1,58 @@ +id: gravity-forms-pdf-extended-67df3c9c3b7aab97d6fc038c36b94164 + +info: + name: > + Gravity PDF <= 6.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b489427e-f925-4058-8924-7a9557fc4ebf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravity-forms-pdf-extended/" + google-query: inurl:"/wp-content/plugins/gravity-forms-pdf-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravity-forms-pdf-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravity-forms-pdf-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravity-forms-pdf-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravity-forms-sms-notifications-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/cve-less/plugins/gravity-forms-sms-notifications-167d9672411be44feb72a5175fd0987c.yaml new file mode 100644 index 0000000000..5312db573c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravity-forms-sms-notifications-167d9672411be44feb72a5175fd0987c.yaml @@ -0,0 +1,58 @@ +id: gravity-forms-sms-notifications-167d9672411be44feb72a5175fd0987c + +info: + name: > + Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f35a20-ffcf-4413-b1ea-748cd6aa6f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravity-forms-sms-notifications/" + google-query: inurl:"/wp-content/plugins/gravity-forms-sms-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravity-forms-sms-notifications,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravity-forms-sms-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravity-forms-sms-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravity-forms-sticky-list-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/gravity-forms-sticky-list-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..3ba8fd1787 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravity-forms-sticky-list-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: gravity-forms-sticky-list-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravity-forms-sticky-list/" + google-query: inurl:"/wp-content/plugins/gravity-forms-sticky-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravity-forms-sticky-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravity-forms-sticky-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravity-forms-sticky-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravityforms-5d1eddaacfc678e52758e23e8e3a8842.yaml b/nuclei-templates/cve-less/plugins/gravityforms-5d1eddaacfc678e52758e23e8e3a8842.yaml new file mode 100644 index 0000000000..f9ac3bf35a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravityforms-5d1eddaacfc678e52758e23e8e3a8842.yaml @@ -0,0 +1,58 @@ +id: gravityforms-5d1eddaacfc678e52758e23e8e3a8842 + +info: + name: > + Gravity Forms <= 2.7.3 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc1e5fb7-92d0-4e7f-9b1b-15673e3b852a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravityforms/" + google-query: inurl:"/wp-content/plugins/gravityforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravityforms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravityforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravityforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravityforms-6b968b7d554babf27aefcb5df3e3773f.yaml b/nuclei-templates/cve-less/plugins/gravityforms-6b968b7d554babf27aefcb5df3e3773f.yaml new file mode 100644 index 0000000000..5ff98624d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravityforms-6b968b7d554babf27aefcb5df3e3773f.yaml @@ -0,0 +1,58 @@ +id: gravityforms-6b968b7d554babf27aefcb5df3e3773f + +info: + name: > + Gravityforms <= 2.4.8 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce047db1-b701-4903-9244-68b3ecaad78f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravityforms/" + google-query: inurl:"/wp-content/plugins/gravityforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravityforms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravityforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravityforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravityforms-77f0a0f1e7db36263a8aa9ab981e047e.yaml b/nuclei-templates/cve-less/plugins/gravityforms-77f0a0f1e7db36263a8aa9ab981e047e.yaml new file mode 100644 index 0000000000..2055e275f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravityforms-77f0a0f1e7db36263a8aa9ab981e047e.yaml @@ -0,0 +1,58 @@ +id: gravityforms-77f0a0f1e7db36263a8aa9ab981e047e + +info: + name: > + Gravity Forms <= 2.0.6.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c89d56e2-68aa-4caf-bc1b-9aa32ec11ba3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravityforms/" + google-query: inurl:"/wp-content/plugins/gravityforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravityforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravityforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravityforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravityforms-7ce94184875be6701700a5e620312558.yaml b/nuclei-templates/cve-less/plugins/gravityforms-7ce94184875be6701700a5e620312558.yaml new file mode 100644 index 0000000000..b9a29e2a4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravityforms-7ce94184875be6701700a5e620312558.yaml @@ -0,0 +1,58 @@ +id: gravityforms-7ce94184875be6701700a5e620312558 + +info: + name: > + Gravityforms <= 1.9.3.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0395b775-a89d-45f5-ac38-d5786f4b4d1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravityforms/" + google-query: inurl:"/wp-content/plugins/gravityforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravityforms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravityforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravityforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravityforms-975bf041109307c2b0234ccae26e4bc6.yaml b/nuclei-templates/cve-less/plugins/gravityforms-975bf041109307c2b0234ccae26e4bc6.yaml new file mode 100644 index 0000000000..f1bfee4b44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravityforms-975bf041109307c2b0234ccae26e4bc6.yaml @@ -0,0 +1,58 @@ +id: gravityforms-975bf041109307c2b0234ccae26e4bc6 + +info: + name: > + Gravity Forms <= 2.7.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/234df0e5-d1be-4354-8bfc-761bed1e9aa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravityforms/" + google-query: inurl:"/wp-content/plugins/gravityforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravityforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravityforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravityforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravityforms-af26d379855801f026d0f678221b9f09.yaml b/nuclei-templates/cve-less/plugins/gravityforms-af26d379855801f026d0f678221b9f09.yaml new file mode 100644 index 0000000000..cd20f15942 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravityforms-af26d379855801f026d0f678221b9f09.yaml @@ -0,0 +1,58 @@ +id: gravityforms-af26d379855801f026d0f678221b9f09 + +info: + name: > + Gravityforms <= 1.9.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2448450-9d0e-42bc-bfdb-66861b2f212c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravityforms/" + google-query: inurl:"/wp-content/plugins/gravityforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravityforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravityforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravityforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravityforms-effd937dfb84f7185a68c8c7960d1571.yaml b/nuclei-templates/cve-less/plugins/gravityforms-effd937dfb84f7185a68c8c7960d1571.yaml new file mode 100644 index 0000000000..05d685fa73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravityforms-effd937dfb84f7185a68c8c7960d1571.yaml @@ -0,0 +1,58 @@ +id: gravityforms-effd937dfb84f7185a68c8c7960d1571 + +info: + name: > + Gravityforms <= 1.8.19 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6bf60cc-4a07-4d5d-bff3-20d0115a5bd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravityforms/" + google-query: inurl:"/wp-content/plugins/gravityforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravityforms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravityforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravityforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gravityforms-f9a5aabd053da65d5b8f27e85e3ac8c7.yaml b/nuclei-templates/cve-less/plugins/gravityforms-f9a5aabd053da65d5b8f27e85e3ac8c7.yaml new file mode 100644 index 0000000000..d07589fb87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gravityforms-f9a5aabd053da65d5b8f27e85e3ac8c7.yaml @@ -0,0 +1,58 @@ +id: gravityforms-f9a5aabd053da65d5b8f27e85e3ac8c7 + +info: + name: > + Gravityforms <= 1.9.15.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b5d31c5-0516-4089-9867-2922670e1b04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gravityforms/" + google-query: inurl:"/wp-content/plugins/gravityforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gravityforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gravityforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gravityforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.15.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/great-quotes-a9ade0513aa1dccbdad4ffd99dcceb42.yaml b/nuclei-templates/cve-less/plugins/great-quotes-a9ade0513aa1dccbdad4ffd99dcceb42.yaml new file mode 100644 index 0000000000..181e0b2efd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/great-quotes-a9ade0513aa1dccbdad4ffd99dcceb42.yaml @@ -0,0 +1,58 @@ +id: great-quotes-a9ade0513aa1dccbdad4ffd99dcceb42 + +info: + name: > + Great Quotes <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67b5d20b-4032-4d41-8ab7-6063b7e47827?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/great-quotes/" + google-query: inurl:"/wp-content/plugins/great-quotes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,great-quotes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/great-quotes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "great-quotes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/greeklish-permalink-c5e8439f52a72fc808844ece6ad38bdd.yaml b/nuclei-templates/cve-less/plugins/greeklish-permalink-c5e8439f52a72fc808844ece6ad38bdd.yaml new file mode 100644 index 0000000000..99f6291412 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/greeklish-permalink-c5e8439f52a72fc808844ece6ad38bdd.yaml @@ -0,0 +1,58 @@ +id: greeklish-permalink-c5e8439f52a72fc808844ece6ad38bdd + +info: + name: > + Greeklish-permalink <= 3.3 - Missing Authorization via cyrtrans_ajax_old AJAX action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3be0e82c-f9a8-42a5-9abb-24cc60e03944?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/greeklish-permalink/" + google-query: inurl:"/wp-content/plugins/greeklish-permalink/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,greeklish-permalink,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/greeklish-permalink/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greeklish-permalink" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-01c7f6a7ff2da57d8e46e6c08e382c32.yaml b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-01c7f6a7ff2da57d8e46e6c08e382c32.yaml new file mode 100644 index 0000000000..a42d4d91d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-01c7f6a7ff2da57d8e46e6c08e382c32.yaml @@ -0,0 +1,58 @@ +id: greenshift-animation-and-page-builder-blocks-01c7f6a7ff2da57d8e46e6c08e382c32 + +info: + name: > + Greenshift – animation and page builder blocks <= 4.9.9 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826b5dac-4a54-44c7-979b-8901bb468777?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + google-query: inurl:"/wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,greenshift-animation-and-page-builder-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/greenshift-animation-and-page-builder-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greenshift-animation-and-page-builder-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-601f7b212435b0908f5157de31e9c323.yaml b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-601f7b212435b0908f5157de31e9c323.yaml new file mode 100644 index 0000000000..77586bfad9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-601f7b212435b0908f5157de31e9c323.yaml @@ -0,0 +1,58 @@ +id: greenshift-animation-and-page-builder-blocks-601f7b212435b0908f5157de31e9c323 + +info: + name: > + Greenshift – animation and page builder blocks <= 4.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3498ebe-5e13-4ced-b92d-4908b8775996?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + google-query: inurl:"/wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,greenshift-animation-and-page-builder-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/greenshift-animation-and-page-builder-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greenshift-animation-and-page-builder-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c7f23a53fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: greenshift-animation-and-page-builder-blocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + google-query: inurl:"/wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,greenshift-animation-and-page-builder-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/greenshift-animation-and-page-builder-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greenshift-animation-and-page-builder-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-c16c01b270f8ba46731b798dbc4b70f0.yaml b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-c16c01b270f8ba46731b798dbc4b70f0.yaml new file mode 100644 index 0000000000..860191df9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-c16c01b270f8ba46731b798dbc4b70f0.yaml @@ -0,0 +1,58 @@ +id: greenshift-animation-and-page-builder-blocks-c16c01b270f8ba46731b798dbc4b70f0 + +info: + name: > + Greenshift – animation and page builder blocks <= 7.6.2 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/821462d6-970e-4e3e-b91d-e7153296ba9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + google-query: inurl:"/wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,greenshift-animation-and-page-builder-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/greenshift-animation-and-page-builder-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greenshift-animation-and-page-builder-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-f9a2a8b78b336f59f7555c63172782ec.yaml b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-f9a2a8b78b336f59f7555c63172782ec.yaml new file mode 100644 index 0000000000..da981bb374 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/greenshift-animation-and-page-builder-blocks-f9a2a8b78b336f59f7555c63172782ec.yaml @@ -0,0 +1,58 @@ +id: greenshift-animation-and-page-builder-blocks-f9a2a8b78b336f59f7555c63172782ec + +info: + name: > + Greenshift – animation and page builder blocks <= 4.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abbdf198-b6f3-41dd-ada1-b14fc9946142?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + google-query: inurl:"/wp-content/plugins/greenshift-animation-and-page-builder-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,greenshift-animation-and-page-builder-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/greenshift-animation-and-page-builder-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greenshift-animation-and-page-builder-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/greenwallet-gateway-e92bd2c686e39336f450414601e8c047.yaml b/nuclei-templates/cve-less/plugins/greenwallet-gateway-e92bd2c686e39336f450414601e8c047.yaml new file mode 100644 index 0000000000..8e4f072ea7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/greenwallet-gateway-e92bd2c686e39336f450414601e8c047.yaml @@ -0,0 +1,58 @@ +id: greenwallet-gateway-e92bd2c686e39336f450414601e8c047 + +info: + name: > + WooCommerce Green Wallet Gateway <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5a99c97-19a4-41ab-a24f-3cc8f4be7073?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/greenwallet-gateway/" + google-query: inurl:"/wp-content/plugins/greenwallet-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,greenwallet-gateway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/greenwallet-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greenwallet-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gregs-high-performance-seo-1fdcfa12049d782d5c0a8a4b15f2b5b5.yaml b/nuclei-templates/cve-less/plugins/gregs-high-performance-seo-1fdcfa12049d782d5c0a8a4b15f2b5b5.yaml new file mode 100644 index 0000000000..55e25a9ad6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gregs-high-performance-seo-1fdcfa12049d782d5c0a8a4b15f2b5b5.yaml @@ -0,0 +1,58 @@ +id: gregs-high-performance-seo-1fdcfa12049d782d5c0a8a4b15f2b5b5 + +info: + name: > + Greg's High Performance SEO <= 1.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b6250d0-8f5e-4283-8d16-0b2f467e1224?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gregs-high-performance-seo/" + google-query: inurl:"/wp-content/plugins/gregs-high-performance-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gregs-high-performance-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gregs-high-performance-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gregs-high-performance-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/greyd_suite-5b0eec3be7323ada5d1daeb52ff32549.yaml b/nuclei-templates/cve-less/plugins/greyd_suite-5b0eec3be7323ada5d1daeb52ff32549.yaml new file mode 100644 index 0000000000..63e3ab8a5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/greyd_suite-5b0eec3be7323ada5d1daeb52ff32549.yaml @@ -0,0 +1,58 @@ +id: greyd_suite-5b0eec3be7323ada5d1daeb52ff32549 + +info: + name: > + GREYD.SUITE <= 1.2.6 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a353133d-0b36-40cc-a4f8-d5083e6e67df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/greyd_suite/" + google-query: inurl:"/wp-content/plugins/greyd_suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,greyd_suite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/greyd_suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greyd_suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grid-kit-premium-ff22f0867ae120b77caf3636e99d73c8.yaml b/nuclei-templates/cve-less/plugins/grid-kit-premium-ff22f0867ae120b77caf3636e99d73c8.yaml new file mode 100644 index 0000000000..7e01c5e0b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grid-kit-premium-ff22f0867ae120b77caf3636e99d73c8.yaml @@ -0,0 +1,58 @@ +id: grid-kit-premium-ff22f0867ae120b77caf3636e99d73c8 + +info: + name: > + Grid Kit Premium < 2.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b3029c6-3a0f-4c83-8faf-f74d03852278?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grid-kit-premium/" + google-query: inurl:"/wp-content/plugins/grid-kit-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grid-kit-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grid-kit-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grid-kit-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grid-plus-12eb7534db6d3a6b596836d9096b1dfc.yaml b/nuclei-templates/cve-less/plugins/grid-plus-12eb7534db6d3a6b596836d9096b1dfc.yaml new file mode 100644 index 0000000000..bf202bc36e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grid-plus-12eb7534db6d3a6b596836d9096b1dfc.yaml @@ -0,0 +1,58 @@ +id: grid-plus-12eb7534db6d3a6b596836d9096b1dfc + +info: + name: > + Grid Plus <= 1.3.3 - Authenticated (Subscriber+) Local File Inclusion via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6407792-2c76-4149-a9f9-d53002135bec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grid-plus/" + google-query: inurl:"/wp-content/plugins/grid-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grid-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grid-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grid-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grid-plus-a7efe3d7340eefdf74e75d3be0901882.yaml b/nuclei-templates/cve-less/plugins/grid-plus-a7efe3d7340eefdf74e75d3be0901882.yaml new file mode 100644 index 0000000000..05768b3d23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grid-plus-a7efe3d7340eefdf74e75d3be0901882.yaml @@ -0,0 +1,58 @@ +id: grid-plus-a7efe3d7340eefdf74e75d3be0901882 + +info: + name: > + Grid Plus <= 1.3.2 - Missing Authorization to Authenticated (Subscriber+) Grid Layout Add/Update/Delete + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2d34c84-473c-49f8-b55c-c869b5479974?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grid-plus/" + google-query: inurl:"/wp-content/plugins/grid-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grid-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grid-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grid-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grid-plus-ae14a34996c3d427efe7873c20688c21.yaml b/nuclei-templates/cve-less/plugins/grid-plus-ae14a34996c3d427efe7873c20688c21.yaml new file mode 100644 index 0000000000..550a60e868 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grid-plus-ae14a34996c3d427efe7873c20688c21.yaml @@ -0,0 +1,58 @@ +id: grid-plus-ae14a34996c3d427efe7873c20688c21 + +info: + name: > + Grid Plus <= 1.3.4 - Reflected Cross-Site Scripting via grid_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b213baa-8508-4eb2-ac09-d320e2b4276c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grid-plus/" + google-query: inurl:"/wp-content/plugins/grid-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grid-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grid-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grid-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grid-shortcodes-0ddb5ade9834993cf7b74808814bcc80.yaml b/nuclei-templates/cve-less/plugins/grid-shortcodes-0ddb5ade9834993cf7b74808814bcc80.yaml new file mode 100644 index 0000000000..2a8d750f5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grid-shortcodes-0ddb5ade9834993cf7b74808814bcc80.yaml @@ -0,0 +1,58 @@ +id: grid-shortcodes-0ddb5ade9834993cf7b74808814bcc80 + +info: + name: > + Grid Shortcodes <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/722956ec-d2f5-42ad-bb95-776ad620d788?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grid-shortcodes/" + google-query: inurl:"/wp-content/plugins/grid-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grid-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grid-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grid-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gridlist-view-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/gridlist-view-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..2fe810baa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gridlist-view-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: gridlist-view-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gridlist-view-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/gridlist-view-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gridlist-view-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gridlist-view-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gridlist-view-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/grou-random-image-widget-c7a837e64827f8095f9260b40809766c.yaml b/nuclei-templates/cve-less/plugins/grou-random-image-widget-c7a837e64827f8095f9260b40809766c.yaml new file mode 100644 index 0000000000..4e6e8a71df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/grou-random-image-widget-c7a837e64827f8095f9260b40809766c.yaml @@ -0,0 +1,58 @@ +id: grou-random-image-widget-c7a837e64827f8095f9260b40809766c + +info: + name: > + Grou Random Image Widget <= 1.18 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/272c824a-0883-4c23-a814-bf0db3fec8a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/grou-random-image-widget/" + google-query: inurl:"/wp-content/plugins/grou-random-image-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,grou-random-image-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/grou-random-image-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "grou-random-image-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-01e6da1e967018241a8f36efe6fd50ba.yaml b/nuclei-templates/cve-less/plugins/groundhogg-01e6da1e967018241a8f36efe6fd50ba.yaml new file mode 100644 index 0000000000..f61ba7bc46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-01e6da1e967018241a8f36efe6fd50ba.yaml @@ -0,0 +1,58 @@ +id: groundhogg-01e6da1e967018241a8f36efe6fd50ba + +info: + name: > + WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg < 1.3.5 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/344b2f80-ea86-4bf0-8ee4-4b5c7b94c34b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-1d9266ecaa07d410393e4d47b4c9954f.yaml b/nuclei-templates/cve-less/plugins/groundhogg-1d9266ecaa07d410393e4d47b4c9954f.yaml new file mode 100644 index 0000000000..c801878480 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-1d9266ecaa07d410393e4d47b4c9954f.yaml @@ -0,0 +1,58 @@ +id: groundhogg-1d9266ecaa07d410393e4d47b4c9954f + +info: + name: > + Groundhogg <= 2.7.11 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4f2554d-c047-4be2-a4e6-2ae51f077376?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-5c29a3cc888c2b8f4800d87269906f2c.yaml b/nuclei-templates/cve-less/plugins/groundhogg-5c29a3cc888c2b8f4800d87269906f2c.yaml new file mode 100644 index 0000000000..343d1d32fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-5c29a3cc888c2b8f4800d87269906f2c.yaml @@ -0,0 +1,58 @@ +id: groundhogg-5c29a3cc888c2b8f4800d87269906f2c + +info: + name: > + Groundhogg <= 2.7.9.3 - Authenticated (Administrator)+ SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76c468cb-8ad6-4b62-8de5-dc8efd4b8e61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-653bfe16d9c86908e0bcfff0b6dd1c6e.yaml b/nuclei-templates/cve-less/plugins/groundhogg-653bfe16d9c86908e0bcfff0b6dd1c6e.yaml new file mode 100644 index 0000000000..302b466b7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-653bfe16d9c86908e0bcfff0b6dd1c6e.yaml @@ -0,0 +1,58 @@ +id: groundhogg-653bfe16d9c86908e0bcfff0b6dd1c6e + +info: + name: > + Groundhogg <= 2.7.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22506d45-40db-47c4-91b2-ab4f49703bf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-6b4accb527f76b2e4224aaf45a24e723.yaml b/nuclei-templates/cve-less/plugins/groundhogg-6b4accb527f76b2e4224aaf45a24e723.yaml new file mode 100644 index 0000000000..0f576d7dde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-6b4accb527f76b2e4224aaf45a24e723.yaml @@ -0,0 +1,58 @@ +id: groundhogg-6b4accb527f76b2e4224aaf45a24e723 + +info: + name: > + Groundhogg <= 1.3.11.13 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc69ec54-b30f-402e-ad3b-24fd680ea72b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.11.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-6f02fa76246cc8d01472e29b6032ad8f.yaml b/nuclei-templates/cve-less/plugins/groundhogg-6f02fa76246cc8d01472e29b6032ad8f.yaml new file mode 100644 index 0000000000..5e0be1c9fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-6f02fa76246cc8d01472e29b6032ad8f.yaml @@ -0,0 +1,58 @@ +id: groundhogg-6f02fa76246cc8d01472e29b6032ad8f + +info: + name: > + Groundhogg <= 2.7.9.8 - Missing Authorization to Admin Account and Ticket Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24747507-8f24-499e-a257-d379dc171e18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-7690dbacbae8cf712fa24f47448d84aa.yaml b/nuclei-templates/cve-less/plugins/groundhogg-7690dbacbae8cf712fa24f47448d84aa.yaml new file mode 100644 index 0000000000..609dbe5937 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-7690dbacbae8cf712fa24f47448d84aa.yaml @@ -0,0 +1,58 @@ +id: groundhogg-7690dbacbae8cf712fa24f47448d84aa + +info: + name: > + Groundhogg <= 2.7.9.8 - Missing Authorization to Update License + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29700844-b41d-4f10-90a7-06c8574d8d2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-8a471c08317f24a8f762c3b9912e1668.yaml b/nuclei-templates/cve-less/plugins/groundhogg-8a471c08317f24a8f762c3b9912e1668.yaml new file mode 100644 index 0000000000..67baa548a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-8a471c08317f24a8f762c3b9912e1668.yaml @@ -0,0 +1,58 @@ +id: groundhogg-8a471c08317f24a8f762c3b9912e1668 + +info: + name: > + Groundhogg <= 2.0.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2052278d-f1df-4a31-8688-11c7c8d20e07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-9bca420841e37204239e9083274e18ac.yaml b/nuclei-templates/cve-less/plugins/groundhogg-9bca420841e37204239e9083274e18ac.yaml new file mode 100644 index 0000000000..eb61bbb592 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-9bca420841e37204239e9083274e18ac.yaml @@ -0,0 +1,58 @@ +id: groundhogg-9bca420841e37204239e9083274e18ac + +info: + name: > + Groundhogg <= 2.7.9.8 - Cross-Site Request Forgery to Disable All Plugins + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af73240c-b711-4e91-9998-5f7e6a9a4fb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-a69ac85c2f382d8b82f7f44fd083ec69.yaml b/nuclei-templates/cve-less/plugins/groundhogg-a69ac85c2f382d8b82f7f44fd083ec69.yaml new file mode 100644 index 0000000000..26ce530ecb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-a69ac85c2f382d8b82f7f44fd083ec69.yaml @@ -0,0 +1,58 @@ +id: groundhogg-a69ac85c2f382d8b82f7f44fd083ec69 + +info: + name: > + Groundhogg <= 2.7.9.8 - Cross-Site Request Forgery to Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bf472f1-5980-48ee-aa10-aad19b6f2456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-b86dfb6f9dd8aa205cbc3842be669c7a.yaml b/nuclei-templates/cve-less/plugins/groundhogg-b86dfb6f9dd8aa205cbc3842be669c7a.yaml new file mode 100644 index 0000000000..35c416d062 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-b86dfb6f9dd8aa205cbc3842be669c7a.yaml @@ -0,0 +1,58 @@ +id: groundhogg-b86dfb6f9dd8aa205cbc3842be669c7a + +info: + name: > + Groundhogg <= 2.7.11.10 - Authenticated (Administrator+) Stored Cross-Site Scripting via Task Data + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edafc213-a95f-483e-ac5f-d5b56817d046?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.11.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-ea3614c57e168b5cbba1a64665aa3e41.yaml b/nuclei-templates/cve-less/plugins/groundhogg-ea3614c57e168b5cbba1a64665aa3e41.yaml new file mode 100644 index 0000000000..936ff9cf0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-ea3614c57e168b5cbba1a64665aa3e41.yaml @@ -0,0 +1,58 @@ +id: groundhogg-ea3614c57e168b5cbba1a64665aa3e41 + +info: + name: > + Groundhogg <= 2.7.9.8 - Missing Authorization to Non-Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c5bde0e-3138-4995-92ae-6deaf6b7be5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groundhogg-f995ec2617f1d8e01a76eb96ebc10f06.yaml b/nuclei-templates/cve-less/plugins/groundhogg-f995ec2617f1d8e01a76eb96ebc10f06.yaml new file mode 100644 index 0000000000..d4a78523f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groundhogg-f995ec2617f1d8e01a76eb96ebc10f06.yaml @@ -0,0 +1,58 @@ +id: groundhogg-f995ec2617f1d8e01a76eb96ebc10f06 + +info: + name: > + Groundhogg <= 2.7.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4938206e-2ea4-47ed-a307-87cf67dd74a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groundhogg/" + google-query: inurl:"/wp-content/plugins/groundhogg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groundhogg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groundhogg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groundhogg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/groupdocs-comparison-9ec1775f8427416318a9bdfcfd96cca2.yaml b/nuclei-templates/cve-less/plugins/groupdocs-comparison-9ec1775f8427416318a9bdfcfd96cca2.yaml new file mode 100644 index 0000000000..e4dca1c243 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/groupdocs-comparison-9ec1775f8427416318a9bdfcfd96cca2.yaml @@ -0,0 +1,58 @@ +id: groupdocs-comparison-9ec1775f8427416318a9bdfcfd96cca2 + +info: + name: > + GroupDocs.Comparison for Cloud < 1.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49b466a2-9f6d-431f-8118-7522394d2eed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/groupdocs-comparison/" + google-query: inurl:"/wp-content/plugins/groupdocs-comparison/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,groupdocs-comparison,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/groupdocs-comparison/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "groupdocs-comparison" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-books-showcase-2dfa9da72134b3fee9c376ecca6fe446.yaml b/nuclei-templates/cve-less/plugins/gs-books-showcase-2dfa9da72134b3fee9c376ecca6fe446.yaml new file mode 100644 index 0000000000..a7ad4c207b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-books-showcase-2dfa9da72134b3fee9c376ecca6fe446.yaml @@ -0,0 +1,58 @@ +id: gs-books-showcase-2dfa9da72134b3fee9c376ecca6fe446 + +info: + name: > + GS Books Showcase <= 1.3.0 - Authenticator (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26a9bcc5-4057-4cd5-afde-68a2d467c5a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-books-showcase/" + google-query: inurl:"/wp-content/plugins/gs-books-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-books-showcase,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-books-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-books-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-envato-portfolio-6238c45309a73e1d06001135fffb48d2.yaml b/nuclei-templates/cve-less/plugins/gs-envato-portfolio-6238c45309a73e1d06001135fffb48d2.yaml new file mode 100644 index 0000000000..c9bbab677f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-envato-portfolio-6238c45309a73e1d06001135fffb48d2.yaml @@ -0,0 +1,58 @@ +id: gs-envato-portfolio-6238c45309a73e1d06001135fffb48d2 + +info: + name: > + GS Portfolio for Envato <= 1.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6816cb4-0fad-417a-a980-d35a734bce13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-envato-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-envato-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-envato-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-envato-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-envato-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-facebook-comments-36c5b3d7d876a774f8fd4aa153e32524.yaml b/nuclei-templates/cve-less/plugins/gs-facebook-comments-36c5b3d7d876a774f8fd4aa153e32524.yaml new file mode 100644 index 0000000000..58cfef6aa1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-facebook-comments-36c5b3d7d876a774f8fd4aa153e32524.yaml @@ -0,0 +1,58 @@ +id: gs-facebook-comments-36c5b3d7d876a774f8fd4aa153e32524 + +info: + name: > + WP Social Comments <= 1.7.2 - Missing Authorization to Authenticated (Subscriber+) Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2f209e1-4837-404b-8e3e-63a9d842a944?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-facebook-comments/" + google-query: inurl:"/wp-content/plugins/gs-facebook-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-facebook-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-facebook-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-facebook-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-facebook-comments-51018cf0109648dade76eaf03756855f.yaml b/nuclei-templates/cve-less/plugins/gs-facebook-comments-51018cf0109648dade76eaf03756855f.yaml new file mode 100644 index 0000000000..c6c4d636bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-facebook-comments-51018cf0109648dade76eaf03756855f.yaml @@ -0,0 +1,58 @@ +id: gs-facebook-comments-51018cf0109648dade76eaf03756855f + +info: + name: > + WP Social Comments <= 1.7.3 - Missing Authorization via wpfc_allow_comments() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba2ff1ab-f981-417d-b400-13750c9320ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-facebook-comments/" + google-query: inurl:"/wp-content/plugins/gs-facebook-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-facebook-comments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-facebook-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-facebook-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-instagram-portfolio-bb81738a1483724d89303a6a2b8b759f.yaml b/nuclei-templates/cve-less/plugins/gs-instagram-portfolio-bb81738a1483724d89303a6a2b8b759f.yaml new file mode 100644 index 0000000000..7e350b2744 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-instagram-portfolio-bb81738a1483724d89303a6a2b8b759f.yaml @@ -0,0 +1,58 @@ +id: gs-instagram-portfolio-bb81738a1483724d89303a6a2b8b759f + +info: + name: > + GS Insever Portfolio <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7770ab04-eb40-450e-ab8a-2a8e5d13d4a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-instagram-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-instagram-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-instagram-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-instagram-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-instagram-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-instagram-portfolio-e4d780c0204ebc51d13bc9ff3d0c837f.yaml b/nuclei-templates/cve-less/plugins/gs-instagram-portfolio-e4d780c0204ebc51d13bc9ff3d0c837f.yaml new file mode 100644 index 0000000000..a728c29a69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-instagram-portfolio-e4d780c0204ebc51d13bc9ff3d0c837f.yaml @@ -0,0 +1,58 @@ +id: gs-instagram-portfolio-e4d780c0204ebc51d13bc9ff3d0c837f + +info: + name: > + GS Insever Portfolio <= 1.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15c8addc-e40b-4ad2-9e7b-c721d10164d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-instagram-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-instagram-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-instagram-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-instagram-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-instagram-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-logo-slider-3a1240a24a2dd47c008d450b098689b3.yaml b/nuclei-templates/cve-less/plugins/gs-logo-slider-3a1240a24a2dd47c008d450b098689b3.yaml new file mode 100644 index 0000000000..370452a1a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-logo-slider-3a1240a24a2dd47c008d450b098689b3.yaml @@ -0,0 +1,58 @@ +id: gs-logo-slider-3a1240a24a2dd47c008d450b098689b3 + +info: + name: > + GS Logo Slider <= 3.5.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c89a8001-ab50-466c-aa51-62c0ff5f86dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-logo-slider/" + google-query: inurl:"/wp-content/plugins/gs-logo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-logo-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-logo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-logo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-logo-slider-ee05a64bbaf03a516917796674375367.yaml b/nuclei-templates/cve-less/plugins/gs-logo-slider-ee05a64bbaf03a516917796674375367.yaml new file mode 100644 index 0000000000..a441d08002 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-logo-slider-ee05a64bbaf03a516917796674375367.yaml @@ -0,0 +1,58 @@ +id: gs-logo-slider-ee05a64bbaf03a516917796674375367 + +info: + name: > + GS Logo Slider – Ticker, Grid, List, Table & Filter Views <= 3.3.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4f018c-483b-4435-a8b1-f18e5f843507?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-logo-slider/" + google-query: inurl:"/wp-content/plugins/gs-logo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-logo-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-logo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-logo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-0e5cb6701f47f915bf3484f8aa48343f.yaml b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-0e5cb6701f47f915bf3484f8aa48343f.yaml new file mode 100644 index 0000000000..58bcb04d5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-0e5cb6701f47f915bf3484f8aa48343f.yaml @@ -0,0 +1,58 @@ +id: gs-pinterest-portfolio-0e5cb6701f47f915bf3484f8aa48343f + +info: + name: > + GS Pins for Pinterest Lite <= 1.8.0 - Missing Authorization via _update_shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f81003b-8214-4fa3-960f-81b166623de9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-pinterest-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-pinterest-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-pinterest-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-pinterest-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-pinterest-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..cfe33aac9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: gs-pinterest-portfolio-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-pinterest-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-pinterest-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-pinterest-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-pinterest-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-pinterest-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-51cfef8c45760573f4f3cc1655e5ab39.yaml b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-51cfef8c45760573f4f3cc1655e5ab39.yaml new file mode 100644 index 0000000000..d452dcfebb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-51cfef8c45760573f4f3cc1655e5ab39.yaml @@ -0,0 +1,58 @@ +id: gs-pinterest-portfolio-51cfef8c45760573f4f3cc1655e5ab39 + +info: + name: > + WordPress Pinterest Plugin <= 1.6.1 - Stored (Contributor+) Cross-Site Scripting via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20daf751-176d-48f2-ac68-480fda89cee1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-pinterest-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-pinterest-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-pinterest-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-pinterest-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-pinterest-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-565c3a27c2a7060808c53a2711e80a32.yaml b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-565c3a27c2a7060808c53a2711e80a32.yaml new file mode 100644 index 0000000000..f8d3c7dd75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-565c3a27c2a7060808c53a2711e80a32.yaml @@ -0,0 +1,58 @@ +id: gs-pinterest-portfolio-565c3a27c2a7060808c53a2711e80a32 + +info: + name: > + GS Pins for Pinterest <= 1.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shorcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5fbca66-403e-41bc-8f80-3fb56d4b9c66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-pinterest-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-pinterest-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-pinterest-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-pinterest-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-pinterest-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..28b91b6752 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-pinterest-portfolio-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: gs-pinterest-portfolio-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-pinterest-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-pinterest-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-pinterest-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-pinterest-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-pinterest-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-portfolio-876486fa06bffb3829a9c77f08f98e1b.yaml b/nuclei-templates/cve-less/plugins/gs-portfolio-876486fa06bffb3829a9c77f08f98e1b.yaml new file mode 100644 index 0000000000..ee04c12c03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-portfolio-876486fa06bffb3829a9c77f08f98e1b.yaml @@ -0,0 +1,58 @@ +id: gs-portfolio-876486fa06bffb3829a9c77f08f98e1b + +info: + name: > + GS Filterable Portfolio <= 1.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f531489b-a87d-41e7-a988-8b29840047ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-portfolio/" + google-query: inurl:"/wp-content/plugins/gs-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-team-members-89d1ae974c3297f3be00b2900b223ee4.yaml b/nuclei-templates/cve-less/plugins/gs-team-members-89d1ae974c3297f3be00b2900b223ee4.yaml new file mode 100644 index 0000000000..3eb12a74cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-team-members-89d1ae974c3297f3be00b2900b223ee4.yaml @@ -0,0 +1,58 @@ +id: gs-team-members-89d1ae974c3297f3be00b2900b223ee4 + +info: + name: > + GS Team Members <= 2.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c146f89c-5df3-4aaf-b880-0ce6016dfb6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-team-members/" + google-query: inurl:"/wp-content/plugins/gs-team-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-team-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-team-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-team-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-team-members-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/gs-team-members-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b20e06f035 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-team-members-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: gs-team-members-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-team-members/" + google-query: inurl:"/wp-content/plugins/gs-team-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-team-members,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-team-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-team-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-testimonial-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/gs-testimonial-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..8176f8b91c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-testimonial-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: gs-testimonial-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-testimonial/" + google-query: inurl:"/wp-content/plugins/gs-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-testimonial,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-testimonial-7cf1733a0fcabc72e1599e5c6fa6e184.yaml b/nuclei-templates/cve-less/plugins/gs-testimonial-7cf1733a0fcabc72e1599e5c6fa6e184.yaml new file mode 100644 index 0000000000..54648f215f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-testimonial-7cf1733a0fcabc72e1599e5c6fa6e184.yaml @@ -0,0 +1,58 @@ +id: gs-testimonial-7cf1733a0fcabc72e1599e5c6fa6e184 + +info: + name: > + GS Testimonial Slider <= 3.1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/266507cf-f458-47f8-b18a-81860e6cce3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-testimonial/" + google-query: inurl:"/wp-content/plugins/gs-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-testimonial-95b4227a0d3d41c249f2bf8ed2c425e5.yaml b/nuclei-templates/cve-less/plugins/gs-testimonial-95b4227a0d3d41c249f2bf8ed2c425e5.yaml new file mode 100644 index 0000000000..22a495576f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-testimonial-95b4227a0d3d41c249f2bf8ed2c425e5.yaml @@ -0,0 +1,58 @@ +id: gs-testimonial-95b4227a0d3d41c249f2bf8ed2c425e5 + +info: + name: > + GS Testimonial Slider <= 1.9.6 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/805d70d8-084b-4849-bf3e-c9cc7ec02bc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-testimonial/" + google-query: inurl:"/wp-content/plugins/gs-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-testimonial-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/gs-testimonial-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..caeafa2e37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-testimonial-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: gs-testimonial-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-testimonial/" + google-query: inurl:"/wp-content/plugins/gs-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-testimonial-d8076a607a4a2cad3434e6393a4159d1.yaml b/nuclei-templates/cve-less/plugins/gs-testimonial-d8076a607a4a2cad3434e6393a4159d1.yaml new file mode 100644 index 0000000000..97e4e57f02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-testimonial-d8076a607a4a2cad3434e6393a4159d1.yaml @@ -0,0 +1,58 @@ +id: gs-testimonial-d8076a607a4a2cad3434e6393a4159d1 + +info: + name: > + GS Testimonial Slider <= 1.9.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5402c009-f3c0-4286-9162-6e60322c5544?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-testimonial/" + google-query: inurl:"/wp-content/plugins/gs-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gs-woocommerce-products-slider-1735d30fe988ff978861d4dbdb0c640e.yaml b/nuclei-templates/cve-less/plugins/gs-woocommerce-products-slider-1735d30fe988ff978861d4dbdb0c640e.yaml new file mode 100644 index 0000000000..35980dde14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gs-woocommerce-products-slider-1735d30fe988ff978861d4dbdb0c640e.yaml @@ -0,0 +1,58 @@ +id: gs-woocommerce-products-slider-1735d30fe988ff978861d4dbdb0c640e + +info: + name: > + GS Products Slider for WooCommerce <= 1.5.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff129569-223d-4d38-9f3a-eb2596214d3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gs-woocommerce-products-slider/" + google-query: inurl:"/wp-content/plugins/gs-woocommerce-products-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gs-woocommerce-products-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gs-woocommerce-products-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gs-woocommerce-products-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gseor-3c35d6ca8d97eaaa9d359ed4e523fe3c.yaml b/nuclei-templates/cve-less/plugins/gseor-3c35d6ca8d97eaaa9d359ed4e523fe3c.yaml new file mode 100644 index 0000000000..9f498a9e16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gseor-3c35d6ca8d97eaaa9d359ed4e523fe3c.yaml @@ -0,0 +1,58 @@ +id: gseor-3c35d6ca8d97eaaa9d359ed4e523fe3c + +info: + name: > + GSEOR – WordPress SEO Plugin <= 1.3 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d534a1e-280d-418d-b497-1f3e6f3a20fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gseor/" + google-query: inurl:"/wp-content/plugins/gseor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gseor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gseor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gseor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gsheetconnector-caldera-forms-48accc4aa9cbb4e6e06e0f437230bfc4.yaml b/nuclei-templates/cve-less/plugins/gsheetconnector-caldera-forms-48accc4aa9cbb4e6e06e0f437230bfc4.yaml new file mode 100644 index 0000000000..050be5ad43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gsheetconnector-caldera-forms-48accc4aa9cbb4e6e06e0f437230bfc4.yaml @@ -0,0 +1,58 @@ +id: gsheetconnector-caldera-forms-48accc4aa9cbb4e6e06e0f437230bfc4 + +info: + name: > + Caldera Forms Google Sheets Connector <= 1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5ec03e9-06bb-4677-b480-4ebdb33acd08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gsheetconnector-caldera-forms/" + google-query: inurl:"/wp-content/plugins/gsheetconnector-caldera-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gsheetconnector-caldera-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gsheetconnector-caldera-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gsheetconnector-caldera-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gsheetconnector-for-elementor-forms-5bdb93ed09679c782c93a7aa96190eff.yaml b/nuclei-templates/cve-less/plugins/gsheetconnector-for-elementor-forms-5bdb93ed09679c782c93a7aa96190eff.yaml new file mode 100644 index 0000000000..0e9b1fcc64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gsheetconnector-for-elementor-forms-5bdb93ed09679c782c93a7aa96190eff.yaml @@ -0,0 +1,58 @@ +id: gsheetconnector-for-elementor-forms-5bdb93ed09679c782c93a7aa96190eff + +info: + name: > + Elementor Forms Google Sheet Connector <= 1.0.6 - Reflected Cross-Site Scripting via 'code' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ac577f4-2e61-4b72-881e-6fbbfd268f7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gsheetconnector-for-elementor-forms/" + google-query: inurl:"/wp-content/plugins/gsheetconnector-for-elementor-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gsheetconnector-for-elementor-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gsheetconnector-for-elementor-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gsheetconnector-for-elementor-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gsheetconnector-for-elementor-forms-pro-5bdb93ed09679c782c93a7aa96190eff.yaml b/nuclei-templates/cve-less/plugins/gsheetconnector-for-elementor-forms-pro-5bdb93ed09679c782c93a7aa96190eff.yaml new file mode 100644 index 0000000000..3bfecf5cc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gsheetconnector-for-elementor-forms-pro-5bdb93ed09679c782c93a7aa96190eff.yaml @@ -0,0 +1,58 @@ +id: gsheetconnector-for-elementor-forms-pro-5bdb93ed09679c782c93a7aa96190eff + +info: + name: > + Elementor Forms Google Sheet Connector <= 1.0.6 - Reflected Cross-Site Scripting via 'code' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ac577f4-2e61-4b72-881e-6fbbfd268f7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gsheetconnector-for-elementor-forms-pro/" + google-query: inurl:"/wp-content/plugins/gsheetconnector-for-elementor-forms-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gsheetconnector-for-elementor-forms-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gsheetconnector-for-elementor-forms-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gsheetconnector-for-elementor-forms-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gsheetconnector-gravity-forms-d84c432825dde022913bf769b768726f.yaml b/nuclei-templates/cve-less/plugins/gsheetconnector-gravity-forms-d84c432825dde022913bf769b768726f.yaml new file mode 100644 index 0000000000..5e23ba352a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gsheetconnector-gravity-forms-d84c432825dde022913bf769b768726f.yaml @@ -0,0 +1,58 @@ +id: gsheetconnector-gravity-forms-d84c432825dde022913bf769b768726f + +info: + name: > + Gravity Forms Google Sheet Connector <= 1.3.4 - Cross-Site Request Forgery via verify_code_integation_new + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dea1e775-68b4-45e6-9d90-41e39d5d0dfd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gsheetconnector-gravity-forms/" + google-query: inurl:"/wp-content/plugins/gsheetconnector-gravity-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gsheetconnector-gravity-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gsheetconnector-gravity-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gsheetconnector-gravity-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gsheetconnector-ninja-forms-faac6d1ff1697000b9b14ca585be6ab0.yaml b/nuclei-templates/cve-less/plugins/gsheetconnector-ninja-forms-faac6d1ff1697000b9b14ca585be6ab0.yaml new file mode 100644 index 0000000000..76e6234da5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gsheetconnector-ninja-forms-faac6d1ff1697000b9b14ca585be6ab0.yaml @@ -0,0 +1,58 @@ +id: gsheetconnector-ninja-forms-faac6d1ff1697000b9b14ca585be6ab0 + +info: + name: > + Ninja Forms Google Sheet Connector <= 1.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/559a92e0-609e-415f-aab3-649a185eb431?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gsheetconnector-ninja-forms/" + google-query: inurl:"/wp-content/plugins/gsheetconnector-ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gsheetconnector-ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gsheetconnector-ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gsheetconnector-ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gsheetconnector-ninja-forms-pro-faac6d1ff1697000b9b14ca585be6ab0.yaml b/nuclei-templates/cve-less/plugins/gsheetconnector-ninja-forms-pro-faac6d1ff1697000b9b14ca585be6ab0.yaml new file mode 100644 index 0000000000..30e8a25a28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gsheetconnector-ninja-forms-pro-faac6d1ff1697000b9b14ca585be6ab0.yaml @@ -0,0 +1,58 @@ +id: gsheetconnector-ninja-forms-pro-faac6d1ff1697000b9b14ca585be6ab0 + +info: + name: > + Ninja Forms Google Sheet Connector <= 1.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/559a92e0-609e-415f-aab3-649a185eb431?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gsheetconnector-ninja-forms-pro/" + google-query: inurl:"/wp-content/plugins/gsheetconnector-ninja-forms-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gsheetconnector-ninja-forms-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gsheetconnector-ninja-forms-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gsheetconnector-ninja-forms-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gsheetconnector-wpforms-2c53b255c00d529e8b580e9b919c837b.yaml b/nuclei-templates/cve-less/plugins/gsheetconnector-wpforms-2c53b255c00d529e8b580e9b919c837b.yaml new file mode 100644 index 0000000000..46d69cd0b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gsheetconnector-wpforms-2c53b255c00d529e8b580e9b919c837b.yaml @@ -0,0 +1,58 @@ +id: gsheetconnector-wpforms-2c53b255c00d529e8b580e9b919c837b + +info: + name: > + WPForms Google Sheet Connector <= 3.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75067f95-48b6-4c1d-8d8b-2601185b1f81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gsheetconnector-wpforms/" + google-query: inurl:"/wp-content/plugins/gsheetconnector-wpforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gsheetconnector-wpforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gsheetconnector-wpforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gsheetconnector-wpforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gsheetconnector-wpforms-pro-2c53b255c00d529e8b580e9b919c837b.yaml b/nuclei-templates/cve-less/plugins/gsheetconnector-wpforms-pro-2c53b255c00d529e8b580e9b919c837b.yaml new file mode 100644 index 0000000000..09bc517fd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gsheetconnector-wpforms-pro-2c53b255c00d529e8b580e9b919c837b.yaml @@ -0,0 +1,58 @@ +id: gsheetconnector-wpforms-pro-2c53b255c00d529e8b580e9b919c837b + +info: + name: > + WPForms Google Sheet Connector <= 3.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75067f95-48b6-4c1d-8d8b-2601185b1f81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gsheetconnector-wpforms-pro/" + google-query: inurl:"/wp-content/plugins/gsheetconnector-wpforms-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gsheetconnector-wpforms-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gsheetconnector-wpforms-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gsheetconnector-wpforms-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gslideshow-216bc7429720f3a1737645ac0bc074a0.yaml b/nuclei-templates/cve-less/plugins/gslideshow-216bc7429720f3a1737645ac0bc074a0.yaml new file mode 100644 index 0000000000..f5ae97daef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gslideshow-216bc7429720f3a1737645ac0bc074a0.yaml @@ -0,0 +1,58 @@ +id: gslideshow-216bc7429720f3a1737645ac0bc074a0 + +info: + name: > + gSlideShow <= 0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be0e0e79-00c3-4237-ac65-9c5df625dd89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gslideshow/" + google-query: inurl:"/wp-content/plugins/gslideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gslideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gslideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gslideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gt3-photo-video-gallery-931f5de56d92dfa4c2d39579eb08aff8.yaml b/nuclei-templates/cve-less/plugins/gt3-photo-video-gallery-931f5de56d92dfa4c2d39579eb08aff8.yaml new file mode 100644 index 0000000000..8c6a7bca00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gt3-photo-video-gallery-931f5de56d92dfa4c2d39579eb08aff8.yaml @@ -0,0 +1,58 @@ +id: gt3-photo-video-gallery-931f5de56d92dfa4c2d39579eb08aff8 + +info: + name: > + Photo Gallery - GT3 Image Gallery & Gutenberg Block Gallery <= 2.7.7.21 - Authenticated (Author+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06ef1f0c-fdcc-4aaf-9e48-19b5be52351d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gt3-photo-video-gallery/" + google-query: inurl:"/wp-content/plugins/gt3-photo-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gt3-photo-video-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gt3-photo-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gt3-photo-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.7.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtm-server-side-9d901cc0b99cacc346adcfb2e44aed31.yaml b/nuclei-templates/cve-less/plugins/gtm-server-side-9d901cc0b99cacc346adcfb2e44aed31.yaml new file mode 100644 index 0000000000..439fa9732c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtm-server-side-9d901cc0b99cacc346adcfb2e44aed31.yaml @@ -0,0 +1,58 @@ +id: gtm-server-side-9d901cc0b99cacc346adcfb2e44aed31 + +info: + name: > + GTM Server Side <= 1.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35b46587-1c6e-4d3f-a8d0-e7797cee882d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtm-server-side/" + google-query: inurl:"/wp-content/plugins/gtm-server-side/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtm-server-side,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtm-server-side/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtm-server-side" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-118d3bbf1129a6179234e3b857cad279.yaml b/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-118d3bbf1129a6179234e3b857cad279.yaml new file mode 100644 index 0000000000..34b5fcf87b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-118d3bbf1129a6179234e3b857cad279.yaml @@ -0,0 +1,58 @@ +id: gtmetrix-for-wordpress-118d3bbf1129a6179234e3b857cad279 + +info: + name: > + GTmetrix for WordPress <= 0.4.5 - Reflected Cross-Site Scripting via 'url' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcdf22be-8af4-4596-b138-67ebfd04c06d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtmetrix-for-wordpress/" + google-query: inurl:"/wp-content/plugins/gtmetrix-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtmetrix-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtmetrix-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtmetrix-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-241dd4c3f2d34cca641cc14b2238e0fd.yaml b/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-241dd4c3f2d34cca641cc14b2238e0fd.yaml new file mode 100644 index 0000000000..4c7f6bf019 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-241dd4c3f2d34cca641cc14b2238e0fd.yaml @@ -0,0 +1,58 @@ +id: gtmetrix-for-wordpress-241dd4c3f2d34cca641cc14b2238e0fd + +info: + name: > + GTmetrix for WordPress <= 0.4.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9958d7d7-ddeb-42f4-a5bd-6dd55ec9b6e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtmetrix-for-wordpress/" + google-query: inurl:"/wp-content/plugins/gtmetrix-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtmetrix-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtmetrix-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtmetrix-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-8d4923c8fc18392ea1fb56e01269ce95.yaml b/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-8d4923c8fc18392ea1fb56e01269ce95.yaml new file mode 100644 index 0000000000..550b8218c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtmetrix-for-wordpress-8d4923c8fc18392ea1fb56e01269ce95.yaml @@ -0,0 +1,58 @@ +id: gtmetrix-for-wordpress-8d4923c8fc18392ea1fb56e01269ce95 + +info: + name: > + GTmetrix for WordPress <= 0.4.6 - Reflected Cross-Site Scripting via 'report_id' and 'event_id' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abe50539-f6a9-476a-a408-4f94f7f31fcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtmetrix-for-wordpress/" + google-query: inurl:"/wp-content/plugins/gtmetrix-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtmetrix-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtmetrix-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtmetrix-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtranslate-49b5433838cce19f05784e59c6e0d7f6.yaml b/nuclei-templates/cve-less/plugins/gtranslate-49b5433838cce19f05784e59c6e0d7f6.yaml new file mode 100644 index 0000000000..a975a5ab5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtranslate-49b5433838cce19f05784e59c6e0d7f6.yaml @@ -0,0 +1,58 @@ +id: gtranslate-49b5433838cce19f05784e59c6e0d7f6 + +info: + name: > + Translate WordPress with GTranslate <= 2.8.10 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b980b8e2-73e6-4afc-a24c-c7c98283e85b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtranslate/" + google-query: inurl:"/wp-content/plugins/gtranslate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtranslate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtranslate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtranslate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtranslate-530119b641fe83b81bd9470a37532801.yaml b/nuclei-templates/cve-less/plugins/gtranslate-530119b641fe83b81bd9470a37532801.yaml new file mode 100644 index 0000000000..a69af53776 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtranslate-530119b641fe83b81bd9470a37532801.yaml @@ -0,0 +1,58 @@ +id: gtranslate-530119b641fe83b81bd9470a37532801 + +info: + name: > + Translate WordPress with GTranslate <= 2.9.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69f54737-4b0f-49ba-a331-1b252a5e45cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtranslate/" + google-query: inurl:"/wp-content/plugins/gtranslate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtranslate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtranslate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtranslate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtranslate-5ebef968ecfba23771708b1d7c8b6112.yaml b/nuclei-templates/cve-less/plugins/gtranslate-5ebef968ecfba23771708b1d7c8b6112.yaml new file mode 100644 index 0000000000..21769a5f16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtranslate-5ebef968ecfba23771708b1d7c8b6112.yaml @@ -0,0 +1,58 @@ +id: gtranslate-5ebef968ecfba23771708b1d7c8b6112 + +info: + name: > + GTranslate <= 3.0.3 - Authenticated (Administrator+) Cross-Site Scripting via Multiple Parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e24be91-6a58-42c3-84dd-4090da55b720?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtranslate/" + google-query: inurl:"/wp-content/plugins/gtranslate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtranslate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtranslate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtranslate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtranslate-d02f0d7121f40075980c3a177c578c3f.yaml b/nuclei-templates/cve-less/plugins/gtranslate-d02f0d7121f40075980c3a177c578c3f.yaml new file mode 100644 index 0000000000..0c15445a8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtranslate-d02f0d7121f40075980c3a177c578c3f.yaml @@ -0,0 +1,58 @@ +id: gtranslate-d02f0d7121f40075980c3a177c578c3f + +info: + name: > + Translate WordPress with GTranslate <= 2.9.8 & Translate WordPress – Google Language Translator <= 6.0.13 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff21e539-8ba0-4edd-a90c-27a4cd1cdbc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtranslate/" + google-query: inurl:"/wp-content/plugins/gtranslate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtranslate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtranslate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtranslate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtranslate-e193e03e756910d1d1e9b9cc6d320432.yaml b/nuclei-templates/cve-less/plugins/gtranslate-e193e03e756910d1d1e9b9cc6d320432.yaml new file mode 100644 index 0000000000..b47d1782a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtranslate-e193e03e756910d1d1e9b9cc6d320432.yaml @@ -0,0 +1,58 @@ +id: gtranslate-e193e03e756910d1d1e9b9cc6d320432 + +info: + name: > + GTranslate Pro and GTranslate Enterprise <= 2.8.64 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6ae7c9f-852d-428f-a469-6bfeead53db5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtranslate/" + google-query: inurl:"/wp-content/plugins/gtranslate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtranslate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtranslate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtranslate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gtranslate-e57cb75d56b89999570d9a342a44a60a.yaml b/nuclei-templates/cve-less/plugins/gtranslate-e57cb75d56b89999570d9a342a44a60a.yaml new file mode 100644 index 0000000000..a164db1a8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gtranslate-e57cb75d56b89999570d9a342a44a60a.yaml @@ -0,0 +1,58 @@ +id: gtranslate-e57cb75d56b89999570d9a342a44a60a + +info: + name: > + GTranslate <= 2.8.51 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe086290-f3d3-4d28-bb5c-11fbbb1364b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gtranslate/" + google-query: inurl:"/wp-content/plugins/gtranslate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gtranslate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gtranslate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gtranslate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/guardgiant-ca496e63542b74a88b0b8dd7fd0ebb0c.yaml b/nuclei-templates/cve-less/plugins/guardgiant-ca496e63542b74a88b0b8dd7fd0ebb0c.yaml new file mode 100644 index 0000000000..1f3be4462a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/guardgiant-ca496e63542b74a88b0b8dd7fd0ebb0c.yaml @@ -0,0 +1,58 @@ +id: guardgiant-ca496e63542b74a88b0b8dd7fd0ebb0c + +info: + name: > + WordPress Brute Force Protection – Stop Brute Force Attacks <= 2.2.5 - Authenticated (Administrator+) SQL Injection via orderby + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d3f7676-5ab0-4fe0-a0be-786f4cf84056?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/guardgiant/" + google-query: inurl:"/wp-content/plugins/guardgiant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,guardgiant,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/guardgiant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "guardgiant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/guest-author-9b2b2cc106e50e817ce608f745dbdaed.yaml b/nuclei-templates/cve-less/plugins/guest-author-9b2b2cc106e50e817ce608f745dbdaed.yaml new file mode 100644 index 0000000000..7b216fd0b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/guest-author-9b2b2cc106e50e817ce608f745dbdaed.yaml @@ -0,0 +1,58 @@ +id: guest-author-9b2b2cc106e50e817ce608f745dbdaed + +info: + name: > + Guest Author <= 2.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b7d7b64-8194-4b81-83f5-1f3b23109455?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/guest-author/" + google-query: inurl:"/wp-content/plugins/guest-author/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,guest-author,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/guest-author/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "guest-author" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/guest-author-bcd6b988167c1612bb5048004783e4f5.yaml b/nuclei-templates/cve-less/plugins/guest-author-bcd6b988167c1612bb5048004783e4f5.yaml new file mode 100644 index 0000000000..08f31a904a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/guest-author-bcd6b988167c1612bb5048004783e4f5.yaml @@ -0,0 +1,58 @@ +id: guest-author-bcd6b988167c1612bb5048004783e4f5 + +info: + name: > + Guest Author <= 2.3 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78fd9dcf-228e-46ec-b34f-2cb0c87cc895?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/guest-author/" + google-query: inurl:"/wp-content/plugins/guest-author/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,guest-author,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/guest-author/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "guest-author" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/guest-author-name-982e9cfa43c440d5e945696eaf09286b.yaml b/nuclei-templates/cve-less/plugins/guest-author-name-982e9cfa43c440d5e945696eaf09286b.yaml new file mode 100644 index 0000000000..06f28a003d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/guest-author-name-982e9cfa43c440d5e945696eaf09286b.yaml @@ -0,0 +1,58 @@ +id: guest-author-name-982e9cfa43c440d5e945696eaf09286b + +info: + name: > + (Simply) Guest Author Name <= 4.34 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e9e2864-6624-497f-8bec-df8360ed3f4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/guest-author-name/" + google-query: inurl:"/wp-content/plugins/guest-author-name/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,guest-author-name,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/guest-author-name/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "guest-author-name" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/guestofy-restaurant-reservations-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/guestofy-restaurant-reservations-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..caffe0ec1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/guestofy-restaurant-reservations-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: guestofy-restaurant-reservations-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/guestofy-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/guestofy-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,guestofy-restaurant-reservations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/guestofy-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "guestofy-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gum-elementor-addon-dd93174b0504049ccc03e08eec846159.yaml b/nuclei-templates/cve-less/plugins/gum-elementor-addon-dd93174b0504049ccc03e08eec846159.yaml new file mode 100644 index 0000000000..15192f3924 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gum-elementor-addon-dd93174b0504049ccc03e08eec846159.yaml @@ -0,0 +1,58 @@ +id: gum-elementor-addon-dd93174b0504049ccc03e08eec846159 + +info: + name: > + Gum Elementor Addon <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Meta Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ade1eddf-cfcc-4956-8015-8d9a592cc252?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gum-elementor-addon/" + google-query: inurl:"/wp-content/plugins/gum-elementor-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gum-elementor-addon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gum-elementor-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gum-elementor-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gumroad-f295e8a8427ef02d3b3be1982f4ae5fa.yaml b/nuclei-templates/cve-less/plugins/gumroad-f295e8a8427ef02d3b3be1982f4ae5fa.yaml new file mode 100644 index 0000000000..6b1990eec4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gumroad-f295e8a8427ef02d3b3be1982f4ae5fa.yaml @@ -0,0 +1,58 @@ +id: gumroad-f295e8a8427ef02d3b3be1982f4ae5fa + +info: + name: > + Gumroad <= 3.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd2abab4-f93c-454d-928d-128a490da0e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gumroad/" + google-query: inurl:"/wp-content/plugins/gumroad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gumroad,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gumroad/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gumroad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/guruwalk-affiliates-a6e719c0412296476082fdb1b971690e.yaml b/nuclei-templates/cve-less/plugins/guruwalk-affiliates-a6e719c0412296476082fdb1b971690e.yaml new file mode 100644 index 0000000000..049b1f7f13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/guruwalk-affiliates-a6e719c0412296476082fdb1b971690e.yaml @@ -0,0 +1,58 @@ +id: guruwalk-affiliates-a6e719c0412296476082fdb1b971690e + +info: + name: > + GuruWalk Affiliates <= 1.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b2714f7-9877-4d3d-a692-70fbf8584728?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/guruwalk-affiliates/" + google-query: inurl:"/wp-content/plugins/guruwalk-affiliates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,guruwalk-affiliates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/guruwalk-affiliates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "guruwalk-affiliates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gutenberg-dea122a140ad8ae54d1e3b79712b8d73.yaml b/nuclei-templates/cve-less/plugins/gutenberg-dea122a140ad8ae54d1e3b79712b8d73.yaml new file mode 100644 index 0000000000..0485875a73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gutenberg-dea122a140ad8ae54d1e3b79712b8d73.yaml @@ -0,0 +1,58 @@ +id: gutenberg-dea122a140ad8ae54d1e3b79712b8d73 + +info: + name: > + Gutenberg 12.9.0 - 18.0.0 - Unauthenticated & Authenticated (Contributor+) Stored Cross-Site Scripting via Avatar Block + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f26380-0bc2-4fe7-9e9d-05c688c201f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gutenberg/" + google-query: inurl:"/wp-content/plugins/gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gutenberg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 12.9.0', '<= 18.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gutenslider-6a7d0f10989c55df0c2d186c1333c6d5.yaml b/nuclei-templates/cve-less/plugins/gutenslider-6a7d0f10989c55df0c2d186c1333c6d5.yaml new file mode 100644 index 0000000000..981fad3e5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gutenslider-6a7d0f10989c55df0c2d186c1333c6d5.yaml @@ -0,0 +1,58 @@ +id: gutenslider-6a7d0f10989c55df0c2d186c1333c6d5 + +info: + name: > + WordPress Slider Block Gutenslider <= 5.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/095cc3dc-7a3e-473f-a762-de327c7ef28b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gutenslider/" + google-query: inurl:"/wp-content/plugins/gutenslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gutenslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gutenslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gutenslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gutenslider-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/gutenslider-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..51411f818d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gutenslider-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: gutenslider-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gutenslider/" + google-query: inurl:"/wp-content/plugins/gutenslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gutenslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gutenslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gutenslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gutenverse-c512399e58b223011a17608d4b51ac26.yaml b/nuclei-templates/cve-less/plugins/gutenverse-c512399e58b223011a17608d4b51ac26.yaml new file mode 100644 index 0000000000..81623d917e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gutenverse-c512399e58b223011a17608d4b51ac26.yaml @@ -0,0 +1,58 @@ +id: gutenverse-c512399e58b223011a17608d4b51ac26 + +info: + name: > + Gutenverse <= 1.9.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8056af63-e81f-4321-991e-d201ad1095c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gutenverse/" + google-query: inurl:"/wp-content/plugins/gutenverse/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gutenverse,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gutenverse/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gutenverse" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gutenverse-f66a440cd899e10b9d3c84e8064d84c8.yaml b/nuclei-templates/cve-less/plugins/gutenverse-f66a440cd899e10b9d3c84e8064d84c8.yaml new file mode 100644 index 0000000000..eb2983c852 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gutenverse-f66a440cd899e10b9d3c84e8064d84c8.yaml @@ -0,0 +1,58 @@ +id: gutenverse-f66a440cd899e10b9d3c84e8064d84c8 + +info: + name: > + Gutenverse <= 1.8.5 - Missing Authorization via 'data/update' API Endpoint + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c4e1d2c-bb20-40b7-90a3-96df68d083b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gutenverse/" + google-query: inurl:"/wp-content/plugins/gutenverse/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gutenverse,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gutenverse/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gutenverse" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gwolle-gb-02c38e87fc6391ec0ea333f550f5e898.yaml b/nuclei-templates/cve-less/plugins/gwolle-gb-02c38e87fc6391ec0ea333f550f5e898.yaml new file mode 100644 index 0000000000..ca378e61d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gwolle-gb-02c38e87fc6391ec0ea333f550f5e898.yaml @@ -0,0 +1,58 @@ +id: gwolle-gb-02c38e87fc6391ec0ea333f550f5e898 + +info: + name: > + Gwolle Guestbook <= 1.5.3 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e32a2644-df8a-4aea-8e70-49ab3075be9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gwolle-gb/" + google-query: inurl:"/wp-content/plugins/gwolle-gb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gwolle-gb,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gwolle-gb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gwolle-gb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gwolle-gb-8d7e82e4dc7d56e63bcdb6a68358e1ba.yaml b/nuclei-templates/cve-less/plugins/gwolle-gb-8d7e82e4dc7d56e63bcdb6a68358e1ba.yaml new file mode 100644 index 0000000000..1160843f93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gwolle-gb-8d7e82e4dc7d56e63bcdb6a68358e1ba.yaml @@ -0,0 +1,58 @@ +id: gwolle-gb-8d7e82e4dc7d56e63bcdb6a68358e1ba + +info: + name: > + Gwolle Guestbook <= 4.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceaf5f81-1adf-4512-b610-d1d183876762?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gwolle-gb/" + google-query: inurl:"/wp-content/plugins/gwolle-gb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gwolle-gb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gwolle-gb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gwolle-gb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gwolle-gb-b0dcd475ee39f280da0df0dd6993e407.yaml b/nuclei-templates/cve-less/plugins/gwolle-gb-b0dcd475ee39f280da0df0dd6993e407.yaml new file mode 100644 index 0000000000..96bb873285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gwolle-gb-b0dcd475ee39f280da0df0dd6993e407.yaml @@ -0,0 +1,58 @@ +id: gwolle-gb-b0dcd475ee39f280da0df0dd6993e407 + +info: + name: > + Gwolle Guestbook <= 2.1.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96f1ede7-ec36-4edf-baee-5e41907290af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gwolle-gb/" + google-query: inurl:"/wp-content/plugins/gwolle-gb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gwolle-gb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gwolle-gb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gwolle-gb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gwolle-gb-d1ded0c2f1b1f7a73c6770c120be62b6.yaml b/nuclei-templates/cve-less/plugins/gwolle-gb-d1ded0c2f1b1f7a73c6770c120be62b6.yaml new file mode 100644 index 0000000000..fd1ef28d6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gwolle-gb-d1ded0c2f1b1f7a73c6770c120be62b6.yaml @@ -0,0 +1,58 @@ +id: gwolle-gb-d1ded0c2f1b1f7a73c6770c120be62b6 + +info: + name: > + Gwolle Guestbook <= 2.5.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4747f6c-d083-4f7e-a9ef-3dd9c8f6047b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gwolle-gb/" + google-query: inurl:"/wp-content/plugins/gwolle-gb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gwolle-gb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gwolle-gb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gwolle-gb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gwolle-gb-def48545fc7b8f7aba56c88a829527ec.yaml b/nuclei-templates/cve-less/plugins/gwolle-gb-def48545fc7b8f7aba56c88a829527ec.yaml new file mode 100644 index 0000000000..37ea3f89bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gwolle-gb-def48545fc7b8f7aba56c88a829527ec.yaml @@ -0,0 +1,58 @@ +id: gwolle-gb-def48545fc7b8f7aba56c88a829527ec + +info: + name: > + Gwolle Guestbook <= 2.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed61a6b5-5c54-408b-973c-69b0f12d2df5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gwolle-gb/" + google-query: inurl:"/wp-content/plugins/gwolle-gb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gwolle-gb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gwolle-gb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gwolle-gb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gwp-histats-e3f2fb4bebde6fbab715925584422191.yaml b/nuclei-templates/cve-less/plugins/gwp-histats-e3f2fb4bebde6fbab715925584422191.yaml new file mode 100644 index 0000000000..cdfb9d2d5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gwp-histats-e3f2fb4bebde6fbab715925584422191.yaml @@ -0,0 +1,58 @@ +id: gwp-histats-e3f2fb4bebde6fbab715925584422191 + +info: + name: > + GWP-Histats <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5e6ff6-e70c-4b46-80fc-498becca6158?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gwp-histats/" + google-query: inurl:"/wp-content/plugins/gwp-histats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gwp-histats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gwp-histats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gwp-histats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gwyns-imagemap-selector-a56db0fded06de81c5e370419ecf70d7.yaml b/nuclei-templates/cve-less/plugins/gwyns-imagemap-selector-a56db0fded06de81c5e370419ecf70d7.yaml new file mode 100644 index 0000000000..74bea32a97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gwyns-imagemap-selector-a56db0fded06de81c5e370419ecf70d7.yaml @@ -0,0 +1,58 @@ +id: gwyns-imagemap-selector-a56db0fded06de81c5e370419ecf70d7 + +info: + name: > + Gwyn's Imagemap Selector <= 0.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a2740bc-5d4a-4449-b28a-5bf84b03c878?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gwyns-imagemap-selector/" + google-query: inurl:"/wp-content/plugins/gwyns-imagemap-selector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gwyns-imagemap-selector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gwyns-imagemap-selector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gwyns-imagemap-selector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/gym-management-398be83e4279f1a443c4d3cb2c5b8198.yaml b/nuclei-templates/cve-less/plugins/gym-management-398be83e4279f1a443c4d3cb2c5b8198.yaml new file mode 100644 index 0000000000..4dda6f48fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/gym-management-398be83e4279f1a443c4d3cb2c5b8198.yaml @@ -0,0 +1,58 @@ +id: gym-management-398be83e4279f1a443c4d3cb2c5b8198 + +info: + name: > + WPGYM - Wordpress Gym Management System (Unknown Version) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fef6c603-2beb-44df-8895-10ad0a9ef644?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/gym-management/" + google-query: inurl:"/wp-content/plugins/gym-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,gym-management,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/gym-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gym-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/h5p-css-editor-5203ae90ef6af25fe25fc40bdffc879a.yaml b/nuclei-templates/cve-less/plugins/h5p-css-editor-5203ae90ef6af25fe25fc40bdffc879a.yaml new file mode 100644 index 0000000000..821900844b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/h5p-css-editor-5203ae90ef6af25fe25fc40bdffc879a.yaml @@ -0,0 +1,58 @@ +id: h5p-css-editor-5203ae90ef6af25fe25fc40bdffc879a + +info: + name: > + H5P CSS Editor <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35b013c1-1574-4d5b-a3cb-e400ef7f2d32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/h5p-css-editor/" + google-query: inurl:"/wp-content/plugins/h5p-css-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,h5p-css-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/h5p-css-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "h5p-css-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hal-06dfe81bc3a355cd7801ee39e75e5076.yaml b/nuclei-templates/cve-less/plugins/hal-06dfe81bc3a355cd7801ee39e75e5076.yaml new file mode 100644 index 0000000000..fa44284a8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hal-06dfe81bc3a355cd7801ee39e75e5076.yaml @@ -0,0 +1,58 @@ +id: hal-06dfe81bc3a355cd7801ee39e75e5076 + +info: + name: > + HAL <= 2.1.1 Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e72e35de-caeb-4ecb-8d13-72fd2df4dd69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hal/" + google-query: inurl:"/wp-content/plugins/hal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hana-flv-player-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml b/nuclei-templates/cve-less/plugins/hana-flv-player-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml new file mode 100644 index 0000000000..ade91141d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hana-flv-player-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml @@ -0,0 +1,58 @@ +id: hana-flv-player-dc95c582cdcd23384ad1f3f9c0a3bd57 + +info: + name: > + Hana Flv Player <= 3.1.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/435e1af0-c4f4-42ae-b2b3-2d9ffc41c4b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hana-flv-player/" + google-query: inurl:"/wp-content/plugins/hana-flv-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hana-flv-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hana-flv-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hana-flv-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/handl-utm-grabber-8f10a7f44536cd7d542d4c451e6c6b46.yaml b/nuclei-templates/cve-less/plugins/handl-utm-grabber-8f10a7f44536cd7d542d4c451e6c6b46.yaml new file mode 100644 index 0000000000..b26db27197 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/handl-utm-grabber-8f10a7f44536cd7d542d4c451e6c6b46.yaml @@ -0,0 +1,58 @@ +id: handl-utm-grabber-8f10a7f44536cd7d542d4c451e6c6b46 + +info: + name: > + HandL UTM Grabber / Tracker <= 2.6.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/283c2b7b-b231-4a23-96be-776115676443?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/handl-utm-grabber/" + google-query: inurl:"/wp-content/plugins/handl-utm-grabber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,handl-utm-grabber,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/handl-utm-grabber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "handl-utm-grabber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/handsome-testimonials-87c27569f8277885aabdf5403aebae34.yaml b/nuclei-templates/cve-less/plugins/handsome-testimonials-87c27569f8277885aabdf5403aebae34.yaml new file mode 100644 index 0000000000..01e8ce027f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/handsome-testimonials-87c27569f8277885aabdf5403aebae34.yaml @@ -0,0 +1,58 @@ +id: handsome-testimonials-87c27569f8277885aabdf5403aebae34 + +info: + name: > + Handsome Testimonials & Reviews < 2.1.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d151c9a1-d47e-4155-8539-133f6abd57a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/handsome-testimonials/" + google-query: inurl:"/wp-content/plugins/handsome-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,handsome-testimonials,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/handsome-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "handsome-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-11da24271f65d3b23d168c3013c450d2.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-11da24271f65d3b23d168c3013c450d2.yaml new file mode 100644 index 0000000000..5ce1916e64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-11da24271f65d3b23d168c3013c450d2.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-11da24271f65d3b23d168c3013c450d2 + +info: + name: > + Happy Addons for Elementor <= 3.8.2 - Cross-Site Request Forgery via handle_optin_optout() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27439d44-f2ff-4c20-965f-25d12c83781c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-14492d14fdb2635abb58842e5c9c262d.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-14492d14fdb2635abb58842e5c9c262d.yaml new file mode 100644 index 0000000000..0dd8cb8bd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-14492d14fdb2635abb58842e5c9c262d.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-14492d14fdb2635abb58842e5c9c262d + +info: + name: > + Happy Addons for Elementor <= 3.10.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Author Meta Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b61eb8b7-0d89-47ef-831c-1772d01e2c85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..07076fb96e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-3ed56e73a3a43b54020334fdf48e4e7f.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-3ed56e73a3a43b54020334fdf48e4e7f.yaml new file mode 100644 index 0000000000..1a890a2162 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-3ed56e73a3a43b54020334fdf48e4e7f.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-3ed56e73a3a43b54020334fdf48e4e7f + +info: + name: > + Happy Addons for Elementor <= 3.10.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Title HTML Tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73e4ec2f-f4e1-469d-a4b7-5a10d44b7a2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-40e8b36488a6eac28e891fecfb75c2fd.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-40e8b36488a6eac28e891fecfb75c2fd.yaml new file mode 100644 index 0000000000..26cbb46f98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-40e8b36488a6eac28e891fecfb75c2fd.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-40e8b36488a6eac28e891fecfb75c2fd + +info: + name: > + Happy Addons for Elementor <= 3.10.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Page Title HTML Tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea3daad1-74a1-44be-b7ed-b58b806da614?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-47a1a7c3503abffa7dc09bb7e0a3a05e.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-47a1a7c3503abffa7dc09bb7e0a3a05e.yaml new file mode 100644 index 0000000000..a860d7fbc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-47a1a7c3503abffa7dc09bb7e0a3a05e.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-47a1a7c3503abffa7dc09bb7e0a3a05e + +info: + name: > + Happy Addons for Elementor <= 3.10.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Calendy + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb93853b-a6e0-42d1-8b10-b391984603f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-554f77c669d0419c047d6805cc30482d.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-554f77c669d0419c047d6805cc30482d.yaml new file mode 100644 index 0000000000..61cf552c3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-554f77c669d0419c047d6805cc30482d.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-554f77c669d0419c047d6805cc30482d + +info: + name: > + Happy Addons for Elementor <= 3.10.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Calendly Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22e4eb2a-2c2b-4f4f-821e-8d2d7e558364?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-5f5be8778a8041dd72149d1e03212c77.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-5f5be8778a8041dd72149d1e03212c77.yaml new file mode 100644 index 0000000000..da18c8c770 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-5f5be8778a8041dd72149d1e03212c77.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-5f5be8778a8041dd72149d1e03212c77 + +info: + name: > + Happy Addons for Elementor <= 3.9.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06ef69f0-34d3-4389-8a81-a4d9922f1468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-6eaf90f575a0c36147979bc3388c8a32.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-6eaf90f575a0c36147979bc3388c8a32.yaml new file mode 100644 index 0000000000..87696f2cf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-6eaf90f575a0c36147979bc3388c8a32.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-6eaf90f575a0c36147979bc3388c8a32 + +info: + name: > + Happy Addons for Elementor <= 3.9.1.1 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64ae36a3-d102-4d51-b685-395283155101?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-70c45809c8b9b14259a0bbce1a7bc3da.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-70c45809c8b9b14259a0bbce1a7bc3da.yaml new file mode 100644 index 0000000000..c990b2f553 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-70c45809c8b9b14259a0bbce1a7bc3da.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-70c45809c8b9b14259a0bbce1a7bc3da + +info: + name: > + Happy Addons for Elementor <= 3.10.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Photo Stack Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f43e1eed-09f8-44b3-b6fa-d0344f331dd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-72139ddfa4b65d7bc5dd06dc24f01748.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-72139ddfa4b65d7bc5dd06dc24f01748.yaml new file mode 100644 index 0000000000..c6b2aab8a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-72139ddfa4b65d7bc5dd06dc24f01748.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-72139ddfa4b65d7bc5dd06dc24f01748 + +info: + name: > + Happy Addons for Elementor <= 3.10.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via HTML Tags + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ade7f391-3824-4d0b-8718-f7995170a43d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-81f2915fd63b284fd9e4c66899667dd0.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-81f2915fd63b284fd9e4c66899667dd0.yaml new file mode 100644 index 0000000000..669467d23d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-81f2915fd63b284fd9e4c66899667dd0.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-81f2915fd63b284fd9e4c66899667dd0 + +info: + name: > + Happy Addons for Elementor <= 3.10.4 - Incorrect Authorization to Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aff10d5a-a2d0-461a-b52b-a25b647eaab4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-857593f7e35e0afc65d726bb57f2b738.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-857593f7e35e0afc65d726bb57f2b738.yaml new file mode 100644 index 0000000000..b057aa8ddf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-857593f7e35e0afc65d726bb57f2b738.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-857593f7e35e0afc65d726bb57f2b738 + +info: + name: > + Happy Addons for Elementor <= 3.10.1 - Missing Authorization via add_row_actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b25df18-dd9a-4b24-8187-283d5f3f334e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-a01bc9677b84a6e36d4cf67ad2a5dc30.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-a01bc9677b84a6e36d4cf67ad2a5dc30.yaml new file mode 100644 index 0000000000..aee1dca0b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-a01bc9677b84a6e36d4cf67ad2a5dc30.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-a01bc9677b84a6e36d4cf67ad2a5dc30 + +info: + name: > + Happy Addons for Elementor <= 3.10.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/267641fe-7490-4b8f-bb39-9531eefa2c30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-ab2437d4d93bac74a9eb7aad2f952033.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-ab2437d4d93bac74a9eb7aad2f952033.yaml new file mode 100644 index 0000000000..0a9303ac0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-ab2437d4d93bac74a9eb7aad2f952033.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-ab2437d4d93bac74a9eb7aad2f952033 + +info: + name: > + Happy Addons for Elementor <= 3.10.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Stack Group, Photo Stack, & Horizontal Timeline + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826483d7-948d-46c4-890c-71001b03847c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..8502de78bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-bc1bf66d22152db23406f67a4e5cfee9.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-bc1bf66d22152db23406f67a4e5cfee9.yaml new file mode 100644 index 0000000000..cc75f4d065 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-bc1bf66d22152db23406f67a4e5cfee9.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-bc1bf66d22152db23406f67a4e5cfee9 + +info: + name: > + Happy Addons for Elementor <= 2.23.0 & Pro Version < 1.17.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8ec4c5e-fb24-4b74-9ed8-0a9060625aba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.24.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-c9ff001e2ccdd465207fe5710fbe6c52.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-c9ff001e2ccdd465207fe5710fbe6c52.yaml new file mode 100644 index 0000000000..e48c9807bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-c9ff001e2ccdd465207fe5710fbe6c52.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-c9ff001e2ccdd465207fe5710fbe6c52 + +info: + name: > + Happy Elementor Addons <= 3.10.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1453815d-4e28-41ec-9aa4-4fd2899c619a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-dbb7ef50cd218fd39017d67c755de559.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-dbb7ef50cd218fd39017d67c755de559.yaml new file mode 100644 index 0000000000..614e1bd2a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-dbb7ef50cd218fd39017d67c755de559.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-dbb7ef50cd218fd39017d67c755de559 + +info: + name: > + Happy Addons for Elementor <= 3.10.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d55bab2a-5e2e-440e-b4fa-03853679ba22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-e18fa2425147eac664779a4e7540108b.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-e18fa2425147eac664779a4e7540108b.yaml new file mode 100644 index 0000000000..78961a3014 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-e18fa2425147eac664779a4e7540108b.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-e18fa2425147eac664779a4e7540108b + +info: + name: > + Happy Addons for Elementor <= 3.10.4 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via title_tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4688c1ee-335c-4adb-bd68-894ff34d001d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-e3b2d19a0133da498045d08d6862f535.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-e3b2d19a0133da498045d08d6862f535.yaml new file mode 100644 index 0000000000..40c1830e06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-e3b2d19a0133da498045d08d6862f535.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-e3b2d19a0133da498045d08d6862f535 + +info: + name: > + Happy Addons for Elementor <= 3.10.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Archive Title Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08208cb1-2d57-49f9-8ac7-b59caa0cf5fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-5f5be8778a8041dd72149d1e03212c77.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-5f5be8778a8041dd72149d1e03212c77.yaml new file mode 100644 index 0000000000..ffcd2508b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-5f5be8778a8041dd72149d1e03212c77.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-pro-5f5be8778a8041dd72149d1e03212c77 + +info: + name: > + Happy Addons for Elementor <= 3.9.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06ef69f0-34d3-4389-8a81-a4d9922f1468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons-pro/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-61c39bef79293723f6fa3478b1529af9.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-61c39bef79293723f6fa3478b1529af9.yaml new file mode 100644 index 0000000000..1439156acf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-61c39bef79293723f6fa3478b1529af9.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-pro-61c39bef79293723f6fa3478b1529af9 + +info: + name: > + Happy Elementor Addons Pro <= 2.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d536d3a8-9ac5-4ea9-8c65-16ad8b3a7106?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons-pro/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-bc1bf66d22152db23406f67a4e5cfee9.yaml b/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-bc1bf66d22152db23406f67a4e5cfee9.yaml new file mode 100644 index 0000000000..349339b456 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happy-elementor-addons-pro-bc1bf66d22152db23406f67a4e5cfee9.yaml @@ -0,0 +1,58 @@ +id: happy-elementor-addons-pro-bc1bf66d22152db23406f67a4e5cfee9 + +info: + name: > + Happy Addons for Elementor <= 2.23.0 & Pro Version < 1.17.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8ec4c5e-fb24-4b74-9ed8-0a9060625aba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happy-elementor-addons-pro/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happy-elementor-addons-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happy-elementor-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happyfiles-pro-9a4a86b73d09899b1f2fa163f3660f75.yaml b/nuclei-templates/cve-less/plugins/happyfiles-pro-9a4a86b73d09899b1f2fa163f3660f75.yaml new file mode 100644 index 0000000000..7c24a55bc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happyfiles-pro-9a4a86b73d09899b1f2fa163f3660f75.yaml @@ -0,0 +1,58 @@ +id: happyfiles-pro-9a4a86b73d09899b1f2fa163f3660f75 + +info: + name: > + HappyFiles Pro <= 1.8.1 - Missing Authorization to Arbitrary File Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bfabeb4-c57d-412a-b27b-a6387d30081f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happyfiles-pro/" + google-query: inurl:"/wp-content/plugins/happyfiles-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happyfiles-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happyfiles-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happyfiles-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happyfiles-pro-c93f15f45e4694eec856b57673b454f8.yaml b/nuclei-templates/cve-less/plugins/happyfiles-pro-c93f15f45e4694eec856b57673b454f8.yaml new file mode 100644 index 0000000000..7e03ebd595 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happyfiles-pro-c93f15f45e4694eec856b57673b454f8.yaml @@ -0,0 +1,58 @@ +id: happyfiles-pro-c93f15f45e4694eec856b57673b454f8 + +info: + name: > + HappyFiles Pro <= 1.8.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d293f35a-a42f-441f-b521-da0ba9887c45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happyfiles-pro/" + google-query: inurl:"/wp-content/plugins/happyfiles-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happyfiles-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happyfiles-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happyfiles-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happyforms-2707a3752ae7690ac46fe8896eb6632b.yaml b/nuclei-templates/cve-less/plugins/happyforms-2707a3752ae7690ac46fe8896eb6632b.yaml new file mode 100644 index 0000000000..47171b2dd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happyforms-2707a3752ae7690ac46fe8896eb6632b.yaml @@ -0,0 +1,58 @@ +id: happyforms-2707a3752ae7690ac46fe8896eb6632b + +info: + name: > + Happyforms <= 1.25.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff986a66-93f7-4926-8818-7af745c0166c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happyforms/" + google-query: inurl:"/wp-content/plugins/happyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happyforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happyforms-7145c40ff1e0db4687c083ce378fc607.yaml b/nuclei-templates/cve-less/plugins/happyforms-7145c40ff1e0db4687c083ce378fc607.yaml new file mode 100644 index 0000000000..10edd92ca2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happyforms-7145c40ff1e0db4687c083ce378fc607.yaml @@ -0,0 +1,58 @@ +id: happyforms-7145c40ff1e0db4687c083ce378fc607 + +info: + name: > + Happyforms <= 1.25.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0578c49e-f820-42dd-bd53-f4a281843e69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happyforms/" + google-query: inurl:"/wp-content/plugins/happyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happyforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/happyforms-74ccbff13cedef341c14f509a30bb49c.yaml b/nuclei-templates/cve-less/plugins/happyforms-74ccbff13cedef341c14f509a30bb49c.yaml new file mode 100644 index 0000000000..0f7336872f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/happyforms-74ccbff13cedef341c14f509a30bb49c.yaml @@ -0,0 +1,58 @@ +id: happyforms-74ccbff13cedef341c14f509a30bb49c + +info: + name: > + Happyforms <= 1.21.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Blocks + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72f1ffe1-d8af-4aa2-bc58-5f1cd4eaa856?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/happyforms/" + google-query: inurl:"/wp-content/plugins/happyforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,happyforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/happyforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happyforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hash-elements-70740ef575420bdce3307b7d6efb0e97.yaml b/nuclei-templates/cve-less/plugins/hash-elements-70740ef575420bdce3307b7d6efb0e97.yaml new file mode 100644 index 0000000000..ff6a6adf99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hash-elements-70740ef575420bdce3307b7d6efb0e97.yaml @@ -0,0 +1,58 @@ +id: hash-elements-70740ef575420bdce3307b7d6efb0e97 + +info: + name: > + Hash Elements <= 1.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a849338-8dd9-49d2-ab7c-29d4b729877b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hash-elements/" + google-query: inurl:"/wp-content/plugins/hash-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hash-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hash-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hash-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hashbar-wp-notification-bar-77bff58a02745412cca836e0af8ecf6c.yaml b/nuclei-templates/cve-less/plugins/hashbar-wp-notification-bar-77bff58a02745412cca836e0af8ecf6c.yaml new file mode 100644 index 0000000000..c39b4d134d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hashbar-wp-notification-bar-77bff58a02745412cca836e0af8ecf6c.yaml @@ -0,0 +1,58 @@ +id: hashbar-wp-notification-bar-77bff58a02745412cca836e0af8ecf6c + +info: + name: > + HashBar – WordPress Notification Bar <= 1.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdde4f0d-a4d7-421c-8579-a93941eea712?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hashbar-wp-notification-bar/" + google-query: inurl:"/wp-content/plugins/hashbar-wp-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hashbar-wp-notification-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hashbar-wp-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hashbar-wp-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hashbar-wp-notification-bar-cc04fc647a83c5a0bf41904a11665f19.yaml b/nuclei-templates/cve-less/plugins/hashbar-wp-notification-bar-cc04fc647a83c5a0bf41904a11665f19.yaml new file mode 100644 index 0000000000..7e652a4951 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hashbar-wp-notification-bar-cc04fc647a83c5a0bf41904a11665f19.yaml @@ -0,0 +1,58 @@ +id: hashbar-wp-notification-bar-cc04fc647a83c5a0bf41904a11665f19 + +info: + name: > + HashBar – WordPress Notification Bar <= 1.4.1 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f3e4e53-3a4a-4b9d-845c-927a59e03488?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hashbar-wp-notification-bar/" + google-query: inurl:"/wp-content/plugins/hashbar-wp-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hashbar-wp-notification-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hashbar-wp-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hashbar-wp-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hashthemes-demo-importer-a59d3f4cb23477999357f88e98585933.yaml b/nuclei-templates/cve-less/plugins/hashthemes-demo-importer-a59d3f4cb23477999357f88e98585933.yaml new file mode 100644 index 0000000000..d27c8b5ea8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hashthemes-demo-importer-a59d3f4cb23477999357f88e98585933.yaml @@ -0,0 +1,58 @@ +id: hashthemes-demo-importer-a59d3f4cb23477999357f88e98585933 + +info: + name: > + HashThemes Demo Importer <= 1.1.1 - Missing Authorization to Database Wipe + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ea2ed8b-b24a-4da2-9ee7-5a3a4a7a4280?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hashthemes-demo-importer/" + google-query: inurl:"/wp-content/plugins/hashthemes-demo-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hashthemes-demo-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hashthemes-demo-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hashthemes-demo-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/haxcan-3db14e51e4cd401655d11f7aea7dbad4.yaml b/nuclei-templates/cve-less/plugins/haxcan-3db14e51e4cd401655d11f7aea7dbad4.yaml new file mode 100644 index 0000000000..49962a4871 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/haxcan-3db14e51e4cd401655d11f7aea7dbad4.yaml @@ -0,0 +1,58 @@ +id: haxcan-3db14e51e4cd401655d11f7aea7dbad4 + +info: + name: > + Haxcan <= 1.0.0 - Authenticated (Admin+) Path Traversal to Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d265120-992b-4138-b77a-1cf529e4d742?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/haxcan/" + google-query: inurl:"/wp-content/plugins/haxcan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,haxcan,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/haxcan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "haxcan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hbook-d14e048167575e51fe5556ff84906191.yaml b/nuclei-templates/cve-less/plugins/hbook-d14e048167575e51fe5556ff84906191.yaml new file mode 100644 index 0000000000..48e4778566 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hbook-d14e048167575e51fe5556ff84906191.yaml @@ -0,0 +1,58 @@ +id: hbook-d14e048167575e51fe5556ff84906191 + +info: + name: > + Booking Calendar – Event Calendar <= 1.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84c4e3cc-1f7c-4ed9-9072-32f3e84419c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hbook/" + google-query: inurl:"/wp-content/plugins/hbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hbook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-560440aa181bea8a67faa79732a41f9b.yaml b/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-560440aa181bea8a67faa79732a41f9b.yaml new file mode 100644 index 0000000000..073354e121 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-560440aa181bea8a67faa79732a41f9b.yaml @@ -0,0 +1,58 @@ +id: hc-custom-wp-admin-url-560440aa181bea8a67faa79732a41f9b + +info: + name: > + HC Custom WP-Admin URL <= 1.4 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fa986aa-e899-42e1-9b86-8b205e247cbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hc-custom-wp-admin-url/" + google-query: inurl:"/wp-content/plugins/hc-custom-wp-admin-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hc-custom-wp-admin-url,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hc-custom-wp-admin-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hc-custom-wp-admin-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-7ac6b90fc34536c09d99f508147f9181.yaml b/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-7ac6b90fc34536c09d99f508147f9181.yaml new file mode 100644 index 0000000000..bfde8bce2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-7ac6b90fc34536c09d99f508147f9181.yaml @@ -0,0 +1,58 @@ +id: hc-custom-wp-admin-url-7ac6b90fc34536c09d99f508147f9181 + +info: + name: > + HC Custom WP-Admin URL <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f4ae82c-f249-4094-a0ef-568c3a30d16b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hc-custom-wp-admin-url/" + google-query: inurl:"/wp-content/plugins/hc-custom-wp-admin-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hc-custom-wp-admin-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hc-custom-wp-admin-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hc-custom-wp-admin-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-d13cb26577d06a7097c333dfa170e855.yaml b/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-d13cb26577d06a7097c333dfa170e855.yaml new file mode 100644 index 0000000000..561762c677 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hc-custom-wp-admin-url-d13cb26577d06a7097c333dfa170e855.yaml @@ -0,0 +1,58 @@ +id: hc-custom-wp-admin-url-d13cb26577d06a7097c333dfa170e855 + +info: + name: > + HC Custom WP-Admin URL <= 1.4 - Missing Authorization to Login URL Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba52c97e-9f2a-4e48-a133-79ed31cfbf3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hc-custom-wp-admin-url/" + google-query: inurl:"/wp-content/plugins/hc-custom-wp-admin-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hc-custom-wp-admin-url,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hc-custom-wp-admin-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hc-custom-wp-admin-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hcaptcha-for-forms-and-more-7b33ec746697457281bd9e42aec2f348.yaml b/nuclei-templates/cve-less/plugins/hcaptcha-for-forms-and-more-7b33ec746697457281bd9e42aec2f348.yaml new file mode 100644 index 0000000000..ea9e0b08e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hcaptcha-for-forms-and-more-7b33ec746697457281bd9e42aec2f348.yaml @@ -0,0 +1,58 @@ +id: hcaptcha-for-forms-and-more-7b33ec746697457281bd9e42aec2f348 + +info: + name: > + hCaptcha for WordPress <= 4.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via cf7-hcaptcha Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ce70e87-6dee-4d4a-b2fc-93fd4d50957d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hcaptcha-for-forms-and-more/" + google-query: inurl:"/wp-content/plugins/hcaptcha-for-forms-and-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hcaptcha-for-forms-and-more,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hcaptcha-for-forms-and-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hcaptcha-for-forms-and-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hd-quiz-48f754f17606d4479811452c8745b0f0.yaml b/nuclei-templates/cve-less/plugins/hd-quiz-48f754f17606d4479811452c8745b0f0.yaml new file mode 100644 index 0000000000..6d67bf2aa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hd-quiz-48f754f17606d4479811452c8745b0f0.yaml @@ -0,0 +1,58 @@ +id: hd-quiz-48f754f17606d4479811452c8745b0f0 + +info: + name: > + HD Quiz <= 1.8.11 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3abf6bd-bece-470e-93c7-ab9968171a3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hd-quiz/" + google-query: inurl:"/wp-content/plugins/hd-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hd-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hd-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hd-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hd-quiz-eea7979a3adae6620386ae2fd9256411.yaml b/nuclei-templates/cve-less/plugins/hd-quiz-eea7979a3adae6620386ae2fd9256411.yaml new file mode 100644 index 0000000000..0525c5c7c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hd-quiz-eea7979a3adae6620386ae2fd9256411.yaml @@ -0,0 +1,58 @@ +id: hd-quiz-eea7979a3adae6620386ae2fd9256411 + +info: + name: > + HD Quiz <= 1.8.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19d724f3-96fb-4834-aa56-6b8d30f0e34d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hd-quiz/" + google-query: inurl:"/wp-content/plugins/hd-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hd-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hd-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hd-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hdw-player-video-player-video-gallery-a27af52ed355aaf16d2ba0f06827a926.yaml b/nuclei-templates/cve-less/plugins/hdw-player-video-player-video-gallery-a27af52ed355aaf16d2ba0f06827a926.yaml new file mode 100644 index 0000000000..7b2934ad40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hdw-player-video-player-video-gallery-a27af52ed355aaf16d2ba0f06827a926.yaml @@ -0,0 +1,58 @@ +id: hdw-player-video-player-video-gallery-a27af52ed355aaf16d2ba0f06827a926 + +info: + name: > + HDW Player Plugin (Video Player & Video Gallery) <= 5.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/778aa2be-ffcb-4d28-9efe-c29c8d5391bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hdw-player-video-player-video-gallery/" + google-query: inurl:"/wp-content/plugins/hdw-player-video-player-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hdw-player-video-player-video-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hdw-player-video-player-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hdw-player-video-player-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hdw-player-video-player-video-gallery-e15109a3e2bca91cb9757f33e8ccceb0.yaml b/nuclei-templates/cve-less/plugins/hdw-player-video-player-video-gallery-e15109a3e2bca91cb9757f33e8ccceb0.yaml new file mode 100644 index 0000000000..1912a9f2c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hdw-player-video-player-video-gallery-e15109a3e2bca91cb9757f33e8ccceb0.yaml @@ -0,0 +1,58 @@ +id: hdw-player-video-player-video-gallery-e15109a3e2bca91cb9757f33e8ccceb0 + +info: + name: > + HDW Player Plugin (Video Player & Video Gallery) <= 2.4.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a540897-694a-43d1-bdd8-5aeb07389a51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hdw-player-video-player-video-gallery/" + google-query: inurl:"/wp-content/plugins/hdw-player-video-player-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hdw-player-video-player-video-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hdw-player-video-player-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hdw-player-video-player-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hdw-tube-917d7399f5fb3cc1cf39f6cce7273cc7.yaml b/nuclei-templates/cve-less/plugins/hdw-tube-917d7399f5fb3cc1cf39f6cce7273cc7.yaml new file mode 100644 index 0000000000..a59676d00e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hdw-tube-917d7399f5fb3cc1cf39f6cce7273cc7.yaml @@ -0,0 +1,58 @@ +id: hdw-tube-917d7399f5fb3cc1cf39f6cce7273cc7 + +info: + name: > + HDW WordPress Video Gallery <= 1.2 - Reflected Cross-Site Scripting via channel parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c5d214e-65e2-4158-a88f-58bef7c9952b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hdw-tube/" + google-query: inurl:"/wp-content/plugins/hdw-tube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hdw-tube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hdw-tube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hdw-tube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hdw-tube-a307a0ae505afb842b5a198bc8bff8bf.yaml b/nuclei-templates/cve-less/plugins/hdw-tube-a307a0ae505afb842b5a198bc8bff8bf.yaml new file mode 100644 index 0000000000..49aeb0a011 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hdw-tube-a307a0ae505afb842b5a198bc8bff8bf.yaml @@ -0,0 +1,58 @@ +id: hdw-tube-a307a0ae505afb842b5a198bc8bff8bf + +info: + name: > + HDW WordPress Video Gallery <= 1.2 - Reflected Cross-Site Scripting via playlist parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2156af57-d98b-4d0a-b7aa-0281c951c82f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hdw-tube/" + google-query: inurl:"/wp-content/plugins/hdw-tube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hdw-tube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hdw-tube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hdw-tube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/header-enhancement-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/header-enhancement-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..da533c1743 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/header-enhancement-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: header-enhancement-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/header-enhancement/" + google-query: inurl:"/wp-content/plugins/header-enhancement/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,header-enhancement,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/header-enhancement/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "header-enhancement" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/header-footer-code-manager-29a76895e319eccbd61b3bb594faebd4.yaml b/nuclei-templates/cve-less/plugins/header-footer-code-manager-29a76895e319eccbd61b3bb594faebd4.yaml new file mode 100644 index 0000000000..7d7676cff4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/header-footer-code-manager-29a76895e319eccbd61b3bb594faebd4.yaml @@ -0,0 +1,58 @@ +id: header-footer-code-manager-29a76895e319eccbd61b3bb594faebd4 + +info: + name: > + Header Footer Code Manager <= 1.1.34 - Cross-Site Request Forgery via process_bulk_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60493635-b1b0-4e76-8f73-16c223d7b4d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/header-footer-code-manager/" + google-query: inurl:"/wp-content/plugins/header-footer-code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,header-footer-code-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/header-footer-code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "header-footer-code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/header-footer-code-manager-4e85b966f722637fb8ba38d8dce7367a.yaml b/nuclei-templates/cve-less/plugins/header-footer-code-manager-4e85b966f722637fb8ba38d8dce7367a.yaml new file mode 100644 index 0000000000..8cda4a998c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/header-footer-code-manager-4e85b966f722637fb8ba38d8dce7367a.yaml @@ -0,0 +1,58 @@ +id: header-footer-code-manager-4e85b966f722637fb8ba38d8dce7367a + +info: + name: > + Header Footer Code Manager <= 1.1.13 - Authenticated SQL Injections + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00323c12-151d-42e4-a85c-76400bce1ec8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/header-footer-code-manager/" + google-query: inurl:"/wp-content/plugins/header-footer-code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,header-footer-code-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/header-footer-code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "header-footer-code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/header-footer-code-manager-54aadf8fe607e5a163f75b88f9bb6921.yaml b/nuclei-templates/cve-less/plugins/header-footer-code-manager-54aadf8fe607e5a163f75b88f9bb6921.yaml new file mode 100644 index 0000000000..313f876f8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/header-footer-code-manager-54aadf8fe607e5a163f75b88f9bb6921.yaml @@ -0,0 +1,58 @@ +id: header-footer-code-manager-54aadf8fe607e5a163f75b88f9bb6921 + +info: + name: > + Header Footer Code Manager <= 1.1.23 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca0681a-59ca-42e6-8ee2-574590fc3ae2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/header-footer-code-manager/" + google-query: inurl:"/wp-content/plugins/header-footer-code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,header-footer-code-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/header-footer-code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "header-footer-code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/header-footer-code-manager-ebaed8da40ca133016da6dca47ef4e1c.yaml b/nuclei-templates/cve-less/plugins/header-footer-code-manager-ebaed8da40ca133016da6dca47ef4e1c.yaml new file mode 100644 index 0000000000..d80a1ee34e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/header-footer-code-manager-ebaed8da40ca133016da6dca47ef4e1c.yaml @@ -0,0 +1,58 @@ +id: header-footer-code-manager-ebaed8da40ca133016da6dca47ef4e1c + +info: + name: > + Header Footer Code Manager <= 1.1.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b42be363-30b4-487b-9ffc-bfa3efbd1250?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/header-footer-code-manager/" + google-query: inurl:"/wp-content/plugins/header-footer-code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,header-footer-code-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/header-footer-code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "header-footer-code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/header-footer-elementor-5adfa5eb8fa56a7df3a28304be530aa5.yaml b/nuclei-templates/cve-less/plugins/header-footer-elementor-5adfa5eb8fa56a7df3a28304be530aa5.yaml new file mode 100644 index 0000000000..834e6a242d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/header-footer-elementor-5adfa5eb8fa56a7df3a28304be530aa5.yaml @@ -0,0 +1,58 @@ +id: header-footer-elementor-5adfa5eb8fa56a7df3a28304be530aa5 + +info: + name: > + Elementor Header & Footer Builder <= 1.6.24 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82644c46-205b-4005-bba8-6b3e45769639?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/header-footer-elementor/" + google-query: inurl:"/wp-content/plugins/header-footer-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,header-footer-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/header-footer-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "header-footer-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/header-footer-elementor-76b99567dc5d8693687703220a992b79.yaml b/nuclei-templates/cve-less/plugins/header-footer-elementor-76b99567dc5d8693687703220a992b79.yaml new file mode 100644 index 0000000000..94202ad446 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/header-footer-elementor-76b99567dc5d8693687703220a992b79.yaml @@ -0,0 +1,58 @@ +id: header-footer-elementor-76b99567dc5d8693687703220a992b79 + +info: + name: > + Elementor Header & Footer Builder <= 1.5.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97108ad1-c7b8-4050-ba0d-7a1fd4bdedb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/header-footer-elementor/" + google-query: inurl:"/wp-content/plugins/header-footer-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,header-footer-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/header-footer-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "header-footer-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/header-image-slider-0fdfd9f22590d1df506441add4a664d1.yaml b/nuclei-templates/cve-less/plugins/header-image-slider-0fdfd9f22590d1df506441add4a664d1.yaml new file mode 100644 index 0000000000..4927ee9adb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/header-image-slider-0fdfd9f22590d1df506441add4a664d1.yaml @@ -0,0 +1,58 @@ +id: header-image-slider-0fdfd9f22590d1df506441add4a664d1 + +info: + name: > + Header Image Slider <= 0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d178b2c9-a157-4e53-a7d7-940370cb3b57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/header-image-slider/" + google-query: inurl:"/wp-content/plugins/header-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,header-image-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/header-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "header-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/headless-cms-924d818a306e9e6b06f3cb1274c2304e.yaml b/nuclei-templates/cve-less/plugins/headless-cms-924d818a306e9e6b06f3cb1274c2304e.yaml new file mode 100644 index 0000000000..bfa5426e4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/headless-cms-924d818a306e9e6b06f3cb1274c2304e.yaml @@ -0,0 +1,58 @@ +id: headless-cms-924d818a306e9e6b06f3cb1274c2304e + +info: + name: > + Headless CMS <= 2.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d1414f5-e705-4fd4-847b-b46d2d20943b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/headless-cms/" + google-query: inurl:"/wp-content/plugins/headless-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,headless-cms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/headless-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "headless-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/headline-analyzer-54f2c04c2c06c269e0341f13f080ec95.yaml b/nuclei-templates/cve-less/plugins/headline-analyzer-54f2c04c2c06c269e0341f13f080ec95.yaml new file mode 100644 index 0000000000..4bc52e9277 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/headline-analyzer-54f2c04c2c06c269e0341f13f080ec95.yaml @@ -0,0 +1,58 @@ +id: headline-analyzer-54f2c04c2c06c269e0341f13f080ec95 + +info: + name: > + Headline Analyzer <= 1.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54e065bf-170d-4f15-879a-fd5fbcb87f79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/headline-analyzer/" + google-query: inurl:"/wp-content/plugins/headline-analyzer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,headline-analyzer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/headline-analyzer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "headline-analyzer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/headline-analyzer-8cd08637ffa8c2d1ca3b360f63505422.yaml b/nuclei-templates/cve-less/plugins/headline-analyzer-8cd08637ffa8c2d1ca3b360f63505422.yaml new file mode 100644 index 0000000000..bc57a6e687 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/headline-analyzer-8cd08637ffa8c2d1ca3b360f63505422.yaml @@ -0,0 +1,58 @@ +id: headline-analyzer-8cd08637ffa8c2d1ca3b360f63505422 + +info: + name: > + Headline Analyzer <= 1.3.1 - Missing Authorization via REST APIs + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a057ad05-0ed7-48c4-9dc1-0e7b1d3cb270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/headline-analyzer/" + google-query: inurl:"/wp-content/plugins/headline-analyzer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,headline-analyzer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/headline-analyzer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "headline-analyzer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/health-check-3d51c2b8fb06721f3c5b968c3626fb70.yaml b/nuclei-templates/cve-less/plugins/health-check-3d51c2b8fb06721f3c5b968c3626fb70.yaml new file mode 100644 index 0000000000..0171cf2093 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/health-check-3d51c2b8fb06721f3c5b968c3626fb70.yaml @@ -0,0 +1,58 @@ +id: health-check-3d51c2b8fb06721f3c5b968c3626fb70 + +info: + name: > + Health Check & Troubleshooting <= 1.2.3 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5278e8d4-d23e-47ce-b920-dfb7ec56387c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/health-check/" + google-query: inurl:"/wp-content/plugins/health-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,health-check,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/health-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "health-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/health-check-43535da8d5aa574c7cf4e311538c873d.yaml b/nuclei-templates/cve-less/plugins/health-check-43535da8d5aa574c7cf4e311538c873d.yaml new file mode 100644 index 0000000000..28bafe117c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/health-check-43535da8d5aa574c7cf4e311538c873d.yaml @@ -0,0 +1,58 @@ +id: health-check-43535da8d5aa574c7cf4e311538c873d + +info: + name: > + Health Check & Troubleshooting <= 1.5.1 - Cross-Site Request Forgery via health_check_troubleshoot_get_captures + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8d75eb6-2a9f-4c33-9e15-db7db037b67e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/health-check/" + google-query: inurl:"/wp-content/plugins/health-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,health-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/health-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "health-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/health-check-73c68dbf279656072f1ab958f24cc348.yaml b/nuclei-templates/cve-less/plugins/health-check-73c68dbf279656072f1ab958f24cc348.yaml new file mode 100644 index 0000000000..a55e7033ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/health-check-73c68dbf279656072f1ab958f24cc348.yaml @@ -0,0 +1,58 @@ +id: health-check-73c68dbf279656072f1ab958f24cc348 + +info: + name: > + Health Check & Troubleshooting <= 1.2.3 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95ad0139-eb12-4c02-95fb-cd19b6a6ab02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/health-check/" + google-query: inurl:"/wp-content/plugins/health-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,health-check,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/health-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "health-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/health-check-fa8bb26d319a4e03fd0e1e3bc361d9db.yaml b/nuclei-templates/cve-less/plugins/health-check-fa8bb26d319a4e03fd0e1e3bc361d9db.yaml new file mode 100644 index 0000000000..f8ab5d5e73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/health-check-fa8bb26d319a4e03fd0e1e3bc361d9db.yaml @@ -0,0 +1,58 @@ +id: health-check-fa8bb26d319a4e03fd0e1e3bc361d9db + +info: + name: > + Health Check & Troubleshooting <= 1.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfd16372-9173-4168-8604-5c117d05c349?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/health-check/" + google-query: inurl:"/wp-content/plugins/health-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,health-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/health-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "health-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/heart-this-f0164790773e35acb9b1d44f4c95382b.yaml b/nuclei-templates/cve-less/plugins/heart-this-f0164790773e35acb9b1d44f4c95382b.yaml new file mode 100644 index 0000000000..9e4099c980 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/heart-this-f0164790773e35acb9b1d44f4c95382b.yaml @@ -0,0 +1,58 @@ +id: heart-this-f0164790773e35acb9b1d44f4c95382b + +info: + name: > + HeartThis <= 0.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/133057a1-4cd5-4e46-9407-d01d80859991?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/heart-this/" + google-query: inurl:"/wp-content/plugins/heart-this/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,heart-this,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/heart-this/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "heart-this" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/heat-trackr-96b9af98f103ae55e184925f398dbbc0.yaml b/nuclei-templates/cve-less/plugins/heat-trackr-96b9af98f103ae55e184925f398dbbc0.yaml new file mode 100644 index 0000000000..ff7432f941 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/heat-trackr-96b9af98f103ae55e184925f398dbbc0.yaml @@ -0,0 +1,58 @@ +id: heat-trackr-96b9af98f103ae55e184925f398dbbc0 + +info: + name: > + Heat Trackr < 1.01 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dbb6c21-8a70-44b9-9915-3f146a2066ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/heat-trackr/" + google-query: inurl:"/wp-content/plugins/heat-trackr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,heat-trackr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/heat-trackr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "heat-trackr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/heateor-social-comments-73dd9496dc7942d3595fe6b58faa41a3.yaml b/nuclei-templates/cve-less/plugins/heateor-social-comments-73dd9496dc7942d3595fe6b58faa41a3.yaml new file mode 100644 index 0000000000..58ad421969 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/heateor-social-comments-73dd9496dc7942d3595fe6b58faa41a3.yaml @@ -0,0 +1,58 @@ +id: heateor-social-comments-73dd9496dc7942d3595fe6b58faa41a3 + +info: + name: > + WordPress Social Comments Plugin for Vkontakte Comments and Disqus Comments <= 1.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/037ff4f5-7855-43e8-af25-9a0fcd5f0b64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/heateor-social-comments/" + google-query: inurl:"/wp-content/plugins/heateor-social-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,heateor-social-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/heateor-social-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "heateor-social-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/heateor-social-login-132f29f7cba1678c467fb85b9d9b820e.yaml b/nuclei-templates/cve-less/plugins/heateor-social-login-132f29f7cba1678c467fb85b9d9b820e.yaml new file mode 100644 index 0000000000..ab3e3be946 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/heateor-social-login-132f29f7cba1678c467fb85b9d9b820e.yaml @@ -0,0 +1,58 @@ +id: heateor-social-login-132f29f7cba1678c467fb85b9d9b820e + +info: + name: > + Heateor Social Login <= 1.1.30 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a3ebfba-7523-48a4-a315-4395be2cebef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/heateor-social-login/" + google-query: inurl:"/wp-content/plugins/heateor-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,heateor-social-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/heateor-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "heateor-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helloasso-3b452da100c4d01a4273d3119ce13da9.yaml b/nuclei-templates/cve-less/plugins/helloasso-3b452da100c4d01a4273d3119ce13da9.yaml new file mode 100644 index 0000000000..2dabaaed8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helloasso-3b452da100c4d01a4273d3119ce13da9.yaml @@ -0,0 +1,58 @@ +id: helloasso-3b452da100c4d01a4273d3119ce13da9 + +info: + name: > + HelloAsso <= 1.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/262f7690-97ce-40ca-a277-6871acbc1546?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helloasso/" + google-query: inurl:"/wp-content/plugins/helloasso/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helloasso,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helloasso/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helloasso" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helloprint-e743442fbb37f8e4e9406e7627aff2e1.yaml b/nuclei-templates/cve-less/plugins/helloprint-e743442fbb37f8e4e9406e7627aff2e1.yaml new file mode 100644 index 0000000000..8516140aa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helloprint-e743442fbb37f8e4e9406e7627aff2e1.yaml @@ -0,0 +1,58 @@ +id: helloprint-e743442fbb37f8e4e9406e7627aff2e1 + +info: + name: > + Helloprint <= 1.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7cdfa6a-1555-494f-9802-bf92b90e7d9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helloprint/" + google-query: inurl:"/wp-content/plugins/helloprint/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helloprint,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helloprint/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helloprint" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helloprint-fb3207d7d531ee9e551e1696ce5b366a.yaml b/nuclei-templates/cve-less/plugins/helloprint-fb3207d7d531ee9e551e1696ce5b366a.yaml new file mode 100644 index 0000000000..e39783304a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helloprint-fb3207d7d531ee9e551e1696ce5b366a.yaml @@ -0,0 +1,58 @@ +id: helloprint-fb3207d7d531ee9e551e1696ce5b366a + +info: + name: > + Helloprint <= 1.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c508d38c-f5e3-4193-8209-0083a8a18da4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helloprint/" + google-query: inurl:"/wp-content/plugins/helloprint/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helloprint,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helloprint/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helloprint" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helpdeskwp-0aa92148d99c1bca8d88494c39b853c4.yaml b/nuclei-templates/cve-less/plugins/helpdeskwp-0aa92148d99c1bca8d88494c39b853c4.yaml new file mode 100644 index 0000000000..4e1476700d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helpdeskwp-0aa92148d99c1bca8d88494c39b853c4.yaml @@ -0,0 +1,58 @@ +id: helpdeskwp-0aa92148d99c1bca8d88494c39b853c4 + +info: + name: > + Help Desk WP <= 1.2.0 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ec5173b-7b0d-4887-8c13-f48137aa8593?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helpdeskwp/" + google-query: inurl:"/wp-content/plugins/helpdeskwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helpdeskwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helpdeskwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helpdeskwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helpful-7344a2ea198088e725e4c36ccf66d66c.yaml b/nuclei-templates/cve-less/plugins/helpful-7344a2ea198088e725e4c36ccf66d66c.yaml new file mode 100644 index 0000000000..fe09f48000 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helpful-7344a2ea198088e725e4c36ccf66d66c.yaml @@ -0,0 +1,58 @@ +id: helpful-7344a2ea198088e725e4c36ccf66d66c + +info: + name: > + Helpful <= 4.4.58 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15f03dc6-2881-4f70-925c-80ef9ce40be2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helpful/" + google-query: inurl:"/wp-content/plugins/helpful/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helpful,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helpful/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helpful" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helpful-dd20a0b7211e7318d7683dbce69df5bf.yaml b/nuclei-templates/cve-less/plugins/helpful-dd20a0b7211e7318d7683dbce69df5bf.yaml new file mode 100644 index 0000000000..2bec42573e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helpful-dd20a0b7211e7318d7683dbce69df5bf.yaml @@ -0,0 +1,58 @@ +id: helpful-dd20a0b7211e7318d7683dbce69df5bf + +info: + name: > + Helpful <= 4.5.25 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56b4d824-96b8-40e6-97b5-17748d13574a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helpful/" + google-query: inurl:"/wp-content/plugins/helpful/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helpful,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helpful/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helpful" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helpful-fdcfcbc977d2772beb04b8279c53f48d.yaml b/nuclei-templates/cve-less/plugins/helpful-fdcfcbc977d2772beb04b8279c53f48d.yaml new file mode 100644 index 0000000000..461af2b7a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helpful-fdcfcbc977d2772beb04b8279c53f48d.yaml @@ -0,0 +1,58 @@ +id: helpful-fdcfcbc977d2772beb04b8279c53f48d + +info: + name: > + Helpful <= 4.5.14 - Authorization Bypass to Repeat Voting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/342d90e1-9d2e-4262-9667-013a8506727b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helpful/" + google-query: inurl:"/wp-content/plugins/helpful/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helpful,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helpful/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helpful" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helpie-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/helpie-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7aef0be2cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helpie-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: helpie-faq-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helpie-faq/" + google-query: inurl:"/wp-content/plugins/helpie-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helpie-faq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helpie-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helpie-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helpie-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/helpie-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..46bff86e3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helpie-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: helpie-faq-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helpie-faq/" + google-query: inurl:"/wp-content/plugins/helpie-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helpie-faq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helpie-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helpie-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/helpie-faq-fa8aa874dce84326a50185872038d6df.yaml b/nuclei-templates/cve-less/plugins/helpie-faq-fa8aa874dce84326a50185872038d6df.yaml new file mode 100644 index 0000000000..c10b918a75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/helpie-faq-fa8aa874dce84326a50185872038d6df.yaml @@ -0,0 +1,58 @@ +id: helpie-faq-fa8aa874dce84326a50185872038d6df + +info: + name: > + Helpie FAQ <= 1.9.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f389f4bf-ffff-4862-b4e2-4465ca0556ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/helpie-faq/" + google-query: inurl:"/wp-content/plugins/helpie-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,helpie-faq,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/helpie-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "helpie-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hercules-core-59d8f9139af0fff2996b4a871907966d.yaml b/nuclei-templates/cve-less/plugins/hercules-core-59d8f9139af0fff2996b4a871907966d.yaml new file mode 100644 index 0000000000..bd5320407c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hercules-core-59d8f9139af0fff2996b4a871907966d.yaml @@ -0,0 +1,58 @@ +id: hercules-core-59d8f9139af0fff2996b4a871907966d + +info: + name: > + Hercules Core <= 6.4 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6428cf3c-a784-4e64-a6ef-041b3793ff67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hercules-core/" + google-query: inurl:"/wp-content/plugins/hercules-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hercules-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hercules-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hercules-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hermit-3ba7758def7bb999accbbcf70be2e182.yaml b/nuclei-templates/cve-less/plugins/hermit-3ba7758def7bb999accbbcf70be2e182.yaml new file mode 100644 index 0000000000..29018ddc9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hermit-3ba7758def7bb999accbbcf70be2e182.yaml @@ -0,0 +1,58 @@ +id: hermit-3ba7758def7bb999accbbcf70be2e182 + +info: + name: > + Hermit 音乐播放器 <= 3.1.6 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7b7b31a-2bc4-42b7-ba60-0f29fe65bbe7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hermit/" + google-query: inurl:"/wp-content/plugins/hermit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hermit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hermit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hermit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hermit-43b828ba6ca06e13c96e8d6957a25d26.yaml b/nuclei-templates/cve-less/plugins/hermit-43b828ba6ca06e13c96e8d6957a25d26.yaml new file mode 100644 index 0000000000..040c12826c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hermit-43b828ba6ca06e13c96e8d6957a25d26.yaml @@ -0,0 +1,58 @@ +id: hermit-43b828ba6ca06e13c96e8d6957a25d26 + +info: + name: > + Hermit 音乐播放器 <= 3.1.6 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60b1abeb-b11a-4de7-b747-53b166276a28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hermit/" + google-query: inurl:"/wp-content/plugins/hermit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hermit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hermit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hermit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hermit-45a494ad00222afc72c15fb1ebbba00a.yaml b/nuclei-templates/cve-less/plugins/hermit-45a494ad00222afc72c15fb1ebbba00a.yaml new file mode 100644 index 0000000000..0522d497f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hermit-45a494ad00222afc72c15fb1ebbba00a.yaml @@ -0,0 +1,58 @@ +id: hermit-45a494ad00222afc72c15fb1ebbba00a + +info: + name: > + Hermit 音乐播放器 <= 3.1.6 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f28e36e9-7d02-48fc-8f20-64a951af75e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hermit/" + google-query: inurl:"/wp-content/plugins/hermit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hermit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hermit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hermit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hermit-724dab272a7285745cd4df281951dbc2.yaml b/nuclei-templates/cve-less/plugins/hermit-724dab272a7285745cd4df281951dbc2.yaml new file mode 100644 index 0000000000..93b6e57c5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hermit-724dab272a7285745cd4df281951dbc2.yaml @@ -0,0 +1,58 @@ +id: hermit-724dab272a7285745cd4df281951dbc2 + +info: + name: > + Hermit 音乐播放器 <= 3.1.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3131eeeb-593d-443e-8641-7470bd1e556b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hermit/" + google-query: inurl:"/wp-content/plugins/hermit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hermit,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hermit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hermit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hero-banner-ultimate-8e499ffbdb5eeef7ac0a6adb29663778.yaml b/nuclei-templates/cve-less/plugins/hero-banner-ultimate-8e499ffbdb5eeef7ac0a6adb29663778.yaml new file mode 100644 index 0000000000..2146393302 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hero-banner-ultimate-8e499ffbdb5eeef7ac0a6adb29663778.yaml @@ -0,0 +1,58 @@ +id: hero-banner-ultimate-8e499ffbdb5eeef7ac0a6adb29663778 + +info: + name: > + Hero Banner Ultimate <= 1.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8defdd2e-e191-498e-826a-b73c6b4f2f57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hero-banner-ultimate/" + google-query: inurl:"/wp-content/plugins/hero-banner-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hero-banner-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hero-banner-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hero-banner-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hero-maps-pro-bb71b39bbb362217aeb2969b4b128fd1.yaml b/nuclei-templates/cve-less/plugins/hero-maps-pro-bb71b39bbb362217aeb2969b4b128fd1.yaml new file mode 100644 index 0000000000..bb864f5dec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hero-maps-pro-bb71b39bbb362217aeb2969b4b128fd1.yaml @@ -0,0 +1,58 @@ +id: hero-maps-pro-bb71b39bbb362217aeb2969b4b128fd1 + +info: + name: > + Hero Maps Pro <= 2.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b85c78c-da02-4871-a397-1d00a321a3c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hero-maps-pro/" + google-query: inurl:"/wp-content/plugins/hero-maps-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hero-maps-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hero-maps-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hero-maps-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/heureka-18424f590c597310c8b3007cf66d4132.yaml b/nuclei-templates/cve-less/plugins/heureka-18424f590c597310c8b3007cf66d4132.yaml new file mode 100644 index 0000000000..672e83903c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/heureka-18424f590c597310c8b3007cf66d4132.yaml @@ -0,0 +1,58 @@ +id: heureka-18424f590c597310c8b3007cf66d4132 + +info: + name: > + Heureka <= 1.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31f6ee4e-2106-42c8-8d52-0ce8e415c55f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/heureka/" + google-query: inurl:"/wp-content/plugins/heureka/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,heureka,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/heureka/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "heureka" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide-admin-bar-based-on-user-roles-bfec3335d0c8a649eb978fd7079c22ce.yaml b/nuclei-templates/cve-less/plugins/hide-admin-bar-based-on-user-roles-bfec3335d0c8a649eb978fd7079c22ce.yaml new file mode 100644 index 0000000000..37beb53b76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide-admin-bar-based-on-user-roles-bfec3335d0c8a649eb978fd7079c22ce.yaml @@ -0,0 +1,58 @@ +id: hide-admin-bar-based-on-user-roles-bfec3335d0c8a649eb978fd7079c22ce + +info: + name: > + Hide Admin Bar Based On User Roles < 3.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea0e5ae-c8b8-4782-a130-e5460a81b066?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide-admin-bar-based-on-user-roles/" + google-query: inurl:"/wp-content/plugins/hide-admin-bar-based-on-user-roles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide-admin-bar-based-on-user-roles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide-admin-bar-based-on-user-roles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide-admin-bar-based-on-user-roles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide-login-page-d8cfd8cbb536b77db396cb96c4ec7492.yaml b/nuclei-templates/cve-less/plugins/hide-login-page-d8cfd8cbb536b77db396cb96c4ec7492.yaml new file mode 100644 index 0000000000..aa88896aa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide-login-page-d8cfd8cbb536b77db396cb96c4ec7492.yaml @@ -0,0 +1,58 @@ +id: hide-login-page-d8cfd8cbb536b77db396cb96c4ec7492 + +info: + name: > + Hide login page <= 1.1.7 - Login Page Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d3cff57-ea8a-4082-bc05-d62b9d92f0e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide-login-page/" + google-query: inurl:"/wp-content/plugins/hide-login-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide-login-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide-login-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide-login-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide-my-wp-bc9fd382ebb4fba0cb4c50924f838977.yaml b/nuclei-templates/cve-less/plugins/hide-my-wp-bc9fd382ebb4fba0cb4c50924f838977.yaml new file mode 100644 index 0000000000..43199db587 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide-my-wp-bc9fd382ebb4fba0cb4c50924f838977.yaml @@ -0,0 +1,58 @@ +id: hide-my-wp-bc9fd382ebb4fba0cb4c50924f838977 + +info: + name: > + Hide My WP Ghost – Security Plugin <= 5.0.18 - IP Address Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cf89f94-587a-4fed-a6e4-3876b7dbc9ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide-my-wp/" + google-query: inurl:"/wp-content/plugins/hide-my-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide-my-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide-my-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide-my-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide-my-wp-f06e932f1a72c7fb21b21c76bafdfc46.yaml b/nuclei-templates/cve-less/plugins/hide-my-wp-f06e932f1a72c7fb21b21c76bafdfc46.yaml new file mode 100644 index 0000000000..2d76eb82dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide-my-wp-f06e932f1a72c7fb21b21c76bafdfc46.yaml @@ -0,0 +1,58 @@ +id: hide-my-wp-f06e932f1a72c7fb21b21c76bafdfc46 + +info: + name: > + Hide My WP Ghost <= 5.0.25 - CAPTCHA Bypass in brute_math_authenticate + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5618db77-fe74-4982-92b3-cec554640bde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide-my-wp/" + google-query: inurl:"/wp-content/plugins/hide-my-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide-my-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide-my-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide-my-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide-shipping-method-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/hide-shipping-method-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2ed88efda2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide-shipping-method-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: hide-shipping-method-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide-shipping-method-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/hide-shipping-method-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide-shipping-method-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide-shipping-method-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide-shipping-method-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide_my_wp-9d0b835dc24461b5e3c8d9cb0d3fe615.yaml b/nuclei-templates/cve-less/plugins/hide_my_wp-9d0b835dc24461b5e3c8d9cb0d3fe615.yaml new file mode 100644 index 0000000000..570b3191f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide_my_wp-9d0b835dc24461b5e3c8d9cb0d3fe615.yaml @@ -0,0 +1,58 @@ +id: hide_my_wp-9d0b835dc24461b5e3c8d9cb0d3fe615 + +info: + name: > + Hide My WP <= 4.53 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef96782e-d3a6-43de-bf6a-801bbe2e43ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide_my_wp/" + google-query: inurl:"/wp-content/plugins/hide_my_wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide_my_wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide_my_wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide_my_wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.54') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide_my_wp-a5da2259e66916eeb957e15e5b2a199e.yaml b/nuclei-templates/cve-less/plugins/hide_my_wp-a5da2259e66916eeb957e15e5b2a199e.yaml new file mode 100644 index 0000000000..31b849d2c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide_my_wp-a5da2259e66916eeb957e15e5b2a199e.yaml @@ -0,0 +1,58 @@ +id: hide_my_wp-a5da2259e66916eeb957e15e5b2a199e + +info: + name: > + Hide My WP <= 6.2.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04383919-dae0-4865-b0ff-88049f8cd4db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide_my_wp/" + google-query: inurl:"/wp-content/plugins/hide_my_wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide_my_wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide_my_wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide_my_wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide_my_wp-c109e83620923dabed3942bad0a8805b.yaml b/nuclei-templates/cve-less/plugins/hide_my_wp-c109e83620923dabed3942bad0a8805b.yaml new file mode 100644 index 0000000000..1d3892be50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide_my_wp-c109e83620923dabed3942bad0a8805b.yaml @@ -0,0 +1,58 @@ +id: hide_my_wp-c109e83620923dabed3942bad0a8805b + +info: + name: > + Hide My WP < 6.2.9 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/396a58d2-8357-4a8b-88a7-8c4917e27eb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide_my_wp/" + google-query: inurl:"/wp-content/plugins/hide_my_wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide_my_wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide_my_wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide_my_wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide_my_wp-e1e09568d086f8fa80d5f87a6742ffc7.yaml b/nuclei-templates/cve-less/plugins/hide_my_wp-e1e09568d086f8fa80d5f87a6742ffc7.yaml new file mode 100644 index 0000000000..9671a65167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide_my_wp-e1e09568d086f8fa80d5f87a6742ffc7.yaml @@ -0,0 +1,58 @@ +id: hide_my_wp-e1e09568d086f8fa80d5f87a6742ffc7 + +info: + name: > + Hide My WP <= 4.51.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c889c8e-7546-45bd-884b-7fb0199e595b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide_my_wp/" + google-query: inurl:"/wp-content/plugins/hide_my_wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide_my_wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide_my_wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide_my_wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hide_my_wp-f9354e3145332671221f1b57bb58f382.yaml b/nuclei-templates/cve-less/plugins/hide_my_wp-f9354e3145332671221f1b57bb58f382.yaml new file mode 100644 index 0000000000..8fc5e15390 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hide_my_wp-f9354e3145332671221f1b57bb58f382.yaml @@ -0,0 +1,58 @@ +id: hide_my_wp-f9354e3145332671221f1b57bb58f382 + +info: + name: > + Hide My WP <= 6.2.3 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3283f2b7-28a5-4c39-aeef-3237ecc57cf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hide_my_wp/" + google-query: inurl:"/wp-content/plugins/hide_my_wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hide_my_wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hide_my_wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hide_my_wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/high-compress-a3e9ff26d980a2a3e39533f0b78e5d83.yaml b/nuclei-templates/cve-less/plugins/high-compress-a3e9ff26d980a2a3e39533f0b78e5d83.yaml new file mode 100644 index 0000000000..041ab85739 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/high-compress-a3e9ff26d980a2a3e39533f0b78e5d83.yaml @@ -0,0 +1,58 @@ +id: high-compress-a3e9ff26d980a2a3e39533f0b78e5d83 + +info: + name: > + Highcompress Image Compressor <= 5.0.0 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0f2e2f4-6575-4f00-9417-3b5a19c3de40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/high-compress/" + google-query: inurl:"/wp-content/plugins/high-compress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,high-compress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/high-compress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "high-compress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/highlight-bfb136ecd8a5fcaea8f121127bb1d532.yaml b/nuclei-templates/cve-less/plugins/highlight-bfb136ecd8a5fcaea8f121127bb1d532.yaml new file mode 100644 index 0000000000..93f7e92f2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/highlight-bfb136ecd8a5fcaea8f121127bb1d532.yaml @@ -0,0 +1,58 @@ +id: highlight-bfb136ecd8a5fcaea8f121127bb1d532 + +info: + name: > + Highlight < 0.9.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/436cd742-c271-4eb7-96a3-cd6af046d26f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/highlight/" + google-query: inurl:"/wp-content/plugins/highlight/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,highlight,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/highlight/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "highlight" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/highlight-focus-4f5affe3e6d10944ac86113d1e4881da.yaml b/nuclei-templates/cve-less/plugins/highlight-focus-4f5affe3e6d10944ac86113d1e4881da.yaml new file mode 100644 index 0000000000..8bd41f9564 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/highlight-focus-4f5affe3e6d10944ac86113d1e4881da.yaml @@ -0,0 +1,58 @@ +id: highlight-focus-4f5affe3e6d10944ac86113d1e4881da + +info: + name: > + Highlight Focus <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1b4841b-c701-4915-9592-518e68179d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/highlight-focus/" + google-query: inurl:"/wp-content/plugins/highlight-focus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,highlight-focus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/highlight-focus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "highlight-focus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/highlight-search-terms-results-cccbeb1e67006355f6c0344c831a92e5.yaml b/nuclei-templates/cve-less/plugins/highlight-search-terms-results-cccbeb1e67006355f6c0344c831a92e5.yaml new file mode 100644 index 0000000000..3d780166fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/highlight-search-terms-results-cccbeb1e67006355f6c0344c831a92e5.yaml @@ -0,0 +1,58 @@ +id: highlight-search-terms-results-cccbeb1e67006355f6c0344c831a92e5 + +info: + name: > + Highlight Searched Terms in Results <= 1.03 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dbd29ba-c4e8-4a43-b17c-332807570309?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/highlight-search-terms-results/" + google-query: inurl:"/wp-content/plugins/highlight-search-terms-results/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,highlight-search-terms-results,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/highlight-search-terms-results/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "highlight-search-terms-results" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/history-collection-a292899c8a2340a097d09b07ac49f9ad.yaml b/nuclei-templates/cve-less/plugins/history-collection-a292899c8a2340a097d09b07ac49f9ad.yaml new file mode 100644 index 0000000000..f2dca5793c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/history-collection-a292899c8a2340a097d09b07ac49f9ad.yaml @@ -0,0 +1,58 @@ +id: history-collection-a292899c8a2340a097d09b07ac49f9ad + +info: + name: > + History Collection <=1.1.1 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24b319e6-1903-44a9-9f69-0e5ebe891870?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/history-collection/" + google-query: inurl:"/wp-content/plugins/history-collection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,history-collection,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/history-collection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "history-collection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/history-log-by-click5-8c87a28bec934dcd5364cbdca924c771.yaml b/nuclei-templates/cve-less/plugins/history-log-by-click5-8c87a28bec934dcd5364cbdca924c771.yaml new file mode 100644 index 0000000000..8fa59edea0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/history-log-by-click5-8c87a28bec934dcd5364cbdca924c771.yaml @@ -0,0 +1,58 @@ +id: history-log-by-click5-8c87a28bec934dcd5364cbdca924c771 + +info: + name: > + History Log by click5 <= 1.0.12 - Authenticated(Administrator+) Time-Based Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2881e144-a109-4034-afe8-2f72efd70360?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/history-log-by-click5/" + google-query: inurl:"/wp-content/plugins/history-log-by-click5/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,history-log-by-click5,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/history-log-by-click5/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "history-log-by-click5" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hitsteps-visitor-manager-99e03ce9a586679417b36a7850aaddc6.yaml b/nuclei-templates/cve-less/plugins/hitsteps-visitor-manager-99e03ce9a586679417b36a7850aaddc6.yaml new file mode 100644 index 0000000000..6cc4aede4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hitsteps-visitor-manager-99e03ce9a586679417b36a7850aaddc6.yaml @@ -0,0 +1,58 @@ +id: hitsteps-visitor-manager-99e03ce9a586679417b36a7850aaddc6 + +info: + name: > + Hitsteps Web Analytics <= 5.86 - Cross-Site Request Forgery via hst_optionpage + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7252075f-9326-4f04-bdd9-b244609c9cd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hitsteps-visitor-manager/" + google-query: inurl:"/wp-content/plugins/hitsteps-visitor-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hitsteps-visitor-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hitsteps-visitor-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hitsteps-visitor-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.86') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hitsteps-visitor-manager-c0963c297f9f408e178419f30ee7e022.yaml b/nuclei-templates/cve-less/plugins/hitsteps-visitor-manager-c0963c297f9f408e178419f30ee7e022.yaml new file mode 100644 index 0000000000..1717db6a00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hitsteps-visitor-manager-c0963c297f9f408e178419f30ee7e022.yaml @@ -0,0 +1,58 @@ +id: hitsteps-visitor-manager-c0963c297f9f408e178419f30ee7e022 + +info: + name: > + Hitsteps Web Analytics <= 5.86 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f68a386b-544f-4aa2-8ae5-4d57ddd07b63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hitsteps-visitor-manager/" + google-query: inurl:"/wp-content/plugins/hitsteps-visitor-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hitsteps-visitor-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hitsteps-visitor-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hitsteps-visitor-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.86') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hiweb-migration-simple-927e2c90815a01d50a3aecbb0efc5c7c.yaml b/nuclei-templates/cve-less/plugins/hiweb-migration-simple-927e2c90815a01d50a3aecbb0efc5c7c.yaml new file mode 100644 index 0000000000..a6e4b54d11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hiweb-migration-simple-927e2c90815a01d50a3aecbb0efc5c7c.yaml @@ -0,0 +1,58 @@ +id: hiweb-migration-simple-927e2c90815a01d50a3aecbb0efc5c7c + +info: + name: > + hiWeb Migration Simple <= 2.0.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9aacc69-aa46-4cdb-a301-c0bf2836d441?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hiweb-migration-simple/" + google-query: inurl:"/wp-content/plugins/hiweb-migration-simple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hiweb-migration-simple,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hiweb-migration-simple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hiweb-migration-simple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hk-exif-tags-f98ba84845d04638f96a14d587800f12.yaml b/nuclei-templates/cve-less/plugins/hk-exif-tags-f98ba84845d04638f96a14d587800f12.yaml new file mode 100644 index 0000000000..751c1bdbf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hk-exif-tags-f98ba84845d04638f96a14d587800f12.yaml @@ -0,0 +1,58 @@ +id: hk-exif-tags-f98ba84845d04638f96a14d587800f12 + +info: + name: > + HK Exif Tags <= 1.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/835cbcfa-bb8d-4b46-9316-500e1b47cfb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hk-exif-tags/" + google-query: inurl:"/wp-content/plugins/hk-exif-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hk-exif-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hk-exif-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hk-exif-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hk-filter-and-search-dd02ae8823de431da5d5d52246acd7ff.yaml b/nuclei-templates/cve-less/plugins/hk-filter-and-search-dd02ae8823de431da5d5d52246acd7ff.yaml new file mode 100644 index 0000000000..e806a3a500 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hk-filter-and-search-dd02ae8823de431da5d5d52246acd7ff.yaml @@ -0,0 +1,58 @@ +id: hk-filter-and-search-dd02ae8823de431da5d5d52246acd7ff + +info: + name: > + HTML filter and csv-file search <= 2.7 - Authenticated (Contributor+) Local File Inclusion via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee2b4055-8cbd-49b7-bb0b-eddef85060fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hk-filter-and-search/" + google-query: inurl:"/wp-content/plugins/hk-filter-and-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hk-filter-and-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hk-filter-and-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hk-filter-and-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hk-filter-and-search-ec9f1feec044e5447ec3ac663c7a05af.yaml b/nuclei-templates/cve-less/plugins/hk-filter-and-search-ec9f1feec044e5447ec3ac663c7a05af.yaml new file mode 100644 index 0000000000..050b00a38b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hk-filter-and-search-ec9f1feec044e5447ec3ac663c7a05af.yaml @@ -0,0 +1,58 @@ +id: hk-filter-and-search-ec9f1feec044e5447ec3ac663c7a05af + +info: + name: > + HTML filter and csv-file search <= 2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/157eddd4-67f0-4a07-b3ab-11dbfb9f12aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hk-filter-and-search/" + google-query: inurl:"/wp-content/plugins/hk-filter-and-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hk-filter-and-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hk-filter-and-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hk-filter-and-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hkdev-maintenance-mode-7378070b61d09db85a0d4e6a50aa47a8.yaml b/nuclei-templates/cve-less/plugins/hkdev-maintenance-mode-7378070b61d09db85a0d4e6a50aa47a8.yaml new file mode 100644 index 0000000000..6aa1edeb73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hkdev-maintenance-mode-7378070b61d09db85a0d4e6a50aa47a8.yaml @@ -0,0 +1,58 @@ +id: hkdev-maintenance-mode-7378070b61d09db85a0d4e6a50aa47a8 + +info: + name: > + Maintenance Mode by helderk <= 3.0.1 - Unauthenticated IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17906039-0130-4e24-b932-1ba19d3d58ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hkdev-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/hkdev-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hkdev-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hkdev-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hkdev-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hkdev-maintenance-mode-c0b53a118173c14a546665b5482b078d.yaml b/nuclei-templates/cve-less/plugins/hkdev-maintenance-mode-c0b53a118173c14a546665b5482b078d.yaml new file mode 100644 index 0000000000..3eacfb17ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hkdev-maintenance-mode-c0b53a118173c14a546665b5482b078d.yaml @@ -0,0 +1,58 @@ +id: hkdev-maintenance-mode-c0b53a118173c14a546665b5482b078d + +info: + name: > + Maintenance Mode <= 3.0.1 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36def628-e09e-4da0-ab14-35aefcb67f73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hkdev-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/hkdev-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hkdev-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hkdev-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hkdev-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hm-multiple-roles-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/hm-multiple-roles-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2b99700b2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hm-multiple-roles-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: hm-multiple-roles-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hm-multiple-roles/" + google-query: inurl:"/wp-content/plugins/hm-multiple-roles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hm-multiple-roles,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hm-multiple-roles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hm-multiple-roles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hm-multiple-roles-db1c5c8b7f25d9de3f31e4725ede7e61.yaml b/nuclei-templates/cve-less/plugins/hm-multiple-roles-db1c5c8b7f25d9de3f31e4725ede7e61.yaml new file mode 100644 index 0000000000..a4c251a776 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hm-multiple-roles-db1c5c8b7f25d9de3f31e4725ede7e61.yaml @@ -0,0 +1,58 @@ +id: hm-multiple-roles-db1c5c8b7f25d9de3f31e4725ede7e61 + +info: + name: > + HM Multiple Roles <= 1.2 - Privilege Escalation via Arbitrary Role Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14f0df3e-4333-49d8-a318-6f9fa614c23e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hm-multiple-roles/" + google-query: inurl:"/wp-content/plugins/hm-multiple-roles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hm-multiple-roles,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hm-multiple-roles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hm-multiple-roles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hmapsprem-294b436d8db887cede47424adf8c58d6.yaml b/nuclei-templates/cve-less/plugins/hmapsprem-294b436d8db887cede47424adf8c58d6.yaml new file mode 100644 index 0000000000..731a6babad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hmapsprem-294b436d8db887cede47424adf8c58d6.yaml @@ -0,0 +1,58 @@ +id: hmapsprem-294b436d8db887cede47424adf8c58d6 + +info: + name: > + Hero Maps Premium <= 2.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a1f2a7d-f91c-4dd2-b275-0e27f65498b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hmapsprem/" + google-query: inurl:"/wp-content/plugins/hmapsprem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hmapsprem,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hmapsprem/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hmapsprem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hms-testimonials-0edbba73cef4d5273525e9fdeb2bcb4c.yaml b/nuclei-templates/cve-less/plugins/hms-testimonials-0edbba73cef4d5273525e9fdeb2bcb4c.yaml new file mode 100644 index 0000000000..8792e925e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hms-testimonials-0edbba73cef4d5273525e9fdeb2bcb4c.yaml @@ -0,0 +1,58 @@ +id: hms-testimonials-0edbba73cef4d5273525e9fdeb2bcb4c + +info: + name: > + HMS Testimonials < 2.0.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2d31521-5fe1-48ce-881c-4cacdbe08f21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hms-testimonials/" + google-query: inurl:"/wp-content/plugins/hms-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hms-testimonials,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hms-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hms-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hms-testimonials-8de4556487daff9f80ef882a72ac48a1.yaml b/nuclei-templates/cve-less/plugins/hms-testimonials-8de4556487daff9f80ef882a72ac48a1.yaml new file mode 100644 index 0000000000..b27fca3bef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hms-testimonials-8de4556487daff9f80ef882a72ac48a1.yaml @@ -0,0 +1,58 @@ +id: hms-testimonials-8de4556487daff9f80ef882a72ac48a1 + +info: + name: > + HMS Testimonials <= 2.0.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0406b7a0-517d-4462-9b65-d4f708cf364d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hms-testimonials/" + google-query: inurl:"/wp-content/plugins/hms-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hms-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hms-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hms-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/holler-box-62f024d1a6544d8128f328de7ec4ed81.yaml b/nuclei-templates/cve-less/plugins/holler-box-62f024d1a6544d8128f328de7ec4ed81.yaml new file mode 100644 index 0000000000..e9cc7de7df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/holler-box-62f024d1a6544d8128f328de7ec4ed81.yaml @@ -0,0 +1,58 @@ +id: holler-box-62f024d1a6544d8128f328de7ec4ed81 + +info: + name: > + HollerBox <= 2.1.3 - Authenticated (edit_popups+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4970be62-9aad-4a5f-9dd3-4bf48bded022?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/holler-box/" + google-query: inurl:"/wp-content/plugins/holler-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,holler-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/holler-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "holler-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/holler-box-ca4ae9210ad5c6416e62ede162724557.yaml b/nuclei-templates/cve-less/plugins/holler-box-ca4ae9210ad5c6416e62ede162724557.yaml new file mode 100644 index 0000000000..e6b8b1fd97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/holler-box-ca4ae9210ad5c6416e62ede162724557.yaml @@ -0,0 +1,58 @@ +id: holler-box-ca4ae9210ad5c6416e62ede162724557 + +info: + name: > + HollerBox <= 2.3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c76871e-b774-4284-ad00-f8ef7f6df389?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/holler-box/" + google-query: inurl:"/wp-content/plugins/holler-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,holler-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/holler-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "holler-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/homepage-pop-up-48cb81f29289d3dff74b9ff9eb6ca258.yaml b/nuclei-templates/cve-less/plugins/homepage-pop-up-48cb81f29289d3dff74b9ff9eb6ca258.yaml new file mode 100644 index 0000000000..90da163d36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/homepage-pop-up-48cb81f29289d3dff74b9ff9eb6ca258.yaml @@ -0,0 +1,58 @@ +id: homepage-pop-up-48cb81f29289d3dff74b9ff9eb6ca258 + +info: + name: > + Homepage PopUp <= 1.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e61f1835-2e56-40c8-b4b9-b3b9766d7e46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/homepage-pop-up/" + google-query: inurl:"/wp-content/plugins/homepage-pop-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,homepage-pop-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/homepage-pop-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "homepage-pop-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/homepage-pop-up-9fb8bc0ed140e27215d75f6096a9ee6f.yaml b/nuclei-templates/cve-less/plugins/homepage-pop-up-9fb8bc0ed140e27215d75f6096a9ee6f.yaml new file mode 100644 index 0000000000..96c0620bf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/homepage-pop-up-9fb8bc0ed140e27215d75f6096a9ee6f.yaml @@ -0,0 +1,58 @@ +id: homepage-pop-up-9fb8bc0ed140e27215d75f6096a9ee6f + +info: + name: > + Homepage Popup <= 1.2.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85438fad-2111-494a-9ba6-854c66d21149?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/homepage-pop-up/" + google-query: inurl:"/wp-content/plugins/homepage-pop-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,homepage-pop-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/homepage-pop-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "homepage-pop-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/homepage-product-organizer-for-woocommerce-61ef4484d482c37a0de9af18fac5edf6.yaml b/nuclei-templates/cve-less/plugins/homepage-product-organizer-for-woocommerce-61ef4484d482c37a0de9af18fac5edf6.yaml new file mode 100644 index 0000000000..a14df90adc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/homepage-product-organizer-for-woocommerce-61ef4484d482c37a0de9af18fac5edf6.yaml @@ -0,0 +1,58 @@ +id: homepage-product-organizer-for-woocommerce-61ef4484d482c37a0de9af18fac5edf6 + +info: + name: > + Homepage Product Organizer for WooCommerce <= 1.1 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bd06e1e-505d-491e-a92b-61d390c97ea8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/homepage-product-organizer-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/homepage-product-organizer-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,homepage-product-organizer-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/homepage-product-organizer-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "homepage-product-organizer-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/honeypot-4c06879b605c0ddf9d3252fe12dff25c.yaml b/nuclei-templates/cve-less/plugins/honeypot-4c06879b605c0ddf9d3252fe12dff25c.yaml new file mode 100644 index 0000000000..20834036eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/honeypot-4c06879b605c0ddf9d3252fe12dff25c.yaml @@ -0,0 +1,58 @@ +id: honeypot-4c06879b605c0ddf9d3252fe12dff25c + +info: + name: > + WP Armour Honeypot Anti Spam <= 1.5.6 -Cross-Site Request Forgery to Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fd58397-7598-4d98-a6b3-c5837cb3b73e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/honeypot/" + google-query: inurl:"/wp-content/plugins/honeypot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,honeypot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/honeypot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "honeypot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/honeypot-84ddb55655b14833e201c7e5f21d2907.yaml b/nuclei-templates/cve-less/plugins/honeypot-84ddb55655b14833e201c7e5f21d2907.yaml new file mode 100644 index 0000000000..8048caa5b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/honeypot-84ddb55655b14833e201c7e5f21d2907.yaml @@ -0,0 +1,58 @@ +id: honeypot-84ddb55655b14833e201c7e5f21d2907 + +info: + name: > + WP Armour – Honeypot Anti Spam <= 2.1.13 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6e70e5f-6b4b-40c1-b43c-957ca97e162a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/honeypot/" + google-query: inurl:"/wp-content/plugins/honeypot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,honeypot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/honeypot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "honeypot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/honeypot-for-wp-comment-2030c3497157a45619c53075fe4be64d.yaml b/nuclei-templates/cve-less/plugins/honeypot-for-wp-comment-2030c3497157a45619c53075fe4be64d.yaml new file mode 100644 index 0000000000..69f2234086 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/honeypot-for-wp-comment-2030c3497157a45619c53075fe4be64d.yaml @@ -0,0 +1,58 @@ +id: honeypot-for-wp-comment-2030c3497157a45619c53075fe4be64d + +info: + name: > + Honeypot for WP Comment <= 2.2.3 - Reflected Cross-Site Scripting via page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1441e68-5c41-4c90-ba99-1656af87a29d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/honeypot-for-wp-comment/" + google-query: inurl:"/wp-content/plugins/honeypot-for-wp-comment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,honeypot-for-wp-comment,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/honeypot-for-wp-comment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "honeypot-for-wp-comment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/honeypot-for-wp-comment-a8665e653501dfd87d7b7e15f79ece36.yaml b/nuclei-templates/cve-less/plugins/honeypot-for-wp-comment-a8665e653501dfd87d7b7e15f79ece36.yaml new file mode 100644 index 0000000000..08468398bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/honeypot-for-wp-comment-a8665e653501dfd87d7b7e15f79ece36.yaml @@ -0,0 +1,58 @@ +id: honeypot-for-wp-comment-a8665e653501dfd87d7b7e15f79ece36 + +info: + name: > + Honeypot for WP Comment <= 2.2.3 - Directory Traversal to Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6b0bb48-eb61-4236-a03f-19d5d2084a75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/honeypot-for-wp-comment/" + google-query: inurl:"/wp-content/plugins/honeypot-for-wp-comment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,honeypot-for-wp-comment,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/honeypot-for-wp-comment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "honeypot-for-wp-comment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hooked-editable-content-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/hooked-editable-content-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e4c839c12b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hooked-editable-content-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: hooked-editable-content-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hooked-editable-content/" + google-query: inurl:"/wp-content/plugins/hooked-editable-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hooked-editable-content,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hooked-editable-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hooked-editable-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/horizontal-scrolling-announcement-797d8c237b397ae53a63dd9186307bf3.yaml b/nuclei-templates/cve-less/plugins/horizontal-scrolling-announcement-797d8c237b397ae53a63dd9186307bf3.yaml new file mode 100644 index 0000000000..903d5e60bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/horizontal-scrolling-announcement-797d8c237b397ae53a63dd9186307bf3.yaml @@ -0,0 +1,58 @@ +id: horizontal-scrolling-announcement-797d8c237b397ae53a63dd9186307bf3 + +info: + name: > + Horizontal scrolling announcement <= 9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4f60e8c-2745-4930-9101-914bd73c6e1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/horizontal-scrolling-announcement/" + google-query: inurl:"/wp-content/plugins/horizontal-scrolling-announcement/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,horizontal-scrolling-announcement,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/horizontal-scrolling-announcement/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "horizontal-scrolling-announcement" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/horizontal-scrolling-announcement-c7a804f58a12769a69ea7efb7fd135b4.yaml b/nuclei-templates/cve-less/plugins/horizontal-scrolling-announcement-c7a804f58a12769a69ea7efb7fd135b4.yaml new file mode 100644 index 0000000000..8276795c78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/horizontal-scrolling-announcement-c7a804f58a12769a69ea7efb7fd135b4.yaml @@ -0,0 +1,58 @@ +id: horizontal-scrolling-announcement-c7a804f58a12769a69ea7efb7fd135b4 + +info: + name: > + Horizontal scrolling announcement <= 9.2 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf50922a-58a6-4ca4-80b7-cafb37b87216?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/horizontal-scrolling-announcement/" + google-query: inurl:"/wp-content/plugins/horizontal-scrolling-announcement/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,horizontal-scrolling-announcement,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/horizontal-scrolling-announcement/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "horizontal-scrolling-announcement" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hospital-management-6c841a99daf37cae6f46cd0d753efccb.yaml b/nuclei-templates/cve-less/plugins/hospital-management-6c841a99daf37cae6f46cd0d753efccb.yaml new file mode 100644 index 0000000000..45c959e4a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hospital-management-6c841a99daf37cae6f46cd0d753efccb.yaml @@ -0,0 +1,58 @@ +id: hospital-management-6c841a99daf37cae6f46cd0d753efccb + +info: + name: > + Mojoomla Hospital Management System for WordPress Theme < 22-05-2018 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8f92355-e664-4aeb-9094-9c8aa49cd3e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hospital-management/" + google-query: inurl:"/wp-content/plugins/hospital-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hospital-management,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hospital-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hospital-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 08-03-2018') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/host-analyticsjs-local-8450871a53e20b19adaa61e1434e59d8.yaml b/nuclei-templates/cve-less/plugins/host-analyticsjs-local-8450871a53e20b19adaa61e1434e59d8.yaml new file mode 100644 index 0000000000..a752086030 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/host-analyticsjs-local-8450871a53e20b19adaa61e1434e59d8.yaml @@ -0,0 +1,58 @@ +id: host-analyticsjs-local-8450871a53e20b19adaa61e1434e59d8 + +info: + name: > + CAOS | Host Google Analytics Locally <= 4.7.14 - Missing Authorization to Unauthenticated Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ec1fd03-f865-4f58-b63b-e70c0c7e701d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/host-analyticsjs-local/" + google-query: inurl:"/wp-content/plugins/host-analyticsjs-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,host-analyticsjs-local,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/host-analyticsjs-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "host-analyticsjs-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/host-analyticsjs-local-fbc80c02043c699931d3e726696377ec.yaml b/nuclei-templates/cve-less/plugins/host-analyticsjs-local-fbc80c02043c699931d3e726696377ec.yaml new file mode 100644 index 0000000000..28dada3939 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/host-analyticsjs-local-fbc80c02043c699931d3e726696377ec.yaml @@ -0,0 +1,58 @@ +id: host-analyticsjs-local-fbc80c02043c699931d3e726696377ec + +info: + name: > + CAOS <= 4.1.8 - Admin+ Arbitrary Folder Deletion via Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a6cda1f-8af9-44b1-98e2-619d29c28a88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/host-analyticsjs-local/" + google-query: inurl:"/wp-content/plugins/host-analyticsjs-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,host-analyticsjs-local,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/host-analyticsjs-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "host-analyticsjs-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/host-webfonts-local-2442f509b4c40ac50640a6c02e5c1509.yaml b/nuclei-templates/cve-less/plugins/host-webfonts-local-2442f509b4c40ac50640a6c02e5c1509.yaml new file mode 100644 index 0000000000..5a075037db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/host-webfonts-local-2442f509b4c40ac50640a6c02e5c1509.yaml @@ -0,0 +1,58 @@ +id: host-webfonts-local-2442f509b4c40ac50640a6c02e5c1509 + +info: + name: > + OMGF <= 4.5.11 - Authenticated (Admin+) Arbitrary Folder Deletion via Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6c71e38-5ac3-46f1-8292-a49c6e44f1d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/host-webfonts-local/" + google-query: inurl:"/wp-content/plugins/host-webfonts-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,host-webfonts-local,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/host-webfonts-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "host-webfonts-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/host-webfonts-local-c613d8cee5f1f00301bb24d6fb1e61f7.yaml b/nuclei-templates/cve-less/plugins/host-webfonts-local-c613d8cee5f1f00301bb24d6fb1e61f7.yaml new file mode 100644 index 0000000000..a34ad49be5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/host-webfonts-local-c613d8cee5f1f00301bb24d6fb1e61f7.yaml @@ -0,0 +1,58 @@ +id: host-webfonts-local-c613d8cee5f1f00301bb24d6fb1e61f7 + +info: + name: > + OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. <= 5.7.9 - Missing Authorization to Unauthenticated Directory Deletion and Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e835b97-c066-4e8f-b99f-1a930105af0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/host-webfonts-local/" + google-query: inurl:"/wp-content/plugins/host-webfonts-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,host-webfonts-local,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/host-webfonts-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "host-webfonts-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/host-webfonts-local-ca17e2759a3859433a0fdcccce8347ca.yaml b/nuclei-templates/cve-less/plugins/host-webfonts-local-ca17e2759a3859433a0fdcccce8347ca.yaml new file mode 100644 index 0000000000..b0c1acd356 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/host-webfonts-local-ca17e2759a3859433a0fdcccce8347ca.yaml @@ -0,0 +1,58 @@ +id: host-webfonts-local-ca17e2759a3859433a0fdcccce8347ca + +info: + name: > + OMGF <= 4.5.3 - Subscriber+ Arbitrary File/Folder Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a00980c-2d27-4363-acad-ed9d1e7e37b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/host-webfonts-local/" + google-query: inurl:"/wp-content/plugins/host-webfonts-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,host-webfonts-local,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/host-webfonts-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "host-webfonts-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/host-webfonts-local-e5f4d0fbf2cb3e2ba7d87aa6af9f1099.yaml b/nuclei-templates/cve-less/plugins/host-webfonts-local-e5f4d0fbf2cb3e2ba7d87aa6af9f1099.yaml new file mode 100644 index 0000000000..1f99b53be4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/host-webfonts-local-e5f4d0fbf2cb3e2ba7d87aa6af9f1099.yaml @@ -0,0 +1,58 @@ +id: host-webfonts-local-e5f4d0fbf2cb3e2ba7d87aa6af9f1099 + +info: + name: > + OMGF <= 4.5.3 - Unauthenticated Path Traversal in REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b90640d2-d6f4-4c3b-8e9b-038d57f5fd6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/host-webfonts-local/" + google-query: inurl:"/wp-content/plugins/host-webfonts-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,host-webfonts-local,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/host-webfonts-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "host-webfonts-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hostel-16bd3db16d545cda6e318dd7aeadbea4.yaml b/nuclei-templates/cve-less/plugins/hostel-16bd3db16d545cda6e318dd7aeadbea4.yaml new file mode 100644 index 0000000000..248440fbb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hostel-16bd3db16d545cda6e318dd7aeadbea4.yaml @@ -0,0 +1,58 @@ +id: hostel-16bd3db16d545cda6e318dd7aeadbea4 + +info: + name: > + hostel <= 1.1.5.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a8c5d9b-4535-4edb-a92e-a9b83a0d22c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hostel/" + google-query: inurl:"/wp-content/plugins/hostel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hostel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hostel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hostel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hostel-2719d6731668b9065520117203a3303c.yaml b/nuclei-templates/cve-less/plugins/hostel-2719d6731668b9065520117203a3303c.yaml new file mode 100644 index 0000000000..5eac12c21c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hostel-2719d6731668b9065520117203a3303c.yaml @@ -0,0 +1,58 @@ +id: hostel-2719d6731668b9065520117203a3303c + +info: + name: > + Hostel <= 1.1.5.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via Manage Bookings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4865576-9929-4ce2-a220-935f1f3e0485?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hostel/" + google-query: inurl:"/wp-content/plugins/hostel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hostel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hostel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hostel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hostel-50b601cc2c81a33254df5b8d86129b71.yaml b/nuclei-templates/cve-less/plugins/hostel-50b601cc2c81a33254df5b8d86129b71.yaml new file mode 100644 index 0000000000..75afe97978 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hostel-50b601cc2c81a33254df5b8d86129b71.yaml @@ -0,0 +1,58 @@ +id: hostel-50b601cc2c81a33254df5b8d86129b71 + +info: + name: > + Hostel <= 1.1.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5686bc0f-efe7-4268-a6e1-bec939504ab4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hostel/" + google-query: inurl:"/wp-content/plugins/hostel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hostel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hostel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hostel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hostel-da8a9590fd2919ac3b910c3614df54d5.yaml b/nuclei-templates/cve-less/plugins/hostel-da8a9590fd2919ac3b910c3614df54d5.yaml new file mode 100644 index 0000000000..e4aa00b8be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hostel-da8a9590fd2919ac3b910c3614df54d5.yaml @@ -0,0 +1,58 @@ +id: hostel-da8a9590fd2919ac3b910c3614df54d5 + +info: + name: > + Hostel <= 1.1.5.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb98b2ee-5c51-453f-9e55-52027237e732?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hostel/" + google-query: inurl:"/wp-content/plugins/hostel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hostel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hostel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hostel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hostinger-fda0de5b4c70706b1c7590b4b32d12b9.yaml b/nuclei-templates/cve-less/plugins/hostinger-fda0de5b4c70706b1c7590b4b32d12b9.yaml new file mode 100644 index 0000000000..725cba6d67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hostinger-fda0de5b4c70706b1c7590b4b32d12b9.yaml @@ -0,0 +1,58 @@ +id: hostinger-fda0de5b4c70706b1c7590b4b32d12b9 + +info: + name: > + Hostinger <= 1.9.7 - Missing Authorization to Maintenance Mode Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d89cf759-5e5f-43e2-90a9-a8e554653ee1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hostinger/" + google-query: inurl:"/wp-content/plugins/hostinger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hostinger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hostinger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hostinger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hot-linked-image-cacher-9e20884f267dfae0b2011b836be1bba3.yaml b/nuclei-templates/cve-less/plugins/hot-linked-image-cacher-9e20884f267dfae0b2011b836be1bba3.yaml new file mode 100644 index 0000000000..c7ec641a6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hot-linked-image-cacher-9e20884f267dfae0b2011b836be1bba3.yaml @@ -0,0 +1,58 @@ +id: hot-linked-image-cacher-9e20884f267dfae0b2011b836be1bba3 + +info: + name: > + Hot Linked Image Cacher <= 1.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/410cc5f0-265a-46c1-a334-115142318d10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hot-linked-image-cacher/" + google-query: inurl:"/wp-content/plugins/hot-linked-image-cacher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hot-linked-image-cacher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hot-linked-image-cacher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hot-linked-image-cacher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hot-linked-image-cacher-c27aea985311d8d430509d848af8ed00.yaml b/nuclei-templates/cve-less/plugins/hot-linked-image-cacher-c27aea985311d8d430509d848af8ed00.yaml new file mode 100644 index 0000000000..bb60b9aceb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hot-linked-image-cacher-c27aea985311d8d430509d848af8ed00.yaml @@ -0,0 +1,58 @@ +id: hot-linked-image-cacher-c27aea985311d8d430509d848af8ed00 + +info: + name: > + Hot Linked Image Cacher <= 1.16 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e3f199b-b75d-43a2-a20c-957fb1b512e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hot-linked-image-cacher/" + google-query: inurl:"/wp-content/plugins/hot-linked-image-cacher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hot-linked-image-cacher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hot-linked-image-cacher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hot-linked-image-cacher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hot-random-image-ac9cb365e503376aa31ed761706bf88b.yaml b/nuclei-templates/cve-less/plugins/hot-random-image-ac9cb365e503376aa31ed761706bf88b.yaml new file mode 100644 index 0000000000..c109eab48c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hot-random-image-ac9cb365e503376aa31ed761706bf88b.yaml @@ -0,0 +1,58 @@ +id: hot-random-image-ac9cb365e503376aa31ed761706bf88b + +info: + name: > + Hot Random Image <= 1.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8a27ec5-019b-4aa5-8317-1c832af3b7ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hot-random-image/" + google-query: inurl:"/wp-content/plugins/hot-random-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hot-random-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hot-random-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hot-random-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hotel-listing-5485a109494b4df54da4337a9efe8523.yaml b/nuclei-templates/cve-less/plugins/hotel-listing-5485a109494b4df54da4337a9efe8523.yaml new file mode 100644 index 0000000000..188e53a8d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hotel-listing-5485a109494b4df54da4337a9efe8523.yaml @@ -0,0 +1,58 @@ +id: hotel-listing-5485a109494b4df54da4337a9efe8523 + +info: + name: > + Hotel Listings < 1.3.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40488ed8-ab4c-4ba6-821e-ed6d7a63e260?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hotel-listing/" + google-query: inurl:"/wp-content/plugins/hotel-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hotel-listing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hotel-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hotel-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hotel-listing-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/hotel-listing-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..f4774b24cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hotel-listing-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: hotel-listing-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hotel-listing/" + google-query: inurl:"/wp-content/plugins/hotel-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hotel-listing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hotel-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hotel-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hotjar-28e170e893975e3ad314a1e6dd206e77.yaml b/nuclei-templates/cve-less/plugins/hotjar-28e170e893975e3ad314a1e6dd206e77.yaml new file mode 100644 index 0000000000..3458f37dd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hotjar-28e170e893975e3ad314a1e6dd206e77.yaml @@ -0,0 +1,58 @@ +id: hotjar-28e170e893975e3ad314a1e6dd206e77 + +info: + name: > + Hotjar <= 1.0.15 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c640bcb-b6bf-4865-b713-32ca846e4ed9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hotjar/" + google-query: inurl:"/wp-content/plugins/hotjar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hotjar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hotjar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hotjar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hotjar-connecticator-106707c65ee1208d448d3a7f0350d84b.yaml b/nuclei-templates/cve-less/plugins/hotjar-connecticator-106707c65ee1208d448d3a7f0350d84b.yaml new file mode 100644 index 0000000000..6ef0646157 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hotjar-connecticator-106707c65ee1208d448d3a7f0350d84b.yaml @@ -0,0 +1,58 @@ +id: hotjar-connecticator-106707c65ee1208d448d3a7f0350d84b + +info: + name: > + Hotjar Connecticator <= 1.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bbcd280-25c3-4bc3-88bf-d109cfd1e855?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hotjar-connecticator/" + google-query: inurl:"/wp-content/plugins/hotjar-connecticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hotjar-connecticator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hotjar-connecticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hotjar-connecticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hotscot-contact-form-e36d961a443fc07bfdc5e0b939b3e6e6.yaml b/nuclei-templates/cve-less/plugins/hotscot-contact-form-e36d961a443fc07bfdc5e0b939b3e6e6.yaml new file mode 100644 index 0000000000..15d4a2d412 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hotscot-contact-form-e36d961a443fc07bfdc5e0b939b3e6e6.yaml @@ -0,0 +1,58 @@ +id: hotscot-contact-form-e36d961a443fc07bfdc5e0b939b3e6e6 + +info: + name: > + Hotscot Contact Form < 1.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad85b322-204a-4d74-8dde-38571fb68dd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hotscot-contact-form/" + google-query: inurl:"/wp-content/plugins/hotscot-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hotscot-contact-form,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hotscot-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hotscot-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/houzez-crm-a2b34dc7c637e9503c30ea45277c4ce7.yaml b/nuclei-templates/cve-less/plugins/houzez-crm-a2b34dc7c637e9503c30ea45277c4ce7.yaml new file mode 100644 index 0000000000..8aabe1b5af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/houzez-crm-a2b34dc7c637e9503c30ea45277c4ce7.yaml @@ -0,0 +1,58 @@ +id: houzez-crm-a2b34dc7c637e9503c30ea45277c4ce7 + +info: + name: > + Houzez CRM <= 1.3.4 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54c14f04-32ec-4d05-b47b-3ff5e70c4daf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/houzez-crm/" + google-query: inurl:"/wp-content/plugins/houzez-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,houzez-crm,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/houzez-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "houzez-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/houzez-login-register-6dad969c863a9551ee44b8e68612f92c.yaml b/nuclei-templates/cve-less/plugins/houzez-login-register-6dad969c863a9551ee44b8e68612f92c.yaml new file mode 100644 index 0000000000..198c098331 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/houzez-login-register-6dad969c863a9551ee44b8e68612f92c.yaml @@ -0,0 +1,58 @@ +id: houzez-login-register-6dad969c863a9551ee44b8e68612f92c + +info: + name: > + Houzez Login Register <= 2.6.3 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2948d8f6-4b7b-49c3-a917-4306448416ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/houzez-login-register/" + google-query: inurl:"/wp-content/plugins/houzez-login-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,houzez-login-register,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/houzez-login-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "houzez-login-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hover-effects-4e07fbfa9287b3d698591e747048b894.yaml b/nuclei-templates/cve-less/plugins/hover-effects-4e07fbfa9287b3d698591e747048b894.yaml new file mode 100644 index 0000000000..c550744259 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hover-effects-4e07fbfa9287b3d698591e747048b894.yaml @@ -0,0 +1,58 @@ +id: hover-effects-4e07fbfa9287b3d698591e747048b894 + +info: + name: > + Hover Effects – easily create any hover effect <= 2.1 - Authenticated Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e82cdfab-8090-4979-81b6-5b860e9ae187?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hover-effects/" + google-query: inurl:"/wp-content/plugins/hover-effects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hover-effects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hover-effects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hover-effects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hover-image-4ebc9d9cf2e6c0b8863f7b05c2ec1bcd.yaml b/nuclei-templates/cve-less/plugins/hover-image-4ebc9d9cf2e6c0b8863f7b05c2ec1bcd.yaml new file mode 100644 index 0000000000..6e936ed2a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hover-image-4ebc9d9cf2e6c0b8863f7b05c2ec1bcd.yaml @@ -0,0 +1,58 @@ +id: hover-image-4ebc9d9cf2e6c0b8863f7b05c2ec1bcd + +info: + name: > + Hover Image <= 1.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/341cbd60-33b9-49f8-b8f3-3c44664ce463?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hover-image/" + google-query: inurl:"/wp-content/plugins/hover-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hover-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hover-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hover-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hpbtool-fd9a8180717056f9f1f968f01ca33f0b.yaml b/nuclei-templates/cve-less/plugins/hpbtool-fd9a8180717056f9f1f968f01ca33f0b.yaml new file mode 100644 index 0000000000..d726fa12a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hpbtool-fd9a8180717056f9f1f968f01ca33f0b.yaml @@ -0,0 +1,58 @@ +id: hpbtool-fd9a8180717056f9f1f968f01ca33f0b + +info: + name: > + hpb Dashboard <= 1.3.1 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee4a9dc6-fc0b-4bab-9511-fa0a713800ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hpbtool/" + google-query: inurl:"/wp-content/plugins/hpbtool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hpbtool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hpbtool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hpbtool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hqtheme-extra-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/hqtheme-extra-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a5ec969a18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hqtheme-extra-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: hqtheme-extra-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hqtheme-extra/" + google-query: inurl:"/wp-content/plugins/hqtheme-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hqtheme-extra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hqtheme-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hqtheme-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hreflang-manager-lite-4d7973cbf6013501ff12cd0e04512888.yaml b/nuclei-templates/cve-less/plugins/hreflang-manager-lite-4d7973cbf6013501ff12cd0e04512888.yaml new file mode 100644 index 0000000000..00709233c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hreflang-manager-lite-4d7973cbf6013501ff12cd0e04512888.yaml @@ -0,0 +1,58 @@ +id: hreflang-manager-lite-4d7973cbf6013501ff12cd0e04512888 + +info: + name: > + Hreflang Manager <= 1.06 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c357e34f-2d0f-4af4-bb67-cbbc6cd4e141?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hreflang-manager-lite/" + google-query: inurl:"/wp-content/plugins/hreflang-manager-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hreflang-manager-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hreflang-manager-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hreflang-manager-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hreflang-tags-by-dcgws-6293b091bc766206bb45c5e76ab63e4c.yaml b/nuclei-templates/cve-less/plugins/hreflang-tags-by-dcgws-6293b091bc766206bb45c5e76ab63e4c.yaml new file mode 100644 index 0000000000..df55d2ce6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hreflang-tags-by-dcgws-6293b091bc766206bb45c5e76ab63e4c.yaml @@ -0,0 +1,58 @@ +id: hreflang-tags-by-dcgws-6293b091bc766206bb45c5e76ab63e4c + +info: + name: > + HREFLANG Tags Lite <= 2.0.0 - Missing Authorization to Data Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/563f7d55-1df0-4bdc-b9be-5e564241bcf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hreflang-tags-by-dcgws/" + google-query: inurl:"/wp-content/plugins/hreflang-tags-by-dcgws/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hreflang-tags-by-dcgws,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hreflang-tags-by-dcgws/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hreflang-tags-by-dcgws" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hrm-8ce46300a9ee0c671870e83a220afb03.yaml b/nuclei-templates/cve-less/plugins/hrm-8ce46300a9ee0c671870e83a220afb03.yaml new file mode 100644 index 0000000000..17ac71a603 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hrm-8ce46300a9ee0c671870e83a220afb03.yaml @@ -0,0 +1,58 @@ +id: hrm-8ce46300a9ee0c671870e83a220afb03 + +info: + name: > + WP Human Resource Management < 2.2.6 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07cdc2db-e748-40c9-a2fe-31aef0725dad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hrm/" + google-query: inurl:"/wp-content/plugins/hrm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hrm,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hrm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hrm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hrm-a36379ec9941e1d3446832e6154938a3.yaml b/nuclei-templates/cve-less/plugins/hrm-a36379ec9941e1d3446832e6154938a3.yaml new file mode 100644 index 0000000000..81ce40448c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hrm-a36379ec9941e1d3446832e6154938a3.yaml @@ -0,0 +1,58 @@ +id: hrm-a36379ec9941e1d3446832e6154938a3 + +info: + name: > + WP Human Resource Management Plugin < 2.2.6 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9ffb0ac-84cf-4a82-b89b-05e43608db52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hrm/" + google-query: inurl:"/wp-content/plugins/hrm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hrm,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hrm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hrm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-builder-deac3fc8969cda605bbcdcb387cd2a13.yaml b/nuclei-templates/cve-less/plugins/ht-builder-deac3fc8969cda605bbcdcb387cd2a13.yaml new file mode 100644 index 0000000000..42b97a96f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-builder-deac3fc8969cda605bbcdcb387cd2a13.yaml @@ -0,0 +1,58 @@ +id: ht-builder-deac3fc8969cda605bbcdcb387cd2a13 + +info: + name: > + HT Builder <= 1.2.9 - Cross-Site Request Forgery via plugin_activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df413b9d-5c22-4276-a11b-4f193c48740d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-builder/" + google-query: inurl:"/wp-content/plugins/ht-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-contactform-3d1cc5475dc75a23246949ead1d96006.yaml b/nuclei-templates/cve-less/plugins/ht-contactform-3d1cc5475dc75a23246949ead1d96006.yaml new file mode 100644 index 0000000000..db9e157f43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-contactform-3d1cc5475dc75a23246949ead1d96006.yaml @@ -0,0 +1,58 @@ +id: ht-contactform-3d1cc5475dc75a23246949ead1d96006 + +info: + name: > + Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks <= 1.1.5 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfe6f49a-1dd1-46d9-8e15-a8a766917092?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-contactform/" + google-query: inurl:"/wp-content/plugins/ht-contactform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-contactform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-contactform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-contactform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-164d8e023bea2a9cf66601d6c8d87f66.yaml b/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-164d8e023bea2a9cf66601d6c8d87f66.yaml new file mode 100644 index 0000000000..4fbe7fb5b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-164d8e023bea2a9cf66601d6c8d87f66.yaml @@ -0,0 +1,58 @@ +id: ht-easy-google-analytics-164d8e023bea2a9cf66601d6c8d87f66 + +info: + name: > + HT Easy GA4 – Google Analytics WordPress Plugin <= 1.1.5 - Missing Authorization to Unauthenticated GA4 Email Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10e1b3ac-f002-4108-9682-5fe300f07adb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-easy-google-analytics/" + google-query: inurl:"/wp-content/plugins/ht-easy-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-easy-google-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-easy-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-easy-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-aeabe255a52538c85557d43415e4e073.yaml b/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-aeabe255a52538c85557d43415e4e073.yaml new file mode 100644 index 0000000000..ee67f250b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-aeabe255a52538c85557d43415e4e073.yaml @@ -0,0 +1,58 @@ +id: ht-easy-google-analytics-aeabe255a52538c85557d43415e4e073 + +info: + name: > + HT Easy GA4 ( Google Analytics 4 ) <= 1.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39d69a5e-4265-4898-9fd8-736dc2297b91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-easy-google-analytics/" + google-query: inurl:"/wp-content/plugins/ht-easy-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-easy-google-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-easy-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-easy-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-b50572ce7e2b149d1cbd18124538a979.yaml b/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-b50572ce7e2b149d1cbd18124538a979.yaml new file mode 100644 index 0000000000..f1a20c098c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-easy-google-analytics-b50572ce7e2b149d1cbd18124538a979.yaml @@ -0,0 +1,58 @@ +id: ht-easy-google-analytics-b50572ce7e2b149d1cbd18124538a979 + +info: + name: > + HT Easy GA4 ( Google Analytics 4 ) <= 1.0.6 - Cross-Site Request Forgery via plugin_activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fa2fcda-69f4-4095-b23c-6e6f1613adb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-easy-google-analytics/" + google-query: inurl:"/wp-content/plugins/ht-easy-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-easy-google-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-easy-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-easy-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-event-eea40bebf411a89783a41e1a9b7baa9a.yaml b/nuclei-templates/cve-less/plugins/ht-event-eea40bebf411a89783a41e1a9b7baa9a.yaml new file mode 100644 index 0000000000..26f66d1521 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-event-eea40bebf411a89783a41e1a9b7baa9a.yaml @@ -0,0 +1,58 @@ +id: ht-event-eea40bebf411a89783a41e1a9b7baa9a + +info: + name: > + HT Event <= 1.4.5 - Cross-Site Request Forgery leading to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b14c07b-23bb-4a14-8018-fa2462383b35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-event/" + google-query: inurl:"/wp-content/plugins/ht-event/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-event,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-event/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-event" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-instagram-874767d2bf3455f1a596a7c733629154.yaml b/nuclei-templates/cve-less/plugins/ht-instagram-874767d2bf3455f1a596a7c733629154.yaml new file mode 100644 index 0000000000..d0ed951342 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-instagram-874767d2bf3455f1a596a7c733629154.yaml @@ -0,0 +1,58 @@ +id: ht-instagram-874767d2bf3455f1a596a7c733629154 + +info: + name: > + HT Feed <= 1.2.7 - Cross-Site Request Forgery leading to Limited Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95723482-a6c5-4e95-a88d-c50a88108715?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-instagram/" + google-query: inurl:"/wp-content/plugins/ht-instagram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-instagram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-instagram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-instagram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-01300894d57947b3560cabf2dbbcd115.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-01300894d57947b3560cabf2dbbcd115.yaml new file mode 100644 index 0000000000..cf779cb385 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-01300894d57947b3560cabf2dbbcd115.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-01300894d57947b3560cabf2dbbcd115 + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Tooltip & Popover Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98e74a23-b586-4d6a-b1ab-78838b0eed61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-39662c17a130cae2e0ac4d8f08110d5e.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-39662c17a130cae2e0ac4d8f08110d5e.yaml new file mode 100644 index 0000000000..07b71a40c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-39662c17a130cae2e0ac4d8f08110d5e.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-39662c17a130cae2e0ac4d8f08110d5e + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6745be2e-d151-452a-8e65-0db2409dd54d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-4352573f5cddc391c5178beba8d7f9b0.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-4352573f5cddc391c5178beba8d7f9b0.yaml new file mode 100644 index 0000000000..14065fde80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-4352573f5cddc391c5178beba8d7f9b0.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-4352573f5cddc391c5178beba8d7f9b0 + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.6 - Sensitive Information Exposure via purchased_products + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54043c6a-48a1-48e8-ba61-a7e8a1773036?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-54345d40684c0a52baa3c3ff4f72b60d.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-54345d40684c0a52baa3c3ff4f72b60d.yaml new file mode 100644 index 0000000000..e00b4aa387 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-54345d40684c0a52baa3c3ff4f72b60d.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-54345d40684c0a52baa3c3ff4f72b60d + +info: + name: > + HT Mega <= 2.4.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/316a1ca9-e5fd-463f-ba1e-32589740270a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-70fc895faebcf1fe7c1137deedd632a4.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-70fc895faebcf1fe7c1137deedd632a4.yaml new file mode 100644 index 0000000000..3655691726 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-70fc895faebcf1fe7c1137deedd632a4.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-70fc895faebcf1fe7c1137deedd632a4 + +info: + name: > + HT Mega - Absolute Addons for Elementor Page Builder <= 1.5.5 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bead5edb-402a-44bc-9e2b-89201fa4603c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-719fa4e7b6c83ab485c9d95f46e8edb7.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-719fa4e7b6c83ab485c9d95f46e8edb7.yaml new file mode 100644 index 0000000000..802ccf22c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-719fa4e7b6c83ab485c9d95f46e8edb7.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-719fa4e7b6c83ab485c9d95f46e8edb7 + +info: + name: > + HT Mega – Absolute Addons for Elementor <= 2.2.0 - Missing Authorization to Privilege Escalation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46f3cc62-c2d8-45af-bb92-c2040789cbc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-7648aa79e50b7fbff0359c4b0f9eb60d.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-7648aa79e50b7fbff0359c4b0f9eb60d.yaml new file mode 100644 index 0000000000..6c1670b892 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-7648aa79e50b7fbff0359c4b0f9eb60d.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-7648aa79e50b7fbff0359c4b0f9eb60d + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Lightbox Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e5417d3-c466-4caf-9fb6-26d6e2c06fe1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-77f47958ca9f6f3aca917f2faa21c35a.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-77f47958ca9f6f3aca917f2faa21c35a.yaml new file mode 100644 index 0000000000..cdab6e9e52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-77f47958ca9f6f3aca917f2faa21c35a.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-77f47958ca9f6f3aca917f2faa21c35a + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.7 - Missing Authorization to Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/249ad768-3706-47c6-ad1d-f11900b87608?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-7bd8b052dc6ab5494250ef14b3571b9d.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-7bd8b052dc6ab5494250ef14b3571b9d.yaml new file mode 100644 index 0000000000..fcb3c295b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-7bd8b052dc6ab5494250ef14b3571b9d.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-7bd8b052dc6ab5494250ef14b3571b9d + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8452e54-7a81-4921-b531-8cb3b0953dab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-885b11bd05584acc3850df4149714f79.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-885b11bd05584acc3850df4149714f79.yaml new file mode 100644 index 0000000000..967fa95c63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-885b11bd05584acc3850df4149714f79.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-885b11bd05584acc3850df4149714f79 + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Gallery Justify + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03fba6bb-ff30-42bb-936b-93c009a7e3f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-8dd7019aa8a80d139d621978f8455f94.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-8dd7019aa8a80d139d621978f8455f94.yaml new file mode 100644 index 0000000000..85868d6d93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-8dd7019aa8a80d139d621978f8455f94.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-8dd7019aa8a80d139d621978f8455f94 + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Accordion/FAQ + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52ba91f1-21a2-4d7c-8801-b5e72a00c37d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-b8980aa84f8cc55308551be159a27546.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-b8980aa84f8cc55308551be159a27546.yaml new file mode 100644 index 0000000000..772ea1ed57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-b8980aa84f8cc55308551be159a27546.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-b8980aa84f8cc55308551be159a27546 + +info: + name: > + HT Mega <= 2.4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via titleTag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ac66027-14b8-4e0a-a483-c014905ef04e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-c8bc0703f7a40b6110052093d1b42354.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-c8bc0703f7a40b6110052093d1b42354.yaml new file mode 100644 index 0000000000..46d177de8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-c8bc0703f7a40b6110052093d1b42354.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-c8bc0703f7a40b6110052093d1b42354 + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.6 - Authenticated (Contributor+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11b5f0a1-bf22-46be-a165-c62f1077da0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-c9c8b6f666802b2f51aa7a2059e8cf31.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-c9c8b6f666802b2f51aa7a2059e8cf31.yaml new file mode 100644 index 0000000000..172669a148 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-c9c8b6f666802b2f51aa7a2059e8cf31.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-c9c8b6f666802b2f51aa7a2059e8cf31 + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Grid Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33b5e231-1b53-4646-ae9c-48babf1ebbd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-cbef84b88c0a2eb6e68bde27c710114f.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-cbef84b88c0a2eb6e68bde27c710114f.yaml new file mode 100644 index 0000000000..e0c2df1e51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-cbef84b88c0a2eb6e68bde27c710114f.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-cbef84b88c0a2eb6e68bde27c710114f + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Carousel Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a71cbe66-4187-4260-bb87-8579bc6e75f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-d1cffa60eaefa9d562794ce4c0d0f8a6.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-d1cffa60eaefa9d562794ce4c0d0f8a6.yaml new file mode 100644 index 0000000000..d32c8a1b07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-d1cffa60eaefa9d562794ce4c0d0f8a6.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-d1cffa60eaefa9d562794ce4c0d0f8a6 + +info: + name: > + HT Mega – Absolute Addons For Elementor <= 2.4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'size' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f9c5bed-a399-43e2-be40-d669e90d3736?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-e3441a86dca8e1266b44f1ac2828bc65.yaml b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-e3441a86dca8e1266b44f1ac2828bc65.yaml new file mode 100644 index 0000000000..f47fcb6f9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-mega-for-elementor-e3441a86dca8e1266b44f1ac2828bc65.yaml @@ -0,0 +1,58 @@ +id: ht-mega-for-elementor-e3441a86dca8e1266b44f1ac2828bc65 + +info: + name: > + HT Mega <= 2.3.3 - Cross-Site Request Forgery via Several Functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f26b04f-2a25-40a6-9b2c-27d9970acb8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-mega-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-mega-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-mega-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-menu-lite-c4c123ba803ff56ca56f62a58df9c1fd.yaml b/nuclei-templates/cve-less/plugins/ht-menu-lite-c4c123ba803ff56ca56f62a58df9c1fd.yaml new file mode 100644 index 0000000000..69f0215a6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-menu-lite-c4c123ba803ff56ca56f62a58df9c1fd.yaml @@ -0,0 +1,58 @@ +id: ht-menu-lite-c4c123ba803ff56ca56f62a58df9c1fd + +info: + name: > + HT Menu <= 1.2.1 - Cross-Site Request Forgery via plugin_activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/deb2544f-75ac-4d6c-bec7-9f35cfe0028d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-menu-lite/" + google-query: inurl:"/wp-content/plugins/ht-menu-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-menu-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-menu-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-menu-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-portfolio-209d06497ab8e08c218ee68cdbabb1d1.yaml b/nuclei-templates/cve-less/plugins/ht-portfolio-209d06497ab8e08c218ee68cdbabb1d1.yaml new file mode 100644 index 0000000000..c6aed580ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-portfolio-209d06497ab8e08c218ee68cdbabb1d1.yaml @@ -0,0 +1,58 @@ +id: ht-portfolio-209d06497ab8e08c218ee68cdbabb1d1 + +info: + name: > + HT Portfolio <= 1.1.5 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ed63724-c21f-4b0e-b595-e824d3519b21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-portfolio/" + google-query: inurl:"/wp-content/plugins/ht-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ht-slider-for-elementor-58c63b651eae675c8ca30a5097ca90d9.yaml b/nuclei-templates/cve-less/plugins/ht-slider-for-elementor-58c63b651eae675c8ca30a5097ca90d9.yaml new file mode 100644 index 0000000000..3d1496e3f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ht-slider-for-elementor-58c63b651eae675c8ca30a5097ca90d9.yaml @@ -0,0 +1,58 @@ +id: ht-slider-for-elementor-58c63b651eae675c8ca30a5097ca90d9 + +info: + name: > + HT Slider For Elementor <= 1.3.9 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81258fcc-18cc-4614-a644-5cfb004d019b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ht-slider-for-elementor/" + google-query: inurl:"/wp-content/plugins/ht-slider-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ht-slider-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ht-slider-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ht-slider-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/htaccess-9345a855b917e9d7c301701fd76aad46.yaml b/nuclei-templates/cve-less/plugins/htaccess-9345a855b917e9d7c301701fd76aad46.yaml new file mode 100644 index 0000000000..f25c58f461 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/htaccess-9345a855b917e9d7c301701fd76aad46.yaml @@ -0,0 +1,58 @@ +id: htaccess-9345a855b917e9d7c301701fd76aad46 + +info: + name: > + Htaccess by BestWebSoft – WordPress Website Access Control Plugin <= 1.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a6eac3b-823a-4a26-acb7-339357c10a07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/htaccess/" + google-query: inurl:"/wp-content/plugins/htaccess/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,htaccess,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/htaccess/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "htaccess" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/htaccess-edec211af3b7dbc24681331832d822e4.yaml b/nuclei-templates/cve-less/plugins/htaccess-edec211af3b7dbc24681331832d822e4.yaml new file mode 100644 index 0000000000..016c484067 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/htaccess-edec211af3b7dbc24681331832d822e4.yaml @@ -0,0 +1,58 @@ +id: htaccess-edec211af3b7dbc24681331832d822e4 + +info: + name: > + Htaccess <= 1.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a21df06c-4e56-4625-ae8b-89c9fc046939?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/htaccess/" + google-query: inurl:"/wp-content/plugins/htaccess/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,htaccess,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/htaccess/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "htaccess" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/htaccess-redirect-9d01cf11d54833d25428e1cf81d5a407.yaml b/nuclei-templates/cve-less/plugins/htaccess-redirect-9d01cf11d54833d25428e1cf81d5a407.yaml new file mode 100644 index 0000000000..87c90cc2c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/htaccess-redirect-9d01cf11d54833d25428e1cf81d5a407.yaml @@ -0,0 +1,58 @@ +id: htaccess-redirect-9d01cf11d54833d25428e1cf81d5a407 + +info: + name: > + .htaccess Redirect <= 0.3.1 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8c89641-805f-4f23-9eae-01e05fde19d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/htaccess-redirect/" + google-query: inurl:"/wp-content/plugins/htaccess-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,htaccess-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/htaccess-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "htaccess-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html-forms-418ebe6c7dbfef34adbdede493bce943.yaml b/nuclei-templates/cve-less/plugins/html-forms-418ebe6c7dbfef34adbdede493bce943.yaml new file mode 100644 index 0000000000..c17f4bb202 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html-forms-418ebe6c7dbfef34adbdede493bce943.yaml @@ -0,0 +1,58 @@ +id: html-forms-418ebe6c7dbfef34adbdede493bce943 + +info: + name: > + HTML Forms <= 1.3.28 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2921ea67-e88a-489a-8c45-cfe458f29d2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html-forms/" + google-query: inurl:"/wp-content/plugins/html-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html-forms-8afa46038c928522e1a939b693fa3626.yaml b/nuclei-templates/cve-less/plugins/html-forms-8afa46038c928522e1a939b693fa3626.yaml new file mode 100644 index 0000000000..d4cfa9d0a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html-forms-8afa46038c928522e1a939b693fa3626.yaml @@ -0,0 +1,58 @@ +id: html-forms-8afa46038c928522e1a939b693fa3626 + +info: + name: > + HTML Forms <= 1.3.24 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92e9af52-a9a8-4b68-8351-f1091855fedc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html-forms/" + google-query: inurl:"/wp-content/plugins/html-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html2wp-0df1e064add078cf57c6048e0292bd1f.yaml b/nuclei-templates/cve-less/plugins/html2wp-0df1e064add078cf57c6048e0292bd1f.yaml new file mode 100644 index 0000000000..dbf9485a10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html2wp-0df1e064add078cf57c6048e0292bd1f.yaml @@ -0,0 +1,58 @@ +id: html2wp-0df1e064add078cf57c6048e0292bd1f + +info: + name: > + HTML2WP <= 1.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a597d36c-72ce-44f0-af7b-2b9aad46957c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html2wp/" + google-query: inurl:"/wp-content/plugins/html2wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html2wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html2wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html2wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html2wp-d9d330e96ffdfe1887976502e50deb2f.yaml b/nuclei-templates/cve-less/plugins/html2wp-d9d330e96ffdfe1887976502e50deb2f.yaml new file mode 100644 index 0000000000..3a0bd4b8e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html2wp-d9d330e96ffdfe1887976502e50deb2f.yaml @@ -0,0 +1,58 @@ +id: html2wp-d9d330e96ffdfe1887976502e50deb2f + +info: + name: > + HTML2WP <= 1.0.0 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72b4fe0f-13cd-4580-9010-1a3e66000251?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html2wp/" + google-query: inurl:"/wp-content/plugins/html2wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html2wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html2wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html2wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html2wp-fcada36c51980400d6b77ffead4b0c1b.yaml b/nuclei-templates/cve-less/plugins/html2wp-fcada36c51980400d6b77ffead4b0c1b.yaml new file mode 100644 index 0000000000..0cdc602011 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html2wp-fcada36c51980400d6b77ffead4b0c1b.yaml @@ -0,0 +1,58 @@ +id: html2wp-fcada36c51980400d6b77ffead4b0c1b + +info: + name: > + HTML2WP <= 1.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fc67bb9-178e-466d-a6c2-adaa377924bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html2wp/" + google-query: inurl:"/wp-content/plugins/html2wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html2wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html2wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html2wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-audio-player-1ab07ec0caa3cd50e192c36d8dc28388.yaml b/nuclei-templates/cve-less/plugins/html5-audio-player-1ab07ec0caa3cd50e192c36d8dc28388.yaml new file mode 100644 index 0000000000..99270db606 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-audio-player-1ab07ec0caa3cd50e192c36d8dc28388.yaml @@ -0,0 +1,58 @@ +id: html5-audio-player-1ab07ec0caa3cd50e192c36d8dc28388 + +info: + name: > + Html5 Audio Player <= 2.1.11 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0059382-3e13-434a-a3d1-7892d14a371b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-audio-player/" + google-query: inurl:"/wp-content/plugins/html5-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-audio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-audio-player-8c8ea74da9222b97df27e5eb58a8262e.yaml b/nuclei-templates/cve-less/plugins/html5-audio-player-8c8ea74da9222b97df27e5eb58a8262e.yaml new file mode 100644 index 0000000000..13eb72e6c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-audio-player-8c8ea74da9222b97df27e5eb58a8262e.yaml @@ -0,0 +1,58 @@ +id: html5-audio-player-8c8ea74da9222b97df27e5eb58a8262e + +info: + name: > + Html5 Audio Player <= 2.1.2 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8b09933-9634-4a8a-a899-ba500979e5aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-audio-player/" + google-query: inurl:"/wp-content/plugins/html5-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-audio-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-audio-player-9cd02c8d638c4cb01b2d319013b9422d.yaml b/nuclei-templates/cve-less/plugins/html5-audio-player-9cd02c8d638c4cb01b2d319013b9422d.yaml new file mode 100644 index 0000000000..36314bdbd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-audio-player-9cd02c8d638c4cb01b2d319013b9422d.yaml @@ -0,0 +1,58 @@ +id: html5-audio-player-9cd02c8d638c4cb01b2d319013b9422d + +info: + name: > + HTML5 Audio Player- Best WordPress Audio Player Plugin <= 2.2.19 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multiple Widgets + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca646202-b9e2-4272-b0e2-d39cd748fb8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-audio-player/" + google-query: inurl:"/wp-content/plugins/html5-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-audio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-jquery-audio-player-2ea89aa92910e09e4a0699a93e6b8771.yaml b/nuclei-templates/cve-less/plugins/html5-jquery-audio-player-2ea89aa92910e09e4a0699a93e6b8771.yaml new file mode 100644 index 0000000000..9a3de10dbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-jquery-audio-player-2ea89aa92910e09e4a0699a93e6b8771.yaml @@ -0,0 +1,58 @@ +id: html5-jquery-audio-player-2ea89aa92910e09e4a0699a93e6b8771 + +info: + name: > + HTML5 jQuery Audio Player <= 2.6.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0365d52-8817-4b69-9df3-ac4c5bb6f4f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-jquery-audio-player/" + google-query: inurl:"/wp-content/plugins/html5-jquery-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-jquery-audio-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-jquery-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-jquery-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-lyrics-karaoke-player-c399c93eb04d9720bd4e74a57c352087.yaml b/nuclei-templates/cve-less/plugins/html5-lyrics-karaoke-player-c399c93eb04d9720bd4e74a57c352087.yaml new file mode 100644 index 0000000000..19b5c828a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-lyrics-karaoke-player-c399c93eb04d9720bd4e74a57c352087.yaml @@ -0,0 +1,58 @@ +id: html5-lyrics-karaoke-player-c399c93eb04d9720bd4e74a57c352087 + +info: + name: > + HTML5 Lyrics Karaoke Player <= 2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5102d03b-368f-410e-9c0f-a90caa7d28ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-lyrics-karaoke-player/" + google-query: inurl:"/wp-content/plugins/html5-lyrics-karaoke-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-lyrics-karaoke-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-lyrics-karaoke-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-lyrics-karaoke-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-maps-891ca23ffb08d94e6434e60528a16c74.yaml b/nuclei-templates/cve-less/plugins/html5-maps-891ca23ffb08d94e6434e60528a16c74.yaml new file mode 100644 index 0000000000..8a68eb4996 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-maps-891ca23ffb08d94e6434e60528a16c74.yaml @@ -0,0 +1,58 @@ +id: html5-maps-891ca23ffb08d94e6434e60528a16c74 + +info: + name: > + HTML5 Maps <= 1.6.5.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/decb80c9-8f04-4d39-8e77-220f7862995e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-maps/" + google-query: inurl:"/wp-content/plugins/html5-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-maps-bdf0d3aa1632ca3b2ca5352b8bea588e.yaml b/nuclei-templates/cve-less/plugins/html5-maps-bdf0d3aa1632ca3b2ca5352b8bea588e.yaml new file mode 100644 index 0000000000..32bb9d9151 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-maps-bdf0d3aa1632ca3b2ca5352b8bea588e.yaml @@ -0,0 +1,58 @@ +id: html5-maps-bdf0d3aa1632ca3b2ca5352b8bea588e + +info: + name: > + HTML5 Maps <= 1.7.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/502bc68d-778a-47df-a5c2-6bd0b4f130cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-maps/" + google-query: inurl:"/wp-content/plugins/html5-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-mp3-player-with-mp3-folder-feedburner-playlist-bd39f2dcd48837d67c4b40b69f78df98.yaml b/nuclei-templates/cve-less/plugins/html5-mp3-player-with-mp3-folder-feedburner-playlist-bd39f2dcd48837d67c4b40b69f78df98.yaml new file mode 100644 index 0000000000..bd4a62be4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-mp3-player-with-mp3-folder-feedburner-playlist-bd39f2dcd48837d67c4b40b69f78df98.yaml @@ -0,0 +1,58 @@ +id: html5-mp3-player-with-mp3-folder-feedburner-playlist-bd39f2dcd48837d67c4b40b69f78df98 + +info: + name: > + HTML5 MP3 Player with Folder Feedburner <= 2.8.0 - Authenticated (Author+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b7321e8-153c-4586-8114-65583e06573e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-mp3-player-with-mp3-folder-feedburner-playlist/" + google-query: inurl:"/wp-content/plugins/html5-mp3-player-with-mp3-folder-feedburner-playlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-mp3-player-with-mp3-folder-feedburner-playlist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-mp3-player-with-mp3-folder-feedburner-playlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-mp3-player-with-mp3-folder-feedburner-playlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-mp3-player-with-playlist-0df580dacb0df6a2ca5f274d2d7147c5.yaml b/nuclei-templates/cve-less/plugins/html5-mp3-player-with-playlist-0df580dacb0df6a2ca5f274d2d7147c5.yaml new file mode 100644 index 0000000000..3e52cf785e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-mp3-player-with-playlist-0df580dacb0df6a2ca5f274d2d7147c5.yaml @@ -0,0 +1,58 @@ +id: html5-mp3-player-with-playlist-0df580dacb0df6a2ca5f274d2d7147c5 + +info: + name: > + HTML5 MP3 Player with Playlist Free <= 3.0.0 - Authenticated (Author+) PHP Object Injecton + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2eac991e-fc34-456c-a9a6-d30fde39fd42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-mp3-player-with-playlist/" + google-query: inurl:"/wp-content/plugins/html5-mp3-player-with-playlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-mp3-player-with-playlist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-mp3-player-with-playlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-mp3-player-with-playlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-mp3-player-with-playlist-cfb5454ff2827b6f871f30ef976e36bf.yaml b/nuclei-templates/cve-less/plugins/html5-mp3-player-with-playlist-cfb5454ff2827b6f871f30ef976e36bf.yaml new file mode 100644 index 0000000000..6a84b70c0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-mp3-player-with-playlist-cfb5454ff2827b6f871f30ef976e36bf.yaml @@ -0,0 +1,58 @@ +id: html5-mp3-player-with-playlist-cfb5454ff2827b6f871f30ef976e36bf + +info: + name: > + HTML5 MP3 Player with Playlist <= 2.7.0 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d55e84-773d-4ec9-8dca-b93b8dac4f48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-mp3-player-with-playlist/" + google-query: inurl:"/wp-content/plugins/html5-mp3-player-with-playlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-mp3-player-with-playlist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-mp3-player-with-playlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-mp3-player-with-playlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-responsive-faq-fb9f6e5f6b739b217a3c9294b96be3ec.yaml b/nuclei-templates/cve-less/plugins/html5-responsive-faq-fb9f6e5f6b739b217a3c9294b96be3ec.yaml new file mode 100644 index 0000000000..f6a74980df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-responsive-faq-fb9f6e5f6b739b217a3c9294b96be3ec.yaml @@ -0,0 +1,58 @@ +id: html5-responsive-faq-fb9f6e5f6b739b217a3c9294b96be3ec + +info: + name: > + HTML5 Responsive FAQ <= 2.8.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/247a095b-0a92-4fee-85cf-c3041a061d62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-responsive-faq/" + google-query: inurl:"/wp-content/plugins/html5-responsive-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-responsive-faq,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-responsive-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-responsive-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-soundcloud-player-with-playlist-c00b8bf14565edfcbae67925492b03f1.yaml b/nuclei-templates/cve-less/plugins/html5-soundcloud-player-with-playlist-c00b8bf14565edfcbae67925492b03f1.yaml new file mode 100644 index 0000000000..a0da61f122 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-soundcloud-player-with-playlist-c00b8bf14565edfcbae67925492b03f1.yaml @@ -0,0 +1,58 @@ +id: html5-soundcloud-player-with-playlist-c00b8bf14565edfcbae67925492b03f1 + +info: + name: > + HTML5 SoundCloud Player <= 2.8.0 - Authenticated (Author+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/229235de-03c6-4560-b0ea-ab21fde256be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-soundcloud-player-with-playlist/" + google-query: inurl:"/wp-content/plugins/html5-soundcloud-player-with-playlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-soundcloud-player-with-playlist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-soundcloud-player-with-playlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-soundcloud-player-with-playlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-video-player-a517ff8b627b981a1fe850768f04bf42.yaml b/nuclei-templates/cve-less/plugins/html5-video-player-a517ff8b627b981a1fe850768f04bf42.yaml new file mode 100644 index 0000000000..80a29d1838 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-video-player-a517ff8b627b981a1fe850768f04bf42.yaml @@ -0,0 +1,58 @@ +id: html5-video-player-a517ff8b627b981a1fe850768f04bf42 + +info: + name: > + Html5 Video Player <= 2.5.18 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0eb50d3f-9e01-4e3d-a3ed-8c3fec006be6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-video-player/" + google-query: inurl:"/wp-content/plugins/html5-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-video-player-with-playlist-485789fe72c833fe22bf40305da52bb0.yaml b/nuclei-templates/cve-less/plugins/html5-video-player-with-playlist-485789fe72c833fe22bf40305da52bb0.yaml new file mode 100644 index 0000000000..fd6b3a6cfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-video-player-with-playlist-485789fe72c833fe22bf40305da52bb0.yaml @@ -0,0 +1,58 @@ +id: html5-video-player-with-playlist-485789fe72c833fe22bf40305da52bb0 + +info: + name: > + HTML5 Video Player with Playlist <= 2.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd42227-1cc2-42ab-b64b-3fe3fe1880c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-video-player-with-playlist/" + google-query: inurl:"/wp-content/plugins/html5-video-player-with-playlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-video-player-with-playlist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-video-player-with-playlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-video-player-with-playlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-videogallery-plus-player-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/html5-videogallery-plus-player-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..114a23ae31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-videogallery-plus-player-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: html5-videogallery-plus-player-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-videogallery-plus-player/" + google-query: inurl:"/wp-content/plugins/html5-videogallery-plus-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-videogallery-plus-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-videogallery-plus-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-videogallery-plus-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5-virtual-classroom-b0382531907f0ce8fd4932cc7bcd495c.yaml b/nuclei-templates/cve-less/plugins/html5-virtual-classroom-b0382531907f0ce8fd4932cc7bcd495c.yaml new file mode 100644 index 0000000000..cb7eebdc78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5-virtual-classroom-b0382531907f0ce8fd4932cc7bcd495c.yaml @@ -0,0 +1,58 @@ +id: html5-virtual-classroom-b0382531907f0ce8fd4932cc7bcd495c + +info: + name: > + BrainCert – HTML5 Virtual Classroom <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76b3b5b7-fefe-44fb-a30e-c55226d4aaea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5-virtual-classroom/" + google-query: inurl:"/wp-content/plugins/html5-virtual-classroom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5-virtual-classroom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5-virtual-classroom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5-virtual-classroom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/html5avmanager-39aa42ce6a12361e040ad2f2d3e0128f.yaml b/nuclei-templates/cve-less/plugins/html5avmanager-39aa42ce6a12361e040ad2f2d3e0128f.yaml new file mode 100644 index 0000000000..72468e8d54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/html5avmanager-39aa42ce6a12361e040ad2f2d3e0128f.yaml @@ -0,0 +1,58 @@ +id: html5avmanager-39aa42ce6a12361e040ad2f2d3e0128f + +info: + name: > + HTML5 AV Manager <= 0.2.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41a61c0f-fffb-4810-b44a-74cbc1192ecd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/html5avmanager/" + google-query: inurl:"/wp-content/plugins/html5avmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,html5avmanager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/html5avmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "html5avmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/http-auth-e90b537c5f5b2550abd571e86aaca30a.yaml b/nuclei-templates/cve-less/plugins/http-auth-e90b537c5f5b2550abd571e86aaca30a.yaml new file mode 100644 index 0000000000..64b0044a11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/http-auth-e90b537c5f5b2550abd571e86aaca30a.yaml @@ -0,0 +1,58 @@ +id: http-auth-e90b537c5f5b2550abd571e86aaca30a + +info: + name: > + HTTP Auth <= 0.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43357daa-4dce-4851-b41b-48d3ffb8a387?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/http-auth/" + google-query: inurl:"/wp-content/plugins/http-auth/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,http-auth,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/http-auth/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "http-auth" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/http-headers-15a164b8d7acefaa3a7ae7d37647554e.yaml b/nuclei-templates/cve-less/plugins/http-headers-15a164b8d7acefaa3a7ae7d37647554e.yaml new file mode 100644 index 0000000000..ab1ff5d90a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/http-headers-15a164b8d7acefaa3a7ae7d37647554e.yaml @@ -0,0 +1,58 @@ +id: http-headers-15a164b8d7acefaa3a7ae7d37647554e + +info: + name: > + HTTP Headers <= 1.18.10 - Authenticated(Administrator+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75b84eae-6ff2-49af-a420-2aeef50224e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/http-headers/" + google-query: inurl:"/wp-content/plugins/http-headers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,http-headers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/http-headers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "http-headers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/http-headers-3400f4eb6ff8887592360d9448530f42.yaml b/nuclei-templates/cve-less/plugins/http-headers-3400f4eb6ff8887592360d9448530f42.yaml new file mode 100644 index 0000000000..cb43bcaf69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/http-headers-3400f4eb6ff8887592360d9448530f42.yaml @@ -0,0 +1,58 @@ +id: http-headers-3400f4eb6ff8887592360d9448530f42 + +info: + name: > + HTTP Headers <= 1.18.11 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fed4dd54-7a7e-483b-a623-3cf3392572b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/http-headers/" + google-query: inurl:"/wp-content/plugins/http-headers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,http-headers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/http-headers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "http-headers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/http-headers-51f2517f9bbfce600c2f0bf80668bc91.yaml b/nuclei-templates/cve-less/plugins/http-headers-51f2517f9bbfce600c2f0bf80668bc91.yaml new file mode 100644 index 0000000000..3f14dcdd50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/http-headers-51f2517f9bbfce600c2f0bf80668bc91.yaml @@ -0,0 +1,58 @@ +id: http-headers-51f2517f9bbfce600c2f0bf80668bc91 + +info: + name: > + HTTP Headers <= 1.18.11 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69971673-e317-452c-8c54-97de006a214f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/http-headers/" + google-query: inurl:"/wp-content/plugins/http-headers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,http-headers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/http-headers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "http-headers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/http-headers-5f2adc5ca6dedc40903aa1f1e563d920.yaml b/nuclei-templates/cve-less/plugins/http-headers-5f2adc5ca6dedc40903aa1f1e563d920.yaml new file mode 100644 index 0000000000..b120720554 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/http-headers-5f2adc5ca6dedc40903aa1f1e563d920.yaml @@ -0,0 +1,58 @@ +id: http-headers-5f2adc5ca6dedc40903aa1f1e563d920 + +info: + name: > + HTTP Headers <= 1.18.8 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea6b79c-2a09-4a6e-9b4b-a81f96e3bc12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/http-headers/" + google-query: inurl:"/wp-content/plugins/http-headers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,http-headers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/http-headers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "http-headers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/http-https-remover-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/http-https-remover-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..dfdb7ac2aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/http-https-remover-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: http-https-remover-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/http-https-remover/" + google-query: inurl:"/wp-content/plugins/http-https-remover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,http-https-remover,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/http-https-remover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "http-https-remover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/http-https-remover-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/http-https-remover-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..db4a6c9695 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/http-https-remover-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: http-https-remover-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/http-https-remover/" + google-query: inurl:"/wp-content/plugins/http-https-remover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,http-https-remover,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/http-https-remover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "http-https-remover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/http-https-remover-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/http-https-remover-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..ba50350cc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/http-https-remover-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: http-https-remover-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/http-https-remover/" + google-query: inurl:"/wp-content/plugins/http-https-remover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,http-https-remover,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/http-https-remover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "http-https-remover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hub2word-2dea767209c9552dbe15347492d80abf.yaml b/nuclei-templates/cve-less/plugins/hub2word-2dea767209c9552dbe15347492d80abf.yaml new file mode 100644 index 0000000000..533168cd14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hub2word-2dea767209c9552dbe15347492d80abf.yaml @@ -0,0 +1,58 @@ +id: hub2word-2dea767209c9552dbe15347492d80abf + +info: + name: > + Easy Embed for HubSpot Forms, CTAs, Links, Files & add HubSpot to WP Search Results <= 1.1.0 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2401dd1-d132-4899-80fc-9281280806a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hub2word/" + google-query: inurl:"/wp-content/plugins/hub2word/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hub2word,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hub2word/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hub2word" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hueman-addons-9b8d61323342cf7cc549ce8c8f2716e5.yaml b/nuclei-templates/cve-less/plugins/hueman-addons-9b8d61323342cf7cc549ce8c8f2716e5.yaml new file mode 100644 index 0000000000..1de4525dfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hueman-addons-9b8d61323342cf7cc549ce8c8f2716e5.yaml @@ -0,0 +1,58 @@ +id: hueman-addons-9b8d61323342cf7cc549ce8c8f2716e5 + +info: + name: > + Hueman Addons <= 2.3.3 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd782479-8eab-439d-9a8e-b4105e49964c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hueman-addons/" + google-query: inurl:"/wp-content/plugins/hueman-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hueman-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hueman-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hueman-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hummingbird-performance-198731eb0d140b29cd1b351f123496f9.yaml b/nuclei-templates/cve-less/plugins/hummingbird-performance-198731eb0d140b29cd1b351f123496f9.yaml new file mode 100644 index 0000000000..3ff3234931 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hummingbird-performance-198731eb0d140b29cd1b351f123496f9.yaml @@ -0,0 +1,58 @@ +id: hummingbird-performance-198731eb0d140b29cd1b351f123496f9 + +info: + name: > + Hummingbird <= 3.3.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6119481-f399-4bba-a824-1d7346e7e155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hummingbird-performance/" + google-query: inurl:"/wp-content/plugins/hummingbird-performance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hummingbird-performance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hummingbird-performance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hummingbird-performance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hummingbird-performance-7c3ea2239a49993a972e3badf432bcfc.yaml b/nuclei-templates/cve-less/plugins/hummingbird-performance-7c3ea2239a49993a972e3badf432bcfc.yaml new file mode 100644 index 0000000000..3a0bc23591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hummingbird-performance-7c3ea2239a49993a972e3badf432bcfc.yaml @@ -0,0 +1,58 @@ +id: hummingbird-performance-7c3ea2239a49993a972e3badf432bcfc + +info: + name: > + Hummingbird <= 3.4.1 - Unauthenticated Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9b8e6dc-a9ac-4afb-ad47-4f51032bb1f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hummingbird-performance/" + google-query: inurl:"/wp-content/plugins/hummingbird-performance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hummingbird-performance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hummingbird-performance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hummingbird-performance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hummingbird-performance-ec5f1fa417ea6d6d86b4d82ac0f5e65d.yaml b/nuclei-templates/cve-less/plugins/hummingbird-performance-ec5f1fa417ea6d6d86b4d82ac0f5e65d.yaml new file mode 100644 index 0000000000..82a61c6245 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hummingbird-performance-ec5f1fa417ea6d6d86b4d82ac0f5e65d.yaml @@ -0,0 +1,58 @@ +id: hummingbird-performance-ec5f1fa417ea6d6d86b4d82ac0f5e65d + +info: + name: > + Hummingbird <= 3.7.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bd35ef1-ed28-44db-a1f6-74bc83974c71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hummingbird-performance/" + google-query: inurl:"/wp-content/plugins/hummingbird-performance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hummingbird-performance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hummingbird-performance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hummingbird-performance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hungarian-pickup-points-for-woocommerce-4954ab56551b4ce703a0899a0107deda.yaml b/nuclei-templates/cve-less/plugins/hungarian-pickup-points-for-woocommerce-4954ab56551b4ce703a0899a0107deda.yaml new file mode 100644 index 0000000000..5753220897 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hungarian-pickup-points-for-woocommerce-4954ab56551b4ce703a0899a0107deda.yaml @@ -0,0 +1,58 @@ +id: hungarian-pickup-points-for-woocommerce-4954ab56551b4ce703a0899a0107deda + +info: + name: > + Csomagpontok és szállítási címkék WooCommerce hez <= 1.9.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/642a8e71-c267-41f5-bcf5-f5627be9038e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hungarian-pickup-points-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/hungarian-pickup-points-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hungarian-pickup-points-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hungarian-pickup-points-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hungarian-pickup-points-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hungred-post-thumbnail-ac71e6911e612c743a4ffc18cd41b753.yaml b/nuclei-templates/cve-less/plugins/hungred-post-thumbnail-ac71e6911e612c743a4ffc18cd41b753.yaml new file mode 100644 index 0000000000..a5f27dbdd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hungred-post-thumbnail-ac71e6911e612c743a4ffc18cd41b753.yaml @@ -0,0 +1,58 @@ +id: hungred-post-thumbnail-ac71e6911e612c743a4ffc18cd41b753 + +info: + name: > + Hungred Post Thumbnail <= 2.1.9 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd7ee2d7-4588-4cb9-86ca-0daef421dd86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hungred-post-thumbnail/" + google-query: inurl:"/wp-content/plugins/hungred-post-thumbnail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hungred-post-thumbnail,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hungred-post-thumbnail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hungred-post-thumbnail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hunk-external-links-e4943a062e718f1da762551fe8208620.yaml b/nuclei-templates/cve-less/plugins/hunk-external-links-e4943a062e718f1da762551fe8208620.yaml new file mode 100644 index 0000000000..d8a1d32051 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hunk-external-links-e4943a062e718f1da762551fe8208620.yaml @@ -0,0 +1,58 @@ +id: hunk-external-links-e4943a062e718f1da762551fe8208620 + +info: + name: > + Hunk External Links <= 3.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8303c84f-8065-4394-a692-29cb72bada0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hunk-external-links/" + google-query: inurl:"/wp-content/plugins/hunk-external-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hunk-external-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hunk-external-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hunk-external-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hurrytimer-268b053a1bfe487ee9a98a976d059155.yaml b/nuclei-templates/cve-less/plugins/hurrytimer-268b053a1bfe487ee9a98a976d059155.yaml new file mode 100644 index 0000000000..50b8a21b03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hurrytimer-268b053a1bfe487ee9a98a976d059155.yaml @@ -0,0 +1,58 @@ +id: hurrytimer-268b053a1bfe487ee9a98a976d059155 + +info: + name: > + HurryTimer – An Scarcity and Urgency Countdown Timer for WordPress & WooCommerce <= 2.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a8f4ec8-d66e-4892-9770-67450aaa83d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hurrytimer/" + google-query: inurl:"/wp-content/plugins/hurrytimer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hurrytimer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hurrytimer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hurrytimer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/huskerportfolio-e91e3f50be0e7f98b6ee2b7340fe8b63.yaml b/nuclei-templates/cve-less/plugins/huskerportfolio-e91e3f50be0e7f98b6ee2b7340fe8b63.yaml new file mode 100644 index 0000000000..1a8c3d9b54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/huskerportfolio-e91e3f50be0e7f98b6ee2b7340fe8b63.yaml @@ -0,0 +1,58 @@ +id: huskerportfolio-e91e3f50be0e7f98b6ee2b7340fe8b63 + +info: + name: > + Husker Portfolio <= 0.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/436fc1c8-3141-445d-902e-f759feefe1cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/huskerportfolio/" + google-query: inurl:"/wp-content/plugins/huskerportfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,huskerportfolio,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/huskerportfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "huskerportfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hybrid-composer-b0e3fd5d9174b5eba29a79c0cda84c9b.yaml b/nuclei-templates/cve-less/plugins/hybrid-composer-b0e3fd5d9174b5eba29a79c0cda84c9b.yaml new file mode 100644 index 0000000000..78b5e3f42f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hybrid-composer-b0e3fd5d9174b5eba29a79c0cda84c9b.yaml @@ -0,0 +1,58 @@ +id: hybrid-composer-b0e3fd5d9174b5eba29a79c0cda84c9b + +info: + name: > + Hybrid Composer <= 1.4.6 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bc19bfa-ce44-4654-b074-c8126b60a155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hybrid-composer/" + google-query: inurl:"/wp-content/plugins/hybrid-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hybrid-composer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hybrid-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hybrid-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hypercomments-f48003feae4cf574ad5a0e007703e663.yaml b/nuclei-templates/cve-less/plugins/hypercomments-f48003feae4cf574ad5a0e007703e663.yaml new file mode 100644 index 0000000000..f6ef0dcb97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hypercomments-f48003feae4cf574ad5a0e007703e663.yaml @@ -0,0 +1,58 @@ +id: hypercomments-f48003feae4cf574ad5a0e007703e663 + +info: + name: > + HyperComments <= 1.2.2 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3a8f554-7cb6-40b7-b83c-819e7785058a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hypercomments/" + google-query: inurl:"/wp-content/plugins/hypercomments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hypercomments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hypercomments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hypercomments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/hyphenator-ab777568922b3dcb0b2e73d6e3091f21.yaml b/nuclei-templates/cve-less/plugins/hyphenator-ab777568922b3dcb0b2e73d6e3091f21.yaml new file mode 100644 index 0000000000..538ab80124 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/hyphenator-ab777568922b3dcb0b2e73d6e3091f21.yaml @@ -0,0 +1,58 @@ +id: hyphenator-ab777568922b3dcb0b2e73d6e3091f21 + +info: + name: > + Hyphenator <= 5.1.5 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b87f741-4115-4ded-8dff-dc36cfdf1df1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/hyphenator/" + google-query: inurl:"/wp-content/plugins/hyphenator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,hyphenator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/hyphenator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hyphenator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/i-dump-iphone-to-wordpress-photo-uploader-0d249401678b4100fbfb0e12a940b6ff.yaml b/nuclei-templates/cve-less/plugins/i-dump-iphone-to-wordpress-photo-uploader-0d249401678b4100fbfb0e12a940b6ff.yaml new file mode 100644 index 0000000000..0bd4588b57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/i-dump-iphone-to-wordpress-photo-uploader-0d249401678b4100fbfb0e12a940b6ff.yaml @@ -0,0 +1,58 @@ +id: i-dump-iphone-to-wordpress-photo-uploader-0d249401678b4100fbfb0e12a940b6ff + +info: + name: > + iDump iPhone to WordPress Photo Uploader <= 1.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e37e54b-9c00-4d04-9c81-791242d45d6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/i-dump-iphone-to-wordpress-photo-uploader/" + google-query: inurl:"/wp-content/plugins/i-dump-iphone-to-wordpress-photo-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,i-dump-iphone-to-wordpress-photo-uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/i-dump-iphone-to-wordpress-photo-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i-dump-iphone-to-wordpress-photo-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/i-recommend-this-4b04846741419fafa968ec2cd45a21dd.yaml b/nuclei-templates/cve-less/plugins/i-recommend-this-4b04846741419fafa968ec2cd45a21dd.yaml new file mode 100644 index 0000000000..aee3b63007 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/i-recommend-this-4b04846741419fafa968ec2cd45a21dd.yaml @@ -0,0 +1,58 @@ +id: i-recommend-this-4b04846741419fafa968ec2cd45a21dd + +info: + name: > + I Recommend This <= 3.9.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0ee9b26-4e7f-475f-b42b-5af40b78cbca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/i-recommend-this/" + google-query: inurl:"/wp-content/plugins/i-recommend-this/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,i-recommend-this,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/i-recommend-this/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i-recommend-this" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/i-recommend-this-91fc45f92059ad3dccdaddc100f38fa5.yaml b/nuclei-templates/cve-less/plugins/i-recommend-this-91fc45f92059ad3dccdaddc100f38fa5.yaml new file mode 100644 index 0000000000..63ca3abc93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/i-recommend-this-91fc45f92059ad3dccdaddc100f38fa5.yaml @@ -0,0 +1,58 @@ +id: i-recommend-this-91fc45f92059ad3dccdaddc100f38fa5 + +info: + name: > + I Recommend This <= 3.7.2 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca9c10b6-6d32-45c9-beb1-7a5c84d0863d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/i-recommend-this/" + google-query: inurl:"/wp-content/plugins/i-recommend-this/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,i-recommend-this,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/i-recommend-this/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i-recommend-this" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/i-recommend-this-c8c3c4e396d486583b9e49a37e519b53.yaml b/nuclei-templates/cve-less/plugins/i-recommend-this-c8c3c4e396d486583b9e49a37e519b53.yaml new file mode 100644 index 0000000000..263a10c9a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/i-recommend-this-c8c3c4e396d486583b9e49a37e519b53.yaml @@ -0,0 +1,58 @@ +id: i-recommend-this-c8c3c4e396d486583b9e49a37e519b53 + +info: + name: > + I Recommend This <= 3.8.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc74e973-90ab-4678-a035-82b4b2b85604?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/i-recommend-this/" + google-query: inurl:"/wp-content/plugins/i-recommend-this/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,i-recommend-this,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/i-recommend-this/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i-recommend-this" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/i-recommend-this-d7eef9375bde202187f7666f53aba99e.yaml b/nuclei-templates/cve-less/plugins/i-recommend-this-d7eef9375bde202187f7666f53aba99e.yaml new file mode 100644 index 0000000000..f90444cc5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/i-recommend-this-d7eef9375bde202187f7666f53aba99e.yaml @@ -0,0 +1,58 @@ +id: i-recommend-this-d7eef9375bde202187f7666f53aba99e + +info: + name: > + I Recommend This < 3.8.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef888b2e-1fc7-442b-8b67-ebfdcbc76696?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/i-recommend-this/" + google-query: inurl:"/wp-content/plugins/i-recommend-this/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,i-recommend-this,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/i-recommend-this/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i-recommend-this" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/i-recommend-this-f577d412a90189953cb8af4c09d74c9d.yaml b/nuclei-templates/cve-less/plugins/i-recommend-this-f577d412a90189953cb8af4c09d74c9d.yaml new file mode 100644 index 0000000000..dcd826ead5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/i-recommend-this-f577d412a90189953cb8af4c09d74c9d.yaml @@ -0,0 +1,58 @@ +id: i-recommend-this-f577d412a90189953cb8af4c09d74c9d + +info: + name: > + I Recommend This < 3.7.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20df30e2-7e59-479c-946d-e0128b7d8401?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/i-recommend-this/" + google-query: inurl:"/wp-content/plugins/i-recommend-this/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,i-recommend-this,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/i-recommend-this/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i-recommend-this" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/i2-pro-cons-5c4c3c093dd69f631ab63d22386e6148.yaml b/nuclei-templates/cve-less/plugins/i2-pro-cons-5c4c3c093dd69f631ab63d22386e6148.yaml new file mode 100644 index 0000000000..fa49d4f24c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/i2-pro-cons-5c4c3c093dd69f631ab63d22386e6148.yaml @@ -0,0 +1,58 @@ +id: i2-pro-cons-5c4c3c093dd69f631ab63d22386e6148 + +info: + name: > + i2 Pros & Cons <= 1.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3dae870-9b5f-47ef-b8b2-23fac613ec00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/i2-pro-cons/" + google-query: inurl:"/wp-content/plugins/i2-pro-cons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,i2-pro-cons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/i2-pro-cons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i2-pro-cons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ibs-mappro-2f8ca7fb94c2fd4e610b875c561d523b.yaml b/nuclei-templates/cve-less/plugins/ibs-mappro-2f8ca7fb94c2fd4e610b875c561d523b.yaml new file mode 100644 index 0000000000..656545cdde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ibs-mappro-2f8ca7fb94c2fd4e610b875c561d523b.yaml @@ -0,0 +1,58 @@ +id: ibs-mappro-2f8ca7fb94c2fd4e610b875c561d523b + +info: + name: > + IBS Mappro < 1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77cea6a1-d5e8-459c-97cc-9dc8f7c0f48f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ibs-mappro/" + google-query: inurl:"/wp-content/plugins/ibs-mappro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ibs-mappro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ibs-mappro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ibs-mappro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ibtana-ecommerce-product-addons-a99a6931f92bd0d642c13328925d2e73.yaml b/nuclei-templates/cve-less/plugins/ibtana-ecommerce-product-addons-a99a6931f92bd0d642c13328925d2e73.yaml new file mode 100644 index 0000000000..2a77419db7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ibtana-ecommerce-product-addons-a99a6931f92bd0d642c13328925d2e73.yaml @@ -0,0 +1,58 @@ +id: ibtana-ecommerce-product-addons-a99a6931f92bd0d642c13328925d2e73 + +info: + name: > + Ibtana - Ecommerce Product Addons <= 0.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a906f90-fac2-43cf-8f67-99f8862dc636?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ibtana-ecommerce-product-addons/" + google-query: inurl:"/wp-content/plugins/ibtana-ecommerce-product-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ibtana-ecommerce-product-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ibtana-ecommerce-product-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ibtana-ecommerce-product-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ibtana-visual-editor-747cb2b72097d91ef1564458b7d2e373.yaml b/nuclei-templates/cve-less/plugins/ibtana-visual-editor-747cb2b72097d91ef1564458b7d2e373.yaml new file mode 100644 index 0000000000..86500da432 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ibtana-visual-editor-747cb2b72097d91ef1564458b7d2e373.yaml @@ -0,0 +1,58 @@ +id: ibtana-visual-editor-747cb2b72097d91ef1564458b7d2e373 + +info: + name: > + Ibtana – WordPress Website Builder <= 1.1.8.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79d96a6c-6191-44d8-aab8-f01bb2692767?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ibtana-visual-editor/" + google-query: inurl:"/wp-content/plugins/ibtana-visual-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ibtana-visual-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ibtana-visual-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ibtana-visual-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ibtana-visual-editor-912a26e9536c81b126d2560cabd51139.yaml b/nuclei-templates/cve-less/plugins/ibtana-visual-editor-912a26e9536c81b126d2560cabd51139.yaml new file mode 100644 index 0000000000..2285524df5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ibtana-visual-editor-912a26e9536c81b126d2560cabd51139.yaml @@ -0,0 +1,58 @@ +id: ibtana-visual-editor-912a26e9536c81b126d2560cabd51139 + +info: + name: > + Ibtana – WordPress Website Builder <= 1.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b09d496-0e03-48a4-acf7-57febe18ed0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ibtana-visual-editor/" + google-query: inurl:"/wp-content/plugins/ibtana-visual-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ibtana-visual-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ibtana-visual-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ibtana-visual-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ibtana-visual-editor-fdc54b4c35b7d9b62d80ce198388bdcb.yaml b/nuclei-templates/cve-less/plugins/ibtana-visual-editor-fdc54b4c35b7d9b62d80ce198388bdcb.yaml new file mode 100644 index 0000000000..6f515bd37e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ibtana-visual-editor-fdc54b4c35b7d9b62d80ce198388bdcb.yaml @@ -0,0 +1,58 @@ +id: ibtana-visual-editor-fdc54b4c35b7d9b62d80ce198388bdcb + +info: + name: > + Ibtana – WordPress Website Builder <= 1.1.4.7 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/196cbc3f-b794-49e2-8769-b5277c2b8f76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ibtana-visual-editor/" + google-query: inurl:"/wp-content/plugins/ibtana-visual-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ibtana-visual-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ibtana-visual-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ibtana-visual-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icalendrier-9fca0dd0c7f34e6a746c8a219eb28b95.yaml b/nuclei-templates/cve-less/plugins/icalendrier-9fca0dd0c7f34e6a746c8a219eb28b95.yaml new file mode 100644 index 0000000000..a61d1d8f93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icalendrier-9fca0dd0c7f34e6a746c8a219eb28b95.yaml @@ -0,0 +1,58 @@ +id: icalendrier-9fca0dd0c7f34e6a746c8a219eb28b95 + +info: + name: > + iCalendrier <= 1.80 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96fb8398-d566-439c-8ed0-78e71276b577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icalendrier/" + google-query: inurl:"/wp-content/plugins/icalendrier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icalendrier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icalendrier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icalendrier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.80') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-1189677e87fccd5ba86b3b7c8e3828fd.yaml b/nuclei-templates/cve-less/plugins/icegram-1189677e87fccd5ba86b3b7c8e3828fd.yaml new file mode 100644 index 0000000000..deef51b405 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-1189677e87fccd5ba86b3b7c8e3828fd.yaml @@ -0,0 +1,58 @@ +id: icegram-1189677e87fccd5ba86b3b7c8e3828fd + +info: + name: > + Icegram <= 1.10.28.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e1bb306-c1a4-4b59-ad57-a9ca4500b049?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.28.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-173c2f3da25ffb641f6c881b0ecd192a.yaml b/nuclei-templates/cve-less/plugins/icegram-173c2f3da25ffb641f6c881b0ecd192a.yaml new file mode 100644 index 0000000000..08db17b578 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-173c2f3da25ffb641f6c881b0ecd192a.yaml @@ -0,0 +1,58 @@ +id: icegram-173c2f3da25ffb641f6c881b0ecd192a + +info: + name: > + Icegram Engage <= 3.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d391629-b0a0-4b85-86d3-e1c7603adc95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-1b90a29b0e05edb9e0100d5bac6dd543.yaml b/nuclei-templates/cve-less/plugins/icegram-1b90a29b0e05edb9e0100d5bac6dd543.yaml new file mode 100644 index 0000000000..8dcb8ef39c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-1b90a29b0e05edb9e0100d5bac6dd543.yaml @@ -0,0 +1,58 @@ +id: icegram-1b90a29b0e05edb9e0100d5bac6dd543 + +info: + name: > + Icegram <= 1.9.18 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbc5edda-c503-4a0c-be9e-6ce17eee2c51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-5c5cac9fef446ce5aab816bcf883d040.yaml b/nuclei-templates/cve-less/plugins/icegram-5c5cac9fef446ce5aab816bcf883d040.yaml new file mode 100644 index 0000000000..6aa51de33a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-5c5cac9fef446ce5aab816bcf883d040.yaml @@ -0,0 +1,58 @@ +id: icegram-5c5cac9fef446ce5aab816bcf883d040 + +info: + name: > + Icegram <= 2.0.4 - Reflected Cross-Site Scripting via message_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07aeed92-f3e9-4a25-a7e0-b364cb98f5dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-889f2c95b741c5e0897bda79fd4658fe.yaml b/nuclei-templates/cve-less/plugins/icegram-889f2c95b741c5e0897bda79fd4658fe.yaml new file mode 100644 index 0000000000..b0f2854051 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-889f2c95b741c5e0897bda79fd4658fe.yaml @@ -0,0 +1,58 @@ +id: icegram-889f2c95b741c5e0897bda79fd4658fe + +info: + name: > + Icegram Engage <= 2.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e75b3cc3-5bd6-4af9-94bf-2c3b6270e1c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-88a06d86ce607df4ff6b1b9039ea93cb.yaml b/nuclei-templates/cve-less/plugins/icegram-88a06d86ce607df4ff6b1b9039ea93cb.yaml new file mode 100644 index 0000000000..f50f648927 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-88a06d86ce607df4ff6b1b9039ea93cb.yaml @@ -0,0 +1,58 @@ +id: icegram-88a06d86ce607df4ff6b1b9039ea93cb + +info: + name: > + Icegram <= 3.1.19 - Authenticated (Contributor+) Stored Cross-Site Scripting via Campaign Message + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0feeca6b-b611-44d3-90a6-569e4d2ccf5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-952c35deeae371ba14bf32adbe040582.yaml b/nuclei-templates/cve-less/plugins/icegram-952c35deeae371ba14bf32adbe040582.yaml new file mode 100644 index 0000000000..efe4e92f59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-952c35deeae371ba14bf32adbe040582.yaml @@ -0,0 +1,58 @@ +id: icegram-952c35deeae371ba14bf32adbe040582 + +info: + name: > + Icegram <= 3.1.18 - Cross-Site Request Forgery via save_campaign_preview + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3000b140-2e38-463d-9128-b486293e3cf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-c7d2eaa1bef247cc946f12a77351dbbb.yaml b/nuclei-templates/cve-less/plugins/icegram-c7d2eaa1bef247cc946f12a77351dbbb.yaml new file mode 100644 index 0000000000..ce71e4c010 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-c7d2eaa1bef247cc946f12a77351dbbb.yaml @@ -0,0 +1,58 @@ +id: icegram-c7d2eaa1bef247cc946f12a77351dbbb + +info: + name: > + Icegram <= 1.9.18 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b55128e9-f79f-4872-931f-c6f4d1d12032?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-de418588fa621f09a7aaad7d1520c591.yaml b/nuclei-templates/cve-less/plugins/icegram-de418588fa621f09a7aaad7d1520c591.yaml new file mode 100644 index 0000000000..84ee1ac78f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-de418588fa621f09a7aaad7d1520c591.yaml @@ -0,0 +1,58 @@ +id: icegram-de418588fa621f09a7aaad7d1520c591 + +info: + name: > + Icegram <= 2.0.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdb5ae36-6ce2-4c26-8047-6bbbdce530c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-fad6995dafdb43e5ee26d12d1d4dc9b6.yaml b/nuclei-templates/cve-less/plugins/icegram-fad6995dafdb43e5ee26d12d1d4dc9b6.yaml new file mode 100644 index 0000000000..1230b3f953 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-fad6995dafdb43e5ee26d12d1d4dc9b6.yaml @@ -0,0 +1,58 @@ +id: icegram-fad6995dafdb43e5ee26d12d1d4dc9b6 + +info: + name: > + Icegram <= 3.1.21 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/059f526f-6769-4092-92b0-2ef6248963ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram/" + google-query: inurl:"/wp-content/plugins/icegram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icegram-rainmaker-00aaf3a917048a24cf4188f68658ad92.yaml b/nuclei-templates/cve-less/plugins/icegram-rainmaker-00aaf3a917048a24cf4188f68658ad92.yaml new file mode 100644 index 0000000000..c080c64dfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icegram-rainmaker-00aaf3a917048a24cf4188f68658ad92.yaml @@ -0,0 +1,58 @@ +id: icegram-rainmaker-00aaf3a917048a24cf4188f68658ad92 + +info: + name: > + Icegram Collect <= 1.3.8 - Authenticated(Contributor+) Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93920201-fd53-45ad-983a-a2b04b96db77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icegram-rainmaker/" + google-query: inurl:"/wp-content/plugins/icegram-rainmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icegram-rainmaker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icegram-rainmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icegram-rainmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icon-1b71c9c29fdfc5dbc008529fa648dbe1.yaml b/nuclei-templates/cve-less/plugins/icon-1b71c9c29fdfc5dbc008529fa648dbe1.yaml new file mode 100644 index 0000000000..77883566a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icon-1b71c9c29fdfc5dbc008529fa648dbe1.yaml @@ -0,0 +1,58 @@ +id: icon-1b71c9c29fdfc5dbc008529fa648dbe1 + +info: + name: > + Web Icons <= 1.0.0.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efe6d975-310d-4286-af2a-e599990e3b0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icon/" + google-query: inurl:"/wp-content/plugins/icon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icon-d0db52345c07a6211225ddd6537e55c1.yaml b/nuclei-templates/cve-less/plugins/icon-d0db52345c07a6211225ddd6537e55c1.yaml new file mode 100644 index 0000000000..a74d60c514 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icon-d0db52345c07a6211225ddd6537e55c1.yaml @@ -0,0 +1,58 @@ +id: icon-d0db52345c07a6211225ddd6537e55c1 + +info: + name: > + Web Icons <= 1.0.0.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8af960cd-6f39-4ce1-888a-f32f01b833df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icon/" + google-query: inurl:"/wp-content/plugins/icon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icon-widget-3d89fb86525a43be8c098b0f455b9af2.yaml b/nuclei-templates/cve-less/plugins/icon-widget-3d89fb86525a43be8c098b0f455b9af2.yaml new file mode 100644 index 0000000000..22e18ce40b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icon-widget-3d89fb86525a43be8c098b0f455b9af2.yaml @@ -0,0 +1,58 @@ +id: icon-widget-3d89fb86525a43be8c098b0f455b9af2 + +info: + name: > + Icon Widget <= 1.3.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7352ab6d-b582-4512-a9fa-4b42b78fa862?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icon-widget/" + google-query: inurl:"/wp-content/plugins/icon-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icon-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icon-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icon-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icon-widget-8616181357e5ec901fe630838e957487.yaml b/nuclei-templates/cve-less/plugins/icon-widget-8616181357e5ec901fe630838e957487.yaml new file mode 100644 index 0000000000..9dc7591e97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icon-widget-8616181357e5ec901fe630838e957487.yaml @@ -0,0 +1,58 @@ +id: icon-widget-8616181357e5ec901fe630838e957487 + +info: + name: > + Icon Widget <= 1.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81c4dd54-a248-48a0-a407-ffd3162e0abe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icon-widget/" + google-query: inurl:"/wp-content/plugins/icon-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icon-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icon-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icon-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iconic-woothumbs-de57654257372bbed35371bcf945ac46.yaml b/nuclei-templates/cve-less/plugins/iconic-woothumbs-de57654257372bbed35371bcf945ac46.yaml new file mode 100644 index 0000000000..e562df6446 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iconic-woothumbs-de57654257372bbed35371bcf945ac46.yaml @@ -0,0 +1,58 @@ +id: iconic-woothumbs-de57654257372bbed35371bcf945ac46 + +info: + name: > + WooThumbs for WooCommerce by Iconic <= 5.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47feeeef-07ff-42a1-a94d-b90c25cce2e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iconic-woothumbs/" + google-query: inurl:"/wp-content/plugins/iconic-woothumbs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iconic-woothumbs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iconic-woothumbs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iconic-woothumbs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icons-font-loader-8140a3945a877628cd9d34a767c59437.yaml b/nuclei-templates/cve-less/plugins/icons-font-loader-8140a3945a877628cd9d34a767c59437.yaml new file mode 100644 index 0000000000..7fe2a66754 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icons-font-loader-8140a3945a877628cd9d34a767c59437.yaml @@ -0,0 +1,58 @@ +id: icons-font-loader-8140a3945a877628cd9d34a767c59437 + +info: + name: > + Icons Font Loader <= 1.1.4 - Authenticated(Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37426991-7778-4dc4-8cae-2725584fb8b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icons-font-loader/" + google-query: inurl:"/wp-content/plugins/icons-font-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icons-font-loader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icons-font-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icons-font-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icons-font-loader-cecbfeb5d8e878e2a09fb45c42f38adc.yaml b/nuclei-templates/cve-less/plugins/icons-font-loader-cecbfeb5d8e878e2a09fb45c42f38adc.yaml new file mode 100644 index 0000000000..8eaaf18ebb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icons-font-loader-cecbfeb5d8e878e2a09fb45c42f38adc.yaml @@ -0,0 +1,58 @@ +id: icons-font-loader-cecbfeb5d8e878e2a09fb45c42f38adc + +info: + name: > + Icons Font Loader <= 1.1.2 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12a9fbe8-445a-478a-b6ce-cd669ccb6a2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icons-font-loader/" + google-query: inurl:"/wp-content/plugins/icons-font-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icons-font-loader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icons-font-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icons-font-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icons-font-loader-d61c42f727c04f01365911b7fc14a3d5.yaml b/nuclei-templates/cve-less/plugins/icons-font-loader-d61c42f727c04f01365911b7fc14a3d5.yaml new file mode 100644 index 0000000000..a9aa331150 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icons-font-loader-d61c42f727c04f01365911b7fc14a3d5.yaml @@ -0,0 +1,58 @@ +id: icons-font-loader-d61c42f727c04f01365911b7fc14a3d5 + +info: + name: > + Icons Font Loader <= 1.1.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8564fc82-ff23-44b6-91b0-d63e6afb1a73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icons-font-loader/" + google-query: inurl:"/wp-content/plugins/icons-font-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icons-font-loader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icons-font-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icons-font-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icons-for-features-df867e267884badbbf8457b1d7257d5d.yaml b/nuclei-templates/cve-less/plugins/icons-for-features-df867e267884badbbf8457b1d7257d5d.yaml new file mode 100644 index 0000000000..37f41125e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icons-for-features-df867e267884badbbf8457b1d7257d5d.yaml @@ -0,0 +1,58 @@ +id: icons-for-features-df867e267884badbbf8457b1d7257d5d + +info: + name: > + Icons for Features <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35a0f4dd-7370-48da-a4ef-424c42da60e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icons-for-features/" + google-query: inurl:"/wp-content/plugins/icons-for-features/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icons-for-features,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icons-for-features/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icons-for-features" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icons-with-links-widget-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/icons-with-links-widget-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..9281761f73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icons-with-links-widget-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: icons-with-links-widget-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icons-with-links-widget/" + google-query: inurl:"/wp-content/plugins/icons-with-links-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icons-with-links-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icons-with-links-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icons-with-links-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ics-calendar-13f1e3e1ecb400323f6ac6db56c9c266.yaml b/nuclei-templates/cve-less/plugins/ics-calendar-13f1e3e1ecb400323f6ac6db56c9c266.yaml new file mode 100644 index 0000000000..c86e442784 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ics-calendar-13f1e3e1ecb400323f6ac6db56c9c266.yaml @@ -0,0 +1,58 @@ +id: ics-calendar-13f1e3e1ecb400323f6ac6db56c9c266 + +info: + name: > + ICS Calendar <= 10.12.0.1 - Authenticated(Contributor+) Directory Traversal via _url_get_contents + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f18a1c5-a0b7-49f9-acc1-5604304fd72f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ics-calendar/" + google-query: inurl:"/wp-content/plugins/ics-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ics-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ics-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ics-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.12.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ics-calendar-145fd589f9d6e521c8599d0e3d4550d9.yaml b/nuclei-templates/cve-less/plugins/ics-calendar-145fd589f9d6e521c8599d0e3d4550d9.yaml new file mode 100644 index 0000000000..2ca2a9237f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ics-calendar-145fd589f9d6e521c8599d0e3d4550d9.yaml @@ -0,0 +1,58 @@ +id: ics-calendar-145fd589f9d6e521c8599d0e3d4550d9 + +info: + name: > + ICS Calendar <= 10.12.0.2 - Authenticated (Contributor+) Arbitrary File Read and Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f15415aa-b820-4697-8360-b526312c89d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ics-calendar/" + google-query: inurl:"/wp-content/plugins/ics-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ics-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ics-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ics-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.12.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/icustomizer-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/icustomizer-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..7ed55a8d35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/icustomizer-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: icustomizer-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/icustomizer/" + google-query: inurl:"/wp-content/plugins/icustomizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,icustomizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/icustomizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "icustomizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/idbbee-6f26e9f01d61af85a0a5abec46c6e923.yaml b/nuclei-templates/cve-less/plugins/idbbee-6f26e9f01d61af85a0a5abec46c6e923.yaml new file mode 100644 index 0000000000..021b93c518 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/idbbee-6f26e9f01d61af85a0a5abec46c6e923.yaml @@ -0,0 +1,58 @@ +id: idbbee-6f26e9f01d61af85a0a5abec46c6e923 + +info: + name: > + idbbee <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac763936-7147-4100-8a46-4c6d2f2224b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/idbbee/" + google-query: inurl:"/wp-content/plugins/idbbee/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,idbbee,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/idbbee/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "idbbee" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ideal-interactive-map-9f41ca20cf9aa5ad6ef84f69ddb6f680.yaml b/nuclei-templates/cve-less/plugins/ideal-interactive-map-9f41ca20cf9aa5ad6ef84f69ddb6f680.yaml new file mode 100644 index 0000000000..af04cdf598 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ideal-interactive-map-9f41ca20cf9aa5ad6ef84f69ddb6f680.yaml @@ -0,0 +1,58 @@ +id: ideal-interactive-map-9f41ca20cf9aa5ad6ef84f69ddb6f680 + +info: + name: > + Ideal Interactive Map <= 1.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/019c5e06-1345-4c8e-abb9-dc0ea5d55ef5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ideal-interactive-map/" + google-query: inurl:"/wp-content/plugins/ideal-interactive-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ideal-interactive-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ideal-interactive-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ideal-interactive-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ideapush-147226d7fc59bc73ef79b60eb67e7365.yaml b/nuclei-templates/cve-less/plugins/ideapush-147226d7fc59bc73ef79b60eb67e7365.yaml new file mode 100644 index 0000000000..79368eb327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ideapush-147226d7fc59bc73ef79b60eb67e7365.yaml @@ -0,0 +1,58 @@ +id: ideapush-147226d7fc59bc73ef79b60eb67e7365 + +info: + name: > + IdeaPush <= 8.52 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3673a86c-1e11-45ad-8944-84a38aad53dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ideapush/" + google-query: inurl:"/wp-content/plugins/ideapush/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ideapush,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ideapush/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ideapush" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ideapush-99da104892c6f75f32c9288294b2b02d.yaml b/nuclei-templates/cve-less/plugins/ideapush-99da104892c6f75f32c9288294b2b02d.yaml new file mode 100644 index 0000000000..8861661d53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ideapush-99da104892c6f75f32c9288294b2b02d.yaml @@ -0,0 +1,58 @@ +id: ideapush-99da104892c6f75f32c9288294b2b02d + +info: + name: > + IdeaPush <= 8.57 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5811fc63-da34-43cb-ae33-a34a8795bb72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ideapush/" + google-query: inurl:"/wp-content/plugins/ideapush/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ideapush,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ideapush/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ideapush" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/idpay-contact-form-7-950481457b7608baa20b9048bd054085.yaml b/nuclei-templates/cve-less/plugins/idpay-contact-form-7-950481457b7608baa20b9048bd054085.yaml new file mode 100644 index 0000000000..0ca3715d5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/idpay-contact-form-7-950481457b7608baa20b9048bd054085.yaml @@ -0,0 +1,58 @@ +id: idpay-contact-form-7-950481457b7608baa20b9048bd054085 + +info: + name: > + IDPay for Contact Form 7 <= 2.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf3f82dc-3820-4c9d-adbb-ca0375078876?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/idpay-contact-form-7/" + google-query: inurl:"/wp-content/plugins/idpay-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,idpay-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/idpay-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "idpay-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/idx-broker-platinum-74e3a5823f9cf5e58e6b984ee0054047.yaml b/nuclei-templates/cve-less/plugins/idx-broker-platinum-74e3a5823f9cf5e58e6b984ee0054047.yaml new file mode 100644 index 0000000000..81d3ff76b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/idx-broker-platinum-74e3a5823f9cf5e58e6b984ee0054047.yaml @@ -0,0 +1,58 @@ +id: idx-broker-platinum-74e3a5823f9cf5e58e6b984ee0054047 + +info: + name: > + IMPress for IDX Broker <= 2.6.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce4ca9c6-7ffd-4170-9004-f7bc3ad15df0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/idx-broker-platinum/" + google-query: inurl:"/wp-content/plugins/idx-broker-platinum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,idx-broker-platinum,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/idx-broker-platinum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "idx-broker-platinum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/idx-broker-platinum-99bc9f10b2d01aa27904e65b8ec6ed4c.yaml b/nuclei-templates/cve-less/plugins/idx-broker-platinum-99bc9f10b2d01aa27904e65b8ec6ed4c.yaml new file mode 100644 index 0000000000..951cb5fe1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/idx-broker-platinum-99bc9f10b2d01aa27904e65b8ec6ed4c.yaml @@ -0,0 +1,58 @@ +id: idx-broker-platinum-99bc9f10b2d01aa27904e65b8ec6ed4c + +info: + name: > + IMPress for IDX Broker <= 3.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9169af40-32da-4b38-95ee-d0c7d4e67779?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/idx-broker-platinum/" + google-query: inurl:"/wp-content/plugins/idx-broker-platinum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,idx-broker-platinum,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/idx-broker-platinum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "idx-broker-platinum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/idx-broker-platinum-ce70b843af38d7c69c95be8ff1b26205.yaml b/nuclei-templates/cve-less/plugins/idx-broker-platinum-ce70b843af38d7c69c95be8ff1b26205.yaml new file mode 100644 index 0000000000..7670992f6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/idx-broker-platinum-ce70b843af38d7c69c95be8ff1b26205.yaml @@ -0,0 +1,58 @@ +id: idx-broker-platinum-ce70b843af38d7c69c95be8ff1b26205 + +info: + name: > + IMPress for IDX Broker <= 2.6.1 - Authenticated Arbitrary Post Creation, Modification, and Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/426ea88f-bdd4-4da6-88c2-db82df9e01e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/idx-broker-platinum/" + google-query: inurl:"/wp-content/plugins/idx-broker-platinum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,idx-broker-platinum,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/idx-broker-platinum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "idx-broker-platinum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/if-menu-cd6ae30437be0309f27d9b8ec11e2caa.yaml b/nuclei-templates/cve-less/plugins/if-menu-cd6ae30437be0309f27d9b8ec11e2caa.yaml new file mode 100644 index 0000000000..4b36b49972 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/if-menu-cd6ae30437be0309f27d9b8ec11e2caa.yaml @@ -0,0 +1,58 @@ +id: if-menu-cd6ae30437be0309f27d9b8ec11e2caa + +info: + name: > + If Menu <= 0.16.3 - Missing Authorization to Admin Settings Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b5fc0ac-7a33-48da-8b0f-566b9eb0f17f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/if-menu/" + google-query: inurl:"/wp-content/plugins/if-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,if-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/if-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "if-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.16.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/if-so-a5beaca14051398b5a8cac72b33e8606.yaml b/nuclei-templates/cve-less/plugins/if-so-a5beaca14051398b5a8cac72b33e8606.yaml new file mode 100644 index 0000000000..457d8000bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/if-so-a5beaca14051398b5a8cac72b33e8606.yaml @@ -0,0 +1,58 @@ +id: if-so-a5beaca14051398b5a8cac72b33e8606 + +info: + name: > + If-So Dynamic Content Personalization <= 1.6.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8407b678-76c5-4232-b17e-8db05f9e7b12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/if-so/" + google-query: inurl:"/wp-content/plugins/if-so/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,if-so,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/if-so/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "if-so" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ifeature-slider-4857da40460f492fd61121c6a3d9ad96.yaml b/nuclei-templates/cve-less/plugins/ifeature-slider-4857da40460f492fd61121c6a3d9ad96.yaml new file mode 100644 index 0000000000..28d9c85c0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ifeature-slider-4857da40460f492fd61121c6a3d9ad96.yaml @@ -0,0 +1,58 @@ +id: ifeature-slider-4857da40460f492fd61121c6a3d9ad96 + +info: + name: > + iFeature Slider <= 1.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c070b9c-5bed-4f9f-8d96-70958bf294cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ifeature-slider/" + google-query: inurl:"/wp-content/plugins/ifeature-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ifeature-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ifeature-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ifeature-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iflychat-8961ac80ff2f49ea02524bf55be03a91.yaml b/nuclei-templates/cve-less/plugins/iflychat-8961ac80ff2f49ea02524bf55be03a91.yaml new file mode 100644 index 0000000000..2ccda38afe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iflychat-8961ac80ff2f49ea02524bf55be03a91.yaml @@ -0,0 +1,58 @@ +id: iflychat-8961ac80ff2f49ea02524bf55be03a91 + +info: + name: > + iFlyChat – WordPress Chat <= 4.6.4 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81141b8c-9677-4267-9026-33267e3135f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iflychat/" + google-query: inurl:"/wp-content/plugins/iflychat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iflychat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iflychat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iflychat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iflychat-a5c9dfe234305fe9b3c82a7200b4785c.yaml b/nuclei-templates/cve-less/plugins/iflychat-a5c9dfe234305fe9b3c82a7200b4785c.yaml new file mode 100644 index 0000000000..df8bbdc94e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iflychat-a5c9dfe234305fe9b3c82a7200b4785c.yaml @@ -0,0 +1,58 @@ +id: iflychat-a5c9dfe234305fe9b3c82a7200b4785c + +info: + name: > + iFlyChat – WordPress Chat <= 4.7.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78797c97-a5b8-4d2d-acd2-ebd508f2f836?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iflychat/" + google-query: inurl:"/wp-content/plugins/iflychat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iflychat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iflychat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iflychat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ifolders-7c92e9b689e3db3a0760660dea080463.yaml b/nuclei-templates/cve-less/plugins/ifolders-7c92e9b689e3db3a0760660dea080463.yaml new file mode 100644 index 0000000000..e883913ad5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ifolders-7c92e9b689e3db3a0760660dea080463.yaml @@ -0,0 +1,58 @@ +id: ifolders-7c92e9b689e3db3a0760660dea080463 + +info: + name: > + iFolders <= 1.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1f957ce-7bb0-4701-8b2a-522211c408d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ifolders/" + google-query: inurl:"/wp-content/plugins/ifolders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ifolders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ifolders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ifolders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-4e5782f54b030eb5a442bdadb5799911.yaml b/nuclei-templates/cve-less/plugins/iframe-4e5782f54b030eb5a442bdadb5799911.yaml new file mode 100644 index 0000000000..6834e75ef3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-4e5782f54b030eb5a442bdadb5799911.yaml @@ -0,0 +1,58 @@ +id: iframe-4e5782f54b030eb5a442bdadb5799911 + +info: + name: > + iFrame <= 4.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7bcd458-71bf-4961-a7ce-3f88593f6f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe/" + google-query: inurl:"/wp-content/plugins/iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-731244d7e48d469d8250ca7d6169422e.yaml b/nuclei-templates/cve-less/plugins/iframe-731244d7e48d469d8250ca7d6169422e.yaml new file mode 100644 index 0000000000..81af6f8194 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-731244d7e48d469d8250ca7d6169422e.yaml @@ -0,0 +1,58 @@ +id: iframe-731244d7e48d469d8250ca7d6169422e + +info: + name: > + iframe <= 4.4 - Authenticated Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/742acb6b-a799-4bb8-b4dc-f7359e7fdd4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe/" + google-query: inurl:"/wp-content/plugins/iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-87f3d8d7d2e5d0851519c88fc9a636a9.yaml b/nuclei-templates/cve-less/plugins/iframe-87f3d8d7d2e5d0851519c88fc9a636a9.yaml new file mode 100644 index 0000000000..ff74e5a0c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-87f3d8d7d2e5d0851519c88fc9a636a9.yaml @@ -0,0 +1,58 @@ +id: iframe-87f3d8d7d2e5d0851519c88fc9a636a9 + +info: + name: > + iFrame <= 3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b37fc473-d71e-47d6-b0fe-e323868244f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe/" + google-query: inurl:"/wp-content/plugins/iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-admin-pages-51641e54d4899750cfc0bbb22e59a17f.yaml b/nuclei-templates/cve-less/plugins/iframe-admin-pages-51641e54d4899750cfc0bbb22e59a17f.yaml new file mode 100644 index 0000000000..e1f10b4234 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-admin-pages-51641e54d4899750cfc0bbb22e59a17f.yaml @@ -0,0 +1,58 @@ +id: iframe-admin-pages-51641e54d4899750cfc0bbb22e59a17f + +info: + name: > + IFrame Admin Pages <= 0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a48f82a-761b-4b7a-a51e-0f9c780e0306?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe-admin-pages/" + google-query: inurl:"/wp-content/plugins/iframe-admin-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe-admin-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe-admin-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe-admin-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-c1259d5d6340f1a9bb2b4b54cbfddf23.yaml b/nuclei-templates/cve-less/plugins/iframe-c1259d5d6340f1a9bb2b4b54cbfddf23.yaml new file mode 100644 index 0000000000..7ab5d1d7b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-c1259d5d6340f1a9bb2b4b54cbfddf23.yaml @@ -0,0 +1,58 @@ +id: iframe-c1259d5d6340f1a9bb2b4b54cbfddf23 + +info: + name: > + iframe <= 4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'iframe' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3706deed-55f2-4dfb-bfed-7a14872cd15a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe/" + google-query: inurl:"/wp-content/plugins/iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-f282e15c376140f7b66d206f8f96f3e6.yaml b/nuclei-templates/cve-less/plugins/iframe-f282e15c376140f7b66d206f8f96f3e6.yaml new file mode 100644 index 0000000000..b4fdea8ff8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-f282e15c376140f7b66d206f8f96f3e6.yaml @@ -0,0 +1,58 @@ +id: iframe-f282e15c376140f7b66d206f8f96f3e6 + +info: + name: > + iFrame <= 4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via srcdoc + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66f392d0-d5fb-4a8c-b972-becfac6cf6e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe/" + google-query: inurl:"/wp-content/plugins/iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-forms-0e32b41ab13a7d99daea1bd1091ef1a3.yaml b/nuclei-templates/cve-less/plugins/iframe-forms-0e32b41ab13a7d99daea1bd1091ef1a3.yaml new file mode 100644 index 0000000000..23611d62f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-forms-0e32b41ab13a7d99daea1bd1091ef1a3.yaml @@ -0,0 +1,58 @@ +id: iframe-forms-0e32b41ab13a7d99daea1bd1091ef1a3 + +info: + name: > + iframe forms <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via iframe Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/818de7f7-913a-4ade-927e-bba281b4709a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe-forms/" + google-query: inurl:"/wp-content/plugins/iframe-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-popup-bd8810c05731a418d8d9a50b27d4228d.yaml b/nuclei-templates/cve-less/plugins/iframe-popup-bd8810c05731a418d8d9a50b27d4228d.yaml new file mode 100644 index 0000000000..85f5b819a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-popup-bd8810c05731a418d8d9a50b27d4228d.yaml @@ -0,0 +1,58 @@ +id: iframe-popup-bd8810c05731a418d8d9a50b27d4228d + +info: + name: > + iframe popup <= 3.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d2c6f19-025e-4c17-b5d9-4bbddbaf66d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe-popup/" + google-query: inurl:"/wp-content/plugins/iframe-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iframe-shortcode-ff7d4698a1b99dc4dd381f78e045f0a7.yaml b/nuclei-templates/cve-less/plugins/iframe-shortcode-ff7d4698a1b99dc4dd381f78e045f0a7.yaml new file mode 100644 index 0000000000..21b08dc491 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iframe-shortcode-ff7d4698a1b99dc4dd381f78e045f0a7.yaml @@ -0,0 +1,58 @@ +id: iframe-shortcode-ff7d4698a1b99dc4dd381f78e045f0a7 + +info: + name: > + iframe Shortcode <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3c323d5-59bc-4ecc-8211-2104fd22639f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iframe-shortcode/" + google-query: inurl:"/wp-content/plugins/iframe-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iframe-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iframe-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iframe-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/igniteup-063e847b7379d721b0dcf7f56e94adc2.yaml b/nuclei-templates/cve-less/plugins/igniteup-063e847b7379d721b0dcf7f56e94adc2.yaml new file mode 100644 index 0000000000..239b4d008b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/igniteup-063e847b7379d721b0dcf7f56e94adc2.yaml @@ -0,0 +1,58 @@ +id: igniteup-063e847b7379d721b0dcf7f56e94adc2 + +info: + name: > + IgniteUp – Coming Soon and Maintenance Mode <= 3.4 - Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a1a4186-216e-4ed1-860c-fe345ac6e62a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/igniteup/" + google-query: inurl:"/wp-content/plugins/igniteup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,igniteup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/igniteup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "igniteup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/igniteup-2d2ac3176c43972722599e2c20bf65f9.yaml b/nuclei-templates/cve-less/plugins/igniteup-2d2ac3176c43972722599e2c20bf65f9.yaml new file mode 100644 index 0000000000..413de3498c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/igniteup-2d2ac3176c43972722599e2c20bf65f9.yaml @@ -0,0 +1,58 @@ +id: igniteup-2d2ac3176c43972722599e2c20bf65f9 + +info: + name: > + IgniteUp – Coming Soon and Maintenance Mode <= 3.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e8f63e3-6392-4152-94a5-eb953d7e53fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/igniteup/" + google-query: inurl:"/wp-content/plugins/igniteup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,igniteup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/igniteup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "igniteup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/igniteup-97d25b3e88007081f13d8a53fc8698cf.yaml b/nuclei-templates/cve-less/plugins/igniteup-97d25b3e88007081f13d8a53fc8698cf.yaml new file mode 100644 index 0000000000..efbce7f801 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/igniteup-97d25b3e88007081f13d8a53fc8698cf.yaml @@ -0,0 +1,58 @@ +id: igniteup-97d25b3e88007081f13d8a53fc8698cf + +info: + name: > + IgniteUp – Coming Soon and Maintenance Mode <= 3.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51cf2f40-7be8-4302-a766-88ec2f0501f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/igniteup/" + google-query: inurl:"/wp-content/plugins/igniteup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,igniteup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/igniteup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "igniteup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/igniteup-afb7fcca9f98de3c120709c28d44be7f.yaml b/nuclei-templates/cve-less/plugins/igniteup-afb7fcca9f98de3c120709c28d44be7f.yaml new file mode 100644 index 0000000000..fbbed07936 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/igniteup-afb7fcca9f98de3c120709c28d44be7f.yaml @@ -0,0 +1,58 @@ +id: igniteup-afb7fcca9f98de3c120709c28d44be7f + +info: + name: > + IgniteUp – Coming Soon and Maintenance Mode <= 3.4.0 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc472230-bd80-4bdb-a969-fed7551cc60d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/igniteup/" + google-query: inurl:"/wp-content/plugins/igniteup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,igniteup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/igniteup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "igniteup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/igniteup-edf371c1f05d5a891d28a3a64c575117.yaml b/nuclei-templates/cve-less/plugins/igniteup-edf371c1f05d5a891d28a3a64c575117.yaml new file mode 100644 index 0000000000..699ff398bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/igniteup-edf371c1f05d5a891d28a3a64c575117.yaml @@ -0,0 +1,58 @@ +id: igniteup-edf371c1f05d5a891d28a3a64c575117 + +info: + name: > + IgniteUp – Coming Soon and Maintenance Mode <= 3.4.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e33d72d-00d4-45c8-98d2-0a0a73d13b35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/igniteup/" + google-query: inurl:"/wp-content/plugins/igniteup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,igniteup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/igniteup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "igniteup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ignitiondeck-bd77f9a34ba05ef2dc0030989da5aee1.yaml b/nuclei-templates/cve-less/plugins/ignitiondeck-bd77f9a34ba05ef2dc0030989da5aee1.yaml new file mode 100644 index 0000000000..cf714577e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ignitiondeck-bd77f9a34ba05ef2dc0030989da5aee1.yaml @@ -0,0 +1,58 @@ +id: ignitiondeck-bd77f9a34ba05ef2dc0030989da5aee1 + +info: + name: > + IgnitionDeck Crowdfunding Platform <= 1.1.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82619274-4339-44ba-b50c-d1194c34b695?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ignitiondeck/" + google-query: inurl:"/wp-content/plugins/ignitiondeck/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ignitiondeck,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ignitiondeck/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ignitiondeck" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iks-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/iks-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0324265c66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iks-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: iks-menu-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iks-menu/" + google-query: inurl:"/wp-content/plugins/iks-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iks-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iks-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iks-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iksweb-71669f91f6c03ce43a9b92fdae9360cb.yaml b/nuclei-templates/cve-less/plugins/iksweb-71669f91f6c03ce43a9b92fdae9360cb.yaml new file mode 100644 index 0000000000..7e55d57ddb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iksweb-71669f91f6c03ce43a9b92fdae9360cb.yaml @@ -0,0 +1,58 @@ +id: iksweb-71669f91f6c03ce43a9b92fdae9360cb + +info: + name: > + Старт <= 3.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8121633-299d-45f9-88b1-e65e30e897d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iksweb/" + google-query: inurl:"/wp-content/plugins/iksweb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iksweb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iksweb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iksweb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ilab-media-tools-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ilab-media-tools-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d78946d162 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ilab-media-tools-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ilab-media-tools-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ilab-media-tools/" + google-query: inurl:"/wp-content/plugins/ilab-media-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ilab-media-tools,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ilab-media-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ilab-media-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ilab-media-tools-babf60986b5038101853937d0a274e12.yaml b/nuclei-templates/cve-less/plugins/ilab-media-tools-babf60986b5038101853937d0a274e12.yaml new file mode 100644 index 0000000000..896ccc0da2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ilab-media-tools-babf60986b5038101853937d0a274e12.yaml @@ -0,0 +1,58 @@ +id: ilab-media-tools-babf60986b5038101853937d0a274e12 + +info: + name: > + Media Cloud for Amazon S3, Imgix, Google Cloud Storage, DigitalOcean Spaces and more <= 4.5.24 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e10e25e-7d92-4374-8c8e-479cc0dabb1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ilab-media-tools/" + google-query: inurl:"/wp-content/plugins/ilab-media-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ilab-media-tools,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ilab-media-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ilab-media-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ilive-f0b6f9044194846e4b5fe3270faf4ce0.yaml b/nuclei-templates/cve-less/plugins/ilive-f0b6f9044194846e4b5fe3270faf4ce0.yaml new file mode 100644 index 0000000000..1c37682655 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ilive-f0b6f9044194846e4b5fe3270faf4ce0.yaml @@ -0,0 +1,58 @@ +id: ilive-f0b6f9044194846e4b5fe3270faf4ce0 + +info: + name: > + Intelligent WordPress Live Chat Support Plugin | Utilities <= 1.0.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4057bfcf-eb96-4610-93ed-8ff1cca7506d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ilive/" + google-query: inurl:"/wp-content/plugins/ilive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ilive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ilive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ilive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iloveimg-aa275ed39ac05dab3dd3b7cb9e8afc6d.yaml b/nuclei-templates/cve-less/plugins/iloveimg-aa275ed39ac05dab3dd3b7cb9e8afc6d.yaml new file mode 100644 index 0000000000..0b4c3ac274 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iloveimg-aa275ed39ac05dab3dd3b7cb9e8afc6d.yaml @@ -0,0 +1,58 @@ +id: iloveimg-aa275ed39ac05dab3dd3b7cb9e8afc6d + +info: + name: > + Image Compressor & Optimizer - iLoveIMG <= 1.0.5 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/501e9cd1-1187-4d01-a3cc-5edba64c391f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iloveimg/" + google-query: inurl:"/wp-content/plugins/iloveimg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iloveimg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iloveimg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iloveimg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-banner-widget-2f83ea3f51d28fac6369a0c731ce68eb.yaml b/nuclei-templates/cve-less/plugins/image-banner-widget-2f83ea3f51d28fac6369a0c731ce68eb.yaml new file mode 100644 index 0000000000..ff6e43a035 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-banner-widget-2f83ea3f51d28fac6369a0c731ce68eb.yaml @@ -0,0 +1,58 @@ +id: image-banner-widget-2f83ea3f51d28fac6369a0c731ce68eb + +info: + name: > + Image/Banner Widget <= 1.4.5 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e20fe2b7-4396-465e-be41-d4e8a069bb74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-banner-widget/" + google-query: inurl:"/wp-content/plugins/image-banner-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-banner-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-banner-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-banner-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/image-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8b3a99f6cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: image-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-carousel-for-divi/" + google-query: inurl:"/wp-content/plugins/image-carousel-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-carousel-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-carousel-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-carousel-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-export-f6b963f6eaf79a560e9301150e1dd55c.yaml b/nuclei-templates/cve-less/plugins/image-export-f6b963f6eaf79a560e9301150e1dd55c.yaml new file mode 100644 index 0000000000..6194be8366 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-export-f6b963f6eaf79a560e9301150e1dd55c.yaml @@ -0,0 +1,58 @@ +id: image-export-f6b963f6eaf79a560e9301150e1dd55c + +info: + name: > + Image Export < 1.1.1 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1746da3b-397d-4027-b76d-4c57fadf32c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-export/" + google-query: inurl:"/wp-content/plugins/image-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-export,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-1ec9332e58fa89c17bc632e5c37f8d95.yaml b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-1ec9332e58fa89c17bc632e5c37f8d95.yaml new file mode 100644 index 0000000000..36ad8b68b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-1ec9332e58fa89c17bc632e5c37f8d95.yaml @@ -0,0 +1,58 @@ +id: image-gallery-with-slideshow-1ec9332e58fa89c17bc632e5c37f8d95 + +info: + name: > + Image Gallery with Slideshow Plugin <= 1.5.2 - Blind SQL Injection via imgid + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e820c00d-0456-49e8-aca4-bb981a9cfea1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-gallery-with-slideshow/" + google-query: inurl:"/wp-content/plugins/image-gallery-with-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-gallery-with-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-gallery-with-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-gallery-with-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-34b604e60259ea80e8e107b60855d439.yaml b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-34b604e60259ea80e8e107b60855d439.yaml new file mode 100644 index 0000000000..8ba95f6d27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-34b604e60259ea80e8e107b60855d439.yaml @@ -0,0 +1,58 @@ +id: image-gallery-with-slideshow-34b604e60259ea80e8e107b60855d439 + +info: + name: > + Image Gallery with Slideshow <= 1.5.2 - SQL Injection via gallery_name + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6164c161-f764-4064-8139-609caad82204?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-gallery-with-slideshow/" + google-query: inurl:"/wp-content/plugins/image-gallery-with-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-gallery-with-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-gallery-with-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-gallery-with-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-3f3452426888f89fbe519623725273af.yaml b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-3f3452426888f89fbe519623725273af.yaml new file mode 100644 index 0000000000..23992b42aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-3f3452426888f89fbe519623725273af.yaml @@ -0,0 +1,58 @@ +id: image-gallery-with-slideshow-3f3452426888f89fbe519623725273af + +info: + name: > + Image Gallery with Slideshow <= 1.5.2 - SQL Injection via selectMulGallery + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9ced7f4-9574-40a6-94eb-e5d3bdff8336?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-gallery-with-slideshow/" + google-query: inurl:"/wp-content/plugins/image-gallery-with-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-gallery-with-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-gallery-with-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-gallery-with-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-d9744d373611452d7acba4bbb5d5e69e.yaml b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-d9744d373611452d7acba4bbb5d5e69e.yaml new file mode 100644 index 0000000000..aabba000c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-d9744d373611452d7acba4bbb5d5e69e.yaml @@ -0,0 +1,58 @@ +id: image-gallery-with-slideshow-d9744d373611452d7acba4bbb5d5e69e + +info: + name: > + Image Gallery with Slideshow Plugin <= 1.5.2 - SQL Injection via gid + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cef83a3e-9e8b-4c4c-9adc-cdcebefadd39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-gallery-with-slideshow/" + google-query: inurl:"/wp-content/plugins/image-gallery-with-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-gallery-with-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-gallery-with-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-gallery-with-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-f04fb223e6bc1b82dc5e818d9e40fb20.yaml b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-f04fb223e6bc1b82dc5e818d9e40fb20.yaml new file mode 100644 index 0000000000..af5566f288 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-gallery-with-slideshow-f04fb223e6bc1b82dc5e818d9e40fb20.yaml @@ -0,0 +1,58 @@ +id: image-gallery-with-slideshow-f04fb223e6bc1b82dc5e818d9e40fb20 + +info: + name: > + Image Gallery with Slideshow Plugin <= 1.5.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7dac90c-d84a-4e93-a4c0-baaa5fee11c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-gallery-with-slideshow/" + google-query: inurl:"/wp-content/plugins/image-gallery-with-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-gallery-with-slideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-gallery-with-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-gallery-with-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-horizontal-reel-scroll-slideshow-09c9edd801d535f8b0dc361310e2bb14.yaml b/nuclei-templates/cve-less/plugins/image-horizontal-reel-scroll-slideshow-09c9edd801d535f8b0dc361310e2bb14.yaml new file mode 100644 index 0000000000..98d8fa5cc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-horizontal-reel-scroll-slideshow-09c9edd801d535f8b0dc361310e2bb14.yaml @@ -0,0 +1,58 @@ +id: image-horizontal-reel-scroll-slideshow-09c9edd801d535f8b0dc361310e2bb14 + +info: + name: > + Image horizontal reel scroll slideshow <= 13.2 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08fb698f-c87c-4200-85fe-3fe72745633e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-horizontal-reel-scroll-slideshow/" + google-query: inurl:"/wp-content/plugins/image-horizontal-reel-scroll-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-horizontal-reel-scroll-slideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-horizontal-reel-scroll-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-horizontal-reel-scroll-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-horizontal-reel-scroll-slideshow-21bae7dd0ccc10547daf0010edb807de.yaml b/nuclei-templates/cve-less/plugins/image-horizontal-reel-scroll-slideshow-21bae7dd0ccc10547daf0010edb807de.yaml new file mode 100644 index 0000000000..4d147092b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-horizontal-reel-scroll-slideshow-21bae7dd0ccc10547daf0010edb807de.yaml @@ -0,0 +1,58 @@ +id: image-horizontal-reel-scroll-slideshow-21bae7dd0ccc10547daf0010edb807de + +info: + name: > + Image horizontal reel scroll slideshow <= 13.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28ba6f91-c696-4019-ae87-28ebfbe464cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-horizontal-reel-scroll-slideshow/" + google-query: inurl:"/wp-content/plugins/image-horizontal-reel-scroll-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-horizontal-reel-scroll-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-horizontal-reel-scroll-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-horizontal-reel-scroll-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-026772a7c84514935eb2f122e1212bd7.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-026772a7c84514935eb2f122e1212bd7.yaml new file mode 100644 index 0000000000..de279f4d03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-026772a7c84514935eb2f122e1212bd7.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-addon-for-elementor-026772a7c84514935eb2f122e1212bd7 + +info: + name: > + Image Hover Effects – Elementor Addon <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'eihe_align' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05d26003-ae7e-480a-bd63-1c5f5e9c3cab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-addon-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-23084d0a675ec1fe2de5f06c696330cf.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-23084d0a675ec1fe2de5f06c696330cf.yaml new file mode 100644 index 0000000000..235751c2c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-23084d0a675ec1fe2de5f06c696330cf.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-addon-for-elementor-23084d0a675ec1fe2de5f06c696330cf + +info: + name: > + Image Hover Effects - Elementor Addon <= 1.4.1 - Authenticated(Contributor+) DOM-based Stored Cross-Site Scripting via Image Hover Effects Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d72a57f-9acc-43e4-af81-024bc6e0d3fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-addon-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml new file mode 100644 index 0000000000..3a61624c97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-addon-for-elementor-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-addon-for-elementor-257c0e2f02ca2973a1b0fbc7bb05b9d9 + +info: + name: > + Image Hover Effects – Elementor Addon <= 1.3.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd126bcb-0add-4662-a4d9-03a55a7d9a32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-addon-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-css3-af386a5b7a4c4897059c13e07ba6a1c2.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-css3-af386a5b7a4c4897059c13e07ba6a1c2.yaml new file mode 100644 index 0000000000..50db5e17b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-css3-af386a5b7a4c4897059c13e07ba6a1c2.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-css3-af386a5b7a4c4897059c13e07ba6a1c2 + +info: + name: > + Image Hover Effects Css3 <= 4.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e6616d0-0690-4bf4-9228-33679b926b90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-css3/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-css3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-css3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-css3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-css3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ec47480114d271de7f87aec48e42bcd6.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ec47480114d271de7f87aec48e42bcd6.yaml new file mode 100644 index 0000000000..66923c34ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ec47480114d271de7f87aec48e42bcd6.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ec47480114d271de7f87aec48e42bcd6 + +info: + name: > + Image Hover Effects <= 5.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb947f1f-8cce-448d-9c86-1d3c01a4637d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects/" + google-query: inurl:"/wp-content/plugins/image-hover-effects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-f33065d14f70bf7433189e427d984bdc.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-f33065d14f70bf7433189e427d984bdc.yaml new file mode 100644 index 0000000000..cbe117ebdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-f33065d14f70bf7433189e427d984bdc.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-f33065d14f70bf7433189e427d984bdc + +info: + name: > + Image Hover Effects <= 5.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4ecf437-b9f5-47d3-85b2-c8159c937473?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects/" + google-query: inurl:"/wp-content/plugins/image-hover-effects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-0291dfad8381b24ca3c37e22a37879df.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-0291dfad8381b24ca3c37e22a37879df.yaml new file mode 100644 index 0000000000..74ffa163d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-0291dfad8381b24ca3c37e22a37879df.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-0291dfad8381b24ca3c37e22a37879df + +info: + name: > + Image Hover Effects Ultimate <= 9.7.0 - Reflected Cross-Site Scripting via effects + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d902dfe-f16d-4795-9fcf-ee454b3d8c56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-2996acb98eba30cde2adfc4ff1d39a59.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-2996acb98eba30cde2adfc4ff1d39a59.yaml new file mode 100644 index 0000000000..c3b4f450b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-2996acb98eba30cde2adfc4ff1d39a59.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-2996acb98eba30cde2adfc4ff1d39a59 + +info: + name: > + Image Hover Effects Ultimate <= 9.6.1 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b4fcc97-1b6b-4411-8b55-0ef7a2c8d44e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-617785fa7c971048a906a08d626203c0.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-617785fa7c971048a906a08d626203c0.yaml new file mode 100644 index 0000000000..5f98ec1688 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-617785fa7c971048a906a08d626203c0.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-617785fa7c971048a906a08d626203c0 + +info: + name: > + Image Hover Effects Ultimate <= 9.7.1 - Authenticated (Admin+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15c2cc20-8d10-4e77-8009-df91e171183f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-8967ba956e5665f951b5fe05d1b8630c.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-8967ba956e5665f951b5fe05d1b8630c.yaml new file mode 100644 index 0000000000..9731c5ff06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-8967ba956e5665f951b5fe05d1b8630c.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-8967ba956e5665f951b5fe05d1b8630c + +info: + name: > + Image Hover Effects Ultimate <= 9.7.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78376368-4883-48ce-aad0-e1d5a993cd74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-cb1c5b7fa2f66db14c90c48d844c8b70.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-cb1c5b7fa2f66db14c90c48d844c8b70.yaml new file mode 100644 index 0000000000..c6979df333 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-cb1c5b7fa2f66db14c90c48d844c8b70.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-cb1c5b7fa2f66db14c90c48d844c8b70 + +info: + name: > + Image Hover Effects Ultimate 9.8.1 - 9.8.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f00cdef3-d733-4e85-8099-204ef76096b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 9.8.1', '<= 9.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-d213e2e9594308f580bdffdb06a3d065.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-d213e2e9594308f580bdffdb06a3d065.yaml new file mode 100644 index 0000000000..894cd7b203 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-d213e2e9594308f580bdffdb06a3d065.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-d213e2e9594308f580bdffdb06a3d065 + +info: + name: > + Image Hover Effects Ultimate <= 9.7.3 - Authenticated Stored Cross-Site Scripting via Media URL + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5a4a017-52d7-44a5-b00f-ce13eda989bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-eef599f42089077d3f1367aba810ab3a.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-eef599f42089077d3f1367aba810ab3a.yaml new file mode 100644 index 0000000000..5b0fdc8ed8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-eef599f42089077d3f1367aba810ab3a.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-eef599f42089077d3f1367aba810ab3a + +info: + name: > + Image Hover Effects Ultimate <= 9.7.3 - Authenticated Stored Cross-Site Scripting via Video Link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ddfa2a1-39e1-4ead-85c5-1624749bd353?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-f12c6444f5c306cf6d2f74b5d9b1f8a0.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-f12c6444f5c306cf6d2f74b5d9b1f8a0.yaml new file mode 100644 index 0000000000..0a95f18aa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-f12c6444f5c306cf6d2f74b5d9b1f8a0.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-f12c6444f5c306cf6d2f74b5d9b1f8a0 + +info: + name: > + Image Hover Effects Ultimate <= 9.7.3 - Authenticated Stored Cross-Site Scripting via Title & Description + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/224a9234-2cf3-48ca-878e-3d7207629beb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-visual-composer-5dac27116865bf3a33881aeb2e87a891.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-visual-composer-5dac27116865bf3a33881aeb2e87a891.yaml new file mode 100644 index 0000000000..59aae6eab2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-ultimate-visual-composer-5dac27116865bf3a33881aeb2e87a891.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-ultimate-visual-composer-5dac27116865bf3a33881aeb2e87a891 + +info: + name: > + Flipbox – Awesomes Flip Boxes Image Overlay <= 2.6.0 - Authenticated (Admin+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a63dd48-d643-41d0-84c3-2f2dbbe577dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-ultimate-visual-composer/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-ultimate-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-ultimate-visual-composer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-ultimate-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-ultimate-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-visual-composer-extension-6e8db758b1055e1e1edd16d20fa3c329.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-visual-composer-extension-6e8db758b1055e1e1edd16d20fa3c329.yaml new file mode 100644 index 0000000000..9a55db20d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-visual-composer-extension-6e8db758b1055e1e1edd16d20fa3c329.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-visual-composer-extension-6e8db758b1055e1e1edd16d20fa3c329 + +info: + name: > + Image Hover Effects For WPBakery Page Builder <= 4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92ffaa23-08f2-4aa4-84c3-a84c26ed8474?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-visual-composer-extension/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-visual-composer-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-visual-composer-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-visual-composer-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-visual-composer-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-hover-effects-with-carousel-2cb86c3f071de1232b4e814ea1574dc8.yaml b/nuclei-templates/cve-less/plugins/image-hover-effects-with-carousel-2cb86c3f071de1232b4e814ea1574dc8.yaml new file mode 100644 index 0000000000..0d77cc6773 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-hover-effects-with-carousel-2cb86c3f071de1232b4e814ea1574dc8.yaml @@ -0,0 +1,58 @@ +id: image-hover-effects-with-carousel-2cb86c3f071de1232b4e814ea1574dc8 + +info: + name: > + Image Hover Effects Plugin - Caption Hover with Carousel <= 2.8 - Unauthenticated Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19c2d455-ae47-49bd-9bb8-1f87b0c76c32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-hover-effects-with-carousel/" + google-query: inurl:"/wp-content/plugins/image-hover-effects-with-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-hover-effects-with-carousel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-hover-effects-with-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-hover-effects-with-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-intense-772b71a2d81ce555d5c9a0a38892bb34.yaml b/nuclei-templates/cve-less/plugins/image-intense-772b71a2d81ce555d5c9a0a38892bb34.yaml new file mode 100644 index 0000000000..48a2cbac32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-intense-772b71a2d81ce555d5c9a0a38892bb34.yaml @@ -0,0 +1,58 @@ +id: image-intense-772b71a2d81ce555d5c9a0a38892bb34 + +info: + name: > + Image Intense <= 3.2.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e8a25d1-4bd8-4ecf-ac10-a333abaac328?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-intense/" + google-query: inurl:"/wp-content/plugins/image-intense/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-intense,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-intense/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-intense" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-map-pro-3dfe4a41b3f6685dbbc11ea86f232a73.yaml b/nuclei-templates/cve-less/plugins/image-map-pro-3dfe4a41b3f6685dbbc11ea86f232a73.yaml new file mode 100644 index 0000000000..34c5142f8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-map-pro-3dfe4a41b3f6685dbbc11ea86f232a73.yaml @@ -0,0 +1,58 @@ +id: image-map-pro-3dfe4a41b3f6685dbbc11ea86f232a73 + +info: + name: > + Image Map Pro <= 5.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81330ff8-25a5-403d-abaf-e7c54467abbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-map-pro/" + google-query: inurl:"/wp-content/plugins/image-map-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-map-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-map-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-map-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-map-pro-bf2853efc06d31fecebbff0926f79cc8.yaml b/nuclei-templates/cve-less/plugins/image-map-pro-bf2853efc06d31fecebbff0926f79cc8.yaml new file mode 100644 index 0000000000..bf7dbf247e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-map-pro-bf2853efc06d31fecebbff0926f79cc8.yaml @@ -0,0 +1,58 @@ +id: image-map-pro-bf2853efc06d31fecebbff0926f79cc8 + +info: + name: > + Image Map Pro <= 5.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88d0d6b7-f33f-4c7b-9006-d54578fbe003?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-map-pro/" + google-query: inurl:"/wp-content/plugins/image-map-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-map-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-map-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-map-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-map-pro-lite-8ab353496a7495d9f3fe5d5531e368eb.yaml b/nuclei-templates/cve-less/plugins/image-map-pro-lite-8ab353496a7495d9f3fe5d5531e368eb.yaml new file mode 100644 index 0000000000..b417487255 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-map-pro-lite-8ab353496a7495d9f3fe5d5531e368eb.yaml @@ -0,0 +1,58 @@ +id: image-map-pro-lite-8ab353496a7495d9f3fe5d5531e368eb + +info: + name: > + Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite <= 1.0.0 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b58403df-af09-4d74-88e6-140e3f2f291b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-map-pro-lite/" + google-query: inurl:"/wp-content/plugins/image-map-pro-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-map-pro-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-map-pro-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-map-pro-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-map-pro-lite-b94ff74e27b8bd0a63b0e4542b5543c1.yaml b/nuclei-templates/cve-less/plugins/image-map-pro-lite-b94ff74e27b8bd0a63b0e4542b5543c1.yaml new file mode 100644 index 0000000000..12aca4a100 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-map-pro-lite-b94ff74e27b8bd0a63b0e4542b5543c1.yaml @@ -0,0 +1,58 @@ +id: image-map-pro-lite-b94ff74e27b8bd0a63b0e4542b5543c1 + +info: + name: > + Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite <= 1.0.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63e108f4-5d9d-4bcf-aef9-aa856f4241ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-map-pro-lite/" + google-query: inurl:"/wp-content/plugins/image-map-pro-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-map-pro-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-map-pro-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-map-pro-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-metadata-cruncher-8c4def1f9e55d275755365eabd5c5c64.yaml b/nuclei-templates/cve-less/plugins/image-metadata-cruncher-8c4def1f9e55d275755365eabd5c5c64.yaml new file mode 100644 index 0000000000..4ec8b731b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-metadata-cruncher-8c4def1f9e55d275755365eabd5c5c64.yaml @@ -0,0 +1,58 @@ +id: image-metadata-cruncher-8c4def1f9e55d275755365eabd5c5c64 + +info: + name: > + Image Metadata Cruncher < 1.8 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cfbee75-13ef-49ad-9edd-f3077a033c1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-metadata-cruncher/" + google-query: inurl:"/wp-content/plugins/image-metadata-cruncher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-metadata-cruncher,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-metadata-cruncher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-metadata-cruncher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-optimizer-wd-0bbe2e9ad1b1c0a623ea6abfedb5595e.yaml b/nuclei-templates/cve-less/plugins/image-optimizer-wd-0bbe2e9ad1b1c0a623ea6abfedb5595e.yaml new file mode 100644 index 0000000000..97ed80c342 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-optimizer-wd-0bbe2e9ad1b1c0a623ea6abfedb5595e.yaml @@ -0,0 +1,58 @@ +id: image-optimizer-wd-0bbe2e9ad1b1c0a623ea6abfedb5595e + +info: + name: > + Image Optimizer WD <= 1.0.26 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5eea72d-f10b-460b-be00-bb5b1c4a1a62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-optimizer-wd/" + google-query: inurl:"/wp-content/plugins/image-optimizer-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-optimizer-wd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-optimizer-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-optimizer-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-optimizer-wd-49d7a3ff674ce6988ed92cbb4810948c.yaml b/nuclei-templates/cve-less/plugins/image-optimizer-wd-49d7a3ff674ce6988ed92cbb4810948c.yaml new file mode 100644 index 0000000000..106692e47f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-optimizer-wd-49d7a3ff674ce6988ed92cbb4810948c.yaml @@ -0,0 +1,58 @@ +id: image-optimizer-wd-49d7a3ff674ce6988ed92cbb4810948c + +info: + name: > + Image Optimizer WD <= 1.0.26 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d50d8d51-3bb4-4556-95e3-06812a31d0d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-optimizer-wd/" + google-query: inurl:"/wp-content/plugins/image-optimizer-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-optimizer-wd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-optimizer-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-optimizer-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-optimizer-wd-5ec0f151883e50cc1d6e5241267d511f.yaml b/nuclei-templates/cve-less/plugins/image-optimizer-wd-5ec0f151883e50cc1d6e5241267d511f.yaml new file mode 100644 index 0000000000..c4394b8cc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-optimizer-wd-5ec0f151883e50cc1d6e5241267d511f.yaml @@ -0,0 +1,58 @@ +id: image-optimizer-wd-5ec0f151883e50cc1d6e5241267d511f + +info: + name: > + Image Optimizer by 10web <= 1.0.25 - Directory Traversal to Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b4a0dff-1054-4f50-8ff5-e3cc2b45d77b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-optimizer-wd/" + google-query: inurl:"/wp-content/plugins/image-optimizer-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-optimizer-wd,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-optimizer-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-optimizer-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-optimizer-wd-d21df22e38f007a905fafc644bb07ec2.yaml b/nuclei-templates/cve-less/plugins/image-optimizer-wd-d21df22e38f007a905fafc644bb07ec2.yaml new file mode 100644 index 0000000000..51818736ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-optimizer-wd-d21df22e38f007a905fafc644bb07ec2.yaml @@ -0,0 +1,58 @@ +id: image-optimizer-wd-d21df22e38f007a905fafc644bb07ec2 + +info: + name: > + Image Optimizer by 10web <= 1.0.26 - Authenticated(Administator+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f58a5eb-53cb-4a25-b693-bcd2b7a1cd00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-optimizer-wd/" + google-query: inurl:"/wp-content/plugins/image-optimizer-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-optimizer-wd,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-optimizer-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-optimizer-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-over-image-vc-extension-fddf50b89fd6e037cc6266b73dceb03a.yaml b/nuclei-templates/cve-less/plugins/image-over-image-vc-extension-fddf50b89fd6e037cc6266b73dceb03a.yaml new file mode 100644 index 0000000000..fd4fc539ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-over-image-vc-extension-fddf50b89fd6e037cc6266b73dceb03a.yaml @@ -0,0 +1,58 @@ +id: image-over-image-vc-extension-fddf50b89fd6e037cc6266b73dceb03a + +info: + name: > + Image Over Image For WPBakery Page Builder <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7c3ffe-079e-4db4-9dc4-3405527c0a99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-over-image-vc-extension/" + google-query: inurl:"/wp-content/plugins/image-over-image-vc-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-over-image-vc-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-over-image-vc-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-over-image-vc-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-protector-9fd302216733e7b16fde39fa0da8b2af.yaml b/nuclei-templates/cve-less/plugins/image-protector-9fd302216733e7b16fde39fa0da8b2af.yaml new file mode 100644 index 0000000000..b06de8aa1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-protector-9fd302216733e7b16fde39fa0da8b2af.yaml @@ -0,0 +1,58 @@ +id: image-protector-9fd302216733e7b16fde39fa0da8b2af + +info: + name: > + Image Protector <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8a2a23c-23bf-4f23-8b9d-1d6fe869d705?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-protector/" + google-query: inurl:"/wp-content/plugins/image-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-165f51757c849b44f8513611b7cd23ef.yaml b/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-165f51757c849b44f8513611b7cd23ef.yaml new file mode 100644 index 0000000000..2172ebd82c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-165f51757c849b44f8513611b7cd23ef.yaml @@ -0,0 +1,58 @@ +id: image-regenerate-select-crop-165f51757c849b44f8513611b7cd23ef + +info: + name: > + Image Regenerate & Select Crop <= 7.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb7335c0-b6ed-43bb-91b7-870093d14cb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-regenerate-select-crop/" + google-query: inurl:"/wp-content/plugins/image-regenerate-select-crop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-regenerate-select-crop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-regenerate-select-crop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-regenerate-select-crop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-20671ddf0d01a43586266ad4cb142fcf.yaml b/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-20671ddf0d01a43586266ad4cb142fcf.yaml new file mode 100644 index 0000000000..1bfb4fb4b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-20671ddf0d01a43586266ad4cb142fcf.yaml @@ -0,0 +1,58 @@ +id: image-regenerate-select-crop-20671ddf0d01a43586266ad4cb142fcf + +info: + name: > + Image Regenerate & Select Crop <= 7.1.0 - Missing Authorization on multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0eb165f-c979-4318-8362-ca47500ed845?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-regenerate-select-crop/" + google-query: inurl:"/wp-content/plugins/image-regenerate-select-crop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-regenerate-select-crop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-regenerate-select-crop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-regenerate-select-crop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-2ad93b712d25e80c970a93c8b1dd3cdf.yaml b/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-2ad93b712d25e80c970a93c8b1dd3cdf.yaml new file mode 100644 index 0000000000..77d4830568 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-2ad93b712d25e80c970a93c8b1dd3cdf.yaml @@ -0,0 +1,58 @@ +id: image-regenerate-select-crop-2ad93b712d25e80c970a93c8b1dd3cdf + +info: + name: > + Image Regenerate & Select Crop <= 7.3.0 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/307bfd18-840a-4cb4-86e6-33dc28e5514e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-regenerate-select-crop/" + google-query: inurl:"/wp-content/plugins/image-regenerate-select-crop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-regenerate-select-crop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-regenerate-select-crop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-regenerate-select-crop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-ad4cd5dc655c951abc6de30e0bcc2c3b.yaml b/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-ad4cd5dc655c951abc6de30e0bcc2c3b.yaml new file mode 100644 index 0000000000..addf3c9a99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-regenerate-select-crop-ad4cd5dc655c951abc6de30e0bcc2c3b.yaml @@ -0,0 +1,58 @@ +id: image-regenerate-select-crop-ad4cd5dc655c951abc6de30e0bcc2c3b + +info: + name: > + Image Regenerate & Select Crop <= 7.1.0 - Cross-Site Request Forgery on multiple AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8596412-53d5-45ed-998a-49799bd269d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-regenerate-select-crop/" + google-query: inurl:"/wp-content/plugins/image-regenerate-select-crop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-regenerate-select-crop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-regenerate-select-crop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-regenerate-select-crop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-slider-widget-45074c545eb15cccfd07e5326ca12779.yaml b/nuclei-templates/cve-less/plugins/image-slider-widget-45074c545eb15cccfd07e5326ca12779.yaml new file mode 100644 index 0000000000..25ce064a9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-slider-widget-45074c545eb15cccfd07e5326ca12779.yaml @@ -0,0 +1,58 @@ +id: image-slider-widget-45074c545eb15cccfd07e5326ca12779 + +info: + name: > + Image Slider <= 1.1.95 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/607c20b1-f8da-4f3f-a070-abdae64c8fc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-slider-widget/" + google-query: inurl:"/wp-content/plugins/image-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-slider-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-slider-widget-80d3ea73a73811fa5685b240e4282b5f.yaml b/nuclei-templates/cve-less/plugins/image-slider-widget-80d3ea73a73811fa5685b240e4282b5f.yaml new file mode 100644 index 0000000000..1172ca9270 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-slider-widget-80d3ea73a73811fa5685b240e4282b5f.yaml @@ -0,0 +1,58 @@ +id: image-slider-widget-80d3ea73a73811fa5685b240e4282b5f + +info: + name: > + Image Slider <= 1.1.121 - Cross-Site Request Forgery to Post Duplication + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6356e226-a449-4cd0-be60-2a1c9c70aa59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-slider-widget/" + google-query: inurl:"/wp-content/plugins/image-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-slider-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.121') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-slider-widget-a2adf408417d5a51a0a77f3bcfcdd29f.yaml b/nuclei-templates/cve-less/plugins/image-slider-widget-a2adf408417d5a51a0a77f3bcfcdd29f.yaml new file mode 100644 index 0000000000..324b0d4540 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-slider-widget-a2adf408417d5a51a0a77f3bcfcdd29f.yaml @@ -0,0 +1,58 @@ +id: image-slider-widget-a2adf408417d5a51a0a77f3bcfcdd29f + +info: + name: > + Image Slider < 1.1.90 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57837060-433f-471c-9413-6d9b95b69f2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-slider-widget/" + google-query: inurl:"/wp-content/plugins/image-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-slider-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.90') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-slider-widget-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/image-slider-widget-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..9ce48f7172 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-slider-widget-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: image-slider-widget-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-slider-widget/" + google-query: inurl:"/wp-content/plugins/image-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-slider-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-slider-widget-bd950fa0617ccb3a0edff5978b31a09b.yaml b/nuclei-templates/cve-less/plugins/image-slider-widget-bd950fa0617ccb3a0edff5978b31a09b.yaml new file mode 100644 index 0000000000..81610aec5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-slider-widget-bd950fa0617ccb3a0edff5978b31a09b.yaml @@ -0,0 +1,58 @@ +id: image-slider-widget-bd950fa0617ccb3a0edff5978b31a09b + +info: + name: > + Image Slider <= 1.1.125 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7826d47-8799-446f-af3c-df2724fb26ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-slider-widget/" + google-query: inurl:"/wp-content/plugins/image-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-slider-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.125') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-slider-widget-d5648214fbd82ebd55682a43fc8f813e.yaml b/nuclei-templates/cve-less/plugins/image-slider-widget-d5648214fbd82ebd55682a43fc8f813e.yaml new file mode 100644 index 0000000000..ce723afa6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-slider-widget-d5648214fbd82ebd55682a43fc8f813e.yaml @@ -0,0 +1,58 @@ +id: image-slider-widget-d5648214fbd82ebd55682a43fc8f813e + +info: + name: > + Image Slider <= 1.1.119 - Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/005234f9-8ae2-455a-8dcd-5d29a6051270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-slider-widget/" + google-query: inurl:"/wp-content/plugins/image-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-slider-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.119') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-source-control-isc-1928848d7760fbdf37a1f5a91bc90146.yaml b/nuclei-templates/cve-less/plugins/image-source-control-isc-1928848d7760fbdf37a1f5a91bc90146.yaml new file mode 100644 index 0000000000..7ca06ee81e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-source-control-isc-1928848d7760fbdf37a1f5a91bc90146.yaml @@ -0,0 +1,58 @@ +id: image-source-control-isc-1928848d7760fbdf37a1f5a91bc90146 + +info: + name: > + Image Source Control Lite < 2.3.1 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ab989ea-f498-4c74-b761-416d73059108?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-source-control-isc/" + google-query: inurl:"/wp-content/plugins/image-source-control-isc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-source-control-isc,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-source-control-isc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-source-control-isc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-source-control-isc-e8d6fd07d9a88fdd12cf1b98b1c2fb85.yaml b/nuclei-templates/cve-less/plugins/image-source-control-isc-e8d6fd07d9a88fdd12cf1b98b1c2fb85.yaml new file mode 100644 index 0000000000..8195e632f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-source-control-isc-e8d6fd07d9a88fdd12cf1b98b1c2fb85.yaml @@ -0,0 +1,58 @@ +id: image-source-control-isc-e8d6fd07d9a88fdd12cf1b98b1c2fb85 + +info: + name: > + Image Source Control <= 2.17.0 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3b3ce65-b226-4b93-ab0c-984f774454f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-source-control-isc/" + google-query: inurl:"/wp-content/plugins/image-source-control-isc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-source-control-isc,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-source-control-isc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-source-control-isc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-tag-manager-83aa8e470a136322f24cc4f5d88ccbdd.yaml b/nuclei-templates/cve-less/plugins/image-tag-manager-83aa8e470a136322f24cc4f5d88ccbdd.yaml new file mode 100644 index 0000000000..05f9fd8cc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-tag-manager-83aa8e470a136322f24cc4f5d88ccbdd.yaml @@ -0,0 +1,58 @@ +id: image-tag-manager-83aa8e470a136322f24cc4f5d88ccbdd + +info: + name: > + Image Tag Manager <= 1.5 - Reflected Cross-Site Scripting via default_class + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ded4b93f-fd90-4803-9d20-3109512b1a24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-tag-manager/" + google-query: inurl:"/wp-content/plugins/image-tag-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-tag-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-tag-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-tag-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-upload-for-bbpress-333e897c2dbf06223644ccfe5dd16694.yaml b/nuclei-templates/cve-less/plugins/image-upload-for-bbpress-333e897c2dbf06223644ccfe5dd16694.yaml new file mode 100644 index 0000000000..6a5b39fb86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-upload-for-bbpress-333e897c2dbf06223644ccfe5dd16694.yaml @@ -0,0 +1,58 @@ +id: image-upload-for-bbpress-333e897c2dbf06223644ccfe5dd16694 + +info: + name: > + Inline Image Upload for BBPress <= 1.1.18 - Cross-Site Request Forgery via hm_bbpui_admin_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86bd6ae1-e74d-4aab-98e1-3c47cb484fe9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-upload-for-bbpress/" + google-query: inurl:"/wp-content/plugins/image-upload-for-bbpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-upload-for-bbpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-upload-for-bbpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-upload-for-bbpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-vertical-reel-scroll-slideshow-7348256da9fa27f63ea541c99917352a.yaml b/nuclei-templates/cve-less/plugins/image-vertical-reel-scroll-slideshow-7348256da9fa27f63ea541c99917352a.yaml new file mode 100644 index 0000000000..246204c29e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-vertical-reel-scroll-slideshow-7348256da9fa27f63ea541c99917352a.yaml @@ -0,0 +1,58 @@ +id: image-vertical-reel-scroll-slideshow-7348256da9fa27f63ea541c99917352a + +info: + name: > + Image vertical reel scroll slideshow <= 9.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91b06d7d-7e92-49f0-b161-9b25318edfeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-vertical-reel-scroll-slideshow/" + google-query: inurl:"/wp-content/plugins/image-vertical-reel-scroll-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-vertical-reel-scroll-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-vertical-reel-scroll-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-vertical-reel-scroll-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-vertical-reel-scroll-slideshow-f917f02f001372c0ed6a2cbacd402eae.yaml b/nuclei-templates/cve-less/plugins/image-vertical-reel-scroll-slideshow-f917f02f001372c0ed6a2cbacd402eae.yaml new file mode 100644 index 0000000000..7bdd01bee9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-vertical-reel-scroll-slideshow-f917f02f001372c0ed6a2cbacd402eae.yaml @@ -0,0 +1,58 @@ +id: image-vertical-reel-scroll-slideshow-f917f02f001372c0ed6a2cbacd402eae + +info: + name: > + Image vertical reel scroll slideshow <= 9.0 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01d31d8a-4459-488a-9cbe-92761faa58b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-vertical-reel-scroll-slideshow/" + google-query: inurl:"/wp-content/plugins/image-vertical-reel-scroll-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-vertical-reel-scroll-slideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-vertical-reel-scroll-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-vertical-reel-scroll-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-watermark-cc02f6870e1e296858d0d36136b32112.yaml b/nuclei-templates/cve-less/plugins/image-watermark-cc02f6870e1e296858d0d36136b32112.yaml new file mode 100644 index 0000000000..59cea4f8f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-watermark-cc02f6870e1e296858d0d36136b32112.yaml @@ -0,0 +1,58 @@ +id: image-watermark-cc02f6870e1e296858d0d36136b32112 + +info: + name: > + Image Watermark <= 1.7.3 - Missing Authorization to Authenticated (Subscriber+) Watermark Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31a66e30-972b-4a7b-9d47-ad7abd574e36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-watermark/" + google-query: inurl:"/wp-content/plugins/image-watermark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-watermark,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-watermark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-watermark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-zoom-285b140dd354e7b55f93f22538da9394.yaml b/nuclei-templates/cve-less/plugins/image-zoom-285b140dd354e7b55f93f22538da9394.yaml new file mode 100644 index 0000000000..1e4f587682 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-zoom-285b140dd354e7b55f93f22538da9394.yaml @@ -0,0 +1,58 @@ +id: image-zoom-285b140dd354e7b55f93f22538da9394 + +info: + name: > + Image Zoom <= 1.8.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1009c839-849f-47ce-bfab-c297aacbc23c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-zoom/" + google-query: inurl:"/wp-content/plugins/image-zoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-zoom,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-zoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-zoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/image-zoom-5721436cde7e78cb58601bb592cde002.yaml b/nuclei-templates/cve-less/plugins/image-zoom-5721436cde7e78cb58601bb592cde002.yaml new file mode 100644 index 0000000000..af3292c512 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/image-zoom-5721436cde7e78cb58601bb592cde002.yaml @@ -0,0 +1,58 @@ +id: image-zoom-5721436cde7e78cb58601bb592cde002 + +info: + name: > + Image Zoom <= 1.8.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/537bdd21-7ebd-4c17-a681-18703ac973a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/image-zoom/" + google-query: inurl:"/wp-content/plugins/image-zoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,image-zoom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/image-zoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "image-zoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imageboss-680976f321c5a9425e00ce5d5ee1cc42.yaml b/nuclei-templates/cve-less/plugins/imageboss-680976f321c5a9425e00ce5d5ee1cc42.yaml new file mode 100644 index 0000000000..0ff675124e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imageboss-680976f321c5a9425e00ce5d5ee1cc42.yaml @@ -0,0 +1,58 @@ +id: imageboss-680976f321c5a9425e00ce5d5ee1cc42 + +info: + name: > + ImageBoss – Images Up To 60% Smaller & CDN < 3.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/993f6505-918c-45fd-8afa-4d567cc79e9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imageboss/" + google-query: inurl:"/wp-content/plugins/imageboss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imageboss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imageboss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imageboss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-8578e85d2088d742e36b835c4afa7ca7.yaml b/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-8578e85d2088d742e36b835c4afa7ca7.yaml new file mode 100644 index 0000000000..bfd02f401b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-8578e85d2088d742e36b835c4afa7ca7.yaml @@ -0,0 +1,58 @@ +id: imagelinks-interactive-image-builder-lite-8578e85d2088d742e36b835c4afa7ca7 + +info: + name: > + ImageLinks Interactive Image Builder <= 1.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/112564b7-bf3c-4c17-8113-e05ab75edf6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagelinks-interactive-image-builder-lite/" + google-query: inurl:"/wp-content/plugins/imagelinks-interactive-image-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagelinks-interactive-image-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagelinks-interactive-image-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagelinks-interactive-image-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-d16be1a4a8c6ae781f11c50d01685d10.yaml b/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-d16be1a4a8c6ae781f11c50d01685d10.yaml new file mode 100644 index 0000000000..ffc8688c9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-d16be1a4a8c6ae781f11c50d01685d10.yaml @@ -0,0 +1,58 @@ +id: imagelinks-interactive-image-builder-lite-d16be1a4a8c6ae781f11c50d01685d10 + +info: + name: > + ImageLinks <= 1.5.4 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f678700-f266-4740-a98d-19f8e9734563?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagelinks-interactive-image-builder-lite/" + google-query: inurl:"/wp-content/plugins/imagelinks-interactive-image-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagelinks-interactive-image-builder-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagelinks-interactive-image-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagelinks-interactive-image-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-e18789f54f5a5fe13b8ddacd79d408fc.yaml b/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-e18789f54f5a5fe13b8ddacd79d408fc.yaml new file mode 100644 index 0000000000..d9604dd8c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagelinks-interactive-image-builder-lite-e18789f54f5a5fe13b8ddacd79d408fc.yaml @@ -0,0 +1,58 @@ +id: imagelinks-interactive-image-builder-lite-e18789f54f5a5fe13b8ddacd79d408fc + +info: + name: > + ImageLinks Interactive Image Builder for WordPress <= 1.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb75b6ba-feb7-4e18-91f6-7ca1e90ef039?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagelinks-interactive-image-builder-lite/" + google-query: inurl:"/wp-content/plugins/imagelinks-interactive-image-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagelinks-interactive-image-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagelinks-interactive-image-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagelinks-interactive-image-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagemagick-engine-ca0bad06790922b16f5da17ee6db4bb8.yaml b/nuclei-templates/cve-less/plugins/imagemagick-engine-ca0bad06790922b16f5da17ee6db4bb8.yaml new file mode 100644 index 0000000000..640bc5622e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagemagick-engine-ca0bad06790922b16f5da17ee6db4bb8.yaml @@ -0,0 +1,58 @@ +id: imagemagick-engine-ca0bad06790922b16f5da17ee6db4bb8 + +info: + name: > + ImageMagick Engine <= 1.7.5 - Cross-Site Request Forgery to PHAR Deserialization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a2ca2f0-1d4a-4614-86ba-a46e765f4a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagemagick-engine/" + google-query: inurl:"/wp-content/plugins/imagemagick-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagemagick-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagemagick-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagemagick-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagemagick-engine-ed507e8efb229061c654187b47c114b4.yaml b/nuclei-templates/cve-less/plugins/imagemagick-engine-ed507e8efb229061c654187b47c114b4.yaml new file mode 100644 index 0000000000..5f8f663f24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagemagick-engine-ed507e8efb229061c654187b47c114b4.yaml @@ -0,0 +1,58 @@ +id: imagemagick-engine-ed507e8efb229061c654187b47c114b4 + +info: + name: > + ImageMagick Engine <= 1.7.5 - Cross-Site Request Forgery to Remote Command Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1f17a83-1df0-44fe-bd86-243cff6ec91b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagemagick-engine/" + google-query: inurl:"/wp-content/plugins/imagemagick-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagemagick-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagemagick-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagemagick-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagemapper-575c49a9b04a14a2dd633583f5e6e2d9.yaml b/nuclei-templates/cve-less/plugins/imagemapper-575c49a9b04a14a2dd633583f5e6e2d9.yaml new file mode 100644 index 0000000000..d9296c1df8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagemapper-575c49a9b04a14a2dd633583f5e6e2d9.yaml @@ -0,0 +1,58 @@ +id: imagemapper-575c49a9b04a14a2dd633583f5e6e2d9 + +info: + name: > + ImageMapper <= 1.2.6 - Cross-Site Request Forgery to Plugin Settings Change via ajax + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a128018b-f19b-4b18-a53c-cf1310d3d0e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagemapper/" + google-query: inurl:"/wp-content/plugins/imagemapper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagemapper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagemapper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagemapper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagemapper-6bb3656a861d0a80040f9af45e87952f.yaml b/nuclei-templates/cve-less/plugins/imagemapper-6bb3656a861d0a80040f9af45e87952f.yaml new file mode 100644 index 0000000000..1a8525d130 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagemapper-6bb3656a861d0a80040f9af45e87952f.yaml @@ -0,0 +1,58 @@ +id: imagemapper-6bb3656a861d0a80040f9af45e87952f + +info: + name: > + ImageMapper <= 1.2.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Page/Post Deletion via imgmap_delete_area_ajax + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31dff395-c3ce-4ebe-8d38-5243fc4510d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagemapper/" + google-query: inurl:"/wp-content/plugins/imagemapper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagemapper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagemapper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagemapper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagemapper-a73f55993da6bf41bdb201284b107f4f.yaml b/nuclei-templates/cve-less/plugins/imagemapper-a73f55993da6bf41bdb201284b107f4f.yaml new file mode 100644 index 0000000000..b39d467c14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagemapper-a73f55993da6bf41bdb201284b107f4f.yaml @@ -0,0 +1,58 @@ +id: imagemapper-a73f55993da6bf41bdb201284b107f4f + +info: + name: > + ImageMapper <= 1.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6e687e9-6ffe-4457-8d57-3c03f657eb74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagemapper/" + google-query: inurl:"/wp-content/plugins/imagemapper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagemapper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagemapper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagemapper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagemapper-bceb80496300028196724d32dbd5c249.yaml b/nuclei-templates/cve-less/plugins/imagemapper-bceb80496300028196724d32dbd5c249.yaml new file mode 100644 index 0000000000..c64e555ce2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagemapper-bceb80496300028196724d32dbd5c249.yaml @@ -0,0 +1,58 @@ +id: imagemapper-bceb80496300028196724d32dbd5c249 + +info: + name: > + ImageMapper <= 1.2.6 - Cross-Site Request Forgery to Stored Cross-Site Scripting via imgmap_save_area_title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb67f02-87e8-4ca3-8a9d-6663a700ab5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagemapper/" + google-query: inurl:"/wp-content/plugins/imagemapper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagemapper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagemapper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagemapper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagements-7e5494a96dcef18320683cf7875e7118.yaml b/nuclei-templates/cve-less/plugins/imagements-7e5494a96dcef18320683cf7875e7118.yaml new file mode 100644 index 0000000000..de364b0a7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagements-7e5494a96dcef18320683cf7875e7118.yaml @@ -0,0 +1,58 @@ +id: imagements-7e5494a96dcef18320683cf7875e7118 + +info: + name: > + Imagements <= 1.2.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e47f6c33-1a4b-4c4c-8323-99d06ce0731a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagements/" + google-query: inurl:"/wp-content/plugins/imagements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagements,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-0d90a3576c3d60d102b21bdca9c7c04e.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-0d90a3576c3d60d102b21bdca9c7c04e.yaml new file mode 100644 index 0000000000..6bb19476cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-0d90a3576c3d60d102b21bdca9c7c04e.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-0d90a3576c3d60d102b21bdca9c7c04e + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Settings Update in disableOptimization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3900e4f-4ae4-4026-89df-b63bd869a763?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-0f06a0233bd37a56c0b489be748f0408.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-0f06a0233bd37a56c0b489be748f0408.yaml new file mode 100644 index 0000000000..73a09d76e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-0f06a0233bd37a56c0b489be748f0408.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-0f06a0233bd37a56c0b489be748f0408 + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Settings Update in stopOptimizeAll + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3fae909-5564-4e0a-9114-edd0e45865e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-326d3f5baee82478e64ca11a4a66dbf4.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-326d3f5baee82478e64ca11a4a66dbf4.yaml new file mode 100644 index 0000000000..7bdd789da6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-326d3f5baee82478e64ca11a4a66dbf4.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-326d3f5baee82478e64ca11a4a66dbf4 + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Settings Update in enableOptimization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/175dd04d-ce06-45a0-8cfe-14498e2f9198?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-3949ffb8c4e3dc9661a06b8913f55d38.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-3949ffb8c4e3dc9661a06b8913f55d38.yaml new file mode 100644 index 0000000000..6fd7e88b28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-3949ffb8c4e3dc9661a06b8913f55d38.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-3949ffb8c4e3dc9661a06b8913f55d38 + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Settings Update in enableOptimization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0318ec4a-185a-405d-90f8-008ba373114b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-433406de2bcd419520bb9dde58f80311.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-433406de2bcd419520bb9dde58f80311.yaml new file mode 100644 index 0000000000..60d7b7f79d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-433406de2bcd419520bb9dde58f80311.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-433406de2bcd419520bb9dde58f80311 + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Plugin Data Removal in reinitialize + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cb8b08c-a028-48bd-acad-c00313fe06b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4b301fc4cf7dbfb7aaec9b6db232442c.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4b301fc4cf7dbfb7aaec9b6db232442c.yaml new file mode 100644 index 0000000000..5884f1dd41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4b301fc4cf7dbfb7aaec9b6db232442c.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-4b301fc4cf7dbfb7aaec9b6db232442c + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Plugin Data Removal in reinitialize + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4d89ea84ae0150939c78e1551488e87a.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4d89ea84ae0150939c78e1551488e87a.yaml new file mode 100644 index 0000000000..d1cc81cd59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4d89ea84ae0150939c78e1551488e87a.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-4d89ea84ae0150939c78e1551488e87a + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Settings Update in disableOptimization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc9dd55d-3c37-4f24-81a1-fdc8ca284566?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4f4ea79c6be4308e1d54d5b19b226c52.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4f4ea79c6be4308e1d54d5b19b226c52.yaml new file mode 100644 index 0000000000..cca19131f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-4f4ea79c6be4308e1d54d5b19b226c52.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-4f4ea79c6be4308e1d54d5b19b226c52 + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Missing Authorization to Settings Update in optimizeAllOn + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ff16906-2516-4b3c-8217-e3fb24924e27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-5712ab48057831452538f91f04d0bcb6.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-5712ab48057831452538f91f04d0bcb6.yaml new file mode 100644 index 0000000000..adc17342fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-5712ab48057831452538f91f04d0bcb6.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-5712ab48057831452538f91f04d0bcb6 + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Settings Update in optimizeAllOn + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca4cf299-9dee-4ebf-83f3-4c3471bd9fb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-57c14e4f565c7eb453e5b4a3b6f91099.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-57c14e4f565c7eb453e5b4a3b6f91099.yaml new file mode 100644 index 0000000000..dce0468783 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-57c14e4f565c7eb453e5b4a3b6f91099.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-57c14e4f565c7eb453e5b4a3b6f91099 + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3253e1b3-ac63-4796-ac10-92781d5a76c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-76976bd8ff1b9e40c5faf1dc6a34729f.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-76976bd8ff1b9e40c5faf1dc6a34729f.yaml new file mode 100644 index 0000000000..66efec3c7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-76976bd8ff1b9e40c5faf1dc6a34729f.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-76976bd8ff1b9e40c5faf1dc6a34729f + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5eeae0eb-bc24-4a34-b393-e84831edaba6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-b842b7a1d1bc34dc06d2b83ecd274275.yaml b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-b842b7a1d1bc34dc06d2b83ecd274275.yaml new file mode 100644 index 0000000000..a26fff86d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imagerecycle-pdf-image-compression-b842b7a1d1bc34dc06d2b83ecd274275.yaml @@ -0,0 +1,58 @@ +id: imagerecycle-pdf-image-compression-b842b7a1d1bc34dc06d2b83ecd274275 + +info: + name: > + ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Settings Update in stopOptimizeAll + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e3dd131-dbd8-431c-96f4-4ab2c3be4dbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imagerecycle-pdf-image-compression/" + google-query: inurl:"/wp-content/plugins/imagerecycle-pdf-image-compression/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imagerecycle-pdf-image-compression,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imagerecycle-pdf-image-compression/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imagerecycle-pdf-image-compression" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/images-asynchronous-load-8646bfab3489f82817e5dfdc71de0090.yaml b/nuclei-templates/cve-less/plugins/images-asynchronous-load-8646bfab3489f82817e5dfdc71de0090.yaml new file mode 100644 index 0000000000..268ce7d05f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/images-asynchronous-load-8646bfab3489f82817e5dfdc71de0090.yaml @@ -0,0 +1,58 @@ +id: images-asynchronous-load-8646bfab3489f82817e5dfdc71de0090 + +info: + name: > + Images Asynchronous Load <= 1.05 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e1425e6-799b-48fb-b04c-36b906297150?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/images-asynchronous-load/" + google-query: inurl:"/wp-content/plugins/images-asynchronous-load/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,images-asynchronous-load,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/images-asynchronous-load/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "images-asynchronous-load" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/images-lazyload-and-slideshow-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/images-lazyload-and-slideshow-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..e55bb54af1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/images-lazyload-and-slideshow-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: images-lazyload-and-slideshow-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/images-lazyload-and-slideshow/" + google-query: inurl:"/wp-content/plugins/images-lazyload-and-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,images-lazyload-and-slideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/images-lazyload-and-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "images-lazyload-and-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/images-optimize-and-upload-cf7-67cbbeb086472c18cc998dc3852acd0d.yaml b/nuclei-templates/cve-less/plugins/images-optimize-and-upload-cf7-67cbbeb086472c18cc998dc3852acd0d.yaml new file mode 100644 index 0000000000..6636cdc97a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/images-optimize-and-upload-cf7-67cbbeb086472c18cc998dc3852acd0d.yaml @@ -0,0 +1,58 @@ +id: images-optimize-and-upload-cf7-67cbbeb086472c18cc998dc3852acd0d + +info: + name: > + Images Optimize and Upload CF7 <= 2.1.4 - Missing Authorization to Arbitrary File Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8fb20fb-a795-4ab0-9614-6ae6ac4f2eda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/images-optimize-and-upload-cf7/" + google-query: inurl:"/wp-content/plugins/images-optimize-and-upload-cf7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,images-optimize-and-upload-cf7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/images-optimize-and-upload-cf7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "images-optimize-and-upload-cf7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/images-to-webp-a060d1379e872ddbb3c1744a92296936.yaml b/nuclei-templates/cve-less/plugins/images-to-webp-a060d1379e872ddbb3c1744a92296936.yaml new file mode 100644 index 0000000000..bc0099997b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/images-to-webp-a060d1379e872ddbb3c1744a92296936.yaml @@ -0,0 +1,58 @@ +id: images-to-webp-a060d1379e872ddbb3c1744a92296936 + +info: + name: > + Images to WebP <= 1.8 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63ae3a9d-1e6b-4784-8429-04be2a89b6cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/images-to-webp/" + google-query: inurl:"/wp-content/plugins/images-to-webp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,images-to-webp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/images-to-webp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "images-to-webp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/images-to-webp-fe4c9ec6c5f12eda6f85dea0f4ee153f.yaml b/nuclei-templates/cve-less/plugins/images-to-webp-fe4c9ec6c5f12eda6f85dea0f4ee153f.yaml new file mode 100644 index 0000000000..0e17fcbb9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/images-to-webp-fe4c9ec6c5f12eda6f85dea0f4ee153f.yaml @@ -0,0 +1,58 @@ +id: images-to-webp-fe4c9ec6c5f12eda6f85dea0f4ee153f + +info: + name: > + Images to WebP < 1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a26f4bb7-fe61-4343-82ee-19639c16d978?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/images-to-webp/" + google-query: inurl:"/wp-content/plugins/images-to-webp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,images-to-webp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/images-to-webp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "images-to-webp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imageseo-113db7aead34e6d2e16bace92792af9b.yaml b/nuclei-templates/cve-less/plugins/imageseo-113db7aead34e6d2e16bace92792af9b.yaml new file mode 100644 index 0000000000..5d590e4596 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imageseo-113db7aead34e6d2e16bace92792af9b.yaml @@ -0,0 +1,58 @@ +id: imageseo-113db7aead34e6d2e16bace92792af9b + +info: + name: > + Optimize images ALT Text <= 2.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b09338c-a28f-4950-b0c1-98ab85e58c0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imageseo/" + google-query: inurl:"/wp-content/plugins/imageseo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imageseo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imageseo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imageseo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imdb-info-box-d08f135748c79437965679674f4da9c2.yaml b/nuclei-templates/cve-less/plugins/imdb-info-box-d08f135748c79437965679674f4da9c2.yaml new file mode 100644 index 0000000000..743988f4d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imdb-info-box-d08f135748c79437965679674f4da9c2.yaml @@ -0,0 +1,58 @@ +id: imdb-info-box-d08f135748c79437965679674f4da9c2 + +info: + name: > + IMDB Info Box <= 2.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/849e8ac6-73a8-4236-8c01-b341a2de3775?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imdb-info-box/" + google-query: inurl:"/wp-content/plugins/imdb-info-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imdb-info-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imdb-info-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imdb-info-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imdb-widget-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml b/nuclei-templates/cve-less/plugins/imdb-widget-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml new file mode 100644 index 0000000000..72401460ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imdb-widget-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml @@ -0,0 +1,58 @@ +id: imdb-widget-348a1a0272fab4e16c4ec4e28b1cc2f1 + +info: + name: > + IMDB Profile Widget < 1.0.9 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bfa2246-41a8-4d06-8dc9-57fc4be8e1c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imdb-widget/" + google-query: inurl:"/wp-content/plugins/imdb-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imdb-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imdb-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imdb-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imember360-0cbcc4f1288df0ee24dd7a2993f69c51.yaml b/nuclei-templates/cve-less/plugins/imember360-0cbcc4f1288df0ee24dd7a2993f69c51.yaml new file mode 100644 index 0000000000..089327a174 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imember360-0cbcc4f1288df0ee24dd7a2993f69c51.yaml @@ -0,0 +1,58 @@ +id: imember360-0cbcc4f1288df0ee24dd7a2993f69c51 + +info: + name: > + iMember360 3.8.012 - 3.9.001 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/509097ae-5b20-4e91-9d82-cc6e3b64e518?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imember360/" + google-query: inurl:"/wp-content/plugins/imember360/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imember360,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imember360/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imember360" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.8.012', '<= 3.9.001') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imember360-4e3f3475e7c6375ac0400d146d374b8e.yaml b/nuclei-templates/cve-less/plugins/imember360-4e3f3475e7c6375ac0400d146d374b8e.yaml new file mode 100644 index 0000000000..87ed06782a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imember360-4e3f3475e7c6375ac0400d146d374b8e.yaml @@ -0,0 +1,58 @@ +id: imember360-4e3f3475e7c6375ac0400d146d374b8e + +info: + name: > + iMember360 < 3.9.001 - Missing Authorization and Sensitive Data Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffffedb4-633a-4490-98f1-9bc827c8ba1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imember360/" + google-query: inurl:"/wp-content/plugins/imember360/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imember360,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imember360/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imember360" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.001') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imember360-55d8a21450cbea874f3ebd26e7f32a58.yaml b/nuclei-templates/cve-less/plugins/imember360-55d8a21450cbea874f3ebd26e7f32a58.yaml new file mode 100644 index 0000000000..ae4cdc81be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imember360-55d8a21450cbea874f3ebd26e7f32a58.yaml @@ -0,0 +1,58 @@ +id: imember360-55d8a21450cbea874f3ebd26e7f32a58 + +info: + name: > + iMember360 3.8.012 - 3.9.001 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5263fa58-18d2-49a2-bc5b-3d3fd3cd1377?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imember360/" + google-query: inurl:"/wp-content/plugins/imember360/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imember360,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imember360/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imember360" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.8.012', '<= 3.9.001') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imember360-897a0fa8ed3a14f37db420497ce08cb5.yaml b/nuclei-templates/cve-less/plugins/imember360-897a0fa8ed3a14f37db420497ce08cb5.yaml new file mode 100644 index 0000000000..57d1cc16ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imember360-897a0fa8ed3a14f37db420497ce08cb5.yaml @@ -0,0 +1,58 @@ +id: imember360-897a0fa8ed3a14f37db420497ce08cb5 + +info: + name: > + iMember360is 3.8.012 - 3.9.001 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87870d48-05ff-4f51-9ad9-091ce2ffaf01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imember360/" + google-query: inurl:"/wp-content/plugins/imember360/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imember360,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imember360/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imember360" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.8.012', '<= 3.9.002') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/imember360-c40ba36e2109a35c573b2639a4d72291.yaml b/nuclei-templates/cve-less/plugins/imember360-c40ba36e2109a35c573b2639a4d72291.yaml new file mode 100644 index 0000000000..2cddbef6a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/imember360-c40ba36e2109a35c573b2639a4d72291.yaml @@ -0,0 +1,58 @@ +id: imember360-c40ba36e2109a35c573b2639a4d72291 + +info: + name: > + iMember360 3.8.0.12 - 3.9.001 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1621cd2-78d3-4429-862a-b425f5436f38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/imember360/" + google-query: inurl:"/wp-content/plugins/imember360/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,imember360,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/imember360/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imember360" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.8.012', '<= 3.9.001') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/immopress-f50fe166ad655bc28860751aec7160b0.yaml b/nuclei-templates/cve-less/plugins/immopress-f50fe166ad655bc28860751aec7160b0.yaml new file mode 100644 index 0000000000..1677ae0dea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/immopress-f50fe166ad655bc28860751aec7160b0.yaml @@ -0,0 +1,58 @@ +id: immopress-f50fe166ad655bc28860751aec7160b0 + +info: + name: > + ImmoPress <= 0.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7b6b59a-366f-4fa6-9e54-01372d6cea8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/immopress/" + google-query: inurl:"/wp-content/plugins/immopress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,immopress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/immopress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "immopress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-csv-files-8a6b4336bdabbe2b23943219bba651ed.yaml b/nuclei-templates/cve-less/plugins/import-csv-files-8a6b4336bdabbe2b23943219bba651ed.yaml new file mode 100644 index 0000000000..503a44c9ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-csv-files-8a6b4336bdabbe2b23943219bba651ed.yaml @@ -0,0 +1,58 @@ +id: import-csv-files-8a6b4336bdabbe2b23943219bba651ed + +info: + name: > + Import CSV Files <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dbaf893-e117-448f-a1b3-9c4b4caea7e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-csv-files/" + google-query: inurl:"/wp-content/plugins/import-csv-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-csv-files,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-csv-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-csv-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-external-images-3a14f8327aeabf7bf95eb7d9e4c0bcff.yaml b/nuclei-templates/cve-less/plugins/import-external-images-3a14f8327aeabf7bf95eb7d9e4c0bcff.yaml new file mode 100644 index 0000000000..93de7eca6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-external-images-3a14f8327aeabf7bf95eb7d9e4c0bcff.yaml @@ -0,0 +1,58 @@ +id: import-external-images-3a14f8327aeabf7bf95eb7d9e4c0bcff + +info: + name: > + Import External Images <= 1.4 - Cross-Site Request Forgery via external_image_import_all_ajax + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6785be1c-85d4-48f1-be15-275c71284b3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-external-images/" + google-query: inurl:"/wp-content/plugins/import-external-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-external-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-external-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-external-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-legacy-media-65f707df02fc4e71880af94936e28fe7.yaml b/nuclei-templates/cve-less/plugins/import-legacy-media-65f707df02fc4e71880af94936e28fe7.yaml new file mode 100644 index 0000000000..a144702ed4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-legacy-media-65f707df02fc4e71880af94936e28fe7.yaml @@ -0,0 +1,58 @@ +id: import-legacy-media-65f707df02fc4e71880af94936e28fe7 + +info: + name: > + Import Legacy Media <= 0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa4f169a-8970-499d-ad25-028c0d1c9d56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-legacy-media/" + google-query: inurl:"/wp-content/plugins/import-legacy-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-legacy-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-legacy-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-legacy-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-shopify-to-woocommerce-829eb8aa5088a8dfbd751ae2143f350b.yaml b/nuclei-templates/cve-less/plugins/import-shopify-to-woocommerce-829eb8aa5088a8dfbd751ae2143f350b.yaml new file mode 100644 index 0000000000..a856629959 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-shopify-to-woocommerce-829eb8aa5088a8dfbd751ae2143f350b.yaml @@ -0,0 +1,58 @@ +id: import-shopify-to-woocommerce-829eb8aa5088a8dfbd751ae2143f350b + +info: + name: > + S2W – Import Shopify to WooCommerce <= 1.1.12 - Authenticated (Admin+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bd92b9d-b4b7-4106-bee4-d12b0479d0c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-shopify-to-woocommerce/" + google-query: inurl:"/wp-content/plugins/import-shopify-to-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-shopify-to-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-shopify-to-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-shopify-to-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-social-statistics-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/import-social-statistics-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..7169d4ff07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-social-statistics-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: import-social-statistics-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-social-statistics/" + google-query: inurl:"/wp-content/plugins/import-social-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-social-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-social-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-social-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-spreadsheets-from-microsoft-excel-a4a103535f33f8f1f9687c4a0228f8b0.yaml b/nuclei-templates/cve-less/plugins/import-spreadsheets-from-microsoft-excel-a4a103535f33f8f1f9687c4a0228f8b0.yaml new file mode 100644 index 0000000000..8e177559eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-spreadsheets-from-microsoft-excel-a4a103535f33f8f1f9687c4a0228f8b0.yaml @@ -0,0 +1,58 @@ +id: import-spreadsheets-from-microsoft-excel-a4a103535f33f8f1f9687c4a0228f8b0 + +info: + name: > + Import Spreadsheets from Microsoft Excel <= 10.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d337e39c-3a3d-4465-bc40-77f0b27aeab2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-spreadsheets-from-microsoft-excel/" + google-query: inurl:"/wp-content/plugins/import-spreadsheets-from-microsoft-excel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-spreadsheets-from-microsoft-excel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-spreadsheets-from-microsoft-excel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-spreadsheets-from-microsoft-excel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-da2b51f042521776402cd06473b8ac45.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-da2b51f042521776402cd06473b8ac45.yaml new file mode 100644 index 0000000000..2e6b0e3f23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-da2b51f042521776402cd06473b8ac45.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-da2b51f042521776402cd06473b8ac45 + +info: + name: > + Import Users from CSV <= 1.2 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48421787-9dc1-48ea-892b-bb43b2a6c4da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-0c813c83aee456b071e95980f729e012.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-0c813c83aee456b071e95980f729e012.yaml new file mode 100644 index 0000000000..b7696e3f96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-0c813c83aee456b071e95980f729e012.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-0c813c83aee456b071e95980f729e012 + +info: + name: > + Import and export users and customers <= 1.24.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4731eb39-8c01-4a2b-80f7-15d8c13a19b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-107acb013e3444f157b376a5b20dd408.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-107acb013e3444f157b376a5b20dd408.yaml new file mode 100644 index 0000000000..fc404f21bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-107acb013e3444f157b376a5b20dd408.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-107acb013e3444f157b376a5b20dd408 + +info: + name: > + Import and export users and customers <= 1.14.2.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f3b74db-22a4-4638-8662-0c8cfbee6493?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-176aadf8b8de4d702eafe02975bc433d.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-176aadf8b8de4d702eafe02975bc433d.yaml new file mode 100644 index 0000000000..6aba7c721d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-176aadf8b8de4d702eafe02975bc433d.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-176aadf8b8de4d702eafe02975bc433d + +info: + name: > + Import and export users and customers <= 1.16.3.5 - CSV injection via a customer's profile + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1df6d436-c183-4ace-bd6c-1f22fbe7240f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-1edc06e4c422303e708e12aebbe44cde.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-1edc06e4c422303e708e12aebbe44cde.yaml new file mode 100644 index 0000000000..07a4aedb73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-1edc06e4c422303e708e12aebbe44cde.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-1edc06e4c422303e708e12aebbe44cde + +info: + name: > + Import and export users and customers <= 1.14.1.3 - Cross-Site Request Forgery leading to attachment deletion & Path Traversal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b81d7fc-6050-40bb-9416-e8d7d20e8ef8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-342fee676d86d87109d08378d8dcd0b0.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-342fee676d86d87109d08378d8dcd0b0.yaml new file mode 100644 index 0000000000..c1a6dd38be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-342fee676d86d87109d08378d8dcd0b0.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-342fee676d86d87109d08378d8dcd0b0 + +info: + name: > + Import and export users and customers <= 1.14.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78fef897-fcef-4238-9925-0ce610ee7686?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-5bda221acefc04e8d84a3c6e2be5c30e.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-5bda221acefc04e8d84a3c6e2be5c30e.yaml new file mode 100644 index 0000000000..09bb454e59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-5bda221acefc04e8d84a3c6e2be5c30e.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-5bda221acefc04e8d84a3c6e2be5c30e + +info: + name: > + Import and export users and customers <= 1.14.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8a41eb6-8fb2-4274-a50b-571e85ac87f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-67ac2a423d1da6f86cbac7c3e9485c2b.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-67ac2a423d1da6f86cbac7c3e9485c2b.yaml new file mode 100644 index 0000000000..0dda4b8e5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-67ac2a423d1da6f86cbac7c3e9485c2b.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-67ac2a423d1da6f86cbac7c3e9485c2b + +info: + name: > + Import and export users and customers <= 1.26.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2fbd599-0a6c-4182-87d9-ad7cf3fb5865?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-7ae4217671bcb5c8f6efe46ca1b8db85.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-7ae4217671bcb5c8f6efe46ca1b8db85.yaml new file mode 100644 index 0000000000..0addd61b00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-7ae4217671bcb5c8f6efe46ca1b8db85.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-7ae4217671bcb5c8f6efe46ca1b8db85 + +info: + name: > + Import and export users and customers <= 1.20.4 - Authenticated (Subscriber+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50ac32ed-f83c-4afc-aac2-a79c69497091?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-7e3d963887f74672e4d9f1a2c2d7ff76.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-7e3d963887f74672e4d9f1a2c2d7ff76.yaml new file mode 100644 index 0000000000..ab1ac7781a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-7e3d963887f74672e4d9f1a2c2d7ff76.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-7e3d963887f74672e4d9f1a2c2d7ff76 + +info: + name: > + Import and export users and customers <= 1.24.2 - Authenticated(Administrator+) Directory Traversal via Recurring Import Functionality + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac709779-36f1-4f66-8db3-95a514a5ea59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-916825c2b82546703e1e58fc1213738b.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-916825c2b82546703e1e58fc1213738b.yaml new file mode 100644 index 0000000000..551e3a67c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-916825c2b82546703e1e58fc1213738b.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-916825c2b82546703e1e58fc1213738b + +info: + name: > + Import and export users and customers <= 1.26.2 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f56494b7-0552-42d3-b3c6-fe26096f6cf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-99e4e1e27563f717d9f8c278b33423ac.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-99e4e1e27563f717d9f8c278b33423ac.yaml new file mode 100644 index 0000000000..dea35e3358 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-99e4e1e27563f717d9f8c278b33423ac.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-99e4e1e27563f717d9f8c278b33423ac + +info: + name: > + Import users from CSV with meta <= 1.12 - Import Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b423aca-e0d2-487d-a861-a2b589c2a62e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-aa502aa68695bf7b6ea2b96ba403c6a2.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-aa502aa68695bf7b6ea2b96ba403c6a2.yaml new file mode 100644 index 0000000000..e2cdc0329e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-aa502aa68695bf7b6ea2b96ba403c6a2.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-aa502aa68695bf7b6ea2b96ba403c6a2 + +info: + name: > + Import and export users and customers 1.15 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e46ff294-0be1-47c1-8c21-f6242c6f832a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-af8e3b1753f58bd7e46c4cccec8f000f.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-af8e3b1753f58bd7e46c4cccec8f000f.yaml new file mode 100644 index 0000000000..c67a4b1a25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-af8e3b1753f58bd7e46c4cccec8f000f.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-af8e3b1753f58bd7e46c4cccec8f000f + +info: + name: > + Import and export users and customers <= 1.14.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/617f3062-2848-4c23-89e4-17a0f0d44977?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-b7e40dcc40f790ccf1ceff5a8722305f.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-b7e40dcc40f790ccf1ceff5a8722305f.yaml new file mode 100644 index 0000000000..e5e80c44d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-b7e40dcc40f790ccf1ceff5a8722305f.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-b7e40dcc40f790ccf1ceff5a8722305f + +info: + name: > + Import and export users and customers <= 1.19.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27478d23-961d-4a88-adf5-c3cdd79cc10c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.19.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-bd9f222927714cfcc0530ce81d7d73ca.yaml b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-bd9f222927714cfcc0530ce81d7d73ca.yaml new file mode 100644 index 0000000000..ba292b4d4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-users-from-csv-with-meta-bd9f222927714cfcc0530ce81d7d73ca.yaml @@ -0,0 +1,58 @@ +id: import-users-from-csv-with-meta-bd9f222927714cfcc0530ce81d7d73ca + +info: + name: > + Import and export users and customers <= 1.24.6 - Missing Authorization via fire_cron REST endpoint + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/428feddb-c8c3-49a7-8e01-dc548c184229?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" + google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-users-from-csv-with-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-users-from-csv-with-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-woocommerce-3077bab58115e8abb5971ae28048d12c.yaml b/nuclei-templates/cve-less/plugins/import-woocommerce-3077bab58115e8abb5971ae28048d12c.yaml new file mode 100644 index 0000000000..16f13103db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-woocommerce-3077bab58115e8abb5971ae28048d12c.yaml @@ -0,0 +1,58 @@ +id: import-woocommerce-3077bab58115e8abb5971ae28048d12c + +info: + name: > + Import WooCommerce < 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64a7a4db-8b28-4085-91b0-4ea5343c5643?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-woocommerce/" + google-query: inurl:"/wp-content/plugins/import-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-xml-feed-467a5580ac1383352cd27bfadc2d264b.yaml b/nuclei-templates/cve-less/plugins/import-xml-feed-467a5580ac1383352cd27bfadc2d264b.yaml new file mode 100644 index 0000000000..bf30c23b07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-xml-feed-467a5580ac1383352cd27bfadc2d264b.yaml @@ -0,0 +1,58 @@ +id: import-xml-feed-467a5580ac1383352cd27bfadc2d264b + +info: + name: > + Import XML and RSS Feeds <= 2.1.5 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cecf1bcc-ed3e-430c-80d4-d940416eed9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-xml-feed/" + google-query: inurl:"/wp-content/plugins/import-xml-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-xml-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-xml-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-xml-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-xml-feed-907bd7e9131bb850756aeaa09ab79dfd.yaml b/nuclei-templates/cve-less/plugins/import-xml-feed-907bd7e9131bb850756aeaa09ab79dfd.yaml new file mode 100644 index 0000000000..b336f92852 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-xml-feed-907bd7e9131bb850756aeaa09ab79dfd.yaml @@ -0,0 +1,58 @@ +id: import-xml-feed-907bd7e9131bb850756aeaa09ab79dfd + +info: + name: > + Import XML and RSS Feeds <= 2.0.2 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eccc47cb-9078-405b-9b09-2e14e72ee005?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-xml-feed/" + google-query: inurl:"/wp-content/plugins/import-xml-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-xml-feed,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-xml-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-xml-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-xml-feed-9ab53108097247c27c02dfd755c3ffcf.yaml b/nuclei-templates/cve-less/plugins/import-xml-feed-9ab53108097247c27c02dfd755c3ffcf.yaml new file mode 100644 index 0000000000..77e6464e11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-xml-feed-9ab53108097247c27c02dfd755c3ffcf.yaml @@ -0,0 +1,58 @@ +id: import-xml-feed-9ab53108097247c27c02dfd755c3ffcf + +info: + name: > + Import XML and RSS Feeds <= 2.1.3 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f45b4c43-c6c4-41da-bd59-9a355800815a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-xml-feed/" + google-query: inurl:"/wp-content/plugins/import-xml-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-xml-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-xml-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-xml-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/import-xml-feed-fe6825f2b761786a96cd0f4fa3afa83c.yaml b/nuclei-templates/cve-less/plugins/import-xml-feed-fe6825f2b761786a96cd0f4fa3afa83c.yaml new file mode 100644 index 0000000000..a5e973755e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/import-xml-feed-fe6825f2b761786a96cd0f4fa3afa83c.yaml @@ -0,0 +1,58 @@ +id: import-xml-feed-fe6825f2b761786a96cd0f4fa3afa83c + +info: + name: > + Import XML and RSS Feeds <= 2.1.4 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0856920-5463-4dd3-a4fd-e56901a89b83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/import-xml-feed/" + google-query: inurl:"/wp-content/plugins/import-xml-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,import-xml-feed,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/import-xml-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "import-xml-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/importify-949bd129fe1adc15bb7653ff308658f2.yaml b/nuclei-templates/cve-less/plugins/importify-949bd129fe1adc15bb7653ff308658f2.yaml new file mode 100644 index 0000000000..c5e2293a9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/importify-949bd129fe1adc15bb7653ff308658f2.yaml @@ -0,0 +1,58 @@ +id: importify-949bd129fe1adc15bb7653ff308658f2 + +info: + name: > + Importify <= 1.0.4 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/830ff660-0265-46e5-8d16-ecd03cdf9f52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/importify/" + google-query: inurl:"/wp-content/plugins/importify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,importify,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/importify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "importify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/impreza-a94493070aaa329d2ae39d70dc712c09.yaml b/nuclei-templates/cve-less/plugins/impreza-a94493070aaa329d2ae39d70dc712c09.yaml new file mode 100644 index 0000000000..93e007627e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/impreza-a94493070aaa329d2ae39d70dc712c09.yaml @@ -0,0 +1,58 @@ +id: impreza-a94493070aaa329d2ae39d70dc712c09 + +info: + name: > + Impreza <= 8.17.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bd931a9-18ec-48fa-9382-d4c2d99258c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/impreza/" + google-query: inurl:"/wp-content/plugins/impreza/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,impreza,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/impreza/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "impreza" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.17.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/improved-include-page-300fd59e3797ac35e26fb3e33490ca99.yaml b/nuclei-templates/cve-less/plugins/improved-include-page-300fd59e3797ac35e26fb3e33490ca99.yaml new file mode 100644 index 0000000000..2c69814a50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/improved-include-page-300fd59e3797ac35e26fb3e33490ca99.yaml @@ -0,0 +1,58 @@ +id: improved-include-page-300fd59e3797ac35e26fb3e33490ca99 + +info: + name: > + Improved Include Page <= 1.2 - Authenticated (Contributor+) Arbitrary Posts/Pages Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ced4a635-f579-41fb-840c-3ba54dbe92c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/improved-include-page/" + google-query: inurl:"/wp-content/plugins/improved-include-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,improved-include-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/improved-include-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "improved-include-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/improved-sale-badges-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/improved-sale-badges-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..312491534d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/improved-sale-badges-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: improved-sale-badges-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/improved-sale-badges/" + google-query: inurl:"/wp-content/plugins/improved-sale-badges/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,improved-sale-badges,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/improved-sale-badges/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "improved-sale-badges" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/improved-user-search-in-backend-aa15ef609effcca1e90c81c1a7f1d631.yaml b/nuclei-templates/cve-less/plugins/improved-user-search-in-backend-aa15ef609effcca1e90c81c1a7f1d631.yaml new file mode 100644 index 0000000000..dd1f451959 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/improved-user-search-in-backend-aa15ef609effcca1e90c81c1a7f1d631.yaml @@ -0,0 +1,58 @@ +id: improved-user-search-in-backend-aa15ef609effcca1e90c81c1a7f1d631 + +info: + name: > + Improved User Search in Backend <= 1.2.5 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e8abe63-c11b-48e7-8867-3bc1ab940b1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/improved-user-search-in-backend/" + google-query: inurl:"/wp-content/plugins/improved-user-search-in-backend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,improved-user-search-in-backend,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/improved-user-search-in-backend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "improved-user-search-in-backend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/improved-variable-product-attributes-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/improved-variable-product-attributes-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..c083ec35e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/improved-variable-product-attributes-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: improved-variable-product-attributes-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/improved-variable-product-attributes/" + google-query: inurl:"/wp-content/plugins/improved-variable-product-attributes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,improved-variable-product-attributes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/improved-variable-product-attributes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "improved-variable-product-attributes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inactive-logout-54ce6a774cfd5321930ee4e4fafbd369.yaml b/nuclei-templates/cve-less/plugins/inactive-logout-54ce6a774cfd5321930ee4e4fafbd369.yaml new file mode 100644 index 0000000000..3ebb39d229 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inactive-logout-54ce6a774cfd5321930ee4e4fafbd369.yaml @@ -0,0 +1,58 @@ +id: inactive-logout-54ce6a774cfd5321930ee4e4fafbd369 + +info: + name: > + Inactive Logout <= 3.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9189eb3-be7f-42e1-92cc-b48af5615eb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inactive-logout/" + google-query: inurl:"/wp-content/plugins/inactive-logout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inactive-logout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inactive-logout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inactive-logout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inactive-logout-a7d769783ca2c437e9a1a4760da51769.yaml b/nuclei-templates/cve-less/plugins/inactive-logout-a7d769783ca2c437e9a1a4760da51769.yaml new file mode 100644 index 0000000000..629b1a68cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inactive-logout-a7d769783ca2c437e9a1a4760da51769.yaml @@ -0,0 +1,58 @@ +id: inactive-logout-a7d769783ca2c437e9a1a4760da51769 + +info: + name: > + Inactive Logout <= 3.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c583ef34-ddec-4d6c-9685-ef4bce5e785e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inactive-logout/" + google-query: inurl:"/wp-content/plugins/inactive-logout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inactive-logout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inactive-logout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inactive-logout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inactive-user-deleter-4b89abc62fd406d908566683e2dcbf5a.yaml b/nuclei-templates/cve-less/plugins/inactive-user-deleter-4b89abc62fd406d908566683e2dcbf5a.yaml new file mode 100644 index 0000000000..40ebc5c12c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inactive-user-deleter-4b89abc62fd406d908566683e2dcbf5a.yaml @@ -0,0 +1,58 @@ +id: inactive-user-deleter-4b89abc62fd406d908566683e2dcbf5a + +info: + name: > + Inactive User Deleter <= 1.59 - Cross-Site Request Forgery via Multiple Functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f3c706f-fcce-4bcb-9773-ced011bf6407?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inactive-user-deleter/" + google-query: inurl:"/wp-content/plugins/inactive-user-deleter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inactive-user-deleter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inactive-user-deleter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inactive-user-deleter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inazo-advanced-ads-management-824d93c3c9858047a50ed1387d69356d.yaml b/nuclei-templates/cve-less/plugins/inazo-advanced-ads-management-824d93c3c9858047a50ed1387d69356d.yaml new file mode 100644 index 0000000000..286e65f107 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inazo-advanced-ads-management-824d93c3c9858047a50ed1387d69356d.yaml @@ -0,0 +1,58 @@ +id: inazo-advanced-ads-management-824d93c3c9858047a50ed1387d69356d + +info: + name: > + Inazo Advanced Ads Management < 1.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bccc409-e16f-4c32-ad3b-743defd7200f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inazo-advanced-ads-management/" + google-query: inurl:"/wp-content/plugins/inazo-advanced-ads-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inazo-advanced-ads-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inazo-advanced-ads-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inazo-advanced-ads-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inbound-brew-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/inbound-brew-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c8d008d8d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inbound-brew-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: inbound-brew-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inbound-brew/" + google-query: inurl:"/wp-content/plugins/inbound-brew/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inbound-brew,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inbound-brew/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inbound-brew" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inbound-brew-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/inbound-brew-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..704bf88824 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inbound-brew-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: inbound-brew-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inbound-brew/" + google-query: inurl:"/wp-content/plugins/inbound-brew/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inbound-brew,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inbound-brew/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inbound-brew" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inboundio-marketing-7f3a88f3098dde9f2189ea7a2544c698.yaml b/nuclei-templates/cve-less/plugins/inboundio-marketing-7f3a88f3098dde9f2189ea7a2544c698.yaml new file mode 100644 index 0000000000..f83e602e37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inboundio-marketing-7f3a88f3098dde9f2189ea7a2544c698.yaml @@ -0,0 +1,58 @@ +id: inboundio-marketing-7f3a88f3098dde9f2189ea7a2544c698 + +info: + name: > + InBoundio Marketing < 2.0.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ccd7300-f22a-405a-8087-9c750cb187a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inboundio-marketing/" + google-query: inurl:"/wp-content/plugins/inboundio-marketing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inboundio-marketing,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inboundio-marketing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inboundio-marketing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/include-me-7df4ba3c146c5caf3d402ff70333f208.yaml b/nuclei-templates/cve-less/plugins/include-me-7df4ba3c146c5caf3d402ff70333f208.yaml new file mode 100644 index 0000000000..74b19aeb5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/include-me-7df4ba3c146c5caf3d402ff70333f208.yaml @@ -0,0 +1,58 @@ +id: include-me-7df4ba3c146c5caf3d402ff70333f208 + +info: + name: > + Include Me <= 1.2.1 - Local File Inclusion leading to Authenticated Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75ac23b7-bcc0-41ce-8cfc-e1de3954d169?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/include-me/" + google-query: inurl:"/wp-content/plugins/include-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,include-me,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/include-me/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "include-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/incoming-links-1c5999a1196a6e32d7eacb9ae11f1a81.yaml b/nuclei-templates/cve-less/plugins/incoming-links-1c5999a1196a6e32d7eacb9ae11f1a81.yaml new file mode 100644 index 0000000000..4a5d14a8ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/incoming-links-1c5999a1196a6e32d7eacb9ae11f1a81.yaml @@ -0,0 +1,58 @@ +id: incoming-links-1c5999a1196a6e32d7eacb9ae11f1a81 + +info: + name: > + Incoming Links < 0.9.10b - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cd92993-1cda-46dc-8318-f2e938bff262?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/incoming-links/" + google-query: inurl:"/wp-content/plugins/incoming-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,incoming-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/incoming-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "incoming-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.10b') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indeed-affiliate-pro-ab0d13d34dc4621d3f125a7e5e405bf1.yaml b/nuclei-templates/cve-less/plugins/indeed-affiliate-pro-ab0d13d34dc4621d3f125a7e5e405bf1.yaml new file mode 100644 index 0000000000..0455831595 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indeed-affiliate-pro-ab0d13d34dc4621d3f125a7e5e405bf1.yaml @@ -0,0 +1,58 @@ +id: indeed-affiliate-pro-ab0d13d34dc4621d3f125a7e5e405bf1 + +info: + name: > + Ultimate Affiliate Pro <= 3.9 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50298ef3-352d-4fd2-bbb9-a55cfd329837?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indeed-affiliate-pro/" + google-query: inurl:"/wp-content/plugins/indeed-affiliate-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indeed-affiliate-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indeed-affiliate-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indeed-affiliate-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indeed-job-importer-738cbcde2d8ae9b069d1cee10adc6b90.yaml b/nuclei-templates/cve-less/plugins/indeed-job-importer-738cbcde2d8ae9b069d1cee10adc6b90.yaml new file mode 100644 index 0000000000..6e2fdbb257 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indeed-job-importer-738cbcde2d8ae9b069d1cee10adc6b90.yaml @@ -0,0 +1,58 @@ +id: indeed-job-importer-738cbcde2d8ae9b069d1cee10adc6b90 + +info: + name: > + Indeed Job Importer <= 1.0.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/712e9754-a6f2-43b5-97be-9d23970b46ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indeed-job-importer/" + google-query: inurl:"/wp-content/plugins/indeed-job-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indeed-job-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indeed-job-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indeed-job-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indeed-membership-pro-0122e284ef694546ea4cfa00ca4bb4ad.yaml b/nuclei-templates/cve-less/plugins/indeed-membership-pro-0122e284ef694546ea4cfa00ca4bb4ad.yaml new file mode 100644 index 0000000000..6f4bc91c1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indeed-membership-pro-0122e284ef694546ea4cfa00ca4bb4ad.yaml @@ -0,0 +1,58 @@ +id: indeed-membership-pro-0122e284ef694546ea4cfa00ca4bb4ad + +info: + name: > + Indeed Membership Pro 7.3 - 8.6 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5341bbd-55bd-41ad-b5d1-d6b56c141277?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indeed-membership-pro/" + google-query: inurl:"/wp-content/plugins/indeed-membership-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indeed-membership-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indeed-membership-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indeed-membership-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 7.3', '<= 8.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indeed-membership-pro-488696d83423a80a7653f70083bb7091.yaml b/nuclei-templates/cve-less/plugins/indeed-membership-pro-488696d83423a80a7653f70083bb7091.yaml new file mode 100644 index 0000000000..d0e784837f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indeed-membership-pro-488696d83423a80a7653f70083bb7091.yaml @@ -0,0 +1,58 @@ +id: indeed-membership-pro-488696d83423a80a7653f70083bb7091 + +info: + name: > + Indeed Membership Pro <= 7.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d38167c-47f8-473c-94de-91d9b439ddde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indeed-membership-pro/" + google-query: inurl:"/wp-content/plugins/indeed-membership-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indeed-membership-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indeed-membership-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indeed-membership-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indeed-membership-pro-c78abe8c9dafca582dd0f5c66a5e2eb9.yaml b/nuclei-templates/cve-less/plugins/indeed-membership-pro-c78abe8c9dafca582dd0f5c66a5e2eb9.yaml new file mode 100644 index 0000000000..670784ecae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indeed-membership-pro-c78abe8c9dafca582dd0f5c66a5e2eb9.yaml @@ -0,0 +1,58 @@ +id: indeed-membership-pro-c78abe8c9dafca582dd0f5c66a5e2eb9 + +info: + name: > + Ultimate Membership Pro <= 8.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af2d004f-fa9e-4e26-a1e3-03fb31cb95c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indeed-membership-pro/" + google-query: inurl:"/wp-content/plugins/indeed-membership-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indeed-membership-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indeed-membership-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indeed-membership-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indeed-membership-pro-d5e71f9286573633246d95fe18c6dc87.yaml b/nuclei-templates/cve-less/plugins/indeed-membership-pro-d5e71f9286573633246d95fe18c6dc87.yaml new file mode 100644 index 0000000000..5568a2f743 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indeed-membership-pro-d5e71f9286573633246d95fe18c6dc87.yaml @@ -0,0 +1,58 @@ +id: indeed-membership-pro-d5e71f9286573633246d95fe18c6dc87 + +info: + name: > + Indeed Membership Pro 7.3 - 8.6 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab1cc1ef-d0e0-491d-91a8-eaa0605fc1da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indeed-membership-pro/" + google-query: inurl:"/wp-content/plugins/indeed-membership-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indeed-membership-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indeed-membership-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indeed-membership-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 7.3', '<= 8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indeed-membership-pro-e4eee191046305a40d967ee1ba037cbb.yaml b/nuclei-templates/cve-less/plugins/indeed-membership-pro-e4eee191046305a40d967ee1ba037cbb.yaml new file mode 100644 index 0000000000..9e2db33ba7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indeed-membership-pro-e4eee191046305a40d967ee1ba037cbb.yaml @@ -0,0 +1,58 @@ +id: indeed-membership-pro-e4eee191046305a40d967ee1ba037cbb + +info: + name: > + Ultimate Membership Pro <= 8.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ecaaa86-9de1-4b90-b6cf-885621cffb19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indeed-membership-pro/" + google-query: inurl:"/wp-content/plugins/indeed-membership-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indeed-membership-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indeed-membership-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indeed-membership-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indeed-membership-pro-f7a99c10e9aa1ac19e91036f274d28b1.yaml b/nuclei-templates/cve-less/plugins/indeed-membership-pro-f7a99c10e9aa1ac19e91036f274d28b1.yaml new file mode 100644 index 0000000000..6e3daaa003 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indeed-membership-pro-f7a99c10e9aa1ac19e91036f274d28b1.yaml @@ -0,0 +1,58 @@ +id: indeed-membership-pro-f7a99c10e9aa1ac19e91036f274d28b1 + +info: + name: > + Indeed Membership Pro <= 7.5 - Remote Image File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01f0f734-b22e-4cd6-be99-ce6c2cd6f2c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indeed-membership-pro/" + google-query: inurl:"/wp-content/plugins/indeed-membership-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indeed-membership-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indeed-membership-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indeed-membership-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indexisto-12f4cc2153036a3efd08424c8d4576c6.yaml b/nuclei-templates/cve-less/plugins/indexisto-12f4cc2153036a3efd08424c8d4576c6.yaml new file mode 100644 index 0000000000..2c1a345373 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indexisto-12f4cc2153036a3efd08424c8d4576c6.yaml @@ -0,0 +1,58 @@ +id: indexisto-12f4cc2153036a3efd08424c8d4576c6 + +info: + name: > + Indexisto <= 1.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae53b67a-1df9-499a-a232-cf7560a3cf02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indexisto/" + google-query: inurl:"/wp-content/plugins/indexisto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indexisto,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indexisto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indexisto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indianic-testimonial-2804f23c4b5e807222522bde6eeefb47.yaml b/nuclei-templates/cve-less/plugins/indianic-testimonial-2804f23c4b5e807222522bde6eeefb47.yaml new file mode 100644 index 0000000000..5952c759d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indianic-testimonial-2804f23c4b5e807222522bde6eeefb47.yaml @@ -0,0 +1,58 @@ +id: indianic-testimonial-2804f23c4b5e807222522bde6eeefb47 + +info: + name: > + Testimonial < 2.3 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee3548ca-423f-4e2f-b87b-366200b31777?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indianic-testimonial/" + google-query: inurl:"/wp-content/plugins/indianic-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indianic-testimonial,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indianic-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indianic-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indianic-testimonial-8a1017de3d1fd72aa86eae06b4f6a456.yaml b/nuclei-templates/cve-less/plugins/indianic-testimonial-8a1017de3d1fd72aa86eae06b4f6a456.yaml new file mode 100644 index 0000000000..9c79c0858d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indianic-testimonial-8a1017de3d1fd72aa86eae06b4f6a456.yaml @@ -0,0 +1,58 @@ +id: indianic-testimonial-8a1017de3d1fd72aa86eae06b4f6a456 + +info: + name: > + Testimonial < 2.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96fc3ead-7ae4-4d2c-a0b5-13f3e3bf429b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indianic-testimonial/" + google-query: inurl:"/wp-content/plugins/indianic-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indianic-testimonial,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indianic-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indianic-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indianic-testimonial-bc1fc73bd669dca4197ffa756353cd75.yaml b/nuclei-templates/cve-less/plugins/indianic-testimonial-bc1fc73bd669dca4197ffa756353cd75.yaml new file mode 100644 index 0000000000..ea63d8413b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indianic-testimonial-bc1fc73bd669dca4197ffa756353cd75.yaml @@ -0,0 +1,58 @@ +id: indianic-testimonial-bc1fc73bd669dca4197ffa756353cd75 + +info: + name: > + Testimonial < 2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d37b10f7-ea20-47cb-913a-4286c2ee2771?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indianic-testimonial/" + google-query: inurl:"/wp-content/plugins/indianic-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indianic-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indianic-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indianic-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indieweb-post-kinds-76874a7b4a83992edc7c544ab3ce90f7.yaml b/nuclei-templates/cve-less/plugins/indieweb-post-kinds-76874a7b4a83992edc7c544ab3ce90f7.yaml new file mode 100644 index 0000000000..bde4b99ba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indieweb-post-kinds-76874a7b4a83992edc7c544ab3ce90f7.yaml @@ -0,0 +1,58 @@ +id: indieweb-post-kinds-76874a7b4a83992edc7c544ab3ce90f7 + +info: + name: > + Post Kinds < 1.3.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d570009f-0011-485a-bd14-f511cb2b60d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indieweb-post-kinds/" + google-query: inurl:"/wp-content/plugins/indieweb-post-kinds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indieweb-post-kinds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indieweb-post-kinds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indieweb-post-kinds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/indigitall-web-push-notifications-2c744f500a4cb530f5a915c698c40d99.yaml b/nuclei-templates/cve-less/plugins/indigitall-web-push-notifications-2c744f500a4cb530f5a915c698c40d99.yaml new file mode 100644 index 0000000000..cfcef235b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/indigitall-web-push-notifications-2c744f500a4cb530f5a915c698c40d99.yaml @@ -0,0 +1,58 @@ +id: indigitall-web-push-notifications-2c744f500a4cb530f5a915c698c40d99 + +info: + name: > + IURNY by INDIGITALL – WhatsApp Chat, Web Push Notifications (FREE) <= 3.2.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/919d31a8-932e-438b-a039-89a24781524c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/indigitall-web-push-notifications/" + google-query: inurl:"/wp-content/plugins/indigitall-web-push-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,indigitall-web-push-notifications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/indigitall-web-push-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "indigitall-web-push-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infogram-b0923245191ee8b19827587a90615915.yaml b/nuclei-templates/cve-less/plugins/infogram-b0923245191ee8b19827587a90615915.yaml new file mode 100644 index 0000000000..9fe0cb40a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infogram-b0923245191ee8b19827587a90615915.yaml @@ -0,0 +1,58 @@ +id: infogram-b0923245191ee8b19827587a90615915 + +info: + name: > + Infogram <= 1.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72e1482c-0f55-4f43-8590-d4f2758f0eea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infogram/" + google-query: inurl:"/wp-content/plugins/infogram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infogram,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infogram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infogram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infographic-and-list-builder-ilist-1de8ccd3e6be5fc258bf58b1985495c8.yaml b/nuclei-templates/cve-less/plugins/infographic-and-list-builder-ilist-1de8ccd3e6be5fc258bf58b1985495c8.yaml new file mode 100644 index 0000000000..52c7772ac5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infographic-and-list-builder-ilist-1de8ccd3e6be5fc258bf58b1985495c8.yaml @@ -0,0 +1,58 @@ +id: infographic-and-list-builder-ilist-1de8ccd3e6be5fc258bf58b1985495c8 + +info: + name: > + Infographic Maker – iList <= 4.3.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad4878fb-dd0f-473b-9887-d993a89fedd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infographic-and-list-builder-ilist/" + google-query: inurl:"/wp-content/plugins/infographic-and-list-builder-ilist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infographic-and-list-builder-ilist,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infographic-and-list-builder-ilist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infographic-and-list-builder-ilist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infographic-and-list-builder-ilist-d3e0f1a758bd59446de5b7d7cf2ab987.yaml b/nuclei-templates/cve-less/plugins/infographic-and-list-builder-ilist-d3e0f1a758bd59446de5b7d7cf2ab987.yaml new file mode 100644 index 0000000000..c1de1f2e8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infographic-and-list-builder-ilist-d3e0f1a758bd59446de5b7d7cf2ab987.yaml @@ -0,0 +1,58 @@ +id: infographic-and-list-builder-ilist-d3e0f1a758bd59446de5b7d7cf2ab987 + +info: + name: > + AI Infographic Maker <= 4.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/918c418a-9d86-461d-91cb-33d04010c577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infographic-and-list-builder-ilist/" + google-query: inurl:"/wp-content/plugins/infographic-and-list-builder-ilist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infographic-and-list-builder-ilist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infographic-and-list-builder-ilist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infographic-and-list-builder-ilist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/information-reel-2e8c881d695b74f611068f96c80b3487.yaml b/nuclei-templates/cve-less/plugins/information-reel-2e8c881d695b74f611068f96c80b3487.yaml new file mode 100644 index 0000000000..054728d619 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/information-reel-2e8c881d695b74f611068f96c80b3487.yaml @@ -0,0 +1,58 @@ +id: information-reel-2e8c881d695b74f611068f96c80b3487 + +info: + name: > + Information Reel <= 10.0 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64db63e5-ff76-494a-be4f-d820f0cc9ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/information-reel/" + google-query: inurl:"/wp-content/plugins/information-reel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,information-reel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/information-reel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "information-reel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infusionsoft-731c10dcd4a65ca76382b001a77071bb.yaml b/nuclei-templates/cve-less/plugins/infusionsoft-731c10dcd4a65ca76382b001a77071bb.yaml new file mode 100644 index 0000000000..f385865bef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infusionsoft-731c10dcd4a65ca76382b001a77071bb.yaml @@ -0,0 +1,58 @@ +id: infusionsoft-731c10dcd4a65ca76382b001a77071bb + +info: + name: > + Infusionsoft Gravity Forms Add-on <= 1.5.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c3726fa-e3ee-4c5d-a727-b33d0d077ef1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infusionsoft/" + google-query: inurl:"/wp-content/plugins/infusionsoft/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infusionsoft,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infusionsoft/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infusionsoft" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infusionsoft-8a7ecb10c894553e29bd44217c769b5a.yaml b/nuclei-templates/cve-less/plugins/infusionsoft-8a7ecb10c894553e29bd44217c769b5a.yaml new file mode 100644 index 0000000000..0c04279d63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infusionsoft-8a7ecb10c894553e29bd44217c769b5a.yaml @@ -0,0 +1,58 @@ +id: infusionsoft-8a7ecb10c894553e29bd44217c769b5a + +info: + name: > + Infusionsoft Gravity Forms Add-on < 1.5.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/862ab8c7-c4af-437e-a72d-31a401cd1765?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infusionsoft/" + google-query: inurl:"/wp-content/plugins/infusionsoft/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infusionsoft,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infusionsoft/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infusionsoft" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infusionsoft-eb2bb0feddcf3b5f17093cd80034744c.yaml b/nuclei-templates/cve-less/plugins/infusionsoft-eb2bb0feddcf3b5f17093cd80034744c.yaml new file mode 100644 index 0000000000..5de25f262e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infusionsoft-eb2bb0feddcf3b5f17093cd80034744c.yaml @@ -0,0 +1,58 @@ +id: infusionsoft-eb2bb0feddcf3b5f17093cd80034744c + +info: + name: > + Infusionsoft Gravity Forms Add-on 1.5.3 - 1.5.10 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8840bb3c-3e4b-48d5-bf01-2ed9bcfcf27a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infusionsoft/" + google-query: inurl:"/wp-content/plugins/infusionsoft/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infusionsoft,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infusionsoft/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infusionsoft" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.5.3', '<= 1.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infusionsoft-landing-pages-31325fd9d39a9b170e5825b91f943680.yaml b/nuclei-templates/cve-less/plugins/infusionsoft-landing-pages-31325fd9d39a9b170e5825b91f943680.yaml new file mode 100644 index 0000000000..98071cfd5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infusionsoft-landing-pages-31325fd9d39a9b170e5825b91f943680.yaml @@ -0,0 +1,58 @@ +id: infusionsoft-landing-pages-31325fd9d39a9b170e5825b91f943680 + +info: + name: > + Keap Landing Pages <= 1.4.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/113f0cb7-a5eb-42d5-ad42-871c0381b617?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infusionsoft-landing-pages/" + google-query: inurl:"/wp-content/plugins/infusionsoft-landing-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infusionsoft-landing-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infusionsoft-landing-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infusionsoft-landing-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infusionsoft-official-opt-in-forms-3c962311490d35eba5d44b2a55482b65.yaml b/nuclei-templates/cve-less/plugins/infusionsoft-official-opt-in-forms-3c962311490d35eba5d44b2a55482b65.yaml new file mode 100644 index 0000000000..0a1de3a68c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infusionsoft-official-opt-in-forms-3c962311490d35eba5d44b2a55482b65.yaml @@ -0,0 +1,58 @@ +id: infusionsoft-official-opt-in-forms-3c962311490d35eba5d44b2a55482b65 + +info: + name: > + Keap Official Opt-in Forms <= 1.0.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a0f1006-8015-4e67-9b03-16d3ad3c0e77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infusionsoft-official-opt-in-forms/" + google-query: inurl:"/wp-content/plugins/infusionsoft-official-opt-in-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infusionsoft-official-opt-in-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infusionsoft-official-opt-in-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infusionsoft-official-opt-in-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/infusionsoft-official-opt-in-forms-fa11673c89d7f49c85f8e69d02b295a6.yaml b/nuclei-templates/cve-less/plugins/infusionsoft-official-opt-in-forms-fa11673c89d7f49c85f8e69d02b295a6.yaml new file mode 100644 index 0000000000..9f9879ffd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/infusionsoft-official-opt-in-forms-fa11673c89d7f49c85f8e69d02b295a6.yaml @@ -0,0 +1,58 @@ +id: infusionsoft-official-opt-in-forms-fa11673c89d7f49c85f8e69d02b295a6 + +info: + name: > + Keap Official Opt-in Forms <= 1.0.11 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33210104-68fc-4d88-b681-b30e7abd6e18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/infusionsoft-official-opt-in-forms/" + google-query: inurl:"/wp-content/plugins/infusionsoft-official-opt-in-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,infusionsoft-official-opt-in-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/infusionsoft-official-opt-in-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infusionsoft-official-opt-in-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/injection-guard-3234f0a051e8628ee55bf3e418168da0.yaml b/nuclei-templates/cve-less/plugins/injection-guard-3234f0a051e8628ee55bf3e418168da0.yaml new file mode 100644 index 0000000000..57c4bf587a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/injection-guard-3234f0a051e8628ee55bf3e418168da0.yaml @@ -0,0 +1,58 @@ +id: injection-guard-3234f0a051e8628ee55bf3e418168da0 + +info: + name: > + Injection Guard <= 1.2.1 - Cross-Site Request Forgery via ig_update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a5c4bef-f871-4e6b-9b6e-85079f1233a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/injection-guard/" + google-query: inurl:"/wp-content/plugins/injection-guard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,injection-guard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/injection-guard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "injection-guard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/injection-guard-a1f2a5e3cbcfc5d5c7da00302ff2ad5b.yaml b/nuclei-templates/cve-less/plugins/injection-guard-a1f2a5e3cbcfc5d5c7da00302ff2ad5b.yaml new file mode 100644 index 0000000000..dfe4e82de1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/injection-guard-a1f2a5e3cbcfc5d5c7da00302ff2ad5b.yaml @@ -0,0 +1,58 @@ +id: injection-guard-a1f2a5e3cbcfc5d5c7da00302ff2ad5b + +info: + name: > + Injection Guard <= 1.2.1 - Cross-Site Request Forgery to Whitelist Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a6bc58f-9cf3-4d3f-a10e-0ccde0b890a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/injection-guard/" + google-query: inurl:"/wp-content/plugins/injection-guard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,injection-guard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/injection-guard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "injection-guard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/injection-guard-ca5a202b7756a1fb685216ed26367b36.yaml b/nuclei-templates/cve-less/plugins/injection-guard-ca5a202b7756a1fb685216ed26367b36.yaml new file mode 100644 index 0000000000..f8a7a2fd94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/injection-guard-ca5a202b7756a1fb685216ed26367b36.yaml @@ -0,0 +1,58 @@ +id: injection-guard-ca5a202b7756a1fb685216ed26367b36 + +info: + name: > + Injection Guard <= 1.2.1 - Missing Authorization to Whitelist Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c41797-b256-47de-a783-18df36dd2234?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/injection-guard/" + google-query: inurl:"/wp-content/plugins/injection-guard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,injection-guard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/injection-guard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "injection-guard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/injection-guard-f1d5eaff1a5d538327565db0438aa59a.yaml b/nuclei-templates/cve-less/plugins/injection-guard-f1d5eaff1a5d538327565db0438aa59a.yaml new file mode 100644 index 0000000000..b0e35765b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/injection-guard-f1d5eaff1a5d538327565db0438aa59a.yaml @@ -0,0 +1,58 @@ +id: injection-guard-f1d5eaff1a5d538327565db0438aa59a + +info: + name: > + Injection Guard <= 1.2.1 - Missing Authorization via ig_update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c6a9cfc-0b30-456e-bac5-4ad79cd08dce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/injection-guard/" + google-query: inurl:"/wp-content/plugins/injection-guard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,injection-guard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/injection-guard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "injection-guard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inline-google-spreadsheet-viewer-1f04a4a11c02a582deff94a7681096d8.yaml b/nuclei-templates/cve-less/plugins/inline-google-spreadsheet-viewer-1f04a4a11c02a582deff94a7681096d8.yaml new file mode 100644 index 0000000000..b0d3172896 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inline-google-spreadsheet-viewer-1f04a4a11c02a582deff94a7681096d8.yaml @@ -0,0 +1,58 @@ +id: inline-google-spreadsheet-viewer-1f04a4a11c02a582deff94a7681096d8 + +info: + name: > + Inline Google Spreadsheet Viewer <= 0.13.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/523e80a5-dffa-4eb6-8f7a-e179e0dc4d28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inline-google-spreadsheet-viewer/" + google-query: inurl:"/wp-content/plugins/inline-google-spreadsheet-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inline-google-spreadsheet-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inline-google-spreadsheet-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inline-google-spreadsheet-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inline-google-spreadsheet-viewer-9f8810cd387382963f3ea98eed877722.yaml b/nuclei-templates/cve-less/plugins/inline-google-spreadsheet-viewer-9f8810cd387382963f3ea98eed877722.yaml new file mode 100644 index 0000000000..11ad0c3c96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inline-google-spreadsheet-viewer-9f8810cd387382963f3ea98eed877722.yaml @@ -0,0 +1,58 @@ +id: inline-google-spreadsheet-viewer-9f8810cd387382963f3ea98eed877722 + +info: + name: > + Inline Google Spreadsheet Viewer <= 0.9.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0543f32-54d4-4180-95c4-c9ddc0e08384?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inline-google-spreadsheet-viewer/" + google-query: inurl:"/wp-content/plugins/inline-google-spreadsheet-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inline-google-spreadsheet-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inline-google-spreadsheet-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inline-google-spreadsheet-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inline-tweet-sharer-44d79c88f80918a39ad3735f87916ce8.yaml b/nuclei-templates/cve-less/plugins/inline-tweet-sharer-44d79c88f80918a39ad3735f87916ce8.yaml new file mode 100644 index 0000000000..ebdd0c577f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inline-tweet-sharer-44d79c88f80918a39ad3735f87916ce8.yaml @@ -0,0 +1,58 @@ +id: inline-tweet-sharer-44d79c88f80918a39ad3735f87916ce8 + +info: + name: > + Inline Tweet Sharer <= 2.5.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a85b549-f6a4-4dc3-9f2a-35d783099f96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inline-tweet-sharer/" + google-query: inurl:"/wp-content/plugins/inline-tweet-sharer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inline-tweet-sharer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inline-tweet-sharer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inline-tweet-sharer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inlinks-94786cf22c04d1dd0ce4fe28ab98e98a.yaml b/nuclei-templates/cve-less/plugins/inlinks-94786cf22c04d1dd0ce4fe28ab98e98a.yaml new file mode 100644 index 0000000000..a098bab063 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inlinks-94786cf22c04d1dd0ce4fe28ab98e98a.yaml @@ -0,0 +1,58 @@ +id: inlinks-94786cf22c04d1dd0ce4fe28ab98e98a + +info: + name: > + InLinks <= 1.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/682b40ad-ca62-47eb-9abc-fd43122d11c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inlinks/" + google-query: inurl:"/wp-content/plugins/inlinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inlinks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inlinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inlinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/innovs-hr-manager-e14959fa43bbd40e929542fe49cd89d7.yaml b/nuclei-templates/cve-less/plugins/innovs-hr-manager-e14959fa43bbd40e929542fe49cd89d7.yaml new file mode 100644 index 0000000000..0251a4f4df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/innovs-hr-manager-e14959fa43bbd40e929542fe49cd89d7.yaml @@ -0,0 +1,58 @@ +id: innovs-hr-manager-e14959fa43bbd40e929542fe49cd89d7 + +info: + name: > + Innovs HR – Complete Human Resource Management System for Your Business <= 1.0.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e806ca3b-daae-48a2-9923-315dbf86a9e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/innovs-hr-manager/" + google-query: inurl:"/wp-content/plugins/innovs-hr-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,innovs-hr-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/innovs-hr-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "innovs-hr-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/innovs-hr-manager-e6fb630fd086e11cb5135f0bd10ba86b.yaml b/nuclei-templates/cve-less/plugins/innovs-hr-manager-e6fb630fd086e11cb5135f0bd10ba86b.yaml new file mode 100644 index 0000000000..3cd2c2bf30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/innovs-hr-manager-e6fb630fd086e11cb5135f0bd10ba86b.yaml @@ -0,0 +1,58 @@ +id: innovs-hr-manager-e6fb630fd086e11cb5135f0bd10ba86b + +info: + name: > + Innovs HR <= 1.0.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f43b5c02-fb10-48f1-9457-f67c5008fe5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/innovs-hr-manager/" + google-query: inurl:"/wp-content/plugins/innovs-hr-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,innovs-hr-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/innovs-hr-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "innovs-hr-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inpost-gallery-0001e462386fce9c0f630ec016ad34e2.yaml b/nuclei-templates/cve-less/plugins/inpost-gallery-0001e462386fce9c0f630ec016ad34e2.yaml new file mode 100644 index 0000000000..087d5bfac8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inpost-gallery-0001e462386fce9c0f630ec016ad34e2.yaml @@ -0,0 +1,58 @@ +id: inpost-gallery-0001e462386fce9c0f630ec016ad34e2 + +info: + name: > + InPost Gallery < 2.1.2.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19f737a8-21e6-49d3-95b9-24fb6e5d7af7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inpost-gallery/" + google-query: inurl:"/wp-content/plugins/inpost-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inpost-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inpost-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inpost-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inpost-gallery-ad4acbb771f45212d6935861fe1f4c55.yaml b/nuclei-templates/cve-less/plugins/inpost-gallery-ad4acbb771f45212d6935861fe1f4c55.yaml new file mode 100644 index 0000000000..af7d5f16de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inpost-gallery-ad4acbb771f45212d6935861fe1f4c55.yaml @@ -0,0 +1,58 @@ +id: inpost-gallery-ad4acbb771f45212d6935861fe1f4c55 + +info: + name: > + InPost Gallery <= 2.1.4.1 - Reflected Cross-Site Scripting via 'imgurl' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69fd66db-5693-4976-96c0-60dbfeccd14f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inpost-gallery/" + google-query: inurl:"/wp-content/plugins/inpost-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inpost-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inpost-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inpost-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inpost-gallery-b3a55c8660f19eddef4075e293b358ed.yaml b/nuclei-templates/cve-less/plugins/inpost-gallery-b3a55c8660f19eddef4075e293b358ed.yaml new file mode 100644 index 0000000000..634cc6d87e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inpost-gallery-b3a55c8660f19eddef4075e293b358ed.yaml @@ -0,0 +1,58 @@ +id: inpost-gallery-b3a55c8660f19eddef4075e293b358ed + +info: + name: > + InPost Gallery <= 2.1.4.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c7a0b51-6626-449f-95f5-74c4847909de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inpost-gallery/" + google-query: inurl:"/wp-content/plugins/inpost-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inpost-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inpost-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inpost-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inpost-gallery-ec29185ed2f65e10921961a5788cf99a.yaml b/nuclei-templates/cve-less/plugins/inpost-gallery-ec29185ed2f65e10921961a5788cf99a.yaml new file mode 100644 index 0000000000..98018c5e4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inpost-gallery-ec29185ed2f65e10921961a5788cf99a.yaml @@ -0,0 +1,58 @@ +id: inpost-gallery-ec29185ed2f65e10921961a5788cf99a + +info: + name: > + InPost Gallery <= 2.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c98c1ce9-8213-47cb-b928-3641f821a806?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inpost-gallery/" + google-query: inurl:"/wp-content/plugins/inpost-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inpost-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inpost-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inpost-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insecure-content-warning-bc55ea7b509124d1a77831d4400c5030.yaml b/nuclei-templates/cve-less/plugins/insecure-content-warning-bc55ea7b509124d1a77831d4400c5030.yaml new file mode 100644 index 0000000000..387414e9d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insecure-content-warning-bc55ea7b509124d1a77831d4400c5030.yaml @@ -0,0 +1,58 @@ +id: insecure-content-warning-bc55ea7b509124d1a77831d4400c5030 + +info: + name: > + simple-git < 3.16.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46fdd494-8073-4a68-a4ab-1f5767011f67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insecure-content-warning/" + google-query: inurl:"/wp-content/plugins/insecure-content-warning/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insecure-content-warning,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insecure-content-warning/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insecure-content-warning" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-estimated-reading-time-027f8eecce0a5762cf1bc3cc2ca92e8d.yaml b/nuclei-templates/cve-less/plugins/insert-estimated-reading-time-027f8eecce0a5762cf1bc3cc2ca92e8d.yaml new file mode 100644 index 0000000000..f4b397b584 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-estimated-reading-time-027f8eecce0a5762cf1bc3cc2ca92e8d.yaml @@ -0,0 +1,58 @@ +id: insert-estimated-reading-time-027f8eecce0a5762cf1bc3cc2ca92e8d + +info: + name: > + Insert Estimated Reading Time <= 1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45426cdd-2721-4959-8f0b-13025f775d62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-estimated-reading-time/" + google-query: inurl:"/wp-content/plugins/insert-estimated-reading-time/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-estimated-reading-time,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-estimated-reading-time/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-estimated-reading-time" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-headers-and-footers-759e637db585d6ba715dddf7878712c3.yaml b/nuclei-templates/cve-less/plugins/insert-headers-and-footers-759e637db585d6ba715dddf7878712c3.yaml new file mode 100644 index 0000000000..21e65acecc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-headers-and-footers-759e637db585d6ba715dddf7878712c3.yaml @@ -0,0 +1,58 @@ +id: insert-headers-and-footers-759e637db585d6ba715dddf7878712c3 + +info: + name: > + WPCode <= 2.0.13 - Unauthenticated Reflected Cross-Site Scripting via Tag Filter Links + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f2ebd89-d34f-4f08-9654-049355fdfa3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-headers-and-footers/" + google-query: inurl:"/wp-content/plugins/insert-headers-and-footers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-headers-and-footers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-headers-and-footers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-headers-and-footers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-headers-and-footers-88444b55ba593f6267560d3998cc950b.yaml b/nuclei-templates/cve-less/plugins/insert-headers-and-footers-88444b55ba593f6267560d3998cc950b.yaml new file mode 100644 index 0000000000..a03fc469c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-headers-and-footers-88444b55ba593f6267560d3998cc950b.yaml @@ -0,0 +1,58 @@ +id: insert-headers-and-footers-88444b55ba593f6267560d3998cc950b + +info: + name: > + WPCode <= 2.0.6 - Missing Authorization to Sensitive Key Disclosure/Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4b1cae3-dc08-43b1-9a20-62b7263efeba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-headers-and-footers/" + google-query: inurl:"/wp-content/plugins/insert-headers-and-footers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-headers-and-footers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-headers-and-footers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-headers-and-footers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-headers-and-footers-b12b3184228f1ba6313c71b9719c05ba.yaml b/nuclei-templates/cve-less/plugins/insert-headers-and-footers-b12b3184228f1ba6313c71b9719c05ba.yaml new file mode 100644 index 0000000000..b7ad7c3c4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-headers-and-footers-b12b3184228f1ba6313c71b9719c05ba.yaml @@ -0,0 +1,58 @@ +id: insert-headers-and-footers-b12b3184228f1ba6313c71b9719c05ba + +info: + name: > + WPCode <= 2.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e52c53c1-4f04-4075-9329-d93fabf5a6ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-headers-and-footers/" + google-query: inurl:"/wp-content/plugins/insert-headers-and-footers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-headers-and-footers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-headers-and-footers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-headers-and-footers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-html-snippet-605d1764c74abe695c069cdc63cb4675.yaml b/nuclei-templates/cve-less/plugins/insert-html-snippet-605d1764c74abe695c069cdc63cb4675.yaml new file mode 100644 index 0000000000..ca907b3c7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-html-snippet-605d1764c74abe695c069cdc63cb4675.yaml @@ -0,0 +1,58 @@ +id: insert-html-snippet-605d1764c74abe695c069cdc63cb4675 + +info: + name: > + Insert Html Snippet <= 1.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71aeca29-a9bd-42c0-8150-814b79e931fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-html-snippet/" + google-query: inurl:"/wp-content/plugins/insert-html-snippet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-html-snippet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-html-snippet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-html-snippet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-243ee6cead272cdb6dc2ad831bc4986e.yaml b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-243ee6cead272cdb6dc2ad831bc4986e.yaml new file mode 100644 index 0000000000..5fa5c84af0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-243ee6cead272cdb6dc2ad831bc4986e.yaml @@ -0,0 +1,58 @@ +id: insert-or-embed-articulate-content-into-wordpress-243ee6cead272cdb6dc2ad831bc4986e + +info: + name: > + Insert or Embed Articulate Content into WordPress < 4.2999 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7be28b54-def9-46b7-bb59-58b0ae5ea674?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + google-query: inurl:"/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-or-embed-articulate-content-into-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-or-embed-articulate-content-into-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2999') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-867b85000a9162268b1ddc0673082505.yaml b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-867b85000a9162268b1ddc0673082505.yaml new file mode 100644 index 0000000000..7f072a9917 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-867b85000a9162268b1ddc0673082505.yaml @@ -0,0 +1,58 @@ +id: insert-or-embed-articulate-content-into-wordpress-867b85000a9162268b1ddc0673082505 + +info: + name: > + Insert or Embed Articulate Content into WordPress < 4.29991 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c225bea-78db-4f4c-a201-833436c1df78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + google-query: inurl:"/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-or-embed-articulate-content-into-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-or-embed-articulate-content-into-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.29991') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-a841f648b0bdbeeaa745d6da10e2cfec.yaml b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-a841f648b0bdbeeaa745d6da10e2cfec.yaml new file mode 100644 index 0000000000..aa4e8a1f58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-a841f648b0bdbeeaa745d6da10e2cfec.yaml @@ -0,0 +1,58 @@ +id: insert-or-embed-articulate-content-into-wordpress-a841f648b0bdbeeaa745d6da10e2cfec + +info: + name: > + Insert or Embed Articulate Content into WordPress <= 4.3000000021 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/128d3046-94a0-465c-9225-a3ce652f5282?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + google-query: inurl:"/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-or-embed-articulate-content-into-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-or-embed-articulate-content-into-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3000000021') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0f95e80498 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: insert-or-embed-articulate-content-into-wordpress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + google-query: inurl:"/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-or-embed-articulate-content-into-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-or-embed-articulate-content-into-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3000000016') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..fb328077c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-or-embed-articulate-content-into-wordpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: insert-or-embed-articulate-content-into-wordpress-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + google-query: inurl:"/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-or-embed-articulate-content-into-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-or-embed-articulate-content-into-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2997') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-pages-20a34e507c4fa6283c8c06e9c7d18117.yaml b/nuclei-templates/cve-less/plugins/insert-pages-20a34e507c4fa6283c8c06e9c7d18117.yaml new file mode 100644 index 0000000000..c9ca336009 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-pages-20a34e507c4fa6283c8c06e9c7d18117.yaml @@ -0,0 +1,58 @@ +id: insert-pages-20a34e507c4fa6283c8c06e9c7d18117 + +info: + name: > + Insert Pages < 3.2.4 - Authenticated Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9efac984-21ef-4e02-8ead-bf4205ddb38d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-pages/" + google-query: inurl:"/wp-content/plugins/insert-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-pages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-pages-474fa03f5b39570acd09bb99c310528b.yaml b/nuclei-templates/cve-less/plugins/insert-pages-474fa03f5b39570acd09bb99c310528b.yaml new file mode 100644 index 0000000000..0c392fb368 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-pages-474fa03f5b39570acd09bb99c310528b.yaml @@ -0,0 +1,58 @@ +id: insert-pages-474fa03f5b39570acd09bb99c310528b + +info: + name: > + Insert Pages <= 3.7.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0336e35-eb3c-4613-b8a2-fac7b837eb6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-pages/" + google-query: inurl:"/wp-content/plugins/insert-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-pages-888c0d96bb5c45a5559094f92be9b42d.yaml b/nuclei-templates/cve-less/plugins/insert-pages-888c0d96bb5c45a5559094f92be9b42d.yaml new file mode 100644 index 0000000000..4b2fdc94d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-pages-888c0d96bb5c45a5559094f92be9b42d.yaml @@ -0,0 +1,58 @@ +id: insert-pages-888c0d96bb5c45a5559094f92be9b42d + +info: + name: > + Insert Pages <= 3.6.1 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e780461-3fda-491d-ac77-dee52f8197b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-pages/" + google-query: inurl:"/wp-content/plugins/insert-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-pages-91f8f23098584a64320691c5f2d0c50b.yaml b/nuclei-templates/cve-less/plugins/insert-pages-91f8f23098584a64320691c5f2d0c50b.yaml new file mode 100644 index 0000000000..238e678780 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-pages-91f8f23098584a64320691c5f2d0c50b.yaml @@ -0,0 +1,58 @@ +id: insert-pages-91f8f23098584a64320691c5f2d0c50b + +info: + name: > + Insert Pages <= 3.6.1 - Contributor+ Arbitrary Posts/Pages Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ee47f62-93f5-40ed-8c1d-555a21eb714a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-pages/" + google-query: inurl:"/wp-content/plugins/insert-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-pages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-php-57aad3805a9f2a510911c9b341933d75.yaml b/nuclei-templates/cve-less/plugins/insert-php-57aad3805a9f2a510911c9b341933d75.yaml new file mode 100644 index 0000000000..661f969e91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-php-57aad3805a9f2a510911c9b341933d75.yaml @@ -0,0 +1,58 @@ +id: insert-php-57aad3805a9f2a510911c9b341933d75 + +info: + name: > + Woody Ad Snippets <= 2.2.5 - Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/069bd7ab-1b78-4465-8e13-5ef903f7e45f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-php/" + google-query: inurl:"/wp-content/plugins/insert-php/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-php,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-php/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-php" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-php-57e5d2556ce7902a3bd2de5a68a6b052.yaml b/nuclei-templates/cve-less/plugins/insert-php-57e5d2556ce7902a3bd2de5a68a6b052.yaml new file mode 100644 index 0000000000..24e5902cbc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-php-57e5d2556ce7902a3bd2de5a68a6b052.yaml @@ -0,0 +1,58 @@ +id: insert-php-57e5d2556ce7902a3bd2de5a68a6b052 + +info: + name: > + Woody code snippets <= 2.3.9 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e573c0a4-d053-400b-828c-0d0eca880776?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-php/" + google-query: inurl:"/wp-content/plugins/insert-php/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-php,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-php/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-php" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-php-8874a81b9a5f337f94a87e2812a49701.yaml b/nuclei-templates/cve-less/plugins/insert-php-8874a81b9a5f337f94a87e2812a49701.yaml new file mode 100644 index 0000000000..5d7dbd7514 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-php-8874a81b9a5f337f94a87e2812a49701.yaml @@ -0,0 +1,58 @@ +id: insert-php-8874a81b9a5f337f94a87e2812a49701 + +info: + name: > + Woody code snippets <= 2.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95bae3f2-313b-4b6c-a81c-8af6f169151b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-php/" + google-query: inurl:"/wp-content/plugins/insert-php/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-php,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-php/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-php" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-php-c3c6968289de386f0f53996017935a1d.yaml b/nuclei-templates/cve-less/plugins/insert-php-c3c6968289de386f0f53996017935a1d.yaml new file mode 100644 index 0000000000..3217d10db2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-php-c3c6968289de386f0f53996017935a1d.yaml @@ -0,0 +1,58 @@ +id: insert-php-c3c6968289de386f0f53996017935a1d + +info: + name: > + Woody Ad Snippets <= 2.2.8 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11681152-e4f0-4cea-8fc8-f297368e4b15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-php/" + google-query: inurl:"/wp-content/plugins/insert-php/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-php,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-php/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-php" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-php-code-snippet-2f6907ee5c2cac6fd791f40374c04e13.yaml b/nuclei-templates/cve-less/plugins/insert-php-code-snippet-2f6907ee5c2cac6fd791f40374c04e13.yaml new file mode 100644 index 0000000000..2dadac6124 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-php-code-snippet-2f6907ee5c2cac6fd791f40374c04e13.yaml @@ -0,0 +1,58 @@ +id: insert-php-code-snippet-2f6907ee5c2cac6fd791f40374c04e13 + +info: + name: > + Insert PHP Code Snippet <= 1.3.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4a6b786-d0ef-41f6-b2bf-83307ec02b91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-php-code-snippet/" + google-query: inurl:"/wp-content/plugins/insert-php-code-snippet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-php-code-snippet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-php-code-snippet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-php-code-snippet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-php-d815b281c1937dc0ed5e942ec305999d.yaml b/nuclei-templates/cve-less/plugins/insert-php-d815b281c1937dc0ed5e942ec305999d.yaml new file mode 100644 index 0000000000..a73b839627 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-php-d815b281c1937dc0ed5e942ec305999d.yaml @@ -0,0 +1,58 @@ +id: insert-php-d815b281c1937dc0ed5e942ec305999d + +info: + name: > + Woody Ad Snippets <= 2.2.4 - Missing Authorization to Settings Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/942ae035-91b3-4330-800c-2dbe94a4b4b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-php/" + google-query: inurl:"/wp-content/plugins/insert-php/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-php,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-php/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-php" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-1951707b594e6f4a4e8e4243b43c9841.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-1951707b594e6f4a4e8e4243b43c9841.yaml new file mode 100644 index 0000000000..ad0dc76070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-1951707b594e6f4a4e8e4243b43c9841.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-1951707b594e6f4a4e8e4243b43c9841 + +info: + name: > + loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb93138-f2f9-4a3f-a0a2-d79a315c44f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-54bc1daf26907dc59a5c7876a142ff1b.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-54bc1daf26907dc59a5c7876a142ff1b.yaml new file mode 100644 index 0000000000..880b0121a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-54bc1daf26907dc59a5c7876a142ff1b.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-54bc1daf26907dc59a5c7876a142ff1b + +info: + name: > + loader-utils (JS package) < 2.0.3 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45a49dca-2ed2-44cf-a0fe-0f1440a78cc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-73081b1f6f4e13a9e6e969eba5e746fc.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-73081b1f6f4e13a9e6e969eba5e746fc.yaml new file mode 100644 index 0000000000..aedb06ff46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-73081b1f6f4e13a9e6e969eba5e746fc.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-73081b1f6f4e13a9e6e969eba5e746fc + +info: + name: > + simple-git < 3.15.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c747e6f-31fc-41b0-ba62-f009b5483696?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-76a587735289e9eac6af28d246d8763a.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-76a587735289e9eac6af28d246d8763a.yaml new file mode 100644 index 0000000000..b294c5abd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-76a587735289e9eac6af28d246d8763a.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-76a587735289e9eac6af28d246d8763a + +info: + name: > + ansi-regex >=2.1.1 <3.0.1 >=4.0.0 <4.1.1 >=5.0.0 <5.0.1 >=6.0.0 <6.0.1 - Regular Expression Denial of Service (ReDoS) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa13c293-0530-478c-acfc-f7d69edae318?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-8de18da384e81ad90d91fef5286d3d00.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-8de18da384e81ad90d91fef5286d3d00.yaml new file mode 100644 index 0000000000..eaba7a5f52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-8de18da384e81ad90d91fef5286d3d00.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-8de18da384e81ad90d91fef5286d3d00 + +info: + name: > + semver-regex <= 3.1.3 and 4.0.0-4.0.3 - Regular Expression Denial of Service (ReDoS) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e78c539c-5b72-4043-aa5a-6234913364ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-bd26ccd939104e13f73f569b312459d6.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-bd26ccd939104e13f73f569b312459d6.yaml new file mode 100644 index 0000000000..87467bc623 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-bd26ccd939104e13f73f569b312459d6.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-bd26ccd939104e13f73f569b312459d6 + +info: + name: > + loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2954a007-37ac-4811-a258-b3fdd738043f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-dddfaf0e8fc5a7c4646ae5e0730589aa.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-dddfaf0e8fc5a7c4646ae5e0730589aa.yaml new file mode 100644 index 0000000000..ac2a2554c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-dddfaf0e8fc5a7c4646ae5e0730589aa.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-dddfaf0e8fc5a7c4646ae5e0730589aa + +info: + name: > + async <= 2.6.3 and 3-3.2.2 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/361315ff-99ef-4fb2-946f-8ccc307bd3be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-fbefbdad33b922acaee6e93ce44b4409.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-fbefbdad33b922acaee6e93ce44b4409.yaml new file mode 100644 index 0000000000..d8bd724b2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-fbefbdad33b922acaee6e93ce44b4409.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-fbefbdad33b922acaee6e93ce44b4409 + +info: + name: > + guzzlehttp/psr7 <= 1.84 and 2.0.0-2.1.0 - Improper Input Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07b34541-25df-407b-8d56-16e3e510d83a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insert-special-characters-fd9bc570df9e6e1f10861293d27d4049.yaml b/nuclei-templates/cve-less/plugins/insert-special-characters-fd9bc570df9e6e1f10861293d27d4049.yaml new file mode 100644 index 0000000000..efae1fea7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insert-special-characters-fd9bc570df9e6e1f10861293d27d4049.yaml @@ -0,0 +1,58 @@ +id: insert-special-characters-fd9bc570df9e6e1f10861293d27d4049 + +info: + name: > + Minimist <= 1.2.5 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f714f97-5e1a-498a-9722-1e4bb883c5c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insert-special-characters/" + google-query: inurl:"/wp-content/plugins/insert-special-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insert-special-characters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insert-special-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insert-special-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insight-core-f70ed327fff0a742246ce2b66447d100.yaml b/nuclei-templates/cve-less/plugins/insight-core-f70ed327fff0a742246ce2b66447d100.yaml new file mode 100644 index 0000000000..5d1dc4cbe8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insight-core-f70ed327fff0a742246ce2b66447d100.yaml @@ -0,0 +1,58 @@ +id: insight-core-f70ed327fff0a742246ce2b66447d100 + +info: + name: > + Insight Core <= 1.0 - Authenticated PHP Object Injection & Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce2edda2-7707-415e-9493-e1067a421f54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insight-core/" + google-query: inurl:"/wp-content/plugins/insight-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insight-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insight-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insight-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inspirational-quote-rotator-2a97538728d15bbfb55e66c4649885a4.yaml b/nuclei-templates/cve-less/plugins/inspirational-quote-rotator-2a97538728d15bbfb55e66c4649885a4.yaml new file mode 100644 index 0000000000..91a617da50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inspirational-quote-rotator-2a97538728d15bbfb55e66c4649885a4.yaml @@ -0,0 +1,58 @@ +id: inspirational-quote-rotator-2a97538728d15bbfb55e66c4649885a4 + +info: + name: > + Inspirational Quote Rotator <= 1.0.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17e4376e-2b77-4c86-b962-ea4d7d8f534d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inspirational-quote-rotator/" + google-query: inurl:"/wp-content/plugins/inspirational-quote-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inspirational-quote-rotator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inspirational-quote-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inspirational-quote-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/insta-gallery-a977aa9a4c9e6ea956efab1274f3c128.yaml b/nuclei-templates/cve-less/plugins/insta-gallery-a977aa9a4c9e6ea956efab1274f3c128.yaml new file mode 100644 index 0000000000..9f11d36225 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/insta-gallery-a977aa9a4c9e6ea956efab1274f3c128.yaml @@ -0,0 +1,58 @@ +id: insta-gallery-a977aa9a4c9e6ea956efab1274f3c128 + +info: + name: > + Social Feed Gallery <= 2.4.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/442252f8-2896-44ba-a19c-d153b03b268b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/insta-gallery/" + google-query: inurl:"/wp-content/plugins/insta-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,insta-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/insta-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "insta-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-feed-0dd37aac0a819da40009a99efded6eee.yaml b/nuclei-templates/cve-less/plugins/instagram-feed-0dd37aac0a819da40009a99efded6eee.yaml new file mode 100644 index 0000000000..39160ee26e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-feed-0dd37aac0a819da40009a99efded6eee.yaml @@ -0,0 +1,58 @@ +id: instagram-feed-0dd37aac0a819da40009a99efded6eee + +info: + name: > + Smash Balloon Social Photo Feed <= 1.11.3 - Cross-Site Request Forgery to Back-Up Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c307340-2911-46b9-9c90-0a7ebad8a0e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-feed/" + google-query: inurl:"/wp-content/plugins/instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-feed-3b223b70daf0d7ac552ca602835403d8.yaml b/nuclei-templates/cve-less/plugins/instagram-feed-3b223b70daf0d7ac552ca602835403d8.yaml new file mode 100644 index 0000000000..945f818d2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-feed-3b223b70daf0d7ac552ca602835403d8.yaml @@ -0,0 +1,58 @@ +id: instagram-feed-3b223b70daf0d7ac552ca602835403d8 + +info: + name: > + Smash Balloon Social Photo Feed <= 1.4.6.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/062f5bc7-9d53-4a28-b603-9901ce2175d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-feed/" + google-query: inurl:"/wp-content/plugins/instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-feed-92423e2553300e9755a17988ed907ec5.yaml b/nuclei-templates/cve-less/plugins/instagram-feed-92423e2553300e9755a17988ed907ec5.yaml new file mode 100644 index 0000000000..41aab45d27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-feed-92423e2553300e9755a17988ed907ec5.yaml @@ -0,0 +1,58 @@ +id: instagram-feed-92423e2553300e9755a17988ed907ec5 + +info: + name: > + Smash Balloon Social Photo Feed <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8247c654-0082-4677-a0a6-b90a0256de81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-feed/" + google-query: inurl:"/wp-content/plugins/instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-feed-ac43cf44566479227a4aa05f1f51c953.yaml b/nuclei-templates/cve-less/plugins/instagram-feed-ac43cf44566479227a4aa05f1f51c953.yaml new file mode 100644 index 0000000000..4b3dc540fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-feed-ac43cf44566479227a4aa05f1f51c953.yaml @@ -0,0 +1,58 @@ +id: instagram-feed-ac43cf44566479227a4aa05f1f51c953 + +info: + name: > + Smash Balloon Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0efff314-b14f-4af4-b225-ba7e41d01b2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-feed/" + google-query: inurl:"/wp-content/plugins/instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-for-wordpress-b915266e3686714da03f11dc90c6893b.yaml b/nuclei-templates/cve-less/plugins/instagram-for-wordpress-b915266e3686714da03f11dc90c6893b.yaml new file mode 100644 index 0000000000..6119e05f51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-for-wordpress-b915266e3686714da03f11dc90c6893b.yaml @@ -0,0 +1,58 @@ +id: instagram-for-wordpress-b915266e3686714da03f11dc90c6893b + +info: + name: > + Instagram for WordPress <= 2.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3991d8d0-57a8-42e7-a53c-97508f7e137f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-for-wordpress/" + google-query: inurl:"/wp-content/plugins/instagram-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-slider-widget-10d8aab37d3fb12eedaaa7fee9be8657.yaml b/nuclei-templates/cve-less/plugins/instagram-slider-widget-10d8aab37d3fb12eedaaa7fee9be8657.yaml new file mode 100644 index 0000000000..a8ea738566 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-slider-widget-10d8aab37d3fb12eedaaa7fee9be8657.yaml @@ -0,0 +1,58 @@ +id: instagram-slider-widget-10d8aab37d3fb12eedaaa7fee9be8657 + +info: + name: > + Social Slider Feed <= 2.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b71eae9-9727-49c9-9926-85689286983f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-slider-widget/" + google-query: inurl:"/wp-content/plugins/instagram-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-slider-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-slider-widget-645aa6781f30864a3df503fc267b46f0.yaml b/nuclei-templates/cve-less/plugins/instagram-slider-widget-645aa6781f30864a3df503fc267b46f0.yaml new file mode 100644 index 0000000000..7580c1f8c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-slider-widget-645aa6781f30864a3df503fc267b46f0.yaml @@ -0,0 +1,58 @@ +id: instagram-slider-widget-645aa6781f30864a3df503fc267b46f0 + +info: + name: > + Social Slider Feed <= 2.0.4 - Missing Authorization to Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c63eaea-0a0f-412b-9f1a-3091de3a653a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-slider-widget/" + google-query: inurl:"/wp-content/plugins/instagram-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-slider-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-slider-widget-965089db43408987ba593ca76bdc2587.yaml b/nuclei-templates/cve-less/plugins/instagram-slider-widget-965089db43408987ba593ca76bdc2587.yaml new file mode 100644 index 0000000000..a7b5e7a07f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-slider-widget-965089db43408987ba593ca76bdc2587.yaml @@ -0,0 +1,58 @@ +id: instagram-slider-widget-965089db43408987ba593ca76bdc2587 + +info: + name: > + Social Slider Widget <= 1.8.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed40b50b-7d70-4abf-8895-2bf891124bae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-slider-widget/" + google-query: inurl:"/wp-content/plugins/instagram-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-slider-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-slider-widget-c1eea16a6a1e7ef59fb346fe87d0a93d.yaml b/nuclei-templates/cve-less/plugins/instagram-slider-widget-c1eea16a6a1e7ef59fb346fe87d0a93d.yaml new file mode 100644 index 0000000000..f07d96e0f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-slider-widget-c1eea16a6a1e7ef59fb346fe87d0a93d.yaml @@ -0,0 +1,58 @@ +id: instagram-slider-widget-c1eea16a6a1e7ef59fb346fe87d0a93d + +info: + name: > + Social Slider Feed <= 2.0.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2e2f446-5391-4189-8c9c-3be2459808d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-slider-widget/" + google-query: inurl:"/wp-content/plugins/instagram-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-slider-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-slider-widget-c4bb8ef855ed7d5677231037db6f41b0.yaml b/nuclei-templates/cve-less/plugins/instagram-slider-widget-c4bb8ef855ed7d5677231037db6f41b0.yaml new file mode 100644 index 0000000000..2bb2306e1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-slider-widget-c4bb8ef855ed7d5677231037db6f41b0.yaml @@ -0,0 +1,58 @@ +id: instagram-slider-widget-c4bb8ef855ed7d5677231037db6f41b0 + +info: + name: > + Social Slider Feed <= 2.0.4 - Authenticated (Scubscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44b2d11d-e876-433e-9e0d-5e9f2b3c0c80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-slider-widget/" + google-query: inurl:"/wp-content/plugins/instagram-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-slider-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-slider-widget-d922f6e78e39c496155eaa17b9a13762.yaml b/nuclei-templates/cve-less/plugins/instagram-slider-widget-d922f6e78e39c496155eaa17b9a13762.yaml new file mode 100644 index 0000000000..287a8c7d36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-slider-widget-d922f6e78e39c496155eaa17b9a13762.yaml @@ -0,0 +1,58 @@ +id: instagram-slider-widget-d922f6e78e39c496155eaa17b9a13762 + +info: + name: > + Social Slider Feed <= 2.0.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f699d49-738f-49f0-ab1a-f43645a32c90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-slider-widget/" + google-query: inurl:"/wp-content/plugins/instagram-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-slider-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-slider-widget-da62044dc6f8ab5a6043df4bc628475e.yaml b/nuclei-templates/cve-less/plugins/instagram-slider-widget-da62044dc6f8ab5a6043df4bc628475e.yaml new file mode 100644 index 0000000000..1c83991132 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-slider-widget-da62044dc6f8ab5a6043df4bc628475e.yaml @@ -0,0 +1,58 @@ +id: instagram-slider-widget-da62044dc6f8ab5a6043df4bc628475e + +info: + name: > + Social Slider Feed <= 2.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/391d65a7-1675-4eae-b129-a1208cd95669?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-slider-widget/" + google-query: inurl:"/wp-content/plugins/instagram-slider-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-slider-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-slider-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-slider-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagram-widget-by-wpzoom-76fc4346fbb39fa45316aca65b7d5177.yaml b/nuclei-templates/cve-less/plugins/instagram-widget-by-wpzoom-76fc4346fbb39fa45316aca65b7d5177.yaml new file mode 100644 index 0000000000..81622451c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagram-widget-by-wpzoom-76fc4346fbb39fa45316aca65b7d5177.yaml @@ -0,0 +1,58 @@ +id: instagram-widget-by-wpzoom-76fc4346fbb39fa45316aca65b7d5177 + +info: + name: > + WPZOOM Social Feed Widget & Block <= 2.1.13 - Missing Authorization to Authenticated (Subscriber+) Instagram Image Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3a70510-51c8-49c3-933b-79e79dfb8611?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagram-widget-by-wpzoom/" + google-query: inurl:"/wp-content/plugins/instagram-widget-by-wpzoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagram-widget-by-wpzoom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagram-widget-by-wpzoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagram-widget-by-wpzoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instagrate-to-wordpress-87fe64aef58d57af2256ba27b8518630.yaml b/nuclei-templates/cve-less/plugins/instagrate-to-wordpress-87fe64aef58d57af2256ba27b8518630.yaml new file mode 100644 index 0000000000..90b3c72895 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instagrate-to-wordpress-87fe64aef58d57af2256ba27b8518630.yaml @@ -0,0 +1,58 @@ +id: instagrate-to-wordpress-87fe64aef58d57af2256ba27b8518630 + +info: + name: > + Intagrate Lite <= 1.3.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bef1d842-5e04-47ea-b318-55f94c941be0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instagrate-to-wordpress/" + google-query: inurl:"/wp-content/plugins/instagrate-to-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instagrate-to-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instagrate-to-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instagrate-to-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instalinker-73153b823b9be5fe13ce41cd22919fc2.yaml b/nuclei-templates/cve-less/plugins/instalinker-73153b823b9be5fe13ce41cd22919fc2.yaml new file mode 100644 index 0000000000..e98bacb2a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instalinker-73153b823b9be5fe13ce41cd22919fc2.yaml @@ -0,0 +1,58 @@ +id: instalinker-73153b823b9be5fe13ce41cd22919fc2 + +info: + name: > + Elfsight Instagram Widget – Instagram Gallery < 1.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee13ee9a-dd53-4124-a7e9-679afe362f58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instalinker/" + google-query: inurl:"/wp-content/plugins/instalinker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instalinker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instalinker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instalinker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instant-css-0dab0a18a0d2f3a2ca1ecadfb8dd6931.yaml b/nuclei-templates/cve-less/plugins/instant-css-0dab0a18a0d2f3a2ca1ecadfb8dd6931.yaml new file mode 100644 index 0000000000..effeb1df42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instant-css-0dab0a18a0d2f3a2ca1ecadfb8dd6931.yaml @@ -0,0 +1,58 @@ +id: instant-css-0dab0a18a0d2f3a2ca1ecadfb8dd6931 + +info: + name: > + Instant CSS <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30ce93b4-9e2a-4a8c-8590-ffd61d618d31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instant-css/" + google-query: inurl:"/wp-content/plugins/instant-css/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instant-css,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instant-css/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instant-css" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instant-css-417113d5b23fd45edbcf8209f3cff8e9.yaml b/nuclei-templates/cve-less/plugins/instant-css-417113d5b23fd45edbcf8209f3cff8e9.yaml new file mode 100644 index 0000000000..22a5eafb0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instant-css-417113d5b23fd45edbcf8209f3cff8e9.yaml @@ -0,0 +1,58 @@ +id: instant-css-417113d5b23fd45edbcf8209f3cff8e9 + +info: + name: > + Instant CSS <= 1.1.4 - Missing Authorization via AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b82a9ae8-ff82-40bf-a5d4-5175daab9146?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instant-css/" + google-query: inurl:"/wp-content/plugins/instant-css/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instant-css,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instant-css/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instant-css" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instant-images-4c925e8fe2ce8185ac5a57769f1ea714.yaml b/nuclei-templates/cve-less/plugins/instant-images-4c925e8fe2ce8185ac5a57769f1ea714.yaml new file mode 100644 index 0000000000..08784ac1ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instant-images-4c925e8fe2ce8185ac5a57769f1ea714.yaml @@ -0,0 +1,58 @@ +id: instant-images-4c925e8fe2ce8185ac5a57769f1ea714 + +info: + name: > + Instant Images – One Click Unsplash, Pixabay and Pexels Uploads <= 4.4.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b75da76-1a58-4f8e-9b4f-d2e40d09f9ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instant-images/" + google-query: inurl:"/wp-content/plugins/instant-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instant-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instant-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instant-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instant-images-c57f6caa20d50f7b5d4102cef52235b3.yaml b/nuclei-templates/cve-less/plugins/instant-images-c57f6caa20d50f7b5d4102cef52235b3.yaml new file mode 100644 index 0000000000..3d76ce9e62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instant-images-c57f6caa20d50f7b5d4102cef52235b3.yaml @@ -0,0 +1,58 @@ +id: instant-images-c57f6caa20d50f7b5d4102cef52235b3 + +info: + name: > + Instant Images <= 5.1.0.1 - Authenticated (Author+) Server-Side Request Forgery via instant_images_download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a50e142-59f4-488b-8120-5bf505a9039d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instant-images/" + google-query: inurl:"/wp-content/plugins/instant-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instant-images,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instant-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instant-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instant-images-f64da1b37b4c50e68b9872eff4ca509b.yaml b/nuclei-templates/cve-less/plugins/instant-images-f64da1b37b4c50e68b9872eff4ca509b.yaml new file mode 100644 index 0000000000..c37e87383f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instant-images-f64da1b37b4c50e68b9872eff4ca509b.yaml @@ -0,0 +1,58 @@ +id: instant-images-f64da1b37b4c50e68b9872eff4ca509b + +info: + name: > + Instant Images <= 6.1.0 - Authenticated (Author+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17941fbb-c5da-4f5c-a617-3792eb4ef395?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instant-images/" + google-query: inurl:"/wp-content/plugins/instant-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instant-images,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instant-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instant-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instantio-09460681bc2a62e560d71252df4526a5.yaml b/nuclei-templates/cve-less/plugins/instantio-09460681bc2a62e560d71252df4526a5.yaml new file mode 100644 index 0000000000..90f5d6b8ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instantio-09460681bc2a62e560d71252df4526a5.yaml @@ -0,0 +1,58 @@ +id: instantio-09460681bc2a62e560d71252df4526a5 + +info: + name: > + Instantio – WooCommerce Quick Checkout | Instant Checkout, Side Cart & Popup Cart <= 1.2.5 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7f82847-433d-49b1-815d-b0d9e70068c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instantio/" + google-query: inurl:"/wp-content/plugins/instantio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instantio,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instantio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instantio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instasqueeze-be25df600efc2e679e203dcc1fd3ddd8.yaml b/nuclei-templates/cve-less/plugins/instasqueeze-be25df600efc2e679e203dcc1fd3ddd8.yaml new file mode 100644 index 0000000000..39c29ff7ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instasqueeze-be25df600efc2e679e203dcc1fd3ddd8.yaml @@ -0,0 +1,58 @@ +id: instasqueeze-be25df600efc2e679e203dcc1fd3ddd8 + +info: + name: > + InstaSqueeze Sexy Squeeze Pages (All Known Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b94952-229c-4336-a985-d2f47c89f7de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instasqueeze/" + google-query: inurl:"/wp-content/plugins/instasqueeze/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instasqueeze,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instasqueeze/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instasqueeze" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instawp-connect-01cdcfbe9023d856c9c893d0a0c324ac.yaml b/nuclei-templates/cve-less/plugins/instawp-connect-01cdcfbe9023d856c9c893d0a0c324ac.yaml new file mode 100644 index 0000000000..2d41568956 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instawp-connect-01cdcfbe9023d856c9c893d0a0c324ac.yaml @@ -0,0 +1,58 @@ +id: instawp-connect-01cdcfbe9023d856c9c893d0a0c324ac + +info: + name: > + InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.22 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6aead8d-c136-4952-ad03-86fe0f144dea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instawp-connect/" + google-query: inurl:"/wp-content/plugins/instawp-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instawp-connect,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instawp-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instawp-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instawp-connect-124137503555ee97714094a30a8333d0.yaml b/nuclei-templates/cve-less/plugins/instawp-connect-124137503555ee97714094a30a8333d0.yaml new file mode 100644 index 0000000000..0b900c4ee1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instawp-connect-124137503555ee97714094a30a8333d0.yaml @@ -0,0 +1,58 @@ +id: instawp-connect-124137503555ee97714094a30a8333d0 + +info: + name: > + InstaWP Connect <= 0.1.0.9 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/578cf704-e84d-469f-bf26-e60268506a78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instawp-connect/" + google-query: inurl:"/wp-content/plugins/instawp-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instawp-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instawp-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instawp-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instawp-connect-18e3fa8b070375c158cc068ed4175205.yaml b/nuclei-templates/cve-less/plugins/instawp-connect-18e3fa8b070375c158cc068ed4175205.yaml new file mode 100644 index 0000000000..1ad55f14b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instawp-connect-18e3fa8b070375c158cc068ed4175205.yaml @@ -0,0 +1,58 @@ +id: instawp-connect-18e3fa8b070375c158cc068ed4175205 + +info: + name: > + InstaWP Connect <= 0.1.0.8 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aa4fd08-a1b1-4f61-a9d1-9812071b61c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instawp-connect/" + google-query: inurl:"/wp-content/plugins/instawp-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instawp-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instawp-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instawp-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instawp-connect-26e6b2b2c87cae333c1a6a8f12b3eb26.yaml b/nuclei-templates/cve-less/plugins/instawp-connect-26e6b2b2c87cae333c1a6a8f12b3eb26.yaml new file mode 100644 index 0000000000..ed4c8da9ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instawp-connect-26e6b2b2c87cae333c1a6a8f12b3eb26.yaml @@ -0,0 +1,58 @@ +id: instawp-connect-26e6b2b2c87cae333c1a6a8f12b3eb26 + +info: + name: > + InstaWP Connect <= 0.1.0.24 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b2a10b6-e7dc-47c7-9f59-c4350d58b0d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instawp-connect/" + google-query: inurl:"/wp-content/plugins/instawp-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instawp-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instawp-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instawp-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instawp-connect-54fd19cb983e5e5bd13d627c9c0487ab.yaml b/nuclei-templates/cve-less/plugins/instawp-connect-54fd19cb983e5e5bd13d627c9c0487ab.yaml new file mode 100644 index 0000000000..ba5587c993 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instawp-connect-54fd19cb983e5e5bd13d627c9c0487ab.yaml @@ -0,0 +1,58 @@ +id: instawp-connect-54fd19cb983e5e5bd13d627c9c0487ab + +info: + name: > + InstaWP Connect <= 0.0.9.18 - Missing Authorization to Unauthenticated Post/Taxonomy/User Add/Change/Delete, Customizer Setting Change, Plugin Installation/Activation/Deactication via events_receiver + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instawp-connect/" + google-query: inurl:"/wp-content/plugins/instawp-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instawp-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instawp-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instawp-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.9.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instawp-connect-6e954d80cfdd10ddfc11dcc5cbf99755.yaml b/nuclei-templates/cve-less/plugins/instawp-connect-6e954d80cfdd10ddfc11dcc5cbf99755.yaml new file mode 100644 index 0000000000..b052a40160 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instawp-connect-6e954d80cfdd10ddfc11dcc5cbf99755.yaml @@ -0,0 +1,58 @@ +id: instawp-connect-6e954d80cfdd10ddfc11dcc5cbf99755 + +info: + name: > + InstaWP Connect <= 0.1.0.9 - Missing Authorization to Sensitive Information Dislcosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a184384-9162-4509-957b-d97dd4089856?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instawp-connect/" + google-query: inurl:"/wp-content/plugins/instawp-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instawp-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instawp-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instawp-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instawp-connect-bb8913e248b8c353b00d004e9ca5f930.yaml b/nuclei-templates/cve-less/plugins/instawp-connect-bb8913e248b8c353b00d004e9ca5f930.yaml new file mode 100644 index 0000000000..2d61e6fcf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instawp-connect-bb8913e248b8c353b00d004e9ca5f930.yaml @@ -0,0 +1,58 @@ +id: instawp-connect-bb8913e248b8c353b00d004e9ca5f930 + +info: + name: > + InstaWP Connect <= 0.1.0.8 - Authenticated (Subscriber+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a681cef-649f-4342-beb6-914674bbf6d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instawp-connect/" + google-query: inurl:"/wp-content/plugins/instawp-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instawp-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instawp-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instawp-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/instawp-connect-c2f1285e4dfc6b400991c24ccadd137a.yaml b/nuclei-templates/cve-less/plugins/instawp-connect-c2f1285e4dfc6b400991c24ccadd137a.yaml new file mode 100644 index 0000000000..66cca36c07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/instawp-connect-c2f1285e4dfc6b400991c24ccadd137a.yaml @@ -0,0 +1,58 @@ +id: instawp-connect-c2f1285e4dfc6b400991c24ccadd137a + +info: + name: > + InstaWP Connect <= 0.1.0.8 - Cross-Site Request Forgery via create_file_db_manager + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5954c35a-7d0a-4bc5-9cad-3223e7be56eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/instawp-connect/" + google-query: inurl:"/wp-content/plugins/instawp-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,instawp-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/instawp-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "instawp-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/institutions-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/institutions-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..457b4b5124 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/institutions-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: institutions-directory-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/institutions-directory/" + google-query: inurl:"/wp-content/plugins/institutions-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,institutions-directory,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/institutions-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "institutions-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integracao-rd-station-29636b68c2f3ab161e7a045474b91034.yaml b/nuclei-templates/cve-less/plugins/integracao-rd-station-29636b68c2f3ab161e7a045474b91034.yaml new file mode 100644 index 0000000000..5eeb1e46b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integracao-rd-station-29636b68c2f3ab161e7a045474b91034.yaml @@ -0,0 +1,58 @@ +id: integracao-rd-station-29636b68c2f3ab161e7a045474b91034 + +info: + name: > + RD Station <= 5.1.3 - Cross-Site Request Forgery to Plugin Log Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1465dbb6-1ec3-425f-9b7e-6dff6b120606?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integracao-rd-station/" + google-query: inurl:"/wp-content/plugins/integracao-rd-station/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integracao-rd-station,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integracao-rd-station/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integracao-rd-station" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integracao-rd-station-54337cab42839ec3b613ba98b54eca17.yaml b/nuclei-templates/cve-less/plugins/integracao-rd-station-54337cab42839ec3b613ba98b54eca17.yaml new file mode 100644 index 0000000000..cb68ff98b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integracao-rd-station-54337cab42839ec3b613ba98b54eca17.yaml @@ -0,0 +1,58 @@ +id: integracao-rd-station-54337cab42839ec3b613ba98b54eca17 + +info: + name: > + RD Station <= 5.2.0 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dad288b3-e599-460d-9b99-3bce04489557?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integracao-rd-station/" + google-query: inurl:"/wp-content/plugins/integracao-rd-station/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integracao-rd-station,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integracao-rd-station/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integracao-rd-station" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrar-getnet-con-woo-e39068416a4f471cfb854a8f2dd045d3.yaml b/nuclei-templates/cve-less/plugins/integrar-getnet-con-woo-e39068416a4f471cfb854a8f2dd045d3.yaml new file mode 100644 index 0000000000..5e03835876 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrar-getnet-con-woo-e39068416a4f471cfb854a8f2dd045d3.yaml @@ -0,0 +1,58 @@ +id: integrar-getnet-con-woo-e39068416a4f471cfb854a8f2dd045d3 + +info: + name: > + Getnet Argentina para Woocommerce 0.0.1 - 0.0.4 - Authorization Bypass via webhook + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/245e9117-ca63-458e-a094-60a759f5ec19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrar-getnet-con-woo/" + google-query: inurl:"/wp-content/plugins/integrar-getnet-con-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrar-getnet-con-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrar-getnet-con-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrar-getnet-con-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.0.1', '<= 0.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrate-google-drive-2143d39c6a447e17fa955c9d29e9190e.yaml b/nuclei-templates/cve-less/plugins/integrate-google-drive-2143d39c6a447e17fa955c9d29e9190e.yaml new file mode 100644 index 0000000000..f03556840f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrate-google-drive-2143d39c6a447e17fa955c9d29e9190e.yaml @@ -0,0 +1,58 @@ +id: integrate-google-drive-2143d39c6a447e17fa955c9d29e9190e + +info: + name: > + Integrate Google Drive <= 1.3.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e926467-51f5-4fb4-a9d8-3cb72f212cd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrate-google-drive/" + google-query: inurl:"/wp-content/plugins/integrate-google-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrate-google-drive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrate-google-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrate-google-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrate-google-drive-38e83b9a6a4293b21b59d418e1822477.yaml b/nuclei-templates/cve-less/plugins/integrate-google-drive-38e83b9a6a4293b21b59d418e1822477.yaml new file mode 100644 index 0000000000..1da7ef3d99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrate-google-drive-38e83b9a6a4293b21b59d418e1822477.yaml @@ -0,0 +1,58 @@ +id: integrate-google-drive-38e83b9a6a4293b21b59d418e1822477 + +info: + name: > + Integrate Google Drive <= 1.3.2 - Open Redirect via state + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bccceb2d-2087-4ee6-8118-eb3fb53654dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrate-google-drive/" + google-query: inurl:"/wp-content/plugins/integrate-google-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrate-google-drive,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrate-google-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrate-google-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrate-google-drive-adb3487b4c23d4db1d3efcc4576dd222.yaml b/nuclei-templates/cve-less/plugins/integrate-google-drive-adb3487b4c23d4db1d3efcc4576dd222.yaml new file mode 100644 index 0000000000..de3607de9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrate-google-drive-adb3487b4c23d4db1d3efcc4576dd222.yaml @@ -0,0 +1,58 @@ +id: integrate-google-drive-adb3487b4c23d4db1d3efcc4576dd222 + +info: + name: > + Integrate Google Drive <= 1.1.99 - Missing Authorization via REST API Endpoints + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fe8b2c8-3bb1-463a-a64c-15d7bcc29985?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrate-google-drive/" + google-query: inurl:"/wp-content/plugins/integrate-google-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrate-google-drive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrate-google-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrate-google-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrate-google-drive-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/integrate-google-drive-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..97acc52826 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrate-google-drive-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: integrate-google-drive-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrate-google-drive/" + google-query: inurl:"/wp-content/plugins/integrate-google-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrate-google-drive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrate-google-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrate-google-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrate-google-drive-c380050a7e76482fb19d38cf49fcde28.yaml b/nuclei-templates/cve-less/plugins/integrate-google-drive-c380050a7e76482fb19d38cf49fcde28.yaml new file mode 100644 index 0000000000..f446f89ba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrate-google-drive-c380050a7e76482fb19d38cf49fcde28.yaml @@ -0,0 +1,58 @@ +id: integrate-google-drive-c380050a7e76482fb19d38cf49fcde28 + +info: + name: > + Integrate Google Drive <= 1.3.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44579fe8-4004-4608-b2fd-3531b14e6e69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrate-google-drive/" + google-query: inurl:"/wp-content/plugins/integrate-google-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrate-google-drive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrate-google-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrate-google-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrate-google-drive-cf6efc26f721b1dd6c09ef244ad0a9a5.yaml b/nuclei-templates/cve-less/plugins/integrate-google-drive-cf6efc26f721b1dd6c09ef244ad0a9a5.yaml new file mode 100644 index 0000000000..2d868d5f51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrate-google-drive-cf6efc26f721b1dd6c09ef244ad0a9a5.yaml @@ -0,0 +1,58 @@ +id: integrate-google-drive-cf6efc26f721b1dd6c09ef244ad0a9a5 + +info: + name: > + Integrate Google Drive <= 1.3.3 - Missing Authorization via save_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4c8d390-145a-4926-99e9-b386dfe5e6ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrate-google-drive/" + google-query: inurl:"/wp-content/plugins/integrate-google-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrate-google-drive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrate-google-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrate-google-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrate-google-drive-d69e956d6cb0947d53013e6316065cae.yaml b/nuclei-templates/cve-less/plugins/integrate-google-drive-d69e956d6cb0947d53013e6316065cae.yaml new file mode 100644 index 0000000000..72dde95a99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrate-google-drive-d69e956d6cb0947d53013e6316065cae.yaml @@ -0,0 +1,58 @@ +id: integrate-google-drive-d69e956d6cb0947d53013e6316065cae + +info: + name: > + Integrate Google Drive <= 1.3.8 - Missing Authorization to Unauthenticated Settings Modification and Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a303c798-c206-426a-9a96-263c8c069bdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrate-google-drive/" + google-query: inurl:"/wp-content/plugins/integrate-google-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrate-google-drive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrate-google-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrate-google-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integrate-google-drive-ff1168e2daec3177aba99d51eda07164.yaml b/nuclei-templates/cve-less/plugins/integrate-google-drive-ff1168e2daec3177aba99d51eda07164.yaml new file mode 100644 index 0000000000..9b6b54e948 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integrate-google-drive-ff1168e2daec3177aba99d51eda07164.yaml @@ -0,0 +1,58 @@ +id: integrate-google-drive-ff1168e2daec3177aba99d51eda07164 + +info: + name: > + Integrate Google Drive <= 1.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39c53cd7-3ea3-4971-be51-9544ca9d488f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integrate-google-drive/" + google-query: inurl:"/wp-content/plugins/integrate-google-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integrate-google-drive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integrate-google-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integrate-google-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-dynamics-0bafef3453580e19c740978e87d842b6.yaml b/nuclei-templates/cve-less/plugins/integration-dynamics-0bafef3453580e19c740978e87d842b6.yaml new file mode 100644 index 0000000000..19ed16d2b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-dynamics-0bafef3453580e19c740978e87d842b6.yaml @@ -0,0 +1,58 @@ +id: integration-dynamics-0bafef3453580e19c740978e87d842b6 + +info: + name: > + Dynamics 365 Integration <= 1.3.13 - Missing Authorization via init + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01cc3955-ef2f-4e2b-8dc6-b26f5a3d2f89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-dynamics/" + google-query: inurl:"/wp-content/plugins/integration-dynamics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-dynamics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-dynamics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-dynamics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-dynamics-0cdb0f49e1ffa1eb7fca32892dfdaa0f.yaml b/nuclei-templates/cve-less/plugins/integration-dynamics-0cdb0f49e1ffa1eb7fca32892dfdaa0f.yaml new file mode 100644 index 0000000000..18859b76a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-dynamics-0cdb0f49e1ffa1eb7fca32892dfdaa0f.yaml @@ -0,0 +1,58 @@ +id: integration-dynamics-0cdb0f49e1ffa1eb7fca32892dfdaa0f + +info: + name: > + Dynamics 365 Integration <= 1.3.12 - Cross-Site Request Forgery via wp_ajax_wpcrm_log_verbosity + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98e0d103-2369-4c6a-93ae-6be2a1770bae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-dynamics/" + google-query: inurl:"/wp-content/plugins/integration-dynamics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-dynamics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-dynamics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-dynamics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-dynamics-690b7012c329e2797db5ca1ec55c54f1.yaml b/nuclei-templates/cve-less/plugins/integration-dynamics-690b7012c329e2797db5ca1ec55c54f1.yaml new file mode 100644 index 0000000000..c381b525d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-dynamics-690b7012c329e2797db5ca1ec55c54f1.yaml @@ -0,0 +1,58 @@ +id: integration-dynamics-690b7012c329e2797db5ca1ec55c54f1 + +info: + name: > + Dynamics 365 Integration <= 1.3.12 - Cross-Site Request Forgery via wp_ajax_wpcrm_log + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7945110e-2a9d-4e0e-b0e8-77c16694993b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-dynamics/" + google-query: inurl:"/wp-content/plugins/integration-dynamics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-dynamics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-dynamics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-dynamics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-dynamics-9d49312a2bc1a33dff873907673334c5.yaml b/nuclei-templates/cve-less/plugins/integration-dynamics-9d49312a2bc1a33dff873907673334c5.yaml new file mode 100644 index 0000000000..4d032bc55f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-dynamics-9d49312a2bc1a33dff873907673334c5.yaml @@ -0,0 +1,58 @@ +id: integration-dynamics-9d49312a2bc1a33dff873907673334c5 + +info: + name: > + Dynamics 365 Integration <= 1.3.12 - Missing Authorization via wp_ajax_wpcrm_log & wp_ajax_wpcrm_log_verbosity + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1671e437-09f0-46bc-87ef-3a5712c3dc98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-dynamics/" + google-query: inurl:"/wp-content/plugins/integration-dynamics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-dynamics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-dynamics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-dynamics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-for-billingo-gravity-forms-ed2236ee570598966dd60e4e75f31def.yaml b/nuclei-templates/cve-less/plugins/integration-for-billingo-gravity-forms-ed2236ee570598966dd60e4e75f31def.yaml new file mode 100644 index 0000000000..05fada1e72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-for-billingo-gravity-forms-ed2236ee570598966dd60e4e75f31def.yaml @@ -0,0 +1,58 @@ +id: integration-for-billingo-gravity-forms-ed2236ee570598966dd60e4e75f31def + +info: + name: > + Multiple Plugins from Viszt Peter - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f70a2a58-d9b8-456d-ae4f-9c60b3d6b8a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-for-billingo-gravity-forms/" + google-query: inurl:"/wp-content/plugins/integration-for-billingo-gravity-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-for-billingo-gravity-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-for-billingo-gravity-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-for-billingo-gravity-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-for-contact-form-7-and-pipedrive-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/integration-for-contact-form-7-and-pipedrive-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..2600c6ce4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-for-contact-form-7-and-pipedrive-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: integration-for-contact-form-7-and-pipedrive-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-for-contact-form-7-and-pipedrive/" + google-query: inurl:"/wp-content/plugins/integration-for-contact-form-7-and-pipedrive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-for-contact-form-7-and-pipedrive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-for-contact-form-7-and-pipedrive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-for-contact-form-7-and-pipedrive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-for-gravity-forms-and-pipedrive-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/integration-for-gravity-forms-and-pipedrive-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..904fa74c1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-for-gravity-forms-and-pipedrive-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: integration-for-gravity-forms-and-pipedrive-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-for-gravity-forms-and-pipedrive/" + google-query: inurl:"/wp-content/plugins/integration-for-gravity-forms-and-pipedrive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-for-gravity-forms-and-pipedrive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-for-gravity-forms-and-pipedrive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-for-gravity-forms-and-pipedrive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-for-szamlazz-hu-gravity-forms-ed2236ee570598966dd60e4e75f31def.yaml b/nuclei-templates/cve-less/plugins/integration-for-szamlazz-hu-gravity-forms-ed2236ee570598966dd60e4e75f31def.yaml new file mode 100644 index 0000000000..a7b26e7006 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-for-szamlazz-hu-gravity-forms-ed2236ee570598966dd60e4e75f31def.yaml @@ -0,0 +1,58 @@ +id: integration-for-szamlazz-hu-gravity-forms-ed2236ee570598966dd60e4e75f31def + +info: + name: > + Multiple Plugins from Viszt Peter - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f70a2a58-d9b8-456d-ae4f-9c60b3d6b8a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-for-szamlazz-hu-gravity-forms/" + google-query: inurl:"/wp-content/plugins/integration-for-szamlazz-hu-gravity-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-for-szamlazz-hu-gravity-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-for-szamlazz-hu-gravity-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-for-szamlazz-hu-gravity-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-for-szamlazzhu-woocommerce-f7bbd778de1c9c53d31f5ab55d2c4192.yaml b/nuclei-templates/cve-less/plugins/integration-for-szamlazzhu-woocommerce-f7bbd778de1c9c53d31f5ab55d2c4192.yaml new file mode 100644 index 0000000000..378824f91d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-for-szamlazzhu-woocommerce-f7bbd778de1c9c53d31f5ab55d2c4192.yaml @@ -0,0 +1,58 @@ +id: integration-for-szamlazzhu-woocommerce-f7bbd778de1c9c53d31f5ab55d2c4192 + +info: + name: > + Integration for Szamlazz.hu & WooCommerce <= 5.6.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5eafb620-f5dd-4e60-b9a6-859832ae706c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-for-szamlazzhu-woocommerce/" + google-query: inurl:"/wp-content/plugins/integration-for-szamlazzhu-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-for-szamlazzhu-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-for-szamlazzhu-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-for-szamlazzhu-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integration-of-capsule-crm-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/integration-of-capsule-crm-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..06dfad19e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integration-of-capsule-crm-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: integration-of-capsule-crm-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integration-of-capsule-crm-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/integration-of-capsule-crm-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integration-of-capsule-crm-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integration-of-capsule-crm-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integration-of-capsule-crm-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integromat-connector-4f39f823882301049a61a7a769c354a9.yaml b/nuclei-templates/cve-less/plugins/integromat-connector-4f39f823882301049a61a7a769c354a9.yaml new file mode 100644 index 0000000000..c813e0bc34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integromat-connector-4f39f823882301049a61a7a769c354a9.yaml @@ -0,0 +1,58 @@ +id: integromat-connector-4f39f823882301049a61a7a769c354a9 + +info: + name: > + Make, formerly Integromat Connector <= 1.5.2 - Authenticated (Subscriber+) Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f7b0a1c-16d7-45db-b419-569ed5c4a5e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integromat-connector/" + google-query: inurl:"/wp-content/plugins/integromat-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integromat-connector,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integromat-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integromat-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/integromat-connector-62a6954a02895633b5b6c39ba9526043.yaml b/nuclei-templates/cve-less/plugins/integromat-connector-62a6954a02895633b5b6c39ba9526043.yaml new file mode 100644 index 0000000000..b638ffffef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/integromat-connector-62a6954a02895633b5b6c39ba9526043.yaml @@ -0,0 +1,58 @@ +id: integromat-connector-62a6954a02895633b5b6c39ba9526043 + +info: + name: > + Make, formerly Integromat Connector <= 1.5.1 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12b4d9e6-761f-4857-a701-7d22d4ee0288?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/integromat-connector/" + google-query: inurl:"/wp-content/plugins/integromat-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,integromat-connector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/integromat-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "integromat-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intelly-related-posts-8c51431cbfaf267d31cca7fde89367e4.yaml b/nuclei-templates/cve-less/plugins/intelly-related-posts-8c51431cbfaf267d31cca7fde89367e4.yaml new file mode 100644 index 0000000000..00a7393284 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intelly-related-posts-8c51431cbfaf267d31cca7fde89367e4.yaml @@ -0,0 +1,58 @@ +id: intelly-related-posts-8c51431cbfaf267d31cca7fde89367e4 + +info: + name: > + Inline Related Posts <= 3.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c17ef8db-98ea-47b0-8d7f-b2b3f01bf6ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intelly-related-posts/" + google-query: inurl:"/wp-content/plugins/intelly-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intelly-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intelly-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intelly-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intelly-related-posts-b1a9125711cb68f9ebd1c9d6ec3312c5.yaml b/nuclei-templates/cve-less/plugins/intelly-related-posts-b1a9125711cb68f9ebd1c9d6ec3312c5.yaml new file mode 100644 index 0000000000..9103d44c35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intelly-related-posts-b1a9125711cb68f9ebd1c9d6ec3312c5.yaml @@ -0,0 +1,58 @@ +id: intelly-related-posts-b1a9125711cb68f9ebd1c9d6ec3312c5 + +info: + name: > + Inline Related Posts <= 3.0.4 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2505ffdd-d697-4c69-8f75-0bc4d09e1b1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intelly-related-posts/" + google-query: inurl:"/wp-content/plugins/intelly-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intelly-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intelly-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intelly-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intelly-related-posts-b76f091c58ac292a18fb46e2a8af44ec.yaml b/nuclei-templates/cve-less/plugins/intelly-related-posts-b76f091c58ac292a18fb46e2a8af44ec.yaml new file mode 100644 index 0000000000..f471406bb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intelly-related-posts-b76f091c58ac292a18fb46e2a8af44ec.yaml @@ -0,0 +1,58 @@ +id: intelly-related-posts-b76f091c58ac292a18fb46e2a8af44ec + +info: + name: > + Inline Related Posts <= 3.4.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dc1a20a-6e7e-4f5c-b0a0-cc79d6e4b0c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intelly-related-posts/" + google-query: inurl:"/wp-content/plugins/intelly-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intelly-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intelly-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intelly-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intelly-related-posts-defb0310eaae752bbe598525a0823968.yaml b/nuclei-templates/cve-less/plugins/intelly-related-posts-defb0310eaae752bbe598525a0823968.yaml new file mode 100644 index 0000000000..0ecf855e2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intelly-related-posts-defb0310eaae752bbe598525a0823968.yaml @@ -0,0 +1,58 @@ +id: intelly-related-posts-defb0310eaae752bbe598525a0823968 + +info: + name: > + Inline Related Posts <= 3.5.0 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9318d57-499b-4804-8f83-1e4a68c5790f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intelly-related-posts/" + google-query: inurl:"/wp-content/plugins/intelly-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intelly-related-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intelly-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intelly-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intelly-welcome-bar-43e66df1f9172a258f7b4833c10ba64c.yaml b/nuclei-templates/cve-less/plugins/intelly-welcome-bar-43e66df1f9172a258f7b4833c10ba64c.yaml new file mode 100644 index 0000000000..ff7fd2c883 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intelly-welcome-bar-43e66df1f9172a258f7b4833c10ba64c.yaml @@ -0,0 +1,58 @@ +id: intelly-welcome-bar-43e66df1f9172a258f7b4833c10ba64c + +info: + name: > + Welcome Bar <= 2.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98730677-200b-4b1a-8568-7af8b2b0e94b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intelly-welcome-bar/" + google-query: inurl:"/wp-content/plugins/intelly-welcome-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intelly-welcome-bar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intelly-welcome-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intelly-welcome-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intelly-welcome-bar-a6bda315d152fc26cd48ceee633dd87d.yaml b/nuclei-templates/cve-less/plugins/intelly-welcome-bar-a6bda315d152fc26cd48ceee633dd87d.yaml new file mode 100644 index 0000000000..f5df4e478c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intelly-welcome-bar-a6bda315d152fc26cd48ceee633dd87d.yaml @@ -0,0 +1,58 @@ +id: intelly-welcome-bar-a6bda315d152fc26cd48ceee633dd87d + +info: + name: > + Welcome Bar <= 2.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82a26836-44fc-47cf-ad09-bd3d264e8635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intelly-welcome-bar/" + google-query: inurl:"/wp-content/plugins/intelly-welcome-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intelly-welcome-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intelly-welcome-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intelly-welcome-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interact-quiz-embed-8e5650d777bfcceefcb0d09b97742288.yaml b/nuclei-templates/cve-less/plugins/interact-quiz-embed-8e5650d777bfcceefcb0d09b97742288.yaml new file mode 100644 index 0000000000..34f9086b8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interact-quiz-embed-8e5650d777bfcceefcb0d09b97742288.yaml @@ -0,0 +1,58 @@ +id: interact-quiz-embed-8e5650d777bfcceefcb0d09b97742288 + +info: + name: > + Interact: Embed A Quiz On Your Site <= 3.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69ba1a39-ddb0-4661-8104-d8bb71710e0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interact-quiz-embed/" + google-query: inurl:"/wp-content/plugins/interact-quiz-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interact-quiz-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interact-quiz-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interact-quiz-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-62c7b160f34bc3f3dc184557c1c06a9e.yaml b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-62c7b160f34bc3f3dc184557c1c06a9e.yaml new file mode 100644 index 0000000000..e206bcf5ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-62c7b160f34bc3f3dc184557c1c06a9e.yaml @@ -0,0 +1,58 @@ +id: interactive-3d-flipbook-powered-physics-engine-62c7b160f34bc3f3dc184557c1c06a9e + +info: + name: > + 3D FlipBook <= 1.15.4 - Authenticated (Author+) Stored Cross-Site Scritping via Bookmark URL + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/016462cf-abe9-4c90-abd2-b5bb69348d7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + google-query: inurl:"/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-3d-flipbook-powered-physics-engine,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-3d-flipbook-powered-physics-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-6daeff7e508f05aeef343934c15a7178.yaml b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-6daeff7e508f05aeef343934c15a7178.yaml new file mode 100644 index 0000000000..ae270a5907 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-6daeff7e508f05aeef343934c15a7178.yaml @@ -0,0 +1,58 @@ +id: interactive-3d-flipbook-powered-physics-engine-6daeff7e508f05aeef343934c15a7178 + +info: + name: > + 3D FlipBook <= 1.12.0 - Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15d66a77-d650-4209-9ad4-b2e157cd123a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + google-query: inurl:"/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-3d-flipbook-powered-physics-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-3d-flipbook-powered-physics-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-d37560ff6c6a3603574d27509821e565.yaml b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-d37560ff6c6a3603574d27509821e565.yaml new file mode 100644 index 0000000000..e196154c57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-d37560ff6c6a3603574d27509821e565.yaml @@ -0,0 +1,58 @@ +id: interactive-3d-flipbook-powered-physics-engine-d37560ff6c6a3603574d27509821e565 + +info: + name: > + 3D Flipbook <= 1.15.2 - Authenticated (Contributor+) Cross-Site Scripting via Ready Function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/500fd8aa-9ad1-41ee-bbeb-cda9c80c4fcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + google-query: inurl:"/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-3d-flipbook-powered-physics-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-3d-flipbook-powered-physics-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-d875c7330364cd8c2a286deccf313956.yaml b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-d875c7330364cd8c2a286deccf313956.yaml new file mode 100644 index 0000000000..c5279577a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-d875c7330364cd8c2a286deccf313956.yaml @@ -0,0 +1,58 @@ +id: interactive-3d-flipbook-powered-physics-engine-d875c7330364cd8c2a286deccf313956 + +info: + name: > + 3D FlipBook <= 1.13.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4d11477-8a9a-42a0-aafd-5ef10ca5a349?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + google-query: inurl:"/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-3d-flipbook-powered-physics-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-3d-flipbook-powered-physics-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-f9ee3cd75d7f36da24c7816038266548.yaml b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-f9ee3cd75d7f36da24c7816038266548.yaml new file mode 100644 index 0000000000..d6a85bd1fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-3d-flipbook-powered-physics-engine-f9ee3cd75d7f36da24c7816038266548.yaml @@ -0,0 +1,58 @@ +id: interactive-3d-flipbook-powered-physics-engine-f9ee3cd75d7f36da24c7816038266548 + +info: + name: > + 3D FlipBook – PDF Flipbook WordPress <= 1.15.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Bookmarks + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/807eadff-b39e-4d7a-9b0a-06fc18a90626?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + google-query: inurl:"/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-3d-flipbook-powered-physics-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-3d-flipbook-powered-physics-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-3d-flipbook-powered-physics-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-geo-maps-18a9792159e3a4315eefb0545c165734.yaml b/nuclei-templates/cve-less/plugins/interactive-geo-maps-18a9792159e3a4315eefb0545c165734.yaml new file mode 100644 index 0000000000..343c1fcee2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-geo-maps-18a9792159e3a4315eefb0545c165734.yaml @@ -0,0 +1,58 @@ +id: interactive-geo-maps-18a9792159e3a4315eefb0545c165734 + +info: + name: > + Interactive Geo Maps <= 1.5.9 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95ce515a-377c-49b4-8d1b-7ac22769c759?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-geo-maps/" + google-query: inurl:"/wp-content/plugins/interactive-geo-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-geo-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-geo-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-geo-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-geo-maps-6b38cc619c1f1d13c6fce974aa8b5a90.yaml b/nuclei-templates/cve-less/plugins/interactive-geo-maps-6b38cc619c1f1d13c6fce974aa8b5a90.yaml new file mode 100644 index 0000000000..e097ccc2e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-geo-maps-6b38cc619c1f1d13c6fce974aa8b5a90.yaml @@ -0,0 +1,58 @@ +id: interactive-geo-maps-6b38cc619c1f1d13c6fce974aa8b5a90 + +info: + name: > + Interactive Geo Maps <= 1.5.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d667556-4cab-4f92-aa43-75e7722b3af6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-geo-maps/" + google-query: inurl:"/wp-content/plugins/interactive-geo-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-geo-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-geo-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-geo-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-geo-maps-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/interactive-geo-maps-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..25a122b542 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-geo-maps-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: interactive-geo-maps-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-geo-maps/" + google-query: inurl:"/wp-content/plugins/interactive-geo-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-geo-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-geo-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-geo-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-image-map-builder-d58b2eb7209b77e10a0a7be6a3ad7570.yaml b/nuclei-templates/cve-less/plugins/interactive-image-map-builder-d58b2eb7209b77e10a0a7be6a3ad7570.yaml new file mode 100644 index 0000000000..06acde92de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-image-map-builder-d58b2eb7209b77e10a0a7be6a3ad7570.yaml @@ -0,0 +1,58 @@ +id: interactive-image-map-builder-d58b2eb7209b77e10a0a7be6a3ad7570 + +info: + name: > + Interactive SVG Image Map Builder <= 1.0 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12d84de4-d97e-40cc-9805-fc9b7de8fa21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-image-map-builder/" + google-query: inurl:"/wp-content/plugins/interactive-image-map-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-image-map-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-image-map-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-image-map-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-medical-drawing-of-human-body-162fd1b80a689c044d519624e2cd6bbb.yaml b/nuclei-templates/cve-less/plugins/interactive-medical-drawing-of-human-body-162fd1b80a689c044d519624e2cd6bbb.yaml new file mode 100644 index 0000000000..1f19053ad5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-medical-drawing-of-human-body-162fd1b80a689c044d519624e2cd6bbb.yaml @@ -0,0 +1,58 @@ +id: interactive-medical-drawing-of-human-body-162fd1b80a689c044d519624e2cd6bbb + +info: + name: > + Interactive Medical Drawing of Human Body <= 2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a85de70-7cb1-45d1-b872-0677ef8134be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-medical-drawing-of-human-body/" + google-query: inurl:"/wp-content/plugins/interactive-medical-drawing-of-human-body/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-medical-drawing-of-human-body,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-medical-drawing-of-human-body/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-medical-drawing-of-human-body" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-medical-drawing-of-human-body-205de06070622aab10eb1bdf566b37c2.yaml b/nuclei-templates/cve-less/plugins/interactive-medical-drawing-of-human-body-205de06070622aab10eb1bdf566b37c2.yaml new file mode 100644 index 0000000000..434435592a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-medical-drawing-of-human-body-205de06070622aab10eb1bdf566b37c2.yaml @@ -0,0 +1,58 @@ +id: interactive-medical-drawing-of-human-body-205de06070622aab10eb1bdf566b37c2 + +info: + name: > + Interactive Medical Drawing of Human Body < 2.4 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a37a0e5-2db5-49fb-8b00-1b820192f1af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-medical-drawing-of-human-body/" + google-query: inurl:"/wp-content/plugins/interactive-medical-drawing-of-human-body/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-medical-drawing-of-human-body,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-medical-drawing-of-human-body/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-medical-drawing-of-human-body" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-polish-map-a73b50da5126e009aa2afaa408141c1f.yaml b/nuclei-templates/cve-less/plugins/interactive-polish-map-a73b50da5126e009aa2afaa408141c1f.yaml new file mode 100644 index 0000000000..c52a82af2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-polish-map-a73b50da5126e009aa2afaa408141c1f.yaml @@ -0,0 +1,58 @@ +id: interactive-polish-map-a73b50da5126e009aa2afaa408141c1f + +info: + name: > + Interactive Polish Map <= 1.2 - Authenticated (Admi+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f728cc5e-7330-4dda-b5f7-55c33def6f02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-polish-map/" + google-query: inurl:"/wp-content/plugins/interactive-polish-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-polish-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-polish-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-polish-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-world-map-24f9c4426e1ded4bbcd77cb8ae480628.yaml b/nuclei-templates/cve-less/plugins/interactive-world-map-24f9c4426e1ded4bbcd77cb8ae480628.yaml new file mode 100644 index 0000000000..b513f4e3af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-world-map-24f9c4426e1ded4bbcd77cb8ae480628.yaml @@ -0,0 +1,58 @@ +id: interactive-world-map-24f9c4426e1ded4bbcd77cb8ae480628 + +info: + name: > + Interactive World Map <= 3.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b559a48-3c8b-4f8a-9627-c4f838d20af3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-world-map/" + google-query: inurl:"/wp-content/plugins/interactive-world-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-world-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-world-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-world-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-world-map-63308829f599612b4399930582e4c79a.yaml b/nuclei-templates/cve-less/plugins/interactive-world-map-63308829f599612b4399930582e4c79a.yaml new file mode 100644 index 0000000000..101f381c81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-world-map-63308829f599612b4399930582e4c79a.yaml @@ -0,0 +1,58 @@ +id: interactive-world-map-63308829f599612b4399930582e4c79a + +info: + name: > + Interactive World Map <= 3.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09b0bfd3-93a7-4f13-828d-772f54085a60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-world-map/" + google-query: inurl:"/wp-content/plugins/interactive-world-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-world-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-world-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-world-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/interactive-world-maps-e458b043b3a8331f4ddf5924d17ccf2e.yaml b/nuclei-templates/cve-less/plugins/interactive-world-maps-e458b043b3a8331f4ddf5924d17ccf2e.yaml new file mode 100644 index 0000000000..456337fec4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/interactive-world-maps-e458b043b3a8331f4ddf5924d17ccf2e.yaml @@ -0,0 +1,58 @@ +id: interactive-world-maps-e458b043b3a8331f4ddf5924d17ccf2e + +info: + name: > + Interactive World Maps <= 2.4.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9295b82-27c1-4f35-b40c-1ac40ebe5d5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/interactive-world-maps/" + google-query: inurl:"/wp-content/plugins/interactive-world-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,interactive-world-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/interactive-world-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "interactive-world-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intergeo-maps-51944a4f6212afc8f585f1bcea51f2d6.yaml b/nuclei-templates/cve-less/plugins/intergeo-maps-51944a4f6212afc8f585f1bcea51f2d6.yaml new file mode 100644 index 0000000000..65aa9cad10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intergeo-maps-51944a4f6212afc8f585f1bcea51f2d6.yaml @@ -0,0 +1,58 @@ +id: intergeo-maps-51944a4f6212afc8f585f1bcea51f2d6 + +info: + name: > + Google Maps Plugin by Intergeo <= 2.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb6d11ad-0983-4a4b-b52b-824eae8b8e3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intergeo-maps/" + google-query: inurl:"/wp-content/plugins/intergeo-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intergeo-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intergeo-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intergeo-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/internal-link-building-plugin-5f27ace6d76e064e4061fdf808767b2d.yaml b/nuclei-templates/cve-less/plugins/internal-link-building-plugin-5f27ace6d76e064e4061fdf808767b2d.yaml new file mode 100644 index 0000000000..795491f9df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/internal-link-building-plugin-5f27ace6d76e064e4061fdf808767b2d.yaml @@ -0,0 +1,58 @@ +id: internal-link-building-plugin-5f27ace6d76e064e4061fdf808767b2d + +info: + name: > + Internal Link Building <= 1.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd300737-dda4-4ed3-b21f-0407a5e32a05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/internal-link-building-plugin/" + google-query: inurl:"/wp-content/plugins/internal-link-building-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,internal-link-building-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/internal-link-building-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "internal-link-building-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/internal-link-building-plugin-b83d0241d6f20c42a973f309878a9cc2.yaml b/nuclei-templates/cve-less/plugins/internal-link-building-plugin-b83d0241d6f20c42a973f309878a9cc2.yaml new file mode 100644 index 0000000000..e795ad5a1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/internal-link-building-plugin-b83d0241d6f20c42a973f309878a9cc2.yaml @@ -0,0 +1,58 @@ +id: internal-link-building-plugin-b83d0241d6f20c42a973f309878a9cc2 + +info: + name: > + Internal Link Building <= 1.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78ce6a2a-aa28-4ae9-a2e7-ca3861a9677f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/internal-link-building-plugin/" + google-query: inurl:"/wp-content/plugins/internal-link-building-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,internal-link-building-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/internal-link-building-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "internal-link-building-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/internal-links-75603149f92181c053a67aa413d7458b.yaml b/nuclei-templates/cve-less/plugins/internal-links-75603149f92181c053a67aa413d7458b.yaml new file mode 100644 index 0000000000..5cf1abdc69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/internal-links-75603149f92181c053a67aa413d7458b.yaml @@ -0,0 +1,58 @@ +id: internal-links-75603149f92181c053a67aa413d7458b + +info: + name: > + Internal Link Juicer <= 2.23.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d39fe4-b114-4612-92f6-75d6597610f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/internal-links/" + google-query: inurl:"/wp-content/plugins/internal-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,internal-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/internal-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "internal-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/internal-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/internal-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8eed0664a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/internal-links-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: internal-links-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/internal-links/" + google-query: inurl:"/wp-content/plugins/internal-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,internal-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/internal-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "internal-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intimate-io-cryptocurrency-payments-d27b7d21b5912a09ea3805333b4f7140.yaml b/nuclei-templates/cve-less/plugins/intimate-io-cryptocurrency-payments-d27b7d21b5912a09ea3805333b4f7140.yaml new file mode 100644 index 0000000000..023d469a8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intimate-io-cryptocurrency-payments-d27b7d21b5912a09ea3805333b4f7140.yaml @@ -0,0 +1,58 @@ +id: intimate-io-cryptocurrency-payments-d27b7d21b5912a09ea3805333b4f7140 + +info: + name: > + intimate Payments Plugin <= 1.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e27825b9-c3ef-4740-bd19-7198c806c70b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intimate-io-cryptocurrency-payments/" + google-query: inurl:"/wp-content/plugins/intimate-io-cryptocurrency-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intimate-io-cryptocurrency-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intimate-io-cryptocurrency-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intimate-io-cryptocurrency-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intouch-5a4ceeb56cff119df02b4014ab6dd0d9.yaml b/nuclei-templates/cve-less/plugins/intouch-5a4ceeb56cff119df02b4014ab6dd0d9.yaml new file mode 100644 index 0000000000..6a626f7da3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intouch-5a4ceeb56cff119df02b4014ab6dd0d9.yaml @@ -0,0 +1,58 @@ +id: intouch-5a4ceeb56cff119df02b4014ab6dd0d9 + +info: + name: > + intouch <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13a1e293-f539-4d19-8fe8-392c126fd1c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intouch/" + google-query: inurl:"/wp-content/plugins/intouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intouch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-18457ce0add8e02185ec82dfe3cc1c14.yaml b/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-18457ce0add8e02185ec82dfe3cc1c14.yaml new file mode 100644 index 0000000000..c46c6dffa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-18457ce0add8e02185ec82dfe3cc1c14.yaml @@ -0,0 +1,58 @@ +id: intuitive-custom-post-order-18457ce0add8e02185ec82dfe3cc1c14 + +info: + name: > + Intuitive Custom Post Order <= 3.1.4.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc878508-200d-4bc7-aa99-c34e63cba4b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intuitive-custom-post-order/" + google-query: inurl:"/wp-content/plugins/intuitive-custom-post-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intuitive-custom-post-order,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intuitive-custom-post-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intuitive-custom-post-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-5fce0179ad5dd3fa3f22de628e08db06.yaml b/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-5fce0179ad5dd3fa3f22de628e08db06.yaml new file mode 100644 index 0000000000..a484edc198 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-5fce0179ad5dd3fa3f22de628e08db06.yaml @@ -0,0 +1,58 @@ +id: intuitive-custom-post-order-5fce0179ad5dd3fa3f22de628e08db06 + +info: + name: > + Intuitive Custom Post Order <= 3.1.3 - Missing Authorization to Authenticated Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b19d0156-1fd9-4c18-be47-bce633b2f704?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intuitive-custom-post-order/" + google-query: inurl:"/wp-content/plugins/intuitive-custom-post-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intuitive-custom-post-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intuitive-custom-post-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intuitive-custom-post-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-65d0be98fb7fe486ad93703d74260aa6.yaml b/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-65d0be98fb7fe486ad93703d74260aa6.yaml new file mode 100644 index 0000000000..6d703a2487 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-65d0be98fb7fe486ad93703d74260aa6.yaml @@ -0,0 +1,58 @@ +id: intuitive-custom-post-order-65d0be98fb7fe486ad93703d74260aa6 + +info: + name: > + Intuitive Custom Post Order <= 3.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2d4c7ff-ecd3-4cfb-9466-08f3e6c4bd48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intuitive-custom-post-order/" + google-query: inurl:"/wp-content/plugins/intuitive-custom-post-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intuitive-custom-post-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intuitive-custom-post-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intuitive-custom-post-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-7737e8caafd57ae5760281e5e46a68d7.yaml b/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-7737e8caafd57ae5760281e5e46a68d7.yaml new file mode 100644 index 0000000000..7485403c82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/intuitive-custom-post-order-7737e8caafd57ae5760281e5e46a68d7.yaml @@ -0,0 +1,58 @@ +id: intuitive-custom-post-order-7737e8caafd57ae5760281e5e46a68d7 + +info: + name: > + Intuitive Custom Post Order <= 3.1.3 - Missing Authorization to Authenticated Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/948b9d68-8b31-42a0-bdc5-4a8e4e969ca9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/intuitive-custom-post-order/" + google-query: inurl:"/wp-content/plugins/intuitive-custom-post-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,intuitive-custom-post-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/intuitive-custom-post-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intuitive-custom-post-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/inventorypress-6001aefe4ed5d867371bbaa565b1d288.yaml b/nuclei-templates/cve-less/plugins/inventorypress-6001aefe4ed5d867371bbaa565b1d288.yaml new file mode 100644 index 0000000000..989cc6c872 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/inventorypress-6001aefe4ed5d867371bbaa565b1d288.yaml @@ -0,0 +1,58 @@ +id: inventorypress-6001aefe4ed5d867371bbaa565b1d288 + +info: + name: > + InventoryPress <= 1.7 - Authenticated(Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83603d33-b616-4332-aa05-b8ac61424614?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/inventorypress/" + google-query: inurl:"/wp-content/plugins/inventorypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,inventorypress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/inventorypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "inventorypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invit0r-2eafd9fb11071a8b513a28c962ba9483.yaml b/nuclei-templates/cve-less/plugins/invit0r-2eafd9fb11071a8b513a28c962ba9483.yaml new file mode 100644 index 0000000000..3c11620356 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invit0r-2eafd9fb11071a8b513a28c962ba9483.yaml @@ -0,0 +1,58 @@ +id: invit0r-2eafd9fb11071a8b513a28c962ba9483 + +info: + name: > + Invit0r <= 0.22 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66a6569b-88ec-42d8-8396-6e62f1c51b24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invit0r/" + google-query: inurl:"/wp-content/plugins/invit0r/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invit0r,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invit0r/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invit0r" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invitation-based-registrations-d4a44b7e5865ae371b4706ab716f5f69.yaml b/nuclei-templates/cve-less/plugins/invitation-based-registrations-d4a44b7e5865ae371b4706ab716f5f69.yaml new file mode 100644 index 0000000000..eda2ab341d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invitation-based-registrations-d4a44b7e5865ae371b4706ab716f5f69.yaml @@ -0,0 +1,58 @@ +id: invitation-based-registrations-d4a44b7e5865ae371b4706ab716f5f69 + +info: + name: > + Invitation Based Registrations <= 2.2.84 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27277b3d-b4f9-4d0c-a213-988a9b8fcd34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invitation-based-registrations/" + google-query: inurl:"/wp-content/plugins/invitation-based-registrations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invitation-based-registrations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invitation-based-registrations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invitation-based-registrations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.84') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invitation-code-content-access-7dabd50801a5dc21167037bc053f6e5e.yaml b/nuclei-templates/cve-less/plugins/invitation-code-content-access-7dabd50801a5dc21167037bc053f6e5e.yaml new file mode 100644 index 0000000000..8e80955b42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invitation-code-content-access-7dabd50801a5dc21167037bc053f6e5e.yaml @@ -0,0 +1,58 @@ +id: invitation-code-content-access-7dabd50801a5dc21167037bc053f6e5e + +info: + name: > + Invitation Code Content Restriction Plugin from CreativeMinds <= 1.5.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3d0f705-2458-4cc6-8730-997314084f24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invitation-code-content-access/" + google-query: inurl:"/wp-content/plugins/invitation-code-content-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invitation-code-content-access,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invitation-code-content-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invitation-code-content-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invite-anyone-378de5a4c8a761e6f865e9b293282366.yaml b/nuclei-templates/cve-less/plugins/invite-anyone-378de5a4c8a761e6f865e9b293282366.yaml new file mode 100644 index 0000000000..7441b89503 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invite-anyone-378de5a4c8a761e6f865e9b293282366.yaml @@ -0,0 +1,58 @@ +id: invite-anyone-378de5a4c8a761e6f865e9b293282366 + +info: + name: > + Invite Anyone < 1.3.16 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/101edd24-3f9e-4055-8547-9cd7e2b626b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invite-anyone/" + google-query: inurl:"/wp-content/plugins/invite-anyone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invite-anyone,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invite-anyone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invite-anyone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invite-anyone-93d72496faa88a41ccc6451bd803706b.yaml b/nuclei-templates/cve-less/plugins/invite-anyone-93d72496faa88a41ccc6451bd803706b.yaml new file mode 100644 index 0000000000..a83dbd458c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invite-anyone-93d72496faa88a41ccc6451bd803706b.yaml @@ -0,0 +1,58 @@ +id: invite-anyone-93d72496faa88a41ccc6451bd803706b + +info: + name: > + Invite Anyone <= 1.3.14 - Change of Email Invitation Content + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80388709-77ee-4f18-9da2-b99f562a20cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invite-anyone/" + google-query: inurl:"/wp-content/plugins/invite-anyone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invite-anyone,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invite-anyone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invite-anyone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invite-anyone-9ebec4016a51c98a2dfc38226d295089.yaml b/nuclei-templates/cve-less/plugins/invite-anyone-9ebec4016a51c98a2dfc38226d295089.yaml new file mode 100644 index 0000000000..6ad1071a36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invite-anyone-9ebec4016a51c98a2dfc38226d295089.yaml @@ -0,0 +1,58 @@ +id: invite-anyone-9ebec4016a51c98a2dfc38226d295089 + +info: + name: > + Invite Anyone <= 1.3.18 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b77c3d65-23c0-4bda-afea-9cad00fc04d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invite-anyone/" + google-query: inurl:"/wp-content/plugins/invite-anyone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invite-anyone,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invite-anyone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invite-anyone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invite-anyone-b2bde61925d9704f5bb5670b30295470.yaml b/nuclei-templates/cve-less/plugins/invite-anyone-b2bde61925d9704f5bb5670b30295470.yaml new file mode 100644 index 0000000000..4136a66a6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invite-anyone-b2bde61925d9704f5bb5670b30295470.yaml @@ -0,0 +1,58 @@ +id: invite-anyone-b2bde61925d9704f5bb5670b30295470 + +info: + name: > + Invite Anyone <= 1.3.15 - Improper Input Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a4559f8-bd13-4a38-91c2-8569a9967700?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invite-anyone/" + google-query: inurl:"/wp-content/plugins/invite-anyone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invite-anyone,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invite-anyone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invite-anyone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invite-anyone-b6ce0f1beb89a33f3441e294aa1dd412.yaml b/nuclei-templates/cve-less/plugins/invite-anyone-b6ce0f1beb89a33f3441e294aa1dd412.yaml new file mode 100644 index 0000000000..2abed479a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invite-anyone-b6ce0f1beb89a33f3441e294aa1dd412.yaml @@ -0,0 +1,58 @@ +id: invite-anyone-b6ce0f1beb89a33f3441e294aa1dd412 + +info: + name: > + Invite Anyone < 1.3.16 - Email Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e95ecb22-7946-4830-95a4-f145f0f99d68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invite-anyone/" + google-query: inurl:"/wp-content/plugins/invite-anyone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invite-anyone,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invite-anyone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invite-anyone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/invoicing-7c4b664dcbab81960496a17b3a66e44c.yaml b/nuclei-templates/cve-less/plugins/invoicing-7c4b664dcbab81960496a17b3a66e44c.yaml new file mode 100644 index 0000000000..fd402dc7ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/invoicing-7c4b664dcbab81960496a17b3a66e44c.yaml @@ -0,0 +1,58 @@ +id: invoicing-7c4b664dcbab81960496a17b3a66e44c + +info: + name: > + WordPress Payments Plugin | GetPaid <= 2.3.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c62860e2-8c89-4f1c-a7d8-ef13f545ad52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/invoicing/" + google-query: inurl:"/wp-content/plugins/invoicing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,invoicing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/invoicing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invoicing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-address-blocker-140887b5bfa7dc561500c7685b1acab8.yaml b/nuclei-templates/cve-less/plugins/ip-address-blocker-140887b5bfa7dc561500c7685b1acab8.yaml new file mode 100644 index 0000000000..d01fc853b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-address-blocker-140887b5bfa7dc561500c7685b1acab8.yaml @@ -0,0 +1,58 @@ +id: ip-address-blocker-140887b5bfa7dc561500c7685b1acab8 + +info: + name: > + IP Blocker Lite <= 11.1.1 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2598795e-ea66-4c73-8fcb-6a832f65de52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-address-blocker/" + google-query: inurl:"/wp-content/plugins/ip-address-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-address-blocker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-address-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-address-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-address-blocker-772e15bdf31248d6b001fc7f14d684f0.yaml b/nuclei-templates/cve-less/plugins/ip-address-blocker-772e15bdf31248d6b001fc7f14d684f0.yaml new file mode 100644 index 0000000000..a6020c7d3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-address-blocker-772e15bdf31248d6b001fc7f14d684f0.yaml @@ -0,0 +1,58 @@ +id: ip-address-blocker-772e15bdf31248d6b001fc7f14d684f0 + +info: + name: > + IP Blocker Lite <= 11.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45d3f82b-9e19-4678-8995-7fe265606fd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-address-blocker/" + google-query: inurl:"/wp-content/plugins/ip-address-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-address-blocker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-address-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-address-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-address-blocker-c2d506865b475e467cd410bd4ff9f703.yaml b/nuclei-templates/cve-less/plugins/ip-address-blocker-c2d506865b475e467cd410bd4ff9f703.yaml new file mode 100644 index 0000000000..1ff6494df8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-address-blocker-c2d506865b475e467cd410bd4ff9f703.yaml @@ -0,0 +1,58 @@ +id: ip-address-blocker-c2d506865b475e467cd410bd4ff9f703 + +info: + name: > + LionScripts: IP Blocker Lite <= 10.4 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dae2d028-6976-468a-9e93-ec712887d657?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-address-blocker/" + google-query: inurl:"/wp-content/plugins/ip-address-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-address-blocker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-address-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-address-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-25db80928ffd18548f83a78d2fb47f0e.yaml b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-25db80928ffd18548f83a78d2fb47f0e.yaml new file mode 100644 index 0000000000..9dfa57dcc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-25db80928ffd18548f83a78d2fb47f0e.yaml @@ -0,0 +1,58 @@ +id: ip-blacklist-cloud-25db80928ffd18548f83a78d2fb47f0e + +info: + name: > + IP Blacklist Cloud <= 5.00 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd108f90-7afc-43e1-86d4-939c1c25fb2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-blacklist-cloud/" + google-query: inurl:"/wp-content/plugins/ip-blacklist-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-blacklist-cloud,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-blacklist-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-blacklist-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml new file mode 100644 index 0000000000..70ff8ddfcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml @@ -0,0 +1,58 @@ +id: ip-blacklist-cloud-6f9e9fe1fa78bdc8c8c67cbc00f8001f + +info: + name: > + IP Blacklist Cloud <= 3.42 - Authenticated (Admin+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d3336f7-ee20-4f1c-92b4-f1c77aac91f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-blacklist-cloud/" + google-query: inurl:"/wp-content/plugins/ip-blacklist-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-blacklist-cloud,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-blacklist-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-blacklist-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-77e9594ea9c5da95d048b98c87af20b9.yaml b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-77e9594ea9c5da95d048b98c87af20b9.yaml new file mode 100644 index 0000000000..3a60d514e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-77e9594ea9c5da95d048b98c87af20b9.yaml @@ -0,0 +1,58 @@ +id: ip-blacklist-cloud-77e9594ea9c5da95d048b98c87af20b9 + +info: + name: > + IP Blacklist Cloud < 3.43 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5635423-d17a-4f04-a164-64bf141b6bb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-blacklist-cloud/" + google-query: inurl:"/wp-content/plugins/ip-blacklist-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-blacklist-cloud,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-blacklist-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-blacklist-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-aea3cbfb921c1d1330c879b8f85a35d1.yaml b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-aea3cbfb921c1d1330c879b8f85a35d1.yaml new file mode 100644 index 0000000000..a1d09e8db5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-aea3cbfb921c1d1330c879b8f85a35d1.yaml @@ -0,0 +1,58 @@ +id: ip-blacklist-cloud-aea3cbfb921c1d1330c879b8f85a35d1 + +info: + name: > + IP Blacklist Cloud <= 5.00 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24eb524c-1705-43a5-8041-4549ebb49155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-blacklist-cloud/" + google-query: inurl:"/wp-content/plugins/ip-blacklist-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-blacklist-cloud,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-blacklist-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-blacklist-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-b7df280ef92a1ac8dd61f73a5d009cd8.yaml b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-b7df280ef92a1ac8dd61f73a5d009cd8.yaml new file mode 100644 index 0000000000..2ce2546955 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-b7df280ef92a1ac8dd61f73a5d009cd8.yaml @@ -0,0 +1,58 @@ +id: ip-blacklist-cloud-b7df280ef92a1ac8dd61f73a5d009cd8 + +info: + name: > + IP Blacklist Cloud < 3.41 - SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37c22521-68ef-4d15-9633-8fe1af493a52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-blacklist-cloud/" + google-query: inurl:"/wp-content/plugins/ip-blacklist-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-blacklist-cloud,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-blacklist-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-blacklist-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-fbcd8cab0390c5423cc4977a1f1be996.yaml b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-fbcd8cab0390c5423cc4977a1f1be996.yaml new file mode 100644 index 0000000000..18cbbff997 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-blacklist-cloud-fbcd8cab0390c5423cc4977a1f1be996.yaml @@ -0,0 +1,58 @@ +id: ip-blacklist-cloud-fbcd8cab0390c5423cc4977a1f1be996 + +info: + name: > + IP Blacklist Cloud <= 5.00 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01ba4259-e76a-4876-b910-fd2688680739?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-blacklist-cloud/" + google-query: inurl:"/wp-content/plugins/ip-blacklist-cloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-blacklist-cloud,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-blacklist-cloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-blacklist-cloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-metaboxes-88404ad5e8128c3699e3c229a21a2eba.yaml b/nuclei-templates/cve-less/plugins/ip-metaboxes-88404ad5e8128c3699e3c229a21a2eba.yaml new file mode 100644 index 0000000000..8f6a6addcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-metaboxes-88404ad5e8128c3699e3c229a21a2eba.yaml @@ -0,0 +1,58 @@ +id: ip-metaboxes-88404ad5e8128c3699e3c229a21a2eba + +info: + name: > + IP Metaboxes <= 2.1.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9163861b-735b-4007-97f7-8f9095d93ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-metaboxes/" + google-query: inurl:"/wp-content/plugins/ip-metaboxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-metaboxes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-metaboxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-metaboxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-metaboxes-c712eff3f3bb4a9cd97ce6c7063fd4f6.yaml b/nuclei-templates/cve-less/plugins/ip-metaboxes-c712eff3f3bb4a9cd97ce6c7063fd4f6.yaml new file mode 100644 index 0000000000..87a8caa60f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-metaboxes-c712eff3f3bb4a9cd97ce6c7063fd4f6.yaml @@ -0,0 +1,58 @@ +id: ip-metaboxes-c712eff3f3bb4a9cd97ce6c7063fd4f6 + +info: + name: > + IP Metaboxes <= 2.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f611d609-97c5-4b77-9657-c8d9d10e786a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-metaboxes/" + google-query: inurl:"/wp-content/plugins/ip-metaboxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-metaboxes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-metaboxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-metaboxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip-vault-wp-firewall-80529a3b54852ed1b40d1078928149a9.yaml b/nuclei-templates/cve-less/plugins/ip-vault-wp-firewall-80529a3b54852ed1b40d1078928149a9.yaml new file mode 100644 index 0000000000..e3d17b44fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip-vault-wp-firewall-80529a3b54852ed1b40d1078928149a9.yaml @@ -0,0 +1,58 @@ +id: ip-vault-wp-firewall-80529a3b54852ed1b40d1078928149a9 + +info: + name: > + IP Vault – WP Firewall <= 2.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07b075a6-2339-4562-a096-0a46b58f1e9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip-vault-wp-firewall/" + google-query: inurl:"/wp-content/plugins/ip-vault-wp-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip-vault-wp-firewall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip-vault-wp-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip-vault-wp-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip2location-country-blocker-0c5a993c7be9746c745f0f9869cf8fb4.yaml b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-0c5a993c7be9746c745f0f9869cf8fb4.yaml new file mode 100644 index 0000000000..1bf4a8c9cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-0c5a993c7be9746c745f0f9869cf8fb4.yaml @@ -0,0 +1,58 @@ +id: ip2location-country-blocker-0c5a993c7be9746c745f0f9869cf8fb4 + +info: + name: > + IP2Location Country Blocker <= 2.33.3 - Unauthenticated Sensitive Information Exposure via Debug Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e4aee28-d0cc-4705-9be6-fe5299f2e0fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip2location-country-blocker/" + google-query: inurl:"/wp-content/plugins/ip2location-country-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip2location-country-blocker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip2location-country-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip2location-country-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip2location-country-blocker-28eb2dd9b394a6991989e0316614fa07.yaml b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-28eb2dd9b394a6991989e0316614fa07.yaml new file mode 100644 index 0000000000..8d86093ee9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-28eb2dd9b394a6991989e0316614fa07.yaml @@ -0,0 +1,58 @@ +id: ip2location-country-blocker-28eb2dd9b394a6991989e0316614fa07 + +info: + name: > + IP2Location Country Blocker <= 2.26.5 - Arbitrary Country Ban via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1532e12-b786-4b87-ae19-951297c47a6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip2location-country-blocker/" + google-query: inurl:"/wp-content/plugins/ip2location-country-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip2location-country-blocker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip2location-country-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip2location-country-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.26.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip2location-country-blocker-2ac275b541904e5481df890267e095ba.yaml b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-2ac275b541904e5481df890267e095ba.yaml new file mode 100644 index 0000000000..b8bdcba85f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-2ac275b541904e5481df890267e095ba.yaml @@ -0,0 +1,58 @@ +id: ip2location-country-blocker-2ac275b541904e5481df890267e095ba + +info: + name: > + Download IP2Location Country Blocker <= 2.29.1 - Bypass via IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/814fd060-8781-46ad-86e6-e2b75a7fffc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip2location-country-blocker/" + google-query: inurl:"/wp-content/plugins/ip2location-country-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip2location-country-blocker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip2location-country-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip2location-country-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.29.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip2location-country-blocker-9ce1e54ae52ee82869377cad0e1b6dc4.yaml b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-9ce1e54ae52ee82869377cad0e1b6dc4.yaml new file mode 100644 index 0000000000..ad6279c9a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-9ce1e54ae52ee82869377cad0e1b6dc4.yaml @@ -0,0 +1,58 @@ +id: ip2location-country-blocker-9ce1e54ae52ee82869377cad0e1b6dc4 + +info: + name: > + Download IP2Location Country Blocker <= 2.34.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e8d038d-8e2d-442d-932d-0fd31a8c501c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip2location-country-blocker/" + google-query: inurl:"/wp-content/plugins/ip2location-country-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip2location-country-blocker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip2location-country-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip2location-country-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.34.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip2location-country-blocker-be59e4061d41f159389c5e0a45f572cb.yaml b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-be59e4061d41f159389c5e0a45f572cb.yaml new file mode 100644 index 0000000000..18cae60cec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-be59e4061d41f159389c5e0a45f572cb.yaml @@ -0,0 +1,58 @@ +id: ip2location-country-blocker-be59e4061d41f159389c5e0a45f572cb + +info: + name: > + IP2Location Country Blocker <= 2.26.4 - Subscriber+ Arbitrary Country Ban + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/736e51d4-da1d-4252-a10f-d89eb6a68de4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip2location-country-blocker/" + google-query: inurl:"/wp-content/plugins/ip2location-country-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip2location-country-blocker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip2location-country-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip2location-country-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.26.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip2location-country-blocker-d1d5e763ed41a49986eaf738181a98d5.yaml b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-d1d5e763ed41a49986eaf738181a98d5.yaml new file mode 100644 index 0000000000..0a83342d45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-d1d5e763ed41a49986eaf738181a98d5.yaml @@ -0,0 +1,58 @@ +id: ip2location-country-blocker-d1d5e763ed41a49986eaf738181a98d5 + +info: + name: > + IP2Location Country Blocker < 2.26.9 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bde5862-1b7c-4e58-b13f-c8f347593c51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip2location-country-blocker/" + google-query: inurl:"/wp-content/plugins/ip2location-country-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip2location-country-blocker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip2location-country-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip2location-country-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.26.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ip2location-country-blocker-ea51da120356d8e0bf883fe872498f8e.yaml b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-ea51da120356d8e0bf883fe872498f8e.yaml new file mode 100644 index 0000000000..4bf2c04fef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ip2location-country-blocker-ea51da120356d8e0bf883fe872498f8e.yaml @@ -0,0 +1,58 @@ +id: ip2location-country-blocker-ea51da120356d8e0bf883fe872498f8e + +info: + name: > + IP2Location Country Blocker <= 2.26.4 - Ban Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b8d337b-2d2c-4769-9ac0-6e22ba39a42f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ip2location-country-blocker/" + google-query: inurl:"/wp-content/plugins/ip2location-country-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ip2location-country-blocker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ip2location-country-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ip2location-country-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.26.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipages-flipbook-1ae1b0bb4039a24aa303fbc722996071.yaml b/nuclei-templates/cve-less/plugins/ipages-flipbook-1ae1b0bb4039a24aa303fbc722996071.yaml new file mode 100644 index 0000000000..f595e56b51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipages-flipbook-1ae1b0bb4039a24aa303fbc722996071.yaml @@ -0,0 +1,58 @@ +id: ipages-flipbook-1ae1b0bb4039a24aa303fbc722996071 + +info: + name: > + iPages Flipbook < 1.5.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/279a02e1-7b61-4edd-ab67-6a7fed4e17c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipages-flipbook/" + google-query: inurl:"/wp-content/plugins/ipages-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipages-flipbook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipages-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipages-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipages-flipbook-238730b48c414c2efa3f90f95ede4e1a.yaml b/nuclei-templates/cve-less/plugins/ipages-flipbook-238730b48c414c2efa3f90f95ede4e1a.yaml new file mode 100644 index 0000000000..ae7fec83f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipages-flipbook-238730b48c414c2efa3f90f95ede4e1a.yaml @@ -0,0 +1,58 @@ +id: ipages-flipbook-238730b48c414c2efa3f90f95ede4e1a + +info: + name: > + iPages Flipbook <= 1.5.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38b9a64f-a83a-4c0f-88df-383652fde986?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipages-flipbook/" + google-query: inurl:"/wp-content/plugins/ipages-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipages-flipbook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipages-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipages-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipages-flipbook-62025420139d5dbebb6173b14d6b099a.yaml b/nuclei-templates/cve-less/plugins/ipages-flipbook-62025420139d5dbebb6173b14d6b099a.yaml new file mode 100644 index 0000000000..3c266282e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipages-flipbook-62025420139d5dbebb6173b14d6b099a.yaml @@ -0,0 +1,58 @@ +id: ipages-flipbook-62025420139d5dbebb6173b14d6b099a + +info: + name: > + iPages Flipbook < 1.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77fd0714-ae9d-4136-beed-7f37b1266dc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipages-flipbook/" + google-query: inurl:"/wp-content/plugins/ipages-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipages-flipbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipages-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipages-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipages-flipbook-ffe84a5da8ea35eb24ec280a71f71719.yaml b/nuclei-templates/cve-less/plugins/ipages-flipbook-ffe84a5da8ea35eb24ec280a71f71719.yaml new file mode 100644 index 0000000000..436c37c021 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipages-flipbook-ffe84a5da8ea35eb24ec280a71f71719.yaml @@ -0,0 +1,58 @@ +id: ipages-flipbook-ffe84a5da8ea35eb24ec280a71f71719 + +info: + name: > + iPages Flipbook <= 1.4.6 - Authenticated Contributor+ Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cd82b65-eadd-4a81-a8e4-72ce58dd360d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipages-flipbook/" + google-query: inurl:"/wp-content/plugins/ipages-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipages-flipbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipages-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipages-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-176b60254015c7171bdde001bfef506b.yaml b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-176b60254015c7171bdde001bfef506b.yaml new file mode 100644 index 0000000000..ec48a50acb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-176b60254015c7171bdde001bfef506b.yaml @@ -0,0 +1,58 @@ +id: ipanorama-360-virtual-tour-builder-lite-176b60254015c7171bdde001bfef506b + +info: + name: > + iPanorama 360 WordPress Virtual Tour Builder <= 1.6.29 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d9431b3-d37e-4d19-b07d-d5357affe346?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + google-query: inurl:"/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipanorama-360-virtual-tour-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipanorama-360-virtual-tour-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-718a86b8fb614bfca1d835a5b1869915.yaml b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-718a86b8fb614bfca1d835a5b1869915.yaml new file mode 100644 index 0000000000..d2b071046c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-718a86b8fb614bfca1d835a5b1869915.yaml @@ -0,0 +1,58 @@ +id: ipanorama-360-virtual-tour-builder-lite-718a86b8fb614bfca1d835a5b1869915 + +info: + name: > + iPanorama 360 – WordPress Virtual Tour Builder <= 1.7.3 - Authenticated (Admin+) SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00687370-8374-44cc-8fd1-53b462acd061?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + google-query: inurl:"/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipanorama-360-virtual-tour-builder-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipanorama-360-virtual-tour-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-93a89e746de1b01ce58a8098e6937879.yaml b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-93a89e746de1b01ce58a8098e6937879.yaml new file mode 100644 index 0000000000..00659bb921 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-93a89e746de1b01ce58a8098e6937879.yaml @@ -0,0 +1,58 @@ +id: ipanorama-360-virtual-tour-builder-lite-93a89e746de1b01ce58a8098e6937879 + +info: + name: > + iPanorama 360 – WordPress Virtual Tour Builder <= 1.8.0 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3566b602-c991-488f-9de2-57236c4735b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + google-query: inurl:"/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipanorama-360-virtual-tour-builder-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipanorama-360-virtual-tour-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-db0b66a5d47c2843954a651061f51619.yaml b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-db0b66a5d47c2843954a651061f51619.yaml new file mode 100644 index 0000000000..bc29b72002 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-db0b66a5d47c2843954a651061f51619.yaml @@ -0,0 +1,58 @@ +id: ipanorama-360-virtual-tour-builder-lite-db0b66a5d47c2843954a651061f51619 + +info: + name: > + iPanorama 360 WordPress Virtual Tour Builder <= 1.8.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/924145bb-d636-4184-8f3f-578c8b11e3a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + google-query: inurl:"/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipanorama-360-virtual-tour-builder-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipanorama-360-virtual-tour-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-ed97130cf4e3c437fffae83fce6da395.yaml b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-ed97130cf4e3c437fffae83fce6da395.yaml new file mode 100644 index 0000000000..391cc2f192 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipanorama-360-virtual-tour-builder-lite-ed97130cf4e3c437fffae83fce6da395.yaml @@ -0,0 +1,58 @@ +id: ipanorama-360-virtual-tour-builder-lite-ed97130cf4e3c437fffae83fce6da395 + +info: + name: > + iPanorama 360 WordPress Virtual Tour Builder < 1.6.22 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e618864-e862-4d4f-aa28-3e2fb78882fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + google-query: inurl:"/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipanorama-360-virtual-tour-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipanorama-360-virtual-tour-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipanorama-360-virtual-tour-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipblocklist-24ffe594d50f8ec966de3f6d9723e35a.yaml b/nuclei-templates/cve-less/plugins/ipblocklist-24ffe594d50f8ec966de3f6d9723e35a.yaml new file mode 100644 index 0000000000..310891d483 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipblocklist-24ffe594d50f8ec966de3f6d9723e35a.yaml @@ -0,0 +1,58 @@ +id: ipblocklist-24ffe594d50f8ec966de3f6d9723e35a + +info: + name: > + ipBlockList <= 1.0 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4372e6a4-3671-4110-bebb-85c1a97c5abb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipblocklist/" + google-query: inurl:"/wp-content/plugins/ipblocklist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipblocklist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipblocklist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipblocklist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ipushpull-1a055ae19ed953176d3ae4b152c78d6b.yaml b/nuclei-templates/cve-less/plugins/ipushpull-1a055ae19ed953176d3ae4b152c78d6b.yaml new file mode 100644 index 0000000000..b5ef5b9c13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ipushpull-1a055ae19ed953176d3ae4b152c78d6b.yaml @@ -0,0 +1,58 @@ +id: ipushpull-1a055ae19ed953176d3ae4b152c78d6b + +info: + name: > + Live updates from Excel <= 2.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab856722-e954-49de-a93f-46664da6e3e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ipushpull/" + google-query: inurl:"/wp-content/plugins/ipushpull/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ipushpull,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ipushpull/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ipushpull" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iq-block-country-13327063860a0ee0e2e86f1e87898320.yaml b/nuclei-templates/cve-less/plugins/iq-block-country-13327063860a0ee0e2e86f1e87898320.yaml new file mode 100644 index 0000000000..1da1199eec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iq-block-country-13327063860a0ee0e2e86f1e87898320.yaml @@ -0,0 +1,58 @@ +id: iq-block-country-13327063860a0ee0e2e86f1e87898320 + +info: + name: > + WordPress iQ Block Country <= 1.2.11 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b01ce539-08f4-48f7-9ddc-56e87a2c91cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iq-block-country/" + google-query: inurl:"/wp-content/plugins/iq-block-country/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iq-block-country,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iq-block-country/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iq-block-country" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iq-block-country-7a55d1c425d19f06030ed735a34d912e.yaml b/nuclei-templates/cve-less/plugins/iq-block-country-7a55d1c425d19f06030ed735a34d912e.yaml new file mode 100644 index 0000000000..7731589176 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iq-block-country-7a55d1c425d19f06030ed735a34d912e.yaml @@ -0,0 +1,58 @@ +id: iq-block-country-7a55d1c425d19f06030ed735a34d912e + +info: + name: > + iQ Block Country < 1.1.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcdb5d23-b9fe-495b-8431-f82f22813531?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iq-block-country/" + google-query: inurl:"/wp-content/plugins/iq-block-country/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iq-block-country,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iq-block-country/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iq-block-country" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iq-block-country-93b718d7dcd910cc3c0b3209a78fa52e.yaml b/nuclei-templates/cve-less/plugins/iq-block-country-93b718d7dcd910cc3c0b3209a78fa52e.yaml new file mode 100644 index 0000000000..cdf3b9fabf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iq-block-country-93b718d7dcd910cc3c0b3209a78fa52e.yaml @@ -0,0 +1,58 @@ +id: iq-block-country-93b718d7dcd910cc3c0b3209a78fa52e + +info: + name: > + iQ Block Country <= 1.2.18 - Country Blocking Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abc983c6-aa30-4d1b-b6af-99b5ba1c8481?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iq-block-country/" + google-query: inurl:"/wp-content/plugins/iq-block-country/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iq-block-country,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iq-block-country/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iq-block-country" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iq-block-country-c5db51e5f06010fca4f5938a5e56cd39.yaml b/nuclei-templates/cve-less/plugins/iq-block-country-c5db51e5f06010fca4f5938a5e56cd39.yaml new file mode 100644 index 0000000000..436b938ea7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iq-block-country-c5db51e5f06010fca4f5938a5e56cd39.yaml @@ -0,0 +1,58 @@ +id: iq-block-country-c5db51e5f06010fca4f5938a5e56cd39 + +info: + name: > + iQ Block Country <= 1.2.13 - Protection Bypass due to IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f388049-b453-406c-abdf-2a51c7abed2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iq-block-country/" + google-query: inurl:"/wp-content/plugins/iq-block-country/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iq-block-country,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iq-block-country/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iq-block-country" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iq-block-country-f1c8fa61b4af4443e96dfc38c36b4af9.yaml b/nuclei-templates/cve-less/plugins/iq-block-country-f1c8fa61b4af4443e96dfc38c36b4af9.yaml new file mode 100644 index 0000000000..20ce0a1e3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iq-block-country-f1c8fa61b4af4443e96dfc38c36b4af9.yaml @@ -0,0 +1,58 @@ +id: iq-block-country-f1c8fa61b4af4443e96dfc38c36b4af9 + +info: + name: > + iQ Block Country < 1.2.13 - Admin+ Arbitrary File Deletion via Zip Slip + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21e3d4a5-aaf3-4f42-8868-cd8c9bccd026?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iq-block-country/" + google-query: inurl:"/wp-content/plugins/iq-block-country/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iq-block-country,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iq-block-country/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iq-block-country" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/itempropwp-1b30aff662020c0b4f39f0c4b04b2958.yaml b/nuclei-templates/cve-less/plugins/itempropwp-1b30aff662020c0b4f39f0c4b04b2958.yaml new file mode 100644 index 0000000000..b265bd0287 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/itempropwp-1b30aff662020c0b4f39f0c4b04b2958.yaml @@ -0,0 +1,58 @@ +id: itempropwp-1b30aff662020c0b4f39f0c4b04b2958 + +info: + name: > + itemprop WP for SERP/SEO Rich snippets <= 3.5.201706131 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5975a107-8083-4f9e-b2b2-8c6ae1ac8f39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/itempropwp/" + google-query: inurl:"/wp-content/plugins/itempropwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,itempropwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/itempropwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "itempropwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.201706131') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ithemes-exchange-f7228bc923e4f7e6b922e94dc9e73ec2.yaml b/nuclei-templates/cve-less/plugins/ithemes-exchange-f7228bc923e4f7e6b922e94dc9e73ec2.yaml new file mode 100644 index 0000000000..5781db54a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ithemes-exchange-f7228bc923e4f7e6b922e94dc9e73ec2.yaml @@ -0,0 +1,58 @@ +id: ithemes-exchange-f7228bc923e4f7e6b922e94dc9e73ec2 + +info: + name: > + iThemes Exchange < 1.12.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69150437-dfd6-436a-b100-99f5001c7fe7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ithemes-exchange/" + google-query: inurl:"/wp-content/plugins/ithemes-exchange/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ithemes-exchange,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ithemes-exchange/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ithemes-exchange" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ithemes-security-pro-b5b87b7676de117a8342f94f403bc1ce.yaml b/nuclei-templates/cve-less/plugins/ithemes-security-pro-b5b87b7676de117a8342f94f403bc1ce.yaml new file mode 100644 index 0000000000..780ca176aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ithemes-security-pro-b5b87b7676de117a8342f94f403bc1ce.yaml @@ -0,0 +1,58 @@ +id: ithemes-security-pro-b5b87b7676de117a8342f94f403bc1ce + +info: + name: > + iThemes Security < 7.9.1 and iThemes Security Pro < 6.8.4 - Hidden Login Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21a1a6c2-0eb1-4ee3-abf0-76b84adca01b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ithemes-security-pro/" + google-query: inurl:"/wp-content/plugins/ithemes-security-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ithemes-security-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ithemes-security-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ithemes-security-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ithemes-sync-8253ee833cb2687572180cd975dbf588.yaml b/nuclei-templates/cve-less/plugins/ithemes-sync-8253ee833cb2687572180cd975dbf588.yaml new file mode 100644 index 0000000000..3d45501b0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ithemes-sync-8253ee833cb2687572180cd975dbf588.yaml @@ -0,0 +1,58 @@ +id: ithemes-sync-8253ee833cb2687572180cd975dbf588 + +info: + name: > + Solid Central <= 3.0.0 - Stored Cross-Site Scripting via packages + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55234307-9d51-4fe8-bc22-78d32a5fed11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ithemes-sync/" + google-query: inurl:"/wp-content/plugins/ithemes-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ithemes-sync,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ithemes-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ithemes-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ithemes-sync-885b35b00352c80953df3eed541d0a97.yaml b/nuclei-templates/cve-less/plugins/ithemes-sync-885b35b00352c80953df3eed541d0a97.yaml new file mode 100644 index 0000000000..2c5e05496b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ithemes-sync-885b35b00352c80953df3eed541d0a97.yaml @@ -0,0 +1,58 @@ +id: ithemes-sync-885b35b00352c80953df3eed541d0a97 + +info: + name: > + iThemes Sync <= 2.1.13 - Cross-Site Request Forgery and Missing Authorization via 'hide_authenticate_notice' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f9229f2-e7dd-43c9-9c15-9b76c13e895b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ithemes-sync/" + google-query: inurl:"/wp-content/plugins/ithemes-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ithemes-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ithemes-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ithemes-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ithemes-sync-9c48f849b993eee3990baaaaa12643ef.yaml b/nuclei-templates/cve-less/plugins/ithemes-sync-9c48f849b993eee3990baaaaa12643ef.yaml new file mode 100644 index 0000000000..f175f8deed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ithemes-sync-9c48f849b993eee3990baaaaa12643ef.yaml @@ -0,0 +1,58 @@ +id: ithemes-sync-9c48f849b993eee3990baaaaa12643ef + +info: + name: > + iThemes Sync <= 2.0.17 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fb01045-d38f-469f-8aaf-ff8882132acc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ithemes-sync/" + google-query: inurl:"/wp-content/plugins/ithemes-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ithemes-sync,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ithemes-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ithemes-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/itwitter-d22a628e60dd0e0e47e495ea9eb75413.yaml b/nuclei-templates/cve-less/plugins/itwitter-d22a628e60dd0e0e47e495ea9eb75413.yaml new file mode 100644 index 0000000000..33d374273c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/itwitter-d22a628e60dd0e0e47e495ea9eb75413.yaml @@ -0,0 +1,58 @@ +id: itwitter-d22a628e60dd0e0e47e495ea9eb75413 + +info: + name: > + iTwitter <= 0.04 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56cd4317-46e1-4e6c-a586-b3aacb189dd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/itwitter/" + google-query: inurl:"/wp-content/plugins/itwitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,itwitter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/itwitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "itwitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-34076a9fa6889f09a1439513a52a8cc3.yaml b/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-34076a9fa6889f09a1439513a52a8cc3.yaml new file mode 100644 index 0000000000..916dc9921f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-34076a9fa6889f09a1439513a52a8cc3.yaml @@ -0,0 +1,58 @@ +id: iubenda-cookie-law-solution-34076a9fa6889f09a1439513a52a8cc3 + +info: + name: > + iubenda <= 3.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0301141-bbc6-4a9e-b816-888554600b57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iubenda-cookie-law-solution/" + google-query: inurl:"/wp-content/plugins/iubenda-cookie-law-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iubenda-cookie-law-solution,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iubenda-cookie-law-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iubenda-cookie-law-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-b904514033ab5aab0d8b6cea6480c116.yaml b/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-b904514033ab5aab0d8b6cea6480c116.yaml new file mode 100644 index 0000000000..fd86fb8aa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-b904514033ab5aab0d8b6cea6480c116.yaml @@ -0,0 +1,58 @@ +id: iubenda-cookie-law-solution-b904514033ab5aab0d8b6cea6480c116 + +info: + name: > + iubenda | All-in-one Compliance for GDPR / CCPA Cookie Consent + more <= 3.0.8 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69ec31f3-8ec8-40ad-ba7f-77f9132ad51f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iubenda-cookie-law-solution/" + google-query: inurl:"/wp-content/plugins/iubenda-cookie-law-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iubenda-cookie-law-solution,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iubenda-cookie-law-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iubenda-cookie-law-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-e4dfba623e207111ac2894d0b05e0171.yaml b/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-e4dfba623e207111ac2894d0b05e0171.yaml new file mode 100644 index 0000000000..d63d3b3443 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-e4dfba623e207111ac2894d0b05e0171.yaml @@ -0,0 +1,58 @@ +id: iubenda-cookie-law-solution-e4dfba623e207111ac2894d0b05e0171 + +info: + name: > + iubenda <= 3.3.2 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e8d724-60fe-4333-8c55-cb7df0d4345d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iubenda-cookie-law-solution/" + google-query: inurl:"/wp-content/plugins/iubenda-cookie-law-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iubenda-cookie-law-solution,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iubenda-cookie-law-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iubenda-cookie-law-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-e70ae286a6778ee45405a4388b04fec9.yaml b/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-e70ae286a6778ee45405a4388b04fec9.yaml new file mode 100644 index 0000000000..8b9b97f051 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iubenda-cookie-law-solution-e70ae286a6778ee45405a4388b04fec9.yaml @@ -0,0 +1,58 @@ +id: iubenda-cookie-law-solution-e70ae286a6778ee45405a4388b04fec9 + +info: + name: > + iubenda < 2.3.5 - Failure to Restrict URL Protocol + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc06a6d7-4fd9-450d-99f2-3f40343a9555?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iubenda-cookie-law-solution/" + google-query: inurl:"/wp-content/plugins/iubenda-cookie-law-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iubenda-cookie-law-solution,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iubenda-cookie-law-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iubenda-cookie-law-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iva-business-hours-pro-f3a11b810db2dd0055915ce0cd13d43a.yaml b/nuclei-templates/cve-less/plugins/iva-business-hours-pro-f3a11b810db2dd0055915ce0cd13d43a.yaml new file mode 100644 index 0000000000..a1c2cb398b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iva-business-hours-pro-f3a11b810db2dd0055915ce0cd13d43a.yaml @@ -0,0 +1,58 @@ +id: iva-business-hours-pro-f3a11b810db2dd0055915ce0cd13d43a + +info: + name: > + Business Hours Pro <= 5.5.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/866f780e-46fa-407a-b777-951a328003dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iva-business-hours-pro/" + google-query: inurl:"/wp-content/plugins/iva-business-hours-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iva-business-hours-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iva-business-hours-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iva-business-hours-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iwp-client-05f450dd8aa4062aa24fbf2823c60c4a.yaml b/nuclei-templates/cve-less/plugins/iwp-client-05f450dd8aa4062aa24fbf2823c60c4a.yaml new file mode 100644 index 0000000000..d17f6c3c50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iwp-client-05f450dd8aa4062aa24fbf2823c60c4a.yaml @@ -0,0 +1,58 @@ +id: iwp-client-05f450dd8aa4062aa24fbf2823c60c4a + +info: + name: > + InfiniteWP Client <= 1.11.1 - Authenticated (Subscriber+) Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa157c80-447f-4406-9e49-9cc6208b7b19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iwp-client/" + google-query: inurl:"/wp-content/plugins/iwp-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iwp-client,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iwp-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iwp-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iwp-client-6a236c689e15bb7cc8c51fe8f71c025e.yaml b/nuclei-templates/cve-less/plugins/iwp-client-6a236c689e15bb7cc8c51fe8f71c025e.yaml new file mode 100644 index 0000000000..2f8afeb2d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iwp-client-6a236c689e15bb7cc8c51fe8f71c025e.yaml @@ -0,0 +1,58 @@ +id: iwp-client-6a236c689e15bb7cc8c51fe8f71c025e + +info: + name: > + InfiniteWP Client <= 1.12.3 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fdc32a4-adf8-4174-924b-5d0b763d010c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iwp-client/" + google-query: inurl:"/wp-content/plugins/iwp-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iwp-client,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iwp-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iwp-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iwp-client-6b04f0d74c9f2eb38243b412d23f2013.yaml b/nuclei-templates/cve-less/plugins/iwp-client-6b04f0d74c9f2eb38243b412d23f2013.yaml new file mode 100644 index 0000000000..4811ce601e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iwp-client-6b04f0d74c9f2eb38243b412d23f2013.yaml @@ -0,0 +1,58 @@ +id: iwp-client-6b04f0d74c9f2eb38243b412d23f2013 + +info: + name: > + InfiniteWP Client <= 1.3.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e7a1116-2bf1-4d36-a091-e0d4a9d6e1c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iwp-client/" + google-query: inurl:"/wp-content/plugins/iwp-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iwp-client,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iwp-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iwp-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iwp-client-701517c521fc506e2ba1ce37a6b5effa.yaml b/nuclei-templates/cve-less/plugins/iwp-client-701517c521fc506e2ba1ce37a6b5effa.yaml new file mode 100644 index 0000000000..acc78166f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iwp-client-701517c521fc506e2ba1ce37a6b5effa.yaml @@ -0,0 +1,58 @@ +id: iwp-client-701517c521fc506e2ba1ce37a6b5effa + +info: + name: > + InfiniteWP Client <= 1.3.7 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a71a1a7b-6299-44c5-b686-65f214986c27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iwp-client/" + google-query: inurl:"/wp-content/plugins/iwp-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iwp-client,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iwp-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iwp-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iwp-client-79054d990e7a7a32c990ccc921c67cf1.yaml b/nuclei-templates/cve-less/plugins/iwp-client-79054d990e7a7a32c990ccc921c67cf1.yaml new file mode 100644 index 0000000000..f8206548b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iwp-client-79054d990e7a7a32c990ccc921c67cf1.yaml @@ -0,0 +1,58 @@ +id: iwp-client-79054d990e7a7a32c990ccc921c67cf1 + +info: + name: > + InfiniteWP Client <= 1.6.0 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bd81f3c-f801-4fc6-b2db-754e5ebed688?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iwp-client/" + google-query: inurl:"/wp-content/plugins/iwp-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iwp-client,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iwp-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iwp-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iwp-client-c4e23e67727ce074f425f39975da1652.yaml b/nuclei-templates/cve-less/plugins/iwp-client-c4e23e67727ce074f425f39975da1652.yaml new file mode 100644 index 0000000000..25532cb138 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iwp-client-c4e23e67727ce074f425f39975da1652.yaml @@ -0,0 +1,58 @@ +id: iwp-client-c4e23e67727ce074f425f39975da1652 + +info: + name: > + InfiniteWP Client <= 1.9.4.4 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f10214-69ef-4b5d-8d2b-2e2c1bafa7e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iwp-client/" + google-query: inurl:"/wp-content/plugins/iwp-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iwp-client,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iwp-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iwp-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/iws-geo-form-fields-9f8f05e27cd509d186ef8ebf6b358ad1.yaml b/nuclei-templates/cve-less/plugins/iws-geo-form-fields-9f8f05e27cd509d186ef8ebf6b358ad1.yaml new file mode 100644 index 0000000000..46272f6c99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/iws-geo-form-fields-9f8f05e27cd509d186ef8ebf6b358ad1.yaml @@ -0,0 +1,58 @@ +id: iws-geo-form-fields-9f8f05e27cd509d186ef8ebf6b358ad1 + +info: + name: > + IWS - Geo Form Fields <= 1.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b994bb62-436f-4edc-8891-281483428ac0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/iws-geo-form-fields/" + google-query: inurl:"/wp-content/plugins/iws-geo-form-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,iws-geo-form-fields,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/iws-geo-form-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iws-geo-form-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/izeechat-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/izeechat-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..0742485f2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/izeechat-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: izeechat-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/izeechat/" + google-query: inurl:"/wp-content/plugins/izeechat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,izeechat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/izeechat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "izeechat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jackmail-newsletters-0f6f97ec8d1cc89cf7cec3ff35c09656.yaml b/nuclei-templates/cve-less/plugins/jackmail-newsletters-0f6f97ec8d1cc89cf7cec3ff35c09656.yaml new file mode 100644 index 0000000000..5e22f5f841 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jackmail-newsletters-0f6f97ec8d1cc89cf7cec3ff35c09656.yaml @@ -0,0 +1,58 @@ +id: jackmail-newsletters-0f6f97ec8d1cc89cf7cec3ff35c09656 + +info: + name: > + Emails & Newsletters with Jackmail <= 1.2.22 - Authenticated (Subscriber+) CSV Injecton + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/084a209f-c67b-4df9-9f4b-c537ea065a50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jackmail-newsletters/" + google-query: inurl:"/wp-content/plugins/jackmail-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jackmail-newsletters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jackmail-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jackmail-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jayj-quicktag-a6cb60a315c6c7a94894e2123d4f4da7.yaml b/nuclei-templates/cve-less/plugins/jayj-quicktag-a6cb60a315c6c7a94894e2123d4f4da7.yaml new file mode 100644 index 0000000000..99a88412f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jayj-quicktag-a6cb60a315c6c7a94894e2123d4f4da7.yaml @@ -0,0 +1,58 @@ +id: jayj-quicktag-a6cb60a315c6c7a94894e2123d4f4da7 + +info: + name: > + Jayj Quicktag < 1.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/585fc053-b54f-428e-9abc-9501508aef69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jayj-quicktag/" + google-query: inurl:"/wp-content/plugins/jayj-quicktag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jayj-quicktag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jayj-quicktag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jayj-quicktag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jazz-popups-d1c49397ab5d1626905204217983db24.yaml b/nuclei-templates/cve-less/plugins/jazz-popups-d1c49397ab5d1626905204217983db24.yaml new file mode 100644 index 0000000000..c02bb0527b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jazz-popups-d1c49397ab5d1626905204217983db24.yaml @@ -0,0 +1,58 @@ +id: jazz-popups-d1c49397ab5d1626905204217983db24 + +info: + name: > + Jazz Popups <= 1.8.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/669f5363-22af-4526-b375-3cca2b1db0ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jazz-popups/" + google-query: inurl:"/wp-content/plugins/jazz-popups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jazz-popups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jazz-popups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jazz-popups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jazz-popups-fd8f4b76d0911973d7f68d0007d8b9f6.yaml b/nuclei-templates/cve-less/plugins/jazz-popups-fd8f4b76d0911973d7f68d0007d8b9f6.yaml new file mode 100644 index 0000000000..11b0208c05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jazz-popups-fd8f4b76d0911973d7f68d0007d8b9f6.yaml @@ -0,0 +1,58 @@ +id: jazz-popups-fd8f4b76d0911973d7f68d0007d8b9f6 + +info: + name: > + Jazz Popups <= 1.8.7 - Reflected Cross-Site Scripting via 'wpjazzpopup_switchonoff' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba8c5db5-48d4-4ce1-84b9-5743c7444a3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jazz-popups/" + google-query: inurl:"/wp-content/plugins/jazz-popups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jazz-popups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jazz-popups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jazz-popups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jazzcash-woocommerce-gateway-4d6bafb19843bc6d71a91327064ee112.yaml b/nuclei-templates/cve-less/plugins/jazzcash-woocommerce-gateway-4d6bafb19843bc6d71a91327064ee112.yaml new file mode 100644 index 0000000000..9260d2ba7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jazzcash-woocommerce-gateway-4d6bafb19843bc6d71a91327064ee112.yaml @@ -0,0 +1,58 @@ +id: jazzcash-woocommerce-gateway-4d6bafb19843bc6d71a91327064ee112 + +info: + name: > + WooCommerce JazzCash Gateway Plugin <= 2.0 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6809f7f-4495-4185-b439-820010afc305?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jazzcash-woocommerce-gateway/" + google-query: inurl:"/wp-content/plugins/jazzcash-woocommerce-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jazzcash-woocommerce-gateway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jazzcash-woocommerce-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jazzcash-woocommerce-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jc-importer-6ceb62cda68f33df94c6d2d8223676b0.yaml b/nuclei-templates/cve-less/plugins/jc-importer-6ceb62cda68f33df94c6d2d8223676b0.yaml new file mode 100644 index 0000000000..23c5d25bf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jc-importer-6ceb62cda68f33df94c6d2d8223676b0.yaml @@ -0,0 +1,58 @@ +id: jc-importer-6ceb62cda68f33df94c6d2d8223676b0 + +info: + name: > + Import WP – Export and Import CSV and XML files to WordPress <= 2.13.0 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09023fe2-52dd-43af-ae4f-1fb46654f305?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jc-importer/" + google-query: inurl:"/wp-content/plugins/jc-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jc-importer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jc-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jc-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jc-importer-70ada96da95be698f6717e6048a6ec59.yaml b/nuclei-templates/cve-less/plugins/jc-importer-70ada96da95be698f6717e6048a6ec59.yaml new file mode 100644 index 0000000000..e52df6e939 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jc-importer-70ada96da95be698f6717e6048a6ec59.yaml @@ -0,0 +1,58 @@ +id: jc-importer-70ada96da95be698f6717e6048a6ec59 + +info: + name: > + Import WP – Import and Export WordPress data to XML or CSV files <= 2.4.5 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e518d40-deda-438a-9787-b3cf7faad7a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jc-importer/" + google-query: inurl:"/wp-content/plugins/jc-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jc-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jc-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jc-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jch-optimize-529055d3bc8d484bb022631bf8a543b2.yaml b/nuclei-templates/cve-less/plugins/jch-optimize-529055d3bc8d484bb022631bf8a543b2.yaml new file mode 100644 index 0000000000..dbee8c3bb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jch-optimize-529055d3bc8d484bb022631bf8a543b2.yaml @@ -0,0 +1,58 @@ +id: jch-optimize-529055d3bc8d484bb022631bf8a543b2 + +info: + name: > + JCH Optimize <= 4.0.0 - Missing Authorization to Authenticated (Subscriber+) Settings Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2077bd81-52bd-4aa7-85f6-9abb02aec65b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jch-optimize/" + google-query: inurl:"/wp-content/plugins/jch-optimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jch-optimize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jch-optimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jch-optimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jch-optimize-7438f6c5de0164c1ebbfea6f43fc0dba.yaml b/nuclei-templates/cve-less/plugins/jch-optimize-7438f6c5de0164c1ebbfea6f43fc0dba.yaml new file mode 100644 index 0000000000..ff124a8dbc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jch-optimize-7438f6c5de0164c1ebbfea6f43fc0dba.yaml @@ -0,0 +1,58 @@ +id: jch-optimize-7438f6c5de0164c1ebbfea6f43fc0dba + +info: + name: > + JCH Optimize <= 3.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f04c83b9-33a0-4f4b-afc4-929d40c2ef67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jch-optimize/" + google-query: inurl:"/wp-content/plugins/jch-optimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jch-optimize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jch-optimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jch-optimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jcwp-youtube-channel-embed-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/jcwp-youtube-channel-embed-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..5bd63cb579 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jcwp-youtube-channel-embed-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: jcwp-youtube-channel-embed-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jcwp-youtube-channel-embed/" + google-query: inurl:"/wp-content/plugins/jcwp-youtube-channel-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jcwp-youtube-channel-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jcwp-youtube-channel-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jcwp-youtube-channel-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jds-portfolio-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/jds-portfolio-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3d08c66092 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jds-portfolio-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: jds-portfolio-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jds-portfolio/" + google-query: inurl:"/wp-content/plugins/jds-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jds-portfolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jds-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jds-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeeng-push-notifications-9f87cf742669dcbf6cbaabec0f8d8908.yaml b/nuclei-templates/cve-less/plugins/jeeng-push-notifications-9f87cf742669dcbf6cbaabec0f8d8908.yaml new file mode 100644 index 0000000000..de821c3b88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeeng-push-notifications-9f87cf742669dcbf6cbaabec0f8d8908.yaml @@ -0,0 +1,58 @@ +id: jeeng-push-notifications-9f87cf742669dcbf6cbaabec0f8d8908 + +info: + name: > + Jeeng Push Notifications <= 2.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8551ae2f-4be4-4dc6-952d-1d25ae127150?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeeng-push-notifications/" + google-query: inurl:"/wp-content/plugins/jeeng-push-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeeng-push-notifications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeeng-push-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeeng-push-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeeng-push-notifications-c5989c384ff1fa34fed277024ca7c660.yaml b/nuclei-templates/cve-less/plugins/jeeng-push-notifications-c5989c384ff1fa34fed277024ca7c660.yaml new file mode 100644 index 0000000000..7cd86543bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeeng-push-notifications-c5989c384ff1fa34fed277024ca7c660.yaml @@ -0,0 +1,58 @@ +id: jeeng-push-notifications-c5989c384ff1fa34fed277024ca7c660 + +info: + name: > + Jeeng Push Notifications <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89b528f7-42a7-4b6a-b3f7-3176b91e0dfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeeng-push-notifications/" + google-query: inurl:"/wp-content/plugins/jeeng-push-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeeng-push-notifications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeeng-push-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeeng-push-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeg-elementor-kit-045b6020dfc1ed99134f3177a28e643d.yaml b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-045b6020dfc1ed99134f3177a28e643d.yaml new file mode 100644 index 0000000000..4be31d8fa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-045b6020dfc1ed99134f3177a28e643d.yaml @@ -0,0 +1,58 @@ +id: jeg-elementor-kit-045b6020dfc1ed99134f3177a28e643d + +info: + name: > + Jeg Elementor Kit <= 2.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via HTML Tags + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d108cb36-c072-483e-9746-15b8e7a880c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeg-elementor-kit/" + google-query: inurl:"/wp-content/plugins/jeg-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeg-elementor-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeg-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeg-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeg-elementor-kit-0b6d48f80755becad907191d56a4faea.yaml b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-0b6d48f80755becad907191d56a4faea.yaml new file mode 100644 index 0000000000..f10e586c91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-0b6d48f80755becad907191d56a4faea.yaml @@ -0,0 +1,58 @@ +id: jeg-elementor-kit-0b6d48f80755becad907191d56a4faea + +info: + name: > + Jeg Elementor Kit <= 2.6.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Box + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34a42180-9d08-4049-8da8-27ee1f64600a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeg-elementor-kit/" + google-query: inurl:"/wp-content/plugins/jeg-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeg-elementor-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeg-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeg-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeg-elementor-kit-1429d93adf30ca5583ea8a8bc67d75f6.yaml b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-1429d93adf30ca5583ea8a8bc67d75f6.yaml new file mode 100644 index 0000000000..7acdc95309 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-1429d93adf30ca5583ea8a8bc67d75f6.yaml @@ -0,0 +1,58 @@ +id: jeg-elementor-kit-1429d93adf30ca5583ea8a8bc67d75f6 + +info: + name: > + Jeg Elementor Kit <= 2.5.6 - Unauthenticated Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9955d65-afb3-4d28-abd2-9f2fec92d013?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeg-elementor-kit/" + google-query: inurl:"/wp-content/plugins/jeg-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeg-elementor-kit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeg-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeg-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeg-elementor-kit-39f38e457d08269c0a24a582767d3dfd.yaml b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-39f38e457d08269c0a24a582767d3dfd.yaml new file mode 100644 index 0000000000..d84e25201b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-39f38e457d08269c0a24a582767d3dfd.yaml @@ -0,0 +1,58 @@ +id: jeg-elementor-kit-39f38e457d08269c0a24a582767d3dfd + +info: + name: > + Jeg Elementor Kit <= 2.5.6 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84b616fa-ff64-49e8-8c4a-7d7bfdf758be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeg-elementor-kit/" + google-query: inurl:"/wp-content/plugins/jeg-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeg-elementor-kit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeg-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeg-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeg-elementor-kit-8abead7c575d5ff9d8bcc0c1daac4379.yaml b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-8abead7c575d5ff9d8bcc0c1daac4379.yaml new file mode 100644 index 0000000000..ec50e0c78d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-8abead7c575d5ff9d8bcc0c1daac4379.yaml @@ -0,0 +1,58 @@ +id: jeg-elementor-kit-8abead7c575d5ff9d8bcc0c1daac4379 + +info: + name: > + Jeg Elementor Kit <= 2.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via JKit - Banner + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46868a11-0c82-4bd3-82b5-9a19a5a0cef1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeg-elementor-kit/" + google-query: inurl:"/wp-content/plugins/jeg-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeg-elementor-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeg-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeg-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeg-elementor-kit-9ac2eb6aa79c6ee262cfc473810b750d.yaml b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-9ac2eb6aa79c6ee262cfc473810b750d.yaml new file mode 100644 index 0000000000..663b5fc852 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-9ac2eb6aa79c6ee262cfc473810b750d.yaml @@ -0,0 +1,58 @@ +id: jeg-elementor-kit-9ac2eb6aa79c6ee262cfc473810b750d + +info: + name: > + Jeg Elementor Kit <= 2.6.4 - Authenticated (Contributor+) Cross-Site Scripting via Elementor Widget URL Custom Attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/950e9042-1364-4200-8f57-171346075764?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeg-elementor-kit/" + google-query: inurl:"/wp-content/plugins/jeg-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeg-elementor-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeg-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeg-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeg-elementor-kit-a2e686465d8672ec5bf29632e66237cf.yaml b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-a2e686465d8672ec5bf29632e66237cf.yaml new file mode 100644 index 0000000000..96122141c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-a2e686465d8672ec5bf29632e66237cf.yaml @@ -0,0 +1,58 @@ +id: jeg-elementor-kit-a2e686465d8672ec5bf29632e66237cf + +info: + name: > + Jeg Elementor Kit <= 2.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48a13fb7-bf1a-4bf2-ac3b-3b5a75fec616?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeg-elementor-kit/" + google-query: inurl:"/wp-content/plugins/jeg-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeg-elementor-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeg-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeg-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jeg-elementor-kit-fc806cfd6ed4dc072c39a0980e8091bc.yaml b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-fc806cfd6ed4dc072c39a0980e8091bc.yaml new file mode 100644 index 0000000000..d81f782f12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jeg-elementor-kit-fc806cfd6ed4dc072c39a0980e8091bc.yaml @@ -0,0 +1,58 @@ +id: jeg-elementor-kit-fc806cfd6ed4dc072c39a0980e8091bc + +info: + name: > + Jeg Elementor Kit <= 2.6.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Testimonial + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d54c7623-25af-4bf1-a6e0-9022ec26f391?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jeg-elementor-kit/" + google-query: inurl:"/wp-content/plugins/jeg-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jeg-elementor-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jeg-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jeg-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-blocks-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-blocks-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..b450a50fa3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-blocks-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-blocks-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-blocks/" + google-query: inurl:"/wp-content/plugins/jet-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-blocks-d0c27f042f57c6d16293a23758983b37.yaml b/nuclei-templates/cve-less/plugins/jet-blocks-d0c27f042f57c6d16293a23758983b37.yaml new file mode 100644 index 0000000000..0cc026d549 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-blocks-d0c27f042f57c6d16293a23758983b37.yaml @@ -0,0 +1,58 @@ +id: jet-blocks-d0c27f042f57c6d16293a23758983b37 + +info: + name: > + JetBlocks For Elementor <= 1.3.8 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2614ca26-6efc-49f5-8cee-5b078721acc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-blocks/" + google-query: inurl:"/wp-content/plugins/jet-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-blocks-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-blocks-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..78ddfceeed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-blocks-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-blocks-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-blocks/" + google-query: inurl:"/wp-content/plugins/jet-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-blocks-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-blocks-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..21399e1691 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-blocks-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-blocks-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-blocks/" + google-query: inurl:"/wp-content/plugins/jet-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-blog-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-blog-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..d818cdc793 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-blog-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-blog-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-blog/" + google-query: inurl:"/wp-content/plugins/jet-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-blog-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-blog-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..63ae52669c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-blog-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-blog-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-blog/" + google-query: inurl:"/wp-content/plugins/jet-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-blog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-blog-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-blog-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..6a44588a77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-blog-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-blog-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-blog/" + google-query: inurl:"/wp-content/plugins/jet-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-compare-wishlist-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-compare-wishlist-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..b91b622a82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-compare-wishlist-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-compare-wishlist-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-compare-wishlist/" + google-query: inurl:"/wp-content/plugins/jet-compare-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-compare-wishlist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-compare-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-compare-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-compare-wishlist-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-compare-wishlist-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..ee8dc0182e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-compare-wishlist-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-compare-wishlist-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-compare-wishlist/" + google-query: inurl:"/wp-content/plugins/jet-compare-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-compare-wishlist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-compare-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-compare-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-compare-wishlist-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-compare-wishlist-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..5a667b4c3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-compare-wishlist-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-compare-wishlist-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-compare-wishlist/" + google-query: inurl:"/wp-content/plugins/jet-compare-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-compare-wishlist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-compare-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-compare-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-elements-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-elements-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..a5f77b12fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-elements-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-elements-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-elements/" + google-query: inurl:"/wp-content/plugins/jet-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-elements-7ba0ab8627448e04a3557ed6ccce144f.yaml b/nuclei-templates/cve-less/plugins/jet-elements-7ba0ab8627448e04a3557ed6ccce144f.yaml new file mode 100644 index 0000000000..5d9a6ad22c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-elements-7ba0ab8627448e04a3557ed6ccce144f.yaml @@ -0,0 +1,58 @@ +id: jet-elements-7ba0ab8627448e04a3557ed6ccce144f + +info: + name: > + JetElements For Elementor <= 2.6.13 - Missing Authorization to Unauthenticated Arbitrary Attachment Download + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d199e597-64ed-4dcc-a153-b5c8e4e9e93d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-elements/" + google-query: inurl:"/wp-content/plugins/jet-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-elements-cdc0a1afbf2cc009eea0f7deda8a5515.yaml b/nuclei-templates/cve-less/plugins/jet-elements-cdc0a1afbf2cc009eea0f7deda8a5515.yaml new file mode 100644 index 0000000000..523ef8476f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-elements-cdc0a1afbf2cc009eea0f7deda8a5515.yaml @@ -0,0 +1,58 @@ +id: jet-elements-cdc0a1afbf2cc009eea0f7deda8a5515 + +info: + name: > + JetElements <= 2.6.10 - Authenticated (Contributor+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73fca37e-c6cf-420c-b984-3ef89acf3216?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-elements/" + google-query: inurl:"/wp-content/plugins/jet-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-elements-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-elements-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..36e8cdea38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-elements-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-elements-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-elements/" + google-query: inurl:"/wp-content/plugins/jet-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-elements-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-elements-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..cf15416fc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-elements-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-elements-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-elements/" + google-query: inurl:"/wp-content/plugins/jet-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-engine-1671dddc3e7743782d8ec72b0e2ab60c.yaml b/nuclei-templates/cve-less/plugins/jet-engine-1671dddc3e7743782d8ec72b0e2ab60c.yaml new file mode 100644 index 0000000000..cbdac1096b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-engine-1671dddc3e7743782d8ec72b0e2ab60c.yaml @@ -0,0 +1,58 @@ +id: jet-engine-1671dddc3e7743782d8ec72b0e2ab60c + +info: + name: > + Crocoblock JetEngine <= 3.1.3 - Authenticated(Author+) Arbitrary File Upload to Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7e7247f-869a-4cf0-ae03-0b36ecbc1b7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-engine/" + google-query: inurl:"/wp-content/plugins/jet-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-engine-23ba9e8ddbee95a7030ba5db7648376b.yaml b/nuclei-templates/cve-less/plugins/jet-engine-23ba9e8ddbee95a7030ba5db7648376b.yaml new file mode 100644 index 0000000000..a3c68717af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-engine-23ba9e8ddbee95a7030ba5db7648376b.yaml @@ -0,0 +1,58 @@ +id: jet-engine-23ba9e8ddbee95a7030ba5db7648376b + +info: + name: > + JetEngine <= 3.2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f2c97f4-0a6e-4693-a6c8-bd81ca76988c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-engine/" + google-query: inurl:"/wp-content/plugins/jet-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-engine-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-engine-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..3ad1392de2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-engine-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-engine-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-engine/" + google-query: inurl:"/wp-content/plugins/jet-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-engine-f12b5bbfc5d1dcce9a91a5751dceea95.yaml b/nuclei-templates/cve-less/plugins/jet-engine-f12b5bbfc5d1dcce9a91a5751dceea95.yaml new file mode 100644 index 0000000000..cabe1523c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-engine-f12b5bbfc5d1dcce9a91a5751dceea95.yaml @@ -0,0 +1,58 @@ +id: jet-engine-f12b5bbfc5d1dcce9a91a5751dceea95 + +info: + name: > + JetEngine <= 3.2.4 - Authenticated (Contributor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad66015d-7831-4590-9583-3abf7ca43c3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-engine/" + google-query: inurl:"/wp-content/plugins/jet-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-engine,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-engine-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-engine-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..c8528f052e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-engine-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-engine-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-engine/" + google-query: inurl:"/wp-content/plugins/jet-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-menu-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-menu-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..14d21a8609 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-menu-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-menu-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-menu/" + google-query: inurl:"/wp-content/plugins/jet-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-menu-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-menu-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..d78149b2f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-menu-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-menu-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-menu/" + google-query: inurl:"/wp-content/plugins/jet-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-menu-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-menu-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..2d04b8045b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-menu-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-menu-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-menu/" + google-query: inurl:"/wp-content/plugins/jet-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-popup-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-popup-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..26f46ecc67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-popup-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-popup-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-popup/" + google-query: inurl:"/wp-content/plugins/jet-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-popup-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-popup-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..62ef43b797 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-popup-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-popup-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-popup/" + google-query: inurl:"/wp-content/plugins/jet-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-reviews-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-reviews-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..677b04c409 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-reviews-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-reviews-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-reviews/" + google-query: inurl:"/wp-content/plugins/jet-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-reviews-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-reviews-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..96ed25f5bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-reviews-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-reviews-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-reviews/" + google-query: inurl:"/wp-content/plugins/jet-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-reviews-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-reviews-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..2d140bfa1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-reviews-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-reviews-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-reviews/" + google-query: inurl:"/wp-content/plugins/jet-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-search-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-search-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..579c4592b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-search-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-search-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-search/" + google-query: inurl:"/wp-content/plugins/jet-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-search-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-search-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..22aa4d14bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-search-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-search-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-search/" + google-query: inurl:"/wp-content/plugins/jet-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-smart-filters-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-smart-filters-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..40ff331ade --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-smart-filters-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-smart-filters-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-smart-filters/" + google-query: inurl:"/wp-content/plugins/jet-smart-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-smart-filters,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-smart-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-smart-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-smart-filters-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-smart-filters-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..5e45b54b00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-smart-filters-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-smart-filters-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-smart-filters/" + google-query: inurl:"/wp-content/plugins/jet-smart-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-smart-filters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-smart-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-smart-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-smart-filters-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-smart-filters-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..945f616491 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-smart-filters-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-smart-filters-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-smart-filters/" + google-query: inurl:"/wp-content/plugins/jet-smart-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-smart-filters,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-smart-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-smart-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-tabs-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-tabs-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..99f6b3ed16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-tabs-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-tabs-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-tabs/" + google-query: inurl:"/wp-content/plugins/jet-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-tabs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-tabs-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-tabs-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..0ae65332f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-tabs-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-tabs-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-tabs/" + google-query: inurl:"/wp-content/plugins/jet-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-tabs-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-tabs-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..94e7bf0748 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-tabs-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-tabs-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-tabs/" + google-query: inurl:"/wp-content/plugins/jet-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-tabs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-theme-core-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-theme-core-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..e67a9c5450 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-theme-core-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-theme-core-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-theme-core/" + google-query: inurl:"/wp-content/plugins/jet-theme-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-theme-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-theme-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-theme-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-theme-core-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-theme-core-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..8019e7508b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-theme-core-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-theme-core-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-theme-core/" + google-query: inurl:"/wp-content/plugins/jet-theme-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-theme-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-theme-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-theme-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-theme-core-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-theme-core-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..68e1c00553 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-theme-core-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-theme-core-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-theme-core/" + google-query: inurl:"/wp-content/plugins/jet-theme-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-theme-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-theme-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-theme-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-tricks-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-tricks-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..9f4a5f6423 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-tricks-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-tricks-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-tricks/" + google-query: inurl:"/wp-content/plugins/jet-tricks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-tricks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-tricks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-tricks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-tricks-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-tricks-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..c37b08ccae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-tricks-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-tricks-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-tricks/" + google-query: inurl:"/wp-content/plugins/jet-tricks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-tricks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-tricks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-tricks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-tricks-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-tricks-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..d395c47e43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-tricks-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-tricks-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-tricks/" + google-query: inurl:"/wp-content/plugins/jet-tricks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-tricks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-tricks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-tricks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-woo-builder-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-woo-builder-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..0fcfe44a98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-woo-builder-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-woo-builder-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-woo-builder/" + google-query: inurl:"/wp-content/plugins/jet-woo-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-woo-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-woo-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-woo-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-woo-builder-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-woo-builder-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..d1fb923a35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-woo-builder-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-woo-builder-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-woo-builder/" + google-query: inurl:"/wp-content/plugins/jet-woo-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-woo-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-woo-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-woo-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-woo-builder-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-woo-builder-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..d40d912155 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-woo-builder-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-woo-builder-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-woo-builder/" + google-query: inurl:"/wp-content/plugins/jet-woo-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-woo-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-woo-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-woo-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-320a6f011d285ddb19c436d57e994504.yaml b/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-320a6f011d285ddb19c436d57e994504.yaml new file mode 100644 index 0000000000..2bc49d0f52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-320a6f011d285ddb19c436d57e994504.yaml @@ -0,0 +1,58 @@ +id: jet-woo-product-gallery-320a6f011d285ddb19c436d57e994504 + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization to Unauthenticated Unauthorized Action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7addc83b-cde5-4f91-b286-70db6f384a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-woo-product-gallery/" + google-query: inurl:"/wp-content/plugins/jet-woo-product-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-woo-product-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-woo-product-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-woo-product-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-dfd0d896b1397455913caf7f911dd62c.yaml b/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-dfd0d896b1397455913caf7f911dd62c.yaml new file mode 100644 index 0000000000..46633aafd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-dfd0d896b1397455913caf7f911dd62c.yaml @@ -0,0 +1,58 @@ +id: jet-woo-product-gallery-dfd0d896b1397455913caf7f911dd62c + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c85e5e0-d8ee-46d3-99b1-df6c6744f020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-woo-product-gallery/" + google-query: inurl:"/wp-content/plugins/jet-woo-product-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-woo-product-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-woo-product-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-woo-product-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-fd87adc782adc661fc2721ea4df8055a.yaml b/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-fd87adc782adc661fc2721ea4df8055a.yaml new file mode 100644 index 0000000000..52729258be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jet-woo-product-gallery-fd87adc782adc661fc2721ea4df8055a.yaml @@ -0,0 +1,58 @@ +id: jet-woo-product-gallery-fd87adc782adc661fc2721ea4df8055a + +info: + name: > + Multiple Plugins by Crocoblock <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/893500ba-cc16-4429-bbe1-725aa65589c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jet-woo-product-gallery/" + google-query: inurl:"/wp-content/plugins/jet-woo-product-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jet-woo-product-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jet-woo-product-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jet-woo-product-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetformbuilder-162aad8c1f1a67baa5f70490c52d6e30.yaml b/nuclei-templates/cve-less/plugins/jetformbuilder-162aad8c1f1a67baa5f70490c52d6e30.yaml new file mode 100644 index 0000000000..bd3d40e433 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetformbuilder-162aad8c1f1a67baa5f70490c52d6e30.yaml @@ -0,0 +1,58 @@ +id: jetformbuilder-162aad8c1f1a67baa5f70490c52d6e30 + +info: + name: > + JetFormBuilder <= 3.1.4 - Unauthenticated Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0343861-a376-43ea-826e-277c2a5ea635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetformbuilder/" + google-query: inurl:"/wp-content/plugins/jetformbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetformbuilder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetformbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetformbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetformbuilder-49120404cfb8d5621438564fe9eb32bd.yaml b/nuclei-templates/cve-less/plugins/jetformbuilder-49120404cfb8d5621438564fe9eb32bd.yaml new file mode 100644 index 0000000000..a55dd3c054 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetformbuilder-49120404cfb8d5621438564fe9eb32bd.yaml @@ -0,0 +1,58 @@ +id: jetformbuilder-49120404cfb8d5621438564fe9eb32bd + +info: + name: > + JetFormBuilder <= 3.0.8 - Authenticated (Author+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9d58191-769c-4632-a086-4dbce9bfb6ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetformbuilder/" + google-query: inurl:"/wp-content/plugins/jetformbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetformbuilder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetformbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetformbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetformbuilder-5af33f7a1d49eb666342cd85959401ec.yaml b/nuclei-templates/cve-less/plugins/jetformbuilder-5af33f7a1d49eb666342cd85959401ec.yaml new file mode 100644 index 0000000000..83be9919a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetformbuilder-5af33f7a1d49eb666342cd85959401ec.yaml @@ -0,0 +1,58 @@ +id: jetformbuilder-5af33f7a1d49eb666342cd85959401ec + +info: + name: > + JetFormBuilder <= 3.0.6 - Cross-Site Request Fogery via 'do_admin_action' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f37c4b2c-6f41-46b5-8427-b1883b39322e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetformbuilder/" + google-query: inurl:"/wp-content/plugins/jetformbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetformbuilder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetformbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetformbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-056f71c24acbc6635e313f4c349ddfa5.yaml b/nuclei-templates/cve-less/plugins/jetpack-056f71c24acbc6635e313f4c349ddfa5.yaml new file mode 100644 index 0000000000..ee52753f2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-056f71c24acbc6635e313f4c349ddfa5.yaml @@ -0,0 +1,58 @@ +id: jetpack-056f71c24acbc6635e313f4c349ddfa5 + +info: + name: > + Jetpack – WP Security, Backup, Speed, & Growth <= 3.9.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b86a259-b102-411a-8d4c-c131737b90d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-0e86932241c6ad3f70627e02c54dbc31.yaml b/nuclei-templates/cve-less/plugins/jetpack-0e86932241c6ad3f70627e02c54dbc31.yaml new file mode 100644 index 0000000000..d89cdf2607 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-0e86932241c6ad3f70627e02c54dbc31.yaml @@ -0,0 +1,58 @@ +id: jetpack-0e86932241c6ad3f70627e02c54dbc31 + +info: + name: > + Jetpack < 7.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5083509e-84e4-4bd3-9023-b458312b1886?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-26ecdaccaffefdf8e29ddd7078f1caed.yaml b/nuclei-templates/cve-less/plugins/jetpack-26ecdaccaffefdf8e29ddd7078f1caed.yaml new file mode 100644 index 0000000000..dc87c939df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-26ecdaccaffefdf8e29ddd7078f1caed.yaml @@ -0,0 +1,58 @@ +id: jetpack-26ecdaccaffefdf8e29ddd7078f1caed + +info: + name: > + Jetpack <= 3.7.1 - Information disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72094f97-c1cc-48df-9c88-1352e6d6e67e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-2be7d29f9bb984978a5f99c0ed30a7ed.yaml b/nuclei-templates/cve-less/plugins/jetpack-2be7d29f9bb984978a5f99c0ed30a7ed.yaml new file mode 100644 index 0000000000..e91fde6b52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-2be7d29f9bb984978a5f99c0ed30a7ed.yaml @@ -0,0 +1,58 @@ +id: jetpack-2be7d29f9bb984978a5f99c0ed30a7ed + +info: + name: > + Jetpack <= 4.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2153f7e2-0d39-4784-a1f5-aa77959306a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-679cd3cb1279c50b5fee2410e1fd3f6b.yaml b/nuclei-templates/cve-less/plugins/jetpack-679cd3cb1279c50b5fee2410e1fd3f6b.yaml new file mode 100644 index 0000000000..ac61cd97d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-679cd3cb1279c50b5fee2410e1fd3f6b.yaml @@ -0,0 +1,58 @@ +id: jetpack-679cd3cb1279c50b5fee2410e1fd3f6b + +info: + name: > + Jetpack <= 3.7.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1c731b9-8862-4140-b5e8-58132113e22c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-67e0a9fec932f5d791c2a1af30baf3c7.yaml b/nuclei-templates/cve-less/plugins/jetpack-67e0a9fec932f5d791c2a1af30baf3c7.yaml new file mode 100644 index 0000000000..40cc3a7666 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-67e0a9fec932f5d791c2a1af30baf3c7.yaml @@ -0,0 +1,58 @@ +id: jetpack-67e0a9fec932f5d791c2a1af30baf3c7 + +info: + name: > + Jetpack <= 12.1 - Authenticated (Author+) Arbitrary File Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dfca4cb-71dc-4b2d-bcf3-0ca9f88f88df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 9.9', '<= 9.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-72d92c55ab230f31b35329569f6860a8.yaml b/nuclei-templates/cve-less/plugins/jetpack-72d92c55ab230f31b35329569f6860a8.yaml new file mode 100644 index 0000000000..7aab23e175 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-72d92c55ab230f31b35329569f6860a8.yaml @@ -0,0 +1,58 @@ +id: jetpack-72d92c55ab230f31b35329569f6860a8 + +info: + name: > + Jetpack – WP Security, Backup, Speed, & Growth < 4.2 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4703ca7-0677-4128-b9b7-31132ff1804d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-8018c4071bf114403387ecc74840b848.yaml b/nuclei-templates/cve-less/plugins/jetpack-8018c4071bf114403387ecc74840b848.yaml new file mode 100644 index 0000000000..88123b5a95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-8018c4071bf114403387ecc74840b848.yaml @@ -0,0 +1,58 @@ +id: jetpack-8018c4071bf114403387ecc74840b848 + +info: + name: > + Jetpack <= 12.6.2 - Improper Authorization via WPCom External Media REST endpoints + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e62fa16f-a4a1-44a7-9a66-abafd8dddf67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-9df4fd409a4edbb8572536db3f6715d1.yaml b/nuclei-templates/cve-less/plugins/jetpack-9df4fd409a4edbb8572536db3f6715d1.yaml new file mode 100644 index 0000000000..0d6801ba2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-9df4fd409a4edbb8572536db3f6715d1.yaml @@ -0,0 +1,58 @@ +id: jetpack-9df4fd409a4edbb8572536db3f6715d1 + +info: + name: > + Jetpack <= 6.4.2 - Cross-Site Scripting via post_meta + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d703abc2-3269-42b2-a75c-d163df62260d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-9fc3c2f298b108af257176fa3092141b.yaml b/nuclei-templates/cve-less/plugins/jetpack-9fc3c2f298b108af257176fa3092141b.yaml new file mode 100644 index 0000000000..b16e02c973 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-9fc3c2f298b108af257176fa3092141b.yaml @@ -0,0 +1,58 @@ +id: jetpack-9fc3c2f298b108af257176fa3092141b + +info: + name: > + Jetpack <= 12.8-a.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via block attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/824360ab-c797-465a-8480-baeae941af29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.8-a.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-a3ff2f778a78f56b1a077199729153f4.yaml b/nuclei-templates/cve-less/plugins/jetpack-a3ff2f778a78f56b1a077199729153f4.yaml new file mode 100644 index 0000000000..27740e476e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-a3ff2f778a78f56b1a077199729153f4.yaml @@ -0,0 +1,58 @@ +id: jetpack-a3ff2f778a78f56b1a077199729153f4 + +info: + name: > + Jetpack – WP Security, Backup, Speed, & Growth < 4.2 - Timing Attack + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc6dcf93-7f1f-4e87-8ba5-852d23b1f0fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-aad57ee588ef69bf0761243cceff43ab.yaml b/nuclei-templates/cve-less/plugins/jetpack-aad57ee588ef69bf0761243cceff43ab.yaml new file mode 100644 index 0000000000..082765439e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-aad57ee588ef69bf0761243cceff43ab.yaml @@ -0,0 +1,58 @@ +id: jetpack-aad57ee588ef69bf0761243cceff43ab + +info: + name: > + Jetpack <= 3.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90e7951b-3834-48a3-8a40-2b6055d1b62c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-b0d263ca65579d9d14b154cf891cd65e.yaml b/nuclei-templates/cve-less/plugins/jetpack-b0d263ca65579d9d14b154cf891cd65e.yaml new file mode 100644 index 0000000000..4c2903c73d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-b0d263ca65579d9d14b154cf891cd65e.yaml @@ -0,0 +1,58 @@ +id: jetpack-b0d263ca65579d9d14b154cf891cd65e + +info: + name: > + Jetpack <= 4.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91652abf-2127-40be-bcd8-4a0679707953?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-b9a10340d1ee615f8f2aaccc216ca7f7.yaml b/nuclei-templates/cve-less/plugins/jetpack-b9a10340d1ee615f8f2aaccc216ca7f7.yaml new file mode 100644 index 0000000000..e8f47dadf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-b9a10340d1ee615f8f2aaccc216ca7f7.yaml @@ -0,0 +1,58 @@ +id: jetpack-b9a10340d1ee615f8f2aaccc216ca7f7 + +info: + name: > + Jetpack < 12.7 - Authenticated(Contributor+) Clickjacking via Iframe Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92a3e622-b3b2-450e-82a7-0a942711e8c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-be7859a3dd693882ff3dd8991a70f093.yaml b/nuclei-templates/cve-less/plugins/jetpack-be7859a3dd693882ff3dd8991a70f093.yaml new file mode 100644 index 0000000000..a5c9d7cd5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-be7859a3dd693882ff3dd8991a70f093.yaml @@ -0,0 +1,58 @@ +id: jetpack-be7859a3dd693882ff3dd8991a70f093 + +info: + name: > + JetPack <= 9.7 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b4eb0a1-69ad-4e0d-9760-752ec0589314?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 9.7', '<= 9.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-c792a1156e3fd0f41d681016940dc814.yaml b/nuclei-templates/cve-less/plugins/jetpack-c792a1156e3fd0f41d681016940dc814.yaml new file mode 100644 index 0000000000..b68e6b38ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-c792a1156e3fd0f41d681016940dc814.yaml @@ -0,0 +1,58 @@ +id: jetpack-c792a1156e3fd0f41d681016940dc814 + +info: + name: > + Jetpack < 2.9.3 - Security Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8650a2e-346f-45fb-b5f5-ee99a470b2fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.9', '<= 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-d4b5db96e8a4cb8dde234da2c8c95905.yaml b/nuclei-templates/cve-less/plugins/jetpack-d4b5db96e8a4cb8dde234da2c8c95905.yaml new file mode 100644 index 0000000000..19378e6043 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-d4b5db96e8a4cb8dde234da2c8c95905.yaml @@ -0,0 +1,58 @@ +id: jetpack-d4b5db96e8a4cb8dde234da2c8c95905 + +info: + name: > + Jetpack <= 7.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5287cf42-6d0a-4fd2-943d-e8e44fc08576?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 7.9', '<= 7.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-da2fe024ebfa193aa99df991321c990c.yaml b/nuclei-templates/cve-less/plugins/jetpack-da2fe024ebfa193aa99df991321c990c.yaml new file mode 100644 index 0000000000..ab8ca20843 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-da2fe024ebfa193aa99df991321c990c.yaml @@ -0,0 +1,58 @@ +id: jetpack-da2fe024ebfa193aa99df991321c990c + +info: + name: > + Jetpack <= 3.5.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8616189-5ab8-4db0-ab9e-768cc738aeb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-e9445f5977de7568ced6d296abe4edd1.yaml b/nuclei-templates/cve-less/plugins/jetpack-e9445f5977de7568ced6d296abe4edd1.yaml new file mode 100644 index 0000000000..6104a71340 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-e9445f5977de7568ced6d296abe4edd1.yaml @@ -0,0 +1,58 @@ +id: jetpack-e9445f5977de7568ced6d296abe4edd1 + +info: + name: > + Jetpack – WP Security, Backup, Speed, & Growth < 4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35293a82-b535-47a2-8a34-e54fe836ca89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetpack-fe6364297dbbdebcc849affd9cb5e248.yaml b/nuclei-templates/cve-less/plugins/jetpack-fe6364297dbbdebcc849affd9cb5e248.yaml new file mode 100644 index 0000000000..0b762ca3da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetpack-fe6364297dbbdebcc849affd9cb5e248.yaml @@ -0,0 +1,58 @@ +id: jetpack-fe6364297dbbdebcc849affd9cb5e248 + +info: + name: > + Jetpack – WP Security, Backup, Speed, & Growth <= 3.9.1 - Cross-Site Scripting via LaTeX markup within HTML elements + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0691cff0-86ed-47d3-9492-5ebc930d3eb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetpack/" + google-query: inurl:"/wp-content/plugins/jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-47cacf238b136edb1857adcd228879bf.yaml b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-47cacf238b136edb1857adcd228879bf.yaml new file mode 100644 index 0000000000..5fca73f58e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-47cacf238b136edb1857adcd228879bf.yaml @@ -0,0 +1,58 @@ +id: jetwidgets-for-elementor-47cacf238b136edb1857adcd228879bf + +info: + name: > + JetWidgets for Elementor <= 1.0.12 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8de3d3c7-bde2-4455-8d60-20307f0a53ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetwidgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/jetwidgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetwidgets-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetwidgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetwidgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-600dd698b59252da2334c219e30a3a4b.yaml b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-600dd698b59252da2334c219e30a3a4b.yaml new file mode 100644 index 0000000000..f8220befaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-600dd698b59252da2334c219e30a3a4b.yaml @@ -0,0 +1,58 @@ +id: jetwidgets-for-elementor-600dd698b59252da2334c219e30a3a4b + +info: + name: > + JetWidgets For Elementor <= 1.0.16 - Authenticated(Contributor+) Stored Cross-Site Scripting via Widget Button URL + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a02f0a23-0b2b-4e16-9f6d-ec6302a0d23b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetwidgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/jetwidgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetwidgets-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetwidgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetwidgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-93b41408a78e1823934fe3d9ee7379d0.yaml b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-93b41408a78e1823934fe3d9ee7379d0.yaml new file mode 100644 index 0000000000..f2feee7f35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-93b41408a78e1823934fe3d9ee7379d0.yaml @@ -0,0 +1,58 @@ +id: jetwidgets-for-elementor-93b41408a78e1823934fe3d9ee7379d0 + +info: + name: > + JetWidgets For Elementor <= 1.0.15 - Authenticated (Contributor+) Stored Cross-Site Scripting via Animated Box Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f807b605-68a8-4340-a275-776eac0936fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetwidgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/jetwidgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetwidgets-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetwidgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetwidgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-c3fb6f2c99d4c5f13096c4775a849201.yaml b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-c3fb6f2c99d4c5f13096c4775a849201.yaml new file mode 100644 index 0000000000..23c9a1ff19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-c3fb6f2c99d4c5f13096c4775a849201.yaml @@ -0,0 +1,58 @@ +id: jetwidgets-for-elementor-c3fb6f2c99d4c5f13096c4775a849201 + +info: + name: > + JetWidgets For Elementor <= 1.0.8 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21b8fcfe-bdae-414a-a0d2-f20bfd604037?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetwidgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/jetwidgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetwidgets-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetwidgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetwidgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-d9a90b73211e016b68ca1b3072e7a420.yaml b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-d9a90b73211e016b68ca1b3072e7a420.yaml new file mode 100644 index 0000000000..78ce08d8a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jetwidgets-for-elementor-d9a90b73211e016b68ca1b3072e7a420.yaml @@ -0,0 +1,58 @@ +id: jetwidgets-for-elementor-d9a90b73211e016b68ca1b3072e7a420 + +info: + name: > + JetWidgets For Elementor <= 1.0.13 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/934db08b-7dde-43bf-848b-48fba38ef195?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jetwidgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/jetwidgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jetwidgets-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jetwidgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetwidgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jh-404-logger-df91ebe73a45ac966511f7792447be75.yaml b/nuclei-templates/cve-less/plugins/jh-404-logger-df91ebe73a45ac966511f7792447be75.yaml new file mode 100644 index 0000000000..fb8f2f4e34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jh-404-logger-df91ebe73a45ac966511f7792447be75.yaml @@ -0,0 +1,58 @@ +id: jh-404-logger-df91ebe73a45ac966511f7792447be75 + +info: + name: > + JH 404 Logger <= 1.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eea754db-495a-4518-840e-0eeeeb1c31b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jh-404-logger/" + google-query: inurl:"/wp-content/plugins/jh-404-logger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jh-404-logger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jh-404-logger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jh-404-logger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jiangqie-official-website-mini-program-f73561aa7a756a9f3e5287e2a9bf11ee.yaml b/nuclei-templates/cve-less/plugins/jiangqie-official-website-mini-program-f73561aa7a756a9f3e5287e2a9bf11ee.yaml new file mode 100644 index 0000000000..442a62b3a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jiangqie-official-website-mini-program-f73561aa7a756a9f3e5287e2a9bf11ee.yaml @@ -0,0 +1,58 @@ +id: jiangqie-official-website-mini-program-f73561aa7a756a9f3e5287e2a9bf11ee + +info: + name: > + JiangQie Official Website Mini Program < 1.1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5572fea7-a8d5-457d-88fc-57051b35aa11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jiangqie-official-website-mini-program/" + google-query: inurl:"/wp-content/plugins/jiangqie-official-website-mini-program/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jiangqie-official-website-mini-program,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jiangqie-official-website-mini-program/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jiangqie-official-website-mini-program" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jibu-pro-1318af711c3fe0fec9bc7d351421ab5e.yaml b/nuclei-templates/cve-less/plugins/jibu-pro-1318af711c3fe0fec9bc7d351421ab5e.yaml new file mode 100644 index 0000000000..7f3d7ed3bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jibu-pro-1318af711c3fe0fec9bc7d351421ab5e.yaml @@ -0,0 +1,58 @@ +id: jibu-pro-1318af711c3fe0fec9bc7d351421ab5e + +info: + name: > + Jibu Pro <= 1.7 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb823899-e90d-4857-9f72-aa7fe60aaca2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jibu-pro/" + google-query: inurl:"/wp-content/plugins/jibu-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jibu-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jibu-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jibu-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jigoshop-store-toolkit-95537a5037076723ccef81d1fba789fa.yaml b/nuclei-templates/cve-less/plugins/jigoshop-store-toolkit-95537a5037076723ccef81d1fba789fa.yaml new file mode 100644 index 0000000000..9c8b38c3cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jigoshop-store-toolkit-95537a5037076723ccef81d1fba789fa.yaml @@ -0,0 +1,58 @@ +id: jigoshop-store-toolkit-95537a5037076723ccef81d1fba789fa + +info: + name: > + Jigoshop – Store Toolkit <= 1.3.8 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/761ec035-5961-45a5-8197-b5209df8bc3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jigoshop-store-toolkit/" + google-query: inurl:"/wp-content/plugins/jigoshop-store-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jigoshop-store-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jigoshop-store-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jigoshop-store-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jivochat-557dc76e2c2294cd33c5721f9ecf01e7.yaml b/nuclei-templates/cve-less/plugins/jivochat-557dc76e2c2294cd33c5721f9ecf01e7.yaml new file mode 100644 index 0000000000..7f608549f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jivochat-557dc76e2c2294cd33c5721f9ecf01e7.yaml @@ -0,0 +1,58 @@ +id: jivochat-557dc76e2c2294cd33c5721f9ecf01e7 + +info: + name: > + JivoChat Live Chat – WP live chat plugin for WordPress <= 1.3.5.3 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/034e77ef-fb3f-4e62-be1b-c56c454c5ba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jivochat/" + google-query: inurl:"/wp-content/plugins/jivochat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jivochat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jivochat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jivochat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jm-twitter-cards-9ece1f8354a7e11befbd20ae11f9cc95.yaml b/nuclei-templates/cve-less/plugins/jm-twitter-cards-9ece1f8354a7e11befbd20ae11f9cc95.yaml new file mode 100644 index 0000000000..b7a58658d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jm-twitter-cards-9ece1f8354a7e11befbd20ae11f9cc95.yaml @@ -0,0 +1,58 @@ +id: jm-twitter-cards-9ece1f8354a7e11befbd20ae11f9cc95 + +info: + name: > + JM Twitter Cards <= 14 - Information Exposure via Meta Description + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b48e5973-6923-47cc-a660-ecc989f540f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jm-twitter-cards/" + google-query: inurl:"/wp-content/plugins/jm-twitter-cards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jm-twitter-cards,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jm-twitter-cards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jm-twitter-cards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jm-twitter-cards-a147e2c0921b88394b88f70de0b50255.yaml b/nuclei-templates/cve-less/plugins/jm-twitter-cards-a147e2c0921b88394b88f70de0b50255.yaml new file mode 100644 index 0000000000..4142ca8940 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jm-twitter-cards-a147e2c0921b88394b88f70de0b50255.yaml @@ -0,0 +1,58 @@ +id: jm-twitter-cards-a147e2c0921b88394b88f70de0b50255 + +info: + name: > + JM Twitter Cards < 6.2 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01b3013f-60b9-449b-a2a9-64e37a1454ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jm-twitter-cards/" + google-query: inurl:"/wp-content/plugins/jm-twitter-cards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jm-twitter-cards,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jm-twitter-cards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jm-twitter-cards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joan-385d5d7a4b24b938786ff7b93e4cd0be.yaml b/nuclei-templates/cve-less/plugins/joan-385d5d7a4b24b938786ff7b93e4cd0be.yaml new file mode 100644 index 0000000000..9699c89bda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joan-385d5d7a4b24b938786ff7b93e4cd0be.yaml @@ -0,0 +1,58 @@ +id: joan-385d5d7a4b24b938786ff7b93e4cd0be + +info: + name: > + Jock on air now <= 5.6.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cf12dc1-7b66-4c6e-8c3e-5915e1032303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joan/" + google-query: inurl:"/wp-content/plugins/joan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joan,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joan-60783d04ed031e1d13d6ec674c133657.yaml b/nuclei-templates/cve-less/plugins/joan-60783d04ed031e1d13d6ec674c133657.yaml new file mode 100644 index 0000000000..85f7fa4a97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joan-60783d04ed031e1d13d6ec674c133657.yaml @@ -0,0 +1,58 @@ +id: joan-60783d04ed031e1d13d6ec674c133657 + +info: + name: > + Jock on air now <= 5.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a401db3e-2cf2-4283-bfbe-d4a9587966e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joan/" + google-query: inurl:"/wp-content/plugins/joan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joan,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joan-ae19aa47eef9d7207f8ff256c3445ec9.yaml b/nuclei-templates/cve-less/plugins/joan-ae19aa47eef9d7207f8ff256c3445ec9.yaml new file mode 100644 index 0000000000..5f9ed3ba2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joan-ae19aa47eef9d7207f8ff256c3445ec9.yaml @@ -0,0 +1,58 @@ +id: joan-ae19aa47eef9d7207f8ff256c3445ec9 + +info: + name: > + Jock on air now <= 5.6.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/898ba68f-2b0c-462a-87ee-272ee624396e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joan/" + google-query: inurl:"/wp-content/plugins/joan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joan,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-board-08107665cefdd5cc4f288c7614f8ef39.yaml b/nuclei-templates/cve-less/plugins/job-board-08107665cefdd5cc4f288c7614f8ef39.yaml new file mode 100644 index 0000000000..f7c1cf3730 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-board-08107665cefdd5cc4f288c7614f8ef39.yaml @@ -0,0 +1,58 @@ +id: job-board-08107665cefdd5cc4f288c7614f8ef39 + +info: + name: > + Job Board by BestWebSoft <= 1.0.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa2bb0c0-e412-4e78-a7b5-4517f1c15481?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-board/" + google-query: inurl:"/wp-content/plugins/job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-board,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-board-e28ca962e4f58cae156935f08c9eded6.yaml b/nuclei-templates/cve-less/plugins/job-board-e28ca962e4f58cae156935f08c9eded6.yaml new file mode 100644 index 0000000000..4cfbb183ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-board-e28ca962e4f58cae156935f08c9eded6.yaml @@ -0,0 +1,58 @@ +id: job-board-e28ca962e4f58cae156935f08c9eded6 + +info: + name: > + Job Board by BestWebSoft < 1.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38ff10d3-d9ce-440b-b956-002803d49f54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-board/" + google-query: inurl:"/wp-content/plugins/job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-board,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-board-vanilla-4b6c5be1fe7b22ce9d31baa1ab6b6513.yaml b/nuclei-templates/cve-less/plugins/job-board-vanilla-4b6c5be1fe7b22ce9d31baa1ab6b6513.yaml new file mode 100644 index 0000000000..75ca29e8fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-board-vanilla-4b6c5be1fe7b22ce9d31baa1ab6b6513.yaml @@ -0,0 +1,58 @@ +id: job-board-vanilla-4b6c5be1fe7b22ce9d31baa1ab6b6513 + +info: + name: > + Job Board Vanila Plugin <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb290fa8-206e-44c6-9107-8a896225664c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-board-vanilla/" + google-query: inurl:"/wp-content/plugins/job-board-vanilla/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-board-vanilla,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-board-vanilla/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-board-vanilla" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-manager-10474b54f82207cb48d47efc5316fa08.yaml b/nuclei-templates/cve-less/plugins/job-manager-10474b54f82207cb48d47efc5316fa08.yaml new file mode 100644 index 0000000000..e8b3f0e8ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-manager-10474b54f82207cb48d47efc5316fa08.yaml @@ -0,0 +1,58 @@ +id: job-manager-10474b54f82207cb48d47efc5316fa08 + +info: + name: > + Job Manager <= 0.7.25 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6e47659-90d9-4990-a19d-3954d65417df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-manager/" + google-query: inurl:"/wp-content/plugins/job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-manager-21f007f5ea27a69827ebd1e3bdac836f.yaml b/nuclei-templates/cve-less/plugins/job-manager-21f007f5ea27a69827ebd1e3bdac836f.yaml new file mode 100644 index 0000000000..293db8f7a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-manager-21f007f5ea27a69827ebd1e3bdac836f.yaml @@ -0,0 +1,58 @@ +id: job-manager-21f007f5ea27a69827ebd1e3bdac836f + +info: + name: > + Job Manager - < 0.7.23 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c107e4c-1ba5-4c22-ad56-bd03342a3418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-manager/" + google-query: inurl:"/wp-content/plugins/job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-manager-72d88d4156b62bb9e1abe8555a4604f1.yaml b/nuclei-templates/cve-less/plugins/job-manager-72d88d4156b62bb9e1abe8555a4604f1.yaml new file mode 100644 index 0000000000..cfaa33f544 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-manager-72d88d4156b62bb9e1abe8555a4604f1.yaml @@ -0,0 +1,58 @@ +id: job-manager-72d88d4156b62bb9e1abe8555a4604f1 + +info: + name: > + Job Manager <= 0.7.18 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b1771f2-6741-410d-9544-4178a0b962eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-manager/" + google-query: inurl:"/wp-content/plugins/job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-manager-93a7a8515ae48a00a314691190815e8e.yaml b/nuclei-templates/cve-less/plugins/job-manager-93a7a8515ae48a00a314691190815e8e.yaml new file mode 100644 index 0000000000..d0f908effe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-manager-93a7a8515ae48a00a314691190815e8e.yaml @@ -0,0 +1,58 @@ +id: job-manager-93a7a8515ae48a00a314691190815e8e + +info: + name: > + Job Manager <= 0.7.25 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fec590e7-c15e-4063-892a-a945333d848e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-manager/" + google-query: inurl:"/wp-content/plugins/job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-manager-988317a2aa68c393854967dc4677ab3f.yaml b/nuclei-templates/cve-less/plugins/job-manager-988317a2aa68c393854967dc4677ab3f.yaml new file mode 100644 index 0000000000..2f95198ef2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-manager-988317a2aa68c393854967dc4677ab3f.yaml @@ -0,0 +1,58 @@ +id: job-manager-988317a2aa68c393854967dc4677ab3f + +info: + name: > + Job Manager <= 0.7.24 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/501aed34-537b-4d35-a04f-a984297adb39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-manager/" + google-query: inurl:"/wp-content/plugins/job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-manager-career-02ae5a0409f3bbd65473e557e495c850.yaml b/nuclei-templates/cve-less/plugins/job-manager-career-02ae5a0409f3bbd65473e557e495c850.yaml new file mode 100644 index 0000000000..93eb096e82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-manager-career-02ae5a0409f3bbd65473e557e495c850.yaml @@ -0,0 +1,58 @@ +id: job-manager-career-02ae5a0409f3bbd65473e557e495c850 + +info: + name: > + Job Manager & Career <= 1.4.3 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c66bc0b1-c157-4c05-ae9d-0927863c6b95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-manager-career/" + google-query: inurl:"/wp-content/plugins/job-manager-career/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-manager-career,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-manager-career/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-manager-career" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-manager-career-27d8b6ae177490f4dc5980ca233d4dfe.yaml b/nuclei-templates/cve-less/plugins/job-manager-career-27d8b6ae177490f4dc5980ca233d4dfe.yaml new file mode 100644 index 0000000000..1734b0276d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-manager-career-27d8b6ae177490f4dc5980ca233d4dfe.yaml @@ -0,0 +1,58 @@ +id: job-manager-career-27d8b6ae177490f4dc5980ca233d4dfe + +info: + name: > + Job Manager & Career – Manage job board listings, and recruitments <= 1.4.4 - Cross-Site Request Forgery to PHP Object Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8558cd96-3b2a-4282-950b-6d9753698291?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-manager-career/" + google-query: inurl:"/wp-content/plugins/job-manager-career/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-manager-career,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-manager-career/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-manager-career" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-portal-c57a50def1ef305a4e8acb9063bb5142.yaml b/nuclei-templates/cve-less/plugins/job-portal-c57a50def1ef305a4e8acb9063bb5142.yaml new file mode 100644 index 0000000000..cad654bfce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-portal-c57a50def1ef305a4e8acb9063bb5142.yaml @@ -0,0 +1,58 @@ +id: job-portal-c57a50def1ef305a4e8acb9063bb5142 + +info: + name: > + job-portal <= 0.0.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcd12bf2-0fbe-4c9e-b6f7-43c10798eadc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-portal/" + google-query: inurl:"/wp-content/plugins/job-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-postings-654c8b4c06cccd2b893fe7f42cd13fff.yaml b/nuclei-templates/cve-less/plugins/job-postings-654c8b4c06cccd2b893fe7f42cd13fff.yaml new file mode 100644 index 0000000000..133d38af40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-postings-654c8b4c06cccd2b893fe7f42cd13fff.yaml @@ -0,0 +1,58 @@ +id: job-postings-654c8b4c06cccd2b893fe7f42cd13fff + +info: + name: > + Jobs for WordPress <= 2.7.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37c18340-d7aa-4410-be17-c61c286838ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-postings/" + google-query: inurl:"/wp-content/plugins/job-postings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-postings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-postings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-postings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-postings-d91c4b972affa20bd870d04861c77d26.yaml b/nuclei-templates/cve-less/plugins/job-postings-d91c4b972affa20bd870d04861c77d26.yaml new file mode 100644 index 0000000000..620dd66541 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-postings-d91c4b972affa20bd870d04861c77d26.yaml @@ -0,0 +1,58 @@ +id: job-postings-d91c4b972affa20bd870d04861c77d26 + +info: + name: > + Jobs for WordPress <= 2.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fe412b3-038b-4cc7-88e9-d30f719273ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-postings/" + google-query: inurl:"/wp-content/plugins/job-postings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-postings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-postings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-postings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-postings-da0336a411f4f619331fc9d86a24bec5.yaml b/nuclei-templates/cve-less/plugins/job-postings-da0336a411f4f619331fc9d86a24bec5.yaml new file mode 100644 index 0000000000..64bd92211e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-postings-da0336a411f4f619331fc9d86a24bec5.yaml @@ -0,0 +1,58 @@ +id: job-postings-da0336a411f4f619331fc9d86a24bec5 + +info: + name: > + Jobs for WordPress <= 2.5.10.2 - Authenticated (Author+) Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e730114e-bbe1-4385-84cc-a5484acc9da7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-postings/" + google-query: inurl:"/wp-content/plugins/job-postings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-postings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-postings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-postings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-postings-fe45354b8faab4200224637d8bf8497c.yaml b/nuclei-templates/cve-less/plugins/job-postings-fe45354b8faab4200224637d8bf8497c.yaml new file mode 100644 index 0000000000..446872ff6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-postings-fe45354b8faab4200224637d8bf8497c.yaml @@ -0,0 +1,58 @@ +id: job-postings-fe45354b8faab4200224637d8bf8497c + +info: + name: > + Jobs for WordPress <= 2.7.5 - Reflected Cross-Site Scripting via job-search + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6710f53-34fe-4549-9e1a-7826be74c912?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-postings/" + google-query: inurl:"/wp-content/plugins/job-postings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-postings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-postings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-postings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/job-postings-fe5cb5dd50547aaa395139fc837a5f8f.yaml b/nuclei-templates/cve-less/plugins/job-postings-fe5cb5dd50547aaa395139fc837a5f8f.yaml new file mode 100644 index 0000000000..a8b14a83dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/job-postings-fe5cb5dd50547aaa395139fc837a5f8f.yaml @@ -0,0 +1,58 @@ +id: job-postings-fe5cb5dd50547aaa395139fc837a5f8f + +info: + name: > + Jobs for WordPress <= 2.5.10.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30c34ea7-3df8-4ba8-bea8-4c785b23a4f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/job-postings/" + google-query: inurl:"/wp-content/plugins/job-postings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,job-postings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/job-postings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "job-postings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobboardwp-bd931f434035df45531eaa63d35d55b4.yaml b/nuclei-templates/cve-less/plugins/jobboardwp-bd931f434035df45531eaa63d35d55b4.yaml new file mode 100644 index 0000000000..6307bc5c52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobboardwp-bd931f434035df45531eaa63d35d55b4.yaml @@ -0,0 +1,58 @@ +id: jobboardwp-bd931f434035df45531eaa63d35d55b4 + +info: + name: > + JobBoardWP <= 1.2.2 - Missing Authorization to Job Posting Manipulation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50cc1a15-bb73-4c60-b610-e0c3bf1ef841?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobboardwp/" + google-query: inurl:"/wp-content/plugins/jobboardwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobboardwp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobboardwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobboardwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobboardwp-dbbebd9fd091a5f8a7900f65f6287602.yaml b/nuclei-templates/cve-less/plugins/jobboardwp-dbbebd9fd091a5f8a7900f65f6287602.yaml new file mode 100644 index 0000000000..f4a4d8bd61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobboardwp-dbbebd9fd091a5f8a7900f65f6287602.yaml @@ -0,0 +1,58 @@ +id: jobboardwp-dbbebd9fd091a5f8a7900f65f6287602 + +info: + name: > + JobBoardWP – Job Board Listings and Submissions <= 1.0.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b2e61aa-617b-450e-8859-50b1012fc0c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobboardwp/" + google-query: inurl:"/wp-content/plugins/jobboardwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobboardwp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobboardwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobboardwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobboardwp-dc882a54ee21adad00f3c37faa34411b.yaml b/nuclei-templates/cve-less/plugins/jobboardwp-dc882a54ee21adad00f3c37faa34411b.yaml new file mode 100644 index 0000000000..67fdbe5b4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobboardwp-dc882a54ee21adad00f3c37faa34411b.yaml @@ -0,0 +1,58 @@ +id: jobboardwp-dc882a54ee21adad00f3c37faa34411b + +info: + name: > + JobBoardWP – Job Board Listings and Submissions <= 1.1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d73ce6-a256-43ef-8627-c6f6d6635e3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobboardwp/" + google-query: inurl:"/wp-content/plugins/jobboardwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobboardwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobboardwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobboardwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobboardwp-f86d763fc59c0d8f05b12bd8ecb8244c.yaml b/nuclei-templates/cve-less/plugins/jobboardwp-f86d763fc59c0d8f05b12bd8ecb8244c.yaml new file mode 100644 index 0000000000..dceb08613e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobboardwp-f86d763fc59c0d8f05b12bd8ecb8244c.yaml @@ -0,0 +1,58 @@ +id: jobboardwp-f86d763fc59c0d8f05b12bd8ecb8244c + +info: + name: > + JobBoardWP <= 1.2.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f816a32a-3c4d-447e-86a3-942b5e636cce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobboardwp/" + google-query: inurl:"/wp-content/plugins/jobboardwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobboardwp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobboardwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobboardwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobcareer-00ad079b8c94204c38afc1d934554333.yaml b/nuclei-templates/cve-less/plugins/jobcareer-00ad079b8c94204c38afc1d934554333.yaml new file mode 100644 index 0000000000..99afe2fbf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobcareer-00ad079b8c94204c38afc1d934554333.yaml @@ -0,0 +1,58 @@ +id: jobcareer-00ad079b8c94204c38afc1d934554333 + +info: + name: > + JobCareer <= 3.4 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31b52500-c53c-4606-b57c-cd14bb66afa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobcareer/" + google-query: inurl:"/wp-content/plugins/jobcareer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobcareer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobcareer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobcareer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobcareer-8605cf70b09f39b80921d3235eaa5a54.yaml b/nuclei-templates/cve-less/plugins/jobcareer-8605cf70b09f39b80921d3235eaa5a54.yaml new file mode 100644 index 0000000000..6d16d37975 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobcareer-8605cf70b09f39b80921d3235eaa5a54.yaml @@ -0,0 +1,58 @@ +id: jobcareer-8605cf70b09f39b80921d3235eaa5a54 + +info: + name: > + JobCareer | Job Board Responsive WordPress Theme < 2.4 - User Enumeration + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3c515e2-dc69-4686-b60f-413542bf2118?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobcareer/" + google-query: inurl:"/wp-content/plugins/jobcareer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobcareer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobcareer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobcareer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobcareer-8b266025d0f3695c542ad07de2e9b34c.yaml b/nuclei-templates/cve-less/plugins/jobcareer-8b266025d0f3695c542ad07de2e9b34c.yaml new file mode 100644 index 0000000000..3aac306a5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobcareer-8b266025d0f3695c542ad07de2e9b34c.yaml @@ -0,0 +1,58 @@ +id: jobcareer-8b266025d0f3695c542ad07de2e9b34c + +info: + name: > + JobCareer | Job Board Responsive WordPress Theme < 2.4 - Unauthenticated Arbitrary Password Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acbea2eb-fa87-4117-b347-049c819599c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobcareer/" + google-query: inurl:"/wp-content/plugins/jobcareer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobcareer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobcareer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobcareer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobcareer-b9eb31c713b27c04fd47230e22de33c0.yaml b/nuclei-templates/cve-less/plugins/jobcareer-b9eb31c713b27c04fd47230e22de33c0.yaml new file mode 100644 index 0000000000..1f735be546 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobcareer-b9eb31c713b27c04fd47230e22de33c0.yaml @@ -0,0 +1,58 @@ +id: jobcareer-b9eb31c713b27c04fd47230e22de33c0 + +info: + name: > + JobCareer | Job Board Responsive WordPress Theme <= 2.5.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebb275e9-3a5b-421e-b857-95880ebe000d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobcareer/" + google-query: inurl:"/wp-content/plugins/jobcareer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobcareer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobcareer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobcareer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobwp-5aa8b17a95e784f5419ee88ce9b3c1f5.yaml b/nuclei-templates/cve-less/plugins/jobwp-5aa8b17a95e784f5419ee88ce9b3c1f5.yaml new file mode 100644 index 0000000000..ec7e0ba2d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobwp-5aa8b17a95e784f5419ee88ce9b3c1f5.yaml @@ -0,0 +1,58 @@ +id: jobwp-5aa8b17a95e784f5419ee88ce9b3c1f5 + +info: + name: > + WordPress Job Board and Recruitment Plugin – JobWP <= 2.1 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c73dbc40-ba54-4836-9bb1-a35f95d5a077?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobwp/" + google-query: inurl:"/wp-content/plugins/jobwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobwp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jobwp-dd54b2279f8b3539fee1aca11b3b21e1.yaml b/nuclei-templates/cve-less/plugins/jobwp-dd54b2279f8b3539fee1aca11b3b21e1.yaml new file mode 100644 index 0000000000..7e250583b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jobwp-dd54b2279f8b3539fee1aca11b3b21e1.yaml @@ -0,0 +1,58 @@ +id: jobwp-dd54b2279f8b3539fee1aca11b3b21e1 + +info: + name: > + WordPress Job Board and Recruitment Plugin – JobWP <= 2.0 - Arbitrary File Upload via 'jobwp_upload_resume' + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88f4c567-eb57-4f98-afdc-65f8863b90c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jobwp/" + google-query: inurl:"/wp-content/plugins/jobwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jobwp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jobwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joli-faq-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/joli-faq-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3e58ebf05f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joli-faq-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: joli-faq-seo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joli-faq-seo/" + google-query: inurl:"/wp-content/plugins/joli-faq-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joli-faq-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joli-faq-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joli-faq-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joli-faq-seo-cca32e49d162555543a6de6d18516ab9.yaml b/nuclei-templates/cve-less/plugins/joli-faq-seo-cca32e49d162555543a6de6d18516ab9.yaml new file mode 100644 index 0000000000..51052f54c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joli-faq-seo-cca32e49d162555543a6de6d18516ab9.yaml @@ -0,0 +1,58 @@ +id: joli-faq-seo-cca32e49d162555543a6de6d18516ab9 + +info: + name: > + Joli FAQ SEO – WordPress FAQ Plugin <= 1.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c45b6163-7ebf-4f18-afd6-735d02d9170d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joli-faq-seo/" + google-query: inurl:"/wp-content/plugins/joli-faq-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joli-faq-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joli-faq-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joli-faq-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joli-table-of-contents-01876089e61a6c3ae9cebc874b7fb7a5.yaml b/nuclei-templates/cve-less/plugins/joli-table-of-contents-01876089e61a6c3ae9cebc874b7fb7a5.yaml new file mode 100644 index 0000000000..e113b01aac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joli-table-of-contents-01876089e61a6c3ae9cebc874b7fb7a5.yaml @@ -0,0 +1,58 @@ +id: joli-table-of-contents-01876089e61a6c3ae9cebc874b7fb7a5 + +info: + name: > + Joli Table of Contents <= 1.3.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3a83683-c159-4af1-b3ba-881a107d9ad6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joli-table-of-contents/" + google-query: inurl:"/wp-content/plugins/joli-table-of-contents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joli-table-of-contents,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joli-table-of-contents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joli-table-of-contents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joli-table-of-contents-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/joli-table-of-contents-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..63b0352c03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joli-table-of-contents-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: joli-table-of-contents-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joli-table-of-contents/" + google-query: inurl:"/wp-content/plugins/joli-table-of-contents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joli-table-of-contents,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joli-table-of-contents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joli-table-of-contents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joliprint-6e37ab7161cd9f2422895355af697330.yaml b/nuclei-templates/cve-less/plugins/joliprint-6e37ab7161cd9f2422895355af697330.yaml new file mode 100644 index 0000000000..e77e18d132 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joliprint-6e37ab7161cd9f2422895355af697330.yaml @@ -0,0 +1,58 @@ +id: joliprint-6e37ab7161cd9f2422895355af697330 + +info: + name: > + PDF & Print Button Joliprint <= 1.3.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/150a6dda-84de-49b1-9a8a-fcc1e0ba73d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joliprint/" + google-query: inurl:"/wp-content/plugins/joliprint/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joliprint,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joliprint/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joliprint" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jonradio-private-site-584f7ea1f5eb53a996f78e6bd4374fc9.yaml b/nuclei-templates/cve-less/plugins/jonradio-private-site-584f7ea1f5eb53a996f78e6bd4374fc9.yaml new file mode 100644 index 0000000000..da1652ad46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jonradio-private-site-584f7ea1f5eb53a996f78e6bd4374fc9.yaml @@ -0,0 +1,58 @@ +id: jonradio-private-site-584f7ea1f5eb53a996f78e6bd4374fc9 + +info: + name: > + My Private Site <= 3.0.14 - Improper Access Control to Sensitive Information Exposure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/970bc71c-7d0a-4761-874a-379cda71418e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jonradio-private-site/" + google-query: inurl:"/wp-content/plugins/jonradio-private-site/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jonradio-private-site,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jonradio-private-site/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jonradio-private-site" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jonradio-private-site-a1936a4a25a96962401af7be405882a8.yaml b/nuclei-templates/cve-less/plugins/jonradio-private-site-a1936a4a25a96962401af7be405882a8.yaml new file mode 100644 index 0000000000..2478e4cdaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jonradio-private-site-a1936a4a25a96962401af7be405882a8.yaml @@ -0,0 +1,58 @@ +id: jonradio-private-site-a1936a4a25a96962401af7be405882a8 + +info: + name: > + My Private Site <= 3.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1900941d-cbb6-4384-977e-6c40f65b2789?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jonradio-private-site/" + google-query: inurl:"/wp-content/plugins/jonradio-private-site/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jonradio-private-site,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jonradio-private-site/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jonradio-private-site" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joomdev-wp-pros-cons-fcb752a84e136c08d10cbe281ed9acb9.yaml b/nuclei-templates/cve-less/plugins/joomdev-wp-pros-cons-fcb752a84e136c08d10cbe281ed9acb9.yaml new file mode 100644 index 0000000000..c763a5bae4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joomdev-wp-pros-cons-fcb752a84e136c08d10cbe281ed9acb9.yaml @@ -0,0 +1,58 @@ +id: joomdev-wp-pros-cons-fcb752a84e136c08d10cbe281ed9acb9 + +info: + name: > + Mighty Classic Pros And Cons <= 2.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3316ea0d-4311-4363-b443-b4aeedb2ee36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joomdev-wp-pros-cons/" + google-query: inurl:"/wp-content/plugins/joomdev-wp-pros-cons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joomdev-wp-pros-cons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joomdev-wp-pros-cons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joomdev-wp-pros-cons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-00536c9d692bf537f783adb6446f271d.yaml b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-00536c9d692bf537f783adb6446f271d.yaml new file mode 100644 index 0000000000..945bf3651f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-00536c9d692bf537f783adb6446f271d.yaml @@ -0,0 +1,58 @@ +id: joomsport-sports-league-results-management-00536c9d692bf537f783adb6446f271d + +info: + name: > + JoomSport – for Sports: Team & League, Football, Hockey & more <= 5.1.7 - Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5400ec0-383b-4ac5-9b38-44533519e44d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joomsport-sports-league-results-management/" + google-query: inurl:"/wp-content/plugins/joomsport-sports-league-results-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joomsport-sports-league-results-management,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joomsport-sports-league-results-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joomsport-sports-league-results-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-072c39710eb7dbfbeb82cc60cf47874f.yaml b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-072c39710eb7dbfbeb82cc60cf47874f.yaml new file mode 100644 index 0000000000..1d01d884ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-072c39710eb7dbfbeb82cc60cf47874f.yaml @@ -0,0 +1,58 @@ +id: joomsport-sports-league-results-management-072c39710eb7dbfbeb82cc60cf47874f + +info: + name: > + JoomSport – for Sports: Team & League, Football, Hockey & more < 3.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31ca2de5-d63c-4ff8-9963-b96213d17cd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joomsport-sports-league-results-management/" + google-query: inurl:"/wp-content/plugins/joomsport-sports-league-results-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joomsport-sports-league-results-management,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joomsport-sports-league-results-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joomsport-sports-league-results-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-14278d198b70b2e64cd570f29581f83a.yaml b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-14278d198b70b2e64cd570f29581f83a.yaml new file mode 100644 index 0000000000..50775ad7e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-14278d198b70b2e64cd570f29581f83a.yaml @@ -0,0 +1,58 @@ +id: joomsport-sports-league-results-management-14278d198b70b2e64cd570f29581f83a + +info: + name: > + JoomSport – for Sports: Team & League, Football, Hockey & more <= 5.2.5 - Authenticated (Admin+) SQL Injection via orderby + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9eee9bec-609a-468b-8b44-ac4af409df93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joomsport-sports-league-results-management/" + google-query: inurl:"/wp-content/plugins/joomsport-sports-league-results-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joomsport-sports-league-results-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joomsport-sports-league-results-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joomsport-sports-league-results-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-16ee5e237a73d66076fd3bc3cb313106.yaml b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-16ee5e237a73d66076fd3bc3cb313106.yaml new file mode 100644 index 0000000000..beec84dc89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-16ee5e237a73d66076fd3bc3cb313106.yaml @@ -0,0 +1,58 @@ +id: joomsport-sports-league-results-management-16ee5e237a73d66076fd3bc3cb313106 + +info: + name: > + JoomSport <= 5.2.7 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f202cc3-ab74-4abb-9eed-b4caf9fccb71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joomsport-sports-league-results-management/" + google-query: inurl:"/wp-content/plugins/joomsport-sports-league-results-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joomsport-sports-league-results-management,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joomsport-sports-league-results-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joomsport-sports-league-results-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-dbd794ea76909c06feaaa4b067d9c221.yaml b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-dbd794ea76909c06feaaa4b067d9c221.yaml new file mode 100644 index 0000000000..f3a01c7c5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joomsport-sports-league-results-management-dbd794ea76909c06feaaa4b067d9c221.yaml @@ -0,0 +1,58 @@ +id: joomsport-sports-league-results-management-dbd794ea76909c06feaaa4b067d9c221 + +info: + name: > + JoomSport – for Sports: Team & League, Football, Hockey & more <= 5.2.5 - Authentciated (Admin+) SQL Injection via orderby + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b6cf4ab-9e4d-4fd7-9e9e-c678ccc4d810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joomsport-sports-league-results-management/" + google-query: inurl:"/wp-content/plugins/joomsport-sports-league-results-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joomsport-sports-league-results-management,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joomsport-sports-league-results-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joomsport-sports-league-results-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/journey-analytics-6d795e6331799c55a6d3f3098ce86d6b.yaml b/nuclei-templates/cve-less/plugins/journey-analytics-6d795e6331799c55a6d3f3098ce86d6b.yaml new file mode 100644 index 0000000000..0761aa4442 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/journey-analytics-6d795e6331799c55a6d3f3098ce86d6b.yaml @@ -0,0 +1,58 @@ +id: journey-analytics-6d795e6331799c55a6d3f3098ce86d6b + +info: + name: > + Journey Analytics <= 1.0.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9f8e9b5-f4bf-48e3-b315-1b9b24be6e93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/journey-analytics/" + google-query: inurl:"/wp-content/plugins/journey-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,journey-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/journey-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "journey-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/joy-of-text-7d7e63bacfe422d65219ef49f5f2b1e7.yaml b/nuclei-templates/cve-less/plugins/joy-of-text-7d7e63bacfe422d65219ef49f5f2b1e7.yaml new file mode 100644 index 0000000000..f4e7b31980 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/joy-of-text-7d7e63bacfe422d65219ef49f5f2b1e7.yaml @@ -0,0 +1,58 @@ +id: joy-of-text-7d7e63bacfe422d65219ef49f5f2b1e7 + +info: + name: > + Joy Of Text Lite – SMS messaging for WordPress <= 2.3.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb11ad61-4ee7-45d2-a8e4-388f86bf4a0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/joy-of-text/" + google-query: inurl:"/wp-content/plugins/joy-of-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,joy-of-text,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/joy-of-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "joy-of-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jp-staticpagex-e67b32cb7aae592e15f89a10718ce09e.yaml b/nuclei-templates/cve-less/plugins/jp-staticpagex-e67b32cb7aae592e15f89a10718ce09e.yaml new file mode 100644 index 0000000000..407b464ed8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jp-staticpagex-e67b32cb7aae592e15f89a10718ce09e.yaml @@ -0,0 +1,58 @@ +id: jp-staticpagex-e67b32cb7aae592e15f89a10718ce09e + +info: + name: > + Static Page eXtended <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a83def40-27fa-4141-bebf-f86944e4c618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jp-staticpagex/" + google-query: inurl:"/wp-content/plugins/jp-staticpagex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jp-staticpagex,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jp-staticpagex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jp-staticpagex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-accordion-slideshow-08b8cede6b6ee0e0f3a91f475dfd1447.yaml b/nuclei-templates/cve-less/plugins/jquery-accordion-slideshow-08b8cede6b6ee0e0f3a91f475dfd1447.yaml new file mode 100644 index 0000000000..a782f8b36a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-accordion-slideshow-08b8cede6b6ee0e0f3a91f475dfd1447.yaml @@ -0,0 +1,58 @@ +id: jquery-accordion-slideshow-08b8cede6b6ee0e0f3a91f475dfd1447 + +info: + name: > + Jquery accordion slideshow <= 8.1 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0531ca34-5d7b-4071-a1aa-934f14b87728?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-accordion-slideshow/" + google-query: inurl:"/wp-content/plugins/jquery-accordion-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-accordion-slideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-accordion-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-accordion-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-4783eb0d865a9f683c0f42594f272a3d.yaml b/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-4783eb0d865a9f683c0f42594f272a3d.yaml new file mode 100644 index 0000000000..c1cd5f4360 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-4783eb0d865a9f683c0f42594f272a3d.yaml @@ -0,0 +1,58 @@ +id: jquery-collapse-o-matic-4783eb0d865a9f683c0f42594f272a3d + +info: + name: > + Collapse-O-Matic <= 1.8.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa85abba-e13f-42cd-8f13-432ed375fb37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-collapse-o-matic/" + google-query: inurl:"/wp-content/plugins/jquery-collapse-o-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-collapse-o-matic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-collapse-o-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-collapse-o-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-934106ff95d7bc443b715a08222f1f73.yaml b/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-934106ff95d7bc443b715a08222f1f73.yaml new file mode 100644 index 0000000000..6e917a6f51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-934106ff95d7bc443b715a08222f1f73.yaml @@ -0,0 +1,58 @@ +id: jquery-collapse-o-matic-934106ff95d7bc443b715a08222f1f73 + +info: + name: > + Collapse-O-Matic <= 1.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/099af779-ab6f-4fad-a4a9-832e5a892fdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-collapse-o-matic/" + google-query: inurl:"/wp-content/plugins/jquery-collapse-o-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-collapse-o-matic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-collapse-o-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-collapse-o-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-fd0ae4740c5dfc4422b8f4b3f77edf83.yaml b/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-fd0ae4740c5dfc4422b8f4b3f77edf83.yaml new file mode 100644 index 0000000000..02e35809c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-collapse-o-matic-fd0ae4740c5dfc4422b8f4b3f77edf83.yaml @@ -0,0 +1,58 @@ +id: jquery-collapse-o-matic-fd0ae4740c5dfc4422b8f4b3f77edf83 + +info: + name: > + Collapse-O-Matic <= 1.8.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea23bcc2-ce71-4f16-85f3-11276deb659f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-collapse-o-matic/" + google-query: inurl:"/wp-content/plugins/jquery-collapse-o-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-collapse-o-matic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-collapse-o-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-collapse-o-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-html5-file-upload-3040cc77a4a179c9ac426a7d4d300237.yaml b/nuclei-templates/cve-less/plugins/jquery-html5-file-upload-3040cc77a4a179c9ac426a7d4d300237.yaml new file mode 100644 index 0000000000..b72c0a619f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-html5-file-upload-3040cc77a4a179c9ac426a7d4d300237.yaml @@ -0,0 +1,58 @@ +id: jquery-html5-file-upload-3040cc77a4a179c9ac426a7d4d300237 + +info: + name: > + jQuery HTML5 File Upload <= 3.0 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f107a2be-e75b-43f3-8d41-b68c50c27f55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-html5-file-upload/" + google-query: inurl:"/wp-content/plugins/jquery-html5-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-html5-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-html5-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-html5-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-html5-file-upload-320dd95c1c6954f0769e8bf06822a1e3.yaml b/nuclei-templates/cve-less/plugins/jquery-html5-file-upload-320dd95c1c6954f0769e8bf06822a1e3.yaml new file mode 100644 index 0000000000..2129a3e97a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-html5-file-upload-320dd95c1c6954f0769e8bf06822a1e3.yaml @@ -0,0 +1,58 @@ +id: jquery-html5-file-upload-320dd95c1c6954f0769e8bf06822a1e3 + +info: + name: > + jQuery HTML5 File Upload <= 3.0 - Unauthenticated Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c312478-0d6e-400b-81c2-172c2c5798ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-html5-file-upload/" + google-query: inurl:"/wp-content/plugins/jquery-html5-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-html5-file-upload,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-html5-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-html5-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-news-ticker-179abbcb3a9b789dc00b8e0d8f532b6a.yaml b/nuclei-templates/cve-less/plugins/jquery-news-ticker-179abbcb3a9b789dc00b8e0d8f532b6a.yaml new file mode 100644 index 0000000000..17e036f0ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-news-ticker-179abbcb3a9b789dc00b8e0d8f532b6a.yaml @@ -0,0 +1,58 @@ +id: jquery-news-ticker-179abbcb3a9b789dc00b8e0d8f532b6a + +info: + name: > + Jquery news ticker <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d22d9414-2df9-4528-a426-dce6e83f8d44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-news-ticker/" + google-query: inurl:"/wp-content/plugins/jquery-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-news-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-news-ticker-ec203a9e69230c2878eb1812f2101d77.yaml b/nuclei-templates/cve-less/plugins/jquery-news-ticker-ec203a9e69230c2878eb1812f2101d77.yaml new file mode 100644 index 0000000000..b384e213cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-news-ticker-ec203a9e69230c2878eb1812f2101d77.yaml @@ -0,0 +1,58 @@ +id: jquery-news-ticker-ec203a9e69230c2878eb1812f2101d77 + +info: + name: > + Jquery news ticker <= 3.0 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b7f8739-7f40-40a7-952e-002ea3b82ac7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-news-ticker/" + google-query: inurl:"/wp-content/plugins/jquery-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-news-ticker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-reply-to-comment-4ce88d432edfef73000dd57a527803fa.yaml b/nuclei-templates/cve-less/plugins/jquery-reply-to-comment-4ce88d432edfef73000dd57a527803fa.yaml new file mode 100644 index 0000000000..8bd179be57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-reply-to-comment-4ce88d432edfef73000dd57a527803fa.yaml @@ -0,0 +1,58 @@ +id: jquery-reply-to-comment-4ce88d432edfef73000dd57a527803fa + +info: + name: > + jQuery Reply to Comment <= 1.31 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a18089d8-32f1-4827-af14-c45055892fb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-reply-to-comment/" + google-query: inurl:"/wp-content/plugins/jquery-reply-to-comment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-reply-to-comment,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-reply-to-comment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-reply-to-comment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-t-countdown-widget-cf29ff4800b24e4ea96e524c408240d8.yaml b/nuclei-templates/cve-less/plugins/jquery-t-countdown-widget-cf29ff4800b24e4ea96e524c408240d8.yaml new file mode 100644 index 0000000000..e84fca946d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-t-countdown-widget-cf29ff4800b24e4ea96e524c408240d8.yaml @@ -0,0 +1,58 @@ +id: jquery-t-countdown-widget-cf29ff4800b24e4ea96e524c408240d8 + +info: + name: > + jQuery T(-) Countdown Widget <= 2.3.23 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortocde + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b493316-511d-479f-b65c-c04ecd17171f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-t-countdown-widget/" + google-query: inurl:"/wp-content/plugins/jquery-t-countdown-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-t-countdown-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-t-countdown-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-t-countdown-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-tagline-rotator-eab9e4fbf9582fd0da43dce31000dce5.yaml b/nuclei-templates/cve-less/plugins/jquery-tagline-rotator-eab9e4fbf9582fd0da43dce31000dce5.yaml new file mode 100644 index 0000000000..7a80c25526 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-tagline-rotator-eab9e4fbf9582fd0da43dce31000dce5.yaml @@ -0,0 +1,58 @@ +id: jquery-tagline-rotator-eab9e4fbf9582fd0da43dce31000dce5 + +info: + name: > + jQuery Tagline Rotator <= 0.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc9efc98-7815-4b9b-a180-71f1095c9b0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-tagline-rotator/" + google-query: inurl:"/wp-content/plugins/jquery-tagline-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-tagline-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-tagline-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-tagline-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-validation-for-contact-form-7-fdec704444e3056cbaed479252db31c8.yaml b/nuclei-templates/cve-less/plugins/jquery-validation-for-contact-form-7-fdec704444e3056cbaed479252db31c8.yaml new file mode 100644 index 0000000000..abe1902571 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-validation-for-contact-form-7-fdec704444e3056cbaed479252db31c8.yaml @@ -0,0 +1,58 @@ +id: jquery-validation-for-contact-form-7-fdec704444e3056cbaed479252db31c8 + +info: + name: > + Jquery Validation For Contact Form 7 <= 5.2 - Cross-Site Request Forgery to Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed488dcd-7400-47ab-a161-47c7caa414c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-validation-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/jquery-validation-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-validation-for-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-validation-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-validation-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jquery-vertical-accordion-menu-c27c21f00fd5cfc7fcc406cc847e2987.yaml b/nuclei-templates/cve-less/plugins/jquery-vertical-accordion-menu-c27c21f00fd5cfc7fcc406cc847e2987.yaml new file mode 100644 index 0000000000..8e9ef19b08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jquery-vertical-accordion-menu-c27c21f00fd5cfc7fcc406cc847e2987.yaml @@ -0,0 +1,58 @@ +id: jquery-vertical-accordion-menu-c27c21f00fd5cfc7fcc406cc847e2987 + +info: + name: > + JQuery Accordion Menu Widget <= 3.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0cf3015-cdc9-4ac9-82f3-e9b4d1203e22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jquery-vertical-accordion-menu/" + google-query: inurl:"/wp-content/plugins/jquery-vertical-accordion-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jquery-vertical-accordion-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jquery-vertical-accordion-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jquery-vertical-accordion-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jrss-widget-265315e822cdfb8b9ba73135a9d29277.yaml b/nuclei-templates/cve-less/plugins/jrss-widget-265315e822cdfb8b9ba73135a9d29277.yaml new file mode 100644 index 0000000000..39255cffde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jrss-widget-265315e822cdfb8b9ba73135a9d29277.yaml @@ -0,0 +1,58 @@ +id: jrss-widget-265315e822cdfb8b9ba73135a9d29277 + +info: + name: > + jRSS Widget <= 1.2 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1680078c-0dbe-4586-b793-3bf2ddea96ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jrss-widget/" + google-query: inurl:"/wp-content/plugins/jrss-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jrss-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jrss-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jrss-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-css-script-optimizer-9b9750afc0fcb77fca6e9424d2ce6b98.yaml b/nuclei-templates/cve-less/plugins/js-css-script-optimizer-9b9750afc0fcb77fca6e9424d2ce6b98.yaml new file mode 100644 index 0000000000..2060b2cb29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-css-script-optimizer-9b9750afc0fcb77fca6e9424d2ce6b98.yaml @@ -0,0 +1,58 @@ +id: js-css-script-optimizer-9b9750afc0fcb77fca6e9424d2ce6b98 + +info: + name: > + JS & CSS Script Optimizer <= 0.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb863896-5a5a-4c65-b2a5-0901de7961f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-css-script-optimizer/" + google-query: inurl:"/wp-content/plugins/js-css-script-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-css-script-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-css-script-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-css-script-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-jobs-1f7578af7b08d6f0682dfe557a69cb45.yaml b/nuclei-templates/cve-less/plugins/js-jobs-1f7578af7b08d6f0682dfe557a69cb45.yaml new file mode 100644 index 0000000000..caa41bf5e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-jobs-1f7578af7b08d6f0682dfe557a69cb45.yaml @@ -0,0 +1,58 @@ +id: js-jobs-1f7578af7b08d6f0682dfe557a69cb45 + +info: + name: > + JS Job Manager <= 2.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55604ee9-7343-472c-9a29-035d18b266ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-jobs/" + google-query: inurl:"/wp-content/plugins/js-jobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-jobs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-jobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-jobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-jobs-23c92f364f22c50ebf1609484d67aa5e.yaml b/nuclei-templates/cve-less/plugins/js-jobs-23c92f364f22c50ebf1609484d67aa5e.yaml new file mode 100644 index 0000000000..4fc8bc10aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-jobs-23c92f364f22c50ebf1609484d67aa5e.yaml @@ -0,0 +1,58 @@ +id: js-jobs-23c92f364f22c50ebf1609484d67aa5e + +info: + name: > + JS Job Manager <= 2.0.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting via title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62ea9e85-7752-4d0f-aafb-cbbc94294335?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-jobs/" + google-query: inurl:"/wp-content/plugins/js-jobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-jobs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-jobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-jobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-jobs-9b43630f5837a1e7e35ee3f5d5c853aa.yaml b/nuclei-templates/cve-less/plugins/js-jobs-9b43630f5837a1e7e35ee3f5d5c853aa.yaml new file mode 100644 index 0000000000..ad64485684 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-jobs-9b43630f5837a1e7e35ee3f5d5c853aa.yaml @@ -0,0 +1,58 @@ +id: js-jobs-9b43630f5837a1e7e35ee3f5d5c853aa + +info: + name: > + JS Job Manager <= 2.0.0 - Cross-Site Request Forgery via multiple functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0131921b-6f60-4da1-b5d9-d44a33d35cae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-jobs/" + google-query: inurl:"/wp-content/plugins/js-jobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-jobs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-jobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-jobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-jobs-e2ad97f33f7abd91ea501d6e3cf80275.yaml b/nuclei-templates/cve-less/plugins/js-jobs-e2ad97f33f7abd91ea501d6e3cf80275.yaml new file mode 100644 index 0000000000..44f776cc84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-jobs-e2ad97f33f7abd91ea501d6e3cf80275.yaml @@ -0,0 +1,58 @@ +id: js-jobs-e2ad97f33f7abd91ea501d6e3cf80275 + +info: + name: > + JS Job Manager <= 1.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e3da1d3-5ec3-4f94-a834-3f3a6fc23f0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-jobs/" + google-query: inurl:"/wp-content/plugins/js-jobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-jobs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-jobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-jobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-jobs-ff8fca95ef812c976ae31e630ef4e2a9.yaml b/nuclei-templates/cve-less/plugins/js-jobs-ff8fca95ef812c976ae31e630ef4e2a9.yaml new file mode 100644 index 0000000000..d4c0e6485c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-jobs-ff8fca95ef812c976ae31e630ef4e2a9.yaml @@ -0,0 +1,58 @@ +id: js-jobs-ff8fca95ef812c976ae31e630ef4e2a9 + +info: + name: > + JS Job Manager < 1.1.9 - Arbitrary Plugin Installation/Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e1f64f5-090a-4961-8490-d34f458a8d44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-jobs/" + google-query: inurl:"/wp-content/plugins/js-jobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-jobs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-jobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-jobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-multihotel-107b72d2008fc8b953e147cb55e0c002.yaml b/nuclei-templates/cve-less/plugins/js-multihotel-107b72d2008fc8b953e147cb55e0c002.yaml new file mode 100644 index 0000000000..48022723cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-multihotel-107b72d2008fc8b953e147cb55e0c002.yaml @@ -0,0 +1,58 @@ +id: js-multihotel-107b72d2008fc8b953e147cb55e0c002 + +info: + name: > + JS MultiHotel <= 2.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b7d7373-e38a-428c-be8c-a5b05e8dc1e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-multihotel/" + google-query: inurl:"/wp-content/plugins/js-multihotel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-multihotel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-multihotel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-multihotel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-multihotel-3be3c98bb23ebc942163786ddfe2ad5d.yaml b/nuclei-templates/cve-less/plugins/js-multihotel-3be3c98bb23ebc942163786ddfe2ad5d.yaml new file mode 100644 index 0000000000..01d67c7355 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-multihotel-3be3c98bb23ebc942163786ddfe2ad5d.yaml @@ -0,0 +1,58 @@ +id: js-multihotel-3be3c98bb23ebc942163786ddfe2ad5d + +info: + name: > + JS Multi Hotel <= 2.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d302f956-3f6e-41a7-a02b-d6b4431138b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-multihotel/" + google-query: inurl:"/wp-content/plugins/js-multihotel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-multihotel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-multihotel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-multihotel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-multihotel-c6f1bc8dc593e94f4ca6205f51ff1930.yaml b/nuclei-templates/cve-less/plugins/js-multihotel-c6f1bc8dc593e94f4ca6205f51ff1930.yaml new file mode 100644 index 0000000000..eb1526add9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-multihotel-c6f1bc8dc593e94f4ca6205f51ff1930.yaml @@ -0,0 +1,58 @@ +id: js-multihotel-c6f1bc8dc593e94f4ca6205f51ff1930 + +info: + name: > + JS Multi Hotel <= 2.2.1 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/085ea0e9-5b00-4038-a01b-2aebd0aa0809?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-multihotel/" + google-query: inurl:"/wp-content/plugins/js-multihotel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-multihotel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-multihotel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-multihotel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-multihotel-da95e93b8f550605e02b61a197352c24.yaml b/nuclei-templates/cve-less/plugins/js-multihotel-da95e93b8f550605e02b61a197352c24.yaml new file mode 100644 index 0000000000..4c41f59627 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-multihotel-da95e93b8f550605e02b61a197352c24.yaml @@ -0,0 +1,58 @@ +id: js-multihotel-da95e93b8f550605e02b61a197352c24 + +info: + name: > + JS Multi Hotel <= 2.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aac382a7-0548-4c5a-b82b-f173ff449d23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-multihotel/" + google-query: inurl:"/wp-content/plugins/js-multihotel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-multihotel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-multihotel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-multihotel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-restaurant-bdb0f91704ac2d68fedc7edd41a87d1c.yaml b/nuclei-templates/cve-less/plugins/js-restaurant-bdb0f91704ac2d68fedc7edd41a87d1c.yaml new file mode 100644 index 0000000000..3ebc1d65b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-restaurant-bdb0f91704ac2d68fedc7edd41a87d1c.yaml @@ -0,0 +1,58 @@ +id: js-restaurant-bdb0f91704ac2d68fedc7edd41a87d1c + +info: + name: > + JS Restaurant (All Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d8dcf85-9009-4788-9a12-7f2656aa5595?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-restaurant/" + google-query: inurl:"/wp-content/plugins/js-restaurant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-restaurant,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-restaurant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-restaurant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-05e6db992de66a60c66b532d0b52e5c0.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-05e6db992de66a60c66b532d0b52e5c0.yaml new file mode 100644 index 0000000000..bba2179fe4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-05e6db992de66a60c66b532d0b52e5c0.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-05e6db992de66a60c66b532d0b52e5c0 + +info: + name: > + JS Help Desk <= 2.7.1 - Missing Authorization to Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74403688-06a0-453f-ac44-bd731c389892?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-0cf1772d2edd6248b5e99ca545774eec.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-0cf1772d2edd6248b5e99ca545774eec.yaml new file mode 100644 index 0000000000..752ef3e70e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-0cf1772d2edd6248b5e99ca545774eec.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-0cf1772d2edd6248b5e99ca545774eec + +info: + name: > + JS Help Desk <= 2.8.1 - Unauthenticated SQL Injection via email and trackingid + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a3e89cc-56cb-42d7-b4f6-bfc7ca0e03e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-10beccaa7efca5aa61a354cb6243cda6.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-10beccaa7efca5aa61a354cb6243cda6.yaml new file mode 100644 index 0000000000..1b53597227 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-10beccaa7efca5aa61a354cb6243cda6.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-10beccaa7efca5aa61a354cb6243cda6 + +info: + name: > + JS Help Desk <= 2.7.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65e2e9e3-2778-4baf-8269-fc13d5ef1212?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-1a072d8df8f66c1d4b2649edb7db538a.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-1a072d8df8f66c1d4b2649edb7db538a.yaml new file mode 100644 index 0000000000..d8f0a4ede8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-1a072d8df8f66c1d4b2649edb7db538a.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-1a072d8df8f66c1d4b2649edb7db538a + +info: + name: > + JS Help Desk – Best Help Desk & Support Plugin <= 2.7.7 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa75366a-651c-43d0-a32b-cdabf5b07b66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-32e7faa52a05f68e7c002ae73c9e64c8.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-32e7faa52a05f68e7c002ae73c9e64c8.yaml new file mode 100644 index 0000000000..22c7329ac6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-32e7faa52a05f68e7c002ae73c9e64c8.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-32e7faa52a05f68e7c002ae73c9e64c8 + +info: + name: > + JS Help Desk – Best Help Desk & Support Plugin <= 2.8.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea7b7b5-ba3a-4d9c-9a63-ed9f645c6b1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-37413a766ec0b67c1d3586422811e23c.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-37413a766ec0b67c1d3586422811e23c.yaml new file mode 100644 index 0000000000..3105862353 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-37413a766ec0b67c1d3586422811e23c.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-37413a766ec0b67c1d3586422811e23c + +info: + name: > + JS Help Desk – Best Help Desk & Support Plugin <= 2.7.7 - Authenticated (Subscriber+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/962af7eb-b2eb-4190-bf0d-cb05cb28f10b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-497602ea4705020cbc78a0b19d427eba.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-497602ea4705020cbc78a0b19d427eba.yaml new file mode 100644 index 0000000000..c584350830 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-497602ea4705020cbc78a0b19d427eba.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-497602ea4705020cbc78a0b19d427eba + +info: + name: > + JS Help Desk <= 2.7.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67021dde-a21c-4281-b4f2-acc840efcc69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-8bc92a63825b5e282b7e5f164f2d0274.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-8bc92a63825b5e282b7e5f164f2d0274.yaml new file mode 100644 index 0000000000..8f69a083d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-8bc92a63825b5e282b7e5f164f2d0274.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-8bc92a63825b5e282b7e5f164f2d0274 + +info: + name: > + JS Help Desk – Best Help Desk & Support Plugin <= 2.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b790db69-cccd-4adf-a7fa-f7db4dd96be6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-cd695a94c9ddf898661512e7b5a151f2.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-cd695a94c9ddf898661512e7b5a151f2.yaml new file mode 100644 index 0000000000..1da691d8f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-cd695a94c9ddf898661512e7b5a151f2.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-cd695a94c9ddf898661512e7b5a151f2 + +info: + name: > + JS Help Desk <= 2.7.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89f6f1cd-91ab-416b-b76b-162b3b29d752?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js-support-ticket-dcc8e30c059ff6154a44599d32e5c2b6.yaml b/nuclei-templates/cve-less/plugins/js-support-ticket-dcc8e30c059ff6154a44599d32e5c2b6.yaml new file mode 100644 index 0000000000..2683a9188d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js-support-ticket-dcc8e30c059ff6154a44599d32e5c2b6.yaml @@ -0,0 +1,58 @@ +id: js-support-ticket-dcc8e30c059ff6154a44599d32e5c2b6 + +info: + name: > + JS Help Desk <= 2.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baecb227-08c4-4de7-a725-db6639587f13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js-support-ticket/" + google-query: inurl:"/wp-content/plugins/js-support-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js-support-ticket,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js-support-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js-support-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js_composer-16bf911b12f5300e0830fe4fc1eb1ed0.yaml b/nuclei-templates/cve-less/plugins/js_composer-16bf911b12f5300e0830fe4fc1eb1ed0.yaml new file mode 100644 index 0000000000..10909c0b17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js_composer-16bf911b12f5300e0830fe4fc1eb1ed0.yaml @@ -0,0 +1,58 @@ +id: js_composer-16bf911b12f5300e0830fe4fc1eb1ed0 + +info: + name: > + WPBakery Visual Composer <= 7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button onclick attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a571386-fae1-4a56-8567-9d3e23249de1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js_composer/" + google-query: inurl:"/wp-content/plugins/js_composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js_composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js_composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js_composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js_composer-538a8622c152b16ef2caeb53a8ac1ec1.yaml b/nuclei-templates/cve-less/plugins/js_composer-538a8622c152b16ef2caeb53a8ac1ec1.yaml new file mode 100644 index 0000000000..0e337a74db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js_composer-538a8622c152b16ef2caeb53a8ac1ec1.yaml @@ -0,0 +1,58 @@ +id: js_composer-538a8622c152b16ef2caeb53a8ac1ec1 + +info: + name: > + WPBakery Page Builder for WordPress (formerly Visual Composer) <= 4.7.3 - Multiple Cross-Site Scripting Issues + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b94facce-975f-4080-ad67-95d282b28d0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js_composer/" + google-query: inurl:"/wp-content/plugins/js_composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js_composer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js_composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js_composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js_composer-83ebb5cd5f6dc281ececf75915c27b14.yaml b/nuclei-templates/cve-less/plugins/js_composer-83ebb5cd5f6dc281ececf75915c27b14.yaml new file mode 100644 index 0000000000..881439e6d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js_composer-83ebb5cd5f6dc281ececf75915c27b14.yaml @@ -0,0 +1,58 @@ +id: js_composer-83ebb5cd5f6dc281ececf75915c27b14 + +info: + name: > + WPBakery Visual Composer <= 7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Heading tag attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/674e6722-d293-4572-80bf-984e74c3e33f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js_composer/" + google-query: inurl:"/wp-content/plugins/js_composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js_composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js_composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js_composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js_composer-86b92217e832cff4cd144076070304be.yaml b/nuclei-templates/cve-less/plugins/js_composer-86b92217e832cff4cd144076070304be.yaml new file mode 100644 index 0000000000..dfa0618969 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js_composer-86b92217e832cff4cd144076070304be.yaml @@ -0,0 +1,58 @@ +id: js_composer-86b92217e832cff4cd144076070304be + +info: + name: > + WPBakery Visual Composer <= 7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Title tag attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34d21418-4faf-40bf-a960-79482a592722?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js_composer/" + google-query: inurl:"/wp-content/plugins/js_composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js_composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js_composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js_composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js_composer-9af98782950e2bb2fdcec622ba259511.yaml b/nuclei-templates/cve-less/plugins/js_composer-9af98782950e2bb2fdcec622ba259511.yaml new file mode 100644 index 0000000000..4568426f61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js_composer-9af98782950e2bb2fdcec622ba259511.yaml @@ -0,0 +1,58 @@ +id: js_composer-9af98782950e2bb2fdcec622ba259511 + +info: + name: > + WPBakery Visual Composer <= 7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Author + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb8ecbbc-ada9-4887-92e6-25a587ecfb84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js_composer/" + google-query: inurl:"/wp-content/plugins/js_composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js_composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js_composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js_composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js_composer-ad1820dedb4cef27ae24befa1b1daeac.yaml b/nuclei-templates/cve-less/plugins/js_composer-ad1820dedb4cef27ae24befa1b1daeac.yaml new file mode 100644 index 0000000000..ed5a01e2a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js_composer-ad1820dedb4cef27ae24befa1b1daeac.yaml @@ -0,0 +1,58 @@ +id: js_composer-ad1820dedb4cef27ae24befa1b1daeac + +info: + name: > + WPBakery Page Builder for WordPress <= 6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fab5d06-ff39-4b7c-808b-bd199c2a3329?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js_composer/" + google-query: inurl:"/wp-content/plugins/js_composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js_composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js_composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js_composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/js_composer-f10d7adc04b5a73f4d72dd21d3e9038b.yaml b/nuclei-templates/cve-less/plugins/js_composer-f10d7adc04b5a73f4d72dd21d3e9038b.yaml new file mode 100644 index 0000000000..22a8224e05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/js_composer-f10d7adc04b5a73f4d72dd21d3e9038b.yaml @@ -0,0 +1,58 @@ +id: js_composer-f10d7adc04b5a73f4d72dd21d3e9038b + +info: + name: > + WPBakery Page Builder for WordPress <= 6.12.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78579ed9-1540-44be-9884-51fc2afec2bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/js_composer/" + google-query: inurl:"/wp-content/plugins/js_composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,js_composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/js_composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "js_composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jsmol2wp-0c697c5c96080eeecc8327290c3e4bbc.yaml b/nuclei-templates/cve-less/plugins/jsmol2wp-0c697c5c96080eeecc8327290c3e4bbc.yaml new file mode 100644 index 0000000000..e50e8485d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jsmol2wp-0c697c5c96080eeecc8327290c3e4bbc.yaml @@ -0,0 +1,58 @@ +id: jsmol2wp-0c697c5c96080eeecc8327290c3e4bbc + +info: + name: > + JSmol2WP <= 1.07 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adc7e02f-aa95-417f-8778-d9a75beeaf13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jsmol2wp/" + google-query: inurl:"/wp-content/plugins/jsmol2wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jsmol2wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jsmol2wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jsmol2wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jsmol2wp-8f85626a3667c9d85d3c399330a92186.yaml b/nuclei-templates/cve-less/plugins/jsmol2wp-8f85626a3667c9d85d3c399330a92186.yaml new file mode 100644 index 0000000000..b0dad90b57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jsmol2wp-8f85626a3667c9d85d3c399330a92186.yaml @@ -0,0 +1,58 @@ +id: jsmol2wp-8f85626a3667c9d85d3c399330a92186 + +info: + name: > + JSmol2WP <= 1.07 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a06dc0d-f002-4f82-b380-0e329b022dc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jsmol2wp/" + google-query: inurl:"/wp-content/plugins/jsmol2wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jsmol2wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jsmol2wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jsmol2wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/json-content-importer-727fc100f15758606ba9bacc049862be.yaml b/nuclei-templates/cve-less/plugins/json-content-importer-727fc100f15758606ba9bacc049862be.yaml new file mode 100644 index 0000000000..7ff6c24fff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/json-content-importer-727fc100f15758606ba9bacc049862be.yaml @@ -0,0 +1,58 @@ +id: json-content-importer-727fc100f15758606ba9bacc049862be + +info: + name: > + Get Use APIs – JSON Content Importer <= 1.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/777e2e60-46c3-496c-8263-f2e253014ba5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/json-content-importer/" + google-query: inurl:"/wp-content/plugins/json-content-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,json-content-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/json-content-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "json-content-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/json-content-importer-adbb6fa0fc2db14e16c1a1b09c0380c9.yaml b/nuclei-templates/cve-less/plugins/json-content-importer-adbb6fa0fc2db14e16c1a1b09c0380c9.yaml new file mode 100644 index 0000000000..263d2c9adc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/json-content-importer-adbb6fa0fc2db14e16c1a1b09c0380c9.yaml @@ -0,0 +1,58 @@ +id: json-content-importer-adbb6fa0fc2db14e16c1a1b09c0380c9 + +info: + name: > + JSON Content Importer <= 1.3.15 - Authenticated (Admin+) Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3839c47-5fd0-48e7-9637-d40bd237e122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/json-content-importer/" + google-query: inurl:"/wp-content/plugins/json-content-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,json-content-importer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/json-content-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "json-content-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/json-rest-api-017e173f787a75af41e99e7c6b2e153f.yaml b/nuclei-templates/cve-less/plugins/json-rest-api-017e173f787a75af41e99e7c6b2e153f.yaml new file mode 100644 index 0000000000..9b39a33d44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/json-rest-api-017e173f787a75af41e99e7c6b2e153f.yaml @@ -0,0 +1,58 @@ +id: json-rest-api-017e173f787a75af41e99e7c6b2e153f + +info: + name: > + WP REST API (WP API) < 1.2.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ba84be8-c6dc-4cb7-b93c-38c69ab07154?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/json-rest-api/" + google-query: inurl:"/wp-content/plugins/json-rest-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,json-rest-api,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/json-rest-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "json-rest-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/json-rest-api-5e1efa6ead2e9d16598b6140024797d0.yaml b/nuclei-templates/cve-less/plugins/json-rest-api-5e1efa6ead2e9d16598b6140024797d0.yaml new file mode 100644 index 0000000000..f7c64e45e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/json-rest-api-5e1efa6ead2e9d16598b6140024797d0.yaml @@ -0,0 +1,58 @@ +id: json-rest-api-5e1efa6ead2e9d16598b6140024797d0 + +info: + name: > + JSON REST API <= 1.1 - Potential Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec5fa360-6fff-46f5-8221-4b28a6db3e73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/json-rest-api/" + google-query: inurl:"/wp-content/plugins/json-rest-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,json-rest-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/json-rest-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "json-rest-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/json-rest-api-9d1887b8622dac2bd15f04e82a194689.yaml b/nuclei-templates/cve-less/plugins/json-rest-api-9d1887b8622dac2bd15f04e82a194689.yaml new file mode 100644 index 0000000000..4b25b9fe2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/json-rest-api-9d1887b8622dac2bd15f04e82a194689.yaml @@ -0,0 +1,58 @@ +id: json-rest-api-9d1887b8622dac2bd15f04e82a194689 + +info: + name: > + WP REST API <= 1.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6702c762-14c1-490a-92e4-313b785b3407?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/json-rest-api/" + google-query: inurl:"/wp-content/plugins/json-rest-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,json-rest-api,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/json-rest-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "json-rest-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jtrt-responsive-tables-188621df0287aae144c1602d133b6eea.yaml b/nuclei-templates/cve-less/plugins/jtrt-responsive-tables-188621df0287aae144c1602d133b6eea.yaml new file mode 100644 index 0000000000..56f5f38bf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jtrt-responsive-tables-188621df0287aae144c1602d133b6eea.yaml @@ -0,0 +1,58 @@ +id: jtrt-responsive-tables-188621df0287aae144c1602d133b6eea + +info: + name: > + JTRT Responsive Tables <= 4.1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89ca9214-145e-43c6-a642-7c371f635332?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jtrt-responsive-tables/" + google-query: inurl:"/wp-content/plugins/jtrt-responsive-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jtrt-responsive-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jtrt-responsive-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jtrt-responsive-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jtrt-responsive-tables-8a2f1e9cb4e65657070d3644661c86c5.yaml b/nuclei-templates/cve-less/plugins/jtrt-responsive-tables-8a2f1e9cb4e65657070d3644661c86c5.yaml new file mode 100644 index 0000000000..9830b7ccd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jtrt-responsive-tables-8a2f1e9cb4e65657070d3644661c86c5.yaml @@ -0,0 +1,58 @@ +id: jtrt-responsive-tables-8a2f1e9cb4e65657070d3644661c86c5 + +info: + name: > + JTRT Responsive Tables < 4.1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7110d8f1-8978-494e-afdb-ca96ee503ab7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jtrt-responsive-tables/" + google-query: inurl:"/wp-content/plugins/jtrt-responsive-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jtrt-responsive-tables,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jtrt-responsive-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jtrt-responsive-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/judgeme-product-reviews-woocommerce-e8b437aec6c6d5cf835be562d11e2a03.yaml b/nuclei-templates/cve-less/plugins/judgeme-product-reviews-woocommerce-e8b437aec6c6d5cf835be562d11e2a03.yaml new file mode 100644 index 0000000000..bca6ca7193 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/judgeme-product-reviews-woocommerce-e8b437aec6c6d5cf835be562d11e2a03.yaml @@ -0,0 +1,58 @@ +id: judgeme-product-reviews-woocommerce-e8b437aec6c6d5cf835be562d11e2a03 + +info: + name: > + Judge.me Product Reviews for WooCommerce <= 1.3.20 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8053e812-21c0-4e3a-8d5b-52ef9991eb61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/judgeme-product-reviews-woocommerce/" + google-query: inurl:"/wp-content/plugins/judgeme-product-reviews-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,judgeme-product-reviews-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/judgeme-product-reviews-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "judgeme-product-reviews-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/juicer-1856c5e867bf1d120f63e6e0b7edcd33.yaml b/nuclei-templates/cve-less/plugins/juicer-1856c5e867bf1d120f63e6e0b7edcd33.yaml new file mode 100644 index 0000000000..57acb8e1c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/juicer-1856c5e867bf1d120f63e6e0b7edcd33.yaml @@ -0,0 +1,58 @@ +id: juicer-1856c5e867bf1d120f63e6e0b7edcd33 + +info: + name: > + Juicer <= 1.10.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c896da97-3100-43a8-a5e0-44b61c4431fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/juicer/" + google-query: inurl:"/wp-content/plugins/juicer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,juicer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/juicer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "juicer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jungbillig-portfolio-gallery-0f097e6e2a639803a729d611f2124080.yaml b/nuclei-templates/cve-less/plugins/jungbillig-portfolio-gallery-0f097e6e2a639803a729d611f2124080.yaml new file mode 100644 index 0000000000..bf9e5dbfc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jungbillig-portfolio-gallery-0f097e6e2a639803a729d611f2124080.yaml @@ -0,0 +1,58 @@ +id: jungbillig-portfolio-gallery-0f097e6e2a639803a729d611f2124080 + +info: + name: > + Filterable Portfolio <= 1.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2f9eed8-9656-48a2-9414-2cfdd3ebb059?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jungbillig-portfolio-gallery/" + google-query: inurl:"/wp-content/plugins/jungbillig-portfolio-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jungbillig-portfolio-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jungbillig-portfolio-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jungbillig-portfolio-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-0fb4e97ee7da5e51631d72f53857a9d4.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-0fb4e97ee7da5e51631d72f53857a9d4.yaml new file mode 100644 index 0000000000..1ebc06a871 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-0fb4e97ee7da5e51631d72f53857a9d4.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-0fb4e97ee7da5e51631d72f53857a9d4 + +info: + name: > + JupiterX Theme <= 2.0.6 and JupiterX Core <= 2.0.6 - Authenticated Arbitrary Plugin Deactivation and Settings Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/147b7be2-8bbe-4e95-bfcb-1c4ff8a41a3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-6263cc6815827a2dcfc05e4efb3b62b1.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-6263cc6815827a2dcfc05e4efb3b62b1.yaml new file mode 100644 index 0000000000..ca0d14196e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-6263cc6815827a2dcfc05e4efb3b62b1.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-6263cc6815827a2dcfc05e4efb3b62b1 + +info: + name: > + JupiterX Core <= 3.3.8 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b894473b-b2ed-475b-892e-603db609f88a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-723d96df6476235c8369c3ebff502325.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-723d96df6476235c8369c3ebff502325.yaml new file mode 100644 index 0000000000..364c36400c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-723d96df6476235c8369c3ebff502325.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-723d96df6476235c8369c3ebff502325 + +info: + name: > + Jupiter X Core <= 2.0.9 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52daa230-1600-4ace-9adf-3f4e9be51e9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-7a177ce424b4ca9311638c336fb2a0c4.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-7a177ce424b4ca9311638c336fb2a0c4.yaml new file mode 100644 index 0000000000..47812925a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-7a177ce424b4ca9311638c336fb2a0c4.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-7a177ce424b4ca9311638c336fb2a0c4 + +info: + name: > + JupiterX Core 3.0.0 - 3.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dccb69e-b3d8-44b5-8f5e-931e5afe2bd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-8c6a911c1599b488ff2e4c85e8723fde.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-8c6a911c1599b488ff2e4c85e8723fde.yaml new file mode 100644 index 0000000000..8a1da7426a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-8c6a911c1599b488ff2e4c85e8723fde.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-8c6a911c1599b488ff2e4c85e8723fde + +info: + name: > + JupiterX Core <= 2.0.6 - Information Disclosure, Modification, and Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e92ce899-556f-4a17-8902-1919d485ee15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-b223d684e1bd83784af3dae666ad9edd.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-b223d684e1bd83784af3dae666ad9edd.yaml new file mode 100644 index 0000000000..244b6679ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-b223d684e1bd83784af3dae666ad9edd.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-b223d684e1bd83784af3dae666ad9edd + +info: + name: > + JupiterX Core <= 3.3.5 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/980a9237-7dea-4058-a850-b849457b4fef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-bf3d966b9ad3caa6240cfda0b540df5c.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-bf3d966b9ad3caa6240cfda0b540df5c.yaml new file mode 100644 index 0000000000..9a1a2759f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-bf3d966b9ad3caa6240cfda0b540df5c.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-bf3d966b9ad3caa6240cfda0b540df5c + +info: + name: > + Jupiter X Core <= 2.5.0 - Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f767d94b-fe92-4b69-9d81-96de51e12983?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-bfeb7be408c868527d6e4e4ae715a094.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-bfeb7be408c868527d6e4e4ae715a094.yaml new file mode 100644 index 0000000000..f00ece6430 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-bfeb7be408c868527d6e4e4ae715a094.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-bfeb7be408c868527d6e4e4ae715a094 + +info: + name: > + JupiterX Core 3.0.0 - 3.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48583297-59db-48ec-8551-d6b37ac02197?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jupiterx-core-f3750481cefda659186282ffd61f21aa.yaml b/nuclei-templates/cve-less/plugins/jupiterx-core-f3750481cefda659186282ffd61f21aa.yaml new file mode 100644 index 0000000000..8b28721b9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jupiterx-core-f3750481cefda659186282ffd61f21aa.yaml @@ -0,0 +1,58 @@ +id: jupiterx-core-f3750481cefda659186282ffd61f21aa + +info: + name: > + Jupiter Theme <= 6.10.1 and JupiterX Core Plugin <= 2.0.7 - Authenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b54f38b6-5f98-469c-802a-a4c1e1f2ab0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jupiterx-core/" + google-query: inurl:"/wp-content/plugins/jupiterx-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jupiterx-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jupiterx-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/just-custom-fields-2e06d0c89a5dc3c234768757cec7f855.yaml b/nuclei-templates/cve-less/plugins/just-custom-fields-2e06d0c89a5dc3c234768757cec7f855.yaml new file mode 100644 index 0000000000..a5792be0a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/just-custom-fields-2e06d0c89a5dc3c234768757cec7f855.yaml @@ -0,0 +1,58 @@ +id: just-custom-fields-2e06d0c89a5dc3c234768757cec7f855 + +info: + name: > + Just Custom Fields <= 3.3.2 - Missing Authorization on AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6d44749-8b1a-4d22-9917-fee134737063?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/just-custom-fields/" + google-query: inurl:"/wp-content/plugins/just-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,just-custom-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/just-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "just-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/just-custom-fields-35c9285e319e0fd8c44eb8868930cb11.yaml b/nuclei-templates/cve-less/plugins/just-custom-fields-35c9285e319e0fd8c44eb8868930cb11.yaml new file mode 100644 index 0000000000..8402010b58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/just-custom-fields-35c9285e319e0fd8c44eb8868930cb11.yaml @@ -0,0 +1,58 @@ +id: just-custom-fields-35c9285e319e0fd8c44eb8868930cb11 + +info: + name: > + Just Custom Fields <= 3.3.2 - Cross-Site Request Forgery on AJAX Actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79899dc1-4953-4f95-95f5-853d24e7b9ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/just-custom-fields/" + google-query: inurl:"/wp-content/plugins/just-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,just-custom-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/just-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "just-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/just-tables-5fd0b28040a0aa5ee65912fc0591e5ff.yaml b/nuclei-templates/cve-less/plugins/just-tables-5fd0b28040a0aa5ee65912fc0591e5ff.yaml new file mode 100644 index 0000000000..dd910d8f35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/just-tables-5fd0b28040a0aa5ee65912fc0591e5ff.yaml @@ -0,0 +1,58 @@ +id: just-tables-5fd0b28040a0aa5ee65912fc0591e5ff + +info: + name: > + JustTables – WooCommerce Product Table <= 1.4.9 - Cross-Site Request Forgery via plugin_activation() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2b795d8-3cab-4d81-a016-b4498315ddf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/just-tables/" + google-query: inurl:"/wp-content/plugins/just-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,just-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/just-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "just-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/justified-gallery-421ff303fd144872eafd938e0ed53208.yaml b/nuclei-templates/cve-less/plugins/justified-gallery-421ff303fd144872eafd938e0ed53208.yaml new file mode 100644 index 0000000000..e77bbcc7f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/justified-gallery-421ff303fd144872eafd938e0ed53208.yaml @@ -0,0 +1,58 @@ +id: justified-gallery-421ff303fd144872eafd938e0ed53208 + +info: + name: > + Justified Gallery <= 1.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95631d97-14c9-45f2-b709-3eca7c38f09d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/justified-gallery/" + google-query: inurl:"/wp-content/plugins/justified-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,justified-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/justified-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "justified-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/justified-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/justified-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..076c2a43f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/justified-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: justified-gallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/justified-gallery/" + google-query: inurl:"/wp-content/plugins/justified-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,justified-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/justified-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "justified-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/justified-gallery-d3b5c660c8e70bcaeca06e534455619d.yaml b/nuclei-templates/cve-less/plugins/justified-gallery-d3b5c660c8e70bcaeca06e534455619d.yaml new file mode 100644 index 0000000000..4029b2216f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/justified-gallery-d3b5c660c8e70bcaeca06e534455619d.yaml @@ -0,0 +1,58 @@ +id: justified-gallery-d3b5c660c8e70bcaeca06e534455619d + +info: + name: > + Justified Gallery <= 1.7.3 - Missing Authorization via 'dismiss_how_to_use_notice' and 'dismiss_notice' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3978cb6-1739-4671-bb98-17c409c67d1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/justified-gallery/" + google-query: inurl:"/wp-content/plugins/justified-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,justified-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/justified-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "justified-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jvm-rich-text-icons-cbde558e3503539352816240255a9c09.yaml b/nuclei-templates/cve-less/plugins/jvm-rich-text-icons-cbde558e3503539352816240255a9c09.yaml new file mode 100644 index 0000000000..70ece52641 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jvm-rich-text-icons-cbde558e3503539352816240255a9c09.yaml @@ -0,0 +1,58 @@ +id: jvm-rich-text-icons-cbde558e3503539352816240255a9c09 + +info: + name: > + JVM rich text icons <= 1.2.6 - Directory Traversal to Authenticated(Subscriber+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e54f9b-db12-42ef-a0fa-2d40c0f7908c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jvm-rich-text-icons/" + google-query: inurl:"/wp-content/plugins/jvm-rich-text-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jvm-rich-text-icons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jvm-rich-text-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jvm-rich-text-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jvm-rich-text-icons-f64345cda7b5204d1b37828da4e7e5ea.yaml b/nuclei-templates/cve-less/plugins/jvm-rich-text-icons-f64345cda7b5204d1b37828da4e7e5ea.yaml new file mode 100644 index 0000000000..52ff9e041c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jvm-rich-text-icons-f64345cda7b5204d1b37828da4e7e5ea.yaml @@ -0,0 +1,58 @@ +id: jvm-rich-text-icons-f64345cda7b5204d1b37828da4e7e5ea + +info: + name: > + JVM rich text icons <= 1.2.3 - Authenticated(Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca064db0-2718-4521-9467-335b59208858?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jvm-rich-text-icons/" + google-query: inurl:"/wp-content/plugins/jvm-rich-text-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jvm-rich-text-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jvm-rich-text-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jvm-rich-text-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jvm-woocommerce-wishlist-dcac032f7f8635bf04a2ba3e28463625.yaml b/nuclei-templates/cve-less/plugins/jvm-woocommerce-wishlist-dcac032f7f8635bf04a2ba3e28463625.yaml new file mode 100644 index 0000000000..c625a5ee72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jvm-woocommerce-wishlist-dcac032f7f8635bf04a2ba3e28463625.yaml @@ -0,0 +1,58 @@ +id: jvm-woocommerce-wishlist-dcac032f7f8635bf04a2ba3e28463625 + +info: + name: > + JVM WooCommerce Wishlist <= 1.2.6 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b266a09-22f3-4ac3-a2ba-8321503200e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jvm-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/jvm-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jvm-woocommerce-wishlist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jvm-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jvm-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jw-player-7-for-wp-8564c9ce49cff70553493d3be285f932.yaml b/nuclei-templates/cve-less/plugins/jw-player-7-for-wp-8564c9ce49cff70553493d3be285f932.yaml new file mode 100644 index 0000000000..6d64a82686 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jw-player-7-for-wp-8564c9ce49cff70553493d3be285f932.yaml @@ -0,0 +1,58 @@ +id: jw-player-7-for-wp-8564c9ce49cff70553493d3be285f932 + +info: + name: > + JW Player for WordPress <= 2.3.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52bd0d4d-4a08-417c-a426-6bd981f43120?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jw-player-7-for-wp/" + google-query: inurl:"/wp-content/plugins/jw-player-7-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jw-player-7-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jw-player-7-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jw-player-7-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jw-player-plugin-for-wordpress-1762eb5f09e878b42fb55a3fe0a86976.yaml b/nuclei-templates/cve-less/plugins/jw-player-plugin-for-wordpress-1762eb5f09e878b42fb55a3fe0a86976.yaml new file mode 100644 index 0000000000..a3c6151a39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jw-player-plugin-for-wordpress-1762eb5f09e878b42fb55a3fe0a86976.yaml @@ -0,0 +1,58 @@ +id: jw-player-plugin-for-wordpress-1762eb5f09e878b42fb55a3fe0a86976 + +info: + name: > + JW-Player-Plugin-For-Wordpress <= 2.1.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f288b68a-2455-4ee7-b217-5cb46fb79caf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jw-player-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/jw-player-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jw-player-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jw-player-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jw-player-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jw-player-plugin-for-wordpress-748f56889fa9468d09334c5315ffc76e.yaml b/nuclei-templates/cve-less/plugins/jw-player-plugin-for-wordpress-748f56889fa9468d09334c5315ffc76e.yaml new file mode 100644 index 0000000000..ab2ec736af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jw-player-plugin-for-wordpress-748f56889fa9468d09334c5315ffc76e.yaml @@ -0,0 +1,58 @@ +id: jw-player-plugin-for-wordpress-748f56889fa9468d09334c5315ffc76e + +info: + name: > + JW Player for Flash & HTML5 Video < 2.1.4 - Cross-Site Request Forgery leading to player deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7eb9cb7-ca71-454b-bb4c-da89c8a6e584?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jw-player-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/jw-player-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jw-player-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jw-player-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jw-player-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/jwt-auth-b4373f75cd045c6c032603b171a73598.yaml b/nuclei-templates/cve-less/plugins/jwt-auth-b4373f75cd045c6c032603b171a73598.yaml new file mode 100644 index 0000000000..60125b922b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/jwt-auth-b4373f75cd045c6c032603b171a73598.yaml @@ -0,0 +1,58 @@ +id: jwt-auth-b4373f75cd045c6c032603b171a73598 + +info: + name: > + Firebase PHP-JWT < 6.0.0 - Algorithm Confusion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8aa0fffa-475e-4227-9ab1-17ca6fcce529?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/jwt-auth/" + google-query: inurl:"/wp-content/plugins/jwt-auth/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,jwt-auth,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/jwt-auth/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jwt-auth" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-145ab093189c598c1d7c84674ba9b14b.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-145ab093189c598c1d7c84674ba9b14b.yaml new file mode 100644 index 0000000000..fdb489df91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-145ab093189c598c1d7c84674ba9b14b.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-145ab093189c598c1d7c84674ba9b14b + +info: + name: > + Gutenberg Blocks with AI by Kadence WP <= 3.2.36 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad0e4292-d890-499b-b70a-ed638d5b8ee9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-19fda0443580ba364718d6332aa05bd3.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-19fda0443580ba364718d6332aa05bd3.yaml new file mode 100644 index 0000000000..7c00eb3174 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-19fda0443580ba364718d6332aa05bd3.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-19fda0443580ba364718d6332aa05bd3 + +info: + name: > + Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.2.36 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Timer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cff2e5be-0de0-4e62-a881-6156760b7d99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-1af00ca27a5fbf01cb83385e2b154d55.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-1af00ca27a5fbf01cb83385e2b154d55.yaml new file mode 100644 index 0000000000..2ad962dcbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-1af00ca27a5fbf01cb83385e2b154d55.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-1af00ca27a5fbf01cb83385e2b154d55 + +info: + name: > + Gutenberg Blocks by Kadence Blocks <= 3.2.17 - Authenticated(Editor+) Stored Cross-Site Scripting via Contact Form Message Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/989bd778-c7b2-41c5-ac4a-2f1a4e594f0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-1ed8420474aea4653c484035b79e8e05.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-1ed8420474aea4653c484035b79e8e05.yaml new file mode 100644 index 0000000000..405bc2b8a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-1ed8420474aea4653c484035b79e8e05.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-1ed8420474aea4653c484035b79e8e05 + +info: + name: > + Gutenberg Blocks by Kadence Blocks <= 3.2.25 - Authenticated (Author+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ce61c74-2754-468b-b40a-5b4446375dfd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-73e0ed91223d9a0bf611aaf9c6ef87bb.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-73e0ed91223d9a0bf611aaf9c6ef87bb.yaml new file mode 100644 index 0000000000..d4450183d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-73e0ed91223d9a0bf611aaf9c6ef87bb.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-73e0ed91223d9a0bf611aaf9c6ef87bb + +info: + name: > + Gutenberg Blocks with AI by Kadence WP – Page Builder Features <= 3.2.19 - Authenticated (Contributor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2d7c5b6-ce4d-4dbe-abec-8c223cb652af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-7c903975cddce5bde1f01b5dccfc9d5e.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-7c903975cddce5bde1f01b5dccfc9d5e.yaml new file mode 100644 index 0000000000..2fa2c4b1c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-7c903975cddce5bde1f01b5dccfc9d5e.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-7c903975cddce5bde1f01b5dccfc9d5e + +info: + name: > + Kadence Blocks <= 3.1.10 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4562535-ef69-4337-b03e-0b7c869cb042?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-7faa2f91e19a5cd476ef97768ff54f4e.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-7faa2f91e19a5cd476ef97768ff54f4e.yaml new file mode 100644 index 0000000000..5c9f6afde0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-7faa2f91e19a5cd476ef97768ff54f4e.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-7faa2f91e19a5cd476ef97768ff54f4e + +info: + name: > + Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.2.25 - Authenticated (Contributor+) Stored Cross-Site Scripting via Testimonial Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5fd4dbe-6f44-45ef-9d49-4bc624fdcc57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-92efa25c2b07bccd1145767fcc736dac.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-92efa25c2b07bccd1145767fcc736dac.yaml new file mode 100644 index 0000000000..9a1c3325d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-92efa25c2b07bccd1145767fcc736dac.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-92efa25c2b07bccd1145767fcc736dac + +info: + name: > + Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.1.26 - Authenticated(Contributor+) Server-Side Request Forgery (SSRF) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b01ad77f-2349-48bb-b4e9-f7cbce435de9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-ae54bb23e01b89e4ec06d2fb932844c4.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-ae54bb23e01b89e4ec06d2fb932844c4.yaml new file mode 100644 index 0000000000..cc54c1b457 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-ae54bb23e01b89e4ec06d2fb932844c4.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-ae54bb23e01b89e4ec06d2fb932844c4 + +info: + name: > + Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.2.31 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via CountUp Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b38a69c7-91d4-43be-8650-eb1f0029bd44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-b108894447f4647f7c71dc35d7e7ee8f.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-b108894447f4647f7c71dc35d7e7ee8f.yaml new file mode 100644 index 0000000000..024bc469a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-b108894447f4647f7c71dc35d7e7ee8f.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-b108894447f4647f7c71dc35d7e7ee8f + +info: + name: > + Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.2.23 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0913632-85c5-4835-b606-4eca51df2496?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-e67596c37a8f5cfdbaa53a0b072da6d5.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-e67596c37a8f5cfdbaa53a0b072da6d5.yaml new file mode 100644 index 0000000000..e9c815fa61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-e67596c37a8f5cfdbaa53a0b072da6d5.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-e67596c37a8f5cfdbaa53a0b072da6d5 + +info: + name: > + Gutenberg Blocks by Kadence Blocks <= 3.2.25 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa984d7f-49b9-49c9-9a1c-9e4c8b7f989b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-blocks-f0d72e9f2bbc50f42260a8f158b94cfc.yaml b/nuclei-templates/cve-less/plugins/kadence-blocks-f0d72e9f2bbc50f42260a8f158b94cfc.yaml new file mode 100644 index 0000000000..659c6471c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-blocks-f0d72e9f2bbc50f42260a8f158b94cfc.yaml @@ -0,0 +1,58 @@ +id: kadence-blocks-f0d72e9f2bbc50f42260a8f158b94cfc + +info: + name: > + Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.2.34 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7fe482e-a4e8-411c-97a4-a32ccf5b3682?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-blocks/" + google-query: inurl:"/wp-content/plugins/kadence-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-starter-templates-884840a442619cbc5a7daf95f85cb6cb.yaml b/nuclei-templates/cve-less/plugins/kadence-starter-templates-884840a442619cbc5a7daf95f85cb6cb.yaml new file mode 100644 index 0000000000..3e3c94928f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-starter-templates-884840a442619cbc5a7daf95f85cb6cb.yaml @@ -0,0 +1,58 @@ +id: kadence-starter-templates-884840a442619cbc5a7daf95f85cb6cb + +info: + name: > + Starter Templates by Kadence WP <= 1.2.16 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72eda38d-34e9-4a0e-a760-a9b991e590de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-starter-templates/" + google-query: inurl:"/wp-content/plugins/kadence-starter-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-starter-templates,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-starter-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-starter-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-woocommerce-email-designer-50843d38ad4401e3655e1238a9807eaf.yaml b/nuclei-templates/cve-less/plugins/kadence-woocommerce-email-designer-50843d38ad4401e3655e1238a9807eaf.yaml new file mode 100644 index 0000000000..0137096c99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-woocommerce-email-designer-50843d38ad4401e3655e1238a9807eaf.yaml @@ -0,0 +1,58 @@ +id: kadence-woocommerce-email-designer-50843d38ad4401e3655e1238a9807eaf + +info: + name: > + Kadence WooCommerce Email Designer <= 1.5.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b8483b8-07b4-436f-992f-35e16fef867b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-woocommerce-email-designer/" + google-query: inurl:"/wp-content/plugins/kadence-woocommerce-email-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-woocommerce-email-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-woocommerce-email-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-woocommerce-email-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kadence-woocommerce-email-designer-6994b89efe7c786e6720a2413c234aa9.yaml b/nuclei-templates/cve-less/plugins/kadence-woocommerce-email-designer-6994b89efe7c786e6720a2413c234aa9.yaml new file mode 100644 index 0000000000..27fb8d3635 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kadence-woocommerce-email-designer-6994b89efe7c786e6720a2413c234aa9.yaml @@ -0,0 +1,58 @@ +id: kadence-woocommerce-email-designer-6994b89efe7c786e6720a2413c234aa9 + +info: + name: > + Kadence WooCommerce Email Designer <= 1.5.6 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ea42fbc-ec08-4f67-90d0-506fc474a4a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kadence-woocommerce-email-designer/" + google-query: inurl:"/wp-content/plugins/kadence-woocommerce-email-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kadence-woocommerce-email-designer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kadence-woocommerce-email-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kadence-woocommerce-email-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kali-forms-171d068f6ec1f7c5f7f36a222d7d8329.yaml b/nuclei-templates/cve-less/plugins/kali-forms-171d068f6ec1f7c5f7f36a222d7d8329.yaml new file mode 100644 index 0000000000..138acc1f81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kali-forms-171d068f6ec1f7c5f7f36a222d7d8329.yaml @@ -0,0 +1,58 @@ +id: kali-forms-171d068f6ec1f7c5f7f36a222d7d8329 + +info: + name: > + Kali Forms <= 2.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5bcf456-f991-4775-8c3e-a3c0212a5765?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kali-forms/" + google-query: inurl:"/wp-content/plugins/kali-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kali-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kali-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kali-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kali-forms-51a3f66be32afef58cba4c10f2a34acc.yaml b/nuclei-templates/cve-less/plugins/kali-forms-51a3f66be32afef58cba4c10f2a34acc.yaml new file mode 100644 index 0000000000..e508e0f659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kali-forms-51a3f66be32afef58cba4c10f2a34acc.yaml @@ -0,0 +1,58 @@ +id: kali-forms-51a3f66be32afef58cba4c10f2a34acc + +info: + name: > + Contact Form builder with drag & drop - Kali Forms <= 2.3.36 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/012a558c-1f80-4f36-85d9-905f4ed0b6cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kali-forms/" + google-query: inurl:"/wp-content/plugins/kali-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kali-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kali-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kali-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kali-forms-5837868c169d6f2b8a500d8da35501e2.yaml b/nuclei-templates/cve-less/plugins/kali-forms-5837868c169d6f2b8a500d8da35501e2.yaml new file mode 100644 index 0000000000..b88ae89029 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kali-forms-5837868c169d6f2b8a500d8da35501e2.yaml @@ -0,0 +1,58 @@ +id: kali-forms-5837868c169d6f2b8a500d8da35501e2 + +info: + name: > + Contact Form builder with drag & drop for WordPress – Kali Forms <= 2.3.41 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed1aae32-6040-4c42-b8a7-4c3be371a8c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kali-forms/" + google-query: inurl:"/wp-content/plugins/kali-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kali-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kali-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kali-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kali-forms-7de52979e23084c59771c8210cf92e97.yaml b/nuclei-templates/cve-less/plugins/kali-forms-7de52979e23084c59771c8210cf92e97.yaml new file mode 100644 index 0000000000..54cdc2dae5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kali-forms-7de52979e23084c59771c8210cf92e97.yaml @@ -0,0 +1,58 @@ +id: kali-forms-7de52979e23084c59771c8210cf92e97 + +info: + name: > + Contact Form builder with drag & drop - Kali Forms <= 2.3.27 - Missing Authorization via Contact Form + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfb473a6-08ba-4b23-877d-4aa661c0053f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kali-forms/" + google-query: inurl:"/wp-content/plugins/kali-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kali-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kali-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kali-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kali-forms-a8effa5bb19e2446851feb68b5c40364.yaml b/nuclei-templates/cve-less/plugins/kali-forms-a8effa5bb19e2446851feb68b5c40364.yaml new file mode 100644 index 0000000000..0dcdcc99f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kali-forms-a8effa5bb19e2446851feb68b5c40364.yaml @@ -0,0 +1,58 @@ +id: kali-forms-a8effa5bb19e2446851feb68b5c40364 + +info: + name: > + Contact Form builder with drag & drop for WordPress – Kali Forms <= 2.3.41 - Missing Authorization to Arbitrary Plugin Deactivation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7be75b0a-737d-4f0d-b024-e207af4573cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kali-forms/" + google-query: inurl:"/wp-content/plugins/kali-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kali-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kali-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kali-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kali-forms-b8ab2dfdf20e4fafe82ff439f5e1b3cf.yaml b/nuclei-templates/cve-less/plugins/kali-forms-b8ab2dfdf20e4fafe82ff439f5e1b3cf.yaml new file mode 100644 index 0000000000..0dfa304d6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kali-forms-b8ab2dfdf20e4fafe82ff439f5e1b3cf.yaml @@ -0,0 +1,58 @@ +id: kali-forms-b8ab2dfdf20e4fafe82ff439f5e1b3cf + +info: + name: > + Contact Form builder with drag & drop - Kali Forms <= 2.3.28 - Missing Authorization via get_log + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aec4d370-58c0-466f-b3bb-9676fc744d96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kali-forms/" + google-query: inurl:"/wp-content/plugins/kali-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kali-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kali-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kali-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kali-forms-bba8cb47607da11df10938d143f38653.yaml b/nuclei-templates/cve-less/plugins/kali-forms-bba8cb47607da11df10938d143f38653.yaml new file mode 100644 index 0000000000..774d782a2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kali-forms-bba8cb47607da11df10938d143f38653.yaml @@ -0,0 +1,58 @@ +id: kali-forms-bba8cb47607da11df10938d143f38653 + +info: + name: > + Kali Forms <= 2.1.1 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ed8e24d-6bd0-4638-9031-997ce2228fad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kali-forms/" + google-query: inurl:"/wp-content/plugins/kali-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kali-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kali-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kali-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kali-forms-e13af05b11fa3359bbef7b6fbbcbe782.yaml b/nuclei-templates/cve-less/plugins/kali-forms-e13af05b11fa3359bbef7b6fbbcbe782.yaml new file mode 100644 index 0000000000..853bee4725 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kali-forms-e13af05b11fa3359bbef7b6fbbcbe782.yaml @@ -0,0 +1,58 @@ +id: kali-forms-e13af05b11fa3359bbef7b6fbbcbe782 + +info: + name: > + Kali Forms <= 2.1.1 - Unauthenticated Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92644676-add4-415c-9a1a-c6616108688d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kali-forms/" + google-query: inurl:"/wp-content/plugins/kali-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kali-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kali-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kali-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kama-clic-counter-703cbb2bd8ca38850245b92d6dc648dc.yaml b/nuclei-templates/cve-less/plugins/kama-clic-counter-703cbb2bd8ca38850245b92d6dc648dc.yaml new file mode 100644 index 0000000000..bdcac3e9b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kama-clic-counter-703cbb2bd8ca38850245b92d6dc648dc.yaml @@ -0,0 +1,58 @@ +id: kama-clic-counter-703cbb2bd8ca38850245b92d6dc648dc + +info: + name: > + Kama Click Counter <= 3.4.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b6e45ae-650e-45eb-b781-5acec1ba2dde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kama-clic-counter/" + google-query: inurl:"/wp-content/plugins/kama-clic-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kama-clic-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kama-clic-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kama-clic-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kama-clic-counter-738043af82effea7b721b2ac598247ee.yaml b/nuclei-templates/cve-less/plugins/kama-clic-counter-738043af82effea7b721b2ac598247ee.yaml new file mode 100644 index 0000000000..c0740597db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kama-clic-counter-738043af82effea7b721b2ac598247ee.yaml @@ -0,0 +1,58 @@ +id: kama-clic-counter-738043af82effea7b721b2ac598247ee + +info: + name: > + Kama Click Counter <= 3.4.9 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7837208-97e3-45f9-8f9f-b1906a4fcbcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kama-clic-counter/" + google-query: inurl:"/wp-content/plugins/kama-clic-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kama-clic-counter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kama-clic-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kama-clic-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kanban-0ba2d63b51e45936904968ed820d3fb0.yaml b/nuclei-templates/cve-less/plugins/kanban-0ba2d63b51e45936904968ed820d3fb0.yaml new file mode 100644 index 0000000000..a9260b93ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kanban-0ba2d63b51e45936904968ed820d3fb0.yaml @@ -0,0 +1,58 @@ +id: kanban-0ba2d63b51e45936904968ed820d3fb0 + +info: + name: > + Kanban Boards for WordPress <= 2.5.21 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/071b5c32-b6ac-402a-af74-6ecd05279d93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kanban/" + google-query: inurl:"/wp-content/plugins/kanban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kanban,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kanban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kanban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kanban-437b56ebf4aacc7667a38732c9abf4be.yaml b/nuclei-templates/cve-less/plugins/kanban-437b56ebf4aacc7667a38732c9abf4be.yaml new file mode 100644 index 0000000000..ebd8f03bd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kanban-437b56ebf4aacc7667a38732c9abf4be.yaml @@ -0,0 +1,58 @@ +id: kanban-437b56ebf4aacc7667a38732c9abf4be + +info: + name: > + Kanban Boards for WordPress <= 2.5.20 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16e8e097-a332-4c8e-87fb-aabe5d00ae05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kanban/" + google-query: inurl:"/wp-content/plugins/kanban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kanban,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kanban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kanban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kanban-b7ae92a9935669b4053689b9e0cbb221.yaml b/nuclei-templates/cve-less/plugins/kanban-b7ae92a9935669b4053689b9e0cbb221.yaml new file mode 100644 index 0000000000..e5076b6f69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kanban-b7ae92a9935669b4053689b9e0cbb221.yaml @@ -0,0 +1,58 @@ +id: kanban-b7ae92a9935669b4053689b9e0cbb221 + +info: + name: > + Kanban Boards <= 2.5.21 - Authenticated (Administrator+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3adea276-6b55-422d-adc9-a767f569181c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kanban/" + google-query: inurl:"/wp-content/plugins/kanban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kanban,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kanban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kanban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kanban-c02729e12026bce3dd84d6631a92ade6.yaml b/nuclei-templates/cve-less/plugins/kanban-c02729e12026bce3dd84d6631a92ade6.yaml new file mode 100644 index 0000000000..afa87c60bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kanban-c02729e12026bce3dd84d6631a92ade6.yaml @@ -0,0 +1,58 @@ +id: kanban-c02729e12026bce3dd84d6631a92ade6 + +info: + name: > + Kanban Boards for WordPress <= 2.5.20 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fe3e55e-7286-4d12-b24f-fce69248a446?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kanban/" + google-query: inurl:"/wp-content/plugins/kanban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kanban,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kanban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kanban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kanban-f1213197a267fd7da7cf35e16e4c4e64.yaml b/nuclei-templates/cve-less/plugins/kanban-f1213197a267fd7da7cf35e16e4c4e64.yaml new file mode 100644 index 0000000000..666bd7163b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kanban-f1213197a267fd7da7cf35e16e4c4e64.yaml @@ -0,0 +1,58 @@ +id: kanban-f1213197a267fd7da7cf35e16e4c4e64 + +info: + name: > + Kanban Boards for WordPress <= 2.5.21 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/365808af-5ed1-4265-88bd-ca8a49bdf424?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kanban/" + google-query: inurl:"/wp-content/plugins/kanban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kanban,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kanban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kanban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kangu-44460dbeb7b8e704694c0ff2206a0cbe.yaml b/nuclei-templates/cve-less/plugins/kangu-44460dbeb7b8e704694c0ff2206a0cbe.yaml new file mode 100644 index 0000000000..cbbfa243c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kangu-44460dbeb7b8e704694c0ff2206a0cbe.yaml @@ -0,0 +1,58 @@ +id: kangu-44460dbeb7b8e704694c0ff2206a0cbe + +info: + name: > + Kangu para WooCommerce <= 2.2.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9de8d95-4e07-4c52-912b-1a4e2d7e5ed0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kangu/" + google-query: inurl:"/wp-content/plugins/kangu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kangu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kangu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kangu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kanzu-support-desk-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/kanzu-support-desk-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..aaf3c25950 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kanzu-support-desk-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: kanzu-support-desk-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kanzu-support-desk/" + google-query: inurl:"/wp-content/plugins/kanzu-support-desk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kanzu-support-desk,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kanzu-support-desk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kanzu-support-desk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kaswara-405127e1ba90a2b29eb154a026e5d142.yaml b/nuclei-templates/cve-less/plugins/kaswara-405127e1ba90a2b29eb154a026e5d142.yaml new file mode 100644 index 0000000000..b9f265d306 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kaswara-405127e1ba90a2b29eb154a026e5d142.yaml @@ -0,0 +1,58 @@ +id: kaswara-405127e1ba90a2b29eb154a026e5d142 + +info: + name: > + Kaswara Modern VC Addons <= 3.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf76527-9a11-4755-992c-02fbc1a79bae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kaswara/" + google-query: inurl:"/wp-content/plugins/kaswara/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kaswara,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kaswara/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kaswara" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kaswara-40b261f9e620f48d7e973396d17f1ef6.yaml b/nuclei-templates/cve-less/plugins/kaswara-40b261f9e620f48d7e973396d17f1ef6.yaml new file mode 100644 index 0000000000..023b7c65c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kaswara-40b261f9e620f48d7e973396d17f1ef6.yaml @@ -0,0 +1,58 @@ +id: kaswara-40b261f9e620f48d7e973396d17f1ef6 + +info: + name: > + Kaswara Modern VC Addons <= 3.0.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e2c6030-d117-4c0b-a97a-d0bb89e948ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kaswara/" + google-query: inurl:"/wp-content/plugins/kaswara/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kaswara,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kaswara/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kaswara" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kattene-668f9a8a460ad561a2838627b58d495b.yaml b/nuclei-templates/cve-less/plugins/kattene-668f9a8a460ad561a2838627b58d495b.yaml new file mode 100644 index 0000000000..eec845b1b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kattene-668f9a8a460ad561a2838627b58d495b.yaml @@ -0,0 +1,58 @@ +id: kattene-668f9a8a460ad561a2838627b58d495b + +info: + name: > + Kattene <= 1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/beb0eade-405b-429b-b7a5-0f9c09f8374e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kattene/" + google-query: inurl:"/wp-content/plugins/kattene/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kattene,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kattene/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kattene" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-8b4d0763701a7017afeea137760172c9.yaml b/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-8b4d0763701a7017afeea137760172c9.yaml new file mode 100644 index 0000000000..b13db3a4a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-8b4d0763701a7017afeea137760172c9.yaml @@ -0,0 +1,58 @@ +id: kau-boys-backend-localization-8b4d0763701a7017afeea137760172c9 + +info: + name: > + Backend Localization <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49c6e8bb-4470-4602-a884-ac61c4e64976?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kau-boys-backend-localization/" + google-query: inurl:"/wp-content/plugins/kau-boys-backend-localization/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kau-boys-backend-localization,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kau-boys-backend-localization/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kau-boys-backend-localization" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-9bc7114a41ccdec53120552ca052ffb2.yaml b/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-9bc7114a41ccdec53120552ca052ffb2.yaml new file mode 100644 index 0000000000..e156b3cfda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-9bc7114a41ccdec53120552ca052ffb2.yaml @@ -0,0 +1,58 @@ +id: kau-boys-backend-localization-9bc7114a41ccdec53120552ca052ffb2 + +info: + name: > + Backend Localization <= 2.1.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad0bd82d-db0e-440e-9cea-d3843525b0f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kau-boys-backend-localization/" + google-query: inurl:"/wp-content/plugins/kau-boys-backend-localization/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kau-boys-backend-localization,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kau-boys-backend-localization/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kau-boys-backend-localization" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-b58adfbc2afe32d767ef8aee301802e9.yaml b/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-b58adfbc2afe32d767ef8aee301802e9.yaml new file mode 100644 index 0000000000..1b16a075a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kau-boys-backend-localization-b58adfbc2afe32d767ef8aee301802e9.yaml @@ -0,0 +1,58 @@ +id: kau-boys-backend-localization-b58adfbc2afe32d767ef8aee301802e9 + +info: + name: > + Backend Localization <= 1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80fb6ac9-29af-4a11-ad2f-52cc1bfda6b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kau-boys-backend-localization/" + google-query: inurl:"/wp-content/plugins/kau-boys-backend-localization/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kau-boys-backend-localization,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kau-boys-backend-localization/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kau-boys-backend-localization" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kaya-qr-code-generator-3b8474b2759e8c9d48abfea5292a608c.yaml b/nuclei-templates/cve-less/plugins/kaya-qr-code-generator-3b8474b2759e8c9d48abfea5292a608c.yaml new file mode 100644 index 0000000000..7405215165 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kaya-qr-code-generator-3b8474b2759e8c9d48abfea5292a608c.yaml @@ -0,0 +1,58 @@ +id: kaya-qr-code-generator-3b8474b2759e8c9d48abfea5292a608c + +info: + name: > + Kaya QR Code Generator <= 1.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via qrCode attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4f0bb58-d904-4bf4-9e15-4ee6289c2df4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kaya-qr-code-generator/" + google-query: inurl:"/wp-content/plugins/kaya-qr-code-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kaya-qr-code-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kaya-qr-code-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kaya-qr-code-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kaya-qr-code-generator-da0185c8881b7837eb3ff9bef5017584.yaml b/nuclei-templates/cve-less/plugins/kaya-qr-code-generator-da0185c8881b7837eb3ff9bef5017584.yaml new file mode 100644 index 0000000000..fe17be2f4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kaya-qr-code-generator-da0185c8881b7837eb3ff9bef5017584.yaml @@ -0,0 +1,58 @@ +id: kaya-qr-code-generator-da0185c8881b7837eb3ff9bef5017584 + +info: + name: > + Kaya QR Code Generator <= 1.5.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via url parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad8b5fd2-ba92-4afa-9b4a-a95936b9a18d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kaya-qr-code-generator/" + google-query: inurl:"/wp-content/plugins/kaya-qr-code-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kaya-qr-code-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kaya-qr-code-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kaya-qr-code-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kb-support-11a5b3d7c20edce1773adda5ec308996.yaml b/nuclei-templates/cve-less/plugins/kb-support-11a5b3d7c20edce1773adda5ec308996.yaml new file mode 100644 index 0000000000..ac11173cc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kb-support-11a5b3d7c20edce1773adda5ec308996.yaml @@ -0,0 +1,58 @@ +id: kb-support-11a5b3d7c20edce1773adda5ec308996 + +info: + name: > + KB Support <= 1.5.84 - Authenticated (Subscriber+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7be9241-26b6-4dd0-bd26-fdff59da3b76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kb-support/" + google-query: inurl:"/wp-content/plugins/kb-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kb-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kb-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kb-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.84') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kb-support-46afaecae6249c4e331df87e2126a4cd.yaml b/nuclei-templates/cve-less/plugins/kb-support-46afaecae6249c4e331df87e2126a4cd.yaml new file mode 100644 index 0000000000..3943aa98ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kb-support-46afaecae6249c4e331df87e2126a4cd.yaml @@ -0,0 +1,58 @@ +id: kb-support-46afaecae6249c4e331df87e2126a4cd + +info: + name: > + KB Support <= 1.5.88 - Missing Authorization to Authenticated (Subscriber+) User Data Retrieval + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55bb3620-c182-46c4-bc22-8526cf410cdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kb-support/" + google-query: inurl:"/wp-content/plugins/kb-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kb-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kb-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kb-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.89') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kb-support-7229f0a7ed96aafb75936c9e304ee19f.yaml b/nuclei-templates/cve-less/plugins/kb-support-7229f0a7ed96aafb75936c9e304ee19f.yaml new file mode 100644 index 0000000000..fa5f7df86c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kb-support-7229f0a7ed96aafb75936c9e304ee19f.yaml @@ -0,0 +1,58 @@ +id: kb-support-7229f0a7ed96aafb75936c9e304ee19f + +info: + name: > + KB Support <= 1.6.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9148268a-1179-4bc5-b388-309cf08510d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kb-support/" + google-query: inurl:"/wp-content/plugins/kb-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kb-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kb-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kb-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kb-support-d5de86927ffadedc80433179f0132f85.yaml b/nuclei-templates/cve-less/plugins/kb-support-d5de86927ffadedc80433179f0132f85.yaml new file mode 100644 index 0000000000..ea1437a243 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kb-support-d5de86927ffadedc80433179f0132f85.yaml @@ -0,0 +1,58 @@ +id: kb-support-d5de86927ffadedc80433179f0132f85 + +info: + name: > + KB Support <= 1.5.88 - Missing Authorization to Sensitive Data Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b24fe1d-1b21-4f8f-b66e-6df3bfc0e180?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kb-support/" + google-query: inurl:"/wp-content/plugins/kb-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kb-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kb-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kb-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.88') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kb-support-d8468ce3a3b28bab55fbd9d9d45afc3e.yaml b/nuclei-templates/cve-less/plugins/kb-support-d8468ce3a3b28bab55fbd9d9d45afc3e.yaml new file mode 100644 index 0000000000..7070ebda00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kb-support-d8468ce3a3b28bab55fbd9d9d45afc3e.yaml @@ -0,0 +1,58 @@ +id: kb-support-d8468ce3a3b28bab55fbd9d9d45afc3e + +info: + name: > + KB Support – WordPress Help Desk <= 1.5.5 - Multiple Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3aeb5e01-0993-4628-8165-b27470332e34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kb-support/" + google-query: inurl:"/wp-content/plugins/kb-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kb-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kb-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kb-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kbslider-789529615bb2d4eb38b1e7ff92e021be.yaml b/nuclei-templates/cve-less/plugins/kbslider-789529615bb2d4eb38b1e7ff92e021be.yaml new file mode 100644 index 0000000000..b0c2238452 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kbslider-789529615bb2d4eb38b1e7ff92e021be.yaml @@ -0,0 +1,58 @@ +id: kbslider-789529615bb2d4eb38b1e7ff92e021be + +info: + name: > + KenBurner Slider (All Versions) - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/416ab7d5-9f3b-4ccc-9a0f-bfe5d38b6f97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kbslider/" + google-query: inurl:"/wp-content/plugins/kbslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kbslider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kbslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kbslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kd-coming-soon-0ab200e48d96a6ca5d84cfe7a3d18007.yaml b/nuclei-templates/cve-less/plugins/kd-coming-soon-0ab200e48d96a6ca5d84cfe7a3d18007.yaml new file mode 100644 index 0000000000..18a58ca1d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kd-coming-soon-0ab200e48d96a6ca5d84cfe7a3d18007.yaml @@ -0,0 +1,58 @@ +id: kd-coming-soon-0ab200e48d96a6ca5d84cfe7a3d18007 + +info: + name: > + KD Coming Soon <= 1.7 - Unauthenticated PHP Object Injection via cetitle + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f831d48-733a-4e79-8559-92b03b8d0356?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kd-coming-soon/" + google-query: inurl:"/wp-content/plugins/kd-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kd-coming-soon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kd-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kd-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kebo-twitter-feed-71dea3214223a1d20c30d59ccb66600b.yaml b/nuclei-templates/cve-less/plugins/kebo-twitter-feed-71dea3214223a1d20c30d59ccb66600b.yaml new file mode 100644 index 0000000000..da98fe2116 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kebo-twitter-feed-71dea3214223a1d20c30d59ccb66600b.yaml @@ -0,0 +1,58 @@ +id: kebo-twitter-feed-71dea3214223a1d20c30d59ccb66600b + +info: + name: > + Kebo Twitter Feed <= 1.5.12 - Cross-Site Request Forgery via kebo_twitter_menu_render + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d56aaa20-f40c-4f99-bc38-0b14fa39a175?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kebo-twitter-feed/" + google-query: inurl:"/wp-content/plugins/kebo-twitter-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kebo-twitter-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kebo-twitter-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kebo-twitter-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/keep-backup-daily-097c0f138517316fbd3374861a3ee8f4.yaml b/nuclei-templates/cve-less/plugins/keep-backup-daily-097c0f138517316fbd3374861a3ee8f4.yaml new file mode 100644 index 0000000000..a9e16671d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/keep-backup-daily-097c0f138517316fbd3374861a3ee8f4.yaml @@ -0,0 +1,58 @@ +id: keep-backup-daily-097c0f138517316fbd3374861a3ee8f4 + +info: + name: > + Keep Backup Daily <= 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/741ad2f5-d5cf-44bc-ac4a-7894df77a3d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/keep-backup-daily/" + google-query: inurl:"/wp-content/plugins/keep-backup-daily/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,keep-backup-daily,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/keep-backup-daily/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "keep-backup-daily" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/keep-backup-daily-dc6a4a649580730eac384e9fcfdcdd18.yaml b/nuclei-templates/cve-less/plugins/keep-backup-daily-dc6a4a649580730eac384e9fcfdcdd18.yaml new file mode 100644 index 0000000000..a67f92295b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/keep-backup-daily-dc6a4a649580730eac384e9fcfdcdd18.yaml @@ -0,0 +1,58 @@ +id: keep-backup-daily-dc6a4a649580730eac384e9fcfdcdd18 + +info: + name: > + Keep Backup Daily <= 2.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8693a8b1-15e1-4c9c-90fb-51fcaf5ff451?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/keep-backup-daily/" + google-query: inurl:"/wp-content/plugins/keep-backup-daily/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,keep-backup-daily,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/keep-backup-daily/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "keep-backup-daily" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kenta-blocks-10dff6774b50ae753206c4c8ad748d9b.yaml b/nuclei-templates/cve-less/plugins/kenta-blocks-10dff6774b50ae753206c4c8ad748d9b.yaml new file mode 100644 index 0000000000..dc1c82af39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kenta-blocks-10dff6774b50ae753206c4c8ad748d9b.yaml @@ -0,0 +1,58 @@ +id: kenta-blocks-10dff6774b50ae753206c4c8ad748d9b + +info: + name: > + Kenta Gutenberg Blocks <= 1.0.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80b5ca3d-d651-4c8a-8c64-6938d4a03710?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kenta-blocks/" + google-query: inurl:"/wp-content/plugins/kenta-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kenta-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kenta-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kenta-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kento-post-view-counter-3b3fa6e8d4f04ec12c101c522cbd4e95.yaml b/nuclei-templates/cve-less/plugins/kento-post-view-counter-3b3fa6e8d4f04ec12c101c522cbd4e95.yaml new file mode 100644 index 0000000000..9c9352da7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kento-post-view-counter-3b3fa6e8d4f04ec12c101c522cbd4e95.yaml @@ -0,0 +1,58 @@ +id: kento-post-view-counter-3b3fa6e8d4f04ec12c101c522cbd4e95 + +info: + name: > + Kento Post View Counter <= 2.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/525b466d-137a-467b-8b49-e51393a73866?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kento-post-view-counter/" + google-query: inurl:"/wp-content/plugins/kento-post-view-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kento-post-view-counter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kento-post-view-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kento-post-view-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kento-post-view-counter-4f2a3c77ca82525aff6c0c722c03bbb8.yaml b/nuclei-templates/cve-less/plugins/kento-post-view-counter-4f2a3c77ca82525aff6c0c722c03bbb8.yaml new file mode 100644 index 0000000000..66e528e123 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kento-post-view-counter-4f2a3c77ca82525aff6c0c722c03bbb8.yaml @@ -0,0 +1,58 @@ +id: kento-post-view-counter-4f2a3c77ca82525aff6c0c722c03bbb8 + +info: + name: > + Kento Post View Counter <= 2.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f340cfe-0829-444a-a67d-867ac8650b21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kento-post-view-counter/" + google-query: inurl:"/wp-content/plugins/kento-post-view-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kento-post-view-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kento-post-view-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kento-post-view-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kento-post-view-counter-cd6793bdae8ddbc15fc2277d7e7c8776.yaml b/nuclei-templates/cve-less/plugins/kento-post-view-counter-cd6793bdae8ddbc15fc2277d7e7c8776.yaml new file mode 100644 index 0000000000..ecaa470225 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kento-post-view-counter-cd6793bdae8ddbc15fc2277d7e7c8776.yaml @@ -0,0 +1,58 @@ +id: kento-post-view-counter-cd6793bdae8ddbc15fc2277d7e7c8776 + +info: + name: > + Kento Post View Counter <= 2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8da49fb2-d12a-4d23-9a8a-1b999046573a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kento-post-view-counter/" + google-query: inurl:"/wp-content/plugins/kento-post-view-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kento-post-view-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kento-post-view-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kento-post-view-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kento-post-view-counter-e343250b5d78372d282c8933d6d57ce1.yaml b/nuclei-templates/cve-less/plugins/kento-post-view-counter-e343250b5d78372d282c8933d6d57ce1.yaml new file mode 100644 index 0000000000..ab2d68a292 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kento-post-view-counter-e343250b5d78372d282c8933d6d57ce1.yaml @@ -0,0 +1,58 @@ +id: kento-post-view-counter-e343250b5d78372d282c8933d6d57ce1 + +info: + name: > + Kento Post View Counter <= 2.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0ce3a76-5e16-4772-a802-9e5ce1345f95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kento-post-view-counter/" + google-query: inurl:"/wp-content/plugins/kento-post-view-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kento-post-view-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kento-post-view-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kento-post-view-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ketchup-restaurant-reservations-2edc0eee00be4035effb1c3f6980bcdd.yaml b/nuclei-templates/cve-less/plugins/ketchup-restaurant-reservations-2edc0eee00be4035effb1c3f6980bcdd.yaml new file mode 100644 index 0000000000..8785a03f18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ketchup-restaurant-reservations-2edc0eee00be4035effb1c3f6980bcdd.yaml @@ -0,0 +1,58 @@ +id: ketchup-restaurant-reservations-2edc0eee00be4035effb1c3f6980bcdd + +info: + name: > + Ketchup Restaurant Reservations <= 1.0.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4522102-5997-449e-81fe-446a5dac6e71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ketchup-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/ketchup-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ketchup-restaurant-reservations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ketchup-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ketchup-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ketchup-restaurant-reservations-6f4e1c7a45d9fd969ed178f73339608a.yaml b/nuclei-templates/cve-less/plugins/ketchup-restaurant-reservations-6f4e1c7a45d9fd969ed178f73339608a.yaml new file mode 100644 index 0000000000..9eea1020e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ketchup-restaurant-reservations-6f4e1c7a45d9fd969ed178f73339608a.yaml @@ -0,0 +1,58 @@ +id: ketchup-restaurant-reservations-6f4e1c7a45d9fd969ed178f73339608a + +info: + name: > + Ketchup Restaurant Reservations <= 1.0.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18e562fb-9035-4f2d-a2d3-9a74ff1e4e32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ketchup-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/ketchup-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ketchup-restaurant-reservations,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ketchup-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ketchup-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/keyring-6adbed160e9381bd43ab920e4f4c10a6.yaml b/nuclei-templates/cve-less/plugins/keyring-6adbed160e9381bd43ab920e4f4c10a6.yaml new file mode 100644 index 0000000000..bc794a7c33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/keyring-6adbed160e9381bd43ab920e4f4c10a6.yaml @@ -0,0 +1,58 @@ +id: keyring-6adbed160e9381bd43ab920e4f4c10a6 + +info: + name: > + Keyring < 1.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e60de5d9-34f8-4068-b656-11b2b6cb36d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/keyring/" + google-query: inurl:"/wp-content/plugins/keyring/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,keyring,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/keyring/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "keyring" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/keyword-meta-ff335b153bdda68f2c4ef086e30eeef7.yaml b/nuclei-templates/cve-less/plugins/keyword-meta-ff335b153bdda68f2c4ef086e30eeef7.yaml new file mode 100644 index 0000000000..303fe8812d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/keyword-meta-ff335b153bdda68f2c4ef086e30eeef7.yaml @@ -0,0 +1,58 @@ +id: keyword-meta-ff335b153bdda68f2c4ef086e30eeef7 + +info: + name: > + Keyword Meta <= 3.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e742b21-1097-459c-8c67-46d105e7b6e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/keyword-meta/" + google-query: inurl:"/wp-content/plugins/keyword-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,keyword-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/keyword-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "keyword-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/keyword-strategy-internal-links-6a71a90d9115277ce9fcc31f3c8625f3.yaml b/nuclei-templates/cve-less/plugins/keyword-strategy-internal-links-6a71a90d9115277ce9fcc31f3c8625f3.yaml new file mode 100644 index 0000000000..e29971758b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/keyword-strategy-internal-links-6a71a90d9115277ce9fcc31f3c8625f3.yaml @@ -0,0 +1,58 @@ +id: keyword-strategy-internal-links-6a71a90d9115277ce9fcc31f3c8625f3 + +info: + name: > + Keyword Strategy Internal Links <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d99fe68c-3c0e-4a5a-96c8-de50b7a7e753?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/keyword-strategy-internal-links/" + google-query: inurl:"/wp-content/plugins/keyword-strategy-internal-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,keyword-strategy-internal-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/keyword-strategy-internal-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "keyword-strategy-internal-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kimili-flash-embed-86b662d95dc55b9ca72cce4586bb6bc2.yaml b/nuclei-templates/cve-less/plugins/kimili-flash-embed-86b662d95dc55b9ca72cce4586bb6bc2.yaml new file mode 100644 index 0000000000..8ae7830b55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kimili-flash-embed-86b662d95dc55b9ca72cce4586bb6bc2.yaml @@ -0,0 +1,58 @@ +id: kimili-flash-embed-86b662d95dc55b9ca72cce4586bb6bc2 + +info: + name: > + Kimili Flash Embed <= 2.5.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e6f9f8c-a36b-412d-a2ae-cc90e3a840f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kimili-flash-embed/" + google-query: inurl:"/wp-content/plugins/kimili-flash-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kimili-flash-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kimili-flash-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kimili-flash-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kindeditor-for-wordpress-4a6888e60c570cf313bf30503e9c55b5.yaml b/nuclei-templates/cve-less/plugins/kindeditor-for-wordpress-4a6888e60c570cf313bf30503e9c55b5.yaml new file mode 100644 index 0000000000..4d7f4a3dd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kindeditor-for-wordpress-4a6888e60c570cf313bf30503e9c55b5.yaml @@ -0,0 +1,58 @@ +id: kindeditor-for-wordpress-4a6888e60c570cf313bf30503e9c55b5 + +info: + name: > + Kindeditor For WordPress < 1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5205717-af90-4d55-b812-38ded2b0f700?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kindeditor-for-wordpress/" + google-query: inurl:"/wp-content/plugins/kindeditor-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kindeditor-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kindeditor-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kindeditor-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingcomposer-126c5ad6c5556b65e18e20f26325544a.yaml b/nuclei-templates/cve-less/plugins/kingcomposer-126c5ad6c5556b65e18e20f26325544a.yaml new file mode 100644 index 0000000000..a943541c2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingcomposer-126c5ad6c5556b65e18e20f26325544a.yaml @@ -0,0 +1,58 @@ +id: kingcomposer-126c5ad6c5556b65e18e20f26325544a + +info: + name: > + KingComposer <= 2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12e74e1a-71d0-4447-ac77-62073af5de88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingcomposer/" + google-query: inurl:"/wp-content/plugins/kingcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingcomposer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingcomposer-28f8218d0cd81907d78e413554e9b440.yaml b/nuclei-templates/cve-less/plugins/kingcomposer-28f8218d0cd81907d78e413554e9b440.yaml new file mode 100644 index 0000000000..78d29e1299 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingcomposer-28f8218d0cd81907d78e413554e9b440.yaml @@ -0,0 +1,58 @@ +id: kingcomposer-28f8218d0cd81907d78e413554e9b440 + +info: + name: > + Page Builder: KingComposer < 2.9.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45a62dd0-386c-41b3-b8dd-ced443da9f92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingcomposer/" + google-query: inurl:"/wp-content/plugins/kingcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingcomposer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingcomposer-48b0aa896289cd47d761dfb701222bb0.yaml b/nuclei-templates/cve-less/plugins/kingcomposer-48b0aa896289cd47d761dfb701222bb0.yaml new file mode 100644 index 0000000000..6d00d41f0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingcomposer-48b0aa896289cd47d761dfb701222bb0.yaml @@ -0,0 +1,58 @@ +id: kingcomposer-48b0aa896289cd47d761dfb701222bb0 + +info: + name: > + Page Builder KingComposer <= 2.9.6 - Authenticated Arbitrary Profile Creation and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f96eb21c-7682-47e3-bd3a-37482d1bd37f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingcomposer/" + google-query: inurl:"/wp-content/plugins/kingcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingcomposer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingcomposer-4c2f06746a0f92dd0596f11498bf4bdb.yaml b/nuclei-templates/cve-less/plugins/kingcomposer-4c2f06746a0f92dd0596f11498bf4bdb.yaml new file mode 100644 index 0000000000..bca8d5007e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingcomposer-4c2f06746a0f92dd0596f11498bf4bdb.yaml @@ -0,0 +1,58 @@ +id: kingcomposer-4c2f06746a0f92dd0596f11498bf4bdb + +info: + name: > + Page Builder KingComposer <= 2.9.6 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36abba4d-9a73-4ef2-a910-6030acddd182?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingcomposer/" + google-query: inurl:"/wp-content/plugins/kingcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingcomposer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingcomposer-6fd5ee2a697c02149752bc647f98085f.yaml b/nuclei-templates/cve-less/plugins/kingcomposer-6fd5ee2a697c02149752bc647f98085f.yaml new file mode 100644 index 0000000000..705fb7b34a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingcomposer-6fd5ee2a697c02149752bc647f98085f.yaml @@ -0,0 +1,58 @@ +id: kingcomposer-6fd5ee2a697c02149752bc647f98085f + +info: + name: > + Page Builder: KingComposer < 2.8.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ac57705-24ce-44b5-95d9-972bf58e4cd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingcomposer/" + google-query: inurl:"/wp-content/plugins/kingcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingcomposer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingcomposer-77b708d65934f257c39cc7cecab95cf9.yaml b/nuclei-templates/cve-less/plugins/kingcomposer-77b708d65934f257c39cc7cecab95cf9.yaml new file mode 100644 index 0000000000..16df038558 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingcomposer-77b708d65934f257c39cc7cecab95cf9.yaml @@ -0,0 +1,58 @@ +id: kingcomposer-77b708d65934f257c39cc7cecab95cf9 + +info: + name: > + Page Builder: KingComposer < 2.9.4 - Authorization Bypass due to Improper Access Control + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bdba04e-df4d-4094-877e-611d69e2e25d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingcomposer/" + google-query: inurl:"/wp-content/plugins/kingcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingcomposer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingcomposer-f10892c912aef9cf076885d5c4fde1a7.yaml b/nuclei-templates/cve-less/plugins/kingcomposer-f10892c912aef9cf076885d5c4fde1a7.yaml new file mode 100644 index 0000000000..beb3a25994 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingcomposer-f10892c912aef9cf076885d5c4fde1a7.yaml @@ -0,0 +1,58 @@ +id: kingcomposer-f10892c912aef9cf076885d5c4fde1a7 + +info: + name: > + Page Builder: KingComposer < 2.9.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6447de64-b484-4f64-ad78-7df81b5a0ed7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingcomposer/" + google-query: inurl:"/wp-content/plugins/kingcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingcomposer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingcomposer-fa1461d953e85c77009854b513c7864a.yaml b/nuclei-templates/cve-less/plugins/kingcomposer-fa1461d953e85c77009854b513c7864a.yaml new file mode 100644 index 0000000000..eb804376ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingcomposer-fa1461d953e85c77009854b513c7864a.yaml @@ -0,0 +1,58 @@ +id: kingcomposer-fa1461d953e85c77009854b513c7864a + +info: + name: > + Page Builder: KingComposer – Free Drag and Drop page builder by King-Theme <= 2.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d52cdc45-efea-46b5-9004-f3169e807747?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingcomposer/" + google-query: inurl:"/wp-content/plugins/kingcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingcomposer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kingkong-board-3b5accdca91dd653d9fdbf15959cc447.yaml b/nuclei-templates/cve-less/plugins/kingkong-board-3b5accdca91dd653d9fdbf15959cc447.yaml new file mode 100644 index 0000000000..dab2b8b78e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kingkong-board-3b5accdca91dd653d9fdbf15959cc447.yaml @@ -0,0 +1,58 @@ +id: kingkong-board-3b5accdca91dd653d9fdbf15959cc447 + +info: + name: > + Kingkong Board <= 2.1.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7b33199-d254-4d0c-88d0-ad2f7515d747?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kingkong-board/" + google-query: inurl:"/wp-content/plugins/kingkong-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kingkong-board,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kingkong-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingkong-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kioken-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/kioken-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f8afdb1dbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kioken-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: kioken-blocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kioken-blocks/" + google-query: inurl:"/wp-content/plugins/kioken-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kioken-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kioken-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kioken-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kioskprox-f629f1cbd9fba0b088aac877e4dc575f.yaml b/nuclei-templates/cve-less/plugins/kioskprox-f629f1cbd9fba0b088aac877e4dc575f.yaml new file mode 100644 index 0000000000..43de8d73f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kioskprox-f629f1cbd9fba0b088aac877e4dc575f.yaml @@ -0,0 +1,58 @@ +id: kioskprox-f629f1cbd9fba0b088aac877e4dc575f + +info: + name: > + Kioskprox (Unkown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71bf0ae5-7c32-42ac-a9bc-96cb1269a458?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kioskprox/" + google-query: inurl:"/wp-content/plugins/kioskprox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kioskprox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kioskprox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kioskprox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kish-guest-posting-a7228223462154328da551d1f21d3c16.yaml b/nuclei-templates/cve-less/plugins/kish-guest-posting-a7228223462154328da551d1f21d3c16.yaml new file mode 100644 index 0000000000..91f4757f56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kish-guest-posting-a7228223462154328da551d1f21d3c16.yaml @@ -0,0 +1,58 @@ +id: kish-guest-posting-a7228223462154328da551d1f21d3c16 + +info: + name: > + Kish Guest Posting <= 1.2 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d52983d1-7da4-44e6-bfed-75107b923267?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kish-guest-posting/" + google-query: inurl:"/wp-content/plugins/kish-guest-posting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kish-guest-posting,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kish-guest-posting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kish-guest-posting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kish-guest-posting-ddf19add11c9e3078c959a56598f9a91.yaml b/nuclei-templates/cve-less/plugins/kish-guest-posting-ddf19add11c9e3078c959a56598f9a91.yaml new file mode 100644 index 0000000000..e662f338aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kish-guest-posting-ddf19add11c9e3078c959a56598f9a91.yaml @@ -0,0 +1,58 @@ +id: kish-guest-posting-ddf19add11c9e3078c959a56598f9a91 + +info: + name: > + Kish Guest Posting <= 1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c5092fa-a2ea-4a84-8ebd-273faf6c8707?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kish-guest-posting/" + google-query: inurl:"/wp-content/plugins/kish-guest-posting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kish-guest-posting,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kish-guest-posting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kish-guest-posting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kitestudio-core-41d2d6be7c3a0182cf7393ba0b128c1e.yaml b/nuclei-templates/cve-less/plugins/kitestudio-core-41d2d6be7c3a0182cf7393ba0b128c1e.yaml new file mode 100644 index 0000000000..6895a643e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kitestudio-core-41d2d6be7c3a0182cf7393ba0b128c1e.yaml @@ -0,0 +1,58 @@ +id: kitestudio-core-41d2d6be7c3a0182cf7393ba0b128c1e + +info: + name: > + core plugin for kitestudio themes <= 2.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6003a2a-dda5-4db4-8a0c-0d26d79529f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kitestudio-core/" + google-query: inurl:"/wp-content/plugins/kitestudio-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kitestudio-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kitestudio-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kitestudio-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-3500fb88bb82ba57864ceb27a25df18c.yaml b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-3500fb88bb82ba57864ceb27a25df18c.yaml new file mode 100644 index 0000000000..533e454e97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-3500fb88bb82ba57864ceb27a25df18c.yaml @@ -0,0 +1,58 @@ +id: kivicare-clinic-management-system-3500fb88bb82ba57864ceb27a25df18c + +info: + name: > + KiviCare – Clinic & Patient Management System (EHR) <= 3.2.0 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39404341-8a27-4770-b6a6-d33e899b6bd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kivicare-clinic-management-system/" + google-query: inurl:"/wp-content/plugins/kivicare-clinic-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kivicare-clinic-management-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kivicare-clinic-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kivicare-clinic-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-8784759a4cb7c427ffba0c396b0eda3c.yaml b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-8784759a4cb7c427ffba0c396b0eda3c.yaml new file mode 100644 index 0000000000..3e24d96d6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-8784759a4cb7c427ffba0c396b0eda3c.yaml @@ -0,0 +1,58 @@ +id: kivicare-clinic-management-system-8784759a4cb7c427ffba0c396b0eda3c + +info: + name: > + KiviCare – Clinic & Patient Management System (EHR) <= 3.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4101c35e-5af9-4372-9ed1-fb6a15d8500f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kivicare-clinic-management-system/" + google-query: inurl:"/wp-content/plugins/kivicare-clinic-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kivicare-clinic-management-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kivicare-clinic-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kivicare-clinic-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-a2fe6757edbb25d46fa159201cfedc69.yaml b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-a2fe6757edbb25d46fa159201cfedc69.yaml new file mode 100644 index 0000000000..2150806740 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-a2fe6757edbb25d46fa159201cfedc69.yaml @@ -0,0 +1,58 @@ +id: kivicare-clinic-management-system-a2fe6757edbb25d46fa159201cfedc69 + +info: + name: > + KiviCare – Clinic & Patient Management System (EHR) <= 2.3.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7a97aeb-f34c-4997-864b-132bb5ed28e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kivicare-clinic-management-system/" + google-query: inurl:"/wp-content/plugins/kivicare-clinic-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kivicare-clinic-management-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kivicare-clinic-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kivicare-clinic-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-e448c9e4b5c0c1a44cb7637de9906bfd.yaml b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-e448c9e4b5c0c1a44cb7637de9906bfd.yaml new file mode 100644 index 0000000000..07cebf57e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-e448c9e4b5c0c1a44cb7637de9906bfd.yaml @@ -0,0 +1,58 @@ +id: kivicare-clinic-management-system-e448c9e4b5c0c1a44cb7637de9906bfd + +info: + name: > + KiviCare – Clinic & Patient Management System (EHR) <= 3.2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88898997-6199-4b33-bd35-70a1a01812ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kivicare-clinic-management-system/" + google-query: inurl:"/wp-content/plugins/kivicare-clinic-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kivicare-clinic-management-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kivicare-clinic-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kivicare-clinic-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-e6681bfff3cc4dc42aaabe81eb223699.yaml b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-e6681bfff3cc4dc42aaabe81eb223699.yaml new file mode 100644 index 0000000000..b095b00f44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kivicare-clinic-management-system-e6681bfff3cc4dc42aaabe81eb223699.yaml @@ -0,0 +1,58 @@ +id: kivicare-clinic-management-system-e6681bfff3cc4dc42aaabe81eb223699 + +info: + name: > + KiviCare <= 3.2.0 - Reflected Cross-Site Scripting via 'filterType' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0c57743-9fdd-4fc0-9a27-787834b64846?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kivicare-clinic-management-system/" + google-query: inurl:"/wp-content/plugins/kivicare-clinic-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kivicare-clinic-management-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kivicare-clinic-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kivicare-clinic-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kiwi-logo-carousel-10df21fe953fcd7c84f02b55e2e8260b.yaml b/nuclei-templates/cve-less/plugins/kiwi-logo-carousel-10df21fe953fcd7c84f02b55e2e8260b.yaml new file mode 100644 index 0000000000..ca2b234f44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kiwi-logo-carousel-10df21fe953fcd7c84f02b55e2e8260b.yaml @@ -0,0 +1,58 @@ +id: kiwi-logo-carousel-10df21fe953fcd7c84f02b55e2e8260b + +info: + name: > + Logo Carousel < 1.7.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81b49050-84e4-4fb4-b8ed-baf21c8bb5a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kiwi-logo-carousel/" + google-query: inurl:"/wp-content/plugins/kiwi-logo-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kiwi-logo-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kiwi-logo-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kiwi-logo-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kiwi-social-share-cf67d2bf93130a2d772a74f509dde212.yaml b/nuclei-templates/cve-less/plugins/kiwi-social-share-cf67d2bf93130a2d772a74f509dde212.yaml new file mode 100644 index 0000000000..fa9aa5a001 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kiwi-social-share-cf67d2bf93130a2d772a74f509dde212.yaml @@ -0,0 +1,58 @@ +id: kiwi-social-share-cf67d2bf93130a2d772a74f509dde212 + +info: + name: > + Kiwi Social Sharing 2.1.0 - 2.1.2 - Arbitrary Options Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8148b6d0-190a-4b97-8af7-edd6943116d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kiwi-social-share/" + google-query: inurl:"/wp-content/plugins/kiwi-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kiwi-social-share,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kiwi-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kiwi-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.1.0', '<= 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kiwi-social-share-d64effb97bd4d31b42274790386bfdcb.yaml b/nuclei-templates/cve-less/plugins/kiwi-social-share-d64effb97bd4d31b42274790386bfdcb.yaml new file mode 100644 index 0000000000..f3f62587db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kiwi-social-share-d64effb97bd4d31b42274790386bfdcb.yaml @@ -0,0 +1,58 @@ +id: kiwi-social-share-d64effb97bd4d31b42274790386bfdcb + +info: + name: > + Kiwi Social Share <= 2.0.10 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f47a01d-b259-465e-bec1-9079987dc5a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kiwi-social-share/" + google-query: inurl:"/wp-content/plugins/kiwi-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kiwi-social-share,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kiwi-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kiwi-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kjm-admin-notices-c6a3bc41ee8a2ee4ea6023cb51c1bb30.yaml b/nuclei-templates/cve-less/plugins/kjm-admin-notices-c6a3bc41ee8a2ee4ea6023cb51c1bb30.yaml new file mode 100644 index 0000000000..24964ff212 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kjm-admin-notices-c6a3bc41ee8a2ee4ea6023cb51c1bb30.yaml @@ -0,0 +1,58 @@ +id: kjm-admin-notices-c6a3bc41ee8a2ee4ea6023cb51c1bb30 + +info: + name: > + KJM Admin Notices <= 2.0.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd3298dd-af80-481e-8d20-d33e7bb9bb85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kjm-admin-notices/" + google-query: inurl:"/wp-content/plugins/kjm-admin-notices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kjm-admin-notices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kjm-admin-notices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kjm-admin-notices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kk-star-ratings-31e1dd2369472619e89b67df12c89fa8.yaml b/nuclei-templates/cve-less/plugins/kk-star-ratings-31e1dd2369472619e89b67df12c89fa8.yaml new file mode 100644 index 0000000000..808f2a03a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kk-star-ratings-31e1dd2369472619e89b67df12c89fa8.yaml @@ -0,0 +1,58 @@ +id: kk-star-ratings-31e1dd2369472619e89b67df12c89fa8 + +info: + name: > + kk Star Ratings <= 5.4.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1af442f7-b57c-47bd-9733-5e6bb5c89443?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kk-star-ratings/" + google-query: inurl:"/wp-content/plugins/kk-star-ratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kk-star-ratings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kk-star-ratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kk-star-ratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kk-star-ratings-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/kk-star-ratings-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b2fe11ed2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kk-star-ratings-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: kk-star-ratings-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kk-star-ratings/" + google-query: inurl:"/wp-content/plugins/kk-star-ratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kk-star-ratings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kk-star-ratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kk-star-ratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kk-star-ratings-d3315d27c075491e0975254e6c7dfe78.yaml b/nuclei-templates/cve-less/plugins/kk-star-ratings-d3315d27c075491e0975254e6c7dfe78.yaml new file mode 100644 index 0000000000..3755f6dfbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kk-star-ratings-d3315d27c075491e0975254e6c7dfe78.yaml @@ -0,0 +1,58 @@ +id: kk-star-ratings-d3315d27c075491e0975254e6c7dfe78 + +info: + name: > + kk Star Ratings <= 5.4.3 - IP Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c4fcaa5-357a-4b70-8653-3874a234f07d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kk-star-ratings/" + google-query: inurl:"/wp-content/plugins/kk-star-ratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kk-star-ratings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kk-star-ratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kk-star-ratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kk-star-ratings-e20377f8d33eee03a0841308e7bb35f3.yaml b/nuclei-templates/cve-less/plugins/kk-star-ratings-e20377f8d33eee03a0841308e7bb35f3.yaml new file mode 100644 index 0000000000..800a0132f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kk-star-ratings-e20377f8d33eee03a0841308e7bb35f3.yaml @@ -0,0 +1,58 @@ +id: kk-star-ratings-e20377f8d33eee03a0841308e7bb35f3 + +info: + name: > + kk Star Ratings <= 5.4.5 - Race Condition to Multiple User Voting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/003694f8-23be-4c94-899d-76b9b8488202?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kk-star-ratings/" + google-query: inurl:"/wp-content/plugins/kk-star-ratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kk-star-ratings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kk-star-ratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kk-star-ratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/klarna-checkout-for-woocommerce-98a2172528b0fc22d4acb08039e5358a.yaml b/nuclei-templates/cve-less/plugins/klarna-checkout-for-woocommerce-98a2172528b0fc22d4acb08039e5358a.yaml new file mode 100644 index 0000000000..386cbf740d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/klarna-checkout-for-woocommerce-98a2172528b0fc22d4acb08039e5358a.yaml @@ -0,0 +1,58 @@ +id: klarna-checkout-for-woocommerce-98a2172528b0fc22d4acb08039e5358a + +info: + name: > + Klarna Checkout for WooCommerce <= 2.0.9 - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/819e2a4a-d282-4c52-852a-e3a2051a04e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/klarna-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/klarna-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,klarna-checkout-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/klarna-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "klarna-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/klarna-payments-for-woocommerce-db671eee30eadb2b3e6d738cfc02d4cf.yaml b/nuclei-templates/cve-less/plugins/klarna-payments-for-woocommerce-db671eee30eadb2b3e6d738cfc02d4cf.yaml new file mode 100644 index 0000000000..9de57448ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/klarna-payments-for-woocommerce-db671eee30eadb2b3e6d738cfc02d4cf.yaml @@ -0,0 +1,58 @@ +id: klarna-payments-for-woocommerce-db671eee30eadb2b3e6d738cfc02d4cf + +info: + name: > + Klarna Payments for WooCommerce <= 3.2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4677042d-ff0a-4340-ada7-c82d2da0c01c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/klarna-payments-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/klarna-payments-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,klarna-payments-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/klarna-payments-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "klarna-payments-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/klaviyo-e9d4c2285e81f24a0ebb73201d5c6506.yaml b/nuclei-templates/cve-less/plugins/klaviyo-e9d4c2285e81f24a0ebb73201d5c6506.yaml new file mode 100644 index 0000000000..472964f5f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/klaviyo-e9d4c2285e81f24a0ebb73201d5c6506.yaml @@ -0,0 +1,58 @@ +id: klaviyo-e9d4c2285e81f24a0ebb73201d5c6506 + +info: + name: > + Klaviyo <= 3.0.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b66f27-e4d2-4f6e-be96-b7f967a30885?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/klaviyo/" + google-query: inurl:"/wp-content/plugins/klaviyo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,klaviyo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/klaviyo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "klaviyo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/klaviyo-f10af2927781e57c830660efc5735cb4.yaml b/nuclei-templates/cve-less/plugins/klaviyo-f10af2927781e57c830660efc5735cb4.yaml new file mode 100644 index 0000000000..ae1bdb5c84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/klaviyo-f10af2927781e57c830660efc5735cb4.yaml @@ -0,0 +1,58 @@ +id: klaviyo-f10af2927781e57c830660efc5735cb4 + +info: + name: > + Klaviyo <= 3.0.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/294de862-716c-4e17-a1cf-cade53207013?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/klaviyo/" + google-query: inurl:"/wp-content/plugins/klaviyo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,klaviyo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/klaviyo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "klaviyo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kn-fix-your-fe19c96913ad86b413d30430f8f6dd54.yaml b/nuclei-templates/cve-less/plugins/kn-fix-your-fe19c96913ad86b413d30430f8f6dd54.yaml new file mode 100644 index 0000000000..cbcf6b61d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kn-fix-your-fe19c96913ad86b413d30430f8f6dd54.yaml @@ -0,0 +1,58 @@ +id: kn-fix-your-fe19c96913ad86b413d30430f8f6dd54 + +info: + name: > + KN Fix Your Title <= 1.0.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d9fb74d-58fd-4881-970d-86944c8784c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kn-fix-your/" + google-query: inurl:"/wp-content/plugins/kn-fix-your/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kn-fix-your,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kn-fix-your/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kn-fix-your" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knews-a3153e139f0a73014bc8d2b3f8f23688.yaml b/nuclei-templates/cve-less/plugins/knews-a3153e139f0a73014bc8d2b3f8f23688.yaml new file mode 100644 index 0000000000..def5835706 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knews-a3153e139f0a73014bc8d2b3f8f23688.yaml @@ -0,0 +1,58 @@ +id: knews-a3153e139f0a73014bc8d2b3f8f23688 + +info: + name: > + Knews Multilingual Newsletters Plugin <= 1.7.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4994d7d-82f7-4cb0-869f-e27abe04b621?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knews/" + google-query: inurl:"/wp-content/plugins/knews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knews,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knews-ab596007425584b1e79f9f5a75499083.yaml b/nuclei-templates/cve-less/plugins/knews-ab596007425584b1e79f9f5a75499083.yaml new file mode 100644 index 0000000000..b612c5d1df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knews-ab596007425584b1e79f9f5a75499083.yaml @@ -0,0 +1,58 @@ +id: knews-ab596007425584b1e79f9f5a75499083 + +info: + name: > + Knews Multilingual Newsletters < 1.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f52d5c44-4a5e-4a45-b622-66aa4e509fd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knews/" + google-query: inurl:"/wp-content/plugins/knews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knews-bd4bb9d035972f9b926d372efd2d0c6a.yaml b/nuclei-templates/cve-less/plugins/knews-bd4bb9d035972f9b926d372efd2d0c6a.yaml new file mode 100644 index 0000000000..ac2c59625d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knews-bd4bb9d035972f9b926d372efd2d0c6a.yaml @@ -0,0 +1,58 @@ +id: knews-bd4bb9d035972f9b926d372efd2d0c6a + +info: + name: > + Knews Multilingual Newsletters <= 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a60bb585-3c71-4381-8ba7-28ee63abdb14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knews/" + google-query: inurl:"/wp-content/plugins/knews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-3c3beb51159fce431f6c1df59690d1f4.yaml b/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-3c3beb51159fce431f6c1df59690d1f4.yaml new file mode 100644 index 0000000000..8aebd1a4df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-3c3beb51159fce431f6c1df59690d1f4.yaml @@ -0,0 +1,58 @@ +id: knight-lab-timelinejs-3c3beb51159fce431f6c1df59690d1f4 + +info: + name: > + TimelineJS3 < 3.7.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf4e3fc3-b9f4-4ae5-ad48-2f764879360a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knight-lab-timelinejs/" + google-query: inurl:"/wp-content/plugins/knight-lab-timelinejs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knight-lab-timelinejs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knight-lab-timelinejs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knight-lab-timelinejs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-aa7769527923a5d7ef3aff0dbf4c6e9e.yaml b/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-aa7769527923a5d7ef3aff0dbf4c6e9e.yaml new file mode 100644 index 0000000000..b935347c47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-aa7769527923a5d7ef3aff0dbf4c6e9e.yaml @@ -0,0 +1,58 @@ +id: knight-lab-timelinejs-aa7769527923a5d7ef3aff0dbf4c6e9e + +info: + name: > + Knight Lab Timeline <= 3.9.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/758beea4-809c-4837-839d-76ee982d0ae5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knight-lab-timelinejs/" + google-query: inurl:"/wp-content/plugins/knight-lab-timelinejs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knight-lab-timelinejs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knight-lab-timelinejs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knight-lab-timelinejs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-f1c3c3df1834bde215592ceeafa99ec0.yaml b/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-f1c3c3df1834bde215592ceeafa99ec0.yaml new file mode 100644 index 0000000000..3bff995691 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knight-lab-timelinejs-f1c3c3df1834bde215592ceeafa99ec0.yaml @@ -0,0 +1,58 @@ +id: knight-lab-timelinejs-f1c3c3df1834bde215592ceeafa99ec0 + +info: + name: > + Knight Lab Timeline <= 3.9.3.3 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afb3e68e-6f79-4c46-b41e-8fd6eb43c755?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knight-lab-timelinejs/" + google-query: inurl:"/wp-content/plugins/knight-lab-timelinejs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knight-lab-timelinejs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knight-lab-timelinejs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knight-lab-timelinejs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knowledge-center-154e2db41f3251206c18f35c16e169dc.yaml b/nuclei-templates/cve-less/plugins/knowledge-center-154e2db41f3251206c18f35c16e169dc.yaml new file mode 100644 index 0000000000..6762ac3111 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knowledge-center-154e2db41f3251206c18f35c16e169dc.yaml @@ -0,0 +1,58 @@ +id: knowledge-center-154e2db41f3251206c18f35c16e169dc + +info: + name: > + Knowledge Center <= 2.7 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6309c706-f84a-4997-9a9b-1bd8cf8f711a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knowledge-center/" + google-query: inurl:"/wp-content/plugins/knowledge-center/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knowledge-center,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knowledge-center/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knowledge-center" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knowledgebase-41532dfb555f5a1e79f8f55e8febf84a.yaml b/nuclei-templates/cve-less/plugins/knowledgebase-41532dfb555f5a1e79f8f55e8febf84a.yaml new file mode 100644 index 0000000000..05ee5b43fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knowledgebase-41532dfb555f5a1e79f8f55e8febf84a.yaml @@ -0,0 +1,58 @@ +id: knowledgebase-41532dfb555f5a1e79f8f55e8febf84a + +info: + name: > + Knowledge Base <= 2.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/997b028c-8131-4579-8157-caecf099d7ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knowledgebase/" + google-query: inurl:"/wp-content/plugins/knowledgebase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knowledgebase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knowledgebase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knowledgebase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/knr-author-list-widget-ecd636facda8cd64296dd86dcfe53843.yaml b/nuclei-templates/cve-less/plugins/knr-author-list-widget-ecd636facda8cd64296dd86dcfe53843.yaml new file mode 100644 index 0000000000..d4a60d83a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/knr-author-list-widget-ecd636facda8cd64296dd86dcfe53843.yaml @@ -0,0 +1,58 @@ +id: knr-author-list-widget-ecd636facda8cd64296dd86dcfe53843 + +info: + name: > + Axact Author List Widget < 3.0.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c317fe6a-b691-40bb-a646-a06a8337da31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/knr-author-list-widget/" + google-query: inurl:"/wp-content/plugins/knr-author-list-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,knr-author-list-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/knr-author-list-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "knr-author-list-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ko-fi-button-b309eae3300d9042c3f3d6f98d0437a7.yaml b/nuclei-templates/cve-less/plugins/ko-fi-button-b309eae3300d9042c3f3d6f98d0437a7.yaml new file mode 100644 index 0000000000..a37f65dc20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ko-fi-button-b309eae3300d9042c3f3d6f98d0437a7.yaml @@ -0,0 +1,58 @@ +id: ko-fi-button-b309eae3300d9042c3f3d6f98d0437a7 + +info: + name: > + Ko-fi Button <= 1.3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa13426a-2d4e-4268-bc0d-e496bc9e6f33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ko-fi-button/" + google-query: inurl:"/wp-content/plugins/ko-fi-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ko-fi-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ko-fi-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ko-fi-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kodex-posts-likes-3a81ae3c463ea49e154447e90b9b17fa.yaml b/nuclei-templates/cve-less/plugins/kodex-posts-likes-3a81ae3c463ea49e154447e90b9b17fa.yaml new file mode 100644 index 0000000000..8652ead1a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kodex-posts-likes-3a81ae3c463ea49e154447e90b9b17fa.yaml @@ -0,0 +1,58 @@ +id: kodex-posts-likes-3a81ae3c463ea49e154447e90b9b17fa + +info: + name: > + Kodex Posts likes <= 2.4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77d56f61-7e45-405e-878d-fa3d53acede0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kodex-posts-likes/" + google-query: inurl:"/wp-content/plugins/kodex-posts-likes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kodex-posts-likes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kodex-posts-likes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kodex-posts-likes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kodo-qiniu-16382904fc41ea3ab6b4c2791fc01fb4.yaml b/nuclei-templates/cve-less/plugins/kodo-qiniu-16382904fc41ea3ab6b4c2791fc01fb4.yaml new file mode 100644 index 0000000000..086cc791f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kodo-qiniu-16382904fc41ea3ab6b4c2791fc01fb4.yaml @@ -0,0 +1,58 @@ +id: kodo-qiniu-16382904fc41ea3ab6b4c2791fc01fb4 + +info: + name: > + KODO Qiniu <= 1.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85e17f3a-cec1-41de-b3e2-ac06a9c9290f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kodo-qiniu/" + google-query: inurl:"/wp-content/plugins/kodo-qiniu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kodo-qiniu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kodo-qiniu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kodo-qiniu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/konnichiwa-5e9157054c225e3f87bee05e68d2bb85.yaml b/nuclei-templates/cve-less/plugins/konnichiwa-5e9157054c225e3f87bee05e68d2bb85.yaml new file mode 100644 index 0000000000..fe4af87501 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/konnichiwa-5e9157054c225e3f87bee05e68d2bb85.yaml @@ -0,0 +1,58 @@ +id: konnichiwa-5e9157054c225e3f87bee05e68d2bb85 + +info: + name: > + Konnichiwa! Membership <= 0.8.3 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4252da8a-26c7-41a4-944b-cb41dafa8884?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/konnichiwa/" + google-query: inurl:"/wp-content/plugins/konnichiwa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,konnichiwa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/konnichiwa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "konnichiwa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kontxt-semantic-engine-23b35e5f653977b412c0dc708b752a30.yaml b/nuclei-templates/cve-less/plugins/kontxt-semantic-engine-23b35e5f653977b412c0dc708b752a30.yaml new file mode 100644 index 0000000000..f5c9a9056d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kontxt-semantic-engine-23b35e5f653977b412c0dc708b752a30.yaml @@ -0,0 +1,58 @@ +id: kontxt-semantic-engine-23b35e5f653977b412c0dc708b752a30 + +info: + name: > + KONTXT Improves WordPress Search <= 1.4.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99e64e62-d09e-4b94-a982-12630fd2e946?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kontxt-semantic-engine/" + google-query: inurl:"/wp-content/plugins/kontxt-semantic-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kontxt-semantic-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kontxt-semantic-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kontxt-semantic-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kopatheme-219182470bf96c81d2700e98935234cf.yaml b/nuclei-templates/cve-less/plugins/kopatheme-219182470bf96c81d2700e98935234cf.yaml new file mode 100644 index 0000000000..859d3ef8f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kopatheme-219182470bf96c81d2700e98935234cf.yaml @@ -0,0 +1,58 @@ +id: kopatheme-219182470bf96c81d2700e98935234cf + +info: + name: > + Kopa Framework <= 1.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa16ab9f-4fb1-43de-bfbb-bd6caf6a68dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kopatheme/" + google-query: inurl:"/wp-content/plugins/kopatheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kopatheme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kopatheme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kopatheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/korea-sns-eccc639fdf835f594ca670b3e9f9f323.yaml b/nuclei-templates/cve-less/plugins/korea-sns-eccc639fdf835f594ca670b3e9f9f323.yaml new file mode 100644 index 0000000000..84e5f3571b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/korea-sns-eccc639fdf835f594ca670b3e9f9f323.yaml @@ -0,0 +1,58 @@ +id: korea-sns-eccc639fdf835f594ca670b3e9f9f323 + +info: + name: > + Korea SNS <= 1.6.4 - Cross-Site Request Forgery via kon_tergos_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51d07d2a-74e6-499e-8d66-90893faedeaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/korea-sns/" + google-query: inurl:"/wp-content/plugins/korea-sns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,korea-sns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/korea-sns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "korea-sns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kp-fastest-tawk-to-chat-44b3ba415f16865ebb1bd98068348f19.yaml b/nuclei-templates/cve-less/plugins/kp-fastest-tawk-to-chat-44b3ba415f16865ebb1bd98068348f19.yaml new file mode 100644 index 0000000000..3a16fc5e12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kp-fastest-tawk-to-chat-44b3ba415f16865ebb1bd98068348f19.yaml @@ -0,0 +1,58 @@ +id: kp-fastest-tawk-to-chat-44b3ba415f16865ebb1bd98068348f19 + +info: + name: > + KP Fastest Tawk.to Chat <= 1.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02ddfc75-8a9e-4a8e-8339-52348a963c69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kp-fastest-tawk-to-chat/" + google-query: inurl:"/wp-content/plugins/kp-fastest-tawk-to-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kp-fastest-tawk-to-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kp-fastest-tawk-to-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kp-fastest-tawk-to-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kraken-image-optimizer-a98db6a35902de5cbf34db4eed4ead5f.yaml b/nuclei-templates/cve-less/plugins/kraken-image-optimizer-a98db6a35902de5cbf34db4eed4ead5f.yaml new file mode 100644 index 0000000000..74ae39b517 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kraken-image-optimizer-a98db6a35902de5cbf34db4eed4ead5f.yaml @@ -0,0 +1,58 @@ +id: kraken-image-optimizer-a98db6a35902de5cbf34db4eed4ead5f + +info: + name: > + Kraken.io Image Optimizer <= 2.6.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/320c0c1d-9d1b-43d7-aca5-2104b2a63e8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kraken-image-optimizer/" + google-query: inurl:"/wp-content/plugins/kraken-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kraken-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kraken-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kraken-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kraken-image-optimizer-d320263520ce22890af78fdf485478ad.yaml b/nuclei-templates/cve-less/plugins/kraken-image-optimizer-d320263520ce22890af78fdf485478ad.yaml new file mode 100644 index 0000000000..7918d5750b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kraken-image-optimizer-d320263520ce22890af78fdf485478ad.yaml @@ -0,0 +1,58 @@ +id: kraken-image-optimizer-d320263520ce22890af78fdf485478ad + +info: + name: > + Kraken.io Image Optimizer <= 2.6.8 - Missing Authorization to Authenticated (Subscriber+) Plugin Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f94eabc5-6e3b-46df-9e36-d7d0fad833de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kraken-image-optimizer/" + google-query: inurl:"/wp-content/plugins/kraken-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kraken-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kraken-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kraken-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kraken-image-optimizer-e82a5c99393c73fafe048a1ee03cc574.yaml b/nuclei-templates/cve-less/plugins/kraken-image-optimizer-e82a5c99393c73fafe048a1ee03cc574.yaml new file mode 100644 index 0000000000..1d82c1caae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kraken-image-optimizer-e82a5c99393c73fafe048a1ee03cc574.yaml @@ -0,0 +1,58 @@ +id: kraken-image-optimizer-e82a5c99393c73fafe048a1ee03cc574 + +info: + name: > + Kraken.io Image Optimizer <= 2.6.7 - Missing Authorization to Authenticated (Subscriber+) Plugin Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2497837d-dec6-4a1d-be88-5c0e659eeb46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kraken-image-optimizer/" + google-query: inurl:"/wp-content/plugins/kraken-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kraken-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kraken-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kraken-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/krsp-frontend-file-upload-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/krsp-frontend-file-upload-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7e16e0c99e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/krsp-frontend-file-upload-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: krsp-frontend-file-upload-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/krsp-frontend-file-upload/" + google-query: inurl:"/wp-content/plugins/krsp-frontend-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,krsp-frontend-file-upload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/krsp-frontend-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "krsp-frontend-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/krsp-frontend-file-upload-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/krsp-frontend-file-upload-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..794f49a68d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/krsp-frontend-file-upload-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: krsp-frontend-file-upload-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/krsp-frontend-file-upload/" + google-query: inurl:"/wp-content/plugins/krsp-frontend-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,krsp-frontend-file-upload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/krsp-frontend-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "krsp-frontend-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kudos-donations-4283f13fe6bc4a6b024bd09e02f40c1e.yaml b/nuclei-templates/cve-less/plugins/kudos-donations-4283f13fe6bc4a6b024bd09e02f40c1e.yaml new file mode 100644 index 0000000000..c714c77b78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kudos-donations-4283f13fe6bc4a6b024bd09e02f40c1e.yaml @@ -0,0 +1,58 @@ +id: kudos-donations-4283f13fe6bc4a6b024bd09e02f40c1e + +info: + name: > + Kudos Donations – Easy donations and payments with Mollie < 3.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8af26db8-5cae-45ba-9573-2bc4e885de81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kudos-donations/" + google-query: inurl:"/wp-content/plugins/kudos-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kudos-donations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kudos-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kudos-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kunze-law-54befb9e4a40b2daeebffb4c52b40b61.yaml b/nuclei-templates/cve-less/plugins/kunze-law-54befb9e4a40b2daeebffb4c52b40b61.yaml new file mode 100644 index 0000000000..0bd2fdc071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kunze-law-54befb9e4a40b2daeebffb4c52b40b61.yaml @@ -0,0 +1,58 @@ +id: kunze-law-54befb9e4a40b2daeebffb4c52b40b61 + +info: + name: > + Kunze Law < 2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ef70f07-ef60-4842-91a9-879478d3f4d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kunze-law/" + google-query: inurl:"/wp-content/plugins/kunze-law/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kunze-law,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kunze-law/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kunze-law" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kv-tinymce-editor-fonts-f59a000f4db543a9b891f92c5f6872de.yaml b/nuclei-templates/cve-less/plugins/kv-tinymce-editor-fonts-f59a000f4db543a9b891f92c5f6872de.yaml new file mode 100644 index 0000000000..51c6d3032e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kv-tinymce-editor-fonts-f59a000f4db543a9b891f92c5f6872de.yaml @@ -0,0 +1,58 @@ +id: kv-tinymce-editor-fonts-f59a000f4db543a9b891f92c5f6872de + +info: + name: > + Kv TinyMCE Editor Add Fonts <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cde526f2-7eff-49cf-8a9f-e0c0cdd12522?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kv-tinymce-editor-fonts/" + google-query: inurl:"/wp-content/plugins/kv-tinymce-editor-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kv-tinymce-editor-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kv-tinymce-editor-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kv-tinymce-editor-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kvoucher-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/kvoucher-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7e5ebde7ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kvoucher-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: kvoucher-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kvoucher/" + google-query: inurl:"/wp-content/plugins/kvoucher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kvoucher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kvoucher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kvoucher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/kwayy-html-sitemap-03920cd9ca5ff22b06a994a5f8a5fb1c.yaml b/nuclei-templates/cve-less/plugins/kwayy-html-sitemap-03920cd9ca5ff22b06a994a5f8a5fb1c.yaml new file mode 100644 index 0000000000..b2960b82b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/kwayy-html-sitemap-03920cd9ca5ff22b06a994a5f8a5fb1c.yaml @@ -0,0 +1,58 @@ +id: kwayy-html-sitemap-03920cd9ca5ff22b06a994a5f8a5fb1c + +info: + name: > + Kwayy HTML Sitemap <= 3.1 - Authenticated (Administrator+) Stored Cross-Site Scipting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6001516-3d3c-48a9-92ae-a1d249d58cec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/kwayy-html-sitemap/" + google-query: inurl:"/wp-content/plugins/kwayy-html-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,kwayy-html-sitemap,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/kwayy-html-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kwayy-html-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/labtools-d4cabd09aa67db7f89a13839c46aab51.yaml b/nuclei-templates/cve-less/plugins/labtools-d4cabd09aa67db7f89a13839c46aab51.yaml new file mode 100644 index 0000000000..be6d00d8ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/labtools-d4cabd09aa67db7f89a13839c46aab51.yaml @@ -0,0 +1,58 @@ +id: labtools-d4cabd09aa67db7f89a13839c46aab51 + +info: + name: > + LabTools <= 1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab9d3fa4-f2b1-4f38-b928-a1220cfeca75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/labtools/" + google-query: inurl:"/wp-content/plugins/labtools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,labtools,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/labtools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "labtools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ladipage-1da9a5e486a5bca5eea56b41f291472c.yaml b/nuclei-templates/cve-less/plugins/ladipage-1da9a5e486a5bca5eea56b41f291472c.yaml new file mode 100644 index 0000000000..f52feb3332 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ladipage-1da9a5e486a5bca5eea56b41f291472c.yaml @@ -0,0 +1,58 @@ +id: ladipage-1da9a5e486a5bca5eea56b41f291472c + +info: + name: > + LadiApp <= 4.4 - Cross-Site Request Forgery via save_config() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea595e78-f4fc-491d-8143-c836302618d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ladipage/" + google-query: inurl:"/wp-content/plugins/ladipage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ladipage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ladipage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ladipage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ladipage-60eda95192a20425ef3765da3a807a07.yaml b/nuclei-templates/cve-less/plugins/ladipage-60eda95192a20425ef3765da3a807a07.yaml new file mode 100644 index 0000000000..a0d3d0d531 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ladipage-60eda95192a20425ef3765da3a807a07.yaml @@ -0,0 +1,58 @@ +id: ladipage-60eda95192a20425ef3765da3a807a07 + +info: + name: > + LadiApp: Landing Page, PopupX, Marketing Automation, Affiliate Marketing… <= 4.4 - Missing Authorization on publish_lp() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6dafc81c-f1be-422d-b34f-87f1956e8849?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ladipage/" + google-query: inurl:"/wp-content/plugins/ladipage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ladipage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ladipage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ladipage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ladipage-75b95cd57aa6f181317402e50b5298ac.yaml b/nuclei-templates/cve-less/plugins/ladipage-75b95cd57aa6f181317402e50b5298ac.yaml new file mode 100644 index 0000000000..1a7a78f9de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ladipage-75b95cd57aa6f181317402e50b5298ac.yaml @@ -0,0 +1,58 @@ +id: ladipage-75b95cd57aa6f181317402e50b5298ac + +info: + name: > + LadiApp <= 4.4 - Missing Authorization via ladiflow_save_hook() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47dccf26-6c8d-4418-a874-c29749bee537?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ladipage/" + google-query: inurl:"/wp-content/plugins/ladipage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ladipage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ladipage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ladipage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ladipage-7f3124ca75169d1ce32c9846ab853c30.yaml b/nuclei-templates/cve-less/plugins/ladipage-7f3124ca75169d1ce32c9846ab853c30.yaml new file mode 100644 index 0000000000..ee3ca16ee5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ladipage-7f3124ca75169d1ce32c9846ab853c30.yaml @@ -0,0 +1,58 @@ +id: ladipage-7f3124ca75169d1ce32c9846ab853c30 + +info: + name: > + LadiApp <= 4.4 - Cross-Site Request Forgery via ladiflow_save_hook() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0be418fa-f1cf-4aaf-bc94-c8e04186a54b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ladipage/" + google-query: inurl:"/wp-content/plugins/ladipage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ladipage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ladipage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ladipage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ladipage-c2e6ea5d855361966f47fc5dcb8b0259.yaml b/nuclei-templates/cve-less/plugins/ladipage-c2e6ea5d855361966f47fc5dcb8b0259.yaml new file mode 100644 index 0000000000..09859b4388 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ladipage-c2e6ea5d855361966f47fc5dcb8b0259.yaml @@ -0,0 +1,58 @@ +id: ladipage-c2e6ea5d855361966f47fc5dcb8b0259 + +info: + name: > + LadiApp <= 4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f88ff96-5bd7-448d-a030-e75fd268bff6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ladipage/" + google-query: inurl:"/wp-content/plugins/ladipage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ladipage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ladipage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ladipage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ladipage-cc5f050077abe9bc4430ea7311dee63b.yaml b/nuclei-templates/cve-less/plugins/ladipage-cc5f050077abe9bc4430ea7311dee63b.yaml new file mode 100644 index 0000000000..a88851d3b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ladipage-cc5f050077abe9bc4430ea7311dee63b.yaml @@ -0,0 +1,58 @@ +id: ladipage-cc5f050077abe9bc4430ea7311dee63b + +info: + name: > + LadiApp <= 4.4 - Missing Authorization via save_config() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8074af6-cb2c-44db-9110-517f33caa96e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ladipage/" + google-query: inurl:"/wp-content/plugins/ladipage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ladipage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ladipage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ladipage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ladipage-d50f67dc0f0c12eaee9077e2d5da5b59.yaml b/nuclei-templates/cve-less/plugins/ladipage-d50f67dc0f0c12eaee9077e2d5da5b59.yaml new file mode 100644 index 0000000000..5ae5e1dc34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ladipage-d50f67dc0f0c12eaee9077e2d5da5b59.yaml @@ -0,0 +1,58 @@ +id: ladipage-d50f67dc0f0c12eaee9077e2d5da5b59 + +info: + name: > + LadiApp: Landing Page, PopupX, Marketing Automation, Affiliate Marketing… <= 4.4 - Cross-Site Request Forgery via publish_lp() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db707507-c53f-45b8-a8e1-7fea1c6f8f3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ladipage/" + google-query: inurl:"/wp-content/plugins/ladipage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ladipage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ladipage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ladipage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ladipage-e17132380795ec993497562455cdcf18.yaml b/nuclei-templates/cve-less/plugins/ladipage-e17132380795ec993497562455cdcf18.yaml new file mode 100644 index 0000000000..b9e21899e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ladipage-e17132380795ec993497562455cdcf18.yaml @@ -0,0 +1,58 @@ +id: ladipage-e17132380795ec993497562455cdcf18 + +info: + name: > + LadiApp: Landing Page, PopupX, Marketing Automation, Affiliate Marketing… <= 4.4 - Cross-Site Request Forgery via init_endpoint + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a46fd57-4cb9-4d98-89b6-926d74b2ab33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ladipage/" + google-query: inurl:"/wp-content/plugins/ladipage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ladipage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ladipage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ladipage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lana-downloads-manager-3e06725c467ed0bbc52c31de7579bce8.yaml b/nuclei-templates/cve-less/plugins/lana-downloads-manager-3e06725c467ed0bbc52c31de7579bce8.yaml new file mode 100644 index 0000000000..4a6932d158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lana-downloads-manager-3e06725c467ed0bbc52c31de7579bce8.yaml @@ -0,0 +1,58 @@ +id: lana-downloads-manager-3e06725c467ed0bbc52c31de7579bce8 + +info: + name: > + Lana Downloads Manager <= 1.7.1 - Authenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9abae49f-b396-4684-8dd5-0b5593069861?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lana-downloads-manager/" + google-query: inurl:"/wp-content/plugins/lana-downloads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lana-downloads-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lana-downloads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lana-downloads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lana-email-logger-0eff9655bfda1837e342ad2c25cf67f3.yaml b/nuclei-templates/cve-less/plugins/lana-email-logger-0eff9655bfda1837e342ad2c25cf67f3.yaml new file mode 100644 index 0000000000..2a2e0bce7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lana-email-logger-0eff9655bfda1837e342ad2c25cf67f3.yaml @@ -0,0 +1,58 @@ +id: lana-email-logger-0eff9655bfda1837e342ad2c25cf67f3 + +info: + name: > + Lana Email Logger <= 1.0.2 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5f372bf-6b13-4ba7-8b8b-9d3b500e4420?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lana-email-logger/" + google-query: inurl:"/wp-content/plugins/lana-email-logger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lana-email-logger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lana-email-logger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lana-email-logger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lana-email-tester-9f0a7a67bdcab820d9c877a9c152ccf4.yaml b/nuclei-templates/cve-less/plugins/lana-email-tester-9f0a7a67bdcab820d9c877a9c152ccf4.yaml new file mode 100644 index 0000000000..31af774276 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lana-email-tester-9f0a7a67bdcab820d9c877a9c152ccf4.yaml @@ -0,0 +1,58 @@ +id: lana-email-tester-9f0a7a67bdcab820d9c877a9c152ccf4 + +info: + name: > + Lana Email Tester <= 1.0.0 - Missing Authorization to Mail Relay & Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe4171b9-b17e-4e6e-9ab4-4b1b125e8950?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lana-email-tester/" + google-query: inurl:"/wp-content/plugins/lana-email-tester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lana-email-tester,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lana-email-tester/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lana-email-tester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lana-shortcodes-30c4f098df3ec040d50017f604f86e26.yaml b/nuclei-templates/cve-less/plugins/lana-shortcodes-30c4f098df3ec040d50017f604f86e26.yaml new file mode 100644 index 0000000000..2badcbe3bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lana-shortcodes-30c4f098df3ec040d50017f604f86e26.yaml @@ -0,0 +1,58 @@ +id: lana-shortcodes-30c4f098df3ec040d50017f604f86e26 + +info: + name: > + Lana Shortcodes <= 1.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36806418-ae4e-4981-b9c5-dadb5e92e69a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lana-shortcodes/" + google-query: inurl:"/wp-content/plugins/lana-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lana-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lana-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lana-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lana-text-to-image-01d1d88da52813ba88f89d4ae266435f.yaml b/nuclei-templates/cve-less/plugins/lana-text-to-image-01d1d88da52813ba88f89d4ae266435f.yaml new file mode 100644 index 0000000000..ab2cc92c85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lana-text-to-image-01d1d88da52813ba88f89d4ae266435f.yaml @@ -0,0 +1,58 @@ +id: lana-text-to-image-01d1d88da52813ba88f89d4ae266435f + +info: + name: > + Lana Text to Image <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8acb7893-85b2-404a-b3fe-b4c1a835b3eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lana-text-to-image/" + google-query: inurl:"/wp-content/plugins/lana-text-to-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lana-text-to-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lana-text-to-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lana-text-to-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/landing-page-cat-823af0fa0a5da870a62224c7ff6c3f56.yaml b/nuclei-templates/cve-less/plugins/landing-page-cat-823af0fa0a5da870a62224c7ff6c3f56.yaml new file mode 100644 index 0000000000..abdce9afc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/landing-page-cat-823af0fa0a5da870a62224c7ff6c3f56.yaml @@ -0,0 +1,58 @@ +id: landing-page-cat-823af0fa0a5da870a62224c7ff6c3f56 + +info: + name: > + Landing Page Cat – Coming Soon Page, Maintenance Page & Squeeze Pages <= 1.7.2 - Unauthenticated Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b34f50a-4d2d-49b8-86e4-0416c8be202b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/landing-page-cat/" + google-query: inurl:"/wp-content/plugins/landing-page-cat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,landing-page-cat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/landing-page-cat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "landing-page-cat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/landing-pages-1bd3cf2ded386b4330f990e160e575a1.yaml b/nuclei-templates/cve-less/plugins/landing-pages-1bd3cf2ded386b4330f990e160e575a1.yaml new file mode 100644 index 0000000000..2baa65407d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/landing-pages-1bd3cf2ded386b4330f990e160e575a1.yaml @@ -0,0 +1,58 @@ +id: landing-pages-1bd3cf2ded386b4330f990e160e575a1 + +info: + name: > + WordPress Landing Pages <= 1.8.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0b4a357-fddd-4b42-8834-3a294e0d150c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/landing-pages/" + google-query: inurl:"/wp-content/plugins/landing-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,landing-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/landing-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "landing-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/landing-pages-1d38738da5297f92f4a75e3867c8fc2b.yaml b/nuclei-templates/cve-less/plugins/landing-pages-1d38738da5297f92f4a75e3867c8fc2b.yaml new file mode 100644 index 0000000000..3aaf25b828 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/landing-pages-1d38738da5297f92f4a75e3867c8fc2b.yaml @@ -0,0 +1,58 @@ +id: landing-pages-1d38738da5297f92f4a75e3867c8fc2b + +info: + name: > + WordPress Landing Pages <= 1.9.0 - Unauthenticated Remote Command Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f25cabc-8886-4d30-af16-07d344db2fff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/landing-pages/" + google-query: inurl:"/wp-content/plugins/landing-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,landing-pages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/landing-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "landing-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/landing-pages-32b6d6a7715e88760b71f326a4a0a744.yaml b/nuclei-templates/cve-less/plugins/landing-pages-32b6d6a7715e88760b71f326a4a0a744.yaml new file mode 100644 index 0000000000..9da9617ffa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/landing-pages-32b6d6a7715e88760b71f326a4a0a744.yaml @@ -0,0 +1,58 @@ +id: landing-pages-32b6d6a7715e88760b71f326a4a0a744 + +info: + name: > + WordPress Landing Pages <= 1.8.4 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68f460dc-bb7f-4477-821b-925c7c2c2de5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/landing-pages/" + google-query: inurl:"/wp-content/plugins/landing-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,landing-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/landing-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "landing-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/landing-pages-6ef6064badb5d7b87c27535925053eda.yaml b/nuclei-templates/cve-less/plugins/landing-pages-6ef6064badb5d7b87c27535925053eda.yaml new file mode 100644 index 0000000000..64cbf299c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/landing-pages-6ef6064badb5d7b87c27535925053eda.yaml @@ -0,0 +1,58 @@ +id: landing-pages-6ef6064badb5d7b87c27535925053eda + +info: + name: > + WordPress Landing Pages <= 1.8.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aa2ff1f-c018-4c35-859e-f7e42134b937?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/landing-pages/" + google-query: inurl:"/wp-content/plugins/landing-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,landing-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/landing-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "landing-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/landing-pages-cdbf7ebff8c4d1a9b90da71e4a3d5b8e.yaml b/nuclei-templates/cve-less/plugins/landing-pages-cdbf7ebff8c4d1a9b90da71e4a3d5b8e.yaml new file mode 100644 index 0000000000..710205215b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/landing-pages-cdbf7ebff8c4d1a9b90da71e4a3d5b8e.yaml @@ -0,0 +1,58 @@ +id: landing-pages-cdbf7ebff8c4d1a9b90da71e4a3d5b8e + +info: + name: > + WordPress Landing Pages <= 2.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8910d60c-45be-41a1-86fb-a0d60a78e660?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/landing-pages/" + google-query: inurl:"/wp-content/plugins/landing-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,landing-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/landing-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "landing-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/landing-pages-fc1127bab00994e33df3aea4eda89e16.yaml b/nuclei-templates/cve-less/plugins/landing-pages-fc1127bab00994e33df3aea4eda89e16.yaml new file mode 100644 index 0000000000..2505ffe4f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/landing-pages-fc1127bab00994e33df3aea4eda89e16.yaml @@ -0,0 +1,58 @@ +id: landing-pages-fc1127bab00994e33df3aea4eda89e16 + +info: + name: > + WordPress Landing Pages < 1.2.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3f50771-f889-4de9-9d43-a736c4c24efc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/landing-pages/" + google-query: inurl:"/wp-content/plugins/landing-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,landing-pages,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/landing-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "landing-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/landingi-landing-pages-4557d429895965429fa37880092128d8.yaml b/nuclei-templates/cve-less/plugins/landingi-landing-pages-4557d429895965429fa37880092128d8.yaml new file mode 100644 index 0000000000..1bc5a33db8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/landingi-landing-pages-4557d429895965429fa37880092128d8.yaml @@ -0,0 +1,58 @@ +id: landingi-landing-pages-4557d429895965429fa37880092128d8 + +info: + name: > + Landingi Landing Pages <= 3.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e273662-935f-45ad-b424-612da0799eba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/landingi-landing-pages/" + google-query: inurl:"/wp-content/plugins/landingi-landing-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,landingi-landing-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/landingi-landing-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "landingi-landing-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/language-bar-flags-b653693e247ce65b83ad58a9d1c112a5.yaml b/nuclei-templates/cve-less/plugins/language-bar-flags-b653693e247ce65b83ad58a9d1c112a5.yaml new file mode 100644 index 0000000000..d711df4b5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/language-bar-flags-b653693e247ce65b83ad58a9d1c112a5.yaml @@ -0,0 +1,58 @@ +id: language-bar-flags-b653693e247ce65b83ad58a9d1c112a5 + +info: + name: > + Language Bar Flags <= 1.0.8 - Cross-Site Request Forgery leading to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e26a438d-7e2d-47de-81f2-39731ce51bd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/language-bar-flags/" + google-query: inurl:"/wp-content/plugins/language-bar-flags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,language-bar-flags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/language-bar-flags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "language-bar-flags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/language-switcher-for-transposh-cad70fb6bdfbb529b2f3fd5fa62ec983.yaml b/nuclei-templates/cve-less/plugins/language-switcher-for-transposh-cad70fb6bdfbb529b2f3fd5fa62ec983.yaml new file mode 100644 index 0000000000..0b9be1494c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/language-switcher-for-transposh-cad70fb6bdfbb529b2f3fd5fa62ec983.yaml @@ -0,0 +1,58 @@ +id: language-switcher-for-transposh-cad70fb6bdfbb529b2f3fd5fa62ec983 + +info: + name: > + Language Switcher for Transposh <= 1.5.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94e859ea-3f90-49d1-9e66-fe3ab749c872?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/language-switcher-for-transposh/" + google-query: inurl:"/wp-content/plugins/language-switcher-for-transposh/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,language-switcher-for-transposh,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/language-switcher-for-transposh/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "language-switcher-for-transposh" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/laposta-signup-basic-4888a583f0c17ec03ad6204f11cf19b4.yaml b/nuclei-templates/cve-less/plugins/laposta-signup-basic-4888a583f0c17ec03ad6204f11cf19b4.yaml new file mode 100644 index 0000000000..b92148fac7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/laposta-signup-basic-4888a583f0c17ec03ad6204f11cf19b4.yaml @@ -0,0 +1,58 @@ +id: laposta-signup-basic-4888a583f0c17ec03ad6204f11cf19b4 + +info: + name: > + Laposta Signup Basic <= 1.4.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7e417c2-bf9c-4c88-be2b-9c2324897b07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/laposta-signup-basic/" + google-query: inurl:"/wp-content/plugins/laposta-signup-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,laposta-signup-basic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/laposta-signup-basic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "laposta-signup-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/laposta-signup-basic-ba827c0c7827dd14721a734b247e5519.yaml b/nuclei-templates/cve-less/plugins/laposta-signup-basic-ba827c0c7827dd14721a734b247e5519.yaml new file mode 100644 index 0000000000..bdaeda60a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/laposta-signup-basic-ba827c0c7827dd14721a734b247e5519.yaml @@ -0,0 +1,58 @@ +id: laposta-signup-basic-ba827c0c7827dd14721a734b247e5519 + +info: + name: > + Laposta Signup Basic <= 1.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1ba4b18-ff46-45ef-b7d4-0a314cf2d74c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/laposta-signup-basic/" + google-query: inurl:"/wp-content/plugins/laposta-signup-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,laposta-signup-basic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/laposta-signup-basic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "laposta-signup-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/laposta-signup-embed-5b2a6f112dc7d70910b36648c4b4675a.yaml b/nuclei-templates/cve-less/plugins/laposta-signup-embed-5b2a6f112dc7d70910b36648c4b4675a.yaml new file mode 100644 index 0000000000..b9018f334a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/laposta-signup-embed-5b2a6f112dc7d70910b36648c4b4675a.yaml @@ -0,0 +1,58 @@ +id: laposta-signup-embed-5b2a6f112dc7d70910b36648c4b4675a + +info: + name: > + Laposta Signup Embed <= 1.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12b81441-d22c-4211-a8da-811182de622d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/laposta-signup-embed/" + google-query: inurl:"/wp-content/plugins/laposta-signup-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,laposta-signup-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/laposta-signup-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "laposta-signup-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/laposta-signup-embed-77ceee4c9af8ec0a57ce3d32bf1b3aa5.yaml b/nuclei-templates/cve-less/plugins/laposta-signup-embed-77ceee4c9af8ec0a57ce3d32bf1b3aa5.yaml new file mode 100644 index 0000000000..07bbc3e0a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/laposta-signup-embed-77ceee4c9af8ec0a57ce3d32bf1b3aa5.yaml @@ -0,0 +1,58 @@ +id: laposta-signup-embed-77ceee4c9af8ec0a57ce3d32bf1b3aa5 + +info: + name: > + Laposta Signup Embed <= 1.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c0cbf44-f6b4-408d-9a96-98f45d890822?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/laposta-signup-embed/" + google-query: inurl:"/wp-content/plugins/laposta-signup-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,laposta-signup-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/laposta-signup-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "laposta-signup-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lara-google-analytics-fbfa55f46b34cda37b3af16eb142622e.yaml b/nuclei-templates/cve-less/plugins/lara-google-analytics-fbfa55f46b34cda37b3af16eb142622e.yaml new file mode 100644 index 0000000000..0251719076 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lara-google-analytics-fbfa55f46b34cda37b3af16eb142622e.yaml @@ -0,0 +1,58 @@ +id: lara-google-analytics-fbfa55f46b34cda37b3af16eb142622e + +info: + name: > + Lara Google Analytics <= 2.0.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72fa6b56-dfbf-4c27-a6f3-418d1ab5dc0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lara-google-analytics/" + google-query: inurl:"/wp-content/plugins/lara-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lara-google-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lara-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lara-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/larsens-calender-c2ba29e0e5ecaebf723467e306a8b7e0.yaml b/nuclei-templates/cve-less/plugins/larsens-calender-c2ba29e0e5ecaebf723467e306a8b7e0.yaml new file mode 100644 index 0000000000..809246600b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/larsens-calender-c2ba29e0e5ecaebf723467e306a8b7e0.yaml @@ -0,0 +1,58 @@ +id: larsens-calender-c2ba29e0e5ecaebf723467e306a8b7e0 + +info: + name: > + Larsens Calender <= 1.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d5c17cb-98a9-45f0-b94f-02b48193949f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/larsens-calender/" + google-query: inurl:"/wp-content/plugins/larsens-calender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,larsens-calender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/larsens-calender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "larsens-calender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/last-viewed-posts-3e7a9b56ead5fe8df432df319aeeebae.yaml b/nuclei-templates/cve-less/plugins/last-viewed-posts-3e7a9b56ead5fe8df432df319aeeebae.yaml new file mode 100644 index 0000000000..167486def8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/last-viewed-posts-3e7a9b56ead5fe8df432df319aeeebae.yaml @@ -0,0 +1,58 @@ +id: last-viewed-posts-3e7a9b56ead5fe8df432df319aeeebae + +info: + name: > + Last Viewed Posts by WPBeginner <= 1.0.0 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6c5cc05-b147-46f6-aaa9-4c82aae1b544?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/last-viewed-posts/" + google-query: inurl:"/wp-content/plugins/last-viewed-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,last-viewed-posts,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/last-viewed-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "last-viewed-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lastfm-rotation-d4b22919ff8b60c51f7cf57a644618b0.yaml b/nuclei-templates/cve-less/plugins/lastfm-rotation-d4b22919ff8b60c51f7cf57a644618b0.yaml new file mode 100644 index 0000000000..e4f6a3f5d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lastfm-rotation-d4b22919ff8b60c51f7cf57a644618b0.yaml @@ -0,0 +1,58 @@ +id: lastfm-rotation-d4b22919ff8b60c51f7cf57a644618b0 + +info: + name: > + Last.fm Rotation <= 1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bf85146-8d82-4101-a914-b6d632460366?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lastfm-rotation/" + google-query: inurl:"/wp-content/plugins/lastfm-rotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lastfm-rotation,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lastfm-rotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lastfm-rotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lastform-59cabb7b5299e919e0e9798126655ebf.yaml b/nuclei-templates/cve-less/plugins/lastform-59cabb7b5299e919e0e9798126655ebf.yaml new file mode 100644 index 0000000000..83198a81bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lastform-59cabb7b5299e919e0e9798126655ebf.yaml @@ -0,0 +1,58 @@ +id: lastform-59cabb7b5299e919e0e9798126655ebf + +info: + name: > + Contact Forms - Drag & Drop Contact Form Builder <= 1.0.5 - Authenticated (Admin+) Arbitrary System File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a547c-6b24-4cb6-ad0e-b12a8f37472a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lastform/" + google-query: inurl:"/wp-content/plugins/lastform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lastform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lastform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lastform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lastudio-element-kit-393e2e191f65056b760ec314dc828cfa.yaml b/nuclei-templates/cve-less/plugins/lastudio-element-kit-393e2e191f65056b760ec314dc828cfa.yaml new file mode 100644 index 0000000000..de56a7b445 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lastudio-element-kit-393e2e191f65056b760ec314dc828cfa.yaml @@ -0,0 +1,58 @@ +id: lastudio-element-kit-393e2e191f65056b760ec314dc828cfa + +info: + name: > + LA-Studio Element Kit for Elementor <= 1.1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/523f7a8a-d06d-4778-be14-d0b7ca32dab3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lastudio-element-kit/" + google-query: inurl:"/wp-content/plugins/lastudio-element-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lastudio-element-kit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lastudio-element-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lastudio-element-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lastudio-element-kit-c82aa7ec69ca20e438896d99f7ba7b77.yaml b/nuclei-templates/cve-less/plugins/lastudio-element-kit-c82aa7ec69ca20e438896d99f7ba7b77.yaml new file mode 100644 index 0000000000..e67a505e9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lastudio-element-kit-c82aa7ec69ca20e438896d99f7ba7b77.yaml @@ -0,0 +1,58 @@ +id: lastudio-element-kit-c82aa7ec69ca20e438896d99f7ba7b77 + +info: + name: > + LA-Studio Element Kit for Elementor <= 1.3.7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via LaStudioKit Post Author Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/544db0d5-1760-4229-8429-d2391e328304?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lastudio-element-kit/" + google-query: inurl:"/wp-content/plugins/lastudio-element-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lastudio-element-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lastudio-element-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lastudio-element-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lastudio-element-kit-dd731c24df053ea79b95f5153fe19979.yaml b/nuclei-templates/cve-less/plugins/lastudio-element-kit-dd731c24df053ea79b95f5153fe19979.yaml new file mode 100644 index 0000000000..9e09406886 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lastudio-element-kit-dd731c24df053ea79b95f5153fe19979.yaml @@ -0,0 +1,58 @@ +id: lastudio-element-kit-dd731c24df053ea79b95f5153fe19979 + +info: + name: > + LA-Studio Element Kit for Elementor <= 1.3.7.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5113170a-5a53-4e53-84e6-56d9ba0740ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lastudio-element-kit/" + google-query: inurl:"/wp-content/plugins/lastudio-element-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lastudio-element-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lastudio-element-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lastudio-element-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lastunes-ca83dec475d25f0d439ff07447147bbd.yaml b/nuclei-templates/cve-less/plugins/lastunes-ca83dec475d25f0d439ff07447147bbd.yaml new file mode 100644 index 0000000000..34dd63d8dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lastunes-ca83dec475d25f0d439ff07447147bbd.yaml @@ -0,0 +1,58 @@ +id: lastunes-ca83dec475d25f0d439ff07447147bbd + +info: + name: > + lasTunes <= 3.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f1ed4a2-eb0d-42cd-9273-10d7d127cdf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lastunes/" + google-query: inurl:"/wp-content/plugins/lastunes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lastunes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lastunes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lastunes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/latest-tweets-widget-b7b0638727516de291f017e208e485cf.yaml b/nuclei-templates/cve-less/plugins/latest-tweets-widget-b7b0638727516de291f017e208e485cf.yaml new file mode 100644 index 0000000000..04b5cd202a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/latest-tweets-widget-b7b0638727516de291f017e208e485cf.yaml @@ -0,0 +1,58 @@ +id: latest-tweets-widget-b7b0638727516de291f017e208e485cf + +info: + name: > + Latest Tweets Widget <= 1.1.4 - Arbitrary Settings Update via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bb13a69-be75-48f0-9bcc-a33c5add7bd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/latest-tweets-widget/" + google-query: inurl:"/wp-content/plugins/latest-tweets-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,latest-tweets-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/latest-tweets-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "latest-tweets-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/latex-53e03067c5c0bd571562823dadf2dc1b.yaml b/nuclei-templates/cve-less/plugins/latex-53e03067c5c0bd571562823dadf2dc1b.yaml new file mode 100644 index 0000000000..34133ff46c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/latex-53e03067c5c0bd571562823dadf2dc1b.yaml @@ -0,0 +1,58 @@ +id: latex-53e03067c5c0bd571562823dadf2dc1b + +info: + name: > + LaTeX <= 3.4.10 - Cross-Site Request Forgery to Settings Update and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8e23501-9fc4-484b-b308-a9c51494bc9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/latex/" + google-query: inurl:"/wp-content/plugins/latex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,latex,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/latex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "latex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/launcher-992cb2db66581f66b70df8df6297f14c.yaml b/nuclei-templates/cve-less/plugins/launcher-992cb2db66581f66b70df8df6297f14c.yaml new file mode 100644 index 0000000000..fceae9b39f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/launcher-992cb2db66581f66b70df8df6297f14c.yaml @@ -0,0 +1,58 @@ +id: launcher-992cb2db66581f66b70df8df6297f14c + +info: + name: > + Launcher: Coming Soon & Maintenance Mode <= 1.0.11 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2f4efa2-ddf6-46a7-9bde-aa1bcbbd2999?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/launcher/" + google-query: inurl:"/wp-content/plugins/launcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,launcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/launcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "launcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/launcher-fe2d4839032c7d1700f5ad488d4dc88f.yaml b/nuclei-templates/cve-less/plugins/launcher-fe2d4839032c7d1700f5ad488d4dc88f.yaml new file mode 100644 index 0000000000..cb10738cb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/launcher-fe2d4839032c7d1700f5ad488d4dc88f.yaml @@ -0,0 +1,58 @@ +id: launcher-fe2d4839032c7d1700f5ad488d4dc88f + +info: + name: > + Launcher: Coming Soon & Maintenance Mode < 1.0.11 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56c1a28e-c37b-431d-bb0d-7d9cf4f85606?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/launcher/" + google-query: inurl:"/wp-content/plugins/launcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,launcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/launcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "launcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/launchpad-by-obox-1d6b909d9b4a86a23d05301fe792416a.yaml b/nuclei-templates/cve-less/plugins/launchpad-by-obox-1d6b909d9b4a86a23d05301fe792416a.yaml new file mode 100644 index 0000000000..e496950771 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/launchpad-by-obox-1d6b909d9b4a86a23d05301fe792416a.yaml @@ -0,0 +1,58 @@ +id: launchpad-by-obox-1d6b909d9b4a86a23d05301fe792416a + +info: + name: > + Launchpad – Coming Soon & Maintenance Mode Plugin <= 1.0.13 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8721c4d-d89b-4e97-af01-20327013cfb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/launchpad-by-obox/" + google-query: inurl:"/wp-content/plugins/launchpad-by-obox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,launchpad-by-obox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/launchpad-by-obox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "launchpad-by-obox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/launchpad-by-obox-e9635d2750ec3cdec7963e531110e8e5.yaml b/nuclei-templates/cve-less/plugins/launchpad-by-obox-e9635d2750ec3cdec7963e531110e8e5.yaml new file mode 100644 index 0000000000..8aa793ff8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/launchpad-by-obox-e9635d2750ec3cdec7963e531110e8e5.yaml @@ -0,0 +1,58 @@ +id: launchpad-by-obox-e9635d2750ec3cdec7963e531110e8e5 + +info: + name: > + Launchpad <= 1.0.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/482bae65-5493-4de5-9d5f-479d0968cd4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/launchpad-by-obox/" + google-query: inurl:"/wp-content/plugins/launchpad-by-obox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,launchpad-by-obox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/launchpad-by-obox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "launchpad-by-obox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lava-directory-manager-6e22ef37bb559e43f9ec487e46497c1a.yaml b/nuclei-templates/cve-less/plugins/lava-directory-manager-6e22ef37bb559e43f9ec487e46497c1a.yaml new file mode 100644 index 0000000000..3dedc9519b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lava-directory-manager-6e22ef37bb559e43f9ec487e46497c1a.yaml @@ -0,0 +1,58 @@ +id: lava-directory-manager-6e22ef37bb559e43f9ec487e46497c1a + +info: + name: > + Lava Directory Manager <= 1.1.34 - Unauthenticated Stored Cross-Site Scripting via New Listing + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf669ed-ea31-4144-96b3-b1f29057b86d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lava-directory-manager/" + google-query: inurl:"/wp-content/plugins/lava-directory-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lava-directory-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lava-directory-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lava-directory-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lava-directory-manager-dcfc7774787e2e0bae54fdcbcdce15a5.yaml b/nuclei-templates/cve-less/plugins/lava-directory-manager-dcfc7774787e2e0bae54fdcbcdce15a5.yaml new file mode 100644 index 0000000000..1d454303cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lava-directory-manager-dcfc7774787e2e0bae54fdcbcdce15a5.yaml @@ -0,0 +1,58 @@ +id: lava-directory-manager-dcfc7774787e2e0bae54fdcbcdce15a5 + +info: + name: > + Lava Directory Manager <= 1.1.34 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3d21ebb-52de-4b25-b9e9-5d6f3284cf94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lava-directory-manager/" + google-query: inurl:"/wp-content/plugins/lava-directory-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lava-directory-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lava-directory-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lava-directory-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lawpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/lawpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e6477cdf5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lawpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: lawpress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lawpress/" + google-query: inurl:"/wp-content/plugins/lawpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lawpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lawpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lawpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lawyer-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/lawyer-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..487ea25421 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lawyer-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: lawyer-directory-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lawyer-directory/" + google-query: inurl:"/wp-content/plugins/lawyer-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lawyer-directory,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lawyer-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lawyer-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/laybuy-gateway-for-woocommerce-ae9a6b8dc34a1a7bd8079dc738c03df9.yaml b/nuclei-templates/cve-less/plugins/laybuy-gateway-for-woocommerce-ae9a6b8dc34a1a7bd8079dc738c03df9.yaml new file mode 100644 index 0000000000..3b0b5c8e48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/laybuy-gateway-for-woocommerce-ae9a6b8dc34a1a7bd8079dc738c03df9.yaml @@ -0,0 +1,58 @@ +id: laybuy-gateway-for-woocommerce-ae9a6b8dc34a1a7bd8079dc738c03df9 + +info: + name: > + Laybuy Payment Extension for WooCommerce <= 5.3.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c91caaa-9bdd-4170-98f1-0d686d3ffcba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/laybuy-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/laybuy-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,laybuy-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/laybuy-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "laybuy-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layerslider-02467e400ca754bab3e037cbbdd78309.yaml b/nuclei-templates/cve-less/plugins/layerslider-02467e400ca754bab3e037cbbdd78309.yaml new file mode 100644 index 0000000000..c390d5ee43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layerslider-02467e400ca754bab3e037cbbdd78309.yaml @@ -0,0 +1,58 @@ +id: layerslider-02467e400ca754bab3e037cbbdd78309 + +info: + name: > + LayerSlider <= 7.7.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9225ebc6-bff9-4176-a86e-022ff8ec3b05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/LayerSlider/" + google-query: inurl:"/wp-content/plugins/LayerSlider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,LayerSlider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/LayerSlider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "LayerSlider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layerslider-1abc3232bb9762193f328a8624f474b9.yaml b/nuclei-templates/cve-less/plugins/layerslider-1abc3232bb9762193f328a8624f474b9.yaml new file mode 100644 index 0000000000..3d92827d9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layerslider-1abc3232bb9762193f328a8624f474b9.yaml @@ -0,0 +1,58 @@ +id: layerslider-1abc3232bb9762193f328a8624f474b9 + +info: + name: > + LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fddf96e-029c-4753-ba82-043ca64b78d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/LayerSlider/" + google-query: inurl:"/wp-content/plugins/LayerSlider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,LayerSlider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/LayerSlider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "LayerSlider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 7.9.11', '<= 7.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layerslider-4c62f9807e53925857a04839b7f811f3.yaml b/nuclei-templates/cve-less/plugins/layerslider-4c62f9807e53925857a04839b7f811f3.yaml new file mode 100644 index 0000000000..5382e358e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layerslider-4c62f9807e53925857a04839b7f811f3.yaml @@ -0,0 +1,58 @@ +id: layerslider-4c62f9807e53925857a04839b7f811f3 + +info: + name: > + LayerSlider <= 4.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4be5c7d7-47dd-42ee-9cde-9e9ad6276e41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/LayerSlider/" + google-query: inurl:"/wp-content/plugins/LayerSlider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,LayerSlider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/LayerSlider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "LayerSlider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layerslider-782d2a5a9a3b36ec02deacd0cc03dd91.yaml b/nuclei-templates/cve-less/plugins/layerslider-782d2a5a9a3b36ec02deacd0cc03dd91.yaml new file mode 100644 index 0000000000..7f8510c0e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layerslider-782d2a5a9a3b36ec02deacd0cc03dd91.yaml @@ -0,0 +1,58 @@ +id: layerslider-782d2a5a9a3b36ec02deacd0cc03dd91 + +info: + name: > + LayerSlider <= 6.2.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11aaec16-930d-44f6-abe5-4f7fdc32f252?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/LayerSlider/" + google-query: inurl:"/wp-content/plugins/LayerSlider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,LayerSlider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/LayerSlider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "LayerSlider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layerslider-7b9f5b71ec8719bf9a8cb5694942faa9.yaml b/nuclei-templates/cve-less/plugins/layerslider-7b9f5b71ec8719bf9a8cb5694942faa9.yaml new file mode 100644 index 0000000000..1bd5dd7189 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layerslider-7b9f5b71ec8719bf9a8cb5694942faa9.yaml @@ -0,0 +1,58 @@ +id: layerslider-7b9f5b71ec8719bf9a8cb5694942faa9 + +info: + name: > + LayerSlider <= 7.1.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78fce739-5cc7-4a7f-bf3b-665f35ef3579?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/LayerSlider/" + google-query: inurl:"/wp-content/plugins/LayerSlider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,LayerSlider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/LayerSlider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "LayerSlider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layerslider-9212eb6af9b06f0daa962811d04b3aed.yaml b/nuclei-templates/cve-less/plugins/layerslider-9212eb6af9b06f0daa962811d04b3aed.yaml new file mode 100644 index 0000000000..d6ac34f225 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layerslider-9212eb6af9b06f0daa962811d04b3aed.yaml @@ -0,0 +1,58 @@ +id: layerslider-9212eb6af9b06f0daa962811d04b3aed + +info: + name: > + LayerSlider <= 6.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/174e6344-3919-4c73-8810-33de379ff463?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/LayerSlider/" + google-query: inurl:"/wp-content/plugins/LayerSlider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,LayerSlider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/LayerSlider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "LayerSlider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layerslider-9e79ec7559a564921e41d0c7103ccb78.yaml b/nuclei-templates/cve-less/plugins/layerslider-9e79ec7559a564921e41d0c7103ccb78.yaml new file mode 100644 index 0000000000..02673e3613 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layerslider-9e79ec7559a564921e41d0c7103ccb78.yaml @@ -0,0 +1,58 @@ +id: layerslider-9e79ec7559a564921e41d0c7103ccb78 + +info: + name: > + LayerSlider <= 7.7.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/441bc9fe-3dd6-40a6-b7f3-36511115c083?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/LayerSlider/" + google-query: inurl:"/wp-content/plugins/LayerSlider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,LayerSlider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/LayerSlider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "LayerSlider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layerslider-a578ebb6ebe38916edbe0405c9e0722c.yaml b/nuclei-templates/cve-less/plugins/layerslider-a578ebb6ebe38916edbe0405c9e0722c.yaml new file mode 100644 index 0000000000..0ff2ce0b5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layerslider-a578ebb6ebe38916edbe0405c9e0722c.yaml @@ -0,0 +1,58 @@ +id: layerslider-a578ebb6ebe38916edbe0405c9e0722c + +info: + name: > + LayerSlider <= 4.6.1 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7801d3e1-90aa-434d-ae3d-9f19670280c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/LayerSlider/" + google-query: inurl:"/wp-content/plugins/LayerSlider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,LayerSlider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/LayerSlider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "LayerSlider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/layouts-for-elementor-64461a08e8c73126cafa25fcfb24f7b4.yaml b/nuclei-templates/cve-less/plugins/layouts-for-elementor-64461a08e8c73126cafa25fcfb24f7b4.yaml new file mode 100644 index 0000000000..695713a17e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/layouts-for-elementor-64461a08e8c73126cafa25fcfb24f7b4.yaml @@ -0,0 +1,58 @@ +id: layouts-for-elementor-64461a08e8c73126cafa25fcfb24f7b4 + +info: + name: > + Layouts for Elementor <= 1.7 - Missing Authorization to Unauthenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1feb3fa0-5fd9-443a-830c-cb1700ff30df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/layouts-for-elementor/" + google-query: inurl:"/wp-content/plugins/layouts-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,layouts-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/layouts-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "layouts-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lazy-facebook-comments-277494a31c77da0ae18248d4fccbad90.yaml b/nuclei-templates/cve-less/plugins/lazy-facebook-comments-277494a31c77da0ae18248d4fccbad90.yaml new file mode 100644 index 0000000000..4721170d75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lazy-facebook-comments-277494a31c77da0ae18248d4fccbad90.yaml @@ -0,0 +1,58 @@ +id: lazy-facebook-comments-277494a31c77da0ae18248d4fccbad90 + +info: + name: > + Lazy Social Comments <= 2.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via Plugin Options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43f2c020-a531-4e25-948e-372bc7af3bab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lazy-facebook-comments/" + google-query: inurl:"/wp-content/plugins/lazy-facebook-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lazy-facebook-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lazy-facebook-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lazy-facebook-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lazy-load-7a66706d231bb588b40ed996e42c0254.yaml b/nuclei-templates/cve-less/plugins/lazy-load-7a66706d231bb588b40ed996e42c0254.yaml new file mode 100644 index 0000000000..9c7ede850d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lazy-load-7a66706d231bb588b40ed996e42c0254.yaml @@ -0,0 +1,58 @@ +id: lazy-load-7a66706d231bb588b40ed996e42c0254 + +info: + name: > + Lazy Load < 0.6.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06187bf0-7e3b-49c0-9f34-3d717e8d8ece?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lazy-load/" + google-query: inurl:"/wp-content/plugins/lazy-load/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lazy-load,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lazy-load/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lazy-load" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lazy-load-for-videos-934698dce094abed0913795fed8be1e6.yaml b/nuclei-templates/cve-less/plugins/lazy-load-for-videos-934698dce094abed0913795fed8be1e6.yaml new file mode 100644 index 0000000000..db568d63b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lazy-load-for-videos-934698dce094abed0913795fed8be1e6.yaml @@ -0,0 +1,58 @@ +id: lazy-load-for-videos-934698dce094abed0913795fed8be1e6 + +info: + name: > + Lazy Load for Videos <= 2.18.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a467ad30-8271-421c-8af4-8165fd60c03e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lazy-load-for-videos/" + google-query: inurl:"/wp-content/plugins/lazy-load-for-videos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lazy-load-for-videos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lazy-load-for-videos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lazy-load-for-videos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lazyest-backup-175c8ff94ca9713fddec53a350c86d55.yaml b/nuclei-templates/cve-less/plugins/lazyest-backup-175c8ff94ca9713fddec53a350c86d55.yaml new file mode 100644 index 0000000000..040de5c20a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lazyest-backup-175c8ff94ca9713fddec53a350c86d55.yaml @@ -0,0 +1,58 @@ +id: lazyest-backup-175c8ff94ca9713fddec53a350c86d55 + +info: + name: > + Lazyest Backup < 0.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f04afca9-a03f-4390-9872-f744d0a86bec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lazyest-backup/" + google-query: inurl:"/wp-content/plugins/lazyest-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lazyest-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lazyest-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lazyest-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lazyest-gallery-1d3a5e954dbca93e3fee328975ccc98e.yaml b/nuclei-templates/cve-less/plugins/lazyest-gallery-1d3a5e954dbca93e3fee328975ccc98e.yaml new file mode 100644 index 0000000000..25e50d028e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lazyest-gallery-1d3a5e954dbca93e3fee328975ccc98e.yaml @@ -0,0 +1,58 @@ +id: lazyest-gallery-1d3a5e954dbca93e3fee328975ccc98e + +info: + name: > + Lazyest Gallery < 1.1.21 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7533b65e-3612-4c8e-8b67-3cbcb80b4331?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lazyest-gallery/" + google-query: inurl:"/wp-content/plugins/lazyest-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lazyest-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lazyest-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lazyest-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lb-mixed-slideshow-e098e9eac7599a7bcc4cfaf12c6fb3a1.yaml b/nuclei-templates/cve-less/plugins/lb-mixed-slideshow-e098e9eac7599a7bcc4cfaf12c6fb3a1.yaml new file mode 100644 index 0000000000..7b070a2a09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lb-mixed-slideshow-e098e9eac7599a7bcc4cfaf12c6fb3a1.yaml @@ -0,0 +1,58 @@ +id: lb-mixed-slideshow-e098e9eac7599a7bcc4cfaf12c6fb3a1 + +info: + name: > + LB Mixed Slideshow for WordPress <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18557f4a-05b2-4cb4-afef-19c5c63c37a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lb-mixed-slideshow/" + google-query: inurl:"/wp-content/plugins/lb-mixed-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lb-mixed-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lb-mixed-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lb-mixed-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lb-tube-video-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/lb-tube-video-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..b9f6149f17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lb-tube-video-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: lb-tube-video-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lb-tube-video/" + google-query: inurl:"/wp-content/plugins/lb-tube-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lb-tube-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lb-tube-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lb-tube-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lbg_zoominoutslider-20c21b977e576c86cae60978b4cded07.yaml b/nuclei-templates/cve-less/plugins/lbg_zoominoutslider-20c21b977e576c86cae60978b4cded07.yaml new file mode 100644 index 0000000000..8e38435c1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lbg_zoominoutslider-20c21b977e576c86cae60978b4cded07.yaml @@ -0,0 +1,58 @@ +id: lbg_zoominoutslider-20c21b977e576c86cae60978b4cded07 + +info: + name: > + Responsive Zoom In/Out Slider WordPress Plugin (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3fb6a84-2339-4d5c-a88a-f8e08a940840?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lbg_zoominoutslider/" + google-query: inurl:"/wp-content/plugins/lbg_zoominoutslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lbg_zoominoutslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lbg_zoominoutslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lbg_zoominoutslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lbg_zoominoutslider-4bda697ca3ea7c8fca810d0d8ce167ae.yaml b/nuclei-templates/cve-less/plugins/lbg_zoominoutslider-4bda697ca3ea7c8fca810d0d8ce167ae.yaml new file mode 100644 index 0000000000..0783c7f959 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lbg_zoominoutslider-4bda697ca3ea7c8fca810d0d8ce167ae.yaml @@ -0,0 +1,58 @@ +id: lbg_zoominoutslider-4bda697ca3ea7c8fca810d0d8ce167ae + +info: + name: > + Responsive Zoom In/Out Slider WordPress Plugin (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63a456e3-5bae-4a4b-850f-b35134de4cfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lbg_zoominoutslider/" + google-query: inurl:"/wp-content/plugins/lbg_zoominoutslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lbg_zoominoutslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lbg_zoominoutslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lbg_zoominoutslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lbstopattack-fdd4bded1dfa98b42ec68b8794019fbd.yaml b/nuclei-templates/cve-less/plugins/lbstopattack-fdd4bded1dfa98b42ec68b8794019fbd.yaml new file mode 100644 index 0000000000..b06a607f23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lbstopattack-fdd4bded1dfa98b42ec68b8794019fbd.yaml @@ -0,0 +1,58 @@ +id: lbstopattack-fdd4bded1dfa98b42ec68b8794019fbd + +info: + name: > + Plugin LBstopattack <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8da2619f-bc41-4088-9192-902b3c24ec5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lbstopattack/" + google-query: inurl:"/wp-content/plugins/lbstopattack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lbstopattack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lbstopattack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lbstopattack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-ad-staff-employee-directory-search-5fb9868893588947cd0894306db3f85c.yaml b/nuclei-templates/cve-less/plugins/ldap-ad-staff-employee-directory-search-5fb9868893588947cd0894306db3f85c.yaml new file mode 100644 index 0000000000..ffbaf4ff29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-ad-staff-employee-directory-search-5fb9868893588947cd0894306db3f85c.yaml @@ -0,0 +1,58 @@ +id: ldap-ad-staff-employee-directory-search-5fb9868893588947cd0894306db3f85c + +info: + name: > + Staff / Employee Business Directory for Active Directory <= 1.2.1 - Insufficient Escaping of Stored LDAP Values + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1355e9f-fa3a-439a-a13f-49b10dd4473a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-ad-staff-employee-directory-search/" + google-query: inurl:"/wp-content/plugins/ldap-ad-staff-employee-directory-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-ad-staff-employee-directory-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-ad-staff-employee-directory-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-ad-staff-employee-directory-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-ad-staff-employee-directory-search-b2d04a137f03b4bce0a603349a0a67e2.yaml b/nuclei-templates/cve-less/plugins/ldap-ad-staff-employee-directory-search-b2d04a137f03b4bce0a603349a0a67e2.yaml new file mode 100644 index 0000000000..18d9199908 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-ad-staff-employee-directory-search-b2d04a137f03b4bce0a603349a0a67e2.yaml @@ -0,0 +1,58 @@ +id: ldap-ad-staff-employee-directory-search-b2d04a137f03b4bce0a603349a0a67e2 + +info: + name: > + Staff / Employee Business Directory for Active Directory <= 1.2.3 - Authenticated (Admin+) LDAP Passback + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ea40b96-4693-4f98-8e6e-2ed8186cedd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-ad-staff-employee-directory-search/" + google-query: inurl:"/wp-content/plugins/ldap-ad-staff-employee-directory-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-ad-staff-employee-directory-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-ad-staff-employee-directory-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-ad-staff-employee-directory-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-10a0d810b2c87af5b6ac2f20a36975ae.yaml b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-10a0d810b2c87af5b6ac2f20a36975ae.yaml new file mode 100644 index 0000000000..544b9ecc5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-10a0d810b2c87af5b6ac2f20a36975ae.yaml @@ -0,0 +1,58 @@ +id: ldap-login-for-intranet-sites-10a0d810b2c87af5b6ac2f20a36975ae + +info: + name: > + Active Directory Integration / LDAP Integration <= 4.1.10 - LDAP Passback + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0585969d-dd08-4058-9d72-138a55a2cdf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-login-for-intranet-sites/" + google-query: inurl:"/wp-content/plugins/ldap-login-for-intranet-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-login-for-intranet-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-login-for-intranet-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-login-for-intranet-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-3662e536f344cad7ead518a87b44f9b9.yaml b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-3662e536f344cad7ead518a87b44f9b9.yaml new file mode 100644 index 0000000000..177432dc7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-3662e536f344cad7ead518a87b44f9b9.yaml @@ -0,0 +1,58 @@ +id: ldap-login-for-intranet-sites-3662e536f344cad7ead518a87b44f9b9 + +info: + name: > + Active Directory Integration / LDAP Integration <= 4.1.4 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3eedc57b-79cc-4569-b6d6-676a22aa1e06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-login-for-intranet-sites/" + google-query: inurl:"/wp-content/plugins/ldap-login-for-intranet-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-login-for-intranet-sites,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-login-for-intranet-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-login-for-intranet-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-3ac7913de6e3ab3bdc9b5e42fbbe516c.yaml b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-3ac7913de6e3ab3bdc9b5e42fbbe516c.yaml new file mode 100644 index 0000000000..3e19fe9a0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-3ac7913de6e3ab3bdc9b5e42fbbe516c.yaml @@ -0,0 +1,58 @@ +id: ldap-login-for-intranet-sites-3ac7913de6e3ab3bdc9b5e42fbbe516c + +info: + name: > + Active Directory Integration / LDAP Integration <= 4.1.5 - Authenticated (Subscriber+) LDAP Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7553e8-e43d-4740-b2ee-e3d8dc351e53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-login-for-intranet-sites/" + google-query: inurl:"/wp-content/plugins/ldap-login-for-intranet-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-login-for-intranet-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-login-for-intranet-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-login-for-intranet-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-620886ffa263a68ff12dd7501ad110dd.yaml b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-620886ffa263a68ff12dd7501ad110dd.yaml new file mode 100644 index 0000000000..b7d4ad6cd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-620886ffa263a68ff12dd7501ad110dd.yaml @@ -0,0 +1,58 @@ +id: ldap-login-for-intranet-sites-620886ffa263a68ff12dd7501ad110dd + +info: + name: > + Active Directory Integration / LDAP Integration <= 3.6.94 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f77d41a-8b72-412f-9560-267bc50f9aec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-login-for-intranet-sites/" + google-query: inurl:"/wp-content/plugins/ldap-login-for-intranet-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-login-for-intranet-sites,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-login-for-intranet-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-login-for-intranet-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-8871ef770441f03d651279dadfcbfd9f.yaml b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-8871ef770441f03d651279dadfcbfd9f.yaml new file mode 100644 index 0000000000..f8015e8acf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-8871ef770441f03d651279dadfcbfd9f.yaml @@ -0,0 +1,58 @@ +id: ldap-login-for-intranet-sites-8871ef770441f03d651279dadfcbfd9f + +info: + name: > + Active Directory Integration / LDAP Integration <= 4.1.4 - Cross-Site Request Forgery to SQL Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74089b16-76fa-4654-9007-3f0c2e894894?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-login-for-intranet-sites/" + google-query: inurl:"/wp-content/plugins/ldap-login-for-intranet-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-login-for-intranet-sites,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-login-for-intranet-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-login-for-intranet-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-984ae033ae8ed023b8d291a56d4420e2.yaml b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-984ae033ae8ed023b8d291a56d4420e2.yaml new file mode 100644 index 0000000000..8ec84bd518 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-984ae033ae8ed023b8d291a56d4420e2.yaml @@ -0,0 +1,58 @@ +id: ldap-login-for-intranet-sites-984ae033ae8ed023b8d291a56d4420e2 + +info: + name: > + Active Directory Integration / LDAP Integration <= 4.1.9 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a15ab92-2142-43cb-9600-f4cfa164de31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-login-for-intranet-sites/" + google-query: inurl:"/wp-content/plugins/ldap-login-for-intranet-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-login-for-intranet-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-login-for-intranet-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-login-for-intranet-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-9beaf57f0310a4e1b4eebc1c61cd56e0.yaml b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-9beaf57f0310a4e1b4eebc1c61cd56e0.yaml new file mode 100644 index 0000000000..08259a0f9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-9beaf57f0310a4e1b4eebc1c61cd56e0.yaml @@ -0,0 +1,58 @@ +id: ldap-login-for-intranet-sites-9beaf57f0310a4e1b4eebc1c61cd56e0 + +info: + name: > + Active Directory Integration / LDAP Integration <= 4.1.9 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c667631-7934-467e-baa2-7c3b0160c3a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-login-for-intranet-sites/" + google-query: inurl:"/wp-content/plugins/ldap-login-for-intranet-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-login-for-intranet-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-login-for-intranet-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-login-for-intranet-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-c703e23611edc1b7f4c547a3de6e5a54.yaml b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-c703e23611edc1b7f4c547a3de6e5a54.yaml new file mode 100644 index 0000000000..2e6753e576 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-login-for-intranet-sites-c703e23611edc1b7f4c547a3de6e5a54.yaml @@ -0,0 +1,58 @@ +id: ldap-login-for-intranet-sites-c703e23611edc1b7f4c547a3de6e5a54 + +info: + name: > + Active Directory Integration / LDAP Integration <= 4.1.0 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2568018b-29f3-4261-ae0d-658ca9d96846?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-login-for-intranet-sites/" + google-query: inurl:"/wp-content/plugins/ldap-login-for-intranet-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-login-for-intranet-sites,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-login-for-intranet-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-login-for-intranet-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldap-wp-login-integration-with-active-directory-f8cd51c51fa81f86666de16c04486eac.yaml b/nuclei-templates/cve-less/plugins/ldap-wp-login-integration-with-active-directory-f8cd51c51fa81f86666de16c04486eac.yaml new file mode 100644 index 0000000000..afbf27ea85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldap-wp-login-integration-with-active-directory-f8cd51c51fa81f86666de16c04486eac.yaml @@ -0,0 +1,58 @@ +id: ldap-wp-login-integration-with-active-directory-f8cd51c51fa81f86666de16c04486eac + +info: + name: > + Ldap WP Login / Active Directory Integration <= 3.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63412848-6b1f-460a-8776-cd1cc5eb002e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldap-wp-login-integration-with-active-directory/" + google-query: inurl:"/wp-content/plugins/ldap-wp-login-integration-with-active-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldap-wp-login-integration-with-active-directory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldap-wp-login-integration-with-active-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldap-wp-login-integration-with-active-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ldd-directory-lite-fb41ea027051c6c12e4e7b22c9f918d2.yaml b/nuclei-templates/cve-less/plugins/ldd-directory-lite-fb41ea027051c6c12e4e7b22c9f918d2.yaml new file mode 100644 index 0000000000..ffccd0abeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ldd-directory-lite-fb41ea027051c6c12e4e7b22c9f918d2.yaml @@ -0,0 +1,58 @@ +id: ldd-directory-lite-fb41ea027051c6c12e4e7b22c9f918d2 + +info: + name: > + LDD Directory Lite - <= 3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f374eea-e6c0-4007-8855-4b1b63335775?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ldd-directory-lite/" + google-query: inurl:"/wp-content/plugins/ldd-directory-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ldd-directory-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ldd-directory-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ldd-directory-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-capturing-call-to-actions-by-vcita-730361678b13f8f0736a72594b63e5d4.yaml b/nuclei-templates/cve-less/plugins/lead-capturing-call-to-actions-by-vcita-730361678b13f8f0736a72594b63e5d4.yaml new file mode 100644 index 0000000000..f20bf7db8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-capturing-call-to-actions-by-vcita-730361678b13f8f0736a72594b63e5d4.yaml @@ -0,0 +1,58 @@ +id: lead-capturing-call-to-actions-by-vcita-730361678b13f8f0736a72594b63e5d4 + +info: + name: > + Contact Form and Calls To Action by vcita <= 2.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dfc237a-9157-4da9-ba8f-9daf2ba4f20b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-capturing-call-to-actions-by-vcita/" + google-query: inurl:"/wp-content/plugins/lead-capturing-call-to-actions-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-capturing-call-to-actions-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-capturing-call-to-actions-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-capturing-call-to-actions-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-form-builder-052c2263d304ba99984110ed21050e99.yaml b/nuclei-templates/cve-less/plugins/lead-form-builder-052c2263d304ba99984110ed21050e99.yaml new file mode 100644 index 0000000000..6bd6466f2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-form-builder-052c2263d304ba99984110ed21050e99.yaml @@ -0,0 +1,58 @@ +id: lead-form-builder-052c2263d304ba99984110ed21050e99 + +info: + name: > + Contact Form & Lead Form Elementor Builder <= 1.6.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f86449-144c-494f-85d8-ce7c8d7d65d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-form-builder/" + google-query: inurl:"/wp-content/plugins/lead-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-form-builder-096938bf849592b8e6a6dbaccc2157aa.yaml b/nuclei-templates/cve-less/plugins/lead-form-builder-096938bf849592b8e6a6dbaccc2157aa.yaml new file mode 100644 index 0000000000..46a816075f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-form-builder-096938bf849592b8e6a6dbaccc2157aa.yaml @@ -0,0 +1,58 @@ +id: lead-form-builder-096938bf849592b8e6a6dbaccc2157aa + +info: + name: > + Contact Form & Lead Form Elementor Builder < 1.7.4 - Arbitrary Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e999f4c0-03dd-4ea3-9245-b12ffd8da3e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-form-builder/" + google-query: inurl:"/wp-content/plugins/lead-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-form-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-form-builder-9baae5fb51d9dd1141e1931574d9d7be.yaml b/nuclei-templates/cve-less/plugins/lead-form-builder-9baae5fb51d9dd1141e1931574d9d7be.yaml new file mode 100644 index 0000000000..931a20b716 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-form-builder-9baae5fb51d9dd1141e1931574d9d7be.yaml @@ -0,0 +1,58 @@ +id: lead-form-builder-9baae5fb51d9dd1141e1931574d9d7be + +info: + name: > + Multiple Plugins By ThemeHunk (Various Versions) - Missing Authorization via settings_init + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826a3fa2-ee41-4960-becb-0df8813a964a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-form-builder/" + google-query: inurl:"/wp-content/plugins/lead-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-form-builder-a64ff7d479ea82b36b6d5de70a97fbae.yaml b/nuclei-templates/cve-less/plugins/lead-form-builder-a64ff7d479ea82b36b6d5de70a97fbae.yaml new file mode 100644 index 0000000000..6a1b287613 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-form-builder-a64ff7d479ea82b36b6d5de70a97fbae.yaml @@ -0,0 +1,58 @@ +id: lead-form-builder-a64ff7d479ea82b36b6d5de70a97fbae + +info: + name: > + Responsive Contact Form Builder & Lead Generation Plugin <= 1.8.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d087957c-0dd5-46a9-a6bc-85f2f79f43bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-form-builder/" + google-query: inurl:"/wp-content/plugins/lead-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-form-builder-ae016ddc716d42a85477445c62a5e437.yaml b/nuclei-templates/cve-less/plugins/lead-form-builder-ae016ddc716d42a85477445c62a5e437.yaml new file mode 100644 index 0000000000..7ba4216cc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-form-builder-ae016ddc716d42a85477445c62a5e437.yaml @@ -0,0 +1,58 @@ +id: lead-form-builder-ae016ddc716d42a85477445c62a5e437 + +info: + name: > + Responsive Contact Form Builder & Lead Generation Plugin < 1.7.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fbcab49-5765-497b-a98e-d87c5b468b11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-form-builder/" + google-query: inurl:"/wp-content/plugins/lead-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-form-builder-d46f40f2ab613d8e339074ed1d986191.yaml b/nuclei-templates/cve-less/plugins/lead-form-builder-d46f40f2ab613d8e339074ed1d986191.yaml new file mode 100644 index 0000000000..2b776832a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-form-builder-d46f40f2ab613d8e339074ed1d986191.yaml @@ -0,0 +1,58 @@ +id: lead-form-builder-d46f40f2ab613d8e339074ed1d986191 + +info: + name: > + Responsive Contact Form Builder & Lead Generation Plugin <= 1.8.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2f5a49a-117a-473c-8853-ed292eece620?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-form-builder/" + google-query: inurl:"/wp-content/plugins/lead-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-form-builder-de55ae6e76c91a89ee0e3689f89fe0d9.yaml b/nuclei-templates/cve-less/plugins/lead-form-builder-de55ae6e76c91a89ee0e3689f89fe0d9.yaml new file mode 100644 index 0000000000..aab48b7fe4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-form-builder-de55ae6e76c91a89ee0e3689f89fe0d9.yaml @@ -0,0 +1,58 @@ +id: lead-form-builder-de55ae6e76c91a89ee0e3689f89fe0d9 + +info: + name: > + Responsive Contact Form Builder & Lead Generation Plugin <= 1.8.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8ce9ab4-d6d6-4e06-a042-145db02cf7ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-form-builder/" + google-query: inurl:"/wp-content/plugins/lead-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-generated-9a53cdf71ae16cc8f18244beb584e5b3.yaml b/nuclei-templates/cve-less/plugins/lead-generated-9a53cdf71ae16cc8f18244beb584e5b3.yaml new file mode 100644 index 0000000000..7fa8f41a22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-generated-9a53cdf71ae16cc8f18244beb584e5b3.yaml @@ -0,0 +1,58 @@ +id: lead-generated-9a53cdf71ae16cc8f18244beb584e5b3 + +info: + name: > + Lead Generated <= 1.23 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12660851-c899-4ec2-b40e-e62391dafdbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lead-generated/" + google-query: inurl:"/wp-content/plugins/lead-generated/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lead-generated,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lead-generated/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lead-generated" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lead-octopus-power-9b2ea9b4d3e50f4a2171e20728a5e5ce.yaml b/nuclei-templates/cve-less/plugins/lead-octopus-power-9b2ea9b4d3e50f4a2171e20728a5e5ce.yaml new file mode 100644 index 0000000000..125481a948 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lead-octopus-power-9b2ea9b4d3e50f4a2171e20728a5e5ce.yaml @@ -0,0 +1,58 @@ +id: lead-octopus-power-9b2ea9b4d3e50f4a2171e20728a5e5ce + +info: + name: > + Lead Octopus Power < 1.1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8bbb54d-7607-4d19-bf2d-2d52a6de1287?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Lead-Octopus-Power/" + google-query: inurl:"/wp-content/plugins/Lead-Octopus-Power/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Lead-Octopus-Power,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Lead-Octopus-Power/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Lead-Octopus-Power" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leadconnector-ffa89e4112fdba734a5ff64b0534aeff.yaml b/nuclei-templates/cve-less/plugins/leadconnector-ffa89e4112fdba734a5ff64b0534aeff.yaml new file mode 100644 index 0000000000..0e1f965975 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leadconnector-ffa89e4112fdba734a5ff64b0534aeff.yaml @@ -0,0 +1,58 @@ +id: leadconnector-ffa89e4112fdba734a5ff64b0534aeff + +info: + name: > + LeadConnector <= 1.7 - Missing Authorization to Unauthenticated Arbitrary Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79e786ce-a3eb-40df-8dad-4c9c75243bec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leadconnector/" + google-query: inurl:"/wp-content/plugins/leadconnector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leadconnector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leadconnector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leadconnector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leadin-268919440c0c130df155e87fb1063e23.yaml b/nuclei-templates/cve-less/plugins/leadin-268919440c0c130df155e87fb1063e23.yaml new file mode 100644 index 0000000000..223ebb197b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leadin-268919440c0c130df155e87fb1063e23.yaml @@ -0,0 +1,58 @@ +id: leadin-268919440c0c130df155e87fb1063e23 + +info: + name: > + HubSpot – CRM, Email Marketing, Live Chat, Forms & Analytics <= 8.8.13 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66697f3e-c023-496d-b553-7d20352e33b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leadin/" + google-query: inurl:"/wp-content/plugins/leadin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leadin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leadin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leadin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.8.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leadinfo-657bb32b8f91f0127ec427c69158cd75.yaml b/nuclei-templates/cve-less/plugins/leadinfo-657bb32b8f91f0127ec427c69158cd75.yaml new file mode 100644 index 0000000000..98242d9927 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leadinfo-657bb32b8f91f0127ec427c69158cd75.yaml @@ -0,0 +1,58 @@ +id: leadinfo-657bb32b8f91f0127ec427c69158cd75 + +info: + name: > + Leadinfo <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e39d3ec1-b1a5-4176-88ac-432d91dbf621?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leadinfo/" + google-query: inurl:"/wp-content/plugins/leadinfo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leadinfo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leadinfo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leadinfo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leads-5050-visitor-insights-871f126d178a351c71d698539beb418c.yaml b/nuclei-templates/cve-less/plugins/leads-5050-visitor-insights-871f126d178a351c71d698539beb418c.yaml new file mode 100644 index 0000000000..e6227a11e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leads-5050-visitor-insights-871f126d178a351c71d698539beb418c.yaml @@ -0,0 +1,58 @@ +id: leads-5050-visitor-insights-871f126d178a351c71d698539beb418c + +info: + name: > + leads5050-visitor-insights < 1.0.4 - Unauthenticated Arbitrary License Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b05e973-c0ab-492f-8b51-e7c2f33475ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leads-5050-visitor-insights/" + google-query: inurl:"/wp-content/plugins/leads-5050-visitor-insights/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leads-5050-visitor-insights,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leads-5050-visitor-insights/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leads-5050-visitor-insights" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leads-5050-visitor-insights-f78d7ba708259da0523cabc0cbdbd7c5.yaml b/nuclei-templates/cve-less/plugins/leads-5050-visitor-insights-f78d7ba708259da0523cabc0cbdbd7c5.yaml new file mode 100644 index 0000000000..81d417c87e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leads-5050-visitor-insights-f78d7ba708259da0523cabc0cbdbd7c5.yaml @@ -0,0 +1,58 @@ +id: leads-5050-visitor-insights-f78d7ba708259da0523cabc0cbdbd7c5 + +info: + name: > + leads5050-visitor-insights <= 1.0.5 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15d9c743-5700-482a-a6bc-ecf541ea9e7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leads-5050-visitor-insights/" + google-query: inurl:"/wp-content/plugins/leads-5050-visitor-insights/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leads-5050-visitor-insights,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leads-5050-visitor-insights/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leads-5050-visitor-insights" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leads-bfe41c446963ca7621a719dd7519ca70.yaml b/nuclei-templates/cve-less/plugins/leads-bfe41c446963ca7621a719dd7519ca70.yaml new file mode 100644 index 0000000000..98c0970557 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leads-bfe41c446963ca7621a719dd7519ca70.yaml @@ -0,0 +1,58 @@ +id: leads-bfe41c446963ca7621a719dd7519ca70 + +info: + name: > + WordPress Leads < 1.6.3 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0227e5f0-61fa-4e78-9bd4-918fdde7ab58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leads/" + google-query: inurl:"/wp-content/plugins/leads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leadsnap-34c15700740b2cf80007fd2a16414756.yaml b/nuclei-templates/cve-less/plugins/leadsnap-34c15700740b2cf80007fd2a16414756.yaml new file mode 100644 index 0000000000..a23fb2f1c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leadsnap-34c15700740b2cf80007fd2a16414756.yaml @@ -0,0 +1,58 @@ +id: leadsnap-34c15700740b2cf80007fd2a16414756 + +info: + name: > + LeadSnap <= 1.23 - Unauthenticated PHP Object Injection via AJAX + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aefbebce-9433-455d-b27c-93088b0c8494?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leadsnap/" + google-query: inurl:"/wp-content/plugins/leadsnap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leadsnap,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leadsnap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leadsnap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leadsquared-suite-8668394708fedca0791c9dce209e6c21.yaml b/nuclei-templates/cve-less/plugins/leadsquared-suite-8668394708fedca0791c9dce209e6c21.yaml new file mode 100644 index 0000000000..f119e7a02b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leadsquared-suite-8668394708fedca0791c9dce209e6c21.yaml @@ -0,0 +1,58 @@ +id: leadsquared-suite-8668394708fedca0791c9dce209e6c21 + +info: + name: > + LeadSquared Suite <= 0.7.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef1aafc2-e47b-49da-8a4e-9111209308c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leadsquared-suite/" + google-query: inurl:"/wp-content/plugins/leadsquared-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leadsquared-suite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leadsquared-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leadsquared-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leadsquared-suite-fb9d67ae40f074a3d13bb91e383cd2e6.yaml b/nuclei-templates/cve-less/plugins/leadsquared-suite-fb9d67ae40f074a3d13bb91e383cd2e6.yaml new file mode 100644 index 0000000000..8d6b55e49c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leadsquared-suite-fb9d67ae40f074a3d13bb91e383cd2e6.yaml @@ -0,0 +1,58 @@ +id: leadsquared-suite-fb9d67ae40f074a3d13bb91e383cd2e6 + +info: + name: > + LeadSquared Suite <= 0.7.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8da42003-f2d8-4837-84b2-e0e7171fa3fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leadsquared-suite/" + google-query: inurl:"/wp-content/plugins/leadsquared-suite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leadsquared-suite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leadsquared-suite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leadsquared-suite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leadster-marketing-conversacional-35e6f9b545b9a3d3918e9b2b36941c18.yaml b/nuclei-templates/cve-less/plugins/leadster-marketing-conversacional-35e6f9b545b9a3d3918e9b2b36941c18.yaml new file mode 100644 index 0000000000..dcfc747db0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leadster-marketing-conversacional-35e6f9b545b9a3d3918e9b2b36941c18.yaml @@ -0,0 +1,58 @@ +id: leadster-marketing-conversacional-35e6f9b545b9a3d3918e9b2b36941c18 + +info: + name: > + Leadster <= 1.1.2 - Cross-Site Request Forgery via leadster_script_code_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86837f87-ea91-404a-92ac-38d1abf14cde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leadster-marketing-conversacional/" + google-query: inurl:"/wp-content/plugins/leadster-marketing-conversacional/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leadster-marketing-conversacional,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leadster-marketing-conversacional/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leadster-marketing-conversacional" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leadster-marketing-conversacional-c7398725776161b539e66b85a7395b11.yaml b/nuclei-templates/cve-less/plugins/leadster-marketing-conversacional-c7398725776161b539e66b85a7395b11.yaml new file mode 100644 index 0000000000..76fcab767a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leadster-marketing-conversacional-c7398725776161b539e66b85a7395b11.yaml @@ -0,0 +1,58 @@ +id: leadster-marketing-conversacional-c7398725776161b539e66b85a7395b11 + +info: + name: > + Leadster <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/361216af-b939-4ac1-ae06-97552d283670?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leadster-marketing-conversacional/" + google-query: inurl:"/wp-content/plugins/leadster-marketing-conversacional/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leadster-marketing-conversacional,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leadster-marketing-conversacional/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leadster-marketing-conversacional" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-map-0bd29affbc67a54bb066a76fed95c3b0.yaml b/nuclei-templates/cve-less/plugins/leaflet-map-0bd29affbc67a54bb066a76fed95c3b0.yaml new file mode 100644 index 0000000000..be746f3602 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-map-0bd29affbc67a54bb066a76fed95c3b0.yaml @@ -0,0 +1,58 @@ +id: leaflet-map-0bd29affbc67a54bb066a76fed95c3b0 + +info: + name: > + Leaflet Map < 3.0.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d7e56d-453f-4df0-8cf5-32d8bafc60d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-map/" + google-query: inurl:"/wp-content/plugins/leaflet-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-map-5c2752426bec20e3d652e4f604fa0685.yaml b/nuclei-templates/cve-less/plugins/leaflet-map-5c2752426bec20e3d652e4f604fa0685.yaml new file mode 100644 index 0000000000..a3862afe6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-map-5c2752426bec20e3d652e4f604fa0685.yaml @@ -0,0 +1,58 @@ +id: leaflet-map-5c2752426bec20e3d652e4f604fa0685 + +info: + name: > + Leaflet Map <= 3.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3084c9ab-00aa-4b8e-aa46-bd70b335ec77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-map/" + google-query: inurl:"/wp-content/plugins/leaflet-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-map-e97645e174e90e9260a0b981384daa6e.yaml b/nuclei-templates/cve-less/plugins/leaflet-map-e97645e174e90e9260a0b981384daa6e.yaml new file mode 100644 index 0000000000..1dc370c04b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-map-e97645e174e90e9260a0b981384daa6e.yaml @@ -0,0 +1,58 @@ +id: leaflet-map-e97645e174e90e9260a0b981384daa6e + +info: + name: > + Leaflet Map <= 2.23.3 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66dc7618-3d84-4a55-9bed-0f41415ed9e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-map/" + google-query: inurl:"/wp-content/plugins/leaflet-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-map,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-2729f42afbb3a34107349dbe43cc49c6.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-2729f42afbb3a34107349dbe43cc49c6.yaml new file mode 100644 index 0000000000..03543c5a83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-2729f42afbb3a34107349dbe43cc49c6.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-2729f42afbb3a34107349dbe43cc49c6 + +info: + name: > + Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) < 3.5.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f1856bc-6d57-416e-86e9-9114bbbe5c8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-7f6d3b4e502f3e87f036376c050085cb.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-7f6d3b4e502f3e87f036376c050085cb.yaml new file mode 100644 index 0000000000..3c4c055e5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-7f6d3b4e502f3e87f036376c050085cb.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-7f6d3b4e502f3e87f036376c050085cb + +info: + name: > + Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) <= 3.12.4 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4414b5d-9ce5-4378-ab41-c82ae3bebd6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-8015d391de62b785680b52c5ead73093.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-8015d391de62b785680b52c5ead73093.yaml new file mode 100644 index 0000000000..32d70bc677 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-8015d391de62b785680b52c5ead73093.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-8015d391de62b785680b52c5ead73093 + +info: + name: > + Leaflet Maps Marker < 3.12.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a73f3d93-198c-484c-bed5-59e477f3833e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-d4c7d6015d840d0227eb1573d5a3b347.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-d4c7d6015d840d0227eb1573d5a3b347.yaml new file mode 100644 index 0000000000..93667c350b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-d4c7d6015d840d0227eb1573d5a3b347.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-d4c7d6015d840d0227eb1573d5a3b347 + +info: + name: > + Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) < 2.3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d0eb69a-3c94-40c2-acdf-6310190197a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-fb54b510af0f0d5e8604602a7c9ddbef.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-fb54b510af0f0d5e8604602a7c9ddbef.yaml new file mode 100644 index 0000000000..57adf0d387 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-fb54b510af0f0d5e8604602a7c9ddbef.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-fb54b510af0f0d5e8604602a7c9ddbef + +info: + name: > + Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) <= 3.12.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62ace939-3c14-4e68-897b-ec845182ca50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-8110fb2b6c7df8f95ef8ae68b2cdb995.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-8110fb2b6c7df8f95ef8ae68b2cdb995.yaml new file mode 100644 index 0000000000..8f8af1ff6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-8110fb2b6c7df8f95ef8ae68b2cdb995.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-pro-8110fb2b6c7df8f95ef8ae68b2cdb995 + +info: + name: > + Leaflet Maps Marker Pro < 1.5.8 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68b4ef1f-93cc-4fbd-9713-9cbc6ad59f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker-pro/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-8ad67d1554931a18fcf5c6d8fecb94f0.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-8ad67d1554931a18fcf5c6d8fecb94f0.yaml new file mode 100644 index 0000000000..e4dd1babae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-8ad67d1554931a18fcf5c6d8fecb94f0.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-pro-8ad67d1554931a18fcf5c6d8fecb94f0 + +info: + name: > + Leaflet Maps Marker Pro < 1.5.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11c7abc5-1a41-4eab-b603-064baf978ddd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker-pro/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-a72c48218cac40242d4a9479585b4525.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-a72c48218cac40242d4a9479585b4525.yaml new file mode 100644 index 0000000000..a8d3863071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-a72c48218cac40242d4a9479585b4525.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-pro-a72c48218cac40242d4a9479585b4525 + +info: + name: > + Leaflet Maps Marker Pro < 1.5.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11349bc4-b432-4225-82a4-30bc9d0057f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker-pro/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-f0f87fab2cfab311f11b9a274d616536.yaml b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-f0f87fab2cfab311f11b9a274d616536.yaml new file mode 100644 index 0000000000..27b8c8ddc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaflet-maps-marker-pro-f0f87fab2cfab311f11b9a274d616536.yaml @@ -0,0 +1,58 @@ +id: leaflet-maps-marker-pro-f0f87fab2cfab311f11b9a274d616536 + +info: + name: > + Leaflet Maps Marker Pro < 1.5.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da95e282-54b9-4296-99f3-9187c04dcaac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaflet-maps-marker-pro/" + google-query: inurl:"/wp-content/plugins/leaflet-maps-marker-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaflet-maps-marker-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaflet-maps-marker-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaflet-maps-marker-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/league-table-lite-a485120e585260a017fc72fe127dae66.yaml b/nuclei-templates/cve-less/plugins/league-table-lite-a485120e585260a017fc72fe127dae66.yaml new file mode 100644 index 0000000000..ddc581afe4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/league-table-lite-a485120e585260a017fc72fe127dae66.yaml @@ -0,0 +1,58 @@ +id: league-table-lite-a485120e585260a017fc72fe127dae66 + +info: + name: > + League Table <= 1.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef7ec175-cee5-4559-909d-ee689158d67c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/league-table-lite/" + google-query: inurl:"/wp-content/plugins/league-table-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,league-table-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/league-table-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "league-table-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaguemanager-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml b/nuclei-templates/cve-less/plugins/leaguemanager-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml new file mode 100644 index 0000000000..272566a309 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaguemanager-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml @@ -0,0 +1,58 @@ +id: leaguemanager-ccd9eb7d8d7c7fdd585ed7aff289426f + +info: + name: > + LeagueManager < 3.8.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea0d1acc-d2c9-4851-9753-d87587236d7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaguemanager/" + google-query: inurl:"/wp-content/plugins/leaguemanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaguemanager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaguemanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaguemanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaguemanager-d0e94011e5fe6201731b0911afc2291e.yaml b/nuclei-templates/cve-less/plugins/leaguemanager-d0e94011e5fe6201731b0911afc2291e.yaml new file mode 100644 index 0000000000..318bb6790b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaguemanager-d0e94011e5fe6201731b0911afc2291e.yaml @@ -0,0 +1,58 @@ +id: leaguemanager-d0e94011e5fe6201731b0911afc2291e + +info: + name: > + LeagueManager <= 3.7 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/535af5fa-891b-4d21-ab13-c4ef68dd339b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaguemanager/" + google-query: inurl:"/wp-content/plugins/leaguemanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaguemanager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaguemanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaguemanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaguemanager-d95d6ea5b7b9ab6b188b96396997c452.yaml b/nuclei-templates/cve-less/plugins/leaguemanager-d95d6ea5b7b9ab6b188b96396997c452.yaml new file mode 100644 index 0000000000..918a470024 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaguemanager-d95d6ea5b7b9ab6b188b96396997c452.yaml @@ -0,0 +1,58 @@ +id: leaguemanager-d95d6ea5b7b9ab6b188b96396997c452 + +info: + name: > + LeagueManager < 4.0.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6213e09-8a97-44cf-85ef-83179d79206c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaguemanager/" + google-query: inurl:"/wp-content/plugins/leaguemanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaguemanager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaguemanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaguemanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaky-paywall-58a6911fd3193aa0bffa110e873b9369.yaml b/nuclei-templates/cve-less/plugins/leaky-paywall-58a6911fd3193aa0bffa110e873b9369.yaml new file mode 100644 index 0000000000..aa28f96788 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaky-paywall-58a6911fd3193aa0bffa110e873b9369.yaml @@ -0,0 +1,58 @@ +id: leaky-paywall-58a6911fd3193aa0bffa110e873b9369 + +info: + name: > + Leaky Paywall <= 4.16.5 Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ad7fd59-e4a2-46e7-9232-d76255a6b0b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaky-paywall/" + google-query: inurl:"/wp-content/plugins/leaky-paywall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaky-paywall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaky-paywall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaky-paywall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leaky-paywall-9dd9621e217d263471711af1462b33c0.yaml b/nuclei-templates/cve-less/plugins/leaky-paywall-9dd9621e217d263471711af1462b33c0.yaml new file mode 100644 index 0000000000..0afb874988 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leaky-paywall-9dd9621e217d263471711af1462b33c0.yaml @@ -0,0 +1,58 @@ +id: leaky-paywall-9dd9621e217d263471711af1462b33c0 + +info: + name: > + Leaky Paywall <= 4.20.8 - Missing Authorization to Price Manipulation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f627f0-779c-4d57-a471-ce742e3a5dd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leaky-paywall/" + google-query: inurl:"/wp-content/plugins/leaky-paywall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leaky-paywall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leaky-paywall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leaky-paywall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.20.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lean-wp-6cdc10306b381cbc45add2c281d72434.yaml b/nuclei-templates/cve-less/plugins/lean-wp-6cdc10306b381cbc45add2c281d72434.yaml new file mode 100644 index 0000000000..7e7d52f973 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lean-wp-6cdc10306b381cbc45add2c281d72434.yaml @@ -0,0 +1,58 @@ +id: lean-wp-6cdc10306b381cbc45add2c281d72434 + +info: + name: > + Lean WP <= 1.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/452e9acc-4029-4f43-9941-c1aa2a413e34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lean-wp/" + google-query: inurl:"/wp-content/plugins/lean-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lean-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lean-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lean-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learn-manager-ad546711ae594c4c52f6942c35b5d00b.yaml b/nuclei-templates/cve-less/plugins/learn-manager-ad546711ae594c4c52f6942c35b5d00b.yaml new file mode 100644 index 0000000000..7eda32c2b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learn-manager-ad546711ae594c4c52f6942c35b5d00b.yaml @@ -0,0 +1,58 @@ +id: learn-manager-ad546711ae594c4c52f6942c35b5d00b + +info: + name: > + WP LMS – Best WordPress LMS Plugin <= 1.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92cdb716-8e45-41ea-8805-527d20a4bcb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learn-manager/" + google-query: inurl:"/wp-content/plugins/learn-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learn-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learn-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learn-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learn-manager-e199f05b41749995376359e6d56e2316.yaml b/nuclei-templates/cve-less/plugins/learn-manager-e199f05b41749995376359e6d56e2316.yaml new file mode 100644 index 0000000000..6d04a81bac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learn-manager-e199f05b41749995376359e6d56e2316.yaml @@ -0,0 +1,58 @@ +id: learn-manager-e199f05b41749995376359e6d56e2316 + +info: + name: > + WP LMS – Best WordPress LMS Plugin <= 1.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2defe79-137f-45a0-85a1-f61dce9afd28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learn-manager/" + google-query: inurl:"/wp-content/plugins/learn-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learn-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learn-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learn-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learning-management-system-8cf11b7a12ed4b53c21429a42b2dad73.yaml b/nuclei-templates/cve-less/plugins/learning-management-system-8cf11b7a12ed4b53c21429a42b2dad73.yaml new file mode 100644 index 0000000000..7341bea6ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learning-management-system-8cf11b7a12ed4b53c21429a42b2dad73.yaml @@ -0,0 +1,58 @@ +id: learning-management-system-8cf11b7a12ed4b53c21429a42b2dad73 + +info: + name: > + Masteriyo - LMS for WordPress <= 1.6.7 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e8933b8-1e09-4cd7-8206-711cc0716dba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learning-management-system/" + google-query: inurl:"/wp-content/plugins/learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learning-management-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learning-management-system-b7a48cf548d48b851bf88b40be93ae49.yaml b/nuclei-templates/cve-less/plugins/learning-management-system-b7a48cf548d48b851bf88b40be93ae49.yaml new file mode 100644 index 0000000000..7565a9adbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learning-management-system-b7a48cf548d48b851bf88b40be93ae49.yaml @@ -0,0 +1,58 @@ +id: learning-management-system-b7a48cf548d48b851bf88b40be93ae49 + +info: + name: > + Masteriyo - LMS <= 1.7.2 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cf1276b-401d-4166-940e-e5d60f85e762?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learning-management-system/" + google-query: inurl:"/wp-content/plugins/learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learning-management-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learning-management-system-f3b11694ac1b5d77b57c36945d67adf9.yaml b/nuclei-templates/cve-less/plugins/learning-management-system-f3b11694ac1b5d77b57c36945d67adf9.yaml new file mode 100644 index 0000000000..d160b1c529 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learning-management-system-f3b11694ac1b5d77b57c36945d67adf9.yaml @@ -0,0 +1,58 @@ +id: learning-management-system-f3b11694ac1b5d77b57c36945d67adf9 + +info: + name: > + Masteriyo - LMS <= 1.7.3 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0173e2a3-452d-490b-8ed7-a049a476d137?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learning-management-system/" + google-query: inurl:"/wp-content/plugins/learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learning-management-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-087877bec152b3c6056ae543a1948ff7.yaml b/nuclei-templates/cve-less/plugins/learnpress-087877bec152b3c6056ae543a1948ff7.yaml new file mode 100644 index 0000000000..b793963b32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-087877bec152b3c6056ae543a1948ff7.yaml @@ -0,0 +1,58 @@ +id: learnpress-087877bec152b3c6056ae543a1948ff7 + +info: + name: > + LearnPress <= 4.1.7.3.2 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3fe07df-3589-4767-a81d-a6b72c5ab1a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml b/nuclei-templates/cve-less/plugins/learnpress-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml new file mode 100644 index 0000000000..edc7634884 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml @@ -0,0 +1,58 @@ +id: learnpress-1090bbe0593e4ecda3fb75c3e6d7bf93 + +info: + name: > + LearnPress <= 3.2.6.8 - Authenticated Page Creation and Status Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a639d27-8704-4841-b2b5-6afbf342a0ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-12497cf3a1ab73f82504a379a27c0f10.yaml b/nuclei-templates/cve-less/plugins/learnpress-12497cf3a1ab73f82504a379a27c0f10.yaml new file mode 100644 index 0000000000..d1554487db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-12497cf3a1ab73f82504a379a27c0f10.yaml @@ -0,0 +1,58 @@ +id: learnpress-12497cf3a1ab73f82504a379a27c0f10 + +info: + name: > + LearnPress <= 4.2.5.7 - Unauthenticated SQL Injection via order_by + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ab578cd-3a0b-43d3-aaa7-0a01f431a4e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-12b3926da3c13269ad9e1faadb8734ac.yaml b/nuclei-templates/cve-less/plugins/learnpress-12b3926da3c13269ad9e1faadb8734ac.yaml new file mode 100644 index 0000000000..e9b3755e5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-12b3926da3c13269ad9e1faadb8734ac.yaml @@ -0,0 +1,58 @@ +id: learnpress-12b3926da3c13269ad9e1faadb8734ac + +info: + name: > + LearnPress <= 4.1.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4122a963-b8e2-448a-b268-3192613fa3df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-1f34156a3d4672d58e020bb5b55f0b64.yaml b/nuclei-templates/cve-less/plugins/learnpress-1f34156a3d4672d58e020bb5b55f0b64.yaml new file mode 100644 index 0000000000..f0ec933264 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-1f34156a3d4672d58e020bb5b55f0b64.yaml @@ -0,0 +1,58 @@ +id: learnpress-1f34156a3d4672d58e020bb5b55f0b64 + +info: + name: > + LearnPress <= 4.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e91e864a-20f6-48a2-ab9f-d20836207383?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-35cfad6b28404a58bea291114a1dac41.yaml b/nuclei-templates/cve-less/plugins/learnpress-35cfad6b28404a58bea291114a1dac41.yaml new file mode 100644 index 0000000000..900cb95df4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-35cfad6b28404a58bea291114a1dac41.yaml @@ -0,0 +1,58 @@ +id: learnpress-35cfad6b28404a58bea291114a1dac41 + +info: + name: > + LearnPress – WordPress LMS Plugin <= 4.2.6.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via layout_html Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46693edf-bcc6-4af8-9f26-5ede865f4694?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-3cc56a7c67e3f1095ccd425af8f1f8bf.yaml b/nuclei-templates/cve-less/plugins/learnpress-3cc56a7c67e3f1095ccd425af8f1f8bf.yaml new file mode 100644 index 0000000000..775ced55f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-3cc56a7c67e3f1095ccd425af8f1f8bf.yaml @@ -0,0 +1,58 @@ +id: learnpress-3cc56a7c67e3f1095ccd425af8f1f8bf + +info: + name: > + LearnPress – WordPress LMS Plugin <= 4.1.6.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7bee25e-7574-4d3d-ad58-9b30d99de525?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-3efe74d4dfd2ffb7e9340cb78fbbba24.yaml b/nuclei-templates/cve-less/plugins/learnpress-3efe74d4dfd2ffb7e9340cb78fbbba24.yaml new file mode 100644 index 0000000000..8aed931cde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-3efe74d4dfd2ffb7e9340cb78fbbba24.yaml @@ -0,0 +1,58 @@ +id: learnpress-3efe74d4dfd2ffb7e9340cb78fbbba24 + +info: + name: > + LearnPress <= 4.2.6.3 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c410d91-08cc-496d-9c8e-c57f107399da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-4b10ad9364b379816e8420c4f6c13bb4.yaml b/nuclei-templates/cve-less/plugins/learnpress-4b10ad9364b379816e8420c4f6c13bb4.yaml new file mode 100644 index 0000000000..5647d43644 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-4b10ad9364b379816e8420c4f6c13bb4.yaml @@ -0,0 +1,58 @@ +id: learnpress-4b10ad9364b379816e8420c4f6c13bb4 + +info: + name: > + LearnPress <= 4.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/782e30a7-6813-47b4-b447-d5f03dcb9dc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-52edc6613624a73f45b9edd81d15ffe1.yaml b/nuclei-templates/cve-less/plugins/learnpress-52edc6613624a73f45b9edd81d15ffe1.yaml new file mode 100644 index 0000000000..c13c04da7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-52edc6613624a73f45b9edd81d15ffe1.yaml @@ -0,0 +1,58 @@ +id: learnpress-52edc6613624a73f45b9edd81d15ffe1 + +info: + name: > + LearnPress <= 4.2.3 - Missing Authorization to Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea136a60-aa42-4577-88b6-a49c79098954?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-5b6638dc9ccd4becc08f9931fb9023fa.yaml b/nuclei-templates/cve-less/plugins/learnpress-5b6638dc9ccd4becc08f9931fb9023fa.yaml new file mode 100644 index 0000000000..0b4ea07766 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-5b6638dc9ccd4becc08f9931fb9023fa.yaml @@ -0,0 +1,58 @@ +id: learnpress-5b6638dc9ccd4becc08f9931fb9023fa + +info: + name: > + LearnPress – WordPress LMS Plugin <= 4.2.6.5 - Authenticated (Instructor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec20d5c4-4c41-4ec9-8d0a-ec8f03634f7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-665258488a89f334d44f72f086862e16.yaml b/nuclei-templates/cve-less/plugins/learnpress-665258488a89f334d44f72f086862e16.yaml new file mode 100644 index 0000000000..895bc55c39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-665258488a89f334d44f72f086862e16.yaml @@ -0,0 +1,58 @@ +id: learnpress-665258488a89f334d44f72f086862e16 + +info: + name: > + LearnPress – WordPress LMS Plugin <= 4.2.6.5 - Unauthenticated Bypass to User Registration + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9e1410f-10c9-4654-8b61-cfcdde696da7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-67ce6cd2d5f260a7edab2bfeb7b2a875.yaml b/nuclei-templates/cve-less/plugins/learnpress-67ce6cd2d5f260a7edab2bfeb7b2a875.yaml new file mode 100644 index 0000000000..f3b2e015dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-67ce6cd2d5f260a7edab2bfeb7b2a875.yaml @@ -0,0 +1,58 @@ +id: learnpress-67ce6cd2d5f260a7edab2bfeb7b2a875 + +info: + name: > + LearnPress – WordPress LMS Plugin <= 4.1.6.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca203777-84ea-47ab-bafc-f2cc8f778fcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-6d3b26eeb9dd4b508b1794df4cfed998.yaml b/nuclei-templates/cve-less/plugins/learnpress-6d3b26eeb9dd4b508b1794df4cfed998.yaml new file mode 100644 index 0000000000..b7bc525970 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-6d3b26eeb9dd4b508b1794df4cfed998.yaml @@ -0,0 +1,58 @@ +id: learnpress-6d3b26eeb9dd4b508b1794df4cfed998 + +info: + name: > + LearnPress <= 3.0.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e50a998e-b6f2-443a-83a9-299def2420c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-71196217c30f569c96ec1f5bb53b87d5.yaml b/nuclei-templates/cve-less/plugins/learnpress-71196217c30f569c96ec1f5bb53b87d5.yaml new file mode 100644 index 0000000000..80851345e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-71196217c30f569c96ec1f5bb53b87d5.yaml @@ -0,0 +1,58 @@ +id: learnpress-71196217c30f569c96ec1f5bb53b87d5 + +info: + name: > + LearnPress <= 3.2.6.6 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/822b5a6b-0be6-4511-bf5d-c32574f27865?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-7716b5ad1739bacc35b966f53febea57.yaml b/nuclei-templates/cve-less/plugins/learnpress-7716b5ad1739bacc35b966f53febea57.yaml new file mode 100644 index 0000000000..19170c2e90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-7716b5ad1739bacc35b966f53febea57.yaml @@ -0,0 +1,58 @@ +id: learnpress-7716b5ad1739bacc35b966f53febea57 + +info: + name: > + LearnPress <= 4.1.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4489d26b-dcdc-475c-b1e1-3626cc75ae75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml b/nuclei-templates/cve-less/plugins/learnpress-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml new file mode 100644 index 0000000000..f0455fa644 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml @@ -0,0 +1,58 @@ +id: learnpress-79a6d64a3a134f3b86c4ab9063f7bbeb + +info: + name: > + LearnPress <= 3.2.6.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d79432d-7977-4279-ac69-8e9db682800e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-7cd4e467091cf2ef9c11f5015a5e2616.yaml b/nuclei-templates/cve-less/plugins/learnpress-7cd4e467091cf2ef9c11f5015a5e2616.yaml new file mode 100644 index 0000000000..4dc6a16e7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-7cd4e467091cf2ef9c11f5015a5e2616.yaml @@ -0,0 +1,58 @@ +id: learnpress-7cd4e467091cf2ef9c11f5015a5e2616 + +info: + name: > + LearnPress <= 4.1.4.1 - Arbitrary Image Renaming + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5200ed9c-83dd-4f07-804c-2519932e5546?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-8ac95793b1af58e01fb386297987dde6.yaml b/nuclei-templates/cve-less/plugins/learnpress-8ac95793b1af58e01fb386297987dde6.yaml new file mode 100644 index 0000000000..64d81a10d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-8ac95793b1af58e01fb386297987dde6.yaml @@ -0,0 +1,58 @@ +id: learnpress-8ac95793b1af58e01fb386297987dde6 + +info: + name: > + LearnPress – WordPress LMS Plugin <= 4.2.6.5 - Unauthenticated Time-Based SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d64e1c6-1e25-4438-974d-b7da0979cc40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-8e805369c6f828c8254ff169ce6c85f4.yaml b/nuclei-templates/cve-less/plugins/learnpress-8e805369c6f828c8254ff169ce6c85f4.yaml new file mode 100644 index 0000000000..cfec80948c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-8e805369c6f828c8254ff169ce6c85f4.yaml @@ -0,0 +1,58 @@ +id: learnpress-8e805369c6f828c8254ff169ce6c85f4 + +info: + name: > + LearnPress <= 4.1.7.3.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34110479-2581-4710-82ff-1d53535d83e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-9300ac45be528f46650e4e8e9c810c53.yaml b/nuclei-templates/cve-less/plugins/learnpress-9300ac45be528f46650e4e8e9c810c53.yaml new file mode 100644 index 0000000000..518c1df7d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-9300ac45be528f46650e4e8e9c810c53.yaml @@ -0,0 +1,58 @@ +id: learnpress-9300ac45be528f46650e4e8e9c810c53 + +info: + name: > + LearnPress <= 4.1.7.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa7e74ee-fd66-41e2-babd-06bdfb32d013?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-99975e67153f43d6158ad376c50faa87.yaml b/nuclei-templates/cve-less/plugins/learnpress-99975e67153f43d6158ad376c50faa87.yaml new file mode 100644 index 0000000000..1ad5880137 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-99975e67153f43d6158ad376c50faa87.yaml @@ -0,0 +1,58 @@ +id: learnpress-99975e67153f43d6158ad376c50faa87 + +info: + name: > + LearnPress <= 4.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/389277fd-e47e-42df-9305-61ceedbcfb29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-a1074ed3b0484056994227f5bc722d4b.yaml b/nuclei-templates/cve-less/plugins/learnpress-a1074ed3b0484056994227f5bc722d4b.yaml new file mode 100644 index 0000000000..b2f0edc246 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-a1074ed3b0484056994227f5bc722d4b.yaml @@ -0,0 +1,58 @@ +id: learnpress-a1074ed3b0484056994227f5bc722d4b + +info: + name: > + LearnPress <= 4.2.5.7 - Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21291ed7-cdc0-4698-9ec4-8417160845ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-a3c23b348d99ad97eeba5901637fc834.yaml b/nuclei-templates/cve-less/plugins/learnpress-a3c23b348d99ad97eeba5901637fc834.yaml new file mode 100644 index 0000000000..922d188e0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-a3c23b348d99ad97eeba5901637fc834.yaml @@ -0,0 +1,58 @@ +id: learnpress-a3c23b348d99ad97eeba5901637fc834 + +info: + name: > + LearnPress – WordPress LMS Plugin <= 3.2.7.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f9e5212-caed-46db-bbf2-81c4df88439f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-a6e9d3ad722034f3a564750baa53887c.yaml b/nuclei-templates/cve-less/plugins/learnpress-a6e9d3ad722034f3a564750baa53887c.yaml new file mode 100644 index 0000000000..48f56f35c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-a6e9d3ad722034f3a564750baa53887c.yaml @@ -0,0 +1,58 @@ +id: learnpress-a6e9d3ad722034f3a564750baa53887c + +info: + name: > + LearnPress <= 4.1.3.1 - Stored Cross-Site Scripting via $custom_profile + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d652b50-9c9c-4418-bd6b-ae862a1c8786?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-b383deabc0a5d3fd85420cbb993138a3.yaml b/nuclei-templates/cve-less/plugins/learnpress-b383deabc0a5d3fd85420cbb993138a3.yaml new file mode 100644 index 0000000000..9b24eb02e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-b383deabc0a5d3fd85420cbb993138a3.yaml @@ -0,0 +1,58 @@ +id: learnpress-b383deabc0a5d3fd85420cbb993138a3 + +info: + name: > + LearnPress – WordPress LMS Plugin <= 4.0.0 - Cross-Site Request Forgery to Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/342a4482-f5d3-4cc9-a998-e3abac7142cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-c68a29c96ddfd9ef9aa3807b97890295.yaml b/nuclei-templates/cve-less/plugins/learnpress-c68a29c96ddfd9ef9aa3807b97890295.yaml new file mode 100644 index 0000000000..8e9d5513c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-c68a29c96ddfd9ef9aa3807b97890295.yaml @@ -0,0 +1,58 @@ +id: learnpress-c68a29c96ddfd9ef9aa3807b97890295 + +info: + name: > + LearnPress <= 3.2.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc91449a-7013-430d-bf7c-70175ea45114?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-c8400b062377f9f8018cda91a345e846.yaml b/nuclei-templates/cve-less/plugins/learnpress-c8400b062377f9f8018cda91a345e846.yaml new file mode 100644 index 0000000000..dcb35d43e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-c8400b062377f9f8018cda91a345e846.yaml @@ -0,0 +1,58 @@ +id: learnpress-c8400b062377f9f8018cda91a345e846 + +info: + name: > + LearnPress <= 4.2.5.7 - Insecure Direct Object Reference to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/215d5d9e-dabb-462d-8c51-952f8c497b78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-d5338c51a39110eb82434918065d2ccd.yaml b/nuclei-templates/cve-less/plugins/learnpress-d5338c51a39110eb82434918065d2ccd.yaml new file mode 100644 index 0000000000..ba5627c0d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-d5338c51a39110eb82434918065d2ccd.yaml @@ -0,0 +1,58 @@ +id: learnpress-d5338c51a39110eb82434918065d2ccd + +info: + name: > + LearnPress <= 3.0.12 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba16b100-6ee7-46ec-8868-4467a29048ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-d8c2f0e374c51f43e12982dec783de7d.yaml b/nuclei-templates/cve-less/plugins/learnpress-d8c2f0e374c51f43e12982dec783de7d.yaml new file mode 100644 index 0000000000..b8245d3781 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-d8c2f0e374c51f43e12982dec783de7d.yaml @@ -0,0 +1,58 @@ +id: learnpress-d8c2f0e374c51f43e12982dec783de7d + +info: + name: > + LearnPress <= 3.2.6.8 - Privilege Escalation via accept-to-be-teacher action parameter + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91f13d74-0ad9-4790-a534-e8ff1655f06f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-e165d1235715cb13a0ff33a2e71acdb3.yaml b/nuclei-templates/cve-less/plugins/learnpress-e165d1235715cb13a0ff33a2e71acdb3.yaml new file mode 100644 index 0000000000..99caac4272 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-e165d1235715cb13a0ff33a2e71acdb3.yaml @@ -0,0 +1,58 @@ +id: learnpress-e165d1235715cb13a0ff33a2e71acdb3 + +info: + name: > + LearnPress <= 4.1.7.3.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9890c852-a38d-4429-bd75-751bd0f986fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-ecf4e36c0bf9bffe5d8065599df28f54.yaml b/nuclei-templates/cve-less/plugins/learnpress-ecf4e36c0bf9bffe5d8065599df28f54.yaml new file mode 100644 index 0000000000..abd164c2e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-ecf4e36c0bf9bffe5d8065599df28f54.yaml @@ -0,0 +1,58 @@ +id: learnpress-ecf4e36c0bf9bffe5d8065599df28f54 + +info: + name: > + LearnPress – WordPress LMS Plugin <= 4.2.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea002da-bf37-4c6d-a46e-4f0e7f8968ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-eec19c37d540d2e27f564c70a69eb498.yaml b/nuclei-templates/cve-less/plugins/learnpress-eec19c37d540d2e27f564c70a69eb498.yaml new file mode 100644 index 0000000000..3812e635cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-eec19c37d540d2e27f564c70a69eb498.yaml @@ -0,0 +1,58 @@ +id: learnpress-eec19c37d540d2e27f564c70a69eb498 + +info: + name: > + LearnPress <= 4.2.5.3 - Reflected Cross-Site Scripting via add_internal_scripts_to_head + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81fd3ac1-91af-4cfa-ac4e-712beb4236c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-fdbdaaf65435bbd1ff18dc91bfebb894.yaml b/nuclei-templates/cve-less/plugins/learnpress-fdbdaaf65435bbd1ff18dc91bfebb894.yaml new file mode 100644 index 0000000000..df590fea04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-fdbdaaf65435bbd1ff18dc91bfebb894.yaml @@ -0,0 +1,58 @@ +id: learnpress-fdbdaaf65435bbd1ff18dc91bfebb894 + +info: + name: > + LearnPress <= 3.0.12 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cccdc9ea-7511-4588-9459-61c38000724d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-ffbfea6a2970df28e2afd4173682647a.yaml b/nuclei-templates/cve-less/plugins/learnpress-ffbfea6a2970df28e2afd4173682647a.yaml new file mode 100644 index 0000000000..df327d261a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-ffbfea6a2970df28e2afd4173682647a.yaml @@ -0,0 +1,58 @@ +id: learnpress-ffbfea6a2970df28e2afd4173682647a + +info: + name: > + LearnPress <= 4.2.6.3 - Authenticated(LP Instructor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abb4b617-884b-4e72-812f-5f23a0976ab6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress/" + google-query: inurl:"/wp-content/plugins/learnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-import-export-22e409e6170e1adf0b8466f8fe714d12.yaml b/nuclei-templates/cve-less/plugins/learnpress-import-export-22e409e6170e1adf0b8466f8fe714d12.yaml new file mode 100644 index 0000000000..158e3eb4a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-import-export-22e409e6170e1adf0b8466f8fe714d12.yaml @@ -0,0 +1,58 @@ +id: learnpress-import-export-22e409e6170e1adf0b8466f8fe714d12 + +info: + name: > + LearnPress Export Import <= 4.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/096ea1e3-a6c3-43c7-94f0-6c5617dd3fa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress-import-export/" + google-query: inurl:"/wp-content/plugins/learnpress-import-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress-import-export,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress-import-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress-import-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-import-export-3bfe2176ab2d6339c4363df34b9c843f.yaml b/nuclei-templates/cve-less/plugins/learnpress-import-export-3bfe2176ab2d6339c4363df34b9c843f.yaml new file mode 100644 index 0000000000..ea5f2fca9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-import-export-3bfe2176ab2d6339c4363df34b9c843f.yaml @@ -0,0 +1,58 @@ +id: learnpress-import-export-3bfe2176ab2d6339c4363df34b9c843f + +info: + name: > + LearnPress Export Import <= 4.0.3 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98a274eb-036f-44f1-861d-1cfea0b34d7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress-import-export/" + google-query: inurl:"/wp-content/plugins/learnpress-import-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress-import-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress-import-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress-import-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/learnpress-import-export-bcce3c1d97bc388506a917ca0cc1d4ac.yaml b/nuclei-templates/cve-less/plugins/learnpress-import-export-bcce3c1d97bc388506a917ca0cc1d4ac.yaml new file mode 100644 index 0000000000..9941062d72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/learnpress-import-export-bcce3c1d97bc388506a917ca0cc1d4ac.yaml @@ -0,0 +1,58 @@ +id: learnpress-import-export-bcce3c1d97bc388506a917ca0cc1d4ac + +info: + name: > + LearnPress - Export/Import Courses <= 4.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1322e229-5e0b-4c3d-ae96-e211a2831842?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/learnpress-import-export/" + google-query: inurl:"/wp-content/plugins/learnpress-import-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,learnpress-import-export,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/learnpress-import-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnpress-import-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leenkme-aa03d96ef5988adea4feb7a4e959e6b8.yaml b/nuclei-templates/cve-less/plugins/leenkme-aa03d96ef5988adea4feb7a4e959e6b8.yaml new file mode 100644 index 0000000000..87f57c2a7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leenkme-aa03d96ef5988adea4feb7a4e959e6b8.yaml @@ -0,0 +1,58 @@ +id: leenkme-aa03d96ef5988adea4feb7a4e959e6b8 + +info: + name: > + leenk.me < 2.6.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5289f7a5-7b7b-4627-a313-b8480f88b158?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leenkme/" + google-query: inurl:"/wp-content/plugins/leenkme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leenkme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leenkme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leenkme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leenkme-e628e638290643fc84f3ec2a1da56d28.yaml b/nuclei-templates/cve-less/plugins/leenkme-e628e638290643fc84f3ec2a1da56d28.yaml new file mode 100644 index 0000000000..872a8367e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leenkme-e628e638290643fc84f3ec2a1da56d28.yaml @@ -0,0 +1,58 @@ +id: leenkme-e628e638290643fc84f3ec2a1da56d28 + +info: + name: > + leenk.me <= 2.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18592ba2-cacb-461d-bacd-bc8f44a6126f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leenkme/" + google-query: inurl:"/wp-content/plugins/leenkme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leenkme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leenkme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leenkme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/left-right-image-slideshow-gallery-74c124627aef7bceecd485cb551c158e.yaml b/nuclei-templates/cve-less/plugins/left-right-image-slideshow-gallery-74c124627aef7bceecd485cb551c158e.yaml new file mode 100644 index 0000000000..7a2cbc59b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/left-right-image-slideshow-gallery-74c124627aef7bceecd485cb551c158e.yaml @@ -0,0 +1,58 @@ +id: left-right-image-slideshow-gallery-74c124627aef7bceecd485cb551c158e + +info: + name: > + Left right image slideshow gallery <= 12.0 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69902627-ce79-4a43-8949-43db6a9cc0dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/left-right-image-slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/left-right-image-slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,left-right-image-slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/left-right-image-slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "left-right-image-slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/legal-pages-10dd9a3434e3d079623a841e75c86c90.yaml b/nuclei-templates/cve-less/plugins/legal-pages-10dd9a3434e3d079623a841e75c86c90.yaml new file mode 100644 index 0000000000..ef87df3aad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/legal-pages-10dd9a3434e3d079623a841e75c86c90.yaml @@ -0,0 +1,58 @@ +id: legal-pages-10dd9a3434e3d079623a841e75c86c90 + +info: + name: > + Legal Pages <= 1.3.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db0508dd-143f-4674-8193-d46967d2799f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/legal-pages/" + google-query: inurl:"/wp-content/plugins/legal-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,legal-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/legal-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "legal-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/legal-pages-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/legal-pages-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..c70a6f8d05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/legal-pages-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: legal-pages-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/legal-pages/" + google-query: inurl:"/wp-content/plugins/legal-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,legal-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/legal-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "legal-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/legal-pages-873e76363814bb4471e426a80a606dee.yaml b/nuclei-templates/cve-less/plugins/legal-pages-873e76363814bb4471e426a80a606dee.yaml new file mode 100644 index 0000000000..f50ac9d564 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/legal-pages-873e76363814bb4471e426a80a606dee.yaml @@ -0,0 +1,58 @@ +id: legal-pages-873e76363814bb4471e426a80a606dee + +info: + name: > + Legal Pages <= 1.3.7 - Missing Authorization on 'deleteLegalTemplate' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f87bd6-b432-4bf8-9046-8d66b45f6a85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/legal-pages/" + google-query: inurl:"/wp-content/plugins/legal-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,legal-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/legal-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "legal-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/legal-pages-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/legal-pages-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..8651c05e8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/legal-pages-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: legal-pages-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/legal-pages/" + google-query: inurl:"/wp-content/plugins/legal-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,legal-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/legal-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "legal-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/legal-pages-bea5c55c5c2c8de715c6ad731a47b480.yaml b/nuclei-templates/cve-less/plugins/legal-pages-bea5c55c5c2c8de715c6ad731a47b480.yaml new file mode 100644 index 0000000000..0e7edeec9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/legal-pages-bea5c55c5c2c8de715c6ad731a47b480.yaml @@ -0,0 +1,58 @@ +id: legal-pages-bea5c55c5c2c8de715c6ad731a47b480 + +info: + name: > + Legal Pages <= 1.4.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b8dc6f3-0ffc-4317-a32f-14dd7c301d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/legal-pages/" + google-query: inurl:"/wp-content/plugins/legal-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,legal-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/legal-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "legal-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/legal-pages-c5f8d6adcd0b5a4cfa26527341dbd20e.yaml b/nuclei-templates/cve-less/plugins/legal-pages-c5f8d6adcd0b5a4cfa26527341dbd20e.yaml new file mode 100644 index 0000000000..c8f44a2782 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/legal-pages-c5f8d6adcd0b5a4cfa26527341dbd20e.yaml @@ -0,0 +1,58 @@ +id: legal-pages-c5f8d6adcd0b5a4cfa26527341dbd20e + +info: + name: > + Legal Pages <= 1.3.8 - Cross-Site Request Forgery via moveToTrash and fetch_and_insert_template_data + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fb9c8c3-e491-4bca-adeb-b87d9f8f3b32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/legal-pages/" + google-query: inurl:"/wp-content/plugins/legal-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,legal-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/legal-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "legal-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lets-box-40394fd34f6bdb20b6922c1630b7207e.yaml b/nuclei-templates/cve-less/plugins/lets-box-40394fd34f6bdb20b6922c1630b7207e.yaml new file mode 100644 index 0000000000..f71f6da4c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lets-box-40394fd34f6bdb20b6922c1630b7207e.yaml @@ -0,0 +1,58 @@ +id: lets-box-40394fd34f6bdb20b6922c1630b7207e + +info: + name: > + Lets-Box < 1.15.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59926d18-215e-4de3-acf2-19870026a13f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lets-box/" + google-query: inurl:"/wp-content/plugins/lets-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lets-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lets-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lets-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-1a6e413024d8d1ae95c30f6878f11970.yaml b/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-1a6e413024d8d1ae95c30f6878f11970.yaml new file mode 100644 index 0000000000..59021fa8e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-1a6e413024d8d1ae95c30f6878f11970.yaml @@ -0,0 +1,58 @@ +id: letsrecover-woocommerce-abandoned-cart-1a6e413024d8d1ae95c30f6878f11970 + +info: + name: > + LetsRecover <= 1.1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f9615a9-e001-4a1f-a675-21515b4ba97f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/letsrecover-woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/letsrecover-woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,letsrecover-woocommerce-abandoned-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/letsrecover-woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "letsrecover-woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-381f90bef3e067367c93c00d3b2f3da3.yaml b/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-381f90bef3e067367c93c00d3b2f3da3.yaml new file mode 100644 index 0000000000..1c31bbe2cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-381f90bef3e067367c93c00d3b2f3da3.yaml @@ -0,0 +1,58 @@ +id: letsrecover-woocommerce-abandoned-cart-381f90bef3e067367c93c00d3b2f3da3 + +info: + name: > + LetsRecover <= 1.1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a251bcbf-68ec-4833-b21c-7a823ce65279?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/letsrecover-woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/letsrecover-woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,letsrecover-woocommerce-abandoned-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/letsrecover-woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "letsrecover-woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-b6431bc8ea172cd6898e2fe9706d240f.yaml b/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-b6431bc8ea172cd6898e2fe9706d240f.yaml new file mode 100644 index 0000000000..a91b45189a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/letsrecover-woocommerce-abandoned-cart-b6431bc8ea172cd6898e2fe9706d240f.yaml @@ -0,0 +1,58 @@ +id: letsrecover-woocommerce-abandoned-cart-b6431bc8ea172cd6898e2fe9706d240f + +info: + name: > + LetsRecover <= 1.1.0 - Unauthenticated SQL Injection via AJAX action + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/916ada05-894e-4e61-ba0a-25b9a48461a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/letsrecover-woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/letsrecover-woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,letsrecover-woocommerce-abandoned-cart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/letsrecover-woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "letsrecover-woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/letterpress-c8fa2e9308164baca50265fff2c3437b.yaml b/nuclei-templates/cve-less/plugins/letterpress-c8fa2e9308164baca50265fff2c3437b.yaml new file mode 100644 index 0000000000..30c182418d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/letterpress-c8fa2e9308164baca50265fff2c3437b.yaml @@ -0,0 +1,58 @@ +id: letterpress-c8fa2e9308164baca50265fff2c3437b + +info: + name: > + LetterPress <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3f9e624-c176-403c-a3c5-7bd11027ebe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/letterpress/" + google-query: inurl:"/wp-content/plugins/letterpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,letterpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/letterpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "letterpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/levelfourstorefront-60d0aaf010589e85233668578dac1b45.yaml b/nuclei-templates/cve-less/plugins/levelfourstorefront-60d0aaf010589e85233668578dac1b45.yaml new file mode 100644 index 0000000000..e5d9545da1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/levelfourstorefront-60d0aaf010589e85233668578dac1b45.yaml @@ -0,0 +1,58 @@ +id: levelfourstorefront-60d0aaf010589e85233668578dac1b45 + +info: + name: > + L4 Shopping Cart Plugin < 8.1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/848f3b21-fb44-45c4-944e-7c4c62448ffc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/levelfourstorefront/" + google-query: inurl:"/wp-content/plugins/levelfourstorefront/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,levelfourstorefront,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/levelfourstorefront/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "levelfourstorefront" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/levelfourstorefront-e039fd0b1618532fbbf520ec8b6c6d5b.yaml b/nuclei-templates/cve-less/plugins/levelfourstorefront-e039fd0b1618532fbbf520ec8b6c6d5b.yaml new file mode 100644 index 0000000000..9557377014 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/levelfourstorefront-e039fd0b1618532fbbf520ec8b6c6d5b.yaml @@ -0,0 +1,58 @@ +id: levelfourstorefront-e039fd0b1618532fbbf520ec8b6c6d5b + +info: + name: > + Level Four Store Front < 8.1.15 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0ace3b6-7941-43c6-b636-8f7b9d51da3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/levelfourstorefront/" + google-query: inurl:"/wp-content/plugins/levelfourstorefront/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,levelfourstorefront,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/levelfourstorefront/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "levelfourstorefront" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leyka-3a9635822cb7314607ac71f9acb49b4b.yaml b/nuclei-templates/cve-less/plugins/leyka-3a9635822cb7314607ac71f9acb49b4b.yaml new file mode 100644 index 0000000000..8aec267b2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leyka-3a9635822cb7314607ac71f9acb49b4b.yaml @@ -0,0 +1,58 @@ +id: leyka-3a9635822cb7314607ac71f9acb49b4b + +info: + name: > + Leyka <= 3.29.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1ab02c0-e083-4f0e-b6d4-1a10ade2c688?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leyka/" + google-query: inurl:"/wp-content/plugins/leyka/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leyka,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leyka/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leyka" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.29.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leyka-4ad4d0b506ee721748cb73d977e55c9e.yaml b/nuclei-templates/cve-less/plugins/leyka-4ad4d0b506ee721748cb73d977e55c9e.yaml new file mode 100644 index 0000000000..d033e9e99b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leyka-4ad4d0b506ee721748cb73d977e55c9e.yaml @@ -0,0 +1,58 @@ +id: leyka-4ad4d0b506ee721748cb73d977e55c9e + +info: + name: > + Leyka <= 3.30.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95210ed8-4606-44fa-b823-b33e1d4a4ce0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leyka/" + google-query: inurl:"/wp-content/plugins/leyka/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leyka,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leyka/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leyka" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.30.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leyka-5079f0a10d3876d504cfe4b7bc45d5bd.yaml b/nuclei-templates/cve-less/plugins/leyka-5079f0a10d3876d504cfe4b7bc45d5bd.yaml new file mode 100644 index 0000000000..7b94723940 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leyka-5079f0a10d3876d504cfe4b7bc45d5bd.yaml @@ -0,0 +1,58 @@ +id: leyka-5079f0a10d3876d504cfe4b7bc45d5bd + +info: + name: > + Leyka <= 3.30.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d11c84ea-e52b-4396-a508-9d415040b76e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leyka/" + google-query: inurl:"/wp-content/plugins/leyka/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leyka,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leyka/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leyka" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.30.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leyka-575822ff84218761efa49bb8b62fda8e.yaml b/nuclei-templates/cve-less/plugins/leyka-575822ff84218761efa49bb8b62fda8e.yaml new file mode 100644 index 0000000000..4eeadfdd4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leyka-575822ff84218761efa49bb8b62fda8e.yaml @@ -0,0 +1,58 @@ +id: leyka-575822ff84218761efa49bb8b62fda8e + +info: + name: > + Leyka <= 3.30.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baf54eb2-0b29-4718-a994-f722cefd7317?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leyka/" + google-query: inurl:"/wp-content/plugins/leyka/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leyka,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leyka/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leyka" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.30.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leyka-820bf6eebe51459c99397ba007997b65.yaml b/nuclei-templates/cve-less/plugins/leyka-820bf6eebe51459c99397ba007997b65.yaml new file mode 100644 index 0000000000..cb85bbf4d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leyka-820bf6eebe51459c99397ba007997b65.yaml @@ -0,0 +1,58 @@ +id: leyka-820bf6eebe51459c99397ba007997b65 + +info: + name: > + Leyka <= 3.30.2 - Privilege Escalation via Admin Password Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0152bcc9-6d24-4475-848d-71fe88aa7e2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leyka/" + google-query: inurl:"/wp-content/plugins/leyka/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leyka,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leyka/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leyka" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.30.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leyka-adb4907ddb0e6a30a22811f6c9a82a82.yaml b/nuclei-templates/cve-less/plugins/leyka-adb4907ddb0e6a30a22811f6c9a82a82.yaml new file mode 100644 index 0000000000..6e0651810b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leyka-adb4907ddb0e6a30a22811f6c9a82a82.yaml @@ -0,0 +1,58 @@ +id: leyka-adb4907ddb0e6a30a22811f6c9a82a82 + +info: + name: > + Leyka <= 3.29.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3afbfa7c-a87f-4810-9356-374923ff2314?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leyka/" + google-query: inurl:"/wp-content/plugins/leyka/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leyka,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leyka/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leyka" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.29.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/leyka-ec4b1b9fc14ecc8856f3a0b0d90e5205.yaml b/nuclei-templates/cve-less/plugins/leyka-ec4b1b9fc14ecc8856f3a0b0d90e5205.yaml new file mode 100644 index 0000000000..c6e23fd33e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/leyka-ec4b1b9fc14ecc8856f3a0b0d90e5205.yaml @@ -0,0 +1,58 @@ +id: leyka-ec4b1b9fc14ecc8856f3a0b0d90e5205 + +info: + name: > + Leyka <= 3.30.7 - Authenticated (Subscriber+) Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcd24b90-94ff-4625-8e3e-9c90e38683f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/leyka/" + google-query: inurl:"/wp-content/plugins/leyka/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,leyka,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/leyka/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "leyka" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.30.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lgx-owl-carousel-881bf0ba98d7fd08888e0831b881248d.yaml b/nuclei-templates/cve-less/plugins/lgx-owl-carousel-881bf0ba98d7fd08888e0831b881248d.yaml new file mode 100644 index 0000000000..59fa38bd53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lgx-owl-carousel-881bf0ba98d7fd08888e0831b881248d.yaml @@ -0,0 +1,58 @@ +id: lgx-owl-carousel-881bf0ba98d7fd08888e0831b881248d + +info: + name: > + OWL Carousel <= 1.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/511957c0-e4c3-4a50-b604-3b604d52d32f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lgx-owl-carousel/" + google-query: inurl:"/wp-content/plugins/lgx-owl-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lgx-owl-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lgx-owl-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lgx-owl-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lh-add-media-from-url-b2d30fafcd7658ca0faf8113857402a7.yaml b/nuclei-templates/cve-less/plugins/lh-add-media-from-url-b2d30fafcd7658ca0faf8113857402a7.yaml new file mode 100644 index 0000000000..2526d9a31c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lh-add-media-from-url-b2d30fafcd7658ca0faf8113857402a7.yaml @@ -0,0 +1,58 @@ +id: lh-add-media-from-url-b2d30fafcd7658ca0faf8113857402a7 + +info: + name: > + LH Add Media From Url <= 1.22 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8bc24df-4d95-44b7-a58c-00a1b24f91e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lh-add-media-from-url/" + google-query: inurl:"/wp-content/plugins/lh-add-media-from-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lh-add-media-from-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lh-add-media-from-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lh-add-media-from-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lh-password-changer-5f7cb88319853fb89e824615700911ed.yaml b/nuclei-templates/cve-less/plugins/lh-password-changer-5f7cb88319853fb89e824615700911ed.yaml new file mode 100644 index 0000000000..e1c968755f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lh-password-changer-5f7cb88319853fb89e824615700911ed.yaml @@ -0,0 +1,58 @@ +id: lh-password-changer-5f7cb88319853fb89e824615700911ed + +info: + name: > + LH Password Changer <= 1.55 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19d08a16-51c1-4255-b0e0-01307e1783ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lh-password-changer/" + google-query: inurl:"/wp-content/plugins/lh-password-changer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lh-password-changer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lh-password-changer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lh-password-changer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/library-viewer-02d031e7b4eb9aeb9adbec2797214be1.yaml b/nuclei-templates/cve-less/plugins/library-viewer-02d031e7b4eb9aeb9adbec2797214be1.yaml new file mode 100644 index 0000000000..1e0c644a52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/library-viewer-02d031e7b4eb9aeb9adbec2797214be1.yaml @@ -0,0 +1,58 @@ +id: library-viewer-02d031e7b4eb9aeb9adbec2797214be1 + +info: + name: > + Library Viewer <= 2.0.6 - Open Redirect via 'redirect_to' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b12a7e57-a45f-407a-9dd9-843a628d73ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/library-viewer/" + google-query: inurl:"/wp-content/plugins/library-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,library-viewer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/library-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "library-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/library-viewer-d611c750b72176ae3a8cea6f7095bd28.yaml b/nuclei-templates/cve-less/plugins/library-viewer-d611c750b72176ae3a8cea6f7095bd28.yaml new file mode 100644 index 0000000000..b798c36705 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/library-viewer-d611c750b72176ae3a8cea6f7095bd28.yaml @@ -0,0 +1,58 @@ +id: library-viewer-d611c750b72176ae3a8cea6f7095bd28 + +info: + name: > + Library Viewer <= 2.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82c08769-2bb6-4c87-b198-f18216b3e744?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/library-viewer/" + google-query: inurl:"/wp-content/plugins/library-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,library-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/library-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "library-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/libreform-34d9d11da38306b6b9ca0ad0c24c767a.yaml b/nuclei-templates/cve-less/plugins/libreform-34d9d11da38306b6b9ca0ad0c24c767a.yaml new file mode 100644 index 0000000000..77bda0f29c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/libreform-34d9d11da38306b6b9ca0ad0c24c767a.yaml @@ -0,0 +1,58 @@ +id: libreform-34d9d11da38306b6b9ca0ad0c24c767a + +info: + name: > + WP Libre Form 2 <= 2.0.8 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de45dd8c-c734-4b14-89ee-dbc46dcdae6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/libreform/" + google-query: inurl:"/wp-content/plugins/libreform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,libreform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/libreform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "libreform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/libsyn-podcasting-04c216a7711f03f2d76acb6a4f7b0e8c.yaml b/nuclei-templates/cve-less/plugins/libsyn-podcasting-04c216a7711f03f2d76acb6a4f7b0e8c.yaml new file mode 100644 index 0000000000..4354451df1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/libsyn-podcasting-04c216a7711f03f2d76acb6a4f7b0e8c.yaml @@ -0,0 +1,58 @@ +id: libsyn-podcasting-04c216a7711f03f2d76acb6a4f7b0e8c + +info: + name: > + Libsyn Publisher Hub <= 1.4.4 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56b3d629-014c-47b3-9726-4086e544011b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/libsyn-podcasting/" + google-query: inurl:"/wp-content/plugins/libsyn-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,libsyn-podcasting,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/libsyn-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "libsyn-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/libsyn-podcasting-4614ae1f7c7171ae3257864a2b444504.yaml b/nuclei-templates/cve-less/plugins/libsyn-podcasting-4614ae1f7c7171ae3257864a2b444504.yaml new file mode 100644 index 0000000000..846518e118 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/libsyn-podcasting-4614ae1f7c7171ae3257864a2b444504.yaml @@ -0,0 +1,58 @@ +id: libsyn-podcasting-4614ae1f7c7171ae3257864a2b444504 + +info: + name: > + Libsyn Publisher Hub <= 1.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24be03a7-4632-4bb1-beb9-d83abdd363b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/libsyn-podcasting/" + google-query: inurl:"/wp-content/plugins/libsyn-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,libsyn-podcasting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/libsyn-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "libsyn-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/libsyn-podcasting-5c39e614f4c21b0d8aa062440989ce22.yaml b/nuclei-templates/cve-less/plugins/libsyn-podcasting-5c39e614f4c21b0d8aa062440989ce22.yaml new file mode 100644 index 0000000000..3738a95f15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/libsyn-podcasting-5c39e614f4c21b0d8aa062440989ce22.yaml @@ -0,0 +1,58 @@ +id: libsyn-podcasting-5c39e614f4c21b0d8aa062440989ce22 + +info: + name: > + Libsyn Publisher Hub <= 1.4.4 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bccefbe-2d20-40a7-b24f-d867d80250e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/libsyn-podcasting/" + google-query: inurl:"/wp-content/plugins/libsyn-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,libsyn-podcasting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/libsyn-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "libsyn-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/libsyn-podcasting-61f36ff0df93fb03b2b83d8b189aa894.yaml b/nuclei-templates/cve-less/plugins/libsyn-podcasting-61f36ff0df93fb03b2b83d8b189aa894.yaml new file mode 100644 index 0000000000..06587eb0c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/libsyn-podcasting-61f36ff0df93fb03b2b83d8b189aa894.yaml @@ -0,0 +1,58 @@ +id: libsyn-podcasting-61f36ff0df93fb03b2b83d8b189aa894 + +info: + name: > + Libsyn Publisher Hub <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b581c4d-a95f-4922-95bb-15f24010ca34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/libsyn-podcasting/" + google-query: inurl:"/wp-content/plugins/libsyn-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,libsyn-podcasting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/libsyn-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "libsyn-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/libsyn-podcasting-6e94c2720ffeb0d7aea3042093ebf4ec.yaml b/nuclei-templates/cve-less/plugins/libsyn-podcasting-6e94c2720ffeb0d7aea3042093ebf4ec.yaml new file mode 100644 index 0000000000..6917b30604 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/libsyn-podcasting-6e94c2720ffeb0d7aea3042093ebf4ec.yaml @@ -0,0 +1,58 @@ +id: libsyn-podcasting-6e94c2720ffeb0d7aea3042093ebf4ec + +info: + name: > + Libsyn Publisher Hub <= 1.3.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbafdc15-cf42-4a12-bd79-5c602ce10625?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/libsyn-podcasting/" + google-query: inurl:"/wp-content/plugins/libsyn-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,libsyn-podcasting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/libsyn-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "libsyn-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/license-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/license-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5d0666cac1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/license-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: license-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/license-manager-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/license-manager-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,license-manager-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/license-manager-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "license-manager-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/license-manager-for-woocommerce-c66ec1dc83585f4762c2bc3e6a57c02b.yaml b/nuclei-templates/cve-less/plugins/license-manager-for-woocommerce-c66ec1dc83585f4762c2bc3e6a57c02b.yaml new file mode 100644 index 0000000000..b316e08751 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/license-manager-for-woocommerce-c66ec1dc83585f4762c2bc3e6a57c02b.yaml @@ -0,0 +1,58 @@ +id: license-manager-for-woocommerce-c66ec1dc83585f4762c2bc3e6a57c02b + +info: + name: > + License Manager for WooCommerce <= 2.2.10 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09597618-8695-4631-8c3b-4e7580d58c86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/license-manager-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/license-manager-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,license-manager-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/license-manager-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "license-manager-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-164e2c0c315709a0cb3bf1d13c08e3b1.yaml b/nuclei-templates/cve-less/plugins/lifterlms-164e2c0c315709a0cb3bf1d13c08e3b1.yaml new file mode 100644 index 0000000000..7c2011531d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-164e2c0c315709a0cb3bf1d13c08e3b1.yaml @@ -0,0 +1,58 @@ +id: lifterlms-164e2c0c315709a0cb3bf1d13c08e3b1 + +info: + name: > + LMS by LifterLMS <= 3.35.0 - Stored Cross-Site Scripting via Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fa04a97-0be1-4710-ae97-5820ccbddc1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms/" + google-query: inurl:"/wp-content/plugins/lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.35.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-40270377df18382f5029626c6b47720b.yaml b/nuclei-templates/cve-less/plugins/lifterlms-40270377df18382f5029626c6b47720b.yaml new file mode 100644 index 0000000000..44d6f2d403 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-40270377df18382f5029626c6b47720b.yaml @@ -0,0 +1,58 @@ +id: lifterlms-40270377df18382f5029626c6b47720b + +info: + name: > + LifterLMS <= 7.4.2 - Authenticated(Administrator+) Directory Traversal to Arbitrary CSV File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d0fcd82-6d4a-454f-8056-a896e8d41d00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms/" + google-query: inurl:"/wp-content/plugins/lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-7a853f0d8892e49dad6311d7c02311c7.yaml b/nuclei-templates/cve-less/plugins/lifterlms-7a853f0d8892e49dad6311d7c02311c7.yaml new file mode 100644 index 0000000000..9a3be7dd7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-7a853f0d8892e49dad6311d7c02311c7.yaml @@ -0,0 +1,58 @@ +id: lifterlms-7a853f0d8892e49dad6311d7c02311c7 + +info: + name: > + LifterLMS Wordpress Plugin <= 3.37.14 - Arbitrary File Write + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b39f4467-4764-4850-bdcc-b359a6544b42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms/" + google-query: inurl:"/wp-content/plugins/lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.37.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-93461439abae08e1620c6e9fa8825bb9.yaml b/nuclei-templates/cve-less/plugins/lifterlms-93461439abae08e1620c6e9fa8825bb9.yaml new file mode 100644 index 0000000000..88c7a8d31a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-93461439abae08e1620c6e9fa8825bb9.yaml @@ -0,0 +1,58 @@ +id: lifterlms-93461439abae08e1620c6e9fa8825bb9 + +info: + name: > + LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin <= 4.21.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86b54c46-a637-4fc4-8d48-a02383c9814b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms/" + google-query: inurl:"/wp-content/plugins/lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.21.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-a12053c70cb8a7dc00df12e53f227856.yaml b/nuclei-templates/cve-less/plugins/lifterlms-a12053c70cb8a7dc00df12e53f227856.yaml new file mode 100644 index 0000000000..96afda71d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-a12053c70cb8a7dc00df12e53f227856.yaml @@ -0,0 +1,58 @@ +id: lifterlms-a12053c70cb8a7dc00df12e53f227856 + +info: + name: > + LifterLMS – WordPress LMS Plugin for eLearning <= 7.5.1 - Missing Authorization via process_review + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1f41400-5c59-444d-9c1e-121e83449521?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms/" + google-query: inurl:"/wp-content/plugins/lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-bab5c3b1fc1e564a5e35a65a5e2e3c52.yaml b/nuclei-templates/cve-less/plugins/lifterlms-bab5c3b1fc1e564a5e35a65a5e2e3c52.yaml new file mode 100644 index 0000000000..9cedaf4a8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-bab5c3b1fc1e564a5e35a65a5e2e3c52.yaml @@ -0,0 +1,58 @@ +id: lifterlms-bab5c3b1fc1e564a5e35a65a5e2e3c52 + +info: + name: > + LifterLMS <= 7.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22842e7a-9cbb-4b29-b4cb-7d9b8d6b7b1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms/" + google-query: inurl:"/wp-content/plugins/lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-c5715a71dce8eee06efa6336dea28c63.yaml b/nuclei-templates/cve-less/plugins/lifterlms-c5715a71dce8eee06efa6336dea28c63.yaml new file mode 100644 index 0000000000..9a7c6d58b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-c5715a71dce8eee06efa6336dea28c63.yaml @@ -0,0 +1,58 @@ +id: lifterlms-c5715a71dce8eee06efa6336dea28c63 + +info: + name: > + LMS by LifterLMS <= 4.21.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/daedec14-6177-43c7-89d4-a39c13d94ca4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms/" + google-query: inurl:"/wp-content/plugins/lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.21.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-fd8cf6722d31c028cb6e31b0f3dd50d0.yaml b/nuclei-templates/cve-less/plugins/lifterlms-fd8cf6722d31c028cb6e31b0f3dd50d0.yaml new file mode 100644 index 0000000000..7df3a8a741 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-fd8cf6722d31c028cb6e31b0f3dd50d0.yaml @@ -0,0 +1,58 @@ +id: lifterlms-fd8cf6722d31c028cb6e31b0f3dd50d0 + +info: + name: > + LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin for WordPress < 4.21.2 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9057fc2-f346-47e5-964a-f3c5b1653c03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms/" + google-query: inurl:"/wp-content/plugins/lifterlms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.21.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lifterlms-gateway-paypal-a2c108cd8ca415a76c874f9ce93de755.yaml b/nuclei-templates/cve-less/plugins/lifterlms-gateway-paypal-a2c108cd8ca415a76c874f9ce93de755.yaml new file mode 100644 index 0000000000..be3a6081a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lifterlms-gateway-paypal-a2c108cd8ca415a76c874f9ce93de755.yaml @@ -0,0 +1,58 @@ +id: lifterlms-gateway-paypal-a2c108cd8ca415a76c874f9ce93de755 + +info: + name: > + LifterLMS PayPal < 1.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d063374-ecb2-41de-872d-18f94aac7e03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lifterlms-gateway-paypal/" + google-query: inurl:"/wp-content/plugins/lifterlms-gateway-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lifterlms-gateway-paypal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms-gateway-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lifterlms-gateway-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/light-messages-4241318cd929615a02a622c5e7416212.yaml b/nuclei-templates/cve-less/plugins/light-messages-4241318cd929615a02a622c5e7416212.yaml new file mode 100644 index 0000000000..3c1d3ecd6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/light-messages-4241318cd929615a02a622c5e7416212.yaml @@ -0,0 +1,58 @@ +id: light-messages-4241318cd929615a02a622c5e7416212 + +info: + name: > + Light Messages <= 1.0 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f49cafe0-2caf-4148-b7c9-1b78bbfba6e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/light-messages/" + google-query: inurl:"/wp-content/plugins/light-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,light-messages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/light-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "light-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lightbox-2890c7da7df716bb01f0e22088b2fa03.yaml b/nuclei-templates/cve-less/plugins/lightbox-2890c7da7df716bb01f0e22088b2fa03.yaml new file mode 100644 index 0000000000..d58d565932 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lightbox-2890c7da7df716bb01f0e22088b2fa03.yaml @@ -0,0 +1,58 @@ +id: lightbox-2890c7da7df716bb01f0e22088b2fa03 + +info: + name: > + Lightbox < 1.6.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e32a4038-0f67-48b3-80c9-94d279752c31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lightbox/" + google-query: inurl:"/wp-content/plugins/lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lightbox-gallery-6dc5d6d271c910589d9f7947458f0df6.yaml b/nuclei-templates/cve-less/plugins/lightbox-gallery-6dc5d6d271c910589d9f7947458f0df6.yaml new file mode 100644 index 0000000000..a8de3b8eb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lightbox-gallery-6dc5d6d271c910589d9f7947458f0df6.yaml @@ -0,0 +1,58 @@ +id: lightbox-gallery-6dc5d6d271c910589d9f7947458f0df6 + +info: + name: > + Lightbox Gallery <= 0.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8781ed1-6609-4965-9ba2-30e70eac1c1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lightbox-gallery/" + google-query: inurl:"/wp-content/plugins/lightbox-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lightbox-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lightbox-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightbox-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lightbox-photo-gallery-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml b/nuclei-templates/cve-less/plugins/lightbox-photo-gallery-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml new file mode 100644 index 0000000000..7f7413638b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lightbox-photo-gallery-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml @@ -0,0 +1,58 @@ +id: lightbox-photo-gallery-ce24f7f3b0bffd6ade8af3419aeed5c0 + +info: + name: > + Lightbox Photo Gallery <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64fd32a1-da2a-42db-9597-06366a34f543?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lightbox-photo-gallery/" + google-query: inurl:"/wp-content/plugins/lightbox-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lightbox-photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lightbox-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightbox-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lightbox-plus-eea39cdb903f15de3e0223c1c0ebeecf.yaml b/nuclei-templates/cve-less/plugins/lightbox-plus-eea39cdb903f15de3e0223c1c0ebeecf.yaml new file mode 100644 index 0000000000..e6befdb42f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lightbox-plus-eea39cdb903f15de3e0223c1c0ebeecf.yaml @@ -0,0 +1,58 @@ +id: lightbox-plus-eea39cdb903f15de3e0223c1c0ebeecf + +info: + name: > + Lightbox Plus <= 2.7.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dcd0c5a-757d-4256-ac0a-36620914bc45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lightbox-plus/" + google-query: inurl:"/wp-content/plugins/lightbox-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lightbox-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lightbox-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightbox-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lightbox-popup-e990d85401ec922ea084ebafd475f1d6.yaml b/nuclei-templates/cve-less/plugins/lightbox-popup-e990d85401ec922ea084ebafd475f1d6.yaml new file mode 100644 index 0000000000..86e17ccc19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lightbox-popup-e990d85401ec922ea084ebafd475f1d6.yaml @@ -0,0 +1,58 @@ +id: lightbox-popup-e990d85401ec922ea084ebafd475f1d6 + +info: + name: > + Image and Video Lightbox, Image Popup <= 2.1.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1063ecb4-a0a0-47d9-8629-f4f6a29bf5c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lightbox-popup/" + google-query: inurl:"/wp-content/plugins/lightbox-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lightbox-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lightbox-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightbox-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lightweight-accordion-85706ca0d20495fdfed005cc638cab53.yaml b/nuclei-templates/cve-less/plugins/lightweight-accordion-85706ca0d20495fdfed005cc638cab53.yaml new file mode 100644 index 0000000000..90d140ee80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lightweight-accordion-85706ca0d20495fdfed005cc638cab53.yaml @@ -0,0 +1,58 @@ +id: lightweight-accordion-85706ca0d20495fdfed005cc638cab53 + +info: + name: > + Lightweight Accordion <= 1.5.16 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/545dae6b-7983-4f02-a9a0-0be8cf935a78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lightweight-accordion/" + google-query: inurl:"/wp-content/plugins/lightweight-accordion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lightweight-accordion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lightweight-accordion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightweight-accordion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lightweight-accordion-e6a664a291db10911439b7200ec5f058.yaml b/nuclei-templates/cve-less/plugins/lightweight-accordion-e6a664a291db10911439b7200ec5f058.yaml new file mode 100644 index 0000000000..19224d2b25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lightweight-accordion-e6a664a291db10911439b7200ec5f058.yaml @@ -0,0 +1,58 @@ +id: lightweight-accordion-e6a664a291db10911439b7200ec5f058 + +info: + name: > + Lightweight Accordion <= 1.5.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b38e7ec-6663-4253-9c60-61ed34be22c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lightweight-accordion/" + google-query: inurl:"/wp-content/plugins/lightweight-accordion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lightweight-accordion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lightweight-accordion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightweight-accordion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/like-box-243adc14e5399e777d2255721eb66201.yaml b/nuclei-templates/cve-less/plugins/like-box-243adc14e5399e777d2255721eb66201.yaml new file mode 100644 index 0000000000..4b6cdf88ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/like-box-243adc14e5399e777d2255721eb66201.yaml @@ -0,0 +1,58 @@ +id: like-box-243adc14e5399e777d2255721eb66201 + +info: + name: > + Social Like Box and Page by WpDevArt <= 0.8.39 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aec57fbd-83c5-4080-9372-66500c299afc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/like-box/" + google-query: inurl:"/wp-content/plugins/like-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,like-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/like-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "like-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/like-box-98df1be3acb90063bf3d77ddbcd92918.yaml b/nuclei-templates/cve-less/plugins/like-box-98df1be3acb90063bf3d77ddbcd92918.yaml new file mode 100644 index 0000000000..c440b962a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/like-box-98df1be3acb90063bf3d77ddbcd92918.yaml @@ -0,0 +1,58 @@ +id: like-box-98df1be3acb90063bf3d77ddbcd92918 + +info: + name: > + Social Like Box and Page by WpDevArt <= 0.8.40 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b084ba1c-0910-44f0-ad77-41552ec25589?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/like-box/" + google-query: inurl:"/wp-content/plugins/like-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,like-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/like-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "like-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/likebtn-like-button-0e9099d596f12350ed3e94192d2103d8.yaml b/nuclei-templates/cve-less/plugins/likebtn-like-button-0e9099d596f12350ed3e94192d2103d8.yaml new file mode 100644 index 0000000000..51b10e6e99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/likebtn-like-button-0e9099d596f12350ed3e94192d2103d8.yaml @@ -0,0 +1,58 @@ +id: likebtn-like-button-0e9099d596f12350ed3e94192d2103d8 + +info: + name: > + Like Button Rating <= 2.5.3 - Arbitrary Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/227886e8-99d9-49b3-a1a8-b06b02d331bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/likebtn-like-button/" + google-query: inurl:"/wp-content/plugins/likebtn-like-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,likebtn-like-button,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/likebtn-like-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "likebtn-like-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/likebtn-like-button-7574ce3ad743a4e2a6c60be8d0253363.yaml b/nuclei-templates/cve-less/plugins/likebtn-like-button-7574ce3ad743a4e2a6c60be8d0253363.yaml new file mode 100644 index 0000000000..514d6450a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/likebtn-like-button-7574ce3ad743a4e2a6c60be8d0253363.yaml @@ -0,0 +1,58 @@ +id: likebtn-like-button-7574ce3ad743a4e2a6c60be8d0253363 + +info: + name: > + Like Button Rating ♥ LikeBtn < 2.6.32 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e22815e-1f06-4a46-90eb-98125ae97ba4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/likebtn-like-button/" + google-query: inurl:"/wp-content/plugins/likebtn-like-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,likebtn-like-button,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/likebtn-like-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "likebtn-like-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/likebtn-like-button-92e6b40557e12550c3bcd04a5869ae4b.yaml b/nuclei-templates/cve-less/plugins/likebtn-like-button-92e6b40557e12550c3bcd04a5869ae4b.yaml new file mode 100644 index 0000000000..db092d4188 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/likebtn-like-button-92e6b40557e12550c3bcd04a5869ae4b.yaml @@ -0,0 +1,58 @@ +id: likebtn-like-button-92e6b40557e12550c3bcd04a5869ae4b + +info: + name: > + Like Button Rating ♥ LikeBtn <= 2.6.44 - Arbitrary e-mail Sending + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5b7b20d-d701-4146-b982-23d6be7a7ea0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/likebtn-like-button/" + google-query: inurl:"/wp-content/plugins/likebtn-like-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,likebtn-like-button,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/likebtn-like-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "likebtn-like-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/likebtn-like-button-cfa91e4d46accd79431b3f983037646f.yaml b/nuclei-templates/cve-less/plugins/likebtn-like-button-cfa91e4d46accd79431b3f983037646f.yaml new file mode 100644 index 0000000000..7e70be365a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/likebtn-like-button-cfa91e4d46accd79431b3f983037646f.yaml @@ -0,0 +1,58 @@ +id: likebtn-like-button-cfa91e4d46accd79431b3f983037646f + +info: + name: > + Like Button Rating <= 2.6.37 - Unauthorised Vote Export to Email & IP Addresses Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a19972e-6ff9-4d18-a327-5cafef96a637?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/likebtn-like-button/" + google-query: inurl:"/wp-content/plugins/likebtn-like-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,likebtn-like-button,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/likebtn-like-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "likebtn-like-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lim4wp-d118d4258fb602bb69d7eb996fc782d9.yaml b/nuclei-templates/cve-less/plugins/lim4wp-d118d4258fb602bb69d7eb996fc782d9.yaml new file mode 100644 index 0000000000..daf7bb83dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lim4wp-d118d4258fb602bb69d7eb996fc782d9.yaml @@ -0,0 +1,58 @@ +id: lim4wp-d118d4258fb602bb69d7eb996fc782d9 + +info: + name: > + lim4wp <= 1.1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca11e5b-2b6c-42f0-baf3-4ee023535f83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lim4wp/" + google-query: inurl:"/wp-content/plugins/lim4wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lim4wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lim4wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lim4wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limb-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/limb-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..18cd1638de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limb-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: limb-gallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limb-gallery/" + google-query: inurl:"/wp-content/plugins/limb-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limb-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limb-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limb-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limb-gallery-ba4f93258decf77226fa4331245d3364.yaml b/nuclei-templates/cve-less/plugins/limb-gallery-ba4f93258decf77226fa4331245d3364.yaml new file mode 100644 index 0000000000..c42cacce02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limb-gallery-ba4f93258decf77226fa4331245d3364.yaml @@ -0,0 +1,58 @@ +id: limb-gallery-ba4f93258decf77226fa4331245d3364 + +info: + name: > + Limb Gallery – Create Beautiful Image & Video Galleries <= 1.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d55033fb-17a6-4b8d-87f4-1c102ef7dbcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limb-gallery/" + google-query: inurl:"/wp-content/plugins/limb-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limb-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limb-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limb-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-attempts-11bdd1e9de931e8eb6881e563e13ef54.yaml b/nuclei-templates/cve-less/plugins/limit-attempts-11bdd1e9de931e8eb6881e563e13ef54.yaml new file mode 100644 index 0000000000..17e969717c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-attempts-11bdd1e9de931e8eb6881e563e13ef54.yaml @@ -0,0 +1,58 @@ +id: limit-attempts-11bdd1e9de931e8eb6881e563e13ef54 + +info: + name: > + Limit Attempts by BestWebSoft – WordPress Anti-Bot and Security Plugin for Login and Forms < 1.1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1560b740-4018-4b08-9399-2fc87e16ea7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-attempts/" + google-query: inurl:"/wp-content/plugins/limit-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-attempts,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-attempts-bf3eff169429be7d80ad4c0e31426e1e.yaml b/nuclei-templates/cve-less/plugins/limit-attempts-bf3eff169429be7d80ad4c0e31426e1e.yaml new file mode 100644 index 0000000000..22d9de8bc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-attempts-bf3eff169429be7d80ad4c0e31426e1e.yaml @@ -0,0 +1,58 @@ +id: limit-attempts-bf3eff169429be7d80ad4c0e31426e1e + +info: + name: > + Limit Attempts by BestWebSoft < 1.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3eb4b3e7-6aad-4201-b48b-c8d788eb8acf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-attempts/" + google-query: inurl:"/wp-content/plugins/limit-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-attempts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-377e66001fb8e84db9266941f39f3e9d.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-377e66001fb8e84db9266941f39f3e9d.yaml new file mode 100644 index 0000000000..972c9fcda3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-377e66001fb8e84db9266941f39f3e9d.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-377e66001fb8e84db9266941f39f3e9d + +info: + name: > + Limit Login Attempts <= 1.7.1 - Authenticated(Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3334fc78-48c5-4cfa-ac83-5690fdbf590a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-f0a7cf7b914e091c8c5cd4fb058e543f.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-f0a7cf7b914e091c8c5cd4fb058e543f.yaml new file mode 100644 index 0000000000..5fdd20cc4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-f0a7cf7b914e091c8c5cd4fb058e543f.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-f0a7cf7b914e091c8c5cd4fb058e543f + +info: + name: > + Limit Login Attempts <= 1.7.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb8c80fc-3b51-4003-b221-6f02e74bead0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-f6d106888724001be47f0a5722bc1e1c.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-f6d106888724001be47f0a5722bc1e1c.yaml new file mode 100644 index 0000000000..3c09035652 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-f6d106888724001be47f0a5722bc1e1c.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-f6d106888724001be47f0a5722bc1e1c + +info: + name: > + Limit Login Attempts <= 1.7.0 - Brute Force Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee702ee5-d1de-4b25-8c2d-f47cc4ad076b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-plus-09ecd7b1a7d7c81f548e33bf4bc7b580.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-plus-09ecd7b1a7d7c81f548e33bf4bc7b580.yaml new file mode 100644 index 0000000000..0c6a461b18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-plus-09ecd7b1a7d7c81f548e33bf4bc7b580.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-plus-09ecd7b1a7d7c81f548e33bf4bc7b580 + +info: + name: > + Limit Login Attempts Plus <= 1.0.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22fa9343-0b6e-47d5-9ebc-2c8902428b8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts-plus/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-plus-20949787d924daf75440ffeec632fd08.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-plus-20949787d924daf75440ffeec632fd08.yaml new file mode 100644 index 0000000000..8c5e42760b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-plus-20949787d924daf75440ffeec632fd08.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-plus-20949787d924daf75440ffeec632fd08 + +info: + name: > + Limit Login Attempts Plus <= 1.0.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94dbf144-4a8f-4d9a-ad32-703a91823acb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts-plus/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-7a57fe35ffcd96f9b7d9e37175b67bfc.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-7a57fe35ffcd96f9b7d9e37175b67bfc.yaml new file mode 100644 index 0000000000..948dd02aa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-7a57fe35ffcd96f9b7d9e37175b67bfc.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-reloaded-7a57fe35ffcd96f9b7d9e37175b67bfc + +info: + name: > + Limit Login Attempts Reloaded <= 2.17.3 - Login Rate Limiting Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/669c50b8-316c-4f63-8b78-361cfcfd4d5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts-reloaded/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts-reloaded,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-83eca41cb757159390f58937921ee2df.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-83eca41cb757159390f58937921ee2df.yaml new file mode 100644 index 0000000000..dfa2a62682 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-83eca41cb757159390f58937921ee2df.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-reloaded-83eca41cb757159390f58937921ee2df + +info: + name: > + Limit Login Attempts Reloaded <= 2.25.25 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1df31843-0af7-486c-b0aa-4eaf72a7e70f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts-reloaded/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts-reloaded,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-b0fbe8ed2bd5ede12fc8dff6720e9fab.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-b0fbe8ed2bd5ede12fc8dff6720e9fab.yaml new file mode 100644 index 0000000000..6f1205a8ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-b0fbe8ed2bd5ede12fc8dff6720e9fab.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-reloaded-b0fbe8ed2bd5ede12fc8dff6720e9fab + +info: + name: > + Limit Login Attempts Reloaded <= 2.25.26 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/906049c0-4710-47aa-bf44-cdf29032dc1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts-reloaded/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-ea959a771940391e9a366a8cf4f552bc.yaml b/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-ea959a771940391e9a366a8cf4f552bc.yaml new file mode 100644 index 0000000000..4bab9f40c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/limit-login-attempts-reloaded-ea959a771940391e9a366a8cf4f552bc.yaml @@ -0,0 +1,58 @@ +id: limit-login-attempts-reloaded-ea959a771940391e9a366a8cf4f552bc + +info: + name: > + Limit Login Attempts Reloaded <= 2.15.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a052ca1-2c2c-4c8a-9213-5f01b0fa70dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/limit-login-attempts-reloaded/" + google-query: inurl:"/wp-content/plugins/limit-login-attempts-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,limit-login-attempts-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/limit-login-attempts-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "limit-login-attempts-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lingotek-translation-f623978da0d0e7e73c44c7f970c44b06.yaml b/nuclei-templates/cve-less/plugins/lingotek-translation-f623978da0d0e7e73c44c7f970c44b06.yaml new file mode 100644 index 0000000000..c5517804c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lingotek-translation-f623978da0d0e7e73c44c7f970c44b06.yaml @@ -0,0 +1,58 @@ +id: lingotek-translation-f623978da0d0e7e73c44c7f970c44b06 + +info: + name: > + Lingotek Translation <= 1.1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fbeee29-751a-48c9-a875-393441f62dde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lingotek-translation/" + google-query: inurl:"/wp-content/plugins/lingotek-translation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lingotek-translation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lingotek-translation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lingotek-translation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-checker-472732c123ab155f18372e2d5d026883.yaml b/nuclei-templates/cve-less/plugins/link-checker-472732c123ab155f18372e2d5d026883.yaml new file mode 100644 index 0000000000..4e8ae9f55a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-checker-472732c123ab155f18372e2d5d026883.yaml @@ -0,0 +1,58 @@ +id: link-checker-472732c123ab155f18372e2d5d026883 + +info: + name: > + Link Checker <= 1.16.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf48ad3b-9b3a-4052-bacf-52a729d62365?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-checker/" + google-query: inurl:"/wp-content/plugins/link-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-checker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-juice-keeper-3ca3d61f633582fe10aacbed8816c6e5.yaml b/nuclei-templates/cve-less/plugins/link-juice-keeper-3ca3d61f633582fe10aacbed8816c6e5.yaml new file mode 100644 index 0000000000..7ef4e612e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-juice-keeper-3ca3d61f633582fe10aacbed8816c6e5.yaml @@ -0,0 +1,58 @@ +id: link-juice-keeper-3ca3d61f633582fe10aacbed8816c6e5 + +info: + name: > + Link Juice Keeper <= 2.0.2 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06511129-fb43-4ac1-9f5d-c637c9577293?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-juice-keeper/" + google-query: inurl:"/wp-content/plugins/link-juice-keeper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-juice-keeper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-juice-keeper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-juice-keeper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-1c985f1116559af8ca42f803d48b129d.yaml b/nuclei-templates/cve-less/plugins/link-library-1c985f1116559af8ca42f803d48b129d.yaml new file mode 100644 index 0000000000..aa74a521c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-1c985f1116559af8ca42f803d48b129d.yaml @@ -0,0 +1,58 @@ +id: link-library-1c985f1116559af8ca42f803d48b129d + +info: + name: > + Link Library <= 7.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf0bbd5e-0fec-445e-9baa-e383524da648?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-263f0665c552df560e61f28530fa511b.yaml b/nuclei-templates/cve-less/plugins/link-library-263f0665c552df560e61f28530fa511b.yaml new file mode 100644 index 0000000000..5bdff4bc24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-263f0665c552df560e61f28530fa511b.yaml @@ -0,0 +1,58 @@ +id: link-library-263f0665c552df560e61f28530fa511b + +info: + name: > + Link Library <= 5.9.13.26 – SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6755c415-427e-4572-908c-061ab8f7490a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.13.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-45cc93dab6d9a9c50a4569ff06d10d7a.yaml b/nuclei-templates/cve-less/plugins/link-library-45cc93dab6d9a9c50a4569ff06d10d7a.yaml new file mode 100644 index 0000000000..8af3057894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-45cc93dab6d9a9c50a4569ff06d10d7a.yaml @@ -0,0 +1,58 @@ +id: link-library-45cc93dab6d9a9c50a4569ff06d10d7a + +info: + name: > + Link Library <= 7.2.7 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27d0f627-aeee-46de-a319-861af00fdbf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-56c2ef2b70cad0dbe9025809ba135de2.yaml b/nuclei-templates/cve-less/plugins/link-library-56c2ef2b70cad0dbe9025809ba135de2.yaml new file mode 100644 index 0000000000..4cee462b55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-56c2ef2b70cad0dbe9025809ba135de2.yaml @@ -0,0 +1,58 @@ +id: link-library-56c2ef2b70cad0dbe9025809ba135de2 + +info: + name: > + Link Library <= 7.6.11 - Authenticated (Contributor+) Stored Cross-Site Scripting via link-library Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30c9c4b9-6905-4d8a-bc55-5cd6f6201d25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-63da1e8a7d368a237a74bc6e90977e1d.yaml b/nuclei-templates/cve-less/plugins/link-library-63da1e8a7d368a237a74bc6e90977e1d.yaml new file mode 100644 index 0000000000..abd309b383 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-63da1e8a7d368a237a74bc6e90977e1d.yaml @@ -0,0 +1,58 @@ +id: link-library-63da1e8a7d368a237a74bc6e90977e1d + +info: + name: > + Link Library <= 7.6.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b93af9cc-cd9a-4bbb-8cb1-bf45c59e469c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-89d3c8a11ff10e6756f75032f0181833.yaml b/nuclei-templates/cve-less/plugins/link-library-89d3c8a11ff10e6756f75032f0181833.yaml new file mode 100644 index 0000000000..d8bfc00a91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-89d3c8a11ff10e6756f75032f0181833.yaml @@ -0,0 +1,58 @@ +id: link-library-89d3c8a11ff10e6756f75032f0181833 + +info: + name: > + Link Library <= 7.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8e6bfd4-9003-4ac6-96a1-0c7024b2a800?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-8eaf2fbb99993016796df5f74fcedae5.yaml b/nuclei-templates/cve-less/plugins/link-library-8eaf2fbb99993016796df5f74fcedae5.yaml new file mode 100644 index 0000000000..15ab425666 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-8eaf2fbb99993016796df5f74fcedae5.yaml @@ -0,0 +1,58 @@ +id: link-library-8eaf2fbb99993016796df5f74fcedae5 + +info: + name: > + Link Library <= 7.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/407a5c69-cce0-4868-aef0-ffc88981e256?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-9f1eb3ba72f073c220b0aca4f3eab325.yaml b/nuclei-templates/cve-less/plugins/link-library-9f1eb3ba72f073c220b0aca4f3eab325.yaml new file mode 100644 index 0000000000..05153c4fa5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-9f1eb3ba72f073c220b0aca4f3eab325.yaml @@ -0,0 +1,58 @@ +id: link-library-9f1eb3ba72f073c220b0aca4f3eab325 + +info: + name: > + Link Library <= 7.5.13 - Cross-Site Request Forgery via action_admin_init + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fefe4499-8b03-4c07-b248-ae0ae5153b4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-b560a7342e5a5547ffb025ec97c31f15.yaml b/nuclei-templates/cve-less/plugins/link-library-b560a7342e5a5547ffb025ec97c31f15.yaml new file mode 100644 index 0000000000..e6d385e1c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-b560a7342e5a5547ffb025ec97c31f15.yaml @@ -0,0 +1,58 @@ +id: link-library-b560a7342e5a5547ffb025ec97c31f15 + +info: + name: > + Link Library <= 5.9.12.29 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e30c4fd-91fd-4f05-85fa-73e445de3c6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.12.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-bdfe22a56a0cb4f7b1af5e93a2693981.yaml b/nuclei-templates/cve-less/plugins/link-library-bdfe22a56a0cb4f7b1af5e93a2693981.yaml new file mode 100644 index 0000000000..62f777e4d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-bdfe22a56a0cb4f7b1af5e93a2693981.yaml @@ -0,0 +1,58 @@ +id: link-library-bdfe22a56a0cb4f7b1af5e93a2693981 + +info: + name: > + Link Library <= 7.5.13 - Reflected Cross-Site Scripting via 'link_price' and 'link_tags' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d5f9d2e-6719-4ce7-bbdd-afaf437bd080?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-dafcf72bc7ea7f4d11e003315c8b31d1.yaml b/nuclei-templates/cve-less/plugins/link-library-dafcf72bc7ea7f4d11e003315c8b31d1.yaml new file mode 100644 index 0000000000..f88c872df5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-dafcf72bc7ea7f4d11e003315c8b31d1.yaml @@ -0,0 +1,58 @@ +id: link-library-dafcf72bc7ea7f4d11e003315c8b31d1 + +info: + name: > + Link Library <= 7.2.7 - Cross-Site Request Forgery to Library Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd1fc89f-b0f0-43a3-a311-07a79232a3ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-ed114df4f201bdff927450bdcae78049.yaml b/nuclei-templates/cve-less/plugins/link-library-ed114df4f201bdff927450bdcae78049.yaml new file mode 100644 index 0000000000..52b7247783 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-ed114df4f201bdff927450bdcae78049.yaml @@ -0,0 +1,58 @@ +id: link-library-ed114df4f201bdff927450bdcae78049 + +info: + name: > + Link Library <= 7.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e43b327-c141-480e-a5b2-bba179b3e0a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-library-f21e31fcba2b16b7b32fe6c94daf21e5.yaml b/nuclei-templates/cve-less/plugins/link-library-f21e31fcba2b16b7b32fe6c94daf21e5.yaml new file mode 100644 index 0000000000..9612cb525c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-library-f21e31fcba2b16b7b32fe6c94daf21e5.yaml @@ -0,0 +1,58 @@ +id: link-library-f21e31fcba2b16b7b32fe6c94daf21e5 + +info: + name: > + Link Library <= 5.8.10.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db5e26cf-e6c7-4b79-807a-643a1effd2a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-library/" + google-query: inurl:"/wp-content/plugins/link-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-list-manager-3aa9bc9584cc58690e73b867607b46c9.yaml b/nuclei-templates/cve-less/plugins/link-list-manager-3aa9bc9584cc58690e73b867607b46c9.yaml new file mode 100644 index 0000000000..408c80ccac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-list-manager-3aa9bc9584cc58690e73b867607b46c9.yaml @@ -0,0 +1,58 @@ +id: link-list-manager-3aa9bc9584cc58690e73b867607b46c9 + +info: + name: > + link-list-manager <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd28e5cc-94a2-4a0f-a795-7c2ddb01c35a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-list-manager/" + google-query: inurl:"/wp-content/plugins/link-list-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-list-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-list-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-list-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-log-1ed30559c3d0fe2013efce706a1a0591.yaml b/nuclei-templates/cve-less/plugins/link-log-1ed30559c3d0fe2013efce706a1a0591.yaml new file mode 100644 index 0000000000..c9ca8399a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-log-1ed30559c3d0fe2013efce706a1a0591.yaml @@ -0,0 +1,58 @@ +id: link-log-1ed30559c3d0fe2013efce706a1a0591 + +info: + name: > + Link Log – external link click monitor < 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8088547-650f-41b1-bb53-18be38f4aeb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-log/" + google-query: inurl:"/wp-content/plugins/link-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-log-200b4a20000c02e3ddb71f780d4da533.yaml b/nuclei-templates/cve-less/plugins/link-log-200b4a20000c02e3ddb71f780d4da533.yaml new file mode 100644 index 0000000000..067f06ca77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-log-200b4a20000c02e3ddb71f780d4da533.yaml @@ -0,0 +1,58 @@ +id: link-log-200b4a20000c02e3ddb71f780d4da533 + +info: + name: > + Link Log – external link click monitor <= 1.4 - HTTP Response Splitting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71371a44-fed4-4aea-9f86-a37ca26a57b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-log/" + google-query: inurl:"/wp-content/plugins/link-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-log-a70d444a7f2c0c5012e01420603941d1.yaml b/nuclei-templates/cve-less/plugins/link-log-a70d444a7f2c0c5012e01420603941d1.yaml new file mode 100644 index 0000000000..fe422b7b3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-log-a70d444a7f2c0c5012e01420603941d1.yaml @@ -0,0 +1,58 @@ +id: link-log-a70d444a7f2c0c5012e01420603941d1 + +info: + name: > + Smart External Link Click Monitor [Link Log] <= 5.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c1811f7-0fb4-4f50-93ac-6abd9e6a1d66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-log/" + google-query: inurl:"/wp-content/plugins/link-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-log-f462ad6f4474c107cb4e1555ab936edc.yaml b/nuclei-templates/cve-less/plugins/link-log-f462ad6f4474c107cb4e1555ab936edc.yaml new file mode 100644 index 0000000000..5de6c74988 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-log-f462ad6f4474c107cb4e1555ab936edc.yaml @@ -0,0 +1,58 @@ +id: link-log-f462ad6f4474c107cb4e1555ab936edc + +info: + name: > + Smart External Link Click Monitor [Link Log] <= 5.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d062bc7b-0cb0-46bd-b203-90cc9a44a403?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-log/" + google-query: inurl:"/wp-content/plugins/link-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-optimizer-lite-7c00a992b189dd605d955a517ab5ff4b.yaml b/nuclei-templates/cve-less/plugins/link-optimizer-lite-7c00a992b189dd605d955a517ab5ff4b.yaml new file mode 100644 index 0000000000..38a0c01014 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-optimizer-lite-7c00a992b189dd605d955a517ab5ff4b.yaml @@ -0,0 +1,58 @@ +id: link-optimizer-lite-7c00a992b189dd605d955a517ab5ff4b + +info: + name: > + Link Optimizer Lite <= 1.4.5 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca64692b-b194-4ceb-975e-72e4041252f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-optimizer-lite/" + google-query: inurl:"/wp-content/plugins/link-optimizer-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-optimizer-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-optimizer-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-optimizer-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-party-422a9545144ac220769577361c25c2cd.yaml b/nuclei-templates/cve-less/plugins/link-party-422a9545144ac220769577361c25c2cd.yaml new file mode 100644 index 0000000000..620219afa4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-party-422a9545144ac220769577361c25c2cd.yaml @@ -0,0 +1,58 @@ +id: link-party-422a9545144ac220769577361c25c2cd + +info: + name: > + illi Link Party! <= 1.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acd6b604-45dd-4688-a9b9-fabb12c418e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-party/" + google-query: inurl:"/wp-content/plugins/link-party/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-party,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-party/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-party" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-party-4fbe78a27e0a415c3958fe330e75a188.yaml b/nuclei-templates/cve-less/plugins/link-party-4fbe78a27e0a415c3958fe330e75a188.yaml new file mode 100644 index 0000000000..ac1e19d213 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-party-4fbe78a27e0a415c3958fe330e75a188.yaml @@ -0,0 +1,58 @@ +id: link-party-4fbe78a27e0a415c3958fe330e75a188 + +info: + name: > + illi Link Party! <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbf193ef-e172-4fe3-9bff-b5cbac9adb54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-party/" + google-query: inurl:"/wp-content/plugins/link-party/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-party,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-party/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-party" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-party-a8c0b404c2334a1ce94afe05ce1ef335.yaml b/nuclei-templates/cve-less/plugins/link-party-a8c0b404c2334a1ce94afe05ce1ef335.yaml new file mode 100644 index 0000000000..c0d7a96627 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-party-a8c0b404c2334a1ce94afe05ce1ef335.yaml @@ -0,0 +1,58 @@ +id: link-party-a8c0b404c2334a1ce94afe05ce1ef335 + +info: + name: > + illi Link Party! <= 1.0 - Missing Authorization to Unauthenticated Arbitrary Link Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d68293a-b98b-41e0-9f79-ccd2c0108e82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-party/" + google-query: inurl:"/wp-content/plugins/link-party/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-party,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-party/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-party" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-party-b3db63dd3833de216814572046aef4ca.yaml b/nuclei-templates/cve-less/plugins/link-party-b3db63dd3833de216814572046aef4ca.yaml new file mode 100644 index 0000000000..5b24971a5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-party-b3db63dd3833de216814572046aef4ca.yaml @@ -0,0 +1,58 @@ +id: link-party-b3db63dd3833de216814572046aef4ca + +info: + name: > + illi Link Party! <= 1.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9df6d75b-a141-41a8-b965-6be7acee582d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-party/" + google-query: inurl:"/wp-content/plugins/link-party/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-party,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-party/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-party" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-whisper-c53a6d31c98dcde7fc34b4079f07942b.yaml b/nuclei-templates/cve-less/plugins/link-whisper-c53a6d31c98dcde7fc34b4079f07942b.yaml new file mode 100644 index 0000000000..2dfbe30b50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-whisper-c53a6d31c98dcde7fc34b4079f07942b.yaml @@ -0,0 +1,58 @@ +id: link-whisper-c53a6d31c98dcde7fc34b4079f07942b + +info: + name: > + Link Whisper Free <= 0.7.1 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d5dd7cd-f96a-48df-a553-be5e59d8290f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-whisper/" + google-query: inurl:"/wp-content/plugins/link-whisper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-whisper,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-whisper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-whisper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-whisper-c7031edc7c8c818eb8b6f1853fee01eb.yaml b/nuclei-templates/cve-less/plugins/link-whisper-c7031edc7c8c818eb8b6f1853fee01eb.yaml new file mode 100644 index 0000000000..ecae3178bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-whisper-c7031edc7c8c818eb8b6f1853fee01eb.yaml @@ -0,0 +1,58 @@ +id: link-whisper-c7031edc7c8c818eb8b6f1853fee01eb + +info: + name: > + Link Whisper Free <= 0.6.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d567665-543c-4a6b-bb07-9388fea09ee9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-whisper/" + google-query: inurl:"/wp-content/plugins/link-whisper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-whisper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-whisper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-whisper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-whisper-cc953220a3ab9360fc3b920e9df2ed7f.yaml b/nuclei-templates/cve-less/plugins/link-whisper-cc953220a3ab9360fc3b920e9df2ed7f.yaml new file mode 100644 index 0000000000..1883568056 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-whisper-cc953220a3ab9360fc3b920e9df2ed7f.yaml @@ -0,0 +1,58 @@ +id: link-whisper-cc953220a3ab9360fc3b920e9df2ed7f + +info: + name: > + Link Whisper Free <= 0.6.9 + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8155585e-c29c-484c-ab2e-371b5723539e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-whisper/" + google-query: inurl:"/wp-content/plugins/link-whisper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-whisper,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-whisper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-whisper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-whisper-da040359bca67615913785734db30059.yaml b/nuclei-templates/cve-less/plugins/link-whisper-da040359bca67615913785734db30059.yaml new file mode 100644 index 0000000000..c00e76d7f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-whisper-da040359bca67615913785734db30059.yaml @@ -0,0 +1,58 @@ +id: link-whisper-da040359bca67615913785734db30059 + +info: + name: > + Link Whisper Free <= 0.6.5 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5e26a56-bba0-4204-bcb7-c5ec123a9b2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-whisper/" + google-query: inurl:"/wp-content/plugins/link-whisper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-whisper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-whisper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-whisper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link-whisper-efbea6db4c4deaef4b1a0846e33065cf.yaml b/nuclei-templates/cve-less/plugins/link-whisper-efbea6db4c4deaef4b1a0846e33065cf.yaml new file mode 100644 index 0000000000..d4ba68f863 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link-whisper-efbea6db4c4deaef4b1a0846e33065cf.yaml @@ -0,0 +1,58 @@ +id: link-whisper-efbea6db4c4deaef4b1a0846e33065cf + +info: + name: > + Link Whisper Free <= 0.6.3 - Missing Authorization via init() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29b09367-6a27-4024-a71c-233aaee6c310?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-whisper/" + google-query: inurl:"/wp-content/plugins/link-whisper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-whisper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-whisper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-whisper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/link2player-afdb73f09e63d9d93a801e87dd86e9bc.yaml b/nuclei-templates/cve-less/plugins/link2player-afdb73f09e63d9d93a801e87dd86e9bc.yaml new file mode 100644 index 0000000000..7af9dc750b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/link2player-afdb73f09e63d9d93a801e87dd86e9bc.yaml @@ -0,0 +1,58 @@ +id: link2player-afdb73f09e63d9d93a801e87dd86e9bc + +info: + name: > + Link2Player <= 0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70c6bfb9-46d4-43ed-a6b4-9fe1fc9aa945?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link2player/" + google-query: inurl:"/wp-content/plugins/link2player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link2player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link2player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link2player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/linker-dc961a43bf6645987863e2268d4c98e4.yaml b/nuclei-templates/cve-less/plugins/linker-dc961a43bf6645987863e2268d4c98e4.yaml new file mode 100644 index 0000000000..dbd710b2c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/linker-dc961a43bf6645987863e2268d4c98e4.yaml @@ -0,0 +1,58 @@ +id: linker-dc961a43bf6645987863e2268d4c98e4 + +info: + name: > + Linker <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fd620a3-5d9e-4bc3-b026-871610df7c2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/linker/" + google-query: inurl:"/wp-content/plugins/linker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,linker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/linker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "linker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/linkworth-wp-plugin-9ed1e670781ff936317a3cc7c1d9dd47.yaml b/nuclei-templates/cve-less/plugins/linkworth-wp-plugin-9ed1e670781ff936317a3cc7c1d9dd47.yaml new file mode 100644 index 0000000000..7db8a05078 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/linkworth-wp-plugin-9ed1e670781ff936317a3cc7c1d9dd47.yaml @@ -0,0 +1,58 @@ +id: linkworth-wp-plugin-9ed1e670781ff936317a3cc7c1d9dd47 + +info: + name: > + LinkWorth plugin <= 3.3.3 - Cross-Site Request Forgery to Plugin Setting Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e0fd44d-e152-4883-a734-031f68e3ba97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/linkworth-wp-plugin/" + google-query: inurl:"/wp-content/plugins/linkworth-wp-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,linkworth-wp-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/linkworth-wp-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "linkworth-wp-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/liquid-speech-balloon-2fc40f0eebe24b9548355cb63270c890.yaml b/nuclei-templates/cve-less/plugins/liquid-speech-balloon-2fc40f0eebe24b9548355cb63270c890.yaml new file mode 100644 index 0000000000..30975587df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/liquid-speech-balloon-2fc40f0eebe24b9548355cb63270c890.yaml @@ -0,0 +1,58 @@ +id: liquid-speech-balloon-2fc40f0eebe24b9548355cb63270c890 + +info: + name: > + LIQUID SPEECH BALLOON < 1.0.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51b725e4-b088-4f6b-8810-87a39ca952ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/liquid-speech-balloon/" + google-query: inurl:"/wp-content/plugins/liquid-speech-balloon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,liquid-speech-balloon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/liquid-speech-balloon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "liquid-speech-balloon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/liquid-speech-balloon-5e0407cf5324ea7a57b720b722b3c657.yaml b/nuclei-templates/cve-less/plugins/liquid-speech-balloon-5e0407cf5324ea7a57b720b722b3c657.yaml new file mode 100644 index 0000000000..f56a30812d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/liquid-speech-balloon-5e0407cf5324ea7a57b720b722b3c657.yaml @@ -0,0 +1,58 @@ +id: liquid-speech-balloon-5e0407cf5324ea7a57b720b722b3c657 + +info: + name: > + LIQUID SPEECH BALLOON <= 1.1.8 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23980e13-b632-43ec-938e-8171884cb87b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/liquid-speech-balloon/" + google-query: inurl:"/wp-content/plugins/liquid-speech-balloon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,liquid-speech-balloon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/liquid-speech-balloon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "liquid-speech-balloon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/list-all-posts-by-authors-nested-categories-and-titles-802be145d30a4aee303b74232b95831e.yaml b/nuclei-templates/cve-less/plugins/list-all-posts-by-authors-nested-categories-and-titles-802be145d30a4aee303b74232b95831e.yaml new file mode 100644 index 0000000000..4a27bc28d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/list-all-posts-by-authors-nested-categories-and-titles-802be145d30a4aee303b74232b95831e.yaml @@ -0,0 +1,58 @@ +id: list-all-posts-by-authors-nested-categories-and-titles-802be145d30a4aee303b74232b95831e + +info: + name: > + List all posts by Authors, nested Categories and Title <= 2.8.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b84df5b-ff93-43b3-b9e4-cf963cf2af10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/list-all-posts-by-authors-nested-categories-and-titles/" + google-query: inurl:"/wp-content/plugins/list-all-posts-by-authors-nested-categories-and-titles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,list-all-posts-by-authors-nested-categories-and-titles,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/list-all-posts-by-authors-nested-categories-and-titles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "list-all-posts-by-authors-nested-categories-and-titles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/list-category-posts-3b8bb6063c635c2a8333462322de6a1f.yaml b/nuclei-templates/cve-less/plugins/list-category-posts-3b8bb6063c635c2a8333462322de6a1f.yaml new file mode 100644 index 0000000000..7adc4a87d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/list-category-posts-3b8bb6063c635c2a8333462322de6a1f.yaml @@ -0,0 +1,58 @@ +id: list-category-posts-3b8bb6063c635c2a8333462322de6a1f + +info: + name: > + List category posts <= 0.89.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a58cba26-a57e-4170-95bb-54ea7cfdb10c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/list-category-posts/" + google-query: inurl:"/wp-content/plugins/list-category-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,list-category-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/list-category-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "list-category-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.89.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/list-category-posts-7ec69e14aaa720fc8a2decec00730012.yaml b/nuclei-templates/cve-less/plugins/list-category-posts-7ec69e14aaa720fc8a2decec00730012.yaml new file mode 100644 index 0000000000..3ab58141b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/list-category-posts-7ec69e14aaa720fc8a2decec00730012.yaml @@ -0,0 +1,58 @@ +id: list-category-posts-7ec69e14aaa720fc8a2decec00730012 + +info: + name: > + List category posts <= 0.89.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/611871cc-737f-44e3-baf5-dbaa8bd8eb81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/list-category-posts/" + google-query: inurl:"/wp-content/plugins/list-category-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,list-category-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/list-category-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "list-category-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.89.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/list-custom-taxonomy-widget-53b64c2cc89e0070db555cf593bc5061.yaml b/nuclei-templates/cve-less/plugins/list-custom-taxonomy-widget-53b64c2cc89e0070db555cf593bc5061.yaml new file mode 100644 index 0000000000..7a52abbdd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/list-custom-taxonomy-widget-53b64c2cc89e0070db555cf593bc5061.yaml @@ -0,0 +1,58 @@ +id: list-custom-taxonomy-widget-53b64c2cc89e0070db555cf593bc5061 + +info: + name: > + List Custom Taxonomy Widget <= 4.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35c5b1cd-053c-4e1d-994f-003b89d5ff62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/list-custom-taxonomy-widget/" + google-query: inurl:"/wp-content/plugins/list-custom-taxonomy-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,list-custom-taxonomy-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/list-custom-taxonomy-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "list-custom-taxonomy-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/list-pages-shortcode-b3a8e8167569aa6cba2a5950875c8b0e.yaml b/nuclei-templates/cve-less/plugins/list-pages-shortcode-b3a8e8167569aa6cba2a5950875c8b0e.yaml new file mode 100644 index 0000000000..d95d04cc5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/list-pages-shortcode-b3a8e8167569aa6cba2a5950875c8b0e.yaml @@ -0,0 +1,58 @@ +id: list-pages-shortcode-b3a8e8167569aa6cba2a5950875c8b0e + +info: + name: > + List Pages Shortcode <= 1.7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac005402-0bac-453e-918d-b8a44abeff06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/list-pages-shortcode/" + google-query: inurl:"/wp-content/plugins/list-pages-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,list-pages-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/list-pages-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "list-pages-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/listplus-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/listplus-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a08507ecd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/listplus-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: listplus-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/listplus/" + google-query: inurl:"/wp-content/plugins/listplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,listplus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/listplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/litespeed-cache-0436bd17a7ce2057f085dec6812cf1d3.yaml b/nuclei-templates/cve-less/plugins/litespeed-cache-0436bd17a7ce2057f085dec6812cf1d3.yaml new file mode 100644 index 0000000000..8b8bf6671a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/litespeed-cache-0436bd17a7ce2057f085dec6812cf1d3.yaml @@ -0,0 +1,58 @@ +id: litespeed-cache-0436bd17a7ce2057f085dec6812cf1d3 + +info: + name: > + LiteSpeed Cache <= 5.7 - Missing Authorization via update_cdn_status + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56d0658c-b6b5-4e01-9f5b-a53dd4e380d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/litespeed-cache/" + google-query: inurl:"/wp-content/plugins/litespeed-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,litespeed-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/litespeed-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "litespeed-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/litespeed-cache-303b76a4a36e60deb08e9b0d0435d79c.yaml b/nuclei-templates/cve-less/plugins/litespeed-cache-303b76a4a36e60deb08e9b0d0435d79c.yaml new file mode 100644 index 0000000000..892ca119e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/litespeed-cache-303b76a4a36e60deb08e9b0d0435d79c.yaml @@ -0,0 +1,58 @@ +id: litespeed-cache-303b76a4a36e60deb08e9b0d0435d79c + +info: + name: > + LiteSpeed Cache <= 3.6 - Authenticated Stored Cross-Site Scripting via IP setting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cec5695-1fe5-4349-b78d-2e4f7d3b9908?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/litespeed-cache/" + google-query: inurl:"/wp-content/plugins/litespeed-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,litespeed-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/litespeed-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "litespeed-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/litespeed-cache-5164946a6f7e888f2eb2eb6be3f062ed.yaml b/nuclei-templates/cve-less/plugins/litespeed-cache-5164946a6f7e888f2eb2eb6be3f062ed.yaml new file mode 100644 index 0000000000..22c219f5ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/litespeed-cache-5164946a6f7e888f2eb2eb6be3f062ed.yaml @@ -0,0 +1,58 @@ +id: litespeed-cache-5164946a6f7e888f2eb2eb6be3f062ed + +info: + name: > + LiteSpeed Cache <= 4.4.3 - Reflected Cross-Site Scripting via qc_res + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82b48e39-4f8f-48b8-ba46-49e06bee2cc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/litespeed-cache/" + google-query: inurl:"/wp-content/plugins/litespeed-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,litespeed-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/litespeed-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "litespeed-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.15', '<= 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/litespeed-cache-5a398aae9f8b9b2a378092433e37f0a2.yaml b/nuclei-templates/cve-less/plugins/litespeed-cache-5a398aae9f8b9b2a378092433e37f0a2.yaml new file mode 100644 index 0000000000..35b447fc2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/litespeed-cache-5a398aae9f8b9b2a378092433e37f0a2.yaml @@ -0,0 +1,58 @@ +id: litespeed-cache-5a398aae9f8b9b2a378092433e37f0a2 + +info: + name: > + LiteSpeed Cache <= 5.7 - Unauthenticated Stored Cross-Site Scripting via 'nameservers' and '_msg' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c27c06-214a-4c20-80d0-b6b4d18737c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/litespeed-cache/" + google-query: inurl:"/wp-content/plugins/litespeed-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,litespeed-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/litespeed-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "litespeed-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/litespeed-cache-5f623b9be5a2d2349866b91146be2f95.yaml b/nuclei-templates/cve-less/plugins/litespeed-cache-5f623b9be5a2d2349866b91146be2f95.yaml new file mode 100644 index 0000000000..cad00d8090 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/litespeed-cache-5f623b9be5a2d2349866b91146be2f95.yaml @@ -0,0 +1,58 @@ +id: litespeed-cache-5f623b9be5a2d2349866b91146be2f95 + +info: + name: > + LiteSpeed Cache <= 4.4.3 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a82bffab-77c3-48e8-af84-39709bf0353b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/litespeed-cache/" + google-query: inurl:"/wp-content/plugins/litespeed-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,litespeed-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/litespeed-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "litespeed-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.15', '<= 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/litespeed-cache-e320d6afe142ff2886379823eb8759ba.yaml b/nuclei-templates/cve-less/plugins/litespeed-cache-e320d6afe142ff2886379823eb8759ba.yaml new file mode 100644 index 0000000000..cdb7770350 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/litespeed-cache-e320d6afe142ff2886379823eb8759ba.yaml @@ -0,0 +1,58 @@ +id: litespeed-cache-e320d6afe142ff2886379823eb8759ba + +info: + name: > + LiteSpeed Cache <= 5.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27026f0f-c85e-4409-9973-4b9cb8a90da5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/litespeed-cache/" + google-query: inurl:"/wp-content/plugins/litespeed-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,litespeed-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/litespeed-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "litespeed-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/litespeed-cache-eaef067d144406da863b2f1698405be1.yaml b/nuclei-templates/cve-less/plugins/litespeed-cache-eaef067d144406da863b2f1698405be1.yaml new file mode 100644 index 0000000000..2e524972b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/litespeed-cache-eaef067d144406da863b2f1698405be1.yaml @@ -0,0 +1,58 @@ +id: litespeed-cache-eaef067d144406da863b2f1698405be1 + +info: + name: > + LiteSpeed Cache <= 5.3 - Missing Authorization to Toggle Crawler State + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1900948-8813-4c88-87fe-ddf830c6ae3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/litespeed-cache/" + google-query: inurl:"/wp-content/plugins/litespeed-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,litespeed-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/litespeed-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "litespeed-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/littlebot-invoices-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/littlebot-invoices-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a8cf92dd6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/littlebot-invoices-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: littlebot-invoices-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/littlebot-invoices/" + google-query: inurl:"/wp-content/plugins/littlebot-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,littlebot-invoices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/littlebot-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "littlebot-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-chat-facebook-fanpage-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/live-chat-facebook-fanpage-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..27aa827f2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-chat-facebook-fanpage-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: live-chat-facebook-fanpage-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-chat-facebook-fanpage/" + google-query: inurl:"/wp-content/plugins/live-chat-facebook-fanpage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-chat-facebook-fanpage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-chat-facebook-fanpage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-chat-facebook-fanpage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-composer-page-builder-130eab166dc7b7692723d0cf797df7b0.yaml b/nuclei-templates/cve-less/plugins/live-composer-page-builder-130eab166dc7b7692723d0cf797df7b0.yaml new file mode 100644 index 0000000000..6481aeca87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-composer-page-builder-130eab166dc7b7692723d0cf797df7b0.yaml @@ -0,0 +1,58 @@ +id: live-composer-page-builder-130eab166dc7b7692723d0cf797df7b0 + +info: + name: > + Page Builder: Live Composer <= 1.5.25 - Authenticated (Author+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a0f9f80-e338-4afd-9a4b-e421865c8b0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-composer-page-builder/" + google-query: inurl:"/wp-content/plugins/live-composer-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-composer-page-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-composer-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-composer-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-composer-page-builder-72add1c0a6273b20aaa451b8bcfd56cd.yaml b/nuclei-templates/cve-less/plugins/live-composer-page-builder-72add1c0a6273b20aaa451b8bcfd56cd.yaml new file mode 100644 index 0000000000..7dcd80f05c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-composer-page-builder-72add1c0a6273b20aaa451b8bcfd56cd.yaml @@ -0,0 +1,58 @@ +id: live-composer-page-builder-72add1c0a6273b20aaa451b8bcfd56cd + +info: + name: > + Page Builder: Live Composer <= 1.5.38 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e8b8689-ab6a-426b-9aba-4fa14c455ff1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-composer-page-builder/" + google-query: inurl:"/wp-content/plugins/live-composer-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-composer-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-composer-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-composer-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-composer-page-builder-99586092e2e0a8d37b070fc12b9ea29f.yaml b/nuclei-templates/cve-less/plugins/live-composer-page-builder-99586092e2e0a8d37b070fc12b9ea29f.yaml new file mode 100644 index 0000000000..ce830fc187 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-composer-page-builder-99586092e2e0a8d37b070fc12b9ea29f.yaml @@ -0,0 +1,58 @@ +id: live-composer-page-builder-99586092e2e0a8d37b070fc12b9ea29f + +info: + name: > + Page Builder: Live Composer <= 1.5.23 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09631637-55e2-4e1e-9dcb-bba205be5f43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-composer-page-builder/" + google-query: inurl:"/wp-content/plugins/live-composer-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-composer-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-composer-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-composer-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-composer-page-builder-add895115f53c9c7df4b8eacc636e203.yaml b/nuclei-templates/cve-less/plugins/live-composer-page-builder-add895115f53c9c7df4b8eacc636e203.yaml new file mode 100644 index 0000000000..f372817188 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-composer-page-builder-add895115f53c9c7df4b8eacc636e203.yaml @@ -0,0 +1,58 @@ +id: live-composer-page-builder-add895115f53c9c7df4b8eacc636e203 + +info: + name: > + Page Builder: Live Composer <= 1.5.22 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a99f19a-7874-4f55-bbdd-db23182a0ece?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-composer-page-builder/" + google-query: inurl:"/wp-content/plugins/live-composer-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-composer-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-composer-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-composer-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-composer-page-builder-b15b4d6b18eb8d6e1301c7d5d1d48c76.yaml b/nuclei-templates/cve-less/plugins/live-composer-page-builder-b15b4d6b18eb8d6e1301c7d5d1d48c76.yaml new file mode 100644 index 0000000000..5c01f6ab45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-composer-page-builder-b15b4d6b18eb8d6e1301c7d5d1d48c76.yaml @@ -0,0 +1,58 @@ +id: live-composer-page-builder-b15b4d6b18eb8d6e1301c7d5d1d48c76 + +info: + name: > + Page Builder: Live Composer <= 1.5.35 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d96be2-b89a-46b0-a4f1-da44f9b54b2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-composer-page-builder/" + google-query: inurl:"/wp-content/plugins/live-composer-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-composer-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-composer-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-composer-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-news-lite-884857566c11f05a4de329e58ea89043.yaml b/nuclei-templates/cve-less/plugins/live-news-lite-884857566c11f05a4de329e58ea89043.yaml new file mode 100644 index 0000000000..3be4d433bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-news-lite-884857566c11f05a4de329e58ea89043.yaml @@ -0,0 +1,58 @@ +id: live-news-lite-884857566c11f05a4de329e58ea89043 + +info: + name: > + Live News <= 1.06 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ee59570-85c3-4394-bebb-c3f49c08be67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-news-lite/" + google-query: inurl:"/wp-content/plugins/live-news-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-news-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-news-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-news-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-3a5d73d5522f92d087c0f9a99edc5e9e.yaml b/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-3a5d73d5522f92d087c0f9a99edc5e9e.yaml new file mode 100644 index 0000000000..59a49f5bdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-3a5d73d5522f92d087c0f9a99edc5e9e.yaml @@ -0,0 +1,58 @@ +id: live-scores-for-sportspress-3a5d73d5522f92d087c0f9a99edc5e9e + +info: + name: > + Live Scores for SportsPress <= 1.9.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b4087e9-071c-4cfc-b23d-ae8dd0059a2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-scores-for-sportspress/" + google-query: inurl:"/wp-content/plugins/live-scores-for-sportspress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-scores-for-sportspress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-scores-for-sportspress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-scores-for-sportspress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-3fe9089ec5b0f3ad95a1bd0baa9d49ae.yaml b/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-3fe9089ec5b0f3ad95a1bd0baa9d49ae.yaml new file mode 100644 index 0000000000..6d6ee74567 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-3fe9089ec5b0f3ad95a1bd0baa9d49ae.yaml @@ -0,0 +1,58 @@ +id: live-scores-for-sportspress-3fe9089ec5b0f3ad95a1bd0baa9d49ae + +info: + name: > + Live Scores for SportsPress <= 1.9.0 - Authenticated (Admin+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/002c6fea-4b76-47a6-9a39-1195f18aa6f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-scores-for-sportspress/" + google-query: inurl:"/wp-content/plugins/live-scores-for-sportspress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-scores-for-sportspress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-scores-for-sportspress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-scores-for-sportspress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6bc07cf2a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-scores-for-sportspress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: live-scores-for-sportspress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-scores-for-sportspress/" + google-query: inurl:"/wp-content/plugins/live-scores-for-sportspress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-scores-for-sportspress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-scores-for-sportspress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-scores-for-sportspress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-search-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/live-search-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..eb8f4b9fe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-search-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: live-search-xforwc-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-search-xforwc/" + google-query: inurl:"/wp-content/plugins/live-search-xforwc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-search-xforwc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-search-xforwc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-search-xforwc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/live-weather-station-6bf013010e508e54af93e6ae6969b8c7.yaml b/nuclei-templates/cve-less/plugins/live-weather-station-6bf013010e508e54af93e6ae6969b8c7.yaml new file mode 100644 index 0000000000..7c620e8144 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/live-weather-station-6bf013010e508e54af93e6ae6969b8c7.yaml @@ -0,0 +1,58 @@ +id: live-weather-station-6bf013010e508e54af93e6ae6969b8c7 + +info: + name: > + Weather Station <= 3.8.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1e1db3f-1ebc-4f16-b2d8-8bce9c51b3db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/live-weather-station/" + google-query: inurl:"/wp-content/plugins/live-weather-station/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,live-weather-station,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/live-weather-station/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "live-weather-station" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/livechat-elementor-86dd6dda2cd9ddc6bc20ee836c81850a.yaml b/nuclei-templates/cve-less/plugins/livechat-elementor-86dd6dda2cd9ddc6bc20ee836c81850a.yaml new file mode 100644 index 0000000000..121fa0ebdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/livechat-elementor-86dd6dda2cd9ddc6bc20ee836c81850a.yaml @@ -0,0 +1,58 @@ +id: livechat-elementor-86dd6dda2cd9ddc6bc20ee836c81850a + +info: + name: > + LiveChat Elementor <= 1.0.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32c2a25d-e660-4700-8df3-b043cf6aa78a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/livechat-elementor/" + google-query: inurl:"/wp-content/plugins/livechat-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,livechat-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/livechat-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "livechat-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/livechat-woocommerce-cc133c83907831da0d998e047e9cfdbf.yaml b/nuclei-templates/cve-less/plugins/livechat-woocommerce-cc133c83907831da0d998e047e9cfdbf.yaml new file mode 100644 index 0000000000..2c334681c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/livechat-woocommerce-cc133c83907831da0d998e047e9cfdbf.yaml @@ -0,0 +1,58 @@ +id: livechat-woocommerce-cc133c83907831da0d998e047e9cfdbf + +info: + name: > + LiveChat WooCommerce <= 2.2.16 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/872f13bc-e6d0-4307-b2c9-b55a44df1016?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/livechat-woocommerce/" + google-query: inurl:"/wp-content/plugins/livechat-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,livechat-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/livechat-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "livechat-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/liveforms-bbcba6e13bde9bf14b1c5b83c187b0ab.yaml b/nuclei-templates/cve-less/plugins/liveforms-bbcba6e13bde9bf14b1c5b83c187b0ab.yaml new file mode 100644 index 0000000000..dbd7826ec7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/liveforms-bbcba6e13bde9bf14b1c5b83c187b0ab.yaml @@ -0,0 +1,58 @@ +id: liveforms-bbcba6e13bde9bf14b1c5b83c187b0ab + +info: + name: > + WordPress Contact Form, Drag and Drop Form Builder Plugin – Live Forms < 3.2.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13b2fb59-35ef-40de-a48a-2972777d2682?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/liveforms/" + google-query: inurl:"/wp-content/plugins/liveforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,liveforms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/liveforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "liveforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/liveforms-fbafef1583d66ee6ba3521f29ba434a8.yaml b/nuclei-templates/cve-less/plugins/liveforms-fbafef1583d66ee6ba3521f29ba434a8.yaml new file mode 100644 index 0000000000..e5f0e23cce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/liveforms-fbafef1583d66ee6ba3521f29ba434a8.yaml @@ -0,0 +1,58 @@ +id: liveforms-fbafef1583d66ee6ba3521f29ba434a8 + +info: + name: > + WordPress Contact Form, Drag and Drop Form Builder Plugin – Live Forms <= 3.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f36ff03-b599-4f2c-859e-751ac51b652d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/liveforms/" + google-query: inurl:"/wp-content/plugins/liveforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,liveforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/liveforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "liveforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/livefyre-comments-41a63082135d50f0e8bf2d19791a60a3.yaml b/nuclei-templates/cve-less/plugins/livefyre-comments-41a63082135d50f0e8bf2d19791a60a3.yaml new file mode 100644 index 0000000000..8109e668ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/livefyre-comments-41a63082135d50f0e8bf2d19791a60a3.yaml @@ -0,0 +1,58 @@ +id: livefyre-comments-41a63082135d50f0e8bf2d19791a60a3 + +info: + name: > + Livefyre Comments 3 <= 4.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f51ae93-6880-4dc8-b183-424a8407f441?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/livefyre-comments/" + google-query: inurl:"/wp-content/plugins/livefyre-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,livefyre-comments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/livefyre-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "livefyre-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/livemesh-siteorigin-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/livemesh-siteorigin-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5a281aacee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/livemesh-siteorigin-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: livemesh-siteorigin-widgets-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/livemesh-siteorigin-widgets/" + google-query: inurl:"/wp-content/plugins/livemesh-siteorigin-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,livemesh-siteorigin-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/livemesh-siteorigin-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "livemesh-siteorigin-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/livemesh-siteorigin-widgets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/livemesh-siteorigin-widgets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..416b64babd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/livemesh-siteorigin-widgets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: livemesh-siteorigin-widgets-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/livemesh-siteorigin-widgets/" + google-query: inurl:"/wp-content/plugins/livemesh-siteorigin-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,livemesh-siteorigin-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/livemesh-siteorigin-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "livemesh-siteorigin-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/liveoptim-f364089fe838821aa5875cc23a9bf280.yaml b/nuclei-templates/cve-less/plugins/liveoptim-f364089fe838821aa5875cc23a9bf280.yaml new file mode 100644 index 0000000000..2b156432a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/liveoptim-f364089fe838821aa5875cc23a9bf280.yaml @@ -0,0 +1,58 @@ +id: liveoptim-f364089fe838821aa5875cc23a9bf280 + +info: + name: > + SEO Plugin LiveOptim <= 1.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23d8c56b-01f1-48b4-a58d-958457be738f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/liveoptim/" + google-query: inurl:"/wp-content/plugins/liveoptim/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,liveoptim,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/liveoptim/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "liveoptim" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/livestream-notice-a521128c60a3e4447b1ae62129a4837e.yaml b/nuclei-templates/cve-less/plugins/livestream-notice-a521128c60a3e4447b1ae62129a4837e.yaml new file mode 100644 index 0000000000..66d4d6b060 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/livestream-notice-a521128c60a3e4447b1ae62129a4837e.yaml @@ -0,0 +1,58 @@ +id: livestream-notice-a521128c60a3e4447b1ae62129a4837e + +info: + name: > + Livestream Notice <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69d957d3-a0d5-44ec-a9b0-8c9b41175379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/livestream-notice/" + google-query: inurl:"/wp-content/plugins/livestream-notice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,livestream-notice,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/livestream-notice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "livestream-notice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/livesupporti-86ee984a5b2cc7b4ab97dc8a4e8b06c6.yaml b/nuclei-templates/cve-less/plugins/livesupporti-86ee984a5b2cc7b4ab97dc8a4e8b06c6.yaml new file mode 100644 index 0000000000..d883bd7202 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/livesupporti-86ee984a5b2cc7b4ab97dc8a4e8b06c6.yaml @@ -0,0 +1,58 @@ +id: livesupporti-86ee984a5b2cc7b4ab97dc8a4e8b06c6 + +info: + name: > + Free Live Chat Support <= 1.0.11 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfa3efa2-c542-44b9-8039-13e6eac75101?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/livesupporti/" + google-query: inurl:"/wp-content/plugins/livesupporti/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,livesupporti,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/livesupporti/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "livesupporti" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/livesync-38a3278b44badbc6201e3e06953e0d59.yaml b/nuclei-templates/cve-less/plugins/livesync-38a3278b44badbc6201e3e06953e0d59.yaml new file mode 100644 index 0000000000..197b6a8b29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/livesync-38a3278b44badbc6201e3e06953e0d59.yaml @@ -0,0 +1,58 @@ +id: livesync-38a3278b44badbc6201e3e06953e0d59 + +info: + name: > + LiveSync for WordPress <= 1.0 - Cross-Site Request Forgery to Arbitrary Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/501fb05a-c8ec-43c6-b462-2a83c4f8b6b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/livesync/" + google-query: inurl:"/wp-content/plugins/livesync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,livesync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/livesync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "livesync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lktags-linkedin-insight-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/lktags-linkedin-insight-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1e8259f703 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lktags-linkedin-insight-tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: lktags-linkedin-insight-tags-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lktags-linkedin-insight-tags/" + google-query: inurl:"/wp-content/plugins/lktags-linkedin-insight-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lktags-linkedin-insight-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lktags-linkedin-insight-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lktags-linkedin-insight-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/load-more-products-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/load-more-products-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..b51b2d23e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/load-more-products-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: load-more-products-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/load-more-products-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/load-more-products-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,load-more-products-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/load-more-products-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "load-more-products-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loading-page-4168c6f35e53b3bb6cbc2cd944aa14e6.yaml b/nuclei-templates/cve-less/plugins/loading-page-4168c6f35e53b3bb6cbc2cd944aa14e6.yaml new file mode 100644 index 0000000000..7863cef4f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loading-page-4168c6f35e53b3bb6cbc2cd944aa14e6.yaml @@ -0,0 +1,58 @@ +id: loading-page-4168c6f35e53b3bb6cbc2cd944aa14e6 + +info: + name: > + Loading Page with Loading Screen <= 1.0.82 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97b10f88-1911-4416-a5cd-83b4c991e6c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loading-page/" + google-query: inurl:"/wp-content/plugins/loading-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loading-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loading-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loading-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.82') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loan-comparison-17de09501ab7fb8731b631ebf83d7a67.yaml b/nuclei-templates/cve-less/plugins/loan-comparison-17de09501ab7fb8731b631ebf83d7a67.yaml new file mode 100644 index 0000000000..d616e9c659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loan-comparison-17de09501ab7fb8731b631ebf83d7a67.yaml @@ -0,0 +1,58 @@ +id: loan-comparison-17de09501ab7fb8731b631ebf83d7a67 + +info: + name: > + Loan Comparison <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25e4ed00-a9f2-402f-8a46-3cb911ab5497?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loan-comparison/" + google-query: inurl:"/wp-content/plugins/loan-comparison/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loan-comparison,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loan-comparison/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loan-comparison" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loan-comparison-58b316530bd9635132dfd03a76f490ff.yaml b/nuclei-templates/cve-less/plugins/loan-comparison-58b316530bd9635132dfd03a76f490ff.yaml new file mode 100644 index 0000000000..b927d906fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loan-comparison-58b316530bd9635132dfd03a76f490ff.yaml @@ -0,0 +1,58 @@ +id: loan-comparison-58b316530bd9635132dfd03a76f490ff + +info: + name: > + Loan Comparison <= 1.5.2 - Authenticated (Contributor+) Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fef9990-023a-4d4b-8c52-3b71aac97e7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loan-comparison/" + google-query: inurl:"/wp-content/plugins/loan-comparison/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loan-comparison,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loan-comparison/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loan-comparison" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/local-delivery-drivers-for-woocommerce-689c16f1a129b0e9c76ffa7cafd20108.yaml b/nuclei-templates/cve-less/plugins/local-delivery-drivers-for-woocommerce-689c16f1a129b0e9c76ffa7cafd20108.yaml new file mode 100644 index 0000000000..afb0a1a246 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/local-delivery-drivers-for-woocommerce-689c16f1a129b0e9c76ffa7cafd20108.yaml @@ -0,0 +1,58 @@ +id: local-delivery-drivers-for-woocommerce-689c16f1a129b0e9c76ffa7cafd20108 + +info: + name: > + Local Delivery Drivers for WooCommerce <= 1.9.0 - Missing Authorization to Driver Account Takeover + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99f4f1dc-13a9-4fa0-bdb1-77a0d416c80f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/local-delivery-drivers-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/local-delivery-drivers-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,local-delivery-drivers-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/local-delivery-drivers-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "local-delivery-drivers-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/local-delivery-drivers-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/local-delivery-drivers-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4b1508bf94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/local-delivery-drivers-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: local-delivery-drivers-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/local-delivery-drivers-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/local-delivery-drivers-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,local-delivery-drivers-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/local-delivery-drivers-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "local-delivery-drivers-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/local-development-29a60f726216a180f82f11be4b87c485.yaml b/nuclei-templates/cve-less/plugins/local-development-29a60f726216a180f82f11be4b87c485.yaml new file mode 100644 index 0000000000..0f0146cb19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/local-development-29a60f726216a180f82f11be4b87c485.yaml @@ -0,0 +1,58 @@ +id: local-development-29a60f726216a180f82f11be4b87c485 + +info: + name: > + Local Development <=2.8.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f962a3ef-205d-42e2-acf1-45eabfdba3ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/local-development/" + google-query: inurl:"/wp-content/plugins/local-development/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,local-development,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/local-development/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "local-development" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/localize-my-post-e804c0e7bbe92744b5b1a95863c8b199.yaml b/nuclei-templates/cve-less/plugins/localize-my-post-e804c0e7bbe92744b5b1a95863c8b199.yaml new file mode 100644 index 0000000000..f0142b934c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/localize-my-post-e804c0e7bbe92744b5b1a95863c8b199.yaml @@ -0,0 +1,58 @@ +id: localize-my-post-e804c0e7bbe92744b5b1a95863c8b199 + +info: + name: > + Localize My Post <= 1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3969e890-76e0-484a-ad16-6e2642e2ae53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/localize-my-post/" + google-query: inurl:"/wp-content/plugins/localize-my-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,localize-my-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/localize-my-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "localize-my-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/localize-remote-images-d92a3b7d2765d4947392cc8fcadba165.yaml b/nuclei-templates/cve-less/plugins/localize-remote-images-d92a3b7d2765d4947392cc8fcadba165.yaml new file mode 100644 index 0000000000..a523a207c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/localize-remote-images-d92a3b7d2765d4947392cc8fcadba165.yaml @@ -0,0 +1,58 @@ +id: localize-remote-images-d92a3b7d2765d4947392cc8fcadba165 + +info: + name: > + Localize Remote Images <= 1.0.9 - Cross-Site Request Forgery via admin menu + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab96123e-17aa-461f-b460-e8eba82c78e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/localize-remote-images/" + google-query: inurl:"/wp-content/plugins/localize-remote-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,localize-remote-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/localize-remote-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "localize-remote-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/localseomap-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/localseomap-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0b3cdd1da3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/localseomap-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: localseomap-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/localseomap-for-elementor/" + google-query: inurl:"/wp-content/plugins/localseomap-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,localseomap-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/localseomap-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "localseomap-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/location-weather-6c261a297dbcd9991a82748059272596.yaml b/nuclei-templates/cve-less/plugins/location-weather-6c261a297dbcd9991a82748059272596.yaml new file mode 100644 index 0000000000..0826d5f8ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/location-weather-6c261a297dbcd9991a82748059272596.yaml @@ -0,0 +1,58 @@ +id: location-weather-6c261a297dbcd9991a82748059272596 + +info: + name: > + Location Weather <= 1.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c93c412-541a-429f-b18e-7b75c8ebdf67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/location-weather/" + google-query: inurl:"/wp-content/plugins/location-weather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,location-weather,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/location-weather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "location-weather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/locations-68619625dd4330d653c82c2251ebc33a.yaml b/nuclei-templates/cve-less/plugins/locations-68619625dd4330d653c82c2251ebc33a.yaml new file mode 100644 index 0000000000..3a596ae4f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/locations-68619625dd4330d653c82c2251ebc33a.yaml @@ -0,0 +1,58 @@ +id: locations-68619625dd4330d653c82c2251ebc33a + +info: + name: > + Locations <= 3.2.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3df9f237-a861-43fc-8623-d42f84d8d5d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/locations/" + google-query: inurl:"/wp-content/plugins/locations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,locations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/locations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "locations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/locations-9e153a23809280911bab79339940a337.yaml b/nuclei-templates/cve-less/plugins/locations-9e153a23809280911bab79339940a337.yaml new file mode 100644 index 0000000000..7a612034dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/locations-9e153a23809280911bab79339940a337.yaml @@ -0,0 +1,58 @@ +id: locations-9e153a23809280911bab79339940a337 + +info: + name: > + Locations <= 4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe10acf6-2649-4e85-abd1-b6840169eb41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/locations/" + google-query: inurl:"/wp-content/plugins/locations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,locations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/locations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "locations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/locatoraid-95d961d91144502a2fa4a99f5da6e669.yaml b/nuclei-templates/cve-less/plugins/locatoraid-95d961d91144502a2fa4a99f5da6e669.yaml new file mode 100644 index 0000000000..03e278a715 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/locatoraid-95d961d91144502a2fa4a99f5da6e669.yaml @@ -0,0 +1,58 @@ +id: locatoraid-95d961d91144502a2fa4a99f5da6e669 + +info: + name: > + Locatoraid Store Locator <= 3.9.30 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f328b938-355d-426f-a9cf-646929a7c155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/locatoraid/" + google-query: inurl:"/wp-content/plugins/locatoraid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,locatoraid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/locatoraid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "locatoraid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/locatoraid-b2cac182d257fbe66c64e34a40cb5d58.yaml b/nuclei-templates/cve-less/plugins/locatoraid-b2cac182d257fbe66c64e34a40cb5d58.yaml new file mode 100644 index 0000000000..bc06c51bc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/locatoraid-b2cac182d257fbe66c64e34a40cb5d58.yaml @@ -0,0 +1,58 @@ +id: locatoraid-b2cac182d257fbe66c64e34a40cb5d58 + +info: + name: > + Locatoraid Store Locator <= 3.9.11 - Cross Site Request Forgery in grab + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7feecce5-f2ce-4278-b648-e363b1fa5d7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/locatoraid/" + google-query: inurl:"/wp-content/plugins/locatoraid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,locatoraid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/locatoraid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "locatoraid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/locatoraid-cfb712440be870231ef705d9454b409e.yaml b/nuclei-templates/cve-less/plugins/locatoraid-cfb712440be870231ef705d9454b409e.yaml new file mode 100644 index 0000000000..3ed92404c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/locatoraid-cfb712440be870231ef705d9454b409e.yaml @@ -0,0 +1,58 @@ +id: locatoraid-cfb712440be870231ef705d9454b409e + +info: + name: > + Locatoraid Store Locator <= 3.9.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dba0a90b-f13c-4914-b6b7-278227ffc122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/locatoraid/" + google-query: inurl:"/wp-content/plugins/locatoraid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,locatoraid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/locatoraid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "locatoraid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/locatoraid-e7e716edf9e9518e46de8baeec91561e.yaml b/nuclei-templates/cve-less/plugins/locatoraid-e7e716edf9e9518e46de8baeec91561e.yaml new file mode 100644 index 0000000000..7d4204728b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/locatoraid-e7e716edf9e9518e46de8baeec91561e.yaml @@ -0,0 +1,58 @@ +id: locatoraid-e7e716edf9e9518e46de8baeec91561e + +info: + name: > + Locatoraid Store Locator <= 3.9.23 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64d2174e-ee69-4e71-b8cb-ff7a1ba0f52f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/locatoraid/" + google-query: inurl:"/wp-content/plugins/locatoraid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,locatoraid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/locatoraid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "locatoraid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/locatoraid-f129897036a69e5c156d976b88efd3ed.yaml b/nuclei-templates/cve-less/plugins/locatoraid-f129897036a69e5c156d976b88efd3ed.yaml new file mode 100644 index 0000000000..72d4424dae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/locatoraid-f129897036a69e5c156d976b88efd3ed.yaml @@ -0,0 +1,58 @@ +id: locatoraid-f129897036a69e5c156d976b88efd3ed + +info: + name: > + Locatoraid Store Locator <= 3.9.18 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e40cba5c-455c-44ba-bba2-c825697b837a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/locatoraid/" + google-query: inurl:"/wp-content/plugins/locatoraid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,locatoraid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/locatoraid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "locatoraid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lock-my-bp-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/lock-my-bp-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..50da8bd59f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lock-my-bp-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: lock-my-bp-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lock-my-bp/" + google-query: inurl:"/wp-content/plugins/lock-my-bp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lock-my-bp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lock-my-bp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lock-my-bp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lock-user-account-39749a910e46936207c7b87bdd710b5b.yaml b/nuclei-templates/cve-less/plugins/lock-user-account-39749a910e46936207c7b87bdd710b5b.yaml new file mode 100644 index 0000000000..a4334d4bef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lock-user-account-39749a910e46936207c7b87bdd710b5b.yaml @@ -0,0 +1,58 @@ +id: lock-user-account-39749a910e46936207c7b87bdd710b5b + +info: + name: > + Lock User Account <= 1.0.3 - Cross-Site Request Forgery to Account Lock/Unlock + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d06f265c-c1c1-4316-9526-3392f6ee31da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lock-user-account/" + google-query: inurl:"/wp-content/plugins/lock-user-account/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lock-user-account,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lock-user-account/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lock-user-account" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loco-translate-8187837c8e502d478100e3984ca296fb.yaml b/nuclei-templates/cve-less/plugins/loco-translate-8187837c8e502d478100e3984ca296fb.yaml new file mode 100644 index 0000000000..43d696709c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loco-translate-8187837c8e502d478100e3984ca296fb.yaml @@ -0,0 +1,58 @@ +id: loco-translate-8187837c8e502d478100e3984ca296fb + +info: + name: > + Loco Translate <= 2.5.3 - Authenticated PHP Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/457865ca-cbf8-42ee-928d-2c894d9d62de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loco-translate/" + google-query: inurl:"/wp-content/plugins/loco-translate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loco-translate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loco-translate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loco-translate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loco-translate-d8800c16823f2094a6d5c651646d84fa.yaml b/nuclei-templates/cve-less/plugins/loco-translate-d8800c16823f2094a6d5c651646d84fa.yaml new file mode 100644 index 0000000000..66d8b9ab60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loco-translate-d8800c16823f2094a6d5c651646d84fa.yaml @@ -0,0 +1,58 @@ +id: loco-translate-d8800c16823f2094a6d5c651646d84fa + +info: + name: > + Loco Translate <= 2.6.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d3b1a76-febc-4037-b31e-5987f8a23e92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loco-translate/" + google-query: inurl:"/wp-content/plugins/loco-translate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loco-translate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loco-translate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loco-translate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/log-http-requests-5a93acfe5c571ac99fbd0be363e6f484.yaml b/nuclei-templates/cve-less/plugins/log-http-requests-5a93acfe5c571ac99fbd0be363e6f484.yaml new file mode 100644 index 0000000000..afbfa5adeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/log-http-requests-5a93acfe5c571ac99fbd0be363e6f484.yaml @@ -0,0 +1,58 @@ +id: log-http-requests-5a93acfe5c571ac99fbd0be363e6f484 + +info: + name: > + Log HTTP Requests <= 1.3.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b12b0a2a-3c3c-4d9c-a404-c8f170638e31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/log-http-requests/" + google-query: inurl:"/wp-content/plugins/log-http-requests/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,log-http-requests,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/log-http-requests/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "log-http-requests" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logaster-logo-generator-1593b88b276363eaaec5e0cb5dde84ae.yaml b/nuclei-templates/cve-less/plugins/logaster-logo-generator-1593b88b276363eaaec5e0cb5dde84ae.yaml new file mode 100644 index 0000000000..cd65ce2384 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logaster-logo-generator-1593b88b276363eaaec5e0cb5dde84ae.yaml @@ -0,0 +1,58 @@ +id: logaster-logo-generator-1593b88b276363eaaec5e0cb5dde84ae + +info: + name: > + Logaster Logo Generator <= 1.3 - Missing Authorization to Arbitrary Media Deletion and Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f1c60f-8f72-4c99-92af-340c67b7411f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logaster-logo-generator/" + google-query: inurl:"/wp-content/plugins/logaster-logo-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logaster-logo-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logaster-logo-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logaster-logo-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logaster-logo-generator-76ed6482cec63261d1357200b150b91d.yaml b/nuclei-templates/cve-less/plugins/logaster-logo-generator-76ed6482cec63261d1357200b150b91d.yaml new file mode 100644 index 0000000000..877dabf72e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logaster-logo-generator-76ed6482cec63261d1357200b150b91d.yaml @@ -0,0 +1,58 @@ +id: logaster-logo-generator-76ed6482cec63261d1357200b150b91d + +info: + name: > + Logaster Logo Generator <= 1.3 - Cross-Site Request Forgery to Arbitrary Media Deletion and Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cde8c669-c9bb-4ecc-b589-3cda8757dfc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logaster-logo-generator/" + google-query: inurl:"/wp-content/plugins/logaster-logo-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logaster-logo-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logaster-logo-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logaster-logo-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logdash-activity-log-bcfe334c42c567e215f8c00ef33611b7.yaml b/nuclei-templates/cve-less/plugins/logdash-activity-log-bcfe334c42c567e215f8c00ef33611b7.yaml new file mode 100644 index 0000000000..132c367bc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logdash-activity-log-bcfe334c42c567e215f8c00ef33611b7.yaml @@ -0,0 +1,58 @@ +id: logdash-activity-log-bcfe334c42c567e215f8c00ef33611b7 + +info: + name: > + LogDash Activity Log <= 1.1.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b71348c8-9e86-432e-b05e-96884344cef6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logdash-activity-log/" + google-query: inurl:"/wp-content/plugins/logdash-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logdash-activity-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logdash-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logdash-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-and-logout-redirect-6defdad634c19587e3dd4bf9ad418075.yaml b/nuclei-templates/cve-less/plugins/login-and-logout-redirect-6defdad634c19587e3dd4bf9ad418075.yaml new file mode 100644 index 0000000000..c583ac61be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-and-logout-redirect-6defdad634c19587e3dd4bf9ad418075.yaml @@ -0,0 +1,58 @@ +id: login-and-logout-redirect-6defdad634c19587e3dd4bf9ad418075 + +info: + name: > + Login and Logout Redirect <= 2.0.2 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09a0639e-4b14-4dc9-a50c-d18234faa7b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-and-logout-redirect/" + google-query: inurl:"/wp-content/plugins/login-and-logout-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-and-logout-redirect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-and-logout-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-and-logout-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-as-customer-or-user-0fc17742a12c442eca6b1350953762d1.yaml b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-0fc17742a12c442eca6b1350953762d1.yaml new file mode 100644 index 0000000000..0eb46047e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-0fc17742a12c442eca6b1350953762d1.yaml @@ -0,0 +1,58 @@ +id: login-as-customer-or-user-0fc17742a12c442eca6b1350953762d1 + +info: + name: > + Login as User or Customer <= 3.2 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca20535-d033-45d5-acc3-72ad53d34b4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-as-customer-or-user/" + google-query: inurl:"/wp-content/plugins/login-as-customer-or-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-as-customer-or-user,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-as-customer-or-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-as-customer-or-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-as-customer-or-user-4c2cc49d3c5ef5aabeaa2eb6035c1bc7.yaml b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-4c2cc49d3c5ef5aabeaa2eb6035c1bc7.yaml new file mode 100644 index 0000000000..a3552b7bd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-4c2cc49d3c5ef5aabeaa2eb6035c1bc7.yaml @@ -0,0 +1,58 @@ +id: login-as-customer-or-user-4c2cc49d3c5ef5aabeaa2eb6035c1bc7 + +info: + name: > + Login as User or Customer <= 3.8 - Unauthenticated Limited Admin Account Compromise + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a97f59d-c4b1-4544-8cef-37a01cc6f7ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-as-customer-or-user/" + google-query: inurl:"/wp-content/plugins/login-as-customer-or-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-as-customer-or-user,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-as-customer-or-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-as-customer-or-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-as-customer-or-user-63d09700de769fbd6e753bbbd4ecabb8.yaml b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-63d09700de769fbd6e753bbbd4ecabb8.yaml new file mode 100644 index 0000000000..4d8945a002 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-63d09700de769fbd6e753bbbd4ecabb8.yaml @@ -0,0 +1,58 @@ +id: login-as-customer-or-user-63d09700de769fbd6e753bbbd4ecabb8 + +info: + name: > + Login as User or Customer (User Switching) <= 3.8 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b07ea6a-511d-44ab-b0b7-5124702ad47d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-as-customer-or-user/" + google-query: inurl:"/wp-content/plugins/login-as-customer-or-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-as-customer-or-user,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-as-customer-or-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-as-customer-or-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-as-customer-or-user-7c535e169c75c3005c5d2941f3e6968b.yaml b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-7c535e169c75c3005c5d2941f3e6968b.yaml new file mode 100644 index 0000000000..772781665e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-7c535e169c75c3005c5d2941f3e6968b.yaml @@ -0,0 +1,58 @@ +id: login-as-customer-or-user-7c535e169c75c3005c5d2941f3e6968b + +info: + name: > + Login as User or Customer <= 2.1 - Cross-Site Request Forgery to Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c873d838-58e8-4f69-bccb-6d1de8d91877?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-as-customer-or-user/" + google-query: inurl:"/wp-content/plugins/login-as-customer-or-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-as-customer-or-user,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-as-customer-or-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-as-customer-or-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-as-customer-or-user-ec624f0e0c8a0434187e7e5ecb5e4e8b.yaml b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-ec624f0e0c8a0434187e7e5ecb5e4e8b.yaml new file mode 100644 index 0000000000..57085d64b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-as-customer-or-user-ec624f0e0c8a0434187e7e5ecb5e4e8b.yaml @@ -0,0 +1,58 @@ +id: login-as-customer-or-user-ec624f0e0c8a0434187e7e5ecb5e4e8b + +info: + name: > + Login as User or Customer < 1.8 - Missing Authorization to Arbitrary Plugin Installation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7d7ec5b-0616-4895-b5bf-be25ac37fb17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-as-customer-or-user/" + google-query: inurl:"/wp-content/plugins/login-as-customer-or-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-as-customer-or-user,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-as-customer-or-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-as-customer-or-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-attempts-limit-wp-0eea71d63bea39cf2254e5ce7029cff0.yaml b/nuclei-templates/cve-less/plugins/login-attempts-limit-wp-0eea71d63bea39cf2254e5ce7029cff0.yaml new file mode 100644 index 0000000000..299603b294 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-attempts-limit-wp-0eea71d63bea39cf2254e5ce7029cff0.yaml @@ -0,0 +1,58 @@ +id: login-attempts-limit-wp-0eea71d63bea39cf2254e5ce7029cff0 + +info: + name: > + LOGIN AND REGISTRATION ATTEMPTS LIMIT <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/257052f4-2b0a-4604-befd-651dc338b3d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-attempts-limit-wp/" + google-query: inurl:"/wp-content/plugins/login-attempts-limit-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-attempts-limit-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-attempts-limit-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-attempts-limit-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-block-ips-02f07014b96a3edb2c7f1b16bbe0bd90.yaml b/nuclei-templates/cve-less/plugins/login-block-ips-02f07014b96a3edb2c7f1b16bbe0bd90.yaml new file mode 100644 index 0000000000..d4a2f78f5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-block-ips-02f07014b96a3edb2c7f1b16bbe0bd90.yaml @@ -0,0 +1,58 @@ +id: login-block-ips-02f07014b96a3edb2c7f1b16bbe0bd90 + +info: + name: > + Login Block IPs <= 1.0.0 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3adabcc-3259-4d4d-8359-71af16823d18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-block-ips/" + google-query: inurl:"/wp-content/plugins/login-block-ips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-block-ips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-block-ips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-block-ips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-block-ips-a8dff80c8e083adc6ae91aa812785cd7.yaml b/nuclei-templates/cve-less/plugins/login-block-ips-a8dff80c8e083adc6ae91aa812785cd7.yaml new file mode 100644 index 0000000000..8e6bde4ac0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-block-ips-a8dff80c8e083adc6ae91aa812785cd7.yaml @@ -0,0 +1,58 @@ +id: login-block-ips-a8dff80c8e083adc6ae91aa812785cd7 + +info: + name: > + Login Block IPs <= 1.0.0 - IP Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e772760-f390-417f-82d0-f415a6ef837d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-block-ips/" + google-query: inurl:"/wp-content/plugins/login-block-ips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-block-ips,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-block-ips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-block-ips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-configurator-138f6d0c8e0041a5a9ff7dcdbdf2c1bd.yaml b/nuclei-templates/cve-less/plugins/login-configurator-138f6d0c8e0041a5a9ff7dcdbdf2c1bd.yaml new file mode 100644 index 0000000000..c340265119 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-configurator-138f6d0c8e0041a5a9ff7dcdbdf2c1bd.yaml @@ -0,0 +1,58 @@ +id: login-configurator-138f6d0c8e0041a5a9ff7dcdbdf2c1bd + +info: + name: > + Login Configurator <= 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb148264-c75e-4e73-95d7-3a06cdd8990e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-configurator/" + google-query: inurl:"/wp-content/plugins/login-configurator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-configurator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-configurator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-configurator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-configurator-46799564b7a9d79d9f58df7d68a85824.yaml b/nuclei-templates/cve-less/plugins/login-configurator-46799564b7a9d79d9f58df7d68a85824.yaml new file mode 100644 index 0000000000..f913199f0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-configurator-46799564b7a9d79d9f58df7d68a85824.yaml @@ -0,0 +1,58 @@ +id: login-configurator-46799564b7a9d79d9f58df7d68a85824 + +info: + name: > + Login Configurator <= 2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d3606f-bd62-4844-ac17-8e47feddab92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-configurator/" + google-query: inurl:"/wp-content/plugins/login-configurator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-configurator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-configurator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-configurator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-configurator-beaa951d6e891d70c494baee952c2f4e.yaml b/nuclei-templates/cve-less/plugins/login-configurator-beaa951d6e891d70c494baee952c2f4e.yaml new file mode 100644 index 0000000000..b0923c5878 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-configurator-beaa951d6e891d70c494baee952c2f4e.yaml @@ -0,0 +1,58 @@ +id: login-configurator-beaa951d6e891d70c494baee952c2f4e + +info: + name: > + Login Configurator <= 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b89a1265-6e26-498c-a2b4-da12d38463c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-configurator/" + google-query: inurl:"/wp-content/plugins/login-configurator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-configurator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-configurator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-configurator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-customizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/login-customizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a3663192be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-customizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: login-customizer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-customizer/" + google-query: inurl:"/wp-content/plugins/login-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-customizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-form-recaptcha-eab309830ae20eeb18b4936d022eab3a.yaml b/nuclei-templates/cve-less/plugins/login-form-recaptcha-eab309830ae20eeb18b4936d022eab3a.yaml new file mode 100644 index 0000000000..aef71e3aa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-form-recaptcha-eab309830ae20eeb18b4936d022eab3a.yaml @@ -0,0 +1,58 @@ +id: login-form-recaptcha-eab309830ae20eeb18b4936d022eab3a + +info: + name: > + reCAPTCHA <= 1.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55f7914f-9731-4b43-b2c0-b3474508e40a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-form-recaptcha/" + google-query: inurl:"/wp-content/plugins/login-form-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-form-recaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-form-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-form-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-lockdown-1bbaae2a7a498b205fb902506cd09f7f.yaml b/nuclei-templates/cve-less/plugins/login-lockdown-1bbaae2a7a498b205fb902506cd09f7f.yaml new file mode 100644 index 0000000000..dc9c0d73c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-lockdown-1bbaae2a7a498b205fb902506cd09f7f.yaml @@ -0,0 +1,58 @@ +id: login-lockdown-1bbaae2a7a498b205fb902506cd09f7f + +info: + name: > + Login Lockdown <= 2.06 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09773141-883b-40e3-bd20-d3115c02e023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-lockdown/" + google-query: inurl:"/wp-content/plugins/login-lockdown/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-lockdown,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-lockdown/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-lockdown" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-lockdown-88f9434afbf3660fe0710b500aa999f9.yaml b/nuclei-templates/cve-less/plugins/login-lockdown-88f9434afbf3660fe0710b500aa999f9.yaml new file mode 100644 index 0000000000..14bc3ec0f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-lockdown-88f9434afbf3660fe0710b500aa999f9.yaml @@ -0,0 +1,58 @@ +id: login-lockdown-88f9434afbf3660fe0710b500aa999f9 + +info: + name: > + Login Lockdown – Protect Login Form <= 2.08 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34021007-b5d3-479b-a0d4-50e301f22c9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-lockdown/" + google-query: inurl:"/wp-content/plugins/login-lockdown/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-lockdown,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-lockdown/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-lockdown" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.08') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-lockdown-e2d3306782ffc6dc1c4428ce58ed053c.yaml b/nuclei-templates/cve-less/plugins/login-lockdown-e2d3306782ffc6dc1c4428ce58ed053c.yaml new file mode 100644 index 0000000000..6ff3ff52d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-lockdown-e2d3306782ffc6dc1c4428ce58ed053c.yaml @@ -0,0 +1,58 @@ +id: login-lockdown-e2d3306782ffc6dc1c4428ce58ed053c + +info: + name: > + Login Lockdown – Protect Login Form <= 2.06 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c9d088c-e71a-4e73-a7e3-d99f3511e519?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-lockdown/" + google-query: inurl:"/wp-content/plugins/login-lockdown/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-lockdown,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-lockdown/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-lockdown" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-logout-menu-de60bb7a2d8edb4c8b70880b7d8f6006.yaml b/nuclei-templates/cve-less/plugins/login-logout-menu-de60bb7a2d8edb4c8b70880b7d8f6006.yaml new file mode 100644 index 0000000000..634b6d2146 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-logout-menu-de60bb7a2d8edb4c8b70880b7d8f6006.yaml @@ -0,0 +1,58 @@ +id: login-logout-menu-de60bb7a2d8edb4c8b70880b7d8f6006 + +info: + name: > + Login Logout Menu <= 1.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8772a00a-b285-4b1e-a903-6f8404cf21a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-logout-menu/" + google-query: inurl:"/wp-content/plugins/login-logout-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-logout-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-logout-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-logout-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-logout-register-menu-1b2984fc633af00dfb52c6ca6adba0af.yaml b/nuclei-templates/cve-less/plugins/login-logout-register-menu-1b2984fc633af00dfb52c6ca6adba0af.yaml new file mode 100644 index 0000000000..a63ac30996 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-logout-register-menu-1b2984fc633af00dfb52c6ca6adba0af.yaml @@ -0,0 +1,58 @@ +id: login-logout-register-menu-1b2984fc633af00dfb52c6ca6adba0af + +info: + name: > + Login Logout Register Menu <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04057d0b-f831-4629-af74-393bb77689e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-logout-register-menu/" + google-query: inurl:"/wp-content/plugins/login-logout-register-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-logout-register-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-logout-register-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-logout-register-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-or-logout-menu-item-ca7d5b5619ab641f67f5cf5a4e55e4af.yaml b/nuclei-templates/cve-less/plugins/login-or-logout-menu-item-ca7d5b5619ab641f67f5cf5a4e55e4af.yaml new file mode 100644 index 0000000000..1b091eb799 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-or-logout-menu-item-ca7d5b5619ab641f67f5cf5a4e55e4af.yaml @@ -0,0 +1,58 @@ +id: login-or-logout-menu-item-ca7d5b5619ab641f67f5cf5a4e55e4af + +info: + name: > + Login or Logout Menu Item <= 1.1.1 - Unauthenticated Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9bfae23-7b5c-46d8-9d7e-cc261280e223?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-or-logout-menu-item/" + google-query: inurl:"/wp-content/plugins/login-or-logout-menu-item/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-or-logout-menu-item,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-or-logout-menu-item/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-or-logout-menu-item" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-page-styler-7d4c259ea0aa11707d8270b3e5db8568.yaml b/nuclei-templates/cve-less/plugins/login-page-styler-7d4c259ea0aa11707d8270b3e5db8568.yaml new file mode 100644 index 0000000000..8ee45313c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-page-styler-7d4c259ea0aa11707d8270b3e5db8568.yaml @@ -0,0 +1,58 @@ +id: login-page-styler-7d4c259ea0aa11707d8270b3e5db8568 + +info: + name: > + Login Page Styler <= 6.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d70cd0a-5c30-4a9b-81e8-e465d1e8f2b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-page-styler/" + google-query: inurl:"/wp-content/plugins/login-page-styler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-page-styler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-page-styler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-page-styler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-rebuilder-0769a7de02fdecf0755ac761d0a440c1.yaml b/nuclei-templates/cve-less/plugins/login-rebuilder-0769a7de02fdecf0755ac761d0a440c1.yaml new file mode 100644 index 0000000000..bf6ea4c831 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-rebuilder-0769a7de02fdecf0755ac761d0a440c1.yaml @@ -0,0 +1,58 @@ +id: login-rebuilder-0769a7de02fdecf0755ac761d0a440c1 + +info: + name: > + Login rebuilder <= 2.8.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae14765-ba85-4aba-83ae-41f7de2f2551?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-rebuilder/" + google-query: inurl:"/wp-content/plugins/login-rebuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-rebuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-rebuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-rebuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-rebuilder-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml b/nuclei-templates/cve-less/plugins/login-rebuilder-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml new file mode 100644 index 0000000000..f9f047a1a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-rebuilder-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml @@ -0,0 +1,58 @@ +id: login-rebuilder-a2f350e1414d89ef0f2cdb91d69b4d0f + +info: + name: > + Login rebuilder < 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f75936d7-12bc-47cc-b901-17fd42c05d66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-rebuilder/" + google-query: inurl:"/wp-content/plugins/login-rebuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-rebuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-rebuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-rebuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-recaptcha-b6dd04c8ab5f16c9a1c8ee0a8dbc7845.yaml b/nuclei-templates/cve-less/plugins/login-recaptcha-b6dd04c8ab5f16c9a1c8ee0a8dbc7845.yaml new file mode 100644 index 0000000000..4f32d771f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-recaptcha-b6dd04c8ab5f16c9a1c8ee0a8dbc7845.yaml @@ -0,0 +1,58 @@ +id: login-recaptcha-b6dd04c8ab5f16c9a1c8ee0a8dbc7845 + +info: + name: > + Login No Captcha reCAPTCHA <= 1.6.11 - CAPTCHA Bypass via Whitelisted IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8c69fc2-e1bf-43e7-a80e-931dbb70d8da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-recaptcha/" + google-query: inurl:"/wp-content/plugins/login-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-recaptcha,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-screen-manager-16cbd69900a20c2a15cc998b66c6e30e.yaml b/nuclei-templates/cve-less/plugins/login-screen-manager-16cbd69900a20c2a15cc998b66c6e30e.yaml new file mode 100644 index 0000000000..f466a44ec9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-screen-manager-16cbd69900a20c2a15cc998b66c6e30e.yaml @@ -0,0 +1,58 @@ +id: login-screen-manager-16cbd69900a20c2a15cc998b66c6e30e + +info: + name: > + Login Screen Manager <= 3.5.2 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d6c37ec-4a17-41b8-a29e-2a9adb382cea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-screen-manager/" + google-query: inurl:"/wp-content/plugins/login-screen-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-screen-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-screen-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-screen-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-sidebar-widget-fae7d043617694cc89520aef8cdc5ad0.yaml b/nuclei-templates/cve-less/plugins/login-sidebar-widget-fae7d043617694cc89520aef8cdc5ad0.yaml new file mode 100644 index 0000000000..99ce07bef4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-sidebar-widget-fae7d043617694cc89520aef8cdc5ad0.yaml @@ -0,0 +1,58 @@ +id: login-sidebar-widget-fae7d043617694cc89520aef8cdc5ad0 + +info: + name: > + Login Widget With Shortcode < 3.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e10db126-a22e-4e15-a868-6fd9172fa805?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-sidebar-widget/" + google-query: inurl:"/wp-content/plugins/login-sidebar-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-sidebar-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-sidebar-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-sidebar-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-ajax-08c2b329300ceeb5ec4ee1c1cf18abf3.yaml b/nuclei-templates/cve-less/plugins/login-with-ajax-08c2b329300ceeb5ec4ee1c1cf18abf3.yaml new file mode 100644 index 0000000000..d779b51036 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-ajax-08c2b329300ceeb5ec4ee1c1cf18abf3.yaml @@ -0,0 +1,58 @@ +id: login-with-ajax-08c2b329300ceeb5ec4ee1c1cf18abf3 + +info: + name: > + Login With Ajax <= 3.1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64a0bfa9-beb3-4926-bfed-af55a101aff1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-ajax/" + google-query: inurl:"/wp-content/plugins/login-with-ajax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-ajax,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-ajax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-ajax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-ajax-2c0d615cfdc7e7ed23f5751818a97642.yaml b/nuclei-templates/cve-less/plugins/login-with-ajax-2c0d615cfdc7e7ed23f5751818a97642.yaml new file mode 100644 index 0000000000..1583659a37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-ajax-2c0d615cfdc7e7ed23f5751818a97642.yaml @@ -0,0 +1,58 @@ +id: login-with-ajax-2c0d615cfdc7e7ed23f5751818a97642 + +info: + name: > + Login With Ajax <= 4.1 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec29e5fc-5635-4809-9bb5-cd28f7fac17e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-ajax/" + google-query: inurl:"/wp-content/plugins/login-with-ajax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-ajax,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-ajax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-ajax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-ajax-7bcea995c31208e7b3ae2001fc2e0fd5.yaml b/nuclei-templates/cve-less/plugins/login-with-ajax-7bcea995c31208e7b3ae2001fc2e0fd5.yaml new file mode 100644 index 0000000000..95651cdece --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-ajax-7bcea995c31208e7b3ae2001fc2e0fd5.yaml @@ -0,0 +1,58 @@ +id: login-with-ajax-7bcea995c31208e7b3ae2001fc2e0fd5 + +info: + name: > + Login With Ajax <= 3.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/416fc00d-2e72-41aa-9023-0c098ca32192?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-ajax/" + google-query: inurl:"/wp-content/plugins/login-with-ajax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-ajax,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-ajax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-ajax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-ajax-d9979e2b554699fb1813833b2efa0480.yaml b/nuclei-templates/cve-less/plugins/login-with-ajax-d9979e2b554699fb1813833b2efa0480.yaml new file mode 100644 index 0000000000..d1f6485fe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-ajax-d9979e2b554699fb1813833b2efa0480.yaml @@ -0,0 +1,58 @@ +id: login-with-ajax-d9979e2b554699fb1813833b2efa0480 + +info: + name: > + Login With Ajax < 3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dec045a-b87c-4db5-960e-8888e410a950?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-ajax/" + google-query: inurl:"/wp-content/plugins/login-with-ajax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-ajax,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-ajax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-ajax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-ajax-ec063e4ec21933641631e905d4f64602.yaml b/nuclei-templates/cve-less/plugins/login-with-ajax-ec063e4ec21933641631e905d4f64602.yaml new file mode 100644 index 0000000000..391802b3bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-ajax-ec063e4ec21933641631e905d4f64602.yaml @@ -0,0 +1,58 @@ +id: login-with-ajax-ec063e4ec21933641631e905d4f64602 + +info: + name: > + Login With Ajax < 3.0.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a925c74-9f12-41e1-9443-d533b645c3f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-ajax/" + google-query: inurl:"/wp-content/plugins/login-with-ajax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-ajax,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-ajax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-ajax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-ajax-fe796847eb830527572fd03364591cba.yaml b/nuclei-templates/cve-less/plugins/login-with-ajax-fe796847eb830527572fd03364591cba.yaml new file mode 100644 index 0000000000..ab3dc9de63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-ajax-fe796847eb830527572fd03364591cba.yaml @@ -0,0 +1,58 @@ +id: login-with-ajax-fe796847eb830527572fd03364591cba + +info: + name: > + Login With Ajax <= 4.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f11926c8-2b31-4ad5-9fd0-225071a91b2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-ajax/" + google-query: inurl:"/wp-content/plugins/login-with-ajax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-ajax,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-ajax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-ajax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-azure-eebb96ce6566b7b10661225a9046264f.yaml b/nuclei-templates/cve-less/plugins/login-with-azure-eebb96ce6566b7b10661225a9046264f.yaml new file mode 100644 index 0000000000..bc4c8113a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-azure-eebb96ce6566b7b10661225a9046264f.yaml @@ -0,0 +1,58 @@ +id: login-with-azure-eebb96ce6566b7b10661225a9046264f + +info: + name: > + Multiple miniOrange Plugins (Various Version) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44cbaa25-7e91-4b2e-81c4-ba1d7ba02350?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-azure/" + google-query: inurl:"/wp-content/plugins/login-with-azure/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-azure,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-azure/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-azure" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-cognito-29259c5b25c72133b49fdd41585cc3d7.yaml b/nuclei-templates/cve-less/plugins/login-with-cognito-29259c5b25c72133b49fdd41585cc3d7.yaml new file mode 100644 index 0000000000..488b7fad04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-cognito-29259c5b25c72133b49fdd41585cc3d7.yaml @@ -0,0 +1,58 @@ +id: login-with-cognito-29259c5b25c72133b49fdd41585cc3d7 + +info: + name: > + Login with Cognito <= 1.4.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5e88393-c76b-49b6-a55c-06094e6f82d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-cognito/" + google-query: inurl:"/wp-content/plugins/login-with-cognito/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-cognito,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-cognito/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-cognito" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-cognito-a884c095d086c59985c21ee277047e23.yaml b/nuclei-templates/cve-less/plugins/login-with-cognito-a884c095d086c59985c21ee277047e23.yaml new file mode 100644 index 0000000000..aa54c9fe7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-cognito-a884c095d086c59985c21ee277047e23.yaml @@ -0,0 +1,58 @@ +id: login-with-cognito-a884c095d086c59985c21ee277047e23 + +info: + name: > + Login with Cognito <= 1.4.6 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c3ae610-44ef-4354-b085-00c00a486dc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-cognito/" + google-query: inurl:"/wp-content/plugins/login-with-cognito/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-cognito,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-cognito/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-cognito" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-cognito-eebb96ce6566b7b10661225a9046264f.yaml b/nuclei-templates/cve-less/plugins/login-with-cognito-eebb96ce6566b7b10661225a9046264f.yaml new file mode 100644 index 0000000000..3e3d4d630a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-cognito-eebb96ce6566b7b10661225a9046264f.yaml @@ -0,0 +1,58 @@ +id: login-with-cognito-eebb96ce6566b7b10661225a9046264f + +info: + name: > + Multiple miniOrange Plugins (Various Version) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44cbaa25-7e91-4b2e-81c4-ba1d7ba02350?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-cognito/" + google-query: inurl:"/wp-content/plugins/login-with-cognito/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-cognito,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-cognito/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-cognito" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-phone-number-208e3b31993605c004819fb7fd167d1a.yaml b/nuclei-templates/cve-less/plugins/login-with-phone-number-208e3b31993605c004819fb7fd167d1a.yaml new file mode 100644 index 0000000000..2141ec66c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-phone-number-208e3b31993605c004819fb7fd167d1a.yaml @@ -0,0 +1,58 @@ +id: login-with-phone-number-208e3b31993605c004819fb7fd167d1a + +info: + name: > + Login with phone number <= 1.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3819ffc4-8889-4199-9dd6-140490a17ed6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-phone-number/" + google-query: inurl:"/wp-content/plugins/login-with-phone-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-phone-number,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-phone-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-phone-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-phone-number-56f2f327244a430ca8fc636a97b2e3cb.yaml b/nuclei-templates/cve-less/plugins/login-with-phone-number-56f2f327244a430ca8fc636a97b2e3cb.yaml new file mode 100644 index 0000000000..682ac104f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-phone-number-56f2f327244a430ca8fc636a97b2e3cb.yaml @@ -0,0 +1,58 @@ +id: login-with-phone-number-56f2f327244a430ca8fc636a97b2e3cb + +info: + name: > + Login with phone number <= 1.7.16 - Unauthorized Account Password Change to Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95247ff5-0277-4270-a1ea-221ea2ecee0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-phone-number/" + google-query: inurl:"/wp-content/plugins/login-with-phone-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-phone-number,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-phone-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-phone-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-phone-number-64bb9b276a0e4073663c51a2aaebe19f.yaml b/nuclei-templates/cve-less/plugins/login-with-phone-number-64bb9b276a0e4073663c51a2aaebe19f.yaml new file mode 100644 index 0000000000..d4aac9160e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-phone-number-64bb9b276a0e4073663c51a2aaebe19f.yaml @@ -0,0 +1,58 @@ +id: login-with-phone-number-64bb9b276a0e4073663c51a2aaebe19f + +info: + name: > + Login with phone number <= 1.6.93 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c600e8d0-7fe1-408e-a51d-8519a9acceb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-phone-number/" + google-query: inurl:"/wp-content/plugins/login-with-phone-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-phone-number,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-phone-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-phone-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-phone-number-6f4c822113b8980ad7d9ecbb478cdfd7.yaml b/nuclei-templates/cve-less/plugins/login-with-phone-number-6f4c822113b8980ad7d9ecbb478cdfd7.yaml new file mode 100644 index 0000000000..7e88feb231 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-phone-number-6f4c822113b8980ad7d9ecbb478cdfd7.yaml @@ -0,0 +1,58 @@ +id: login-with-phone-number-6f4c822113b8980ad7d9ecbb478cdfd7 + +info: + name: > + Login with phone number <= 1.6.93 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2dfe5dd0-0dc9-4c64-8972-045325e5a54f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-phone-number/" + google-query: inurl:"/wp-content/plugins/login-with-phone-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-phone-number,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-phone-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-phone-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-phone-number-a833ece3f343246705571f6788efd405.yaml b/nuclei-templates/cve-less/plugins/login-with-phone-number-a833ece3f343246705571f6788efd405.yaml new file mode 100644 index 0000000000..d247c4099a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-phone-number-a833ece3f343246705571f6788efd405.yaml @@ -0,0 +1,58 @@ +id: login-with-phone-number-a833ece3f343246705571f6788efd405 + +info: + name: > + Login with phone number <= 1.3.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f76e294-1b17-4125-b85c-af7957de1c13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-phone-number/" + google-query: inurl:"/wp-content/plugins/login-with-phone-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-phone-number,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-phone-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-phone-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-phone-number-ac531ca44d844146efaf8a60c7e71d41.yaml b/nuclei-templates/cve-less/plugins/login-with-phone-number-ac531ca44d844146efaf8a60c7e71d41.yaml new file mode 100644 index 0000000000..bbd97e5627 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-phone-number-ac531ca44d844146efaf8a60c7e71d41.yaml @@ -0,0 +1,58 @@ +id: login-with-phone-number-ac531ca44d844146efaf8a60c7e71d41 + +info: + name: > + Login with phone number <= 1.7.18 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2756dcf4-715f-4a7b-855c-7347455e0323?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-phone-number/" + google-query: inurl:"/wp-content/plugins/login-with-phone-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-phone-number,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-phone-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-phone-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-phone-number-b9138583e38a18d791c31fb8353403c7.yaml b/nuclei-templates/cve-less/plugins/login-with-phone-number-b9138583e38a18d791c31fb8353403c7.yaml new file mode 100644 index 0000000000..36a40b7809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-phone-number-b9138583e38a18d791c31fb8353403c7.yaml @@ -0,0 +1,58 @@ +id: login-with-phone-number-b9138583e38a18d791c31fb8353403c7 + +info: + name: > + Login with phone number <= 1.3.6 - Unauthenticated Remote Plugin Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1716ef84-759e-4b40-aaa3-ae6ead41fcb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-phone-number/" + google-query: inurl:"/wp-content/plugins/login-with-phone-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-phone-number,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-phone-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-phone-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-phone-number-ec75720f681f6e8a0dfa73dc2af48726.yaml b/nuclei-templates/cve-less/plugins/login-with-phone-number-ec75720f681f6e8a0dfa73dc2af48726.yaml new file mode 100644 index 0000000000..5f86b82c82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-phone-number-ec75720f681f6e8a0dfa73dc2af48726.yaml @@ -0,0 +1,58 @@ +id: login-with-phone-number-ec75720f681f6e8a0dfa73dc2af48726 + +info: + name: > + Login with phone number <= 1.5.6 - Cross-Site Request Forgery to User Password Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71083db7-377b-47a1-ac8b-83d8974a2654?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-phone-number/" + google-query: inurl:"/wp-content/plugins/login-with-phone-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-phone-number,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-phone-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-phone-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-yourmembership-5f0a636903de630172f072592f6edff3.yaml b/nuclei-templates/cve-less/plugins/login-with-yourmembership-5f0a636903de630172f072592f6edff3.yaml new file mode 100644 index 0000000000..50313d3f53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-yourmembership-5f0a636903de630172f072592f6edff3.yaml @@ -0,0 +1,58 @@ +id: login-with-yourmembership-5f0a636903de630172f072592f6edff3 + +info: + name: > + YourMembership Single Sign On <= 1.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4419dc63-24bc-41b1-bea6-6426b6f10577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-yourmembership/" + google-query: inurl:"/wp-content/plugins/login-with-yourmembership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-yourmembership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-yourmembership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-yourmembership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/login-with-yourmembership-c5fe48358feae544a0b21efff11ac6fd.yaml b/nuclei-templates/cve-less/plugins/login-with-yourmembership-c5fe48358feae544a0b21efff11ac6fd.yaml new file mode 100644 index 0000000000..c35b3fce31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/login-with-yourmembership-c5fe48358feae544a0b21efff11ac6fd.yaml @@ -0,0 +1,58 @@ +id: login-with-yourmembership-c5fe48358feae544a0b21efff11ac6fd + +info: + name: > + YourMembership Single Sign On <= 1.1.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ef64d17-fc52-4d47-aca3-e136245bc114?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-with-yourmembership/" + google-query: inurl:"/wp-content/plugins/login-with-yourmembership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-with-yourmembership,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-with-yourmembership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-with-yourmembership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginizer-27753e35f86f0683018abe1867499f91.yaml b/nuclei-templates/cve-less/plugins/loginizer-27753e35f86f0683018abe1867499f91.yaml new file mode 100644 index 0000000000..ad4f047b20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginizer-27753e35f86f0683018abe1867499f91.yaml @@ -0,0 +1,58 @@ +id: loginizer-27753e35f86f0683018abe1867499f91 + +info: + name: > + Loginizer <= 1.3.5 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/595fac73-c583-4712-ad37-fbd0fa3eb147?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginizer/" + google-query: inurl:"/wp-content/plugins/loginizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginizer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginizer-2ab9cce0c78fb172d9887da5c8b47923.yaml b/nuclei-templates/cve-less/plugins/loginizer-2ab9cce0c78fb172d9887da5c8b47923.yaml new file mode 100644 index 0000000000..1a3e6f5d87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginizer-2ab9cce0c78fb172d9887da5c8b47923.yaml @@ -0,0 +1,58 @@ +id: loginizer-2ab9cce0c78fb172d9887da5c8b47923 + +info: + name: > + Loginizer <= 1.7.5 - Reflected Cross-Site Scripting via 'name' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/410ae0f1-a4ed-4631-9f80-86b7a403ce0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginizer/" + google-query: inurl:"/wp-content/plugins/loginizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginizer-c17200ba4236119c0958120e5b5ef5cb.yaml b/nuclei-templates/cve-less/plugins/loginizer-c17200ba4236119c0958120e5b5ef5cb.yaml new file mode 100644 index 0000000000..8c1d20b38b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginizer-c17200ba4236119c0958120e5b5ef5cb.yaml @@ -0,0 +1,58 @@ +id: loginizer-c17200ba4236119c0958120e5b5ef5cb + +info: + name: > + Loginizer <= 1.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e91c0935-4213-4376-86ec-7ff78808fb9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginizer/" + google-query: inurl:"/wp-content/plugins/loginizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginizer-c30046dfca2652f0c4622a1ba6d544e7.yaml b/nuclei-templates/cve-less/plugins/loginizer-c30046dfca2652f0c4622a1ba6d544e7.yaml new file mode 100644 index 0000000000..82dcaee29d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginizer-c30046dfca2652f0c4622a1ba6d544e7.yaml @@ -0,0 +1,58 @@ +id: loginizer-c30046dfca2652f0c4622a1ba6d544e7 + +info: + name: > + Loginizer <= 1.7.8 - Reflected Cross-Site Scripting via 'limit_session[count]' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e6ef932-975c-423b-b780-b38449eec577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginizer/" + google-query: inurl:"/wp-content/plugins/loginizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginizer-cfd6c4a67043af04f9e4f98a73eab3fa.yaml b/nuclei-templates/cve-less/plugins/loginizer-cfd6c4a67043af04f9e4f98a73eab3fa.yaml new file mode 100644 index 0000000000..12b1154eb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginizer-cfd6c4a67043af04f9e4f98a73eab3fa.yaml @@ -0,0 +1,58 @@ +id: loginizer-cfd6c4a67043af04f9e4f98a73eab3fa + +info: + name: > + Loginizer 1.3.8-1.3.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a05b1d00-386f-4914-80e6-92d3e9721dc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginizer/" + google-query: inurl:"/wp-content/plugins/loginizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.3.8', '<= 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginizer-dbdf12cf139233f26433b910fe482aa7.yaml b/nuclei-templates/cve-less/plugins/loginizer-dbdf12cf139233f26433b910fe482aa7.yaml new file mode 100644 index 0000000000..a9e4a6c1b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginizer-dbdf12cf139233f26433b910fe482aa7.yaml @@ -0,0 +1,58 @@ +id: loginizer-dbdf12cf139233f26433b910fe482aa7 + +info: + name: > + Loginizer <= 1.7.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11bdcf58-be0c-4fdb-ac15-ee4c3afe7275?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginizer/" + google-query: inurl:"/wp-content/plugins/loginizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginizer-e3a5de57aa22129643a4695275352679.yaml b/nuclei-templates/cve-less/plugins/loginizer-e3a5de57aa22129643a4695275352679.yaml new file mode 100644 index 0000000000..155e66a3bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginizer-e3a5de57aa22129643a4695275352679.yaml @@ -0,0 +1,58 @@ +id: loginizer-e3a5de57aa22129643a4695275352679 + +info: + name: > + Loginizer <= 1.6.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58f8bba4-1be5-4111-aa41-d076a6f06948?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginizer/" + google-query: inurl:"/wp-content/plugins/loginizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginizer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginpress-62395a250bd2c0c27cc1d46d95105e15.yaml b/nuclei-templates/cve-less/plugins/loginpress-62395a250bd2c0c27cc1d46d95105e15.yaml new file mode 100644 index 0000000000..f2980e831d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginpress-62395a250bd2c0c27cc1d46d95105e15.yaml @@ -0,0 +1,58 @@ +id: loginpress-62395a250bd2c0c27cc1d46d95105e15 + +info: + name: > + LoginPress <= 1.1.15 - Authenticated Stored Cross-SIte Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65fc55bb-2b86-466a-b43b-554628283f02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginpress/" + google-query: inurl:"/wp-content/plugins/loginpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginpress-9e304c0c2d27a9a5e4112a85cbe97828.yaml b/nuclei-templates/cve-less/plugins/loginpress-9e304c0c2d27a9a5e4112a85cbe97828.yaml new file mode 100644 index 0000000000..53ea342de6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginpress-9e304c0c2d27a9a5e4112a85cbe97828.yaml @@ -0,0 +1,58 @@ +id: loginpress-9e304c0c2d27a9a5e4112a85cbe97828 + +info: + name: > + LoginPress <= 1.1.15 - Authenticated SQL Injection via Settings Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74386b2f-9686-4f55-be30-c02ea8fb12b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginpress/" + google-query: inurl:"/wp-content/plugins/loginpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginpress-bed0cdd535564a50bc24db1db8a6aa5a.yaml b/nuclei-templates/cve-less/plugins/loginpress-bed0cdd535564a50bc24db1db8a6aa5a.yaml new file mode 100644 index 0000000000..7aeb8f2442 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginpress-bed0cdd535564a50bc24db1db8a6aa5a.yaml @@ -0,0 +1,58 @@ +id: loginpress-bed0cdd535564a50bc24db1db8a6aa5a + +info: + name: > + LoginPress <= 1.5.11 - Reflected Cross-Site Scripting via redirect-page Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5df2dfcd-2fda-4f09-bd77-f437422d20bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginpress/" + google-query: inurl:"/wp-content/plugins/loginpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginpress-e364d48aca33a25dca805353038f64e7.yaml b/nuclei-templates/cve-less/plugins/loginpress-e364d48aca33a25dca805353038f64e7.yaml new file mode 100644 index 0000000000..41f41623e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginpress-e364d48aca33a25dca805353038f64e7.yaml @@ -0,0 +1,58 @@ +id: loginpress-e364d48aca33a25dca805353038f64e7 + +info: + name: > + LoginPress | Custom Login Page Customizer <= 1.1.13 - Unauthorized Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efbecb4b-fc41-4719-be5e-af11b47ff683?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginpress/" + google-query: inurl:"/wp-content/plugins/loginpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginpress-ff3790cb0753cd7ef435623008e69310.yaml b/nuclei-templates/cve-less/plugins/loginpress-ff3790cb0753cd7ef435623008e69310.yaml new file mode 100644 index 0000000000..57831e0be2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginpress-ff3790cb0753cd7ef435623008e69310.yaml @@ -0,0 +1,58 @@ +id: loginpress-ff3790cb0753cd7ef435623008e69310 + +info: + name: > + LoginPress | Custom Login Page Customizer <= 1.6.2 - Missing Authorization to Settings Changes + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d212c19d-fca9-4daf-95f4-5b3ac302e817?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginpress/" + google-query: inurl:"/wp-content/plugins/loginpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginpress-pro-2c903b10bdf887533eb269f90c22486a.yaml b/nuclei-templates/cve-less/plugins/loginpress-pro-2c903b10bdf887533eb269f90c22486a.yaml new file mode 100644 index 0000000000..288d6f8b25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginpress-pro-2c903b10bdf887533eb269f90c22486a.yaml @@ -0,0 +1,58 @@ +id: loginpress-pro-2c903b10bdf887533eb269f90c22486a + +info: + name: > + LoginPress Pro < 3.0 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6763d445-0d4f-4ac0-b41a-a30e09fcb21c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginpress-pro/" + google-query: inurl:"/wp-content/plugins/loginpress-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginpress-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginpress-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginpress-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/loginpress-pro-6243447eedf5d12aac34558af1ea267e.yaml b/nuclei-templates/cve-less/plugins/loginpress-pro-6243447eedf5d12aac34558af1ea267e.yaml new file mode 100644 index 0000000000..16f1b594a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/loginpress-pro-6243447eedf5d12aac34558af1ea267e.yaml @@ -0,0 +1,58 @@ +id: loginpress-pro-6243447eedf5d12aac34558af1ea267e + +info: + name: > + LoginPress Pro < 3.0 - Missing Authorization to License Status Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13fb7904-8641-43ae-bcfe-00ca5416e949?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/loginpress-pro/" + google-query: inurl:"/wp-content/plugins/loginpress-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,loginpress-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/loginpress-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "loginpress-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-carousel-free-426067a3112463f4371753090e35be9b.yaml b/nuclei-templates/cve-less/plugins/logo-carousel-free-426067a3112463f4371753090e35be9b.yaml new file mode 100644 index 0000000000..587bf9e33d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-carousel-free-426067a3112463f4371753090e35be9b.yaml @@ -0,0 +1,58 @@ +id: logo-carousel-free-426067a3112463f4371753090e35be9b + +info: + name: > + Logo Carousel <= 3.4.1 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46828b2a-ed76-4074-9fb4-c36bf0fd012c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-carousel-free/" + google-query: inurl:"/wp-content/plugins/logo-carousel-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-carousel-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-carousel-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-carousel-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-carousel-free-493a0e85cf8a05291a415d7ac00931ed.yaml b/nuclei-templates/cve-less/plugins/logo-carousel-free-493a0e85cf8a05291a415d7ac00931ed.yaml new file mode 100644 index 0000000000..cb305d1e30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-carousel-free-493a0e85cf8a05291a415d7ac00931ed.yaml @@ -0,0 +1,58 @@ +id: logo-carousel-free-493a0e85cf8a05291a415d7ac00931ed + +info: + name: > + Logo Carousel <= 3.4.1 - Unauthorised Private Post Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/329a7910-fc9e-4786-9f0e-84eeb6e48bf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-carousel-free/" + google-query: inurl:"/wp-content/plugins/logo-carousel-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-carousel-free,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-carousel-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-carousel-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-scheduler-great-for-holidays-events-and-more-6608e81097680e6fc28899a61a6c4d0d.yaml b/nuclei-templates/cve-less/plugins/logo-scheduler-great-for-holidays-events-and-more-6608e81097680e6fc28899a61a6c4d0d.yaml new file mode 100644 index 0000000000..c573ef6756 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-scheduler-great-for-holidays-events-and-more-6608e81097680e6fc28899a61a6c4d0d.yaml @@ -0,0 +1,58 @@ +id: logo-scheduler-great-for-holidays-events-and-more-6608e81097680e6fc28899a61a6c4d0d + +info: + name: > + Logo Scheduler <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1647a2c-d21d-4b4b-a22e-32351022404e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-scheduler-great-for-holidays-events-and-more/" + google-query: inurl:"/wp-content/plugins/logo-scheduler-great-for-holidays-events-and-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-scheduler-great-for-holidays-events-and-more,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-scheduler-great-for-holidays-events-and-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-scheduler-great-for-holidays-events-and-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-showcase-ultimate-bbfdb718b30267886c66b70ab8a80fee.yaml b/nuclei-templates/cve-less/plugins/logo-showcase-ultimate-bbfdb718b30267886c66b70ab8a80fee.yaml new file mode 100644 index 0000000000..04db293a32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-showcase-ultimate-bbfdb718b30267886c66b70ab8a80fee.yaml @@ -0,0 +1,58 @@ +id: logo-showcase-ultimate-bbfdb718b30267886c66b70ab8a80fee + +info: + name: > + Logo Showcase Ultimate – Logo Carousel, Logo Slider & Logo Grid <= 1.3.8 - Authenticated(Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a63b2091-1502-4d9f-98c4-ce9d2f923dc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-showcase-ultimate/" + google-query: inurl:"/wp-content/plugins/logo-showcase-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-showcase-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-showcase-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-showcase-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-3290c8bd01d458a3a1d47adc4e14d07e.yaml b/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-3290c8bd01d458a3a1d47adc4e14d07e.yaml new file mode 100644 index 0000000000..c7c354cb2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-3290c8bd01d458a3a1d47adc4e14d07e.yaml @@ -0,0 +1,58 @@ +id: logo-showcase-with-slick-slider-3290c8bd01d458a3a1d47adc4e14d07e + +info: + name: > + Logo Showcase with Slick Slider – Logo Carousel, Logo Slider & Logo Grid <= 1.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86b8844e-5d6f-4bc6-97b2-4ff487bb2188?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-showcase-with-slick-slider/" + google-query: inurl:"/wp-content/plugins/logo-showcase-with-slick-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-showcase-with-slick-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-showcase-with-slick-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-showcase-with-slick-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-3a725e62a03f5ade4440af8acdd72f67.yaml b/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-3a725e62a03f5ade4440af8acdd72f67.yaml new file mode 100644 index 0000000000..992788b968 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-3a725e62a03f5ade4440af8acdd72f67.yaml @@ -0,0 +1,58 @@ +id: logo-showcase-with-slick-slider-3a725e62a03f5ade4440af8acdd72f67 + +info: + name: > + Logo Showcase with Slick Slider <= 2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0121ef5-4b0b-47c5-8d3d-7d32c8e67c27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-showcase-with-slick-slider/" + google-query: inurl:"/wp-content/plugins/logo-showcase-with-slick-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-showcase-with-slick-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-showcase-with-slick-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-showcase-with-slick-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-5de20b622f7b3426c6426e4d509bd26e.yaml b/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-5de20b622f7b3426c6426e4d509bd26e.yaml new file mode 100644 index 0000000000..a4daf1bc2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-5de20b622f7b3426c6426e4d509bd26e.yaml @@ -0,0 +1,58 @@ +id: logo-showcase-with-slick-slider-5de20b622f7b3426c6426e4d509bd26e + +info: + name: > + Logo Showcase with Slick Slider – Logo Carousel, Logo Slider & Logo Grid <= 1.2.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0bfe80d-f9d5-4fc0-a8dd-717c31020b8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-showcase-with-slick-slider/" + google-query: inurl:"/wp-content/plugins/logo-showcase-with-slick-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-showcase-with-slick-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-showcase-with-slick-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-showcase-with-slick-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..146e0b77a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-showcase-with-slick-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: logo-showcase-with-slick-slider-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-showcase-with-slick-slider/" + google-query: inurl:"/wp-content/plugins/logo-showcase-with-slick-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-showcase-with-slick-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-showcase-with-slick-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-showcase-with-slick-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-slider-810ed483cc25df9feef2344d7fe0063d.yaml b/nuclei-templates/cve-less/plugins/logo-slider-810ed483cc25df9feef2344d7fe0063d.yaml new file mode 100644 index 0000000000..d3fc097831 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-slider-810ed483cc25df9feef2344d7fe0063d.yaml @@ -0,0 +1,58 @@ +id: logo-slider-810ed483cc25df9feef2344d7fe0063d + +info: + name: > + Logo Slider <= 1.4.8 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f905c0b-6b70-42bf-bf48-6f4eb785bfb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-slider/" + google-query: inurl:"/wp-content/plugins/logo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logo-slider-wp-c7884dbfd12febc95a975f955686dac3.yaml b/nuclei-templates/cve-less/plugins/logo-slider-wp-c7884dbfd12febc95a975f955686dac3.yaml new file mode 100644 index 0000000000..bb030dac2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logo-slider-wp-c7884dbfd12febc95a975f955686dac3.yaml @@ -0,0 +1,58 @@ +id: logo-slider-wp-c7884dbfd12febc95a975f955686dac3 + +info: + name: > + Logo Slider <= 3.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/723ed5c7-041f-4e03-83ad-43438e3265a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logo-slider-wp/" + google-query: inurl:"/wp-content/plugins/logo-slider-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logo-slider-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logo-slider-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logo-slider-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/logwpmail-b232a806932eb3a8c3f6cb5279a74846.yaml b/nuclei-templates/cve-less/plugins/logwpmail-b232a806932eb3a8c3f6cb5279a74846.yaml new file mode 100644 index 0000000000..a496fce473 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/logwpmail-b232a806932eb3a8c3f6cb5279a74846.yaml @@ -0,0 +1,58 @@ +id: logwpmail-b232a806932eb3a8c3f6cb5279a74846 + +info: + name: > + Log WP_Mail <= 0.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf11be7a-0b31-46ce-82ce-5a42898a8a10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/logwpmail/" + google-query: inurl:"/wp-content/plugins/logwpmail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,logwpmail,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/logwpmail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "logwpmail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lokalyze-call-now-8dc7d267bfbf58557e7062f8892fe14c.yaml b/nuclei-templates/cve-less/plugins/lokalyze-call-now-8dc7d267bfbf58557e7062f8892fe14c.yaml new file mode 100644 index 0000000000..34f98b7953 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lokalyze-call-now-8dc7d267bfbf58557e7062f8892fe14c.yaml @@ -0,0 +1,58 @@ +id: lokalyze-call-now-8dc7d267bfbf58557e7062f8892fe14c + +info: + name: > + CALL ME NOW <= 3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05828bdc-74aa-4477-9178-f8cc6a34da42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lokalyze-call-now/" + google-query: inurl:"/wp-content/plugins/lokalyze-call-now/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lokalyze-call-now,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lokalyze-call-now/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lokalyze-call-now" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lordicon-interactive-icons-6765d661ee89fff8539766bb02e51a4e.yaml b/nuclei-templates/cve-less/plugins/lordicon-interactive-icons-6765d661ee89fff8539766bb02e51a4e.yaml new file mode 100644 index 0000000000..7dd58f3d02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lordicon-interactive-icons-6765d661ee89fff8539766bb02e51a4e.yaml @@ -0,0 +1,58 @@ +id: lordicon-interactive-icons-6765d661ee89fff8539766bb02e51a4e + +info: + name: > + Lordicon Animated Icons <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/485b0f47-fb3c-49f5-8e27-c250879cb75f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lordicon-interactive-icons/" + google-query: inurl:"/wp-content/plugins/lordicon-interactive-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lordicon-interactive-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lordicon-interactive-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lordicon-interactive-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/luckywp-scripts-control-4813c58962647ae4a6f05165adf752a7.yaml b/nuclei-templates/cve-less/plugins/luckywp-scripts-control-4813c58962647ae4a6f05165adf752a7.yaml new file mode 100644 index 0000000000..2d63059fa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/luckywp-scripts-control-4813c58962647ae4a6f05165adf752a7.yaml @@ -0,0 +1,58 @@ +id: luckywp-scripts-control-4813c58962647ae4a6f05165adf752a7 + +info: + name: > + LuckyWP Scripts Control <= 1.2.1 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ed93c5c-38bb-4e84-8fe8-03dd75b4d9f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/luckywp-scripts-control/" + google-query: inurl:"/wp-content/plugins/luckywp-scripts-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,luckywp-scripts-control,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/luckywp-scripts-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "luckywp-scripts-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/luckywp-scripts-control-def2f7014de695ca135f23616af5b3ad.yaml b/nuclei-templates/cve-less/plugins/luckywp-scripts-control-def2f7014de695ca135f23616af5b3ad.yaml new file mode 100644 index 0000000000..695b484ab6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/luckywp-scripts-control-def2f7014de695ca135f23616af5b3ad.yaml @@ -0,0 +1,58 @@ +id: luckywp-scripts-control-def2f7014de695ca135f23616af5b3ad + +info: + name: > + LuckyWP Scripts Control <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51c42ca2-cdba-49f5-bea2-83c9b8cf0db7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/luckywp-scripts-control/" + google-query: inurl:"/wp-content/plugins/luckywp-scripts-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,luckywp-scripts-control,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/luckywp-scripts-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "luckywp-scripts-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lw-all-in-one-dcf62ae8561beba15cd72e7dcb3bf604.yaml b/nuclei-templates/cve-less/plugins/lw-all-in-one-dcf62ae8561beba15cd72e7dcb3bf604.yaml new file mode 100644 index 0000000000..a26b1e5140 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lw-all-in-one-dcf62ae8561beba15cd72e7dcb3bf604.yaml @@ -0,0 +1,58 @@ +id: lw-all-in-one-dcf62ae8561beba15cd72e7dcb3bf604 + +info: + name: > + Web Instant Messenger <= 1.1.2 and LocalWeb In One <= 1.6.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f3328c2-290f-410b-a6c8-2825d415f511?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lw-all-in-one/" + google-query: inurl:"/wp-content/plugins/lw-all-in-one/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lw-all-in-one,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lw-all-in-one/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lw-all-in-one" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-affiliation-0e3c2a4eb55659f4b696836b1243ae68.yaml b/nuclei-templates/cve-less/plugins/lws-affiliation-0e3c2a4eb55659f4b696836b1243ae68.yaml new file mode 100644 index 0000000000..dd02e58ffd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-affiliation-0e3c2a4eb55659f4b696836b1243ae68.yaml @@ -0,0 +1,58 @@ +id: lws-affiliation-0e3c2a4eb55659f4b696836b1243ae68 + +info: + name: > + LWS Affiliation <= 2.2.6 - Unauthenticated Remote/Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7b1871d-9d26-4bdc-bd20-0535143902d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-affiliation/" + google-query: inurl:"/wp-content/plugins/lws-affiliation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-affiliation,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-affiliation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-affiliation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-affiliation-7b9f532f4a76fa76bf373061c63e567f.yaml b/nuclei-templates/cve-less/plugins/lws-affiliation-7b9f532f4a76fa76bf373061c63e567f.yaml new file mode 100644 index 0000000000..80b3f1d9c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-affiliation-7b9f532f4a76fa76bf373061c63e567f.yaml @@ -0,0 +1,58 @@ +id: lws-affiliation-7b9f532f4a76fa76bf373061c63e567f + +info: + name: > + LWS Plugins <= (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd02becd-77e5-46b9-acc9-dba6c5caba27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-affiliation/" + google-query: inurl:"/wp-content/plugins/lws-affiliation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-affiliation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-affiliation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-affiliation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-cleaner-7b9f532f4a76fa76bf373061c63e567f.yaml b/nuclei-templates/cve-less/plugins/lws-cleaner-7b9f532f4a76fa76bf373061c63e567f.yaml new file mode 100644 index 0000000000..b8f81203b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-cleaner-7b9f532f4a76fa76bf373061c63e567f.yaml @@ -0,0 +1,58 @@ +id: lws-cleaner-7b9f532f4a76fa76bf373061c63e567f + +info: + name: > + LWS Plugins <= (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd02becd-77e5-46b9-acc9-dba6c5caba27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-cleaner/" + google-query: inurl:"/wp-content/plugins/lws-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-cleaner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-cleaner-b3b6081b87407dd7552a8c8806c2ebc4.yaml b/nuclei-templates/cve-less/plugins/lws-cleaner-b3b6081b87407dd7552a8c8806c2ebc4.yaml new file mode 100644 index 0000000000..0aed529053 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-cleaner-b3b6081b87407dd7552a8c8806c2ebc4.yaml @@ -0,0 +1,58 @@ +id: lws-cleaner-b3b6081b87407dd7552a8c8806c2ebc4 + +info: + name: > + LWS Cleaner <= 2.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b89c51fe-c056-4d85-a6e3-6678ed93b9d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-cleaner/" + google-query: inurl:"/wp-content/plugins/lws-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-cleaner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-hide-login-7b798e8ca30dadd7d24e9e59ebf40008.yaml b/nuclei-templates/cve-less/plugins/lws-hide-login-7b798e8ca30dadd7d24e9e59ebf40008.yaml new file mode 100644 index 0000000000..aed75e0394 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-hide-login-7b798e8ca30dadd7d24e9e59ebf40008.yaml @@ -0,0 +1,58 @@ +id: lws-hide-login-7b798e8ca30dadd7d24e9e59ebf40008 + +info: + name: > + LWS Hide Login <= 2.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7678b80f-3184-4979-b1f4-25cd75836010?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-hide-login/" + google-query: inurl:"/wp-content/plugins/lws-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-hide-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-hide-login-7b9f532f4a76fa76bf373061c63e567f.yaml b/nuclei-templates/cve-less/plugins/lws-hide-login-7b9f532f4a76fa76bf373061c63e567f.yaml new file mode 100644 index 0000000000..26e82225ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-hide-login-7b9f532f4a76fa76bf373061c63e567f.yaml @@ -0,0 +1,58 @@ +id: lws-hide-login-7b9f532f4a76fa76bf373061c63e567f + +info: + name: > + LWS Plugins <= (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd02becd-77e5-46b9-acc9-dba6c5caba27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-hide-login/" + google-query: inurl:"/wp-content/plugins/lws-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-hide-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-hide-login-f625397271ed803259763f2838a2e510.yaml b/nuclei-templates/cve-less/plugins/lws-hide-login-f625397271ed803259763f2838a2e510.yaml new file mode 100644 index 0000000000..ec23c5b071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-hide-login-f625397271ed803259763f2838a2e510.yaml @@ -0,0 +1,58 @@ +id: lws-hide-login-f625397271ed803259763f2838a2e510 + +info: + name: > + LWS Hide Login <= 2.1.8 - Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/532cffdb-16e8-4ced-9477-483c96db343c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-hide-login/" + google-query: inurl:"/wp-content/plugins/lws-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-hide-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-optimize-3e81ca2e699abf0578124ace41c312e8.yaml b/nuclei-templates/cve-less/plugins/lws-optimize-3e81ca2e699abf0578124ace41c312e8.yaml new file mode 100644 index 0000000000..dcbb3450c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-optimize-3e81ca2e699abf0578124ace41c312e8.yaml @@ -0,0 +1,58 @@ +id: lws-optimize-3e81ca2e699abf0578124ace41c312e8 + +info: + name: > + LWS Optimize <= 1.9.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c97f7513-188b-434c-8cb1-883bed016848?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-optimize/" + google-query: inurl:"/wp-content/plugins/lws-optimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-optimize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-optimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-optimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-optimize-7b9f532f4a76fa76bf373061c63e567f.yaml b/nuclei-templates/cve-less/plugins/lws-optimize-7b9f532f4a76fa76bf373061c63e567f.yaml new file mode 100644 index 0000000000..47d8897818 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-optimize-7b9f532f4a76fa76bf373061c63e567f.yaml @@ -0,0 +1,58 @@ +id: lws-optimize-7b9f532f4a76fa76bf373061c63e567f + +info: + name: > + LWS Plugins <= (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd02becd-77e5-46b9-acc9-dba6c5caba27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-optimize/" + google-query: inurl:"/wp-content/plugins/lws-optimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-optimize,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-optimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-optimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-sms-7b9f532f4a76fa76bf373061c63e567f.yaml b/nuclei-templates/cve-less/plugins/lws-sms-7b9f532f4a76fa76bf373061c63e567f.yaml new file mode 100644 index 0000000000..9498907c6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-sms-7b9f532f4a76fa76bf373061c63e567f.yaml @@ -0,0 +1,58 @@ +id: lws-sms-7b9f532f4a76fa76bf373061c63e567f + +info: + name: > + LWS Plugins <= (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd02becd-77e5-46b9-acc9-dba6c5caba27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-sms/" + google-query: inurl:"/wp-content/plugins/lws-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-tools-057556914142c489ed57ccffe54665f7.yaml b/nuclei-templates/cve-less/plugins/lws-tools-057556914142c489ed57ccffe54665f7.yaml new file mode 100644 index 0000000000..2c3299b4a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-tools-057556914142c489ed57ccffe54665f7.yaml @@ -0,0 +1,58 @@ +id: lws-tools-057556914142c489ed57ccffe54665f7 + +info: + name: > + LWS Tools <= 2.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2dabb790-4f5e-447a-ad65-3f62ac7f6176?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-tools/" + google-query: inurl:"/wp-content/plugins/lws-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-tools,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-tools-595af782abc65d0b72ff181cfebe8b09.yaml b/nuclei-templates/cve-less/plugins/lws-tools-595af782abc65d0b72ff181cfebe8b09.yaml new file mode 100644 index 0000000000..5ac4e8ccf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-tools-595af782abc65d0b72ff181cfebe8b09.yaml @@ -0,0 +1,58 @@ +id: lws-tools-595af782abc65d0b72ff181cfebe8b09 + +info: + name: > + LWS Tools <= 2.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/315dbb77-d872-4cc4-bb4c-9d4763a6ff8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-tools/" + google-query: inurl:"/wp-content/plugins/lws-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-tools,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/lws-tools-7b9f532f4a76fa76bf373061c63e567f.yaml b/nuclei-templates/cve-less/plugins/lws-tools-7b9f532f4a76fa76bf373061c63e567f.yaml new file mode 100644 index 0000000000..66f4f3ec75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/lws-tools-7b9f532f4a76fa76bf373061c63e567f.yaml @@ -0,0 +1,58 @@ +id: lws-tools-7b9f532f4a76fa76bf373061c63e567f + +info: + name: > + LWS Plugins <= (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd02becd-77e5-46b9-acc9-dba6c5caba27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/lws-tools/" + google-query: inurl:"/wp-content/plugins/lws-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,lws-tools,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/lws-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lws-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/m-chart-d65055d7026996d94428cd7d953a60fd.yaml b/nuclei-templates/cve-less/plugins/m-chart-d65055d7026996d94428cd7d953a60fd.yaml new file mode 100644 index 0000000000..a91434b116 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/m-chart-d65055d7026996d94428cd7d953a60fd.yaml @@ -0,0 +1,58 @@ +id: m-chart-d65055d7026996d94428cd7d953a60fd + +info: + name: > + M Chart <= 1.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d2d8ba7-269b-4830-8551-c2291199fb67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/m-chart/" + google-query: inurl:"/wp-content/plugins/m-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,m-chart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/m-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "m-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/m-vslider-c02cfcdd0ba606abb55e36d23c78177d.yaml b/nuclei-templates/cve-less/plugins/m-vslider-c02cfcdd0ba606abb55e36d23c78177d.yaml new file mode 100644 index 0000000000..f51da7dcbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/m-vslider-c02cfcdd0ba606abb55e36d23c78177d.yaml @@ -0,0 +1,58 @@ +id: m-vslider-c02cfcdd0ba606abb55e36d23c78177d + +info: + name: > + M-vSlider <= 2.1.3 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad6747da-394a-4f63-864d-bd52813fad69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/m-vslider/" + google-query: inurl:"/wp-content/plugins/m-vslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,m-vslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/m-vslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "m-vslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/m-wp-popup-2ef37c350605f8670255f67b27eb34e5.yaml b/nuclei-templates/cve-less/plugins/m-wp-popup-2ef37c350605f8670255f67b27eb34e5.yaml new file mode 100644 index 0000000000..4ad9773cac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/m-wp-popup-2ef37c350605f8670255f67b27eb34e5.yaml @@ -0,0 +1,58 @@ +id: m-wp-popup-2ef37c350605f8670255f67b27eb34e5 + +info: + name: > + Popup | Custom Popup Builder <= 1.3.1 - Missing Capabilities Check + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8844c230-162d-46c4-9b34-fc9d18b93f4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/m-wp-popup/" + google-query: inurl:"/wp-content/plugins/m-wp-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,m-wp-popup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/m-wp-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "m-wp-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/m-wp-popup-86c38c0f05080f78b36fa8b5f954e871.yaml b/nuclei-templates/cve-less/plugins/m-wp-popup-86c38c0f05080f78b36fa8b5f954e871.yaml new file mode 100644 index 0000000000..62c0dc85b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/m-wp-popup-86c38c0f05080f78b36fa8b5f954e871.yaml @@ -0,0 +1,58 @@ +id: m-wp-popup-86c38c0f05080f78b36fa8b5f954e871 + +info: + name: > + Popup | Custom Popup Builder <= 1.3 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f73d5b3-8d7c-43d1-84e4-f8a3976eab8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/m-wp-popup/" + google-query: inurl:"/wp-content/plugins/m-wp-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,m-wp-popup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/m-wp-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "m-wp-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mabel-shoppable-images-lite-25d30486ae110d12d4fc6bcb4d1b50f5.yaml b/nuclei-templates/cve-less/plugins/mabel-shoppable-images-lite-25d30486ae110d12d4fc6bcb4d1b50f5.yaml new file mode 100644 index 0000000000..fa732bfa08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mabel-shoppable-images-lite-25d30486ae110d12d4fc6bcb4d1b50f5.yaml @@ -0,0 +1,58 @@ +id: mabel-shoppable-images-lite-25d30486ae110d12d4fc6bcb4d1b50f5 + +info: + name: > + Shoppable Images <= 1.2.3 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e6a78dc-9b67-4ab5-83f9-be82d05d3a13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mabel-shoppable-images-lite/" + google-query: inurl:"/wp-content/plugins/mabel-shoppable-images-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mabel-shoppable-images-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mabel-shoppable-images-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mabel-shoppable-images-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mabel-shoppable-images-lite-46180ef43d3becfddd0144fed7922297.yaml b/nuclei-templates/cve-less/plugins/mabel-shoppable-images-lite-46180ef43d3becfddd0144fed7922297.yaml new file mode 100644 index 0000000000..76a0922710 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mabel-shoppable-images-lite-46180ef43d3becfddd0144fed7922297.yaml @@ -0,0 +1,58 @@ +id: mabel-shoppable-images-lite-46180ef43d3becfddd0144fed7922297 + +info: + name: > + Shoppable Images Lite <= 1.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/413b2b38-44f2-4756-b66d-b6544c7ecaa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mabel-shoppable-images-lite/" + google-query: inurl:"/wp-content/plugins/mabel-shoppable-images-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mabel-shoppable-images-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mabel-shoppable-images-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mabel-shoppable-images-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mac-dock-gallery-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/mac-dock-gallery-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..3f9392634e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mac-dock-gallery-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: mac-dock-gallery-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mac-dock-gallery/" + google-query: inurl:"/wp-content/plugins/mac-dock-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mac-dock-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mac-dock-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mac-dock-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mac-dock-photogallery-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/mac-dock-photogallery-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..5c133299cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mac-dock-photogallery-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: mac-dock-photogallery-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mac-dock-photogallery/" + google-query: inurl:"/wp-content/plugins/mac-dock-photogallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mac-dock-photogallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mac-dock-photogallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mac-dock-photogallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mage-eventpress-0d7d13b3763620f659067ef0ef4a2ecc.yaml b/nuclei-templates/cve-less/plugins/mage-eventpress-0d7d13b3763620f659067ef0ef4a2ecc.yaml new file mode 100644 index 0000000000..fe1dee0b2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mage-eventpress-0d7d13b3763620f659067ef0ef4a2ecc.yaml @@ -0,0 +1,58 @@ +id: mage-eventpress-0d7d13b3763620f659067ef0ef4a2ecc + +info: + name: > + Event Manager and Tickets Selling Plugin for WooCommerce < 3.5.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef7ef45a-612b-40ca-817d-05b3d29b2b05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mage-eventpress/" + google-query: inurl:"/wp-content/plugins/mage-eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mage-eventpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mage-eventpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mage-eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mage-eventpress-1e549d9fdcaec4289273d20aedde9604.yaml b/nuclei-templates/cve-less/plugins/mage-eventpress-1e549d9fdcaec4289273d20aedde9604.yaml new file mode 100644 index 0000000000..43c61f770f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mage-eventpress-1e549d9fdcaec4289273d20aedde9604.yaml @@ -0,0 +1,58 @@ +id: mage-eventpress-1e549d9fdcaec4289273d20aedde9604 + +info: + name: > + Event Manager for WooCommerce <= 3.8.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'mep_get_option' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2f4c1de-7eeb-45c4-bbff-ec85f2cda5aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mage-eventpress/" + google-query: inurl:"/wp-content/plugins/mage-eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mage-eventpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mage-eventpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mage-eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mage-eventpress-283e8dcbf95766b045e888a0d0963e03.yaml b/nuclei-templates/cve-less/plugins/mage-eventpress-283e8dcbf95766b045e888a0d0963e03.yaml new file mode 100644 index 0000000000..9547e3be3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mage-eventpress-283e8dcbf95766b045e888a0d0963e03.yaml @@ -0,0 +1,58 @@ +id: mage-eventpress-283e8dcbf95766b045e888a0d0963e03 + +info: + name: > + Event Manager for WooCommerce <= 3.7.7 - Cross-Site Request Forgery leading to Uninstall Form Submission + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af59eb6d-1ffa-4593-9bfc-f910d907f6e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mage-eventpress/" + google-query: inurl:"/wp-content/plugins/mage-eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mage-eventpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mage-eventpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mage-eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mage-eventpress-2b95a61584d1fb1af349c6d1aaeab17d.yaml b/nuclei-templates/cve-less/plugins/mage-eventpress-2b95a61584d1fb1af349c6d1aaeab17d.yaml new file mode 100644 index 0000000000..c16d36f4c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mage-eventpress-2b95a61584d1fb1af349c6d1aaeab17d.yaml @@ -0,0 +1,58 @@ +id: mage-eventpress-2b95a61584d1fb1af349c6d1aaeab17d + +info: + name: > + Event Manager and Tickets Selling Plugin for WooCommerce – WpEvently <= 4.1.1 - Authenticated (Contributor+) PHP Object Injection in mep_event_meta_save + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50812a8b-7d49-41fa-ba50-47d07a4b6caa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mage-eventpress/" + google-query: inurl:"/wp-content/plugins/mage-eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mage-eventpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mage-eventpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mage-eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mage-eventpress-5cd92fdc1b058e752c6530598f5dbea1.yaml b/nuclei-templates/cve-less/plugins/mage-eventpress-5cd92fdc1b058e752c6530598f5dbea1.yaml new file mode 100644 index 0000000000..f45f54a1e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mage-eventpress-5cd92fdc1b058e752c6530598f5dbea1.yaml @@ -0,0 +1,58 @@ +id: mage-eventpress-5cd92fdc1b058e752c6530598f5dbea1 + +info: + name: > + Event Manager and Tickets Selling Plugin for WooCommerce < 3.5.3 - Arbitrary Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c63079af-6a22-4692-ab81-96e166a00c38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mage-eventpress/" + google-query: inurl:"/wp-content/plugins/mage-eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mage-eventpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mage-eventpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mage-eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mage-eventpress-6a54d7f93d8962555c63afb66d95fb68.yaml b/nuclei-templates/cve-less/plugins/mage-eventpress-6a54d7f93d8962555c63afb66d95fb68.yaml new file mode 100644 index 0000000000..e25d6243fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mage-eventpress-6a54d7f93d8962555c63afb66d95fb68.yaml @@ -0,0 +1,58 @@ +id: mage-eventpress-6a54d7f93d8962555c63afb66d95fb68 + +info: + name: > + Event Manager and Tickets Selling for WooCommerce < 3.5.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e93ccf9d-cd8b-4399-8d2d-c844a23d66c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mage-eventpress/" + google-query: inurl:"/wp-content/plugins/mage-eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mage-eventpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mage-eventpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mage-eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mage-eventpress-828638ea1963a58b890deaf22836b2cd.yaml b/nuclei-templates/cve-less/plugins/mage-eventpress-828638ea1963a58b890deaf22836b2cd.yaml new file mode 100644 index 0000000000..bfe11b7587 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mage-eventpress-828638ea1963a58b890deaf22836b2cd.yaml @@ -0,0 +1,58 @@ +id: mage-eventpress-828638ea1963a58b890deaf22836b2cd + +info: + name: > + Event Manager and Tickets Selling Plugin for WooCommerce <= 3.7.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9379e1c9-fb83-43e4-af89-898dc0c2216c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mage-eventpress/" + google-query: inurl:"/wp-content/plugins/mage-eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mage-eventpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mage-eventpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mage-eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mage-eventpress-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/mage-eventpress-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..7007c60da5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mage-eventpress-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: mage-eventpress-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mage-eventpress/" + google-query: inurl:"/wp-content/plugins/mage-eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mage-eventpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mage-eventpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mage-eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magee-shortcodes-7b378f7b5f801637805b2f7c350d9359.yaml b/nuclei-templates/cve-less/plugins/magee-shortcodes-7b378f7b5f801637805b2f7c350d9359.yaml new file mode 100644 index 0000000000..4ed8062232 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magee-shortcodes-7b378f7b5f801637805b2f7c350d9359.yaml @@ -0,0 +1,58 @@ +id: magee-shortcodes-7b378f7b5f801637805b2f7c350d9359 + +info: + name: > + Magee Shortcodes <= 2.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea52bacf-e21d-4ea9-b51b-ee0c37620bf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magee-shortcodes/" + google-query: inurl:"/wp-content/plugins/magee-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magee-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magee-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magee-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magee-shortcodes-e9fde878e95431546f5a6d5b49c1a171.yaml b/nuclei-templates/cve-less/plugins/magee-shortcodes-e9fde878e95431546f5a6d5b49c1a171.yaml new file mode 100644 index 0000000000..5015490258 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magee-shortcodes-e9fde878e95431546f5a6d5b49c1a171.yaml @@ -0,0 +1,58 @@ +id: magee-shortcodes-e9fde878e95431546f5a6d5b49c1a171 + +info: + name: > + Magee Shortcodes < 2.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a69bb27-dc93-4515-90e1-08a1fa5fdaa0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magee-shortcodes/" + google-query: inurl:"/wp-content/plugins/magee-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magee-shortcodes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magee-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magee-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magic-action-box-423344ebaf15b72d32ea50cd38a95167.yaml b/nuclei-templates/cve-less/plugins/magic-action-box-423344ebaf15b72d32ea50cd38a95167.yaml new file mode 100644 index 0000000000..a17f9c8115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magic-action-box-423344ebaf15b72d32ea50cd38a95167.yaml @@ -0,0 +1,58 @@ +id: magic-action-box-423344ebaf15b72d32ea50cd38a95167 + +info: + name: > + Magic Action Box <= 2.17.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce9b908b-1388-41fb-915c-e4e29eaf57ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magic-action-box/" + google-query: inurl:"/wp-content/plugins/magic-action-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magic-action-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magic-action-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magic-action-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magic-fields-57123cd71067e91d2b8fed604519bb45.yaml b/nuclei-templates/cve-less/plugins/magic-fields-57123cd71067e91d2b8fed604519bb45.yaml new file mode 100644 index 0000000000..8af339ce54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magic-fields-57123cd71067e91d2b8fed604519bb45.yaml @@ -0,0 +1,58 @@ +id: magic-fields-57123cd71067e91d2b8fed604519bb45 + +info: + name: > + Magic Fields 1 <= 1.7.1 - Cross-Site Scripting via RCCWP_CreateCustomFieldPage.php custom-field-css parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aa9d6cb-18c8-42e4-a466-cc35c1dc5010?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magic-fields/" + google-query: inurl:"/wp-content/plugins/magic-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magic-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magic-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magic-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magic-fields-83aff6544a7c919044e1d77f749ea1cb.yaml b/nuclei-templates/cve-less/plugins/magic-fields-83aff6544a7c919044e1d77f749ea1cb.yaml new file mode 100644 index 0000000000..612344d2e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magic-fields-83aff6544a7c919044e1d77f749ea1cb.yaml @@ -0,0 +1,58 @@ +id: magic-fields-83aff6544a7c919044e1d77f749ea1cb + +info: + name: > + Magic Fields 1 <= 1.7.1 - Cross-Site Scripting via RCCWP_CreateCustomFieldPage.php custom-group-id parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb40f948-1252-4b6d-8c2d-3eb0e1f08987?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magic-fields/" + google-query: inurl:"/wp-content/plugins/magic-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magic-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magic-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magic-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magic-fields-b42951305c8f37d90390c15daed2c5f3.yaml b/nuclei-templates/cve-less/plugins/magic-fields-b42951305c8f37d90390c15daed2c5f3.yaml new file mode 100644 index 0000000000..bbc6c23df3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magic-fields-b42951305c8f37d90390c15daed2c5f3.yaml @@ -0,0 +1,58 @@ +id: magic-fields-b42951305c8f37d90390c15daed2c5f3 + +info: + name: > + Magic Fields 1 <= 1.7.1 - Cross-Site Scripting via custom-write-panel-id Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0297b3a-a180-428a-9716-6ecfa5a4de94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magic-fields/" + google-query: inurl:"/wp-content/plugins/magic-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magic-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magic-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magic-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magic-post-thumbnail-415df088a3251b97c66d0b5934825289.yaml b/nuclei-templates/cve-less/plugins/magic-post-thumbnail-415df088a3251b97c66d0b5934825289.yaml new file mode 100644 index 0000000000..418e63605c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magic-post-thumbnail-415df088a3251b97c66d0b5934825289.yaml @@ -0,0 +1,58 @@ +id: magic-post-thumbnail-415df088a3251b97c66d0b5934825289 + +info: + name: > + Magic Post Thumbnail <= 3.3.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55c586a0-bb91-4702-a9f2-d7503f247da3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magic-post-thumbnail/" + google-query: inurl:"/wp-content/plugins/magic-post-thumbnail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magic-post-thumbnail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magic-post-thumbnail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magic-post-thumbnail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magic-post-thumbnail-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/magic-post-thumbnail-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e9264bf517 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magic-post-thumbnail-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: magic-post-thumbnail-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magic-post-thumbnail/" + google-query: inurl:"/wp-content/plugins/magic-post-thumbnail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magic-post-thumbnail,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magic-post-thumbnail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magic-post-thumbnail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magic-post-thumbnail-f0c24bf90cdba629568a0b0ff9462d8a.yaml b/nuclei-templates/cve-less/plugins/magic-post-thumbnail-f0c24bf90cdba629568a0b0ff9462d8a.yaml new file mode 100644 index 0000000000..3dee700e49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magic-post-thumbnail-f0c24bf90cdba629568a0b0ff9462d8a.yaml @@ -0,0 +1,58 @@ +id: magic-post-thumbnail-f0c24bf90cdba629568a0b0ff9462d8a + +info: + name: > + Magic Post Thumbnail <= 4.1.10 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08bbde25-bb9a-469c-83de-b680bb501ad6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magic-post-thumbnail/" + google-query: inurl:"/wp-content/plugins/magic-post-thumbnail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magic-post-thumbnail,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magic-post-thumbnail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magic-post-thumbnail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magic-post-voice-57964eaa7fd52baacb77455232ddda16.yaml b/nuclei-templates/cve-less/plugins/magic-post-voice-57964eaa7fd52baacb77455232ddda16.yaml new file mode 100644 index 0000000000..44fbc999c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magic-post-voice-57964eaa7fd52baacb77455232ddda16.yaml @@ -0,0 +1,58 @@ +id: magic-post-voice-57964eaa7fd52baacb77455232ddda16 + +info: + name: > + Magic Post Voice <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46a022ff-7ec8-48bc-b0ae-8e925ea3f361?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magic-post-voice/" + google-query: inurl:"/wp-content/plugins/magic-post-voice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magic-post-voice,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magic-post-voice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magic-post-voice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magical-addons-for-elementor-ff7e8af2c4256f9a091a352140252d3e.yaml b/nuclei-templates/cve-less/plugins/magical-addons-for-elementor-ff7e8af2c4256f9a091a352140252d3e.yaml new file mode 100644 index 0000000000..43a94be7e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magical-addons-for-elementor-ff7e8af2c4256f9a091a352140252d3e.yaml @@ -0,0 +1,58 @@ +id: magical-addons-for-elementor-ff7e8af2c4256f9a091a352140252d3e + +info: + name: > + Magical Addons For Elementor ( Header Footer Builder, Free Elementor Widgets, Elementor Templates Library ) <= 1.1.37 - Authenticated (Contributor+) Stored Cross-Site Scripting via Text Effect Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/733f5ded-e8cb-4895-b938-889cea32f027?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magical-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/magical-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magical-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magical-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magical-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magical-posts-display-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/magical-posts-display-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..ccf06a4cf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magical-posts-display-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: magical-posts-display-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magical-posts-display/" + google-query: inurl:"/wp-content/plugins/magical-posts-display/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magical-posts-display,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magical-posts-display/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magical-posts-display" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magical-posts-display-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/magical-posts-display-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..8a47f7b6ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magical-posts-display-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: magical-posts-display-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magical-posts-display/" + google-query: inurl:"/wp-content/plugins/magical-posts-display/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magical-posts-display,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magical-posts-display/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magical-posts-display" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magicform-26a525135ae718590eefdd570c160cb6.yaml b/nuclei-templates/cve-less/plugins/magicform-26a525135ae718590eefdd570c160cb6.yaml new file mode 100644 index 0000000000..bc9be309a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magicform-26a525135ae718590eefdd570c160cb6.yaml @@ -0,0 +1,58 @@ +id: magicform-26a525135ae718590eefdd570c160cb6 + +info: + name: > + MagicForm <= 0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21c31df6-7515-48f5-ad74-fe116e836da8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magicform/" + google-query: inurl:"/wp-content/plugins/magicform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magicform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magicform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magicform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/magn-html5-drag-and-drop-media-uploader-2d79a02d518f8a5f5caa0b3954bfdd16.yaml b/nuclei-templates/cve-less/plugins/magn-html5-drag-and-drop-media-uploader-2d79a02d518f8a5f5caa0b3954bfdd16.yaml new file mode 100644 index 0000000000..a4aa4879ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/magn-html5-drag-and-drop-media-uploader-2d79a02d518f8a5f5caa0b3954bfdd16.yaml @@ -0,0 +1,58 @@ +id: magn-html5-drag-and-drop-media-uploader-2d79a02d518f8a5f5caa0b3954bfdd16 + +info: + name: > + Magn WP Drag And Drop Media Uploader <= 1.2.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b238414-b8fa-4251-8ad4-1bb693b90a27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/magn-html5-drag-and-drop-media-uploader/" + google-query: inurl:"/wp-content/plugins/magn-html5-drag-and-drop-media-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,magn-html5-drag-and-drop-media-uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/magn-html5-drag-and-drop-media-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magn-html5-drag-and-drop-media-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-control-7012db1ab8aed2692530b77526c2d553.yaml b/nuclei-templates/cve-less/plugins/mail-control-7012db1ab8aed2692530b77526c2d553.yaml new file mode 100644 index 0000000000..3ecc64267d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-control-7012db1ab8aed2692530b77526c2d553.yaml @@ -0,0 +1,58 @@ +id: mail-control-7012db1ab8aed2692530b77526c2d553 + +info: + name: > + Mail Control <= 0.2.8 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77537eb8-1c84-4702-aba1-727b0de1c3e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-control/" + google-query: inurl:"/wp-content/plugins/mail-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-control,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-integration-365-7fa8eef52402bb269ab6eda7703db35e.yaml b/nuclei-templates/cve-less/plugins/mail-integration-365-7fa8eef52402bb269ab6eda7703db35e.yaml new file mode 100644 index 0000000000..869aee00cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-integration-365-7fa8eef52402bb269ab6eda7703db35e.yaml @@ -0,0 +1,58 @@ +id: mail-integration-365-7fa8eef52402bb269ab6eda7703db35e + +info: + name: > + WPO365 | Mail Integration for Office 365 / Outlook <= 1.9.0 - reflected Cross-Site Scripting via error_description + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b3b4b45-5964-490a-991b-c9eb79c670e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-integration-365/" + google-query: inurl:"/wp-content/plugins/mail-integration-365/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-integration-365,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-integration-365/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-integration-365" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-0ae464a32aa65e97054ff65a6cd1aac7.yaml b/nuclei-templates/cve-less/plugins/mail-masta-0ae464a32aa65e97054ff65a6cd1aac7.yaml new file mode 100644 index 0000000000..3ca42f6fcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-0ae464a32aa65e97054ff65a6cd1aac7.yaml @@ -0,0 +1,58 @@ +id: mail-masta-0ae464a32aa65e97054ff65a6cd1aac7 + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via list_id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48075ef0-b3c5-487b-93c2-d3e630742fe4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-2a026b3abf7a570fa9c1168601d16d6c.yaml b/nuclei-templates/cve-less/plugins/mail-masta-2a026b3abf7a570fa9c1168601d16d6c.yaml new file mode 100644 index 0000000000..55ada7dc7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-2a026b3abf7a570fa9c1168601d16d6c.yaml @@ -0,0 +1,58 @@ +id: mail-masta-2a026b3abf7a570fa9c1168601d16d6c + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via filter_list parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e39810d7-260f-4729-9b11-69dba0e16684?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-346d51a39433f3f2e66028061115352b.yaml b/nuclei-templates/cve-less/plugins/mail-masta-346d51a39433f3f2e66028061115352b.yaml new file mode 100644 index 0000000000..4bbbc42aee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-346d51a39433f3f2e66028061115352b.yaml @@ -0,0 +1,58 @@ +id: mail-masta-346d51a39433f3f2e66028061115352b + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1653c4e0-c5e5-44c6-a84d-cdd070696ac4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-367d3a73f5196cd91ac495a3ac0b62f5.yaml b/nuclei-templates/cve-less/plugins/mail-masta-367d3a73f5196cd91ac495a3ac0b62f5.yaml new file mode 100644 index 0000000000..d7d2ef5176 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-367d3a73f5196cd91ac495a3ac0b62f5.yaml @@ -0,0 +1,58 @@ +id: mail-masta-367d3a73f5196cd91ac495a3ac0b62f5 + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via filter_list parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69ed990e-6c40-49d5-859c-768a5a6a803f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-56b6a95b36a0bf98a099f526d08412cb.yaml b/nuclei-templates/cve-less/plugins/mail-masta-56b6a95b36a0bf98a099f526d08412cb.yaml new file mode 100644 index 0000000000..0fd6aa30d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-56b6a95b36a0bf98a099f526d08412cb.yaml @@ -0,0 +1,58 @@ +id: mail-masta-56b6a95b36a0bf98a099f526d08412cb + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via list_id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f54527ce-8137-4ba9-b4e6-52cea6cfe2da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-61f3e3f11790d6bb7105200ca41924cd.yaml b/nuclei-templates/cve-less/plugins/mail-masta-61f3e3f11790d6bb7105200ca41924cd.yaml new file mode 100644 index 0000000000..24028379c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-61f3e3f11790d6bb7105200ca41924cd.yaml @@ -0,0 +1,58 @@ +id: mail-masta-61f3e3f11790d6bb7105200ca41924cd + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ba48e88-6e32-428f-9592-bd955e176765?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-71386814122d58a47245526972d56d40.yaml b/nuclei-templates/cve-less/plugins/mail-masta-71386814122d58a47245526972d56d40.yaml new file mode 100644 index 0000000000..099cf323c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-71386814122d58a47245526972d56d40.yaml @@ -0,0 +1,58 @@ +id: mail-masta-71386814122d58a47245526972d56d40 + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via member_id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d71caa62-6f77-44a6-8645-a27a08a48a78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-882cb2013f62250b85eee3042b3892e0.yaml b/nuclei-templates/cve-less/plugins/mail-masta-882cb2013f62250b85eee3042b3892e0.yaml new file mode 100644 index 0000000000..bd626ab966 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-882cb2013f62250b85eee3042b3892e0.yaml @@ -0,0 +1,58 @@ +id: mail-masta-882cb2013f62250b85eee3042b3892e0 + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via subscriber_email parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1eae4fc-85d1-49ff-9f3b-bf0a3f424ee1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-9bb1e384b35298c0d399c7e7719fdf83.yaml b/nuclei-templates/cve-less/plugins/mail-masta-9bb1e384b35298c0d399c7e7719fdf83.yaml new file mode 100644 index 0000000000..2e4ee04fdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-9bb1e384b35298c0d399c7e7719fdf83.yaml @@ -0,0 +1,58 @@ +id: mail-masta-9bb1e384b35298c0d399c7e7719fdf83 + +info: + name: > + Mail Masta <= 1.0 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d4bbf48-6525-4569-98a6-412f2bfe7628?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-9f041e8fa181897986208bfc1b4d15f9.yaml b/nuclei-templates/cve-less/plugins/mail-masta-9f041e8fa181897986208bfc1b4d15f9.yaml new file mode 100644 index 0000000000..f7631a8915 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-9f041e8fa181897986208bfc1b4d15f9.yaml @@ -0,0 +1,58 @@ +id: mail-masta-9f041e8fa181897986208bfc1b4d15f9 + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b97c6171-3842-4f2b-adf5-28fc4c0b24bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-a26e581f0f5b31b9784d43dce62a01f2.yaml b/nuclei-templates/cve-less/plugins/mail-masta-a26e581f0f5b31b9784d43dce62a01f2.yaml new file mode 100644 index 0000000000..0e6073647c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-a26e581f0f5b31b9784d43dce62a01f2.yaml @@ -0,0 +1,58 @@ +id: mail-masta-a26e581f0f5b31b9784d43dce62a01f2 + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via list_id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d323d28f-280c-49cd-b7f7-3e272ea62549?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-ab348c720a0710e52e24c076c92c0cb1.yaml b/nuclei-templates/cve-less/plugins/mail-masta-ab348c720a0710e52e24c076c92c0cb1.yaml new file mode 100644 index 0000000000..773064fd43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-ab348c720a0710e52e24c076c92c0cb1.yaml @@ -0,0 +1,58 @@ +id: mail-masta-ab348c720a0710e52e24c076c92c0cb1 + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ade06c00-43b7-48b3-9c9d-4921fb52cc66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-d349201003f1e073b123310455ca065d.yaml b/nuclei-templates/cve-less/plugins/mail-masta-d349201003f1e073b123310455ca065d.yaml new file mode 100644 index 0000000000..142d5a6e57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-d349201003f1e073b123310455ca065d.yaml @@ -0,0 +1,58 @@ +id: mail-masta-d349201003f1e073b123310455ca065d + +info: + name: > + Mail Masta Plugin <= 1.0 - SQL Injection via filter_list + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/977d1ec4-327b-4563-a3b1-ac4fad195eb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-masta-d853b0e423f8ed0a8520b3730f92bb07.yaml b/nuclei-templates/cve-less/plugins/mail-masta-d853b0e423f8ed0a8520b3730f92bb07.yaml new file mode 100644 index 0000000000..66742caa66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-masta-d853b0e423f8ed0a8520b3730f92bb07.yaml @@ -0,0 +1,58 @@ +id: mail-masta-d853b0e423f8ed0a8520b3730f92bb07 + +info: + name: > + Mail Masta <= 1.0 - SQL Injection via camp_id parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aade1230-bc25-4391-a85b-7bcf661f8213?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-masta/" + google-query: inurl:"/wp-content/plugins/mail-masta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-masta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-masta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-masta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-on-update-ff845ece92fe1b8afa1885550aee0170.yaml b/nuclei-templates/cve-less/plugins/mail-on-update-ff845ece92fe1b8afa1885550aee0170.yaml new file mode 100644 index 0000000000..fb3e46f86b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-on-update-ff845ece92fe1b8afa1885550aee0170.yaml @@ -0,0 +1,58 @@ +id: mail-on-update-ff845ece92fe1b8afa1885550aee0170 + +info: + name: > + Mail On Update < 5.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/487d4175-97bf-4c65-9d7d-b83974e9fda9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-on-update/" + google-query: inurl:"/wp-content/plugins/mail-on-update/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-on-update,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-on-update/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-on-update" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-queue-d32496895039dac95c881975dd0681cb.yaml b/nuclei-templates/cve-less/plugins/mail-queue-d32496895039dac95c881975dd0681cb.yaml new file mode 100644 index 0000000000..c5b0ab30b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-queue-d32496895039dac95c881975dd0681cb.yaml @@ -0,0 +1,58 @@ +id: mail-queue-d32496895039dac95c881975dd0681cb + +info: + name: > + Mail Queue <= 1.1 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4aaca22-76b9-42ec-a960-65d44d696324?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-queue/" + google-query: inurl:"/wp-content/plugins/mail-queue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-queue,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-queue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-queue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-subscribe-list-04389ec3013ce0dc7cd91731fa525c48.yaml b/nuclei-templates/cve-less/plugins/mail-subscribe-list-04389ec3013ce0dc7cd91731fa525c48.yaml new file mode 100644 index 0000000000..962d303bc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-subscribe-list-04389ec3013ce0dc7cd91731fa525c48.yaml @@ -0,0 +1,58 @@ +id: mail-subscribe-list-04389ec3013ce0dc7cd91731fa525c48 + +info: + name: > + Mail Subscribe List <= 2.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d10a0372-1ab3-474e-8d5c-33f71fddfe06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-subscribe-list/" + google-query: inurl:"/wp-content/plugins/mail-subscribe-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-subscribe-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-subscribe-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-subscribe-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-subscribe-list-347522eaa82eb43bdeab94627e4d0f98.yaml b/nuclei-templates/cve-less/plugins/mail-subscribe-list-347522eaa82eb43bdeab94627e4d0f98.yaml new file mode 100644 index 0000000000..88e04a848a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-subscribe-list-347522eaa82eb43bdeab94627e4d0f98.yaml @@ -0,0 +1,58 @@ +id: mail-subscribe-list-347522eaa82eb43bdeab94627e4d0f98 + +info: + name: > + Mail Subscribe List <= 2.0.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d0782ef-b74e-4540-a11d-280e432fc127?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-subscribe-list/" + google-query: inurl:"/wp-content/plugins/mail-subscribe-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-subscribe-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-subscribe-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-subscribe-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-subscribe-list-acb7010b85ecf2daba49fdd1b1643bd9.yaml b/nuclei-templates/cve-less/plugins/mail-subscribe-list-acb7010b85ecf2daba49fdd1b1643bd9.yaml new file mode 100644 index 0000000000..5f24e24b5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-subscribe-list-acb7010b85ecf2daba49fdd1b1643bd9.yaml @@ -0,0 +1,58 @@ +id: mail-subscribe-list-acb7010b85ecf2daba49fdd1b1643bd9 + +info: + name: > + Mail Subscribe List <= 2.1.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75424878-5976-4dc6-8a09-8eb46a7425b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-subscribe-list/" + google-query: inurl:"/wp-content/plugins/mail-subscribe-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-subscribe-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-subscribe-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-subscribe-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mail-subscribe-list-cabb923e0e757cd8efc2802197c2fa24.yaml b/nuclei-templates/cve-less/plugins/mail-subscribe-list-cabb923e0e757cd8efc2802197c2fa24.yaml new file mode 100644 index 0000000000..4843419e7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mail-subscribe-list-cabb923e0e757cd8efc2802197c2fa24.yaml @@ -0,0 +1,58 @@ +id: mail-subscribe-list-cabb923e0e757cd8efc2802197c2fa24 + +info: + name: > + Mail Subscribe List <= 2.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via smlsubform shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55b39859-b8a0-418b-ae7a-cd42d6e0bf00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mail-subscribe-list/" + google-query: inurl:"/wp-content/plugins/mail-subscribe-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mail-subscribe-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mail-subscribe-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mail-subscribe-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailarchiver-18ddf3d9a880d4adca00df1dc5502132.yaml b/nuclei-templates/cve-less/plugins/mailarchiver-18ddf3d9a880d4adca00df1dc5502132.yaml new file mode 100644 index 0000000000..053bcfc99b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailarchiver-18ddf3d9a880d4adca00df1dc5502132.yaml @@ -0,0 +1,58 @@ +id: mailarchiver-18ddf3d9a880d4adca00df1dc5502132 + +info: + name: > + MailArchiver <= 2.10.1 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce330cae-c2f8-42f3-822b-ca24bf46e433?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailarchiver/" + google-query: inurl:"/wp-content/plugins/mailarchiver/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailarchiver,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailarchiver/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailarchiver" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-woocommerce-b001a479011d319ceac5f48bfd2e6d39.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-woocommerce-b001a479011d319ceac5f48bfd2e6d39.yaml new file mode 100644 index 0000000000..2489850e67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-woocommerce-b001a479011d319ceac5f48bfd2e6d39.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-woocommerce-b001a479011d319ceac5f48bfd2e6d39 + +info: + name: > + Mailchimp for WooCommerce <= 2.7 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/533bf4ba-5929-475e-ac98-43d97288cdfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-woocommerce-f9bc7cdb6ab2ec4c7db8c04c4f500136.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-woocommerce-f9bc7cdb6ab2ec4c7db8c04c4f500136.yaml new file mode 100644 index 0000000000..fbd71aeab2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-woocommerce-f9bc7cdb6ab2ec4c7db8c04c4f500136.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-woocommerce-f9bc7cdb6ab2ec4c7db8c04c4f500136 + +info: + name: > + Mailchimp for WooCommerce <= 2.7.1 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/109427de-3b8a-46cc-a888-6fea4f72a31a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-wp-27461955b32dd7d4c16736c7fbdc5771.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-27461955b32dd7d4c16736c7fbdc5771.yaml new file mode 100644 index 0000000000..c2fc383ead --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-27461955b32dd7d4c16736c7fbdc5771.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-wp-27461955b32dd7d4c16736c7fbdc5771 + +info: + name: > + MC4WP: Mailchimp for WordPress < 4.8.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd57edf5-a75e-4677-a51e-9dd262eeba4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-wp-324bc23c2f374afaaf9c80c2964d5db4.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-324bc23c2f374afaaf9c80c2964d5db4.yaml new file mode 100644 index 0000000000..a2926581eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-324bc23c2f374afaaf9c80c2964d5db4.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-wp-324bc23c2f374afaaf9c80c2964d5db4 + +info: + name: > + Mailchimp For WP <= 4.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e69254d-d9e4-4b9e-972e-30bb6de86776?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-wp-8bf2330dba276a12443bbd94d613f926.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-8bf2330dba276a12443bbd94d613f926.yaml new file mode 100644 index 0000000000..ce43483348 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-8bf2330dba276a12443bbd94d613f926.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-wp-8bf2330dba276a12443bbd94d613f926 + +info: + name: > + MC4WP: Mailchimp for WordPress <= 4.8.4 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd7db465-ebeb-477b-b6c8-a9b89ba2372b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-wp-a83717cc9322e41d87fb191d4173e2d0.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-a83717cc9322e41d87fb191d4173e2d0.yaml new file mode 100644 index 0000000000..12a241359c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-a83717cc9322e41d87fb191d4173e2d0.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-wp-a83717cc9322e41d87fb191d4173e2d0 + +info: + name: > + MC4WP: Mailchimp for WordPress <= 4.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86cb08ae-aa21-4ee6-baed-03429e4d38e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-wp-b15c16122e094141ccb76dd4bc1e2cd2.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-b15c16122e094141ccb76dd4bc1e2cd2.yaml new file mode 100644 index 0000000000..7b3b8aeee1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-b15c16122e094141ccb76dd4bc1e2cd2.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-wp-b15c16122e094141ccb76dd4bc1e2cd2 + +info: + name: > + MC4WP: Mailchimp for WordPress <= 4.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/370a6130-425c-4264-baaf-8989d3b00d14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-wp-b628a5c29017f302cc9e3a317e522425.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-b628a5c29017f302cc9e3a317e522425.yaml new file mode 100644 index 0000000000..c2928f6cb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-b628a5c29017f302cc9e3a317e522425.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-wp-b628a5c29017f302cc9e3a317e522425 + +info: + name: > + MailChimp for WordPress <= 4.0.10 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c074e03-b452-4aea-aa1d-36657ba311e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-wp-be854f0427cbc7550be4b51c5093b09f.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-be854f0427cbc7550be4b51c5093b09f.yaml new file mode 100644 index 0000000000..7a9d99d680 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-be854f0427cbc7550be4b51c5093b09f.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-wp-be854f0427cbc7550be4b51c5093b09f + +info: + name: > + MC4WP <= 4.9.9 - Missing Authorization via listen + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f289527-3a89-4db9-887d-fb0980848734?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-for-wp-d08e992a9c86b0410a9dd2a576aeae42.yaml b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-d08e992a9c86b0410a9dd2a576aeae42.yaml new file mode 100644 index 0000000000..f3756ccb67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-for-wp-d08e992a9c86b0410a9dd2a576aeae42.yaml @@ -0,0 +1,58 @@ +id: mailchimp-for-wp-d08e992a9c86b0410a9dd2a576aeae42 + +info: + name: > + MC4WP: Mailchimp for WordPress <= 4.8.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c3dc5fe-b1c8-4581-8100-68d313c3ac20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-for-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-8aaee0ca0357561b8fb5f4652479c99b.yaml b/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-8aaee0ca0357561b8fb5f4652479c99b.yaml new file mode 100644 index 0000000000..4e01e7f56e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-8aaee0ca0357561b8fb5f4652479c99b.yaml @@ -0,0 +1,58 @@ +id: mailchimp-forms-by-mailmunch-8aaee0ca0357561b8fb5f4652479c99b + +info: + name: > + MailChimp Forms by MailMunch <= 3.1.4 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18dd1b86-3206-4cd7-a20b-33240c139aa5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-forms-by-mailmunch/" + google-query: inurl:"/wp-content/plugins/mailchimp-forms-by-mailmunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-forms-by-mailmunch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-forms-by-mailmunch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-forms-by-mailmunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-b6ffb2e5b3bc587f9c59e8240ff1f1b7.yaml b/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-b6ffb2e5b3bc587f9c59e8240ff1f1b7.yaml new file mode 100644 index 0000000000..8f8fd70acf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-b6ffb2e5b3bc587f9c59e8240ff1f1b7.yaml @@ -0,0 +1,58 @@ +id: mailchimp-forms-by-mailmunch-b6ffb2e5b3bc587f9c59e8240ff1f1b7 + +info: + name: > + MailChimp Forms by MailMunch <= 3.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e069678-0c0a-4e4a-b0ee-404f488f9d01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-forms-by-mailmunch/" + google-query: inurl:"/wp-content/plugins/mailchimp-forms-by-mailmunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-forms-by-mailmunch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-forms-by-mailmunch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-forms-by-mailmunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-ee6e6063f9b37d080b9aa6c0cc0d0766.yaml b/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-ee6e6063f9b37d080b9aa6c0cc0d0766.yaml new file mode 100644 index 0000000000..c9fa24682e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-ee6e6063f9b37d080b9aa6c0cc0d0766.yaml @@ -0,0 +1,58 @@ +id: mailchimp-forms-by-mailmunch-ee6e6063f9b37d080b9aa6c0cc0d0766 + +info: + name: > + MailChimp Forms by MailMunch <= 3.1.7 - Cross-Site Request Forgery via Multiple AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4f96877-406b-4ec0-ac6b-ee1ffdb436e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-forms-by-mailmunch/" + google-query: inurl:"/wp-content/plugins/mailchimp-forms-by-mailmunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-forms-by-mailmunch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-forms-by-mailmunch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-forms-by-mailmunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-ef3aa6c6954785fff0d13c0cd6f5cb85.yaml b/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-ef3aa6c6954785fff0d13c0cd6f5cb85.yaml new file mode 100644 index 0000000000..79ea8bda0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-forms-by-mailmunch-ef3aa6c6954785fff0d13c0cd6f5cb85.yaml @@ -0,0 +1,58 @@ +id: mailchimp-forms-by-mailmunch-ef3aa6c6954785fff0d13c0cd6f5cb85 + +info: + name: > + MailChimp Forms by MailMunch <= 3.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac87819d-0ba3-4c30-ae35-e933f7e250a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-forms-by-mailmunch/" + google-query: inurl:"/wp-content/plugins/mailchimp-forms-by-mailmunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-forms-by-mailmunch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-forms-by-mailmunch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-forms-by-mailmunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-249f3208e9e6f6c1af58b4828d3f6027.yaml b/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-249f3208e9e6f6c1af58b4828d3f6027.yaml new file mode 100644 index 0000000000..75e09d7504 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-249f3208e9e6f6c1af58b4828d3f6027.yaml @@ -0,0 +1,58 @@ +id: mailchimp-subscribe-sm-249f3208e9e6f6c1af58b4828d3f6027 + +info: + name: > + MailChimp Subscribe Forms <= 4.0.9.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86f6e8b8-ebfd-4d9f-a285-9d0aa2e961ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-subscribe-sm/" + google-query: inurl:"/wp-content/plugins/mailchimp-subscribe-sm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-subscribe-sm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-subscribe-sm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-subscribe-sm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-45f25702e8ca4952a8a482198d36d226.yaml b/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-45f25702e8ca4952a8a482198d36d226.yaml new file mode 100644 index 0000000000..4dd7e3d1d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-45f25702e8ca4952a8a482198d36d226.yaml @@ -0,0 +1,58 @@ +id: mailchimp-subscribe-sm-45f25702e8ca4952a8a482198d36d226 + +info: + name: > + MailChimp Subscribe Form, Optin Builder, PopUp Builder, Form Builder < 1.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/680746a3-8a72-4ec2-9f58-d744f40168ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-subscribe-sm/" + google-query: inurl:"/wp-content/plugins/mailchimp-subscribe-sm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-subscribe-sm,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-subscribe-sm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-subscribe-sm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-cecfff430f19f7261bbe2fd52865b1d7.yaml b/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-cecfff430f19f7261bbe2fd52865b1d7.yaml new file mode 100644 index 0000000000..31b80d1b23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-subscribe-sm-cecfff430f19f7261bbe2fd52865b1d7.yaml @@ -0,0 +1,58 @@ +id: mailchimp-subscribe-sm-cecfff430f19f7261bbe2fd52865b1d7 + +info: + name: > + MailChimp Subscribe Forms <= 4.0.9.3 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aba1ca3a-a937-400b-b175-2ca4e67a107d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-subscribe-sm/" + google-query: inurl:"/wp-content/plugins/mailchimp-subscribe-sm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-subscribe-sm,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-subscribe-sm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-subscribe-sm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailchimp-wp-6d25ab79e6e7aca51a4387e7aae24c9c.yaml b/nuclei-templates/cve-less/plugins/mailchimp-wp-6d25ab79e6e7aca51a4387e7aae24c9c.yaml new file mode 100644 index 0000000000..2f3e48e142 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailchimp-wp-6d25ab79e6e7aca51a4387e7aae24c9c.yaml @@ -0,0 +1,58 @@ +id: mailchimp-wp-6d25ab79e6e7aca51a4387e7aae24c9c + +info: + name: > + Forms for Mailchimp by Optin Cat <= 2.5.4 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7d5edee-04fb-41e0-be5e-ca3681956d2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailchimp-wp/" + google-query: inurl:"/wp-content/plugins/mailchimp-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailchimp-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailchimp-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailchimp-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailcwp-2e2ba7d6aad1663f173d0b9ff5355c70.yaml b/nuclei-templates/cve-less/plugins/mailcwp-2e2ba7d6aad1663f173d0b9ff5355c70.yaml new file mode 100644 index 0000000000..594e0826cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailcwp-2e2ba7d6aad1663f173d0b9ff5355c70.yaml @@ -0,0 +1,58 @@ +id: mailcwp-2e2ba7d6aad1663f173d0b9ff5355c70 + +info: + name: > + MailCWP <= 1.100 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bb430e6-0c30-4c23-874a-f91e25622857?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailcwp/" + google-query: inurl:"/wp-content/plugins/mailcwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailcwp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailcwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailcwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.100') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailcwp-ed77d9c52a0d8e37bd68e8e975c1dcaf.yaml b/nuclei-templates/cve-less/plugins/mailcwp-ed77d9c52a0d8e37bd68e8e975c1dcaf.yaml new file mode 100644 index 0000000000..f6c21f177c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailcwp-ed77d9c52a0d8e37bd68e8e975c1dcaf.yaml @@ -0,0 +1,58 @@ +id: mailcwp-ed77d9c52a0d8e37bd68e8e975c1dcaf + +info: + name: > + MailCWP <= 1.100 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e32ff58-e205-4c81-82d1-2a1048256747?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailcwp/" + google-query: inurl:"/wp-content/plugins/mailcwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailcwp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailcwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailcwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.100') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailin-2c0815cfa87364df1650c4d67869632e.yaml b/nuclei-templates/cve-less/plugins/mailin-2c0815cfa87364df1650c4d67869632e.yaml new file mode 100644 index 0000000000..0f87901168 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailin-2c0815cfa87364df1650c4d67869632e.yaml @@ -0,0 +1,58 @@ +id: mailin-2c0815cfa87364df1650c4d67869632e + +info: + name: > + Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue <= 3.1.39 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86f7eb83-8483-4c6b-993e-ce11084241e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailin/" + google-query: inurl:"/wp-content/plugins/mailin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailin-66ccaf4314aac7933013ee5ce3827d9d.yaml b/nuclei-templates/cve-less/plugins/mailin-66ccaf4314aac7933013ee5ce3827d9d.yaml new file mode 100644 index 0000000000..acf45e4591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailin-66ccaf4314aac7933013ee5ce3827d9d.yaml @@ -0,0 +1,58 @@ +id: mailin-66ccaf4314aac7933013ee5ce3827d9d + +info: + name: > + Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) <= 3.1.77 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf4cb79e-e62b-4991-8ee5-493dafe38b80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailin/" + google-query: inurl:"/wp-content/plugins/mailin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.77') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailin-9be87992402232973e6ef9a016dc8c48.yaml b/nuclei-templates/cve-less/plugins/mailin-9be87992402232973e6ef9a016dc8c48.yaml new file mode 100644 index 0000000000..d543915163 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailin-9be87992402232973e6ef9a016dc8c48.yaml @@ -0,0 +1,58 @@ +id: mailin-9be87992402232973e6ef9a016dc8c48 + +info: + name: > + Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue <= 3.1.60 - Reflected Cross-Site Scripting via 'lang' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6ad08fb-d029-4f84-818c-911ae2d97f33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailin/" + google-query: inurl:"/wp-content/plugins/mailin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailin-d7263c48cb93df306029f0ae2e2d9062.yaml b/nuclei-templates/cve-less/plugins/mailin-d7263c48cb93df306029f0ae2e2d9062.yaml new file mode 100644 index 0000000000..e6a36b8a52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailin-d7263c48cb93df306029f0ae2e2d9062.yaml @@ -0,0 +1,58 @@ +id: mailin-d7263c48cb93df306029f0ae2e2d9062 + +info: + name: > + Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue <= 3.1.30 - Reflected Cross-Site Scripting via lang & pid Parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8173596d-a127-4dc1-a72a-640381536c67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailin/" + google-query: inurl:"/wp-content/plugins/mailin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailin-ebd2e4e996f9584103cdb7fb70162996.yaml b/nuclei-templates/cve-less/plugins/mailin-ebd2e4e996f9584103cdb7fb70162996.yaml new file mode 100644 index 0000000000..0c50647b38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailin-ebd2e4e996f9584103cdb7fb70162996.yaml @@ -0,0 +1,58 @@ +id: mailin-ebd2e4e996f9584103cdb7fb70162996 + +info: + name: > + Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue <= 3.1.24 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31aa4f8b-954c-410e-9f18-c1e62dd9850b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailin/" + google-query: inurl:"/wp-content/plugins/mailin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailjet-for-wordpress-bc4f6148886fd30cd6ed07bbbfa6c2c3.yaml b/nuclei-templates/cve-less/plugins/mailjet-for-wordpress-bc4f6148886fd30cd6ed07bbbfa6c2c3.yaml new file mode 100644 index 0000000000..5cc1b868dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailjet-for-wordpress-bc4f6148886fd30cd6ed07bbbfa6c2c3.yaml @@ -0,0 +1,58 @@ +id: mailjet-for-wordpress-bc4f6148886fd30cd6ed07bbbfa6c2c3 + +info: + name: > + Mailjet Email Marketing <= 5.3 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/462372ab-8f83-4b75-b3dd-674199e1eeee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailjet-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mailjet-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailjet-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailjet-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailjet-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailmunch-030709cd098214238b78a48c4d533dc2.yaml b/nuclei-templates/cve-less/plugins/mailmunch-030709cd098214238b78a48c4d533dc2.yaml new file mode 100644 index 0000000000..f405337f9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailmunch-030709cd098214238b78a48c4d533dc2.yaml @@ -0,0 +1,58 @@ +id: mailmunch-030709cd098214238b78a48c4d533dc2 + +info: + name: > + MailMunch – Grow your Email List <= 3.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6409626-c8cb-412c-aff3-cbb2da212e5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailmunch/" + google-query: inurl:"/wp-content/plugins/mailmunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailmunch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailmunch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailmunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailmunch-827f2e843a499f08614a8388df30f388.yaml b/nuclei-templates/cve-less/plugins/mailmunch-827f2e843a499f08614a8388df30f388.yaml new file mode 100644 index 0000000000..e4b19c62b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailmunch-827f2e843a499f08614a8388df30f388.yaml @@ -0,0 +1,58 @@ +id: mailmunch-827f2e843a499f08614a8388df30f388 + +info: + name: > + MailMunch – Grow your Email List <= 3.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b27201c7-453b-4953-b364-42ca7bf012f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailmunch/" + google-query: inurl:"/wp-content/plugins/mailmunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailmunch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailmunch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailmunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailoptin-1315b13ed71bd9eb1061038bb0e8996d.yaml b/nuclei-templates/cve-less/plugins/mailoptin-1315b13ed71bd9eb1061038bb0e8996d.yaml new file mode 100644 index 0000000000..ba48ba95aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailoptin-1315b13ed71bd9eb1061038bb0e8996d.yaml @@ -0,0 +1,58 @@ +id: mailoptin-1315b13ed71bd9eb1061038bb0e8996d + +info: + name: > + Popup, Optin Form & Email Newsletters for Mailchimp, HubSpot, AWeber – MailOptin <= 1.2.35.1 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bb9bab2-4f47-41ed-b42e-5272981927a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailoptin/" + google-query: inurl:"/wp-content/plugins/mailoptin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailoptin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailoptin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailoptin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.35.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailoptin-845e9efdcaa8e86ee95dfb613d1c9636.yaml b/nuclei-templates/cve-less/plugins/mailoptin-845e9efdcaa8e86ee95dfb613d1c9636.yaml new file mode 100644 index 0000000000..7994b9255d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailoptin-845e9efdcaa8e86ee95dfb613d1c9636.yaml @@ -0,0 +1,58 @@ +id: mailoptin-845e9efdcaa8e86ee95dfb613d1c9636 + +info: + name: > + MailOptin <= 1.2.49.0 - Missing Authorization to Cache Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/197efd6a-b0f4-459d-b7e5-f8ff5b5e3003?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailoptin/" + google-query: inurl:"/wp-content/plugins/mailoptin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailoptin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailoptin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailoptin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.49.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailoptin-d4435c597b00bf3290ee73c887974569.yaml b/nuclei-templates/cve-less/plugins/mailoptin-d4435c597b00bf3290ee73c887974569.yaml new file mode 100644 index 0000000000..97512aae4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailoptin-d4435c597b00bf3290ee73c887974569.yaml @@ -0,0 +1,58 @@ +id: mailoptin-d4435c597b00bf3290ee73c887974569 + +info: + name: > + MailOptin <= 1.2.54.0 - Authenticated (Admin+) Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e7741d1-8b30-460d-bf1b-edc475841c71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailoptin/" + google-query: inurl:"/wp-content/plugins/mailoptin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailoptin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailoptin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailoptin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.2.54.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailpoet-0fa38d6cfad2289f1e8e6d314fc29ef3.yaml b/nuclei-templates/cve-less/plugins/mailpoet-0fa38d6cfad2289f1e8e6d314fc29ef3.yaml new file mode 100644 index 0000000000..8251ec3b5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailpoet-0fa38d6cfad2289f1e8e6d314fc29ef3.yaml @@ -0,0 +1,58 @@ +id: mailpoet-0fa38d6cfad2289f1e8e6d314fc29ef3 + +info: + name: > + MailPoet – emails and newsletters in WordPress <= 3.23.1 - Reflected Cross-Site Scripting via URL parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/075e64fb-acaf-4f0f-bbc8-db7855184970?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailpoet/" + google-query: inurl:"/wp-content/plugins/mailpoet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailpoet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailpoet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailpoet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.23.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailpress-d27df5a411c6747f235668cfd972f89f.yaml b/nuclei-templates/cve-less/plugins/mailpress-d27df5a411c6747f235668cfd972f89f.yaml new file mode 100644 index 0000000000..407724a00e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailpress-d27df5a411c6747f235668cfd972f89f.yaml @@ -0,0 +1,58 @@ +id: mailpress-d27df5a411c6747f235668cfd972f89f + +info: + name: > + MailPress <= 7.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e84e7d6e-9ec9-49f9-90e3-19ac499264ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailpress/" + google-query: inurl:"/wp-content/plugins/mailpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailrelay-7e1bdcdaf0857c4f5a72b941792723cd.yaml b/nuclei-templates/cve-less/plugins/mailrelay-7e1bdcdaf0857c4f5a72b941792723cd.yaml new file mode 100644 index 0000000000..cb454e710f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailrelay-7e1bdcdaf0857c4f5a72b941792723cd.yaml @@ -0,0 +1,58 @@ +id: mailrelay-7e1bdcdaf0857c4f5a72b941792723cd + +info: + name: > + Mailrelay <= 2.1.1 - Cross-Site Request Forgery via render_admin_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c07a2fe-97b1-45ec-bbd9-9353d679ed49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailrelay/" + google-query: inurl:"/wp-content/plugins/mailrelay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailrelay,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailrelay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailrelay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailster-5f27f34098a0ef0f61990648a8a5b251.yaml b/nuclei-templates/cve-less/plugins/mailster-5f27f34098a0ef0f61990648a8a5b251.yaml new file mode 100644 index 0000000000..03288801ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailster-5f27f34098a0ef0f61990648a8a5b251.yaml @@ -0,0 +1,58 @@ +id: mailster-5f27f34098a0ef0f61990648a8a5b251 + +info: + name: > + Mailster <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc030c9a-3cda-4eb8-9a7f-94a4b65a4272?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailster/" + google-query: inurl:"/wp-content/plugins/mailster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailster-62e392ab6ca8e175fe9a689ec13ed494.yaml b/nuclei-templates/cve-less/plugins/mailster-62e392ab6ca8e175fe9a689ec13ed494.yaml new file mode 100644 index 0000000000..7671940a10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailster-62e392ab6ca8e175fe9a689ec13ed494.yaml @@ -0,0 +1,58 @@ +id: mailster-62e392ab6ca8e175fe9a689ec13ed494 + +info: + name: > + Mailster <= 2.4.5.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3584b5b-ff93-4a47-b6e6-f95335ee88b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailster/" + google-query: inurl:"/wp-content/plugins/mailster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailster-9b8d56fa1a52c124371a7a0f3bf72770.yaml b/nuclei-templates/cve-less/plugins/mailster-9b8d56fa1a52c124371a7a0f3bf72770.yaml new file mode 100644 index 0000000000..e418cf3115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailster-9b8d56fa1a52c124371a7a0f3bf72770.yaml @@ -0,0 +1,58 @@ +id: mailster-9b8d56fa1a52c124371a7a0f3bf72770 + +info: + name: > + Mailster <= 4.0.6 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/121160a3-b090-4a33-9615-fa4626631bec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailster/" + google-query: inurl:"/wp-content/plugins/mailster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailster,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mailtree-log-mail-a3abf4c0cdeac928831983eccfebc62a.yaml b/nuclei-templates/cve-less/plugins/mailtree-log-mail-a3abf4c0cdeac928831983eccfebc62a.yaml new file mode 100644 index 0000000000..a7027ecf38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mailtree-log-mail-a3abf4c0cdeac928831983eccfebc62a.yaml @@ -0,0 +1,58 @@ +id: mailtree-log-mail-a3abf4c0cdeac928831983eccfebc62a + +info: + name: > + Mailtree Log Mail <= 1.0.0 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24d0229c-0f1b-42df-b89a-ce0b8a3fda7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mailtree-log-mail/" + google-query: inurl:"/wp-content/plugins/mailtree-log-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mailtree-log-mail,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mailtree-log-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mailtree-log-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maintenance-488c9d125819772b803e742156124a9a.yaml b/nuclei-templates/cve-less/plugins/maintenance-488c9d125819772b803e742156124a9a.yaml new file mode 100644 index 0000000000..c54996da94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maintenance-488c9d125819772b803e742156124a9a.yaml @@ -0,0 +1,58 @@ +id: maintenance-488c9d125819772b803e742156124a9a + +info: + name: > + Maintenance <= 4.02 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0dfa035-78fe-426f-a018-7bb2f22f0dd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maintenance/" + google-query: inurl:"/wp-content/plugins/maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maintenance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maintenance-page-12f99afa0343fc6e2ca09d9458b97d59.yaml b/nuclei-templates/cve-less/plugins/maintenance-page-12f99afa0343fc6e2ca09d9458b97d59.yaml new file mode 100644 index 0000000000..ca7efc04b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maintenance-page-12f99afa0343fc6e2ca09d9458b97d59.yaml @@ -0,0 +1,58 @@ +id: maintenance-page-12f99afa0343fc6e2ca09d9458b97d59 + +info: + name: > + Maintenance Page <= 1.0.8 - Security Mechanism Bypass via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/653bf021-370d-4787-9ded-c5c915aed1d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maintenance-page/" + google-query: inurl:"/wp-content/plugins/maintenance-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maintenance-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maintenance-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maintenance-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maintenance-page-7a445b6bbe1f19472fb82aa1ab2d7a3a.yaml b/nuclei-templates/cve-less/plugins/maintenance-page-7a445b6bbe1f19472fb82aa1ab2d7a3a.yaml new file mode 100644 index 0000000000..337182737d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maintenance-page-7a445b6bbe1f19472fb82aa1ab2d7a3a.yaml @@ -0,0 +1,58 @@ +id: maintenance-page-7a445b6bbe1f19472fb82aa1ab2d7a3a + +info: + name: > + Maintenance Page <= 1.0.8 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fce54b1-e1e6-4742-9eb3-bbfb613ccd70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maintenance-page/" + google-query: inurl:"/wp-content/plugins/maintenance-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maintenance-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maintenance-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maintenance-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maintenance-switch-3615938f0921b802185b621340537010.yaml b/nuclei-templates/cve-less/plugins/maintenance-switch-3615938f0921b802185b621340537010.yaml new file mode 100644 index 0000000000..91a0a305f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maintenance-switch-3615938f0921b802185b621340537010.yaml @@ -0,0 +1,58 @@ +id: maintenance-switch-3615938f0921b802185b621340537010 + +info: + name: > + Maintenance Switch <= 1.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a81d3b09-b8dd-4697-ab43-c863e8d1e1d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maintenance-switch/" + google-query: inurl:"/wp-content/plugins/maintenance-switch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maintenance-switch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maintenance-switch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maintenance-switch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maintenance-switch-ebae4a3aba29339c7b56a2e57218464c.yaml b/nuclei-templates/cve-less/plugins/maintenance-switch-ebae4a3aba29339c7b56a2e57218464c.yaml new file mode 100644 index 0000000000..4a603c9618 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maintenance-switch-ebae4a3aba29339c7b56a2e57218464c.yaml @@ -0,0 +1,58 @@ +id: maintenance-switch-ebae4a3aba29339c7b56a2e57218464c + +info: + name: > + Maintenance Switch <= 1.5.2 - Cross-Site Request Forgery via 'admin_action_request' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f14f19d-95b3-474b-a2ea-d846c85644cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maintenance-switch/" + google-query: inurl:"/wp-content/plugins/maintenance-switch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maintenance-switch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maintenance-switch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maintenance-switch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-25fb56a80aebd27743fad680f237d7c2.yaml b/nuclei-templates/cve-less/plugins/mainwp-25fb56a80aebd27743fad680f237d7c2.yaml new file mode 100644 index 0000000000..8ab46a2d1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-25fb56a80aebd27743fad680f237d7c2.yaml @@ -0,0 +1,58 @@ +id: mainwp-25fb56a80aebd27743fad680f237d7c2 + +info: + name: > + MainWP Dashboard – The Private WordPress Manager for Multiple Website Maintenance Plugin <= 3.1.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9b1445f-3b6b-40fa-9a12-f55d63668dda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp/" + google-query: inurl:"/wp-content/plugins/mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-373c4ea18f9baeef2872a78ab527c078.yaml b/nuclei-templates/cve-less/plugins/mainwp-373c4ea18f9baeef2872a78ab527c078.yaml new file mode 100644 index 0000000000..13842e2be0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-373c4ea18f9baeef2872a78ab527c078.yaml @@ -0,0 +1,58 @@ +id: mainwp-373c4ea18f9baeef2872a78ab527c078 + +info: + name: > + MainWP <= 4.4.3.3 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/791a7063-fb1e-4147-b253-8baf889307c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp/" + google-query: inurl:"/wp-content/plugins/mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-519db4fde18bf40cf63b23505a4840eb.yaml b/nuclei-templates/cve-less/plugins/mainwp-519db4fde18bf40cf63b23505a4840eb.yaml new file mode 100644 index 0000000000..2e5e41586f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-519db4fde18bf40cf63b23505a4840eb.yaml @@ -0,0 +1,58 @@ +id: mainwp-519db4fde18bf40cf63b23505a4840eb + +info: + name: > + MainWP Dashboard <= 4.5.1.2 - Authenticated(Administrator+) CSS Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73980a90-bb17-46e4-a0ea-691f80500fe3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp/" + google-query: inurl:"/wp-content/plugins/mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..2e01908d88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-article-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-article-uploader-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-article-uploader-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-article-uploader-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-article-uploader-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-article-uploader-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-bbbf9046b8721bc306a1868ce9ab75b5.yaml b/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-bbbf9046b8721bc306a1868ce9ab75b5.yaml new file mode 100644 index 0000000000..14754650f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-bbbf9046b8721bc306a1868ce9ab75b5.yaml @@ -0,0 +1,58 @@ +id: mainwp-article-uploader-extension-bbbf9046b8721bc306a1868ce9ab75b5 + +info: + name: > + MainWP (Various Extensions) - Authenticated (Subscriber+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/306a9960-7139-4142-a249-4de2b3c4b985?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-article-uploader-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-article-uploader-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-article-uploader-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-article-uploader-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-article-uploader-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-de9c08ef64270e7677f62d388e0cc26e.yaml b/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-de9c08ef64270e7677f62d388e0cc26e.yaml new file mode 100644 index 0000000000..f682beab16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-article-uploader-extension-de9c08ef64270e7677f62d388e0cc26e.yaml @@ -0,0 +1,58 @@ +id: mainwp-article-uploader-extension-de9c08ef64270e7677f62d388e0cc26e + +info: + name: > + MainWP (Various extensions) - Missing Authorization to Arbitrary Page/Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d589bada-3568-45ed-9f7c-fb14363a617a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-article-uploader-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-article-uploader-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-article-uploader-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-article-uploader-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-article-uploader-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-b8da63590cfb56758e18b031988ea29e.yaml b/nuclei-templates/cve-less/plugins/mainwp-b8da63590cfb56758e18b031988ea29e.yaml new file mode 100644 index 0000000000..fb7d688613 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-b8da63590cfb56758e18b031988ea29e.yaml @@ -0,0 +1,58 @@ +id: mainwp-b8da63590cfb56758e18b031988ea29e + +info: + name: > + MainWP Dashboard and MainWP Child <= 2.0.22 - Unspecified Vulnerability + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71d63f0d-ce01-489e-bcc4-7632f1a4bb04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp/" + google-query: inurl:"/wp-content/plugins/mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-bbdba7157714312ea1ab0d3f73cd870e.yaml b/nuclei-templates/cve-less/plugins/mainwp-bbdba7157714312ea1ab0d3f73cd870e.yaml new file mode 100644 index 0000000000..1a29c25557 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-bbdba7157714312ea1ab0d3f73cd870e.yaml @@ -0,0 +1,58 @@ +id: mainwp-bbdba7157714312ea1ab0d3f73cd870e + +info: + name: > + MainWP Dashboard <= 4.2.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8a3ba35-3cc0-4a6b-bb96-6ae5a83e5ad6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp/" + google-query: inurl:"/wp-content/plugins/mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-blogvault-backup-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-blogvault-backup-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..70308bea31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-blogvault-backup-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-blogvault-backup-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-blogvault-backup-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-blogvault-backup-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-blogvault-backup-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-blogvault-backup-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-blogvault-backup-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-blogvault-backup-extension-c7fec950a07b33ca805efa5f4526bb87.yaml b/nuclei-templates/cve-less/plugins/mainwp-blogvault-backup-extension-c7fec950a07b33ca805efa5f4526bb87.yaml new file mode 100644 index 0000000000..a31dcbb1d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-blogvault-backup-extension-c7fec950a07b33ca805efa5f4526bb87.yaml @@ -0,0 +1,58 @@ +id: mainwp-blogvault-backup-extension-c7fec950a07b33ca805efa5f4526bb87 + +info: + name: > + MainWP (Various Extensions) - Authenticated (Subscriber+) Arbitrary Plugin Installation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c563616-e405-4b3e-a70a-543f42118a97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-blogvault-backup-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-blogvault-backup-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-blogvault-backup-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-blogvault-backup-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-blogvault-backup-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-branding-extension-d432b5b11d667b6f9fe5cd55370cdb88.yaml b/nuclei-templates/cve-less/plugins/mainwp-branding-extension-d432b5b11d667b6f9fe5cd55370cdb88.yaml new file mode 100644 index 0000000000..9413984063 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-branding-extension-d432b5b11d667b6f9fe5cd55370cdb88.yaml @@ -0,0 +1,58 @@ +id: mainwp-branding-extension-d432b5b11d667b6f9fe5cd55370cdb88 + +info: + name: > + MainWP White Label Extension <= 4.1.1 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/416da317-61dc-42b5-9ade-fa41e844263b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-branding-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-branding-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-branding-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-branding-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-branding-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..b88a16e2fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-broken-links-checker-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-broken-links-checker-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-broken-links-checker-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-broken-links-checker-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-broken-links-checker-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-broken-links-checker-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-da3f36dbc6e00ae538ec7700a4a5da0a.yaml b/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-da3f36dbc6e00ae538ec7700a4a5da0a.yaml new file mode 100644 index 0000000000..02b1e135ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-da3f36dbc6e00ae538ec7700a4a5da0a.yaml @@ -0,0 +1,58 @@ +id: mainwp-broken-links-checker-extension-da3f36dbc6e00ae538ec7700a4a5da0a + +info: + name: > + MainWP Broken Link Checker <= 4.0 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b64bd2b9-56d5-47d4-9532-3718bf2381a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-broken-links-checker-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-broken-links-checker-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-broken-links-checker-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-broken-links-checker-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-broken-links-checker-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-f0fbe6fb8cd2394ff4cf5755f2e3ce65.yaml b/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-f0fbe6fb8cd2394ff4cf5755f2e3ce65.yaml new file mode 100644 index 0000000000..064e593e7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-broken-links-checker-extension-f0fbe6fb8cd2394ff4cf5755f2e3ce65.yaml @@ -0,0 +1,58 @@ +id: mainwp-broken-links-checker-extension-f0fbe6fb8cd2394ff4cf5755f2e3ce65 + +info: + name: > + MainWP Broken Link Checker <= 4.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/073a3b48-7c21-4511-a8e4-3443ef05fd0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-broken-links-checker-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-broken-links-checker-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-broken-links-checker-extension,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-broken-links-checker-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-broken-links-checker-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-buddy-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-buddy-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..7f9f382f3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-buddy-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-buddy-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-buddy-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-buddy-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-buddy-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-buddy-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-buddy-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-buddy-extension-88e0ecb64f4709b7a4173b13eb85c3b6.yaml b/nuclei-templates/cve-less/plugins/mainwp-buddy-extension-88e0ecb64f4709b7a4173b13eb85c3b6.yaml new file mode 100644 index 0000000000..dcffdf3b1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-buddy-extension-88e0ecb64f4709b7a4173b13eb85c3b6.yaml @@ -0,0 +1,58 @@ +id: mainwp-buddy-extension-88e0ecb64f4709b7a4173b13eb85c3b6 + +info: + name: > + MainWP Buddy Extension <= 4.0.1 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d017b2c-1e15-401a-ae57-4653ca41b7e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-buddy-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-buddy-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-buddy-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-buddy-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-buddy-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-child-02abc776653c0e9d69b2d7bbbb0997b8.yaml b/nuclei-templates/cve-less/plugins/mainwp-child-02abc776653c0e9d69b2d7bbbb0997b8.yaml new file mode 100644 index 0000000000..6bfd2ec5b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-child-02abc776653c0e9d69b2d7bbbb0997b8.yaml @@ -0,0 +1,58 @@ +id: mainwp-child-02abc776653c0e9d69b2d7bbbb0997b8 + +info: + name: > + MainWP Child <= 4.4.1.1 - Information Disclosure via Back-Up Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1fadba1-674f-4f3d-997f-d29d3a887414?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-child/" + google-query: inurl:"/wp-content/plugins/mainwp-child/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-child,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-child/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-child" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-child-0d279c099198801fd51b2e6ed08b0aa7.yaml b/nuclei-templates/cve-less/plugins/mainwp-child-0d279c099198801fd51b2e6ed08b0aa7.yaml new file mode 100644 index 0000000000..c3d8646e97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-child-0d279c099198801fd51b2e6ed08b0aa7.yaml @@ -0,0 +1,58 @@ +id: mainwp-child-0d279c099198801fd51b2e6ed08b0aa7 + +info: + name: > + MainWP Child – Securely connects sites to the MainWP WordPress Manager Dashboard < 2.0.9.2 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84019c69-32fd-4331-95d7-53ea1aaff616?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-child/" + google-query: inurl:"/wp-content/plugins/mainwp-child/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-child,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-child/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-child" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-child-5c361cd216288a792b3417e2eea8c64b.yaml b/nuclei-templates/cve-less/plugins/mainwp-child-5c361cd216288a792b3417e2eea8c64b.yaml new file mode 100644 index 0000000000..6b28f6461b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-child-5c361cd216288a792b3417e2eea8c64b.yaml @@ -0,0 +1,58 @@ +id: mainwp-child-5c361cd216288a792b3417e2eea8c64b + +info: + name: > + MainWP Child <= 2.0.27 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5a34838-fdc5-4954-9576-abf81cbaac2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-child/" + google-query: inurl:"/wp-content/plugins/mainwp-child/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-child,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-child/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-child" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-child-b8da63590cfb56758e18b031988ea29e.yaml b/nuclei-templates/cve-less/plugins/mainwp-child-b8da63590cfb56758e18b031988ea29e.yaml new file mode 100644 index 0000000000..7347b2e94d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-child-b8da63590cfb56758e18b031988ea29e.yaml @@ -0,0 +1,58 @@ +id: mainwp-child-b8da63590cfb56758e18b031988ea29e + +info: + name: > + MainWP Dashboard and MainWP Child <= 2.0.22 - Unspecified Vulnerability + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71d63f0d-ce01-489e-bcc4-7632f1a4bb04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-child/" + google-query: inurl:"/wp-content/plugins/mainwp-child/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-child,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-child/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-child" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-child-de951cb1c07b8f1a00e6e15f2067e75c.yaml b/nuclei-templates/cve-less/plugins/mainwp-child-de951cb1c07b8f1a00e6e15f2067e75c.yaml new file mode 100644 index 0000000000..48922c2ca1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-child-de951cb1c07b8f1a00e6e15f2067e75c.yaml @@ -0,0 +1,58 @@ +id: mainwp-child-de951cb1c07b8f1a00e6e15f2067e75c + +info: + name: > + MainWP Child < 3.4.5 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f83f878d-b708-4677-929a-e1ced535d99f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-child/" + google-query: inurl:"/wp-content/plugins/mainwp-child/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-child,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-child/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-child" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-child-f00ee035f691e855432693cfeab4496d.yaml b/nuclei-templates/cve-less/plugins/mainwp-child-f00ee035f691e855432693cfeab4496d.yaml new file mode 100644 index 0000000000..f3025a6277 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-child-f00ee035f691e855432693cfeab4496d.yaml @@ -0,0 +1,58 @@ +id: mainwp-child-f00ee035f691e855432693cfeab4496d + +info: + name: > + MainWP Child <= 4.1.7.1 - SQL Injection via orderby, order Parameters + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a303875-ad8c-40ed-a3ab-4a63080c9845?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-child/" + google-query: inurl:"/wp-content/plugins/mainwp-child/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-child,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-child/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-child" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-child-reports-b48bd5a9b387deec2652bf65a2f60d36.yaml b/nuclei-templates/cve-less/plugins/mainwp-child-reports-b48bd5a9b387deec2652bf65a2f60d36.yaml new file mode 100644 index 0000000000..3792acd8a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-child-reports-b48bd5a9b387deec2652bf65a2f60d36.yaml @@ -0,0 +1,58 @@ +id: mainwp-child-reports-b48bd5a9b387deec2652bf65a2f60d36 + +info: + name: > + MainWP Child Reports <= 2.0.7 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff3aa112-bee2-485f-b5a1-ad156662ab03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-child-reports/" + google-query: inurl:"/wp-content/plugins/mainwp-child-reports/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-child-reports,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-child-reports/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-child-reports" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-child-reports-ca770a3a0e8cd6c16a964b242179e2c5.yaml b/nuclei-templates/cve-less/plugins/mainwp-child-reports-ca770a3a0e8cd6c16a964b242179e2c5.yaml new file mode 100644 index 0000000000..b4d253301c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-child-reports-ca770a3a0e8cd6c16a964b242179e2c5.yaml @@ -0,0 +1,58 @@ +id: mainwp-child-reports-ca770a3a0e8cd6c16a964b242179e2c5 + +info: + name: > + MainWP Child Reports <= 2.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2edd9774-753b-49a4-9f7b-281829a1030e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-child-reports/" + google-query: inurl:"/wp-content/plugins/mainwp-child-reports/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-child-reports,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-child-reports/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-child-reports" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-clone-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-clone-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..ea9128ec33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-clone-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-clone-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-clone-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-clone-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-clone-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-clone-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-clone-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-clone-extension-cacc6911c40efb999d1fe86f0d0191d6.yaml b/nuclei-templates/cve-less/plugins/mainwp-clone-extension-cacc6911c40efb999d1fe86f0d0191d6.yaml new file mode 100644 index 0000000000..087af6287f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-clone-extension-cacc6911c40efb999d1fe86f0d0191d6.yaml @@ -0,0 +1,58 @@ +id: mainwp-clone-extension-cacc6911c40efb999d1fe86f0d0191d6 + +info: + name: > + MainWP Clone Extension <= 4.0.2 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a7345a1-ceb5-4f93-a6ba-13e8b8fb6c7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-clone-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-clone-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-clone-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-clone-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-clone-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..73b3074ff0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-code-snippets-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-code-snippets-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-code-snippets-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-code-snippets-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-code-snippets-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-code-snippets-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-8f1eedab61ce04ff36cedd6b1737dcab.yaml b/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-8f1eedab61ce04ff36cedd6b1737dcab.yaml new file mode 100644 index 0000000000..7991e387db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-8f1eedab61ce04ff36cedd6b1737dcab.yaml @@ -0,0 +1,58 @@ +id: mainwp-code-snippets-extension-8f1eedab61ce04ff36cedd6b1737dcab + +info: + name: > + MainWP Code Snippets Extension <= 4.0.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36ca4534-1abe-4f28-8672-f183c7578ab2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-code-snippets-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-code-snippets-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-code-snippets-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-code-snippets-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-code-snippets-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-ebaaeb684636cb787d78e7b3c484407e.yaml b/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-ebaaeb684636cb787d78e7b3c484407e.yaml new file mode 100644 index 0000000000..266dd50687 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-ebaaeb684636cb787d78e7b3c484407e.yaml @@ -0,0 +1,58 @@ +id: mainwp-code-snippets-extension-ebaaeb684636cb787d78e7b3c484407e + +info: + name: > + MainWP Code Snippets Extension <= 4.0.2 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f55e0471-664c-4fb4-8776-0c8312d8327b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-code-snippets-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-code-snippets-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-code-snippets-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-code-snippets-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-code-snippets-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-f6463e889774b4038473eb08cfdfa039.yaml b/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-f6463e889774b4038473eb08cfdfa039.yaml new file mode 100644 index 0000000000..35738e1998 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-code-snippets-extension-f6463e889774b4038473eb08cfdfa039.yaml @@ -0,0 +1,58 @@ +id: mainwp-code-snippets-extension-f6463e889774b4038473eb08cfdfa039 + +info: + name: > + MainWP Code Snippets Extension <= 4.0.2 - Authenticated (Subscriber+) PHP Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2d87a05-81a7-40d9-a60f-94a4d88bf87a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-code-snippets-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-code-snippets-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-code-snippets-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-code-snippets-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-code-snippets-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-comments-extension-3b5c9ebf6b5cbb215fd772c13336a403.yaml b/nuclei-templates/cve-less/plugins/mainwp-comments-extension-3b5c9ebf6b5cbb215fd772c13336a403.yaml new file mode 100644 index 0000000000..cff1c26d79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-comments-extension-3b5c9ebf6b5cbb215fd772c13336a403.yaml @@ -0,0 +1,58 @@ +id: mainwp-comments-extension-3b5c9ebf6b5cbb215fd772c13336a403 + +info: + name: > + MainWP Comments Extension <= 4.0.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0979a15-5fa9-4024-81a8-3555d6f73e61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-comments-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-comments-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-comments-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-comments-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-comments-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-comments-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-comments-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..7028a5a1e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-comments-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-comments-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-comments-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-comments-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-comments-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-comments-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-comments-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-db895078637698aba713d17b02ab863a.yaml b/nuclei-templates/cve-less/plugins/mainwp-db895078637698aba713d17b02ab863a.yaml new file mode 100644 index 0000000000..8d43ae9ce2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-db895078637698aba713d17b02ab863a.yaml @@ -0,0 +1,58 @@ +id: mainwp-db895078637698aba713d17b02ab863a + +info: + name: > + MainWP Dashboard <= 4.6.0.1 - Cross-Site Request Forgery via posting_bulk + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c2d9569-a551-46f5-8581-464b9f35b71c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp/" + google-query: inurl:"/wp-content/plugins/mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..30c6df9cc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-favorites-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-favorites-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-favorites-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-favorites-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-favorites-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-favorites-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-bbbf9046b8721bc306a1868ce9ab75b5.yaml b/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-bbbf9046b8721bc306a1868ce9ab75b5.yaml new file mode 100644 index 0000000000..b009991e86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-bbbf9046b8721bc306a1868ce9ab75b5.yaml @@ -0,0 +1,58 @@ +id: mainwp-favorites-extension-bbbf9046b8721bc306a1868ce9ab75b5 + +info: + name: > + MainWP (Various Extensions) - Authenticated (Subscriber+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/306a9960-7139-4142-a249-4de2b3c4b985?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-favorites-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-favorites-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-favorites-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-favorites-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-favorites-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-c7fec950a07b33ca805efa5f4526bb87.yaml b/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-c7fec950a07b33ca805efa5f4526bb87.yaml new file mode 100644 index 0000000000..6f0ab2596f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-favorites-extension-c7fec950a07b33ca805efa5f4526bb87.yaml @@ -0,0 +1,58 @@ +id: mainwp-favorites-extension-c7fec950a07b33ca805efa5f4526bb87 + +info: + name: > + MainWP (Various Extensions) - Authenticated (Subscriber+) Arbitrary Plugin Installation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c563616-e405-4b3e-a70a-543f42118a97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-favorites-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-favorites-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-favorites-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-favorites-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-favorites-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-18f9f53e2e66e0e510b2dccb3d10627d.yaml b/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-18f9f53e2e66e0e510b2dccb3d10627d.yaml new file mode 100644 index 0000000000..53d6d78c51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-18f9f53e2e66e0e510b2dccb3d10627d.yaml @@ -0,0 +1,58 @@ +id: mainwp-file-uploader-extension-18f9f53e2e66e0e510b2dccb3d10627d + +info: + name: > + MainWP File Uploader Extension <= 4.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ec02202-18e3-4a57-be2c-7dbf50e500dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-file-uploader-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-file-uploader-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-file-uploader-extension,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-file-uploader-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-file-uploader-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..d7359c7f9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-file-uploader-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-file-uploader-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-file-uploader-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-file-uploader-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-file-uploader-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-file-uploader-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-ef3286d81d94e9b713e6b4a272249cba.yaml b/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-ef3286d81d94e9b713e6b4a272249cba.yaml new file mode 100644 index 0000000000..50827ad127 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-file-uploader-extension-ef3286d81d94e9b713e6b4a272249cba.yaml @@ -0,0 +1,58 @@ +id: mainwp-file-uploader-extension-ef3286d81d94e9b713e6b4a272249cba + +info: + name: > + MainWP File Uploader Extension <= 4.1 - Authenticated (Subscriber+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a0faf14-77bf-4776-8685-12a348a4a6c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-file-uploader-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-file-uploader-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-file-uploader-extension,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-file-uploader-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-file-uploader-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-3959344c0c7e5999442d4341d93fe901.yaml b/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-3959344c0c7e5999442d4341d93fe901.yaml new file mode 100644 index 0000000000..f635a93a8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-3959344c0c7e5999442d4341d93fe901.yaml @@ -0,0 +1,58 @@ +id: mainwp-google-analytics-extension-3959344c0c7e5999442d4341d93fe901 + +info: + name: > + MainWP Google Analytics Extension <= 4.0.4 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a44cde91-2f4d-40f1-98a1-ee6ed94c0155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-google-analytics-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-google-analytics-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-google-analytics-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-google-analytics-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-google-analytics-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-49a8bd4f442f3ed7ef68fc2e1242b1b6.yaml b/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-49a8bd4f442f3ed7ef68fc2e1242b1b6.yaml new file mode 100644 index 0000000000..debe00edc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-49a8bd4f442f3ed7ef68fc2e1242b1b6.yaml @@ -0,0 +1,58 @@ +id: mainwp-google-analytics-extension-49a8bd4f442f3ed7ef68fc2e1242b1b6 + +info: + name: > + MainWP Google Analytics Extension <= 4.0.4 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11fd8768-0168-4e3b-9c2d-659fc4101a73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-google-analytics-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-google-analytics-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-google-analytics-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-google-analytics-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-google-analytics-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..ea3c982aea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-google-analytics-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-google-analytics-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-google-analytics-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-google-analytics-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-google-analytics-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-google-analytics-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-google-analytics-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-ithemes-security-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-ithemes-security-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..56e6bc65a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-ithemes-security-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-ithemes-security-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-ithemes-security-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-ithemes-security-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-ithemes-security-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-ithemes-security-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-ithemes-security-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-ithemes-security-extension-aab60d7e635c7cb328946a00c5cb0802.yaml b/nuclei-templates/cve-less/plugins/mainwp-ithemes-security-extension-aab60d7e635c7cb328946a00c5cb0802.yaml new file mode 100644 index 0000000000..5c970a24e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-ithemes-security-extension-aab60d7e635c7cb328946a00c5cb0802.yaml @@ -0,0 +1,58 @@ +id: mainwp-ithemes-security-extension-aab60d7e635c7cb328946a00c5cb0802 + +info: + name: > + MainWP iThemes Security Extension <= 4.1.1 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa6adda7-5eba-483c-a759-6f8a92da75e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-ithemes-security-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-ithemes-security-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-ithemes-security-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-ithemes-security-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-ithemes-security-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.1.1.') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-links-manager-extension-9731ebff7e31801f5a40ae7c87af6896.yaml b/nuclei-templates/cve-less/plugins/mainwp-links-manager-extension-9731ebff7e31801f5a40ae7c87af6896.yaml new file mode 100644 index 0000000000..fc6735f6f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-links-manager-extension-9731ebff7e31801f5a40ae7c87af6896.yaml @@ -0,0 +1,58 @@ +id: mainwp-links-manager-extension-9731ebff7e31801f5a40ae7c87af6896 + +info: + name: > + MainWP Links Manager Extension <= 2.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c269233-f2dc-42ef-98be-78600f90e87d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-links-manager-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-links-manager-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-links-manager-extension,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-links-manager-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-links-manager-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-04f298147815233cd89825cce559844d.yaml b/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-04f298147815233cd89825cce559844d.yaml new file mode 100644 index 0000000000..e22459dec7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-04f298147815233cd89825cce559844d.yaml @@ -0,0 +1,58 @@ +id: mainwp-maintenance-extension-04f298147815233cd89825cce559844d + +info: + name: > + MainWP Maintenance Extension <= 4.1.1 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22755d65-d187-438a-9a3f-e7d38497282b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-maintenance-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-maintenance-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-maintenance-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-maintenance-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-maintenance-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-08e41a2e706bfd45d56edb520c5805b5.yaml b/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-08e41a2e706bfd45d56edb520c5805b5.yaml new file mode 100644 index 0000000000..69b0dbb4c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-08e41a2e706bfd45d56edb520c5805b5.yaml @@ -0,0 +1,58 @@ +id: mainwp-maintenance-extension-08e41a2e706bfd45d56edb520c5805b5 + +info: + name: > + MainWP Maintenance Extension <= 4.1.1 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/098f219d-77e5-46f9-b8c2-fa8ccdc5af38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-maintenance-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-maintenance-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-maintenance-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-maintenance-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-maintenance-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..2826e57e4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-maintenance-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-maintenance-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-maintenance-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-maintenance-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-maintenance-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-maintenance-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-maintenance-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-page-speed-extension-1700178605ea1a028eb5734d4a1eaad7.yaml b/nuclei-templates/cve-less/plugins/mainwp-page-speed-extension-1700178605ea1a028eb5734d4a1eaad7.yaml new file mode 100644 index 0000000000..269393fbae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-page-speed-extension-1700178605ea1a028eb5734d4a1eaad7.yaml @@ -0,0 +1,58 @@ +id: mainwp-page-speed-extension-1700178605ea1a028eb5734d4a1eaad7 + +info: + name: > + MainWP Page Speed Extension <= 4.0.2 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fdb93fa-e9b4-4d00-8bb3-ff171a916b65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-page-speed-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-page-speed-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-page-speed-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-page-speed-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-page-speed-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-page-speed-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-page-speed-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..bb8a87c558 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-page-speed-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-page-speed-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-page-speed-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-page-speed-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-page-speed-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-page-speed-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-page-speed-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-piwik-extension-c009600ac01b461b216f777bf4f27175.yaml b/nuclei-templates/cve-less/plugins/mainwp-piwik-extension-c009600ac01b461b216f777bf4f27175.yaml new file mode 100644 index 0000000000..d44ba9e176 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-piwik-extension-c009600ac01b461b216f777bf4f27175.yaml @@ -0,0 +1,58 @@ +id: mainwp-piwik-extension-c009600ac01b461b216f777bf4f27175 + +info: + name: > + MainWP Matomo Extension <= 4.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4648c4f2-47e3-4a95-9e93-fd8246863425?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-piwik-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-piwik-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-piwik-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-piwik-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-piwik-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-post-dripper-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-post-dripper-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..0eeeaed0aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-post-dripper-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-post-dripper-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-post-dripper-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-post-dripper-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-post-dripper-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-post-dripper-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-post-dripper-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-post-dripper-extension-8b15dcc48a6f92077370cb4c6934bd38.yaml b/nuclei-templates/cve-less/plugins/mainwp-post-dripper-extension-8b15dcc48a6f92077370cb4c6934bd38.yaml new file mode 100644 index 0000000000..c114616176 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-post-dripper-extension-8b15dcc48a6f92077370cb4c6934bd38.yaml @@ -0,0 +1,58 @@ +id: mainwp-post-dripper-extension-8b15dcc48a6f92077370cb4c6934bd38 + +info: + name: > + MainWP Post Dripper Extension <= 4.0.4 - Missing Authorization to Arbitrary Page/Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42a642a8-fee3-497f-9fcf-7e888838af0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-post-dripper-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-post-dripper-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-post-dripper-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-post-dripper-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-post-dripper-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-post-plus-extension-1a7f5e2f6b8dc141b3974d01e70ce6c4.yaml b/nuclei-templates/cve-less/plugins/mainwp-post-plus-extension-1a7f5e2f6b8dc141b3974d01e70ce6c4.yaml new file mode 100644 index 0000000000..a25eeb863b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-post-plus-extension-1a7f5e2f6b8dc141b3974d01e70ce6c4.yaml @@ -0,0 +1,58 @@ +id: mainwp-post-plus-extension-1a7f5e2f6b8dc141b3974d01e70ce6c4 + +info: + name: > + MainWP Post Plus Extension <= 4.0.3 - Missing Authorization to Arbitrary Page/Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35767133-28d7-47e9-bcda-5d761262cdad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-post-plus-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-post-plus-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-post-plus-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-post-plus-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-post-plus-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-post-plus-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-post-plus-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..31e9e5a3fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-post-plus-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-post-plus-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-post-plus-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-post-plus-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-post-plus-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-post-plus-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-post-plus-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-2aa015126a1a525f86550f7ae828f7a6.yaml b/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-2aa015126a1a525f86550f7ae828f7a6.yaml new file mode 100644 index 0000000000..71c833e9b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-2aa015126a1a525f86550f7ae828f7a6.yaml @@ -0,0 +1,58 @@ +id: mainwp-rocket-extension-2aa015126a1a525f86550f7ae828f7a6 + +info: + name: > + MainWP Rocket Extension <= 4.0.3 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab346cea-2d33-4ec5-b985-86a65fbe12e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-rocket-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-rocket-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-rocket-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-rocket-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-rocket-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-7bfb92cd98981d6d2231287741115d7d.yaml b/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-7bfb92cd98981d6d2231287741115d7d.yaml new file mode 100644 index 0000000000..97ec5dabed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-7bfb92cd98981d6d2231287741115d7d.yaml @@ -0,0 +1,58 @@ +id: mainwp-rocket-extension-7bfb92cd98981d6d2231287741115d7d + +info: + name: > + MainWP Rocket Extension <= 4.0.3 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bc6d354-65f5-4c1e-8a43-a6ddd1280a2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-rocket-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-rocket-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-rocket-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-rocket-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-rocket-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..8fd39ffbcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-rocket-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-rocket-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-rocket-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-rocket-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-rocket-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-rocket-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-rocket-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-seo-extension-5bb6026096b7bf370409b664b0a819cb.yaml b/nuclei-templates/cve-less/plugins/mainwp-seo-extension-5bb6026096b7bf370409b664b0a819cb.yaml new file mode 100644 index 0000000000..e70035dfa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-seo-extension-5bb6026096b7bf370409b664b0a819cb.yaml @@ -0,0 +1,58 @@ +id: mainwp-seo-extension-5bb6026096b7bf370409b664b0a819cb + +info: + name: > + MainWP WordPress SEO Extension <= 4.0.1 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9150e6b-2233-4fdb-95b7-1a5a8c083cad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-seo-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-seo-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-seo-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-seo-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-seo-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-seo-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-seo-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..8d9df5c829 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-seo-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-seo-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-seo-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-seo-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-seo-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-seo-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-seo-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-staging-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-staging-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..f29433a816 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-staging-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-staging-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-staging-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-staging-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-staging-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-staging-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-staging-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-staging-extension-b093b4fe361511a13e571267d2dc54e9.yaml b/nuclei-templates/cve-less/plugins/mainwp-staging-extension-b093b4fe361511a13e571267d2dc54e9.yaml new file mode 100644 index 0000000000..a4b3adb418 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-staging-extension-b093b4fe361511a13e571267d2dc54e9.yaml @@ -0,0 +1,58 @@ +id: mainwp-staging-extension-b093b4fe361511a13e571267d2dc54e9 + +info: + name: > + MainWP Staging Extension <= 4.0.3 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f932e3ea-3d82-47af-924a-b2df15641611?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-staging-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-staging-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-staging-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-staging-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-staging-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..cb8c23721b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-updraftplus-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-updraftplus-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-updraftplus-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-updraftplus-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-updraftplus-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-updraftplus-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-853763a7a24f0714b558d69285e810e8.yaml b/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-853763a7a24f0714b558d69285e810e8.yaml new file mode 100644 index 0000000000..8545bcf541 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-853763a7a24f0714b558d69285e810e8.yaml @@ -0,0 +1,58 @@ +id: mainwp-updraftplus-extension-853763a7a24f0714b558d69285e810e8 + +info: + name: > + MainWP UpdraftPlus Extension <= 4.0.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94f7f2d2-e90b-4978-bab8-eee160949567?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-updraftplus-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-updraftplus-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-updraftplus-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-updraftplus-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-updraftplus-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-aca127a8ed0bd7922687fe103f18d74f.yaml b/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-aca127a8ed0bd7922687fe103f18d74f.yaml new file mode 100644 index 0000000000..78a9649412 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-updraftplus-extension-aca127a8ed0bd7922687fe103f18d74f.yaml @@ -0,0 +1,58 @@ +id: mainwp-updraftplus-extension-aca127a8ed0bd7922687fe103f18d74f + +info: + name: > + MainWP UpdraftPlus Extension <= 4.0.6 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44287d9f-93db-417c-bf88-6785e4ce3a9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-updraftplus-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-updraftplus-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-updraftplus-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-updraftplus-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-updraftplus-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-089c7908dc4fffc678d9e3d75fcc62a9.yaml b/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-089c7908dc4fffc678d9e3d75fcc62a9.yaml new file mode 100644 index 0000000000..ee94211ef5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-089c7908dc4fffc678d9e3d75fcc62a9.yaml @@ -0,0 +1,58 @@ +id: mainwp-wordfence-extension-089c7908dc4fffc678d9e3d75fcc62a9 + +info: + name: > + MainWP Wordfence Extension <= 4.0.7 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05da4808-385c-4e9f-96f8-5d5c04e7371b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-wordfence-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-wordfence-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-wordfence-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-wordfence-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-wordfence-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-09213ac628577f10fc1f9d7850e68118.yaml b/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-09213ac628577f10fc1f9d7850e68118.yaml new file mode 100644 index 0000000000..0ccbc6793e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-09213ac628577f10fc1f9d7850e68118.yaml @@ -0,0 +1,58 @@ +id: mainwp-wordfence-extension-09213ac628577f10fc1f9d7850e68118 + +info: + name: > + MainWP Wordfence Extension <= 4.0.7 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/401ea644-bab2-4578-ab1a-7851c2e710ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-wordfence-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-wordfence-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-wordfence-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-wordfence-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-wordfence-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml b/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml new file mode 100644 index 0000000000..5c83b75ba1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mainwp-wordfence-extension-7cce7a2633974d7472d47a5e1fdbaed0.yaml @@ -0,0 +1,58 @@ +id: mainwp-wordfence-extension-7cce7a2633974d7472d47a5e1fdbaed0 + +info: + name: > + MainWP (Various extensions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb105ff0-5085-4813-81a6-b1f0798d576c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mainwp-wordfence-extension/" + google-query: inurl:"/wp-content/plugins/mainwp-wordfence-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mainwp-wordfence-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mainwp-wordfence-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mainwp-wordfence-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/make-paths-relative-c1cb13846b68b46c9143c497ddfb2bf6.yaml b/nuclei-templates/cve-less/plugins/make-paths-relative-c1cb13846b68b46c9143c497ddfb2bf6.yaml new file mode 100644 index 0000000000..efe8b0aea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/make-paths-relative-c1cb13846b68b46c9143c497ddfb2bf6.yaml @@ -0,0 +1,58 @@ +id: make-paths-relative-c1cb13846b68b46c9143c497ddfb2bf6 + +info: + name: > + Make Paths Relative <= 1.3.0 - Cross-Site Request Forgery via 'admin/class-make-paths-relative-admin.php' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85317781-7e77-4a78-af67-0a1dce39364c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/make-paths-relative/" + google-query: inurl:"/wp-content/plugins/make-paths-relative/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,make-paths-relative,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/make-paths-relative/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "make-paths-relative" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/makestories-helper-6bd5d755fdb18da0e4495ddee37a2528.yaml b/nuclei-templates/cve-less/plugins/makestories-helper-6bd5d755fdb18da0e4495ddee37a2528.yaml new file mode 100644 index 0000000000..a62b17b24b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/makestories-helper-6bd5d755fdb18da0e4495ddee37a2528.yaml @@ -0,0 +1,58 @@ +id: makestories-helper-6bd5d755fdb18da0e4495ddee37a2528 + +info: + name: > + MakeStories (for Google Web Stories) <= 3.0.2 - Cross-Site Request Forgery via 'ms_set_options' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9f7130d-883a-4db4-9edf-f5526724de11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/makestories-helper/" + google-query: inurl:"/wp-content/plugins/makestories-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,makestories-helper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/makestories-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "makestories-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/makestories-helper-86524d953838185228f7ca0bb9dd8a04.yaml b/nuclei-templates/cve-less/plugins/makestories-helper-86524d953838185228f7ca0bb9dd8a04.yaml new file mode 100644 index 0000000000..760c9f74f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/makestories-helper-86524d953838185228f7ca0bb9dd8a04.yaml @@ -0,0 +1,58 @@ +id: makestories-helper-86524d953838185228f7ca0bb9dd8a04 + +info: + name: > + MakeStories (for Web Stories) <= 2.6.4 - Cross-Ste Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98c9c9cb-ca35-461e-9ca6-733012332fd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/makestories-helper/" + google-query: inurl:"/wp-content/plugins/makestories-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,makestories-helper,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/makestories-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "makestories-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/malinky-ajax-pagination-46200eda6d80c305dc0a5fd8d6c3597a.yaml b/nuclei-templates/cve-less/plugins/malinky-ajax-pagination-46200eda6d80c305dc0a5fd8d6c3597a.yaml new file mode 100644 index 0000000000..204c58a916 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/malinky-ajax-pagination-46200eda6d80c305dc0a5fd8d6c3597a.yaml @@ -0,0 +1,58 @@ +id: malinky-ajax-pagination-46200eda6d80c305dc0a5fd8d6c3597a + +info: + name: > + Ajax Pagination and Infinite Scroll <= 2.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bc7f5dd-a1eb-442d-9913-e391208e7f26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/malinky-ajax-pagination/" + google-query: inurl:"/wp-content/plugins/malinky-ajax-pagination/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,malinky-ajax-pagination,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/malinky-ajax-pagination/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "malinky-ajax-pagination" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/malware-finder-54a5c8f84066c82a1f84ab85f1710141.yaml b/nuclei-templates/cve-less/plugins/malware-finder-54a5c8f84066c82a1f84ab85f1710141.yaml new file mode 100644 index 0000000000..23279ceb56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/malware-finder-54a5c8f84066c82a1f84ab85f1710141.yaml @@ -0,0 +1,58 @@ +id: malware-finder-54a5c8f84066c82a1f84ab85f1710141 + +info: + name: > + Malware Finder <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b46b5299-2c14-4eb7-872c-f43518e1d31d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/malware-finder/" + google-query: inurl:"/wp-content/plugins/malware-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,malware-finder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/malware-finder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "malware-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/manage-notification-emails-a2bc40be2dd87e9dcd0977a6fdf140d6.yaml b/nuclei-templates/cve-less/plugins/manage-notification-emails-a2bc40be2dd87e9dcd0977a6fdf140d6.yaml new file mode 100644 index 0000000000..33d51abcf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/manage-notification-emails-a2bc40be2dd87e9dcd0977a6fdf140d6.yaml @@ -0,0 +1,58 @@ +id: manage-notification-emails-a2bc40be2dd87e9dcd0977a6fdf140d6 + +info: + name: > + Manage Notification E-mails <= 1.8.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/048bc117-88df-44b3-a30c-692bad23050f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/manage-notification-emails/" + google-query: inurl:"/wp-content/plugins/manage-notification-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,manage-notification-emails,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/manage-notification-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "manage-notification-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/manage-notification-emails-a5a6d2493729bf3090ce1785835756c3.yaml b/nuclei-templates/cve-less/plugins/manage-notification-emails-a5a6d2493729bf3090ce1785835756c3.yaml new file mode 100644 index 0000000000..e332f72467 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/manage-notification-emails-a5a6d2493729bf3090ce1785835756c3.yaml @@ -0,0 +1,58 @@ +id: manage-notification-emails-a5a6d2493729bf3090ce1785835756c3 + +info: + name: > + Manage Notification E-mails <= 1.8.2 - Cross-Site Request Forgery to Plugin Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ab0d9a2-ca77-439b-bced-8ab5d7b0518a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/manage-notification-emails/" + google-query: inurl:"/wp-content/plugins/manage-notification-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,manage-notification-emails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/manage-notification-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "manage-notification-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/manage-shipyaari-shipping-644c7cae519f04e689e17393d43159b0.yaml b/nuclei-templates/cve-less/plugins/manage-shipyaari-shipping-644c7cae519f04e689e17393d43159b0.yaml new file mode 100644 index 0000000000..da50541185 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/manage-shipyaari-shipping-644c7cae519f04e689e17393d43159b0.yaml @@ -0,0 +1,58 @@ +id: manage-shipyaari-shipping-644c7cae519f04e689e17393d43159b0 + +info: + name: > + Shipyaari Shipping Management <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9350fba0-2cb3-43dd-9ea5-214dc631267a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/manage-shipyaari-shipping/" + google-query: inurl:"/wp-content/plugins/manage-shipyaari-shipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,manage-shipyaari-shipping,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/manage-shipyaari-shipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "manage-shipyaari-shipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/manager-for-icomoon-bf850209f75ffce28cf6dbc62d1d3ffe.yaml b/nuclei-templates/cve-less/plugins/manager-for-icomoon-bf850209f75ffce28cf6dbc62d1d3ffe.yaml new file mode 100644 index 0000000000..4de32aea6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/manager-for-icomoon-bf850209f75ffce28cf6dbc62d1d3ffe.yaml @@ -0,0 +1,58 @@ +id: manager-for-icomoon-bf850209f75ffce28cf6dbc62d1d3ffe + +info: + name: > + Manager for Icomoon <= 2.0 - Unauthenticated Arbitrary File Upload via 'upload' + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/854ab1f3-5f7c-40a4-85a5-db4e20dc72cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/manager-for-icomoon/" + google-query: inurl:"/wp-content/plugins/manager-for-icomoon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,manager-for-icomoon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/manager-for-icomoon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "manager-for-icomoon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/manager-for-icomoon-fcb2137e4fd0eeb6eaa0769932ceae96.yaml b/nuclei-templates/cve-less/plugins/manager-for-icomoon-fcb2137e4fd0eeb6eaa0769932ceae96.yaml new file mode 100644 index 0000000000..b1dcf2092a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/manager-for-icomoon-fcb2137e4fd0eeb6eaa0769932ceae96.yaml @@ -0,0 +1,58 @@ +id: manager-for-icomoon-fcb2137e4fd0eeb6eaa0769932ceae96 + +info: + name: > + Manager for Icomoon <= 2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ef75bb4-febf-4009-a6b4-f0b40a4fc903?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/manager-for-icomoon/" + google-query: inurl:"/wp-content/plugins/manager-for-icomoon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,manager-for-icomoon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/manager-for-icomoon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "manager-for-icomoon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mangboard-33e169ef58595c551d71b2a0f254c1a0.yaml b/nuclei-templates/cve-less/plugins/mangboard-33e169ef58595c551d71b2a0f254c1a0.yaml new file mode 100644 index 0000000000..22eed3237e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mangboard-33e169ef58595c551d71b2a0f254c1a0.yaml @@ -0,0 +1,58 @@ +id: mangboard-33e169ef58595c551d71b2a0f254c1a0 + +info: + name: > + Mangboard <= 1.9.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0a5771b-0108-4393-a54e-b5e2c35caeb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mangboard/" + google-query: inurl:"/wp-content/plugins/mangboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mangboard,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mangboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mangboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mangboard-4e66527828b974bdf1935dbf3ae98ee7.yaml b/nuclei-templates/cve-less/plugins/mangboard-4e66527828b974bdf1935dbf3ae98ee7.yaml new file mode 100644 index 0000000000..8fa9d8cf5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mangboard-4e66527828b974bdf1935dbf3ae98ee7.yaml @@ -0,0 +1,58 @@ +id: mangboard-4e66527828b974bdf1935dbf3ae98ee7 + +info: + name: > + Mang Board WP <= 1.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a32fdc-1c72-45fc-bb57-44f6888e0885?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mangboard/" + google-query: inurl:"/wp-content/plugins/mangboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mangboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mangboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mangboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mangboard-50a5bfd5ef4ea3d67f1cc1653c0ac79b.yaml b/nuclei-templates/cve-less/plugins/mangboard-50a5bfd5ef4ea3d67f1cc1653c0ac79b.yaml new file mode 100644 index 0000000000..4480b840f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mangboard-50a5bfd5ef4ea3d67f1cc1653c0ac79b.yaml @@ -0,0 +1,58 @@ +id: mangboard-50a5bfd5ef4ea3d67f1cc1653c0ac79b + +info: + name: > + Mang Board WP <= 1.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a85e1e9-ef40-40f6-a652-17acf0a2d33d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mangboard/" + google-query: inurl:"/wp-content/plugins/mangboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mangboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mangboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mangboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mangboard-b9040953fd9d7380144b780f2d4080d6.yaml b/nuclei-templates/cve-less/plugins/mangboard-b9040953fd9d7380144b780f2d4080d6.yaml new file mode 100644 index 0000000000..1643cc68ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mangboard-b9040953fd9d7380144b780f2d4080d6.yaml @@ -0,0 +1,58 @@ +id: mangboard-b9040953fd9d7380144b780f2d4080d6 + +info: + name: > + Mang Board WP <= 1.7.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d8cfcdc-6258-4629-a3b4-d65e44ac82f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mangboard/" + google-query: inurl:"/wp-content/plugins/mangboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mangboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mangboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mangboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mantenimiento-web-28c1871bb01e37ab60acecfab790c02b.yaml b/nuclei-templates/cve-less/plugins/mantenimiento-web-28c1871bb01e37ab60acecfab790c02b.yaml new file mode 100644 index 0000000000..5d5c1b4270 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mantenimiento-web-28c1871bb01e37ab60acecfab790c02b.yaml @@ -0,0 +1,58 @@ +id: mantenimiento-web-28c1871bb01e37ab60acecfab790c02b + +info: + name: > + Mantenimiento web <= 0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c950ac0a-80fb-4f95-ba20-afb8ba6b137f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mantenimiento-web/" + google-query: inurl:"/wp-content/plugins/mantenimiento-web/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mantenimiento-web,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mantenimiento-web/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mantenimiento-web" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mantenimiento-web-a43440257ec4eba085c1ac2ce540e1bf.yaml b/nuclei-templates/cve-less/plugins/mantenimiento-web-a43440257ec4eba085c1ac2ce540e1bf.yaml new file mode 100644 index 0000000000..38ddd92515 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mantenimiento-web-a43440257ec4eba085c1ac2ce540e1bf.yaml @@ -0,0 +1,58 @@ +id: mantenimiento-web-a43440257ec4eba085c1ac2ce540e1bf + +info: + name: > + Mantenimiento web <= 0.13 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aefb7e34-ec48-4e29-b3aa-85901e12d21c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mantenimiento-web/" + google-query: inurl:"/wp-content/plugins/mantenimiento-web/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mantenimiento-web,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mantenimiento-web/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mantenimiento-web" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/manual-image-crop-e5eb2b15a41ab9ee60dcb2af1f87d2ee.yaml b/nuclei-templates/cve-less/plugins/manual-image-crop-e5eb2b15a41ab9ee60dcb2af1f87d2ee.yaml new file mode 100644 index 0000000000..b3680bf85f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/manual-image-crop-e5eb2b15a41ab9ee60dcb2af1f87d2ee.yaml @@ -0,0 +1,58 @@ +id: manual-image-crop-e5eb2b15a41ab9ee60dcb2af1f87d2ee + +info: + name: > + Manual Image Crop <= 1.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c195d62d-5f2f-4248-9a84-b551f532256b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/manual-image-crop/" + google-query: inurl:"/wp-content/plugins/manual-image-crop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,manual-image-crop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/manual-image-crop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "manual-image-crop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/map-block-gutenberg-f3ae8d3614658d0602179cdf953c8cf0.yaml b/nuclei-templates/cve-less/plugins/map-block-gutenberg-f3ae8d3614658d0602179cdf953c8cf0.yaml new file mode 100644 index 0000000000..e3ad29db8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/map-block-gutenberg-f3ae8d3614658d0602179cdf953c8cf0.yaml @@ -0,0 +1,58 @@ +id: map-block-gutenberg-f3ae8d3614658d0602179cdf953c8cf0 + +info: + name: > + Map Block for Google Maps <= 1.31 - Unprotected AJAX Action + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03fd0c97-7b50-4930-99ca-c9b37d7e4ade?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/map-block-gutenberg/" + google-query: inurl:"/wp-content/plugins/map-block-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,map-block-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/map-block-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "map-block-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/map-location-picker-at-checkout-for-woocommerce-33149871db85e014a52f28e4a7d38f17.yaml b/nuclei-templates/cve-less/plugins/map-location-picker-at-checkout-for-woocommerce-33149871db85e014a52f28e4a7d38f17.yaml new file mode 100644 index 0000000000..b1562a635e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/map-location-picker-at-checkout-for-woocommerce-33149871db85e014a52f28e4a7d38f17.yaml @@ -0,0 +1,58 @@ +id: map-location-picker-at-checkout-for-woocommerce-33149871db85e014a52f28e4a7d38f17 + +info: + name: > + Location Picker at Checkout for WooCommerce <= 1.8.9 - Missing Authorization via checkout_map_rules_order_ajax_handler + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7394be7e-9a1f-4c85-ac2d-cace39def330?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/map-location-picker-at-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/map-location-picker-at-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,map-location-picker-at-checkout-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/map-location-picker-at-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "map-location-picker-at-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/map-location-picker-at-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/map-location-picker-at-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4dba6ee160 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/map-location-picker-at-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: map-location-picker-at-checkout-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/map-location-picker-at-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/map-location-picker-at-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,map-location-picker-at-checkout-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/map-location-picker-at-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "map-location-picker-at-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/map-multi-marker-98cc3184ae2ac53e6ec93de75027842b.yaml b/nuclei-templates/cve-less/plugins/map-multi-marker-98cc3184ae2ac53e6ec93de75027842b.yaml new file mode 100644 index 0000000000..0d5abcaa2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/map-multi-marker-98cc3184ae2ac53e6ec93de75027842b.yaml @@ -0,0 +1,58 @@ +id: map-multi-marker-98cc3184ae2ac53e6ec93de75027842b + +info: + name: > + Map Multi Marker <= 3.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/577cf51e-3fcb-456c-9068-17fff4a71e94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/map-multi-marker/" + google-query: inurl:"/wp-content/plugins/map-multi-marker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,map-multi-marker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/map-multi-marker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "map-multi-marker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapifylite-276d9e37b697911176c96dd2534c5db7.yaml b/nuclei-templates/cve-less/plugins/mapifylite-276d9e37b697911176c96dd2534c5db7.yaml new file mode 100644 index 0000000000..1812dc8d07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapifylite-276d9e37b697911176c96dd2534c5db7.yaml @@ -0,0 +1,58 @@ +id: mapifylite-276d9e37b697911176c96dd2534c5db7 + +info: + name: > + MapifyLite and MapifyPro <= 3.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ba55591-f4f3-4e90-9358-ca9c7ca01b09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapifylite/" + google-query: inurl:"/wp-content/plugins/mapifylite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapifylite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapifylite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapifylite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapping-multiple-urls-redirect-same-page-13d4f5660b4ca1f115f6a5db8348287c.yaml b/nuclei-templates/cve-less/plugins/mapping-multiple-urls-redirect-same-page-13d4f5660b4ca1f115f6a5db8348287c.yaml new file mode 100644 index 0000000000..7aba507e15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapping-multiple-urls-redirect-same-page-13d4f5660b4ca1f115f6a5db8348287c.yaml @@ -0,0 +1,58 @@ +id: mapping-multiple-urls-redirect-same-page-13d4f5660b4ca1f115f6a5db8348287c + +info: + name: > + Mapping Multiple URLs Redirect Same Page <= 5.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/514184b0-aa54-41d1-9aa0-86d120ae79c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapping-multiple-urls-redirect-same-page/" + google-query: inurl:"/wp-content/plugins/mapping-multiple-urls-redirect-same-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapping-multiple-urls-redirect-same-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapping-multiple-urls-redirect-same-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapping-multiple-urls-redirect-same-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapplic-392f3d0edacca22b6e8516ac27324815.yaml b/nuclei-templates/cve-less/plugins/mapplic-392f3d0edacca22b6e8516ac27324815.yaml new file mode 100644 index 0000000000..8a9d67616e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapplic-392f3d0edacca22b6e8516ac27324815.yaml @@ -0,0 +1,58 @@ +id: mapplic-392f3d0edacca22b6e8516ac27324815 + +info: + name: > + Mapplic Lite and Mapplic <= (Various Versions) - Server Side Request Forgery to Cross-Site Scirpting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aacabb5-94af-485a-af24-e84db3e3726f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapplic/" + google-query: inurl:"/wp-content/plugins/mapplic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapplic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapplic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapplic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapplic-lite-392f3d0edacca22b6e8516ac27324815.yaml b/nuclei-templates/cve-less/plugins/mapplic-lite-392f3d0edacca22b6e8516ac27324815.yaml new file mode 100644 index 0000000000..efc2f9beed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapplic-lite-392f3d0edacca22b6e8516ac27324815.yaml @@ -0,0 +1,58 @@ +id: mapplic-lite-392f3d0edacca22b6e8516ac27324815 + +info: + name: > + Mapplic Lite and Mapplic <= (Various Versions) - Server Side Request Forgery to Cross-Site Scirpting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aacabb5-94af-485a-af24-e84db3e3726f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapplic-lite/" + google-query: inurl:"/wp-content/plugins/mapplic-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapplic-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapplic-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapplic-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-001b828c3c08777c5f66954153002511.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-001b828c3c08777c5f66954153002511.yaml new file mode 100644 index 0000000000..091e03beaa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-001b828c3c08777c5f66954153002511.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-001b828c3c08777c5f66954153002511 + +info: + name: > + MapPress <= 2.88.16 - Authenticated (Contributor+) Stored Cross-Site Scripting via Map Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fce76126-0cfd-464f-b644-45d4301e958d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.88.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-0db4927fc2e66efc196aae8bda2e501b.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-0db4927fc2e66efc196aae8bda2e501b.yaml new file mode 100644 index 0000000000..1426a14590 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-0db4927fc2e66efc196aae8bda2e501b.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-0db4927fc2e66efc196aae8bda2e501b + +info: + name: > + MapPress Maps <= 2.73.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96d5bfeb-b082-44cc-8d84-1ef1c3f5b562?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.73.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-14a7ffa14fbeefc172000dc0caefb552.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-14a7ffa14fbeefc172000dc0caefb552.yaml new file mode 100644 index 0000000000..b706e28b2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-14a7ffa14fbeefc172000dc0caefb552.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-14a7ffa14fbeefc172000dc0caefb552 + +info: + name: > + MapPress Maps for WordPress <= 2.73.12 - Admin+ File Upload to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62ac66d8-fc10-4ec2-a567-7b95eb6f2c76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.73.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-29adc02045150a72bc0879e8ef2cedbd.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-29adc02045150a72bc0879e8ef2cedbd.yaml new file mode 100644 index 0000000000..b24d7cc113 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-29adc02045150a72bc0879e8ef2cedbd.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-29adc02045150a72bc0879e8ef2cedbd + +info: + name: > + MapPress Maps for WordPress <= 2.88.15 - Insufficient Authorization to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a7ced3b-4cb5-463a-aa32-3ccdc886e1a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.88.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-6bf1979859a94fbe33542b88abb0e15d.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-6bf1979859a94fbe33542b88abb0e15d.yaml new file mode 100644 index 0000000000..f69430a695 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-6bf1979859a94fbe33542b88abb0e15d.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-6bf1979859a94fbe33542b88abb0e15d + +info: + name: > + MapPress Maps for WordPress <=2.53.8 - Authenticated Map Creation/Deletion to Stored Cross-Site Scripting & Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc5e3932-809c-46d7-bb8d-1dffac9877a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.53.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-7b6a78f327e3069338279750b3f26ae1.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-7b6a78f327e3069338279750b3f26ae1.yaml new file mode 100644 index 0000000000..d9c63f76e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-7b6a78f327e3069338279750b3f26ae1.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-7b6a78f327e3069338279750b3f26ae1 + +info: + name: > + MapPress Maps for WordPress <= 2.88.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3d2c9a4-32f7-484f-86ce-a33ef1174b28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.88.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-a32c5004dd8e3051476b1d2ace4665f9.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-a32c5004dd8e3051476b1d2ace4665f9.yaml new file mode 100644 index 0000000000..94d2bc3565 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-a32c5004dd8e3051476b1d2ace4665f9.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-a32c5004dd8e3051476b1d2ace4665f9 + +info: + name: > + MapPress Maps <= 2.54.5 - Remote Code Execution via Improper Capability Checks in AJAX Calls + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8202e9e7-b05b-4603-9ebd-8084bf17a230?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.54.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-bed91f2c82382c1fad6f81b58becdcb8.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-bed91f2c82382c1fad6f81b58becdcb8.yaml new file mode 100644 index 0000000000..5c36e8cc9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-bed91f2c82382c1fad6f81b58becdcb8.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-bed91f2c82382c1fad6f81b58becdcb8 + +info: + name: > + MapPress Maps for WordPress <= 2.88.13 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28a8f025-c2ab-4a5f-a99e-a2d19b14a190?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.88.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-f49ac78d75e6d3fb0dc3afda46d041dc.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-f49ac78d75e6d3fb0dc3afda46d041dc.yaml new file mode 100644 index 0000000000..6a4d643fc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-f49ac78d75e6d3fb0dc3afda46d041dc.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-f49ac78d75e6d3fb0dc3afda46d041dc + +info: + name: > + MapPress Maps for WordPress <= 2.88.14 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41e2c557-e462-4d9e-916c-b8352a6df571?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.88.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-f938f1ab4ea9e7929903077ead3a87cb.yaml b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-f938f1ab4ea9e7929903077ead3a87cb.yaml new file mode 100644 index 0000000000..38e42e0f84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mappress-google-maps-for-wordpress-f938f1ab4ea9e7929903077ead3a87cb.yaml @@ -0,0 +1,58 @@ +id: mappress-google-maps-for-wordpress-f938f1ab4ea9e7929903077ead3a87cb + +info: + name: > + MapPress Maps for WordPress <= 2.85.4 - Authenticated (Contributor+) SQL Injection via get_maps + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aab16b6f-4daf-4eb1-9526-dd05b2b41dee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mappress-google-maps-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mappress-google-maps-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.85.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maps-block-apple-34f90d387401d288923a3d216c026fe2.yaml b/nuclei-templates/cve-less/plugins/maps-block-apple-34f90d387401d288923a3d216c026fe2.yaml new file mode 100644 index 0000000000..b8d3fa7bdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maps-block-apple-34f90d387401d288923a3d216c026fe2.yaml @@ -0,0 +1,58 @@ +id: maps-block-apple-34f90d387401d288923a3d216c026fe2 + +info: + name: > + markdown-it < 1.3.2 - Uncontrolled Resource Consumption + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67b468f7-21c7-424a-a65c-172ef47f0465?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maps-block-apple/" + google-query: inurl:"/wp-content/plugins/maps-block-apple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maps-block-apple,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maps-block-apple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maps-block-apple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maps-block-apple-48cf291038d407d0c14437de80bf836d.yaml b/nuclei-templates/cve-less/plugins/maps-block-apple-48cf291038d407d0c14437de80bf836d.yaml new file mode 100644 index 0000000000..385292b54b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maps-block-apple-48cf291038d407d0c14437de80bf836d.yaml @@ -0,0 +1,58 @@ +id: maps-block-apple-48cf291038d407d0c14437de80bf836d + +info: + name: > + json5 <= 1.0.1 and 2.0.0-2.2.1 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d5fad17-3b28-4f99-9508-f807cb06cfe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maps-block-apple/" + google-query: inurl:"/wp-content/plugins/maps-block-apple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maps-block-apple,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maps-block-apple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maps-block-apple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maps-block-apple-54bc1daf26907dc59a5c7876a142ff1b.yaml b/nuclei-templates/cve-less/plugins/maps-block-apple-54bc1daf26907dc59a5c7876a142ff1b.yaml new file mode 100644 index 0000000000..76c8c0b2c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maps-block-apple-54bc1daf26907dc59a5c7876a142ff1b.yaml @@ -0,0 +1,58 @@ +id: maps-block-apple-54bc1daf26907dc59a5c7876a142ff1b + +info: + name: > + loader-utils (JS package) < 2.0.3 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45a49dca-2ed2-44cf-a0fe-0f1440a78cc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maps-block-apple/" + google-query: inurl:"/wp-content/plugins/maps-block-apple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maps-block-apple,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maps-block-apple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maps-block-apple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maps-block-apple-73081b1f6f4e13a9e6e969eba5e746fc.yaml b/nuclei-templates/cve-less/plugins/maps-block-apple-73081b1f6f4e13a9e6e969eba5e746fc.yaml new file mode 100644 index 0000000000..6113d35a87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maps-block-apple-73081b1f6f4e13a9e6e969eba5e746fc.yaml @@ -0,0 +1,58 @@ +id: maps-block-apple-73081b1f6f4e13a9e6e969eba5e746fc + +info: + name: > + simple-git < 3.15.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c747e6f-31fc-41b0-ba62-f009b5483696?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maps-block-apple/" + google-query: inurl:"/wp-content/plugins/maps-block-apple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maps-block-apple,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maps-block-apple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maps-block-apple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maps-block-apple-bc55ea7b509124d1a77831d4400c5030.yaml b/nuclei-templates/cve-less/plugins/maps-block-apple-bc55ea7b509124d1a77831d4400c5030.yaml new file mode 100644 index 0000000000..e83dc4eaba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maps-block-apple-bc55ea7b509124d1a77831d4400c5030.yaml @@ -0,0 +1,58 @@ +id: maps-block-apple-bc55ea7b509124d1a77831d4400c5030 + +info: + name: > + simple-git < 3.16.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46fdd494-8073-4a68-a4ab-1f5767011f67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maps-block-apple/" + google-query: inurl:"/wp-content/plugins/maps-block-apple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maps-block-apple,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maps-block-apple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maps-block-apple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maps-block-apple-f9078038dec7d199edb0413f76661495.yaml b/nuclei-templates/cve-less/plugins/maps-block-apple-f9078038dec7d199edb0413f76661495.yaml new file mode 100644 index 0000000000..5a249d87dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maps-block-apple-f9078038dec7d199edb0413f76661495.yaml @@ -0,0 +1,58 @@ +id: maps-block-apple-f9078038dec7d199edb0413f76661495 + +info: + name: > + Terser < 4.8.1 and 5.0.0-5.14.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d535c069-cfa3-4c41-9a01-b4c4e7c75764?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maps-block-apple/" + google-query: inurl:"/wp-content/plugins/maps-block-apple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maps-block-apple,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maps-block-apple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maps-block-apple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapsmarker-13b8a58f1828f2c64647f6e908737c8f.yaml b/nuclei-templates/cve-less/plugins/mapsmarker-13b8a58f1828f2c64647f6e908737c8f.yaml new file mode 100644 index 0000000000..32a1c84b65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapsmarker-13b8a58f1828f2c64647f6e908737c8f.yaml @@ -0,0 +1,58 @@ +id: mapsmarker-13b8a58f1828f2c64647f6e908737c8f + +info: + name: > + Leaflet Maps Marker Pro < 1.5.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/389a4e32-81c4-4060-b210-b6ca6beeaf48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapsmarker/" + google-query: inurl:"/wp-content/plugins/mapsmarker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapsmarker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapsmarker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapsmarker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapsmarker-22c2313f6ddd97279a9a6e05569e552c.yaml b/nuclei-templates/cve-less/plugins/mapsmarker-22c2313f6ddd97279a9a6e05569e552c.yaml new file mode 100644 index 0000000000..28bbede805 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapsmarker-22c2313f6ddd97279a9a6e05569e552c.yaml @@ -0,0 +1,58 @@ +id: mapsmarker-22c2313f6ddd97279a9a6e05569e552c + +info: + name: > + Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) < 2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce9e9298-7ff3-4ecc-9665-cc4a3b76059c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapsmarker/" + google-query: inurl:"/wp-content/plugins/mapsmarker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapsmarker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapsmarker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapsmarker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapsmarker-a7b5b9f7aae561ff960ba955e7bc8f21.yaml b/nuclei-templates/cve-less/plugins/mapsmarker-a7b5b9f7aae561ff960ba955e7bc8f21.yaml new file mode 100644 index 0000000000..b404abaeed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapsmarker-a7b5b9f7aae561ff960ba955e7bc8f21.yaml @@ -0,0 +1,58 @@ +id: mapsmarker-a7b5b9f7aae561ff960ba955e7bc8f21 + +info: + name: > + Leaflet Maps Marker Pro < 1.5.8 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/875b15a1-c747-4a74-a77e-d541f92468a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapsmarker/" + google-query: inurl:"/wp-content/plugins/mapsmarker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapsmarker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapsmarker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapsmarker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapsmarker-ad02e1c1e6ce500678284236a257328f.yaml b/nuclei-templates/cve-less/plugins/mapsmarker-ad02e1c1e6ce500678284236a257328f.yaml new file mode 100644 index 0000000000..2cb6d1b2ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapsmarker-ad02e1c1e6ce500678284236a257328f.yaml @@ -0,0 +1,58 @@ +id: mapsmarker-ad02e1c1e6ce500678284236a257328f + +info: + name: > + Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) < 2.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83b062c8-4884-4ffa-89e6-71140c99e422?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapsmarker/" + google-query: inurl:"/wp-content/plugins/mapsmarker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapsmarker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapsmarker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapsmarker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapsmarker-fcbdec1ff65d61610081880538a802c5.yaml b/nuclei-templates/cve-less/plugins/mapsmarker-fcbdec1ff65d61610081880538a802c5.yaml new file mode 100644 index 0000000000..7f9483cc5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapsmarker-fcbdec1ff65d61610081880538a802c5.yaml @@ -0,0 +1,58 @@ +id: mapsmarker-fcbdec1ff65d61610081880538a802c5 + +info: + name: > + Leaflet Maps Marker Pro < 1.5.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66969472-4b3c-4d56-b761-523ea854e3db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapsmarker/" + google-query: inurl:"/wp-content/plugins/mapsmarker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapsmarker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapsmarker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapsmarker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapster-wp-maps-e101fa87e9e9a3f0059378f1f396b6c6.yaml b/nuclei-templates/cve-less/plugins/mapster-wp-maps-e101fa87e9e9a3f0059378f1f396b6c6.yaml new file mode 100644 index 0000000000..0a56da402d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapster-wp-maps-e101fa87e9e9a3f0059378f1f396b6c6.yaml @@ -0,0 +1,58 @@ +id: mapster-wp-maps-e101fa87e9e9a3f0059378f1f396b6c6 + +info: + name: > + Mapster WP Maps <= 1.2.38 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d38ee896-8cdd-45c5-b393-bdcb7baa7bd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapster-wp-maps/" + google-query: inurl:"/wp-content/plugins/mapster-wp-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapster-wp-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapster-wp-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapster-wp-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapsvg-e1d4b31d2e512648b34fb410fc6ac542.yaml b/nuclei-templates/cve-less/plugins/mapsvg-e1d4b31d2e512648b34fb410fc6ac542.yaml new file mode 100644 index 0000000000..cf45653915 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapsvg-e1d4b31d2e512648b34fb410fc6ac542.yaml @@ -0,0 +1,58 @@ +id: mapsvg-e1d4b31d2e512648b34fb410fc6ac542 + +info: + name: > + MapSVG <= 6.2.19 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1816a385-0b50-4f0d-848c-f583c247c8fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapsvg/" + google-query: inurl:"/wp-content/plugins/mapsvg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapsvg,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapsvg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapsvg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapsvg-lite-interactive-vector-maps-303bc652d47c2a787ae26772587ef7fc.yaml b/nuclei-templates/cve-less/plugins/mapsvg-lite-interactive-vector-maps-303bc652d47c2a787ae26772587ef7fc.yaml new file mode 100644 index 0000000000..1a89d4c64b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapsvg-lite-interactive-vector-maps-303bc652d47c2a787ae26772587ef7fc.yaml @@ -0,0 +1,58 @@ +id: mapsvg-lite-interactive-vector-maps-303bc652d47c2a787ae26772587ef7fc + +info: + name: > + MapSVG Lite < 3.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8073cc59-e5cc-4940-bce0-e501f0d959cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapsvg-lite-interactive-vector-maps/" + google-query: inurl:"/wp-content/plugins/mapsvg-lite-interactive-vector-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapsvg-lite-interactive-vector-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapsvg-lite-interactive-vector-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapsvg-lite-interactive-vector-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mapwiz-47ec4d19442547ad0d7289d6f4804147.yaml b/nuclei-templates/cve-less/plugins/mapwiz-47ec4d19442547ad0d7289d6f4804147.yaml new file mode 100644 index 0000000000..35c0dc267d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mapwiz-47ec4d19442547ad0d7289d6f4804147.yaml @@ -0,0 +1,58 @@ +id: mapwiz-47ec4d19442547ad0d7289d6f4804147 + +info: + name: > + Mapwiz <= 1.0.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66f73c3d-3937-4b9f-a7d6-29c249e46b92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mapwiz/" + google-query: inurl:"/wp-content/plugins/mapwiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mapwiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mapwiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mapwiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/marekkis-watermark-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml b/nuclei-templates/cve-less/plugins/marekkis-watermark-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml new file mode 100644 index 0000000000..a694972406 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/marekkis-watermark-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml @@ -0,0 +1,58 @@ +id: marekkis-watermark-3b4a8aeeafcd7cd5d89d3f79fbd2340b + +info: + name: > + Marekkis Watermark-Plugin <= 0.9.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e65cf73b-349b-4982-b6ec-a2c94d327d0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/marekkis-watermark/" + google-query: inurl:"/wp-content/plugins/marekkis-watermark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,marekkis-watermark,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/marekkis-watermark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "marekkis-watermark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mark-posts-cf0f772efb4c9beac6971570b02c3073.yaml b/nuclei-templates/cve-less/plugins/mark-posts-cf0f772efb4c9beac6971570b02c3073.yaml new file mode 100644 index 0000000000..b5eb78d493 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mark-posts-cf0f772efb4c9beac6971570b02c3073.yaml @@ -0,0 +1,58 @@ +id: mark-posts-cf0f772efb4c9beac6971570b02c3073 + +info: + name: > + Mark Posts <= 2.0.0 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33df558a-da81-46e0-bef9-ddb2bb90a5c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mark-posts/" + google-query: inurl:"/wp-content/plugins/mark-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mark-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mark-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mark-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mark-user-as-spammer-79bf49b5f0577e5e924d09bc9548c465.yaml b/nuclei-templates/cve-less/plugins/mark-user-as-spammer-79bf49b5f0577e5e924d09bc9548c465.yaml new file mode 100644 index 0000000000..9e59fc2051 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mark-user-as-spammer-79bf49b5f0577e5e924d09bc9548c465.yaml @@ -0,0 +1,58 @@ +id: mark-user-as-spammer-79bf49b5f0577e5e924d09bc9548c465 + +info: + name: > + Mark User as Spammer <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5cab96c-f6ab-4ee6-8453-22e8a39cc82f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mark-user-as-spammer/" + google-query: inurl:"/wp-content/plugins/mark-user-as-spammer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mark-user-as-spammer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mark-user-as-spammer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mark-user-as-spammer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/markdown-on-save-improved-050d7cb19f5f214c16e87b6deb3805d1.yaml b/nuclei-templates/cve-less/plugins/markdown-on-save-improved-050d7cb19f5f214c16e87b6deb3805d1.yaml new file mode 100644 index 0000000000..450c9d629b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/markdown-on-save-improved-050d7cb19f5f214c16e87b6deb3805d1.yaml @@ -0,0 +1,58 @@ +id: markdown-on-save-improved-050d7cb19f5f214c16e87b6deb3805d1 + +info: + name: > + Markdown on Save Improved <= 2.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9be8c202-56f0-449f-84fa-375d239b5654?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/markdown-on-save-improved/" + google-query: inurl:"/wp-content/plugins/markdown-on-save-improved/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,markdown-on-save-improved,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/markdown-on-save-improved/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "markdown-on-save-improved" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/markdown-on-save-improved-c99fdfdd6f51accf3ed6f44f28e23a84.yaml b/nuclei-templates/cve-less/plugins/markdown-on-save-improved-c99fdfdd6f51accf3ed6f44f28e23a84.yaml new file mode 100644 index 0000000000..ef13db7e53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/markdown-on-save-improved-c99fdfdd6f51accf3ed6f44f28e23a84.yaml @@ -0,0 +1,58 @@ +id: markdown-on-save-improved-c99fdfdd6f51accf3ed6f44f28e23a84 + +info: + name: > + Markdown on Save Improved <= 2.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bda3c8f8-fd0f-432d-a382-e8ac55d34bb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/markdown-on-save-improved/" + google-query: inurl:"/wp-content/plugins/markdown-on-save-improved/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,markdown-on-save-improved,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/markdown-on-save-improved/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "markdown-on-save-improved" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/marker-io-cca1bdac61a7e1b80d3b722e283a8084.yaml b/nuclei-templates/cve-less/plugins/marker-io-cca1bdac61a7e1b80d3b722e283a8084.yaml new file mode 100644 index 0000000000..a6a89cf700 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/marker-io-cca1bdac61a7e1b80d3b722e283a8084.yaml @@ -0,0 +1,58 @@ +id: marker-io-cca1bdac61a7e1b80d3b722e283a8084 + +info: + name: > + Marker.io <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c49b3841-370b-42ed-9545-e69c2544642d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/marker-io/" + google-query: inurl:"/wp-content/plugins/marker-io/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,marker-io,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/marker-io/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "marker-io" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/marker-io-fb2c63718b2382dbcdfb9fbdbea83949.yaml b/nuclei-templates/cve-less/plugins/marker-io-fb2c63718b2382dbcdfb9fbdbea83949.yaml new file mode 100644 index 0000000000..ba3382cef7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/marker-io-fb2c63718b2382dbcdfb9fbdbea83949.yaml @@ -0,0 +1,58 @@ +id: marker-io-fb2c63718b2382dbcdfb9fbdbea83949 + +info: + name: > + Marker.io <= 1.1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fa382bf-a501-44eb-8a39-7ceb5829378f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/marker-io/" + google-query: inurl:"/wp-content/plugins/marker-io/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,marker-io,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/marker-io/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "marker-io" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/market-exporter-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/market-exporter-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..36d76460a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/market-exporter-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: market-exporter-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/market-exporter/" + google-query: inurl:"/wp-content/plugins/market-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,market-exporter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/market-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "market-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/marketing-optimizer-3f528c05be1996d33dd348d92ec23461.yaml b/nuclei-templates/cve-less/plugins/marketing-optimizer-3f528c05be1996d33dd348d92ec23461.yaml new file mode 100644 index 0000000000..8961c64856 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/marketing-optimizer-3f528c05be1996d33dd348d92ec23461.yaml @@ -0,0 +1,58 @@ +id: marketing-optimizer-3f528c05be1996d33dd348d92ec23461 + +info: + name: > + Marketing Optimizer <= 20200925 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b537637b-32c0-405e-94fa-c7c2d0c80658?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/marketing-optimizer/" + google-query: inurl:"/wp-content/plugins/marketing-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,marketing-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/marketing-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "marketing-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20200925') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/marketing-performance-127a32a3d7486f122ba18339dee95397.yaml b/nuclei-templates/cve-less/plugins/marketing-performance-127a32a3d7486f122ba18339dee95397.yaml new file mode 100644 index 0000000000..1fedef0296 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/marketing-performance-127a32a3d7486f122ba18339dee95397.yaml @@ -0,0 +1,58 @@ +id: marketing-performance-127a32a3d7486f122ba18339dee95397 + +info: + name: > + Marketing Performance <= 2.0.0 - Unauthenticated Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29b53c80-68d5-4431-a49b-0d139c9403f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/marketing-performance/" + google-query: inurl:"/wp-content/plugins/marketing-performance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,marketing-performance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/marketing-performance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "marketing-performance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/marketo-forms-and-tracking-8d38cd4f2bf680c2b1b244824fc691f8.yaml b/nuclei-templates/cve-less/plugins/marketo-forms-and-tracking-8d38cd4f2bf680c2b1b244824fc691f8.yaml new file mode 100644 index 0000000000..a759877ca2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/marketo-forms-and-tracking-8d38cd4f2bf680c2b1b244824fc691f8.yaml @@ -0,0 +1,58 @@ +id: marketo-forms-and-tracking-8d38cd4f2bf680c2b1b244824fc691f8 + +info: + name: > + Marketo Forms and Tracking <= 1.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd0054b5-537b-412f-8b10-8bbc9f2ea256?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/marketo-forms-and-tracking/" + google-query: inurl:"/wp-content/plugins/marketo-forms-and-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,marketo-forms-and-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/marketo-forms-and-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "marketo-forms-and-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/marmoset-viewer-b4b5d874a62067dd72085668d3cf4b24.yaml b/nuclei-templates/cve-less/plugins/marmoset-viewer-b4b5d874a62067dd72085668d3cf4b24.yaml new file mode 100644 index 0000000000..6a258ade8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/marmoset-viewer-b4b5d874a62067dd72085668d3cf4b24.yaml @@ -0,0 +1,58 @@ +id: marmoset-viewer-b4b5d874a62067dd72085668d3cf4b24 + +info: + name: > + Marmoset Viewer < 1.9.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73d3f73f-5407-4acf-ac65-1f7eadbaa58f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/marmoset-viewer/" + google-query: inurl:"/wp-content/plugins/marmoset-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,marmoset-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/marmoset-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "marmoset-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/martins-link-network-95b7b2700fb0920c45a7d61cccd555c1.yaml b/nuclei-templates/cve-less/plugins/martins-link-network-95b7b2700fb0920c45a7d61cccd555c1.yaml new file mode 100644 index 0000000000..2245a7453e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/martins-link-network-95b7b2700fb0920c45a7d61cccd555c1.yaml @@ -0,0 +1,58 @@ +id: martins-link-network-95b7b2700fb0920c45a7d61cccd555c1 + +info: + name: > + Martins Free & Easy SEO BackLink Link Building Network <= 1.2.29 - Reflected Cross-Site Scripting via _wpnonce + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/773b5a79-017a-4e16-b563-3aa2939fa179?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/martins-link-network/" + google-query: inurl:"/wp-content/plugins/martins-link-network/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,martins-link-network,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/martins-link-network/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "martins-link-network" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mashsharer-6b3f6a43a6261f36339646ed344d5b53.yaml b/nuclei-templates/cve-less/plugins/mashsharer-6b3f6a43a6261f36339646ed344d5b53.yaml new file mode 100644 index 0000000000..2376988431 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mashsharer-6b3f6a43a6261f36339646ed344d5b53.yaml @@ -0,0 +1,58 @@ +id: mashsharer-6b3f6a43a6261f36339646ed344d5b53 + +info: + name: > + Social Media Share Buttons <= 3.8.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f997c20-38f6-4968-b7de-8f28f825c7fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mashsharer/" + google-query: inurl:"/wp-content/plugins/mashsharer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mashsharer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mashsharer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mashsharer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mashsharer-7512032bfe4cd740c20bf708ea302987.yaml b/nuclei-templates/cve-less/plugins/mashsharer-7512032bfe4cd740c20bf708ea302987.yaml new file mode 100644 index 0000000000..bde0582aef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mashsharer-7512032bfe4cd740c20bf708ea302987.yaml @@ -0,0 +1,58 @@ +id: mashsharer-7512032bfe4cd740c20bf708ea302987 + +info: + name: > + Social Media Share Buttons <= 3.8.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc0e133d-b1c7-42c4-bd1f-7b91f0ec4fb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mashsharer/" + google-query: inurl:"/wp-content/plugins/mashsharer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mashsharer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mashsharer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mashsharer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mashsharer-b4206097b7af70105fc04d8db27b43ec.yaml b/nuclei-templates/cve-less/plugins/mashsharer-b4206097b7af70105fc04d8db27b43ec.yaml new file mode 100644 index 0000000000..6df24d7f31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mashsharer-b4206097b7af70105fc04d8db27b43ec.yaml @@ -0,0 +1,58 @@ +id: mashsharer-b4206097b7af70105fc04d8db27b43ec + +info: + name: > + Social Media Share Buttons | MashShare < 2.3.1 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1af63f6-329e-40b6-b786-302c608ac577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mashsharer/" + google-query: inurl:"/wp-content/plugins/mashsharer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mashsharer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mashsharer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mashsharer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mashsharer-d7a376bac039b7fcdb01d011343f232a.yaml b/nuclei-templates/cve-less/plugins/mashsharer-d7a376bac039b7fcdb01d011343f232a.yaml new file mode 100644 index 0000000000..6a87008d1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mashsharer-d7a376bac039b7fcdb01d011343f232a.yaml @@ -0,0 +1,58 @@ +id: mashsharer-d7a376bac039b7fcdb01d011343f232a + +info: + name: > + Social Media Share Buttons <= 3.8.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95ba48b9-4a9c-47df-b05e-e670ae547810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mashsharer/" + google-query: inurl:"/wp-content/plugins/mashsharer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mashsharer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mashsharer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mashsharer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mass-delete-tags-cd31c4013d622ee5e8af44850bd1bbae.yaml b/nuclei-templates/cve-less/plugins/mass-delete-tags-cd31c4013d622ee5e8af44850bd1bbae.yaml new file mode 100644 index 0000000000..11030c7f70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mass-delete-tags-cd31c4013d622ee5e8af44850bd1bbae.yaml @@ -0,0 +1,58 @@ +id: mass-delete-tags-cd31c4013d622ee5e8af44850bd1bbae + +info: + name: > + Mass Delete Taxonomies <= 3.0.0 - Cross-Site Request Forgery via mp_plugin_mass_delete_tags_init + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce060989-ce70-49ac-921c-a687bc944090?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mass-delete-tags/" + google-query: inurl:"/wp-content/plugins/mass-delete-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mass-delete-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mass-delete-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mass-delete-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mass-delete-unused-tags-75516a4a673e70626d0531442a9c901c.yaml b/nuclei-templates/cve-less/plugins/mass-delete-unused-tags-75516a4a673e70626d0531442a9c901c.yaml new file mode 100644 index 0000000000..c086ccff47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mass-delete-unused-tags-75516a4a673e70626d0531442a9c901c.yaml @@ -0,0 +1,58 @@ +id: mass-delete-unused-tags-75516a4a673e70626d0531442a9c901c + +info: + name: > + Mass Delete Unused Tags <= 2.0.0 - Cross-Site Request Forgery via plugin_mass_delete_unused_tags_init + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abf4cfb9-745a-4b4f-8862-54ef561904d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mass-delete-unused-tags/" + google-query: inurl:"/wp-content/plugins/mass-delete-unused-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mass-delete-unused-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mass-delete-unused-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mass-delete-unused-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mass-email-to-users-317ac7f940ff6a7252e873e1a08b195c.yaml b/nuclei-templates/cve-less/plugins/mass-email-to-users-317ac7f940ff6a7252e873e1a08b195c.yaml new file mode 100644 index 0000000000..db2c2fe726 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mass-email-to-users-317ac7f940ff6a7252e873e1a08b195c.yaml @@ -0,0 +1,58 @@ +id: mass-email-to-users-317ac7f940ff6a7252e873e1a08b195c + +info: + name: > + Mass Email To users <= 1.1.4 - Unauthenticated Reflected Cross-Site Scripting via 'entrant' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f218010-8429-4a8a-b7f6-e45945a2a1ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mass-email-to-users/" + google-query: inurl:"/wp-content/plugins/mass-email-to-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mass-email-to-users,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mass-email-to-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mass-email-to-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mass-pagesposts-creator-5d3fabeb2abe10bffbf3f69299e86974.yaml b/nuclei-templates/cve-less/plugins/mass-pagesposts-creator-5d3fabeb2abe10bffbf3f69299e86974.yaml new file mode 100644 index 0000000000..1085cc7269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mass-pagesposts-creator-5d3fabeb2abe10bffbf3f69299e86974.yaml @@ -0,0 +1,58 @@ +id: mass-pagesposts-creator-5d3fabeb2abe10bffbf3f69299e86974 + +info: + name: > + Mass Pages/Posts Creator <= 1.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/966843d1-64c2-4f49-852c-d362714db823?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mass-pagesposts-creator/" + google-query: inurl:"/wp-content/plugins/mass-pagesposts-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mass-pagesposts-creator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mass-pagesposts-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mass-pagesposts-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mass-pagesposts-creator-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/mass-pagesposts-creator-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1fb5d066dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mass-pagesposts-creator-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: mass-pagesposts-creator-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mass-pagesposts-creator/" + google-query: inurl:"/wp-content/plugins/mass-pagesposts-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mass-pagesposts-creator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mass-pagesposts-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mass-pagesposts-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-addons-5ad76356f82ec882d88e003164818843.yaml b/nuclei-templates/cve-less/plugins/master-addons-5ad76356f82ec882d88e003164818843.yaml new file mode 100644 index 0000000000..5f858cf687 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-addons-5ad76356f82ec882d88e003164818843.yaml @@ -0,0 +1,58 @@ +id: master-addons-5ad76356f82ec882d88e003164818843 + +info: + name: > + Master Addons for Elementor <= 2.0.5.4.1 - Missing Authorization on Duplicate Post + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e5c3d74-1240-4501-856f-18a1c6369d1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-addons/" + google-query: inurl:"/wp-content/plugins/master-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-addons-5f2ebf4302880b4451790eb5366fdd55.yaml b/nuclei-templates/cve-less/plugins/master-addons-5f2ebf4302880b4451790eb5366fdd55.yaml new file mode 100644 index 0000000000..0204170ecf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-addons-5f2ebf4302880b4451790eb5366fdd55.yaml @@ -0,0 +1,58 @@ +id: master-addons-5f2ebf4302880b4451790eb5366fdd55 + +info: + name: > + Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor <= 2.0.5.9 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9a48769-94d9-459f-b34b-fdfe4c10b36c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-addons/" + google-query: inurl:"/wp-content/plugins/master-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-addons-8583fcd7447422df9f9725341fb87a81.yaml b/nuclei-templates/cve-less/plugins/master-addons-8583fcd7447422df9f9725341fb87a81.yaml new file mode 100644 index 0000000000..a732c74bae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-addons-8583fcd7447422df9f9725341fb87a81.yaml @@ -0,0 +1,58 @@ +id: master-addons-8583fcd7447422df9f9725341fb87a81 + +info: + name: > + Master Addons for Elementor <= 2.0.5.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6150c355-1046-483e-aa8b-463c3752021d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-addons/" + google-query: inurl:"/wp-content/plugins/master-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-addons-963646e7d7bb88af1ad24a0f5a61ee55.yaml b/nuclei-templates/cve-less/plugins/master-addons-963646e7d7bb88af1ad24a0f5a61ee55.yaml new file mode 100644 index 0000000000..b8e530e077 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-addons-963646e7d7bb88af1ad24a0f5a61ee55.yaml @@ -0,0 +1,58 @@ +id: master-addons-963646e7d7bb88af1ad24a0f5a61ee55 + +info: + name: > + Master Addons for Elementor <= 2.0.3 - Authenticated(Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abb7def7-df32-4901-b8ea-068ff1af664b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-addons/" + google-query: inurl:"/wp-content/plugins/master-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-addons-ab471e8dcd5ca84019365a59d356e23b.yaml b/nuclei-templates/cve-less/plugins/master-addons-ab471e8dcd5ca84019365a59d356e23b.yaml new file mode 100644 index 0000000000..2896341742 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-addons-ab471e8dcd5ca84019365a59d356e23b.yaml @@ -0,0 +1,58 @@ +id: master-addons-ab471e8dcd5ca84019365a59d356e23b + +info: + name: > + Master Addons for Elementor <= 1.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/680b2194-0c5e-4d5c-86d8-4c1e8de378d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-addons/" + google-query: inurl:"/wp-content/plugins/master-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/master-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e3ba288cbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: master-addons-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-addons/" + google-query: inurl:"/wp-content/plugins/master-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-addons-e068f616c0efa424554358743fa4c2b1.yaml b/nuclei-templates/cve-less/plugins/master-addons-e068f616c0efa424554358743fa4c2b1.yaml new file mode 100644 index 0000000000..4b2a87fa5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-addons-e068f616c0efa424554358743fa4c2b1.yaml @@ -0,0 +1,58 @@ +id: master-addons-e068f616c0efa424554358743fa4c2b1 + +info: + name: > + Master Addons for Elementor <= 2.0.5.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a362e60d-e4ab-4f19-9e18-5473d8e13d80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-addons/" + google-query: inurl:"/wp-content/plugins/master-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-addons-e3418f180f0cc9cfc471a66e2f29ee79.yaml b/nuclei-templates/cve-less/plugins/master-addons-e3418f180f0cc9cfc471a66e2f29ee79.yaml new file mode 100644 index 0000000000..0128dfff6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-addons-e3418f180f0cc9cfc471a66e2f29ee79.yaml @@ -0,0 +1,58 @@ +id: master-addons-e3418f180f0cc9cfc471a66e2f29ee79 + +info: + name: > + Master Addons for Elementor <= 2.0.5.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Pricing Table Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8910b6f0-1bf4-4ac0-93b7-54db7c15392c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-addons/" + google-query: inurl:"/wp-content/plugins/master-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/master-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c48421d2bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: master-blocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-blocks/" + google-query: inurl:"/wp-content/plugins/master-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/master-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..ff738bf931 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: master-blocks-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-blocks/" + google-query: inurl:"/wp-content/plugins/master-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-elements-2d24ccd35c9f49dd6df7abc0d20f88ce.yaml b/nuclei-templates/cve-less/plugins/master-elements-2d24ccd35c9f49dd6df7abc0d20f88ce.yaml new file mode 100644 index 0000000000..9e7a808376 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-elements-2d24ccd35c9f49dd6df7abc0d20f88ce.yaml @@ -0,0 +1,58 @@ +id: master-elements-2d24ccd35c9f49dd6df7abc0d20f88ce + +info: + name: > + Master Elements <= 8.0 - Unauthenticated SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36a7b681-6059-46a4-82a8-addfb8f452cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-elements/" + google-query: inurl:"/wp-content/plugins/master-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-elements,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-slider-1f1264fb01a80102a1939e77505f347e.yaml b/nuclei-templates/cve-less/plugins/master-slider-1f1264fb01a80102a1939e77505f347e.yaml new file mode 100644 index 0000000000..0f19ea8d7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-slider-1f1264fb01a80102a1939e77505f347e.yaml @@ -0,0 +1,58 @@ +id: master-slider-1f1264fb01a80102a1939e77505f347e + +info: + name: > + Master Slider <= 3.7.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5015cfe7-9e5c-4745-b6c3-60e4aa99672d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-slider/" + google-query: inurl:"/wp-content/plugins/master-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-slider-2278ff8679ddb3e8d29bcac77bb31452.yaml b/nuclei-templates/cve-less/plugins/master-slider-2278ff8679ddb3e8d29bcac77bb31452.yaml new file mode 100644 index 0000000000..67b7e2724a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-slider-2278ff8679ddb3e8d29bcac77bb31452.yaml @@ -0,0 +1,58 @@ +id: master-slider-2278ff8679ddb3e8d29bcac77bb31452 + +info: + name: > + Master Slider – Responsive Touch Slider <= 3.9.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af9adb6b-f726-4b74-be5c-82fdab0ae1f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-slider/" + google-query: inurl:"/wp-content/plugins/master-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-slider-37adca39d8686698946f55ba4e66fb39.yaml b/nuclei-templates/cve-less/plugins/master-slider-37adca39d8686698946f55ba4e66fb39.yaml new file mode 100644 index 0000000000..34e532929a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-slider-37adca39d8686698946f55ba4e66fb39.yaml @@ -0,0 +1,58 @@ +id: master-slider-37adca39d8686698946f55ba4e66fb39 + +info: + name: > + Master Slider - Responsive Touch Slider <= 3.9.9 - Cross-Site Request Forgery via process_bulk_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e0a7108-15ef-42d0-adce-fd5b0e6faf3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-slider/" + google-query: inurl:"/wp-content/plugins/master-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-slider-7ade56e168a75307ee8a4a01c082f207.yaml b/nuclei-templates/cve-less/plugins/master-slider-7ade56e168a75307ee8a4a01c082f207.yaml new file mode 100644 index 0000000000..c796349e19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-slider-7ade56e168a75307ee8a4a01c082f207.yaml @@ -0,0 +1,58 @@ +id: master-slider-7ade56e168a75307ee8a4a01c082f207 + +info: + name: > + Master Slider <= 3.9.5 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1b93229-55ef-4216-8d48-35e8b6506c19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-slider/" + google-query: inurl:"/wp-content/plugins/master-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-slider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-slider-af6803b7659222cbe48ed01e4976d1d1.yaml b/nuclei-templates/cve-less/plugins/master-slider-af6803b7659222cbe48ed01e4976d1d1.yaml new file mode 100644 index 0000000000..819a1a9de9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-slider-af6803b7659222cbe48ed01e4976d1d1.yaml @@ -0,0 +1,58 @@ +id: master-slider-af6803b7659222cbe48ed01e4976d1d1 + +info: + name: > + Master Slider – Responsive Touch Slider <= 3.9.9 - Authenticated(Editor+) Stored Cross-Site Scripting via slider callback + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac6e587c-59b2-4f93-ab88-5e548b52db45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-slider/" + google-query: inurl:"/wp-content/plugins/master-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-slider-b6500312e7eff76638bb1a536f1d8f8c.yaml b/nuclei-templates/cve-less/plugins/master-slider-b6500312e7eff76638bb1a536f1d8f8c.yaml new file mode 100644 index 0000000000..43b864c13c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-slider-b6500312e7eff76638bb1a536f1d8f8c.yaml @@ -0,0 +1,58 @@ +id: master-slider-b6500312e7eff76638bb1a536f1d8f8c + +info: + name: > + Master Slider <= 2.7.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8a316f-a9ad-451a-9892-cf5068072a78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-slider/" + google-query: inurl:"/wp-content/plugins/master-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-slider-ec15f998366a90597f3ae6005cf6d8b3.yaml b/nuclei-templates/cve-less/plugins/master-slider-ec15f998366a90597f3ae6005cf6d8b3.yaml new file mode 100644 index 0000000000..5ecf7adeb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-slider-ec15f998366a90597f3ae6005cf6d8b3.yaml @@ -0,0 +1,58 @@ +id: master-slider-ec15f998366a90597f3ae6005cf6d8b3 + +info: + name: > + Master Slider - Responsive Touch Slider <= 2.5.1 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9391474f-8cf8-4e8b-b3e6-39b397b7b6b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-slider/" + google-query: inurl:"/wp-content/plugins/master-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/master-slider-f99c7ac14f9b6aff3ca4eaa0306e77ee.yaml b/nuclei-templates/cve-less/plugins/master-slider-f99c7ac14f9b6aff3ca4eaa0306e77ee.yaml new file mode 100644 index 0000000000..f6be1b2dc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/master-slider-f99c7ac14f9b6aff3ca4eaa0306e77ee.yaml @@ -0,0 +1,58 @@ +id: master-slider-f99c7ac14f9b6aff3ca4eaa0306e77ee + +info: + name: > + Master Slider – Responsive Touch Slider <= 3.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc4d09e3-487a-4f12-818a-72ae9a6f33c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/master-slider/" + google-query: inurl:"/wp-content/plugins/master-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,master-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/master-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "master-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterslider-0cbc0458d9514fd3618b0ed89f2d3c18.yaml b/nuclei-templates/cve-less/plugins/masterslider-0cbc0458d9514fd3618b0ed89f2d3c18.yaml new file mode 100644 index 0000000000..75ac034ec2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterslider-0cbc0458d9514fd3618b0ed89f2d3c18.yaml @@ -0,0 +1,58 @@ +id: masterslider-0cbc0458d9514fd3618b0ed89f2d3c18 + +info: + name: > + Master Slider Pro <= 3.6.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f77755a-9b28-4e31-8a01-42e96b5698bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterslider/" + google-query: inurl:"/wp-content/plugins/masterslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterslider-5c92085932752374a04afe791196ed34.yaml b/nuclei-templates/cve-less/plugins/masterslider-5c92085932752374a04afe791196ed34.yaml new file mode 100644 index 0000000000..728781d2fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterslider-5c92085932752374a04afe791196ed34.yaml @@ -0,0 +1,58 @@ +id: masterslider-5c92085932752374a04afe791196ed34 + +info: + name: > + Master Slider Pro <= 3.6.5 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66749606-e76f-41fb-bcf1-c06681de2ee3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterslider/" + google-query: inurl:"/wp-content/plugins/masterslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterslider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterslider-624a2aa57869ce0516a56db0d2b7ba1e.yaml b/nuclei-templates/cve-less/plugins/masterslider-624a2aa57869ce0516a56db0d2b7ba1e.yaml new file mode 100644 index 0000000000..40bb99fd6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterslider-624a2aa57869ce0516a56db0d2b7ba1e.yaml @@ -0,0 +1,58 @@ +id: masterslider-624a2aa57869ce0516a56db0d2b7ba1e + +info: + name: > + Master Slider Pro <= 3.6.5 - Authenticated (Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a69a5249-f9ab-4489-a032-33dd482fdc96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterslider/" + google-query: inurl:"/wp-content/plugins/masterslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-0f202e755d7e2e49728e189143faa82e.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-0f202e755d7e2e49728e189143faa82e.yaml new file mode 100644 index 0000000000..584402909e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-0f202e755d7e2e49728e189143faa82e.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-0f202e755d7e2e49728e189143faa82e + +info: + name: > + MasterStudy LMS WordPress Plugin – for Online Courses and Education <= 3.2.10 - Basic Information Exposure via REST route + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27e4d519-bc98-44d3-a519-72674184e7f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-16f3aadbc51503db1bc43aad84f72646.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-16f3aadbc51503db1bc43aad84f72646.yaml new file mode 100644 index 0000000000..bfde0d41c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-16f3aadbc51503db1bc43aad84f72646.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-16f3aadbc51503db1bc43aad84f72646 + +info: + name: > + MasterStudy LMS < 2.7.6 - Unauthenticated Admin Account Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18fd631d-9e9b-46ee-953f-61ad3458e1dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-296c49b1bc6f342e92d02be77b2dbe14.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-296c49b1bc6f342e92d02be77b2dbe14.yaml new file mode 100644 index 0000000000..f9ef3905a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-296c49b1bc6f342e92d02be77b2dbe14.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-296c49b1bc6f342e92d02be77b2dbe14 + +info: + name: > + MasterStudy LMS WordPress Plugin <= 2.9.34 - Missing Authorization via wp_ajax_stm_wpcfto_get_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ddcd2eb-fd7a-48b7-b9ea-3632d49e9734?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-44e1f2ffb01f5ea3ea36f27a7c236058.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-44e1f2ffb01f5ea3ea36f27a7c236058.yaml new file mode 100644 index 0000000000..a347221109 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-44e1f2ffb01f5ea3ea36f27a7c236058.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-44e1f2ffb01f5ea3ea36f27a7c236058 + +info: + name: > + MasterStudy LMS WordPress Plugin – for Online Courses and Education <= 3.3.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64eb3d67-7056-4a03-ba3b-a04c2e96648d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-4f9f0369d878a015f409ab24ea975cbb.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-4f9f0369d878a015f409ab24ea975cbb.yaml new file mode 100644 index 0000000000..c319c747ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-4f9f0369d878a015f409ab24ea975cbb.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-4f9f0369d878a015f409ab24ea975cbb + +info: + name: > + MasterStudy LMS <= 3.3.0 - Unauthenticated Local File Inclusion via modal + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d68a2b60-ee89-4231-b256-214eba418244?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-55dfb8067a9d9a28485a43b25b96a7c4.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-55dfb8067a9d9a28485a43b25b96a7c4.yaml new file mode 100644 index 0000000000..0942e7edde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-55dfb8067a9d9a28485a43b25b96a7c4.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-55dfb8067a9d9a28485a43b25b96a7c4 + +info: + name: > + MasterStudy LMS <= 3.2.13 - Missing Authorization to Sensitive Information Exposure in search_posts + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1be686d3-16b1-4ec7-b304-848ca4d7162c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-5a1407576dc4eee8a15af816c107132f.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-5a1407576dc4eee8a15af816c107132f.yaml new file mode 100644 index 0000000000..0a2a72ae01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-5a1407576dc4eee8a15af816c107132f.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-5a1407576dc4eee8a15af816c107132f + +info: + name: > + MasterStudy LMS <= 3.3.1 - Unauthenticated Privilege Escalation via stm_lms_register AJAX Action + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94736152-b365-4b3a-a786-ed49f7d0fc7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-99f4448a717d374af03d744cdc0eb9ad.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-99f4448a717d374af03d744cdc0eb9ad.yaml new file mode 100644 index 0000000000..b4c7c22933 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-99f4448a717d374af03d744cdc0eb9ad.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-99f4448a717d374af03d744cdc0eb9ad + +info: + name: > + MasterStudy LMS <= 3.0.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/174e2bf3-2531-4a53-ade6-3df7e976ed29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-9ab9e985d63e7f8faa4ebcb1df0816d3.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-9ab9e985d63e7f8faa4ebcb1df0816d3.yaml new file mode 100644 index 0000000000..9d32a6cdf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-9ab9e985d63e7f8faa4ebcb1df0816d3.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-9ab9e985d63e7f8faa4ebcb1df0816d3 + +info: + name: > + MasterStudy LMS WordPress Plugin – for Online Courses and Education <= 3.2.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6b6d824-51d3-4da9-a39a-b957368df4dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-af86ce237a4bf58d93744674227f4830.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-af86ce237a4bf58d93744674227f4830.yaml new file mode 100644 index 0000000000..dc808d76fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-af86ce237a4bf58d93744674227f4830.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-af86ce237a4bf58d93744674227f4830 + +info: + name: > + MasterStudy LMS <= 3.3.3 - Unauthenticated Local File Inclusion via template + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a573740-cdfe-4b58-b33b-5e50bcbc4779?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-bf3837a16a33f16813a6b85f5185aa0d.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-bf3837a16a33f16813a6b85f5185aa0d.yaml new file mode 100644 index 0000000000..b69ce430e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-bf3837a16a33f16813a6b85f5185aa0d.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-bf3837a16a33f16813a6b85f5185aa0d + +info: + name: > + MasterStudy LMS <= 3.0.17 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df00c8bc-8acd-4197-86fe-b88cb47d52c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-f9e11f76930ee22e20526313ed9f389b.yaml b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-f9e11f76930ee22e20526313ed9f389b.yaml new file mode 100644 index 0000000000..ab076d411b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/masterstudy-lms-learning-management-system-f9e11f76930ee22e20526313ed9f389b.yaml @@ -0,0 +1,58 @@ +id: masterstudy-lms-learning-management-system-f9e11f76930ee22e20526313ed9f389b + +info: + name: > + MasterStudy LMS <= 3.0.8 - Missing Authorization to Course Category Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/417ae2f2-e245-49bb-8b77-0eabf6095459?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/masterstudy-lms-learning-management-system/" + google-query: inurl:"/wp-content/plugins/masterstudy-lms-learning-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,masterstudy-lms-learning-management-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/masterstudy-lms-learning-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "masterstudy-lms-learning-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/material-design-for-contact-form-7-2c15d4e93f6f6d616a273e49657a41e3.yaml b/nuclei-templates/cve-less/plugins/material-design-for-contact-form-7-2c15d4e93f6f6d616a273e49657a41e3.yaml new file mode 100644 index 0000000000..de8b36c237 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/material-design-for-contact-form-7-2c15d4e93f6f6d616a273e49657a41e3.yaml @@ -0,0 +1,58 @@ +id: material-design-for-contact-form-7-2c15d4e93f6f6d616a273e49657a41e3 + +info: + name: > + Material Design for Contact Form 7 <= 2.6.4 - Missing Authorization to Arbitrary Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/962f31e6-7863-45e1-835e-c679046deeea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/material-design-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/material-design-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,material-design-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/material-design-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "material-design-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/material-design-icons-for-elementor-639d631ea2d71e82d52ba35e11baa85c.yaml b/nuclei-templates/cve-less/plugins/material-design-icons-for-elementor-639d631ea2d71e82d52ba35e11baa85c.yaml new file mode 100644 index 0000000000..ca2a66507f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/material-design-icons-for-elementor-639d631ea2d71e82d52ba35e11baa85c.yaml @@ -0,0 +1,58 @@ +id: material-design-icons-for-elementor-639d631ea2d71e82d52ba35e11baa85c + +info: + name: > + Material Design Icons for Page Builders <= 1.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2075960-fde4-4ca9-a000-23fdd6d5de1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/material-design-icons-for-elementor/" + google-query: inurl:"/wp-content/plugins/material-design-icons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,material-design-icons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/material-design-icons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "material-design-icons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/material-design-icons-for-elementor-eab3c1f0807691261d40289ccf106a32.yaml b/nuclei-templates/cve-less/plugins/material-design-icons-for-elementor-eab3c1f0807691261d40289ccf106a32.yaml new file mode 100644 index 0000000000..1d3be48f9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/material-design-icons-for-elementor-eab3c1f0807691261d40289ccf106a32.yaml @@ -0,0 +1,58 @@ +id: material-design-icons-for-elementor-eab3c1f0807691261d40289ccf106a32 + +info: + name: > + Material Design Icons for Page Builders <= 1.4.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2482ef4b-697a-45a0-b45e-85b2af5b4735?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/material-design-icons-for-elementor/" + google-query: inurl:"/wp-content/plugins/material-design-icons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,material-design-icons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/material-design-icons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "material-design-icons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/materialis-companion-41bbba0b761effafe973f064cede1988.yaml b/nuclei-templates/cve-less/plugins/materialis-companion-41bbba0b761effafe973f064cede1988.yaml new file mode 100644 index 0000000000..937137e051 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/materialis-companion-41bbba0b761effafe973f064cede1988.yaml @@ -0,0 +1,58 @@ +id: materialis-companion-41bbba0b761effafe973f064cede1988 + +info: + name: > + Materialis Companion <= 1.3.39 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8f94588-635c-44b2-bd7e-af3068734713?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/materialis-companion/" + google-query: inurl:"/wp-content/plugins/materialis-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,materialis-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/materialis-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "materialis-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/math-comment-spam-protection-2c787e56b33949d16c5a8fc8e49284cd.yaml b/nuclei-templates/cve-less/plugins/math-comment-spam-protection-2c787e56b33949d16c5a8fc8e49284cd.yaml new file mode 100644 index 0000000000..0018cf239c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/math-comment-spam-protection-2c787e56b33949d16c5a8fc8e49284cd.yaml @@ -0,0 +1,58 @@ +id: math-comment-spam-protection-2c787e56b33949d16c5a8fc8e49284cd + +info: + name: > + Math Comment Spam Protection <= 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00fbbd00-c98e-41b3-9777-3a0d1295c24b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/math-comment-spam-protection/" + google-query: inurl:"/wp-content/plugins/math-comment-spam-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,math-comment-spam-protection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/math-comment-spam-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "math-comment-spam-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/math-comment-spam-protection-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml b/nuclei-templates/cve-less/plugins/math-comment-spam-protection-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml new file mode 100644 index 0000000000..267660f2da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/math-comment-spam-protection-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml @@ -0,0 +1,58 @@ +id: math-comment-spam-protection-3f5c9085cc5ea3fa80320bca3cc4e85b + +info: + name: > + Math Comment Spam Protection <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a9e958f-e53b-4aa0-b7d6-7469852f0d97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/math-comment-spam-protection/" + google-query: inurl:"/wp-content/plugins/math-comment-spam-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,math-comment-spam-protection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/math-comment-spam-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "math-comment-spam-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mathjax-latex-c72bfd99ca891cab28a20713d4d5fa8e.yaml b/nuclei-templates/cve-less/plugins/mathjax-latex-c72bfd99ca891cab28a20713d4d5fa8e.yaml new file mode 100644 index 0000000000..7ddcea5ce2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mathjax-latex-c72bfd99ca891cab28a20713d4d5fa8e.yaml @@ -0,0 +1,58 @@ +id: mathjax-latex-c72bfd99ca891cab28a20713d4d5fa8e + +info: + name: > + MathJax-LaTeX < 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10c1402d-613d-4d72-b488-c0af2bee4d59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mathjax-latex/" + google-query: inurl:"/wp-content/plugins/mathjax-latex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mathjax-latex,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mathjax-latex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mathjax-latex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/matomo-3df1b6184a3059e9fa9458d9fe22e2e2.yaml b/nuclei-templates/cve-less/plugins/matomo-3df1b6184a3059e9fa9458d9fe22e2e2.yaml new file mode 100644 index 0000000000..15add190b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/matomo-3df1b6184a3059e9fa9458d9fe22e2e2.yaml @@ -0,0 +1,58 @@ +id: matomo-3df1b6184a3059e9fa9458d9fe22e2e2 + +info: + name: > + Matomo <= 4.15.3 - Reflected Cross-Site Scripting via idsite + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e2d54eb-c176-49c4-a4fc-833e17189cad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/matomo/" + google-query: inurl:"/wp-content/plugins/matomo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,matomo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/matomo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "matomo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/matrix-image-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/matrix-image-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..904cab080b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/matrix-image-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: matrix-image-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/matrix-image-gallery/" + google-query: inurl:"/wp-content/plugins/matrix-image-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,matrix-image-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/matrix-image-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "matrix-image-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/matrix-pre-loader-7eefbdb00f6e0dd3aa9ee384b653f5e3.yaml b/nuclei-templates/cve-less/plugins/matrix-pre-loader-7eefbdb00f6e0dd3aa9ee384b653f5e3.yaml new file mode 100644 index 0000000000..e237f53fd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/matrix-pre-loader-7eefbdb00f6e0dd3aa9ee384b653f5e3.yaml @@ -0,0 +1,58 @@ +id: matrix-pre-loader-7eefbdb00f6e0dd3aa9ee384b653f5e3 + +info: + name: > + Preloader Matrix <= 2.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97548879-f015-4adc-8a84-535d210ae0de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/matrix-pre-loader/" + google-query: inurl:"/wp-content/plugins/matrix-pre-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,matrix-pre-loader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/matrix-pre-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "matrix-pre-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mautic-integration-for-woocommerce-af46d9a5be7a2ee874bad5ee679a36f8.yaml b/nuclei-templates/cve-less/plugins/mautic-integration-for-woocommerce-af46d9a5be7a2ee874bad5ee679a36f8.yaml new file mode 100644 index 0000000000..a691e75bef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mautic-integration-for-woocommerce-af46d9a5be7a2ee874bad5ee679a36f8.yaml @@ -0,0 +1,58 @@ +id: mautic-integration-for-woocommerce-af46d9a5be7a2ee874bad5ee679a36f8 + +info: + name: > + Mautic Integration for WooCommerce < 1.0.3 - Cross-Site Request Forgery leading to Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a922bf72-192e-457f-9c33-59835e9aff2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mautic-integration-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/mautic-integration-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mautic-integration-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mautic-integration-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mautic-integration-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/max-addons-pro-bricks-7793772eece0aff14b3b4690844c3621.yaml b/nuclei-templates/cve-less/plugins/max-addons-pro-bricks-7793772eece0aff14b3b4690844c3621.yaml new file mode 100644 index 0000000000..4fa99e1f34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/max-addons-pro-bricks-7793772eece0aff14b3b4690844c3621.yaml @@ -0,0 +1,58 @@ +id: max-addons-pro-bricks-7793772eece0aff14b3b4690844c3621 + +info: + name: > + Max Addons Pro for Bricks <= 1.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01cce0b2-b43c-4b79-89a0-c1842cab1edc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/max-addons-pro-bricks/" + google-query: inurl:"/wp-content/plugins/max-addons-pro-bricks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,max-addons-pro-bricks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/max-addons-pro-bricks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "max-addons-pro-bricks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/max-addons-pro-bricks-cb8a70925c9490ee47d5d493a807b6ac.yaml b/nuclei-templates/cve-less/plugins/max-addons-pro-bricks-cb8a70925c9490ee47d5d493a807b6ac.yaml new file mode 100644 index 0000000000..fbb8b99a8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/max-addons-pro-bricks-cb8a70925c9490ee47d5d493a807b6ac.yaml @@ -0,0 +1,58 @@ +id: max-addons-pro-bricks-cb8a70925c9490ee47d5d493a807b6ac + +info: + name: > + Max Addons Pro for Bricks <= 1.6.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ac22e56-5d52-48f0-8bd1-8584c2b40bb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/max-addons-pro-bricks/" + google-query: inurl:"/wp-content/plugins/max-addons-pro-bricks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,max-addons-pro-bricks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/max-addons-pro-bricks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "max-addons-pro-bricks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxbuttons-1cc06f74e3aed2807f1fd2894b6227eb.yaml b/nuclei-templates/cve-less/plugins/maxbuttons-1cc06f74e3aed2807f1fd2894b6227eb.yaml new file mode 100644 index 0000000000..920cf073ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxbuttons-1cc06f74e3aed2807f1fd2894b6227eb.yaml @@ -0,0 +1,58 @@ +id: maxbuttons-1cc06f74e3aed2807f1fd2894b6227eb + +info: + name: > + MaxButtons - < 1.26.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25f8b0db-eed2-468a-a6b3-ed93daaddcb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxbuttons/" + google-query: inurl:"/wp-content/plugins/maxbuttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxbuttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxbuttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxbuttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxbuttons-2cfa41593b5c54dbbe7f94408a704c8b.yaml b/nuclei-templates/cve-less/plugins/maxbuttons-2cfa41593b5c54dbbe7f94408a704c8b.yaml new file mode 100644 index 0000000000..2ecc28bc74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxbuttons-2cfa41593b5c54dbbe7f94408a704c8b.yaml @@ -0,0 +1,58 @@ +id: maxbuttons-2cfa41593b5c54dbbe7f94408a704c8b + +info: + name: > + MaxButtons <= 9.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8eaf6dfd-bc66-466f-af80-213213fdb839?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxbuttons/" + google-query: inurl:"/wp-content/plugins/maxbuttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxbuttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxbuttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxbuttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxbuttons-3394a8c6bca4050b8fcb857b11ee3b36.yaml b/nuclei-templates/cve-less/plugins/maxbuttons-3394a8c6bca4050b8fcb857b11ee3b36.yaml new file mode 100644 index 0000000000..b08b22a5ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxbuttons-3394a8c6bca4050b8fcb857b11ee3b36.yaml @@ -0,0 +1,58 @@ +id: maxbuttons-3394a8c6bca4050b8fcb857b11ee3b36 + +info: + name: > + WordPress Button Plugin MaxButtons <= 9.7.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfe2cabd-98f6-4ebc-8a02-e6951202aa88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxbuttons/" + google-query: inurl:"/wp-content/plugins/maxbuttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxbuttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxbuttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxbuttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxbuttons-47fd93f8dbf38d292961db96282356d5.yaml b/nuclei-templates/cve-less/plugins/maxbuttons-47fd93f8dbf38d292961db96282356d5.yaml new file mode 100644 index 0000000000..61442f1a64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxbuttons-47fd93f8dbf38d292961db96282356d5.yaml @@ -0,0 +1,58 @@ +id: maxbuttons-47fd93f8dbf38d292961db96282356d5 + +info: + name: > + WordPress Button Plugin MaxButtons <= 9.2 - Shortcode-Based Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41f6e826-9326-40fa-80d0-4cff1dd72536?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxbuttons/" + google-query: inurl:"/wp-content/plugins/maxbuttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxbuttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxbuttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxbuttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxbuttons-5e63735b86336209453cce97844f636d.yaml b/nuclei-templates/cve-less/plugins/maxbuttons-5e63735b86336209453cce97844f636d.yaml new file mode 100644 index 0000000000..599e2daafd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxbuttons-5e63735b86336209453cce97844f636d.yaml @@ -0,0 +1,58 @@ +id: maxbuttons-5e63735b86336209453cce97844f636d + +info: + name: > + MaxButtons <= 9.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af478e73-a2b8-468a-9075-9c1db1a97d7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxbuttons/" + google-query: inurl:"/wp-content/plugins/maxbuttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxbuttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxbuttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxbuttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxbuttons-6576cec6cc72bf932987474c7e82dbd1.yaml b/nuclei-templates/cve-less/plugins/maxbuttons-6576cec6cc72bf932987474c7e82dbd1.yaml new file mode 100644 index 0000000000..3b8672fdd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxbuttons-6576cec6cc72bf932987474c7e82dbd1.yaml @@ -0,0 +1,58 @@ +id: maxbuttons-6576cec6cc72bf932987474c7e82dbd1 + +info: + name: > + WordPress Button Plugin MaxButtons <= 9.7.6 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bca0e8a0-d837-42d8-a9d3-35e0c820eb43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxbuttons/" + google-query: inurl:"/wp-content/plugins/maxbuttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxbuttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxbuttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxbuttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxbuttons-791eff0c2052bc2e9edb50c4e621f28e.yaml b/nuclei-templates/cve-less/plugins/maxbuttons-791eff0c2052bc2e9edb50c4e621f28e.yaml new file mode 100644 index 0000000000..9ae5f10bb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxbuttons-791eff0c2052bc2e9edb50c4e621f28e.yaml @@ -0,0 +1,58 @@ +id: maxbuttons-791eff0c2052bc2e9edb50c4e621f28e + +info: + name: > + MaxButtons <= 6.18 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efa01956-7c03-4f0f-9054-6920013a2b32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxbuttons/" + google-query: inurl:"/wp-content/plugins/maxbuttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxbuttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxbuttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxbuttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxbuttons-b87b09efd2ae58c86dc8e5fdf3e23221.yaml b/nuclei-templates/cve-less/plugins/maxbuttons-b87b09efd2ae58c86dc8e5fdf3e23221.yaml new file mode 100644 index 0000000000..c47127f428 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxbuttons-b87b09efd2ae58c86dc8e5fdf3e23221.yaml @@ -0,0 +1,58 @@ +id: maxbuttons-b87b09efd2ae58c86dc8e5fdf3e23221 + +info: + name: > + WordPress Button Plugin MaxButtons <= 9.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74f4068b-224e-4523-9a8d-8713b779a262?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxbuttons/" + google-query: inurl:"/wp-content/plugins/maxbuttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxbuttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxbuttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxbuttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxgalleria-4d573fe9c428ad3a04750d4555eab402.yaml b/nuclei-templates/cve-less/plugins/maxgalleria-4d573fe9c428ad3a04750d4555eab402.yaml new file mode 100644 index 0000000000..875efb1b18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxgalleria-4d573fe9c428ad3a04750d4555eab402.yaml @@ -0,0 +1,58 @@ +id: maxgalleria-4d573fe9c428ad3a04750d4555eab402 + +info: + name: > + MaxGalleria <= 6.4.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0629798c-ede2-43ac-9ec4-2cd99cd34ae2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxgalleria/" + google-query: inurl:"/wp-content/plugins/maxgalleria/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxgalleria,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxgalleria/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxgalleria" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maxgalleria-e066c5d256834fe1f65bdb778f74e19e.yaml b/nuclei-templates/cve-less/plugins/maxgalleria-e066c5d256834fe1f65bdb778f74e19e.yaml new file mode 100644 index 0000000000..008a283b1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maxgalleria-e066c5d256834fe1f65bdb778f74e19e.yaml @@ -0,0 +1,58 @@ +id: maxgalleria-e066c5d256834fe1f65bdb778f74e19e + +info: + name: > + MaxGalleria <= 6.2.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e404d689-f0b5-43cc-b366-b7d6a44a9dcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maxgalleria/" + google-query: inurl:"/wp-content/plugins/maxgalleria/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maxgalleria,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maxgalleria/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maxgalleria" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maz-loader-3e1b73d443d99821d0af1b91c016f547.yaml b/nuclei-templates/cve-less/plugins/maz-loader-3e1b73d443d99821d0af1b91c016f547.yaml new file mode 100644 index 0000000000..b2bbdeb2f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maz-loader-3e1b73d443d99821d0af1b91c016f547.yaml @@ -0,0 +1,58 @@ +id: maz-loader-3e1b73d443d99821d0af1b91c016f547 + +info: + name: > + MAZ Loader – Preloader Builder for WordPress <= 1.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a580a7a-d477-47ba-a7c1-21d7312c53ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maz-loader/" + google-query: inurl:"/wp-content/plugins/maz-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maz-loader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maz-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maz-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/maz-loader-ccaa11bd28c41ea215a8627a09fdb85f.yaml b/nuclei-templates/cve-less/plugins/maz-loader-ccaa11bd28c41ea215a8627a09fdb85f.yaml new file mode 100644 index 0000000000..8d714a6700 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/maz-loader-ccaa11bd28c41ea215a8627a09fdb85f.yaml @@ -0,0 +1,58 @@ +id: maz-loader-ccaa11bd28c41ea215a8627a09fdb85f + +info: + name: > + MAZ Loader – Preloader Builder for WordPress <= 1.3.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44c5a1cd-aac2-4c44-8aaa-9b5fdafad133?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/maz-loader/" + google-query: inurl:"/wp-content/plugins/maz-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,maz-loader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/maz-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "maz-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mdc-private-message-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml b/nuclei-templates/cve-less/plugins/mdc-private-message-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml new file mode 100644 index 0000000000..4fdf3a52cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mdc-private-message-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml @@ -0,0 +1,58 @@ +id: mdc-private-message-6ffded2a3fa64429e9ee95b7a8bf44d5 + +info: + name: > + MDC Private Message <= 1.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ce635f1-3798-4ca2-b4cf-ea183a1e1d79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mdc-private-message/" + google-query: inurl:"/wp-content/plugins/mdc-private-message/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mdc-private-message,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mdc-private-message/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mdc-private-message" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mdc-youtube-downloader-a6d6119e6304bac68d182070bb782f60.yaml b/nuclei-templates/cve-less/plugins/mdc-youtube-downloader-a6d6119e6304bac68d182070bb782f60.yaml new file mode 100644 index 0000000000..80e7d41688 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mdc-youtube-downloader-a6d6119e6304bac68d182070bb782f60.yaml @@ -0,0 +1,58 @@ +id: mdc-youtube-downloader-a6d6119e6304bac68d182070bb782f60 + +info: + name: > + MDC YouTube Downloader < 2.1.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/793e650c-27f7-4eff-9922-8e01ba24e96d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mdc-youtube-downloader/" + google-query: inurl:"/wp-content/plugins/mdc-youtube-downloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mdc-youtube-downloader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mdc-youtube-downloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mdc-youtube-downloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-alt-renamer-7678a4c43bf3743b099ecbdc547aa500.yaml b/nuclei-templates/cve-less/plugins/media-alt-renamer-7678a4c43bf3743b099ecbdc547aa500.yaml new file mode 100644 index 0000000000..2f629d6d9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-alt-renamer-7678a4c43bf3743b099ecbdc547aa500.yaml @@ -0,0 +1,58 @@ +id: media-alt-renamer-7678a4c43bf3743b099ecbdc547aa500 + +info: + name: > + Media Alt Renamer 0.0.1 - Authenticated (Author+) Stored Cross-Site Scripting via _wp_attachment_image_alt postmeta + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7826a6ab-50c4-4fc0-b58d-74084172b4e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-alt-renamer/" + google-query: inurl:"/wp-content/plugins/media-alt-renamer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-alt-renamer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-alt-renamer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-alt-renamer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-cleaner-f41915eaa49875fc0d02563613a044ce.yaml b/nuclei-templates/cve-less/plugins/media-cleaner-f41915eaa49875fc0d02563613a044ce.yaml new file mode 100644 index 0000000000..f742fce2fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-cleaner-f41915eaa49875fc0d02563613a044ce.yaml @@ -0,0 +1,58 @@ +id: media-cleaner-f41915eaa49875fc0d02563613a044ce + +info: + name: > + Media Cleaner: Clean your WordPress! <= 6.7.2 - Unauthenticated Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a8ee823-74f2-4cab-99a1-f2f613929b44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-cleaner/" + google-query: inurl:"/wp-content/plugins/media-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-cleaner,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-download-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/media-download-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9a955c9647 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-download-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: media-download-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-download/" + google-query: inurl:"/wp-content/plugins/media-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-download,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-downloader-385ab086e084dcab7761c5868fab9464.yaml b/nuclei-templates/cve-less/plugins/media-downloader-385ab086e084dcab7761c5868fab9464.yaml new file mode 100644 index 0000000000..3f24d2b772 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-downloader-385ab086e084dcab7761c5868fab9464.yaml @@ -0,0 +1,58 @@ +id: media-downloader-385ab086e084dcab7761c5868fab9464 + +info: + name: > + Media Downloader <= 0.1.992 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d2dd5e4-558b-44fe-a47c-fb2b5639f39c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-downloader/" + google-query: inurl:"/wp-content/plugins/media-downloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-downloader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-downloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-downloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.992') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-element-html5-video-and-audio-player-6833c69669f3b6c1ff537772ca9a9c7f.yaml b/nuclei-templates/cve-less/plugins/media-element-html5-video-and-audio-player-6833c69669f3b6c1ff537772ca9a9c7f.yaml new file mode 100644 index 0000000000..892e08f13a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-element-html5-video-and-audio-player-6833c69669f3b6c1ff537772ca9a9c7f.yaml @@ -0,0 +1,58 @@ +id: media-element-html5-video-and-audio-player-6833c69669f3b6c1ff537772ca9a9c7f + +info: + name: > + MediaElement.js – HTML5 Video & Audio Player <= 4.2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82253cd8-e9ff-4f3d-8844-c270dae445a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-element-html5-video-and-audio-player/" + google-query: inurl:"/wp-content/plugins/media-element-html5-video-and-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-element-html5-video-and-audio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-element-html5-video-and-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-element-html5-video-and-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-manager-0096aa18a8e24a189b34368fe050792b.yaml b/nuclei-templates/cve-less/plugins/media-file-manager-0096aa18a8e24a189b34368fe050792b.yaml new file mode 100644 index 0000000000..bd873396de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-manager-0096aa18a8e24a189b34368fe050792b.yaml @@ -0,0 +1,58 @@ +id: media-file-manager-0096aa18a8e24a189b34368fe050792b + +info: + name: > + Media File Manager <= 1.4.2 - Directory Traversal to Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05529ca0-09f5-4047-9972-c0a2872ea857?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-manager/" + google-query: inurl:"/wp-content/plugins/media-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-manager-54b9a63aa780af450d6501f70863fee9.yaml b/nuclei-templates/cve-less/plugins/media-file-manager-54b9a63aa780af450d6501f70863fee9.yaml new file mode 100644 index 0000000000..df2082ae4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-manager-54b9a63aa780af450d6501f70863fee9.yaml @@ -0,0 +1,58 @@ +id: media-file-manager-54b9a63aa780af450d6501f70863fee9 + +info: + name: > + Media File Manager <= 1.4.2 - Directory Traversal to Arbitrary File Relocation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c52a8b78-39bd-473b-ad78-377c31453f4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-manager/" + google-query: inurl:"/wp-content/plugins/media-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-manager-9116ab86d599e20ae25aa3123513f61a.yaml b/nuclei-templates/cve-less/plugins/media-file-manager-9116ab86d599e20ae25aa3123513f61a.yaml new file mode 100644 index 0000000000..954ca2764f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-manager-9116ab86d599e20ae25aa3123513f61a.yaml @@ -0,0 +1,58 @@ +id: media-file-manager-9116ab86d599e20ae25aa3123513f61a + +info: + name: > + Media File Manager <= 1.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb2b1f9-fd76-440e-a64c-ff11622efec1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-manager/" + google-query: inurl:"/wp-content/plugins/media-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-manager-advanced-4c943f748aca793575933803bba5acc5.yaml b/nuclei-templates/cve-less/plugins/media-file-manager-advanced-4c943f748aca793575933803bba5acc5.yaml new file mode 100644 index 0000000000..2eae3a3d88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-manager-advanced-4c943f748aca793575933803bba5acc5.yaml @@ -0,0 +1,58 @@ +id: media-file-manager-advanced-4c943f748aca793575933803bba5acc5 + +info: + name: > + Media File Manager Advanced <= 1.1.5 - Improper Access Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4e6e410-5778-41f7-a259-daa506bfb161?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-manager-advanced/" + google-query: inurl:"/wp-content/plugins/media-file-manager-advanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-manager-advanced,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-manager-advanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-manager-advanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-manager-bf399dd02aeab6e8c35f662b2b5169e5.yaml b/nuclei-templates/cve-less/plugins/media-file-manager-bf399dd02aeab6e8c35f662b2b5169e5.yaml new file mode 100644 index 0000000000..5f7b5cfda9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-manager-bf399dd02aeab6e8c35f662b2b5169e5.yaml @@ -0,0 +1,58 @@ +id: media-file-manager-bf399dd02aeab6e8c35f662b2b5169e5 + +info: + name: > + Media File Manager <= 1.4.2 - Directory Traversal to Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37aedfb3-bc98-4a8f-bc19-af7778ff1a14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-manager/" + google-query: inurl:"/wp-content/plugins/media-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-organizer-00bb27b1e1befeeadd2692ce2f1a6969.yaml b/nuclei-templates/cve-less/plugins/media-file-organizer-00bb27b1e1befeeadd2692ce2f1a6969.yaml new file mode 100644 index 0000000000..9352f177cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-organizer-00bb27b1e1befeeadd2692ce2f1a6969.yaml @@ -0,0 +1,58 @@ +id: media-file-organizer-00bb27b1e1befeeadd2692ce2f1a6969 + +info: + name: > + Media File Organizer <= 1.0.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe0def72-affb-4f42-8857-0e2b8b602c7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-organizer/" + google-query: inurl:"/wp-content/plugins/media-file-organizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-organizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-organizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-organizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-renamer-22a2226407a4248640044dd2df483fba.yaml b/nuclei-templates/cve-less/plugins/media-file-renamer-22a2226407a4248640044dd2df483fba.yaml new file mode 100644 index 0000000000..0b3751ba5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-renamer-22a2226407a4248640044dd2df483fba.yaml @@ -0,0 +1,58 @@ +id: media-file-renamer-22a2226407a4248640044dd2df483fba + +info: + name: > + Media File Renamer <= 5.6.9 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71e55161-f5ad-44e5-8a61-ce48c05e6dba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-renamer/" + google-query: inurl:"/wp-content/plugins/media-file-renamer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-renamer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-renamer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-renamer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-renamer-6234c54583fe97f4b335659ad6e8c2c3.yaml b/nuclei-templates/cve-less/plugins/media-file-renamer-6234c54583fe97f4b335659ad6e8c2c3.yaml new file mode 100644 index 0000000000..d018dd0f7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-renamer-6234c54583fe97f4b335659ad6e8c2c3.yaml @@ -0,0 +1,58 @@ +id: media-file-renamer-6234c54583fe97f4b335659ad6e8c2c3 + +info: + name: > + Media File Renamer < 1.9.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/176798cc-9f5f-4524-9172-8f0497e4fc11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-renamer/" + google-query: inurl:"/wp-content/plugins/media-file-renamer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-renamer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-renamer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-renamer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-renamer-6e4ac4275a14e860f6690b3cd168f08e.yaml b/nuclei-templates/cve-less/plugins/media-file-renamer-6e4ac4275a14e860f6690b3cd168f08e.yaml new file mode 100644 index 0000000000..1ade5633a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-renamer-6e4ac4275a14e860f6690b3cd168f08e.yaml @@ -0,0 +1,58 @@ +id: media-file-renamer-6e4ac4275a14e860f6690b3cd168f08e + +info: + name: > + Media File Renamer <= 5.7.7 - Authenticated(Administrator+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32b2b8e9-aa49-4cc3-97b7-249695969461?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-renamer/" + google-query: inurl:"/wp-content/plugins/media-file-renamer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-renamer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-renamer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-renamer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-renamer-9a06183bb7fd52c18dc709884017b765.yaml b/nuclei-templates/cve-less/plugins/media-file-renamer-9a06183bb7fd52c18dc709884017b765.yaml new file mode 100644 index 0000000000..96194c7828 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-renamer-9a06183bb7fd52c18dc709884017b765.yaml @@ -0,0 +1,58 @@ +id: media-file-renamer-9a06183bb7fd52c18dc709884017b765 + +info: + name: > + Media File Renamer – Auto & Manual Rename <= 5.2.5 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/beb47081-ad9c-4ecb-bbcd-2ae916e55baf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-renamer/" + google-query: inurl:"/wp-content/plugins/media-file-renamer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-renamer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-renamer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-renamer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-file-renamer-e76a25dd6d02a9976e1a45024d852c58.yaml b/nuclei-templates/cve-less/plugins/media-file-renamer-e76a25dd6d02a9976e1a45024d852c58.yaml new file mode 100644 index 0000000000..6b060b37a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-file-renamer-e76a25dd6d02a9976e1a45024d852c58.yaml @@ -0,0 +1,58 @@ +id: media-file-renamer-e76a25dd6d02a9976e1a45024d852c58 + +info: + name: > + Media File Renamer – Auto & Manual Rename <= 5.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbf32808-b5d7-4f12-ada5-0578e0bef321?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-file-renamer/" + google-query: inurl:"/wp-content/plugins/media-file-renamer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-file-renamer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-file-renamer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-file-renamer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-from-ftp-0efd51ee11e484e5ac059494b28050b4.yaml b/nuclei-templates/cve-less/plugins/media-from-ftp-0efd51ee11e484e5ac059494b28050b4.yaml new file mode 100644 index 0000000000..ec6ad22f6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-from-ftp-0efd51ee11e484e5ac059494b28050b4.yaml @@ -0,0 +1,58 @@ +id: media-from-ftp-0efd51ee11e484e5ac059494b28050b4 + +info: + name: > + Media from FTP Plugin < 9.85 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/561361da-ea4b-44d0-be77-c622af11f5b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-from-ftp/" + google-query: inurl:"/wp-content/plugins/media-from-ftp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-from-ftp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-from-ftp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-from-ftp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.85') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-from-ftp-28349c1e621b4d3993d035aeb46ae68e.yaml b/nuclei-templates/cve-less/plugins/media-from-ftp-28349c1e621b4d3993d035aeb46ae68e.yaml new file mode 100644 index 0000000000..f088576d71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-from-ftp-28349c1e621b4d3993d035aeb46ae68e.yaml @@ -0,0 +1,58 @@ +id: media-from-ftp-28349c1e621b4d3993d035aeb46ae68e + +info: + name: > + Media from FTP <= 11.15 - Improper Privilege Management + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f9cf9c5-d836-4414-a53f-adee2784bd96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-from-ftp/" + google-query: inurl:"/wp-content/plugins/media-from-ftp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-from-ftp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-from-ftp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-from-ftp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-from-ftp-c3c6f65072fe37bbbc2ef7dbe119003d.yaml b/nuclei-templates/cve-less/plugins/media-from-ftp-c3c6f65072fe37bbbc2ef7dbe119003d.yaml new file mode 100644 index 0000000000..247d0d6f75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-from-ftp-c3c6f65072fe37bbbc2ef7dbe119003d.yaml @@ -0,0 +1,58 @@ +id: media-from-ftp-c3c6f65072fe37bbbc2ef7dbe119003d + +info: + name: > + Media from FTP <= 11.16 - Authenticated (Author+) Improper Privilege Management + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9764d402-b8a2-43d5-882a-bc3886078b7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-from-ftp/" + google-query: inurl:"/wp-content/plugins/media-from-ftp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-from-ftp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-from-ftp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-from-ftp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-0b903181e53a3afd2853d8a217d8de8d.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-0b903181e53a3afd2853d8a217d8de8d.yaml new file mode 100644 index 0000000000..b35c94d364 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-0b903181e53a3afd2853d8a217d8de8d.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-0b903181e53a3afd2853d8a217d8de8d + +info: + name: > + Media Library Assistant <= 3.11 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1603dc9-7f5e-47e1-8a81-27bb4df1aa4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-1071684e8b4fbe11ac61e0256dfaba92.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-1071684e8b4fbe11ac61e0256dfaba92.yaml new file mode 100644 index 0000000000..98f320b8c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-1071684e8b4fbe11ac61e0256dfaba92.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-1071684e8b4fbe11ac61e0256dfaba92 + +info: + name: > + Media Library Assistant <= 3.13 - Authenticated (Contributor+) Stored Cross-Site Scripting via mla_gallery Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63ed73c9-2b61-4811-ba7f-1803982f17bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-1749acb4ff55d423ebb0f0a82a7c5808.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-1749acb4ff55d423ebb0f0a82a7c5808.yaml new file mode 100644 index 0000000000..2bfc2a6578 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-1749acb4ff55d423ebb0f0a82a7c5808.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-1749acb4ff55d423ebb0f0a82a7c5808 + +info: + name: > + Media Library Assistant <= 3.05 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecc59a6f-5e4a-44b4-932d-ed990ebb075a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-1bcb114ae8bffc625089b17287fe97ca.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-1bcb114ae8bffc625089b17287fe97ca.yaml new file mode 100644 index 0000000000..e400c79b28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-1bcb114ae8bffc625089b17287fe97ca.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-1bcb114ae8bffc625089b17287fe97ca + +info: + name: > + Media Library Assistant <= 2.81 - Remote Code Execution via tax_query, meta_query, date_query Parameters + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21456889-058c-46a5-80c3-a0c8f90cd3bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-2e52fc4f7a8504883023eba2284cc957.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-2e52fc4f7a8504883023eba2284cc957.yaml new file mode 100644 index 0000000000..5e4be253de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-2e52fc4f7a8504883023eba2284cc957.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-2e52fc4f7a8504883023eba2284cc957 + +info: + name: > + Media Library Assistant <= 2.81 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb581a8a-8e68-4f5a-8f05-d5b91b0f70d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.82') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-315158d01f8d35cf2208dddc8f7964b3.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-315158d01f8d35cf2208dddc8f7964b3.yaml new file mode 100644 index 0000000000..9082a7bfdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-315158d01f8d35cf2208dddc8f7964b3.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-315158d01f8d35cf2208dddc8f7964b3 + +info: + name: > + Media Library Assistant <= 2.73 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cfa4cb3-0f16-40be-9e78-ea378c3f535f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-4028fc1d58c158acfb13c46a4db5a2fb.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-4028fc1d58c158acfb13c46a4db5a2fb.yaml new file mode 100644 index 0000000000..6808f33098 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-4028fc1d58c158acfb13c46a4db5a2fb.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-4028fc1d58c158acfb13c46a4db5a2fb + +info: + name: > + Media Library Assistant <= 3.00 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b1cf5dc-c823-4603-959a-5dfc21f7d338?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-5541a58ff6aa2455768527014bebcd1e.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-5541a58ff6aa2455768527014bebcd1e.yaml new file mode 100644 index 0000000000..9c4d931867 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-5541a58ff6aa2455768527014bebcd1e.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-5541a58ff6aa2455768527014bebcd1e + +info: + name: > + Media Library Assistant <= 3.07 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/639009f6-9877-45a9-b9f3-7256bc6f3360?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-7a4b57c89eea61dbc376b3ebcfe96a70.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-7a4b57c89eea61dbc376b3ebcfe96a70.yaml new file mode 100644 index 0000000000..f370e6d340 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-7a4b57c89eea61dbc376b3ebcfe96a70.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-7a4b57c89eea61dbc376b3ebcfe96a70 + +info: + name: > + Media Library Assistant <= 3.09 - Unauthenticated Local/Remote File Inclusion & Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05c68377-feb6-442d-a3a0-1fbc246c7cbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.09') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-c35f9ed6b93a44d06dd09e34e66b7586.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-c35f9ed6b93a44d06dd09e34e66b7586.yaml new file mode 100644 index 0000000000..d92bec4f28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-c35f9ed6b93a44d06dd09e34e66b7586.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-c35f9ed6b93a44d06dd09e34e66b7586 + +info: + name: > + Media Library Assistant <= 2.81 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c49811bf-19d5-450f-9f11-a5fc9e8781c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-cd5bfb58064b9745ccbd3f1f59ac312b.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-cd5bfb58064b9745ccbd3f1f59ac312b.yaml new file mode 100644 index 0000000000..baedbdf7a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-cd5bfb58064b9745ccbd3f1f59ac312b.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-cd5bfb58064b9745ccbd3f1f59ac312b + +info: + name: > + Media Library Assistant <= 3.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5f6ae5d-7854-44c7-9fb8-efaa6e850d59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-assistant-eb721251db16f750bb7b6d9b4bcc4dbd.yaml b/nuclei-templates/cve-less/plugins/media-library-assistant-eb721251db16f750bb7b6d9b4bcc4dbd.yaml new file mode 100644 index 0000000000..dd151f772e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-assistant-eb721251db16f750bb7b6d9b4bcc4dbd.yaml @@ -0,0 +1,58 @@ +id: media-library-assistant-eb721251db16f750bb7b6d9b4bcc4dbd + +info: + name: > + Media Library Assistant <= 3.13 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e63fb84-a16b-447f-be73-e01f30881445?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-assistant/" + google-query: inurl:"/wp-content/plugins/media-library-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-assistant,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-categories-01dd63a5f8faf96a00782f6bc3eb47be.yaml b/nuclei-templates/cve-less/plugins/media-library-categories-01dd63a5f8faf96a00782f6bc3eb47be.yaml new file mode 100644 index 0000000000..862c1f618b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-categories-01dd63a5f8faf96a00782f6bc3eb47be.yaml @@ -0,0 +1,58 @@ +id: media-library-categories-01dd63a5f8faf96a00782f6bc3eb47be + +info: + name: > + Media Library Categories <= 1.1.1 - Unauthenticated Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2766e8ee-ce19-40a9-8f53-d50ebe4f0ac9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-categories/" + google-query: inurl:"/wp-content/plugins/media-library-categories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-categories,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-categories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-categories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-helper-2c2851e9d6588865c8c62a92765f5da7.yaml b/nuclei-templates/cve-less/plugins/media-library-helper-2c2851e9d6588865c8c62a92765f5da7.yaml new file mode 100644 index 0000000000..5e7a1d6471 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-helper-2c2851e9d6588865c8c62a92765f5da7.yaml @@ -0,0 +1,58 @@ +id: media-library-helper-2c2851e9d6588865c8c62a92765f5da7 + +info: + name: > + Media Library Helper by Codexin <= 1.2.0 - Cross-Site Request Forgery via rate_the_plugin_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc2356b2-e153-4e80-bfac-c25c15cdc259?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-helper/" + google-query: inurl:"/wp-content/plugins/media-library-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-helper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-plus-15ea5684525ea85792493d1e42c50ee1.yaml b/nuclei-templates/cve-less/plugins/media-library-plus-15ea5684525ea85792493d1e42c50ee1.yaml new file mode 100644 index 0000000000..5b813f39b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-plus-15ea5684525ea85792493d1e42c50ee1.yaml @@ -0,0 +1,58 @@ +id: media-library-plus-15ea5684525ea85792493d1e42c50ee1 + +info: + name: > + Media Library Folders <= 8.1.7 - Authenticated (Author+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/198ad1bf-7ce1-4367-bef7-1f58113c0719?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-plus/" + google-query: inurl:"/wp-content/plugins/media-library-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-plus-2fee4732545e71342d59a2938407fe7a.yaml b/nuclei-templates/cve-less/plugins/media-library-plus-2fee4732545e71342d59a2938407fe7a.yaml new file mode 100644 index 0000000000..a2ce31a060 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-plus-2fee4732545e71342d59a2938407fe7a.yaml @@ -0,0 +1,58 @@ +id: media-library-plus-2fee4732545e71342d59a2938407fe7a + +info: + name: > + Media Library Folders <= 8.2.0 - Reflected Cross-Site Scripting via 's' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f550bac-b047-4276-bde5-c15bfd4ceb49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-plus/" + google-query: inurl:"/wp-content/plugins/media-library-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-plus-33bc7d755c896ae147d69853031aefe1.yaml b/nuclei-templates/cve-less/plugins/media-library-plus-33bc7d755c896ae147d69853031aefe1.yaml new file mode 100644 index 0000000000..6e7f32ca64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-plus-33bc7d755c896ae147d69853031aefe1.yaml @@ -0,0 +1,58 @@ +id: media-library-plus-33bc7d755c896ae147d69853031aefe1 + +info: + name: > + Media Library Folders <= 8.1.8 - Authenticated (Author+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4534efd4-0e6b-4784-8f81-4a643f657c66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-plus/" + google-query: inurl:"/wp-content/plugins/media-library-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-library-plus-7f361b8e267eec159cd338045858bebf.yaml b/nuclei-templates/cve-less/plugins/media-library-plus-7f361b8e267eec159cd338045858bebf.yaml new file mode 100644 index 0000000000..12ee72f0b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-library-plus-7f361b8e267eec159cd338045858bebf.yaml @@ -0,0 +1,58 @@ +id: media-library-plus-7f361b8e267eec159cd338045858bebf + +info: + name: > + Media Library Folders <= 7.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e489960e-254a-4b8d-85ab-0f749ff48e8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-library-plus/" + google-query: inurl:"/wp-content/plugins/media-library-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-library-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-library-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-library-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-list-62fa04687cc3a59a6c68564d31d19c75.yaml b/nuclei-templates/cve-less/plugins/media-list-62fa04687cc3a59a6c68564d31d19c75.yaml new file mode 100644 index 0000000000..adcb7571e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-list-62fa04687cc3a59a6c68564d31d19c75.yaml @@ -0,0 +1,58 @@ +id: media-list-62fa04687cc3a59a6c68564d31d19c75 + +info: + name: > + Medialist <= 1.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a583966-f58a-41a0-8856-7b7b6a0eb559?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-list/" + google-query: inurl:"/wp-content/plugins/media-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-list-9a2c39e647de10bdf5506fe83c7446b4.yaml b/nuclei-templates/cve-less/plugins/media-list-9a2c39e647de10bdf5506fe83c7446b4.yaml new file mode 100644 index 0000000000..2ba42055f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-list-9a2c39e647de10bdf5506fe83c7446b4.yaml @@ -0,0 +1,58 @@ +id: media-list-9a2c39e647de10bdf5506fe83c7446b4 + +info: + name: > + Medialist <= 1.3.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45c7f8fb-3fd0-425f-89a1-8971f67d5755?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-list/" + google-query: inurl:"/wp-content/plugins/media-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-mirror-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/media-mirror-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..8e7a69e2b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-mirror-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: media-mirror-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-mirror/" + google-query: inurl:"/wp-content/plugins/media-mirror/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-mirror,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-mirror/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-mirror" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-tags-5a607f07c740543865789590cbca6639.yaml b/nuclei-templates/cve-less/plugins/media-tags-5a607f07c740543865789590cbca6639.yaml new file mode 100644 index 0000000000..e216f21b48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-tags-5a607f07c740543865789590cbca6639.yaml @@ -0,0 +1,58 @@ +id: media-tags-5a607f07c740543865789590cbca6639 + +info: + name: > + Media-Tags <= 3.2.0.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56ce85d3-89f3-461a-8268-7d549e9c2baf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-tags/" + google-query: inurl:"/wp-content/plugins/media-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/media-usage-3a2cab0afb3070dc0c2fdad7d3b7f22b.yaml b/nuclei-templates/cve-less/plugins/media-usage-3a2cab0afb3070dc0c2fdad7d3b7f22b.yaml new file mode 100644 index 0000000000..78a40d53b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/media-usage-3a2cab0afb3070dc0c2fdad7d3b7f22b.yaml @@ -0,0 +1,58 @@ +id: media-usage-3a2cab0afb3070dc0c2fdad7d3b7f22b + +info: + name: > + Media Usage <= 0.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8290783-9eb5-4fae-8b00-e3b5a5a0ed35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/media-usage/" + google-query: inurl:"/wp-content/plugins/media-usage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,media-usage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/media-usage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "media-usage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediabay-lite-b53850514eba837c1bf2ca4cf00a35b7.yaml b/nuclei-templates/cve-less/plugins/mediabay-lite-b53850514eba837c1bf2ca4cf00a35b7.yaml new file mode 100644 index 0000000000..49666d4fcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediabay-lite-b53850514eba837c1bf2ca4cf00a35b7.yaml @@ -0,0 +1,58 @@ +id: mediabay-lite-b53850514eba837c1bf2ca4cf00a35b7 + +info: + name: > + Mediabay <= 1.6 - Authenticated (Editor+) Stored Cross-Site Scripting Vulnerability + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1954340-397c-4cc0-ba9d-d698d94ea608?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediabay-lite/" + google-query: inurl:"/wp-content/plugins/mediabay-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediabay-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediabay-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediabay-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediabay-lite-dee11a999eea8acc0c1d0780e652bd48.yaml b/nuclei-templates/cve-less/plugins/mediabay-lite-dee11a999eea8acc0c1d0780e652bd48.yaml new file mode 100644 index 0000000000..9a9e16d97a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediabay-lite-dee11a999eea8acc0c1d0780e652bd48.yaml @@ -0,0 +1,58 @@ +id: mediabay-lite-dee11a999eea8acc0c1d0780e652bd48 + +info: + name: > + Mediabay <= 1.6 - Missing Authorization via AJAC actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a923f58-f6c7-47ee-87f6-27453b39d1cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediabay-lite/" + google-query: inurl:"/wp-content/plugins/mediabay-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediabay-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediabay-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediabay-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediaburst-ecommerce-sms-notifications-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/cve-less/plugins/mediaburst-ecommerce-sms-notifications-167d9672411be44feb72a5175fd0987c.yaml new file mode 100644 index 0000000000..4157ab2075 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediaburst-ecommerce-sms-notifications-167d9672411be44feb72a5175fd0987c.yaml @@ -0,0 +1,58 @@ +id: mediaburst-ecommerce-sms-notifications-167d9672411be44feb72a5175fd0987c + +info: + name: > + Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f35a20-ffcf-4413-b1ea-748cd6aa6f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediaburst-ecommerce-sms-notifications/" + google-query: inurl:"/wp-content/plugins/mediaburst-ecommerce-sms-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediaburst-ecommerce-sms-notifications,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediaburst-ecommerce-sms-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediaburst-ecommerce-sms-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-030658ba5cc0f002fdffef84e42ae14b.yaml b/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-030658ba5cc0f002fdffef84e42ae14b.yaml new file mode 100644 index 0000000000..7b790dcb8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-030658ba5cc0f002fdffef84e42ae14b.yaml @@ -0,0 +1,58 @@ +id: mediaburst-email-to-sms-030658ba5cc0f002fdffef84e42ae14b + +info: + name: > + Clockwork SMS Notfications <= 3.0.4 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08fb51d6-30c1-4a48-b626-a8c6f203ac83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediaburst-email-to-sms/" + google-query: inurl:"/wp-content/plugins/mediaburst-email-to-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediaburst-email-to-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediaburst-email-to-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediaburst-email-to-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-167d9672411be44feb72a5175fd0987c.yaml new file mode 100644 index 0000000000..b01d715f8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-167d9672411be44feb72a5175fd0987c.yaml @@ -0,0 +1,58 @@ +id: mediaburst-email-to-sms-167d9672411be44feb72a5175fd0987c + +info: + name: > + Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f35a20-ffcf-4413-b1ea-748cd6aa6f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediaburst-email-to-sms/" + google-query: inurl:"/wp-content/plugins/mediaburst-email-to-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediaburst-email-to-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediaburst-email-to-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediaburst-email-to-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-8536de3de245d6a4ab6eeac77e95e618.yaml b/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-8536de3de245d6a4ab6eeac77e95e618.yaml new file mode 100644 index 0000000000..2dd1d3f887 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediaburst-email-to-sms-8536de3de245d6a4ab6eeac77e95e618.yaml @@ -0,0 +1,58 @@ +id: mediaburst-email-to-sms-8536de3de245d6a4ab6eeac77e95e618 + +info: + name: > + Clockwork SMS Notfications < 2.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a9a642f-1ca5-4f08-b404-c11deba100e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediaburst-email-to-sms/" + google-query: inurl:"/wp-content/plugins/mediaburst-email-to-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediaburst-email-to-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediaburst-email-to-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediaburst-email-to-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediamatic-0b95cfad1999ef6bac1ef79ebeeb624d.yaml b/nuclei-templates/cve-less/plugins/mediamatic-0b95cfad1999ef6bac1ef79ebeeb624d.yaml new file mode 100644 index 0000000000..440a539f2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediamatic-0b95cfad1999ef6bac1ef79ebeeb624d.yaml @@ -0,0 +1,58 @@ +id: mediamatic-0b95cfad1999ef6bac1ef79ebeeb624d + +info: + name: > + Mediamatic – Media Library Folders <= 2.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d81ed8d9-4a7a-4b75-aab4-8e4dbd554f32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediamatic/" + google-query: inurl:"/wp-content/plugins/mediamatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediamatic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediamatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediamatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediamatic-66ac5cf55cb601e1e04c93898023eadb.yaml b/nuclei-templates/cve-less/plugins/mediamatic-66ac5cf55cb601e1e04c93898023eadb.yaml new file mode 100644 index 0000000000..2c4cb3a01a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediamatic-66ac5cf55cb601e1e04c93898023eadb.yaml @@ -0,0 +1,58 @@ +id: mediamatic-66ac5cf55cb601e1e04c93898023eadb + +info: + name: > + Mediamatic – Media Library Folders <= 2.8.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a11f264a-24fe-44da-b325-3fbdc4cd81d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediamatic/" + google-query: inurl:"/wp-content/plugins/mediamatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediamatic,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediamatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediamatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediamatic-957e023e162fd65b104346c605f19c7a.yaml b/nuclei-templates/cve-less/plugins/mediamatic-957e023e162fd65b104346c605f19c7a.yaml new file mode 100644 index 0000000000..ea79f5b33f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediamatic-957e023e162fd65b104346c605f19c7a.yaml @@ -0,0 +1,58 @@ +id: mediamatic-957e023e162fd65b104346c605f19c7a + +info: + name: > + Mediamatic – Media Library Folders <= 2.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad8dff1e-b9f8-4383-8efb-8bceaa8c86c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediamatic/" + google-query: inurl:"/wp-content/plugins/mediamatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediamatic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediamatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediamatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediamatic-d708fed52a98da33c7b5f777938fb90a.yaml b/nuclei-templates/cve-less/plugins/mediamatic-d708fed52a98da33c7b5f777938fb90a.yaml new file mode 100644 index 0000000000..93dfc11636 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediamatic-d708fed52a98da33c7b5f777938fb90a.yaml @@ -0,0 +1,58 @@ +id: mediamatic-d708fed52a98da33c7b5f777938fb90a + +info: + name: > + Mediamatic – Media Library Folders <= 2.8.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5c87ae0-9a53-4292-a4d3-05b3bdb37b71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediamatic/" + google-query: inurl:"/wp-content/plugins/mediamatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediamatic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediamatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediamatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediavine-control-panel-2f4da607198689ec8ae90e2f847fd2a8.yaml b/nuclei-templates/cve-less/plugins/mediavine-control-panel-2f4da607198689ec8ae90e2f847fd2a8.yaml new file mode 100644 index 0000000000..20a76876ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediavine-control-panel-2f4da607198689ec8ae90e2f847fd2a8.yaml @@ -0,0 +1,58 @@ +id: mediavine-control-panel-2f4da607198689ec8ae90e2f847fd2a8 + +info: + name: > + Mediavine Control Panel <= 2.10.2 - Cross-Site Request Forgery via render_settings_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac20b454-a5e5-4ff6-a5bf-9c3c339321d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediavine-control-panel/" + google-query: inurl:"/wp-content/plugins/mediavine-control-panel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediavine-control-panel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediavine-control-panel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediavine-control-panel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mediavine-create-4db517b5824cdbfb59767dcfce03ed88.yaml b/nuclei-templates/cve-less/plugins/mediavine-create-4db517b5824cdbfb59767dcfce03ed88.yaml new file mode 100644 index 0000000000..25d794926f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mediavine-create-4db517b5824cdbfb59767dcfce03ed88.yaml @@ -0,0 +1,58 @@ +id: mediavine-create-4db517b5824cdbfb59767dcfce03ed88 + +info: + name: > + Create by Mediavine <= 1.9.4 - Unauthenticated SQL Injection via 'id' + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcc78fa6-a5f0-4f29-ae19-8e783698b19e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mediavine-create/" + google-query: inurl:"/wp-content/plugins/mediavine-create/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mediavine-create,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mediavine-create/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediavine-create" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/medibazar-core-0e249eccad21574e2f41d6b727c12756.yaml b/nuclei-templates/cve-less/plugins/medibazar-core-0e249eccad21574e2f41d6b727c12756.yaml new file mode 100644 index 0000000000..ee868c3411 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/medibazar-core-0e249eccad21574e2f41d6b727c12756.yaml @@ -0,0 +1,58 @@ +id: medibazar-core-0e249eccad21574e2f41d6b727c12756 + +info: + name: > + Multiple Plugins by KlbTheme <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fb06315-30ad-4d98-af75-b04933583be7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/medibazar-core/" + google-query: inurl:"/wp-content/plugins/medibazar-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,medibazar-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/medibazar-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "medibazar-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meenews-a0535ae9a08f66698f91957812ef49de.yaml b/nuclei-templates/cve-less/plugins/meenews-a0535ae9a08f66698f91957812ef49de.yaml new file mode 100644 index 0000000000..58e28c40b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meenews-a0535ae9a08f66698f91957812ef49de.yaml @@ -0,0 +1,58 @@ +id: meenews-a0535ae9a08f66698f91957812ef49de + +info: + name: > + Newsletter Meenews <= 5.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b05ece19-ba0d-456e-bdab-86abe9a13e70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meenews/" + google-query: inurl:"/wp-content/plugins/meenews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meenews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meenews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meenews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meet-my-team-a2ba0d175d26a5652fc4c3dde4656860.yaml b/nuclei-templates/cve-less/plugins/meet-my-team-a2ba0d175d26a5652fc4c3dde4656860.yaml new file mode 100644 index 0000000000..3a4723ec9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meet-my-team-a2ba0d175d26a5652fc4c3dde4656860.yaml @@ -0,0 +1,58 @@ +id: meet-my-team-a2ba0d175d26a5652fc4c3dde4656860 + +info: + name: > + Meet My Team <= 2.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9feb44e1-eb19-40eb-85d6-fae56afe90ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meet-my-team/" + google-query: inurl:"/wp-content/plugins/meet-my-team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meet-my-team,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meet-my-team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meet-my-team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-301e81e7a190a838bf006476907547b4.yaml b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-301e81e7a190a838bf006476907547b4.yaml new file mode 100644 index 0000000000..09e1efe158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-301e81e7a190a838bf006476907547b4.yaml @@ -0,0 +1,58 @@ +id: meeting-scheduler-by-vcita-301e81e7a190a838bf006476907547b4 + +info: + name: > + Online Booking & Scheduling Calendar for WordPress by vcita <= 4.4.0 - Missing Authorization on REST-API + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4855627a-de56-49ee-b0b0-01b9735d8557?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meeting-scheduler-by-vcita,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-647a040d673e13659115740c0e6a164f.yaml b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-647a040d673e13659115740c0e6a164f.yaml new file mode 100644 index 0000000000..d282594459 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-647a040d673e13659115740c0e6a164f.yaml @@ -0,0 +1,58 @@ +id: meeting-scheduler-by-vcita-647a040d673e13659115740c0e6a164f + +info: + name: > + Online Booking & Scheduling Calendar for WordPress by vcita <= 4.4.0 - Cross-Site Request Forgery to Account Logout + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f434585c-8533-4788-b0bc-5650390c29a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meeting-scheduler-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-80701456edd5634e54dde4f94f03d86e.yaml b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-80701456edd5634e54dde4f94f03d86e.yaml new file mode 100644 index 0000000000..6fe9863498 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-80701456edd5634e54dde4f94f03d86e.yaml @@ -0,0 +1,58 @@ +id: meeting-scheduler-by-vcita-80701456edd5634e54dde4f94f03d86e + +info: + name: > + Online Booking & Scheduling Calendar for WordPress by vcita <= 4.2.10 - Missing Authorization to Account Logout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/731cbeed-d4aa-448f-878a-8c51a3da4e18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meeting-scheduler-by-vcita,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-85ec9094d25566acdd5938abeeebadbd.yaml b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-85ec9094d25566acdd5938abeeebadbd.yaml new file mode 100644 index 0000000000..d05dbcb14f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-85ec9094d25566acdd5938abeeebadbd.yaml @@ -0,0 +1,58 @@ +id: meeting-scheduler-by-vcita-85ec9094d25566acdd5938abeeebadbd + +info: + name: > + Online Booking & Scheduling Calendar for WordPress by vcita <= 4.3.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e6a0bf9-4767-4d4c-9a1e-adcb3c7719d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meeting-scheduler-by-vcita,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-b65c2cbf689ff5e6c36de8e6ea88fb1d.yaml b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-b65c2cbf689ff5e6c36de8e6ea88fb1d.yaml new file mode 100644 index 0000000000..7f8aa6b5d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-b65c2cbf689ff5e6c36de8e6ea88fb1d.yaml @@ -0,0 +1,58 @@ +id: meeting-scheduler-by-vcita-b65c2cbf689ff5e6c36de8e6ea88fb1d + +info: + name: > + Online Booking & Scheduling Calendar for WordPress by vcita <= 4.4.0 - Missing Authorization to Settings Update and Media Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c99aab5-a995-44ae-bc14-09f73e6b22c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meeting-scheduler-by-vcita,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-c1f8f105aad937fe6b4d3f7e729e9b4d.yaml b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-c1f8f105aad937fe6b4d3f7e729e9b4d.yaml new file mode 100644 index 0000000000..f4dc199070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meeting-scheduler-by-vcita-c1f8f105aad937fe6b4d3f7e729e9b4d.yaml @@ -0,0 +1,58 @@ +id: meeting-scheduler-by-vcita-c1f8f105aad937fe6b4d3f7e729e9b4d + +info: + name: > + Online Booking & Scheduling Calendar for WordPress by vcita <= 4.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/daeb24e0-7f3f-472f-aee5-be42e374aa52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meeting-scheduler-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-57d7eb4c0bda23c172922977bec66f98.yaml b/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-57d7eb4c0bda23c172922977bec66f98.yaml new file mode 100644 index 0000000000..67b55fe790 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-57d7eb4c0bda23c172922977bec66f98.yaml @@ -0,0 +1,58 @@ +id: mega-addons-for-visual-composer-57d7eb4c0bda23c172922977bec66f98 + +info: + name: > + Mega Addons For WPBakery Page Builder <= 4.2.7 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33aed550-5a2d-4a0a-8199-f2dfd212be92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mega-addons-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/mega-addons-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mega-addons-for-visual-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mega-addons-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mega-addons-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-aef5861873c712667e57c762ed3ff81e.yaml b/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-aef5861873c712667e57c762ed3ff81e.yaml new file mode 100644 index 0000000000..9fa6d6a371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-aef5861873c712667e57c762ed3ff81e.yaml @@ -0,0 +1,58 @@ +id: mega-addons-for-visual-composer-aef5861873c712667e57c762ed3ff81e + +info: + name: > + Mega Addons For WPBakery Page Builder <= 4.2.7 - Authenticated (Subscriber+) Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-9748-5359efd51754?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mega-addons-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/mega-addons-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mega-addons-for-visual-composer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mega-addons-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mega-addons-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-e462c11578c3d7efd1d373387e69d961.yaml b/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-e462c11578c3d7efd1d373387e69d961.yaml new file mode 100644 index 0000000000..f3839c7392 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mega-addons-for-visual-composer-e462c11578c3d7efd1d373387e69d961.yaml @@ -0,0 +1,58 @@ +id: mega-addons-for-visual-composer-e462c11578c3d7efd1d373387e69d961 + +info: + name: > + Mega Addons For WPBakery Page Builder <= 4.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a443b20e-1686-4519-890d-e6f1838fb05c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mega-addons-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/mega-addons-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mega-addons-for-visual-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mega-addons-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mega-addons-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mega-elements-addons-for-elementor-e12b4eb0afaf97081bdd86d34fb980c9.yaml b/nuclei-templates/cve-less/plugins/mega-elements-addons-for-elementor-e12b4eb0afaf97081bdd86d34fb980c9.yaml new file mode 100644 index 0000000000..312edf0201 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mega-elements-addons-for-elementor-e12b4eb0afaf97081bdd86d34fb980c9.yaml @@ -0,0 +1,58 @@ +id: mega-elements-addons-for-elementor-e12b4eb0afaf97081bdd86d34fb980c9 + +info: + name: > + Mega Elements <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/461fedd6-8138-46ee-9c76-dc71061242bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mega-elements-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/mega-elements-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mega-elements-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mega-elements-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mega-elements-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mega-forms-ddabc756c7ddb5aa3f2db005373f60ba.yaml b/nuclei-templates/cve-less/plugins/mega-forms-ddabc756c7ddb5aa3f2db005373f60ba.yaml new file mode 100644 index 0000000000..fb571186ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mega-forms-ddabc756c7ddb5aa3f2db005373f60ba.yaml @@ -0,0 +1,58 @@ +id: mega-forms-ddabc756c7ddb5aa3f2db005373f60ba + +info: + name: > + Contact Form By Mega Forms <= 1.2.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d034c3cb-8089-47d6-839b-659bedab5ca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mega-forms/" + google-query: inurl:"/wp-content/plugins/mega-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mega-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mega-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mega-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mega_main_menu-3c9418584b935e41a1f48b31c0a5f181.yaml b/nuclei-templates/cve-less/plugins/mega_main_menu-3c9418584b935e41a1f48b31c0a5f181.yaml new file mode 100644 index 0000000000..5314738d5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mega_main_menu-3c9418584b935e41a1f48b31c0a5f181.yaml @@ -0,0 +1,58 @@ +id: mega_main_menu-3c9418584b935e41a1f48b31c0a5f181 + +info: + name: > + Mega Main Menu <= 2.2.2 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a44ce6a3-0a9d-4bce-9251-f3a38b000645?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mega_main_menu/" + google-query: inurl:"/wp-content/plugins/mega_main_menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mega_main_menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mega_main_menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mega_main_menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mega_main_menu-951a77020b9388eb21ea61b4c1dfd9f6.yaml b/nuclei-templates/cve-less/plugins/mega_main_menu-951a77020b9388eb21ea61b4c1dfd9f6.yaml new file mode 100644 index 0000000000..a5a1e639f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mega_main_menu-951a77020b9388eb21ea61b4c1dfd9f6.yaml @@ -0,0 +1,58 @@ +id: mega_main_menu-951a77020b9388eb21ea61b4c1dfd9f6 + +info: + name: > + Mega Main Menu <= 2.2.2 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/130c3bbf-19a9-4e11-b6f2-5a08bbf7b123?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mega_main_menu/" + google-query: inurl:"/wp-content/plugins/mega_main_menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mega_main_menu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mega_main_menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mega_main_menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/megamenu-68c192a64ec1c6719c741f7b5a598887.yaml b/nuclei-templates/cve-less/plugins/megamenu-68c192a64ec1c6719c741f7b5a598887.yaml new file mode 100644 index 0000000000..b3845f826d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/megamenu-68c192a64ec1c6719c741f7b5a598887.yaml @@ -0,0 +1,58 @@ +id: megamenu-68c192a64ec1c6719c741f7b5a598887 + +info: + name: > + Max Mega Menu <= 2.3.8 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5646eb5b-caf0-413c-a1a8-f0c6a5fa5114?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/megamenu/" + google-query: inurl:"/wp-content/plugins/megamenu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,megamenu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/megamenu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "megamenu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/megamenu-fc3a86631dfc485c0a87a802663d412e.yaml b/nuclei-templates/cve-less/plugins/megamenu-fc3a86631dfc485c0a87a802663d412e.yaml new file mode 100644 index 0000000000..8c4347731d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/megamenu-fc3a86631dfc485c0a87a802663d412e.yaml @@ -0,0 +1,58 @@ +id: megamenu-fc3a86631dfc485c0a87a802663d412e + +info: + name: > + Max Mega Menu <= 3.3. - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35a75451-f0ae-4630-b415-394c76868e93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/megamenu/" + google-query: inurl:"/wp-content/plugins/megamenu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,megamenu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/megamenu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "megamenu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-audio-player-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-audio-player-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..38bb3f3398 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-audio-player-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-audio-player-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-audio-player/" + google-query: inurl:"/wp-content/plugins/meks-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-audio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-easy-ads-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-easy-ads-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..d73c91f9fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-easy-ads-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-easy-ads-widget-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-easy-ads-widget/" + google-query: inurl:"/wp-content/plugins/meks-easy-ads-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-easy-ads-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-easy-ads-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-easy-ads-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-easy-instagram-widget-30f045a25a21ac539fd3f995d744abbd.yaml b/nuclei-templates/cve-less/plugins/meks-easy-instagram-widget-30f045a25a21ac539fd3f995d744abbd.yaml new file mode 100644 index 0000000000..be9f177739 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-easy-instagram-widget-30f045a25a21ac539fd3f995d744abbd.yaml @@ -0,0 +1,58 @@ +id: meks-easy-instagram-widget-30f045a25a21ac539fd3f995d744abbd + +info: + name: > + Meks Easy Photo Feed Widget < 1.2.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23a94578-f395-4ec1-8a08-52ca233cc832?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-easy-instagram-widget/" + google-query: inurl:"/wp-content/plugins/meks-easy-instagram-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-easy-instagram-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-easy-instagram-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-easy-instagram-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-easy-instagram-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-easy-instagram-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..3c7ce4079e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-easy-instagram-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-easy-instagram-widget-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-easy-instagram-widget/" + google-query: inurl:"/wp-content/plugins/meks-easy-instagram-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-easy-instagram-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-easy-instagram-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-easy-instagram-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-easy-maps-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-easy-maps-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..f5cccc493d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-easy-maps-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-easy-maps-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-easy-maps/" + google-query: inurl:"/wp-content/plugins/meks-easy-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-easy-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-easy-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-easy-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-easy-social-share-7f939cb3e37ce54ad131378445cfa889.yaml b/nuclei-templates/cve-less/plugins/meks-easy-social-share-7f939cb3e37ce54ad131378445cfa889.yaml new file mode 100644 index 0000000000..ecfdf9bd36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-easy-social-share-7f939cb3e37ce54ad131378445cfa889.yaml @@ -0,0 +1,58 @@ +id: meks-easy-social-share-7f939cb3e37ce54ad131378445cfa889 + +info: + name: > + Meks Easy Social Share <= 1.2.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/990b3318-e3e1-4a19-875c-80d5d639ca4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-easy-social-share/" + google-query: inurl:"/wp-content/plugins/meks-easy-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-easy-social-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-easy-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-easy-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-flexible-shortcodes-bee37332f6e8a8436cc61a9d140d558a.yaml b/nuclei-templates/cve-less/plugins/meks-flexible-shortcodes-bee37332f6e8a8436cc61a9d140d558a.yaml new file mode 100644 index 0000000000..3bc8e7c6cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-flexible-shortcodes-bee37332f6e8a8436cc61a9d140d558a.yaml @@ -0,0 +1,58 @@ +id: meks-flexible-shortcodes-bee37332f6e8a8436cc61a9d140d558a + +info: + name: > + Meks Flexible Shortcodes <= 1.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7d9200b-af1c-4cd2-9d34-eaff97d56967?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-flexible-shortcodes/" + google-query: inurl:"/wp-content/plugins/meks-flexible-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-flexible-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-flexible-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-flexible-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-simple-flickr-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-simple-flickr-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..48bea822d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-simple-flickr-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-simple-flickr-widget-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-simple-flickr-widget/" + google-query: inurl:"/wp-content/plugins/meks-simple-flickr-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-simple-flickr-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-simple-flickr-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-simple-flickr-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-smart-author-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-smart-author-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..e2b54ac21e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-smart-author-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-smart-author-widget-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-smart-author-widget/" + google-query: inurl:"/wp-content/plugins/meks-smart-author-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-smart-author-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-smart-author-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-smart-author-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-smart-social-widget-065fb6634c2979f9a8dbb1a289a68a9b.yaml b/nuclei-templates/cve-less/plugins/meks-smart-social-widget-065fb6634c2979f9a8dbb1a289a68a9b.yaml new file mode 100644 index 0000000000..eb505ffec9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-smart-social-widget-065fb6634c2979f9a8dbb1a289a68a9b.yaml @@ -0,0 +1,58 @@ +id: meks-smart-social-widget-065fb6634c2979f9a8dbb1a289a68a9b + +info: + name: > + Meks Smart Social Widget <= 1.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/578ed437-98b7-495b-91fd-45b882f39d95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-smart-social-widget/" + google-query: inurl:"/wp-content/plugins/meks-smart-social-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-smart-social-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-smart-social-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-smart-social-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-smart-social-widget-12cfc5e2c42c1035bf0a62b514ef0564.yaml b/nuclei-templates/cve-less/plugins/meks-smart-social-widget-12cfc5e2c42c1035bf0a62b514ef0564.yaml new file mode 100644 index 0000000000..3304a11559 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-smart-social-widget-12cfc5e2c42c1035bf0a62b514ef0564.yaml @@ -0,0 +1,58 @@ +id: meks-smart-social-widget-12cfc5e2c42c1035bf0a62b514ef0564 + +info: + name: > + Meks Smart Social Widget <= 1.6.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/722aae99-fcfb-4234-9245-5db57aaa03c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-smart-social-widget/" + google-query: inurl:"/wp-content/plugins/meks-smart-social-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-smart-social-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-smart-social-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-smart-social-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-smart-social-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-smart-social-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..5d220ca936 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-smart-social-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-smart-social-widget-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-smart-social-widget/" + google-query: inurl:"/wp-content/plugins/meks-smart-social-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-smart-social-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-smart-social-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-smart-social-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-smart-social-widget-f41b10488dd7d69ac4748b8c313105e4.yaml b/nuclei-templates/cve-less/plugins/meks-smart-social-widget-f41b10488dd7d69ac4748b8c313105e4.yaml new file mode 100644 index 0000000000..834c47d5de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-smart-social-widget-f41b10488dd7d69ac4748b8c313105e4.yaml @@ -0,0 +1,58 @@ +id: meks-smart-social-widget-f41b10488dd7d69ac4748b8c313105e4 + +info: + name: > + Meks Smart Social Widget <= 1.6 - Missing Authorization to notice dimissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eaabaadf-7881-4c4f-8987-fbba8318a458?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-smart-social-widget/" + google-query: inurl:"/wp-content/plugins/meks-smart-social-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-smart-social-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-smart-social-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-smart-social-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-themeforest-smart-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-themeforest-smart-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..0a6c400d8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-themeforest-smart-widget-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-themeforest-smart-widget-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-themeforest-smart-widget/" + google-query: inurl:"/wp-content/plugins/meks-themeforest-smart-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-themeforest-smart-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-themeforest-smart-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-themeforest-smart-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-themeforest-smart-widget-e224c1cc32d6c05f266106ae47b5db38.yaml b/nuclei-templates/cve-less/plugins/meks-themeforest-smart-widget-e224c1cc32d6c05f266106ae47b5db38.yaml new file mode 100644 index 0000000000..30fce8cf7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-themeforest-smart-widget-e224c1cc32d6c05f266106ae47b5db38.yaml @@ -0,0 +1,58 @@ +id: meks-themeforest-smart-widget-e224c1cc32d6c05f266106ae47b5db38 + +info: + name: > + Meks ThemeForest Smart Widget <= 1.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72eb1cd3-47cb-4d9b-9bfd-87fef7859974?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-themeforest-smart-widget/" + google-query: inurl:"/wp-content/plugins/meks-themeforest-smart-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-themeforest-smart-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-themeforest-smart-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-themeforest-smart-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-time-ago-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-time-ago-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..1306a5b2a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-time-ago-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-time-ago-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-time-ago/" + google-query: inurl:"/wp-content/plugins/meks-time-ago/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-time-ago,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-time-ago/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-time-ago" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meks-video-importer-b1fa67bf969fdb68e71efc5cd730124e.yaml b/nuclei-templates/cve-less/plugins/meks-video-importer-b1fa67bf969fdb68e71efc5cd730124e.yaml new file mode 100644 index 0000000000..903a4ed7ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meks-video-importer-b1fa67bf969fdb68e71efc5cd730124e.yaml @@ -0,0 +1,58 @@ +id: meks-video-importer-b1fa67bf969fdb68e71efc5cd730124e + +info: + name: > + Meks Smart Social Widget <= 1.6 - Cross-Site Request Forgery via meks_remove_notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-video-importer/" + google-query: inurl:"/wp-content/plugins/meks-video-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-video-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-video-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-video-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/melhor-envio-cotacao-d9141583a795a1e4a70084cd717fd9ac.yaml b/nuclei-templates/cve-less/plugins/melhor-envio-cotacao-d9141583a795a1e4a70084cd717fd9ac.yaml new file mode 100644 index 0000000000..4865055a1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/melhor-envio-cotacao-d9141583a795a1e4a70084cd717fd9ac.yaml @@ -0,0 +1,58 @@ +id: melhor-envio-cotacao-d9141583a795a1e4a70084cd717fd9ac + +info: + name: > + Melhor Envio <= 2.11.19 - Cross-Site Request Forgery and Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a345197-d8ba-47ef-a88c-c9e45ddc0319?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/melhor-envio-cotacao/" + google-query: inurl:"/wp-content/plugins/melhor-envio-cotacao/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,melhor-envio-cotacao,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/melhor-envio-cotacao/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "melhor-envio-cotacao" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/member-approval-3a91d6c48afcaf4ec202f8da0ad11a12.yaml b/nuclei-templates/cve-less/plugins/member-approval-3a91d6c48afcaf4ec202f8da0ad11a12.yaml new file mode 100644 index 0000000000..b92dc230cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/member-approval-3a91d6c48afcaf4ec202f8da0ad11a12.yaml @@ -0,0 +1,58 @@ +id: member-approval-3a91d6c48afcaf4ec202f8da0ad11a12 + +info: + name: > + Member Approval <= 131109 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7a5d60e-5de1-4fc5-b6d1-88700d38e5f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/member-approval/" + google-query: inurl:"/wp-content/plugins/member-approval/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,member-approval,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/member-approval/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "member-approval" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 131109') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/member-database-e4f24d3eaa8049812bc7024a030b7c83.yaml b/nuclei-templates/cve-less/plugins/member-database-e4f24d3eaa8049812bc7024a030b7c83.yaml new file mode 100644 index 0000000000..cf57a28039 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/member-database-e4f24d3eaa8049812bc7024a030b7c83.yaml @@ -0,0 +1,58 @@ +id: member-database-e4f24d3eaa8049812bc7024a030b7c83 + +info: + name: > + Membership Database <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07ede585-c0d2-4643-9c36-7b5da5f721bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/member-database/" + google-query: inurl:"/wp-content/plugins/member-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,member-database,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/member-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "member-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/member-hero-59ccb7283840efae740fe390413a3bc9.yaml b/nuclei-templates/cve-less/plugins/member-hero-59ccb7283840efae740fe390413a3bc9.yaml new file mode 100644 index 0000000000..934499de6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/member-hero-59ccb7283840efae740fe390413a3bc9.yaml @@ -0,0 +1,58 @@ +id: member-hero-59ccb7283840efae740fe390413a3bc9 + +info: + name: > + Member Hero <= 1.0.9 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16c0a3b7-25b0-457e-b883-a780bc6a29a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/member-hero/" + google-query: inurl:"/wp-content/plugins/member-hero/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,member-hero,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/member-hero/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "member-hero" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/memberlite-shortcodes-e0d43cef694a102644215555aaaf71de.yaml b/nuclei-templates/cve-less/plugins/memberlite-shortcodes-e0d43cef694a102644215555aaaf71de.yaml new file mode 100644 index 0000000000..20063b21a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/memberlite-shortcodes-e0d43cef694a102644215555aaaf71de.yaml @@ -0,0 +1,58 @@ +id: memberlite-shortcodes-e0d43cef694a102644215555aaaf71de + +info: + name: > + Memberlite Shortcodes <= 1.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/935054c3-8541-4ff3-a035-7ee8afe53f72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/memberlite-shortcodes/" + google-query: inurl:"/wp-content/plugins/memberlite-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,memberlite-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/memberlite-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "memberlite-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/membermouse-9e5e9e74e35f7340ef7a86eda535ec55.yaml b/nuclei-templates/cve-less/plugins/membermouse-9e5e9e74e35f7340ef7a86eda535ec55.yaml new file mode 100644 index 0000000000..53712af08b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/membermouse-9e5e9e74e35f7340ef7a86eda535ec55.yaml @@ -0,0 +1,58 @@ +id: membermouse-9e5e9e74e35f7340ef7a86eda535ec55 + +info: + name: > + Membermouse <= 2.2.8 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df946b56-f3a5-4b0e-b281-1632abf93b34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/membermouse/" + google-query: inurl:"/wp-content/plugins/membermouse/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,membermouse,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/membermouse/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "membermouse" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/memberpress-bc9d740ab02dbe4e65f7bf071f0e62db.yaml b/nuclei-templates/cve-less/plugins/memberpress-bc9d740ab02dbe4e65f7bf071f0e62db.yaml new file mode 100644 index 0000000000..4b1941deac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/memberpress-bc9d740ab02dbe4e65f7bf071f0e62db.yaml @@ -0,0 +1,58 @@ +id: memberpress-bc9d740ab02dbe4e65f7bf071f0e62db + +info: + name: > + Memberpress <= 1.11.26 - Reflected Cross-Site Scripting via message and error + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/882631ab-ef16-4158-adbc-60ad177ae6b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/memberpress/" + google-query: inurl:"/wp-content/plugins/memberpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,memberpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/memberpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "memberpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/memberpress-downloads-dd0bbd05ca9ba09666d0154a80a50eb1.yaml b/nuclei-templates/cve-less/plugins/memberpress-downloads-dd0bbd05ca9ba09666d0154a80a50eb1.yaml new file mode 100644 index 0000000000..8bf5eef4e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/memberpress-downloads-dd0bbd05ca9ba09666d0154a80a50eb1.yaml @@ -0,0 +1,58 @@ +id: memberpress-downloads-dd0bbd05ca9ba09666d0154a80a50eb1 + +info: + name: > + MemberPress Downloads <= 1.2.5 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01aa00db-43e5-4c8a-a005-77a39ec89c94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/memberpress-downloads/" + google-query: inurl:"/wp-content/plugins/memberpress-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,memberpress-downloads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/memberpress-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "memberpress-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/members-import-3faf0e242f65e17c979c6f608e04b73e.yaml b/nuclei-templates/cve-less/plugins/members-import-3faf0e242f65e17c979c6f608e04b73e.yaml new file mode 100644 index 0000000000..3fe9d5f1cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/members-import-3faf0e242f65e17c979c6f608e04b73e.yaml @@ -0,0 +1,58 @@ +id: members-import-3faf0e242f65e17c979c6f608e04b73e + +info: + name: > + Members Import <= 1.3 - Cross-Site Request Forgery to User Import and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d8ffb68-cd85-4ea9-a772-3539728c76e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/members-import/" + google-query: inurl:"/wp-content/plugins/members-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,members-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/members-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "members-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/members-import-44b1b2f0eb9245a5807308d2327328e8.yaml b/nuclei-templates/cve-less/plugins/members-import-44b1b2f0eb9245a5807308d2327328e8.yaml new file mode 100644 index 0000000000..5dc37343a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/members-import-44b1b2f0eb9245a5807308d2327328e8.yaml @@ -0,0 +1,58 @@ +id: members-import-44b1b2f0eb9245a5807308d2327328e8 + +info: + name: > + Members Import <= 1.4.2 - Self Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3abbc407-f660-4b1f-9d48-436320e5fdd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/members-import/" + google-query: inurl:"/wp-content/plugins/members-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,members-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/members-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "members-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/members-list-c881e85c226dfb23c551995ac2bfcc0e.yaml b/nuclei-templates/cve-less/plugins/members-list-c881e85c226dfb23c551995ac2bfcc0e.yaml new file mode 100644 index 0000000000..0bbe3afd50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/members-list-c881e85c226dfb23c551995ac2bfcc0e.yaml @@ -0,0 +1,58 @@ +id: members-list-c881e85c226dfb23c551995ac2bfcc0e + +info: + name: > + Members List Plugin <= 4.3.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c793d7ad-987f-4b44-92aa-d0fdd66aa537?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/members-list/" + google-query: inurl:"/wp-content/plugins/members-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,members-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/members-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "members-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/membership-by-supsystic-6d746a5f0aa53afdd212e69305550ec1.yaml b/nuclei-templates/cve-less/plugins/membership-by-supsystic-6d746a5f0aa53afdd212e69305550ec1.yaml new file mode 100644 index 0000000000..54ccf0bd60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/membership-by-supsystic-6d746a5f0aa53afdd212e69305550ec1.yaml @@ -0,0 +1,58 @@ +id: membership-by-supsystic-6d746a5f0aa53afdd212e69305550ec1 + +info: + name: > + Membership by Supsystic <= 1.5.0 - Authenticated (Admin+) Time-Based Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f56a632d-4c5f-4d89-9cd9-8fc3697ff3ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/membership-by-supsystic/" + google-query: inurl:"/wp-content/plugins/membership-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,membership-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/membership-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "membership-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/membership-for-woocommerce-64b1bd7efe43945fafb1a600e8b59985.yaml b/nuclei-templates/cve-less/plugins/membership-for-woocommerce-64b1bd7efe43945fafb1a600e8b59985.yaml new file mode 100644 index 0000000000..1fc1b10df1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/membership-for-woocommerce-64b1bd7efe43945fafb1a600e8b59985.yaml @@ -0,0 +1,58 @@ +id: membership-for-woocommerce-64b1bd7efe43945fafb1a600e8b59985 + +info: + name: > + Membership For WooCommerce <= 2.1.6 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ad1af69-61e1-4453-866e-1ae71f614f30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/membership-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/membership-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,membership-for-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/membership-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "membership-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-2aa29c629074136ede505c61ef73b338.yaml b/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-2aa29c629074136ede505c61ef73b338.yaml new file mode 100644 index 0000000000..23207ac840 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-2aa29c629074136ede505c61ef73b338.yaml @@ -0,0 +1,58 @@ +id: membership-simplified-for-oap-members-only-2aa29c629074136ede505c61ef73b338 + +info: + name: > + Membership Simplified <= 1.58 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e27c1d20-cef7-4801-beb9-adaeb1b95145?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/membership-simplified-for-oap-members-only/" + google-query: inurl:"/wp-content/plugins/membership-simplified-for-oap-members-only/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,membership-simplified-for-oap-members-only,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/membership-simplified-for-oap-members-only/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "membership-simplified-for-oap-members-only" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.58') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-384486cdf221789bfec827528caf2a6d.yaml b/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-384486cdf221789bfec827528caf2a6d.yaml new file mode 100644 index 0000000000..5c30f59820 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-384486cdf221789bfec827528caf2a6d.yaml @@ -0,0 +1,58 @@ +id: membership-simplified-for-oap-members-only-384486cdf221789bfec827528caf2a6d + +info: + name: > + Membership Simplified <= 1.58 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57704203-ed74-4100-900c-3f35c726e51e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/membership-simplified-for-oap-members-only/" + google-query: inurl:"/wp-content/plugins/membership-simplified-for-oap-members-only/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,membership-simplified-for-oap-members-only,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/membership-simplified-for-oap-members-only/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "membership-simplified-for-oap-members-only" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.58') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-c2edf18b1dc2c5d697f81727cd0bac3f.yaml b/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-c2edf18b1dc2c5d697f81727cd0bac3f.yaml new file mode 100644 index 0000000000..959e7ca7ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/membership-simplified-for-oap-members-only-c2edf18b1dc2c5d697f81727cd0bac3f.yaml @@ -0,0 +1,58 @@ +id: membership-simplified-for-oap-members-only-c2edf18b1dc2c5d697f81727cd0bac3f + +info: + name: > + Membership Simplified <= 1.58 Beta - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0764d59b-c9bc-4f3c-98df-69ccb7f4bc2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/membership-simplified-for-oap-members-only/" + google-query: inurl:"/wp-content/plugins/membership-simplified-for-oap-members-only/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,membership-simplified-for-oap-members-only,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/membership-simplified-for-oap-members-only/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "membership-simplified-for-oap-members-only" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.58') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/membership-site-e54255e9a743040c053c6d8e8f67ce92.yaml b/nuclei-templates/cve-less/plugins/membership-site-e54255e9a743040c053c6d8e8f67ce92.yaml new file mode 100644 index 0000000000..7d0f068fd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/membership-site-e54255e9a743040c053c6d8e8f67ce92.yaml @@ -0,0 +1,58 @@ +id: membership-site-e54255e9a743040c053c6d8e8f67ce92 + +info: + name: > + MemberSonic Lite Membership Site Plugin <= 1.2 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42378b83-2a39-4e5f-8671-ee4a44ee92a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/membership-site/" + google-query: inurl:"/wp-content/plugins/membership-site/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,membership-site,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/membership-site/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "membership-site" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/memphis-documents-library-19255b523a36605faa1b692fe0bb8412.yaml b/nuclei-templates/cve-less/plugins/memphis-documents-library-19255b523a36605faa1b692fe0bb8412.yaml new file mode 100644 index 0000000000..1868bad84c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/memphis-documents-library-19255b523a36605faa1b692fe0bb8412.yaml @@ -0,0 +1,58 @@ +id: memphis-documents-library-19255b523a36605faa1b692fe0bb8412 + +info: + name: > + Memphis Documents Library <= 3.1.5 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2febf69-b146-4ca5-bfa9-f5477da5cd6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/memphis-documents-library/" + google-query: inurl:"/wp-content/plugins/memphis-documents-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,memphis-documents-library,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/memphis-documents-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "memphis-documents-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/memphis-documents-library-59c9b879f516cc2f3ec6fb5323e1397d.yaml b/nuclei-templates/cve-less/plugins/memphis-documents-library-59c9b879f516cc2f3ec6fb5323e1397d.yaml new file mode 100644 index 0000000000..437535da9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/memphis-documents-library-59c9b879f516cc2f3ec6fb5323e1397d.yaml @@ -0,0 +1,58 @@ +id: memphis-documents-library-59c9b879f516cc2f3ec6fb5323e1397d + +info: + name: > + Memphis Documents Library <= 2.6.16 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2eeeb4b5-972b-471b-8f0f-a198640fc894?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/memphis-documents-library/" + google-query: inurl:"/wp-content/plugins/memphis-documents-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,memphis-documents-library,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/memphis-documents-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "memphis-documents-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/memphis-documents-library-6a2ef437dbd84b379d13828c6767a7f7.yaml b/nuclei-templates/cve-less/plugins/memphis-documents-library-6a2ef437dbd84b379d13828c6767a7f7.yaml new file mode 100644 index 0000000000..011c3401e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/memphis-documents-library-6a2ef437dbd84b379d13828c6767a7f7.yaml @@ -0,0 +1,58 @@ +id: memphis-documents-library-6a2ef437dbd84b379d13828c6767a7f7 + +info: + name: > + Memphis Documents Library <= 2.6.16 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8f20aae-37e2-44f6-ac2d-692a87bf5728?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/memphis-documents-library/" + google-query: inurl:"/wp-content/plugins/memphis-documents-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,memphis-documents-library,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/memphis-documents-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "memphis-documents-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/memphis-documents-library-f4052902eccc72acecc4529d7a789e28.yaml b/nuclei-templates/cve-less/plugins/memphis-documents-library-f4052902eccc72acecc4529d7a789e28.yaml new file mode 100644 index 0000000000..744e19d971 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/memphis-documents-library-f4052902eccc72acecc4529d7a789e28.yaml @@ -0,0 +1,58 @@ +id: memphis-documents-library-f4052902eccc72acecc4529d7a789e28 + +info: + name: > + Memphis Documents Library <= 2.6.16 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b3201e0-df2a-471e-875b-4ca2c3a659f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/memphis-documents-library/" + google-query: inurl:"/wp-content/plugins/memphis-documents-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,memphis-documents-library,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/memphis-documents-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "memphis-documents-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mendeleyplugin-9cb69a500db940ecfdbb3ba869c26c38.yaml b/nuclei-templates/cve-less/plugins/mendeleyplugin-9cb69a500db940ecfdbb3ba869c26c38.yaml new file mode 100644 index 0000000000..decef2c613 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mendeleyplugin-9cb69a500db940ecfdbb3ba869c26c38.yaml @@ -0,0 +1,58 @@ +id: mendeleyplugin-9cb69a500db940ecfdbb3ba869c26c38 + +info: + name: > + Mendeley <= 1.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b56c684-90f6-4e8b-86fc-355a13b5368c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mendeleyplugin/" + google-query: inurl:"/wp-content/plugins/mendeleyplugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mendeleyplugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mendeleyplugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mendeleyplugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-icons-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/menu-icons-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..e02f15525e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-icons-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: menu-icons-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-icons/" + google-query: inurl:"/wp-content/plugins/menu-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.13.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-image-34dac14ec559cdbb5998de7d415317dc.yaml b/nuclei-templates/cve-less/plugins/menu-image-34dac14ec559cdbb5998de7d415317dc.yaml new file mode 100644 index 0000000000..05e4be13ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-image-34dac14ec559cdbb5998de7d415317dc.yaml @@ -0,0 +1,58 @@ +id: menu-image-34dac14ec559cdbb5998de7d415317dc + +info: + name: > + Menu Image, Icons made easy <= 3.10 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ff001c2-95f9-42a2-b5a3-74937be41756?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-image/" + google-query: inurl:"/wp-content/plugins/menu-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-image-800833211422a31fa0bc329389e6ba63.yaml b/nuclei-templates/cve-less/plugins/menu-image-800833211422a31fa0bc329389e6ba63.yaml new file mode 100644 index 0000000000..be3f146fed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-image-800833211422a31fa0bc329389e6ba63.yaml @@ -0,0 +1,58 @@ +id: menu-image-800833211422a31fa0bc329389e6ba63 + +info: + name: > + Menu Image, Icons made easy <= 3.0.7 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40873fcd-4161-4862-ac73-8046159f4739?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-image/" + google-query: inurl:"/wp-content/plugins/menu-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-image-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/menu-image-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..18fe0c8eeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-image-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: menu-image-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-image/" + google-query: inurl:"/wp-content/plugins/menu-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-image,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-item-scheduler-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/menu-item-scheduler-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6f69e16450 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-item-scheduler-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: menu-item-scheduler-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-item-scheduler/" + google-query: inurl:"/wp-content/plugins/menu-item-scheduler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-item-scheduler,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-item-scheduler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-item-scheduler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-items-visibility-control-15bf765de2821299511e8bf3105d6965.yaml b/nuclei-templates/cve-less/plugins/menu-items-visibility-control-15bf765de2821299511e8bf3105d6965.yaml new file mode 100644 index 0000000000..8014ae28c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-items-visibility-control-15bf765de2821299511e8bf3105d6965.yaml @@ -0,0 +1,58 @@ +id: menu-items-visibility-control-15bf765de2821299511e8bf3105d6965 + +info: + name: > + Menu Item Visibility Control <= 0.5 - Authenticated (Admin+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e15a7b0-2b0e-468d-a245-cec2ed77d73b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-items-visibility-control/" + google-query: inurl:"/wp-content/plugins/menu-items-visibility-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-items-visibility-control,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-items-visibility-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-items-visibility-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-ordering-reservations-211f53d8b1b52b0d7d117c8d6be4a364.yaml b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-211f53d8b1b52b0d7d117c8d6be4a364.yaml new file mode 100644 index 0000000000..689eca479f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-211f53d8b1b52b0d7d117c8d6be4a364.yaml @@ -0,0 +1,58 @@ +id: menu-ordering-reservations-211f53d8b1b52b0d7d117c8d6be4a364 + +info: + name: > + Restaurant Menu – Food Ordering System – Table Reservation <= 2.3.0 - Missing Authorization on AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01486af8-b378-4663-a9c5-167b8580db94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-ordering-reservations/" + google-query: inurl:"/wp-content/plugins/menu-ordering-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-ordering-reservations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-ordering-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-ordering-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-ordering-reservations-2624b69820d22e5b5127f2b411babf77.yaml b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-2624b69820d22e5b5127f2b411babf77.yaml new file mode 100644 index 0000000000..8de25cd930 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-2624b69820d22e5b5127f2b411babf77.yaml @@ -0,0 +1,58 @@ +id: menu-ordering-reservations-2624b69820d22e5b5127f2b411babf77 + +info: + name: > + Restaurant Menu – Food Ordering System – Table Reservation <= 2.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67fe46cd-a6c4-4d0a-842a-f61334559731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-ordering-reservations/" + google-query: inurl:"/wp-content/plugins/menu-ordering-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-ordering-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-ordering-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-ordering-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-ordering-reservations-52f3f56cac58e66f1b3bbe271591fbea.yaml b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-52f3f56cac58e66f1b3bbe271591fbea.yaml new file mode 100644 index 0000000000..678edac045 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-52f3f56cac58e66f1b3bbe271591fbea.yaml @@ -0,0 +1,58 @@ +id: menu-ordering-reservations-52f3f56cac58e66f1b3bbe271591fbea + +info: + name: > + Restaurant Menu – Food Ordering System – Table Reservation <= 2.3.5 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d87fd94-8a64-4b9b-9e51-025a689fa87b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-ordering-reservations/" + google-query: inurl:"/wp-content/plugins/menu-ordering-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-ordering-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-ordering-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-ordering-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-ordering-reservations-8a39f2bd8431601e1f483135ec0a1cca.yaml b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-8a39f2bd8431601e1f483135ec0a1cca.yaml new file mode 100644 index 0000000000..28591df948 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-8a39f2bd8431601e1f483135ec0a1cca.yaml @@ -0,0 +1,58 @@ +id: menu-ordering-reservations-8a39f2bd8431601e1f483135ec0a1cca + +info: + name: > + Menu - Ordering - Reservations <= 2.3.6 - Reflected Cross-Site Scripting via 'redirect' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/640f0b06-9af2-4b79-8f87-97f93b2c51c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-ordering-reservations/" + google-query: inurl:"/wp-content/plugins/menu-ordering-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-ordering-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-ordering-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-ordering-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-ordering-reservations-901a8544f8fe096e9fdc9630ea2bd15f.yaml b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-901a8544f8fe096e9fdc9630ea2bd15f.yaml new file mode 100644 index 0000000000..b03043dc38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-ordering-reservations-901a8544f8fe096e9fdc9630ea2bd15f.yaml @@ -0,0 +1,58 @@ +id: menu-ordering-reservations-901a8544f8fe096e9fdc9630ea2bd15f + +info: + name: > + Restaurant Menu – Food Ordering System – Table Reservation <= 2.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19202eb5-9a04-4484-8ca2-746610c31fe6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-ordering-reservations/" + google-query: inurl:"/wp-content/plugins/menu-ordering-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-ordering-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-ordering-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-ordering-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-shortcode-9fdc305e956b483dd32edefc410a0147.yaml b/nuclei-templates/cve-less/plugins/menu-shortcode-9fdc305e956b483dd32edefc410a0147.yaml new file mode 100644 index 0000000000..d49c7142c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-shortcode-9fdc305e956b483dd32edefc410a0147.yaml @@ -0,0 +1,58 @@ +id: menu-shortcode-9fdc305e956b483dd32edefc410a0147 + +info: + name: > + menu shortcode <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9150a7d9-d792-4bb6-9d33-5892f9cdfd1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-shortcode/" + google-query: inurl:"/wp-content/plugins/menu-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menu-swapper-d19b62fdb46f9085fa90ed6dd74d5a4a.yaml b/nuclei-templates/cve-less/plugins/menu-swapper-d19b62fdb46f9085fa90ed6dd74d5a4a.yaml new file mode 100644 index 0000000000..5e9cb4fc0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menu-swapper-d19b62fdb46f9085fa90ed6dd74d5a4a.yaml @@ -0,0 +1,58 @@ +id: menu-swapper-d19b62fdb46f9085fa90ed6dd74d5a4a + +info: + name: > + Menu Swapper <= 1.1.0.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49a04155-9fa8-45e0-b80b-3836d5271fa7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menu-swapper/" + google-query: inurl:"/wp-content/plugins/menu-swapper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menu-swapper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menu-swapper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menu-swapper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menubar-26d6e68f9f68d57837f1391aa39f629b.yaml b/nuclei-templates/cve-less/plugins/menubar-26d6e68f9f68d57837f1391aa39f629b.yaml new file mode 100644 index 0000000000..0b5e5c278f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menubar-26d6e68f9f68d57837f1391aa39f629b.yaml @@ -0,0 +1,58 @@ +id: menubar-26d6e68f9f68d57837f1391aa39f629b + +info: + name: > + Menubar <= 5.8.2 - Cross-Site Request Forgery in wpm-admin.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be10894d-2a86-4f07-8119-e6eac8c9c950?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menubar/" + google-query: inurl:"/wp-content/plugins/menubar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menubar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menubar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menubar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/menubar-fa79ef441dd7b35cf3488c2a42a0ef43.yaml b/nuclei-templates/cve-less/plugins/menubar-fa79ef441dd7b35cf3488c2a42a0ef43.yaml new file mode 100644 index 0000000000..9d698e8f37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/menubar-fa79ef441dd7b35cf3488c2a42a0ef43.yaml @@ -0,0 +1,58 @@ +id: menubar-fa79ef441dd7b35cf3488c2a42a0ef43 + +info: + name: > + Menubar <= 5.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/814f46c2-ac89-4743-81da-3b81a7853afc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/menubar/" + google-query: inurl:"/wp-content/plugins/menubar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,menubar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/menubar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "menubar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meow-gallery-66b4e3e9081347f407fc784e61ce0c30.yaml b/nuclei-templates/cve-less/plugins/meow-gallery-66b4e3e9081347f407fc784e61ce0c30.yaml new file mode 100644 index 0000000000..cc90162dcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meow-gallery-66b4e3e9081347f407fc784e61ce0c30.yaml @@ -0,0 +1,58 @@ +id: meow-gallery-66b4e3e9081347f407fc784e61ce0c30 + +info: + name: > + Meow Gallery (+ Gallery Block) <= 4.1.9 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67ae29ee-ec3d-41d2-8691-ba1c615d243d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meow-gallery/" + google-query: inurl:"/wp-content/plugins/meow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meow-gallery-c5cb3504c5d5a8aca1e1480362831116.yaml b/nuclei-templates/cve-less/plugins/meow-gallery-c5cb3504c5d5a8aca1e1480362831116.yaml new file mode 100644 index 0000000000..c8e60611f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meow-gallery-c5cb3504c5d5a8aca1e1480362831116.yaml @@ -0,0 +1,58 @@ +id: meow-gallery-c5cb3504c5d5a8aca1e1480362831116 + +info: + name: > + Gallery Block (Meow Gallery) <= 5.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/477b41a5-b2ff-4b94-9622-824146a0e2ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meow-gallery/" + google-query: inurl:"/wp-content/plugins/meow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meow-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meow-gallery-db3802f450d9e0fa899a4b52caf267f5.yaml b/nuclei-templates/cve-less/plugins/meow-gallery-db3802f450d9e0fa899a4b52caf267f5.yaml new file mode 100644 index 0000000000..16de5b0a87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meow-gallery-db3802f450d9e0fa899a4b52caf267f5.yaml @@ -0,0 +1,58 @@ +id: meow-gallery-db3802f450d9e0fa899a4b52caf267f5 + +info: + name: > + Meow Gallery (+ Gallery Block) <= 4.1.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bb17bd-c534-4b11-a1dd-7d2f2786ffec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meow-gallery/" + google-query: inurl:"/wp-content/plugins/meow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meow-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/merge-minify-refresh-19904e18d7847af1a770f2d024bfee5b.yaml b/nuclei-templates/cve-less/plugins/merge-minify-refresh-19904e18d7847af1a770f2d024bfee5b.yaml new file mode 100644 index 0000000000..138a3c180d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/merge-minify-refresh-19904e18d7847af1a770f2d024bfee5b.yaml @@ -0,0 +1,58 @@ +id: merge-minify-refresh-19904e18d7847af1a770f2d024bfee5b + +info: + name: > + Merge + Minify + Refresh <= 1.10.7 - Cross-Site Request Forgery leading to Arbitrary File Deletion and Site Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc9cb292-94cb-4d1e-a0b7-98856db7c28e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/merge-minify-refresh/" + google-query: inurl:"/wp-content/plugins/merge-minify-refresh/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,merge-minify-refresh,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/merge-minify-refresh/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "merge-minify-refresh" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mesmerize-companion-3816de1a2f06ca9d6d7c8b9dfb0a51bf.yaml b/nuclei-templates/cve-less/plugins/mesmerize-companion-3816de1a2f06ca9d6d7c8b9dfb0a51bf.yaml new file mode 100644 index 0000000000..155d17a9c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mesmerize-companion-3816de1a2f06ca9d6d7c8b9dfb0a51bf.yaml @@ -0,0 +1,58 @@ +id: mesmerize-companion-3816de1a2f06ca9d6d7c8b9dfb0a51bf + +info: + name: > + Mesmerize Companion <= 1.6.133 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3548241e-551e-427a-907c-50b4712b5e5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mesmerize-companion/" + google-query: inurl:"/wp-content/plugins/mesmerize-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mesmerize-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mesmerize-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mesmerize-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.133') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mesmerize-companion-a94f9a8cf90bb953afc0d4af139b3df4.yaml b/nuclei-templates/cve-less/plugins/mesmerize-companion-a94f9a8cf90bb953afc0d4af139b3df4.yaml new file mode 100644 index 0000000000..934b825bf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mesmerize-companion-a94f9a8cf90bb953afc0d4af139b3df4.yaml @@ -0,0 +1,58 @@ +id: mesmerize-companion-a94f9a8cf90bb953afc0d4af139b3df4 + +info: + name: > + Mesmerize Companion <= 1.6.148 - Authenticated (Contributor+) Stored Cross-Site Scripting via mesmerize_contact_form Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/521bb5a3-0a0c-4693-a87d-fabb64f1ad4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mesmerize-companion/" + google-query: inurl:"/wp-content/plugins/mesmerize-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mesmerize-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mesmerize-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mesmerize-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.148') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/message-ticker-5b0c7f3f3f3d8554824f38539044b215.yaml b/nuclei-templates/cve-less/plugins/message-ticker-5b0c7f3f3f3d8554824f38539044b215.yaml new file mode 100644 index 0000000000..bd55630f97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/message-ticker-5b0c7f3f3f3d8554824f38539044b215.yaml @@ -0,0 +1,58 @@ +id: message-ticker-5b0c7f3f3f3d8554824f38539044b215 + +info: + name: > + Message ticker <= 9.2 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0b1fa88-2fc6-41af-bd39-12af92dc6533?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/message-ticker/" + google-query: inurl:"/wp-content/plugins/message-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,message-ticker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/message-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "message-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meta-box-00301543cb972104eceace7da89e80f4.yaml b/nuclei-templates/cve-less/plugins/meta-box-00301543cb972104eceace7da89e80f4.yaml new file mode 100644 index 0000000000..78fcfa654c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meta-box-00301543cb972104eceace7da89e80f4.yaml @@ -0,0 +1,58 @@ +id: meta-box-00301543cb972104eceace7da89e80f4 + +info: + name: > + Meta Box – WordPress Custom Fields Framework <= 5.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a6bfc87-6135-4d49-baa2-e8e6291148dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meta-box/" + google-query: inurl:"/wp-content/plugins/meta-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meta-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meta-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meta-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meta-box-1b89ecf879d1fbee7de1501d6959af35.yaml b/nuclei-templates/cve-less/plugins/meta-box-1b89ecf879d1fbee7de1501d6959af35.yaml new file mode 100644 index 0000000000..a9c5e49e39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meta-box-1b89ecf879d1fbee7de1501d6959af35.yaml @@ -0,0 +1,58 @@ +id: meta-box-1b89ecf879d1fbee7de1501d6959af35 + +info: + name: > + Meta Box <= 4.16.1 - Mishandling of File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b5ef9de-ba5e-463e-a528-098d724b1657?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meta-box/" + google-query: inurl:"/wp-content/plugins/meta-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meta-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meta-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meta-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meta-box-dc129067ca38c26e19992abcd62ec625.yaml b/nuclei-templates/cve-less/plugins/meta-box-dc129067ca38c26e19992abcd62ec625.yaml new file mode 100644 index 0000000000..9e313edcdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meta-box-dc129067ca38c26e19992abcd62ec625.yaml @@ -0,0 +1,58 @@ +id: meta-box-dc129067ca38c26e19992abcd62ec625 + +info: + name: > + Meta Box – WordPress Custom Fields Framework <= 5.9.3 - Authenticated (Contributor+) Information Exposure via Post Meta + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6276a405-4879-4429-8fc1-2d567ded5112?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meta-box/" + google-query: inurl:"/wp-content/plugins/meta-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meta-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meta-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meta-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meta-box-fcea98b14977cde9054b36a1f61fabb1.yaml b/nuclei-templates/cve-less/plugins/meta-box-fcea98b14977cde9054b36a1f61fabb1.yaml new file mode 100644 index 0000000000..a335476122 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meta-box-fcea98b14977cde9054b36a1f61fabb1.yaml @@ -0,0 +1,58 @@ +id: meta-box-fcea98b14977cde9054b36a1f61fabb1 + +info: + name: > + Meta Box - WordPress Custom Fields Framework <= 4.16.2 - File Deletion via attachment_id Parameter + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8341c7fb-6f3f-45ee-86c3-9c9d2617594a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meta-box/" + google-query: inurl:"/wp-content/plugins/meta-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meta-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meta-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meta-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meta-slider-and-carousel-with-lightbox-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/meta-slider-and-carousel-with-lightbox-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..79a17607a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meta-slider-and-carousel-with-lightbox-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: meta-slider-and-carousel-with-lightbox-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meta-slider-and-carousel-with-lightbox/" + google-query: inurl:"/wp-content/plugins/meta-slider-and-carousel-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meta-slider-and-carousel-with-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meta-slider-and-carousel-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meta-slider-and-carousel-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meta-slider-and-carousel-with-lightbox-cfbe849419c020c14e6592e12a1dd070.yaml b/nuclei-templates/cve-less/plugins/meta-slider-and-carousel-with-lightbox-cfbe849419c020c14e6592e12a1dd070.yaml new file mode 100644 index 0000000000..cceccd3b21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meta-slider-and-carousel-with-lightbox-cfbe849419c020c14e6592e12a1dd070.yaml @@ -0,0 +1,58 @@ +id: meta-slider-and-carousel-with-lightbox-cfbe849419c020c14e6592e12a1dd070 + +info: + name: > + Meta Slider and Carousel with Lightbox <= 1.6.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5f59b16-b38a-451b-b220-044598872735?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meta-slider-and-carousel-with-lightbox/" + google-query: inurl:"/wp-content/plugins/meta-slider-and-carousel-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meta-slider-and-carousel-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meta-slider-and-carousel-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meta-slider-and-carousel-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meta-tag-manager-85f58ceac5f2aff68a6dbc6ee57ae093.yaml b/nuclei-templates/cve-less/plugins/meta-tag-manager-85f58ceac5f2aff68a6dbc6ee57ae093.yaml new file mode 100644 index 0000000000..785b8004ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meta-tag-manager-85f58ceac5f2aff68a6dbc6ee57ae093.yaml @@ -0,0 +1,58 @@ +id: meta-tag-manager-85f58ceac5f2aff68a6dbc6ee57ae093 + +info: + name: > + Meta Tag Manager <= 3.0.2 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ec1aed2-d299-4fa9-add6-10b63ed6aa30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meta-tag-manager/" + google-query: inurl:"/wp-content/plugins/meta-tag-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meta-tag-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meta-tag-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meta-tag-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meta-tags-for-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/meta-tags-for-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ab78b589c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meta-tags-for-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: meta-tags-for-seo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meta-tags-for-seo/" + google-query: inurl:"/wp-content/plugins/meta-tags-for-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meta-tags-for-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meta-tags-for-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meta-tags-for-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/meteor-slides-d785c662ffdd5bb603cbd342128e597d.yaml b/nuclei-templates/cve-less/plugins/meteor-slides-d785c662ffdd5bb603cbd342128e597d.yaml new file mode 100644 index 0000000000..53b2d5f6a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/meteor-slides-d785c662ffdd5bb603cbd342128e597d.yaml @@ -0,0 +1,58 @@ +id: meteor-slides-d785c662ffdd5bb603cbd342128e597d + +info: + name: > + Meteor Slides <= 1.5.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/108e9578-e586-4ed8-b0b2-dc6c26bf530e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meteor-slides/" + google-query: inurl:"/wp-content/plugins/meteor-slides/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meteor-slides,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meteor-slides/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meteor-slides" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-0a04782a874d0e98b450ea3140cd608d.yaml b/nuclei-templates/cve-less/plugins/metform-0a04782a874d0e98b450ea3140cd608d.yaml new file mode 100644 index 0000000000..4f4e9c38e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-0a04782a874d0e98b450ea3140cd608d.yaml @@ -0,0 +1,58 @@ +id: metform-0a04782a874d0e98b450ea3140cd608d + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.2 - Cross-Site Request Forgery via permalink_setup + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca66afc3-a749-4ddc-8e2f-959f65cebd45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-1cd960c12693f517a3ddc1f2dd996093.yaml b/nuclei-templates/cve-less/plugins/metform-1cd960c12693f517a3ddc1f2dd996093.yaml new file mode 100644 index 0000000000..6eba79b9c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-1cd960c12693f517a3ddc1f2dd996093.yaml @@ -0,0 +1,58 @@ +id: metform-1cd960c12693f517a3ddc1f2dd996093 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via mf_last_name shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25200656-a6a2-42f2-a607-26d4ff502cbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-1e853b05728a99a8747a224a5333ce69.yaml b/nuclei-templates/cve-less/plugins/metform-1e853b05728a99a8747a224a5333ce69.yaml new file mode 100644 index 0000000000..9d6255f70d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-1e853b05728a99a8747a224a5333ce69.yaml @@ -0,0 +1,58 @@ +id: metform-1e853b05728a99a8747a224a5333ce69 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.1 - Authenticated (Subscriber+) Information Disclosure via mf_thankyou shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81fc41a4-9206-404c-bd5b-821c77ff3593?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-1ececa6da15663bf0de4cd1f9cf0b9d9.yaml b/nuclei-templates/cve-less/plugins/metform-1ececa6da15663bf0de4cd1f9cf0b9d9.yaml new file mode 100644 index 0000000000..e6976af3e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-1ececa6da15663bf0de4cd1f9cf0b9d9.yaml @@ -0,0 +1,58 @@ +id: metform-1ececa6da15663bf0de4cd1f9cf0b9d9 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.0 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccd85a72-1872-4c4f-8ba7-7f91b0b37d4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-2f98768ab3ca0c5e24ef32eeb6e8633c.yaml b/nuclei-templates/cve-less/plugins/metform-2f98768ab3ca0c5e24ef32eeb6e8633c.yaml new file mode 100644 index 0000000000..5eeb88e537 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-2f98768ab3ca0c5e24ef32eeb6e8633c.yaml @@ -0,0 +1,58 @@ +id: metform-2f98768ab3ca0c5e24ef32eeb6e8633c + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via mf shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c866d8d-399c-4bda-a3c9-17c7e5d2ffb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-4069751e80b8d8e6ebfbb3d8b76ab1b9.yaml b/nuclei-templates/cve-less/plugins/metform-4069751e80b8d8e6ebfbb3d8b76ab1b9.yaml new file mode 100644 index 0000000000..f77ae04c03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-4069751e80b8d8e6ebfbb3d8b76ab1b9.yaml @@ -0,0 +1,58 @@ +id: metform-4069751e80b8d8e6ebfbb3d8b76ab1b9 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.8.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Widgets + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dad759d-9b44-47ca-8410-e39f65dc919c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-547f6d438086b7c901daed3b548b280c.yaml b/nuclei-templates/cve-less/plugins/metform-547f6d438086b7c901daed3b548b280c.yaml new file mode 100644 index 0000000000..32a1a251cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-547f6d438086b7c901daed3b548b280c.yaml @@ -0,0 +1,58 @@ +id: metform-547f6d438086b7c901daed3b548b280c + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via mf_thankyou shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89a98053-33c7-4e75-87a1-0f483a990641?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-5821b8bbdf52273dc284ba9fb20cfb12.yaml b/nuclei-templates/cve-less/plugins/metform-5821b8bbdf52273dc284ba9fb20cfb12.yaml new file mode 100644 index 0000000000..9808753522 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-5821b8bbdf52273dc284ba9fb20cfb12.yaml @@ -0,0 +1,58 @@ +id: metform-5821b8bbdf52273dc284ba9fb20cfb12 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5db00eb6-3e05-42fa-bb84-2df4bcae3955?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-5ca6c532bc755bf0bf6cce4098713b54.yaml b/nuclei-templates/cve-less/plugins/metform-5ca6c532bc755bf0bf6cce4098713b54.yaml new file mode 100644 index 0000000000..ee4a3c54b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-5ca6c532bc755bf0bf6cce4098713b54.yaml @@ -0,0 +1,58 @@ +id: metform-5ca6c532bc755bf0bf6cce4098713b54 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.1 - Authenticated (Subscriber+) Information Disclosure via 'mf_first_name' shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/356cf06e-16e7-438b-83b5-c8a52a21f903?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-654990e546559285765575a21c3a354c.yaml b/nuclei-templates/cve-less/plugins/metform-654990e546559285765575a21c3a354c.yaml new file mode 100644 index 0000000000..9e7a62939b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-654990e546559285765575a21c3a354c.yaml @@ -0,0 +1,58 @@ +id: metform-654990e546559285765575a21c3a354c + +info: + name: > + Metform Elementor Contact Form Builder <= 3.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30fd2425-ee48-4777-91c1-03906d63793a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-7ec1193c499ff8ca62486bd031ee3b72.yaml b/nuclei-templates/cve-less/plugins/metform-7ec1193c499ff8ca62486bd031ee3b72.yaml new file mode 100644 index 0000000000..2f8115e5b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-7ec1193c499ff8ca62486bd031ee3b72.yaml @@ -0,0 +1,58 @@ +id: metform-7ec1193c499ff8ca62486bd031ee3b72 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via mf_first_name shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae7549db-9a4b-4dee-8023-d7863dc3b4c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-80129a218b0d8978bbb5382fd0cace63.yaml b/nuclei-templates/cve-less/plugins/metform-80129a218b0d8978bbb5382fd0cace63.yaml new file mode 100644 index 0000000000..d606558386 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-80129a218b0d8978bbb5382fd0cace63.yaml @@ -0,0 +1,58 @@ +id: metform-80129a218b0d8978bbb5382fd0cace63 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.8.3 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/342d6941-6987-4756-b554-1699128b9108?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-867cb44fcfb4a79db1df0d5c41aba304.yaml b/nuclei-templates/cve-less/plugins/metform-867cb44fcfb4a79db1df0d5c41aba304.yaml new file mode 100644 index 0000000000..22031835fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-867cb44fcfb4a79db1df0d5c41aba304.yaml @@ -0,0 +1,58 @@ +id: metform-867cb44fcfb4a79db1df0d5c41aba304 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.1 - Authenticated (Subscriber+) Information Disclosure via 'mf_transaction_id' shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f33a8db-7cd0-4a53-b2c1-cd5b7cd16214?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-9a3f3b16255e398a1ca1a217f9b4775c.yaml b/nuclei-templates/cve-less/plugins/metform-9a3f3b16255e398a1ca1a217f9b4775c.yaml new file mode 100644 index 0000000000..98006d14fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-9a3f3b16255e398a1ca1a217f9b4775c.yaml @@ -0,0 +1,58 @@ +id: metform-9a3f3b16255e398a1ca1a217f9b4775c + +info: + name: > + Metform Elementor Contact Form Builder <= 3.1.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05f7d9fe-e95f-4ddf-9bce-2aeac3c2e946?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-a94be3f467ceacb837ea20db05393018.yaml b/nuclei-templates/cve-less/plugins/metform-a94be3f467ceacb837ea20db05393018.yaml new file mode 100644 index 0000000000..7908bbcdac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-a94be3f467ceacb837ea20db05393018.yaml @@ -0,0 +1,58 @@ +id: metform-a94be3f467ceacb837ea20db05393018 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.8.3 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/996d1514-2c1f-4888-ac2f-bc58e926d3ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-b8d7c77a852c836225d21aa48dc5ba53.yaml b/nuclei-templates/cve-less/plugins/metform-b8d7c77a852c836225d21aa48dc5ba53.yaml new file mode 100644 index 0000000000..926a8dcbb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-b8d7c77a852c836225d21aa48dc5ba53.yaml @@ -0,0 +1,58 @@ +id: metform-b8d7c77a852c836225d21aa48dc5ba53 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.2.1 - reCaptcha Protection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69527d4b-49b6-47cd-93b6-39350f881ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-bd74a2b3418b2ca97de6f6d3609c3ea2.yaml b/nuclei-templates/cve-less/plugins/metform-bd74a2b3418b2ca97de6f6d3609c3ea2.yaml new file mode 100644 index 0000000000..12703d7242 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-bd74a2b3418b2ca97de6f6d3609c3ea2.yaml @@ -0,0 +1,58 @@ +id: metform-bd74a2b3418b2ca97de6f6d3609c3ea2 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.1 - Authenticated (Subscriber+) Information Disclosure via mf_last_name shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fc4b815-dc05-4270-bf7a-3b01622739d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-cb9d0b1e1071125567f9f9731a764d07.yaml b/nuclei-templates/cve-less/plugins/metform-cb9d0b1e1071125567f9f9731a764d07.yaml new file mode 100644 index 0000000000..a50da6320e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-cb9d0b1e1071125567f9f9731a764d07.yaml @@ -0,0 +1,58 @@ +id: metform-cb9d0b1e1071125567f9f9731a764d07 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.1 - Authenticated (Subscriber+) Information Disclosure via mf shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a8b194c-371f-4adc-98fa-8f4e47a38ee7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-dc74f0149670643ede0c882a9a3fc584.yaml b/nuclei-templates/cve-less/plugins/metform-dc74f0149670643ede0c882a9a3fc584.yaml new file mode 100644 index 0000000000..ef73040e99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-dc74f0149670643ede0c882a9a3fc584.yaml @@ -0,0 +1,58 @@ +id: metform-dc74f0149670643ede0c882a9a3fc584 + +info: + name: > + Metform Elementor Contact Form Builder <= 3.4.0 - Missing Authorization via submit + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6425d39-cc8b-4130-8f67-2d6de7954934?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-e1d3d2561a3fd7b42de1d4a0992e9e3d.yaml b/nuclei-templates/cve-less/plugins/metform-e1d3d2561a3fd7b42de1d4a0992e9e3d.yaml new file mode 100644 index 0000000000..5f1e843fe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-e1d3d2561a3fd7b42de1d4a0992e9e3d.yaml @@ -0,0 +1,58 @@ +id: metform-e1d3d2561a3fd7b42de1d4a0992e9e3d + +info: + name: > + Metform Elementor Contact Form Builder <= 2.1.3 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04a46249-b5b2-4082-b520-cdc4a1370bb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metform-f16e74cd433857af6e0b58aa13a15fac.yaml b/nuclei-templates/cve-less/plugins/metform-f16e74cd433857af6e0b58aa13a15fac.yaml new file mode 100644 index 0000000000..e2257f6b83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metform-f16e74cd433857af6e0b58aa13a15fac.yaml @@ -0,0 +1,58 @@ +id: metform-f16e74cd433857af6e0b58aa13a15fac + +info: + name: > + Metform Elementor Contact Form Builder <= 3.3.1 - Authenticated (Subscriber+) Information Disclosure via 'mf_payment_status' shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd85ff2-6607-4ac8-b91c-88f6f2fa6c56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metform/" + google-query: inurl:"/wp-content/plugins/metform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metricool-7746f8e1b3332b64c44418f10c52b872.yaml b/nuclei-templates/cve-less/plugins/metricool-7746f8e1b3332b64c44418f10c52b872.yaml new file mode 100644 index 0000000000..6b251c5442 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metricool-7746f8e1b3332b64c44418f10c52b872.yaml @@ -0,0 +1,58 @@ +id: metricool-7746f8e1b3332b64c44418f10c52b872 + +info: + name: > + Metricool <= 1.17 - Authenticated (Administrator+) Stored Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e36e5099-c5ff-4794-b7df-25d8eab27bac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metricool/" + google-query: inurl:"/wp-content/plugins/metricool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metricool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metricool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metricool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/metronet-tag-manager-3d637613552d802b9173bc064749bb1c.yaml b/nuclei-templates/cve-less/plugins/metronet-tag-manager-3d637613552d802b9173bc064749bb1c.yaml new file mode 100644 index 0000000000..8a34088d01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/metronet-tag-manager-3d637613552d802b9173bc064749bb1c.yaml @@ -0,0 +1,58 @@ +id: metronet-tag-manager-3d637613552d802b9173bc064749bb1c + +info: + name: > + Metronet Tag Manager < 1.2.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9ead8f1-f2d7-4087-bb6c-de15bf8318a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/metronet-tag-manager/" + google-query: inurl:"/wp-content/plugins/metronet-tag-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,metronet-tag-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/metronet-tag-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metronet-tag-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mf-gig-calendar-2569de726bff5107260fe23150979031.yaml b/nuclei-templates/cve-less/plugins/mf-gig-calendar-2569de726bff5107260fe23150979031.yaml new file mode 100644 index 0000000000..c69f4bf7c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mf-gig-calendar-2569de726bff5107260fe23150979031.yaml @@ -0,0 +1,58 @@ +id: mf-gig-calendar-2569de726bff5107260fe23150979031 + +info: + name: > + MF Gig Calendar <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via event_title and event_time + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93029d39-adaa-4cf6-9081-28c9e84ec2e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mf-gig-calendar/" + google-query: inurl:"/wp-content/plugins/mf-gig-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mf-gig-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mf-gig-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mf-gig-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mf-gig-calendar-3b4cfef4125eaa81be8aa8c8ba6a4733.yaml b/nuclei-templates/cve-less/plugins/mf-gig-calendar-3b4cfef4125eaa81be8aa8c8ba6a4733.yaml new file mode 100644 index 0000000000..9e8d8d0936 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mf-gig-calendar-3b4cfef4125eaa81be8aa8c8ba6a4733.yaml @@ -0,0 +1,58 @@ +id: mf-gig-calendar-3b4cfef4125eaa81be8aa8c8ba6a4733 + +info: + name: > + MF Gig Calendar <= 1.2.1 - Cross-Site Request Forgery to Event Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de7b68e2-9cae-4e6f-a625-d8346836da39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mf-gig-calendar/" + google-query: inurl:"/wp-content/plugins/mf-gig-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mf-gig-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mf-gig-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mf-gig-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mf-gig-calendar-4e3d792205a2fddf6adf72e5213cb0d5.yaml b/nuclei-templates/cve-less/plugins/mf-gig-calendar-4e3d792205a2fddf6adf72e5213cb0d5.yaml new file mode 100644 index 0000000000..4393d27680 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mf-gig-calendar-4e3d792205a2fddf6adf72e5213cb0d5.yaml @@ -0,0 +1,58 @@ +id: mf-gig-calendar-4e3d792205a2fddf6adf72e5213cb0d5 + +info: + name: > + MF Gig Calendar <=1.2.1 - Authenticated(Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d977636-a509-4f32-9ad3-762720fdb433?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mf-gig-calendar/" + google-query: inurl:"/wp-content/plugins/mf-gig-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mf-gig-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mf-gig-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mf-gig-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mf-gig-calendar-6597d2336023fb01ba6013c2a92f4f5a.yaml b/nuclei-templates/cve-less/plugins/mf-gig-calendar-6597d2336023fb01ba6013c2a92f4f5a.yaml new file mode 100644 index 0000000000..a96150e695 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mf-gig-calendar-6597d2336023fb01ba6013c2a92f4f5a.yaml @@ -0,0 +1,58 @@ +id: mf-gig-calendar-6597d2336023fb01ba6013c2a92f4f5a + +info: + name: > + MF Gig Calendar <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae17154-bd68-4260-9b3a-bb73f2a70694?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mf-gig-calendar/" + google-query: inurl:"/wp-content/plugins/mf-gig-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mf-gig-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mf-gig-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mf-gig-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mf-gig-calendar-abea62bbd724165a2322bff6349a74e0.yaml b/nuclei-templates/cve-less/plugins/mf-gig-calendar-abea62bbd724165a2322bff6349a74e0.yaml new file mode 100644 index 0000000000..91302c83d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mf-gig-calendar-abea62bbd724165a2322bff6349a74e0.yaml @@ -0,0 +1,58 @@ +id: mf-gig-calendar-abea62bbd724165a2322bff6349a74e0 + +info: + name: > + MF Gig Calendar <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dba7f15a-29f8-4c7b-b506-7e82c563c6a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mf-gig-calendar/" + google-query: inurl:"/wp-content/plugins/mf-gig-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mf-gig-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mf-gig-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mf-gig-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mf-gig-calendar-bf34e0d076673dbb1080a2742b54fd0c.yaml b/nuclei-templates/cve-less/plugins/mf-gig-calendar-bf34e0d076673dbb1080a2742b54fd0c.yaml new file mode 100644 index 0000000000..682f9a0223 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mf-gig-calendar-bf34e0d076673dbb1080a2742b54fd0c.yaml @@ -0,0 +1,58 @@ +id: mf-gig-calendar-bf34e0d076673dbb1080a2742b54fd0c + +info: + name: > + MF Gig Calendar <= 0.9.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4ba2243-8a4f-4ecb-8f77-6f4fd24865e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mf-gig-calendar/" + google-query: inurl:"/wp-content/plugins/mf-gig-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mf-gig-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mf-gig-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mf-gig-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mf-gig-calendar-d0c53aa3e05b1c3e9ba3c621e2806fb1.yaml b/nuclei-templates/cve-less/plugins/mf-gig-calendar-d0c53aa3e05b1c3e9ba3c621e2806fb1.yaml new file mode 100644 index 0000000000..16af55c5f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mf-gig-calendar-d0c53aa3e05b1c3e9ba3c621e2806fb1.yaml @@ -0,0 +1,58 @@ +id: mf-gig-calendar-d0c53aa3e05b1c3e9ba3c621e2806fb1 + +info: + name: > + MF Gig Calendar <= 1.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6c1a446-055b-4ac4-bceb-451c0fbe6369?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mf-gig-calendar/" + google-query: inurl:"/wp-content/plugins/mf-gig-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mf-gig-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mf-gig-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mf-gig-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mgl-instagram-gallery-fe1f1b8568ab900402e4ee21af348064.yaml b/nuclei-templates/cve-less/plugins/mgl-instagram-gallery-fe1f1b8568ab900402e4ee21af348064.yaml new file mode 100644 index 0000000000..58815e0b80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mgl-instagram-gallery-fe1f1b8568ab900402e4ee21af348064.yaml @@ -0,0 +1,58 @@ +id: mgl-instagram-gallery-fe1f1b8568ab900402e4ee21af348064 + +info: + name: > + mgl-instagram-gallery Plugin (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dad7078d-16bf-4ca9-9a59-7b8374a1b49e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mgl-instagram-gallery/" + google-query: inurl:"/wp-content/plugins/mgl-instagram-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mgl-instagram-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mgl-instagram-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mgl-instagram-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mhr-post-ticker-ff23d770fb11fdc3c77523a1486cf3a6.yaml b/nuclei-templates/cve-less/plugins/mhr-post-ticker-ff23d770fb11fdc3c77523a1486cf3a6.yaml new file mode 100644 index 0000000000..1d61f07d93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mhr-post-ticker-ff23d770fb11fdc3c77523a1486cf3a6.yaml @@ -0,0 +1,58 @@ +id: mhr-post-ticker-ff23d770fb11fdc3c77523a1486cf3a6 + +info: + name: > + Mhr Post Ticker <= 1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f89bb45-2872-4081-a3b8-a1f11bbdbc55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mhr-post-ticker/" + google-query: inurl:"/wp-content/plugins/mhr-post-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mhr-post-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mhr-post-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mhr-post-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/microaudio-c7d6824255615bb5cf89bed6fab2e902.yaml b/nuclei-templates/cve-less/plugins/microaudio-c7d6824255615bb5cf89bed6fab2e902.yaml new file mode 100644 index 0000000000..878973a5ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/microaudio-c7d6824255615bb5cf89bed6fab2e902.yaml @@ -0,0 +1,58 @@ +id: microaudio-c7d6824255615bb5cf89bed6fab2e902 + +info: + name: > + µAudio Player <= 0.6.2 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/634303eb-b120-4384-9780-b950de491099?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/microaudio/" + google-query: inurl:"/wp-content/plugins/microaudio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,microaudio,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/microaudio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "microaudio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/microblog-poster-02bdb4a60f8caf982b09839a595e4b9c.yaml b/nuclei-templates/cve-less/plugins/microblog-poster-02bdb4a60f8caf982b09839a595e4b9c.yaml new file mode 100644 index 0000000000..2e1315ddf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/microblog-poster-02bdb4a60f8caf982b09839a595e4b9c.yaml @@ -0,0 +1,58 @@ +id: microblog-poster-02bdb4a60f8caf982b09839a595e4b9c + +info: + name: > + Microblog Poster < 1.6.2 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fbf8a8f-56f7-42ae-bf96-30a2df6da378?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/microblog-poster/" + google-query: inurl:"/wp-content/plugins/microblog-poster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,microblog-poster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/microblog-poster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "microblog-poster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/microcopy-f8764dadc75611aef7a1572c7ab006f8.yaml b/nuclei-templates/cve-less/plugins/microcopy-f8764dadc75611aef7a1572c7ab006f8.yaml new file mode 100644 index 0000000000..3725b04ebf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/microcopy-f8764dadc75611aef7a1572c7ab006f8.yaml @@ -0,0 +1,58 @@ +id: microcopy-f8764dadc75611aef7a1572c7ab006f8 + +info: + name: > + MicroCopy <= 1.1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/637af5d1-eed3-4216-8d47-e68f83c63f43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/microcopy/" + google-query: inurl:"/wp-content/plugins/microcopy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,microcopy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/microcopy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "microcopy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/microkids-related-posts-356ad590173ed87428302fe3f1cc7ead.yaml b/nuclei-templates/cve-less/plugins/microkids-related-posts-356ad590173ed87428302fe3f1cc7ead.yaml new file mode 100644 index 0000000000..27a75207aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/microkids-related-posts-356ad590173ed87428302fe3f1cc7ead.yaml @@ -0,0 +1,58 @@ +id: microkids-related-posts-356ad590173ed87428302fe3f1cc7ead + +info: + name: > + Related Posts for WordPress <= 4.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/308c9d72-4739-4fcd-8e04-b24edc19ec06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/microkids-related-posts/" + google-query: inurl:"/wp-content/plugins/microkids-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,microkids-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/microkids-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "microkids-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/microsoft-advertising-universal-event-tracking-uet-4a64b780bf144c05e7e8310b30ac549a.yaml b/nuclei-templates/cve-less/plugins/microsoft-advertising-universal-event-tracking-uet-4a64b780bf144c05e7e8310b30ac549a.yaml new file mode 100644 index 0000000000..249a8ca4cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/microsoft-advertising-universal-event-tracking-uet-4a64b780bf144c05e7e8310b30ac549a.yaml @@ -0,0 +1,58 @@ +id: microsoft-advertising-universal-event-tracking-uet-4a64b780bf144c05e7e8310b30ac549a + +info: + name: > + Microsoft Advertising Universal Event Tracking (UET) <= 1.0.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be374684-bb02-4d2c-b8a0-ed435c7c8569?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/microsoft-advertising-universal-event-tracking-uet/" + google-query: inurl:"/wp-content/plugins/microsoft-advertising-universal-event-tracking-uet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,microsoft-advertising-universal-event-tracking-uet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/microsoft-advertising-universal-event-tracking-uet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "microsoft-advertising-universal-event-tracking-uet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/microsoft-clarity-41374c7f8d145b4ed7aa35f41d920496.yaml b/nuclei-templates/cve-less/plugins/microsoft-clarity-41374c7f8d145b4ed7aa35f41d920496.yaml new file mode 100644 index 0000000000..3d2325ec6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/microsoft-clarity-41374c7f8d145b4ed7aa35f41d920496.yaml @@ -0,0 +1,58 @@ +id: microsoft-clarity-41374c7f8d145b4ed7aa35f41d920496 + +info: + name: > + Microsoft Clarity <= 0.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da3070aa-fae8-465a-95e5-ae92dcd89f66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/microsoft-clarity/" + google-query: inurl:"/wp-content/plugins/microsoft-clarity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,microsoft-clarity,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/microsoft-clarity/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "microsoft-clarity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/microsoft-clarity-e52bfc62f1976371888e01a2d756b470.yaml b/nuclei-templates/cve-less/plugins/microsoft-clarity-e52bfc62f1976371888e01a2d756b470.yaml new file mode 100644 index 0000000000..38e7c80547 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/microsoft-clarity-e52bfc62f1976371888e01a2d756b470.yaml @@ -0,0 +1,58 @@ +id: microsoft-clarity-e52bfc62f1976371888e01a2d756b470 + +info: + name: > + Microsoft Clarity <= 0.9.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2f4461b-1373-4d09-8430-14d1961e1644?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/microsoft-clarity/" + google-query: inurl:"/wp-content/plugins/microsoft-clarity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,microsoft-clarity,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/microsoft-clarity/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "microsoft-clarity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mighty-addons-57c5519a5f47ee08f543aeb9d674466b.yaml b/nuclei-templates/cve-less/plugins/mighty-addons-57c5519a5f47ee08f543aeb9d674466b.yaml new file mode 100644 index 0000000000..753d40c10f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mighty-addons-57c5519a5f47ee08f543aeb9d674466b.yaml @@ -0,0 +1,58 @@ +id: mighty-addons-57c5519a5f47ee08f543aeb9d674466b + +info: + name: > + Mighty Addons for Elementor <= 1.9.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/484d8d14-049d-4fd5-adb8-ad9942bba794?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mighty-addons/" + google-query: inurl:"/wp-content/plugins/mighty-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mighty-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mighty-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mighty-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/migrate-users-2bf14b27cfeeb5a91ab7cdef09310906.yaml b/nuclei-templates/cve-less/plugins/migrate-users-2bf14b27cfeeb5a91ab7cdef09310906.yaml new file mode 100644 index 0000000000..3624fa6e7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/migrate-users-2bf14b27cfeeb5a91ab7cdef09310906.yaml @@ -0,0 +1,58 @@ +id: migrate-users-2bf14b27cfeeb5a91ab7cdef09310906 + +info: + name: > + Migrate Users <= 1.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1925082-eeee-4472-9721-c6205782d567?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/migrate-users/" + google-query: inurl:"/wp-content/plugins/migrate-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,migrate-users,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/migrate-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "migrate-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mihanpanel-lite-fe8e1355a12b62369103d3644c987bb7.yaml b/nuclei-templates/cve-less/plugins/mihanpanel-lite-fe8e1355a12b62369103d3644c987bb7.yaml new file mode 100644 index 0000000000..b9589869bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mihanpanel-lite-fe8e1355a12b62369103d3644c987bb7.yaml @@ -0,0 +1,58 @@ +id: mihanpanel-lite-fe8e1355a12b62369103d3644c987bb7 + +info: + name: > + MihanPanel <= 12.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef528553-4037-43e0-af2d-8324412147f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mihanpanel-lite/" + google-query: inurl:"/wp-content/plugins/mihanpanel-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mihanpanel-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mihanpanel-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mihanpanel-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mihdan-index-now-5f88cf9fcaa2bf2f8f88d764e30b12bd.yaml b/nuclei-templates/cve-less/plugins/mihdan-index-now-5f88cf9fcaa2bf2f8f88d764e30b12bd.yaml new file mode 100644 index 0000000000..e0098064fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mihdan-index-now-5f88cf9fcaa2bf2f8f88d764e30b12bd.yaml @@ -0,0 +1,58 @@ +id: mihdan-index-now-5f88cf9fcaa2bf2f8f88d764e30b12bd + +info: + name: > + Index Now <= 2.6.3 - Cross-Site Request Forgery via reset_form + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7641d52-e930-4143-9180-2903d018da91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mihdan-index-now/" + google-query: inurl:"/wp-content/plugins/mihdan-index-now/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mihdan-index-now,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mihdan-index-now/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mihdan-index-now" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mihdan-no-external-links-115be693fa2aef7e78774bec69a9ed0c.yaml b/nuclei-templates/cve-less/plugins/mihdan-no-external-links-115be693fa2aef7e78774bec69a9ed0c.yaml new file mode 100644 index 0000000000..6810896880 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mihdan-no-external-links-115be693fa2aef7e78774bec69a9ed0c.yaml @@ -0,0 +1,58 @@ +id: mihdan-no-external-links-115be693fa2aef7e78774bec69a9ed0c + +info: + name: > + Mihdan: No External Links <= 4.7.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7778de0-591e-469a-acb2-5a66490a4690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mihdan-no-external-links/" + google-query: inurl:"/wp-content/plugins/mihdan-no-external-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mihdan-no-external-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mihdan-no-external-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mihdan-no-external-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mihdan-public-post-preview-1e5ebadce2a1ab9a5fd9a23d7bb80d5b.yaml b/nuclei-templates/cve-less/plugins/mihdan-public-post-preview-1e5ebadce2a1ab9a5fd9a23d7bb80d5b.yaml new file mode 100644 index 0000000000..2f394e7b84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mihdan-public-post-preview-1e5ebadce2a1ab9a5fd9a23d7bb80d5b.yaml @@ -0,0 +1,58 @@ +id: mihdan-public-post-preview-1e5ebadce2a1ab9a5fd9a23d7bb80d5b + +info: + name: > + Mihdan: Public Post Preview <= 1.9.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdb8cb7f-38fc-41d7-aa78-abe11c6402b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mihdan-public-post-preview/" + google-query: inurl:"/wp-content/plugins/mihdan-public-post-preview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mihdan-public-post-preview,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mihdan-public-post-preview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mihdan-public-post-preview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mihdan-yandex-turbo-feed-3155835b4a53204a1664eff58384d4a4.yaml b/nuclei-templates/cve-less/plugins/mihdan-yandex-turbo-feed-3155835b4a53204a1664eff58384d4a4.yaml new file mode 100644 index 0000000000..c26b767341 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mihdan-yandex-turbo-feed-3155835b4a53204a1664eff58384d4a4.yaml @@ -0,0 +1,58 @@ +id: mihdan-yandex-turbo-feed-3155835b4a53204a1664eff58384d4a4 + +info: + name: > + Mihdan: Yandex Turbo Feed <= 1.6.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ecf99ef-f879-426f-8a05-129be77f1157?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mihdan-yandex-turbo-feed/" + google-query: inurl:"/wp-content/plugins/mihdan-yandex-turbo-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mihdan-yandex-turbo-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mihdan-yandex-turbo-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mihdan-yandex-turbo-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mikiurl-wordpress-eklentisi-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml b/nuclei-templates/cve-less/plugins/mikiurl-wordpress-eklentisi-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml new file mode 100644 index 0000000000..691bc79626 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mikiurl-wordpress-eklentisi-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml @@ -0,0 +1,58 @@ +id: mikiurl-wordpress-eklentisi-a8ffd5b000a53e3a5bfd7f4581d6cb26 + +info: + name: > + Mikiurl Wordpress Eklentisi <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcf4a063-6954-4414-a2ee-d92f4192f4d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mikiurl-wordpress-eklentisi/" + google-query: inurl:"/wp-content/plugins/mikiurl-wordpress-eklentisi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mikiurl-wordpress-eklentisi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mikiurl-wordpress-eklentisi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mikiurl-wordpress-eklentisi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mimetic-books-a4f62ab934de0d3b7e3d119485cf9183.yaml b/nuclei-templates/cve-less/plugins/mimetic-books-a4f62ab934de0d3b7e3d119485cf9183.yaml new file mode 100644 index 0000000000..49b3f7f38d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mimetic-books-a4f62ab934de0d3b7e3d119485cf9183.yaml @@ -0,0 +1,58 @@ +id: mimetic-books-a4f62ab934de0d3b7e3d119485cf9183 + +info: + name: > + Mimetic Books <= 0.2.13 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bca364b-c8dc-4c32-a640-0e9f3155a40f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mimetic-books/" + google-query: inurl:"/wp-content/plugins/mimetic-books/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mimetic-books,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mimetic-books/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mimetic-books" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/min-and-max-purchase-for-woocommerce-e69e5ad6d5e1c350a8e72b9f067b0efd.yaml b/nuclei-templates/cve-less/plugins/min-and-max-purchase-for-woocommerce-e69e5ad6d5e1c350a8e72b9f067b0efd.yaml new file mode 100644 index 0000000000..7a68602f0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/min-and-max-purchase-for-woocommerce-e69e5ad6d5e1c350a8e72b9f067b0efd.yaml @@ -0,0 +1,58 @@ +id: min-and-max-purchase-for-woocommerce-e69e5ad6d5e1c350a8e72b9f067b0efd + +info: + name: > + Min and Max Purchase for WooCommerce <= 2.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b038c9e-9053-43aa-99f2-cba660d2a7ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/min-and-max-purchase-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/min-and-max-purchase-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,min-and-max-purchase-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/min-and-max-purchase-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "min-and-max-purchase-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mindbody-access-management-9f9a85cc7dcde674a13dc865058427ba.yaml b/nuclei-templates/cve-less/plugins/mindbody-access-management-9f9a85cc7dcde674a13dc865058427ba.yaml new file mode 100644 index 0000000000..3c4343d69a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mindbody-access-management-9f9a85cc7dcde674a13dc865058427ba.yaml @@ -0,0 +1,58 @@ +id: mindbody-access-management-9f9a85cc7dcde674a13dc865058427ba + +info: + name: > + MZ MBO Access <= 2.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d18c17f1-7b85-46d6-a92e-948be98adf87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mindbody-access-management/" + google-query: inurl:"/wp-content/plugins/mindbody-access-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mindbody-access-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mindbody-access-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mindbody-access-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mingle-forum-4a9495cead71bfc76b3becea53804acd.yaml b/nuclei-templates/cve-less/plugins/mingle-forum-4a9495cead71bfc76b3becea53804acd.yaml new file mode 100644 index 0000000000..efd1bc2f24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mingle-forum-4a9495cead71bfc76b3becea53804acd.yaml @@ -0,0 +1,58 @@ +id: mingle-forum-4a9495cead71bfc76b3becea53804acd + +info: + name: > + Mingle Forum <= 1.0.34 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a44d391-63e0-46a5-83fd-5624055705ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mingle-forum/" + google-query: inurl:"/wp-content/plugins/mingle-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mingle-forum,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mingle-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mingle-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mingle-forum-8baae250cdfb2a5ad0824fa7bf9c8a47.yaml b/nuclei-templates/cve-less/plugins/mingle-forum-8baae250cdfb2a5ad0824fa7bf9c8a47.yaml new file mode 100644 index 0000000000..531e69cb3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mingle-forum-8baae250cdfb2a5ad0824fa7bf9c8a47.yaml @@ -0,0 +1,58 @@ +id: mingle-forum-8baae250cdfb2a5ad0824fa7bf9c8a47 + +info: + name: > + Mingle Forum <= 1.0.33.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc8e2042-93aa-454a-97b7-283d8a22bf46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mingle-forum/" + google-query: inurl:"/wp-content/plugins/mingle-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mingle-forum,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mingle-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mingle-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.33.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mingle-forum-bb8b3412160ee9a77c9d2e3d86221321.yaml b/nuclei-templates/cve-less/plugins/mingle-forum-bb8b3412160ee9a77c9d2e3d86221321.yaml new file mode 100644 index 0000000000..789922e113 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mingle-forum-bb8b3412160ee9a77c9d2e3d86221321.yaml @@ -0,0 +1,58 @@ +id: mingle-forum-bb8b3412160ee9a77c9d2e3d86221321 + +info: + name: > + Mingle Forum <= 1.0.33 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c1814c7-1ca0-42e6-a819-7e258f34ecac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mingle-forum/" + google-query: inurl:"/wp-content/plugins/mingle-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mingle-forum,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mingle-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mingle-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mingle-forum-ca1107b3905cae6801d38dcd71b363a8.yaml b/nuclei-templates/cve-less/plugins/mingle-forum-ca1107b3905cae6801d38dcd71b363a8.yaml new file mode 100644 index 0000000000..cd9b16fa6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mingle-forum-ca1107b3905cae6801d38dcd71b363a8.yaml @@ -0,0 +1,58 @@ +id: mingle-forum-ca1107b3905cae6801d38dcd71b363a8 + +info: + name: > + Mingle Forum <= 1.0.32.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0644fc5-6b37-4730-a051-f36dec650649?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mingle-forum/" + google-query: inurl:"/wp-content/plugins/mingle-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mingle-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mingle-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mingle-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mingle-forum-f35fe23400199bbe42a795d71f9a637a.yaml b/nuclei-templates/cve-less/plugins/mingle-forum-f35fe23400199bbe42a795d71f9a637a.yaml new file mode 100644 index 0000000000..33deeaeb9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mingle-forum-f35fe23400199bbe42a795d71f9a637a.yaml @@ -0,0 +1,58 @@ +id: mingle-forum-f35fe23400199bbe42a795d71f9a637a + +info: + name: > + Mingle Forum < 1.0.34 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01f0b785-418e-468c-b9f8-53cd46aca881?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mingle-forum/" + google-query: inurl:"/wp-content/plugins/mingle-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mingle-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mingle-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mingle-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mingle-forum-f5e683528ca64d9d4bdd8fbc39278345.yaml b/nuclei-templates/cve-less/plugins/mingle-forum-f5e683528ca64d9d4bdd8fbc39278345.yaml new file mode 100644 index 0000000000..cac6e68b32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mingle-forum-f5e683528ca64d9d4bdd8fbc39278345.yaml @@ -0,0 +1,58 @@ +id: mingle-forum-f5e683528ca64d9d4bdd8fbc39278345 + +info: + name: > + Mingle Forum <= 1.0.33.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/282a26e8-4848-4e40-bfe5-fe2ba40f198e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mingle-forum/" + google-query: inurl:"/wp-content/plugins/mingle-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mingle-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mingle-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mingle-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.33.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mingle-forum-fb045d9c371baeb404b4c5f1d77f622c.yaml b/nuclei-templates/cve-less/plugins/mingle-forum-fb045d9c371baeb404b4c5f1d77f622c.yaml new file mode 100644 index 0000000000..26f0e00be9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mingle-forum-fb045d9c371baeb404b4c5f1d77f622c.yaml @@ -0,0 +1,58 @@ +id: mingle-forum-fb045d9c371baeb404b4c5f1d77f622c + +info: + name: > + Mingle Forum <= 1.0.32.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d772e5-65a8-4cc5-a504-84473b75f19f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mingle-forum/" + google-query: inurl:"/wp-content/plugins/mingle-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mingle-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mingle-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mingle-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.32.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mini-cart-56a0c79ebe574b006dcddb57a105ed57.yaml b/nuclei-templates/cve-less/plugins/mini-cart-56a0c79ebe574b006dcddb57a105ed57.yaml new file mode 100644 index 0000000000..2dcc4f150e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mini-cart-56a0c79ebe574b006dcddb57a105ed57.yaml @@ -0,0 +1,58 @@ +id: mini-cart-56a0c79ebe574b006dcddb57a105ed57 + +info: + name: > + Mini Cart <= 1.00.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0448eb1c-1a4a-465e-aa30-e4af10d27560?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mini-cart/" + google-query: inurl:"/wp-content/plugins/mini-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mini-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mini-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mini-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.00.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mini-loops-43b8fe08466d27ab3e4146e678872b9a.yaml b/nuclei-templates/cve-less/plugins/mini-loops-43b8fe08466d27ab3e4146e678872b9a.yaml new file mode 100644 index 0000000000..d0fc1bbe99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mini-loops-43b8fe08466d27ab3e4146e678872b9a.yaml @@ -0,0 +1,58 @@ +id: mini-loops-43b8fe08466d27ab3e4146e678872b9a + +info: + name: > + Mini Loops <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bcb7d69-a444-4f45-a81d-631d95ec2a60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mini-loops/" + google-query: inurl:"/wp-content/plugins/mini-loops/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mini-loops,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mini-loops/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mini-loops" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mini-mail-dashboard-widget-72675dc0f12c8960a29f55b61a35c78f.yaml b/nuclei-templates/cve-less/plugins/mini-mail-dashboard-widget-72675dc0f12c8960a29f55b61a35c78f.yaml new file mode 100644 index 0000000000..a931818b3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mini-mail-dashboard-widget-72675dc0f12c8960a29f55b61a35c78f.yaml @@ -0,0 +1,58 @@ +id: mini-mail-dashboard-widget-72675dc0f12c8960a29f55b61a35c78f + +info: + name: > + Mini Mail Dashboard Widget < 1.43 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5536a6fd-3df0-4595-b71d-b8bcdbb64a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mini-mail-dashboard-widget/" + google-query: inurl:"/wp-content/plugins/mini-mail-dashboard-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mini-mail-dashboard-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mini-mail-dashboard-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mini-mail-dashboard-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minify-html-markup-50f1f1c9543c7aff43ee35ce25ee5c01.yaml b/nuclei-templates/cve-less/plugins/minify-html-markup-50f1f1c9543c7aff43ee35ce25ee5c01.yaml new file mode 100644 index 0000000000..080722604f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minify-html-markup-50f1f1c9543c7aff43ee35ce25ee5c01.yaml @@ -0,0 +1,58 @@ +id: minify-html-markup-50f1f1c9543c7aff43ee35ce25ee5c01 + +info: + name: > + Minify HTML <= 2.1.7 - Cross-Site Request Forgery in minify_html_menu_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef7cf633-e907-4da1-bd96-0013e88defbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minify-html-markup/" + google-query: inurl:"/wp-content/plugins/minify-html-markup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minify-html-markup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minify-html-markup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minify-html-markup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-39eb4a9ab67b19c7b3e7b850c04221af.yaml b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-39eb4a9ab67b19c7b3e7b850c04221af.yaml new file mode 100644 index 0000000000..b2c3e60d90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-39eb4a9ab67b19c7b3e7b850c04221af.yaml @@ -0,0 +1,58 @@ +id: minimal-coming-soon-maintenance-mode-39eb4a9ab67b19c7b3e7b850c04221af + +info: + name: > + Minimal Coming Soon – Coming Soon Page <= 2.33 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d592b81d-48c7-4b48-948d-f2b98719fdfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minimal-coming-soon-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/minimal-coming-soon-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minimal-coming-soon-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minimal-coming-soon-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-6ae34c162bf6aa13569eb35a0dbe9a73.yaml b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-6ae34c162bf6aa13569eb35a0dbe9a73.yaml new file mode 100644 index 0000000000..40ea664886 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-6ae34c162bf6aa13569eb35a0dbe9a73.yaml @@ -0,0 +1,58 @@ +id: minimal-coming-soon-maintenance-mode-6ae34c162bf6aa13569eb35a0dbe9a73 + +info: + name: > + Minimal Coming Soon & Maintenance Mode <= 2.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61d3f1f4-4cb9-4dd2-bda7-d08b2ccdbcba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minimal-coming-soon-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/minimal-coming-soon-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minimal-coming-soon-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minimal-coming-soon-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-6ff8db6967b717d0cf958b73dfda5c1c.yaml b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-6ff8db6967b717d0cf958b73dfda5c1c.yaml new file mode 100644 index 0000000000..84295feb61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-6ff8db6967b717d0cf958b73dfda5c1c.yaml @@ -0,0 +1,58 @@ +id: minimal-coming-soon-maintenance-mode-6ff8db6967b717d0cf958b73dfda5c1c + +info: + name: > + Minimal Coming Soon & Maintenance Mode <= 2.16 - Missing Authorization to Export Settings/Theme Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dc20a45-15b5-42d3-a484-988a394ee658?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minimal-coming-soon-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/minimal-coming-soon-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minimal-coming-soon-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minimal-coming-soon-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-843fe9a3debf8db188ba99413c342e16.yaml b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-843fe9a3debf8db188ba99413c342e16.yaml new file mode 100644 index 0000000000..3b94cd596d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-843fe9a3debf8db188ba99413c342e16.yaml @@ -0,0 +1,58 @@ +id: minimal-coming-soon-maintenance-mode-843fe9a3debf8db188ba99413c342e16 + +info: + name: > + Minimal Coming Soon & Maintenance Mode <= 2.10 - Cross-Site Request Forgery to Stored Cross-Site Scripting and Setting Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6320cd5f-c5a9-4731-9374-9b8b0838a1ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minimal-coming-soon-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/minimal-coming-soon-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minimal-coming-soon-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minimal-coming-soon-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-a7b78f7a058348bb841c19e95bd21064.yaml b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-a7b78f7a058348bb841c19e95bd21064.yaml new file mode 100644 index 0000000000..10ce2f5a79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-a7b78f7a058348bb841c19e95bd21064.yaml @@ -0,0 +1,58 @@ +id: minimal-coming-soon-maintenance-mode-a7b78f7a058348bb841c19e95bd21064 + +info: + name: > + Minimal Coming Soon – Coming Soon Page <= 2.33 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecde34f7-4624-4361-8d95-56fd4b08b476?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minimal-coming-soon-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/minimal-coming-soon-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minimal-coming-soon-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minimal-coming-soon-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-f65f188c6963620914763af01a71f9a3.yaml b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-f65f188c6963620914763af01a71f9a3.yaml new file mode 100644 index 0000000000..4635f44eda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minimal-coming-soon-maintenance-mode-f65f188c6963620914763af01a71f9a3.yaml @@ -0,0 +1,58 @@ +id: minimal-coming-soon-maintenance-mode-f65f188c6963620914763af01a71f9a3 + +info: + name: > + Minimal Coming Soon – Coming Soon Page <= 2.37 - Unauthenticated Maintenance Mode Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78203b98-15bc-4d8e-9278-c472b518be07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minimal-coming-soon-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/minimal-coming-soon-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minimal-coming-soon-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minimal-coming-soon-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minimum-purchase-for-woocommerce-ae760478256ed9e96e189f019a687210.yaml b/nuclei-templates/cve-less/plugins/minimum-purchase-for-woocommerce-ae760478256ed9e96e189f019a687210.yaml new file mode 100644 index 0000000000..3f7b0d0686 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minimum-purchase-for-woocommerce-ae760478256ed9e96e189f019a687210.yaml @@ -0,0 +1,58 @@ +id: minimum-purchase-for-woocommerce-ae760478256ed9e96e189f019a687210 + +info: + name: > + Minimum Purchase for WooCommerce <= 2.0.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4633c5b1-a6e3-4ee8-94ca-8afa8ff16a35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minimum-purchase-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/minimum-purchase-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minimum-purchase-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minimum-purchase-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minimum-purchase-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-0e334f8b94041fdfb0dbd420bf6d8572.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-0e334f8b94041fdfb0dbd420bf6d8572.yaml new file mode 100644 index 0000000000..bfb5c2f1b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-0e334f8b94041fdfb0dbd420bf6d8572.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-0e334f8b94041fdfb0dbd420bf6d8572 + +info: + name: > + miniOrange's Google Authenticator <= 5.4.39 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f810326f-f84a-4066-aa28-5caa915ba877?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-171f9c1d23a1dd854f2389f7ab9f2720.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-171f9c1d23a1dd854f2389f7ab9f2720.yaml new file mode 100644 index 0000000000..55b84e22da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-171f9c1d23a1dd854f2389f7ab9f2720.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-171f9c1d23a1dd854f2389f7ab9f2720 + +info: + name: > + miniOrange's Google Authenticator <= 5.6.1 - Sensitive Data Exposure of Multifactor Backup Codes + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0e54185-a917-49cd-b99d-5b773a7ed06a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-2c78335d8d426bf0b25d79bcc3a1ab65.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-2c78335d8d426bf0b25d79bcc3a1ab65.yaml new file mode 100644 index 0000000000..8c8ae8d140 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-2c78335d8d426bf0b25d79bcc3a1ab65.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-2c78335d8d426bf0b25d79bcc3a1ab65 + +info: + name: > + miniOrange's Google Authenticator <= 5.6.1 - Cross-Site Request Forgery to Malware Scan Termination + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed117fb8-c13a-4088-aa33-8d44fc5dcf37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-475af873f1e12ccee816ba0a881cf405.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-475af873f1e12ccee816ba0a881cf405.yaml new file mode 100644 index 0000000000..ab8f5b7b43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-475af873f1e12ccee816ba0a881cf405.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-475af873f1e12ccee816ba0a881cf405 + +info: + name: > + miniOrange's Google Authenticator <= 5.4.52 - Unauthenticated Arbitrary Options Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f53875aa-9347-464c-aaeb-e8248628fca2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-4764645e6471ac58214ba2ea5f55bde8.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-4764645e6471ac58214ba2ea5f55bde8.yaml new file mode 100644 index 0000000000..2694075788 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-4764645e6471ac58214ba2ea5f55bde8.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-4764645e6471ac58214ba2ea5f55bde8 + +info: + name: > + miniOrange's Google Authenticator <= 5.5.5 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90c0eb3e-b3f1-483c-9afd-2bbc4ff0cdf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-7f9d8f2c0da9df1ec2dd98d448e2220f.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-7f9d8f2c0da9df1ec2dd98d448e2220f.yaml new file mode 100644 index 0000000000..7e85caedde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-7f9d8f2c0da9df1ec2dd98d448e2220f.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-7f9d8f2c0da9df1ec2dd98d448e2220f + +info: + name: > + miniOrange's Google Authenticator <= 5.5.82 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52a03c45-1d65-43aa-b30f-13698019e05f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.82') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-8c3657d5aee544c7f980b9786567d40a.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-8c3657d5aee544c7f980b9786567d40a.yaml new file mode 100644 index 0000000000..8573cd468f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-8c3657d5aee544c7f980b9786567d40a.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-8c3657d5aee544c7f980b9786567d40a + +info: + name: > + miniOrange's Google Authenticator <= 5.6.1 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9ea24b5-ef7d-4bd5-bddb-46082a4a0763?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-e8c972936c2236ad7c5d5d3d5c2525c1.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-e8c972936c2236ad7c5d5d3d5c2525c1.yaml new file mode 100644 index 0000000000..c62d2f744a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-e8c972936c2236ad7c5d5d3d5c2525c1.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-e8c972936c2236ad7c5d5d3d5c2525c1 + +info: + name: > + miniOrange's Google Authenticator <= 5.6.5 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7267ede1-7745-47cc-ac0d-4362140b4c23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-eedcf99ab0d16ed7e1ce60956191875c.yaml b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-eedcf99ab0d16ed7e1ce60956191875c.yaml new file mode 100644 index 0000000000..ca01f578e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-2-factor-authentication-eedcf99ab0d16ed7e1ce60956191875c.yaml @@ -0,0 +1,58 @@ +id: miniorange-2-factor-authentication-eedcf99ab0d16ed7e1ce60956191875c + +info: + name: > + miniOrange's Google Authenticator <= 5.5.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb929679-85bb-4d5b-9a99-e6081d55019f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-2-factor-authentication/" + google-query: inurl:"/wp-content/plugins/miniorange-2-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-2-factor-authentication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-2-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-2-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-discord-integration-14052cb4248c1d727995c47dc9e235be.yaml b/nuclei-templates/cve-less/plugins/miniorange-discord-integration-14052cb4248c1d727995c47dc9e235be.yaml new file mode 100644 index 0000000000..ecd404f6c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-discord-integration-14052cb4248c1d727995c47dc9e235be.yaml @@ -0,0 +1,58 @@ +id: miniorange-discord-integration-14052cb4248c1d727995c47dc9e235be + +info: + name: > + miniOrange Discord Integration <= 2.1.5 - Missing Authorization to Plugin Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19062e84-7ce5-400e-a404-2bb4286cc09e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-discord-integration/" + google-query: inurl:"/wp-content/plugins/miniorange-discord-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-discord-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-discord-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-discord-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-google-authenticator-056a681add2c2e01374393f870550b92.yaml b/nuclei-templates/cve-less/plugins/miniorange-google-authenticator-056a681add2c2e01374393f870550b92.yaml new file mode 100644 index 0000000000..8fc5054bfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-google-authenticator-056a681add2c2e01374393f870550b92.yaml @@ -0,0 +1,58 @@ +id: miniorange-google-authenticator-056a681add2c2e01374393f870550b92 + +info: + name: > + Login With OTP Over SMS, Email, WhatsApp and Google Authenticator <= 1.0.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bfc0128-a8ef-4bb9-b5c8-7003f270aa36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-google-authenticator/" + google-query: inurl:"/wp-content/plugins/miniorange-google-authenticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-google-authenticator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-google-authenticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-google-authenticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-google-authenticator-0afb6b2d10846bc66cf5079f2d5cff9d.yaml b/nuclei-templates/cve-less/plugins/miniorange-google-authenticator-0afb6b2d10846bc66cf5079f2d5cff9d.yaml new file mode 100644 index 0000000000..b88b74b9d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-google-authenticator-0afb6b2d10846bc66cf5079f2d5cff9d.yaml @@ -0,0 +1,58 @@ +id: miniorange-google-authenticator-0afb6b2d10846bc66cf5079f2d5cff9d + +info: + name: > + Login With OTP Over SMS, Email, WhatsApp and Google Authenticator <= 1.0.4 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22b539c8-a6f1-4543-9e63-08ee4d468ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-google-authenticator/" + google-query: inurl:"/wp-content/plugins/miniorange-google-authenticator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-google-authenticator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-google-authenticator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-google-authenticator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-limit-login-attempts-1c092eb4ba33ccf4bb9feb95671821cb.yaml b/nuclei-templates/cve-less/plugins/miniorange-limit-login-attempts-1c092eb4ba33ccf4bb9feb95671821cb.yaml new file mode 100644 index 0000000000..95c5cfaaed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-limit-login-attempts-1c092eb4ba33ccf4bb9feb95671821cb.yaml @@ -0,0 +1,58 @@ +id: miniorange-limit-login-attempts-1c092eb4ba33ccf4bb9feb95671821cb + +info: + name: > + Limit Login Attempts <= 4.0.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3613f95-8338-40b8-8b16-2714fa3474ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-limit-login-attempts/" + google-query: inurl:"/wp-content/plugins/miniorange-limit-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-limit-login-attempts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-limit-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-limit-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-limit-login-attempts-6f5594aa21d74ab20f466ec04157beee.yaml b/nuclei-templates/cve-less/plugins/miniorange-limit-login-attempts-6f5594aa21d74ab20f466ec04157beee.yaml new file mode 100644 index 0000000000..d8e3782280 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-limit-login-attempts-6f5594aa21d74ab20f466ec04157beee.yaml @@ -0,0 +1,58 @@ +id: miniorange-limit-login-attempts-6f5594aa21d74ab20f466ec04157beee + +info: + name: > + MiniOrange Limit Login Attempts <= 4.0.72 - Administrator+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40e61b9f-2350-410e-bb3d-59329ac08658?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-limit-login-attempts/" + google-query: inurl:"/wp-content/plugins/miniorange-limit-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-limit-login-attempts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-limit-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-limit-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-openid-0881f47c3594ae8da08c18a925e96922.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-openid-0881f47c3594ae8da08c18a925e96922.yaml new file mode 100644 index 0000000000..21a470a4cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-openid-0881f47c3594ae8da08c18a925e96922.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-openid-0881f47c3594ae8da08c18a925e96922 + +info: + name: > + WordPress Social Login and Register <=7.5.12 - Missing Authorization to Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ffb9a8e-b08f-451b-bdb5-268d7b618b66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-openid/" + google-query: inurl:"/wp-content/plugins/miniorange-login-openid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-openid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-openid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-openid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '7.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-openid-5585b9de0a3cacd6beb8b8edc279fcc3.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-openid-5585b9de0a3cacd6beb8b8edc279fcc3.yaml new file mode 100644 index 0000000000..b3cfaf330b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-openid-5585b9de0a3cacd6beb8b8edc279fcc3.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-openid-5585b9de0a3cacd6beb8b8edc279fcc3 + +info: + name: > + WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.5.14 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faac24e5-94f2-40e5-932e-93ddc2c8af7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-openid/" + google-query: inurl:"/wp-content/plugins/miniorange-login-openid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-openid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-openid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-openid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-openid-5e2f11a884ccbe34c9944f9c84b1340e.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-openid-5e2f11a884ccbe34c9944f9c84b1340e.yaml new file mode 100644 index 0000000000..99aac85bb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-openid-5e2f11a884ccbe34c9944f9c84b1340e.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-openid-5e2f11a884ccbe34c9944f9c84b1340e + +info: + name: > + WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.6 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45668368-5846-41bb-b862-dfeb283e83cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-openid/" + google-query: inurl:"/wp-content/plugins/miniorange-login-openid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-openid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-openid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-openid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-openid-65a50bc077f23975d5d3179b1fb56daa.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-openid-65a50bc077f23975d5d3179b1fb56daa.yaml new file mode 100644 index 0000000000..531c014cb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-openid-65a50bc077f23975d5d3179b1fb56daa.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-openid-65a50bc077f23975d5d3179b1fb56daa + +info: + name: > + WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08ca186a-2486-4a58-9c53-03e9eba13e66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-openid/" + google-query: inurl:"/wp-content/plugins/miniorange-login-openid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-openid,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-openid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-openid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-openid-7a725b90d4cc282b22e04990737c3b98.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-openid-7a725b90d4cc282b22e04990737c3b98.yaml new file mode 100644 index 0000000000..63058d76a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-openid-7a725b90d4cc282b22e04990737c3b98.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-openid-7a725b90d4cc282b22e04990737c3b98 + +info: + name: > + WordPress Social Login and Register <= 7.6.0 - Missing Authorization to Unauthenticated Arbitrary Content Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/021a25c9-7fad-425f-8104-bb4852603613?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-openid/" + google-query: inurl:"/wp-content/plugins/miniorange-login-openid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-openid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-openid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-openid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-openid-c57529c85cbb2380b599b6f25e5d1cbd.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-openid-c57529c85cbb2380b599b6f25e5d1cbd.yaml new file mode 100644 index 0000000000..455c58390d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-openid-c57529c85cbb2380b599b6f25e5d1cbd.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-openid-c57529c85cbb2380b599b6f25e5d1cbd + +info: + name: > + WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.5.14 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca91046d-61c1-4a65-a078-c7dffb27092c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-openid/" + google-query: inurl:"/wp-content/plugins/miniorange-login-openid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-openid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-openid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-openid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-security-de7221543e5e73690e1a713271a64c51.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-security-de7221543e5e73690e1a713271a64c51.yaml new file mode 100644 index 0000000000..2943c78e78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-security-de7221543e5e73690e1a713271a64c51.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-security-de7221543e5e73690e1a713271a64c51 + +info: + name: > + Two Factor Authentication (2FA , MFA, OTP SMS and Email) <= 1.0.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/603846de-5d3b-498f-844b-306d80df80da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-security/" + google-query: inurl:"/wp-content/plugins/miniorange-login-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-225cea6ba5a10bdee2c9620d04168830.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-225cea6ba5a10bdee2c9620d04168830.yaml new file mode 100644 index 0000000000..a52c83ec3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-225cea6ba5a10bdee2c9620d04168830.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-with-eve-online-google-facebook-225cea6ba5a10bdee2c9620d04168830 + +info: + name: > + OAuth Single Sign On – SSO (OAuth Client) <= 6.23.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d166a77-d57b-4827-96ca-b8eb423861f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + google-query: inurl:"/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-with-eve-online-google-facebook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-with-eve-online-google-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-8d13a40428bf38232a4e5bb1180f642a.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-8d13a40428bf38232a4e5bb1180f642a.yaml new file mode 100644 index 0000000000..42cc24f523 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-8d13a40428bf38232a4e5bb1180f642a.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-with-eve-online-google-facebook-8d13a40428bf38232a4e5bb1180f642a + +info: + name: > + OAuth Single Sign On – SSO (OAuth Client) <= 6.24.1- Cross-Site Request Forgery via 'discard' in mooauth_client_applist_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a250f678-1ec7-48ea-8b81-e5ef89992155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + google-query: inurl:"/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-with-eve-online-google-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-with-eve-online-google-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.24.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-9d80c6cd84258efd69f77a8f06dc55b8.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-9d80c6cd84258efd69f77a8f06dc55b8.yaml new file mode 100644 index 0000000000..2e55b887ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-9d80c6cd84258efd69f77a8f06dc55b8.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-with-eve-online-google-facebook-9d80c6cd84258efd69f77a8f06dc55b8 + +info: + name: > + OAuth Single Sign On – SSO (OAuth Client) <= 6.22.5 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fae6e691-0d2a-4784-8ab1-4923d650a703?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + google-query: inurl:"/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-with-eve-online-google-facebook,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-with-eve-online-google-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.22.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-9db01b7b537550571e5aaebf6e7d1ee5.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-9db01b7b537550571e5aaebf6e7d1ee5.yaml new file mode 100644 index 0000000000..867af73d8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-9db01b7b537550571e5aaebf6e7d1ee5.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-with-eve-online-google-facebook-9db01b7b537550571e5aaebf6e7d1ee5 + +info: + name: > + OAuth Single Sign On – SSO (OAuth Client) <= 6.22.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb2a67ff-a452-4ecb-9fd7-bf05fe43a2f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + google-query: inurl:"/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-with-eve-online-google-facebook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-with-eve-online-google-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.22.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-eebb96ce6566b7b10661225a9046264f.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-eebb96ce6566b7b10661225a9046264f.yaml new file mode 100644 index 0000000000..52a5be00dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-eebb96ce6566b7b10661225a9046264f.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-with-eve-online-google-facebook-eebb96ce6566b7b10661225a9046264f + +info: + name: > + Multiple miniOrange Plugins (Various Version) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44cbaa25-7e91-4b2e-81c4-ba1d7ba02350?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + google-query: inurl:"/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-with-eve-online-google-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-with-eve-online-google-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-fd8ebcf9d5fa5c6862626035f1ed028e.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-fd8ebcf9d5fa5c6862626035f1ed028e.yaml new file mode 100644 index 0000000000..87211dcde0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-with-eve-online-google-facebook-fd8ebcf9d5fa5c6862626035f1ed028e.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-with-eve-online-google-facebook-fd8ebcf9d5fa5c6862626035f1ed028e + +info: + name: > + OAuth Single Sign On – SSO (OAuth Client) <= 6.24.1 - Cross-Site Request Forgery via 'delete' in mooauth_client_applist_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6658edb-11dc-4594-8936-95d60d581f49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + google-query: inurl:"/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-with-eve-online-google-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-with-eve-online-google-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-with-eve-online-google-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.24.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-login-with-whmcs-7f3cd8184f95fe5ec57b6436f927a39d.yaml b/nuclei-templates/cve-less/plugins/miniorange-login-with-whmcs-7f3cd8184f95fe5ec57b6436f927a39d.yaml new file mode 100644 index 0000000000..0f8da876fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-login-with-whmcs-7f3cd8184f95fe5ec57b6436f927a39d.yaml @@ -0,0 +1,58 @@ +id: miniorange-login-with-whmcs-7f3cd8184f95fe5ec57b6436f927a39d + +info: + name: > + Login with WHMCS <= 1.11.3 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d07d5e9-be7c-4c16-b931-d909ed8be361?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-login-with-whmcs/" + google-query: inurl:"/wp-content/plugins/miniorange-login-with-whmcs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-login-with-whmcs,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-login-with-whmcs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-login-with-whmcs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-malware-protection-504399029097a5e86b5ba9c9da19637b.yaml b/nuclei-templates/cve-less/plugins/miniorange-malware-protection-504399029097a5e86b5ba9c9da19637b.yaml new file mode 100644 index 0000000000..db9336a171 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-malware-protection-504399029097a5e86b5ba9c9da19637b.yaml @@ -0,0 +1,58 @@ +id: miniorange-malware-protection-504399029097a5e86b5ba9c9da19637b + +info: + name: > + Malware Scanner <= 4.7.2 and Web Application Firewall <= 2.1.1 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6347f588-a3fd-4909-ad57-9d78787b5728?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-malware-protection/" + google-query: inurl:"/wp-content/plugins/miniorange-malware-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-malware-protection,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-malware-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-malware-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-malware-protection-65d716f9ae4f07532a2c4f0b876ee91a.yaml b/nuclei-templates/cve-less/plugins/miniorange-malware-protection-65d716f9ae4f07532a2c4f0b876ee91a.yaml new file mode 100644 index 0000000000..36a39037a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-malware-protection-65d716f9ae4f07532a2c4f0b876ee91a.yaml @@ -0,0 +1,58 @@ +id: miniorange-malware-protection-65d716f9ae4f07532a2c4f0b876ee91a + +info: + name: > + Malware Scanner <= 4.7.2 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b26996cf-acea-41fb-ad2f-167f41d31cea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-malware-protection/" + google-query: inurl:"/wp-content/plugins/miniorange-malware-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-malware-protection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-malware-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-malware-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-malware-protection-7ed5021e959e36c29209eaf63566fdb5.yaml b/nuclei-templates/cve-less/plugins/miniorange-malware-protection-7ed5021e959e36c29209eaf63566fdb5.yaml new file mode 100644 index 0000000000..ae97ea811e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-malware-protection-7ed5021e959e36c29209eaf63566fdb5.yaml @@ -0,0 +1,58 @@ +id: miniorange-malware-protection-7ed5021e959e36c29209eaf63566fdb5 + +info: + name: > + miniOrange’s Malware Scanner <= 4.5.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f01e9908-c4d7-4eaf-8bba-4f5da7fa7703?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-malware-protection/" + google-query: inurl:"/wp-content/plugins/miniorange-malware-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-malware-protection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-malware-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-malware-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-malware-protection-86d39e17ff25614aec648f264a3fb15c.yaml b/nuclei-templates/cve-less/plugins/miniorange-malware-protection-86d39e17ff25614aec648f264a3fb15c.yaml new file mode 100644 index 0000000000..769ad2820f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-malware-protection-86d39e17ff25614aec648f264a3fb15c.yaml @@ -0,0 +1,58 @@ +id: miniorange-malware-protection-86d39e17ff25614aec648f264a3fb15c + +info: + name: > + Malware Scanner <= 4.7.1 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb19fd06-7b2c-41a1-a470-230da7ce944d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-malware-protection/" + google-query: inurl:"/wp-content/plugins/miniorange-malware-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-malware-protection,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-malware-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-malware-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-oauth-20-server-d2f88ba803df2886b1661d9e9022a666.yaml b/nuclei-templates/cve-less/plugins/miniorange-oauth-20-server-d2f88ba803df2886b1661d9e9022a666.yaml new file mode 100644 index 0000000000..e14ee09c5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-oauth-20-server-d2f88ba803df2886b1661d9e9022a666.yaml @@ -0,0 +1,58 @@ +id: miniorange-oauth-20-server-d2f88ba803df2886b1661d9e9022a666 + +info: + name: > + WP OAuth Server <= 3.0.4 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f13b2dd-4832-4646-828c-ba2df1eb7d33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-oauth-20-server/" + google-query: inurl:"/wp-content/plugins/miniorange-oauth-20-server/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-oauth-20-server,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-oauth-20-server/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-oauth-20-server" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-openid-connect-client-039ddff757a24293b6b8e40930fc38b1.yaml b/nuclei-templates/cve-less/plugins/miniorange-openid-connect-client-039ddff757a24293b6b8e40930fc38b1.yaml new file mode 100644 index 0000000000..531601f774 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-openid-connect-client-039ddff757a24293b6b8e40930fc38b1.yaml @@ -0,0 +1,58 @@ +id: miniorange-openid-connect-client-039ddff757a24293b6b8e40930fc38b1 + +info: + name: > + WordPress OpenID Connect Client <= 2.1.7 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a10ba041-ded4-41d4-93ba-7fa7389acd54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-openid-connect-client/" + google-query: inurl:"/wp-content/plugins/miniorange-openid-connect-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-openid-connect-client,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-openid-connect-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-openid-connect-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-openid-connect-client-eebb96ce6566b7b10661225a9046264f.yaml b/nuclei-templates/cve-less/plugins/miniorange-openid-connect-client-eebb96ce6566b7b10661225a9046264f.yaml new file mode 100644 index 0000000000..a4b153a51e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-openid-connect-client-eebb96ce6566b7b10661225a9046264f.yaml @@ -0,0 +1,58 @@ +id: miniorange-openid-connect-client-eebb96ce6566b7b10661225a9046264f + +info: + name: > + Multiple miniOrange Plugins (Various Version) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44cbaa25-7e91-4b2e-81c4-ba1d7ba02350?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-openid-connect-client/" + google-query: inurl:"/wp-content/plugins/miniorange-openid-connect-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-openid-connect-client,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-openid-connect-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-openid-connect-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-otp-verification-0cc0c3f4bf4487c2d84931d62250a698.yaml b/nuclei-templates/cve-less/plugins/miniorange-otp-verification-0cc0c3f4bf4487c2d84931d62250a698.yaml new file mode 100644 index 0000000000..58e4ab97ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-otp-verification-0cc0c3f4bf4487c2d84931d62250a698.yaml @@ -0,0 +1,58 @@ +id: miniorange-otp-verification-0cc0c3f4bf4487c2d84931d62250a698 + +info: + name: > + miniorange otp verification <= 4.2.1 - Missing Authorization via dismiss_notice + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62ea1427-0990-4645-aa1a-42da6fd3944f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-otp-verification/" + google-query: inurl:"/wp-content/plugins/miniorange-otp-verification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-otp-verification,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-otp-verification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-otp-verification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-17d0dd4ca47cd3783ad012601e5033f4.yaml b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-17d0dd4ca47cd3783ad012601e5033f4.yaml new file mode 100644 index 0000000000..173cd48b05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-17d0dd4ca47cd3783ad012601e5033f4.yaml @@ -0,0 +1,58 @@ +id: miniorange-saml-20-single-sign-on-17d0dd4ca47cd3783ad012601e5033f4 + +info: + name: > + SAML Single Sign On – SSO Login Premium Multisite < 20.0.7 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1adcc627-c371-452b-95b7-25c659117116?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-saml-20-single-sign-on/" + google-query: inurl:"/wp-content/plugins/miniorange-saml-20-single-sign-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-saml-20-single-sign-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-saml-20-single-sign-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 16', '<= 16.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-18ed21ba8d359bbdba46edad48e67bc5.yaml b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-18ed21ba8d359bbdba46edad48e67bc5.yaml new file mode 100644 index 0000000000..e1189d171a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-18ed21ba8d359bbdba46edad48e67bc5.yaml @@ -0,0 +1,58 @@ +id: miniorange-saml-20-single-sign-on-18ed21ba8d359bbdba46edad48e67bc5 + +info: + name: > + SAML Single Sign On – SAML SSO Login <= 4.8.75 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10e49bdd-3a72-4bb7-ba31-21ba4a5b377f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-saml-20-single-sign-on/" + google-query: inurl:"/wp-content/plugins/miniorange-saml-20-single-sign-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-saml-20-single-sign-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-saml-20-single-sign-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-27f647997621b679fa1b99cbf345bdbe.yaml b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-27f647997621b679fa1b99cbf345bdbe.yaml new file mode 100644 index 0000000000..a862f20c78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-27f647997621b679fa1b99cbf345bdbe.yaml @@ -0,0 +1,58 @@ +id: miniorange-saml-20-single-sign-on-27f647997621b679fa1b99cbf345bdbe + +info: + name: > + SAML Single Sign On – SAML SSO Login < 4.8.73 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/174c4050-8eed-4641-85d2-4b66702e03a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-saml-20-single-sign-on/" + google-query: inurl:"/wp-content/plugins/miniorange-saml-20-single-sign-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-saml-20-single-sign-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-saml-20-single-sign-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-6125bda092f086c6d166ad135d42c4ef.yaml b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-6125bda092f086c6d166ad135d42c4ef.yaml new file mode 100644 index 0000000000..ac87488cdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-6125bda092f086c6d166ad135d42c4ef.yaml @@ -0,0 +1,58 @@ +id: miniorange-saml-20-single-sign-on-6125bda092f086c6d166ad135d42c4ef + +info: + name: > + SAML Single Sign On – SAML SSO Login <= 4.8.83 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1032f7b0-db98-4b25-bdff-dcaf2758f266?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-saml-20-single-sign-on/" + google-query: inurl:"/wp-content/plugins/miniorange-saml-20-single-sign-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-saml-20-single-sign-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-saml-20-single-sign-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.83') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-c63318ebb764a0fec0149a0fb8aaa846.yaml b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-c63318ebb764a0fec0149a0fb8aaa846.yaml new file mode 100644 index 0000000000..7f1d4a60fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-c63318ebb764a0fec0149a0fb8aaa846.yaml @@ -0,0 +1,58 @@ +id: miniorange-saml-20-single-sign-on-c63318ebb764a0fec0149a0fb8aaa846 + +info: + name: > + SAML Single Sign On – SAML SSO Login <= 4.9.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/961cf553-8871-436d-af95-61af963f5e9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-saml-20-single-sign-on/" + google-query: inurl:"/wp-content/plugins/miniorange-saml-20-single-sign-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-saml-20-single-sign-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-saml-20-single-sign-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-cef3df52a6e193270f584096ae2ab14a.yaml b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-cef3df52a6e193270f584096ae2ab14a.yaml new file mode 100644 index 0000000000..5e7a6f01b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-saml-20-single-sign-on-cef3df52a6e193270f584096ae2ab14a.yaml @@ -0,0 +1,58 @@ +id: miniorange-saml-20-single-sign-on-cef3df52a6e193270f584096ae2ab14a + +info: + name: > + SAML SP Single Sign On <= 5.0.4 - Missing Authorization to notice dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3114906-fac1-42b9-9ba1-0a5d44c2fb3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-saml-20-single-sign-on/" + google-query: inurl:"/wp-content/plugins/miniorange-saml-20-single-sign-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-saml-20-single-sign-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-saml-20-single-sign-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miniorange-wp-as-saml-idp-73c8c687b5d5c2441c948ce0feefccb9.yaml b/nuclei-templates/cve-less/plugins/miniorange-wp-as-saml-idp-73c8c687b5d5c2441c948ce0feefccb9.yaml new file mode 100644 index 0000000000..27cd6df65b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miniorange-wp-as-saml-idp-73c8c687b5d5c2441c948ce0feefccb9.yaml @@ -0,0 +1,58 @@ +id: miniorange-wp-as-saml-idp-73c8c687b5d5c2441c948ce0feefccb9 + +info: + name: > + Login using WordPress Users (WP as SAML IDP) <= 1.13.2 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4939b053-2d62-428e-84ff-0de3416466ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miniorange-wp-as-saml-idp/" + google-query: inurl:"/wp-content/plugins/miniorange-wp-as-saml-idp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miniorange-wp-as-saml-idp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miniorange-wp-as-saml-idp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miniorange-wp-as-saml-idp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/minmax-quantity-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/minmax-quantity-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..c4e67e6dfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/minmax-quantity-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: minmax-quantity-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/minmax-quantity-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/minmax-quantity-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,minmax-quantity-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/minmax-quantity-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minmax-quantity-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mistape-2ab8437211d9c31dd339d122d8d0d412.yaml b/nuclei-templates/cve-less/plugins/mistape-2ab8437211d9c31dd339d122d8d0d412.yaml new file mode 100644 index 0000000000..c45f5fa011 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mistape-2ab8437211d9c31dd339d122d8d0d412.yaml @@ -0,0 +1,58 @@ +id: mistape-2ab8437211d9c31dd339d122d8d0d412 + +info: + name: > + Mistape 1.4.0 - Backdoor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76e41376-3db0-481b-9f86-bb77b00882e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mistape/" + google-query: inurl:"/wp-content/plugins/mistape/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mistape,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mistape/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mistape" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miwoftp-23e0e48f6d4b609b278b4fbd54ac10a1.yaml b/nuclei-templates/cve-less/plugins/miwoftp-23e0e48f6d4b609b278b4fbd54ac10a1.yaml new file mode 100644 index 0000000000..b29b54c016 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miwoftp-23e0e48f6d4b609b278b4fbd54ac10a1.yaml @@ -0,0 +1,58 @@ +id: miwoftp-23e0e48f6d4b609b278b4fbd54ac10a1 + +info: + name: > + MiwoFTP < 1.0.6 - Cross-Site Request Forgery leading to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0907cb0-b101-4c88-9a8b-b35133e1d0a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miwoftp/" + google-query: inurl:"/wp-content/plugins/miwoftp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miwoftp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miwoftp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miwoftp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miwoftp-8e749acf47b12b0f727ea31609204180.yaml b/nuclei-templates/cve-less/plugins/miwoftp-8e749acf47b12b0f727ea31609204180.yaml new file mode 100644 index 0000000000..121749c8bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miwoftp-8e749acf47b12b0f727ea31609204180.yaml @@ -0,0 +1,58 @@ +id: miwoftp-8e749acf47b12b0f727ea31609204180 + +info: + name: > + MiwoFTP < 1.0.5 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2db8e79f-e70b-421f-8120-7aa65e704deb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miwoftp/" + google-query: inurl:"/wp-content/plugins/miwoftp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miwoftp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miwoftp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miwoftp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/miwoftp-d10118590b8b4520a15b5f492941e4d0.yaml b/nuclei-templates/cve-less/plugins/miwoftp-d10118590b8b4520a15b5f492941e4d0.yaml new file mode 100644 index 0000000000..9ba80b1566 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/miwoftp-d10118590b8b4520a15b5f492941e4d0.yaml @@ -0,0 +1,58 @@ +id: miwoftp-d10118590b8b4520a15b5f492941e4d0 + +info: + name: > + MiwoFTP < 1.0.6 - Cross-Site Request Forgery to Arbitrary File Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ab0d9f3-0185-41f1-bab5-f47f828fa79c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/miwoftp/" + google-query: inurl:"/wp-content/plugins/miwoftp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,miwoftp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/miwoftp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "miwoftp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mj-update-history-d6ad3a8698b0ea599d014ed39ac8e503.yaml b/nuclei-templates/cve-less/plugins/mj-update-history-d6ad3a8698b0ea599d014ed39ac8e503.yaml new file mode 100644 index 0000000000..1c5ae2a25e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mj-update-history-d6ad3a8698b0ea599d014ed39ac8e503.yaml @@ -0,0 +1,58 @@ +id: mj-update-history-d6ad3a8698b0ea599d014ed39ac8e503 + +info: + name: > + MJ Update History <= 1.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0976e3c-dcc2-41aa-a734-84afa50310ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mj-update-history/" + google-query: inurl:"/wp-content/plugins/mj-update-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mj-update-history,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mj-update-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mj-update-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mjm-clinic-9d05bf270be054dfc1695e62a3911511.yaml b/nuclei-templates/cve-less/plugins/mjm-clinic-9d05bf270be054dfc1695e62a3911511.yaml new file mode 100644 index 0000000000..e9af978381 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mjm-clinic-9d05bf270be054dfc1695e62a3911511.yaml @@ -0,0 +1,58 @@ +id: mjm-clinic-9d05bf270be054dfc1695e62a3911511 + +info: + name: > + MJM Clinic <= 1.1.22 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b39c360-f267-4f9a-8d9d-fa0d7e300129?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mjm-clinic/" + google-query: inurl:"/wp-content/plugins/mjm-clinic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mjm-clinic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mjm-clinic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mjm-clinic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mjm-clinic-df39b25c059b85a56edd3d99d606296d.yaml b/nuclei-templates/cve-less/plugins/mjm-clinic-df39b25c059b85a56edd3d99d606296d.yaml new file mode 100644 index 0000000000..760a3b0ad6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mjm-clinic-df39b25c059b85a56edd3d99d606296d.yaml @@ -0,0 +1,58 @@ +id: mjm-clinic-df39b25c059b85a56edd3d99d606296d + +info: + name: > + MJM Clinic <= 1.1.22 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f6fd068-3f72-4015-b2d8-a47cd86df073?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mjm-clinic/" + google-query: inurl:"/wp-content/plugins/mjm-clinic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mjm-clinic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mjm-clinic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mjm-clinic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mklasens-photobox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/mklasens-photobox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..3b1fd626b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mklasens-photobox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: mklasens-photobox-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mklasens-photobox/" + google-query: inurl:"/wp-content/plugins/mklasens-photobox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mklasens-photobox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mklasens-photobox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mklasens-photobox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ml-slider-162160e2cd5796ea83b5a0cd63035626.yaml b/nuclei-templates/cve-less/plugins/ml-slider-162160e2cd5796ea83b5a0cd63035626.yaml new file mode 100644 index 0000000000..c1cbb3c573 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ml-slider-162160e2cd5796ea83b5a0cd63035626.yaml @@ -0,0 +1,58 @@ +id: ml-slider-162160e2cd5796ea83b5a0cd63035626 + +info: + name: > + Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Plugin <= 2.1.6 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d67cd96b-6fec-44db-be50-395bed199e9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ml-slider/" + google-query: inurl:"/wp-content/plugins/ml-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ml-slider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ml-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ml-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ml-slider-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/ml-slider-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..178804e0c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ml-slider-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: ml-slider-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ml-slider/" + google-query: inurl:"/wp-content/plugins/ml-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ml-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ml-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ml-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.28.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ml-slider-2c78a721f8f6bce6bce705e149277edc.yaml b/nuclei-templates/cve-less/plugins/ml-slider-2c78a721f8f6bce6bce705e149277edc.yaml new file mode 100644 index 0000000000..eb03549311 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ml-slider-2c78a721f8f6bce6bce705e149277edc.yaml @@ -0,0 +1,58 @@ +id: ml-slider-2c78a721f8f6bce6bce705e149277edc + +info: + name: > + Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Plugin <= 2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0922d221-70c6-41d3-9da2-aa16d67e7c14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ml-slider/" + google-query: inurl:"/wp-content/plugins/ml-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ml-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ml-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ml-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ml-slider-511ef268c5ca19fe7d62dddd9e13f37e.yaml b/nuclei-templates/cve-less/plugins/ml-slider-511ef268c5ca19fe7d62dddd9e13f37e.yaml new file mode 100644 index 0000000000..0bd5d3ebbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ml-slider-511ef268c5ca19fe7d62dddd9e13f37e.yaml @@ -0,0 +1,58 @@ +id: ml-slider-511ef268c5ca19fe7d62dddd9e13f37e + +info: + name: > + Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Slideshows <= 3.70.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via metaslider Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cbd95bb-6f13-48c9-a51e-5f7bf7a296df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ml-slider/" + google-query: inurl:"/wp-content/plugins/ml-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ml-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ml-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ml-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.70.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ml-slider-8f6a16f6b7fab2bb0e2d710564ba823c.yaml b/nuclei-templates/cve-less/plugins/ml-slider-8f6a16f6b7fab2bb0e2d710564ba823c.yaml new file mode 100644 index 0000000000..3483d6eb6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ml-slider-8f6a16f6b7fab2bb0e2d710564ba823c.yaml @@ -0,0 +1,58 @@ +id: ml-slider-8f6a16f6b7fab2bb0e2d710564ba823c + +info: + name: > + Slider, Gallery, and Carousel by MetaSlider <= 3.29.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/290233f0-a5dd-4c69-8039-7392268daf40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ml-slider/" + google-query: inurl:"/wp-content/plugins/ml-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ml-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ml-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ml-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.29.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ml-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/ml-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..28ebbd0fb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ml-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: ml-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ml-slider/" + google-query: inurl:"/wp-content/plugins/ml-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ml-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ml-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ml-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.28.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ml-slider-e13785deba801d5052c18262b9c1ec9f.yaml b/nuclei-templates/cve-less/plugins/ml-slider-e13785deba801d5052c18262b9c1ec9f.yaml new file mode 100644 index 0000000000..b6f735c3a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ml-slider-e13785deba801d5052c18262b9c1ec9f.yaml @@ -0,0 +1,58 @@ +id: ml-slider-e13785deba801d5052c18262b9c1ec9f + +info: + name: > + Slider, Gallery, and Carousel by MetaSlider <= 3.17.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5292c55-6445-4aec-b06e-6e625794d842?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ml-slider/" + google-query: inurl:"/wp-content/plugins/ml-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ml-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ml-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ml-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.17.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ml-slider-ed137f483ea3e94091bee5b4d772d058.yaml b/nuclei-templates/cve-less/plugins/ml-slider-ed137f483ea3e94091bee5b4d772d058.yaml new file mode 100644 index 0000000000..fb9cfcac39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ml-slider-ed137f483ea3e94091bee5b4d772d058.yaml @@ -0,0 +1,58 @@ +id: ml-slider-ed137f483ea3e94091bee5b4d772d058 + +info: + name: > + Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Plugin <= 3.27.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a7f738e-21f3-42f3-bf33-1d93ff0d1364?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ml-slider/" + google-query: inurl:"/wp-content/plugins/ml-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ml-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ml-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ml-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.27.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mm-email2image-0f3e86b7ffafefc40e02ec0059e76f0a.yaml b/nuclei-templates/cve-less/plugins/mm-email2image-0f3e86b7ffafefc40e02ec0059e76f0a.yaml new file mode 100644 index 0000000000..3dbceb7b6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mm-email2image-0f3e86b7ffafefc40e02ec0059e76f0a.yaml @@ -0,0 +1,58 @@ +id: mm-email2image-0f3e86b7ffafefc40e02ec0059e76f0a + +info: + name: > + MM-email2image <= 0.2.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f0ee03c-8cf6-4372-b740-722fc1283ee3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mm-email2image/" + google-query: inurl:"/wp-content/plugins/mm-email2image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mm-email2image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mm-email2image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mm-email2image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mm-email2image-bbfbe8576da0ded63051e9606f0a7198.yaml b/nuclei-templates/cve-less/plugins/mm-email2image-bbfbe8576da0ded63051e9606f0a7198.yaml new file mode 100644 index 0000000000..dd7f8cfa69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mm-email2image-bbfbe8576da0ded63051e9606f0a7198.yaml @@ -0,0 +1,58 @@ +id: mm-email2image-bbfbe8576da0ded63051e9606f0a7198 + +info: + name: > + MM-email2image <= 0.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7147cb69-294e-4270-bf8b-3a32a5552d1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mm-email2image/" + google-query: inurl:"/wp-content/plugins/mm-email2image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mm-email2image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mm-email2image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mm-email2image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mm-forms-community-f0d4af3ac8d411e11b76b00eb4b51ce2.yaml b/nuclei-templates/cve-less/plugins/mm-forms-community-f0d4af3ac8d411e11b76b00eb4b51ce2.yaml new file mode 100644 index 0000000000..3e06f47471 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mm-forms-community-f0d4af3ac8d411e11b76b00eb4b51ce2.yaml @@ -0,0 +1,58 @@ +id: mm-forms-community-f0d4af3ac8d411e11b76b00eb4b51ce2 + +info: + name: > + MM Forms Community <= 2.2.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70ede219-e59d-40dd-9e5e-4f44089d7524?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mm-forms-community/" + google-query: inurl:"/wp-content/plugins/mm-forms-community/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mm-forms-community,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mm-forms-community/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mm-forms-community" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mmm-file-list-0ce6b6a0e9e78d060d6ca04414281584.yaml b/nuclei-templates/cve-less/plugins/mmm-file-list-0ce6b6a0e9e78d060d6ca04414281584.yaml new file mode 100644 index 0000000000..18b2a5cd10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mmm-file-list-0ce6b6a0e9e78d060d6ca04414281584.yaml @@ -0,0 +1,58 @@ +id: mmm-file-list-0ce6b6a0e9e78d060d6ca04414281584 + +info: + name: > + Mmm Simple File List <= 2.3 - Authenticated (Subscriber+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f33a13dc-ebff-4033-9b8d-10076b1c2d0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mmm-file-list/" + google-query: inurl:"/wp-content/plugins/mmm-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mmm-file-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mmm-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mmm-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mmm-file-list-d3e919ff7a9e64072ba58c94844a6e21.yaml b/nuclei-templates/cve-less/plugins/mmm-file-list-d3e919ff7a9e64072ba58c94844a6e21.yaml new file mode 100644 index 0000000000..525c1bcea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mmm-file-list-d3e919ff7a9e64072ba58c94844a6e21.yaml @@ -0,0 +1,58 @@ +id: mmm-file-list-d3e919ff7a9e64072ba58c94844a6e21 + +info: + name: > + Mmm Simple File List <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c064227f-6332-40c8-9e96-337c608da832?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mmm-file-list/" + google-query: inurl:"/wp-content/plugins/mmm-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mmm-file-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mmm-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mmm-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-address-bar-changer-2b956076e06d8a99488143a30a260c6a.yaml b/nuclei-templates/cve-less/plugins/mobile-address-bar-changer-2b956076e06d8a99488143a30a260c6a.yaml new file mode 100644 index 0000000000..8f97ca1e98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-address-bar-changer-2b956076e06d8a99488143a30a260c6a.yaml @@ -0,0 +1,58 @@ +id: mobile-address-bar-changer-2b956076e06d8a99488143a30a260c6a + +info: + name: > + Mobile Address Bar Changer <= 3.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f1b0b50-663f-40ff-803e-a20d7c7ea980?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-address-bar-changer/" + google-query: inurl:"/wp-content/plugins/mobile-address-bar-changer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-address-bar-changer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-address-bar-changer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-address-bar-changer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-app-builder-by-wappress-15489796bd09e80a5df20c3ad36d5a32.yaml b/nuclei-templates/cve-less/plugins/mobile-app-builder-by-wappress-15489796bd09e80a5df20c3ad36d5a32.yaml new file mode 100644 index 0000000000..a4c0f980a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-app-builder-by-wappress-15489796bd09e80a5df20c3ad36d5a32.yaml @@ -0,0 +1,58 @@ +id: mobile-app-builder-by-wappress-15489796bd09e80a5df20c3ad36d5a32 + +info: + name: > + Mobile App Builder by WapPress <= 1.05 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31d7c673-b625-4862-bc03-378ad663467c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-app-builder-by-wappress/" + google-query: inurl:"/wp-content/plugins/mobile-app-builder-by-wappress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-app-builder-by-wappress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-app-builder-by-wappress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-app-builder-by-wappress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-assistant-connector-95502ecdd8716998187f526e7bbce587.yaml b/nuclei-templates/cve-less/plugins/mobile-assistant-connector-95502ecdd8716998187f526e7bbce587.yaml new file mode 100644 index 0000000000..2cb276b8af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-assistant-connector-95502ecdd8716998187f526e7bbce587.yaml @@ -0,0 +1,58 @@ +id: mobile-assistant-connector-95502ecdd8716998187f526e7bbce587 + +info: + name: > + Mobile Assistant Connector <= 2.2.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dd08e56-0425-4711-87f1-39625f0ffae2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-assistant-connector/" + google-query: inurl:"/wp-content/plugins/mobile-assistant-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-assistant-connector,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-assistant-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-assistant-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-banner-836d373165d51be73f6a63a08a49cd34.yaml b/nuclei-templates/cve-less/plugins/mobile-banner-836d373165d51be73f6a63a08a49cd34.yaml new file mode 100644 index 0000000000..f5718bf425 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-banner-836d373165d51be73f6a63a08a49cd34.yaml @@ -0,0 +1,58 @@ +id: mobile-banner-836d373165d51be73f6a63a08a49cd34 + +info: + name: > + Mobile Banner <= 1.5 - Cross-Site Request Forgery leading to Plugin Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e98aa389-9113-4997-8b96-1ca03cdfc235?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-banner/" + google-query: inurl:"/wp-content/plugins/mobile-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-browser-color-select-1fd788f4344858c60db9f8c8da73d2ed.yaml b/nuclei-templates/cve-less/plugins/mobile-browser-color-select-1fd788f4344858c60db9f8c8da73d2ed.yaml new file mode 100644 index 0000000000..4643ce76dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-browser-color-select-1fd788f4344858c60db9f8c8da73d2ed.yaml @@ -0,0 +1,58 @@ +id: mobile-browser-color-select-1fd788f4344858c60db9f8c8da73d2ed + +info: + name: > + Mobile browser color select <= 1.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/687cd0ac-5f78-4429-b6b5-dd1113143a4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-browser-color-select/" + google-query: inurl:"/wp-content/plugins/mobile-browser-color-select/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-browser-color-select,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-browser-color-select/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-browser-color-select" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-call-now-map-buttons-f7f88d86922c2be2737227c4eb89350c.yaml b/nuclei-templates/cve-less/plugins/mobile-call-now-map-buttons-f7f88d86922c2be2737227c4eb89350c.yaml new file mode 100644 index 0000000000..5ba80752cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-call-now-map-buttons-f7f88d86922c2be2737227c4eb89350c.yaml @@ -0,0 +1,58 @@ +id: mobile-call-now-map-buttons-f7f88d86922c2be2737227c4eb89350c + +info: + name: > + Mobile Call Now & Map Buttons <= 1.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a10ee756-1b71-4232-817c-1ba6ead7f0f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-call-now-map-buttons/" + google-query: inurl:"/wp-content/plugins/mobile-call-now-map-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-call-now-map-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-call-now-map-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-call-now-map-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-domain-fe35f0738e4eed8ba11e27597e2d27c7.yaml b/nuclei-templates/cve-less/plugins/mobile-domain-fe35f0738e4eed8ba11e27597e2d27c7.yaml new file mode 100644 index 0000000000..28738c34ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-domain-fe35f0738e4eed8ba11e27597e2d27c7.yaml @@ -0,0 +1,58 @@ +id: mobile-domain-fe35f0738e4eed8ba11e27597e2d27c7 + +info: + name: > + Mobile Domain <= 1.5.2 - Cross-Site Request Forgery and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f97bad7-6044-4727-a229-2890e02e36b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-domain/" + google-query: inurl:"/wp-content/plugins/mobile-domain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-domain,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-domain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-domain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-events-manager-32e884b82485fb448af167a249e58037.yaml b/nuclei-templates/cve-less/plugins/mobile-events-manager-32e884b82485fb448af167a249e58037.yaml new file mode 100644 index 0000000000..471a568642 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-events-manager-32e884b82485fb448af167a249e58037.yaml @@ -0,0 +1,58 @@ +id: mobile-events-manager-32e884b82485fb448af167a249e58037 + +info: + name: > + Mobile Events Manager < 1.4.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60ea00e2-e33d-452d-969b-4022d6a00417?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-events-manager/" + google-query: inurl:"/wp-content/plugins/mobile-events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-events-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-events-manager-d85e4c485a8dd6af61949c32b1b03d7f.yaml b/nuclei-templates/cve-less/plugins/mobile-events-manager-d85e4c485a8dd6af61949c32b1b03d7f.yaml new file mode 100644 index 0000000000..361297a74f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-events-manager-d85e4c485a8dd6af61949c32b1b03d7f.yaml @@ -0,0 +1,58 @@ +id: mobile-events-manager-d85e4c485a8dd6af61949c32b1b03d7f + +info: + name: > + Mobile Events Manager <= 1.4.7 - Authenticated (Administrator+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84683caa-8bc7-4adf-ad64-249f988047bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-events-manager/" + google-query: inurl:"/wp-content/plugins/mobile-events-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-events-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-events-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-events-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-friendly-app-builder-by-easytouch-719ff6e603e56a8355496bcf6077970d.yaml b/nuclei-templates/cve-less/plugins/mobile-friendly-app-builder-by-easytouch-719ff6e603e56a8355496bcf6077970d.yaml new file mode 100644 index 0000000000..67d36d537b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-friendly-app-builder-by-easytouch-719ff6e603e56a8355496bcf6077970d.yaml @@ -0,0 +1,58 @@ +id: mobile-friendly-app-builder-by-easytouch-719ff6e603e56a8355496bcf6077970d + +info: + name: > + How to Create an App for Android iPhone Easytouch <= 3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4e9eabe-21da-4a1a-8896-74020ecb0369?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-friendly-app-builder-by-easytouch/" + google-query: inurl:"/wp-content/plugins/mobile-friendly-app-builder-by-easytouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-friendly-app-builder-by-easytouch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-friendly-app-builder-by-easytouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-friendly-app-builder-by-easytouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-login-woocommerce-2d6d4e818a96c6e23f130697cfe95544.yaml b/nuclei-templates/cve-less/plugins/mobile-login-woocommerce-2d6d4e818a96c6e23f130697cfe95544.yaml new file mode 100644 index 0000000000..e6cfe93fc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-login-woocommerce-2d6d4e818a96c6e23f130697cfe95544.yaml @@ -0,0 +1,58 @@ +id: mobile-login-woocommerce-2d6d4e818a96c6e23f130697cfe95544 + +info: + name: > + OTP Login Woocommerce & Gravity Forms <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3887a61f-03ae-4b37-a81f-1ea39a111e3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-login-woocommerce/" + google-query: inurl:"/wp-content/plugins/mobile-login-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-login-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-login-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-login-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-login-woocommerce-cc96636e9196394b50c931f7bad41740.yaml b/nuclei-templates/cve-less/plugins/mobile-login-woocommerce-cc96636e9196394b50c931f7bad41740.yaml new file mode 100644 index 0000000000..34ad5bbe97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-login-woocommerce-cc96636e9196394b50c931f7bad41740.yaml @@ -0,0 +1,58 @@ +id: mobile-login-woocommerce-cc96636e9196394b50c931f7bad41740 + +info: + name: > + OTP Login Woocommerce & Gravity Forms <= 2.2 - Authentication Bypass to Privilege Escalation + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1b7b653-496f-467a-9513-4be1891f38ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-login-woocommerce/" + google-query: inurl:"/wp-content/plugins/mobile-login-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-login-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-login-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-login-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-menu-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/mobile-menu-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..23d64e216f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-menu-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: mobile-menu-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-menu/" + google-query: inurl:"/wp-content/plugins/mobile-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/mobile-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2bf41a8b49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: mobile-menu-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-menu/" + google-query: inurl:"/wp-content/plugins/mobile-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobile-menu-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/mobile-menu-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..aee0519cb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobile-menu-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: mobile-menu-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobile-menu/" + google-query: inurl:"/wp-content/plugins/mobile-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobile-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobile-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobile-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobilechief-mobile-site-creator-9d62e328d915f4bc5d1fc97fbe0f1bbc.yaml b/nuclei-templates/cve-less/plugins/mobilechief-mobile-site-creator-9d62e328d915f4bc5d1fc97fbe0f1bbc.yaml new file mode 100644 index 0000000000..f7c9d3ab92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobilechief-mobile-site-creator-9d62e328d915f4bc5d1fc97fbe0f1bbc.yaml @@ -0,0 +1,58 @@ +id: mobilechief-mobile-site-creator-9d62e328d915f4bc5d1fc97fbe0f1bbc + +info: + name: > + MobileChief – Mobile Site Builder <= 1.5.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e43482e1-7e11-49a6-bb44-0db421b51ed1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobilechief-mobile-site-creator/" + google-query: inurl:"/wp-content/plugins/mobilechief-mobile-site-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobilechief-mobile-site-creator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobilechief-mobile-site-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobilechief-mobile-site-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobilook-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/mobilook-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9c1785423e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobilook-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: mobilook-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobilook/" + google-query: inurl:"/wp-content/plugins/mobilook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobilook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobilook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobilook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mobiloud-mobile-app-plugin-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml b/nuclei-templates/cve-less/plugins/mobiloud-mobile-app-plugin-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml new file mode 100644 index 0000000000..e45a99d5dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mobiloud-mobile-app-plugin-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml @@ -0,0 +1,58 @@ +id: mobiloud-mobile-app-plugin-0c3f9f93e6c155cbea9171c4ea6c8a72 + +info: + name: > + MobiLoud – WordPress Mobile Apps – Convert your WordPress Website to Native Mobile Apps < 2.3.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a8edf0c-1e40-4aab-b704-b67e41214ce0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mobiloud-mobile-app-plugin/" + google-query: inurl:"/wp-content/plugins/mobiloud-mobile-app-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mobiloud-mobile-app-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mobiloud-mobile-app-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mobiloud-mobile-app-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal-dialog-1520c53880fff07e37200c6f21a3681b.yaml b/nuclei-templates/cve-less/plugins/modal-dialog-1520c53880fff07e37200c6f21a3681b.yaml new file mode 100644 index 0000000000..09d3894eab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal-dialog-1520c53880fff07e37200c6f21a3681b.yaml @@ -0,0 +1,58 @@ +id: modal-dialog-1520c53880fff07e37200c6f21a3681b + +info: + name: > + Modal Dialog <= 3.5.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5f82abe-64bb-4539-8fe7-261fad60cfa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal-dialog/" + google-query: inurl:"/wp-content/plugins/modal-dialog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal-dialog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal-dialog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal-dialog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal-dialog-d9262c55837abd68af90e0f35bcac926.yaml b/nuclei-templates/cve-less/plugins/modal-dialog-d9262c55837abd68af90e0f35bcac926.yaml new file mode 100644 index 0000000000..f5c5d9900b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal-dialog-d9262c55837abd68af90e0f35bcac926.yaml @@ -0,0 +1,58 @@ +id: modal-dialog-d9262c55837abd68af90e0f35bcac926 + +info: + name: > + Modal Dialog <= 3.5.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99140d47-88bb-48a1-863a-93a558541800?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal-dialog/" + google-query: inurl:"/wp-content/plugins/modal-dialog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal-dialog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal-dialog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal-dialog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal-popup-box-033ec25d9b806257f1f1c6f477525749.yaml b/nuclei-templates/cve-less/plugins/modal-popup-box-033ec25d9b806257f1f1c6f477525749.yaml new file mode 100644 index 0000000000..33a02739c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal-popup-box-033ec25d9b806257f1f1c6f477525749.yaml @@ -0,0 +1,58 @@ +id: modal-popup-box-033ec25d9b806257f1f1c6f477525749 + +info: + name: > + Modal Popup Box – Popup Builder, Show Offers And News in Popup <= 1.5.2 - Authenticated (Contributor+) PHP Object Injection in awl_modal_popup_box_shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca3d106-49df-49fc-a90d-e0cb26bd34b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal-popup-box/" + google-query: inurl:"/wp-content/plugins/modal-popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal-popup-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal-popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal-popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal-window-51118229a20281c018b629d79b26bfc7.yaml b/nuclei-templates/cve-less/plugins/modal-window-51118229a20281c018b629d79b26bfc7.yaml new file mode 100644 index 0000000000..96c48377f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal-window-51118229a20281c018b629d79b26bfc7.yaml @@ -0,0 +1,58 @@ +id: modal-window-51118229a20281c018b629d79b26bfc7 + +info: + name: > + Modal Window – create popup modal window <= 5.3.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/908ef8e1-d4dc-4348-90b8-d8f38666d9ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal-window/" + google-query: inurl:"/wp-content/plugins/modal-window/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal-window,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal-window/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal-window" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal-window-53ff289b27bc5f383393c1a07c0f7797.yaml b/nuclei-templates/cve-less/plugins/modal-window-53ff289b27bc5f383393c1a07c0f7797.yaml new file mode 100644 index 0000000000..cadf5bd9db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal-window-53ff289b27bc5f383393c1a07c0f7797.yaml @@ -0,0 +1,58 @@ +id: modal-window-53ff289b27bc5f383393c1a07c0f7797 + +info: + name: > + Modal Window – create popup modal window <= 5.2.1 - Cross-Site Request Forgery to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a928247a-3eb5-4889-bd42-b0263f4cd140?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal-window/" + google-query: inurl:"/wp-content/plugins/modal-window/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal-window,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal-window/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal-window" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal-window-b0b1da93e1bc1134b2188925015af3dc.yaml b/nuclei-templates/cve-less/plugins/modal-window-b0b1da93e1bc1134b2188925015af3dc.yaml new file mode 100644 index 0000000000..7cbe079e79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal-window-b0b1da93e1bc1134b2188925015af3dc.yaml @@ -0,0 +1,58 @@ +id: modal-window-b0b1da93e1bc1134b2188925015af3dc + +info: + name: > + Modal Window – create popup modal window <= 5.3.8 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/745709f4-bb9c-41c4-ab60-d9fc18e406a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal-window/" + google-query: inurl:"/wp-content/plugins/modal-window/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal-window,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal-window/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal-window" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal-window-cc4b9c34f1deaedc9df4457eb9089929.yaml b/nuclei-templates/cve-less/plugins/modal-window-cc4b9c34f1deaedc9df4457eb9089929.yaml new file mode 100644 index 0000000000..182c788136 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal-window-cc4b9c34f1deaedc9df4457eb9089929.yaml @@ -0,0 +1,58 @@ +id: modal-window-cc4b9c34f1deaedc9df4457eb9089929 + +info: + name: > + Modal Window <= 5.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal-window/" + google-query: inurl:"/wp-content/plugins/modal-window/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal-window,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal-window/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal-window" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal_survey-935046babdac50e2ed055ea1c49891d7.yaml b/nuclei-templates/cve-less/plugins/modal_survey-935046babdac50e2ed055ea1c49891d7.yaml new file mode 100644 index 0000000000..6ed592f8da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal_survey-935046babdac50e2ed055ea1c49891d7.yaml @@ -0,0 +1,58 @@ +id: modal_survey-935046babdac50e2ed055ea1c49891d7 + +info: + name: > + Modal Survey <= 2.0.1.8 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e30fe90a-774c-41ba-b28e-8b8128fd72cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal_survey/" + google-query: inurl:"/wp-content/plugins/modal_survey/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal_survey,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal_survey/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal_survey" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modal_survey-e5797459c3da936675c447c68b51e6f7.yaml b/nuclei-templates/cve-less/plugins/modal_survey-e5797459c3da936675c447c68b51e6f7.yaml new file mode 100644 index 0000000000..b706f2d347 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modal_survey-e5797459c3da936675c447c68b51e6f7.yaml @@ -0,0 +1,58 @@ +id: modal_survey-e5797459c3da936675c447c68b51e6f7 + +info: + name: > + Modal Survey < 2.0.1.8.2 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0215e53-0394-4845-93e4-463cd5642fb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modal_survey/" + google-query: inurl:"/wp-content/plugins/modal_survey/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modal_survey,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modal_survey/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modal_survey" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-addons-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/modern-addons-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2fd630f6f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-addons-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: modern-addons-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-addons-elementor/" + google-query: inurl:"/wp-content/plugins/modern-addons-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-addons-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-addons-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-addons-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-designs-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/modern-designs-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7a6e4cbc97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-designs-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: modern-designs-for-gravity-forms-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-designs-for-gravity-forms/" + google-query: inurl:"/wp-content/plugins/modern-designs-for-gravity-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-designs-for-gravity-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-designs-for-gravity-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-designs-for-gravity-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-042678d5382067c26f9d9ead263e484c.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-042678d5382067c26f9d9ead263e484c.yaml new file mode 100644 index 0000000000..a0403b1210 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-042678d5382067c26f9d9ead263e484c.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-042678d5382067c26f9d9ead263e484c + +info: + name: > + Modern Events Calendar lite < 6.10.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7465ca4-21e8-4935-b294-e7378b2b01a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-075f9c166c068dd8df28c57bf8d8a51a.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-075f9c166c068dd8df28c57bf8d8a51a.yaml new file mode 100644 index 0000000000..aea43f7e5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-075f9c166c068dd8df28c57bf8d8a51a.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-075f9c166c068dd8df28c57bf8d8a51a + +info: + name: > + Modern Events Calendar Lite < 5.22.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9ae88f8-88c1-4bb0-af9f-330f9760de1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.22.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-07fde43240c3cfe047c463512be535e6.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-07fde43240c3cfe047c463512be535e6.yaml new file mode 100644 index 0000000000..3514c0797c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-07fde43240c3cfe047c463512be535e6.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-07fde43240c3cfe047c463512be535e6 + +info: + name: > + Modern Events Calendar Lite <= 5.16.4 - Authenticated Arbitrary File Upload leading to Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9e67e3e-188c-4ca9-b846-d318859aeaf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-17e0aa925f801ca2b1033cf696b44f43.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-17e0aa925f801ca2b1033cf696b44f43.yaml new file mode 100644 index 0000000000..807873f8b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-17e0aa925f801ca2b1033cf696b44f43.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-17e0aa925f801ca2b1033cf696b44f43 + +info: + name: > + Modern Events Calendar Lite <= 5.16.4 - Unauthenticated Events Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e361473-8ed6-41d0-b409-2436189c1120?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4092810de68e3fe8831c5002fea9ea96.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4092810de68e3fe8831c5002fea9ea96.yaml new file mode 100644 index 0000000000..115eb12c6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4092810de68e3fe8831c5002fea9ea96.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-4092810de68e3fe8831c5002fea9ea96 + +info: + name: > + Modern Events Calendar lite < 7.1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f213fb42-5bab-4017-80ea-ce6543031af2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4bedd1090bb0c6292f056d8449ad5ac2.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4bedd1090bb0c6292f056d8449ad5ac2.yaml new file mode 100644 index 0000000000..fedf3d7c58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4bedd1090bb0c6292f056d8449ad5ac2.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-4bedd1090bb0c6292f056d8449ad5ac2 + +info: + name: > + Modern Events Calendar Lite <= 6.1.0 - Reflected Cross-Site Scripting via current_month_divider parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eab9a5e-ca51-4952-9fd4-3d0046402e29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4dd145dc4bcaa7b143713cd5ced149a0.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4dd145dc4bcaa7b143713cd5ced149a0.yaml new file mode 100644 index 0000000000..2476e21761 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-4dd145dc4bcaa7b143713cd5ced149a0.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-4dd145dc4bcaa7b143713cd5ced149a0 + +info: + name: > + Modern Events Calendar Lite <= 5.16.5 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4ff715e-056e-48d8-bb82-d4f89047384f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-61e330316e7097e0d9e2b13495d29a1f.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-61e330316e7097e0d9e2b13495d29a1f.yaml new file mode 100644 index 0000000000..c5afe34a9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-61e330316e7097e0d9e2b13495d29a1f.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-61e330316e7097e0d9e2b13495d29a1f + +info: + name: > + Modern Events Calendar Lite <= 6.1.6 - Subscriber+ Category Add Leading to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32aa1fdc-2fca-4486-b704-eabe4668361e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-6a51878e913acce27812b845eba68b33.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-6a51878e913acce27812b845eba68b33.yaml new file mode 100644 index 0000000000..cebbab464c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-6a51878e913acce27812b845eba68b33.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-6a51878e913acce27812b845eba68b33 + +info: + name: > + Modern Events Calendar Lite <= 6.2.9 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4701efb1-4208-4178-90c0-bfc006d1a72a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml new file mode 100644 index 0000000000..5cfe2b3a50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-7ec9f64a1c57f6403dfdbff51a32f9cb + +info: + name: > + Modern Events Calendar Lite <= 5.1.6 - Missing Authorization to Stored Cross-Site Scripting and Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86c04e9d-0bcd-4637-bd4a-aeb2e3f373ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-aa263c677cae425acabeef2fb6fe8722.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-aa263c677cae425acabeef2fb6fe8722.yaml new file mode 100644 index 0000000000..2912bc4608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-aa263c677cae425acabeef2fb6fe8722.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-aa263c677cae425acabeef2fb6fe8722 + +info: + name: > + Modern Events Calendar Lite <= 6.1.4 - Unauthenticated Blind SQL Injection via time Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bfc18fa-905c-408f-bbb4-ce207c322298?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-afec02ed4fb861008e492afadabc92bd.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-afec02ed4fb861008e492afadabc92bd.yaml new file mode 100644 index 0000000000..11eae3bcdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-afec02ed4fb861008e492afadabc92bd.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-afec02ed4fb861008e492afadabc92bd + +info: + name: > + Modern Events Calendar Lite <= 6.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2329a5d-0649-498e-a18c-a17de7b30df4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-b99ab0aa7e8eaa169d59d870ba15e44f.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-b99ab0aa7e8eaa169d59d870ba15e44f.yaml new file mode 100644 index 0000000000..873ebe22da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-b99ab0aa7e8eaa169d59d870ba15e44f.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-b99ab0aa7e8eaa169d59d870ba15e44f + +info: + name: > + Modern Events Calendar Lite <= 5.22.2 - Authenticated Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e240f4b-dfdf-4954-af39-34e24a05a2ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.22.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-c1b0a376f2ef6bdd72b49e73751ed117.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-c1b0a376f2ef6bdd72b49e73751ed117.yaml new file mode 100644 index 0000000000..a0cec551c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-c1b0a376f2ef6bdd72b49e73751ed117.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-c1b0a376f2ef6bdd72b49e73751ed117 + +info: + name: > + Modern Events Calendar Lite <= 5.16.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3aa7b27-a335-4f82-a50a-45becdd5ef4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-f91654e07624f568e772537007d8ac97.yaml b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-f91654e07624f568e772537007d8ac97.yaml new file mode 100644 index 0000000000..49e77bc3dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-events-calendar-lite-f91654e07624f568e772537007d8ac97.yaml @@ -0,0 +1,58 @@ +id: modern-events-calendar-lite-f91654e07624f568e772537007d8ac97 + +info: + name: > + Modern Events Calendar Lite <= 6.3.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48bf9bf4-1b8a-41cc-adc9-a618d075c7f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-events-calendar-lite/" + google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-events-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-events-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-footnotes-2885ef88741e4fead832f53749584e1b.yaml b/nuclei-templates/cve-less/plugins/modern-footnotes-2885ef88741e4fead832f53749584e1b.yaml new file mode 100644 index 0000000000..a26da36d22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-footnotes-2885ef88741e4fead832f53749584e1b.yaml @@ -0,0 +1,58 @@ +id: modern-footnotes-2885ef88741e4fead832f53749584e1b + +info: + name: > + Modern Footnotes <= 1.4.16 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-footnotes/" + google-query: inurl:"/wp-content/plugins/modern-footnotes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-footnotes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-footnotes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-footnotes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modern-footnotes-81c4580372e23b6ce41423bd5b13253e.yaml b/nuclei-templates/cve-less/plugins/modern-footnotes-81c4580372e23b6ce41423bd5b13253e.yaml new file mode 100644 index 0000000000..0640052bcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modern-footnotes-81c4580372e23b6ce41423bd5b13253e.yaml @@ -0,0 +1,58 @@ +id: modern-footnotes-81c4580372e23b6ce41423bd5b13253e + +info: + name: > + Modern Footnotes <= 1.4.15 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94b98842-8c75-4623-8cc9-ad3dc0916a18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modern-footnotes/" + google-query: inurl:"/wp-content/plugins/modern-footnotes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modern-footnotes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modern-footnotes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern-footnotes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modify-comment-fields-b8d61c50a15345214ea99c6a9bec5742.yaml b/nuclei-templates/cve-less/plugins/modify-comment-fields-b8d61c50a15345214ea99c6a9bec5742.yaml new file mode 100644 index 0000000000..dc12a6589b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modify-comment-fields-b8d61c50a15345214ea99c6a9bec5742.yaml @@ -0,0 +1,58 @@ +id: modify-comment-fields-b8d61c50a15345214ea99c6a9bec5742 + +info: + name: > + Comment Fields <= 1.03 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a646ebe5-3445-4e9b-99a9-23761d4fba9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modify-comment-fields/" + google-query: inurl:"/wp-content/plugins/modify-comment-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modify-comment-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modify-comment-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modify-comment-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modify-profile-fields-dashboard-menu-buttons-ce8e510bc9bb481895074d6c2f363e65.yaml b/nuclei-templates/cve-less/plugins/modify-profile-fields-dashboard-menu-buttons-ce8e510bc9bb481895074d6c2f363e65.yaml new file mode 100644 index 0000000000..ee4cf7b885 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modify-profile-fields-dashboard-menu-buttons-ce8e510bc9bb481895074d6c2f363e65.yaml @@ -0,0 +1,58 @@ +id: modify-profile-fields-dashboard-menu-buttons-ce8e510bc9bb481895074d6c2f363e65 + +info: + name: > + Profile & Dashboard fields <= 1.03 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/272fd463-8e81-4041-9ab8-b2770d698a5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modify-profile-fields-dashboard-menu-buttons/" + google-query: inurl:"/wp-content/plugins/modify-profile-fields-dashboard-menu-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modify-profile-fields-dashboard-menu-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modify-profile-fields-dashboard-menu-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modify-profile-fields-dashboard-menu-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-010a08c8c856a2f4fe4e778e18ce7576.yaml b/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-010a08c8c856a2f4fe4e778e18ce7576.yaml new file mode 100644 index 0000000000..9de3dcfe19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-010a08c8c856a2f4fe4e778e18ce7576.yaml @@ -0,0 +1,58 @@ +id: modula-best-grid-gallery-010a08c8c856a2f4fe4e778e18ce7576 + +info: + name: > + Modula Image Gallery <= 2.2.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/691962c2-e67f-4f6e-9002-6f2a4ccbbdee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modula-best-grid-gallery/" + google-query: inurl:"/wp-content/plugins/modula-best-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modula-best-grid-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modula-best-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modula-best-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-4d03edde0e9ae80bf33d37f9424bb420.yaml b/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-4d03edde0e9ae80bf33d37f9424bb420.yaml new file mode 100644 index 0000000000..b8bc331f30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-4d03edde0e9ae80bf33d37f9424bb420.yaml @@ -0,0 +1,58 @@ +id: modula-best-grid-gallery-4d03edde0e9ae80bf33d37f9424bb420 + +info: + name: > + Customizable WordPress Gallery Plugin – Modula Image Gallery <= 2.6.9 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/359b596e-1973-4bf6-a012-84b422c0f2c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modula-best-grid-gallery/" + google-query: inurl:"/wp-content/plugins/modula-best-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modula-best-grid-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modula-best-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modula-best-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-5e22f1474aec701db6c415effe7ee5bd.yaml b/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-5e22f1474aec701db6c415effe7ee5bd.yaml new file mode 100644 index 0000000000..c77a720315 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-5e22f1474aec701db6c415effe7ee5bd.yaml @@ -0,0 +1,58 @@ +id: modula-best-grid-gallery-5e22f1474aec701db6c415effe7ee5bd + +info: + name: > + Modula Image Gallery <= 2.6.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/354c2c6c-5ba1-4bbe-88e4-9d219b66802a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modula-best-grid-gallery/" + google-query: inurl:"/wp-content/plugins/modula-best-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modula-best-grid-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modula-best-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modula-best-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-e61de1050508666739a7f43858724491.yaml b/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-e61de1050508666739a7f43858724491.yaml new file mode 100644 index 0000000000..c9b6291bc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/modula-best-grid-gallery-e61de1050508666739a7f43858724491.yaml @@ -0,0 +1,58 @@ +id: modula-best-grid-gallery-e61de1050508666739a7f43858724491 + +info: + name: > + Modula <= 2.7.4 - Incomplete Authorization via 'save_image' and 'save_images' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f029bd86-d979-45d1-97fe-75c43fb71148?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/modula-best-grid-gallery/" + google-query: inurl:"/wp-content/plugins/modula-best-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,modula-best-grid-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/modula-best-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modula-best-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mojoplug-slide-panel-2c9039886374ff786c4c2e679732fd8d.yaml b/nuclei-templates/cve-less/plugins/mojoplug-slide-panel-2c9039886374ff786c4c2e679732fd8d.yaml new file mode 100644 index 0000000000..35ec95ec17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mojoplug-slide-panel-2c9039886374ff786c4c2e679732fd8d.yaml @@ -0,0 +1,58 @@ +id: mojoplug-slide-panel-2c9039886374ff786c4c2e679732fd8d + +info: + name: > + MojoPlug Slide Panel <= 1.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/639a46b3-d19f-4ab4-995e-fd3de556b76e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mojoplug-slide-panel/" + google-query: inurl:"/wp-content/plugins/mojoplug-slide-panel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mojoplug-slide-panel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mojoplug-slide-panel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mojoplug-slide-panel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/molie-instructure-canvas-linking-tool-5efd9ccd23023c6687750d4699e0bae0.yaml b/nuclei-templates/cve-less/plugins/molie-instructure-canvas-linking-tool-5efd9ccd23023c6687750d4699e0bae0.yaml new file mode 100644 index 0000000000..8789fc354c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/molie-instructure-canvas-linking-tool-5efd9ccd23023c6687750d4699e0bae0.yaml @@ -0,0 +1,58 @@ +id: molie-instructure-canvas-linking-tool-5efd9ccd23023c6687750d4699e0bae0 + +info: + name: > + MOLIE <= 0.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00086b84-c1ec-447a-a536-1c73eac1cc85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/molie-instructure-canvas-linking-tool/" + google-query: inurl:"/wp-content/plugins/molie-instructure-canvas-linking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,molie-instructure-canvas-linking-tool,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/molie-instructure-canvas-linking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "molie-instructure-canvas-linking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/molie-instructure-canvas-linking-tool-d9dca1ca98884ba1a76cc0dbb34099eb.yaml b/nuclei-templates/cve-less/plugins/molie-instructure-canvas-linking-tool-d9dca1ca98884ba1a76cc0dbb34099eb.yaml new file mode 100644 index 0000000000..03e937bbca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/molie-instructure-canvas-linking-tool-d9dca1ca98884ba1a76cc0dbb34099eb.yaml @@ -0,0 +1,58 @@ +id: molie-instructure-canvas-linking-tool-d9dca1ca98884ba1a76cc0dbb34099eb + +info: + name: > + MOLIE – Instructure Canvas Linking tool <= 0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef14c7b4-8cad-4139-a170-42470202ec24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/molie-instructure-canvas-linking-tool/" + google-query: inurl:"/wp-content/plugins/molie-instructure-canvas-linking-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,molie-instructure-canvas-linking-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/molie-instructure-canvas-linking-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "molie-instructure-canvas-linking-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mollie-forms-50358f3970bdc1205a29969915a6519c.yaml b/nuclei-templates/cve-less/plugins/mollie-forms-50358f3970bdc1205a29969915a6519c.yaml new file mode 100644 index 0000000000..ae58ff58ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mollie-forms-50358f3970bdc1205a29969915a6519c.yaml @@ -0,0 +1,58 @@ +id: mollie-forms-50358f3970bdc1205a29969915a6519c + +info: + name: > + Mollie Forms <= 2.6.3 - Missing Authorization to Arbitrary Post Duplication + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43c4ca71-0bf0-4529-97d9-2349f96bbb9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mollie-forms/" + google-query: inurl:"/wp-content/plugins/mollie-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mollie-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mollie-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mollie-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mollie-forms-8b372eebc313c06900867e460f19a6e4.yaml b/nuclei-templates/cve-less/plugins/mollie-forms-8b372eebc313c06900867e460f19a6e4.yaml new file mode 100644 index 0000000000..f06340086c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mollie-forms-8b372eebc313c06900867e460f19a6e4.yaml @@ -0,0 +1,58 @@ +id: mollie-forms-8b372eebc313c06900867e460f19a6e4 + +info: + name: > + Mollie Forms <= 2.6.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/353c244f-6d5d-47d6-988e-33da722a02f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mollie-forms/" + google-query: inurl:"/wp-content/plugins/mollie-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mollie-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mollie-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mollie-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mollie-payments-for-woocommerce-27287fd1e5df71f58411b21feefa43bc.yaml b/nuclei-templates/cve-less/plugins/mollie-payments-for-woocommerce-27287fd1e5df71f58411b21feefa43bc.yaml new file mode 100644 index 0000000000..e317fcdf78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mollie-payments-for-woocommerce-27287fd1e5df71f58411b21feefa43bc.yaml @@ -0,0 +1,58 @@ +id: mollie-payments-for-woocommerce-27287fd1e5df71f58411b21feefa43bc + +info: + name: > + Mollie Payments for WooCommerce <= 7.3.11 - Authenticated (Shop Manager+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d350095-125a-4445-89c1-bce437e4098c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mollie-payments-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/mollie-payments-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mollie-payments-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mollie-payments-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mollie-payments-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/molongui-authorship-10a5adb358d22a46b8999d9c2d8dbd41.yaml b/nuclei-templates/cve-less/plugins/molongui-authorship-10a5adb358d22a46b8999d9c2d8dbd41.yaml new file mode 100644 index 0000000000..8c6e929c4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/molongui-authorship-10a5adb358d22a46b8999d9c2d8dbd41.yaml @@ -0,0 +1,58 @@ +id: molongui-authorship-10a5adb358d22a46b8999d9c2d8dbd41 + +info: + name: > + Author Box, Guest Author and Co-Authors for Your Posts – Molongui <= 4.7.4 - Information Exposure via ma_debug + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/538e9ce3-2d48-44ad-bd08-8eead3ef15c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/molongui-authorship/" + google-query: inurl:"/wp-content/plugins/molongui-authorship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,molongui-authorship,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/molongui-authorship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "molongui-authorship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/molongui-authorship-1a6bdad9f927d9cadf5b74b8297f6ad5.yaml b/nuclei-templates/cve-less/plugins/molongui-authorship-1a6bdad9f927d9cadf5b74b8297f6ad5.yaml new file mode 100644 index 0000000000..d88e337181 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/molongui-authorship-1a6bdad9f927d9cadf5b74b8297f6ad5.yaml @@ -0,0 +1,58 @@ +id: molongui-authorship-1a6bdad9f927d9cadf5b74b8297f6ad5 + +info: + name: > + Molongui <= 4.6.19 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16130c5d-9865-4953-b078-0b448722e36d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/molongui-authorship/" + google-query: inurl:"/wp-content/plugins/molongui-authorship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,molongui-authorship,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/molongui-authorship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "molongui-authorship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/molongui-authorship-49b132283a9d5d5c8363ef530fb522a7.yaml b/nuclei-templates/cve-less/plugins/molongui-authorship-49b132283a9d5d5c8363ef530fb522a7.yaml new file mode 100644 index 0000000000..a5029c1af0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/molongui-authorship-49b132283a9d5d5c8363ef530fb522a7.yaml @@ -0,0 +1,58 @@ +id: molongui-authorship-49b132283a9d5d5c8363ef530fb522a7 + +info: + name: > + Molongui <= 4.7.7 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13f33422-13ba-4696-a473-cf8ca00d4b0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/molongui-authorship/" + google-query: inurl:"/wp-content/plugins/molongui-authorship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,molongui-authorship,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/molongui-authorship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "molongui-authorship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/molongui-authorship-8085a553b4ae6877292f03c349db3efa.yaml b/nuclei-templates/cve-less/plugins/molongui-authorship-8085a553b4ae6877292f03c349db3efa.yaml new file mode 100644 index 0000000000..5bde696e6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/molongui-authorship-8085a553b4ae6877292f03c349db3efa.yaml @@ -0,0 +1,58 @@ +id: molongui-authorship-8085a553b4ae6877292f03c349db3efa + +info: + name: > + Molongui <= 4.7.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f01ecab-2dfe-45d2-9d9a-ba1e30c7d75f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/molongui-authorship/" + google-query: inurl:"/wp-content/plugins/molongui-authorship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,molongui-authorship,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/molongui-authorship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "molongui-authorship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/molongui-authorship-bc5e92508a73c7bd5e881af5254740d1.yaml b/nuclei-templates/cve-less/plugins/molongui-authorship-bc5e92508a73c7bd5e881af5254740d1.yaml new file mode 100644 index 0000000000..dff3f99218 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/molongui-authorship-bc5e92508a73c7bd5e881af5254740d1.yaml @@ -0,0 +1,58 @@ +id: molongui-authorship-bc5e92508a73c7bd5e881af5254740d1 + +info: + name: > + Molongui <= 4.7.7 - Authenticated (Author+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62aa0cc4-ef8e-4727-ac07-3481c0464b05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/molongui-authorship/" + google-query: inurl:"/wp-content/plugins/molongui-authorship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,molongui-authorship,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/molongui-authorship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "molongui-authorship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/molongui-authorship-d652edcb171ca597cc73fc3fc8e858f4.yaml b/nuclei-templates/cve-less/plugins/molongui-authorship-d652edcb171ca597cc73fc3fc8e858f4.yaml new file mode 100644 index 0000000000..0cc8a55bb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/molongui-authorship-d652edcb171ca597cc73fc3fc8e858f4.yaml @@ -0,0 +1,58 @@ +id: molongui-authorship-d652edcb171ca597cc73fc3fc8e858f4 + +info: + name: > + Molongui <= 4.6.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cff04656-5930-4324-9ddf-43a2166cdf04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/molongui-authorship/" + google-query: inurl:"/wp-content/plugins/molongui-authorship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,molongui-authorship,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/molongui-authorship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "molongui-authorship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/momoyoga-integration-179886cc2bdc18bcdb57983a57be1a6f.yaml b/nuclei-templates/cve-less/plugins/momoyoga-integration-179886cc2bdc18bcdb57983a57be1a6f.yaml new file mode 100644 index 0000000000..924b8bd0c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/momoyoga-integration-179886cc2bdc18bcdb57983a57be1a6f.yaml @@ -0,0 +1,58 @@ +id: momoyoga-integration-179886cc2bdc18bcdb57983a57be1a6f + +info: + name: > + Yoga Schedule Momoyoga <= 2.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d0f1227-cb60-4973-95a6-6272f5173bf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/momoyoga-integration/" + google-query: inurl:"/wp-content/plugins/momoyoga-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,momoyoga-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/momoyoga-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "momoyoga-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/monarch-a2b478ab05dc0dd0616e45e762ef893a.yaml b/nuclei-templates/cve-less/plugins/monarch-a2b478ab05dc0dd0616e45e762ef893a.yaml new file mode 100644 index 0000000000..14aa627284 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/monarch-a2b478ab05dc0dd0616e45e762ef893a.yaml @@ -0,0 +1,58 @@ +id: monarch-a2b478ab05dc0dd0616e45e762ef893a + +info: + name: > + Elegant Themes Monarch < 1.2.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0195bddf-eafe-45f2-9424-ffa235d9b4dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/monarch/" + google-query: inurl:"/wp-content/plugins/monarch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,monarch,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/monarch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "monarch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/monetize-4faeaa036aeca6705f522edda2ba7bc8.yaml b/nuclei-templates/cve-less/plugins/monetize-4faeaa036aeca6705f522edda2ba7bc8.yaml new file mode 100644 index 0000000000..cdd94d5c0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/monetize-4faeaa036aeca6705f522edda2ba7bc8.yaml @@ -0,0 +1,58 @@ +id: monetize-4faeaa036aeca6705f522edda2ba7bc8 + +info: + name: > + Monetize <= 1.03 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f59d905-0b43-4a63-b5da-273b051f201b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/monetize/" + google-query: inurl:"/wp-content/plugins/monetize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,monetize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/monetize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "monetize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/monsters-editor-10-for-wp-super-edit-fb73f4916ee278e30528ba4cbf3fead6.yaml b/nuclei-templates/cve-less/plugins/monsters-editor-10-for-wp-super-edit-fb73f4916ee278e30528ba4cbf3fead6.yaml new file mode 100644 index 0000000000..e826a09a15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/monsters-editor-10-for-wp-super-edit-fb73f4916ee278e30528ba4cbf3fead6.yaml @@ -0,0 +1,58 @@ +id: monsters-editor-10-for-wp-super-edit-fb73f4916ee278e30528ba4cbf3fead6 + +info: + name: > + Monsters Editor for WP Super Edit <= 1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2f8c71d-ad19-4265-8d33-3b0e7dbbf4c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/monsters-editor-10-for-wp-super-edit/" + google-query: inurl:"/wp-content/plugins/monsters-editor-10-for-wp-super-edit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,monsters-editor-10-for-wp-super-edit,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/monsters-editor-10-for-wp-super-edit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "monsters-editor-10-for-wp-super-edit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mooberry-book-manager-142c8db8e90cbfc032437c60b440a7f4.yaml b/nuclei-templates/cve-less/plugins/mooberry-book-manager-142c8db8e90cbfc032437c60b440a7f4.yaml new file mode 100644 index 0000000000..cca58a1292 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mooberry-book-manager-142c8db8e90cbfc032437c60b440a7f4.yaml @@ -0,0 +1,58 @@ +id: mooberry-book-manager-142c8db8e90cbfc032437c60b440a7f4 + +info: + name: > + Mooberry Book Manager <= 4.15.12 - Unauthenticated Information Exposure via Export Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c284ed3e-7f8e-4841-88f3-33e99f98aa83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mooberry-book-manager/" + google-query: inurl:"/wp-content/plugins/mooberry-book-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mooberry-book-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mooberry-book-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mooberry-book-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/moolamojo-0c582e7ad3f8369ffdb5a262e96fd69b.yaml b/nuclei-templates/cve-less/plugins/moolamojo-0c582e7ad3f8369ffdb5a262e96fd69b.yaml new file mode 100644 index 0000000000..39d7a4ec59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/moolamojo-0c582e7ad3f8369ffdb5a262e96fd69b.yaml @@ -0,0 +1,58 @@ +id: moolamojo-0c582e7ad3f8369ffdb5a262e96fd69b + +info: + name: > + MoolaMojo <= 0.7.4.1 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4b69cff-31ac-4abe-8f03-07ee3fb4c285?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/moolamojo/" + google-query: inurl:"/wp-content/plugins/moolamojo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,moolamojo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/moolamojo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moolamojo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/moosend-email-marketing-e54ab178e0430008f60d1b3ffa4fc240.yaml b/nuclei-templates/cve-less/plugins/moosend-email-marketing-e54ab178e0430008f60d1b3ffa4fc240.yaml new file mode 100644 index 0000000000..f6a58a7a36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/moosend-email-marketing-e54ab178e0430008f60d1b3ffa4fc240.yaml @@ -0,0 +1,58 @@ +id: moosend-email-marketing-e54ab178e0430008f60d1b3ffa4fc240 + +info: + name: > + Moosend Website Connector <= 1.0.189 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90c0e937-19fd-484e-a50f-42b00a6eeb30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/moosend-email-marketing/" + google-query: inurl:"/wp-content/plugins/moosend-email-marketing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,moosend-email-marketing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/moosend-email-marketing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moosend-email-marketing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.189') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/moova-for-woocommerce-1e2c9d24715886d9ba11e810be7c57d2.yaml b/nuclei-templates/cve-less/plugins/moova-for-woocommerce-1e2c9d24715886d9ba11e810be7c57d2.yaml new file mode 100644 index 0000000000..100899a370 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/moova-for-woocommerce-1e2c9d24715886d9ba11e810be7c57d2.yaml @@ -0,0 +1,58 @@ +id: moova-for-woocommerce-1e2c9d24715886d9ba11e810be7c57d2 + +info: + name: > + Moova for WooCommerce <= 3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b0f85d5-6ef7-4e6d-a03b-75672fca654c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/moova-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/moova-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,moova-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/moova-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moova-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/more-better-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/more-better-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d87bb7bf8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/more-better-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: more-better-reviews-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/more-better-reviews-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/more-better-reviews-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,more-better-reviews-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/more-better-reviews-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "more-better-reviews-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/more-featured-images-b073725ff3ce84124c4fbaa39058dd12.yaml b/nuclei-templates/cve-less/plugins/more-featured-images-b073725ff3ce84124c4fbaa39058dd12.yaml new file mode 100644 index 0000000000..890fe9c2f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/more-featured-images-b073725ff3ce84124c4fbaa39058dd12.yaml @@ -0,0 +1,58 @@ +id: more-featured-images-b073725ff3ce84124c4fbaa39058dd12 + +info: + name: > + More Featured Images <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c17c344b-c891-4086-98c8-cea5673173d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/more-featured-images/" + google-query: inurl:"/wp-content/plugins/more-featured-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,more-featured-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/more-featured-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "more-featured-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/more-from-google-86350814cdd1486c9f09dfd7f4c47b39.yaml b/nuclei-templates/cve-less/plugins/more-from-google-86350814cdd1486c9f09dfd7f4c47b39.yaml new file mode 100644 index 0000000000..234abc8f8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/more-from-google-86350814cdd1486c9f09dfd7f4c47b39.yaml @@ -0,0 +1,58 @@ +id: more-from-google-86350814cdd1486c9f09dfd7f4c47b39 + +info: + name: > + More From Google <= 0.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db2915ca-610a-42a9-a4f8-d15729091cd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/more-from-google/" + google-query: inurl:"/wp-content/plugins/more-from-google/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,more-from-google,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/more-from-google/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "more-from-google" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/moreads-se-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml b/nuclei-templates/cve-less/plugins/moreads-se-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml new file mode 100644 index 0000000000..a1baef6eae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/moreads-se-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml @@ -0,0 +1,58 @@ +id: moreads-se-61f56b8a3def3b7154a28f2e5a9ff0a6 + +info: + name: > + moreAds SE <= 1.4.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc72e388-9ffc-4b99-8835-4b4b6ef46f95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/moreads-se/" + google-query: inurl:"/wp-content/plugins/moreads-se/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,moreads-se,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/moreads-se/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moreads-se" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/morpheus-slider-6368f485fdfbfa4bcc6e9fc96c77a440.yaml b/nuclei-templates/cve-less/plugins/morpheus-slider-6368f485fdfbfa4bcc6e9fc96c77a440.yaml new file mode 100644 index 0000000000..c1d2a24675 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/morpheus-slider-6368f485fdfbfa4bcc6e9fc96c77a440.yaml @@ -0,0 +1,58 @@ +id: morpheus-slider-6368f485fdfbfa4bcc6e9fc96c77a440 + +info: + name: > + Responsive 3D Slider <= 1.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29fee127-73f5-4cd5-9bfb-799f1c0a9f83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/morpheus-slider/" + google-query: inurl:"/wp-content/plugins/morpheus-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,morpheus-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/morpheus-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "morpheus-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mortgage-calculators-wp-51d2a215a7382b06f6f66c19158d7560.yaml b/nuclei-templates/cve-less/plugins/mortgage-calculators-wp-51d2a215a7382b06f6f66c19158d7560.yaml new file mode 100644 index 0000000000..0b19b5edcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mortgage-calculators-wp-51d2a215a7382b06f6f66c19158d7560.yaml @@ -0,0 +1,58 @@ +id: mortgage-calculators-wp-51d2a215a7382b06f6f66c19158d7560 + +info: + name: > + Mortgage Calculators WP < 1.53 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92c16bb5-b52c-4453-9121-0c9d056a0cdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mortgage-calculators-wp/" + google-query: inurl:"/wp-content/plugins/mortgage-calculators-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mortgage-calculators-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mortgage-calculators-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mortgage-calculators-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mortgage-calculators-wp-fa0a09e9f8b4c6d9a874ba45527ab6cd.yaml b/nuclei-templates/cve-less/plugins/mortgage-calculators-wp-fa0a09e9f8b4c6d9a874ba45527ab6cd.yaml new file mode 100644 index 0000000000..267517dbe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mortgage-calculators-wp-fa0a09e9f8b4c6d9a874ba45527ab6cd.yaml @@ -0,0 +1,58 @@ +id: mortgage-calculators-wp-fa0a09e9f8b4c6d9a874ba45527ab6cd + +info: + name: > + Mortgage Calculators WP <= 1.56 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5a37df3-001b-4acd-91b1-7961896fb71f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mortgage-calculators-wp/" + google-query: inurl:"/wp-content/plugins/mortgage-calculators-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mortgage-calculators-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mortgage-calculators-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mortgage-calculators-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mortgage-loan-calculator-f33817d1f67c73c0784fb9213086394b.yaml b/nuclei-templates/cve-less/plugins/mortgage-loan-calculator-f33817d1f67c73c0784fb9213086394b.yaml new file mode 100644 index 0000000000..e305be8a24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mortgage-loan-calculator-f33817d1f67c73c0784fb9213086394b.yaml @@ -0,0 +1,58 @@ +id: mortgage-loan-calculator-f33817d1f67c73c0784fb9213086394b + +info: + name: > + Mortgage Calculator / Loan Calculator < 1.5.17 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c115da4f-02f1-40b6-ba47-337b279de3e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mortgage-loan-calculator/" + google-query: inurl:"/wp-content/plugins/mortgage-loan-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mortgage-loan-calculator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mortgage-loan-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mortgage-loan-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/most-and-least-read-posts-widget-9cd32e924e90d865dad41a30260e1347.yaml b/nuclei-templates/cve-less/plugins/most-and-least-read-posts-widget-9cd32e924e90d865dad41a30260e1347.yaml new file mode 100644 index 0000000000..950a743f8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/most-and-least-read-posts-widget-9cd32e924e90d865dad41a30260e1347.yaml @@ -0,0 +1,58 @@ +id: most-and-least-read-posts-widget-9cd32e924e90d865dad41a30260e1347 + +info: + name: > + Most And Least Read Posts Widget <=2.5.16 - Authenticated(Contributor+) SQL Injection via Widget settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9fa55cc-c686-43e4-a028-dd2721d2db85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/most-and-least-read-posts-widget/" + google-query: inurl:"/wp-content/plugins/most-and-least-read-posts-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,most-and-least-read-posts-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/most-and-least-read-posts-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "most-and-least-read-posts-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/most-popular-posts-widget-lite-53a42a688a74a64b49721153f05dafd3.yaml b/nuclei-templates/cve-less/plugins/most-popular-posts-widget-lite-53a42a688a74a64b49721153f05dafd3.yaml new file mode 100644 index 0000000000..1cbe93d158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/most-popular-posts-widget-lite-53a42a688a74a64b49721153f05dafd3.yaml @@ -0,0 +1,58 @@ +id: most-popular-posts-widget-lite-53a42a688a74a64b49721153f05dafd3 + +info: + name: > + Most Popular Posts Widget <= 0.8 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/788bf199-bf09-4076-b5f1-129b6287096a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/most-popular-posts-widget-lite/" + google-query: inurl:"/wp-content/plugins/most-popular-posts-widget-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,most-popular-posts-widget-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/most-popular-posts-widget-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "most-popular-posts-widget-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-0c539e112e844dc3d098253d72219bba.yaml b/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-0c539e112e844dc3d098253d72219bba.yaml new file mode 100644 index 0000000000..8fb5ef2fea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-0c539e112e844dc3d098253d72219bba.yaml @@ -0,0 +1,58 @@ +id: motopress-hotel-booking-lite-0c539e112e844dc3d098253d72219bba + +info: + name: > + Hotel Booking Lite <= 4.8.4 - Insufficient Path Validation to Unauthenticated Arbitrary File Deletion and Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8de25651-4119-4806-91e4-4ea213086bfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motopress-hotel-booking-lite/" + google-query: inurl:"/wp-content/plugins/motopress-hotel-booking-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motopress-hotel-booking-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motopress-hotel-booking-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motopress-hotel-booking-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-6df10c7399c7708f8d890fc41acb909e.yaml b/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-6df10c7399c7708f8d890fc41acb909e.yaml new file mode 100644 index 0000000000..e46ea63922 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-6df10c7399c7708f8d890fc41acb909e.yaml @@ -0,0 +1,58 @@ +id: motopress-hotel-booking-lite-6df10c7399c7708f8d890fc41acb909e + +info: + name: > + Hotel Booking Lite <= 4.11.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d7f1283-a274-49a2-8bec-da178771b13a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motopress-hotel-booking-lite/" + google-query: inurl:"/wp-content/plugins/motopress-hotel-booking-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motopress-hotel-booking-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motopress-hotel-booking-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motopress-hotel-booking-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-a7db1d4f6120721a3e8e59e280eb640d.yaml b/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-a7db1d4f6120721a3e8e59e280eb640d.yaml new file mode 100644 index 0000000000..ba2119c0fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motopress-hotel-booking-lite-a7db1d4f6120721a3e8e59e280eb640d.yaml @@ -0,0 +1,58 @@ +id: motopress-hotel-booking-lite-a7db1d4f6120721a3e8e59e280eb640d + +info: + name: > + Hotel Booking Lite <= 4.6.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a874287-c648-4807-8387-b0b47187651e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motopress-hotel-booking-lite/" + google-query: inurl:"/wp-content/plugins/motopress-hotel-booking-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motopress-hotel-booking-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motopress-hotel-booking-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motopress-hotel-booking-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motopress-slider-lite-c70486d9239c270e7b09b18c9bd29bfc.yaml b/nuclei-templates/cve-less/plugins/motopress-slider-lite-c70486d9239c270e7b09b18c9bd29bfc.yaml new file mode 100644 index 0000000000..acc0e65571 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motopress-slider-lite-c70486d9239c270e7b09b18c9bd29bfc.yaml @@ -0,0 +1,58 @@ +id: motopress-slider-lite-c70486d9239c270e7b09b18c9bd29bfc + +info: + name: > + Responsive WordPress Slider <= 2.2.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f314340c-23aa-479f-9a19-f21a14d6da49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motopress-slider-lite/" + google-query: inurl:"/wp-content/plugins/motopress-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motopress-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motopress-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motopress-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motor-racing-league-20fefc27d9160f7f5b2c386f22a44380.yaml b/nuclei-templates/cve-less/plugins/motor-racing-league-20fefc27d9160f7f5b2c386f22a44380.yaml new file mode 100644 index 0000000000..6499baf181 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motor-racing-league-20fefc27d9160f7f5b2c386f22a44380.yaml @@ -0,0 +1,58 @@ +id: motor-racing-league-20fefc27d9160f7f5b2c386f22a44380 + +info: + name: > + Motor Racing League <= 1.9.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8876ecc4-1a50-43ac-9c8d-354f6de4abdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motor-racing-league/" + google-query: inurl:"/wp-content/plugins/motor-racing-league/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motor-racing-league,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motor-racing-league/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motor-racing-league" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-2384bd3b0863727d54b70a40269280b6.yaml b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-2384bd3b0863727d54b70a40269280b6.yaml new file mode 100644 index 0000000000..50e1ae5ced --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-2384bd3b0863727d54b70a40269280b6.yaml @@ -0,0 +1,58 @@ +id: motors-car-dealership-classified-listings-2384bd3b0863727d54b70a40269280b6 + +info: + name: > + Motors – Car Dealer & Classified Ads <= 1.4.6 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/437423f0-978f-4c7c-9ec3-40668c630c93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motors-car-dealership-classified-listings/" + google-query: inurl:"/wp-content/plugins/motors-car-dealership-classified-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motors-car-dealership-classified-listings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motors-car-dealership-classified-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motors-car-dealership-classified-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-5f4c06c81ffca615e40ab92efa300ef7.yaml b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-5f4c06c81ffca615e40ab92efa300ef7.yaml new file mode 100644 index 0000000000..87c850c791 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-5f4c06c81ffca615e40ab92efa300ef7.yaml @@ -0,0 +1,58 @@ +id: motors-car-dealership-classified-listings-5f4c06c81ffca615e40ab92efa300ef7 + +info: + name: > + Motors Car Dealer & Classified Ads <= 1.4.0 - Unauthenticated Settings Import/Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/570bca1e-78d0-49e8-8919-eba19f9457b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motors-car-dealership-classified-listings/" + google-query: inurl:"/wp-content/plugins/motors-car-dealership-classified-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motors-car-dealership-classified-listings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motors-car-dealership-classified-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motors-car-dealership-classified-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-7af7bb77429bff8431b75ff2256568d2.yaml b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-7af7bb77429bff8431b75ff2256568d2.yaml new file mode 100644 index 0000000000..73e1093080 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-7af7bb77429bff8431b75ff2256568d2.yaml @@ -0,0 +1,58 @@ +id: motors-car-dealership-classified-listings-7af7bb77429bff8431b75ff2256568d2 + +info: + name: > + Motors – Car Dealer, Classifieds & Listing <= 1.4.3 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb334b74-5561-4ac7-b321-397600e26d06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motors-car-dealership-classified-listings/" + google-query: inurl:"/wp-content/plugins/motors-car-dealership-classified-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motors-car-dealership-classified-listings,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motors-car-dealership-classified-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motors-car-dealership-classified-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-7f71b4b272aa7eae4323778da0a9d0b5.yaml b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-7f71b4b272aa7eae4323778da0a9d0b5.yaml new file mode 100644 index 0000000000..1afe1c5254 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-7f71b4b272aa7eae4323778da0a9d0b5.yaml @@ -0,0 +1,58 @@ +id: motors-car-dealership-classified-listings-7f71b4b272aa7eae4323778da0a9d0b5 + +info: + name: > + Motors – Car Dealer & Classified Ads <= 1.4.5 - Cross-Site Request Forgery via Multiple Functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ca9e920-3c7a-4991-8c24-2e55c4f4767c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motors-car-dealership-classified-listings/" + google-query: inurl:"/wp-content/plugins/motors-car-dealership-classified-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motors-car-dealership-classified-listings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motors-car-dealership-classified-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motors-car-dealership-classified-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-8395989e9f463aede02be6293faac97f.yaml b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-8395989e9f463aede02be6293faac97f.yaml new file mode 100644 index 0000000000..fa53542f7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-8395989e9f463aede02be6293faac97f.yaml @@ -0,0 +1,58 @@ +id: motors-car-dealership-classified-listings-8395989e9f463aede02be6293faac97f + +info: + name: > + Motors – Car Dealer, Classifieds & Listing <= 1.4.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1638145c-2bc8-45d4-904e-b1aba124a0e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motors-car-dealership-classified-listings/" + google-query: inurl:"/wp-content/plugins/motors-car-dealership-classified-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motors-car-dealership-classified-listings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motors-car-dealership-classified-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motors-car-dealership-classified-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-8fa1d4a13962968fa7c19c372fdbe540.yaml b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-8fa1d4a13962968fa7c19c372fdbe540.yaml new file mode 100644 index 0000000000..984a23de58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/motors-car-dealership-classified-listings-8fa1d4a13962968fa7c19c372fdbe540.yaml @@ -0,0 +1,58 @@ +id: motors-car-dealership-classified-listings-8fa1d4a13962968fa7c19c372fdbe540 + +info: + name: > + Motors – Car Dealer & Classified Ads <= 1.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f06b855-c1e1-4378-a340-9dda2919fb83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/motors-car-dealership-classified-listings/" + google-query: inurl:"/wp-content/plugins/motors-car-dealership-classified-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,motors-car-dealership-classified-listings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/motors-car-dealership-classified-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motors-car-dealership-classified-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mousewheel-smooth-scroll-8cdddca0d188c62cd387707bc2f1bf90.yaml b/nuclei-templates/cve-less/plugins/mousewheel-smooth-scroll-8cdddca0d188c62cd387707bc2f1bf90.yaml new file mode 100644 index 0000000000..f0b41904d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mousewheel-smooth-scroll-8cdddca0d188c62cd387707bc2f1bf90.yaml @@ -0,0 +1,58 @@ +id: mousewheel-smooth-scroll-8cdddca0d188c62cd387707bc2f1bf90 + +info: + name: > + MouseWheel Smooth Scroll <= 5.6 - Plugin's Setting Update via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/487d94e8-e4f1-4da8-914c-96157f8ae14d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mousewheel-smooth-scroll/" + google-query: inurl:"/wp-content/plugins/mousewheel-smooth-scroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mousewheel-smooth-scroll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mousewheel-smooth-scroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mousewheel-smooth-scroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/move-addons-b4011099159d4b47f74f5b5034151fc1.yaml b/nuclei-templates/cve-less/plugins/move-addons-b4011099159d4b47f74f5b5034151fc1.yaml new file mode 100644 index 0000000000..26c5890ab3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/move-addons-b4011099159d4b47f74f5b5034151fc1.yaml @@ -0,0 +1,58 @@ +id: move-addons-b4011099159d4b47f74f5b5034151fc1 + +info: + name: > + Move Addons for Elementor <= 1.2.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14fede14-bdf1-41e1-8ea9-188acbb41aa1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/move-addons/" + google-query: inurl:"/wp-content/plugins/move-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,move-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/move-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "move-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/move-addons-ca90bdb25f0c955406427bf755373f05.yaml b/nuclei-templates/cve-less/plugins/move-addons-ca90bdb25f0c955406427bf755373f05.yaml new file mode 100644 index 0000000000..bc39237867 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/move-addons-ca90bdb25f0c955406427bf755373f05.yaml @@ -0,0 +1,58 @@ +id: move-addons-ca90bdb25f0c955406427bf755373f05 + +info: + name: > + Move Addons for Elementor <= 1.2.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b6af5a-ad44-4dd6-9ce1-6fcbd28f8ebe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/move-addons/" + google-query: inurl:"/wp-content/plugins/move-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,move-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/move-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "move-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/moveto-0dd7f3bef33b38dffd2e7e5e50a01f63.yaml b/nuclei-templates/cve-less/plugins/moveto-0dd7f3bef33b38dffd2e7e5e50a01f63.yaml new file mode 100644 index 0000000000..9e18f4105e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/moveto-0dd7f3bef33b38dffd2e7e5e50a01f63.yaml @@ -0,0 +1,58 @@ +id: moveto-0dd7f3bef33b38dffd2e7e5e50a01f63 + +info: + name: > + MoveTo <= 6.2 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/541551d8-5510-43ff-b685-783d0d94c4bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/moveto/" + google-query: inurl:"/wp-content/plugins/moveto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,moveto,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/moveto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moveto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/moveto-6b0918bd33802de1773e3becb0772e50.yaml b/nuclei-templates/cve-less/plugins/moveto-6b0918bd33802de1773e3becb0772e50.yaml new file mode 100644 index 0000000000..3d4dae2689 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/moveto-6b0918bd33802de1773e3becb0772e50.yaml @@ -0,0 +1,58 @@ +id: moveto-6b0918bd33802de1773e3becb0772e50 + +info: + name: > + MoveTo <= 6.2 - Unauthenticated Directory Traversal to Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec4c14ec-d085-42c8-9e98-4155f7fa8c10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/moveto/" + google-query: inurl:"/wp-content/plugins/moveto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,moveto,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/moveto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moveto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/moveto-aa8a8d1534c979b4a72d9c8bec09fbff.yaml b/nuclei-templates/cve-less/plugins/moveto-aa8a8d1534c979b4a72d9c8bec09fbff.yaml new file mode 100644 index 0000000000..459295d4fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/moveto-aa8a8d1534c979b4a72d9c8bec09fbff.yaml @@ -0,0 +1,58 @@ +id: moveto-aa8a8d1534c979b4a72d9c8bec09fbff + +info: + name: > + MoveTo <= 6.2 - Missing Authorization to Unauthenticated Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/733ddf62-278b-4a2d-9dc5-28db3491cb29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/moveto/" + google-query: inurl:"/wp-content/plugins/moveto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,moveto,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/moveto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moveto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/moveto-f63e9747e46d5f44e7922b736df250ec.yaml b/nuclei-templates/cve-less/plugins/moveto-f63e9747e46d5f44e7922b736df250ec.yaml new file mode 100644 index 0000000000..9770b748ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/moveto-f63e9747e46d5f44e7922b736df250ec.yaml @@ -0,0 +1,58 @@ +id: moveto-f63e9747e46d5f44e7922b736df250ec + +info: + name: > + MoveTo <= 6.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfe5d24a-a2ed-46c1-8d9b-9bd2c63cb8b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/moveto/" + google-query: inurl:"/wp-content/plugins/moveto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,moveto,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/moveto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moveto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/movies-ef405b3cbb9ac83187d4757d187f0977.yaml b/nuclei-templates/cve-less/plugins/movies-ef405b3cbb9ac83187d4757d187f0977.yaml new file mode 100644 index 0000000000..99eb45721a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/movies-ef405b3cbb9ac83187d4757d187f0977.yaml @@ -0,0 +1,58 @@ +id: movies-ef405b3cbb9ac83187d4757d187f0977 + +info: + name: > + Movies <= 0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/430c6f4b-277e-41bf-a638-fd3fea495a31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/movies/" + google-query: inurl:"/wp-content/plugins/movies/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,movies,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/movies/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "movies" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp-restaurant-menu-d9125d7ee55fa656fa01e772da7b6ddc.yaml b/nuclei-templates/cve-less/plugins/mp-restaurant-menu-d9125d7ee55fa656fa01e772da7b6ddc.yaml new file mode 100644 index 0000000000..bb3a6a7647 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp-restaurant-menu-d9125d7ee55fa656fa01e772da7b6ddc.yaml @@ -0,0 +1,58 @@ +id: mp-restaurant-menu-d9125d7ee55fa656fa01e772da7b6ddc + +info: + name: > + Restaurant Menu by MotoPress <= 2.4.1 - Admin+ Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cac4bde-8518-48ec-8cbd-4cdf6094b831?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp-restaurant-menu/" + google-query: inurl:"/wp-content/plugins/mp-restaurant-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp-restaurant-menu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp-restaurant-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp-restaurant-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp-timetable-416df9dc9f4f5af0da5661ba17f7f5c9.yaml b/nuclei-templates/cve-less/plugins/mp-timetable-416df9dc9f4f5af0da5661ba17f7f5c9.yaml new file mode 100644 index 0000000000..bc40077123 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp-timetable-416df9dc9f4f5af0da5661ba17f7f5c9.yaml @@ -0,0 +1,58 @@ +id: mp-timetable-416df9dc9f4f5af0da5661ba17f7f5c9 + +info: + name: > + Timetable and Event Schedule by MotoPress <= 2.3.19 - Arbitrary User's Hashed Password/Email/Username Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b14af68e-960f-4817-bab4-881f2720cb82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp-timetable/" + google-query: inurl:"/wp-content/plugins/mp-timetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp-timetable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp-timetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp-timetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp-timetable-953e4421c93547e97fe8ff565f4ade18.yaml b/nuclei-templates/cve-less/plugins/mp-timetable-953e4421c93547e97fe8ff565f4ade18.yaml new file mode 100644 index 0000000000..16aceec3e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp-timetable-953e4421c93547e97fe8ff565f4ade18.yaml @@ -0,0 +1,58 @@ +id: mp-timetable-953e4421c93547e97fe8ff565f4ade18 + +info: + name: > + Timetable and Event Schedule by MotoPress <= 2.3.18 - Author+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad359327-9d53-4c8e-bd09-7a337711cfbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp-timetable/" + google-query: inurl:"/wp-content/plugins/mp-timetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp-timetable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp-timetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp-timetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp-timetable-b16f008700574256ab90c1f92968c3fa.yaml b/nuclei-templates/cve-less/plugins/mp-timetable-b16f008700574256ab90c1f92968c3fa.yaml new file mode 100644 index 0000000000..670fbc4908 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp-timetable-b16f008700574256ab90c1f92968c3fa.yaml @@ -0,0 +1,58 @@ +id: mp-timetable-b16f008700574256ab90c1f92968c3fa + +info: + name: > + Timetable and Event Schedule by MotoPress <= 2.4.11 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9670bd32-34ce-48b1-82d9-62ab8869a89b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp-timetable/" + google-query: inurl:"/wp-content/plugins/mp-timetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp-timetable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp-timetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp-timetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp-timetable-b786e0fb120de39094300b65ca31a23d.yaml b/nuclei-templates/cve-less/plugins/mp-timetable-b786e0fb120de39094300b65ca31a23d.yaml new file mode 100644 index 0000000000..7b87ec473b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp-timetable-b786e0fb120de39094300b65ca31a23d.yaml @@ -0,0 +1,58 @@ +id: mp-timetable-b786e0fb120de39094300b65ca31a23d + +info: + name: > + Timetable and Event Schedule by MotoPress <= 2.4.1 - Unauthorised Event TimeSlot Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/744354bc-3663-40bd-b799-589cb0978b40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp-timetable/" + google-query: inurl:"/wp-content/plugins/mp-timetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp-timetable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp-timetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp-timetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp-timetable-e189bd98f7f3328138bfc4085cfaad2e.yaml b/nuclei-templates/cve-less/plugins/mp-timetable-e189bd98f7f3328138bfc4085cfaad2e.yaml new file mode 100644 index 0000000000..6f55cbd6b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp-timetable-e189bd98f7f3328138bfc4085cfaad2e.yaml @@ -0,0 +1,58 @@ +id: mp-timetable-e189bd98f7f3328138bfc4085cfaad2e + +info: + name: > + Timetable and Event Schedule by MotoPress <= 2.3.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/988d7b33-f985-4d22-a2db-3922002fcecb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp-timetable/" + google-query: inurl:"/wp-content/plugins/mp-timetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp-timetable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp-timetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp-timetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp-timetable-e1f321924caa4de1b547928bc7e2455b.yaml b/nuclei-templates/cve-less/plugins/mp-timetable-e1f321924caa4de1b547928bc7e2455b.yaml new file mode 100644 index 0000000000..00cf8aeb1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp-timetable-e1f321924caa4de1b547928bc7e2455b.yaml @@ -0,0 +1,58 @@ +id: mp-timetable-e1f321924caa4de1b547928bc7e2455b + +info: + name: > + Timetable and Event Schedule by MotoPress <= 2.4.1 - Unauthorised Event TimeSlot Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8ce4cf-9085-49d2-a889-9d53272032c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp-timetable/" + google-query: inurl:"/wp-content/plugins/mp-timetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp-timetable,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp-timetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp-timetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-jplayer-1a28da6fce455f006c2d11b2e29e3af5.yaml b/nuclei-templates/cve-less/plugins/mp3-jplayer-1a28da6fce455f006c2d11b2e29e3af5.yaml new file mode 100644 index 0000000000..36838abfc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-jplayer-1a28da6fce455f006c2d11b2e29e3af5.yaml @@ -0,0 +1,58 @@ +id: mp3-jplayer-1a28da6fce455f006c2d11b2e29e3af5 + +info: + name: > + MP3-jPlayer < 1.8.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52383075-2d39-4fd9-8319-15a5354ff25f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-jplayer/" + google-query: inurl:"/wp-content/plugins/mp3-jplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-jplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-jplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-jplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-jplayer-498c92520d857cb30ad7df8aa299fc2f.yaml b/nuclei-templates/cve-less/plugins/mp3-jplayer-498c92520d857cb30ad7df8aa299fc2f.yaml new file mode 100644 index 0000000000..60429dab64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-jplayer-498c92520d857cb30ad7df8aa299fc2f.yaml @@ -0,0 +1,58 @@ +id: mp3-jplayer-498c92520d857cb30ad7df8aa299fc2f + +info: + name: > + MP3 jPlayer <= 2.7.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/180711f3-1a3b-4b10-9046-e63c0e1b9ab5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-jplayer/" + google-query: inurl:"/wp-content/plugins/mp3-jplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-jplayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-jplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-jplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-jplayer-69793a32c02cbaffdd1e5a5f626bea60.yaml b/nuclei-templates/cve-less/plugins/mp3-jplayer-69793a32c02cbaffdd1e5a5f626bea60.yaml new file mode 100644 index 0000000000..b4082c5edf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-jplayer-69793a32c02cbaffdd1e5a5f626bea60.yaml @@ -0,0 +1,58 @@ +id: mp3-jplayer-69793a32c02cbaffdd1e5a5f626bea60 + +info: + name: > + MP3-jPlayer <= 2.4.2 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20d5848e-7772-45dc-ad6f-edb9164c8d44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-jplayer/" + google-query: inurl:"/wp-content/plugins/mp3-jplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-jplayer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-jplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-jplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-jplayer-f2f737655d264b31c43ad2bd812bd2dc.yaml b/nuclei-templates/cve-less/plugins/mp3-jplayer-f2f737655d264b31c43ad2bd812bd2dc.yaml new file mode 100644 index 0000000000..b3315541ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-jplayer-f2f737655d264b31c43ad2bd812bd2dc.yaml @@ -0,0 +1,58 @@ +id: mp3-jplayer-f2f737655d264b31c43ad2bd812bd2dc + +info: + name: > + MP3-jPlayer <= 1.8.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53686d01-b60c-4324-895e-2fae3ccfa3c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-jplayer/" + google-query: inurl:"/wp-content/plugins/mp3-jplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-jplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-jplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-jplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-060bed5b5c04d1a43c1e948b34028358.yaml b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-060bed5b5c04d1a43c1e948b34028358.yaml new file mode 100644 index 0000000000..d12534763d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-060bed5b5c04d1a43c1e948b34028358.yaml @@ -0,0 +1,58 @@ +id: mp3-music-player-by-sonaar-060bed5b5c04d1a43c1e948b34028358 + +info: + name: > + MP3 Audio Player for Music, Radio & Podcast by Sonaar <= 4.10.1 - Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9576408b-d048-4e36-bc1a-c01c9f586365?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-music-player-by-sonaar/" + google-query: inurl:"/wp-content/plugins/mp3-music-player-by-sonaar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-music-player-by-sonaar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-music-player-by-sonaar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-music-player-by-sonaar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-48b15a3295f54b70d085f78d5d278b00.yaml b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-48b15a3295f54b70d085f78d5d278b00.yaml new file mode 100644 index 0000000000..c858ccfddf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-48b15a3295f54b70d085f78d5d278b00.yaml @@ -0,0 +1,58 @@ +id: mp3-music-player-by-sonaar-48b15a3295f54b70d085f78d5d278b00 + +info: + name: > + MP3 Audio Player for Music, Radio & Podcast by Sonaar <= 5.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e722b30-f136-4f57-a248-cf9cdd499552?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-music-player-by-sonaar/" + google-query: inurl:"/wp-content/plugins/mp3-music-player-by-sonaar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-music-player-by-sonaar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-music-player-by-sonaar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-music-player-by-sonaar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-50550f19ed80806cbfb18739f79665ee.yaml b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-50550f19ed80806cbfb18739f79665ee.yaml new file mode 100644 index 0000000000..233cc1b825 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-50550f19ed80806cbfb18739f79665ee.yaml @@ -0,0 +1,58 @@ +id: mp3-music-player-by-sonaar-50550f19ed80806cbfb18739f79665ee + +info: + name: > + MP3 Audio Player for Music, Radio & Podcast by Sonaar <= 4.10 - Missing Authorization to Template Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bcb9d95-acb4-4405-b785-1e5eace10dc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-music-player-by-sonaar/" + google-query: inurl:"/wp-content/plugins/mp3-music-player-by-sonaar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-music-player-by-sonaar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-music-player-by-sonaar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-music-player-by-sonaar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-8661844c33fd37e07467aee782d9dedc.yaml b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-8661844c33fd37e07467aee782d9dedc.yaml new file mode 100644 index 0000000000..660f52f235 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-8661844c33fd37e07467aee782d9dedc.yaml @@ -0,0 +1,58 @@ +id: mp3-music-player-by-sonaar-8661844c33fd37e07467aee782d9dedc + +info: + name: > + MP3 Audio Player for Music, Radio & Podcast by Sonaar <= 5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcdbd108-5e17-4e67-a2a2-0f1464c1ba6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-music-player-by-sonaar/" + google-query: inurl:"/wp-content/plugins/mp3-music-player-by-sonaar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-music-player-by-sonaar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-music-player-by-sonaar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-music-player-by-sonaar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-d0ed004aea7762f7063b9f573c38b581.yaml b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-d0ed004aea7762f7063b9f573c38b581.yaml new file mode 100644 index 0000000000..e1f4838e39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mp3-music-player-by-sonaar-d0ed004aea7762f7063b9f573c38b581.yaml @@ -0,0 +1,58 @@ +id: mp3-music-player-by-sonaar-d0ed004aea7762f7063b9f573c38b581 + +info: + name: > + MP3 Audio Player for Music, Radio & Podcast by Sonaar <= 2.4.1 - Multiple Admin+ Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e42841dc-157f-45eb-8959-249326d50650?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mp3-music-player-by-sonaar/" + google-query: inurl:"/wp-content/plugins/mp3-music-player-by-sonaar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mp3-music-player-by-sonaar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mp3-music-player-by-sonaar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mp3-music-player-by-sonaar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mpl-publisher-c19240e29be09298009c0e0215eb1f86.yaml b/nuclei-templates/cve-less/plugins/mpl-publisher-c19240e29be09298009c0e0215eb1f86.yaml new file mode 100644 index 0000000000..a172b2b410 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mpl-publisher-c19240e29be09298009c0e0215eb1f86.yaml @@ -0,0 +1,58 @@ +id: mpl-publisher-c19240e29be09298009c0e0215eb1f86 + +info: + name: > + PHPRelativePath Library - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ae01053-e6cd-4ddf-9e2a-4658cdb60f8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mpl-publisher/" + google-query: inurl:"/wp-content/plugins/mpl-publisher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mpl-publisher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mpl-publisher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mpl-publisher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mpl-publisher-c8b3ba4607788e0f441ac762600baab2.yaml b/nuclei-templates/cve-less/plugins/mpl-publisher-c8b3ba4607788e0f441ac762600baab2.yaml new file mode 100644 index 0000000000..c808667623 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mpl-publisher-c8b3ba4607788e0f441ac762600baab2.yaml @@ -0,0 +1,58 @@ +id: mpl-publisher-c8b3ba4607788e0f441ac762600baab2 + +info: + name: > + MPL-Publisher <= 1.30.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8d093ae-e0b1-49c2-a492-e01f2e954ddb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mpl-publisher/" + google-query: inurl:"/wp-content/plugins/mpl-publisher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mpl-publisher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mpl-publisher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mpl-publisher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.30.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mpoperationlogs-2c4dadbb79348c7faca155e820c1a261.yaml b/nuclei-templates/cve-less/plugins/mpoperationlogs-2c4dadbb79348c7faca155e820c1a261.yaml new file mode 100644 index 0000000000..70e486308d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mpoperationlogs-2c4dadbb79348c7faca155e820c1a261.yaml @@ -0,0 +1,58 @@ +id: mpoperationlogs-2c4dadbb79348c7faca155e820c1a261 + +info: + name: > + MpOperationLogs <= 1.0.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc5f1b00-acee-4dc8-acd7-2d3f3493f253?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mpoperationlogs/" + google-query: inurl:"/wp-content/plugins/mpoperationlogs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mpoperationlogs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mpoperationlogs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mpoperationlogs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mq-woocommerce-products-price-bulk-edit-f255a0d01d888b1ab68c9fee4e439ae8.yaml b/nuclei-templates/cve-less/plugins/mq-woocommerce-products-price-bulk-edit-f255a0d01d888b1ab68c9fee4e439ae8.yaml new file mode 100644 index 0000000000..24130d32fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mq-woocommerce-products-price-bulk-edit-f255a0d01d888b1ab68c9fee4e439ae8.yaml @@ -0,0 +1,58 @@ +id: mq-woocommerce-products-price-bulk-edit-f255a0d01d888b1ab68c9fee4e439ae8 + +info: + name: > + Woocommerce Products Price Bulk Edit <= 2.0 - Cross-Site Scripting via show_products_page_limit parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da8af540-1623-42f2-a8af-4d3cadf1f5d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mq-woocommerce-products-price-bulk-edit/" + google-query: inurl:"/wp-content/plugins/mq-woocommerce-products-price-bulk-edit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mq-woocommerce-products-price-bulk-edit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mq-woocommerce-products-price-bulk-edit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mq-woocommerce-products-price-bulk-edit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mrkwp-footer-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/mrkwp-footer-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b501881793 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mrkwp-footer-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: mrkwp-footer-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mrkwp-footer-for-divi/" + google-query: inurl:"/wp-content/plugins/mrkwp-footer-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mrkwp-footer-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mrkwp-footer-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mrkwp-footer-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ms-reviews-3b3f96c33b07ec89b36c294dbf4ced51.yaml b/nuclei-templates/cve-less/plugins/ms-reviews-3b3f96c33b07ec89b36c294dbf4ced51.yaml new file mode 100644 index 0000000000..c9525ff45a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ms-reviews-3b3f96c33b07ec89b36c294dbf4ced51.yaml @@ -0,0 +1,58 @@ +id: ms-reviews-3b3f96c33b07ec89b36c294dbf4ced51 + +info: + name: > + MS-Reviews <= 1.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68fd5e6f-9883-4e8f-9c4f-5905b487629a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ms-reviews/" + google-query: inurl:"/wp-content/plugins/ms-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ms-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ms-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ms-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mshop-mysite-13034f6a839e821ee8d8b6496142d778.yaml b/nuclei-templates/cve-less/plugins/mshop-mysite-13034f6a839e821ee8d8b6496142d778.yaml new file mode 100644 index 0000000000..c84b88cd02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mshop-mysite-13034f6a839e821ee8d8b6496142d778.yaml @@ -0,0 +1,58 @@ +id: mshop-mysite-13034f6a839e821ee8d8b6496142d778 + +info: + name: > + MSHOP MY SITE <= 1.1.7 - Missing Authorization via update_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc2cbf43-3e8a-4364-9355-6d6587204c1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mshop-mysite/" + google-query: inurl:"/wp-content/plugins/mshop-mysite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mshop-mysite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mshop-mysite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mshop-mysite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/msmc-redirect-after-comment-5ac91f4d7709824d7d324fcc63da5897.yaml b/nuclei-templates/cve-less/plugins/msmc-redirect-after-comment-5ac91f4d7709824d7d324fcc63da5897.yaml new file mode 100644 index 0000000000..f8a166dee3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/msmc-redirect-after-comment-5ac91f4d7709824d7d324fcc63da5897.yaml @@ -0,0 +1,58 @@ +id: msmc-redirect-after-comment-5ac91f4d7709824d7d324fcc63da5897 + +info: + name: > + MSMC Redirect After Comment <= 2.1.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b2db550-c1cf-4c5b-91b1-349da3fd859d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/msmc-redirect-after-comment/" + google-query: inurl:"/wp-content/plugins/msmc-redirect-after-comment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,msmc-redirect-after-comment,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/msmc-redirect-after-comment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "msmc-redirect-after-comment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-11537cde4e91f43e48d58ef19250e138.yaml b/nuclei-templates/cve-less/plugins/mstore-api-11537cde4e91f43e48d58ef19250e138.yaml new file mode 100644 index 0000000000..8023f87850 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-11537cde4e91f43e48d58ef19250e138.yaml @@ -0,0 +1,58 @@ +id: mstore-api-11537cde4e91f43e48d58ef19250e138 + +info: + name: > + MStore API <= 3.9.6 - Cross-Site Request Forgery to Firebase Server Key Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b3612e-3c91-469b-98ef-fdb03b0ee9d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-11bfec28fd7489d580b927090a0bc03d.yaml b/nuclei-templates/cve-less/plugins/mstore-api-11bfec28fd7489d580b927090a0bc03d.yaml new file mode 100644 index 0000000000..e09799cbd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-11bfec28fd7489d580b927090a0bc03d.yaml @@ -0,0 +1,58 @@ +id: mstore-api-11bfec28fd7489d580b927090a0bc03d + +info: + name: > + MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Title Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a604df5d-92b3-4df8-a7ef-00f0ee95cf0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-1f2fdbe5d410730df888dae6fceb7e5a.yaml b/nuclei-templates/cve-less/plugins/mstore-api-1f2fdbe5d410730df888dae6fceb7e5a.yaml new file mode 100644 index 0000000000..e6d251a0d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-1f2fdbe5d410730df888dae6fceb7e5a.yaml @@ -0,0 +1,58 @@ +id: mstore-api-1f2fdbe5d410730df888dae6fceb7e5a + +info: + name: > + MStore API <= 3.9.8 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d1cc8c4-6c14-4d0c-9420-02d709f88b2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-218590420fdaae12f7b13eebfab8b845.yaml b/nuclei-templates/cve-less/plugins/mstore-api-218590420fdaae12f7b13eebfab8b845.yaml new file mode 100644 index 0000000000..0756ec93ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-218590420fdaae12f7b13eebfab8b845.yaml @@ -0,0 +1,58 @@ +id: mstore-api-218590420fdaae12f7b13eebfab8b845 + +info: + name: > + MStore API <= 3.9.2 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f00761a7-fe24-49a3-b3e3-a471e05815c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-2a9ab106af487c2aecdafee383fcc254.yaml b/nuclei-templates/cve-less/plugins/mstore-api-2a9ab106af487c2aecdafee383fcc254.yaml new file mode 100644 index 0000000000..ff66385a37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-2a9ab106af487c2aecdafee383fcc254.yaml @@ -0,0 +1,58 @@ +id: mstore-api-2a9ab106af487c2aecdafee383fcc254 + +info: + name: > + MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Status Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5f30190-4576-4c2b-b069-72501538733b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-46d4ebf7038a0e8c484c9aea0e512d27.yaml b/nuclei-templates/cve-less/plugins/mstore-api-46d4ebf7038a0e8c484c9aea0e512d27.yaml new file mode 100644 index 0000000000..14d900e52a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-46d4ebf7038a0e8c484c9aea0e512d27.yaml @@ -0,0 +1,58 @@ +id: mstore-api-46d4ebf7038a0e8c484c9aea0e512d27 + +info: + name: > + MStore API <= 3.9.1 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5881d16c-84e8-4610-8233-cfa5a94fe3f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-4acb0dd741daeb068a56799abff8a41c.yaml b/nuclei-templates/cve-less/plugins/mstore-api-4acb0dd741daeb068a56799abff8a41c.yaml new file mode 100644 index 0000000000..5faa53dcf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-4acb0dd741daeb068a56799abff8a41c.yaml @@ -0,0 +1,58 @@ +id: mstore-api-4acb0dd741daeb068a56799abff8a41c + +info: + name: > + MStore API <= 3.9.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a747542-0601-4fa5-a97c-c72d1347013b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-4f7baf83e51eb30ac1967902ba81559d.yaml b/nuclei-templates/cve-less/plugins/mstore-api-4f7baf83e51eb30ac1967902ba81559d.yaml new file mode 100644 index 0000000000..9a832b9399 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-4f7baf83e51eb30ac1967902ba81559d.yaml @@ -0,0 +1,58 @@ +id: mstore-api-4f7baf83e51eb30ac1967902ba81559d + +info: + name: > + MStore API <= 4.10.7 - Unauthorized Account Access and Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c0c35-5f44-488f-9fe1-269ea4a73854?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-5c09d79123e7df0cc552b5e3e1fb85e4.yaml b/nuclei-templates/cve-less/plugins/mstore-api-5c09d79123e7df0cc552b5e3e1fb85e4.yaml new file mode 100644 index 0000000000..1b0e929c6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-5c09d79123e7df0cc552b5e3e1fb85e4.yaml @@ -0,0 +1,58 @@ +id: mstore-api-5c09d79123e7df0cc552b5e3e1fb85e4 + +info: + name: > + MStore API <= 3.9.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c726d8f0-7f2a-414b-9d73-a053921074d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-5d1b1d2d30b64ee220b927e779fd3a7a.yaml b/nuclei-templates/cve-less/plugins/mstore-api-5d1b1d2d30b64ee220b927e779fd3a7a.yaml new file mode 100644 index 0000000000..c1777a77dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-5d1b1d2d30b64ee220b927e779fd3a7a.yaml @@ -0,0 +1,58 @@ +id: mstore-api-5d1b1d2d30b64ee220b927e779fd3a7a + +info: + name: > + MStore API <= 3.9.7 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da36ba83-490e-4c9d-8a34-c5c79392a09a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-62a933125d13190434146b926be57bbb.yaml b/nuclei-templates/cve-less/plugins/mstore-api-62a933125d13190434146b926be57bbb.yaml new file mode 100644 index 0000000000..f5c8a55ae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-62a933125d13190434146b926be57bbb.yaml @@ -0,0 +1,58 @@ +id: mstore-api-62a933125d13190434146b926be57bbb + +info: + name: > + MStore API <= 4.10.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d32bda7-2d2d-4364-8ac9-e32950f889ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-63f43a6e88da428774e18ac7305171ad.yaml b/nuclei-templates/cve-less/plugins/mstore-api-63f43a6e88da428774e18ac7305171ad.yaml new file mode 100644 index 0000000000..60950d7446 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-63f43a6e88da428774e18ac7305171ad.yaml @@ -0,0 +1,58 @@ +id: mstore-api-63f43a6e88da428774e18ac7305171ad + +info: + name: > + MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Title Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb5cb1a5-30d2-434f-90f9-d37aecfbe158?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-6f2e39604a581bcc0a7b4f915eff3dd9.yaml b/nuclei-templates/cve-less/plugins/mstore-api-6f2e39604a581bcc0a7b4f915eff3dd9.yaml new file mode 100644 index 0000000000..24464f07dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-6f2e39604a581bcc0a7b4f915eff3dd9.yaml @@ -0,0 +1,58 @@ +id: mstore-api-6f2e39604a581bcc0a7b4f915eff3dd9 + +info: + name: > + MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Message Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f3c503-e255-44d2-8432-48dc2c5f553d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-7dbb92a1633f5650078c7c51173954c5.yaml b/nuclei-templates/cve-less/plugins/mstore-api-7dbb92a1633f5650078c7c51173954c5.yaml new file mode 100644 index 0000000000..6130fa4fb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-7dbb92a1633f5650078c7c51173954c5.yaml @@ -0,0 +1,58 @@ +id: mstore-api-7dbb92a1633f5650078c7c51173954c5 + +info: + name: > + MStore API <= 2.1.5 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-8506c65667776b8fc6f83c7b99b46a44.yaml b/nuclei-templates/cve-less/plugins/mstore-api-8506c65667776b8fc6f83c7b99b46a44.yaml new file mode 100644 index 0000000000..de12ae1b41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-8506c65667776b8fc6f83c7b99b46a44.yaml @@ -0,0 +1,58 @@ +id: mstore-api-8506c65667776b8fc6f83c7b99b46a44 + +info: + name: > + MStore API < 3.4.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04b7a2ba-e299-4781-8ee6-644938bf9629?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-8b6490d616c3b0afd9a25ca2623da6a2.yaml b/nuclei-templates/cve-less/plugins/mstore-api-8b6490d616c3b0afd9a25ca2623da6a2.yaml new file mode 100644 index 0000000000..7265eb048d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-8b6490d616c3b0afd9a25ca2623da6a2.yaml @@ -0,0 +1,58 @@ +id: mstore-api-8b6490d616c3b0afd9a25ca2623da6a2 + +info: + name: > + MStore API <= 4.0.6 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8b10d0c-e2fc-47a3-9df9-8df58eee964c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-8be08765ef433238fcdb1a43ba0779f5.yaml b/nuclei-templates/cve-less/plugins/mstore-api-8be08765ef433238fcdb1a43ba0779f5.yaml new file mode 100644 index 0000000000..53a0ca891b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-8be08765ef433238fcdb1a43ba0779f5.yaml @@ -0,0 +1,58 @@ +id: mstore-api-8be08765ef433238fcdb1a43ba0779f5 + +info: + name: > + MStore API <= 3.9.7 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/494c780d-5441-407d-8947-e56d7cac32d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-9a8385daee7a51370fe7b2ccb01dc7d0.yaml b/nuclei-templates/cve-less/plugins/mstore-api-9a8385daee7a51370fe7b2ccb01dc7d0.yaml new file mode 100644 index 0000000000..0dac8e1416 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-9a8385daee7a51370fe7b2ccb01dc7d0.yaml @@ -0,0 +1,58 @@ +id: mstore-api-9a8385daee7a51370fe7b2ccb01dc7d0 + +info: + name: > + MStore API <= 4.0.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30aab1af-a78f-4bac-b3c5-30ea854ccef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-ce3e51128d47fab10d04046c408cb2e6.yaml b/nuclei-templates/cve-less/plugins/mstore-api-ce3e51128d47fab10d04046c408cb2e6.yaml new file mode 100644 index 0000000000..59514f2067 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-ce3e51128d47fab10d04046c408cb2e6.yaml @@ -0,0 +1,58 @@ +id: mstore-api-ce3e51128d47fab10d04046c408cb2e6 + +info: + name: > + MStore API <= 3.9.6 - Cross-Site Request Forgery to Product Limit Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1aed51a2-9fd4-43bb-b72d-ae8e51ee6e87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mstore-api-ffa610d468201a00e5838193890dc873.yaml b/nuclei-templates/cve-less/plugins/mstore-api-ffa610d468201a00e5838193890dc873.yaml new file mode 100644 index 0000000000..f09856b6f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mstore-api-ffa610d468201a00e5838193890dc873.yaml @@ -0,0 +1,58 @@ +id: mstore-api-ffa610d468201a00e5838193890dc873 + +info: + name: > + MStore API <= 3.1.9 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16e3ca1b-817d-4f03-92ae-346a56271c47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/msync-a37d3498c6bbcc050576781692b33c90.yaml b/nuclei-templates/cve-less/plugins/msync-a37d3498c6bbcc050576781692b33c90.yaml new file mode 100644 index 0000000000..56e4aee8c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/msync-a37d3498c6bbcc050576781692b33c90.yaml @@ -0,0 +1,58 @@ +id: msync-a37d3498c6bbcc050576781692b33c90 + +info: + name: > + MSync <= 1.0.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f37ed0e-3e03-4f00-9967-16047beab1cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/msync/" + google-query: inurl:"/wp-content/plugins/msync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,msync,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/msync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "msync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mtouch-quiz-2f5135a2953d35c3e23bf8648ed00b7e.yaml b/nuclei-templates/cve-less/plugins/mtouch-quiz-2f5135a2953d35c3e23bf8648ed00b7e.yaml new file mode 100644 index 0000000000..2a95b108ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mtouch-quiz-2f5135a2953d35c3e23bf8648ed00b7e.yaml @@ -0,0 +1,58 @@ +id: mtouch-quiz-2f5135a2953d35c3e23bf8648ed00b7e + +info: + name: > + mTouch Quiz <= 3.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c131c746-3029-4791-b564-f6e530e63ea9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mtouch-quiz/" + google-query: inurl:"/wp-content/plugins/mtouch-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mtouch-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mtouch-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mtouch-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mtouch-quiz-5973e024827e1b713c70489b0018d6d3.yaml b/nuclei-templates/cve-less/plugins/mtouch-quiz-5973e024827e1b713c70489b0018d6d3.yaml new file mode 100644 index 0000000000..1f50dae317 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mtouch-quiz-5973e024827e1b713c70489b0018d6d3.yaml @@ -0,0 +1,58 @@ +id: mtouch-quiz-5973e024827e1b713c70489b0018d6d3 + +info: + name: > + mTouch Quiz <= 3.1.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbc91abd-d865-45a2-bc37-f34cb10f1863?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mtouch-quiz/" + google-query: inurl:"/wp-content/plugins/mtouch-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mtouch-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mtouch-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mtouch-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mtouch-quiz-5ec6acde81c3a11c030c7e48fb82e3a0.yaml b/nuclei-templates/cve-less/plugins/mtouch-quiz-5ec6acde81c3a11c030c7e48fb82e3a0.yaml new file mode 100644 index 0000000000..a322b72348 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mtouch-quiz-5ec6acde81c3a11c030c7e48fb82e3a0.yaml @@ -0,0 +1,58 @@ +id: mtouch-quiz-5ec6acde81c3a11c030c7e48fb82e3a0 + +info: + name: > + mTouch Quiz <= 3.1.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bce7b25-fb64-44ac-b48f-00ef871610c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mtouch-quiz/" + google-query: inurl:"/wp-content/plugins/mtouch-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mtouch-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mtouch-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mtouch-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mtouch-quiz-802392d669a0739410b0400626ccc124.yaml b/nuclei-templates/cve-less/plugins/mtouch-quiz-802392d669a0739410b0400626ccc124.yaml new file mode 100644 index 0000000000..2ef7934d26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mtouch-quiz-802392d669a0739410b0400626ccc124.yaml @@ -0,0 +1,58 @@ +id: mtouch-quiz-802392d669a0739410b0400626ccc124 + +info: + name: > + mTouch Quiz < 3.0.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abe2de9c-4044-4b52-9ec8-c66691313cf0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mtouch-quiz/" + google-query: inurl:"/wp-content/plugins/mtouch-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mtouch-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mtouch-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mtouch-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mtouch-quiz-bb563e95b48b650f94219f11430dd39c.yaml b/nuclei-templates/cve-less/plugins/mtouch-quiz-bb563e95b48b650f94219f11430dd39c.yaml new file mode 100644 index 0000000000..cc328ebc6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mtouch-quiz-bb563e95b48b650f94219f11430dd39c.yaml @@ -0,0 +1,58 @@ +id: mtouch-quiz-bb563e95b48b650f94219f11430dd39c + +info: + name: > + mTouch Quiz <= 3.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/748e2f67-cd28-4d02-9460-ef88a609d811?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mtouch-quiz/" + google-query: inurl:"/wp-content/plugins/mtouch-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mtouch-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mtouch-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mtouch-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mtouch-quiz-eb50713c1c0af0073e35c8d86469e373.yaml b/nuclei-templates/cve-less/plugins/mtouch-quiz-eb50713c1c0af0073e35c8d86469e373.yaml new file mode 100644 index 0000000000..87c3080205 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mtouch-quiz-eb50713c1c0af0073e35c8d86469e373.yaml @@ -0,0 +1,58 @@ +id: mtouch-quiz-eb50713c1c0af0073e35c8d86469e373 + +info: + name: > + mTouch Quiz < 3.0.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df086b87-b025-417f-adc0-5f2829024a0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mtouch-quiz/" + google-query: inurl:"/wp-content/plugins/mtouch-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mtouch-quiz,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mtouch-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mtouch-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mtouch-quiz-ee5dd1bd7e8e451209210bdf95385813.yaml b/nuclei-templates/cve-less/plugins/mtouch-quiz-ee5dd1bd7e8e451209210bdf95385813.yaml new file mode 100644 index 0000000000..4885439c86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mtouch-quiz-ee5dd1bd7e8e451209210bdf95385813.yaml @@ -0,0 +1,58 @@ +id: mtouch-quiz-ee5dd1bd7e8e451209210bdf95385813 + +info: + name: > + mTouch Quiz <= 3.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9fcd12b-bcc8-48cb-a077-ccf1bc4ff276?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mtouch-quiz/" + google-query: inurl:"/wp-content/plugins/mtouch-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mtouch-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mtouch-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mtouch-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mts-url-shortener-5fa6ee2c71bfa785ae78ca09e3e47838.yaml b/nuclei-templates/cve-less/plugins/mts-url-shortener-5fa6ee2c71bfa785ae78ca09e3e47838.yaml new file mode 100644 index 0000000000..15c215b5d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mts-url-shortener-5fa6ee2c71bfa785ae78ca09e3e47838.yaml @@ -0,0 +1,58 @@ +id: mts-url-shortener-5fa6ee2c71bfa785ae78ca09e3e47838 + +info: + name: > + URL Shortener by MyThemeShop <= 1.0.17 - Reflected Cross-Site Scripting via 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52c2837e-8947-4ce9-bda5-e0c2f831fb36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mts-url-shortener/" + google-query: inurl:"/wp-content/plugins/mts-url-shortener/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mts-url-shortener,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mts-url-shortener/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mts-url-shortener" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mts-url-shortener-e9eaa7084ed183eefbf2977e6f156e8c.yaml b/nuclei-templates/cve-less/plugins/mts-url-shortener-e9eaa7084ed183eefbf2977e6f156e8c.yaml new file mode 100644 index 0000000000..36054a04ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mts-url-shortener-e9eaa7084ed183eefbf2977e6f156e8c.yaml @@ -0,0 +1,58 @@ +id: mts-url-shortener-e9eaa7084ed183eefbf2977e6f156e8c + +info: + name: > + URL Shortener by MyThemeShop <= 1.0.16 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34d396b2-f19f-47b3-bf9e-f2f14dd0b9be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mts-url-shortener/" + google-query: inurl:"/wp-content/plugins/mts-url-shortener/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mts-url-shortener,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mts-url-shortener/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mts-url-shortener" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mukioplayer-for-wordpress-3f7de3cf6df81ad19fedc60f8e9d029a.yaml b/nuclei-templates/cve-less/plugins/mukioplayer-for-wordpress-3f7de3cf6df81ad19fedc60f8e9d029a.yaml new file mode 100644 index 0000000000..5020ada135 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mukioplayer-for-wordpress-3f7de3cf6df81ad19fedc60f8e9d029a.yaml @@ -0,0 +1,58 @@ +id: mukioplayer-for-wordpress-3f7de3cf6df81ad19fedc60f8e9d029a + +info: + name: > + Mukioplayer For WordPress <= 1.6 - SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bae3acf-bbb3-4b10-b46f-8086240a2f02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mukioplayer-for-wordpress/" + google-query: inurl:"/wp-content/plugins/mukioplayer-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mukioplayer-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mukioplayer-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mukioplayer-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-column-tag-map-1179313cfd258782fb4aa71495304bc0.yaml b/nuclei-templates/cve-less/plugins/multi-column-tag-map-1179313cfd258782fb4aa71495304bc0.yaml new file mode 100644 index 0000000000..901897a41e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-column-tag-map-1179313cfd258782fb4aa71495304bc0.yaml @@ -0,0 +1,58 @@ +id: multi-column-tag-map-1179313cfd258782fb4aa71495304bc0 + +info: + name: > + Multi-column Tag Map <= 17.0.24 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32652a9a-00ba-4e86-9947-c7c7ebd21494?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-column-tag-map/" + google-query: inurl:"/wp-content/plugins/multi-column-tag-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-column-tag-map,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-column-tag-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-column-tag-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-column-tag-map-637e4daf2caafdb5d476cac6dee7f199.yaml b/nuclei-templates/cve-less/plugins/multi-column-tag-map-637e4daf2caafdb5d476cac6dee7f199.yaml new file mode 100644 index 0000000000..1e77d8b622 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-column-tag-map-637e4daf2caafdb5d476cac6dee7f199.yaml @@ -0,0 +1,58 @@ +id: multi-column-tag-map-637e4daf2caafdb5d476cac6dee7f199 + +info: + name: > + Multi-column Tag Map <= 17.0.26 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2a60cb2-fe7d-4c51-9995-5cb4682d9d26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-column-tag-map/" + google-query: inurl:"/wp-content/plugins/multi-column-tag-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-column-tag-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-column-tag-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-column-tag-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-feed-reader-ae474b19622d960a9a30327a508a7a8c.yaml b/nuclei-templates/cve-less/plugins/multi-feed-reader-ae474b19622d960a9a30327a508a7a8c.yaml new file mode 100644 index 0000000000..d958fb3a9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-feed-reader-ae474b19622d960a9a30327a508a7a8c.yaml @@ -0,0 +1,58 @@ +id: multi-feed-reader-ae474b19622d960a9a30327a508a7a8c + +info: + name: > + Multi Feed Reader <= 2.2.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56f59303-cf82-4239-9e04-80a32f20d87c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-feed-reader/" + google-query: inurl:"/wp-content/plugins/multi-feed-reader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-feed-reader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-feed-reader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-feed-reader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-meta-box-7dc2950e20e339de0e3c41a3a14e05fa.yaml b/nuclei-templates/cve-less/plugins/multi-meta-box-7dc2950e20e339de0e3c41a3a14e05fa.yaml new file mode 100644 index 0000000000..a25169eeb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-meta-box-7dc2950e20e339de0e3c41a3a14e05fa.yaml @@ -0,0 +1,58 @@ +id: multi-meta-box-7dc2950e20e339de0e3c41a3a14e05fa + +info: + name: > + WP Multiple Meta Box <= 1.0.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7b24a89-816d-4021-b8de-d1ca14ce3cb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-meta-box/" + google-query: inurl:"/wp-content/plugins/multi-meta-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-meta-box,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-meta-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-meta-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-page-toolkit-d6476ba9d1f9af74d842dc5c3e1d7008.yaml b/nuclei-templates/cve-less/plugins/multi-page-toolkit-d6476ba9d1f9af74d842dc5c3e1d7008.yaml new file mode 100644 index 0000000000..75ebfedda4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-page-toolkit-d6476ba9d1f9af74d842dc5c3e1d7008.yaml @@ -0,0 +1,58 @@ +id: multi-page-toolkit-d6476ba9d1f9af74d842dc5c3e1d7008 + +info: + name: > + Multi-page Toolkit <= 2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ba5ddf2-8ae2-4bfa-9f15-16425baea6e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-page-toolkit/" + google-query: inurl:"/wp-content/plugins/multi-page-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-page-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-page-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-page-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-plugin-installer-3099a61a8f302cdb834fd2736ccc7edc.yaml b/nuclei-templates/cve-less/plugins/multi-plugin-installer-3099a61a8f302cdb834fd2736ccc7edc.yaml new file mode 100644 index 0000000000..a47c1fa9ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-plugin-installer-3099a61a8f302cdb834fd2736ccc7edc.yaml @@ -0,0 +1,58 @@ +id: multi-plugin-installer-3099a61a8f302cdb834fd2736ccc7edc + +info: + name: > + Multi Plugin Installer < 1.2.0 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ba4a8bb-c67c-42c5-8c4e-229756babc5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-plugin-installer/" + google-query: inurl:"/wp-content/plugins/multi-plugin-installer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-plugin-installer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-plugin-installer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-plugin-installer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-rating-125f6e76ab3144c958a71a6f072d17aa.yaml b/nuclei-templates/cve-less/plugins/multi-rating-125f6e76ab3144c958a71a6f072d17aa.yaml new file mode 100644 index 0000000000..560fafcdd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-rating-125f6e76ab3144c958a71a6f072d17aa.yaml @@ -0,0 +1,58 @@ +id: multi-rating-125f6e76ab3144c958a71a6f072d17aa + +info: + name: > + Multi Rating <= 5.0.6 - Cross-Site Request Forgery to Arbitrary Ratings Value Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80ad0b55-bd85-4240-ae54-f72d6b81ea7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-rating/" + google-query: inurl:"/wp-content/plugins/multi-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-rating,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-rating-63aab415fe29b03c8068882fbb1507f4.yaml b/nuclei-templates/cve-less/plugins/multi-rating-63aab415fe29b03c8068882fbb1507f4.yaml new file mode 100644 index 0000000000..6b163a769d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-rating-63aab415fe29b03c8068882fbb1507f4.yaml @@ -0,0 +1,58 @@ +id: multi-rating-63aab415fe29b03c8068882fbb1507f4 + +info: + name: > + Multi Rating <= 5.0.6 - Missing Authorization to Arbitrary Ratings Value Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3d00464-557f-4177-87aa-f5340b796dbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-rating/" + google-query: inurl:"/wp-content/plugins/multi-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-rating-7116e76b9d33cbc2c26869f8330931eb.yaml b/nuclei-templates/cve-less/plugins/multi-rating-7116e76b9d33cbc2c26869f8330931eb.yaml new file mode 100644 index 0000000000..288b857178 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-rating-7116e76b9d33cbc2c26869f8330931eb.yaml @@ -0,0 +1,58 @@ +id: multi-rating-7116e76b9d33cbc2c26869f8330931eb + +info: + name: > + Multi Rating <= 5.0.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/979699fd-ff31-4cba-bbf2-03fa51554031?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-rating/" + google-query: inurl:"/wp-content/plugins/multi-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-rating-d5187e60da4aa17f7ec3f00e2f717a1c.yaml b/nuclei-templates/cve-less/plugins/multi-rating-d5187e60da4aa17f7ec3f00e2f717a1c.yaml new file mode 100644 index 0000000000..6662e9efe1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-rating-d5187e60da4aa17f7ec3f00e2f717a1c.yaml @@ -0,0 +1,58 @@ +id: multi-rating-d5187e60da4aa17f7ec3f00e2f717a1c + +info: + name: > + Multi Rating <= 5.0.5 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0dcf95e-1540-48ed-a4a2-f803d67ea141?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-rating/" + google-query: inurl:"/wp-content/plugins/multi-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-rating,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-rating-e487dc2fff22059c80c2edae74cd9a80.yaml b/nuclei-templates/cve-less/plugins/multi-rating-e487dc2fff22059c80c2edae74cd9a80.yaml new file mode 100644 index 0000000000..395f041e81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-rating-e487dc2fff22059c80c2edae74cd9a80.yaml @@ -0,0 +1,58 @@ +id: multi-rating-e487dc2fff22059c80c2edae74cd9a80 + +info: + name: > + Multi Rating <= 5.0.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca2311c-7b44-4dad-bea0-131776205319?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-rating/" + google-query: inurl:"/wp-content/plugins/multi-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-rating,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-scheduler-841c70d8af33e4bb86e8b280b12a2f3b.yaml b/nuclei-templates/cve-less/plugins/multi-scheduler-841c70d8af33e4bb86e8b280b12a2f3b.yaml new file mode 100644 index 0000000000..8dd16c42a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-scheduler-841c70d8af33e4bb86e8b280b12a2f3b.yaml @@ -0,0 +1,58 @@ +id: multi-scheduler-841c70d8af33e4bb86e8b280b12a2f3b + +info: + name: > + multi Scheduler <= 1.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/921c2486-42cb-42f2-a326-e951c20bd7ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-scheduler/" + google-query: inurl:"/wp-content/plugins/multi-scheduler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-scheduler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-scheduler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-scheduler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-step-form-262d571e1dff2c8fb3abba675c28c4e5.yaml b/nuclei-templates/cve-less/plugins/multi-step-form-262d571e1dff2c8fb3abba675c28c4e5.yaml new file mode 100644 index 0000000000..5c00f580b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-step-form-262d571e1dff2c8fb3abba675c28c4e5.yaml @@ -0,0 +1,58 @@ +id: multi-step-form-262d571e1dff2c8fb3abba675c28c4e5 + +info: + name: > + Multi Step Form <= 1.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38de34cd-b985-4552-a260-53da2106a4af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-step-form/" + google-query: inurl:"/wp-content/plugins/multi-step-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-step-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-step-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-step-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-step-form-26e086c596fe6398b20ed3be8129cc9d.yaml b/nuclei-templates/cve-less/plugins/multi-step-form-26e086c596fe6398b20ed3be8129cc9d.yaml new file mode 100644 index 0000000000..f0be4ea0f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-step-form-26e086c596fe6398b20ed3be8129cc9d.yaml @@ -0,0 +1,58 @@ +id: multi-step-form-26e086c596fe6398b20ed3be8129cc9d + +info: + name: > + Multi Step Form <= 1.7.16 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5e6b508-35ef-45da-bf17-c038d3b7ce52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-step-form/" + google-query: inurl:"/wp-content/plugins/multi-step-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-step-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-step-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-step-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-step-form-2822e321e1d70cd0fc641dbfe5a0bd37.yaml b/nuclei-templates/cve-less/plugins/multi-step-form-2822e321e1d70cd0fc641dbfe5a0bd37.yaml new file mode 100644 index 0000000000..73e6ff747a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-step-form-2822e321e1d70cd0fc641dbfe5a0bd37.yaml @@ -0,0 +1,58 @@ +id: multi-step-form-2822e321e1d70cd0fc641dbfe5a0bd37 + +info: + name: > + Multi Step Form <= 1.7.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/192335c4-b244-4308-bd3a-cf96c1461309?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-step-form/" + google-query: inurl:"/wp-content/plugins/multi-step-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-step-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-step-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-step-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-step-form-447bef3440e263d45c541524d37bf6b4.yaml b/nuclei-templates/cve-less/plugins/multi-step-form-447bef3440e263d45c541524d37bf6b4.yaml new file mode 100644 index 0000000000..ba38fbe089 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-step-form-447bef3440e263d45c541524d37bf6b4.yaml @@ -0,0 +1,58 @@ +id: multi-step-form-447bef3440e263d45c541524d37bf6b4 + +info: + name: > + Multi Step Form <= 1.7.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d45d870-dd00-40aa-9e98-4be4d06b3a0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-step-form/" + google-query: inurl:"/wp-content/plugins/multi-step-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-step-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-step-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-step-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-step-form-463f67413eb1dfd1e1c7f65db3ca7607.yaml b/nuclei-templates/cve-less/plugins/multi-step-form-463f67413eb1dfd1e1c7f65db3ca7607.yaml new file mode 100644 index 0000000000..c6b0bdc69c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-step-form-463f67413eb1dfd1e1c7f65db3ca7607.yaml @@ -0,0 +1,58 @@ +id: multi-step-form-463f67413eb1dfd1e1c7f65db3ca7607 + +info: + name: > + Multi Step Form <= 1.7.18 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f904fd6-c937-4676-8e6e-6e94d3c42b0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-step-form/" + google-query: inurl:"/wp-content/plugins/multi-step-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-step-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-step-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-step-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multi-step-form-962810e9bfe68aabdf565feb933a98a3.yaml b/nuclei-templates/cve-less/plugins/multi-step-form-962810e9bfe68aabdf565feb933a98a3.yaml new file mode 100644 index 0000000000..b9870e95a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multi-step-form-962810e9bfe68aabdf565feb933a98a3.yaml @@ -0,0 +1,58 @@ +id: multi-step-form-962810e9bfe68aabdf565feb933a98a3 + +info: + name: > + Multi Step Form <= 1.2.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe668f93-f6b7-4824-ad17-024291d8f535?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multi-step-form/" + google-query: inurl:"/wp-content/plugins/multi-step-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multi-step-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multi-step-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multi-step-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multicons-704fb8f9c5192e5c8b8563d28e2e91a8.yaml b/nuclei-templates/cve-less/plugins/multicons-704fb8f9c5192e5c8b8563d28e2e91a8.yaml new file mode 100644 index 0000000000..7041a6abb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multicons-704fb8f9c5192e5c8b8563d28e2e91a8.yaml @@ -0,0 +1,58 @@ +id: multicons-704fb8f9c5192e5c8b8563d28e2e91a8 + +info: + name: > + Multicons [ Multiple Favicons ] <= 2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a1f3fdb-a786-4159-9020-648bc0658268?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multicons/" + google-query: inurl:"/wp-content/plugins/multicons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multicons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multicons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multicons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multilanguage-d9699105126f16c0390a040c8ed5a573.yaml b/nuclei-templates/cve-less/plugins/multilanguage-d9699105126f16c0390a040c8ed5a573.yaml new file mode 100644 index 0000000000..adf9872dfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multilanguage-d9699105126f16c0390a040c8ed5a573.yaml @@ -0,0 +1,58 @@ +id: multilanguage-d9699105126f16c0390a040c8ed5a573 + +info: + name: > + Multilanguage by BestWebSoft < 1.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f04982-7f42-4c10-9fad-2584a26a4c79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multilanguage/" + google-query: inurl:"/wp-content/plugins/multilanguage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multilanguage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multilanguage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multilanguage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multilist-subscribe-for-sendy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/multilist-subscribe-for-sendy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..f3c32521de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multilist-subscribe-for-sendy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: multilist-subscribe-for-sendy-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multilist-subscribe-for-sendy/" + google-query: inurl:"/wp-content/plugins/multilist-subscribe-for-sendy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multilist-subscribe-for-sendy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multilist-subscribe-for-sendy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multilist-subscribe-for-sendy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multimedial-images-bc5e61b065b355ecda981dfb9a91839d.yaml b/nuclei-templates/cve-less/plugins/multimedial-images-bc5e61b065b355ecda981dfb9a91839d.yaml new file mode 100644 index 0000000000..f463eb1b5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multimedial-images-bc5e61b065b355ecda981dfb9a91839d.yaml @@ -0,0 +1,58 @@ +id: multimedial-images-bc5e61b065b355ecda981dfb9a91839d + +info: + name: > + multimedial images <= 1.0b - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/539cd606-1884-48df-beae-f5686a4e2400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multimedial-images/" + google-query: inurl:"/wp-content/plugins/multimedial-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multimedial-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multimedial-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multimedial-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0b') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-194154b98ea167d5243ca3bc6185dc5f.yaml b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-194154b98ea167d5243ca3bc6185dc5f.yaml new file mode 100644 index 0000000000..faccf029f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-194154b98ea167d5243ca3bc6185dc5f.yaml @@ -0,0 +1,58 @@ +id: multiparcels-shipping-for-woocommerce-194154b98ea167d5243ca3bc6185dc5f + +info: + name: > + MultiParcels Shipping For WooCommerce <= 1.14.12 - Authenticated(Subscriber+) SQL Injection via id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b888f0c-5547-4ff7-9721-50166e3f0117?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiparcels-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/multiparcels-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiparcels-shipping-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiparcels-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiparcels-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-4e39f41aeadd0e0dd90d8ba63c20d6b4.yaml b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-4e39f41aeadd0e0dd90d8ba63c20d6b4.yaml new file mode 100644 index 0000000000..918f635d09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-4e39f41aeadd0e0dd90d8ba63c20d6b4.yaml @@ -0,0 +1,58 @@ +id: multiparcels-shipping-for-woocommerce-4e39f41aeadd0e0dd90d8ba63c20d6b4 + +info: + name: > + MultiParcels Shipping For WooCommerce <= 1.15.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/279a5460-25d1-4f80-8141-4d3af536258e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiparcels-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/multiparcels-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiparcels-shipping-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiparcels-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiparcels-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-890063830c1c25aee11e9fe1e8798a54.yaml b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-890063830c1c25aee11e9fe1e8798a54.yaml new file mode 100644 index 0000000000..87378a0491 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-890063830c1c25aee11e9fe1e8798a54.yaml @@ -0,0 +1,58 @@ +id: multiparcels-shipping-for-woocommerce-890063830c1c25aee11e9fe1e8798a54 + +info: + name: > + MultiParcels Shipping For WooCommerce < 1.16.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c676a46-3e3f-4dc0-ba7f-acf1f100fb4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiparcels-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/multiparcels-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiparcels-shipping-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiparcels-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiparcels-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-b219b525f96b2aa71ca7a26ac08a9b92.yaml b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-b219b525f96b2aa71ca7a26ac08a9b92.yaml new file mode 100644 index 0000000000..2fd72bd999 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-b219b525f96b2aa71ca7a26ac08a9b92.yaml @@ -0,0 +1,58 @@ +id: multiparcels-shipping-for-woocommerce-b219b525f96b2aa71ca7a26ac08a9b92 + +info: + name: > + MultiParcels Shipping For WooCommerce <= 1.15.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5ce2d08-6e01-4a7c-a2d5-ba98639107a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiparcels-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/multiparcels-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiparcels-shipping-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiparcels-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiparcels-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-e463bbf0a92d1f70c76687905b887fc6.yaml b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-e463bbf0a92d1f70c76687905b887fc6.yaml new file mode 100644 index 0000000000..2214b974b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-e463bbf0a92d1f70c76687905b887fc6.yaml @@ -0,0 +1,58 @@ +id: multiparcels-shipping-for-woocommerce-e463bbf0a92d1f70c76687905b887fc6 + +info: + name: > + MultiParcels Shipping For WooCommerce <= 1.15.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83a3f61c-2385-456f-bca3-6d3f3ffd9694?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiparcels-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/multiparcels-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiparcels-shipping-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiparcels-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiparcels-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-e6a704ce234334d9f31ac517092f1bb0.yaml b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-e6a704ce234334d9f31ac517092f1bb0.yaml new file mode 100644 index 0000000000..b3b2909145 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-e6a704ce234334d9f31ac517092f1bb0.yaml @@ -0,0 +1,58 @@ +id: multiparcels-shipping-for-woocommerce-e6a704ce234334d9f31ac517092f1bb0 + +info: + name: > + MultiParcels Shipping For WooCommerce <= 1.14.13 - Missing Authorization via get_history + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5502ebc-0b35-4966-bff6-90efdcb0db58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiparcels-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/multiparcels-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiparcels-shipping-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiparcels-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiparcels-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-f76e1c53234e1a9b18e0328f53d84dde.yaml b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-f76e1c53234e1a9b18e0328f53d84dde.yaml new file mode 100644 index 0000000000..25dedde68b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiparcels-shipping-for-woocommerce-f76e1c53234e1a9b18e0328f53d84dde.yaml @@ -0,0 +1,58 @@ +id: multiparcels-shipping-for-woocommerce-f76e1c53234e1a9b18e0328f53d84dde + +info: + name: > + MultiParcels Shipping For WooCommerce <= 1.15.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e860293-0dfb-444f-a103-33942d9ff75c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiparcels-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/multiparcels-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiparcels-shipping-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiparcels-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiparcels-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiplayer-plugin-3216cccc2ccf209ed6afbf1298c4c973.yaml b/nuclei-templates/cve-less/plugins/multiplayer-plugin-3216cccc2ccf209ed6afbf1298c4c973.yaml new file mode 100644 index 0000000000..00cec9e19a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiplayer-plugin-3216cccc2ccf209ed6afbf1298c4c973.yaml @@ -0,0 +1,58 @@ +id: multiplayer-plugin-3216cccc2ccf209ed6afbf1298c4c973 + +info: + name: > + Multiplayer Games <= 3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b876ed30-66f5-4cad-a60c-104a0a793033?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiplayer-plugin/" + google-query: inurl:"/wp-content/plugins/multiplayer-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiplayer-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiplayer-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiplayer-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-domain-3a3edd25e4fa2cd1428645e4e1a051ab.yaml b/nuclei-templates/cve-less/plugins/multiple-domain-3a3edd25e4fa2cd1428645e4e1a051ab.yaml new file mode 100644 index 0000000000..e1fcf2986d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-domain-3a3edd25e4fa2cd1428645e4e1a051ab.yaml @@ -0,0 +1,58 @@ +id: multiple-domain-3a3edd25e4fa2cd1428645e4e1a051ab + +info: + name: > + Multiple Domain <= 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f5b68f-bf81-4157-920a-f14eb29390a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-domain/" + google-query: inurl:"/wp-content/plugins/multiple-domain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-domain,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-domain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-domain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-03e8fea4abe393774ca83cec29070e62.yaml b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-03e8fea4abe393774ca83cec29070e62.yaml new file mode 100644 index 0000000000..0fd326b29b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-03e8fea4abe393774ca83cec29070e62.yaml @@ -0,0 +1,58 @@ +id: multiple-pages-generator-by-porthas-03e8fea4abe393774ca83cec29070e62 + +info: + name: > + Multiple Page Generator Plugin <= 3.3.17 - Cross-Site Request Forgery to SQL Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d900584c-0f58-4abc-92ff-841f898d02fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-pages-generator-by-porthas/" + google-query: inurl:"/wp-content/plugins/multiple-pages-generator-by-porthas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-pages-generator-by-porthas,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-pages-generator-by-porthas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-pages-generator-by-porthas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-1f2e03d503f5681dd8b4d168bb6a5e29.yaml b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-1f2e03d503f5681dd8b4d168bb6a5e29.yaml new file mode 100644 index 0000000000..0ad5927eb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-1f2e03d503f5681dd8b4d168bb6a5e29.yaml @@ -0,0 +1,58 @@ +id: multiple-pages-generator-by-porthas-1f2e03d503f5681dd8b4d168bb6a5e29 + +info: + name: > + Multiple Page Generator Plugin <= 3.3.17 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1575f0ad-0a77-4047-844c-48db4c8b4e91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-pages-generator-by-porthas/" + google-query: inurl:"/wp-content/plugins/multiple-pages-generator-by-porthas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-pages-generator-by-porthas,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-pages-generator-by-porthas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-pages-generator-by-porthas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-2428c4eb87b4651b0b610c5b37e29f17.yaml b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-2428c4eb87b4651b0b610c5b37e29f17.yaml new file mode 100644 index 0000000000..d42382999c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-2428c4eb87b4651b0b610c5b37e29f17.yaml @@ -0,0 +1,58 @@ +id: multiple-pages-generator-by-porthas-2428c4eb87b4651b0b610c5b37e29f17 + +info: + name: > + Multiple Page Generator Plugin – MPG <= 3.4.0 - Missing Authorization via mpg_get_log_by_project_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa1d2fac-6e66-46b8-aa0a-1f6b5746b18b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-pages-generator-by-porthas/" + google-query: inurl:"/wp-content/plugins/multiple-pages-generator-by-porthas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-pages-generator-by-porthas,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-pages-generator-by-porthas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-pages-generator-by-porthas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-410043251186f9da5efcd4c944487f1e.yaml b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-410043251186f9da5efcd4c944487f1e.yaml new file mode 100644 index 0000000000..464ef44559 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-410043251186f9da5efcd4c944487f1e.yaml @@ -0,0 +1,58 @@ +id: multiple-pages-generator-by-porthas-410043251186f9da5efcd4c944487f1e + +info: + name: > + Multiple Page Generator Plugin – MPG <= 3.4.0 - Authenticated (Editor+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/155f765c-65ab-443a-a4b7-50d916e2903c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-pages-generator-by-porthas/" + google-query: inurl:"/wp-content/plugins/multiple-pages-generator-by-porthas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-pages-generator-by-porthas,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-pages-generator-by-porthas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-pages-generator-by-porthas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-7573fa793301510c262a9093c76e28a4.yaml b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-7573fa793301510c262a9093c76e28a4.yaml new file mode 100644 index 0000000000..e56f201d0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-7573fa793301510c262a9093c76e28a4.yaml @@ -0,0 +1,58 @@ +id: multiple-pages-generator-by-porthas-7573fa793301510c262a9093c76e28a4 + +info: + name: > + Multiple Page Generator Plugin – MPG <= 3.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa15df6a-3411-4d69-8337-a3944ceae9ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-pages-generator-by-porthas/" + google-query: inurl:"/wp-content/plugins/multiple-pages-generator-by-porthas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-pages-generator-by-porthas,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-pages-generator-by-porthas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-pages-generator-by-porthas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-867692d864273a70bf9ff47c77dd8e22.yaml b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-867692d864273a70bf9ff47c77dd8e22.yaml new file mode 100644 index 0000000000..33a79958a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-867692d864273a70bf9ff47c77dd8e22.yaml @@ -0,0 +1,58 @@ +id: multiple-pages-generator-by-porthas-867692d864273a70bf9ff47c77dd8e22 + +info: + name: > + Multiple Page Generator Plugin <= 3.3.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aa2d172-73b6-487d-ae65-0920f915e750?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-pages-generator-by-porthas/" + google-query: inurl:"/wp-content/plugins/multiple-pages-generator-by-porthas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-pages-generator-by-porthas,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-pages-generator-by-porthas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-pages-generator-by-porthas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..21d0ff39e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: multiple-pages-generator-by-porthas-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-pages-generator-by-porthas/" + google-query: inurl:"/wp-content/plugins/multiple-pages-generator-by-porthas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-pages-generator-by-porthas,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-pages-generator-by-porthas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-pages-generator-by-porthas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-bce926ab22529c16e0539f0acc228409.yaml b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-bce926ab22529c16e0539f0acc228409.yaml new file mode 100644 index 0000000000..ddf50ea7d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-pages-generator-by-porthas-bce926ab22529c16e0539f0acc228409.yaml @@ -0,0 +1,58 @@ +id: multiple-pages-generator-by-porthas-bce926ab22529c16e0539f0acc228409 + +info: + name: > + Multiple Page Generator Plugin – MPG <= 3.3.19 - Authenticated (Administrator+) SQL Injection in projects_list and total_projects + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d18d800b-647f-4706-9ec1-a8ea4e643965?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-pages-generator-by-porthas/" + google-query: inurl:"/wp-content/plugins/multiple-pages-generator-by-porthas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-pages-generator-by-porthas,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-pages-generator-by-porthas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-pages-generator-by-porthas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-post-passwords-308319ee878eb47d99190ad100843184.yaml b/nuclei-templates/cve-less/plugins/multiple-post-passwords-308319ee878eb47d99190ad100843184.yaml new file mode 100644 index 0000000000..7b20d09d2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-post-passwords-308319ee878eb47d99190ad100843184.yaml @@ -0,0 +1,58 @@ +id: multiple-post-passwords-308319ee878eb47d99190ad100843184 + +info: + name: > + Multiple Post Passwords <= 1.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f220293-9789-4824-b736-ead014c45366?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-post-passwords/" + google-query: inurl:"/wp-content/plugins/multiple-post-passwords/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-post-passwords,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-post-passwords/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-post-passwords" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-roles-15583129ef6cea1a9a42a4bb010eaa6b.yaml b/nuclei-templates/cve-less/plugins/multiple-roles-15583129ef6cea1a9a42a4bb010eaa6b.yaml new file mode 100644 index 0000000000..46511c8fcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-roles-15583129ef6cea1a9a42a4bb010eaa6b.yaml @@ -0,0 +1,58 @@ +id: multiple-roles-15583129ef6cea1a9a42a4bb010eaa6b + +info: + name: > + Multiple Roles <= 1.3.1- Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/862fa0c3-c16f-493e-9bf6-92debc0e30f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-roles/" + google-query: inurl:"/wp-content/plugins/multiple-roles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-roles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-roles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-roles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-roles-c9b946cd1d70cba32e2ab4c05a432d51.yaml b/nuclei-templates/cve-less/plugins/multiple-roles-c9b946cd1d70cba32e2ab4c05a432d51.yaml new file mode 100644 index 0000000000..fbf092b8a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-roles-c9b946cd1d70cba32e2ab4c05a432d51.yaml @@ -0,0 +1,58 @@ +id: multiple-roles-c9b946cd1d70cba32e2ab4c05a432d51 + +info: + name: > + Multiple Roles < 1.3.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32b3ad84-6adb-44c1-942a-51f27638c8c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-roles/" + google-query: inurl:"/wp-content/plugins/multiple-roles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-roles,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-roles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-roles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multiple-shipping-address-woocommerce-72a5beaa06012eefbccaf7bb2be8aca6.yaml b/nuclei-templates/cve-less/plugins/multiple-shipping-address-woocommerce-72a5beaa06012eefbccaf7bb2be8aca6.yaml new file mode 100644 index 0000000000..2e38a27dca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multiple-shipping-address-woocommerce-72a5beaa06012eefbccaf7bb2be8aca6.yaml @@ -0,0 +1,58 @@ +id: multiple-shipping-address-woocommerce-72a5beaa06012eefbccaf7bb2be8aca6 + +info: + name: > + Multiple Shipping Address Woocommerce < 2.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9502669-ddbb-40c3-9d98-95c862f47a9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multiple-shipping-address-woocommerce/" + google-query: inurl:"/wp-content/plugins/multiple-shipping-address-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multiple-shipping-address-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multiple-shipping-address-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multiple-shipping-address-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multipurpose-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/multipurpose-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e3c31e6e69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multipurpose-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: multipurpose-block-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multipurpose-block/" + google-query: inurl:"/wp-content/plugins/multipurpose-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multipurpose-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multipurpose-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multipurpose-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multisafepay-9ee1fb20140e6d73472d36e51f5b0eef.yaml b/nuclei-templates/cve-less/plugins/multisafepay-9ee1fb20140e6d73472d36e51f5b0eef.yaml new file mode 100644 index 0000000000..54d04874c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multisafepay-9ee1fb20140e6d73472d36e51f5b0eef.yaml @@ -0,0 +1,58 @@ +id: multisafepay-9ee1fb20140e6d73472d36e51f5b0eef + +info: + name: > + MultiSafepay plugin for WooCommerce <= 4.15.0 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b5a2a2a-a204-4265-b81e-4b785a407871?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multisafepay/" + google-query: inurl:"/wp-content/plugins/multisafepay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multisafepay,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multisafepay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multisafepay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multisite-post-duplicator-6df6e844abfccff24d48183d808487ab.yaml b/nuclei-templates/cve-less/plugins/multisite-post-duplicator-6df6e844abfccff24d48183d808487ab.yaml new file mode 100644 index 0000000000..ab1e21b01c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multisite-post-duplicator-6df6e844abfccff24d48183d808487ab.yaml @@ -0,0 +1,58 @@ +id: multisite-post-duplicator-6df6e844abfccff24d48183d808487ab + +info: + name: > + Multisite Post Duplicator <= 1.7.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9aeeb92f-26f8-44b5-a523-abc33043efff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multisite-post-duplicator/" + google-query: inurl:"/wp-content/plugins/multisite-post-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multisite-post-duplicator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multisite-post-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multisite-post-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/multisite-robotstxt-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/multisite-robotstxt-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..67c569f9b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/multisite-robotstxt-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: multisite-robotstxt-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/multisite-robotstxt-manager/" + google-query: inurl:"/wp-content/plugins/multisite-robotstxt-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,multisite-robotstxt-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/multisite-robotstxt-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "multisite-robotstxt-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/music-player-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/music-player-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7de374fb5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/music-player-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: music-player-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/music-player-for-elementor/" + google-query: inurl:"/wp-content/plugins/music-player-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,music-player-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/music-player-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "music-player-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/music-player-for-woocommerce-3e61760bac7d3dbcc4ad9810884d474f.yaml b/nuclei-templates/cve-less/plugins/music-player-for-woocommerce-3e61760bac7d3dbcc4ad9810884d474f.yaml new file mode 100644 index 0000000000..4598c06525 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/music-player-for-woocommerce-3e61760bac7d3dbcc4ad9810884d474f.yaml @@ -0,0 +1,58 @@ +id: music-player-for-woocommerce-3e61760bac7d3dbcc4ad9810884d474f + +info: + name: > + Music Player for WooCommerce <= 1.0.172 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a626dfd4-d8c3-4cd1-a624-bae719bea93a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/music-player-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/music-player-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,music-player-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/music-player-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "music-player-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.172') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/music-store-f2983beb380d477fba46a5c5deed43dd.yaml b/nuclei-templates/cve-less/plugins/music-store-f2983beb380d477fba46a5c5deed43dd.yaml new file mode 100644 index 0000000000..857a407245 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/music-store-f2983beb380d477fba46a5c5deed43dd.yaml @@ -0,0 +1,58 @@ +id: music-store-f2983beb380d477fba46a5c5deed43dd + +info: + name: > + Music Store <= 1.0.41 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3d356d1-2f6d-42e0-b774-6384872c0a90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/music-store/" + google-query: inurl:"/wp-content/plugins/music-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,music-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/music-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "music-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/music-store-f8e91618f8a23f5d7b353935e566fd31.yaml b/nuclei-templates/cve-less/plugins/music-store-f8e91618f8a23f5d7b353935e566fd31.yaml new file mode 100644 index 0000000000..9d3dce081f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/music-store-f8e91618f8a23f5d7b353935e566fd31.yaml @@ -0,0 +1,58 @@ +id: music-store-f8e91618f8a23f5d7b353935e566fd31 + +info: + name: > + Music Store – WordPress eCommerce < 1.0.15 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c296743a-ec08-4cdd-b3d0-ab3de93f5bb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/music-store/" + google-query: inurl:"/wp-content/plugins/music-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,music-store,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/music-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "music-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mw-wp-form-7c87e8f104753303f633f63d1aeebd8d.yaml b/nuclei-templates/cve-less/plugins/mw-wp-form-7c87e8f104753303f633f63d1aeebd8d.yaml new file mode 100644 index 0000000000..78823de3cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mw-wp-form-7c87e8f104753303f633f63d1aeebd8d.yaml @@ -0,0 +1,58 @@ +id: mw-wp-form-7c87e8f104753303f633f63d1aeebd8d + +info: + name: > + MW WP Form <= 4.4.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/616de170-6645-4a06-a393-51bec1d8bd8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mw-wp-form/" + google-query: inurl:"/wp-content/plugins/mw-wp-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mw-wp-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mw-wp-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mw-wp-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mw-wp-form-911484e3365757053bdfa0e54f447b4f.yaml b/nuclei-templates/cve-less/plugins/mw-wp-form-911484e3365757053bdfa0e54f447b4f.yaml new file mode 100644 index 0000000000..5fd64717c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mw-wp-form-911484e3365757053bdfa0e54f447b4f.yaml @@ -0,0 +1,58 @@ +id: mw-wp-form-911484e3365757053bdfa0e54f447b4f + +info: + name: > + MW WP Form <= 5.0.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2c03142-be30-4173-a140-14d73a16dd2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mw-wp-form/" + google-query: inurl:"/wp-content/plugins/mw-wp-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mw-wp-form,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mw-wp-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mw-wp-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mw-wp-form-c9a6c3093cb802c72eb217b944b386a2.yaml b/nuclei-templates/cve-less/plugins/mw-wp-form-c9a6c3093cb802c72eb217b944b386a2.yaml new file mode 100644 index 0000000000..098a91e922 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mw-wp-form-c9a6c3093cb802c72eb217b944b386a2.yaml @@ -0,0 +1,58 @@ +id: mw-wp-form-c9a6c3093cb802c72eb217b944b386a2 + +info: + name: > + MW WP Form <= 4.4.2 - Directory Traversal via _file_upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7adeee0-30ff-4759-b42e-1ac2dea5a8a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mw-wp-form/" + google-query: inurl:"/wp-content/plugins/mw-wp-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mw-wp-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mw-wp-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mw-wp-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mw-wp-form-d1c63a8bf0beafb1c82149091059ec86.yaml b/nuclei-templates/cve-less/plugins/mw-wp-form-d1c63a8bf0beafb1c82149091059ec86.yaml new file mode 100644 index 0000000000..279b545574 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mw-wp-form-d1c63a8bf0beafb1c82149091059ec86.yaml @@ -0,0 +1,58 @@ +id: mw-wp-form-d1c63a8bf0beafb1c82149091059ec86 + +info: + name: > + MW WP Form <= 5.0.6 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2126761-cbff-4d46-a6df-4566d15216d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mw-wp-form/" + google-query: inurl:"/wp-content/plugins/mw-wp-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mw-wp-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mw-wp-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mw-wp-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mw-wp-form-fb14b5eeb363b3c1bc8612df7d95fc5e.yaml b/nuclei-templates/cve-less/plugins/mw-wp-form-fb14b5eeb363b3c1bc8612df7d95fc5e.yaml new file mode 100644 index 0000000000..c306167672 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mw-wp-form-fb14b5eeb363b3c1bc8612df7d95fc5e.yaml @@ -0,0 +1,58 @@ +id: mw-wp-form-fb14b5eeb363b3c1bc8612df7d95fc5e + +info: + name: > + MW WP Form <= 5.0.3 - Improper Limitation of File Name to Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/412d555c-9bbd-42f5-8020-ccfc18755a79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mw-wp-form/" + google-query: inurl:"/wp-content/plugins/mw-wp-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mw-wp-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mw-wp-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mw-wp-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwb-point-of-sale-pos-for-woocommerce-20415f311fdf676cb6dd436c829d557f.yaml b/nuclei-templates/cve-less/plugins/mwb-point-of-sale-pos-for-woocommerce-20415f311fdf676cb6dd436c829d557f.yaml new file mode 100644 index 0000000000..2a9699d660 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwb-point-of-sale-pos-for-woocommerce-20415f311fdf676cb6dd436c829d557f.yaml @@ -0,0 +1,58 @@ +id: mwb-point-of-sale-pos-for-woocommerce-20415f311fdf676cb6dd436c829d557f + +info: + name: > + MWB Point of Sale (POS) for WooCommerce <= 1.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e430180-5b89-4d06-b729-d0fdbefa8185?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwb-point-of-sale-pos-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/mwb-point-of-sale-pos-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwb-point-of-sale-pos-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwb-point-of-sale-pos-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwb-point-of-sale-pos-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-countdown-d561f3d81e84a307c0bd1e31854171e0.yaml b/nuclei-templates/cve-less/plugins/mwp-countdown-d561f3d81e84a307c0bd1e31854171e0.yaml new file mode 100644 index 0000000000..c731bddc9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-countdown-d561f3d81e84a307c0bd1e31854171e0.yaml @@ -0,0 +1,58 @@ +id: mwp-countdown-d561f3d81e84a307c0bd1e31854171e0 + +info: + name: > + Wow Countdowns <= 3.1.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd20e40c-cfec-4de6-a8a6-02850185003b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-countdown/" + google-query: inurl:"/wp-content/plugins/mwp-countdown/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-countdown,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-countdown/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-countdown" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-forms-14d5ec39f3f717cd0febca936a2aa6ce.yaml b/nuclei-templates/cve-less/plugins/mwp-forms-14d5ec39f3f717cd0febca936a2aa6ce.yaml new file mode 100644 index 0000000000..0c7767b850 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-forms-14d5ec39f3f717cd0febca936a2aa6ce.yaml @@ -0,0 +1,58 @@ +id: mwp-forms-14d5ec39f3f717cd0febca936a2aa6ce + +info: + name: > + Wow Forms – create any form with custom style <= 3.1.3 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8848a247-52a6-48de-9ad5-deef89c2c599?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-forms/" + google-query: inurl:"/wp-content/plugins/mwp-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-herd-effect-013a3c9fa700970f10b7bbed788f507b.yaml b/nuclei-templates/cve-less/plugins/mwp-herd-effect-013a3c9fa700970f10b7bbed788f507b.yaml new file mode 100644 index 0000000000..c1894d7444 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-herd-effect-013a3c9fa700970f10b7bbed788f507b.yaml @@ -0,0 +1,58 @@ +id: mwp-herd-effect-013a3c9fa700970f10b7bbed788f507b + +info: + name: > + Herd Effects <= 5.2 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8acb86fa-50b4-45b3-9bf8-ef65679b85ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-herd-effect/" + google-query: inurl:"/wp-content/plugins/mwp-herd-effect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-herd-effect,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-herd-effect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-herd-effect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-herd-effect-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/mwp-herd-effect-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..7b0f0fa1e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-herd-effect-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: mwp-herd-effect-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-herd-effect/" + google-query: inurl:"/wp-content/plugins/mwp-herd-effect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-herd-effect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-herd-effect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-herd-effect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-herd-effect-64c02d39235cbe33840c45ab521604aa.yaml b/nuclei-templates/cve-less/plugins/mwp-herd-effect-64c02d39235cbe33840c45ab521604aa.yaml new file mode 100644 index 0000000000..a54f06cd07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-herd-effect-64c02d39235cbe33840c45ab521604aa.yaml @@ -0,0 +1,58 @@ +id: mwp-herd-effect-64c02d39235cbe33840c45ab521604aa + +info: + name: > + Herd Effects <= 5.2.3 - Cross-Site Request Forgery to Effect Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fd15c0b-cd3b-45e7-8379-b0e64e64d6b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-herd-effect/" + google-query: inurl:"/wp-content/plugins/mwp-herd-effect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-herd-effect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-herd-effect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-herd-effect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-herd-effect-ab1eb5a48a622a49086f766ee1ce86ba.yaml b/nuclei-templates/cve-less/plugins/mwp-herd-effect-ab1eb5a48a622a49086f766ee1ce86ba.yaml new file mode 100644 index 0000000000..c34c17162f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-herd-effect-ab1eb5a48a622a49086f766ee1ce86ba.yaml @@ -0,0 +1,58 @@ +id: mwp-herd-effect-ab1eb5a48a622a49086f766ee1ce86ba + +info: + name: > + Herd Effects <= 5.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e79b62b-1d60-4c4c-bd0b-4207b20fa3cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-herd-effect/" + google-query: inurl:"/wp-content/plugins/mwp-herd-effect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-herd-effect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-herd-effect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-herd-effect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-herd-effect-ce8ee7b9600d875960db0922db40d4c2.yaml b/nuclei-templates/cve-less/plugins/mwp-herd-effect-ce8ee7b9600d875960db0922db40d4c2.yaml new file mode 100644 index 0000000000..a8e81879ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-herd-effect-ce8ee7b9600d875960db0922db40d4c2.yaml @@ -0,0 +1,58 @@ +id: mwp-herd-effect-ce8ee7b9600d875960db0922db40d4c2 + +info: + name: > + Herd Effects – fake notifications and social proof plugin <= 5.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/526dcd62-5e40-4870-b6cf-4f3d8bf9f8d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-herd-effect/" + google-query: inurl:"/wp-content/plugins/mwp-herd-effect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-herd-effect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-herd-effect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-herd-effect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-skype-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/mwp-skype-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..8acc1bc596 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-skype-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: mwp-skype-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-skype/" + google-query: inurl:"/wp-content/plugins/mwp-skype/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-skype,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-skype/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-skype" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mwp-skype-73a5ef3fe7ff6ce104975ee9342f5c66.yaml b/nuclei-templates/cve-less/plugins/mwp-skype-73a5ef3fe7ff6ce104975ee9342f5c66.yaml new file mode 100644 index 0000000000..46ee62c48f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mwp-skype-73a5ef3fe7ff6ce104975ee9342f5c66.yaml @@ -0,0 +1,58 @@ +id: mwp-skype-73a5ef3fe7ff6ce104975ee9342f5c66 + +info: + name: > + Wow Skype Buttons <= 4.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abee822e-b929-435a-86c2-57901424f1a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mwp-skype/" + google-query: inurl:"/wp-content/plugins/mwp-skype/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mwp-skype,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mwp-skype/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mwp-skype" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mww-disclaimer-buttons-164235cec7e149cb5686d35550cc5b45.yaml b/nuclei-templates/cve-less/plugins/mww-disclaimer-buttons-164235cec7e149cb5686d35550cc5b45.yaml new file mode 100644 index 0000000000..948cde82e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mww-disclaimer-buttons-164235cec7e149cb5686d35550cc5b45.yaml @@ -0,0 +1,58 @@ +id: mww-disclaimer-buttons-164235cec7e149cb5686d35550cc5b45 + +info: + name: > + MWW Disclaimer Buttons <= 3.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/280871a2-f09f-4cd1-93f1-c804cda6b4e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mww-disclaimer-buttons/" + google-query: inurl:"/wp-content/plugins/mww-disclaimer-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mww-disclaimer-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mww-disclaimer-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mww-disclaimer-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mx-time-zone-clocks-efba52660b6ae40494c76473deb3b9d9.yaml b/nuclei-templates/cve-less/plugins/mx-time-zone-clocks-efba52660b6ae40494c76473deb3b9d9.yaml new file mode 100644 index 0000000000..f64db9b56b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mx-time-zone-clocks-efba52660b6ae40494c76473deb3b9d9.yaml @@ -0,0 +1,58 @@ +id: mx-time-zone-clocks-efba52660b6ae40494c76473deb3b9d9 + +info: + name: > + MX Time Zone Clocks <= 3.4 - Contributor+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11542fc6-33e2-40b9-be74-9fbb788f6915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mx-time-zone-clocks/" + google-query: inurl:"/wp-content/plugins/mx-time-zone-clocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mx-time-zone-clocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mx-time-zone-clocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mx-time-zone-clocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-account-page-editor-decd0181d7e39da44fe0e5d9af5455c7.yaml b/nuclei-templates/cve-less/plugins/my-account-page-editor-decd0181d7e39da44fe0e5d9af5455c7.yaml new file mode 100644 index 0000000000..f359731621 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-account-page-editor-decd0181d7e39da44fe0e5d9af5455c7.yaml @@ -0,0 +1,58 @@ +id: my-account-page-editor-decd0181d7e39da44fe0e5d9af5455c7 + +info: + name: > + My Account Page Editor <= 1.3.1 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f87b6987-8896-4edf-9b14-8582426adeb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-account-page-editor/" + google-query: inurl:"/wp-content/plugins/my-account-page-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-account-page-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-account-page-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-account-page-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-0fa49314c689285a17b374209d3a5887.yaml b/nuclei-templates/cve-less/plugins/my-calendar-0fa49314c689285a17b374209d3a5887.yaml new file mode 100644 index 0000000000..c8ac208fcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-0fa49314c689285a17b374209d3a5887.yaml @@ -0,0 +1,58 @@ +id: my-calendar-0fa49314c689285a17b374209d3a5887 + +info: + name: > + My Calendar <= 3.4.23 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d039ba8f-0452-4c14-a655-7f6880c1f1b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-1e21b5582d8630d6c174336fda22cd0b.yaml b/nuclei-templates/cve-less/plugins/my-calendar-1e21b5582d8630d6c174336fda22cd0b.yaml new file mode 100644 index 0000000000..df6c434691 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-1e21b5582d8630d6c174336fda22cd0b.yaml @@ -0,0 +1,58 @@ +id: my-calendar-1e21b5582d8630d6c174336fda22cd0b + +info: + name: > + My Calendar <= 3.3.16 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e77d240-475d-41a2-9b88-1332fc60b72d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-505ed98ce47f4d2bcda888e7e457703c.yaml b/nuclei-templates/cve-less/plugins/my-calendar-505ed98ce47f4d2bcda888e7e457703c.yaml new file mode 100644 index 0000000000..5824315a8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-505ed98ce47f4d2bcda888e7e457703c.yaml @@ -0,0 +1,58 @@ +id: my-calendar-505ed98ce47f4d2bcda888e7e457703c + +info: + name: > + My Calendar <= 3.2.17 - Subscriber+ Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cac9614d-3fe5-4657-af6b-81acb71f51f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-5855cc9e78b9585b3894e0c7b7fb5555.yaml b/nuclei-templates/cve-less/plugins/my-calendar-5855cc9e78b9585b3894e0c7b7fb5555.yaml new file mode 100644 index 0000000000..4cdf8b48f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-5855cc9e78b9585b3894e0c7b7fb5555.yaml @@ -0,0 +1,58 @@ +id: my-calendar-5855cc9e78b9585b3894e0c7b7fb5555 + +info: + name: > + My Calendar < 2.3.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8a56a1c-6af0-47e6-906c-bb3eb1440eb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-5c7338d4e00209af0345ad82177f57cf.yaml b/nuclei-templates/cve-less/plugins/my-calendar-5c7338d4e00209af0345ad82177f57cf.yaml new file mode 100644 index 0000000000..7c9f59e817 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-5c7338d4e00209af0345ad82177f57cf.yaml @@ -0,0 +1,58 @@ +id: my-calendar-5c7338d4e00209af0345ad82177f57cf + +info: + name: > + My Calendar <= 2.3.29 - Path Traversal to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfffe880-e3f9-4163-a726-e248433e1034?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-5f2c8752d84edabaa8bbd1589413f608.yaml b/nuclei-templates/cve-less/plugins/my-calendar-5f2c8752d84edabaa8bbd1589413f608.yaml new file mode 100644 index 0000000000..1bc0d7de5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-5f2c8752d84edabaa8bbd1589413f608.yaml @@ -0,0 +1,58 @@ +id: my-calendar-5f2c8752d84edabaa8bbd1589413f608 + +info: + name: > + My Calendar < 1.10.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97ad1b6e-2f2b-49f6-9970-fd413bfc544a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-65b1205e2a37abbb65be358b000a3445.yaml b/nuclei-templates/cve-less/plugins/my-calendar-65b1205e2a37abbb65be358b000a3445.yaml new file mode 100644 index 0000000000..fab0cc4fb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-65b1205e2a37abbb65be358b000a3445.yaml @@ -0,0 +1,58 @@ +id: my-calendar-65b1205e2a37abbb65be358b000a3445 + +info: + name: > + My Calendar <= 3.4.21 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/496b1c3a-7fbb-4088-9936-6b023718946d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-72451557ba7e0e914a18e1ce213f28d7.yaml b/nuclei-templates/cve-less/plugins/my-calendar-72451557ba7e0e914a18e1ce213f28d7.yaml new file mode 100644 index 0000000000..3f5b940fdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-72451557ba7e0e914a18e1ce213f28d7.yaml @@ -0,0 +1,58 @@ +id: my-calendar-72451557ba7e0e914a18e1ce213f28d7 + +info: + name: > + My Calendar <= 2.5.16 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a42dce68-0e64-46a6-926e-b676071744b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-7598877f4e713405d9e74bfad63425fb.yaml b/nuclei-templates/cve-less/plugins/my-calendar-7598877f4e713405d9e74bfad63425fb.yaml new file mode 100644 index 0000000000..50ada28ec0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-7598877f4e713405d9e74bfad63425fb.yaml @@ -0,0 +1,58 @@ +id: my-calendar-7598877f4e713405d9e74bfad63425fb + +info: + name: > + My Calendar <= 3.4.23 - Authenticated (Admin+) Stored Cross-Site Scripting via Events + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad98db62-4253-4fd5-90b3-c28a563c7697?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-921b9a5130a0ad2bf4a94e3131564950.yaml b/nuclei-templates/cve-less/plugins/my-calendar-921b9a5130a0ad2bf4a94e3131564950.yaml new file mode 100644 index 0000000000..2600a9d7ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-921b9a5130a0ad2bf4a94e3131564950.yaml @@ -0,0 +1,58 @@ +id: my-calendar-921b9a5130a0ad2bf4a94e3131564950 + +info: + name: > + My Calendar < 2.3.30 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8de8a412-af19-4a1e-a131-47815b38517f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-a6b03d82501be09605ec3648f082c81b.yaml b/nuclei-templates/cve-less/plugins/my-calendar-a6b03d82501be09605ec3648f082c81b.yaml new file mode 100644 index 0000000000..13c220391a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-a6b03d82501be09605ec3648f082c81b.yaml @@ -0,0 +1,58 @@ +id: my-calendar-a6b03d82501be09605ec3648f082c81b + +info: + name: > + My Calendar <= 3.3.16 - Administrator+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/801132f5-e4ea-4d56-8429-9f33896f6dff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-aa680f4ce8dad5699d078d5a407ddd10.yaml b/nuclei-templates/cve-less/plugins/my-calendar-aa680f4ce8dad5699d078d5a407ddd10.yaml new file mode 100644 index 0000000000..4e9e341435 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-aa680f4ce8dad5699d078d5a407ddd10.yaml @@ -0,0 +1,58 @@ +id: my-calendar-aa680f4ce8dad5699d078d5a407ddd10 + +info: + name: > + My Calendar <= 3.3.24.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/334570f7-967b-4792-934c-ebe4c4f18490?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.24.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-b87197a613662b55350c2f2781a87102.yaml b/nuclei-templates/cve-less/plugins/my-calendar-b87197a613662b55350c2f2781a87102.yaml new file mode 100644 index 0000000000..e0d547ae38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-b87197a613662b55350c2f2781a87102.yaml @@ -0,0 +1,58 @@ +id: my-calendar-b87197a613662b55350c2f2781a87102 + +info: + name: > + My Calendar <= 3.1.9 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d9362f-3f34-4602-b19f-2d283e4fe22d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-calendar-dd53e1988ec5b5d25424d4247fd55d9d.yaml b/nuclei-templates/cve-less/plugins/my-calendar-dd53e1988ec5b5d25424d4247fd55d9d.yaml new file mode 100644 index 0000000000..7309e20e77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-calendar-dd53e1988ec5b5d25424d4247fd55d9d.yaml @@ -0,0 +1,58 @@ +id: my-calendar-dd53e1988ec5b5d25424d4247fd55d9d + +info: + name: > + My Calendar <= 3.4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74f1966c-f465-4c8f-b7ae-131974961d72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-calendar/" + google-query: inurl:"/wp-content/plugins/my-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-category-order-46d83256b62bdfe4aa6f310ac82e97af.yaml b/nuclei-templates/cve-less/plugins/my-category-order-46d83256b62bdfe4aa6f310ac82e97af.yaml new file mode 100644 index 0000000000..58bcd623df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-category-order-46d83256b62bdfe4aa6f310ac82e97af.yaml @@ -0,0 +1,58 @@ +id: my-category-order-46d83256b62bdfe4aa6f310ac82e97af + +info: + name: > + My Category Order <= 4.3 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/758ccfd2-e984-46d9-9643-29299d64940e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-category-order/" + google-query: inurl:"/wp-content/plugins/my-category-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-category-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-category-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-category-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-category-order-64ec2a96ce824196b74660ea295fa52d.yaml b/nuclei-templates/cve-less/plugins/my-category-order-64ec2a96ce824196b74660ea295fa52d.yaml new file mode 100644 index 0000000000..3605966c45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-category-order-64ec2a96ce824196b74660ea295fa52d.yaml @@ -0,0 +1,58 @@ +id: my-category-order-64ec2a96ce824196b74660ea295fa52d + +info: + name: > + my-category-order <= 2.8.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d97eb079-5b19-461c-8a80-d00ab45e2bff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-category-order/" + google-query: inurl:"/wp-content/plugins/my-category-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-category-order,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-category-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-category-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-chatbot-09bccc53b96a3e1339f2f17e91426178.yaml b/nuclei-templates/cve-less/plugins/my-chatbot-09bccc53b96a3e1339f2f17e91426178.yaml new file mode 100644 index 0000000000..cd05b4fee9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-chatbot-09bccc53b96a3e1339f2f17e91426178.yaml @@ -0,0 +1,58 @@ +id: my-chatbot-09bccc53b96a3e1339f2f17e91426178 + +info: + name: > + My Chatbot <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb49e8d5-1f4f-46d1-8206-0a43b4284f19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-chatbot/" + google-query: inurl:"/wp-content/plugins/my-chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-chatbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-content-management-2e12d42eb302e6a61f201e211fa0da28.yaml b/nuclei-templates/cve-less/plugins/my-content-management-2e12d42eb302e6a61f201e211fa0da28.yaml new file mode 100644 index 0000000000..d3987b2d01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-content-management-2e12d42eb302e6a61f201e211fa0da28.yaml @@ -0,0 +1,58 @@ +id: my-content-management-2e12d42eb302e6a61f201e211fa0da28 + +info: + name: > + My Content Management <= 1.7.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fc18fee-5813-4134-8c4d-44710665857a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-content-management/" + google-query: inurl:"/wp-content/plugins/my-content-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-content-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-content-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-content-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-content-management-f493de201064a7faaee262b5cd71afb2.yaml b/nuclei-templates/cve-less/plugins/my-content-management-f493de201064a7faaee262b5cd71afb2.yaml new file mode 100644 index 0000000000..52efa8100f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-content-management-f493de201064a7faaee262b5cd71afb2.yaml @@ -0,0 +1,58 @@ +id: my-content-management-f493de201064a7faaee262b5cd71afb2 + +info: + name: > + My Content Management <= 1.7.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcd986cd-d6c0-4d8f-8078-ac0ac83572a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-content-management/" + google-query: inurl:"/wp-content/plugins/my-content-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-content-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-content-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-content-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-geo-posts-free-124c0d175531516b3b7ac443edf7328e.yaml b/nuclei-templates/cve-less/plugins/my-geo-posts-free-124c0d175531516b3b7ac443edf7328e.yaml new file mode 100644 index 0000000000..7def38401b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-geo-posts-free-124c0d175531516b3b7ac443edf7328e.yaml @@ -0,0 +1,58 @@ +id: my-geo-posts-free-124c0d175531516b3b7ac443edf7328e + +info: + name: > + My Geo Posts Free <= 1.2 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc550fd9-c332-4a40-b4a9-166d5ffebc76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-geo-posts-free/" + google-query: inurl:"/wp-content/plugins/my-geo-posts-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-geo-posts-free,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-geo-posts-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-geo-posts-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-link-order-6e16524bd1d2a580c4988808ba69289d.yaml b/nuclei-templates/cve-less/plugins/my-link-order-6e16524bd1d2a580c4988808ba69289d.yaml new file mode 100644 index 0000000000..a233c0cd5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-link-order-6e16524bd1d2a580c4988808ba69289d.yaml @@ -0,0 +1,58 @@ +id: my-link-order-6e16524bd1d2a580c4988808ba69289d + +info: + name: > + My Link Order <= 4.3 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c1a7103-14be-46ce-bac3-fb88b7f51003?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-link-order/" + google-query: inurl:"/wp-content/plugins/my-link-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-link-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-link-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-link-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-page-order-a5940bfb7c2779df0f2c0ab2e0cfe4dd.yaml b/nuclei-templates/cve-less/plugins/my-page-order-a5940bfb7c2779df0f2c0ab2e0cfe4dd.yaml new file mode 100644 index 0000000000..80918ce672 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-page-order-a5940bfb7c2779df0f2c0ab2e0cfe4dd.yaml @@ -0,0 +1,58 @@ +id: my-page-order-a5940bfb7c2779df0f2c0ab2e0cfe4dd + +info: + name: > + My Page Order <= 4.3 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd7a5a36-0e78-4fdc-b159-b4cc89cd3ffb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-page-order/" + google-query: inurl:"/wp-content/plugins/my-page-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-page-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-page-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-page-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-shortcodes-de64d2f517270fa27d42f881da4c6d98.yaml b/nuclei-templates/cve-less/plugins/my-shortcodes-de64d2f517270fa27d42f881da4c6d98.yaml new file mode 100644 index 0000000000..995b297914 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-shortcodes-de64d2f517270fa27d42f881da4c6d98.yaml @@ -0,0 +1,58 @@ +id: my-shortcodes-de64d2f517270fa27d42f881da4c6d98 + +info: + name: > + My Shortcodes <= 2.3 - Missing Authorization via Multiple AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a931496-f130-4910-9116-6c2c4df760f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-shortcodes/" + google-query: inurl:"/wp-content/plugins/my-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-shortcodes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-tickets-3b65f76db2b87c51279c14c330d16347.yaml b/nuclei-templates/cve-less/plugins/my-tickets-3b65f76db2b87c51279c14c330d16347.yaml new file mode 100644 index 0000000000..1591a9bde0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-tickets-3b65f76db2b87c51279c14c330d16347.yaml @@ -0,0 +1,58 @@ +id: my-tickets-3b65f76db2b87c51279c14c330d16347 + +info: + name: > + My Tickets <= 1.9.11 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33a8173e-cb1a-4396-a05b-7404bf899ad9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-tickets/" + google-query: inurl:"/wp-content/plugins/my-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-tickets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-tickets-77e642ff24948f5be818c3b7338e42ce.yaml b/nuclei-templates/cve-less/plugins/my-tickets-77e642ff24948f5be818c3b7338e42ce.yaml new file mode 100644 index 0000000000..490d9844a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-tickets-77e642ff24948f5be818c3b7338e42ce.yaml @@ -0,0 +1,58 @@ +id: my-tickets-77e642ff24948f5be818c3b7338e42ce + +info: + name: > + My Tickets <= 1.8.30 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ff5a900-9e4d-4bd0-bd19-cad96e62f973?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-tickets/" + google-query: inurl:"/wp-content/plugins/my-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-tickets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-tickets-d8fe1550ef4435dde41b495aa629c7d1.yaml b/nuclei-templates/cve-less/plugins/my-tickets-d8fe1550ef4435dde41b495aa629c7d1.yaml new file mode 100644 index 0000000000..8aa7e00dc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-tickets-d8fe1550ef4435dde41b495aa629c7d1.yaml @@ -0,0 +1,58 @@ +id: my-tickets-d8fe1550ef4435dde41b495aa629c7d1 + +info: + name: > + My Tickets <= 1.9.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c107916-1de8-46e3-80bf-3e1529533907?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-tickets/" + google-query: inurl:"/wp-content/plugins/my-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-tickets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-waze-94a42c523ccdb6324d7b897f6e9c739d.yaml b/nuclei-templates/cve-less/plugins/my-waze-94a42c523ccdb6324d7b897f6e9c739d.yaml new file mode 100644 index 0000000000..f3ab8c8d32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-waze-94a42c523ccdb6324d7b897f6e9c739d.yaml @@ -0,0 +1,58 @@ +id: my-waze-94a42c523ccdb6324d7b897f6e9c739d + +info: + name: > + MyWaze <= 1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f516d1d-530b-4902-82c5-916478669232?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-waze/" + google-query: inurl:"/wp-content/plugins/my-waze/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-waze,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-waze/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-waze" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-wish-list-de81b18a854ce81734a5dca6853e283e.yaml b/nuclei-templates/cve-less/plugins/my-wish-list-de81b18a854ce81734a5dca6853e283e.yaml new file mode 100644 index 0000000000..a76375ab7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-wish-list-de81b18a854ce81734a5dca6853e283e.yaml @@ -0,0 +1,58 @@ +id: my-wish-list-de81b18a854ce81734a5dca6853e283e + +info: + name: > + My Wish List < 1.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4bf80cd-8956-4143-afcb-995013554d56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-wish-list/" + google-query: inurl:"/wp-content/plugins/my-wish-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-wish-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-wish-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-wish-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-wp-e034d0793fa530375c47c930a890a44e.yaml b/nuclei-templates/cve-less/plugins/my-wp-e034d0793fa530375c47c930a890a44e.yaml new file mode 100644 index 0000000000..26f82e13af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-wp-e034d0793fa530375c47c930a890a44e.yaml @@ -0,0 +1,58 @@ +id: my-wp-e034d0793fa530375c47c930a890a44e + +info: + name: > + My WP Customize Admin/Frontend <= 1.21.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a830fb8-de5f-40c7-bb6c-464ed916b440?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-wp/" + google-query: inurl:"/wp-content/plugins/my-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-wp-health-check-e849386b94578b26b80f8f92e65a3f8b.yaml b/nuclei-templates/cve-less/plugins/my-wp-health-check-e849386b94578b26b80f8f92e65a3f8b.yaml new file mode 100644 index 0000000000..52d5e0d8cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-wp-health-check-e849386b94578b26b80f8f92e65a3f8b.yaml @@ -0,0 +1,58 @@ +id: my-wp-health-check-e849386b94578b26b80f8f92e65a3f8b + +info: + name: > + SiteAlert (Formerly WP Health) <= 1.9.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1870c6e-23b6-4f3b-adba-72633d62dfd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-wp-health-check/" + google-query: inurl:"/wp-content/plugins/my-wp-health-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-wp-health-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-wp-health-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-wp-health-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-wp-translate-d3e6d2f3e4924a9f9f37a01c1a206e29.yaml b/nuclei-templates/cve-less/plugins/my-wp-translate-d3e6d2f3e4924a9f9f37a01c1a206e29.yaml new file mode 100644 index 0000000000..700e64e39f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-wp-translate-d3e6d2f3e4924a9f9f37a01c1a206e29.yaml @@ -0,0 +1,58 @@ +id: my-wp-translate-d3e6d2f3e4924a9f9f37a01c1a206e29 + +info: + name: > + My WP Translate <= 1.0.3 - Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56b16f10-2f48-49db-85f6-f934bc267110?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-wp-translate/" + google-query: inurl:"/wp-content/plugins/my-wp-translate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-wp-translate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-wp-translate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-wp-translate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-wp-translate-da4809632dd888beae369fbce2888e9e.yaml b/nuclei-templates/cve-less/plugins/my-wp-translate-da4809632dd888beae369fbce2888e9e.yaml new file mode 100644 index 0000000000..0b145757b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-wp-translate-da4809632dd888beae369fbce2888e9e.yaml @@ -0,0 +1,58 @@ +id: my-wp-translate-da4809632dd888beae369fbce2888e9e + +info: + name: > + My WP Translate <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b1261d9-ab21-4ec2-84d7-f12a2013607a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-wp-translate/" + google-query: inurl:"/wp-content/plugins/my-wp-translate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-wp-translate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-wp-translate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-wp-translate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/my-wpdb-ca85fcbf44c8f529ecdfa95b175d7b9b.yaml b/nuclei-templates/cve-less/plugins/my-wpdb-ca85fcbf44c8f529ecdfa95b175d7b9b.yaml new file mode 100644 index 0000000000..18e20267d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/my-wpdb-ca85fcbf44c8f529ecdfa95b175d7b9b.yaml @@ -0,0 +1,58 @@ +id: my-wpdb-ca85fcbf44c8f529ecdfa95b175d7b9b + +info: + name: > + My wpdb <= 1.1.12 - Cross-Site Request Forgery to Arbitrary SQL Query Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e437ef90-5321-4543-a4ef-716b898315eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/my-wpdb/" + google-query: inurl:"/wp-content/plugins/my-wpdb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,my-wpdb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/my-wpdb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "my-wpdb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/myagileprivacy-b91180f6c8ba3f8d6ff100d044a9837c.yaml b/nuclei-templates/cve-less/plugins/myagileprivacy-b91180f6c8ba3f8d6ff100d044a9837c.yaml new file mode 100644 index 0000000000..c851f19d67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/myagileprivacy-b91180f6c8ba3f8d6ff100d044a9837c.yaml @@ -0,0 +1,58 @@ +id: myagileprivacy-b91180f6c8ba3f8d6ff100d044a9837c + +info: + name: > + My Agile Privacy <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting vis Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35c40c81-c7b4-4453-bd2f-7910fcb7f13e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/myagileprivacy/" + google-query: inurl:"/wp-content/plugins/myagileprivacy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,myagileprivacy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/myagileprivacy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myagileprivacy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/myaliceai-40ddfa284deb87a97d4ffba35198f3b4.yaml b/nuclei-templates/cve-less/plugins/myaliceai-40ddfa284deb87a97d4ffba35198f3b4.yaml new file mode 100644 index 0000000000..e8f16a185a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/myaliceai-40ddfa284deb87a97d4ffba35198f3b4.yaml @@ -0,0 +1,58 @@ +id: myaliceai-40ddfa284deb87a97d4ffba35198f3b4 + +info: + name: > + MyAlice – Live Chat, WhatsApp, Facebook Messenger, Instagram, & Chatbot for WooCommerce <= 1.2.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8981ab1d-5957-444c-a5f1-57317a2e8395?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/myaliceai/" + google-query: inurl:"/wp-content/plugins/myaliceai/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,myaliceai,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/myaliceai/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myaliceai" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mybb-cross-poster-7b501f3b3223dc999faba6ed8169a765.yaml b/nuclei-templates/cve-less/plugins/mybb-cross-poster-7b501f3b3223dc999faba6ed8169a765.yaml new file mode 100644 index 0000000000..fea0e51dba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mybb-cross-poster-7b501f3b3223dc999faba6ed8169a765.yaml @@ -0,0 +1,58 @@ +id: mybb-cross-poster-7b501f3b3223dc999faba6ed8169a765 + +info: + name: > + MyBB Cross-Poster <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6b079f5-715d-4fb3-bcaf-539412d5e956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mybb-cross-poster/" + google-query: inurl:"/wp-content/plugins/mybb-cross-poster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mybb-cross-poster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mybb-cross-poster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mybb-cross-poster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/myblogu-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/myblogu-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..3f46c09cff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/myblogu-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: myblogu-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/myblogu/" + google-query: inurl:"/wp-content/plugins/myblogu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,myblogu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/myblogu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myblogu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mybooktable-7da47fa66cee45b26565c0fef152490a.yaml b/nuclei-templates/cve-less/plugins/mybooktable-7da47fa66cee45b26565c0fef152490a.yaml new file mode 100644 index 0000000000..9c0fd97d70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mybooktable-7da47fa66cee45b26565c0fef152490a.yaml @@ -0,0 +1,58 @@ +id: mybooktable-7da47fa66cee45b26565c0fef152490a + +info: + name: > + MyBookTable Bookstore <= 3.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02b336ce-be41-4343-9817-0437bd2685c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mybooktable/" + google-query: inurl:"/wp-content/plugins/mybooktable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mybooktable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mybooktable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mybooktable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mybooktable-8dbe7a3817fde028be9e786330407154.yaml b/nuclei-templates/cve-less/plugins/mybooktable-8dbe7a3817fde028be9e786330407154.yaml new file mode 100644 index 0000000000..566a2593c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mybooktable-8dbe7a3817fde028be9e786330407154.yaml @@ -0,0 +1,58 @@ +id: mybooktable-8dbe7a3817fde028be9e786330407154 + +info: + name: > + MyBookTable Bookstore <= 3.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f85a0394-cd70-419d-97bd-c75d6f721714?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mybooktable/" + google-query: inurl:"/wp-content/plugins/mybooktable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mybooktable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mybooktable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mybooktable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mybooktable-93938fbe21973f374f80c1d00bd023f7.yaml b/nuclei-templates/cve-less/plugins/mybooktable-93938fbe21973f374f80c1d00bd023f7.yaml new file mode 100644 index 0000000000..a4988b9340 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mybooktable-93938fbe21973f374f80c1d00bd023f7.yaml @@ -0,0 +1,58 @@ +id: mybooktable-93938fbe21973f374f80c1d00bd023f7 + +info: + name: > + MyBookTable Bookstore by Stormhill Media <= 2.1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94a9ef6b-57f9-4e3b-a048-27538bbecf2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mybooktable/" + google-query: inurl:"/wp-content/plugins/mybooktable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mybooktable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mybooktable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mybooktable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mybooktable-c4c3dacc97e2d49842f4e491e4abe511.yaml b/nuclei-templates/cve-less/plugins/mybooktable-c4c3dacc97e2d49842f4e491e4abe511.yaml new file mode 100644 index 0000000000..554423f8b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mybooktable-c4c3dacc97e2d49842f4e491e4abe511.yaml @@ -0,0 +1,58 @@ +id: mybooktable-c4c3dacc97e2d49842f4e491e4abe511 + +info: + name: > + MyBookTable Bookstore <= 3.3.7 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a15f8a5a-dccf-476e-9a40-e9ea11dc46f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mybooktable/" + google-query: inurl:"/wp-content/plugins/mybooktable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mybooktable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mybooktable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mybooktable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-4696541fdc76b8ee098f38a67fea2a75.yaml b/nuclei-templates/cve-less/plugins/mycred-4696541fdc76b8ee098f38a67fea2a75.yaml new file mode 100644 index 0000000000..491d33b7cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-4696541fdc76b8ee098f38a67fea2a75.yaml @@ -0,0 +1,58 @@ +id: mycred-4696541fdc76b8ee098f38a67fea2a75 + +info: + name: > + myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin <= 2.6.3 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3d4283e-ea57-41e1-baeb-f8f70cad3020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-5950b0d42aaf04d555a067d560ed1764.yaml b/nuclei-templates/cve-less/plugins/mycred-5950b0d42aaf04d555a067d560ed1764.yaml new file mode 100644 index 0000000000..3e667c52aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-5950b0d42aaf04d555a067d560ed1764.yaml @@ -0,0 +1,58 @@ +id: mycred-5950b0d42aaf04d555a067d560ed1764 + +info: + name: > + myCred <= 2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3936c4b-2326-41dc-b7d6-a8cf43752ddb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-6420c7d64b9445ffc9ff5c8ed72e1368.yaml b/nuclei-templates/cve-less/plugins/mycred-6420c7d64b9445ffc9ff5c8ed72e1368.yaml new file mode 100644 index 0000000000..4cfa84570d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-6420c7d64b9445ffc9ff5c8ed72e1368.yaml @@ -0,0 +1,58 @@ +id: mycred-6420c7d64b9445ffc9ff5c8ed72e1368 + +info: + name: > + myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin <= 2.4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8464cd2-eef0-419b-b368-6f86af4e8dd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-6ae7e30bc28b46b135c2064dc2c025e6.yaml b/nuclei-templates/cve-less/plugins/mycred-6ae7e30bc28b46b135c2064dc2c025e6.yaml new file mode 100644 index 0000000000..514345c9e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-6ae7e30bc28b46b135c2064dc2c025e6.yaml @@ -0,0 +1,58 @@ +id: mycred-6ae7e30bc28b46b135c2064dc2c025e6 + +info: + name: > + myCred <= 2.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4067e03-427c-4b03-a250-0354572ae361?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-6d3bd66271ddc3e51b161d4fb84cf2f5.yaml b/nuclei-templates/cve-less/plugins/mycred-6d3bd66271ddc3e51b161d4fb84cf2f5.yaml new file mode 100644 index 0000000000..c26e1bb50f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-6d3bd66271ddc3e51b161d4fb84cf2f5.yaml @@ -0,0 +1,58 @@ +id: mycred-6d3bd66271ddc3e51b161d4fb84cf2f5 + +info: + name: > + myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin <= 2.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6753a37b-7242-4895-a439-f726ad835f61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-7b33af13dcbb1f6cea4e6cd4849f85c9.yaml b/nuclei-templates/cve-less/plugins/mycred-7b33af13dcbb1f6cea4e6cd4849f85c9.yaml new file mode 100644 index 0000000000..ce49086379 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-7b33af13dcbb1f6cea4e6cd4849f85c9.yaml @@ -0,0 +1,58 @@ +id: mycred-7b33af13dcbb1f6cea4e6cd4849f85c9 + +info: + name: > + myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin <= 2.4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e5800fa-e0d7-435f-98c2-6d91df26d657?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-9d5e6984e47653aa7bf2ef78de6fcae3.yaml b/nuclei-templates/cve-less/plugins/mycred-9d5e6984e47653aa7bf2ef78de6fcae3.yaml new file mode 100644 index 0000000000..ddd70d5b0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-9d5e6984e47653aa7bf2ef78de6fcae3.yaml @@ -0,0 +1,58 @@ +id: mycred-9d5e6984e47653aa7bf2ef78de6fcae3 + +info: + name: > + myCred Plugin <= 1.7.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74db4d3a-ee3f-460a-b880-f61a8e33ea57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-a4073afeed9945d540c4483af566c48e.yaml b/nuclei-templates/cve-less/plugins/mycred-a4073afeed9945d540c4483af566c48e.yaml new file mode 100644 index 0000000000..eeacc5e6bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-a4073afeed9945d540c4483af566c48e.yaml @@ -0,0 +1,58 @@ +id: mycred-a4073afeed9945d540c4483af566c48e + +info: + name: > + myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin <= 2.2 - Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c994021-d429-4652-ada5-34ec0517cb19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-ab40c276cb9902f9d5e1087da672b8cb.yaml b/nuclei-templates/cve-less/plugins/mycred-ab40c276cb9902f9d5e1087da672b8cb.yaml new file mode 100644 index 0000000000..eca6468574 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-ab40c276cb9902f9d5e1087da672b8cb.yaml @@ -0,0 +1,58 @@ +id: mycred-ab40c276cb9902f9d5e1087da672b8cb + +info: + name: > + myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin <= 2.4.6.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01857d1d-4b6c-4ab0-b2ef-6a948daedbe0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/mycred-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..26670d0113 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: mycred-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycred-dab92fc7cb3e34a6cce738aec497ec2e.yaml b/nuclei-templates/cve-less/plugins/mycred-dab92fc7cb3e34a6cce738aec497ec2e.yaml new file mode 100644 index 0000000000..8a36bea0d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycred-dab92fc7cb3e34a6cce738aec497ec2e.yaml @@ -0,0 +1,58 @@ +id: mycred-dab92fc7cb3e34a6cce738aec497ec2e + +info: + name: > + myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin <= 2.4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80b15512-210c-4c6b-a3ad-f5d6042091a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycred/" + google-query: inurl:"/wp-content/plugins/mycred/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycred,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycred/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycred" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycryptocheckout-7e48a0f635133ab535de9155dd7df3ac.yaml b/nuclei-templates/cve-less/plugins/mycryptocheckout-7e48a0f635133ab535de9155dd7df3ac.yaml new file mode 100644 index 0000000000..8c84819fc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycryptocheckout-7e48a0f635133ab535de9155dd7df3ac.yaml @@ -0,0 +1,58 @@ +id: mycryptocheckout-7e48a0f635133ab535de9155dd7df3ac + +info: + name: > + MyCryptoCheckout <= 2.125 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5575725-99ba-4499-93e5-f7648c82ac52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycryptocheckout/" + google-query: inurl:"/wp-content/plugins/mycryptocheckout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycryptocheckout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycryptocheckout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycryptocheckout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.125') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycryptocheckout-f806fd57534e9e84564f98154ed849f3.yaml b/nuclei-templates/cve-less/plugins/mycryptocheckout-f806fd57534e9e84564f98154ed849f3.yaml new file mode 100644 index 0000000000..de25012c45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycryptocheckout-f806fd57534e9e84564f98154ed849f3.yaml @@ -0,0 +1,58 @@ +id: mycryptocheckout-f806fd57534e9e84564f98154ed849f3 + +info: + name: > + MyCryptoCheckout <= 2.123 - Reflected Cross-Site Scripting via url + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7633b5cd-0e8f-4744-bfee-d6d54a44c143?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycryptocheckout/" + google-query: inurl:"/wp-content/plugins/mycryptocheckout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycryptocheckout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycryptocheckout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycryptocheckout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.123') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycss-51cc7451392ec09a8c7688f9ed5f409c.yaml b/nuclei-templates/cve-less/plugins/mycss-51cc7451392ec09a8c7688f9ed5f409c.yaml new file mode 100644 index 0000000000..ba8c2d9a33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycss-51cc7451392ec09a8c7688f9ed5f409c.yaml @@ -0,0 +1,58 @@ +id: mycss-51cc7451392ec09a8c7688f9ed5f409c + +info: + name: > + MyCSS <= 1.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecdfb19e-ef3a-4c5a-96a5-4c9ce3dca3a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycss/" + google-query: inurl:"/wp-content/plugins/mycss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycurator-243dea5b11f06ba3f210fa9f99b93530.yaml b/nuclei-templates/cve-less/plugins/mycurator-243dea5b11f06ba3f210fa9f99b93530.yaml new file mode 100644 index 0000000000..47b48420ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycurator-243dea5b11f06ba3f210fa9f99b93530.yaml @@ -0,0 +1,58 @@ +id: mycurator-243dea5b11f06ba3f210fa9f99b93530 + +info: + name: > + MyCurator Content Curation <= 3.74 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3301899e-5c38-4ecd-b095-6e00b0f7582e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycurator/" + google-query: inurl:"/wp-content/plugins/mycurator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycurator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycurator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycurator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.74') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mycurator-972385a1b4b6972691f113fb45ea0adc.yaml b/nuclei-templates/cve-less/plugins/mycurator-972385a1b4b6972691f113fb45ea0adc.yaml new file mode 100644 index 0000000000..5088ebddb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mycurator-972385a1b4b6972691f113fb45ea0adc.yaml @@ -0,0 +1,58 @@ +id: mycurator-972385a1b4b6972691f113fb45ea0adc + +info: + name: > + MyCurator Content Curation <= 3.76 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6dbc64eb-1da6-4086-9fe1-3d9080bef12e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mycurator/" + google-query: inurl:"/wp-content/plugins/mycurator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mycurator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mycurator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mycurator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/myeasybackup-d663aae86bf8b83f4649ce306c1e5aed.yaml b/nuclei-templates/cve-less/plugins/myeasybackup-d663aae86bf8b83f4649ce306c1e5aed.yaml new file mode 100644 index 0000000000..fc813b35ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/myeasybackup-d663aae86bf8b83f4649ce306c1e5aed.yaml @@ -0,0 +1,58 @@ +id: myeasybackup-d663aae86bf8b83f4649ce306c1e5aed + +info: + name: > + myEASYbackup < 1.0.9 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55a103a7-c5d8-4b52-8291-e4ae4f848cbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/myeasybackup/" + google-query: inurl:"/wp-content/plugins/myeasybackup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,myeasybackup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/myeasybackup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myeasybackup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/myflash-0de546d8ff8a440613f030661df64835.yaml b/nuclei-templates/cve-less/plugins/myflash-0de546d8ff8a440613f030661df64835.yaml new file mode 100644 index 0000000000..784a88fd8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/myflash-0de546d8ff8a440613f030661df64835.yaml @@ -0,0 +1,58 @@ +id: myflash-0de546d8ff8a440613f030661df64835 + +info: + name: > + Myflash < 1.11 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c648de5-14b3-4c7f-a1c2-46d91b56b0ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/myflash/" + google-query: inurl:"/wp-content/plugins/myflash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,myflash,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/myflash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myflash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/myftp-ftp-like-plugin-for-wordpress-49d2ffe5685768bca2fdd1bbd6d1b0f5.yaml b/nuclei-templates/cve-less/plugins/myftp-ftp-like-plugin-for-wordpress-49d2ffe5685768bca2fdd1bbd6d1b0f5.yaml new file mode 100644 index 0000000000..eb5a671f1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/myftp-ftp-like-plugin-for-wordpress-49d2ffe5685768bca2fdd1bbd6d1b0f5.yaml @@ -0,0 +1,58 @@ +id: myftp-ftp-like-plugin-for-wordpress-49d2ffe5685768bca2fdd1bbd6d1b0f5 + +info: + name: > + MyFTP <= 1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05a81b0e-2d25-44b5-b791-5b2aed94bbab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/myftp-ftp-like-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/myftp-ftp-like-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,myftp-ftp-like-plugin-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/myftp-ftp-like-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myftp-ftp-like-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mygallery-0f137418131077a44fc4f4b8e86a7c26.yaml b/nuclei-templates/cve-less/plugins/mygallery-0f137418131077a44fc4f4b8e86a7c26.yaml new file mode 100644 index 0000000000..f3e82944c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mygallery-0f137418131077a44fc4f4b8e86a7c26.yaml @@ -0,0 +1,58 @@ +id: mygallery-0f137418131077a44fc4f4b8e86a7c26 + +info: + name: > + MySliderGallery <= 1.2.1 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d996df9-3d61-4b2b-8d74-4faa7c5a151a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mygallery/" + google-query: inurl:"/wp-content/plugins/mygallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mygallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mygallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mygallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mylinksdump-b448ff8f0ebed30bebafe7474f10c89b.yaml b/nuclei-templates/cve-less/plugins/mylinksdump-b448ff8f0ebed30bebafe7474f10c89b.yaml new file mode 100644 index 0000000000..1de521f9f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mylinksdump-b448ff8f0ebed30bebafe7474f10c89b.yaml @@ -0,0 +1,58 @@ +id: mylinksdump-b448ff8f0ebed30bebafe7474f10c89b + +info: + name: > + myLinksDump <= 1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1cdd6c6-f354-48d6-9493-08c67aaef9bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mylinksdump/" + google-query: inurl:"/wp-content/plugins/mylinksdump/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mylinksdump,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mylinksdump/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mylinksdump" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mypixs-c9480dcffb0b0878eee13c8e8528a0b7.yaml b/nuclei-templates/cve-less/plugins/mypixs-c9480dcffb0b0878eee13c8e8528a0b7.yaml new file mode 100644 index 0000000000..8e9e844b43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mypixs-c9480dcffb0b0878eee13c8e8528a0b7.yaml @@ -0,0 +1,58 @@ +id: mypixs-c9480dcffb0b0878eee13c8e8528a0b7 + +info: + name: > + MyPixs <= 0.3 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5413ae2a-9afa-4ff6-b241-73b446881185?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mypixs/" + google-query: inurl:"/wp-content/plugins/mypixs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mypixs,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mypixs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mypixs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/myshopkit-popup-smartbar-slidein-f56eab4e1dba033d85ad3e26044b8e2f.yaml b/nuclei-templates/cve-less/plugins/myshopkit-popup-smartbar-slidein-f56eab4e1dba033d85ad3e26044b8e2f.yaml new file mode 100644 index 0000000000..8ca1ff1650 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/myshopkit-popup-smartbar-slidein-f56eab4e1dba033d85ad3e26044b8e2f.yaml @@ -0,0 +1,58 @@ +id: myshopkit-popup-smartbar-slidein-f56eab4e1dba033d85ad3e26044b8e2f + +info: + name: > + WooCommerce Coupon Popup, SmartBar, Slide In | MyShopKit <= 1.0.9 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bd3e797-5e31-4f54-a28f-2525fb5e367e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/myshopkit-popup-smartbar-slidein/" + google-query: inurl:"/wp-content/plugins/myshopkit-popup-smartbar-slidein/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,myshopkit-popup-smartbar-slidein,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/myshopkit-popup-smartbar-slidein/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myshopkit-popup-smartbar-slidein" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mystickyelements-3f6feeb32fb2210c6becc1260135473a.yaml b/nuclei-templates/cve-less/plugins/mystickyelements-3f6feeb32fb2210c6becc1260135473a.yaml new file mode 100644 index 0000000000..3b0f14c095 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mystickyelements-3f6feeb32fb2210c6becc1260135473a.yaml @@ -0,0 +1,58 @@ +id: mystickyelements-3f6feeb32fb2210c6becc1260135473a + +info: + name: > + All-in-one Floating Contact Form <= 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f4d57e4-1b82-45bb-9824-b7b2eaa73b6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mystickyelements/" + google-query: inurl:"/wp-content/plugins/mystickyelements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mystickyelements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mystickyelements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mystickyelements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mystickyelements-54afcc25e30c13f6fd81531108a460de.yaml b/nuclei-templates/cve-less/plugins/mystickyelements-54afcc25e30c13f6fd81531108a460de.yaml new file mode 100644 index 0000000000..cba44ae618 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mystickyelements-54afcc25e30c13f6fd81531108a460de.yaml @@ -0,0 +1,58 @@ +id: mystickyelements-54afcc25e30c13f6fd81531108a460de + +info: + name: > + All-in-one Floating Contact Form <= 2.1.1 - Authenticated(Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52538617-a1d1-40ed-8321-e39d06869398?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mystickyelements/" + google-query: inurl:"/wp-content/plugins/mystickyelements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mystickyelements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mystickyelements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mystickyelements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mystickyelements-b8cf7f35198731bb7bfb27771c37478a.yaml b/nuclei-templates/cve-less/plugins/mystickyelements-b8cf7f35198731bb7bfb27771c37478a.yaml new file mode 100644 index 0000000000..82e29dbe88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mystickyelements-b8cf7f35198731bb7bfb27771c37478a.yaml @@ -0,0 +1,58 @@ +id: mystickyelements-b8cf7f35198731bb7bfb27771c37478a + +info: + name: > + All-in-one Floating Contact Form – My Sticky Elements <= 2.1.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4098a47-986c-4b2c-b27a-18ff81da0f58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mystickyelements/" + google-query: inurl:"/wp-content/plugins/mystickyelements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mystickyelements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mystickyelements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mystickyelements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mystickyelements-fd075b6c9853246b5cc33cafcab17a0c.yaml b/nuclei-templates/cve-less/plugins/mystickyelements-fd075b6c9853246b5cc33cafcab17a0c.yaml new file mode 100644 index 0000000000..a77fc0e8da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mystickyelements-fd075b6c9853246b5cc33cafcab17a0c.yaml @@ -0,0 +1,58 @@ +id: mystickyelements-fd075b6c9853246b5cc33cafcab17a0c + +info: + name: > + My Sticky Elements <= 2.0.8 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b1933a5-48f3-4707-8e3d-824b60ce2635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mystickyelements/" + google-query: inurl:"/wp-content/plugins/mystickyelements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mystickyelements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mystickyelements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mystickyelements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mystickymenu-06b7c4127350d50d75ab6e5a40c02f95.yaml b/nuclei-templates/cve-less/plugins/mystickymenu-06b7c4127350d50d75ab6e5a40c02f95.yaml new file mode 100644 index 0000000000..f57cf0a614 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mystickymenu-06b7c4127350d50d75ab6e5a40c02f95.yaml @@ -0,0 +1,58 @@ +id: mystickymenu-06b7c4127350d50d75ab6e5a40c02f95 + +info: + name: > + My Sticky Bar <= 2.6.6 - Cross-Site Request Forgery to Sensitive Information Exposure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be0ab40f-cff7-48bd-8dae-cc50af047151?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mystickymenu/" + google-query: inurl:"/wp-content/plugins/mystickymenu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mystickymenu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mystickymenu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mystickymenu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mystickymenu-49cfc8c3d99725c4ecb38a0e0b05420f.yaml b/nuclei-templates/cve-less/plugins/mystickymenu-49cfc8c3d99725c4ecb38a0e0b05420f.yaml new file mode 100644 index 0000000000..21b9ea84bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mystickymenu-49cfc8c3d99725c4ecb38a0e0b05420f.yaml @@ -0,0 +1,58 @@ +id: mystickymenu-49cfc8c3d99725c4ecb38a0e0b05420f + +info: + name: > + myStickymenu <= 2.5.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d432ea5-9ffd-43da-8988-6dd77b907655?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mystickymenu/" + google-query: inurl:"/wp-content/plugins/mystickymenu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mystickymenu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mystickymenu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mystickymenu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mystickymenu-b9ee2994c48a1ce98dffc9faf5d855b8.yaml b/nuclei-templates/cve-less/plugins/mystickymenu-b9ee2994c48a1ce98dffc9faf5d855b8.yaml new file mode 100644 index 0000000000..b348fcf570 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mystickymenu-b9ee2994c48a1ce98dffc9faf5d855b8.yaml @@ -0,0 +1,58 @@ +id: mystickymenu-b9ee2994c48a1ce98dffc9faf5d855b8 + +info: + name: > + myStickymenu <= 2.6.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Form Lead Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/102bab51-2dc7-4013-8273-21e2ff6cdf79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mystickymenu/" + google-query: inurl:"/wp-content/plugins/mystickymenu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mystickymenu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mystickymenu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mystickymenu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mytreasures-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/mytreasures-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..59f38871cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mytreasures-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: mytreasures-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mytreasures/" + google-query: inurl:"/wp-content/plugins/mytreasures/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mytreasures,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mytreasures/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mytreasures" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mytube-8753e5a555a2f3121491c204c567f453.yaml b/nuclei-templates/cve-less/plugins/mytube-8753e5a555a2f3121491c204c567f453.yaml new file mode 100644 index 0000000000..3c5114428c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mytube-8753e5a555a2f3121491c204c567f453.yaml @@ -0,0 +1,58 @@ +id: mytube-8753e5a555a2f3121491c204c567f453 + +info: + name: > + MyTube PlayList <= 2.0.3 - Reflected Cross-Site Scripting via addplaylistid + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/523cfed4-0422-40f3-8d81-d7862bcb1792?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mytube/" + google-query: inurl:"/wp-content/plugins/mytube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mytube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mytube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mytube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mywebcounter-f47f5c28d52d4abd78cd616aff6e460a.yaml b/nuclei-templates/cve-less/plugins/mywebcounter-f47f5c28d52d4abd78cd616aff6e460a.yaml new file mode 100644 index 0000000000..e6fc4ede2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mywebcounter-f47f5c28d52d4abd78cd616aff6e460a.yaml @@ -0,0 +1,58 @@ +id: mywebcounter-f47f5c28d52d4abd78cd616aff6e460a + +info: + name: > + mywebcounter <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5734bd3b-b1cd-4376-b481-a9ad120016f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mywebcounter/" + google-query: inurl:"/wp-content/plugins/mywebcounter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mywebcounter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mywebcounter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mywebcounter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/mz-mindbody-api-fdae69d4ebb419ff6e97487d1fa22ced.yaml b/nuclei-templates/cve-less/plugins/mz-mindbody-api-fdae69d4ebb419ff6e97487d1fa22ced.yaml new file mode 100644 index 0000000000..0ee78a4e38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/mz-mindbody-api-fdae69d4ebb419ff6e97487d1fa22ced.yaml @@ -0,0 +1,58 @@ +id: mz-mindbody-api-fdae69d4ebb419ff6e97487d1fa22ced + +info: + name: > + MZ Mindbody API <= 2.8.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8f30220-4f6e-458b-a053-8d8277150237?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mz-mindbody-api/" + google-query: inurl:"/wp-content/plugins/mz-mindbody-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mz-mindbody-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mz-mindbody-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mz-mindbody-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/n-media-woocommerce-checkout-fields-164dd8ebbb83252d5e62c236087e083c.yaml b/nuclei-templates/cve-less/plugins/n-media-woocommerce-checkout-fields-164dd8ebbb83252d5e62c236087e083c.yaml new file mode 100644 index 0000000000..5d51a6f188 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/n-media-woocommerce-checkout-fields-164dd8ebbb83252d5e62c236087e083c.yaml @@ -0,0 +1,58 @@ +id: n-media-woocommerce-checkout-fields-164dd8ebbb83252d5e62c236087e083c + +info: + name: > + WooCommerce Checkout Field Manager <= 17.3 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9be94d63-f027-4988-ab41-673658c1fa5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/n-media-woocommerce-checkout-fields/" + google-query: inurl:"/wp-content/plugins/n-media-woocommerce-checkout-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,n-media-woocommerce-checkout-fields,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/n-media-woocommerce-checkout-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "n-media-woocommerce-checkout-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/n-media-wp-simple-quiz-6d6529e910b656256c67d994d60b2a51.yaml b/nuclei-templates/cve-less/plugins/n-media-wp-simple-quiz-6d6529e910b656256c67d994d60b2a51.yaml new file mode 100644 index 0000000000..6fd76d594a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/n-media-wp-simple-quiz-6d6529e910b656256c67d994d60b2a51.yaml @@ -0,0 +1,58 @@ +id: n-media-wp-simple-quiz-6d6529e910b656256c67d994d60b2a51 + +info: + name: > + Easy Quiz Maker <= 1.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8566a5ad-df8a-4843-82c9-05da9d44582d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/n-media-wp-simple-quiz/" + google-query: inurl:"/wp-content/plugins/n-media-wp-simple-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,n-media-wp-simple-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/n-media-wp-simple-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "n-media-wp-simple-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/n5-uploadform-b56cc1f81e44553ad5837ff3f3a482ce.yaml b/nuclei-templates/cve-less/plugins/n5-uploadform-b56cc1f81e44553ad5837ff3f3a482ce.yaml new file mode 100644 index 0000000000..f02436613b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/n5-uploadform-b56cc1f81e44553ad5837ff3f3a482ce.yaml @@ -0,0 +1,58 @@ +id: n5-uploadform-b56cc1f81e44553ad5837ff3f3a482ce + +info: + name: > + N5 Upload Form <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/121afcc4-754c-4f4b-8b02-9b5a4a248041?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/n5-uploadform/" + google-query: inurl:"/wp-content/plugins/n5-uploadform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,n5-uploadform,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/n5-uploadform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "n5-uploadform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/namaste-lms-03657cd383df53489c98f2c2003d74b0.yaml b/nuclei-templates/cve-less/plugins/namaste-lms-03657cd383df53489c98f2c2003d74b0.yaml new file mode 100644 index 0000000000..4ed7ddd442 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/namaste-lms-03657cd383df53489c98f2c2003d74b0.yaml @@ -0,0 +1,58 @@ +id: namaste-lms-03657cd383df53489c98f2c2003d74b0 + +info: + name: > + Namaste! LMS <= 2.5.9.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90c1fd9c-eb5c-45fb-b641-75cb3fdad87a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/namaste-lms/" + google-query: inurl:"/wp-content/plugins/namaste-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,namaste-lms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/namaste-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "namaste-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/namaste-lms-04f146ec33992e5efff05a0bd40f659f.yaml b/nuclei-templates/cve-less/plugins/namaste-lms-04f146ec33992e5efff05a0bd40f659f.yaml new file mode 100644 index 0000000000..342e256631 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/namaste-lms-04f146ec33992e5efff05a0bd40f659f.yaml @@ -0,0 +1,58 @@ +id: namaste-lms-04f146ec33992e5efff05a0bd40f659f + +info: + name: > + Namaste! LMS <= 2.5.9.9 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'accept_other_payment_methods', 'other_payment_methods' Parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ef23b03-8452-4730-860c-2c2ef1686202?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/namaste-lms/" + google-query: inurl:"/wp-content/plugins/namaste-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,namaste-lms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/namaste-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "namaste-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/namaste-lms-243f75a6da65f6edc93ed6a1b9eaec80.yaml b/nuclei-templates/cve-less/plugins/namaste-lms-243f75a6da65f6edc93ed6a1b9eaec80.yaml new file mode 100644 index 0000000000..f1d893a528 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/namaste-lms-243f75a6da65f6edc93ed6a1b9eaec80.yaml @@ -0,0 +1,58 @@ +id: namaste-lms-243f75a6da65f6edc93ed6a1b9eaec80 + +info: + name: > + Namaste! LMS <= 2.5.9.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5256a249-b355-480d-a532-5931e4dea481?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/namaste-lms/" + google-query: inurl:"/wp-content/plugins/namaste-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,namaste-lms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/namaste-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "namaste-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/namaste-lms-396a46e2d061c4863ac25c94e4ca15f5.yaml b/nuclei-templates/cve-less/plugins/namaste-lms-396a46e2d061c4863ac25c94e4ca15f5.yaml new file mode 100644 index 0000000000..101932468e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/namaste-lms-396a46e2d061c4863ac25c94e4ca15f5.yaml @@ -0,0 +1,58 @@ +id: namaste-lms-396a46e2d061c4863ac25c94e4ca15f5 + +info: + name: > + Namaste! LMS <= 2.6.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d014f512-9030-49ce-945d-4900594fb373?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/namaste-lms/" + google-query: inurl:"/wp-content/plugins/namaste-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,namaste-lms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/namaste-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "namaste-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/name-directory-27463f760012793e1526cf6e69e5e624.yaml b/nuclei-templates/cve-less/plugins/name-directory-27463f760012793e1526cf6e69e5e624.yaml new file mode 100644 index 0000000000..bf6f7d1d18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/name-directory-27463f760012793e1526cf6e69e5e624.yaml @@ -0,0 +1,58 @@ +id: name-directory-27463f760012793e1526cf6e69e5e624 + +info: + name: > + Name Directory <= 1.25.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d9077cf-10cc-47cd-aca8-8f2110ccc407?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/name-directory/" + google-query: inurl:"/wp-content/plugins/name-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,name-directory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/name-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "name-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/name-directory-28d57d2682124a0a2b82184f75d0b682.yaml b/nuclei-templates/cve-less/plugins/name-directory-28d57d2682124a0a2b82184f75d0b682.yaml new file mode 100644 index 0000000000..88f3d55bab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/name-directory-28d57d2682124a0a2b82184f75d0b682.yaml @@ -0,0 +1,58 @@ +id: name-directory-28d57d2682124a0a2b82184f75d0b682 + +info: + name: > + Name Directory <= 1.25.4 - Unauthorized Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a57675f0-d840-4954-b86e-a9fbc1483bc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/name-directory/" + google-query: inurl:"/wp-content/plugins/name-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,name-directory,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/name-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "name-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/name-directory-6c06bc58e8c431cd39158598c7d3df3c.yaml b/nuclei-templates/cve-less/plugins/name-directory-6c06bc58e8c431cd39158598c7d3df3c.yaml new file mode 100644 index 0000000000..3a114bbe41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/name-directory-6c06bc58e8c431cd39158598c7d3df3c.yaml @@ -0,0 +1,58 @@ +id: name-directory-6c06bc58e8c431cd39158598c7d3df3c + +info: + name: > + Name Directory <= 1.25.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53ab1f5f-7331-4587-8c37-e9bd86a83ae6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/name-directory/" + google-query: inurl:"/wp-content/plugins/name-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,name-directory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/name-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "name-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/name-directory-e5ace19f8910dfb41dd382bdef641807.yaml b/nuclei-templates/cve-less/plugins/name-directory-e5ace19f8910dfb41dd382bdef641807.yaml new file mode 100644 index 0000000000..f09c08f009 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/name-directory-e5ace19f8910dfb41dd382bdef641807.yaml @@ -0,0 +1,58 @@ +id: name-directory-e5ace19f8910dfb41dd382bdef641807 + +info: + name: > + Name Directory <= 1.17.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e18aba51-46a8-4670-8e15-85b12f5d06e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/name-directory/" + google-query: inurl:"/wp-content/plugins/name-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,name-directory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/name-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "name-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/name-directory-ecb3bc304462f6f56763ded084ead34f.yaml b/nuclei-templates/cve-less/plugins/name-directory-ecb3bc304462f6f56763ded084ead34f.yaml new file mode 100644 index 0000000000..404b7bc400 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/name-directory-ecb3bc304462f6f56763ded084ead34f.yaml @@ -0,0 +1,58 @@ +id: name-directory-ecb3bc304462f6f56763ded084ead34f + +info: + name: > + Name Directory <= 1.27.1 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9481bd2-a8fa-43b3-bfd2-a9a51f528ebf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/name-directory/" + google-query: inurl:"/wp-content/plugins/name-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,name-directory,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/name-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "name-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.27.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/narnoo-distributor-19e99a4dcb048b9a78de389a4596a1c2.yaml b/nuclei-templates/cve-less/plugins/narnoo-distributor-19e99a4dcb048b9a78de389a4596a1c2.yaml new file mode 100644 index 0000000000..45c6c2a03b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/narnoo-distributor-19e99a4dcb048b9a78de389a4596a1c2.yaml @@ -0,0 +1,58 @@ +id: narnoo-distributor-19e99a4dcb048b9a78de389a4596a1c2 + +info: + name: > + Narnoo Distributor <= 2.5.1 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc860f44-c8ee-4b32-9702-7214e213790b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/narnoo-distributor/" + google-query: inurl:"/wp-content/plugins/narnoo-distributor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,narnoo-distributor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/narnoo-distributor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "narnoo-distributor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/naver-map-f4ee020375ee3d79fbe799a7df61d461.yaml b/nuclei-templates/cve-less/plugins/naver-map-f4ee020375ee3d79fbe799a7df61d461.yaml new file mode 100644 index 0000000000..f5e20558f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/naver-map-f4ee020375ee3d79fbe799a7df61d461.yaml @@ -0,0 +1,58 @@ +id: naver-map-f4ee020375ee3d79fbe799a7df61d461 + +info: + name: > + Naver Map <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f05b58a-3cab-4069-ae9e-fec82bb5cd47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/naver-map/" + google-query: inurl:"/wp-content/plugins/naver-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,naver-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/naver-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "naver-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/navigation-menu-as-dropdown-widget-25e251a3406c9b35d33175212bd58aef.yaml b/nuclei-templates/cve-less/plugins/navigation-menu-as-dropdown-widget-25e251a3406c9b35d33175212bd58aef.yaml new file mode 100644 index 0000000000..ca7460b462 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/navigation-menu-as-dropdown-widget-25e251a3406c9b35d33175212bd58aef.yaml @@ -0,0 +1,58 @@ +id: navigation-menu-as-dropdown-widget-25e251a3406c9b35d33175212bd58aef + +info: + name: > + Navigation menu as Dropdown Widget <= 1.3.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36123fad-448e-4fdb-a076-5280b53d9671?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/navigation-menu-as-dropdown-widget/" + google-query: inurl:"/wp-content/plugins/navigation-menu-as-dropdown-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,navigation-menu-as-dropdown-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/navigation-menu-as-dropdown-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "navigation-menu-as-dropdown-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/navis-documentcloud-501b82dc590b97d863184cfb9756e9ee.yaml b/nuclei-templates/cve-less/plugins/navis-documentcloud-501b82dc590b97d863184cfb9756e9ee.yaml new file mode 100644 index 0000000000..0785c45c63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/navis-documentcloud-501b82dc590b97d863184cfb9756e9ee.yaml @@ -0,0 +1,58 @@ +id: navis-documentcloud-501b82dc590b97d863184cfb9756e9ee + +info: + name: > + Navis DocumentCloud < 0.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d6affb6-bbc1-40aa-8633-ba0f06c10fe1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/navis-documentcloud/" + google-query: inurl:"/wp-content/plugins/navis-documentcloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,navis-documentcloud,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/navis-documentcloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "navis-documentcloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/navz-photo-gallery-0668c2487ce2c4fa1850c723426ba86a.yaml b/nuclei-templates/cve-less/plugins/navz-photo-gallery-0668c2487ce2c4fa1850c723426ba86a.yaml new file mode 100644 index 0000000000..aab00d3d31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/navz-photo-gallery-0668c2487ce2c4fa1850c723426ba86a.yaml @@ -0,0 +1,58 @@ +id: navz-photo-gallery-0668c2487ce2c4fa1850c723426ba86a + +info: + name: > + ACF Photo Gallery Field <= 1.7.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6c4e102-7a09-4a01-8fa2-40f5f41d45ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/navz-photo-gallery/" + google-query: inurl:"/wp-content/plugins/navz-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,navz-photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/navz-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "navz-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/navz-photo-gallery-54c49ed92754fe9b72ea28cef486ac0b.yaml b/nuclei-templates/cve-less/plugins/navz-photo-gallery-54c49ed92754fe9b72ea28cef486ac0b.yaml new file mode 100644 index 0000000000..ba6e1743b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/navz-photo-gallery-54c49ed92754fe9b72ea28cef486ac0b.yaml @@ -0,0 +1,58 @@ +id: navz-photo-gallery-54c49ed92754fe9b72ea28cef486ac0b + +info: + name: > + ACF Photo Gallery Field <= 1.9 - Authenticated (Subscriber+) Arbitrary Usermeta Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/689511e0-1355-4fcb-8a72-d819abc8e9a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/navz-photo-gallery/" + google-query: inurl:"/wp-content/plugins/navz-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,navz-photo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/navz-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "navz-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/navz-photo-gallery-ac40665ad4ef3b69656a095a1b2358ab.yaml b/nuclei-templates/cve-less/plugins/navz-photo-gallery-ac40665ad4ef3b69656a095a1b2358ab.yaml new file mode 100644 index 0000000000..0200bb4bbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/navz-photo-gallery-ac40665ad4ef3b69656a095a1b2358ab.yaml @@ -0,0 +1,58 @@ +id: navz-photo-gallery-ac40665ad4ef3b69656a095a1b2358ab + +info: + name: > + ACF Photo Gallery Field <= 2.6 - Missing Authorization in apgf_update_donation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f557ddf1-cee3-498c-87bc-fa81bf574591?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/navz-photo-gallery/" + google-query: inurl:"/wp-content/plugins/navz-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,navz-photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/navz-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "navz-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-booking-164126146e9a645f77469a8e4602aa76.yaml b/nuclei-templates/cve-less/plugins/nd-booking-164126146e9a645f77469a8e4602aa76.yaml new file mode 100644 index 0000000000..dd60856050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-booking-164126146e9a645f77469a8e4602aa76.yaml @@ -0,0 +1,58 @@ +id: nd-booking-164126146e9a645f77469a8e4602aa76 + +info: + name: > + Hotel Booking < 3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eebc0318-8db3-44b4-ac04-d246db3a10ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-booking/" + google-query: inurl:"/wp-content/plugins/nd-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-booking-f38cba339dfbcce8dc24128ae403c983.yaml b/nuclei-templates/cve-less/plugins/nd-booking-f38cba339dfbcce8dc24128ae403c983.yaml new file mode 100644 index 0000000000..cb0f559b5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-booking-f38cba339dfbcce8dc24128ae403c983.yaml @@ -0,0 +1,58 @@ +id: nd-booking-f38cba339dfbcce8dc24128ae403c983 + +info: + name: > + ND Booking <= 2.4 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b776a8a-b071-4caf-9e67-6f08ace4da2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-booking/" + google-query: inurl:"/wp-content/plugins/nd-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-donations-49fd6b403c3ae46f361045d570a15196.yaml b/nuclei-templates/cve-less/plugins/nd-donations-49fd6b403c3ae46f361045d570a15196.yaml new file mode 100644 index 0000000000..f2af7b5892 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-donations-49fd6b403c3ae46f361045d570a15196.yaml @@ -0,0 +1,58 @@ +id: nd-donations-49fd6b403c3ae46f361045d570a15196 + +info: + name: > + Donations < 1.4 - Unauthenticated Arbitrary Options Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b7ca272-88ac-4002-b4ce-73ad5d0510ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-donations/" + google-query: inurl:"/wp-content/plugins/nd-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-donations,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-donations-7af5a8d75570b9733bf6f036d3311f98.yaml b/nuclei-templates/cve-less/plugins/nd-donations-7af5a8d75570b9733bf6f036d3311f98.yaml new file mode 100644 index 0000000000..b5a55d7fd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-donations-7af5a8d75570b9733bf6f036d3311f98.yaml @@ -0,0 +1,58 @@ +id: nd-donations-7af5a8d75570b9733bf6f036d3311f98 + +info: + name: > + Donations <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71df1c9a-b4fa-47c7-93c7-f2cb09fad3ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-donations/" + google-query: inurl:"/wp-content/plugins/nd-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-donations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-donations-a1415a905803c20c67ca5fc03367ae55.yaml b/nuclei-templates/cve-less/plugins/nd-donations-a1415a905803c20c67ca5fc03367ae55.yaml new file mode 100644 index 0000000000..800fe50ecd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-donations-a1415a905803c20c67ca5fc03367ae55.yaml @@ -0,0 +1,58 @@ +id: nd-donations-a1415a905803c20c67ca5fc03367ae55 + +info: + name: > + Donations <= 1.8 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/601e52b6-36eb-4739-9b04-db779befa899?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-donations/" + google-query: inurl:"/wp-content/plugins/nd-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-donations,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-elements-ef9b3c704d7fced594c5120e1a6fbd70.yaml b/nuclei-templates/cve-less/plugins/nd-elements-ef9b3c704d7fced594c5120e1a6fbd70.yaml new file mode 100644 index 0000000000..ec1399fa6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-elements-ef9b3c704d7fced594c5120e1a6fbd70.yaml @@ -0,0 +1,58 @@ +id: nd-elements-ef9b3c704d7fced594c5120e1a6fbd70 + +info: + name: > + Elements For Elementor <= 1.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/231dbf87-2e17-4b4b-9eac-34a8b4a791ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-elements/" + google-query: inurl:"/wp-content/plugins/nd-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-learning-a63938534e67d796e6484c84d1211d1e.yaml b/nuclei-templates/cve-less/plugins/nd-learning-a63938534e67d796e6484c84d1211d1e.yaml new file mode 100644 index 0000000000..c2b9948f41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-learning-a63938534e67d796e6484c84d1211d1e.yaml @@ -0,0 +1,58 @@ +id: nd-learning-a63938534e67d796e6484c84d1211d1e + +info: + name: > + Learning Courses < 5.0 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bc9f86f-fd60-48bc-8df0-3b122facb0a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-learning/" + google-query: inurl:"/wp-content/plugins/nd-learning/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-learning,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-learning/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-learning" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-learning-f7e07f423bc8c5880015a851a060fbc6.yaml b/nuclei-templates/cve-less/plugins/nd-learning-f7e07f423bc8c5880015a851a060fbc6.yaml new file mode 100644 index 0000000000..94c1ce9a63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-learning-f7e07f423bc8c5880015a851a060fbc6.yaml @@ -0,0 +1,58 @@ +id: nd-learning-f7e07f423bc8c5880015a851a060fbc6 + +info: + name: > + ND Learning <= 4.7 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d68841f1-f3f2-45e7-8a4f-d2d65624b617?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-learning/" + google-query: inurl:"/wp-content/plugins/nd-learning/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-learning,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-learning/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-learning" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-projects-2f7ae6b5d7fdabeafa201dc90bcb50c1.yaml b/nuclei-templates/cve-less/plugins/nd-projects-2f7ae6b5d7fdabeafa201dc90bcb50c1.yaml new file mode 100644 index 0000000000..af1fb8ae5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-projects-2f7ae6b5d7fdabeafa201dc90bcb50c1.yaml @@ -0,0 +1,58 @@ +id: nd-projects-2f7ae6b5d7fdabeafa201dc90bcb50c1 + +info: + name: > + Cost Calculator <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/750be90d-dc12-4974-8921-75259d56c7b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-projects/" + google-query: inurl:"/wp-content/plugins/nd-projects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-projects,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-projects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-projects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-projects-a663013695ba225f715bd4ecd0b647ba.yaml b/nuclei-templates/cve-less/plugins/nd-projects-a663013695ba225f715bd4ecd0b647ba.yaml new file mode 100644 index 0000000000..5094a7c1bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-projects-a663013695ba225f715bd4ecd0b647ba.yaml @@ -0,0 +1,58 @@ +id: nd-projects-a663013695ba225f715bd4ecd0b647ba + +info: + name: > + Cost Calculator <= 1.5 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7759d119-503f-4097-83ba-6c469276450d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-projects/" + google-query: inurl:"/wp-content/plugins/nd-projects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-projects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-projects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-projects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-projects-e82bd49c08eee13d3a8a750e759d2e98.yaml b/nuclei-templates/cve-less/plugins/nd-projects-e82bd49c08eee13d3a8a750e759d2e98.yaml new file mode 100644 index 0000000000..af96038755 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-projects-e82bd49c08eee13d3a8a750e759d2e98.yaml @@ -0,0 +1,58 @@ +id: nd-projects-e82bd49c08eee13d3a8a750e759d2e98 + +info: + name: > + Cost Calculator <= 1.8 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5277e25-d923-4553-9371-192d4cf4389a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-projects/" + google-query: inurl:"/wp-content/plugins/nd-projects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-projects,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-projects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-projects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-projects-f3802a1bd27cc43cf9c93101d4cbaed4.yaml b/nuclei-templates/cve-less/plugins/nd-projects-f3802a1bd27cc43cf9c93101d4cbaed4.yaml new file mode 100644 index 0000000000..887dae7357 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-projects-f3802a1bd27cc43cf9c93101d4cbaed4.yaml @@ -0,0 +1,58 @@ +id: nd-projects-f3802a1bd27cc43cf9c93101d4cbaed4 + +info: + name: > + Cost Calculator <= 1.8 - Authenticated Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f21139b-75ef-4631-b88d-23eebbdefee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-projects/" + google-query: inurl:"/wp-content/plugins/nd-projects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-projects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-projects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-projects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-05197d15c6555c370c0aabb516e1a176.yaml b/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-05197d15c6555c370c0aabb516e1a176.yaml new file mode 100644 index 0000000000..cd218012a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-05197d15c6555c370c0aabb516e1a176.yaml @@ -0,0 +1,58 @@ +id: nd-restaurant-reservations-05197d15c6555c370c0aabb516e1a176 + +info: + name: > + ND Restaurant Reservations <= 1.3 - Options Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1aac7677-53f4-4944-9bdc-7e07b09c6c13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/nd-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-restaurant-reservations,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-8665b291868b7068ace3fa9c23d3b9d6.yaml b/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-8665b291868b7068ace3fa9c23d3b9d6.yaml new file mode 100644 index 0000000000..0441dc7f81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-8665b291868b7068ace3fa9c23d3b9d6.yaml @@ -0,0 +1,58 @@ +id: nd-restaurant-reservations-8665b291868b7068ace3fa9c23d3b9d6 + +info: + name: > + Restaurant Reservations <= 1.9 - Directory Traversal to Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d51db160-c701-426d-890f-73cc4785cad8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/nd-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-restaurant-reservations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-bb149be73e11ebe0c3b568543b54c91e.yaml b/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-bb149be73e11ebe0c3b568543b54c91e.yaml new file mode 100644 index 0000000000..31fdde95cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-bb149be73e11ebe0c3b568543b54c91e.yaml @@ -0,0 +1,58 @@ +id: nd-restaurant-reservations-bb149be73e11ebe0c3b568543b54c91e + +info: + name: > + Restaurant Reservations <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4fa8aa9-0af8-4202-b219-863bbef8d02c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/nd-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-restaurant-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-e721e32fa48eebd873371f94b4b26240.yaml b/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-e721e32fa48eebd873371f94b4b26240.yaml new file mode 100644 index 0000000000..4136e0106b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-restaurant-reservations-e721e32fa48eebd873371f94b4b26240.yaml @@ -0,0 +1,58 @@ +id: nd-restaurant-reservations-e721e32fa48eebd873371f94b4b26240 + +info: + name: > + Restaurant Reservations <= 1.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/635e02a8-42f3-4098-aa3e-839099f40bfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/nd-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-restaurant-reservations,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-shortcodes-2430a9c1ac485d43602ad90dc9748594.yaml b/nuclei-templates/cve-less/plugins/nd-shortcodes-2430a9c1ac485d43602ad90dc9748594.yaml new file mode 100644 index 0000000000..65a0e1a0d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-shortcodes-2430a9c1ac485d43602ad90dc9748594.yaml @@ -0,0 +1,58 @@ +id: nd-shortcodes-2430a9c1ac485d43602ad90dc9748594 + +info: + name: > + ND Shortcodes <= 5.9.1 - Unauthenticated WordPress Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/657226b4-db55-4859-8f38-65b4ace11f4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-shortcodes/" + google-query: inurl:"/wp-content/plugins/nd-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-shortcodes,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-shortcodes-ac14ec5ad7742e553d78dac3325ff055.yaml b/nuclei-templates/cve-less/plugins/nd-shortcodes-ac14ec5ad7742e553d78dac3325ff055.yaml new file mode 100644 index 0000000000..a55c97b814 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-shortcodes-ac14ec5ad7742e553d78dac3325ff055.yaml @@ -0,0 +1,58 @@ +id: nd-shortcodes-ac14ec5ad7742e553d78dac3325ff055 + +info: + name: > + ND Shortcodes <= 6.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/037882e8-4d66-47b9-8ca5-3fa3866b9125?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-shortcodes/" + google-query: inurl:"/wp-content/plugins/nd-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-shortcodes-bce590a02f073327d2ec7a566a982db1.yaml b/nuclei-templates/cve-less/plugins/nd-shortcodes-bce590a02f073327d2ec7a566a982db1.yaml new file mode 100644 index 0000000000..b300fa4c67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-shortcodes-bce590a02f073327d2ec7a566a982db1.yaml @@ -0,0 +1,58 @@ +id: nd-shortcodes-bce590a02f073327d2ec7a566a982db1 + +info: + name: > + ND Shortcodes <= 6.9 - Authenticated (Subscriber+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b9bd42f-cb24-483a-ae91-add4378067d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-shortcodes/" + google-query: inurl:"/wp-content/plugins/nd-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-shortcodes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-shortcodes-fada6798d03eaae704cdbb04f45c1dff.yaml b/nuclei-templates/cve-less/plugins/nd-shortcodes-fada6798d03eaae704cdbb04f45c1dff.yaml new file mode 100644 index 0000000000..cb72886bd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-shortcodes-fada6798d03eaae704cdbb04f45c1dff.yaml @@ -0,0 +1,58 @@ +id: nd-shortcodes-fada6798d03eaae704cdbb04f45c1dff + +info: + name: > + ND Shortcodes <= 6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d92687e-cdf2-4dd2-b984-eaf9f0a56625?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-shortcodes/" + google-query: inurl:"/wp-content/plugins/nd-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-stats-for-envato-sales-by-item-48dc2938fe186fc758ec2763ee6f0d79.yaml b/nuclei-templates/cve-less/plugins/nd-stats-for-envato-sales-by-item-48dc2938fe186fc758ec2763ee6f0d79.yaml new file mode 100644 index 0000000000..daf7b14cc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-stats-for-envato-sales-by-item-48dc2938fe186fc758ec2763ee6f0d79.yaml @@ -0,0 +1,58 @@ +id: nd-stats-for-envato-sales-by-item-48dc2938fe186fc758ec2763ee6f0d79 + +info: + name: > + Envato Sales By Item <= 1.1 - Unauthenticated SQL Injection via AJAX call + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91c9fb05-e853-4d59-95ec-a0c2ff06565b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-stats-for-envato-sales-by-item/" + google-query: inurl:"/wp-content/plugins/nd-stats-for-envato-sales-by-item/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-stats-for-envato-sales-by-item,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-stats-for-envato-sales-by-item/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-stats-for-envato-sales-by-item" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-travel-c5fdeee544445401f76739cfd131940a.yaml b/nuclei-templates/cve-less/plugins/nd-travel-c5fdeee544445401f76739cfd131940a.yaml new file mode 100644 index 0000000000..b9063b4033 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-travel-c5fdeee544445401f76739cfd131940a.yaml @@ -0,0 +1,58 @@ +id: nd-travel-c5fdeee544445401f76739cfd131940a + +info: + name: > + Travel Management <= 1.6.1 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af0eae51-fb94-4e2e-a9a6-8ba323bb3314?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-travel/" + google-query: inurl:"/wp-content/plugins/nd-travel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-travel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-travel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-travel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nd-travel-c95f7d5b525da0435460cefad8d11b57.yaml b/nuclei-templates/cve-less/plugins/nd-travel-c95f7d5b525da0435460cefad8d11b57.yaml new file mode 100644 index 0000000000..f027100315 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nd-travel-c95f7d5b525da0435460cefad8d11b57.yaml @@ -0,0 +1,58 @@ +id: nd-travel-c95f7d5b525da0435460cefad8d11b57 + +info: + name: > + Travel Management <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4b89902-5616-443f-b67d-bf3330308ef9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nd-travel/" + google-query: inurl:"/wp-content/plugins/nd-travel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nd-travel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nd-travel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nd-travel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nelio-ab-testing-8f146e0beab27034b7dee531d37f0fa1.yaml b/nuclei-templates/cve-less/plugins/nelio-ab-testing-8f146e0beab27034b7dee531d37f0fa1.yaml new file mode 100644 index 0000000000..2174e1936b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nelio-ab-testing-8f146e0beab27034b7dee531d37f0fa1.yaml @@ -0,0 +1,58 @@ +id: nelio-ab-testing-8f146e0beab27034b7dee531d37f0fa1 + +info: + name: > + Nelio AB Testing < 4.5.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a65e820d-afb7-4e1c-b690-5948447af59a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nelio-ab-testing/" + google-query: inurl:"/wp-content/plugins/nelio-ab-testing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nelio-ab-testing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nelio-ab-testing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nelio-ab-testing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nelio-ab-testing-95c205c5aad798b5c2c90ddd330acabe.yaml b/nuclei-templates/cve-less/plugins/nelio-ab-testing-95c205c5aad798b5c2c90ddd330acabe.yaml new file mode 100644 index 0000000000..e12aae35c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nelio-ab-testing-95c205c5aad798b5c2c90ddd330acabe.yaml @@ -0,0 +1,58 @@ +id: nelio-ab-testing-95c205c5aad798b5c2c90ddd330acabe + +info: + name: > + Nelio AB Testing < 4.5.9 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b806e11-57ad-4976-9ece-419ad6581cc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nelio-ab-testing/" + google-query: inurl:"/wp-content/plugins/nelio-ab-testing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nelio-ab-testing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nelio-ab-testing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nelio-ab-testing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nelio-ab-testing-a591950f40f9d0373366c6581aa5c23f.yaml b/nuclei-templates/cve-less/plugins/nelio-ab-testing-a591950f40f9d0373366c6581aa5c23f.yaml new file mode 100644 index 0000000000..ccf1ca54ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nelio-ab-testing-a591950f40f9d0373366c6581aa5c23f.yaml @@ -0,0 +1,58 @@ +id: nelio-ab-testing-a591950f40f9d0373366c6581aa5c23f + +info: + name: > + Nelio AB Testing < 4.6.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28333161-9c76-4108-9256-9ffa91eaf818?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nelio-ab-testing/" + google-query: inurl:"/wp-content/plugins/nelio-ab-testing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nelio-ab-testing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nelio-ab-testing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nelio-ab-testing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nelio-ab-testing-aa0f13dbdb6bd3444462a2203b7bb2ad.yaml b/nuclei-templates/cve-less/plugins/nelio-ab-testing-aa0f13dbdb6bd3444462a2203b7bb2ad.yaml new file mode 100644 index 0000000000..3cc969333e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nelio-ab-testing-aa0f13dbdb6bd3444462a2203b7bb2ad.yaml @@ -0,0 +1,58 @@ +id: nelio-ab-testing-aa0f13dbdb6bd3444462a2203b7bb2ad + +info: + name: > + Nelio AB Testing < 4.5.11 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6077a093-b2ec-4491-a4a7-d70b2858d772?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nelio-ab-testing/" + google-query: inurl:"/wp-content/plugins/nelio-ab-testing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nelio-ab-testing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nelio-ab-testing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nelio-ab-testing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nelio-content-ca8f431f36e53f60c13e3a9b6d7eff7f.yaml b/nuclei-templates/cve-less/plugins/nelio-content-ca8f431f36e53f60c13e3a9b6d7eff7f.yaml new file mode 100644 index 0000000000..02feae4d73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nelio-content-ca8f431f36e53f60c13e3a9b6d7eff7f.yaml @@ -0,0 +1,58 @@ +id: nelio-content-ca8f431f36e53f60c13e3a9b6d7eff7f + +info: + name: > + Nelio Content <= 3.2.0 - Authenticated (Contributor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/150d9d64-6f7f-4646-b03f-dbc63fd0e791?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nelio-content/" + google-query: inurl:"/wp-content/plugins/nelio-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nelio-content,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nelio-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nelio-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/neon-text-f3d8bdcc3c7e14d05b34d12f8fc7e52b.yaml b/nuclei-templates/cve-less/plugins/neon-text-f3d8bdcc3c7e14d05b34d12f8fc7e52b.yaml new file mode 100644 index 0000000000..a1a8140fc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/neon-text-f3d8bdcc3c7e14d05b34d12f8fc7e52b.yaml @@ -0,0 +1,58 @@ +id: neon-text-f3d8bdcc3c7e14d05b34d12f8fc7e52b + +info: + name: > + Neon text <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9998485-e272-48fc-b2f1-9e30158d0d16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/neon-text/" + google-query: inurl:"/wp-content/plugins/neon-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,neon-text,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/neon-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "neon-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/neshan-maps-17731af892dc35dbe7d98abcc5958a1a.yaml b/nuclei-templates/cve-less/plugins/neshan-maps-17731af892dc35dbe7d98abcc5958a1a.yaml new file mode 100644 index 0000000000..b49399966e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/neshan-maps-17731af892dc35dbe7d98abcc5958a1a.yaml @@ -0,0 +1,58 @@ +id: neshan-maps-17731af892dc35dbe7d98abcc5958a1a + +info: + name: > + Neshan Maps <= 1.1.4 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee7eb754-27f0-47b0-a82f-4781cfbb0fa6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/neshan-maps/" + google-query: inurl:"/wp-content/plugins/neshan-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,neshan-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/neshan-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "neshan-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/netgsm-7d6fe2c9df245e2b7ef32caaf5683478.yaml b/nuclei-templates/cve-less/plugins/netgsm-7d6fe2c9df245e2b7ef32caaf5683478.yaml new file mode 100644 index 0000000000..83b4ba0a1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/netgsm-7d6fe2c9df245e2b7ef32caaf5683478.yaml @@ -0,0 +1,58 @@ +id: netgsm-7d6fe2c9df245e2b7ef32caaf5683478 + +info: + name: > + Netgsm <= 2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3b07f91-c96a-49a5-8ffc-90f34d93aa91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/netgsm/" + google-query: inurl:"/wp-content/plugins/netgsm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,netgsm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/netgsm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "netgsm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/netreviews-569c4e32e955a5a711d57f73a7ff1bf2.yaml b/nuclei-templates/cve-less/plugins/netreviews-569c4e32e955a5a711d57f73a7ff1bf2.yaml new file mode 100644 index 0000000000..0ca4e01d1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/netreviews-569c4e32e955a5a711d57f73a7ff1bf2.yaml @@ -0,0 +1,58 @@ +id: netreviews-569c4e32e955a5a711d57f73a7ff1bf2 + +info: + name: > + Verified Reviews (Avis Vérifiés) <= 2.3.14 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3044dbfc-e12d-47e0-a297-67ff0510eded?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/netreviews/" + google-query: inurl:"/wp-content/plugins/netreviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,netreviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/netreviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "netreviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/netroics-blog-posts-grid-5d20fde6dfb97e9f5d07e3e446eb155e.yaml b/nuclei-templates/cve-less/plugins/netroics-blog-posts-grid-5d20fde6dfb97e9f5d07e3e446eb155e.yaml new file mode 100644 index 0000000000..d368e8e4d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/netroics-blog-posts-grid-5d20fde6dfb97e9f5d07e3e446eb155e.yaml @@ -0,0 +1,58 @@ +id: netroics-blog-posts-grid-5d20fde6dfb97e9f5d07e3e446eb155e + +info: + name: > + Netroics Blog Posts Grid <= 1.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d67d5662-0cc7-4b14-a50b-15158f6e4239?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/netroics-blog-posts-grid/" + google-query: inurl:"/wp-content/plugins/netroics-blog-posts-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,netroics-blog-posts-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/netroics-blog-posts-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "netroics-blog-posts-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/network-publisher-04eafceaed46e98686bbc255ebb274ab.yaml b/nuclei-templates/cve-less/plugins/network-publisher-04eafceaed46e98686bbc255ebb274ab.yaml new file mode 100644 index 0000000000..54aeb70df4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/network-publisher-04eafceaed46e98686bbc255ebb274ab.yaml @@ -0,0 +1,58 @@ +id: network-publisher-04eafceaed46e98686bbc255ebb274ab + +info: + name: > + Network Publisher <= 5.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49bdd84a-05c0-4c7c-9d12-8a8eec91908d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/network-publisher/" + google-query: inurl:"/wp-content/plugins/network-publisher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,network-publisher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/network-publisher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "network-publisher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/network-summary-2122a84f28fdfefbdc58444f837b4996.yaml b/nuclei-templates/cve-less/plugins/network-summary-2122a84f28fdfefbdc58444f837b4996.yaml new file mode 100644 index 0000000000..a165e4d950 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/network-summary-2122a84f28fdfefbdc58444f837b4996.yaml @@ -0,0 +1,58 @@ +id: network-summary-2122a84f28fdfefbdc58444f837b4996 + +info: + name: > + Network Summary <= 2.0.11 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3320c182-b1f9-4e06-92ea-0fa670557dd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/network-summary/" + google-query: inurl:"/wp-content/plugins/network-summary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,network-summary,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/network-summary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "network-summary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/neuvoo-jobroll-1188e531905e3639c772d49bab35e621.yaml b/nuclei-templates/cve-less/plugins/neuvoo-jobroll-1188e531905e3639c772d49bab35e621.yaml new file mode 100644 index 0000000000..2c15572f5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/neuvoo-jobroll-1188e531905e3639c772d49bab35e621.yaml @@ -0,0 +1,58 @@ +id: neuvoo-jobroll-1188e531905e3639c772d49bab35e621 + +info: + name: > + Neuvoo Jobroll <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b8a0cf1-2be7-4d57-8ef6-137035ceb422?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/neuvoo-jobroll/" + google-query: inurl:"/wp-content/plugins/neuvoo-jobroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,neuvoo-jobroll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/neuvoo-jobroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "neuvoo-jobroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/neuvoo-jobroll-75a76987b60af6fa885fc4c0dfc6ee8a.yaml b/nuclei-templates/cve-less/plugins/neuvoo-jobroll-75a76987b60af6fa885fc4c0dfc6ee8a.yaml new file mode 100644 index 0000000000..9e2f8d28dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/neuvoo-jobroll-75a76987b60af6fa885fc4c0dfc6ee8a.yaml @@ -0,0 +1,58 @@ +id: neuvoo-jobroll-75a76987b60af6fa885fc4c0dfc6ee8a + +info: + name: > + Neuvoo Jobroll <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9412cb1-54b5-4544-8571-0a1185e7f456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/neuvoo-jobroll/" + google-query: inurl:"/wp-content/plugins/neuvoo-jobroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,neuvoo-jobroll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/neuvoo-jobroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "neuvoo-jobroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-adman-b19e098eab2b720f4c9c456bb0f876fa.yaml b/nuclei-templates/cve-less/plugins/new-adman-b19e098eab2b720f4c9c456bb0f876fa.yaml new file mode 100644 index 0000000000..7442c6a01b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-adman-b19e098eab2b720f4c9c456bb0f876fa.yaml @@ -0,0 +1,58 @@ +id: new-adman-b19e098eab2b720f4c9c456bb0f876fa + +info: + name: > + New Adman <= 1.6.8 - Cross-Site Request Forgery via plugin_menu + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b140d228-cd74-4d78-8b9d-9a69e5a89bfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-adman/" + google-query: inurl:"/wp-content/plugins/new-adman/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-adman,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-adman/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-adman" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-adman-bf579b9a08de0f44c24def81bc3a2891.yaml b/nuclei-templates/cve-less/plugins/new-adman-bf579b9a08de0f44c24def81bc3a2891.yaml new file mode 100644 index 0000000000..79a0183c72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-adman-bf579b9a08de0f44c24def81bc3a2891.yaml @@ -0,0 +1,58 @@ +id: new-adman-bf579b9a08de0f44c24def81bc3a2891 + +info: + name: > + New Adman <= 1.6.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d862e8e6-ecf6-41f5-8f40-1225ecec7e1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-adman/" + google-query: inurl:"/wp-content/plugins/new-adman/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-adman,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-adman/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-adman" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-album-gallery-bccc52eaf67f0c2e9578dcf9fea0c991.yaml b/nuclei-templates/cve-less/plugins/new-album-gallery-bccc52eaf67f0c2e9578dcf9fea0c991.yaml new file mode 100644 index 0000000000..7390487c6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-album-gallery-bccc52eaf67f0c2e9578dcf9fea0c991.yaml @@ -0,0 +1,58 @@ +id: new-album-gallery-bccc52eaf67f0c2e9578dcf9fea0c991 + +info: + name: > + Album Gallery – WordPress Gallery <= 1.4.9 - Cross-Site Request Forgery via album-gallery-column-settings.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f3df75e-cf2f-4076-b5ff-b8540408044a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-album-gallery/" + google-query: inurl:"/wp-content/plugins/new-album-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-album-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-album-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-album-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-grid-gallery-b56d867b606b433de9a6f7e49a5d4259.yaml b/nuclei-templates/cve-less/plugins/new-grid-gallery-b56d867b606b433de9a6f7e49a5d4259.yaml new file mode 100644 index 0000000000..6f536702db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-grid-gallery-b56d867b606b433de9a6f7e49a5d4259.yaml @@ -0,0 +1,58 @@ +id: new-grid-gallery-b56d867b606b433de9a6f7e49a5d4259 + +info: + name: > + Grid Gallery – Photo Image Grid Gallery <= 1.4.3 - Authenticated(Contributor+) PHP Object Injection via shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39f5777b-38b0-4fc6-909d-61eaa1de6173?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-grid-gallery/" + google-query: inurl:"/wp-content/plugins/new-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-grid-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-grid-gallery-be71c57d44785349cf4b236716cff6b0.yaml b/nuclei-templates/cve-less/plugins/new-grid-gallery-be71c57d44785349cf4b236716cff6b0.yaml new file mode 100644 index 0000000000..aeddbb8958 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-grid-gallery-be71c57d44785349cf4b236716cff6b0.yaml @@ -0,0 +1,58 @@ +id: new-grid-gallery-be71c57d44785349cf4b236716cff6b0 + +info: + name: > + Grid Gallery – Photo Image Grid Gallery <= 1.2.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db7903ef-f4e5-452b-b88a-a3933ced833f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-grid-gallery/" + google-query: inurl:"/wp-content/plugins/new-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-grid-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-order-notification-for-woocommerce-0732f852b649541967c753671f29b37b.yaml b/nuclei-templates/cve-less/plugins/new-order-notification-for-woocommerce-0732f852b649541967c753671f29b37b.yaml new file mode 100644 index 0000000000..b784a70b99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-order-notification-for-woocommerce-0732f852b649541967c753671f29b37b.yaml @@ -0,0 +1,58 @@ +id: new-order-notification-for-woocommerce-0732f852b649541967c753671f29b37b + +info: + name: > + New Order Notification for Woocommerce <= 2.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88c85270-d464-4f20-84e5-80f63e7c73e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-order-notification-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/new-order-notification-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-order-notification-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-order-notification-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-order-notification-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-photo-gallery-1064e143eb72cf1f7f6e0379aeb06d2d.yaml b/nuclei-templates/cve-less/plugins/new-photo-gallery-1064e143eb72cf1f7f6e0379aeb06d2d.yaml new file mode 100644 index 0000000000..78e8b42bad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-photo-gallery-1064e143eb72cf1f7f6e0379aeb06d2d.yaml @@ -0,0 +1,58 @@ +id: new-photo-gallery-1064e143eb72cf1f7f6e0379aeb06d2d + +info: + name: > + Photo Gallery <= 1.4.1 - Authenticated(Contributor+) PHP Object Injection via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14894c36-f657-4368-bc7f-60121ec08c13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-photo-gallery/" + google-query: inurl:"/wp-content/plugins/new-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-photo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-royalslider-0111982febae7056a14e209747a4d7f0.yaml b/nuclei-templates/cve-less/plugins/new-royalslider-0111982febae7056a14e209747a4d7f0.yaml new file mode 100644 index 0000000000..4108c48429 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-royalslider-0111982febae7056a14e209747a4d7f0.yaml @@ -0,0 +1,58 @@ +id: new-royalslider-0111982febae7056a14e209747a4d7f0 + +info: + name: > + RoyalSlider <= 3.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60116e60-ebf3-4f32-b536-52ce2a9672df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-royalslider/" + google-query: inurl:"/wp-content/plugins/new-royalslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-royalslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-royalslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-royalslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-user-approve-0e6d3f2d08066d7cff85e87321056d7c.yaml b/nuclei-templates/cve-less/plugins/new-user-approve-0e6d3f2d08066d7cff85e87321056d7c.yaml new file mode 100644 index 0000000000..5409f35b43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-user-approve-0e6d3f2d08066d7cff85e87321056d7c.yaml @@ -0,0 +1,58 @@ +id: new-user-approve-0e6d3f2d08066d7cff85e87321056d7c + +info: + name: > + New User Approve <= 2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e6365ab-30c5-4bec-a5f3-b0812ae8a609?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-user-approve/" + google-query: inurl:"/wp-content/plugins/new-user-approve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-user-approve,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-user-approve/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-user-approve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-user-approve-26505cfee39309a781056291e8398c4a.yaml b/nuclei-templates/cve-less/plugins/new-user-approve-26505cfee39309a781056291e8398c4a.yaml new file mode 100644 index 0000000000..6e5e533e8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-user-approve-26505cfee39309a781056291e8398c4a.yaml @@ -0,0 +1,58 @@ +id: new-user-approve-26505cfee39309a781056291e8398c4a + +info: + name: > + New User Approve <= 2.5.1 - Cross-Site Request Forgery via admin_notices + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3abde27c-8234-4146-9e55-ea20b275ca48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-user-approve/" + google-query: inurl:"/wp-content/plugins/new-user-approve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-user-approve,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-user-approve/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-user-approve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-user-approve-92b561b69b56e7600f4f7b9ae4076303.yaml b/nuclei-templates/cve-less/plugins/new-user-approve-92b561b69b56e7600f4f7b9ae4076303.yaml new file mode 100644 index 0000000000..528bd7aa33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-user-approve-92b561b69b56e7600f4f7b9ae4076303.yaml @@ -0,0 +1,58 @@ +id: new-user-approve-92b561b69b56e7600f4f7b9ae4076303 + +info: + name: > + New User Approve <= 2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8e3f779-9d25-4525-a827-8ce743bd889e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-user-approve/" + google-query: inurl:"/wp-content/plugins/new-user-approve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-user-approve,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-user-approve/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-user-approve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-user-approve-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/new-user-approve-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..567a62433b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-user-approve-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: new-user-approve-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-user-approve/" + google-query: inurl:"/wp-content/plugins/new-user-approve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-user-approve,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-user-approve/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-user-approve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-user-email-set-up-2d0401b900eef6498675d312d5732e7a.yaml b/nuclei-templates/cve-less/plugins/new-user-email-set-up-2d0401b900eef6498675d312d5732e7a.yaml new file mode 100644 index 0000000000..c3c2562ab1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-user-email-set-up-2d0401b900eef6498675d312d5732e7a.yaml @@ -0,0 +1,58 @@ +id: new-user-email-set-up-2d0401b900eef6498675d312d5732e7a + +info: + name: > + New User Email Set Up <= 0.5.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c50568c-c0ec-43f9-bf06-7347f9cfc662?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-user-email-set-up/" + google-query: inurl:"/wp-content/plugins/new-user-email-set-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-user-email-set-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-user-email-set-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-user-email-set-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-video-gallery-278430bfff21cdcd8521969c19275f0f.yaml b/nuclei-templates/cve-less/plugins/new-video-gallery-278430bfff21cdcd8521969c19275f0f.yaml new file mode 100644 index 0000000000..bb2f0672b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-video-gallery-278430bfff21cdcd8521969c19275f0f.yaml @@ -0,0 +1,58 @@ +id: new-video-gallery-278430bfff21cdcd8521969c19275f0f + +info: + name: > + Video Gallery – Api Gallery, YouTube and Vimeo, Link Gallery <= 1.5.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c8b8391-8d18-49ad-a5ee-2ba7a9090e6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-video-gallery/" + google-query: inurl:"/wp-content/plugins/new-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-video-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/new-year-firework-691d3fdf23c3a77219e053d123bb9c11.yaml b/nuclei-templates/cve-less/plugins/new-year-firework-691d3fdf23c3a77219e053d123bb9c11.yaml new file mode 100644 index 0000000000..29e4cabf4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/new-year-firework-691d3fdf23c3a77219e053d123bb9c11.yaml @@ -0,0 +1,58 @@ +id: new-year-firework-691d3fdf23c3a77219e053d123bb9c11 + +info: + name: > + New Year Firework <= 1.1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22b33944-443e-48fe-9fd0-4d48fe03072b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/new-year-firework/" + google-query: inurl:"/wp-content/plugins/new-year-firework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,new-year-firework,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/new-year-firework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "new-year-firework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/news-announcement-scroll-433814dea51a33a792f1c14558ec0d69.yaml b/nuclei-templates/cve-less/plugins/news-announcement-scroll-433814dea51a33a792f1c14558ec0d69.yaml new file mode 100644 index 0000000000..3a928c842a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/news-announcement-scroll-433814dea51a33a792f1c14558ec0d69.yaml @@ -0,0 +1,58 @@ +id: news-announcement-scroll-433814dea51a33a792f1c14558ec0d69 + +info: + name: > + News Announcement Scroll <= 9.0.0 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b29113d6-7a9a-4e10-a446-147ec146ac93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/news-announcement-scroll/" + google-query: inurl:"/wp-content/plugins/news-announcement-scroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,news-announcement-scroll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/news-announcement-scroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "news-announcement-scroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/news-announcement-scroll-6c5199d39eb82de60e28b6acd63ef12d.yaml b/nuclei-templates/cve-less/plugins/news-announcement-scroll-6c5199d39eb82de60e28b6acd63ef12d.yaml new file mode 100644 index 0000000000..fba1483b60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/news-announcement-scroll-6c5199d39eb82de60e28b6acd63ef12d.yaml @@ -0,0 +1,58 @@ +id: news-announcement-scroll-6c5199d39eb82de60e28b6acd63ef12d + +info: + name: > + News Announcement Scroll <= 8.8.8 - Authenticated (Admininstrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b192d5d5-3bb9-4600-849e-2bb3c06009af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/news-announcement-scroll/" + google-query: inurl:"/wp-content/plugins/news-announcement-scroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,news-announcement-scroll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/news-announcement-scroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "news-announcement-scroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/news-wall-1a779beb118a344123814c7da3a92427.yaml b/nuclei-templates/cve-less/plugins/news-wall-1a779beb118a344123814c7da3a92427.yaml new file mode 100644 index 0000000000..44eff4fe2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/news-wall-1a779beb118a344123814c7da3a92427.yaml @@ -0,0 +1,58 @@ +id: news-wall-1a779beb118a344123814c7da3a92427 + +info: + name: > + News Wall <= 1.1.0 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37331460-4585-4946-9256-64fdb8f02a6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/news-wall/" + google-query: inurl:"/wp-content/plugins/news-wall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,news-wall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/news-wall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "news-wall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-05717ef617ff885ca4d0ac7195b86227.yaml b/nuclei-templates/cve-less/plugins/newsletter-05717ef617ff885ca4d0ac7195b86227.yaml new file mode 100644 index 0000000000..2a328784ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-05717ef617ff885ca4d0ac7195b86227.yaml @@ -0,0 +1,58 @@ +id: newsletter-05717ef617ff885ca4d0ac7195b86227 + +info: + name: > + Newsletter <= 6.5.3 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e91e6101-bd30-4cf1-9a39-23218c3bff6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-329e4b44130ac269d4479f891a8c5f08.yaml b/nuclei-templates/cve-less/plugins/newsletter-329e4b44130ac269d4479f891a8c5f08.yaml new file mode 100644 index 0000000000..45a5018ad2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-329e4b44130ac269d4479f891a8c5f08.yaml @@ -0,0 +1,58 @@ +id: newsletter-329e4b44130ac269d4479f891a8c5f08 + +info: + name: > + Newsletter <= 8.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c24ee66-7b57-4e4c-bbb5-0451fc24ce4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-36e06ea858a68708b1aaf6b3c07ed8c6.yaml b/nuclei-templates/cve-less/plugins/newsletter-36e06ea858a68708b1aaf6b3c07ed8c6.yaml new file mode 100644 index 0000000000..12fe53628b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-36e06ea858a68708b1aaf6b3c07ed8c6.yaml @@ -0,0 +1,58 @@ +id: newsletter-36e06ea858a68708b1aaf6b3c07ed8c6 + +info: + name: > + Newsletter <= 8.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54bdcae1-28af-4d30-9204-e67b27271042?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-46ccdfdd1e5c01b6218e531cf0996d36.yaml b/nuclei-templates/cve-less/plugins/newsletter-46ccdfdd1e5c01b6218e531cf0996d36.yaml new file mode 100644 index 0000000000..bb758606d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-46ccdfdd1e5c01b6218e531cf0996d36.yaml @@ -0,0 +1,58 @@ +id: newsletter-46ccdfdd1e5c01b6218e531cf0996d36 + +info: + name: > + Newsletter <= 6.7.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2dce9e9a-a2f3-49a9-a6bc-00328632c654?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-738e67611ca42fd98e51ccd2eb0ad2d6.yaml b/nuclei-templates/cve-less/plugins/newsletter-738e67611ca42fd98e51ccd2eb0ad2d6.yaml new file mode 100644 index 0000000000..0908b0f17d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-738e67611ca42fd98e51ccd2eb0ad2d6.yaml @@ -0,0 +1,58 @@ +id: newsletter-738e67611ca42fd98e51ccd2eb0ad2d6 + +info: + name: > + Newsletter <= 3.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4c6930a-b413-4acc-a0a4-9940bb8474cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-89837280a63d6f202a5c4d44cb2bc250.yaml b/nuclei-templates/cve-less/plugins/newsletter-89837280a63d6f202a5c4d44cb2bc250.yaml new file mode 100644 index 0000000000..db4978278b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-89837280a63d6f202a5c4d44cb2bc250.yaml @@ -0,0 +1,58 @@ +id: newsletter-89837280a63d6f202a5c4d44cb2bc250 + +info: + name: > + Newsletter – Send awesome emails from WordPress <= 7.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e136ab52-a193-430b-b2b2-d7640d009c99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-8fcdb0b13a5576b5ff2b34a21c31cbb9.yaml b/nuclei-templates/cve-less/plugins/newsletter-8fcdb0b13a5576b5ff2b34a21c31cbb9.yaml new file mode 100644 index 0000000000..2a0ade23bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-8fcdb0b13a5576b5ff2b34a21c31cbb9.yaml @@ -0,0 +1,58 @@ +id: newsletter-8fcdb0b13a5576b5ff2b34a21c31cbb9 + +info: + name: > + Newsletter <= 7.8.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87da5300-1add-44fc-a3e0-e8912f946c84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-981beced4302bc1ed44f59f5bbd895e2.yaml b/nuclei-templates/cve-less/plugins/newsletter-981beced4302bc1ed44f59f5bbd895e2.yaml new file mode 100644 index 0000000000..5db5477371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-981beced4302bc1ed44f59f5bbd895e2.yaml @@ -0,0 +1,58 @@ +id: newsletter-981beced4302bc1ed44f59f5bbd895e2 + +info: + name: > + Newsletter <= 7.4.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a27cfa5a-e02a-4c92-8503-2c7cd32fb1f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-a0918f22ac918ae4fe62db47bcca205c.yaml b/nuclei-templates/cve-less/plugins/newsletter-a0918f22ac918ae4fe62db47bcca205c.yaml new file mode 100644 index 0000000000..fa3096120b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-a0918f22ac918ae4fe62db47bcca205c.yaml @@ -0,0 +1,58 @@ +id: newsletter-a0918f22ac918ae4fe62db47bcca205c + +info: + name: > + Newsletter <= 6.8.1 - Authenticated PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d684efcd-74fa-4b0c-b8dd-9674a2748fc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-bulk-email-72d17698c8eeb0073ce356c8f5c5e968.yaml b/nuclei-templates/cve-less/plugins/newsletter-bulk-email-72d17698c8eeb0073ce356c8f5c5e968.yaml new file mode 100644 index 0000000000..f3b46bc686 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-bulk-email-72d17698c8eeb0073ce356c8f5c5e968.yaml @@ -0,0 +1,58 @@ +id: newsletter-bulk-email-72d17698c8eeb0073ce356c8f5c5e968 + +info: + name: > + Newsletter & Bulk Email Sender <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7c19095-3c21-440f-aa28-0117aea29d97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-bulk-email/" + google-query: inurl:"/wp-content/plugins/newsletter-bulk-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-bulk-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-bulk-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-bulk-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-by-supsystic-5a374355ec4537f847bbfe7d5d9419bb.yaml b/nuclei-templates/cve-less/plugins/newsletter-by-supsystic-5a374355ec4537f847bbfe7d5d9419bb.yaml new file mode 100644 index 0000000000..8551d262bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-by-supsystic-5a374355ec4537f847bbfe7d5d9419bb.yaml @@ -0,0 +1,58 @@ +id: newsletter-by-supsystic-5a374355ec4537f847bbfe7d5d9419bb + +info: + name: > + Newsletter by Supsystic <= 1.5.6 - Authenticated (Admin+) Time-Based Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/931983c3-d704-4c95-8078-7db4d79e1e1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-by-supsystic/" + google-query: inurl:"/wp-content/plugins/newsletter-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-by-supsystic-62fd42906a2acfa6303c130d21470bd3.yaml b/nuclei-templates/cve-less/plugins/newsletter-by-supsystic-62fd42906a2acfa6303c130d21470bd3.yaml new file mode 100644 index 0000000000..aa6037335e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-by-supsystic-62fd42906a2acfa6303c130d21470bd3.yaml @@ -0,0 +1,58 @@ +id: newsletter-by-supsystic-62fd42906a2acfa6303c130d21470bd3 + +info: + name: > + Newsletter by Supsystic < 1.1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc9dcd42-bec1-4323-b5bf-6c0518ae546d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-by-supsystic/" + google-query: inurl:"/wp-content/plugins/newsletter-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-c834c5e1d5d5c36b9532f258717d77bb.yaml b/nuclei-templates/cve-less/plugins/newsletter-c834c5e1d5d5c36b9532f258717d77bb.yaml new file mode 100644 index 0000000000..dea3d21fe0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-c834c5e1d5d5c36b9532f258717d77bb.yaml @@ -0,0 +1,58 @@ +id: newsletter-c834c5e1d5d5c36b9532f258717d77bb + +info: + name: > + Newsletter <= 6.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95dc0d79-b65a-4bfb-89c0-569bf26232df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-e5ab2a90d77e5b6e1a1c85bcd4411c15.yaml b/nuclei-templates/cve-less/plugins/newsletter-e5ab2a90d77e5b6e1a1c85bcd4411c15.yaml new file mode 100644 index 0000000000..cca1ee673b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-e5ab2a90d77e5b6e1a1c85bcd4411c15.yaml @@ -0,0 +1,58 @@ +id: newsletter-e5ab2a90d77e5b6e1a1c85bcd4411c15 + +info: + name: > + Newsletter <= 7.6.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa49346c-726e-41f9-8a74-adaa4a8fa5d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-ef27394574ec1b75cca56caa3de40fd5.yaml b/nuclei-templates/cve-less/plugins/newsletter-ef27394574ec1b75cca56caa3de40fd5.yaml new file mode 100644 index 0000000000..4165d16e63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-ef27394574ec1b75cca56caa3de40fd5.yaml @@ -0,0 +1,58 @@ +id: newsletter-ef27394574ec1b75cca56caa3de40fd5 + +info: + name: > + Newsletter <= 3.8.2 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db2a2ca9-a12c-412d-80f7-66f1dc3e09af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-f4e01d148cb4faf1d4deb03b8e76c31d.yaml b/nuclei-templates/cve-less/plugins/newsletter-f4e01d148cb4faf1d4deb03b8e76c31d.yaml new file mode 100644 index 0000000000..184c032767 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-f4e01d148cb4faf1d4deb03b8e76c31d.yaml @@ -0,0 +1,58 @@ +id: newsletter-f4e01d148cb4faf1d4deb03b8e76c31d + +info: + name: > + Newsletter <= 8.2.0 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/165a3c28-ea89-44bd-9de0-38d931f98de2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter/" + google-query: inurl:"/wp-content/plugins/newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-manager-0533a1e9776fb29c7b5b9491b1113794.yaml b/nuclei-templates/cve-less/plugins/newsletter-manager-0533a1e9776fb29c7b5b9491b1113794.yaml new file mode 100644 index 0000000000..e39f7e2d36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-manager-0533a1e9776fb29c7b5b9491b1113794.yaml @@ -0,0 +1,58 @@ +id: newsletter-manager-0533a1e9776fb29c7b5b9491b1113794 + +info: + name: > + Newsletter Manager <= 1.4 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd8389f1-b70d-4d1a-bb25-e219c9099313?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-manager/" + google-query: inurl:"/wp-content/plugins/newsletter-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-manager-1047bbd2b8a122544a7afe7bee9dd9ef.yaml b/nuclei-templates/cve-less/plugins/newsletter-manager-1047bbd2b8a122544a7afe7bee9dd9ef.yaml new file mode 100644 index 0000000000..38c6056317 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-manager-1047bbd2b8a122544a7afe7bee9dd9ef.yaml @@ -0,0 +1,58 @@ +id: newsletter-manager-1047bbd2b8a122544a7afe7bee9dd9ef + +info: + name: > + Newsletter Manager <= 1.5.1 - Insecure Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcfd8c4d-d48b-468d-a7d5-1ec05b068f79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-manager/" + google-query: inurl:"/wp-content/plugins/newsletter-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-manager-437f867caa3099fbc234387a5d6249e0.yaml b/nuclei-templates/cve-less/plugins/newsletter-manager-437f867caa3099fbc234387a5d6249e0.yaml new file mode 100644 index 0000000000..5a21036202 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-manager-437f867caa3099fbc234387a5d6249e0.yaml @@ -0,0 +1,58 @@ +id: newsletter-manager-437f867caa3099fbc234387a5d6249e0 + +info: + name: > + Newsletter Manager < 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e1833e-31de-418b-bbd3-d41daa3ac9d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-manager/" + google-query: inurl:"/wp-content/plugins/newsletter-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-manager-4fecc14512bd412ef7b458d7c2feb79a.yaml b/nuclei-templates/cve-less/plugins/newsletter-manager-4fecc14512bd412ef7b458d7c2feb79a.yaml new file mode 100644 index 0000000000..df107fcbe7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-manager-4fecc14512bd412ef7b458d7c2feb79a.yaml @@ -0,0 +1,58 @@ +id: newsletter-manager-4fecc14512bd412ef7b458d7c2feb79a + +info: + name: > + Newsletter Manager < 1.0.2 - Cross-Site Scripting via test_mail.php + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/919a2a4a-061e-4206-84b2-7b43b1276fa0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-manager/" + google-query: inurl:"/wp-content/plugins/newsletter-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-manager-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml b/nuclei-templates/cve-less/plugins/newsletter-manager-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml new file mode 100644 index 0000000000..6acad7ca04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-manager-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml @@ -0,0 +1,58 @@ +id: newsletter-manager-ce05b3ae1fa8a55fc1f1267b8e05c4cc + +info: + name: > + Newsletter Manager < 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d39a73dd-5d62-43cc-af36-6bdf85dec3f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-manager/" + google-query: inurl:"/wp-content/plugins/newsletter-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-optin-box-4e7b5734b71634dd9bb48b370cdad8aa.yaml b/nuclei-templates/cve-less/plugins/newsletter-optin-box-4e7b5734b71634dd9bb48b370cdad8aa.yaml new file mode 100644 index 0000000000..df2a73c4e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-optin-box-4e7b5734b71634dd9bb48b370cdad8aa.yaml @@ -0,0 +1,58 @@ +id: newsletter-optin-box-4e7b5734b71634dd9bb48b370cdad8aa + +info: + name: > + WordPress Newsletter Plugin – Noptin < 1.6.5 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5372890-72d4-482d-a7f2-04a50520c4dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-optin-box/" + google-query: inurl:"/wp-content/plugins/newsletter-optin-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-optin-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-optin-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-optin-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-optin-box-51e92ff25e71a7c2e17f5c127452f585.yaml b/nuclei-templates/cve-less/plugins/newsletter-optin-box-51e92ff25e71a7c2e17f5c127452f585.yaml new file mode 100644 index 0000000000..30ac773144 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-optin-box-51e92ff25e71a7c2e17f5c127452f585.yaml @@ -0,0 +1,58 @@ +id: newsletter-optin-box-51e92ff25e71a7c2e17f5c127452f585 + +info: + name: > + Simple Newsletter Plugin – Noptin <= 1.10.3 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a1de2d6-d4a0-4770-be38-9bd09b2243b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-optin-box/" + google-query: inurl:"/wp-content/plugins/newsletter-optin-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-optin-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-optin-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-optin-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-popup-0fb02df24aa43363dc0b388137db084d.yaml b/nuclei-templates/cve-less/plugins/newsletter-popup-0fb02df24aa43363dc0b388137db084d.yaml new file mode 100644 index 0000000000..ce52f95ed7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-popup-0fb02df24aa43363dc0b388137db084d.yaml @@ -0,0 +1,58 @@ +id: newsletter-popup-0fb02df24aa43363dc0b388137db084d + +info: + name: > + Newsletter Popup <= 1.2 - Unauthenticted Stored Cross-Site Scripting via 'nl_data' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b5d64b8-c339-4bbc-b91e-4805428f7296?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-popup/" + google-query: inurl:"/wp-content/plugins/newsletter-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter-popup-c0ffd5d28b53a7790d15e70d69428d0e.yaml b/nuclei-templates/cve-less/plugins/newsletter-popup-c0ffd5d28b53a7790d15e70d69428d0e.yaml new file mode 100644 index 0000000000..98daa7fc97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter-popup-c0ffd5d28b53a7790d15e70d69428d0e.yaml @@ -0,0 +1,58 @@ +id: newsletter-popup-c0ffd5d28b53a7790d15e70d69428d0e + +info: + name: > + Newsletter Popup <= 1.2 - Cross-Site Request Forgery to Record Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/274429f7-1cd1-49e4-a145-dce36bebb9c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter-popup/" + google-query: inurl:"/wp-content/plugins/newsletter-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletter2go-d7690abd96f47b63d2e6b2b27468ddeb.yaml b/nuclei-templates/cve-less/plugins/newsletter2go-d7690abd96f47b63d2e6b2b27468ddeb.yaml new file mode 100644 index 0000000000..0ac63596c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletter2go-d7690abd96f47b63d2e6b2b27468ddeb.yaml @@ -0,0 +1,58 @@ +id: newsletter2go-d7690abd96f47b63d2e6b2b27468ddeb + +info: + name: > + Newsletter2Go <= 4.0.13 - Authenticated(Subscriber+) Stored Cross-Site Scripting via style + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/766ac399-7280-4186-8972-94da813da85e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletter2go/" + google-query: inurl:"/wp-content/plugins/newsletter2go/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletter2go,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletter2go/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletter2go" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-05fc8635fe3b2da7f76501f71f380eaa.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-05fc8635fe3b2da7f76501f71f380eaa.yaml new file mode 100644 index 0000000000..e12f4e34fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-05fc8635fe3b2da7f76501f71f380eaa.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-05fc8635fe3b2da7f76501f71f380eaa + +info: + name: > + Newsletters <= 4.6.18 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa7a7f9-f331-4d06-94ea-182535080a90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-115f884d0c6c27b8ac283bf2fad6f3ed.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-115f884d0c6c27b8ac283bf2fad6f3ed.yaml new file mode 100644 index 0000000000..2126b576cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-115f884d0c6c27b8ac283bf2fad6f3ed.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-115f884d0c6c27b8ac283bf2fad6f3ed + +info: + name: > + Newsletters <= 4.8.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cd6474f-72e1-4ec2-a056-3c05a0dfa173?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-6341ec05f42eea92884ac2a29b84c8c0.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-6341ec05f42eea92884ac2a29b84c8c0.yaml new file mode 100644 index 0000000000..00dab6c460 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-6341ec05f42eea92884ac2a29b84c8c0.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-6341ec05f42eea92884ac2a29b84c8c0 + +info: + name: > + Newsletter Lite <= 4.9.2 - Authenticated (Admin+) Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b409d2a5-3c4c-4a1e-b222-e2df7257b81f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-63a6ae12fc77467bfccad91ea4a943d2.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-63a6ae12fc77467bfccad91ea4a943d2.yaml new file mode 100644 index 0000000000..33b21701ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-63a6ae12fc77467bfccad91ea4a943d2.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-63a6ae12fc77467bfccad91ea4a943d2 + +info: + name: > + Newsletters <= 4.6.18 - Cross-Site Scripting via contentarea Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb4abe41-fb18-46f4-9fd8-90bb1996b241?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-85e177edc7eae3fd9e8af515318eb68f.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-85e177edc7eae3fd9e8af515318eb68f.yaml new file mode 100644 index 0000000000..4f82f5467f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-85e177edc7eae3fd9e8af515318eb68f.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-85e177edc7eae3fd9e8af515318eb68f + +info: + name: > + Newsletters <= 4.6.4.2 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e0e6fdd-49d2-404a-83e8-c4884bbe7088?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-941165a565ddef468f5deaa19a3321bc.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-941165a565ddef468f5deaa19a3321bc.yaml new file mode 100644 index 0000000000..b9ca236080 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-941165a565ddef468f5deaa19a3321bc.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-941165a565ddef468f5deaa19a3321bc + +info: + name: > + Newsletters <= 4.6.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cba7026-04e4-4ace-9298-0177902b7529?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-ade39cd867e3448bad9cda88f9ec4ce9.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-ade39cd867e3448bad9cda88f9ec4ce9.yaml new file mode 100644 index 0000000000..30f77dbfcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-ade39cd867e3448bad9cda88f9ec4ce9.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-ade39cd867e3448bad9cda88f9ec4ce9 + +info: + name: > + Newsletters <= 4.9.5 - Information Exposure via Log files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/867f374c-633f-4384-aa2b-5bb8daa5b7a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-f3852e2e998f0a9723c8ace5e7ebc48d.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-f3852e2e998f0a9723c8ace5e7ebc48d.yaml new file mode 100644 index 0000000000..34e1bcfa58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-f3852e2e998f0a9723c8ace5e7ebc48d.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-f3852e2e998f0a9723c8ace5e7ebc48d + +info: + name: > + Newsletters <= 4.9.5 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ead5b943-731d-484a-a6b0-ca4f27eccff0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsletters-lite-fb658166b72b071de6ed9c2034675764.yaml b/nuclei-templates/cve-less/plugins/newsletters-lite-fb658166b72b071de6ed9c2034675764.yaml new file mode 100644 index 0000000000..730a911849 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsletters-lite-fb658166b72b071de6ed9c2034675764.yaml @@ -0,0 +1,58 @@ +id: newsletters-lite-fb658166b72b071de6ed9c2034675764 + +info: + name: > + Newsletters <= 4.6.8.5 - Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c3ef1bf-ef81-4e24-9813-de1a25b0e8ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsletters-lite/" + google-query: inurl:"/wp-content/plugins/newsletters-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsletters-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsletters-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsletters-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newsplugin-90997fecd42d62efb670daec1cf651f8.yaml b/nuclei-templates/cve-less/plugins/newsplugin-90997fecd42d62efb670daec1cf651f8.yaml new file mode 100644 index 0000000000..e36833b927 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newsplugin-90997fecd42d62efb670daec1cf651f8.yaml @@ -0,0 +1,58 @@ +id: newsplugin-90997fecd42d62efb670daec1cf651f8 + +info: + name: > + NewsPlugin <= 1.0.18 – Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f208ca5a-a404-4664-80f5-643e713f600a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newsplugin/" + google-query: inurl:"/wp-content/plugins/newsplugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newsplugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newsplugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsplugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-53b1198e7ee8eee5292e3abdba3cbbf7.yaml b/nuclei-templates/cve-less/plugins/newstatpress-53b1198e7ee8eee5292e3abdba3cbbf7.yaml new file mode 100644 index 0000000000..e5cd1d95c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-53b1198e7ee8eee5292e3abdba3cbbf7.yaml @@ -0,0 +1,58 @@ +id: newstatpress-53b1198e7ee8eee5292e3abdba3cbbf7 + +info: + name: > + NewStatPress < 1.2.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a353364-73a9-428c-b702-0183b29c7e3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-5661d46a0d0f62ecdca1f908938fc469.yaml b/nuclei-templates/cve-less/plugins/newstatpress-5661d46a0d0f62ecdca1f908938fc469.yaml new file mode 100644 index 0000000000..9321c5f37e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-5661d46a0d0f62ecdca1f908938fc469.yaml @@ -0,0 +1,58 @@ +id: newstatpress-5661d46a0d0f62ecdca1f908938fc469 + +info: + name: > + NewStatPress <= 0.9.8 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8292a1f-1d26-4efa-9ead-5309965bdb8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-5a76fde7fb0009ab04ff52f07a51dd98.yaml b/nuclei-templates/cve-less/plugins/newstatpress-5a76fde7fb0009ab04ff52f07a51dd98.yaml new file mode 100644 index 0000000000..f4361001c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-5a76fde7fb0009ab04ff52f07a51dd98.yaml @@ -0,0 +1,58 @@ +id: newstatpress-5a76fde7fb0009ab04ff52f07a51dd98 + +info: + name: > + NewStatPress <= 1.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fe983d6-ad48-460f-ba5d-f6de19f06be4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-8412ac7e626ed43c4ce45430524bd3c5.yaml b/nuclei-templates/cve-less/plugins/newstatpress-8412ac7e626ed43c4ce45430524bd3c5.yaml new file mode 100644 index 0000000000..bb2cebf77b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-8412ac7e626ed43c4ce45430524bd3c5.yaml @@ -0,0 +1,58 @@ +id: newstatpress-8412ac7e626ed43c4ce45430524bd3c5 + +info: + name: > + NewStatPress < 1.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ce60724-3ef8-4222-9034-88edb8a4ce0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-85b9bc25cc8d9d1685d816dce491f099.yaml b/nuclei-templates/cve-less/plugins/newstatpress-85b9bc25cc8d9d1685d816dce491f099.yaml new file mode 100644 index 0000000000..39c3c4d066 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-85b9bc25cc8d9d1685d816dce491f099.yaml @@ -0,0 +1,58 @@ +id: newstatpress-85b9bc25cc8d9d1685d816dce491f099 + +info: + name: > + NewStatPress <= 1.0.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d8eae69-722a-45ea-a3ca-d4a39a63c4b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-9429ed7d3468d9b070c3aef1b1b73950.yaml b/nuclei-templates/cve-less/plugins/newstatpress-9429ed7d3468d9b070c3aef1b1b73950.yaml new file mode 100644 index 0000000000..3ec4f55637 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-9429ed7d3468d9b070c3aef1b1b73950.yaml @@ -0,0 +1,58 @@ +id: newstatpress-9429ed7d3468d9b070c3aef1b1b73950 + +info: + name: > + NewStatPress < 1.0.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0502c622-975f-4218-8b53-efd776fe9d99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-c5e29f3bae507d53468f7991a1fb1a3e.yaml b/nuclei-templates/cve-less/plugins/newstatpress-c5e29f3bae507d53468f7991a1fb1a3e.yaml new file mode 100644 index 0000000000..7770b02df4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-c5e29f3bae507d53468f7991a1fb1a3e.yaml @@ -0,0 +1,58 @@ +id: newstatpress-c5e29f3bae507d53468f7991a1fb1a3e + +info: + name: > + NewStatPress <= 0.9.8 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95269053-59fa-4396-bd2b-c8c4f9c05595?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-e2fceb8fb39f58204ff5726ab0b6f62e.yaml b/nuclei-templates/cve-less/plugins/newstatpress-e2fceb8fb39f58204ff5726ab0b6f62e.yaml new file mode 100644 index 0000000000..72b3e7e875 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-e2fceb8fb39f58204ff5726ab0b6f62e.yaml @@ -0,0 +1,58 @@ +id: newstatpress-e2fceb8fb39f58204ff5726ab0b6f62e + +info: + name: > + NewStatPress <= 1.3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04a99e67-6af2-43c5-a21b-052eb683945c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/newstatpress-ee6e70e7388e058992448bed848ba9e2.yaml b/nuclei-templates/cve-less/plugins/newstatpress-ee6e70e7388e058992448bed848ba9e2.yaml new file mode 100644 index 0000000000..1ab007cb85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/newstatpress-ee6e70e7388e058992448bed848ba9e2.yaml @@ -0,0 +1,58 @@ +id: newstatpress-ee6e70e7388e058992448bed848ba9e2 + +info: + name: > + NewStatPress <= 1.0.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b738676-250d-4af4-81ff-cee9efcf996e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/newstatpress/" + google-query: inurl:"/wp-content/plugins/newstatpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,newstatpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/newstatpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newstatpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-8b8a23561a8628021b8646bf3571f1c0.yaml b/nuclei-templates/cve-less/plugins/nex-forms-8b8a23561a8628021b8646bf3571f1c0.yaml new file mode 100644 index 0000000000..aff679dcbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-8b8a23561a8628021b8646bf3571f1c0.yaml @@ -0,0 +1,58 @@ +id: nex-forms-8b8a23561a8628021b8646bf3571f1c0 + +info: + name: > + NEX Forms <= 7.8.7 - Authentication Bypass for PDF Reports + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5c1f0f4-4557-4ae9-bf0d-14c61721a2c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms/" + google-query: inurl:"/wp-content/plugins/nex-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-1873bca252baceb5719ad4cfda8c952f.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-1873bca252baceb5719ad4cfda8c952f.yaml new file mode 100644 index 0000000000..35053fc9af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-1873bca252baceb5719ad4cfda8c952f.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-1873bca252baceb5719ad4cfda8c952f + +info: + name: > + NEX-Forms - Ultimate Form Builder <= 8.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd817fe9-b7be-4252-877a-e9843d62a0a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-2d87227c0a1b8cce209867e1a3357d5b.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-2d87227c0a1b8cce209867e1a3357d5b.yaml new file mode 100644 index 0000000000..f32ff589c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-2d87227c0a1b8cce209867e1a3357d5b.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-2d87227c0a1b8cce209867e1a3357d5b + +info: + name: > + NEX-Forms – Ultimate Form Builder – Contact forms and much more <= 8.5.6 - Missing Authorization via set_read() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2c3b646-d865-4425-bc8f-00b3555a3d74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-2d88339f87e8f539294930b47234f049.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-2d88339f87e8f539294930b47234f049.yaml new file mode 100644 index 0000000000..09b064e1f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-2d88339f87e8f539294930b47234f049.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-2d88339f87e8f539294930b47234f049 + +info: + name: > + NEX-Forms - Ultimate Form Builder <= 8.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0485eed3-4ee9-4b22-99d6-67e6eec1c0ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-320cc739be80667a41b7c33bc9c3ac5f.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-320cc739be80667a41b7c33bc9c3ac5f.yaml new file mode 100644 index 0000000000..f4ce66664c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-320cc739be80667a41b7c33bc9c3ac5f.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-320cc739be80667a41b7c33bc9c3ac5f + +info: + name: > + NEX-Forms – Ultimate Form Builder <= 8.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6934c0e-7526-4de7-9478-3c953b3dc64f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-3484031578b48515a252a1136c0592de.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-3484031578b48515a252a1136c0592de.yaml new file mode 100644 index 0000000000..df409cf452 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-3484031578b48515a252a1136c0592de.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-3484031578b48515a252a1136c0592de + +info: + name: > + NEX-Forms – Ultimate Form Builder <= 8.4.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a7b4d0b-9845-4d0b-b255-a311076f5ca7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-3c32e113f430e95dd1bba8970b964bc4.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-3c32e113f430e95dd1bba8970b964bc4.yaml new file mode 100644 index 0000000000..b113790474 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-3c32e113f430e95dd1bba8970b964bc4.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-3c32e113f430e95dd1bba8970b964bc4 + +info: + name: > + NEX-Forms <= 8.3.3 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d19be8b-3e0b-4d74-97e0-f17132d2d34c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-52a6b0aceece7742858232c190951358.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-52a6b0aceece7742858232c190951358.yaml new file mode 100644 index 0000000000..bcb719fa9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-52a6b0aceece7742858232c190951358.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-52a6b0aceece7742858232c190951358 + +info: + name: > + NEX-Forms – Ultimate Form Builder < 4.6.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6989e54b-ce5e-4c79-bd0d-0f7978a4bd44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-65a7e9e5db9a5af53a8c05db52ac919a.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-65a7e9e5db9a5af53a8c05db52ac919a.yaml new file mode 100644 index 0000000000..113d5bb178 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-65a7e9e5db9a5af53a8c05db52ac919a.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-65a7e9e5db9a5af53a8c05db52ac919a + +info: + name: > + NEX-Forms – Ultimate Form Builder – Contact forms and much more <= 8.5.5 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b5964a7-410b-4fea-9de2-22ffda80c8e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-69c9678050af93b08d000bd2cd1bbedb.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-69c9678050af93b08d000bd2cd1bbedb.yaml new file mode 100644 index 0000000000..8d01a3fae7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-69c9678050af93b08d000bd2cd1bbedb.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-69c9678050af93b08d000bd2cd1bbedb + +info: + name: > + NEX-Forms - Ultimate Form Builder <= 8.4.3 - Authenticated Stored Cross-Site Scripting via Form Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a333d5b4-cedf-40ac-8da9-f4965d2a397a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-6e45966d9ef8042467981ba9a26f57f6.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-6e45966d9ef8042467981ba9a26f57f6.yaml new file mode 100644 index 0000000000..5e0c87645f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-6e45966d9ef8042467981ba9a26f57f6.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-6e45966d9ef8042467981ba9a26f57f6 + +info: + name: > + NEX-Forms – Ultimate Form Builder – Contact forms and much more <= 8.5.6 - Missing Authorization via restore_records() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26bd4058-ef00-48c8-8ab5-01535f0238a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-9eff154e275679aff481294211504cad.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-9eff154e275679aff481294211504cad.yaml new file mode 100644 index 0000000000..ebb514ae18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-9eff154e275679aff481294211504cad.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-9eff154e275679aff481294211504cad + +info: + name: > + NEX-Forms <= 7.9.6 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89655e84-acb5-40f2-a22f-a483a1bb29df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-a82da444a73b50ac43a1369ce1b8722f.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-a82da444a73b50ac43a1369ce1b8722f.yaml new file mode 100644 index 0000000000..36699282f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-a82da444a73b50ac43a1369ce1b8722f.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-a82da444a73b50ac43a1369ce1b8722f + +info: + name: > + NEX-Forms – Ultimate Form Builder – Contact forms and much more < 3.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e88aa9e-6d1d-44ba-8d63-2f4d4161bc9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-bb95d05f96d844686568bca3576c4dd9.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-bb95d05f96d844686568bca3576c4dd9.yaml new file mode 100644 index 0000000000..6fe058f5eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-bb95d05f96d844686568bca3576c4dd9.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-bb95d05f96d844686568bca3576c4dd9 + +info: + name: > + NEX-Forms <= 7.8.7 Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70587bb9-6f76-4073-b5db-06ffda0194e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-c98999074aee70a52ec6540d435f9e75.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-c98999074aee70a52ec6540d435f9e75.yaml new file mode 100644 index 0000000000..e3bd693921 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-c98999074aee70a52ec6540d435f9e75.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-c98999074aee70a52ec6540d435f9e75 + +info: + name: > + NEX-Forms – Ultimate Form Builder <= 8.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9b45e9b-57a6-4bfd-b9e4-d07780370f02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-f0ac080b3744a919181119313b1bddf9.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-f0ac080b3744a919181119313b1bddf9.yaml new file mode 100644 index 0000000000..30190d30dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-f0ac080b3744a919181119313b1bddf9.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-f0ac080b3744a919181119313b1bddf9 + +info: + name: > + NEX-Forms – Ultimate Form Builder – Contact forms and much more <= 8.5.6 - Missing Authorization via set_starred() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53db0f72-3353-42bb-ad75-4c5aa32d7939?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-ff2527cc6b81652aecd5a77ac2a8b673.yaml b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-ff2527cc6b81652aecd5a77ac2a8b673.yaml new file mode 100644 index 0000000000..82f770ccea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nex-forms-express-wp-form-builder-ff2527cc6b81652aecd5a77ac2a8b673.yaml @@ -0,0 +1,58 @@ +id: nex-forms-express-wp-form-builder-ff2527cc6b81652aecd5a77ac2a8b673 + +info: + name: > + NEX-Forms <= 7.7.1 - Missing Authorization on Various AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01940eeb-b4a6-450d-b646-84f415ca92c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" + google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nex-forms-express-wp-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nex-forms-express-wp-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/next-order-coupon-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/next-order-coupon-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bf338e7123 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/next-order-coupon-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: next-order-coupon-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/next-order-coupon-woocommerce/" + google-query: inurl:"/wp-content/plugins/next-order-coupon-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,next-order-coupon-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/next-order-coupon-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "next-order-coupon-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/next-order-coupon-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/next-order-coupon-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..57bb455f21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/next-order-coupon-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: next-order-coupon-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/next-order-coupon-woocommerce/" + google-query: inurl:"/wp-content/plugins/next-order-coupon-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,next-order-coupon-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/next-order-coupon-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "next-order-coupon-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/next-page-cd42ea5f361eb592a86690da9944867b.yaml b/nuclei-templates/cve-less/plugins/next-page-cd42ea5f361eb592a86690da9944867b.yaml new file mode 100644 index 0000000000..7146dc790a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/next-page-cd42ea5f361eb592a86690da9944867b.yaml @@ -0,0 +1,58 @@ +id: next-page-cd42ea5f361eb592a86690da9944867b + +info: + name: > + Next Page <= 1.5.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c592887c-718c-46d7-8dc3-d337711471ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/next-page/" + google-query: inurl:"/wp-content/plugins/next-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,next-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/next-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "next-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextcellent-gallery-nextgen-legacy-5b2ed76d9224d230598bdf2cc0cffcbc.yaml b/nuclei-templates/cve-less/plugins/nextcellent-gallery-nextgen-legacy-5b2ed76d9224d230598bdf2cc0cffcbc.yaml new file mode 100644 index 0000000000..3cca83ec86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextcellent-gallery-nextgen-legacy-5b2ed76d9224d230598bdf2cc0cffcbc.yaml @@ -0,0 +1,58 @@ +id: nextcellent-gallery-nextgen-legacy-5b2ed76d9224d230598bdf2cc0cffcbc + +info: + name: > + NextCellent Gallery <= 1.9.35 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6286cda-c5b1-4923-bbf3-9f5b56973d23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextcellent-gallery-nextgen-legacy/" + google-query: inurl:"/wp-content/plugins/nextcellent-gallery-nextgen-legacy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextcellent-gallery-nextgen-legacy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextcellent-gallery-nextgen-legacy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextcellent-gallery-nextgen-legacy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextcellent-gallery-nextgen-legacy-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml b/nuclei-templates/cve-less/plugins/nextcellent-gallery-nextgen-legacy-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml new file mode 100644 index 0000000000..b9375f94ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextcellent-gallery-nextgen-legacy-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml @@ -0,0 +1,58 @@ +id: nextcellent-gallery-nextgen-legacy-9324556ad1df2ab2ecb9b1f7e086b9b6 + +info: + name: > + NextCellent Gallery < 1.9.18 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/472a98fe-9cce-4e9f-b353-ccc1389506fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextcellent-gallery-nextgen-legacy/" + google-query: inurl:"/wp-content/plugins/nextcellent-gallery-nextgen-legacy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextcellent-gallery-nextgen-legacy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextcellent-gallery-nextgen-legacy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextcellent-gallery-nextgen-legacy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextend-facebook-connect-00ecb873d9d341992e1bd58f78a3eb00.yaml b/nuclei-templates/cve-less/plugins/nextend-facebook-connect-00ecb873d9d341992e1bd58f78a3eb00.yaml new file mode 100644 index 0000000000..833603da4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextend-facebook-connect-00ecb873d9d341992e1bd58f78a3eb00.yaml @@ -0,0 +1,58 @@ +id: nextend-facebook-connect-00ecb873d9d341992e1bd58f78a3eb00 + +info: + name: > + Nextend Social Login and Register <= 1.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fe97e7a-5a4e-43e7-b4f3-81786e9ee3dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextend-facebook-connect/" + google-query: inurl:"/wp-content/plugins/nextend-facebook-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextend-facebook-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextend-facebook-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextend-facebook-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextend-facebook-connect-affff16d41b08985367338035f67daba.yaml b/nuclei-templates/cve-less/plugins/nextend-facebook-connect-affff16d41b08985367338035f67daba.yaml new file mode 100644 index 0000000000..30a26fe0d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextend-facebook-connect-affff16d41b08985367338035f67daba.yaml @@ -0,0 +1,58 @@ +id: nextend-facebook-connect-affff16d41b08985367338035f67daba + +info: + name: > + Nextend Social Login and Register <= 1.5.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2111df14-63a3-4e3c-87b8-d0e71812d32c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextend-facebook-connect/" + google-query: inurl:"/wp-content/plugins/nextend-facebook-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextend-facebook-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextend-facebook-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextend-facebook-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextend-facebook-connect-b5ffaf80d661d564c9b660398c6daa12.yaml b/nuclei-templates/cve-less/plugins/nextend-facebook-connect-b5ffaf80d661d564c9b660398c6daa12.yaml new file mode 100644 index 0000000000..4632bef289 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextend-facebook-connect-b5ffaf80d661d564c9b660398c6daa12.yaml @@ -0,0 +1,58 @@ +id: nextend-facebook-connect-b5ffaf80d661d564c9b660398c6daa12 + +info: + name: > + Nextend Social Login and Register <= 3.1.12 - Reflected Self-Based Cross-Site Scripting via error_description + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bad1d0d-3817-4c7f-a012-5a85b577781e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextend-facebook-connect/" + google-query: inurl:"/wp-content/plugins/nextend-facebook-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextend-facebook-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextend-facebook-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextend-facebook-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextend-facebook-connect-ca36ed6adf848cc827e64a29f8ea5b4f.yaml b/nuclei-templates/cve-less/plugins/nextend-facebook-connect-ca36ed6adf848cc827e64a29f8ea5b4f.yaml new file mode 100644 index 0000000000..bb0a6198c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextend-facebook-connect-ca36ed6adf848cc827e64a29f8ea5b4f.yaml @@ -0,0 +1,58 @@ +id: nextend-facebook-connect-ca36ed6adf848cc827e64a29f8ea5b4f + +info: + name: > + Nextend Facebook Connect <= 1.5.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b834a3c-6af0-48fd-aa13-985d226b546d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextend-facebook-connect/" + google-query: inurl:"/wp-content/plugins/nextend-facebook-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextend-facebook-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextend-facebook-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextend-facebook-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextend-twitter-connect-9813a1d6a9d1cff77f894bb801d07459.yaml b/nuclei-templates/cve-less/plugins/nextend-twitter-connect-9813a1d6a9d1cff77f894bb801d07459.yaml new file mode 100644 index 0000000000..89202406d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextend-twitter-connect-9813a1d6a9d1cff77f894bb801d07459.yaml @@ -0,0 +1,58 @@ +id: nextend-twitter-connect-9813a1d6a9d1cff77f894bb801d07459 + +info: + name: > + Nextend Twitter Connect <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b0336d7-1c85-4379-80db-19b478ba5471?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextend-twitter-connect/" + google-query: inurl:"/wp-content/plugins/nextend-twitter-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextend-twitter-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextend-twitter-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextend-twitter-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nexter-extension-289b4ce42c5317d66bb530e021b79a80.yaml b/nuclei-templates/cve-less/plugins/nexter-extension-289b4ce42c5317d66bb530e021b79a80.yaml new file mode 100644 index 0000000000..e75bed2d89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nexter-extension-289b4ce42c5317d66bb530e021b79a80.yaml @@ -0,0 +1,58 @@ +id: nexter-extension-289b4ce42c5317d66bb530e021b79a80 + +info: + name: > + Nexter Extension <= 2.0.3 - Reflected Cross-Site Scripting via post and post_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f4dc917-028c-451a-9b32-26ef2c488850?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nexter-extension/" + google-query: inurl:"/wp-content/plugins/nexter-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nexter-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nexter-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexter-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nexter-extension-45f2df14510cef20714306c6b2b6f810.yaml b/nuclei-templates/cve-less/plugins/nexter-extension-45f2df14510cef20714306c6b2b6f810.yaml new file mode 100644 index 0000000000..b6c336cb4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nexter-extension-45f2df14510cef20714306c6b2b6f810.yaml @@ -0,0 +1,58 @@ +id: nexter-extension-45f2df14510cef20714306c6b2b6f810 + +info: + name: > + Nexter Extension <= 2.0.3 - Authenticated(Editor+) Remote Code Execution via metabox + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/188c4417-962a-4b28-b215-1c567b39ba7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nexter-extension/" + google-query: inurl:"/wp-content/plugins/nexter-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nexter-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nexter-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexter-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-cu3er-gallery-cac97ebd7382586a7c73dce4ae126172.yaml b/nuclei-templates/cve-less/plugins/nextgen-cu3er-gallery-cac97ebd7382586a7c73dce4ae126172.yaml new file mode 100644 index 0000000000..39cb0ce8d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-cu3er-gallery-cac97ebd7382586a7c73dce4ae126172.yaml @@ -0,0 +1,58 @@ +id: nextgen-cu3er-gallery-cac97ebd7382586a7c73dce4ae126172 + +info: + name: > + NextGen Cu3er Gallery <= 0.1 - Multiple Full Path Disclosures + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c408a27-7ed9-4106-8b65-9169ecc0e6f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-cu3er-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-cu3er-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-cu3er-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-cu3er-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-cu3er-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-0852d9b8897d185217e138aaac4e2439.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-0852d9b8897d185217e138aaac4e2439.yaml new file mode 100644 index 0000000000..f7d735a48a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-0852d9b8897d185217e138aaac4e2439.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-0852d9b8897d185217e138aaac4e2439 + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 1.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22bf5b65-8ec4-477c-a6bd-c90b99f560a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-13599838064c197e9952281d09390ec7.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-13599838064c197e9952281d09390ec7.yaml new file mode 100644 index 0000000000..a03f80ca88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-13599838064c197e9952281d09390ec7.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-13599838064c197e9952281d09390ec7 + +info: + name: > + Nextgen Gallery <= 3.59 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6c01d91-a912-4826-97eb-fd77368ae117?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml new file mode 100644 index 0000000000..583f9d1f5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-1c54e12a9145a5f1f1d234c85ecbc8fc + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 3.4.7 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d7feea5-965f-4a07-90f8-39ccdba7b50f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-2964883e1950fef80d801f06f14eb92b.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-2964883e1950fef80d801f06f14eb92b.yaml new file mode 100644 index 0000000000..16ec934193 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-2964883e1950fef80d801f06f14eb92b.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-2964883e1950fef80d801f06f14eb92b + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 3.59 - Missing Authorization to Unauthenticated Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75f87f99-9f0d-46c2-a6f1-3c1ea0176303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-322df2ac71ce300f084e0fab2894de3c.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-322df2ac71ce300f084e0fab2894de3c.yaml new file mode 100644 index 0000000000..f24847511f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-322df2ac71ce300f084e0fab2894de3c.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-322df2ac71ce300f084e0fab2894de3c + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery 1.9.10 - 1.9.11 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21cf5a39-831b-4423-b901-98bf15416fc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.9.10', '<= 1.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-33f121d665e87151fe5985afb89d484f.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-33f121d665e87151fe5985afb89d484f.yaml new file mode 100644 index 0000000000..0358e9f591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-33f121d665e87151fe5985afb89d484f.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-33f121d665e87151fe5985afb89d484f + +info: + name: > + NextGen Gallery <= 3.1.5 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a67eb1fc-4762-4bdc-b0a0-c043c36659d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-39cf49efc2cfacf8bc667751cb10cb94.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-39cf49efc2cfacf8bc667751cb10cb94.yaml new file mode 100644 index 0000000000..2925d7fe58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-39cf49efc2cfacf8bc667751cb10cb94.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-39cf49efc2cfacf8bc667751cb10cb94 + +info: + name: > + NextGen Gallery <= 2.1.77 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78fedd41-f0ab-4148-a798-88de62f27008?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.77') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-41d56c1ae043586e69a9cbdf8e53ac0a.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-41d56c1ae043586e69a9cbdf8e53ac0a.yaml new file mode 100644 index 0000000000..b179e05a2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-41d56c1ae043586e69a9cbdf8e53ac0a.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-41d56c1ae043586e69a9cbdf8e53ac0a + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 2.1.15 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10d861c2-8ebf-4ba8-a493-0ab3aa43aa76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml new file mode 100644 index 0000000000..89d4be3e18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-4a8d217f64c4cdfb18ee166f8cd3bec7 + +info: + name: > + NextGen Gallery <= 2.1.56 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0de8ff3-ac03-4640-829d-66a8496aa8aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-519e702e57b853557437ca261b9c8d23.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-519e702e57b853557437ca261b9c8d23.yaml new file mode 100644 index 0000000000..090f6c3a67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-519e702e57b853557437ca261b9c8d23.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-519e702e57b853557437ca261b9c8d23 + +info: + name: > + NextGen Gallery <= 2.1.10 - Unrestricted File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9622c839-a1dd-4633-8a9c-cec41d1041ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-5eb51111eaa90d94b47d1fce5457ff77.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-5eb51111eaa90d94b47d1fce5457ff77.yaml new file mode 100644 index 0000000000..aed382ec3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-5eb51111eaa90d94b47d1fce5457ff77.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-5eb51111eaa90d94b47d1fce5457ff77 + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery < 2.0.77.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d9de3f-5f49-413d-bee6-a4f9ebcf2799?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.77.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-75f34276d9b10d0195d546eabefff833.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-75f34276d9b10d0195d546eabefff833.yaml new file mode 100644 index 0000000000..87ac7106af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-75f34276d9b10d0195d546eabefff833.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-75f34276d9b10d0195d546eabefff833 + +info: + name: > + NextGEN Gallery <= 3.37 - Authenticated (Admininistrator+) Arbitrary File Read and Deletion in gallery_edit + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a15e917f-f46a-4006-a4cb-3d55331ccb5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-7e41774188b9f915d9ca937dad9a03c5.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-7e41774188b9f915d9ca937dad9a03c5.yaml new file mode 100644 index 0000000000..2bc26777eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-7e41774188b9f915d9ca937dad9a03c5.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-7e41774188b9f915d9ca937dad9a03c5 + +info: + name: > + NextGEN Gallery <= 3.37 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3354b925-2e4a-4ee5-b436-2c1a502b1725?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-7f9e6cd367e17f5d58e3f74e4dd23702.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-7f9e6cd367e17f5d58e3f74e4dd23702.yaml new file mode 100644 index 0000000000..56aafe7441 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-7f9e6cd367e17f5d58e3f74e4dd23702.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-7f9e6cd367e17f5d58e3f74e4dd23702 + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 3.38 - Authenticated (Admin+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77db423c-af60-4539-8e3d-fde997741617?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-862a8430206366dd5f1306f54a1da83a.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-862a8430206366dd5f1306f54a1da83a.yaml new file mode 100644 index 0000000000..4058d033ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-862a8430206366dd5f1306f54a1da83a.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-862a8430206366dd5f1306f54a1da83a + +info: + name: > + NextGen Gallery <= 2.1.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7447fc39-a517-4ba0-93d6-381a6eeb5b7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-8aa932823fef6a8561cb1cce32b099e9.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-8aa932823fef6a8561cb1cce32b099e9.yaml new file mode 100644 index 0000000000..cec26bad32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-8aa932823fef6a8561cb1cce32b099e9.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-8aa932823fef6a8561cb1cce32b099e9 + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 2.2.46 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b09bf42-a85d-4a5b-9acc-609e0a5d7748?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-8f740f4461f86da187ea01d0cc38bbab.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-8f740f4461f86da187ea01d0cc38bbab.yaml new file mode 100644 index 0000000000..746d7ae8b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-8f740f4461f86da187ea01d0cc38bbab.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-8f740f4461f86da187ea01d0cc38bbab + +info: + name: > + NextGEN Gallery <= 3.28 - Cross-Site Request Forgery leading to Post Thumbnail Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a841456c-2a01-4caf-bebe-e018b92697d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-91308ce2ef066c70ca278e2e191864f4.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-91308ce2ef066c70ca278e2e191864f4.yaml new file mode 100644 index 0000000000..1f4ba27073 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-91308ce2ef066c70ca278e2e191864f4.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-91308ce2ef066c70ca278e2e191864f4 + +info: + name: > + NextGEN Gallery <= 2.1.56 - Authenticated Local File Inclusion & SQL injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3b6c3ab-529d-44f2-b901-ea720cbc3fbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-9c97398a1c0f455131b61618edca56df.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-9c97398a1c0f455131b61618edca56df.yaml new file mode 100644 index 0000000000..736df7a6b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-9c97398a1c0f455131b61618edca56df.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-9c97398a1c0f455131b61618edca56df + +info: + name: > + NextGen Gallery <= 2.0 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb855743-1d08-4e21-a23c-a4ffba615f57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-ac32959f74b06f08f41c35d9de9637f2.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-ac32959f74b06f08f41c35d9de9637f2.yaml new file mode 100644 index 0000000000..dbac38b98f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-ac32959f74b06f08f41c35d9de9637f2.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-ac32959f74b06f08f41c35d9de9637f2 + +info: + name: > + NextGEN Gallery <= 2.2.44 - Cross-Site Scripting via image alt and title text + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/674f75d7-83de-4d0b-80f2-ee83dd474728?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-b4ed5bad800bb63784fe65e3822d9b92.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-b4ed5bad800bb63784fe65e3822d9b92.yaml new file mode 100644 index 0000000000..bbacf3313d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-b4ed5bad800bb63784fe65e3822d9b92.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-b4ed5bad800bb63784fe65e3822d9b92 + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery < 2.0.77.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15c11a0e-6185-4072-88c6-303090adf898?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.77.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-b6ee1e856ee11834d66789e451bea084.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-b6ee1e856ee11834d66789e451bea084.yaml new file mode 100644 index 0000000000..1bb2dbc9e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-b6ee1e856ee11834d66789e451bea084.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-b6ee1e856ee11834d66789e451bea084 + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 1.9.12 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41af6441-bc1d-4210-92f3-4c765fda6df9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-b7c464860f475ded8d2ed3cd59a1ad52.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-b7c464860f475ded8d2ed3cd59a1ad52.yaml new file mode 100644 index 0000000000..25404f54f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-b7c464860f475ded8d2ed3cd59a1ad52.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-b7c464860f475ded8d2ed3cd59a1ad52 + +info: + name: > + NextGen Gallery <= 1.9.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ecf04a7-1f3c-41d6-a86b-282f020de088?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml new file mode 100644 index 0000000000..bd85f5e443 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-c2a9c94ee32f4cfd4a8e1474373c16d3 + +info: + name: > + NextGen Gallery <= 2.1.10 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/255cdf64-93cd-434c-9a3c-3b8e49593ffe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-c41810e93c0c7c558cec6a9a4900b3a7.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-c41810e93c0c7c558cec6a9a4900b3a7.yaml new file mode 100644 index 0000000000..2a66fcae51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-c41810e93c0c7c558cec6a9a4900b3a7.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-c41810e93c0c7c558cec6a9a4900b3a7 + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 3.4.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fa45912-3d26-4284-8957-5977aaf36a03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-ca565e6cb88aa754dd01e131a2eefadc.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-ca565e6cb88aa754dd01e131a2eefadc.yaml new file mode 100644 index 0000000000..b52d37359e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-ca565e6cb88aa754dd01e131a2eefadc.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-ca565e6cb88aa754dd01e131a2eefadc + +info: + name: > + WordPress Gallery Plugin – NextGEN Gallery <= 3.38 - Authenticated (Admin+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edaec73f-25b5-4ace-afef-844eb4143bf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..a41471d521 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-d5553776b8e5331d8ec0787313ee2d60.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-d5553776b8e5331d8ec0787313ee2d60.yaml new file mode 100644 index 0000000000..36c5d415dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-d5553776b8e5331d8ec0787313ee2d60.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-d5553776b8e5331d8ec0787313ee2d60 + +info: + name: > + NextGen Gallery <= 2.0.65 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47fb0513-bebe-4e09-9402-d7e174ee92ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-d6113147a445ba7f16a522f439b96bee.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-d6113147a445ba7f16a522f439b96bee.yaml new file mode 100644 index 0000000000..5d3b530ea4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-d6113147a445ba7f16a522f439b96bee.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-d6113147a445ba7f16a522f439b96bee + +info: + name: > + NextGEN Gallery <= 3.2.10 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c58d5a57-6b87-4a39-b995-c86fbc779565?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-f15eaf3968f794eee3d8d893185e8a4d.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-f15eaf3968f794eee3d8d893185e8a4d.yaml new file mode 100644 index 0000000000..1dced584e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-f15eaf3968f794eee3d8d893185e8a4d.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-f15eaf3968f794eee3d8d893185e8a4d + +info: + name: > + NextGen Gallery <= 2.1.7 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50589b41-cc2b-4ffa-ab63-509fb9d61be2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-pro-f8b3e9ff45c2c72c8ffae6c7215d920c.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-pro-f8b3e9ff45c2c72c8ffae6c7215d920c.yaml new file mode 100644 index 0000000000..225081aae6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-pro-f8b3e9ff45c2c72c8ffae6c7215d920c.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-pro-f8b3e9ff45c2c72c8ffae6c7215d920c + +info: + name: > + NextGen Gallery Pro <= 3.1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d599ed8-ba30-4f12-83f5-be452bc1ae35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery-pro/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-sell-photo-b45eecf36500371522a7a91600b79df4.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-sell-photo-b45eecf36500371522a7a91600b79df4.yaml new file mode 100644 index 0000000000..4367446843 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-sell-photo-b45eecf36500371522a7a91600b79df4.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-sell-photo-b45eecf36500371522a7a91600b79df4 + +info: + name: > + NextGEN Gallery Sell Photo <= 1.0.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd3d9ce8-0ebf-490e-8c3a-73883638c3eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery-sell-photo/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery-sell-photo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery-sell-photo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery-sell-photo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery-sell-photo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-gallery-voting-c141b8b973ee71335be586680efd9177.yaml b/nuclei-templates/cve-less/plugins/nextgen-gallery-voting-c141b8b973ee71335be586680efd9177.yaml new file mode 100644 index 0000000000..f2e95a2e3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-gallery-voting-c141b8b973ee71335be586680efd9177.yaml @@ -0,0 +1,58 @@ +id: nextgen-gallery-voting-c141b8b973ee71335be586680efd9177 + +info: + name: > + NextGEN Gallery Voting <= 2.7.5 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25f277f3-8b94-4ea2-ba84-885257690b18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-gallery-voting/" + google-query: inurl:"/wp-content/plugins/nextgen-gallery-voting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-gallery-voting,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-gallery-voting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-gallery-voting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nextgen-smooth-gallery-fd1e125ffdeff47afb4a084c2351b847.yaml b/nuclei-templates/cve-less/plugins/nextgen-smooth-gallery-fd1e125ffdeff47afb4a084c2351b847.yaml new file mode 100644 index 0000000000..a54a653bc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nextgen-smooth-gallery-fd1e125ffdeff47afb4a084c2351b847.yaml @@ -0,0 +1,58 @@ +id: nextgen-smooth-gallery-fd1e125ffdeff47afb4a084c2351b847 + +info: + name: > + NextGEN Smooth Gallery <= 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09870d90-80b1-4650-9b00-0dc005702aee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nextgen-smooth-gallery/" + google-query: inurl:"/wp-content/plugins/nextgen-smooth-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nextgen-smooth-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nextgen-smooth-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nextgen-smooth-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nexus-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/nexus-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..29a5e8b039 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nexus-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: nexus-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nexus/" + google-query: inurl:"/wp-content/plugins/nexus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nexus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nexus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nexus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/nexus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..b5444d16c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nexus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: nexus-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nexus/" + google-query: inurl:"/wp-content/plugins/nexus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nexus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nexus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ni-purchase-orderpo-for-woocommerce-ec4aba644c290d0da3b6df79cb8b20be.yaml b/nuclei-templates/cve-less/plugins/ni-purchase-orderpo-for-woocommerce-ec4aba644c290d0da3b6df79cb8b20be.yaml new file mode 100644 index 0000000000..39f0f71288 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ni-purchase-orderpo-for-woocommerce-ec4aba644c290d0da3b6df79cb8b20be.yaml @@ -0,0 +1,58 @@ +id: ni-purchase-orderpo-for-woocommerce-ec4aba644c290d0da3b6df79cb8b20be + +info: + name: > + Ni Purchase Order(PO) For WooCommerce <= 1.2.1 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67817d5a-2d7a-4b96-9c04-cd1ad9c90b29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ni-purchase-orderpo-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/ni-purchase-orderpo-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ni-purchase-orderpo-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ni-purchase-orderpo-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ni-purchase-orderpo-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ni-woocommerce-custom-order-status-7561b8c1f99227b7381d59264fa6815d.yaml b/nuclei-templates/cve-less/plugins/ni-woocommerce-custom-order-status-7561b8c1f99227b7381d59264fa6815d.yaml new file mode 100644 index 0000000000..cf5196163b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ni-woocommerce-custom-order-status-7561b8c1f99227b7381d59264fa6815d.yaml @@ -0,0 +1,58 @@ +id: ni-woocommerce-custom-order-status-7561b8c1f99227b7381d59264fa6815d + +info: + name: > + Ni WooCommerce Custom Order Status <= 1.9.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f28826e7-913e-4a88-a48a-3b8dd5623d39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ni-woocommerce-custom-order-status/" + google-query: inurl:"/wp-content/plugins/ni-woocommerce-custom-order-status/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ni-woocommerce-custom-order-status,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ni-woocommerce-custom-order-status/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ni-woocommerce-custom-order-status" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ni-woocommerce-sales-report-82dd4087673f4e5c2cbc42c8ad11ddcf.yaml b/nuclei-templates/cve-less/plugins/ni-woocommerce-sales-report-82dd4087673f4e5c2cbc42c8ad11ddcf.yaml new file mode 100644 index 0000000000..119d7345d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ni-woocommerce-sales-report-82dd4087673f4e5c2cbc42c8ad11ddcf.yaml @@ -0,0 +1,58 @@ +id: ni-woocommerce-sales-report-82dd4087673f4e5c2cbc42c8ad11ddcf + +info: + name: > + Ni WooCommerce Sales Report <= 3.7.3 - Missing Authorization via ajax_sales_order + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b509887-6d32-4e7f-bdff-fd4f6c76f6f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ni-woocommerce-sales-report/" + google-query: inurl:"/wp-content/plugins/ni-woocommerce-sales-report/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ni-woocommerce-sales-report,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ni-woocommerce-sales-report/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ni-woocommerce-sales-report" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nice-paypal-button-lite-0471fd3ab900bd53f968b61b8e07cd67.yaml b/nuclei-templates/cve-less/plugins/nice-paypal-button-lite-0471fd3ab900bd53f968b61b8e07cd67.yaml new file mode 100644 index 0000000000..15724c0a60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nice-paypal-button-lite-0471fd3ab900bd53f968b61b8e07cd67.yaml @@ -0,0 +1,58 @@ +id: nice-paypal-button-lite-0471fd3ab900bd53f968b61b8e07cd67 + +info: + name: > + Nice PayPal Button Lite <= 1.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0ca76a3-143c-4e86-a6d7-e1d3b3d7b378?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nice-paypal-button-lite/" + google-query: inurl:"/wp-content/plugins/nice-paypal-button-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nice-paypal-button-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nice-paypal-button-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nice-paypal-button-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nichetable-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/nichetable-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2cd3a7cead --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nichetable-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: nichetable-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nichetable/" + google-query: inurl:"/wp-content/plugins/nichetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nichetable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nichetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nichetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nifty-coming-soon-and-under-construction-page-0606b1934fa15f28fbfa63443f860808.yaml b/nuclei-templates/cve-less/plugins/nifty-coming-soon-and-under-construction-page-0606b1934fa15f28fbfa63443f860808.yaml new file mode 100644 index 0000000000..4011fb9eed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nifty-coming-soon-and-under-construction-page-0606b1934fa15f28fbfa63443f860808.yaml @@ -0,0 +1,58 @@ +id: nifty-coming-soon-and-under-construction-page-0606b1934fa15f28fbfa63443f860808 + +info: + name: > + Coming Soon & Maintenance Mode Page <= 1.57 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d283527a-a955-4f82-9827-81a71158d8e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nifty-coming-soon-and-under-construction-page/" + google-query: inurl:"/wp-content/plugins/nifty-coming-soon-and-under-construction-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nifty-coming-soon-and-under-construction-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nifty-coming-soon-and-under-construction-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nifty-coming-soon-and-under-construction-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nifty-coming-soon-and-under-construction-page-473adc971897213907d43bcafc37522c.yaml b/nuclei-templates/cve-less/plugins/nifty-coming-soon-and-under-construction-page-473adc971897213907d43bcafc37522c.yaml new file mode 100644 index 0000000000..4d29355a87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nifty-coming-soon-and-under-construction-page-473adc971897213907d43bcafc37522c.yaml @@ -0,0 +1,58 @@ +id: nifty-coming-soon-and-under-construction-page-473adc971897213907d43bcafc37522c + +info: + name: > + Coming Soon & Maintenance Mode Page <= 1.57 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59278214-b0ce-44bf-8d8f-265c5c50006a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nifty-coming-soon-and-under-construction-page/" + google-query: inurl:"/wp-content/plugins/nifty-coming-soon-and-under-construction-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nifty-coming-soon-and-under-construction-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nifty-coming-soon-and-under-construction-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nifty-coming-soon-and-under-construction-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/night-mode-d2a99368cddd63664c69600c9b7c92a3.yaml b/nuclei-templates/cve-less/plugins/night-mode-d2a99368cddd63664c69600c9b7c92a3.yaml new file mode 100644 index 0000000000..381921557d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/night-mode-d2a99368cddd63664c69600c9b7c92a3.yaml @@ -0,0 +1,58 @@ +id: night-mode-d2a99368cddd63664c69600c9b7c92a3 + +info: + name: > + Night Mode <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1666371-9401-4b62-b44e-abc7fb4c6138?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/night-mode/" + google-query: inurl:"/wp-content/plugins/night-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,night-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/night-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "night-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nimble-builder-89f45b00f9f74bc6d93e777cef76ce78.yaml b/nuclei-templates/cve-less/plugins/nimble-builder-89f45b00f9f74bc6d93e777cef76ce78.yaml new file mode 100644 index 0000000000..406e1c9d28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nimble-builder-89f45b00f9f74bc6d93e777cef76ce78.yaml @@ -0,0 +1,58 @@ +id: nimble-builder-89f45b00f9f74bc6d93e777cef76ce78 + +info: + name: > + Nimble Page Builder <= 3.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/255a50f0-0213-4de5-92f1-d71dbb5caeff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nimble-builder/" + google-query: inurl:"/wp-content/plugins/nimble-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nimble-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nimble-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nimble-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-07e79cfbaad5cc6feea3f9163412cb03.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-07e79cfbaad5cc6feea3f9163412cb03.yaml new file mode 100644 index 0000000000..487772878d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-07e79cfbaad5cc6feea3f9163412cb03.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-07e79cfbaad5cc6feea3f9163412cb03 + +info: + name: > + Ninja Forms Contact Form <= 3.2.14 - Parameter Tampering + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/042f7090-2eab-44d2-82b2-ecabdb1d3f99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-0b4ef9eb693a7e87ce6cfca4623c180a.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-0b4ef9eb693a7e87ce6cfca4623c180a.yaml new file mode 100644 index 0000000000..90007b80e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-0b4ef9eb693a7e87ce6cfca4623c180a.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-0b4ef9eb693a7e87ce6cfca4623c180a + +info: + name: > + Ninja Forms Contact Form <= 3.4.22 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d292c4ff-123e-4aa0-8ce8-d2bb2f3c6e02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-0c6f99e140df7ca1c5f4c6d0e22095b6.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-0c6f99e140df7ca1c5f4c6d0e22095b6.yaml new file mode 100644 index 0000000000..a8cfd32bad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-0c6f99e140df7ca1c5f4c6d0e22095b6.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-0c6f99e140df7ca1c5f4c6d0e22095b6 + +info: + name: > + Ninja Forms Contact Form <= 2.9.51 - Multiple Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e01532bb-3011-4efe-b072-d0df5708f8e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-137fb939b7f924b2e394225c2ffc4e4d.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-137fb939b7f924b2e394225c2ffc4e4d.yaml new file mode 100644 index 0000000000..81768f4e53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-137fb939b7f924b2e394225c2ffc4e4d.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-137fb939b7f924b2e394225c2ffc4e4d + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.0.31 - Arbitrary Wordpress Shortcode Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ebaf25-1bd3-4770-b4bd-30de83b31add?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-176c16716215a971a6536fe6953bdcc3.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-176c16716215a971a6536fe6953bdcc3.yaml new file mode 100644 index 0000000000..fc67467b5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-176c16716215a971a6536fe6953bdcc3.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-176c16716215a971a6536fe6953bdcc3 + +info: + name: > + Ninja Forms <= 2.9.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dba01dc2-c73b-461a-bcbd-86daa0bf0ad0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-18aefdabee9873494c7322bd5c01157e.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-18aefdabee9873494c7322bd5c01157e.yaml new file mode 100644 index 0000000000..f704fddc0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-18aefdabee9873494c7322bd5c01157e.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-18aefdabee9873494c7322bd5c01157e + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.3.13 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa735320-f7fe-4e51-9f9a-f4c8f3ddc2e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-23c6df4af51eff238970a0c85f41de19.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-23c6df4af51eff238970a0c85f41de19.yaml new file mode 100644 index 0000000000..5e03c2cf5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-23c6df4af51eff238970a0c85f41de19.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-23c6df4af51eff238970a0c85f41de19 + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.8.0 - Cross-Site Request Forgery to Publicly Accessible Form Submission Export + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebfc9f5-abb7-47bc-bd38-f60df1cccb5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-2955aefdf1cefad709d8b720d6db9ca9.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-2955aefdf1cefad709d8b720d6db9ca9.yaml new file mode 100644 index 0000000000..c6ea870e5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-2955aefdf1cefad709d8b720d6db9ca9.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-2955aefdf1cefad709d8b720d6db9ca9 + +info: + name: > + Ninja Forms Contact Form <= 3.6.9 - Cross-Site Scripting via field label + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eaf0d324-bf2c-4da7-b2ab-f53f7b7881f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-2cbe4a3f03e2199a537c6f7a9b091533.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-2cbe4a3f03e2199a537c6f7a9b091533.yaml new file mode 100644 index 0000000000..4e468262b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-2cbe4a3f03e2199a537c6f7a9b091533.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-2cbe4a3f03e2199a537c6f7a9b091533 + +info: + name: > + Ninja Forms <= 3.6.25 - Reflected Cross-Site Scripting via 'data' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1460dc44-dd64-4fd6-952b-1f5d4285bfa4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-3c9dac2ddd3bec2b9b5eb5b21c8ec91e.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-3c9dac2ddd3bec2b9b5eb5b21c8ec91e.yaml new file mode 100644 index 0000000000..50fa092439 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-3c9dac2ddd3bec2b9b5eb5b21c8ec91e.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-3c9dac2ddd3bec2b9b5eb5b21c8ec91e + +info: + name: > + Ninja Forms <= 3.6.25 - Authenticated (Administrator+) Stored HTML Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3d795f5-c79a-4615-be1f-120a6ffd663d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-3dacf8e00581b97f923ad6f17ff4ac46.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-3dacf8e00581b97f923ad6f17ff4ac46.yaml new file mode 100644 index 0000000000..32fdf15073 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-3dacf8e00581b97f923ad6f17ff4ac46.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-3dacf8e00581b97f923ad6f17ff4ac46 + +info: + name: > + Ninja Forms Contact Form <= 2.9.27 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39b6a1c7-2f8a-49e9-8807-a53a25524018?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-458e05b1bcf27643dfd06ce9324ce2c4.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-458e05b1bcf27643dfd06ce9324ce2c4.yaml new file mode 100644 index 0000000000..cd2a2fd07f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-458e05b1bcf27643dfd06ce9324ce2c4.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-458e05b1bcf27643dfd06ce9324ce2c4 + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.6.10 - Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df46b3d5-a433-47b5-99b8-117591f7dd16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.6', '<= 3.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-4bf361aef2d1a7792461202b02e3df2e.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-4bf361aef2d1a7792461202b02e3df2e.yaml new file mode 100644 index 0000000000..6281bf6b21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-4bf361aef2d1a7792461202b02e3df2e.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-4bf361aef2d1a7792461202b02e3df2e + +info: + name: > + Ninja Forms <= 3.6.25 - Denial of Service via Large Form Submissions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/952a3e52-4e23-4bc4-92d3-e15ae2f3d28b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-55f90d534a47161e6795864c30da55c2.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-55f90d534a47161e6795864c30da55c2.yaml new file mode 100644 index 0000000000..888f73749f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-55f90d534a47161e6795864c30da55c2.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-55f90d534a47161e6795864c30da55c2 + +info: + name: > + Ninja Forms Contact Form 2.9.36 - 2.9.42 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f36a924-6a68-40ff-bf1a-9ebcad1c2fc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.9.36', '<= 2.9.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-561eff22a0971cf174004fe156be75cb.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-561eff22a0971cf174004fe156be75cb.yaml new file mode 100644 index 0000000000..c365b98156 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-561eff22a0971cf174004fe156be75cb.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-561eff22a0971cf174004fe156be75cb + +info: + name: > + Ninja Forms Contact Form <= 3.3.19 - Authenticated Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/221f9cbb-7988-4671-8f14-da3e63c280e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-57cd30237a115f155e6a16a851952284.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-57cd30237a115f155e6a16a851952284.yaml new file mode 100644 index 0000000000..1d4ba43814 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-57cd30237a115f155e6a16a851952284.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-57cd30237a115f155e6a16a851952284 + +info: + name: > + Ninja Forms – The Contact Form Builder That Grows With You <= 3.8.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a714b35e-776d-42f4-bb7c-7865bf2b7637?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml new file mode 100644 index 0000000000..7b24c6b4f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-5f51f32d184bdb8a5475d2d0cf4a68e5 + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.4.27 - Cross-Site Request Forgery to Plugin Installation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdba439d-90ee-413c-842d-19704b08c33e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-624315d392127da9cdbb25a9ce0695f6.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-624315d392127da9cdbb25a9ce0695f6.yaml new file mode 100644 index 0000000000..eea4fdbe8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-624315d392127da9cdbb25a9ce0695f6.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-624315d392127da9cdbb25a9ce0695f6 + +info: + name: > + Ninja Forms Contact Form <= 2.9.55.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89a44d42-a110-4f55-ad27-2be4ccb41a16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.55.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-6eed35694a75496bc23819374091960c.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-6eed35694a75496bc23819374091960c.yaml new file mode 100644 index 0000000000..3847f51a54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-6eed35694a75496bc23819374091960c.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-6eed35694a75496bc23819374091960c + +info: + name: > + Ninja Forms Contact Form <= 3.7.1 - Unauthenticated Second Order SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cb73d5d-ca4a-4103-866d-f7bb369a8ce4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-706995907d69bd14e09ce77802032800.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-706995907d69bd14e09ce77802032800.yaml new file mode 100644 index 0000000000..a629b21a47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-706995907d69bd14e09ce77802032800.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-706995907d69bd14e09ce77802032800 + +info: + name: > + Ninja Forms <= 3.6.25 - Missing Authorization to Form Submission Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7befdf6-07d7-42c9-876a-abb8f8f9c3df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-707e5bb3cb201f78de35f00133c00922.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-707e5bb3cb201f78de35f00133c00922.yaml new file mode 100644 index 0000000000..29b00d4491 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-707e5bb3cb201f78de35f00133c00922.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-707e5bb3cb201f78de35f00133c00922 + +info: + name: > + Ninja Forms Contact Form <= 3.6.9 - Authenticated (Admin+) Cross-Site Scripting via label + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38d7c79f-a4a2-447d-88a2-ad75b53ac8bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-71b7f03c0d03bb060a04690fb6bef364.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-71b7f03c0d03bb060a04690fb6bef364.yaml new file mode 100644 index 0000000000..94365f1a18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-71b7f03c0d03bb060a04690fb6bef364.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-71b7f03c0d03bb060a04690fb6bef364 + +info: + name: > + Ninja Forms Contact Form <= 3.6.21 - Reflected Cross-Site Scripting via 'title' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf4e9b41-20e8-4dba-a51c-6e8f09232ffb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-740df732c021f2878fae481d2ff89873.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-740df732c021f2878fae481d2ff89873.yaml new file mode 100644 index 0000000000..aeaa3a69b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-740df732c021f2878fae481d2ff89873.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-740df732c021f2878fae481d2ff89873 + +info: + name: > + Ninja Forms <= 3.6.25 - Missing Authorization to Contributor+ Form Submission Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6551eea6-1059-4caa-876c-3d08083130f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-74be7f504d2131ca6cf13b47a8275858.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-74be7f504d2131ca6cf13b47a8275858.yaml new file mode 100644 index 0000000000..3ea7fe5aa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-74be7f504d2131ca6cf13b47a8275858.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-74be7f504d2131ca6cf13b47a8275858 + +info: + name: > + Ninja Forms Contact Form <= 3.4.24.1 - Cross-Site Request Forgery leading to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d97df193-28ed-4961-9d71-00098c0bec45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.24.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-7a3eb0e4a2da32f4626463054bad7fe1.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-7a3eb0e4a2da32f4626463054bad7fe1.yaml new file mode 100644 index 0000000000..59ff9573b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-7a3eb0e4a2da32f4626463054bad7fe1.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-7a3eb0e4a2da32f4626463054bad7fe1 + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.4.27.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c35efa26-9400-47f1-80c3-e86ca29c6b47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.27.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-7c7b836ffaa221f1b27ae77d75f66b3c.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-7c7b836ffaa221f1b27ae77d75f66b3c.yaml new file mode 100644 index 0000000000..b22aed76d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-7c7b836ffaa221f1b27ae77d75f66b3c.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-7c7b836ffaa221f1b27ae77d75f66b3c + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.6.9 - Cross-Site Request Forgery to Field Import and PHP Object Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/488970f0-3120-4f4a-9915-2ae1708bd86a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-844eb2f2a31165d103093ea081bdb4c7.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-844eb2f2a31165d103093ea081bdb4c7.yaml new file mode 100644 index 0000000000..acd0ccb056 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-844eb2f2a31165d103093ea081bdb4c7.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-844eb2f2a31165d103093ea081bdb4c7 + +info: + name: > + Ninja Forms Contact Form 2.9.36 - 2.9.42 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9f73654-2e5a-4762-8cac-613e24d3216a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.9.36', '<= 2.9.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-88ca4a7bd7c66c74cd477716cd98c157.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-88ca4a7bd7c66c74cd477716cd98c157.yaml new file mode 100644 index 0000000000..910d2f876e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-88ca4a7bd7c66c74cd477716cd98c157.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-88ca4a7bd7c66c74cd477716cd98c157 + +info: + name: > + Ninja Ninja Forms Contact Form <= 3.6.10 - Authenticated (Admin+) Stored Cross-Site Scripting via import + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/222678d0-cb1f-43c6-a6f0-37ea0be8cd3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-8af21f8f0c6e953daf8df61c5c7a078e.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-8af21f8f0c6e953daf8df61c5c7a078e.yaml new file mode 100644 index 0000000000..d3365c98e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-8af21f8f0c6e953daf8df61c5c7a078e.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-8af21f8f0c6e953daf8df61c5c7a078e + +info: + name: > + Ninja Forms Contact Form <= 3.6.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5340204a-8a4f-4e23-82a1-c228b884c34a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-9158a4f23cb6df7f396a1ff79ad04a19.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-9158a4f23cb6df7f396a1ff79ad04a19.yaml new file mode 100644 index 0000000000..e6fb0f14bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-9158a4f23cb6df7f396a1ff79ad04a19.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-9158a4f23cb6df7f396a1ff79ad04a19 + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.8.0 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a6eb430-cf86-4e13-a4f7-173fada9fddf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-987fd1a6de7b9a768ddbb56335fccbb6.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-987fd1a6de7b9a768ddbb56335fccbb6.yaml new file mode 100644 index 0000000000..82c5c31130 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-987fd1a6de7b9a768ddbb56335fccbb6.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-987fd1a6de7b9a768ddbb56335fccbb6 + +info: + name: > + Ninja Forms Contact Form <= 3.4.33 - Cross-Site Request Forgery to OAuth Service Disconnection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1faf343-1859-4bee-a2d5-f494f44c70ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-9b10289c81ee712ffc41aaeeec7d52b6.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-9b10289c81ee712ffc41aaeeec7d52b6.yaml new file mode 100644 index 0000000000..d05990fb4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-9b10289c81ee712ffc41aaeeec7d52b6.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-9b10289c81ee712ffc41aaeeec7d52b6 + +info: + name: > + Ninja Forms <= 3.6.24 - Authenticated (Admin+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97479b1-06a0-4e24-9d2b-005bdfec9eaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-a2ca90e41d2e5160436c08c965469eba.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-a2ca90e41d2e5160436c08c965469eba.yaml new file mode 100644 index 0000000000..f584fa5c6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-a2ca90e41d2e5160436c08c965469eba.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-a2ca90e41d2e5160436c08c965469eba + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.6.12 - Authenticated (Administrator+) PHP Objection Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dececd27-d311-41c0-a10c-3b9cc8b8f128?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-a784d42cac6270b3d15c7ded3f777f0b.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-a784d42cac6270b3d15c7ded3f777f0b.yaml new file mode 100644 index 0000000000..21568f6a77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-a784d42cac6270b3d15c7ded3f777f0b.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-a784d42cac6270b3d15c7ded3f777f0b + +info: + name: > + Ninja Forms Contact Form <= 2.8.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be31866c-7490-4be2-9a4d-2a3771c6fea1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-acac9b9e0c119ebbfe4a3d5af280d8ac.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-acac9b9e0c119ebbfe4a3d5af280d8ac.yaml new file mode 100644 index 0000000000..2e7bde0518 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-acac9b9e0c119ebbfe4a3d5af280d8ac.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-acac9b9e0c119ebbfe4a3d5af280d8ac + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.6.7 - Email Address Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cda2465e-b17e-4b5c-ad86-3c3c7a354d03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-b156b450e510844126aa5b98c430cad1.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-b156b450e510844126aa5b98c430cad1.yaml new file mode 100644 index 0000000000..30b401b213 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-b156b450e510844126aa5b98c430cad1.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-b156b450e510844126aa5b98c430cad1 + +info: + name: > + Ninja Forms <= 3.5.8.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8703c76b-89c6-438a-b953-03847d965096?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-ba28eba12a04215286d701e542084879.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-ba28eba12a04215286d701e542084879.yaml new file mode 100644 index 0000000000..8c6448f5f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-ba28eba12a04215286d701e542084879.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-ba28eba12a04215286d701e542084879 + +info: + name: > + Ninja Forms – The Contact Form Builder That Grows With You <= 3.8.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cae15a1c-63bc-4349-aba3-7f34737d6045?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-c1844c535b6764f33ccae986eaa4a431.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-c1844c535b6764f33ccae986eaa4a431.yaml new file mode 100644 index 0000000000..98adfe087c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-c1844c535b6764f33ccae986eaa4a431.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-c1844c535b6764f33ccae986eaa4a431 + +info: + name: > + Ninja Forms <= 3.4.34 - Authenticated OAuth Connection Key Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b7ad031-e15b-4315-9905-9f258f7c4ade?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.34.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-c27b108510956c02768a728e2ce3fea8.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-c27b108510956c02768a728e2ce3fea8.yaml new file mode 100644 index 0000000000..1e7259bbec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-c27b108510956c02768a728e2ce3fea8.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-c27b108510956c02768a728e2ce3fea8 + +info: + name: > + Ninja Forms Contact Form <= 2.9.18 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69435cb6-9591-45bb-86e3-eaf1a9bc46f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-c4d0cc55798aa0e869ce6641ec043946.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-c4d0cc55798aa0e869ce6641ec043946.yaml new file mode 100644 index 0000000000..03481bd407 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-c4d0cc55798aa0e869ce6641ec043946.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-c4d0cc55798aa0e869ce6641ec043946 + +info: + name: > + Ninja Forms Contact Form <= 3.3.13 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44158748-798e-4b17-9deb-f54520779c62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-c696f7538d036d4b686b31bca8e05d88.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-c696f7538d036d4b686b31bca8e05d88.yaml new file mode 100644 index 0000000000..84dfe3f8b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-c696f7538d036d4b686b31bca8e05d88.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-c696f7538d036d4b686b31bca8e05d88 + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.0.30 - HTML Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4ffc179-f3ab-4ae1-b7e9-13535d104593?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-c6b42e72ee53deb1fea76d399e341eb4.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-c6b42e72ee53deb1fea76d399e341eb4.yaml new file mode 100644 index 0000000000..1595b83b39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-c6b42e72ee53deb1fea76d399e341eb4.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-c6b42e72ee53deb1fea76d399e341eb4 + +info: + name: > + Ninja Forms <= 3.5.7 - Unprotected REST-API to Email Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5bdf526-8378-413f-b51e-24351dd0774b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-c8ac9a46bde9d08b3cb4f64cfc42f9d1.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-c8ac9a46bde9d08b3cb4f64cfc42f9d1.yaml new file mode 100644 index 0000000000..902397a94b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-c8ac9a46bde9d08b3cb4f64cfc42f9d1.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-c8ac9a46bde9d08b3cb4f64cfc42f9d1 + +info: + name: > + Ninja Forms <= 3.3.8 - Insufficient Restrictions during Export Personal Data requests + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acb239c2-a105-4430-8451-a6ae852a690f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-cefd5e99fb5e46fe5dc72467ce88dd69.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-cefd5e99fb5e46fe5dc72467ce88dd69.yaml new file mode 100644 index 0000000000..a261cbe19e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-cefd5e99fb5e46fe5dc72467ce88dd69.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-cefd5e99fb5e46fe5dc72467ce88dd69 + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.4.27 - Validation Bypass via Email Field + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d7d83f6-92d1-43a8-821c-7b9470ead493?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-d14229a7a274bce478767a3985696f57.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-d14229a7a274bce478767a3985696f57.yaml new file mode 100644 index 0000000000..36b2dee12c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-d14229a7a274bce478767a3985696f57.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-d14229a7a274bce478767a3985696f57 + +info: + name: > + Ninja Forms Contact Form <= 2.9.21 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee74d229-499e-4f9a-ad7d-c707f6eeac6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-d52a1b2d96a87813163020667b1d0ea9.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-d52a1b2d96a87813163020667b1d0ea9.yaml new file mode 100644 index 0000000000..a85c988275 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-d52a1b2d96a87813163020667b1d0ea9.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-d52a1b2d96a87813163020667b1d0ea9 + +info: + name: > + Ninja Forms Contact Form <= 3.4.33 - Authenticated SendWP Plugin Installation and Client Secret Key Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25b94c05-87c5-44fb-90d5-6c65d035dba6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-d58c1c7e73217599c748d955d8555b74.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-d58c1c7e73217599c748d955d8555b74.yaml new file mode 100644 index 0000000000..87edce7891 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-d58c1c7e73217599c748d955d8555b74.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-d58c1c7e73217599c748d955d8555b74 + +info: + name: > + Ninja Forms <= 3.5.7 - Unprotected REST-API to Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/549cd23f-3b3a-41b7-baa2-cc5c6b826a2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-d842d5a8fa51f3d63cc0b912fb91180a.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-d842d5a8fa51f3d63cc0b912fb91180a.yaml new file mode 100644 index 0000000000..ebc78076cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-d842d5a8fa51f3d63cc0b912fb91180a.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-d842d5a8fa51f3d63cc0b912fb91180a + +info: + name: > + Ninja Forms Contact Form <= 3.4.33 - Administrator Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13ba9152-b9a0-4201-ba91-c41686b4d953?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-dc4ac81f8a955635294d773c7dd984b2.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-dc4ac81f8a955635294d773c7dd984b2.yaml new file mode 100644 index 0000000000..63b31a197c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-dc4ac81f8a955635294d773c7dd984b2.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-dc4ac81f8a955635294d773c7dd984b2 + +info: + name: > + Ninja Forms Contact Form <= 3.3.21.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5023e07-9976-44f3-81de-2eb4ba86b0ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.21.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-e6738d3799e5a12b0457c2f4dc805c15.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-e6738d3799e5a12b0457c2f4dc805c15.yaml new file mode 100644 index 0000000000..cb6be27d06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-e6738d3799e5a12b0457c2f4dc805c15.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-e6738d3799e5a12b0457c2f4dc805c15 + +info: + name: > + Ninja Forms Contact Form <= 3.3.17 - Cross-Site Scripting via begin_date, end_date, or form_id Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5adc88e9-3fcd-4ad6-8eb9-1a111bf9cdc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-ea56b6fc3599b19cc9355c178eadf7c8.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-ea56b6fc3599b19cc9355c178eadf7c8.yaml new file mode 100644 index 0000000000..0a37e1dc54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-ea56b6fc3599b19cc9355c178eadf7c8.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-ea56b6fc3599b19cc9355c178eadf7c8 + +info: + name: > + Ninja Forms Contact Form <= 3.2.13 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dad7ba6-bac4-4f1a-83f5-fd5769cd4a45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-eb2e2d24b00f12552ab6c531c273fecb.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-eb2e2d24b00f12552ab6c531c273fecb.yaml new file mode 100644 index 0000000000..0b5b83ead9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-eb2e2d24b00f12552ab6c531c273fecb.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-eb2e2d24b00f12552ab6c531c273fecb + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 2.8.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09ee0155-7424-42ff-bfd6-244912857009?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-f42c358b68f2276f45d8e8fe7cf0bf75.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-f42c358b68f2276f45d8e8fe7cf0bf75.yaml new file mode 100644 index 0000000000..821e85d943 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-f42c358b68f2276f45d8e8fe7cf0bf75.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-f42c358b68f2276f45d8e8fe7cf0bf75 + +info: + name: > + Ninja Forms Contact Form <= 2.9.28 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bd89bd9-4f99-4828-bacc-15d2cfe13066?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-f907d4a58e9ce997eff45b8f7487d4d2.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-f907d4a58e9ce997eff45b8f7487d4d2.yaml new file mode 100644 index 0000000000..ef3cf8a697 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-f907d4a58e9ce997eff45b8f7487d4d2.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-f907d4a58e9ce997eff45b8f7487d4d2 + +info: + name: > + Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 2.8.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5a45b0d-aa47-45ac-80a9-0a30af3f91ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms/" + google-query: inurl:"/wp-content/plugins/ninja-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-uploads-4bc78371b9a6176130f5ed1b3336f728.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-uploads-4bc78371b9a6176130f5ed1b3336f728.yaml new file mode 100644 index 0000000000..ff835a1f0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-uploads-4bc78371b9a6176130f5ed1b3336f728.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-uploads-4bc78371b9a6176130f5ed1b3336f728 + +info: + name: > + Ninja Forms - File Uploads <= 3.0.22 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08d4bf7e-fae9-4be6-9e97-e8b6532523ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms-uploads/" + google-query: inurl:"/wp-content/plugins/ninja-forms-uploads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms-uploads,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms-uploads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms-uploads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-uploads-b97c4bb0c30e63e1bfc74807877230de.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-uploads-b97c4bb0c30e63e1bfc74807877230de.yaml new file mode 100644 index 0000000000..754d7f086e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-uploads-b97c4bb0c30e63e1bfc74807877230de.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-uploads-b97c4bb0c30e63e1bfc74807877230de + +info: + name: > + Ninja Forms - File Uploads Extension <= 3.3.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c5642fa-d001-47c4-8acd-94ae944e5129?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms-uploads/" + google-query: inurl:"/wp-content/plugins/ninja-forms-uploads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms-uploads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms-uploads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms-uploads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-forms-uploads-cfede18703e7f00a56bec51b65b32812.yaml b/nuclei-templates/cve-less/plugins/ninja-forms-uploads-cfede18703e7f00a56bec51b65b32812.yaml new file mode 100644 index 0000000000..0aa973e351 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-forms-uploads-cfede18703e7f00a56bec51b65b32812.yaml @@ -0,0 +1,58 @@ +id: ninja-forms-uploads-cfede18703e7f00a56bec51b65b32812 + +info: + name: > + Ninja Forms - File Uploads Extension <= 3.3.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f00eeaef-f277-481f-9e18-bf1ced0015a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-forms-uploads/" + google-query: inurl:"/wp-content/plugins/ninja-forms-uploads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-forms-uploads,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-forms-uploads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-forms-uploads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-gdpr-compliance-974c074b19789002549ca2e695247e1e.yaml b/nuclei-templates/cve-less/plugins/ninja-gdpr-compliance-974c074b19789002549ca2e695247e1e.yaml new file mode 100644 index 0000000000..87a82a5c3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-gdpr-compliance-974c074b19789002549ca2e695247e1e.yaml @@ -0,0 +1,58 @@ +id: ninja-gdpr-compliance-974c074b19789002549ca2e695247e1e + +info: + name: > + GDPR CCPA Compliance Support <= 2.3 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2871261-3231-4a52-9a38-bb3caf461e7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-gdpr-compliance/" + google-query: inurl:"/wp-content/plugins/ninja-gdpr-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-gdpr-compliance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-gdpr-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-gdpr-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-job-board-42cd9ebeecaa0d8da2012c8fd7d95b4c.yaml b/nuclei-templates/cve-less/plugins/ninja-job-board-42cd9ebeecaa0d8da2012c8fd7d95b4c.yaml new file mode 100644 index 0000000000..293155912e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-job-board-42cd9ebeecaa0d8da2012c8fd7d95b4c.yaml @@ -0,0 +1,58 @@ +id: ninja-job-board-42cd9ebeecaa0d8da2012c8fd7d95b4c + +info: + name: > + Ninja Job Board <= 1.3.2 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67ddca02-2e92-4aea-ada9-ace0df29c775?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-job-board/" + google-query: inurl:"/wp-content/plugins/ninja-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-job-board,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-job-board-ecdcb2d721b829e6a99b4761ba53fdfc.yaml b/nuclei-templates/cve-less/plugins/ninja-job-board-ecdcb2d721b829e6a99b4761ba53fdfc.yaml new file mode 100644 index 0000000000..97a6ddf6de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-job-board-ecdcb2d721b829e6a99b4761ba53fdfc.yaml @@ -0,0 +1,58 @@ +id: ninja-job-board-ecdcb2d721b829e6a99b4761ba53fdfc + +info: + name: > + Ninja Job Board – Ultimate WordPress Job Board Plugin <= 1.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37725a72-0478-4f56-b87f-e427b1f5fb58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-job-board/" + google-query: inurl:"/wp-content/plugins/ninja-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-job-board,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-tables-208c19b89658d8f67c58a70365a86a8d.yaml b/nuclei-templates/cve-less/plugins/ninja-tables-208c19b89658d8f67c58a70365a86a8d.yaml new file mode 100644 index 0000000000..de08a76e3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-tables-208c19b89658d8f67c58a70365a86a8d.yaml @@ -0,0 +1,58 @@ +id: ninja-tables-208c19b89658d8f67c58a70365a86a8d + +info: + name: > + Ninja Tables <= 5.0.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c86e5cfd-f450-48d6-819e-5345fc0fdfc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-tables/" + google-query: inurl:"/wp-content/plugins/ninja-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-tables,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-tables-406776aa8100e59355ccb6cf6b38aab0.yaml b/nuclei-templates/cve-less/plugins/ninja-tables-406776aa8100e59355ccb6cf6b38aab0.yaml new file mode 100644 index 0000000000..45d65dd7b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-tables-406776aa8100e59355ccb6cf6b38aab0.yaml @@ -0,0 +1,58 @@ +id: ninja-tables-406776aa8100e59355ccb6cf6b38aab0 + +info: + name: > + Ninja Tables <= 4.1.7 - Admin+ Stored Cross-Site Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64338fc4-e8c9-4fa5-bb77-861fb5142286?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-tables/" + google-query: inurl:"/wp-content/plugins/ninja-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-tables,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-tables-87a2603e70828cd5276b845c0ebcc6ab.yaml b/nuclei-templates/cve-less/plugins/ninja-tables-87a2603e70828cd5276b845c0ebcc6ab.yaml new file mode 100644 index 0000000000..beb1906bf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-tables-87a2603e70828cd5276b845c0ebcc6ab.yaml @@ -0,0 +1,58 @@ +id: ninja-tables-87a2603e70828cd5276b845c0ebcc6ab + +info: + name: > + Ninja Tables <= 4.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc296c70-358e-4908-be49-5ffae83aca9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-tables/" + google-query: inurl:"/wp-content/plugins/ninja-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninja-tables-b925b2b6daf2d6ebba61a79be7a0f3f1.yaml b/nuclei-templates/cve-less/plugins/ninja-tables-b925b2b6daf2d6ebba61a79be7a0f3f1.yaml new file mode 100644 index 0000000000..4e89e4b052 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninja-tables-b925b2b6daf2d6ebba61a79be7a0f3f1.yaml @@ -0,0 +1,58 @@ +id: ninja-tables-b925b2b6daf2d6ebba61a79be7a0f3f1 + +info: + name: > + Ninja Tables <= 4.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/338158b5-bbda-4cd8-b4ea-97a3926a0989?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninja-tables/" + google-query: inurl:"/wp-content/plugins/ninja-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninja-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninja-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninja-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninjafirewall-bfe7f25b364c1c551aace9e3b8962033.yaml b/nuclei-templates/cve-less/plugins/ninjafirewall-bfe7f25b364c1c551aace9e3b8962033.yaml new file mode 100644 index 0000000000..b0a9d3c82b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninjafirewall-bfe7f25b364c1c551aace9e3b8962033.yaml @@ -0,0 +1,58 @@ +id: ninjafirewall-bfe7f25b364c1c551aace9e3b8962033 + +info: + name: > + NinjaFirewall <= 4.3.3 - Authenticated PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a1fc6c9-50cd-40fd-a777-9eed98aab797?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninjafirewall/" + google-query: inurl:"/wp-content/plugins/ninjafirewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninjafirewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninjafirewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninjafirewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ninjalibs-ses-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ninjalibs-ses-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5c39087b82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ninjalibs-ses-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ninjalibs-ses-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ninjalibs-ses/" + google-query: inurl:"/wp-content/plugins/ninjalibs-ses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ninjalibs-ses,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ninjalibs-ses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ninjalibs-ses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nirweb-support-a6bdfa613b7b681292bdcc51a2102fdd.yaml b/nuclei-templates/cve-less/plugins/nirweb-support-a6bdfa613b7b681292bdcc51a2102fdd.yaml new file mode 100644 index 0000000000..120f6f90df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nirweb-support-a6bdfa613b7b681292bdcc51a2102fdd.yaml @@ -0,0 +1,58 @@ +id: nirweb-support-a6bdfa613b7b681292bdcc51a2102fdd + +info: + name: > + Nirweb support <= 2.7.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0ec70a0-d1be-4652-b029-d8268c2667ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nirweb-support/" + google-query: inurl:"/wp-content/plugins/nirweb-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nirweb-support,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nirweb-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nirweb-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nitek-carousel-cool-transitions-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/nitek-carousel-cool-transitions-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5ff01c99c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nitek-carousel-cool-transitions-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: nitek-carousel-cool-transitions-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nitek-carousel-cool-transitions/" + google-query: inurl:"/wp-content/plugins/nitek-carousel-cool-transitions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nitek-carousel-cool-transitions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nitek-carousel-cool-transitions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nitek-carousel-cool-transitions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nitek-carousel-cool-transitions-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/nitek-carousel-cool-transitions-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..b5f7223aef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nitek-carousel-cool-transitions-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: nitek-carousel-cool-transitions-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nitek-carousel-cool-transitions/" + google-query: inurl:"/wp-content/plugins/nitek-carousel-cool-transitions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nitek-carousel-cool-transitions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nitek-carousel-cool-transitions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nitek-carousel-cool-transitions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nitropack-bd4439ed9a58ebca35ee43480cc063fc.yaml b/nuclei-templates/cve-less/plugins/nitropack-bd4439ed9a58ebca35ee43480cc063fc.yaml new file mode 100644 index 0000000000..49b1a55535 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nitropack-bd4439ed9a58ebca35ee43480cc063fc.yaml @@ -0,0 +1,58 @@ +id: nitropack-bd4439ed9a58ebca35ee43480cc063fc + +info: + name: > + NitroPack <= 1.9.2 - Missing Authorization via multiple AJAX functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb6f4b0b-25b8-4dcd-b002-293ce8ab307e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nitropack/" + google-query: inurl:"/wp-content/plugins/nitropack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nitropack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nitropack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nitropack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nitropack-e25f78b15c303433589429f0f1d159bb.yaml b/nuclei-templates/cve-less/plugins/nitropack-e25f78b15c303433589429f0f1d159bb.yaml new file mode 100644 index 0000000000..09b22c0afd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nitropack-e25f78b15c303433589429f0f1d159bb.yaml @@ -0,0 +1,58 @@ +id: nitropack-e25f78b15c303433589429f0f1d159bb + +info: + name: > + NitroPack <= 1.10.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/daa30370-0d11-45b7-8ca3-b2a3b9046127?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nitropack/" + google-query: inurl:"/wp-content/plugins/nitropack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nitropack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nitropack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nitropack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nktagcloud-94bc27f855a1b3e71ba6782c8361e04d.yaml b/nuclei-templates/cve-less/plugins/nktagcloud-94bc27f855a1b3e71ba6782c8361e04d.yaml new file mode 100644 index 0000000000..af5856a800 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nktagcloud-94bc27f855a1b3e71ba6782c8361e04d.yaml @@ -0,0 +1,58 @@ +id: nktagcloud-94bc27f855a1b3e71ba6782c8361e04d + +info: + name: > + Better Tag Cloud <= 0.99.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0e2ae5c-685d-4cf0-91e2-2f8620b2eb6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nktagcloud/" + google-query: inurl:"/wp-content/plugins/nktagcloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nktagcloud,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nktagcloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nktagcloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.99.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml new file mode 100644 index 0000000000..26e523ae2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-0cce3cf19b35c3ae0ac1e97020e9cf5e + +info: + name: > + Frontend File Manager < 4.0 & N-Media Post Front-end Form < 1.1 & - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1e6298-f243-49a5-b1b7-52bd6a6c8858?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-297873237de6b81c34c6241d19a94b3b.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-297873237de6b81c34c6241d19a94b3b.yaml new file mode 100644 index 0000000000..665acb73aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-297873237de6b81c34c6241d19a94b3b.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-297873237de6b81c34c6241d19a94b3b + +info: + name: > + Frontend File Manager <= 18.2 - Unauthenticated Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c434e6b8-0dd5-4ffe-93b1-1af614c08f85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-345c91064d515186e70e2a5884cb7eb7.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-345c91064d515186e70e2a5884cb7eb7.yaml new file mode 100644 index 0000000000..82fd6b0664 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-345c91064d515186e70e2a5884cb7eb7.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-345c91064d515186e70e2a5884cb7eb7 + +info: + name: > + Frontend File Manager <= 18.2 - Unauthenticated Post Meta Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5539aa79-66ad-43fa-967c-2bec877061e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-46ddc1fb6e6a17cf8f3a950bda697f09.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-46ddc1fb6e6a17cf8f3a950bda697f09.yaml new file mode 100644 index 0000000000..46723b7357 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-46ddc1fb6e6a17cf8f3a950bda697f09.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-46ddc1fb6e6a17cf8f3a950bda697f09 + +info: + name: > + Frontend File Manager <= 3.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2ed5e51-8783-4b7f-9177-c116bf0fad44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-591a1da3346f8d80da2af4a888473bd6.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-591a1da3346f8d80da2af4a888473bd6.yaml new file mode 100644 index 0000000000..e5c4d6c23b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-591a1da3346f8d80da2af4a888473bd6.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-591a1da3346f8d80da2af4a888473bd6 + +info: + name: > + Frontend File Manager <= 22.7 - Sensitive Information Exposure via user uploads + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbade634-cd81-41c0-8976-f5cb251da3f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 22.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-6555d944c0da7a05c7a9f7417ba389b0.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-6555d944c0da7a05c7a9f7417ba389b0.yaml new file mode 100644 index 0000000000..d64f0aca83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-6555d944c0da7a05c7a9f7417ba389b0.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-6555d944c0da7a05c7a9f7417ba389b0 + +info: + name: > + Frontend File Manager <= 18.2 - Authenticated Settings Change leading to Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adb1d8b0-b1d6-40df-b591-f1062ee744fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-6eae0900047437ffd3af67b0a999c0ce.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-6eae0900047437ffd3af67b0a999c0ce.yaml new file mode 100644 index 0000000000..0c95d83dec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-6eae0900047437ffd3af67b0a999c0ce.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-6eae0900047437ffd3af67b0a999c0ce + +info: + name: > + Frontend File Manager Plugin < 3.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a11c169-a232-49a9-80be-40d45d0c6dc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-7ab127dd070b1ecb99f880fa6c24c6c9.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-7ab127dd070b1ecb99f880fa6c24c6c9.yaml new file mode 100644 index 0000000000..d4c1a6dec8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-7ab127dd070b1ecb99f880fa6c24c6c9.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-7ab127dd070b1ecb99f880fa6c24c6c9 + +info: + name: > + Frontend File Manager Plugin <= 18.2 - Unauthenticated Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84c61d00-20c1-4176-a74d-ea6ff6220f26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-7e92e5675339b75e77ca040e1f512f1b.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-7e92e5675339b75e77ca040e1f512f1b.yaml new file mode 100644 index 0000000000..649bf05bcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-7e92e5675339b75e77ca040e1f512f1b.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-7e92e5675339b75e77ca040e1f512f1b + +info: + name: > + Frontend File Manager <= 18.2 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28a7b2c9-5d8d-4b49-a47c-473e3288b563?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-907b43a94b9878024b4d583046e9b3a5.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-907b43a94b9878024b4d583046e9b3a5.yaml new file mode 100644 index 0000000000..d65cbd77ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-907b43a94b9878024b4d583046e9b3a5.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-907b43a94b9878024b4d583046e9b3a5 + +info: + name: > + Frontend File Manager <= 18.2 - Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79e2011c-5e4d-4d02-831f-6b4dcfcaa51e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-912300bb987f9b62927bac6bd20872ca.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-912300bb987f9b62927bac6bd20872ca.yaml new file mode 100644 index 0000000000..90982737e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-912300bb987f9b62927bac6bd20872ca.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-912300bb987f9b62927bac6bd20872ca + +info: + name: > + Frontend File Manager Plugin <= 21.2 - Cross-Site Request Forgery to File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/361e2d5c-4355-4e71-91aa-2c1bc6b6fb78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-9d01a3c1450589963802e2c82f79a1da.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-9d01a3c1450589963802e2c82f79a1da.yaml new file mode 100644 index 0000000000..b14dbec491 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-9d01a3c1450589963802e2c82f79a1da.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-9d01a3c1450589963802e2c82f79a1da + +info: + name: > + Frontend File Manager <= 21.2 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/628eef73-1725-4290-bb30-07792d1d5b6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-a0c32d3142a601a64a1bd122ecb7baaa.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-a0c32d3142a601a64a1bd122ecb7baaa.yaml new file mode 100644 index 0000000000..bb4ba4e213 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-a0c32d3142a601a64a1bd122ecb7baaa.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-a0c32d3142a601a64a1bd122ecb7baaa + +info: + name: > + Frontend File Manager <= 18.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c82154-d390-44ba-a54a-89f4bb69cdce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-cf17a017c60d948b78f758c0612d102b.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-cf17a017c60d948b78f758c0612d102b.yaml new file mode 100644 index 0000000000..e0704357b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-cf17a017c60d948b78f758c0612d102b.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-cf17a017c60d948b78f758c0612d102b + +info: + name: > + Frontend File Manager <= 21.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c56e5250-7cbd-41f4-9b8c-79a644830708?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f1f1da3dcd767a5d11f1b776e491f57d.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f1f1da3dcd767a5d11f1b776e491f57d.yaml new file mode 100644 index 0000000000..29f1091c25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f1f1da3dcd767a5d11f1b776e491f57d.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-f1f1da3dcd767a5d11f1b776e491f57d + +info: + name: > + Frontend File Manager <= 21.3 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59b63a01-fd8b-4742-a52f-c0a7b59e9e04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f3328c896ffc09c53e1ecdfa60c1e5c5.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f3328c896ffc09c53e1ecdfa60c1e5c5.yaml new file mode 100644 index 0000000000..4de13cad96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f3328c896ffc09c53e1ecdfa60c1e5c5.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-f3328c896ffc09c53e1ecdfa60c1e5c5 + +info: + name: > + Frontend File Manager <= 18.2 - Unauthenticated HTML Injection leading to Spam Emails + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49150180-9de0-4318-b21b-779daaeb7a52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f4c2701ff75483ce690141623ec5eff4.yaml b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f4c2701ff75483ce690141623ec5eff4.yaml new file mode 100644 index 0000000000..6448a68344 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nmedia-user-file-uploader-f4c2701ff75483ce690141623ec5eff4.yaml @@ -0,0 +1,58 @@ +id: nmedia-user-file-uploader-f4c2701ff75483ce690141623ec5eff4 + +info: + name: > + Frontend File Manager Plugin <= 22.5 - Authenticated (Editor+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b59b5c41-6173-485e-869d-4165dc18e2bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" + google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nmedia-user-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nmedia-user-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 22.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/no-api-amazon-affiliate-43886ab11181377f0791e69c2c423b63.yaml b/nuclei-templates/cve-less/plugins/no-api-amazon-affiliate-43886ab11181377f0791e69c2c423b63.yaml new file mode 100644 index 0000000000..0541009ca2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/no-api-amazon-affiliate-43886ab11181377f0791e69c2c423b63.yaml @@ -0,0 +1,58 @@ +id: no-api-amazon-affiliate-43886ab11181377f0791e69c2c423b63 + +info: + name: > + No API Amazon Affiliate <= 4.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b10941c7-40f1-4157-a9d9-40844d25b22b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/no-api-amazon-affiliate/" + google-query: inurl:"/wp-content/plugins/no-api-amazon-affiliate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,no-api-amazon-affiliate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/no-api-amazon-affiliate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "no-api-amazon-affiliate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/no-bot-registration-ecb41dd5dc38a4c73cfc3b8c255506fd.yaml b/nuclei-templates/cve-less/plugins/no-bot-registration-ecb41dd5dc38a4c73cfc3b8c255506fd.yaml new file mode 100644 index 0000000000..52c757e5b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/no-bot-registration-ecb41dd5dc38a4c73cfc3b8c255506fd.yaml @@ -0,0 +1,58 @@ +id: no-bot-registration-ecb41dd5dc38a4c73cfc3b8c255506fd + +info: + name: > + No-Bot Registration <= 1.9.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf2e8b6f-2bdb-46c4-84a0-9e196355dda9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/no-bot-registration/" + google-query: inurl:"/wp-content/plugins/no-bot-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,no-bot-registration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/no-bot-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "no-bot-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/no-captcha-recaptcha-for-woocommerce-268f07777e79e9582f2676bd74ffb8e4.yaml b/nuclei-templates/cve-less/plugins/no-captcha-recaptcha-for-woocommerce-268f07777e79e9582f2676bd74ffb8e4.yaml new file mode 100644 index 0000000000..dd377b94f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/no-captcha-recaptcha-for-woocommerce-268f07777e79e9582f2676bd74ffb8e4.yaml @@ -0,0 +1,58 @@ +id: no-captcha-recaptcha-for-woocommerce-268f07777e79e9582f2676bd74ffb8e4 + +info: + name: > + No CAPTCHA reCAPTCHA for WooCommerce <= 1.2.6 - Authenticated(Admin+) Stored Cross-Site Scripting via Plugin Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bcc1965-c409-40ba-a942-175646ad8fda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/no-captcha-recaptcha-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/no-captcha-recaptcha-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,no-captcha-recaptcha-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/no-captcha-recaptcha-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "no-captcha-recaptcha-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/no-captcha-recaptcha-for-woocommerce-94af6b10fc464ad700fcc3825517ff11.yaml b/nuclei-templates/cve-less/plugins/no-captcha-recaptcha-for-woocommerce-94af6b10fc464ad700fcc3825517ff11.yaml new file mode 100644 index 0000000000..dea1d20a5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/no-captcha-recaptcha-for-woocommerce-94af6b10fc464ad700fcc3825517ff11.yaml @@ -0,0 +1,58 @@ +id: no-captcha-recaptcha-for-woocommerce-94af6b10fc464ad700fcc3825517ff11 + +info: + name: > + No CAPTCHA reCAPTCHA for WooCommerce <= 1.2.6 - Missing Authorization to Notification Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efc53d78-a664-48d0-a752-00c56b3f792f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/no-captcha-recaptcha-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/no-captcha-recaptcha-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,no-captcha-recaptcha-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/no-captcha-recaptcha-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "no-captcha-recaptcha-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/no-external-links-7a7c093f97491b5547b10f0abf94cd54.yaml b/nuclei-templates/cve-less/plugins/no-external-links-7a7c093f97491b5547b10f0abf94cd54.yaml new file mode 100644 index 0000000000..d832ef73e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/no-external-links-7a7c093f97491b5547b10f0abf94cd54.yaml @@ -0,0 +1,58 @@ +id: no-external-links-7a7c093f97491b5547b10f0abf94cd54 + +info: + name: > + WP No External Links <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scritping + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8e3a111-6327-47a0-becd-d7e2d9166118?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/no-external-links/" + google-query: inurl:"/wp-content/plugins/no-external-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,no-external-links,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/no-external-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "no-external-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/no-future-posts-42ee0da57f529d4a1f0ef2f4cdec544f.yaml b/nuclei-templates/cve-less/plugins/no-future-posts-42ee0da57f529d4a1f0ef2f4cdec544f.yaml new file mode 100644 index 0000000000..982898ccb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/no-future-posts-42ee0da57f529d4a1f0ef2f4cdec544f.yaml @@ -0,0 +1,58 @@ +id: no-future-posts-42ee0da57f529d4a1f0ef2f4cdec544f + +info: + name: > + No Future Posts <= 1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94bd2229-0dfa-4f8b-9aa8-e2ee1bb7bc27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/no-future-posts/" + google-query: inurl:"/wp-content/plugins/no-future-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,no-future-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/no-future-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "no-future-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/no-page-comment-bb94b7c262e87ba0deb3b3b8cd65e66b.yaml b/nuclei-templates/cve-less/plugins/no-page-comment-bb94b7c262e87ba0deb3b3b8cd65e66b.yaml new file mode 100644 index 0000000000..047e54166b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/no-page-comment-bb94b7c262e87ba0deb3b3b8cd65e66b.yaml @@ -0,0 +1,58 @@ +id: no-page-comment-bb94b7c262e87ba0deb3b3b8cd65e66b + +info: + name: > + No Page Comment <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66b6443a-3bd0-4f45-8ad3-424d11ec24e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/no-page-comment/" + google-query: inurl:"/wp-content/plugins/no-page-comment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,no-page-comment,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/no-page-comment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "no-page-comment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/no-page-comment-c253a6af837c11e2505414f6b22094fe.yaml b/nuclei-templates/cve-less/plugins/no-page-comment-c253a6af837c11e2505414f6b22094fe.yaml new file mode 100644 index 0000000000..5ae12c2ba4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/no-page-comment-c253a6af837c11e2505414f6b22094fe.yaml @@ -0,0 +1,58 @@ +id: no-page-comment-c253a6af837c11e2505414f6b22094fe + +info: + name: > + No Page Comment <= 1.1 - Cross-Site-Request Forgery to Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2389b9c-c766-4cb7-83d6-b0ad7d2a075e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/no-page-comment/" + google-query: inurl:"/wp-content/plugins/no-page-comment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,no-page-comment,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/no-page-comment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "no-page-comment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nofollow-a8cfb826ae3cd1e60648ab483d0a35aa.yaml b/nuclei-templates/cve-less/plugins/nofollow-a8cfb826ae3cd1e60648ab483d0a35aa.yaml new file mode 100644 index 0000000000..ebbcc18aff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nofollow-a8cfb826ae3cd1e60648ab483d0a35aa.yaml @@ -0,0 +1,58 @@ +id: nofollow-a8cfb826ae3cd1e60648ab483d0a35aa + +info: + name: > + Ultimate NoFollow <= 1.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d57b8c89-109c-4b3b-bea4-adfe7dbfb26d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nofollow/" + google-query: inurl:"/wp-content/plugins/nofollow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nofollow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nofollow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nofollow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nofollow-all-external-links-dc8fd7c1140c8670f406818f67e3d066.yaml b/nuclei-templates/cve-less/plugins/nofollow-all-external-links-dc8fd7c1140c8670f406818f67e3d066.yaml new file mode 100644 index 0000000000..65350a38ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nofollow-all-external-links-dc8fd7c1140c8670f406818f67e3d066.yaml @@ -0,0 +1,58 @@ +id: nofollow-all-external-links-dc8fd7c1140c8670f406818f67e3d066 + +info: + name: > + No Follow All External Links 2.1.0 - 2.3.0 - Backdoor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db565c28-84ae-4b70-a56e-e91c1a27341d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nofollow-all-external-links/" + google-query: inurl:"/wp-content/plugins/nofollow-all-external-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nofollow-all-external-links,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nofollow-all-external-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nofollow-all-external-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.1.0', '<= 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nofollow-links-acc6eb8dd4e1bc540251436012892eb1.yaml b/nuclei-templates/cve-less/plugins/nofollow-links-acc6eb8dd4e1bc540251436012892eb1.yaml new file mode 100644 index 0000000000..0e9d8becf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nofollow-links-acc6eb8dd4e1bc540251436012892eb1.yaml @@ -0,0 +1,58 @@ +id: nofollow-links-acc6eb8dd4e1bc540251436012892eb1 + +info: + name: > + Nofollow Links <= 1.0.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5b7e1f-7479-47bd-99ed-3d57eb209464?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nofollow-links/" + google-query: inurl:"/wp-content/plugins/nofollow-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nofollow-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nofollow-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nofollow-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nokia-mapsplaces-83baefa8fe364357f6ef3e61c50fe83c.yaml b/nuclei-templates/cve-less/plugins/nokia-mapsplaces-83baefa8fe364357f6ef3e61c50fe83c.yaml new file mode 100644 index 0000000000..e689694073 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nokia-mapsplaces-83baefa8fe364357f6ef3e61c50fe83c.yaml @@ -0,0 +1,58 @@ +id: nokia-mapsplaces-83baefa8fe364357f6ef3e61c50fe83c + +info: + name: > + Nokia Maps & Places < 1.6.7 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94337b59-6a88-467e-b487-b7b7e4f6f7a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nokia-mapsplaces/" + google-query: inurl:"/wp-content/plugins/nokia-mapsplaces/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nokia-mapsplaces,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nokia-mapsplaces/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nokia-mapsplaces" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/noo-timetable-3c7165ed170542d9a48b7ebd75bdcfa2.yaml b/nuclei-templates/cve-less/plugins/noo-timetable-3c7165ed170542d9a48b7ebd75bdcfa2.yaml new file mode 100644 index 0000000000..b79c7291f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/noo-timetable-3c7165ed170542d9a48b7ebd75bdcfa2.yaml @@ -0,0 +1,58 @@ +id: noo-timetable-3c7165ed170542d9a48b7ebd75bdcfa2 + +info: + name: > + NOO Timetable <= 2.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fab1ae8-2aa4-452a-a594-64088c92b5c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/noo-timetable/" + google-query: inurl:"/wp-content/plugins/noo-timetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,noo-timetable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/noo-timetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "noo-timetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/noo-timetable-8fd07febda83bd8c742a5f51259e2434.yaml b/nuclei-templates/cve-less/plugins/noo-timetable-8fd07febda83bd8c742a5f51259e2434.yaml new file mode 100644 index 0000000000..571674c688 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/noo-timetable-8fd07febda83bd8c742a5f51259e2434.yaml @@ -0,0 +1,58 @@ +id: noo-timetable-8fd07febda83bd8c742a5f51259e2434 + +info: + name: > + NOO Timetable <= 2.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13046019-f390-48ae-bf08-53293c41f178?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/noo-timetable/" + google-query: inurl:"/wp-content/plugins/noo-timetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,noo-timetable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/noo-timetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "noo-timetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nooz-2b837a9bfbedcec8d35d48ea5080f6cf.yaml b/nuclei-templates/cve-less/plugins/nooz-2b837a9bfbedcec8d35d48ea5080f6cf.yaml new file mode 100644 index 0000000000..a9410e462f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nooz-2b837a9bfbedcec8d35d48ea5080f6cf.yaml @@ -0,0 +1,58 @@ +id: nooz-2b837a9bfbedcec8d35d48ea5080f6cf + +info: + name: > + Nooz <= 1.6.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8b5bc1b-c9dc-4ce5-86db-2802f5b49d0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nooz/" + google-query: inurl:"/wp-content/plugins/nooz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nooz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nooz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nooz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nospampti-bedbd591f6ca39f0af80a1081665a67e.yaml b/nuclei-templates/cve-less/plugins/nospampti-bedbd591f6ca39f0af80a1081665a67e.yaml new file mode 100644 index 0000000000..df503d2680 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nospampti-bedbd591f6ca39f0af80a1081665a67e.yaml @@ -0,0 +1,58 @@ +id: nospampti-bedbd591f6ca39f0af80a1081665a67e + +info: + name: > + NOSpamPTI <= 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/529c5785-214e-41e7-8cf3-4ff3d256e27c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nospampti/" + google-query: inurl:"/wp-content/plugins/nospampti/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nospampti,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nospampti/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nospampti" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/note-press-8247dd9e5bbd39d391956bd6159727f9.yaml b/nuclei-templates/cve-less/plugins/note-press-8247dd9e5bbd39d391956bd6159727f9.yaml new file mode 100644 index 0000000000..bd144c30a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/note-press-8247dd9e5bbd39d391956bd6159727f9.yaml @@ -0,0 +1,58 @@ +id: note-press-8247dd9e5bbd39d391956bd6159727f9 + +info: + name: > + Note Press <= 0.1.10 - Authenticated (Admin+) SQL Injection via Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd2b816a-fbb1-4c6f-8f0a-4ef2e77f845e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/note-press/" + google-query: inurl:"/wp-content/plugins/note-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,note-press,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/note-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "note-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/note-press-8825e85de759f44127189c61a2caf509.yaml b/nuclei-templates/cve-less/plugins/note-press-8825e85de759f44127189c61a2caf509.yaml new file mode 100644 index 0000000000..0bb33ec2b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/note-press-8825e85de759f44127189c61a2caf509.yaml @@ -0,0 +1,58 @@ +id: note-press-8825e85de759f44127189c61a2caf509 + +info: + name: > + Note Press <= 0.1.10 - Authenticated (Admin+) SQL Injection via id Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c7c2b11-750a-48de-b48b-dcc6fbb8e917?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/note-press/" + google-query: inurl:"/wp-content/plugins/note-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,note-press,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/note-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "note-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/note-press-c6243b9dee6460614115df8351692603.yaml b/nuclei-templates/cve-less/plugins/note-press-c6243b9dee6460614115df8351692603.yaml new file mode 100644 index 0000000000..b871d6ae9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/note-press-c6243b9dee6460614115df8351692603.yaml @@ -0,0 +1,58 @@ +id: note-press-c6243b9dee6460614115df8351692603 + +info: + name: > + Note Press <= 0.1.10 - Authenticated (Admin+) SQL Injection via ids Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/521bcfd5-7bb2-4748-8440-9902181cbf7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/note-press/" + google-query: inurl:"/wp-content/plugins/note-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,note-press,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/note-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "note-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/note-press-fc9778d621394c461290861e9ffed74c.yaml b/nuclei-templates/cve-less/plugins/note-press-fc9778d621394c461290861e9ffed74c.yaml new file mode 100644 index 0000000000..77b6666216 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/note-press-fc9778d621394c461290861e9ffed74c.yaml @@ -0,0 +1,58 @@ +id: note-press-fc9778d621394c461290861e9ffed74c + +info: + name: > + Note Press < 0.1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07ac1921-6d3b-44b3-ad8d-66e18698c025?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/note-press/" + google-query: inurl:"/wp-content/plugins/note-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,note-press,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/note-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "note-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notice-bar-18ae8fd1e9cb93487e81ac53ef4e167a.yaml b/nuclei-templates/cve-less/plugins/notice-bar-18ae8fd1e9cb93487e81ac53ef4e167a.yaml new file mode 100644 index 0000000000..6945e1e587 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notice-bar-18ae8fd1e9cb93487e81ac53ef4e167a.yaml @@ -0,0 +1,58 @@ +id: notice-bar-18ae8fd1e9cb93487e81ac53ef4e167a + +info: + name: > + Notice Bar <= 3.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/defc5b5a-243d-4564-a9f8-3ecf3538129b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notice-bar/" + google-query: inurl:"/wp-content/plugins/notice-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notice-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notice-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notice-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notice-board-b3b2af8cc00699a0018afcc81e707f41.yaml b/nuclei-templates/cve-less/plugins/notice-board-b3b2af8cc00699a0018afcc81e707f41.yaml new file mode 100644 index 0000000000..621f370de0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notice-board-b3b2af8cc00699a0018afcc81e707f41.yaml @@ -0,0 +1,58 @@ +id: notice-board-b3b2af8cc00699a0018afcc81e707f41 + +info: + name: > + NOTICE BOARD <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a804605-c079-4310-a57f-81c3eb216dee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notice-board/" + google-query: inurl:"/wp-content/plugins/notice-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notice-board,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notice-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notice-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notices-84d0d45fa88276425857758501e9c199.yaml b/nuclei-templates/cve-less/plugins/notices-84d0d45fa88276425857758501e9c199.yaml new file mode 100644 index 0000000000..ad30f92cf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notices-84d0d45fa88276425857758501e9c199.yaml @@ -0,0 +1,58 @@ +id: notices-84d0d45fa88276425857758501e9c199 + +info: + name: > + Notices <= 6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ccd7144-fde1-4ade-ac66-5ea14cdbc616?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notices/" + google-query: inurl:"/wp-content/plugins/notices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notification-eae4213a5c0782ae01f44dd9c21edcbb.yaml b/nuclei-templates/cve-less/plugins/notification-eae4213a5c0782ae01f44dd9c21edcbb.yaml new file mode 100644 index 0000000000..c098a03c86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notification-eae4213a5c0782ae01f44dd9c21edcbb.yaml @@ -0,0 +1,58 @@ +id: notification-eae4213a5c0782ae01f44dd9c21edcbb + +info: + name: > + Notification – Custom Notifications and Alerts for WordPress <= 7.2.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e08cd1b6-3faf-4650-9606-3724b6a52df5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notification/" + google-query: inurl:"/wp-content/plugins/notification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notification,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notificationx-735661dd4e86df9c4dde01f9f3e84d09.yaml b/nuclei-templates/cve-less/plugins/notificationx-735661dd4e86df9c4dde01f9f3e84d09.yaml new file mode 100644 index 0000000000..125be1b90f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notificationx-735661dd4e86df9c4dde01f9f3e84d09.yaml @@ -0,0 +1,58 @@ +id: notificationx-735661dd4e86df9c4dde01f9f3e84d09 + +info: + name: > + NotificationX – Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor <= 2.8.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e110ea99-e2fa-4558-bcf3-942a35af0b91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notificationx/" + google-query: inurl:"/wp-content/plugins/notificationx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notificationx,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notificationx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notificationx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notificationx-a270bbda89fbbfcb6121d07d9ec5b627.yaml b/nuclei-templates/cve-less/plugins/notificationx-a270bbda89fbbfcb6121d07d9ec5b627.yaml new file mode 100644 index 0000000000..6faf706931 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notificationx-a270bbda89fbbfcb6121d07d9ec5b627.yaml @@ -0,0 +1,58 @@ +id: notificationx-a270bbda89fbbfcb6121d07d9ec5b627 + +info: + name: > + NotificationX <= 1.8.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebe7680-a76d-4178-a729-f0d79d861912?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notificationx/" + google-query: inurl:"/wp-content/plugins/notificationx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notificationx,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notificationx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notificationx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notificationx-ad0a1b158b4e99b448b1e95b8addbc39.yaml b/nuclei-templates/cve-less/plugins/notificationx-ad0a1b158b4e99b448b1e95b8addbc39.yaml new file mode 100644 index 0000000000..56bbcd7a27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notificationx-ad0a1b158b4e99b448b1e95b8addbc39.yaml @@ -0,0 +1,58 @@ +id: notificationx-ad0a1b158b4e99b448b1e95b8addbc39 + +info: + name: > + NotificationX <= 2.3.11 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36dec90a-fead-48f5-a88b-dfbc6d8bffb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notificationx/" + google-query: inurl:"/wp-content/plugins/notificationx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notificationx,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notificationx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notificationx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notificationx-bcbaad1a845c82aad1bef42558b56fdd.yaml b/nuclei-templates/cve-less/plugins/notificationx-bcbaad1a845c82aad1bef42558b56fdd.yaml new file mode 100644 index 0000000000..82dbff8bff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notificationx-bcbaad1a845c82aad1bef42558b56fdd.yaml @@ -0,0 +1,58 @@ +id: notificationx-bcbaad1a845c82aad1bef42558b56fdd + +info: + name: > + NotificationX <= 2.3.8 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec2eec5a-7767-4215-b77d-5cfd2d148f73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notificationx/" + google-query: inurl:"/wp-content/plugins/notificationx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notificationx,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notificationx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notificationx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/notifyvisitors-lead-form-9efb6c4b18285974b32863549d5c9405.yaml b/nuclei-templates/cve-less/plugins/notifyvisitors-lead-form-9efb6c4b18285974b32863549d5c9405.yaml new file mode 100644 index 0000000000..be4246b3a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/notifyvisitors-lead-form-9efb6c4b18285974b32863549d5c9405.yaml @@ -0,0 +1,58 @@ +id: notifyvisitors-lead-form-9efb6c4b18285974b32863549d5c9405 + +info: + name: > + NotifyVisitors <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dad9b612-5575-4e64-a1b3-52a2cf3f05a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/notifyvisitors-lead-form/" + google-query: inurl:"/wp-content/plugins/notifyvisitors-lead-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,notifyvisitors-lead-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/notifyvisitors-lead-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "notifyvisitors-lead-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/novelist-6151f342a42025e02d427b32216a8adf.yaml b/nuclei-templates/cve-less/plugins/novelist-6151f342a42025e02d427b32216a8adf.yaml new file mode 100644 index 0000000000..6631e2ecec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/novelist-6151f342a42025e02d427b32216a8adf.yaml @@ -0,0 +1,58 @@ +id: novelist-6151f342a42025e02d427b32216a8adf + +info: + name: > + Novelist <= 1.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00f33681-7edb-40a8-a1b4-433765ef7585?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/novelist/" + google-query: inurl:"/wp-content/plugins/novelist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,novelist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/novelist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "novelist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/novelist-f083409bbde8131959cd560116eb8b78.yaml b/nuclei-templates/cve-less/plugins/novelist-f083409bbde8131959cd560116eb8b78.yaml new file mode 100644 index 0000000000..71e4b72cd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/novelist-f083409bbde8131959cd560116eb8b78.yaml @@ -0,0 +1,58 @@ +id: novelist-f083409bbde8131959cd560116eb8b78 + +info: + name: > + Novelist <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via Book Information Fields + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b8f64ed-abf8-4a8b-b32f-75afeaccea5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/novelist/" + google-query: inurl:"/wp-content/plugins/novelist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,novelist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/novelist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "novelist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/novo-map-fd902d7294b8be7fc6c94e658239c2f8.yaml b/nuclei-templates/cve-less/plugins/novo-map-fd902d7294b8be7fc6c94e658239c2f8.yaml new file mode 100644 index 0000000000..fd629f6aad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/novo-map-fd902d7294b8be7fc6c94e658239c2f8.yaml @@ -0,0 +1,58 @@ +id: novo-map-fd902d7294b8be7fc6c94e658239c2f8 + +info: + name: > + Novo-Map : your WP posts on custom google maps <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f91816-a263-4938-bac1-eeb3bb2fc120?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/novo-map/" + google-query: inurl:"/wp-content/plugins/novo-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,novo-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/novo-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "novo-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nps-computy-822c780c5b9c36a2c5c6155802580253.yaml b/nuclei-templates/cve-less/plugins/nps-computy-822c780c5b9c36a2c5c6155802580253.yaml new file mode 100644 index 0000000000..28d442b3cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nps-computy-822c780c5b9c36a2c5c6155802580253.yaml @@ -0,0 +1,58 @@ +id: nps-computy-822c780c5b9c36a2c5c6155802580253 + +info: + name: > + NPS computy <= 2.7.5 - Cross-Site Request Forgery to Results Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/490b4ee5-dd99-42af-94af-b45cea27b287?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nps-computy/" + google-query: inurl:"/wp-content/plugins/nps-computy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nps-computy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nps-computy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nps-computy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nps-computy-9980c05da6f848a401a8e11f20123173.yaml b/nuclei-templates/cve-less/plugins/nps-computy-9980c05da6f848a401a8e11f20123173.yaml new file mode 100644 index 0000000000..1ae951d7e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nps-computy-9980c05da6f848a401a8e11f20123173.yaml @@ -0,0 +1,58 @@ +id: nps-computy-9980c05da6f848a401a8e11f20123173 + +info: + name: > + NPS computy <= 2.7.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1ac9f77-eea7-4726-b2ba-019c26aec242?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nps-computy/" + google-query: inurl:"/wp-content/plugins/nps-computy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nps-computy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nps-computy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nps-computy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ns-coupon-to-become-customer-b9cea09f7ed512cb1aad12f24e857815.yaml b/nuclei-templates/cve-less/plugins/ns-coupon-to-become-customer-b9cea09f7ed512cb1aad12f24e857815.yaml new file mode 100644 index 0000000000..eb2c9b0b2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ns-coupon-to-become-customer-b9cea09f7ed512cb1aad12f24e857815.yaml @@ -0,0 +1,58 @@ +id: ns-coupon-to-become-customer-b9cea09f7ed512cb1aad12f24e857815 + +info: + name: > + NS Coupon to Become Customer <= 1.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70e227a5-fc33-4ff2-a843-ef9484707ae7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ns-coupon-to-become-customer/" + google-query: inurl:"/wp-content/plugins/ns-coupon-to-become-customer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ns-coupon-to-become-customer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ns-coupon-to-become-customer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ns-coupon-to-become-customer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ns-facebook-pixel-for-wp-b2640c0e1d9759721b91219a63bf25ee.yaml b/nuclei-templates/cve-less/plugins/ns-facebook-pixel-for-wp-b2640c0e1d9759721b91219a63bf25ee.yaml new file mode 100644 index 0000000000..63d39efddd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ns-facebook-pixel-for-wp-b2640c0e1d9759721b91219a63bf25ee.yaml @@ -0,0 +1,58 @@ +id: ns-facebook-pixel-for-wp-b2640c0e1d9759721b91219a63bf25ee + +info: + name: > + Advanced Social Pixel <= 2.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/771da808-8962-46a3-8519-85d9422583f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ns-facebook-pixel-for-wp/" + google-query: inurl:"/wp-content/plugins/ns-facebook-pixel-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ns-facebook-pixel-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ns-facebook-pixel-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ns-facebook-pixel-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ns-woocommerce-watermark-0c0dde4c7a1e8ecba300d4f3a84714f5.yaml b/nuclei-templates/cve-less/plugins/ns-woocommerce-watermark-0c0dde4c7a1e8ecba300d4f3a84714f5.yaml new file mode 100644 index 0000000000..6cc1e34b30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ns-woocommerce-watermark-0c0dde4c7a1e8ecba300d4f3a84714f5.yaml @@ -0,0 +1,58 @@ +id: ns-woocommerce-watermark-0c0dde4c7a1e8ecba300d4f3a84714f5 + +info: + name: > + NS WooCommerce Watermark <= 2.11.3 - Abuse of Functionality + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d17f26b-e8b7-480d-bf03-2cfdb261fa28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ns-woocommerce-watermark/" + google-query: inurl:"/wp-content/plugins/ns-woocommerce-watermark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ns-woocommerce-watermark,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ns-woocommerce-watermark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ns-woocommerce-watermark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nuajik-cdn-f0470adcfca34e53051811d10184b858.yaml b/nuclei-templates/cve-less/plugins/nuajik-cdn-f0470adcfca34e53051811d10184b858.yaml new file mode 100644 index 0000000000..512749e16f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nuajik-cdn-f0470adcfca34e53051811d10184b858.yaml @@ -0,0 +1,58 @@ +id: nuajik-cdn-f0470adcfca34e53051811d10184b858 + +info: + name: > + nuajik CDN <= 0.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcf09793-1277-41a0-9ce4-b85b13721729?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nuajik-cdn/" + google-query: inurl:"/wp-content/plugins/nuajik-cdn/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nuajik-cdn,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nuajik-cdn/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nuajik-cdn" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nudgify-a865b1f08fb1dfda225878dc830c893d.yaml b/nuclei-templates/cve-less/plugins/nudgify-a865b1f08fb1dfda225878dc830c893d.yaml new file mode 100644 index 0000000000..8f30f0b034 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nudgify-a865b1f08fb1dfda225878dc830c893d.yaml @@ -0,0 +1,58 @@ +id: nudgify-a865b1f08fb1dfda225878dc830c893d + +info: + name: > + Nudgify Social Proof, Sales Popup & FOMO <= 1.3.3 - Cross-Site Request Forgery via sync_orders_manually() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c67ee9bc-3626-4323-8b16-0fcae0db1991?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nudgify/" + google-query: inurl:"/wp-content/plugins/nudgify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nudgify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nudgify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nudgify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nugget-by-ingot-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/nugget-by-ingot-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..815915eea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nugget-by-ingot-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: nugget-by-ingot-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nugget-by-ingot/" + google-query: inurl:"/wp-content/plugins/nugget-by-ingot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nugget-by-ingot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nugget-by-ingot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nugget-by-ingot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/nugget-by-ingot-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/nugget-by-ingot-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..17ef5bdd10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/nugget-by-ingot-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: nugget-by-ingot-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/nugget-by-ingot/" + google-query: inurl:"/wp-content/plugins/nugget-by-ingot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,nugget-by-ingot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/nugget-by-ingot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nugget-by-ingot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/number-chat-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/number-chat-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3c63796ce9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/number-chat-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: number-chat-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/number-chat/" + google-query: inurl:"/wp-content/plugins/number-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,number-chat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/number-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "number-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/o2s-gallery-b5871188dda12d0d2d7ff147e7d129e3.yaml b/nuclei-templates/cve-less/plugins/o2s-gallery-b5871188dda12d0d2d7ff147e7d129e3.yaml new file mode 100644 index 0000000000..13cea93235 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/o2s-gallery-b5871188dda12d0d2d7ff147e7d129e3.yaml @@ -0,0 +1,58 @@ +id: o2s-gallery-b5871188dda12d0d2d7ff147e7d129e3 + +info: + name: > + o2s gallery (All Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f20b79cd-4393-4c96-ac78-139ac7c11144?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/o2s-gallery/" + google-query: inurl:"/wp-content/plugins/o2s-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,o2s-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/o2s-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "o2s-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/o2tweet-8b7ce3f62fb6e151f58953706865b9ed.yaml b/nuclei-templates/cve-less/plugins/o2tweet-8b7ce3f62fb6e151f58953706865b9ed.yaml new file mode 100644 index 0000000000..e5ff6a4c38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/o2tweet-8b7ce3f62fb6e151f58953706865b9ed.yaml @@ -0,0 +1,58 @@ +id: o2tweet-8b7ce3f62fb6e151f58953706865b9ed + +info: + name: > + O2tweet <= 0.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b4921c8-8e53-4f9d-be21-cf365869a435?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/o2tweet/" + google-query: inurl:"/wp-content/plugins/o2tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,o2tweet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/o2tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "o2tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth-client-ed96d7b172dbc6676f3aac8fd6c4f947.yaml b/nuclei-templates/cve-less/plugins/oauth-client-ed96d7b172dbc6676f3aac8fd6c4f947.yaml new file mode 100644 index 0000000000..49e843d43d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth-client-ed96d7b172dbc6676f3aac8fd6c4f947.yaml @@ -0,0 +1,58 @@ +id: oauth-client-ed96d7b172dbc6676f3aac8fd6c4f947 + +info: + name: > + OAuth 2.0 client for SSO <= 1.11.3 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f33e8906-c607-40de-8c2a-93ca12519da5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth-client/" + google-query: inurl:"/wp-content/plugins/oauth-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth-client,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth-client-for-user-authentication-3ea452a110a6d721fb0c1348d6616fc5.yaml b/nuclei-templates/cve-less/plugins/oauth-client-for-user-authentication-3ea452a110a6d721fb0c1348d6616fc5.yaml new file mode 100644 index 0000000000..836132b050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth-client-for-user-authentication-3ea452a110a6d721fb0c1348d6616fc5.yaml @@ -0,0 +1,58 @@ +id: oauth-client-for-user-authentication-3ea452a110a6d721fb0c1348d6616fc5 + +info: + name: > + OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO ) <= 3.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/517653e5-fdad-4360-82a5-32b16a6cd631?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth-client-for-user-authentication/" + google-query: inurl:"/wp-content/plugins/oauth-client-for-user-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth-client-for-user-authentication,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth-client-for-user-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth-client-for-user-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth-client-for-user-authentication-c53104da05cdac90a010088ce54093bb.yaml b/nuclei-templates/cve-less/plugins/oauth-client-for-user-authentication-c53104da05cdac90a010088ce54093bb.yaml new file mode 100644 index 0000000000..e95c8e2eb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth-client-for-user-authentication-c53104da05cdac90a010088ce54093bb.yaml @@ -0,0 +1,58 @@ +id: oauth-client-for-user-authentication-c53104da05cdac90a010088ce54093bb + +info: + name: > + OAuth client Single Sign On for WordPress ( OAuth 2.0 SSO ) <= 3.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b028a70d-f103-4232-b854-17b88d4dc7d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth-client-for-user-authentication/" + google-query: inurl:"/wp-content/plugins/oauth-client-for-user-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth-client-for-user-authentication,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth-client-for-user-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth-client-for-user-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth-twitter-feed-for-developers-bca2d75657a1c7a6e99c08d66b7b4e2e.yaml b/nuclei-templates/cve-less/plugins/oauth-twitter-feed-for-developers-bca2d75657a1c7a6e99c08d66b7b4e2e.yaml new file mode 100644 index 0000000000..f62fb6289c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth-twitter-feed-for-developers-bca2d75657a1c7a6e99c08d66b7b4e2e.yaml @@ -0,0 +1,58 @@ +id: oauth-twitter-feed-for-developers-bca2d75657a1c7a6e99c08d66b7b4e2e + +info: + name: > + oAuth Twitter Feed for Developers <= 2.3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa3819b1-8e7c-4e97-bac5-96d73d935845?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth-twitter-feed-for-developers/" + google-query: inurl:"/wp-content/plugins/oauth-twitter-feed-for-developers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth-twitter-feed-for-developers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth-twitter-feed-for-developers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth-twitter-feed-for-developers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth2-provider-2b20f536c5a1e1ecc9328244cf31fc2a.yaml b/nuclei-templates/cve-less/plugins/oauth2-provider-2b20f536c5a1e1ecc9328244cf31fc2a.yaml new file mode 100644 index 0000000000..a5ff945cbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth2-provider-2b20f536c5a1e1ecc9328244cf31fc2a.yaml @@ -0,0 +1,58 @@ +id: oauth2-provider-2b20f536c5a1e1ecc9328244cf31fc2a + +info: + name: > + OAuth Server <= 4.3.3 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d425843-a68e-40fd-93de-04c1c46af88f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth2-provider/" + google-query: inurl:"/wp-content/plugins/oauth2-provider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth2-provider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth2-provider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth2-provider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth2-provider-41a31043d8f2b87b33721864ecd51995.yaml b/nuclei-templates/cve-less/plugins/oauth2-provider-41a31043d8f2b87b33721864ecd51995.yaml new file mode 100644 index 0000000000..034845344d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth2-provider-41a31043d8f2b87b33721864ecd51995.yaml @@ -0,0 +1,58 @@ +id: oauth2-provider-41a31043d8f2b87b33721864ecd51995 + +info: + name: > + WP OAuth Server <= 4.2.5 - Authenticated (Subscriber+) Arbitrary Client Deletion (wo_ajax_remove_client) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27da9458-ac19-4b4e-a14b-d1ba62e9e9ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth2-provider/" + google-query: inurl:"/wp-content/plugins/oauth2-provider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth2-provider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth2-provider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth2-provider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth2-provider-4b9f20c2f55cb0278e501a36498340f1.yaml b/nuclei-templates/cve-less/plugins/oauth2-provider-4b9f20c2f55cb0278e501a36498340f1.yaml new file mode 100644 index 0000000000..d6d0efdd1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth2-provider-4b9f20c2f55cb0278e501a36498340f1.yaml @@ -0,0 +1,58 @@ +id: oauth2-provider-4b9f20c2f55cb0278e501a36498340f1 + +info: + name: > + WP OAuth Server (OAuth Authentication) < 3.1.5 - Pseudorandom Number Generation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/598fffcd-0318-4e41-8837-f65761390c19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth2-provider/" + google-query: inurl:"/wp-content/plugins/oauth2-provider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth2-provider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth2-provider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth2-provider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth2-provider-b493d32c53c148490b49a06f9023d87a.yaml b/nuclei-templates/cve-less/plugins/oauth2-provider-b493d32c53c148490b49a06f9023d87a.yaml new file mode 100644 index 0000000000..60e991a9aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth2-provider-b493d32c53c148490b49a06f9023d87a.yaml @@ -0,0 +1,58 @@ +id: oauth2-provider-b493d32c53c148490b49a06f9023d87a + +info: + name: > + WP OAuth Server <= 4.2.3 - Cross-Site Request Forgery to Arbitrary Post Deletion (wo_ajax_remove_client) + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf68449-487d-4ef1-86be-c51dc7d79054?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth2-provider/" + google-query: inurl:"/wp-content/plugins/oauth2-provider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth2-provider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth2-provider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth2-provider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth2-provider-c7806db2330d78c1eb21bb3d81129b2a.yaml b/nuclei-templates/cve-less/plugins/oauth2-provider-c7806db2330d78c1eb21bb3d81129b2a.yaml new file mode 100644 index 0000000000..fb03072e60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth2-provider-c7806db2330d78c1eb21bb3d81129b2a.yaml @@ -0,0 +1,58 @@ +id: oauth2-provider-c7806db2330d78c1eb21bb3d81129b2a + +info: + name: > + WP OAuth Server (OAuth Authentication) <= 4.2.5 -Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fdc9d20-a1cf-4a58-b250-4f3f56b77b69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth2-provider/" + google-query: inurl:"/wp-content/plugins/oauth2-provider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth2-provider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth2-provider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth2-provider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth2-provider-cbceddd57d7051d45761e4fa44eca556.yaml b/nuclei-templates/cve-less/plugins/oauth2-provider-cbceddd57d7051d45761e4fa44eca556.yaml new file mode 100644 index 0000000000..0bb02f4137 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth2-provider-cbceddd57d7051d45761e4fa44eca556.yaml @@ -0,0 +1,58 @@ +id: oauth2-provider-cbceddd57d7051d45761e4fa44eca556 + +info: + name: > + WP OAuth Server (OAuth Authentication) <= 4.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77de0955-d6e4-4da0-8a71-772c404e5dc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth2-provider/" + google-query: inurl:"/wp-content/plugins/oauth2-provider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth2-provider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth2-provider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth2-provider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth2-provider-ef86ab7f523579cf61ae7ca65b0017ce.yaml b/nuclei-templates/cve-less/plugins/oauth2-provider-ef86ab7f523579cf61ae7ca65b0017ce.yaml new file mode 100644 index 0000000000..bd68d93249 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth2-provider-ef86ab7f523579cf61ae7ca65b0017ce.yaml @@ -0,0 +1,58 @@ +id: oauth2-provider-ef86ab7f523579cf61ae7ca65b0017ce + +info: + name: > + WP OAuth Server (OAuth Authentication) <= 4.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a07bd233-902c-402c-9055-f3085246da78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth2-provider/" + google-query: inurl:"/wp-content/plugins/oauth2-provider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth2-provider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth2-provider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth2-provider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oauth2-server-11efe70fd2ae23707bfcf341a18862cb.yaml b/nuclei-templates/cve-less/plugins/oauth2-server-11efe70fd2ae23707bfcf341a18862cb.yaml new file mode 100644 index 0000000000..9ea66b7626 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oauth2-server-11efe70fd2ae23707bfcf341a18862cb.yaml @@ -0,0 +1,58 @@ +id: oauth2-server-11efe70fd2ae23707bfcf341a18862cb + +info: + name: > + WP OAuth2 Server <= 1.0.1 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bd74c3f-3caf-4238-9478-81a4cfa50410?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oauth2-server/" + google-query: inurl:"/wp-content/plugins/oauth2-server/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oauth2-server,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oauth2-server/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oauth2-server" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/occasions-ffea4c38dbbf6eb29f1bb344ee6bae12.yaml b/nuclei-templates/cve-less/plugins/occasions-ffea4c38dbbf6eb29f1bb344ee6bae12.yaml new file mode 100644 index 0000000000..484ddef438 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/occasions-ffea4c38dbbf6eb29f1bb344ee6bae12.yaml @@ -0,0 +1,58 @@ +id: occasions-ffea4c38dbbf6eb29f1bb344ee6bae12 + +info: + name: > + Occasions <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f77cc1ed-d30e-4651-af23-29d34d76dc92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/occasions/" + google-query: inurl:"/wp-content/plugins/occasions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,occasions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/occasions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "occasions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-09c7e3b2a6a061e164af74ab6001f045.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-09c7e3b2a6a061e164af74ab6001f045.yaml new file mode 100644 index 0000000000..7e747ea72b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-09c7e3b2a6a061e164af74ab6001f045.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-09c7e3b2a6a061e164af74ab6001f045 + +info: + name: > + Ocean Extra <= 1.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4891055a-04b2-453d-a2ea-2fb793705ff8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-15e84b289a1503987417bb5a8a9db81a.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-15e84b289a1503987417bb5a8a9db81a.yaml new file mode 100644 index 0000000000..cd94f2ded2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-15e84b289a1503987417bb5a8a9db81a.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-15e84b289a1503987417bb5a8a9db81a + +info: + name: > + Ocean Extra <= 2.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/596e970b-5a40-46cd-aa32-ac6ace39c21b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-1fa0a5990488e25fdbc5ceea9aa094d8.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-1fa0a5990488e25fdbc5ceea9aa094d8.yaml new file mode 100644 index 0000000000..09a5b1c5f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-1fa0a5990488e25fdbc5ceea9aa094d8.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-1fa0a5990488e25fdbc5ceea9aa094d8 + +info: + name: > + Ocean Extra <= 2.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5458e3bf-fd91-4201-8157-572eb1126aaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-219e356df9406ff61a0cdb8030ff8ed2.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-219e356df9406ff61a0cdb8030ff8ed2.yaml new file mode 100644 index 0000000000..f8559f2e76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-219e356df9406ff61a0cdb8030ff8ed2.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-219e356df9406ff61a0cdb8030ff8ed2 + +info: + name: > + Ocean Extra <= 2.0.4 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eb19d3a-b180-4141-8c9b-bec436eeea6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-4ea74f3f54b0253dbabe0bce4a43a6d7.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-4ea74f3f54b0253dbabe0bce4a43a6d7.yaml new file mode 100644 index 0000000000..c0623de480 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-4ea74f3f54b0253dbabe0bce4a43a6d7.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-4ea74f3f54b0253dbabe0bce4a43a6d7 + +info: + name: > + Ocean Extra <=1.6.5 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb3ef121-13ea-4e42-90c1-1f4bd31ebbcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-59a12b62de2e9aeb74cd74615dde1cd6.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-59a12b62de2e9aeb74cd74615dde1cd6.yaml new file mode 100644 index 0000000000..265e48e811 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-59a12b62de2e9aeb74cd74615dde1cd6.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-59a12b62de2e9aeb74cd74615dde1cd6 + +info: + name: > + Ocean Extra <= 2.1.2 - Authenticated (Subscriber+) Arbitrary Post Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32192878-930a-4947-a38f-ec395c17e515?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-675e6b4bb186a17f8fbe362e07f780dc.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-675e6b4bb186a17f8fbe362e07f780dc.yaml new file mode 100644 index 0000000000..67a484421f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-675e6b4bb186a17f8fbe362e07f780dc.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-675e6b4bb186a17f8fbe362e07f780dc + +info: + name: > + Ocean Extra <= 2.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a292579c-9755-4bd4-996c-23d19ca1c197?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-6f81fcdf0f0749244884a26bed49387a.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-6f81fcdf0f0749244884a26bed49387a.yaml new file mode 100644 index 0000000000..e0335c1179 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-6f81fcdf0f0749244884a26bed49387a.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-6f81fcdf0f0749244884a26bed49387a + +info: + name: > + Ocean Extra <= 2.2.2 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac111175-2059-41dc-afa2-a659da3adaca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6bcd8925e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-d17f4b50b1d89180cdbd40b462cf4e20.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-d17f4b50b1d89180cdbd40b462cf4e20.yaml new file mode 100644 index 0000000000..a228c6320f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-d17f4b50b1d89180cdbd40b462cf4e20.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-d17f4b50b1d89180cdbd40b462cf4e20 + +info: + name: > + Ocean Extra <= 1.5.7 - Unauthenticated Options update and CSS injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a7677a4-0cd5-496e-82cb-f6582e63475d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocean-extra-dd78e64b2b479493968a1e6217c98447.yaml b/nuclei-templates/cve-less/plugins/ocean-extra-dd78e64b2b479493968a1e6217c98447.yaml new file mode 100644 index 0000000000..d768af4972 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocean-extra-dd78e64b2b479493968a1e6217c98447.yaml @@ -0,0 +1,58 @@ +id: ocean-extra-dd78e64b2b479493968a1e6217c98447 + +info: + name: > + Ocean Extra <= 2.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/617b2ef0-dc7b-4032-a145-5eaffb8194c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocean-extra/" + google-query: inurl:"/wp-content/plugins/ocean-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocean-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocean-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocean-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ocim-mp3-427c0efd9f4fe0120009a410add6694b.yaml b/nuclei-templates/cve-less/plugins/ocim-mp3-427c0efd9f4fe0120009a410add6694b.yaml new file mode 100644 index 0000000000..1b21257f58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ocim-mp3-427c0efd9f4fe0120009a410add6694b.yaml @@ -0,0 +1,58 @@ +id: ocim-mp3-427c0efd9f4fe0120009a410add6694b + +info: + name: > + Ocim MP3 (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96a9f567-6cf8-4988-bf8e-77eade71c5f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ocim-mp3/" + google-query: inurl:"/wp-content/plugins/ocim-mp3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ocim-mp3,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ocim-mp3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ocim-mp3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oembed-gist-d5fb85be1bce7f68e1b15520cd177f7a.yaml b/nuclei-templates/cve-less/plugins/oembed-gist-d5fb85be1bce7f68e1b15520cd177f7a.yaml new file mode 100644 index 0000000000..053302d46a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oembed-gist-d5fb85be1bce7f68e1b15520cd177f7a.yaml @@ -0,0 +1,58 @@ +id: oembed-gist-d5fb85be1bce7f68e1b15520cd177f7a + +info: + name: > + oEmbed Gist <= 4.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fed0e3bc-1401-410a-805d-1ea3e423024b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oembed-gist/" + google-query: inurl:"/wp-content/plugins/oembed-gist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oembed-gist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oembed-gist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oembed-gist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/off-canvas-sidebars-aedb89e2581210acfc64d10b1fcd7670.yaml b/nuclei-templates/cve-less/plugins/off-canvas-sidebars-aedb89e2581210acfc64d10b1fcd7670.yaml new file mode 100644 index 0000000000..3c018aa644 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/off-canvas-sidebars-aedb89e2581210acfc64d10b1fcd7670.yaml @@ -0,0 +1,58 @@ +id: off-canvas-sidebars-aedb89e2581210acfc64d10b1fcd7670 + +info: + name: > + Off-Canvas Sidebars & Menus (Slidebars) <= 0.5.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a92916c-42d4-44a6-a9b7-ff0338042b2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/off-canvas-sidebars/" + google-query: inurl:"/wp-content/plugins/off-canvas-sidebars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,off-canvas-sidebars,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/off-canvas-sidebars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "off-canvas-sidebars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-facebook-pixel-f71c21bb0ac8ac3a83c45ec9ea5fb6b4.yaml b/nuclei-templates/cve-less/plugins/official-facebook-pixel-f71c21bb0ac8ac3a83c45ec9ea5fb6b4.yaml new file mode 100644 index 0000000000..aafe76f09f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-facebook-pixel-f71c21bb0ac8ac3a83c45ec9ea5fb6b4.yaml @@ -0,0 +1,58 @@ +id: official-facebook-pixel-f71c21bb0ac8ac3a83c45ec9ea5fb6b4 + +info: + name: > + Facebook for WordPress <= 3.0.3 - Cross-site Request Forgery to Stored Cross-site Scripting and Settings Deletion via wp_ajax_(save|delete)_fbe_settings + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bc3039c-8e96-42e9-a28d-d3204f3e84f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-facebook-pixel/" + google-query: inurl:"/wp-content/plugins/official-facebook-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-facebook-pixel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-facebook-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-facebook-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-facebook-pixel-fc2e2c986080502cae4c6d1516b6383d.yaml b/nuclei-templates/cve-less/plugins/official-facebook-pixel-fc2e2c986080502cae4c6d1516b6383d.yaml new file mode 100644 index 0000000000..9c310c893a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-facebook-pixel-fc2e2c986080502cae4c6d1516b6383d.yaml @@ -0,0 +1,58 @@ +id: official-facebook-pixel-fc2e2c986080502cae4c6d1516b6383d + +info: + name: > + Meta pixel for WordPress <= 2.2.2 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17d4002d-3e87-46a7-9be6-c36e40c31c4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-facebook-pixel/" + google-query: inurl:"/wp-content/plugins/official-facebook-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-facebook-pixel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-facebook-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-facebook-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-26c3585e6e7fad9c8d3a82c1982ff984.yaml b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-26c3585e6e7fad9c8d3a82c1982ff984.yaml new file mode 100644 index 0000000000..9c8edc4be4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-26c3585e6e7fad9c8d3a82c1982ff984.yaml @@ -0,0 +1,58 @@ +id: official-mailerlite-sign-up-forms-26c3585e6e7fad9c8d3a82c1982ff984 + +info: + name: > + MailerLite – Signup forms (official) 1.5.0 - 1.7.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f34f4a6-9092-4e67-8a1e-7c60edde0b2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-mailerlite-sign-up-forms/" + google-query: inurl:"/wp-content/plugins/official-mailerlite-sign-up-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-mailerlite-sign-up-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-mailerlite-sign-up-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-mailerlite-sign-up-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.5.0', '<= 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-72b3ee0aa0ee9a6370b95e5e332c6b93.yaml b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-72b3ee0aa0ee9a6370b95e5e332c6b93.yaml new file mode 100644 index 0000000000..0a0932a9f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-72b3ee0aa0ee9a6370b95e5e332c6b93.yaml @@ -0,0 +1,58 @@ +id: official-mailerlite-sign-up-forms-72b3ee0aa0ee9a6370b95e5e332c6b93 + +info: + name: > + MailerLite – Signup forms (official) <= 1.7.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a03b4c19-85fa-47ad-b9ae-b466f8e5ca96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-mailerlite-sign-up-forms/" + google-query: inurl:"/wp-content/plugins/official-mailerlite-sign-up-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-mailerlite-sign-up-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-mailerlite-sign-up-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-mailerlite-sign-up-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-8057fa684bd813756becca039228732e.yaml b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-8057fa684bd813756becca039228732e.yaml new file mode 100644 index 0000000000..e928d81355 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-8057fa684bd813756becca039228732e.yaml @@ -0,0 +1,58 @@ +id: official-mailerlite-sign-up-forms-8057fa684bd813756becca039228732e + +info: + name: > + MailerLite – Signup forms <= 1.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3b79fab-208f-4354-89ea-508290dcd851?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-mailerlite-sign-up-forms/" + google-query: inurl:"/wp-content/plugins/official-mailerlite-sign-up-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-mailerlite-sign-up-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-mailerlite-sign-up-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-mailerlite-sign-up-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-83cdeca9a177bee255e863b7e36aae57.yaml b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-83cdeca9a177bee255e863b7e36aae57.yaml new file mode 100644 index 0000000000..5af5bcaf96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-83cdeca9a177bee255e863b7e36aae57.yaml @@ -0,0 +1,58 @@ +id: official-mailerlite-sign-up-forms-83cdeca9a177bee255e863b7e36aae57 + +info: + name: > + MailerLite – Signup forms (official) <= 1.5.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/156b955d-e978-4ff5-ab56-35af257b3199?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-mailerlite-sign-up-forms/" + google-query: inurl:"/wp-content/plugins/official-mailerlite-sign-up-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-mailerlite-sign-up-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-mailerlite-sign-up-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-mailerlite-sign-up-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-a684bdf0ee6ecd33a27b06b384e7ee6c.yaml b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-a684bdf0ee6ecd33a27b06b384e7ee6c.yaml new file mode 100644 index 0000000000..786bfcf8c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-a684bdf0ee6ecd33a27b06b384e7ee6c.yaml @@ -0,0 +1,58 @@ +id: official-mailerlite-sign-up-forms-a684bdf0ee6ecd33a27b06b384e7ee6c + +info: + name: > + MailerLite Signup Forms < 1.4.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec9cd4a8-286e-43d7-8cb6-6cc363800e20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-mailerlite-sign-up-forms/" + google-query: inurl:"/wp-content/plugins/official-mailerlite-sign-up-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-mailerlite-sign-up-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-mailerlite-sign-up-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-mailerlite-sign-up-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-e5931a630006ade9f39755f24e1f8775.yaml b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-e5931a630006ade9f39755f24e1f8775.yaml new file mode 100644 index 0000000000..6c27c190e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-mailerlite-sign-up-forms-e5931a630006ade9f39755f24e1f8775.yaml @@ -0,0 +1,58 @@ +id: official-mailerlite-sign-up-forms-e5931a630006ade9f39755f24e1f8775 + +info: + name: > + MailerLite - Signup forms <= 1.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e383235-8f61-46f2-bd54-cc41e3ec189e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-mailerlite-sign-up-forms/" + google-query: inurl:"/wp-content/plugins/official-mailerlite-sign-up-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-mailerlite-sign-up-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-mailerlite-sign-up-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-mailerlite-sign-up-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-sendle-shipping-method-74909c964d07fc09665c9e492aec8fb5.yaml b/nuclei-templates/cve-less/plugins/official-sendle-shipping-method-74909c964d07fc09665c9e492aec8fb5.yaml new file mode 100644 index 0000000000..5977909009 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-sendle-shipping-method-74909c964d07fc09665c9e492aec8fb5.yaml @@ -0,0 +1,58 @@ +id: official-sendle-shipping-method-74909c964d07fc09665c9e492aec8fb5 + +info: + name: > + Sendle Shipping <= 5.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e227e25-3dd9-47fd-bba8-e076f7f92d56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-sendle-shipping-method/" + google-query: inurl:"/wp-content/plugins/official-sendle-shipping-method/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-sendle-shipping-method,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-sendle-shipping-method/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-sendle-shipping-method" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/official-statcounter-plugin-for-wordpress-d0adb6ab141d87bc7e2689c3386228f9.yaml b/nuclei-templates/cve-less/plugins/official-statcounter-plugin-for-wordpress-d0adb6ab141d87bc7e2689c3386228f9.yaml new file mode 100644 index 0000000000..2321a5a69d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/official-statcounter-plugin-for-wordpress-d0adb6ab141d87bc7e2689c3386228f9.yaml @@ -0,0 +1,58 @@ +id: official-statcounter-plugin-for-wordpress-d0adb6ab141d87bc7e2689c3386228f9 + +info: + name: > + StatCounter <= 2.0.6 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edcc51f8-bf79-453a-aa4d-5d1d491316eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/official-statcounter-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/official-statcounter-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,official-statcounter-plugin-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/official-statcounter-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "official-statcounter-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/og-tags-d6eff878d5e751e7448431e370bd1e18.yaml b/nuclei-templates/cve-less/plugins/og-tags-d6eff878d5e751e7448431e370bd1e18.yaml new file mode 100644 index 0000000000..b6de16e19b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/og-tags-d6eff878d5e751e7448431e370bd1e18.yaml @@ -0,0 +1,58 @@ +id: og-tags-d6eff878d5e751e7448431e370bd1e18 + +info: + name: > + OG Tags <= 2.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cfe9ab3-45b8-4ee5-9de1-45182a4fc46f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/og-tags/" + google-query: inurl:"/wp-content/plugins/og-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,og-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/og-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "og-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oi-yamaps-edd20f1acfb98b2d0a1653edfc88a6dc.yaml b/nuclei-templates/cve-less/plugins/oi-yamaps-edd20f1acfb98b2d0a1653edfc88a6dc.yaml new file mode 100644 index 0000000000..855433ce9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oi-yamaps-edd20f1acfb98b2d0a1653edfc88a6dc.yaml @@ -0,0 +1,58 @@ +id: oi-yamaps-edd20f1acfb98b2d0a1653edfc88a6dc + +info: + name: > + Oi Yandex.Maps for WordPress <= 3.2.7 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28ca388f-0505-47ae-9408-e3d101101fae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oi-yamaps/" + google-query: inurl:"/wp-content/plugins/oi-yamaps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oi-yamaps,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oi-yamaps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oi-yamaps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oik-31709e141c457255c2ab0ae7529088be.yaml b/nuclei-templates/cve-less/plugins/oik-31709e141c457255c2ab0ae7529088be.yaml new file mode 100644 index 0000000000..aa70381811 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oik-31709e141c457255c2ab0ae7529088be.yaml @@ -0,0 +1,58 @@ +id: oik-31709e141c457255c2ab0ae7529088be + +info: + name: > + oik <= 4.10.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1266c6df-214b-4b6b-8f1d-a67385469bf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oik/" + google-query: inurl:"/wp-content/plugins/oik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oik,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oleggo-livestream-a72c869069d2e541af149f51ffaa7390.yaml b/nuclei-templates/cve-less/plugins/oleggo-livestream-a72c869069d2e541af149f51ffaa7390.yaml new file mode 100644 index 0000000000..d1cf2b3f08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oleggo-livestream-a72c869069d2e541af149f51ffaa7390.yaml @@ -0,0 +1,58 @@ +id: oleggo-livestream-a72c869069d2e541af149f51ffaa7390 + +info: + name: > + Oleggo LiveStream <= 0.2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af1796b7-64b4-4198-9ba4-8a77a0f1cf02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oleggo-livestream/" + google-query: inurl:"/wp-content/plugins/oleggo-livestream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oleggo-livestream,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oleggo-livestream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oleggo-livestream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-76ca7c77b83fa68f077aef4f9085d916.yaml b/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-76ca7c77b83fa68f077aef4f9085d916.yaml new file mode 100644 index 0000000000..d6dc2d89ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-76ca7c77b83fa68f077aef4f9085d916.yaml @@ -0,0 +1,58 @@ +id: olevmedia-shortcodes-76ca7c77b83fa68f077aef4f9085d916 + +info: + name: > + Olevmedia Shortcodes <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66607be6-cca1-4cbb-b1c0-708d640b1151?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/olevmedia-shortcodes/" + google-query: inurl:"/wp-content/plugins/olevmedia-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,olevmedia-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/olevmedia-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "olevmedia-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-d25bac07f3777da904ec9b43911bfe31.yaml b/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-d25bac07f3777da904ec9b43911bfe31.yaml new file mode 100644 index 0000000000..c5c65a0ac5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-d25bac07f3777da904ec9b43911bfe31.yaml @@ -0,0 +1,58 @@ +id: olevmedia-shortcodes-d25bac07f3777da904ec9b43911bfe31 + +info: + name: > + Olevmedia Shortcodes <= 1.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c995da3-83c4-4734-8d4f-24c34f12919c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/olevmedia-shortcodes/" + google-query: inurl:"/wp-content/plugins/olevmedia-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,olevmedia-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/olevmedia-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "olevmedia-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-d767c0b5d303daf65b04ebec294c7e3f.yaml b/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-d767c0b5d303daf65b04ebec294c7e3f.yaml new file mode 100644 index 0000000000..e678a1af7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/olevmedia-shortcodes-d767c0b5d303daf65b04ebec294c7e3f.yaml @@ -0,0 +1,58 @@ +id: olevmedia-shortcodes-d767c0b5d303daf65b04ebec294c7e3f + +info: + name: > + Olevmedia Shortcodes <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ce22e5b-7f5c-41be-a50e-dc8100348122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/olevmedia-shortcodes/" + google-query: inurl:"/wp-content/plugins/olevmedia-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,olevmedia-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/olevmedia-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "olevmedia-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/olimometer-c521258f5992e6f5c61e1567e72a1351.yaml b/nuclei-templates/cve-less/plugins/olimometer-c521258f5992e6f5c61e1567e72a1351.yaml new file mode 100644 index 0000000000..28d5c2be8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/olimometer-c521258f5992e6f5c61e1567e72a1351.yaml @@ -0,0 +1,58 @@ +id: olimometer-c521258f5992e6f5c61e1567e72a1351 + +info: + name: > + Olimometer < 2.57 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c148372b-e0d2-4164-b7e7-91921720adcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/olimometer/" + google-query: inurl:"/wp-content/plugins/olimometer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,olimometer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/olimometer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "olimometer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/olive-one-click-demo-import-440a978024c68b2f27be0eeba3cb55c2.yaml b/nuclei-templates/cve-less/plugins/olive-one-click-demo-import-440a978024c68b2f27be0eeba3cb55c2.yaml new file mode 100644 index 0000000000..5936d4387f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/olive-one-click-demo-import-440a978024c68b2f27be0eeba3cb55c2.yaml @@ -0,0 +1,58 @@ +id: olive-one-click-demo-import-440a978024c68b2f27be0eeba3cb55c2 + +info: + name: > + Olive One Click Demo Import <= 1.1.2 - Authenticated (Administrator+) Arbitrary File Upload in olive_one_click_demo_import_save_file + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f3e3311-11d8-4e4f-9d99-36533fe44d56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/olive-one-click-demo-import/" + google-query: inurl:"/wp-content/plugins/olive-one-click-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,olive-one-click-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/olive-one-click-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "olive-one-click-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/olive-one-click-demo-import-5d017f957b0d5736d3f04d80942cf97a.yaml b/nuclei-templates/cve-less/plugins/olive-one-click-demo-import-5d017f957b0d5736d3f04d80942cf97a.yaml new file mode 100644 index 0000000000..48ee71377e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/olive-one-click-demo-import-5d017f957b0d5736d3f04d80942cf97a.yaml @@ -0,0 +1,58 @@ +id: olive-one-click-demo-import-5d017f957b0d5736d3f04d80942cf97a + +info: + name: > + Olive One Click Demo Import <= 1.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11b8c13b-2167-4fca-a981-a331fadc0439?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/olive-one-click-demo-import/" + google-query: inurl:"/wp-content/plugins/olive-one-click-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,olive-one-click-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/olive-one-click-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "olive-one-click-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oliver-pos-245aba3aeb74b218457ab6f11f877ea6.yaml b/nuclei-templates/cve-less/plugins/oliver-pos-245aba3aeb74b218457ab6f11f877ea6.yaml new file mode 100644 index 0000000000..f3f35e004e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oliver-pos-245aba3aeb74b218457ab6f11f877ea6.yaml @@ -0,0 +1,58 @@ +id: oliver-pos-245aba3aeb74b218457ab6f11f877ea6 + +info: + name: > + Oliver POS – A WooCommerce Point of Sale (POS) <= 2.4.1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88d16ce2-a1cf-4402-b140-3cab17f8c638?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oliver-pos/" + google-query: inurl:"/wp-content/plugins/oliver-pos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oliver-pos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oliver-pos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oliver-pos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oliver-pos-258778bddb1333c1704be45e0fa7b778.yaml b/nuclei-templates/cve-less/plugins/oliver-pos-258778bddb1333c1704be45e0fa7b778.yaml new file mode 100644 index 0000000000..c83dad673e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oliver-pos-258778bddb1333c1704be45e0fa7b778.yaml @@ -0,0 +1,58 @@ +id: oliver-pos-258778bddb1333c1704be45e0fa7b778 + +info: + name: > + Oliver POS – A WooCommerce Point of Sale (POS) <= 2.4.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c6f351-477b-4384-9863-fe3b45ddf21d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oliver-pos/" + google-query: inurl:"/wp-content/plugins/oliver-pos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oliver-pos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oliver-pos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oliver-pos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/olympus-google-fonts-97a8bbca52a057b5fde67edd446b89ce.yaml b/nuclei-templates/cve-less/plugins/olympus-google-fonts-97a8bbca52a057b5fde67edd446b89ce.yaml new file mode 100644 index 0000000000..308a9d74fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/olympus-google-fonts-97a8bbca52a057b5fde67edd446b89ce.yaml @@ -0,0 +1,58 @@ +id: olympus-google-fonts-97a8bbca52a057b5fde67edd446b89ce + +info: + name: > + Google Fonts Typography <= 3.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via blockType arguments + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d3b4315-05cd-4349-8dd9-ea6792048a9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/olympus-google-fonts/" + google-query: inurl:"/wp-content/plugins/olympus-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,olympus-google-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/olympus-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "olympus-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/omfg-mobile-719947b7a1ac06fd82b24dd2b2c29f27.yaml b/nuclei-templates/cve-less/plugins/omfg-mobile-719947b7a1ac06fd82b24dd2b2c29f27.yaml new file mode 100644 index 0000000000..8e9b29218d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/omfg-mobile-719947b7a1ac06fd82b24dd2b2c29f27.yaml @@ -0,0 +1,58 @@ +id: omfg-mobile-719947b7a1ac06fd82b24dd2b2c29f27 + +info: + name: > + OMFG Mobile Pro <= 1.1.26 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf458f57-2c8b-44d1-8e36-bbfc1a66c2e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/omfg-mobile/" + google-query: inurl:"/wp-content/plugins/omfg-mobile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,omfg-mobile,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/omfg-mobile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "omfg-mobile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/omni-secure-files-6a2f2d47c1f3b50eb9874ef14abbcb61.yaml b/nuclei-templates/cve-less/plugins/omni-secure-files-6a2f2d47c1f3b50eb9874ef14abbcb61.yaml new file mode 100644 index 0000000000..718febb3da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/omni-secure-files-6a2f2d47c1f3b50eb9874ef14abbcb61.yaml @@ -0,0 +1,58 @@ +id: omni-secure-files-6a2f2d47c1f3b50eb9874ef14abbcb61 + +info: + name: > + Omni Secure Files <= 0.1.13 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc748d31-b8e6-44b6-af30-944c0b0f1f0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/omni-secure-files/" + google-query: inurl:"/wp-content/plugins/omni-secure-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,omni-secure-files,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/omni-secure-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "omni-secure-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/omnisend-connect-8c66e65fe1fbe52e6fc55791d539f808.yaml b/nuclei-templates/cve-less/plugins/omnisend-connect-8c66e65fe1fbe52e6fc55791d539f808.yaml new file mode 100644 index 0000000000..d6ca065076 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/omnisend-connect-8c66e65fe1fbe52e6fc55791d539f808.yaml @@ -0,0 +1,58 @@ +id: omnisend-connect-8c66e65fe1fbe52e6fc55791d539f808 + +info: + name: > + Email Marketing for WooCommerce by Omnisend <= 1.13.8 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc2cd74d-b828-4524-b33d-c806bfd970b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/omnisend-connect/" + google-query: inurl:"/wp-content/plugins/omnisend-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,omnisend-connect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/omnisend-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "omnisend-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/omnisend-connect-fed4c752f6b00fd9dda419d58b575ffe.yaml b/nuclei-templates/cve-less/plugins/omnisend-connect-fed4c752f6b00fd9dda419d58b575ffe.yaml new file mode 100644 index 0000000000..e8136c5039 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/omnisend-connect-fed4c752f6b00fd9dda419d58b575ffe.yaml @@ -0,0 +1,58 @@ +id: omnisend-connect-fed4c752f6b00fd9dda419d58b575ffe + +info: + name: > + Email Marketing for WooCommerce by Omnisend <= 1.14.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f54f1e41-788b-45e5-b84f-06e664f5c597?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/omnisend-connect/" + google-query: inurl:"/wp-content/plugins/omnisend-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,omnisend-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/omnisend-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "omnisend-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onclick-show-popup-a274b1ec9586c121ed58c6cb9eda6a2b.yaml b/nuclei-templates/cve-less/plugins/onclick-show-popup-a274b1ec9586c121ed58c6cb9eda6a2b.yaml new file mode 100644 index 0000000000..beeffc1c3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onclick-show-popup-a274b1ec9586c121ed58c6cb9eda6a2b.yaml @@ -0,0 +1,58 @@ +id: onclick-show-popup-a274b1ec9586c121ed58c6cb9eda6a2b + +info: + name: > + Onclick Show Popup <= 8.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee013d3f-18bc-418e-ab5b-87724710f340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onclick-show-popup/" + google-query: inurl:"/wp-content/plugins/onclick-show-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onclick-show-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onclick-show-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onclick-show-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onclick-show-popup-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/onclick-show-popup-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..889108f956 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onclick-show-popup-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: onclick-show-popup-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onclick-show-popup/" + google-query: inurl:"/wp-content/plugins/onclick-show-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onclick-show-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onclick-show-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onclick-show-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/one-click-demo-import-a9a32f74174df8c480433ef7ce05b39d.yaml b/nuclei-templates/cve-less/plugins/one-click-demo-import-a9a32f74174df8c480433ef7ce05b39d.yaml new file mode 100644 index 0000000000..04f0ce41b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/one-click-demo-import-a9a32f74174df8c480433ef7ce05b39d.yaml @@ -0,0 +1,58 @@ +id: one-click-demo-import-a9a32f74174df8c480433ef7ce05b39d + +info: + name: > + Catch Themes Demo Import <= 3.0.2 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe98bd8c-6db3-4094-8ff2-ab21c8778698?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/one-click-demo-import/" + google-query: inurl:"/wp-content/plugins/one-click-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,one-click-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/one-click-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "one-click-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/one-click-login-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/one-click-login-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..182aea529a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/one-click-login-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: one-click-login-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/one-click-login/" + google-query: inurl:"/wp-content/plugins/one-click-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,one-click-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/one-click-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "one-click-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/one-click-plugin-updater-a27299fafee4147eee6143e446c0d4ac.yaml b/nuclei-templates/cve-less/plugins/one-click-plugin-updater-a27299fafee4147eee6143e446c0d4ac.yaml new file mode 100644 index 0000000000..ad2620052e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/one-click-plugin-updater-a27299fafee4147eee6143e446c0d4ac.yaml @@ -0,0 +1,58 @@ +id: one-click-plugin-updater-a27299fafee4147eee6143e446c0d4ac + +info: + name: > + One Click Plugin Updater <= 2.4.14 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65b2b72a-5c76-463e-9513-26b400b40a65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/one-click-plugin-updater/" + google-query: inurl:"/wp-content/plugins/one-click-plugin-updater/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,one-click-plugin-updater,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/one-click-plugin-updater/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "one-click-plugin-updater" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/one-click-ssl-a5333a81df962bfc4dc1ef98d3ece12b.yaml b/nuclei-templates/cve-less/plugins/one-click-ssl-a5333a81df962bfc4dc1ef98d3ece12b.yaml new file mode 100644 index 0000000000..c716dcffd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/one-click-ssl-a5333a81df962bfc4dc1ef98d3ece12b.yaml @@ -0,0 +1,58 @@ +id: one-click-ssl-a5333a81df962bfc4dc1ef98d3ece12b + +info: + name: > + One Click SSL <= 1.4.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a296dd3-fbcb-4443-a905-9cbaa87faf7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/one-click-ssl/" + google-query: inurl:"/wp-content/plugins/one-click-ssl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,one-click-ssl,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/one-click-ssl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "one-click-ssl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/one-page-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/one-page-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..9c6baa1722 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/one-page-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: one-page-blocks-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/one-page-blocks/" + google-query: inurl:"/wp-content/plugins/one-page-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,one-page-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/one-page-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "one-page-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/one-user-avatar-2eb3196d201c69c1b619f7192e23dfa3.yaml b/nuclei-templates/cve-less/plugins/one-user-avatar-2eb3196d201c69c1b619f7192e23dfa3.yaml new file mode 100644 index 0000000000..c591033af7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/one-user-avatar-2eb3196d201c69c1b619f7192e23dfa3.yaml @@ -0,0 +1,58 @@ +id: one-user-avatar-2eb3196d201c69c1b619f7192e23dfa3 + +info: + name: > + One User Avatar <= 2.3.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e17dd3e7-9bd9-4852-9512-72fe1e40f86a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/one-user-avatar/" + google-query: inurl:"/wp-content/plugins/one-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,one-user-avatar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/one-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "one-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/one-user-avatar-7a9355f03955196b49afdc0799980494.yaml b/nuclei-templates/cve-less/plugins/one-user-avatar-7a9355f03955196b49afdc0799980494.yaml new file mode 100644 index 0000000000..d1c5fd07f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/one-user-avatar-7a9355f03955196b49afdc0799980494.yaml @@ -0,0 +1,58 @@ +id: one-user-avatar-7a9355f03955196b49afdc0799980494 + +info: + name: > + One User Avatar <= 2.3.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c35ed3ef-49bd-4f64-bb0f-2abedb7b978e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/one-user-avatar/" + google-query: inurl:"/wp-content/plugins/one-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,one-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/one-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "one-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-5e1a23f981a78be569054daae1a85203.yaml b/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-5e1a23f981a78be569054daae1a85203.yaml new file mode 100644 index 0000000000..0c4670e3be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-5e1a23f981a78be569054daae1a85203.yaml @@ -0,0 +1,58 @@ +id: oneclick-whatsapp-order-5e1a23f981a78be569054daae1a85203 + +info: + name: > + OneClick Chat to Order <= 1.0.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/172d8ffc-7ed3-43a6-942c-93b476a4fb50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oneclick-whatsapp-order/" + google-query: inurl:"/wp-content/plugins/oneclick-whatsapp-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oneclick-whatsapp-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oneclick-whatsapp-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oneclick-whatsapp-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-5fad00879c22741100673bb27b7a3e06.yaml b/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-5fad00879c22741100673bb27b7a3e06.yaml new file mode 100644 index 0000000000..660bfa5875 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-5fad00879c22741100673bb27b7a3e06.yaml @@ -0,0 +1,58 @@ +id: oneclick-whatsapp-order-5fad00879c22741100673bb27b7a3e06 + +info: + name: > + OneClick Chat to Order <= 1.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbc3fa27-630d-4048-b727-903da09ad644?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oneclick-whatsapp-order/" + google-query: inurl:"/wp-content/plugins/oneclick-whatsapp-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oneclick-whatsapp-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oneclick-whatsapp-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oneclick-whatsapp-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-78ddb3e5efc137c9989117bb477a197f.yaml b/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-78ddb3e5efc137c9989117bb477a197f.yaml new file mode 100644 index 0000000000..558620de0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-78ddb3e5efc137c9989117bb477a197f.yaml @@ -0,0 +1,58 @@ +id: oneclick-whatsapp-order-78ddb3e5efc137c9989117bb477a197f + +info: + name: > + OneClick Chat to Order <= 1.0.4.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94f338c2-95c9-4ce8-8579-0b2b66547aa0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oneclick-whatsapp-order/" + google-query: inurl:"/wp-content/plugins/oneclick-whatsapp-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oneclick-whatsapp-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oneclick-whatsapp-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oneclick-whatsapp-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-96bf5a76ba4653bdf89616d82d0bf5c1.yaml b/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-96bf5a76ba4653bdf89616d82d0bf5c1.yaml new file mode 100644 index 0000000000..36e17775db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oneclick-whatsapp-order-96bf5a76ba4653bdf89616d82d0bf5c1.yaml @@ -0,0 +1,58 @@ +id: oneclick-whatsapp-order-96bf5a76ba4653bdf89616d82d0bf5c1 + +info: + name: > + OneClick Chat to Order <= 1.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e4aaf2e-a0c6-47d2-9eb8-d65952a74424?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oneclick-whatsapp-order/" + google-query: inurl:"/wp-content/plugins/oneclick-whatsapp-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oneclick-whatsapp-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oneclick-whatsapp-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oneclick-whatsapp-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onelogin-saml-sso-1108320cabd88205cc0f43eb95edee22.yaml b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-1108320cabd88205cc0f43eb95edee22.yaml new file mode 100644 index 0000000000..37d064a53b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-1108320cabd88205cc0f43eb95edee22.yaml @@ -0,0 +1,58 @@ +id: onelogin-saml-sso-1108320cabd88205cc0f43eb95edee22 + +info: + name: > + OneLogin SAML SSO < 2.2.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10ee015a-c60b-4236-bb7a-9d3ffd944bf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onelogin-saml-sso/" + google-query: inurl:"/wp-content/plugins/onelogin-saml-sso/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onelogin-saml-sso,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onelogin-saml-sso/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onelogin-saml-sso" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onelogin-saml-sso-5904f2c1ee5058ca4f26abdf16ad81a9.yaml b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-5904f2c1ee5058ca4f26abdf16ad81a9.yaml new file mode 100644 index 0000000000..686a6c343a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-5904f2c1ee5058ca4f26abdf16ad81a9.yaml @@ -0,0 +1,58 @@ +id: onelogin-saml-sso-5904f2c1ee5058ca4f26abdf16ad81a9 + +info: + name: > + OneLogin SAML SSO <= 2.4.2 - Use of Vulnerable Component + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b524e239-0a7c-4515-8126-4fd298e43bdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onelogin-saml-sso/" + google-query: inurl:"/wp-content/plugins/onelogin-saml-sso/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onelogin-saml-sso,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onelogin-saml-sso/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onelogin-saml-sso" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onelogin-saml-sso-915fc461dd70a0b67939a2bed7cf5a68.yaml b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-915fc461dd70a0b67939a2bed7cf5a68.yaml new file mode 100644 index 0000000000..7e998344ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-915fc461dd70a0b67939a2bed7cf5a68.yaml @@ -0,0 +1,58 @@ +id: onelogin-saml-sso-915fc461dd70a0b67939a2bed7cf5a68 + +info: + name: > + OneLogin SAML SSO <= 3.1.2 - Open Redirection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dede9cfc-61f1-4df1-bd40-e5ae73199575?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onelogin-saml-sso/" + google-query: inurl:"/wp-content/plugins/onelogin-saml-sso/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onelogin-saml-sso,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onelogin-saml-sso/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onelogin-saml-sso" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onelogin-saml-sso-a4d6624c57bb300c720d6a9c5b907312.yaml b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-a4d6624c57bb300c720d6a9c5b907312.yaml new file mode 100644 index 0000000000..3cb6c36376 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-a4d6624c57bb300c720d6a9c5b907312.yaml @@ -0,0 +1,58 @@ +id: onelogin-saml-sso-a4d6624c57bb300c720d6a9c5b907312 + +info: + name: > + OneLogin SAML-SSO Plugin < 2.1.6 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5a5c209-0ccd-4fa9-b22d-05bb22247441?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onelogin-saml-sso/" + google-query: inurl:"/wp-content/plugins/onelogin-saml-sso/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onelogin-saml-sso,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onelogin-saml-sso/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onelogin-saml-sso" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onelogin-saml-sso-eefbacdc57528669a142d2f5ac41c616.yaml b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-eefbacdc57528669a142d2f5ac41c616.yaml new file mode 100644 index 0000000000..7660008b18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onelogin-saml-sso-eefbacdc57528669a142d2f5ac41c616.yaml @@ -0,0 +1,58 @@ +id: onelogin-saml-sso-eefbacdc57528669a142d2f5ac41c616 + +info: + name: > + OneLogin SAML SSO <= 2.8.0 - Distributed Denial-of-Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ac3dae6-1890-44ba-9671-84f77807ffe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onelogin-saml-sso/" + google-query: inurl:"/wp-content/plugins/onelogin-saml-sso/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onelogin-saml-sso,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onelogin-saml-sso/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onelogin-saml-sso" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onesignal-free-web-push-notifications-697b3f7f41c78660c9aef82a5b73a231.yaml b/nuclei-templates/cve-less/plugins/onesignal-free-web-push-notifications-697b3f7f41c78660c9aef82a5b73a231.yaml new file mode 100644 index 0000000000..279fb0fa3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onesignal-free-web-push-notifications-697b3f7f41c78660c9aef82a5b73a231.yaml @@ -0,0 +1,58 @@ +id: onesignal-free-web-push-notifications-697b3f7f41c78660c9aef82a5b73a231 + +info: + name: > + OneSignal Web Push Notifications <=1.17.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a913ca7e-8f61-4615-b7fb-863b111fe22e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onesignal-free-web-push-notifications/" + google-query: inurl:"/wp-content/plugins/onesignal-free-web-push-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onesignal-free-web-push-notifications,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onesignal-free-web-push-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onesignal-free-web-push-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onetone-companion-161c93480bad1a6fddf7935d08286cca.yaml b/nuclei-templates/cve-less/plugins/onetone-companion-161c93480bad1a6fddf7935d08286cca.yaml new file mode 100644 index 0000000000..3c06dacb80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onetone-companion-161c93480bad1a6fddf7935d08286cca.yaml @@ -0,0 +1,58 @@ +id: onetone-companion-161c93480bad1a6fddf7935d08286cca + +info: + name: > + OneTone <= 3.0.6 & OneTone Companion <= 1.1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2777158-baa4-4209-ae15-03da5adafc75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onetone-companion/" + google-query: inurl:"/wp-content/plugins/onetone-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onetone-companion,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onetone-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onetone-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onetone-companion-95f9bc03677a083bf89832ea0c794033.yaml b/nuclei-templates/cve-less/plugins/onetone-companion-95f9bc03677a083bf89832ea0c794033.yaml new file mode 100644 index 0000000000..b2316a805f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onetone-companion-95f9bc03677a083bf89832ea0c794033.yaml @@ -0,0 +1,58 @@ +id: onetone-companion-95f9bc03677a083bf89832ea0c794033 + +info: + name: > + OneTone <= 3.0.6 & OneTone Companion <= 1.1.1 - Unauthenticated Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8082c60-436d-42e3-8aa5-cd2cb8ce6355?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onetone-companion/" + google-query: inurl:"/wp-content/plugins/onetone-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onetone-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onetone-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onetone-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onetone-companion-ad2905956fc52c5a5c7897e5da61eb9e.yaml b/nuclei-templates/cve-less/plugins/onetone-companion-ad2905956fc52c5a5c7897e5da61eb9e.yaml new file mode 100644 index 0000000000..bd89320a41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onetone-companion-ad2905956fc52c5a5c7897e5da61eb9e.yaml @@ -0,0 +1,58 @@ +id: onetone-companion-ad2905956fc52c5a5c7897e5da61eb9e + +info: + name: > + OneTone Companion <= 1.1.1 - Open Mailer + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fd000dd-f75a-4ff0-bc71-20db878caca7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onetone-companion/" + google-query: inurl:"/wp-content/plugins/onetone-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onetone-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onetone-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onetone-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onionbuzz-viral-quiz-8c9605e19ac036b6c4395d0ff8d48030.yaml b/nuclei-templates/cve-less/plugins/onionbuzz-viral-quiz-8c9605e19ac036b6c4395d0ff8d48030.yaml new file mode 100644 index 0000000000..50b1a03fcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onionbuzz-viral-quiz-8c9605e19ac036b6c4395d0ff8d48030.yaml @@ -0,0 +1,58 @@ +id: onionbuzz-viral-quiz-8c9605e19ac036b6c4395d0ff8d48030 + +info: + name: > + OnionBuzz Plugin < 1.2.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/979c1107-788a-4130-b1d1-5cad3717962b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onionbuzz-viral-quiz/" + google-query: inurl:"/wp-content/plugins/onionbuzz-viral-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onionbuzz-viral-quiz,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onionbuzz-viral-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onionbuzz-viral-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onionbuzz-viral-quiz-b0e06633c5fe43db8e7a0339b16c2f91.yaml b/nuclei-templates/cve-less/plugins/onionbuzz-viral-quiz-b0e06633c5fe43db8e7a0339b16c2f91.yaml new file mode 100644 index 0000000000..5d68faa126 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onionbuzz-viral-quiz-b0e06633c5fe43db8e7a0339b16c2f91.yaml @@ -0,0 +1,58 @@ +id: onionbuzz-viral-quiz-b0e06633c5fe43db8e7a0339b16c2f91 + +info: + name: > + Viral Quiz Maker - OnionBuzz < 1.2.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a562a213-9c63-4236-8c2c-c7fadffb5ac4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onionbuzz-viral-quiz/" + google-query: inurl:"/wp-content/plugins/onionbuzz-viral-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onionbuzz-viral-quiz,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onionbuzz-viral-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onionbuzz-viral-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/online-accessibility-079b2f2c54a8b1fed68b5c27dcb96254.yaml b/nuclei-templates/cve-less/plugins/online-accessibility-079b2f2c54a8b1fed68b5c27dcb96254.yaml new file mode 100644 index 0000000000..e23d5fca36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/online-accessibility-079b2f2c54a8b1fed68b5c27dcb96254.yaml @@ -0,0 +1,58 @@ +id: online-accessibility-079b2f2c54a8b1fed68b5c27dcb96254 + +info: + name: > + Accessibility Suite by Online ADA < 2.0.11 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6b395b1-c6fb-4ab9-b446-cba9e32ca65d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/online-accessibility/" + google-query: inurl:"/wp-content/plugins/online-accessibility/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,online-accessibility,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/online-accessibility/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "online-accessibility" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/online-accessibility-2cc161db9aab9dca8c45963425559bbc.yaml b/nuclei-templates/cve-less/plugins/online-accessibility-2cc161db9aab9dca8c45963425559bbc.yaml new file mode 100644 index 0000000000..47e380b08a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/online-accessibility-2cc161db9aab9dca8c45963425559bbc.yaml @@ -0,0 +1,58 @@ +id: online-accessibility-2cc161db9aab9dca8c45963425559bbc + +info: + name: > + Accessibility Suite by Online ADA <= 4.11 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10590944-e08e-4980-846d-7a88880b2dcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/online-accessibility/" + google-query: inurl:"/wp-content/plugins/online-accessibility/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,online-accessibility,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/online-accessibility/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "online-accessibility" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/online-accessibility-32de7cdd0bd82a27d1f9a9185ff54e70.yaml b/nuclei-templates/cve-less/plugins/online-accessibility-32de7cdd0bd82a27d1f9a9185ff54e70.yaml new file mode 100644 index 0000000000..db13fcbb7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/online-accessibility-32de7cdd0bd82a27d1f9a9185ff54e70.yaml @@ -0,0 +1,58 @@ +id: online-accessibility-32de7cdd0bd82a27d1f9a9185ff54e70 + +info: + name: > + Accessibility Suite by Online ADA <= 4.12 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71c21af1-a007-4535-98ea-a6f25142bcf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/online-accessibility/" + google-query: inurl:"/wp-content/plugins/online-accessibility/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,online-accessibility,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/online-accessibility/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "online-accessibility" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/online-lesson-booking-system-236e1bbcc1e74385f1fd59662dd67917.yaml b/nuclei-templates/cve-less/plugins/online-lesson-booking-system-236e1bbcc1e74385f1fd59662dd67917.yaml new file mode 100644 index 0000000000..c42e1bee58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/online-lesson-booking-system-236e1bbcc1e74385f1fd59662dd67917.yaml @@ -0,0 +1,58 @@ +id: online-lesson-booking-system-236e1bbcc1e74385f1fd59662dd67917 + +info: + name: > + Online Lesson Booking <= 0.8.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/391ed7a2-64db-4a79-a697-86c70c60d02e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/online-lesson-booking-system/" + google-query: inurl:"/wp-content/plugins/online-lesson-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,online-lesson-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/online-lesson-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "online-lesson-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/online-lesson-booking-system-c1ecb14191a04d9e43d6e6f80f13e749.yaml b/nuclei-templates/cve-less/plugins/online-lesson-booking-system-c1ecb14191a04d9e43d6e6f80f13e749.yaml new file mode 100644 index 0000000000..9cac21699f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/online-lesson-booking-system-c1ecb14191a04d9e43d6e6f80f13e749.yaml @@ -0,0 +1,58 @@ +id: online-lesson-booking-system-c1ecb14191a04d9e43d6e6f80f13e749 + +info: + name: > + Online Lesson Booking <= 0.8.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d2309cd-625e-4508-8d60-25817023aa15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/online-lesson-booking-system/" + google-query: inurl:"/wp-content/plugins/online-lesson-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,online-lesson-booking-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/online-lesson-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "online-lesson-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/only-tweet-like-share-and-google-1-6da6015396d12ad265b2f5a24810c5e3.yaml b/nuclei-templates/cve-less/plugins/only-tweet-like-share-and-google-1-6da6015396d12ad265b2f5a24810c5e3.yaml new file mode 100644 index 0000000000..ef54e5d209 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/only-tweet-like-share-and-google-1-6da6015396d12ad265b2f5a24810c5e3.yaml @@ -0,0 +1,58 @@ +id: only-tweet-like-share-and-google-1-6da6015396d12ad265b2f5a24810c5e3 + +info: + name: > + Simple Light Weight Social Share (Tweet, Like, Share and Linkedin) <= 2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98780ecc-fb45-4392-955d-ddecf9f7fca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/only-tweet-like-share-and-google-1/" + google-query: inurl:"/wp-content/plugins/only-tweet-like-share-and-google-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,only-tweet-like-share-and-google-1,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/only-tweet-like-share-and-google-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "only-tweet-like-share-and-google-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/onwebchat-802c4864b87b89e6df06fc16568188de.yaml b/nuclei-templates/cve-less/plugins/onwebchat-802c4864b87b89e6df06fc16568188de.yaml new file mode 100644 index 0000000000..06cca7019b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/onwebchat-802c4864b87b89e6df06fc16568188de.yaml @@ -0,0 +1,58 @@ +id: onwebchat-802c4864b87b89e6df06fc16568188de + +info: + name: > + Live Chat – Live support <= 3.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b17d1280-2bae-4c45-b2e1-fbfcb2c7c15b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/onwebchat/" + google-query: inurl:"/wp-content/plugins/onwebchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,onwebchat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/onwebchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onwebchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ooohboi-steroids-for-elementor-1ec906f849b052ad86a65e59b4ad588d.yaml b/nuclei-templates/cve-less/plugins/ooohboi-steroids-for-elementor-1ec906f849b052ad86a65e59b4ad588d.yaml new file mode 100644 index 0000000000..ba3e6b8ba8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ooohboi-steroids-for-elementor-1ec906f849b052ad86a65e59b4ad588d.yaml @@ -0,0 +1,58 @@ +id: ooohboi-steroids-for-elementor-1ec906f849b052ad86a65e59b4ad588d + +info: + name: > + OoohBoi Steroids for Elementor <= 2.1.4 - Missing Authorization leading to Authenticated (Subscriber+) Image Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c56ed896-9267-49e6-a207-fe5362fe18cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ooohboi-steroids-for-elementor/" + google-query: inurl:"/wp-content/plugins/ooohboi-steroids-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ooohboi-steroids-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ooohboi-steroids-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ooohboi-steroids-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ooohboi-steroids-for-elementor-aef6ec9f420d3aef577ad115ead987ef.yaml b/nuclei-templates/cve-less/plugins/ooohboi-steroids-for-elementor-aef6ec9f420d3aef577ad115ead987ef.yaml new file mode 100644 index 0000000000..eea43930d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ooohboi-steroids-for-elementor-aef6ec9f420d3aef577ad115ead987ef.yaml @@ -0,0 +1,58 @@ +id: ooohboi-steroids-for-elementor-aef6ec9f420d3aef577ad115ead987ef + +info: + name: > + OoohBoi Steroids for Elementor <= 2.1.3 - Missing Authorization leading to Authenticated (Subscriber+) Attachment Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c24c57e5-2b42-40db-816a-f1327d1ac09b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ooohboi-steroids-for-elementor/" + google-query: inurl:"/wp-content/plugins/ooohboi-steroids-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ooohboi-steroids-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ooohboi-steroids-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ooohboi-steroids-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ooorl-e0cc1eea89ba954f43096969782e9ac2.yaml b/nuclei-templates/cve-less/plugins/ooorl-e0cc1eea89ba954f43096969782e9ac2.yaml new file mode 100644 index 0000000000..ffa9c31a45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ooorl-e0cc1eea89ba954f43096969782e9ac2.yaml @@ -0,0 +1,58 @@ +id: ooorl-e0cc1eea89ba954f43096969782e9ac2 + +info: + name: > + Ooorl <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08916934-c9b8-4bc0-8b8c-991ed0b78be2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ooorl/" + google-query: inurl:"/wp-content/plugins/ooorl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ooorl,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ooorl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ooorl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oopspam-anti-spam-1fe914fcf9950622b9e1e73ce1a20a73.yaml b/nuclei-templates/cve-less/plugins/oopspam-anti-spam-1fe914fcf9950622b9e1e73ce1a20a73.yaml new file mode 100644 index 0000000000..5b1b9d594d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oopspam-anti-spam-1fe914fcf9950622b9e1e73ce1a20a73.yaml @@ -0,0 +1,58 @@ +id: oopspam-anti-spam-1fe914fcf9950622b9e1e73ce1a20a73 + +info: + name: > + OOPSpam Anti-Spam <= 1.1.44 - Cross-Site Request Forgery via empty_ham_entries and empty_spam_entries + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/479f7e9c-8918-4b87-b33d-a396276fb637?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oopspam-anti-spam/" + google-query: inurl:"/wp-content/plugins/oopspam-anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oopspam-anti-spam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oopspam-anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oopspam-anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oopspam-anti-spam-6bf95a000c0173a075e212bc6eeb873d.yaml b/nuclei-templates/cve-less/plugins/oopspam-anti-spam-6bf95a000c0173a075e212bc6eeb873d.yaml new file mode 100644 index 0000000000..fdda126c21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oopspam-anti-spam-6bf95a000c0173a075e212bc6eeb873d.yaml @@ -0,0 +1,58 @@ +id: oopspam-anti-spam-6bf95a000c0173a075e212bc6eeb873d + +info: + name: > + OOPSpam Anti-Spam <= 1.1.35 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fbd5ac8-11c0-4628-9a7b-620b17cc8ba6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oopspam-anti-spam/" + google-query: inurl:"/wp-content/plugins/oopspam-anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oopspam-anti-spam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oopspam-anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oopspam-anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opal-estate-2a75025d80c85273c30a2737105c9f4c.yaml b/nuclei-templates/cve-less/plugins/opal-estate-2a75025d80c85273c30a2737105c9f4c.yaml new file mode 100644 index 0000000000..1d9c4dcb76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opal-estate-2a75025d80c85273c30a2737105c9f4c.yaml @@ -0,0 +1,58 @@ +id: opal-estate-2a75025d80c85273c30a2737105c9f4c + +info: + name: > + Opal Estate <= 1.6.11 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2645899c-2b6b-48bd-8f33-2a837a951c5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opal-estate/" + google-query: inurl:"/wp-content/plugins/opal-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opal-estate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opal-estate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opal-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opal-estate-92760ee1af263e3e31758b506a58ef85.yaml b/nuclei-templates/cve-less/plugins/opal-estate-92760ee1af263e3e31758b506a58ef85.yaml new file mode 100644 index 0000000000..d959a6501f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opal-estate-92760ee1af263e3e31758b506a58ef85.yaml @@ -0,0 +1,58 @@ +id: opal-estate-92760ee1af263e3e31758b506a58ef85 + +info: + name: > + Opal Estate <= 1.6.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ce729a2-a106-45ab-b96c-cfe75246def7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opal-estate/" + google-query: inurl:"/wp-content/plugins/opal-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opal-estate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opal-estate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opal-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opal-hotel-room-booking-6dff8ad57b57f849baa2c45d3ecc2834.yaml b/nuclei-templates/cve-less/plugins/opal-hotel-room-booking-6dff8ad57b57f849baa2c45d3ecc2834.yaml new file mode 100644 index 0000000000..2a0907a1e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opal-hotel-room-booking-6dff8ad57b57f849baa2c45d3ecc2834.yaml @@ -0,0 +1,58 @@ +id: opal-hotel-room-booking-6dff8ad57b57f849baa2c45d3ecc2834 + +info: + name: > + Opal Hotel Room Booking plugin <= 1.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66bd5065-aa4c-4b5b-a312-2f7bd1643d35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opal-hotel-room-booking/" + google-query: inurl:"/wp-content/plugins/opal-hotel-room-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opal-hotel-room-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opal-hotel-room-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opal-hotel-room-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opal-widgets-for-elementor-75f9430e21b1ffadf43723a73937595b.yaml b/nuclei-templates/cve-less/plugins/opal-widgets-for-elementor-75f9430e21b1ffadf43723a73937595b.yaml new file mode 100644 index 0000000000..1431b34d44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opal-widgets-for-elementor-75f9430e21b1ffadf43723a73937595b.yaml @@ -0,0 +1,58 @@ +id: opal-widgets-for-elementor-75f9430e21b1ffadf43723a73937595b + +info: + name: > + Opal Widgets For Elementor <= 1.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce27f598-b64a-45da-b61a-190570220ec2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opal-widgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/opal-widgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opal-widgets-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opal-widgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opal-widgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opcache-57773fba6f4ab595b91e9cf1bf98318c.yaml b/nuclei-templates/cve-less/plugins/opcache-57773fba6f4ab595b91e9cf1bf98318c.yaml new file mode 100644 index 0000000000..675e3fe765 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opcache-57773fba6f4ab595b91e9cf1bf98318c.yaml @@ -0,0 +1,58 @@ +id: opcache-57773fba6f4ab595b91e9cf1bf98318c + +info: + name: > + OPcache Dashboard <= 0.3.1 - Reflected Cross-Site Scripting via 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3d6104b-eb2d-4e7e-98bd-6a46bd69ef5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opcache/" + google-query: inurl:"/wp-content/plugins/opcache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opcache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opcache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opcache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/open-external-links-in-a-new-window-00198a18211aefc70b8ce0f7e41cdd92.yaml b/nuclei-templates/cve-less/plugins/open-external-links-in-a-new-window-00198a18211aefc70b8ce0f7e41cdd92.yaml new file mode 100644 index 0000000000..59338476b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/open-external-links-in-a-new-window-00198a18211aefc70b8ce0f7e41cdd92.yaml @@ -0,0 +1,58 @@ +id: open-external-links-in-a-new-window-00198a18211aefc70b8ce0f7e41cdd92 + +info: + name: > + External Links in New Window / New Tab <= 1.42 - Tabnabbing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/951b8cbd-0509-4548-ae69-6cfd67e83b1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/open-external-links-in-a-new-window/" + google-query: inurl:"/wp-content/plugins/open-external-links-in-a-new-window/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,open-external-links-in-a-new-window,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/open-external-links-in-a-new-window/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "open-external-links-in-a-new-window" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/open-external-links-in-a-new-window-39407bfbd26cec40aa785db15ec93f9b.yaml b/nuclei-templates/cve-less/plugins/open-external-links-in-a-new-window-39407bfbd26cec40aa785db15ec93f9b.yaml new file mode 100644 index 0000000000..ce903e2e46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/open-external-links-in-a-new-window-39407bfbd26cec40aa785db15ec93f9b.yaml @@ -0,0 +1,58 @@ +id: open-external-links-in-a-new-window-39407bfbd26cec40aa785db15ec93f9b + +info: + name: > + External Links in New Window / New Tab <= 1.42 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2490a51c-718f-463b-ab80-82d48deb2f1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/open-external-links-in-a-new-window/" + google-query: inurl:"/wp-content/plugins/open-external-links-in-a-new-window/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,open-external-links-in-a-new-window,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/open-external-links-in-a-new-window/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "open-external-links-in-a-new-window" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/open-graph-metabox-74b8f8fd0be969b30108aa2c0d40f175.yaml b/nuclei-templates/cve-less/plugins/open-graph-metabox-74b8f8fd0be969b30108aa2c0d40f175.yaml new file mode 100644 index 0000000000..398a180d8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/open-graph-metabox-74b8f8fd0be969b30108aa2c0d40f175.yaml @@ -0,0 +1,58 @@ +id: open-graph-metabox-74b8f8fd0be969b30108aa2c0d40f175 + +info: + name: > + Open Graph Metabox <= 1.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a2b7aac-b11d-4c52-b3d8-7b3f4b3eecd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/open-graph-metabox/" + google-query: inurl:"/wp-content/plugins/open-graph-metabox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,open-graph-metabox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/open-graph-metabox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "open-graph-metabox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/open-graphite-ee6e51fb33ca759d2625bd1f3a131728.yaml b/nuclei-templates/cve-less/plugins/open-graphite-ee6e51fb33ca759d2625bd1f3a131728.yaml new file mode 100644 index 0000000000..3c2a1ff4c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/open-graphite-ee6e51fb33ca759d2625bd1f3a131728.yaml @@ -0,0 +1,58 @@ +id: open-graphite-ee6e51fb33ca759d2625bd1f3a131728 + +info: + name: > + Open Graphite <= 1.6.0 - Reflected Cross-Site Scripting via topic parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd368b2c-ef40-453b-aeef-ad88d847c29b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/open-graphite/" + google-query: inurl:"/wp-content/plugins/open-graphite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,open-graphite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/open-graphite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "open-graphite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/open-rdw-kenteken-voertuiginformatie-96ad90fd0ad467a1d69bc6e1840d3891.yaml b/nuclei-templates/cve-less/plugins/open-rdw-kenteken-voertuiginformatie-96ad90fd0ad467a1d69bc6e1840d3891.yaml new file mode 100644 index 0000000000..d5e117ca15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/open-rdw-kenteken-voertuiginformatie-96ad90fd0ad467a1d69bc6e1840d3891.yaml @@ -0,0 +1,58 @@ +id: open-rdw-kenteken-voertuiginformatie-96ad90fd0ad467a1d69bc6e1840d3891 + +info: + name: > + Open RDW kenteken voertuiginformatie <= 2.0.14 - Reflected Cross-Site Scripting via open_data_rdw_kenteken + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fa87357-09c0-4e99-8ceb-41a7987c4a57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/open-rdw-kenteken-voertuiginformatie/" + google-query: inurl:"/wp-content/plugins/open-rdw-kenteken-voertuiginformatie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,open-rdw-kenteken-voertuiginformatie,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/open-rdw-kenteken-voertuiginformatie/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "open-rdw-kenteken-voertuiginformatie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/open-social-55fba5060ceecf0350eb52f214341712.yaml b/nuclei-templates/cve-less/plugins/open-social-55fba5060ceecf0350eb52f214341712.yaml new file mode 100644 index 0000000000..02333a5c9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/open-social-55fba5060ceecf0350eb52f214341712.yaml @@ -0,0 +1,58 @@ +id: open-social-55fba5060ceecf0350eb52f214341712 + +info: + name: > + WP Open Social <= 5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be0dc9be-f597-46d8-badd-452e442a6d1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/open-social/" + google-query: inurl:"/wp-content/plugins/open-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,open-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/open-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "open-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/open-user-map-d517a1f1b39fbb25ce31405c236e39dc.yaml b/nuclei-templates/cve-less/plugins/open-user-map-d517a1f1b39fbb25ce31405c236e39dc.yaml new file mode 100644 index 0000000000..5d1e3d1ada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/open-user-map-d517a1f1b39fbb25ce31405c236e39dc.yaml @@ -0,0 +1,58 @@ +id: open-user-map-d517a1f1b39fbb25ce31405c236e39dc + +info: + name: > + Open User Map | Everybody can add locations <= 1.3.26 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08593415-bbc9-4159-b5d5-84e4dde6c2c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/open-user-map/" + google-query: inurl:"/wp-content/plugins/open-user-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,open-user-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/open-user-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "open-user-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/openbook-book-data-fc3bbad32864e7b45f7b03bfa40e7ab6.yaml b/nuclei-templates/cve-less/plugins/openbook-book-data-fc3bbad32864e7b45f7b03bfa40e7ab6.yaml new file mode 100644 index 0000000000..bb92c8618d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/openbook-book-data-fc3bbad32864e7b45f7b03bfa40e7ab6.yaml @@ -0,0 +1,58 @@ +id: openbook-book-data-fc3bbad32864e7b45f7b03bfa40e7ab6 + +info: + name: > + OpenBook Book Data <= 3.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c79a173d-b9c3-4554-95e7-2a4b87382079?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/openbook-book-data/" + google-query: inurl:"/wp-content/plugins/openbook-book-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,openbook-book-data,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/openbook-book-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "openbook-book-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/openid-849d5a0a490a95eaf95ef135844c0ef2.yaml b/nuclei-templates/cve-less/plugins/openid-849d5a0a490a95eaf95ef135844c0ef2.yaml new file mode 100644 index 0000000000..c528966167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/openid-849d5a0a490a95eaf95ef135844c0ef2.yaml @@ -0,0 +1,58 @@ +id: openid-849d5a0a490a95eaf95ef135844c0ef2 + +info: + name: > + OpenID <= 3.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aa2be6c-299e-4769-9070-a3c337bce990?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/openid/" + google-query: inurl:"/wp-content/plugins/openid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,openid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/openid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "openid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opening-hours-02f013b54b4f3674afd49b3afca90a89.yaml b/nuclei-templates/cve-less/plugins/opening-hours-02f013b54b4f3674afd49b3afca90a89.yaml new file mode 100644 index 0000000000..14a2d01808 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opening-hours-02f013b54b4f3674afd49b3afca90a89.yaml @@ -0,0 +1,58 @@ +id: opening-hours-02f013b54b4f3674afd49b3afca90a89 + +info: + name: > + We’re Open! <= 1.37 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0004db27-9ea6-4387-ab1d-b95558784ed9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opening-hours/" + google-query: inurl:"/wp-content/plugins/opening-hours/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opening-hours,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opening-hours/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opening-hours" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opening-hours-55a39ce22d26293084937266d25d08be.yaml b/nuclei-templates/cve-less/plugins/opening-hours-55a39ce22d26293084937266d25d08be.yaml new file mode 100644 index 0000000000..f6cf4d1824 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opening-hours-55a39ce22d26293084937266d25d08be.yaml @@ -0,0 +1,58 @@ +id: opening-hours-55a39ce22d26293084937266d25d08be + +info: + name: > + We’re Open! <= 1.44 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82f4ad21-bc55-4daf-bc46-90969dcbabdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opening-hours/" + google-query: inurl:"/wp-content/plugins/opening-hours/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opening-hours,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opening-hours/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opening-hours" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opening-hours-8a9da35b1949b285490ef29120cda9a5.yaml b/nuclei-templates/cve-less/plugins/opening-hours-8a9da35b1949b285490ef29120cda9a5.yaml new file mode 100644 index 0000000000..0e12e2ec0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opening-hours-8a9da35b1949b285490ef29120cda9a5.yaml @@ -0,0 +1,58 @@ +id: opening-hours-8a9da35b1949b285490ef29120cda9a5 + +info: + name: > + We’re Open! <= 1.46 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a5c6b05-6e28-40be-80cb-9f95241a4fc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opening-hours/" + google-query: inurl:"/wp-content/plugins/opening-hours/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opening-hours,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opening-hours/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opening-hours" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opening-hours-8ef1ea8d8498496f3516b88ed77244c0.yaml b/nuclei-templates/cve-less/plugins/opening-hours-8ef1ea8d8498496f3516b88ed77244c0.yaml new file mode 100644 index 0000000000..37add9f9c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opening-hours-8ef1ea8d8498496f3516b88ed77244c0.yaml @@ -0,0 +1,58 @@ +id: opening-hours-8ef1ea8d8498496f3516b88ed77244c0 + +info: + name: > + We’re Open! <= 1.45 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2e0a227-670d-40d8-ba82-6602ab57bc4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opening-hours/" + google-query: inurl:"/wp-content/plugins/opening-hours/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opening-hours,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opening-hours/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opening-hours" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opening-hours-c0079d75a97eeffbdeb6d0d0f4759f91.yaml b/nuclei-templates/cve-less/plugins/opening-hours-c0079d75a97eeffbdeb6d0d0f4759f91.yaml new file mode 100644 index 0000000000..7afa9ce00b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opening-hours-c0079d75a97eeffbdeb6d0d0f4759f91.yaml @@ -0,0 +1,58 @@ +id: opening-hours-c0079d75a97eeffbdeb6d0d0f4759f91 + +info: + name: > + We’re Open! <= 1.41 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fad525f-8dcb-453c-9e53-2335c6d1c46d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opening-hours/" + google-query: inurl:"/wp-content/plugins/opening-hours/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opening-hours,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opening-hours/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opening-hours" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/openinviter-for-wordpress-0c949bb41cfd828ec7a8283210519fde.yaml b/nuclei-templates/cve-less/plugins/openinviter-for-wordpress-0c949bb41cfd828ec7a8283210519fde.yaml new file mode 100644 index 0000000000..2eb4ab6632 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/openinviter-for-wordpress-0c949bb41cfd828ec7a8283210519fde.yaml @@ -0,0 +1,58 @@ +id: openinviter-for-wordpress-0c949bb41cfd828ec7a8283210519fde + +info: + name: > + OpenInviter for WordPress <= 1.7.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/031c2a61-3547-4c33-8ab8-c52585c8066a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/openinviter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/openinviter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,openinviter-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/openinviter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "openinviter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opensea-3e83969edc359576afe93a3a140053fe.yaml b/nuclei-templates/cve-less/plugins/opensea-3e83969edc359576afe93a3a140053fe.yaml new file mode 100644 index 0000000000..1ea1e9e7b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opensea-3e83969edc359576afe93a3a140053fe.yaml @@ -0,0 +1,58 @@ +id: opensea-3e83969edc359576afe93a3a140053fe + +info: + name: > + Opensea <= 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/082efb3c-dbe4-49b5-abec-da91f2d463eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opensea/" + google-query: inurl:"/wp-content/plugins/opensea/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opensea,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opensea/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opensea" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opensea-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/opensea-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9f3cc4df50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opensea-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: opensea-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opensea/" + google-query: inurl:"/wp-content/plugins/opensea/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opensea,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opensea/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opensea" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ops-robots-txt-bd57476daf1ac0de7401eb5bfcebce92.yaml b/nuclei-templates/cve-less/plugins/ops-robots-txt-bd57476daf1ac0de7401eb5bfcebce92.yaml new file mode 100644 index 0000000000..4c5e522d19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ops-robots-txt-bd57476daf1ac0de7401eb5bfcebce92.yaml @@ -0,0 +1,58 @@ +id: ops-robots-txt-bd57476daf1ac0de7401eb5bfcebce92 + +info: + name: > + On Page SEO + Whatsapp Chat Button <= 1.0.1 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44f64753-920f-4099-9cb1-018b24f972eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ops-robots-txt/" + google-query: inurl:"/wp-content/plugins/ops-robots-txt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ops-robots-txt,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ops-robots-txt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ops-robots-txt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/opt-in-panda-e524be4e74a799805187c5341f4ea89f.yaml b/nuclei-templates/cve-less/plugins/opt-in-panda-e524be4e74a799805187c5341f4ea89f.yaml new file mode 100644 index 0000000000..d94553f598 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/opt-in-panda-e524be4e74a799805187c5341f4ea89f.yaml @@ -0,0 +1,58 @@ +id: opt-in-panda-e524be4e74a799805187c5341f4ea89f + +info: + name: > + OnePress Opt-In Panda <= 2.6.2 - Missing Authorization on AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e702675c-b3ec-458b-a382-cba5c03879c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/opt-in-panda/" + google-query: inurl:"/wp-content/plugins/opt-in-panda/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,opt-in-panda,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/opt-in-panda/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opt-in-panda" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optima-express-a4c0765b0c52463caf31b82bc7711eb8.yaml b/nuclei-templates/cve-less/plugins/optima-express-a4c0765b0c52463caf31b82bc7711eb8.yaml new file mode 100644 index 0000000000..60eac744ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optima-express-a4c0765b0c52463caf31b82bc7711eb8.yaml @@ -0,0 +1,58 @@ +id: optima-express-a4c0765b0c52463caf31b82bc7711eb8 + +info: + name: > + Optima Express + MarketBoost IDX Plugin <= 7.3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/059e262b-ee63-4f8b-82ab-c12bcf70f879?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optima-express/" + google-query: inurl:"/wp-content/plugins/optima-express/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optima-express,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optima-express/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optima-express" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optimole-wp-7ae1e981db663479bebe95d4fc6e1fb9.yaml b/nuclei-templates/cve-less/plugins/optimole-wp-7ae1e981db663479bebe95d4fc6e1fb9.yaml new file mode 100644 index 0000000000..68f17dfaa1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optimole-wp-7ae1e981db663479bebe95d4fc6e1fb9.yaml @@ -0,0 +1,58 @@ +id: optimole-wp-7ae1e981db663479bebe95d4fc6e1fb9 + +info: + name: > + Image optimization & Lazy Load <= 3.3.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e2af005-0bc2-445c-956a-ef6139abfee4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optimole-wp/" + google-query: inurl:"/wp-content/plugins/optimole-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optimole-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optimole-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optimole-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optimole-wp-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/optimole-wp-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..6e88e788a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optimole-wp-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: optimole-wp-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optimole-wp/" + google-query: inurl:"/wp-content/plugins/optimole-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optimole-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optimole-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optimole-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optin-forms-b4a1c53e99884a28029186adce52a970.yaml b/nuclei-templates/cve-less/plugins/optin-forms-b4a1c53e99884a28029186adce52a970.yaml new file mode 100644 index 0000000000..65043f6c08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optin-forms-b4a1c53e99884a28029186adce52a970.yaml @@ -0,0 +1,58 @@ +id: optin-forms-b4a1c53e99884a28029186adce52a970 + +info: + name: > + Optin Forms <= 1.3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3971c145-6dca-49af-bbb3-7ef4ce51507f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optin-forms/" + google-query: inurl:"/wp-content/plugins/optin-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optin-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optin-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optin-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optin-forms-d9b7d332948d93ec19ade23944fe8ee3.yaml b/nuclei-templates/cve-less/plugins/optin-forms-d9b7d332948d93ec19ade23944fe8ee3.yaml new file mode 100644 index 0000000000..8af10110f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optin-forms-d9b7d332948d93ec19ade23944fe8ee3.yaml @@ -0,0 +1,58 @@ +id: optin-forms-d9b7d332948d93ec19ade23944fe8ee3 + +info: + name: > + Optin Forms <= 1.3.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35e0a997-190e-457a-b80c-7b4ecec97095?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optin-forms/" + google-query: inurl:"/wp-content/plugins/optin-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optin-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optin-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optin-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optinfirex-487b45c8da9cac09ef28c95c49514ba6.yaml b/nuclei-templates/cve-less/plugins/optinfirex-487b45c8da9cac09ef28c95c49514ba6.yaml new file mode 100644 index 0000000000..0c67aec9df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optinfirex-487b45c8da9cac09ef28c95c49514ba6.yaml @@ -0,0 +1,58 @@ +id: optinfirex-487b45c8da9cac09ef28c95c49514ba6 + +info: + name: > + Optinferex Plugin (All Known Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a92945b-79ce-4bea-a1fc-0f03024f5f48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optinfirex/" + google-query: inurl:"/wp-content/plugins/optinfirex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optinfirex,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optinfirex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optinfirex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optinly-65a9527890576df98e6c12dd65024410.yaml b/nuclei-templates/cve-less/plugins/optinly-65a9527890576df98e6c12dd65024410.yaml new file mode 100644 index 0000000000..be0ad55d78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optinly-65a9527890576df98e6c12dd65024410.yaml @@ -0,0 +1,58 @@ +id: optinly-65a9527890576df98e6c12dd65024410 + +info: + name: > + Optinly <= 1.0.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b66eca-67cf-404e-9c4b-6add0ee79141?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optinly/" + google-query: inurl:"/wp-content/plugins/optinly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optinly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optinly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optinly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optinly-8c1dce2381adf553748abcaef006cd86.yaml b/nuclei-templates/cve-less/plugins/optinly-8c1dce2381adf553748abcaef006cd86.yaml new file mode 100644 index 0000000000..d9f52dadf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optinly-8c1dce2381adf553748abcaef006cd86.yaml @@ -0,0 +1,58 @@ +id: optinly-8c1dce2381adf553748abcaef006cd86 + +info: + name: > + Optinly <= 1.0.18 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13b0f306-cfd1-4c36-b694-de7968f0ae1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optinly/" + google-query: inurl:"/wp-content/plugins/optinly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optinly,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optinly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optinly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optinmonster-2e5b9dabe10dfc18a46871d43fa96491.yaml b/nuclei-templates/cve-less/plugins/optinmonster-2e5b9dabe10dfc18a46871d43fa96491.yaml new file mode 100644 index 0000000000..d63500f000 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optinmonster-2e5b9dabe10dfc18a46871d43fa96491.yaml @@ -0,0 +1,58 @@ +id: optinmonster-2e5b9dabe10dfc18a46871d43fa96491 + +info: + name: > + OptinMonster <= 2.12.1 - Authenticated (Subscriber+) Sensitive Information Disclosure via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfbdb5a7-e949-4d3a-8c8d-5dc6702f4675?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optinmonster/" + google-query: inurl:"/wp-content/plugins/optinmonster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optinmonster,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optinmonster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optinmonster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optinmonster-7ec39aae63fcb435502dc6ef345e3943.yaml b/nuclei-templates/cve-less/plugins/optinmonster-7ec39aae63fcb435502dc6ef345e3943.yaml new file mode 100644 index 0000000000..4c5167720e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optinmonster-7ec39aae63fcb435502dc6ef345e3943.yaml @@ -0,0 +1,58 @@ +id: optinmonster-7ec39aae63fcb435502dc6ef345e3943 + +info: + name: > + OptinMonster <= 2.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f39c478-7b64-4afc-8c3f-9409e105954a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optinmonster/" + google-query: inurl:"/wp-content/plugins/optinmonster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optinmonster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optinmonster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optinmonster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optinmonster-8105121190d01c38a4c87c0ee0fe8654.yaml b/nuclei-templates/cve-less/plugins/optinmonster-8105121190d01c38a4c87c0ee0fe8654.yaml new file mode 100644 index 0000000000..c0fae05715 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optinmonster-8105121190d01c38a4c87c0ee0fe8654.yaml @@ -0,0 +1,58 @@ +id: optinmonster-8105121190d01c38a4c87c0ee0fe8654 + +info: + name: > + Popup Builder by OptinMonster <= 1.1.4.5 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d396e47a-cabe-4498-9269-d67bdeb0c570?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optinmonster/" + google-query: inurl:"/wp-content/plugins/optinmonster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optinmonster,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optinmonster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optinmonster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optinmonster-83bf7d35b08455904e5385f6657b0ce1.yaml b/nuclei-templates/cve-less/plugins/optinmonster-83bf7d35b08455904e5385f6657b0ce1.yaml new file mode 100644 index 0000000000..a7ff185962 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optinmonster-83bf7d35b08455904e5385f6657b0ce1.yaml @@ -0,0 +1,58 @@ +id: optinmonster-83bf7d35b08455904e5385f6657b0ce1 + +info: + name: > + OptinMonster <= 2.6.4 - Unprotected REST-API Endpoints + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77eb40c2-735a-49f2-9d07-5cf7535bd722?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optinmonster/" + google-query: inurl:"/wp-content/plugins/optinmonster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optinmonster,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optinmonster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optinmonster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/optinmonster-fe779104db6239df2fe810ed3afc3c87.yaml b/nuclei-templates/cve-less/plugins/optinmonster-fe779104db6239df2fe810ed3afc3c87.yaml new file mode 100644 index 0000000000..f065a223da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/optinmonster-fe779104db6239df2fe810ed3afc3c87.yaml @@ -0,0 +1,58 @@ +id: optinmonster-fe779104db6239df2fe810ed3afc3c87 + +info: + name: > + Popup Builder by OptinMonster – WordPress Popups for Optins, Email Newsletters and Lead Generation <= 2.15.3 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ed53bd-08de-4ec9-a8dd-eef72b788359?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/optinmonster/" + google-query: inurl:"/wp-content/plugins/optinmonster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,optinmonster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/optinmonster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optinmonster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/option-tree-3026c779c348f01329035d4d36b36cef.yaml b/nuclei-templates/cve-less/plugins/option-tree-3026c779c348f01329035d4d36b36cef.yaml new file mode 100644 index 0000000000..7fdd35329d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/option-tree-3026c779c348f01329035d4d36b36cef.yaml @@ -0,0 +1,58 @@ +id: option-tree-3026c779c348f01329035d4d36b36cef + +info: + name: > + Option Tree <= 2.6.0 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec29bc37-db27-4bf3-b55f-15c4a7274acd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/option-tree/" + google-query: inurl:"/wp-content/plugins/option-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,option-tree,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/option-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "option-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/option-tree-5b29964f9492d211e56c39574405e47e.yaml b/nuclei-templates/cve-less/plugins/option-tree-5b29964f9492d211e56c39574405e47e.yaml new file mode 100644 index 0000000000..1be06bb440 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/option-tree-5b29964f9492d211e56c39574405e47e.yaml @@ -0,0 +1,58 @@ +id: option-tree-5b29964f9492d211e56c39574405e47e + +info: + name: > + Option Tree <= 2.7.2 - Object Injection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b50bdf83-d6e1-46bd-be6c-4fcb77ef94db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/option-tree/" + google-query: inurl:"/wp-content/plugins/option-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,option-tree,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/option-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "option-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/option-tree-6e42e23486d09ec34675722772aa1b90.yaml b/nuclei-templates/cve-less/plugins/option-tree-6e42e23486d09ec34675722772aa1b90.yaml new file mode 100644 index 0000000000..0a7bf7326b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/option-tree-6e42e23486d09ec34675722772aa1b90.yaml @@ -0,0 +1,58 @@ +id: option-tree-6e42e23486d09ec34675722772aa1b90 + +info: + name: > + Option Tree <= 2.5.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9717e4aa-4294-4194-b2ab-3b0ec845a1ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/option-tree/" + google-query: inurl:"/wp-content/plugins/option-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,option-tree,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/option-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "option-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/option-tree-75c93ad74d45c10e07e436b9060dff63.yaml b/nuclei-templates/cve-less/plugins/option-tree-75c93ad74d45c10e07e436b9060dff63.yaml new file mode 100644 index 0000000000..f835078161 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/option-tree-75c93ad74d45c10e07e436b9060dff63.yaml @@ -0,0 +1,58 @@ +id: option-tree-75c93ad74d45c10e07e436b9060dff63 + +info: + name: > + Option Tree <= 2.5.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d02fc744-35e5-44eb-8790-66997e95d017?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/option-tree/" + google-query: inurl:"/wp-content/plugins/option-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,option-tree,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/option-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "option-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/option-tree-aa5a6552b97b2c6070e07b71a44f6dad.yaml b/nuclei-templates/cve-less/plugins/option-tree-aa5a6552b97b2c6070e07b71a44f6dad.yaml new file mode 100644 index 0000000000..a780a58b69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/option-tree-aa5a6552b97b2c6070e07b71a44f6dad.yaml @@ -0,0 +1,58 @@ +id: option-tree-aa5a6552b97b2c6070e07b71a44f6dad + +info: + name: > + Option Tree <= 2.7.2 - Object Injection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8381b6c-46f4-4b9d-9975-c90310d066d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/option-tree/" + google-query: inurl:"/wp-content/plugins/option-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,option-tree,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/option-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "option-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/options-for-twenty-seventeen-0aceb58e1789a00f8987ade1ad5f4576.yaml b/nuclei-templates/cve-less/plugins/options-for-twenty-seventeen-0aceb58e1789a00f8987ade1ad5f4576.yaml new file mode 100644 index 0000000000..ff374ae40c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/options-for-twenty-seventeen-0aceb58e1789a00f8987ade1ad5f4576.yaml @@ -0,0 +1,58 @@ +id: options-for-twenty-seventeen-0aceb58e1789a00f8987ade1ad5f4576 + +info: + name: > + Options for Twenty Seventeen <= 2.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df35d8c6-55ec-4cf5-8055-93ec5193c0a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/options-for-twenty-seventeen/" + google-query: inurl:"/wp-content/plugins/options-for-twenty-seventeen/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,options-for-twenty-seventeen,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/options-for-twenty-seventeen/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "options-for-twenty-seventeen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/orange-form-cb748c9c9efa655b709ed263bb18ce58.yaml b/nuclei-templates/cve-less/plugins/orange-form-cb748c9c9efa655b709ed263bb18ce58.yaml new file mode 100644 index 0000000000..3c2f120f65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/orange-form-cb748c9c9efa655b709ed263bb18ce58.yaml @@ -0,0 +1,58 @@ +id: orange-form-cb748c9c9efa655b709ed263bb18ce58 + +info: + name: > + Orange Form <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b4df2b3-8d85-4e5c-8ead-92ed2259c84a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/orange-form/" + google-query: inurl:"/wp-content/plugins/orange-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,orange-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/orange-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "orange-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/orange-form-dc42737b07ffe9283fc25fc1965481dd.yaml b/nuclei-templates/cve-less/plugins/orange-form-dc42737b07ffe9283fc25fc1965481dd.yaml new file mode 100644 index 0000000000..eb27789d7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/orange-form-dc42737b07ffe9283fc25fc1965481dd.yaml @@ -0,0 +1,58 @@ +id: orange-form-dc42737b07ffe9283fc25fc1965481dd + +info: + name: > + Orange Form <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab248283-e331-4159-9fe4-249243772c9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/orange-form/" + google-query: inurl:"/wp-content/plugins/orange-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,orange-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/orange-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "orange-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/orbisius-child-theme-creator-083f45dd5cb197f01c97e7659014e0d8.yaml b/nuclei-templates/cve-less/plugins/orbisius-child-theme-creator-083f45dd5cb197f01c97e7659014e0d8.yaml new file mode 100644 index 0000000000..6e759e1761 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/orbisius-child-theme-creator-083f45dd5cb197f01c97e7659014e0d8.yaml @@ -0,0 +1,58 @@ +id: orbisius-child-theme-creator-083f45dd5cb197f01c97e7659014e0d8 + +info: + name: > + Child Theme Creator by Orbisius <= 1.2.7 - Arbitrary File Write + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70ce4450-e38b-422e-a171-09f428dfe0d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/orbisius-child-theme-creator/" + google-query: inurl:"/wp-content/plugins/orbisius-child-theme-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,orbisius-child-theme-creator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/orbisius-child-theme-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "orbisius-child-theme-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/orbisius-child-theme-creator-a2161b786ba8d84bdb2a3d032cd3b972.yaml b/nuclei-templates/cve-less/plugins/orbisius-child-theme-creator-a2161b786ba8d84bdb2a3d032cd3b972.yaml new file mode 100644 index 0000000000..3321ea07f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/orbisius-child-theme-creator-a2161b786ba8d84bdb2a3d032cd3b972.yaml @@ -0,0 +1,58 @@ +id: orbisius-child-theme-creator-a2161b786ba8d84bdb2a3d032cd3b972 + +info: + name: > + Child Theme Creator by Orbisius <= 1.5.1 - Cross-Site Request Forgery to Arbitrary File Modification and Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/782d0920-08dd-4df7-958c-3ed7128f3d55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/orbisius-child-theme-creator/" + google-query: inurl:"/wp-content/plugins/orbisius-child-theme-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,orbisius-child-theme-creator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/orbisius-child-theme-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "orbisius-child-theme-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-and-inventory-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/order-and-inventory-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..270e252646 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-and-inventory-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: order-and-inventory-manager-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-and-inventory-manager-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-and-inventory-manager-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-and-inventory-manager-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-and-inventory-manager-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-and-inventory-manager-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-auto-complete-for-woocommerce-feb8c11c4ef0641488804a4e83e4b8c9.yaml b/nuclei-templates/cve-less/plugins/order-auto-complete-for-woocommerce-feb8c11c4ef0641488804a4e83e4b8c9.yaml new file mode 100644 index 0000000000..703ce079f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-auto-complete-for-woocommerce-feb8c11c4ef0641488804a4e83e4b8c9.yaml @@ -0,0 +1,58 @@ +id: order-auto-complete-for-woocommerce-feb8c11c4ef0641488804a4e83e4b8c9 + +info: + name: > + Order auto complete for WooCommerce <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9521ad5b-83c3-487e-a69e-ca057777bc9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-auto-complete-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-auto-complete-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-auto-complete-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-auto-complete-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-auto-complete-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-delivery-date-2d0aa79c36a81084122d47bccf285480.yaml b/nuclei-templates/cve-less/plugins/order-delivery-date-2d0aa79c36a81084122d47bccf285480.yaml new file mode 100644 index 0000000000..5e0ce899f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-delivery-date-2d0aa79c36a81084122d47bccf285480.yaml @@ -0,0 +1,58 @@ +id: order-delivery-date-2d0aa79c36a81084122d47bccf285480 + +info: + name: > + Order Delivery Date for WP e-Commerce <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74a74817-30ff-42ec-9bd4-7d0638d6643c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-delivery-date/" + google-query: inurl:"/wp-content/plugins/order-delivery-date/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-delivery-date,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-delivery-date/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-delivery-date" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-delivery-date-b3374ece5f330b0776522f2f5130afbd.yaml b/nuclei-templates/cve-less/plugins/order-delivery-date-b3374ece5f330b0776522f2f5130afbd.yaml new file mode 100644 index 0000000000..fae0193913 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-delivery-date-b3374ece5f330b0776522f2f5130afbd.yaml @@ -0,0 +1,58 @@ +id: order-delivery-date-b3374ece5f330b0776522f2f5130afbd + +info: + name: > + Order Delivery Date for WP e-Commerce <= 1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d74f5813-cf7a-4ffb-9306-56f29b3a7d04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-delivery-date/" + google-query: inurl:"/wp-content/plugins/order-delivery-date/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-delivery-date,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-delivery-date/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-delivery-date" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-delivery-date-eee696eab23205a2046e2b67a8b48808.yaml b/nuclei-templates/cve-less/plugins/order-delivery-date-eee696eab23205a2046e2b67a8b48808.yaml new file mode 100644 index 0000000000..3cfadcc362 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-delivery-date-eee696eab23205a2046e2b67a8b48808.yaml @@ -0,0 +1,58 @@ +id: order-delivery-date-eee696eab23205a2046e2b67a8b48808 + +info: + name: > + Order Delivery Date for WP e-Commerce <= 1.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71fb90b6-a484-4a70-a9dc-795cbf2e275e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-delivery-date/" + google-query: inurl:"/wp-content/plugins/order-delivery-date/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-delivery-date,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-delivery-date/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-delivery-date" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-delivery-date-for-woocommerce-71393429192117f00dfd4a162cb8bf61.yaml b/nuclei-templates/cve-less/plugins/order-delivery-date-for-woocommerce-71393429192117f00dfd4a162cb8bf61.yaml new file mode 100644 index 0000000000..a0d88ea067 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-delivery-date-for-woocommerce-71393429192117f00dfd4a162cb8bf61.yaml @@ -0,0 +1,58 @@ +id: order-delivery-date-for-woocommerce-71393429192117f00dfd4a162cb8bf61 + +info: + name: > + Order Delivery Date for WooCommerce <= 3.20.0 - Reflected Cross-Site Scripting via 'orddd_lite_custom_startdate' and 'orddd_lite_custom_enddate' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9719d083-cc7c-4655-a4c4-f5370cfe76e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-delivery-date-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-delivery-date-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-delivery-date-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-delivery-date-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-delivery-date-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.20.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-delivery-date-for-woocommerce-fbf291b4c987a79d80bf5dc32be200a9.yaml b/nuclei-templates/cve-less/plugins/order-delivery-date-for-woocommerce-fbf291b4c987a79d80bf5dc32be200a9.yaml new file mode 100644 index 0000000000..4017265b24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-delivery-date-for-woocommerce-fbf291b4c987a79d80bf5dc32be200a9.yaml @@ -0,0 +1,58 @@ +id: order-delivery-date-for-woocommerce-fbf291b4c987a79d80bf5dc32be200a9 + +info: + name: > + Order Delivery Date for WooCommerce <= 3.21.0 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff77ffea-6b43-4875-965a-a72d761e93f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-delivery-date-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-delivery-date-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-delivery-date-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-delivery-date-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-delivery-date-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml b/nuclei-templates/cve-less/plugins/order-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml new file mode 100644 index 0000000000..eba95adc9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml @@ -0,0 +1,58 @@ +id: order-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2 + +info: + name: > + WebToffee Plugins <= (Various Versions) - Arbitrary User Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27ac48a7-52ee-46cb-a6d0-efbd2b516445?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-import-export-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-import-export-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-import-export-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-import-export-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-import-export-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-import-export-for-woocommerce-bb5370676c8e655ad72a3791cdb04f1e.yaml b/nuclei-templates/cve-less/plugins/order-import-export-for-woocommerce-bb5370676c8e655ad72a3791cdb04f1e.yaml new file mode 100644 index 0000000000..bf95c737a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-import-export-for-woocommerce-bb5370676c8e655ad72a3791cdb04f1e.yaml @@ -0,0 +1,58 @@ +id: order-import-export-for-woocommerce-bb5370676c8e655ad72a3791cdb04f1e + +info: + name: > + Order Export & Order Import for WooCommerce <= 2.4.3 - Authenticated (Shop Manager+) Arbitrary File Upload via upload_import_file + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15ce2e54-ca5a-4dbc-9795-6e989e85b330?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-import-export-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-import-export-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-import-export-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-import-export-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-import-export-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-on-chat-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/order-on-chat-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..04accbd778 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-on-chat-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: order-on-chat-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-on-chat-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-on-chat-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-on-chat-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-on-chat-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-on-chat-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-tip-woo-788617c7c507dc55ce43d126204f73e2.yaml b/nuclei-templates/cve-less/plugins/order-tip-woo-788617c7c507dc55ce43d126204f73e2.yaml new file mode 100644 index 0000000000..cb979dbbf2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-tip-woo-788617c7c507dc55ce43d126204f73e2.yaml @@ -0,0 +1,58 @@ +id: order-tip-woo-788617c7c507dc55ce43d126204f73e2 + +info: + name: > + Order Tip for WooCommerce <= 1.3.1 - Missing Authorization to Unauthenticated Data Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f837d6b-d1fa-4019-892a-dca3c0f29ca7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-tip-woo/" + google-query: inurl:"/wp-content/plugins/order-tip-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-tip-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-tip-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-tip-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-tracking-32b3fdbe7b7f22c46479a3e9393eb06a.yaml b/nuclei-templates/cve-less/plugins/order-tracking-32b3fdbe7b7f22c46479a3e9393eb06a.yaml new file mode 100644 index 0000000000..880baf3d85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-tracking-32b3fdbe7b7f22c46479a3e9393eb06a.yaml @@ -0,0 +1,58 @@ +id: order-tracking-32b3fdbe7b7f22c46479a3e9393eb06a + +info: + name: > + Order Tracking Pro <= 3.3.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81f9a4c6-971f-4f6d-8bb1-e97bf75cf8d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-tracking/" + google-query: inurl:"/wp-content/plugins/order-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-tracking-61c433e3c6260b98301128a0db50f713.yaml b/nuclei-templates/cve-less/plugins/order-tracking-61c433e3c6260b98301128a0db50f713.yaml new file mode 100644 index 0000000000..2d51f964a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-tracking-61c433e3c6260b98301128a0db50f713.yaml @@ -0,0 +1,58 @@ +id: order-tracking-61c433e3c6260b98301128a0db50f713 + +info: + name: > + Order Tracking Pro <= 3.3.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed64d0ff-4f49-4c18-86ec-2c6fbd559d2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-tracking/" + google-query: inurl:"/wp-content/plugins/order-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-xml-file-export-import-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml b/nuclei-templates/cve-less/plugins/order-xml-file-export-import-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml new file mode 100644 index 0000000000..35de045789 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-xml-file-export-import-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml @@ -0,0 +1,58 @@ +id: order-xml-file-export-import-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2 + +info: + name: > + WebToffee Plugins <= (Various Versions) - Arbitrary User Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27ac48a7-52ee-46cb-a6d0-efbd2b516445?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-xml-file-export-import-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-xml-file-export-import-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-xml-file-export-import-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-xml-file-export-import-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-xml-file-export-import-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-xml-file-export-import-for-woocommerce-2c636c041261dbec5d7ba4cab181df88.yaml b/nuclei-templates/cve-less/plugins/order-xml-file-export-import-for-woocommerce-2c636c041261dbec5d7ba4cab181df88.yaml new file mode 100644 index 0000000000..6ac0f7d5ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-xml-file-export-import-for-woocommerce-2c636c041261dbec5d7ba4cab181df88.yaml @@ -0,0 +1,58 @@ +id: order-xml-file-export-import-for-woocommerce-2c636c041261dbec5d7ba4cab181df88 + +info: + name: > + Order XML File Export Import for WooCommerce < 1.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f594989-8db3-41c8-9089-b4e2d995270e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-xml-file-export-import-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-xml-file-export-import-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-xml-file-export-import-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-xml-file-export-import-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-xml-file-export-import-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-your-posts-manually-0a78b90f665dee3807012f6bf66ac8e7.yaml b/nuclei-templates/cve-less/plugins/order-your-posts-manually-0a78b90f665dee3807012f6bf66ac8e7.yaml new file mode 100644 index 0000000000..36b06eb275 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-your-posts-manually-0a78b90f665dee3807012f6bf66ac8e7.yaml @@ -0,0 +1,58 @@ +id: order-your-posts-manually-0a78b90f665dee3807012f6bf66ac8e7 + +info: + name: > + Order Your Posts Manually <= 2.2.5 - Reflected Cross-Site Scripting via 'cat_id' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5688bb7-cd2d-42c6-b8cf-d908448ccfc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-your-posts-manually/" + google-query: inurl:"/wp-content/plugins/order-your-posts-manually/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-your-posts-manually,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-your-posts-manually/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-your-posts-manually" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-your-posts-manually-53cad8b598a3c7e05217d7a8485ccce4.yaml b/nuclei-templates/cve-less/plugins/order-your-posts-manually-53cad8b598a3c7e05217d7a8485ccce4.yaml new file mode 100644 index 0000000000..1c4d758ead --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-your-posts-manually-53cad8b598a3c7e05217d7a8485ccce4.yaml @@ -0,0 +1,58 @@ +id: order-your-posts-manually-53cad8b598a3c7e05217d7a8485ccce4 + +info: + name: > + Order Your Posts Manually <= 2.2.5 - Reflected Cross-Site Scripting via '_user_request' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d98a961-bef3-4bce-b493-410eee688bc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-your-posts-manually/" + google-query: inurl:"/wp-content/plugins/order-your-posts-manually/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-your-posts-manually,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-your-posts-manually/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-your-posts-manually" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/order-your-posts-manually-6221ac90696b9d40486e73f6a756b92e.yaml b/nuclei-templates/cve-less/plugins/order-your-posts-manually-6221ac90696b9d40486e73f6a756b92e.yaml new file mode 100644 index 0000000000..aa5648e61e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/order-your-posts-manually-6221ac90696b9d40486e73f6a756b92e.yaml @@ -0,0 +1,58 @@ +id: order-your-posts-manually-6221ac90696b9d40486e73f6a756b92e + +info: + name: > + Order Your Posts Manually <= 2.2.5 - Authenticated (Administrator+) SQL Injection via 'sortdata' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66da0ad7-18a3-42b9-b59a-5927c6bc836b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/order-your-posts-manually/" + google-query: inurl:"/wp-content/plugins/order-your-posts-manually/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,order-your-posts-manually,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/order-your-posts-manually/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "order-your-posts-manually" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/organization-chart-7a149af217c0a6dffb13397d014d6e33.yaml b/nuclei-templates/cve-less/plugins/organization-chart-7a149af217c0a6dffb13397d014d6e33.yaml new file mode 100644 index 0000000000..6b76c9811c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/organization-chart-7a149af217c0a6dffb13397d014d6e33.yaml @@ -0,0 +1,58 @@ +id: organization-chart-7a149af217c0a6dffb13397d014d6e33 + +info: + name: > + Organization chart <= 1.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2bd8eec-5984-42f8-ba9a-ce61bf7cd440?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/organization-chart/" + google-query: inurl:"/wp-content/plugins/organization-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,organization-chart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/organization-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "organization-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/organization-chart-7dc1fbd7e7abf281f194a7d7c03c76ee.yaml b/nuclei-templates/cve-less/plugins/organization-chart-7dc1fbd7e7abf281f194a7d7c03c76ee.yaml new file mode 100644 index 0000000000..277ff0e67c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/organization-chart-7dc1fbd7e7abf281f194a7d7c03c76ee.yaml @@ -0,0 +1,58 @@ +id: organization-chart-7dc1fbd7e7abf281f194a7d7c03c76ee + +info: + name: > + Organization chart <= 1.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1647ac13-d9d1-46ae-93e7-855f55160e03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/organization-chart/" + google-query: inurl:"/wp-content/plugins/organization-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,organization-chart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/organization-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "organization-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/organization-chart-a4e88b3da711b27ab40f6efd4bb4e5fa.yaml b/nuclei-templates/cve-less/plugins/organization-chart-a4e88b3da711b27ab40f6efd4bb4e5fa.yaml new file mode 100644 index 0000000000..3c7b81082c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/organization-chart-a4e88b3da711b27ab40f6efd4bb4e5fa.yaml @@ -0,0 +1,58 @@ +id: organization-chart-a4e88b3da711b27ab40f6efd4bb4e5fa + +info: + name: > + Organization chart <= 1.4.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d19df1f1-df64-4b4a-8dcb-8c76566fc2ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/organization-chart/" + google-query: inurl:"/wp-content/plugins/organization-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,organization-chart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/organization-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "organization-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/organization-chart-fbacd93e40e029ab5294ff6e4faadc80.yaml b/nuclei-templates/cve-less/plugins/organization-chart-fbacd93e40e029ab5294ff6e4faadc80.yaml new file mode 100644 index 0000000000..7c50662444 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/organization-chart-fbacd93e40e029ab5294ff6e4faadc80.yaml @@ -0,0 +1,58 @@ +id: organization-chart-fbacd93e40e029ab5294ff6e4faadc80 + +info: + name: > + Organization chart <= 1.4.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cb8bd81-72a4-4b53-850b-78cc5e05043f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/organization-chart/" + google-query: inurl:"/wp-content/plugins/organization-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,organization-chart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/organization-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "organization-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/organizer-1b5adfb99c271100e33918010bf13877.yaml b/nuclei-templates/cve-less/plugins/organizer-1b5adfb99c271100e33918010bf13877.yaml new file mode 100644 index 0000000000..c1fa5f1414 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/organizer-1b5adfb99c271100e33918010bf13877.yaml @@ -0,0 +1,58 @@ +id: organizer-1b5adfb99c271100e33918010bf13877 + +info: + name: > + Organizer <= 1.2.1 - Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/718615b1-9c25-4119-bc30-683ef51e5861?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/organizer/" + google-query: inurl:"/wp-content/plugins/organizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,organizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/organizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "organizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/organizer-a88755371a7efc7dfaacf49c4e565b46.yaml b/nuclei-templates/cve-less/plugins/organizer-a88755371a7efc7dfaacf49c4e565b46.yaml new file mode 100644 index 0000000000..7c5475ba78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/organizer-a88755371a7efc7dfaacf49c4e565b46.yaml @@ -0,0 +1,58 @@ +id: organizer-a88755371a7efc7dfaacf49c4e565b46 + +info: + name: > + Organizer <= 1.2.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/805a7bef-d56b-4678-8db9-798ad401352f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/organizer/" + google-query: inurl:"/wp-content/plugins/organizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,organizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/organizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "organizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/original-texts-yandex-webmaster-ee1e925bdddc6bf24a1981ba88df97ca.yaml b/nuclei-templates/cve-less/plugins/original-texts-yandex-webmaster-ee1e925bdddc6bf24a1981ba88df97ca.yaml new file mode 100644 index 0000000000..5467b5f464 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/original-texts-yandex-webmaster-ee1e925bdddc6bf24a1981ba88df97ca.yaml @@ -0,0 +1,58 @@ +id: original-texts-yandex-webmaster-ee1e925bdddc6bf24a1981ba88df97ca + +info: + name: > + Original texts Yandex WebMaster <= 1.18 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c500fc-0d85-41b1-a2b8-9c8ba372a6e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/original-texts-yandex-webmaster/" + google-query: inurl:"/wp-content/plugins/original-texts-yandex-webmaster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,original-texts-yandex-webmaster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/original-texts-yandex-webmaster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "original-texts-yandex-webmaster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/osd-subscribe-a1996943f46f7e75b7c830d7d4d93d4d.yaml b/nuclei-templates/cve-less/plugins/osd-subscribe-a1996943f46f7e75b7c830d7d4d93d4d.yaml new file mode 100644 index 0000000000..e1812c146c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/osd-subscribe-a1996943f46f7e75b7c830d7d4d93d4d.yaml @@ -0,0 +1,58 @@ +id: osd-subscribe-a1996943f46f7e75b7c830d7d4d93d4d + +info: + name: > + OSD Subscribe <= 1.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45f581dc-d424-4cda-aa03-016e9b5ee1e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/osd-subscribe/" + google-query: inurl:"/wp-content/plugins/osd-subscribe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,osd-subscribe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/osd-subscribe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "osd-subscribe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/osm-8b5e55916d6d52550d91a97ed666547f.yaml b/nuclei-templates/cve-less/plugins/osm-8b5e55916d6d52550d91a97ed666547f.yaml new file mode 100644 index 0000000000..003941e901 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/osm-8b5e55916d6d52550d91a97ed666547f.yaml @@ -0,0 +1,58 @@ +id: osm-8b5e55916d6d52550d91a97ed666547f + +info: + name: > + OSM - OpenStreetMap <= 6.0.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6dac6353-9e70-482d-b54b-ffde661b212c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/osm/" + google-query: inurl:"/wp-content/plugins/osm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,osm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/osm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "osm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/osm-b58caf3062d49a3b707b9a414cc1dfaa.yaml b/nuclei-templates/cve-less/plugins/osm-b58caf3062d49a3b707b9a414cc1dfaa.yaml new file mode 100644 index 0000000000..db1be32776 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/osm-b58caf3062d49a3b707b9a414cc1dfaa.yaml @@ -0,0 +1,58 @@ +id: osm-b58caf3062d49a3b707b9a414cc1dfaa + +info: + name: > + OSM - OpenStreetMap <= 6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/123c2958-3335-4212-8ed0-b2a56a5272f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/osm/" + google-query: inurl:"/wp-content/plugins/osm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,osm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/osm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "osm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/osmapper-2113dc45f9cb386268821363e5c4256a.yaml b/nuclei-templates/cve-less/plugins/osmapper-2113dc45f9cb386268821363e5c4256a.yaml new file mode 100644 index 0000000000..46942dc3f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/osmapper-2113dc45f9cb386268821363e5c4256a.yaml @@ -0,0 +1,58 @@ +id: osmapper-2113dc45f9cb386268821363e5c4256a + +info: + name: > + OSMapper <= 2.1.5 - Unauthenticated Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba027271-b7f9-4bdb-a62b-801fd07f28fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/osmapper/" + google-query: inurl:"/wp-content/plugins/osmapper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,osmapper,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/osmapper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "osmapper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oss-aliyun-60929a68cddca1a94650b63066730255.yaml b/nuclei-templates/cve-less/plugins/oss-aliyun-60929a68cddca1a94650b63066730255.yaml new file mode 100644 index 0000000000..94247802c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oss-aliyun-60929a68cddca1a94650b63066730255.yaml @@ -0,0 +1,58 @@ +id: oss-aliyun-60929a68cddca1a94650b63066730255 + +info: + name: > + OSS Aliyun <= 1.4.10 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/738eb021-1166-4fbe-a502-2db12c6533c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oss-aliyun/" + google-query: inurl:"/wp-content/plugins/oss-aliyun/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oss-aliyun,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oss-aliyun/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oss-aliyun" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-blocks-08e36a5e429e15172c47a461c7457404.yaml b/nuclei-templates/cve-less/plugins/otter-blocks-08e36a5e429e15172c47a461c7457404.yaml new file mode 100644 index 0000000000..61b05425c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-blocks-08e36a5e429e15172c47a461c7457404.yaml @@ -0,0 +1,58 @@ +id: otter-blocks-08e36a5e429e15172c47a461c7457404 + +info: + name: > + Otter - Gutenberg Blocks <= 2.2.5 - Authenticated (Author+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f18be13a-1b16-40f8-85a7-bd77b49e243c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-blocks/" + google-query: inurl:"/wp-content/plugins/otter-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-blocks-46f9477f32da89d305905e8493b5f75e.yaml b/nuclei-templates/cve-less/plugins/otter-blocks-46f9477f32da89d305905e8493b5f75e.yaml new file mode 100644 index 0000000000..f0da16e952 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-blocks-46f9477f32da89d305905e8493b5f75e.yaml @@ -0,0 +1,58 @@ +id: otter-blocks-46f9477f32da89d305905e8493b5f75e + +info: + name: > + Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE <= 2.6.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99e24496-0e3b-4bff-ba14-dc535be10633?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-blocks/" + google-query: inurl:"/wp-content/plugins/otter-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-blocks-74e59a3e9ea29768b5d0afa832d7eb55.yaml b/nuclei-templates/cve-less/plugins/otter-blocks-74e59a3e9ea29768b5d0afa832d7eb55.yaml new file mode 100644 index 0000000000..cd4dcd0c5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-blocks-74e59a3e9ea29768b5d0afa832d7eb55.yaml @@ -0,0 +1,58 @@ +id: otter-blocks-74e59a3e9ea29768b5d0afa832d7eb55 + +info: + name: > + Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE <= 2.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67981160-6c91-48a4-ba1c-68204d538ed6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-blocks/" + google-query: inurl:"/wp-content/plugins/otter-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-blocks-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/otter-blocks-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..0e307c48c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-blocks-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: otter-blocks-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-blocks/" + google-query: inurl:"/wp-content/plugins/otter-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-blocks-c6ebd7f92a6a9f141b0c9e1fd40276a5.yaml b/nuclei-templates/cve-less/plugins/otter-blocks-c6ebd7f92a6a9f141b0c9e1fd40276a5.yaml new file mode 100644 index 0000000000..d740925feb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-blocks-c6ebd7f92a6a9f141b0c9e1fd40276a5.yaml @@ -0,0 +1,58 @@ +id: otter-blocks-c6ebd7f92a6a9f141b0c9e1fd40276a5 + +info: + name: > + Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE <= 2.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'titleTag' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceb041f6-b88a-495a-8f5f-7f39f640748d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-blocks/" + google-query: inurl:"/wp-content/plugins/otter-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-blocks-d1fde79ddb6f5cce29eedf02f3d4b354.yaml b/nuclei-templates/cve-less/plugins/otter-blocks-d1fde79ddb6f5cce29eedf02f3d4b354.yaml new file mode 100644 index 0000000000..a4627526ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-blocks-d1fde79ddb6f5cce29eedf02f3d4b354.yaml @@ -0,0 +1,58 @@ +id: otter-blocks-d1fde79ddb6f5cce29eedf02f3d4b354 + +info: + name: > + Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE <= 2.6.8 - Authenticated (Author+) Limited File Upload to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db836f4b-d31f-4442-89a5-1a400525c598?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-blocks/" + google-query: inurl:"/wp-content/plugins/otter-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-blocks-e70c973ee52c3a8cad3d00694281c5e4.yaml b/nuclei-templates/cve-less/plugins/otter-blocks-e70c973ee52c3a8cad3d00694281c5e4.yaml new file mode 100644 index 0000000000..c6d8709c4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-blocks-e70c973ee52c3a8cad3d00694281c5e4.yaml @@ -0,0 +1,58 @@ +id: otter-blocks-e70c973ee52c3a8cad3d00694281c5e4 + +info: + name: > + Otter Blocks <= 2.6.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f838dbc9-b31e-46c6-b615-4e8ece9a9cfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-blocks/" + google-query: inurl:"/wp-content/plugins/otter-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-blocks-eb48e0d7cc280c7a495d24563f61a7d5.yaml b/nuclei-templates/cve-less/plugins/otter-blocks-eb48e0d7cc280c7a495d24563f61a7d5.yaml new file mode 100644 index 0000000000..249eaee876 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-blocks-eb48e0d7cc280c7a495d24563f61a7d5.yaml @@ -0,0 +1,58 @@ +id: otter-blocks-eb48e0d7cc280c7a495d24563f61a7d5 + +info: + name: > + Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE <= 2.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/217d3148-d411-4fff-a4f6-d5d02ef207af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-blocks/" + google-query: inurl:"/wp-content/plugins/otter-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-pro-89238e69360283d59cda9a307dc44ad9.yaml b/nuclei-templates/cve-less/plugins/otter-pro-89238e69360283d59cda9a307dc44ad9.yaml new file mode 100644 index 0000000000..a124509452 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-pro-89238e69360283d59cda9a307dc44ad9.yaml @@ -0,0 +1,58 @@ +id: otter-pro-89238e69360283d59cda9a307dc44ad9 + +info: + name: > + Otter Blocks PRO <= 2.6.3 - Authenticated(Contributor+) Stored Cross-Site Scripting via File Field CSS + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/934bf839-152d-4d10-9ac8-c64cf042dc18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-pro/" + google-query: inurl:"/wp-content/plugins/otter-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/otter-pro-9f787a2ef36698ab9d958e79e9a7609e.yaml b/nuclei-templates/cve-less/plugins/otter-pro-9f787a2ef36698ab9d958e79e9a7609e.yaml new file mode 100644 index 0000000000..c6795e1e3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/otter-pro-9f787a2ef36698ab9d958e79e9a7609e.yaml @@ -0,0 +1,58 @@ +id: otter-pro-9f787a2ef36698ab9d958e79e9a7609e + +info: + name: > + Otter Blocks PRO <= 2.6.3 - Unauthenticated Stored Cross-Site Scripting via SVG Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77838bf8-7809-4dd6-87f1-a9bda40275a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/otter-pro/" + google-query: inurl:"/wp-content/plugins/otter-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,otter-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/otter-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "otter-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/our-services-showcase-fa0b498c03b490f6a302c8923c66045e.yaml b/nuclei-templates/cve-less/plugins/our-services-showcase-fa0b498c03b490f6a302c8923c66045e.yaml new file mode 100644 index 0000000000..4f9149fbc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/our-services-showcase-fa0b498c03b490f6a302c8923c66045e.yaml @@ -0,0 +1,58 @@ +id: our-services-showcase-fa0b498c03b490f6a302c8923c66045e + +info: + name: > + Our Services Showcase <= 2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e62a58ec-4ea5-4241-8148-fc8801bd59b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/our-services-showcase/" + google-query: inurl:"/wp-content/plugins/our-services-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,our-services-showcase,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/our-services-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "our-services-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/our-team-enhanced-15ed4766d27c484c5517c27d81b8d51f.yaml b/nuclei-templates/cve-less/plugins/our-team-enhanced-15ed4766d27c484c5517c27d81b8d51f.yaml new file mode 100644 index 0000000000..1aab04f547 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/our-team-enhanced-15ed4766d27c484c5517c27d81b8d51f.yaml @@ -0,0 +1,58 @@ +id: our-team-enhanced-15ed4766d27c484c5517c27d81b8d51f + +info: + name: > + Our Team Showcase < 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7ea99e7-2502-42a2-b037-2040114a8055?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/our-team-enhanced/" + google-query: inurl:"/wp-content/plugins/our-team-enhanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,our-team-enhanced,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/our-team-enhanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "our-team-enhanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/out-of-stock-display-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/out-of-stock-display-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c834ca193d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/out-of-stock-display-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: out-of-stock-display-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/out-of-stock-display-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/out-of-stock-display-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,out-of-stock-display-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/out-of-stock-display-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "out-of-stock-display-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/out-of-the-box-746c295d8ae3e879964a1880bd187ba1.yaml b/nuclei-templates/cve-less/plugins/out-of-the-box-746c295d8ae3e879964a1880bd187ba1.yaml new file mode 100644 index 0000000000..1c86fff9f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/out-of-the-box-746c295d8ae3e879964a1880bd187ba1.yaml @@ -0,0 +1,58 @@ +id: out-of-the-box-746c295d8ae3e879964a1880bd187ba1 + +info: + name: > + Out-of-the-Box <= 1.20.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbd641a4-a8cf-4e51-8675-53d867740ded?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/out-of-the-box/" + google-query: inurl:"/wp-content/plugins/out-of-the-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,out-of-the-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/out-of-the-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "out-of-the-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/outbound-link-manager-c4f801789643f99238516422e3dea2a6.yaml b/nuclei-templates/cve-less/plugins/outbound-link-manager-c4f801789643f99238516422e3dea2a6.yaml new file mode 100644 index 0000000000..644acb3e00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/outbound-link-manager-c4f801789643f99238516422e3dea2a6.yaml @@ -0,0 +1,58 @@ +id: outbound-link-manager-c4f801789643f99238516422e3dea2a6 + +info: + name: > + Outbound Link Manager <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dfc0d5e-bdc4-4f71-8aa3-0a4fbd7ef37d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/outbound-link-manager/" + google-query: inurl:"/wp-content/plugins/outbound-link-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,outbound-link-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/outbound-link-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "outbound-link-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/overlay-image-divi-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/overlay-image-divi-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5f921be10e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/overlay-image-divi-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: overlay-image-divi-module-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/overlay-image-divi-module/" + google-query: inurl:"/wp-content/plugins/overlay-image-divi-module/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,overlay-image-divi-module,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/overlay-image-divi-module/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "overlay-image-divi-module" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ovic-addon-toolkit-01230d7023712cf52d185f89bc18a400.yaml b/nuclei-templates/cve-less/plugins/ovic-addon-toolkit-01230d7023712cf52d185f89bc18a400.yaml new file mode 100644 index 0000000000..5b3d829d03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ovic-addon-toolkit-01230d7023712cf52d185f89bc18a400.yaml @@ -0,0 +1,58 @@ +id: ovic-addon-toolkit-01230d7023712cf52d185f89bc18a400 + +info: + name: > + Ovic Addon Toolkit <= 2.6.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96deac16-cb64-4246-b8d0-05a020142f1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ovic-addon-toolkit/" + google-query: inurl:"/wp-content/plugins/ovic-addon-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ovic-addon-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ovic-addon-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ovic-addon-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ovic-product-bundle-c5037c5f6ce141975f7a422878dcc1cf.yaml b/nuclei-templates/cve-less/plugins/ovic-product-bundle-c5037c5f6ce141975f7a422878dcc1cf.yaml new file mode 100644 index 0000000000..c480c6fa73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ovic-product-bundle-c5037c5f6ce141975f7a422878dcc1cf.yaml @@ -0,0 +1,58 @@ +id: ovic-product-bundle-c5037c5f6ce141975f7a422878dcc1cf + +info: + name: > + Ovic Product Bundle <= 1.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5657ffe2-7d04-4834-bcec-ab6afaeda7df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ovic-product-bundle/" + google-query: inurl:"/wp-content/plugins/ovic-product-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ovic-product-bundle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ovic-product-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ovic-product-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ovic-vc-addon-7f87928645d2c31cf00fa75d4b3905c3.yaml b/nuclei-templates/cve-less/plugins/ovic-vc-addon-7f87928645d2c31cf00fa75d4b3905c3.yaml new file mode 100644 index 0000000000..3df20bd65b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ovic-vc-addon-7f87928645d2c31cf00fa75d4b3905c3.yaml @@ -0,0 +1,58 @@ +id: ovic-vc-addon-7f87928645d2c31cf00fa75d4b3905c3 + +info: + name: > + Ovic Responsive WPBakery <= 1.2.8 - Authenticated (Subscriber+) Arbitrary Option Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cbbedcb-52dd-44b9-a629-1da0a2552f13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ovic-vc-addon/" + google-query: inurl:"/wp-content/plugins/ovic-vc-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ovic-vc-addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ovic-vc-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ovic-vc-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ovic-vc-addon-965d06634426ae72a55053fa07ab23f9.yaml b/nuclei-templates/cve-less/plugins/ovic-vc-addon-965d06634426ae72a55053fa07ab23f9.yaml new file mode 100644 index 0000000000..b9f0b310aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ovic-vc-addon-965d06634426ae72a55053fa07ab23f9.yaml @@ -0,0 +1,58 @@ +id: ovic-vc-addon-965d06634426ae72a55053fa07ab23f9 + +info: + name: > + Ovic Responsive WPBakery <= 1.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a06147c7-a96e-4f12-9a67-23ca82b09942?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ovic-vc-addon/" + google-query: inurl:"/wp-content/plugins/ovic-vc-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ovic-vc-addon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ovic-vc-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ovic-vc-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/owl-carousel-4dd1db9fbfcd7d8c0bd7134fb7dd4c2e.yaml b/nuclei-templates/cve-less/plugins/owl-carousel-4dd1db9fbfcd7d8c0bd7134fb7dd4c2e.yaml new file mode 100644 index 0000000000..f0078532d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/owl-carousel-4dd1db9fbfcd7d8c0bd7134fb7dd4c2e.yaml @@ -0,0 +1,58 @@ +id: owl-carousel-4dd1db9fbfcd7d8c0bd7134fb7dd4c2e + +info: + name: > + Owl Carousel <= 0.5.3 - Missing Authorization via save_paramter.php + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37aaf109-e04f-40d7-8303-a581b0b09d24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/owl-carousel/" + google-query: inurl:"/wp-content/plugins/owl-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,owl-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/owl-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "owl-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/owl-carousel-9a422d0a1f5b287c75a0c4e8af0a5fc9.yaml b/nuclei-templates/cve-less/plugins/owl-carousel-9a422d0a1f5b287c75a0c4e8af0a5fc9.yaml new file mode 100644 index 0000000000..471885d68a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/owl-carousel-9a422d0a1f5b287c75a0c4e8af0a5fc9.yaml @@ -0,0 +1,58 @@ +id: owl-carousel-9a422d0a1f5b287c75a0c4e8af0a5fc9 + +info: + name: > + Owl Carousel <= 0.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92bcdbd9-1f41-4990-9bea-587fb0e7355a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/owl-carousel/" + google-query: inurl:"/wp-content/plugins/owl-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,owl-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/owl-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "owl-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/owm-weather-8e5a5c6c98d5ff17214ae536b2646317.yaml b/nuclei-templates/cve-less/plugins/owm-weather-8e5a5c6c98d5ff17214ae536b2646317.yaml new file mode 100644 index 0000000000..e8391db1b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/owm-weather-8e5a5c6c98d5ff17214ae536b2646317.yaml @@ -0,0 +1,58 @@ +id: owm-weather-8e5a5c6c98d5ff17214ae536b2646317 + +info: + name: > + OWM Weather <= 5.6.8 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1549ae5-267d-4fbb-be07-5b3842efd4f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/owm-weather/" + google-query: inurl:"/wp-content/plugins/owm-weather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,owm-weather,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/owm-weather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "owm-weather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/owm-weather-d0ac90c02958fd486fae19ccf9cfd8db.yaml b/nuclei-templates/cve-less/plugins/owm-weather-d0ac90c02958fd486fae19ccf9cfd8db.yaml new file mode 100644 index 0000000000..3a9c62dc96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/owm-weather-d0ac90c02958fd486fae19ccf9cfd8db.yaml @@ -0,0 +1,58 @@ +id: owm-weather-d0ac90c02958fd486fae19ccf9cfd8db + +info: + name: > + OWM Weather <= 5.6.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d56fdde-ab7a-4e7c-9f48-48e71e09a681?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/owm-weather/" + google-query: inurl:"/wp-content/plugins/owm-weather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,owm-weather,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/owm-weather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "owm-weather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oxyextras-453edd08020fcb6cf7997bc23916e6f1.yaml b/nuclei-templates/cve-less/plugins/oxyextras-453edd08020fcb6cf7997bc23916e6f1.yaml new file mode 100644 index 0000000000..b0bfb9c777 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oxyextras-453edd08020fcb6cf7997bc23916e6f1.yaml @@ -0,0 +1,58 @@ +id: oxyextras-453edd08020fcb6cf7997bc23916e6f1 + +info: + name: > + OxyExtras <= 1.4.4 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fcfd8c1-89b3-49f1-90dc-5eac1f9dbae5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oxyextras/" + google-query: inurl:"/wp-content/plugins/oxyextras/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oxyextras,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oxyextras/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oxyextras" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oxygen-c334c90cee1067800314e97523ff3712.yaml b/nuclei-templates/cve-less/plugins/oxygen-c334c90cee1067800314e97523ff3712.yaml new file mode 100644 index 0000000000..52d82f70e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oxygen-c334c90cee1067800314e97523ff3712.yaml @@ -0,0 +1,58 @@ +id: oxygen-c334c90cee1067800314e97523ff3712 + +info: + name: > + Oxygen < 4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34fb7647-76e2-4985-816e-c6420c01a048?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oxygen/" + google-query: inurl:"/wp-content/plugins/oxygen/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oxygen,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oxygen/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oxygen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/oxygenbuilder-c7a8bc13237071ee5b2f66d58803bacf.yaml b/nuclei-templates/cve-less/plugins/oxygenbuilder-c7a8bc13237071ee5b2f66d58803bacf.yaml new file mode 100644 index 0000000000..b3b16755cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/oxygenbuilder-c7a8bc13237071ee5b2f66d58803bacf.yaml @@ -0,0 +1,58 @@ +id: oxygenbuilder-c7a8bc13237071ee5b2f66d58803bacf + +info: + name: > + Oxygen Builder <= 4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee069cb3-370e-48ea-aa35-c30fe83c2498?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/oxygenbuilder/" + google-query: inurl:"/wp-content/plugins/oxygenbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,oxygenbuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/oxygenbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oxygenbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/p3-a64f133bbd4857bc65950b864d18ea1f.yaml b/nuclei-templates/cve-less/plugins/p3-a64f133bbd4857bc65950b864d18ea1f.yaml new file mode 100644 index 0000000000..6648f13c42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/p3-a64f133bbd4857bc65950b864d18ea1f.yaml @@ -0,0 +1,58 @@ +id: p3-a64f133bbd4857bc65950b864d18ea1f + +info: + name: > + Pipdig Power Pack (P3) <= 4.7.3 - Backdoor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05c40628-b8fc-48ff-8819-c0955d69fce0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/p3/" + google-query: inurl:"/wp-content/plugins/p3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,p3,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/p3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "p3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/p3-profiler-a26b66ffa61f83ecbb446f03cc1365ad.yaml b/nuclei-templates/cve-less/plugins/p3-profiler-a26b66ffa61f83ecbb446f03cc1365ad.yaml new file mode 100644 index 0000000000..d507b0e483 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/p3-profiler-a26b66ffa61f83ecbb446f03cc1365ad.yaml @@ -0,0 +1,58 @@ +id: p3-profiler-a26b66ffa61f83ecbb446f03cc1365ad + +info: + name: > + P3 (Plugin Performance Profiler) < 1.5.3.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de918177-5901-40ed-a936-c212cdcf940d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/p3-profiler/" + google-query: inurl:"/wp-content/plugins/p3-profiler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,p3-profiler,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/p3-profiler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "p3-profiler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/package-quantity-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/package-quantity-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..2ab9985443 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/package-quantity-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: package-quantity-xforwc-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/package-quantity-xforwc/" + google-query: inurl:"/wp-content/plugins/package-quantity-xforwc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,package-quantity-xforwc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/package-quantity-xforwc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "package-quantity-xforwc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-and-post-restriction-2afaa956cded901d5ea2b4034f565538.yaml b/nuclei-templates/cve-less/plugins/page-and-post-restriction-2afaa956cded901d5ea2b4034f565538.yaml new file mode 100644 index 0000000000..e90088ec61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-and-post-restriction-2afaa956cded901d5ea2b4034f565538.yaml @@ -0,0 +1,58 @@ +id: page-and-post-restriction-2afaa956cded901d5ea2b4034f565538 + +info: + name: > + Page Restriction WordPress (WP) – Protect WP Pages/Post <= 1.3.4 - Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-and-post-restriction/" + google-query: inurl:"/wp-content/plugins/page-and-post-restriction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-and-post-restriction,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-and-post-restriction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-and-post-restriction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-and-post-restriction-7e7d3fe35e3640caa3a72acaf61512d5.yaml b/nuclei-templates/cve-less/plugins/page-and-post-restriction-7e7d3fe35e3640caa3a72acaf61512d5.yaml new file mode 100644 index 0000000000..d7a0cb4439 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-and-post-restriction-7e7d3fe35e3640caa3a72acaf61512d5.yaml @@ -0,0 +1,58 @@ +id: page-and-post-restriction-7e7d3fe35e3640caa3a72acaf61512d5 + +info: + name: > + Page Restriction WordPress <= 1.2.6 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd8c07cc-7fdd-4474-8be1-b08d857ae109?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-and-post-restriction/" + google-query: inurl:"/wp-content/plugins/page-and-post-restriction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-and-post-restriction,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-and-post-restriction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-and-post-restriction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-add-1320225def4406c9e713cc329abaeb70.yaml b/nuclei-templates/cve-less/plugins/page-builder-add-1320225def4406c9e713cc329abaeb70.yaml new file mode 100644 index 0000000000..f7e32609c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-add-1320225def4406c9e713cc329abaeb70.yaml @@ -0,0 +1,58 @@ +id: page-builder-add-1320225def4406c9e713cc329abaeb70 + +info: + name: > + Landing Page Builder <= 1.5.1.7 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b409e3f-51e0-4d66-a04c-a0d54259bd2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-add/" + google-query: inurl:"/wp-content/plugins/page-builder-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-add,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-add-65def4250a9c953c2f2257736ac45133.yaml b/nuclei-templates/cve-less/plugins/page-builder-add-65def4250a9c953c2f2257736ac45133.yaml new file mode 100644 index 0000000000..25866bf37d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-add-65def4250a9c953c2f2257736ac45133.yaml @@ -0,0 +1,58 @@ +id: page-builder-add-65def4250a9c953c2f2257736ac45133 + +info: + name: > + Landing Page Builder <= 1.4.9.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a7cbd2e-79c9-4be7-b458-e4e5f0376a22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-add/" + google-query: inurl:"/wp-content/plugins/page-builder-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-add,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-add-76176e7d0b3c59c6f85d0f00865be579.yaml b/nuclei-templates/cve-less/plugins/page-builder-add-76176e7d0b3c59c6f85d0f00865be579.yaml new file mode 100644 index 0000000000..265b1bd7b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-add-76176e7d0b3c59c6f85d0f00865be579.yaml @@ -0,0 +1,58 @@ +id: page-builder-add-76176e7d0b3c59c6f85d0f00865be579 + +info: + name: > + Landing Page Builder <= 1.4.9.8.9 - Authenticated (Contributor+) Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cb3f111-4ac3-4c57-aa62-569b71143fec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-add/" + google-query: inurl:"/wp-content/plugins/page-builder-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-add,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-add-8417ca6ea2b385ef6685bba03ed8d8b5.yaml b/nuclei-templates/cve-less/plugins/page-builder-add-8417ca6ea2b385ef6685bba03ed8d8b5.yaml new file mode 100644 index 0000000000..a6fa2cd38b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-add-8417ca6ea2b385ef6685bba03ed8d8b5.yaml @@ -0,0 +1,58 @@ +id: page-builder-add-8417ca6ea2b385ef6685bba03ed8d8b5 + +info: + name: > + Landing Page Builder <= 1.5.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2e83cb5-3c10-45dc-b37e-4d47ebc6853d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-add/" + google-query: inurl:"/wp-content/plugins/page-builder-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-add,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-add-edfb37ba6e16342d02314bfa81ec308b.yaml b/nuclei-templates/cve-less/plugins/page-builder-add-edfb37ba6e16342d02314bfa81ec308b.yaml new file mode 100644 index 0000000000..47e67d2370 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-add-edfb37ba6e16342d02314bfa81ec308b.yaml @@ -0,0 +1,58 @@ +id: page-builder-add-edfb37ba6e16342d02314bfa81ec308b + +info: + name: > + Landing Page Builder <= 1.5.1.5 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1a4d8a3-5553-4b1c-b0f8-d6a372de3692?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-add/" + google-query: inurl:"/wp-content/plugins/page-builder-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-add,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-by-azexo-2ef42991bf5a3f6fe661eaa83837878d.yaml b/nuclei-templates/cve-less/plugins/page-builder-by-azexo-2ef42991bf5a3f6fe661eaa83837878d.yaml new file mode 100644 index 0000000000..b1d8aae9d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-by-azexo-2ef42991bf5a3f6fe661eaa83837878d.yaml @@ -0,0 +1,58 @@ +id: page-builder-by-azexo-2ef42991bf5a3f6fe661eaa83837878d + +info: + name: > + Page Builder by AZEXO <= 1.27.133 - Missing Authorization to Post Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd56cb73-1c40-44b1-b713-c0291832d988?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-by-azexo/" + google-query: inurl:"/wp-content/plugins/page-builder-by-azexo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-by-azexo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-by-azexo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-by-azexo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.27.133') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-by-azexo-903fd5007a29b9028410d0ffded470cf.yaml b/nuclei-templates/cve-less/plugins/page-builder-by-azexo-903fd5007a29b9028410d0ffded470cf.yaml new file mode 100644 index 0000000000..16a6214809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-by-azexo-903fd5007a29b9028410d0ffded470cf.yaml @@ -0,0 +1,58 @@ +id: page-builder-by-azexo-903fd5007a29b9028410d0ffded470cf + +info: + name: > + Page Builder by AZEXO <= 1.27.133 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24486605-9324-4f19-9ca3-340d006432db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-by-azexo/" + google-query: inurl:"/wp-content/plugins/page-builder-by-azexo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-by-azexo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-by-azexo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-by-azexo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.27.133') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-by-azexo-f6a42cf9626a59a17d2bd6cce7c38364.yaml b/nuclei-templates/cve-less/plugins/page-builder-by-azexo-f6a42cf9626a59a17d2bd6cce7c38364.yaml new file mode 100644 index 0000000000..373de419e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-by-azexo-f6a42cf9626a59a17d2bd6cce7c38364.yaml @@ -0,0 +1,58 @@ +id: page-builder-by-azexo-f6a42cf9626a59a17d2bd6cce7c38364 + +info: + name: > + Page Builder by AZEXO <= 1.27.133 - Cross-Site Request Forgery to Stored Cross-Site Scripting via azh_save + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2efeffa2-b21a-4aa1-93b0-51c775758ab1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-by-azexo/" + google-query: inurl:"/wp-content/plugins/page-builder-by-azexo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-by-azexo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-by-azexo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-by-azexo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.27.133') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-by-azexo-ff89b70bfc48d132d2c1ae5c1ed04b8e.yaml b/nuclei-templates/cve-less/plugins/page-builder-by-azexo-ff89b70bfc48d132d2c1ae5c1ed04b8e.yaml new file mode 100644 index 0000000000..8658fc2a2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-by-azexo-ff89b70bfc48d132d2c1ae5c1ed04b8e.yaml @@ -0,0 +1,58 @@ +id: page-builder-by-azexo-ff89b70bfc48d132d2c1ae5c1ed04b8e + +info: + name: > + Page Builder by AZEXO <= 1.27.133 - Cross-Site Request Forgery to Post Creation/Modification/Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4e26035-ce4e-4b4b-aa3c-cd86b29b199a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-by-azexo/" + google-query: inurl:"/wp-content/plugins/page-builder-by-azexo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-by-azexo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-by-azexo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-by-azexo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.27.133') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-sandwich-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/page-builder-sandwich-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..05e93fbe5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-sandwich-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: page-builder-sandwich-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-sandwich/" + google-query: inurl:"/wp-content/plugins/page-builder-sandwich/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-sandwich,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-sandwich/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-sandwich" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-sandwich-dba2df430cd702194cd11fb9213b265a.yaml b/nuclei-templates/cve-less/plugins/page-builder-sandwich-dba2df430cd702194cd11fb9213b265a.yaml new file mode 100644 index 0000000000..8e60ce8c99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-sandwich-dba2df430cd702194cd11fb9213b265a.yaml @@ -0,0 +1,58 @@ +id: page-builder-sandwich-dba2df430cd702194cd11fb9213b265a + +info: + name: > + Page Builder Sandwich – Front End WordPress Page Builder Plugin <= 5.1.0 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e98d92a-fe64-4591-972b-ed11542506b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-sandwich/" + google-query: inurl:"/wp-content/plugins/page-builder-sandwich/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-sandwich,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-sandwich/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-sandwich" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-builder-sandwich-f83002599a8aabe9f476ac830785a4d7.yaml b/nuclei-templates/cve-less/plugins/page-builder-sandwich-f83002599a8aabe9f476ac830785a4d7.yaml new file mode 100644 index 0000000000..d1111e6b1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-builder-sandwich-f83002599a8aabe9f476ac830785a4d7.yaml @@ -0,0 +1,58 @@ +id: page-builder-sandwich-f83002599a8aabe9f476ac830785a4d7 + +info: + name: > + Page Builder Sandwich <= 5.1.0 - Missing Authorization to Authenticated(Subscriber+) Arbitrary Post Editing + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69d3d66c-5557-4fb4-8bd7-05d76d6b86ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-builder-sandwich/" + google-query: inurl:"/wp-content/plugins/page-builder-sandwich/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-builder-sandwich,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-builder-sandwich/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-builder-sandwich" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-flip-image-gallery-bcdafb8d52b9b91e60896c4aab2b09a5.yaml b/nuclei-templates/cve-less/plugins/page-flip-image-gallery-bcdafb8d52b9b91e60896c4aab2b09a5.yaml new file mode 100644 index 0000000000..194d4022a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-flip-image-gallery-bcdafb8d52b9b91e60896c4aab2b09a5.yaml @@ -0,0 +1,58 @@ +id: page-flip-image-gallery-bcdafb8d52b9b91e60896c4aab2b09a5 + +info: + name: > + Page Flip Image Gallery <= 0.2.2 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44e3158c-6163-4780-a1d5-ca101ba92074?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-flip-image-gallery/" + google-query: inurl:"/wp-content/plugins/page-flip-image-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-flip-image-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-flip-image-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-flip-image-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-generator-02e1028b272d28de63335e7341b29e10.yaml b/nuclei-templates/cve-less/plugins/page-generator-02e1028b272d28de63335e7341b29e10.yaml new file mode 100644 index 0000000000..371ec9e190 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-generator-02e1028b272d28de63335e7341b29e10.yaml @@ -0,0 +1,58 @@ +id: page-generator-02e1028b272d28de63335e7341b29e10 + +info: + name: > + Page Generator <= 1.7.1 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73ea7672-4e3f-4a26-a59e-043c2cd10a7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-generator/" + google-query: inurl:"/wp-content/plugins/page-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-generator-328db48b412bf150c51734d4e256b1dc.yaml b/nuclei-templates/cve-less/plugins/page-generator-328db48b412bf150c51734d4e256b1dc.yaml new file mode 100644 index 0000000000..c42ef5919d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-generator-328db48b412bf150c51734d4e256b1dc.yaml @@ -0,0 +1,58 @@ +id: page-generator-328db48b412bf150c51734d4e256b1dc + +info: + name: > + Page Generator <= 1.6.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4baf9b27-a06e-412f-8227-6b418e709ff1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-generator/" + google-query: inurl:"/wp-content/plugins/page-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-generator-56d5619e454c2de075a4d59b6b36a2ce.yaml b/nuclei-templates/cve-less/plugins/page-generator-56d5619e454c2de075a4d59b6b36a2ce.yaml new file mode 100644 index 0000000000..6f6f715061 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-generator-56d5619e454c2de075a4d59b6b36a2ce.yaml @@ -0,0 +1,58 @@ +id: page-generator-56d5619e454c2de075a4d59b6b36a2ce + +info: + name: > + Page Generator <= 1.6.5 - Cross-Site Request Forgery to Arbitrary Keywords Deletion/Duplication + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83f6bdda-e489-4e85-b510-7bfaa2329609?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-generator/" + google-query: inurl:"/wp-content/plugins/page-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-layout-builder-3b2a7a5fae5eb0af3506d02977a7f182.yaml b/nuclei-templates/cve-less/plugins/page-layout-builder-3b2a7a5fae5eb0af3506d02977a7f182.yaml new file mode 100644 index 0000000000..3501a77a06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-layout-builder-3b2a7a5fae5eb0af3506d02977a7f182.yaml @@ -0,0 +1,58 @@ +id: page-layout-builder-3b2a7a5fae5eb0af3506d02977a7f182 + +info: + name: > + Page Layout Builder <= 1.9.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f10a95c-59ff-49a2-8bbf-1b0a802b62c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-layout-builder/" + google-query: inurl:"/wp-content/plugins/page-layout-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-layout-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-layout-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-layout-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-link-manager-547afaf6e830675a579bd6f2437a1e07.yaml b/nuclei-templates/cve-less/plugins/page-link-manager-547afaf6e830675a579bd6f2437a1e07.yaml new file mode 100644 index 0000000000..ace788a6ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-link-manager-547afaf6e830675a579bd6f2437a1e07.yaml @@ -0,0 +1,58 @@ +id: page-link-manager-547afaf6e830675a579bd6f2437a1e07 + +info: + name: > + Page Link Manager <= 1.0b - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8cef103-8b8d-4e9b-9cd2-6e998dcb68dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-link-manager/" + google-query: inurl:"/wp-content/plugins/page-link-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-link-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-link-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-link-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0b') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-list-c7b94497207a62b415298f2f46cd674e.yaml b/nuclei-templates/cve-less/plugins/page-list-c7b94497207a62b415298f2f46cd674e.yaml new file mode 100644 index 0000000000..1c6a84e9d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-list-c7b94497207a62b415298f2f46cd674e.yaml @@ -0,0 +1,58 @@ +id: page-list-c7b94497207a62b415298f2f46cd674e + +info: + name: > + Page-list <= 5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/983a5b15-adf7-4f34-bf2a-30857ada2753?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-list/" + google-query: inurl:"/wp-content/plugins/page-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-loading-effects-06f0f6d997d3961c4576d91935933f05.yaml b/nuclei-templates/cve-less/plugins/page-loading-effects-06f0f6d997d3961c4576d91935933f05.yaml new file mode 100644 index 0000000000..d6e98df3b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-loading-effects-06f0f6d997d3961c4576d91935933f05.yaml @@ -0,0 +1,58 @@ +id: page-loading-effects-06f0f6d997d3961c4576d91935933f05 + +info: + name: > + Page Loading Effects <= 2.0.0 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9642be85-2817-4a3b-831b-0f1535106897?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-loading-effects/" + google-query: inurl:"/wp-content/plugins/page-loading-effects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-loading-effects,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-loading-effects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-loading-effects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-scroll-to-id-6d5213a5628e216eb9e2a763fb4762ea.yaml b/nuclei-templates/cve-less/plugins/page-scroll-to-id-6d5213a5628e216eb9e2a763fb4762ea.yaml new file mode 100644 index 0000000000..a81d61efa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-scroll-to-id-6d5213a5628e216eb9e2a763fb4762ea.yaml @@ -0,0 +1,58 @@ +id: page-scroll-to-id-6d5213a5628e216eb9e2a763fb4762ea + +info: + name: > + Page scroll to id <= 1.7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b487949-c52d-43ec-b660-2d4057bf3c08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-scroll-to-id/" + google-query: inurl:"/wp-content/plugins/page-scroll-to-id/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-scroll-to-id,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-scroll-to-id/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-scroll-to-id" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-scroll-to-id-ffddbf496e7aaec02b6e7ddf918beed0.yaml b/nuclei-templates/cve-less/plugins/page-scroll-to-id-ffddbf496e7aaec02b6e7ddf918beed0.yaml new file mode 100644 index 0000000000..c483adc125 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-scroll-to-id-ffddbf496e7aaec02b6e7ddf918beed0.yaml @@ -0,0 +1,58 @@ +id: page-scroll-to-id-ffddbf496e7aaec02b6e7ddf918beed0 + +info: + name: > + Page scroll to id <= 1.7.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0d5f034-fd8b-456a-b44a-7d82db3a16a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-scroll-to-id/" + google-query: inurl:"/wp-content/plugins/page-scroll-to-id/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-scroll-to-id,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-scroll-to-id/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-scroll-to-id" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-studio-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/page-studio-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..c6edeb8e35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-studio-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: page-studio-lite-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-studio-lite/" + google-query: inurl:"/wp-content/plugins/page-studio-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-studio-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-studio-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-studio-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-views-count-13ec2bdc85df7c3571b35167e7c009d7.yaml b/nuclei-templates/cve-less/plugins/page-views-count-13ec2bdc85df7c3571b35167e7c009d7.yaml new file mode 100644 index 0000000000..86605ed6eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-views-count-13ec2bdc85df7c3571b35167e7c009d7.yaml @@ -0,0 +1,58 @@ +id: page-views-count-13ec2bdc85df7c3571b35167e7c009d7 + +info: + name: > + Page View Count <= 2.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/895d882b-f4ca-4837-9d8e-aca04c3fb9e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-views-count/" + google-query: inurl:"/wp-content/plugins/page-views-count/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-views-count,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-views-count/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-views-count" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-views-count-67889b4ef1ae0d338be85daad64d3e7e.yaml b/nuclei-templates/cve-less/plugins/page-views-count-67889b4ef1ae0d338be85daad64d3e7e.yaml new file mode 100644 index 0000000000..4adead4236 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-views-count-67889b4ef1ae0d338be85daad64d3e7e.yaml @@ -0,0 +1,58 @@ +id: page-views-count-67889b4ef1ae0d338be85daad64d3e7e + +info: + name: > + Page View Count <= 2.5.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b881c73-2dfc-4b73-99f3-33432b750efd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-views-count/" + google-query: inurl:"/wp-content/plugins/page-views-count/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-views-count,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-views-count/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-views-count" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-views-count-b957833416680c3ce9532cace332c8be.yaml b/nuclei-templates/cve-less/plugins/page-views-count-b957833416680c3ce9532cace332c8be.yaml new file mode 100644 index 0000000000..c47a24bc7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-views-count-b957833416680c3ce9532cace332c8be.yaml @@ -0,0 +1,58 @@ +id: page-views-count-b957833416680c3ce9532cace332c8be + +info: + name: > + Page Views Count Plugin <= 2.4.14 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4941cce-c6c0-4e8a-859e-cf0f50f92ce6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-views-count/" + google-query: inurl:"/wp-content/plugins/page-views-count/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-views-count,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-views-count/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-views-count" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/page-views-count-d058005189aafe6324b373d8ff03e3df.yaml b/nuclei-templates/cve-less/plugins/page-views-count-d058005189aafe6324b373d8ff03e3df.yaml new file mode 100644 index 0000000000..c7d944339b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/page-views-count-d058005189aafe6324b373d8ff03e3df.yaml @@ -0,0 +1,58 @@ +id: page-views-count-d058005189aafe6324b373d8ff03e3df + +info: + name: > + Page View Counts <= 2.4.8 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f882da12-2db7-481f-9a16-a54e1ab24af5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/page-views-count/" + google-query: inurl:"/wp-content/plugins/page-views-count/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,page-views-count,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/page-views-count/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "page-views-count" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagebar-4b545f99e277a5b533a4828fddfdf3e6.yaml b/nuclei-templates/cve-less/plugins/pagebar-4b545f99e277a5b533a4828fddfdf3e6.yaml new file mode 100644 index 0000000000..07ae0267bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagebar-4b545f99e277a5b533a4828fddfdf3e6.yaml @@ -0,0 +1,58 @@ +id: pagebar-4b545f99e277a5b533a4828fddfdf3e6 + +info: + name: > + pagebar <= 2.65 - Cross-Site Request Forgery to Settings Update and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06e408f3-3d10-4454-ab71-64f7acd4c850?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagebar/" + google-query: inurl:"/wp-content/plugins/pagebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagebar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-03e434d9ea9a280060b3548276610903.yaml b/nuclei-templates/cve-less/plugins/pagelayer-03e434d9ea9a280060b3548276610903.yaml new file mode 100644 index 0000000000..a7bec9544c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-03e434d9ea9a280060b3548276610903.yaml @@ -0,0 +1,58 @@ +id: pagelayer-03e434d9ea9a280060b3548276610903 + +info: + name: > + Page Builder: Pagelayer – Drag and Drop website builder <= 1.1.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/666c02bd-d3e2-4e40-b189-b73e1136610b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-05c61ba0f98849485be0002b6c76289c.yaml b/nuclei-templates/cve-less/plugins/pagelayer-05c61ba0f98849485be0002b6c76289c.yaml new file mode 100644 index 0000000000..9325a87217 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-05c61ba0f98849485be0002b6c76289c.yaml @@ -0,0 +1,58 @@ +id: pagelayer-05c61ba0f98849485be0002b6c76289c + +info: + name: > + Page Builder: Pagelayer – Drag and Drop website builder <= 1.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e635dfb3-002d-4197-b14a-0136a1990a75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-2c10300e2e1d17099380134c8c4a5148.yaml b/nuclei-templates/cve-less/plugins/pagelayer-2c10300e2e1d17099380134c8c4a5148.yaml new file mode 100644 index 0000000000..3e884541d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-2c10300e2e1d17099380134c8c4a5148.yaml @@ -0,0 +1,58 @@ +id: pagelayer-2c10300e2e1d17099380134c8c4a5148 + +info: + name: > + Page Builder: Pagelayer – Drag and Drop website builder <= 1.1.1 - Missing Authorization to Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d33a77c6-9977-4d92-92c4-4273ee73452e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-3368388a3eaf6ed2424923ab628b316b.yaml b/nuclei-templates/cve-less/plugins/pagelayer-3368388a3eaf6ed2424923ab628b316b.yaml new file mode 100644 index 0000000000..8c82ead88b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-3368388a3eaf6ed2424923ab628b316b.yaml @@ -0,0 +1,58 @@ +id: pagelayer-3368388a3eaf6ed2424923ab628b316b + +info: + name: > + PageLayer <= 1.7.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e34b6ae5-1370-4058-95dd-5686978ca45b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-37e749759243317adc52896293ee760e.yaml b/nuclei-templates/cve-less/plugins/pagelayer-37e749759243317adc52896293ee760e.yaml new file mode 100644 index 0000000000..7e65bc4f28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-37e749759243317adc52896293ee760e.yaml @@ -0,0 +1,58 @@ +id: pagelayer-37e749759243317adc52896293ee760e + +info: + name: > + Page Builder: Pagelayer – Drag and Drop website builder <= 1.8.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98bff131-dee2-4549-9167-69dc3f8d6b9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-49d9da9d472a0f5eb0cb749075fe3a10.yaml b/nuclei-templates/cve-less/plugins/pagelayer-49d9da9d472a0f5eb0cb749075fe3a10.yaml new file mode 100644 index 0000000000..f8d61c3437 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-49d9da9d472a0f5eb0cb749075fe3a10.yaml @@ -0,0 +1,58 @@ +id: pagelayer-49d9da9d472a0f5eb0cb749075fe3a10 + +info: + name: > + PageLayer <= 1.7.7 - Cross-Site Request Forgery via pagelayer_load_plugin + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a0c8ecc-f0a1-41fa-a5f7-2d65d610efc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-53b0e5659c4aa4d52f12594842768c39.yaml b/nuclei-templates/cve-less/plugins/pagelayer-53b0e5659c4aa4d52f12594842768c39.yaml new file mode 100644 index 0000000000..351cf6954a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-53b0e5659c4aa4d52f12594842768c39.yaml @@ -0,0 +1,58 @@ +id: pagelayer-53b0e5659c4aa4d52f12594842768c39 + +info: + name: > + Page Builder: Pagelayer – Drag and Drop website builder <= 1.7.6 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d8d581c-8198-4431-a534-aac8f05750cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-6c1bbce4c7a429a52d508c4dfbc689a9.yaml b/nuclei-templates/cve-less/plugins/pagelayer-6c1bbce4c7a429a52d508c4dfbc689a9.yaml new file mode 100644 index 0000000000..27ff5f35e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-6c1bbce4c7a429a52d508c4dfbc689a9.yaml @@ -0,0 +1,58 @@ +id: pagelayer-6c1bbce4c7a429a52d508c4dfbc689a9 + +info: + name: > + Pagelayer <= 1.7.9 - Authenticated(Administrator+) Stored Cross-Site Scripting via Header/Footer code + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8bd08d0-5c78-40a8-abc1-de387908df9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-822954310f58c5920d9c99a5b8f20e8a.yaml b/nuclei-templates/cve-less/plugins/pagelayer-822954310f58c5920d9c99a5b8f20e8a.yaml new file mode 100644 index 0000000000..c9f64d3621 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-822954310f58c5920d9c99a5b8f20e8a.yaml @@ -0,0 +1,58 @@ +id: pagelayer-822954310f58c5920d9c99a5b8f20e8a + +info: + name: > + PageLayer <= 1.8.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ade80e4-a05a-4418-9c01-67c0366213b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-891807496f9388f784feeff012bb9ac8.yaml b/nuclei-templates/cve-less/plugins/pagelayer-891807496f9388f784feeff012bb9ac8.yaml new file mode 100644 index 0000000000..e100375053 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-891807496f9388f784feeff012bb9ac8.yaml @@ -0,0 +1,58 @@ +id: pagelayer-891807496f9388f784feeff012bb9ac8 + +info: + name: > + Page Builder: Pagelayer <= 1.7.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca7f1b56-a732-40c1-a05e-4ab3e6b05037?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-98aaf1a94b96eeb1d120f5b84c22c6ea.yaml b/nuclei-templates/cve-less/plugins/pagelayer-98aaf1a94b96eeb1d120f5b84c22c6ea.yaml new file mode 100644 index 0000000000..1194d28a96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-98aaf1a94b96eeb1d120f5b84c22c6ea.yaml @@ -0,0 +1,58 @@ +id: pagelayer-98aaf1a94b96eeb1d120f5b84c22c6ea + +info: + name: > + PageLayer <= 1.7.8 - Authenticated(Contributor+) Stored Cross-Site Scripting via meta fields + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d14c8890-482c-4d43-a68f-0d04c4feca8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-a19b0ea5f3c4659620b13f7e795adf29.yaml b/nuclei-templates/cve-less/plugins/pagelayer-a19b0ea5f3c4659620b13f7e795adf29.yaml new file mode 100644 index 0000000000..e60250cf75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-a19b0ea5f3c4659620b13f7e795adf29.yaml @@ -0,0 +1,58 @@ +id: pagelayer-a19b0ea5f3c4659620b13f7e795adf29 + +info: + name: > + Page Builder: Pagelayer – Drag and Drop website builder <= 1.8.4 - Authenticated(Contributor+) Stored Cross-Site Scripting via custom attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4884ba9-4448-43b0-93d3-110b719845ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-c9ad2218a91633282ea6a559fd4a007d.yaml b/nuclei-templates/cve-less/plugins/pagelayer-c9ad2218a91633282ea6a559fd4a007d.yaml new file mode 100644 index 0000000000..2f0fa282b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-c9ad2218a91633282ea6a559fd4a007d.yaml @@ -0,0 +1,58 @@ +id: pagelayer-c9ad2218a91633282ea6a559fd4a007d + +info: + name: > + Page Builder: Pagelayer – Drag and Drop website builder < 1.3.5 - Reflected Cross-Site Scripting via font-size + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/467e0946-cfbb-4ea3-b2d9-db21d0f182cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-e0bc64c58043fcf22274a1d73a269f55.yaml b/nuclei-templates/cve-less/plugins/pagelayer-e0bc64c58043fcf22274a1d73a269f55.yaml new file mode 100644 index 0000000000..89beeff1bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-e0bc64c58043fcf22274a1d73a269f55.yaml @@ -0,0 +1,58 @@ +id: pagelayer-e0bc64c58043fcf22274a1d73a269f55 + +info: + name: > + Page Builder: Pagelayer – Drag and Drop website builder < 1.3.5 - Reflected Cross-Site Scripting via Color Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99c13de3-e040-4c11-b9c0-bd6a337c4769?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagelayer-f28d0839e906933601f8e3530cfcec02.yaml b/nuclei-templates/cve-less/plugins/pagelayer-f28d0839e906933601f8e3530cfcec02.yaml new file mode 100644 index 0000000000..ca1e4c451c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagelayer-f28d0839e906933601f8e3530cfcec02.yaml @@ -0,0 +1,58 @@ +id: pagelayer-f28d0839e906933601f8e3530cfcec02 + +info: + name: > + Page Builder: Pagelayer <= 1.7.7 - Authenticated (Author+) Stored Cross-Site Scripting via Header/Footer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9bd3620-60a2-4741-b623-5147b6997575?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagelayer/" + google-query: inurl:"/wp-content/plugins/pagelayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagelayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagelayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagemash-d079a0462c534cbc9ce3a05b45c6a4d6.yaml b/nuclei-templates/cve-less/plugins/pagemash-d079a0462c534cbc9ce3a05b45c6a4d6.yaml new file mode 100644 index 0000000000..11f489d766 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagemash-d079a0462c534cbc9ce3a05b45c6a4d6.yaml @@ -0,0 +1,58 @@ +id: pagemash-d079a0462c534cbc9ce3a05b45c6a4d6 + +info: + name: > + pageMash > Page Management <= 1.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22a9c0f6-7a20-4ed1-9afa-887adc790c80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagemash/" + google-query: inurl:"/wp-content/plugins/pagemash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagemash,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagemash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagemash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagepost-content-shortcode-4f011bf5e0985256ce0dc243eb8712f9.yaml b/nuclei-templates/cve-less/plugins/pagepost-content-shortcode-4f011bf5e0985256ce0dc243eb8712f9.yaml new file mode 100644 index 0000000000..0167b56bf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagepost-content-shortcode-4f011bf5e0985256ce0dc243eb8712f9.yaml @@ -0,0 +1,58 @@ +id: pagepost-content-shortcode-4f011bf5e0985256ce0dc243eb8712f9 + +info: + name: > + Page/Post Content Shortcode <= 1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c619cb36-7216-4a23-96d2-57d8142be4af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagepost-content-shortcode/" + google-query: inurl:"/wp-content/plugins/pagepost-content-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagepost-content-shortcode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagepost-content-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagepost-content-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagerestrict-383952897352436c7747104565840796.yaml b/nuclei-templates/cve-less/plugins/pagerestrict-383952897352436c7747104565840796.yaml new file mode 100644 index 0000000000..1a6bb897f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagerestrict-383952897352436c7747104565840796.yaml @@ -0,0 +1,58 @@ +id: pagerestrict-383952897352436c7747104565840796 + +info: + name: > + Page Restrict <= 2.5.5 - Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f98fd6-eee8-4281-98ea-a267d0442c85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagerestrict/" + google-query: inurl:"/wp-content/plugins/pagerestrict/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagerestrict,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagerestrict/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagerestrict" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagerestrict-449418fde0e77076010b8e37969e0e31.yaml b/nuclei-templates/cve-less/plugins/pagerestrict-449418fde0e77076010b8e37969e0e31.yaml new file mode 100644 index 0000000000..182f433d68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagerestrict-449418fde0e77076010b8e37969e0e31.yaml @@ -0,0 +1,58 @@ +id: pagerestrict-449418fde0e77076010b8e37969e0e31 + +info: + name: > + Page Restrict <= 2.5.5 - Cross-Site Request Forgery via pr_admin_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/956984d4-4f8b-4e20-8002-4e9809b3872c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagerestrict/" + google-query: inurl:"/wp-content/plugins/pagerestrict/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagerestrict,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagerestrict/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagerestrict" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagerestrict-4d8ef6bd985f2d34f506708108c9100b.yaml b/nuclei-templates/cve-less/plugins/pagerestrict-4d8ef6bd985f2d34f506708108c9100b.yaml new file mode 100644 index 0000000000..adbd7b7742 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagerestrict-4d8ef6bd985f2d34f506708108c9100b.yaml @@ -0,0 +1,58 @@ +id: pagerestrict-4d8ef6bd985f2d34f506708108c9100b + +info: + name: > + Page Restrict <= 2.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/148cc174-c6cf-46d7-98d7-1a07e19055e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagerestrict/" + google-query: inurl:"/wp-content/plugins/pagerestrict/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagerestrict,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagerestrict/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagerestrict" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagination-4ed0ed5324b5c3f087d2833d0484d7f4.yaml b/nuclei-templates/cve-less/plugins/pagination-4ed0ed5324b5c3f087d2833d0484d7f4.yaml new file mode 100644 index 0000000000..c23f33a291 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagination-4ed0ed5324b5c3f087d2833d0484d7f4.yaml @@ -0,0 +1,58 @@ +id: pagination-4ed0ed5324b5c3f087d2833d0484d7f4 + +info: + name: > + Pagination by BestWebSoft < 1.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4572874-afd4-4e46-8a28-76a0a6cc8acb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagination/" + google-query: inurl:"/wp-content/plugins/pagination/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagination,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagination/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagination" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagination-b86bab5c8fb0747eadd8257097e9b226.yaml b/nuclei-templates/cve-less/plugins/pagination-b86bab5c8fb0747eadd8257097e9b226.yaml new file mode 100644 index 0000000000..5e49558791 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagination-b86bab5c8fb0747eadd8257097e9b226.yaml @@ -0,0 +1,58 @@ +id: pagination-b86bab5c8fb0747eadd8257097e9b226 + +info: + name: > + Pagination by BestWebSoft <= 1.0.6 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2012090d-fd96-4609-aef1-0e3ec5dd2e38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagination/" + google-query: inurl:"/wp-content/plugins/pagination/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagination,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagination/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagination" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagination-fd43c9edc7bf436e03f5d59fcc9642f0.yaml b/nuclei-templates/cve-less/plugins/pagination-fd43c9edc7bf436e03f5d59fcc9642f0.yaml new file mode 100644 index 0000000000..5cf2c5f061 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagination-fd43c9edc7bf436e03f5d59fcc9642f0.yaml @@ -0,0 +1,58 @@ +id: pagination-fd43c9edc7bf436e03f5d59fcc9642f0 + +info: + name: > + Pagination by BestWebSoft <= 1.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffbb85c5-e949-4c0f-8c02-2c022b802e05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagination/" + google-query: inurl:"/wp-content/plugins/pagination/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagination,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagination/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagination" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pagination-styler-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/pagination-styler-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..590611d8d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pagination-styler-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: pagination-styler-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pagination-styler-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/pagination-styler-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pagination-styler-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pagination-styler-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagination-styler-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-member-subscriptions-134f2819e254034a77fb510bfe9b93c9.yaml b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-134f2819e254034a77fb510bfe9b93c9.yaml new file mode 100644 index 0000000000..92fe110051 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-134f2819e254034a77fb510bfe9b93c9.yaml @@ -0,0 +1,58 @@ +id: paid-member-subscriptions-134f2819e254034a77fb510bfe9b93c9 + +info: + name: > + Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <= 2.11.1 - Missing Authorization via creating_pricing_table_page + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10f00859-3adf-40ff-8f33-827bbb1f62df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-member-subscriptions/" + google-query: inurl:"/wp-content/plugins/paid-member-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-member-subscriptions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-member-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-member-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-member-subscriptions-3ac481618eb4347f5fc9d0f89470f6b5.yaml b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-3ac481618eb4347f5fc9d0f89470f6b5.yaml new file mode 100644 index 0000000000..4ca3b314c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-3ac481618eb4347f5fc9d0f89470f6b5.yaml @@ -0,0 +1,58 @@ +id: paid-member-subscriptions-3ac481618eb4347f5fc9d0f89470f6b5 + +info: + name: > + Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <= 2.11.0 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce4ac97d-7eb3-4005-b75a-0fe32e31fa92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-member-subscriptions/" + google-query: inurl:"/wp-content/plugins/paid-member-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-member-subscriptions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-member-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-member-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-member-subscriptions-646e25531b1fa1af8fcb5aec525b7439.yaml b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-646e25531b1fa1af8fcb5aec525b7439.yaml new file mode 100644 index 0000000000..a83e999d94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-646e25531b1fa1af8fcb5aec525b7439.yaml @@ -0,0 +1,58 @@ +id: paid-member-subscriptions-646e25531b1fa1af8fcb5aec525b7439 + +info: + name: > + Paid Member Subscriptions <= 2.10.4 - Cross-Site Request Forgery via ajax_add_log_entry + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69ab17fc-8290-4230-8c44-25d12009c08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-member-subscriptions/" + google-query: inurl:"/wp-content/plugins/paid-member-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-member-subscriptions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-member-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-member-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-member-subscriptions-ca8deb8cc99a7e80212ae873b89f0b6b.yaml b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-ca8deb8cc99a7e80212ae873b89f0b6b.yaml new file mode 100644 index 0000000000..f5e38ff435 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-ca8deb8cc99a7e80212ae873b89f0b6b.yaml @@ -0,0 +1,58 @@ +id: paid-member-subscriptions-ca8deb8cc99a7e80212ae873b89f0b6b + +info: + name: > + Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <= 2.11.1 - Missing Authorization via pms_stripe_connect_handle_authorization_return + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd5f5861-5be4-456d-915d-bafb7bff2110?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-member-subscriptions/" + google-query: inurl:"/wp-content/plugins/paid-member-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-member-subscriptions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-member-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-member-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-member-subscriptions-cce20befda4e7caf1b066f754d7a6624.yaml b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-cce20befda4e7caf1b066f754d7a6624.yaml new file mode 100644 index 0000000000..3454ee5b80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-cce20befda4e7caf1b066f754d7a6624.yaml @@ -0,0 +1,58 @@ +id: paid-member-subscriptions-cce20befda4e7caf1b066f754d7a6624 + +info: + name: > + Membership & Content Restriction – Paid Member Subscriptions <= 2.4.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52203b9c-7629-4969-8d2d-eb1ef33d160c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-member-subscriptions/" + google-query: inurl:"/wp-content/plugins/paid-member-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-member-subscriptions,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-member-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-member-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-member-subscriptions-da4af52f1837930e94d6d4291aca5d50.yaml b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-da4af52f1837930e94d6d4291aca5d50.yaml new file mode 100644 index 0000000000..cb246154c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-member-subscriptions-da4af52f1837930e94d6d4291aca5d50.yaml @@ -0,0 +1,58 @@ +id: paid-member-subscriptions-da4af52f1837930e94d6d4291aca5d50 + +info: + name: > + Paid Member Subscriptions <= 2.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89614950-8517-4765-886a-1aa30a2f052e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-member-subscriptions/" + google-query: inurl:"/wp-content/plugins/paid-member-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-member-subscriptions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-member-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-member-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-membership-1e4c87f532b07cfd840241f44de6c8f0.yaml b/nuclei-templates/cve-less/plugins/paid-membership-1e4c87f532b07cfd840241f44de6c8f0.yaml new file mode 100644 index 0000000000..81718336b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-membership-1e4c87f532b07cfd840241f44de6c8f0.yaml @@ -0,0 +1,58 @@ +id: paid-membership-1e4c87f532b07cfd840241f44de6c8f0 + +info: + name: > + MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership <= 1.9.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/230b6a10-1505-4f66-ba98-df6257a80668?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-membership/" + google-query: inurl:"/wp-content/plugins/paid-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-286f920ff3d0f48835cc5b28e8181446.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-286f920ff3d0f48835cc5b28e8181446.yaml new file mode 100644 index 0000000000..ffd565c39c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-286f920ff3d0f48835cc5b28e8181446.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-286f920ff3d0f48835cc5b28e8181446 + +info: + name: > + Paid Memberships Pro <= 2.9.11 - Authenticated (Subscriber+) SQL Injection via Shortcodes + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/103a7e7b-74bb-4691-8670-c66ed2144596?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-2f5b75adc13263d5beea70db43442acd.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-2f5b75adc13263d5beea70db43442acd.yaml new file mode 100644 index 0000000000..b46a8c198d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-2f5b75adc13263d5beea70db43442acd.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-2f5b75adc13263d5beea70db43442acd + +info: + name: > + Paid Memberships Pro <= 3.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9ef7742-e6f8-4350-90e9-242d9d1b12a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-3acca9f1846ccef5068e7ad578275e07.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-3acca9f1846ccef5068e7ad578275e07.yaml new file mode 100644 index 0000000000..3db11f88e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-3acca9f1846ccef5068e7ad578275e07.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-3acca9f1846ccef5068e7ad578275e07 + +info: + name: > + Paid Memberships Pro <= 2.12.6 - Information Exposure in Debug Logs + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/852b1895-3bed-4c2f-912c-c136b38a09bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-410910e3bde9f58e737907bb1681caa1.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-410910e3bde9f58e737907bb1681caa1.yaml new file mode 100644 index 0000000000..25821365c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-410910e3bde9f58e737907bb1681caa1.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-410910e3bde9f58e737907bb1681caa1 + +info: + name: > + Paid Memberships Pro – Restrict Member Access to Content, Courses, Communities – Free or Paid Subscriptions <= 2.5.9.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2621cb32-3753-42e7-8690-88c680bdf808?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-41611316d1ac99758a92032134152355.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-41611316d1ac99758a92032134152355.yaml new file mode 100644 index 0000000000..2a36958a2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-41611316d1ac99758a92032134152355.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-41611316d1ac99758a92032134152355 + +info: + name: > + Paid Memberships Pro <= 2.6.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09679bd2-c416-4037-bfa4-d56ba862113c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-434f404b68ce3bb5e0a4d67432fad4b5.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-434f404b68ce3bb5e0a4d67432fad4b5.yaml new file mode 100644 index 0000000000..abaf8b8942 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-434f404b68ce3bb5e0a4d67432fad4b5.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-434f404b68ce3bb5e0a4d67432fad4b5 + +info: + name: > + Paid Memberships Pro <= 2.12.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fd87d34-2e7f-4c75-8816-b39820309077?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-63f8abf1368e7fe90270064d672ae623.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-63f8abf1368e7fe90270064d672ae623.yaml new file mode 100644 index 0000000000..feb9780e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-63f8abf1368e7fe90270064d672ae623.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-63f8abf1368e7fe90270064d672ae623 + +info: + name: > + Paid Memberships Pro < 1.8.4.3 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09467946-0ee7-45e7-969e-ec30863bfa3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-67f30623d09c4d720e6c11ecbff476fb.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-67f30623d09c4d720e6c11ecbff476fb.yaml new file mode 100644 index 0000000000..c4b23edf29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-67f30623d09c4d720e6c11ecbff476fb.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-67f30623d09c4d720e6c11ecbff476fb + +info: + name: > + Paid Memberships Pro < 1.7.15 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a7e2ad0-8427-450d-aa7e-abdbbc668247?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-68293564bc63bf678c3143661b510396.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-68293564bc63bf678c3143661b510396.yaml new file mode 100644 index 0000000000..5421c47138 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-68293564bc63bf678c3143661b510396.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-68293564bc63bf678c3143661b510396 + +info: + name: > + Paid Memberships Pro <= 2.12.3 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5979f2eb-2ca8-4b06-814c-c4236bb81af0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-83f1dd0f93cf1e789d768340fd3bb4e6.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-83f1dd0f93cf1e789d768340fd3bb4e6.yaml new file mode 100644 index 0000000000..fb79615bf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-83f1dd0f93cf1e789d768340fd3bb4e6.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-83f1dd0f93cf1e789d768340fd3bb4e6 + +info: + name: > + Paid Memberships Pro <= 2.6.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7848e904-b521-479b-bf7e-d695ad0163b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-840229894b2c6a1be64b8d70b53d76ea.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-840229894b2c6a1be64b8d70b53d76ea.yaml new file mode 100644 index 0000000000..4a4b6cdc00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-840229894b2c6a1be64b8d70b53d76ea.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-840229894b2c6a1be64b8d70b53d76ea + +info: + name: > + Paid Memberships Pro <= 2.12.7 - Cross-Site Request Forgery to Level Orders Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae68d083-b6e2-409b-8c91-d4eb7e62dba9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-84d2d3378640513504438262d898e022.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-84d2d3378640513504438262d898e022.yaml new file mode 100644 index 0000000000..7551a28f0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-84d2d3378640513504438262d898e022.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-84d2d3378640513504438262d898e022 + +info: + name: > + Paid Memberships Pro <= 2.5.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a68d036-9109-4bc0-9451-47fa2f9fa628?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-9d10b05b216e9b3725f77f2e756c3bb4.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-9d10b05b216e9b3725f77f2e756c3bb4.yaml new file mode 100644 index 0000000000..f5e5fe876f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-9d10b05b216e9b3725f77f2e756c3bb4.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-9d10b05b216e9b3725f77f2e756c3bb4 + +info: + name: > + Paid Memberships Pro <= 2.5.5 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13d31af8-c606-4c83-be15-4446c4f330aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-b52a7b696fd2137224ea5671e7e62354.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-b52a7b696fd2137224ea5671e7e62354.yaml new file mode 100644 index 0000000000..817db0d528 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-b52a7b696fd2137224ea5671e7e62354.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-b52a7b696fd2137224ea5671e7e62354 + +info: + name: > + Paid Memberships Pro <= 2.0.5 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78bb5e18-5535-4cee-a38b-e38802059ef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-bef07a85e28e83767b9819859bd47740.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-bef07a85e28e83767b9819859bd47740.yaml new file mode 100644 index 0000000000..4efa2d2187 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-bef07a85e28e83767b9819859bd47740.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-bef07a85e28e83767b9819859bd47740 + +info: + name: > + Paid Memberships Pro <= 2.4.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d74553a4-0ef7-4908-a2e8-5e0216f7b256?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-c3048e5abe91e890bbce0cc632e75565.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-c3048e5abe91e890bbce0cc632e75565.yaml new file mode 100644 index 0000000000..211e98cdcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-c3048e5abe91e890bbce0cc632e75565.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-c3048e5abe91e890bbce0cc632e75565 + +info: + name: > + Paid Memberships Pro <= 2.12.8 - Authenticated (Contributor+) User Meta Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6c5e3f8-ebbd-4cc3-b9b1-3f1704e3c07a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-cc7679b7eedbbcc9700c025bd91811bc.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-cc7679b7eedbbcc9700c025bd91811bc.yaml new file mode 100644 index 0000000000..ee359a7700 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-cc7679b7eedbbcc9700c025bd91811bc.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-cc7679b7eedbbcc9700c025bd91811bc + +info: + name: > + Paid Memberships Pro <= 2.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1b3edcf-c089-4bb8-b1e8-05e00abca1a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-d48045ed590f6f55f1f2fdf8cf338a64.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-d48045ed590f6f55f1f2fdf8cf338a64.yaml new file mode 100644 index 0000000000..68567c07bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-d48045ed590f6f55f1f2fdf8cf338a64.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-d48045ed590f6f55f1f2fdf8cf338a64 + +info: + name: > + Paid Memberships Pro – Restrict Member Access to Content, Courses, Communities – Free or Paid Subscriptions <= 2.5.2 - IDOR to Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0eb90948-b2b6-4e30-b903-95b7bce5d734?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-d6f22dc7688630789d302268152d865d.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-d6f22dc7688630789d302268152d865d.yaml new file mode 100644 index 0000000000..03480139c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-d6f22dc7688630789d302268152d865d.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-d6f22dc7688630789d302268152d865d + +info: + name: > + Paid Memberships Pro < 2.3.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1791d41-cdfe-4918-8351-2108302241c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-e07fd23d17f8dd83e161e7e2c0ee4d29.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-e07fd23d17f8dd83e161e7e2c0ee4d29.yaml new file mode 100644 index 0000000000..6104873f08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-e07fd23d17f8dd83e161e7e2c0ee4d29.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-e07fd23d17f8dd83e161e7e2c0ee4d29 + +info: + name: > + Paid Memberships Pro < 2.9.8 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c7d2321-735a-4b5f-a36d-16375c994d2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-e8a21df86ab8f777d41e6648745d6563.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-e8a21df86ab8f777d41e6648745d6563.yaml new file mode 100644 index 0000000000..54a1ca92f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-e8a21df86ab8f777d41e6648745d6563.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-e8a21df86ab8f777d41e6648745d6563 + +info: + name: > + Paid Memberships Pro <= 2.12.5 - Missing Authorization via API + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/383c7837-e7b7-4608-9cdc-91b7dbc7f4e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paid-memberships-pro-fce0c7de1ac72dbab0de3f1d5f219540.yaml b/nuclei-templates/cve-less/plugins/paid-memberships-pro-fce0c7de1ac72dbab0de3f1d5f219540.yaml new file mode 100644 index 0000000000..36074104ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paid-memberships-pro-fce0c7de1ac72dbab0de3f1d5f219540.yaml @@ -0,0 +1,58 @@ +id: paid-memberships-pro-fce0c7de1ac72dbab0de3f1d5f219540 + +info: + name: > + Paid Memberships Pro <= 2.12.8 - Authenticated (Contributor+) Information Disclosure via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd5d212e-c672-4fa8-afe7-baeac06e2e7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/panda-pods-repeater-field-828e69c4d1ded9a5f7606667cb83c187.yaml b/nuclei-templates/cve-less/plugins/panda-pods-repeater-field-828e69c4d1ded9a5f7606667cb83c187.yaml new file mode 100644 index 0000000000..0f3ef0b53f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/panda-pods-repeater-field-828e69c4d1ded9a5f7606667cb83c187.yaml @@ -0,0 +1,58 @@ +id: panda-pods-repeater-field-828e69c4d1ded9a5f7606667cb83c187 + +info: + name: > + Panda Pods Repeater Field <= 1.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06b6c668-5f5d-4cf6-a3c6-4af755c72bca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/panda-pods-repeater-field/" + google-query: inurl:"/wp-content/plugins/panda-pods-repeater-field/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,panda-pods-repeater-field,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/panda-pods-repeater-field/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "panda-pods-repeater-field" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/panorama-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/panorama-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..afe755445c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/panorama-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: panorama-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/panorama/" + google-query: inurl:"/wp-content/plugins/panorama/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,panorama,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/panorama/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "panorama" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/parallax-image-b5b52d178ac9e73e1f7151b15d18b267.yaml b/nuclei-templates/cve-less/plugins/parallax-image-b5b52d178ac9e73e1f7151b15d18b267.yaml new file mode 100644 index 0000000000..302bc90d90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/parallax-image-b5b52d178ac9e73e1f7151b15d18b267.yaml @@ -0,0 +1,58 @@ +id: parallax-image-b5b52d178ac9e73e1f7151b15d18b267 + +info: + name: > + Parallax Image <= 1.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55cd02d1-7b06-427b-840b-3ced73ad4a74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/parallax-image/" + google-query: inurl:"/wp-content/plugins/parallax-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,parallax-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/parallax-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallax-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/parallax-slider-block-39f54e5675da547fbcee34c5030b35da.yaml b/nuclei-templates/cve-less/plugins/parallax-slider-block-39f54e5675da547fbcee34c5030b35da.yaml new file mode 100644 index 0000000000..ab2360322e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/parallax-slider-block-39f54e5675da547fbcee34c5030b35da.yaml @@ -0,0 +1,58 @@ +id: parallax-slider-block-39f54e5675da547fbcee34c5030b35da + +info: + name: > + Parallax Slider Block <= 1.2.5 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae3974e6-cba1-4976-a6af-9e60557cfde8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/parallax-slider-block/" + google-query: inurl:"/wp-content/plugins/parallax-slider-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,parallax-slider-block,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/parallax-slider-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallax-slider-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/parcel-tracker-ecourier-ce718587b1801a7c7537a48edc0e7766.yaml b/nuclei-templates/cve-less/plugins/parcel-tracker-ecourier-ce718587b1801a7c7537a48edc0e7766.yaml new file mode 100644 index 0000000000..8b041a1aa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/parcel-tracker-ecourier-ce718587b1801a7c7537a48edc0e7766.yaml @@ -0,0 +1,58 @@ +id: parcel-tracker-ecourier-ce718587b1801a7c7537a48edc0e7766 + +info: + name: > + Parcel Tracker eCourier <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e27634f8-493b-4edb-a0c7-1bc8890b70f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/parcel-tracker-ecourier/" + google-query: inurl:"/wp-content/plugins/parcel-tracker-ecourier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,parcel-tracker-ecourier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/parcel-tracker-ecourier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parcel-tracker-ecourier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/parcelpanel-00bc7306212a1f1532879484863c8f21.yaml b/nuclei-templates/cve-less/plugins/parcelpanel-00bc7306212a1f1532879484863c8f21.yaml new file mode 100644 index 0000000000..ab8fde0d06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/parcelpanel-00bc7306212a1f1532879484863c8f21.yaml @@ -0,0 +1,58 @@ +id: parcelpanel-00bc7306212a1f1532879484863c8f21 + +info: + name: > + Shipment Tracking, Tracking, and Order Tracking for WooCommerce – ParcelPanel (Free to install) <= 3.8.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/964d6dd2-0e93-4fc2-87ca-0257186d1b37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/parcelpanel/" + google-query: inurl:"/wp-content/plugins/parcelpanel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,parcelpanel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/parcelpanel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parcelpanel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pardakht-delkhah-ad560a2e6c4b99cf57f1cbf4f8e13e03.yaml b/nuclei-templates/cve-less/plugins/pardakht-delkhah-ad560a2e6c4b99cf57f1cbf4f8e13e03.yaml new file mode 100644 index 0000000000..58f9f88f25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pardakht-delkhah-ad560a2e6c4b99cf57f1cbf4f8e13e03.yaml @@ -0,0 +1,58 @@ +id: pardakht-delkhah-ad560a2e6c4b99cf57f1cbf4f8e13e03 + +info: + name: > + Pardakht Delkhah <= 2.9.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73a1174d-fb5a-4cc0-ada0-dbf1e011619a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pardakht-delkhah/" + google-query: inurl:"/wp-content/plugins/pardakht-delkhah/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pardakht-delkhah,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pardakht-delkhah/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pardakht-delkhah" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pardot-700d1cfad4bd0fa3b320c8b805e07813.yaml b/nuclei-templates/cve-less/plugins/pardot-700d1cfad4bd0fa3b320c8b805e07813.yaml new file mode 100644 index 0000000000..3e5ba14867 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pardot-700d1cfad4bd0fa3b320c8b805e07813.yaml @@ -0,0 +1,58 @@ +id: pardot-700d1cfad4bd0fa3b320c8b805e07813 + +info: + name: > + Pardot <= 2.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e989dbb9-41eb-4c56-8d6b-7c0518500f2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pardot/" + google-query: inurl:"/wp-content/plugins/pardot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pardot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pardot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pardot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/parsi-font-254f28aa80fff0eb08d98b4ce3b3dff8.yaml b/nuclei-templates/cve-less/plugins/parsi-font-254f28aa80fff0eb08d98b4ce3b3dff8.yaml new file mode 100644 index 0000000000..a70aefa76b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/parsi-font-254f28aa80fff0eb08d98b4ce3b3dff8.yaml @@ -0,0 +1,58 @@ +id: parsi-font-254f28aa80fff0eb08d98b4ce3b3dff8 + +info: + name: > + MW Font Changer <= 4.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfc09dee-9af6-49ff-bfe2-abcc616940d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/parsi-font/" + google-query: inurl:"/wp-content/plugins/parsi-font/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,parsi-font,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/parsi-font/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parsi-font" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/parsian-bank-gateway-for-woocommerce-27a74900b090130d2ab9c1d98745b64a.yaml b/nuclei-templates/cve-less/plugins/parsian-bank-gateway-for-woocommerce-27a74900b090130d2ab9c1d98745b64a.yaml new file mode 100644 index 0000000000..e4d796fc9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/parsian-bank-gateway-for-woocommerce-27a74900b090130d2ab9c1d98745b64a.yaml @@ -0,0 +1,58 @@ +id: parsian-bank-gateway-for-woocommerce-27a74900b090130d2ab9c1d98745b64a + +info: + name: > + Parsian Bank Gateway for Woocommerce <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26624f19-c943-417a-abb2-c05646b192cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/parsian-bank-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/parsian-bank-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,parsian-bank-gateway-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/parsian-bank-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parsian-bank-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/partdo-core-0e249eccad21574e2f41d6b727c12756.yaml b/nuclei-templates/cve-less/plugins/partdo-core-0e249eccad21574e2f41d6b727c12756.yaml new file mode 100644 index 0000000000..c07298b1d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/partdo-core-0e249eccad21574e2f41d6b727c12756.yaml @@ -0,0 +1,58 @@ +id: partdo-core-0e249eccad21574e2f41d6b727c12756 + +info: + name: > + Multiple Plugins by KlbTheme <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fb06315-30ad-4d98-af75-b04933583be7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/partdo-core/" + google-query: inurl:"/wp-content/plugins/partdo-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,partdo-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/partdo-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "partdo-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/participants-database-07270c625770ea55406700bd4faf8963.yaml b/nuclei-templates/cve-less/plugins/participants-database-07270c625770ea55406700bd4faf8963.yaml new file mode 100644 index 0000000000..69619fcee2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/participants-database-07270c625770ea55406700bd4faf8963.yaml @@ -0,0 +1,58 @@ +id: participants-database-07270c625770ea55406700bd4faf8963 + +info: + name: > + Participants Database <= 1.9.5.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ede9023-732d-43e4-9c19-7cf704c95c29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/participants-database/" + google-query: inurl:"/wp-content/plugins/participants-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,participants-database,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/participants-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "participants-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/participants-database-11fe5ff4939095c8eaedbac059700247.yaml b/nuclei-templates/cve-less/plugins/participants-database-11fe5ff4939095c8eaedbac059700247.yaml new file mode 100644 index 0000000000..80eed6b189 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/participants-database-11fe5ff4939095c8eaedbac059700247.yaml @@ -0,0 +1,58 @@ +id: participants-database-11fe5ff4939095c8eaedbac059700247 + +info: + name: > + Participants Database <= 2.4.9 - Cross-Site Request Forgery via _process_general + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7ce9573-eda5-45c0-8775-966f2fbe9496?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/participants-database/" + google-query: inurl:"/wp-content/plugins/participants-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,participants-database,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/participants-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "participants-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/participants-database-74dfc45ecae7de304e8f9080bdfdb51d.yaml b/nuclei-templates/cve-less/plugins/participants-database-74dfc45ecae7de304e8f9080bdfdb51d.yaml new file mode 100644 index 0000000000..b1578ec7b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/participants-database-74dfc45ecae7de304e8f9080bdfdb51d.yaml @@ -0,0 +1,58 @@ +id: participants-database-74dfc45ecae7de304e8f9080bdfdb51d + +info: + name: > + Participants Database <= 2.4.9 - Authenticated(Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a52015fe-c4df-46a6-8f23-b33730797f4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/participants-database/" + google-query: inurl:"/wp-content/plugins/participants-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,participants-database,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/participants-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "participants-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/participants-database-bdf9e125f5be6c62d1e6ea586186b7ea.yaml b/nuclei-templates/cve-less/plugins/participants-database-bdf9e125f5be6c62d1e6ea586186b7ea.yaml new file mode 100644 index 0000000000..774a5a5d9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/participants-database-bdf9e125f5be6c62d1e6ea586186b7ea.yaml @@ -0,0 +1,58 @@ +id: participants-database-bdf9e125f5be6c62d1e6ea586186b7ea + +info: + name: > + Participants Database < 1.5.4.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/144df910-67d2-4e3b-9ccf-04ebd5d1bf8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/participants-database/" + google-query: inurl:"/wp-content/plugins/participants-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,participants-database,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/participants-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "participants-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/participants-database-c5af09461da9c502c3934cc475901e6e.yaml b/nuclei-templates/cve-less/plugins/participants-database-c5af09461da9c502c3934cc475901e6e.yaml new file mode 100644 index 0000000000..4a5fca4853 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/participants-database-c5af09461da9c502c3934cc475901e6e.yaml @@ -0,0 +1,58 @@ +id: participants-database-c5af09461da9c502c3934cc475901e6e + +info: + name: > + Participants Database <= 2.5.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cd2b2ba-c4ec-4799-91b4-b38c462baee4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/participants-database/" + google-query: inurl:"/wp-content/plugins/participants-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,participants-database,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/participants-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "participants-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/participants-database-d7f00e0abe15580f7ace910ffb1d1a20.yaml b/nuclei-templates/cve-less/plugins/participants-database-d7f00e0abe15580f7ace910ffb1d1a20.yaml new file mode 100644 index 0000000000..efce4198c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/participants-database-d7f00e0abe15580f7ace910ffb1d1a20.yaml @@ -0,0 +1,58 @@ +id: participants-database-d7f00e0abe15580f7ace910ffb1d1a20 + +info: + name: > + Participants Database <= 2.4.5 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44d61e62-436f-4731-b447-a2adbbb96e55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/participants-database/" + google-query: inurl:"/wp-content/plugins/participants-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,participants-database,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/participants-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "participants-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/participants-database-e0584db35cbb9869be95ba6010b7c0f4.yaml b/nuclei-templates/cve-less/plugins/participants-database-e0584db35cbb9869be95ba6010b7c0f4.yaml new file mode 100644 index 0000000000..6c9f6d4166 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/participants-database-e0584db35cbb9869be95ba6010b7c0f4.yaml @@ -0,0 +1,58 @@ +id: participants-database-e0584db35cbb9869be95ba6010b7c0f4 + +info: + name: > + Participants Database <= 1.7.5.9 - Unauthorized Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66717800-31ab-4e68-979a-4967dd2caeb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/participants-database/" + google-query: inurl:"/wp-content/plugins/participants-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,participants-database,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/participants-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "participants-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/participants-database-e3cd907e6807fcf00ac40f54ec586f57.yaml b/nuclei-templates/cve-less/plugins/participants-database-e3cd907e6807fcf00ac40f54ec586f57.yaml new file mode 100644 index 0000000000..fbe662679f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/participants-database-e3cd907e6807fcf00ac40f54ec586f57.yaml @@ -0,0 +1,58 @@ +id: participants-database-e3cd907e6807fcf00ac40f54ec586f57 + +info: + name: > + Participants Database <= 2.4.5 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e764e567-524e-40b9-aa9f-653a5553375d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/participants-database/" + google-query: inurl:"/wp-content/plugins/participants-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,participants-database,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/participants-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "participants-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/password-protect-page-729488a672d6efd868aa434c8487ecdf.yaml b/nuclei-templates/cve-less/plugins/password-protect-page-729488a672d6efd868aa434c8487ecdf.yaml new file mode 100644 index 0000000000..ebd0851c08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/password-protect-page-729488a672d6efd868aa434c8487ecdf.yaml @@ -0,0 +1,58 @@ +id: password-protect-page-729488a672d6efd868aa434c8487ecdf + +info: + name: > + PPWP – Password Protect Pages <= 1.8.9 - Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41299927-2ed9-4cbe-b2b0-f306dc0e4a58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/password-protect-page/" + google-query: inurl:"/wp-content/plugins/password-protect-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,password-protect-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/password-protect-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "password-protect-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/password-protect-page-d66ad8d87de6007b46efcadeba262d7e.yaml b/nuclei-templates/cve-less/plugins/password-protect-page-d66ad8d87de6007b46efcadeba262d7e.yaml new file mode 100644 index 0000000000..34f565fda0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/password-protect-page-d66ad8d87de6007b46efcadeba262d7e.yaml @@ -0,0 +1,58 @@ +id: password-protect-page-d66ad8d87de6007b46efcadeba262d7e + +info: + name: > + PPWP – WordPress Password Protect Page <= 1.8.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0f899c6-cce2-4534-9b97-3783648cba09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/password-protect-page/" + google-query: inurl:"/wp-content/plugins/password-protect-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,password-protect-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/password-protect-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "password-protect-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/password-protected-f70dd0265071b25825ed4ac0daac6966.yaml b/nuclei-templates/cve-less/plugins/password-protected-f70dd0265071b25825ed4ac0daac6966.yaml new file mode 100644 index 0000000000..3ee3e7f083 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/password-protected-f70dd0265071b25825ed4ac0daac6966.yaml @@ -0,0 +1,58 @@ +id: password-protected-f70dd0265071b25825ed4ac0daac6966 + +info: + name: > + Password Protected <= 2.6.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79c296b1-e385-404d-96c0-a98f10b89f08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/password-protected/" + google-query: inurl:"/wp-content/plugins/password-protected/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,password-protected,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/password-protected/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "password-protected" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/password-protected-fb622d8a3e8e58dd4ad557e902dc2f9e.yaml b/nuclei-templates/cve-less/plugins/password-protected-fb622d8a3e8e58dd4ad557e902dc2f9e.yaml new file mode 100644 index 0000000000..6d738747c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/password-protected-fb622d8a3e8e58dd4ad557e902dc2f9e.yaml @@ -0,0 +1,58 @@ +id: password-protected-fb622d8a3e8e58dd4ad557e902dc2f9e + +info: + name: > + Password Protected <= 2.6.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aba36c3b-beae-4c47-8aa8-5012a7a838ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/password-protected/" + google-query: inurl:"/wp-content/plugins/password-protected/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,password-protected,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/password-protected/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "password-protected" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/password-protected-woo-store-050f0116b8ceb2b0a56ee85d7392fdbc.yaml b/nuclei-templates/cve-less/plugins/password-protected-woo-store-050f0116b8ceb2b0a56ee85d7392fdbc.yaml new file mode 100644 index 0000000000..42cf37e53b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/password-protected-woo-store-050f0116b8ceb2b0a56ee85d7392fdbc.yaml @@ -0,0 +1,58 @@ +id: password-protected-woo-store-050f0116b8ceb2b0a56ee85d7392fdbc + +info: + name: > + Password Protected Store for WooCommerce <= 2.2 - Information Exposure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae1e8fd-4d1b-4590-a141-f93d6347c0f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/password-protected-woo-store/" + google-query: inurl:"/wp-content/plugins/password-protected-woo-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,password-protected-woo-store,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/password-protected-woo-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "password-protected-woo-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/passwordless-login-8f38e1cb39832821632517021044a8d0.yaml b/nuclei-templates/cve-less/plugins/passwordless-login-8f38e1cb39832821632517021044a8d0.yaml new file mode 100644 index 0000000000..5c9620c50e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/passwordless-login-8f38e1cb39832821632517021044a8d0.yaml @@ -0,0 +1,58 @@ +id: passwordless-login-8f38e1cb39832821632517021044a8d0 + +info: + name: > + Passwordless Login <= 1.1.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aab54795-31e7-4ef4-8a80-7443abaa3f21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/passwordless-login/" + google-query: inurl:"/wp-content/plugins/passwordless-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,passwordless-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/passwordless-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "passwordless-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/passwords-manager-d0bbc9ae1fbf2d240bae5f6283bcefb6.yaml b/nuclei-templates/cve-less/plugins/passwords-manager-d0bbc9ae1fbf2d240bae5f6283bcefb6.yaml new file mode 100644 index 0000000000..f22c31500d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/passwords-manager-d0bbc9ae1fbf2d240bae5f6283bcefb6.yaml @@ -0,0 +1,58 @@ +id: passwords-manager-d0bbc9ae1fbf2d240bae5f6283bcefb6 + +info: + name: > + Passwords Manager <= 1.4.4 - Cross-Site Scripting via pwdms_csv_category parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c4ceb2e-c718-43e2-bb7b-ab0404271134?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/passwords-manager/" + google-query: inurl:"/wp-content/plugins/passwords-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,passwords-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/passwords-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "passwords-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/past-events-extension-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/past-events-extension-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2f0bef8acc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/past-events-extension-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: past-events-extension-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/past-events-extension/" + google-query: inurl:"/wp-content/plugins/past-events-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,past-events-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/past-events-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "past-events-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/past-events-extension-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/past-events-extension-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..da71bee2bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/past-events-extension-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: past-events-extension-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/past-events-extension/" + google-query: inurl:"/wp-content/plugins/past-events-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,past-events-extension,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/past-events-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "past-events-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patreon-connect-1d56115c5756336039596f3db2afcf11.yaml b/nuclei-templates/cve-less/plugins/patreon-connect-1d56115c5756336039596f3db2afcf11.yaml new file mode 100644 index 0000000000..3829190e86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patreon-connect-1d56115c5756336039596f3db2afcf11.yaml @@ -0,0 +1,58 @@ +id: patreon-connect-1d56115c5756336039596f3db2afcf11 + +info: + name: > + Patreon WordPress <= 1.6.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbcd569d-f524-4012-add0-ba0afc19e47e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patreon-connect/" + google-query: inurl:"/wp-content/plugins/patreon-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patreon-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patreon-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patreon-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patreon-connect-1e16eec4b6ae009a904a8e7f17b7b28d.yaml b/nuclei-templates/cve-less/plugins/patreon-connect-1e16eec4b6ae009a904a8e7f17b7b28d.yaml new file mode 100644 index 0000000000..73e5988285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patreon-connect-1e16eec4b6ae009a904a8e7f17b7b28d.yaml @@ -0,0 +1,58 @@ +id: patreon-connect-1e16eec4b6ae009a904a8e7f17b7b28d + +info: + name: > + Patreon WordPress <= 1.7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc9dfe96-2d43-4b7b-a91a-87cdaaab8e49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patreon-connect/" + google-query: inurl:"/wp-content/plugins/patreon-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patreon-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patreon-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patreon-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patreon-connect-3ea0fac767d2ae2ce8f2f4784f535988.yaml b/nuclei-templates/cve-less/plugins/patreon-connect-3ea0fac767d2ae2ce8f2f4784f535988.yaml new file mode 100644 index 0000000000..9756f9e5c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patreon-connect-3ea0fac767d2ae2ce8f2f4784f535988.yaml @@ -0,0 +1,58 @@ +id: patreon-connect-3ea0fac767d2ae2ce8f2f4784f535988 + +info: + name: > + Patreon WordPress <= 1.6.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a7de576-5809-432f-a6fd-364a3a49967f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patreon-connect/" + google-query: inurl:"/wp-content/plugins/patreon-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patreon-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patreon-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patreon-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patreon-connect-60d5b771eb752135710361fe9f24a381.yaml b/nuclei-templates/cve-less/plugins/patreon-connect-60d5b771eb752135710361fe9f24a381.yaml new file mode 100644 index 0000000000..422e383c58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patreon-connect-60d5b771eb752135710361fe9f24a381.yaml @@ -0,0 +1,58 @@ +id: patreon-connect-60d5b771eb752135710361fe9f24a381 + +info: + name: > + Patreon WordPress < 1.7.0 - Local File Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/081bd3a9-2139-416f-bb36-b86aef6fa6db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patreon-connect/" + google-query: inurl:"/wp-content/plugins/patreon-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patreon-connect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patreon-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patreon-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patreon-connect-82c6c9cf005abdc27838609e8ad9cf02.yaml b/nuclei-templates/cve-less/plugins/patreon-connect-82c6c9cf005abdc27838609e8ad9cf02.yaml new file mode 100644 index 0000000000..96e6ab1679 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patreon-connect-82c6c9cf005abdc27838609e8ad9cf02.yaml @@ -0,0 +1,58 @@ +id: patreon-connect-82c6c9cf005abdc27838609e8ad9cf02 + +info: + name: > + Patreon WordPress <= 1.8.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/481121b2-4ea9-489e-b582-ec8bbf87c902?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patreon-connect/" + google-query: inurl:"/wp-content/plugins/patreon-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patreon-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patreon-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patreon-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patreon-connect-a8cb964066fe8aea6342dd9fef9872c0.yaml b/nuclei-templates/cve-less/plugins/patreon-connect-a8cb964066fe8aea6342dd9fef9872c0.yaml new file mode 100644 index 0000000000..a54d6d7860 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patreon-connect-a8cb964066fe8aea6342dd9fef9872c0.yaml @@ -0,0 +1,58 @@ +id: patreon-connect-a8cb964066fe8aea6342dd9fef9872c0 + +info: + name: > + Patreon WordPress < 1.2.2 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebb80964-761b-410c-998f-4408439e0d48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patreon-connect/" + google-query: inurl:"/wp-content/plugins/patreon-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patreon-connect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patreon-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patreon-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patreon-connect-c914118ffbfe0c8c975fe93b917507cf.yaml b/nuclei-templates/cve-less/plugins/patreon-connect-c914118ffbfe0c8c975fe93b917507cf.yaml new file mode 100644 index 0000000000..40cf6147fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patreon-connect-c914118ffbfe0c8c975fe93b917507cf.yaml @@ -0,0 +1,58 @@ +id: patreon-connect-c914118ffbfe0c8c975fe93b917507cf + +info: + name: > + Patreon WordPress <= 1.8.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eff9fcce-01b2-4698-a2c2-ee5991bfd963?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patreon-connect/" + google-query: inurl:"/wp-content/plugins/patreon-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patreon-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patreon-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patreon-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patreon-connect-d2e2b4003ef24e75b8d453ad2f0582ba.yaml b/nuclei-templates/cve-less/plugins/patreon-connect-d2e2b4003ef24e75b8d453ad2f0582ba.yaml new file mode 100644 index 0000000000..4b1589acae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patreon-connect-d2e2b4003ef24e75b8d453ad2f0582ba.yaml @@ -0,0 +1,58 @@ +id: patreon-connect-d2e2b4003ef24e75b8d453ad2f0582ba + +info: + name: > + Patreon WordPress <= 1.7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63b67652-d10e-4a5a-97d5-04e6c848b752?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patreon-connect/" + google-query: inurl:"/wp-content/plugins/patreon-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patreon-connect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patreon-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patreon-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-089c469cd7ce66b1a9f5809db855888a.yaml b/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-089c469cd7ce66b1a9f5809db855888a.yaml new file mode 100644 index 0000000000..c4e53e19cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-089c469cd7ce66b1a9f5809db855888a.yaml @@ -0,0 +1,58 @@ +id: patron-button-and-widgets-by-codebard-089c469cd7ce66b1a9f5809db855888a + +info: + name: > + CodeBard's Patron Button and Widgets for Patreon <= 2.1.8 - Reflected Cross-Site Scripting via 'site_account' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46f5d1fa-dba7-4882-be29-39dc281d7278?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patron-button-and-widgets-by-codebard/" + google-query: inurl:"/wp-content/plugins/patron-button-and-widgets-by-codebard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patron-button-and-widgets-by-codebard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patron-button-and-widgets-by-codebard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patron-button-and-widgets-by-codebard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-5085814d704ddfd403da1227f11c5263.yaml b/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-5085814d704ddfd403da1227f11c5263.yaml new file mode 100644 index 0000000000..b956e96da8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-5085814d704ddfd403da1227f11c5263.yaml @@ -0,0 +1,58 @@ +id: patron-button-and-widgets-by-codebard-5085814d704ddfd403da1227f11c5263 + +info: + name: > + CodeBard's Patron Button and Widgets for Patreon <= 2.1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4ea53bd-2ce7-4dce-8c57-51ba81838f1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patron-button-and-widgets-by-codebard/" + google-query: inurl:"/wp-content/plugins/patron-button-and-widgets-by-codebard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patron-button-and-widgets-by-codebard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patron-button-and-widgets-by-codebard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patron-button-and-widgets-by-codebard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-5b594cb927f46fa8416160fd694e56a3.yaml b/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-5b594cb927f46fa8416160fd694e56a3.yaml new file mode 100644 index 0000000000..bddf5ea0f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-5b594cb927f46fa8416160fd694e56a3.yaml @@ -0,0 +1,58 @@ +id: patron-button-and-widgets-by-codebard-5b594cb927f46fa8416160fd694e56a3 + +info: + name: > + CodeBard's Patron Button and Widgets for Patreon <= 2.1.9 - Reflected Cross-Site Scripting via cb_p6_tab + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96649aa6-f3ba-4e9e-9fa5-a5fbd52c3836?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patron-button-and-widgets-by-codebard/" + google-query: inurl:"/wp-content/plugins/patron-button-and-widgets-by-codebard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patron-button-and-widgets-by-codebard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patron-button-and-widgets-by-codebard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patron-button-and-widgets-by-codebard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-bed2af87ac90c87dc04c6b517c073d4d.yaml b/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-bed2af87ac90c87dc04c6b517c073d4d.yaml new file mode 100644 index 0000000000..c1196d9c9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/patron-button-and-widgets-by-codebard-bed2af87ac90c87dc04c6b517c073d4d.yaml @@ -0,0 +1,58 @@ +id: patron-button-and-widgets-by-codebard-bed2af87ac90c87dc04c6b517c073d4d + +info: + name: > + CodeBard's Patron Button and Widgets for Patreon <= 2.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afff886c-92e6-41fc-9a88-befc158ad403?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/patron-button-and-widgets-by-codebard/" + google-query: inurl:"/wp-content/plugins/patron-button-and-widgets-by-codebard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,patron-button-and-widgets-by-codebard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/patron-button-and-widgets-by-codebard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "patron-button-and-widgets-by-codebard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pay-per-media-player-d6f933dccde3d9cca555af3f7b970f39.yaml b/nuclei-templates/cve-less/plugins/pay-per-media-player-d6f933dccde3d9cca555af3f7b970f39.yaml new file mode 100644 index 0000000000..cc4f2e8aa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pay-per-media-player-d6f933dccde3d9cca555af3f7b970f39.yaml @@ -0,0 +1,58 @@ +id: pay-per-media-player-d6f933dccde3d9cca555af3f7b970f39 + +info: + name: > + Pay Per Media Player <= 1.24 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adee74ec-7a3c-4519-bea8-23c92e89d484?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pay-per-media-player/" + google-query: inurl:"/wp-content/plugins/pay-per-media-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pay-per-media-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pay-per-media-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pay-per-media-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pay-with-tweet-46bf8ffa7005c6ec6cf07777085484d4.yaml b/nuclei-templates/cve-less/plugins/pay-with-tweet-46bf8ffa7005c6ec6cf07777085484d4.yaml new file mode 100644 index 0000000000..b79ea196e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pay-with-tweet-46bf8ffa7005c6ec6cf07777085484d4.yaml @@ -0,0 +1,58 @@ +id: pay-with-tweet-46bf8ffa7005c6ec6cf07777085484d4 + +info: + name: > + Pay With Tweet <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f80238dc-3caa-420b-92ee-27e690e9ead0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pay-with-tweet/" + google-query: inurl:"/wp-content/plugins/pay-with-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pay-with-tweet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pay-with-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pay-with-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pay-with-tweet-5b86c54747aa1057e36177e85fea660b.yaml b/nuclei-templates/cve-less/plugins/pay-with-tweet-5b86c54747aa1057e36177e85fea660b.yaml new file mode 100644 index 0000000000..6167fffd01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pay-with-tweet-5b86c54747aa1057e36177e85fea660b.yaml @@ -0,0 +1,58 @@ +id: pay-with-tweet-5b86c54747aa1057e36177e85fea660b + +info: + name: > + Pay With Tweet <= 1.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a64e3b3-338d-4cf8-91f3-0ff4732549b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pay-with-tweet/" + google-query: inurl:"/wp-content/plugins/pay-with-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pay-with-tweet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pay-with-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pay-with-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paygreen-woocommerce-96955fd433f50860fcfbf43e30334f40.yaml b/nuclei-templates/cve-less/plugins/paygreen-woocommerce-96955fd433f50860fcfbf43e30334f40.yaml new file mode 100644 index 0000000000..58a2496b2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paygreen-woocommerce-96955fd433f50860fcfbf43e30334f40.yaml @@ -0,0 +1,58 @@ +id: paygreen-woocommerce-96955fd433f50860fcfbf43e30334f40 + +info: + name: > + PayGreen – Ancienne version <= 4.10.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a8b22b4-151c-4f42-a0a0-966dc5eb7a9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paygreen-woocommerce/" + google-query: inurl:"/wp-content/plugins/paygreen-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paygreen-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paygreen-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paygreen-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payhere-payment-gateway-ef84d19c40335efcda975110283f73b1.yaml b/nuclei-templates/cve-less/plugins/payhere-payment-gateway-ef84d19c40335efcda975110283f73b1.yaml new file mode 100644 index 0000000000..ffdfe3be0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payhere-payment-gateway-ef84d19c40335efcda975110283f73b1.yaml @@ -0,0 +1,58 @@ +id: payhere-payment-gateway-ef84d19c40335efcda975110283f73b1 + +info: + name: > + PayHere Payment Gateway <= 2.2.11 - Information Disclosure via Log Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/089ffe9a-e222-4630-b889-2b1e527dac6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payhere-payment-gateway/" + google-query: inurl:"/wp-content/plugins/payhere-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payhere-payment-gateway,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payhere-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payhere-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-form-for-paypal-pro-54a171a233ab972e99a42d6b3c349ad4.yaml b/nuclei-templates/cve-less/plugins/payment-form-for-paypal-pro-54a171a233ab972e99a42d6b3c349ad4.yaml new file mode 100644 index 0000000000..fe32206350 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-form-for-paypal-pro-54a171a233ab972e99a42d6b3c349ad4.yaml @@ -0,0 +1,58 @@ +id: payment-form-for-paypal-pro-54a171a233ab972e99a42d6b3c349ad4 + +info: + name: > + Payment Form for PayPal Pro < 1.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d3668b3-2bf9-48fa-af14-d0917c8b99f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-form-for-paypal-pro/" + google-query: inurl:"/wp-content/plugins/payment-form-for-paypal-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-form-for-paypal-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-form-for-paypal-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-form-for-paypal-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-form-for-paypal-pro-8f6f989dd4d5721becc523b6ef4c4688.yaml b/nuclei-templates/cve-less/plugins/payment-form-for-paypal-pro-8f6f989dd4d5721becc523b6ef4c4688.yaml new file mode 100644 index 0000000000..3aff8c7e8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-form-for-paypal-pro-8f6f989dd4d5721becc523b6ef4c4688.yaml @@ -0,0 +1,58 @@ +id: payment-form-for-paypal-pro-8f6f989dd4d5721becc523b6ef4c4688 + +info: + name: > + Payment Form for PayPal Pro < 1.1.65 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/701d99b7-759f-4543-824d-dad84c35f5f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-form-for-paypal-pro/" + google-query: inurl:"/wp-content/plugins/payment-form-for-paypal-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-form-for-paypal-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-form-for-paypal-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-form-for-paypal-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-forms-for-paystack-b7d244a1858960d6b7b8f5a6b3a02579.yaml b/nuclei-templates/cve-less/plugins/payment-forms-for-paystack-b7d244a1858960d6b7b8f5a6b3a02579.yaml new file mode 100644 index 0000000000..af94c5b44c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-forms-for-paystack-b7d244a1858960d6b7b8f5a6b3a02579.yaml @@ -0,0 +1,58 @@ +id: payment-forms-for-paystack-b7d244a1858960d6b7b8f5a6b3a02579 + +info: + name: > + Payment Forms for Paystack <= 3.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98f80608-f24f-4019-a757-de71cba9902f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-forms-for-paystack/" + google-query: inurl:"/wp-content/plugins/payment-forms-for-paystack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-forms-for-paystack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-forms-for-paystack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-forms-for-paystack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-gateway-payfabric-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/payment-gateway-payfabric-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6a2a8639a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-gateway-payfabric-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: payment-gateway-payfabric-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-gateway-payfabric/" + google-query: inurl:"/wp-content/plugins/payment-gateway-payfabric/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-gateway-payfabric,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-gateway-payfabric/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-gateway-payfabric" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-1c5c778d8970e8a4e068e0dd69740d62.yaml b/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-1c5c778d8970e8a4e068e0dd69740d62.yaml new file mode 100644 index 0000000000..456e3ab80f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-1c5c778d8970e8a4e068e0dd69740d62.yaml @@ -0,0 +1,58 @@ +id: payment-gateway-stripe-and-woocommerce-integration-1c5c778d8970e8a4e068e0dd69740d62 + +info: + name: > + Stripe Payment Plugin for WooCommerce <= 3.7.9 - Missing Authorization to Arbitrary Order Status Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef543c61-2acc-4b72-81ff-883960d4c7c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/" + google-query: inurl:"/wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-gateway-stripe-and-woocommerce-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-gateway-stripe-and-woocommerce-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-4dec41a2eb36a7fd15e4e02a413a6b7c.yaml b/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-4dec41a2eb36a7fd15e4e02a413a6b7c.yaml new file mode 100644 index 0000000000..7ab7fe8705 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-4dec41a2eb36a7fd15e4e02a413a6b7c.yaml @@ -0,0 +1,58 @@ +id: payment-gateway-stripe-and-woocommerce-integration-4dec41a2eb36a7fd15e4e02a413a6b7c + +info: + name: > + Stripe Payment Plugin for WooCommerce <= 3.5.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb545a42-6c66-412b-a686-e486b0a58dc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/" + google-query: inurl:"/wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-gateway-stripe-and-woocommerce-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-gateway-stripe-and-woocommerce-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-4f4afbbe05a47feb7aa9e67c94aa395d.yaml b/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-4f4afbbe05a47feb7aa9e67c94aa395d.yaml new file mode 100644 index 0000000000..63ecc2ecb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-4f4afbbe05a47feb7aa9e67c94aa395d.yaml @@ -0,0 +1,58 @@ +id: payment-gateway-stripe-and-woocommerce-integration-4f4afbbe05a47feb7aa9e67c94aa395d + +info: + name: > + Stripe Payment Plugin for WooCommerce <= 3.7.7 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d052f3e-8554-43f0-a5ae-1de09c198d7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/" + google-query: inurl:"/wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-gateway-stripe-and-woocommerce-integration,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-gateway-stripe-and-woocommerce-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-c992a7bd3a36bbd140f48c6c88718954.yaml b/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-c992a7bd3a36bbd140f48c6c88718954.yaml new file mode 100644 index 0000000000..eda6d0ad15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-gateway-stripe-and-woocommerce-integration-c992a7bd3a36bbd140f48c6c88718954.yaml @@ -0,0 +1,58 @@ +id: payment-gateway-stripe-and-woocommerce-integration-c992a7bd3a36bbd140f48c6c88718954 + +info: + name: > + Stripe Payment Plugin for WooCommerce <= 3.7.9 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2652a7fc-b610-40f1-8b76-2129f59390ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/" + google-query: inurl:"/wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-gateway-stripe-and-woocommerce-integration,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-gateway-stripe-and-woocommerce-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-gateway-stripe-and-woocommerce-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payment-gateways-caller-for-wp-e-commerce-5b76c3973cf0eb7f78223ae732ca5963.yaml b/nuclei-templates/cve-less/plugins/payment-gateways-caller-for-wp-e-commerce-5b76c3973cf0eb7f78223ae732ca5963.yaml new file mode 100644 index 0000000000..f84ba37291 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payment-gateways-caller-for-wp-e-commerce-5b76c3973cf0eb7f78223ae732ca5963.yaml @@ -0,0 +1,58 @@ +id: payment-gateways-caller-for-wp-e-commerce-5b76c3973cf0eb7f78223ae732ca5963 + +info: + name: > + Payment Gateways Caller for WP e-Commerce < 0.1.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9766a657-1cf2-448a-bd66-a27c0ebd8261?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payment-gateways-caller-for-wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/payment-gateways-caller-for-wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payment-gateways-caller-for-wp-e-commerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payment-gateways-caller-for-wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payment-gateways-caller-for-wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paypal-brasil-para-woocommerce-ce702b3c11cc0fd58f850b3795d41794.yaml b/nuclei-templates/cve-less/plugins/paypal-brasil-para-woocommerce-ce702b3c11cc0fd58f850b3795d41794.yaml new file mode 100644 index 0000000000..a73f62f698 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paypal-brasil-para-woocommerce-ce702b3c11cc0fd58f850b3795d41794.yaml @@ -0,0 +1,58 @@ +id: paypal-brasil-para-woocommerce-ce702b3c11cc0fd58f850b3795d41794 + +info: + name: > + PayPal Brasil para WooCommerce <= 1.4.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4a44a8a-740b-45dd-962c-945238f6ddee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paypal-brasil-para-woocommerce/" + google-query: inurl:"/wp-content/plugins/paypal-brasil-para-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paypal-brasil-para-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paypal-brasil-para-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paypal-brasil-para-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paypal-currency-converter-basic-for-woocommerce-1deeac15598443407c5819458cb87e41.yaml b/nuclei-templates/cve-less/plugins/paypal-currency-converter-basic-for-woocommerce-1deeac15598443407c5819458cb87e41.yaml new file mode 100644 index 0000000000..9f8ea4fa37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paypal-currency-converter-basic-for-woocommerce-1deeac15598443407c5819458cb87e41.yaml @@ -0,0 +1,58 @@ +id: paypal-currency-converter-basic-for-woocommerce-1deeac15598443407c5819458cb87e41 + +info: + name: > + PayPal Currency Converter BASIC for WooCommerce <= 1.3 - Path Traversal to Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf6563a4-56ca-46b1-a854-aad7cc550f73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paypal-currency-converter-basic-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/paypal-currency-converter-basic-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paypal-currency-converter-basic-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paypal-currency-converter-basic-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paypal-currency-converter-basic-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paypal-donations-6fc6438dcbfd4ff68526e6d482fa74a2.yaml b/nuclei-templates/cve-less/plugins/paypal-donations-6fc6438dcbfd4ff68526e6d482fa74a2.yaml new file mode 100644 index 0000000000..059ad029d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paypal-donations-6fc6438dcbfd4ff68526e6d482fa74a2.yaml @@ -0,0 +1,58 @@ +id: paypal-donations-6fc6438dcbfd4ff68526e6d482fa74a2 + +info: + name: > + Donations via PayPal <= 1.9.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ec90144-bfd8-4840-8b0f-73340386b7d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paypal-donations/" + google-query: inurl:"/wp-content/plugins/paypal-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paypal-donations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paypal-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paypal-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paypal-payment-button-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3.yaml b/nuclei-templates/cve-less/plugins/paypal-payment-button-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3.yaml new file mode 100644 index 0000000000..2da766ffeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paypal-payment-button-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3.yaml @@ -0,0 +1,58 @@ +id: paypal-payment-button-by-vcita-75fa36bac06fa043ebc71b72e7bf53b3 + +info: + name: > + Event Registration Calendar By vcita <= 1.3.1 & Online Payments – Get Paid with PayPal, Square & Stripe <= 3.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ab05954-9999-43ff-8e3c-a987e2da1956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paypal-payment-button-by-vcita/" + google-query: inurl:"/wp-content/plugins/paypal-payment-button-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paypal-payment-button-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paypal-payment-button-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paypal-payment-button-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paypal-payment-button-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml b/nuclei-templates/cve-less/plugins/paypal-payment-button-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml new file mode 100644 index 0000000000..ae2ba5621f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paypal-payment-button-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml @@ -0,0 +1,58 @@ +id: paypal-payment-button-by-vcita-90aaaaca062b8a7ccd7c1e4f2b79b8c4 + +info: + name: > + Event Registration Calendar By vcita <= 1.3.1 & Online Payments – Get Paid with PayPal, Square & Stripe <= 3.9.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/207b40fa-2062-48d6-990b-f05cbbf8fb8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paypal-payment-button-by-vcita/" + google-query: inurl:"/wp-content/plugins/paypal-payment-button-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paypal-payment-button-by-vcita,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paypal-payment-button-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paypal-payment-button-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-2de2a309a48a2066b54fa1a1b79cdf95.yaml b/nuclei-templates/cve-less/plugins/paytium-2de2a309a48a2066b54fa1a1b79cdf95.yaml new file mode 100644 index 0000000000..fed5896f2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-2de2a309a48a2066b54fa1a1b79cdf95.yaml @@ -0,0 +1,58 @@ +id: paytium-2de2a309a48a2066b54fa1a1b79cdf95 + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'update_profile_preference' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e9bee86-f491-4f68-b10b-051e0fb1a67b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-4f11f74ab70050e21f6862beb40d9a96.yaml b/nuclei-templates/cve-less/plugins/paytium-4f11f74ab70050e21f6862beb40d9a96.yaml new file mode 100644 index 0000000000..af4d167289 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-4f11f74ab70050e21f6862beb40d9a96.yaml @@ -0,0 +1,58 @@ +id: paytium-4f11f74ab70050e21f6862beb40d9a96 + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'paytium_sw_save_api_keys' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a92beff1-3bc6-459e-aeca-5cbdf2152388?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-62269eb67796cbb2339d6188b5db837c.yaml b/nuclei-templates/cve-less/plugins/paytium-62269eb67796cbb2339d6188b5db837c.yaml new file mode 100644 index 0000000000..e673f65c65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-62269eb67796cbb2339d6188b5db837c.yaml @@ -0,0 +1,58 @@ +id: paytium-62269eb67796cbb2339d6188b5db837c + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'pt_cancel_subscription' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/060f31ab-cfa4-4ca8-846a-de76848b28fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-66a3b119265dd04d8b9e2ee514cfb4be.yaml b/nuclei-templates/cve-less/plugins/paytium-66a3b119265dd04d8b9e2ee514cfb4be.yaml new file mode 100644 index 0000000000..e5f04d9dc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-66a3b119265dd04d8b9e2ee514cfb4be.yaml @@ -0,0 +1,58 @@ +id: paytium-66a3b119265dd04d8b9e2ee514cfb4be + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'create_mollie_account' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4491b89-2120-4edb-a396-e45ba09b3b99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-6717ed512d0f6dcb712096abdaea80dd.yaml b/nuclei-templates/cve-less/plugins/paytium-6717ed512d0f6dcb712096abdaea80dd.yaml new file mode 100644 index 0000000000..f8a974243d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-6717ed512d0f6dcb712096abdaea80dd.yaml @@ -0,0 +1,58 @@ +id: paytium-6717ed512d0f6dcb712096abdaea80dd + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'check_mollie_account_details' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f065648a-436a-459c-8ab1-c948c78b43c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-92d0e7bc94b44754e236b3eab5ba21b3.yaml b/nuclei-templates/cve-less/plugins/paytium-92d0e7bc94b44754e236b3eab5ba21b3.yaml new file mode 100644 index 0000000000..605e8f103d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-92d0e7bc94b44754e236b3eab5ba21b3.yaml @@ -0,0 +1,58 @@ +id: paytium-92d0e7bc94b44754e236b3eab5ba21b3 + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'check_for_verified_profiles' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af55c470-b94d-49ee-8b72-44652dcccd73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-986bf289302c49f136af4498727aaf05.yaml b/nuclei-templates/cve-less/plugins/paytium-986bf289302c49f136af4498727aaf05.yaml new file mode 100644 index 0000000000..c7b8cdc556 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-986bf289302c49f136af4498727aaf05.yaml @@ -0,0 +1,58 @@ +id: paytium-986bf289302c49f136af4498727aaf05 + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'create_mollie_profile' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbbd3209-7ed6-4409-a24e-9f6225cf10f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-9b90abd6d830325819c48ecc09f52c5d.yaml b/nuclei-templates/cve-less/plugins/paytium-9b90abd6d830325819c48ecc09f52c5d.yaml new file mode 100644 index 0000000000..cf202f977c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-9b90abd6d830325819c48ecc09f52c5d.yaml @@ -0,0 +1,58 @@ +id: paytium-9b90abd6d830325819c48ecc09f52c5d + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e49406-a007-4c38-8e69-bf4b5438260e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-b4cb9ba45757222ec6c9dc1b2fa44488.yaml b/nuclei-templates/cve-less/plugins/paytium-b4cb9ba45757222ec6c9dc1b2fa44488.yaml new file mode 100644 index 0000000000..4d408f60de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-b4cb9ba45757222ec6c9dc1b2fa44488.yaml @@ -0,0 +1,58 @@ +id: paytium-b4cb9ba45757222ec6c9dc1b2fa44488 + +info: + name: > + Paytium <= 4.3.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d389098-d428-48f2-b012-207b55497b0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-d89f421b57194b2722cbd6095ba6fda5.yaml b/nuclei-templates/cve-less/plugins/paytium-d89f421b57194b2722cbd6095ba6fda5.yaml new file mode 100644 index 0000000000..3b6b2d8180 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-d89f421b57194b2722cbd6095ba6fda5.yaml @@ -0,0 +1,58 @@ +id: paytium-d89f421b57194b2722cbd6095ba6fda5 + +info: + name: > + Paytium <= 3.1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/498c0080-ae5e-492b-b75f-6ce3227f3ca0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytium-e5b14dd6b8ce0a1e923582746cd9e67d.yaml b/nuclei-templates/cve-less/plugins/paytium-e5b14dd6b8ce0a1e923582746cd9e67d.yaml new file mode 100644 index 0000000000..47435e29ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytium-e5b14dd6b8ce0a1e923582746cd9e67d.yaml @@ -0,0 +1,58 @@ +id: paytium-e5b14dd6b8ce0a1e923582746cd9e67d + +info: + name: > + Paytium: Mollie payment forms & donations <= 4.3.7 - Missing Authorization in 'paytium_notice_dismiss' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb6642c0-9011-419b-bef6-5aa594993c01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytium/" + google-query: inurl:"/wp-content/plugins/paytium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytm-donation-7e792191472cdad1fee49805adc5397c.yaml b/nuclei-templates/cve-less/plugins/paytm-donation-7e792191472cdad1fee49805adc5397c.yaml new file mode 100644 index 0000000000..ef66558bac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytm-donation-7e792191472cdad1fee49805adc5397c.yaml @@ -0,0 +1,58 @@ +id: paytm-donation-7e792191472cdad1fee49805adc5397c + +info: + name: > + Paytm Payment Donation <= 2.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/534e6f80-b162-4a4b-a979-72ed63a8b0dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytm-donation/" + google-query: inurl:"/wp-content/plugins/paytm-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytm-donation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytm-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytm-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytm-payments-319371b7283fd7e2cb3c7db7ca64946f.yaml b/nuclei-templates/cve-less/plugins/paytm-payments-319371b7283fd7e2cb3c7db7ca64946f.yaml new file mode 100644 index 0000000000..acd66a6812 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytm-payments-319371b7283fd7e2cb3c7db7ca64946f.yaml @@ -0,0 +1,58 @@ +id: paytm-payments-319371b7283fd7e2cb3c7db7ca64946f + +info: + name: > + Paytm Payment Gateway <= 2.7.3 - Authenticated (Editor+) SQL Injection via 'post' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fa560b2-6283-42ab-a482-1e02d08181f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytm-payments/" + google-query: inurl:"/wp-content/plugins/paytm-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytm-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytm-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytm-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytm-payments-96f4752ff872cb8e19e30c74804a9934.yaml b/nuclei-templates/cve-less/plugins/paytm-payments-96f4752ff872cb8e19e30c74804a9934.yaml new file mode 100644 index 0000000000..8e3965fb09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytm-payments-96f4752ff872cb8e19e30c74804a9934.yaml @@ -0,0 +1,58 @@ +id: paytm-payments-96f4752ff872cb8e19e30c74804a9934 + +info: + name: > + Paytm Payment Gateway <= 2.7.0 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/352cd9e6-ef1e-4a6b-bedb-6cf8ce9d4270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytm-payments/" + google-query: inurl:"/wp-content/plugins/paytm-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytm-payments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytm-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytm-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytr-taksit-tablosu-woocommerce-de1e70d7cd8b8051bc4083872be41746.yaml b/nuclei-templates/cve-less/plugins/paytr-taksit-tablosu-woocommerce-de1e70d7cd8b8051bc4083872be41746.yaml new file mode 100644 index 0000000000..ee5ce42e8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytr-taksit-tablosu-woocommerce-de1e70d7cd8b8051bc4083872be41746.yaml @@ -0,0 +1,58 @@ +id: paytr-taksit-tablosu-woocommerce-de1e70d7cd8b8051bc4083872be41746 + +info: + name: > + PayTR Taksit Tablosu <= 1.3.1 - Improper Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5898944f-565c-4950-83e8-ad0de0f948d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytr-taksit-tablosu-woocommerce/" + google-query: inurl:"/wp-content/plugins/paytr-taksit-tablosu-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytr-taksit-tablosu-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytr-taksit-tablosu-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytr-taksit-tablosu-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/paytr-taksit-tablosu-woocommerce-fd0b6587604276cef3b941ba57f9f4bd.yaml b/nuclei-templates/cve-less/plugins/paytr-taksit-tablosu-woocommerce-fd0b6587604276cef3b941ba57f9f4bd.yaml new file mode 100644 index 0000000000..8893e10fed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/paytr-taksit-tablosu-woocommerce-fd0b6587604276cef3b941ba57f9f4bd.yaml @@ -0,0 +1,58 @@ +id: paytr-taksit-tablosu-woocommerce-fd0b6587604276cef3b941ba57f9f4bd + +info: + name: > + PayTR Taksit Tablosu <= 1.3.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bfefe86-b25e-4ffe-9beb-28dc22a99d62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paytr-taksit-tablosu-woocommerce/" + google-query: inurl:"/wp-content/plugins/paytr-taksit-tablosu-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paytr-taksit-tablosu-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paytr-taksit-tablosu-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paytr-taksit-tablosu-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/payu-india-796f8cb61c89c1bb396cd35b29d7d180.yaml b/nuclei-templates/cve-less/plugins/payu-india-796f8cb61c89c1bb396cd35b29d7d180.yaml new file mode 100644 index 0000000000..1163965b82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/payu-india-796f8cb61c89c1bb396cd35b29d7d180.yaml @@ -0,0 +1,58 @@ +id: payu-india-796f8cb61c89c1bb396cd35b29d7d180 + +info: + name: > + PayU India <= 3.8.2 - Reflected Cross-Site Scripting via type + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a5dc4f-3eb6-410e-af3d-e3b0639319f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payu-india/" + google-query: inurl:"/wp-content/plugins/payu-india/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payu-india,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payu-india/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payu-india" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pb-embedflash-5d636ce844c1e0268400f1bdd0bfac42.yaml b/nuclei-templates/cve-less/plugins/pb-embedflash-5d636ce844c1e0268400f1bdd0bfac42.yaml new file mode 100644 index 0000000000..edf499d80f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pb-embedflash-5d636ce844c1e0268400f1bdd0bfac42.yaml @@ -0,0 +1,58 @@ +id: pb-embedflash-5d636ce844c1e0268400f1bdd0bfac42 + +info: + name: > + pb-embedFlash <= 1.5.1 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/672edfd2-ca4b-4937-8237-3c0a4acc8690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pb-embedflash/" + google-query: inurl:"/wp-content/plugins/pb-embedflash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pb-embedflash,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pb-embedflash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pb-embedflash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pb-mailcrypt-antispam-email-encryption-063d32b817099e0883314c45f9a14882.yaml b/nuclei-templates/cve-less/plugins/pb-mailcrypt-antispam-email-encryption-063d32b817099e0883314c45f9a14882.yaml new file mode 100644 index 0000000000..abb9e6e952 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pb-mailcrypt-antispam-email-encryption-063d32b817099e0883314c45f9a14882.yaml @@ -0,0 +1,58 @@ +id: pb-mailcrypt-antispam-email-encryption-063d32b817099e0883314c45f9a14882 + +info: + name: > + PB MailCrypt <= 3.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54b662a9-8003-48f6-ace9-fb0d74a05b3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pb-mailcrypt-antispam-email-encryption/" + google-query: inurl:"/wp-content/plugins/pb-mailcrypt-antispam-email-encryption/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pb-mailcrypt-antispam-email-encryption,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pb-mailcrypt-antispam-email-encryption/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pb-mailcrypt-antispam-email-encryption" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pb-oembed-html5-audio-with-cache-support-d431a2f9901a2f7f0f42332dd7577612.yaml b/nuclei-templates/cve-less/plugins/pb-oembed-html5-audio-with-cache-support-d431a2f9901a2f7f0f42332dd7577612.yaml new file mode 100644 index 0000000000..3eee0e7c64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pb-oembed-html5-audio-with-cache-support-d431a2f9901a2f7f0f42332dd7577612.yaml @@ -0,0 +1,58 @@ +id: pb-oembed-html5-audio-with-cache-support-d431a2f9901a2f7f0f42332dd7577612 + +info: + name: > + PB oEmbed HTML5 Audio <= 2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/067bfeaf-f3dd-4188-b53a-72b2d81a87eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pb-oembed-html5-audio-with-cache-support/" + google-query: inurl:"/wp-content/plugins/pb-oembed-html5-audio-with-cache-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pb-oembed-html5-audio-with-cache-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pb-oembed-html5-audio-with-cache-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pb-oembed-html5-audio-with-cache-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pb-seo-friendly-images-9d9c7f9cf0e3be8bd05b705703e8905b.yaml b/nuclei-templates/cve-less/plugins/pb-seo-friendly-images-9d9c7f9cf0e3be8bd05b705703e8905b.yaml new file mode 100644 index 0000000000..e6f16c3fc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pb-seo-friendly-images-9d9c7f9cf0e3be8bd05b705703e8905b.yaml @@ -0,0 +1,58 @@ +id: pb-seo-friendly-images-9d9c7f9cf0e3be8bd05b705703e8905b + +info: + name: > + PB SEO Friendly Images <= 4.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89fc8407-3d1f-4b1b-9b4c-13c0da928231?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pb-seo-friendly-images/" + google-query: inurl:"/wp-content/plugins/pb-seo-friendly-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pb-seo-friendly-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pb-seo-friendly-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pb-seo-friendly-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-block-d7c844e32ca0ede6715df38694de53b3.yaml b/nuclei-templates/cve-less/plugins/pdf-block-d7c844e32ca0ede6715df38694de53b3.yaml new file mode 100644 index 0000000000..64ccfc2646 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-block-d7c844e32ca0ede6715df38694de53b3.yaml @@ -0,0 +1,58 @@ +id: pdf-block-d7c844e32ca0ede6715df38694de53b3 + +info: + name: > + PDF Block <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a1d8adf-c49c-4d88-83c7-4515b0ab1f35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-block/" + google-query: inurl:"/wp-content/plugins/pdf-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-block,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-builder-for-wpforms-439e5eee55387eb3328692c215048cd9.yaml b/nuclei-templates/cve-less/plugins/pdf-builder-for-wpforms-439e5eee55387eb3328692c215048cd9.yaml new file mode 100644 index 0000000000..5d02f60b6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-builder-for-wpforms-439e5eee55387eb3328692c215048cd9.yaml @@ -0,0 +1,58 @@ +id: pdf-builder-for-wpforms-439e5eee55387eb3328692c215048cd9 + +info: + name: > + PDF Builder for WPForms <= 1.2.88 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d9bba8c-0e75-4170-a006-16fa4bd0d0ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-builder-for-wpforms/" + google-query: inurl:"/wp-content/plugins/pdf-builder-for-wpforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-builder-for-wpforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-builder-for-wpforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-builder-for-wpforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.88') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-embedder-6736ec787d23e7bd8e0a13fc8e0e88d8.yaml b/nuclei-templates/cve-less/plugins/pdf-embedder-6736ec787d23e7bd8e0a13fc8e0e88d8.yaml new file mode 100644 index 0000000000..c820c76453 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-embedder-6736ec787d23e7bd8e0a13fc8e0e88d8.yaml @@ -0,0 +1,58 @@ +id: pdf-embedder-6736ec787d23e7bd8e0a13fc8e0e88d8 + +info: + name: > + PDF Embedder <= 4.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b63f0862-d817-49c6-8ac2-6143d21abc32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-embedder/" + google-query: inurl:"/wp-content/plugins/pdf-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-embedder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-generator-for-wp-ea6c92890a8ecc3f7389055b8a095cd6.yaml b/nuclei-templates/cve-less/plugins/pdf-generator-for-wp-ea6c92890a8ecc3f7389055b8a095cd6.yaml new file mode 100644 index 0000000000..3cb2a9f794 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-generator-for-wp-ea6c92890a8ecc3f7389055b8a095cd6.yaml @@ -0,0 +1,58 @@ +id: pdf-generator-for-wp-ea6c92890a8ecc3f7389055b8a095cd6 + +info: + name: > + PDF Generator for Wordpress <= 1.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b41a91fc-86ee-4795-acb6-2ffd22c4f7af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-generator-for-wp/" + google-query: inurl:"/wp-content/plugins/pdf-generator-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-generator-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-generator-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-generator-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-invoices-and-packing-slips-for-woocommerce-3f477473c5a3237b1cf487ce20b4000a.yaml b/nuclei-templates/cve-less/plugins/pdf-invoices-and-packing-slips-for-woocommerce-3f477473c5a3237b1cf487ce20b4000a.yaml new file mode 100644 index 0000000000..efe6b850e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-invoices-and-packing-slips-for-woocommerce-3f477473c5a3237b1cf487ce20b4000a.yaml @@ -0,0 +1,58 @@ +id: pdf-invoices-and-packing-slips-for-woocommerce-3f477473c5a3237b1cf487ce20b4000a + +info: + name: > + PDF Invoices and Packing Slips For WooCommerce <= 1.3.7 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dc6e879-4ccf-485e-b02d-2b291e67df40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-invoices-and-packing-slips-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/pdf-invoices-and-packing-slips-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-invoices-and-packing-slips-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-invoices-and-packing-slips-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-invoices-and-packing-slips-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-light-viewer-b4f2d824d6b4e83932e04d871f8fc11c.yaml b/nuclei-templates/cve-less/plugins/pdf-light-viewer-b4f2d824d6b4e83932e04d871f8fc11c.yaml new file mode 100644 index 0000000000..d1f9b60711 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-light-viewer-b4f2d824d6b4e83932e04d871f8fc11c.yaml @@ -0,0 +1,58 @@ +id: pdf-light-viewer-b4f2d824d6b4e83932e04d871f8fc11c + +info: + name: > + PDF Light Viewer <= 1.4.11 - Authenticated Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/491240c5-2045-4e0b-9916-4337946d2653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-light-viewer/" + google-query: inurl:"/wp-content/plugins/pdf-light-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-light-viewer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-light-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-light-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-poster-d3e4552875a1e4c6d1824946dc7d9f5b.yaml b/nuclei-templates/cve-less/plugins/pdf-poster-d3e4552875a1e4c6d1824946dc7d9f5b.yaml new file mode 100644 index 0000000000..9855809e4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-poster-d3e4552875a1e4c6d1824946dc7d9f5b.yaml @@ -0,0 +1,58 @@ +id: pdf-poster-d3e4552875a1e4c6d1824946dc7d9f5b + +info: + name: > + PDF Poster - PDF Embedder Plugin for WordPress <= 2.1.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/341516d3-b785-4daf-98de-76f4f94b8c96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-poster/" + google-query: inurl:"/wp-content/plugins/pdf-poster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-poster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-poster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-poster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-print-3c928fa432700e9d8d2c446de566746a.yaml b/nuclei-templates/cve-less/plugins/pdf-print-3c928fa432700e9d8d2c446de566746a.yaml new file mode 100644 index 0000000000..1f7ec47e31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-print-3c928fa432700e9d8d2c446de566746a.yaml @@ -0,0 +1,58 @@ +id: pdf-print-3c928fa432700e9d8d2c446de566746a + +info: + name: > + Download PDF & Print by BestWebSoft – WordPress Posts and Pages PDF Generator Plugin <= 1.9.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d272148-0c05-49c7-ab86-22a3bc622bcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-print/" + google-query: inurl:"/wp-content/plugins/pdf-print/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-print,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-print/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-print" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-print-40ad9a6c734da3962dc8243739e3141d.yaml b/nuclei-templates/cve-less/plugins/pdf-print-40ad9a6c734da3962dc8243739e3141d.yaml new file mode 100644 index 0000000000..e0c0bd7d10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-print-40ad9a6c734da3962dc8243739e3141d.yaml @@ -0,0 +1,58 @@ +id: pdf-print-40ad9a6c734da3962dc8243739e3141d + +info: + name: > + PDF & Print by BestWebSoft – WordPress Posts and Pages PDF Generator Plugin < 1.7.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05d86f94-1a1c-42d6-b0db-e19c5cbd1766?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-print/" + google-query: inurl:"/wp-content/plugins/pdf-print/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-print,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-print/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-print" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-print-a599db0a567c14bb9ad602094c3db3bd.yaml b/nuclei-templates/cve-less/plugins/pdf-print-a599db0a567c14bb9ad602094c3db3bd.yaml new file mode 100644 index 0000000000..58b63bb8ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-print-a599db0a567c14bb9ad602094c3db3bd.yaml @@ -0,0 +1,58 @@ +id: pdf-print-a599db0a567c14bb9ad602094c3db3bd + +info: + name: > + PDF & Print by BestWebSoft < 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e06032d-2e03-448b-9fe0-282d7723a605?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-print/" + google-query: inurl:"/wp-content/plugins/pdf-print/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-print,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-print/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-print" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-viewer-block-a843323be037daf5f3b8528ace16935d.yaml b/nuclei-templates/cve-less/plugins/pdf-viewer-block-a843323be037daf5f3b8528ace16935d.yaml new file mode 100644 index 0000000000..f8e24918c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-viewer-block-a843323be037daf5f3b8528ace16935d.yaml @@ -0,0 +1,58 @@ +id: pdf-viewer-block-a843323be037daf5f3b8528ace16935d + +info: + name: > + Gutenberg PDF Viewer Block <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d888cd53-415c-4667-b35a-5b3bd2226eeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-viewer-block/" + google-query: inurl:"/wp-content/plugins/pdf-viewer-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-viewer-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-viewer-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-viewer-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-viewer-by-themencode-a904a832d065a78b4632aa6c156ad613.yaml b/nuclei-templates/cve-less/plugins/pdf-viewer-by-themencode-a904a832d065a78b4632aa6c156ad613.yaml new file mode 100644 index 0000000000..2e5df9f048 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-viewer-by-themencode-a904a832d065a78b4632aa6c156ad613.yaml @@ -0,0 +1,58 @@ +id: pdf-viewer-by-themencode-a904a832d065a78b4632aa6c156ad613 + +info: + name: > + TNC PDF viewer <= 2.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bcae8d6-6dbd-4174-85ff-0b52d8e45c84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-viewer-by-themencode/" + google-query: inurl:"/wp-content/plugins/pdf-viewer-by-themencode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-viewer-by-themencode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-viewer-by-themencode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-viewer-by-themencode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-viewer-c8829397a00680f2b905cec73a59a77f.yaml b/nuclei-templates/cve-less/plugins/pdf-viewer-c8829397a00680f2b905cec73a59a77f.yaml new file mode 100644 index 0000000000..2b0452bcf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-viewer-c8829397a00680f2b905cec73a59a77f.yaml @@ -0,0 +1,58 @@ +id: pdf-viewer-c8829397a00680f2b905cec73a59a77f + +info: + name: > + PDF Viewer <= 0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6439ea1f-78de-432f-bb1a-9ffc731a4ff4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-viewer/" + google-query: inurl:"/wp-content/plugins/pdf-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf-viewer-for-elementor-8b4bc04c0594b1b6d09d20b68880906b.yaml b/nuclei-templates/cve-less/plugins/pdf-viewer-for-elementor-8b4bc04c0594b1b6d09d20b68880906b.yaml new file mode 100644 index 0000000000..b00dfe9911 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf-viewer-for-elementor-8b4bc04c0594b1b6d09d20b68880906b.yaml @@ -0,0 +1,58 @@ +id: pdf-viewer-for-elementor-8b4bc04c0594b1b6d09d20b68880906b + +info: + name: > + PDF Viewer for Elementor <= 2.9.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21340ccf-eae5-4089-876f-60c3d6510d4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf-viewer-for-elementor/" + google-query: inurl:"/wp-content/plugins/pdf-viewer-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf-viewer-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf-viewer-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf-viewer-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf24-post-to-pdf-1f8d84e6699c9f64cbbc8919147cefef.yaml b/nuclei-templates/cve-less/plugins/pdf24-post-to-pdf-1f8d84e6699c9f64cbbc8919147cefef.yaml new file mode 100644 index 0000000000..a2b2730d84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf24-post-to-pdf-1f8d84e6699c9f64cbbc8919147cefef.yaml @@ -0,0 +1,58 @@ +id: pdf24-post-to-pdf-1f8d84e6699c9f64cbbc8919147cefef + +info: + name: > + PDF24 Article To PDF <= 4.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32419c04-bd10-431a-b87c-1975dacc2e01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf24-post-to-pdf/" + google-query: inurl:"/wp-content/plugins/pdf24-post-to-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf24-post-to-pdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf24-post-to-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf24-post-to-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdf24-posts-to-pdf-4eea95bcbc22121deeeb133b73467001.yaml b/nuclei-templates/cve-less/plugins/pdf24-posts-to-pdf-4eea95bcbc22121deeeb133b73467001.yaml new file mode 100644 index 0000000000..37f8759f91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdf24-posts-to-pdf-4eea95bcbc22121deeeb133b73467001.yaml @@ -0,0 +1,58 @@ +id: pdf24-posts-to-pdf-4eea95bcbc22121deeeb133b73467001 + +info: + name: > + PDF24 Articles To PDF <= 4.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70eea51c-d4dd-4b9b-a1ad-6077370dec1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdf24-posts-to-pdf/" + google-query: inurl:"/wp-content/plugins/pdf24-posts-to-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdf24-posts-to-pdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdf24-posts-to-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdf24-posts-to-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdfjs-viewer-shortcode-732f3abc36bb4bb116e7c8687f86e2aa.yaml b/nuclei-templates/cve-less/plugins/pdfjs-viewer-shortcode-732f3abc36bb4bb116e7c8687f86e2aa.yaml new file mode 100644 index 0000000000..71cf734699 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdfjs-viewer-shortcode-732f3abc36bb4bb116e7c8687f86e2aa.yaml @@ -0,0 +1,58 @@ +id: pdfjs-viewer-shortcode-732f3abc36bb4bb116e7c8687f86e2aa + +info: + name: > + PDF.js Viewer <= 2.0.1 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d608a4c0-14ba-4801-aa5a-0b4dab0acd65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdfjs-viewer-shortcode/" + google-query: inurl:"/wp-content/plugins/pdfjs-viewer-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdfjs-viewer-shortcode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdfjs-viewer-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdfjs-viewer-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdfjs-viewer-shortcode-ca93f191e3639f84afcc1a9b1fea599a.yaml b/nuclei-templates/cve-less/plugins/pdfjs-viewer-shortcode-ca93f191e3639f84afcc1a9b1fea599a.yaml new file mode 100644 index 0000000000..cba63dfb31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdfjs-viewer-shortcode-ca93f191e3639f84afcc1a9b1fea599a.yaml @@ -0,0 +1,58 @@ +id: pdfjs-viewer-shortcode-ca93f191e3639f84afcc1a9b1fea599a + +info: + name: > + PDF.js Viewer <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cf68644-d144-462f-adc7-687fac3ec412?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdfjs-viewer-shortcode/" + google-query: inurl:"/wp-content/plugins/pdfjs-viewer-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdfjs-viewer-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdfjs-viewer-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdfjs-viewer-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdq-csv-2f2309313c5bda581e3b02314b8c850b.yaml b/nuclei-templates/cve-less/plugins/pdq-csv-2f2309313c5bda581e3b02314b8c850b.yaml new file mode 100644 index 0000000000..aa9735f6de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdq-csv-2f2309313c5bda581e3b02314b8c850b.yaml @@ -0,0 +1,58 @@ +id: pdq-csv-2f2309313c5bda581e3b02314b8c850b + +info: + name: > + PDQ CSV <= 1.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/014ccad9-a836-4a40-92d3-8c3320fbead8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdq-csv/" + google-query: inurl:"/wp-content/plugins/pdq-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdq-csv,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdq-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdq-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pdw-file-browser-c6589434b15992ea6614e8eb940f49fe.yaml b/nuclei-templates/cve-less/plugins/pdw-file-browser-c6589434b15992ea6614e8eb940f49fe.yaml new file mode 100644 index 0000000000..ff422aa072 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pdw-file-browser-c6589434b15992ea6614e8eb940f49fe.yaml @@ -0,0 +1,58 @@ +id: pdw-file-browser-c6589434b15992ea6614e8eb940f49fe + +info: + name: > + PDF File Browser <= 1.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fd0073c-3f75-4783-838d-d01fdea008c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pdw-file-browser/" + google-query: inurl:"/wp-content/plugins/pdw-file-browser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pdw-file-browser,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pdw-file-browser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pdw-file-browser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pearl-header-builder-820928972f49f35fc134f49ec2dd204c.yaml b/nuclei-templates/cve-less/plugins/pearl-header-builder-820928972f49f35fc134f49ec2dd204c.yaml new file mode 100644 index 0000000000..bf74e76fd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pearl-header-builder-820928972f49f35fc134f49ec2dd204c.yaml @@ -0,0 +1,58 @@ +id: pearl-header-builder-820928972f49f35fc134f49ec2dd204c + +info: + name: > + WordPress Header Builder Plugin – Pearl <= 1.3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c23bba83-35d2-4098-8104-8389bb2ff880?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pearl-header-builder/" + google-query: inurl:"/wp-content/plugins/pearl-header-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pearl-header-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pearl-header-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pearl-header-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pearl-header-builder-90317dde5460b2bcb67123acb90cdb53.yaml b/nuclei-templates/cve-less/plugins/pearl-header-builder-90317dde5460b2bcb67123acb90cdb53.yaml new file mode 100644 index 0000000000..aa533f78c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pearl-header-builder-90317dde5460b2bcb67123acb90cdb53.yaml @@ -0,0 +1,58 @@ +id: pearl-header-builder-90317dde5460b2bcb67123acb90cdb53 + +info: + name: > + Pearl <= 1.3.4 - Cross-Site Request Forgery via stm_save_hb_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6058da9e-8ca3-4966-bb10-e5da526e8c7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pearl-header-builder/" + google-query: inurl:"/wp-content/plugins/pearl-header-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pearl-header-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pearl-header-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pearl-header-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-05f8485e11de79d6aa39de126de0f4e7.yaml b/nuclei-templates/cve-less/plugins/peepso-core-05f8485e11de79d6aa39de126de0f4e7.yaml new file mode 100644 index 0000000000..829c07e8bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-05f8485e11de79d6aa39de126de0f4e7.yaml @@ -0,0 +1,58 @@ +id: peepso-core-05f8485e11de79d6aa39de126de0f4e7 + +info: + name: > + Community by PeepSo <= 6.0.2.0 - Cross-Site Request Forgery leading to Plugin/Subscription Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcf59d89-43e9-4bb2-be4f-9308698d1bb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-15be0a70b6c61a646e8df6a2ecfc155f.yaml b/nuclei-templates/cve-less/plugins/peepso-core-15be0a70b6c61a646e8df6a2ecfc155f.yaml new file mode 100644 index 0000000000..65e0cfe46e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-15be0a70b6c61a646e8df6a2ecfc155f.yaml @@ -0,0 +1,58 @@ +id: peepso-core-15be0a70b6c61a646e8df6a2ecfc155f + +info: + name: > + Community by PeepSo <= 6.2.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fda1be79-ba45-4e8f-bfc3-355f9cdbad82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-2d63f6e8d357472c9ca1e82cb0bc121b.yaml b/nuclei-templates/cve-less/plugins/peepso-core-2d63f6e8d357472c9ca1e82cb0bc121b.yaml new file mode 100644 index 0000000000..88cf164c3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-2d63f6e8d357472c9ca1e82cb0bc121b.yaml @@ -0,0 +1,58 @@ +id: peepso-core-2d63f6e8d357472c9ca1e82cb0bc121b + +info: + name: > + Community by PeepSo <= 6.0.9.0 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3479e7a4-7719-4438-8bf5-bf9b9990f3f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-8ca99b4af6db318cbc7873fe643413aa.yaml b/nuclei-templates/cve-less/plugins/peepso-core-8ca99b4af6db318cbc7873fe643413aa.yaml new file mode 100644 index 0000000000..7882a92fc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-8ca99b4af6db318cbc7873fe643413aa.yaml @@ -0,0 +1,58 @@ +id: peepso-core-8ca99b4af6db318cbc7873fe643413aa + +info: + name: > + Community by PeepSo – Social Network, Membership, Registration, User Profiles < 1.6.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01f038d7-2efd-41b2-8f4c-77bab80d8e91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-aca658478fc845070c3b917d5842d5d8.yaml b/nuclei-templates/cve-less/plugins/peepso-core-aca658478fc845070c3b917d5842d5d8.yaml new file mode 100644 index 0000000000..9259afcba6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-aca658478fc845070c3b917d5842d5d8.yaml @@ -0,0 +1,58 @@ +id: peepso-core-aca658478fc845070c3b917d5842d5d8 + +info: + name: > + Community by PeepSo <= 6.3.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7a67693-d6e6-4492-ad26-28530e7c4a67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-c8c569d2140668ddb48a8d5bad1f7b26.yaml b/nuclei-templates/cve-less/plugins/peepso-core-c8c569d2140668ddb48a8d5bad1f7b26.yaml new file mode 100644 index 0000000000..4c72a99741 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-c8c569d2140668ddb48a8d5bad1f7b26.yaml @@ -0,0 +1,58 @@ +id: peepso-core-c8c569d2140668ddb48a8d5bad1f7b26 + +info: + name: > + Community by PeepSo <= 6.0.2.0 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7346f1e-a101-4131-8950-dbb0af4505f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-e0b883e3e5e2840b97f5723817b58a50.yaml b/nuclei-templates/cve-less/plugins/peepso-core-e0b883e3e5e2840b97f5723817b58a50.yaml new file mode 100644 index 0000000000..742cffa995 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-e0b883e3e5e2840b97f5723817b58a50.yaml @@ -0,0 +1,58 @@ +id: peepso-core-e0b883e3e5e2840b97f5723817b58a50 + +info: + name: > + Community by PeepSo <= 6.3.1.1 - Cross-Site Request Forgery to User Post Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f7386bf-3968-46b8-9c47-5fbc41801e04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-e75947da405d6f6d94e7f97545536f9b.yaml b/nuclei-templates/cve-less/plugins/peepso-core-e75947da405d6f6d94e7f97545536f9b.yaml new file mode 100644 index 0000000000..bd7f6e4b93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-e75947da405d6f6d94e7f97545536f9b.yaml @@ -0,0 +1,58 @@ +id: peepso-core-e75947da405d6f6d94e7f97545536f9b + +info: + name: > + Community by PeepSo <= 6.1.6.0 - Cross-Site Request Forgery via delete + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0aea5564-b1b9-4d57-9f7e-81dd791c8d48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-efd8e3487b0ad4544e466658a022b655.yaml b/nuclei-templates/cve-less/plugins/peepso-core-efd8e3487b0ad4544e466658a022b655.yaml new file mode 100644 index 0000000000..10decfd410 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-efd8e3487b0ad4544e466658a022b655.yaml @@ -0,0 +1,58 @@ +id: peepso-core-efd8e3487b0ad4544e466658a022b655 + +info: + name: > + Community by PeepSo <= 6.2.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826e7e0a-79b1-4828-8eeb-159ef3cc2c65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-f9fe4feda10b297d0acce20daa42a9f6.yaml b/nuclei-templates/cve-less/plugins/peepso-core-f9fe4feda10b297d0acce20daa42a9f6.yaml new file mode 100644 index 0000000000..38782d9085 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-f9fe4feda10b297d0acce20daa42a9f6.yaml @@ -0,0 +1,58 @@ +id: peepso-core-f9fe4feda10b297d0acce20daa42a9f6 + +info: + name: > + Community by PeepSo <= 6.2.7.0 - Unauthenticated Sensitive Information Disclosure via Log file + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af3c8ea5-0af8-492b-920d-858bf23ca6f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-core-fb4fb2e9f3d0effd54f1a6d138f00892.yaml b/nuclei-templates/cve-less/plugins/peepso-core-fb4fb2e9f3d0effd54f1a6d138f00892.yaml new file mode 100644 index 0000000000..31223c4409 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-core-fb4fb2e9f3d0effd54f1a6d138f00892.yaml @@ -0,0 +1,58 @@ +id: peepso-core-fb4fb2e9f3d0effd54f1a6d138f00892 + +info: + name: > + Community by PeepSo <= 6.0.9.0 - Cross-Site Request Forgery to Field Duplication + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a8ac15a-9f9b-4bb8-81a4-1fdd11670a07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-core/" + google-query: inurl:"/wp-content/plugins/peepso-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peepso-photos-635219c62d7cd225129022aedb4232a9.yaml b/nuclei-templates/cve-less/plugins/peepso-photos-635219c62d7cd225129022aedb4232a9.yaml new file mode 100644 index 0000000000..62e2d60181 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peepso-photos-635219c62d7cd225129022aedb4232a9.yaml @@ -0,0 +1,58 @@ +id: peepso-photos-635219c62d7cd225129022aedb4232a9 + +info: + name: > + PeepSo Core: Photos < 6.3.1.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fad492f4-7112-4f4f-8825-c42aab552c9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peepso-photos/" + google-query: inurl:"/wp-content/plugins/peepso-photos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peepso-photos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peepso-photos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peepso-photos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pepro-cf7-database-1d4546a4614d787d7f8089a5da6d5fc4.yaml b/nuclei-templates/cve-less/plugins/pepro-cf7-database-1d4546a4614d787d7f8089a5da6d5fc4.yaml new file mode 100644 index 0000000000..6d14d9f40e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pepro-cf7-database-1d4546a4614d787d7f8089a5da6d5fc4.yaml @@ -0,0 +1,58 @@ +id: pepro-cf7-database-1d4546a4614d787d7f8089a5da6d5fc4 + +info: + name: > + PeproDev CF7 Database <= 1.7.0 - Unauthenticated Stored Cross-Site Scripting via form submission + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7a7df90-a542-48cf-a58e-bcbddc978df2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pepro-cf7-database/" + google-query: inurl:"/wp-content/plugins/pepro-cf7-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pepro-cf7-database,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pepro-cf7-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pepro-cf7-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pepro-cf7-database-995fd031fdd18a2d68fcabed6b6a8e84.yaml b/nuclei-templates/cve-less/plugins/pepro-cf7-database-995fd031fdd18a2d68fcabed6b6a8e84.yaml new file mode 100644 index 0000000000..dc8591cf42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pepro-cf7-database-995fd031fdd18a2d68fcabed6b6a8e84.yaml @@ -0,0 +1,58 @@ +id: pepro-cf7-database-995fd031fdd18a2d68fcabed6b6a8e84 + +info: + name: > + PeproDev CF7 Database <= 1.8.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e757ca2f-c4d9-4747-9f84-75ef8a54d485?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pepro-cf7-database/" + google-query: inurl:"/wp-content/plugins/pepro-cf7-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pepro-cf7-database,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pepro-cf7-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pepro-cf7-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pepro-ultimate-invoice-9ae16e48f44198f8088e9f21632ed314.yaml b/nuclei-templates/cve-less/plugins/pepro-ultimate-invoice-9ae16e48f44198f8088e9f21632ed314.yaml new file mode 100644 index 0000000000..44903b2b85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pepro-ultimate-invoice-9ae16e48f44198f8088e9f21632ed314.yaml @@ -0,0 +1,58 @@ +id: pepro-ultimate-invoice-9ae16e48f44198f8088e9f21632ed314 + +info: + name: > + PeproDev Ultimate Invoice <= 1.9.7 - Unauthenticated Sensitive Information Exposure via init_plugin + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5be9d0ff-5d9c-4e80-a4d7-66ef4859a959?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pepro-ultimate-invoice/" + google-query: inurl:"/wp-content/plugins/pepro-ultimate-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pepro-ultimate-invoice,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pepro-ultimate-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pepro-ultimate-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pepro-ultimate-invoice-fe3ee4088bc486320d241799be9d47af.yaml b/nuclei-templates/cve-less/plugins/pepro-ultimate-invoice-fe3ee4088bc486320d241799be9d47af.yaml new file mode 100644 index 0000000000..1f959d4516 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pepro-ultimate-invoice-fe3ee4088bc486320d241799be9d47af.yaml @@ -0,0 +1,58 @@ +id: pepro-ultimate-invoice-fe3ee4088bc486320d241799be9d47af + +info: + name: > + PeproDev Ultimate Invoice <= 2.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/715e3947-922e-4549-b601-6a2ae441ddf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pepro-ultimate-invoice/" + google-query: inurl:"/wp-content/plugins/pepro-ultimate-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pepro-ultimate-invoice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pepro-ultimate-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pepro-ultimate-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/per-page-add-to-178341479b86e6771bea046e08788d1c.yaml b/nuclei-templates/cve-less/plugins/per-page-add-to-178341479b86e6771bea046e08788d1c.yaml new file mode 100644 index 0000000000..2648ff30bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/per-page-add-to-178341479b86e6771bea046e08788d1c.yaml @@ -0,0 +1,58 @@ +id: per-page-add-to-178341479b86e6771bea046e08788d1c + +info: + name: > + Per Page Add To Head <= 1.4.3 Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c000a424-4060-4dcc-bae3-fa8cfc00ddda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/per-page-add-to/" + google-query: inurl:"/wp-content/plugins/per-page-add-to/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,per-page-add-to,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/per-page-add-to/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "per-page-add-to" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/per-page-add-to-186c3d28d4f62e262c488a190cb41115.yaml b/nuclei-templates/cve-less/plugins/per-page-add-to-186c3d28d4f62e262c488a190cb41115.yaml new file mode 100644 index 0000000000..8ca56a92b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/per-page-add-to-186c3d28d4f62e262c488a190cb41115.yaml @@ -0,0 +1,58 @@ +id: per-page-add-to-186c3d28d4f62e262c488a190cb41115 + +info: + name: > + Per Page Add to Head <= 1.4.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6e7ada1-c5ff-4a05-92e1-d681fc659956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/per-page-add-to/" + google-query: inurl:"/wp-content/plugins/per-page-add-to/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,per-page-add-to,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/per-page-add-to/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "per-page-add-to" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perelandra-sermons-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/perelandra-sermons-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..902e10753d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perelandra-sermons-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: perelandra-sermons-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perelandra-sermons/" + google-query: inurl:"/wp-content/plugins/perelandra-sermons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perelandra-sermons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perelandra-sermons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perelandra-sermons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perelink-9181aa3538843516f1558187b7acffea.yaml b/nuclei-templates/cve-less/plugins/perelink-9181aa3538843516f1558187b7acffea.yaml new file mode 100644 index 0000000000..eed2e12c58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perelink-9181aa3538843516f1558187b7acffea.yaml @@ -0,0 +1,58 @@ +id: perelink-9181aa3538843516f1558187b7acffea + +info: + name: > + Perelink Pro <= 2.1.4 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65b9fea3-323a-4123-ad83-3d713eb5552f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perelink/" + google-query: inurl:"/wp-content/plugins/perelink/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perelink,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perelink/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perelink" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfect-pullquotes-8d6f7061c576076509b8f92171f21824.yaml b/nuclei-templates/cve-less/plugins/perfect-pullquotes-8d6f7061c576076509b8f92171f21824.yaml new file mode 100644 index 0000000000..c162fe87b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfect-pullquotes-8d6f7061c576076509b8f92171f21824.yaml @@ -0,0 +1,58 @@ +id: perfect-pullquotes-8d6f7061c576076509b8f92171f21824 + +info: + name: > + Perfect Pullquotes <= 1.7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e16da850-6429-4402-ab09-6d2d145bcfd7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfect-pullquotes/" + google-query: inurl:"/wp-content/plugins/perfect-pullquotes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfect-pullquotes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfect-pullquotes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfect-pullquotes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfect-survey-6fe6a0f37349207e6c41e72076713696.yaml b/nuclei-templates/cve-less/plugins/perfect-survey-6fe6a0f37349207e6c41e72076713696.yaml new file mode 100644 index 0000000000..31b5d2afb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfect-survey-6fe6a0f37349207e6c41e72076713696.yaml @@ -0,0 +1,58 @@ +id: perfect-survey-6fe6a0f37349207e6c41e72076713696 + +info: + name: > + Perfect Survey <= 1.5.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfd1e244-27c2-4c3e-9d82-a7ffefd4eab6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfect-survey/" + google-query: inurl:"/wp-content/plugins/perfect-survey/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfect-survey,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfect-survey/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfect-survey" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfect-survey-a8d322ee7f2a3aae906b690c8d232e76.yaml b/nuclei-templates/cve-less/plugins/perfect-survey-a8d322ee7f2a3aae906b690c8d232e76.yaml new file mode 100644 index 0000000000..1b6a6794f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfect-survey-a8d322ee7f2a3aae906b690c8d232e76.yaml @@ -0,0 +1,58 @@ +id: perfect-survey-a8d322ee7f2a3aae906b690c8d232e76 + +info: + name: > + Perfect Survey <= 1.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2636efe7-20c4-4d12-ab2f-45035e8a1ca0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfect-survey/" + google-query: inurl:"/wp-content/plugins/perfect-survey/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfect-survey,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfect-survey/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfect-survey" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfect-survey-b9d0d288675f55bb8b0e4c8b1cc48daa.yaml b/nuclei-templates/cve-less/plugins/perfect-survey-b9d0d288675f55bb8b0e4c8b1cc48daa.yaml new file mode 100644 index 0000000000..1c92f135df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfect-survey-b9d0d288675f55bb8b0e4c8b1cc48daa.yaml @@ -0,0 +1,58 @@ +id: perfect-survey-b9d0d288675f55bb8b0e4c8b1cc48daa + +info: + name: > + Perfect Survey <= 1.5.2 - Unauthenticated Stored Cross-Site Scripting via IP + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9388404-40b9-4d2c-b009-0417ff48e74c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfect-survey/" + google-query: inurl:"/wp-content/plugins/perfect-survey/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfect-survey,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfect-survey/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfect-survey" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfect-survey-bfb3f454ae9448850fc297b53b5e2f82.yaml b/nuclei-templates/cve-less/plugins/perfect-survey-bfb3f454ae9448850fc297b53b5e2f82.yaml new file mode 100644 index 0000000000..f1811607be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfect-survey-bfb3f454ae9448850fc297b53b5e2f82.yaml @@ -0,0 +1,58 @@ +id: perfect-survey-bfb3f454ae9448850fc297b53b5e2f82 + +info: + name: > + Perfect Survey <= 1.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e00ba29c-acdc-42ba-a6f7-cd064aec662d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfect-survey/" + google-query: inurl:"/wp-content/plugins/perfect-survey/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfect-survey,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfect-survey/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfect-survey" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfect-woocommerce-brands-a5b9786b6284df449ea800f32dd8d580.yaml b/nuclei-templates/cve-less/plugins/perfect-woocommerce-brands-a5b9786b6284df449ea800f32dd8d580.yaml new file mode 100644 index 0000000000..a71fca78c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfect-woocommerce-brands-a5b9786b6284df449ea800f32dd8d580.yaml @@ -0,0 +1,58 @@ +id: perfect-woocommerce-brands-a5b9786b6284df449ea800f32dd8d580 + +info: + name: > + Perfect Brands for WooCommerce <= 2.0.4 - Server Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a016b6b3-3a3f-4f25-9207-2460798044f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfect-woocommerce-brands/" + google-query: inurl:"/wp-content/plugins/perfect-woocommerce-brands/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfect-woocommerce-brands,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfect-woocommerce-brands/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfect-woocommerce-brands" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfect-woocommerce-brands-efce5df3c4d25a3fc56c583b2e3ca93e.yaml b/nuclei-templates/cve-less/plugins/perfect-woocommerce-brands-efce5df3c4d25a3fc56c583b2e3ca93e.yaml new file mode 100644 index 0000000000..7b31ab22de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfect-woocommerce-brands-efce5df3c4d25a3fc56c583b2e3ca93e.yaml @@ -0,0 +1,58 @@ +id: perfect-woocommerce-brands-efce5df3c4d25a3fc56c583b2e3ca93e + +info: + name: > + Perfect Brands for WooCommerce <= 2.0.4 - Unauthorized Brand Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c478a421-8dc1-46cb-ada8-ceb107f22a53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfect-woocommerce-brands/" + google-query: inurl:"/wp-content/plugins/perfect-woocommerce-brands/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfect-woocommerce-brands,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfect-woocommerce-brands/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfect-woocommerce-brands" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfmatters-14db06c015099db1b01fba0887a78991.yaml b/nuclei-templates/cve-less/plugins/perfmatters-14db06c015099db1b01fba0887a78991.yaml new file mode 100644 index 0000000000..2fcd8a99eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfmatters-14db06c015099db1b01fba0887a78991.yaml @@ -0,0 +1,58 @@ +id: perfmatters-14db06c015099db1b01fba0887a78991 + +info: + name: > + Perfmatters < 2.2.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc4a7efd-f4f4-44a7-bd55-a6ae3a1d3521?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfmatters/" + google-query: inurl:"/wp-content/plugins/perfmatters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfmatters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfmatters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfmatters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfmatters-706c2acdbff0e92fe0b4d13990d0fc81.yaml b/nuclei-templates/cve-less/plugins/perfmatters-706c2acdbff0e92fe0b4d13990d0fc81.yaml new file mode 100644 index 0000000000..3f659ba545 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfmatters-706c2acdbff0e92fe0b4d13990d0fc81.yaml @@ -0,0 +1,58 @@ +id: perfmatters-706c2acdbff0e92fe0b4d13990d0fc81 + +info: + name: > + Perfmatters <= 2.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/612fb73f-e488-453f-a2a4-32969f91122b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfmatters/" + google-query: inurl:"/wp-content/plugins/perfmatters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfmatters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfmatters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfmatters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfmatters-7bfb8a8c7905e357c4c4b5df9d93b6e7.yaml b/nuclei-templates/cve-less/plugins/perfmatters-7bfb8a8c7905e357c4c4b5df9d93b6e7.yaml new file mode 100644 index 0000000000..4a1326937e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfmatters-7bfb8a8c7905e357c4c4b5df9d93b6e7.yaml @@ -0,0 +1,58 @@ +id: perfmatters-7bfb8a8c7905e357c4c4b5df9d93b6e7 + +info: + name: > + Perfmatters <= 2.1.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b078e446-61e7-4ce1-b9a9-480ccc388c72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfmatters/" + google-query: inurl:"/wp-content/plugins/perfmatters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfmatters,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfmatters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfmatters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/perfmatters-e0c010ddbd19926f406c155b62241279.yaml b/nuclei-templates/cve-less/plugins/perfmatters-e0c010ddbd19926f406c155b62241279.yaml new file mode 100644 index 0000000000..dfec6f828e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/perfmatters-e0c010ddbd19926f406c155b62241279.yaml @@ -0,0 +1,58 @@ +id: perfmatters-e0c010ddbd19926f406c155b62241279 + +info: + name: > + Perfmatters <= 2.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95f5b4df-5214-4f36-8dd5-a1a816fbc3db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/perfmatters/" + google-query: inurl:"/wp-content/plugins/perfmatters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,perfmatters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/perfmatters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfmatters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/performance-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/performance-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2fb0899e40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/performance-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: performance-kit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/performance-kit/" + google-query: inurl:"/wp-content/plugins/performance-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,performance-kit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/performance-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "performance-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/performance-lab-ea8f062f0b56f024cc7cd24de72627d2.yaml b/nuclei-templates/cve-less/plugins/performance-lab-ea8f062f0b56f024cc7cd24de72627d2.yaml new file mode 100644 index 0000000000..e53800467b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/performance-lab-ea8f062f0b56f024cc7cd24de72627d2.yaml @@ -0,0 +1,58 @@ +id: performance-lab-ea8f062f0b56f024cc7cd24de72627d2 + +info: + name: > + Performance Lab <= 2.2.0 - Cross-Site Request Forgery via dismiss-wp-pointer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f1e3586-99f7-4cac-bbb2-1a6406c4f8a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/performance-lab/" + google-query: inurl:"/wp-content/plugins/performance-lab/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,performance-lab,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/performance-lab/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "performance-lab" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-10b89b9db07084a443cbeed71b129af6.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-10b89b9db07084a443cbeed71b129af6.yaml new file mode 100644 index 0000000000..24c05c19ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-10b89b9db07084a443cbeed71b129af6.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-10b89b9db07084a443cbeed71b129af6 + +info: + name: > + Permalink Manager Lite <= 2.2.20 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8451f0f-0dfd-4926-aa35-75edf70ed6f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-35e5b1d4ade66da7f51f342394148582.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-35e5b1d4ade66da7f51f342394148582.yaml new file mode 100644 index 0000000000..be77e722e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-35e5b1d4ade66da7f51f342394148582.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-35e5b1d4ade66da7f51f342394148582 + +info: + name: > + Permalink Manager Lite <= 2.2.14 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48ee0d97-40c1-451f-8a5f-b32ff032e8b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-48da01905911b9839c3e0f5a4a5539b0.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-48da01905911b9839c3e0f5a4a5539b0.yaml new file mode 100644 index 0000000000..c76f476424 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-48da01905911b9839c3e0f5a4a5539b0.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-48da01905911b9839c3e0f5a4a5539b0 + +info: + name: > + Permalink Manager <= 2.4.3.1 - Missing Authorization to Authenticated(Author+) Arbitrary Post Slug Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70cd028d-122d-4e3c-ac09-150dec07a2cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-4e977ded44741d82f1c08a16943badd0.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-4e977ded44741d82f1c08a16943badd0.yaml new file mode 100644 index 0000000000..2c549d884f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-4e977ded44741d82f1c08a16943badd0.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-4e977ded44741d82f1c08a16943badd0 + +info: + name: > + Permalink Manager Lite <= 2.2.20.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cbf9636-9d9d-44d4-b873-8920f2dbb846?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.20.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-8536531e312b5b608fd436fcd26ad3ab.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-8536531e312b5b608fd436fcd26ad3ab.yaml new file mode 100644 index 0000000000..aafde9fcc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-8536531e312b5b608fd436fcd26ad3ab.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-8536531e312b5b608fd436fcd26ad3ab + +info: + name: > + Permalink Manager Lite and Permalink Manager Pro <= 2.4.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7020d5a1-a4a6-489c-8615-bc7898553bcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-884aebd15e5eb05f43f6f8a3d490accf.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-884aebd15e5eb05f43f6f8a3d490accf.yaml new file mode 100644 index 0000000000..5f7df7382d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-884aebd15e5eb05f43f6f8a3d490accf.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-884aebd15e5eb05f43f6f8a3d490accf + +info: + name: > + Permalink Manager Lite <= 2.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fefda27-aa3c-4fdf-beea-aaf0cdaaeb77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-954c99838450703e2f9d2a807b32e669.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-954c99838450703e2f9d2a807b32e669.yaml new file mode 100644 index 0000000000..cadbdb3cb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-954c99838450703e2f9d2a807b32e669.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-954c99838450703e2f9d2a807b32e669 + +info: + name: > + Plugin Permalink <= 2.4.3.1 - Missing Authorization via get_uri_editor + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74f6bf42-3406-47c5-b255-6cc1e8084fb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-ca60ddb788ce2ba7421ade305d793252.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-ca60ddb788ce2ba7421ade305d793252.yaml new file mode 100644 index 0000000000..1fcc9bd839 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-ca60ddb788ce2ba7421ade305d793252.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-ca60ddb788ce2ba7421ade305d793252 + +info: + name: > + Permalink Manager Lite <= 2.2.20.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1718f2eb-6235-498f-8c1e-402c1caf7d02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.20.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-e32cc6e85c9fbac88c9c7b48d1277259.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-e32cc6e85c9fbac88c9c7b48d1277259.yaml new file mode 100644 index 0000000000..118a5126d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-e32cc6e85c9fbac88c9c7b48d1277259.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-e32cc6e85c9fbac88c9c7b48d1277259 + +info: + name: > + Permalink Manager Lite <= 2.2.12 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1de41980-93bb-4831-bb31-50675499f648?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager/" + google-query: inurl:"/wp-content/plugins/permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalink-manager-pro-8536531e312b5b608fd436fcd26ad3ab.yaml b/nuclei-templates/cve-less/plugins/permalink-manager-pro-8536531e312b5b608fd436fcd26ad3ab.yaml new file mode 100644 index 0000000000..9d312a20e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalink-manager-pro-8536531e312b5b608fd436fcd26ad3ab.yaml @@ -0,0 +1,58 @@ +id: permalink-manager-pro-8536531e312b5b608fd436fcd26ad3ab + +info: + name: > + Permalink Manager Lite and Permalink Manager Pro <= 2.4.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7020d5a1-a4a6-489c-8615-bc7898553bcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalink-manager-pro/" + google-query: inurl:"/wp-content/plugins/permalink-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalink-manager-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalink-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalink-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalinks-customizer-eac9d9da89c904ba41a5397452bfcf9e.yaml b/nuclei-templates/cve-less/plugins/permalinks-customizer-eac9d9da89c904ba41a5397452bfcf9e.yaml new file mode 100644 index 0000000000..8234fb287f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalinks-customizer-eac9d9da89c904ba41a5397452bfcf9e.yaml @@ -0,0 +1,58 @@ +id: permalinks-customizer-eac9d9da89c904ba41a5397452bfcf9e + +info: + name: > + Permalinks Customizer <= 2.8.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/702dca65-fa8c-48c7-89e4-cba4b151e2c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalinks-customizer/" + google-query: inurl:"/wp-content/plugins/permalinks-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalinks-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalinks-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalinks-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalinks-customizer-f6a3298dd9a8254fb5d73c683663318f.yaml b/nuclei-templates/cve-less/plugins/permalinks-customizer-f6a3298dd9a8254fb5d73c683663318f.yaml new file mode 100644 index 0000000000..49ca694e9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalinks-customizer-f6a3298dd9a8254fb5d73c683663318f.yaml @@ -0,0 +1,58 @@ +id: permalinks-customizer-f6a3298dd9a8254fb5d73c683663318f + +info: + name: > + Permalinks Customizer <= 2.8.2 - Cross-Site Request Forgery via post_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf1f402d-98d7-42d7-8d8d-ff74a65e5293?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalinks-customizer/" + google-query: inurl:"/wp-content/plugins/permalinks-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalinks-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalinks-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalinks-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/permalinks-migration-plugin-for-wordpress-474a3f34ad481b0e51cd0ce4304a20fe.yaml b/nuclei-templates/cve-less/plugins/permalinks-migration-plugin-for-wordpress-474a3f34ad481b0e51cd0ce4304a20fe.yaml new file mode 100644 index 0000000000..50cae1ce3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/permalinks-migration-plugin-for-wordpress-474a3f34ad481b0e51cd0ce4304a20fe.yaml @@ -0,0 +1,58 @@ +id: permalinks-migration-plugin-for-wordpress-474a3f34ad481b0e51cd0ce4304a20fe + +info: + name: > + Dean's Permalinks Migration <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab0cc008-be18-4703-8156-acb00c1ac9a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/permalinks-migration-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/permalinks-migration-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,permalinks-migration-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/permalinks-migration-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "permalinks-migration-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/persian-fonts-8ee86188c71251e99a8f09d6e9fff31b.yaml b/nuclei-templates/cve-less/plugins/persian-fonts-8ee86188c71251e99a8f09d6e9fff31b.yaml new file mode 100644 index 0000000000..fcb5566e43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/persian-fonts-8ee86188c71251e99a8f09d6e9fff31b.yaml @@ -0,0 +1,58 @@ +id: persian-fonts-8ee86188c71251e99a8f09d6e9fff31b + +info: + name: > + Persian Fonts <= 1.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a427b26-4a0d-4351-8a8b-ec5da1345ebd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/persian-fonts/" + google-query: inurl:"/wp-content/plugins/persian-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,persian-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/persian-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "persian-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/persian-woocommerce-b7124c79e7a307b3a04609b03d624131.yaml b/nuclei-templates/cve-less/plugins/persian-woocommerce-b7124c79e7a307b3a04609b03d624131.yaml new file mode 100644 index 0000000000..cdbaadebf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/persian-woocommerce-b7124c79e7a307b3a04609b03d624131.yaml @@ -0,0 +1,58 @@ +id: persian-woocommerce-b7124c79e7a307b3a04609b03d624131 + +info: + name: > + Persian WooCommerce <= 5.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e662761d-1dc8-4998-83b5-316ce683b5b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/persian-woocommerce/" + google-query: inurl:"/wp-content/plugins/persian-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,persian-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/persian-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "persian-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/persian-woocommerce-sms-99d48d97197070fa6f8afc1ea6ec2bed.yaml b/nuclei-templates/cve-less/plugins/persian-woocommerce-sms-99d48d97197070fa6f8afc1ea6ec2bed.yaml new file mode 100644 index 0000000000..9c96cf26ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/persian-woocommerce-sms-99d48d97197070fa6f8afc1ea6ec2bed.yaml @@ -0,0 +1,58 @@ +id: persian-woocommerce-sms-99d48d97197070fa6f8afc1ea6ec2bed + +info: + name: > + افزونه پیامک ووکامرس Persian WooCommerce SMS < 3.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76e185c3-d62b-42f7-a943-0498da2d76ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/persian-woocommerce-sms/" + google-query: inurl:"/wp-content/plugins/persian-woocommerce-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,persian-woocommerce-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/persian-woocommerce-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "persian-woocommerce-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/persian-woocommerce-sms-f6e0611408f1fa46e8d9b7f9c0374cb8.yaml b/nuclei-templates/cve-less/plugins/persian-woocommerce-sms-f6e0611408f1fa46e8d9b7f9c0374cb8.yaml new file mode 100644 index 0000000000..fd7691b678 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/persian-woocommerce-sms-f6e0611408f1fa46e8d9b7f9c0374cb8.yaml @@ -0,0 +1,58 @@ +id: persian-woocommerce-sms-f6e0611408f1fa46e8d9b7f9c0374cb8 + +info: + name: > + افزونه پیامک ووکامرس Persian WooCommerce SMS <= 4.4.0 - Cross-Site Scripting and SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c7edcbd-83b8-405b-892a-c404947990b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/persian-woocommerce-sms/" + google-query: inurl:"/wp-content/plugins/persian-woocommerce-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,persian-woocommerce-sms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/persian-woocommerce-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "persian-woocommerce-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/personal-dictionary-b7a954abdc80748332e27cd05868a534.yaml b/nuclei-templates/cve-less/plugins/personal-dictionary-b7a954abdc80748332e27cd05868a534.yaml new file mode 100644 index 0000000000..0754dc963d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/personal-dictionary-b7a954abdc80748332e27cd05868a534.yaml @@ -0,0 +1,58 @@ +id: personal-dictionary-b7a954abdc80748332e27cd05868a534 + +info: + name: > + Personal Dictionary <= 1.3.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31bcc1e1-08b6-4bbc-a28c-9c2d8feea819?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/personal-dictionary/" + google-query: inurl:"/wp-content/plugins/personal-dictionary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,personal-dictionary,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/personal-dictionary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "personal-dictionary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/personalize-woocommerce-cart-page-7e5b3599be6904a958ea6b2b094ad05a.yaml b/nuclei-templates/cve-less/plugins/personalize-woocommerce-cart-page-7e5b3599be6904a958ea6b2b094ad05a.yaml new file mode 100644 index 0000000000..0b13b7d88d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/personalize-woocommerce-cart-page-7e5b3599be6904a958ea6b2b094ad05a.yaml @@ -0,0 +1,58 @@ +id: personalize-woocommerce-cart-page-7e5b3599be6904a958ea6b2b094ad05a + +info: + name: > + Personalized WooCommerce Cart Page <= 2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/245e43e0-3391-486d-9ecf-3e745bceaa1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/personalize-woocommerce-cart-page/" + google-query: inurl:"/wp-content/plugins/personalize-woocommerce-cart-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,personalize-woocommerce-cart-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/personalize-woocommerce-cart-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "personalize-woocommerce-cart-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pet-manager-13b68629426cfdd6f904bb91efc08ae5.yaml b/nuclei-templates/cve-less/plugins/pet-manager-13b68629426cfdd6f904bb91efc08ae5.yaml new file mode 100644 index 0000000000..7a001e8fa4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pet-manager-13b68629426cfdd6f904bb91efc08ae5.yaml @@ -0,0 +1,58 @@ +id: pet-manager-13b68629426cfdd6f904bb91efc08ae5 + +info: + name: > + Pet Manager <= 1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f397671-0b59-4049-95af-3087e07685f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pet-manager/" + google-query: inurl:"/wp-content/plugins/pet-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pet-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pet-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pet-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pet-manager-1e104d6bab1fb28ec84c0ed01b4f6113.yaml b/nuclei-templates/cve-less/plugins/pet-manager-1e104d6bab1fb28ec84c0ed01b4f6113.yaml new file mode 100644 index 0000000000..fe494b4e67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pet-manager-1e104d6bab1fb28ec84c0ed01b4f6113.yaml @@ -0,0 +1,58 @@ +id: pet-manager-1e104d6bab1fb28ec84c0ed01b4f6113 + +info: + name: > + Pet Manager <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0c724a4-7783-4d2a-938e-800960c2be64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pet-manager/" + google-query: inurl:"/wp-content/plugins/pet-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pet-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pet-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pet-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peters-collaboration-e-mails-cf9cb4b184f662090fa6c012e4b5ad99.yaml b/nuclei-templates/cve-less/plugins/peters-collaboration-e-mails-cf9cb4b184f662090fa6c012e4b5ad99.yaml new file mode 100644 index 0000000000..f5f1edacbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peters-collaboration-e-mails-cf9cb4b184f662090fa6c012e4b5ad99.yaml @@ -0,0 +1,58 @@ +id: peters-collaboration-e-mails-cf9cb4b184f662090fa6c012e4b5ad99 + +info: + name: > + Peter’s Collaboration E-mails <= 2.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae4a8e70-6b94-428f-8672-407dc4cd2f3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peters-collaboration-e-mails/" + google-query: inurl:"/wp-content/plugins/peters-collaboration-e-mails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peters-collaboration-e-mails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peters-collaboration-e-mails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peters-collaboration-e-mails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peters-custom-anti-spam-image-a7e70ba8dbeab9ae2adc8e43fd59af93.yaml b/nuclei-templates/cve-less/plugins/peters-custom-anti-spam-image-a7e70ba8dbeab9ae2adc8e43fd59af93.yaml new file mode 100644 index 0000000000..06ccfc57ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peters-custom-anti-spam-image-a7e70ba8dbeab9ae2adc8e43fd59af93.yaml @@ -0,0 +1,58 @@ +id: peters-custom-anti-spam-image-a7e70ba8dbeab9ae2adc8e43fd59af93 + +info: + name: > + Peter’s Custom Anti-Spam <= 3.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cea7f17-743a-4dce-bd86-5713ff6d8520?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peters-custom-anti-spam-image/" + google-query: inurl:"/wp-content/plugins/peters-custom-anti-spam-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peters-custom-anti-spam-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peters-custom-anti-spam-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peters-custom-anti-spam-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peters-login-redirect-12236d5bb8f3c06e72ec152e136c1986.yaml b/nuclei-templates/cve-less/plugins/peters-login-redirect-12236d5bb8f3c06e72ec152e136c1986.yaml new file mode 100644 index 0000000000..d24012ebdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peters-login-redirect-12236d5bb8f3c06e72ec152e136c1986.yaml @@ -0,0 +1,58 @@ +id: peters-login-redirect-12236d5bb8f3c06e72ec152e136c1986 + +info: + name: > + LoginWP < 2.9.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b1f0741-1ccc-497a-b239-3cefb1204f04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peters-login-redirect/" + google-query: inurl:"/wp-content/plugins/peters-login-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peters-login-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peters-login-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peters-login-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peters-login-redirect-55f3de8c0899443e80983275ca038b9f.yaml b/nuclei-templates/cve-less/plugins/peters-login-redirect-55f3de8c0899443e80983275ca038b9f.yaml new file mode 100644 index 0000000000..96879feb6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peters-login-redirect-55f3de8c0899443e80983275ca038b9f.yaml @@ -0,0 +1,58 @@ +id: peters-login-redirect-55f3de8c0899443e80983275ca038b9f + +info: + name: > + LoginWP <= 2.9.1 - Multiple Cross-Site Request Forgery vulnerabilities + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/879c0a85-ed94-430c-8e8e-6389294b432b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peters-login-redirect/" + google-query: inurl:"/wp-content/plugins/peters-login-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peters-login-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peters-login-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peters-login-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peters-login-redirect-dcc1962541555ae792e76de2b7edad31.yaml b/nuclei-templates/cve-less/plugins/peters-login-redirect-dcc1962541555ae792e76de2b7edad31.yaml new file mode 100644 index 0000000000..55f2663fc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peters-login-redirect-dcc1962541555ae792e76de2b7edad31.yaml @@ -0,0 +1,58 @@ +id: peters-login-redirect-dcc1962541555ae792e76de2b7edad31 + +info: + name: > + LoginWP < 3.0.0.5 - Reflected Cross-Site Scripting via rul_login_url, rul_logout_url Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64827b61-42ea-454a-b41d-85ce8d6ad866?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peters-login-redirect/" + google-query: inurl:"/wp-content/plugins/peters-login-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peters-login-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peters-login-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peters-login-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peters-math-anti-spam-d6df1bce344df99ce5b68d40f423014e.yaml b/nuclei-templates/cve-less/plugins/peters-math-anti-spam-d6df1bce344df99ce5b68d40f423014e.yaml new file mode 100644 index 0000000000..cc9e460d89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peters-math-anti-spam-d6df1bce344df99ce5b68d40f423014e.yaml @@ -0,0 +1,58 @@ +id: peters-math-anti-spam-d6df1bce344df99ce5b68d40f423014e + +info: + name: > + Peter's Math Anti-Spam Spinoff < 1.0.0 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc0a1bfe-0ead-4333-bb77-0f2f4356626d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peters-math-anti-spam/" + google-query: inurl:"/wp-content/plugins/peters-math-anti-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peters-math-anti-spam,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peters-math-anti-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peters-math-anti-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/peters-random-anti-spam-image-a3e785056d2140e268a5211287db4a52.yaml b/nuclei-templates/cve-less/plugins/peters-random-anti-spam-image-a3e785056d2140e268a5211287db4a52.yaml new file mode 100644 index 0000000000..20af18c8a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/peters-random-anti-spam-image-a3e785056d2140e268a5211287db4a52.yaml @@ -0,0 +1,58 @@ +id: peters-random-anti-spam-image-a3e785056d2140e268a5211287db4a52 + +info: + name: > + Peter’s Random Anti-Spam Image <= 1.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f257c92-1529-49c8-a140-567ba5c36d04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/peters-random-anti-spam-image/" + google-query: inurl:"/wp-content/plugins/peters-random-anti-spam-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,peters-random-anti-spam-image,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/peters-random-anti-spam-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "peters-random-anti-spam-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/petfinder-listings-4aabb12734f76649f5626710ac0ad1d9.yaml b/nuclei-templates/cve-less/plugins/petfinder-listings-4aabb12734f76649f5626710ac0ad1d9.yaml new file mode 100644 index 0000000000..7b9ba80e36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/petfinder-listings-4aabb12734f76649f5626710ac0ad1d9.yaml @@ -0,0 +1,58 @@ +id: petfinder-listings-4aabb12734f76649f5626710ac0ad1d9 + +info: + name: > + Petfinder Listings <= 1.0.19 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfc59270-d08c-4b78-9863-4bb88120b878?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/petfinder-listings/" + google-query: inurl:"/wp-content/plugins/petfinder-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,petfinder-listings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/petfinder-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "petfinder-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pexlechris-adminer-44929349a8819c69d02149042a6d6e8c.yaml b/nuclei-templates/cve-less/plugins/pexlechris-adminer-44929349a8819c69d02149042a6d6e8c.yaml new file mode 100644 index 0000000000..e9efae548e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pexlechris-adminer-44929349a8819c69d02149042a6d6e8c.yaml @@ -0,0 +1,58 @@ +id: pexlechris-adminer-44929349a8819c69d02149042a6d6e8c + +info: + name: > + Database Management tool – Adminer <= 1.1.5 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7047d53e-c9e4-46f9-8b5f-3489a1fb7e97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pexlechris-adminer/" + google-query: inurl:"/wp-content/plugins/pexlechris-adminer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pexlechris-adminer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pexlechris-adminer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pexlechris-adminer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phastpress-6080809f6efdafef4c14410a7cb137c8.yaml b/nuclei-templates/cve-less/plugins/phastpress-6080809f6efdafef4c14410a7cb137c8.yaml new file mode 100644 index 0000000000..9785cb75a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phastpress-6080809f6efdafef4c14410a7cb137c8.yaml @@ -0,0 +1,58 @@ +id: phastpress-6080809f6efdafef4c14410a7cb137c8 + +info: + name: > + PhastPress <= 1.110 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8027fa07-6bc2-4e63-89d0-98079729921d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phastpress/" + google-query: inurl:"/wp-content/plugins/phastpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phastpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phastpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phastpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.110') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phoenix-media-rename-82eeedcf78f4352cc7bcae0bfb774fa5.yaml b/nuclei-templates/cve-less/plugins/phoenix-media-rename-82eeedcf78f4352cc7bcae0bfb774fa5.yaml new file mode 100644 index 0000000000..210c7af575 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phoenix-media-rename-82eeedcf78f4352cc7bcae0bfb774fa5.yaml @@ -0,0 +1,58 @@ +id: phoenix-media-rename-82eeedcf78f4352cc7bcae0bfb774fa5 + +info: + name: > + Phoenix Media Rename <= 3.4.2 - Author Arbitrary Media File Renaming + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d75d0f16-015b-49cd-a0d1-41e007fc7398?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phoenix-media-rename/" + google-query: inurl:"/wp-content/plugins/phoenix-media-rename/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phoenix-media-rename,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phoenix-media-rename/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phoenix-media-rename" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phone-orders-for-woocommerce-6736c43448ceec0a8c35031a10886cda.yaml b/nuclei-templates/cve-less/plugins/phone-orders-for-woocommerce-6736c43448ceec0a8c35031a10886cda.yaml new file mode 100644 index 0000000000..c60bd240f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phone-orders-for-woocommerce-6736c43448ceec0a8c35031a10886cda.yaml @@ -0,0 +1,58 @@ +id: phone-orders-for-woocommerce-6736c43448ceec0a8c35031a10886cda + +info: + name: > + Phone Orders for WooCommerce <= 3.7.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5c9d5de-f0d0-4469-97cc-8a25740c8fde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phone-orders-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/phone-orders-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phone-orders-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phone-orders-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phone-orders-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phone-orders-for-woocommerce-f53b59e3d01b975c6802657d08b4d293.yaml b/nuclei-templates/cve-less/plugins/phone-orders-for-woocommerce-f53b59e3d01b975c6802657d08b4d293.yaml new file mode 100644 index 0000000000..1ca6b165f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phone-orders-for-woocommerce-f53b59e3d01b975c6802657d08b4d293.yaml @@ -0,0 +1,58 @@ +id: phone-orders-for-woocommerce-f53b59e3d01b975c6802657d08b4d293 + +info: + name: > + Phone Orders for WooCommerce <= 3.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dd928cb-5466-424e-a87a-3a9618edb56b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phone-orders-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/phone-orders-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phone-orders-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phone-orders-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phone-orders-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phonepe-payment-solutions-da56011233283b841dd7c13f7f29d7e9.yaml b/nuclei-templates/cve-less/plugins/phonepe-payment-solutions-da56011233283b841dd7c13f7f29d7e9.yaml new file mode 100644 index 0000000000..342621ba6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phonepe-payment-solutions-da56011233283b841dd7c13f7f29d7e9.yaml @@ -0,0 +1,58 @@ +id: phonepe-payment-solutions-da56011233283b841dd7c13f7f29d7e9 + +info: + name: > + PhonePe Payment Solutions <= 1.0.15 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f24f7e2-2516-4f4d-955f-f3f6001cbce7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phonepe-payment-solutions/" + google-query: inurl:"/wp-content/plugins/phonepe-payment-solutions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phonepe-payment-solutions,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phonepe-payment-solutions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phonepe-payment-solutions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phonetrack-meu-site-manager-86d1730d65ed535523c7e0c21cf9f29e.yaml b/nuclei-templates/cve-less/plugins/phonetrack-meu-site-manager-86d1730d65ed535523c7e0c21cf9f29e.yaml new file mode 100644 index 0000000000..0240e0ca49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phonetrack-meu-site-manager-86d1730d65ed535523c7e0c21cf9f29e.yaml @@ -0,0 +1,58 @@ +id: phonetrack-meu-site-manager-86d1730d65ed535523c7e0c21cf9f29e + +info: + name: > + PhoneTrack Meu Site Manager <= 0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d7e59e-962c-45d9-b3be-033bccf4c6b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phonetrack-meu-site-manager/" + google-query: inurl:"/wp-content/plugins/phonetrack-meu-site-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phonetrack-meu-site-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phonetrack-meu-site-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phonetrack-meu-site-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-contest-81dceae2605fe02ec91915c9cd7ee232.yaml b/nuclei-templates/cve-less/plugins/photo-contest-81dceae2605fe02ec91915c9cd7ee232.yaml new file mode 100644 index 0000000000..00d9103c0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-contest-81dceae2605fe02ec91915c9cd7ee232.yaml @@ -0,0 +1,58 @@ +id: photo-contest-81dceae2605fe02ec91915c9cd7ee232 + +info: + name: > + WordPress Photo Gallery – Image Gallery <= 1.0.6 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1355bc94-7110-4d61-855e-78889e58dcad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-contest/" + google-query: inurl:"/wp-content/plugins/photo-contest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-contest,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-contest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-contest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-feed-e1280c44c0ffb9515ed7d76fdbc69b53.yaml b/nuclei-templates/cve-less/plugins/photo-feed-e1280c44c0ffb9515ed7d76fdbc69b53.yaml new file mode 100644 index 0000000000..86177f5f02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-feed-e1280c44c0ffb9515ed7d76fdbc69b53.yaml @@ -0,0 +1,58 @@ +id: photo-feed-e1280c44c0ffb9515ed7d76fdbc69b53 + +info: + name: > + Photo Feed <= 2.2.1 - Reflected Cross-Site Scripting via pf-gid + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a36b98b-7197-434e-88ac-6fcfa34d6abb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-feed/" + google-query: inurl:"/wp-content/plugins/photo-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-02d4095d603887ea90170c039ddd4ef1.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-02d4095d603887ea90170c039ddd4ef1.yaml new file mode 100644 index 0000000000..a190d4cad9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-02d4095d603887ea90170c039ddd4ef1.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-02d4095d603887ea90170c039ddd4ef1 + +info: + name: > + Photo Gallery by 10Web <= 1.5.68 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99c89e29-a21d-4c32-9459-18c7b08b9ff0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-03f9356825118ca4016abd782e8ac0fc.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-03f9356825118ca4016abd782e8ac0fc.yaml new file mode 100644 index 0000000000..0db3ad6e0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-03f9356825118ca4016abd782e8ac0fc.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-03f9356825118ca4016abd782e8ac0fc + +info: + name: > + Photo Gallery by 10Web <= 1.6.8 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b271f2f-d765-4d2d-bb0d-f8425ebc64ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-16de4bf636763685f8c5b31304d24a38.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-16de4bf636763685f8c5b31304d24a38.yaml new file mode 100644 index 0000000000..5b82a3b5a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-16de4bf636763685f8c5b31304d24a38.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-16de4bf636763685f8c5b31304d24a38 + +info: + name: > + Photo Gallery by 10Web <= 1.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/892a1983-018b-480d-adab-29c32fd88be5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-1cfd262b55edc365cf2f57c5e6d1da2e.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-1cfd262b55edc365cf2f57c5e6d1da2e.yaml new file mode 100644 index 0000000000..553863e299 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-1cfd262b55edc365cf2f57c5e6d1da2e.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-1cfd262b55edc365cf2f57c5e6d1da2e + +info: + name: > + Photo Gallery by 10Web <= 1.5.34 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b004955a-7580-4dc8-beee-e55785026fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-1defc4b79b3e0026fa5b8dc78f8c4d1d.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-1defc4b79b3e0026fa5b8dc78f8c4d1d.yaml new file mode 100644 index 0000000000..bce05a9731 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-1defc4b79b3e0026fa5b8dc78f8c4d1d.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-1defc4b79b3e0026fa5b8dc78f8c4d1d + +info: + name: > + Photo Gallery by 10Web <= 1.6.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4093f00-838b-49d1-930c-c7ee2238046f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-1e81e15f7eef3b25cd39002edd8c241e.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-1e81e15f7eef3b25cd39002edd8c241e.yaml new file mode 100644 index 0000000000..6ac5cfbfff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-1e81e15f7eef3b25cd39002edd8c241e.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-1e81e15f7eef3b25cd39002edd8c241e + +info: + name: > + Photo Gallery by 10Web <= 1.2.10 - Authenticated SQL Injection via asc_or_desc Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bfd4e4c-63c2-4442-b91a-ca940a31c3be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-2338e1fdce13dabaa9329802ae34890e.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-2338e1fdce13dabaa9329802ae34890e.yaml new file mode 100644 index 0000000000..4afa86fd3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-2338e1fdce13dabaa9329802ae34890e.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-2338e1fdce13dabaa9329802ae34890e + +info: + name: > + Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.8.7 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cc590fe-94c8-47cc-bd5b-eef70da138b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-2357c93b70517db0a31d3d99ea026f13.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-2357c93b70517db0a31d3d99ea026f13.yaml new file mode 100644 index 0000000000..8282e3d50b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-2357c93b70517db0a31d3d99ea026f13.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-2357c93b70517db0a31d3d99ea026f13 + +info: + name: > + Photo Gallery <= 1.7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d65b779-717b-4efc-b13d-acdf83ca1e63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-309d3be2a8406e388de1750ae092da31.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-309d3be2a8406e388de1750ae092da31.yaml new file mode 100644 index 0000000000..8834566927 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-309d3be2a8406e388de1750ae092da31.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-309d3be2a8406e388de1750ae092da31 + +info: + name: > + Photo Gallery by 10Web <= 1.2.7 - Unauthenticated Blind SQL Injection via order_by Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55a0b4ad-de5e-4203-a702-d498bf566165?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-398552849d43600c1c4eab92f19672ff.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-398552849d43600c1c4eab92f19672ff.yaml new file mode 100644 index 0000000000..3243ae8905 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-398552849d43600c1c4eab92f19672ff.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-398552849d43600c1c4eab92f19672ff + +info: + name: > + Photo Gallery by 10Web <= 1.5.54 - SQL Injection via bwg_search_x Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/695819e6-2574-4047-a55d-a78289c29ba0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-3c5bac80199ef30099a13588ec30b8cb.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-3c5bac80199ef30099a13588ec30b8cb.yaml new file mode 100644 index 0000000000..7d858ea489 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-3c5bac80199ef30099a13588ec30b8cb.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-3c5bac80199ef30099a13588ec30b8cb + +info: + name: > + Photo Gallery by 10Web <= 1.5.78 - Stored Cross-Site Scripting via Uploaded SVG + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7d84cb9-175f-433c-ab5c-d89621847b4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.78') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-44b42ab3cc67f2808aca4c4c544fe3ed.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-44b42ab3cc67f2808aca4c4c544fe3ed.yaml new file mode 100644 index 0000000000..2460134610 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-44b42ab3cc67f2808aca4c4c544fe3ed.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-44b42ab3cc67f2808aca4c4c544fe3ed + +info: + name: > + Photo Gallery by 10Web <= 1.6.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63e167ef-9f03-45a8-b3dc-240ccf1ea6c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-4ee123ab64de9526a768d6e54f2c4b2d.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-4ee123ab64de9526a768d6e54f2c4b2d.yaml new file mode 100644 index 0000000000..097b16f6bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-4ee123ab64de9526a768d6e54f2c4b2d.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-4ee123ab64de9526a768d6e54f2c4b2d + +info: + name: > + Photo Gallery by 10Web <= 1.5.34 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e08e1b5-d388-46cf-a9e7-4bab2a09667f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-52e7ff3acb78cedfa1cc6fc74cf893bd.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-52e7ff3acb78cedfa1cc6fc74cf893bd.yaml new file mode 100644 index 0000000000..0f33f259e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-52e7ff3acb78cedfa1cc6fc74cf893bd.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-52e7ff3acb78cedfa1cc6fc74cf893bd + +info: + name: > + Photo Gallery by 10Web < 1.3.43 - Authenticated Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2e040bd-df5f-4b40-bc7b-9521f224c297?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-581d9bde9452d0889b5682513ff8db3d.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-581d9bde9452d0889b5682513ff8db3d.yaml new file mode 100644 index 0000000000..32f709111a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-581d9bde9452d0889b5682513ff8db3d.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-581d9bde9452d0889b5682513ff8db3d + +info: + name: > + Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.8.21 - Reflected Cross-Site Scripting via 'image_id' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15253d0c-3425-4065-94d2-969939e858ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-620bdfabfd18b0eeb8341540ce2009f5.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-620bdfabfd18b0eeb8341540ce2009f5.yaml new file mode 100644 index 0000000000..8e903bf54e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-620bdfabfd18b0eeb8341540ce2009f5.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-620bdfabfd18b0eeb8341540ce2009f5 + +info: + name: > + Photo Gallery <= 1.8.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/806bbfb8-ebf3-4823-a241-91e01dc95228?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-6c9c7c812a4ff55c5f56daa5be2fd373.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-6c9c7c812a4ff55c5f56daa5be2fd373.yaml new file mode 100644 index 0000000000..63534d9514 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-6c9c7c812a4ff55c5f56daa5be2fd373.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-6c9c7c812a4ff55c5f56daa5be2fd373 + +info: + name: > + Photo Gallery by 10Web <= 1.2.41 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e78ec78-61e0-4c99-9e73-89fc6606fb97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-730408927df5a002660d3bc7f56fa1f5.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-730408927df5a002660d3bc7f56fa1f5.yaml new file mode 100644 index 0000000000..ea1ee56ec5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-730408927df5a002660d3bc7f56fa1f5.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-730408927df5a002660d3bc7f56fa1f5 + +info: + name: > + Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.8.21 - Authenticated (Admin+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/994a044d-db69-4f2d-9027-cf3665446ed3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-78fe6306f76d32a87cb79d1ed7a18344.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-78fe6306f76d32a87cb79d1ed7a18344.yaml new file mode 100644 index 0000000000..fe71c492a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-78fe6306f76d32a87cb79d1ed7a18344.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-78fe6306f76d32a87cb79d1ed7a18344 + +info: + name: > + Photo Gallery by 10Web <= 1.3.66 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c6fd92f-a541-42d1-8093-c3a4a61ab39b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-7aac6c0223fd33522df44de52ce8d8aa.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-7aac6c0223fd33522df44de52ce8d8aa.yaml new file mode 100644 index 0000000000..7951c863d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-7aac6c0223fd33522df44de52ce8d8aa.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-7aac6c0223fd33522df44de52ce8d8aa + +info: + name: > + Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.8.21 - Reflected Cross-Site Scripting via 'image_url' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11938a57-3eb7-4e7d-99ae-c6cf508cb4c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-7d9c26b229d5c8003d8d09b623e0e129.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-7d9c26b229d5c8003d8d09b623e0e129.yaml new file mode 100644 index 0000000000..00e620a4ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-7d9c26b229d5c8003d8d09b623e0e129.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-7d9c26b229d5c8003d8d09b623e0e129 + +info: + name: > + Photo Gallery by 10Web <= 1.3.50 - Authenticated SQL Injection via tag_id Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adab6dd8-3054-42ca-99ae-1fc65108f823?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-8058e0bec878d58968e8631efe964917.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-8058e0bec878d58968e8631efe964917.yaml new file mode 100644 index 0000000000..9f2684b230 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-8058e0bec878d58968e8631efe964917.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-8058e0bec878d58968e8631efe964917 + +info: + name: > + Photo Gallery <= 1.5.68 - Multiple Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd25daac-23a2-4375-9dc2-8e9f20a564c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-813522545f1eb15165129d8785a8fe18.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-813522545f1eb15165129d8785a8fe18.yaml new file mode 100644 index 0000000000..9fdf490c50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-813522545f1eb15165129d8785a8fe18.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-813522545f1eb15165129d8785a8fe18 + +info: + name: > + Photo Gallery by 10Web - Mobile-Friendly Image Gallery <= 1.8.19 - Directory Traversal to Arbitrary File Rename + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a3b8f32-f29d-4e67-8fad-202bfc8a9918?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-8372eec64ff21987a44ee27a8993e766.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-8372eec64ff21987a44ee27a8993e766.yaml new file mode 100644 index 0000000000..10789d302a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-8372eec64ff21987a44ee27a8993e766.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-8372eec64ff21987a44ee27a8993e766 + +info: + name: > + Photo Gallery by 10Web <= 1.8.18 - Authenticated (Administrator+) Stored Cross-Site Scripting via Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21b4d1a1-55fe-4241-820c-203991d724c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-8449cdb7230a3e1bb12d25a2395ff5c1.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-8449cdb7230a3e1bb12d25a2395ff5c1.yaml new file mode 100644 index 0000000000..61ba37bb3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-8449cdb7230a3e1bb12d25a2395ff5c1.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-8449cdb7230a3e1bb12d25a2395ff5c1 + +info: + name: > + Photo Gallery by 10Web <= 1.2.12 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce8e5635-a343-40b4-838c-21b942af5242?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-85912756aaaf6a5c4da322cb7b750dd5.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-85912756aaaf6a5c4da322cb7b750dd5.yaml new file mode 100644 index 0000000000..599dbee60e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-85912756aaaf6a5c4da322cb7b750dd5.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-85912756aaaf6a5c4da322cb7b750dd5 + +info: + name: > + Photo Gallery by 10Web <= 1.1.30 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ac6603f-7eed-424e-a56b-f45d4a7f7b2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-93b42b89f073fbc75b7062f5d47b5b66.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-93b42b89f073fbc75b7062f5d47b5b66.yaml new file mode 100644 index 0000000000..7e00bf91b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-93b42b89f073fbc75b7062f5d47b5b66.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-93b42b89f073fbc75b7062f5d47b5b66 + +info: + name: > + Photo Gallery by 10Web <= 1.5.22 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b1a2126-978c-48fa-b260-abfd26d0ec97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-9464a11b450ab411a742c340fdefaa58.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-9464a11b450ab411a742c340fdefaa58.yaml new file mode 100644 index 0000000000..998ae31043 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-9464a11b450ab411a742c340fdefaa58.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-9464a11b450ab411a742c340fdefaa58 + +info: + name: > + Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.5.68 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c1d8c1a-3adb-4b0b-8e2a-96ee2ff94218?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-9568a93cf21f83223317ab5745dc29b8.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-9568a93cf21f83223317ab5745dc29b8.yaml new file mode 100644 index 0000000000..8742509987 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-9568a93cf21f83223317ab5745dc29b8.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-9568a93cf21f83223317ab5745dc29b8 + +info: + name: > + Photo Gallery by 10Web <= 1.5.24 - Authenticated Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba60fb73-9056-4163-9874-f0f4af35f5b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-9f00578ac1259c4fd1c8b9de9165324f.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-9f00578ac1259c4fd1c8b9de9165324f.yaml new file mode 100644 index 0000000000..b5cf557a8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-9f00578ac1259c4fd1c8b9de9165324f.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-9f00578ac1259c4fd1c8b9de9165324f + +info: + name: > + Photo Gallery by 10Web <= 1.5.45 - Multiple Cross-Site Scripting Issues + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31579f6d-9a89-45e3-adfb-d59823a83c07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-b3f949bc68c2f0c560af03cf782c4a27.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-b3f949bc68c2f0c560af03cf782c4a27.yaml new file mode 100644 index 0000000000..a8193b2e1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-b3f949bc68c2f0c560af03cf782c4a27.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-b3f949bc68c2f0c560af03cf782c4a27 + +info: + name: > + Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.8.21 - Reflected Cross-Site Scripting via 'current_url' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13cfcc7a-8529-4bd5-9842-b9ad8eb5f4b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-b9e46f23f1c3c438cdb8dc39395715de.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-b9e46f23f1c3c438cdb8dc39395715de.yaml new file mode 100644 index 0000000000..ff8e98bb34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-b9e46f23f1c3c438cdb8dc39395715de.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-b9e46f23f1c3c438cdb8dc39395715de + +info: + name: > + Photo Gallery by 10Web <= 1.6.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d22435f-f0e3-42c3-935b-d26bb1ea846a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-be54fbb88b07e1793c0aea3459743537.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-be54fbb88b07e1793c0aea3459743537.yaml new file mode 100644 index 0000000000..1baa5c72d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-be54fbb88b07e1793c0aea3459743537.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-be54fbb88b07e1793c0aea3459743537 + +info: + name: > + Photo Gallery by 10Web <= 1.8.14 - Authenticated (Administrator+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0f55f3e-9a9a-42a7-91b5-0d515519d545?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-beed03e57da7da89d62ad65025967548.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-beed03e57da7da89d62ad65025967548.yaml new file mode 100644 index 0000000000..19e7f86d73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-beed03e57da7da89d62ad65025967548.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-beed03e57da7da89d62ad65025967548 + +info: + name: > + Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.8.21 - Reflected Cross-Site Scripting via 'thumb_url' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d254e43f-8a8b-4309-91f3-c60710c13647?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-bf638326d3a61d38ab0c3d9a56b1c934.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-bf638326d3a61d38ab0c3d9a56b1c934.yaml new file mode 100644 index 0000000000..0c968e2524 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-bf638326d3a61d38ab0c3d9a56b1c934.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-bf638326d3a61d38ab0c3d9a56b1c934 + +info: + name: > + Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.5.68 - Reflected Cross-Site Scripting <= 1.5.68 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0033a19-47ac-4ffc-93a4-2ea693e93397?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-c4eb24a39e4ca07448358eb29c4b844d.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-c4eb24a39e4ca07448358eb29c4b844d.yaml new file mode 100644 index 0000000000..b2e5a8bf99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-c4eb24a39e4ca07448358eb29c4b844d.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-c4eb24a39e4ca07448358eb29c4b844d + +info: + name: > + Photo Gallery <= 1.5.66 - Authenticated Stored Cross-Site Scripting via Gallery Title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d564606-695e-4e8c-90de-1d55afc06103?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-cab41f4f844db778ab337835cad811f5.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-cab41f4f844db778ab337835cad811f5.yaml new file mode 100644 index 0000000000..c72ba16e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-cab41f4f844db778ab337835cad811f5.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-cab41f4f844db778ab337835cad811f5 + +info: + name: > + Photo Gallery by 10Web <= 1.5.87 - Unauthenticated SQL Injection via bwg_tag_id_bwg_thumbnails_0 Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4ae4e05-cdbf-481f-abcc-9704e75ec8ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-cb06e44c5bf518af775ac99ec0dc273a.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-cb06e44c5bf518af775ac99ec0dc273a.yaml new file mode 100644 index 0000000000..097915d6cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-cb06e44c5bf518af775ac99ec0dc273a.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-cb06e44c5bf518af775ac99ec0dc273a + +info: + name: > + Photo Gallery by 10Web <= 1.5.30 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/708c2c69-aa1b-4bfb-bef5-f2faa1e49a10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-cc028d4daad55d43a1db8ea8a8a61c72.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-cc028d4daad55d43a1db8ea8a8a61c72.yaml new file mode 100644 index 0000000000..980ab525c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-cc028d4daad55d43a1db8ea8a8a61c72.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-cc028d4daad55d43a1db8ea8a8a61c72 + +info: + name: > + Photo Gallery <= 1.5.74 - File Upload Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23e0f61b-f122-46f7-83c8-7fcb022c45e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-cde70bc716e26c33fb792a26b5c7f5b0.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-cde70bc716e26c33fb792a26b5c7f5b0.yaml new file mode 100644 index 0000000000..d9a88118b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-cde70bc716e26c33fb792a26b5c7f5b0.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-cde70bc716e26c33fb792a26b5c7f5b0 + +info: + name: > + Photo Gallery by 10Web <= 1.6.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8aac2717-0d1c-4c77-9dd2-b659fa2863a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-d029a01fd5b93450433108c7576996d9.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-d029a01fd5b93450433108c7576996d9.yaml new file mode 100644 index 0000000000..46263cc79c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-d029a01fd5b93450433108c7576996d9.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-d029a01fd5b93450433108c7576996d9 + +info: + name: > + Photo Gallery <= 1.5.74 - Stored Cross-Site Scripting via Uploaded SVG + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/835f553b-9c43-47f2-aecf-61c9397e6b5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-d2f0c79f766915ada458669bedb0c203.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-d2f0c79f766915ada458669bedb0c203.yaml new file mode 100644 index 0000000000..d1cbf4a97f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-d2f0c79f766915ada458669bedb0c203.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-d2f0c79f766915ada458669bedb0c203 + +info: + name: > + Photo Gallery by 10Web <= 1.3.37 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e3034ae-957f-410d-80ef-4dc2b0e91ff5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.38') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-e07e7d71dc600bc27e4f1c11c365c393.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-e07e7d71dc600bc27e4f1c11c365c393.yaml new file mode 100644 index 0000000000..1359b472e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-e07e7d71dc600bc27e4f1c11c365c393.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-e07e7d71dc600bc27e4f1c11c365c393 + +info: + name: > + Photo Gallery <= 1.8.15 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1534f67d-cf3f-4185-9aa6-01ae5dee4f26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-e1df20c1816f9cf921b493870b0123b0.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-e1df20c1816f9cf921b493870b0123b0.yaml new file mode 100644 index 0000000000..3d36a995a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-e1df20c1816f9cf921b493870b0123b0.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-e1df20c1816f9cf921b493870b0123b0 + +info: + name: > + Photo Gallery by 10Web <= 1.2.10 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b49f379-7ae1-4da9-8e1b-cbe5a561b803?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-e8b3c520b2be53d9460363b1d88ad98e.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-e8b3c520b2be53d9460363b1d88ad98e.yaml new file mode 100644 index 0000000000..01215190b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-e8b3c520b2be53d9460363b1d88ad98e.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-e8b3c520b2be53d9460363b1d88ad98e + +info: + name: > + Photo Gallery by 10Web <= 1.2.5 - Unrestricted File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd1248b2-21ae-449e-acf8-3e5d6353f593?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-eaaac08a563441ff9dd67597a6450fdd.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-eaaac08a563441ff9dd67597a6450fdd.yaml new file mode 100644 index 0000000000..715290b8c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-eaaac08a563441ff9dd67597a6450fdd.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-eaaac08a563441ff9dd67597a6450fdd + +info: + name: > + Photo Gallery <= 1.5.67 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65402225-99ba-49ff-807b-b8e4cf474ffb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-ec16eda1a0270dfc503649db472e9967.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-ec16eda1a0270dfc503649db472e9967.yaml new file mode 100644 index 0000000000..4c31eeb0ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-ec16eda1a0270dfc503649db472e9967.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-ec16eda1a0270dfc503649db472e9967 + +info: + name: > + Photo Gallery by 10Web <= 1.5.34 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b7c9d89-c6bf-4973-87c8-0511758519f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-f4f85c5436cdac307c05feb98557fa30.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-f4f85c5436cdac307c05feb98557fa30.yaml new file mode 100644 index 0000000000..44489e939f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-f4f85c5436cdac307c05feb98557fa30.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-f4f85c5436cdac307c05feb98557fa30 + +info: + name: > + Photo Gallery by 10Web <= 1.6.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93c1b6d2-a818-4ce5-96b7-524fac4081b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photo-gallery-f6467ad8511f5004bea6f7b6c2cbc45b.yaml b/nuclei-templates/cve-less/plugins/photo-gallery-f6467ad8511f5004bea6f7b6c2cbc45b.yaml new file mode 100644 index 0000000000..fb66c4f2c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photo-gallery-f6467ad8511f5004bea6f7b6c2cbc45b.yaml @@ -0,0 +1,58 @@ +id: photo-gallery-f6467ad8511f5004bea6f7b6c2cbc45b + +info: + name: > + Photo Gallery by 10Web <= 1.8.20 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7897ebc7-3ede-465e-b037-86096eb4435a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photo-gallery/" + google-query: inurl:"/wp-content/plugins/photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-0310acae90d1336d07b5ec2866c09354.yaml b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-0310acae90d1336d07b5ec2866c09354.yaml new file mode 100644 index 0000000000..e7e14a1d34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-0310acae90d1336d07b5ec2866c09354.yaml @@ -0,0 +1,58 @@ +id: photoblocks-grid-gallery-0310acae90d1336d07b5ec2866c09354 + +info: + name: > + Gallery PhotoBlocks <= 1.1.42 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a759f4f4-6e0b-4754-b5b5-d110a050d0ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoblocks-grid-gallery/" + google-query: inurl:"/wp-content/plugins/photoblocks-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoblocks-grid-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoblocks-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoblocks-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-367ff78bbe085f960fe46db042a99b4e.yaml b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-367ff78bbe085f960fe46db042a99b4e.yaml new file mode 100644 index 0000000000..6c79c165ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-367ff78bbe085f960fe46db042a99b4e.yaml @@ -0,0 +1,58 @@ +id: photoblocks-grid-gallery-367ff78bbe085f960fe46db042a99b4e + +info: + name: > + Gallery PhotoBlocks <= 1.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22476135-8951-4012-845b-46a5dfbfc1f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoblocks-grid-gallery/" + google-query: inurl:"/wp-content/plugins/photoblocks-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoblocks-grid-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoblocks-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoblocks-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-7aee34ffd65481adae802a1b67540af3.yaml b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-7aee34ffd65481adae802a1b67540af3.yaml new file mode 100644 index 0000000000..c9d609b144 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-7aee34ffd65481adae802a1b67540af3.yaml @@ -0,0 +1,58 @@ +id: photoblocks-grid-gallery-7aee34ffd65481adae802a1b67540af3 + +info: + name: > + Gallery PhotoBlocks <= 1.2.8 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08c957fb-05e8-489e-846e-1afb0ca6750f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoblocks-grid-gallery/" + google-query: inurl:"/wp-content/plugins/photoblocks-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoblocks-grid-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoblocks-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoblocks-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-a3750b38ee19e455b2f22ad25b740352.yaml b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-a3750b38ee19e455b2f22ad25b740352.yaml new file mode 100644 index 0000000000..cc78408d5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-a3750b38ee19e455b2f22ad25b740352.yaml @@ -0,0 +1,58 @@ +id: photoblocks-grid-gallery-a3750b38ee19e455b2f22ad25b740352 + +info: + name: > + Gallery Photoblocks <= 1.1.40 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ede6c4d1-e4bd-44c0-a66a-fffc0e1b22f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoblocks-grid-gallery/" + google-query: inurl:"/wp-content/plugins/photoblocks-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoblocks-grid-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoblocks-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoblocks-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-acd433b1de86848d8124ba9bb8ed6ee0.yaml b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-acd433b1de86848d8124ba9bb8ed6ee0.yaml new file mode 100644 index 0000000000..f4688aafc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-acd433b1de86848d8124ba9bb8ed6ee0.yaml @@ -0,0 +1,58 @@ +id: photoblocks-grid-gallery-acd433b1de86848d8124ba9bb8ed6ee0 + +info: + name: > + Gallery PhotoBlocks <= 1.2.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/540d1c86-c648-42e1-a360-cc188d1a5635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoblocks-grid-gallery/" + google-query: inurl:"/wp-content/plugins/photoblocks-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoblocks-grid-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoblocks-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoblocks-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9e51534ac4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: photoblocks-grid-gallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoblocks-grid-gallery/" + google-query: inurl:"/wp-content/plugins/photoblocks-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoblocks-grid-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoblocks-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoblocks-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-e067b113a87087f2914c0d765908e157.yaml b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-e067b113a87087f2914c0d765908e157.yaml new file mode 100644 index 0000000000..9da49cf607 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoblocks-grid-gallery-e067b113a87087f2914c0d765908e157.yaml @@ -0,0 +1,58 @@ +id: photoblocks-grid-gallery-e067b113a87087f2914c0d765908e157 + +info: + name: > + Gallery PhotoBlocks <= 1.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/929085b2-3038-41d1-bd61-ce9e7dc79f78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoblocks-grid-gallery/" + google-query: inurl:"/wp-content/plugins/photoblocks-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoblocks-grid-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoblocks-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoblocks-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photographer-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/photographer-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..e15f371490 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photographer-directory-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: photographer-directory-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photographer-directory/" + google-query: inurl:"/wp-content/plugins/photographer-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photographer-directory,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photographer-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photographer-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoracer-ee5b679f01639572a698b05d286d526c.yaml b/nuclei-templates/cve-less/plugins/photoracer-ee5b679f01639572a698b05d286d526c.yaml new file mode 100644 index 0000000000..14ec11bdb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoracer-ee5b679f01639572a698b05d286d526c.yaml @@ -0,0 +1,58 @@ +id: photoracer-ee5b679f01639572a698b05d286d526c + +info: + name: > + Photoracer Plugin <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e920caeb-5ee6-4428-9b53-edee316ee39f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoracer/" + google-query: inurl:"/wp-content/plugins/photoracer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoracer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoracer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoracer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photosmash-galleries-33a2e7fa2283855eea0bc65fb87d66e5.yaml b/nuclei-templates/cve-less/plugins/photosmash-galleries-33a2e7fa2283855eea0bc65fb87d66e5.yaml new file mode 100644 index 0000000000..27ccfcc424 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photosmash-galleries-33a2e7fa2283855eea0bc65fb87d66e5.yaml @@ -0,0 +1,58 @@ +id: photosmash-galleries-33a2e7fa2283855eea0bc65fb87d66e5 + +info: + name: > + Photosmash Plugin < 1.0.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c42b646f-7a41-416b-8632-d088b8d0cb7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photosmash-galleries/" + google-query: inurl:"/wp-content/plugins/photosmash-galleries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photosmash-galleries,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photosmash-galleries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photosmash-galleries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photospace-7457dd966d0c4c8ae20cdc84ea24da94.yaml b/nuclei-templates/cve-less/plugins/photospace-7457dd966d0c4c8ae20cdc84ea24da94.yaml new file mode 100644 index 0000000000..a7523a4df0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photospace-7457dd966d0c4c8ae20cdc84ea24da94.yaml @@ -0,0 +1,58 @@ +id: photospace-7457dd966d0c4c8ae20cdc84ea24da94 + +info: + name: > + Photospace Gallery <= 2.3.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51212d87-8723-4ba7-8fa4-78912a56385f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photospace/" + google-query: inurl:"/wp-content/plugins/photospace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photospace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photospace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photospace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photospace-b019cad8ad64e7103a4ef60d49f6dea3.yaml b/nuclei-templates/cve-less/plugins/photospace-b019cad8ad64e7103a4ef60d49f6dea3.yaml new file mode 100644 index 0000000000..f66b0a3322 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photospace-b019cad8ad64e7103a4ef60d49f6dea3.yaml @@ -0,0 +1,58 @@ +id: photospace-b019cad8ad64e7103a4ef60d49f6dea3 + +info: + name: > + Photospace Gallery <= 2.3.5 - Missing Authorization to Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32db57ec-47f8-4b33-b22c-6d8c079412a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photospace/" + google-query: inurl:"/wp-content/plugins/photospace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photospace,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photospace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photospace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photospace-responsive-27268d0b59c1274c726da2859a7e1b6d.yaml b/nuclei-templates/cve-less/plugins/photospace-responsive-27268d0b59c1274c726da2859a7e1b6d.yaml new file mode 100644 index 0000000000..ac8ffd3932 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photospace-responsive-27268d0b59c1274c726da2859a7e1b6d.yaml @@ -0,0 +1,58 @@ +id: photospace-responsive-27268d0b59c1274c726da2859a7e1b6d + +info: + name: > + Photospace Responsive <= 2.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bc98896-6ff9-40de-ace2-2ca331c2a44a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photospace-responsive/" + google-query: inurl:"/wp-content/plugins/photospace-responsive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photospace-responsive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photospace-responsive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photospace-responsive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photospace-responsive-b4a8b8c1c6aa3303fd49306d6d3da366.yaml b/nuclei-templates/cve-less/plugins/photospace-responsive-b4a8b8c1c6aa3303fd49306d6d3da366.yaml new file mode 100644 index 0000000000..5e443aa501 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photospace-responsive-b4a8b8c1c6aa3303fd49306d6d3da366.yaml @@ -0,0 +1,58 @@ +id: photospace-responsive-b4a8b8c1c6aa3303fd49306d6d3da366 + +info: + name: > + Photospace Responsive <= 1.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/645552ef-84aa-4f51-93d4-cb85c43fed58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photospace-responsive/" + google-query: inurl:"/wp-content/plugins/photospace-responsive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photospace-responsive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photospace-responsive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photospace-responsive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoswipe-masonry-4086b1cacdc76d37665a053863a25b12.yaml b/nuclei-templates/cve-less/plugins/photoswipe-masonry-4086b1cacdc76d37665a053863a25b12.yaml new file mode 100644 index 0000000000..6abf2835a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoswipe-masonry-4086b1cacdc76d37665a053863a25b12.yaml @@ -0,0 +1,58 @@ +id: photoswipe-masonry-4086b1cacdc76d37665a053863a25b12 + +info: + name: > + Photoswipe Masonry Gallery <= 1.2.14 Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64624d4c-3ffb-4516-a938-0accde24c79f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoswipe-masonry/" + google-query: inurl:"/wp-content/plugins/photoswipe-masonry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoswipe-masonry,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoswipe-masonry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoswipe-masonry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoxhibit-c1c78bdc1547ba62275f78af4206540e.yaml b/nuclei-templates/cve-less/plugins/photoxhibit-c1c78bdc1547ba62275f78af4206540e.yaml new file mode 100644 index 0000000000..09a9b2e2fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoxhibit-c1c78bdc1547ba62275f78af4206540e.yaml @@ -0,0 +1,58 @@ +id: photoxhibit-c1c78bdc1547ba62275f78af4206540e + +info: + name: > + Photoxhibit <= 2.1.8 - Reflected Cross-Site Scripting via gid + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7d667af-d15f-4fe0-91af-36a3ed314760?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoxhibit/" + google-query: inurl:"/wp-content/plugins/photoxhibit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoxhibit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoxhibit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoxhibit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/photoxhibit-d80b7a12cea76f24d05fbaefc82e821f.yaml b/nuclei-templates/cve-less/plugins/photoxhibit-d80b7a12cea76f24d05fbaefc82e821f.yaml new file mode 100644 index 0000000000..c4f563632e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/photoxhibit-d80b7a12cea76f24d05fbaefc82e821f.yaml @@ -0,0 +1,58 @@ +id: photoxhibit-d80b7a12cea76f24d05fbaefc82e821f + +info: + name: > + Photoxhibit <= 2.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02ecd818-4c96-463e-b9ab-5900c1d01a39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/photoxhibit/" + google-query: inurl:"/wp-content/plugins/photoxhibit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,photoxhibit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/photoxhibit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photoxhibit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-compatibility-checker-22cbdfe6497edcc66032227e018ed1b2.yaml b/nuclei-templates/cve-less/plugins/php-compatibility-checker-22cbdfe6497edcc66032227e018ed1b2.yaml new file mode 100644 index 0000000000..3920461988 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-compatibility-checker-22cbdfe6497edcc66032227e018ed1b2.yaml @@ -0,0 +1,58 @@ +id: php-compatibility-checker-22cbdfe6497edcc66032227e018ed1b2 + +info: + name: > + PHP Compatibility Checker <= 1.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41fada19-c697-4078-825b-0bdf6a827b02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-compatibility-checker/" + google-query: inurl:"/wp-content/plugins/php-compatibility-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-compatibility-checker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-compatibility-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-compatibility-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-event-calendar-f4190c07f620d8114bc44ea330931d2f.yaml b/nuclei-templates/cve-less/plugins/php-event-calendar-f4190c07f620d8114bc44ea330931d2f.yaml new file mode 100644 index 0000000000..76436467c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-event-calendar-f4190c07f620d8114bc44ea330931d2f.yaml @@ -0,0 +1,58 @@ +id: php-event-calendar-f4190c07f620d8114bc44ea330931d2f + +info: + name: > + PHP Event Calendar for WordPress < 1.5.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/781a15da-5747-4480-a8a6-2944632742c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-event-calendar/" + google-query: inurl:"/wp-content/plugins/php-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-event-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-everywhere-80daa229706432d7991ba35deb710b25.yaml b/nuclei-templates/cve-less/plugins/php-everywhere-80daa229706432d7991ba35deb710b25.yaml new file mode 100644 index 0000000000..ad388e5d31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-everywhere-80daa229706432d7991ba35deb710b25.yaml @@ -0,0 +1,58 @@ +id: php-everywhere-80daa229706432d7991ba35deb710b25 + +info: + name: > + PHP Everywhere <= 2.0.3 - Remote Code Execution by Contributor+ users via gutenberg block + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7aa62be9-93b9-423f-89f8-809ca0035547?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-everywhere/" + google-query: inurl:"/wp-content/plugins/php-everywhere/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-everywhere,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-everywhere/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-everywhere" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-everywhere-83059d16d11e2fca8e78916d3d8e8973.yaml b/nuclei-templates/cve-less/plugins/php-everywhere-83059d16d11e2fca8e78916d3d8e8973.yaml new file mode 100644 index 0000000000..51d59de4d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-everywhere-83059d16d11e2fca8e78916d3d8e8973.yaml @@ -0,0 +1,58 @@ +id: php-everywhere-83059d16d11e2fca8e78916d3d8e8973 + +info: + name: > + PHP Everywhere <= 2.0.3 - Authenticated (Contributor+) Remote Code Execution via Metabox + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e52882e-d86f-4863-bdb6-e33c0449d14c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-everywhere/" + google-query: inurl:"/wp-content/plugins/php-everywhere/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-everywhere,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-everywhere/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-everywhere" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-everywhere-a30d359b699628ff181230d080160c5b.yaml b/nuclei-templates/cve-less/plugins/php-everywhere-a30d359b699628ff181230d080160c5b.yaml new file mode 100644 index 0000000000..a2f2bc6f67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-everywhere-a30d359b699628ff181230d080160c5b.yaml @@ -0,0 +1,58 @@ +id: php-everywhere-a30d359b699628ff181230d080160c5b + +info: + name: > + PHP Everywhere <= 2.0.3 - Remote Code Execution by Subscriber+ users via shortcode + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d33467d4-aabd-4030-ba10-68e2460b2ed2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-everywhere/" + google-query: inurl:"/wp-content/plugins/php-everywhere/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-everywhere,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-everywhere/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-everywhere" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-everywhere-f8e9e8a25542e313c19a4d2c9a30bf10.yaml b/nuclei-templates/cve-less/plugins/php-everywhere-f8e9e8a25542e313c19a4d2c9a30bf10.yaml new file mode 100644 index 0000000000..17ebf7f775 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-everywhere-f8e9e8a25542e313c19a4d2c9a30bf10.yaml @@ -0,0 +1,58 @@ +id: php-everywhere-f8e9e8a25542e313c19a4d2c9a30bf10 + +info: + name: > + PHP Everywhere <= 2.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2cd027b-fbaa-41ce-8822-2fa16aa93eb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-everywhere/" + google-query: inurl:"/wp-content/plugins/php-everywhere/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-everywhere,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-everywhere/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-everywhere" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-execution-plugin-83ff6d6d9bc5d168afdb537857550fe7.yaml b/nuclei-templates/cve-less/plugins/php-execution-plugin-83ff6d6d9bc5d168afdb537857550fe7.yaml new file mode 100644 index 0000000000..654d516a9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-execution-plugin-83ff6d6d9bc5d168afdb537857550fe7.yaml @@ -0,0 +1,58 @@ +id: php-execution-plugin-83ff6d6d9bc5d168afdb537857550fe7 + +info: + name: > + PHP Execution <= 1.0.0 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4f2112f-d5dc-4045-ac58-3895d6ac7179?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-execution-plugin/" + google-query: inurl:"/wp-content/plugins/php-execution-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-execution-plugin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-execution-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-execution-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-shell-20137b81f547271c9a3bb4e93eb30f06.yaml b/nuclei-templates/cve-less/plugins/php-shell-20137b81f547271c9a3bb4e93eb30f06.yaml new file mode 100644 index 0000000000..ab9e36efdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-shell-20137b81f547271c9a3bb4e93eb30f06.yaml @@ -0,0 +1,58 @@ +id: php-shell-20137b81f547271c9a3bb4e93eb30f06 + +info: + name: > + PHP Shell (All Versions) - Backdoor + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8cbd521-f2d4-4cf6-a50f-ed42f4d21989?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-shell/" + google-query: inurl:"/wp-content/plugins/php-shell/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-shell,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-shell/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-shell" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/php-to-page-ae8fa6f84b5149157cb1430a27dde4d8.yaml b/nuclei-templates/cve-less/plugins/php-to-page-ae8fa6f84b5149157cb1430a27dde4d8.yaml new file mode 100644 index 0000000000..c5567f8d61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/php-to-page-ae8fa6f84b5149157cb1430a27dde4d8.yaml @@ -0,0 +1,58 @@ +id: php-to-page-ae8fa6f84b5149157cb1430a27dde4d8 + +info: + name: > + PHP to Page <= 0.3 - Authenticated (Subscriber+) Local File Inclusion to Remote Code Execution via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83e5a0dc-fc51-4565-945f-190cf9175874?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/php-to-page/" + google-query: inurl:"/wp-content/plugins/php-to-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,php-to-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/php-to-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "php-to-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phpfreechat-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/phpfreechat-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..6041afe008 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phpfreechat-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: phpfreechat-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phpfreechat/" + google-query: inurl:"/wp-content/plugins/phpfreechat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phpfreechat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phpfreechat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phpfreechat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phpinfo-wp-68aed4fb719e93aff911b8c6723e373b.yaml b/nuclei-templates/cve-less/plugins/phpinfo-wp-68aed4fb719e93aff911b8c6723e373b.yaml new file mode 100644 index 0000000000..ca52b78575 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phpinfo-wp-68aed4fb719e93aff911b8c6723e373b.yaml @@ -0,0 +1,58 @@ +id: phpinfo-wp-68aed4fb719e93aff911b8c6723e373b + +info: + name: > + phpinfo() WP <= 4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e944a08-b6c1-456f-921a-501ab4b59f31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phpinfo-wp/" + google-query: inurl:"/wp-content/plugins/phpinfo-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phpinfo-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phpinfo-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phpinfo-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/phppoet-checkout-fields-95830f5764b8d010ddba582e5df78be8.yaml b/nuclei-templates/cve-less/plugins/phppoet-checkout-fields-95830f5764b8d010ddba582e5df78be8.yaml new file mode 100644 index 0000000000..c02749cd58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/phppoet-checkout-fields-95830f5764b8d010ddba582e5df78be8.yaml @@ -0,0 +1,58 @@ +id: phppoet-checkout-fields-95830f5764b8d010ddba582e5df78be8 + +info: + name: > + WooCommerce Easy Checkout Field Editor, Fees & Discounts <= 3.5.12 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fb0195a-077e-4f43-9294-1e5ecad7eb82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/phppoet-checkout-fields/" + google-query: inurl:"/wp-content/plugins/phppoet-checkout-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,phppoet-checkout-fields,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/phppoet-checkout-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "phppoet-checkout-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pi-woocommerce-order-date-time-and-type-79edec65d658aad88495c54f54d3669a.yaml b/nuclei-templates/cve-less/plugins/pi-woocommerce-order-date-time-and-type-79edec65d658aad88495c54f54d3669a.yaml new file mode 100644 index 0000000000..1bde4dc0e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pi-woocommerce-order-date-time-and-type-79edec65d658aad88495c54f54d3669a.yaml @@ -0,0 +1,58 @@ +id: pi-woocommerce-order-date-time-and-type-79edec65d658aad88495c54f54d3669a + +info: + name: > + Order date time for WooCommerce <= 3.0.19 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f19006a0-6848-467b-90ed-33b3ebd2c7ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pi-woocommerce-order-date-time-and-type/" + google-query: inurl:"/wp-content/plugins/pi-woocommerce-order-date-time-and-type/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pi-woocommerce-order-date-time-and-type,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pi-woocommerce-order-date-time-and-type/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pi-woocommerce-order-date-time-and-type" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pica-photo-gallery-8ca0f44f9fa619376b40462781065a27.yaml b/nuclei-templates/cve-less/plugins/pica-photo-gallery-8ca0f44f9fa619376b40462781065a27.yaml new file mode 100644 index 0000000000..01d6e28249 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pica-photo-gallery-8ca0f44f9fa619376b40462781065a27.yaml @@ -0,0 +1,58 @@ +id: pica-photo-gallery-8ca0f44f9fa619376b40462781065a27 + +info: + name: > + PICA Photo Gallery <= 1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26d83a9d-3e51-450e-b3cb-7c53a4bcba60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pica-photo-gallery/" + google-query: inurl:"/wp-content/plugins/pica-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pica-photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pica-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pica-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pictobrowser-gallery-0f95bb65415e0d0bde6379a1fe073b9f.yaml b/nuclei-templates/cve-less/plugins/pictobrowser-gallery-0f95bb65415e0d0bde6379a1fe073b9f.yaml new file mode 100644 index 0000000000..7145580289 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pictobrowser-gallery-0f95bb65415e0d0bde6379a1fe073b9f.yaml @@ -0,0 +1,58 @@ +id: pictobrowser-gallery-0f95bb65415e0d0bde6379a1fe073b9f + +info: + name: > + PictoBrowser Gallery <= 0.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08396330-4fb8-4df0-b7eb-3d3b847cb9b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pictobrowser-gallery/" + google-query: inurl:"/wp-content/plugins/pictobrowser-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pictobrowser-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pictobrowser-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pictobrowser-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pictpress-307c3c6d6bec988e070cfcb7b09e6f6d.yaml b/nuclei-templates/cve-less/plugins/pictpress-307c3c6d6bec988e070cfcb7b09e6f6d.yaml new file mode 100644 index 0000000000..5be518f9aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pictpress-307c3c6d6bec988e070cfcb7b09e6f6d.yaml @@ -0,0 +1,58 @@ +id: pictpress-307c3c6d6bec988e070cfcb7b09e6f6d + +info: + name: > + PictPress <= 0.91 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c22b9505-6341-4db8-9d21-23796caf63d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pictpress/" + google-query: inurl:"/wp-content/plugins/pictpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pictpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pictpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pictpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/picture-gallery-f15ed32464b8a833a76a0b7a1fe8248d.yaml b/nuclei-templates/cve-less/plugins/picture-gallery-f15ed32464b8a833a76a0b7a1fe8248d.yaml new file mode 100644 index 0000000000..1e9d657e0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/picture-gallery-f15ed32464b8a833a76a0b7a1fe8248d.yaml @@ -0,0 +1,58 @@ +id: picture-gallery-f15ed32464b8a833a76a0b7a1fe8248d + +info: + name: > + Picture Gallery – Frontend Image Uploads, AJAX Photo List < 1.4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea01e11e-31b5-4cd9-8fab-3693e47f705a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/picture-gallery/" + google-query: inurl:"/wp-content/plugins/picture-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,picture-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/picture-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "picture-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/picturesurf-gallery-520d5dbf8af2830d0201decc2e42cccf.yaml b/nuclei-templates/cve-less/plugins/picturesurf-gallery-520d5dbf8af2830d0201decc2e42cccf.yaml new file mode 100644 index 0000000000..0596942e20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/picturesurf-gallery-520d5dbf8af2830d0201decc2e42cccf.yaml @@ -0,0 +1,58 @@ +id: picturesurf-gallery-520d5dbf8af2830d0201decc2e42cccf + +info: + name: > + Picturesurf Gallery <= 1.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c54d503f-9de5-496f-bd6d-2e417a5c1b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/picturesurf-gallery/" + google-query: inurl:"/wp-content/plugins/picturesurf-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,picturesurf-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/picturesurf-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "picturesurf-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-forms-for-wp-fad10c5df0d12e13e57389567502ed4b.yaml b/nuclei-templates/cve-less/plugins/pie-forms-for-wp-fad10c5df0d12e13e57389567502ed4b.yaml new file mode 100644 index 0000000000..97c865efbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-forms-for-wp-fad10c5df0d12e13e57389567502ed4b.yaml @@ -0,0 +1,58 @@ +id: pie-forms-for-wp-fad10c5df0d12e13e57389567502ed4b + +info: + name: > + WordPress Forms by Pie Forms <= 1.4.9.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a75ff86-dc4d-4519-8cc5-183afc00cb65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-forms-for-wp/" + google-query: inurl:"/wp-content/plugins/pie-forms-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-forms-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-forms-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-forms-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-085dcf91f1430534b15ba25ebc810709.yaml b/nuclei-templates/cve-less/plugins/pie-register-085dcf91f1430534b15ba25ebc810709.yaml new file mode 100644 index 0000000000..d0ab793b86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-085dcf91f1430534b15ba25ebc810709.yaml @@ -0,0 +1,58 @@ +id: pie-register-085dcf91f1430534b15ba25ebc810709 + +info: + name: > + Pie Register <= 1.30 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b68e26d-1680-42ed-9b8e-23c80c19b1be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-3deaf34916ac99bc38f298b80ffb3072.yaml b/nuclei-templates/cve-less/plugins/pie-register-3deaf34916ac99bc38f298b80ffb3072.yaml new file mode 100644 index 0000000000..1dda80221a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-3deaf34916ac99bc38f298b80ffb3072.yaml @@ -0,0 +1,58 @@ +id: pie-register-3deaf34916ac99bc38f298b80ffb3072 + +info: + name: > + Pie Register < 2.0.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/518771c1-b52b-47b7-99f1-4f40115ba4cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-44a36b31780ae752545fe7f279378677.yaml b/nuclei-templates/cve-less/plugins/pie-register-44a36b31780ae752545fe7f279378677.yaml new file mode 100644 index 0000000000..f4104241ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-44a36b31780ae752545fe7f279378677.yaml @@ -0,0 +1,58 @@ +id: pie-register-44a36b31780ae752545fe7f279378677 + +info: + name: > + Pie Register <= 3.8.1.2 - Missing Authorization to Arbitrary User Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22b18a9c-89e5-43e1-9553-5862df25bf47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-48f2f58cd82d726138d269a3fe5d8999.yaml b/nuclei-templates/cve-less/plugins/pie-register-48f2f58cd82d726138d269a3fe5d8999.yaml new file mode 100644 index 0000000000..a89272f36a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-48f2f58cd82d726138d269a3fe5d8999.yaml @@ -0,0 +1,58 @@ +id: pie-register-48f2f58cd82d726138d269a3fe5d8999 + +info: + name: > + Registration Forms – User Profile, Custom Registration Form, Login Form, Invitation-Based Registrations for WordPress 2.0.14 - 2.0.15 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/053bb01c-9e87-4836-ae1c-567272b21118?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.14', '<= 2.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-490ba182a143f8f2d65ee92cff342981.yaml b/nuclei-templates/cve-less/plugins/pie-register-490ba182a143f8f2d65ee92cff342981.yaml new file mode 100644 index 0000000000..ef5a6cc537 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-490ba182a143f8f2d65ee92cff342981.yaml @@ -0,0 +1,58 @@ +id: pie-register-490ba182a143f8f2d65ee92cff342981 + +info: + name: > + Pie Register <= 3.8.3.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89586fcc-f0f6-4f44-841b-04eee64c0ab3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-5471d89b27018d77efeb5931175f6c33.yaml b/nuclei-templates/cve-less/plugins/pie-register-5471d89b27018d77efeb5931175f6c33.yaml new file mode 100644 index 0000000000..39560fe59e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-5471d89b27018d77efeb5931175f6c33.yaml @@ -0,0 +1,58 @@ +id: pie-register-5471d89b27018d77efeb5931175f6c33 + +info: + name: > + Pie Register <= 3.8.2.2 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bbcbefa-f38d-4752-acca-3545976cc59f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-555fd231d361b91b6b7b333e844c48cf.yaml b/nuclei-templates/cve-less/plugins/pie-register-555fd231d361b91b6b7b333e844c48cf.yaml new file mode 100644 index 0000000000..28e4874da5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-555fd231d361b91b6b7b333e844c48cf.yaml @@ -0,0 +1,58 @@ +id: pie-register-555fd231d361b91b6b7b333e844c48cf + +info: + name: > + Pie Register <= 3.7.1.5 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03926855-d2cc-4105-9927-5871002cb7a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-8c45c8eb0a60dbf34d7860d1438b26eb.yaml b/nuclei-templates/cve-less/plugins/pie-register-8c45c8eb0a60dbf34d7860d1438b26eb.yaml new file mode 100644 index 0000000000..ad2b7d39fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-8c45c8eb0a60dbf34d7860d1438b26eb.yaml @@ -0,0 +1,58 @@ +id: pie-register-8c45c8eb0a60dbf34d7860d1438b26eb + +info: + name: > + Pie Register < 3.0.18 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7edb3be-ffa9-4e80-addf-5e5aca6050ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-a5906711fb55acacbd35705f2d98b335.yaml b/nuclei-templates/cve-less/plugins/pie-register-a5906711fb55acacbd35705f2d98b335.yaml new file mode 100644 index 0000000000..ce22249bae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-a5906711fb55acacbd35705f2d98b335.yaml @@ -0,0 +1,58 @@ +id: pie-register-a5906711fb55acacbd35705f2d98b335 + +info: + name: > + Pie Register – User Registration Forms. Invitation based registrations, Custom Login, Payments < 3.1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce544dd0-6e4a-4a73-bba0-db2d667e378e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-b2f2a2293859699f71056b726eb185bf.yaml b/nuclei-templates/cve-less/plugins/pie-register-b2f2a2293859699f71056b726eb185bf.yaml new file mode 100644 index 0000000000..3cda87b12e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-b2f2a2293859699f71056b726eb185bf.yaml @@ -0,0 +1,58 @@ +id: pie-register-b2f2a2293859699f71056b726eb185bf + +info: + name: > + Pie Register <= 2.0.13 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b2769bc-523b-4a8f-9042-1e879db3f8ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-c271e79e457792d8093dce56ebc058d7.yaml b/nuclei-templates/cve-less/plugins/pie-register-c271e79e457792d8093dce56ebc058d7.yaml new file mode 100644 index 0000000000..513d087ee7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-c271e79e457792d8093dce56ebc058d7.yaml @@ -0,0 +1,58 @@ +id: pie-register-c271e79e457792d8093dce56ebc058d7 + +info: + name: > + Pie Register – User Registration Forms < 2.0.19 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8f27037-5dd6-467e-b633-494f30ec8b7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-d02d6cd1e31a58b9341cbaf75fde28c5.yaml b/nuclei-templates/cve-less/plugins/pie-register-d02d6cd1e31a58b9341cbaf75fde28c5.yaml new file mode 100644 index 0000000000..c340b58d0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-d02d6cd1e31a58b9341cbaf75fde28c5.yaml @@ -0,0 +1,58 @@ +id: pie-register-d02d6cd1e31a58b9341cbaf75fde28c5 + +info: + name: > + Pie Register – User Registration Forms. Invitation based registrations, Custom Login, Payments <= 3.7.2.3 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20835df3-677c-4136-af50-46bc272e4f9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-d17a26eab5a1167d47a2ffdfdfa715f1.yaml b/nuclei-templates/cve-less/plugins/pie-register-d17a26eab5a1167d47a2ffdfdfa715f1.yaml new file mode 100644 index 0000000000..bb0c6852e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-d17a26eab5a1167d47a2ffdfdfa715f1.yaml @@ -0,0 +1,58 @@ +id: pie-register-d17a26eab5a1167d47a2ffdfdfa715f1 + +info: + name: > + Pie Register <= 3.7.1.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec547a1f-d57b-4792-b9d0-38e9a9c4d0a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-e4630937cb3252f53c729f27f9bae6ad.yaml b/nuclei-templates/cve-less/plugins/pie-register-e4630937cb3252f53c729f27f9bae6ad.yaml new file mode 100644 index 0000000000..11ebef719e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-e4630937cb3252f53c729f27f9bae6ad.yaml @@ -0,0 +1,58 @@ +id: pie-register-e4630937cb3252f53c729f27f9bae6ad + +info: + name: > + Pie Register – User Registration Forms <= 3.7.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b14dec28-41f9-460f-aa6c-3e6baf2498d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-f10e961623521100a85e5972e8959ae4.yaml b/nuclei-templates/cve-less/plugins/pie-register-f10e961623521100a85e5972e8959ae4.yaml new file mode 100644 index 0000000000..7dc3e841ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-f10e961623521100a85e5972e8959ae4.yaml @@ -0,0 +1,58 @@ +id: pie-register-f10e961623521100a85e5972e8959ae4 + +info: + name: > + Pie Register <= 3.0.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f918c749-8c3d-4436-9a84-b040e4a2f8ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-f2952d2417af91e1e214114658f123b5.yaml b/nuclei-templates/cve-less/plugins/pie-register-f2952d2417af91e1e214114658f123b5.yaml new file mode 100644 index 0000000000..12a596ccde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-f2952d2417af91e1e214114658f123b5.yaml @@ -0,0 +1,58 @@ +id: pie-register-f2952d2417af91e1e214114658f123b5 + +info: + name: > + Pie Register – User Registration Forms < 2.0.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42402a14-b192-4ed0-84bf-f0327e48f32b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pie-register-fdaada004101af13bbd1c236fd07775f.yaml b/nuclei-templates/cve-less/plugins/pie-register-fdaada004101af13bbd1c236fd07775f.yaml new file mode 100644 index 0000000000..7038b4f397 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pie-register-fdaada004101af13bbd1c236fd07775f.yaml @@ -0,0 +1,58 @@ +id: pie-register-fdaada004101af13bbd1c236fd07775f + +info: + name: > + Pie Register 2.0.14-2.0.15 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6ee571d-8db6-4e21-9a62-44e562b9a5fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pie-register/" + google-query: inurl:"/wp-content/plugins/pie-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pie-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pie-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pie-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.14', '<= 2.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pilotpress-2498bc224a94ac1ba539a681f69b7ef6.yaml b/nuclei-templates/cve-less/plugins/pilotpress-2498bc224a94ac1ba539a681f69b7ef6.yaml new file mode 100644 index 0000000000..2c4470dd5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pilotpress-2498bc224a94ac1ba539a681f69b7ef6.yaml @@ -0,0 +1,58 @@ +id: pilotpress-2498bc224a94ac1ba539a681f69b7ef6 + +info: + name: > + PilotPress <= 2.0.30 - Authenticated(Subscriber+) Missing Authorization via multiple AJAX functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a8d121d-434d-4445-874f-d3cf6b6e7233?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pilotpress/" + google-query: inurl:"/wp-content/plugins/pilotpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pilotpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pilotpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pilotpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pinblocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/pinblocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ad8ea951f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pinblocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: pinblocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pinblocks/" + google-query: inurl:"/wp-content/plugins/pinblocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pinblocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pinblocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pinblocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ping-list-pro-a89413a448da960907f201f2e284d495.yaml b/nuclei-templates/cve-less/plugins/ping-list-pro-a89413a448da960907f201f2e284d495.yaml new file mode 100644 index 0000000000..26b783fbfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ping-list-pro-a89413a448da960907f201f2e284d495.yaml @@ -0,0 +1,58 @@ +id: ping-list-pro-a89413a448da960907f201f2e284d495 + +info: + name: > + Ping List Pro <= 1.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6971eea0-9d0b-4a7f-be05-001c34770c2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ping-list-pro/" + google-query: inurl:"/wp-content/plugins/ping-list-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ping-list-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ping-list-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ping-list-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pinterest-pin-it-button-on-image-hover-and-post-230333f7152338c0e847a31fb3c9a2dd.yaml b/nuclei-templates/cve-less/plugins/pinterest-pin-it-button-on-image-hover-and-post-230333f7152338c0e847a31fb3c9a2dd.yaml new file mode 100644 index 0000000000..944b1906ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pinterest-pin-it-button-on-image-hover-and-post-230333f7152338c0e847a31fb3c9a2dd.yaml @@ -0,0 +1,58 @@ +id: pinterest-pin-it-button-on-image-hover-and-post-230333f7152338c0e847a31fb3c9a2dd + +info: + name: > + Weblizar Pin It Button On Image Hover And Post < 3.4 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6528041a-0217-43d5-bf29-9208e23aadd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pinterest-pin-it-button-on-image-hover-and-post/" + google-query: inurl:"/wp-content/plugins/pinterest-pin-it-button-on-image-hover-and-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pinterest-pin-it-button-on-image-hover-and-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pinterest-pin-it-button-on-image-hover-and-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pinterest-pin-it-button-on-image-hover-and-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pinterest-rss-widget-62705338d1951d661bb8e5bc23d5b61e.yaml b/nuclei-templates/cve-less/plugins/pinterest-rss-widget-62705338d1951d661bb8e5bc23d5b61e.yaml new file mode 100644 index 0000000000..4aea35323d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pinterest-rss-widget-62705338d1951d661bb8e5bc23d5b61e.yaml @@ -0,0 +1,58 @@ +id: pinterest-rss-widget-62705338d1951d661bb8e5bc23d5b61e + +info: + name: > + Pinterest RSS Widget <= 2.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ec186b0-72f0-4017-ad24-1c82247a23ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pinterest-rss-widget/" + google-query: inurl:"/wp-content/plugins/pinterest-rss-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pinterest-rss-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pinterest-rss-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pinterest-rss-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-b5ac41047b1437d9d41eb11c7b522d30.yaml b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-b5ac41047b1437d9d41eb11c7b522d30.yaml new file mode 100644 index 0000000000..8a3cef1003 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-b5ac41047b1437d9d41eb11c7b522d30.yaml @@ -0,0 +1,58 @@ +id: piotnet-addons-for-elementor-b5ac41047b1437d9d41eb11c7b522d30 + +info: + name: > + Piotnet Addons For Elementor <= 2.4.25 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2b9d080-489d-40e4-bb6f-c4209e5f4fad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnet-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/piotnet-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnet-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnet-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnet-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-e66a7b75dd0639134f09eee91026a929.yaml b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-e66a7b75dd0639134f09eee91026a929.yaml new file mode 100644 index 0000000000..bc61b0e72d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-e66a7b75dd0639134f09eee91026a929.yaml @@ -0,0 +1,58 @@ +id: piotnet-addons-for-elementor-e66a7b75dd0639134f09eee91026a929 + +info: + name: > + Piotnet Addons For Elementor <= 2.4.26 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e1885be-dc9f-4858-a155-ad6fcc117d0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnet-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/piotnet-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnet-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnet-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnet-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-156652aa50db0572929dd8be39230242.yaml b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-156652aa50db0572929dd8be39230242.yaml new file mode 100644 index 0000000000..b93cb5bb7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-156652aa50db0572929dd8be39230242.yaml @@ -0,0 +1,58 @@ +id: piotnet-addons-for-elementor-pro-156652aa50db0572929dd8be39230242 + +info: + name: > + Piotnet Addons For Elementor Pro <= 7.1.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b4a2291-cf86-4d3f-8d6e-670b1b6ab124?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnet-addons-for-elementor-pro/" + google-query: inurl:"/wp-content/plugins/piotnet-addons-for-elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnet-addons-for-elementor-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnet-addons-for-elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnet-addons-for-elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-20464abfb5a20fb1d96af1ded31e80d6.yaml b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-20464abfb5a20fb1d96af1ded31e80d6.yaml new file mode 100644 index 0000000000..a043dc41d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-20464abfb5a20fb1d96af1ded31e80d6.yaml @@ -0,0 +1,58 @@ +id: piotnet-addons-for-elementor-pro-20464abfb5a20fb1d96af1ded31e80d6 + +info: + name: > + Piotnet Addons For Elementor Pro <= 7.1.17 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2b31db1-c4f7-47c6-ad83-7ecd375e5f65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnet-addons-for-elementor-pro/" + google-query: inurl:"/wp-content/plugins/piotnet-addons-for-elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnet-addons-for-elementor-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnet-addons-for-elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnet-addons-for-elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-7170a15e98802cc9df1f92d68c501b1c.yaml b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-7170a15e98802cc9df1f92d68c501b1c.yaml new file mode 100644 index 0000000000..677fb9d25b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-7170a15e98802cc9df1f92d68c501b1c.yaml @@ -0,0 +1,58 @@ +id: piotnet-addons-for-elementor-pro-7170a15e98802cc9df1f92d68c501b1c + +info: + name: > + Piotnet Addons For Elementor Pro <= 7.1.17 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32ccbde2-b6a9-4748-907d-b948937dad09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnet-addons-for-elementor-pro/" + google-query: inurl:"/wp-content/plugins/piotnet-addons-for-elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnet-addons-for-elementor-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnet-addons-for-elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnet-addons-for-elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-7188ef26349164dd23042500cdbf31b3.yaml b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-7188ef26349164dd23042500cdbf31b3.yaml new file mode 100644 index 0000000000..a4fd0b820c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-7188ef26349164dd23042500cdbf31b3.yaml @@ -0,0 +1,58 @@ +id: piotnet-addons-for-elementor-pro-7188ef26349164dd23042500cdbf31b3 + +info: + name: > + Piotnet Addons For Elementor Pro <= 7.1.17 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67856d6b-9be9-494a-b713-f36d5e29e7f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnet-addons-for-elementor-pro/" + google-query: inurl:"/wp-content/plugins/piotnet-addons-for-elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnet-addons-for-elementor-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnet-addons-for-elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnet-addons-for-elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-a073e10124aebcae7675d30da8592a4c.yaml b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-a073e10124aebcae7675d30da8592a4c.yaml new file mode 100644 index 0000000000..282f030aa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnet-addons-for-elementor-pro-a073e10124aebcae7675d30da8592a4c.yaml @@ -0,0 +1,58 @@ +id: piotnet-addons-for-elementor-pro-a073e10124aebcae7675d30da8592a4c + +info: + name: > + Piotnet Addons For Elementor Pro <= 7.1.17 - Missing Authorization to Arbitrary Post/Page Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23e04283-5644-4e23-bc42-0a0963a38b71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnet-addons-for-elementor-pro/" + google-query: inurl:"/wp-content/plugins/piotnet-addons-for-elementor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnet-addons-for-elementor-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnet-addons-for-elementor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnet-addons-for-elementor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnetforms-3e3dbd541f7f8bdbabf98ab3f7d5763f.yaml b/nuclei-templates/cve-less/plugins/piotnetforms-3e3dbd541f7f8bdbabf98ab3f7d5763f.yaml new file mode 100644 index 0000000000..2933886c9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnetforms-3e3dbd541f7f8bdbabf98ab3f7d5763f.yaml @@ -0,0 +1,58 @@ +id: piotnetforms-3e3dbd541f7f8bdbabf98ab3f7d5763f + +info: + name: > + Piotnet Forms <= 1.0.28 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af2b7eac-a3f5-408f-b139-643e70b3f27a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnetforms/" + google-query: inurl:"/wp-content/plugins/piotnetforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnetforms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnetforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnetforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnetforms-4e38c1777edea860289ac75c8e42f2e1.yaml b/nuclei-templates/cve-less/plugins/piotnetforms-4e38c1777edea860289ac75c8e42f2e1.yaml new file mode 100644 index 0000000000..732ac3d8e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnetforms-4e38c1777edea860289ac75c8e42f2e1.yaml @@ -0,0 +1,58 @@ +id: piotnetforms-4e38c1777edea860289ac75c8e42f2e1 + +info: + name: > + Piotnet Forms Plugin <= 1.0.28 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f52298b-344b-4561-b1bf-93bea95a3e53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnetforms/" + google-query: inurl:"/wp-content/plugins/piotnetforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnetforms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnetforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnetforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piotnetforms-7ac0863d03c3cdd406341dca9d25711a.yaml b/nuclei-templates/cve-less/plugins/piotnetforms-7ac0863d03c3cdd406341dca9d25711a.yaml new file mode 100644 index 0000000000..545f795e93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piotnetforms-7ac0863d03c3cdd406341dca9d25711a.yaml @@ -0,0 +1,58 @@ +id: piotnetforms-7ac0863d03c3cdd406341dca9d25711a + +info: + name: > + Piotnet Forms <= 1.0.25 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f119c6c2-cd4e-415a-b717-2bfc90ed729e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piotnetforms/" + google-query: inurl:"/wp-content/plugins/piotnetforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piotnetforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piotnetforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piotnetforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pirate-forms-7694e4b82dce0dfb26c86a146e774669.yaml b/nuclei-templates/cve-less/plugins/pirate-forms-7694e4b82dce0dfb26c86a146e774669.yaml new file mode 100644 index 0000000000..b983484a45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pirate-forms-7694e4b82dce0dfb26c86a146e774669.yaml @@ -0,0 +1,58 @@ +id: pirate-forms-7694e4b82dce0dfb26c86a146e774669 + +info: + name: > + Contact Form & SMTP Plugin by PirateForms <= 2.5.1 - Unauthenticated HTML injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e34c3f6-cc84-4e45-9948-6f7fd5cba8cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pirate-forms/" + google-query: inurl:"/wp-content/plugins/pirate-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pirate-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pirate-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pirate-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/piwik-pro-4e90b64e5c0880980f44418deca3c91b.yaml b/nuclei-templates/cve-less/plugins/piwik-pro-4e90b64e5c0880980f44418deca3c91b.yaml new file mode 100644 index 0000000000..08fcddea3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/piwik-pro-4e90b64e5c0880980f44418deca3c91b.yaml @@ -0,0 +1,58 @@ +id: piwik-pro-4e90b64e5c0880980f44418deca3c91b + +info: + name: > + Various Affected Software (Various Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d5d9ef7-3832-495c-b61b-7e24c2e60893?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/piwik-pro/" + google-query: inurl:"/wp-content/plugins/piwik-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,piwik-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/piwik-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "piwik-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.2.35', '<= 0.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixabay-images-12ee5879dbc7fdb46e24ef76cc9a2d61.yaml b/nuclei-templates/cve-less/plugins/pixabay-images-12ee5879dbc7fdb46e24ef76cc9a2d61.yaml new file mode 100644 index 0000000000..be7af631a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixabay-images-12ee5879dbc7fdb46e24ef76cc9a2d61.yaml @@ -0,0 +1,58 @@ +id: pixabay-images-12ee5879dbc7fdb46e24ef76cc9a2d61 + +info: + name: > + Pixabay Images <= 2.0 - Authentication Bypass to Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40a6a810-1151-49e6-bed4-2b7a572ac015?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixabay-images/" + google-query: inurl:"/wp-content/plugins/pixabay-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixabay-images,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixabay-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixabay-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixabay-images-5b2fbefb63fd7f965b09642c4ccecf5d.yaml b/nuclei-templates/cve-less/plugins/pixabay-images-5b2fbefb63fd7f965b09642c4ccecf5d.yaml new file mode 100644 index 0000000000..506bc3639d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixabay-images-5b2fbefb63fd7f965b09642c4ccecf5d.yaml @@ -0,0 +1,58 @@ +id: pixabay-images-5b2fbefb63fd7f965b09642c4ccecf5d + +info: + name: > + Pixabay Images <= 2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eee91d95-afdb-45e3-b639-50eb3c46115d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixabay-images/" + google-query: inurl:"/wp-content/plugins/pixabay-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixabay-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixabay-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixabay-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixabay-images-5de755d9bd8418fefc2676ce9864e6b9.yaml b/nuclei-templates/cve-less/plugins/pixabay-images-5de755d9bd8418fefc2676ce9864e6b9.yaml new file mode 100644 index 0000000000..b9bd09b207 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixabay-images-5de755d9bd8418fefc2676ce9864e6b9.yaml @@ -0,0 +1,58 @@ +id: pixabay-images-5de755d9bd8418fefc2676ce9864e6b9 + +info: + name: > + Pixabay Images <= 2.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35c12f80-d069-44ed-b6a5-caa060fbd281?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixabay-images/" + google-query: inurl:"/wp-content/plugins/pixabay-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixabay-images,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixabay-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixabay-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixabay-images-99e3e9aef74467dcee4f17ac700177de.yaml b/nuclei-templates/cve-less/plugins/pixabay-images-99e3e9aef74467dcee4f17ac700177de.yaml new file mode 100644 index 0000000000..1b41406c43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixabay-images-99e3e9aef74467dcee4f17ac700177de.yaml @@ -0,0 +1,58 @@ +id: pixabay-images-99e3e9aef74467dcee4f17ac700177de + +info: + name: > + Pixabay Images <= 2.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91998552-bf97-40e0-b5b2-be35a8d58b54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixabay-images/" + google-query: inurl:"/wp-content/plugins/pixabay-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixabay-images,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixabay-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixabay-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixcodes-4706d1b1438785969ae30d4549fd166c.yaml b/nuclei-templates/cve-less/plugins/pixcodes-4706d1b1438785969ae30d4549fd166c.yaml new file mode 100644 index 0000000000..50dce52b1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixcodes-4706d1b1438785969ae30d4549fd166c.yaml @@ -0,0 +1,58 @@ +id: pixcodes-4706d1b1438785969ae30d4549fd166c + +info: + name: > + PixCodes <= 2.3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb6f38ce-2378-480f-8f43-140ed7be5cc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixcodes/" + google-query: inurl:"/wp-content/plugins/pixcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixelyoursite-46fd3a8d2dbfa8e63d62d0d4687e4eb8.yaml b/nuclei-templates/cve-less/plugins/pixelyoursite-46fd3a8d2dbfa8e63d62d0d4687e4eb8.yaml new file mode 100644 index 0000000000..55ca82b989 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixelyoursite-46fd3a8d2dbfa8e63d62d0d4687e4eb8.yaml @@ -0,0 +1,58 @@ +id: pixelyoursite-46fd3a8d2dbfa8e63d62d0d4687e4eb8 + +info: + name: > + PixelYourSite <= 9.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9c6eccc-3f91-4923-b3d3-46070bb3662d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixelyoursite/" + google-query: inurl:"/wp-content/plugins/pixelyoursite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixelyoursite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixelyoursite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixelyoursite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixelyoursite-5498e556e2216200fd56232f5d1a8034.yaml b/nuclei-templates/cve-less/plugins/pixelyoursite-5498e556e2216200fd56232f5d1a8034.yaml new file mode 100644 index 0000000000..c0bc513604 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixelyoursite-5498e556e2216200fd56232f5d1a8034.yaml @@ -0,0 +1,58 @@ +id: pixelyoursite-5498e556e2216200fd56232f5d1a8034 + +info: + name: > + PixelYourSite <= 9.3.6 and PixelYourSite Pro <= 9.6.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ebf1e83-50b8-4f56-ba76-10100375edda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixelyoursite/" + google-query: inurl:"/wp-content/plugins/pixelyoursite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixelyoursite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixelyoursite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixelyoursite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixelyoursite-7c22e43cb21e5962b21022636d9c698c.yaml b/nuclei-templates/cve-less/plugins/pixelyoursite-7c22e43cb21e5962b21022636d9c698c.yaml new file mode 100644 index 0000000000..ae6e09712a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixelyoursite-7c22e43cb21e5962b21022636d9c698c.yaml @@ -0,0 +1,58 @@ +id: pixelyoursite-7c22e43cb21e5962b21022636d9c698c + +info: + name: > + PixelYourSite <= 5.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78ca8110-fd39-4fcb-bac7-94732c14aee2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixelyoursite/" + google-query: inurl:"/wp-content/plugins/pixelyoursite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixelyoursite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixelyoursite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixelyoursite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixelyoursite-pro-5498e556e2216200fd56232f5d1a8034.yaml b/nuclei-templates/cve-less/plugins/pixelyoursite-pro-5498e556e2216200fd56232f5d1a8034.yaml new file mode 100644 index 0000000000..602765390b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixelyoursite-pro-5498e556e2216200fd56232f5d1a8034.yaml @@ -0,0 +1,58 @@ +id: pixelyoursite-pro-5498e556e2216200fd56232f5d1a8034 + +info: + name: > + PixelYourSite <= 9.3.6 and PixelYourSite Pro <= 9.6.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ebf1e83-50b8-4f56-ba76-10100375edda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixelyoursite-pro/" + google-query: inurl:"/wp-content/plugins/pixelyoursite-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixelyoursite-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixelyoursite-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixelyoursite-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixfields-32884b4069e08a6e3a456b6d9b5e62d6.yaml b/nuclei-templates/cve-less/plugins/pixfields-32884b4069e08a6e3a456b6d9b5e62d6.yaml new file mode 100644 index 0000000000..010dfa7db0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixfields-32884b4069e08a6e3a456b6d9b5e62d6.yaml @@ -0,0 +1,58 @@ +id: pixfields-32884b4069e08a6e3a456b6d9b5e62d6 + +info: + name: > + PixFields <= 0.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7f86396-2f3f-4cd6-b3d4-e518b074a579?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixfields/" + google-query: inurl:"/wp-content/plugins/pixfields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixfields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixfields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixfields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixfields-c610b8a5231d91145ad3b18f9f470868.yaml b/nuclei-templates/cve-less/plugins/pixfields-c610b8a5231d91145ad3b18f9f470868.yaml new file mode 100644 index 0000000000..5d1e48a8eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixfields-c610b8a5231d91145ad3b18f9f470868.yaml @@ -0,0 +1,58 @@ +id: pixfields-c610b8a5231d91145ad3b18f9f470868 + +info: + name: > + PixFields <= 0.7.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c6fb8b-9df8-4cf5-b9e6-702852bb1977?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixfields/" + google-query: inurl:"/wp-content/plugins/pixfields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixfields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixfields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixfields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixtypes-5afe134af3509b1b84204a9f85b1cefe.yaml b/nuclei-templates/cve-less/plugins/pixtypes-5afe134af3509b1b84204a9f85b1cefe.yaml new file mode 100644 index 0000000000..0bb17c62b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixtypes-5afe134af3509b1b84204a9f85b1cefe.yaml @@ -0,0 +1,58 @@ +id: pixtypes-5afe134af3509b1b84204a9f85b1cefe + +info: + name: > + PixTypes <= 1.4.15 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca05783d-7516-469e-b8a0-c23035db43b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixtypes/" + google-query: inurl:"/wp-content/plugins/pixtypes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixtypes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixtypes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixtypes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pixtypes-f26696ee1719902df9af4673f5c5c04a.yaml b/nuclei-templates/cve-less/plugins/pixtypes-f26696ee1719902df9af4673f5c5c04a.yaml new file mode 100644 index 0000000000..381ef70353 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pixtypes-f26696ee1719902df9af4673f5c5c04a.yaml @@ -0,0 +1,58 @@ +id: pixtypes-f26696ee1719902df9af4673f5c5c04a + +info: + name: > + PixTypes <= 1.4.14 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ac7414c-8035-406a-ab1e-94d9f64e52fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pixtypes/" + google-query: inurl:"/wp-content/plugins/pixtypes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pixtypes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pixtypes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixtypes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pj-news-ticker-14d59d1dd0d6c11dea03161b864cfb49.yaml b/nuclei-templates/cve-less/plugins/pj-news-ticker-14d59d1dd0d6c11dea03161b864cfb49.yaml new file mode 100644 index 0000000000..87133fb8d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pj-news-ticker-14d59d1dd0d6c11dea03161b864cfb49.yaml @@ -0,0 +1,58 @@ +id: pj-news-ticker-14d59d1dd0d6c11dea03161b864cfb49 + +info: + name: > + PJ News Ticker <= 6.8.10 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78b60dca-0225-43c8-b6cf-0213b1619b65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pj-news-ticker/" + google-query: inurl:"/wp-content/plugins/pj-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pj-news-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pj-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pj-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plainview-activity-monitor-97006d9ae784a094161529df95603173.yaml b/nuclei-templates/cve-less/plugins/plainview-activity-monitor-97006d9ae784a094161529df95603173.yaml new file mode 100644 index 0000000000..cac48f744e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plainview-activity-monitor-97006d9ae784a094161529df95603173.yaml @@ -0,0 +1,58 @@ +id: plainview-activity-monitor-97006d9ae784a094161529df95603173 + +info: + name: > + Plainview Activity Monitor < 20180826 - Remote Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/669df758-0c7d-41c9-a9bd-9b3697898c77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plainview-activity-monitor/" + google-query: inurl:"/wp-content/plugins/plainview-activity-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plainview-activity-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plainview-activity-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plainview-activity-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20180826') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plainview-protect-passwords-7ffe069edd0a90f30c2910fd73b2059b.yaml b/nuclei-templates/cve-less/plugins/plainview-protect-passwords-7ffe069edd0a90f30c2910fd73b2059b.yaml new file mode 100644 index 0000000000..427186aefa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plainview-protect-passwords-7ffe069edd0a90f30c2910fd73b2059b.yaml @@ -0,0 +1,58 @@ +id: plainview-protect-passwords-7ffe069edd0a90f30c2910fd73b2059b + +info: + name: > + Plainview Protect Passwords <= 1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b63d8238-267f-4a40-9af0-37ae8b9ba26b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plainview-protect-passwords/" + google-query: inurl:"/wp-content/plugins/plainview-protect-passwords/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plainview-protect-passwords,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plainview-protect-passwords/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plainview-protect-passwords" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plainview-protect-passwords-f0297e0c6535810defa6f3589f3d99ca.yaml b/nuclei-templates/cve-less/plugins/plainview-protect-passwords-f0297e0c6535810defa6f3589f3d99ca.yaml new file mode 100644 index 0000000000..166ce1dda7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plainview-protect-passwords-f0297e0c6535810defa6f3589f3d99ca.yaml @@ -0,0 +1,58 @@ +id: plainview-protect-passwords-f0297e0c6535810defa6f3589f3d99ca + +info: + name: > + Plainview Protect Passwords <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc59b997-a8e2-4c75-aa5f-36cc5a66326e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plainview-protect-passwords/" + google-query: inurl:"/wp-content/plugins/plainview-protect-passwords/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plainview-protect-passwords,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plainview-protect-passwords/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plainview-protect-passwords" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/planso-forms-b3f5b694f8149f7215285f5a07a42c03.yaml b/nuclei-templates/cve-less/plugins/planso-forms-b3f5b694f8149f7215285f5a07a42c03.yaml new file mode 100644 index 0000000000..722b77e83b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/planso-forms-b3f5b694f8149f7215285f5a07a42c03.yaml @@ -0,0 +1,58 @@ +id: planso-forms-b3f5b694f8149f7215285f5a07a42c03 + +info: + name: > + PlanSo Forms <= 2.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51e4f7ac-efc5-492c-b7a4-eea6d5f69e0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/planso-forms/" + google-query: inurl:"/wp-content/plugins/planso-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,planso-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/planso-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "planso-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/platinum-seo-pack-0fc1f5cd03c6bddb3df8077c66fc0927.yaml b/nuclei-templates/cve-less/plugins/platinum-seo-pack-0fc1f5cd03c6bddb3df8077c66fc0927.yaml new file mode 100644 index 0000000000..dc638693d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/platinum-seo-pack-0fc1f5cd03c6bddb3df8077c66fc0927.yaml @@ -0,0 +1,58 @@ +id: platinum-seo-pack-0fc1f5cd03c6bddb3df8077c66fc0927 + +info: + name: > + Platinum SEO <= 1.3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ed45d70-a528-47ee-84c9-26948dfe91f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/platinum-seo-pack/" + google-query: inurl:"/wp-content/plugins/platinum-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,platinum-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/platinum-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "platinum-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/platinum-seo-pack-74239a2c7d59745dfff630629648ba8b.yaml b/nuclei-templates/cve-less/plugins/platinum-seo-pack-74239a2c7d59745dfff630629648ba8b.yaml new file mode 100644 index 0000000000..4e2b0db855 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/platinum-seo-pack-74239a2c7d59745dfff630629648ba8b.yaml @@ -0,0 +1,58 @@ +id: platinum-seo-pack-74239a2c7d59745dfff630629648ba8b + +info: + name: > + Platinum SEO <= 2.4.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76b25ae3-b813-4e79-a5e3-0af5e6eb8a06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/platinum-seo-pack/" + google-query: inurl:"/wp-content/plugins/platinum-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,platinum-seo-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/platinum-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "platinum-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plausible-analytics-067e897c25e69073ab36a1703c7f28be.yaml b/nuclei-templates/cve-less/plugins/plausible-analytics-067e897c25e69073ab36a1703c7f28be.yaml new file mode 100644 index 0000000000..a5ffe57fd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plausible-analytics-067e897c25e69073ab36a1703c7f28be.yaml @@ -0,0 +1,58 @@ +id: plausible-analytics-067e897c25e69073ab36a1703c7f28be + +info: + name: > + Plausible Analytics <= 1.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/382dcf3d-1290-4e97-b0d6-a4b34461f8a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plausible-analytics/" + google-query: inurl:"/wp-content/plugins/plausible-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plausible-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plausible-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plausible-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plausible-analytics-3b9fd84836c7bf88f01e3e36ab24d168.yaml b/nuclei-templates/cve-less/plugins/plausible-analytics-3b9fd84836c7bf88f01e3e36ab24d168.yaml new file mode 100644 index 0000000000..f2c59974ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plausible-analytics-3b9fd84836c7bf88f01e3e36ab24d168.yaml @@ -0,0 +1,58 @@ +id: plausible-analytics-3b9fd84836c7bf88f01e3e36ab24d168 + +info: + name: > + Plausible Analytics <= 1.3.3 - Reflected Cross-Site Scripting via page-url + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ed6d5e6-1094-46ec-afb9-43c142f334ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plausible-analytics/" + google-query: inurl:"/wp-content/plugins/plausible-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plausible-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plausible-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plausible-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plausible-analytics-c591f3e0b0e6607bb02f8ca1122eb1cd.yaml b/nuclei-templates/cve-less/plugins/plausible-analytics-c591f3e0b0e6607bb02f8ca1122eb1cd.yaml new file mode 100644 index 0000000000..8dc8d893e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plausible-analytics-c591f3e0b0e6607bb02f8ca1122eb1cd.yaml @@ -0,0 +1,58 @@ +id: plausible-analytics-c591f3e0b0e6607bb02f8ca1122eb1cd + +info: + name: > + Plausible Analytics <= 1.2.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c84b432-4d33-47ad-8057-0bc831929879?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plausible-analytics/" + google-query: inurl:"/wp-content/plugins/plausible-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plausible-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plausible-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plausible-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/play-ht-4eaf37cfdef1b74dc7b626ac3436d2c6.yaml b/nuclei-templates/cve-less/plugins/play-ht-4eaf37cfdef1b74dc7b626ac3436d2c6.yaml new file mode 100644 index 0000000000..22c72786ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/play-ht-4eaf37cfdef1b74dc7b626ac3436d2c6.yaml @@ -0,0 +1,58 @@ +id: play-ht-4eaf37cfdef1b74dc7b626ac3436d2c6 + +info: + name: > + Play.ht – Make Your Blog Posts Accessible With Text to Speech Audio <= 3.6.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/play-ht/" + google-query: inurl:"/wp-content/plugins/play-ht/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,play-ht,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/play-ht/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "play-ht" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/play-ht-6182145f7b993029088ccd0a82af0476.yaml b/nuclei-templates/cve-less/plugins/play-ht-6182145f7b993029088ccd0a82af0476.yaml new file mode 100644 index 0000000000..227bc802c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/play-ht-6182145f7b993029088ccd0a82af0476.yaml @@ -0,0 +1,58 @@ +id: play-ht-6182145f7b993029088ccd0a82af0476 + +info: + name: > + Play.ht – Make Your Blog Posts Accessible With Text to Speech Audio <= 3.6.4 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83a595b7-379c-4202-abdd-d8ba4a30c6a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/play-ht/" + google-query: inurl:"/wp-content/plugins/play-ht/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,play-ht,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/play-ht/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "play-ht" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/play-ht-e04d152bd4d70be12ad11762391a5d6a.yaml b/nuclei-templates/cve-less/plugins/play-ht-e04d152bd4d70be12ad11762391a5d6a.yaml new file mode 100644 index 0000000000..dce68f57a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/play-ht-e04d152bd4d70be12ad11762391a5d6a.yaml @@ -0,0 +1,58 @@ +id: play-ht-e04d152bd4d70be12ad11762391a5d6a + +info: + name: > + Play.ht – Make Your Blog Posts Accessible With Text to Speech Audio <= 3.6.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/play-ht/" + google-query: inurl:"/wp-content/plugins/play-ht/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,play-ht,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/play-ht/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "play-ht" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/player-0dd50401fc253eb4ff30c00f51c39236.yaml b/nuclei-templates/cve-less/plugins/player-0dd50401fc253eb4ff30c00f51c39236.yaml new file mode 100644 index 0000000000..9dcca158eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/player-0dd50401fc253eb4ff30c00f51c39236.yaml @@ -0,0 +1,58 @@ +id: player-0dd50401fc253eb4ff30c00f51c39236 + +info: + name: > + SpiderVPlayer < 1.5.18 - Multiple Blind Authenticated SQL Injections + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0caf1660-b85e-46e1-9270-a8e14c6bbf52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/player/" + google-query: inurl:"/wp-content/plugins/player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/player-3c0e50875a3bbfb2004a47e262647c92.yaml b/nuclei-templates/cve-less/plugins/player-3c0e50875a3bbfb2004a47e262647c92.yaml new file mode 100644 index 0000000000..9fed90696e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/player-3c0e50875a3bbfb2004a47e262647c92.yaml @@ -0,0 +1,58 @@ +id: player-3c0e50875a3bbfb2004a47e262647c92 + +info: + name: > + SpiderVPlayer <= 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bc8c04f-3764-473e-a216-7c5dc49abfa8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/player/" + google-query: inurl:"/wp-content/plugins/player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,player,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/player-a1229f8f2f131697def9604f593dc513.yaml b/nuclei-templates/cve-less/plugins/player-a1229f8f2f131697def9604f593dc513.yaml new file mode 100644 index 0000000000..a625e1d760 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/player-a1229f8f2f131697def9604f593dc513.yaml @@ -0,0 +1,58 @@ +id: player-a1229f8f2f131697def9604f593dc513 + +info: + name: > + SpiderVPlayer< 1.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47c2bf75-fba1-4c37-b33a-f5e0e093fb78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/player/" + google-query: inurl:"/wp-content/plugins/player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/player-a132c10bef68833cf859b4bbead4a383.yaml b/nuclei-templates/cve-less/plugins/player-a132c10bef68833cf859b4bbead4a383.yaml new file mode 100644 index 0000000000..1c0e7afa94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/player-a132c10bef68833cf859b4bbead4a383.yaml @@ -0,0 +1,58 @@ +id: player-a132c10bef68833cf859b4bbead4a383 + +info: + name: > + Video Player <= 1.5.22 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93d78063-238d-40c0-92c9-6870d85d29f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/player/" + google-query: inurl:"/wp-content/plugins/player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/player-c58c613948b1843f7bb90012b0345e3e.yaml b/nuclei-templates/cve-less/plugins/player-c58c613948b1843f7bb90012b0345e3e.yaml new file mode 100644 index 0000000000..533d58249d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/player-c58c613948b1843f7bb90012b0345e3e.yaml @@ -0,0 +1,58 @@ +id: player-c58c613948b1843f7bb90012b0345e3e + +info: + name: > + SpiderVPlayer <= 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/776a0059-9e9a-454a-a325-2e3a0e133000?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/player/" + google-query: inurl:"/wp-content/plugins/player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/player-ece1da78596879174efa10393f34846c.yaml b/nuclei-templates/cve-less/plugins/player-ece1da78596879174efa10393f34846c.yaml new file mode 100644 index 0000000000..669cb9b32f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/player-ece1da78596879174efa10393f34846c.yaml @@ -0,0 +1,58 @@ +id: player-ece1da78596879174efa10393f34846c + +info: + name: > + SpiderVPlayer <= 1.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4070a24-04fa-44e8-8ec2-bc84ba53b90d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/player/" + google-query: inurl:"/wp-content/plugins/player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/player-f4526bcdafc950c9e06f1e8880692066.yaml b/nuclei-templates/cve-less/plugins/player-f4526bcdafc950c9e06f1e8880692066.yaml new file mode 100644 index 0000000000..74b23d0583 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/player-f4526bcdafc950c9e06f1e8880692066.yaml @@ -0,0 +1,58 @@ +id: player-f4526bcdafc950c9e06f1e8880692066 + +info: + name: > + Video Player <= 1.5.22 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1627ec2a-f91d-4ed7-acb8-a3fb63b45731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/player/" + google-query: inurl:"/wp-content/plugins/player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plerdy-heatmap-2c3170861d7bd02e32a5482d1f26ddd0.yaml b/nuclei-templates/cve-less/plugins/plerdy-heatmap-2c3170861d7bd02e32a5482d1f26ddd0.yaml new file mode 100644 index 0000000000..63d2016fd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plerdy-heatmap-2c3170861d7bd02e32a5482d1f26ddd0.yaml @@ -0,0 +1,58 @@ +id: plerdy-heatmap-2c3170861d7bd02e32a5482d1f26ddd0 + +info: + name: > + Website Optimization – Plerdy <= 1.3.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db18ac07-2e7a-466d-b00c-a598401f8633?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plerdy-heatmap/" + google-query: inurl:"/wp-content/plugins/plerdy-heatmap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plerdy-heatmap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plerdy-heatmap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plerdy-heatmap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plezi-c8ca58879ec3a0e2ce408bc544c89b18.yaml b/nuclei-templates/cve-less/plugins/plezi-c8ca58879ec3a0e2ce408bc544c89b18.yaml new file mode 100644 index 0000000000..2bfc75c7b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plezi-c8ca58879ec3a0e2ce408bc544c89b18.yaml @@ -0,0 +1,58 @@ +id: plezi-c8ca58879ec3a0e2ce408bc544c89b18 + +info: + name: > + Plezi < 1.0.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7c0efd8-08c0-4283-a0bf-2f6ca3998668?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plezi/" + google-query: inurl:"/wp-content/plugins/plezi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plezi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plezi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plezi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plg_novana-ed9933ab4af74460b44a6d3c7d1b8917.yaml b/nuclei-templates/cve-less/plugins/plg_novana-ed9933ab4af74460b44a6d3c7d1b8917.yaml new file mode 100644 index 0000000000..45c3f096ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plg_novana-ed9933ab4af74460b44a6d3c7d1b8917.yaml @@ -0,0 +1,58 @@ +id: plg_novana-ed9933ab4af74460b44a6d3c7d1b8917 + +info: + name: > + Plg Novana Plugin (All Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae12f71d-0f53-4942-83a7-856633e665ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plg_novana/" + google-query: inurl:"/wp-content/plugins/plg_novana/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plg_novana,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plg_novana/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plg_novana" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugin-central-8d3ea868911a052c015f14b1fed79fc4.yaml b/nuclei-templates/cve-less/plugins/plugin-central-8d3ea868911a052c015f14b1fed79fc4.yaml new file mode 100644 index 0000000000..33459db399 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugin-central-8d3ea868911a052c015f14b1fed79fc4.yaml @@ -0,0 +1,58 @@ +id: plugin-central-8d3ea868911a052c015f14b1fed79fc4 + +info: + name: > + Plugin Central < 2.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dd71a06-b3b5-431a-b6da-3b7db3a3907c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugin-central/" + google-query: inurl:"/wp-content/plugins/plugin-central/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugin-central,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugin-central/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugin-central" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugin-groups-f9def0ceb1a6b24330f85d2a5c68b378.yaml b/nuclei-templates/cve-less/plugins/plugin-groups-f9def0ceb1a6b24330f85d2a5c68b378.yaml new file mode 100644 index 0000000000..1c859cfe32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugin-groups-f9def0ceb1a6b24330f85d2a5c68b378.yaml @@ -0,0 +1,58 @@ +id: plugin-groups-f9def0ceb1a6b24330f85d2a5c68b378 + +info: + name: > + Plugin Groups <= 2.0.6 - Missing Authorization to Unauthenticated Denial of Service + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8298f1fb-3165-40e3-9192-805a07c14cae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugin-groups/" + google-query: inurl:"/wp-content/plugins/plugin-groups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugin-groups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugin-groups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugin-groups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugin-logic-c9f14b3efd68aaad972afe4c5e7676c3.yaml b/nuclei-templates/cve-less/plugins/plugin-logic-c9f14b3efd68aaad972afe4c5e7676c3.yaml new file mode 100644 index 0000000000..aa5b898334 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugin-logic-c9f14b3efd68aaad972afe4c5e7676c3.yaml @@ -0,0 +1,58 @@ +id: plugin-logic-c9f14b3efd68aaad972afe4c5e7676c3 + +info: + name: > + Plugin Logic <= 1.0.7 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e75a96ab-499b-4f1d-a60b-a5aa9d804363?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugin-logic/" + google-query: inurl:"/wp-content/plugins/plugin-logic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugin-logic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugin-logic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugin-logic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugin-newsletter-4b8d96697b92d4da201ab4792cfe050a.yaml b/nuclei-templates/cve-less/plugins/plugin-newsletter-4b8d96697b92d4da201ab4792cfe050a.yaml new file mode 100644 index 0000000000..8818240fb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugin-newsletter-4b8d96697b92d4da201ab4792cfe050a.yaml @@ -0,0 +1,58 @@ +id: plugin-newsletter-4b8d96697b92d4da201ab4792cfe050a + +info: + name: > + Plugin: Newsletter <= 1.5 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7370e3c3-90e6-4698-88e7-baf56832528d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugin-newsletter/" + google-query: inurl:"/wp-content/plugins/plugin-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugin-newsletter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugin-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugin-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugins-list-d8a9eea8aa488b4edc83d1161c57f57d.yaml b/nuclei-templates/cve-less/plugins/plugins-list-d8a9eea8aa488b4edc83d1161c57f57d.yaml new file mode 100644 index 0000000000..2a89030e3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugins-list-d8a9eea8aa488b4edc83d1161c57f57d.yaml @@ -0,0 +1,58 @@ +id: plugins-list-d8a9eea8aa488b4edc83d1161c57f57d + +info: + name: > + Plugins List <= 2.5 - Authenticated (Author+) Stored Cross-Site Scripting via replace_plugin_list_tags + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9d42cc5-c213-454b-b05a-a57705e5c7e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugins-list/" + google-query: inurl:"/wp-content/plugins/plugins-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugins-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugins-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugins-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugins-on-steroids-f1ab4812b24f2e95426a9a9673c2032b.yaml b/nuclei-templates/cve-less/plugins/plugins-on-steroids-f1ab4812b24f2e95426a9a9673c2032b.yaml new file mode 100644 index 0000000000..6ec69020c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugins-on-steroids-f1ab4812b24f2e95426a9a9673c2032b.yaml @@ -0,0 +1,58 @@ +id: plugins-on-steroids-f1ab4812b24f2e95426a9a9673c2032b + +info: + name: > + Eazy Plugin Manager <= 4.1.2 - Missing Authorization via update_options + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e214fadf-73fd-430f-8608-6630ce82b78c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugins-on-steroids/" + google-query: inurl:"/wp-content/plugins/plugins-on-steroids/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugins-on-steroids,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugins-on-steroids/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugins-on-steroids" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugmatter-optin-feature-box-lite-5a8e72249d01f06327896fcc8bd59c29.yaml b/nuclei-templates/cve-less/plugins/plugmatter-optin-feature-box-lite-5a8e72249d01f06327896fcc8bd59c29.yaml new file mode 100644 index 0000000000..270bcea1d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugmatter-optin-feature-box-lite-5a8e72249d01f06327896fcc8bd59c29.yaml @@ -0,0 +1,58 @@ +id: plugmatter-optin-feature-box-lite-5a8e72249d01f06327896fcc8bd59c29 + +info: + name: > + Plugmatter Optin Feature Box < 2.0.14 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30d592d0-323b-40d8-9f13-22041dbded31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugmatter-optin-feature-box-lite/" + google-query: inurl:"/wp-content/plugins/plugmatter-optin-feature-box-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugmatter-optin-feature-box-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugmatter-optin-feature-box-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugmatter-optin-feature-box-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugmatter-optin-feature-box-lite-f9f9a85d9bfed3059a0bb1fb2526ff0c.yaml b/nuclei-templates/cve-less/plugins/plugmatter-optin-feature-box-lite-f9f9a85d9bfed3059a0bb1fb2526ff0c.yaml new file mode 100644 index 0000000000..36d3f831f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugmatter-optin-feature-box-lite-f9f9a85d9bfed3059a0bb1fb2526ff0c.yaml @@ -0,0 +1,58 @@ +id: plugmatter-optin-feature-box-lite-f9f9a85d9bfed3059a0bb1fb2526ff0c + +info: + name: > + Plugmatter Optin Feature Box < 2.0.14 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da1d37f5-45d5-4775-a217-24fdb3b53da7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugmatter-optin-feature-box-lite/" + google-query: inurl:"/wp-content/plugins/plugmatter-optin-feature-box-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugmatter-optin-feature-box-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugmatter-optin-feature-box-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugmatter-optin-feature-box-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugmatter-pricing-table-5af8a6245b1d97ecb98489a4ed722ce3.yaml b/nuclei-templates/cve-less/plugins/plugmatter-pricing-table-5af8a6245b1d97ecb98489a4ed722ce3.yaml new file mode 100644 index 0000000000..61b39bc7f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugmatter-pricing-table-5af8a6245b1d97ecb98489a4ed722ce3.yaml @@ -0,0 +1,58 @@ +id: plugmatter-pricing-table-5af8a6245b1d97ecb98489a4ed722ce3 + +info: + name: > + Plugmatter Pricing Table Lite <= 1.0.32 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68fe0f74-96d7-4d5b-99a2-dff4f1c9d30b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugmatter-pricing-table/" + google-query: inurl:"/wp-content/plugins/plugmatter-pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugmatter-pricing-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugmatter-pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugmatter-pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugnedit-20fb78c96d003cc1a6ca252c0fdacd2e.yaml b/nuclei-templates/cve-less/plugins/plugnedit-20fb78c96d003cc1a6ca252c0fdacd2e.yaml new file mode 100644 index 0000000000..d7bfb49b92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugnedit-20fb78c96d003cc1a6ca252c0fdacd2e.yaml @@ -0,0 +1,58 @@ +id: plugnedit-20fb78c96d003cc1a6ca252c0fdacd2e + +info: + name: > + PlugNedit Adaptive Editor < 6.2.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3ce0eca-5ec3-4af9-bc83-2f973b18e7f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugnedit/" + google-query: inurl:"/wp-content/plugins/plugnedit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugnedit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugnedit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugnedit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/plugnedit-a9d432e9161b4b6c46b6a95df71ed4b7.yaml b/nuclei-templates/cve-less/plugins/plugnedit-a9d432e9161b4b6c46b6a95df71ed4b7.yaml new file mode 100644 index 0000000000..7cc3221109 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/plugnedit-a9d432e9161b4b6c46b6a95df71ed4b7.yaml @@ -0,0 +1,58 @@ +id: plugnedit-a9d432e9161b4b6c46b6a95df71ed4b7 + +info: + name: > + PlugNedit Adaptive Editor < 6.2.0 - Cross-Site Request Forgery leading to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9160c10-8e10-44b2-b08a-612856869689?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/plugnedit/" + google-query: inurl:"/wp-content/plugins/plugnedit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,plugnedit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/plugnedit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "plugnedit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pluscaptcha-1a537a66e5a0122e9300b301ca51e7e6.yaml b/nuclei-templates/cve-less/plugins/pluscaptcha-1a537a66e5a0122e9300b301ca51e7e6.yaml new file mode 100644 index 0000000000..f70fbe2f2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pluscaptcha-1a537a66e5a0122e9300b301ca51e7e6.yaml @@ -0,0 +1,58 @@ +id: pluscaptcha-1a537a66e5a0122e9300b301ca51e7e6 + +info: + name: > + PlusCaptcha <= 2.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ff18222-5796-432e-a810-d01fd5fbec4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pluscaptcha/" + google-query: inurl:"/wp-content/plugins/pluscaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pluscaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pluscaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pluscaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pmpro-ccbill-1758abc4263fca3455f9d9502f847bae.yaml b/nuclei-templates/cve-less/plugins/pmpro-ccbill-1758abc4263fca3455f9d9502f847bae.yaml new file mode 100644 index 0000000000..6d4b5e2254 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pmpro-ccbill-1758abc4263fca3455f9d9502f847bae.yaml @@ -0,0 +1,58 @@ +id: pmpro-ccbill-1758abc4263fca3455f9d9502f847bae + +info: + name: > + Paid Memberships Pro CCBill Gateway <= 0.3 - Insufficient Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47bb46df-3ed6-4331-8c05-c76331aa6995?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pmpro-ccbill/" + google-query: inurl:"/wp-content/plugins/pmpro-ccbill/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pmpro-ccbill,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pmpro-ccbill/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pmpro-ccbill" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pmpro-courses-001a8dbb2842e703a09732c4c42c632c.yaml b/nuclei-templates/cve-less/plugins/pmpro-courses-001a8dbb2842e703a09732c4c42c632c.yaml new file mode 100644 index 0000000000..72a31a6894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pmpro-courses-001a8dbb2842e703a09732c4c42c632c.yaml @@ -0,0 +1,58 @@ +id: pmpro-courses-001a8dbb2842e703a09732c4c42c632c + +info: + name: > + Paid Memberships Pro - Courses for Membership Add On <= 1.2.3 - Missing Authorization to Authenticated (Subscriber+) Course Modifications + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2dee8d2-e1ab-455c-b922-92881f62fc5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pmpro-courses/" + google-query: inurl:"/wp-content/plugins/pmpro-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pmpro-courses,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pmpro-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pmpro-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pmpro-courses-91c7b7fe658244c6edc7ae3511a3b054.yaml b/nuclei-templates/cve-less/plugins/pmpro-courses-91c7b7fe658244c6edc7ae3511a3b054.yaml new file mode 100644 index 0000000000..3b72a269c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pmpro-courses-91c7b7fe658244c6edc7ae3511a3b054.yaml @@ -0,0 +1,58 @@ +id: pmpro-courses-91c7b7fe658244c6edc7ae3511a3b054 + +info: + name: > + Paid Memberships Pro - Courses for Membership Add On <= 1.2.3 - Cross-Site Request Forgery to Course Modifications + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e454573-4b34-40e3-b4c3-10eb71dfa03e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pmpro-courses/" + google-query: inurl:"/wp-content/plugins/pmpro-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pmpro-courses,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pmpro-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pmpro-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pmpro-courses-b95250d725c58e5f77c57b6de18a5532.yaml b/nuclei-templates/cve-less/plugins/pmpro-courses-b95250d725c58e5f77c57b6de18a5532.yaml new file mode 100644 index 0000000000..b8b1ef1b9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pmpro-courses-b95250d725c58e5f77c57b6de18a5532.yaml @@ -0,0 +1,58 @@ +id: pmpro-courses-b95250d725c58e5f77c57b6de18a5532 + +info: + name: > + Paid Memberships Pro - Courses for Membership Add On <= 1.2.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55fac183-bd8d-4e16-b25a-784861897deb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pmpro-courses/" + google-query: inurl:"/wp-content/plugins/pmpro-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pmpro-courses,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pmpro-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pmpro-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pmpro-courses-d8db452c19f101c274ba8899184fb3d0.yaml b/nuclei-templates/cve-less/plugins/pmpro-courses-d8db452c19f101c274ba8899184fb3d0.yaml new file mode 100644 index 0000000000..392a8319aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pmpro-courses-d8db452c19f101c274ba8899184fb3d0.yaml @@ -0,0 +1,58 @@ +id: pmpro-courses-d8db452c19f101c274ba8899184fb3d0 + +info: + name: > + Premium Courses & eLearning <= 1.0.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7f024c5-80d8-490f-b448-9bccb877024b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pmpro-courses/" + google-query: inurl:"/wp-content/plugins/pmpro-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pmpro-courses,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pmpro-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pmpro-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pmpro-mailchimp-b69217b2f780a8df207734ae1925c5b4.yaml b/nuclei-templates/cve-less/plugins/pmpro-mailchimp-b69217b2f780a8df207734ae1925c5b4.yaml new file mode 100644 index 0000000000..8efe7af126 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pmpro-mailchimp-b69217b2f780a8df207734ae1925c5b4.yaml @@ -0,0 +1,58 @@ +id: pmpro-mailchimp-b69217b2f780a8df207734ae1925c5b4 + +info: + name: > + Paid Memberships Pro – Mailchimp Add On <= 2.3.4 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/415c2648-4fcb-4226-baac-9e75db79bfdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pmpro-mailchimp/" + google-query: inurl:"/wp-content/plugins/pmpro-mailchimp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pmpro-mailchimp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pmpro-mailchimp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pmpro-mailchimp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pmpro-payfast-160c7d8906d4726b6004392f05625a85.yaml b/nuclei-templates/cve-less/plugins/pmpro-payfast-160c7d8906d4726b6004392f05625a85.yaml new file mode 100644 index 0000000000..2ae8224ee8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pmpro-payfast-160c7d8906d4726b6004392f05625a85.yaml @@ -0,0 +1,58 @@ +id: pmpro-payfast-160c7d8906d4726b6004392f05625a85 + +info: + name: > + Paid Memberships Pro – Payfast Gateway Add On <= 1.4.1 - Unauthenticated Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3e194c0-b35a-496b-b31a-666334312f20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pmpro-payfast/" + google-query: inurl:"/wp-content/plugins/pmpro-payfast/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pmpro-payfast,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pmpro-payfast/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pmpro-payfast" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pmpro-register-helper-f1d7c5edd451960671d8bd82cadc646e.yaml b/nuclei-templates/cve-less/plugins/pmpro-register-helper-f1d7c5edd451960671d8bd82cadc646e.yaml new file mode 100644 index 0000000000..100d55a2da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pmpro-register-helper-f1d7c5edd451960671d8bd82cadc646e.yaml @@ -0,0 +1,58 @@ +id: pmpro-register-helper-f1d7c5edd451960671d8bd82cadc646e + +info: + name: > + Custom User Profile Fields <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb117172-c853-4448-9648-367bb9a0d2c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pmpro-register-helper/" + google-query: inurl:"/wp-content/plugins/pmpro-register-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pmpro-register-helper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pmpro-register-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pmpro-register-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/png-to-jpg-63d2a51e3e8824195c3d41033688aedc.yaml b/nuclei-templates/cve-less/plugins/png-to-jpg-63d2a51e3e8824195c3d41033688aedc.yaml new file mode 100644 index 0000000000..5850ff8b52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/png-to-jpg-63d2a51e3e8824195c3d41033688aedc.yaml @@ -0,0 +1,58 @@ +id: png-to-jpg-63d2a51e3e8824195c3d41033688aedc + +info: + name: > + PNG to JPG <= 5.8 - Cross-Site Request Forgery leading to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4fd340-6e94-4032-9202-8ccfa7481223?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/png-to-jpg/" + google-query: inurl:"/wp-content/plugins/png-to-jpg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,png-to-jpg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/png-to-jpg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "png-to-jpg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pocket-news-generator-a0985a296fca110ec993acbc89421094.yaml b/nuclei-templates/cve-less/plugins/pocket-news-generator-a0985a296fca110ec993acbc89421094.yaml new file mode 100644 index 0000000000..a81c90f509 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pocket-news-generator-a0985a296fca110ec993acbc89421094.yaml @@ -0,0 +1,58 @@ +id: pocket-news-generator-a0985a296fca110ec993acbc89421094 + +info: + name: > + Pocket News Generator <= 0.2.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fe7f4e4-3774-408b-8a2a-0db67bc34fcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pocket-news-generator/" + google-query: inurl:"/wp-content/plugins/pocket-news-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pocket-news-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pocket-news-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pocket-news-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pocket-news-generator-e23aa6f9657419fe19f8c4bed7c9e59d.yaml b/nuclei-templates/cve-less/plugins/pocket-news-generator-e23aa6f9657419fe19f8c4bed7c9e59d.yaml new file mode 100644 index 0000000000..60764b14eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pocket-news-generator-e23aa6f9657419fe19f8c4bed7c9e59d.yaml @@ -0,0 +1,58 @@ +id: pocket-news-generator-e23aa6f9657419fe19f8c4bed7c9e59d + +info: + name: > + Pocket News Generator <= 0.2.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c8a487c-6bd5-480a-9945-ba465b38243f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pocket-news-generator/" + google-query: inurl:"/wp-content/plugins/pocket-news-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pocket-news-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pocket-news-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pocket-news-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podcast-box-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/podcast-box-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..05274b9a8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podcast-box-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: podcast-box-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podcast-box/" + google-query: inurl:"/wp-content/plugins/podcast-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podcast-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podcast-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podcast-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podcast-channels-c4998932aa42fcf89b684f69330f53ac.yaml b/nuclei-templates/cve-less/plugins/podcast-channels-c4998932aa42fcf89b684f69330f53ac.yaml new file mode 100644 index 0000000000..e78fd3ec6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podcast-channels-c4998932aa42fcf89b684f69330f53ac.yaml @@ -0,0 +1,58 @@ +id: podcast-channels-c4998932aa42fcf89b684f69330f53ac + +info: + name: > + Podcast Channels <= 0.20 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb2cda13-4fc8-4158-9462-db20fb0965bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podcast-channels/" + google-query: inurl:"/wp-content/plugins/podcast-channels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podcast-channels,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podcast-channels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podcast-channels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podcast-importer-secondline-39c09063986ff422c9e20ab8b773f550.yaml b/nuclei-templates/cve-less/plugins/podcast-importer-secondline-39c09063986ff422c9e20ab8b773f550.yaml new file mode 100644 index 0000000000..0f1129af46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podcast-importer-secondline-39c09063986ff422c9e20ab8b773f550.yaml @@ -0,0 +1,58 @@ +id: podcast-importer-secondline-39c09063986ff422c9e20ab8b773f550 + +info: + name: > + Podcast Importer SecondLine < 1.3.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b0f887c-b9e5-4d3c-b354-ebf5741dc3ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podcast-importer-secondline/" + google-query: inurl:"/wp-content/plugins/podcast-importer-secondline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podcast-importer-secondline,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podcast-importer-secondline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podcast-importer-secondline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podcast-importer-secondline-de4fed651acf6eb0a9891cf52fedb252.yaml b/nuclei-templates/cve-less/plugins/podcast-importer-secondline-de4fed651acf6eb0a9891cf52fedb252.yaml new file mode 100644 index 0000000000..36df2ea35d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podcast-importer-secondline-de4fed651acf6eb0a9891cf52fedb252.yaml @@ -0,0 +1,58 @@ +id: podcast-importer-secondline-de4fed651acf6eb0a9891cf52fedb252 + +info: + name: > + Podcast Importer SecondLine <= 1.1.4 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ee7f904-d150-4da1-a79c-502fe2ca3b37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podcast-importer-secondline/" + google-query: inurl:"/wp-content/plugins/podcast-importer-secondline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podcast-importer-secondline,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podcast-importer-secondline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podcast-importer-secondline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podcast-subscribe-buttons-a5c381dc4cbdb7060fc30ca87a13ef99.yaml b/nuclei-templates/cve-less/plugins/podcast-subscribe-buttons-a5c381dc4cbdb7060fc30ca87a13ef99.yaml new file mode 100644 index 0000000000..44ee1785dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podcast-subscribe-buttons-a5c381dc4cbdb7060fc30ca87a13ef99.yaml @@ -0,0 +1,58 @@ +id: podcast-subscribe-buttons-a5c381dc4cbdb7060fc30ca87a13ef99 + +info: + name: > + Podcast Subscribe Buttons <= 1.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17dbfb82-e380-464a-bfaf-2d0f6bf07f25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podcast-subscribe-buttons/" + google-query: inurl:"/wp-content/plugins/podcast-subscribe-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podcast-subscribe-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podcast-subscribe-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podcast-subscribe-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podcast-subscribe-buttons-e54fc04abf0b5b0662339153e1522a1e.yaml b/nuclei-templates/cve-less/plugins/podcast-subscribe-buttons-e54fc04abf0b5b0662339153e1522a1e.yaml new file mode 100644 index 0000000000..55b63ef9b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podcast-subscribe-buttons-e54fc04abf0b5b0662339153e1522a1e.yaml @@ -0,0 +1,58 @@ +id: podcast-subscribe-buttons-e54fc04abf0b5b0662339153e1522a1e + +info: + name: > + Podcast Subscribe Buttons < 1.4.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b66540ec-7a01-431c-a8bf-dbced505bf1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podcast-subscribe-buttons/" + google-query: inurl:"/wp-content/plugins/podcast-subscribe-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podcast-subscribe-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podcast-subscribe-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podcast-subscribe-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podcasting-8fa43cada4de49d673caee2179427c31.yaml b/nuclei-templates/cve-less/plugins/podcasting-8fa43cada4de49d673caee2179427c31.yaml new file mode 100644 index 0000000000..ab95ee4282 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podcasting-8fa43cada4de49d673caee2179427c31.yaml @@ -0,0 +1,58 @@ +id: podcasting-8fa43cada4de49d673caee2179427c31 + +info: + name: > + Podcasting Plugin by TSG < 3.0.5 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13b4efa1-3f52-476c-80fe-b36ccb62a24b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podcasting/" + google-query: inurl:"/wp-content/plugins/podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podcasting,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-110726f45fe770f212d1aee89f3bb57f.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-110726f45fe770f212d1aee89f3bb57f.yaml new file mode 100644 index 0000000000..f15d347f70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-110726f45fe770f212d1aee89f3bb57f.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-110726f45fe770f212d1aee89f3bb57f + +info: + name: > + Podlove Podcast Publisher <= 3.8.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d353d8b7-76a5-45ce-aa7c-d571dedcbfd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-2e10545dd7017e6f584fc20c4f8e8985.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-2e10545dd7017e6f584fc20c4f8e8985.yaml new file mode 100644 index 0000000000..3575eeda0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-2e10545dd7017e6f584fc20c4f8e8985.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-2e10545dd7017e6f584fc20c4f8e8985 + +info: + name: > + Podlove Podcast Publisher <= 4.0.11 - Missing Authorization to Settings Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c9cf461-572c-4be8-96e6-659acf3208f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-3472d41d965a1eba1565dbf3f6f91c0c.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-3472d41d965a1eba1565dbf3f6f91c0c.yaml new file mode 100644 index 0000000000..228573b9c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-3472d41d965a1eba1565dbf3f6f91c0c.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-3472d41d965a1eba1565dbf3f6f91c0c + +info: + name: > + Podlove Podcast Publisher <= 4.0.11 - Missing Authorization to Unauthenticated Data Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7b25b66-e9d1-448d-8367-cce4c0dec635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-4a1b15e037b0e674a6b8abd0386af8e9.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-4a1b15e037b0e674a6b8abd0386af8e9.yaml new file mode 100644 index 0000000000..46c614eb4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-4a1b15e037b0e674a6b8abd0386af8e9.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-4a1b15e037b0e674a6b8abd0386af8e9 + +info: + name: > + Podlove Podcast Publisher <= 4.0.11 - Authenticated (Contributor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35f82406-f75d-4510-81c0-14af3d944bf0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-5bb8fe4f6089667dd51c2e2e1a9444ca.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-5bb8fe4f6089667dd51c2e2e1a9444ca.yaml new file mode 100644 index 0000000000..e5ba63b979 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-5bb8fe4f6089667dd51c2e2e1a9444ca.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-5bb8fe4f6089667dd51c2e2e1a9444ca + +info: + name: > + Podlove Podcast Publisher <= 4.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddfc0150-d05c-4027-80d2-64c565fdd56d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-6143c745f174c1205927522fed8aa49e.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-6143c745f174c1205927522fed8aa49e.yaml new file mode 100644 index 0000000000..547e1f2e88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-6143c745f174c1205927522fed8aa49e.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-6143c745f174c1205927522fed8aa49e + +info: + name: > + Podlove Podcast Publisher <= 4.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b19af06d-7262-4d21-ac39-7d4ce8e75d71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-c5c5fe7ae04b300c4245ab22359369aa.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-c5c5fe7ae04b300c4245ab22359369aa.yaml new file mode 100644 index 0000000000..6dfad165a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-c5c5fe7ae04b300c4245ab22359369aa.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-c5c5fe7ae04b300c4245ab22359369aa + +info: + name: > + Podlove Podcast Publisher <= 2.5.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da082107-1c71-4d18-a864-986807568de9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-d871e2a497ccda6c7cc830c72c3348e0.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-d871e2a497ccda6c7cc830c72c3348e0.yaml new file mode 100644 index 0000000000..4d49e7b886 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-d871e2a497ccda6c7cc830c72c3348e0.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-d871e2a497ccda6c7cc830c72c3348e0 + +info: + name: > + Podlove Podcast Publisher <= 4.0.14 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b40e70ed-cdcb-4999-92a9-45bbd2515a3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-e253bc9eb60b3ba0170a2740ba27c2f4.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-e253bc9eb60b3ba0170a2740ba27c2f4.yaml new file mode 100644 index 0000000000..2a50b0ff01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-e253bc9eb60b3ba0170a2740ba27c2f4.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-e253bc9eb60b3ba0170a2740ba27c2f4 + +info: + name: > + Podlove Podcast Publisher < 2.3.16 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13968257-593d-433e-9583-5bb5d6c6b2d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f7d71098b8867ed535059e5ab72f5309.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f7d71098b8867ed535059e5ab72f5309.yaml new file mode 100644 index 0000000000..378c2c5dbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f7d71098b8867ed535059e5ab72f5309.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-f7d71098b8867ed535059e5ab72f5309 + +info: + name: > + Podlove Podcast Publisher <= 4.0.12 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6f4ee5d-819d-4125-8cff-acf9811e2919?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f9001c4d0d146f20e371013d48c397ad.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f9001c4d0d146f20e371013d48c397ad.yaml new file mode 100644 index 0000000000..bffd644b79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f9001c4d0d146f20e371013d48c397ad.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-f9001c4d0d146f20e371013d48c397ad + +info: + name: > + Podlove Podcast Publisher <= 3.5.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8c01984-e8ba-4671-b63c-46ea245e7efa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f9c4a4753797c567682067fdd891aa71.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f9c4a4753797c567682067fdd891aa71.yaml new file mode 100644 index 0000000000..2d76386064 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-f9c4a4753797c567682067fdd891aa71.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-f9c4a4753797c567682067fdd891aa71 + +info: + name: > + Podlove Podcast Publisher < 2.3.16 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f526959-be34-48d1-8aa1-e36f7708bd20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-feda90e2637dc66a787016724474b475.yaml b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-feda90e2637dc66a787016724474b475.yaml new file mode 100644 index 0000000000..da133efada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-podcasting-plugin-for-wordpress-feda90e2637dc66a787016724474b475.yaml @@ -0,0 +1,58 @@ +id: podlove-podcasting-plugin-for-wordpress-feda90e2637dc66a787016724474b475 + +info: + name: > + Podlove Podcast Publisher <= 3.8.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17f2b07d-82de-4e25-9b17-ef4a1132e6c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-podcasting-plugin-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-subscribe-button-2f90b927ae201cfb6bea80146d60cefb.yaml b/nuclei-templates/cve-less/plugins/podlove-subscribe-button-2f90b927ae201cfb6bea80146d60cefb.yaml new file mode 100644 index 0000000000..e1f9a4de7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-subscribe-button-2f90b927ae201cfb6bea80146d60cefb.yaml @@ -0,0 +1,58 @@ +id: podlove-subscribe-button-2f90b927ae201cfb6bea80146d60cefb + +info: + name: > + Podlove Subscribe button <= 1.3.7 - Cross-Site Request Forgery via save function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb9a6c9b-24fb-436f-b583-55adeedb726e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-subscribe-button/" + google-query: inurl:"/wp-content/plugins/podlove-subscribe-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-subscribe-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-subscribe-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-subscribe-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-subscribe-button-4f7a95f2553b4e4ec80b6d04a6fbc8bb.yaml b/nuclei-templates/cve-less/plugins/podlove-subscribe-button-4f7a95f2553b4e4ec80b6d04a6fbc8bb.yaml new file mode 100644 index 0000000000..020c86d467 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-subscribe-button-4f7a95f2553b4e4ec80b6d04a6fbc8bb.yaml @@ -0,0 +1,58 @@ +id: podlove-subscribe-button-4f7a95f2553b4e4ec80b6d04a6fbc8bb + +info: + name: > + Podlove Subscribe button <= 1.3.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89058e5a-0f67-4162-ba3b-0a4353d1e0a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-subscribe-button/" + google-query: inurl:"/wp-content/plugins/podlove-subscribe-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-subscribe-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-subscribe-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-subscribe-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-subscribe-button-858f2f8353e461ae105f6c048cf36fc0.yaml b/nuclei-templates/cve-less/plugins/podlove-subscribe-button-858f2f8353e461ae105f6c048cf36fc0.yaml new file mode 100644 index 0000000000..f34343bdb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-subscribe-button-858f2f8353e461ae105f6c048cf36fc0.yaml @@ -0,0 +1,58 @@ +id: podlove-subscribe-button-858f2f8353e461ae105f6c048cf36fc0 + +info: + name: > + Podlove Subscribe button <= 1.3.7 - Cross-Site Request Forgery via process_form function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af695224-24e7-4d5b-b472-dee53eb6073f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-subscribe-button/" + google-query: inurl:"/wp-content/plugins/podlove-subscribe-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-subscribe-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-subscribe-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-subscribe-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-subscribe-button-f884e1e5931aac898c331db3ff9b0a47.yaml b/nuclei-templates/cve-less/plugins/podlove-subscribe-button-f884e1e5931aac898c331db3ff9b0a47.yaml new file mode 100644 index 0000000000..5fe1334735 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-subscribe-button-f884e1e5931aac898c331db3ff9b0a47.yaml @@ -0,0 +1,58 @@ +id: podlove-subscribe-button-f884e1e5931aac898c331db3ff9b0a47 + +info: + name: > + Podlove Subscribe button <= 1.3.10 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f234f05f-e377-4e89-81e1-f47ff44eebc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-subscribe-button/" + google-query: inurl:"/wp-content/plugins/podlove-subscribe-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-subscribe-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-subscribe-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-subscribe-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-web-player-5b013c9961d2008bd8c1b51839f147f0.yaml b/nuclei-templates/cve-less/plugins/podlove-web-player-5b013c9961d2008bd8c1b51839f147f0.yaml new file mode 100644 index 0000000000..ecd82d127a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-web-player-5b013c9961d2008bd8c1b51839f147f0.yaml @@ -0,0 +1,58 @@ +id: podlove-web-player-5b013c9961d2008bd8c1b51839f147f0 + +info: + name: > + Podlove Web Player <= 5.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/141e5e08-efc3-4da7-ada3-4774dac88884?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-web-player/" + google-query: inurl:"/wp-content/plugins/podlove-web-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-web-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-web-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-web-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podlove-web-player-e884ca510b37335b1134220e4cc6625b.yaml b/nuclei-templates/cve-less/plugins/podlove-web-player-e884ca510b37335b1134220e4cc6625b.yaml new file mode 100644 index 0000000000..764e97ac4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podlove-web-player-e884ca510b37335b1134220e4cc6625b.yaml @@ -0,0 +1,58 @@ +id: podlove-web-player-e884ca510b37335b1134220e4cc6625b + +info: + name: > + Podlove Web Player <= 5.7.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fd8a952-d723-45a2-9027-12e3d99f715b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podlove-web-player/" + google-query: inurl:"/wp-content/plugins/podlove-web-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podlove-web-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podlove-web-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podlove-web-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/podpress-396371aecede5680b30f6adf18b9bebd.yaml b/nuclei-templates/cve-less/plugins/podpress-396371aecede5680b30f6adf18b9bebd.yaml new file mode 100644 index 0000000000..80376b6c83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/podpress-396371aecede5680b30f6adf18b9bebd.yaml @@ -0,0 +1,58 @@ +id: podpress-396371aecede5680b30f6adf18b9bebd + +info: + name: > + podPress <= 8.8.10.17 - Cross-Site Scripting via playerID + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e56ebe2a-8a7e-454b-a1cd-7103112087e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/podpress/" + google-query: inurl:"/wp-content/plugins/podpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,podpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/podpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "podpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.8.10.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-33493821da381511f179da2cf195b351.yaml b/nuclei-templates/cve-less/plugins/pods-33493821da381511f179da2cf195b351.yaml new file mode 100644 index 0000000000..14fee6842d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-33493821da381511f179da2cf195b351.yaml @@ -0,0 +1,58 @@ +id: pods-33493821da381511f179da2cf195b351 + +info: + name: > + Pods - Custom Content Types and Fields - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3', '<= 3.0.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-79c1e1544a74f2c87544fd2e816d236c.yaml b/nuclei-templates/cve-less/plugins/pods-79c1e1544a74f2c87544fd2e816d236c.yaml new file mode 100644 index 0000000000..3f3f1e472d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-79c1e1544a74f2c87544fd2e816d236c.yaml @@ -0,0 +1,58 @@ +id: pods-79c1e1544a74f2c87544fd2e816d236c + +info: + name: > + Pods <= 2.9.10.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d874f9d7-c532-467d-9e3d-9529dd5bdc47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-7a55c80cef31b1897125e271418538f4.yaml b/nuclei-templates/cve-less/plugins/pods-7a55c80cef31b1897125e271418538f4.yaml new file mode 100644 index 0000000000..c65fd92912 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-7a55c80cef31b1897125e271418538f4.yaml @@ -0,0 +1,58 @@ +id: pods-7a55c80cef31b1897125e271418538f4 + +info: + name: > + Pods - Custom Content Types and Fields - Authenticated (Contributor+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3', '<= 3.0.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-85f6ac4895a90413fa74a9e82058c7a0.yaml b/nuclei-templates/cve-less/plugins/pods-85f6ac4895a90413fa74a9e82058c7a0.yaml new file mode 100644 index 0000000000..d43cba755c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-85f6ac4895a90413fa74a9e82058c7a0.yaml @@ -0,0 +1,58 @@ +id: pods-85f6ac4895a90413fa74a9e82058c7a0 + +info: + name: > + Pods - Custom Content Types and Fields - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa7d0c2-27ec-47ad-8baa-c281c273078e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3', '<= 3.0.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml b/nuclei-templates/cve-less/plugins/pods-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml new file mode 100644 index 0000000000..1df5b87e12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml @@ -0,0 +1,58 @@ +id: pods-a7d43e65e4e3ff48ff1d77822c4c9c14 + +info: + name: > + Pods <= 2.4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b8a9c85-a7cd-469c-834b-d1d89387cf63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-b37f90f1be095104847aff5ef46084ff.yaml b/nuclei-templates/cve-less/plugins/pods-b37f90f1be095104847aff5ef46084ff.yaml new file mode 100644 index 0000000000..a55d9b30cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-b37f90f1be095104847aff5ef46084ff.yaml @@ -0,0 +1,58 @@ +id: pods-b37f90f1be095104847aff5ef46084ff + +info: + name: > + Pods – Custom Content Types and Fields < 2.5.1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e95b2bfe-8675-4932-9b37-73ad15fa228e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-ba3ebdc8660c704b12fdc576b67a35b8.yaml b/nuclei-templates/cve-less/plugins/pods-ba3ebdc8660c704b12fdc576b67a35b8.yaml new file mode 100644 index 0000000000..8261158630 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-ba3ebdc8660c704b12fdc576b67a35b8.yaml @@ -0,0 +1,58 @@ +id: pods-ba3ebdc8660c704b12fdc576b67a35b8 + +info: + name: > + Pods <= 2.7.26 - Authenticated Stored Cross-Site Scripting via Menu Label field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac8214af-00d0-4dde-a3e7-f657decc4b93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.4.4.2', '<= 2.7.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-d5266edec4a9e9c793fa60a9c89f4ac5.yaml b/nuclei-templates/cve-less/plugins/pods-d5266edec4a9e9c793fa60a9c89f4ac5.yaml new file mode 100644 index 0000000000..1476fe030d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-d5266edec4a9e9c793fa60a9c89f4ac5.yaml @@ -0,0 +1,58 @@ +id: pods-d5266edec4a9e9c793fa60a9c89f4ac5 + +info: + name: > + Pods – Custom Content Types and Fields <= 3.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Pod Form Redirect URL + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0707c92-96e9-444a-8a13-52d49c9e3f5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-dd09b82c04b588417962747e8b977772.yaml b/nuclei-templates/cve-less/plugins/pods-dd09b82c04b588417962747e8b977772.yaml new file mode 100644 index 0000000000..445780b6ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-dd09b82c04b588417962747e8b977772.yaml @@ -0,0 +1,58 @@ +id: pods-dd09b82c04b588417962747e8b977772 + +info: + name: > + Pods – Custom Content Types and Fields <= 2.7.28 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76d850dd-75f3-4671-9561-0e361d09a121?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-fc1ea9d8e61023700e49f1688ac8b5c8.yaml b/nuclei-templates/cve-less/plugins/pods-fc1ea9d8e61023700e49f1688ac8b5c8.yaml new file mode 100644 index 0000000000..e18c73f267 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-fc1ea9d8e61023700e49f1688ac8b5c8.yaml @@ -0,0 +1,58 @@ +id: pods-fc1ea9d8e61023700e49f1688ac8b5c8 + +info: + name: > + Pods <= 2.4.3 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19b4a27d-d9de-4567-86cd-8ec821ee299a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pods-ff2c0144dd3f14c012ac895bb24d6c4c.yaml b/nuclei-templates/cve-less/plugins/pods-ff2c0144dd3f14c012ac895bb24d6c4c.yaml new file mode 100644 index 0000000000..4826a63472 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pods-ff2c0144dd3f14c012ac895bb24d6c4c.yaml @@ -0,0 +1,58 @@ +id: pods-ff2c0144dd3f14c012ac895bb24d6c4c + +info: + name: > + Pods 2.4.4.1 - 2.7.26 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aba54af1-732a-49e6-a8c4-76f276a5581a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pods/" + google-query: inurl:"/wp-content/plugins/pods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pods,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.4.4.1', '<= 2.7.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poeditor-724f781d1b8ccbd2ec3504075cc6a13c.yaml b/nuclei-templates/cve-less/plugins/poeditor-724f781d1b8ccbd2ec3504075cc6a13c.yaml new file mode 100644 index 0000000000..371e96dd82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poeditor-724f781d1b8ccbd2ec3504075cc6a13c.yaml @@ -0,0 +1,58 @@ +id: poeditor-724f781d1b8ccbd2ec3504075cc6a13c + +info: + name: > + POEditor <= 0.9.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e81e947-4892-4028-8a09-6a048bf6a572?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poeditor/" + google-query: inurl:"/wp-content/plugins/poeditor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poeditor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poeditor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poeditor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poeditor-d3df4f8a3c09c9129b3791672c61fc3a.yaml b/nuclei-templates/cve-less/plugins/poeditor-d3df4f8a3c09c9129b3791672c61fc3a.yaml new file mode 100644 index 0000000000..004ed97f00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poeditor-d3df4f8a3c09c9129b3791672c61fc3a.yaml @@ -0,0 +1,58 @@ +id: poeditor-d3df4f8a3c09c9129b3791672c61fc3a + +info: + name: > + POEditor <= 0.9.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8671bf69-640d-4656-ae22-a46daadf58a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poeditor/" + google-query: inurl:"/wp-content/plugins/poeditor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poeditor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poeditor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poeditor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/points-and-rewards-for-woocommerce-215be45a340fc01142771f1f9ff27095.yaml b/nuclei-templates/cve-less/plugins/points-and-rewards-for-woocommerce-215be45a340fc01142771f1f9ff27095.yaml new file mode 100644 index 0000000000..12a9792cd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/points-and-rewards-for-woocommerce-215be45a340fc01142771f1f9ff27095.yaml @@ -0,0 +1,58 @@ +id: points-and-rewards-for-woocommerce-215be45a340fc01142771f1f9ff27095 + +info: + name: > + Points and Rewards for WooCommerce <= 1.5.0 - Cross-Site Request Forgery to Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36a43b08-872e-4760-a319-67e30fd004a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/points-and-rewards-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/points-and-rewards-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,points-and-rewards-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/points-and-rewards-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "points-and-rewards-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/points-and-rewards-for-woocommerce-f595c203a77330422dba7245cce84dcd.yaml b/nuclei-templates/cve-less/plugins/points-and-rewards-for-woocommerce-f595c203a77330422dba7245cce84dcd.yaml new file mode 100644 index 0000000000..36bec719c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/points-and-rewards-for-woocommerce-f595c203a77330422dba7245cce84dcd.yaml @@ -0,0 +1,58 @@ +id: points-and-rewards-for-woocommerce-f595c203a77330422dba7245cce84dcd + +info: + name: > + Points and Rewards for WooCommerce <= 1.5.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e7ac22f-cb50-46b6-b244-22b5e8dc8142?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/points-and-rewards-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/points-and-rewards-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,points-and-rewards-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/points-and-rewards-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "points-and-rewards-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-18f92d3237c36d8e0be4fe5c61fd453f.yaml b/nuclei-templates/cve-less/plugins/poll-maker-18f92d3237c36d8e0be4fe5c61fd453f.yaml new file mode 100644 index 0000000000..3fa28db967 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-18f92d3237c36d8e0be4fe5c61fd453f.yaml @@ -0,0 +1,58 @@ +id: poll-maker-18f92d3237c36d8e0be4fe5c61fd453f + +info: + name: > + Poll Maker <= 3.2.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/022dcd52-0e6f-4979-9088-d257b6a5fc11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-29bc9c14cc220941303188c45b9daf29.yaml b/nuclei-templates/cve-less/plugins/poll-maker-29bc9c14cc220941303188c45b9daf29.yaml new file mode 100644 index 0000000000..35a3194105 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-29bc9c14cc220941303188c45b9daf29.yaml @@ -0,0 +1,58 @@ +id: poll-maker-29bc9c14cc220941303188c45b9daf29 + +info: + name: > + Poll Maker <= 4.6.2 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e55ba61d-6fd0-4269-8ee9-3b8645d52e1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-2db56d3c99ea70472b056252e5e2e9e6.yaml b/nuclei-templates/cve-less/plugins/poll-maker-2db56d3c99ea70472b056252e5e2e9e6.yaml new file mode 100644 index 0000000000..61d856772e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-2db56d3c99ea70472b056252e5e2e9e6.yaml @@ -0,0 +1,58 @@ +id: poll-maker-2db56d3c99ea70472b056252e5e2e9e6 + +info: + name: > + Poll Maker <= 3.2.8 – Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2523f85d-be90-4334-b8d5-8021ec05283d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-3172cfdf5fc8b7e358c053d42d06583b.yaml b/nuclei-templates/cve-less/plugins/poll-maker-3172cfdf5fc8b7e358c053d42d06583b.yaml new file mode 100644 index 0000000000..169906e190 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-3172cfdf5fc8b7e358c053d42d06583b.yaml @@ -0,0 +1,58 @@ +id: poll-maker-3172cfdf5fc8b7e358c053d42d06583b + +info: + name: > + Poll Maker – Best WordPress Poll Plugin <= 5.1.8 - Missing Authorization to Unauthenticated Email Enumeration + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc0505a1-c7c4-4cf1-97cd-123a4dddcea3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-79decf1a0edb8491c84a287af6c9aee1.yaml b/nuclei-templates/cve-less/plugins/poll-maker-79decf1a0edb8491c84a287af6c9aee1.yaml new file mode 100644 index 0000000000..5205497464 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-79decf1a0edb8491c84a287af6c9aee1.yaml @@ -0,0 +1,58 @@ +id: poll-maker-79decf1a0edb8491c84a287af6c9aee1 + +info: + name: > + Poll Maker <= 4.8.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/345097c7-8f0e-46ed-9a1d-7c8a4a589e3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-7a1aa0c88530968ed1b5b646f3180462.yaml b/nuclei-templates/cve-less/plugins/poll-maker-7a1aa0c88530968ed1b5b646f3180462.yaml new file mode 100644 index 0000000000..5d6e29116d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-7a1aa0c88530968ed1b5b646f3180462.yaml @@ -0,0 +1,58 @@ +id: poll-maker-7a1aa0c88530968ed1b5b646f3180462 + +info: + name: > + Poll Maker <= 4.0.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16e63535-28bc-4a3d-a201-4216dc786d98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-b01ef863c43e07a65402f06b0d7b0757.yaml b/nuclei-templates/cve-less/plugins/poll-maker-b01ef863c43e07a65402f06b0d7b0757.yaml new file mode 100644 index 0000000000..fa1613fabc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-b01ef863c43e07a65402f06b0d7b0757.yaml @@ -0,0 +1,58 @@ +id: poll-maker-b01ef863c43e07a65402f06b0d7b0757 + +info: + name: > + Poll Maker <= 4.7.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a27fcc6-b1ac-4649-892b-7e0dee3f0d08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-c07bb721e301a0dbb891c103a2081934.yaml b/nuclei-templates/cve-less/plugins/poll-maker-c07bb721e301a0dbb891c103a2081934.yaml new file mode 100644 index 0000000000..7626c4c612 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-c07bb721e301a0dbb891c103a2081934.yaml @@ -0,0 +1,58 @@ +id: poll-maker-c07bb721e301a0dbb891c103a2081934 + +info: + name: > + Poll Maker < 3.4.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e271effa-2c40-4635-ad6b-ca82b4742567?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-e9a2fbdd50662e029e4a5c38ab41c5ff.yaml b/nuclei-templates/cve-less/plugins/poll-maker-e9a2fbdd50662e029e4a5c38ab41c5ff.yaml new file mode 100644 index 0000000000..4a96545e28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-e9a2fbdd50662e029e4a5c38ab41c5ff.yaml @@ -0,0 +1,58 @@ +id: poll-maker-e9a2fbdd50662e029e4a5c38ab41c5ff + +info: + name: > + Poll Maker <= 4.7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faad9cf7-5d83-4ade-b121-c38fb0de78a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-maker-fd99760a8adb4d7f1b1ef68935056870.yaml b/nuclei-templates/cve-less/plugins/poll-maker-fd99760a8adb4d7f1b1ef68935056870.yaml new file mode 100644 index 0000000000..c6d5d1afbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-maker-fd99760a8adb4d7f1b1ef68935056870.yaml @@ -0,0 +1,58 @@ +id: poll-maker-fd99760a8adb4d7f1b1ef68935056870 + +info: + name: > + Poll Maker – Best WordPress Poll Plugin <= 5.1.8 - Missing Authorization to Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fec015e1-7f64-4917-a242-90bd1135f680?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-maker/" + google-query: inurl:"/wp-content/plugins/poll-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-wp-a7b9bf475d14b8ef039f5657643818f1.yaml b/nuclei-templates/cve-less/plugins/poll-wp-a7b9bf475d14b8ef039f5657643818f1.yaml new file mode 100644 index 0000000000..e9c320edf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-wp-a7b9bf475d14b8ef039f5657643818f1.yaml @@ -0,0 +1,58 @@ +id: poll-wp-a7b9bf475d14b8ef039f5657643818f1 + +info: + name: > + TS Poll – Best Poll Plugin for WordPress <1.3.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b78eb275-bede-44f0-bf72-6931c37d78bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-wp/" + google-query: inurl:"/wp-content/plugins/poll-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poll-wp-c77fa481174899d20ed31a6b22926e33.yaml b/nuclei-templates/cve-less/plugins/poll-wp-c77fa481174899d20ed31a6b22926e33.yaml new file mode 100644 index 0000000000..337f676989 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poll-wp-c77fa481174899d20ed31a6b22926e33.yaml @@ -0,0 +1,58 @@ +id: poll-wp-c77fa481174899d20ed31a6b22926e33 + +info: + name: > + TS Poll – Best Poll Plugin for WordPress <= 1.5.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df3b5124-1151-4402-b30f-038470c7a951?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poll-wp/" + google-query: inurl:"/wp-content/plugins/poll-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poll-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poll-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poll-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polldaddy-24fe066591faebd7c14b911941c41812.yaml b/nuclei-templates/cve-less/plugins/polldaddy-24fe066591faebd7c14b911941c41812.yaml new file mode 100644 index 0000000000..f95ac06552 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polldaddy-24fe066591faebd7c14b911941c41812.yaml @@ -0,0 +1,58 @@ +id: polldaddy-24fe066591faebd7c14b911941c41812 + +info: + name: > + Crowdsignal Dashboard <= 3.0.9 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54f6a790-7cff-4910-a481-48ae13ba57c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polldaddy/" + google-query: inurl:"/wp-content/plugins/polldaddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polldaddy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polldaddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polldaddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polldaddy-30bec56b700c5c01448bca5f7c796f73.yaml b/nuclei-templates/cve-less/plugins/polldaddy-30bec56b700c5c01448bca5f7c796f73.yaml new file mode 100644 index 0000000000..3de58e440a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polldaddy-30bec56b700c5c01448bca5f7c796f73.yaml @@ -0,0 +1,58 @@ +id: polldaddy-30bec56b700c5c01448bca5f7c796f73 + +info: + name: > + Polldaddy Polls & Rating < 2.0.24 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68d9b56b-2460-48d5-95ca-b64e65592b16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polldaddy/" + google-query: inurl:"/wp-content/plugins/polldaddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polldaddy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polldaddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polldaddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polldaddy-3ba84c6caf17726274b8e8f2682a9b39.yaml b/nuclei-templates/cve-less/plugins/polldaddy-3ba84c6caf17726274b8e8f2682a9b39.yaml new file mode 100644 index 0000000000..6e0e2fc999 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polldaddy-3ba84c6caf17726274b8e8f2682a9b39.yaml @@ -0,0 +1,58 @@ +id: polldaddy-3ba84c6caf17726274b8e8f2682a9b39 + +info: + name: > + Crowdsignal Dashboard – Polls, Surveys & more <= 3.0.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17fa37ae-5683-4b5f-995f-934f469141a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polldaddy/" + google-query: inurl:"/wp-content/plugins/polldaddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polldaddy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polldaddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polldaddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polldaddy-7743d4aab2210fca5895ae50928bc6f9.yaml b/nuclei-templates/cve-less/plugins/polldaddy-7743d4aab2210fca5895ae50928bc6f9.yaml new file mode 100644 index 0000000000..dc1be967ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polldaddy-7743d4aab2210fca5895ae50928bc6f9.yaml @@ -0,0 +1,58 @@ +id: polldaddy-7743d4aab2210fca5895ae50928bc6f9 + +info: + name: > + Crowdsignal Dashboard < 2.0.21 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/683e10af-5414-4959-9823-93e88e84bb1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polldaddy/" + google-query: inurl:"/wp-content/plugins/polldaddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polldaddy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polldaddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polldaddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polldaddy-8295098ceddb00b6deaf6e823158a962.yaml b/nuclei-templates/cve-less/plugins/polldaddy-8295098ceddb00b6deaf6e823158a962.yaml new file mode 100644 index 0000000000..b20a3c76ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polldaddy-8295098ceddb00b6deaf6e823158a962.yaml @@ -0,0 +1,58 @@ +id: polldaddy-8295098ceddb00b6deaf6e823158a962 + +info: + name: > + Crowdsignal Dashboard – Polls, Surveys & more <= 3.0.11 - Cross-Site Request Forgery via update_rating + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e03390e5-5604-4b9d-ab1b-dac2b19270cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polldaddy/" + google-query: inurl:"/wp-content/plugins/polldaddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polldaddy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polldaddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polldaddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polldaddy-a04514ff505b4f6eb352afc1674938fd.yaml b/nuclei-templates/cve-less/plugins/polldaddy-a04514ff505b4f6eb352afc1674938fd.yaml new file mode 100644 index 0000000000..fbc4b07690 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polldaddy-a04514ff505b4f6eb352afc1674938fd.yaml @@ -0,0 +1,58 @@ +id: polldaddy-a04514ff505b4f6eb352afc1674938fd + +info: + name: > + Crowdsignal Dashboard – Polls, Surveys & more <= 2.0.31 - Stored Cross-Site scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e17c4ed6-b09a-40ca-bcda-2b881056469c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polldaddy/" + google-query: inurl:"/wp-content/plugins/polldaddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polldaddy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polldaddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polldaddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polldaddy-ab195980f5561581f232d594039c4477.yaml b/nuclei-templates/cve-less/plugins/polldaddy-ab195980f5561581f232d594039c4477.yaml new file mode 100644 index 0000000000..a4e00a0738 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polldaddy-ab195980f5561581f232d594039c4477.yaml @@ -0,0 +1,58 @@ +id: polldaddy-ab195980f5561581f232d594039c4477 + +info: + name: > + Crowdsignal Dashboard – Polls, Surveys & more <= 3.0.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a78da5c5-fb12-4fc9-8c51-6d9f6f7a4043?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polldaddy/" + google-query: inurl:"/wp-content/plugins/polldaddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polldaddy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polldaddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polldaddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polldaddy-bc16d03e307b2f3d476c4281bda98567.yaml b/nuclei-templates/cve-less/plugins/polldaddy-bc16d03e307b2f3d476c4281bda98567.yaml new file mode 100644 index 0000000000..31340097f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polldaddy-bc16d03e307b2f3d476c4281bda98567.yaml @@ -0,0 +1,58 @@ +id: polldaddy-bc16d03e307b2f3d476c4281bda98567 + +info: + name: > + Crowdsignal Dashboard <= 2.0.24 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b0d5d92-1aba-4a0a-a989-a2d797112ade?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polldaddy/" + google-query: inurl:"/wp-content/plugins/polldaddy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polldaddy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polldaddy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polldaddy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polls-widget-ab0d8c25a4b5735f6b566693ae1e6b91.yaml b/nuclei-templates/cve-less/plugins/polls-widget-ab0d8c25a4b5735f6b566693ae1e6b91.yaml new file mode 100644 index 0000000000..945384e250 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polls-widget-ab0d8c25a4b5735f6b566693ae1e6b91.yaml @@ -0,0 +1,58 @@ +id: polls-widget-ab0d8c25a4b5735f6b566693ae1e6b91 + +info: + name: > + Poll, Survey, Questionnaire and Voting system <= 1.7.4 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81ed1733-0073-464c-8ef7-28db228618e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polls-widget/" + google-query: inurl:"/wp-content/plugins/polls-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polls-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polls-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polls-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polls-widget-cf547403a9a90330b0a13308e60c389b.yaml b/nuclei-templates/cve-less/plugins/polls-widget-cf547403a9a90330b0a13308e60c389b.yaml new file mode 100644 index 0000000000..a144a55033 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polls-widget-cf547403a9a90330b0a13308e60c389b.yaml @@ -0,0 +1,58 @@ +id: polls-widget-cf547403a9a90330b0a13308e60c389b + +info: + name: > + Poll, Survey, Questionnaire and Voting system <= 1.5.2 - Unauthenticated Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/162a9203-d169-4d96-9839-110f6a9e4ad3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polls-widget/" + google-query: inurl:"/wp-content/plugins/polls-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polls-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polls-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polls-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polo-video-gallery-62d375a0ef3c9366ba6ad68911a5c603.yaml b/nuclei-templates/cve-less/plugins/polo-video-gallery-62d375a0ef3c9366ba6ad68911a5c603.yaml new file mode 100644 index 0000000000..1e274fe9c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polo-video-gallery-62d375a0ef3c9366ba6ad68911a5c603.yaml @@ -0,0 +1,58 @@ +id: polo-video-gallery-62d375a0ef3c9366ba6ad68911a5c603 + +info: + name: > + Polo Video Gallery – Best wordpress video gallery plugin <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/524452b9-e617-4434-a23f-6026b6f55eeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polo-video-gallery/" + google-query: inurl:"/wp-content/plugins/polo-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polo-video-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polo-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polo-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polylang-734bcf2e1364f37386af10d34a5f3d15.yaml b/nuclei-templates/cve-less/plugins/polylang-734bcf2e1364f37386af10d34a5f3d15.yaml new file mode 100644 index 0000000000..777cc56183 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polylang-734bcf2e1364f37386af10d34a5f3d15.yaml @@ -0,0 +1,58 @@ +id: polylang-734bcf2e1364f37386af10d34a5f3d15 + +info: + name: > + Polylang <= 1.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c38b6cce-ea8b-48f3-a995-173047d1caf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polylang/" + google-query: inurl:"/wp-content/plugins/polylang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polylang,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polylang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polylang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/polylang-79eabca00926846a970481cb6b7e83aa.yaml b/nuclei-templates/cve-less/plugins/polylang-79eabca00926846a970481cb6b7e83aa.yaml new file mode 100644 index 0000000000..5df9e8b4d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/polylang-79eabca00926846a970481cb6b7e83aa.yaml @@ -0,0 +1,58 @@ +id: polylang-79eabca00926846a970481cb6b7e83aa + +info: + name: > + Polylang <= 2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d056eeea-6ed2-4139-ba32-727a95f29aaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/polylang/" + google-query: inurl:"/wp-content/plugins/polylang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,polylang,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/polylang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "polylang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pondol-carousel-c2306772abb4405001a28e4fae27ec0e.yaml b/nuclei-templates/cve-less/plugins/pondol-carousel-c2306772abb4405001a28e4fae27ec0e.yaml new file mode 100644 index 0000000000..201c7cbc9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pondol-carousel-c2306772abb4405001a28e4fae27ec0e.yaml @@ -0,0 +1,58 @@ +id: pondol-carousel-c2306772abb4405001a28e4fae27ec0e + +info: + name: > + Pondol Carousel <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e59e02f-d701-476a-9fd8-2098004089ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pondol-carousel/" + google-query: inurl:"/wp-content/plugins/pondol-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pondol-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pondol-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pondol-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pondol-formmail-28928ab1eb71053bca13e7444bdf6fe5.yaml b/nuclei-templates/cve-less/plugins/pondol-formmail-28928ab1eb71053bca13e7444bdf6fe5.yaml new file mode 100644 index 0000000000..fcc5ded8f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pondol-formmail-28928ab1eb71053bca13e7444bdf6fe5.yaml @@ -0,0 +1,58 @@ +id: pondol-formmail-28928ab1eb71053bca13e7444bdf6fe5 + +info: + name: > + Pondol Form to Mail <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72c5fd31-f457-494a-a160-1f64366e3e63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pondol-formmail/" + google-query: inurl:"/wp-content/plugins/pondol-formmail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pondol-formmail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pondol-formmail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pondol-formmail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pootle-button-650e24c15aeace1d45fa4cd46dde8eb3.yaml b/nuclei-templates/cve-less/plugins/pootle-button-650e24c15aeace1d45fa4cd46dde8eb3.yaml new file mode 100644 index 0000000000..c0dd2dd8cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pootle-button-650e24c15aeace1d45fa4cd46dde8eb3.yaml @@ -0,0 +1,58 @@ +id: pootle-button-650e24c15aeace1d45fa4cd46dde8eb3 + +info: + name: > + pootle button <= 1.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/498f539a-f824-42fb-9df8-c1f82c4b3947?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pootle-button/" + google-query: inurl:"/wp-content/plugins/pootle-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pootle-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pootle-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pootle-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pootle-page-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/pootle-page-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ef97b7f070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pootle-page-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: pootle-page-builder-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pootle-page-builder/" + google-query: inurl:"/wp-content/plugins/pootle-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pootle-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pootle-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pootle-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pop-over-xyz-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/pop-over-xyz-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7f2deaaee7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pop-over-xyz-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: pop-over-xyz-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pop-over-xyz/" + google-query: inurl:"/wp-content/plugins/pop-over-xyz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pop-over-xyz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pop-over-xyz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pop-over-xyz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pop-up-4332f8cf6f6916ee73d377911664daa1.yaml b/nuclei-templates/cve-less/plugins/pop-up-4332f8cf6f6916ee73d377911664daa1.yaml new file mode 100644 index 0000000000..520a768a4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pop-up-4332f8cf6f6916ee73d377911664daa1.yaml @@ -0,0 +1,58 @@ +id: pop-up-4332f8cf6f6916ee73d377911664daa1 + +info: + name: > + Pop-Up Chop Chop <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50b080aa-b9fe-48ac-922c-3f702fed1066?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pop-up/" + google-query: inurl:"/wp-content/plugins/pop-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pop-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pop-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pop-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pop-up-pop-up-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/pop-up-pop-up-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..06cb0f78ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pop-up-pop-up-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: pop-up-pop-up-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pop-up-pop-up/" + google-query: inurl:"/wp-content/plugins/pop-up-pop-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pop-up-pop-up,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pop-up-pop-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pop-up-pop-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pop-up-pop-up-2ad443c3fcd60f912c758a2ef81745f4.yaml b/nuclei-templates/cve-less/plugins/pop-up-pop-up-2ad443c3fcd60f912c758a2ef81745f4.yaml new file mode 100644 index 0000000000..40a3b1cdfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pop-up-pop-up-2ad443c3fcd60f912c758a2ef81745f4.yaml @@ -0,0 +1,58 @@ +id: pop-up-pop-up-2ad443c3fcd60f912c758a2ef81745f4 + +info: + name: > + Pop-up <= 1.1.5 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88068243-9e2a-4893-a432-fd1973db7ca8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pop-up-pop-up/" + google-query: inurl:"/wp-content/plugins/pop-up-pop-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pop-up-pop-up,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pop-up-pop-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pop-up-pop-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pop-up-pop-up-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/pop-up-pop-up-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..18b1636afa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pop-up-pop-up-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: pop-up-pop-up-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pop-up-pop-up/" + google-query: inurl:"/wp-content/plugins/pop-up-pop-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pop-up-pop-up,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pop-up-pop-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pop-up-pop-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pop-up-pop-up-9a1a1874ab2f30e05e0aeecc21462cab.yaml b/nuclei-templates/cve-less/plugins/pop-up-pop-up-9a1a1874ab2f30e05e0aeecc21462cab.yaml new file mode 100644 index 0000000000..7f095a8b62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pop-up-pop-up-9a1a1874ab2f30e05e0aeecc21462cab.yaml @@ -0,0 +1,58 @@ +id: pop-up-pop-up-9a1a1874ab2f30e05e0aeecc21462cab + +info: + name: > + Pop-up <= 1.1.1 - Missing authorization to Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad953bc7-5747-4936-b702-37386299369e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pop-up-pop-up/" + google-query: inurl:"/wp-content/plugins/pop-up-pop-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pop-up-pop-up,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pop-up-pop-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pop-up-pop-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pop-up-pop-up-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/pop-up-pop-up-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..59273729c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pop-up-pop-up-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: pop-up-pop-up-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pop-up-pop-up/" + google-query: inurl:"/wp-content/plugins/pop-up-pop-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pop-up-pop-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pop-up-pop-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pop-up-pop-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popcashnet-code-integration-tool-59d582cc0d2221cf47e1a851d96daa5e.yaml b/nuclei-templates/cve-less/plugins/popcashnet-code-integration-tool-59d582cc0d2221cf47e1a851d96daa5e.yaml new file mode 100644 index 0000000000..b3a69739b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popcashnet-code-integration-tool-59d582cc0d2221cf47e1a851d96daa5e.yaml @@ -0,0 +1,58 @@ +id: popcashnet-code-integration-tool-59d582cc0d2221cf47e1a851d96daa5e + +info: + name: > + PopCash Code Integration Tool < 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c511a5-3c2b-40c0-b3d1-bb7c83c67513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popcashnet-code-integration-tool/" + google-query: inurl:"/wp-content/plugins/popcashnet-code-integration-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popcashnet-code-integration-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popcashnet-code-integration-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popcashnet-code-integration-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/poptin-fa365da8fb7be5a7c14e80d68226de79.yaml b/nuclei-templates/cve-less/plugins/poptin-fa365da8fb7be5a7c14e80d68226de79.yaml new file mode 100644 index 0000000000..e9bb19b9c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/poptin-fa365da8fb7be5a7c14e80d68226de79.yaml @@ -0,0 +1,58 @@ +id: poptin-fa365da8fb7be5a7c14e80d68226de79 + +info: + name: > + Poptin <= 1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/778af777-4c98-45cd-9704-1bdc96054aa7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/poptin/" + google-query: inurl:"/wp-content/plugins/poptin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,poptin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/poptin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "poptin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-anything-on-click-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/popup-anything-on-click-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..3c97a7a0e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-anything-on-click-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: popup-anything-on-click-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-anything-on-click/" + google-query: inurl:"/wp-content/plugins/popup-anything-on-click/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-anything-on-click,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-anything-on-click/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-anything-on-click" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-anything-on-click-a738a6df1d7af94fbdfc3f2ebe12ab82.yaml b/nuclei-templates/cve-less/plugins/popup-anything-on-click-a738a6df1d7af94fbdfc3f2ebe12ab82.yaml new file mode 100644 index 0000000000..cd66b0a19f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-anything-on-click-a738a6df1d7af94fbdfc3f2ebe12ab82.yaml @@ -0,0 +1,58 @@ +id: popup-anything-on-click-a738a6df1d7af94fbdfc3f2ebe12ab82 + +info: + name: > + Popup Anything <= 2.8.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/012b5334-afdc-47bd-8eaf-967b40fef59b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-anything-on-click/" + google-query: inurl:"/wp-content/plugins/popup-anything-on-click/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-anything-on-click,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-anything-on-click/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-anything-on-click" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-anything-on-click-bd548451a3b6e5a6853676277735dfef.yaml b/nuclei-templates/cve-less/plugins/popup-anything-on-click-bd548451a3b6e5a6853676277735dfef.yaml new file mode 100644 index 0000000000..158fac8930 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-anything-on-click-bd548451a3b6e5a6853676277735dfef.yaml @@ -0,0 +1,58 @@ +id: popup-anything-on-click-bd548451a3b6e5a6853676277735dfef + +info: + name: > + WP OnlineSupport, Essential Plugin Popup Anything <= 2.2.1 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11ea3e40-8802-43ea-9816-973a15d7904d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-anything-on-click/" + google-query: inurl:"/wp-content/plugins/popup-anything-on-click/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-anything-on-click,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-anything-on-click/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-anything-on-click" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-anything-on-click-d4b97461c23d3e553d4dc5a4ed959427.yaml b/nuclei-templates/cve-less/plugins/popup-anything-on-click-d4b97461c23d3e553d4dc5a4ed959427.yaml new file mode 100644 index 0000000000..383ed1ab3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-anything-on-click-d4b97461c23d3e553d4dc5a4ed959427.yaml @@ -0,0 +1,58 @@ +id: popup-anything-on-click-d4b97461c23d3e553d4dc5a4ed959427 + +info: + name: > + Popup Anything <= 2.0.3 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bad7e5c9-f413-43ce-9ab8-e700002f2f3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-anything-on-click/" + google-query: inurl:"/wp-content/plugins/popup-anything-on-click/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-anything-on-click,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-anything-on-click/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-anything-on-click" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-anything-on-click-dfa9091cff2e49dc88dc81c6af99c1f8.yaml b/nuclei-templates/cve-less/plugins/popup-anything-on-click-dfa9091cff2e49dc88dc81c6af99c1f8.yaml new file mode 100644 index 0000000000..94c0b00689 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-anything-on-click-dfa9091cff2e49dc88dc81c6af99c1f8.yaml @@ -0,0 +1,58 @@ +id: popup-anything-on-click-dfa9091cff2e49dc88dc81c6af99c1f8 + +info: + name: > + Popup Anything – A Marketing Popup and Lead Generation Conversions <= 2.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bc1ebf6-2797-43cc-8c7a-930da29d6c78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-anything-on-click/" + google-query: inurl:"/wp-content/plugins/popup-anything-on-click/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-anything-on-click,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-anything-on-click/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-anything-on-click" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-box-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/popup-box-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..292c28ef28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-box-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: popup-box-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-box/" + google-query: inurl:"/wp-content/plugins/popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-box-66e44ffd73c4157b210becf5e5234e8e.yaml b/nuclei-templates/cve-less/plugins/popup-box-66e44ffd73c4157b210becf5e5234e8e.yaml new file mode 100644 index 0000000000..3bfb047137 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-box-66e44ffd73c4157b210becf5e5234e8e.yaml @@ -0,0 +1,58 @@ +id: popup-box-66e44ffd73c4157b210becf5e5234e8e + +info: + name: > + Popup Box <= 2.1.2 - Authenticated Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0e53aa4-9acf-4501-9b5e-b7694851fc63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-box/" + google-query: inurl:"/wp-content/plugins/popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-box-cf6d429dc4a254aa005603854a5d8f0f.yaml b/nuclei-templates/cve-less/plugins/popup-box-cf6d429dc4a254aa005603854a5d8f0f.yaml new file mode 100644 index 0000000000..0cd61f4218 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-box-cf6d429dc4a254aa005603854a5d8f0f.yaml @@ -0,0 +1,58 @@ +id: popup-box-cf6d429dc4a254aa005603854a5d8f0f + +info: + name: > + Popup Box – new WordPress popup plugin <= 2.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef480fce-d0e3-47af-92ea-2c84c3f8e2f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-box/" + google-query: inurl:"/wp-content/plugins/popup-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-0c50700eaffcf8d6b08d04f7dda8abac.yaml b/nuclei-templates/cve-less/plugins/popup-builder-0c50700eaffcf8d6b08d04f7dda8abac.yaml new file mode 100644 index 0000000000..91ee31c8bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-0c50700eaffcf8d6b08d04f7dda8abac.yaml @@ -0,0 +1,58 @@ +id: popup-builder-0c50700eaffcf8d6b08d04f7dda8abac + +info: + name: > + Popup Builder <= 3.63 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d8a8aa7-8344-4ca7-8194-9bc679d18661?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-1558ae525a455945fc67fef6a1dd1612.yaml b/nuclei-templates/cve-less/plugins/popup-builder-1558ae525a455945fc67fef6a1dd1612.yaml new file mode 100644 index 0000000000..15d1d1b12d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-1558ae525a455945fc67fef6a1dd1612.yaml @@ -0,0 +1,58 @@ +id: popup-builder-1558ae525a455945fc67fef6a1dd1612 + +info: + name: > + Popup Builder <= 3.73 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17dcb057-6fa6-488c-9d59-22dcdba3fd2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-18e611cf48e8f4ad6e3b9384220c5457.yaml b/nuclei-templates/cve-less/plugins/popup-builder-18e611cf48e8f4ad6e3b9384220c5457.yaml new file mode 100644 index 0000000000..578d1601d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-18e611cf48e8f4ad6e3b9384220c5457.yaml @@ -0,0 +1,58 @@ +id: popup-builder-18e611cf48e8f4ad6e3b9384220c5457 + +info: + name: > + Popup Builder <= 3.72 Missing Authorization on AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec0fff2a-602d-441b-89d1-64d609a4abc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-192f45705f7777bf22c82d567e0c737d.yaml b/nuclei-templates/cve-less/plugins/popup-builder-192f45705f7777bf22c82d567e0c737d.yaml new file mode 100644 index 0000000000..74d2db21e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-192f45705f7777bf22c82d567e0c737d.yaml @@ -0,0 +1,58 @@ +id: popup-builder-192f45705f7777bf22c82d567e0c737d + +info: + name: > + Popup Builder 2.2.8 - 2.6.7.6 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/470fbac6-45bf-400e-b415-32e7989abbad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.2.8', '<= 2.6.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-1f9ac7c68fe8ba8939533494bdaf6f2c.yaml b/nuclei-templates/cve-less/plugins/popup-builder-1f9ac7c68fe8ba8939533494bdaf6f2c.yaml new file mode 100644 index 0000000000..ce53da71e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-1f9ac7c68fe8ba8939533494bdaf6f2c.yaml @@ -0,0 +1,58 @@ +id: popup-builder-1f9ac7c68fe8ba8939533494bdaf6f2c + +info: + name: > + Popup Builder <= 4.0.6 - Local File Inclusion and PHAR Deserialization + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d096d29-6fdb-4f89-91d3-9ebfc1169f0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-2b836e0762bdbf59a8ee2eb5384418f5.yaml b/nuclei-templates/cve-less/plugins/popup-builder-2b836e0762bdbf59a8ee2eb5384418f5.yaml new file mode 100644 index 0000000000..d639823512 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-2b836e0762bdbf59a8ee2eb5384418f5.yaml @@ -0,0 +1,58 @@ +id: popup-builder-2b836e0762bdbf59a8ee2eb5384418f5 + +info: + name: > + Popup Builder <= 4.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f97af51-1532-4034-8b2a-8356b65cb617?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-65e82d728797876c4549a975b4ad5c9f.yaml b/nuclei-templates/cve-less/plugins/popup-builder-65e82d728797876c4549a975b4ad5c9f.yaml new file mode 100644 index 0000000000..036a536423 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-65e82d728797876c4549a975b4ad5c9f.yaml @@ -0,0 +1,58 @@ +id: popup-builder-65e82d728797876c4549a975b4ad5c9f + +info: + name: > + Popup Builder <= 4.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f9853a2-c378-42bf-a12b-392823750942?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-9df0586fa1f03eb4aff1b246f09e907b.yaml b/nuclei-templates/cve-less/plugins/popup-builder-9df0586fa1f03eb4aff1b246f09e907b.yaml new file mode 100644 index 0000000000..6d27098606 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-9df0586fa1f03eb4aff1b246f09e907b.yaml @@ -0,0 +1,58 @@ +id: popup-builder-9df0586fa1f03eb4aff1b246f09e907b + +info: + name: > + Popup Builder <= 4.2.5 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e40f0a-9296-4113-8fff-0aea3c365c1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-a665c3284fcafde64dfe52ce15a964ef.yaml b/nuclei-templates/cve-less/plugins/popup-builder-a665c3284fcafde64dfe52ce15a964ef.yaml new file mode 100644 index 0000000000..bc4efeba22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-a665c3284fcafde64dfe52ce15a964ef.yaml @@ -0,0 +1,58 @@ +id: popup-builder-a665c3284fcafde64dfe52ce15a964ef + +info: + name: > + Popup Builder <= 4.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0d61395-3434-460f-8821-79e7676eff17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-ac28c6a1f49fbad1719d7e09c0190565.yaml b/nuclei-templates/cve-less/plugins/popup-builder-ac28c6a1f49fbad1719d7e09c0190565.yaml new file mode 100644 index 0000000000..a31671382f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-ac28c6a1f49fbad1719d7e09c0190565.yaml @@ -0,0 +1,58 @@ +id: popup-builder-ac28c6a1f49fbad1719d7e09c0190565 + +info: + name: > + Popup Builder <= 3.63 - Authenticated Settings Modification, Configuration Disclosure, and User Data Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3a715b9-85df-46dd-9207-2066b6da9c43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-acfb5b2881f82d1968fd7915b9afb6ad.yaml b/nuclei-templates/cve-less/plugins/popup-builder-acfb5b2881f82d1968fd7915b9afb6ad.yaml new file mode 100644 index 0000000000..9774364c8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-acfb5b2881f82d1968fd7915b9afb6ad.yaml @@ -0,0 +1,58 @@ +id: popup-builder-acfb5b2881f82d1968fd7915b9afb6ad + +info: + name: > + Popup Builder <= 3.44 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cecffd72-4597-4308-9f21-4731269e8cf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-aeb6fb0231c672e40781598de70439c1.yaml b/nuclei-templates/cve-less/plugins/popup-builder-aeb6fb0231c672e40781598de70439c1.yaml new file mode 100644 index 0000000000..590b42b256 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-aeb6fb0231c672e40781598de70439c1.yaml @@ -0,0 +1,58 @@ +id: popup-builder-aeb6fb0231c672e40781598de70439c1 + +info: + name: > + Popup Builder <= 4.1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9b7a73c-6fba-4b5d-9f82-c3710cc8555d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-b04ad422f3446dde9c13618b34ff98a5.yaml b/nuclei-templates/cve-less/plugins/popup-builder-b04ad422f3446dde9c13618b34ff98a5.yaml new file mode 100644 index 0000000000..e822677c42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-b04ad422f3446dde9c13618b34ff98a5.yaml @@ -0,0 +1,58 @@ +id: popup-builder-b04ad422f3446dde9c13618b34ff98a5 + +info: + name: > + Popup Builder <= 4.0.6 - Authenticated SQL Injection via order & orderby Parameters + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1714c26f-775a-4ccc-8b55-e85ca1fb3a84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-b5996763218808f5db38a6126c890df9.yaml b/nuclei-templates/cve-less/plugins/popup-builder-b5996763218808f5db38a6126c890df9.yaml new file mode 100644 index 0000000000..dfefb1d054 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-b5996763218808f5db38a6126c890df9.yaml @@ -0,0 +1,58 @@ +id: popup-builder-b5996763218808f5db38a6126c890df9 + +info: + name: > + Popup Builder <= 4.1.10 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c34b21da-6c35-4eec-826b-47dc46575971?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-e90caa361b62564e08e191aa073473cd.yaml b/nuclei-templates/cve-less/plugins/popup-builder-e90caa361b62564e08e191aa073473cd.yaml new file mode 100644 index 0000000000..bcbd241fb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-e90caa361b62564e08e191aa073473cd.yaml @@ -0,0 +1,58 @@ +id: popup-builder-e90caa361b62564e08e191aa073473cd + +info: + name: > + Popup Builder – Create highly converting, mobile friendly marketing popups. <= 4.1.11 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fda10117-b562-496e-8a17-88ee350ce8f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-builder-f3aaaced779e642f2bb1c29db02ea02e.yaml b/nuclei-templates/cve-less/plugins/popup-builder-f3aaaced779e642f2bb1c29db02ea02e.yaml new file mode 100644 index 0000000000..e1e8994c63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-builder-f3aaaced779e642f2bb1c29db02ea02e.yaml @@ -0,0 +1,58 @@ +id: popup-builder-f3aaaced779e642f2bb1c29db02ea02e + +info: + name: > + Popup Builder <= 4.2.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a853e0-0ebc-4ed5-b6ff-ce3973fb3ee1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-builder/" + google-query: inurl:"/wp-content/plugins/popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-by-supsystic-08f985452f29d16902708fda34a54b58.yaml b/nuclei-templates/cve-less/plugins/popup-by-supsystic-08f985452f29d16902708fda34a54b58.yaml new file mode 100644 index 0000000000..e0d33bf0e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-by-supsystic-08f985452f29d16902708fda34a54b58.yaml @@ -0,0 +1,58 @@ +id: popup-by-supsystic-08f985452f29d16902708fda34a54b58 + +info: + name: > + Popup by Supsystic <= 1.10.19 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10021498-73c8-4767-b059-f282ddc35963?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-by-supsystic/" + google-query: inurl:"/wp-content/plugins/popup-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-by-supsystic-0ff521bb2f967b893b649e52f933e62e.yaml b/nuclei-templates/cve-less/plugins/popup-by-supsystic-0ff521bb2f967b893b649e52f933e62e.yaml new file mode 100644 index 0000000000..6eb5f90095 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-by-supsystic-0ff521bb2f967b893b649e52f933e62e.yaml @@ -0,0 +1,58 @@ +id: popup-by-supsystic-0ff521bb2f967b893b649e52f933e62e + +info: + name: > + Popup by Supsystic < 1.7.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5db5ea76-f0b6-4e30-aebf-c3769d0b3480?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-by-supsystic/" + google-query: inurl:"/wp-content/plugins/popup-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-by-supsystic-4a55514451127aed8c9fafcd15f7c892.yaml b/nuclei-templates/cve-less/plugins/popup-by-supsystic-4a55514451127aed8c9fafcd15f7c892.yaml new file mode 100644 index 0000000000..fbf5276038 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-by-supsystic-4a55514451127aed8c9fafcd15f7c892.yaml @@ -0,0 +1,58 @@ +id: popup-by-supsystic-4a55514451127aed8c9fafcd15f7c892 + +info: + name: > + Popup by Supsystic <= 1.10.27 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73b99342-65ca-4f63-b1ea-638255821265?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-by-supsystic/" + google-query: inurl:"/wp-content/plugins/popup-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-by-supsystic-7181f5f3bd0820834a4f3207e9060f79.yaml b/nuclei-templates/cve-less/plugins/popup-by-supsystic-7181f5f3bd0820834a4f3207e9060f79.yaml new file mode 100644 index 0000000000..73ec586060 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-by-supsystic-7181f5f3bd0820834a4f3207e9060f79.yaml @@ -0,0 +1,58 @@ +id: popup-by-supsystic-7181f5f3bd0820834a4f3207e9060f79 + +info: + name: > + Popup by Supsystic <= 1.10.8 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b3279b-fd39-4c34-92e8-57d309f37a93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-by-supsystic/" + google-query: inurl:"/wp-content/plugins/popup-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-by-supsystic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-by-supsystic-7d533a3d146be46c1ec4aa8c4e983051.yaml b/nuclei-templates/cve-less/plugins/popup-by-supsystic-7d533a3d146be46c1ec4aa8c4e983051.yaml new file mode 100644 index 0000000000..468c45c076 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-by-supsystic-7d533a3d146be46c1ec4aa8c4e983051.yaml @@ -0,0 +1,58 @@ +id: popup-by-supsystic-7d533a3d146be46c1ec4aa8c4e983051 + +info: + name: > + Popup by Supsystic <= 1.10.18 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12acf651-6476-491b-84b3-afbc6c655b17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-by-supsystic/" + google-query: inurl:"/wp-content/plugins/popup-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-by-supsystic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-by-supsystic-7fd4b87b9f62e3f833903e1a4cb60554.yaml b/nuclei-templates/cve-less/plugins/popup-by-supsystic-7fd4b87b9f62e3f833903e1a4cb60554.yaml new file mode 100644 index 0000000000..4cdaf4c106 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-by-supsystic-7fd4b87b9f62e3f833903e1a4cb60554.yaml @@ -0,0 +1,58 @@ +id: popup-by-supsystic-7fd4b87b9f62e3f833903e1a4cb60554 + +info: + name: > + Popup by Supsystic <= 1.10.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c1ebc88-0987-46d6-9e80-6f3aa50d10af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-by-supsystic/" + google-query: inurl:"/wp-content/plugins/popup-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-by-supsystic-aaf49aa53f803817d024c6faf4d05d87.yaml b/nuclei-templates/cve-less/plugins/popup-by-supsystic-aaf49aa53f803817d024c6faf4d05d87.yaml new file mode 100644 index 0000000000..bbbf4863f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-by-supsystic-aaf49aa53f803817d024c6faf4d05d87.yaml @@ -0,0 +1,58 @@ +id: popup-by-supsystic-aaf49aa53f803817d024c6faf4d05d87 + +info: + name: > + Popup by Supsystic <= 1.10.19 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f458663f-6b1a-4acd-b2db-c66d7a915ab7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-by-supsystic/" + google-query: inurl:"/wp-content/plugins/popup-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-contact-form-3c0e91d24d36a9cd6d874ce52fecf15c.yaml b/nuclei-templates/cve-less/plugins/popup-contact-form-3c0e91d24d36a9cd6d874ce52fecf15c.yaml new file mode 100644 index 0000000000..344cea7ea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-contact-form-3c0e91d24d36a9cd6d874ce52fecf15c.yaml @@ -0,0 +1,58 @@ +id: popup-contact-form-3c0e91d24d36a9cd6d874ce52fecf15c + +info: + name: > + Popup contact form <= 7.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47eb6ca7-049c-41b8-9210-391d4d1b8b2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-contact-form/" + google-query: inurl:"/wp-content/plugins/popup-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-contact-form-584864f4cdfe17f88fd042ba6424f8ca.yaml b/nuclei-templates/cve-less/plugins/popup-contact-form-584864f4cdfe17f88fd042ba6424f8ca.yaml new file mode 100644 index 0000000000..f673b34ac1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-contact-form-584864f4cdfe17f88fd042ba6424f8ca.yaml @@ -0,0 +1,58 @@ +id: popup-contact-form-584864f4cdfe17f88fd042ba6424f8ca + +info: + name: > + Popup contact form <= 7.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad896d7d-2c75-466c-9a79-b6a9cfb0bc15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-contact-form/" + google-query: inurl:"/wp-content/plugins/popup-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-images-e6cb47157cb35f90dcc06e51f4ec2619.yaml b/nuclei-templates/cve-less/plugins/popup-images-e6cb47157cb35f90dcc06e51f4ec2619.yaml new file mode 100644 index 0000000000..267130ad3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-images-e6cb47157cb35f90dcc06e51f4ec2619.yaml @@ -0,0 +1,58 @@ +id: popup-images-e6cb47157cb35f90dcc06e51f4ec2619 + +info: + name: > + Popup Images (Unknown Version) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34e3ef09-9c6c-49c5-ac41-f9dc7662d5aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-images/" + google-query: inurl:"/wp-content/plugins/popup-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-189f237bf9c2686338f976edbe64b7e4.yaml b/nuclei-templates/cve-less/plugins/popup-maker-189f237bf9c2686338f976edbe64b7e4.yaml new file mode 100644 index 0000000000..62c6eaa995 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-189f237bf9c2686338f976edbe64b7e4.yaml @@ -0,0 +1,58 @@ +id: popup-maker-189f237bf9c2686338f976edbe64b7e4 + +info: + name: > + Popup-Maker <= 1.8.12 - Unauthenticated information disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b9a0751-934f-4830-80c9-39260ec1cb4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-3a1e41088675792a5f4e28fc34263cd0.yaml b/nuclei-templates/cve-less/plugins/popup-maker-3a1e41088675792a5f4e28fc34263cd0.yaml new file mode 100644 index 0000000000..e38b00a3e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-3a1e41088675792a5f4e28fc34263cd0.yaml @@ -0,0 +1,58 @@ +id: popup-maker-3a1e41088675792a5f4e28fc34263cd0 + +info: + name: > + Popup Maker <= 1.17.1 - Missing Authorization via save_popup_enabled_state + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb649fb2-2d0e-4fe3-89d5-90bcbc0bcfcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-535ebdfe2ca4cb1641e4a25814726229.yaml b/nuclei-templates/cve-less/plugins/popup-maker-535ebdfe2ca4cb1641e4a25814726229.yaml new file mode 100644 index 0000000000..66002b84ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-535ebdfe2ca4cb1641e4a25814726229.yaml @@ -0,0 +1,58 @@ +id: popup-maker-535ebdfe2ca4cb1641e4a25814726229 + +info: + name: > + Popup Maker <= 1.16.10 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e94683d-2cf3-4e43-8ab0-f797bfaaeee4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-a3b6f79669d9dc684f2a89cb966b83d1.yaml b/nuclei-templates/cve-less/plugins/popup-maker-a3b6f79669d9dc684f2a89cb966b83d1.yaml new file mode 100644 index 0000000000..75fec06b0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-a3b6f79669d9dc684f2a89cb966b83d1.yaml @@ -0,0 +1,58 @@ +id: popup-maker-a3b6f79669d9dc684f2a89cb966b83d1 + +info: + name: > + Popup Maker <= 1.17.1 - Sensitive Data Exposure via debug log file + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0240b35-72d0-4943-84cd-5d1574609b36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-b57f56b1347aa5d19dac687fe592133a.yaml b/nuclei-templates/cve-less/plugins/popup-maker-b57f56b1347aa5d19dac687fe592133a.yaml new file mode 100644 index 0000000000..f187573317 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-b57f56b1347aa5d19dac687fe592133a.yaml @@ -0,0 +1,58 @@ +id: popup-maker-b57f56b1347aa5d19dac687fe592133a + +info: + name: > + Popup Maker < 1.6.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbaae72c-b5a6-4fa3-9268-94c0e6a59d1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-babd847e079fcdd7a546f8f906593529.yaml b/nuclei-templates/cve-less/plugins/popup-maker-babd847e079fcdd7a546f8f906593529.yaml new file mode 100644 index 0000000000..fea8805964 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-babd847e079fcdd7a546f8f906593529.yaml @@ -0,0 +1,58 @@ +id: popup-maker-babd847e079fcdd7a546f8f906593529 + +info: + name: > + Popup Maker <= 1.16.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/697e8954-5adb-472a-a961-4e14f22d3b66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-c446e0b00a3a4561bee5779481d638d6.yaml b/nuclei-templates/cve-less/plugins/popup-maker-c446e0b00a3a4561bee5779481d638d6.yaml new file mode 100644 index 0000000000..a2663465ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-c446e0b00a3a4561bee5779481d638d6.yaml @@ -0,0 +1,58 @@ +id: popup-maker-c446e0b00a3a4561bee5779481d638d6 + +info: + name: > + Popup Maker – Popup for opt-ins, lead gen, & more <= 1.18.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40e1215c-ac00-4fd6-b428-a57cef95aed1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/popup-maker-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..f8526c475d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: popup-maker-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-d421af39d84b1128d0254744158f6c8d.yaml b/nuclei-templates/cve-less/plugins/popup-maker-d421af39d84b1128d0254744158f6c8d.yaml new file mode 100644 index 0000000000..e209273096 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-d421af39d84b1128d0254744158f6c8d.yaml @@ -0,0 +1,58 @@ +id: popup-maker-d421af39d84b1128d0254744158f6c8d + +info: + name: > + Popup Maker <= 1.18.0 - Cross-Site Request Forgery via init + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/533f71d5-823d-45eb-8ecf-76afafd2a5d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-de64ee696bec8d009d778000d64252b8.yaml b/nuclei-templates/cve-less/plugins/popup-maker-de64ee696bec8d009d778000d64252b8.yaml new file mode 100644 index 0000000000..75aca36608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-de64ee696bec8d009d778000d64252b8.yaml @@ -0,0 +1,58 @@ +id: popup-maker-de64ee696bec8d009d778000d64252b8 + +info: + name: > + Popup Maker <= 1.16.4 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f95c786-900b-4069-8509-fab623f5f988?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-maker-ff57e42e57104b9d5c57fd329587cf27.yaml b/nuclei-templates/cve-less/plugins/popup-maker-ff57e42e57104b9d5c57fd329587cf27.yaml new file mode 100644 index 0000000000..313d796342 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-maker-ff57e42e57104b9d5c57fd329587cf27.yaml @@ -0,0 +1,58 @@ +id: popup-maker-ff57e42e57104b9d5c57fd329587cf27 + +info: + name: > + Popup Maker <= 1.16.8 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc5c10ad-c5e7-4b94-8d5d-112703ad05ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-maker/" + google-query: inurl:"/wp-content/plugins/popup-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-manager-76f3b72582acb97747f26a7d73d169e0.yaml b/nuclei-templates/cve-less/plugins/popup-manager-76f3b72582acb97747f26a7d73d169e0.yaml new file mode 100644 index 0000000000..b705595cf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-manager-76f3b72582acb97747f26a7d73d169e0.yaml @@ -0,0 +1,58 @@ +id: popup-manager-76f3b72582acb97747f26a7d73d169e0 + +info: + name: > + Popup Manager <= 1.6.6 - Missing Authorization to Arbitrary Popup Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2180dc08-25a8-474b-b382-5ce359de04b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-manager/" + google-query: inurl:"/wp-content/plugins/popup-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-manager-da1a3662428b7d8e0a5c05c7f2cee12d.yaml b/nuclei-templates/cve-less/plugins/popup-manager-da1a3662428b7d8e0a5c05c7f2cee12d.yaml new file mode 100644 index 0000000000..0398e511c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-manager-da1a3662428b7d8e0a5c05c7f2cee12d.yaml @@ -0,0 +1,58 @@ +id: popup-manager-da1a3662428b7d8e0a5c05c7f2cee12d + +info: + name: > + Popup Manager <= 1.6.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6e587fb-118b-44b6-a2bb-1d621f02845c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-manager/" + google-query: inurl:"/wp-content/plugins/popup-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-modal-for-youtube-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/popup-modal-for-youtube-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..9550e2723e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-modal-for-youtube-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: popup-modal-for-youtube-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-modal-for-youtube/" + google-query: inurl:"/wp-content/plugins/popup-modal-for-youtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-modal-for-youtube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-modal-for-youtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-modal-for-youtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-more-7d2e01fb5142e419d7f12bc8417804ab.yaml b/nuclei-templates/cve-less/plugins/popup-more-7d2e01fb5142e419d7f12bc8417804ab.yaml new file mode 100644 index 0000000000..d0d16b3d1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-more-7d2e01fb5142e419d7f12bc8417804ab.yaml @@ -0,0 +1,58 @@ +id: popup-more-7d2e01fb5142e419d7f12bc8417804ab + +info: + name: > + Popup More <= 2.2.4 - Authenticated (Admin+) Directory Traversal to Limited Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7894a19c-b873-4c5b-8c82-6656cc306ee2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-more/" + google-query: inurl:"/wp-content/plugins/popup-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-more,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-with-fancybox-bee21ffa7faff706d4db361bca23b6c3.yaml b/nuclei-templates/cve-less/plugins/popup-with-fancybox-bee21ffa7faff706d4db361bca23b6c3.yaml new file mode 100644 index 0000000000..0c340374f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-with-fancybox-bee21ffa7faff706d4db361bca23b6c3.yaml @@ -0,0 +1,58 @@ +id: popup-with-fancybox-bee21ffa7faff706d4db361bca23b6c3 + +info: + name: > + Popup with fancybox <= 3.5 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c943cf0b-0e99-4d47-808d-2b803369d53a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-with-fancybox/" + google-query: inurl:"/wp-content/plugins/popup-with-fancybox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-with-fancybox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-with-fancybox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-with-fancybox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popup-zyrex-d9e5ab172446fd3be8d4dddf9dcfa63e.yaml b/nuclei-templates/cve-less/plugins/popup-zyrex-d9e5ab172446fd3be8d4dddf9dcfa63e.yaml new file mode 100644 index 0000000000..8b0795ccbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popup-zyrex-d9e5ab172446fd3be8d4dddf9dcfa63e.yaml @@ -0,0 +1,58 @@ +id: popup-zyrex-d9e5ab172446fd3be8d4dddf9dcfa63e + +info: + name: > + Zyrex Popup <= 1.0 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf992c75-a1ae-49c3-8110-2f3b31b23f6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popup-zyrex/" + google-query: inurl:"/wp-content/plugins/popup-zyrex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popup-zyrex,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popup-zyrex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popup-zyrex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popupally-104344c0b7a013be4ee55f379fbf7b52.yaml b/nuclei-templates/cve-less/plugins/popupally-104344c0b7a013be4ee55f379fbf7b52.yaml new file mode 100644 index 0000000000..a7ab4e57bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popupally-104344c0b7a013be4ee55f379fbf7b52.yaml @@ -0,0 +1,58 @@ +id: popupally-104344c0b7a013be4ee55f379fbf7b52 + +info: + name: > + PopupAlly <= 2.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfd158b2-c6a4-441a-b611-bf06e197d13d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popupally/" + google-query: inurl:"/wp-content/plugins/popupally/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popupally,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popupally/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popupally" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popupally-3e074f8fe92c7cadd8316ec7dd448917.yaml b/nuclei-templates/cve-less/plugins/popupally-3e074f8fe92c7cadd8316ec7dd448917.yaml new file mode 100644 index 0000000000..2d3c5a58ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popupally-3e074f8fe92c7cadd8316ec7dd448917.yaml @@ -0,0 +1,58 @@ +id: popupally-3e074f8fe92c7cadd8316ec7dd448917 + +info: + name: > + PopupAlly <= 2.1.0 - Cross-Site Request Forgery via optin_submit_callback + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6bef410-8706-4440-b50f-08824ef754f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popupally/" + google-query: inurl:"/wp-content/plugins/popupally/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popupally,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popupally/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popupally" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/popups-356d13b6974d8f1c305ed39531dbff42.yaml b/nuclei-templates/cve-less/plugins/popups-356d13b6974d8f1c305ed39531dbff42.yaml new file mode 100644 index 0000000000..958828d306 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/popups-356d13b6974d8f1c305ed39531dbff42.yaml @@ -0,0 +1,58 @@ +id: popups-356d13b6974d8f1c305ed39531dbff42 + +info: + name: > + Popups <= 1.9.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47baeaee-de6b-4459-a211-177859427e70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/popups/" + google-query: inurl:"/wp-content/plugins/popups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,popups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/popups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portable-phpmyadmin-cd131fb7dbc732763aa435e3a74746ae.yaml b/nuclei-templates/cve-less/plugins/portable-phpmyadmin-cd131fb7dbc732763aa435e3a74746ae.yaml new file mode 100644 index 0000000000..6e189de5b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portable-phpmyadmin-cd131fb7dbc732763aa435e3a74746ae.yaml @@ -0,0 +1,58 @@ +id: portable-phpmyadmin-cd131fb7dbc732763aa435e3a74746ae + +info: + name: > + Portable phpMyAdmin <= 1.5.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04bfad0d-9c6d-41b6-8c59-516eceef9a36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portable-phpmyadmin/" + google-query: inurl:"/wp-content/plugins/portable-phpmyadmin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portable-phpmyadmin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portable-phpmyadmin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portable-phpmyadmin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portable-phpmyadmin-d09c471b1ad5ad87d4f4afddc3658574.yaml b/nuclei-templates/cve-less/plugins/portable-phpmyadmin-d09c471b1ad5ad87d4f4afddc3658574.yaml new file mode 100644 index 0000000000..b4b4dc50a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portable-phpmyadmin-d09c471b1ad5ad87d4f4afddc3658574.yaml @@ -0,0 +1,58 @@ +id: portable-phpmyadmin-d09c471b1ad5ad87d4f4afddc3658574 + +info: + name: > + Portable phpMyAdmin <= 1.4.1 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9e844c1-38c1-4b3c-98a4-71d87ca6293b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portable-phpmyadmin/" + google-query: inurl:"/wp-content/plugins/portable-phpmyadmin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portable-phpmyadmin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portable-phpmyadmin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portable-phpmyadmin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portable-phpmyadmin-f5f19df0291f0636aeea89c408a38887.yaml b/nuclei-templates/cve-less/plugins/portable-phpmyadmin-f5f19df0291f0636aeea89c408a38887.yaml new file mode 100644 index 0000000000..84295e21f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portable-phpmyadmin-f5f19df0291f0636aeea89c408a38887.yaml @@ -0,0 +1,58 @@ +id: portable-phpmyadmin-f5f19df0291f0636aeea89c408a38887 + +info: + name: > + Portable phpMyAdmin <= 1.3.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e796b203-31b4-47c6-9018-190389ce4df7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portable-phpmyadmin/" + google-query: inurl:"/wp-content/plugins/portable-phpmyadmin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portable-phpmyadmin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portable-phpmyadmin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portable-phpmyadmin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-417489514b9c703ef6de3484813afc07.yaml b/nuclei-templates/cve-less/plugins/portfolio-417489514b9c703ef6de3484813afc07.yaml new file mode 100644 index 0000000000..bbe9abafc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-417489514b9c703ef6de3484813afc07.yaml @@ -0,0 +1,58 @@ +id: portfolio-417489514b9c703ef6de3484813afc07 + +info: + name: > + Portfolio by BestWebSoft < 2.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4148b37e-c5dd-43a1-aecf-085ce4fb2473?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio/" + google-query: inurl:"/wp-content/plugins/portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-and-projects-454dc41941365b15ee244d48d13a5ca3.yaml b/nuclei-templates/cve-less/plugins/portfolio-and-projects-454dc41941365b15ee244d48d13a5ca3.yaml new file mode 100644 index 0000000000..edb215b100 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-and-projects-454dc41941365b15ee244d48d13a5ca3.yaml @@ -0,0 +1,58 @@ +id: portfolio-and-projects-454dc41941365b15ee244d48d13a5ca3 + +info: + name: > + Portfolio and Projects <= 1.3.7 - Cross-Site Request Forgery via 'wpos_anylc_admin_init_process' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9567f199-7c31-4df3-aa2c-911780b2497a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-and-projects/" + google-query: inurl:"/wp-content/plugins/portfolio-and-projects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-and-projects,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-and-projects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-and-projects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-and-projects-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/portfolio-and-projects-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..c2e7a9baa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-and-projects-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: portfolio-and-projects-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-and-projects/" + google-query: inurl:"/wp-content/plugins/portfolio-and-projects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-and-projects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-and-projects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-and-projects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-by-lisa-westlund-6fc195976bc811efd5c4bd31a1b9fd8a.yaml b/nuclei-templates/cve-less/plugins/portfolio-by-lisa-westlund-6fc195976bc811efd5c4bd31a1b9fd8a.yaml new file mode 100644 index 0000000000..efc7f5a568 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-by-lisa-westlund-6fc195976bc811efd5c4bd31a1b9fd8a.yaml @@ -0,0 +1,58 @@ +id: portfolio-by-lisa-westlund-6fc195976bc811efd5c4bd31a1b9fd8a + +info: + name: > + Portfolio Plugin <= 2.04 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/198a24e6-af98-42ed-bf58-73b7ec99838b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-by-lisa-westlund/" + google-query: inurl:"/wp-content/plugins/portfolio-by-lisa-westlund/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-by-lisa-westlund,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-by-lisa-westlund/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-by-lisa-westlund" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-by-lisa-westlund-83ec865d5c8f3847f1734b9b89afe851.yaml b/nuclei-templates/cve-less/plugins/portfolio-by-lisa-westlund-83ec865d5c8f3847f1734b9b89afe851.yaml new file mode 100644 index 0000000000..9f135ee8ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-by-lisa-westlund-83ec865d5c8f3847f1734b9b89afe851.yaml @@ -0,0 +1,58 @@ +id: portfolio-by-lisa-westlund-83ec865d5c8f3847f1734b9b89afe851 + +info: + name: > + Portfolio Plugin < 1.05 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fb0c069-ea6d-4eff-851e-b41c34b41152?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-by-lisa-westlund/" + google-query: inurl:"/wp-content/plugins/portfolio-by-lisa-westlund/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-by-lisa-westlund,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-by-lisa-westlund/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-by-lisa-westlund" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-elementor-20c420e00e7776a25487d5218d4e77bb.yaml b/nuclei-templates/cve-less/plugins/portfolio-elementor-20c420e00e7776a25487d5218d4e77bb.yaml new file mode 100644 index 0000000000..3ec4befc5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-elementor-20c420e00e7776a25487d5218d4e77bb.yaml @@ -0,0 +1,58 @@ +id: portfolio-elementor-20c420e00e7776a25487d5218d4e77bb + +info: + name: > + Post Grid, Image Gallery & Portfolio for Elementor | PowerFolio <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b639c5c-e4ff-4e43-9088-249c75046d39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-elementor/" + google-query: inurl:"/wp-content/plugins/portfolio-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-elementor-4d83bba8058d5550f9120708c18d4b23.yaml b/nuclei-templates/cve-less/plugins/portfolio-elementor-4d83bba8058d5550f9120708c18d4b23.yaml new file mode 100644 index 0000000000..36569ea23b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-elementor-4d83bba8058d5550f9120708c18d4b23.yaml @@ -0,0 +1,58 @@ +id: portfolio-elementor-4d83bba8058d5550f9120708c18d4b23 + +info: + name: > + Portfolio for Elementor <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d21febd-e206-4f7c-a6a2-0fa65150ed29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-elementor/" + google-query: inurl:"/wp-content/plugins/portfolio-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/portfolio-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..771c9530ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: portfolio-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-elementor/" + google-query: inurl:"/wp-content/plugins/portfolio-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-filter-gallery-6a48e7c9d0ebe158b3f7430c9e7962df.yaml b/nuclei-templates/cve-less/plugins/portfolio-filter-gallery-6a48e7c9d0ebe158b3f7430c9e7962df.yaml new file mode 100644 index 0000000000..acc04e6995 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-filter-gallery-6a48e7c9d0ebe158b3f7430c9e7962df.yaml @@ -0,0 +1,58 @@ +id: portfolio-filter-gallery-6a48e7c9d0ebe158b3f7430c9e7962df + +info: + name: > + Portfolio Gallery – Image Gallery Plugin <= 1.5.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97759a47-c52a-4113-86c0-453a53fb44a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-filter-gallery/" + google-query: inurl:"/wp-content/plugins/portfolio-filter-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-filter-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-filter-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-filter-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-filter-gallery-6d651a584c882645ac53e340c49131a0.yaml b/nuclei-templates/cve-less/plugins/portfolio-filter-gallery-6d651a584c882645ac53e340c49131a0.yaml new file mode 100644 index 0000000000..a2c039fcea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-filter-gallery-6d651a584c882645ac53e340c49131a0.yaml @@ -0,0 +1,58 @@ +id: portfolio-filter-gallery-6d651a584c882645ac53e340c49131a0 + +info: + name: > + Portfolio Gallery – Image Gallery Plugin <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25dd83c5-2ebe-4976-8e97-650e5eadbe43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-filter-gallery/" + google-query: inurl:"/wp-content/plugins/portfolio-filter-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-filter-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-filter-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-filter-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-gallery-1ef894646600f00b3158183d9299dcde.yaml b/nuclei-templates/cve-less/plugins/portfolio-gallery-1ef894646600f00b3158183d9299dcde.yaml new file mode 100644 index 0000000000..6a422bb1a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-gallery-1ef894646600f00b3158183d9299dcde.yaml @@ -0,0 +1,58 @@ +id: portfolio-gallery-1ef894646600f00b3158183d9299dcde + +info: + name: > + Portfolio Gallery <= 1.5.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a439cd6-c9d1-42d0-9067-4b425f2869a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-gallery/" + google-query: inurl:"/wp-content/plugins/portfolio-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-gallery-815bbb8ecdc0251e048f40a706274fbc.yaml b/nuclei-templates/cve-less/plugins/portfolio-gallery-815bbb8ecdc0251e048f40a706274fbc.yaml new file mode 100644 index 0000000000..ef68571c1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-gallery-815bbb8ecdc0251e048f40a706274fbc.yaml @@ -0,0 +1,58 @@ +id: portfolio-gallery-815bbb8ecdc0251e048f40a706274fbc + +info: + name: > + Portfolio Gallery <= 2.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6422375-a819-4e92-92af-a0a4591dea26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-gallery/" + google-query: inurl:"/wp-content/plugins/portfolio-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-gallery-8195d0fd4f0b5ac7235f16224b2dcb18.yaml b/nuclei-templates/cve-less/plugins/portfolio-gallery-8195d0fd4f0b5ac7235f16224b2dcb18.yaml new file mode 100644 index 0000000000..19458f799c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-gallery-8195d0fd4f0b5ac7235f16224b2dcb18.yaml @@ -0,0 +1,58 @@ +id: portfolio-gallery-8195d0fd4f0b5ac7235f16224b2dcb18 + +info: + name: > + Portfolio Gallery – Photo Gallery <= 1.1.8 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f367a3d2-8ee6-4897-b7bf-a44f57142347?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-gallery/" + google-query: inurl:"/wp-content/plugins/portfolio-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-responsive-gallery-70beb78ba7fd734dda35bda551cb0775.yaml b/nuclei-templates/cve-less/plugins/portfolio-responsive-gallery-70beb78ba7fd734dda35bda551cb0775.yaml new file mode 100644 index 0000000000..f43292e6bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-responsive-gallery-70beb78ba7fd734dda35bda551cb0775.yaml @@ -0,0 +1,58 @@ +id: portfolio-responsive-gallery-70beb78ba7fd734dda35bda551cb0775 + +info: + name: > + Portfolio Responsive Gallery <= 1.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06d374b0-a4a6-4f0e-af85-66b3a50b1354?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-responsive-gallery/" + google-query: inurl:"/wp-content/plugins/portfolio-responsive-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-responsive-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-responsive-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-responsive-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-responsive-gallery-d3ba4c3e62ed9f2cd7ab1df9d9c7321d.yaml b/nuclei-templates/cve-less/plugins/portfolio-responsive-gallery-d3ba4c3e62ed9f2cd7ab1df9d9c7321d.yaml new file mode 100644 index 0000000000..ca39dc4b36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-responsive-gallery-d3ba4c3e62ed9f2cd7ab1df9d9c7321d.yaml @@ -0,0 +1,58 @@ +id: portfolio-responsive-gallery-d3ba4c3e62ed9f2cd7ab1df9d9c7321d + +info: + name: > + Portfolio Responsive Gallery <= 1.1.7 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24123a4f-da33-4d50-9e82-18f910de6619?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-responsive-gallery/" + google-query: inurl:"/wp-content/plugins/portfolio-responsive-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-responsive-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-responsive-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-responsive-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-slideshow-cb4e42488e82603fdda3ed8a6057c4fa.yaml b/nuclei-templates/cve-less/plugins/portfolio-slideshow-cb4e42488e82603fdda3ed8a6057c4fa.yaml new file mode 100644 index 0000000000..d3e3686309 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-slideshow-cb4e42488e82603fdda3ed8a6057c4fa.yaml @@ -0,0 +1,58 @@ +id: portfolio-slideshow-cb4e42488e82603fdda3ed8a6057c4fa + +info: + name: > + Portfolio Slideshow <= 1.13.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26b5c665-b7f6-4481-b9e9-010f9e451d9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-slideshow/" + google-query: inurl:"/wp-content/plugins/portfolio-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-slideshow-pro-9d8ad614993ab663e4e1353da10143d9.yaml b/nuclei-templates/cve-less/plugins/portfolio-slideshow-pro-9d8ad614993ab663e4e1353da10143d9.yaml new file mode 100644 index 0000000000..76a00d5254 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-slideshow-pro-9d8ad614993ab663e4e1353da10143d9.yaml @@ -0,0 +1,58 @@ +id: portfolio-slideshow-pro-9d8ad614993ab663e4e1353da10143d9 + +info: + name: > + Portfolio Slideshow Pro <= 3.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6cab377-0a8a-45d2-a966-4c7f100b9409?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-slideshow-pro/" + google-query: inurl:"/wp-content/plugins/portfolio-slideshow-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-slideshow-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-slideshow-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-slideshow-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portfolio-wp-422a760ab8a04278c237785bf5be638b.yaml b/nuclei-templates/cve-less/plugins/portfolio-wp-422a760ab8a04278c237785bf5be638b.yaml new file mode 100644 index 0000000000..e299aa9cca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portfolio-wp-422a760ab8a04278c237785bf5be638b.yaml @@ -0,0 +1,58 @@ +id: portfolio-wp-422a760ab8a04278c237785bf5be638b + +info: + name: > + GridKit Portfolio <= 2.0.0 - Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ebb6ebe-3a66-4ad8-9bba-c09354810159?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portfolio-wp/" + google-query: inurl:"/wp-content/plugins/portfolio-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portfolio-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portfolio-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portfolio-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/porto-functionality-10147d7844868b2801a0e636a99a05eb.yaml b/nuclei-templates/cve-less/plugins/porto-functionality-10147d7844868b2801a0e636a99a05eb.yaml new file mode 100644 index 0000000000..d7e99a60c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/porto-functionality-10147d7844868b2801a0e636a99a05eb.yaml @@ -0,0 +1,58 @@ +id: porto-functionality-10147d7844868b2801a0e636a99a05eb + +info: + name: > + Porto Theme - Functionality <= 3.0.9 - Authenticated (Contributor+) Local File Inclusion via Post Meta + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5cdd3c1-6353-4bee-a4f9-5b7972f0970c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/porto-functionality/" + google-query: inurl:"/wp-content/plugins/porto-functionality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,porto-functionality,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/porto-functionality/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "porto-functionality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/porto-functionality-23f358a9d40cae78b36e38b231af07ae.yaml b/nuclei-templates/cve-less/plugins/porto-functionality-23f358a9d40cae78b36e38b231af07ae.yaml new file mode 100644 index 0000000000..1e3fd6e040 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/porto-functionality-23f358a9d40cae78b36e38b231af07ae.yaml @@ -0,0 +1,58 @@ +id: porto-functionality-23f358a9d40cae78b36e38b231af07ae + +info: + name: > + Porto Theme - Functionality <= 2.11.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e1300be-07e3-44b6-9ced-a16825274d22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/porto-functionality/" + google-query: inurl:"/wp-content/plugins/porto-functionality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,porto-functionality,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/porto-functionality/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "porto-functionality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/porto-functionality-57ac81934caebdaedb69c79f34942250.yaml b/nuclei-templates/cve-less/plugins/porto-functionality-57ac81934caebdaedb69c79f34942250.yaml new file mode 100644 index 0000000000..4cf14cb0d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/porto-functionality-57ac81934caebdaedb69c79f34942250.yaml @@ -0,0 +1,58 @@ +id: porto-functionality-57ac81934caebdaedb69c79f34942250 + +info: + name: > + Porto Theme - Functionality <= 2.11.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fabc7ad3-1d20-493f-aacb-1832d33d8e14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/porto-functionality/" + google-query: inurl:"/wp-content/plugins/porto-functionality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,porto-functionality,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/porto-functionality/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "porto-functionality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/porto-functionality-98b3c6ab8f905b035d160d1673b90dca.yaml b/nuclei-templates/cve-less/plugins/porto-functionality-98b3c6ab8f905b035d160d1673b90dca.yaml new file mode 100644 index 0000000000..a4675320a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/porto-functionality-98b3c6ab8f905b035d160d1673b90dca.yaml @@ -0,0 +1,58 @@ +id: porto-functionality-98b3c6ab8f905b035d160d1673b90dca + +info: + name: > + Porto Theme - Functionality <= 3.1.0 - Authenticated (Contributor+) Local File Inclusion via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fea96f84-f75b-4f02-9ca8-f8fda439d565?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/porto-functionality/" + google-query: inurl:"/wp-content/plugins/porto-functionality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,porto-functionality,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/porto-functionality/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "porto-functionality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portrait-archiv-shop-0786a182b4b3d53e469584f477d9a727.yaml b/nuclei-templates/cve-less/plugins/portrait-archiv-shop-0786a182b4b3d53e469584f477d9a727.yaml new file mode 100644 index 0000000000..2260b5b1c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portrait-archiv-shop-0786a182b4b3d53e469584f477d9a727.yaml @@ -0,0 +1,58 @@ +id: portrait-archiv-shop-0786a182b4b3d53e469584f477d9a727 + +info: + name: > + Portrait-Archiv.com Photostore < 3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15d66474-e215-4d28-b6fb-259c90053212?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portrait-archiv-shop/" + google-query: inurl:"/wp-content/plugins/portrait-archiv-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portrait-archiv-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portrait-archiv-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portrait-archiv-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/portugal-ctt-tracking-woocommerce-96ae79181b6ec77bcc77d5a1f71b9993.yaml b/nuclei-templates/cve-less/plugins/portugal-ctt-tracking-woocommerce-96ae79181b6ec77bcc77d5a1f71b9993.yaml new file mode 100644 index 0000000000..ff447e9dca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/portugal-ctt-tracking-woocommerce-96ae79181b6ec77bcc77d5a1f71b9993.yaml @@ -0,0 +1,58 @@ +id: portugal-ctt-tracking-woocommerce-96ae79181b6ec77bcc77d5a1f71b9993 + +info: + name: > + Portugal CTT Tracking for WooCommerce <= 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a69e6ca8-efd6-4b89-ae63-b320f9936842?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/portugal-ctt-tracking-woocommerce/" + google-query: inurl:"/wp-content/plugins/portugal-ctt-tracking-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,portugal-ctt-tracking-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/portugal-ctt-tracking-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "portugal-ctt-tracking-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-and-page-builder-55e2a4b9a97cda212301452238552f00.yaml b/nuclei-templates/cve-less/plugins/post-and-page-builder-55e2a4b9a97cda212301452238552f00.yaml new file mode 100644 index 0000000000..098123f3e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-and-page-builder-55e2a4b9a97cda212301452238552f00.yaml @@ -0,0 +1,58 @@ +id: post-and-page-builder-55e2a4b9a97cda212301452238552f00 + +info: + name: > + Post and Page Builder by BoldGrid – Visual Drag and Drop Editor Plugin <= 1.26.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dbb0ca4-169a-4f51-a196-5f138744c54d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-and-page-builder/" + google-query: inurl:"/wp-content/plugins/post-and-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-and-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-and-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-and-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-and-page-builder-cfbde5318ddfc1f99a56f4cb27a830a5.yaml b/nuclei-templates/cve-less/plugins/post-and-page-builder-cfbde5318ddfc1f99a56f4cb27a830a5.yaml new file mode 100644 index 0000000000..0b6befa2e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-and-page-builder-cfbde5318ddfc1f99a56f4cb27a830a5.yaml @@ -0,0 +1,58 @@ +id: post-and-page-builder-cfbde5318ddfc1f99a56f4cb27a830a5 + +info: + name: > + Post and Page Builder by BoldGrid – Visual Drag and Drop Editor <= 1.24.1 - Cross-Site Request Forgery via submitDefaultEditor + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf801042-5cd5-424f-a25a-858302285170?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-and-page-builder/" + google-query: inurl:"/wp-content/plugins/post-and-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-and-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-and-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-and-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-carousel-b852d5115d07ebbb3d6948d1d5619495.yaml b/nuclei-templates/cve-less/plugins/post-carousel-b852d5115d07ebbb3d6948d1d5619495.yaml new file mode 100644 index 0000000000..c237c3a4f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-carousel-b852d5115d07ebbb3d6948d1d5619495.yaml @@ -0,0 +1,58 @@ +id: post-carousel-b852d5115d07ebbb3d6948d1d5619495 + +info: + name: > + Post Grid, Post Carousel, & List Category Posts <= 2.4.18 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1df1e56e-7a1f-4e89-8df2-bda9dc1ec1dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-carousel/" + google-query: inurl:"/wp-content/plugins/post-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-carousel-ddeb85dc820c08fb544362c25d281533.yaml b/nuclei-templates/cve-less/plugins/post-carousel-ddeb85dc820c08fb544362c25d281533.yaml new file mode 100644 index 0000000000..96bb3afe13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-carousel-ddeb85dc820c08fb544362c25d281533.yaml @@ -0,0 +1,58 @@ +id: post-carousel-ddeb85dc820c08fb544362c25d281533 + +info: + name: > + Post Carousel < 2.3.5 - Missing Capabilities Check + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f2d6c42-4baa-4d15-934f-0f8998c7d654?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-carousel/" + google-query: inurl:"/wp-content/plugins/post-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-carousel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-carousel-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/post-carousel-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..14819f5ce9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-carousel-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: post-carousel-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-carousel-divi/" + google-query: inurl:"/wp-content/plugins/post-carousel-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-carousel-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-carousel-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-carousel-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-category-image-with-grid-and-slider-048a39e7d237e8f103e054f25cf72eb4.yaml b/nuclei-templates/cve-less/plugins/post-category-image-with-grid-and-slider-048a39e7d237e8f103e054f25cf72eb4.yaml new file mode 100644 index 0000000000..b5c861bebe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-category-image-with-grid-and-slider-048a39e7d237e8f103e054f25cf72eb4.yaml @@ -0,0 +1,58 @@ +id: post-category-image-with-grid-and-slider-048a39e7d237e8f103e054f25cf72eb4 + +info: + name: > + Post Category Image With Grid and Slider <= 1.4.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ce9854-06df-44a8-b998-de21bf52a5d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-category-image-with-grid-and-slider/" + google-query: inurl:"/wp-content/plugins/post-category-image-with-grid-and-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-category-image-with-grid-and-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-category-image-with-grid-and-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-category-image-with-grid-and-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-connector-21e149e548734ec4b958e79da23daedf.yaml b/nuclei-templates/cve-less/plugins/post-connector-21e149e548734ec4b958e79da23daedf.yaml new file mode 100644 index 0000000000..c3c4cba502 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-connector-21e149e548734ec4b958e79da23daedf.yaml @@ -0,0 +1,58 @@ +id: post-connector-21e149e548734ec4b958e79da23daedf + +info: + name: > + Post Connector < 1.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c48819a-5ca1-4262-b995-1c4621fcfadc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-connector/" + google-query: inurl:"/wp-content/plugins/post-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-connector-77f1b741caca90f6e233d10f62410685.yaml b/nuclei-templates/cve-less/plugins/post-connector-77f1b741caca90f6e233d10f62410685.yaml new file mode 100644 index 0000000000..08a408d1d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-connector-77f1b741caca90f6e233d10f62410685.yaml @@ -0,0 +1,58 @@ +id: post-connector-77f1b741caca90f6e233d10f62410685 + +info: + name: > + Post Connector <= 1.0.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2efbb0af-fda5-4c1b-a495-24fa7efc689e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-connector/" + google-query: inurl:"/wp-content/plugins/post-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-connector-f776029d92548dff61e2448270aca9d0.yaml b/nuclei-templates/cve-less/plugins/post-connector-f776029d92548dff61e2448270aca9d0.yaml new file mode 100644 index 0000000000..504ab5227b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-connector-f776029d92548dff61e2448270aca9d0.yaml @@ -0,0 +1,58 @@ +id: post-connector-f776029d92548dff61e2448270aca9d0 + +info: + name: > + Post Connector <= 1.0.3 and Post Conector Premium <= 1.6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3d7728f-7c25-4505-8db3-b67a5c17a439?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-connector/" + google-query: inurl:"/wp-content/plugins/post-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-connector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-connector-pro-f776029d92548dff61e2448270aca9d0.yaml b/nuclei-templates/cve-less/plugins/post-connector-pro-f776029d92548dff61e2448270aca9d0.yaml new file mode 100644 index 0000000000..48be361403 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-connector-pro-f776029d92548dff61e2448270aca9d0.yaml @@ -0,0 +1,58 @@ +id: post-connector-pro-f776029d92548dff61e2448270aca9d0 + +info: + name: > + Post Connector <= 1.0.3 and Post Conector Premium <= 1.6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3d7728f-7c25-4505-8db3-b67a5c17a439?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-connector-pro/" + google-query: inurl:"/wp-content/plugins/post-connector-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-connector-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-connector-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-connector-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-content-xmlrpc-c5997f1fef9873598e392fd29a23db70.yaml b/nuclei-templates/cve-less/plugins/post-content-xmlrpc-c5997f1fef9873598e392fd29a23db70.yaml new file mode 100644 index 0000000000..b900942a24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-content-xmlrpc-c5997f1fef9873598e392fd29a23db70.yaml @@ -0,0 +1,58 @@ +id: post-content-xmlrpc-c5997f1fef9873598e392fd29a23db70 + +info: + name: > + Post Content XMLRPC <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfe07cd7-e448-4468-8280-3514690d8648?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-content-xmlrpc/" + google-query: inurl:"/wp-content/plugins/post-content-xmlrpc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-content-xmlrpc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-content-xmlrpc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-content-xmlrpc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-duplicator-4411dec3eca9ec1ccdcf332ed790a4a3.yaml b/nuclei-templates/cve-less/plugins/post-duplicator-4411dec3eca9ec1ccdcf332ed790a4a3.yaml new file mode 100644 index 0000000000..aa35abd10b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-duplicator-4411dec3eca9ec1ccdcf332ed790a4a3.yaml @@ -0,0 +1,58 @@ +id: post-duplicator-4411dec3eca9ec1ccdcf332ed790a4a3 + +info: + name: > + Post Duplicator <= 2.23 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c763a8d8-c31a-4c9f-8f0e-814cda91b860?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-duplicator/" + google-query: inurl:"/wp-content/plugins/post-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-duplicator-757377e3d1b7b4a16326ff93c76bfa77.yaml b/nuclei-templates/cve-less/plugins/post-duplicator-757377e3d1b7b4a16326ff93c76bfa77.yaml new file mode 100644 index 0000000000..44094f8f69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-duplicator-757377e3d1b7b4a16326ff93c76bfa77.yaml @@ -0,0 +1,58 @@ +id: post-duplicator-757377e3d1b7b4a16326ff93c76bfa77 + +info: + name: > + Post Duplicator <= 2.31 - Missing Authorization via mtphr_duplicate_post + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5665931-8da9-44db-a5b1-46acebf14f3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-duplicator/" + google-query: inurl:"/wp-content/plugins/post-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-duplicator-e3c761c4e430d07f3cc55d6f4fc67c86.yaml b/nuclei-templates/cve-less/plugins/post-duplicator-e3c761c4e430d07f3cc55d6f4fc67c86.yaml new file mode 100644 index 0000000000..588d8f0e47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-duplicator-e3c761c4e430d07f3cc55d6f4fc67c86.yaml @@ -0,0 +1,58 @@ +id: post-duplicator-e3c761c4e430d07f3cc55d6f4fc67c86 + +info: + name: > + Post Duplicator <= 2.16 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a9000e3-a313-48f7-88cd-3041c8da8288?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-duplicator/" + google-query: inurl:"/wp-content/plugins/post-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-expirator-94847c0850f7aba0194b3e646162912e.yaml b/nuclei-templates/cve-less/plugins/post-expirator-94847c0850f7aba0194b3e646162912e.yaml new file mode 100644 index 0000000000..bb0b786082 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-expirator-94847c0850f7aba0194b3e646162912e.yaml @@ -0,0 +1,58 @@ +id: post-expirator-94847c0850f7aba0194b3e646162912e + +info: + name: > + Post Expirator <= 2.5.1 - Contributor+ Arbitrary Post Schedule Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0576cde-8d32-4f06-899a-a9ebff99d8ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-expirator/" + google-query: inurl:"/wp-content/plugins/post-expirator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-expirator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-expirator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-expirator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-gallery-1b225faa6149f90c544fb3acb706af2f.yaml b/nuclei-templates/cve-less/plugins/post-gallery-1b225faa6149f90c544fb3acb706af2f.yaml new file mode 100644 index 0000000000..2c476ab9c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-gallery-1b225faa6149f90c544fb3acb706af2f.yaml @@ -0,0 +1,58 @@ +id: post-gallery-1b225faa6149f90c544fb3acb706af2f + +info: + name: > + Post Gallery <= 1.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b6021d2-cbfd-42d9-84d8-6db0f28828ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-gallery/" + google-query: inurl:"/wp-content/plugins/post-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-035b152afda993b6317a93d2886e872e.yaml b/nuclei-templates/cve-less/plugins/post-grid-035b152afda993b6317a93d2886e872e.yaml new file mode 100644 index 0000000000..f793c3fde4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-035b152afda993b6317a93d2886e872e.yaml @@ -0,0 +1,58 @@ +id: post-grid-035b152afda993b6317a93d2886e872e + +info: + name: > + Post Grid Combo – 36+ Gutenberg Blocks <= 2.2.64 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab777672-6eef-4078-932d-24bb784107fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-2709ba16ebba4320ded81fce12f3563d.yaml b/nuclei-templates/cve-less/plugins/post-grid-2709ba16ebba4320ded81fce12f3563d.yaml new file mode 100644 index 0000000000..4074bb2100 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-2709ba16ebba4320ded81fce12f3563d.yaml @@ -0,0 +1,58 @@ +id: post-grid-2709ba16ebba4320ded81fce12f3563d + +info: + name: > + Post Grid <= 2.1.12 - Contributor+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a321b112-ce37-4a0e-800f-f3feef6ac799?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-27ea99e0a4c0fec30a4e9e397cbf9e1f.yaml b/nuclei-templates/cve-less/plugins/post-grid-27ea99e0a4c0fec30a4e9e397cbf9e1f.yaml new file mode 100644 index 0000000000..cf11b7d001 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-27ea99e0a4c0fec30a4e9e397cbf9e1f.yaml @@ -0,0 +1,58 @@ +id: post-grid-27ea99e0a4c0fec30a4e9e397cbf9e1f + +info: + name: > + Post Grid < 2.1.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/668afa62-1326-4067-8d0a-f16788e85ae5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-62d64311944bfd1e5f948984fb1aa5c3.yaml b/nuclei-templates/cve-less/plugins/post-grid-62d64311944bfd1e5f948984fb1aa5c3.yaml new file mode 100644 index 0000000000..02384655d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-62d64311944bfd1e5f948984fb1aa5c3.yaml @@ -0,0 +1,58 @@ +id: post-grid-62d64311944bfd1e5f948984fb1aa5c3 + +info: + name: > + Post Grid <= 2.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25838724-42b6-41e1-9546-78e6da2e95e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-95cbf2d4161dbe2a06b19107725df07f.yaml b/nuclei-templates/cve-less/plugins/post-grid-95cbf2d4161dbe2a06b19107725df07f.yaml new file mode 100644 index 0000000000..01e5449573 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-95cbf2d4161dbe2a06b19107725df07f.yaml @@ -0,0 +1,58 @@ +id: post-grid-95cbf2d4161dbe2a06b19107725df07f + +info: + name: > + Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel <= 2.2.74 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e23dcadf-5858-4b8e-8b48-d3133c40cd89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.74') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-966d3900b7e6f22f0e9de38c28765bd0.yaml b/nuclei-templates/cve-less/plugins/post-grid-966d3900b7e6f22f0e9de38c28765bd0.yaml new file mode 100644 index 0000000000..1ca02f33fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-966d3900b7e6f22f0e9de38c28765bd0.yaml @@ -0,0 +1,58 @@ +id: post-grid-966d3900b7e6f22f0e9de38c28765bd0 + +info: + name: > + Post Grid <= 2.2.50 - Missing Authorization to Sensitive Information Exposure via REST API + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a52fb5f4-60ba-4077-95cd-e160a6d9a419?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-af61f5bee07d29ca204b7dc88cfe0b56.yaml b/nuclei-templates/cve-less/plugins/post-grid-af61f5bee07d29ca204b7dc88cfe0b56.yaml new file mode 100644 index 0000000000..d6e9b62238 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-af61f5bee07d29ca204b7dc88cfe0b56.yaml @@ -0,0 +1,58 @@ +id: post-grid-af61f5bee07d29ca204b7dc88cfe0b56 + +info: + name: > + Post Grid <= 2.2.74 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19d394d8-bdc5-4cb5-b210-269197294020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.74') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-and-filter-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/post-grid-and-filter-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..3e144f2d4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-and-filter-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: post-grid-and-filter-ultimate-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid-and-filter-ultimate/" + google-query: inurl:"/wp-content/plugins/post-grid-and-filter-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid-and-filter-ultimate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid-and-filter-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid-and-filter-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-c45a88374cf340205cd7587349c11c58.yaml b/nuclei-templates/cve-less/plugins/post-grid-c45a88374cf340205cd7587349c11c58.yaml new file mode 100644 index 0000000000..b68b978f02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-c45a88374cf340205cd7587349c11c58.yaml @@ -0,0 +1,58 @@ +id: post-grid-c45a88374cf340205cd7587349c11c58 + +info: + name: > + Post Grid Combo – 36+ Gutenberg Blocks <= 2.2.68 - Information Exposure via get_posts API Endpoint + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/feee3268-b384-400c-a76d-e5d7972c05b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..d33f3088ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: post-grid-carousel-ultimate-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid-carousel-ultimate/" + google-query: inurl:"/wp-content/plugins/post-grid-carousel-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid-carousel-ultimate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid-carousel-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid-carousel-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-1ddfe592d879bc70e98e16d6c917ddd6.yaml b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-1ddfe592d879bc70e98e16d6c917ddd6.yaml new file mode 100644 index 0000000000..9f33aa017c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-1ddfe592d879bc70e98e16d6c917ddd6.yaml @@ -0,0 +1,58 @@ +id: post-grid-carousel-ultimate-1ddfe592d879bc70e98e16d6c917ddd6 + +info: + name: > + Post Grid, Slider & Carousel Ultimate <= 1.4.3 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4b1e7da-dbcd-4206-b908-4c814cde39d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid-carousel-ultimate/" + google-query: inurl:"/wp-content/plugins/post-grid-carousel-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid-carousel-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid-carousel-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid-carousel-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-2f1e25e867c081cf048f4dbc7240dbff.yaml b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-2f1e25e867c081cf048f4dbc7240dbff.yaml new file mode 100644 index 0000000000..64ecec5938 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-2f1e25e867c081cf048f4dbc7240dbff.yaml @@ -0,0 +1,58 @@ +id: post-grid-carousel-ultimate-2f1e25e867c081cf048f4dbc7240dbff + +info: + name: > + Post Grid, Slider & Carousel Ultimate <= 1.6.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/063224fe-3cf8-40b6-8645-86c8e8dc876e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid-carousel-ultimate/" + google-query: inurl:"/wp-content/plugins/post-grid-carousel-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid-carousel-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid-carousel-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid-carousel-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..ad72ed09f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: post-grid-carousel-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid-carousel-ultimate/" + google-query: inurl:"/wp-content/plugins/post-grid-carousel-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid-carousel-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid-carousel-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid-carousel-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-c9946499e4c79e58a3887d0481784464.yaml b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-c9946499e4c79e58a3887d0481784464.yaml new file mode 100644 index 0000000000..173e2b24c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-carousel-ultimate-c9946499e4c79e58a3887d0481784464.yaml @@ -0,0 +1,58 @@ +id: post-grid-carousel-ultimate-c9946499e4c79e58a3887d0481784464 + +info: + name: > + Post Grid, Slider & Carousel Ultimate – with Shortcode, Gutenberg Block & Elementor Widget <= 1.6.7 - Authenticated (Contributor+) PHP Object Injection in outpost_shortcode_metabox_markup + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cf1b234-862b-41a0-ab63-a986f8023613?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid-carousel-ultimate/" + google-query: inurl:"/wp-content/plugins/post-grid-carousel-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid-carousel-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid-carousel-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid-carousel-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-cf1bd6ff01752966d1624646c80166a0.yaml b/nuclei-templates/cve-less/plugins/post-grid-cf1bd6ff01752966d1624646c80166a0.yaml new file mode 100644 index 0000000000..b6a8d8a60a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-cf1bd6ff01752966d1624646c80166a0.yaml @@ -0,0 +1,58 @@ +id: post-grid-cf1bd6ff01752966d1624646c80166a0 + +info: + name: > + Post Grid <= 2.1.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/653fbe5d-3388-4227-8a0a-46764b6be4d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-d85892acba5196bfde784fd680ddf7a0.yaml b/nuclei-templates/cve-less/plugins/post-grid-d85892acba5196bfde784fd680ddf7a0.yaml new file mode 100644 index 0000000000..efb4083e76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-d85892acba5196bfde784fd680ddf7a0.yaml @@ -0,0 +1,58 @@ +id: post-grid-d85892acba5196bfde784fd680ddf7a0 + +info: + name: > + Post Grid <= 2.0.12 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f28ca2dc-404d-4abf-9d44-1b1f8309e9ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-grid-f73e002833ea0b53546c13f99fdb350d.yaml b/nuclei-templates/cve-less/plugins/post-grid-f73e002833ea0b53546c13f99fdb350d.yaml new file mode 100644 index 0000000000..35a4e53d26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-grid-f73e002833ea0b53546c13f99fdb350d.yaml @@ -0,0 +1,58 @@ +id: post-grid-f73e002833ea0b53546c13f99fdb350d + +info: + name: > + Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks <= 2.2.78 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb057a32-0027-4ca6-b65e-8634509c9a81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-grid/" + google-query: inurl:"/wp-content/plugins/post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-grid,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.78') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-highlights-a2564828601d8890d4d70eda1fefb7d7.yaml b/nuclei-templates/cve-less/plugins/post-highlights-a2564828601d8890d4d70eda1fefb7d7.yaml new file mode 100644 index 0000000000..12debbe2d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-highlights-a2564828601d8890d4d70eda1fefb7d7.yaml @@ -0,0 +1,58 @@ +id: post-highlights-a2564828601d8890d4d70eda1fefb7d7 + +info: + name: > + post highlights 2.0 - 2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d586f258-ddd4-48a1-9c7a-2d1b343b0d23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-highlights/" + google-query: inurl:"/wp-content/plugins/post-highlights/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-highlights,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-highlights/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-highlights" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0', '<= 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-hit-counter-f768e79079373c221f74efaccdcb8674.yaml b/nuclei-templates/cve-less/plugins/post-hit-counter-f768e79079373c221f74efaccdcb8674.yaml new file mode 100644 index 0000000000..9a8c6671ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-hit-counter-f768e79079373c221f74efaccdcb8674.yaml @@ -0,0 +1,58 @@ +id: post-hit-counter-f768e79079373c221f74efaccdcb8674 + +info: + name: > + Post Hit Counter <= 1.3.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4049f8fb-ad81-4f09-97b3-39ac6a9275d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-hit-counter/" + google-query: inurl:"/wp-content/plugins/post-hit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-hit-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-hit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-hit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-index-a197637cb7c671923c50bb35a3955a77.yaml b/nuclei-templates/cve-less/plugins/post-index-a197637cb7c671923c50bb35a3955a77.yaml new file mode 100644 index 0000000000..b6bd3242d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-index-a197637cb7c671923c50bb35a3955a77.yaml @@ -0,0 +1,58 @@ +id: post-index-a197637cb7c671923c50bb35a3955a77 + +info: + name: > + Post Index <= 0.7.5 Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/507d308e-7df7-4bcb-b63c-f438b482c36b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-index/" + google-query: inurl:"/wp-content/plugins/post-index/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-index,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-index/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-index" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-indexer-b17a43827beee501340aedb4ac43d4f4.yaml b/nuclei-templates/cve-less/plugins/post-indexer-b17a43827beee501340aedb4ac43d4f4.yaml new file mode 100644 index 0000000000..86ed2e4aad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-indexer-b17a43827beee501340aedb4ac43d4f4.yaml @@ -0,0 +1,58 @@ +id: post-indexer-b17a43827beee501340aedb4ac43d4f4 + +info: + name: > + Post Indexer <= 3.0.6.1 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e43cf06-8356-40cd-a0d8-b9f7ab95d793?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-indexer/" + google-query: inurl:"/wp-content/plugins/post-indexer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-indexer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-indexer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-indexer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-indexer-e8e5df43b04b7f37f9a558b78548b1cb.yaml b/nuclei-templates/cve-less/plugins/post-indexer-e8e5df43b04b7f37f9a558b78548b1cb.yaml new file mode 100644 index 0000000000..27c8903458 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-indexer-e8e5df43b04b7f37f9a558b78548b1cb.yaml @@ -0,0 +1,58 @@ +id: post-indexer-e8e5df43b04b7f37f9a558b78548b1cb + +info: + name: > + Post Indexer <= 3.0.6.1 - Authenticated (Super Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ecc0811-916d-4c60-9047-a09242de36bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-indexer/" + google-query: inurl:"/wp-content/plugins/post-indexer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-indexer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-indexer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-indexer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-list-designer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/post-list-designer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..05863754d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-list-designer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: post-list-designer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-list-designer/" + google-query: inurl:"/wp-content/plugins/post-list-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-list-designer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-list-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-list-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-list-designer-bb6c1374b9c3f1f7e4fbd5d4ecd1156f.yaml b/nuclei-templates/cve-less/plugins/post-list-designer-bb6c1374b9c3f1f7e4fbd5d4ecd1156f.yaml new file mode 100644 index 0000000000..9c8aaad22a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-list-designer-bb6c1374b9c3f1f7e4fbd5d4ecd1156f.yaml @@ -0,0 +1,58 @@ +id: post-list-designer-bb6c1374b9c3f1f7e4fbd5d4ecd1156f + +info: + name: > + Posts List Designer by Category <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scriptiong via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0b81941-ae2b-451a-ae72-07fd72f70a95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-list-designer/" + google-query: inurl:"/wp-content/plugins/post-list-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-list-designer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-list-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-list-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-list-designer-dd54abc9fa7f2f5d5c6010fa1c8c3d7f.yaml b/nuclei-templates/cve-less/plugins/post-list-designer-dd54abc9fa7f2f5d5c6010fa1c8c3d7f.yaml new file mode 100644 index 0000000000..59886049b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-list-designer-dd54abc9fa7f2f5d5c6010fa1c8c3d7f.yaml @@ -0,0 +1,58 @@ +id: post-list-designer-dd54abc9fa7f2f5d5c6010fa1c8c3d7f + +info: + name: > + Posts List Designer by Category – List Category Posts Or Recent Posts <= 3.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b5decc1-cc81-4a5e-b6d8-5120cb37c93b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-list-designer/" + google-query: inurl:"/wp-content/plugins/post-list-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-list-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-list-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-list-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-list-with-featured-image-5d918b6eb4d2d11658c1c45d7b9c4c43.yaml b/nuclei-templates/cve-less/plugins/post-list-with-featured-image-5d918b6eb4d2d11658c1c45d7b9c4c43.yaml new file mode 100644 index 0000000000..481432800b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-list-with-featured-image-5d918b6eb4d2d11658c1c45d7b9c4c43.yaml @@ -0,0 +1,58 @@ +id: post-list-with-featured-image-5d918b6eb4d2d11658c1c45d7b9c4c43 + +info: + name: > + Post List With Featured Image <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b720612-f3ec-4cc0-9cc8-b9e01421ca87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-list-with-featured-image/" + google-query: inurl:"/wp-content/plugins/post-list-with-featured-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-list-with-featured-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-list-with-featured-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-list-with-featured-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-meta-data-manager-09c17ceea6b1acc60dc27557a0b8ba88.yaml b/nuclei-templates/cve-less/plugins/post-meta-data-manager-09c17ceea6b1acc60dc27557a0b8ba88.yaml new file mode 100644 index 0000000000..3c72ccd6c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-meta-data-manager-09c17ceea6b1acc60dc27557a0b8ba88.yaml @@ -0,0 +1,58 @@ +id: post-meta-data-manager-09c17ceea6b1acc60dc27557a0b8ba88 + +info: + name: > + Post Meta Data Manager <= 1.2.0 - Missing Authorization to Post, Term, and User Meta Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1958c166-282d-4469-b79d-4e959e0492c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-meta-data-manager/" + google-query: inurl:"/wp-content/plugins/post-meta-data-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-meta-data-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-meta-data-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-meta-data-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-meta-data-manager-1261a6042800202478889a8b09341ae9.yaml b/nuclei-templates/cve-less/plugins/post-meta-data-manager-1261a6042800202478889a8b09341ae9.yaml new file mode 100644 index 0000000000..d88ccd70e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-meta-data-manager-1261a6042800202478889a8b09341ae9.yaml @@ -0,0 +1,58 @@ +id: post-meta-data-manager-1261a6042800202478889a8b09341ae9 + +info: + name: > + Post Meta Data Manager <= 1.2.1 - Cross-Site Request Forgery to Post, Term, and User Meta Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d49b8c44-4dad-4990-a8a8-116b424a7dfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-meta-data-manager/" + google-query: inurl:"/wp-content/plugins/post-meta-data-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-meta-data-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-meta-data-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-meta-data-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-meta-data-manager-91dbc533a6be524b4d3d9619ad71cbbc.yaml b/nuclei-templates/cve-less/plugins/post-meta-data-manager-91dbc533a6be524b4d3d9619ad71cbbc.yaml new file mode 100644 index 0000000000..e04be4985e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-meta-data-manager-91dbc533a6be524b4d3d9619ad71cbbc.yaml @@ -0,0 +1,58 @@ +id: post-meta-data-manager-91dbc533a6be524b4d3d9619ad71cbbc + +info: + name: > + Post Meta Data Manager <=1.2.0 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7f4e710-99a2-49df-a513-725e1daaa18a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-meta-data-manager/" + google-query: inurl:"/wp-content/plugins/post-meta-data-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-meta-data-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-meta-data-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-meta-data-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-meta-data-manager-f2302a385e4bf0d806c1625e66741b99.yaml b/nuclei-templates/cve-less/plugins/post-meta-data-manager-f2302a385e4bf0d806c1625e66741b99.yaml new file mode 100644 index 0000000000..939a8e258f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-meta-data-manager-f2302a385e4bf0d806c1625e66741b99.yaml @@ -0,0 +1,58 @@ +id: post-meta-data-manager-f2302a385e4bf0d806c1625e66741b99 + +info: + name: > + Post Meta Data Manager <=1.2.0 - Missing Authorization to User, Term, and Post Meta Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6a7f882-4582-4b08-9597-329d140ad782?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-meta-data-manager/" + google-query: inurl:"/wp-content/plugins/post-meta-data-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-meta-data-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-meta-data-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-meta-data-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-new-6b050fdad6f07dfeb11a710487994604.yaml b/nuclei-templates/cve-less/plugins/post-new-6b050fdad6f07dfeb11a710487994604.yaml new file mode 100644 index 0000000000..c2c244e42b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-new-6b050fdad6f07dfeb11a710487994604.yaml @@ -0,0 +1,58 @@ +id: post-new-6b050fdad6f07dfeb11a710487994604 + +info: + name: > + WooCommerce <= 8.5.2 - Missing Authorization to Private/Draft Product Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68eec693-bffe-4f3a-8e76-edf9f13093d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-new/" + google-query: inurl:"/wp-content/plugins/post-new/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-new,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-new/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-new" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-pay-counter-c7ba3a45fd00d12be9d06e7d73d86881.yaml b/nuclei-templates/cve-less/plugins/post-pay-counter-c7ba3a45fd00d12be9d06e7d73d86881.yaml new file mode 100644 index 0000000000..2ef192fb03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-pay-counter-c7ba3a45fd00d12be9d06e7d73d86881.yaml @@ -0,0 +1,58 @@ +id: post-pay-counter-c7ba3a45fd00d12be9d06e7d73d86881 + +info: + name: > + Post Pay Counter <= 2.789 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a9fce6d-d5c2-4ab7-87ea-8dd6e4d92e07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-pay-counter/" + google-query: inurl:"/wp-content/plugins/post-pay-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-pay-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-pay-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-pay-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.789') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-pay-counter-d8208f20ecd1e01dd3173f786b1bf7c7.yaml b/nuclei-templates/cve-less/plugins/post-pay-counter-d8208f20ecd1e01dd3173f786b1bf7c7.yaml new file mode 100644 index 0000000000..8d4dc9bd9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-pay-counter-d8208f20ecd1e01dd3173f786b1bf7c7.yaml @@ -0,0 +1,58 @@ +id: post-pay-counter-d8208f20ecd1e01dd3173f786b1bf7c7 + +info: + name: > + Post Pay Counter < 2.731 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c814924a-bdcd-4b73-905b-a469f4d37ddf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-pay-counter/" + google-query: inurl:"/wp-content/plugins/post-pay-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-pay-counter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-pay-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-pay-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.731') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-pay-counter-f9e928230a2004071cf8b8a565c1c9d8.yaml b/nuclei-templates/cve-less/plugins/post-pay-counter-f9e928230a2004071cf8b8a565c1c9d8.yaml new file mode 100644 index 0000000000..f7e3af525b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-pay-counter-f9e928230a2004071cf8b8a565c1c9d8.yaml @@ -0,0 +1,58 @@ +id: post-pay-counter-f9e928230a2004071cf8b8a565c1c9d8 + +info: + name: > + Post Pay Counter < 2.731 - Arbitrary Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/951b2a15-04c1-4c5b-9cef-146628079c36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-pay-counter/" + google-query: inurl:"/wp-content/plugins/post-pay-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-pay-counter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-pay-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-pay-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.731') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-plugin-library-58af12d3803de6577a6e6446cfb68db8.yaml b/nuclei-templates/cve-less/plugins/post-plugin-library-58af12d3803de6577a6e6446cfb68db8.yaml new file mode 100644 index 0000000000..cdceeb917d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-plugin-library-58af12d3803de6577a6e6446cfb68db8.yaml @@ -0,0 +1,58 @@ +id: post-plugin-library-58af12d3803de6577a6e6446cfb68db8 + +info: + name: > + Post-Plugin Library <= 2.6.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6397f917-7d74-43f6-96b0-4aca6447eb86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-plugin-library/" + google-query: inurl:"/wp-content/plugins/post-plugin-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-plugin-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-plugin-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-plugin-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-shortcode-b16694416bb8375e384e3d9eb2224580.yaml b/nuclei-templates/cve-less/plugins/post-shortcode-b16694416bb8375e384e3d9eb2224580.yaml new file mode 100644 index 0000000000..e15ff6f3d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-shortcode-b16694416bb8375e384e3d9eb2224580.yaml @@ -0,0 +1,58 @@ +id: post-shortcode-b16694416bb8375e384e3d9eb2224580 + +info: + name: > + Post Shortcode <= 2.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3e1d66d-34cf-491c-8a07-0f9efd3c9669?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-shortcode/" + google-query: inurl:"/wp-content/plugins/post-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-slider-and-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/post-slider-and-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c5d2c513f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-slider-and-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: post-slider-and-carousel-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-slider-and-carousel/" + google-query: inurl:"/wp-content/plugins/post-slider-and-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-slider-and-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-slider-and-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-slider-and-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-slider-carousel-43333653570b3a1b8a29a02f94914583.yaml b/nuclei-templates/cve-less/plugins/post-slider-carousel-43333653570b3a1b8a29a02f94914583.yaml new file mode 100644 index 0000000000..b9716ee0d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-slider-carousel-43333653570b3a1b8a29a02f94914583.yaml @@ -0,0 +1,58 @@ +id: post-slider-carousel-43333653570b3a1b8a29a02f94914583 + +info: + name: > + Post Sliders & Post Grids <= 1.0.20 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ddc39a8-57b7-46be-878a-2e1cf3271bd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-slider-carousel/" + google-query: inurl:"/wp-content/plugins/post-slider-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-slider-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-slider-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-slider-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-0b71d9ca16ea40ec86cc7a6c955b072f.yaml b/nuclei-templates/cve-less/plugins/post-smtp-0b71d9ca16ea40ec86cc7a6c955b072f.yaml new file mode 100644 index 0000000000..601e7b9758 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-0b71d9ca16ea40ec86cc7a6c955b072f.yaml @@ -0,0 +1,58 @@ +id: post-smtp-0b71d9ca16ea40ec86cc7a6c955b072f + +info: + name: > + POST SMTP Mailer <= 2.5.6 - Cross-Site Request Forgery to Arbitrary Log Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1af4be1-a9d6-4f44-91b3-22cf3130cc34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-0b997461262414a5dc7659a0045e7c29.yaml b/nuclei-templates/cve-less/plugins/post-smtp-0b997461262414a5dc7659a0045e7c29.yaml new file mode 100644 index 0000000000..c09fd9709a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-0b997461262414a5dc7659a0045e7c29.yaml @@ -0,0 +1,58 @@ +id: post-smtp-0b997461262414a5dc7659a0045e7c29 + +info: + name: > + POST SMTP Mailer <= 2.8.6 - Reflected Cross-Site Scripting via msg + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7681f984-d488-4da7-afe1-988e5ad012f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-378b490d457309885c7c94c6e12193bf.yaml b/nuclei-templates/cve-less/plugins/post-smtp-378b490d457309885c7c94c6e12193bf.yaml new file mode 100644 index 0000000000..ba8a10715c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-378b490d457309885c7c94c6e12193bf.yaml @@ -0,0 +1,58 @@ +id: post-smtp-378b490d457309885c7c94c6e12193bf + +info: + name: > + Post SMTP <= 2.5.7 - Unauthenticated Stored Cross-Site Scripting via Email + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ecd0fa6-4fdb-4780-9560-0bb126800685?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-53d4be9be43b09403fe429bdcc5fb51e.yaml b/nuclei-templates/cve-less/plugins/post-smtp-53d4be9be43b09403fe429bdcc5fb51e.yaml new file mode 100644 index 0000000000..17f49c2c96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-53d4be9be43b09403fe429bdcc5fb51e.yaml @@ -0,0 +1,58 @@ +id: post-smtp-53d4be9be43b09403fe429bdcc5fb51e + +info: + name: > + POST SMTP Mailer <= 2.7.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f25cd403-77a4-437b-b9ba-93137bf9c936?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-5cce32cc2992a89ca752b62e96a78a05.yaml b/nuclei-templates/cve-less/plugins/post-smtp-5cce32cc2992a89ca752b62e96a78a05.yaml new file mode 100644 index 0000000000..0036c82007 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-5cce32cc2992a89ca752b62e96a78a05.yaml @@ -0,0 +1,58 @@ +id: post-smtp-5cce32cc2992a89ca752b62e96a78a05 + +info: + name: > + Post SMTP <= 2.6.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3816a6cf-8157-4ad9-83f6-93c9b6c6275f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-5dcfc5ea6f05d00ca9432dc6e06a959a.yaml b/nuclei-templates/cve-less/plugins/post-smtp-5dcfc5ea6f05d00ca9432dc6e06a959a.yaml new file mode 100644 index 0000000000..1617020ea4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-5dcfc5ea6f05d00ca9432dc6e06a959a.yaml @@ -0,0 +1,58 @@ +id: post-smtp-5dcfc5ea6f05d00ca9432dc6e06a959a + +info: + name: > + Post SMTP Mailer/Email Log <= 2.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5531449-c70f-488f-95ee-5208138968d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-67e90d47ddcdc0a14625badc3df84c45.yaml b/nuclei-templates/cve-less/plugins/post-smtp-67e90d47ddcdc0a14625badc3df84c45.yaml new file mode 100644 index 0000000000..3492a37fd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-67e90d47ddcdc0a14625badc3df84c45.yaml @@ -0,0 +1,58 @@ +id: post-smtp-67e90d47ddcdc0a14625badc3df84c45 + +info: + name: > + POST SMTP Mailer <= 2.0.20 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e018ca7c-06dd-4d40-91d4-4ed188b8aaf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-95f3dcaa4b86abab69cc1c0fd09f80aa.yaml b/nuclei-templates/cve-less/plugins/post-smtp-95f3dcaa4b86abab69cc1c0fd09f80aa.yaml new file mode 100644 index 0000000000..ac55ae7bdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-95f3dcaa4b86abab69cc1c0fd09f80aa.yaml @@ -0,0 +1,58 @@ +id: post-smtp-95f3dcaa4b86abab69cc1c0fd09f80aa + +info: + name: > + POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress <= 2.8.7 - Authorization Bypass via type connect-app API + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e675d64c-cbb8-4f24-9b6f-2597a97b49af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-9886017b189939b50d12738a1b1a19c5.yaml b/nuclei-templates/cve-less/plugins/post-smtp-9886017b189939b50d12738a1b1a19c5.yaml new file mode 100644 index 0000000000..4cea297109 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-9886017b189939b50d12738a1b1a19c5.yaml @@ -0,0 +1,58 @@ +id: post-smtp-9886017b189939b50d12738a1b1a19c5 + +info: + name: > + POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress <= 2.8.6 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a317395b-32ab-4a00-9568-b87d7c4f69a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-afbbe261546ed611413e53ceb7e989bf.yaml b/nuclei-templates/cve-less/plugins/post-smtp-afbbe261546ed611413e53ceb7e989bf.yaml new file mode 100644 index 0000000000..7f15e850df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-afbbe261546ed611413e53ceb7e989bf.yaml @@ -0,0 +1,58 @@ +id: post-smtp-afbbe261546ed611413e53ceb7e989bf + +info: + name: > + Post SMTP <= 2.1.6 - Authenticated (Administrator+) Blind Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cfcdc33-f5aa-4ca9-a2b6-30fcba174c85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-d84a106e9bb81d7dc52eebf9c446c56a.yaml b/nuclei-templates/cve-less/plugins/post-smtp-d84a106e9bb81d7dc52eebf9c446c56a.yaml new file mode 100644 index 0000000000..a6bdc14f80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-d84a106e9bb81d7dc52eebf9c446c56a.yaml @@ -0,0 +1,58 @@ +id: post-smtp-d84a106e9bb81d7dc52eebf9c446c56a + +info: + name: > + POST SMTP Mailer <= 2.5.6 - Cross-Site Request Forgery to Account Compromise + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca16602-52e6-4d14-99a5-ca4e26b9f377?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-smtp-ff6aea4a9e4f72f85f246b4af5287259.yaml b/nuclei-templates/cve-less/plugins/post-smtp-ff6aea4a9e4f72f85f246b4af5287259.yaml new file mode 100644 index 0000000000..ce0336175d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-smtp-ff6aea4a9e4f72f85f246b4af5287259.yaml @@ -0,0 +1,58 @@ +id: post-smtp-ff6aea4a9e4f72f85f246b4af5287259 + +info: + name: > + POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress <= 2.8.7 - Unauthenticated Stored Cross-Site Scripting via device + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8911a3-ce0f-420c-bf2a-1c2929d01cef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-smtp/" + google-query: inurl:"/wp-content/plugins/post-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-snippets-67558508f8127f6d47b6b0749495c9d6.yaml b/nuclei-templates/cve-less/plugins/post-snippets-67558508f8127f6d47b6b0749495c9d6.yaml new file mode 100644 index 0000000000..d4d38ff8a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-snippets-67558508f8127f6d47b6b0749495c9d6.yaml @@ -0,0 +1,58 @@ +id: post-snippets-67558508f8127f6d47b6b0749495c9d6 + +info: + name: > + Post Snippets <= 4.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'snippet_content' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d10f5cd-d449-46f1-a347-f45a1db65999?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-snippets/" + google-query: inurl:"/wp-content/plugins/post-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-snippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-snippets-6dabd7288f9bf1aa4314c1230eb61170.yaml b/nuclei-templates/cve-less/plugins/post-snippets-6dabd7288f9bf1aa4314c1230eb61170.yaml new file mode 100644 index 0000000000..aa6d7fd03f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-snippets-6dabd7288f9bf1aa4314c1230eb61170.yaml @@ -0,0 +1,58 @@ +id: post-snippets-6dabd7288f9bf1aa4314c1230eb61170 + +info: + name: > + Post Snippets <= 3.1.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82acefe0-a839-4721-858d-120326e45664?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-snippets/" + google-query: inurl:"/wp-content/plugins/post-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-snippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-snippets-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/post-snippets-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c2a302982c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-snippets-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: post-snippets-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-snippets/" + google-query: inurl:"/wp-content/plugins/post-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-snippets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-snippets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/post-snippets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..4f6afa4edd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-snippets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: post-snippets-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-snippets/" + google-query: inurl:"/wp-content/plugins/post-snippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-snippets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-snippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-snippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-state-tags-615b1160bdc5d2675b75757e17bb7e35.yaml b/nuclei-templates/cve-less/plugins/post-state-tags-615b1160bdc5d2675b75757e17bb7e35.yaml new file mode 100644 index 0000000000..7623cd81ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-state-tags-615b1160bdc5d2675b75757e17bb7e35.yaml @@ -0,0 +1,58 @@ +id: post-state-tags-615b1160bdc5d2675b75757e17bb7e35 + +info: + name: > + Post State Tags <= 2.0.6 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a938325-45f5-455b-b2b7-e19e6e22cd0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-state-tags/" + google-query: inurl:"/wp-content/plugins/post-state-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-state-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-state-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-state-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-status-notifier-lite-536f99b9c8b9515938d0ac526d370775.yaml b/nuclei-templates/cve-less/plugins/post-status-notifier-lite-536f99b9c8b9515938d0ac526d370775.yaml new file mode 100644 index 0000000000..1e5f820df9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-status-notifier-lite-536f99b9c8b9515938d0ac526d370775.yaml @@ -0,0 +1,58 @@ +id: post-status-notifier-lite-536f99b9c8b9515938d0ac526d370775 + +info: + name: > + Post Status Notifier Lite <= 1.10.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bef9fbc-ada5-475d-b630-923483b8fb7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-status-notifier-lite/" + google-query: inurl:"/wp-content/plugins/post-status-notifier-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-status-notifier-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-status-notifier-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-status-notifier-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-status-notifier-lite-fa9b6dc41b62f37cfba851a3e4e1b251.yaml b/nuclei-templates/cve-less/plugins/post-status-notifier-lite-fa9b6dc41b62f37cfba851a3e4e1b251.yaml new file mode 100644 index 0000000000..4a62cee991 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-status-notifier-lite-fa9b6dc41b62f37cfba851a3e4e1b251.yaml @@ -0,0 +1,58 @@ +id: post-status-notifier-lite-fa9b6dc41b62f37cfba851a3e4e1b251 + +info: + name: > + Post Status Notifier Lite <= 1.11.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6af1224e-0ed3-4770-96c0-c15cc895d36d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-status-notifier-lite/" + google-query: inurl:"/wp-content/plugins/post-status-notifier-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-status-notifier-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-status-notifier-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-status-notifier-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-teaser-767aeb59e47dca848d0413b31cb3f81a.yaml b/nuclei-templates/cve-less/plugins/post-teaser-767aeb59e47dca848d0413b31cb3f81a.yaml new file mode 100644 index 0000000000..5d107fe08f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-teaser-767aeb59e47dca848d0413b31cb3f81a.yaml @@ -0,0 +1,58 @@ +id: post-teaser-767aeb59e47dca848d0413b31cb3f81a + +info: + name: > + Post Teaser <= 4.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5988fb74-01d1-426f-9a38-62336a59211b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-teaser/" + google-query: inurl:"/wp-content/plugins/post-teaser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-teaser,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-teaser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-teaser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-teaser-db46aef04d74b6695e5a22627a3163f0.yaml b/nuclei-templates/cve-less/plugins/post-teaser-db46aef04d74b6695e5a22627a3163f0.yaml new file mode 100644 index 0000000000..80b40388d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-teaser-db46aef04d74b6695e5a22627a3163f0.yaml @@ -0,0 +1,58 @@ +id: post-teaser-db46aef04d74b6695e5a22627a3163f0 + +info: + name: > + Post Teaser <= 4.1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6767cc8e-f327-4891-8d3c-555ba7f5062c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-teaser/" + google-query: inurl:"/wp-content/plugins/post-teaser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-teaser,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-teaser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-teaser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-thumbnail-editor-c06a16f33dee682ac5351a8f0d142a5f.yaml b/nuclei-templates/cve-less/plugins/post-thumbnail-editor-c06a16f33dee682ac5351a8f0d142a5f.yaml new file mode 100644 index 0000000000..eb2baf1d5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-thumbnail-editor-c06a16f33dee682ac5351a8f0d142a5f.yaml @@ -0,0 +1,58 @@ +id: post-thumbnail-editor-c06a16f33dee682ac5351a8f0d142a5f + +info: + name: > + Post Thumbnail Editor <= 2.4.8 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b102af8f-2bc3-4548-9a90-d1280b058173?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-thumbnail-editor/" + google-query: inurl:"/wp-content/plugins/post-thumbnail-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-thumbnail-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-thumbnail-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-thumbnail-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-timeline-d1c35f1b92d2cf694e8384e45db5ef1c.yaml b/nuclei-templates/cve-less/plugins/post-timeline-d1c35f1b92d2cf694e8384e45db5ef1c.yaml new file mode 100644 index 0000000000..62e2b06d98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-timeline-d1c35f1b92d2cf694e8384e45db5ef1c.yaml @@ -0,0 +1,58 @@ +id: post-timeline-d1c35f1b92d2cf694e8384e45db5ef1c + +info: + name: > + Post Timeline <= 2.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f75966a5-e593-4c86-842d-c136ae847eb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-timeline/" + google-query: inurl:"/wp-content/plugins/post-timeline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-timeline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-timeline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-timeline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-title-counter-ae3d9dc541dfd812b33967f0f1087c0a.yaml b/nuclei-templates/cve-less/plugins/post-title-counter-ae3d9dc541dfd812b33967f0f1087c0a.yaml new file mode 100644 index 0000000000..813945cbcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-title-counter-ae3d9dc541dfd812b33967f0f1087c0a.yaml @@ -0,0 +1,58 @@ +id: post-title-counter-ae3d9dc541dfd812b33967f0f1087c0a + +info: + name: > + Post Title Counter <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5715f3d3-8b88-45bc-a858-3911eeaaf045?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-title-counter/" + google-query: inurl:"/wp-content/plugins/post-title-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-title-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-title-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-title-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-to-csv-20398cd1fa642be8e5e0c9798f123a57.yaml b/nuclei-templates/cve-less/plugins/post-to-csv-20398cd1fa642be8e5e0c9798f123a57.yaml new file mode 100644 index 0000000000..1bb68b39cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-to-csv-20398cd1fa642be8e5e0c9798f123a57.yaml @@ -0,0 +1,58 @@ +id: post-to-csv-20398cd1fa642be8e5e0c9798f123a57 + +info: + name: > + Post to CSV by BestWebSoft < 1.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2af416b-4510-468f-81ef-aa09f2fd51ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-to-csv/" + google-query: inurl:"/wp-content/plugins/post-to-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-to-csv,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-to-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-to-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-to-csv-7b65c39ddbda37096522c90c94a9d953.yaml b/nuclei-templates/cve-less/plugins/post-to-csv-7b65c39ddbda37096522c90c94a9d953.yaml new file mode 100644 index 0000000000..b16e21ddfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-to-csv-7b65c39ddbda37096522c90c94a9d953.yaml @@ -0,0 +1,58 @@ +id: post-to-csv-7b65c39ddbda37096522c90c94a9d953 + +info: + name: > + Post to CSV by BestWebSoft <= 1.3.8 - Authenticated (Author+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3be1a1af-baab-4e57-a2c7-5e6963f986cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-to-csv/" + google-query: inurl:"/wp-content/plugins/post-to-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-to-csv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-to-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-to-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-to-csv-ebe4222fc5927e1301c1b27600c1ee1b.yaml b/nuclei-templates/cve-less/plugins/post-to-csv-ebe4222fc5927e1301c1b27600c1ee1b.yaml new file mode 100644 index 0000000000..ca09d0990d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-to-csv-ebe4222fc5927e1301c1b27600c1ee1b.yaml @@ -0,0 +1,58 @@ +id: post-to-csv-ebe4222fc5927e1301c1b27600c1ee1b + +info: + name: > + Post to CSV by BestWebSoft <= 1.4.0 - Authenticated (Author+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74f0af24-e4d9-4b89-b91e-c6ec3e3918e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-to-csv/" + google-query: inurl:"/wp-content/plugins/post-to-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-to-csv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-to-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-to-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-to-google-my-business-b63b7b7e3d30454ea5fbfd364258f1a1.yaml b/nuclei-templates/cve-less/plugins/post-to-google-my-business-b63b7b7e3d30454ea5fbfd364258f1a1.yaml new file mode 100644 index 0000000000..e04a731703 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-to-google-my-business-b63b7b7e3d30454ea5fbfd364258f1a1.yaml @@ -0,0 +1,58 @@ +id: post-to-google-my-business-b63b7b7e3d30454ea5fbfd364258f1a1 + +info: + name: > + Post to Google My Business <= 3.1.14 - Cross-Site Request Forgery to Dismiss Notification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baa8e48f-769a-4f48-bc47-d55c179d1ca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-to-google-my-business/" + google-query: inurl:"/wp-content/plugins/post-to-google-my-business/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-to-google-my-business,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-to-google-my-business/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-to-google-my-business" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-to-google-my-business-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/post-to-google-my-business-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d404d10f35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-to-google-my-business-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: post-to-google-my-business-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-to-google-my-business/" + google-query: inurl:"/wp-content/plugins/post-to-google-my-business/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-to-google-my-business,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-to-google-my-business/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-to-google-my-business" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-to-twitter-b53860895277e266b1fcb14159c31da6.yaml b/nuclei-templates/cve-less/plugins/post-to-twitter-b53860895277e266b1fcb14159c31da6.yaml new file mode 100644 index 0000000000..08ef0eba40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-to-twitter-b53860895277e266b1fcb14159c31da6.yaml @@ -0,0 +1,58 @@ +id: post-to-twitter-b53860895277e266b1fcb14159c31da6 + +info: + name: > + Post to Twitter <= 0.7 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0d8d660-4f8f-4fd5-b001-b182219cf327?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-to-twitter/" + google-query: inurl:"/wp-content/plugins/post-to-twitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-to-twitter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-to-twitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-to-twitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-type-modifier-simple-2e58f9cd7db4957fbee5920bc996cbac.yaml b/nuclei-templates/cve-less/plugins/post-type-modifier-simple-2e58f9cd7db4957fbee5920bc996cbac.yaml new file mode 100644 index 0000000000..1fae914c37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-type-modifier-simple-2e58f9cd7db4957fbee5920bc996cbac.yaml @@ -0,0 +1,58 @@ +id: post-type-modifier-simple-2e58f9cd7db4957fbee5920bc996cbac + +info: + name: > + Add Custom Post Type into Post Query <= 1.03 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfb329da-00df-4178-ad40-9b0b718dc30e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-type-modifier-simple/" + google-query: inurl:"/wp-content/plugins/post-type-modifier-simple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-type-modifier-simple,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-type-modifier-simple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-type-modifier-simple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-type-x-1d0458d81b174356717b00e4b0b273b5.yaml b/nuclei-templates/cve-less/plugins/post-type-x-1d0458d81b174356717b00e4b0b273b5.yaml new file mode 100644 index 0000000000..f0f137b158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-type-x-1d0458d81b174356717b00e4b0b273b5.yaml @@ -0,0 +1,58 @@ +id: post-type-x-1d0458d81b174356717b00e4b0b273b5 + +info: + name: > + Product Catalog Simple <= 1.5.13 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36e098fe-d1f9-4c8f-ae6b-222cbd5976b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-type-x/" + google-query: inurl:"/wp-content/plugins/post-type-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-type-x,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-type-x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-type-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-type-x-26b80bc80cde32f0f361f2fadc6529c9.yaml b/nuclei-templates/cve-less/plugins/post-type-x-26b80bc80cde32f0f361f2fadc6529c9.yaml new file mode 100644 index 0000000000..cb86732b68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-type-x-26b80bc80cde32f0f361f2fadc6529c9.yaml @@ -0,0 +1,58 @@ +id: post-type-x-26b80bc80cde32f0f361f2fadc6529c9 + +info: + name: > + Product Catalog Simple <= 1.7.5 - Cross-Site Request Forgery via ic_system_status + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a134509-8dc0-41ac-9b5c-5b173a1e3c68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-type-x/" + google-query: inurl:"/wp-content/plugins/post-type-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-type-x,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-type-x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-type-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-type-x-965fb6d33351fd23a3e7b31a7c69feff.yaml b/nuclei-templates/cve-less/plugins/post-type-x-965fb6d33351fd23a3e7b31a7c69feff.yaml new file mode 100644 index 0000000000..73ba782561 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-type-x-965fb6d33351fd23a3e7b31a7c69feff.yaml @@ -0,0 +1,58 @@ +id: post-type-x-965fb6d33351fd23a3e7b31a7c69feff + +info: + name: > + Product Catalog Simple <= 1.6.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cd58adb-31cd-49e2-9c9d-e248b4b0a778?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-type-x/" + google-query: inurl:"/wp-content/plugins/post-type-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-type-x,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-type-x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-type-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-type-x-c1d2bd9a1bb88b5b9cb365bbd2698cbe.yaml b/nuclei-templates/cve-less/plugins/post-type-x-c1d2bd9a1bb88b5b9cb365bbd2698cbe.yaml new file mode 100644 index 0000000000..33c707fc44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-type-x-c1d2bd9a1bb88b5b9cb365bbd2698cbe.yaml @@ -0,0 +1,58 @@ +id: post-type-x-c1d2bd9a1bb88b5b9cb365bbd2698cbe + +info: + name: > + Product Catalog Simple <= 1.7.6 - Sensitive Information Exposure via Product CSV + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f4099b3-6c79-42c2-be41-4ad8d73cc2b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-type-x/" + google-query: inurl:"/wp-content/plugins/post-type-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-type-x,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-type-x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-type-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-views-741838efe1987dc0902314663618d34f.yaml b/nuclei-templates/cve-less/plugins/post-views-741838efe1987dc0902314663618d34f.yaml new file mode 100644 index 0000000000..77ea98bafe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-views-741838efe1987dc0902314663618d34f.yaml @@ -0,0 +1,58 @@ +id: post-views-741838efe1987dc0902314663618d34f + +info: + name: > + Post Views <= 2.6.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f618911f-fd03-41ec-a0e1-dba4aa7178ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-views/" + google-query: inurl:"/wp-content/plugins/post-views/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-views,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-views/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-views" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-views-counter-71955a966b82cf2219c81131b80c408e.yaml b/nuclei-templates/cve-less/plugins/post-views-counter-71955a966b82cf2219c81131b80c408e.yaml new file mode 100644 index 0000000000..c098589ea2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-views-counter-71955a966b82cf2219c81131b80c408e.yaml @@ -0,0 +1,58 @@ +id: post-views-counter-71955a966b82cf2219c81131b80c408e + +info: + name: > + Post Views Counter <= 1.3.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e76c4b3-af77-4c02-a923-f04a360fa6e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-views-counter/" + google-query: inurl:"/wp-content/plugins/post-views-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-views-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-views-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-views-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-views-counter-f4088a6dda890a2dfcb23a5a06369d61.yaml b/nuclei-templates/cve-less/plugins/post-views-counter-f4088a6dda890a2dfcb23a5a06369d61.yaml new file mode 100644 index 0000000000..c569ac11f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-views-counter-f4088a6dda890a2dfcb23a5a06369d61.yaml @@ -0,0 +1,58 @@ +id: post-views-counter-f4088a6dda890a2dfcb23a5a06369d61 + +info: + name: > + Post Views Counter <= 1.4.4 - Cross-Site Request Forgery via save_bulk_post_views() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cee1253-52e5-4676-8a7a-ac71df0786ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-views-counter/" + google-query: inurl:"/wp-content/plugins/post-views-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-views-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-views-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-views-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/post-views-stats-1e717f9147d850249e106a439e5cf9f6.yaml b/nuclei-templates/cve-less/plugins/post-views-stats-1e717f9147d850249e106a439e5cf9f6.yaml new file mode 100644 index 0000000000..0fd4c2e6d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/post-views-stats-1e717f9147d850249e106a439e5cf9f6.yaml @@ -0,0 +1,58 @@ +id: post-views-stats-1e717f9147d850249e106a439e5cf9f6 + +info: + name: > + Post views Stats <= 1.3 - Reflected Cross-Site Scripting via from and to + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31eb7dd4-3bd1-41e8-875a-e40a7f16296d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/post-views-stats/" + google-query: inurl:"/wp-content/plugins/post-views-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,post-views-stats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/post-views-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "post-views-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postaffiliatepro-107104bc14e921090e757f0c5c64d34d.yaml b/nuclei-templates/cve-less/plugins/postaffiliatepro-107104bc14e921090e757f0c5c64d34d.yaml new file mode 100644 index 0000000000..c28c543b4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postaffiliatepro-107104bc14e921090e757f0c5c64d34d.yaml @@ -0,0 +1,58 @@ +id: postaffiliatepro-107104bc14e921090e757f0c5c64d34d + +info: + name: > + Post Affiliate Pro <= 1.24.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8db8adba-347f-4bdc-8215-23b6f8eb0327?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postaffiliatepro/" + google-query: inurl:"/wp-content/plugins/postaffiliatepro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postaffiliatepro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postaffiliatepro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postaffiliatepro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postcode-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/postcode-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d81856332c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postcode-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: postcode-redirect-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postcode-redirect/" + google-query: inurl:"/wp-content/plugins/postcode-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postcode-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postcode-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postcode-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postie-2555356e703532b9bbe5578b47fffbdf.yaml b/nuclei-templates/cve-less/plugins/postie-2555356e703532b9bbe5578b47fffbdf.yaml new file mode 100644 index 0000000000..8045ac3e8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postie-2555356e703532b9bbe5578b47fffbdf.yaml @@ -0,0 +1,58 @@ +id: postie-2555356e703532b9bbe5578b47fffbdf + +info: + name: > + Postie < 1.4.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67176209-443c-4f66-b5a8-1dde2f7f0837?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postie/" + google-query: inurl:"/wp-content/plugins/postie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postie,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postie/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postie-6f78bc0495c69824a3ef08a95ff8b518.yaml b/nuclei-templates/cve-less/plugins/postie-6f78bc0495c69824a3ef08a95ff8b518.yaml new file mode 100644 index 0000000000..4fbcd0ac1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postie-6f78bc0495c69824a3ef08a95ff8b518.yaml @@ -0,0 +1,58 @@ +id: postie-6f78bc0495c69824a3ef08a95ff8b518 + +info: + name: > + Postie <= 1.9.40 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9545264-0434-4976-b94e-4e520e5ae9c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postie/" + google-query: inurl:"/wp-content/plugins/postie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postie,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postie/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postie-727d4fbf362548e62940ac117a3d3c3a.yaml b/nuclei-templates/cve-less/plugins/postie-727d4fbf362548e62940ac117a3d3c3a.yaml new file mode 100644 index 0000000000..e2e5dac33d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postie-727d4fbf362548e62940ac117a3d3c3a.yaml @@ -0,0 +1,58 @@ +id: postie-727d4fbf362548e62940ac117a3d3c3a + +info: + name: > + Postie <= 1.9.40 - Post Submission Spoofing & Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57a5b6d9-92dc-488a-a3f2-b3c09361aefe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postie/" + google-query: inurl:"/wp-content/plugins/postie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postie,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postie/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postmagthemes-demo-import-4f73853f1fed7601f5de786bcd020099.yaml b/nuclei-templates/cve-less/plugins/postmagthemes-demo-import-4f73853f1fed7601f5de786bcd020099.yaml new file mode 100644 index 0000000000..0d88541f49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postmagthemes-demo-import-4f73853f1fed7601f5de786bcd020099.yaml @@ -0,0 +1,58 @@ +id: postmagthemes-demo-import-4f73853f1fed7601f5de786bcd020099 + +info: + name: > + PostmagThemes Demo Import <= 1.0.9 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca1fd2f3-7f3a-4227-b013-95e4ec59fce4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postmagthemes-demo-import/" + google-query: inurl:"/wp-content/plugins/postmagthemes-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postmagthemes-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postmagthemes-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postmagthemes-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postmagthemes-demo-import-9efe0fb93db4e83b6512c73eb733e094.yaml b/nuclei-templates/cve-less/plugins/postmagthemes-demo-import-9efe0fb93db4e83b6512c73eb733e094.yaml new file mode 100644 index 0000000000..4cb0e121ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postmagthemes-demo-import-9efe0fb93db4e83b6512c73eb733e094.yaml @@ -0,0 +1,58 @@ +id: postmagthemes-demo-import-9efe0fb93db4e83b6512c73eb733e094 + +info: + name: > + PostmagThemes Demo Import <= 1.0.6 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bf0267d-b84f-4ad2-8bb3-cc2aa4996af1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postmagthemes-demo-import/" + google-query: inurl:"/wp-content/plugins/postmagthemes-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postmagthemes-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postmagthemes-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postmagthemes-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postman-smtp-afe901ac8a088fbc034c09cb75a2f817.yaml b/nuclei-templates/cve-less/plugins/postman-smtp-afe901ac8a088fbc034c09cb75a2f817.yaml new file mode 100644 index 0000000000..c3128dfbe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postman-smtp-afe901ac8a088fbc034c09cb75a2f817.yaml @@ -0,0 +1,58 @@ +id: postman-smtp-afe901ac8a088fbc034c09cb75a2f817 + +info: + name: > + Postman SMTP <= 1.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b0df7f4-d916-414a-8d03-941aab06a001?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postman-smtp/" + google-query: inurl:"/wp-content/plugins/postman-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postman-smtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postman-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postman-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postmash-4be4ac2753725fa5dd456a071085e7cc.yaml b/nuclei-templates/cve-less/plugins/postmash-4be4ac2753725fa5dd456a071085e7cc.yaml new file mode 100644 index 0000000000..4a0cf02c41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postmash-4be4ac2753725fa5dd456a071085e7cc.yaml @@ -0,0 +1,58 @@ +id: postmash-4be4ac2753725fa5dd456a071085e7cc + +info: + name: > + postMash – custom post order <= 1.2.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cab1bef-c8c5-45ee-921e-0d01736e74c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postmash/" + google-query: inurl:"/wp-content/plugins/postmash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postmash,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postmash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postmash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postmash-858a26ea9a23abdcedc5d015a7d5aad8.yaml b/nuclei-templates/cve-less/plugins/postmash-858a26ea9a23abdcedc5d015a7d5aad8.yaml new file mode 100644 index 0000000000..914d65a688 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postmash-858a26ea9a23abdcedc5d015a7d5aad8.yaml @@ -0,0 +1,58 @@ +id: postmash-858a26ea9a23abdcedc5d015a7d5aad8 + +info: + name: > + postMash – custom post order <= 1.2.0 - Reflected Cross-Site Scripting via m + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f219b6ea-58b9-455e-a99d-8412661c8e39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postmash/" + google-query: inurl:"/wp-content/plugins/postmash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postmash,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postmash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postmash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postmatic-364140ec5050587d4743f8ad888c8004.yaml b/nuclei-templates/cve-less/plugins/postmatic-364140ec5050587d4743f8ad888c8004.yaml new file mode 100644 index 0000000000..fc88b0897e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postmatic-364140ec5050587d4743f8ad888c8004.yaml @@ -0,0 +1,58 @@ +id: postmatic-364140ec5050587d4743f8ad888c8004 + +info: + name: > + Replyable – Subscribe to Comments and Reply by Email < 1.4.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9a3d3c3-278b-46c7-87d0-53528d616951?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postmatic/" + google-query: inurl:"/wp-content/plugins/postmatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postmatic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postmatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postmatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postmatic-77c6557ed6d5a269f424f3a44bdb8307.yaml b/nuclei-templates/cve-less/plugins/postmatic-77c6557ed6d5a269f424f3a44bdb8307.yaml new file mode 100644 index 0000000000..509d1f42cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postmatic-77c6557ed6d5a269f424f3a44bdb8307.yaml @@ -0,0 +1,58 @@ +id: postmatic-77c6557ed6d5a269f424f3a44bdb8307 + +info: + name: > + Replyable – Subscribe to Comments and Reply by Email <= 2.2.9 - Authenticated (Subscriber+) PHP Object Injection via prompt_dismiss_notice + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1105dc3-222f-46a5-a9b1-74c11923f886?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postmatic/" + google-query: inurl:"/wp-content/plugins/postmatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postmatic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postmatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postmatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/postmatic-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/postmatic-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a6b55eaed6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/postmatic-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: postmatic-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/postmatic/" + google-query: inurl:"/wp-content/plugins/postmatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,postmatic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/postmatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "postmatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/posts-and-users-stats-d94e06192974b1fb1b08b2e10b17630f.yaml b/nuclei-templates/cve-less/plugins/posts-and-users-stats-d94e06192974b1fb1b08b2e10b17630f.yaml new file mode 100644 index 0000000000..9a5a44633d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/posts-and-users-stats-d94e06192974b1fb1b08b2e10b17630f.yaml @@ -0,0 +1,58 @@ +id: posts-and-users-stats-d94e06192974b1fb1b08b2e10b17630f + +info: + name: > + Posts and Users Stats <= 1.1.3 - Authenticated (Subscriber+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/766c2aa5-e829-45b9-b6e3-0a522a0977d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/posts-and-users-stats/" + google-query: inurl:"/wp-content/plugins/posts-and-users-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,posts-and-users-stats,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/posts-and-users-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "posts-and-users-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/posts-in-page-4146040381375fe3470534dfb0d8c368.yaml b/nuclei-templates/cve-less/plugins/posts-in-page-4146040381375fe3470534dfb0d8c368.yaml new file mode 100644 index 0000000000..2122ebe2fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/posts-in-page-4146040381375fe3470534dfb0d8c368.yaml @@ -0,0 +1,58 @@ +id: posts-in-page-4146040381375fe3470534dfb0d8c368 + +info: + name: > + Posts in Page <= 1.2.4 - Authenticated Directory Traversal leading to Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a806bc8-cff4-47ff-a295-82520c9079e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/posts-in-page/" + google-query: inurl:"/wp-content/plugins/posts-in-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,posts-in-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/posts-in-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "posts-in-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/posts-like-dislike-a6ade812b7794f2ce71092e01b3f3441.yaml b/nuclei-templates/cve-less/plugins/posts-like-dislike-a6ade812b7794f2ce71092e01b3f3441.yaml new file mode 100644 index 0000000000..55764d1740 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/posts-like-dislike-a6ade812b7794f2ce71092e01b3f3441.yaml @@ -0,0 +1,58 @@ +id: posts-like-dislike-a6ade812b7794f2ce71092e01b3f3441 + +info: + name: > + Posts Like Dislike <= 1.1.1 - Missing Authorization to Authenticated (Subscriber+) Plugin Setting Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8babc42a-c45c-423f-bd09-da7afb947691?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/posts-like-dislike/" + google-query: inurl:"/wp-content/plugins/posts-like-dislike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,posts-like-dislike,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/posts-like-dislike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "posts-like-dislike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/posts-table-filterable-4d368f69e27c2436f2d59ef62ab42c49.yaml b/nuclei-templates/cve-less/plugins/posts-table-filterable-4d368f69e27c2436f2d59ef62ab42c49.yaml new file mode 100644 index 0000000000..c7c08ac342 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/posts-table-filterable-4d368f69e27c2436f2d59ef62ab42c49.yaml @@ -0,0 +1,58 @@ +id: posts-table-filterable-4d368f69e27c2436f2d59ef62ab42c49 + +info: + name: > + TableOn – WordPress Posts Table Filterable <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d60f69f1-eaea-49cb-bbe3-281ec4f872f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/posts-table-filterable/" + google-query: inurl:"/wp-content/plugins/posts-table-filterable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,posts-table-filterable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/posts-table-filterable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "posts-table-filterable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/posts-to-page-f4bf91007a25d09c25ce2d7dd70ab2fa.yaml b/nuclei-templates/cve-less/plugins/posts-to-page-f4bf91007a25d09c25ce2d7dd70ab2fa.yaml new file mode 100644 index 0000000000..dee0755a9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/posts-to-page-f4bf91007a25d09c25ce2d7dd70ab2fa.yaml @@ -0,0 +1,58 @@ +id: posts-to-page-f4bf91007a25d09c25ce2d7dd70ab2fa + +info: + name: > + Posts to Page <= 1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e5fdaae-3ef2-477e-b79b-0b6e415edb40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/posts-to-page/" + google-query: inurl:"/wp-content/plugins/posts-to-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,posts-to-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/posts-to-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "posts-to-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/posttabs-03debccd2847f0f3861af391ac774ecf.yaml b/nuclei-templates/cve-less/plugins/posttabs-03debccd2847f0f3861af391ac774ecf.yaml new file mode 100644 index 0000000000..cd73dd8bb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/posttabs-03debccd2847f0f3861af391ac774ecf.yaml @@ -0,0 +1,58 @@ +id: posttabs-03debccd2847f0f3861af391ac774ecf + +info: + name: > + postTabs <= 2.10.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f908837d-2bba-45db-b005-f685a33cd71e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/posttabs/" + google-query: inurl:"/wp-content/plugins/posttabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,posttabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/posttabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "posttabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/power-ups-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/power-ups-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a4be806314 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/power-ups-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: power-ups-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/power-ups-for-elementor/" + google-query: inurl:"/wp-content/plugins/power-ups-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,power-ups-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/power-ups-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "power-ups-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/power-zoomer-020f60a4dbeeac1a3b6d4d98194928a4.yaml b/nuclei-templates/cve-less/plugins/power-zoomer-020f60a4dbeeac1a3b6d4d98194928a4.yaml new file mode 100644 index 0000000000..de6b086afb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/power-zoomer-020f60a4dbeeac1a3b6d4d98194928a4.yaml @@ -0,0 +1,58 @@ +id: power-zoomer-020f60a4dbeeac1a3b6d4d98194928a4 + +info: + name: > + Power Zoomer <= 1.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6a0811e-f02b-49d1-915e-cf7ac4b5e1f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/power-zoomer/" + google-query: inurl:"/wp-content/plugins/power-zoomer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,power-zoomer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/power-zoomer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "power-zoomer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/power-zoomer-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/power-zoomer-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..84fca40332 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/power-zoomer-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: power-zoomer-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/power-zoomer/" + google-query: inurl:"/wp-content/plugins/power-zoomer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,power-zoomer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/power-zoomer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "power-zoomer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerkit-0af70d46a8f7d1d575b47f6ceaa9d723.yaml b/nuclei-templates/cve-less/plugins/powerkit-0af70d46a8f7d1d575b47f6ceaa9d723.yaml new file mode 100644 index 0000000000..3df91ebe43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerkit-0af70d46a8f7d1d575b47f6ceaa9d723.yaml @@ -0,0 +1,58 @@ +id: powerkit-0af70d46a8f7d1d575b47f6ceaa9d723 + +info: + name: > + Powerkit < 2.5.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce779d08-93bf-4634-bb83-f5573876e086?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerkit/" + google-query: inurl:"/wp-content/plugins/powerkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerkit-54dc33c4a20161d9ec4e865b2de44997.yaml b/nuclei-templates/cve-less/plugins/powerkit-54dc33c4a20161d9ec4e865b2de44997.yaml new file mode 100644 index 0000000000..e5f54516e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerkit-54dc33c4a20161d9ec4e865b2de44997.yaml @@ -0,0 +1,58 @@ +id: powerkit-54dc33c4a20161d9ec4e865b2de44997 + +info: + name: > + Powerkit – Supercharge your WordPress Site <= 2.9.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efb816e4-c07f-4e72-bfd3-06d83ed4d642?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerkit/" + google-query: inurl:"/wp-content/plugins/powerkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-addon-for-beaver-builder-97dd2eef8600f91fddf3cdf090566811.yaml b/nuclei-templates/cve-less/plugins/powerpack-addon-for-beaver-builder-97dd2eef8600f91fddf3cdf090566811.yaml new file mode 100644 index 0000000000..9e00d24a2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-addon-for-beaver-builder-97dd2eef8600f91fddf3cdf090566811.yaml @@ -0,0 +1,58 @@ +id: powerpack-addon-for-beaver-builder-97dd2eef8600f91fddf3cdf090566811 + +info: + name: > + PowerPack Lite for Beaver Builder <= 1.3.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via element link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a22c7b45-752c-482d-8812-888d5bc3d630?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-addon-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/powerpack-addon-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-addon-for-beaver-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-addon-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-addon-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-addon-for-beaver-builder-e22d00de70da89c7d78c2d123c0c7293.yaml b/nuclei-templates/cve-less/plugins/powerpack-addon-for-beaver-builder-e22d00de70da89c7d78c2d123c0c7293.yaml new file mode 100644 index 0000000000..ef0013bc58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-addon-for-beaver-builder-e22d00de70da89c7d78c2d123c0c7293.yaml @@ -0,0 +1,58 @@ +id: powerpack-addon-for-beaver-builder-e22d00de70da89c7d78c2d123c0c7293 + +info: + name: > + PowerPack Lite for Beaver Builder <= 1.2.9.2 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d992a9cf-f24c-4c82-a56b-22394524ba3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-addon-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/powerpack-addon-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-addon-for-beaver-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-addon-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-addon-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-elements-32838841eaf8293770fe8af6d9dab7cc.yaml b/nuclei-templates/cve-less/plugins/powerpack-elements-32838841eaf8293770fe8af6d9dab7cc.yaml new file mode 100644 index 0000000000..8cc674f44b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-elements-32838841eaf8293770fe8af6d9dab7cc.yaml @@ -0,0 +1,58 @@ +id: powerpack-elements-32838841eaf8293770fe8af6d9dab7cc + +info: + name: > + PowerPack Pro for Elementor <= 2.10.6 - Missing Authorization to Settings Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/883e1f3c-7e47-4522-ae8c-a9a6b4160be2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-elements/" + google-query: inurl:"/wp-content/plugins/powerpack-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-elements-89d7a5b57e6d3259874bdbb477d35f08.yaml b/nuclei-templates/cve-less/plugins/powerpack-elements-89d7a5b57e6d3259874bdbb477d35f08.yaml new file mode 100644 index 0000000000..c35911610b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-elements-89d7a5b57e6d3259874bdbb477d35f08.yaml @@ -0,0 +1,58 @@ +id: powerpack-elements-89d7a5b57e6d3259874bdbb477d35f08 + +info: + name: > + PowerPack Pro for Elementor <= 2.9.23 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2feabc97-0463-4e50-91a8-234445ca2504?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-elements/" + google-query: inurl:"/wp-content/plugins/powerpack-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-elements-910629dfad061ef1cd89c571481e8f0a.yaml b/nuclei-templates/cve-less/plugins/powerpack-elements-910629dfad061ef1cd89c571481e8f0a.yaml new file mode 100644 index 0000000000..6a5a275614 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-elements-910629dfad061ef1cd89c571481e8f0a.yaml @@ -0,0 +1,58 @@ +id: powerpack-elements-910629dfad061ef1cd89c571481e8f0a + +info: + name: > + PowerPack Pro for Elementor < 2.10.8 - Cross-Site Request Forgery to Plugin Settings Modification and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e68bbee2-1c1a-4751-988e-dde423f8aab3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-elements/" + google-query: inurl:"/wp-content/plugins/powerpack-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-1e3008e9a413fca6d1323b62a2743a7d.yaml b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-1e3008e9a413fca6d1323b62a2743a7d.yaml new file mode 100644 index 0000000000..6b19cddc82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-1e3008e9a413fca6d1323b62a2743a7d.yaml @@ -0,0 +1,58 @@ +id: powerpack-lite-for-elementor-1e3008e9a413fca6d1323b62a2743a7d + +info: + name: > + PowerPack Addons for Elementor <= 2.7.18 - Authenticated (Contributor+) Stored Cross-Site Scripting via Twitter Tweet Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11386b6a-632c-451a-b726-846f74b6f42d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-lite-for-elementor/" + google-query: inurl:"/wp-content/plugins/powerpack-lite-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-lite-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-lite-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-328a1085ce78b77ac077833dbb3621ab.yaml b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-328a1085ce78b77ac077833dbb3621ab.yaml new file mode 100644 index 0000000000..3e13d07be3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-328a1085ce78b77ac077833dbb3621ab.yaml @@ -0,0 +1,58 @@ +id: powerpack-lite-for-elementor-328a1085ce78b77ac077833dbb3621ab + +info: + name: > + PowerPack Addons for Elementor <= 2.7.15 - Authenticated (Contributor+) Stored Cross-Site Scripting via Twitter Buttons Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64480862-c076-4ea9-a03b-9aed81f876d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-lite-for-elementor/" + google-query: inurl:"/wp-content/plugins/powerpack-lite-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-lite-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-lite-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-6a1e6967396b1126582c6ee0a5fede17.yaml b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-6a1e6967396b1126582c6ee0a5fede17.yaml new file mode 100644 index 0000000000..a82cc9e5e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-6a1e6967396b1126582c6ee0a5fede17.yaml @@ -0,0 +1,58 @@ +id: powerpack-lite-for-elementor-6a1e6967396b1126582c6ee0a5fede17 + +info: + name: > + PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) <= 2.7.14 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/036cf299-80c2-48a8-befc-02899ab96e3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-lite-for-elementor/" + google-query: inurl:"/wp-content/plugins/powerpack-lite-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-lite-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-lite-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-7cdc1189a823c084ca0c2c88ab1e4c6a.yaml b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-7cdc1189a823c084ca0c2c88ab1e4c6a.yaml new file mode 100644 index 0000000000..8c750e4fc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-7cdc1189a823c084ca0c2c88ab1e4c6a.yaml @@ -0,0 +1,58 @@ +id: powerpack-lite-for-elementor-7cdc1189a823c084ca0c2c88ab1e4c6a + +info: + name: > + PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) <= 2.7.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe2cfc96-63f4-4e4b-bf49-6031594a4805?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-lite-for-elementor/" + google-query: inurl:"/wp-content/plugins/powerpack-lite-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-lite-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-lite-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-b041552e80a8d76e86ae11341bcea94f.yaml b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-b041552e80a8d76e86ae11341bcea94f.yaml new file mode 100644 index 0000000000..d70e562119 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-b041552e80a8d76e86ae11341bcea94f.yaml @@ -0,0 +1,58 @@ +id: powerpack-lite-for-elementor-b041552e80a8d76e86ae11341bcea94f + +info: + name: > + PowerPack Addons for Elementor <= 2.7.17 - Authenticated (Contributor+) Stored Cross-Site Scripting via *_html_tag* + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22c4b981-6135-4c44-aa68-f0d51704a68c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-lite-for-elementor/" + google-query: inurl:"/wp-content/plugins/powerpack-lite-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-lite-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-lite-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-bc9d2ff303507ede4dc68917dcd5ae6c.yaml b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-bc9d2ff303507ede4dc68917dcd5ae6c.yaml new file mode 100644 index 0000000000..5e510ac45b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-bc9d2ff303507ede4dc68917dcd5ae6c.yaml @@ -0,0 +1,58 @@ +id: powerpack-lite-for-elementor-bc9d2ff303507ede4dc68917dcd5ae6c + +info: + name: > + PowerPack Addons for Elementor <= 2.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22fd58a6-2bcb-4190-8440-a7df7848ad9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-lite-for-elementor/" + google-query: inurl:"/wp-content/plugins/powerpack-lite-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-lite-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-lite-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-e94aceaf63920aa3eb4b9932eb00b35a.yaml b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-e94aceaf63920aa3eb4b9932eb00b35a.yaml new file mode 100644 index 0000000000..37b35b04e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpack-lite-for-elementor-e94aceaf63920aa3eb4b9932eb00b35a.yaml @@ -0,0 +1,58 @@ +id: powerpack-lite-for-elementor-e94aceaf63920aa3eb4b9932eb00b35a + +info: + name: > + PowerPack Addons for Elementor <= 2.3.1 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/609d9ecf-4f91-4a78-ad8c-22e436c000ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpack-lite-for-elementor/" + google-query: inurl:"/wp-content/plugins/powerpack-lite-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpack-lite-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpack-lite-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpress-09573bbd55ffbde9d233ad38438e8f66.yaml b/nuclei-templates/cve-less/plugins/powerpress-09573bbd55ffbde9d233ad38438e8f66.yaml new file mode 100644 index 0000000000..d88ed7008b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpress-09573bbd55ffbde9d233ad38438e8f66.yaml @@ -0,0 +1,58 @@ +id: powerpress-09573bbd55ffbde9d233ad38438e8f66 + +info: + name: > + PowerPress <= 11.0.6 - Authenticated (Contributor+) Server-Side Request Forgery via wp_ajax_powerpress_media_info + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/031c31b2-6e27-47bb-9f63-2bbaa1edbbb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpress-2a2fe738939a9e67d5cb46ca54ca2af9.yaml b/nuclei-templates/cve-less/plugins/powerpress-2a2fe738939a9e67d5cb46ca54ca2af9.yaml new file mode 100644 index 0000000000..b061d21e72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpress-2a2fe738939a9e67d5cb46ca54ca2af9.yaml @@ -0,0 +1,58 @@ +id: powerpress-2a2fe738939a9e67d5cb46ca54ca2af9 + +info: + name: > + PowerPress <= 8.3.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc987edf-5a68-4baf-947c-e623c85ec659?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpress-307c020a7d3d97fddb5823725bc2bdc1.yaml b/nuclei-templates/cve-less/plugins/powerpress-307c020a7d3d97fddb5823725bc2bdc1.yaml new file mode 100644 index 0000000000..2570f3b644 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpress-307c020a7d3d97fddb5823725bc2bdc1.yaml @@ -0,0 +1,58 @@ +id: powerpress-307c020a7d3d97fddb5823725bc2bdc1 + +info: + name: > + PowerPress <= 10.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'Feed[title]' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64371d43-3acd-4863-80e4-deab071777b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpress-86221a41117bb12070fda480ca17a28c.yaml b/nuclei-templates/cve-less/plugins/powerpress-86221a41117bb12070fda480ca17a28c.yaml new file mode 100644 index 0000000000..288f65a07a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpress-86221a41117bb12070fda480ca17a28c.yaml @@ -0,0 +1,58 @@ +id: powerpress-86221a41117bb12070fda480ca17a28c + +info: + name: > + PowerPress <= 6.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5820352-a271-43c6-950d-815402241362?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpress-bb853e4203fd77e0eccd7981cc19970b.yaml b/nuclei-templates/cve-less/plugins/powerpress-bb853e4203fd77e0eccd7981cc19970b.yaml new file mode 100644 index 0000000000..a17aff585e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpress-bb853e4203fd77e0eccd7981cc19970b.yaml @@ -0,0 +1,58 @@ +id: powerpress-bb853e4203fd77e0eccd7981cc19970b + +info: + name: > + PowerPress <= 10.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c40c28f-554f-42d0-9f6d-a899d8f61519?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpress-d2b59825f91765366d354ae0bca502ca.yaml b/nuclei-templates/cve-less/plugins/powerpress-d2b59825f91765366d354ae0bca502ca.yaml new file mode 100644 index 0000000000..ce4e956e01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpress-d2b59825f91765366d354ae0bca502ca.yaml @@ -0,0 +1,58 @@ +id: powerpress-d2b59825f91765366d354ae0bca502ca + +info: + name: > + PowerPress <= 10.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44583cb7-bc32-4e62-8431-f5f1f6baeff2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpress-d401832f82eae4d4b25c6742ae7df7ee.yaml b/nuclei-templates/cve-less/plugins/powerpress-d401832f82eae4d4b25c6742ae7df7ee.yaml new file mode 100644 index 0000000000..6ae9a169c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpress-d401832f82eae4d4b25c6742ae7df7ee.yaml @@ -0,0 +1,58 @@ +id: powerpress-d401832f82eae4d4b25c6742ae7df7ee + +info: + name: > + PowerPress <= 6.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00c022a9-2062-4e99-8911-8cfad929a783?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powerpress-e8a960f3022a61734bef50d7f60e4d17.yaml b/nuclei-templates/cve-less/plugins/powerpress-e8a960f3022a61734bef50d7f60e4d17.yaml new file mode 100644 index 0000000000..5a32bc35fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powerpress-e8a960f3022a61734bef50d7f60e4d17.yaml @@ -0,0 +1,58 @@ +id: powerpress-e8a960f3022a61734bef50d7f60e4d17 + +info: + name: > + PowerPress <= 11.0.11 - Authenticated(Contributor+) Stored Cross-Site Scripting via Media URL + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8c888e-46ed-468f-a5d5-74a7f9d01a36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powies-whois-5aab035ef042ccd7141d869c2750d5bc.yaml b/nuclei-templates/cve-less/plugins/powies-whois-5aab035ef042ccd7141d869c2750d5bc.yaml new file mode 100644 index 0000000000..ae497bca5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powies-whois-5aab035ef042ccd7141d869c2750d5bc.yaml @@ -0,0 +1,58 @@ +id: powies-whois-5aab035ef042ccd7141d869c2750d5bc + +info: + name: > + Power's WHOIS Domain Check <= 0.9.31 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b1568d6-4fea-4ed3-9931-f293932eaa3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powies-whois/" + google-query: inurl:"/wp-content/plugins/powies-whois/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powies-whois,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powies-whois/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powies-whois" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powr-pack-788f2a7e634374198c6c99e174e2830a.yaml b/nuclei-templates/cve-less/plugins/powr-pack-788f2a7e634374198c6c99e174e2830a.yaml new file mode 100644 index 0000000000..fc788dbe2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powr-pack-788f2a7e634374198c6c99e174e2830a.yaml @@ -0,0 +1,58 @@ +id: powr-pack-788f2a7e634374198c6c99e174e2830a + +info: + name: > + Powr Pack <= 2.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e67ce3b-144f-4ce1-b658-47d865312c6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powr-pack/" + google-query: inurl:"/wp-content/plugins/powr-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powr-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powr-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powr-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/powr-pack-eda45ed9fd55d54d8bc8631b38650581.yaml b/nuclei-templates/cve-less/plugins/powr-pack-eda45ed9fd55d54d8bc8631b38650581.yaml new file mode 100644 index 0000000000..126684be63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/powr-pack-eda45ed9fd55d54d8bc8631b38650581.yaml @@ -0,0 +1,58 @@ +id: powr-pack-eda45ed9fd55d54d8bc8631b38650581 + +info: + name: > + POWR <= 2.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2967eae-82bb-4556-a21a-c5bb6b905c62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powr-pack/" + google-query: inurl:"/wp-content/plugins/powr-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powr-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powr-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powr-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ppc-fraud-detctor-b4d07a0d8ae8c6f01f34243674170720.yaml b/nuclei-templates/cve-less/plugins/ppc-fraud-detctor-b4d07a0d8ae8c6f01f34243674170720.yaml new file mode 100644 index 0000000000..4a0fe934bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ppc-fraud-detctor-b4d07a0d8ae8c6f01f34243674170720.yaml @@ -0,0 +1,58 @@ +id: ppc-fraud-detctor-b4d07a0d8ae8c6f01f34243674170720 + +info: + name: > + PPC Tracker WordPress <= 2.0 - Stored Cross-Site Scripting via IP + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c27c27-f597-4867-a8d8-a83a3a1bf5f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ppc-fraud-detctor/" + google-query: inurl:"/wp-content/plugins/ppc-fraud-detctor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ppc-fraud-detctor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ppc-fraud-detctor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ppc-fraud-detctor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prdctfltr-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/prdctfltr-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..61b4c12abe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prdctfltr-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: prdctfltr-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prdctfltr/" + google-query: inurl:"/wp-content/plugins/prdctfltr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prdctfltr,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prdctfltr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prdctfltr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pre-orders-for-woocommerce-f8654e70b61d2e52e5f038a5f0414371.yaml b/nuclei-templates/cve-less/plugins/pre-orders-for-woocommerce-f8654e70b61d2e52e5f038a5f0414371.yaml new file mode 100644 index 0000000000..ffdba985e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pre-orders-for-woocommerce-f8654e70b61d2e52e5f038a5f0414371.yaml @@ -0,0 +1,58 @@ +id: pre-orders-for-woocommerce-f8654e70b61d2e52e5f038a5f0414371 + +info: + name: > + Pre-Orders for WooCommerce <= 1.2.13 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb2776d8-1e2f-46fb-9d3b-693c8fa115b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pre-orders-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/pre-orders-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pre-orders-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pre-orders-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pre-orders-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pre-party-browser-hints-c47827133b1c48070f46a59d37c27728.yaml b/nuclei-templates/cve-less/plugins/pre-party-browser-hints-c47827133b1c48070f46a59d37c27728.yaml new file mode 100644 index 0000000000..391003d0b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pre-party-browser-hints-c47827133b1c48070f46a59d37c27728.yaml @@ -0,0 +1,58 @@ +id: pre-party-browser-hints-c47827133b1c48070f46a59d37c27728 + +info: + name: > + Pre* Party Resource Hints < 1.8.19 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c043945-d327-4f26-98b4-99ac5b4761f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pre-party-browser-hints/" + google-query: inurl:"/wp-content/plugins/pre-party-browser-hints/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pre-party-browser-hints,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pre-party-browser-hints/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pre-party-browser-hints" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pre-publish-checklist-d84e75d6c9c8d0a3d0da84beaba7027f.yaml b/nuclei-templates/cve-less/plugins/pre-publish-checklist-d84e75d6c9c8d0a3d0da84beaba7027f.yaml new file mode 100644 index 0000000000..e74a91236c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pre-publish-checklist-d84e75d6c9c8d0a3d0da84beaba7027f.yaml @@ -0,0 +1,58 @@ +id: pre-publish-checklist-d84e75d6c9c8d0a3d0da84beaba7027f + +info: + name: > + Pre-Publish Checklist <= 1.1.1 - Insecure Direct Object Reference to Arbitrary Post '_ppc_meta_key' Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e00a06c-9623-48e0-b212-20a2f1e7e640?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pre-publish-checklist/" + google-query: inurl:"/wp-content/plugins/pre-publish-checklist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pre-publish-checklist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pre-publish-checklist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pre-publish-checklist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/predictive-search-6b177b37379772051433776316566ccd.yaml b/nuclei-templates/cve-less/plugins/predictive-search-6b177b37379772051433776316566ccd.yaml new file mode 100644 index 0000000000..1a95812868 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/predictive-search-6b177b37379772051433776316566ccd.yaml @@ -0,0 +1,58 @@ +id: predictive-search-6b177b37379772051433776316566ccd + +info: + name: > + Predictive Search <= 1.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/340e98bf-6484-4634-b2f8-e02f14de67de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/predictive-search/" + google-query: inurl:"/wp-content/plugins/predictive-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,predictive-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/predictive-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "predictive-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/predictive-search-a45e2a89638ef475d44955daca9531ef.yaml b/nuclei-templates/cve-less/plugins/predictive-search-a45e2a89638ef475d44955daca9531ef.yaml new file mode 100644 index 0000000000..5c50938ae2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/predictive-search-a45e2a89638ef475d44955daca9531ef.yaml @@ -0,0 +1,58 @@ +id: predictive-search-a45e2a89638ef475d44955daca9531ef + +info: + name: > + Predictive Search <= 1.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d396e90b-c113-4534-8ce3-27bea3bd7296?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/predictive-search/" + google-query: inurl:"/wp-content/plugins/predictive-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,predictive-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/predictive-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "predictive-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/predictive-search-b2c299a9a1dfd6a544071cd299a840b8.yaml b/nuclei-templates/cve-less/plugins/predictive-search-b2c299a9a1dfd6a544071cd299a840b8.yaml new file mode 100644 index 0000000000..82600bf0f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/predictive-search-b2c299a9a1dfd6a544071cd299a840b8.yaml @@ -0,0 +1,58 @@ +id: predictive-search-b2c299a9a1dfd6a544071cd299a840b8 + +info: + name: > + Predictive Search <= 1.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca481a37-8c45-499c-bf68-3af6795af827?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/predictive-search/" + google-query: inurl:"/wp-content/plugins/predictive-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,predictive-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/predictive-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "predictive-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/preloader-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/preloader-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ce66277c3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/preloader-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: preloader-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/preloader-for-divi/" + google-query: inurl:"/wp-content/plugins/preloader-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,preloader-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/preloader-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "preloader-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/preloader-for-website-2c9e7a14e26b36ebcb4ba9bbe208df94.yaml b/nuclei-templates/cve-less/plugins/preloader-for-website-2c9e7a14e26b36ebcb4ba9bbe208df94.yaml new file mode 100644 index 0000000000..ee9ce17046 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/preloader-for-website-2c9e7a14e26b36ebcb4ba9bbe208df94.yaml @@ -0,0 +1,58 @@ +id: preloader-for-website-2c9e7a14e26b36ebcb4ba9bbe208df94 + +info: + name: > + Preloader for Website <= 1.2.2 - Missing Authorization via plwao_register_settings() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cfc38c0-f940-4c4d-ba7b-0d772146ea2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/preloader-for-website/" + google-query: inurl:"/wp-content/plugins/preloader-for-website/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,preloader-for-website,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/preloader-for-website/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "preloader-for-website" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-07fd6d4168c19a2706208ce105fc7279.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-07fd6d4168c19a2706208ce105fc7279.yaml new file mode 100644 index 0000000000..7c13dbfa25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-07fd6d4168c19a2706208ce105fc7279.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-07fd6d4168c19a2706208ce105fc7279 + +info: + name: > + Premium Addons for Elementor <= 4.10.27 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cab56873-f79c-4fd2-8d40-ee4a338cbe8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-17011bf78eb7cb3c3509ef0727f15b97.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-17011bf78eb7cb3c3509ef0727f15b97.yaml new file mode 100644 index 0000000000..881ac1e510 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-17011bf78eb7cb3c3509ef0727f15b97.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-17011bf78eb7cb3c3509ef0727f15b97 + +info: + name: > + Premium Addons for Elementor <= 4.10.30 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51fab95e-336d-4544-8b8e-c4e9002321ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-285480d3186a91d1e0ed6c347ab46652.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-285480d3186a91d1e0ed6c347ab46652.yaml new file mode 100644 index 0000000000..f095f71464 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-285480d3186a91d1e0ed6c347ab46652.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-285480d3186a91d1e0ed6c347ab46652 + +info: + name: > + Premium Addons for Elementor <= 4.10.28 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'arrow_style' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5332275b2ed1bab71594c8fbd6d44f11.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5332275b2ed1bab71594c8fbd6d44f11.yaml new file mode 100644 index 0000000000..6188236b4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5332275b2ed1bab71594c8fbd6d44f11.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-5332275b2ed1bab71594c8fbd6d44f11 + +info: + name: > + Premium Addons for Elementor <= 4.10.21 - Authenticated (Contributor+) Stored Cross-Site Scripting via Banner, Team Members, and Image Scroll Widgets + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e2d0b38-8241-456f-a79b-5d31132b3233?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-53bbdc5768caf77b3864368c8b4ad9d8.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-53bbdc5768caf77b3864368c8b4ad9d8.yaml new file mode 100644 index 0000000000..cb7325be58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-53bbdc5768caf77b3864368c8b4ad9d8.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-53bbdc5768caf77b3864368c8b4ad9d8 + +info: + name: > + Premium Addons for Elementor <= 4.10.18 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1026b753-e82b-4fa3-9023-c36ab9863b29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5830898462cdce464207b0d4b8cd2848.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5830898462cdce464207b0d4b8cd2848.yaml new file mode 100644 index 0000000000..32d5546056 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5830898462cdce464207b0d4b8cd2848.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-5830898462cdce464207b0d4b8cd2848 + +info: + name: > + Premium Addons for Elementor <= 4.10.22 - Authenticated (Contributor+) Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a78fced7-8c8c-4e98-8f06-2eea845cfb26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5f4d629f81f40ae82d44c4c8c94e12ba.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5f4d629f81f40ae82d44c4c8c94e12ba.yaml new file mode 100644 index 0000000000..07bbe9c9d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-5f4d629f81f40ae82d44c4c8c94e12ba.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-5f4d629f81f40ae82d44c4c8c94e12ba + +info: + name: > + Premium Addons for Elementor <= 4.10.24 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccb7e94c-385e-4ce9-acfa-978403047159?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-63b73f38de8e42ff42c365ddf35b05de.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-63b73f38de8e42ff42c365ddf35b05de.yaml new file mode 100644 index 0000000000..94559c9fe8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-63b73f38de8e42ff42c365ddf35b05de.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-63b73f38de8e42ff42c365ddf35b05de + +info: + name: > + Premium Addons for Elementor <= 4.10.18 - Authenticated (Contributor+) Stored Cross-Site Scripting via onClick Events + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61bac919-90be-4fb5-859a-d135e87fe0bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-6be8b4c15f4802607f2237b86373c965.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-6be8b4c15f4802607f2237b86373c965.yaml new file mode 100644 index 0000000000..75fe6b3890 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-6be8b4c15f4802607f2237b86373c965.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-6be8b4c15f4802607f2237b86373c965 + +info: + name: > + Premium Addons for Elementor <= 4.5.1 - Authenticated (Subscriber+) Limited Arbitrary Option Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cffb26bc-3d3f-4593-bb36-d2abcd67861e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-7346b5c5cde69749b42ec0dfced7a750.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-7346b5c5cde69749b42ec0dfced7a750.yaml new file mode 100644 index 0000000000..a7a46de6f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-7346b5c5cde69749b42ec0dfced7a750.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-7346b5c5cde69749b42ec0dfced7a750 + +info: + name: > + Premium Addons for Elementor <= 4.10.16 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7222c7e-939a-4666-9d01-f715d2827954?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-9196735e9e9fe6dd44235b7e0a53bb60.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-9196735e9e9fe6dd44235b7e0a53bb60.yaml new file mode 100644 index 0000000000..12f4417e58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-9196735e9e9fe6dd44235b7e0a53bb60.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-9196735e9e9fe6dd44235b7e0a53bb60 + +info: + name: > + Premium Addons for Elementor <= 4.10.24 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18b2d99a-f55c-4a05-8442-e1fddd59181f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-a48eaf0c735b82aaff5677d4812dc0a7.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-a48eaf0c735b82aaff5677d4812dc0a7.yaml new file mode 100644 index 0000000000..d075cfbdc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-a48eaf0c735b82aaff5677d4812dc0a7.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-a48eaf0c735b82aaff5677d4812dc0a7 + +info: + name: > + Premium Addons for Elementor <= 4.10.28 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4111ba11-ad79-466a-9669-3c35730a331a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-b940c9ab9a01a68eea4a5776ab2199d7.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-b940c9ab9a01a68eea4a5776ab2199d7.yaml new file mode 100644 index 0000000000..aa6888f83a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-b940c9ab9a01a68eea4a5776ab2199d7.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-b940c9ab9a01a68eea4a5776ab2199d7 + +info: + name: > + Premium Addons for Elementor <= 4.10.25 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ce0e587-0312-4484-8f03-c82db67aba44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-c1aa3c18402d6565768dc2655ac439f3.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-c1aa3c18402d6565768dc2655ac439f3.yaml new file mode 100644 index 0000000000..01870c3f48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-c1aa3c18402d6565768dc2655ac439f3.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-c1aa3c18402d6565768dc2655ac439f3 + +info: + name: > + Premium Addons for Elementor <= 4.10.16 - Authenticated(Contributor+) Stored Cross-Site Scripting via Wrapper Link Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f9eb9cb-ead9-4ddf-b40b-a0ce2f4910f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-ca0593eecf48a43d195a057ed533a1b4.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-ca0593eecf48a43d195a057ed533a1b4.yaml new file mode 100644 index 0000000000..8d894edb05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-ca0593eecf48a43d195a057ed533a1b4.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-ca0593eecf48a43d195a057ed533a1b4 + +info: + name: > + Premium Addons for Elementor <=4.2.7 Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e45ac7f-faab-4004-8c1b-b9b68f9dfe4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-d5a4a92d920eb71aaeb7667326f31fb1.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-d5a4a92d920eb71aaeb7667326f31fb1.yaml new file mode 100644 index 0000000000..c827dd3993 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-d5a4a92d920eb71aaeb7667326f31fb1.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-d5a4a92d920eb71aaeb7667326f31fb1 + +info: + name: > + Premium Addons for Elementor <= 4.10.17 - Authenticated(Contributor+) Stored Cross-Site Scripting via Link Wrapper + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22ba0eaf-f514-420a-9680-8126f6dcdde9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-ee8591e5f3f55c96d9835c88a6740c39.yaml b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-ee8591e5f3f55c96d9835c88a6740c39.yaml new file mode 100644 index 0000000000..fcdd70e3b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-for-elementor-ee8591e5f3f55c96d9835c88a6740c39.yaml @@ -0,0 +1,58 @@ +id: premium-addons-for-elementor-ee8591e5f3f55c96d9835c88a6740c39 + +info: + name: > + Premium Addons for Elementor <= 4.10.23 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc057069-15cd-477f-9106-e616e919c62f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-24ae12d6b29ac4b2b659477fd814db52.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-24ae12d6b29ac4b2b659477fd814db52.yaml new file mode 100644 index 0000000000..46386b03e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-24ae12d6b29ac4b2b659477fd814db52.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-24ae12d6b29ac4b2b659477fd814db52 + +info: + name: > + Premium Addons for Elementor PRO <= 2.9.12 - Authenticated(Contributor+) Stored Cross-Site Scripting via widget link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48fa5f3b-000b-406e-b7ee-51af5720cf72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-3bfe779738faac39c2783a057e7fba45.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-3bfe779738faac39c2783a057e7fba45.yaml new file mode 100644 index 0000000000..2bcf6eb527 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-3bfe779738faac39c2783a057e7fba45.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-3bfe779738faac39c2783a057e7fba45 + +info: + name: > + Premium Addons PRO <= 2.9.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Mouse Cursor Module + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82e5fd9f-9a1f-4a4c-ac06-61bf65e3c8ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-3da39631322ead94331d2d8a800a3d3d.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-3da39631322ead94331d2d8a800a3d3d.yaml new file mode 100644 index 0000000000..a88a94942b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-3da39631322ead94331d2d8a800a3d3d.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-3da39631322ead94331d2d8a800a3d3d + +info: + name: > + Premium Addons PRO <= 2.8.24 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9445a54c-06b9-400a-a8ae-a58f1b968196?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-476134bec82a295d4478418acb3a1fc0.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-476134bec82a295d4478418acb3a1fc0.yaml new file mode 100644 index 0000000000..f77adbf538 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-476134bec82a295d4478418acb3a1fc0.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-476134bec82a295d4478418acb3a1fc0 + +info: + name: > + Premium Addons PRO <= 2.9.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df6e5aee-e79d-4c3f-a0c4-47436ae7c1da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-7dae15c1486a66b7dbaca3afb1f366c1.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-7dae15c1486a66b7dbaca3afb1f366c1.yaml new file mode 100644 index 0000000000..a36dd1786a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-7dae15c1486a66b7dbaca3afb1f366c1.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-7dae15c1486a66b7dbaca3afb1f366c1 + +info: + name: > + Premium Addons PRO <= 2.9.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multi Scroll Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eee517de-a47e-47c9-8322-92ce772191b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-8ea80e6fdb96812cc7fb786f57b22769.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-8ea80e6fdb96812cc7fb786f57b22769.yaml new file mode 100644 index 0000000000..61e99ea788 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-8ea80e6fdb96812cc7fb786f57b22769.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-8ea80e6fdb96812cc7fb786f57b22769 + +info: + name: > + Premium Addons PRO <= 2.9.0 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1fa1999-685c-4b68-927d-617abf9143d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-a6cbba6a06f8c16a716b48b44610ad62.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-a6cbba6a06f8c16a716b48b44610ad62.yaml new file mode 100644 index 0000000000..b5132c1c8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-a6cbba6a06f8c16a716b48b44610ad62.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-a6cbba6a06f8c16a716b48b44610ad62 + +info: + name: > + Premium Addons PRO <= 2.9.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Messenger Chat Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ffa6a6b-bbb4-4361-8585-ce2cdb7d1d7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-b898553c18a3c26f0a1b011522df0006.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-b898553c18a3c26f0a1b011522df0006.yaml new file mode 100644 index 0000000000..81d4806eed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-b898553c18a3c26f0a1b011522df0006.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-b898553c18a3c26f0a1b011522df0006 + +info: + name: > + Premium Addons PRO <= 2.9.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Premium Magic Scroll Module + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/254f3a1c-0d5d-499b-9da7-129f21ba70af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-addons-pro-fe65855ff8de2259da21136e19e15ee9.yaml b/nuclei-templates/cve-less/plugins/premium-addons-pro-fe65855ff8de2259da21136e19e15ee9.yaml new file mode 100644 index 0000000000..1c71394b3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-addons-pro-fe65855ff8de2259da21136e19e15ee9.yaml @@ -0,0 +1,58 @@ +id: premium-addons-pro-fe65855ff8de2259da21136e19e15ee9 + +info: + name: > + Premium Addons PRO <= 2.9.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Global Badge Module + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35151561-6a80-4c2c-b87a-2dfe02aa6158?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-pro/" + google-query: inurl:"/wp-content/plugins/premium-addons-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium-seo-pack-light-version-ccaafbc19f880370aa739512631721f1.yaml b/nuclei-templates/cve-less/plugins/premium-seo-pack-light-version-ccaafbc19f880370aa739512631721f1.yaml new file mode 100644 index 0000000000..e1442fd5fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium-seo-pack-light-version-ccaafbc19f880370aa739512631721f1.yaml @@ -0,0 +1,58 @@ +id: premium-seo-pack-light-version-ccaafbc19f880370aa739512631721f1 + +info: + name: > + AA-Team Premium SEO Pack <= 1.8.0 - Local File Disclosure and Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b108ba89-56c4-44a8-af61-ccd6f7f73562?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-seo-pack-light-version/" + google-query: inurl:"/wp-content/plugins/premium-seo-pack-light-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-seo-pack-light-version,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-seo-pack-light-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-seo-pack-light-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premium_gallery_manager-03cf8e93b74222e68871e585e93a1dfa.yaml b/nuclei-templates/cve-less/plugins/premium_gallery_manager-03cf8e93b74222e68871e585e93a1dfa.yaml new file mode 100644 index 0000000000..8355e7a5f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premium_gallery_manager-03cf8e93b74222e68871e585e93a1dfa.yaml @@ -0,0 +1,58 @@ +id: premium_gallery_manager-03cf8e93b74222e68871e585e93a1dfa + +info: + name: > + Premium Gallery Manager (Unknown Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c274a9b2-c95e-4898-afa4-d6e2f6006f91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Premium_Gallery_Manager/" + google-query: inurl:"/wp-content/plugins/Premium_Gallery_Manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Premium_Gallery_Manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Premium_Gallery_Manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Premium_Gallery_Manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-8029afdc04745424b05ede0e496f1c03.yaml b/nuclei-templates/cve-less/plugins/premmerce-8029afdc04745424b05ede0e496f1c03.yaml new file mode 100644 index 0000000000..d61ac453ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-8029afdc04745424b05ede0e496f1c03.yaml @@ -0,0 +1,58 @@ +id: premmerce-8029afdc04745424b05ede0e496f1c03 + +info: + name: > + Premmerce <= 1.3.18 - Cross-Site Request Forgery via runAction + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54154f34-96be-4b67-bca8-8efc4ab8543e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce/" + google-query: inurl:"/wp-content/plugins/premmerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a1eede7462 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce/" + google-query: inurl:"/wp-content/plugins/premmerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-2caec5a3e7a9b163d5d5f19244c4d557.yaml b/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-2caec5a3e7a9b163d5d5f19244c4d557.yaml new file mode 100644 index 0000000000..a82d8d30e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-2caec5a3e7a9b163d5d5f19244c4d557.yaml @@ -0,0 +1,58 @@ +id: premmerce-redirect-manager-2caec5a3e7a9b163d5d5f19244c4d557 + +info: + name: > + Premmerce Redirect Manager <= 1.0.10 - Cross-Site Request Forgery via deleteRedirect() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d84fa60-f780-41e2-96dc-57057c646e01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-redirect-manager/" + google-query: inurl:"/wp-content/plugins/premmerce-redirect-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-redirect-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-redirect-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-redirect-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-50f488111dad00bdb113f7022a4a0420.yaml b/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-50f488111dad00bdb113f7022a4a0420.yaml new file mode 100644 index 0000000000..275bdfc9e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-50f488111dad00bdb113f7022a4a0420.yaml @@ -0,0 +1,58 @@ +id: premmerce-redirect-manager-50f488111dad00bdb113f7022a4a0420 + +info: + name: > + Premmerce Redirect Manager <= 1.0.11 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3d4f658-e9ce-490b-bcaa-1061a463dbb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-redirect-manager/" + google-query: inurl:"/wp-content/plugins/premmerce-redirect-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-redirect-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-redirect-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-redirect-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dfa430a495 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-redirect-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-redirect-manager/" + google-query: inurl:"/wp-content/plugins/premmerce-redirect-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-redirect-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-redirect-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-redirect-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-d025df7fa9c98e92f3b558a7323cb34f.yaml b/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-d025df7fa9c98e92f3b558a7323cb34f.yaml new file mode 100644 index 0000000000..d7af270bf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-redirect-manager-d025df7fa9c98e92f3b558a7323cb34f.yaml @@ -0,0 +1,58 @@ +id: premmerce-redirect-manager-d025df7fa9c98e92f3b558a7323cb34f + +info: + name: > + Premmerce Redirect Manager <= 1.0.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2e8f9b7-1fce-46be-8198-eeff58a563c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-redirect-manager/" + google-query: inurl:"/wp-content/plugins/premmerce-redirect-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-redirect-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-redirect-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-redirect-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-search-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-search-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..00548c001c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-search-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-search-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-search/" + google-query: inurl:"/wp-content/plugins/premmerce-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-user-roles-3d4210819f9a01bf5f52c577615b1ddd.yaml b/nuclei-templates/cve-less/plugins/premmerce-user-roles-3d4210819f9a01bf5f52c577615b1ddd.yaml new file mode 100644 index 0000000000..b2dd4c7474 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-user-roles-3d4210819f9a01bf5f52c577615b1ddd.yaml @@ -0,0 +1,58 @@ +id: premmerce-user-roles-3d4210819f9a01bf5f52c577615b1ddd + +info: + name: > + Premmerce User Roles <= 1.0.12 - Missing Authorization via role management functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f53cd4a3-a6db-42c2-b4d8-218071c4bcd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-user-roles/" + google-query: inurl:"/wp-content/plugins/premmerce-user-roles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-user-roles,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-user-roles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-user-roles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-user-roles-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-user-roles-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9cc35663e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-user-roles-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-user-roles-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-user-roles/" + google-query: inurl:"/wp-content/plugins/premmerce-user-roles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-user-roles,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-user-roles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-user-roles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-brands-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-brands-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..fe521d7551 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-brands-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-brands-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-brands/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-brands/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-brands,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-brands/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-brands" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-multi-currency-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-multi-currency-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..48cc6fb47d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-multi-currency-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-multi-currency-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-multi-currency/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-multi-currency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-multi-currency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-multi-currency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-multi-currency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-9460e33e1600fa49d2559c8b2959f093.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-9460e33e1600fa49d2559c8b2959f093.yaml new file mode 100644 index 0000000000..768feac502 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-9460e33e1600fa49d2559c8b2959f093.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-product-filter-9460e33e1600fa49d2559c8b2959f093 + +info: + name: > + Premmerce Product Filter for WooCommerce <= 3.7.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9be7798-31ac-4692-a6ac-ae7f129bcd6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-product-filter/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-product-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c66308b4c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-product-filter-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-product-filter/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-product-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..20bfdafa24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-product-filter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-product-filter-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-product-filter/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-product-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..36bf5b3f4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-variation-swatches/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-variation-swatches/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-variation-swatches,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-variation-swatches/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-variation-swatches" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-variation-swatches-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-variation-swatches-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..445ee8550f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-variation-swatches-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-variation-swatches-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-variation-swatches/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-variation-swatches/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-variation-swatches,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-variation-swatches/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-variation-swatches" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..56b591ab58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-wholesale-pricing/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-wholesale-pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-wholesale-pricing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-wholesale-pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-wholesale-pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wholesale-pricing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wholesale-pricing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..93b0b1ea00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wholesale-pricing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-wholesale-pricing-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-wholesale-pricing/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-wholesale-pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-wholesale-pricing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-wholesale-pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-wholesale-pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wishlist-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wishlist-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c65c12f9cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wishlist-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-wishlist-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-wishlist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wishlist-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wishlist-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..3f7d29acb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/premmerce-woocommerce-wishlist-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: premmerce-woocommerce-wishlist-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premmerce-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/premmerce-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premmerce-woocommerce-wishlist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premmerce-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premmerce-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prenotazioni-0b0d398d1a79ae77845de8705631a4db.yaml b/nuclei-templates/cve-less/plugins/prenotazioni-0b0d398d1a79ae77845de8705631a4db.yaml new file mode 100644 index 0000000000..b9c8f10126 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prenotazioni-0b0d398d1a79ae77845de8705631a4db.yaml @@ -0,0 +1,58 @@ +id: prenotazioni-0b0d398d1a79ae77845de8705631a4db + +info: + name: > + Prenotazioni <= 1.7.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e576c6e-6a9b-439d-bde3-8657435596f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prenotazioni/" + google-query: inurl:"/wp-content/plugins/prenotazioni/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prenotazioni,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prenotazioni/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prenotazioni" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prepost-seo-a5227115c16c80c1d90e0210cfd39bd1.yaml b/nuclei-templates/cve-less/plugins/prepost-seo-a5227115c16c80c1d90e0210cfd39bd1.yaml new file mode 100644 index 0000000000..dcd19403b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prepost-seo-a5227115c16c80c1d90e0210cfd39bd1.yaml @@ -0,0 +1,58 @@ +id: prepost-seo-a5227115c16c80c1d90e0210cfd39bd1 + +info: + name: > + PrePost SEO <= 3.0 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93385acc-aede-4948-b64e-d1ab23167d17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prepost-seo/" + google-query: inurl:"/wp-content/plugins/prepost-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prepost-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prepost-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prepost-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/press-elements-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/press-elements-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..76286faf2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/press-elements-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: press-elements-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/press-elements/" + google-query: inurl:"/wp-content/plugins/press-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,press-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/press-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "press-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pressference-exporter-86e875acdb3922f4740414dff44b0215.yaml b/nuclei-templates/cve-less/plugins/pressference-exporter-86e875acdb3922f4740414dff44b0215.yaml new file mode 100644 index 0000000000..2d32b19652 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pressference-exporter-86e875acdb3922f4740414dff44b0215.yaml @@ -0,0 +1,58 @@ +id: pressference-exporter-86e875acdb3922f4740414dff44b0215 + +info: + name: > + Pressference Exporter <= 1.0.3 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c12ba39f-03bc-4a45-b2f4-368f48c0a57b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pressference-exporter/" + google-query: inurl:"/wp-content/plugins/pressference-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pressference-exporter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pressference-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pressference-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pressforward-618eabaed47a418425ba258f61366c0d.yaml b/nuclei-templates/cve-less/plugins/pressforward-618eabaed47a418425ba258f61366c0d.yaml new file mode 100644 index 0000000000..0776e186a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pressforward-618eabaed47a418425ba258f61366c0d.yaml @@ -0,0 +1,58 @@ +id: pressforward-618eabaed47a418425ba258f61366c0d + +info: + name: > + PressForward <= 5.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afff64c5-ed38-4aef-9ed6-4a44589b025c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pressforward/" + google-query: inurl:"/wp-content/plugins/pressforward/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pressforward,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pressforward/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pressforward" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pressforward-d0af10e9ac4884ae3c68f9f3c40fdad7.yaml b/nuclei-templates/cve-less/plugins/pressforward-d0af10e9ac4884ae3c68f9f3c40fdad7.yaml new file mode 100644 index 0000000000..a83a00f5cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pressforward-d0af10e9ac4884ae3c68f9f3c40fdad7.yaml @@ -0,0 +1,58 @@ +id: pressforward-d0af10e9ac4884ae3c68f9f3c40fdad7 + +info: + name: > + PressForward <= 5.2.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f05e5283-e9d9-44c8-9214-96dc18d94f7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pressforward/" + google-query: inurl:"/wp-content/plugins/pressforward/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pressforward,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pressforward/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pressforward" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/presto-player-ffd9211fd118d563cf07134a00f95502.yaml b/nuclei-templates/cve-less/plugins/presto-player-ffd9211fd118d563cf07134a00f95502.yaml new file mode 100644 index 0000000000..0bca5cef1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/presto-player-ffd9211fd118d563cf07134a00f95502.yaml @@ -0,0 +1,58 @@ +id: presto-player-ffd9211fd118d563cf07134a00f95502 + +info: + name: > + The Ultimate Video Player For WordPress <= 2.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4250395-3709-47cd-86d4-e6a1fec10298?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/presto-player/" + google-query: inurl:"/wp-content/plugins/presto-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,presto-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/presto-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "presto-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-google-calendar-c5888a6adf3b7c4a7f3becae44174450.yaml b/nuclei-templates/cve-less/plugins/pretty-google-calendar-c5888a6adf3b7c4a7f3becae44174450.yaml new file mode 100644 index 0000000000..fc61690a6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-google-calendar-c5888a6adf3b7c4a7f3becae44174450.yaml @@ -0,0 +1,58 @@ +id: pretty-google-calendar-c5888a6adf3b7c4a7f3becae44174450 + +info: + name: > + Pretty Google Calendar <= 1.5.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via pretty_google_calendar shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ed90a91-e007-42a5-bbef-f186bd3875ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-google-calendar/" + google-query: inurl:"/wp-content/plugins/pretty-google-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-google-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-google-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-google-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-google-calendar-f9b0e5543d8b6fde32af392e9a980e57.yaml b/nuclei-templates/cve-less/plugins/pretty-google-calendar-f9b0e5543d8b6fde32af392e9a980e57.yaml new file mode 100644 index 0000000000..3a4c4a11f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-google-calendar-f9b0e5543d8b6fde32af392e9a980e57.yaml @@ -0,0 +1,58 @@ +id: pretty-google-calendar-f9b0e5543d8b6fde32af392e9a980e57 + +info: + name: > + Pretty Google Calendar <= 1.7.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a47c5496-2647-47f0-a772-b4e406a51c09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-google-calendar/" + google-query: inurl:"/wp-content/plugins/pretty-google-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-google-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-google-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-google-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-2b34a16f481c76cd3b855292edd0837c.yaml b/nuclei-templates/cve-less/plugins/pretty-link-2b34a16f481c76cd3b855292edd0837c.yaml new file mode 100644 index 0000000000..152090c0ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-2b34a16f481c76cd3b855292edd0837c.yaml @@ -0,0 +1,58 @@ +id: pretty-link-2b34a16f481c76cd3b855292edd0837c + +info: + name: > + Pretty Links Lite < 1.6.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0d6ef49-288b-47d9-bbf2-dc31a6e3621e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link/" + google-query: inurl:"/wp-content/plugins/pretty-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-3e48b050eb99b97d596e581160f8b0fb.yaml b/nuclei-templates/cve-less/plugins/pretty-link-3e48b050eb99b97d596e581160f8b0fb.yaml new file mode 100644 index 0000000000..a5f1df1c3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-3e48b050eb99b97d596e581160f8b0fb.yaml @@ -0,0 +1,58 @@ +id: pretty-link-3e48b050eb99b97d596e581160f8b0fb + +info: + name: > + Pretty Links – Link Management, Branding, Tracking & Sharing Plugin < 1.5.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae67f620-81d8-4f5f-93cb-153cd5c2bd90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link/" + google-query: inurl:"/wp-content/plugins/pretty-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-41859e395573554f98122582c8a8f0c6.yaml b/nuclei-templates/cve-less/plugins/pretty-link-41859e395573554f98122582c8a8f0c6.yaml new file mode 100644 index 0000000000..8e115acb3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-41859e395573554f98122582c8a8f0c6.yaml @@ -0,0 +1,58 @@ +id: pretty-link-41859e395573554f98122582c8a8f0c6 + +info: + name: > + Pretty Links – Link Management, Branding, Tracking & Sharing Plugin <= 1.6.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d906992f-8675-4170-8643-48799ae7ac7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link/" + google-query: inurl:"/wp-content/plugins/pretty-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-64447b975f887c7d7c5f32cb22cf8b08.yaml b/nuclei-templates/cve-less/plugins/pretty-link-64447b975f887c7d7c5f32cb22cf8b08.yaml new file mode 100644 index 0000000000..2b56218a38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-64447b975f887c7d7c5f32cb22cf8b08.yaml @@ -0,0 +1,58 @@ +id: pretty-link-64447b975f887c7d7c5f32cb22cf8b08 + +info: + name: > + Pretty Links <= 2.1.9 - Unauthenticated Stored Cross-Site Scripting via track_link + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae058c5b-b90b-4a1e-9f56-d56dbd2d3607?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link/" + google-query: inurl:"/wp-content/plugins/pretty-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-788a92d89f29c9708029570d31435edd.yaml b/nuclei-templates/cve-less/plugins/pretty-link-788a92d89f29c9708029570d31435edd.yaml new file mode 100644 index 0000000000..3d4139832e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-788a92d89f29c9708029570d31435edd.yaml @@ -0,0 +1,58 @@ +id: pretty-link-788a92d89f29c9708029570d31435edd + +info: + name: > + Shortlinks by Pretty Links <= 3.4.0 - Cross-Site Request Forgery via route + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5304da48-5d42-47ce-b1b1-dc04b8fa9dff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link/" + google-query: inurl:"/wp-content/plugins/pretty-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-937a958745ed3ab696229e1956002aef.yaml b/nuclei-templates/cve-less/plugins/pretty-link-937a958745ed3ab696229e1956002aef.yaml new file mode 100644 index 0000000000..ad095a7dcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-937a958745ed3ab696229e1956002aef.yaml @@ -0,0 +1,58 @@ +id: pretty-link-937a958745ed3ab696229e1956002aef + +info: + name: > + Pretty Links – Affiliate Links, Link Branding, Link Tracking & Marketing Plugin <= 3.6.3 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97d78b4b-568e-43e7-bebf-091179c321f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link/" + google-query: inurl:"/wp-content/plugins/pretty-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-b59b53ef6e4ef1805fb78be7f13120cc.yaml b/nuclei-templates/cve-less/plugins/pretty-link-b59b53ef6e4ef1805fb78be7f13120cc.yaml new file mode 100644 index 0000000000..77f1d0b214 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-b59b53ef6e4ef1805fb78be7f13120cc.yaml @@ -0,0 +1,58 @@ +id: pretty-link-b59b53ef6e4ef1805fb78be7f13120cc + +info: + name: > + Shortlinks by Pretty Links <= 3.6.2 - Reflected Cross-Site Scripting via post_status + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a53291f9-632c-4b0b-b5f9-d247134f2a5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link/" + google-query: inurl:"/wp-content/plugins/pretty-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-lite-052601a64f3c278014382ca43022a402.yaml b/nuclei-templates/cve-less/plugins/pretty-link-lite-052601a64f3c278014382ca43022a402.yaml new file mode 100644 index 0000000000..e6ebe28c64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-lite-052601a64f3c278014382ca43022a402.yaml @@ -0,0 +1,58 @@ +id: pretty-link-lite-052601a64f3c278014382ca43022a402 + +info: + name: > + Pretty Link Lite < 1.5.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30edc2a1-f3fe-488d-a525-f0ae3482d8a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link-lite/" + google-query: inurl:"/wp-content/plugins/pretty-link-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-link-lite-a5b27966569a74533de04e9d976c99c9.yaml b/nuclei-templates/cve-less/plugins/pretty-link-lite-a5b27966569a74533de04e9d976c99c9.yaml new file mode 100644 index 0000000000..c34138bbf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-link-lite-a5b27966569a74533de04e9d976c99c9.yaml @@ -0,0 +1,58 @@ +id: pretty-link-lite-a5b27966569a74533de04e9d976c99c9 + +info: + name: > + Pretty Link Lite < 1.5.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed766000-557b-483b-9b86-c1cc6898abb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-link-lite/" + google-query: inurl:"/wp-content/plugins/pretty-link-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-link-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-link-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-link-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pretty-url-977a0355e694b9d265545981130653f2.yaml b/nuclei-templates/cve-less/plugins/pretty-url-977a0355e694b9d265545981130653f2.yaml new file mode 100644 index 0000000000..daca81ed95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pretty-url-977a0355e694b9d265545981130653f2.yaml @@ -0,0 +1,58 @@ +id: pretty-url-977a0355e694b9d265545981130653f2 + +info: + name: > + Pretty Url <= 1.5.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f54fb59-03c1-45e9-a498-1fa1409c4466?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pretty-url/" + google-query: inurl:"/wp-content/plugins/pretty-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pretty-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pretty-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pretty-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prettyphoto-1c7062bfa495ccd866c7cbbbfe4462e3.yaml b/nuclei-templates/cve-less/plugins/prettyphoto-1c7062bfa495ccd866c7cbbbfe4462e3.yaml new file mode 100644 index 0000000000..31fb9867cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prettyphoto-1c7062bfa495ccd866c7cbbbfe4462e3.yaml @@ -0,0 +1,58 @@ +id: prettyphoto-1c7062bfa495ccd866c7cbbbfe4462e3 + +info: + name: > + WordPress prettyPhoto <= 1.1 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a33282c-2adb-4f26-8fc4-918a48bfd040?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prettyphoto/" + google-query: inurl:"/wp-content/plugins/prettyphoto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prettyphoto,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prettyphoto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prettyphoto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prevent-content-copy-image-save-9375f4344479a96cb2fe5deb81f3c215.yaml b/nuclei-templates/cve-less/plugins/prevent-content-copy-image-save-9375f4344479a96cb2fe5deb81f3c215.yaml new file mode 100644 index 0000000000..12b3a32e89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prevent-content-copy-image-save-9375f4344479a96cb2fe5deb81f3c215.yaml @@ -0,0 +1,58 @@ +id: prevent-content-copy-image-save-9375f4344479a96cb2fe5deb81f3c215 + +info: + name: > + Content Copy Protection & Prevent Image Save <= 1.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/115d549c-2dea-4d94-9c50-75b8149be1e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prevent-content-copy-image-save/" + google-query: inurl:"/wp-content/plugins/prevent-content-copy-image-save/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prevent-content-copy-image-save,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prevent-content-copy-image-save/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prevent-content-copy-image-save" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prevent-file-access-0dc878d77e3a3194c72fdd6ba3814c5b.yaml b/nuclei-templates/cve-less/plugins/prevent-file-access-0dc878d77e3a3194c72fdd6ba3814c5b.yaml new file mode 100644 index 0000000000..d04022cd99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prevent-file-access-0dc878d77e3a3194c72fdd6ba3814c5b.yaml @@ -0,0 +1,58 @@ +id: prevent-file-access-0dc878d77e3a3194c72fdd6ba3814c5b + +info: + name: > + Prevent files / folders access <= 2.5.1 - Authenticated (Administrator+) Arbitrary File Upload in mo_media_restrict_page + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b266bd10-dbc6-4058-a5b2-1578c0814cb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prevent-file-access/" + google-query: inurl:"/wp-content/plugins/prevent-file-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prevent-file-access,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prevent-file-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prevent-file-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prevent-landscape-rotation-b8f19e13b8f78474f2f4efef8d80ad2c.yaml b/nuclei-templates/cve-less/plugins/prevent-landscape-rotation-b8f19e13b8f78474f2f4efef8d80ad2c.yaml new file mode 100644 index 0000000000..2f2c81b485 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prevent-landscape-rotation-b8f19e13b8f78474f2f4efef8d80ad2c.yaml @@ -0,0 +1,58 @@ +id: prevent-landscape-rotation-b8f19e13b8f78474f2f4efef8d80ad2c + +info: + name: > + Prevent Landscape Rotation <= 2.0 - Cross-Site Request Forgery via adminpage.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4235f279-0975-4814-b156-b45b011e3ce6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prevent-landscape-rotation/" + google-query: inurl:"/wp-content/plugins/prevent-landscape-rotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prevent-landscape-rotation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prevent-landscape-rotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prevent-landscape-rotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/preview-link-generator-1c4812a533fa1689fc1c4f74901b1fce.yaml b/nuclei-templates/cve-less/plugins/preview-link-generator-1c4812a533fa1689fc1c4f74901b1fce.yaml new file mode 100644 index 0000000000..5546429e3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/preview-link-generator-1c4812a533fa1689fc1c4f74901b1fce.yaml @@ -0,0 +1,58 @@ +id: preview-link-generator-1c4812a533fa1689fc1c4f74901b1fce + +info: + name: > + Preview Link Generator <= 1.0.3 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b6b4953-a264-4668-9cc3-1578109f6592?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/preview-link-generator/" + google-query: inurl:"/wp-content/plugins/preview-link-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,preview-link-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/preview-link-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "preview-link-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/price-bands-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/price-bands-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d97885dc05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/price-bands-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: price-bands-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/price-bands-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/price-bands-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,price-bands-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/price-bands-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "price-bands-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/price-bands-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/price-bands-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..b3ba44dcb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/price-bands-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: price-bands-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/price-bands-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/price-bands-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,price-bands-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/price-bands-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "price-bands-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/price-commander-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/price-commander-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..afe9719e90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/price-commander-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: price-commander-xforwc-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/price-commander-xforwc/" + google-query: inurl:"/wp-content/plugins/price-commander-xforwc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,price-commander-xforwc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/price-commander-xforwc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "price-commander-xforwc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricetable-c09dba9091d0ee592d0a0d23f17cab8b.yaml b/nuclei-templates/cve-less/plugins/pricetable-c09dba9091d0ee592d0a0d23f17cab8b.yaml new file mode 100644 index 0000000000..f5efa197e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricetable-c09dba9091d0ee592d0a0d23f17cab8b.yaml @@ -0,0 +1,58 @@ +id: pricetable-c09dba9091d0ee592d0a0d23f17cab8b + +info: + name: > + Price Table <= 0.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23f58949-6cc7-45a3-a6a0-58213bb03679?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricetable/" + google-query: inurl:"/wp-content/plugins/pricetable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricetable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricetable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricetable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-deals-for-woocommerce-791f562db0a1b9f0bcd5351dce6eacc4.yaml b/nuclei-templates/cve-less/plugins/pricing-deals-for-woocommerce-791f562db0a1b9f0bcd5351dce6eacc4.yaml new file mode 100644 index 0000000000..97e13ab495 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-deals-for-woocommerce-791f562db0a1b9f0bcd5351dce6eacc4.yaml @@ -0,0 +1,58 @@ +id: pricing-deals-for-woocommerce-791f562db0a1b9f0bcd5351dce6eacc4 + +info: + name: > + Pricing Deals for WooCommerce <= 2.0.2.02 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cb77a63-360b-4917-8a3c-263f5282742c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-deals-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/pricing-deals-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-deals-for-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-deals-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-deals-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-deals-for-woocommerce-8930cf2379d26f27d4dfc818449f89c9.yaml b/nuclei-templates/cve-less/plugins/pricing-deals-for-woocommerce-8930cf2379d26f27d4dfc818449f89c9.yaml new file mode 100644 index 0000000000..e13a8d05f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-deals-for-woocommerce-8930cf2379d26f27d4dfc818449f89c9.yaml @@ -0,0 +1,58 @@ +id: pricing-deals-for-woocommerce-8930cf2379d26f27d4dfc818449f89c9 + +info: + name: > + Pricing Deals for WooCommerce <= 2.0.3.2 - Missing Authorization via vtprd_ajax_clone_rule + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1101bfe6-2075-4f44-933b-6d9f372100a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-deals-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/pricing-deals-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-deals-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-deals-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-deals-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-table-a5038f440967c1bd1e883ce46373e9e5.yaml b/nuclei-templates/cve-less/plugins/pricing-table-a5038f440967c1bd1e883ce46373e9e5.yaml new file mode 100644 index 0000000000..69d79a5278 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-table-a5038f440967c1bd1e883ce46373e9e5.yaml @@ -0,0 +1,58 @@ +id: pricing-table-a5038f440967c1bd1e883ce46373e9e5 + +info: + name: > + Pricing Table <= 1.5.2 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe708e03-334f-4c72-ace9-b5d065ee8c9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-table/" + google-query: inurl:"/wp-content/plugins/pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-table,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-07351eac4ac9135631e6b13a4dbb9f2b.yaml b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-07351eac4ac9135631e6b13a4dbb9f2b.yaml new file mode 100644 index 0000000000..feeb7f06ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-07351eac4ac9135631e6b13a4dbb9f2b.yaml @@ -0,0 +1,58 @@ +id: pricing-table-by-supsystic-07351eac4ac9135631e6b13a4dbb9f2b + +info: + name: > + Pricing Table by Supsystic <= 1.8.1 - Missing Authorization on AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bdebd9c-f6fb-4de7-bd6b-5f52ef34ffb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-table-by-supsystic/" + google-query: inurl:"/wp-content/plugins/pricing-table-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-table-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-table-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-table-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-5cd979c2d1bc0f7645ea6d8b845b95d5.yaml b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-5cd979c2d1bc0f7645ea6d8b845b95d5.yaml new file mode 100644 index 0000000000..ed7613304c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-5cd979c2d1bc0f7645ea6d8b845b95d5.yaml @@ -0,0 +1,58 @@ +id: pricing-table-by-supsystic-5cd979c2d1bc0f7645ea6d8b845b95d5 + +info: + name: > + Pricing Table by Supsystic <= 1.8.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b89b6ac-aa00-4ba6-a1e3-382e7b630fc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-table-by-supsystic/" + google-query: inurl:"/wp-content/plugins/pricing-table-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-table-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-table-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-table-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-796cd5b627356be27433f08472302dc1.yaml b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-796cd5b627356be27433f08472302dc1.yaml new file mode 100644 index 0000000000..67ff0baa82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-796cd5b627356be27433f08472302dc1.yaml @@ -0,0 +1,58 @@ +id: pricing-table-by-supsystic-796cd5b627356be27433f08472302dc1 + +info: + name: > + Pricing Table by Supsystic <= 1.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d390a7e-f790-4953-b3cb-be31cfec6fb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-table-by-supsystic/" + google-query: inurl:"/wp-content/plugins/pricing-table-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-table-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-table-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-table-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-a0cf0c70320b9077a478823de4b5e05c.yaml b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-a0cf0c70320b9077a478823de4b5e05c.yaml new file mode 100644 index 0000000000..d4fb6de0a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-a0cf0c70320b9077a478823de4b5e05c.yaml @@ -0,0 +1,58 @@ +id: pricing-table-by-supsystic-a0cf0c70320b9077a478823de4b5e05c + +info: + name: > + Pricing Table by Supsystic <= 1.8.1 - Cross-Site Request Forgery to Cross-Site Scripting and Setting Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16e6dc49-5edf-4ce4-95c9-19ef04a77379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-table-by-supsystic/" + google-query: inurl:"/wp-content/plugins/pricing-table-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-table-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-table-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-table-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-b8b87309673e04154a00de1091b89e07.yaml b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-b8b87309673e04154a00de1091b89e07.yaml new file mode 100644 index 0000000000..5b3a6014d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-b8b87309673e04154a00de1091b89e07.yaml @@ -0,0 +1,58 @@ +id: pricing-table-by-supsystic-b8b87309673e04154a00de1091b89e07 + +info: + name: > + Pricing Table by Supsystic <= 1.8.8 - Boolean-Based Blind SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a9c8c4f-ce07-4fe5-a573-ece675d51441?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-table-by-supsystic/" + google-query: inurl:"/wp-content/plugins/pricing-table-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-table-by-supsystic,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-table-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-table-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-fef3c5d045b635ac89f7d5a505428c20.yaml b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-fef3c5d045b635ac89f7d5a505428c20.yaml new file mode 100644 index 0000000000..a77e9a1b86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-table-by-supsystic-fef3c5d045b635ac89f7d5a505428c20.yaml @@ -0,0 +1,58 @@ +id: pricing-table-by-supsystic-fef3c5d045b635ac89f7d5a505428c20 + +info: + name: > + Pricing Table by Supsystic <= 1.9.12 - Authenticated (Admin+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33356b50-9c9c-4719-8321-b391fda69867?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-table-by-supsystic/" + google-query: inurl:"/wp-content/plugins/pricing-table-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-table-by-supsystic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-table-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-table-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-tables-for-wpbakery-page-builder-ea2779881d033f74603b414138c61a0a.yaml b/nuclei-templates/cve-less/plugins/pricing-tables-for-wpbakery-page-builder-ea2779881d033f74603b414138c61a0a.yaml new file mode 100644 index 0000000000..f1f6e4915f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-tables-for-wpbakery-page-builder-ea2779881d033f74603b414138c61a0a.yaml @@ -0,0 +1,58 @@ +id: pricing-tables-for-wpbakery-page-builder-ea2779881d033f74603b414138c61a0a + +info: + name: > + Pricing Tables For WPBakery Page Builder (formerly Visual Composer) <= 2.0 - Authenticated (Subscriber+) Local File Inclusion via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3475c8fe-17fa-4d8e-bffd-a33e59f6e03b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-tables-for-wpbakery-page-builder/" + google-query: inurl:"/wp-content/plugins/pricing-tables-for-wpbakery-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-tables-for-wpbakery-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-tables-for-wpbakery-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-tables-for-wpbakery-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pricing-tables-for-wpbakery-page-builder-fa96acbf0fe29f0b0c48fe458fac9bfe.yaml b/nuclei-templates/cve-less/plugins/pricing-tables-for-wpbakery-page-builder-fa96acbf0fe29f0b0c48fe458fac9bfe.yaml new file mode 100644 index 0000000000..d959597ba9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pricing-tables-for-wpbakery-page-builder-fa96acbf0fe29f0b0c48fe458fac9bfe.yaml @@ -0,0 +1,58 @@ +id: pricing-tables-for-wpbakery-page-builder-fa96acbf0fe29f0b0c48fe458fac9bfe + +info: + name: > + Pricing Tables For WPBakery Page Builder (formerly Visual Composer) <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c04a0f82-97f6-44ff-999d-08a8c106f889?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pricing-tables-for-wpbakery-page-builder/" + google-query: inurl:"/wp-content/plugins/pricing-tables-for-wpbakery-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pricing-tables-for-wpbakery-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pricing-tables-for-wpbakery-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pricing-tables-for-wpbakery-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/primary-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/primary-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e803be1570 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/primary-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: primary-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/primary-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/primary-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,primary-addon-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/primary-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "primary-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prime-mover-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/prime-mover-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7890b60472 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prime-mover-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: prime-mover-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prime-mover/" + google-query: inurl:"/wp-content/plugins/prime-mover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prime-mover,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prime-mover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prime-mover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prime-mover-ec0983e54c9058b456b78ea30580b6c5.yaml b/nuclei-templates/cve-less/plugins/prime-mover-ec0983e54c9058b456b78ea30580b6c5.yaml new file mode 100644 index 0000000000..929e3909f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prime-mover-ec0983e54c9058b456b78ea30580b6c5.yaml @@ -0,0 +1,58 @@ +id: prime-mover-ec0983e54c9058b456b78ea30580b6c5 + +info: + name: > + Prime Mover <= 1.9.2 - Sensitive Information Exposure via Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/806d3919-7a10-43f3-9c68-ce38ba359a35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prime-mover/" + google-query: inurl:"/wp-content/plugins/prime-mover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prime-mover,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prime-mover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prime-mover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-2af694ce57dffaf3d295cf18ffc50a9f.yaml b/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-2af694ce57dffaf3d295cf18ffc50a9f.yaml new file mode 100644 index 0000000000..cff4808327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-2af694ce57dffaf3d295cf18ffc50a9f.yaml @@ -0,0 +1,58 @@ +id: print-google-cloud-print-gcp-woocommerce-2af694ce57dffaf3d295cf18ffc50a9f + +info: + name: > + BizPrint <= 4.5.1 - Cross-Site Request Forgery in Printer Management + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/487a131e-4911-42d6-bfd7-fc697c89552d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-google-cloud-print-gcp-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-google-cloud-print-gcp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-google-cloud-print-gcp-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-google-cloud-print-gcp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-google-cloud-print-gcp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-7ec3d0366936e6cdb87debac06f05872.yaml b/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-7ec3d0366936e6cdb87debac06f05872.yaml new file mode 100644 index 0000000000..538edadff6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-7ec3d0366936e6cdb87debac06f05872.yaml @@ -0,0 +1,58 @@ +id: print-google-cloud-print-gcp-woocommerce-7ec3d0366936e6cdb87debac06f05872 + +info: + name: > + BizPrint <= 4.5.4 - Cross-Site Request Forgery to Cross-Site Scripting via process.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7e599b1-20fb-4260-bdc3-ef0653719b26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-google-cloud-print-gcp-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-google-cloud-print-gcp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-google-cloud-print-gcp-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-google-cloud-print-gcp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-google-cloud-print-gcp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-c7e173848fb257299994b18731636ed4.yaml b/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-c7e173848fb257299994b18731636ed4.yaml new file mode 100644 index 0000000000..74b67924a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-c7e173848fb257299994b18731636ed4.yaml @@ -0,0 +1,58 @@ +id: print-google-cloud-print-gcp-woocommerce-c7e173848fb257299994b18731636ed4 + +info: + name: > + BizPrint <= 4.5.1 - Missing Authorization in showTemplatePreview + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fc76e1c-546f-4ecd-bd3b-a6f21b2c65bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-google-cloud-print-gcp-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-google-cloud-print-gcp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-google-cloud-print-gcp-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-google-cloud-print-gcp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-google-cloud-print-gcp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-ef0878d0c845446e359ff8868f1f69d3.yaml b/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-ef0878d0c845446e359ff8868f1f69d3.yaml new file mode 100644 index 0000000000..b4b845065a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-google-cloud-print-gcp-woocommerce-ef0878d0c845446e359ff8868f1f69d3.yaml @@ -0,0 +1,58 @@ +id: print-google-cloud-print-gcp-woocommerce-ef0878d0c845446e359ff8868f1f69d3 + +info: + name: > + BizPrint <= 4.3.39 - Missing Authorization via showTemplatePreview() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b2132db-761f-48ff-a737-115e07c77425?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-google-cloud-print-gcp-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-google-cloud-print-gcp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-google-cloud-print-gcp-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-google-cloud-print-gcp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-google-cloud-print-gcp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-4e625904aaffe65e8919040e5c5d03d6.yaml b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-4e625904aaffe65e8919040e5c5d03d6.yaml new file mode 100644 index 0000000000..c7612d1b30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-4e625904aaffe65e8919040e5c5d03d6.yaml @@ -0,0 +1,58 @@ +id: print-invoices-packing-slip-labels-for-woocommerce-4e625904aaffe65e8919040e5c5d03d6 + +info: + name: > + WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels <= 4.3.0 - Missing Authorization to Order Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5abc282d-68c9-423c-a15c-d4d3f7035661?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-invoices-packing-slip-labels-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-invoices-packing-slip-labels-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-b658c34d6189136c251e0b8d8e225774.yaml b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-b658c34d6189136c251e0b8d8e225774.yaml new file mode 100644 index 0000000000..49ab5f8fcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-b658c34d6189136c251e0b8d8e225774.yaml @@ -0,0 +1,58 @@ +id: print-invoices-packing-slip-labels-for-woocommerce-b658c34d6189136c251e0b8d8e225774 + +info: + name: > + WooCommerce PDF Invoices <= 4.2.1 - Authenticated(Shop Manager+) Arbitrary Options Update via JSON Import + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7927edf2-b092-4b56-83aa-038f99ea658e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-invoices-packing-slip-labels-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-invoices-packing-slip-labels-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-b989c8fa7ed8639e2ece01754bff0c0b.yaml b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-b989c8fa7ed8639e2ece01754bff0c0b.yaml new file mode 100644 index 0000000000..1362eb042a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-b989c8fa7ed8639e2ece01754bff0c0b.yaml @@ -0,0 +1,58 @@ +id: print-invoices-packing-slip-labels-for-woocommerce-b989c8fa7ed8639e2ece01754bff0c0b + +info: + name: > + WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels <= 4.4.2 - Missing Authorization to Unauthenticated Settings Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aeac9c4a-0754-4fb1-bf11-0cd8483451b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-invoices-packing-slip-labels-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-invoices-packing-slip-labels-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-c1749d6ed9c579e061b6c82357a7d855.yaml b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-c1749d6ed9c579e061b6c82357a7d855.yaml new file mode 100644 index 0000000000..4c8f7a0e04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-c1749d6ed9c579e061b6c82357a7d855.yaml @@ -0,0 +1,58 @@ +id: print-invoices-packing-slip-labels-for-woocommerce-c1749d6ed9c579e061b6c82357a7d855 + +info: + name: > + WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels <= 4.4.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7ba4218-5b60-4e72-b98d-7c95c9fc3d59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-invoices-packing-slip-labels-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-invoices-packing-slip-labels-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-e0a80937c004063afd9f6bac15ab1a10.yaml b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-e0a80937c004063afd9f6bac15ab1a10.yaml new file mode 100644 index 0000000000..0aedfc2841 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-invoices-packing-slip-labels-for-woocommerce-e0a80937c004063afd9f6bac15ab1a10.yaml @@ -0,0 +1,58 @@ +id: print-invoices-packing-slip-labels-for-woocommerce-e0a80937c004063afd9f6bac15ab1a10 + +info: + name: > + WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels <= 4.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdb8e77-1323-43a0-a012-04d983390de1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-invoices-packing-slip-labels-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-invoices-packing-slip-labels-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-invoices-packing-slip-labels-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-my-blog-0562ee4a0dfba95b2ef2be1e8d702a78.yaml b/nuclei-templates/cve-less/plugins/print-my-blog-0562ee4a0dfba95b2ef2be1e8d702a78.yaml new file mode 100644 index 0000000000..3146a10534 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-my-blog-0562ee4a0dfba95b2ef2be1e8d702a78.yaml @@ -0,0 +1,58 @@ +id: print-my-blog-0562ee4a0dfba95b2ef2be1e8d702a78 + +info: + name: > + Print My Blog – Print, PDF, & eBook Converter <= 3.15.8 - Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3004699-3285-426a-8a85-33be6c0c0b6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-my-blog/" + google-query: inurl:"/wp-content/plugins/print-my-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-my-blog,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-my-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-my-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.15.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-my-blog-15e90fc31ab3dfba5bcef7edbbc05f6d.yaml b/nuclei-templates/cve-less/plugins/print-my-blog-15e90fc31ab3dfba5bcef7edbbc05f6d.yaml new file mode 100644 index 0000000000..76ab829405 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-my-blog-15e90fc31ab3dfba5bcef7edbbc05f6d.yaml @@ -0,0 +1,58 @@ +id: print-my-blog-15e90fc31ab3dfba5bcef7edbbc05f6d + +info: + name: > + Print My Blog – Print, PDF, & eBook Converter WordPress Plugin <= 3.26.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b6e1c70-a112-4564-9e18-bdc2a8028482?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-my-blog/" + google-query: inurl:"/wp-content/plugins/print-my-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-my-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-my-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-my-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.26.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-my-blog-26c14cb6ca4960fb59e24c4b3a62abf9.yaml b/nuclei-templates/cve-less/plugins/print-my-blog-26c14cb6ca4960fb59e24c4b3a62abf9.yaml new file mode 100644 index 0000000000..7e1ef3a564 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-my-blog-26c14cb6ca4960fb59e24c4b3a62abf9.yaml @@ -0,0 +1,58 @@ +id: print-my-blog-26c14cb6ca4960fb59e24c4b3a62abf9 + +info: + name: > + Print My Blog <= 1.6.6 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23fbb011-cf60-4c75-ac68-b5d0dfa3c356?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-my-blog/" + google-query: inurl:"/wp-content/plugins/print-my-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-my-blog,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-my-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-my-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-my-blog-6bab7e18a95398e2980bac2c1ae0a9ae.yaml b/nuclei-templates/cve-less/plugins/print-my-blog-6bab7e18a95398e2980bac2c1ae0a9ae.yaml new file mode 100644 index 0000000000..da089b63ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-my-blog-6bab7e18a95398e2980bac2c1ae0a9ae.yaml @@ -0,0 +1,58 @@ +id: print-my-blog-6bab7e18a95398e2980bac2c1ae0a9ae + +info: + name: > + Print My Blog – Print, PDF, & eBook Converter WordPress Plugin <= 3.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f44d7a90-330f-42fb-a4f3-427e60ed7af8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-my-blog/" + google-query: inurl:"/wp-content/plugins/print-my-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-my-blog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-my-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-my-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-my-blog-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/print-my-blog-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..590504cd5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-my-blog-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: print-my-blog-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-my-blog/" + google-query: inurl:"/wp-content/plugins/print-my-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-my-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-my-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-my-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-o-matic-2a1202a3beb6f69088b7b47e3927398f.yaml b/nuclei-templates/cve-less/plugins/print-o-matic-2a1202a3beb6f69088b7b47e3927398f.yaml new file mode 100644 index 0000000000..f244920fe5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-o-matic-2a1202a3beb6f69088b7b47e3927398f.yaml @@ -0,0 +1,58 @@ +id: print-o-matic-2a1202a3beb6f69088b7b47e3927398f + +info: + name: > + Print-O-Matic <= 2.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/706549d9-aa2f-4b1e-83b8-0eea38654565?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-o-matic/" + google-query: inurl:"/wp-content/plugins/print-o-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-o-matic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-o-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-o-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-o-matic-6cf87515d30763cb39f9dddd78a854d6.yaml b/nuclei-templates/cve-less/plugins/print-o-matic-6cf87515d30763cb39f9dddd78a854d6.yaml new file mode 100644 index 0000000000..0ec24687e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-o-matic-6cf87515d30763cb39f9dddd78a854d6.yaml @@ -0,0 +1,58 @@ +id: print-o-matic-6cf87515d30763cb39f9dddd78a854d6 + +info: + name: > + Print-O-Matic <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dedb1a15-933b-4e8a-b82d-a154414c61ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-o-matic/" + google-query: inurl:"/wp-content/plugins/print-o-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-o-matic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-o-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-o-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-o-matic-92919ce0eb17b0cea216462cfde732e2.yaml b/nuclei-templates/cve-less/plugins/print-o-matic-92919ce0eb17b0cea216462cfde732e2.yaml new file mode 100644 index 0000000000..d9e3550cac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-o-matic-92919ce0eb17b0cea216462cfde732e2.yaml @@ -0,0 +1,58 @@ +id: print-o-matic-92919ce0eb17b0cea216462cfde732e2 + +info: + name: > + Print-O-Matic <= 2.0.2 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/816ec7bd-dd0f-4c52-b73f-72cd25c410b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-o-matic/" + google-query: inurl:"/wp-content/plugins/print-o-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-o-matic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-o-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-o-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/print-page-2ff60d0958c013f69d2bb2b8a6cd708d.yaml b/nuclei-templates/cve-less/plugins/print-page-2ff60d0958c013f69d2bb2b8a6cd708d.yaml new file mode 100644 index 0000000000..114af3bfbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/print-page-2ff60d0958c013f69d2bb2b8a6cd708d.yaml @@ -0,0 +1,58 @@ +id: print-page-2ff60d0958c013f69d2bb2b8a6cd708d + +info: + name: > + Print Page block <= 1.0.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/123d6216-3174-40c9-bdb9-405e5a5ca129?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/print-page/" + google-query: inurl:"/wp-content/plugins/print-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,print-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/print-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "print-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/printfriendly-1d90f05eb3de7b1b2997cada03edccfe.yaml b/nuclei-templates/cve-less/plugins/printfriendly-1d90f05eb3de7b1b2997cada03edccfe.yaml new file mode 100644 index 0000000000..729efbb43a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/printfriendly-1d90f05eb3de7b1b2997cada03edccfe.yaml @@ -0,0 +1,58 @@ +id: printfriendly-1d90f05eb3de7b1b2997cada03edccfe + +info: + name: > + Print, PDF, Email by PrintFriendly <= 5.2.2 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81bcbf7d-d33f-4cf2-8411-613cf54095b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/printfriendly/" + google-query: inurl:"/wp-content/plugins/printfriendly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,printfriendly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/printfriendly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "printfriendly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/printfriendly-8d6a1c8b6a0bd1e0976b28104afac768.yaml b/nuclei-templates/cve-less/plugins/printfriendly-8d6a1c8b6a0bd1e0976b28104afac768.yaml new file mode 100644 index 0000000000..307bbaadf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/printfriendly-8d6a1c8b6a0bd1e0976b28104afac768.yaml @@ -0,0 +1,58 @@ +id: printfriendly-8d6a1c8b6a0bd1e0976b28104afac768 + +info: + name: > + Print, PDF, Email by PrintFriendly <= 5.5.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0403a76-86ce-4772-bc0b-22b183f0f684?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/printfriendly/" + google-query: inurl:"/wp-content/plugins/printfriendly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,printfriendly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/printfriendly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "printfriendly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/printful-shipping-for-woocommerce-85ac97fd4125d5816ad5ef5d1d8e7011.yaml b/nuclei-templates/cve-less/plugins/printful-shipping-for-woocommerce-85ac97fd4125d5816ad5ef5d1d8e7011.yaml new file mode 100644 index 0000000000..cfe67ab4c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/printful-shipping-for-woocommerce-85ac97fd4125d5816ad5ef5d1d8e7011.yaml @@ -0,0 +1,58 @@ +id: printful-shipping-for-woocommerce-85ac97fd4125d5816ad5ef5d1d8e7011 + +info: + name: > + Printful Integration for WooCommerce <= 2.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c96b3d65-431b-447a-8dc5-8865d83a92b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/printful-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/printful-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,printful-shipping-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/printful-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "printful-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prismatic-8edd86c32f445ba8a5cfcf66f80c6f54.yaml b/nuclei-templates/cve-less/plugins/prismatic-8edd86c32f445ba8a5cfcf66f80c6f54.yaml new file mode 100644 index 0000000000..798c232103 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prismatic-8edd86c32f445ba8a5cfcf66f80c6f54.yaml @@ -0,0 +1,58 @@ +id: prismatic-8edd86c32f445ba8a5cfcf66f80c6f54 + +info: + name: > + Prismatic <= 2.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d93c70d6-c439-4bcd-a855-b71896bf9d22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prismatic/" + google-query: inurl:"/wp-content/plugins/prismatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prismatic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prismatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prismatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/prismatic-b1ef7da73b0bc448b39a7087f236d203.yaml b/nuclei-templates/cve-less/plugins/prismatic-b1ef7da73b0bc448b39a7087f236d203.yaml new file mode 100644 index 0000000000..aaa94de365 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/prismatic-b1ef7da73b0bc448b39a7087f236d203.yaml @@ -0,0 +1,58 @@ +id: prismatic-b1ef7da73b0bc448b39a7087f236d203 + +info: + name: > + Prismatic <= 2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42e74152-b79d-42f5-87a2-6e9545699483?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/prismatic/" + google-query: inurl:"/wp-content/plugins/prismatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,prismatic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/prismatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prismatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/private-content-c6757c3a086fd1dc631d770c06dfa500.yaml b/nuclei-templates/cve-less/plugins/private-content-c6757c3a086fd1dc631d770c06dfa500.yaml new file mode 100644 index 0000000000..adf2d1830f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/private-content-c6757c3a086fd1dc631d770c06dfa500.yaml @@ -0,0 +1,58 @@ +id: private-content-c6757c3a086fd1dc631d770c06dfa500 + +info: + name: > + PrivateContent <= 8.4.3 - Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de73304e-7a28-4304-b1ed-2f6dd7738236?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/private-content/" + google-query: inurl:"/wp-content/plugins/private-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,private-content,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/private-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "private-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/private-files-dfb92d2f2c245aee84f9cb4e282df3aa.yaml b/nuclei-templates/cve-less/plugins/private-files-dfb92d2f2c245aee84f9cb4e282df3aa.yaml new file mode 100644 index 0000000000..25dabf3be7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/private-files-dfb92d2f2c245aee84f9cb4e282df3aa.yaml @@ -0,0 +1,58 @@ +id: private-files-dfb92d2f2c245aee84f9cb4e282df3aa + +info: + name: > + Private Files <= 0.40 - Cross-Site Request Forgery to Disable Protection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d764b1be-b4ae-4845-b506-846f782cf21e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/private-files/" + google-query: inurl:"/wp-content/plugins/private-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,private-files,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/private-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "private-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/private-google-calendars-9e0ed51792e9270a576ac0d1dc550b71.yaml b/nuclei-templates/cve-less/plugins/private-google-calendars-9e0ed51792e9270a576ac0d1dc550b71.yaml new file mode 100644 index 0000000000..0d4bd883b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/private-google-calendars-9e0ed51792e9270a576ac0d1dc550b71.yaml @@ -0,0 +1,58 @@ +id: private-google-calendars-9e0ed51792e9270a576ac0d1dc550b71 + +info: + name: > + Private Google Calendars <= 20231125 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e276cc49-2da1-4e2f-bb64-28ffe6ec9acf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/private-google-calendars/" + google-query: inurl:"/wp-content/plugins/private-google-calendars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,private-google-calendars,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/private-google-calendars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "private-google-calendars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20231125') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/private-messages-for-wordpress-28a0fb0e5795f11d3d7f2a955c95e65c.yaml b/nuclei-templates/cve-less/plugins/private-messages-for-wordpress-28a0fb0e5795f11d3d7f2a955c95e65c.yaml new file mode 100644 index 0000000000..81acd2516a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/private-messages-for-wordpress-28a0fb0e5795f11d3d7f2a955c95e65c.yaml @@ -0,0 +1,58 @@ +id: private-messages-for-wordpress-28a0fb0e5795f11d3d7f2a955c95e65c + +info: + name: > + Private Messages For WordPress <= 2.1.10 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a75020c0-8286-449a-9c51-0b1488350f09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/private-messages-for-wordpress/" + google-query: inurl:"/wp-content/plugins/private-messages-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,private-messages-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/private-messages-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "private-messages-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/private-messages-for-wordpress-9a33307ee1f701bb2a441949f0f7229e.yaml b/nuclei-templates/cve-less/plugins/private-messages-for-wordpress-9a33307ee1f701bb2a441949f0f7229e.yaml new file mode 100644 index 0000000000..f6c454c7de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/private-messages-for-wordpress-9a33307ee1f701bb2a441949f0f7229e.yaml @@ -0,0 +1,58 @@ +id: private-messages-for-wordpress-9a33307ee1f701bb2a441949f0f7229e + +info: + name: > + Private Messages For WordPress <= 2.1.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cd7dfb3-bc73-4f6a-9827-0003452ebf59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/private-messages-for-wordpress/" + google-query: inurl:"/wp-content/plugins/private-messages-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,private-messages-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/private-messages-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "private-messages-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/private-only-ec43ca1bf1629851ca9458501102a544.yaml b/nuclei-templates/cve-less/plugins/private-only-ec43ca1bf1629851ca9458501102a544.yaml new file mode 100644 index 0000000000..0cac81f3f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/private-only-ec43ca1bf1629851ca9458501102a544.yaml @@ -0,0 +1,58 @@ +id: private-only-ec43ca1bf1629851ca9458501102a544 + +info: + name: > + Private Only <= 3.5.1 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85790564-811c-4087-ad36-345e443ae9f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/private-only/" + google-query: inurl:"/wp-content/plugins/private-only/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,private-only,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/private-only/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "private-only" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pro-links-maintainer-dev-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/pro-links-maintainer-dev-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a3b5c60f88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pro-links-maintainer-dev-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: pro-links-maintainer-dev-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pro-links-maintainer-dev/" + google-query: inurl:"/wp-content/plugins/pro-links-maintainer-dev/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pro-links-maintainer-dev,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pro-links-maintainer-dev/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pro-links-maintainer-dev" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pro-mime-types-2434cb0fd5a6747f4ecee8f99db9624f.yaml b/nuclei-templates/cve-less/plugins/pro-mime-types-2434cb0fd5a6747f4ecee8f99db9624f.yaml new file mode 100644 index 0000000000..25aab30833 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pro-mime-types-2434cb0fd5a6747f4ecee8f99db9624f.yaml @@ -0,0 +1,58 @@ +id: pro-mime-types-2434cb0fd5a6747f4ecee8f99db9624f + +info: + name: > + Pro Mime Types <= 1.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7db3d45-2b96-4ba4-b258-08ee5e0b947b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pro-mime-types/" + google-query: inurl:"/wp-content/plugins/pro-mime-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pro-mime-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pro-mime-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pro-mime-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pro-mime-types-cd2ecefb429545511e8b1657a942d790.yaml b/nuclei-templates/cve-less/plugins/pro-mime-types-cd2ecefb429545511e8b1657a942d790.yaml new file mode 100644 index 0000000000..e394f4ca32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pro-mime-types-cd2ecefb429545511e8b1657a942d790.yaml @@ -0,0 +1,58 @@ +id: pro-mime-types-cd2ecefb429545511e8b1657a942d790 + +info: + name: > + Pro Mime Types - Manage file media types <= 1.0.7 - Cross-Site Request Forgery via pmt_settings_section_callback_tab_1 + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f68ac2b8-33dc-4cc2-b0f3-8777450e39f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pro-mime-types/" + google-query: inurl:"/wp-content/plugins/pro-mime-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pro-mime-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pro-mime-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pro-mime-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/process-steps-template-designer-305166b60791f108d5e7fe6f43ded2e7.yaml b/nuclei-templates/cve-less/plugins/process-steps-template-designer-305166b60791f108d5e7fe6f43ded2e7.yaml new file mode 100644 index 0000000000..312d99ddb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/process-steps-template-designer-305166b60791f108d5e7fe6f43ded2e7.yaml @@ -0,0 +1,58 @@ +id: process-steps-template-designer-305166b60791f108d5e7fe6f43ded2e7 + +info: + name: > + Process Steps Template Designer <= 1.2.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a98f6a68-5863-4147-86c4-8c19af469be3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/process-steps-template-designer/" + google-query: inurl:"/wp-content/plugins/process-steps-template-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,process-steps-template-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/process-steps-template-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "process-steps-template-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/process-steps-template-designer-dc3e0c6c532d55735bad2ab0a9b29d39.yaml b/nuclei-templates/cve-less/plugins/process-steps-template-designer-dc3e0c6c532d55735bad2ab0a9b29d39.yaml new file mode 100644 index 0000000000..97e5109922 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/process-steps-template-designer-dc3e0c6c532d55735bad2ab0a9b29d39.yaml @@ -0,0 +1,58 @@ +id: process-steps-template-designer-dc3e0c6c532d55735bad2ab0a9b29d39 + +info: + name: > + Process Steps Template Designer <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2acd40d5-8a9c-4ca8-9c89-5bf639b1c66c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/process-steps-template-designer/" + google-query: inurl:"/wp-content/plugins/process-steps-template-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,process-steps-template-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/process-steps-template-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "process-steps-template-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/producer-retailer-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/producer-retailer-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..95092d715a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/producer-retailer-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: producer-retailer-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/producer-retailer/" + google-query: inurl:"/wp-content/plugins/producer-retailer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,producer-retailer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/producer-retailer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "producer-retailer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-blocks-0fda2513a52a35861fc96a4bfe4d416a.yaml b/nuclei-templates/cve-less/plugins/product-blocks-0fda2513a52a35861fc96a4bfe4d416a.yaml new file mode 100644 index 0000000000..1e28ee6cac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-blocks-0fda2513a52a35861fc96a4bfe4d416a.yaml @@ -0,0 +1,58 @@ +id: product-blocks-0fda2513a52a35861fc96a4bfe4d416a + +info: + name: > + ProductX – WooCommerce Builder & Gutenberg WooCommerce Blocks <= 3.1.4 - PHP Object Injection via wopb_wishlist and wopb_compare + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/470285d6-b309-409c-b2c3-8766a0cf9e98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-blocks/" + google-query: inurl:"/wp-content/plugins/product-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-blocks-1a920eb903d024c035ef8c5bd825169f.yaml b/nuclei-templates/cve-less/plugins/product-blocks-1a920eb903d024c035ef8c5bd825169f.yaml new file mode 100644 index 0000000000..9f02a36776 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-blocks-1a920eb903d024c035ef8c5bd825169f.yaml @@ -0,0 +1,58 @@ +id: product-blocks-1a920eb903d024c035ef8c5bd825169f + +info: + name: > + ProductX – Gutenberg WooCommerce Blocks <= 2.7.8 - Missing Authorization via option_data_save + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1aa6c8b-8231-49f1-a30a-fc1a03813221?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-blocks/" + google-query: inurl:"/wp-content/plugins/product-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-blocks-52b32717fd3d0ae5a10aa7d3c77cb89f.yaml b/nuclei-templates/cve-less/plugins/product-blocks-52b32717fd3d0ae5a10aa7d3c77cb89f.yaml new file mode 100644 index 0000000000..b980b7e923 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-blocks-52b32717fd3d0ae5a10aa7d3c77cb89f.yaml @@ -0,0 +1,58 @@ +id: product-blocks-52b32717fd3d0ae5a10aa7d3c77cb89f + +info: + name: > + ProductX – Gutenberg WooCommerce Blocks – WooCommerce Builder, Wishlist for WooCommerce, Products Comparison, Quick View, Online Store – All in One Solution <= 2.2.5 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ee19031-1e48-43b6-b492-980f2610f6cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-blocks/" + google-query: inurl:"/wp-content/plugins/product-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-carousel-slider-for-woocommerce-c121370e7ba5758271f409501c03a844.yaml b/nuclei-templates/cve-less/plugins/product-carousel-slider-for-woocommerce-c121370e7ba5758271f409501c03a844.yaml new file mode 100644 index 0000000000..cddff44128 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-carousel-slider-for-woocommerce-c121370e7ba5758271f409501c03a844.yaml @@ -0,0 +1,58 @@ +id: product-carousel-slider-for-woocommerce-c121370e7ba5758271f409501c03a844 + +info: + name: > + WooCommerce Product Carousel Slider <= 3.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6f6dab2-da03-43b6-b9c1-ebc6a7e1d1c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-carousel-slider-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-carousel-slider-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-carousel-slider-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-carousel-slider-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-carousel-slider-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-catalog-8-f04f87a896e55745312276c242be448b.yaml b/nuclei-templates/cve-less/plugins/product-catalog-8-f04f87a896e55745312276c242be448b.yaml new file mode 100644 index 0000000000..dae0f13fc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-catalog-8-f04f87a896e55745312276c242be448b.yaml @@ -0,0 +1,58 @@ +id: product-catalog-8-f04f87a896e55745312276c242be448b + +info: + name: > + Product Catalog 8 <= 1.2.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc01bb79-67cd-40d8-b0e0-1853df1aa3c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-catalog-8/" + google-query: inurl:"/wp-content/plugins/product-catalog-8/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-catalog-8,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-catalog-8/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-catalog-8" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-catalog-feed-0c4b1084930aeba75c764a4b807cb55a.yaml b/nuclei-templates/cve-less/plugins/product-catalog-feed-0c4b1084930aeba75c764a4b807cb55a.yaml new file mode 100644 index 0000000000..d0c8dd355d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-catalog-feed-0c4b1084930aeba75c764a4b807cb55a.yaml @@ -0,0 +1,58 @@ +id: product-catalog-feed-0c4b1084930aeba75c764a4b807cb55a + +info: + name: > + Product Catalog Feed by PixelYourSite <= 2.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09547dae-85dc-481d-9eb1-423d8faadc80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-catalog-feed/" + google-query: inurl:"/wp-content/plugins/product-catalog-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-catalog-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-catalog-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-catalog-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-catalog-feed-14b3d9da0216be6cd75720390cc32eeb.yaml b/nuclei-templates/cve-less/plugins/product-catalog-feed-14b3d9da0216be6cd75720390cc32eeb.yaml new file mode 100644 index 0000000000..d3dbaa717d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-catalog-feed-14b3d9da0216be6cd75720390cc32eeb.yaml @@ -0,0 +1,58 @@ +id: product-catalog-feed-14b3d9da0216be6cd75720390cc32eeb + +info: + name: > + Product Catalog Feed by PixelYourSite <= 2.1.0 - Reflected Cross-Site Scripting via 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18d33d68-9719-4e74-a594-bc4add38ceee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-catalog-feed/" + google-query: inurl:"/wp-content/plugins/product-catalog-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-catalog-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-catalog-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-catalog-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-catalog-feed-de6904b30338b532fe232a4eed04dacc.yaml b/nuclei-templates/cve-less/plugins/product-catalog-feed-de6904b30338b532fe232a4eed04dacc.yaml new file mode 100644 index 0000000000..588942117a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-catalog-feed-de6904b30338b532fe232a4eed04dacc.yaml @@ -0,0 +1,58 @@ +id: product-catalog-feed-de6904b30338b532fe232a4eed04dacc + +info: + name: > + Product Catalog Feed by PixelYourSite <= 2.1.0 - Reflected Cross-Site Scripting via 'edit' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d82d1dd2-b5b5-490a-92e5-1a4d4ab0085d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-catalog-feed/" + google-query: inurl:"/wp-content/plugins/product-catalog-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-catalog-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-catalog-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-catalog-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-category-tree-15b4a0b7ca6834b3f08ed0acfa9781a1.yaml b/nuclei-templates/cve-less/plugins/product-category-tree-15b4a0b7ca6834b3f08ed0acfa9781a1.yaml new file mode 100644 index 0000000000..4ee54ef98b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-category-tree-15b4a0b7ca6834b3f08ed0acfa9781a1.yaml @@ -0,0 +1,58 @@ +id: product-category-tree-15b4a0b7ca6834b3f08ed0acfa9781a1 + +info: + name: > + Product Category Tree <= 2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e03ecc0-5ca1-4d64-a6d7-257325bcc5cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-category-tree/" + google-query: inurl:"/wp-content/plugins/product-category-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-category-tree,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-category-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-category-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-category-tree-7e41870e8c673b23f19244598ea8ebcd.yaml b/nuclei-templates/cve-less/plugins/product-category-tree-7e41870e8c673b23f19244598ea8ebcd.yaml new file mode 100644 index 0000000000..87becc1cd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-category-tree-7e41870e8c673b23f19244598ea8ebcd.yaml @@ -0,0 +1,58 @@ +id: product-category-tree-7e41870e8c673b23f19244598ea8ebcd + +info: + name: > + Product Category Tree <= 2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88840d66-1644-4af0-b811-41f0e9fe2c0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-category-tree/" + google-query: inurl:"/wp-content/plugins/product-category-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-category-tree,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-category-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-category-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-category-tree-93d68a604c1f31fabc010b04974afd20.yaml b/nuclei-templates/cve-less/plugins/product-category-tree-93d68a604c1f31fabc010b04974afd20.yaml new file mode 100644 index 0000000000..9e522198a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-category-tree-93d68a604c1f31fabc010b04974afd20.yaml @@ -0,0 +1,58 @@ +id: product-category-tree-93d68a604c1f31fabc010b04974afd20 + +info: + name: > + Product Category Tree <= 2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/147e47f8-c40b-4ae7-8627-b32b36e4d14f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-category-tree/" + google-query: inurl:"/wp-content/plugins/product-category-tree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-category-tree,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-category-tree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-category-tree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-code-for-woocommerce-e4183cf6c320dd4a4188939a38d36eca.yaml b/nuclei-templates/cve-less/plugins/product-code-for-woocommerce-e4183cf6c320dd4a4188939a38d36eca.yaml new file mode 100644 index 0000000000..da3b49d1db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-code-for-woocommerce-e4183cf6c320dd4a4188939a38d36eca.yaml @@ -0,0 +1,58 @@ +id: product-code-for-woocommerce-e4183cf6c320dd4a4188939a38d36eca + +info: + name: > + Product Code for WooCommerce <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0be84866-2a49-42da-b498-962fc1bcb811?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-code-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-code-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-code-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-code-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-code-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-delivery-date-for-woocommerce-lite-84ccfe3dbfa257fc01b0e4c65174ef35.yaml b/nuclei-templates/cve-less/plugins/product-delivery-date-for-woocommerce-lite-84ccfe3dbfa257fc01b0e4c65174ef35.yaml new file mode 100644 index 0000000000..9eaa37d510 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-delivery-date-for-woocommerce-lite-84ccfe3dbfa257fc01b0e4c65174ef35.yaml @@ -0,0 +1,58 @@ +id: product-delivery-date-for-woocommerce-lite-84ccfe3dbfa257fc01b0e4c65174ef35 + +info: + name: > + Product Delivery Date for WooCommerce – Lite <= 2.7.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a32ae77-3d4e-4fd4-a43a-7d1a52dcfa77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-delivery-date-for-woocommerce-lite/" + google-query: inurl:"/wp-content/plugins/product-delivery-date-for-woocommerce-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-delivery-date-for-woocommerce-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-delivery-date-for-woocommerce-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-delivery-date-for-woocommerce-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-designer-929aa721697458bc99a1b54c167ebc87.yaml b/nuclei-templates/cve-less/plugins/product-designer-929aa721697458bc99a1b54c167ebc87.yaml new file mode 100644 index 0000000000..23b4dc9d87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-designer-929aa721697458bc99a1b54c167ebc87.yaml @@ -0,0 +1,58 @@ +id: product-designer-929aa721697458bc99a1b54c167ebc87 + +info: + name: > + Product Designer <= 1.0.32 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c28e2aba-73eb-43f9-bae9-a78a67e6207c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-designer/" + google-query: inurl:"/wp-content/plugins/product-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-designer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-expiry-for-woocommerce-c7b36bc8204aa5070cf82a1f950c7e42.yaml b/nuclei-templates/cve-less/plugins/product-expiry-for-woocommerce-c7b36bc8204aa5070cf82a1f950c7e42.yaml new file mode 100644 index 0000000000..ac3802f3f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-expiry-for-woocommerce-c7b36bc8204aa5070cf82a1f950c7e42.yaml @@ -0,0 +1,58 @@ +id: product-expiry-for-woocommerce-c7b36bc8204aa5070cf82a1f950c7e42 + +info: + name: > + Product Expiry for WooCommerce <= 2.5 - Missing Authorization to Authenticated (Subscriber+) Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4006612-770a-482f-a8c2-e62f607914a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-expiry-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-expiry-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-expiry-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-expiry-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-expiry-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-filter-for-woocommerce-product-a3db779bffaf01ac0439d97b043e7b9e.yaml b/nuclei-templates/cve-less/plugins/product-filter-for-woocommerce-product-a3db779bffaf01ac0439d97b043e7b9e.yaml new file mode 100644 index 0000000000..5d84a3df07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-filter-for-woocommerce-product-a3db779bffaf01ac0439d97b043e7b9e.yaml @@ -0,0 +1,58 @@ +id: product-filter-for-woocommerce-product-a3db779bffaf01ac0439d97b043e7b9e + +info: + name: > + Product Filter For WooCommerce Product <= 1.3.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d52d3291-838a-4b23-b969-8c6273faec1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-filter-for-woocommerce-product/" + google-query: inurl:"/wp-content/plugins/product-filter-for-woocommerce-product/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-filter-for-woocommerce-product,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-filter-for-woocommerce-product/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-filter-for-woocommerce-product" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-gtin-ean-upc-isbn-for-woocommerce-bfa3bdf21b692d54c0876a9ef34f70f6.yaml b/nuclei-templates/cve-less/plugins/product-gtin-ean-upc-isbn-for-woocommerce-bfa3bdf21b692d54c0876a9ef34f70f6.yaml new file mode 100644 index 0000000000..31aba45cc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-gtin-ean-upc-isbn-for-woocommerce-bfa3bdf21b692d54c0876a9ef34f70f6.yaml @@ -0,0 +1,58 @@ +id: product-gtin-ean-upc-isbn-for-woocommerce-bfa3bdf21b692d54c0876a9ef34f70f6 + +info: + name: > + Product GTIN (EAN, UPC, ISBN) for WooCommerce <= 1.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba4ab6fc-340c-442b-9b8e-b5534fd9c3be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-gtin-ean-upc-isbn-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-gtin-ean-upc-isbn-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-gtin-ean-upc-isbn-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-gtin-ean-upc-isbn-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-gtin-ean-upc-isbn-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-image-watermark-for-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/product-image-watermark-for-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c5b43d560a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-image-watermark-for-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: product-image-watermark-for-woo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-image-watermark-for-woo/" + google-query: inurl:"/wp-content/plugins/product-image-watermark-for-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-image-watermark-for-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-image-watermark-for-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-image-watermark-for-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-import-export-for-woo-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml b/nuclei-templates/cve-less/plugins/product-import-export-for-woo-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml new file mode 100644 index 0000000000..a02393fdb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-import-export-for-woo-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml @@ -0,0 +1,58 @@ +id: product-import-export-for-woo-1ebbd9b3a9a4deb3ba553d086f3295e1 + +info: + name: > + Product Import Export for WooCommerce <= 1.7.4 - Missing Authorization to CSV Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cab1d5a0-66e0-4017-8563-f8e582a6f964?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-import-export-for-woo/" + google-query: inurl:"/wp-content/plugins/product-import-export-for-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-import-export-for-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-import-export-for-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-import-export-for-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-import-export-for-woo-ab754796885789e2785d22756395f374.yaml b/nuclei-templates/cve-less/plugins/product-import-export-for-woo-ab754796885789e2785d22756395f374.yaml new file mode 100644 index 0000000000..61a24905e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-import-export-for-woo-ab754796885789e2785d22756395f374.yaml @@ -0,0 +1,58 @@ +id: product-import-export-for-woo-ab754796885789e2785d22756395f374 + +info: + name: > + Product Import Export for WooCommerce <= 2.4.1 - Authenticated(Shop Manager+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c495ac39-c99b-423d-a601-d0bfcc514ebe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-import-export-for-woo/" + google-query: inurl:"/wp-content/plugins/product-import-export-for-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-import-export-for-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-import-export-for-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-import-export-for-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-import-export-for-woo-d62fba94114c42d1399d83bf9ba0a989.yaml b/nuclei-templates/cve-less/plugins/product-import-export-for-woo-d62fba94114c42d1399d83bf9ba0a989.yaml new file mode 100644 index 0000000000..da9c770792 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-import-export-for-woo-d62fba94114c42d1399d83bf9ba0a989.yaml @@ -0,0 +1,58 @@ +id: product-import-export-for-woo-d62fba94114c42d1399d83bf9ba0a989 + +info: + name: > + Product Import Export for WooCommerce <= 2.3.7 - Authenticated(Shop Manager+) Arbitrary File Upload via upload_import_file + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cee6a100-cda5-48a6-9f9c-ea17f80c4165?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-import-export-for-woo/" + google-query: inurl:"/wp-content/plugins/product-import-export-for-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-import-export-for-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-import-export-for-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-import-export-for-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-input-fields-for-woocommerce-2ce3f934989f3f09920f8b67a7a75fec.yaml b/nuclei-templates/cve-less/plugins/product-input-fields-for-woocommerce-2ce3f934989f3f09920f8b67a7a75fec.yaml new file mode 100644 index 0000000000..eac05623b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-input-fields-for-woocommerce-2ce3f934989f3f09920f8b67a7a75fec.yaml @@ -0,0 +1,58 @@ +id: product-input-fields-for-woocommerce-2ce3f934989f3f09920f8b67a7a75fec + +info: + name: > + Product Input Fields for WooCommerce <= 1.2.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01e41573-9329-48e1-9191-e8e1532f7afc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-input-fields-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-input-fields-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-input-fields-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-input-fields-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-input-fields-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-input-fields-for-woocommerce-95b404a39a8029acce6d04daae5f2eac.yaml b/nuclei-templates/cve-less/plugins/product-input-fields-for-woocommerce-95b404a39a8029acce6d04daae5f2eac.yaml new file mode 100644 index 0000000000..957ece0447 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-input-fields-for-woocommerce-95b404a39a8029acce6d04daae5f2eac.yaml @@ -0,0 +1,58 @@ +id: product-input-fields-for-woocommerce-95b404a39a8029acce6d04daae5f2eac + +info: + name: > + Product Input Fields for WooCommerce <= 1.7.0 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2123a3cc-08f1-4e30-ac61-275d45cd1227?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-input-fields-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-input-fields-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-input-fields-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-input-fields-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-input-fields-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-loops-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/product-loops-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..eae5aabf3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-loops-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: product-loops-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-loops/" + google-query: inurl:"/wp-content/plugins/product-loops/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-loops,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-loops/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-loops" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-of-the-day-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/product-of-the-day-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..6e6f514c23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-of-the-day-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: product-of-the-day-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-of-the-day-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-of-the-day-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-of-the-day-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-of-the-day-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-of-the-day-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-page-shipping-calculator-for-woocommerce-16f12614c7a820b2ff0d5295346d446f.yaml b/nuclei-templates/cve-less/plugins/product-page-shipping-calculator-for-woocommerce-16f12614c7a820b2ff0d5295346d446f.yaml new file mode 100644 index 0000000000..1ecb899595 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-page-shipping-calculator-for-woocommerce-16f12614c7a820b2ff0d5295346d446f.yaml @@ -0,0 +1,58 @@ +id: product-page-shipping-calculator-for-woocommerce-16f12614c7a820b2ff0d5295346d446f + +info: + name: > + Product page shipping calculator for WooCommerce <= 1.3.20 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed0a37cc-49db-4919-8d0d-cb7739332229?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-page-shipping-calculator-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-page-shipping-calculator-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-page-shipping-calculator-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-page-shipping-calculator-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-page-shipping-calculator-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-page-shipping-calculator-for-woocommerce-eb2fd42fe2d2e213e39c0b11404601e5.yaml b/nuclei-templates/cve-less/plugins/product-page-shipping-calculator-for-woocommerce-eb2fd42fe2d2e213e39c0b11404601e5.yaml new file mode 100644 index 0000000000..da29542429 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-page-shipping-calculator-for-woocommerce-eb2fd42fe2d2e213e39c0b11404601e5.yaml @@ -0,0 +1,58 @@ +id: product-page-shipping-calculator-for-woocommerce-eb2fd42fe2d2e213e39c0b11404601e5 + +info: + name: > + Product page shipping calculator for WooCommerce <= 1.3.25 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3663b35d-13ac-4d65-80bd-5800ed74f759?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-page-shipping-calculator-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-page-shipping-calculator-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-page-shipping-calculator-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-page-shipping-calculator-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-page-shipping-calculator-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-preview-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/product-preview-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..a4a1d966b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-preview-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: product-preview-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-preview-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-preview-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-preview-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-preview-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-preview-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-recommendation-quiz-for-ecommerce-bc983a8f571310dd96f9e038e97c3ba7.yaml b/nuclei-templates/cve-less/plugins/product-recommendation-quiz-for-ecommerce-bc983a8f571310dd96f9e038e97c3ba7.yaml new file mode 100644 index 0000000000..9da1303e42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-recommendation-quiz-for-ecommerce-bc983a8f571310dd96f9e038e97c3ba7.yaml @@ -0,0 +1,58 @@ +id: product-recommendation-quiz-for-ecommerce-bc983a8f571310dd96f9e038e97c3ba7 + +info: + name: > + Product Recommendation Quiz for eCommerce <= 2.1.0 - Missing Authorization in prq_set_token + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f10ae2b6-1580-418c-9cf7-e75ed71bb309?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-recommendation-quiz-for-ecommerce/" + google-query: inurl:"/wp-content/plugins/product-recommendation-quiz-for-ecommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-recommendation-quiz-for-ecommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-recommendation-quiz-for-ecommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-recommendation-quiz-for-ecommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-reviews-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml b/nuclei-templates/cve-less/plugins/product-reviews-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml new file mode 100644 index 0000000000..d67b46c9ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-reviews-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml @@ -0,0 +1,58 @@ +id: product-reviews-import-export-for-woocommerce-0088814ed74fd156e9ee132de51ef1d2 + +info: + name: > + WebToffee Plugins <= (Various Versions) - Arbitrary User Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27ac48a7-52ee-46cb-a6d0-efbd2b516445?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-reviews-import-export-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-reviews-import-export-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-reviews-import-export-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-reviews-import-export-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-reviews-import-export-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-reviews-import-export-for-woocommerce-2fb579c97de9a06544ccd98cdd1f1a82.yaml b/nuclei-templates/cve-less/plugins/product-reviews-import-export-for-woocommerce-2fb579c97de9a06544ccd98cdd1f1a82.yaml new file mode 100644 index 0000000000..f86615d9ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-reviews-import-export-for-woocommerce-2fb579c97de9a06544ccd98cdd1f1a82.yaml @@ -0,0 +1,58 @@ +id: product-reviews-import-export-for-woocommerce-2fb579c97de9a06544ccd98cdd1f1a82 + +info: + name: > + Product Reviews Import Export for WooCommerce <= 1.4.8 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6650eb7-143f-4c8f-b18f-056fc82972fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-reviews-import-export-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-reviews-import-export-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-reviews-import-export-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-reviews-import-export-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-reviews-import-export-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-size-chart-for-woo-f18aed8f26180438e01da09d99987534.yaml b/nuclei-templates/cve-less/plugins/product-size-chart-for-woo-f18aed8f26180438e01da09d99987534.yaml new file mode 100644 index 0000000000..2485ec6a7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-size-chart-for-woo-f18aed8f26180438e01da09d99987534.yaml @@ -0,0 +1,58 @@ +id: product-size-chart-for-woo-f18aed8f26180438e01da09d99987534 + +info: + name: > + Product Size Chart For WooCommerce <= 1.1.5 - Cross-Site Request Forgery via get_save_option + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e15f804-f5a9-4e29-8aeb-4ba2b116dc46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-size-chart-for-woo/" + google-query: inurl:"/wp-content/plugins/product-size-chart-for-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-size-chart-for-woo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-size-chart-for-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-size-chart-for-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-slider-for-woocommerce-lite-95618d186dc4c7ea88896374745039e9.yaml b/nuclei-templates/cve-less/plugins/product-slider-for-woocommerce-lite-95618d186dc4c7ea88896374745039e9.yaml new file mode 100644 index 0000000000..42ece68a41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-slider-for-woocommerce-lite-95618d186dc4c7ea88896374745039e9.yaml @@ -0,0 +1,58 @@ +id: product-slider-for-woocommerce-lite-95618d186dc4c7ea88896374745039e9 + +info: + name: > + Product Slider For WooCommerce Lite <= 1.1.7 - Authenticated(Contributor+) Stored Cross-Site Scripting via Meta Keys + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8159ee7c-69ac-4422-ba8b-664f1fee8e07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-slider-for-woocommerce-lite/" + google-query: inurl:"/wp-content/plugins/product-slider-for-woocommerce-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-slider-for-woocommerce-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-slider-for-woocommerce-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-slider-for-woocommerce-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-specifications-5e59a8e30610325be11fabed812368f9.yaml b/nuclei-templates/cve-less/plugins/product-specifications-5e59a8e30610325be11fabed812368f9.yaml new file mode 100644 index 0000000000..2c7e408f2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-specifications-5e59a8e30610325be11fabed812368f9.yaml @@ -0,0 +1,58 @@ +id: product-specifications-5e59a8e30610325be11fabed812368f9 + +info: + name: > + Product Specifications for Woocommerce <= 0.6.0 - Reflected Cross-Site Scripting via Arbitrary Query String Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/916d4f2f-769b-4902-9464-f55d8f64c9d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-specifications/" + google-query: inurl:"/wp-content/plugins/product-specifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-specifications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-specifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-specifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-tabs-manager-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/product-tabs-manager-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..c4a2687a6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-tabs-manager-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: product-tabs-manager-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-tabs-manager-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-tabs-manager-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-tabs-manager-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-tabs-manager-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-tabs-manager-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-variation-swatches-for-woocommerce-51f425b2b47157be5d941492e7da4019.yaml b/nuclei-templates/cve-less/plugins/product-variation-swatches-for-woocommerce-51f425b2b47157be5d941492e7da4019.yaml new file mode 100644 index 0000000000..a20ae90451 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-variation-swatches-for-woocommerce-51f425b2b47157be5d941492e7da4019.yaml @@ -0,0 +1,58 @@ +id: product-variation-swatches-for-woocommerce-51f425b2b47157be5d941492e7da4019 + +info: + name: > + Variation Swatches for WooCommerce <= 2.1.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9a77b4f-46a3-45d3-bf2b-448584125874?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-variation-swatches-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-variation-swatches-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-variation-swatches-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-variation-swatches-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-variation-swatches-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-visibility-by-country-for-woocommerce-aa1854785cf9c11ed11fbc4dacf9e3b9.yaml b/nuclei-templates/cve-less/plugins/product-visibility-by-country-for-woocommerce-aa1854785cf9c11ed11fbc4dacf9e3b9.yaml new file mode 100644 index 0000000000..14c6d13568 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-visibility-by-country-for-woocommerce-aa1854785cf9c11ed11fbc4dacf9e3b9.yaml @@ -0,0 +1,58 @@ +id: product-visibility-by-country-for-woocommerce-aa1854785cf9c11ed11fbc4dacf9e3b9 + +info: + name: > + Product Visibility by Country for WooCommerce <= 1.4.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e56b11a1-dd40-461b-9624-b60367c0c727?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-visibility-by-country-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-visibility-by-country-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-visibility-by-country-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-visibility-by-country-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-visibility-by-country-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/product-watermark-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/product-watermark-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..4e3a3fda5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/product-watermark-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: product-watermark-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/product-watermark-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/product-watermark-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,product-watermark-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/product-watermark-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "product-watermark-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/products-compare-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/products-compare-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..0b1852050f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/products-compare-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: products-compare-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/products-compare-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/products-compare-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,products-compare-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/products-compare-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "products-compare-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-00e848a455a7983930f44875cace1026.yaml b/nuclei-templates/cve-less/plugins/profile-builder-00e848a455a7983930f44875cace1026.yaml new file mode 100644 index 0000000000..3fa58e4ede --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-00e848a455a7983930f44875cace1026.yaml @@ -0,0 +1,58 @@ +id: profile-builder-00e848a455a7983930f44875cace1026 + +info: + name: > + Profile Builder <= 3.9.7 - Missing Authorization to Initial Page Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d25cca1-eb57-4ba2-8923-a3c56f41ce22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-251b86614cf3be75bb7b89fbf426f8a3.yaml b/nuclei-templates/cve-less/plugins/profile-builder-251b86614cf3be75bb7b89fbf426f8a3.yaml new file mode 100644 index 0000000000..28f9166317 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-251b86614cf3be75bb7b89fbf426f8a3.yaml @@ -0,0 +1,58 @@ +id: profile-builder-251b86614cf3be75bb7b89fbf426f8a3 + +info: + name: > + Profile Builder – User Profile & User Registration Forms < 1.1.66 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ab513d4-4cb9-4761-92af-a2224cb6a306?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.66') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-3457b59f61c052b7277e18f32edfae6a.yaml b/nuclei-templates/cve-less/plugins/profile-builder-3457b59f61c052b7277e18f32edfae6a.yaml new file mode 100644 index 0000000000..722e2cf4ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-3457b59f61c052b7277e18f32edfae6a.yaml @@ -0,0 +1,58 @@ +id: profile-builder-3457b59f61c052b7277e18f32edfae6a + +info: + name: > + Profile Builder – User Profile & User Registration Forms <= 2.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2e35679-278e-4e7d-b366-fe7d8cba7930?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-5015ecbd471db4975c3b73948587d93d.yaml b/nuclei-templates/cve-less/plugins/profile-builder-5015ecbd471db4975c3b73948587d93d.yaml new file mode 100644 index 0000000000..27150bc714 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-5015ecbd471db4975c3b73948587d93d.yaml @@ -0,0 +1,58 @@ +id: profile-builder-5015ecbd471db4975c3b73948587d93d + +info: + name: > + Profile Builder <= 3.4.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35697cf5-4494-40f6-8772-dfa417ae6bcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-69b4ec76e7e9ef35af4eba10c77eda3e.yaml b/nuclei-templates/cve-less/plugins/profile-builder-69b4ec76e7e9ef35af4eba10c77eda3e.yaml new file mode 100644 index 0000000000..ce1165aee2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-69b4ec76e7e9ef35af4eba10c77eda3e.yaml @@ -0,0 +1,58 @@ +id: profile-builder-69b4ec76e7e9ef35af4eba10c77eda3e + +info: + name: > + User Profile Builder <= 3.10.8 - Missing Authorization to Plugin Settings Change via wppb_two_factor_authentication_settings_update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23caef95-36b6-40aa-8dd7-51a376790a40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-6d25cf58ffbcaa52d33430356ac1e25b.yaml b/nuclei-templates/cve-less/plugins/profile-builder-6d25cf58ffbcaa52d33430356ac1e25b.yaml new file mode 100644 index 0000000000..79192f36e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-6d25cf58ffbcaa52d33430356ac1e25b.yaml @@ -0,0 +1,58 @@ +id: profile-builder-6d25cf58ffbcaa52d33430356ac1e25b + +info: + name: > + Profile Builder – User Profile & User Registration Forms Plugin < 1.1.60 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c62d8146-e4b1-4c86-9d8a-c3a9bbfb0763?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-70888d956fd216305358993b9594be41.yaml b/nuclei-templates/cve-less/plugins/profile-builder-70888d956fd216305358993b9594be41.yaml new file mode 100644 index 0000000000..cc9af6901f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-70888d956fd216305358993b9594be41.yaml @@ -0,0 +1,58 @@ +id: profile-builder-70888d956fd216305358993b9594be41 + +info: + name: > + Profile Builder – User Profile & User Registration Forms <= 3.9.0 - Sensitive Information Disclosure via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbedad66-a5a6-4fb5-b03e-0ecf9fbef19a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-70dc7e4179ee1658845e3eaa45bb0f0f.yaml b/nuclei-templates/cve-less/plugins/profile-builder-70dc7e4179ee1658845e3eaa45bb0f0f.yaml new file mode 100644 index 0000000000..b3a7515911 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-70dc7e4179ee1658845e3eaa45bb0f0f.yaml @@ -0,0 +1,58 @@ +id: profile-builder-70dc7e4179ee1658845e3eaa45bb0f0f + +info: + name: > + Profile Builder <= 2.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc358df9-7930-44da-8b33-d39db8a87b20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-8f79685201a214e5aabf85b86caf9624.yaml b/nuclei-templates/cve-less/plugins/profile-builder-8f79685201a214e5aabf85b86caf9624.yaml new file mode 100644 index 0000000000..75ff82e80c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-8f79685201a214e5aabf85b86caf9624.yaml @@ -0,0 +1,58 @@ +id: profile-builder-8f79685201a214e5aabf85b86caf9624 + +info: + name: > + Profile Builder <= 3.4.8 - Admin Access via Password Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63c74d96-84da-408f-ba2c-cde0ff108bf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-960773bb26ec71f2b5c7ab22a6dcda0e.yaml b/nuclei-templates/cve-less/plugins/profile-builder-960773bb26ec71f2b5c7ab22a6dcda0e.yaml new file mode 100644 index 0000000000..b225141fef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-960773bb26ec71f2b5c7ab22a6dcda0e.yaml @@ -0,0 +1,58 @@ +id: profile-builder-960773bb26ec71f2b5c7ab22a6dcda0e + +info: + name: > + Profile Builder/Profile Builder Pro <= 3.3.2 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/502724d9-ccc4-42db-bc1e-c521f7c80e70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-9785eac397f218ab171d469467f03925.yaml b/nuclei-templates/cve-less/plugins/profile-builder-9785eac397f218ab171d469467f03925.yaml new file mode 100644 index 0000000000..571111eaca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-9785eac397f218ab171d469467f03925.yaml @@ -0,0 +1,58 @@ +id: profile-builder-9785eac397f218ab171d469467f03925 + +info: + name: > + Profile Builder <= 2.4.0 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2caed42f-fb5b-488a-af15-f5ad3d82a68c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-a0c7f584a89a83d8f5abdb6a2467eb51.yaml b/nuclei-templates/cve-less/plugins/profile-builder-a0c7f584a89a83d8f5abdb6a2467eb51.yaml new file mode 100644 index 0000000000..9b8d307e90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-a0c7f584a89a83d8f5abdb6a2467eb51.yaml @@ -0,0 +1,58 @@ +id: profile-builder-a0c7f584a89a83d8f5abdb6a2467eb51 + +info: + name: > + Profile Builder <= 2.1.3 - Missing Access Controls + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bd80ab9-260a-46c5-949e-c1d5dcb32523?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-adf6fac31c64a896c3bd8abd21897c4e.yaml b/nuclei-templates/cve-less/plugins/profile-builder-adf6fac31c64a896c3bd8abd21897c4e.yaml new file mode 100644 index 0000000000..3fb9bc0092 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-adf6fac31c64a896c3bd8abd21897c4e.yaml @@ -0,0 +1,58 @@ +id: profile-builder-adf6fac31c64a896c3bd8abd21897c4e + +info: + name: > + Profile Builder – User Profile & User Registration Forms <= 3.9.0 - Insecure Password Reset Mechanism + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e731292a-4f95-46eb-889e-b00d58f3444e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-c416c9eed88376e68372de18ba7ac866.yaml b/nuclei-templates/cve-less/plugins/profile-builder-c416c9eed88376e68372de18ba7ac866.yaml new file mode 100644 index 0000000000..b4ff559dd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-c416c9eed88376e68372de18ba7ac866.yaml @@ -0,0 +1,58 @@ +id: profile-builder-c416c9eed88376e68372de18ba7ac866 + +info: + name: > + Profile Builder <= 3.11.2 - Restricted Email Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21618fba-3f57-43b2-b9ea-13484301755d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-cdefed7ec787c02fefebf6f17656a114.yaml b/nuclei-templates/cve-less/plugins/profile-builder-cdefed7ec787c02fefebf6f17656a114.yaml new file mode 100644 index 0000000000..343b772462 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-cdefed7ec787c02fefebf6f17656a114.yaml @@ -0,0 +1,58 @@ +id: profile-builder-cdefed7ec787c02fefebf6f17656a114 + +info: + name: > + Profile Builder <= 3.10.3 - Cross-Site Request Forgery via pms-cross-promotion.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0b2bdb3-713c-47c6-8907-ac0f86038dc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-d50bca474bfff7b87f9bd013b925f56e.yaml b/nuclei-templates/cve-less/plugins/profile-builder-d50bca474bfff7b87f9bd013b925f56e.yaml new file mode 100644 index 0000000000..455820348c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-d50bca474bfff7b87f9bd013b925f56e.yaml @@ -0,0 +1,58 @@ +id: profile-builder-d50bca474bfff7b87f9bd013b925f56e + +info: + name: > + Profile Builder <= 3.6.7 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b9d69c-012d-4a28-b8b1-15e6dd22979e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-d9e9e029782a4a4e5f78971a37604066.yaml b/nuclei-templates/cve-less/plugins/profile-builder-d9e9e029782a4a4e5f78971a37604066.yaml new file mode 100644 index 0000000000..c6b8420a70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-d9e9e029782a4a4e5f78971a37604066.yaml @@ -0,0 +1,58 @@ +id: profile-builder-d9e9e029782a4a4e5f78971a37604066 + +info: + name: > + Profile Builder <= 3.10.7 - Insecure Direct Object Reference to Sensitive Information Exposure via user_meta Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f515ccf8-7231-4728-b155-c47049087d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-da13e940921b9b4b286d3e79be1e9d85.yaml b/nuclei-templates/cve-less/plugins/profile-builder-da13e940921b9b4b286d3e79be1e9d85.yaml new file mode 100644 index 0000000000..d78b55da37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-da13e940921b9b4b286d3e79be1e9d85.yaml @@ -0,0 +1,58 @@ +id: profile-builder-da13e940921b9b4b286d3e79be1e9d85 + +info: + name: > + Profile Builder – User Profile & User Registration Forms <= 3.6.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b44130c-b526-4670-bde2-e47fe823ac62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-da987af29928bc75b0d20d1e2162e5dd.yaml b/nuclei-templates/cve-less/plugins/profile-builder-da987af29928bc75b0d20d1e2162e5dd.yaml new file mode 100644 index 0000000000..fd7ec515e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-da987af29928bc75b0d20d1e2162e5dd.yaml @@ -0,0 +1,58 @@ +id: profile-builder-da987af29928bc75b0d20d1e2162e5dd + +info: + name: > + Profile Builder – User Profile & User Registration Forms < 2.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0b71f57-a641-4320-bec1-670bbbfbc708?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-dc37f981ae3cabe96f1627086e8e54ca.yaml b/nuclei-templates/cve-less/plugins/profile-builder-dc37f981ae3cabe96f1627086e8e54ca.yaml new file mode 100644 index 0000000000..0aa2b2200e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-dc37f981ae3cabe96f1627086e8e54ca.yaml @@ -0,0 +1,58 @@ +id: profile-builder-dc37f981ae3cabe96f1627086e8e54ca + +info: + name: > + Profile Builder < 2.5.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4364e713-8463-4088-b198-ed8237e86d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-ed5bd7edeac7881ada7083f398663350.yaml b/nuclei-templates/cve-less/plugins/profile-builder-ed5bd7edeac7881ada7083f398663350.yaml new file mode 100644 index 0000000000..b8bda5cddb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-ed5bd7edeac7881ada7083f398663350.yaml @@ -0,0 +1,58 @@ +id: profile-builder-ed5bd7edeac7881ada7083f398663350 + +info: + name: > + Profile Builder <= 3.1.0 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fcf7283-eb6c-4fee-b606-79026e2227fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-f044be0e1e4c22699ad8261226bc2dd0.yaml b/nuclei-templates/cve-less/plugins/profile-builder-f044be0e1e4c22699ad8261226bc2dd0.yaml new file mode 100644 index 0000000000..b0e75dc271 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-f044be0e1e4c22699ad8261226bc2dd0.yaml @@ -0,0 +1,58 @@ +id: profile-builder-f044be0e1e4c22699ad8261226bc2dd0 + +info: + name: > + Profile Builder - User Profile & User Registration Forms <= 3.6.1 - Cross-Site Scripting via site_url Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8661bd7-65b7-4277-81a0-fd410ae0ee1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder/" + google-query: inurl:"/wp-content/plugins/profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-pro-47d88a978c6902943e13680f899b8407.yaml b/nuclei-templates/cve-less/plugins/profile-builder-pro-47d88a978c6902943e13680f899b8407.yaml new file mode 100644 index 0000000000..7d1cc43217 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-pro-47d88a978c6902943e13680f899b8407.yaml @@ -0,0 +1,58 @@ +id: profile-builder-pro-47d88a978c6902943e13680f899b8407 + +info: + name: > + Profile Builder Pro <= 3.10.0 - Authenticated (Subscriber+) Time-Based One-Time Password Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a388b406-1640-443d-9656-6a87588ce201?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder-pro/" + google-query: inurl:"/wp-content/plugins/profile-builder-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-pro-960773bb26ec71f2b5c7ab22a6dcda0e.yaml b/nuclei-templates/cve-less/plugins/profile-builder-pro-960773bb26ec71f2b5c7ab22a6dcda0e.yaml new file mode 100644 index 0000000000..f78025b61d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-pro-960773bb26ec71f2b5c7ab22a6dcda0e.yaml @@ -0,0 +1,58 @@ +id: profile-builder-pro-960773bb26ec71f2b5c7ab22a6dcda0e + +info: + name: > + Profile Builder/Profile Builder Pro <= 3.3.2 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/502724d9-ccc4-42db-bc1e-c521f7c80e70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder-pro/" + google-query: inurl:"/wp-content/plugins/profile-builder-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-pro-a686ec08a13b7563defc9b5263758c7f.yaml b/nuclei-templates/cve-less/plugins/profile-builder-pro-a686ec08a13b7563defc9b5263758c7f.yaml new file mode 100644 index 0000000000..b0cdd8cf39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-pro-a686ec08a13b7563defc9b5263758c7f.yaml @@ -0,0 +1,58 @@ +id: profile-builder-pro-a686ec08a13b7563defc9b5263758c7f + +info: + name: > + Profile Builder Pro <= 3.10.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/578d8ca7-7042-493d-92b4-63241b4bdfca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder-pro/" + google-query: inurl:"/wp-content/plugins/profile-builder-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-pro-b32ca2d76fc3293d68526cfa723e6bfe.yaml b/nuclei-templates/cve-less/plugins/profile-builder-pro-b32ca2d76fc3293d68526cfa723e6bfe.yaml new file mode 100644 index 0000000000..2f44bb87b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-pro-b32ca2d76fc3293d68526cfa723e6bfe.yaml @@ -0,0 +1,58 @@ +id: profile-builder-pro-b32ca2d76fc3293d68526cfa723e6bfe + +info: + name: > + Profile Builder Pro <= 3.10.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4c8932b-ede8-4f17-9612-5493c1130170?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder-pro/" + google-query: inurl:"/wp-content/plugins/profile-builder-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-builder-pro-ed5bd7edeac7881ada7083f398663350.yaml b/nuclei-templates/cve-less/plugins/profile-builder-pro-ed5bd7edeac7881ada7083f398663350.yaml new file mode 100644 index 0000000000..207265f9c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-builder-pro-ed5bd7edeac7881ada7083f398663350.yaml @@ -0,0 +1,58 @@ +id: profile-builder-pro-ed5bd7edeac7881ada7083f398663350 + +info: + name: > + Profile Builder <= 3.1.0 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fcf7283-eb6c-4fee-b606-79026e2227fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-builder-pro/" + google-query: inurl:"/wp-content/plugins/profile-builder-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-builder-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-builder-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-builder-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-extra-fields-6c56f3c8c2911fbe28d5ba7b021c7d79.yaml b/nuclei-templates/cve-less/plugins/profile-extra-fields-6c56f3c8c2911fbe28d5ba7b021c7d79.yaml new file mode 100644 index 0000000000..cc0e0df0d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-extra-fields-6c56f3c8c2911fbe28d5ba7b021c7d79.yaml @@ -0,0 +1,58 @@ +id: profile-extra-fields-6c56f3c8c2911fbe28d5ba7b021c7d79 + +info: + name: > + Profile Extra Fields by BestWebSoft < 1.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43b0cb21-ba81-4d54-90d1-a2f25297e719?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-extra-fields/" + google-query: inurl:"/wp-content/plugins/profile-extra-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-extra-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-extra-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-extra-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profile-extra-fields-be030cdf4529b191ea63fd886a20439f.yaml b/nuclei-templates/cve-less/plugins/profile-extra-fields-be030cdf4529b191ea63fd886a20439f.yaml new file mode 100644 index 0000000000..1ff024c67d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profile-extra-fields-be030cdf4529b191ea63fd886a20439f.yaml @@ -0,0 +1,58 @@ +id: profile-extra-fields-be030cdf4529b191ea63fd886a20439f + +info: + name: > + Profile Extra Fields by BestWebSoft <= 1.2.7 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/916c73e8-a150-4b35-8773-ea0ec29f7fd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profile-extra-fields/" + google-query: inurl:"/wp-content/plugins/profile-extra-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profile-extra-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profile-extra-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profile-extra-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-294749cd5a2ad1c57b32f41564fa1af1.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-294749cd5a2ad1c57b32f41564fa1af1.yaml new file mode 100644 index 0000000000..e1f954cb60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-294749cd5a2ad1c57b32f41564fa1af1.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-294749cd5a2ad1c57b32f41564fa1af1 + +info: + name: > + ProfileGrid – User Profiles, Memberships, Groups and Communities <= 5.7.9 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5be103f-e174-47f9-8a1b-bb0d073c54e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-2f992f86ff54d554aa2e677bbff33be5.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-2f992f86ff54d554aa2e677bbff33be5.yaml new file mode 100644 index 0000000000..52905c5703 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-2f992f86ff54d554aa2e677bbff33be5.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-2f992f86ff54d554aa2e677bbff33be5 + +info: + name: > + ProfileGrid – User Profiles, Memberships, Groups and Communities <= 5.0.3 - Missing Authorization to Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01cfd7db-f62d-4110-b9a4-49ff1e4e5e68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-44a5cf3e0ce958c3682da008c171fd01.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-44a5cf3e0ce958c3682da008c171fd01.yaml new file mode 100644 index 0000000000..d3c25fe863 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-44a5cf3e0ce958c3682da008c171fd01.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-44a5cf3e0ce958c3682da008c171fd01 + +info: + name: > + ProfileGrid <= 5.5.0 - Hardcoded Encryption Key + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d490bfb-6560-428e-ad91-0f8d8bc9b1f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-4a6b08579b21c259b0bca4ce2e0b2904.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-4a6b08579b21c259b0bca4ce2e0b2904.yaml new file mode 100644 index 0000000000..d2452ff256 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-4a6b08579b21c259b0bca4ce2e0b2904.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-4a6b08579b21c259b0bca4ce2e0b2904 + +info: + name: > + ProfileGrid <= 5.7.6 - Authenticated (Subscriber+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de495201-669c-4483-b30d-bb2abf6fe6c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-4ca548e170bb0185c3dab51f55775413.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-4ca548e170bb0185c3dab51f55775413.yaml new file mode 100644 index 0000000000..3660bf6cda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-4ca548e170bb0185c3dab51f55775413.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-4ca548e170bb0185c3dab51f55775413 + +info: + name: > + ProfileGrid <= 5.7.1 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6eea2cb-a2a9-4f65-9aea-b88565e47503?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-59843f563a6293fb05b21fc44ccb51b3.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-59843f563a6293fb05b21fc44ccb51b3.yaml new file mode 100644 index 0000000000..7ebd1b4bd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-59843f563a6293fb05b21fc44ccb51b3.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-59843f563a6293fb05b21fc44ccb51b3 + +info: + name: > + ProfileGrid <= 5.5.2 - Missing Authorization to Arbitrary Group Option Modification and Privilege Escalation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4766651-92a6-42c9-81bc-7ea25350f561?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-5fabed76f8f56020c1155c8f97c6681c.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-5fabed76f8f56020c1155c8f97c6681c.yaml new file mode 100644 index 0000000000..1e5ba5b6df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-5fabed76f8f56020c1155c8f97c6681c.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-5fabed76f8f56020c1155c8f97c6681c + +info: + name: > + ProfileGrid <= 5.7.8 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c4c13c9-6f43-4a4d-b825-e246bf9a1e9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-602df06e81e9929680d21f57b3d3e3d7.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-602df06e81e9929680d21f57b3d3e3d7.yaml new file mode 100644 index 0000000000..d00381b081 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-602df06e81e9929680d21f57b3d3e3d7.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-602df06e81e9929680d21f57b3d3e3d7 + +info: + name: > + ProfileGrid <= 5.5.1 - Authenticated (Subscriber+) Arbitrary Option Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/473ba791-af99-4aae-99cb-ccf220e443e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-614a90a330e23b7940675663ee8789c8.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-614a90a330e23b7940675663ee8789c8.yaml new file mode 100644 index 0000000000..506f6a97d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-614a90a330e23b7940675663ee8789c8.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-614a90a330e23b7940675663ee8789c8 + +info: + name: > + ProfileGrid <= 5.8.2 - Bypass Group Members Limit + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e1fce43-03c0-4863-bf0c-60a3c510a01d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-639feb49244de37ebd2501828b79541b.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-639feb49244de37ebd2501828b79541b.yaml new file mode 100644 index 0000000000..7590547ba6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-639feb49244de37ebd2501828b79541b.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-639feb49244de37ebd2501828b79541b + +info: + name: > + ProfileGrid <= 5.6.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71fb1cef-6e01-4bd7-b0bc-5d21295f119a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-749e9c4c45c9dfe7d4370d9e1054a6bf.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-749e9c4c45c9dfe7d4370d9e1054a6bf.yaml new file mode 100644 index 0000000000..8819d629b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-749e9c4c45c9dfe7d4370d9e1054a6bf.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-749e9c4c45c9dfe7d4370d9e1054a6bf + +info: + name: > + ProfileGrid – User Profiles, Memberships, Groups and Communities <= 5.7.9 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09b26b78-b587-42f6-a9e3-c2945e91d29e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-76473b3f668ab27ce2fcb0878efe87b4.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-76473b3f668ab27ce2fcb0878efe87b4.yaml new file mode 100644 index 0000000000..c396c9900b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-76473b3f668ab27ce2fcb0878efe87b4.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-76473b3f668ab27ce2fcb0878efe87b4 + +info: + name: > + ProfileGrid <= 5.6.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f58efd6c-58f2-464b-8aaf-f4f5c4c52f09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-7bf1226ebc8c449ae85cc65e327ee63d.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-7bf1226ebc8c449ae85cc65e327ee63d.yaml new file mode 100644 index 0000000000..1c001e3aee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-7bf1226ebc8c449ae85cc65e327ee63d.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-7bf1226ebc8c449ae85cc65e327ee63d + +info: + name: > + ProfileGrid – User Profiles, Memberships, Groups and Communities < 2.8.6 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f745652d-12d6-46cd-8599-0a42696cb45a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-865589c83192a271d43a839d1c2dd482.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-865589c83192a271d43a839d1c2dd482.yaml new file mode 100644 index 0000000000..31e7043b7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-865589c83192a271d43a839d1c2dd482.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-865589c83192a271d43a839d1c2dd482 + +info: + name: > + ProfileGrid <= 5.7.8 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9476b41d-a9a2-46a7-8cf1-62de5d1703b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-8781e1672be1a467451ab0b40e4c7713.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-8781e1672be1a467451ab0b40e4c7713.yaml new file mode 100644 index 0000000000..e3cd21d58a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-8781e1672be1a467451ab0b40e4c7713.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-8781e1672be1a467451ab0b40e4c7713 + +info: + name: > + ProfileGrid <= 5.7.2 - Authenticated (Subscriber+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2436028-9ac2-4232-bccf-26019a26e186?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-87d13bf13b6be6962a557c3627b3cfe7.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-87d13bf13b6be6962a557c3627b3cfe7.yaml new file mode 100644 index 0000000000..1bb1f14d88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-87d13bf13b6be6962a557c3627b3cfe7.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-87d13bf13b6be6962a557c3627b3cfe7 + +info: + name: > + ProfileGrid <= 5.1.7 - Authenticated (Subscriber+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9337519-0b33-43fa-9be4-2390b8b3afb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-913748097cb69a1df6b424d4a05f37a3.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-913748097cb69a1df6b424d4a05f37a3.yaml new file mode 100644 index 0000000000..8273e73f71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-913748097cb69a1df6b424d4a05f37a3.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-913748097cb69a1df6b424d4a05f37a3 + +info: + name: > + ProfileGrid <= 5.3.0 - Missing Authorization to Arbitrary Password Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58cf6e80-63dd-42dc-9c4a-7b5c092bc4cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-923942b507c5bb53ae8216a8af30479c.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-923942b507c5bb53ae8216a8af30479c.yaml new file mode 100644 index 0000000000..0fe866e843 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-923942b507c5bb53ae8216a8af30479c.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-923942b507c5bb53ae8216a8af30479c + +info: + name: > + ProfileGrid <= 5.7.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/134a3615-a9fa-48b5-8cd1-4c3fb24a777a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-a0b780503648451776551c0d1ff9b442.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-a0b780503648451776551c0d1ff9b442.yaml new file mode 100644 index 0000000000..1ca680b73f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-a0b780503648451776551c0d1ff9b442.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-a0b780503648451776551c0d1ff9b442 + +info: + name: > + ProfileGrid – User Profiles, Memberships, Groups and Communities <= 5.8.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c039d2fe-7518-4724-a025-6380a53fb58c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-b38eda58adcd55c816f6214da161bc56.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-b38eda58adcd55c816f6214da161bc56.yaml new file mode 100644 index 0000000000..f024991921 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-b38eda58adcd55c816f6214da161bc56.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-b38eda58adcd55c816f6214da161bc56 + +info: + name: > + ProfileGrid – User Profiles, Memberships, Groups and Communities <= 4.7.4 - Stored Cross-Site Scripting via Profile + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03e6fa1d-0d6a-43e9-97ff-da874a51474a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-bfc26d10316dbb147d906861f757195d.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-bfc26d10316dbb147d906861f757195d.yaml new file mode 100644 index 0000000000..a5e7f28b58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-bfc26d10316dbb147d906861f757195d.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-bfc26d10316dbb147d906861f757195d + +info: + name: > + ProfileGrid – User Profiles, Memberships, Groups and Communities <= 5.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9489254-dbdc-4754-86d0-d28756b269a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-d335e6c8c52890984157995f488f49da.yaml b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-d335e6c8c52890984157995f488f49da.yaml new file mode 100644 index 0000000000..9ef1e1f14d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profilegrid-user-profiles-groups-and-communities-d335e6c8c52890984157995f488f49da.yaml @@ -0,0 +1,58 @@ +id: profilegrid-user-profiles-groups-and-communities-d335e6c8c52890984157995f488f49da + +info: + name: > + ProfileGrid <= 5.5.1 - Missing Authorization to User Import + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b335fc19-2998-4711-8813-6cb68d7447bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + google-query: inurl:"/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profilegrid-user-profiles-groups-and-communities,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profilegrid-user-profiles-groups-and-communities/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profilegrid-user-profiles-groups-and-communities" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profit-button-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/profit-button-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..61ef9af005 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profit-button-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: profit-button-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profit-button/" + google-query: inurl:"/wp-content/plugins/profit-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profit-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profit-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profit-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-1fba8e9934d599624fea9971897c6598.yaml b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-1fba8e9934d599624fea9971897c6598.yaml new file mode 100644 index 0000000000..8878983a1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-1fba8e9934d599624fea9971897c6598.yaml @@ -0,0 +1,58 @@ +id: profit-products-tables-for-woocommerce-1fba8e9934d599624fea9971897c6598 + +info: + name: > + Active Products Tables for WooCommerce. Professional products tables for WooCommerce store <= 1.0.6.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a94841f-b1dd-44f4-b7a1-65a9fdf7b18d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profit-products-tables-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/profit-products-tables-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profit-products-tables-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profit-products-tables-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profit-products-tables-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-6a4904a703851349707d8d3d078c2123.yaml b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-6a4904a703851349707d8d3d078c2123.yaml new file mode 100644 index 0000000000..c054bf8233 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-6a4904a703851349707d8d3d078c2123.yaml @@ -0,0 +1,58 @@ +id: profit-products-tables-for-woocommerce-6a4904a703851349707d8d3d078c2123 + +info: + name: > + Active Products Tables for WooCommerce <= 1.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f18147d-60e6-447d-a6f5-6ad7b633e62c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profit-products-tables-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/profit-products-tables-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profit-products-tables-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profit-products-tables-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profit-products-tables-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-7734e62aac4f36040cb75f80a344eeea.yaml b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-7734e62aac4f36040cb75f80a344eeea.yaml new file mode 100644 index 0000000000..cbc4525079 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-7734e62aac4f36040cb75f80a344eeea.yaml @@ -0,0 +1,58 @@ +id: profit-products-tables-for-woocommerce-7734e62aac4f36040cb75f80a344eeea + +info: + name: > + Active Products Tables for WooCommerce <= 1.0.6.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1813aaca-3d5a-4650-8a8d-6b54311670f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profit-products-tables-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/profit-products-tables-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profit-products-tables-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profit-products-tables-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profit-products-tables-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-7a9d640d2710a17dd51cbd839f471ded.yaml b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-7a9d640d2710a17dd51cbd839f471ded.yaml new file mode 100644 index 0000000000..186bc786d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-7a9d640d2710a17dd51cbd839f471ded.yaml @@ -0,0 +1,58 @@ +id: profit-products-tables-for-woocommerce-7a9d640d2710a17dd51cbd839f471ded + +info: + name: > + Active Products Tables for WooCommerce <= 1.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73a83f2b-835b-44cd-9d09-1b4fba3e9c8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profit-products-tables-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/profit-products-tables-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profit-products-tables-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profit-products-tables-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profit-products-tables-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-c3011a2eec39e2ae9754cf338940cb61.yaml b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-c3011a2eec39e2ae9754cf338940cb61.yaml new file mode 100644 index 0000000000..8385da57f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-c3011a2eec39e2ae9754cf338940cb61.yaml @@ -0,0 +1,58 @@ +id: profit-products-tables-for-woocommerce-c3011a2eec39e2ae9754cf338940cb61 + +info: + name: > + Active Products Tables for WooCommerce. Professional products tables for WooCommerce store <= 1.0.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5069fbc4-b3c4-4c0b-892c-2c83f35dc2fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profit-products-tables-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/profit-products-tables-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profit-products-tables-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profit-products-tables-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profit-products-tables-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-ef26b2db7d3ee3da13d6289352e36f3b.yaml b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-ef26b2db7d3ee3da13d6289352e36f3b.yaml new file mode 100644 index 0000000000..afa7bf5250 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/profit-products-tables-for-woocommerce-ef26b2db7d3ee3da13d6289352e36f3b.yaml @@ -0,0 +1,58 @@ +id: profit-products-tables-for-woocommerce-ef26b2db7d3ee3da13d6289352e36f3b + +info: + name: > + Active Products Tables for WooCommerce <= 1.0.6 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5519d4e-84b5-4901-b55c-a0a919f4b6c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/profit-products-tables-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/profit-products-tables-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,profit-products-tables-for-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/profit-products-tables-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "profit-products-tables-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/progress-bar-941ae6e3f270ab1852f33bed4b21e75f.yaml b/nuclei-templates/cve-less/plugins/progress-bar-941ae6e3f270ab1852f33bed4b21e75f.yaml new file mode 100644 index 0000000000..0fc658fcaa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/progress-bar-941ae6e3f270ab1852f33bed4b21e75f.yaml @@ -0,0 +1,58 @@ +id: progress-bar-941ae6e3f270ab1852f33bed4b21e75f + +info: + name: > + Progress Bar <= 2.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via wppb shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/790bd89d-3913-4b43-9b00-7d4de5c4227d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/progress-bar/" + google-query: inurl:"/wp-content/plugins/progress-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,progress-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/progress-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "progress-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/progressive-license-5901a98b1164ea8a4d049ee273115818.yaml b/nuclei-templates/cve-less/plugins/progressive-license-5901a98b1164ea8a4d049ee273115818.yaml new file mode 100644 index 0000000000..fdca918278 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/progressive-license-5901a98b1164ea8a4d049ee273115818.yaml @@ -0,0 +1,58 @@ +id: progressive-license-5901a98b1164ea8a4d049ee273115818 + +info: + name: > + Progressive License <= 1.1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef8a592a-8100-4347-8407-189ca2867c3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/progressive-license/" + google-query: inurl:"/wp-content/plugins/progressive-license/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,progressive-license,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/progressive-license/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "progressive-license" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/progressive-wp-87e99280c7fbf3c8ad55c6ac46aa584a.yaml b/nuclei-templates/cve-less/plugins/progressive-wp-87e99280c7fbf3c8ad55c6ac46aa584a.yaml new file mode 100644 index 0000000000..0fca44cad1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/progressive-wp-87e99280c7fbf3c8ad55c6ac46aa584a.yaml @@ -0,0 +1,58 @@ +id: progressive-wp-87e99280c7fbf3c8ad55c6ac46aa584a + +info: + name: > + Progressive WordPress (PWA) <= 2.1.13 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ad0acd5-b5d8-481d-954e-a629bb0e11a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/progressive-wp/" + google-query: inurl:"/wp-content/plugins/progressive-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,progressive-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/progressive-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "progressive-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/project-app-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/project-app-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..f7f71d161a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/project-app-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: project-app-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/project-app/" + google-query: inurl:"/wp-content/plugins/project-app/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,project-app,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/project-app/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "project-app" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/project-panorama-lite-f526a0fb0a181d070234f458832b61bd.yaml b/nuclei-templates/cve-less/plugins/project-panorama-lite-f526a0fb0a181d070234f458832b61bd.yaml new file mode 100644 index 0000000000..98b0fabca5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/project-panorama-lite-f526a0fb0a181d070234f458832b61bd.yaml @@ -0,0 +1,58 @@ +id: project-panorama-lite-f526a0fb0a181d070234f458832b61bd + +info: + name: > + Panorama – WordPress Project Management Plugin <= 1.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d131115b-e2c9-42c6-9262-a19272944652?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/project-panorama-lite/" + google-query: inurl:"/wp-content/plugins/project-panorama-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,project-panorama-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/project-panorama-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "project-panorama-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/project-source-code-download-55ee60e67d9e233077a29ca0b025c99e.yaml b/nuclei-templates/cve-less/plugins/project-source-code-download-55ee60e67d9e233077a29ca0b025c99e.yaml new file mode 100644 index 0000000000..396e63e1e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/project-source-code-download-55ee60e67d9e233077a29ca0b025c99e.yaml @@ -0,0 +1,58 @@ +id: project-source-code-download-55ee60e67d9e233077a29ca0b025c99e + +info: + name: > + Project Source Code Download <= 1.0.0 - Unauthenticated Backup Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a042b1be-d39f-4d28-8566-d9974becdd40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/project-source-code-download/" + google-query: inurl:"/wp-content/plugins/project-source-code-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,project-source-code-download,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/project-source-code-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "project-source-code-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/project-status-e22d4b224819c0d0a8a173a4476a0e71.yaml b/nuclei-templates/cve-less/plugins/project-status-e22d4b224819c0d0a8a173a4476a0e71.yaml new file mode 100644 index 0000000000..e3e29c4c1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/project-status-e22d4b224819c0d0a8a173a4476a0e71.yaml @@ -0,0 +1,58 @@ +id: project-status-e22d4b224819c0d0a8a173a4476a0e71 + +info: + name: > + Project Status <= 1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aac9e0cb-cc1e-4041-bb92-21f94c8d35fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/project-status/" + google-query: inurl:"/wp-content/plugins/project-status/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,project-status,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/project-status/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "project-status" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/projecthuddle-child-site-c6a13766dfee309169a154d6bf63adc3.yaml b/nuclei-templates/cve-less/plugins/projecthuddle-child-site-c6a13766dfee309169a154d6bf63adc3.yaml new file mode 100644 index 0000000000..951f97e853 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/projecthuddle-child-site-c6a13766dfee309169a154d6bf63adc3.yaml @@ -0,0 +1,58 @@ +id: projecthuddle-child-site-c6a13766dfee309169a154d6bf63adc3 + +info: + name: > + ProjectHuddle Client Site <= 1.0.34 - Missing Authorization via ph_child_ajax_notice_handler + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d484500f-c8c1-4278-8a38-82a7fd5674f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/projecthuddle-child-site/" + google-query: inurl:"/wp-content/plugins/projecthuddle-child-site/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,projecthuddle-child-site,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/projecthuddle-child-site/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "projecthuddle-child-site" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/promobar-25d8c7ed5a7b1effbc548f589cbe27a9.yaml b/nuclei-templates/cve-less/plugins/promobar-25d8c7ed5a7b1effbc548f589cbe27a9.yaml new file mode 100644 index 0000000000..2d592c5055 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/promobar-25d8c7ed5a7b1effbc548f589cbe27a9.yaml @@ -0,0 +1,58 @@ +id: promobar-25d8c7ed5a7b1effbc548f589cbe27a9 + +info: + name: > + PromoBar by BestWebSoft – Customizable Advertisement Banner for WordPress Website <= 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3ea9e96-9958-4a4f-b988-6f024b113fc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/promobar/" + google-query: inurl:"/wp-content/plugins/promobar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,promobar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/promobar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "promobar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/promotion-slider-bffa3ebfd0f8f4eee0788789721093cc.yaml b/nuclei-templates/cve-less/plugins/promotion-slider-bffa3ebfd0f8f4eee0788789721093cc.yaml new file mode 100644 index 0000000000..b409c5f85b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/promotion-slider-bffa3ebfd0f8f4eee0788789721093cc.yaml @@ -0,0 +1,58 @@ +id: promotion-slider-bffa3ebfd0f8f4eee0788789721093cc + +info: + name: > + Promotion Slider <= 3.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cd6350c-6da8-4d5a-8ceb-d587ddf40d1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/promotion-slider/" + google-query: inurl:"/wp-content/plugins/promotion-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,promotion-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/promotion-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "promotion-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/proofreading-716d3ddce65959ddfb011b7ca5f75416.yaml b/nuclei-templates/cve-less/plugins/proofreading-716d3ddce65959ddfb011b7ca5f75416.yaml new file mode 100644 index 0000000000..4e3f193c38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/proofreading-716d3ddce65959ddfb011b7ca5f75416.yaml @@ -0,0 +1,58 @@ +id: proofreading-716d3ddce65959ddfb011b7ca5f75416 + +info: + name: > + Proofreading <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e76e4c4c-3f84-46b0-b305-2513714a8525?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/proofreading/" + google-query: inurl:"/wp-content/plugins/proofreading/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,proofreading,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/proofreading/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "proofreading" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-0e504336a10f995a3d5ffd0688becb4a.yaml b/nuclei-templates/cve-less/plugins/propertyhive-0e504336a10f995a3d5ffd0688becb4a.yaml new file mode 100644 index 0000000000..90a2488955 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-0e504336a10f995a3d5ffd0688becb4a.yaml @@ -0,0 +1,58 @@ +id: propertyhive-0e504336a10f995a3d5ffd0688becb4a + +info: + name: > + PropertyHive <= 2.0.9 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7b24b7c-1a15-4b38-b59e-bcad39cc4340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-269c54556a1ca81f568118ffc940071f.yaml b/nuclei-templates/cve-less/plugins/propertyhive-269c54556a1ca81f568118ffc940071f.yaml new file mode 100644 index 0000000000..5b23cb0f7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-269c54556a1ca81f568118ffc940071f.yaml @@ -0,0 +1,58 @@ +id: propertyhive-269c54556a1ca81f568118ffc940071f + +info: + name: > + PropertyHive <= 2.0.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9a0ca58-ddc1-43ec-bb08-7fd31f92e275?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-38f9b434ada5260ea345f99b88aaaba2.yaml b/nuclei-templates/cve-less/plugins/propertyhive-38f9b434ada5260ea345f99b88aaaba2.yaml new file mode 100644 index 0000000000..8550750e1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-38f9b434ada5260ea345f99b88aaaba2.yaml @@ -0,0 +1,58 @@ +id: propertyhive-38f9b434ada5260ea345f99b88aaaba2 + +info: + name: > + PropertyHive <= 1.5.48 - Reflected Cross-Site Scripting via date_post_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea82e978-a653-4ae3-94aa-bc77b94a176c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-453cdccb9ec27998718a08f552017bc2.yaml b/nuclei-templates/cve-less/plugins/propertyhive-453cdccb9ec27998718a08f552017bc2.yaml new file mode 100644 index 0000000000..37b0a722f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-453cdccb9ec27998718a08f552017bc2.yaml @@ -0,0 +1,58 @@ +id: propertyhive-453cdccb9ec27998718a08f552017bc2 + +info: + name: > + PropertyHive <= 2.0.6 - Missing Authorization via activate_pro_feature + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84d55f24-c4de-4574-b0cc-cc1b4935d281?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-4ba37fc25b6b62478d53951a81386aeb.yaml b/nuclei-templates/cve-less/plugins/propertyhive-4ba37fc25b6b62478d53951a81386aeb.yaml new file mode 100644 index 0000000000..fef0125b24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-4ba37fc25b6b62478d53951a81386aeb.yaml @@ -0,0 +1,58 @@ +id: propertyhive-4ba37fc25b6b62478d53951a81386aeb + +info: + name: > + PropertyHive < 1.4.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e364f0c-17ea-4962-92d3-35bf5eb666ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-53a71e50160d96221b329d00809ca7b7.yaml b/nuclei-templates/cve-less/plugins/propertyhive-53a71e50160d96221b329d00809ca7b7.yaml new file mode 100644 index 0000000000..3b3b4f50af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-53a71e50160d96221b329d00809ca7b7.yaml @@ -0,0 +1,58 @@ +id: propertyhive-53a71e50160d96221b329d00809ca7b7 + +info: + name: > + PropertyHive <= 1.5.46 - Reflected Cross-Site Scripting via 'merge_ids' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f395100-cf1f-4a3e-a353-1aec6b4e7448?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-5e68a3cd88ecb3d8410d3d1d23bfef75.yaml b/nuclei-templates/cve-less/plugins/propertyhive-5e68a3cd88ecb3d8410d3d1d23bfef75.yaml new file mode 100644 index 0000000000..42bcdf55ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-5e68a3cd88ecb3d8410d3d1d23bfef75.yaml @@ -0,0 +1,58 @@ +id: propertyhive-5e68a3cd88ecb3d8410d3d1d23bfef75 + +info: + name: > + PropertyHive <= 2.0.12 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8d52ced-807b-48c0-bb7a-e40d143ae5d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-ca880b16159d0a9fbb68955f79340071.yaml b/nuclei-templates/cve-less/plugins/propertyhive-ca880b16159d0a9fbb68955f79340071.yaml new file mode 100644 index 0000000000..78c1b7e241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-ca880b16159d0a9fbb68955f79340071.yaml @@ -0,0 +1,58 @@ +id: propertyhive-ca880b16159d0a9fbb68955f79340071 + +info: + name: > + PropertyHive < 1.4.26 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02bb12db-0bc9-4c13-918f-1f90b500c165?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-deea856103e67ca13471337c06b08b93.yaml b/nuclei-templates/cve-less/plugins/propertyhive-deea856103e67ca13471337c06b08b93.yaml new file mode 100644 index 0000000000..090e23f893 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-deea856103e67ca13471337c06b08b93.yaml @@ -0,0 +1,58 @@ +id: propertyhive-deea856103e67ca13471337c06b08b93 + +info: + name: > + PropertyHive <= 2.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e10fc7e4-11ec-409b-9f16-b38adceaf622?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/propertyhive-f53efc19e67fc15708f7aff7dc031f4c.yaml b/nuclei-templates/cve-less/plugins/propertyhive-f53efc19e67fc15708f7aff7dc031f4c.yaml new file mode 100644 index 0000000000..78e5ac52c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/propertyhive-f53efc19e67fc15708f7aff7dc031f4c.yaml @@ -0,0 +1,58 @@ +id: propertyhive-f53efc19e67fc15708f7aff7dc031f4c + +info: + name: > + PropertyHive <= 2.0.5 - Unauthenticated PHP Object Injection via propertyhive_currency + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8ee82cf-916c-41e9-82d2-f25cc7a632ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/propertyhive/" + google-query: inurl:"/wp-content/plugins/propertyhive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,propertyhive,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/propertyhive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "propertyhive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/proquoter-7ddce7ee421f18bacb72f14e66ea1bcb.yaml b/nuclei-templates/cve-less/plugins/proquoter-7ddce7ee421f18bacb72f14e66ea1bcb.yaml new file mode 100644 index 0000000000..faac53dded --- /dev/null +++ b/nuclei-templates/cve-less/plugins/proquoter-7ddce7ee421f18bacb72f14e66ea1bcb.yaml @@ -0,0 +1,58 @@ +id: proquoter-7ddce7ee421f18bacb72f14e66ea1bcb + +info: + name: > + Pro Quoter Plugin <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1903354e-f53a-4005-b93b-c91d268f7a5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/proquoter/" + google-query: inurl:"/wp-content/plugins/proquoter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,proquoter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/proquoter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "proquoter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protect-uploads-dcaafd0f02c38e487ed1a8a26307e284.yaml b/nuclei-templates/cve-less/plugins/protect-uploads-dcaafd0f02c38e487ed1a8a26307e284.yaml new file mode 100644 index 0000000000..19927b2ad6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protect-uploads-dcaafd0f02c38e487ed1a8a26307e284.yaml @@ -0,0 +1,58 @@ +id: protect-uploads-dcaafd0f02c38e487ed1a8a26307e284 + +info: + name: > + Protect uploads <= 0.3 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3702936-9ae2-4efb-bdfe-9e1dfceb246b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protect-uploads/" + google-query: inurl:"/wp-content/plugins/protect-uploads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protect-uploads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protect-uploads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protect-uploads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protect-uploads-with-login-page-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/protect-uploads-with-login-page-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a2d60ef9e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protect-uploads-with-login-page-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: protect-uploads-with-login-page-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protect-uploads-with-login-page/" + google-query: inurl:"/wp-content/plugins/protect-uploads-with-login-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protect-uploads-with-login-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protect-uploads-with-login-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protect-uploads-with-login-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protect-wp-admin-0e3824b9f05a1d4071b5fbf703950004.yaml b/nuclei-templates/cve-less/plugins/protect-wp-admin-0e3824b9f05a1d4071b5fbf703950004.yaml new file mode 100644 index 0000000000..6f436be6d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protect-wp-admin-0e3824b9f05a1d4071b5fbf703950004.yaml @@ -0,0 +1,58 @@ +id: protect-wp-admin-0e3824b9f05a1d4071b5fbf703950004 + +info: + name: > + Protect WP Admin <= 3.6 - Unauthenticated Plugin Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2295b532-7833-4f5d-9778-de26390b04bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protect-wp-admin/" + google-query: inurl:"/wp-content/plugins/protect-wp-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protect-wp-admin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protect-wp-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protect-wp-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protect-wp-admin-3008a63f18e7f2e88b5013011c2e866b.yaml b/nuclei-templates/cve-less/plugins/protect-wp-admin-3008a63f18e7f2e88b5013011c2e866b.yaml new file mode 100644 index 0000000000..0824ca32cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protect-wp-admin-3008a63f18e7f2e88b5013011c2e866b.yaml @@ -0,0 +1,58 @@ +id: protect-wp-admin-3008a63f18e7f2e88b5013011c2e866b + +info: + name: > + Protect WP Admin <= 3.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/878671d2-572c-43f9-8fba-f2e2e955b7a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protect-wp-admin/" + google-query: inurl:"/wp-content/plugins/protect-wp-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protect-wp-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protect-wp-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protect-wp-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protect-wp-admin-ec9f7eccec9ca008528410c831cadf91.yaml b/nuclei-templates/cve-less/plugins/protect-wp-admin-ec9f7eccec9ca008528410c831cadf91.yaml new file mode 100644 index 0000000000..3534dfcea4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protect-wp-admin-ec9f7eccec9ca008528410c831cadf91.yaml @@ -0,0 +1,58 @@ +id: protect-wp-admin-ec9f7eccec9ca008528410c831cadf91 + +info: + name: > + Protect WP Admin <= 3.8 - Unauthenticated Information Disclosure to Protection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7012b34d-8d65-4575-9965-417739206b5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protect-wp-admin/" + google-query: inurl:"/wp-content/plugins/protect-wp-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protect-wp-admin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protect-wp-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protect-wp-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protected-page-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/protected-page-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..99d26e388d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protected-page-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: protected-page-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protected-page/" + google-query: inurl:"/wp-content/plugins/protected-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protected-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protected-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protected-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protected-posts-logout-button-5d1bfbb84afa64ba47c235dccca370e2.yaml b/nuclei-templates/cve-less/plugins/protected-posts-logout-button-5d1bfbb84afa64ba47c235dccca370e2.yaml new file mode 100644 index 0000000000..faa937d5c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protected-posts-logout-button-5d1bfbb84afa64ba47c235dccca370e2.yaml @@ -0,0 +1,58 @@ +id: protected-posts-logout-button-5d1bfbb84afa64ba47c235dccca370e2 + +info: + name: > + Protected Posts Logout Button <= 1.4.5 - Missing Authorization on pplb_options_save + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b87f8bd6-d00d-4062-bf27-b698a1d7e757?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protected-posts-logout-button/" + google-query: inurl:"/wp-content/plugins/protected-posts-logout-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protected-posts-logout-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protected-posts-logout-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protected-posts-logout-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protected-posts-logout-button-6c57eb9a493b5e8a3f87551a89731a76.yaml b/nuclei-templates/cve-less/plugins/protected-posts-logout-button-6c57eb9a493b5e8a3f87551a89731a76.yaml new file mode 100644 index 0000000000..92676b3318 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protected-posts-logout-button-6c57eb9a493b5e8a3f87551a89731a76.yaml @@ -0,0 +1,58 @@ +id: protected-posts-logout-button-6c57eb9a493b5e8a3f87551a89731a76 + +info: + name: > + Protected Posts Logout Button <= 1.4.4 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c79fd08c-97bc-4d55-832e-92d0897bc3dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protected-posts-logout-button/" + google-query: inurl:"/wp-content/plugins/protected-posts-logout-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protected-posts-logout-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protected-posts-logout-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protected-posts-logout-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/protected-posts-logout-button-c17395d57aa530c1ca072f07b2b709c1.yaml b/nuclei-templates/cve-less/plugins/protected-posts-logout-button-c17395d57aa530c1ca072f07b2b709c1.yaml new file mode 100644 index 0000000000..8702010638 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/protected-posts-logout-button-c17395d57aa530c1ca072f07b2b709c1.yaml @@ -0,0 +1,58 @@ +id: protected-posts-logout-button-c17395d57aa530c1ca072f07b2b709c1 + +info: + name: > + Protected Posts Logout Button <= 1.4.5 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6be26c07-cac4-42d8-becb-03045a54cd6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/protected-posts-logout-button/" + google-query: inurl:"/wp-content/plugins/protected-posts-logout-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,protected-posts-logout-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/protected-posts-logout-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "protected-posts-logout-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ps-phpcaptcha-e1c57fbc348dfda4a7e2fa9073819ee6.yaml b/nuclei-templates/cve-less/plugins/ps-phpcaptcha-e1c57fbc348dfda4a7e2fa9073819ee6.yaml new file mode 100644 index 0000000000..61993dd80f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ps-phpcaptcha-e1c57fbc348dfda4a7e2fa9073819ee6.yaml @@ -0,0 +1,58 @@ +id: ps-phpcaptcha-e1c57fbc348dfda4a7e2fa9073819ee6 + +info: + name: > + PS PHPCaptcha <= 1.1.0 - Authenticated Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9ed7e26-34f0-4e5d-b560-03b1de9c5c95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ps-phpcaptcha/" + google-query: inurl:"/wp-content/plugins/ps-phpcaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ps-phpcaptcha,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ps-phpcaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ps-phpcaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pt-elementor-addons-lite-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/pt-elementor-addons-lite-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..574d0b8c1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pt-elementor-addons-lite-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: pt-elementor-addons-lite-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pt-elementor-addons-lite/" + google-query: inurl:"/wp-content/plugins/pt-elementor-addons-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pt-elementor-addons-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pt-elementor-addons-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pt-elementor-addons-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pt-elementor-addons-lite-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/pt-elementor-addons-lite-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..86a8dd593d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pt-elementor-addons-lite-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: pt-elementor-addons-lite-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pt-elementor-addons-lite/" + google-query: inurl:"/wp-content/plugins/pt-elementor-addons-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pt-elementor-addons-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pt-elementor-addons-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pt-elementor-addons-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ptengine-real-time-web-analytics-and-heatmap-a5f0ed212c4766edc5a74c9f3775bc05.yaml b/nuclei-templates/cve-less/plugins/ptengine-real-time-web-analytics-and-heatmap-a5f0ed212c4766edc5a74c9f3775bc05.yaml new file mode 100644 index 0000000000..e62d1f6db7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ptengine-real-time-web-analytics-and-heatmap-a5f0ed212c4766edc5a74c9f3775bc05.yaml @@ -0,0 +1,58 @@ +id: ptengine-real-time-web-analytics-and-heatmap-a5f0ed212c4766edc5a74c9f3775bc05 + +info: + name: > + Ptengine – Heatmap Analytics < 1.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/135213d6-8058-4573-a97d-a95b0708d807?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ptengine-real-time-web-analytics-and-heatmap/" + google-query: inurl:"/wp-content/plugins/ptengine-real-time-web-analytics-and-heatmap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ptengine-real-time-web-analytics-and-heatmap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ptengine-real-time-web-analytics-and-heatmap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ptengine-real-time-web-analytics-and-heatmap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ptoffice-sign-ups-061a0160582ddd92c54f532180e67c97.yaml b/nuclei-templates/cve-less/plugins/ptoffice-sign-ups-061a0160582ddd92c54f532180e67c97.yaml new file mode 100644 index 0000000000..52940909a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ptoffice-sign-ups-061a0160582ddd92c54f532180e67c97.yaml @@ -0,0 +1,58 @@ +id: ptoffice-sign-ups-061a0160582ddd92c54f532180e67c97 + +info: + name: > + PT Sign Ups <= 1.0.4 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b751191b-35a8-4331-ac3f-f6090221c65f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ptoffice-sign-ups/" + google-query: inurl:"/wp-content/plugins/ptoffice-sign-ups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ptoffice-sign-ups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ptoffice-sign-ups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ptoffice-sign-ups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ptypeconverter-bc684639838d61cf579a672d96063b79.yaml b/nuclei-templates/cve-less/plugins/ptypeconverter-bc684639838d61cf579a672d96063b79.yaml new file mode 100644 index 0000000000..37e8d7c540 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ptypeconverter-bc684639838d61cf579a672d96063b79.yaml @@ -0,0 +1,58 @@ +id: ptypeconverter-bc684639838d61cf579a672d96063b79 + +info: + name: > + pTypeConverter <= 0.2.8.1 - Authenticated (Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c26454-a91d-4141-9b31-5c902c5e8eec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ptypeconverter/" + google-query: inurl:"/wp-content/plugins/ptypeconverter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ptypeconverter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ptypeconverter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ptypeconverter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/publish-confirm-message-6c62a897542f5fcbb95887f636c680c5.yaml b/nuclei-templates/cve-less/plugins/publish-confirm-message-6c62a897542f5fcbb95887f636c680c5.yaml new file mode 100644 index 0000000000..fbdf05ba32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/publish-confirm-message-6c62a897542f5fcbb95887f636c680c5.yaml @@ -0,0 +1,58 @@ +id: publish-confirm-message-6c62a897542f5fcbb95887f636c680c5 + +info: + name: > + Publish Confirm Message <= 1.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05c2707c-c737-4f95-83e0-b0a4e0883d4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/publish-confirm-message/" + google-query: inurl:"/wp-content/plugins/publish-confirm-message/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,publish-confirm-message,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/publish-confirm-message/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "publish-confirm-message" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/publish-post-email-notification-a18a9d03d5ff2c74e7d4dd874ea75ae5.yaml b/nuclei-templates/cve-less/plugins/publish-post-email-notification-a18a9d03d5ff2c74e7d4dd874ea75ae5.yaml new file mode 100644 index 0000000000..bfbb9fb812 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/publish-post-email-notification-a18a9d03d5ff2c74e7d4dd874ea75ae5.yaml @@ -0,0 +1,58 @@ +id: publish-post-email-notification-a18a9d03d5ff2c74e7d4dd874ea75ae5 + +info: + name: > + wordpress publish post email notification <= 1.0.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/705d11b1-0924-46ae-a6e6-8fab16a4df00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/publish-post-email-notification/" + google-query: inurl:"/wp-content/plugins/publish-post-email-notification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,publish-post-email-notification,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/publish-post-email-notification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "publish-post-email-notification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/publish-to-schedule-577c8d638d67108f4b264900ccfdf446.yaml b/nuclei-templates/cve-less/plugins/publish-to-schedule-577c8d638d67108f4b264900ccfdf446.yaml new file mode 100644 index 0000000000..6107aeb1ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/publish-to-schedule-577c8d638d67108f4b264900ccfdf446.yaml @@ -0,0 +1,58 @@ +id: publish-to-schedule-577c8d638d67108f4b264900ccfdf446 + +info: + name: > + Publish to Schedule <= 4.4.2 - Cross-Site Request Forgery leading to Plugin Option Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a438ec56-8ddc-4cea-8d93-c8f79b46f47e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/publish-to-schedule/" + google-query: inurl:"/wp-content/plugins/publish-to-schedule/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,publish-to-schedule,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/publish-to-schedule/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "publish-to-schedule" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/publish-to-schedule-fed0833f3ebebd240e7a0f4e9421be22.yaml b/nuclei-templates/cve-less/plugins/publish-to-schedule-fed0833f3ebebd240e7a0f4e9421be22.yaml new file mode 100644 index 0000000000..e614b2a454 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/publish-to-schedule-fed0833f3ebebd240e7a0f4e9421be22.yaml @@ -0,0 +1,58 @@ +id: publish-to-schedule-fed0833f3ebebd240e7a0f4e9421be22 + +info: + name: > + Publish to Schedule <= 4.5.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e2014bd-2809-4f79-913d-d7a35eda63ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/publish-to-schedule/" + google-query: inurl:"/wp-content/plugins/publish-to-schedule/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,publish-to-schedule,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/publish-to-schedule/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "publish-to-schedule" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/publisher-media-kit-f9078038dec7d199edb0413f76661495.yaml b/nuclei-templates/cve-less/plugins/publisher-media-kit-f9078038dec7d199edb0413f76661495.yaml new file mode 100644 index 0000000000..5fedd461ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/publisher-media-kit-f9078038dec7d199edb0413f76661495.yaml @@ -0,0 +1,58 @@ +id: publisher-media-kit-f9078038dec7d199edb0413f76661495 + +info: + name: > + Terser < 4.8.1 and 5.0.0-5.14.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d535c069-cfa3-4c41-9a01-b4c4e7c75764?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/publisher-media-kit/" + google-query: inurl:"/wp-content/plugins/publisher-media-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,publisher-media-kit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/publisher-media-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "publisher-media-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/publishpress-5eb9664c4cfc97621e70ca6044316a22.yaml b/nuclei-templates/cve-less/plugins/publishpress-5eb9664c4cfc97621e70ca6044316a22.yaml new file mode 100644 index 0000000000..49c90a766f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/publishpress-5eb9664c4cfc97621e70ca6044316a22.yaml @@ -0,0 +1,58 @@ +id: publishpress-5eb9664c4cfc97621e70ca6044316a22 + +info: + name: > + PublishPress: Editorial Calendar, Workflow, Comments, Notifications and Statuses <= 3.5.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1b0ac88-8afd-4e46-9721-7aab91090e37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/publishpress/" + google-query: inurl:"/wp-content/plugins/publishpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,publishpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/publishpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "publishpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pubsubhubbub-380fec032d7d63f91e53bba15b6960ee.yaml b/nuclei-templates/cve-less/plugins/pubsubhubbub-380fec032d7d63f91e53bba15b6960ee.yaml new file mode 100644 index 0000000000..9e3845dfc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pubsubhubbub-380fec032d7d63f91e53bba15b6960ee.yaml @@ -0,0 +1,58 @@ +id: pubsubhubbub-380fec032d7d63f91e53bba15b6960ee + +info: + name: > + WebSub (FKA. PubSubHubbub) <= 3.1.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f07b166b-3436-4797-a2df-096ff7c27a09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pubsubhubbub/" + google-query: inurl:"/wp-content/plugins/pubsubhubbub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pubsubhubbub,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pubsubhubbub/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pubsubhubbub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pubydoc-data-tables-and-charts-04f39942fc16c2a7c2f6145e385c8d07.yaml b/nuclei-templates/cve-less/plugins/pubydoc-data-tables-and-charts-04f39942fc16c2a7c2f6145e385c8d07.yaml new file mode 100644 index 0000000000..63a64ca4eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pubydoc-data-tables-and-charts-04f39942fc16c2a7c2f6145e385c8d07.yaml @@ -0,0 +1,58 @@ +id: pubydoc-data-tables-and-charts-04f39942fc16c2a7c2f6145e385c8d07 + +info: + name: > + PubyDoc <= 2.0.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3badf9b8-7558-4a46-9eb2-cd119a77c903?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pubydoc-data-tables-and-charts/" + google-query: inurl:"/wp-content/plugins/pubydoc-data-tables-and-charts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pubydoc-data-tables-and-charts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pubydoc-data-tables-and-charts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pubydoc-data-tables-and-charts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pure-chat-388546e2e07357a0226d8ddb30b48362.yaml b/nuclei-templates/cve-less/plugins/pure-chat-388546e2e07357a0226d8ddb30b48362.yaml new file mode 100644 index 0000000000..4e86bdd853 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pure-chat-388546e2e07357a0226d8ddb30b48362.yaml @@ -0,0 +1,58 @@ +id: pure-chat-388546e2e07357a0226d8ddb30b48362 + +info: + name: > + Pure Chat – Live Chat Plugin & More! <= 2.22 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d03c798-dc77-407c-8674-d0bd2f1ada8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pure-chat/" + google-query: inurl:"/wp-content/plugins/pure-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pure-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pure-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pure-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/purple-xmls-google-product-feed-for-woocommerce-0c6025826e5726423a84ca94ebcaa441.yaml b/nuclei-templates/cve-less/plugins/purple-xmls-google-product-feed-for-woocommerce-0c6025826e5726423a84ca94ebcaa441.yaml new file mode 100644 index 0000000000..f5e3c64758 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/purple-xmls-google-product-feed-for-woocommerce-0c6025826e5726423a84ca94ebcaa441.yaml @@ -0,0 +1,58 @@ +id: purple-xmls-google-product-feed-for-woocommerce-0c6025826e5726423a84ca94ebcaa441 + +info: + name: > + Product Feed on WooCommerce for Google <= 3.5.7 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46ab2615-a1eb-4740-836c-781e961252e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/purple-xmls-google-product-feed-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/purple-xmls-google-product-feed-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,purple-xmls-google-product-feed-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/purple-xmls-google-product-feed-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "purple-xmls-google-product-feed-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/purple-xmls-google-product-feed-for-woocommerce-4e655e8637363048266492f0b32a6610.yaml b/nuclei-templates/cve-less/plugins/purple-xmls-google-product-feed-for-woocommerce-4e655e8637363048266492f0b32a6610.yaml new file mode 100644 index 0000000000..00cfc19de8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/purple-xmls-google-product-feed-for-woocommerce-4e655e8637363048266492f0b32a6610.yaml @@ -0,0 +1,58 @@ +id: purple-xmls-google-product-feed-for-woocommerce-4e655e8637363048266492f0b32a6610 + +info: + name: > + Product Feed on WooCommerce for Google, Awin, Shareasale, Bing, and More < 3.3.1.0 - Authenticated SQL Injection via product_id Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc83edb-44ce-4dc9-8cba-734775a94779?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/purple-xmls-google-product-feed-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/purple-xmls-google-product-feed-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,purple-xmls-google-product-feed-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/purple-xmls-google-product-feed-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "purple-xmls-google-product-feed-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/push-notification-by-feedify-851c9539a872462d0d73ba1acd344a0c.yaml b/nuclei-templates/cve-less/plugins/push-notification-by-feedify-851c9539a872462d0d73ba1acd344a0c.yaml new file mode 100644 index 0000000000..58569b30ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/push-notification-by-feedify-851c9539a872462d0d73ba1acd344a0c.yaml @@ -0,0 +1,58 @@ +id: push-notification-by-feedify-851c9539a872462d0d73ba1acd344a0c + +info: + name: > + Feedify – Web Push Notifications <= 2.1.8 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7d74fa8-43ba-41ac-82ec-94addc88fc52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/push-notification-by-feedify/" + google-query: inurl:"/wp-content/plugins/push-notification-by-feedify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,push-notification-by-feedify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/push-notification-by-feedify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "push-notification-by-feedify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/push-notification-for-post-and-buddypress-de2d50a00641894476c3c991e151cbfe.yaml b/nuclei-templates/cve-less/plugins/push-notification-for-post-and-buddypress-de2d50a00641894476c3c991e151cbfe.yaml new file mode 100644 index 0000000000..fe791a20ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/push-notification-for-post-and-buddypress-de2d50a00641894476c3c991e151cbfe.yaml @@ -0,0 +1,58 @@ +id: push-notification-for-post-and-buddypress-de2d50a00641894476c3c991e151cbfe + +info: + name: > + Push Notification for Post and BuddyPress <= 1.63 - Missing Authorization to Unauthenticated Admin Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/228a3c72-fbb0-48bc-8066-6ca954a14421?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/push-notification-for-post-and-buddypress/" + google-query: inurl:"/wp-content/plugins/push-notification-for-post-and-buddypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,push-notification-for-post-and-buddypress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/push-notification-for-post-and-buddypress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "push-notification-for-post-and-buddypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/push-notification-for-wp-by-pushassist-0be29b33ea0746b92d956c4f705ae369.yaml b/nuclei-templates/cve-less/plugins/push-notification-for-wp-by-pushassist-0be29b33ea0746b92d956c4f705ae369.yaml new file mode 100644 index 0000000000..40289de2e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/push-notification-for-wp-by-pushassist-0be29b33ea0746b92d956c4f705ae369.yaml @@ -0,0 +1,58 @@ +id: push-notification-for-wp-by-pushassist-0be29b33ea0746b92d956c4f705ae369 + +info: + name: > + Push Notifications for WordPress by PushAssist <= 3.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4454376-7c18-4f0e-a192-80212a59d94b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/push-notification-for-wp-by-pushassist/" + google-query: inurl:"/wp-content/plugins/push-notification-for-wp-by-pushassist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,push-notification-for-wp-by-pushassist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/push-notification-for-wp-by-pushassist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "push-notification-for-wp-by-pushassist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/push-notifications-for-wp-1aa0482b62398dab21c7b36e9908a28d.yaml b/nuclei-templates/cve-less/plugins/push-notifications-for-wp-1aa0482b62398dab21c7b36e9908a28d.yaml new file mode 100644 index 0000000000..b7b12cf6cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/push-notifications-for-wp-1aa0482b62398dab21c7b36e9908a28d.yaml @@ -0,0 +1,58 @@ +id: push-notifications-for-wp-1aa0482b62398dab21c7b36e9908a28d + +info: + name: > + Push Notifications for WordPress (Lite) < 6.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d6e18b-00d0-4f02-b56b-692170c08d99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/push-notifications-for-wp/" + google-query: inurl:"/wp-content/plugins/push-notifications-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,push-notifications-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/push-notifications-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "push-notifications-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pwa-for-wp-a3f1f9f4718f614e268d95c106a320c2.yaml b/nuclei-templates/cve-less/plugins/pwa-for-wp-a3f1f9f4718f614e268d95c106a320c2.yaml new file mode 100644 index 0000000000..dcf70b8961 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pwa-for-wp-a3f1f9f4718f614e268d95c106a320c2.yaml @@ -0,0 +1,58 @@ +id: pwa-for-wp-a3f1f9f4718f614e268d95c106a320c2 + +info: + name: > + PWA for WP & AMP < = 1.7.32 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9892dd1-3939-41a9-a828-fa1bf7d96eb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pwa-for-wp/" + google-query: inurl:"/wp-content/plugins/pwa-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pwa-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pwa-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pwa-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pwa-for-wp-eb00e90873e8ae18941584253499c1dd.yaml b/nuclei-templates/cve-less/plugins/pwa-for-wp-eb00e90873e8ae18941584253499c1dd.yaml new file mode 100644 index 0000000000..581a0fcc26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pwa-for-wp-eb00e90873e8ae18941584253499c1dd.yaml @@ -0,0 +1,58 @@ +id: pwa-for-wp-eb00e90873e8ae18941584253499c1dd + +info: + name: > + PWA for WP & AMP Plugin <= 1.0.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/934545ff-8886-47c7-ad50-0e5ff513a26c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pwa-for-wp/" + google-query: inurl:"/wp-content/plugins/pwa-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pwa-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pwa-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pwa-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pwa-for-wp-fe4487fc151c051d39c023720ae70292.yaml b/nuclei-templates/cve-less/plugins/pwa-for-wp-fe4487fc151c051d39c023720ae70292.yaml new file mode 100644 index 0000000000..31183b8323 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pwa-for-wp-fe4487fc151c051d39c023720ae70292.yaml @@ -0,0 +1,58 @@ +id: pwa-for-wp-fe4487fc151c051d39c023720ae70292 + +info: + name: > + PWA for WP & AMP <= 1.7.32 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6082791e-feac-41f7-b565-9d98624ddf50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pwa-for-wp/" + google-query: inurl:"/wp-content/plugins/pwa-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pwa-for-wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pwa-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pwa-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pwgrandom-fab925188af5751f6804af30f809b504.yaml b/nuclei-templates/cve-less/plugins/pwgrandom-fab925188af5751f6804af30f809b504.yaml new file mode 100644 index 0000000000..44006efdd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pwgrandom-fab925188af5751f6804af30f809b504.yaml @@ -0,0 +1,58 @@ +id: pwgrandom-fab925188af5751f6804af30f809b504 + +info: + name: > + PWGRandom <= 1.11 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e47528d-993c-434c-a077-9c614e56f39f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pwgrandom/" + google-query: inurl:"/wp-content/plugins/pwgrandom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pwgrandom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pwgrandom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pwgrandom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pz-linkcard-5e2dbe8495edd1ca09ac4612c6d74e51.yaml b/nuclei-templates/cve-less/plugins/pz-linkcard-5e2dbe8495edd1ca09ac4612c6d74e51.yaml new file mode 100644 index 0000000000..5f7039c244 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pz-linkcard-5e2dbe8495edd1ca09ac4612c6d74e51.yaml @@ -0,0 +1,58 @@ +id: pz-linkcard-5e2dbe8495edd1ca09ac4612c6d74e51 + +info: + name: > + Pz-LinkCard <= 2.5.2 - Cross-Site Request Forgery via page_cacheman + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6de97ac-127d-47ec-8b74-03e7fa4932f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pz-linkcard/" + google-query: inurl:"/wp-content/plugins/pz-linkcard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pz-linkcard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pz-linkcard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pz-linkcard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pz-linkcard-94984c10367f1fcd785a8a0e382575e0.yaml b/nuclei-templates/cve-less/plugins/pz-linkcard-94984c10367f1fcd785a8a0e382575e0.yaml new file mode 100644 index 0000000000..34e13130c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pz-linkcard-94984c10367f1fcd785a8a0e382575e0.yaml @@ -0,0 +1,58 @@ +id: pz-linkcard-94984c10367f1fcd785a8a0e382575e0 + +info: + name: > + Pz-LinkCard <= 2.5.2 - Sever-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1173e2ad-c53d-4d37-9c77-4b63f04ff335?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pz-linkcard/" + google-query: inurl:"/wp-content/plugins/pz-linkcard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pz-linkcard,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pz-linkcard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pz-linkcard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pz-linkcard-a7098d4414a3fb82cc8c3dc220f2fa3d.yaml b/nuclei-templates/cve-less/plugins/pz-linkcard-a7098d4414a3fb82cc8c3dc220f2fa3d.yaml new file mode 100644 index 0000000000..df2ec1b6de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pz-linkcard-a7098d4414a3fb82cc8c3dc220f2fa3d.yaml @@ -0,0 +1,58 @@ +id: pz-linkcard-a7098d4414a3fb82cc8c3dc220f2fa3d + +info: + name: > + Pz-LinkCard <= 2.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a222c714-7c54-4c86-b6af-abdfeb966250?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pz-linkcard/" + google-query: inurl:"/wp-content/plugins/pz-linkcard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pz-linkcard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pz-linkcard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pz-linkcard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pz-linkcard-c229c4974b89d25a5147c1603f3793b5.yaml b/nuclei-templates/cve-less/plugins/pz-linkcard-c229c4974b89d25a5147c1603f3793b5.yaml new file mode 100644 index 0000000000..b487f1d04d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pz-linkcard-c229c4974b89d25a5147c1603f3793b5.yaml @@ -0,0 +1,58 @@ +id: pz-linkcard-c229c4974b89d25a5147c1603f3793b5 + +info: + name: > + Pz-LinkCard <= 2.4.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b41a6bd-8b0c-4d00-8cc3-9589fca5e406?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pz-linkcard/" + google-query: inurl:"/wp-content/plugins/pz-linkcard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pz-linkcard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pz-linkcard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pz-linkcard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/pz-linkcard-d7741f047915382e7e65e25c2ecaf00c.yaml b/nuclei-templates/cve-less/plugins/pz-linkcard-d7741f047915382e7e65e25c2ecaf00c.yaml new file mode 100644 index 0000000000..e3277fc465 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/pz-linkcard-d7741f047915382e7e65e25c2ecaf00c.yaml @@ -0,0 +1,58 @@ +id: pz-linkcard-d7741f047915382e7e65e25c2ecaf00c + +info: + name: > + Pz-LinkCard <= 2.5.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0a0303a-2c8e-4ac5-ad89-df3774db9679?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/pz-linkcard/" + google-query: inurl:"/wp-content/plugins/pz-linkcard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,pz-linkcard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/pz-linkcard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pz-linkcard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/q-and-a-8f0eb841fe57a3d4a24e95c0d9fd6f34.yaml b/nuclei-templates/cve-less/plugins/q-and-a-8f0eb841fe57a3d4a24e95c0d9fd6f34.yaml new file mode 100644 index 0000000000..fbb568f151 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/q-and-a-8f0eb841fe57a3d4a24e95c0d9fd6f34.yaml @@ -0,0 +1,58 @@ +id: q-and-a-8f0eb841fe57a3d4a24e95c0d9fd6f34 + +info: + name: > + Q and A <= 1.0.6.2 Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3566292a-91c8-4cb9-a1d3-45669d69bfc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/q-and-a/" + google-query: inurl:"/wp-content/plugins/q-and-a/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,q-and-a,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/q-and-a/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "q-and-a" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/q2w3-inc-manager-f5f5e3a5ee363b242df2c9cf1503d06e.yaml b/nuclei-templates/cve-less/plugins/q2w3-inc-manager-f5f5e3a5ee363b242df2c9cf1503d06e.yaml new file mode 100644 index 0000000000..a1513e0772 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/q2w3-inc-manager-f5f5e3a5ee363b242df2c9cf1503d06e.yaml @@ -0,0 +1,58 @@ +id: q2w3-inc-manager-f5f5e3a5ee363b242df2c9cf1503d06e + +info: + name: > + Code Insert Manager (Q2W3 Inc Manager) <= 2.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6662c336-c8b6-4017-835f-a91f1abda400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/q2w3-inc-manager/" + google-query: inurl:"/wp-content/plugins/q2w3-inc-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,q2w3-inc-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/q2w3-inc-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "q2w3-inc-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/q2w3-post-order-fbe56fde0056bf97342eed3fc2b3be5e.yaml b/nuclei-templates/cve-less/plugins/q2w3-post-order-fbe56fde0056bf97342eed3fc2b3be5e.yaml new file mode 100644 index 0000000000..2bc8af01c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/q2w3-post-order-fbe56fde0056bf97342eed3fc2b3be5e.yaml @@ -0,0 +1,58 @@ +id: q2w3-post-order-fbe56fde0056bf97342eed3fc2b3be5e + +info: + name: > + Q2W3 Post Order <= 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/affc9dff-75a1-4cb3-8465-55254db6441b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/q2w3-post-order/" + google-query: inurl:"/wp-content/plugins/q2w3-post-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,q2w3-post-order,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/q2w3-post-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "q2w3-post-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qards-70d2ed5770a2a31bdff6c60df8512383.yaml b/nuclei-templates/cve-less/plugins/qards-70d2ed5770a2a31bdff6c60df8512383.yaml new file mode 100644 index 0000000000..a5c66325f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qards-70d2ed5770a2a31bdff6c60df8512383.yaml @@ -0,0 +1,58 @@ +id: qards-70d2ed5770a2a31bdff6c60df8512383 + +info: + name: > + Qards (All Versions) - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/645ad965-4da3-45e4-aa9e-d5f5f8c9f087?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qards/" + google-query: inurl:"/wp-content/plugins/qards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qards,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qards-e6cabe992a07b751187d2c7299c53fb6.yaml b/nuclei-templates/cve-less/plugins/qards-e6cabe992a07b751187d2c7299c53fb6.yaml new file mode 100644 index 0000000000..295bbb6639 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qards-e6cabe992a07b751187d2c7299c53fb6.yaml @@ -0,0 +1,58 @@ +id: qards-e6cabe992a07b751187d2c7299c53fb6 + +info: + name: > + Qards (Unspecified Version) - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e95ded5-ebf7-4ed3-a194-7e7e494d0c40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qards/" + google-query: inurl:"/wp-content/plugins/qards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qards,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qards-free-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/qards-free-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..1d3e98701e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qards-free-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: qards-free-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qards-free/" + google-query: inurl:"/wp-content/plugins/qards-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qards-free,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qards-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qards-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qe-seo-handyman-72e98d054dd35c38c2ccedc1b3e556e3.yaml b/nuclei-templates/cve-less/plugins/qe-seo-handyman-72e98d054dd35c38c2ccedc1b3e556e3.yaml new file mode 100644 index 0000000000..f38c1b7b5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qe-seo-handyman-72e98d054dd35c38c2ccedc1b3e556e3.yaml @@ -0,0 +1,58 @@ +id: qe-seo-handyman-72e98d054dd35c38c2ccedc1b3e556e3 + +info: + name: > + Qe SEO Handyman <= 1.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa05ad02-8625-4bf9-983e-548fbb7634f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qe-seo-handyman/" + google-query: inurl:"/wp-content/plugins/qe-seo-handyman/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qe-seo-handyman,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qe-seo-handyman/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qe-seo-handyman" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qe-seo-handyman-9b3e1e16f60897007a08c1914eadf98c.yaml b/nuclei-templates/cve-less/plugins/qe-seo-handyman-9b3e1e16f60897007a08c1914eadf98c.yaml new file mode 100644 index 0000000000..ea6a5351d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qe-seo-handyman-9b3e1e16f60897007a08c1914eadf98c.yaml @@ -0,0 +1,58 @@ +id: qe-seo-handyman-9b3e1e16f60897007a08c1914eadf98c + +info: + name: > + Qe SEO Handyman <= 1.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e659cc27-ae01-4d7b-a6f4-9fcb2aeb1b57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qe-seo-handyman/" + google-query: inurl:"/wp-content/plugins/qe-seo-handyman/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qe-seo-handyman,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qe-seo-handyman/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qe-seo-handyman" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-236ec29d3a581237ffdca9038176da82.yaml b/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-236ec29d3a581237ffdca9038176da82.yaml new file mode 100644 index 0000000000..37d9e48ae8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-236ec29d3a581237ffdca9038176da82.yaml @@ -0,0 +1,58 @@ +id: qi-addons-for-elementor-236ec29d3a581237ffdca9038176da82 + +info: + name: > + Qi Addons For Elementor <= 1.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e154a12d-8ade-456e-ad64-e1cd419e2b2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qi-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/qi-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qi-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qi-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qi-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-5f28fbeb41c87c1968016458f52b73af.yaml b/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-5f28fbeb41c87c1968016458f52b73af.yaml new file mode 100644 index 0000000000..14713328bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-5f28fbeb41c87c1968016458f52b73af.yaml @@ -0,0 +1,58 @@ +id: qi-addons-for-elementor-5f28fbeb41c87c1968016458f52b73af + +info: + name: > + Qi Addons For Elementor <= 1.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40a883e8-7ce0-4fca-a585-428b67144694?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qi-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/qi-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qi-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qi-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qi-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-d88df7a254a138ad74fa62f540e9ec2c.yaml b/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-d88df7a254a138ad74fa62f540e9ec2c.yaml new file mode 100644 index 0000000000..d64f702100 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-d88df7a254a138ad74fa62f540e9ec2c.yaml @@ -0,0 +1,58 @@ +id: qi-addons-for-elementor-d88df7a254a138ad74fa62f540e9ec2c + +info: + name: > + Qi Addons For Elementor <= 1.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb228bda-5094-4e54-a197-3b66376e2216?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qi-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/qi-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qi-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qi-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qi-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-fc19ca606bef9f853ea0565c4043c5ce.yaml b/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-fc19ca606bef9f853ea0565c4043c5ce.yaml new file mode 100644 index 0000000000..95ea3101ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qi-addons-for-elementor-fc19ca606bef9f853ea0565c4043c5ce.yaml @@ -0,0 +1,58 @@ +id: qi-addons-for-elementor-fc19ca606bef9f853ea0565c4043c5ce + +info: + name: > + Qi Addons For Elementor <= 1.6.3 - Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d979950-d365-4750-a4f1-df9335d3452d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qi-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/qi-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qi-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qi-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qi-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qiniu-uploader-de57d40696cbfcd8ffe966c8ed179267.yaml b/nuclei-templates/cve-less/plugins/qiniu-uploader-de57d40696cbfcd8ffe966c8ed179267.yaml new file mode 100644 index 0000000000..30b279ab5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qiniu-uploader-de57d40696cbfcd8ffe966c8ed179267.yaml @@ -0,0 +1,58 @@ +id: qiniu-uploader-de57d40696cbfcd8ffe966c8ed179267 + +info: + name: > + Qiniu Uploader <= 0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e8fe670-5072-43c2-8ff6-e8730d24b9cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qiniu-uploader/" + google-query: inurl:"/wp-content/plugins/qiniu-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qiniu-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qiniu-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qiniu-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qode-essential-addons-204d25ca766e5be5a84be69d8f92acaa.yaml b/nuclei-templates/cve-less/plugins/qode-essential-addons-204d25ca766e5be5a84be69d8f92acaa.yaml new file mode 100644 index 0000000000..cbd00628fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qode-essential-addons-204d25ca766e5be5a84be69d8f92acaa.yaml @@ -0,0 +1,58 @@ +id: qode-essential-addons-204d25ca766e5be5a84be69d8f92acaa + +info: + name: > + Qode Essential Addons <= 1.5.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/443c59b9-275d-4d17-a870-9ae013c1a5c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qode-essential-addons/" + google-query: inurl:"/wp-content/plugins/qode-essential-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qode-essential-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qode-essential-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qode-essential-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qode-instagram-widget-24af70f4d05b151741440482fab416b5.yaml b/nuclei-templates/cve-less/plugins/qode-instagram-widget-24af70f4d05b151741440482fab416b5.yaml new file mode 100644 index 0000000000..97f78f4ebd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qode-instagram-widget-24af70f4d05b151741440482fab416b5.yaml @@ -0,0 +1,58 @@ +id: qode-instagram-widget-24af70f4d05b151741440482fab416b5 + +info: + name: > + Bridge Theme <= 18.2, Qode Instagram Widget <=2.0.1, Qode Twitter Feed <= 2.0.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1d2015b-86e8-4d0f-b095-f3917480ff15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qode-instagram-widget/" + google-query: inurl:"/wp-content/plugins/qode-instagram-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qode-instagram-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qode-instagram-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qode-instagram-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qode-twitter-feed-24af70f4d05b151741440482fab416b5.yaml b/nuclei-templates/cve-less/plugins/qode-twitter-feed-24af70f4d05b151741440482fab416b5.yaml new file mode 100644 index 0000000000..124aa1e8e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qode-twitter-feed-24af70f4d05b151741440482fab416b5.yaml @@ -0,0 +1,58 @@ +id: qode-twitter-feed-24af70f4d05b151741440482fab416b5 + +info: + name: > + Bridge Theme <= 18.2, Qode Instagram Widget <=2.0.1, Qode Twitter Feed <= 2.0.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1d2015b-86e8-4d0f-b095-f3917480ff15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qode-twitter-feed/" + google-query: inurl:"/wp-content/plugins/qode-twitter-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qode-twitter-feed,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qode-twitter-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qode-twitter-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qr-code-composer-d93a6b7f14b256d2a3a93d0625fdf894.yaml b/nuclei-templates/cve-less/plugins/qr-code-composer-d93a6b7f14b256d2a3a93d0625fdf894.yaml new file mode 100644 index 0000000000..f456956e23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qr-code-composer-d93a6b7f14b256d2a3a93d0625fdf894.yaml @@ -0,0 +1,58 @@ +id: qr-code-composer-d93a6b7f14b256d2a3a93d0625fdf894 + +info: + name: > + QR Code Composer – Automatic QR code Generator <= 2.0.3 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8adfd055-833c-41f8-99b7-ebc4c2231973?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qr-code-composer/" + google-query: inurl:"/wp-content/plugins/qr-code-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qr-code-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qr-code-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qr-code-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qr-code-tag-01bea8ce6854ad71bd30075dcae56490.yaml b/nuclei-templates/cve-less/plugins/qr-code-tag-01bea8ce6854ad71bd30075dcae56490.yaml new file mode 100644 index 0000000000..e2ef602dde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qr-code-tag-01bea8ce6854ad71bd30075dcae56490.yaml @@ -0,0 +1,58 @@ +id: qr-code-tag-01bea8ce6854ad71bd30075dcae56490 + +info: + name: > + QR Code Tag <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be004002-a3ac-46e9-b0c1-258f05f97b2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qr-code-tag/" + google-query: inurl:"/wp-content/plugins/qr-code-tag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qr-code-tag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qr-code-tag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qr-code-tag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qr-redirector-c050d4c8a8366a715e53188fca3792c1.yaml b/nuclei-templates/cve-less/plugins/qr-redirector-c050d4c8a8366a715e53188fca3792c1.yaml new file mode 100644 index 0000000000..7033680699 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qr-redirector-c050d4c8a8366a715e53188fca3792c1.yaml @@ -0,0 +1,58 @@ +id: qr-redirector-c050d4c8a8366a715e53188fca3792c1 + +info: + name: > + QR Redirector < 1.6.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc2ee795-39e5-48c2-ac2a-cfc520bdd857?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qr-redirector/" + google-query: inurl:"/wp-content/plugins/qr-redirector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qr-redirector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qr-redirector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qr-redirector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qr-redirector-c4d987240409a1f0d12971f957b18465.yaml b/nuclei-templates/cve-less/plugins/qr-redirector-c4d987240409a1f0d12971f957b18465.yaml new file mode 100644 index 0000000000..a236ed79d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qr-redirector-c4d987240409a1f0d12971f957b18465.yaml @@ -0,0 +1,58 @@ +id: qr-redirector-c4d987240409a1f0d12971f957b18465 + +info: + name: > + QR Redirector <= 1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82f311a5-6ef3-4052-ab9d-fdb23f7b7406?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qr-redirector/" + google-query: inurl:"/wp-content/plugins/qr-redirector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qr-redirector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qr-redirector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qr-redirector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qt-kentharadio-3a52346bbe93c0a607f0387208360f6f.yaml b/nuclei-templates/cve-less/plugins/qt-kentharadio-3a52346bbe93c0a607f0387208360f6f.yaml new file mode 100644 index 0000000000..c34a87082b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qt-kentharadio-3a52346bbe93c0a607f0387208360f6f.yaml @@ -0,0 +1,58 @@ +id: qt-kentharadio-3a52346bbe93c0a607f0387208360f6f + +info: + name: > + QT KenthaRadio < 2.0.2 & OnAir2 < 3.9.9.2 - Server-Side Request Forgery & Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93b5552e-bb24-4dfb-a779-8451f619ff50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qt-kentharadio/" + google-query: inurl:"/wp-content/plugins/qt-kentharadio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qt-kentharadio,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qt-kentharadio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qt-kentharadio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qtranslate-1a21904a7af165ae2d206e73642b0122.yaml b/nuclei-templates/cve-less/plugins/qtranslate-1a21904a7af165ae2d206e73642b0122.yaml new file mode 100644 index 0000000000..f7fafbbdb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qtranslate-1a21904a7af165ae2d206e73642b0122.yaml @@ -0,0 +1,58 @@ +id: qtranslate-1a21904a7af165ae2d206e73642b0122 + +info: + name: > + qTranslate <= 2.5.39 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec2da093-9f36-44c5-948b-590fd99734e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qtranslate/" + google-query: inurl:"/wp-content/plugins/qtranslate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qtranslate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qtranslate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qtranslate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qtranslate-bc3ead94b2639f49d2a3b634baef9593.yaml b/nuclei-templates/cve-less/plugins/qtranslate-bc3ead94b2639f49d2a3b634baef9593.yaml new file mode 100644 index 0000000000..cc32c2d52e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qtranslate-bc3ead94b2639f49d2a3b634baef9593.yaml @@ -0,0 +1,58 @@ +id: qtranslate-bc3ead94b2639f49d2a3b634baef9593 + +info: + name: > + qTranslate <= 2.5.39 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fd1de2b-bb88-4f7c-b9eb-784eb7af17a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qtranslate/" + google-query: inurl:"/wp-content/plugins/qtranslate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qtranslate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qtranslate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qtranslate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qtranslate-slug-06390fac0ced660df846425f4aecaf69.yaml b/nuclei-templates/cve-less/plugins/qtranslate-slug-06390fac0ced660df846425f4aecaf69.yaml new file mode 100644 index 0000000000..f85afc1e7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qtranslate-slug-06390fac0ced660df846425f4aecaf69.yaml @@ -0,0 +1,58 @@ +id: qtranslate-slug-06390fac0ced660df846425f4aecaf69 + +info: + name: > + Qtranslate Slug <= 1.1.18 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d682596-c32d-4abd-ba39-b57fc45c9ce0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qtranslate-slug/" + google-query: inurl:"/wp-content/plugins/qtranslate-slug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qtranslate-slug,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qtranslate-slug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qtranslate-slug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qtranslate-slug-d48b1b8c0f8a5de4fba0c27ae075681f.yaml b/nuclei-templates/cve-less/plugins/qtranslate-slug-d48b1b8c0f8a5de4fba0c27ae075681f.yaml new file mode 100644 index 0000000000..b287cf2634 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qtranslate-slug-d48b1b8c0f8a5de4fba0c27ae075681f.yaml @@ -0,0 +1,58 @@ +id: qtranslate-slug-d48b1b8c0f8a5de4fba0c27ae075681f + +info: + name: > + Qtranslate Slug <= 1.1.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a506ad5b-e88d-4264-84d7-fa6c41026c36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qtranslate-slug/" + google-query: inurl:"/wp-content/plugins/qtranslate-slug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qtranslate-slug,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qtranslate-slug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qtranslate-slug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qtranslate-to-wpml-export-200e4897c4af10260a18bb0d58b656f6.yaml b/nuclei-templates/cve-less/plugins/qtranslate-to-wpml-export-200e4897c4af10260a18bb0d58b656f6.yaml new file mode 100644 index 0000000000..fc43167980 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qtranslate-to-wpml-export-200e4897c4af10260a18bb0d58b656f6.yaml @@ -0,0 +1,58 @@ +id: qtranslate-to-wpml-export-200e4897c4af10260a18bb0d58b656f6 + +info: + name: > + qTranslate X Cleanup and WPML Import <= 3.0.1 - Cross-Site Request Forgery via clean_ajx + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43d534f8-fb1c-4170-a66e-2cef72cd40de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qtranslate-to-wpml-export/" + google-query: inurl:"/wp-content/plugins/qtranslate-to-wpml-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qtranslate-to-wpml-export,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qtranslate-to-wpml-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qtranslate-to-wpml-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qtranslate-to-wpml-export-9583c7a118279761c36edb998dbf641d.yaml b/nuclei-templates/cve-less/plugins/qtranslate-to-wpml-export-9583c7a118279761c36edb998dbf641d.yaml new file mode 100644 index 0000000000..dde668b2e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qtranslate-to-wpml-export-9583c7a118279761c36edb998dbf641d.yaml @@ -0,0 +1,58 @@ +id: qtranslate-to-wpml-export-9583c7a118279761c36edb998dbf641d + +info: + name: > + qTranslate X Cleanup and WPML Import <= 3.0.1 - Missing Authorization via clean_ajx + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbe973a3-a8bf-4037-9067-7cc0987291fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qtranslate-to-wpml-export/" + google-query: inurl:"/wp-content/plugins/qtranslate-to-wpml-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qtranslate-to-wpml-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qtranslate-to-wpml-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qtranslate-to-wpml-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qtranslate-x-73d067013f68a47f6173cf4bf4742fbc.yaml b/nuclei-templates/cve-less/plugins/qtranslate-x-73d067013f68a47f6173cf4bf4742fbc.yaml new file mode 100644 index 0000000000..3deee7b251 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qtranslate-x-73d067013f68a47f6173cf4bf4742fbc.yaml @@ -0,0 +1,58 @@ +id: qtranslate-x-73d067013f68a47f6173cf4bf4742fbc + +info: + name: > + qTranslate X < 3.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1775a56e-3590-499e-89b6-79d69d80fa0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qtranslate-x/" + google-query: inurl:"/wp-content/plugins/qtranslate-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qtranslate-x,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qtranslate-x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qtranslate-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qtranslate-x-92923e233ad137b6c565b0d9cb5490bf.yaml b/nuclei-templates/cve-less/plugins/qtranslate-x-92923e233ad137b6c565b0d9cb5490bf.yaml new file mode 100644 index 0000000000..cf833aec5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qtranslate-x-92923e233ad137b6c565b0d9cb5490bf.yaml @@ -0,0 +1,58 @@ +id: qtranslate-x-92923e233ad137b6c565b0d9cb5490bf + +info: + name: > + qTranslate X <= 3.4.6.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afd67c36-31ec-4e44-bad5-a018834ccfbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qtranslate-x/" + google-query: inurl:"/wp-content/plugins/qtranslate-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qtranslate-x,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qtranslate-x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qtranslate-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quadmenu-3151cdab51ec74016dc2dec07b8a7882.yaml b/nuclei-templates/cve-less/plugins/quadmenu-3151cdab51ec74016dc2dec07b8a7882.yaml new file mode 100644 index 0000000000..0a954cbc2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quadmenu-3151cdab51ec74016dc2dec07b8a7882.yaml @@ -0,0 +1,58 @@ +id: quadmenu-3151cdab51ec74016dc2dec07b8a7882 + +info: + name: > + WordPress Mega Menu <= 2.0.6 - Arbitrary File Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04003542-fd62-4587-9834-70e7fe8f08ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quadmenu/" + google-query: inurl:"/wp-content/plugins/quadmenu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quadmenu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quadmenu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quadmenu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quartz-1f86e582a713c3bd4333747ed30a9d68.yaml b/nuclei-templates/cve-less/plugins/quartz-1f86e582a713c3bd4333747ed30a9d68.yaml new file mode 100644 index 0000000000..97475c69f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quartz-1f86e582a713c3bd4333747ed30a9d68.yaml @@ -0,0 +1,58 @@ +id: quartz-1f86e582a713c3bd4333747ed30a9d68 + +info: + name: > + Quartz <= 1.01.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82246b72-3c29-4574-af86-d0435eecce5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quartz/" + google-query: inurl:"/wp-content/plugins/quartz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quartz,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quartz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quartz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.01.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quasar-form-88a3fac791c3551827ed85f785e74c8c.yaml b/nuclei-templates/cve-less/plugins/quasar-form-88a3fac791c3551827ed85f785e74c8c.yaml new file mode 100644 index 0000000000..aebf30affe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quasar-form-88a3fac791c3551827ed85f785e74c8c.yaml @@ -0,0 +1,58 @@ +id: quasar-form-88a3fac791c3551827ed85f785e74c8c + +info: + name: > + Quasar form <= 6.1 - Authenticated (Subscriber+) SQL Injection via 'id' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/150021d3-71bb-41c0-bb1c-5843e94ec0b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quasar-form/" + google-query: inurl:"/wp-content/plugins/quasar-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quasar-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quasar-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quasar-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qubely-658353ea5a92a1a477d6b2c5047dc091.yaml b/nuclei-templates/cve-less/plugins/qubely-658353ea5a92a1a477d6b2c5047dc091.yaml new file mode 100644 index 0000000000..5a1f3500ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qubely-658353ea5a92a1a477d6b2c5047dc091.yaml @@ -0,0 +1,58 @@ +id: qubely-658353ea5a92a1a477d6b2c5047dc091 + +info: + name: > + Qubely <= 1.7.9 - Incorrect Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86f3c549-2cdd-4294-bc62-0892e94ddbb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qubely/" + google-query: inurl:"/wp-content/plugins/qubely/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qubely,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qubely/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qubely" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qubely-6f075010900e43673686fc0d208260ff.yaml b/nuclei-templates/cve-less/plugins/qubely-6f075010900e43673686fc0d208260ff.yaml new file mode 100644 index 0000000000..22fcd450eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qubely-6f075010900e43673686fc0d208260ff.yaml @@ -0,0 +1,58 @@ +id: qubely-6f075010900e43673686fc0d208260ff + +info: + name: > + Quebely <= 1.8.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'className' Block Option + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/991aefb4-2e6b-48e6-bd19-98b21a57f6db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qubely/" + google-query: inurl:"/wp-content/plugins/qubely/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qubely,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qubely/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qubely" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qubely-ac09455e90923727a5127092ab5cf052.yaml b/nuclei-templates/cve-less/plugins/qubely-ac09455e90923727a5127092ab5cf052.yaml new file mode 100644 index 0000000000..3e2546d343 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qubely-ac09455e90923727a5127092ab5cf052.yaml @@ -0,0 +1,58 @@ +id: qubely-ac09455e90923727a5127092ab5cf052 + +info: + name: > + Qubely <= 1.7.7 - Missing Authorization to Arbitrary Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b660260-e335-4be0-a266-0cdc9a4d7504?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qubely/" + google-query: inurl:"/wp-content/plugins/qubely/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qubely,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qubely/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qubely" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qubely-fea58c2fffc9b2ea6b58c47efd69a713.yaml b/nuclei-templates/cve-less/plugins/qubely-fea58c2fffc9b2ea6b58c47efd69a713.yaml new file mode 100644 index 0000000000..5c6d4c4e58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qubely-fea58c2fffc9b2ea6b58c47efd69a713.yaml @@ -0,0 +1,58 @@ +id: qubely-fea58c2fffc9b2ea6b58c47efd69a713 + +info: + name: > + Qubely <= 1.7.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7681a661-21bd-42fb-ac97-1da808435520?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qubely/" + google-query: inurl:"/wp-content/plugins/qubely/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qubely,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qubely/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qubely" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qubotchat-1b8adc4375e4968834c6e9a5908156bc.yaml b/nuclei-templates/cve-less/plugins/qubotchat-1b8adc4375e4968834c6e9a5908156bc.yaml new file mode 100644 index 0000000000..4797f18485 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qubotchat-1b8adc4375e4968834c6e9a5908156bc.yaml @@ -0,0 +1,58 @@ +id: qubotchat-1b8adc4375e4968834c6e9a5908156bc + +info: + name: > + QuBotChat <= 1.1.5 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45f98c00-0bfd-405e-a6b3-581841d803de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qubotchat/" + google-query: inurl:"/wp-content/plugins/qubotchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qubotchat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qubotchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qubotchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qubotchat-f3d365dcf43ab1e2b6ca241869ef39d2.yaml b/nuclei-templates/cve-less/plugins/qubotchat-f3d365dcf43ab1e2b6ca241869ef39d2.yaml new file mode 100644 index 0000000000..cafbe94a5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qubotchat-f3d365dcf43ab1e2b6ca241869ef39d2.yaml @@ -0,0 +1,58 @@ +id: qubotchat-f3d365dcf43ab1e2b6ca241869ef39d2 + +info: + name: > + QuBotChat <= 1.1.5 - Unauthenticated Self-Based Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd27aeb9-4257-4b15-8f14-8a8c89522c32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qubotchat/" + google-query: inurl:"/wp-content/plugins/qubotchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qubotchat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qubotchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qubotchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/query-wrangler-67a6c3615087f3f1fcb723b7f2d140b4.yaml b/nuclei-templates/cve-less/plugins/query-wrangler-67a6c3615087f3f1fcb723b7f2d140b4.yaml new file mode 100644 index 0000000000..c56a642297 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/query-wrangler-67a6c3615087f3f1fcb723b7f2d140b4.yaml @@ -0,0 +1,58 @@ +id: query-wrangler-67a6c3615087f3f1fcb723b7f2d140b4 + +info: + name: > + Query Wrangler <= 1.5.51 - Reflected Cross-Site Scripting via page parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c79d781e-4c11-43e9-8c5f-aa89e8fbf635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/query-wrangler/" + google-query: inurl:"/wp-content/plugins/query-wrangler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,query-wrangler,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/query-wrangler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "query-wrangler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/querywall-9ee0bf881f08cd3cb60239af7879852d.yaml b/nuclei-templates/cve-less/plugins/querywall-9ee0bf881f08cd3cb60239af7879852d.yaml new file mode 100644 index 0000000000..38ae36e37f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/querywall-9ee0bf881f08cd3cb60239af7879852d.yaml @@ -0,0 +1,58 @@ +id: querywall-9ee0bf881f08cd3cb60239af7879852d + +info: + name: > + QueryWall <= 1.1.1 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/306c98ad-0d42-4ad5-b82a-bf4579865aa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/querywall/" + google-query: inurl:"/wp-content/plugins/querywall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,querywall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/querywall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "querywall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-adsense-910562f88b7ea3f43ef082aba4fd2945.yaml b/nuclei-templates/cve-less/plugins/quick-adsense-910562f88b7ea3f43ef082aba4fd2945.yaml new file mode 100644 index 0000000000..d0f07059a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-adsense-910562f88b7ea3f43ef082aba4fd2945.yaml @@ -0,0 +1,58 @@ +id: quick-adsense-910562f88b7ea3f43ef082aba4fd2945 + +info: + name: > + Quick Adsense < 2.8.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee5e1262-193c-480b-bc27-481c961c7c47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-adsense/" + google-query: inurl:"/wp-content/plugins/quick-adsense/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-adsense,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-adsense/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-adsense" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-affiliate-store-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/quick-affiliate-store-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ebb9ff94a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-affiliate-store-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: quick-affiliate-store-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-affiliate-store/" + google-query: inurl:"/wp-content/plugins/quick-affiliate-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-affiliate-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-affiliate-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-affiliate-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-call-button-5e36e98c6255c04628e65e3d6f66d61f.yaml b/nuclei-templates/cve-less/plugins/quick-call-button-5e36e98c6255c04628e65e3d6f66d61f.yaml new file mode 100644 index 0000000000..516d61a0fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-call-button-5e36e98c6255c04628e65e3d6f66d61f.yaml @@ -0,0 +1,58 @@ +id: quick-call-button-5e36e98c6255c04628e65e3d6f66d61f + +info: + name: > + Quick Call Button <= 1.2.9 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b5e9c7f-e0c9-4c27-8b39-87e15fd29604?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-call-button/" + google-query: inurl:"/wp-content/plugins/quick-call-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-call-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-call-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-call-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-chat-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml b/nuclei-templates/cve-less/plugins/quick-chat-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml new file mode 100644 index 0000000000..ef360779bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-chat-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml @@ -0,0 +1,58 @@ +id: quick-chat-0dc6cfa3fba0c385fc2da9ea78090e2f + +info: + name: > + Quick Chat <= 4.14 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac4de440-a446-4b96-ba9b-115e3186ce1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-chat/" + google-query: inurl:"/wp-content/plugins/quick-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-chat,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-chat-8cc73df94f56aa782250ddecf7e67823.yaml b/nuclei-templates/cve-less/plugins/quick-chat-8cc73df94f56aa782250ddecf7e67823.yaml new file mode 100644 index 0000000000..d9ea022ee5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-chat-8cc73df94f56aa782250ddecf7e67823.yaml @@ -0,0 +1,58 @@ +id: quick-chat-8cc73df94f56aa782250ddecf7e67823 + +info: + name: > + Quick Chat < 4.00 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4095518-0daf-4cfe-a521-86fb1c927f51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-chat/" + google-query: inurl:"/wp-content/plugins/quick-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-chat,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-chat-abc60569ec003973ef7bd7139d6a27ba.yaml b/nuclei-templates/cve-less/plugins/quick-chat-abc60569ec003973ef7bd7139d6a27ba.yaml new file mode 100644 index 0000000000..5a439868f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-chat-abc60569ec003973ef7bd7139d6a27ba.yaml @@ -0,0 +1,58 @@ +id: quick-chat-abc60569ec003973ef7bd7139d6a27ba + +info: + name: > + Quick Chat < 4.00 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8effa36-de47-4a24-af76-fb10e9f6da0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-chat/" + google-query: inurl:"/wp-content/plugins/quick-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-chat,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.00') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-contact-form-62b74eeb9a66bc4a3cf51fa299ef8a9e.yaml b/nuclei-templates/cve-less/plugins/quick-contact-form-62b74eeb9a66bc4a3cf51fa299ef8a9e.yaml new file mode 100644 index 0000000000..833010d18d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-contact-form-62b74eeb9a66bc4a3cf51fa299ef8a9e.yaml @@ -0,0 +1,58 @@ +id: quick-contact-form-62b74eeb9a66bc4a3cf51fa299ef8a9e + +info: + name: > + Quick Contact Form <= 8.0.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90654fac-b9c7-422f-8472-2a7c7fd0de0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-contact-form/" + google-query: inurl:"/wp-content/plugins/quick-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-contact-form-b466bd977f9394a49d2724fac1d5dea0.yaml b/nuclei-templates/cve-less/plugins/quick-contact-form-b466bd977f9394a49d2724fac1d5dea0.yaml new file mode 100644 index 0000000000..11fd9de075 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-contact-form-b466bd977f9394a49d2724fac1d5dea0.yaml @@ -0,0 +1,58 @@ +id: quick-contact-form-b466bd977f9394a49d2724fac1d5dea0 + +info: + name: > + Quick Contact Form < 6.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d951e6b4-986a-400a-ab28-066a4ea5cbca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-contact-form/" + google-query: inurl:"/wp-content/plugins/quick-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-contact-form-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/quick-contact-form-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a60af360f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-contact-form-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: quick-contact-form-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-contact-form/" + google-query: inurl:"/wp-content/plugins/quick-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-contact-form-ce6b524d26d0001f570c1800dff1d295.yaml b/nuclei-templates/cve-less/plugins/quick-contact-form-ce6b524d26d0001f570c1800dff1d295.yaml new file mode 100644 index 0000000000..2bf57e8789 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-contact-form-ce6b524d26d0001f570c1800dff1d295.yaml @@ -0,0 +1,58 @@ +id: quick-contact-form-ce6b524d26d0001f570c1800dff1d295 + +info: + name: > + Quick Contact Form <= 8.0.3.1 - Cross-Site Request Forgery to Sensitive Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b930ddd7-a2a3-4b83-a1a6-ea08bbcb07a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-contact-form/" + google-query: inurl:"/wp-content/plugins/quick-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-contact-form-f442fd7af4f1450884ccd37204471581.yaml b/nuclei-templates/cve-less/plugins/quick-contact-form-f442fd7af4f1450884ccd37204471581.yaml new file mode 100644 index 0000000000..d1e985a339 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-contact-form-f442fd7af4f1450884ccd37204471581.yaml @@ -0,0 +1,58 @@ +id: quick-contact-form-f442fd7af4f1450884ccd37204471581 + +info: + name: > + Quick Contact Form <= 8.0.3.1 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b5e86be-8a35-48d8-a676-9f7074b81cb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-contact-form/" + google-query: inurl:"/wp-content/plugins/quick-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-contact-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-edit-template-link-4d297c80a42418395b04392e5878bdbd.yaml b/nuclei-templates/cve-less/plugins/quick-edit-template-link-4d297c80a42418395b04392e5878bdbd.yaml new file mode 100644 index 0000000000..dd5d17b0b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-edit-template-link-4d297c80a42418395b04392e5878bdbd.yaml @@ -0,0 +1,58 @@ +id: quick-edit-template-link-4d297c80a42418395b04392e5878bdbd + +info: + name: > + Template Debugger <= 3.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8da0fed9-4b88-4b68-b317-124fe678cfa4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-edit-template-link/" + google-query: inurl:"/wp-content/plugins/quick-edit-template-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-edit-template-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-edit-template-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-edit-template-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-event-manager-54c83422727dbe8ec911e59f2a60998f.yaml b/nuclei-templates/cve-less/plugins/quick-event-manager-54c83422727dbe8ec911e59f2a60998f.yaml new file mode 100644 index 0000000000..8c271d72d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-event-manager-54c83422727dbe8ec911e59f2a60998f.yaml @@ -0,0 +1,58 @@ +id: quick-event-manager-54c83422727dbe8ec911e59f2a60998f + +info: + name: > + Quick Event Manager <= 9.6.4 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8962c601-2c2c-4b96-b8a4-fdc2ad8a2c08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-event-manager/" + google-query: inurl:"/wp-content/plugins/quick-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-event-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-event-manager-62435dbb476a65fcd06c2741817e8fae.yaml b/nuclei-templates/cve-less/plugins/quick-event-manager-62435dbb476a65fcd06c2741817e8fae.yaml new file mode 100644 index 0000000000..bb5530bb3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-event-manager-62435dbb476a65fcd06c2741817e8fae.yaml @@ -0,0 +1,58 @@ +id: quick-event-manager-62435dbb476a65fcd06c2741817e8fae + +info: + name: > + Quick Event Manager <= 9.7.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8f008c6-42c6-40c3-9058-d8812ec40bef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-event-manager/" + google-query: inurl:"/wp-content/plugins/quick-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-event-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-event-manager-8d27ee0724391ce9a1b74bd9a604ecbc.yaml b/nuclei-templates/cve-less/plugins/quick-event-manager-8d27ee0724391ce9a1b74bd9a604ecbc.yaml new file mode 100644 index 0000000000..b72fb5cbbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-event-manager-8d27ee0724391ce9a1b74bd9a604ecbc.yaml @@ -0,0 +1,58 @@ +id: quick-event-manager-8d27ee0724391ce9a1b74bd9a604ecbc + +info: + name: > + Quick Event Manager <= 9.7.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d26e8b21-fa9e-4dfe-a095-5c9f74d968f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-event-manager/" + google-query: inurl:"/wp-content/plugins/quick-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-event-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-event-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/quick-event-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..618171ff27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-event-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: quick-event-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-event-manager/" + google-query: inurl:"/wp-content/plugins/quick-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-event-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-event-manager-cb184c0a5bf632bde9de97505ce638ee.yaml b/nuclei-templates/cve-less/plugins/quick-event-manager-cb184c0a5bf632bde9de97505ce638ee.yaml new file mode 100644 index 0000000000..4b6cab85f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-event-manager-cb184c0a5bf632bde9de97505ce638ee.yaml @@ -0,0 +1,58 @@ +id: quick-event-manager-cb184c0a5bf632bde9de97505ce638ee + +info: + name: > + Quick Event Manager <= 9.7.4 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53199f3c-80d1-4c4e-93ef-8a234ba8ba85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-event-manager/" + google-query: inurl:"/wp-content/plugins/quick-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-event-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-event-manager-d0fba4b305c548a881378b07e2028d26.yaml b/nuclei-templates/cve-less/plugins/quick-event-manager-d0fba4b305c548a881378b07e2028d26.yaml new file mode 100644 index 0000000000..23ed30b135 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-event-manager-d0fba4b305c548a881378b07e2028d26.yaml @@ -0,0 +1,58 @@ +id: quick-event-manager-d0fba4b305c548a881378b07e2028d26 + +info: + name: > + Quick Event Manager <= 9.7.4 - Unauthenticated Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/835f6efd-636e-411f-97a1-fa14b9a629b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-event-manager/" + google-query: inurl:"/wp-content/plugins/quick-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-event-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-featured-images-5decd5b15e9e99b50c1cb7b49d2f0314.yaml b/nuclei-templates/cve-less/plugins/quick-featured-images-5decd5b15e9e99b50c1cb7b49d2f0314.yaml new file mode 100644 index 0000000000..70c97086e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-featured-images-5decd5b15e9e99b50c1cb7b49d2f0314.yaml @@ -0,0 +1,58 @@ +id: quick-featured-images-5decd5b15e9e99b50c1cb7b49d2f0314 + +info: + name: > + Quick Featured Images <= 13.7.0 - Missing Authorization to Authenticated (Contributor+) Arbitrary Thumbnail Deletion/Setting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dbbd1a0-de05-4510-b06b-8bc396b65a97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-featured-images/" + google-query: inurl:"/wp-content/plugins/quick-featured-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-featured-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-featured-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-featured-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-interest-slider-38cb5c8ab728ac8718e42eee958aba2f.yaml b/nuclei-templates/cve-less/plugins/quick-interest-slider-38cb5c8ab728ac8718e42eee958aba2f.yaml new file mode 100644 index 0000000000..d27552a765 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-interest-slider-38cb5c8ab728ac8718e42eee958aba2f.yaml @@ -0,0 +1,58 @@ +id: quick-interest-slider-38cb5c8ab728ac8718e42eee958aba2f + +info: + name: > + Loan Repayment Calculator and Application Form <= 2.9.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08b8f1ad-f616-4ceb-9c53-9d53aac370c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-interest-slider/" + google-query: inurl:"/wp-content/plugins/quick-interest-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-interest-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-interest-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-interest-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-interest-slider-c0866523c68fe7ee32f439546ea1ce87.yaml b/nuclei-templates/cve-less/plugins/quick-interest-slider-c0866523c68fe7ee32f439546ea1ce87.yaml new file mode 100644 index 0000000000..1e48950f46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-interest-slider-c0866523c68fe7ee32f439546ea1ce87.yaml @@ -0,0 +1,58 @@ +id: quick-interest-slider-c0866523c68fe7ee32f439546ea1ce87 + +info: + name: > + Loan Repayment Calculator and Application Form <= 2.9.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8756fb7-ee15-4fc7-b5bd-b4f2e64f8e6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-interest-slider/" + google-query: inurl:"/wp-content/plugins/quick-interest-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-interest-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-interest-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-interest-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-orders-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/quick-orders-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..e9309647e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-orders-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: quick-orders-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-orders-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/quick-orders-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-orders-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-orders-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-orders-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-2b5c6ad57482cc18f3496406a2a98d3b.yaml b/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-2b5c6ad57482cc18f3496406a2a98d3b.yaml new file mode 100644 index 0000000000..20c5e0e01d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-2b5c6ad57482cc18f3496406a2a98d3b.yaml @@ -0,0 +1,58 @@ +id: quick-pagepost-redirect-plugin-2b5c6ad57482cc18f3496406a2a98d3b + +info: + name: > + Quick Page/Post Redirect Plugin < 5.0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b6e9430-bb78-47c3-9958-4f40028c3d93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-pagepost-redirect-plugin/" + google-query: inurl:"/wp-content/plugins/quick-pagepost-redirect-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-pagepost-redirect-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-pagepost-redirect-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-pagepost-redirect-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-5475b95f6d45498a4d0880aced5c1162.yaml b/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-5475b95f6d45498a4d0880aced5c1162.yaml new file mode 100644 index 0000000000..4dcd70ac09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-5475b95f6d45498a4d0880aced5c1162.yaml @@ -0,0 +1,58 @@ +id: quick-pagepost-redirect-plugin-5475b95f6d45498a4d0880aced5c1162 + +info: + name: > + Quick Page/Post Redirect Plugin <= 5.1.9 - Redirect Security Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11c4b855-8589-4ad2-b414-566ac8eb4632?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-pagepost-redirect-plugin/" + google-query: inurl:"/wp-content/plugins/quick-pagepost-redirect-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-pagepost-redirect-plugin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-pagepost-redirect-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-pagepost-redirect-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-9f2f326dd2b99a9ab7152b99b148e34c.yaml b/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-9f2f326dd2b99a9ab7152b99b148e34c.yaml new file mode 100644 index 0000000000..4b13c00871 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-pagepost-redirect-plugin-9f2f326dd2b99a9ab7152b99b148e34c.yaml @@ -0,0 +1,58 @@ +id: quick-pagepost-redirect-plugin-9f2f326dd2b99a9ab7152b99b148e34c + +info: + name: > + Quick Page/Post Redirect <= 5.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be841d6b-e3b6-46d2-aba8-fee20c21e933?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-pagepost-redirect-plugin/" + google-query: inurl:"/wp-content/plugins/quick-pagepost-redirect-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-pagepost-redirect-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-pagepost-redirect-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-pagepost-redirect-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-paypal-payments-ac00155c6073a79243073e436990a17b.yaml b/nuclei-templates/cve-less/plugins/quick-paypal-payments-ac00155c6073a79243073e436990a17b.yaml new file mode 100644 index 0000000000..560b090eec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-paypal-payments-ac00155c6073a79243073e436990a17b.yaml @@ -0,0 +1,58 @@ +id: quick-paypal-payments-ac00155c6073a79243073e436990a17b + +info: + name: > + Quick Paypal Payments <= 5.7.25 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99e61ed1-df56-4e95-b4f9-3027ee7b7793?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-paypal-payments/" + google-query: inurl:"/wp-content/plugins/quick-paypal-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-paypal-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-paypal-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-paypal-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-paypal-payments-ae8fa78ab666a9d6da1d3e3cf8461322.yaml b/nuclei-templates/cve-less/plugins/quick-paypal-payments-ae8fa78ab666a9d6da1d3e3cf8461322.yaml new file mode 100644 index 0000000000..e5c3a4c777 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-paypal-payments-ae8fa78ab666a9d6da1d3e3cf8461322.yaml @@ -0,0 +1,58 @@ +id: quick-paypal-payments-ae8fa78ab666a9d6da1d3e3cf8461322 + +info: + name: > + Quick Paypal Payments <= 5.7.25 - Unauthenticated Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3a670f7-7eca-4e66-9bc9-3c1e92b0c8d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-paypal-payments/" + google-query: inurl:"/wp-content/plugins/quick-paypal-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-paypal-payments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-paypal-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-paypal-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-paypal-payments-b05b3a24d162881cbb5011a114d7958e.yaml b/nuclei-templates/cve-less/plugins/quick-paypal-payments-b05b3a24d162881cbb5011a114d7958e.yaml new file mode 100644 index 0000000000..e0a1a91223 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-paypal-payments-b05b3a24d162881cbb5011a114d7958e.yaml @@ -0,0 +1,58 @@ +id: quick-paypal-payments-b05b3a24d162881cbb5011a114d7958e + +info: + name: > + Quick Paypal Payments < 3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e3524a6-4f12-4640-96a0-da60afa0b770?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-paypal-payments/" + google-query: inurl:"/wp-content/plugins/quick-paypal-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-paypal-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-paypal-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-paypal-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-paypal-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/quick-paypal-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..46fbcb34b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-paypal-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: quick-paypal-payments-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-paypal-payments/" + google-query: inurl:"/wp-content/plugins/quick-paypal-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-paypal-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-paypal-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-paypal-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-paypal-payments-be3c32e9604f247b7cd8b895cd2961c3.yaml b/nuclei-templates/cve-less/plugins/quick-paypal-payments-be3c32e9604f247b7cd8b895cd2961c3.yaml new file mode 100644 index 0000000000..3f8f2d4fb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-paypal-payments-be3c32e9604f247b7cd8b895cd2961c3.yaml @@ -0,0 +1,58 @@ +id: quick-paypal-payments-be3c32e9604f247b7cd8b895cd2961c3 + +info: + name: > + Quick Paypal Payments <= 5.7.25 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8133d84-e28c-4132-9eb5-941800320f84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-paypal-payments/" + google-query: inurl:"/wp-content/plugins/quick-paypal-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-paypal-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-paypal-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-paypal-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-paypal-payments-c39c9d651b411fa109fee2b8c3a1d9b8.yaml b/nuclei-templates/cve-less/plugins/quick-paypal-payments-c39c9d651b411fa109fee2b8c3a1d9b8.yaml new file mode 100644 index 0000000000..05ba9a4115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-paypal-payments-c39c9d651b411fa109fee2b8c3a1d9b8.yaml @@ -0,0 +1,58 @@ +id: quick-paypal-payments-c39c9d651b411fa109fee2b8c3a1d9b8 + +info: + name: > + Quick Paypal Payments <= 5.7.25 - Authenticated (Contributor+) Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b36303d6-ad28-4354-9f60-acc7df15f468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-paypal-payments/" + google-query: inurl:"/wp-content/plugins/quick-paypal-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-paypal-payments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-paypal-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-paypal-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-paypal-payments-e5b4920cbbb8f5f8f7e1a259b30101c9.yaml b/nuclei-templates/cve-less/plugins/quick-paypal-payments-e5b4920cbbb8f5f8f7e1a259b30101c9.yaml new file mode 100644 index 0000000000..fa07284bcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-paypal-payments-e5b4920cbbb8f5f8f7e1a259b30101c9.yaml @@ -0,0 +1,58 @@ +id: quick-paypal-payments-e5b4920cbbb8f5f8f7e1a259b30101c9 + +info: + name: > + Quick Paypal Payments <= 5.7.26.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a507489-f337-4b47-9506-daea1b426798?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-paypal-payments/" + google-query: inurl:"/wp-content/plugins/quick-paypal-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-paypal-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-paypal-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-paypal-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.26.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-post-widget-ab4d33853504febd7c01f9cee8c9c3d2.yaml b/nuclei-templates/cve-less/plugins/quick-post-widget-ab4d33853504febd7c01f9cee8c9c3d2.yaml new file mode 100644 index 0000000000..34eb7379a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-post-widget-ab4d33853504febd7c01f9cee8c9c3d2.yaml @@ -0,0 +1,58 @@ +id: quick-post-widget-ab4d33853504febd7c01f9cee8c9c3d2 + +info: + name: > + Quick Post Widget <= 1.9.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cf10ed7-7248-4dfd-b7ee-13cea3ee2154?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-post-widget/" + google-query: inurl:"/wp-content/plugins/quick-post-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-post-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-post-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-post-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-restaurant-menu-380da9e03ed91b4a26ee23da1fdb68e1.yaml b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-380da9e03ed91b4a26ee23da1fdb68e1.yaml new file mode 100644 index 0000000000..d19f8d4c8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-380da9e03ed91b4a26ee23da1fdb68e1.yaml @@ -0,0 +1,58 @@ +id: quick-restaurant-menu-380da9e03ed91b4a26ee23da1fdb68e1 + +info: + name: > + Quick Restaurant Menu <= 2.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97984c7d-d6ff-480c-acfe-20ab0eb04141?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-restaurant-menu/" + google-query: inurl:"/wp-content/plugins/quick-restaurant-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-restaurant-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-restaurant-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-restaurant-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-restaurant-menu-608358cb0a02728075caac1560a96687.yaml b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-608358cb0a02728075caac1560a96687.yaml new file mode 100644 index 0000000000..fdf8a9fd29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-608358cb0a02728075caac1560a96687.yaml @@ -0,0 +1,58 @@ +id: quick-restaurant-menu-608358cb0a02728075caac1560a96687 + +info: + name: > + Quick Restaurant Menu <= 2.0.2 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd8a6a4-9159-480f-abe2-71972585217b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-restaurant-menu/" + google-query: inurl:"/wp-content/plugins/quick-restaurant-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-restaurant-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-restaurant-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-restaurant-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-restaurant-menu-afdcbe4c6f5ebc0939cff7424649942e.yaml b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-afdcbe4c6f5ebc0939cff7424649942e.yaml new file mode 100644 index 0000000000..b02786a952 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-afdcbe4c6f5ebc0939cff7424649942e.yaml @@ -0,0 +1,58 @@ +id: quick-restaurant-menu-afdcbe4c6f5ebc0939cff7424649942e + +info: + name: > + Quick Restaurant Menu <= 2.0.2 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faa4fba5-cd19-4b96-aa09-07ed6d52a107?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-restaurant-menu/" + google-query: inurl:"/wp-content/plugins/quick-restaurant-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-restaurant-menu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-restaurant-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-restaurant-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-restaurant-menu-be53691c287fd0615412e7fc76d56676.yaml b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-be53691c287fd0615412e7fc76d56676.yaml new file mode 100644 index 0000000000..8162a97e7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-be53691c287fd0615412e7fc76d56676.yaml @@ -0,0 +1,58 @@ +id: quick-restaurant-menu-be53691c287fd0615412e7fc76d56676 + +info: + name: > + Quick Restaurant Menu <= 2.0.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/057a440e-4917-45c5-90ab-bb8654eae68f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-restaurant-menu/" + google-query: inurl:"/wp-content/plugins/quick-restaurant-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-restaurant-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-restaurant-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-restaurant-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-restaurant-menu-f4c35f9c74d06655cf517936ec3bc387.yaml b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-f4c35f9c74d06655cf517936ec3bc387.yaml new file mode 100644 index 0000000000..c95a7d6ea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-restaurant-menu-f4c35f9c74d06655cf517936ec3bc387.yaml @@ -0,0 +1,58 @@ +id: quick-restaurant-menu-f4c35f9c74d06655cf517936ec3bc387 + +info: + name: > + Quick Restaurant Menu <= 2.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfc7c214-8d76-453c-a05d-682aa425b06e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-restaurant-menu/" + google-query: inurl:"/wp-content/plugins/quick-restaurant-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-restaurant-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-restaurant-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-restaurant-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-restaurant-reservations-471137e11c9f1e10b7cb270b58e41353.yaml b/nuclei-templates/cve-less/plugins/quick-restaurant-reservations-471137e11c9f1e10b7cb270b58e41353.yaml new file mode 100644 index 0000000000..b1170f8827 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-restaurant-reservations-471137e11c9f1e10b7cb270b58e41353.yaml @@ -0,0 +1,58 @@ +id: quick-restaurant-reservations-471137e11c9f1e10b7cb270b58e41353 + +info: + name: > + Quick Restaurant Reservations <= 1.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7da2b5d-8e0c-492a-a6a6-7302cd277d0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/quick-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-restaurant-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-restaurant-reservations-bcb8383c6f8589761d6cb6fb2a6e00e4.yaml b/nuclei-templates/cve-less/plugins/quick-restaurant-reservations-bcb8383c6f8589761d6cb6fb2a6e00e4.yaml new file mode 100644 index 0000000000..e9f072c89d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-restaurant-reservations-bcb8383c6f8589761d6cb6fb2a6e00e4.yaml @@ -0,0 +1,58 @@ +id: quick-restaurant-reservations-bcb8383c6f8589761d6cb6fb2a6e00e4 + +info: + name: > + Quick Restaurant Reservations <= 1.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/801b593c-2822-4ac4-8411-29ef1e1484b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/quick-restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-restaurant-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-subscribe-acd84f5e4cde82a402d1c05f1e4adf06.yaml b/nuclei-templates/cve-less/plugins/quick-subscribe-acd84f5e4cde82a402d1c05f1e4adf06.yaml new file mode 100644 index 0000000000..62c690c538 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-subscribe-acd84f5e4cde82a402d1c05f1e4adf06.yaml @@ -0,0 +1,58 @@ +id: quick-subscribe-acd84f5e4cde82a402d1c05f1e4adf06 + +info: + name: > + Quick Subscribe <= 1.7.1 - Cross-Site Request Forgery to Arbitrary Settings Update and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa916029-b526-4ff3-ba70-2875b62d33a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-subscribe/" + google-query: inurl:"/wp-content/plugins/quick-subscribe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-subscribe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-subscribe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-subscribe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quick-view-and-buy-now-for-woocommerce-66d0aaa8dc75cc7c0b323f4705b3d63d.yaml b/nuclei-templates/cve-less/plugins/quick-view-and-buy-now-for-woocommerce-66d0aaa8dc75cc7c0b323f4705b3d63d.yaml new file mode 100644 index 0000000000..f0f2abde9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quick-view-and-buy-now-for-woocommerce-66d0aaa8dc75cc7c0b323f4705b3d63d.yaml @@ -0,0 +1,58 @@ +id: quick-view-and-buy-now-for-woocommerce-66d0aaa8dc75cc7c0b323f4705b3d63d + +info: + name: > + Direct Checkout – Quick View – Buy Now For WooCommerce <= 1.5.8 - Authenticated (Shop manager+) Stored Cross-Site Scripting via Custom CSS Code + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/514aa001-24c8-4624-8e25-f17b8454354c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quick-view-and-buy-now-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/quick-view-and-buy-now-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quick-view-and-buy-now-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quick-view-and-buy-now-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quick-view-and-buy-now-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quicksand-jquery-post-filter-2088a48130abc94abb1d3c3504ebe491.yaml b/nuclei-templates/cve-less/plugins/quicksand-jquery-post-filter-2088a48130abc94abb1d3c3504ebe491.yaml new file mode 100644 index 0000000000..de8738c144 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quicksand-jquery-post-filter-2088a48130abc94abb1d3c3504ebe491.yaml @@ -0,0 +1,58 @@ +id: quicksand-jquery-post-filter-2088a48130abc94abb1d3c3504ebe491 + +info: + name: > + Quicksand Post Filter jQuery Plugin <= 3.1.1 - Cross-Site Request Forgery via renderAdmin + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dd63ea6-7821-42b8-9b52-e721a8b2382d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quicksand-jquery-post-filter/" + google-query: inurl:"/wp-content/plugins/quicksand-jquery-post-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quicksand-jquery-post-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quicksand-jquery-post-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quicksand-jquery-post-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quicksand-jquery-post-filter-bf3863997447d609f7f8dc8d30e7d4d2.yaml b/nuclei-templates/cve-less/plugins/quicksand-jquery-post-filter-bf3863997447d609f7f8dc8d30e7d4d2.yaml new file mode 100644 index 0000000000..669156946e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quicksand-jquery-post-filter-bf3863997447d609f7f8dc8d30e7d4d2.yaml @@ -0,0 +1,58 @@ +id: quicksand-jquery-post-filter-bf3863997447d609f7f8dc8d30e7d4d2 + +info: + name: > + Quicksand Post Filter jQuery Plugin <= 3.1.1 - Missing Authorization via quicksand_admin_ajax + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6f3b765-396f-422f-864d-a48bee8c69cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quicksand-jquery-post-filter/" + google-query: inurl:"/wp-content/plugins/quicksand-jquery-post-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quicksand-jquery-post-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quicksand-jquery-post-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quicksand-jquery-post-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quickswish-16e0560ff9c94eb90a6a00b414476508.yaml b/nuclei-templates/cve-less/plugins/quickswish-16e0560ff9c94eb90a6a00b414476508.yaml new file mode 100644 index 0000000000..bdd38de1c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quickswish-16e0560ff9c94eb90a6a00b414476508.yaml @@ -0,0 +1,58 @@ +id: quickswish-16e0560ff9c94eb90a6a00b414476508 + +info: + name: > + QuickSwish <= 1.0.9 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b594b771-4d0b-46e1-b4c6-751c994992af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quickswish/" + google-query: inurl:"/wp-content/plugins/quickswish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quickswish,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quickswish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quickswish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quillforms-b2aa6adf9a3ecfeb3a1e73b7feaface1.yaml b/nuclei-templates/cve-less/plugins/quillforms-b2aa6adf9a3ecfeb3a1e73b7feaface1.yaml new file mode 100644 index 0000000000..bef7d87436 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quillforms-b2aa6adf9a3ecfeb3a1e73b7feaface1.yaml @@ -0,0 +1,58 @@ +id: quillforms-b2aa6adf9a3ecfeb3a1e73b7feaface1 + +info: + name: > + Quill Forms <= 3.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6846688-5716-4b22-8a1d-b96b230b0742?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quillforms/" + google-query: inurl:"/wp-content/plugins/quillforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quillforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quillforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quillforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quillforms-e52f401dadeba42db0e156f089227a37.yaml b/nuclei-templates/cve-less/plugins/quillforms-e52f401dadeba42db0e156f089227a37.yaml new file mode 100644 index 0000000000..1a1b17c90c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quillforms-e52f401dadeba42db0e156f089227a37.yaml @@ -0,0 +1,58 @@ +id: quillforms-e52f401dadeba42db0e156f089227a37 + +info: + name: > + Quill Forms <= 3.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea4617a-6211-4f8d-ab51-10ca509aaacf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quillforms/" + google-query: inurl:"/wp-content/plugins/quillforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quillforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quillforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quillforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-expert-389af6c33829297aca423fb16f20d755.yaml b/nuclei-templates/cve-less/plugins/quiz-expert-389af6c33829297aca423fb16f20d755.yaml new file mode 100644 index 0000000000..b3ec0e9994 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-expert-389af6c33829297aca423fb16f20d755.yaml @@ -0,0 +1,58 @@ +id: quiz-expert-389af6c33829297aca423fb16f20d755 + +info: + name: > + Quiz Expert – Easy Quiz Maker, Exam and Test Manager <= 1.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32ee3eb8-18b7-47da-b4f9-cb252ffabc71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-expert/" + google-query: inurl:"/wp-content/plugins/quiz-expert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-expert,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-expert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-expert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-35ccb571fab7efd2bc565db8cbe0afc7.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-35ccb571fab7efd2bc565db8cbe0afc7.yaml new file mode 100644 index 0000000000..300ccc232c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-35ccb571fab7efd2bc565db8cbe0afc7.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-35ccb571fab7efd2bc565db8cbe0afc7 + +info: + name: > + Quiz Maker <= 6.5.0.5 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e177e54-1a17-49d3-85b5-e4c6bf154320?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-64b00495d7288bbf7260545472f9a87a.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-64b00495d7288bbf7260545472f9a87a.yaml new file mode 100644 index 0000000000..c17f1ba4f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-64b00495d7288bbf7260545472f9a87a.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-64b00495d7288bbf7260545472f9a87a + +info: + name: > + Quiz Maker <= 6.5.2.4 - Missing Authorization to Unauthenticated Quiz Data Retrieval + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/602df370-cd5b-46dc-a653-6522aef0c62f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-8a965e61f7a81d40e758e9b24cfff6a0.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-8a965e61f7a81d40e758e9b24cfff6a0.yaml new file mode 100644 index 0000000000..c569f30c5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-8a965e61f7a81d40e758e9b24cfff6a0.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-8a965e61f7a81d40e758e9b24cfff6a0 + +info: + name: > + Quiz Maker <= 6.4.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f70d0bea-3ac2-4235-92a2-09458b85bddd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-933559cdad5a8cb46fa09f456890e810.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-933559cdad5a8cb46fa09f456890e810.yaml new file mode 100644 index 0000000000..7088f7b12d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-933559cdad5a8cb46fa09f456890e810.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-933559cdad5a8cb46fa09f456890e810 + +info: + name: > + Quiz Maker <= 6.4.9.4 - Missing Authorization to Email Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96bc27f3-6aa4-4119-9978-5e9dee5f1796?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-a72cf1044ce793e721c265e19c02178a.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-a72cf1044ce793e721c265e19c02178a.yaml new file mode 100644 index 0000000000..06facf6287 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-a72cf1044ce793e721c265e19c02178a.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-a72cf1044ce793e721c265e19c02178a + +info: + name: > + Quiz Maker <= 6.2.0.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b3acc5f-b2a5-4e7b-a596-9a934fe6ff87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-bd82d97465f017d9a9f8d8b408f50f76.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-bd82d97465f017d9a9f8d8b408f50f76.yaml new file mode 100644 index 0000000000..f33c87e759 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-bd82d97465f017d9a9f8d8b408f50f76.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-bd82d97465f017d9a9f8d8b408f50f76 + +info: + name: > + Quiz Maker <= 6.4.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67678796-61d4-423f-b8f4-3f5667184d06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-dd16f95f6d8f39d62500d48f9193456c.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-dd16f95f6d8f39d62500d48f9193456c.yaml new file mode 100644 index 0000000000..e0e2b78089 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-dd16f95f6d8f39d62500d48f9193456c.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-dd16f95f6d8f39d62500d48f9193456c + +info: + name: > + Quiz Maker <= 6.5.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e62f27b-c6b0-48ed-bfd7-a1893552eb3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-ddce93e1ec5dbf71b7783f859c8be22b.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-ddce93e1ec5dbf71b7783f859c8be22b.yaml new file mode 100644 index 0000000000..7fb06bb745 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-ddce93e1ec5dbf71b7783f859c8be22b.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-ddce93e1ec5dbf71b7783f859c8be22b + +info: + name: > + Quiz Maker <= 6.3.9.4 - Content Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e285ce1-0896-4eef-aa83-59fb6641960b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-maker-e8c4ecddb52fde1de74da4b2c7a57560.yaml b/nuclei-templates/cve-less/plugins/quiz-maker-e8c4ecddb52fde1de74da4b2c7a57560.yaml new file mode 100644 index 0000000000..3fd434b5ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-maker-e8c4ecddb52fde1de74da4b2c7a57560.yaml @@ -0,0 +1,58 @@ +id: quiz-maker-e8c4ecddb52fde1de74da4b2c7a57560 + +info: + name: > + Quiz Maker <= 6.5.2.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Quiz Creation & Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ba2b270-5f02-4cd8-8a22-1723c3873d67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-maker/" + google-query: inurl:"/wp-content/plugins/quiz-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-070ef3fbf8c5c19235dc610987639500.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-070ef3fbf8c5c19235dc610987639500.yaml new file mode 100644 index 0000000000..b64ba152e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-070ef3fbf8c5c19235dc610987639500.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-070ef3fbf8c5c19235dc610987639500 + +info: + name: > + Quiz And Survey Master <= 8.0.8 - Cross-Site Request Forgery to Arbitrary Media Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c75e6d27-7f6b-4bec-b653-c2024504f427?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-0ab1239b54a9d197b2df31bb69f5b07b.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-0ab1239b54a9d197b2df31bb69f5b07b.yaml new file mode 100644 index 0000000000..88abdc35b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-0ab1239b54a9d197b2df31bb69f5b07b.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-0ab1239b54a9d197b2df31bb69f5b07b + +info: + name: > + Quiz and Survey Master <= 6.4.12 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f378797-a7a7-4691-8d37-1caef454bb4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-1bd2c64c3515a166f1356799c13010c5.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-1bd2c64c3515a166f1356799c13010c5.yaml new file mode 100644 index 0000000000..64020edbc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-1bd2c64c3515a166f1356799c13010c5.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-1bd2c64c3515a166f1356799c13010c5 + +info: + name: > + Quiz and Survey Master <= 8.0.4 - Unauthenticated iFrame Injection via Paragraph and Short Answer + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b901b3f8-8bbd-42ef-8e0c-de6d09c4950f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-1cb4591e0480a2550d32c48672d101ca.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-1cb4591e0480a2550d32c48672d101ca.yaml new file mode 100644 index 0000000000..bab74f3fec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-1cb4591e0480a2550d32c48672d101ca.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-1cb4591e0480a2550d32c48672d101ca + +info: + name: > + Quiz And Survey Master <= 7.3.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2c88c5a-ea87-4aab-a0ce-8246e5cb540a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-1f3365288c8ad41d2a38dadca302de5e.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-1f3365288c8ad41d2a38dadca302de5e.yaml new file mode 100644 index 0000000000..3ee24a68ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-1f3365288c8ad41d2a38dadca302de5e.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-1f3365288c8ad41d2a38dadca302de5e + +info: + name: > + Quiz And Survey Master <= 7.3.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c829894f-05b8-4c65-9f3a-3a5d6e212cde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-20fec9c706022c27227f812437225b4b.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-20fec9c706022c27227f812437225b4b.yaml new file mode 100644 index 0000000000..14d8446ed2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-20fec9c706022c27227f812437225b4b.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-20fec9c706022c27227f812437225b4b + +info: + name: > + Quiz and Survey Master <= 7.1.13 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca4040d-3c6c-4e31-9bed-d1b6bf5b2bed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-3b324ee7499600905ccc907887c4cb07.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-3b324ee7499600905ccc907887c4cb07.yaml new file mode 100644 index 0000000000..692eef302b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-3b324ee7499600905ccc907887c4cb07.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-3b324ee7499600905ccc907887c4cb07 + +info: + name: > + Quiz And Survey Master <= 8.1.18 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91c5a83a-679c-405b-973d-a2255d2bced2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-4023135654a032018b1b7ca568ed38d7.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-4023135654a032018b1b7ca568ed38d7.yaml new file mode 100644 index 0000000000..e0e72c0f10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-4023135654a032018b1b7ca568ed38d7.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-4023135654a032018b1b7ca568ed38d7 + +info: + name: > + Quiz And Survey Master <= 7.3.4 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2085c9a3-1cc7-4750-875e-d20c7f94bb78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-4221c767cd86a7aece637717d70dec97.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-4221c767cd86a7aece637717d70dec97.yaml new file mode 100644 index 0000000000..51d6eab675 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-4221c767cd86a7aece637717d70dec97.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-4221c767cd86a7aece637717d70dec97 + +info: + name: > + Quiz And Survey Master <= 8.1.10 - Excessive Quiz Attempts + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80399759-88dd-478d-a20e-04e8750e12c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-5c16a4a40c0341b380c1079e60c3c420.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-5c16a4a40c0341b380c1079e60c3c420.yaml new file mode 100644 index 0000000000..dddf361311 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-5c16a4a40c0341b380c1079e60c3c420.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-5c16a4a40c0341b380c1079e60c3c420 + +info: + name: > + Quiz And Survey Master <= 8.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88dc4a77-0d81-4d90-9a43-cc4d3055e39c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-63d1e14f304a4cf01bbcbf655abc19a8.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-63d1e14f304a4cf01bbcbf655abc19a8.yaml new file mode 100644 index 0000000000..77383ff17c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-63d1e14f304a4cf01bbcbf655abc19a8.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-63d1e14f304a4cf01bbcbf655abc19a8 + +info: + name: > + Quiz And Survey Master <= 8.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e31d8218-5e04-44a1-89aa-f93e9677680b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-658febabd8f8ee9b00c71e69efcbac2c.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-658febabd8f8ee9b00c71e69efcbac2c.yaml new file mode 100644 index 0000000000..1eabb92a09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-658febabd8f8ee9b00c71e69efcbac2c.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-658febabd8f8ee9b00c71e69efcbac2c + +info: + name: > + Quiz And Survey Master <= 4.7.8 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ececa0ea-3d44-4b1b-b962-809a8b24c890?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-6943a5c5894e8c0c6d2e210f5f6691a1.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-6943a5c5894e8c0c6d2e210f5f6691a1.yaml new file mode 100644 index 0000000000..d64549815f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-6943a5c5894e8c0c6d2e210f5f6691a1.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-6943a5c5894e8c0c6d2e210f5f6691a1 + +info: + name: > + Quiz And Survey Master <= 7.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5113b58b-7d2e-40cd-8669-a5597321106f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-6a6885b887da3fa682a8e96453ce2b11.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-6a6885b887da3fa682a8e96453ce2b11.yaml new file mode 100644 index 0000000000..6f4f8a2599 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-6a6885b887da3fa682a8e96453ce2b11.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-6a6885b887da3fa682a8e96453ce2b11 + +info: + name: > + Quiz And Survey Master <= 8.0.8 - Unauthenticated Arbitrary Media Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68110321-db1a-4634-98cd-0afd3ec933b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-75f2f8257d6545a80c97f57f791fb7a9.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-75f2f8257d6545a80c97f57f791fb7a9.yaml new file mode 100644 index 0000000000..6f027a0c2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-75f2f8257d6545a80c97f57f791fb7a9.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-75f2f8257d6545a80c97f57f791fb7a9 + +info: + name: > + Quiz And Survey Master <= 8.1.18 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cfdbf80-3733-4d5c-9bc6-01e543ee08b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-899f848126483b240dc44a4870e7bfef.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-899f848126483b240dc44a4870e7bfef.yaml new file mode 100644 index 0000000000..cdd4f62b87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-899f848126483b240dc44a4870e7bfef.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-899f848126483b240dc44a4870e7bfef + +info: + name: > + Quiz And Survey Master <= 6.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d94bcbf7-c20e-4b04-b4de-f68f9a793b73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-91489b941b180b4987354a4aee0df6e3.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-91489b941b180b4987354a4aee0df6e3.yaml new file mode 100644 index 0000000000..f710301269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-91489b941b180b4987354a4aee0df6e3.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-91489b941b180b4987354a4aee0df6e3 + +info: + name: > + Quiz And Survey Master <= 7.3.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b8ed659-0590-411f-9017-f695c9c2f322?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-92d3a763fd6bf9ed5605e7e613d361f0.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-92d3a763fd6bf9ed5605e7e613d361f0.yaml new file mode 100644 index 0000000000..6eb5a941c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-92d3a763fd6bf9ed5605e7e613d361f0.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-92d3a763fd6bf9ed5605e7e613d361f0 + +info: + name: > + Quiz And Survey Master <= 7.3.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f55a9d35-596c-4207-be11-ade1127df369?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-9fbb2aba0f1c281c62bcad50b683f582.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-9fbb2aba0f1c281c62bcad50b683f582.yaml new file mode 100644 index 0000000000..d4b57ff94a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-9fbb2aba0f1c281c62bcad50b683f582.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-9fbb2aba0f1c281c62bcad50b683f582 + +info: + name: > + Quiz And Survey Master <= 7.1.11 - Authenticated SQL injection via shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bd58f59-09c2-417c-89ea-5906d413288c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-a50b1df259c1e694ecfebb517ea01b13.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-a50b1df259c1e694ecfebb517ea01b13.yaml new file mode 100644 index 0000000000..0eaf48b4ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-a50b1df259c1e694ecfebb517ea01b13.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-a50b1df259c1e694ecfebb517ea01b13 + +info: + name: > + Quiz And Survey Master <= 6.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f0025dc-a072-4e01-bea8-6e93948f00d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-acd3eef162930a0876122d4b56734acd.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-acd3eef162930a0876122d4b56734acd.yaml new file mode 100644 index 0000000000..71eac04bc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-acd3eef162930a0876122d4b56734acd.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-acd3eef162930a0876122d4b56734acd + +info: + name: > + Quiz And Survey Master <= 8.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via Question Title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19cb39d4-f2b4-4f94-8896-ba714567e1ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-b13bd75954a4a1908d54b2904726ac6a.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-b13bd75954a4a1908d54b2904726ac6a.yaml new file mode 100644 index 0000000000..9616ceb6b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-b13bd75954a4a1908d54b2904726ac6a.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-b13bd75954a4a1908d54b2904726ac6a + +info: + name: > + Quiz And Survey Master <= 7.3.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c1203ce-7582-447f-b011-905b274e1e20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-be8ed34a1e61e6308ab867606f425e64.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-be8ed34a1e61e6308ab867606f425e64.yaml new file mode 100644 index 0000000000..774a58e591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-be8ed34a1e61e6308ab867606f425e64.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-be8ed34a1e61e6308ab867606f425e64 + +info: + name: > + Quiz And Survey Master <= 8.1.16 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89ee5d27-9123-4fd2-94f8-4395db5663ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-bf605754a0547b06a6170015aaa9595a.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-bf605754a0547b06a6170015aaa9595a.yaml new file mode 100644 index 0000000000..1edb864ffd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-bf605754a0547b06a6170015aaa9595a.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-bf605754a0547b06a6170015aaa9595a + +info: + name: > + Quiz and Survey Master <= 8.0.4 - Improper Input Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f5cc779-c7de-42e6-a812-5c0539067b8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-cbf15a410baf5df5c6e73ec81eccde3a.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-cbf15a410baf5df5c6e73ec81eccde3a.yaml new file mode 100644 index 0000000000..f0f705c60d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-cbf15a410baf5df5c6e73ec81eccde3a.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-cbf15a410baf5df5c6e73ec81eccde3a + +info: + name: > + Quiz And Survey Master <= 7.3.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64584fcd-be84-4d40-bfa8-e6131d0afd58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-ce3f05ae5116fef07efba37ae58297b9.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-ce3f05ae5116fef07efba37ae58297b9.yaml new file mode 100644 index 0000000000..57e86f9899 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-ce3f05ae5116fef07efba37ae58297b9.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-ce3f05ae5116fef07efba37ae58297b9 + +info: + name: > + Quiz And Survey Master <= 7.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6e3fb4d-985f-4fb7-bcf1-523792d8dac6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-ce53aada13325acb27d477b230e028dd.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-ce53aada13325acb27d477b230e028dd.yaml new file mode 100644 index 0000000000..fa8b2f3389 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-ce53aada13325acb27d477b230e028dd.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-ce53aada13325acb27d477b230e028dd + +info: + name: > + Quiz And Survey Master <= 7.3.10 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eaa4b7b9-ea5b-46a1-847e-027bcb1fa5a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-d01c7b873aec80a58b54be7a8d535664.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-d01c7b873aec80a58b54be7a8d535664.yaml new file mode 100644 index 0000000000..a398537fee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-d01c7b873aec80a58b54be7a8d535664.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-d01c7b873aec80a58b54be7a8d535664 + +info: + name: > + Quiz And Survey Master <= 7.1.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5ef3350-3eec-48b7-9241-5d2ce25555f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-d42a5f37bc2973237f5bd33bf937988e.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-d42a5f37bc2973237f5bd33bf937988e.yaml new file mode 100644 index 0000000000..8cc61ee3fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-d42a5f37bc2973237f5bd33bf937988e.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-d42a5f37bc2973237f5bd33bf937988e + +info: + name: > + Quiz And Survey Master < 4.4.4 - Multiple SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a17b6ad-c778-4677-b5bd-6ffc9b425ba1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-d44f53d903df9cab8928396a4ae4768d.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-d44f53d903df9cab8928396a4ae4768d.yaml new file mode 100644 index 0000000000..697de60cbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-d44f53d903df9cab8928396a4ae4768d.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-d44f53d903df9cab8928396a4ae4768d + +info: + name: > + Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress <= 7.3.4 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6975e84e-06ab-41b1-ae39-64685a878d15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-d5c9a981371783e864a000bed9ff14a0.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-d5c9a981371783e864a000bed9ff14a0.yaml new file mode 100644 index 0000000000..549ac61f44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-d5c9a981371783e864a000bed9ff14a0.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-d5c9a981371783e864a000bed9ff14a0 + +info: + name: > + Quiz And Survey Master <= 7.1.18 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b468c0b-88ac-4ea8-97a9-08e206faf0fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-d78c11170c73128e3967572f8231c5a5.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-d78c11170c73128e3967572f8231c5a5.yaml new file mode 100644 index 0000000000..9f1226313f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-d78c11170c73128e3967572f8231c5a5.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-d78c11170c73128e3967572f8231c5a5 + +info: + name: > + Quiz And Survey Master <= 8.1.15 - Cross-Site Request Forgery via 'display_results' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32173d38-7f85-4e0c-9b4c-38bee2783d77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-d813a33aa115d1d1e87017777577752a.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-d813a33aa115d1d1e87017777577752a.yaml new file mode 100644 index 0000000000..252c3412d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-d813a33aa115d1d1e87017777577752a.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-d813a33aa115d1d1e87017777577752a + +info: + name: > + Quiz And Survey Master <= 8.1.13 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c482b6e-ce1e-46e2-8847-10c485594448?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-e1a43bd038bea91c9d042110dd2e93ec.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-e1a43bd038bea91c9d042110dd2e93ec.yaml new file mode 100644 index 0000000000..29c041dbc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-e1a43bd038bea91c9d042110dd2e93ec.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-e1a43bd038bea91c9d042110dd2e93ec + +info: + name: > + Quiz and Survey Master <= 7.1.13 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c2883e6-2a90-46c7-ba42-cc078e4d1670?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-eacb603a076c52a6fb91269497cf41a5.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-eacb603a076c52a6fb91269497cf41a5.yaml new file mode 100644 index 0000000000..de2891e33a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-eacb603a076c52a6fb91269497cf41a5.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-eacb603a076c52a6fb91269497cf41a5 + +info: + name: > + Quiz And Survey Master <= 7.3.10 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d76a21c-bb79-4183-99ea-a07c18dfa180?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-ebcb1014c323d7367182014f59409f1c.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-ebcb1014c323d7367182014f59409f1c.yaml new file mode 100644 index 0000000000..8d19a5b852 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-ebcb1014c323d7367182014f59409f1c.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-ebcb1014c323d7367182014f59409f1c + +info: + name: > + Quiz and Survey Master <= 7.0.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26140315-04c7-4056-a570-865cd4ffe85e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-ecadda5bda84d8a0b69e1131abec5fcf.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-ecadda5bda84d8a0b69e1131abec5fcf.yaml new file mode 100644 index 0000000000..f39fee664b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-ecadda5bda84d8a0b69e1131abec5fcf.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-ecadda5bda84d8a0b69e1131abec5fcf + +info: + name: > + Quiz And Survey Master <= 7.3.4 - Multiple Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d849eda-4c61-47e2-af7c-59a57fffab65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-f2fa5aa94720ea308820bf6a59c12304.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-f2fa5aa94720ea308820bf6a59c12304.yaml new file mode 100644 index 0000000000..e6374a2460 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-f2fa5aa94720ea308820bf6a59c12304.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-f2fa5aa94720ea308820bf6a59c12304 + +info: + name: > + Quiz And Survey Master <= 7.3.6 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/332c0829-316d-4037-8c50-02d6c92cdb10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-f7f576e6c366fb73cfae249a8888bb15.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-f7f576e6c366fb73cfae249a8888bb15.yaml new file mode 100644 index 0000000000..799bc6b620 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-f7f576e6c366fb73cfae249a8888bb15.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-f7f576e6c366fb73cfae249a8888bb15 + +info: + name: > + Quiz and Survey Master <= 7.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfd93c33-4672-4914-b052-7bea283ef60c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-fa56dcf05a0758bb5d6c8d1d87961bf1.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-fa56dcf05a0758bb5d6c8d1d87961bf1.yaml new file mode 100644 index 0000000000..77d22b09c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-fa56dcf05a0758bb5d6c8d1d87961bf1.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-fa56dcf05a0758bb5d6c8d1d87961bf1 + +info: + name: > + Quiz and Survey Master <= 8.1.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b29dcd7a-a0bc-4983-85ba-6ebf2c405ceb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-fc2afeaf55a2da67ef007ba91890a8f5.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-fc2afeaf55a2da67ef007ba91890a8f5.yaml new file mode 100644 index 0000000000..039c644643 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-fc2afeaf55a2da67ef007ba91890a8f5.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-fc2afeaf55a2da67ef007ba91890a8f5 + +info: + name: > + Quiz And Survey Master <= 8.0.10 - Cross-Site Request Forgery to Quiz Restoration + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9af36edd-4520-4afc-8d3a-c9a96659ddf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-master-next-fddce4b8eb2e7caabf78ce5b75bb4ed4.yaml b/nuclei-templates/cve-less/plugins/quiz-master-next-fddce4b8eb2e7caabf78ce5b75bb4ed4.yaml new file mode 100644 index 0000000000..80d1b46e68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-master-next-fddce4b8eb2e7caabf78ce5b75bb4ed4.yaml @@ -0,0 +1,58 @@ +id: quiz-master-next-fddce4b8eb2e7caabf78ce5b75bb4ed4 + +info: + name: > + Quiz and Survey Master <= 7.0.0 - Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18458883-6cca-46d1-8437-4e646f4eafda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-master-next/" + google-query: inurl:"/wp-content/plugins/quiz-master-next/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-master-next,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-master-next/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-master-next" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quiz-tool-lite-8979f6505c90c68150042fb786bf639e.yaml b/nuclei-templates/cve-less/plugins/quiz-tool-lite-8979f6505c90c68150042fb786bf639e.yaml new file mode 100644 index 0000000000..72a40971e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quiz-tool-lite-8979f6505c90c68150042fb786bf639e.yaml @@ -0,0 +1,58 @@ +id: quiz-tool-lite-8979f6505c90c68150042fb786bf639e + +info: + name: > + Quiz Tool Lite <= 2.3.15 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a515dc9-e6d6-4083-a3e8-c22307b120a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quiz-tool-lite/" + google-query: inurl:"/wp-content/plugins/quiz-tool-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quiz-tool-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quiz-tool-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quiz-tool-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quizlord-05b1f0bb86ade4c6c32252e799c74986.yaml b/nuclei-templates/cve-less/plugins/quizlord-05b1f0bb86ade4c6c32252e799c74986.yaml new file mode 100644 index 0000000000..46c9fc9814 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quizlord-05b1f0bb86ade4c6c32252e799c74986.yaml @@ -0,0 +1,58 @@ +id: quizlord-05b1f0bb86ade4c6c32252e799c74986 + +info: + name: > + Quizlord <= 2.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e54f2e28-7320-4d2d-a416-e46202c08375?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quizlord/" + google-query: inurl:"/wp-content/plugins/quizlord/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quizlord,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quizlord/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quizlord" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quizlord-aa821804338bfa52c597bf95613d3cbf.yaml b/nuclei-templates/cve-less/plugins/quizlord-aa821804338bfa52c597bf95613d3cbf.yaml new file mode 100644 index 0000000000..939111a5a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quizlord-aa821804338bfa52c597bf95613d3cbf.yaml @@ -0,0 +1,58 @@ +id: quizlord-aa821804338bfa52c597bf95613d3cbf + +info: + name: > + Quizlord <= 2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c85f6c1b-673d-4fe9-acef-a15d90fcf414?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quizlord/" + google-query: inurl:"/wp-content/plugins/quizlord/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quizlord,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quizlord/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quizlord" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quote-o-matic-6435ac4f9788a7cece5b6014e8487e16.yaml b/nuclei-templates/cve-less/plugins/quote-o-matic-6435ac4f9788a7cece5b6014e8487e16.yaml new file mode 100644 index 0000000000..d89e1b5be6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quote-o-matic-6435ac4f9788a7cece5b6014e8487e16.yaml @@ -0,0 +1,58 @@ +id: quote-o-matic-6435ac4f9788a7cece5b6014e8487e16 + +info: + name: > + Quote-O-Matic <= 1.0.5 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a425bf5-de09-4f8c-8766-c9912d337512?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quote-o-matic/" + google-query: inurl:"/wp-content/plugins/quote-o-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quote-o-matic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quote-o-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quote-o-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quotes-and-tips-105cf32b00a014867c600a479b6d44a5.yaml b/nuclei-templates/cve-less/plugins/quotes-and-tips-105cf32b00a014867c600a479b6d44a5.yaml new file mode 100644 index 0000000000..e5cde0f28e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quotes-and-tips-105cf32b00a014867c600a479b6d44a5.yaml @@ -0,0 +1,58 @@ +id: quotes-and-tips-105cf32b00a014867c600a479b6d44a5 + +info: + name: > + Quotes and Tips by BestWebSoft < 1.20 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c942fd74-7a2d-43ec-9806-cdfe21a83149?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quotes-and-tips/" + google-query: inurl:"/wp-content/plugins/quotes-and-tips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quotes-and-tips,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quotes-and-tips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quotes-and-tips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quotes-and-tips-f790a2eb76a9891e0156538f1e3bc9cf.yaml b/nuclei-templates/cve-less/plugins/quotes-and-tips-f790a2eb76a9891e0156538f1e3bc9cf.yaml new file mode 100644 index 0000000000..acb4986630 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quotes-and-tips-f790a2eb76a9891e0156538f1e3bc9cf.yaml @@ -0,0 +1,58 @@ +id: quotes-and-tips-f790a2eb76a9891e0156538f1e3bc9cf + +info: + name: > + Quotes and Tips by BestWebSoft < 1.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c307d66-11f9-4593-9ada-252d034fd421?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quotes-and-tips/" + google-query: inurl:"/wp-content/plugins/quotes-and-tips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quotes-and-tips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quotes-and-tips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quotes-and-tips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quotes-collection-498d9280bb627df5ee0fc3435bab6bb8.yaml b/nuclei-templates/cve-less/plugins/quotes-collection-498d9280bb627df5ee0fc3435bab6bb8.yaml new file mode 100644 index 0000000000..674ecf06a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quotes-collection-498d9280bb627df5ee0fc3435bab6bb8.yaml @@ -0,0 +1,58 @@ +id: quotes-collection-498d9280bb627df5ee0fc3435bab6bb8 + +info: + name: > + Quotes Collection <= 2.5.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b988f424-f649-4bf0-9f7f-88faa41c0029?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quotes-collection/" + google-query: inurl:"/wp-content/plugins/quotes-collection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quotes-collection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quotes-collection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quotes-collection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quotes-collection-62f03cd88708d633c3bea1020189b887.yaml b/nuclei-templates/cve-less/plugins/quotes-collection-62f03cd88708d633c3bea1020189b887.yaml new file mode 100644 index 0000000000..c87dce98cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quotes-collection-62f03cd88708d633c3bea1020189b887.yaml @@ -0,0 +1,58 @@ +id: quotes-collection-62f03cd88708d633c3bea1020189b887 + +info: + name: > + Quotes Collection < 2.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c839d07-c496-46cc-8024-742f44cd3638?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quotes-collection/" + google-query: inurl:"/wp-content/plugins/quotes-collection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quotes-collection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quotes-collection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quotes-collection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quotes-for-woocommerce-24df3873e0b9065e19944f2b69074a09.yaml b/nuclei-templates/cve-less/plugins/quotes-for-woocommerce-24df3873e0b9065e19944f2b69074a09.yaml new file mode 100644 index 0000000000..dbc051d16b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quotes-for-woocommerce-24df3873e0b9065e19944f2b69074a09.yaml @@ -0,0 +1,58 @@ +id: quotes-for-woocommerce-24df3873e0b9065e19944f2b69074a09 + +info: + name: > + Quotes for WooCommerce <= 2.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f7a5d4b-8ba2-45d8-92d4-3c66a81fb4f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quotes-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/quotes-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quotes-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quotes-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quotes-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quotes-for-woocommerce-3948e5dd3b8cda882c6a23ce86fccec7.yaml b/nuclei-templates/cve-less/plugins/quotes-for-woocommerce-3948e5dd3b8cda882c6a23ce86fccec7.yaml new file mode 100644 index 0000000000..8a4535da2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quotes-for-woocommerce-3948e5dd3b8cda882c6a23ce86fccec7.yaml @@ -0,0 +1,58 @@ +id: quotes-for-woocommerce-3948e5dd3b8cda882c6a23ce86fccec7 + +info: + name: > + Quotes for WooCommerce <= 2.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6954364e-567c-407c-afc6-983b7257cc88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quotes-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/quotes-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quotes-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quotes-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quotes-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quotes-llama-88df46a6830158391aaf7619c151706b.yaml b/nuclei-templates/cve-less/plugins/quotes-llama-88df46a6830158391aaf7619c151706b.yaml new file mode 100644 index 0000000000..e9aa582472 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quotes-llama-88df46a6830158391aaf7619c151706b.yaml @@ -0,0 +1,58 @@ +id: quotes-llama-88df46a6830158391aaf7619c151706b + +info: + name: > + Quotes llama <= 0.7 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e07562d-ab3a-47bc-9bb1-b952f769f5e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quotes-llama/" + google-query: inurl:"/wp-content/plugins/quotes-llama/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quotes-llama,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quotes-llama/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quotes-llama" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quttera-web-malware-scanner-63e5f2960a8b5c3108f981b93e6323c6.yaml b/nuclei-templates/cve-less/plugins/quttera-web-malware-scanner-63e5f2960a8b5c3108f981b93e6323c6.yaml new file mode 100644 index 0000000000..81b1c42b4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quttera-web-malware-scanner-63e5f2960a8b5c3108f981b93e6323c6.yaml @@ -0,0 +1,58 @@ +id: quttera-web-malware-scanner-63e5f2960a8b5c3108f981b93e6323c6 + +info: + name: > + Quttera Web Malware Scanner <= 3.4.1.48 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2163af55-1ea4-4c60-b9f0-baf99297c6bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quttera-web-malware-scanner/" + google-query: inurl:"/wp-content/plugins/quttera-web-malware-scanner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quttera-web-malware-scanner,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quttera-web-malware-scanner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quttera-web-malware-scanner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/quttera-web-malware-scanner-f4e8b028120d672af95b84876878fcae.yaml b/nuclei-templates/cve-less/plugins/quttera-web-malware-scanner-f4e8b028120d672af95b84876878fcae.yaml new file mode 100644 index 0000000000..66cf695f4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/quttera-web-malware-scanner-f4e8b028120d672af95b84876878fcae.yaml @@ -0,0 +1,58 @@ +id: quttera-web-malware-scanner-f4e8b028120d672af95b84876878fcae + +info: + name: > + Quttera Web Malware Scanner <= 3.4.1.48 - Authenticated (Administrator+) Directory Traversal via ShowFile + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9992d0d-7c6e-4184-8f48-1515d50cc028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/quttera-web-malware-scanner/" + google-query: inurl:"/wp-content/plugins/quttera-web-malware-scanner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,quttera-web-malware-scanner,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/quttera-web-malware-scanner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quttera-web-malware-scanner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qwiz-online-quizzes-and-flashcards-1ee20142f7aad0f4393d7540b9bd0fb9.yaml b/nuclei-templates/cve-less/plugins/qwiz-online-quizzes-and-flashcards-1ee20142f7aad0f4393d7540b9bd0fb9.yaml new file mode 100644 index 0000000000..c37689e950 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qwiz-online-quizzes-and-flashcards-1ee20142f7aad0f4393d7540b9bd0fb9.yaml @@ -0,0 +1,58 @@ +id: qwiz-online-quizzes-and-flashcards-1ee20142f7aad0f4393d7540b9bd0fb9 + +info: + name: > + Qwiz Online Quizzes and Flashcards < 3.37 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7350dc3-82a0-4f61-9ff8-4b622108fa06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qwiz-online-quizzes-and-flashcards/" + google-query: inurl:"/wp-content/plugins/qwiz-online-quizzes-and-flashcards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qwiz-online-quizzes-and-flashcards,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qwiz-online-quizzes-and-flashcards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qwiz-online-quizzes-and-flashcards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qwiz-online-quizzes-and-flashcards-28d16d6b1cef547447e4d705dcc2a1cb.yaml b/nuclei-templates/cve-less/plugins/qwiz-online-quizzes-and-flashcards-28d16d6b1cef547447e4d705dcc2a1cb.yaml new file mode 100644 index 0000000000..7909bbd22f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qwiz-online-quizzes-and-flashcards-28d16d6b1cef547447e4d705dcc2a1cb.yaml @@ -0,0 +1,58 @@ +id: qwiz-online-quizzes-and-flashcards-28d16d6b1cef547447e4d705dcc2a1cb + +info: + name: > + Qwizcards <= 3.61 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95f1e3eb-da87-417e-8e8c-e5035e072950?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qwiz-online-quizzes-and-flashcards/" + google-query: inurl:"/wp-content/plugins/qwiz-online-quizzes-and-flashcards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qwiz-online-quizzes-and-flashcards,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qwiz-online-quizzes-and-flashcards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qwiz-online-quizzes-and-flashcards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qyrr-code-1954398156051d3ad0f2e33b45b08e3a.yaml b/nuclei-templates/cve-less/plugins/qyrr-code-1954398156051d3ad0f2e33b45b08e3a.yaml new file mode 100644 index 0000000000..07c20ee661 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qyrr-code-1954398156051d3ad0f2e33b45b08e3a.yaml @@ -0,0 +1,58 @@ +id: qyrr-code-1954398156051d3ad0f2e33b45b08e3a + +info: + name: > + Qyrr – simply and modern QR-Code creation <= 0.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4a82562-1368-4071-bedf-8a84d82e88ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qyrr-code/" + google-query: inurl:"/wp-content/plugins/qyrr-code/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qyrr-code,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qyrr-code/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qyrr-code" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/qyrr-code-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/qyrr-code-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..aa6e475bb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/qyrr-code-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: qyrr-code-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/qyrr-code/" + google-query: inurl:"/wp-content/plugins/qyrr-code/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,qyrr-code,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/qyrr-code/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qyrr-code" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rabbit-loader-9593057fd73362b3675fc833e6f4bac6.yaml b/nuclei-templates/cve-less/plugins/rabbit-loader-9593057fd73362b3675fc833e6f4bac6.yaml new file mode 100644 index 0000000000..6bf94e5ccc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rabbit-loader-9593057fd73362b3675fc833e6f4bac6.yaml @@ -0,0 +1,58 @@ +id: rabbit-loader-9593057fd73362b3675fc833e6f4bac6 + +info: + name: > + RabbitLoader <= 2.19.13 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/958118ec-437e-45c8-a0f0-6aaf54e60d04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rabbit-loader/" + google-query: inurl:"/wp-content/plugins/rabbit-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rabbit-loader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rabbit-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rabbit-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.19.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/racar-clear-cart-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/racar-clear-cart-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4e43c8f3e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/racar-clear-cart-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: racar-clear-cart-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/racar-clear-cart-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/racar-clear-cart-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,racar-clear-cart-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/racar-clear-cart-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "racar-clear-cart-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-buttons-for-taxonomies-5f709cb3f787aa3d6fe0c1b9fbcebecf.yaml b/nuclei-templates/cve-less/plugins/radio-buttons-for-taxonomies-5f709cb3f787aa3d6fe0c1b9fbcebecf.yaml new file mode 100644 index 0000000000..6d324e18fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-buttons-for-taxonomies-5f709cb3f787aa3d6fe0c1b9fbcebecf.yaml @@ -0,0 +1,58 @@ +id: radio-buttons-for-taxonomies-5f709cb3f787aa3d6fe0c1b9fbcebecf + +info: + name: > + Radio Buttons for Taxonomies <= 2.0.5 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26a246c3-cf67-4566-b1e8-dc14c3c5c827?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-buttons-for-taxonomies/" + google-query: inurl:"/wp-content/plugins/radio-buttons-for-taxonomies/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-buttons-for-taxonomies,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-buttons-for-taxonomies/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-buttons-for-taxonomies" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-forge-5344d2a9421d4134e013b9ef9543b210.yaml b/nuclei-templates/cve-less/plugins/radio-forge-5344d2a9421d4134e013b9ef9543b210.yaml new file mode 100644 index 0000000000..7acbc18f1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-forge-5344d2a9421d4134e013b9ef9543b210.yaml @@ -0,0 +1,58 @@ +id: radio-forge-5344d2a9421d4134e013b9ef9543b210 + +info: + name: > + Radio Forge Muses Player with Skins <= 2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad20ddd2-33d0-4d49-bca0-ea2a829da6c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-forge/" + google-query: inurl:"/wp-content/plugins/radio-forge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-forge,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-forge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-forge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-player-0f0d0d2c6b89a442a33118c19c04ca9f.yaml b/nuclei-templates/cve-less/plugins/radio-player-0f0d0d2c6b89a442a33118c19c04ca9f.yaml new file mode 100644 index 0000000000..0c73661de4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-player-0f0d0d2c6b89a442a33118c19c04ca9f.yaml @@ -0,0 +1,58 @@ +id: radio-player-0f0d0d2c6b89a442a33118c19c04ca9f + +info: + name: > + Radio Player – Live Shoutcast, Icecast and Any Audio Stream Player for WordPress <= 2.0.73 - Missing Authorization to Authenticated (Subscriber+) Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fe0cb36-7b61-412f-ad2a-d31b18417ce8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-player/" + google-query: inurl:"/wp-content/plugins/radio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-player-74ed56a742e6bfe4ae7f688057f0e58c.yaml b/nuclei-templates/cve-less/plugins/radio-player-74ed56a742e6bfe4ae7f688057f0e58c.yaml new file mode 100644 index 0000000000..6b92cdd437 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-player-74ed56a742e6bfe4ae7f688057f0e58c.yaml @@ -0,0 +1,58 @@ +id: radio-player-74ed56a742e6bfe4ae7f688057f0e58c + +info: + name: > + Radio Player <= 2.0.73 - Missing Authorization via get_players + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/081e76e4-60ec-496d-979b-d128771af475?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-player/" + google-query: inurl:"/wp-content/plugins/radio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/radio-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4c2d604c0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: radio-player-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-player/" + google-query: inurl:"/wp-content/plugins/radio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-player-ced2048e66568ff23a7c9306db5ed20b.yaml b/nuclei-templates/cve-less/plugins/radio-player-ced2048e66568ff23a7c9306db5ed20b.yaml new file mode 100644 index 0000000000..211981160b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-player-ced2048e66568ff23a7c9306db5ed20b.yaml @@ -0,0 +1,58 @@ +id: radio-player-ced2048e66568ff23a7c9306db5ed20b + +info: + name: > + Radio Player <= 2.0.73 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/704a26f1-36d9-4503-b200-5a6b604ceddc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-player/" + google-query: inurl:"/wp-content/plugins/radio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-player-fa19810ebcf6bda0fe16609b0188a9da.yaml b/nuclei-templates/cve-less/plugins/radio-player-fa19810ebcf6bda0fe16609b0188a9da.yaml new file mode 100644 index 0000000000..5948cdf642 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-player-fa19810ebcf6bda0fe16609b0188a9da.yaml @@ -0,0 +1,58 @@ +id: radio-player-fa19810ebcf6bda0fe16609b0188a9da + +info: + name: > + Radio Player <= 2.0.73 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/416ecce7-e2ca-4b73-90ff-85c6fdd94251?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-player/" + google-query: inurl:"/wp-content/plugins/radio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-player,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-station-7d1f832265699144424e86f453859317.yaml b/nuclei-templates/cve-less/plugins/radio-station-7d1f832265699144424e86f453859317.yaml new file mode 100644 index 0000000000..6bc92e91a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-station-7d1f832265699144424e86f453859317.yaml @@ -0,0 +1,58 @@ +id: radio-station-7d1f832265699144424e86f453859317 + +info: + name: > + Radio Station by netmix® – Manage and play your Show Schedule in WordPress! <= 2.5.7 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8464a63f-db39-4a2c-b408-d7fd7539d6dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-station/" + google-query: inurl:"/wp-content/plugins/radio-station/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-station,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-station/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-station" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-station-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/radio-station-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..79a9a5a104 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-station-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: radio-station-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-station/" + google-query: inurl:"/wp-content/plugins/radio-station/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-station,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-station/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-station" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radio-station-f928630a44e376a8556ef8a85dd515fa.yaml b/nuclei-templates/cve-less/plugins/radio-station-f928630a44e376a8556ef8a85dd515fa.yaml new file mode 100644 index 0000000000..00620d4a32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radio-station-f928630a44e376a8556ef8a85dd515fa.yaml @@ -0,0 +1,58 @@ +id: radio-station-f928630a44e376a8556ef8a85dd515fa + +info: + name: > + Radio Station <= 2.4.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36b2992d-4d1b-456d-94a0-54794ba59435?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radio-station/" + google-query: inurl:"/wp-content/plugins/radio-station/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radio-station,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radio-station/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radio-station" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/radykal-fancy-gallery-49732b61e5fbbf5b8a051a31af421fcc.yaml b/nuclei-templates/cve-less/plugins/radykal-fancy-gallery-49732b61e5fbbf5b8a051a31af421fcc.yaml new file mode 100644 index 0000000000..d67ef88b7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/radykal-fancy-gallery-49732b61e5fbbf5b8a051a31af421fcc.yaml @@ -0,0 +1,58 @@ +id: radykal-fancy-gallery-49732b61e5fbbf5b8a051a31af421fcc + +info: + name: > + Radykal Fancy Gallery <= 1.2.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25627b5c-958c-45ad-8450-8dfccdfdac31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/radykal-fancy-gallery/" + google-query: inurl:"/wp-content/plugins/radykal-fancy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,radykal-fancy-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/radykal-fancy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radykal-fancy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rafflepress-0d992e0c4b2262e08e00bc7728421227.yaml b/nuclei-templates/cve-less/plugins/rafflepress-0d992e0c4b2262e08e00bc7728421227.yaml new file mode 100644 index 0000000000..fb441b919c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rafflepress-0d992e0c4b2262e08e00bc7728421227.yaml @@ -0,0 +1,58 @@ +id: rafflepress-0d992e0c4b2262e08e00bc7728421227 + +info: + name: > + Giveaways and Contests by RafflePress <= 1.12.7 - Unauthenticated IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/595d6cdb-8a42-480e-8b04-52998156488c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rafflepress/" + google-query: inurl:"/wp-content/plugins/rafflepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rafflepress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rafflepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rafflepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rafflepress-0df72c1ea599347d49ac94e58a15317d.yaml b/nuclei-templates/cve-less/plugins/rafflepress-0df72c1ea599347d49ac94e58a15317d.yaml new file mode 100644 index 0000000000..827f138b36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rafflepress-0df72c1ea599347d49ac94e58a15317d.yaml @@ -0,0 +1,58 @@ +id: rafflepress-0df72c1ea599347d49ac94e58a15317d + +info: + name: > + Giveaways and Contests by RafflePress <= 1.11.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e7460b-1ed4-4ff7-89c7-0bd2658a800d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rafflepress/" + google-query: inurl:"/wp-content/plugins/rafflepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rafflepress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rafflepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rafflepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rafflepress-1a4de07092fc301c92fce8ed74ad446d.yaml b/nuclei-templates/cve-less/plugins/rafflepress-1a4de07092fc301c92fce8ed74ad446d.yaml new file mode 100644 index 0000000000..69be36fbae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rafflepress-1a4de07092fc301c92fce8ed74ad446d.yaml @@ -0,0 +1,58 @@ +id: rafflepress-1a4de07092fc301c92fce8ed74ad446d + +info: + name: > + Giveaways and Contests by RafflePress <= 1.12.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6d663a9-3185-4c36-b9d1-878297965379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rafflepress/" + google-query: inurl:"/wp-content/plugins/rafflepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rafflepress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rafflepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rafflepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rafflepress-f756689d49883a94fc2d2b5fe92fc364.yaml b/nuclei-templates/cve-less/plugins/rafflepress-f756689d49883a94fc2d2b5fe92fc364.yaml new file mode 100644 index 0000000000..d4ffa7e883 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rafflepress-f756689d49883a94fc2d2b5fe92fc364.yaml @@ -0,0 +1,58 @@ +id: rafflepress-f756689d49883a94fc2d2b5fe92fc364 + +info: + name: > + Giveaways and Contests by RafflePress <= 1.12.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29b471ac-3a08-42da-9907-670c3b3bae92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rafflepress/" + google-query: inurl:"/wp-content/plugins/rafflepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rafflepress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rafflepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rafflepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/random-banner-6cbcd9de8a0bffdfb0e1ab93c491bf62.yaml b/nuclei-templates/cve-less/plugins/random-banner-6cbcd9de8a0bffdfb0e1ab93c491bf62.yaml new file mode 100644 index 0000000000..a6af61b77d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/random-banner-6cbcd9de8a0bffdfb0e1ab93c491bf62.yaml @@ -0,0 +1,58 @@ +id: random-banner-6cbcd9de8a0bffdfb0e1ab93c491bf62 + +info: + name: > + Random Banner <= 4.1.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afb53b31-c179-4d11-845f-8acd18638038?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/random-banner/" + google-query: inurl:"/wp-content/plugins/random-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,random-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/random-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "random-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/random-banner-c1af03a9bc6d8f06f284071a1218ac5b.yaml b/nuclei-templates/cve-less/plugins/random-banner-c1af03a9bc6d8f06f284071a1218ac5b.yaml new file mode 100644 index 0000000000..73e46d5d96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/random-banner-c1af03a9bc6d8f06f284071a1218ac5b.yaml @@ -0,0 +1,58 @@ +id: random-banner-c1af03a9bc6d8f06f284071a1218ac5b + +info: + name: > + Random Banner < 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/416803bc-7851-4489-85f9-dbff0838d35b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/random-banner/" + google-query: inurl:"/wp-content/plugins/random-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,random-banner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/random-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "random-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/random-image-gallery-with-pretty-photo-zoom-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/random-image-gallery-with-pretty-photo-zoom-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..17f1115c1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/random-image-gallery-with-pretty-photo-zoom-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: random-image-gallery-with-pretty-photo-zoom-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/random-image-gallery-with-pretty-photo-zoom/" + google-query: inurl:"/wp-content/plugins/random-image-gallery-with-pretty-photo-zoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,random-image-gallery-with-pretty-photo-zoom,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/random-image-gallery-with-pretty-photo-zoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "random-image-gallery-with-pretty-photo-zoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/random-sorting-order-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/random-sorting-order-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..66c47b0585 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/random-sorting-order-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: random-sorting-order-for-woocommerce-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/random-sorting-order-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/random-sorting-order-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,random-sorting-order-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/random-sorting-order-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "random-sorting-order-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/randomize-2c6114a75a15d3b058a7dc1004291c25.yaml b/nuclei-templates/cve-less/plugins/randomize-2c6114a75a15d3b058a7dc1004291c25.yaml new file mode 100644 index 0000000000..3df240e9fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/randomize-2c6114a75a15d3b058a7dc1004291c25.yaml @@ -0,0 +1,58 @@ +id: randomize-2c6114a75a15d3b058a7dc1004291c25 + +info: + name: > + Randomize <= 1.4.3 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b971ae0-624d-416e-b2f2-92ce44e96418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/randomize/" + google-query: inurl:"/wp-content/plugins/randomize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,randomize,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/randomize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "randomize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/randomtext-1fdf26dc57df471e3029b947067853d6.yaml b/nuclei-templates/cve-less/plugins/randomtext-1fdf26dc57df471e3029b947067853d6.yaml new file mode 100644 index 0000000000..35c9a62e51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/randomtext-1fdf26dc57df471e3029b947067853d6.yaml @@ -0,0 +1,58 @@ +id: randomtext-1fdf26dc57df471e3029b947067853d6 + +info: + name: > + Random Text <= 0.3.0 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6badba6d-1ff1-4d6f-bccf-1f0278edb17d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/randomtext/" + google-query: inurl:"/wp-content/plugins/randomtext/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,randomtext,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/randomtext/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "randomtext" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rankbear-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/rankbear-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2a0637ccf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rankbear-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: rankbear-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rankbear/" + google-query: inurl:"/wp-content/plugins/rankbear/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rankbear,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rankbear/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rankbear" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rapidexpcart-8ca33f13028f0931d0d1467c7211048d.yaml b/nuclei-templates/cve-less/plugins/rapidexpcart-8ca33f13028f0931d0d1467c7211048d.yaml new file mode 100644 index 0000000000..966a160849 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rapidexpcart-8ca33f13028f0931d0d1467c7211048d.yaml @@ -0,0 +1,58 @@ +id: rapidexpcart-8ca33f13028f0931d0d1467c7211048d + +info: + name: > + RapidExpCart <= 1.0 - Authenticated (Level 8/Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e480c-577a-467a-8297-747512286a39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rapidexpcart/" + google-query: inurl:"/wp-content/plugins/rapidexpcart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rapidexpcart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rapidexpcart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rapidexpcart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rapidexpcart-956705464f8d3e3f33f8d0fbd34de8bb.yaml b/nuclei-templates/cve-less/plugins/rapidexpcart-956705464f8d3e3f33f8d0fbd34de8bb.yaml new file mode 100644 index 0000000000..a06e6fc975 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rapidexpcart-956705464f8d3e3f33f8d0fbd34de8bb.yaml @@ -0,0 +1,58 @@ +id: rapidexpcart-956705464f8d3e3f33f8d0fbd34de8bb + +info: + name: > + RapidExpCart <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52fde632-f3a4-48d5-8c2c-c42b9d20dcb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rapidexpcart/" + google-query: inurl:"/wp-content/plugins/rapidexpcart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rapidexpcart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rapidexpcart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rapidexpcart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rara-one-click-demo-import-7625842be5b20a912d85c30fab35389d.yaml b/nuclei-templates/cve-less/plugins/rara-one-click-demo-import-7625842be5b20a912d85c30fab35389d.yaml new file mode 100644 index 0000000000..7bc73cb795 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rara-one-click-demo-import-7625842be5b20a912d85c30fab35389d.yaml @@ -0,0 +1,58 @@ +id: rara-one-click-demo-import-7625842be5b20a912d85c30fab35389d + +info: + name: > + Rara One Click Demo Import <= 1.2.9 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be4061ef-849a-4797-aeee-07da2afc1a40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rara-one-click-demo-import/" + google-query: inurl:"/wp-content/plugins/rara-one-click-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rara-one-click-demo-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rara-one-click-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rara-one-click-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rate-my-post-0a011d3a5ee0fe8850f5ad8de7716ef3.yaml b/nuclei-templates/cve-less/plugins/rate-my-post-0a011d3a5ee0fe8850f5ad8de7716ef3.yaml new file mode 100644 index 0000000000..6c87b159c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rate-my-post-0a011d3a5ee0fe8850f5ad8de7716ef3.yaml @@ -0,0 +1,58 @@ +id: rate-my-post-0a011d3a5ee0fe8850f5ad8de7716ef3 + +info: + name: > + Rate my Post – WP Rating System <= 3.3.4 - Race Condition + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376b46c9-f6bb-4f4e-8e53-62ca68d0003a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rate-my-post/" + google-query: inurl:"/wp-content/plugins/rate-my-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rate-my-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rate-my-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rate-my-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rate-my-post-785e036f5ce45cab570c638ad313ef67.yaml b/nuclei-templates/cve-less/plugins/rate-my-post-785e036f5ce45cab570c638ad313ef67.yaml new file mode 100644 index 0000000000..10169b40ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rate-my-post-785e036f5ce45cab570c638ad313ef67.yaml @@ -0,0 +1,58 @@ +id: rate-my-post-785e036f5ce45cab570c638ad313ef67 + +info: + name: > + Rate my Post – WP Rating System <= 3.4.2 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d24aa7e-bbf1-4a54-b53b-7a37e613e0e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rate-my-post/" + google-query: inurl:"/wp-content/plugins/rate-my-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rate-my-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rate-my-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rate-my-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rate-my-post-980522b8038ad0463392a24edde56a31.yaml b/nuclei-templates/cve-less/plugins/rate-my-post-980522b8038ad0463392a24edde56a31.yaml new file mode 100644 index 0000000000..c802cb770e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rate-my-post-980522b8038ad0463392a24edde56a31.yaml @@ -0,0 +1,58 @@ +id: rate-my-post-980522b8038ad0463392a24edde56a31 + +info: + name: > + Rate My Post – Star Rating Plugin by FeedbackWP <= 3.4.4 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e679b853-3207-47c9-9cbe-d3ce3826cd00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rate-my-post/" + google-query: inurl:"/wp-content/plugins/rate-my-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rate-my-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rate-my-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rate-my-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rate-my-post-bc63c69c92e0f2828459114bbefab4b4.yaml b/nuclei-templates/cve-less/plugins/rate-my-post-bc63c69c92e0f2828459114bbefab4b4.yaml new file mode 100644 index 0000000000..495c2560a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rate-my-post-bc63c69c92e0f2828459114bbefab4b4.yaml @@ -0,0 +1,58 @@ +id: rate-my-post-bc63c69c92e0f2828459114bbefab4b4 + +info: + name: > + Rate my Post – WP Rating System <= 3.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60c96210-d6ed-4838-b2fc-419e6a68f689?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rate-my-post/" + google-query: inurl:"/wp-content/plugins/rate-my-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rate-my-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rate-my-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rate-my-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rate-my-post-c9a71c8c5b02e60eb52f4d4cd3d0c571.yaml b/nuclei-templates/cve-less/plugins/rate-my-post-c9a71c8c5b02e60eb52f4d4cd3d0c571.yaml new file mode 100644 index 0000000000..b074943485 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rate-my-post-c9a71c8c5b02e60eb52f4d4cd3d0c571.yaml @@ -0,0 +1,58 @@ +id: rate-my-post-c9a71c8c5b02e60eb52f4d4cd3d0c571 + +info: + name: > + Rate my Post - WP Rating System <= 3.4.1 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6669d04c-9f97-43a5-a312-1cb3d67d21fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rate-my-post/" + google-query: inurl:"/wp-content/plugins/rate-my-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rate-my-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rate-my-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rate-my-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rate-my-post-cd934d4abb39f62a28c7ae7b5501f68f.yaml b/nuclei-templates/cve-less/plugins/rate-my-post-cd934d4abb39f62a28c7ae7b5501f68f.yaml new file mode 100644 index 0000000000..c4c393c485 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rate-my-post-cd934d4abb39f62a28c7ae7b5501f68f.yaml @@ -0,0 +1,58 @@ +id: rate-my-post-cd934d4abb39f62a28c7ae7b5501f68f + +info: + name: > + Rate my Post – WP Rating System <= 3.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4e0ee4f-fc45-4682-9ed4-aa1301205bb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rate-my-post/" + google-query: inurl:"/wp-content/plugins/rate-my-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rate-my-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rate-my-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rate-my-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rate-star-review-b6d9dd2af7efaf91b36ca5f14358b6f3.yaml b/nuclei-templates/cve-less/plugins/rate-star-review-b6d9dd2af7efaf91b36ca5f14358b6f3.yaml new file mode 100644 index 0000000000..b30239eb52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rate-star-review-b6d9dd2af7efaf91b36ca5f14358b6f3.yaml @@ -0,0 +1,58 @@ +id: rate-star-review-b6d9dd2af7efaf91b36ca5f14358b6f3 + +info: + name: > + Rate Star Review <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/025a13e6-5f0a-49ca-bd63-44e4095072bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rate-star-review/" + google-query: inurl:"/wp-content/plugins/rate-star-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rate-star-review,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rate-star-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rate-star-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rating-bws-64aea5cedd920a29c29c6656f64c0089.yaml b/nuclei-templates/cve-less/plugins/rating-bws-64aea5cedd920a29c29c6656f64c0089.yaml new file mode 100644 index 0000000000..4a9f139e00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rating-bws-64aea5cedd920a29c29c6656f64c0089.yaml @@ -0,0 +1,58 @@ +id: rating-bws-64aea5cedd920a29c29c6656f64c0089 + +info: + name: > + Rating by BestWebSoft < 0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5c23952-3732-4316-aa43-ddab88a6ba79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rating-bws/" + google-query: inurl:"/wp-content/plugins/rating-bws/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rating-bws,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rating-bws/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rating-bws" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rating-bws-ac572eddea26c37b87d8b8b50f635cf6.yaml b/nuclei-templates/cve-less/plugins/rating-bws-ac572eddea26c37b87d8b8b50f635cf6.yaml new file mode 100644 index 0000000000..f859232904 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rating-bws-ac572eddea26c37b87d8b8b50f635cf6.yaml @@ -0,0 +1,58 @@ +id: rating-bws-ac572eddea26c37b87d8b8b50f635cf6 + +info: + name: > + Rating by BestWebSoft <= 1.5 - Rating Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3511a3d3-1e6e-41ba-a8b9-67f8f7eef157?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rating-bws/" + google-query: inurl:"/wp-content/plugins/rating-bws/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rating-bws,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rating-bws/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rating-bws" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rating-widget-37317046e94cf4102e2b78af213fc732.yaml b/nuclei-templates/cve-less/plugins/rating-widget-37317046e94cf4102e2b78af213fc732.yaml new file mode 100644 index 0000000000..411299d3df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rating-widget-37317046e94cf4102e2b78af213fc732.yaml @@ -0,0 +1,58 @@ +id: rating-widget-37317046e94cf4102e2b78af213fc732 + +info: + name: > + Rating Widget <= 3.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53577cf4-af87-41a2-9424-56a584b78cf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rating-widget/" + google-query: inurl:"/wp-content/plugins/rating-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rating-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rating-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rating-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rating-widget-4f6bcd63e0061408e2503cd933be694d.yaml b/nuclei-templates/cve-less/plugins/rating-widget-4f6bcd63e0061408e2503cd933be694d.yaml new file mode 100644 index 0000000000..a6c1363b36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rating-widget-4f6bcd63e0061408e2503cd933be694d.yaml @@ -0,0 +1,58 @@ +id: rating-widget-4f6bcd63e0061408e2503cd933be694d + +info: + name: > + Rating Widget Plugin < 2.9.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b780e28-3254-49d8-9b62-ade1c0a42d8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rating-widget/" + google-query: inurl:"/wp-content/plugins/rating-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rating-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rating-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rating-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rating-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/rating-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..01d3f9af4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rating-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: rating-widget-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rating-widget/" + google-query: inurl:"/wp-content/plugins/rating-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rating-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rating-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rating-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ravpage-fbf39c35d747104c4d4297ab90803845.yaml b/nuclei-templates/cve-less/plugins/ravpage-fbf39c35d747104c4d4297ab90803845.yaml new file mode 100644 index 0000000000..6fb9e01097 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ravpage-fbf39c35d747104c4d4297ab90803845.yaml @@ -0,0 +1,58 @@ +id: ravpage-fbf39c35d747104c4d4297ab90803845 + +info: + name: > + Ravpage <= 2.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2fe6b69-7a89-4cd4-8a8c-f7e1e587fbbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ravpage/" + google-query: inurl:"/wp-content/plugins/ravpage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ravpage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ravpage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ravpage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/raygun4wp-36b86201be553488a21224994bdfe4a7.yaml b/nuclei-templates/cve-less/plugins/raygun4wp-36b86201be553488a21224994bdfe4a7.yaml new file mode 100644 index 0000000000..a07416ddcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/raygun4wp-36b86201be553488a21224994bdfe4a7.yaml @@ -0,0 +1,58 @@ +id: raygun4wp-36b86201be553488a21224994bdfe4a7 + +info: + name: > + Raygun4WP <= 1.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1de69b7e-944a-4d89-a7de-2fae5ab83171?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/raygun4wp/" + google-query: inurl:"/wp-content/plugins/raygun4wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,raygun4wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/raygun4wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "raygun4wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/raygun4wp-942951937c68cc5db7a5bc776617ab05.yaml b/nuclei-templates/cve-less/plugins/raygun4wp-942951937c68cc5db7a5bc776617ab05.yaml new file mode 100644 index 0000000000..fd4f851ae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/raygun4wp-942951937c68cc5db7a5bc776617ab05.yaml @@ -0,0 +1,58 @@ +id: raygun4wp-942951937c68cc5db7a5bc776617ab05 + +info: + name: > + Raygun4WP <= 1.8.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b51ea91f-247c-4ea6-b60c-7ad49b676cb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/raygun4wp/" + google-query: inurl:"/wp-content/plugins/raygun4wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,raygun4wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/raygun4wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "raygun4wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rays-grid-5c28550696f855f4c3c836e5bcf2c491.yaml b/nuclei-templates/cve-less/plugins/rays-grid-5c28550696f855f4c3c836e5bcf2c491.yaml new file mode 100644 index 0000000000..3f6a62ebf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rays-grid-5c28550696f855f4c3c836e5bcf2c491.yaml @@ -0,0 +1,58 @@ +id: rays-grid-5c28550696f855f4c3c836e5bcf2c491 + +info: + name: > + RAYS Grid <= 1.2.2 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5911815-db53-46f2-a16d-ed21be20bbfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rays-grid/" + google-query: inurl:"/wp-content/plugins/rays-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rays-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rays-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rays-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rb-internal-links-1b62450f818e2ba095ee733915545ce8.yaml b/nuclei-templates/cve-less/plugins/rb-internal-links-1b62450f818e2ba095ee733915545ce8.yaml new file mode 100644 index 0000000000..f3418bd916 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rb-internal-links-1b62450f818e2ba095ee733915545ce8.yaml @@ -0,0 +1,58 @@ +id: rb-internal-links-1b62450f818e2ba095ee733915545ce8 + +info: + name: > + RB Internal Links <= 2.0.16 - Cross-Site Request Forgery to Settings update and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2be6c7d8-6dd4-4701-9baa-694496e7388a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rb-internal-links/" + google-query: inurl:"/wp-content/plugins/rb-internal-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rb-internal-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rb-internal-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rb-internal-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rbxgallery-404f62898fe72968016d5c9a6f1d92d8.yaml b/nuclei-templates/cve-less/plugins/rbxgallery-404f62898fe72968016d5c9a6f1d92d8.yaml new file mode 100644 index 0000000000..41d24ddb9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rbxgallery-404f62898fe72968016d5c9a6f1d92d8.yaml @@ -0,0 +1,58 @@ +id: rbxgallery-404f62898fe72968016d5c9a6f1d92d8 + +info: + name: > + RBX Gallery < 3.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1804afe-55a1-428f-ae5d-99d68f61d33b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rbxgallery/" + google-query: inurl:"/wp-content/plugins/rbxgallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rbxgallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rbxgallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rbxgallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rd-wc-order-modifier-3cba8118600a736749afebf101985b5d.yaml b/nuclei-templates/cve-less/plugins/rd-wc-order-modifier-3cba8118600a736749afebf101985b5d.yaml new file mode 100644 index 0000000000..d5c2bfb99d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rd-wc-order-modifier-3cba8118600a736749afebf101985b5d.yaml @@ -0,0 +1,58 @@ +id: rd-wc-order-modifier-3cba8118600a736749afebf101985b5d + +info: + name: > + RD Order Modifier for WooCommerce <= 1.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6421c33-152d-4e50-a96c-f97e2981b72f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rd-wc-order-modifier/" + google-query: inurl:"/wp-content/plugins/rd-wc-order-modifier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rd-wc-order-modifier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rd-wc-order-modifier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rd-wc-order-modifier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rduplicator-bd5ef70cad456cfb810c3a196f6a2a81.yaml b/nuclei-templates/cve-less/plugins/rduplicator-bd5ef70cad456cfb810c3a196f6a2a81.yaml new file mode 100644 index 0000000000..25c4450c96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rduplicator-bd5ef70cad456cfb810c3a196f6a2a81.yaml @@ -0,0 +1,58 @@ +id: rduplicator-bd5ef70cad456cfb810c3a196f6a2a81 + +info: + name: > + Quick Post Duplicator <= 2.0 - Authenticated (Contributor+) SQL Injection via post_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34e31a0f-27de-4536-9a7e-b8f68e557b3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rduplicator/" + google-query: inurl:"/wp-content/plugins/rduplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rduplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rduplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rduplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/re-attacher-c4ba01e059d197a2a3abc453d782dcf8.yaml b/nuclei-templates/cve-less/plugins/re-attacher-c4ba01e059d197a2a3abc453d782dcf8.yaml new file mode 100644 index 0000000000..1fd75c72e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/re-attacher-c4ba01e059d197a2a3abc453d782dcf8.yaml @@ -0,0 +1,58 @@ +id: re-attacher-c4ba01e059d197a2a3abc453d782dcf8 + +info: + name: > + Re-attacher by BestWebSoft < 1.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4541ab5d-5c99-46e8-bc78-fa2c5cffd09b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/re-attacher/" + google-query: inurl:"/wp-content/plugins/re-attacher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,re-attacher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/re-attacher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "re-attacher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reach-us-contact-form-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/reach-us-contact-form-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..c3904569de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reach-us-contact-form-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: reach-us-contact-form-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reach-us-contact-form/" + google-query: inurl:"/wp-content/plugins/reach-us-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reach-us-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reach-us-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reach-us-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/react-webcam-ecc9ca2eedeba9a7eb9cef5703953450.yaml b/nuclei-templates/cve-less/plugins/react-webcam-ecc9ca2eedeba9a7eb9cef5703953450.yaml new file mode 100644 index 0000000000..c99c1b8e15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/react-webcam-ecc9ca2eedeba9a7eb9cef5703953450.yaml @@ -0,0 +1,58 @@ +id: react-webcam-ecc9ca2eedeba9a7eb9cef5703953450 + +info: + name: > + React Webcam <= 1.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56ec086e-01a7-42f8-be17-b2bdf59cdfb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/react-webcam/" + google-query: inurl:"/wp-content/plugins/react-webcam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,react-webcam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/react-webcam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "react-webcam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-and-understood-913904da9b37e5de5dab8db2c48cdd1a.yaml b/nuclei-templates/cve-less/plugins/read-and-understood-913904da9b37e5de5dab8db2c48cdd1a.yaml new file mode 100644 index 0000000000..fc451aa477 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-and-understood-913904da9b37e5de5dab8db2c48cdd1a.yaml @@ -0,0 +1,58 @@ +id: read-and-understood-913904da9b37e5de5dab8db2c48cdd1a + +info: + name: > + Read and Understood <= 2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3c961eb-0174-4aa3-a117-7f72998eefbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-and-understood/" + google-query: inurl:"/wp-content/plugins/read-and-understood/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-and-understood,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-and-understood/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-and-understood" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-and-understood-9859097987f0e7ca79e11ace81cfa3fa.yaml b/nuclei-templates/cve-less/plugins/read-and-understood-9859097987f0e7ca79e11ace81cfa3fa.yaml new file mode 100644 index 0000000000..f7b988f4cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-and-understood-9859097987f0e7ca79e11ace81cfa3fa.yaml @@ -0,0 +1,58 @@ +id: read-and-understood-9859097987f0e7ca79e11ace81cfa3fa + +info: + name: > + Read and Understood < 2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e61942e-15ea-468c-b71a-50396d5b2730?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-and-understood/" + google-query: inurl:"/wp-content/plugins/read-and-understood/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-and-understood,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-and-understood/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-and-understood" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-and-understood-b32bcea1f07567d61bc53250e86795f7.yaml b/nuclei-templates/cve-less/plugins/read-and-understood-b32bcea1f07567d61bc53250e86795f7.yaml new file mode 100644 index 0000000000..5c4e3b460a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-and-understood-b32bcea1f07567d61bc53250e86795f7.yaml @@ -0,0 +1,58 @@ +id: read-and-understood-b32bcea1f07567d61bc53250e86795f7 + +info: + name: > + Read and Understood < 2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/999cf54e-2ea8-474d-984c-1c4f729198aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-and-understood/" + google-query: inurl:"/wp-content/plugins/read-and-understood/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-and-understood,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-and-understood/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-and-understood" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-more-353927ae64af5c6eafc196b5f94afe9a.yaml b/nuclei-templates/cve-less/plugins/read-more-353927ae64af5c6eafc196b5f94afe9a.yaml new file mode 100644 index 0000000000..ebd6ab6838 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-more-353927ae64af5c6eafc196b5f94afe9a.yaml @@ -0,0 +1,58 @@ +id: read-more-353927ae64af5c6eafc196b5f94afe9a + +info: + name: > + Read more By Adam <= 1.1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a6316d8-1d64-4d28-b28a-00ca0b5facee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-more/" + google-query: inurl:"/wp-content/plugins/read-more/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-more,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-more/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-more" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-more-excerpt-link-8911ed0627c35d1ed98759cc71c063ca.yaml b/nuclei-templates/cve-less/plugins/read-more-excerpt-link-8911ed0627c35d1ed98759cc71c063ca.yaml new file mode 100644 index 0000000000..8653f25f2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-more-excerpt-link-8911ed0627c35d1ed98759cc71c063ca.yaml @@ -0,0 +1,58 @@ +id: read-more-excerpt-link-8911ed0627c35d1ed98759cc71c063ca + +info: + name: > + Read More Excerpt Link <= 1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27c3d563-4ed5-47a1-ae2c-ff765fb56cb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-more-excerpt-link/" + google-query: inurl:"/wp-content/plugins/read-more-excerpt-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-more-excerpt-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-more-excerpt-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-more-excerpt-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-more-excerpt-link-fb56c017c2ceb4ddc8f04cf045c71346.yaml b/nuclei-templates/cve-less/plugins/read-more-excerpt-link-fb56c017c2ceb4ddc8f04cf045c71346.yaml new file mode 100644 index 0000000000..d0b3345247 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-more-excerpt-link-fb56c017c2ceb4ddc8f04cf045c71346.yaml @@ -0,0 +1,58 @@ +id: read-more-excerpt-link-fb56c017c2ceb4ddc8f04cf045c71346 + +info: + name: > + Download Read More Excerpt Link <= 1.6.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0359434b-9d88-4a40-8e9f-ec354c8de816?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-more-excerpt-link/" + google-query: inurl:"/wp-content/plugins/read-more-excerpt-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-more-excerpt-link,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-more-excerpt-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-more-excerpt-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-more-without-refresh-66aaa6f41f27e2a7e948bc3c3424d334.yaml b/nuclei-templates/cve-less/plugins/read-more-without-refresh-66aaa6f41f27e2a7e948bc3c3424d334.yaml new file mode 100644 index 0000000000..02e8f9244b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-more-without-refresh-66aaa6f41f27e2a7e948bc3c3424d334.yaml @@ -0,0 +1,58 @@ +id: read-more-without-refresh-66aaa6f41f27e2a7e948bc3c3424d334 + +info: + name: > + Read More Without Refresh <= 3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2bdb698-3a07-4e8b-a498-b156accadc0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-more-without-refresh/" + google-query: inurl:"/wp-content/plugins/read-more-without-refresh/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-more-without-refresh,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-more-without-refresh/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-more-without-refresh" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-offline-49f7af60a7d6ca8e6785ad7873768f2a.yaml b/nuclei-templates/cve-less/plugins/read-offline-49f7af60a7d6ca8e6785ad7873768f2a.yaml new file mode 100644 index 0000000000..e1a10460be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-offline-49f7af60a7d6ca8e6785ad7873768f2a.yaml @@ -0,0 +1,58 @@ +id: read-offline-49f7af60a7d6ca8e6785ad7873768f2a + +info: + name: > + JQueryFileTree <= 2.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f20352f-386f-45ab-b719-8a70f5c11b02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-offline/" + google-query: inurl:"/wp-content/plugins/read-offline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-offline,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-offline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-offline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/read-offline-c19240e29be09298009c0e0215eb1f86.yaml b/nuclei-templates/cve-less/plugins/read-offline-c19240e29be09298009c0e0215eb1f86.yaml new file mode 100644 index 0000000000..d6afa70f61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/read-offline-c19240e29be09298009c0e0215eb1f86.yaml @@ -0,0 +1,58 @@ +id: read-offline-c19240e29be09298009c0e0215eb1f86 + +info: + name: > + PHPRelativePath Library - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ae01053-e6cd-4ddf-9e2a-4658cdb60f8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/read-offline/" + google-query: inurl:"/wp-content/plugins/read-offline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,read-offline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/read-offline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "read-offline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ready-ecommerce-11774eca9d7255cbce54b4f5c2cb1270.yaml b/nuclei-templates/cve-less/plugins/ready-ecommerce-11774eca9d7255cbce54b4f5c2cb1270.yaml new file mode 100644 index 0000000000..5b8d3709a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ready-ecommerce-11774eca9d7255cbce54b4f5c2cb1270.yaml @@ -0,0 +1,58 @@ +id: ready-ecommerce-11774eca9d7255cbce54b4f5c2cb1270 + +info: + name: > + Ready! Ecommerce Shopping Cart < 0.5.1 - Cross-Site Request Forgery and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1aadb04c-a483-4f9b-8246-3dd7e158fcc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ready-ecommerce/" + google-query: inurl:"/wp-content/plugins/ready-ecommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ready-ecommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ready-ecommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ready-ecommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-cookie-banner-c03c24ae2b0b619cef671f24ff29a655.yaml b/nuclei-templates/cve-less/plugins/real-cookie-banner-c03c24ae2b0b619cef671f24ff29a655.yaml new file mode 100644 index 0000000000..c6f7941012 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-cookie-banner-c03c24ae2b0b619cef671f24ff29a655.yaml @@ -0,0 +1,58 @@ +id: real-cookie-banner-c03c24ae2b0b619cef671f24ff29a655 + +info: + name: > + WordPress Real Cookie Banner: GDPR (DSGVO) & ePrivacy Cookie Consent < 2.14.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18e51b35-90fa-4ea0-95f9-644ab864b406?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-cookie-banner/" + google-query: inurl:"/wp-content/plugins/real-cookie-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-cookie-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-cookie-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-cookie-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-cookie-banner-cb472ca260be89964a7f7e562d3b7648.yaml b/nuclei-templates/cve-less/plugins/real-cookie-banner-cb472ca260be89964a7f7e562d3b7648.yaml new file mode 100644 index 0000000000..e9789ea1a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-cookie-banner-cb472ca260be89964a7f7e562d3b7648.yaml @@ -0,0 +1,58 @@ +id: real-cookie-banner-cb472ca260be89964a7f7e562d3b7648 + +info: + name: > + Real Cookie Banner <= 3.4.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a78f06-1af2-462e-b328-0e9e603ad904?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-cookie-banner/" + google-query: inurl:"/wp-content/plugins/real-cookie-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-cookie-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-cookie-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-cookie-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-cookie-banner-cd3b33eab1e4a7c6dd00ae8ecc737be3.yaml b/nuclei-templates/cve-less/plugins/real-cookie-banner-cd3b33eab1e4a7c6dd00ae8ecc737be3.yaml new file mode 100644 index 0000000000..6b55afbcd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-cookie-banner-cd3b33eab1e4a7c6dd00ae8ecc737be3.yaml @@ -0,0 +1,58 @@ +id: real-cookie-banner-cd3b33eab1e4a7c6dd00ae8ecc737be3 + +info: + name: > + Real Cookie Banner <= 2.18.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5500911-52cf-43b5-a15e-e8db5bedd5af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-cookie-banner/" + google-query: inurl:"/wp-content/plugins/real-cookie-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-cookie-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-cookie-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-cookie-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-estate-listing-realtyna-wpl-df196e267631abea140e582e96b3b0e3.yaml b/nuclei-templates/cve-less/plugins/real-estate-listing-realtyna-wpl-df196e267631abea140e582e96b3b0e3.yaml new file mode 100644 index 0000000000..bddc2c1df5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-estate-listing-realtyna-wpl-df196e267631abea140e582e96b3b0e3.yaml @@ -0,0 +1,58 @@ +id: real-estate-listing-realtyna-wpl-df196e267631abea140e582e96b3b0e3 + +info: + name: > + Realtyna Organic IDX plugin <= 4.14.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb2897fc-c38b-419f-8651-0620a31b50ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-estate-listing-realtyna-wpl/" + google-query: inurl:"/wp-content/plugins/real-estate-listing-realtyna-wpl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-estate-listing-realtyna-wpl,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-estate-listing-realtyna-wpl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-estate-listing-realtyna-wpl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-estate-listing-realtyna-wpl-edeebbc602448470d251a6422f124213.yaml b/nuclei-templates/cve-less/plugins/real-estate-listing-realtyna-wpl-edeebbc602448470d251a6422f124213.yaml new file mode 100644 index 0000000000..a6ad252aba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-estate-listing-realtyna-wpl-edeebbc602448470d251a6422f124213.yaml @@ -0,0 +1,58 @@ +id: real-estate-listing-realtyna-wpl-edeebbc602448470d251a6422f124213 + +info: + name: > + Realtyna Organic IDX plugin <= 4.14.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f800156-1ccc-431f-9b2b-3b2ba3428bbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-estate-listing-realtyna-wpl/" + google-query: inurl:"/wp-content/plugins/real-estate-listing-realtyna-wpl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-estate-listing-realtyna-wpl,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-estate-listing-realtyna-wpl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-estate-listing-realtyna-wpl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-estate-manager-715775220a5d0726abf3cb0c44398e2b.yaml b/nuclei-templates/cve-less/plugins/real-estate-manager-715775220a5d0726abf3cb0c44398e2b.yaml new file mode 100644 index 0000000000..d8213e6cf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-estate-manager-715775220a5d0726abf3cb0c44398e2b.yaml @@ -0,0 +1,58 @@ +id: real-estate-manager-715775220a5d0726abf3cb0c44398e2b + +info: + name: > + Real Estate Manager – Property Listing and Agent Management <= 6.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc06ba09-9562-4d97-90ff-5464399feced?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-estate-manager/" + google-query: inurl:"/wp-content/plugins/real-estate-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-estate-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-estate-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-estate-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-estate-manager-ce5b36195b53746aaff59fc078e530e9.yaml b/nuclei-templates/cve-less/plugins/real-estate-manager-ce5b36195b53746aaff59fc078e530e9.yaml new file mode 100644 index 0000000000..82029f739a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-estate-manager-ce5b36195b53746aaff59fc078e530e9.yaml @@ -0,0 +1,58 @@ +id: real-estate-manager-ce5b36195b53746aaff59fc078e530e9 + +info: + name: > + Real Estate Manager <= 7.2 - Arbitrary Usermeta Update to Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d83d1fd0-6e21-406e-a7c0-89d26eabbb32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-estate-manager/" + google-query: inurl:"/wp-content/plugins/real-estate-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-estate-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-estate-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-estate-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-estate-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/real-estate-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..387649fefe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-estate-pro-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: real-estate-pro-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-estate-pro/" + google-query: inurl:"/wp-content/plugins/real-estate-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-estate-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-estate-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-estate-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-kit-ba00ab2a2755c54cd7d0683aa28f5913.yaml b/nuclei-templates/cve-less/plugins/real-kit-ba00ab2a2755c54cd7d0683aa28f5913.yaml new file mode 100644 index 0000000000..7beb08c09a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-kit-ba00ab2a2755c54cd7d0683aa28f5913.yaml @@ -0,0 +1,58 @@ +id: real-kit-ba00ab2a2755c54cd7d0683aa28f5913 + +info: + name: > + real.Kit <= 5.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97c1aeee-a82e-4d09-bffb-a91a89d0ea1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-kit/" + google-query: inurl:"/wp-content/plugins/real-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-media-library-lite-2a7a5a205e77ded07268b829f167efa8.yaml b/nuclei-templates/cve-less/plugins/real-media-library-lite-2a7a5a205e77ded07268b829f167efa8.yaml new file mode 100644 index 0000000000..d2cd2e1334 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-media-library-lite-2a7a5a205e77ded07268b829f167efa8.yaml @@ -0,0 +1,58 @@ +id: real-media-library-lite-2a7a5a205e77ded07268b829f167efa8 + +info: + name: > + Real Media Library: Media Library Folder & File Manager <= 4.18.28 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/950d71ae-29a1-4b71-b74a-b1a5c9f3326e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-media-library-lite/" + google-query: inurl:"/wp-content/plugins/real-media-library-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-media-library-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-media-library-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-media-library-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.18.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-media-library-lite-426ec193e6b1f2e068f34932123c6dcd.yaml b/nuclei-templates/cve-less/plugins/real-media-library-lite-426ec193e6b1f2e068f34932123c6dcd.yaml new file mode 100644 index 0000000000..0e8737077c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-media-library-lite-426ec193e6b1f2e068f34932123c6dcd.yaml @@ -0,0 +1,58 @@ +id: real-media-library-lite-426ec193e6b1f2e068f34932123c6dcd + +info: + name: > + Real Media Library: Media Library Folder & File Manager <= 4.22.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67a44d4c-da3f-4c3d-997b-1417c6906a9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-media-library-lite/" + google-query: inurl:"/wp-content/plugins/real-media-library-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-media-library-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-media-library-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-media-library-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.22.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-media-library-lite-458c0d6ab63df27e3e21cbe7fc77cfd2.yaml b/nuclei-templates/cve-less/plugins/real-media-library-lite-458c0d6ab63df27e3e21cbe7fc77cfd2.yaml new file mode 100644 index 0000000000..d53d14bebc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-media-library-lite-458c0d6ab63df27e3e21cbe7fc77cfd2.yaml @@ -0,0 +1,58 @@ +id: real-media-library-lite-458c0d6ab63df27e3e21cbe7fc77cfd2 + +info: + name: > + Real Media Library <= 4.22.11 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d359dc78-fc90-4570-a768-5f1a05f865e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-media-library-lite/" + google-query: inurl:"/wp-content/plugins/real-media-library-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-media-library-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-media-library-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-media-library-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.22.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-media-library-lite-d45b3048f23bdc5676881ea128b4fe4b.yaml b/nuclei-templates/cve-less/plugins/real-media-library-lite-d45b3048f23bdc5676881ea128b4fe4b.yaml new file mode 100644 index 0000000000..0fa0e67e08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-media-library-lite-d45b3048f23bdc5676881ea128b4fe4b.yaml @@ -0,0 +1,58 @@ +id: real-media-library-lite-d45b3048f23bdc5676881ea128b4fe4b + +info: + name: > + WordPress Real Media Library <= 4.14.1 - Authenticated (Author) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cebd40c2-42df-4792-81dc-2b1082f1712b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-media-library-lite/" + google-query: inurl:"/wp-content/plugins/real-media-library-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-media-library-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-media-library-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-media-library-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-time-auto-find-and-replace-6a587e71ee083048d4679f04ad4755b0.yaml b/nuclei-templates/cve-less/plugins/real-time-auto-find-and-replace-6a587e71ee083048d4679f04ad4755b0.yaml new file mode 100644 index 0000000000..31742b9a17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-time-auto-find-and-replace-6a587e71ee083048d4679f04ad4755b0.yaml @@ -0,0 +1,58 @@ +id: real-time-auto-find-and-replace-6a587e71ee083048d4679f04ad4755b0 + +info: + name: > + Better Find and Replace <= 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/879bd819-5513-4253-b6e0-a34dbebae287?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-time-auto-find-and-replace/" + google-query: inurl:"/wp-content/plugins/real-time-auto-find-and-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-time-auto-find-and-replace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-time-auto-find-and-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-time-auto-find-and-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-time-auto-find-and-replace-eab47af35bd14f792c9512e4731e4999.yaml b/nuclei-templates/cve-less/plugins/real-time-auto-find-and-replace-eab47af35bd14f792c9512e4731e4999.yaml new file mode 100644 index 0000000000..d9de27f431 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-time-auto-find-and-replace-eab47af35bd14f792c9512e4731e4999.yaml @@ -0,0 +1,58 @@ +id: real-time-auto-find-and-replace-eab47af35bd14f792c9512e4731e4999 + +info: + name: > + Better Find and Replace <= 1.3.5 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e26b7e73-2d04-493a-a7d9-2276bc0e1ba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-time-auto-find-and-replace/" + google-query: inurl:"/wp-content/plugins/real-time-auto-find-and-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-time-auto-find-and-replace,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-time-auto-find-and-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-time-auto-find-and-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-time-find-and-replace-8704c0e0a0b31ff063e1784b2389347e.yaml b/nuclei-templates/cve-less/plugins/real-time-find-and-replace-8704c0e0a0b31ff063e1784b2389347e.yaml new file mode 100644 index 0000000000..ee4b3c6db5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-time-find-and-replace-8704c0e0a0b31ff063e1784b2389347e.yaml @@ -0,0 +1,58 @@ +id: real-time-find-and-replace-8704c0e0a0b31ff063e1784b2389347e + +info: + name: > + Real-Time Find and Replace <= 3.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2950eb91-a232-42c5-8a28-96b770cb7c48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-time-find-and-replace/" + google-query: inurl:"/wp-content/plugins/real-time-find-and-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-time-find-and-replace,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-time-find-and-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-time-find-and-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-time-find-and-replace-8de354ee8a09f1e40abb305d774cf1ed.yaml b/nuclei-templates/cve-less/plugins/real-time-find-and-replace-8de354ee8a09f1e40abb305d774cf1ed.yaml new file mode 100644 index 0000000000..0d51ae5c24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-time-find-and-replace-8de354ee8a09f1e40abb305d774cf1ed.yaml @@ -0,0 +1,58 @@ +id: real-time-find-and-replace-8de354ee8a09f1e40abb305d774cf1ed + +info: + name: > + Real-Time Find and Replace <= 3.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2e62675-e3d5-4545-bb80-0330da966368?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-time-find-and-replace/" + google-query: inurl:"/wp-content/plugins/real-time-find-and-replace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-time-find-and-replace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-time-find-and-replace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-time-find-and-replace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real-wysiwyg-1b2227bfbc114c60a1d636953ef21b96.yaml b/nuclei-templates/cve-less/plugins/real-wysiwyg-1b2227bfbc114c60a1d636953ef21b96.yaml new file mode 100644 index 0000000000..04c360d726 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real-wysiwyg-1b2227bfbc114c60a1d636953ef21b96.yaml @@ -0,0 +1,58 @@ +id: real-wysiwyg-1b2227bfbc114c60a1d636953ef21b96 + +info: + name: > + Real WYSIWYG <= 0.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3b39055-aa2a-4db8-838b-e4baaea105b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real-wysiwyg/" + google-query: inurl:"/wp-content/plugins/real-wysiwyg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real-wysiwyg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real-wysiwyg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-wysiwyg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real3d-flipbook-079ec9a97d66af6e700f5d8e97855854.yaml b/nuclei-templates/cve-less/plugins/real3d-flipbook-079ec9a97d66af6e700f5d8e97855854.yaml new file mode 100644 index 0000000000..c0e349f024 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real3d-flipbook-079ec9a97d66af6e700f5d8e97855854.yaml @@ -0,0 +1,58 @@ +id: real3d-flipbook-079ec9a97d66af6e700f5d8e97855854 + +info: + name: > + Real3D Flipbook <= 2.8 - Reflected Cross-Site Scripting via bookId parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75f964a8-a5eb-4990-a6d4-e911a20d0035?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real3d-flipbook/" + google-query: inurl:"/wp-content/plugins/real3d-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real3d-flipbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real3d-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real3d-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real3d-flipbook-2c4b560690d4d3a59e350708726945d0.yaml b/nuclei-templates/cve-less/plugins/real3d-flipbook-2c4b560690d4d3a59e350708726945d0.yaml new file mode 100644 index 0000000000..cb15df4dc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real3d-flipbook-2c4b560690d4d3a59e350708726945d0.yaml @@ -0,0 +1,58 @@ +id: real3d-flipbook-2c4b560690d4d3a59e350708726945d0 + +info: + name: > + Real3D Flipbook <= 1.0.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12e2645c-7df1-4fbe-baa1-6b932062682b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real3d-flipbook/" + google-query: inurl:"/wp-content/plugins/real3d-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real3d-flipbook,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real3d-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real3d-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real3d-flipbook-40245b305fdf9a44e43f9056d7f5ec77.yaml b/nuclei-templates/cve-less/plugins/real3d-flipbook-40245b305fdf9a44e43f9056d7f5ec77.yaml new file mode 100644 index 0000000000..3632e83797 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real3d-flipbook-40245b305fdf9a44e43f9056d7f5ec77.yaml @@ -0,0 +1,58 @@ +id: real3d-flipbook-40245b305fdf9a44e43f9056d7f5ec77 + +info: + name: > + Real3D Flipbook <= 2.8 - Directory Traversal via Uploads + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc24d2de-352c-4215-a4db-2966aa6467c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real3d-flipbook/" + google-query: inurl:"/wp-content/plugins/real3d-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real3d-flipbook,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real3d-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real3d-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real3d-flipbook-95ba3629393e6ed9cf82cdffe1354c3f.yaml b/nuclei-templates/cve-less/plugins/real3d-flipbook-95ba3629393e6ed9cf82cdffe1354c3f.yaml new file mode 100644 index 0000000000..872885351e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real3d-flipbook-95ba3629393e6ed9cf82cdffe1354c3f.yaml @@ -0,0 +1,58 @@ +id: real3d-flipbook-95ba3629393e6ed9cf82cdffe1354c3f + +info: + name: > + Real3D Flipbook <= 2.8 - Unauthenticated Arbitrary File or Directory Delete + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82802e80-efb5-4aa3-9fea-9c21bfb71efa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real3d-flipbook/" + google-query: inurl:"/wp-content/plugins/real3d-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real3d-flipbook,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real3d-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real3d-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real3d-flipbook-a9204f8c11120cb2c33b3f2dfe972d8b.yaml b/nuclei-templates/cve-less/plugins/real3d-flipbook-a9204f8c11120cb2c33b3f2dfe972d8b.yaml new file mode 100644 index 0000000000..60bc69ea2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real3d-flipbook-a9204f8c11120cb2c33b3f2dfe972d8b.yaml @@ -0,0 +1,58 @@ +id: real3d-flipbook-a9204f8c11120cb2c33b3f2dfe972d8b + +info: + name: > + Real3D Flipbook <= 1.0.0 - File Upload to User Controlled Location + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dab03b8-6ed9-4f08-bd52-0f507de882de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real3d-flipbook/" + google-query: inurl:"/wp-content/plugins/real3d-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real3d-flipbook,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real3d-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real3d-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real3d-flipbook-ec9bb451b23b2be1cff3727d057731cd.yaml b/nuclei-templates/cve-less/plugins/real3d-flipbook-ec9bb451b23b2be1cff3727d057731cd.yaml new file mode 100644 index 0000000000..6fc4fb4815 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real3d-flipbook-ec9bb451b23b2be1cff3727d057731cd.yaml @@ -0,0 +1,58 @@ +id: real3d-flipbook-ec9bb451b23b2be1cff3727d057731cd + +info: + name: > + Real3D Flipbook <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c232344c-5070-4461-b143-0f53d61d6eac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real3d-flipbook/" + google-query: inurl:"/wp-content/plugins/real3d-flipbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real3d-flipbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real3d-flipbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real3d-flipbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/real3d-flipbook-lite-8ed0dc233dd88ec7cbdf934305689592.yaml b/nuclei-templates/cve-less/plugins/real3d-flipbook-lite-8ed0dc233dd88ec7cbdf934305689592.yaml new file mode 100644 index 0000000000..7b4d1664d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/real3d-flipbook-lite-8ed0dc233dd88ec7cbdf934305689592.yaml @@ -0,0 +1,58 @@ +id: real3d-flipbook-lite-8ed0dc233dd88ec7cbdf934305689592 + +info: + name: > + 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin <= 3.62 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c496a5f8-9cfc-49b3-b360-d942d554b860?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/real3d-flipbook-lite/" + google-query: inurl:"/wp-content/plugins/real3d-flipbook-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,real3d-flipbook-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/real3d-flipbook-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real3d-flipbook-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/realbig-media-d27f815adbf875ce27b19fc701a2c8d1.yaml b/nuclei-templates/cve-less/plugins/realbig-media-d27f815adbf875ce27b19fc701a2c8d1.yaml new file mode 100644 index 0000000000..3f41d6c304 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/realbig-media-d27f815adbf875ce27b19fc701a2c8d1.yaml @@ -0,0 +1,58 @@ +id: realbig-media-d27f815adbf875ce27b19fc701a2c8d1 + +info: + name: > + Realbig <= 1.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70ae0f3e-75a8-41c7-91c0-52d672809835?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/realbig-media/" + google-query: inurl:"/wp-content/plugins/realbig-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,realbig-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/realbig-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realbig-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/realestate-7-f30e0a2c040dabe8e3f5e523525b42cc.yaml b/nuclei-templates/cve-less/plugins/realestate-7-f30e0a2c040dabe8e3f5e523525b42cc.yaml new file mode 100644 index 0000000000..0079066229 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/realestate-7-f30e0a2c040dabe8e3f5e523525b42cc.yaml @@ -0,0 +1,58 @@ +id: realestate-7-f30e0a2c040dabe8e3f5e523525b42cc + +info: + name: > + WP Pro Real Estate 7 < 3.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97c24208-46b2-48a0-a87b-78e642c044cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/realestate-7/" + google-query: inurl:"/wp-content/plugins/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,realestate-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/realestate-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/realia-797afe8d10d441ac220fabb0d1962367.yaml b/nuclei-templates/cve-less/plugins/realia-797afe8d10d441ac220fabb0d1962367.yaml new file mode 100644 index 0000000000..3538c08ea0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/realia-797afe8d10d441ac220fabb0d1962367.yaml @@ -0,0 +1,58 @@ +id: realia-797afe8d10d441ac220fabb0d1962367 + +info: + name: > + Realia <= 0.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f1cce87-3e59-48c1-9d38-adaa739f20db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/realia/" + google-query: inurl:"/wp-content/plugins/realia/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,realia,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/realia/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realia" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/realia-be08bf68983d62c13cc53ac7ac785641.yaml b/nuclei-templates/cve-less/plugins/realia-be08bf68983d62c13cc53ac7ac785641.yaml new file mode 100644 index 0000000000..caac828ee9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/realia-be08bf68983d62c13cc53ac7ac785641.yaml @@ -0,0 +1,58 @@ +id: realia-be08bf68983d62c13cc53ac7ac785641 + +info: + name: > + Realia <= 1.4.0 - Cross-Site Request Forgery to User Email Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06f33e18-0bdd-4c56-a8df-fc1969b9ecf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/realia/" + google-query: inurl:"/wp-content/plugins/realia/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,realia,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/realia/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realia" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/realia-ddde16de87a667ba158100a63c4bffd9.yaml b/nuclei-templates/cve-less/plugins/realia-ddde16de87a667ba158100a63c4bffd9.yaml new file mode 100644 index 0000000000..729f23ef63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/realia-ddde16de87a667ba158100a63c4bffd9.yaml @@ -0,0 +1,58 @@ +id: realia-ddde16de87a667ba158100a63c4bffd9 + +info: + name: > + Realia <= 1.4.0 - Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ee4fe34-e6ae-4f37-a1a7-ebb153ae7a67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/realia/" + google-query: inurl:"/wp-content/plugins/realia/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,realia,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/realia/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realia" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/really-simple-facebook-twitter-share-buttons-37e5e3d24dd11a2139d9abb17ffd385f.yaml b/nuclei-templates/cve-less/plugins/really-simple-facebook-twitter-share-buttons-37e5e3d24dd11a2139d9abb17ffd385f.yaml new file mode 100644 index 0000000000..c261f65655 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/really-simple-facebook-twitter-share-buttons-37e5e3d24dd11a2139d9abb17ffd385f.yaml @@ -0,0 +1,58 @@ +id: really-simple-facebook-twitter-share-buttons-37e5e3d24dd11a2139d9abb17ffd385f + +info: + name: > + Really Simple Facebook Twitter Share Buttons < 2.10.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb99c1a0-a0c3-4a6e-84b1-4ced45015db4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/really-simple-facebook-twitter-share-buttons/" + google-query: inurl:"/wp-content/plugins/really-simple-facebook-twitter-share-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,really-simple-facebook-twitter-share-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/really-simple-facebook-twitter-share-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "really-simple-facebook-twitter-share-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/really-simple-featured-video-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/really-simple-featured-video-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5539089c17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/really-simple-featured-video-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: really-simple-featured-video-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/really-simple-featured-video/" + google-query: inurl:"/wp-content/plugins/really-simple-featured-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,really-simple-featured-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/really-simple-featured-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "really-simple-featured-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/really-simple-google-tag-manager-814d6c2e2d8cde0de9aa6bd07e3615ce.yaml b/nuclei-templates/cve-less/plugins/really-simple-google-tag-manager-814d6c2e2d8cde0de9aa6bd07e3615ce.yaml new file mode 100644 index 0000000000..a501a3cef5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/really-simple-google-tag-manager-814d6c2e2d8cde0de9aa6bd07e3615ce.yaml @@ -0,0 +1,58 @@ +id: really-simple-google-tag-manager-814d6c2e2d8cde0de9aa6bd07e3615ce + +info: + name: > + Really Simple Google Tag Manager <= 1.0.6 - Cross-Site Request Forgery via plugin_activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c579825b-e92e-48d2-925e-d1fc81374c4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/really-simple-google-tag-manager/" + google-query: inurl:"/wp-content/plugins/really-simple-google-tag-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,really-simple-google-tag-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/really-simple-google-tag-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "really-simple-google-tag-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/really-simple-guest-post-6d6c428d36c4156820a311ffe1d5b698.yaml b/nuclei-templates/cve-less/plugins/really-simple-guest-post-6d6c428d36c4156820a311ffe1d5b698.yaml new file mode 100644 index 0000000000..73b4201d50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/really-simple-guest-post-6d6c428d36c4156820a311ffe1d5b698.yaml @@ -0,0 +1,58 @@ +id: really-simple-guest-post-6d6c428d36c4156820a311ffe1d5b698 + +info: + name: > + Really Simple Guest Post <= 1.0.6 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/259158f0-390a-458f-9d8e-262006c4c18d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/really-simple-guest-post/" + google-query: inurl:"/wp-content/plugins/really-simple-guest-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,really-simple-guest-post,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/really-simple-guest-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "really-simple-guest-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/really-simple-ssl-a2af19cf083e10d02f6ef64bbfb896ec.yaml b/nuclei-templates/cve-less/plugins/really-simple-ssl-a2af19cf083e10d02f6ef64bbfb896ec.yaml new file mode 100644 index 0000000000..a198278ee0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/really-simple-ssl-a2af19cf083e10d02f6ef64bbfb896ec.yaml @@ -0,0 +1,58 @@ +id: really-simple-ssl-a2af19cf083e10d02f6ef64bbfb896ec + +info: + name: > + Really Simple SSL <= 7.2.3 - Authenticated (Admin+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39722a07-abfe-4956-b5d0-8ece06913a85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/really-simple-ssl/" + google-query: inurl:"/wp-content/plugins/really-simple-ssl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,really-simple-ssl,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/really-simple-ssl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "really-simple-ssl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/realty-59680ca703e54b65bb1444ccb4c65653.yaml b/nuclei-templates/cve-less/plugins/realty-59680ca703e54b65bb1444ccb4c65653.yaml new file mode 100644 index 0000000000..1671665169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/realty-59680ca703e54b65bb1444ccb4c65653.yaml @@ -0,0 +1,58 @@ +id: realty-59680ca703e54b65bb1444ccb4c65653 + +info: + name: > + Realty by BestWebSoft < 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9ab89a5-bc01-446e-8cea-40544ddec4d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/realty/" + google-query: inurl:"/wp-content/plugins/realty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,realty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/realty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/realty-workstation-3eb72b31a7a3f042d44188428aa0f9df.yaml b/nuclei-templates/cve-less/plugins/realty-workstation-3eb72b31a7a3f042d44188428aa0f9df.yaml new file mode 100644 index 0000000000..62a4fe27f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/realty-workstation-3eb72b31a7a3f042d44188428aa0f9df.yaml @@ -0,0 +1,58 @@ +id: realty-workstation-3eb72b31a7a3f042d44188428aa0f9df + +info: + name: > + Realty Workstation <= 1.0.9 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b2e22c-3811-4bf8-a8da-2ca9c38333dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/realty-workstation/" + google-query: inurl:"/wp-content/plugins/realty-workstation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,realty-workstation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/realty-workstation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realty-workstation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reamaze-8a160378fcef72b726e178d76f962841.yaml b/nuclei-templates/cve-less/plugins/reamaze-8a160378fcef72b726e178d76f962841.yaml new file mode 100644 index 0000000000..3f0a09d9d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reamaze-8a160378fcef72b726e178d76f962841.yaml @@ -0,0 +1,58 @@ +id: reamaze-8a160378fcef72b726e178d76f962841 + +info: + name: > + Re:amaze Helpdesk & Live Chat <= 1.2.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6b0b516-af5c-474a-a674-b52cf80207ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reamaze/" + google-query: inurl:"/wp-content/plugins/reamaze/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reamaze,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reamaze/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reamaze" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rearrange-woocommerce-products-b1810213664dbc480df9bda4d5950322.yaml b/nuclei-templates/cve-less/plugins/rearrange-woocommerce-products-b1810213664dbc480df9bda4d5950322.yaml new file mode 100644 index 0000000000..aa9c7fb177 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rearrange-woocommerce-products-b1810213664dbc480df9bda4d5950322.yaml @@ -0,0 +1,58 @@ +id: rearrange-woocommerce-products-b1810213664dbc480df9bda4d5950322 + +info: + name: > + Rearrange Woocommerce Products <= 3.0.7 - Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/379aa658-ebc4-4000-913e-5f95a4783233?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rearrange-woocommerce-products/" + google-query: inurl:"/wp-content/plugins/rearrange-woocommerce-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rearrange-woocommerce-products,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rearrange-woocommerce-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rearrange-woocommerce-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recall-products-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml b/nuclei-templates/cve-less/plugins/recall-products-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml new file mode 100644 index 0000000000..aba87793a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recall-products-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml @@ -0,0 +1,58 @@ +id: recall-products-75c0e8fcf83cb7fcc7b1f70f65a50a8b + +info: + name: > + Recall Products <= 0.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e0231cf-7de7-4fe7-a0fe-20657f727fef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recall-products/" + google-query: inurl:"/wp-content/plugins/recall-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recall-products,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recall-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recall-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recall-products-f904152cc56225725583f8016fc8d925.yaml b/nuclei-templates/cve-less/plugins/recall-products-f904152cc56225725583f8016fc8d925.yaml new file mode 100644 index 0000000000..340e8d2fe7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recall-products-f904152cc56225725583f8016fc8d925.yaml @@ -0,0 +1,58 @@ +id: recall-products-f904152cc56225725583f8016fc8d925 + +info: + name: > + Recall Products <= 0.8 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/878f27d3-bb57-46b4-aee4-03720d695504?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recall-products/" + google-query: inurl:"/wp-content/plugins/recall-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recall-products,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recall-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recall-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recaptcha-for-all-13830cbd72a32fb533758edb07ec60b9.yaml b/nuclei-templates/cve-less/plugins/recaptcha-for-all-13830cbd72a32fb533758edb07ec60b9.yaml new file mode 100644 index 0000000000..c2f1a4120b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recaptcha-for-all-13830cbd72a32fb533758edb07ec60b9.yaml @@ -0,0 +1,58 @@ +id: recaptcha-for-all-13830cbd72a32fb533758edb07ec60b9 + +info: + name: > + reCAPTCHA for all <= 1.22 - Missing Authorization via recaptcha_for_all_image_select + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66585943-cb70-4296-af66-5b786d1bafb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recaptcha-for-all/" + google-query: inurl:"/wp-content/plugins/recaptcha-for-all/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recaptcha-for-all,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recaptcha-for-all/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recaptcha-for-all" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recencio-book-reviews-7675af1bd6eb113efdfef786b75aea68.yaml b/nuclei-templates/cve-less/plugins/recencio-book-reviews-7675af1bd6eb113efdfef786b75aea68.yaml new file mode 100644 index 0000000000..187a7a1560 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recencio-book-reviews-7675af1bd6eb113efdfef786b75aea68.yaml @@ -0,0 +1,58 @@ +id: recencio-book-reviews-7675af1bd6eb113efdfef786b75aea68 + +info: + name: > + Recencio Book Reviews <= 1.66.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23ee5d94-5a51-4ee3-945c-422f3f07634e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recencio-book-reviews/" + google-query: inurl:"/wp-content/plugins/recencio-book-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recencio-book-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recencio-book-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recencio-book-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.66.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recent-backups-99c982940e78c45e6e770604c5c36b5e.yaml b/nuclei-templates/cve-less/plugins/recent-backups-99c982940e78c45e6e770604c5c36b5e.yaml new file mode 100644 index 0000000000..814e1e885d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recent-backups-99c982940e78c45e6e770604c5c36b5e.yaml @@ -0,0 +1,58 @@ +id: recent-backups-99c982940e78c45e6e770604c5c36b5e + +info: + name: > + Recent Backups <= 0.7 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a9cfd7a-7e6a-4a1f-86bc-b53ef461dde2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recent-backups/" + google-query: inurl:"/wp-content/plugins/recent-backups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recent-backups,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recent-backups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recent-backups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recent-posts-slider-4cc443b42c40fb382275f264fe03f5d8.yaml b/nuclei-templates/cve-less/plugins/recent-posts-slider-4cc443b42c40fb382275f264fe03f5d8.yaml new file mode 100644 index 0000000000..03d4f192d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recent-posts-slider-4cc443b42c40fb382275f264fe03f5d8.yaml @@ -0,0 +1,58 @@ +id: recent-posts-slider-4cc443b42c40fb382275f264fe03f5d8 + +info: + name: > + Recent Posts Slider <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cf9c390-81d7-45d4-a6df-22b16235d11b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recent-posts-slider/" + google-query: inurl:"/wp-content/plugins/recent-posts-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recent-posts-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recent-posts-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recent-posts-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recent-posts-slider-e355011ae0213a93a83d03d9e7e91d4c.yaml b/nuclei-templates/cve-less/plugins/recent-posts-slider-e355011ae0213a93a83d03d9e7e91d4c.yaml new file mode 100644 index 0000000000..ce9180db38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recent-posts-slider-e355011ae0213a93a83d03d9e7e91d4c.yaml @@ -0,0 +1,58 @@ +id: recent-posts-slider-e355011ae0213a93a83d03d9e7e91d4c + +info: + name: > + Recent Posts Slider <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bbc6aa7-0625-4689-8afe-d7399009ee53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recent-posts-slider/" + google-query: inurl:"/wp-content/plugins/recent-posts-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recent-posts-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recent-posts-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recent-posts-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recent-posts-widget-extended-77dbf9da4687af62eb092f0a4f8fc78c.yaml b/nuclei-templates/cve-less/plugins/recent-posts-widget-extended-77dbf9da4687af62eb092f0a4f8fc78c.yaml new file mode 100644 index 0000000000..e2d3a268b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recent-posts-widget-extended-77dbf9da4687af62eb092f0a4f8fc78c.yaml @@ -0,0 +1,58 @@ +id: recent-posts-widget-extended-77dbf9da4687af62eb092f0a4f8fc78c + +info: + name: > + Recent Posts Widget Extended <= 0.9.9.3 - Cross Site-Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64b49f24-db48-4199-9ce2-3ea70c68d6af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recent-posts-widget-extended/" + google-query: inurl:"/wp-content/plugins/recent-posts-widget-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recent-posts-widget-extended,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recent-posts-widget-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recent-posts-widget-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recently-623ee8a736cc9ca7598f1fcb6de572f9.yaml b/nuclei-templates/cve-less/plugins/recently-623ee8a736cc9ca7598f1fcb6de572f9.yaml new file mode 100644 index 0000000000..913834da86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recently-623ee8a736cc9ca7598f1fcb6de572f9.yaml @@ -0,0 +1,58 @@ +id: recently-623ee8a736cc9ca7598f1fcb6de572f9 + +info: + name: > + Recently <= 3.0.4 - Arbitrary File Upload to Remote Code Exectution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8297149-2de3-4e49-80f9-6ea59dea6bce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recently/" + google-query: inurl:"/wp-content/plugins/recently/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recently,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recently/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recently" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recently-8309716d7ccc4397ca213e945a98f0a4.yaml b/nuclei-templates/cve-less/plugins/recently-8309716d7ccc4397ca213e945a98f0a4.yaml new file mode 100644 index 0000000000..de6ad87874 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recently-8309716d7ccc4397ca213e945a98f0a4.yaml @@ -0,0 +1,58 @@ +id: recently-8309716d7ccc4397ca213e945a98f0a4 + +info: + name: > + Recently <= 3.0.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/198e8f56-5354-4e5d-af51-54e95d34e25c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recently/" + google-query: inurl:"/wp-content/plugins/recently/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recently,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recently/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recently" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recently-viewed-and-most-viewed-products-3efeefb310fc267db6d3c82c2278b44a.yaml b/nuclei-templates/cve-less/plugins/recently-viewed-and-most-viewed-products-3efeefb310fc267db6d3c82c2278b44a.yaml new file mode 100644 index 0000000000..da4ac3e701 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recently-viewed-and-most-viewed-products-3efeefb310fc267db6d3c82c2278b44a.yaml @@ -0,0 +1,58 @@ +id: recently-viewed-and-most-viewed-products-3efeefb310fc267db6d3c82c2278b44a + +info: + name: > + Recently viewed and most viewed products <= 1.1.1 - Authenticated (Shop Manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61ec0e78-b367-438f-929d-94e055c83477?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recently-viewed-and-most-viewed-products/" + google-query: inurl:"/wp-content/plugins/recently-viewed-and-most-viewed-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recently-viewed-and-most-viewed-products,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recently-viewed-and-most-viewed-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recently-viewed-and-most-viewed-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recently-viewed-products-270d399794c014b613fbaaf0f85e4480.yaml b/nuclei-templates/cve-less/plugins/recently-viewed-products-270d399794c014b613fbaaf0f85e4480.yaml new file mode 100644 index 0000000000..c3d892ed1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recently-viewed-products-270d399794c014b613fbaaf0f85e4480.yaml @@ -0,0 +1,58 @@ +id: recently-viewed-products-270d399794c014b613fbaaf0f85e4480 + +info: + name: > + Recently Viewed Products <= 1.0.0 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46f31a60-0a0e-449d-a10a-3cafd0492a9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recently-viewed-products/" + google-query: inurl:"/wp-content/plugins/recently-viewed-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recently-viewed-products,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recently-viewed-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recently-viewed-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recipe-card-blocks-by-wpzoom-6fb42790ec406c67546f572fbaa70d56.yaml b/nuclei-templates/cve-less/plugins/recipe-card-blocks-by-wpzoom-6fb42790ec406c67546f572fbaa70d56.yaml new file mode 100644 index 0000000000..21cec0a9dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recipe-card-blocks-by-wpzoom-6fb42790ec406c67546f572fbaa70d56.yaml @@ -0,0 +1,58 @@ +id: recipe-card-blocks-by-wpzoom-6fb42790ec406c67546f572fbaa70d56 + +info: + name: > + Recipe Card Blocks by WPZOOM <= 2.8.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f6ece0e-7c7c-4c9b-b860-3b279e98c087?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recipe-card-blocks-by-wpzoom/" + google-query: inurl:"/wp-content/plugins/recipe-card-blocks-by-wpzoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recipe-card-blocks-by-wpzoom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recipe-card-blocks-by-wpzoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recipe-card-blocks-by-wpzoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recipe-card-blocks-by-wpzoom-9e09c516a2b7ded06b65b8f77bf8db84.yaml b/nuclei-templates/cve-less/plugins/recipe-card-blocks-by-wpzoom-9e09c516a2b7ded06b65b8f77bf8db84.yaml new file mode 100644 index 0000000000..81c97ee436 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recipe-card-blocks-by-wpzoom-9e09c516a2b7ded06b65b8f77bf8db84.yaml @@ -0,0 +1,58 @@ +id: recipe-card-blocks-by-wpzoom-9e09c516a2b7ded06b65b8f77bf8db84 + +info: + name: > + Recipe Card Blocks by WPZOOM <= 2.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff9c424c-f37f-4c30-aa95-da597008cbb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recipe-card-blocks-by-wpzoom/" + google-query: inurl:"/wp-content/plugins/recipe-card-blocks-by-wpzoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recipe-card-blocks-by-wpzoom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recipe-card-blocks-by-wpzoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recipe-card-blocks-by-wpzoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recipes-writer-f1d9f474bbf4576d12894725bd74f389.yaml b/nuclei-templates/cve-less/plugins/recipes-writer-f1d9f474bbf4576d12894725bd74f389.yaml new file mode 100644 index 0000000000..907776146d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recipes-writer-f1d9f474bbf4576d12894725bd74f389.yaml @@ -0,0 +1,58 @@ +id: recipes-writer-f1d9f474bbf4576d12894725bd74f389 + +info: + name: > + Recipes Writer <= 1.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5fa2f02-4a81-4d49-b473-7447cd371244?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recipes-writer/" + google-query: inurl:"/wp-content/plugins/recipes-writer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recipes-writer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recipes-writer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recipes-writer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reciply-2c837883e1f56cbaae8104fe350db484.yaml b/nuclei-templates/cve-less/plugins/reciply-2c837883e1f56cbaae8104fe350db484.yaml new file mode 100644 index 0000000000..75b9ee2e93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reciply-2c837883e1f56cbaae8104fe350db484.yaml @@ -0,0 +1,58 @@ +id: reciply-2c837883e1f56cbaae8104fe350db484 + +info: + name: > + Recip.ly <= 1.1.7 - Unauthenticated Arbitrary File Upload in uploadImage.php + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/068da172-629d-422a-bcd5-1b73af2a5933?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reciply/" + google-query: inurl:"/wp-content/plugins/reciply/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reciply,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reciply/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reciply" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recommend-a-friend-acf04354988365754f4760bff4f381fb.yaml b/nuclei-templates/cve-less/plugins/recommend-a-friend-acf04354988365754f4760bff4f381fb.yaml new file mode 100644 index 0000000000..d111170b43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recommend-a-friend-acf04354988365754f4760bff4f381fb.yaml @@ -0,0 +1,58 @@ +id: recommend-a-friend-acf04354988365754f4760bff4f381fb + +info: + name: > + Recommend to a friend <= 2.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8c66ddd-8a01-40e0-8893-668551b527d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recommend-a-friend/" + google-query: inurl:"/wp-content/plugins/recommend-a-friend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recommend-a-friend,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recommend-a-friend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recommend-a-friend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recommended-products-edd-2d450de1fce5683a098921397bf9fd03.yaml b/nuclei-templates/cve-less/plugins/recommended-products-edd-2d450de1fce5683a098921397bf9fd03.yaml new file mode 100644 index 0000000000..ef67f0df7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recommended-products-edd-2d450de1fce5683a098921397bf9fd03.yaml @@ -0,0 +1,58 @@ +id: recommended-products-edd-2d450de1fce5683a098921397bf9fd03 + +info: + name: > + Easy Digital Downloads – Recommended Products <= 1.2.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05131b5d-3837-4679-920b-8fadf74a69c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recommended-products-edd/" + google-query: inurl:"/wp-content/plugins/recommended-products-edd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recommended-products-edd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recommended-products-edd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recommended-products-edd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/recurwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/recurwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1718931911 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/recurwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: recurwp-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/recurwp/" + google-query: inurl:"/wp-content/plugins/recurwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,recurwp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/recurwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "recurwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-0efa8cbd8c22916066d2b5e7e99436b6.yaml b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-0efa8cbd8c22916066d2b5e7e99436b6.yaml new file mode 100644 index 0000000000..09569df224 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-0efa8cbd8c22916066d2b5e7e99436b6.yaml @@ -0,0 +1,58 @@ +id: redi-restaurant-reservation-0efa8cbd8c22916066d2b5e7e99436b6 + +info: + name: > + ReDi Restaurant Reservation <= 24.0128 - Cross-Site Request Forgery via redi_restaurant_admin_options_page() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4945931f-764d-45cf-9157-5dddfb264086?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redi-restaurant-reservation/" + google-query: inurl:"/wp-content/plugins/redi-restaurant-reservation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redi-restaurant-reservation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redi-restaurant-reservation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redi-restaurant-reservation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 24.0128') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-1c7545a8e1d8674632497b398a1210a7.yaml b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-1c7545a8e1d8674632497b398a1210a7.yaml new file mode 100644 index 0000000000..16ee22577e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-1c7545a8e1d8674632497b398a1210a7.yaml @@ -0,0 +1,58 @@ +id: redi-restaurant-reservation-1c7545a8e1d8674632497b398a1210a7 + +info: + name: > + ReDi Restaurant Reservation <= 24.0128 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5811e36d-9457-4460-af92-046ddef41114?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redi-restaurant-reservation/" + google-query: inurl:"/wp-content/plugins/redi-restaurant-reservation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redi-restaurant-reservation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redi-restaurant-reservation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redi-restaurant-reservation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 24.0128') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-1c7d356f69acd16bb266c8cb14441fbb.yaml b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-1c7d356f69acd16bb266c8cb14441fbb.yaml new file mode 100644 index 0000000000..aff9e947ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-1c7d356f69acd16bb266c8cb14441fbb.yaml @@ -0,0 +1,58 @@ +id: redi-restaurant-reservation-1c7d356f69acd16bb266c8cb14441fbb + +info: + name: > + ReDi Restaurant Reservation <= 21.0307 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0384c0-9b34-4af8-af86-75ef1e8d933b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redi-restaurant-reservation/" + google-query: inurl:"/wp-content/plugins/redi-restaurant-reservation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redi-restaurant-reservation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redi-restaurant-reservation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redi-restaurant-reservation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.0307') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-3b4de27e05fc461ccdbc713207442ee6.yaml b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-3b4de27e05fc461ccdbc713207442ee6.yaml new file mode 100644 index 0000000000..ecdf9497e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-3b4de27e05fc461ccdbc713207442ee6.yaml @@ -0,0 +1,58 @@ +id: redi-restaurant-reservation-3b4de27e05fc461ccdbc713207442ee6 + +info: + name: > + ReDi Restaurant Reservation <= 24.0128 - Cross-Site Request Forgery via redi_restaurant_admin_options_page() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f2c3819-2247-4ef7-b177-cc98cbf5eae3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redi-restaurant-reservation/" + google-query: inurl:"/wp-content/plugins/redi-restaurant-reservation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redi-restaurant-reservation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redi-restaurant-reservation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redi-restaurant-reservation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 24.0128') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-804968d490234b5a152e19bbec2ea599.yaml b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-804968d490234b5a152e19bbec2ea599.yaml new file mode 100644 index 0000000000..cd4550d4f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redi-restaurant-reservation-804968d490234b5a152e19bbec2ea599.yaml @@ -0,0 +1,58 @@ +id: redi-restaurant-reservation-804968d490234b5a152e19bbec2ea599 + +info: + name: > + ReDi Restaurant Reservation <= 23.0211 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ebf975-0fa7-43cd-a4fe-99284ad3aaf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redi-restaurant-reservation/" + google-query: inurl:"/wp-content/plugins/redi-restaurant-reservation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redi-restaurant-reservation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redi-restaurant-reservation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redi-restaurant-reservation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 23.0211') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-404-error-page-to-homepage-or-custom-page-20764e34dd96746ac27cacdf816c512f.yaml b/nuclei-templates/cve-less/plugins/redirect-404-error-page-to-homepage-or-custom-page-20764e34dd96746ac27cacdf816c512f.yaml new file mode 100644 index 0000000000..0e48529c63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-404-error-page-to-homepage-or-custom-page-20764e34dd96746ac27cacdf816c512f.yaml @@ -0,0 +1,58 @@ +id: redirect-404-error-page-to-homepage-or-custom-page-20764e34dd96746ac27cacdf816c512f + +info: + name: > + Redirect 404 Error Page to Homepage or Custom Page with Logs <= 1.8.7 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59ec4bbd-5192-45f8-8cfc-d43858b46901?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-404-error-page-to-homepage-or-custom-page/" + google-query: inurl:"/wp-content/plugins/redirect-404-error-page-to-homepage-or-custom-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-404-error-page-to-homepage-or-custom-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-404-error-page-to-homepage-or-custom-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-404-error-page-to-homepage-or-custom-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-404-error-page-to-homepage-or-custom-page-9e45d93bc20aa1ba4a07ca72cfe37e3f.yaml b/nuclei-templates/cve-less/plugins/redirect-404-error-page-to-homepage-or-custom-page-9e45d93bc20aa1ba4a07ca72cfe37e3f.yaml new file mode 100644 index 0000000000..3a4236ae93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-404-error-page-to-homepage-or-custom-page-9e45d93bc20aa1ba4a07ca72cfe37e3f.yaml @@ -0,0 +1,58 @@ +id: redirect-404-error-page-to-homepage-or-custom-page-9e45d93bc20aa1ba4a07ca72cfe37e3f + +info: + name: > + Redirect 404 Error Page to Homepage or Custom Page with Logs <= 1.7.8 - Log Deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4ac5738-0ebe-480a-b2b7-f0568d668fa6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-404-error-page-to-homepage-or-custom-page/" + google-query: inurl:"/wp-content/plugins/redirect-404-error-page-to-homepage-or-custom-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-404-error-page-to-homepage-or-custom-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-404-error-page-to-homepage-or-custom-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-404-error-page-to-homepage-or-custom-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-404-to-parent-bc6654f724ab34dab168398ec4971081.yaml b/nuclei-templates/cve-less/plugins/redirect-404-to-parent-bc6654f724ab34dab168398ec4971081.yaml new file mode 100644 index 0000000000..824e10bc84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-404-to-parent-bc6654f724ab34dab168398ec4971081.yaml @@ -0,0 +1,58 @@ +id: redirect-404-to-parent-bc6654f724ab34dab168398ec4971081 + +info: + name: > + Redirect 404 to parent < 1.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5a6724-e860-410e-8a3d-c26d9bc7e842?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-404-to-parent/" + google-query: inurl:"/wp-content/plugins/redirect-404-to-parent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-404-to-parent,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-404-to-parent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-404-to-parent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-after-login-47522a4a3dc3a65ace6791fdc8ad2676.yaml b/nuclei-templates/cve-less/plugins/redirect-after-login-47522a4a3dc3a65ace6791fdc8ad2676.yaml new file mode 100644 index 0000000000..67208dbfee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-after-login-47522a4a3dc3a65ace6791fdc8ad2676.yaml @@ -0,0 +1,58 @@ +id: redirect-after-login-47522a4a3dc3a65ace6791fdc8ad2676 + +info: + name: > + Redirect After Login <= 0.1.9 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad1a79f3-274f-4a33-a752-669c09c2d47d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-after-login/" + google-query: inurl:"/wp-content/plugins/redirect-after-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-after-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-after-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-after-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-by-cookie-4b2ca7d4c265994cb8dc0a8ab8e5c412.yaml b/nuclei-templates/cve-less/plugins/redirect-by-cookie-4b2ca7d4c265994cb8dc0a8ab8e5c412.yaml new file mode 100644 index 0000000000..681f29b183 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-by-cookie-4b2ca7d4c265994cb8dc0a8ab8e5c412.yaml @@ -0,0 +1,58 @@ +id: redirect-by-cookie-4b2ca7d4c265994cb8dc0a8ab8e5c412 + +info: + name: > + Redirect By Cookie <= 1.06 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1f86c9d-38dc-4d5d-af37-9443348fe1e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-by-cookie/" + google-query: inurl:"/wp-content/plugins/redirect-by-cookie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-by-cookie,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-by-cookie/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-by-cookie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-00ed26bc99082a5e2bf7869b142812b5.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-00ed26bc99082a5e2bf7869b142812b5.yaml new file mode 100644 index 0000000000..fcb60d5437 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-00ed26bc99082a5e2bf7869b142812b5.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-00ed26bc99082a5e2bf7869b142812b5 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'addRedirectRule' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b57dd8e3-e3e1-4d6b-b9dd-b5a24c4886b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-08ab49e654c5fb6f0db2079823b53c43.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-08ab49e654c5fb6f0db2079823b53c43.yaml new file mode 100644 index 0000000000..f1d1f6609b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-08ab49e654c5fb6f0db2079823b53c43.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-08ab49e654c5fb6f0db2079823b53c43 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'redirectionPageContent' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bde3052-ae8e-4434-962a-88d3c8328a9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-1217e0d32488feda5672b5f2f6f6be10.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-1217e0d32488feda5672b5f2f6f6be10.yaml new file mode 100644 index 0000000000..8630c5b3af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-1217e0d32488feda5672b5f2f6f6be10.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-1217e0d32488feda5672b5f2f6f6be10 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'SaveSettings' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c953a46-d2ae-41f7-a940-d23b011d9eca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..78c407385f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-28a102683d2de6c72760dd7d0e2159c9.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-28a102683d2de6c72760dd7d0e2159c9.yaml new file mode 100644 index 0000000000..b04ed59f7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-28a102683d2de6c72760dd7d0e2159c9.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-28a102683d2de6c72760dd7d0e2159c9 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'logFilter' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0d6f467-6e62-45ff-bf9d-4db5b1ed1dd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-3d292d211ef84b695362922dc8bdf57d.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-3d292d211ef84b695362922dc8bdf57d.yaml new file mode 100644 index 0000000000..643d5cf545 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-3d292d211ef84b695362922dc8bdf57d.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-3d292d211ef84b695362922dc8bdf57d + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'instantEditRedirect' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71caa071-d279-4807-88ad-a71673b9d17d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-5f79866291aaa54e9869bd9b8bbe5231.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-5f79866291aaa54e9869bd9b8bbe5231.yaml new file mode 100644 index 0000000000..98c59f41a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-5f79866291aaa54e9869bd9b8bbe5231.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-5f79866291aaa54e9869bd9b8bbe5231 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'LoadTab' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8250434a-2fad-4f44-9813-90e734d32d2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-60528de5f76e38fabee103931a1b735a.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-60528de5f76e38fabee103931a1b735a.yaml new file mode 100644 index 0000000000..5464b79a3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-60528de5f76e38fabee103931a1b735a.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-60528de5f76e38fabee103931a1b735a + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'logPageContent' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dceca4ee-6587-4eaa-974e-a21e7a10b6e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-6321b133726d239355f81b9be99d916b.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-6321b133726d239355f81b9be99d916b.yaml new file mode 100644 index 0000000000..8377e2cce7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-6321b133726d239355f81b9be99d916b.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-6321b133726d239355f81b9be99d916b + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'deleteRedirect' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c22717f-494e-4f62-9691-ee5a3366a487?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..ef9dfbdac9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-830a9c71ac432305903c3e193057a4cc.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-830a9c71ac432305903c3e193057a4cc.yaml new file mode 100644 index 0000000000..e8ef3b930a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-830a9c71ac432305903c3e193057a4cc.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-830a9c71ac432305903c3e193057a4cc + +info: + name: > + Redirect Redirection <= 1.1.4 - Cross-Site Request Forgery to Plugin De-Installation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d500729-3b1a-4ece-81de-4c1f9afbf798?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-8392879a309371134897c994ca4719c8.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-8392879a309371134897c994ca4719c8.yaml new file mode 100644 index 0000000000..75b89ed320 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-8392879a309371134897c994ca4719c8.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-8392879a309371134897c994ca4719c8 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'selectAll' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de69d597-b663-4c58-82e0-c90391fb8416?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-8f253566c415a0f14e8b52adda279855.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-8f253566c415a0f14e8b52adda279855.yaml new file mode 100644 index 0000000000..3a02231383 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-8f253566c415a0f14e8b52adda279855.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-8f253566c415a0f14e8b52adda279855 + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'deleteRedirect' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d433a5b3-4661-4246-ae60-8a99633372ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-97d82c7c3e0d924cc99e2436cf7939dd.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-97d82c7c3e0d924cc99e2436cf7939dd.yaml new file mode 100644 index 0000000000..8149f415cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-97d82c7c3e0d924cc99e2436cf7939dd.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-97d82c7c3e0d924cc99e2436cf7939dd + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'loadSettings' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ec7d77-fe50-4bb2-a57b-6ee4246805f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-a25c46576285e4b046d7eb2e59073172.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-a25c46576285e4b046d7eb2e59073172.yaml new file mode 100644 index 0000000000..05cba733ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-a25c46576285e4b046d7eb2e59073172.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-a25c46576285e4b046d7eb2e59073172 + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'saveRedirectSettings' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b421330-dd3c-4af0-9f42-95430117eb9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-a8b98bbbec0875de2bde4d3647cd15e1.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-a8b98bbbec0875de2bde4d3647cd15e1.yaml new file mode 100644 index 0000000000..670c18c391 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-a8b98bbbec0875de2bde4d3647cd15e1.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-a8b98bbbec0875de2bde4d3647cd15e1 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'bulkDelete' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e29dac44-5c85-4f73-ae96-4bc0deca64f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-aa77b46ba67be3115863377f556c5a4e.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-aa77b46ba67be3115863377f556c5a4e.yaml new file mode 100644 index 0000000000..944069ba08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-aa77b46ba67be3115863377f556c5a4e.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-aa77b46ba67be3115863377f556c5a4e + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'loadRedirectSettings' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7beb9b3-3e4e-4aa2-b174-ecd9307cb3d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-b50c18f00398146fa63407abab98b643.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-b50c18f00398146fa63407abab98b643.yaml new file mode 100644 index 0000000000..44c8ef8b73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-b50c18f00398146fa63407abab98b643.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-b50c18f00398146fa63407abab98b643 + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'addRedirectRule' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84d43356-274e-42d5-ac40-10a34effce8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-b61ef24ab5fc8a9d1e6c1708a630e28a.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-b61ef24ab5fc8a9d1e6c1708a630e28a.yaml new file mode 100644 index 0000000000..6623a113cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-b61ef24ab5fc8a9d1e6c1708a630e28a.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-b61ef24ab5fc8a9d1e6c1708a630e28a + +info: + name: > + Redirection <= 1.1.4 - Cross-Site Request Forgery to Plugin Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18a41bef-feed-4096-a1f4-9c99caac6ce9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..5850ebeccb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-cccbe637c2ca5b40eb7fbe65c1b79317.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-cccbe637c2ca5b40eb7fbe65c1b79317.yaml new file mode 100644 index 0000000000..94e4946e67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-cccbe637c2ca5b40eb7fbe65c1b79317.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-cccbe637c2ca5b40eb7fbe65c1b79317 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'statusBulkEdit' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef5f99ca-8a0d-4ec4-8b59-c0c4637dfbc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-cd01191c441182857b674a67ee885426.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-cd01191c441182857b674a67ee885426.yaml new file mode 100644 index 0000000000..ba2b9e333e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-cd01191c441182857b674a67ee885426.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-cd01191c441182857b674a67ee885426 + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'addRedirect' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a70e291-1bc9-44ad-91a2-cf0624bb8d88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-d5ca64507af2d41a9a4ef9ba365317c0.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-d5ca64507af2d41a9a4ef9ba365317c0.yaml new file mode 100644 index 0000000000..3d2b84750b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-d5ca64507af2d41a9a4ef9ba365317c0.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-d5ca64507af2d41a9a4ef9ba365317c0 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'addRedirect' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/140a6fd3-e446-44ea-94eb-9c8d12f7b7ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-d6be25b195f3dbb670fc00d8e81691ca.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-d6be25b195f3dbb670fc00d8e81691ca.yaml new file mode 100644 index 0000000000..10cb7e9ec8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-d6be25b195f3dbb670fc00d8e81691ca.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-d6be25b195f3dbb670fc00d8e81691ca + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'SaveSettings' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29333999-ffe3-4cd0-a537-be98168cb2ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-d9b1627f6db7a7b3f667f9603a20aaf3.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-d9b1627f6db7a7b3f667f9603a20aaf3.yaml new file mode 100644 index 0000000000..db9e119925 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-d9b1627f6db7a7b3f667f9603a20aaf3.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-d9b1627f6db7a7b3f667f9603a20aaf3 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'saveRedirectSettings' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f347a629-523e-4ec4-ad56-6ae9357dd7f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-e6c58ad2d5bc21fe6d61a4ea411b1552.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-e6c58ad2d5bc21fe6d61a4ea411b1552.yaml new file mode 100644 index 0000000000..aaafd62247 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-e6c58ad2d5bc21fe6d61a4ea411b1552.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-e6c58ad2d5bc21fe6d61a4ea411b1552 + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'instantEditRedirect' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdd57b3b-bd0a-4b07-831e-72f2329b2577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-ea95cfe33e5fa5b39484db3e52e2b47c.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-ea95cfe33e5fa5b39484db3e52e2b47c.yaml new file mode 100644 index 0000000000..65264361ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-ea95cfe33e5fa5b39484db3e52e2b47c.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-ea95cfe33e5fa5b39484db3e52e2b47c + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'bulkDelete' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53667fd6-0d12-400d-b3a1-7cee305a2bc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-f87ba6cab449c45a93f64218906b54cf.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-f87ba6cab449c45a93f64218906b54cf.yaml new file mode 100644 index 0000000000..7d99adf4b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-f87ba6cab449c45a93f64218906b54cf.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-f87ba6cab449c45a93f64218906b54cf + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'statusBulkEdit' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d1d012a-46cd-4c86-ac6f-993736a91acb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-fc35edd680a0ec79497d3d82a4143e86.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-fc35edd680a0ec79497d3d82a4143e86.yaml new file mode 100644 index 0000000000..59c04f1d08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-fc35edd680a0ec79497d3d82a4143e86.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-fc35edd680a0ec79497d3d82a4143e86 + +info: + name: > + Redirect Redirection <= 1.1.3 - Missing Authorization in 'liveSearch' function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7ec331c-51ea-466a-ab7b-4234df47114a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirect-redirection-fdcd8dc7df27cc5b5172ef52e914706c.yaml b/nuclei-templates/cve-less/plugins/redirect-redirection-fdcd8dc7df27cc5b5172ef52e914706c.yaml new file mode 100644 index 0000000000..9a4b2fb8b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirect-redirection-fdcd8dc7df27cc5b5172ef52e914706c.yaml @@ -0,0 +1,58 @@ +id: redirect-redirection-fdcd8dc7df27cc5b5172ef52e914706c + +info: + name: > + Redirect Redirection <= 1.1.3 - Cross-Site Request Forgery via 'cronLogDeleteOption' function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4dacd15-85cc-41f5-830c-b02c85c798f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirect-redirection/" + google-query: inurl:"/wp-content/plugins/redirect-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirect-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirect-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirect-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirection-660c79b80e87c9453730e77d4013c8f0.yaml b/nuclei-templates/cve-less/plugins/redirection-660c79b80e87c9453730e77d4013c8f0.yaml new file mode 100644 index 0000000000..99162b482e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirection-660c79b80e87c9453730e77d4013c8f0.yaml @@ -0,0 +1,58 @@ +id: redirection-660c79b80e87c9453730e77d4013c8f0 + +info: + name: > + Redirection <= 2.7.3 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e81cbe3-1310-4f6f-ae42-8d09b321657a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirection/" + google-query: inurl:"/wp-content/plugins/redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirection,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirection-85fb58f3784e72234e673d2c8f294c3c.yaml b/nuclei-templates/cve-less/plugins/redirection-85fb58f3784e72234e673d2c8f294c3c.yaml new file mode 100644 index 0000000000..f5b9834449 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirection-85fb58f3784e72234e673d2c8f294c3c.yaml @@ -0,0 +1,58 @@ +id: redirection-85fb58f3784e72234e673d2c8f294c3c + +info: + name: > + Redirection <= 2.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5e6d73c-0fa7-4ae2-be3b-5ab8f1721aa6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirection/" + google-query: inurl:"/wp-content/plugins/redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirection-a476ca04014656ec0e898375af56f461.yaml b/nuclei-templates/cve-less/plugins/redirection-a476ca04014656ec0e898375af56f461.yaml new file mode 100644 index 0000000000..d396831ecc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirection-a476ca04014656ec0e898375af56f461.yaml @@ -0,0 +1,58 @@ +id: redirection-a476ca04014656ec0e898375af56f461 + +info: + name: > + Redirection < 2.2.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fd13b18-63e6-4af2-a224-d87ad3a70dba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirection/" + google-query: inurl:"/wp-content/plugins/redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirection-c050cce5edc786cc76c2f3dcee80f148.yaml b/nuclei-templates/cve-less/plugins/redirection-c050cce5edc786cc76c2f3dcee80f148.yaml new file mode 100644 index 0000000000..581521a286 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirection-c050cce5edc786cc76c2f3dcee80f148.yaml @@ -0,0 +1,58 @@ +id: redirection-c050cce5edc786cc76c2f3dcee80f148 + +info: + name: > + Redirection <= 2.2.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d39e9b-9753-4c87-8576-982f6744912f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirection/" + google-query: inurl:"/wp-content/plugins/redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirection-cb361e2e4a8f09fdba16ef55d82e4742.yaml b/nuclei-templates/cve-less/plugins/redirection-cb361e2e4a8f09fdba16ef55d82e4742.yaml new file mode 100644 index 0000000000..2145e0fd8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirection-cb361e2e4a8f09fdba16ef55d82e4742.yaml @@ -0,0 +1,58 @@ +id: redirection-cb361e2e4a8f09fdba16ef55d82e4742 + +info: + name: > + Redirection <= 3.6.3 - Cross-Site Request Forgery to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2862cee-0412-42ba-9a8e-e5722bece775?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirection/" + google-query: inurl:"/wp-content/plugins/redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirection-page-8319ea5020d449067d1800ef0c846413.yaml b/nuclei-templates/cve-less/plugins/redirection-page-8319ea5020d449067d1800ef0c846413.yaml new file mode 100644 index 0000000000..de505ea869 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirection-page-8319ea5020d449067d1800ef0c846413.yaml @@ -0,0 +1,58 @@ +id: redirection-page-8319ea5020d449067d1800ef0c846413 + +info: + name: > + Redirection Page <= 1.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65869722-1147-4fdd-a844-944c51a07f2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirection-page/" + google-query: inurl:"/wp-content/plugins/redirection-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirection-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirection-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirection-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirects-05abcb4b1243c795ddc0ecd996fc16e3.yaml b/nuclei-templates/cve-less/plugins/redirects-05abcb4b1243c795ddc0ecd996fc16e3.yaml new file mode 100644 index 0000000000..9cbc431ded --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirects-05abcb4b1243c795ddc0ecd996fc16e3.yaml @@ -0,0 +1,58 @@ +id: redirects-05abcb4b1243c795ddc0ecd996fc16e3 + +info: + name: > + Redirects <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/903161b0-b64c-4986-8c94-b90221bc911b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirects/" + google-query: inurl:"/wp-content/plugins/redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redirects-b6235d62fa0b8b99245758e77840a37a.yaml b/nuclei-templates/cve-less/plugins/redirects-b6235d62fa0b8b99245758e77840a37a.yaml new file mode 100644 index 0000000000..b450055a59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redirects-b6235d62fa0b8b99245758e77840a37a.yaml @@ -0,0 +1,58 @@ +id: redirects-b6235d62fa0b8b99245758e77840a37a + +info: + name: > + Redirects <= 1.2.1 - Missing Authorization via save + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c6be7f2-5526-4fba-9fe0-003b8460c926?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redirects/" + google-query: inurl:"/wp-content/plugins/redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redirects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redux-framework-97e559b0ee0d8f7ed9a23afb1d3a5dfd.yaml b/nuclei-templates/cve-less/plugins/redux-framework-97e559b0ee0d8f7ed9a23afb1d3a5dfd.yaml new file mode 100644 index 0000000000..52a23861a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redux-framework-97e559b0ee0d8f7ed9a23afb1d3a5dfd.yaml @@ -0,0 +1,58 @@ +id: redux-framework-97e559b0ee0d8f7ed9a23afb1d3a5dfd + +info: + name: > + Gutenberg Template Library & Redux Framework <= 4.2.11 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b5c2a74-c1e8-4381-8d0d-66a2ed3b937e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redux-framework/" + google-query: inurl:"/wp-content/plugins/redux-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redux-framework,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redux-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redux-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redux-framework-a1baf40622208b1f64155c8e91066f50.yaml b/nuclei-templates/cve-less/plugins/redux-framework-a1baf40622208b1f64155c8e91066f50.yaml new file mode 100644 index 0000000000..aa7cfb467e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redux-framework-a1baf40622208b1f64155c8e91066f50.yaml @@ -0,0 +1,58 @@ +id: redux-framework-a1baf40622208b1f64155c8e91066f50 + +info: + name: > + Gutenberg Template Library & Redux Framework <= 4.1.23 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adebcf1c-bb22-4a25-b79b-b76eb3b3023f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redux-framework/" + google-query: inurl:"/wp-content/plugins/redux-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redux-framework,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redux-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redux-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redux-framework-d3c0e78a7ab3eab8df864917b272700d.yaml b/nuclei-templates/cve-less/plugins/redux-framework-d3c0e78a7ab3eab8df864917b272700d.yaml new file mode 100644 index 0000000000..c28b00d656 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redux-framework-d3c0e78a7ab3eab8df864917b272700d.yaml @@ -0,0 +1,58 @@ +id: redux-framework-d3c0e78a7ab3eab8df864917b272700d + +info: + name: > + Gutenberg Template Library & Redux Framework <= 4.2.1 - Incorrect Authorization Leading to Arbitrary Plugin Installation and Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ba556d0-48f9-4953-a5aa-876284e56360?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redux-framework/" + google-query: inurl:"/wp-content/plugins/redux-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redux-framework,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redux-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redux-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/redux-framework-fd34b68ddff550331d533d0325717761.yaml b/nuclei-templates/cve-less/plugins/redux-framework-fd34b68ddff550331d533d0325717761.yaml new file mode 100644 index 0000000000..b41fcccc28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/redux-framework-fd34b68ddff550331d533d0325717761.yaml @@ -0,0 +1,58 @@ +id: redux-framework-fd34b68ddff550331d533d0325717761 + +info: + name: > + Gutenberg Template and Pattern Library & Redux Framework <= 4.1.20 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07422361-3c7c-4e3c-bbfb-097c7fe5f2b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/redux-framework/" + google-query: inurl:"/wp-content/plugins/redux-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,redux-framework,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/redux-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redux-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/refer-a-friend-widget-for-wp-80e870552d1f61c00ccba36553924e99.yaml b/nuclei-templates/cve-less/plugins/refer-a-friend-widget-for-wp-80e870552d1f61c00ccba36553924e99.yaml new file mode 100644 index 0000000000..e23a3d9a74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/refer-a-friend-widget-for-wp-80e870552d1f61c00ccba36553924e99.yaml @@ -0,0 +1,58 @@ +id: refer-a-friend-widget-for-wp-80e870552d1f61c00ccba36553924e99 + +info: + name: > + WordPress InviteBox Plugin <= 1.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e88afde4-6920-4086-940e-34b4a4ee30c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/refer-a-friend-widget-for-wp/" + google-query: inurl:"/wp-content/plugins/refer-a-friend-widget-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,refer-a-friend-widget-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/refer-a-friend-widget-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "refer-a-friend-widget-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/referrer-detector-7360b269548987558385c14071463af9.yaml b/nuclei-templates/cve-less/plugins/referrer-detector-7360b269548987558385c14071463af9.yaml new file mode 100644 index 0000000000..55c7e592a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/referrer-detector-7360b269548987558385c14071463af9.yaml @@ -0,0 +1,58 @@ +id: referrer-detector-7360b269548987558385c14071463af9 + +info: + name: > + Referrer Detector <= 4.2.1.0 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b40e33b-4aa8-4378-b044-a8a636d34f73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/referrer-detector/" + google-query: inurl:"/wp-content/plugins/referrer-detector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,referrer-detector,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/referrer-detector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "referrer-detector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reflex-gallery-0b9a8fd5b9580f066dc53b6f1500e016.yaml b/nuclei-templates/cve-less/plugins/reflex-gallery-0b9a8fd5b9580f066dc53b6f1500e016.yaml new file mode 100644 index 0000000000..cadff6df53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reflex-gallery-0b9a8fd5b9580f066dc53b6f1500e016.yaml @@ -0,0 +1,58 @@ +id: reflex-gallery-0b9a8fd5b9580f066dc53b6f1500e016 + +info: + name: > + ReFlex Gallery » WordPress Photo Gallery < 3.1.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe17abd8-9ee2-4b9c-a30b-68d95e341722?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reflex-gallery/" + google-query: inurl:"/wp-content/plugins/reflex-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reflex-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reflex-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reflex-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reflex-gallery-2a835a9354c731a6c02faf265cb4e924.yaml b/nuclei-templates/cve-less/plugins/reflex-gallery-2a835a9354c731a6c02faf265cb4e924.yaml new file mode 100644 index 0000000000..953025642b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reflex-gallery-2a835a9354c731a6c02faf265cb4e924.yaml @@ -0,0 +1,58 @@ +id: reflex-gallery-2a835a9354c731a6c02faf265cb4e924 + +info: + name: > + ReFlex Gallery » WordPress Photo Gallery < 3.1.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44e54ac5-8091-4154-a14c-5cd67647f722?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reflex-gallery/" + google-query: inurl:"/wp-content/plugins/reflex-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reflex-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reflex-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reflex-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reflex-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/reflex-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..1b3b4ef61d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reflex-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: reflex-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reflex-gallery/" + google-query: inurl:"/wp-content/plugins/reflex-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reflex-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reflex-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reflex-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reflex-gallery-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml b/nuclei-templates/cve-less/plugins/reflex-gallery-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml new file mode 100644 index 0000000000..23d59f8b2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reflex-gallery-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml @@ -0,0 +1,58 @@ +id: reflex-gallery-e4da0c9bf6d9952b4ed3e7efbc293bab + +info: + name: > + ReFlex Gallery < 1.4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa3e27ca-8837-4cd8-a233-ad1eed365f7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reflex-gallery/" + google-query: inurl:"/wp-content/plugins/reflex-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reflex-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reflex-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reflex-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/regenerate-post-permalinks-41b1f3d72a4299f7246fbd213ebf002e.yaml b/nuclei-templates/cve-less/plugins/regenerate-post-permalinks-41b1f3d72a4299f7246fbd213ebf002e.yaml new file mode 100644 index 0000000000..d2b00a98e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/regenerate-post-permalinks-41b1f3d72a4299f7246fbd213ebf002e.yaml @@ -0,0 +1,58 @@ +id: regenerate-post-permalinks-41b1f3d72a4299f7246fbd213ebf002e + +info: + name: > + Regenerate post permalink <= 1.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63fb6727-8225-481c-8252-0224577a9560?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/regenerate-post-permalinks/" + google-query: inurl:"/wp-content/plugins/regenerate-post-permalinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,regenerate-post-permalinks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/regenerate-post-permalinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "regenerate-post-permalinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/register-ip-multisite-98561600a0a03a1e4059046cfde3ef9d.yaml b/nuclei-templates/cve-less/plugins/register-ip-multisite-98561600a0a03a1e4059046cfde3ef9d.yaml new file mode 100644 index 0000000000..5cb67470ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/register-ip-multisite-98561600a0a03a1e4059046cfde3ef9d.yaml @@ -0,0 +1,58 @@ +id: register-ip-multisite-98561600a0a03a1e4059046cfde3ef9d + +info: + name: > + Register IPs <= 1.8.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6299876c-9db4-4f8d-897d-9a013a67238c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/register-ip-multisite/" + google-query: inurl:"/wp-content/plugins/register-ip-multisite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,register-ip-multisite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/register-ip-multisite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "register-ip-multisite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/register-plus-b96c1d6a7bd0352b636fe37d13da471d.yaml b/nuclei-templates/cve-less/plugins/register-plus-b96c1d6a7bd0352b636fe37d13da471d.yaml new file mode 100644 index 0000000000..f5e7d196cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/register-plus-b96c1d6a7bd0352b636fe37d13da471d.yaml @@ -0,0 +1,58 @@ +id: register-plus-b96c1d6a7bd0352b636fe37d13da471d + +info: + name: > + Register Plus <= 3.5.11 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22f58318-90ce-4f98-991c-1270d6768f5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/register-plus/" + google-query: inurl:"/wp-content/plugins/register-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,register-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/register-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "register-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/register-plus-d04743501a9b489b050663d074da392e.yaml b/nuclei-templates/cve-less/plugins/register-plus-d04743501a9b489b050663d074da392e.yaml new file mode 100644 index 0000000000..19d32da308 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/register-plus-d04743501a9b489b050663d074da392e.yaml @@ -0,0 +1,58 @@ +id: register-plus-d04743501a9b489b050663d074da392e + +info: + name: > + Register Plus <= 3.5.11 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11043029-1b77-4e18-bdd8-fca2eadc6901?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/register-plus/" + google-query: inurl:"/wp-content/plugins/register-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,register-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/register-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "register-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/register-plus-redux-f168af3ebc1cfea437c8aae66664ebce.yaml b/nuclei-templates/cve-less/plugins/register-plus-redux-f168af3ebc1cfea437c8aae66664ebce.yaml new file mode 100644 index 0000000000..57bf2dcbd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/register-plus-redux-f168af3ebc1cfea437c8aae66664ebce.yaml @@ -0,0 +1,58 @@ +id: register-plus-redux-f168af3ebc1cfea437c8aae66664ebce + +info: + name: > + Register Plus Redux <= 4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fc5e9b3-a121-40f0-a7e8-32979254f52e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/register-plus-redux/" + google-query: inurl:"/wp-content/plugins/register-plus-redux/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,register-plus-redux,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/register-plus-redux/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "register-plus-redux" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-6258eabd3d155e4cfa6307428f5a26a2.yaml b/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-6258eabd3d155e4cfa6307428f5a26a2.yaml new file mode 100644 index 0000000000..3e445d949b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-6258eabd3d155e4cfa6307428f5a26a2.yaml @@ -0,0 +1,58 @@ +id: registrations-for-the-events-calendar-6258eabd3d155e4cfa6307428f5a26a2 + +info: + name: > + Registrations for The Events Calendar <= 2.7.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a515d9-dc4c-4755-b602-a9eb22f8e814?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/registrations-for-the-events-calendar/" + google-query: inurl:"/wp-content/plugins/registrations-for-the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,registrations-for-the-events-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/registrations-for-the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "registrations-for-the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-ea140c5960098a8a84aefd6da22f5e70.yaml b/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-ea140c5960098a8a84aefd6da22f5e70.yaml new file mode 100644 index 0000000000..23a0d28565 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-ea140c5960098a8a84aefd6da22f5e70.yaml @@ -0,0 +1,58 @@ +id: registrations-for-the-events-calendar-ea140c5960098a8a84aefd6da22f5e70 + +info: + name: > + Registrations for the Events Calendar <= 2.7.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8c18081-1ee3-4072-89f1-b6eb1518916e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/registrations-for-the-events-calendar/" + google-query: inurl:"/wp-content/plugins/registrations-for-the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,registrations-for-the-events-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/registrations-for-the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "registrations-for-the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-f0fbd94801917d7779c8532e6d8fde24.yaml b/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-f0fbd94801917d7779c8532e6d8fde24.yaml new file mode 100644 index 0000000000..a629e498d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/registrations-for-the-events-calendar-f0fbd94801917d7779c8532e6d8fde24.yaml @@ -0,0 +1,58 @@ +id: registrations-for-the-events-calendar-f0fbd94801917d7779c8532e6d8fde24 + +info: + name: > + Registrations for the Events Calendar <= 2.7.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c455509-9cbb-4a77-b28f-921beeeede0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/registrations-for-the-events-calendar/" + google-query: inurl:"/wp-content/plugins/registrations-for-the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,registrations-for-the-events-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/registrations-for-the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "registrations-for-the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/regpack-6c7076324759f17d9672657f46020f5a.yaml b/nuclei-templates/cve-less/plugins/regpack-6c7076324759f17d9672657f46020f5a.yaml new file mode 100644 index 0000000000..e8c59e0159 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/regpack-6c7076324759f17d9672657f46020f5a.yaml @@ -0,0 +1,58 @@ +id: regpack-6c7076324759f17d9672657f46020f5a + +info: + name: > + Regpack <= 0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3cdc0ba-d28f-488c-a703-f9d880f0582e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/regpack/" + google-query: inurl:"/wp-content/plugins/regpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,regpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/regpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "regpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rehub-framework-5f2b7d6e36647de882c9475f5d8d8b2a.yaml b/nuclei-templates/cve-less/plugins/rehub-framework-5f2b7d6e36647de882c9475f5d8d8b2a.yaml new file mode 100644 index 0000000000..1f03839b6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rehub-framework-5f2b7d6e36647de882c9475f5d8d8b2a.yaml @@ -0,0 +1,58 @@ +id: rehub-framework-5f2b7d6e36647de882c9475f5d8d8b2a + +info: + name: > + REHub Framework < 19.6.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/947626b4-c640-4b45-8186-2ed4ff7c2c18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rehub-framework/" + google-query: inurl:"/wp-content/plugins/rehub-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rehub-framework,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rehub-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rehub-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-post-a1b975d388fb5bea73a488037353b7d6.yaml b/nuclei-templates/cve-less/plugins/related-post-a1b975d388fb5bea73a488037353b7d6.yaml new file mode 100644 index 0000000000..45c67917a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-post-a1b975d388fb5bea73a488037353b7d6.yaml @@ -0,0 +1,58 @@ +id: related-post-a1b975d388fb5bea73a488037353b7d6 + +info: + name: > + Related Post <= 2.0.53 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f08ca5e3-8b48-4333-9c42-cc103d40394c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-post/" + google-query: inurl:"/wp-content/plugins/related-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-04095bed8429464e27d2a70bb8ef316a.yaml b/nuclei-templates/cve-less/plugins/related-posts-04095bed8429464e27d2a70bb8ef316a.yaml new file mode 100644 index 0000000000..d48acc052f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-04095bed8429464e27d2a70bb8ef316a.yaml @@ -0,0 +1,58 @@ +id: related-posts-04095bed8429464e27d2a70bb8ef316a + +info: + name: > + Related Posts <= 1.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa34fdd1-5a04-43c6-a005-17be1256b09e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts/" + google-query: inurl:"/wp-content/plugins/related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-8bd8a9f5ca37f9921800c559c58dbf6b.yaml b/nuclei-templates/cve-less/plugins/related-posts-8bd8a9f5ca37f9921800c559c58dbf6b.yaml new file mode 100644 index 0000000000..def08f5af6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-8bd8a9f5ca37f9921800c559c58dbf6b.yaml @@ -0,0 +1,58 @@ +id: related-posts-8bd8a9f5ca37f9921800c559c58dbf6b + +info: + name: > + Related Posts < 2.7.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71463210-d65f-4a6c-ab5f-ebaafebb83e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts/" + google-query: inurl:"/wp-content/plugins/related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-by-zemanta-58ad613c40728469546ff0c459432f85.yaml b/nuclei-templates/cve-less/plugins/related-posts-by-zemanta-58ad613c40728469546ff0c459432f85.yaml new file mode 100644 index 0000000000..a94c64ba54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-by-zemanta-58ad613c40728469546ff0c459432f85.yaml @@ -0,0 +1,58 @@ +id: related-posts-by-zemanta-58ad613c40728469546ff0c459432f85 + +info: + name: > + Related Posts by Zemanta <= 1.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73878d57-dd94-41d7-a26a-47c8e6eac0fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts-by-zemanta/" + google-query: inurl:"/wp-content/plugins/related-posts-by-zemanta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts-by-zemanta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts-by-zemanta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts-by-zemanta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-for-wp-09949db09aaf30fc4de378c2b0344be7.yaml b/nuclei-templates/cve-less/plugins/related-posts-for-wp-09949db09aaf30fc4de378c2b0344be7.yaml new file mode 100644 index 0000000000..d994962dd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-for-wp-09949db09aaf30fc4de378c2b0344be7.yaml @@ -0,0 +1,58 @@ +id: related-posts-for-wp-09949db09aaf30fc4de378c2b0344be7 + +info: + name: > + Related Posts for WordPress < 1.8.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f32d1fe-17ea-48c0-b276-36c8fcaad4a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts-for-wp/" + google-query: inurl:"/wp-content/plugins/related-posts-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-for-wp-34814d2dfa1715ce58f0048a1692ce5e.yaml b/nuclei-templates/cve-less/plugins/related-posts-for-wp-34814d2dfa1715ce58f0048a1692ce5e.yaml new file mode 100644 index 0000000000..047fc1b146 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-for-wp-34814d2dfa1715ce58f0048a1692ce5e.yaml @@ -0,0 +1,58 @@ +id: related-posts-for-wp-34814d2dfa1715ce58f0048a1692ce5e + +info: + name: > + Related Posts for WordPress <= 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a5d9290-b480-45f7-9ac7-a20475b805e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts-for-wp/" + google-query: inurl:"/wp-content/plugins/related-posts-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-for-wp-38bcc8fc23f5e64dd2298c12f27f47b2.yaml b/nuclei-templates/cve-less/plugins/related-posts-for-wp-38bcc8fc23f5e64dd2298c12f27f47b2.yaml new file mode 100644 index 0000000000..d3a4d7eab0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-for-wp-38bcc8fc23f5e64dd2298c12f27f47b2.yaml @@ -0,0 +1,58 @@ +id: related-posts-for-wp-38bcc8fc23f5e64dd2298c12f27f47b2 + +info: + name: > + Related Posts for WordPress <= 2.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/797c2c60-51bd-4992-86fc-23fda363ad76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts-for-wp/" + google-query: inurl:"/wp-content/plugins/related-posts-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-for-wp-3d9e0203f0bc8c54067f868dba02e8ff.yaml b/nuclei-templates/cve-less/plugins/related-posts-for-wp-3d9e0203f0bc8c54067f868dba02e8ff.yaml new file mode 100644 index 0000000000..8cfd8a1f1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-for-wp-3d9e0203f0bc8c54067f868dba02e8ff.yaml @@ -0,0 +1,58 @@ +id: related-posts-for-wp-3d9e0203f0bc8c54067f868dba02e8ff + +info: + name: > + Related Posts for WordPress <= 2.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d21aad7-dbee-4204-afbd-0a5fdeaca50e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts-for-wp/" + google-query: inurl:"/wp-content/plugins/related-posts-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-for-wp-83b73a058cb79d602447680b268132d1.yaml b/nuclei-templates/cve-less/plugins/related-posts-for-wp-83b73a058cb79d602447680b268132d1.yaml new file mode 100644 index 0000000000..77291960fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-for-wp-83b73a058cb79d602447680b268132d1.yaml @@ -0,0 +1,58 @@ +id: related-posts-for-wp-83b73a058cb79d602447680b268132d1 + +info: + name: > + Related Posts for WordPress <= 2.0.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f63bf296-b34c-4f89-90eb-bba2a0461d57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts-for-wp/" + google-query: inurl:"/wp-content/plugins/related-posts-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-posts-for-wp-f1c3515bad659cca0bfecb6aedd6af21.yaml b/nuclei-templates/cve-less/plugins/related-posts-for-wp-f1c3515bad659cca0bfecb6aedd6af21.yaml new file mode 100644 index 0000000000..c2625d11f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-posts-for-wp-f1c3515bad659cca0bfecb6aedd6af21.yaml @@ -0,0 +1,58 @@ +id: related-posts-for-wp-f1c3515bad659cca0bfecb6aedd6af21 + +info: + name: > + Related Posts for WordPress <= 2.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42c38563-ed78-4e65-8d1f-b3aa6444923d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-posts-for-wp/" + google-query: inurl:"/wp-content/plugins/related-posts-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-posts-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-posts-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-posts-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-sites-089422f3c866882a628baf83e48ef51c.yaml b/nuclei-templates/cve-less/plugins/related-sites-089422f3c866882a628baf83e48ef51c.yaml new file mode 100644 index 0000000000..f7a6840b5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-sites-089422f3c866882a628baf83e48ef51c.yaml @@ -0,0 +1,58 @@ +id: related-sites-089422f3c866882a628baf83e48ef51c + +info: + name: > + Related Sites <= 2.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9970f9e5-ca20-4424-a501-9c8186ede497?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-sites/" + google-query: inurl:"/wp-content/plugins/related-sites/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-sites,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-sites/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-sites" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/related-youtube-videos-d32864ffc345a5bdea6ab7e2b3b9981b.yaml b/nuclei-templates/cve-less/plugins/related-youtube-videos-d32864ffc345a5bdea6ab7e2b3b9981b.yaml new file mode 100644 index 0000000000..5b559c8dea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/related-youtube-videos-d32864ffc345a5bdea6ab7e2b3b9981b.yaml @@ -0,0 +1,58 @@ +id: related-youtube-videos-d32864ffc345a5bdea6ab7e2b3b9981b + +info: + name: > + Related YouTube Videos <= 1.9.8 - Cross-site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1375ac68-31e4-4473-9757-bd86411c716f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/related-youtube-videos/" + google-query: inurl:"/wp-content/plugins/related-youtube-videos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,related-youtube-videos,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/related-youtube-videos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "related-youtube-videos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-13c50b13a503600e0189283b0a2ceddd.yaml b/nuclei-templates/cve-less/plugins/relevanssi-13c50b13a503600e0189283b0a2ceddd.yaml new file mode 100644 index 0000000000..f5ce5c1231 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-13c50b13a503600e0189283b0a2ceddd.yaml @@ -0,0 +1,58 @@ +id: relevanssi-13c50b13a503600e0189283b0a2ceddd + +info: + name: > + Relevanssi – A Better Search <= 3.5.7.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/624a87c7-d43e-48d5-8489-d4f7b3ea10da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-2c5ab69854e1511d339bef7563a27b08.yaml b/nuclei-templates/cve-less/plugins/relevanssi-2c5ab69854e1511d339bef7563a27b08.yaml new file mode 100644 index 0000000000..0ead40c575 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-2c5ab69854e1511d339bef7563a27b08.yaml @@ -0,0 +1,58 @@ +id: relevanssi-2c5ab69854e1511d339bef7563a27b08 + +info: + name: > + Relevanssi – A Better Search < 4.14.6 & Relevanssi – A Better Search Pro < 2.16.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cd02dbc-6725-4626-844b-df12bad9da37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-2df9887091a9e43477c93a8f95a59867.yaml b/nuclei-templates/cve-less/plugins/relevanssi-2df9887091a9e43477c93a8f95a59867.yaml new file mode 100644 index 0000000000..ecaddca56a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-2df9887091a9e43477c93a8f95a59867.yaml @@ -0,0 +1,58 @@ +id: relevanssi-2df9887091a9e43477c93a8f95a59867 + +info: + name: > + Relevanssi <= 3.6.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69fd1068-4bbd-4e8a-9d35-5e9a072c72e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-459e9e8ff0ce6dbbd756036aacf40336.yaml b/nuclei-templates/cve-less/plugins/relevanssi-459e9e8ff0ce6dbbd756036aacf40336.yaml new file mode 100644 index 0000000000..8cb9377a7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-459e9e8ff0ce6dbbd756036aacf40336.yaml @@ -0,0 +1,58 @@ +id: relevanssi-459e9e8ff0ce6dbbd756036aacf40336 + +info: + name: > + Relevanssi – A Better Search <= 4.22.0 - Missing Authorization to Unauthenticated Query Log Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2a3b17-0551-4e02-8e6a-ae8d46da0ef8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.22.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-54a6c2fc6f1decd20e0ec9cd229454ec.yaml b/nuclei-templates/cve-less/plugins/relevanssi-54a6c2fc6f1decd20e0ec9cd229454ec.yaml new file mode 100644 index 0000000000..a9778c2b24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-54a6c2fc6f1decd20e0ec9cd229454ec.yaml @@ -0,0 +1,58 @@ +id: relevanssi-54a6c2fc6f1decd20e0ec9cd229454ec + +info: + name: > + Relevanssi <= 4.21.2 (Free) and < 2.25.0 (Premium) - Missing Authorization to Unauthorized Post Access + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f6df8cf-6f64-46b9-ab83-3898484c2679?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.21.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-88fcfbe0235fbfcf5894d075044bc4db.yaml b/nuclei-templates/cve-less/plugins/relevanssi-88fcfbe0235fbfcf5894d075044bc4db.yaml new file mode 100644 index 0000000000..c2349b6177 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-88fcfbe0235fbfcf5894d075044bc4db.yaml @@ -0,0 +1,58 @@ +id: relevanssi-88fcfbe0235fbfcf5894d075044bc4db + +info: + name: > + Relevanssi <= 4.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/592867de-17b5-4461-a479-ecfbbef55a0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-9456cea40ce6ea28f05bb2ff20b05594.yaml b/nuclei-templates/cve-less/plugins/relevanssi-9456cea40ce6ea28f05bb2ff20b05594.yaml new file mode 100644 index 0000000000..b68ebe07aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-9456cea40ce6ea28f05bb2ff20b05594.yaml @@ -0,0 +1,58 @@ +id: relevanssi-9456cea40ce6ea28f05bb2ff20b05594 + +info: + name: > + Relevanssi – A Better Search <= 4.22.1 - Unauthenticated Second Order CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9960bae9-6f19-49eb-8f24-fdde4933671e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.22.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-984a23521e50b74e0baafc6841353e19.yaml b/nuclei-templates/cve-less/plugins/relevanssi-984a23521e50b74e0baafc6841353e19.yaml new file mode 100644 index 0000000000..d81d8bf3de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-984a23521e50b74e0baafc6841353e19.yaml @@ -0,0 +1,58 @@ +id: relevanssi-984a23521e50b74e0baafc6841353e19 + +info: + name: > + Relevanssi – A Better Search < 3.3.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a864ff-2c0e-40c3-8c4e-dc034d8838b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-acdf52a1422628d1552415a9b0199eee.yaml b/nuclei-templates/cve-less/plugins/relevanssi-acdf52a1422628d1552415a9b0199eee.yaml new file mode 100644 index 0000000000..3d6448180c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-acdf52a1422628d1552415a9b0199eee.yaml @@ -0,0 +1,58 @@ +id: relevanssi-acdf52a1422628d1552415a9b0199eee + +info: + name: > + Relevanssi <= 3.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b8d057b-1909-46d4-8e0a-d5c7c9f7001c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-b595d6fc7446c3f09ff44c55f79ffecc.yaml b/nuclei-templates/cve-less/plugins/relevanssi-b595d6fc7446c3f09ff44c55f79ffecc.yaml new file mode 100644 index 0000000000..73eac0d753 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-b595d6fc7446c3f09ff44c55f79ffecc.yaml @@ -0,0 +1,58 @@ +id: relevanssi-b595d6fc7446c3f09ff44c55f79ffecc + +info: + name: > + Relevanssi – A Better Search <= 4.22.1 - Missing Authorization to Unauthenticated Count Option Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e625130f-8e21-4baf-9d3c-4cbb806b9e52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.22.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-d45998919544e36fcefce47f272dd36e.yaml b/nuclei-templates/cve-less/plugins/relevanssi-d45998919544e36fcefce47f272dd36e.yaml new file mode 100644 index 0000000000..90a283159b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-d45998919544e36fcefce47f272dd36e.yaml @@ -0,0 +1,58 @@ +id: relevanssi-d45998919544e36fcefce47f272dd36e + +info: + name: > + Relevanssi - A Better Search Free & Premium <= 2.16.3 & 4.14.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e12d132-c036-4665-bb8d-e31e2b155fbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi/" + google-query: inurl:"/wp-content/plugins/relevanssi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-premium-2c5ab69854e1511d339bef7563a27b08.yaml b/nuclei-templates/cve-less/plugins/relevanssi-premium-2c5ab69854e1511d339bef7563a27b08.yaml new file mode 100644 index 0000000000..49c1b5fb10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-premium-2c5ab69854e1511d339bef7563a27b08.yaml @@ -0,0 +1,58 @@ +id: relevanssi-premium-2c5ab69854e1511d339bef7563a27b08 + +info: + name: > + Relevanssi – A Better Search < 4.14.6 & Relevanssi – A Better Search Pro < 2.16.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cd02dbc-6725-4626-844b-df12bad9da37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi-premium/" + google-query: inurl:"/wp-content/plugins/relevanssi-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-premium-3770a5a68072ae899f0f18af895e3c7e.yaml b/nuclei-templates/cve-less/plugins/relevanssi-premium-3770a5a68072ae899f0f18af895e3c7e.yaml new file mode 100644 index 0000000000..7af2e60dfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-premium-3770a5a68072ae899f0f18af895e3c7e.yaml @@ -0,0 +1,58 @@ +id: relevanssi-premium-3770a5a68072ae899f0f18af895e3c7e + +info: + name: > + Relevanssi Premium < 1.14.6.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/342b2e81-fb26-416a-8f3d-4bc221260228?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi-premium/" + google-query: inurl:"/wp-content/plugins/relevanssi-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi-premium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-premium-54a6c2fc6f1decd20e0ec9cd229454ec.yaml b/nuclei-templates/cve-less/plugins/relevanssi-premium-54a6c2fc6f1decd20e0ec9cd229454ec.yaml new file mode 100644 index 0000000000..b3895213fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-premium-54a6c2fc6f1decd20e0ec9cd229454ec.yaml @@ -0,0 +1,58 @@ +id: relevanssi-premium-54a6c2fc6f1decd20e0ec9cd229454ec + +info: + name: > + Relevanssi <= 4.21.2 (Free) and < 2.25.0 (Premium) - Missing Authorization to Unauthorized Post Access + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f6df8cf-6f64-46b9-ab83-3898484c2679?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi-premium/" + google-query: inurl:"/wp-content/plugins/relevanssi-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-premium-9456cea40ce6ea28f05bb2ff20b05594.yaml b/nuclei-templates/cve-less/plugins/relevanssi-premium-9456cea40ce6ea28f05bb2ff20b05594.yaml new file mode 100644 index 0000000000..e994086b29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-premium-9456cea40ce6ea28f05bb2ff20b05594.yaml @@ -0,0 +1,58 @@ +id: relevanssi-premium-9456cea40ce6ea28f05bb2ff20b05594 + +info: + name: > + Relevanssi – A Better Search <= 4.22.1 - Unauthenticated Second Order CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9960bae9-6f19-49eb-8f24-fdde4933671e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi-premium/" + google-query: inurl:"/wp-content/plugins/relevanssi-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi-premium,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-premium-98c7cb2a9ca321e390f21a13c7f9a775.yaml b/nuclei-templates/cve-less/plugins/relevanssi-premium-98c7cb2a9ca321e390f21a13c7f9a775.yaml new file mode 100644 index 0000000000..aa9bed2795 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-premium-98c7cb2a9ca321e390f21a13c7f9a775.yaml @@ -0,0 +1,58 @@ +id: relevanssi-premium-98c7cb2a9ca321e390f21a13c7f9a775 + +info: + name: > + Relevanssi Pro < 2.25 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/550872c8-3663-48fa-ab3f-f90351f3e169?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi-premium/" + google-query: inurl:"/wp-content/plugins/relevanssi-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi-premium,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-premium-b595d6fc7446c3f09ff44c55f79ffecc.yaml b/nuclei-templates/cve-less/plugins/relevanssi-premium-b595d6fc7446c3f09ff44c55f79ffecc.yaml new file mode 100644 index 0000000000..8062c0cd29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-premium-b595d6fc7446c3f09ff44c55f79ffecc.yaml @@ -0,0 +1,58 @@ +id: relevanssi-premium-b595d6fc7446c3f09ff44c55f79ffecc + +info: + name: > + Relevanssi – A Better Search <= 4.22.1 - Missing Authorization to Unauthenticated Count Option Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e625130f-8e21-4baf-9d3c-4cbb806b9e52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi-premium/" + google-query: inurl:"/wp-content/plugins/relevanssi-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevanssi-premium-d45998919544e36fcefce47f272dd36e.yaml b/nuclei-templates/cve-less/plugins/relevanssi-premium-d45998919544e36fcefce47f272dd36e.yaml new file mode 100644 index 0000000000..8e22f0b2d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevanssi-premium-d45998919544e36fcefce47f272dd36e.yaml @@ -0,0 +1,58 @@ +id: relevanssi-premium-d45998919544e36fcefce47f272dd36e + +info: + name: > + Relevanssi - A Better Search Free & Premium <= 2.16.3 & 4.14.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e12d132-c036-4665-bb8d-e31e2b155fbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevanssi-premium/" + google-query: inurl:"/wp-content/plugins/relevanssi-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevanssi-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevanssi-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevanssi-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevant-b86717449a9c418a47f519067cc5b57f.yaml b/nuclei-templates/cve-less/plugins/relevant-b86717449a9c418a47f519067cc5b57f.yaml new file mode 100644 index 0000000000..bff75bdfdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevant-b86717449a9c418a47f519067cc5b57f.yaml @@ -0,0 +1,58 @@ +id: relevant-b86717449a9c418a47f519067cc5b57f + +info: + name: > + Relevant – Related, Featured, Latest, and Popular Posts by BestWebSoft < 1.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea189072-aa96-441b-ad5e-b6433da06d22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevant/" + google-query: inurl:"/wp-content/plugins/relevant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relevant-c81d2be092773595df7e11c3e43455e6.yaml b/nuclei-templates/cve-less/plugins/relevant-c81d2be092773595df7e11c3e43455e6.yaml new file mode 100644 index 0000000000..bc9f5a3ca0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relevant-c81d2be092773595df7e11c3e43455e6.yaml @@ -0,0 +1,58 @@ +id: relevant-c81d2be092773595df7e11c3e43455e6 + +info: + name: > + Relevant – Related, Featured, Latest, and Popular Posts by BestWebSoft <= 1.0.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09ee6179-8071-4628-9d2b-dfbb32ef1804?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relevant/" + google-query: inurl:"/wp-content/plugins/relevant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relevant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relevant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relevant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/relocate-upload-f2e5b32595ebb4e1010770520fb235a0.yaml b/nuclei-templates/cve-less/plugins/relocate-upload-f2e5b32595ebb4e1010770520fb235a0.yaml new file mode 100644 index 0000000000..6395b97ad2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/relocate-upload-f2e5b32595ebb4e1010770520fb235a0.yaml @@ -0,0 +1,58 @@ +id: relocate-upload-f2e5b32595ebb4e1010770520fb235a0 + +info: + name: > + Relocate Upload < 0.20 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb629dfc-1be2-4a56-907f-0b5c64cc066e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/relocate-upload/" + google-query: inurl:"/wp-content/plugins/relocate-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,relocate-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/relocate-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "relocate-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remote-content-shortcode-894688b32a41816c9ef521e84f097274.yaml b/nuclei-templates/cve-less/plugins/remote-content-shortcode-894688b32a41816c9ef521e84f097274.yaml new file mode 100644 index 0000000000..b951ef0c3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remote-content-shortcode-894688b32a41816c9ef521e84f097274.yaml @@ -0,0 +1,58 @@ +id: remote-content-shortcode-894688b32a41816c9ef521e84f097274 + +info: + name: > + Remote Content Shortcode <= 1.5 - Authenticated(Contributor+) Local File Inclusion via shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1568e8d-9ea5-4673-a657-03e89cfb6000?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remote-content-shortcode/" + google-query: inurl:"/wp-content/plugins/remote-content-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remote-content-shortcode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remote-content-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remote-content-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remote-upload-fc6507793e849585ffa987ba2f9e1c71.yaml b/nuclei-templates/cve-less/plugins/remote-upload-fc6507793e849585ffa987ba2f9e1c71.yaml new file mode 100644 index 0000000000..6393b28626 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remote-upload-fc6507793e849585ffa987ba2f9e1c71.yaml @@ -0,0 +1,58 @@ +id: remote-upload-fc6507793e849585ffa987ba2f9e1c71 + +info: + name: > + WP Remote Upload <= 1.2.1 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddfbde0f-8e41-45c9-b808-bee82c2ff172?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remote-upload/" + google-query: inurl:"/wp-content/plugins/remote-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remote-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remote-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remote-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-add-to-cart-woocommerce-7470db0dc31ae4a970e3b604671601cb.yaml b/nuclei-templates/cve-less/plugins/remove-add-to-cart-woocommerce-7470db0dc31ae4a970e3b604671601cb.yaml new file mode 100644 index 0000000000..e4db104520 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-add-to-cart-woocommerce-7470db0dc31ae4a970e3b604671601cb.yaml @@ -0,0 +1,58 @@ +id: remove-add-to-cart-woocommerce-7470db0dc31ae4a970e3b604671601cb + +info: + name: > + Remove Add to Cart WooCommerce <= 1.4.4 - Cross-Site Request Forgery to Settings Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4938c1be-2356-4a9c-9795-108a2d5a6cc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-add-to-cart-woocommerce/" + google-query: inurl:"/wp-content/plugins/remove-add-to-cart-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-add-to-cart-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-add-to-cart-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-add-to-cart-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-add-to-cart-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/remove-add-to-cart-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..beb1df3f9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-add-to-cart-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: remove-add-to-cart-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-add-to-cart-woocommerce/" + google-query: inurl:"/wp-content/plugins/remove-add-to-cart-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-add-to-cart-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-add-to-cart-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-add-to-cart-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-cpt-base-47c8baaa723b461feba125f5d75cdf5b.yaml b/nuclei-templates/cve-less/plugins/remove-cpt-base-47c8baaa723b461feba125f5d75cdf5b.yaml new file mode 100644 index 0000000000..6983b8709a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-cpt-base-47c8baaa723b461feba125f5d75cdf5b.yaml @@ -0,0 +1,58 @@ +id: remove-cpt-base-47c8baaa723b461feba125f5d75cdf5b + +info: + name: > + Remove CPT base <= 5.8 - Cross-Site Request Forgery to CPT base deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a4e8dbe-9889-43b1-8e15-e96791b13093?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-cpt-base/" + google-query: inurl:"/wp-content/plugins/remove-cpt-base/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-cpt-base,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-cpt-base/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-cpt-base" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-duplicate-posts-f208b8c044d71b8d44e9868aaf03997a.yaml b/nuclei-templates/cve-less/plugins/remove-duplicate-posts-f208b8c044d71b8d44e9868aaf03997a.yaml new file mode 100644 index 0000000000..8fa96712a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-duplicate-posts-f208b8c044d71b8d44e9868aaf03997a.yaml @@ -0,0 +1,58 @@ +id: remove-duplicate-posts-f208b8c044d71b8d44e9868aaf03997a + +info: + name: > + Remove Duplicate Posts <= 1.3.5 - Missing Authorization to Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02dcf609-e8ef-4ff5-a61e-6c513af04ca2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-duplicate-posts/" + google-query: inurl:"/wp-content/plugins/remove-duplicate-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-duplicate-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-duplicate-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-duplicate-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-footer-credit-012dc707b39ddca593987305dcc50476.yaml b/nuclei-templates/cve-less/plugins/remove-footer-credit-012dc707b39ddca593987305dcc50476.yaml new file mode 100644 index 0000000000..0873edd25a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-footer-credit-012dc707b39ddca593987305dcc50476.yaml @@ -0,0 +1,58 @@ +id: remove-footer-credit-012dc707b39ddca593987305dcc50476 + +info: + name: > + Remove Footer Credit <= 1.0.13 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d97ba75a-278d-4239-bfcf-53b5396fe321?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-footer-credit/" + google-query: inurl:"/wp-content/plugins/remove-footer-credit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-footer-credit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-footer-credit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-footer-credit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-footer-credit-028fc092b08e0b0008553cd7b4eaeaf7.yaml b/nuclei-templates/cve-less/plugins/remove-footer-credit-028fc092b08e0b0008553cd7b4eaeaf7.yaml new file mode 100644 index 0000000000..8f3c9ace42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-footer-credit-028fc092b08e0b0008553cd7b4eaeaf7.yaml @@ -0,0 +1,58 @@ +id: remove-footer-credit-028fc092b08e0b0008553cd7b4eaeaf7 + +info: + name: > + Remove Footer Credit <= 1.0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/526a1b9c-953b-4ad7-91e1-d2e480b967ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-footer-credit/" + google-query: inurl:"/wp-content/plugins/remove-footer-credit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-footer-credit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-footer-credit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-footer-credit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-footer-credit-3996e754fae7512574e32b3cc63b1ef7.yaml b/nuclei-templates/cve-less/plugins/remove-footer-credit-3996e754fae7512574e32b3cc63b1ef7.yaml new file mode 100644 index 0000000000..1a3781cc1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-footer-credit-3996e754fae7512574e32b3cc63b1ef7.yaml @@ -0,0 +1,58 @@ +id: remove-footer-credit-3996e754fae7512574e32b3cc63b1ef7 + +info: + name: > + Remove Footer Credit <= 1.0.10 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cde35356-daba-47ff-9278-21447337f0c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-footer-credit/" + google-query: inurl:"/wp-content/plugins/remove-footer-credit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-footer-credit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-footer-credit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-footer-credit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-old-slugspermalinks-ad02b35bda70a416277656d231f43211.yaml b/nuclei-templates/cve-less/plugins/remove-old-slugspermalinks-ad02b35bda70a416277656d231f43211.yaml new file mode 100644 index 0000000000..f5ee83bf42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-old-slugspermalinks-ad02b35bda70a416277656d231f43211.yaml @@ -0,0 +1,58 @@ +id: remove-old-slugspermalinks-ad02b35bda70a416277656d231f43211 + +info: + name: > + Slugs Manager <= 2.6.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1237f0b3-540a-4734-8966-4798799fef65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-old-slugspermalinks/" + google-query: inurl:"/wp-content/plugins/remove-old-slugspermalinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-old-slugspermalinks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-old-slugspermalinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-old-slugspermalinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-schema-d7e271a4d692214ae3d3d23271160c51.yaml b/nuclei-templates/cve-less/plugins/remove-schema-d7e271a4d692214ae3d3d23271160c51.yaml new file mode 100644 index 0000000000..d34c4f7432 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-schema-d7e271a4d692214ae3d3d23271160c51.yaml @@ -0,0 +1,58 @@ +id: remove-schema-d7e271a4d692214ae3d3d23271160c51 + +info: + name: > + Remove Schema <= 1.5 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89635463-966d-4f7d-995d-ad83a502d95b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-schema/" + google-query: inurl:"/wp-content/plugins/remove-schema/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-schema,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-schema/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-schema" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-slug-from-custom-post-type-a6300420b047adf0811f5afe66cadf12.yaml b/nuclei-templates/cve-less/plugins/remove-slug-from-custom-post-type-a6300420b047adf0811f5afe66cadf12.yaml new file mode 100644 index 0000000000..4aee86e013 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-slug-from-custom-post-type-a6300420b047adf0811f5afe66cadf12.yaml @@ -0,0 +1,58 @@ +id: remove-slug-from-custom-post-type-a6300420b047adf0811f5afe66cadf12 + +info: + name: > + Remove slug from custom post type <= 1.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77cb14b1-d9e5-4296-ad8c-6642327ef310?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-slug-from-custom-post-type/" + google-query: inurl:"/wp-content/plugins/remove-slug-from-custom-post-type/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-slug-from-custom-post-type,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-slug-from-custom-post-type/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-slug-from-custom-post-type" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/remove-wp-update-nags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/remove-wp-update-nags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..6768102d34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/remove-wp-update-nags-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: remove-wp-update-nags-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/remove-wp-update-nags/" + google-query: inurl:"/wp-content/plugins/remove-wp-update-nags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,remove-wp-update-nags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/remove-wp-update-nags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "remove-wp-update-nags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/removehide-author-date-category-like-entry-meta-3511a1c14fe55ddf7548121635409a76.yaml b/nuclei-templates/cve-less/plugins/removehide-author-date-category-like-entry-meta-3511a1c14fe55ddf7548121635409a76.yaml new file mode 100644 index 0000000000..e63ae72587 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/removehide-author-date-category-like-entry-meta-3511a1c14fe55ddf7548121635409a76.yaml @@ -0,0 +1,58 @@ +id: removehide-author-date-category-like-entry-meta-3511a1c14fe55ddf7548121635409a76 + +info: + name: > + Remove/hide Author, Date, Category Like Entry-Meta <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd0abdf2-24da-4e87-825b-0796af6c3ccd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/removehide-author-date-category-like-entry-meta/" + google-query: inurl:"/wp-content/plugins/removehide-author-date-category-like-entry-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,removehide-author-date-category-like-entry-meta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/removehide-author-date-category-like-entry-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "removehide-author-date-category-like-entry-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rename-media-files-024b2767e265d1c0c5a095406c0967d5.yaml b/nuclei-templates/cve-less/plugins/rename-media-files-024b2767e265d1c0c5a095406c0967d5.yaml new file mode 100644 index 0000000000..5b84ff1e06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rename-media-files-024b2767e265d1c0c5a095406c0967d5.yaml @@ -0,0 +1,58 @@ +id: rename-media-files-024b2767e265d1c0c5a095406c0967d5 + +info: + name: > + Rename Media Files <= 1.0.1 - Authenticated (Contributor+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c22c2c17-c9c5-46eb-877a-a49ccf1a74ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rename-media-files/" + google-query: inurl:"/wp-content/plugins/rename-media-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rename-media-files,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rename-media-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rename-media-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rename-wp-login-0c74520a6b922c051dd2e71bd71dde2f.yaml b/nuclei-templates/cve-less/plugins/rename-wp-login-0c74520a6b922c051dd2e71bd71dde2f.yaml new file mode 100644 index 0000000000..1415a49221 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rename-wp-login-0c74520a6b922c051dd2e71bd71dde2f.yaml @@ -0,0 +1,58 @@ +id: rename-wp-login-0c74520a6b922c051dd2e71bd71dde2f + +info: + name: > + Rename wp-login.php <= 2.6.0 - Cross-Site Request Forgery & Unauthenticated Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35be104a-15bc-489b-9806-9abe4ea2388a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rename-wp-login/" + google-query: inurl:"/wp-content/plugins/rename-wp-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rename-wp-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rename-wp-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rename-wp-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-112337a2e4900da8476bf23196ef2b93.yaml b/nuclei-templates/cve-less/plugins/rencontre-112337a2e4900da8476bf23196ef2b93.yaml new file mode 100644 index 0000000000..3d52dfde5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-112337a2e4900da8476bf23196ef2b93.yaml @@ -0,0 +1,58 @@ +id: rencontre-112337a2e4900da8476bf23196ef2b93 + +info: + name: > + Rencontre – Dating Site <= 3.10.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59be1fc7-2854-404d-8e9d-dd9bd26e6a2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-219b72efe5cc6f0e217f743d6fbc88d5.yaml b/nuclei-templates/cve-less/plugins/rencontre-219b72efe5cc6f0e217f743d6fbc88d5.yaml new file mode 100644 index 0000000000..320bc5fa9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-219b72efe5cc6f0e217f743d6fbc88d5.yaml @@ -0,0 +1,58 @@ +id: rencontre-219b72efe5cc6f0e217f743d6fbc88d5 + +info: + name: > + Rencontre – Dating Site <= 3.11.1 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/722c35e5-4084-46a4-a3d4-c73f8e7a1882?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-2f8f397bcad4eb939787697b135e157a.yaml b/nuclei-templates/cve-less/plugins/rencontre-2f8f397bcad4eb939787697b135e157a.yaml new file mode 100644 index 0000000000..3f2f5309eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-2f8f397bcad4eb939787697b135e157a.yaml @@ -0,0 +1,58 @@ +id: rencontre-2f8f397bcad4eb939787697b135e157a + +info: + name: > + Rencontre – Dating Site <= 3.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45e61d76-085d-48ba-b5ae-cc75f91d1250?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-3a45dc282f560e731773a059f5e7ca5d.yaml b/nuclei-templates/cve-less/plugins/rencontre-3a45dc282f560e731773a059f5e7ca5d.yaml new file mode 100644 index 0000000000..cafbdfd9c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-3a45dc282f560e731773a059f5e7ca5d.yaml @@ -0,0 +1,58 @@ +id: rencontre-3a45dc282f560e731773a059f5e7ca5d + +info: + name: > + Rencontre – Dating Site <= 3.2.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b4f63af-cb43-4287-8fdd-0ff1df70c6d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-5164636d32af20648741053f5b9caab7.yaml b/nuclei-templates/cve-less/plugins/rencontre-5164636d32af20648741053f5b9caab7.yaml new file mode 100644 index 0000000000..4011a1e44c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-5164636d32af20648741053f5b9caab7.yaml @@ -0,0 +1,58 @@ +id: rencontre-5164636d32af20648741053f5b9caab7 + +info: + name: > + Rencontre – Dating Site <= 3.1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebdac9a2-2114-4b3c-ab2f-bd461f2c648c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-5c0349ca079e747f13053866a0f9f7b4.yaml b/nuclei-templates/cve-less/plugins/rencontre-5c0349ca079e747f13053866a0f9f7b4.yaml new file mode 100644 index 0000000000..df672c2461 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-5c0349ca079e747f13053866a0f9f7b4.yaml @@ -0,0 +1,58 @@ +id: rencontre-5c0349ca079e747f13053866a0f9f7b4 + +info: + name: > + Rencontre – Dating Site <= 3.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96288db4-2758-4562-8b26-0523926c9156?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-71100afca944fcdf5852ccd8d5a09657.yaml b/nuclei-templates/cve-less/plugins/rencontre-71100afca944fcdf5852ccd8d5a09657.yaml new file mode 100644 index 0000000000..1cfaf75382 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-71100afca944fcdf5852ccd8d5a09657.yaml @@ -0,0 +1,58 @@ +id: rencontre-71100afca944fcdf5852ccd8d5a09657 + +info: + name: > + Rencontre – Dating Site <= 3.10.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1278291-9fef-40f5-a432-d96f4bed31fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-7116f21024cd4d3ec70934c93595bec9.yaml b/nuclei-templates/cve-less/plugins/rencontre-7116f21024cd4d3ec70934c93595bec9.yaml new file mode 100644 index 0000000000..e09f525608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-7116f21024cd4d3ec70934c93595bec9.yaml @@ -0,0 +1,58 @@ +id: rencontre-7116f21024cd4d3ec70934c93595bec9 + +info: + name: > + Rencontre – Dating Site <= 3.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b8aef59-8d7a-4ffd-9619-9684a6e51e5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rencontre-eb6a95dc8c6a4d6036eb6038576d5022.yaml b/nuclei-templates/cve-less/plugins/rencontre-eb6a95dc8c6a4d6036eb6038576d5022.yaml new file mode 100644 index 0000000000..38a3a36bc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rencontre-eb6a95dc8c6a4d6036eb6038576d5022.yaml @@ -0,0 +1,58 @@ +id: rencontre-eb6a95dc8c6a4d6036eb6038576d5022 + +info: + name: > + Rencontre – Dating Site <= 3.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf665438-20d2-4df9-b3ff-54123343a46d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rencontre/" + google-query: inurl:"/wp-content/plugins/rencontre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rencontre,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rencontre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rencontre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rentpress-4981ace1c6912438e6aebe6db5797df1.yaml b/nuclei-templates/cve-less/plugins/rentpress-4981ace1c6912438e6aebe6db5797df1.yaml new file mode 100644 index 0000000000..7fe5da74bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rentpress-4981ace1c6912438e6aebe6db5797df1.yaml @@ -0,0 +1,58 @@ +id: rentpress-4981ace1c6912438e6aebe6db5797df1 + +info: + name: > + RentPress <= 6.6.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97e97825-8144-423c-ac4c-3c5ae0dbbb10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rentpress/" + google-query: inurl:"/wp-content/plugins/rentpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rentpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rentpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rentpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/replace-word-3a5045c6057ba75552aa877da967cc1d.yaml b/nuclei-templates/cve-less/plugins/replace-word-3a5045c6057ba75552aa877da967cc1d.yaml new file mode 100644 index 0000000000..ba7a7fb72c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/replace-word-3a5045c6057ba75552aa877da967cc1d.yaml @@ -0,0 +1,58 @@ +id: replace-word-3a5045c6057ba75552aa877da967cc1d + +info: + name: > + Replace Word <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75ddf732-ddb2-47ba-884a-477fcc6595b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/replace-word/" + google-query: inurl:"/wp-content/plugins/replace-word/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,replace-word,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/replace-word/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "replace-word" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/republish-old-posts-d08d72d9d704360392caeeb3caa1999d.yaml b/nuclei-templates/cve-less/plugins/republish-old-posts-d08d72d9d704360392caeeb3caa1999d.yaml new file mode 100644 index 0000000000..2f1c91040b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/republish-old-posts-d08d72d9d704360392caeeb3caa1999d.yaml @@ -0,0 +1,58 @@ +id: republish-old-posts-d08d72d9d704360392caeeb3caa1999d + +info: + name: > + Republish Old Posts <= 1.21 - Cross-Site Request Forgery via rop_options_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e1db52a-3966-4e04-b0ed-08bda9ba1ff6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/republish-old-posts/" + google-query: inurl:"/wp-content/plugins/republish-old-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,republish-old-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/republish-old-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "republish-old-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/request-a-quote-9285c0881d2d0d11de4e3b3a24768c84.yaml b/nuclei-templates/cve-less/plugins/request-a-quote-9285c0881d2d0d11de4e3b3a24768c84.yaml new file mode 100644 index 0000000000..1221f88b11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/request-a-quote-9285c0881d2d0d11de4e3b3a24768c84.yaml @@ -0,0 +1,58 @@ +id: request-a-quote-9285c0881d2d0d11de4e3b3a24768c84 + +info: + name: > + Request a Quote <= 2.3.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0482d9c6-aa74-4d47-885c-17f14b38be6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/request-a-quote/" + google-query: inurl:"/wp-content/plugins/request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,request-a-quote,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/request-a-quote-bd1e1a72d84e778ed0728f8ce93d9820.yaml b/nuclei-templates/cve-less/plugins/request-a-quote-bd1e1a72d84e778ed0728f8ce93d9820.yaml new file mode 100644 index 0000000000..215f9f5f9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/request-a-quote-bd1e1a72d84e778ed0728f8ce93d9820.yaml @@ -0,0 +1,58 @@ +id: request-a-quote-bd1e1a72d84e778ed0728f8ce93d9820 + +info: + name: > + Request a Quote <= 2.3.8 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2a99b86-5eb8-438d-a040-68aba2ffa183?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/request-a-quote/" + google-query: inurl:"/wp-content/plugins/request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,request-a-quote,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/request-a-quote-d660fb4211ca4d5aa389748791b62abb.yaml b/nuclei-templates/cve-less/plugins/request-a-quote-d660fb4211ca4d5aa389748791b62abb.yaml new file mode 100644 index 0000000000..2a4ecf7cc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/request-a-quote-d660fb4211ca4d5aa389748791b62abb.yaml @@ -0,0 +1,58 @@ +id: request-a-quote-d660fb4211ca4d5aa389748791b62abb + +info: + name: > + Request a Quote <= 2.3.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bf29d3d-98eb-40a7-88af-32b48e437572?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/request-a-quote/" + google-query: inurl:"/wp-content/plugins/request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,request-a-quote,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/request-a-quote-e78bafbef882a9c48928d514c06bbb3b.yaml b/nuclei-templates/cve-less/plugins/request-a-quote-e78bafbef882a9c48928d514c06bbb3b.yaml new file mode 100644 index 0000000000..f431db847a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/request-a-quote-e78bafbef882a9c48928d514c06bbb3b.yaml @@ -0,0 +1,58 @@ +id: request-a-quote-e78bafbef882a9c48928d514c06bbb3b + +info: + name: > + Request a Quote <= 2.3.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3504b703-b95b-4d22-8883-a575b398c9ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/request-a-quote/" + google-query: inurl:"/wp-content/plugins/request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,request-a-quote,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/request-a-quote-f9f6ff6ab82acd24abf9e4da4d050784.yaml b/nuclei-templates/cve-less/plugins/request-a-quote-f9f6ff6ab82acd24abf9e4da4d050784.yaml new file mode 100644 index 0000000000..d0ed2357f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/request-a-quote-f9f6ff6ab82acd24abf9e4da4d050784.yaml @@ -0,0 +1,58 @@ +id: request-a-quote-f9f6ff6ab82acd24abf9e4da4d050784 + +info: + name: > + Request a Quote <= 2.3.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9854d09a-2fab-46e6-9fc1-ff6d68df2662?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/request-a-quote/" + google-query: inurl:"/wp-content/plugins/request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,request-a-quote,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/require-taxonomy-image-category-tag-0d603e3edf902251fc832f3e8e30e339.yaml b/nuclei-templates/cve-less/plugins/require-taxonomy-image-category-tag-0d603e3edf902251fc832f3e8e30e339.yaml new file mode 100644 index 0000000000..07c18aebb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/require-taxonomy-image-category-tag-0d603e3edf902251fc832f3e8e30e339.yaml @@ -0,0 +1,58 @@ +id: require-taxonomy-image-category-tag-0d603e3edf902251fc832f3e8e30e339 + +info: + name: > + Require & Limit Categories, Tags, Featured Image and taxonomies <= 1.26 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/988c1968-ef92-4d3d-bbd5-88e73512ebb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/require-taxonomy-image-category-tag/" + google-query: inurl:"/wp-content/plugins/require-taxonomy-image-category-tag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,require-taxonomy-image-category-tag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/require-taxonomy-image-category-tag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "require-taxonomy-image-category-tag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/required-taxonomies-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/required-taxonomies-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..88b6fd7008 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/required-taxonomies-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: required-taxonomies-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/required-taxonomies/" + google-query: inurl:"/wp-content/plugins/required-taxonomies/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,required-taxonomies,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/required-taxonomies/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "required-taxonomies" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resads-33b6f66391ce62eb7e838b36fc2b4558.yaml b/nuclei-templates/cve-less/plugins/resads-33b6f66391ce62eb7e838b36fc2b4558.yaml new file mode 100644 index 0000000000..1344bc7fb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resads-33b6f66391ce62eb7e838b36fc2b4558.yaml @@ -0,0 +1,58 @@ +id: resads-33b6f66391ce62eb7e838b36fc2b4558 + +info: + name: > + ResAds < 1.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d634ba5c-842c-44d0-b919-01c297a779f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resads/" + google-query: inurl:"/wp-content/plugins/resads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rescue-shortcodes-dd783793d1579786f0da18d50db26b6a.yaml b/nuclei-templates/cve-less/plugins/rescue-shortcodes-dd783793d1579786f0da18d50db26b6a.yaml new file mode 100644 index 0000000000..b79460e82b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rescue-shortcodes-dd783793d1579786f0da18d50db26b6a.yaml @@ -0,0 +1,58 @@ +id: rescue-shortcodes-dd783793d1579786f0da18d50db26b6a + +info: + name: > + Rescue Shortcodes <= 2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a11e7c9-f565-4a8c-895f-425c6654b5a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rescue-shortcodes/" + google-query: inurl:"/wp-content/plugins/rescue-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rescue-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rescue-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rescue-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resend-welcome-email-9ad1bb5942489f3a5ae6b0ae145bf51a.yaml b/nuclei-templates/cve-less/plugins/resend-welcome-email-9ad1bb5942489f3a5ae6b0ae145bf51a.yaml new file mode 100644 index 0000000000..2e77bd9d3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resend-welcome-email-9ad1bb5942489f3a5ae6b0ae145bf51a.yaml @@ -0,0 +1,58 @@ +id: resend-welcome-email-9ad1bb5942489f3a5ae6b0ae145bf51a + +info: + name: > + Resend Welcome Email <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04567872-d4e3-43e9-88ca-6f60d135bb9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resend-welcome-email/" + google-query: inurl:"/wp-content/plugins/resend-welcome-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resend-welcome-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resend-welcome-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resend-welcome-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resermy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/resermy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..a4777dda27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resermy-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: resermy-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resermy/" + google-query: inurl:"/wp-content/plugins/resermy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resermy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resermy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resermy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reservation-studio-widget-33be367e25256f8164e300b3a7daf9ad.yaml b/nuclei-templates/cve-less/plugins/reservation-studio-widget-33be367e25256f8164e300b3a7daf9ad.yaml new file mode 100644 index 0000000000..2fab977718 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reservation-studio-widget-33be367e25256f8164e300b3a7daf9ad.yaml @@ -0,0 +1,58 @@ +id: reservation-studio-widget-33be367e25256f8164e300b3a7daf9ad + +info: + name: > + Reservation.Studio widget <= 1.0.11 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7caa4c73-cf57-4f99-8bc6-6fd02308a58f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reservation-studio-widget/" + google-query: inurl:"/wp-content/plugins/reservation-studio-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reservation-studio-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reservation-studio-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reservation-studio-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reservation-studio-widget-f157822d9e859b87e8f345e48a1d0719.yaml b/nuclei-templates/cve-less/plugins/reservation-studio-widget-f157822d9e859b87e8f345e48a1d0719.yaml new file mode 100644 index 0000000000..907d214e7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reservation-studio-widget-f157822d9e859b87e8f345e48a1d0719.yaml @@ -0,0 +1,58 @@ +id: reservation-studio-widget-f157822d9e859b87e8f345e48a1d0719 + +info: + name: > + Reservation.Studio widget <= 1.0.11 - Cross-Site Request Forgery via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/783e5794-0d74-4b7a-a1cd-2b834a50c50c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reservation-studio-widget/" + google-query: inurl:"/wp-content/plugins/reservation-studio-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reservation-studio-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reservation-studio-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reservation-studio-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reset-course-progress-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/reset-course-progress-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4938070022 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reset-course-progress-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: reset-course-progress-for-learndash-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reset-course-progress-for-learndash/" + google-query: inurl:"/wp-content/plugins/reset-course-progress-for-learndash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reset-course-progress-for-learndash,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reset-course-progress-for-learndash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reset-course-progress-for-learndash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resim-ara-9bd64c494589e276c977a9c82f664000.yaml b/nuclei-templates/cve-less/plugins/resim-ara-9bd64c494589e276c977a9c82f664000.yaml new file mode 100644 index 0000000000..e11b346a70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resim-ara-9bd64c494589e276c977a9c82f664000.yaml @@ -0,0 +1,58 @@ +id: resim-ara-9bd64c494589e276c977a9c82f664000 + +info: + name: > + Resim Ara <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/478b67e3-bd66-4f38-8a37-e677e5db875d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resim-ara/" + google-query: inurl:"/wp-content/plugins/resim-ara/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resim-ara,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resim-ara/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resim-ara" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resize-at-upload-plus-a6af184da39fc0e8d8ed033eba477325.yaml b/nuclei-templates/cve-less/plugins/resize-at-upload-plus-a6af184da39fc0e8d8ed033eba477325.yaml new file mode 100644 index 0000000000..df7fb53de4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resize-at-upload-plus-a6af184da39fc0e8d8ed033eba477325.yaml @@ -0,0 +1,58 @@ +id: resize-at-upload-plus-a6af184da39fc0e8d8ed033eba477325 + +info: + name: > + Resize at Upload Plus <= 1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76af3f0a-2e35-4059-960c-09769459bc01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resize-at-upload-plus/" + google-query: inurl:"/wp-content/plugins/resize-at-upload-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resize-at-upload-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resize-at-upload-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resize-at-upload-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resize-image-after-upload-7d8fc6eda80cc32678a794e07adb8263.yaml b/nuclei-templates/cve-less/plugins/resize-image-after-upload-7d8fc6eda80cc32678a794e07adb8263.yaml new file mode 100644 index 0000000000..e71a90392d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resize-image-after-upload-7d8fc6eda80cc32678a794e07adb8263.yaml @@ -0,0 +1,58 @@ +id: resize-image-after-upload-7d8fc6eda80cc32678a794e07adb8263 + +info: + name: > + Resize Image After Upload <= 1.8.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ce2786e-2918-4dc0-99c4-db447216e140?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resize-image-after-upload/" + google-query: inurl:"/wp-content/plugins/resize-image-after-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resize-image-after-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resize-image-after-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resize-image-after-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-0292116775ef708600542a7e8f86fd65.yaml b/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-0292116775ef708600542a7e8f86fd65.yaml new file mode 100644 index 0000000000..d35518edfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-0292116775ef708600542a7e8f86fd65.yaml @@ -0,0 +1,58 @@ +id: resmushit-image-optimizer-0292116775ef708600542a7e8f86fd65 + +info: + name: > + reSmush.it Image Optimizer <= 0.4.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8187c6eb-d962-48a7-bbe8-5949cfdefbce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resmushit-image-optimizer/" + google-query: inurl:"/wp-content/plugins/resmushit-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resmushit-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resmushit-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resmushit-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-69e740cf6c8c1abbdc55bae92d3a061a.yaml b/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-69e740cf6c8c1abbdc55bae92d3a061a.yaml new file mode 100644 index 0000000000..fcc2b00caf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-69e740cf6c8c1abbdc55bae92d3a061a.yaml @@ -0,0 +1,58 @@ +id: resmushit-image-optimizer-69e740cf6c8c1abbdc55bae92d3a061a + +info: + name: > + reSmush.it Image Optimizer <= 0.4.5 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b8042b0-83d3-417f-a5e0-43ff4f7648fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resmushit-image-optimizer/" + google-query: inurl:"/wp-content/plugins/resmushit-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resmushit-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resmushit-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resmushit-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-e43bc5511341599f04f729dc760bab86.yaml b/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-e43bc5511341599f04f729dc760bab86.yaml new file mode 100644 index 0000000000..bfbb81b992 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resmushit-image-optimizer-e43bc5511341599f04f729dc760bab86.yaml @@ -0,0 +1,58 @@ +id: resmushit-image-optimizer-e43bc5511341599f04f729dc760bab86 + +info: + name: > + reSmush.it <= 0.4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c4e5c12-6f12-40cb-ac0a-389ad3715503?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resmushit-image-optimizer/" + google-query: inurl:"/wp-content/plugins/resmushit-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resmushit-image-optimizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resmushit-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resmushit-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-add-ons-324f681dcc32f9cad80599a822ed178a.yaml b/nuclei-templates/cve-less/plugins/responsive-add-ons-324f681dcc32f9cad80599a822ed178a.yaml new file mode 100644 index 0000000000..722050e49d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-add-ons-324f681dcc32f9cad80599a822ed178a.yaml @@ -0,0 +1,58 @@ +id: responsive-add-ons-324f681dcc32f9cad80599a822ed178a + +info: + name: > + Responsive Ready Sites Importer <= 2.2.6 - Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ef0ab24-ec21-4d23-980d-71a23bf20f9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-add-ons/" + google-query: inurl:"/wp-content/plugins/responsive-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-add-ons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-add-ons-c4bc19656917f2d34b4812810b207db1.yaml b/nuclei-templates/cve-less/plugins/responsive-add-ons-c4bc19656917f2d34b4812810b207db1.yaml new file mode 100644 index 0000000000..00cdd0a9d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-add-ons-c4bc19656917f2d34b4812810b207db1.yaml @@ -0,0 +1,58 @@ +id: responsive-add-ons-c4bc19656917f2d34b4812810b207db1 + +info: + name: > + Responsive Starter Templates – Elementor & WordPress Templates <= 2.6.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e2214d8-b22d-4e51-a0cf-cca1af8e761c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-add-ons/" + google-query: inurl:"/wp-content/plugins/responsive-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-add-ons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-add-ons-e6d62601d9fb0272cdf0ccd211481dcd.yaml b/nuclei-templates/cve-less/plugins/responsive-add-ons-e6d62601d9fb0272cdf0ccd211481dcd.yaml new file mode 100644 index 0000000000..b37e3e2b10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-add-ons-e6d62601d9fb0272cdf0ccd211481dcd.yaml @@ -0,0 +1,58 @@ +id: responsive-add-ons-e6d62601d9fb0272cdf0ccd211481dcd + +info: + name: > + Responsive Starter Templates – Elementor & WordPress Templates <= 2.6.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b290e792-2473-4ba5-b66c-b6ca65445c0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-add-ons/" + google-query: inurl:"/wp-content/plugins/responsive-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-add-ons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-category-slider-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/responsive-category-slider-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..de882a0c0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-category-slider-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: responsive-category-slider-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-category-slider/" + google-query: inurl:"/wp-content/plugins/responsive-category-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-category-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-category-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-category-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-column-widgets-21056c551dd1aeb9a76645f88361467f.yaml b/nuclei-templates/cve-less/plugins/responsive-column-widgets-21056c551dd1aeb9a76645f88361467f.yaml new file mode 100644 index 0000000000..8107ab5928 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-column-widgets-21056c551dd1aeb9a76645f88361467f.yaml @@ -0,0 +1,58 @@ +id: responsive-column-widgets-21056c551dd1aeb9a76645f88361467f + +info: + name: > + Responsive Column Widgets <= 1.2.7 - Reflected Cross-Site Scripting via tab + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d749c24c-0ed9-423b-872a-4771e9d8a2eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-column-widgets/" + google-query: inurl:"/wp-content/plugins/responsive-column-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-column-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-column-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-column-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-column-widgets-28559d7c492fb8129804be5b16de6e2e.yaml b/nuclei-templates/cve-less/plugins/responsive-column-widgets-28559d7c492fb8129804be5b16de6e2e.yaml new file mode 100644 index 0000000000..56f91e57e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-column-widgets-28559d7c492fb8129804be5b16de6e2e.yaml @@ -0,0 +1,58 @@ +id: responsive-column-widgets-28559d7c492fb8129804be5b16de6e2e + +info: + name: > + Responsive Column Widgets <= 1.2.7 - Open Redirect via responsive_column_widgets_link + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a092266b-bd7f-424d-b8c4-d79e4811e6c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-column-widgets/" + google-query: inurl:"/wp-content/plugins/responsive-column-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-column-widgets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-column-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-column-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-0362bdcef3a6a0f78140270dfd8f3247.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-0362bdcef3a6a0f78140270dfd8f3247.yaml new file mode 100644 index 0000000000..a2100ab66b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-0362bdcef3a6a0f78140270dfd8f3247.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-0362bdcef3a6a0f78140270dfd8f3247 + +info: + name: > + Coming Soon Page & Maintenance Mode <= 2.2.1 - Maintenance Mode Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3c52d6e-b3f4-4ba8-aee4-b9f11704e1de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-5f71a5cbd6bba8194eb0fd13e3daceef.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-5f71a5cbd6bba8194eb0fd13e3daceef.yaml new file mode 100644 index 0000000000..5a9ceab979 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-5f71a5cbd6bba8194eb0fd13e3daceef.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-5f71a5cbd6bba8194eb0fd13e3daceef + +info: + name: > + Coming Soon Page & Maintenance Mode <= 1.8.1 - Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/738c6c77-97ef-4e47-9f14-9b73ea425bc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-d0a9eb1395b2d7adc32f3db9fd1a5b08.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-d0a9eb1395b2d7adc32f3db9fd1a5b08.yaml new file mode 100644 index 0000000000..b275471973 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-d0a9eb1395b2d7adc32f3db9fd1a5b08.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-d0a9eb1395b2d7adc32f3db9fd1a5b08 + +info: + name: > + Coming Soon Page & Maintenance Mode <= 1.8.1 - Unauthenticated Settings Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61fdc6e9-75ea-4226-9527-a5fd02efde70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-2fca652bdc1152658ff99e932f826e15.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-2fca652bdc1152658ff99e932f826e15.yaml new file mode 100644 index 0000000000..7dfe7e81e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-2fca652bdc1152658ff99e932f826e15.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-2fca652bdc1152658ff99e932f826e15 + +info: + name: > + Coming Soon < 1.1.19 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f947843-7a6f-48b0-b3cd-2f3dd1708898?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-3e7642452405a4b08d52483d238d4dd9.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-3e7642452405a4b08d52483d238d4dd9.yaml new file mode 100644 index 0000000000..e46bc4c6c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-3e7642452405a4b08d52483d238d4dd9.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-3e7642452405a4b08d52483d238d4dd9 + +info: + name: > + Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via bg_color parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3891928-3780-426b-ae9c-e57b05ab3718?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-3f9a61f980dbe211de3420fd4e108af4.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-3f9a61f980dbe211de3420fd4e108af4.yaml new file mode 100644 index 0000000000..3896c7656a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-3f9a61f980dbe211de3420fd4e108af4.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-3f9a61f980dbe211de3420fd4e108af4 + +info: + name: > + Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via social_icon_1 parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb6e8f8-690a-49cb-ac00-f572bef8b8f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml new file mode 100644 index 0000000000..5e05d335df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-40faedf6e59dffdfc7f0e36dcf3aadb5 + +info: + name: > + Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via counter_title parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb829f2-c05f-4f81-85d0-2429fb515d33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-6e94975f5a72379b4c113015c234f26e.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-6e94975f5a72379b4c113015c234f26e.yaml new file mode 100644 index 0000000000..368f9734fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-6e94975f5a72379b4c113015c234f26e.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-6e94975f5a72379b4c113015c234f26e + +info: + name: > + Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via button_text_link parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d7d8e85-c9cb-4fa5-9632-61f33048838d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-90c5798f111069225c0a9b9bba314556.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-90c5798f111069225c0a9b9bba314556.yaml new file mode 100644 index 0000000000..1d028315b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-90c5798f111069225c0a9b9bba314556.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-90c5798f111069225c0a9b9bba314556 + +info: + name: > + Coming Soon Page <= 1.5.9 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a371489-031e-483e-9fde-3901b55710c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-9a185bb7031cc9ee6aedfd50f633a1fb.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-9a185bb7031cc9ee6aedfd50f633a1fb.yaml new file mode 100644 index 0000000000..a0b0f34fc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-9a185bb7031cc9ee6aedfd50f633a1fb.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-9a185bb7031cc9ee6aedfd50f633a1fb + +info: + name: > + Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via logo_width parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae88e065-4601-4f0e-80a4-0f011bb0d347?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-aeeb6c4c51959fc6de4f70bfbf031f53.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-aeeb6c4c51959fc6de4f70bfbf031f53.yaml new file mode 100644 index 0000000000..9ca939ae34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-aeeb6c4c51959fc6de4f70bfbf031f53.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-aeeb6c4c51959fc6de4f70bfbf031f53 + +info: + name: > + Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via coming-soon_sub_title parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e57631c2-ad6c-4c8c-985e-948285058567?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-c26b1839d934a6c01fe10cd6a0d67c39.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-c26b1839d934a6c01fe10cd6a0d67c39.yaml new file mode 100644 index 0000000000..2faa1a8c9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-c26b1839d934a6c01fe10cd6a0d67c39.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-c26b1839d934a6c01fe10cd6a0d67c39 + +info: + name: > + Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via logo_height parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b8947a-6c87-4430-b62d-494863e18fdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-c4c0b94844e7f594c58f973ae84c6505.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-c4c0b94844e7f594c58f973ae84c6505.yaml new file mode 100644 index 0000000000..eaf9cd518e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-c4c0b94844e7f594c58f973ae84c6505.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-c4c0b94844e7f594c58f973ae84c6505 + +info: + name: > + Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/910c3d74-63ed-476d-b014-659d7780260f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-ff98de6f26943739c7dc560ade3e2c7d.yaml b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-ff98de6f26943739c7dc560ade3e2c7d.yaml new file mode 100644 index 0000000000..6d27b5b84e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-coming-soon-page-ff98de6f26943739c7dc560ade3e2c7d.yaml @@ -0,0 +1,58 @@ +id: responsive-coming-soon-page-ff98de6f26943739c7dc560ade3e2c7d + +info: + name: > + Coming Soon <= 1.1.18 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c24a03a-95d8-4354-bb26-8575d70f2253?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-coming-soon-page/" + google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-coming-soon-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-coming-soon-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-cookie-consent-d2ced4606aa87805c35fba9cf8d5be3f.yaml b/nuclei-templates/cve-less/plugins/responsive-cookie-consent-d2ced4606aa87805c35fba9cf8d5be3f.yaml new file mode 100644 index 0000000000..144f7ef53c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-cookie-consent-d2ced4606aa87805c35fba9cf8d5be3f.yaml @@ -0,0 +1,58 @@ +id: responsive-cookie-consent-d2ced4606aa87805c35fba9cf8d5be3f + +info: + name: > + Responsive Cookie Consent < 1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66d70cf6-494f-4221-af3b-ee76cf22a305?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-cookie-consent/" + google-query: inurl:"/wp-content/plugins/responsive-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-cookie-consent,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-css-editor-f2d03c372af597128c556a16b6de11cf.yaml b/nuclei-templates/cve-less/plugins/responsive-css-editor-f2d03c372af597128c556a16b6de11cf.yaml new file mode 100644 index 0000000000..5c8fbfb783 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-css-editor-f2d03c372af597128c556a16b6de11cf.yaml @@ -0,0 +1,58 @@ +id: responsive-css-editor-f2d03c372af597128c556a16b6de11cf + +info: + name: > + Responsive CSS EDITOR <= 1.0 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60ffe162-5bcd-4ffc-af45-81240751bc62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-css-editor/" + google-query: inurl:"/wp-content/plugins/responsive-css-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-css-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-css-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-css-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-facebook-and-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/responsive-facebook-and-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..37f48ab264 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-facebook-and-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: responsive-facebook-and-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-facebook-and-twitter-widget/" + google-query: inurl:"/wp-content/plugins/responsive-facebook-and-twitter-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-facebook-and-twitter-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-facebook-and-twitter-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-facebook-and-twitter-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-filterable-portfolio-0f725a315fbc29f28fcbc561372c708a.yaml b/nuclei-templates/cve-less/plugins/responsive-filterable-portfolio-0f725a315fbc29f28fcbc561372c708a.yaml new file mode 100644 index 0000000000..fcadbb613f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-filterable-portfolio-0f725a315fbc29f28fcbc561372c708a.yaml @@ -0,0 +1,58 @@ +id: responsive-filterable-portfolio-0f725a315fbc29f28fcbc561372c708a + +info: + name: > + Responsive Filterable Portfolio <= 1.0.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e67dfe0f-ac1c-4a78-bfc9-0cfd6c3040d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-filterable-portfolio/" + google-query: inurl:"/wp-content/plugins/responsive-filterable-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-filterable-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-filterable-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-filterable-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-gallery-grid-41e0b9bc5daa86f41c29f0c4deb81563.yaml b/nuclei-templates/cve-less/plugins/responsive-gallery-grid-41e0b9bc5daa86f41c29f0c4deb81563.yaml new file mode 100644 index 0000000000..c6b7312f3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-gallery-grid-41e0b9bc5daa86f41c29f0c4deb81563.yaml @@ -0,0 +1,58 @@ +id: responsive-gallery-grid-41e0b9bc5daa86f41c29f0c4deb81563 + +info: + name: > + Responsive Gallery Grid <= 2.3.10 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18455e08-6593-4835-bd72-beb04bda2930?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-gallery-grid/" + google-query: inurl:"/wp-content/plugins/responsive-gallery-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-gallery-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-gallery-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-gallery-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-gallery-grid-460458a06d8d211770e9a31930d7029e.yaml b/nuclei-templates/cve-less/plugins/responsive-gallery-grid-460458a06d8d211770e9a31930d7029e.yaml new file mode 100644 index 0000000000..c4b70e3b58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-gallery-grid-460458a06d8d211770e9a31930d7029e.yaml @@ -0,0 +1,58 @@ +id: responsive-gallery-grid-460458a06d8d211770e9a31930d7029e + +info: + name: > + Responsive Gallery Grid <= 2.3.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3abe2de8-9127-4ef0-9194-cf331b20868a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-gallery-grid/" + google-query: inurl:"/wp-content/plugins/responsive-gallery-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-gallery-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-gallery-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-gallery-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-gallery-grid-a609881cbf31d06f5f3320cc98e71e76.yaml b/nuclei-templates/cve-less/plugins/responsive-gallery-grid-a609881cbf31d06f5f3320cc98e71e76.yaml new file mode 100644 index 0000000000..6e03f0ea9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-gallery-grid-a609881cbf31d06f5f3320cc98e71e76.yaml @@ -0,0 +1,58 @@ +id: responsive-gallery-grid-a609881cbf31d06f5f3320cc98e71e76 + +info: + name: > + Responsive Gallery Grid <= 2.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5cc30d9-c73c-440d-a592-08e85270efdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-gallery-grid/" + google-query: inurl:"/wp-content/plugins/responsive-gallery-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-gallery-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-gallery-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-gallery-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-header-image-slider-2196f2a72b0d78d150ae68d55da0fd92.yaml b/nuclei-templates/cve-less/plugins/responsive-header-image-slider-2196f2a72b0d78d150ae68d55da0fd92.yaml new file mode 100644 index 0000000000..bdd79ae97b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-header-image-slider-2196f2a72b0d78d150ae68d55da0fd92.yaml @@ -0,0 +1,58 @@ +id: responsive-header-image-slider-2196f2a72b0d78d150ae68d55da0fd92 + +info: + name: > + WP Responsive header image slider <= 3.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6953dea2-ca2d-4283-97c2-45c3420d9390?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-header-image-slider/" + google-query: inurl:"/wp-content/plugins/responsive-header-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-header-image-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-header-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-header-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-00eeb6c21c5d722501b60770e277f490.yaml b/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-00eeb6c21c5d722501b60770e277f490.yaml new file mode 100644 index 0000000000..42a5007344 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-00eeb6c21c5d722501b60770e277f490.yaml @@ -0,0 +1,58 @@ +id: responsive-horizontal-vertical-and-accordion-tabs-00eeb6c21c5d722501b60770e277f490 + +info: + name: > + WP Responsive Tabs horizontal vertical and accordion Tabs <= 1.1.17 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8647005a-23ce-417f-9bdb-c54ac506942b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/" + google-query: inurl:"/wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-horizontal-vertical-and-accordion-tabs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-horizontal-vertical-and-accordion-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-850e736734b165b9f53f31b41b925633.yaml b/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-850e736734b165b9f53f31b41b925633.yaml new file mode 100644 index 0000000000..ad743473e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-850e736734b165b9f53f31b41b925633.yaml @@ -0,0 +1,58 @@ +id: responsive-horizontal-vertical-and-accordion-tabs-850e736734b165b9f53f31b41b925633 + +info: + name: > + WP Responsive Tabs horizontal vertical and accordion Tabs <= 1.1.15 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe54c37f-1421-48aa-b502-045847d13ae3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/" + google-query: inurl:"/wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-horizontal-vertical-and-accordion-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-horizontal-vertical-and-accordion-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-950a4b8c92825a575ac3cedca47edcba.yaml b/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-950a4b8c92825a575ac3cedca47edcba.yaml new file mode 100644 index 0000000000..d46560bc9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-950a4b8c92825a575ac3cedca47edcba.yaml @@ -0,0 +1,58 @@ +id: responsive-horizontal-vertical-and-accordion-tabs-950a4b8c92825a575ac3cedca47edcba + +info: + name: > + WP Responsive Tabs horizontal vertical and accordion Tabs <= 1.1.17 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96a7ebcb-3420-497c-80e6-54e42afe41a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/" + google-query: inurl:"/wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-horizontal-vertical-and-accordion-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-horizontal-vertical-and-accordion-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-beb8d0299f9b57d02b746cf7959b845d.yaml b/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-beb8d0299f9b57d02b746cf7959b845d.yaml new file mode 100644 index 0000000000..a20ab8c64e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-horizontal-vertical-and-accordion-tabs-beb8d0299f9b57d02b746cf7959b845d.yaml @@ -0,0 +1,58 @@ +id: responsive-horizontal-vertical-and-accordion-tabs-beb8d0299f9b57d02b746cf7959b845d + +info: + name: > + WP Responsive Tabs horizontal vertical and accordion Tabs <= 1.1.15 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de331d1d-b2f8-4cc6-a998-779595eca70c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/" + google-query: inurl:"/wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-horizontal-vertical-and-accordion-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-horizontal-vertical-and-accordion-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-horizontal-vertical-and-accordion-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-lightbox-12fb9fdf8190804b70dbaba2fb2c9085.yaml b/nuclei-templates/cve-less/plugins/responsive-lightbox-12fb9fdf8190804b70dbaba2fb2c9085.yaml new file mode 100644 index 0000000000..2461751d8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-lightbox-12fb9fdf8190804b70dbaba2fb2c9085.yaml @@ -0,0 +1,58 @@ +id: responsive-lightbox-12fb9fdf8190804b70dbaba2fb2c9085 + +info: + name: > + Responsive Lightbox <= 2.4.5 - Authenticated (Author+) Stored Cross-Site Scripting via name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b60c1e2-5a4b-4a7a-8224-f1afd3888e08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-lightbox/" + google-query: inurl:"/wp-content/plugins/responsive-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-lightbox-7b55e5afda1f744808ef7891452f6863.yaml b/nuclei-templates/cve-less/plugins/responsive-lightbox-7b55e5afda1f744808ef7891452f6863.yaml new file mode 100644 index 0000000000..8bd9c216f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-lightbox-7b55e5afda1f744808ef7891452f6863.yaml @@ -0,0 +1,58 @@ +id: responsive-lightbox-7b55e5afda1f744808ef7891452f6863 + +info: + name: > + Responsive Lightbox & Gallery <= 2.4.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d99d7a26-3645-4ff5-8c48-17b6fa77a228?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-lightbox/" + google-query: inurl:"/wp-content/plugins/responsive-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-lightbox-a59e139d7834d1f343a41f6f77f479a9.yaml b/nuclei-templates/cve-less/plugins/responsive-lightbox-a59e139d7834d1f343a41f6f77f479a9.yaml new file mode 100644 index 0000000000..ee53c0f7c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-lightbox-a59e139d7834d1f343a41f6f77f479a9.yaml @@ -0,0 +1,58 @@ +id: responsive-lightbox-a59e139d7834d1f343a41f6f77f479a9 + +info: + name: > + Responsive Lightbox <= 2.4.6 - Missing Authorization via Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ade377c4-c7aa-428d-b763-6e6fb6caee0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-lightbox/" + google-query: inurl:"/wp-content/plugins/responsive-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/responsive-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..06e86c4253 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: responsive-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-lightbox/" + google-query: inurl:"/wp-content/plugins/responsive-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-lightbox-d3aee972ef803bd73b594546fe5f08d6.yaml b/nuclei-templates/cve-less/plugins/responsive-lightbox-d3aee972ef803bd73b594546fe5f08d6.yaml new file mode 100644 index 0000000000..832b277308 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-lightbox-d3aee972ef803bd73b594546fe5f08d6.yaml @@ -0,0 +1,58 @@ +id: responsive-lightbox-d3aee972ef803bd73b594546fe5f08d6 + +info: + name: > + Responsive Lightbox & Gallery <= 1.7.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcce2857-5bc8-4bee-b218-45f56cb0184b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-lightbox/" + google-query: inurl:"/wp-content/plugins/responsive-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-lightbox2-85a882f3a47555e7fcebe3d512a6eae9.yaml b/nuclei-templates/cve-less/plugins/responsive-lightbox2-85a882f3a47555e7fcebe3d512a6eae9.yaml new file mode 100644 index 0000000000..8aea14bd18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-lightbox2-85a882f3a47555e7fcebe3d512a6eae9.yaml @@ -0,0 +1,58 @@ +id: responsive-lightbox2-85a882f3a47555e7fcebe3d512a6eae9 + +info: + name: > + Responsive Lightbox2 <= 1.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a6debe9-e0bb-4ea7-be91-757a250515ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-lightbox2/" + google-query: inurl:"/wp-content/plugins/responsive-lightbox2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-lightbox2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-lightbox2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-lightbox2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-lightbox2-87b6d9e5131d99ef758c739f3a95c342.yaml b/nuclei-templates/cve-less/plugins/responsive-lightbox2-87b6d9e5131d99ef758c739f3a95c342.yaml new file mode 100644 index 0000000000..4ff4bf20e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-lightbox2-87b6d9e5131d99ef758c739f3a95c342.yaml @@ -0,0 +1,58 @@ +id: responsive-lightbox2-87b6d9e5131d99ef758c739f3a95c342 + +info: + name: > + Responsive Lightbox2 <= 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d45a4b0b-bb98-4c35-a743-c434946002a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-lightbox2/" + google-query: inurl:"/wp-content/plugins/responsive-lightbox2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-lightbox2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-lightbox2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-lightbox2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-logo-slideshow-8d120ab408475ea52678a65c5972ac37.yaml b/nuclei-templates/cve-less/plugins/responsive-logo-slideshow-8d120ab408475ea52678a65c5972ac37.yaml new file mode 100644 index 0000000000..3b5c18311a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-logo-slideshow-8d120ab408475ea52678a65c5972ac37.yaml @@ -0,0 +1,58 @@ +id: responsive-logo-slideshow-8d120ab408475ea52678a65c5972ac37 + +info: + name: > + Responsive Logo Slideshow < 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db2d5cc4-70e9-4512-8004-b6735c2c3ee1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-logo-slideshow/" + google-query: inurl:"/wp-content/plugins/responsive-logo-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-logo-slideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-logo-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-logo-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-menu-05079d9697e3f59f6cb3b3fffd76d6cd.yaml b/nuclei-templates/cve-less/plugins/responsive-menu-05079d9697e3f59f6cb3b3fffd76d6cd.yaml new file mode 100644 index 0000000000..93275d9689 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-menu-05079d9697e3f59f6cb3b3fffd76d6cd.yaml @@ -0,0 +1,58 @@ +id: responsive-menu-05079d9697e3f59f6cb3b3fffd76d6cd + +info: + name: > + Responsive Menu <= 3.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bcf22c7-bea5-4108-8fb4-ff9ff566c618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-menu/" + google-query: inurl:"/wp-content/plugins/responsive-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-menu-35d0076e41c66587aa55b1dff00355a9.yaml b/nuclei-templates/cve-less/plugins/responsive-menu-35d0076e41c66587aa55b1dff00355a9.yaml new file mode 100644 index 0000000000..100470db2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-menu-35d0076e41c66587aa55b1dff00355a9.yaml @@ -0,0 +1,58 @@ +id: responsive-menu-35d0076e41c66587aa55b1dff00355a9 + +info: + name: > + Responsive Menu <= 4.0.3 - Cross-Site Request Forgery to Setting Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08ba0f2a-f3eb-4d79-abba-99e64df0fe4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-menu/" + google-query: inurl:"/wp-content/plugins/responsive-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-menu-6e39ce305d8fc46246730df95c49bc5a.yaml b/nuclei-templates/cve-less/plugins/responsive-menu-6e39ce305d8fc46246730df95c49bc5a.yaml new file mode 100644 index 0000000000..de9b8bdadc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-menu-6e39ce305d8fc46246730df95c49bc5a.yaml @@ -0,0 +1,58 @@ +id: responsive-menu-6e39ce305d8fc46246730df95c49bc5a + +info: + name: > + Responsive Menu <= 4.1.7 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a56df440-a1ed-4c5a-ac9c-5ddeffb28e60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-menu/" + google-query: inurl:"/wp-content/plugins/responsive-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-menu-7361a0798b6e7d91e3483a810ae46200.yaml b/nuclei-templates/cve-less/plugins/responsive-menu-7361a0798b6e7d91e3483a810ae46200.yaml new file mode 100644 index 0000000000..f64b569d43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-menu-7361a0798b6e7d91e3483a810ae46200.yaml @@ -0,0 +1,58 @@ +id: responsive-menu-7361a0798b6e7d91e3483a810ae46200 + +info: + name: > + Responsive Menu <= 4.0.3 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ac47137-eecf-4f85-a29d-88a86b2a9c48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-menu/" + google-query: inurl:"/wp-content/plugins/responsive-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-menu-dfaadc66129d4ea285875cfb5037ccde.yaml b/nuclei-templates/cve-less/plugins/responsive-menu-dfaadc66129d4ea285875cfb5037ccde.yaml new file mode 100644 index 0000000000..bba7b75156 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-menu-dfaadc66129d4ea285875cfb5037ccde.yaml @@ -0,0 +1,58 @@ +id: responsive-menu-dfaadc66129d4ea285875cfb5037ccde + +info: + name: > + Responsive Menu 4.0 - 4.0.3 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70d4041e-4b38-4be0-8e51-5a9db4d6c697?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-menu/" + google-query: inurl:"/wp-content/plugins/responsive-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.0', '<= 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-poll-7eb5e40a54b7b7c228b5d29ef47daaf0.yaml b/nuclei-templates/cve-less/plugins/responsive-poll-7eb5e40a54b7b7c228b5d29ef47daaf0.yaml new file mode 100644 index 0000000000..7ebbc5e833 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-poll-7eb5e40a54b7b7c228b5d29ef47daaf0.yaml @@ -0,0 +1,58 @@ +id: responsive-poll-7eb5e40a54b7b7c228b5d29ef47daaf0 + +info: + name: > + Responsive Poll < 1.7.6 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a646a582-7174-4172-a193-c1606c43e6a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-poll/" + google-query: inurl:"/wp-content/plugins/responsive-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-poll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-slick-slider-62cee29d32c85b3a5dc1219c65c05aa1.yaml b/nuclei-templates/cve-less/plugins/responsive-slick-slider-62cee29d32c85b3a5dc1219c65c05aa1.yaml new file mode 100644 index 0000000000..fe075d24b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-slick-slider-62cee29d32c85b3a5dc1219c65c05aa1.yaml @@ -0,0 +1,58 @@ +id: responsive-slick-slider-62cee29d32c85b3a5dc1219c65c05aa1 + +info: + name: > + Responsive Slick Slider WordPress <= 1.4 - Authenticated (Contributor+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c59f1784-da65-4e6d-b284-d65ee2196be9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-slick-slider/" + google-query: inurl:"/wp-content/plugins/responsive-slick-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-slick-slider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-slick-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-slick-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-tabs-1ad6aee2c1707dc46ec5695ab78feced.yaml b/nuclei-templates/cve-less/plugins/responsive-tabs-1ad6aee2c1707dc46ec5695ab78feced.yaml new file mode 100644 index 0000000000..f97a6ca91b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-tabs-1ad6aee2c1707dc46ec5695ab78feced.yaml @@ -0,0 +1,58 @@ +id: responsive-tabs-1ad6aee2c1707dc46ec5695ab78feced + +info: + name: > + Carousel Slider <= 2.2.6 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44a8b7fb-7c91-4a85-bf16-4371fde6945f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-tabs/" + google-query: inurl:"/wp-content/plugins/responsive-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-tabs-36493737cc718a786fc3dabd10944cc2.yaml b/nuclei-templates/cve-less/plugins/responsive-tabs-36493737cc718a786fc3dabd10944cc2.yaml new file mode 100644 index 0000000000..f6ca87f4c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-tabs-36493737cc718a786fc3dabd10944cc2.yaml @@ -0,0 +1,58 @@ +id: responsive-tabs-36493737cc718a786fc3dabd10944cc2 + +info: + name: > + Responsive Tabs <= 4.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b34a4aa-bcaa-4be5-a059-6f2efa3a8198?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-tabs/" + google-query: inurl:"/wp-content/plugins/responsive-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-tabs-7cfb9c8a38b02b5d1f8df2ea212c2f3b.yaml b/nuclei-templates/cve-less/plugins/responsive-tabs-7cfb9c8a38b02b5d1f8df2ea212c2f3b.yaml new file mode 100644 index 0000000000..c576c51bbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-tabs-7cfb9c8a38b02b5d1f8df2ea212c2f3b.yaml @@ -0,0 +1,58 @@ +id: responsive-tabs-7cfb9c8a38b02b5d1f8df2ea212c2f3b + +info: + name: > + Responsive Tabs <= 4.0.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14b334ee-ab3b-4b18-a776-c0831c4ff855?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-tabs/" + google-query: inurl:"/wp-content/plugins/responsive-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-tabs-dd8a374519ab8fd8464df00ba9945d8b.yaml b/nuclei-templates/cve-less/plugins/responsive-tabs-dd8a374519ab8fd8464df00ba9945d8b.yaml new file mode 100644 index 0000000000..2b82c51502 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-tabs-dd8a374519ab8fd8464df00ba9945d8b.yaml @@ -0,0 +1,58 @@ +id: responsive-tabs-dd8a374519ab8fd8464df00ba9945d8b + +info: + name: > + Responsive Tabs < 4.0.6 - Authenticated (Contributor+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9af12ac-68ef-4c65-aecb-82ce7b927340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-tabs/" + google-query: inurl:"/wp-content/plugins/responsive-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-tabs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-tabs-for-wpbakery-daa26206b4813de7be1eac00b5b9eaa0.yaml b/nuclei-templates/cve-less/plugins/responsive-tabs-for-wpbakery-daa26206b4813de7be1eac00b5b9eaa0.yaml new file mode 100644 index 0000000000..adcd8604d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-tabs-for-wpbakery-daa26206b4813de7be1eac00b5b9eaa0.yaml @@ -0,0 +1,58 @@ +id: responsive-tabs-for-wpbakery-daa26206b4813de7be1eac00b5b9eaa0 + +info: + name: > + Responsive Tabs For WPBakery Page Builder <= 1.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c3ddae-046a-4080-ac2b-90fb89fbff7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-tabs-for-wpbakery/" + google-query: inurl:"/wp-content/plugins/responsive-tabs-for-wpbakery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-tabs-for-wpbakery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-tabs-for-wpbakery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-tabs-for-wpbakery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsive-vector-maps-5fdd374f315987970f85f0248f2dd57a.yaml b/nuclei-templates/cve-less/plugins/responsive-vector-maps-5fdd374f315987970f85f0248f2dd57a.yaml new file mode 100644 index 0000000000..566a33c85f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsive-vector-maps-5fdd374f315987970f85f0248f2dd57a.yaml @@ -0,0 +1,58 @@ +id: responsive-vector-maps-5fdd374f315987970f85f0248f2dd57a + +info: + name: > + RVM - Responsive Vector Maps <= 6.4.1 - Subscriber+ Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e414a36f-7212-47b9-8e7f-6bf0ae6518af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsive-vector-maps/" + google-query: inurl:"/wp-content/plugins/responsive-vector-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsive-vector-maps,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsive-vector-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive-vector-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/responsivevoice-text-to-speech-7dc366f5379f56890e8af348e04eb10f.yaml b/nuclei-templates/cve-less/plugins/responsivevoice-text-to-speech-7dc366f5379f56890e8af348e04eb10f.yaml new file mode 100644 index 0000000000..22aa509e7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/responsivevoice-text-to-speech-7dc366f5379f56890e8af348e04eb10f.yaml @@ -0,0 +1,58 @@ +id: responsivevoice-text-to-speech-7dc366f5379f56890e8af348e04eb10f + +info: + name: > + ResponsiveVoice Text To Speech <= 1.7.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fc806fe-bf12-4e70-84a2-2027102e5b9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/responsivevoice-text-to-speech/" + google-query: inurl:"/wp-content/plugins/responsivevoice-text-to-speech/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,responsivevoice-text-to-speech,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/responsivevoice-text-to-speech/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsivevoice-text-to-speech" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rest-api-to-miniprogram-f45bff66b36c1cb9f233929a488ca421.yaml b/nuclei-templates/cve-less/plugins/rest-api-to-miniprogram-f45bff66b36c1cb9f233929a488ca421.yaml new file mode 100644 index 0000000000..4f91c078a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rest-api-to-miniprogram-f45bff66b36c1cb9f233929a488ca421.yaml @@ -0,0 +1,58 @@ +id: rest-api-to-miniprogram-f45bff66b36c1cb9f233929a488ca421 + +info: + name: > + REST API TO MiniProgram <= 4.6.8 - Authenticated (Subscriber+) Media Attachment Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/941cf3f8-20a0-4d41-8fce-1554653d98da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rest-api-to-miniprogram/" + google-query: inurl:"/wp-content/plugins/rest-api-to-miniprogram/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rest-api-to-miniprogram,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rest-api-to-miniprogram/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rest-api-to-miniprogram" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rest-routes-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/rest-routes-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..db3b5c97e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rest-routes-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: rest-routes-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rest-routes/" + google-query: inurl:"/wp-content/plugins/rest-routes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rest-routes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rest-routes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rest-routes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.24.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-86b13954ec743e9dcd370ce47777c030.yaml b/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-86b13954ec743e9dcd370ce47777c030.yaml new file mode 100644 index 0000000000..f474e7a956 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-86b13954ec743e9dcd370ce47777c030.yaml @@ -0,0 +1,58 @@ +id: restaurant-cafe-addon-for-elementor-86b13954ec743e9dcd370ce47777c030 + +info: + name: > + Restaurant & Cafe Addon for Elementor <= 1.5.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07712191-03b6-4de4-b0a4-e6f03ce9dc81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-cafe-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/restaurant-cafe-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-cafe-addon-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-cafe-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-cafe-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-a27c4dd18076acddac4a93fd8d6716aa.yaml b/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-a27c4dd18076acddac4a93fd8d6716aa.yaml new file mode 100644 index 0000000000..6bfd51fce0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-a27c4dd18076acddac4a93fd8d6716aa.yaml @@ -0,0 +1,58 @@ +id: restaurant-cafe-addon-for-elementor-a27c4dd18076acddac4a93fd8d6716aa + +info: + name: > + Restaurant & Cafe Addon for Elementor <= 1.5.3 - Missing Authorization via multiple AJAX functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad003d57-a573-473e-80a9-5bf60d42a707?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-cafe-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/restaurant-cafe-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-cafe-addon-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-cafe-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-cafe-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-b6712bac11e9ddea585e5254f026c8f1.yaml b/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-b6712bac11e9ddea585e5254f026c8f1.yaml new file mode 100644 index 0000000000..b9b8fc3881 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-b6712bac11e9ddea585e5254f026c8f1.yaml @@ -0,0 +1,58 @@ +id: restaurant-cafe-addon-for-elementor-b6712bac11e9ddea585e5254f026c8f1 + +info: + name: > + Restaurant & Cafe Addon for Elementor <= 1.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d986739-d6a5-491d-948f-4c58af75369a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-cafe-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/restaurant-cafe-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-cafe-addon-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-cafe-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-cafe-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4f16422ad5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-cafe-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: restaurant-cafe-addon-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-cafe-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/restaurant-cafe-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-cafe-addon-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-cafe-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-cafe-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-pickup-delivery-dine-in-fe4c4bb2122cdad1871934e83ec97820.yaml b/nuclei-templates/cve-less/plugins/restaurant-pickup-delivery-dine-in-fe4c4bb2122cdad1871934e83ec97820.yaml new file mode 100644 index 0000000000..df97a679db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-pickup-delivery-dine-in-fe4c4bb2122cdad1871934e83ec97820.yaml @@ -0,0 +1,58 @@ +id: restaurant-pickup-delivery-dine-in-fe4c4bb2122cdad1871934e83ec97820 + +info: + name: > + Pickup | Delivery | Dine-in date time <= 1.0.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/936803ab-93d5-4808-8758-6b8f7c01b3c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-pickup-delivery-dine-in/" + google-query: inurl:"/wp-content/plugins/restaurant-pickup-delivery-dine-in/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-pickup-delivery-dine-in,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-pickup-delivery-dine-in/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-pickup-delivery-dine-in" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-reservations-2357694d03c405e4b8e1df1be34f5e9f.yaml b/nuclei-templates/cve-less/plugins/restaurant-reservations-2357694d03c405e4b8e1df1be34f5e9f.yaml new file mode 100644 index 0000000000..79f0641649 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-reservations-2357694d03c405e4b8e1df1be34f5e9f.yaml @@ -0,0 +1,58 @@ +id: restaurant-reservations-2357694d03c405e4b8e1df1be34f5e9f + +info: + name: > + Five Star Restaurant Reservations <= 2.4.7 - Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e61538-0bd9-4319-ba71-a72c9039f4d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-reservations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-reservations-2e12923b4994409fb95da9b1bf700385.yaml b/nuclei-templates/cve-less/plugins/restaurant-reservations-2e12923b4994409fb95da9b1bf700385.yaml new file mode 100644 index 0000000000..358f20709e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-reservations-2e12923b4994409fb95da9b1bf700385.yaml @@ -0,0 +1,58 @@ +id: restaurant-reservations-2e12923b4994409fb95da9b1bf700385 + +info: + name: > + Five Star Restaurant Reservations <= 2.6.16 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62a79a8e-905c-4bed-b24d-84e56d7bb850?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-reservations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-reservations-381a1cb122afb3c93e4a0ba82f88d009.yaml b/nuclei-templates/cve-less/plugins/restaurant-reservations-381a1cb122afb3c93e4a0ba82f88d009.yaml new file mode 100644 index 0000000000..fbbc1581d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-reservations-381a1cb122afb3c93e4a0ba82f88d009.yaml @@ -0,0 +1,58 @@ +id: restaurant-reservations-381a1cb122afb3c93e4a0ba82f88d009 + +info: + name: > + Five Star Restaurant Reservations <= 2.6.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d420e73-24d5-4da8-8257-e0c7f0273031?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-reservations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-reservations-cb138827efa994e4ab1f824349c2d29b.yaml b/nuclei-templates/cve-less/plugins/restaurant-reservations-cb138827efa994e4ab1f824349c2d29b.yaml new file mode 100644 index 0000000000..6d03856d64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-reservations-cb138827efa994e4ab1f824349c2d29b.yaml @@ -0,0 +1,58 @@ +id: restaurant-reservations-cb138827efa994e4ab1f824349c2d29b + +info: + name: > + Five Star Restaurant Reservations <= 2.4.11 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fe257e6-4bdf-49ef-adbb-f82ce378e3e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-reservations/" + google-query: inurl:"/wp-content/plugins/restaurant-reservations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-reservations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-reservations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-reservations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restaurant-solutions-checklist-49049729ee40c19e1754ddd17e7749a5.yaml b/nuclei-templates/cve-less/plugins/restaurant-solutions-checklist-49049729ee40c19e1754ddd17e7749a5.yaml new file mode 100644 index 0000000000..366e347d2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restaurant-solutions-checklist-49049729ee40c19e1754ddd17e7749a5.yaml @@ -0,0 +1,58 @@ +id: restaurant-solutions-checklist-49049729ee40c19e1754ddd17e7749a5 + +info: + name: > + Restaurant Solutions – Checklist 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dca7f2e-f572-468a-8342-a6e096441561?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restaurant-solutions-checklist/" + google-query: inurl:"/wp-content/plugins/restaurant-solutions-checklist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restaurant-solutions-checklist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restaurant-solutions-checklist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-solutions-checklist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-categories-29ad4ef137c9211b84960b488500f18e.yaml b/nuclei-templates/cve-less/plugins/restrict-categories-29ad4ef137c9211b84960b488500f18e.yaml new file mode 100644 index 0000000000..d55b7b8a1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-categories-29ad4ef137c9211b84960b488500f18e.yaml @@ -0,0 +1,58 @@ +id: restrict-categories-29ad4ef137c9211b84960b488500f18e + +info: + name: > + Restrict Categories <= 2.6.4 - Reflected Cross-Site Scripting via rc-search + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45671cab-f719-4ee6-af81-7c19b37b8d91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-categories/" + google-query: inurl:"/wp-content/plugins/restrict-categories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-categories,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-categories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-categories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-content-69f3351aa6a5162d89a81a8e42b30fee.yaml b/nuclei-templates/cve-less/plugins/restrict-content-69f3351aa6a5162d89a81a8e42b30fee.yaml new file mode 100644 index 0000000000..1fb4765b32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-content-69f3351aa6a5162d89a81a8e42b30fee.yaml @@ -0,0 +1,58 @@ +id: restrict-content-69f3351aa6a5162d89a81a8e42b30fee + +info: + name: > + Restrict Content <= 3.2.2 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79bb311d-d10d-4e4e-b690-84c0051b9911?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-content/" + google-query: inurl:"/wp-content/plugins/restrict-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-content,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-content-b9186cec24d42bc1865829817db744a2.yaml b/nuclei-templates/cve-less/plugins/restrict-content-b9186cec24d42bc1865829817db744a2.yaml new file mode 100644 index 0000000000..7346280d1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-content-b9186cec24d42bc1865829817db744a2.yaml @@ -0,0 +1,58 @@ +id: restrict-content-b9186cec24d42bc1865829817db744a2 + +info: + name: > + Restrict Content <= 3.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfbd41fa-15f0-473a-be5a-862e8a14b287?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-content/" + google-query: inurl:"/wp-content/plugins/restrict-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-content-bf0fefcefc90da6dc2662202215f7095.yaml b/nuclei-templates/cve-less/plugins/restrict-content-bf0fefcefc90da6dc2662202215f7095.yaml new file mode 100644 index 0000000000..be94f64f2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-content-bf0fefcefc90da6dc2662202215f7095.yaml @@ -0,0 +1,58 @@ +id: restrict-content-bf0fefcefc90da6dc2662202215f7095 + +info: + name: > + Restrict Content <= 3.2.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e5f3eac-d2da-43ea-9303-731d78102372?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-content/" + google-query: inurl:"/wp-content/plugins/restrict-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-content,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-content-c6aeb8f23d8123cc999647a0e011d5c1.yaml b/nuclei-templates/cve-less/plugins/restrict-content-c6aeb8f23d8123cc999647a0e011d5c1.yaml new file mode 100644 index 0000000000..61f756d88b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-content-c6aeb8f23d8123cc999647a0e011d5c1.yaml @@ -0,0 +1,58 @@ +id: restrict-content-c6aeb8f23d8123cc999647a0e011d5c1 + +info: + name: > + Restrict Content <= 3.2.7 - Information Exposure via legacy log file + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad2d5070-ddc6-4478-abe5-776e197a4507?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-content/" + google-query: inurl:"/wp-content/plugins/restrict-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-content,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-user-access-1003a4422a3ca5fc014222d5d79884b1.yaml b/nuclei-templates/cve-less/plugins/restrict-user-access-1003a4422a3ca5fc014222d5d79884b1.yaml new file mode 100644 index 0000000000..dd8dbafedd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-user-access-1003a4422a3ca5fc014222d5d79884b1.yaml @@ -0,0 +1,58 @@ +id: restrict-user-access-1003a4422a3ca5fc014222d5d79884b1 + +info: + name: > + Restrict User Access – Ultimate Membership & Content Protection <= 2.5 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-user-access/" + google-query: inurl:"/wp-content/plugins/restrict-user-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-user-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-user-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-user-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-user-access-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/restrict-user-access-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..52f95b5f26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-user-access-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: restrict-user-access-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-user-access/" + google-query: inurl:"/wp-content/plugins/restrict-user-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-user-access,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-user-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-user-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-user-access-c66270d1aaf4c8bec88be3444d5d8440.yaml b/nuclei-templates/cve-less/plugins/restrict-user-access-c66270d1aaf4c8bec88be3444d5d8440.yaml new file mode 100644 index 0000000000..38b55ab824 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-user-access-c66270d1aaf4c8bec88be3444d5d8440.yaml @@ -0,0 +1,58 @@ +id: restrict-user-access-c66270d1aaf4c8bec88be3444d5d8440 + +info: + name: > + Restrict User Access – Membership Plugin with Force <= 2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17ffdd6d-3c6c-4f47-9f1c-a0f4c0f5fcdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-user-access/" + google-query: inurl:"/wp-content/plugins/restrict-user-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-user-access,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-user-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-user-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restrict-usernames-emails-characters-00fcc0e6d0a51f0c0f6ca9266dccfbaf.yaml b/nuclei-templates/cve-less/plugins/restrict-usernames-emails-characters-00fcc0e6d0a51f0c0f6ca9266dccfbaf.yaml new file mode 100644 index 0000000000..2536abb052 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restrict-usernames-emails-characters-00fcc0e6d0a51f0c0f6ca9266dccfbaf.yaml @@ -0,0 +1,58 @@ +id: restrict-usernames-emails-characters-00fcc0e6d0a51f0c0f6ca9266dccfbaf + +info: + name: > + Restrict Usernames Emails Characters <= 3.1.3 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12532f84-bc76-4968-a01f-f879ab41b901?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restrict-usernames-emails-characters/" + google-query: inurl:"/wp-content/plugins/restrict-usernames-emails-characters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restrict-usernames-emails-characters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restrict-usernames-emails-characters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restrict-usernames-emails-characters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restricted-content-277d2735251bde1d7660b619defc33af.yaml b/nuclei-templates/cve-less/plugins/restricted-content-277d2735251bde1d7660b619defc33af.yaml new file mode 100644 index 0000000000..e77b64a6c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restricted-content-277d2735251bde1d7660b619defc33af.yaml @@ -0,0 +1,58 @@ +id: restricted-content-277d2735251bde1d7660b619defc33af + +info: + name: > + Restrict <= 2.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62029ce5-ab97-4594-93e6-469ef5692320?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restricted-content/" + google-query: inurl:"/wp-content/plugins/restricted-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restricted-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restricted-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restricted-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restricted-content-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/restricted-content-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f1c224e3ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restricted-content-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: restricted-content-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restricted-content/" + google-query: inurl:"/wp-content/plugins/restricted-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restricted-content,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restricted-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restricted-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restricted-site-access-0046efcaf372ceea3cbda093fc9866d7.yaml b/nuclei-templates/cve-less/plugins/restricted-site-access-0046efcaf372ceea3cbda093fc9866d7.yaml new file mode 100644 index 0000000000..df7555fa35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restricted-site-access-0046efcaf372ceea3cbda093fc9866d7.yaml @@ -0,0 +1,58 @@ +id: restricted-site-access-0046efcaf372ceea3cbda093fc9866d7 + +info: + name: > + webpack JS package <= 5.75.0 - Sandbox Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cda31a4-4c79-4567-a527-6510c31d2843?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restricted-site-access/" + google-query: inurl:"/wp-content/plugins/restricted-site-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restricted-site-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restricted-site-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restricted-site-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restricted-site-access-1951707b594e6f4a4e8e4243b43c9841.yaml b/nuclei-templates/cve-less/plugins/restricted-site-access-1951707b594e6f4a4e8e4243b43c9841.yaml new file mode 100644 index 0000000000..03ca3210dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restricted-site-access-1951707b594e6f4a4e8e4243b43c9841.yaml @@ -0,0 +1,58 @@ +id: restricted-site-access-1951707b594e6f4a4e8e4243b43c9841 + +info: + name: > + loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb93138-f2f9-4a3f-a0a2-d79a315c44f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restricted-site-access/" + google-query: inurl:"/wp-content/plugins/restricted-site-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restricted-site-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restricted-site-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restricted-site-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restricted-site-access-bd26ccd939104e13f73f569b312459d6.yaml b/nuclei-templates/cve-less/plugins/restricted-site-access-bd26ccd939104e13f73f569b312459d6.yaml new file mode 100644 index 0000000000..8eebff1b4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restricted-site-access-bd26ccd939104e13f73f569b312459d6.yaml @@ -0,0 +1,58 @@ +id: restricted-site-access-bd26ccd939104e13f73f569b312459d6 + +info: + name: > + loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2954a007-37ac-4811-a258-b3fdd738043f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restricted-site-access/" + google-query: inurl:"/wp-content/plugins/restricted-site-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restricted-site-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restricted-site-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restricted-site-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restricted-site-access-efb14ebe0992b6c3f6efdf7585df67a0.yaml b/nuclei-templates/cve-less/plugins/restricted-site-access-efb14ebe0992b6c3f6efdf7585df67a0.yaml new file mode 100644 index 0000000000..fc1ca55c32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restricted-site-access-efb14ebe0992b6c3f6efdf7585df67a0.yaml @@ -0,0 +1,58 @@ +id: restricted-site-access-efb14ebe0992b6c3f6efdf7585df67a0 + +info: + name: > + Restricted Site Access <= 7.3.1 - Access Bypass via IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd9e0044-263e-453a-b9e5-b3c6b98e90be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restricted-site-access/" + google-query: inurl:"/wp-content/plugins/restricted-site-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restricted-site-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restricted-site-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restricted-site-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restropress-7045891b02879797f89361d3201b5ab1.yaml b/nuclei-templates/cve-less/plugins/restropress-7045891b02879797f89361d3201b5ab1.yaml new file mode 100644 index 0000000000..ac2b898156 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restropress-7045891b02879797f89361d3201b5ab1.yaml @@ -0,0 +1,58 @@ +id: restropress-7045891b02879797f89361d3201b5ab1 + +info: + name: > + RestroPress <= 2.8.2 - Cross-Site Request Forgery to Cart Manipulation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80c9f2e3-afdc-4ba2-a1ef-4c1d166d0757?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restropress/" + google-query: inurl:"/wp-content/plugins/restropress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restropress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restropress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restropress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restropress-915182a6d2a256cbd187d2f4b8b4f74c.yaml b/nuclei-templates/cve-less/plugins/restropress-915182a6d2a256cbd187d2f4b8b4f74c.yaml new file mode 100644 index 0000000000..87b6bcadfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restropress-915182a6d2a256cbd187d2f4b8b4f74c.yaml @@ -0,0 +1,58 @@ +id: restropress-915182a6d2a256cbd187d2f4b8b4f74c + +info: + name: > + RestroPress <= 3.1.2 - Cross-Site Request Forgery via rpress_orders_list_table_process_bulk_actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2e92646-bb71-4cf1-b826-e749693b0c0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restropress/" + google-query: inurl:"/wp-content/plugins/restropress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restropress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restropress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restropress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/restropress-a008c3a52fa94300e9ec331bd11a1546.yaml b/nuclei-templates/cve-less/plugins/restropress-a008c3a52fa94300e9ec331bd11a1546.yaml new file mode 100644 index 0000000000..6efa5eaa31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/restropress-a008c3a52fa94300e9ec331bd11a1546.yaml @@ -0,0 +1,58 @@ +id: restropress-a008c3a52fa94300e9ec331bd11a1546 + +info: + name: > + RestroPress <= 2.8.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd12ce4a-585d-4e26-88fb-1ab9dcc8727d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/restropress/" + google-query: inurl:"/wp-content/plugins/restropress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,restropress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/restropress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restropress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resume-builder-3cd33ca20c9c9eda3e3eb14910cde0f4.yaml b/nuclei-templates/cve-less/plugins/resume-builder-3cd33ca20c9c9eda3e3eb14910cde0f4.yaml new file mode 100644 index 0000000000..7d16d98c2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resume-builder-3cd33ca20c9c9eda3e3eb14910cde0f4.yaml @@ -0,0 +1,58 @@ +id: resume-builder-3cd33ca20c9c9eda3e3eb14910cde0f4 + +info: + name: > + Resume Builder <= 3.1.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3005c53e-eb09-479f-a4e4-b8d40583d80d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resume-builder/" + google-query: inurl:"/wp-content/plugins/resume-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resume-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resume-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resume-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resume-submissions-job-postings-5de4daf9f0d92df126da3ff853382c5a.yaml b/nuclei-templates/cve-less/plugins/resume-submissions-job-postings-5de4daf9f0d92df126da3ff853382c5a.yaml new file mode 100644 index 0000000000..2d0c6ad33d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resume-submissions-job-postings-5de4daf9f0d92df126da3ff853382c5a.yaml @@ -0,0 +1,58 @@ +id: resume-submissions-job-postings-5de4daf9f0d92df126da3ff853382c5a + +info: + name: > + Resume Submissions & Job Postings < 2.5.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50537e01-834e-4247-a80f-daa114eedcf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resume-submissions-job-postings/" + google-query: inurl:"/wp-content/plugins/resume-submissions-job-postings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resume-submissions-job-postings,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resume-submissions-job-postings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resume-submissions-job-postings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resume-submissions-job-postings-91bd3f9499da9e21fc35c9c04bbb9fa2.yaml b/nuclei-templates/cve-less/plugins/resume-submissions-job-postings-91bd3f9499da9e21fc35c9c04bbb9fa2.yaml new file mode 100644 index 0000000000..8a1d256d06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resume-submissions-job-postings-91bd3f9499da9e21fc35c9c04bbb9fa2.yaml @@ -0,0 +1,58 @@ +id: resume-submissions-job-postings-91bd3f9499da9e21fc35c9c04bbb9fa2 + +info: + name: > + Resume Submissions & Job Postings Plugin <= 2.5.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b100ba5a-8aad-4aa1-98bf-a09c5bde7bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resume-submissions-job-postings/" + google-query: inurl:"/wp-content/plugins/resume-submissions-job-postings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resume-submissions-job-postings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resume-submissions-job-postings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resume-submissions-job-postings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resume-upload-form-a0e2c0524dc803cf1690a2292b288992.yaml b/nuclei-templates/cve-less/plugins/resume-upload-form-a0e2c0524dc803cf1690a2292b288992.yaml new file mode 100644 index 0000000000..cbe45ccbda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resume-upload-form-a0e2c0524dc803cf1690a2292b288992.yaml @@ -0,0 +1,58 @@ +id: resume-upload-form-a0e2c0524dc803cf1690a2292b288992 + +info: + name: > + Upload Resume <= 1.2.0 - Captcha Bypass via resume_upload_form + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc0acff9-6852-4ecb-84f9-98a15dd30fc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resume-upload-form/" + google-query: inurl:"/wp-content/plugins/resume-upload-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resume-upload-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resume-upload-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resume-upload-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/resume-upload-form-accdbc7387e8cd352346b508525444ba.yaml b/nuclei-templates/cve-less/plugins/resume-upload-form-accdbc7387e8cd352346b508525444ba.yaml new file mode 100644 index 0000000000..452e92e217 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/resume-upload-form-accdbc7387e8cd352346b508525444ba.yaml @@ -0,0 +1,58 @@ +id: resume-upload-form-accdbc7387e8cd352346b508525444ba + +info: + name: > + Upload Resume <= 1.2.0 - Authenticated Sensitive Information Disclosure via resume_upload_form_list shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8246ea9f-3ccb-4448-bf32-135c8140b09b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/resume-upload-form/" + google-query: inurl:"/wp-content/plugins/resume-upload-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,resume-upload-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/resume-upload-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resume-upload-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/retain-3c6cc9490d009d5c5e5a38130b58bb8c.yaml b/nuclei-templates/cve-less/plugins/retain-3c6cc9490d009d5c5e5a38130b58bb8c.yaml new file mode 100644 index 0000000000..d23a12d67d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/retain-3c6cc9490d009d5c5e5a38130b58bb8c.yaml @@ -0,0 +1,58 @@ +id: retain-3c6cc9490d009d5c5e5a38130b58bb8c + +info: + name: > + Retain Live Chat <= 0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d276502-6154-468e-b028-eadf29debe56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/retain/" + google-query: inurl:"/wp-content/plugins/retain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,retain,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/retain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "retain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/retro-winamp-block-bc55ea7b509124d1a77831d4400c5030.yaml b/nuclei-templates/cve-less/plugins/retro-winamp-block-bc55ea7b509124d1a77831d4400c5030.yaml new file mode 100644 index 0000000000..ad11524726 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/retro-winamp-block-bc55ea7b509124d1a77831d4400c5030.yaml @@ -0,0 +1,58 @@ +id: retro-winamp-block-bc55ea7b509124d1a77831d4400c5030 + +info: + name: > + simple-git < 3.16.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46fdd494-8073-4a68-a4ab-1f5767011f67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/retro-winamp-block/" + google-query: inurl:"/wp-content/plugins/retro-winamp-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,retro-winamp-block,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/retro-winamp-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "retro-winamp-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/retro-winamp-block-c3dca1d1ef3a946c9ddf3e33caa00021.yaml b/nuclei-templates/cve-less/plugins/retro-winamp-block-c3dca1d1ef3a946c9ddf3e33caa00021.yaml new file mode 100644 index 0000000000..acad59c68e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/retro-winamp-block-c3dca1d1ef3a946c9ddf3e33caa00021.yaml @@ -0,0 +1,58 @@ +id: retro-winamp-block-c3dca1d1ef3a946c9ddf3e33caa00021 + +info: + name: > + terser (JS Package) < 5.14.2 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c08c10-7358-4618-b892-7d222ba460de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/retro-winamp-block/" + google-query: inurl:"/wp-content/plugins/retro-winamp-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,retro-winamp-block,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/retro-winamp-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "retro-winamp-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/retro-winamp-block-f9078038dec7d199edb0413f76661495.yaml b/nuclei-templates/cve-less/plugins/retro-winamp-block-f9078038dec7d199edb0413f76661495.yaml new file mode 100644 index 0000000000..3937761b5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/retro-winamp-block-f9078038dec7d199edb0413f76661495.yaml @@ -0,0 +1,58 @@ +id: retro-winamp-block-f9078038dec7d199edb0413f76661495 + +info: + name: > + Terser < 4.8.1 and 5.0.0-5.14.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d535c069-cfa3-4c41-9a01-b4c4e7c75764?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/retro-winamp-block/" + google-query: inurl:"/wp-content/plugins/retro-winamp-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,retro-winamp-block,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/retro-winamp-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "retro-winamp-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reusable-blocks-extended-ebc582d4f12fc14b9a1428f77cdbf053.yaml b/nuclei-templates/cve-less/plugins/reusable-blocks-extended-ebc582d4f12fc14b9a1428f77cdbf053.yaml new file mode 100644 index 0000000000..8205d606e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reusable-blocks-extended-ebc582d4f12fc14b9a1428f77cdbf053.yaml @@ -0,0 +1,58 @@ +id: reusable-blocks-extended-ebc582d4f12fc14b9a1428f77cdbf053 + +info: + name: > + Reusable Blocks Extended <= 0.9 - Cross-Site Request Forgery via reblex_reusable_screen_block_pattern_registration + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67c2cac8-c3cf-46d1-a592-229081bc31e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reusable-blocks-extended/" + google-query: inurl:"/wp-content/plugins/reusable-blocks-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reusable-blocks-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reusable-blocks-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reusable-blocks-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reusable-text-blocks-ccb9140dfd14809f1b9eb83224f5c145.yaml b/nuclei-templates/cve-less/plugins/reusable-text-blocks-ccb9140dfd14809f1b9eb83224f5c145.yaml new file mode 100644 index 0000000000..3dcf68b60c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reusable-text-blocks-ccb9140dfd14809f1b9eb83224f5c145.yaml @@ -0,0 +1,58 @@ +id: reusable-text-blocks-ccb9140dfd14809f1b9eb83224f5c145 + +info: + name: > + Reusable Text Blocks <= 1.5.3 - Authenticated (Author+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d627ee7-1175-4621-a477-1e9ec2d05eee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reusable-text-blocks/" + google-query: inurl:"/wp-content/plugins/reusable-text-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reusable-text-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reusable-text-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reusable-text-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revampcrm-woocommerce-91eeb175efe504db40acff5c5fa662ef.yaml b/nuclei-templates/cve-less/plugins/revampcrm-woocommerce-91eeb175efe504db40acff5c5fa662ef.yaml new file mode 100644 index 0000000000..783fed4ac1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revampcrm-woocommerce-91eeb175efe504db40acff5c5fa662ef.yaml @@ -0,0 +1,58 @@ +id: revampcrm-woocommerce-91eeb175efe504db40acff5c5fa662ef + +info: + name: > + Revamp CRM for WooCommerce < 1.0.4 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d5dfccd-74ab-4de9-8ea6-58908865086d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revampcrm-woocommerce/" + google-query: inurl:"/wp-content/plugins/revampcrm-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revampcrm-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revampcrm-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revampcrm-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-buddypress-groups-b51b043ae0bd51e5c02a86aef7693c29.yaml b/nuclei-templates/cve-less/plugins/review-buddypress-groups-b51b043ae0bd51e5c02a86aef7693c29.yaml new file mode 100644 index 0000000000..92a6fc5ab1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-buddypress-groups-b51b043ae0bd51e5c02a86aef7693c29.yaml @@ -0,0 +1,58 @@ +id: review-buddypress-groups-b51b043ae0bd51e5c02a86aef7693c29 + +info: + name: > + Wbcom Designs – BuddyPress Group Reviews <= 2.8.3 - Unauthorized AJAX Actions due to Nonce Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/397dabc3-5dcf-4d1f-9e24-28af889cb76f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-buddypress-groups/" + google-query: inurl:"/wp-content/plugins/review-buddypress-groups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-buddypress-groups,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-buddypress-groups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-buddypress-groups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-buddypress-groups-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/review-buddypress-groups-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..6af13cc89f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-buddypress-groups-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: review-buddypress-groups-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-buddypress-groups/" + google-query: inurl:"/wp-content/plugins/review-buddypress-groups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-buddypress-groups,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-buddypress-groups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-buddypress-groups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-buddypress-groups-df796716cdd12b786f639a85872402ce.yaml b/nuclei-templates/cve-less/plugins/review-buddypress-groups-df796716cdd12b786f639a85872402ce.yaml new file mode 100644 index 0000000000..91678d13da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-buddypress-groups-df796716cdd12b786f639a85872402ce.yaml @@ -0,0 +1,58 @@ +id: review-buddypress-groups-df796716cdd12b786f639a85872402ce + +info: + name: > + Wbcom Designs – BuddyPress Group Reviews <= 2.8.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d7de93c-f642-4870-b2f9-5070fdccd26b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-buddypress-groups/" + google-query: inurl:"/wp-content/plugins/review-buddypress-groups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-buddypress-groups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-buddypress-groups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-buddypress-groups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-engine-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/review-engine-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..260c0aa754 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-engine-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: review-engine-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-engine/" + google-query: inurl:"/wp-content/plugins/review-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-engine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/review-engine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..325b532ae2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-engine-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: review-engine-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-engine/" + google-query: inurl:"/wp-content/plugins/review-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-schema-6a28dfe4469613c00410a3afcd856457.yaml b/nuclei-templates/cve-less/plugins/review-schema-6a28dfe4469613c00410a3afcd856457.yaml new file mode 100644 index 0000000000..9933019e09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-schema-6a28dfe4469613c00410a3afcd856457.yaml @@ -0,0 +1,58 @@ +id: review-schema-6a28dfe4469613c00410a3afcd856457 + +info: + name: > + WordPress Review & Structure Data Schema Plugin – Review Schema <= 2.1.14 - Missing Authorization to Arbitrary Review Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7039206-a25a-4aa0-87e2-be11dd1f12eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-schema/" + google-query: inurl:"/wp-content/plugins/review-schema/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-schema,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-schema/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-schema" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-stream-f9cb3c789647691d2de33bca14ad9edd.yaml b/nuclei-templates/cve-less/plugins/review-stream-f9cb3c789647691d2de33bca14ad9edd.yaml new file mode 100644 index 0000000000..c3a9d8cf60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-stream-f9cb3c789647691d2de33bca14ad9edd.yaml @@ -0,0 +1,58 @@ +id: review-stream-f9cb3c789647691d2de33bca14ad9edd + +info: + name: > + Review Stream <= 1.6.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b645d0e-daee-4926-af47-05cacf811fbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-stream/" + google-query: inurl:"/wp-content/plugins/review-stream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-stream,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-stream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-stream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-airbnb-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-airbnb-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..e5bccef50b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-airbnb-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-airbnb-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-airbnb/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-airbnb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-airbnb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-airbnb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-airbnb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-amazon-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-amazon-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..b73ef494e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-amazon-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-amazon-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-amazon/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-amazon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-amazon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-amazon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-amazon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-arukereso-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-arukereso-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..7b7e8e1652 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-arukereso-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-arukereso-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-arukereso/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-arukereso/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-arukereso,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-arukereso/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-arukereso" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-booking-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-booking-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..d0c75ab460 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-booking-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-booking-com-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-booking-com/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-booking-com/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-booking-com,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-booking-com/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-booking-com" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-capterra-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-capterra-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..7b991b3e94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-capterra-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-capterra-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-capterra/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-capterra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-capterra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-capterra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-capterra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-foursquare-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-foursquare-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..a2874f53c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-foursquare-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-foursquare-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-foursquare/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-foursquare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-foursquare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-foursquare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-foursquare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-hotels-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-hotels-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..3c1b34ee90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-hotels-com-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-hotels-com-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-hotels-com/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-hotels-com/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-hotels-com,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-hotels-com/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-hotels-com" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-opentable-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-opentable-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..5944aab42f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-opentable-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-opentable-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-opentable/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-opentable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-opentable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-opentable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-opentable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-szallas-hu-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-szallas-hu-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..91ef2becc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-szallas-hu-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-szallas-hu-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-szallas-hu/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-szallas-hu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-szallas-hu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-szallas-hu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-szallas-hu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/review-widgets-for-tripadvisor-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/review-widgets-for-tripadvisor-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..ca95718d72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/review-widgets-for-tripadvisor-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: review-widgets-for-tripadvisor-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/review-widgets-for-tripadvisor/" + google-query: inurl:"/wp-content/plugins/review-widgets-for-tripadvisor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,review-widgets-for-tripadvisor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/review-widgets-for-tripadvisor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "review-widgets-for-tripadvisor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/reviewpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..108d7220e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: reviewpress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewpress/" + google-query: inurl:"/wp-content/plugins/reviewpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/reviewpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..58dcbcf593 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: reviewpress-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewpress/" + google-query: inurl:"/wp-content/plugins/reviewpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviews-plus-153f878c481a2d3c062b001804128554.yaml b/nuclei-templates/cve-less/plugins/reviews-plus-153f878c481a2d3c062b001804128554.yaml new file mode 100644 index 0000000000..e245910b88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviews-plus-153f878c481a2d3c062b001804128554.yaml @@ -0,0 +1,58 @@ +id: reviews-plus-153f878c481a2d3c062b001804128554 + +info: + name: > + Reviews Plus <= 1.3.4 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c3fe739-eed0-432c-8608-50dc08ef1456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviews-plus/" + google-query: inurl:"/wp-content/plugins/reviews-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviews-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviews-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviews-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviews-plus-b033ee29eabf26b20084a86d35b9d877.yaml b/nuclei-templates/cve-less/plugins/reviews-plus-b033ee29eabf26b20084a86d35b9d877.yaml new file mode 100644 index 0000000000..fd0fbf11eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviews-plus-b033ee29eabf26b20084a86d35b9d877.yaml @@ -0,0 +1,58 @@ +id: reviews-plus-b033ee29eabf26b20084a86d35b9d877 + +info: + name: > + Reviews Plus < 1.2.14 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52fb128f-d846-478e-bf9a-cbc3fe8ce89d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviews-plus/" + google-query: inurl:"/wp-content/plugins/reviews-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviews-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviews-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviews-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviews-widgets-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/reviews-widgets-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..6adbfe0275 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviews-widgets-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: reviews-widgets-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviews-widgets/" + google-query: inurl:"/wp-content/plugins/reviews-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviews-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviews-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviews-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviews-widgets-for-yelp-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/reviews-widgets-for-yelp-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..594e7a9aed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviews-widgets-for-yelp-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: reviews-widgets-for-yelp-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviews-widgets-for-yelp/" + google-query: inurl:"/wp-content/plugins/reviews-widgets-for-yelp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviews-widgets-for-yelp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviews-widgets-for-yelp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviews-widgets-for-yelp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewx-119c0f69d5b8485973b55dbcfc907989.yaml b/nuclei-templates/cve-less/plugins/reviewx-119c0f69d5b8485973b55dbcfc907989.yaml new file mode 100644 index 0000000000..610f7d108d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewx-119c0f69d5b8485973b55dbcfc907989.yaml @@ -0,0 +1,58 @@ +id: reviewx-119c0f69d5b8485973b55dbcfc907989 + +info: + name: > + ReviewX <= 1.6.7 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc465757-4295-4a75-90f6-92c4be4e8944?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewx/" + google-query: inurl:"/wp-content/plugins/reviewx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewx,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewx-1589d579faac8c7d72195578a8342786.yaml b/nuclei-templates/cve-less/plugins/reviewx-1589d579faac8c7d72195578a8342786.yaml new file mode 100644 index 0000000000..900072bdb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewx-1589d579faac8c7d72195578a8342786.yaml @@ -0,0 +1,58 @@ +id: reviewx-1589d579faac8c7d72195578a8342786 + +info: + name: > + ReviewX <= 1.6.13 - Arbitrary Usermeta Update to Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70e1d701-2cff-4793-9e4c-5b16a4038e8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewx/" + google-query: inurl:"/wp-content/plugins/reviewx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewx,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewx-1f09731ddd1d1af88db90bbc4fec3ba8.yaml b/nuclei-templates/cve-less/plugins/reviewx-1f09731ddd1d1af88db90bbc4fec3ba8.yaml new file mode 100644 index 0000000000..e608f7775f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewx-1f09731ddd1d1af88db90bbc4fec3ba8.yaml @@ -0,0 +1,58 @@ +id: reviewx-1f09731ddd1d1af88db90bbc4fec3ba8 + +info: + name: > + ReviewX <= 1.6.21 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08f4445b-9c79-42e3-be45-d07f72c00a01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewx/" + google-query: inurl:"/wp-content/plugins/reviewx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewx,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewx-6663c4e8258a97ca80d8e61f0b37ac68.yaml b/nuclei-templates/cve-less/plugins/reviewx-6663c4e8258a97ca80d8e61f0b37ac68.yaml new file mode 100644 index 0000000000..239e7eb5b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewx-6663c4e8258a97ca80d8e61f0b37ac68.yaml @@ -0,0 +1,58 @@ +id: reviewx-6663c4e8258a97ca80d8e61f0b37ac68 + +info: + name: > + ReviewX <= 1.6.17 - Missing Authorization in rx_coupon_from_submit + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a9f4fb7-92f5-4136-9ca3-cf7bf5c0b717?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewx/" + google-query: inurl:"/wp-content/plugins/reviewx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewx,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewx-6a99396550744ae560a5320a1b153079.yaml b/nuclei-templates/cve-less/plugins/reviewx-6a99396550744ae560a5320a1b153079.yaml new file mode 100644 index 0000000000..1acfb5afe6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewx-6a99396550744ae560a5320a1b153079.yaml @@ -0,0 +1,58 @@ +id: reviewx-6a99396550744ae560a5320a1b153079 + +info: + name: > + ReviewX – Multi-criteria Rating & Reviews for WooCommerce <= 1.6.8 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/072092ef-17bc-4b8b-bf8b-bd69a761c56a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewx/" + google-query: inurl:"/wp-content/plugins/reviewx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewx,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewx-ada9bfaee2bdcdae8c612fda04e8585f.yaml b/nuclei-templates/cve-less/plugins/reviewx-ada9bfaee2bdcdae8c612fda04e8585f.yaml new file mode 100644 index 0000000000..6060117775 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewx-ada9bfaee2bdcdae8c612fda04e8585f.yaml @@ -0,0 +1,58 @@ +id: reviewx-ada9bfaee2bdcdae8c612fda04e8585f + +info: + name: > + ReviewX <= 1.6.22 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15c1d7e1-e510-4cba-8da1-79e18b2eed22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewx/" + google-query: inurl:"/wp-content/plugins/reviewx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewx,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/reviewx-d13b6e0194ead1aa761a79dc4de31982.yaml b/nuclei-templates/cve-less/plugins/reviewx-d13b6e0194ead1aa761a79dc4de31982.yaml new file mode 100644 index 0000000000..0267b3be8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/reviewx-d13b6e0194ead1aa761a79dc4de31982.yaml @@ -0,0 +1,58 @@ +id: reviewx-d13b6e0194ead1aa761a79dc4de31982 + +info: + name: > + WooCommerce Reviews Plugin with Multi-criteria Rating by ReviewX < 1.2.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c3032ae-eb86-47d0-b160-320a67a380e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/reviewx/" + google-query: inurl:"/wp-content/plugins/reviewx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,reviewx,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/reviewx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reviewx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revision-manager-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml b/nuclei-templates/cve-less/plugins/revision-manager-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml new file mode 100644 index 0000000000..f97d7d4f0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revision-manager-tmc-49f7af60a7d6ca8e6785ad7873768f2a.yaml @@ -0,0 +1,58 @@ +id: revision-manager-tmc-49f7af60a7d6ca8e6785ad7873768f2a + +info: + name: > + JQueryFileTree <= 2.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f20352f-386f-45ab-b719-8a70f5c11b02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revision-manager-tmc/" + google-query: inurl:"/wp-content/plugins/revision-manager-tmc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revision-manager-tmc,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revision-manager-tmc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revision-manager-tmc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revolut-gateway-for-woocommerce-b6ad60014841f75188893319dd4470b9.yaml b/nuclei-templates/cve-less/plugins/revolut-gateway-for-woocommerce-b6ad60014841f75188893319dd4470b9.yaml new file mode 100644 index 0000000000..1c22cf9a14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revolut-gateway-for-woocommerce-b6ad60014841f75188893319dd4470b9.yaml @@ -0,0 +1,58 @@ +id: revolut-gateway-for-woocommerce-b6ad60014841f75188893319dd4470b9 + +info: + name: > + Revolut Gateway for WooCommerce <= 4.9.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55827029-479e-4c4c-ba33-203075e1bbbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revolut-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/revolut-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revolut-gateway-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revolut-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revolut-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revolution-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/revolution-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9dff7a3530 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revolution-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: revolution-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revolution-for-elementor/" + google-query: inurl:"/wp-content/plugins/revolution-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revolution-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revolution-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revolution-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revolution-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/revolution-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..fe95df15cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revolution-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: revolution-for-elementor-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revolution-for-elementor/" + google-query: inurl:"/wp-content/plugins/revolution-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revolution-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revolution-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revolution-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-21b56747ef932af6a293d705a4f1c993.yaml b/nuclei-templates/cve-less/plugins/revslider-21b56747ef932af6a293d705a4f1c993.yaml new file mode 100644 index 0000000000..c0ff06f155 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-21b56747ef932af6a293d705a4f1c993.yaml @@ -0,0 +1,58 @@ +id: revslider-21b56747ef932af6a293d705a4f1c993 + +info: + name: > + Slider Revolution < 3.0.96 & Showbiz Pro < 1.7.1 - Missing Authorization to Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28cb96a9-12bd-4d9c-ac53-72e81d11b0b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-27d3cbadcfb0487ad424f81cd866c990.yaml b/nuclei-templates/cve-less/plugins/revslider-27d3cbadcfb0487ad424f81cd866c990.yaml new file mode 100644 index 0000000000..83dc6cc20e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-27d3cbadcfb0487ad424f81cd866c990.yaml @@ -0,0 +1,58 @@ +id: revslider-27d3cbadcfb0487ad424f81cd866c990 + +info: + name: > + Slider Revolution <= 6.7.7 - Authenticated (Author+) Stored Cross-Site Scripting via htmltag Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8437abcc-3e34-4a8a-bfe2-2ff7c9f41164?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-2e2946ff7ceba7ce385ae21a430029fb.yaml b/nuclei-templates/cve-less/plugins/revslider-2e2946ff7ceba7ce385ae21a430029fb.yaml new file mode 100644 index 0000000000..c0cf991bb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-2e2946ff7ceba7ce385ae21a430029fb.yaml @@ -0,0 +1,58 @@ +id: revslider-2e2946ff7ceba7ce385ae21a430029fb + +info: + name: > + Slider Revolution <= 6.6.14 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/772e843b-00ea-45f5-b730-c9a793d4c2db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-37ebb1547ffcf7ee914afd4ab2a7338e.yaml b/nuclei-templates/cve-less/plugins/revslider-37ebb1547ffcf7ee914afd4ab2a7338e.yaml new file mode 100644 index 0000000000..7e8b58902b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-37ebb1547ffcf7ee914afd4ab2a7338e.yaml @@ -0,0 +1,58 @@ +id: revslider-37ebb1547ffcf7ee914afd4ab2a7338e + +info: + name: > + Slider Revolution < 6.6.19 - Authenticated (Author+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/951e3497-8fbc-4cc9-a784-edf7bb679175?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-648072cf9e5d6b428e895ff9cc55e265.yaml b/nuclei-templates/cve-less/plugins/revslider-648072cf9e5d6b428e895ff9cc55e265.yaml new file mode 100644 index 0000000000..8c523f206a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-648072cf9e5d6b428e895ff9cc55e265.yaml @@ -0,0 +1,58 @@ +id: revslider-648072cf9e5d6b428e895ff9cc55e265 + +info: + name: > + Slider Revolution <= 6.6.12 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fa00dae-c51d-4586-81da-b568cd6d8124?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-685b01b9c20a58ab8625d54ca9e5774b.yaml b/nuclei-templates/cve-less/plugins/revslider-685b01b9c20a58ab8625d54ca9e5774b.yaml new file mode 100644 index 0000000000..c0a973175b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-685b01b9c20a58ab8625d54ca9e5774b.yaml @@ -0,0 +1,58 @@ +id: revslider-685b01b9c20a58ab8625d54ca9e5774b + +info: + name: > + Slider Revolution <= 4.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b162ef2-7428-47cc-91c6-c8f66512c5dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-77cb7270adb1ee8f80145931d246bc67.yaml b/nuclei-templates/cve-less/plugins/revslider-77cb7270adb1ee8f80145931d246bc67.yaml new file mode 100644 index 0000000000..14b61818cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-77cb7270adb1ee8f80145931d246bc67.yaml @@ -0,0 +1,58 @@ +id: revslider-77cb7270adb1ee8f80145931d246bc67 + +info: + name: > + Slider Revolution <= 4.1.4 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb8eea53-64d1-4375-9364-292b96080f68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-be4d0822a09dabbfb60c56eb78326475.yaml b/nuclei-templates/cve-less/plugins/revslider-be4d0822a09dabbfb60c56eb78326475.yaml new file mode 100644 index 0000000000..d8e1261e27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-be4d0822a09dabbfb60c56eb78326475.yaml @@ -0,0 +1,58 @@ +id: revslider-be4d0822a09dabbfb60c56eb78326475 + +info: + name: > + Slider Revolution <= 6.6.15 - Authenticated (Author+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2d29afd-06e8-461a-918f-38228441a51a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/revslider-ea2d65615410e5461dba977dc309841e.yaml b/nuclei-templates/cve-less/plugins/revslider-ea2d65615410e5461dba977dc309841e.yaml new file mode 100644 index 0000000000..b9a5d4a034 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/revslider-ea2d65615410e5461dba977dc309841e.yaml @@ -0,0 +1,58 @@ +id: revslider-ea2d65615410e5461dba977dc309841e + +info: + name: > + Revslider <= 6.6.20 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6af1e90-9bad-470b-9e00-137000c0450c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/revslider/" + google-query: inurl:"/wp-content/plugins/revslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,revslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rezgo-1bdd11fadd06cfdab7d4d06e095a85bd.yaml b/nuclei-templates/cve-less/plugins/rezgo-1bdd11fadd06cfdab7d4d06e095a85bd.yaml new file mode 100644 index 0000000000..4289409993 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rezgo-1bdd11fadd06cfdab7d4d06e095a85bd.yaml @@ -0,0 +1,58 @@ +id: rezgo-1bdd11fadd06cfdab7d4d06e095a85bd + +info: + name: > + Rezgo Online Booking < 1.4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc590a99-0c9d-4c38-b7ec-b8a0dc7f6f0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rezgo/" + google-query: inurl:"/wp-content/plugins/rezgo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rezgo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rezgo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rezgo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rezgo-d8487b4cdf30d9f95919fc0d077ba4cd.yaml b/nuclei-templates/cve-less/plugins/rezgo-d8487b4cdf30d9f95919fc0d077ba4cd.yaml new file mode 100644 index 0000000000..074ca137ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rezgo-d8487b4cdf30d9f95919fc0d077ba4cd.yaml @@ -0,0 +1,58 @@ +id: rezgo-d8487b4cdf30d9f95919fc0d077ba4cd + +info: + name: > + Rezgo Online Booking <= 4.1.7 - Reflected Cross-Site-Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8ba1a2f-d4f9-4cfe-9a42-ec2e116aed1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rezgo/" + google-query: inurl:"/wp-content/plugins/rezgo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rezgo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rezgo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rezgo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rezgo-fe69a0c777f01161eb85876f2a58c68c.yaml b/nuclei-templates/cve-less/plugins/rezgo-fe69a0c777f01161eb85876f2a58c68c.yaml new file mode 100644 index 0000000000..cdc596b979 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rezgo-fe69a0c777f01161eb85876f2a58c68c.yaml @@ -0,0 +1,58 @@ +id: rezgo-fe69a0c777f01161eb85876f2a58c68c + +info: + name: > + Rezgo Online Booking < 1.8.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06334fad-eb1d-4abe-b183-a9e11eedd3d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rezgo/" + google-query: inurl:"/wp-content/plugins/rezgo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rezgo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rezgo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rezgo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ricerca-smart-search-d144e1655e99bcb34fc6b0573a7608ff.yaml b/nuclei-templates/cve-less/plugins/ricerca-smart-search-d144e1655e99bcb34fc6b0573a7608ff.yaml new file mode 100644 index 0000000000..7e0b354b22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ricerca-smart-search-d144e1655e99bcb34fc6b0573a7608ff.yaml @@ -0,0 +1,58 @@ +id: ricerca-smart-search-d144e1655e99bcb34fc6b0573a7608ff + +info: + name: > + Ricerca smart and advanced search <= 1.0.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fefcc8c-3864-4764-86e7-678d8604fd67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ricerca-smart-search/" + google-query: inurl:"/wp-content/plugins/ricerca-smart-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ricerca-smart-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ricerca-smart-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ricerca-smart-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rich-counter-77a02e9a59afcc2450797fc7712b5da9.yaml b/nuclei-templates/cve-less/plugins/rich-counter-77a02e9a59afcc2450797fc7712b5da9.yaml new file mode 100644 index 0000000000..ac3d92c8ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rich-counter-77a02e9a59afcc2450797fc7712b5da9.yaml @@ -0,0 +1,58 @@ +id: rich-counter-77a02e9a59afcc2450797fc7712b5da9 + +info: + name: > + Rich Counter < 1.2.0 - JavaScript Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/070a5d26-9126-4d0e-9421-739090bea421?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rich-counter/" + google-query: inurl:"/wp-content/plugins/rich-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rich-counter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rich-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rich-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rich-event-timeline-bb6d2bf0f5a8a794df5c5f921c8ed2d6.yaml b/nuclei-templates/cve-less/plugins/rich-event-timeline-bb6d2bf0f5a8a794df5c5f921c8ed2d6.yaml new file mode 100644 index 0000000000..3e334f9d4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rich-event-timeline-bb6d2bf0f5a8a794df5c5f921c8ed2d6.yaml @@ -0,0 +1,58 @@ +id: rich-event-timeline-bb6d2bf0f5a8a794df5c5f921c8ed2d6 + +info: + name: > + Event Timeline <= 1.1.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c157d70-1d4d-482e-8996-bc047a801681?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rich-event-timeline/" + google-query: inurl:"/wp-content/plugins/rich-event-timeline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rich-event-timeline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rich-event-timeline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rich-event-timeline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rich-reviews-619ac7254fccc036c35607f86905c212.yaml b/nuclei-templates/cve-less/plugins/rich-reviews-619ac7254fccc036c35607f86905c212.yaml new file mode 100644 index 0000000000..725d431803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rich-reviews-619ac7254fccc036c35607f86905c212.yaml @@ -0,0 +1,58 @@ +id: rich-reviews-619ac7254fccc036c35607f86905c212 + +info: + name: > + Rich Reviews <= 1.7.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db701ad3-10fd-4a40-b239-139fbc95ab61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rich-reviews/" + google-query: inurl:"/wp-content/plugins/rich-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rich-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rich-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rich-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rich-reviews-b5ff51b3c591b9026f1ed0c5c634aabc.yaml b/nuclei-templates/cve-less/plugins/rich-reviews-b5ff51b3c591b9026f1ed0c5c634aabc.yaml new file mode 100644 index 0000000000..1bbdf01a7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rich-reviews-b5ff51b3c591b9026f1ed0c5c634aabc.yaml @@ -0,0 +1,58 @@ +id: rich-reviews-b5ff51b3c591b9026f1ed0c5c634aabc + +info: + name: > + Rich Reviews by Starfish <= 1.9.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1625a77d-bbca-4d18-ae6f-03030ac51d5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rich-reviews/" + google-query: inurl:"/wp-content/plugins/rich-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rich-reviews,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rich-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rich-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rich-reviews-d096551cc11e027298b83171a2a3683a.yaml b/nuclei-templates/cve-less/plugins/rich-reviews-d096551cc11e027298b83171a2a3683a.yaml new file mode 100644 index 0000000000..0fd8ad65e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rich-reviews-d096551cc11e027298b83171a2a3683a.yaml @@ -0,0 +1,58 @@ +id: rich-reviews-d096551cc11e027298b83171a2a3683a + +info: + name: > + Rich Reviews by Starfish <= 1.9.14 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cd5e6f3-b791-48a8-b7eb-42cdd8975530?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rich-reviews/" + google-query: inurl:"/wp-content/plugins/rich-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rich-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rich-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rich-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rich-snippets-vevents-0a2ecbcc02c5fdd93dc20fd7c66c9f62.yaml b/nuclei-templates/cve-less/plugins/rich-snippets-vevents-0a2ecbcc02c5fdd93dc20fd7c66c9f62.yaml new file mode 100644 index 0000000000..19059ba4d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rich-snippets-vevents-0a2ecbcc02c5fdd93dc20fd7c66c9f62.yaml @@ -0,0 +1,58 @@ +id: rich-snippets-vevents-0a2ecbcc02c5fdd93dc20fd7c66c9f62 + +info: + name: > + Events Rich Snippets for Google <= 1.8 - Cross-Site Request Forgery to Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5beb0f93-baa7-4400-ab40-d63f3430169e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rich-snippets-vevents/" + google-query: inurl:"/wp-content/plugins/rich-snippets-vevents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rich-snippets-vevents,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rich-snippets-vevents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rich-snippets-vevents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rich-table-of-content-0a49b86c658b566e0874b7c8c6fd8f9c.yaml b/nuclei-templates/cve-less/plugins/rich-table-of-content-0a49b86c658b566e0874b7c8c6fd8f9c.yaml new file mode 100644 index 0000000000..32ae29b190 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rich-table-of-content-0a49b86c658b566e0874b7c8c6fd8f9c.yaml @@ -0,0 +1,58 @@ +id: rich-table-of-content-0a49b86c658b566e0874b7c8c6fd8f9c + +info: + name: > + Rich Table of Contents <= 1.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21a31d61-84eb-47bf-a4d3-e14089127e6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rich-table-of-content/" + google-query: inurl:"/wp-content/plugins/rich-table-of-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rich-table-of-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rich-table-of-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rich-table-of-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rich-widget-563c9252bb845bff9256a99d2c884c98.yaml b/nuclei-templates/cve-less/plugins/rich-widget-563c9252bb845bff9256a99d2c884c98.yaml new file mode 100644 index 0000000000..4d52c44871 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rich-widget-563c9252bb845bff9256a99d2c884c98.yaml @@ -0,0 +1,58 @@ +id: rich-widget-563c9252bb845bff9256a99d2c884c98 + +info: + name: > + Rich Widget <= 0.2.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4db1ee2b-d8ed-4f2a-8de5-81abeafa2f9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rich-widget/" + google-query: inurl:"/wp-content/plugins/rich-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rich-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rich-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rich-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rife-elementor-extensions-9454be14498ff26da96354e9b5fc82b2.yaml b/nuclei-templates/cve-less/plugins/rife-elementor-extensions-9454be14498ff26da96354e9b5fc82b2.yaml new file mode 100644 index 0000000000..0af0700221 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rife-elementor-extensions-9454be14498ff26da96354e9b5fc82b2.yaml @@ -0,0 +1,58 @@ +id: rife-elementor-extensions-9454be14498ff26da96354e9b5fc82b2 + +info: + name: > + Rife Elementor Extensions & Templates <= 1.1.10 - Missing Authorization via import_templates + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee520664-0c1f-4af0-8cdf-a33c1dfaaca7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rife-elementor-extensions/" + google-query: inurl:"/wp-content/plugins/rife-elementor-extensions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rife-elementor-extensions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rife-elementor-extensions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rife-elementor-extensions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rife-elementor-extensions-b6405ae9eaca03d55059021293cdb417.yaml b/nuclei-templates/cve-less/plugins/rife-elementor-extensions-b6405ae9eaca03d55059021293cdb417.yaml new file mode 100644 index 0000000000..39699bc153 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rife-elementor-extensions-b6405ae9eaca03d55059021293cdb417.yaml @@ -0,0 +1,58 @@ +id: rife-elementor-extensions-b6405ae9eaca03d55059021293cdb417 + +info: + name: > + Rife Elementor Extensions & Templates <= 1.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f4bba27-efdc-4b2d-80be-4a5c17ef5e7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rife-elementor-extensions/" + google-query: inurl:"/wp-content/plugins/rife-elementor-extensions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rife-elementor-extensions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rife-elementor-extensions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rife-elementor-extensions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rimons-twitter-widget-94ba05091d5c1c002f96ded27dad7e5c.yaml b/nuclei-templates/cve-less/plugins/rimons-twitter-widget-94ba05091d5c1c002f96ded27dad7e5c.yaml new file mode 100644 index 0000000000..ca7945349c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rimons-twitter-widget-94ba05091d5c1c002f96ded27dad7e5c.yaml @@ -0,0 +1,58 @@ +id: rimons-twitter-widget-94ba05091d5c1c002f96ded27dad7e5c + +info: + name: > + Rimons Twitter Widget <= 1.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afd58164-8d33-4f93-a904-443b1df8b66b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rimons-twitter-widget/" + google-query: inurl:"/wp-content/plugins/rimons-twitter-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rimons-twitter-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rimons-twitter-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rimons-twitter-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ripe-hd-player-90b978a91efacda536eb1e0ded121cd4.yaml b/nuclei-templates/cve-less/plugins/ripe-hd-player-90b978a91efacda536eb1e0ded121cd4.yaml new file mode 100644 index 0000000000..bcfaeb81a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ripe-hd-player-90b978a91efacda536eb1e0ded121cd4.yaml @@ -0,0 +1,58 @@ +id: ripe-hd-player-90b978a91efacda536eb1e0ded121cd4 + +info: + name: > + Ripe HD FLV <= 1.1 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28a7b80c-8282-4f5c-b442-d6bce9fda25d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ripe-hd-player/" + google-query: inurl:"/wp-content/plugins/ripe-hd-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ripe-hd-player,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ripe-hd-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ripe-hd-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ripe-hd-player-ca4ec2717c0e87b5e6136533f933edf4.yaml b/nuclei-templates/cve-less/plugins/ripe-hd-player-ca4ec2717c0e87b5e6136533f933edf4.yaml new file mode 100644 index 0000000000..f07e580ed7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ripe-hd-player-ca4ec2717c0e87b5e6136533f933edf4.yaml @@ -0,0 +1,58 @@ +id: ripe-hd-player-ca4ec2717c0e87b5e6136533f933edf4 + +info: + name: > + Ripe HD FLV <= 1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf159a11-9490-4f79-a62d-c279cfe26108?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ripe-hd-player/" + google-query: inurl:"/wp-content/plugins/ripe-hd-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ripe-hd-player,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ripe-hd-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ripe-hd-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rise-blocks-300e5e2ebc65101a8ebb5e6f23b6747a.yaml b/nuclei-templates/cve-less/plugins/rise-blocks-300e5e2ebc65101a8ebb5e6f23b6747a.yaml new file mode 100644 index 0000000000..931a52aab2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rise-blocks-300e5e2ebc65101a8ebb5e6f23b6747a.yaml @@ -0,0 +1,58 @@ +id: rise-blocks-300e5e2ebc65101a8ebb5e6f23b6747a + +info: + name: > + Rise Blocks – A Complete Gutenberg Page Builder <= 3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b249842-c480-495a-8eec-6c7d0893ef1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rise-blocks/" + google-query: inurl:"/wp-content/plugins/rise-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rise-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rise-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rise-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rk-responsive-contact-form-9a2bf7d17126275dce9aeca280888e4f.yaml b/nuclei-templates/cve-less/plugins/rk-responsive-contact-form-9a2bf7d17126275dce9aeca280888e4f.yaml new file mode 100644 index 0000000000..1dd71d2b87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rk-responsive-contact-form-9a2bf7d17126275dce9aeca280888e4f.yaml @@ -0,0 +1,58 @@ +id: rk-responsive-contact-form-9a2bf7d17126275dce9aeca280888e4f + +info: + name: > + RK Responsive Contact Form <= 1.0.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58fa1235-846f-4bd4-ba0d-be6b039f411e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rk-responsive-contact-form/" + google-query: inurl:"/wp-content/plugins/rk-responsive-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rk-responsive-contact-form,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rk-responsive-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rk-responsive-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rlswordpresssearch-039516da624d506160b1c30124a56f9f.yaml b/nuclei-templates/cve-less/plugins/rlswordpresssearch-039516da624d506160b1c30124a56f9f.yaml new file mode 100644 index 0000000000..fcc4861a22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rlswordpresssearch-039516da624d506160b1c30124a56f9f.yaml @@ -0,0 +1,58 @@ +id: rlswordpresssearch-039516da624d506160b1c30124a56f9f + +info: + name: > + RLSWordPressSearch (All Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c79d861-e2e8-4fca-883f-79401544b0b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/RLSWordPressSearch/" + google-query: inurl:"/wp-content/plugins/RLSWordPressSearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,RLSWordPressSearch,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/RLSWordPressSearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "RLSWordPressSearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rm-mailchimp-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/rm-mailchimp-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..929f9f1d79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rm-mailchimp-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: rm-mailchimp-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rm-mailchimp-manager/" + google-query: inurl:"/wp-content/plugins/rm-mailchimp-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rm-mailchimp-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rm-mailchimp-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rm-mailchimp-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rm-mailchimp-manager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/rm-mailchimp-manager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..730104add5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rm-mailchimp-manager-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: rm-mailchimp-manager-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rm-mailchimp-manager/" + google-query: inurl:"/wp-content/plugins/rm-mailchimp-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rm-mailchimp-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rm-mailchimp-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rm-mailchimp-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robo-gallery-11a45c98dd2f844970dab94e4b84b3d9.yaml b/nuclei-templates/cve-less/plugins/robo-gallery-11a45c98dd2f844970dab94e4b84b3d9.yaml new file mode 100644 index 0000000000..19f1bc5c63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robo-gallery-11a45c98dd2f844970dab94e4b84b3d9.yaml @@ -0,0 +1,58 @@ +id: robo-gallery-11a45c98dd2f844970dab94e4b84b3d9 + +info: + name: > + Robo Gallery <= 3.2.15 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/983a9501-cb09-436a-8b0d-392cfef8643b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robo-gallery/" + google-query: inurl:"/wp-content/plugins/robo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robo-gallery-21d5c5e61124efe0fdb8d063c0f79f9f.yaml b/nuclei-templates/cve-less/plugins/robo-gallery-21d5c5e61124efe0fdb8d063c0f79f9f.yaml new file mode 100644 index 0000000000..83495c246b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robo-gallery-21d5c5e61124efe0fdb8d063c0f79f9f.yaml @@ -0,0 +1,58 @@ +id: robo-gallery-21d5c5e61124efe0fdb8d063c0f79f9f + +info: + name: > + Robo Gallery <= 3.2.17 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02073716-4f6a-4a51-933f-c5ab8dfbc08c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robo-gallery/" + google-query: inurl:"/wp-content/plugins/robo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robo-gallery-5fb58f1bd63b817d6a622885ff3cda93.yaml b/nuclei-templates/cve-less/plugins/robo-gallery-5fb58f1bd63b817d6a622885ff3cda93.yaml new file mode 100644 index 0000000000..38c84ae229 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robo-gallery-5fb58f1bd63b817d6a622885ff3cda93.yaml @@ -0,0 +1,58 @@ +id: robo-gallery-5fb58f1bd63b817d6a622885ff3cda93 + +info: + name: > + Photo Gallery, Images, Slider in Rbs Image Gallery <= 3.2.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9393e103-7009-457b-ba14-fa5ef45b97df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robo-gallery/" + google-query: inurl:"/wp-content/plugins/robo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robo-gallery-6cee4524dc586561620cd18145330773.yaml b/nuclei-templates/cve-less/plugins/robo-gallery-6cee4524dc586561620cd18145330773.yaml new file mode 100644 index 0000000000..859d539df3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robo-gallery-6cee4524dc586561620cd18145330773.yaml @@ -0,0 +1,58 @@ +id: robo-gallery-6cee4524dc586561620cd18145330773 + +info: + name: > + Robo Gallery Plugin <= 3.2.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5cca24-514b-4f8b-911f-8d138287fce2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robo-gallery/" + google-query: inurl:"/wp-content/plugins/robo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robo-gallery-9376ca64ef0c10c441ff62358957edd7.yaml b/nuclei-templates/cve-less/plugins/robo-gallery-9376ca64ef0c10c441ff62358957edd7.yaml new file mode 100644 index 0000000000..257771f22e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robo-gallery-9376ca64ef0c10c441ff62358957edd7.yaml @@ -0,0 +1,58 @@ +id: robo-gallery-9376ca64ef0c10c441ff62358957edd7 + +info: + name: > + Robo Gallery <= 3.2.12 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e0424f8-f60f-49c3-9969-a88c830dc0e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robo-gallery/" + google-query: inurl:"/wp-content/plugins/robo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robo-gallery-9f2f2dde98598fd295064b72e326d9fc.yaml b/nuclei-templates/cve-less/plugins/robo-gallery-9f2f2dde98598fd295064b72e326d9fc.yaml new file mode 100644 index 0000000000..8780e45a49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robo-gallery-9f2f2dde98598fd295064b72e326d9fc.yaml @@ -0,0 +1,58 @@ +id: robo-gallery-9f2f2dde98598fd295064b72e326d9fc + +info: + name: > + Robo Gallery <= 3.2.18 - Unauthenticated Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae5779cc-b55b-4b8f-ae66-8607a689ef72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robo-gallery/" + google-query: inurl:"/wp-content/plugins/robo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robo-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robo-gallery-b37d0ab8478827b0dcd11d96ae9c0099.yaml b/nuclei-templates/cve-less/plugins/robo-gallery-b37d0ab8478827b0dcd11d96ae9c0099.yaml new file mode 100644 index 0000000000..cd4bf83e94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robo-gallery-b37d0ab8478827b0dcd11d96ae9c0099.yaml @@ -0,0 +1,58 @@ +id: robo-gallery-b37d0ab8478827b0dcd11d96ae9c0099 + +info: + name: > + Photo Gallery, Images, Slider in Rbs Image Gallery <= 2.0.14 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abdd6aaa-830e-4a79-acfb-93dc4a26f599?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robo-gallery/" + google-query: inurl:"/wp-content/plugins/robo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robo-gallery-ca5f7b99213750bdb7e09f3fde148865.yaml b/nuclei-templates/cve-less/plugins/robo-gallery-ca5f7b99213750bdb7e09f3fde148865.yaml new file mode 100644 index 0000000000..02d2694f7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robo-gallery-ca5f7b99213750bdb7e09f3fde148865.yaml @@ -0,0 +1,58 @@ +id: robo-gallery-ca5f7b99213750bdb7e09f3fde148865 + +info: + name: > + Robo Gallery <= 3.2.9 - Cross-Site Request Forgery via getPluginStatus + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44f1342a-11b3-4c3f-837f-f68176ded4a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robo-gallery/" + google-query: inurl:"/wp-content/plugins/robo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/robokassa-a1f3ce23c26813a2d0636e6681a66fe2.yaml b/nuclei-templates/cve-less/plugins/robokassa-a1f3ce23c26813a2d0636e6681a66fe2.yaml new file mode 100644 index 0000000000..4ed113cbb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/robokassa-a1f3ce23c26813a2d0636e6681a66fe2.yaml @@ -0,0 +1,58 @@ +id: robokassa-a1f3ce23c26813a2d0636e6681a66fe2 + +info: + name: > + Robokassa payment gateway for Woocommerce <= 1.4.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75824b96-8674-4340-9e56-b0cb0f52503d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/robokassa/" + google-query: inurl:"/wp-content/plugins/robokassa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,robokassa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/robokassa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robokassa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rock-convert-a6ad4e1a267f3d946e1e2e12d5bebc25.yaml b/nuclei-templates/cve-less/plugins/rock-convert-a6ad4e1a267f3d946e1e2e12d5bebc25.yaml new file mode 100644 index 0000000000..3f092294f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rock-convert-a6ad4e1a267f3d946e1e2e12d5bebc25.yaml @@ -0,0 +1,58 @@ +id: rock-convert-a6ad4e1a267f3d946e1e2e12d5bebc25 + +info: + name: > + Rock Convert <= 2.10.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dbaed2a-cc35-455c-ad7e-c7826d5b3e7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rock-convert/" + google-query: inurl:"/wp-content/plugins/rock-convert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rock-convert,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rock-convert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rock-convert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rock-convert-c9b759e004eccd5b21e624aa9b7c9cb8.yaml b/nuclei-templates/cve-less/plugins/rock-convert-c9b759e004eccd5b21e624aa9b7c9cb8.yaml new file mode 100644 index 0000000000..4ad3b23251 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rock-convert-c9b759e004eccd5b21e624aa9b7c9cb8.yaml @@ -0,0 +1,58 @@ +id: rock-convert-c9b759e004eccd5b21e624aa9b7c9cb8 + +info: + name: > + Rock Convert <= 2.10.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bfb8874-a2e2-474f-9f91-fefb980e2a93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rock-convert/" + google-query: inurl:"/wp-content/plugins/rock-convert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rock-convert,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rock-convert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rock-convert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rock-convert-f5bd530013958004252bd14d740d1932.yaml b/nuclei-templates/cve-less/plugins/rock-convert-f5bd530013958004252bd14d740d1932.yaml new file mode 100644 index 0000000000..482fe24a11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rock-convert-f5bd530013958004252bd14d740d1932.yaml @@ -0,0 +1,58 @@ +id: rock-convert-f5bd530013958004252bd14d740d1932 + +info: + name: > + Rock Convert <= 2.11.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c29cb99f-72e9-4178-b961-7ab50a5b6c7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rock-convert/" + google-query: inurl:"/wp-content/plugins/rock-convert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rock-convert,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rock-convert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rock-convert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rocket-font-056b7aae26aa632814d20eff8a2aaeb8.yaml b/nuclei-templates/cve-less/plugins/rocket-font-056b7aae26aa632814d20eff8a2aaeb8.yaml new file mode 100644 index 0000000000..d674d61a38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rocket-font-056b7aae26aa632814d20eff8a2aaeb8.yaml @@ -0,0 +1,58 @@ +id: rocket-font-056b7aae26aa632814d20eff8a2aaeb8 + +info: + name: > + Rocket Font <= 1.2.3 - Cross-Site Request Forgery via update_option_check_match_default + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/635f448b-5c51-4152-b6f5-076a686709bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rocket-font/" + google-query: inurl:"/wp-content/plugins/rocket-font/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rocket-font,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rocket-font/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rocket-font" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rocket-maintenance-mode-28d27bb70102b6a3ff9c97ba43afec20.yaml b/nuclei-templates/cve-less/plugins/rocket-maintenance-mode-28d27bb70102b6a3ff9c97ba43afec20.yaml new file mode 100644 index 0000000000..a39e259fdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rocket-maintenance-mode-28d27bb70102b6a3ff9c97ba43afec20.yaml @@ -0,0 +1,58 @@ +id: rocket-maintenance-mode-28d27bb70102b6a3ff9c97ba43afec20 + +info: + name: > + Rocket Maintenance Mode & Coming Soon Page <= 4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/055cc26b-1e24-4e39-89c8-bdc4a69ce938?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rocket-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/rocket-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rocket-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rocket-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rocket-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rocket-maintenance-mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/rocket-maintenance-mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f23fce2f4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rocket-maintenance-mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: rocket-maintenance-mode-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rocket-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/rocket-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rocket-maintenance-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rocket-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rocket-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rockhoist-badges-b501e58c10633b07f2bbf5ed16ac706e.yaml b/nuclei-templates/cve-less/plugins/rockhoist-badges-b501e58c10633b07f2bbf5ed16ac706e.yaml new file mode 100644 index 0000000000..5c4da839ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rockhoist-badges-b501e58c10633b07f2bbf5ed16ac706e.yaml @@ -0,0 +1,58 @@ +id: rockhoist-badges-b501e58c10633b07f2bbf5ed16ac706e + +info: + name: > + Rockhoist Badges <= 1.2.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a46420e-8ca5-43ac-8475-786e24185f55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rockhoist-badges/" + google-query: inurl:"/wp-content/plugins/rockhoist-badges/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rockhoist-badges,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rockhoist-badges/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rockhoist-badges" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rockhoist-ratings-c12136de0ef8038ae757e3a4dc014f16.yaml b/nuclei-templates/cve-less/plugins/rockhoist-ratings-c12136de0ef8038ae757e3a4dc014f16.yaml new file mode 100644 index 0000000000..46a12e199b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rockhoist-ratings-c12136de0ef8038ae757e3a4dc014f16.yaml @@ -0,0 +1,58 @@ +id: rockhoist-ratings-c12136de0ef8038ae757e3a4dc014f16 + +info: + name: > + Rockhoist Ratings < 1.2.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8469ffc-477a-4ff1-853b-dcefba2b9c4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rockhoist-ratings/" + google-query: inurl:"/wp-content/plugins/rockhoist-ratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rockhoist-ratings,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rockhoist-ratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rockhoist-ratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/role-based-pricing-for-woocommerce-226373864d57cc20f7f59dea62a55c3b.yaml b/nuclei-templates/cve-less/plugins/role-based-pricing-for-woocommerce-226373864d57cc20f7f59dea62a55c3b.yaml new file mode 100644 index 0000000000..3c26f874fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/role-based-pricing-for-woocommerce-226373864d57cc20f7f59dea62a55c3b.yaml @@ -0,0 +1,58 @@ +id: role-based-pricing-for-woocommerce-226373864d57cc20f7f59dea62a55c3b + +info: + name: > + Role Based Pricing for WooCommerce <= 1.6.1 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62402e53-ff46-410e-9cc1-a87b677e6526?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/role-based-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/role-based-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,role-based-pricing-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/role-based-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "role-based-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/role-based-pricing-for-woocommerce-9572375f1a63fe71cfefeb901690b502.yaml b/nuclei-templates/cve-less/plugins/role-based-pricing-for-woocommerce-9572375f1a63fe71cfefeb901690b502.yaml new file mode 100644 index 0000000000..7b76fcd11f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/role-based-pricing-for-woocommerce-9572375f1a63fe71cfefeb901690b502.yaml @@ -0,0 +1,58 @@ +id: role-based-pricing-for-woocommerce-9572375f1a63fe71cfefeb901690b502 + +info: + name: > + Role Based Pricing for WooCommerce <= 1.6.2 - Missing Authorization to PHAR Deserialization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75fc21c8-352c-48dc-9d3f-53a738306f97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/role-based-pricing-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/role-based-pricing-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,role-based-pricing-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/role-based-pricing-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "role-based-pricing-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/role-scoper-25222fc492113823793e49be1ec42e70.yaml b/nuclei-templates/cve-less/plugins/role-scoper-25222fc492113823793e49be1ec42e70.yaml new file mode 100644 index 0000000000..70898deb47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/role-scoper-25222fc492113823793e49be1ec42e70.yaml @@ -0,0 +1,58 @@ +id: role-scoper-25222fc492113823793e49be1ec42e70 + +info: + name: > + Role Scoper <= 1.3.64 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6156a351-d681-4661-9131-62251b715a94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/role-scoper/" + google-query: inurl:"/wp-content/plugins/role-scoper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,role-scoper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/role-scoper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "role-scoper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/role-scoper-787af0ce94bcdf676a12979b911ee5bb.yaml b/nuclei-templates/cve-less/plugins/role-scoper-787af0ce94bcdf676a12979b911ee5bb.yaml new file mode 100644 index 0000000000..f50c580f16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/role-scoper-787af0ce94bcdf676a12979b911ee5bb.yaml @@ -0,0 +1,58 @@ +id: role-scoper-787af0ce94bcdf676a12979b911ee5bb + +info: + name: > + Role Scoper (Obsolete – Please install PublishPress Permissions) < 1.3.67 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cb30d2b-84f2-433e-bb9e-713486b759ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/role-scoper/" + google-query: inurl:"/wp-content/plugins/role-scoper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,role-scoper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/role-scoper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "role-scoper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rolo-slider-47760446230886f970132bba81795035.yaml b/nuclei-templates/cve-less/plugins/rolo-slider-47760446230886f970132bba81795035.yaml new file mode 100644 index 0000000000..e87a6f881c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rolo-slider-47760446230886f970132bba81795035.yaml @@ -0,0 +1,58 @@ +id: rolo-slider-47760446230886f970132bba81795035 + +info: + name: > + Rolo Slider <= 1.0.9 - Missing Authorization to Authenticated(Subscriber+) Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fdf6c97-6fc4-4840-b96d-e194149861e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rolo-slider/" + google-query: inurl:"/wp-content/plugins/rolo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rolo-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rolo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rolo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rometheme-for-elementor-3b2e242a0e8c63c5936cb035e1688322.yaml b/nuclei-templates/cve-less/plugins/rometheme-for-elementor-3b2e242a0e8c63c5936cb035e1688322.yaml new file mode 100644 index 0000000000..3e2355ae83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rometheme-for-elementor-3b2e242a0e8c63c5936cb035e1688322.yaml @@ -0,0 +1,58 @@ +id: rometheme-for-elementor-3b2e242a0e8c63c5936cb035e1688322 + +info: + name: > + RomethemeKit For Elementor <= 1.4.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2da883bf-5741-4eda-8a93-3b7feb90f4c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rometheme-for-elementor/" + google-query: inurl:"/wp-content/plugins/rometheme-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rometheme-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rometheme-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rometheme-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rometheme-for-elementor-8e63763711ef860c6f3f1ec391c10df2.yaml b/nuclei-templates/cve-less/plugins/rometheme-for-elementor-8e63763711ef860c6f3f1ec391c10df2.yaml new file mode 100644 index 0000000000..e61c6d1037 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rometheme-for-elementor-8e63763711ef860c6f3f1ec391c10df2.yaml @@ -0,0 +1,58 @@ +id: rometheme-for-elementor-8e63763711ef860c6f3f1ec391c10df2 + +info: + name: > + RomethemeKit For Elementor <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73ca6a08-b01f-4df6-89ab-32b917c92236?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rometheme-for-elementor/" + google-query: inurl:"/wp-content/plugins/rometheme-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rometheme-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rometheme-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rometheme-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/romethemeform-9fc19dd6fd6294d34dede89f8670266f.yaml b/nuclei-templates/cve-less/plugins/romethemeform-9fc19dd6fd6294d34dede89f8670266f.yaml new file mode 100644 index 0000000000..ad3c9a4686 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/romethemeform-9fc19dd6fd6294d34dede89f8670266f.yaml @@ -0,0 +1,58 @@ +id: romethemeform-9fc19dd6fd6294d34dede89f8670266f + +info: + name: > + RomethemeForm For Elementor <= 1.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d6adf41-6cb1-4c11-940d-fabc9298f3af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/romethemeform/" + google-query: inurl:"/wp-content/plugins/romethemeform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,romethemeform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/romethemeform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "romethemeform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/roomcloud-702f612dcb7a10b7280f1dc0d80858a2.yaml b/nuclei-templates/cve-less/plugins/roomcloud-702f612dcb7a10b7280f1dc0d80858a2.yaml new file mode 100644 index 0000000000..b11bdd9f63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/roomcloud-702f612dcb7a10b7280f1dc0d80858a2.yaml @@ -0,0 +1,58 @@ +id: roomcloud-702f612dcb7a10b7280f1dc0d80858a2 + +info: + name: > + Roomcloud < 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb2dda8-1389-4b19-a5cd-d6b3436ab3b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/roomcloud/" + google-query: inurl:"/wp-content/plugins/roomcloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,roomcloud,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/roomcloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "roomcloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rotating-posts-f7a5929579e2eeff4b02eaa7e1b6a770.yaml b/nuclei-templates/cve-less/plugins/rotating-posts-f7a5929579e2eeff4b02eaa7e1b6a770.yaml new file mode 100644 index 0000000000..265d37f4b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rotating-posts-f7a5929579e2eeff4b02eaa7e1b6a770.yaml @@ -0,0 +1,58 @@ +id: rotating-posts-f7a5929579e2eeff4b02eaa7e1b6a770 + +info: + name: > + Rotating Posts <= 1.11 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66b7d455-0959-4a7a-b37c-02d1ecac666b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rotating-posts/" + google-query: inurl:"/wp-content/plugins/rotating-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rotating-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rotating-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rotating-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rough-chart-0c31a10cc87b13f4ea6563dcb29fd71f.yaml b/nuclei-templates/cve-less/plugins/rough-chart-0c31a10cc87b13f4ea6563dcb29fd71f.yaml new file mode 100644 index 0000000000..848c58dc85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rough-chart-0c31a10cc87b13f4ea6563dcb29fd71f.yaml @@ -0,0 +1,58 @@ +id: rough-chart-0c31a10cc87b13f4ea6563dcb29fd71f + +info: + name: > + Rough Chart <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7c0b933-469e-4f8b-94b2-8823568c5d45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rough-chart/" + google-query: inurl:"/wp-content/plugins/rough-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rough-chart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rough-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rough-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/row-seats-89c3f6ae4022d4ba5030523ac97f470e.yaml b/nuclei-templates/cve-less/plugins/row-seats-89c3f6ae4022d4ba5030523ac97f470e.yaml new file mode 100644 index 0000000000..d8c4d254fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/row-seats-89c3f6ae4022d4ba5030523ac97f470e.yaml @@ -0,0 +1,58 @@ +id: row-seats-89c3f6ae4022d4ba5030523ac97f470e + +info: + name: > + Row Seats Core < 2.68 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c006b85d-fc05-41e7-93b2-5a09a21bec1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/row-seats/" + google-query: inurl:"/wp-content/plugins/row-seats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,row-seats,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/row-seats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "row-seats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-0041eed105fca66b7639ed88612e2a80.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-0041eed105fca66b7639ed88612e2a80.yaml new file mode 100644 index 0000000000..32a3f098f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-0041eed105fca66b7639ed88612e2a80.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-0041eed105fca66b7639ed88612e2a80 + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Template Kit Import + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa530112-a7cd-4c54-aa87-9e7337d01557?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-0085871a665961c1d3ef1282f6a6ad11.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-0085871a665961c1d3ef1282f6a6ad11.yaml new file mode 100644 index 0000000000..3a88683cda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-0085871a665961c1d3ef1282f6a6ad11.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-0085871a665961c1d3ef1282f6a6ad11 + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Plugin Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55f7e39b-e7a5-462b-b1e4-c3d92038f17e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-0149f7dc82642e7c9e2df42d374cf976.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-0149f7dc82642e7c9e2df42d374cf976.yaml new file mode 100644 index 0000000000..ddb30a933c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-0149f7dc82642e7c9e2df42d374cf976.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-0149f7dc82642e7c9e2df42d374cf976 + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Menu Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c23e9810-40ea-43e2-9292-f05f300a7ddf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-0482c6a15acfe9611a210ed128b0e569.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-0482c6a15acfe9611a210ed128b0e569.yaml new file mode 100644 index 0000000000..94f3735e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-0482c6a15acfe9611a210ed128b0e569.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-0482c6a15acfe9611a210ed128b0e569 + +info: + name: > + Royal Elementor Addons <= 1.3.55 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2031289-eaf3-4a1b-8771-769c08d99ca3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-14fedf42454dd570b7c4db0f006340a9.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-14fedf42454dd570b7c4db0f006340a9.yaml new file mode 100644 index 0000000000..06c3d7a41b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-14fedf42454dd570b7c4db0f006340a9.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-14fedf42454dd570b7c4db0f006340a9 + +info: + name: > + Royal Elementor Addons <= 1.3.55 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dc3b715-23eb-4cb9-8f44-1d3134c560ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-1e54d333594befa754c49d164d26005e.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-1e54d333594befa754c49d164d26005e.yaml new file mode 100644 index 0000000000..38959a1803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-1e54d333594befa754c49d164d26005e.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-1e54d333594befa754c49d164d26005e + +info: + name: > + Royal Elementor Addons <= 1.3.93 - Authenticated (Contributor+) Stored Cross-Site Scriting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3e47d14-4c00-4b10-9e4d-7f1d7946a2b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-1e5ce0b67a0027e4214650c86e79dae3.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-1e5ce0b67a0027e4214650c86e79dae3.yaml new file mode 100644 index 0000000000..a1d273ae8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-1e5ce0b67a0027e4214650c86e79dae3.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-1e5ce0b67a0027e4214650c86e79dae3 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.87 - Cross-Site Request Forgery via remove_from_compare + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4178271-c09e-4094-a616-5a00d28f39a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.87') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-234019268f52489cd57bd03c8706abb6.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-234019268f52489cd57bd03c8706abb6.yaml new file mode 100644 index 0000000000..bfae93c878 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-234019268f52489cd57bd03c8706abb6.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-234019268f52489cd57bd03c8706abb6 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.971 - Authenticated (Contributor+) Stored Cross-Site Scripting via HTML Tags + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40ca3778-95ff-4b2c-ac47-4ae8c86e245a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.971') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-2b7446b2ef604595e4c14f2ae5295842.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-2b7446b2ef604595e4c14f2ae5295842.yaml new file mode 100644 index 0000000000..45ca2779b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-2b7446b2ef604595e4c14f2ae5295842.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-2b7446b2ef604595e4c14f2ae5295842 + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Theme Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdd464ad-24bc-4922-8bfa-ac42fbe60b52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-30adae9325a039e658c3c87f75010bc4.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-30adae9325a039e658c3c87f75010bc4.yaml new file mode 100644 index 0000000000..30f79acaf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-30adae9325a039e658c3c87f75010bc4.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-30adae9325a039e658c3c87f75010bc4 + +info: + name: > + Royal Elementor Addons <=1.3.70 - Unauthenticated MailChimp API Key Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86c9bcf1-c69e-47ca-b74b-8ce6157f520b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-34cb9813e7e0af12dde3e7fb63dcabc4.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-34cb9813e7e0af12dde3e7fb63dcabc4.yaml new file mode 100644 index 0000000000..3a0129f6a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-34cb9813e7e0af12dde3e7fb63dcabc4.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-34cb9813e7e0af12dde3e7fb63dcabc4 + +info: + name: > + Royal Elementor Addons <=1.3.55 - Authenticated (Subscriber+) Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aa3d312-485a-4a93-a075-fa7152395f11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-3a171cbd9ee1ba65bf8842bbdf9667ce.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-3a171cbd9ee1ba65bf8842bbdf9667ce.yaml new file mode 100644 index 0000000000..25567ee8bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-3a171cbd9ee1ba65bf8842bbdf9667ce.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-3a171cbd9ee1ba65bf8842bbdf9667ce + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.87 - Cross-Site Request Forgery via remove_from_wishlist + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d3516e7-cce4-4def-be38-d16be3110d59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.87') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-427e946f25b6c94eeb7fca443cbb0fb9.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-427e946f25b6c94eeb7fca443cbb0fb9.yaml new file mode 100644 index 0000000000..f7465bce5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-427e946f25b6c94eeb7fca443cbb0fb9.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-427e946f25b6c94eeb7fca443cbb0fb9 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.80 - Missing Authorization to Private/Password Protected Post Read + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ba3cf12-facb-479b-8077-fd279c40607e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.80') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-42b03ce9c451ca4b2e6d55fc7e3bcc5f.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-42b03ce9c451ca4b2e6d55fc7e3bcc5f.yaml new file mode 100644 index 0000000000..a0e85c3db2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-42b03ce9c451ca4b2e6d55fc7e3bcc5f.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-42b03ce9c451ca4b2e6d55fc7e3bcc5f + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Template Conditions Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3e12653-ddfe-4e02-9d9e-0263b9f71def?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-42efdeb2109159b8e16a9767609f5a82.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-42efdeb2109159b8e16a9767609f5a82.yaml new file mode 100644 index 0000000000..e139cbb1c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-42efdeb2109159b8e16a9767609f5a82.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-42efdeb2109159b8e16a9767609f5a82 + +info: + name: > + Royal Elementor Addons <= 1.3.93 - Unauthenticated IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2626db42-0047-4801-bbcb-e236440c1677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-67ad0ff7411e0b10941fca10e62b3adc.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-67ad0ff7411e0b10941fca10e62b3adc.yaml new file mode 100644 index 0000000000..ab21542467 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-67ad0ff7411e0b10941fca10e62b3adc.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-67ad0ff7411e0b10941fca10e62b3adc + +info: + name: > + Royal Elementor Addons <=1.3.55 - Missing Authorization to Subscriber+ Arbitrary Post Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc2e883b-fb91-425c-a779-89a34eed2ba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-7df172b3edf3e84909e57255e5af7560.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-7df172b3edf3e84909e57255e5af7560.yaml new file mode 100644 index 0000000000..e6f6832635 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-7df172b3edf3e84909e57255e5af7560.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-7df172b3edf3e84909e57255e5af7560 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.91 - Authenticated (Contributor+) Stored Cross-Site Scripting via Logo Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8619c999-5cf7-4888-bdb2-815238411303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-7f3e0aa2645efef948b43657b5c03dab.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-7f3e0aa2645efef948b43657b5c03dab.yaml new file mode 100644 index 0000000000..116a06de2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-7f3e0aa2645efef948b43657b5c03dab.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-7f3e0aa2645efef948b43657b5c03dab + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.87 - Cross-Site Request Forgery via add_to_compare + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0955689-43a0-442c-974b-5db5e4171f6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.87') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-85f4d977a933b76ef44dca3b5cf211a8.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-85f4d977a933b76ef44dca3b5cf211a8.yaml new file mode 100644 index 0000000000..a48fb07e5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-85f4d977a933b76ef44dca3b5cf211a8.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-85f4d977a933b76ef44dca3b5cf211a8 + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Template Import + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64cce528-0ad0-45ec-a8f6-e8791b0bece0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-971ac066c8b1c8e7c33176652acbee75.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-971ac066c8b1c8e7c33176652acbee75.yaml new file mode 100644 index 0000000000..35c32ef010 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-971ac066c8b1c8e7c33176652acbee75.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-971ac066c8b1c8e7c33176652acbee75 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.78 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9d95af5-96da-4259-98c6-e2c4c574a896?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.78') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-a1c5cf13e8000c5432d1ca3433582d6a.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-a1c5cf13e8000c5432d1ca3433582d6a.yaml new file mode 100644 index 0000000000..4e3ba3ae22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-a1c5cf13e8000c5432d1ca3433582d6a.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-a1c5cf13e8000c5432d1ca3433582d6a + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Template Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a941aef-85f6-4719-b6ab-ace77a03e93e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-a51510a3a53aad35586cd77db87e9061.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-a51510a3a53aad35586cd77db87e9061.yaml new file mode 100644 index 0000000000..e2337306f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-a51510a3a53aad35586cd77db87e9061.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-a51510a3a53aad35586cd77db87e9061 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.87 - Cross-Site Request Forgery via add_to_wishlist + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ff2954-f494-4cd7-9f29-ee0e8551e339?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.87') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-a8dfb144a96e09ab6fe557b583b0e2e1.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-a8dfb144a96e09ab6fe557b583b0e2e1.yaml new file mode 100644 index 0000000000..0fda768161 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-a8dfb144a96e09ab6fe557b583b0e2e1.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-a8dfb144a96e09ab6fe557b583b0e2e1 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.87 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/256b4818-290b-4660-8e83-c18b068a8959?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.87') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-aba156d650d00c8cf56ce115df0a8a51.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-aba156d650d00c8cf56ce115df0a8a51.yaml new file mode 100644 index 0000000000..37799ab0b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-aba156d650d00c8cf56ce115df0a8a51.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-aba156d650d00c8cf56ce115df0a8a51 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.87 - Missing Authorization via wpr_update_form_action_meta + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3457b87-c860-4cf2-ac3d-2c6521b629ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.87') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-af78f3c1214fac33b65ff5feb5cc1cdc.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-af78f3c1214fac33b65ff5feb5cc1cdc.yaml new file mode 100644 index 0000000000..f3eb45563a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-af78f3c1214fac33b65ff5feb5cc1cdc.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-af78f3c1214fac33b65ff5feb5cc1cdc + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.971 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70582781-9de5-4124-bde4-d3d26724e9b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.971') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e003c2f515 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-bf5db01ece74e4b17297bc41008d1094.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-bf5db01ece74e4b17297bc41008d1094.yaml new file mode 100644 index 0000000000..b0d3e97a0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-bf5db01ece74e4b17297bc41008d1094.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-bf5db01ece74e4b17297bc41008d1094 + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac6c6ce4-9944-4c8e-89aa-6a2e870ef205?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-d8b16bccaae81ea809d42b4a13235086.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-d8b16bccaae81ea809d42b4a13235086.yaml new file mode 100644 index 0000000000..10d9d06eb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-d8b16bccaae81ea809d42b4a13235086.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-d8b16bccaae81ea809d42b4a13235086 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.87 - Cross-Site Request Forgery via wpr_update_form_action_meta + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc8bef03-51e0-4448-bddd-85300104e875?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.87') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-e9fbd2b032cc27ad5763353222798302.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-e9fbd2b032cc27ad5763353222798302.yaml new file mode 100644 index 0000000000..43c745fc46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-e9fbd2b032cc27ad5763353222798302.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-e9fbd2b032cc27ad5763353222798302 + +info: + name: > + Royal Elementor Addons <= 1.3.75 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4809d513-69e8-4572-9549-9dba9f40cb80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-f23a396c773e57d57939f05c9afe1afd.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-f23a396c773e57d57939f05c9afe1afd.yaml new file mode 100644 index 0000000000..1a74a42ad1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-f23a396c773e57d57939f05c9afe1afd.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-f23a396c773e57d57939f05c9afe1afd + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.94 - Unauthenticated Limited File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a04705d-cd17-4b4b-b04d-de55d6479dab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-f2cad193bfdf87038af8a439971f7167.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-f2cad193bfdf87038af8a439971f7167.yaml new file mode 100644 index 0000000000..f6fc14dc2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-f2cad193bfdf87038af8a439971f7167.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-f2cad193bfdf87038af8a439971f7167 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.971 - Authenticated (Contributor+) Stored Cross-Site Scripting via Flip Carousel, Flip Box, Post Grid, and Taxonomy List Widget Attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.971') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-f99e6ab2e39506303838ab9dbdf68d36.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-f99e6ab2e39506303838ab9dbdf68d36.yaml new file mode 100644 index 0000000000..c29f9f1cd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-f99e6ab2e39506303838ab9dbdf68d36.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-f99e6ab2e39506303838ab9dbdf68d36 + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Import Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62a5c796-1c14-4cb1-9f21-340b40e418df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-fbf2bd6ee999c2641f3988cb02ef8d65.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-fbf2bd6ee999c2641f3988cb02ef8d65.yaml new file mode 100644 index 0000000000..fe3a1068c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-fbf2bd6ee999c2641f3988cb02ef8d65.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-fbf2bd6ee999c2641f3988cb02ef8d65 + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Insufficient Access Control to Plugin Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb47b6cc-87e4-4d29-bbc7-6d7552bc3943?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-ffeb5e23a26d75b1d475c25e6d94fa7a.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-ffeb5e23a26d75b1d475c25e6d94fa7a.yaml new file mode 100644 index 0000000000..914c5c6422 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-ffeb5e23a26d75b1d475c25e6d94fa7a.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-ffeb5e23a26d75b1d475c25e6d94fa7a + +info: + name: > + Royal Elementor Addons <= 1.3.59 - Cross-Site Request Forgery to Menu Template creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55db7d81-7ffb-49da-b64e-23e892bddc57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-elementor-addons-fffeaa1f78027e80b8c9ac73b2739073.yaml b/nuclei-templates/cve-less/plugins/royal-elementor-addons-fffeaa1f78027e80b8c9ac73b2739073.yaml new file mode 100644 index 0000000000..f155f5a5d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-elementor-addons-fffeaa1f78027e80b8c9ac73b2739073.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-addons-fffeaa1f78027e80b8c9ac73b2739073 + +info: + name: > + Royal Elementor Addons and Templates <= 1.3.971 - Authenticated (Contributor+) Stored Cross-Site Scripting via Advanced Accordion Title Tags + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83ea2ec3-5d5b-44ea-83e6-41c4fa6e2e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-elementor-addons/" + google-query: inurl:"/wp-content/plugins/royal-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.971') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/royal-slider-b8b913c56ed39f29c61eb2552bb40930.yaml b/nuclei-templates/cve-less/plugins/royal-slider-b8b913c56ed39f29c61eb2552bb40930.yaml new file mode 100644 index 0000000000..e9c93a1512 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/royal-slider-b8b913c56ed39f29c61eb2552bb40930.yaml @@ -0,0 +1,58 @@ +id: royal-slider-b8b913c56ed39f29c61eb2552bb40930 + +info: + name: > + Royal Slider Plugin < 3.2.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66a65270-182b-44b1-968b-4fc2d8de1ea6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/royal-slider/" + google-query: inurl:"/wp-content/plugins/royal-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,royal-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/royal-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsfirewall-4c932f620189df7cfc310b8ab7529a19.yaml b/nuclei-templates/cve-less/plugins/rsfirewall-4c932f620189df7cfc310b8ab7529a19.yaml new file mode 100644 index 0000000000..84e9ba6ab8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsfirewall-4c932f620189df7cfc310b8ab7529a19.yaml @@ -0,0 +1,58 @@ +id: rsfirewall-4c932f620189df7cfc310b8ab7529a19 + +info: + name: > + RSFirewall! <= 1.1.24 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64f43aee-01ee-4fbb-a174-966ed3c06b21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsfirewall/" + google-query: inurl:"/wp-content/plugins/rsfirewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsfirewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsfirewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsfirewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rss-feed-reader-0bfa9343d868449c3d973f2c81052fe9.yaml b/nuclei-templates/cve-less/plugins/rss-feed-reader-0bfa9343d868449c3d973f2c81052fe9.yaml new file mode 100644 index 0000000000..edb6f86528 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rss-feed-reader-0bfa9343d868449c3d973f2c81052fe9.yaml @@ -0,0 +1,58 @@ +id: rss-feed-reader-0bfa9343d868449c3d973f2c81052fe9 + +info: + name: > + RSS Feed Reader <= 0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c49c7db-50de-4f1d-acfa-d12a84a42d94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rss-feed-reader/" + google-query: inurl:"/wp-content/plugins/rss-feed-reader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rss-feed-reader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rss-feed-reader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rss-feed-reader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rss-feed-widget-20537453f991f8c89e48950bab56c824.yaml b/nuclei-templates/cve-less/plugins/rss-feed-widget-20537453f991f8c89e48950bab56c824.yaml new file mode 100644 index 0000000000..d73f10dfc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rss-feed-widget-20537453f991f8c89e48950bab56c824.yaml @@ -0,0 +1,58 @@ +id: rss-feed-widget-20537453f991f8c89e48950bab56c824 + +info: + name: > + RSS Feed Widget <= 2.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91abd172-e024-4272-96ee-1725af4d5488?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rss-feed-widget/" + google-query: inurl:"/wp-content/plugins/rss-feed-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rss-feed-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rss-feed-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rss-feed-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rss-feed-widget-cad14760637700672da85dda380a58c3.yaml b/nuclei-templates/cve-less/plugins/rss-feed-widget-cad14760637700672da85dda380a58c3.yaml new file mode 100644 index 0000000000..f688b20716 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rss-feed-widget-cad14760637700672da85dda380a58c3.yaml @@ -0,0 +1,58 @@ +id: rss-feed-widget-cad14760637700672da85dda380a58c3 + +info: + name: > + RSS Feed Widget <= 2.9.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c468a56c-4411-49fc-8014-fc9b71a645c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rss-feed-widget/" + google-query: inurl:"/wp-content/plugins/rss-feed-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rss-feed-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rss-feed-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rss-feed-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rss-for-yandex-turbo-509b534cfaeb00eddb901be35d0a9812.yaml b/nuclei-templates/cve-less/plugins/rss-for-yandex-turbo-509b534cfaeb00eddb901be35d0a9812.yaml new file mode 100644 index 0000000000..2f41ad88ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rss-for-yandex-turbo-509b534cfaeb00eddb901be35d0a9812.yaml @@ -0,0 +1,58 @@ +id: rss-for-yandex-turbo-509b534cfaeb00eddb901be35d0a9812 + +info: + name: > + RSS for Yandex Turbo <= 1.29 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5269ea0a-b0e9-433a-a166-28d23bfb6b4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rss-for-yandex-turbo/" + google-query: inurl:"/wp-content/plugins/rss-for-yandex-turbo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rss-for-yandex-turbo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rss-for-yandex-turbo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rss-for-yandex-turbo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rss-for-yandex-turbo-6c5c77255a84fb41b6fdd26d0fd10783.yaml b/nuclei-templates/cve-less/plugins/rss-for-yandex-turbo-6c5c77255a84fb41b6fdd26d0fd10783.yaml new file mode 100644 index 0000000000..05f50f1bb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rss-for-yandex-turbo-6c5c77255a84fb41b6fdd26d0fd10783.yaml @@ -0,0 +1,58 @@ +id: rss-for-yandex-turbo-6c5c77255a84fb41b6fdd26d0fd10783 + +info: + name: > + Rss for Yandex Turbo <= 1.30 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a246227c-89c1-46c3-a74c-b5de260d8a19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rss-for-yandex-turbo/" + google-query: inurl:"/wp-content/plugins/rss-for-yandex-turbo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rss-for-yandex-turbo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rss-for-yandex-turbo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rss-for-yandex-turbo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rss-import-cd17a32212236705de6be45ec4d31053.yaml b/nuclei-templates/cve-less/plugins/rss-import-cd17a32212236705de6be45ec4d31053.yaml new file mode 100644 index 0000000000..2bd90c5848 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rss-import-cd17a32212236705de6be45ec4d31053.yaml @@ -0,0 +1,58 @@ +id: rss-import-cd17a32212236705de6be45ec4d31053 + +info: + name: > + RSSImport <= 4.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09a052a1-6e69-4972-9dab-802754cfb93a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rss-import/" + google-query: inurl:"/wp-content/plugins/rss-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rss-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rss-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rss-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rss-includes-pages-e82724cb73e8d739a7e74ba12a2c0b77.yaml b/nuclei-templates/cve-less/plugins/rss-includes-pages-e82724cb73e8d739a7e74ba12a2c0b77.yaml new file mode 100644 index 0000000000..f65d7773e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rss-includes-pages-e82724cb73e8d739a7e74ba12a2c0b77.yaml @@ -0,0 +1,58 @@ +id: rss-includes-pages-e82724cb73e8d739a7e74ba12a2c0b77 + +info: + name: > + RSS Includes Pages <= 3.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb5c08ea-1321-42f8-aea2-49661396311b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rss-includes-pages/" + google-query: inurl:"/wp-content/plugins/rss-includes-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rss-includes-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rss-includes-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rss-includes-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvp-38dc5d2aec94b7c14ed0604e5b57a847.yaml b/nuclei-templates/cve-less/plugins/rsvp-38dc5d2aec94b7c14ed0604e5b57a847.yaml new file mode 100644 index 0000000000..64b22a49ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvp-38dc5d2aec94b7c14ed0604e5b57a847.yaml @@ -0,0 +1,58 @@ +id: rsvp-38dc5d2aec94b7c14ed0604e5b57a847 + +info: + name: > + RSVP and Event Management <= 2.7.7 - Unauthenticated Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ac44e4f-7052-465c-82ab-c3f23a62c898?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvp/" + google-query: inurl:"/wp-content/plugins/rsvp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvp-72cd99005222b05f8d3ba5703b3d3c18.yaml b/nuclei-templates/cve-less/plugins/rsvp-72cd99005222b05f8d3ba5703b3d3c18.yaml new file mode 100644 index 0000000000..fda1e0ed36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvp-72cd99005222b05f8d3ba5703b3d3c18.yaml @@ -0,0 +1,58 @@ +id: rsvp-72cd99005222b05f8d3ba5703b3d3c18 + +info: + name: > + RSVP and Event Management <= 2.7.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f73b12b-813d-49fa-84a0-3345023a16c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvp/" + google-query: inurl:"/wp-content/plugins/rsvp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvp-9a3fa62818d09a4c2a4693cadbb72035.yaml b/nuclei-templates/cve-less/plugins/rsvp-9a3fa62818d09a4c2a4693cadbb72035.yaml new file mode 100644 index 0000000000..bee2b6cddb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvp-9a3fa62818d09a4c2a4693cadbb72035.yaml @@ -0,0 +1,58 @@ +id: rsvp-9a3fa62818d09a4c2a4693cadbb72035 + +info: + name: > + RSVP and Event Management Plugin <= 2.3.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/792d6c70-4c17-493a-bb4a-08a55e8240d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvp/" + google-query: inurl:"/wp-content/plugins/rsvp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-11d11665e7b84e94329e03dc64274c9e.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-11d11665e7b84e94329e03dc64274c9e.yaml new file mode 100644 index 0000000000..f14bdc226f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-11d11665e7b84e94329e03dc64274c9e.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-11d11665e7b84e94329e03dc64274c9e + +info: + name: > + RSVPMaker <= 8.7.2 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/027fa70f-8777-4a0b-b2aa-18bcdcd99cbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-202c703bcd7494b0db3a9f2aa3a2b6de.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-202c703bcd7494b0db3a9f2aa3a2b6de.yaml new file mode 100644 index 0000000000..d17680c406 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-202c703bcd7494b0db3a9f2aa3a2b6de.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-202c703bcd7494b0db3a9f2aa3a2b6de + +info: + name: > + RSVPMaker <= 9.9.3 - Authenticated (Admin+) SQL Injection via $email value + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44373541-adc5-4aa0-abde-0693f2760afb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-54909ff694f2550a529ed9dc33c2ddad.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-54909ff694f2550a529ed9dc33c2ddad.yaml new file mode 100644 index 0000000000..985e679210 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-54909ff694f2550a529ed9dc33c2ddad.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-54909ff694f2550a529ed9dc33c2ddad + +info: + name: > + RSVPMaker <= 9.2.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6031edec-4274-4e42-9e3a-ce0c94958b17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-59b8b133d2114d7582e975a5c3c2845d.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-59b8b133d2114d7582e975a5c3c2845d.yaml new file mode 100644 index 0000000000..aecd16c27c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-59b8b133d2114d7582e975a5c3c2845d.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-59b8b133d2114d7582e975a5c3c2845d + +info: + name: > + RSVPMaker <= 7.8.1 - Unauthenticated SQL Injection via 'event_count' + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da6eb803-3e2a-4ff1-9b93-6f109e8d0714?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-73c59415c469f5d4853f326fdd664c56.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-73c59415c469f5d4853f326fdd664c56.yaml new file mode 100644 index 0000000000..225762abb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-73c59415c469f5d4853f326fdd664c56.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-73c59415c469f5d4853f326fdd664c56 + +info: + name: > + RSVPMaker <= 10.5.4 - Authenticated (Administrator+) SQL Injection via 'resend' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6709f9b0-0915-4361-9fb0-1f2696e26c2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-84319e4342ea4c4283c523e681307b09.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-84319e4342ea4c4283c523e681307b09.yaml new file mode 100644 index 0000000000..c85a72462e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-84319e4342ea4c4283c523e681307b09.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-84319e4342ea4c4283c523e681307b09 + +info: + name: > + RSVPMarker <= 10.6.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f655704d-70a1-40d8-ae36-39029185d262?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-871693a9ac7cbae97114e3dda03c407f.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-871693a9ac7cbae97114e3dda03c407f.yaml new file mode 100644 index 0000000000..4272a44f1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-871693a9ac7cbae97114e3dda03c407f.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-871693a9ac7cbae97114e3dda03c407f + +info: + name: > + RSVPMaker <= 9.3.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1d02646-271a-4079-8a47-00b4029e9c1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-b5eb1eaeff0523cd8fae2efd6f6ac02e.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-b5eb1eaeff0523cd8fae2efd6f6ac02e.yaml new file mode 100644 index 0000000000..658098fd13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-b5eb1eaeff0523cd8fae2efd6f6ac02e.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-b5eb1eaeff0523cd8fae2efd6f6ac02e + +info: + name: > + RSVPMaker <= 6.1.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f89c43c-6729-40c5-bd32-3c328f83e366?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-d81020aeab63f5a6071cc384e45c425d.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-d81020aeab63f5a6071cc384e45c425d.yaml new file mode 100644 index 0000000000..bd4d0b1da2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-d81020aeab63f5a6071cc384e45c425d.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-d81020aeab63f5a6071cc384e45c425d + +info: + name: > + RSVPMaker <= 9.2.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6837b91d-b3ba-435a-965b-fa18d9b9b9c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-e4702a04134b47b76d799a6fc7f1263b.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-e4702a04134b47b76d799a6fc7f1263b.yaml new file mode 100644 index 0000000000..b32f01e6ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-e4702a04134b47b76d799a6fc7f1263b.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-e4702a04134b47b76d799a6fc7f1263b + +info: + name: > + RSVPMaker < 5.6.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdc2a31f-19c2-4474-a3b0-16ded1912ddd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-excel-a2edcd49a7e89b5985d5c1db4e3e3fcb.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-excel-a2edcd49a7e89b5985d5c1db4e3e3fcb.yaml new file mode 100644 index 0000000000..0e9d457c50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-excel-a2edcd49a7e89b5985d5c1db4e3e3fcb.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-excel-a2edcd49a7e89b5985d5c1db4e3e3fcb + +info: + name: > + RSVPmaker Excel <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec084ade-d2e7-4484-8381-a83b04c41059?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker-excel/" + google-query: inurl:"/wp-content/plugins/rsvpmaker-excel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker-excel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker-excel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker-excel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-fa61f96851f0d9df6ac08db9cd077c0f.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-fa61f96851f0d9df6ac08db9cd077c0f.yaml new file mode 100644 index 0000000000..f8ff1ba0fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-fa61f96851f0d9df6ac08db9cd077c0f.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-fa61f96851f0d9df6ac08db9cd077c0f + +info: + name: > + RSVPMaker <= 10.6.6 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/647cc71d-4d3a-4722-b498-baaee2450809?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-fb36faa4bab8a0d1c4868c63043ddd1b.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-fb36faa4bab8a0d1c4868c63043ddd1b.yaml new file mode 100644 index 0000000000..6f86897d0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-fb36faa4bab8a0d1c4868c63043ddd1b.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-fb36faa4bab8a0d1c4868c63043ddd1b + +info: + name: > + RSVPMaker <= 9.9.3 - Authenticated (Admin+) SQL Injection via 'delete' parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13101551-d62e-4b27-9156-5b3d022f0e55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-fe52f515eb00fff50a18a2e75044bc1d.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-fe52f515eb00fff50a18a2e75044bc1d.yaml new file mode 100644 index 0000000000..1bcdcdda89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-fe52f515eb00fff50a18a2e75044bc1d.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-fe52f515eb00fff50a18a2e75044bc1d + +info: + name: > + RSVPMaker <= 10.6.5 - Unauthenticated Stored Cross-Site Scripting via 'email' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aaf0e58c-0430-44fe-980f-8ea469802c86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rsvpmaker-ff8293f84b21b2955bef22aebfa62b32.yaml b/nuclei-templates/cve-less/plugins/rsvpmaker-ff8293f84b21b2955bef22aebfa62b32.yaml new file mode 100644 index 0000000000..443434518c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rsvpmaker-ff8293f84b21b2955bef22aebfa62b32.yaml @@ -0,0 +1,58 @@ +id: rsvpmaker-ff8293f84b21b2955bef22aebfa62b32 + +info: + name: > + RSVPMarker <= 10.6.5 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfb27513-61ad-4cf0-a471-0ab7aeb0801b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rsvpmaker/" + google-query: inurl:"/wp-content/plugins/rsvpmaker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rsvpmaker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rsvpmaker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rsvpmaker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rt-custom-css-page-and-post-702f90b8bb07e6c13ea1a4bcd70721ac.yaml b/nuclei-templates/cve-less/plugins/rt-custom-css-page-and-post-702f90b8bb07e6c13ea1a4bcd70721ac.yaml new file mode 100644 index 0000000000..957895c2fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rt-custom-css-page-and-post-702f90b8bb07e6c13ea1a4bcd70721ac.yaml @@ -0,0 +1,58 @@ +id: rt-custom-css-page-and-post-702f90b8bb07e6c13ea1a4bcd70721ac + +info: + name: > + Royal Custom CSS for Page and Post <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/611b88f4-96ae-47e4-8642-e09bee333468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rt-custom-css-page-and-post/" + google-query: inurl:"/wp-content/plugins/rt-custom-css-page-and-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rt-custom-css-page-and-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rt-custom-css-page-and-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rt-custom-css-page-and-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rt-easy-builder-advanced-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/rt-easy-builder-advanced-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..60dc897336 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rt-easy-builder-advanced-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: rt-easy-builder-advanced-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rt-easy-builder-advanced-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rt-easy-builder-advanced-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rt-easy-builder-advanced-addons-for-elementor-f0986ec848116bdaf85ff2fe79a684cc.yaml b/nuclei-templates/cve-less/plugins/rt-easy-builder-advanced-addons-for-elementor-f0986ec848116bdaf85ff2fe79a684cc.yaml new file mode 100644 index 0000000000..d0c5713603 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rt-easy-builder-advanced-addons-for-elementor-f0986ec848116bdaf85ff2fe79a684cc.yaml @@ -0,0 +1,58 @@ +id: rt-easy-builder-advanced-addons-for-elementor-f0986ec848116bdaf85ff2fe79a684cc + +info: + name: > + RT Easy Builder – Advanced addons for Elementor <= 2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6defd072-0203-471a-96cf-579a9eebcd9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rt-easy-builder-advanced-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rt-easy-builder-advanced-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rt-prettyphoto-94b0b54aeb124f4c7a107e54a5615849.yaml b/nuclei-templates/cve-less/plugins/rt-prettyphoto-94b0b54aeb124f4c7a107e54a5615849.yaml new file mode 100644 index 0000000000..f00569010c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rt-prettyphoto-94b0b54aeb124f4c7a107e54a5615849.yaml @@ -0,0 +1,58 @@ +id: rt-prettyphoto-94b0b54aeb124f4c7a107e54a5615849 + +info: + name: > + Royal PrettyPhoto <= 1.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62de6922-f3f2-4996-a749-2d6d3a8be042?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rt-prettyphoto/" + google-query: inurl:"/wp-content/plugins/rt-prettyphoto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rt-prettyphoto,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rt-prettyphoto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rt-prettyphoto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ruby-help-desk-9346f7a9d2f3883e949e211cd3195670.yaml b/nuclei-templates/cve-less/plugins/ruby-help-desk-9346f7a9d2f3883e949e211cd3195670.yaml new file mode 100644 index 0000000000..b58de72623 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ruby-help-desk-9346f7a9d2f3883e949e211cd3195670.yaml @@ -0,0 +1,58 @@ +id: ruby-help-desk-9346f7a9d2f3883e949e211cd3195670 + +info: + name: > + Ruby Help Desk <= 1.3.3 - Missing Authorization to Arbitrary Ticket Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd741e2d-5478-4b9a-83ab-7ccafdc5d12f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ruby-help-desk/" + google-query: inurl:"/wp-content/plugins/ruby-help-desk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ruby-help-desk,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ruby-help-desk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ruby-help-desk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rucy-83e12e5ef7835e334ea713df657c881c.yaml b/nuclei-templates/cve-less/plugins/rucy-83e12e5ef7835e334ea713df657c881c.yaml new file mode 100644 index 0000000000..9a29fc5fb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rucy-83e12e5ef7835e334ea713df657c881c.yaml @@ -0,0 +1,58 @@ +id: rucy-83e12e5ef7835e334ea713df657c881c + +info: + name: > + Rucy <= 0.4.4 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/595d0401-55b9-418e-8b99-48b23e9a2662?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rucy/" + google-query: inurl:"/wp-content/plugins/rucy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rucy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rucy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rucy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rumbletalk-chat-a-chat-with-themes-4505fe3a4261c48a734f7d8e99d7b55b.yaml b/nuclei-templates/cve-less/plugins/rumbletalk-chat-a-chat-with-themes-4505fe3a4261c48a734f7d8e99d7b55b.yaml new file mode 100644 index 0000000000..20a29f28bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rumbletalk-chat-a-chat-with-themes-4505fe3a4261c48a734f7d8e99d7b55b.yaml @@ -0,0 +1,58 @@ +id: rumbletalk-chat-a-chat-with-themes-4505fe3a4261c48a734f7d8e99d7b55b + +info: + name: > + RumbleTalk Live Group Chat <= 6.1.9 - Missing Authorization via handleRequest + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d6e168-a768-4062-9ef1-0be9d6c65c51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rumbletalk-chat-a-chat-with-themes/" + google-query: inurl:"/wp-content/plugins/rumbletalk-chat-a-chat-with-themes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rumbletalk-chat-a-chat-with-themes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rumbletalk-chat-a-chat-with-themes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rumbletalk-chat-a-chat-with-themes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/run-time-image-resizing-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/run-time-image-resizing-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c5eda7d7a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/run-time-image-resizing-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: run-time-image-resizing-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/run-time-image-resizing/" + google-query: inurl:"/wp-content/plugins/run-time-image-resizing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,run-time-image-resizing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/run-time-image-resizing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "run-time-image-resizing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/run-time-image-resizing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/run-time-image-resizing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..2bc4578e8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/run-time-image-resizing-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: run-time-image-resizing-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/run-time-image-resizing/" + google-query: inurl:"/wp-content/plugins/run-time-image-resizing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,run-time-image-resizing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/run-time-image-resizing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "run-time-image-resizing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/running-line-b2a2498dae5be84f29d9989669186b97.yaml b/nuclei-templates/cve-less/plugins/running-line-b2a2498dae5be84f29d9989669186b97.yaml new file mode 100644 index 0000000000..cdca7963db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/running-line-b2a2498dae5be84f29d9989669186b97.yaml @@ -0,0 +1,58 @@ +id: running-line-b2a2498dae5be84f29d9989669186b97 + +info: + name: > + Running Line <= 1.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b6557de-fd4f-4172-ad7d-940f9f3ea2db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/running-line/" + google-query: inurl:"/wp-content/plugins/running-line/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,running-line,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/running-line/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "running-line" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rustolat-39be907595b014d4e7a7c4f54bad9f2a.yaml b/nuclei-templates/cve-less/plugins/rustolat-39be907595b014d4e7a7c4f54bad9f2a.yaml new file mode 100644 index 0000000000..15d5c7daf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rustolat-39be907595b014d4e7a7c4f54bad9f2a.yaml @@ -0,0 +1,58 @@ +id: rustolat-39be907595b014d4e7a7c4f54bad9f2a + +info: + name: > + Rus-To-Lat <= 0.3 - Cross-Site Request Forgery to Plugins Options Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d07d8c3a-5e97-422a-ba20-e0bc206dda59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rustolat/" + google-query: inurl:"/wp-content/plugins/rustolat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rustolat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rustolat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rustolat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ruven-toolkit-81219af6a17b244e1843ac9c7762f11a.yaml b/nuclei-templates/cve-less/plugins/ruven-toolkit-81219af6a17b244e1843ac9c7762f11a.yaml new file mode 100644 index 0000000000..2ac151107f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ruven-toolkit-81219af6a17b244e1843ac9c7762f11a.yaml @@ -0,0 +1,58 @@ +id: ruven-toolkit-81219af6a17b244e1843ac9c7762f11a + +info: + name: > + Ruven Toolkit <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01b9f536-cdab-4e38-b935-008cbd899a98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ruven-toolkit/" + google-query: inurl:"/wp-content/plugins/ruven-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ruven-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ruven-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ruven-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rvg-optimize-database-5f21cea7a9aedb5442f3d8dbb7f2496a.yaml b/nuclei-templates/cve-less/plugins/rvg-optimize-database-5f21cea7a9aedb5442f3d8dbb7f2496a.yaml new file mode 100644 index 0000000000..44b072e79c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rvg-optimize-database-5f21cea7a9aedb5442f3d8dbb7f2496a.yaml @@ -0,0 +1,58 @@ +id: rvg-optimize-database-5f21cea7a9aedb5442f3d8dbb7f2496a + +info: + name: > + Optimize Database after Deleting Revisions <= 5.0.110 - Missing Authorization via 'odb_csv_download' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09050c1e-26e0-46e7-b5f0-ebaff4066b0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rvg-optimize-database/" + google-query: inurl:"/wp-content/plugins/rvg-optimize-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rvg-optimize-database,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rvg-optimize-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rvg-optimize-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.110') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rvg-optimize-database-5fa9907f51cd1542af3ba3f055782fc5.yaml b/nuclei-templates/cve-less/plugins/rvg-optimize-database-5fa9907f51cd1542af3ba3f055782fc5.yaml new file mode 100644 index 0000000000..19fab923bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rvg-optimize-database-5fa9907f51cd1542af3ba3f055782fc5.yaml @@ -0,0 +1,58 @@ +id: rvg-optimize-database-5fa9907f51cd1542af3ba3f055782fc5 + +info: + name: > + Optimize Database after Deleting Revisions <= 5.0.110 - Cross-Site Request Forgery via 'odb_csv_download' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d01548e-91bf-44db-83dc-10c7d5962f9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rvg-optimize-database/" + google-query: inurl:"/wp-content/plugins/rvg-optimize-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rvg-optimize-database,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rvg-optimize-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rvg-optimize-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.110') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rvg-optimize-database-75da5a5df58032a31ea21868586e0a7e.yaml b/nuclei-templates/cve-less/plugins/rvg-optimize-database-75da5a5df58032a31ea21868586e0a7e.yaml new file mode 100644 index 0000000000..cc1d5c2984 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rvg-optimize-database-75da5a5df58032a31ea21868586e0a7e.yaml @@ -0,0 +1,58 @@ +id: rvg-optimize-database-75da5a5df58032a31ea21868586e0a7e + +info: + name: > + Optimize Database after Deleting Revisions <= 5.1.1 - Cross-Site Request Forgery via 'odb_start_manually' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d7e4d9c-d088-48db-88b7-09205115636f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rvg-optimize-database/" + google-query: inurl:"/wp-content/plugins/rvg-optimize-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rvg-optimize-database,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rvg-optimize-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rvg-optimize-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rw-divi-unite-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/rw-divi-unite-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..59d96ef960 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rw-divi-unite-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: rw-divi-unite-gallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rw-divi-unite-gallery/" + google-query: inurl:"/wp-content/plugins/rw-divi-unite-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rw-divi-unite-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rw-divi-unite-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rw-divi-unite-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/rw-divi-unite-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/rw-divi-unite-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..7af00626c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/rw-divi-unite-gallery-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: rw-divi-unite-gallery-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/rw-divi-unite-gallery/" + google-query: inurl:"/wp-content/plugins/rw-divi-unite-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,rw-divi-unite-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/rw-divi-unite-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rw-divi-unite-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s2framework-6b723c7b581edfa3ccd6460c5d7aad90.yaml b/nuclei-templates/cve-less/plugins/s2framework-6b723c7b581edfa3ccd6460c5d7aad90.yaml new file mode 100644 index 0000000000..5c29740183 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s2framework-6b723c7b581edfa3ccd6460c5d7aad90.yaml @@ -0,0 +1,58 @@ +id: s2framework-6b723c7b581edfa3ccd6460c5d7aad90 + +info: + name: > + s2Framework <= 4.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05c4d7e3-f8a8-4c11-b962-38922b0801f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s2Framework/" + google-query: inurl:"/wp-content/plugins/s2Framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s2Framework,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s2Framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s2Framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s2member-0e1b741ad7286ca5428685bd7aed1755.yaml b/nuclei-templates/cve-less/plugins/s2member-0e1b741ad7286ca5428685bd7aed1755.yaml new file mode 100644 index 0000000000..af7555c57b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s2member-0e1b741ad7286ca5428685bd7aed1755.yaml @@ -0,0 +1,58 @@ +id: s2member-0e1b741ad7286ca5428685bd7aed1755 + +info: + name: > + s2Member – Best Membership Plugin for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions <= 230815 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80bfb470-a3df-497f-940d-051ccaa6215b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s2member/" + google-query: inurl:"/wp-content/plugins/s2member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s2member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s2member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s2member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 230815') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s2member-5573468f295cf6226ec0e468f3d5d806.yaml b/nuclei-templates/cve-less/plugins/s2member-5573468f295cf6226ec0e468f3d5d806.yaml new file mode 100644 index 0000000000..67e92082b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s2member-5573468f295cf6226ec0e468f3d5d806.yaml @@ -0,0 +1,58 @@ +id: s2member-5573468f295cf6226ec0e468f3d5d806 + +info: + name: > + s2Member <= 240315 - Limited Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26e7dd3f-5bdd-47d2-a013-82db72b4eae6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s2member/" + google-query: inurl:"/wp-content/plugins/s2member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s2member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s2member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s2member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 240315') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s2member-e07374f70a1aa87298a8b60340913353.yaml b/nuclei-templates/cve-less/plugins/s2member-e07374f70a1aa87298a8b60340913353.yaml new file mode 100644 index 0000000000..65df173c5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s2member-e07374f70a1aa87298a8b60340913353.yaml @@ -0,0 +1,58 @@ +id: s2member-e07374f70a1aa87298a8b60340913353 + +info: + name: > + s2Member® Framework (Membership, Member Level Roles, Access Capabilities, PayPal Members) < 111220 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ed25de7-f002-4108-b2c6-f790acbbe27b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s2member/" + google-query: inurl:"/wp-content/plugins/s2member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s2member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s2member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s2member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 111220') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s2member-secure-file-browser-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/s2member-secure-file-browser-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..525fa6bb3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s2member-secure-file-browser-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: s2member-secure-file-browser-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s2member-secure-file-browser/" + google-query: inurl:"/wp-content/plugins/s2member-secure-file-browser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s2member-secure-file-browser,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s2member-secure-file-browser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s2member-secure-file-browser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s3-video-2f8d0ca1e6e86f93253415194d417267.yaml b/nuclei-templates/cve-less/plugins/s3-video-2f8d0ca1e6e86f93253415194d417267.yaml new file mode 100644 index 0000000000..b11bce60d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s3-video-2f8d0ca1e6e86f93253415194d417267.yaml @@ -0,0 +1,58 @@ +id: s3-video-2f8d0ca1e6e86f93253415194d417267 + +info: + name: > + S3 Video <= 0.983 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58410382-8820-49e2-8dfd-87937287b8d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s3-video/" + google-query: inurl:"/wp-content/plugins/s3-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s3-video,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s3-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s3-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.983') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s3-video-83c44f74fb6f267a714fb43018452c84.yaml b/nuclei-templates/cve-less/plugins/s3-video-83c44f74fb6f267a714fb43018452c84.yaml new file mode 100644 index 0000000000..c4622a69ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s3-video-83c44f74fb6f267a714fb43018452c84.yaml @@ -0,0 +1,58 @@ +id: s3-video-83c44f74fb6f267a714fb43018452c84 + +info: + name: > + S3 Video Plugin < 0.98 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3ec7d23-4386-470f-955e-631f461e290b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s3-video/" + google-query: inurl:"/wp-content/plugins/s3-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s3-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s3-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s3-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s3-video-98fa09468510e4f3d608da204df8d702.yaml b/nuclei-templates/cve-less/plugins/s3-video-98fa09468510e4f3d608da204df8d702.yaml new file mode 100644 index 0000000000..1a4599bd32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s3-video-98fa09468510e4f3d608da204df8d702.yaml @@ -0,0 +1,58 @@ +id: s3-video-98fa09468510e4f3d608da204df8d702 + +info: + name: > + VideoJS (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d73f773-f084-40da-b18f-8b30b0d0c08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s3-video/" + google-query: inurl:"/wp-content/plugins/s3-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s3-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s3-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s3-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s3-video-b308d8dd463cbe3361a5a4c348d193ac.yaml b/nuclei-templates/cve-less/plugins/s3-video-b308d8dd463cbe3361a5a4c348d193ac.yaml new file mode 100644 index 0000000000..f5a32b7ec5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s3-video-b308d8dd463cbe3361a5a4c348d193ac.yaml @@ -0,0 +1,58 @@ +id: s3-video-b308d8dd463cbe3361a5a4c348d193ac + +info: + name: > + S3 Video <= 0.982 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad254899-983b-42bc-a248-7dbf9003d06c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s3-video/" + google-query: inurl:"/wp-content/plugins/s3-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s3-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s3-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s3-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.982') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s3audible-amazon-s3-music-player-73b7b4fd6adbc8f05bd6aa0607d34105.yaml b/nuclei-templates/cve-less/plugins/s3audible-amazon-s3-music-player-73b7b4fd6adbc8f05bd6aa0607d34105.yaml new file mode 100644 index 0000000000..034d9708b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s3audible-amazon-s3-music-player-73b7b4fd6adbc8f05bd6aa0607d34105.yaml @@ -0,0 +1,58 @@ +id: s3audible-amazon-s3-music-player-73b7b4fd6adbc8f05bd6aa0607d34105 + +info: + name: > + S3bubble Amazon S3 Media Streaming <= 3.5.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/340a46e5-b15d-4f0c-8b7e-51f7de7741b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s3audible-amazon-s3-music-player/" + google-query: inurl:"/wp-content/plugins/s3audible-amazon-s3-music-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s3audible-amazon-s3-music-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s3audible-amazon-s3-music-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s3audible-amazon-s3-music-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-audio-streaming-727a6d10eed1dfebfba432e96cc38739.yaml b/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-audio-streaming-727a6d10eed1dfebfba432e96cc38739.yaml new file mode 100644 index 0000000000..cdd636269a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-audio-streaming-727a6d10eed1dfebfba432e96cc38739.yaml @@ -0,0 +1,58 @@ +id: s3bubble-amazon-s3-audio-streaming-727a6d10eed1dfebfba432e96cc38739 + +info: + name: > + S3Bubble Cloud Video with Adverts and Analytics < 4.8 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b76b3dd2-bf6b-4b18-9666-2ecbf628437c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s3bubble-amazon-s3-audio-streaming/" + google-query: inurl:"/wp-content/plugins/s3bubble-amazon-s3-audio-streaming/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s3bubble-amazon-s3-audio-streaming,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s3bubble-amazon-s3-audio-streaming/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s3bubble-amazon-s3-audio-streaming" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-html-5-video-with-adverts-94a35e06d280c2901bcd1f032d9e8a1d.yaml b/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-html-5-video-with-adverts-94a35e06d280c2901bcd1f032d9e8a1d.yaml new file mode 100644 index 0000000000..56c7cc1a45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-html-5-video-with-adverts-94a35e06d280c2901bcd1f032d9e8a1d.yaml @@ -0,0 +1,58 @@ +id: s3bubble-amazon-s3-html-5-video-with-adverts-94a35e06d280c2901bcd1f032d9e8a1d + +info: + name: > + S3 Bubble Amazon S3 HTML5 Video with Adverts <= 0.7 - Directory Traversal to Arbitrary File Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a102478c-c704-47d4-8b2b-492f75ec38b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/" + google-query: inurl:"/wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s3bubble-amazon-s3-html-5-video-with-adverts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s3bubble-amazon-s3-html-5-video-with-adverts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-html-5-video-with-adverts-cd6e7fbf5a95badd9018fdfc8c60db7c.yaml b/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-html-5-video-with-adverts-cd6e7fbf5a95badd9018fdfc8c60db7c.yaml new file mode 100644 index 0000000000..055bd9b6a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/s3bubble-amazon-s3-html-5-video-with-adverts-cd6e7fbf5a95badd9018fdfc8c60db7c.yaml @@ -0,0 +1,58 @@ +id: s3bubble-amazon-s3-html-5-video-with-adverts-cd6e7fbf5a95badd9018fdfc8c60db7c + +info: + name: > + S3 Bubble Amazon S3 HTML5 Video with Adverts <= 2.0 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe93f443-7941-4463-a068-c292c172f071?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/" + google-query: inurl:"/wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,s3bubble-amazon-s3-html-5-video-with-adverts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "s3bubble-amazon-s3-html-5-video-with-adverts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/saan-world-clock-dbff9a993e10a4f80cd4718f67303541.yaml b/nuclei-templates/cve-less/plugins/saan-world-clock-dbff9a993e10a4f80cd4718f67303541.yaml new file mode 100644 index 0000000000..f4b099778c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/saan-world-clock-dbff9a993e10a4f80cd4718f67303541.yaml @@ -0,0 +1,58 @@ +id: saan-world-clock-dbff9a993e10a4f80cd4718f67303541 + +info: + name: > + Saan World Clock <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f673be3-04fe-4a42-ae50-9cf4fd5e63d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/saan-world-clock/" + google-query: inurl:"/wp-content/plugins/saan-world-clock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,saan-world-clock,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/saan-world-clock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "saan-world-clock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sabaisdiscuss-7038593ad5992122fe087ebe7875e6ac.yaml b/nuclei-templates/cve-less/plugins/sabaisdiscuss-7038593ad5992122fe087ebe7875e6ac.yaml new file mode 100644 index 0000000000..f6b1b1f636 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sabaisdiscuss-7038593ad5992122fe087ebe7875e6ac.yaml @@ -0,0 +1,58 @@ +id: sabaisdiscuss-7038593ad5992122fe087ebe7875e6ac + +info: + name: > + Sabai Discuss <= 1.4.13 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f52f6d55-d0f5-4eba-bc07-ed94bded8777?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sabaisdiscuss/" + google-query: inurl:"/wp-content/plugins/sabaisdiscuss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sabaisdiscuss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sabaisdiscuss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sabaisdiscuss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sabre-8a88cbe198527237519cb3478f4555ce.yaml b/nuclei-templates/cve-less/plugins/sabre-8a88cbe198527237519cb3478f4555ce.yaml new file mode 100644 index 0000000000..fc1705ff15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sabre-8a88cbe198527237519cb3478f4555ce.yaml @@ -0,0 +1,58 @@ +id: sabre-8a88cbe198527237519cb3478f4555ce + +info: + name: > + Sabre < 1.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2b7802a-3cbe-4488-93d2-5f8a34faf8ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sabre/" + google-query: inurl:"/wp-content/plugins/sabre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sabre,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sabre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sabre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/safe-editor-e01a95cfae1821b6d1bcf2a917c4f01c.yaml b/nuclei-templates/cve-less/plugins/safe-editor-e01a95cfae1821b6d1bcf2a917c4f01c.yaml new file mode 100644 index 0000000000..82311555a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/safe-editor-e01a95cfae1821b6d1bcf2a917c4f01c.yaml @@ -0,0 +1,58 @@ +id: safe-editor-e01a95cfae1821b6d1bcf2a917c4f01c + +info: + name: > + Safe Editor < 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0cf5711-a02b-4db7-9bf7-47d512680428?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/safe-editor/" + google-query: inurl:"/wp-content/plugins/safe-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,safe-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/safe-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "safe-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/safe-redirect-manager-05c2167f7f1f78fa58c980d418931b2c.yaml b/nuclei-templates/cve-less/plugins/safe-redirect-manager-05c2167f7f1f78fa58c980d418931b2c.yaml new file mode 100644 index 0000000000..f693628a62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/safe-redirect-manager-05c2167f7f1f78fa58c980d418931b2c.yaml @@ -0,0 +1,58 @@ +id: safe-redirect-manager-05c2167f7f1f78fa58c980d418931b2c + +info: + name: > + got (JS Package) <= 11.8.4 and 12.0-<12.1.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47681954-37ed-493b-b4da-9e9032e561b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/safe-redirect-manager/" + google-query: inurl:"/wp-content/plugins/safe-redirect-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,safe-redirect-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/safe-redirect-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "safe-redirect-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/safe-svg-1cccf375a4463c9d416a20eff76583ef.yaml b/nuclei-templates/cve-less/plugins/safe-svg-1cccf375a4463c9d416a20eff76583ef.yaml new file mode 100644 index 0000000000..e10d51ca87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/safe-svg-1cccf375a4463c9d416a20eff76583ef.yaml @@ -0,0 +1,58 @@ +id: safe-svg-1cccf375a4463c9d416a20eff76583ef + +info: + name: > + Safe SVG <= 1.9.4 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4f4fcaa-4c66-49f6-b13f-da112ae26e21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/safe-svg/" + google-query: inurl:"/wp-content/plugins/safe-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,safe-svg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/safe-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "safe-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/safe-svg-8b2ac3daa03fbba70cf83c4563849d67.yaml b/nuclei-templates/cve-less/plugins/safe-svg-8b2ac3daa03fbba70cf83c4563849d67.yaml new file mode 100644 index 0000000000..f5b9ba6e36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/safe-svg-8b2ac3daa03fbba70cf83c4563849d67.yaml @@ -0,0 +1,58 @@ +id: safe-svg-8b2ac3daa03fbba70cf83c4563849d67 + +info: + name: > + Safe SVG <= 1.9.9 - Content-Type Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbf25275-eb33-4581-8602-e8a64ba78692?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/safe-svg/" + google-query: inurl:"/wp-content/plugins/safe-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,safe-svg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/safe-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "safe-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/safe-svg-b58eeb8e60d6f7c5cf602173c2c00549.yaml b/nuclei-templates/cve-less/plugins/safe-svg-b58eeb8e60d6f7c5cf602173c2c00549.yaml new file mode 100644 index 0000000000..cc08254d09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/safe-svg-b58eeb8e60d6f7c5cf602173c2c00549.yaml @@ -0,0 +1,58 @@ +id: safe-svg-b58eeb8e60d6f7c5cf602173c2c00549 + +info: + name: > + SVG Sanitizer library <= 0.15.4 - Cross-Site Scripting Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca73de6d-2d47-4d7c-a917-0f99fed8c27d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/safe-svg/" + google-query: inurl:"/wp-content/plugins/safe-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,safe-svg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/safe-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "safe-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/safe-svg-d8ec46ad4534895bbeab1b52d6693d3b.yaml b/nuclei-templates/cve-less/plugins/safe-svg-d8ec46ad4534895bbeab1b52d6693d3b.yaml new file mode 100644 index 0000000000..540cb7b3d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/safe-svg-d8ec46ad4534895bbeab1b52d6693d3b.yaml @@ -0,0 +1,58 @@ +id: safe-svg-d8ec46ad4534895bbeab1b52d6693d3b + +info: + name: > + Safe SVG <= 1.9.4 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01eef49c-79c1-40a0-9b4b-05a699d47a41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/safe-svg/" + google-query: inurl:"/wp-content/plugins/safe-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,safe-svg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/safe-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "safe-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/safe-svg-de5739613e14a996b46539b30ca9beab.yaml b/nuclei-templates/cve-less/plugins/safe-svg-de5739613e14a996b46539b30ca9beab.yaml new file mode 100644 index 0000000000..c747c8466a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/safe-svg-de5739613e14a996b46539b30ca9beab.yaml @@ -0,0 +1,58 @@ +id: safe-svg-de5739613e14a996b46539b30ca9beab + +info: + name: > + Safe SVG <= 1.9.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a0fcd50-e9d6-49a5-979f-61f953b1a1cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/safe-svg/" + google-query: inurl:"/wp-content/plugins/safe-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,safe-svg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/safe-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "safe-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sagepay-direct-for-woocommerce-payment-gateway-9e6de6f10cec1c471c1242da8d788708.yaml b/nuclei-templates/cve-less/plugins/sagepay-direct-for-woocommerce-payment-gateway-9e6de6f10cec1c471c1242da8d788708.yaml new file mode 100644 index 0000000000..95f68bd0e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sagepay-direct-for-woocommerce-payment-gateway-9e6de6f10cec1c471c1242da8d788708.yaml @@ -0,0 +1,58 @@ +id: sagepay-direct-for-woocommerce-payment-gateway-9e6de6f10cec1c471c1242da8d788708 + +info: + name: > + WooCommerce SagePay Direct Payment Gateway < 0.1.6.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a72e60d7-6019-4d88-88f4-22ec4dedbdd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sagepay-direct-for-woocommerce-payment-gateway/" + google-query: inurl:"/wp-content/plugins/sagepay-direct-for-woocommerce-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sagepay-direct-for-woocommerce-payment-gateway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sagepay-direct-for-woocommerce-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sagepay-direct-for-woocommerce-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sagepay-server-gateway-for-woocommerce-436125bac0484b579189e9f21786e904.yaml b/nuclei-templates/cve-less/plugins/sagepay-server-gateway-for-woocommerce-436125bac0484b579189e9f21786e904.yaml new file mode 100644 index 0000000000..13479e10cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sagepay-server-gateway-for-woocommerce-436125bac0484b579189e9f21786e904.yaml @@ -0,0 +1,58 @@ +id: sagepay-server-gateway-for-woocommerce-436125bac0484b579189e9f21786e904 + +info: + name: > + SagePay Server Gateway for WooCommerce < 1.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efb37c6a-e1a0-4960-b53a-858b22b6e706?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sagepay-server-gateway-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/sagepay-server-gateway-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sagepay-server-gateway-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sagepay-server-gateway-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sagepay-server-gateway-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sahu-tiktok-pixel-c3f117930fe59986e129269f444e98be.yaml b/nuclei-templates/cve-less/plugins/sahu-tiktok-pixel-c3f117930fe59986e129269f444e98be.yaml new file mode 100644 index 0000000000..5ae3fff0bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sahu-tiktok-pixel-c3f117930fe59986e129269f444e98be.yaml @@ -0,0 +1,58 @@ +id: sahu-tiktok-pixel-c3f117930fe59986e129269f444e98be + +info: + name: > + SAHU TikTok Pixel for E-Commerce <= 1.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28cddb4c-32a1-4ea9-936d-5ec7ffd84753?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sahu-tiktok-pixel/" + google-query: inurl:"/wp-content/plugins/sahu-tiktok-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sahu-tiktok-pixel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sahu-tiktok-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sahu-tiktok-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sailthru-triggermail-579cd3fc5c2399656d85cbe343c14eef.yaml b/nuclei-templates/cve-less/plugins/sailthru-triggermail-579cd3fc5c2399656d85cbe343c14eef.yaml new file mode 100644 index 0000000000..893ed421a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sailthru-triggermail-579cd3fc5c2399656d85cbe343c14eef.yaml @@ -0,0 +1,58 @@ +id: sailthru-triggermail-579cd3fc5c2399656d85cbe343c14eef + +info: + name: > + Sailthru Triggermail <= 1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c657ea2-ff7b-4ef2-a7dd-a330484dd821?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sailthru-triggermail/" + google-query: inurl:"/wp-content/plugins/sailthru-triggermail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sailthru-triggermail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sailthru-triggermail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sailthru-triggermail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sailthru-triggermail-a4f4eba72296421005733a610933f605.yaml b/nuclei-templates/cve-less/plugins/sailthru-triggermail-a4f4eba72296421005733a610933f605.yaml new file mode 100644 index 0000000000..d4f9c7b3e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sailthru-triggermail-a4f4eba72296421005733a610933f605.yaml @@ -0,0 +1,58 @@ +id: sailthru-triggermail-a4f4eba72296421005733a610933f605 + +info: + name: > + Sailthru Triggermail <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b6be9c5-0142-458e-bf7e-2d4ae169e555?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sailthru-triggermail/" + google-query: inurl:"/wp-content/plugins/sailthru-triggermail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sailthru-triggermail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sailthru-triggermail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sailthru-triggermail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salat-times-dff51ecf68a2a27471cd48bde63ce4a2.yaml b/nuclei-templates/cve-less/plugins/salat-times-dff51ecf68a2a27471cd48bde63ce4a2.yaml new file mode 100644 index 0000000000..0a85d40fc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salat-times-dff51ecf68a2a27471cd48bde63ce4a2.yaml @@ -0,0 +1,58 @@ +id: salat-times-dff51ecf68a2a27471cd48bde63ce4a2 + +info: + name: > + Salat Times < = 3.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f5eef96-b9db-444b-82b8-86132376e29c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salat-times/" + google-query: inurl:"/wp-content/plugins/salat-times/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salat-times,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salat-times/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salat-times" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salert-5727788917ca5dc70c5a2a8fc41d6ea0.yaml b/nuclei-templates/cve-less/plugins/salert-5727788917ca5dc70c5a2a8fc41d6ea0.yaml new file mode 100644 index 0000000000..f0dc4da480 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salert-5727788917ca5dc70c5a2a8fc41d6ea0.yaml @@ -0,0 +1,58 @@ +id: salert-5727788917ca5dc70c5a2a8fc41d6ea0 + +info: + name: > + SALERT <= 1.2.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6748841a-0984-4840-90ba-0eeff8564198?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salert/" + google-query: inurl:"/wp-content/plugins/salert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salert,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salert-f2eb2411647af07955e8ded396c4583e.yaml b/nuclei-templates/cve-less/plugins/salert-f2eb2411647af07955e8ded396c4583e.yaml new file mode 100644 index 0000000000..3ce553a2ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salert-f2eb2411647af07955e8ded396c4583e.yaml @@ -0,0 +1,58 @@ +id: salert-f2eb2411647af07955e8ded396c4583e + +info: + name: > + SALERT <= 1.2.1 - Missing Authorization via salert_save_settings_with_ajax() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9e45ae8-e5b5-460b-80f8-de562ae7c56a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salert/" + google-query: inurl:"/wp-content/plugins/salert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salert,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sales-report-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/sales-report-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..7aa1bfc017 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sales-report-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: sales-report-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sales-report-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/sales-report-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sales-report-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sales-report-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sales-report-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salesking-4ad4863544909ca65fb59059a85b6ca2.yaml b/nuclei-templates/cve-less/plugins/salesking-4ad4863544909ca65fb59059a85b6ca2.yaml new file mode 100644 index 0000000000..dad4de5035 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salesking-4ad4863544909ca65fb59059a85b6ca2.yaml @@ -0,0 +1,58 @@ +id: salesking-4ad4863544909ca65fb59059a85b6ca2 + +info: + name: > + SalesKing <= 1.6.15 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70b00cfc-4a9b-442a-9c80-fd080924ca34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salesking/" + google-query: inurl:"/wp-content/plugins/salesking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salesking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salesking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salesking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salesking-c34456b0a354174a8b99c79db450a526.yaml b/nuclei-templates/cve-less/plugins/salesking-c34456b0a354174a8b99c79db450a526.yaml new file mode 100644 index 0000000000..f841139be4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salesking-c34456b0a354174a8b99c79db450a526.yaml @@ -0,0 +1,58 @@ +id: salesking-c34456b0a354174a8b99c79db450a526 + +info: + name: > + SalesKing <= 1.6.15 - Missing Authorization to Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c86f157e-e7f2-4b00-977c-c4cc7c2b3b0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salesking/" + google-query: inurl:"/wp-content/plugins/salesking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salesking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salesking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salesking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salesking-d2407407e16d8affae24d481d0b34cb9.yaml b/nuclei-templates/cve-less/plugins/salesking-d2407407e16d8affae24d481d0b34cb9.yaml new file mode 100644 index 0000000000..e0c6697f87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salesking-d2407407e16d8affae24d481d0b34cb9.yaml @@ -0,0 +1,58 @@ +id: salesking-d2407407e16d8affae24d481d0b34cb9 + +info: + name: > + SalesKing <= 1.6.15 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52198053-206c-4002-8e26-dd5b4850e151?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salesking/" + google-query: inurl:"/wp-content/plugins/salesking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salesking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salesking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salesking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salesmanago-eaa83ff52990564332c5852f905f9fb7.yaml b/nuclei-templates/cve-less/plugins/salesmanago-eaa83ff52990564332c5852f905f9fb7.yaml new file mode 100644 index 0000000000..e3568a25f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salesmanago-eaa83ff52990564332c5852f905f9fb7.yaml @@ -0,0 +1,58 @@ +id: salesmanago-eaa83ff52990564332c5852f905f9fb7 + +info: + name: > + SALESmanago <= 3.2.4 - Log Injection via Weak Authentication Token + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de7db1d6-b352-44c7-a6cc-b21cb65a0482?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salesmanago/" + google-query: inurl:"/wp-content/plugins/salesmanago/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salesmanago,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salesmanago/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salesmanago" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salient-core-6883c989062268d5da80d537f9e1e493.yaml b/nuclei-templates/cve-less/plugins/salient-core-6883c989062268d5da80d537f9e1e493.yaml new file mode 100644 index 0000000000..53a2ca8c29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salient-core-6883c989062268d5da80d537f9e1e493.yaml @@ -0,0 +1,58 @@ +id: salient-core-6883c989062268d5da80d537f9e1e493 + +info: + name: > + Salient Core <= 2.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1ae1b28-ea9e-4446-8b03-b5a8eaac1042?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salient-core/" + google-query: inurl:"/wp-content/plugins/salient-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salient-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salient-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salient-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salient-core-80c6230c139aaee435c35c9df894dae1.yaml b/nuclei-templates/cve-less/plugins/salient-core-80c6230c139aaee435c35c9df894dae1.yaml new file mode 100644 index 0000000000..40b30e104a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salient-core-80c6230c139aaee435c35c9df894dae1.yaml @@ -0,0 +1,58 @@ +id: salient-core-80c6230c139aaee435c35c9df894dae1 + +info: + name: > + Salient Core <= 2.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/316ffb37-47fe-47c4-8a81-5794fa12ce33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salient-core/" + google-query: inurl:"/wp-content/plugins/salient-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salient-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salient-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salient-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-00157407495e1ef41be2fc477a456a7d.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-00157407495e1ef41be2fc477a456a7d.yaml new file mode 100644 index 0000000000..74160f6739 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-00157407495e1ef41be2fc477a456a7d.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-00157407495e1ef41be2fc477a456a7d + +info: + name: > + Salon booking system <= 9.6.5 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abf1ace3-e066-4f28-9f37-3e9fa79aef7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-0bea880f7043c5054d61f7e9d6ba4d2f.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-0bea880f7043c5054d61f7e9d6ba4d2f.yaml new file mode 100644 index 0000000000..4eed6a88d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-0bea880f7043c5054d61f7e9d6ba4d2f.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-0bea880f7043c5054d61f7e9d6ba4d2f + +info: + name: > + Salon booking system <= 9.6.5 - Authenticated (Editor+) Stored Cross-Site Scripting via Email Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45ddf224-b359-45ec-97a0-5a3257f56420?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-12219750d7664db4408ea75c73fa706d.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-12219750d7664db4408ea75c73fa706d.yaml new file mode 100644 index 0000000000..bd066ae10b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-12219750d7664db4408ea75c73fa706d.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-12219750d7664db4408ea75c73fa706d + +info: + name: > + Salon booking system < 8.7 - Authenticated (Editor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cac7f96-eb64-427d-9a95-b8bf1c675af0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-17739eab6c3078839f62948bae53f8f7.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-17739eab6c3078839f62948bae53f8f7.yaml new file mode 100644 index 0000000000..ec281e38ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-17739eab6c3078839f62948bae53f8f7.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-17739eab6c3078839f62948bae53f8f7 + +info: + name: > + Salon Booking System and Salon Booking System Pro <= 7.6.2 - Sensitive Data Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a82ac1c9-e037-4afa-b433-2efef2e61403?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-1874294040d198d9f843d58bbcc1548b.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-1874294040d198d9f843d58bbcc1548b.yaml new file mode 100644 index 0000000000..9db2d6c03f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-1874294040d198d9f843d58bbcc1548b.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-1874294040d198d9f843d58bbcc1548b + +info: + name: > + Salon booking system <= 7.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8eb778d0-2aa4-4d0a-9ac1-42af51c335bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-3a9e5880883b3238662167448ae8e190.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-3a9e5880883b3238662167448ae8e190.yaml new file mode 100644 index 0000000000..efa71b1ce1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-3a9e5880883b3238662167448ae8e190.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-3a9e5880883b3238662167448ae8e190 + +info: + name: > + Salon Booking System <= 8.4.6 - Cross-Site Request Forgery to Admin Role Change to Customer, User Meta Update via save_customer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93875f19-d9b9-4e33-bba9-afc75cf26bf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-473ae39f2c9b117fd21ddfea3f742daa.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-473ae39f2c9b117fd21ddfea3f742daa.yaml new file mode 100644 index 0000000000..bcfa9b747e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-473ae39f2c9b117fd21ddfea3f742daa.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-473ae39f2c9b117fd21ddfea3f742daa + +info: + name: > + Salon booking system <= 9.6.2 - Authenticated (Customer+) Stored Cross-Site Scripting via 'sms_prefix' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32c4cb55-855c-42ed-a9ac-90f92e8583e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-80865fbe8c06ec562ac960b28b962ecd.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-80865fbe8c06ec562ac960b28b962ecd.yaml new file mode 100644 index 0000000000..63c65a69a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-80865fbe8c06ec562ac960b28b962ecd.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-80865fbe8c06ec562ac960b28b962ecd + +info: + name: > + Salon Booking System and Salon Booking System Pro <= 7.6.2 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d830b73c-0666-4632-8001-fe2c467a37a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-826b0e6fc8bdc77439da0a867a102476.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-826b0e6fc8bdc77439da0a867a102476.yaml new file mode 100644 index 0000000000..8fad9cef7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-826b0e6fc8bdc77439da0a867a102476.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-826b0e6fc8bdc77439da0a867a102476 + +info: + name: > + Salon booking system < 6.3.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13657ad7-7185-4be2-98e2-aeaf8514ad4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-9935fc74a7e8d09ff1c372489adcc9dd.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-9935fc74a7e8d09ff1c372489adcc9dd.yaml new file mode 100644 index 0000000000..323ba3e58a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-9935fc74a7e8d09ff1c372489adcc9dd.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-9935fc74a7e8d09ff1c372489adcc9dd + +info: + name: > + Salon booking system <= 9.5 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/929fd4e6-9040-41cb-98f0-0cfdd80caf42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5fefe47f60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-c957720e1b76962412e197bc09cb35e8.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-c957720e1b76962412e197bc09cb35e8.yaml new file mode 100644 index 0000000000..a7e0d74087 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-c957720e1b76962412e197bc09cb35e8.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-c957720e1b76962412e197bc09cb35e8 + +info: + name: > + Salon booking system <= 9.6.5 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2c837b9-c205-4fdc-8305-b9387dedd581?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/salon-booking-system-f991f9853892bf031ebb72c811af6b0f.yaml b/nuclei-templates/cve-less/plugins/salon-booking-system-f991f9853892bf031ebb72c811af6b0f.yaml new file mode 100644 index 0000000000..7271f6a455 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/salon-booking-system-f991f9853892bf031ebb72c811af6b0f.yaml @@ -0,0 +1,58 @@ +id: salon-booking-system-f991f9853892bf031ebb72c811af6b0f + +info: + name: > + Salon booking system <= 9.6.2 - Authenticated (Customer+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bd6c6f7-a535-4e3a-8d72-01007d00d6be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/salon-booking-system/" + google-query: inurl:"/wp-content/plugins/salon-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,salon-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/salon-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salon-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sam-pro-free-0f6c840a3fb64dbbf3be23d21800f577.yaml b/nuclei-templates/cve-less/plugins/sam-pro-free-0f6c840a3fb64dbbf3be23d21800f577.yaml new file mode 100644 index 0000000000..9d482bee8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sam-pro-free-0f6c840a3fb64dbbf3be23d21800f577.yaml @@ -0,0 +1,58 @@ +id: sam-pro-free-0f6c840a3fb64dbbf3be23d21800f577 + +info: + name: > + SAM Pro (Free Edition) < 1.9.7.69 & Simple Ads Manager <= 2.10.0.130 & SAM Pro Lite < 1.9.0.53 - Local/Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/730a3cde-bcbd-4d60-80bb-3944cc5386e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sam-pro-free/" + google-query: inurl:"/wp-content/plugins/sam-pro-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sam-pro-free,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sam-pro-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sam-pro-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sam-pro-lite-0f6c840a3fb64dbbf3be23d21800f577.yaml b/nuclei-templates/cve-less/plugins/sam-pro-lite-0f6c840a3fb64dbbf3be23d21800f577.yaml new file mode 100644 index 0000000000..b6baf71baf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sam-pro-lite-0f6c840a3fb64dbbf3be23d21800f577.yaml @@ -0,0 +1,58 @@ +id: sam-pro-lite-0f6c840a3fb64dbbf3be23d21800f577 + +info: + name: > + SAM Pro (Free Edition) < 1.9.7.69 & Simple Ads Manager <= 2.10.0.130 & SAM Pro Lite < 1.9.0.53 - Local/Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/730a3cde-bcbd-4d60-80bb-3944cc5386e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sam-pro-lite/" + google-query: inurl:"/wp-content/plugins/sam-pro-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sam-pro-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sam-pro-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sam-pro-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sangar-slider-lite-3b9bd1e4f5897df85a36d204f832a5eb.yaml b/nuclei-templates/cve-less/plugins/sangar-slider-lite-3b9bd1e4f5897df85a36d204f832a5eb.yaml new file mode 100644 index 0000000000..c3fa9dd96e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sangar-slider-lite-3b9bd1e4f5897df85a36d204f832a5eb.yaml @@ -0,0 +1,58 @@ +id: sangar-slider-lite-3b9bd1e4f5897df85a36d204f832a5eb + +info: + name: > + Sangar Slider <= 1.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2d20052-184e-473d-8e5b-46b7dd270c52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sangar-slider-lite/" + google-query: inurl:"/wp-content/plugins/sangar-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sangar-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sangar-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sangar-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/saphali-woocommerce-lite-56ba6deff570cd4e7d1696cb032991b3.yaml b/nuclei-templates/cve-less/plugins/saphali-woocommerce-lite-56ba6deff570cd4e7d1696cb032991b3.yaml new file mode 100644 index 0000000000..bcb9d972c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/saphali-woocommerce-lite-56ba6deff570cd4e7d1696cb032991b3.yaml @@ -0,0 +1,58 @@ +id: saphali-woocommerce-lite-56ba6deff570cd4e7d1696cb032991b3 + +info: + name: > + Saphali Woocommerce Lite <= 1.8.13 - Cross-Site Request Forgery via 'woocommerce_saphali_page_s_l' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c58d9011-a082-48ca-b702-ef5563af2c66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/saphali-woocommerce-lite/" + google-query: inurl:"/wp-content/plugins/saphali-woocommerce-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,saphali-woocommerce-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/saphali-woocommerce-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "saphali-woocommerce-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sassy-social-share-07ab6177e4eee952d64d139410f561bc.yaml b/nuclei-templates/cve-less/plugins/sassy-social-share-07ab6177e4eee952d64d139410f561bc.yaml new file mode 100644 index 0000000000..a15e79170d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sassy-social-share-07ab6177e4eee952d64d139410f561bc.yaml @@ -0,0 +1,58 @@ +id: sassy-social-share-07ab6177e4eee952d64d139410f561bc + +info: + name: > + Sassy Social Share <= 3.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85277960-2bba-4cd7-9f4c-e04f6743b96c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sassy-social-share/" + google-query: inurl:"/wp-content/plugins/sassy-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sassy-social-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sassy-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sassy-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sassy-social-share-40aacb4df39566c6bb333af52f28e227.yaml b/nuclei-templates/cve-less/plugins/sassy-social-share-40aacb4df39566c6bb333af52f28e227.yaml new file mode 100644 index 0000000000..2c965f8e6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sassy-social-share-40aacb4df39566c6bb333af52f28e227.yaml @@ -0,0 +1,58 @@ +id: sassy-social-share-40aacb4df39566c6bb333af52f28e227 + +info: + name: > + Sassy Social Share 3.3.23 - Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddb7b668-f023-427e-9ab5-90dc6d481028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sassy-social-share/" + google-query: inurl:"/wp-content/plugins/sassy-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sassy-social-share,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sassy-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sassy-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.3.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sassy-social-share-4d80f38d93d7f5f929f7caeb5348b571.yaml b/nuclei-templates/cve-less/plugins/sassy-social-share-4d80f38d93d7f5f929f7caeb5348b571.yaml new file mode 100644 index 0000000000..1221cc390b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sassy-social-share-4d80f38d93d7f5f929f7caeb5348b571.yaml @@ -0,0 +1,58 @@ +id: sassy-social-share-4d80f38d93d7f5f929f7caeb5348b571 + +info: + name: > + Sassy Social Share <= 3.3.60 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c745b86b-8ab7-4e04-8888-65e43d568410?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sassy-social-share/" + google-query: inurl:"/wp-content/plugins/sassy-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sassy-social-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sassy-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sassy-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sassy-social-share-6150ea7134cb72d73e6e7ce3f51ab46c.yaml b/nuclei-templates/cve-less/plugins/sassy-social-share-6150ea7134cb72d73e6e7ce3f51ab46c.yaml new file mode 100644 index 0000000000..50a405c2ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sassy-social-share-6150ea7134cb72d73e6e7ce3f51ab46c.yaml @@ -0,0 +1,58 @@ +id: sassy-social-share-6150ea7134cb72d73e6e7ce3f51ab46c + +info: + name: > + Sassy Social Share <= 3.3.56 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c2f4b74-2568-4e5a-b55f-0130096bc19f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sassy-social-share/" + google-query: inurl:"/wp-content/plugins/sassy-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sassy-social-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sassy-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sassy-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sassy-social-share-754268962b0bd973cebfd375c7df9425.yaml b/nuclei-templates/cve-less/plugins/sassy-social-share-754268962b0bd973cebfd375c7df9425.yaml new file mode 100644 index 0000000000..bdf8d9205f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sassy-social-share-754268962b0bd973cebfd375c7df9425.yaml @@ -0,0 +1,58 @@ +id: sassy-social-share-754268962b0bd973cebfd375c7df9425 + +info: + name: > + Sassy Social Share <= 3.3.39 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/650dbbaa-4348-42a6-973c-487f53430955?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sassy-social-share/" + google-query: inurl:"/wp-content/plugins/sassy-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sassy-social-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sassy-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sassy-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sassy-social-share-c564c36d083131df8b70721d4380612a.yaml b/nuclei-templates/cve-less/plugins/sassy-social-share-c564c36d083131df8b70721d4380612a.yaml new file mode 100644 index 0000000000..160a442606 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sassy-social-share-c564c36d083131df8b70721d4380612a.yaml @@ -0,0 +1,58 @@ +id: sassy-social-share-c564c36d083131df8b70721d4380612a + +info: + name: > + Social Sharing Plugin – Sassy Social Share <= 3.3.58 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdceb07a-87d2-4708-b76b-5a8fcfff0818?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sassy-social-share/" + google-query: inurl:"/wp-content/plugins/sassy-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sassy-social-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sassy-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sassy-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.58') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sassy-social-share-f793e64947f92282a534916c8b501137.yaml b/nuclei-templates/cve-less/plugins/sassy-social-share-f793e64947f92282a534916c8b501137.yaml new file mode 100644 index 0000000000..6b60a4383b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sassy-social-share-f793e64947f92282a534916c8b501137.yaml @@ -0,0 +1,58 @@ +id: sassy-social-share-f793e64947f92282a534916c8b501137 + +info: + name: > + Sassy Social Share <= 3.3.44 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23a003aa-d929-4ec3-9d6f-da97222342dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sassy-social-share/" + google-query: inurl:"/wp-content/plugins/sassy-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sassy-social-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sassy-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sassy-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/save-as-image-by-pdfcrowd-67ad930884b5b87d29530a8be64ff268.yaml b/nuclei-templates/cve-less/plugins/save-as-image-by-pdfcrowd-67ad930884b5b87d29530a8be64ff268.yaml new file mode 100644 index 0000000000..8b3e21c693 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/save-as-image-by-pdfcrowd-67ad930884b5b87d29530a8be64ff268.yaml @@ -0,0 +1,58 @@ +id: save-as-image-by-pdfcrowd-67ad930884b5b87d29530a8be64ff268 + +info: + name: > + Save as Image plugin by Pdfcrowd <= 2.16.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74b284b7-ec0a-42c1-82e5-0c8cb422c0c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/save-as-image-by-pdfcrowd/" + google-query: inurl:"/wp-content/plugins/save-as-image-by-pdfcrowd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,save-as-image-by-pdfcrowd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/save-as-image-by-pdfcrowd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "save-as-image-by-pdfcrowd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/save-as-image-by-pdfcrowd-e66b394b6ca847ce34ca3e1d63c12c27.yaml b/nuclei-templates/cve-less/plugins/save-as-image-by-pdfcrowd-e66b394b6ca847ce34ca3e1d63c12c27.yaml new file mode 100644 index 0000000000..903a2502c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/save-as-image-by-pdfcrowd-e66b394b6ca847ce34ca3e1d63c12c27.yaml @@ -0,0 +1,58 @@ +id: save-as-image-by-pdfcrowd-e66b394b6ca847ce34ca3e1d63c12c27 + +info: + name: > + Save as Image <= 3.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb1693c7-4c38-4723-868a-9f105dac1561?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/save-as-image-by-pdfcrowd/" + google-query: inurl:"/wp-content/plugins/save-as-image-by-pdfcrowd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,save-as-image-by-pdfcrowd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/save-as-image-by-pdfcrowd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "save-as-image-by-pdfcrowd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-1cdee5629acdb013a2031fc71ce18e3f.yaml b/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-1cdee5629acdb013a2031fc71ce18e3f.yaml new file mode 100644 index 0000000000..e698d639e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-1cdee5629acdb013a2031fc71ce18e3f.yaml @@ -0,0 +1,58 @@ +id: save-as-pdf-by-pdfcrowd-1cdee5629acdb013a2031fc71ce18e3f + +info: + name: > + Save as PDF <= 3.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92484681-e677-4a7b-b2df-40aad49baf44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/save-as-pdf-by-pdfcrowd/" + google-query: inurl:"/wp-content/plugins/save-as-pdf-by-pdfcrowd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,save-as-pdf-by-pdfcrowd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/save-as-pdf-by-pdfcrowd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "save-as-pdf-by-pdfcrowd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-2aaf513c887290d1b06e4a97482b6da3.yaml b/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-2aaf513c887290d1b06e4a97482b6da3.yaml new file mode 100644 index 0000000000..f501d856e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-2aaf513c887290d1b06e4a97482b6da3.yaml @@ -0,0 +1,58 @@ +id: save-as-pdf-by-pdfcrowd-2aaf513c887290d1b06e4a97482b6da3 + +info: + name: > + Save as PDF plugin by Pdfcrowd <= 3.2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7e18997-90be-4fa4-aa4f-3b79544e00f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/save-as-pdf-by-pdfcrowd/" + google-query: inurl:"/wp-content/plugins/save-as-pdf-by-pdfcrowd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,save-as-pdf-by-pdfcrowd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/save-as-pdf-by-pdfcrowd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "save-as-pdf-by-pdfcrowd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-b2cea8a198e9a575447977f949754486.yaml b/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-b2cea8a198e9a575447977f949754486.yaml new file mode 100644 index 0000000000..9a2e9c21e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/save-as-pdf-by-pdfcrowd-b2cea8a198e9a575447977f949754486.yaml @@ -0,0 +1,58 @@ +id: save-as-pdf-by-pdfcrowd-b2cea8a198e9a575447977f949754486 + +info: + name: > + Save as PDF plugin by Pdfcrowd <= 2.16.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52056177-8604-48b9-ab50-d0dc1e13a3d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/save-as-pdf-by-pdfcrowd/" + google-query: inurl:"/wp-content/plugins/save-as-pdf-by-pdfcrowd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,save-as-pdf-by-pdfcrowd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/save-as-pdf-by-pdfcrowd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "save-as-pdf-by-pdfcrowd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/save-grab-abad4bfa80c4735594596dcf267be185.yaml b/nuclei-templates/cve-less/plugins/save-grab-abad4bfa80c4735594596dcf267be185.yaml new file mode 100644 index 0000000000..50965fbcc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/save-grab-abad4bfa80c4735594596dcf267be185.yaml @@ -0,0 +1,58 @@ +id: save-grab-abad4bfa80c4735594596dcf267be185 + +info: + name: > + Grab & Save <= 1.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cd4b1da-faee-4c4e-b323-e77c4c033149?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/save-grab/" + google-query: inurl:"/wp-content/plugins/save-grab/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,save-grab,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/save-grab/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "save-grab" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sayfa-sayac-22e02ff5de893b13264dcb770563429d.yaml b/nuclei-templates/cve-less/plugins/sayfa-sayac-22e02ff5de893b13264dcb770563429d.yaml new file mode 100644 index 0000000000..ae3a30d789 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sayfa-sayac-22e02ff5de893b13264dcb770563429d.yaml @@ -0,0 +1,58 @@ +id: sayfa-sayac-22e02ff5de893b13264dcb770563429d + +info: + name: > + Sayfa Sayaç <= 2.6 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1a29180-901d-447e-8f82-63161b9e11e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sayfa-sayac/" + google-query: inurl:"/wp-content/plugins/sayfa-sayac/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sayfa-sayac,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sayfa-sayac/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sayfa-sayac" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sayfa-sayac-d88d0c224f666498b5887acc3c70b802.yaml b/nuclei-templates/cve-less/plugins/sayfa-sayac-d88d0c224f666498b5887acc3c70b802.yaml new file mode 100644 index 0000000000..449956458c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sayfa-sayac-d88d0c224f666498b5887acc3c70b802.yaml @@ -0,0 +1,58 @@ +id: sayfa-sayac-d88d0c224f666498b5887acc3c70b802 + +info: + name: > + Sayfa Sayaç <= 2.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e24c9e9a-4f18-41b6-a0b7-700fecb5d3e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sayfa-sayac/" + google-query: inurl:"/wp-content/plugins/sayfa-sayac/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sayfa-sayac,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sayfa-sayac/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sayfa-sayac" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sb-child-list-321ea6ffd1b44901180d2be13bcb0547.yaml b/nuclei-templates/cve-less/plugins/sb-child-list-321ea6ffd1b44901180d2be13bcb0547.yaml new file mode 100644 index 0000000000..52fb45fd99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sb-child-list-321ea6ffd1b44901180d2be13bcb0547.yaml @@ -0,0 +1,58 @@ +id: sb-child-list-321ea6ffd1b44901180d2be13bcb0547 + +info: + name: > + SB Child List <= 4.5 - Cross-Site Request Forgery via 'sb_cl_update_settings' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f83be46f-3b51-4a30-88a4-388bcbfd0d2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sb-child-list/" + google-query: inurl:"/wp-content/plugins/sb-child-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sb-child-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sb-child-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sb-child-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-43e92e48fce7405625b7afca66933559.yaml b/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-43e92e48fce7405625b7afca66933559.yaml new file mode 100644 index 0000000000..b04e3b997e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-43e92e48fce7405625b7afca66933559.yaml @@ -0,0 +1,58 @@ +id: sb-elementor-contact-form-db-43e92e48fce7405625b7afca66933559 + +info: + name: > + Contact Form DB - Elementor <= 1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43a1e5b7-9361-406e-97b7-776b831acc33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sb-elementor-contact-form-db/" + google-query: inurl:"/wp-content/plugins/sb-elementor-contact-form-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sb-elementor-contact-form-db,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sb-elementor-contact-form-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sb-elementor-contact-form-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-66e7875aa9a79f68060a917eb8074082.yaml b/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-66e7875aa9a79f68060a917eb8074082.yaml new file mode 100644 index 0000000000..0a91fe4e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-66e7875aa9a79f68060a917eb8074082.yaml @@ -0,0 +1,58 @@ +id: sb-elementor-contact-form-db-66e7875aa9a79f68060a917eb8074082 + +info: + name: > + Elementor Contact Form DB <= 1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e287e85d-8687-4079-99ea-92718031f343?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sb-elementor-contact-form-db/" + google-query: inurl:"/wp-content/plugins/sb-elementor-contact-form-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sb-elementor-contact-form-db,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sb-elementor-contact-form-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sb-elementor-contact-form-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-e0426a28b885d426fb32a6121c958a26.yaml b/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-e0426a28b885d426fb32a6121c958a26.yaml new file mode 100644 index 0000000000..4a9a0b2b08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sb-elementor-contact-form-db-e0426a28b885d426fb32a6121c958a26.yaml @@ -0,0 +1,58 @@ +id: sb-elementor-contact-form-db-e0426a28b885d426fb32a6121c958a26 + +info: + name: > + Elementor Contact Form DB <= 1.5 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f708e910-7745-4ff5-9f9f-5552dbaf1113?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sb-elementor-contact-form-db/" + google-query: inurl:"/wp-content/plugins/sb-elementor-contact-form-db/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sb-elementor-contact-form-db,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sb-elementor-contact-form-db/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sb-elementor-contact-form-db" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sb-uploader-987ba48a8effbae5bcbbbe65d3a7dff9.yaml b/nuclei-templates/cve-less/plugins/sb-uploader-987ba48a8effbae5bcbbbe65d3a7dff9.yaml new file mode 100644 index 0000000000..48b767191b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sb-uploader-987ba48a8effbae5bcbbbe65d3a7dff9.yaml @@ -0,0 +1,58 @@ +id: sb-uploader-987ba48a8effbae5bcbbbe65d3a7dff9 + +info: + name: > + SB Uploader <= 4.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c9aabb6-d17c-4845-ae1b-6ee3d8b9bfb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sb-uploader/" + google-query: inurl:"/wp-content/plugins/sb-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sb-uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sb-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sb-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scalable-vector-graphics-svg-9a645fa828e0b867db978ce345a20000.yaml b/nuclei-templates/cve-less/plugins/scalable-vector-graphics-svg-9a645fa828e0b867db978ce345a20000.yaml new file mode 100644 index 0000000000..eebe61a5e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scalable-vector-graphics-svg-9a645fa828e0b867db978ce345a20000.yaml @@ -0,0 +1,58 @@ +id: scalable-vector-graphics-svg-9a645fa828e0b867db978ce345a20000 + +info: + name: > + Scalable Vector Graphics (SVG) <= 3.4 - Authenticated (Author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce8028a3-6fca-448f-b9a0-444db651148c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scalable-vector-graphics-svg/" + google-query: inurl:"/wp-content/plugins/scalable-vector-graphics-svg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scalable-vector-graphics-svg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scalable-vector-graphics-svg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scalable-vector-graphics-svg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schedule-posts-calendar-53afece9446695901fc03dfbb692e04f.yaml b/nuclei-templates/cve-less/plugins/schedule-posts-calendar-53afece9446695901fc03dfbb692e04f.yaml new file mode 100644 index 0000000000..abdee8993f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schedule-posts-calendar-53afece9446695901fc03dfbb692e04f.yaml @@ -0,0 +1,58 @@ +id: schedule-posts-calendar-53afece9446695901fc03dfbb692e04f + +info: + name: > + Schedule Posts Calendar <= 5.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61c815c2-a5ea-431c-bfde-c08a4eb5fda6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schedule-posts-calendar/" + google-query: inurl:"/wp-content/plugins/schedule-posts-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schedule-posts-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schedule-posts-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schedule-posts-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schedule-posts-calendar-a076b8ca38d0ad2532c4b659c3b54901.yaml b/nuclei-templates/cve-less/plugins/schedule-posts-calendar-a076b8ca38d0ad2532c4b659c3b54901.yaml new file mode 100644 index 0000000000..b3677fb122 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schedule-posts-calendar-a076b8ca38d0ad2532c4b659c3b54901.yaml @@ -0,0 +1,58 @@ +id: schedule-posts-calendar-a076b8ca38d0ad2532c4b659c3b54901 + +info: + name: > + Schedule Posts Calendar <= 5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d4f490e-c86e-490e-8041-36c154b890aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schedule-posts-calendar/" + google-query: inurl:"/wp-content/plugins/schedule-posts-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schedule-posts-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schedule-posts-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schedule-posts-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scheduled-announcements-widget-29145e5db5dd5627b3607ea1e36f49b2.yaml b/nuclei-templates/cve-less/plugins/scheduled-announcements-widget-29145e5db5dd5627b3607ea1e36f49b2.yaml new file mode 100644 index 0000000000..717ede973b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scheduled-announcements-widget-29145e5db5dd5627b3607ea1e36f49b2.yaml @@ -0,0 +1,58 @@ +id: scheduled-announcements-widget-29145e5db5dd5627b3607ea1e36f49b2 + +info: + name: > + Scheduled Announcements Widget <= 0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/755ae574-9df3-44d1-a14b-16887f234510?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scheduled-announcements-widget/" + google-query: inurl:"/wp-content/plugins/scheduled-announcements-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scheduled-announcements-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scheduled-announcements-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scheduled-announcements-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scheduled-notification-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/scheduled-notification-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dbe9374531 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scheduled-notification-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: scheduled-notification-bar-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scheduled-notification-bar/" + google-query: inurl:"/wp-content/plugins/scheduled-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scheduled-notification-bar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scheduled-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scheduled-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schedulicity-online-appointment-booking-1a925f12b1905f4ad4c8d17bba7bb15a.yaml b/nuclei-templates/cve-less/plugins/schedulicity-online-appointment-booking-1a925f12b1905f4ad4c8d17bba7bb15a.yaml new file mode 100644 index 0000000000..b361025544 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schedulicity-online-appointment-booking-1a925f12b1905f4ad4c8d17bba7bb15a.yaml @@ -0,0 +1,58 @@ +id: schedulicity-online-appointment-booking-1a925f12b1905f4ad4c8d17bba7bb15a + +info: + name: > + Schedulicity - Easy Online Scheduling <= 2.21 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24b26f17-f973-4a0e-85e2-a70a394246e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schedulicity-online-appointment-booking/" + google-query: inurl:"/wp-content/plugins/schedulicity-online-appointment-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schedulicity-online-appointment-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schedulicity-online-appointment-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schedulicity-online-appointment-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-157cdd8bc992e58c6e6f6337bc97b4c2.yaml b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-157cdd8bc992e58c6e6f6337bc97b4c2.yaml new file mode 100644 index 0000000000..9947b70029 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-157cdd8bc992e58c6e6f6337bc97b4c2.yaml @@ -0,0 +1,58 @@ +id: schema-and-structured-data-for-wp-157cdd8bc992e58c6e6f6337bc97b4c2 + +info: + name: > + Schema & Structured Data for WP & AMP <= 1.23 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0752b4f3-b9f0-4c39-8e4c-2db188600087?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schema-and-structured-data-for-wp/" + google-query: inurl:"/wp-content/plugins/schema-and-structured-data-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schema-and-structured-data-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schema-and-structured-data-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schema-and-structured-data-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-1fa869ed52b230924c8c94b2bfb591af.yaml b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-1fa869ed52b230924c8c94b2bfb591af.yaml new file mode 100644 index 0000000000..386c16b18d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-1fa869ed52b230924c8c94b2bfb591af.yaml @@ -0,0 +1,58 @@ +id: schema-and-structured-data-for-wp-1fa869ed52b230924c8c94b2bfb591af + +info: + name: > + Schema & Structured Data for WP & AMP <= 1.29 - Authenticated (Contributor+) Stored Cross-Site Scripting via How To and FAQ Blocks + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e004bba3-d281-4f84-a941-a6c5b64b9dcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schema-and-structured-data-for-wp/" + google-query: inurl:"/wp-content/plugins/schema-and-structured-data-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schema-and-structured-data-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schema-and-structured-data-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schema-and-structured-data-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-24a60434e502bd4fe3a3e9f654b441e8.yaml b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-24a60434e502bd4fe3a3e9f654b441e8.yaml new file mode 100644 index 0000000000..da915feb8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-24a60434e502bd4fe3a3e9f654b441e8.yaml @@ -0,0 +1,58 @@ +id: schema-and-structured-data-for-wp-24a60434e502bd4fe3a3e9f654b441e8 + +info: + name: > + Schema & Structured Data for WP & AMP <= 1.26 - Authenticated (Custom) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e7e6ea7-4e0b-4d8a-9306-45b55d41fbb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schema-and-structured-data-for-wp/" + google-query: inurl:"/wp-content/plugins/schema-and-structured-data-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schema-and-structured-data-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schema-and-structured-data-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schema-and-structured-data-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-62957aaeb6104548f77744232edc7490.yaml b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-62957aaeb6104548f77744232edc7490.yaml new file mode 100644 index 0000000000..176afe6ec1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-62957aaeb6104548f77744232edc7490.yaml @@ -0,0 +1,58 @@ +id: schema-and-structured-data-for-wp-62957aaeb6104548f77744232edc7490 + +info: + name: > + Schema & Structured Data for WP & AMP <= 1.25 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ca21247-c443-4808-8397-790669453bfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schema-and-structured-data-for-wp/" + google-query: inurl:"/wp-content/plugins/schema-and-structured-data-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schema-and-structured-data-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schema-and-structured-data-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schema-and-structured-data-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-84ecfe35530dba1d6d850c87907091be.yaml b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-84ecfe35530dba1d6d850c87907091be.yaml new file mode 100644 index 0000000000..4a3dee6ecb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schema-and-structured-data-for-wp-84ecfe35530dba1d6d850c87907091be.yaml @@ -0,0 +1,58 @@ +id: schema-and-structured-data-for-wp-84ecfe35530dba1d6d850c87907091be + +info: + name: > + Schema & Structured Data for WP & AMP <= 1.26 - Missing Authorization to reCaptcha Key Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac13f402-8a36-448f-87d4-48179a9699c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schema-and-structured-data-for-wp/" + google-query: inurl:"/wp-content/plugins/schema-and-structured-data-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schema-and-structured-data-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schema-and-structured-data-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schema-and-structured-data-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schema-app-structured-data-for-schemaorg-d4b2be233d46cfcba65da98993b34434.yaml b/nuclei-templates/cve-less/plugins/schema-app-structured-data-for-schemaorg-d4b2be233d46cfcba65da98993b34434.yaml new file mode 100644 index 0000000000..3c8fa703bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schema-app-structured-data-for-schemaorg-d4b2be233d46cfcba65da98993b34434.yaml @@ -0,0 +1,58 @@ +id: schema-app-structured-data-for-schemaorg-d4b2be233d46cfcba65da98993b34434 + +info: + name: > + Schema App Structured Data <= 1.22.3 - Missing Authorization via page_init + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3de82328-e44f-4488-a2ae-1dd2c3b8a502?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schema-app-structured-data-for-schemaorg/" + google-query: inurl:"/wp-content/plugins/schema-app-structured-data-for-schemaorg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schema-app-structured-data-for-schemaorg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schema-app-structured-data-for-schemaorg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schema-app-structured-data-for-schemaorg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/school-management-3f1c3ad85ad1a49bfdfa7d4e3b840987.yaml b/nuclei-templates/cve-less/plugins/school-management-3f1c3ad85ad1a49bfdfa7d4e3b840987.yaml new file mode 100644 index 0000000000..a9aa8b987d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/school-management-3f1c3ad85ad1a49bfdfa7d4e3b840987.yaml @@ -0,0 +1,58 @@ +id: school-management-3f1c3ad85ad1a49bfdfa7d4e3b840987 + +info: + name: > + School Management System for Wordpress <= 56.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d2dde9f-c3c3-4e6e-a7e2-a0e511bff010?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/school-management/" + google-query: inurl:"/wp-content/plugins/school-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,school-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/school-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "school-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 57.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/school-management-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml b/nuclei-templates/cve-less/plugins/school-management-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml new file mode 100644 index 0000000000..ad8e3df4a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/school-management-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml @@ -0,0 +1,58 @@ +id: school-management-b8bed2657e8d7d4ab8d4bb6fbdc93698 + +info: + name: > + Mojoomla School Management System (Unspecified Version) - Authenticated (Student+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d933256-765b-4e1b-b5a1-39bf767bf860?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/school-management/" + google-query: inurl:"/wp-content/plugins/school-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,school-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/school-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "school-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/school-management-pro-2646a8b516c31d3d675ed11114c6f9aa.yaml b/nuclei-templates/cve-less/plugins/school-management-pro-2646a8b516c31d3d675ed11114c6f9aa.yaml new file mode 100644 index 0000000000..a39f140b54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/school-management-pro-2646a8b516c31d3d675ed11114c6f9aa.yaml @@ -0,0 +1,58 @@ +id: school-management-pro-2646a8b516c31d3d675ed11114c6f9aa + +info: + name: > + The School Management Pro <= 9.9.6 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bb0462a-e801-4aa7-a98a-c5032cb8304c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/school-management-pro/" + google-query: inurl:"/wp-content/plugins/school-management-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,school-management-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/school-management-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "school-management-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/school-management-pro-c85a39b22a9266777e8fa557a3826f56.yaml b/nuclei-templates/cve-less/plugins/school-management-pro-c85a39b22a9266777e8fa557a3826f56.yaml new file mode 100644 index 0000000000..fec1dbcdc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/school-management-pro-c85a39b22a9266777e8fa557a3826f56.yaml @@ -0,0 +1,58 @@ +id: school-management-pro-c85a39b22a9266777e8fa557a3826f56 + +info: + name: > + School Management Pro <= 10.3.4 - Authenticated (School Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/446522ea-7cf1-449b-b05c-58eb815142a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/school-management-pro/" + google-query: inurl:"/wp-content/plugins/school-management-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,school-management-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/school-management-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "school-management-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/school-management-system-be2315835d7b2267c9fa00b942855a61.yaml b/nuclei-templates/cve-less/plugins/school-management-system-be2315835d7b2267c9fa00b942855a61.yaml new file mode 100644 index 0000000000..7beea062a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/school-management-system-be2315835d7b2267c9fa00b942855a61.yaml @@ -0,0 +1,58 @@ +id: school-management-system-be2315835d7b2267c9fa00b942855a61 + +info: + name: > + The School Management – Education & Learning Management <= 4.1 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1268bdb9-7f80-4fdc-a95a-d51b0ab83e17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/school-management-system/" + google-query: inurl:"/wp-content/plugins/school-management-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,school-management-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/school-management-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "school-management-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/schreikasten-13e0cdd00039aa83908edb26fc9e840c.yaml b/nuclei-templates/cve-less/plugins/schreikasten-13e0cdd00039aa83908edb26fc9e840c.yaml new file mode 100644 index 0000000000..55e4f06ead --- /dev/null +++ b/nuclei-templates/cve-less/plugins/schreikasten-13e0cdd00039aa83908edb26fc9e840c.yaml @@ -0,0 +1,58 @@ +id: schreikasten-13e0cdd00039aa83908edb26fc9e840c + +info: + name: > + Schreikasten <= 0.14.18 - Authenticated (Author+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62fd2c51-eac1-47c0-adbc-90bdd8dbbc8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/schreikasten/" + google-query: inurl:"/wp-content/plugins/schreikasten/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,schreikasten,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/schreikasten/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "schreikasten" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.14.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scormcloud-cef5983d30ffaada806aedbacf5b6bc6.yaml b/nuclei-templates/cve-less/plugins/scormcloud-cef5983d30ffaada806aedbacf5b6bc6.yaml new file mode 100644 index 0000000000..7cb8e5d94c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scormcloud-cef5983d30ffaada806aedbacf5b6bc6.yaml @@ -0,0 +1,58 @@ +id: scormcloud-cef5983d30ffaada806aedbacf5b6bc6 + +info: + name: > + SCORM Cloud For WordPress < 1.0.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fc02501-2bb6-4817-8e01-273d3d91ac57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scormcloud/" + google-query: inurl:"/wp-content/plugins/scormcloud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scormcloud,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scormcloud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scormcloud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scoutnet-kalender-1e95de3e52134f8f88956ec119bc2d88.yaml b/nuclei-templates/cve-less/plugins/scoutnet-kalender-1e95de3e52134f8f88956ec119bc2d88.yaml new file mode 100644 index 0000000000..1f4b3c718c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scoutnet-kalender-1e95de3e52134f8f88956ec119bc2d88.yaml @@ -0,0 +1,58 @@ +id: scoutnet-kalender-1e95de3e52134f8f88956ec119bc2d88 + +info: + name: > + Scoutnet Kalender <= 1.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/068cb545-8ced-45a1-a50a-1b6a38e99741?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scoutnet-kalender/" + google-query: inurl:"/wp-content/plugins/scoutnet-kalender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scoutnet-kalender,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scoutnet-kalender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scoutnet-kalender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/screets-lcx-211da40fdd7ec7390b239420458edbc0.yaml b/nuclei-templates/cve-less/plugins/screets-lcx-211da40fdd7ec7390b239420458edbc0.yaml new file mode 100644 index 0000000000..3f04ec8462 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/screets-lcx-211da40fdd7ec7390b239420458edbc0.yaml @@ -0,0 +1,58 @@ +id: screets-lcx-211da40fdd7ec7390b239420458edbc0 + +info: + name: > + Live Chat Unlimited <= 2.8.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b874721-6cb9-4ce4-a78e-a457596d15ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/screets-lcx/" + google-query: inurl:"/wp-content/plugins/screets-lcx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,screets-lcx,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/screets-lcx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "screets-lcx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scribble-maps-1a6adfb616ef7e8670ebde6e3c2f0918.yaml b/nuclei-templates/cve-less/plugins/scribble-maps-1a6adfb616ef7e8670ebde6e3c2f0918.yaml new file mode 100644 index 0000000000..5bf407832d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scribble-maps-1a6adfb616ef7e8670ebde6e3c2f0918.yaml @@ -0,0 +1,58 @@ +id: scribble-maps-1a6adfb616ef7e8670ebde6e3c2f0918 + +info: + name: > + Scribble Maps <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4541a7e1-4e46-4681-83e3-1c2e38396204?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scribble-maps/" + google-query: inurl:"/wp-content/plugins/scribble-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scribble-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scribble-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scribble-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scriptless-social-sharing-53a6ab0ca5df0931f86a3cb0e36625b5.yaml b/nuclei-templates/cve-less/plugins/scriptless-social-sharing-53a6ab0ca5df0931f86a3cb0e36625b5.yaml new file mode 100644 index 0000000000..f62214e9ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scriptless-social-sharing-53a6ab0ca5df0931f86a3cb0e36625b5.yaml @@ -0,0 +1,58 @@ +id: scriptless-social-sharing-53a6ab0ca5df0931f86a3cb0e36625b5 + +info: + name: > + Scriptless Social Sharing <= 3.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84c79b0e-01d2-4710-9a02-edceab8db22d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scriptless-social-sharing/" + google-query: inurl:"/wp-content/plugins/scriptless-social-sharing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scriptless-social-sharing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scriptless-social-sharing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scriptless-social-sharing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scripts-n-styles-dd27ae18a86029fffd366285509782e0.yaml b/nuclei-templates/cve-less/plugins/scripts-n-styles-dd27ae18a86029fffd366285509782e0.yaml new file mode 100644 index 0000000000..64b71a63d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scripts-n-styles-dd27ae18a86029fffd366285509782e0.yaml @@ -0,0 +1,58 @@ +id: scripts-n-styles-dd27ae18a86029fffd366285509782e0 + +info: + name: > + Scripts n Styles <= 3.5.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a86d8f97-54dc-4c6b-92c0-05a8625cc073?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scripts-n-styles/" + google-query: inurl:"/wp-content/plugins/scripts-n-styles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scripts-n-styles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scripts-n-styles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scripts-n-styles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scripts-organizer-c348ce6c7574b8ff9d61db7b1c6faf04.yaml b/nuclei-templates/cve-less/plugins/scripts-organizer-c348ce6c7574b8ff9d61db7b1c6faf04.yaml new file mode 100644 index 0000000000..c3b05467a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scripts-organizer-c348ce6c7574b8ff9d61db7b1c6faf04.yaml @@ -0,0 +1,58 @@ +id: scripts-organizer-c348ce6c7574b8ff9d61db7b1c6faf04 + +info: + name: > + Scripts Organizer < 3.0 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ed8866c-d8f1-4c5e-aba0-b3a0677c8efc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scripts-organizer/" + google-query: inurl:"/wp-content/plugins/scripts-organizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scripts-organizer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scripts-organizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scripts-organizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scroll-baner-62e4e20027880ffdd76d60900f6cc1c9.yaml b/nuclei-templates/cve-less/plugins/scroll-baner-62e4e20027880ffdd76d60900f6cc1c9.yaml new file mode 100644 index 0000000000..c38c6b5a4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scroll-baner-62e4e20027880ffdd76d60900f6cc1c9.yaml @@ -0,0 +1,58 @@ +id: scroll-baner-62e4e20027880ffdd76d60900f6cc1c9 + +info: + name: > + Scroll Baner <= 1.0 - Cross-Site Request Forgery to Remote Code Execution and/or Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a86d196f-9613-4352-8a96-87ea147eb1c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scroll-baner/" + google-query: inurl:"/wp-content/plugins/scroll-baner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scroll-baner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scroll-baner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scroll-baner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scroll-post-excerpt-4634b65a3b88602069115a32b9310bb1.yaml b/nuclei-templates/cve-less/plugins/scroll-post-excerpt-4634b65a3b88602069115a32b9310bb1.yaml new file mode 100644 index 0000000000..9050876098 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scroll-post-excerpt-4634b65a3b88602069115a32b9310bb1.yaml @@ -0,0 +1,58 @@ +id: scroll-post-excerpt-4634b65a3b88602069115a32b9310bb1 + +info: + name: > + Scroll post excerpt <= 8.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6da00adc-8fc0-4d8f-9ff3-8c21223199f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scroll-post-excerpt/" + google-query: inurl:"/wp-content/plugins/scroll-post-excerpt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scroll-post-excerpt,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scroll-post-excerpt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scroll-post-excerpt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scroll-top-b5b3c8eb6791ecd6029bb9d46ed89ac0.yaml b/nuclei-templates/cve-less/plugins/scroll-top-b5b3c8eb6791ecd6029bb9d46ed89ac0.yaml new file mode 100644 index 0000000000..72b8de9520 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scroll-top-b5b3c8eb6791ecd6029bb9d46ed89ac0.yaml @@ -0,0 +1,58 @@ +id: scroll-top-b5b3c8eb6791ecd6029bb9d46ed89ac0 + +info: + name: > + Scroll To Top <= 1.4.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70d046c9-a0c2-4059-aa1d-47caa1ffe76c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scroll-top/" + google-query: inurl:"/wp-content/plugins/scroll-top/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scroll-top,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scroll-top/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scroll-top" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scroll-triggered-animations-a2f2e6465cf5db9cbb966e235c714c1c.yaml b/nuclei-templates/cve-less/plugins/scroll-triggered-animations-a2f2e6465cf5db9cbb966e235c714c1c.yaml new file mode 100644 index 0000000000..0fa7bc39d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scroll-triggered-animations-a2f2e6465cf5db9cbb966e235c714c1c.yaml @@ -0,0 +1,58 @@ +id: scroll-triggered-animations-a2f2e6465cf5db9cbb966e235c714c1c + +info: + name: > + Animator <= 3.0.10 - Missing Authorization to Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8457aeb-867b-4185-8271-a5452b7c5365?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scroll-triggered-animations/" + google-query: inurl:"/wp-content/plugins/scroll-triggered-animations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scroll-triggered-animations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scroll-triggered-animations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scroll-triggered-animations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scrolling-anchors-823ea976111689a9bb4045475cc60c43.yaml b/nuclei-templates/cve-less/plugins/scrolling-anchors-823ea976111689a9bb4045475cc60c43.yaml new file mode 100644 index 0000000000..d643ff2be2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scrolling-anchors-823ea976111689a9bb4045475cc60c43.yaml @@ -0,0 +1,58 @@ +id: scrolling-anchors-823ea976111689a9bb4045475cc60c43 + +info: + name: > + Easy Smooth Scroll Links <= 2.23.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd248252-4329-4b3c-acf1-3b3d8cc9887c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scrolling-anchors/" + google-query: inurl:"/wp-content/plugins/scrolling-anchors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scrolling-anchors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scrolling-anchors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scrolling-anchors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scrollrevealjs-effects-92ee91cf72a43dfa2c90a26dd4e9aac0.yaml b/nuclei-templates/cve-less/plugins/scrollrevealjs-effects-92ee91cf72a43dfa2c90a26dd4e9aac0.yaml new file mode 100644 index 0000000000..f8eec3c7d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scrollrevealjs-effects-92ee91cf72a43dfa2c90a26dd4e9aac0.yaml @@ -0,0 +1,58 @@ +id: scrollrevealjs-effects-92ee91cf72a43dfa2c90a26dd4e9aac0 + +info: + name: > + ScrollReveal.js Effects <= 1.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68d44dd9-cfe4-4bc0-aa2e-9b7fb766870a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scrollrevealjs-effects/" + google-query: inurl:"/wp-content/plugins/scrollrevealjs-effects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scrollrevealjs-effects,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scrollrevealjs-effects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scrollrevealjs-effects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scrollsequence-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/scrollsequence-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bb53e970f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scrollsequence-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: scrollsequence-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scrollsequence/" + google-query: inurl:"/wp-content/plugins/scrollsequence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scrollsequence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scrollsequence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scrollsequence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/scrollsequence-d8b5bd57572fb9305d66b7bd52b02101.yaml b/nuclei-templates/cve-less/plugins/scrollsequence-d8b5bd57572fb9305d66b7bd52b02101.yaml new file mode 100644 index 0000000000..08cd45a9d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/scrollsequence-d8b5bd57572fb9305d66b7bd52b02101.yaml @@ -0,0 +1,58 @@ +id: scrollsequence-d8b5bd57572fb9305d66b7bd52b02101 + +info: + name: > + Scrollsequence <= 1.5.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10d926d7-bcc9-4424-8422-90edc36f0ad4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/scrollsequence/" + google-query: inurl:"/wp-content/plugins/scrollsequence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,scrollsequence,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/scrollsequence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scrollsequence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/se-html5-album-audio-player-85cd297e94e13a79acaf0e0195efaaf9.yaml b/nuclei-templates/cve-less/plugins/se-html5-album-audio-player-85cd297e94e13a79acaf0e0195efaaf9.yaml new file mode 100644 index 0000000000..bfb9c00a24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/se-html5-album-audio-player-85cd297e94e13a79acaf0e0195efaaf9.yaml @@ -0,0 +1,58 @@ +id: se-html5-album-audio-player-85cd297e94e13a79acaf0e0195efaaf9 + +info: + name: > + SE HTML5 Album Audio Player <= 1.1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbdd01b3-153b-4783-b686-558874d2856e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/se-html5-album-audio-player/" + google-query: inurl:"/wp-content/plugins/se-html5-album-audio-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,se-html5-album-audio-player,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/se-html5-album-audio-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "se-html5-album-audio-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seamless-donations-0f1cce8b3f6cc44f06846edd384bb3d3.yaml b/nuclei-templates/cve-less/plugins/seamless-donations-0f1cce8b3f6cc44f06846edd384bb3d3.yaml new file mode 100644 index 0000000000..6132b87a95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seamless-donations-0f1cce8b3f6cc44f06846edd384bb3d3.yaml @@ -0,0 +1,58 @@ +id: seamless-donations-0f1cce8b3f6cc44f06846edd384bb3d3 + +info: + name: > + Seamless Donations: A Platform for Global Fundraising and Rebuilding using Stripe and PayPal <= 5.1.7 - Cross-Site Request Forgery to Settings Chage + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed4e1a56-708d-4a12-8153-9568d11fe4d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seamless-donations/" + google-query: inurl:"/wp-content/plugins/seamless-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seamless-donations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seamless-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seamless-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seamless-donations-466149e12563eb78ed7febca48abd052.yaml b/nuclei-templates/cve-less/plugins/seamless-donations-466149e12563eb78ed7febca48abd052.yaml new file mode 100644 index 0000000000..76171cbed1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seamless-donations-466149e12563eb78ed7febca48abd052.yaml @@ -0,0 +1,58 @@ +id: seamless-donations-466149e12563eb78ed7febca48abd052 + +info: + name: > + Seamless Donations: A Platform for Global Fundraising and Rebuilding using Stripe and PayPal <= 5.1.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d159130a-c99d-44d3-a130-aa0146f17157?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seamless-donations/" + google-query: inurl:"/wp-content/plugins/seamless-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seamless-donations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seamless-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seamless-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-analytics-48d179450e001d6e5bb006bf4ba5d2a6.yaml b/nuclei-templates/cve-less/plugins/search-analytics-48d179450e001d6e5bb006bf4ba5d2a6.yaml new file mode 100644 index 0000000000..f87d070207 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-analytics-48d179450e001d6e5bb006bf4ba5d2a6.yaml @@ -0,0 +1,58 @@ +id: search-analytics-48d179450e001d6e5bb006bf4ba5d2a6 + +info: + name: > + WP Search Analytics <= 1.4.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/914d6f7a-053a-4555-9cbc-98bd0789bcd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-analytics/" + google-query: inurl:"/wp-content/plugins/search-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-analytics-6b13e1ddb211e52169360fc54388c951.yaml b/nuclei-templates/cve-less/plugins/search-analytics-6b13e1ddb211e52169360fc54388c951.yaml new file mode 100644 index 0000000000..e3e27a0318 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-analytics-6b13e1ddb211e52169360fc54388c951.yaml @@ -0,0 +1,58 @@ +id: search-analytics-6b13e1ddb211e52169360fc54388c951 + +info: + name: > + WP Search Analytics <= 1.4.7 - Reflected Cross-Site Scripting via 'render_stats_page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6433a17-0017-46a9-a8e6-4d4a4a55f2db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-analytics/" + google-query: inurl:"/wp-content/plugins/search-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-and-share-63d0d67aa5aba2dddaa9648ffc434152.yaml b/nuclei-templates/cve-less/plugins/search-and-share-63d0d67aa5aba2dddaa9648ffc434152.yaml new file mode 100644 index 0000000000..f0ddad3872 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-and-share-63d0d67aa5aba2dddaa9648ffc434152.yaml @@ -0,0 +1,58 @@ +id: search-and-share-63d0d67aa5aba2dddaa9648ffc434152 + +info: + name: > + Search and Share <= 0.9.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5381944-f12c-41e6-be47-bd258da5600b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-and-share/" + google-query: inurl:"/wp-content/plugins/search-and-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-and-share,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-and-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-and-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-autocomplete-227404dac34993cad671e2236080d324.yaml b/nuclei-templates/cve-less/plugins/search-autocomplete-227404dac34993cad671e2236080d324.yaml new file mode 100644 index 0000000000..2b9840dc84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-autocomplete-227404dac34993cad671e2236080d324.yaml @@ -0,0 +1,58 @@ +id: search-autocomplete-227404dac34993cad671e2236080d324 + +info: + name: > + Search Autocomplete < 1.0.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7867d651-dd15-4d91-a7ca-65f49cb94b65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-autocomplete/" + google-query: inurl:"/wp-content/plugins/search-autocomplete/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-autocomplete,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-autocomplete/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-autocomplete" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-everything-117a868c3ea3bb712e5a1d73897e37a5.yaml b/nuclei-templates/cve-less/plugins/search-everything-117a868c3ea3bb712e5a1d73897e37a5.yaml new file mode 100644 index 0000000000..d359a6b850 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-everything-117a868c3ea3bb712e5a1d73897e37a5.yaml @@ -0,0 +1,58 @@ +id: search-everything-117a868c3ea3bb712e5a1d73897e37a5 + +info: + name: > + Search Everything <= 8.1.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/623acb6d-9cab-483c-ad51-88adff8847a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-everything/" + google-query: inurl:"/wp-content/plugins/search-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-everything,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-everything-3aae779483ac61fd460b1860a2ef2f7d.yaml b/nuclei-templates/cve-less/plugins/search-everything-3aae779483ac61fd460b1860a2ef2f7d.yaml new file mode 100644 index 0000000000..c923c07c5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-everything-3aae779483ac61fd460b1860a2ef2f7d.yaml @@ -0,0 +1,58 @@ +id: search-everything-3aae779483ac61fd460b1860a2ef2f7d + +info: + name: > + Search Everything <= 8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acd1d5c9-70fb-43e8-94de-6ddcf4612cea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-everything/" + google-query: inurl:"/wp-content/plugins/search-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-everything,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-everything-db06882af76c86da8baedbdae183f52e.yaml b/nuclei-templates/cve-less/plugins/search-everything-db06882af76c86da8baedbdae183f52e.yaml new file mode 100644 index 0000000000..e8649db9cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-everything-db06882af76c86da8baedbdae183f52e.yaml @@ -0,0 +1,58 @@ +id: search-everything-db06882af76c86da8baedbdae183f52e + +info: + name: > + Search Everything <= 7.0.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dd3e203-dcc4-47b5-ab65-324bcff5b91b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-everything/" + google-query: inurl:"/wp-content/plugins/search-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-everything,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-everything-f5c19231c40427d40fe57581f10b7d84.yaml b/nuclei-templates/cve-less/plugins/search-everything-f5c19231c40427d40fe57581f10b7d84.yaml new file mode 100644 index 0000000000..c439ef22c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-everything-f5c19231c40427d40fe57581f10b7d84.yaml @@ -0,0 +1,58 @@ +id: search-everything-f5c19231c40427d40fe57581f10b7d84 + +info: + name: > + Search Everything <= 8.1.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db9819c4-e000-4113-a613-7510fce923c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-everything/" + google-query: inurl:"/wp-content/plugins/search-everything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-everything,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-everything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-everything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-exclude-3a32aa7a18d47ef0f7438986ced63310.yaml b/nuclei-templates/cve-less/plugins/search-exclude-3a32aa7a18d47ef0f7438986ced63310.yaml new file mode 100644 index 0000000000..fb239572a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-exclude-3a32aa7a18d47ef0f7438986ced63310.yaml @@ -0,0 +1,58 @@ +id: search-exclude-3a32aa7a18d47ef0f7438986ced63310 + +info: + name: > + Search Exclude <= 1.2.6 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/211aa83e-e97b-4fd7-8cfe-308ac698c17e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-exclude/" + google-query: inurl:"/wp-content/plugins/search-exclude/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-exclude,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-exclude/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-exclude" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-exclude-e9fa8cb8021c5fce11cdeba05ed162ba.yaml b/nuclei-templates/cve-less/plugins/search-exclude-e9fa8cb8021c5fce11cdeba05ed162ba.yaml new file mode 100644 index 0000000000..6254a53019 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-exclude-e9fa8cb8021c5fce11cdeba05ed162ba.yaml @@ -0,0 +1,58 @@ +id: search-exclude-e9fa8cb8021c5fce11cdeba05ed162ba + +info: + name: > + Search Exclude <= 1.2.3 - Arbitrary Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bba4286b-acce-4dff-b809-dbd04d59702b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-exclude/" + google-query: inurl:"/wp-content/plugins/search-exclude/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-exclude,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-exclude/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-exclude" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-filter-7932b82c356f203f76bc21fa22bfac04.yaml b/nuclei-templates/cve-less/plugins/search-filter-7932b82c356f203f76bc21fa22bfac04.yaml new file mode 100644 index 0000000000..c68e7d30ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-filter-7932b82c356f203f76bc21fa22bfac04.yaml @@ -0,0 +1,58 @@ +id: search-filter-7932b82c356f203f76bc21fa22bfac04 + +info: + name: > + Search & Filter <= 1.2.15 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9d50155-73a5-4489-88c5-c7c2a4e30fef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-filter/" + google-query: inurl:"/wp-content/plugins/search-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-in-place-67ada1785c1a67660530280a293c0d89.yaml b/nuclei-templates/cve-less/plugins/search-in-place-67ada1785c1a67660530280a293c0d89.yaml new file mode 100644 index 0000000000..9ece274aed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-in-place-67ada1785c1a67660530280a293c0d89.yaml @@ -0,0 +1,58 @@ +id: search-in-place-67ada1785c1a67660530280a293c0d89 + +info: + name: > + Search in Place <= 1.0.104 - Missing Authorization to Feedback Submission + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28ca150a-443f-4b99-8c15-491bd9f1cee3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-in-place/" + google-query: inurl:"/wp-content/plugins/search-in-place/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-in-place,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-in-place/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-in-place" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.104') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-in-place-90aecfac8b56c743716b7354156b72b0.yaml b/nuclei-templates/cve-less/plugins/search-in-place-90aecfac8b56c743716b7354156b72b0.yaml new file mode 100644 index 0000000000..a1d50ccacd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-in-place-90aecfac8b56c743716b7354156b72b0.yaml @@ -0,0 +1,58 @@ +id: search-in-place-90aecfac8b56c743716b7354156b72b0 + +info: + name: > + Search in Place <= 1.0.104 - Cross-Site Request Forgery to Feedback Submission + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f079037c-cea6-4ba6-843f-99c5e5fe59a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-in-place/" + google-query: inurl:"/wp-content/plugins/search-in-place/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-in-place,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-in-place/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-in-place" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.104') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-logger-967dff727dbc42b5a7eb2d15c9e083d4.yaml b/nuclei-templates/cve-less/plugins/search-logger-967dff727dbc42b5a7eb2d15c9e083d4.yaml new file mode 100644 index 0000000000..1f70f9642b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-logger-967dff727dbc42b5a7eb2d15c9e083d4.yaml @@ -0,0 +1,58 @@ +id: search-logger-967dff727dbc42b5a7eb2d15c9e083d4 + +info: + name: > + Search Logger <= 0.9 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b23e36f7-ee44-42c6-94b7-e943c6c4a3ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-logger/" + google-query: inurl:"/wp-content/plugins/search-logger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-logger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-logger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-logger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-meter-f23eeb8c9b5eae93abecc2b7d750a8f6.yaml b/nuclei-templates/cve-less/plugins/search-meter-f23eeb8c9b5eae93abecc2b7d750a8f6.yaml new file mode 100644 index 0000000000..4cf5d486f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-meter-f23eeb8c9b5eae93abecc2b7d750a8f6.yaml @@ -0,0 +1,58 @@ +id: search-meter-f23eeb8c9b5eae93abecc2b7d750a8f6 + +info: + name: > + Search Meter <= 2.13.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a1d90f6-40fc-40b5-a46c-9ba9ac2fc1b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-meter/" + google-query: inurl:"/wp-content/plugins/search-meter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-meter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-meter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-meter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/search-unleashed-6786949bf947df30c87362646165e5b3.yaml b/nuclei-templates/cve-less/plugins/search-unleashed-6786949bf947df30c87362646165e5b3.yaml new file mode 100644 index 0000000000..7948dbb827 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/search-unleashed-6786949bf947df30c87362646165e5b3.yaml @@ -0,0 +1,58 @@ +id: search-unleashed-6786949bf947df30c87362646165e5b3 + +info: + name: > + Search Unleashed <= 0.2.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83b1740c-6392-4b52-82e0-377201aa61ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/search-unleashed/" + google-query: inurl:"/wp-content/plugins/search-unleashed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,search-unleashed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/search-unleashed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "search-unleashed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/searchiq-0d7f8442f33ed7fc7eccab9aaa8ce0e0.yaml b/nuclei-templates/cve-less/plugins/searchiq-0d7f8442f33ed7fc7eccab9aaa8ce0e0.yaml new file mode 100644 index 0000000000..a3cd028b85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/searchiq-0d7f8442f33ed7fc7eccab9aaa8ce0e0.yaml @@ -0,0 +1,58 @@ +id: searchiq-0d7f8442f33ed7fc7eccab9aaa8ce0e0 + +info: + name: > + SearchIQ – The Search Solution <= 3.8 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67b0ddc6-9381-4b18-b623-372a149ffa49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/searchiq/" + google-query: inurl:"/wp-content/plugins/searchiq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,searchiq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/searchiq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "searchiq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/searchiq-84940a417e2023353b70ebc282a092a0.yaml b/nuclei-templates/cve-less/plugins/searchiq-84940a417e2023353b70ebc282a092a0.yaml new file mode 100644 index 0000000000..aa50b9825e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/searchiq-84940a417e2023353b70ebc282a092a0.yaml @@ -0,0 +1,58 @@ +id: searchiq-84940a417e2023353b70ebc282a092a0 + +info: + name: > + SearchIQ <= 4.5 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c728fa3-e917-40ca-84ca-e907c22b0a3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/searchiq/" + google-query: inurl:"/wp-content/plugins/searchiq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,searchiq,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/searchiq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "searchiq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/searchiq-aa754ad2c8b3fd090579a6c1c7b9d91c.yaml b/nuclei-templates/cve-less/plugins/searchiq-aa754ad2c8b3fd090579a6c1c7b9d91c.yaml new file mode 100644 index 0000000000..a50445ca72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/searchiq-aa754ad2c8b3fd090579a6c1c7b9d91c.yaml @@ -0,0 +1,58 @@ +id: searchiq-aa754ad2c8b3fd090579a6c1c7b9d91c + +info: + name: > + SearchIQ <= 4.4 - Missing Authorization via getSIQPluginSettings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3001829b-f63b-4b99-91a0-53d615ac96c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/searchiq/" + google-query: inurl:"/wp-content/plugins/searchiq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,searchiq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/searchiq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "searchiq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/searchterms-tagging-2-3c345f487511e8bb822be122aa461bdf.yaml b/nuclei-templates/cve-less/plugins/searchterms-tagging-2-3c345f487511e8bb822be122aa461bdf.yaml new file mode 100644 index 0000000000..85c0a82937 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/searchterms-tagging-2-3c345f487511e8bb822be122aa461bdf.yaml @@ -0,0 +1,58 @@ +id: searchterms-tagging-2-3c345f487511e8bb822be122aa461bdf + +info: + name: > + searchterms-tagging-2 <= 1.535 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb2df482-30bf-49e5-b1e2-06e102d2dd1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/searchterms-tagging-2/" + google-query: inurl:"/wp-content/plugins/searchterms-tagging-2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,searchterms-tagging-2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/searchterms-tagging-2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "searchterms-tagging-2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.535') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/searchterms-tagging-2-4fdb668b4072805be7b723dcf1d44abb.yaml b/nuclei-templates/cve-less/plugins/searchterms-tagging-2-4fdb668b4072805be7b723dcf1d44abb.yaml new file mode 100644 index 0000000000..33e50ab729 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/searchterms-tagging-2-4fdb668b4072805be7b723dcf1d44abb.yaml @@ -0,0 +1,58 @@ +id: searchterms-tagging-2-4fdb668b4072805be7b723dcf1d44abb + +info: + name: > + SEO SearchTerms Tagging 2 <=1.535 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e18b3a85-9d4a-4af8-9a73-1f8794ad467b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/searchterms-tagging-2/" + google-query: inurl:"/wp-content/plugins/searchterms-tagging-2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,searchterms-tagging-2,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/searchterms-tagging-2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "searchterms-tagging-2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.535') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/searchwp-347f040de616333a1a9814dd7bc708c0.yaml b/nuclei-templates/cve-less/plugins/searchwp-347f040de616333a1a9814dd7bc708c0.yaml new file mode 100644 index 0000000000..6b29f1eb28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/searchwp-347f040de616333a1a9814dd7bc708c0.yaml @@ -0,0 +1,58 @@ +id: searchwp-347f040de616333a1a9814dd7bc708c0 + +info: + name: > + SearchWP Premium <= 4.2.5 - Authenticated (Subscriber+) Nonce Leakage and Authorization Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00a1b66d-d81c-4539-846b-ff66301a94ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/searchwp/" + google-query: inurl:"/wp-content/plugins/searchwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,searchwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/searchwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "searchwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/searchwp-live-ajax-search-3ff9ea32aaa393cc30b39527dd3a58c2.yaml b/nuclei-templates/cve-less/plugins/searchwp-live-ajax-search-3ff9ea32aaa393cc30b39527dd3a58c2.yaml new file mode 100644 index 0000000000..a1a992da74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/searchwp-live-ajax-search-3ff9ea32aaa393cc30b39527dd3a58c2.yaml @@ -0,0 +1,58 @@ +id: searchwp-live-ajax-search-3ff9ea32aaa393cc30b39527dd3a58c2 + +info: + name: > + SearchWP Live Ajax Search <= 1.6.2 - Directory Traversal and Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e0ca51c-0536-45ff-a5af-41ef4977179d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/searchwp-live-ajax-search/" + google-query: inurl:"/wp-content/plugins/searchwp-live-ajax-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,searchwp-live-ajax-search,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/searchwp-live-ajax-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "searchwp-live-ajax-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0', '<= 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/searchwp-live-ajax-search-f7cf83a853e0c8a85044ac66f5cc847b.yaml b/nuclei-templates/cve-less/plugins/searchwp-live-ajax-search-f7cf83a853e0c8a85044ac66f5cc847b.yaml new file mode 100644 index 0000000000..150da30cb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/searchwp-live-ajax-search-f7cf83a853e0c8a85044ac66f5cc847b.yaml @@ -0,0 +1,58 @@ +id: searchwp-live-ajax-search-f7cf83a853e0c8a85044ac66f5cc847b + +info: + name: > + SearchWP Live Ajax Search <= 1.6.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8ddb7df-7f74-486d-a55f-9e2d1e91f112?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/searchwp-live-ajax-search/" + google-query: inurl:"/wp-content/plugins/searchwp-live-ajax-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,searchwp-live-ajax-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/searchwp-live-ajax-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "searchwp-live-ajax-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seatgeek-affiliate-tickets-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/seatgeek-affiliate-tickets-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..08a12f9532 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seatgeek-affiliate-tickets-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: seatgeek-affiliate-tickets-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seatgeek-affiliate-tickets/" + google-query: inurl:"/wp-content/plugins/seatgeek-affiliate-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seatgeek-affiliate-tickets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seatgeek-affiliate-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seatgeek-affiliate-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/second-street-promotion-3cb680b76cd76f74dd3e1108311fe7fe.yaml b/nuclei-templates/cve-less/plugins/second-street-promotion-3cb680b76cd76f74dd3e1108311fe7fe.yaml new file mode 100644 index 0000000000..4a9940972f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/second-street-promotion-3cb680b76cd76f74dd3e1108311fe7fe.yaml @@ -0,0 +1,58 @@ +id: second-street-promotion-3cb680b76cd76f74dd3e1108311fe7fe + +info: + name: > + Second Street <= 3.1.6 - Stored Cross-Site Scripting via organization_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7346e8-cd77-46dd-8e7d-694f65b6b62f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/second-street-promotion/" + google-query: inurl:"/wp-content/plugins/second-street-promotion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,second-street-promotion,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/second-street-promotion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "second-street-promotion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secondary-title-bf1fcb74e30994cb355bab78b549e730.yaml b/nuclei-templates/cve-less/plugins/secondary-title-bf1fcb74e30994cb355bab78b549e730.yaml new file mode 100644 index 0000000000..46567d6a16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secondary-title-bf1fcb74e30994cb355bab78b549e730.yaml @@ -0,0 +1,58 @@ +id: secondary-title-bf1fcb74e30994cb355bab78b549e730 + +info: + name: > + Secondary Title <= 2.0.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5ab7d3e-b0c8-4e30-942b-23d91daff2ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secondary-title/" + google-query: inurl:"/wp-content/plugins/secondary-title/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secondary-title,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secondary-title/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secondary-title" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/section-slider-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/section-slider-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..4595e057e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/section-slider-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: section-slider-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/section-slider/" + google-query: inurl:"/wp-content/plugins/section-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,section-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/section-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "section-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secupress-2b0a7466b22e63c34f32b08697f5cfdf.yaml b/nuclei-templates/cve-less/plugins/secupress-2b0a7466b22e63c34f32b08697f5cfdf.yaml new file mode 100644 index 0000000000..b9a5643d1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secupress-2b0a7466b22e63c34f32b08697f5cfdf.yaml @@ -0,0 +1,58 @@ +id: secupress-2b0a7466b22e63c34f32b08697f5cfdf + +info: + name: > + SecuPress Free — WordPress Security <= 2.2.5.1 - Cross-Site Request Forgery to Banned IP Address + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4243bd6d-34f6-4d29-a333-4499a2e2d2e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secupress/" + google-query: inurl:"/wp-content/plugins/secupress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secupress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secupress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secupress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secupress-797ed9f22b4525fb7840122eb0973904.yaml b/nuclei-templates/cve-less/plugins/secupress-797ed9f22b4525fb7840122eb0973904.yaml new file mode 100644 index 0000000000..041e14a1c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secupress-797ed9f22b4525fb7840122eb0973904.yaml @@ -0,0 +1,58 @@ +id: secupress-797ed9f22b4525fb7840122eb0973904 + +info: + name: > + SecuPress Free and SecuPress Pro <= 1.4.12 - Unauthenticated Arbitrary IP Ban + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceef080c-3d3b-494d-8cfa-fe9724b9207f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secupress/" + google-query: inurl:"/wp-content/plugins/secupress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secupress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secupress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secupress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secupress-pro-797ed9f22b4525fb7840122eb0973904.yaml b/nuclei-templates/cve-less/plugins/secupress-pro-797ed9f22b4525fb7840122eb0973904.yaml new file mode 100644 index 0000000000..7c7c0fb886 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secupress-pro-797ed9f22b4525fb7840122eb0973904.yaml @@ -0,0 +1,58 @@ +id: secupress-pro-797ed9f22b4525fb7840122eb0973904 + +info: + name: > + SecuPress Free and SecuPress Pro <= 1.4.12 - Unauthenticated Arbitrary IP Ban + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceef080c-3d3b-494d-8cfa-fe9724b9207f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secupress-pro/" + google-query: inurl:"/wp-content/plugins/secupress-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secupress-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secupress-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secupress-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-admin-ip-eed5959a62db993b12da83da9d803446.yaml b/nuclei-templates/cve-less/plugins/secure-admin-ip-eed5959a62db993b12da83da9d803446.yaml new file mode 100644 index 0000000000..373fd7aac7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-admin-ip-eed5959a62db993b12da83da9d803446.yaml @@ -0,0 +1,58 @@ +id: secure-admin-ip-eed5959a62db993b12da83da9d803446 + +info: + name: > + Secure Admin IP <= 2.0 - Missing Authorization via 'saveSettings' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0f38af7-7753-4dbe-a4fd-e9a01785dd13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-admin-ip/" + google-query: inurl:"/wp-content/plugins/secure-admin-ip/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-admin-ip,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-admin-ip/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-admin-ip" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-copy-content-protection-40c9df59c7e3df119c2dd5f1035b5b7e.yaml b/nuclei-templates/cve-less/plugins/secure-copy-content-protection-40c9df59c7e3df119c2dd5f1035b5b7e.yaml new file mode 100644 index 0000000000..daf9dce5ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-copy-content-protection-40c9df59c7e3df119c2dd5f1035b5b7e.yaml @@ -0,0 +1,58 @@ +id: secure-copy-content-protection-40c9df59c7e3df119c2dd5f1035b5b7e + +info: + name: > + Secure Copy Content Protection and Content Locking <= 2.6.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbc1b46e-139a-4e1a-a0c7-e45e10adada5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-copy-content-protection/" + google-query: inurl:"/wp-content/plugins/secure-copy-content-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-copy-content-protection,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-copy-content-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-copy-content-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-copy-content-protection-80ad6ff6a41f2684b99adffd0cc6275a.yaml b/nuclei-templates/cve-less/plugins/secure-copy-content-protection-80ad6ff6a41f2684b99adffd0cc6275a.yaml new file mode 100644 index 0000000000..dcdaa50b78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-copy-content-protection-80ad6ff6a41f2684b99adffd0cc6275a.yaml @@ -0,0 +1,58 @@ +id: secure-copy-content-protection-80ad6ff6a41f2684b99adffd0cc6275a + +info: + name: > + Secure Copy Content Protection and Content Locking <= 3.9.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0afc98b1-e1ee-4c77-89fc-9ccb045c6733?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-copy-content-protection/" + google-query: inurl:"/wp-content/plugins/secure-copy-content-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-copy-content-protection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-copy-content-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-copy-content-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-copy-content-protection-a8ed8c08b34ae95a0c525696512c70ee.yaml b/nuclei-templates/cve-less/plugins/secure-copy-content-protection-a8ed8c08b34ae95a0c525696512c70ee.yaml new file mode 100644 index 0000000000..51ca56748d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-copy-content-protection-a8ed8c08b34ae95a0c525696512c70ee.yaml @@ -0,0 +1,58 @@ +id: secure-copy-content-protection-a8ed8c08b34ae95a0c525696512c70ee + +info: + name: > + Secure Copy Content Protection and Content Locking <= 3.7.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfd95489-c1d5-45cc-8ac4-400a39391aa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-copy-content-protection/" + google-query: inurl:"/wp-content/plugins/secure-copy-content-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-copy-content-protection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-copy-content-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-copy-content-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-copy-content-protection-b20594c424375d9856782a72ff8e9db1.yaml b/nuclei-templates/cve-less/plugins/secure-copy-content-protection-b20594c424375d9856782a72ff8e9db1.yaml new file mode 100644 index 0000000000..b0df99c5db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-copy-content-protection-b20594c424375d9856782a72ff8e9db1.yaml @@ -0,0 +1,58 @@ +id: secure-copy-content-protection-b20594c424375d9856782a72ff8e9db1 + +info: + name: > + Secure Copy Content Protection and Content Locking <= 2.8.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b52cc2a-c511-4801-8a95-f90d8d980c85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-copy-content-protection/" + google-query: inurl:"/wp-content/plugins/secure-copy-content-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-copy-content-protection,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-copy-content-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-copy-content-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-file-manager-d557c696333289ec8d8f662866e89376.yaml b/nuclei-templates/cve-less/plugins/secure-file-manager-d557c696333289ec8d8f662866e89376.yaml new file mode 100644 index 0000000000..2da5277df5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-file-manager-d557c696333289ec8d8f662866e89376.yaml @@ -0,0 +1,58 @@ +id: secure-file-manager-d557c696333289ec8d8f662866e89376 + +info: + name: > + Secure File Manager < 2.8.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a955d4f-6609-4aa8-806c-48af0c6dbac1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-file-manager/" + google-query: inurl:"/wp-content/plugins/secure-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-file-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-files-ce5ed87dfc2376443fc12498fa99a891.yaml b/nuclei-templates/cve-less/plugins/secure-files-ce5ed87dfc2376443fc12498fa99a891.yaml new file mode 100644 index 0000000000..cdc667b1f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-files-ce5ed87dfc2376443fc12498fa99a891.yaml @@ -0,0 +1,58 @@ +id: secure-files-ce5ed87dfc2376443fc12498fa99a891 + +info: + name: > + secure-files <= 1.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fd7d6af-a938-4106-aed2-12b9a5454da9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-files/" + google-query: inurl:"/wp-content/plugins/secure-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-files,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-html5-video-player-c6380a7487a7c0067133d9ec14c64bfc.yaml b/nuclei-templates/cve-less/plugins/secure-html5-video-player-c6380a7487a7c0067133d9ec14c64bfc.yaml new file mode 100644 index 0000000000..cb51722118 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-html5-video-player-c6380a7487a7c0067133d9ec14c64bfc.yaml @@ -0,0 +1,58 @@ +id: secure-html5-video-player-c6380a7487a7c0067133d9ec14c64bfc + +info: + name: > + Secure HTML5 Video Player < 3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d2b8bc2-68c2-40aa-b8b0-a0584549f303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-html5-video-player/" + google-query: inurl:"/wp-content/plugins/secure-html5-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-html5-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-html5-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-html5-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/secure-ip-logins-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/secure-ip-logins-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4720fe2516 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/secure-ip-logins-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: secure-ip-logins-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/secure-ip-logins/" + google-query: inurl:"/wp-content/plugins/secure-ip-logins/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,secure-ip-logins,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/secure-ip-logins/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "secure-ip-logins" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/securemoz-security-audit-a2f819fdd51f14b2b69a4d02f7d84f43.yaml b/nuclei-templates/cve-less/plugins/securemoz-security-audit-a2f819fdd51f14b2b69a4d02f7d84f43.yaml new file mode 100644 index 0000000000..ba9d0e3861 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/securemoz-security-audit-a2f819fdd51f14b2b69a4d02f7d84f43.yaml @@ -0,0 +1,58 @@ +id: securemoz-security-audit-a2f819fdd51f14b2b69a4d02f7d84f43 + +info: + name: > + SecureMoz Security Audit <= 1.0.5 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0a294c5-dc2f-4739-9519-ae2a1268ff55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/securemoz-security-audit/" + google-query: inurl:"/wp-content/plugins/securemoz-security-audit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,securemoz-security-audit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/securemoz-security-audit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "securemoz-security-audit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/securimage-wp-3eab710837b3e13c81a4f7d732c43657.yaml b/nuclei-templates/cve-less/plugins/securimage-wp-3eab710837b3e13c81a4f7d732c43657.yaml new file mode 100644 index 0000000000..01f20650bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/securimage-wp-3eab710837b3e13c81a4f7d732c43657.yaml @@ -0,0 +1,58 @@ +id: securimage-wp-3eab710837b3e13c81a4f7d732c43657 + +info: + name: > + Securimage-WP <= 3.6.16 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36f41de5-50d5-47ca-bbd0-eca3b756a0cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/securimage-wp/" + google-query: inurl:"/wp-content/plugins/securimage-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,securimage-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/securimage-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "securimage-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/securimage-wp-64412a6d5b249eafc3d5bfa69a4e3d27.yaml b/nuclei-templates/cve-less/plugins/securimage-wp-64412a6d5b249eafc3d5bfa69a4e3d27.yaml new file mode 100644 index 0000000000..b2a54cba99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/securimage-wp-64412a6d5b249eafc3d5bfa69a4e3d27.yaml @@ -0,0 +1,58 @@ +id: securimage-wp-64412a6d5b249eafc3d5bfa69a4e3d27 + +info: + name: > + Securimage-WP Plugin < 3.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22faab6d-a63f-4052-b7c6-92e11e4ca723?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/securimage-wp/" + google-query: inurl:"/wp-content/plugins/securimage-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,securimage-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/securimage-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "securimage-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/securimage-wp-fixed-e76639e268e0d7879dd985548e2b0ee7.yaml b/nuclei-templates/cve-less/plugins/securimage-wp-fixed-e76639e268e0d7879dd985548e2b0ee7.yaml new file mode 100644 index 0000000000..abeafae3c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/securimage-wp-fixed-e76639e268e0d7879dd985548e2b0ee7.yaml @@ -0,0 +1,58 @@ +id: securimage-wp-fixed-e76639e268e0d7879dd985548e2b0ee7 + +info: + name: > + Securimage-WP-Fixed <= 3.5.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b274af9b-071c-4f8d-a2e0-7f02b631c19a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/securimage-wp-fixed/" + google-query: inurl:"/wp-content/plugins/securimage-wp-fixed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,securimage-wp-fixed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/securimage-wp-fixed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "securimage-wp-fixed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/security-malware-firewall-2bc21dde1345455ea9561d5fe5ed0e15.yaml b/nuclei-templates/cve-less/plugins/security-malware-firewall-2bc21dde1345455ea9561d5fe5ed0e15.yaml new file mode 100644 index 0000000000..cfa7fcbc03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/security-malware-firewall-2bc21dde1345455ea9561d5fe5ed0e15.yaml @@ -0,0 +1,58 @@ +id: security-malware-firewall-2bc21dde1345455ea9561d5fe5ed0e15 + +info: + name: > + Security & Malware scan by CleanTalk <= 2.50 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fb9b039-eb04-4c27-89eb-1932c9c31962?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/security-malware-firewall/" + google-query: inurl:"/wp-content/plugins/security-malware-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,security-malware-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/security-malware-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "security-malware-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/security-malware-firewall-4d1eef19885c78121ffb497c3fe4a3bd.yaml b/nuclei-templates/cve-less/plugins/security-malware-firewall-4d1eef19885c78121ffb497c3fe4a3bd.yaml new file mode 100644 index 0000000000..d95e8a0c06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/security-malware-firewall-4d1eef19885c78121ffb497c3fe4a3bd.yaml @@ -0,0 +1,58 @@ +id: security-malware-firewall-4d1eef19885c78121ffb497c3fe4a3bd + +info: + name: > + Security & Malware scan by CleanTalk <= 2.120 - IP Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/525626be-fe1d-4543-91a1-ae5ea3658862?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/security-malware-firewall/" + google-query: inurl:"/wp-content/plugins/security-malware-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,security-malware-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/security-malware-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "security-malware-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.120') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/security-ninja-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/security-ninja-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2e3ce16af4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/security-ninja-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: security-ninja-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/security-ninja/" + google-query: inurl:"/wp-content/plugins/security-ninja/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,security-ninja,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/security-ninja/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "security-ninja" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.135') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/security-safe-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/security-safe-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dd40f92fc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/security-safe-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: security-safe-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/security-safe/" + google-query: inurl:"/wp-content/plugins/security-safe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,security-safe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/security-safe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "security-safe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seed-fonts-05c88cf821e14c133b503ea979e12c4d.yaml b/nuclei-templates/cve-less/plugins/seed-fonts-05c88cf821e14c133b503ea979e12c4d.yaml new file mode 100644 index 0000000000..469b07941e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seed-fonts-05c88cf821e14c133b503ea979e12c4d.yaml @@ -0,0 +1,58 @@ +id: seed-fonts-05c88cf821e14c133b503ea979e12c4d + +info: + name: > + Seed Fonts 2.3.1 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57953bab-7430-4841-b073-7db7964e6a65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seed-fonts/" + google-query: inurl:"/wp-content/plugins/seed-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seed-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seed-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seed-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seed-social-714e1a158166a33a7b439bd28dcdaa32.yaml b/nuclei-templates/cve-less/plugins/seed-social-714e1a158166a33a7b439bd28dcdaa32.yaml new file mode 100644 index 0000000000..0e5480f56c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seed-social-714e1a158166a33a7b439bd28dcdaa32.yaml @@ -0,0 +1,58 @@ +id: seed-social-714e1a158166a33a7b439bd28dcdaa32 + +info: + name: > + Seed Social <= 2.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47a99115-3e7b-4666-a00e-2b94d7d62e1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seed-social/" + google-query: inurl:"/wp-content/plugins/seed-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seed-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seed-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seed-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seed-social-c4ddc0489c7fc6327da43ce100fae835.yaml b/nuclei-templates/cve-less/plugins/seed-social-c4ddc0489c7fc6327da43ce100fae835.yaml new file mode 100644 index 0000000000..ee32ed15c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seed-social-c4ddc0489c7fc6327da43ce100fae835.yaml @@ -0,0 +1,58 @@ +id: seed-social-c4ddc0489c7fc6327da43ce100fae835 + +info: + name: > + Seed Social <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93a07f4e-8359-4ca2-a1cc-ca0ba2b7c0de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seed-social/" + google-query: inurl:"/wp-content/plugins/seed-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seed-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seed-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seed-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seers-cookie-consent-banner-privacy-policy-99cc5f18cba37431e326c7c04591a219.yaml b/nuclei-templates/cve-less/plugins/seers-cookie-consent-banner-privacy-policy-99cc5f18cba37431e326c7c04591a219.yaml new file mode 100644 index 0000000000..5ba54a7817 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seers-cookie-consent-banner-privacy-policy-99cc5f18cba37431e326c7c04591a219.yaml @@ -0,0 +1,58 @@ +id: seers-cookie-consent-banner-privacy-policy-99cc5f18cba37431e326c7c04591a219 + +info: + name: > + Seers <= 8.1.1 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d300288e-f100-4c02-ba65-d728e3b1522e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seers-cookie-consent-banner-privacy-policy/" + google-query: inurl:"/wp-content/plugins/seers-cookie-consent-banner-privacy-policy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seers-cookie-consent-banner-privacy-policy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seers-cookie-consent-banner-privacy-policy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seers-cookie-consent-banner-privacy-policy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seers-cookie-consent-banner-privacy-policy-ba1c662a4a4fab81f4b84d2ac53ce3a1.yaml b/nuclei-templates/cve-less/plugins/seers-cookie-consent-banner-privacy-policy-ba1c662a4a4fab81f4b84d2ac53ce3a1.yaml new file mode 100644 index 0000000000..b32eb09371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seers-cookie-consent-banner-privacy-policy-ba1c662a4a4fab81f4b84d2ac53ce3a1.yaml @@ -0,0 +1,58 @@ +id: seers-cookie-consent-banner-privacy-policy-ba1c662a4a4fab81f4b84d2ac53ce3a1 + +info: + name: > + Seers | GDPR & CCPA Cookie Consent & Compliance <= 8.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8049bff1-3262-464b-a9fa-d216eb3ab299?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seers-cookie-consent-banner-privacy-policy/" + google-query: inurl:"/wp-content/plugins/seers-cookie-consent-banner-privacy-policy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seers-cookie-consent-banner-privacy-policy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seers-cookie-consent-banner-privacy-policy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seers-cookie-consent-banner-privacy-policy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons-f73941d406d9c3fcf56582655794e007.yaml b/nuclei-templates/cve-less/plugins/select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons-f73941d406d9c3fcf56582655794e007.yaml new file mode 100644 index 0000000000..c1c9bf3d85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons-f73941d406d9c3fcf56582655794e007.yaml @@ -0,0 +1,58 @@ +id: select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons-f73941d406d9c3fcf56582655794e007 + +info: + name: > + Select All Categories and Taxonomies, Change Checkbox to Radio Buttons < 1.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bacc29c3-a1fc-4e75-a3e2-cd3d6aac9554?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons/" + google-query: inurl:"/wp-content/plugins/select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "select-all-categories-and-taxonomies-change-checkbox-to-radio-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sell-downloads-1db698397280ce7aca6c9daca8c7b7c7.yaml b/nuclei-templates/cve-less/plugins/sell-downloads-1db698397280ce7aca6c9daca8c7b7c7.yaml new file mode 100644 index 0000000000..4d4fcf78c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sell-downloads-1db698397280ce7aca6c9daca8c7b7c7.yaml @@ -0,0 +1,58 @@ +id: sell-downloads-1db698397280ce7aca6c9daca8c7b7c7 + +info: + name: > + Sell Downloads <= 1.0.7 - Improper Input Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f24e753e-2eb0-49a2-9fb1-68daaca12816?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sell-downloads/" + google-query: inurl:"/wp-content/plugins/sell-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sell-downloads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sell-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sell-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sell-downloads-95e1f751d91cfff872210a09f6fcaf59.yaml b/nuclei-templates/cve-less/plugins/sell-downloads-95e1f751d91cfff872210a09f6fcaf59.yaml new file mode 100644 index 0000000000..a174155695 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sell-downloads-95e1f751d91cfff872210a09f6fcaf59.yaml @@ -0,0 +1,58 @@ +id: sell-downloads-95e1f751d91cfff872210a09f6fcaf59 + +info: + name: > + Sell Downloads <= 1.0.1 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72d9efad-9afd-4d7a-a1dd-7623a9e5a7db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sell-downloads/" + google-query: inurl:"/wp-content/plugins/sell-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sell-downloads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sell-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sell-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sell-media-c56e654821bb31914422facf9fd1d9d9.yaml b/nuclei-templates/cve-less/plugins/sell-media-c56e654821bb31914422facf9fd1d9d9.yaml new file mode 100644 index 0000000000..99edae7ea7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sell-media-c56e654821bb31914422facf9fd1d9d9.yaml @@ -0,0 +1,58 @@ +id: sell-media-c56e654821bb31914422facf9fd1d9d9 + +info: + name: > + Sell Media <= 2.5.5 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da4592b6-5e84-4a89-9ade-6cc227740d32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sell-media/" + google-query: inurl:"/wp-content/plugins/sell-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sell-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sell-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sell-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sell-media-d6132019cfaa7b420b3260f07bd086fb.yaml b/nuclei-templates/cve-less/plugins/sell-media-d6132019cfaa7b420b3260f07bd086fb.yaml new file mode 100644 index 0000000000..93ea1a8f9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sell-media-d6132019cfaa7b420b3260f07bd086fb.yaml @@ -0,0 +1,58 @@ +id: sell-media-d6132019cfaa7b420b3260f07bd086fb + +info: + name: > + Sell Media <= 2.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41307a48-d49d-402f-bd3f-96b99afe6a42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sell-media/" + google-query: inurl:"/wp-content/plugins/sell-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sell-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sell-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sell-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sell-photo-655bb3b8d4438b69c94c0ae63c754913.yaml b/nuclei-templates/cve-less/plugins/sell-photo-655bb3b8d4438b69c94c0ae63c754913.yaml new file mode 100644 index 0000000000..fabf1cefdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sell-photo-655bb3b8d4438b69c94c0ae63c754913.yaml @@ -0,0 +1,58 @@ +id: sell-photo-655bb3b8d4438b69c94c0ae63c754913 + +info: + name: > + Sell Photo <= 1.0.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8223f9dd-1c2d-40bd-a17d-1bb317829d3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sell-photo/" + google-query: inurl:"/wp-content/plugins/sell-photo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sell-photo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sell-photo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sell-photo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sellkit-eb3ea92b0c5a4b0e8e1f707fd264374b.yaml b/nuclei-templates/cve-less/plugins/sellkit-eb3ea92b0c5a4b0e8e1f707fd264374b.yaml new file mode 100644 index 0000000000..c02d113008 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sellkit-eb3ea92b0c5a4b0e8e1f707fd264374b.yaml @@ -0,0 +1,58 @@ +id: sellkit-eb3ea92b0c5a4b0e8e1f707fd264374b + +info: + name: > + SellKit <= 1.8.1 - Authenticated (Subscriber+) Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21bc2595-0760-42a6-b11b-3f7609223d8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sellkit/" + google-query: inurl:"/wp-content/plugins/sellkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sellkit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sellkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sellkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sem-wysiwyg-19b57e69ca3c481c9cd19e98284be152.yaml b/nuclei-templates/cve-less/plugins/sem-wysiwyg-19b57e69ca3c481c9cd19e98284be152.yaml new file mode 100644 index 0000000000..b8e1270000 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sem-wysiwyg-19b57e69ca3c481c9cd19e98284be152.yaml @@ -0,0 +1,58 @@ +id: sem-wysiwyg-19b57e69ca3c481c9cd19e98284be152 + +info: + name: > + sem-wysiwyg <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70e29aa5-6f36-498f-ad85-f9d9ab8d9bcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sem-wysiwyg/" + google-query: inurl:"/wp-content/plugins/sem-wysiwyg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sem-wysiwyg,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sem-wysiwyg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sem-wysiwyg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sema-api-3fb8bbd93e29c77c2c10fff01c5754a2.yaml b/nuclei-templates/cve-less/plugins/sema-api-3fb8bbd93e29c77c2c10fff01c5754a2.yaml new file mode 100644 index 0000000000..0f95795246 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sema-api-3fb8bbd93e29c77c2c10fff01c5754a2.yaml @@ -0,0 +1,58 @@ +id: sema-api-3fb8bbd93e29c77c2c10fff01c5754a2 + +info: + name: > + SEMA API <= 3.64 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5183d676-eb91-4c03-8d12-c15c68839f02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sema-api/" + google-query: inurl:"/wp-content/plugins/sema-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sema-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sema-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sema-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/semalt-42f2aed82645b4c22a964230d4cf5c0e.yaml b/nuclei-templates/cve-less/plugins/semalt-42f2aed82645b4c22a964230d4cf5c0e.yaml new file mode 100644 index 0000000000..75372c1d80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/semalt-42f2aed82645b4c22a964230d4cf5c0e.yaml @@ -0,0 +1,58 @@ +id: semalt-42f2aed82645b4c22a964230d4cf5c0e + +info: + name: > + Semalt Blocker <= 1.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a658d150-bcd5-4334-b07a-e09b3995169d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/semalt/" + google-query: inurl:"/wp-content/plugins/semalt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,semalt,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/semalt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "semalt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-5c801a046ddb1fac8004d7794f007242.yaml b/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-5c801a046ddb1fac8004d7794f007242.yaml new file mode 100644 index 0000000000..2b9d4deb74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-5c801a046ddb1fac8004d7794f007242.yaml @@ -0,0 +1,58 @@ +id: send-pdf-for-contact-form-7-5c801a046ddb1fac8004d7794f007242 + +info: + name: > + Send PDF for Contact Form 7 <= 1.0.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0646fcba-afe5-49a2-acd5-e15d009926c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/send-pdf-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/send-pdf-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,send-pdf-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/send-pdf-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "send-pdf-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-9b9891b7d15de10b021b57247a686e05.yaml b/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-9b9891b7d15de10b021b57247a686e05.yaml new file mode 100644 index 0000000000..d0a45377a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-9b9891b7d15de10b021b57247a686e05.yaml @@ -0,0 +1,58 @@ +id: send-pdf-for-contact-form-7-9b9891b7d15de10b021b57247a686e05 + +info: + name: > + Send PDF for Contact Form 7 <= 0.9.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28d41721-c538-4043-a411-3234ff1074bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/send-pdf-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/send-pdf-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,send-pdf-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/send-pdf-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "send-pdf-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-fbdeefe8fdc61a2e9093fee1505ec5f9.yaml b/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-fbdeefe8fdc61a2e9093fee1505ec5f9.yaml new file mode 100644 index 0000000000..495f1a7bd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/send-pdf-for-contact-form-7-fbdeefe8fdc61a2e9093fee1505ec5f9.yaml @@ -0,0 +1,58 @@ +id: send-pdf-for-contact-form-7-fbdeefe8fdc61a2e9093fee1505ec5f9 + +info: + name: > + Send PDF for Contact Form 7 <= 0.9.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f4a939c-ba6c-4401-8139-a57e727ceb0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/send-pdf-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/send-pdf-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,send-pdf-for-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/send-pdf-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "send-pdf-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/send-prebuilt-emails-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/send-prebuilt-emails-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..95904b0573 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/send-prebuilt-emails-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: send-prebuilt-emails-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/send-prebuilt-emails/" + google-query: inurl:"/wp-content/plugins/send-prebuilt-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,send-prebuilt-emails,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/send-prebuilt-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "send-prebuilt-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/send-users-email-0f1df16e8eed1b185bf479b1f2bd0199.yaml b/nuclei-templates/cve-less/plugins/send-users-email-0f1df16e8eed1b185bf479b1f2bd0199.yaml new file mode 100644 index 0000000000..5a7bcd8446 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/send-users-email-0f1df16e8eed1b185bf479b1f2bd0199.yaml @@ -0,0 +1,58 @@ +id: send-users-email-0f1df16e8eed1b185bf479b1f2bd0199 + +info: + name: > + Send Users Email <= 1.4.3 - Sensitive Information Exposure via Error Logs + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d50e9bb-e357-42d3-b131-468511b8e98a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/send-users-email/" + google-query: inurl:"/wp-content/plugins/send-users-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,send-users-email,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/send-users-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "send-users-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sender-5aca3acdcafb2379cade4b6c2df42ece.yaml b/nuclei-templates/cve-less/plugins/sender-5aca3acdcafb2379cade4b6c2df42ece.yaml new file mode 100644 index 0000000000..fef4d46cab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sender-5aca3acdcafb2379cade4b6c2df42ece.yaml @@ -0,0 +1,58 @@ +id: sender-5aca3acdcafb2379cade4b6c2df42ece + +info: + name: > + Sender by BestWebSoft <= 1.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de957e90-5758-46f3-90f8-521b47d247ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sender/" + google-query: inurl:"/wp-content/plugins/sender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendgrid-email-delivery-simplified-526f9a50eb94365c6edf2a44fc6ceed7.yaml b/nuclei-templates/cve-less/plugins/sendgrid-email-delivery-simplified-526f9a50eb94365c6edf2a44fc6ceed7.yaml new file mode 100644 index 0000000000..aa1bf651d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendgrid-email-delivery-simplified-526f9a50eb94365c6edf2a44fc6ceed7.yaml @@ -0,0 +1,58 @@ +id: sendgrid-email-delivery-simplified-526f9a50eb94365c6edf2a44fc6ceed7 + +info: + name: > + SendGrid <= 1.11.8 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cc416cc-49a4-4752-86e7-acc52ba4f92d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendgrid-email-delivery-simplified/" + google-query: inurl:"/wp-content/plugins/sendgrid-email-delivery-simplified/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendgrid-email-delivery-simplified,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendgrid-email-delivery-simplified/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendgrid-email-delivery-simplified" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendit-85ac26fe1ed37dc881dfc2a5252c3fa6.yaml b/nuclei-templates/cve-less/plugins/sendit-85ac26fe1ed37dc881dfc2a5252c3fa6.yaml new file mode 100644 index 0000000000..79f5e19106 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendit-85ac26fe1ed37dc881dfc2a5252c3fa6.yaml @@ -0,0 +1,58 @@ +id: sendit-85ac26fe1ed37dc881dfc2a5252c3fa6 + +info: + name: > + Sendit WP Newsletter <= 2.5.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f922ea86-5876-40ce-82ee-fb2b6dbddf17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendit/" + google-query: inurl:"/wp-content/plugins/sendit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpress-2b3a10a2b0c01a20025a0d9db118f2df.yaml b/nuclei-templates/cve-less/plugins/sendpress-2b3a10a2b0c01a20025a0d9db118f2df.yaml new file mode 100644 index 0000000000..9d78d15834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpress-2b3a10a2b0c01a20025a0d9db118f2df.yaml @@ -0,0 +1,58 @@ +id: sendpress-2b3a10a2b0c01a20025a0d9db118f2df + +info: + name: > + SendPress Newsletters < 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5570b8ef-6fb9-4f9e-be39-d8c615d1abab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpress/" + google-query: inurl:"/wp-content/plugins/sendpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpress-349038bfb8ad974ae4bba5615712f5b9.yaml b/nuclei-templates/cve-less/plugins/sendpress-349038bfb8ad974ae4bba5615712f5b9.yaml new file mode 100644 index 0000000000..a58209f893 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpress-349038bfb8ad974ae4bba5615712f5b9.yaml @@ -0,0 +1,58 @@ +id: sendpress-349038bfb8ad974ae4bba5615712f5b9 + +info: + name: > + SendPress Newsletters <= 1.23.11.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f03dfbd4-b34a-46ab-b8aa-e37fb0321e8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpress/" + google-query: inurl:"/wp-content/plugins/sendpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpress-359a63479caac5270f841c962366bff8.yaml b/nuclei-templates/cve-less/plugins/sendpress-359a63479caac5270f841c962366bff8.yaml new file mode 100644 index 0000000000..3cb9ff806e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpress-359a63479caac5270f841c962366bff8.yaml @@ -0,0 +1,58 @@ +id: sendpress-359a63479caac5270f841c962366bff8 + +info: + name: > + SendPress Newsletters <= 1.22.3.31 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbce42a0-29a7-40df-973c-1fe7338f6c94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpress/" + google-query: inurl:"/wp-content/plugins/sendpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.3.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpress-446bb803ccb7ab54ba9c587af27ed178.yaml b/nuclei-templates/cve-less/plugins/sendpress-446bb803ccb7ab54ba9c587af27ed178.yaml new file mode 100644 index 0000000000..03c8b8d75f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpress-446bb803ccb7ab54ba9c587af27ed178.yaml @@ -0,0 +1,58 @@ +id: sendpress-446bb803ccb7ab54ba9c587af27ed178 + +info: + name: > + SendPress Newsletters < 1.20.7.13 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8d042be-e272-4e2d-93ec-83a0a42ecd51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpress/" + google-query: inurl:"/wp-content/plugins/sendpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.7.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpress-572ada3e2b5cfd266bbe4d55b671ea76.yaml b/nuclei-templates/cve-less/plugins/sendpress-572ada3e2b5cfd266bbe4d55b671ea76.yaml new file mode 100644 index 0000000000..e9eeb423ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpress-572ada3e2b5cfd266bbe4d55b671ea76.yaml @@ -0,0 +1,58 @@ +id: sendpress-572ada3e2b5cfd266bbe4d55b671ea76 + +info: + name: > + SendPress Newsletters <= 1.23.11.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d173077-06c4-4a23-a664-0be8516053ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpress/" + google-query: inurl:"/wp-content/plugins/sendpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpress-81e845426b35bbadfec4fa7948427e09.yaml b/nuclei-templates/cve-less/plugins/sendpress-81e845426b35bbadfec4fa7948427e09.yaml new file mode 100644 index 0000000000..595f92e33c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpress-81e845426b35bbadfec4fa7948427e09.yaml @@ -0,0 +1,58 @@ +id: sendpress-81e845426b35bbadfec4fa7948427e09 + +info: + name: > + SendPress Newsletters <= 1.23.11.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cd6e69b-f927-4cea-a838-5c73f52233a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpress/" + google-query: inurl:"/wp-content/plugins/sendpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpress-9ba240bc312b43fe5719cb9b5a56a769.yaml b/nuclei-templates/cve-less/plugins/sendpress-9ba240bc312b43fe5719cb9b5a56a769.yaml new file mode 100644 index 0000000000..8ab7517e10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpress-9ba240bc312b43fe5719cb9b5a56a769.yaml @@ -0,0 +1,58 @@ +id: sendpress-9ba240bc312b43fe5719cb9b5a56a769 + +info: + name: > + SendPress Newsletters <= 1.23.11.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb70339c-0f1a-4acc-af7a-8a0320fdfe71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpress/" + google-query: inurl:"/wp-content/plugins/sendpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpress-f386ff3f48b7d778335b6a97f6c41a43.yaml b/nuclei-templates/cve-less/plugins/sendpress-f386ff3f48b7d778335b6a97f6c41a43.yaml new file mode 100644 index 0000000000..3f04e031ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpress-f386ff3f48b7d778335b6a97f6c41a43.yaml @@ -0,0 +1,58 @@ +id: sendpress-f386ff3f48b7d778335b6a97f6c41a43 + +info: + name: > + SendPress Newsletters < 1.2 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a758fcbe-1be0-4845-9ce9-795f3e5c4bd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpress/" + google-query: inurl:"/wp-content/plugins/sendpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sendpulse-web-push-30e35a536fd4afd5cb956f988fb6ecbc.yaml b/nuclei-templates/cve-less/plugins/sendpulse-web-push-30e35a536fd4afd5cb956f988fb6ecbc.yaml new file mode 100644 index 0000000000..a261d10863 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sendpulse-web-push-30e35a536fd4afd5cb956f988fb6ecbc.yaml @@ -0,0 +1,58 @@ +id: sendpulse-web-push-30e35a536fd4afd5cb956f988fb6ecbc + +info: + name: > + SendPulse Free Web Push <= 1.3.1 - Cross-Site Request Forgery via sendpulse_config + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/654727e0-6129-47c7-94f3-10567b1a42d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sendpulse-web-push/" + google-query: inurl:"/wp-content/plugins/sendpulse-web-push/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sendpulse-web-push,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sendpulse-web-push/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sendpulse-web-push" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sensei-lms-6892cd1d0b697581c7511a564b22d2f3.yaml b/nuclei-templates/cve-less/plugins/sensei-lms-6892cd1d0b697581c7511a564b22d2f3.yaml new file mode 100644 index 0000000000..02d32c7129 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sensei-lms-6892cd1d0b697581c7511a564b22d2f3.yaml @@ -0,0 +1,58 @@ +id: sensei-lms-6892cd1d0b697581c7511a564b22d2f3 + +info: + name: > + Sensei LMS <= 4.17.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/031995fb-48c4-4f56-8b64-d66a47b2fbe9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sensei-lms/" + google-query: inurl:"/wp-content/plugins/sensei-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sensei-lms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sensei-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sensei-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sensei-lms-a7ff75affe3888f63fffbde3a81a35a3.yaml b/nuclei-templates/cve-less/plugins/sensei-lms-a7ff75affe3888f63fffbde3a81a35a3.yaml new file mode 100644 index 0000000000..ed57dbc1ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sensei-lms-a7ff75affe3888f63fffbde3a81a35a3.yaml @@ -0,0 +1,58 @@ +id: sensei-lms-a7ff75affe3888f63fffbde3a81a35a3 + +info: + name: > + Sensei LMS <= 4.5.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1520cce-4ed7-4815-9023-4a994200601a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sensei-lms/" + google-query: inurl:"/wp-content/plugins/sensei-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sensei-lms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sensei-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sensei-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sensei-lms-c6ad96281ff7d4df0c44c10217f4d0ea.yaml b/nuclei-templates/cve-less/plugins/sensei-lms-c6ad96281ff7d4df0c44c10217f4d0ea.yaml new file mode 100644 index 0000000000..a7877d8b53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sensei-lms-c6ad96281ff7d4df0c44c10217f4d0ea.yaml @@ -0,0 +1,58 @@ +id: sensei-lms-c6ad96281ff7d4df0c44c10217f4d0ea + +info: + name: > + Sensei LMS <= 4.4.3 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/989f4c4b-e0d6-4755-89ef-6cf4624f5473?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sensei-lms/" + google-query: inurl:"/wp-content/plugins/sensei-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sensei-lms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sensei-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sensei-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-301-meta-1d87fdeb396f4600b280560afe2112ee.yaml b/nuclei-templates/cve-less/plugins/seo-301-meta-1d87fdeb396f4600b280560afe2112ee.yaml new file mode 100644 index 0000000000..301a03feb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-301-meta-1d87fdeb396f4600b280560afe2112ee.yaml @@ -0,0 +1,58 @@ +id: seo-301-meta-1d87fdeb396f4600b280560afe2112ee + +info: + name: > + Seo 301 Meta <= 1.9.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3a9a836-34c1-4ef3-9cde-c7ccb3163165?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-301-meta/" + google-query: inurl:"/wp-content/plugins/seo-301-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-301-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-301-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-301-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-alert-437f4f4319341eb71e66802d9a46e647.yaml b/nuclei-templates/cve-less/plugins/seo-alert-437f4f4319341eb71e66802d9a46e647.yaml new file mode 100644 index 0000000000..1a889d0bf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-alert-437f4f4319341eb71e66802d9a46e647.yaml @@ -0,0 +1,58 @@ +id: seo-alert-437f4f4319341eb71e66802d9a46e647 + +info: + name: > + SEO ALert <= 1.5.9 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a19b102-e097-46b3-9804-71edb91b3daa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-alert/" + google-query: inurl:"/wp-content/plugins/seo-alert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-alert,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-alert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-alert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-automated-link-building-e894a6552613ace9ff7694fe7f0247a5.yaml b/nuclei-templates/cve-less/plugins/seo-automated-link-building-e894a6552613ace9ff7694fe7f0247a5.yaml new file mode 100644 index 0000000000..c8edcf8cc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-automated-link-building-e894a6552613ace9ff7694fe7f0247a5.yaml @@ -0,0 +1,58 @@ +id: seo-automated-link-building-e894a6552613ace9ff7694fe7f0247a5 + +info: + name: > + Internal Links Manager <= 2.1.0 - Multiple Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0512e478-210f-42a9-86ea-a892cd6cfcd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-automated-link-building/" + google-query: inurl:"/wp-content/plugins/seo-automated-link-building/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-automated-link-building,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-automated-link-building/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-automated-link-building" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-automatic-links-40b96ba14c189bc5294c696f541a5a2a.yaml b/nuclei-templates/cve-less/plugins/seo-automatic-links-40b96ba14c189bc5294c696f541a5a2a.yaml new file mode 100644 index 0000000000..f6bb294a26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-automatic-links-40b96ba14c189bc5294c696f541a5a2a.yaml @@ -0,0 +1,58 @@ +id: seo-automatic-links-40b96ba14c189bc5294c696f541a5a2a + +info: + name: > + SEO Smart Links <= 3.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a677eed-0344-457e-aa5f-3b94a624462c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-automatic-links/" + google-query: inurl:"/wp-content/plugins/seo-automatic-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-automatic-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-automatic-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-automatic-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-automatic-wp-core-tweaks-ed27c4cd836ec804d97b971161525852.yaml b/nuclei-templates/cve-less/plugins/seo-automatic-wp-core-tweaks-ed27c4cd836ec804d97b971161525852.yaml new file mode 100644 index 0000000000..3bb2c7e4bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-automatic-wp-core-tweaks-ed27c4cd836ec804d97b971161525852.yaml @@ -0,0 +1,58 @@ +id: seo-automatic-wp-core-tweaks-ed27c4cd836ec804d97b971161525852 + +info: + name: > + Core Tweaks WP Setup <= 4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15681d8b-df7b-48c5-bba8-658baf9b9bf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-automatic-wp-core-tweaks/" + google-query: inurl:"/wp-content/plugins/seo-automatic-wp-core-tweaks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-automatic-wp-core-tweaks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-automatic-wp-core-tweaks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-automatic-wp-core-tweaks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-backlink-monitor-a957dbe1122815a4d921b97d5fcd30d4.yaml b/nuclei-templates/cve-less/plugins/seo-backlink-monitor-a957dbe1122815a4d921b97d5fcd30d4.yaml new file mode 100644 index 0000000000..175b1cc193 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-backlink-monitor-a957dbe1122815a4d921b97d5fcd30d4.yaml @@ -0,0 +1,58 @@ +id: seo-backlink-monitor-a957dbe1122815a4d921b97d5fcd30d4 + +info: + name: > + SEO Backlink Monitor <= 1.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97f16bad-f0ad-44cc-bb07-04ce33d0cdf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-backlink-monitor/" + google-query: inurl:"/wp-content/plugins/seo-backlink-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-backlink-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-backlink-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-backlink-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-backlinks-896998a582295bc584998dec0e35768b.yaml b/nuclei-templates/cve-less/plugins/seo-backlinks-896998a582295bc584998dec0e35768b.yaml new file mode 100644 index 0000000000..94aa84441c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-backlinks-896998a582295bc584998dec0e35768b.yaml @@ -0,0 +1,58 @@ +id: seo-backlinks-896998a582295bc584998dec0e35768b + +info: + name: > + SEO Backlinks <= 4.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69ffb5fb-16f5-4ef8-81c5-b119da859488?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-backlinks/" + google-query: inurl:"/wp-content/plugins/seo-backlinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-backlinks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-backlinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-backlinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-booster-9732cad9519d7ec0a87d22f95e1da009.yaml b/nuclei-templates/cve-less/plugins/seo-booster-9732cad9519d7ec0a87d22f95e1da009.yaml new file mode 100644 index 0000000000..ee4dc575a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-booster-9732cad9519d7ec0a87d22f95e1da009.yaml @@ -0,0 +1,58 @@ +id: seo-booster-9732cad9519d7ec0a87d22f95e1da009 + +info: + name: > + SEO Booster <= 3.8.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a87c261-5452-48c9-ab4a-2cf6af0fef56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-booster/" + google-query: inurl:"/wp-content/plugins/seo-booster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-booster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-booster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-booster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-booster-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/seo-booster-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..54ad0ab9ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-booster-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: seo-booster-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-booster/" + google-query: inurl:"/wp-content/plugins/seo-booster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-booster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-booster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-booster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-booster-cc60724a02e2069155463638fe585163.yaml b/nuclei-templates/cve-less/plugins/seo-booster-cc60724a02e2069155463638fe585163.yaml new file mode 100644 index 0000000000..210b50da36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-booster-cc60724a02e2069155463638fe585163.yaml @@ -0,0 +1,58 @@ +id: seo-booster-cc60724a02e2069155463638fe585163 + +info: + name: > + SEO Booster <= 3.7 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7adba0a-2f3b-43d8-b00a-8521dd0c6a2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-booster/" + google-query: inurl:"/wp-content/plugins/seo-booster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-booster,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-booster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-booster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-10web-70a47ff6f5488e7468e76cf5273bfb81.yaml b/nuclei-templates/cve-less/plugins/seo-by-10web-70a47ff6f5488e7468e76cf5273bfb81.yaml new file mode 100644 index 0000000000..a224134de9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-10web-70a47ff6f5488e7468e76cf5273bfb81.yaml @@ -0,0 +1,58 @@ +id: seo-by-10web-70a47ff6f5488e7468e76cf5273bfb81 + +info: + name: > + SEO By 10Web <= 1.2.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a850176-973c-49aa-a420-e379223b6dc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-10web/" + google-query: inurl:"/wp-content/plugins/seo-by-10web/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-10web,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-10web/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-10web" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-10web-fcebd70d7bd0fae30a9aee2fa4de1dca.yaml b/nuclei-templates/cve-less/plugins/seo-by-10web-fcebd70d7bd0fae30a9aee2fa4de1dca.yaml new file mode 100644 index 0000000000..533826f708 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-10web-fcebd70d7bd0fae30a9aee2fa4de1dca.yaml @@ -0,0 +1,58 @@ +id: seo-by-10web-fcebd70d7bd0fae30a9aee2fa4de1dca + +info: + name: > + Seo By 10Web <= 1.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4533554-52e4-44b4-9230-b6e3feb2e4a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-10web/" + google-query: inurl:"/wp-content/plugins/seo-by-10web/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-10web,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-10web/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-10web" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-0412effdb25dc1c079b5ac901ba8eb41.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-0412effdb25dc1c079b5ac901ba8eb41.yaml new file mode 100644 index 0000000000..15d90a5be5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-0412effdb25dc1c079b5ac901ba8eb41.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-0412effdb25dc1c079b5ac901ba8eb41 + +info: + name: > + Rank Math SEO with AI SEO Tools <= 1.0.214 - Authenticated(Contributor+) Stored Cross-Site Scripting via HowTo block attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81a82caf-4013-42c4-ad63-4e13bfa4322f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.214') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-10c02e3884689b63f9593289046d6bbb.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-10c02e3884689b63f9593289046d6bbb.yaml new file mode 100644 index 0000000000..8b773dcb3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-10c02e3884689b63f9593289046d6bbb.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-10c02e3884689b63f9593289046d6bbb + +info: + name: > + Rank Math SEO <= 1.0.42.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/138e0a38-c922-44d1-9fe6-2439ec32cf39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.42.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-149aa3cdb8f6dba02a1015d8c51445b9.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-149aa3cdb8f6dba02a1015d8c51445b9.yaml new file mode 100644 index 0000000000..e3c30d2bb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-149aa3cdb8f6dba02a1015d8c51445b9.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-149aa3cdb8f6dba02a1015d8c51445b9 + +info: + name: > + Rank Math SEO with AI SEO Tools <= 1.0.216 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'titleWrapper' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21341d9c-9f04-4bc6-b9fc-6fa8afd3cf5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.216') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-29a6c7e2607d1c0248462dad6e8d2dae.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-29a6c7e2607d1c0248462dad6e8d2dae.yaml new file mode 100644 index 0000000000..2710868ebe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-29a6c7e2607d1c0248462dad6e8d2dae.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-29a6c7e2607d1c0248462dad6e8d2dae + +info: + name: > + Rank Math SEO <= 1.0.40.2 - Redirect Creation via Unprotected REST API Endpoint + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80dfc293-a182-4ed5-9127-6ec788312416?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-3cd75b090f3018ee840ae18474ab15b1.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-3cd75b090f3018ee840ae18474ab15b1.yaml new file mode 100644 index 0000000000..fd34c7aeff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-3cd75b090f3018ee840ae18474ab15b1.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-3cd75b090f3018ee840ae18474ab15b1 + +info: + name: > + Rank Math SEO with AI Best SEO Tools <= 1.0.217 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96eba67c-58e7-4eea-84d4-9b3bb275b42d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.217') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-424aba97fb32ef1aa4a45220d2d79ae0.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-424aba97fb32ef1aa4a45220d2d79ae0.yaml new file mode 100644 index 0000000000..6856bbbeb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-424aba97fb32ef1aa4a45220d2d79ae0.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-424aba97fb32ef1aa4a45220d2d79ae0 + +info: + name: > + Rank Math SEO <= 1.0.27 - Authenticated Settings Reset via reset-cmb Parameter + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1be68c82-c22c-4d45-8c7f-a7aa21fe3ddf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.27.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-4309b7c0188a30115c93b002a27055be.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-4309b7c0188a30115c93b002a27055be.yaml new file mode 100644 index 0000000000..d88168eea5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-4309b7c0188a30115c93b002a27055be.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-4309b7c0188a30115c93b002a27055be + +info: + name: > + Rank Math SEO <= 1.0.95 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17f8e2a0-b23f-4706-8438-7a6573a29933?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-4aca4e8ed2773f54fe21e7e09f146650.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-4aca4e8ed2773f54fe21e7e09f146650.yaml new file mode 100644 index 0000000000..708d25d190 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-4aca4e8ed2773f54fe21e7e09f146650.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-4aca4e8ed2773f54fe21e7e09f146650 + +info: + name: > + Rank Math SEO <= 1.0.40.2 - Privilege Escalation via Unprotected REST API Endpoint + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba1a25e9-bac3-4f76-8324-3035be94da4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-50ad7e6a87a7ec0f76525597202c2f2f.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-50ad7e6a87a7ec0f76525597202c2f2f.yaml new file mode 100644 index 0000000000..0c037f3f0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-50ad7e6a87a7ec0f76525597202c2f2f.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-50ad7e6a87a7ec0f76525597202c2f2f + +info: + name: > + Rank Math SEO <= 1.0.119 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9117c46b-33cc-41f5-98e9-4dac8d6352d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.119.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-786eb02bbb9c78c1c09fd80a45e23bb1.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-786eb02bbb9c78c1c09fd80a45e23bb1.yaml new file mode 100644 index 0000000000..5ea91b1ba4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-786eb02bbb9c78c1c09fd80a45e23bb1.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-786eb02bbb9c78c1c09fd80a45e23bb1 + +info: + name: > + Rank Math SEO <= 1.0.26 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ed98565-3f86-46c0-a696-13d678f2d523?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-f745637cf5ff648ecffd79a7f071d200.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-f745637cf5ff648ecffd79a7f071d200.yaml new file mode 100644 index 0000000000..b467a9f113 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-f745637cf5ff648ecffd79a7f071d200.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-f745637cf5ff648ecffd79a7f071d200 + +info: + name: > + RankMath SEO <= 1.0.107.2 - Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f8634d1-9201-4af5-9e06-c28ffcb51046?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.107.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-by-rank-math-pro-8be746d8d4f7199896166d7de62beb9e.yaml b/nuclei-templates/cve-less/plugins/seo-by-rank-math-pro-8be746d8d4f7199896166d7de62beb9e.yaml new file mode 100644 index 0000000000..3a38bc37d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-by-rank-math-pro-8be746d8d4f7199896166d7de62beb9e.yaml @@ -0,0 +1,58 @@ +id: seo-by-rank-math-pro-8be746d8d4f7199896166d7de62beb9e + +info: + name: > + Rank Math SEO PRO <= 3.0.35 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4ec9001-c4aa-4db3-b7d7-29afa243f78a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-by-rank-math-pro/" + google-query: inurl:"/wp-content/plugins/seo-by-rank-math-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-by-rank-math-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-by-rank-math-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-by-rank-math-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-change-monitor-b91a2480651782f3bb16ba3659354dba.yaml b/nuclei-templates/cve-less/plugins/seo-change-monitor-b91a2480651782f3bb16ba3659354dba.yaml new file mode 100644 index 0000000000..4d8c247acb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-change-monitor-b91a2480651782f3bb16ba3659354dba.yaml @@ -0,0 +1,58 @@ +id: seo-change-monitor-b91a2480651782f3bb16ba3659354dba + +info: + name: > + SEO Change Monitor <= 1.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4f19302-70a5-4132-b841-fba1dd86a0d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-change-monitor/" + google-query: inurl:"/wp-content/plugins/seo-change-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-change-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-change-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-change-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-checklist-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/seo-checklist-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..183223e3b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-checklist-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: seo-checklist-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-checklist/" + google-query: inurl:"/wp-content/plugins/seo-checklist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-checklist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-checklist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-checklist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-dashboard-by-gutewebsites-de-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/seo-dashboard-by-gutewebsites-de-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..425163f402 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-dashboard-by-gutewebsites-de-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: seo-dashboard-by-gutewebsites-de-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-dashboard-by-gutewebsites-de/" + google-query: inurl:"/wp-content/plugins/seo-dashboard-by-gutewebsites-de/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-dashboard-by-gutewebsites-de,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-dashboard-by-gutewebsites-de/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-dashboard-by-gutewebsites-de" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-for-woocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/seo-for-woocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..40a215984a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-for-woocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: seo-for-woocommerce-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/seo-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-image-78fd1adecba808ca03a48398d3c13c9f.yaml b/nuclei-templates/cve-less/plugins/seo-image-78fd1adecba808ca03a48398d3c13c9f.yaml new file mode 100644 index 0000000000..fe46903748 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-image-78fd1adecba808ca03a48398d3c13c9f.yaml @@ -0,0 +1,58 @@ +id: seo-image-78fd1adecba808ca03a48398d3c13c9f + +info: + name: > + SEO Friendly Images <= 3.0.4 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d3e333-4dcd-414b-85a6-8d9fbef357bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-image/" + google-query: inurl:"/wp-content/plugins/seo-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-local-rank-2ef18c0d57d1cdd92f75ace88711d88f.yaml b/nuclei-templates/cve-less/plugins/seo-local-rank-2ef18c0d57d1cdd92f75ace88711d88f.yaml new file mode 100644 index 0000000000..784cb66b6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-local-rank-2ef18c0d57d1cdd92f75ace88711d88f.yaml @@ -0,0 +1,58 @@ +id: seo-local-rank-2ef18c0d57d1cdd92f75ace88711d88f + +info: + name: > + True Ranker <= 2.2.2 - Directory Traversal/Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ce8ed18-2164-4b5a-b1d3-fda8d348ebf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-local-rank/" + google-query: inurl:"/wp-content/plugins/seo-local-rank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-local-rank,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-local-rank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-local-rank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-rank-reporter-c8630bcb4ab2b5cd9e6ea3a337451d8d.yaml b/nuclei-templates/cve-less/plugins/seo-rank-reporter-c8630bcb4ab2b5cd9e6ea3a337451d8d.yaml new file mode 100644 index 0000000000..73ee30badd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-rank-reporter-c8630bcb4ab2b5cd9e6ea3a337451d8d.yaml @@ -0,0 +1,58 @@ +id: seo-rank-reporter-c8630bcb4ab2b5cd9e6ea3a337451d8d + +info: + name: > + SEO Rank Reporter <= 2.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f2371df-8ee0-4a26-a33d-337c129dc7d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-rank-reporter/" + google-query: inurl:"/wp-content/plugins/seo-rank-reporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-rank-reporter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-rank-reporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-rank-reporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-1f2d414ddc2a277c0bf1caa864fd45b1.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-1f2d414ddc2a277c0bf1caa864fd45b1.yaml new file mode 100644 index 0000000000..20e84a2703 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-1f2d414ddc2a277c0bf1caa864fd45b1.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-1f2d414ddc2a277c0bf1caa864fd45b1 + +info: + name: > + SEO Redirection Plugin - 301 Redirect Manager <= 6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d88433a-dff4-4524-9b1a-1ef929568a52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-73f794bdb6d5d5ebc6d4220191ef5dda.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-73f794bdb6d5d5ebc6d4220191ef5dda.yaml new file mode 100644 index 0000000000..c558dcb63b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-73f794bdb6d5d5ebc6d4220191ef5dda.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-73f794bdb6d5d5ebc6d4220191ef5dda + +info: + name: > + SEO Redirection Plugin – 301 Redirect Manager <= 8.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6985e92d-0e7c-409c-a4ab-1edbadad3715?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-81580e623be1bd11eb139b9bedb99985.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-81580e623be1bd11eb139b9bedb99985.yaml new file mode 100644 index 0000000000..8e7b660e35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-81580e623be1bd11eb139b9bedb99985.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-81580e623be1bd11eb139b9bedb99985 + +info: + name: > + SEO Redirection <= 8.1 - Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20033eb0-512f-48ea-8ef7-e22701a2c5d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-82c66bd49c9670a47844ee08f2e1dfec.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-82c66bd49c9670a47844ee08f2e1dfec.yaml new file mode 100644 index 0000000000..f4c0f4c1f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-82c66bd49c9670a47844ee08f2e1dfec.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-82c66bd49c9670a47844ee08f2e1dfec + +info: + name: > + SEO Redirection <= 6.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29d962c0-31dc-4320-a9ce-3ed71d4f9943?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-b37230941774d99792032d2914c74bb5.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-b37230941774d99792032d2914c74bb5.yaml new file mode 100644 index 0000000000..f4047d02a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-b37230941774d99792032d2914c74bb5.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-b37230941774d99792032d2914c74bb5 + +info: + name: > + SEO Redirection Plugin – 301 Redirect Manager <= 7.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b13f1fb2-5dbc-4d7d-b4cc-b6dc6804531a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-d80bb287fb3b361c731e4fbb1c1ed49d.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-d80bb287fb3b361c731e4fbb1c1ed49d.yaml new file mode 100644 index 0000000000..034068dd43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-d80bb287fb3b361c731e4fbb1c1ed49d.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-d80bb287fb3b361c731e4fbb1c1ed49d + +info: + name: > + SEO Redirection Plugin – 301 Redirect Manager <= 7.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9de09daa-a3e0-4563-bdc9-79cb5e4b039b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-da0195abc3fd621c83febd2fb7f0bcc9.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-da0195abc3fd621c83febd2fb7f0bcc9.yaml new file mode 100644 index 0000000000..b0803ffab1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-da0195abc3fd621c83febd2fb7f0bcc9.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-da0195abc3fd621c83febd2fb7f0bcc9 + +info: + name: > + SEO Redirection <= 4.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11ad65cd-941f-4605-8b69-59146b2d59db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-ea58f8019f8858d1a6e5612496c6cdb0.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-ea58f8019f8858d1a6e5612496c6cdb0.yaml new file mode 100644 index 0000000000..b861391382 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-ea58f8019f8858d1a6e5612496c6cdb0.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-ea58f8019f8858d1a6e5612496c6cdb0 + +info: + name: > + SEO Redirection Plugin <= 8.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48069ad5-0779-444b-8215-d1f08b493108?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-redirection-f06f3a35df3df0c40ee23bf235a7efbb.yaml b/nuclei-templates/cve-less/plugins/seo-redirection-f06f3a35df3df0c40ee23bf235a7efbb.yaml new file mode 100644 index 0000000000..2f01aa6340 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-redirection-f06f3a35df3df0c40ee23bf235a7efbb.yaml @@ -0,0 +1,58 @@ +id: seo-redirection-f06f3a35df3df0c40ee23bf235a7efbb + +info: + name: > + SEO Redirection <= 2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ca83efe-298c-4ce9-a726-dbe76607aebf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-redirection/" + google-query: inurl:"/wp-content/plugins/seo-redirection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-redirection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-redirection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-redirection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-site-auditor-agency-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/seo-site-auditor-agency-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..fc163093d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-site-auditor-agency-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: seo-site-auditor-agency-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-site-auditor-agency/" + google-query: inurl:"/wp-content/plugins/seo-site-auditor-agency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-site-auditor-agency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-site-auditor-agency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-site-auditor-agency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-slider-afa388cb5079dcd3f29d050e7cf600e7.yaml b/nuclei-templates/cve-less/plugins/seo-slider-afa388cb5079dcd3f29d050e7cf600e7.yaml new file mode 100644 index 0000000000..a53c0304ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-slider-afa388cb5079dcd3f29d050e7cf600e7.yaml @@ -0,0 +1,58 @@ +id: seo-slider-afa388cb5079dcd3f29d050e7cf600e7 + +info: + name: > + SEO Slider <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32bc88a7-93ed-4d67-9383-b6d935a0df4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-slider/" + google-query: inurl:"/wp-content/plugins/seo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-title-tag-f5e5ea8fe0a79e328718fc83043de80f.yaml b/nuclei-templates/cve-less/plugins/seo-title-tag-f5e5ea8fe0a79e328718fc83043de80f.yaml new file mode 100644 index 0000000000..34d2790485 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-title-tag-f5e5ea8fe0a79e328718fc83043de80f.yaml @@ -0,0 +1,58 @@ +id: seo-title-tag-f5e5ea8fe0a79e328718fc83043de80f + +info: + name: > + SEO Title Tag <= 3.5.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9c9f8db-26e4-4f79-88a3-9be1f5772ebe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-title-tag/" + google-query: inurl:"/wp-content/plugins/seo-title-tag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-title-tag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-title-tag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-title-tag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-watcher-4a70a1d91b23564dea1f6826c9041806.yaml b/nuclei-templates/cve-less/plugins/seo-watcher-4a70a1d91b23564dea1f6826c9041806.yaml new file mode 100644 index 0000000000..343b17d76e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-watcher-4a70a1d91b23564dea1f6826c9041806.yaml @@ -0,0 +1,58 @@ +id: seo-watcher-4a70a1d91b23564dea1f6826c9041806 + +info: + name: > + SEO Watcher <= 1.3.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eec34b6a-aae7-4267-accd-96ebc6b71dd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-watcher/" + google-query: inurl:"/wp-content/plugins/seo-watcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-watcher,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-watcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-watcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seo-wizard-c65adcc35ac4040261ad16030af10bc8.yaml b/nuclei-templates/cve-less/plugins/seo-wizard-c65adcc35ac4040261ad16030af10bc8.yaml new file mode 100644 index 0000000000..fe179c3d95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seo-wizard-c65adcc35ac4040261ad16030af10bc8.yaml @@ -0,0 +1,58 @@ +id: seo-wizard-c65adcc35ac4040261ad16030af10bc8 + +info: + name: > + SEO <= 4.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eec21717-dffa-40c0-90c0-007b568609cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seo-wizard/" + google-query: inurl:"/wp-content/plugins/seo-wizard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seo-wizard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seo-wizard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seo-wizard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seolinkrotator-99d9f69262b565cb98ac9182ded6ba39.yaml b/nuclei-templates/cve-less/plugins/seolinkrotator-99d9f69262b565cb98ac9182ded6ba39.yaml new file mode 100644 index 0000000000..efa911d1a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seolinkrotator-99d9f69262b565cb98ac9182ded6ba39.yaml @@ -0,0 +1,58 @@ +id: seolinkrotator-99d9f69262b565cb98ac9182ded6ba39 + +info: + name: > + SEO Link Rotator <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f6fa9c6-8a2b-49ca-ad7f-3aa51d671422?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seolinkrotator/" + google-query: inurl:"/wp-content/plugins/seolinkrotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seolinkrotator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seolinkrotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seolinkrotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seos-contact-form-54eacca3ec158df026692c600567e01e.yaml b/nuclei-templates/cve-less/plugins/seos-contact-form-54eacca3ec158df026692c600567e01e.yaml new file mode 100644 index 0000000000..38f9f96dd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seos-contact-form-54eacca3ec158df026692c600567e01e.yaml @@ -0,0 +1,58 @@ +id: seos-contact-form-54eacca3ec158df026692c600567e01e + +info: + name: > + Seos Contact Form <= 1.8.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62b2113a-70a2-4223-8c6c-6cd15057d72d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seos-contact-form/" + google-query: inurl:"/wp-content/plugins/seos-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seos-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seos-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seos-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seosamba-webmasters-2163947a7faebedb99b02ea382f621f0.yaml b/nuclei-templates/cve-less/plugins/seosamba-webmasters-2163947a7faebedb99b02ea382f621f0.yaml new file mode 100644 index 0000000000..5b1ed492d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seosamba-webmasters-2163947a7faebedb99b02ea382f621f0.yaml @@ -0,0 +1,58 @@ +id: seosamba-webmasters-2163947a7faebedb99b02ea382f621f0 + +info: + name: > + SeoSamba for WordPress Webmasters <= 1.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b0140f2-ceaa-4589-b1ad-1daa244aa3cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seosamba-webmasters/" + google-query: inurl:"/wp-content/plugins/seosamba-webmasters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seosamba-webmasters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seosamba-webmasters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seosamba-webmasters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sequential-order-numbers-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/sequential-order-numbers-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..252ea566ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sequential-order-numbers-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: sequential-order-numbers-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sequential-order-numbers-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/sequential-order-numbers-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sequential-order-numbers-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sequential-order-numbers-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sequential-order-numbers-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seraphinite-accelerator-2677f82c6e08d61546678037c73f3707.yaml b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-2677f82c6e08d61546678037c73f3707.yaml new file mode 100644 index 0000000000..373d0ccdcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-2677f82c6e08d61546678037c73f3707.yaml @@ -0,0 +1,58 @@ +id: seraphinite-accelerator-2677f82c6e08d61546678037c73f3707 + +info: + name: > + Seraphinite Accelerator <= 2.20.47 - Unauthenticated Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5991df2-1aab-4d07-9e30-1257aa9ec884?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seraphinite-accelerator/" + google-query: inurl:"/wp-content/plugins/seraphinite-accelerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seraphinite-accelerator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seraphinite-accelerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seraphinite-accelerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.47') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seraphinite-accelerator-4bb5304c273d308af87d9ef184195800.yaml b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-4bb5304c273d308af87d9ef184195800.yaml new file mode 100644 index 0000000000..dc1cd1a96a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-4bb5304c273d308af87d9ef184195800.yaml @@ -0,0 +1,58 @@ +id: seraphinite-accelerator-4bb5304c273d308af87d9ef184195800 + +info: + name: > + Seraphinite Accelerator (Base, cache only) <= 2.20.31 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b32fdc-b73f-48e5-88bf-e836ec2f791f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seraphinite-accelerator/" + google-query: inurl:"/wp-content/plugins/seraphinite-accelerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seraphinite-accelerator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seraphinite-accelerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seraphinite-accelerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seraphinite-accelerator-68b6ddf8373e9922e3759838ef90fc9f.yaml b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-68b6ddf8373e9922e3759838ef90fc9f.yaml new file mode 100644 index 0000000000..c3c0e6e6c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-68b6ddf8373e9922e3759838ef90fc9f.yaml @@ -0,0 +1,58 @@ +id: seraphinite-accelerator-68b6ddf8373e9922e3759838ef90fc9f + +info: + name: > + Seraphinite Accelerator <= 2.20.28 - Reflected Cross-Site Scripting via 'rt' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dc90b13-2f36-45bc-991c-f1927ae9253d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seraphinite-accelerator/" + google-query: inurl:"/wp-content/plugins/seraphinite-accelerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seraphinite-accelerator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seraphinite-accelerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seraphinite-accelerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seraphinite-accelerator-c1c389ad46f0bb17d071702dede0897b.yaml b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-c1c389ad46f0bb17d071702dede0897b.yaml new file mode 100644 index 0000000000..e3505f2a2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-c1c389ad46f0bb17d071702dede0897b.yaml @@ -0,0 +1,58 @@ +id: seraphinite-accelerator-c1c389ad46f0bb17d071702dede0897b + +info: + name: > + Seraphinite Accelerator <= 2.20.28 - Arbitrary Redirect via 'redir' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d6dd532-008b-4ce9-beca-baf5b3678a0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seraphinite-accelerator/" + google-query: inurl:"/wp-content/plugins/seraphinite-accelerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seraphinite-accelerator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seraphinite-accelerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seraphinite-accelerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seraphinite-accelerator-d2de41ee5b97d7c9433fd01d3f1c9751.yaml b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-d2de41ee5b97d7c9433fd01d3f1c9751.yaml new file mode 100644 index 0000000000..f98616d18e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-d2de41ee5b97d7c9433fd01d3f1c9751.yaml @@ -0,0 +1,58 @@ +id: seraphinite-accelerator-d2de41ee5b97d7c9433fd01d3f1c9751 + +info: + name: > + Seraphinite Accelerator <= 2.20.52 - Authenticated (Subscriber+) Server-Side Request Forgery in OnAdminApi_HtmlCheck + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07287a85-df00-408a-8b02-978fd3116155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seraphinite-accelerator/" + google-query: inurl:"/wp-content/plugins/seraphinite-accelerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seraphinite-accelerator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seraphinite-accelerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seraphinite-accelerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seraphinite-accelerator-dab17f74e7c510ebeda6e16b5ea6519f.yaml b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-dab17f74e7c510ebeda6e16b5ea6519f.yaml new file mode 100644 index 0000000000..7723ac73ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seraphinite-accelerator-dab17f74e7c510ebeda6e16b5ea6519f.yaml @@ -0,0 +1,58 @@ +id: seraphinite-accelerator-dab17f74e7c510ebeda6e16b5ea6519f + +info: + name: > + Seraphinite Accelerator <= 2.20.28 - Reflected Cross-Site Scripting via rt + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53356d15-8db0-4015-addf-9bf66446e81f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seraphinite-accelerator/" + google-query: inurl:"/wp-content/plugins/seraphinite-accelerator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seraphinite-accelerator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seraphinite-accelerator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seraphinite-accelerator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seraphinite-old-slugs-mgr-91fa5c3d290e5cca3440a17eaa19829e.yaml b/nuclei-templates/cve-less/plugins/seraphinite-old-slugs-mgr-91fa5c3d290e5cca3440a17eaa19829e.yaml new file mode 100644 index 0000000000..6e1a4c4faa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seraphinite-old-slugs-mgr-91fa5c3d290e5cca3440a17eaa19829e.yaml @@ -0,0 +1,58 @@ +id: seraphinite-old-slugs-mgr-91fa5c3d290e5cca3440a17eaa19829e + +info: + name: > + Seraphinite Alternative Slugs Manager <= 1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66377ee2-cc87-4cfe-a4e4-cef4459bf2ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seraphinite-old-slugs-mgr/" + google-query: inurl:"/wp-content/plugins/seraphinite-old-slugs-mgr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seraphinite-old-slugs-mgr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seraphinite-old-slugs-mgr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seraphinite-old-slugs-mgr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seraphinite-post-docx-source-ca69de4894a78d151874e42160f8d4e3.yaml b/nuclei-templates/cve-less/plugins/seraphinite-post-docx-source-ca69de4894a78d151874e42160f8d4e3.yaml new file mode 100644 index 0000000000..4146646809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seraphinite-post-docx-source-ca69de4894a78d151874e42160f8d4e3.yaml @@ -0,0 +1,58 @@ +id: seraphinite-post-docx-source-ca69de4894a78d151874e42160f8d4e3 + +info: + name: > + Seraphinite Post .DOCX Source <= 2.16.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfcc2ab2-504d-4151-9435-618e317ce95c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seraphinite-post-docx-source/" + google-query: inurl:"/wp-content/plugins/seraphinite-post-docx-source/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seraphinite-post-docx-source,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seraphinite-post-docx-source/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seraphinite-post-docx-source" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/serial-codes-generator-and-validator-0bd471365f33bde2fc9b3cf18367b907.yaml b/nuclei-templates/cve-less/plugins/serial-codes-generator-and-validator-0bd471365f33bde2fc9b3cf18367b907.yaml new file mode 100644 index 0000000000..f0301680d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/serial-codes-generator-and-validator-0bd471365f33bde2fc9b3cf18367b907.yaml @@ -0,0 +1,58 @@ +id: serial-codes-generator-and-validator-0bd471365f33bde2fc9b3cf18367b907 + +info: + name: > + Serial Codes Generator and Validator with WooCommerce Support <= 2.4.14 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4886822-3a05-45b3-ad1d-4d4a4f921817?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/serial-codes-generator-and-validator/" + google-query: inurl:"/wp-content/plugins/serial-codes-generator-and-validator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,serial-codes-generator-and-validator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/serial-codes-generator-and-validator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "serial-codes-generator-and-validator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-483e7e9040acb4dde997f1c7e60efa41.yaml b/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-483e7e9040acb4dde997f1c7e60efa41.yaml new file mode 100644 index 0000000000..e24032b6db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-483e7e9040acb4dde997f1c7e60efa41.yaml @@ -0,0 +1,58 @@ +id: seriously-simple-podcasting-483e7e9040acb4dde997f1c7e60efa41 + +info: + name: > + Seriously Simple Podcasting <= 3.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eba81d49-7af5-4031-aa0e-43c2fa61cd38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seriously-simple-podcasting/" + google-query: inurl:"/wp-content/plugins/seriously-simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seriously-simple-podcasting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seriously-simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seriously-simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-7d9695bdca873940197ea6a55e88c78a.yaml b/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-7d9695bdca873940197ea6a55e88c78a.yaml new file mode 100644 index 0000000000..01c0ece934 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-7d9695bdca873940197ea6a55e88c78a.yaml @@ -0,0 +1,58 @@ +id: seriously-simple-podcasting-7d9695bdca873940197ea6a55e88c78a + +info: + name: > + Seriously Simple Podcasting <= 2.19.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b40a40d1-d12f-4fe6-b155-83a1f1a5a494?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seriously-simple-podcasting/" + google-query: inurl:"/wp-content/plugins/seriously-simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seriously-simple-podcasting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seriously-simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seriously-simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.19.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-bd3f97a6db76b6dcae059be482b558f5.yaml b/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-bd3f97a6db76b6dcae059be482b558f5.yaml new file mode 100644 index 0000000000..ba8019d6bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-bd3f97a6db76b6dcae059be482b558f5.yaml @@ -0,0 +1,58 @@ +id: seriously-simple-podcasting-bd3f97a6db76b6dcae059be482b558f5 + +info: + name: > + Seriously Simple Podcasting <= 2.16.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f02945e0-6214-46c4-ada8-49e8161d2ce4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seriously-simple-podcasting/" + google-query: inurl:"/wp-content/plugins/seriously-simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seriously-simple-podcasting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seriously-simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seriously-simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-d610c8cf7006865b0eb76d0efb43ad21.yaml b/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-d610c8cf7006865b0eb76d0efb43ad21.yaml new file mode 100644 index 0000000000..045919aa20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seriously-simple-podcasting-d610c8cf7006865b0eb76d0efb43ad21.yaml @@ -0,0 +1,58 @@ +id: seriously-simple-podcasting-d610c8cf7006865b0eb76d0efb43ad21 + +info: + name: > + Seriously Simple Podcasting <= 2.25.3 - Unauthenticated Email Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5268485f-d912-4c2d-a0ad-aabb69f9c98c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seriously-simple-podcasting/" + google-query: inurl:"/wp-content/plugins/seriously-simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seriously-simple-podcasting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seriously-simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seriously-simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.25.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seriously-simple-stats-80f967b027a6da96dccfd0c385ae1ac0.yaml b/nuclei-templates/cve-less/plugins/seriously-simple-stats-80f967b027a6da96dccfd0c385ae1ac0.yaml new file mode 100644 index 0000000000..150480777b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seriously-simple-stats-80f967b027a6da96dccfd0c385ae1ac0.yaml @@ -0,0 +1,58 @@ +id: seriously-simple-stats-80f967b027a6da96dccfd0c385ae1ac0 + +info: + name: > + Seriously Simple Stats <= 1.5.0 - Authenticated (Podcast manager+) SQL Injection via order_by + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46150f65-e662-4539-ae99-eaee297a2608?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seriously-simple-stats/" + google-query: inurl:"/wp-content/plugins/seriously-simple-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seriously-simple-stats,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seriously-simple-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seriously-simple-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seriously-simple-stats-c2e5ca7c3943870cf107630ce8a7ec83.yaml b/nuclei-templates/cve-less/plugins/seriously-simple-stats-c2e5ca7c3943870cf107630ce8a7ec83.yaml new file mode 100644 index 0000000000..0d677f2efc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seriously-simple-stats-c2e5ca7c3943870cf107630ce8a7ec83.yaml @@ -0,0 +1,58 @@ +id: seriously-simple-stats-c2e5ca7c3943870cf107630ce8a7ec83 + +info: + name: > + Seriously Simple Stats <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92734acf-2021-4217-8cdd-a9d269198db3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seriously-simple-stats/" + google-query: inurl:"/wp-content/plugins/seriously-simple-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seriously-simple-stats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seriously-simple-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seriously-simple-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sermon-browser-63d4ee9917fcafc47225c3c77377bf2f.yaml b/nuclei-templates/cve-less/plugins/sermon-browser-63d4ee9917fcafc47225c3c77377bf2f.yaml new file mode 100644 index 0000000000..9fd8b723bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sermon-browser-63d4ee9917fcafc47225c3c77377bf2f.yaml @@ -0,0 +1,58 @@ +id: sermon-browser-63d4ee9917fcafc47225c3c77377bf2f + +info: + name: > + Sermon Browser <= 0.45.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e1a68fb-51c6-4567-9a50-78ed44ccac21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sermon-browser/" + google-query: inurl:"/wp-content/plugins/sermon-browser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sermon-browser,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sermon-browser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sermon-browser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.45.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sermon-browser-9660e0224b9760d1af88fd4611d7d759.yaml b/nuclei-templates/cve-less/plugins/sermon-browser-9660e0224b9760d1af88fd4611d7d759.yaml new file mode 100644 index 0000000000..a19f0064e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sermon-browser-9660e0224b9760d1af88fd4611d7d759.yaml @@ -0,0 +1,58 @@ +id: sermon-browser-9660e0224b9760d1af88fd4611d7d759 + +info: + name: > + Sermon Browser <= 0.45.15 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4671556c-d902-4294-9e25-47e3d0e2ca98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sermon-browser/" + google-query: inurl:"/wp-content/plugins/sermon-browser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sermon-browser,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sermon-browser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sermon-browser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.45.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sermon-browser-a799081d34c432defddee7667cec19dc.yaml b/nuclei-templates/cve-less/plugins/sermon-browser-a799081d34c432defddee7667cec19dc.yaml new file mode 100644 index 0000000000..0e7f3d0067 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sermon-browser-a799081d34c432defddee7667cec19dc.yaml @@ -0,0 +1,58 @@ +id: sermon-browser-a799081d34c432defddee7667cec19dc + +info: + name: > + Sermon Browser < 0.43.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69a0262e-6061-4139-ac59-b1a13dd2f147?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sermon-browser/" + google-query: inurl:"/wp-content/plugins/sermon-browser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sermon-browser,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sermon-browser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sermon-browser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.43.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sermon-browser-f3788e8161735094781c1f5ae1d95441.yaml b/nuclei-templates/cve-less/plugins/sermon-browser-f3788e8161735094781c1f5ae1d95441.yaml new file mode 100644 index 0000000000..7cf37e681c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sermon-browser-f3788e8161735094781c1f5ae1d95441.yaml @@ -0,0 +1,58 @@ +id: sermon-browser-f3788e8161735094781c1f5ae1d95441 + +info: + name: > + Sermon Browser < 0.43.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9095bf69-e682-48aa-b206-8bd2b6c2b170?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sermon-browser/" + google-query: inurl:"/wp-content/plugins/sermon-browser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sermon-browser,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sermon-browser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sermon-browser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.43.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sermone-online-sermons-management-71b25caf3907e04060e0d61d5bb4a2e5.yaml b/nuclei-templates/cve-less/plugins/sermone-online-sermons-management-71b25caf3907e04060e0d61d5bb4a2e5.yaml new file mode 100644 index 0000000000..a3a3304787 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sermone-online-sermons-management-71b25caf3907e04060e0d61d5bb4a2e5.yaml @@ -0,0 +1,58 @@ +id: sermone-online-sermons-management-71b25caf3907e04060e0d61d5bb4a2e5 + +info: + name: > + Sermon'e <= 1.0.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e1bfb29-80e7-4122-ab61-ef7c1dd8ebaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sermone-online-sermons-management/" + google-query: inurl:"/wp-content/plugins/sermone-online-sermons-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sermone-online-sermons-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sermone-online-sermons-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sermone-online-sermons-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sermone-online-sermons-management-bcc8790a8d36a1db91c142f8ad59d902.yaml b/nuclei-templates/cve-less/plugins/sermone-online-sermons-management-bcc8790a8d36a1db91c142f8ad59d902.yaml new file mode 100644 index 0000000000..f48f3365e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sermone-online-sermons-management-bcc8790a8d36a1db91c142f8ad59d902.yaml @@ -0,0 +1,58 @@ +id: sermone-online-sermons-management-bcc8790a8d36a1db91c142f8ad59d902 + +info: + name: > + Sermon'e – Sermons Online <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c17678e-6598-4e80-b121-beae822b9f81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sermone-online-sermons-management/" + google-query: inurl:"/wp-content/plugins/sermone-online-sermons-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sermone-online-sermons-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sermone-online-sermons-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sermone-online-sermons-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/serp-rank-f8142d6147ba8985e902d3e3c7f8c24d.yaml b/nuclei-templates/cve-less/plugins/serp-rank-f8142d6147ba8985e902d3e3c7f8c24d.yaml new file mode 100644 index 0000000000..55e90f7bd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/serp-rank-f8142d6147ba8985e902d3e3c7f8c24d.yaml @@ -0,0 +1,58 @@ +id: serp-rank-f8142d6147ba8985e902d3e3c7f8c24d + +info: + name: > + Keyword Rank Tracker <= 1.0.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dacfba3e-c1d7-475c-885b-f77b77a65f91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/serp-rank/" + google-query: inurl:"/wp-content/plugins/serp-rank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,serp-rank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/serp-rank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "serp-rank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/server-info-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/server-info-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..24308a83da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/server-info-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: server-info-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/server-info/" + google-query: inurl:"/wp-content/plugins/server-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,server-info,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/server-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "server-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/server-status-by-hostnameip-70cdf6a74f267301ff9a7a0c0a03da5b.yaml b/nuclei-templates/cve-less/plugins/server-status-by-hostnameip-70cdf6a74f267301ff9a7a0c0a03da5b.yaml new file mode 100644 index 0000000000..75ce9b6009 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/server-status-by-hostnameip-70cdf6a74f267301ff9a7a0c0a03da5b.yaml @@ -0,0 +1,58 @@ +id: server-status-by-hostnameip-70cdf6a74f267301ff9a7a0c0a03da5b + +info: + name: > + Server Status by Hostname/IP <= 4.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6e114a3-8a17-4c79-9829-374646b53ed4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/server-status-by-hostnameip/" + google-query: inurl:"/wp-content/plugins/server-status-by-hostnameip/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,server-status-by-hostnameip,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/server-status-by-hostnameip/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "server-status-by-hostnameip" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/service-area-postcode-checker-bb6a55b0c6e726b2a2ecec4b50c8f7ea.yaml b/nuclei-templates/cve-less/plugins/service-area-postcode-checker-bb6a55b0c6e726b2a2ecec4b50c8f7ea.yaml new file mode 100644 index 0000000000..0f72b9767c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/service-area-postcode-checker-bb6a55b0c6e726b2a2ecec4b50c8f7ea.yaml @@ -0,0 +1,58 @@ +id: service-area-postcode-checker-bb6a55b0c6e726b2a2ecec4b50c8f7ea + +info: + name: > + Service Area Postcode Checker <= 2.0.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da8dd02f-0d9f-44a2-bcad-1e392668dd67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/service-area-postcode-checker/" + google-query: inurl:"/wp-content/plugins/service-area-postcode-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,service-area-postcode-checker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/service-area-postcode-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "service-area-postcode-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/setka-editor-8a1f943914f4672fa3bb0af353ac1cbd.yaml b/nuclei-templates/cve-less/plugins/setka-editor-8a1f943914f4672fa3bb0af353ac1cbd.yaml new file mode 100644 index 0000000000..01e37a292b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/setka-editor-8a1f943914f4672fa3bb0af353ac1cbd.yaml @@ -0,0 +1,58 @@ +id: setka-editor-8a1f943914f4672fa3bb0af353ac1cbd + +info: + name: > + Setka Editor <= 2.1.20 - Cross-Site Request Forgery via handleRequest + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7058306f-ec20-4722-aaa1-552a75945a1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/setka-editor/" + google-query: inurl:"/wp-content/plugins/setka-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,setka-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/setka-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "setka-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/setka-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/setka-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..af62d4f498 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/setka-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: setka-editor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/setka-editor/" + google-query: inurl:"/wp-content/plugins/setka-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,setka-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/setka-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "setka-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seur-01f666d1348f15c58dad4eff11007661.yaml b/nuclei-templates/cve-less/plugins/seur-01f666d1348f15c58dad4eff11007661.yaml new file mode 100644 index 0000000000..7db83946e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seur-01f666d1348f15c58dad4eff11007661.yaml @@ -0,0 +1,58 @@ +id: seur-01f666d1348f15c58dad4eff11007661 + +info: + name: > + SEUR Oficial <= 1.6.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3543ce7-328e-4db8-8993-8cd78af997de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seur/" + google-query: inurl:"/wp-content/plugins/seur/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seur,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seur/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seur" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/seur-0ca7c41649d0f082ad6681a5a0217ff7.yaml b/nuclei-templates/cve-less/plugins/seur-0ca7c41649d0f082ad6681a5a0217ff7.yaml new file mode 100644 index 0000000000..cf3d2c6326 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/seur-0ca7c41649d0f082ad6681a5a0217ff7.yaml @@ -0,0 +1,58 @@ +id: seur-0ca7c41649d0f082ad6681a5a0217ff7 + +info: + name: > + SEUR Oficial < 1.7.2 - Authenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58e1a5a1-800f-45e8-a356-759ba568d7c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/seur/" + google-query: inurl:"/wp-content/plugins/seur/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,seur,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/seur/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "seur" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sexy-author-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sexy-author-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6317c127e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sexy-author-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sexy-author-bio-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sexy-author-bio/" + google-query: inurl:"/wp-content/plugins/sexy-author-bio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sexy-author-bio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sexy-author-bio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sexy-author-bio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sexy-author-bio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/sexy-author-bio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..e837f414d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sexy-author-bio-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: sexy-author-bio-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sexy-author-bio/" + google-query: inurl:"/wp-content/plugins/sexy-author-bio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sexy-author-bio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sexy-author-bio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sexy-author-bio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sexy-contact-form-df188a4635663bfa5512f1ac98e2f946.yaml b/nuclei-templates/cve-less/plugins/sexy-contact-form-df188a4635663bfa5512f1ac98e2f946.yaml new file mode 100644 index 0000000000..1ff3d2be24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sexy-contact-form-df188a4635663bfa5512f1ac98e2f946.yaml @@ -0,0 +1,58 @@ +id: sexy-contact-form-df188a4635663bfa5512f1ac98e2f946 + +info: + name: > + Creative Contact Form < 1.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39ced195-63a7-4f50-a4eb-b43d6069f7e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sexy-contact-form/" + google-query: inurl:"/wp-content/plugins/sexy-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sexy-contact-form,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sexy-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sexy-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sexybookmarks-5031bc59caa3037821df61e5a345c90f.yaml b/nuclei-templates/cve-less/plugins/sexybookmarks-5031bc59caa3037821df61e5a345c90f.yaml new file mode 100644 index 0000000000..e218187779 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sexybookmarks-5031bc59caa3037821df61e5a345c90f.yaml @@ -0,0 +1,58 @@ +id: sexybookmarks-5031bc59caa3037821df61e5a345c90f + +info: + name: > + SexyBookmarks <= 6.1.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1ae2060-5eca-47c9-a196-0ff75c3f523e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sexybookmarks/" + google-query: inurl:"/wp-content/plugins/sexybookmarks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sexybookmarks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sexybookmarks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sexybookmarks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sfwd-lms-02626784075443390163f8db5670c28a.yaml b/nuclei-templates/cve-less/plugins/sfwd-lms-02626784075443390163f8db5670c28a.yaml new file mode 100644 index 0000000000..8dd9070f31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sfwd-lms-02626784075443390163f8db5670c28a.yaml @@ -0,0 +1,58 @@ +id: sfwd-lms-02626784075443390163f8db5670c28a + +info: + name: > + LearnDash LMS <= 4.10.2 - Sensitive Information Exposure via API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae735117-e68b-448e-ad41-258d1be3aebc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sfwd-lms/" + google-query: inurl:"/wp-content/plugins/sfwd-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sfwd-lms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sfwd-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sfwd-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sfwd-lms-10a89ae66beb80eb5f5ead8cc5089e02.yaml b/nuclei-templates/cve-less/plugins/sfwd-lms-10a89ae66beb80eb5f5ead8cc5089e02.yaml new file mode 100644 index 0000000000..d13d086267 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sfwd-lms-10a89ae66beb80eb5f5ead8cc5089e02.yaml @@ -0,0 +1,58 @@ +id: sfwd-lms-10a89ae66beb80eb5f5ead8cc5089e02 + +info: + name: > + LearnDash LMS <= 2.5.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d4f47af-294a-4c3a-accd-9ae674916a38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sfwd-lms/" + google-query: inurl:"/wp-content/plugins/sfwd-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sfwd-lms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sfwd-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sfwd-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sfwd-lms-13a97dd87cd8da4d2ca9cc4586e65cfe.yaml b/nuclei-templates/cve-less/plugins/sfwd-lms-13a97dd87cd8da4d2ca9cc4586e65cfe.yaml new file mode 100644 index 0000000000..b5b76ceed5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sfwd-lms-13a97dd87cd8da4d2ca9cc4586e65cfe.yaml @@ -0,0 +1,58 @@ +id: sfwd-lms-13a97dd87cd8da4d2ca9cc4586e65cfe + +info: + name: > + LearnDash LMS <= 4.5.3 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40a57493-b99b-4e71-8603-e668c6283a5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sfwd-lms/" + google-query: inurl:"/wp-content/plugins/sfwd-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sfwd-lms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sfwd-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sfwd-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sfwd-lms-2a5ae121ac45c4db9286f6262f63f6e5.yaml b/nuclei-templates/cve-less/plugins/sfwd-lms-2a5ae121ac45c4db9286f6262f63f6e5.yaml new file mode 100644 index 0000000000..697e8c62b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sfwd-lms-2a5ae121ac45c4db9286f6262f63f6e5.yaml @@ -0,0 +1,58 @@ +id: sfwd-lms-2a5ae121ac45c4db9286f6262f63f6e5 + +info: + name: > + LearnDash <= 3.1.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e29b10e-81d5-4247-bfe8-2400bcd9aef9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sfwd-lms/" + google-query: inurl:"/wp-content/plugins/sfwd-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sfwd-lms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sfwd-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sfwd-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sfwd-lms-417dd4625c1b025667086ec6772974db.yaml b/nuclei-templates/cve-less/plugins/sfwd-lms-417dd4625c1b025667086ec6772974db.yaml new file mode 100644 index 0000000000..3717618cc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sfwd-lms-417dd4625c1b025667086ec6772974db.yaml @@ -0,0 +1,58 @@ +id: sfwd-lms-417dd4625c1b025667086ec6772974db + +info: + name: > + LearnDash LMS <= 4.10.1 - Sensitive Information Exposure via API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61ca5ab6-5fe9-4313-9b0d-8736663d0e89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sfwd-lms/" + google-query: inurl:"/wp-content/plugins/sfwd-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sfwd-lms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sfwd-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sfwd-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sfwd-lms-838c5377a3ecbc7084b894cb32f7b8cc.yaml b/nuclei-templates/cve-less/plugins/sfwd-lms-838c5377a3ecbc7084b894cb32f7b8cc.yaml new file mode 100644 index 0000000000..e0220960e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sfwd-lms-838c5377a3ecbc7084b894cb32f7b8cc.yaml @@ -0,0 +1,58 @@ +id: sfwd-lms-838c5377a3ecbc7084b894cb32f7b8cc + +info: + name: > + LearnDash LMS <= 4.6.0 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary User Password Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2318b3e1-268d-45fa-83bf-c6e88f1b9013?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sfwd-lms/" + google-query: inurl:"/wp-content/plugins/sfwd-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sfwd-lms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sfwd-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sfwd-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sfwd-lms-953891b7b02246cb4b83db8ae0e364f6.yaml b/nuclei-templates/cve-less/plugins/sfwd-lms-953891b7b02246cb4b83db8ae0e364f6.yaml new file mode 100644 index 0000000000..6f46e72036 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sfwd-lms-953891b7b02246cb4b83db8ae0e364f6.yaml @@ -0,0 +1,58 @@ +id: sfwd-lms-953891b7b02246cb4b83db8ae0e364f6 + +info: + name: > + LearnDash LMS <= 4.10.1 - Sensitive Information Exposure via assignments + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7191955e-0db1-4ad1-878b-74f90ca59c91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sfwd-lms/" + google-query: inurl:"/wp-content/plugins/sfwd-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sfwd-lms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sfwd-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sfwd-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sfwd-lms-d6e8b2f76cbc2ec5ae7e7af3679d4ed8.yaml b/nuclei-templates/cve-less/plugins/sfwd-lms-d6e8b2f76cbc2ec5ae7e7af3679d4ed8.yaml new file mode 100644 index 0000000000..9b4be7ec07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sfwd-lms-d6e8b2f76cbc2ec5ae7e7af3679d4ed8.yaml @@ -0,0 +1,58 @@ +id: sfwd-lms-d6e8b2f76cbc2ec5ae7e7af3679d4ed8 + +info: + name: > + LearnDash 3.0.0-3.1.1 - Reflected Cross Site Scripting issue on the [ld_profile] search field + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07b1efbd-0caf-412d-ac1b-ab1b27c32b8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sfwd-lms/" + google-query: inurl:"/wp-content/plugins/sfwd-lms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sfwd-lms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sfwd-lms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sfwd-lms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sg-cachepress-43f4c20972d989cec8564607e81e3507.yaml b/nuclei-templates/cve-less/plugins/sg-cachepress-43f4c20972d989cec8564607e81e3507.yaml new file mode 100644 index 0000000000..2f27788fa1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sg-cachepress-43f4c20972d989cec8564607e81e3507.yaml @@ -0,0 +1,58 @@ +id: sg-cachepress-43f4c20972d989cec8564607e81e3507 + +info: + name: > + Speed Optimizer <= 7.4.6 - Missing Authorization via purge_on_other_events() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/811253a4-6dc9-45a2-b08f-74069fdcc9ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sg-cachepress/" + google-query: inurl:"/wp-content/plugins/sg-cachepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sg-cachepress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sg-cachepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sg-cachepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sg-cachepress-ed44e679b80b227382994fd698507bde.yaml b/nuclei-templates/cve-less/plugins/sg-cachepress-ed44e679b80b227382994fd698507bde.yaml new file mode 100644 index 0000000000..2926a7b2dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sg-cachepress-ed44e679b80b227382994fd698507bde.yaml @@ -0,0 +1,58 @@ +id: sg-cachepress-ed44e679b80b227382994fd698507bde + +info: + name: > + SiteGround Optimizer <= 5.0.12 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/657f3bd7-2cdc-4eb6-ba50-7c7fca468df0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sg-cachepress/" + google-query: inurl:"/wp-content/plugins/sg-cachepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sg-cachepress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sg-cachepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sg-cachepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sg-security-158366fe9b5b0baf92dc531e125fc491.yaml b/nuclei-templates/cve-less/plugins/sg-security-158366fe9b5b0baf92dc531e125fc491.yaml new file mode 100644 index 0000000000..58b8bf6469 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sg-security-158366fe9b5b0baf92dc531e125fc491.yaml @@ -0,0 +1,58 @@ +id: sg-security-158366fe9b5b0baf92dc531e125fc491 + +info: + name: > + SiteGround Security <= 1.2.5 - Authorization Weakness to Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3a5566-eee5-4f71-9c93-e59abf913d04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sg-security/" + google-query: inurl:"/wp-content/plugins/sg-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sg-security,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sg-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sg-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sg-security-29fc5077ea2edf3a78db8c636c61b5fc.yaml b/nuclei-templates/cve-less/plugins/sg-security-29fc5077ea2edf3a78db8c636c61b5fc.yaml new file mode 100644 index 0000000000..97b97f5298 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sg-security-29fc5077ea2edf3a78db8c636c61b5fc.yaml @@ -0,0 +1,58 @@ +id: sg-security-29fc5077ea2edf3a78db8c636c61b5fc + +info: + name: > + SiteGround Security <= 1.2.5 - Authentication Bypass via 2FA Setup + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e5c6bf7-a653-4571-9566-574d2bb35c4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sg-security/" + google-query: inurl:"/wp-content/plugins/sg-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sg-security,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sg-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sg-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sg-security-97e524444c79464d138f78b1bdccb0af.yaml b/nuclei-templates/cve-less/plugins/sg-security-97e524444c79464d138f78b1bdccb0af.yaml new file mode 100644 index 0000000000..d0d038b163 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sg-security-97e524444c79464d138f78b1bdccb0af.yaml @@ -0,0 +1,58 @@ +id: sg-security-97e524444c79464d138f78b1bdccb0af + +info: + name: > + SiteGround Security <= 1.3.0 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2af996d2-7430-4367-8fd9-212df6106fb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sg-security/" + google-query: inurl:"/wp-content/plugins/sg-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sg-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sg-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sg-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shantz-wordpress-qotd-b07db4dfebcda2750bc8765b2f84f5e0.yaml b/nuclei-templates/cve-less/plugins/shantz-wordpress-qotd-b07db4dfebcda2750bc8765b2f84f5e0.yaml new file mode 100644 index 0000000000..678d2b342c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shantz-wordpress-qotd-b07db4dfebcda2750bc8765b2f84f5e0.yaml @@ -0,0 +1,58 @@ +id: shantz-wordpress-qotd-b07db4dfebcda2750bc8765b2f84f5e0 + +info: + name: > + Shantz WordPress QOTD <= 1.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e31bf122-e3b0-43d4-afff-f3baf3aa53e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shantz-wordpress-qotd/" + google-query: inurl:"/wp-content/plugins/shantz-wordpress-qotd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shantz-wordpress-qotd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shantz-wordpress-qotd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shantz-wordpress-qotd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shapely-companion-f17b3e6f69f39571541cab98885c4a49.yaml b/nuclei-templates/cve-less/plugins/shapely-companion-f17b3e6f69f39571541cab98885c4a49.yaml new file mode 100644 index 0000000000..cf9688e3e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shapely-companion-f17b3e6f69f39571541cab98885c4a49.yaml @@ -0,0 +1,58 @@ +id: shapely-companion-f17b3e6f69f39571541cab98885c4a49 + +info: + name: > + Shapely Companion <= 1.2.6 - Unprotected AJAX Action to Content Import + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db8bebe2-c50c-4148-b232-04bcd808745e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shapely-companion/" + google-query: inurl:"/wp-content/plugins/shapely-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shapely-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shapely-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shapely-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shapepress-dsgvo-65fb11931177bab0fee70a7467cb7286.yaml b/nuclei-templates/cve-less/plugins/shapepress-dsgvo-65fb11931177bab0fee70a7467cb7286.yaml new file mode 100644 index 0000000000..9ad4680d3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shapepress-dsgvo-65fb11931177bab0fee70a7467cb7286.yaml @@ -0,0 +1,58 @@ +id: shapepress-dsgvo-65fb11931177bab0fee70a7467cb7286 + +info: + name: > + WP DSGVO Tools (GDPR) <= 2.2.18 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/615d35dd-a92e-4910-b0fc-ac0a7d03741a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shapepress-dsgvo/" + google-query: inurl:"/wp-content/plugins/shapepress-dsgvo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shapepress-dsgvo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shapepress-dsgvo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shapepress-dsgvo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shapepress-dsgvo-b1b317cf528065a9659ae132db582cd7.yaml b/nuclei-templates/cve-less/plugins/shapepress-dsgvo-b1b317cf528065a9659ae132db582cd7.yaml new file mode 100644 index 0000000000..5c240c53e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shapepress-dsgvo-b1b317cf528065a9659ae132db582cd7.yaml @@ -0,0 +1,58 @@ +id: shapepress-dsgvo-b1b317cf528065a9659ae132db582cd7 + +info: + name: > + WP DSGVO Tools (GDPR) <= 3.1.23 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c18ab1b-02f1-4679-8cff-679d98dc9f4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shapepress-dsgvo/" + google-query: inurl:"/wp-content/plugins/shapepress-dsgvo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shapepress-dsgvo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shapepress-dsgvo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shapepress-dsgvo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shapepress-dsgvo-c87c5ce6e1dba004330c2ec9d5dc6740.yaml b/nuclei-templates/cve-less/plugins/shapepress-dsgvo-c87c5ce6e1dba004330c2ec9d5dc6740.yaml new file mode 100644 index 0000000000..e7da014dbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shapepress-dsgvo-c87c5ce6e1dba004330c2ec9d5dc6740.yaml @@ -0,0 +1,58 @@ +id: shapepress-dsgvo-c87c5ce6e1dba004330c2ec9d5dc6740 + +info: + name: > + WP DSGVO Tools (GDPR) <= 3.1.23 - Unauthenticated Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32346090-ef3e-4a42-b7e2-7f3b7a9221e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shapepress-dsgvo/" + google-query: inurl:"/wp-content/plugins/shapepress-dsgvo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shapepress-dsgvo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shapepress-dsgvo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shapepress-dsgvo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-and-follow-d6e1f3b40bc3ef2b92a5e3cad8048813.yaml b/nuclei-templates/cve-less/plugins/share-and-follow-d6e1f3b40bc3ef2b92a5e3cad8048813.yaml new file mode 100644 index 0000000000..e725bf15c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-and-follow-d6e1f3b40bc3ef2b92a5e3cad8048813.yaml @@ -0,0 +1,58 @@ +id: share-and-follow-d6e1f3b40bc3ef2b92a5e3cad8048813 + +info: + name: > + Share and Follow <= 1.80.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b864ff8-83fb-40e2-9264-7c57115d50f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-and-follow/" + google-query: inurl:"/wp-content/plugins/share-and-follow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-and-follow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-and-follow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-and-follow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.80.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-on-diaspora-94e88d16398a1d45a3247b177897a58b.yaml b/nuclei-templates/cve-less/plugins/share-on-diaspora-94e88d16398a1d45a3247b177897a58b.yaml new file mode 100644 index 0000000000..07e89b878e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-on-diaspora-94e88d16398a1d45a3247b177897a58b.yaml @@ -0,0 +1,58 @@ +id: share-on-diaspora-94e88d16398a1d45a3247b177897a58b + +info: + name: > + Share on Diaspora < 0.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01b55b59-3107-4711-8be2-8b0803c0fa69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-on-diaspora/" + google-query: inurl:"/wp-content/plugins/share-on-diaspora/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-on-diaspora,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-on-diaspora/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-on-diaspora" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-one-drive-bc20fc7e32cb3fbec9137570aec723f7.yaml b/nuclei-templates/cve-less/plugins/share-one-drive-bc20fc7e32cb3fbec9137570aec723f7.yaml new file mode 100644 index 0000000000..61a0ecc045 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-one-drive-bc20fc7e32cb3fbec9137570aec723f7.yaml @@ -0,0 +1,58 @@ +id: share-one-drive-bc20fc7e32cb3fbec9137570aec723f7 + +info: + name: > + Share-one-Drive <= 1.15.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/125e11a3-c497-484e-940b-2bcdf7f2c1ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-one-drive/" + google-query: inurl:"/wp-content/plugins/share-one-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-one-drive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-one-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-one-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-print-pdf-woocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/share-print-pdf-woocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..dd6586f881 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-print-pdf-woocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: share-print-pdf-woocommerce-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-print-pdf-woocommerce/" + google-query: inurl:"/wp-content/plugins/share-print-pdf-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-print-pdf-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-print-pdf-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-print-pdf-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-this-32ca157e45a11cba9d0a4e52d697d9d8.yaml b/nuclei-templates/cve-less/plugins/share-this-32ca157e45a11cba9d0a4e52d697d9d8.yaml new file mode 100644 index 0000000000..ff9cf47086 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-this-32ca157e45a11cba9d0a4e52d697d9d8.yaml @@ -0,0 +1,58 @@ +id: share-this-32ca157e45a11cba9d0a4e52d697d9d8 + +info: + name: > + ShareThis <= 7.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70d5fccb-a5df-4ffc-a716-f00e6b968b40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-this/" + google-query: inurl:"/wp-content/plugins/share-this/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-this,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-this/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-this" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-this-image-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml b/nuclei-templates/cve-less/plugins/share-this-image-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml new file mode 100644 index 0000000000..934ed52187 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-this-image-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml @@ -0,0 +1,58 @@ +id: share-this-image-7bc3b9cd6e8ea033c22ca8523f43d4e5 + +info: + name: > + Share This Image < 1.04 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5a739d5-648f-4d79-ac37-335e89127d90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-this-image/" + google-query: inurl:"/wp-content/plugins/share-this-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-this-image,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-this-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-this-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-this-image-a8305ef02686935203a872eb58a73ff6.yaml b/nuclei-templates/cve-less/plugins/share-this-image-a8305ef02686935203a872eb58a73ff6.yaml new file mode 100644 index 0000000000..12dfe06a3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-this-image-a8305ef02686935203a872eb58a73ff6.yaml @@ -0,0 +1,58 @@ +id: share-this-image-a8305ef02686935203a872eb58a73ff6 + +info: + name: > + Share This Image <= 1.98 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/774776dc-3780-496c-907a-0d1f86a5d0ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-this-image/" + google-query: inurl:"/wp-content/plugins/share-this-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-this-image,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-this-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-this-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.97') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-this-image-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/share-this-image-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f46788537b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-this-image-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: share-this-image-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-this-image/" + google-query: inurl:"/wp-content/plugins/share-this-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-this-image,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-this-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-this-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/share-woocommerce-email-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/share-woocommerce-email-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..4f3cf7c7be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/share-woocommerce-email-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: share-woocommerce-email-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/share-woocommerce-email/" + google-query: inurl:"/wp-content/plugins/share-woocommerce-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,share-woocommerce-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/share-woocommerce-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "share-woocommerce-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shareaholic-71a9b86af5e18a20f6a7538c29ad1df9.yaml b/nuclei-templates/cve-less/plugins/shareaholic-71a9b86af5e18a20f6a7538c29ad1df9.yaml new file mode 100644 index 0000000000..ff43402f1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shareaholic-71a9b86af5e18a20f6a7538c29ad1df9.yaml @@ -0,0 +1,58 @@ +id: shareaholic-71a9b86af5e18a20f6a7538c29ad1df9 + +info: + name: > + Shareaholic <= 9.7.11 - Missing Authorization via accept_terms_of_service + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cde239c-20bf-41fa-b7d6-e21b14dcbc22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shareaholic/" + google-query: inurl:"/wp-content/plugins/shareaholic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shareaholic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shareaholic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shareaholic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shareaholic-822679f46a678c28d53cacb1c12444b4.yaml b/nuclei-templates/cve-less/plugins/shareaholic-822679f46a678c28d53cacb1c12444b4.yaml new file mode 100644 index 0000000000..bc3c9775bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shareaholic-822679f46a678c28d53cacb1c12444b4.yaml @@ -0,0 +1,58 @@ +id: shareaholic-822679f46a678c28d53cacb1c12444b4 + +info: + name: > + Professional Social Sharing Buttons, Icons & Related Posts – Shareaholic <= 9.7.5 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d05f7b77-382b-422a-8096-f47291f4dc45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shareaholic/" + google-query: inurl:"/wp-content/plugins/shareaholic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shareaholic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shareaholic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shareaholic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shareaholic-d30830ee183428306dfe29b862928edf.yaml b/nuclei-templates/cve-less/plugins/shareaholic-d30830ee183428306dfe29b862928edf.yaml new file mode 100644 index 0000000000..9826ae4300 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shareaholic-d30830ee183428306dfe29b862928edf.yaml @@ -0,0 +1,58 @@ +id: shareaholic-d30830ee183428306dfe29b862928edf + +info: + name: > + WordPress Social Sharing, Related Posts & Analytics – Shareaholic < 7.6.1.0 - Authenticated (Subscriber+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0ea0d46-a6aa-4704-8e4e-051bedd4994e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shareaholic/" + google-query: inurl:"/wp-content/plugins/shareaholic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shareaholic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shareaholic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shareaholic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shareaholic-f19f31f075dbc06538f36ae8e36c55d3.yaml b/nuclei-templates/cve-less/plugins/shareaholic-f19f31f075dbc06538f36ae8e36c55d3.yaml new file mode 100644 index 0000000000..39370a39a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shareaholic-f19f31f075dbc06538f36ae8e36c55d3.yaml @@ -0,0 +1,58 @@ +id: shareaholic-f19f31f075dbc06538f36ae8e36c55d3 + +info: + name: > + Shareaholic <= 9.7.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff6932c6-f3ec-46a8-a03b-95512eee5bf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shareaholic/" + google-query: inurl:"/wp-content/plugins/shareaholic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shareaholic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shareaholic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shareaholic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sharebar-2f64e4cf69164182b2f4695a0a03f04b.yaml b/nuclei-templates/cve-less/plugins/sharebar-2f64e4cf69164182b2f4695a0a03f04b.yaml new file mode 100644 index 0000000000..4206f9f04f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sharebar-2f64e4cf69164182b2f4695a0a03f04b.yaml @@ -0,0 +1,58 @@ +id: sharebar-2f64e4cf69164182b2f4695a0a03f04b + +info: + name: > + Sharebar <= 1.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f49eaf0-1273-41e8-9087-4d4ed978fce4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sharebar/" + google-query: inurl:"/wp-content/plugins/sharebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sharebar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sharebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sharebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sharebar-61fcaed16881b56993f1d78f9758c2b3.yaml b/nuclei-templates/cve-less/plugins/sharebar-61fcaed16881b56993f1d78f9758c2b3.yaml new file mode 100644 index 0000000000..b4cf37328c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sharebar-61fcaed16881b56993f1d78f9758c2b3.yaml @@ -0,0 +1,58 @@ +id: sharebar-61fcaed16881b56993f1d78f9758c2b3 + +info: + name: > + Sharebar <= 1.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a32267-6d99-4882-8601-8c4d36575e0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sharebar/" + google-query: inurl:"/wp-content/plugins/sharebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sharebar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sharebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sharebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sharebar-c69d9d03bd69d8ab6bf679257ba19be1.yaml b/nuclei-templates/cve-less/plugins/sharebar-c69d9d03bd69d8ab6bf679257ba19be1.yaml new file mode 100644 index 0000000000..633152919d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sharebar-c69d9d03bd69d8ab6bf679257ba19be1.yaml @@ -0,0 +1,58 @@ +id: sharebar-c69d9d03bd69d8ab6bf679257ba19be1 + +info: + name: > + Sharebar <= 1.2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04d8b1bf-d514-4908-a30e-6ff7b8e03f82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sharebar/" + google-query: inurl:"/wp-content/plugins/sharebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sharebar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sharebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sharebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sharebar-c6abae1f3b36418b8b7ce31e542cc230.yaml b/nuclei-templates/cve-less/plugins/sharebar-c6abae1f3b36418b8b7ce31e542cc230.yaml new file mode 100644 index 0000000000..60cf3b2682 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sharebar-c6abae1f3b36418b8b7ce31e542cc230.yaml @@ -0,0 +1,58 @@ +id: sharebar-c6abae1f3b36418b8b7ce31e542cc230 + +info: + name: > + Sharebar <= 1.4.1 - Cross-Site Request Forgery to Settings Update & Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b08fe5c-dbf4-4c22-a403-f5a6495de2f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sharebar/" + google-query: inurl:"/wp-content/plugins/sharebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sharebar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sharebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sharebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shared-counts-dd581bb2f106d38c2b413e5d4d1b0414.yaml b/nuclei-templates/cve-less/plugins/shared-counts-dd581bb2f106d38c2b413e5d4d1b0414.yaml new file mode 100644 index 0000000000..a0da221960 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shared-counts-dd581bb2f106d38c2b413e5d4d1b0414.yaml @@ -0,0 +1,58 @@ +id: shared-counts-dd581bb2f106d38c2b413e5d4d1b0414 + +info: + name: > + Shared Counts – Social Media Share Buttons <= 1.4.1 - Missing Authorization to Arbitrary Email Sending + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/975293a1-7b69-4e10-93a3-74c00562c758?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shared-counts/" + google-query: inurl:"/wp-content/plugins/shared-counts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shared-counts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shared-counts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shared-counts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shared-files-13647ac0f5697b4e3d7374c8bbd8f571.yaml b/nuclei-templates/cve-less/plugins/shared-files-13647ac0f5697b4e3d7374c8bbd8f571.yaml new file mode 100644 index 0000000000..6adcdaba24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shared-files-13647ac0f5697b4e3d7374c8bbd8f571.yaml @@ -0,0 +1,58 @@ +id: shared-files-13647ac0f5697b4e3d7374c8bbd8f571 + +info: + name: > + Shared Files – Easy Download Manager and File Sharing Plugin with Frontend File Upload <= 1.6.60 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97e9037e-7d7a-4dad-bce1-0211822c04c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shared-files/" + google-query: inurl:"/wp-content/plugins/shared-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shared-files,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shared-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shared-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shared-files-31aeecdc666490a1580c3359e75e5fff.yaml b/nuclei-templates/cve-less/plugins/shared-files-31aeecdc666490a1580c3359e75e5fff.yaml new file mode 100644 index 0000000000..24d3cfd81f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shared-files-31aeecdc666490a1580c3359e75e5fff.yaml @@ -0,0 +1,58 @@ +id: shared-files-31aeecdc666490a1580c3359e75e5fff + +info: + name: > + Shared Files <= 1.7.16 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/560cd314-e442-4284-948f-e654445e0765?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shared-files/" + google-query: inurl:"/wp-content/plugins/shared-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shared-files,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shared-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shared-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shared-files-b62cd969ddcf5b8e9b0c69558a4a4184.yaml b/nuclei-templates/cve-less/plugins/shared-files-b62cd969ddcf5b8e9b0c69558a4a4184.yaml new file mode 100644 index 0000000000..e7711efb48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shared-files-b62cd969ddcf5b8e9b0c69558a4a4184.yaml @@ -0,0 +1,58 @@ +id: shared-files-b62cd969ddcf5b8e9b0c69558a4a4184 + +info: + name: > + Shared Files – Easy Download Manager and File Sharing Plugin with Frontend File Upload <= 1.6.56 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e10e550-735f-4bef-8e58-bcb79c51a5a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shared-files/" + google-query: inurl:"/wp-content/plugins/shared-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shared-files,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shared-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shared-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shared-files-b6bd7791f200f7232382796f865d36f1.yaml b/nuclei-templates/cve-less/plugins/shared-files-b6bd7791f200f7232382796f865d36f1.yaml new file mode 100644 index 0000000000..08dc54a982 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shared-files-b6bd7791f200f7232382796f865d36f1.yaml @@ -0,0 +1,58 @@ +id: shared-files-b6bd7791f200f7232382796f865d36f1 + +info: + name: > + Shared Files <= 1.7.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c4fc322-1f62-48e3-8177-4894c947624b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shared-files/" + google-query: inurl:"/wp-content/plugins/shared-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shared-files,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shared-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shared-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shared-files-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/shared-files-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f2e67cd13f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shared-files-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: shared-files-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shared-files/" + google-query: inurl:"/wp-content/plugins/shared-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shared-files,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shared-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shared-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shareyourcart-59dd009cc3bbb81f3cf9451ec529dc99.yaml b/nuclei-templates/cve-less/plugins/shareyourcart-59dd009cc3bbb81f3cf9451ec529dc99.yaml new file mode 100644 index 0000000000..be2a38bd22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shareyourcart-59dd009cc3bbb81f3cf9451ec529dc99.yaml @@ -0,0 +1,58 @@ +id: shareyourcart-59dd009cc3bbb81f3cf9451ec529dc99 + +info: + name: > + ShareYourCart < 1.7.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c034d2a2-20c4-4c32-8cfe-b80a62bdfdeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shareyourcart/" + google-query: inurl:"/wp-content/plugins/shareyourcart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shareyourcart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shareyourcart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shareyourcart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shariff-373cd634451823c6ebf5fcda405d8cd5.yaml b/nuclei-templates/cve-less/plugins/shariff-373cd634451823c6ebf5fcda405d8cd5.yaml new file mode 100644 index 0000000000..ee1783a661 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shariff-373cd634451823c6ebf5fcda405d8cd5.yaml @@ -0,0 +1,58 @@ +id: shariff-373cd634451823c6ebf5fcda405d8cd5 + +info: + name: > + Shariff Wrapper <= 4.6.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00a3d8e3-17b1-488b-9c42-2479932c9bf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shariff/" + google-query: inurl:"/wp-content/plugins/shariff/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shariff,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shariff/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shariff" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shariff-76ebe4a4bfefd9bdb89c2aafde46a61c.yaml b/nuclei-templates/cve-less/plugins/shariff-76ebe4a4bfefd9bdb89c2aafde46a61c.yaml new file mode 100644 index 0000000000..de96de59de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shariff-76ebe4a4bfefd9bdb89c2aafde46a61c.yaml @@ -0,0 +1,58 @@ +id: shariff-76ebe4a4bfefd9bdb89c2aafde46a61c + +info: + name: > + Shariff Wrapper <= 4.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8588f9e8-441c-4b9e-bd78-8526d8c28fa3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shariff/" + google-query: inurl:"/wp-content/plugins/shariff/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shariff,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shariff/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shariff" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shariff-91995026ff620283dce0ded1573ce367.yaml b/nuclei-templates/cve-less/plugins/shariff-91995026ff620283dce0ded1573ce367.yaml new file mode 100644 index 0000000000..d8b0ccba24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shariff-91995026ff620283dce0ded1573ce367.yaml @@ -0,0 +1,58 @@ +id: shariff-91995026ff620283dce0ded1573ce367 + +info: + name: > + Shariff Wrapper <= 4.6.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ab9c383-14da-479d-9709-1ae154dae398?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shariff/" + google-query: inurl:"/wp-content/plugins/shariff/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shariff,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shariff/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shariff" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shariff-9868f32ae613992060ba083e76a3d3bf.yaml b/nuclei-templates/cve-less/plugins/shariff-9868f32ae613992060ba083e76a3d3bf.yaml new file mode 100644 index 0000000000..be50f66188 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shariff-9868f32ae613992060ba083e76a3d3bf.yaml @@ -0,0 +1,58 @@ +id: shariff-9868f32ae613992060ba083e76a3d3bf + +info: + name: > + Shariff Wrapper <= 4.6.9 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cac2a45e-f09e-4639-9a45-68d528a5094e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shariff/" + google-query: inurl:"/wp-content/plugins/shariff/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shariff,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shariff/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shariff" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shariff-sharing-541de8c068694bf2fd0d54b891070b5b.yaml b/nuclei-templates/cve-less/plugins/shariff-sharing-541de8c068694bf2fd0d54b891070b5b.yaml new file mode 100644 index 0000000000..38932047b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shariff-sharing-541de8c068694bf2fd0d54b891070b5b.yaml @@ -0,0 +1,58 @@ +id: shariff-sharing-541de8c068694bf2fd0d54b891070b5b + +info: + name: > + Shariff Sharing < 1.0.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11f883d2-c183-4cc9-a330-6c50610a5c39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shariff-sharing/" + google-query: inurl:"/wp-content/plugins/shariff-sharing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shariff-sharing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shariff-sharing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shariff-sharing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sheetpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sheetpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f7710e7951 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sheetpress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sheetpress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sheetpress/" + google-query: inurl:"/wp-content/plugins/sheetpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sheetpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sheetpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sheetpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sheetpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/sheetpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..884959026f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sheetpress-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: sheetpress-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sheetpress/" + google-query: inurl:"/wp-content/plugins/sheetpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sheetpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sheetpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sheetpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..5109b5e4d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: sheets-to-wp-table-live-sync-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sheets-to-wp-table-live-sync/" + google-query: inurl:"/wp-content/plugins/sheets-to-wp-table-live-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sheets-to-wp-table-live-sync,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sheets-to-wp-table-live-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sheets-to-wp-table-live-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-2681315eb5322b6e8d1489c4efcc7445.yaml b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-2681315eb5322b6e8d1489c4efcc7445.yaml new file mode 100644 index 0000000000..b1ba360359 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-2681315eb5322b6e8d1489c4efcc7445.yaml @@ -0,0 +1,58 @@ +id: sheets-to-wp-table-live-sync-2681315eb5322b6e8d1489c4efcc7445 + +info: + name: > + Sheets To WP Table Live Sync <= 3.7.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45112069-9831-41d5-b868-8007ccfe9839?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sheets-to-wp-table-live-sync/" + google-query: inurl:"/wp-content/plugins/sheets-to-wp-table-live-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sheets-to-wp-table-live-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sheets-to-wp-table-live-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sheets-to-wp-table-live-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-5eb00ad2756b2388ac92152e000bcf7c.yaml b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-5eb00ad2756b2388ac92152e000bcf7c.yaml new file mode 100644 index 0000000000..4afdfd0050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-5eb00ad2756b2388ac92152e000bcf7c.yaml @@ -0,0 +1,58 @@ +id: sheets-to-wp-table-live-sync-5eb00ad2756b2388ac92152e000bcf7c + +info: + name: > + Sheets To WP Table Live Sync <= 2.12.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f70221e6-59a4-4151-9688-f06e194f51ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sheets-to-wp-table-live-sync/" + google-query: inurl:"/wp-content/plugins/sheets-to-wp-table-live-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sheets-to-wp-table-live-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sheets-to-wp-table-live-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sheets-to-wp-table-live-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..b3fbfc767f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: sheets-to-wp-table-live-sync-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sheets-to-wp-table-live-sync/" + google-query: inurl:"/wp-content/plugins/sheets-to-wp-table-live-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sheets-to-wp-table-live-sync,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sheets-to-wp-table-live-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sheets-to-wp-table-live-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..fd4580e91d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sheets-to-wp-table-live-sync-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: sheets-to-wp-table-live-sync-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sheets-to-wp-table-live-sync/" + google-query: inurl:"/wp-content/plugins/sheets-to-wp-table-live-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sheets-to-wp-table-live-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sheets-to-wp-table-live-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sheets-to-wp-table-live-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shibboleth-6be8e2d8421b17caa2e2804c1c44200c.yaml b/nuclei-templates/cve-less/plugins/shibboleth-6be8e2d8421b17caa2e2804c1c44200c.yaml new file mode 100644 index 0000000000..6b97eca894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shibboleth-6be8e2d8421b17caa2e2804c1c44200c.yaml @@ -0,0 +1,58 @@ +id: shibboleth-6be8e2d8421b17caa2e2804c1c44200c + +info: + name: > + Shibboleth <= 1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cd8ea73-81f3-41fe-bb1e-403d2645ff39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shibboleth/" + google-query: inurl:"/wp-content/plugins/shibboleth/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shibboleth,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shibboleth/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shibboleth" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shiftcontroller-6d8b84eb17134784244ee11191ce581e.yaml b/nuclei-templates/cve-less/plugins/shiftcontroller-6d8b84eb17134784244ee11191ce581e.yaml new file mode 100644 index 0000000000..e3c747b9e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shiftcontroller-6d8b84eb17134784244ee11191ce581e.yaml @@ -0,0 +1,58 @@ +id: shiftcontroller-6d8b84eb17134784244ee11191ce581e + +info: + name: > + ShiftController Employee Shift Scheduling <= 4.9.25 - Reflected Cross-Site Scripting via Query String + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c61212-e68e-4198-b078-18121576b767?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shiftcontroller/" + google-query: inurl:"/wp-content/plugins/shiftcontroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shiftcontroller,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shiftcontroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shiftcontroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shiftcontroller-8d232cf88104a0bce1dc247150d7aae4.yaml b/nuclei-templates/cve-less/plugins/shiftcontroller-8d232cf88104a0bce1dc247150d7aae4.yaml new file mode 100644 index 0000000000..616ec886ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shiftcontroller-8d232cf88104a0bce1dc247150d7aae4.yaml @@ -0,0 +1,58 @@ +id: shiftcontroller-8d232cf88104a0bce1dc247150d7aae4 + +info: + name: > + ShiftController Employee Shift Scheduling <= 4.9.23 - Unauthenticated Stored Cross-Site Scripting via 'hc-title' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc38990f-0079-46de-8197-0187189d90d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shiftcontroller/" + google-query: inurl:"/wp-content/plugins/shiftcontroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shiftcontroller,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shiftcontroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shiftcontroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shiftcontroller-d67e7665ddd98551189d5ed08461e85a.yaml b/nuclei-templates/cve-less/plugins/shiftcontroller-d67e7665ddd98551189d5ed08461e85a.yaml new file mode 100644 index 0000000000..8ae6770285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shiftcontroller-d67e7665ddd98551189d5ed08461e85a.yaml @@ -0,0 +1,58 @@ +id: shiftcontroller-d67e7665ddd98551189d5ed08461e85a + +info: + name: > + ShiftController Employee Shift Scheduling <= 4.9.23 - Cross-Site Request Forgery via get + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca058dde-48fd-46f4-b16c-97cdf79578ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shiftcontroller/" + google-query: inurl:"/wp-content/plugins/shiftcontroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shiftcontroller,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shiftcontroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shiftcontroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shiftnav-responsive-mobile-menu-178a0b2872232b9ff07f79c6391e0625.yaml b/nuclei-templates/cve-less/plugins/shiftnav-responsive-mobile-menu-178a0b2872232b9ff07f79c6391e0625.yaml new file mode 100644 index 0000000000..d064ab6d64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shiftnav-responsive-mobile-menu-178a0b2872232b9ff07f79c6391e0625.yaml @@ -0,0 +1,58 @@ +id: shiftnav-responsive-mobile-menu-178a0b2872232b9ff07f79c6391e0625 + +info: + name: > + ShiftNav – Responsive Mobile Menu <= 1.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36b71a50-270a-4960-bf31-e888df84e619?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shiftnav-responsive-mobile-menu/" + google-query: inurl:"/wp-content/plugins/shiftnav-responsive-mobile-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shiftnav-responsive-mobile-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shiftnav-responsive-mobile-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shiftnav-responsive-mobile-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shiny-buttons-2cc10dd6846c3b5a424c2d4d83378809.yaml b/nuclei-templates/cve-less/plugins/shiny-buttons-2cc10dd6846c3b5a424c2d4d83378809.yaml new file mode 100644 index 0000000000..1a847c2350 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shiny-buttons-2cc10dd6846c3b5a424c2d4d83378809.yaml @@ -0,0 +1,58 @@ +id: shiny-buttons-2cc10dd6846c3b5a424c2d4d83378809 + +info: + name: > + Shiny Buttons – CSS3 Button Generator for WordPress <= 1.1.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d57e4c3b-6e0d-40d5-bcf3-10af797d2f1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shiny-buttons/" + google-query: inurl:"/wp-content/plugins/shiny-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shiny-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shiny-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shiny-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ship-to-ecourier-43ca0b6b0ea70acc9611835de771b2f8.yaml b/nuclei-templates/cve-less/plugins/ship-to-ecourier-43ca0b6b0ea70acc9611835de771b2f8.yaml new file mode 100644 index 0000000000..341ee67783 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ship-to-ecourier-43ca0b6b0ea70acc9611835de771b2f8.yaml @@ -0,0 +1,58 @@ +id: ship-to-ecourier-43ca0b6b0ea70acc9611835de771b2f8 + +info: + name: > + Ship To eCourier <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/469a702f-033a-40de-b725-b0ad4f8e92e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ship-to-ecourier/" + google-query: inurl:"/wp-content/plugins/ship-to-ecourier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ship-to-ecourier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ship-to-ecourier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ship-to-ecourier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shipping-labels-for-woo-7232fed6406ae4ba37d22f0a1efb507e.yaml b/nuclei-templates/cve-less/plugins/shipping-labels-for-woo-7232fed6406ae4ba37d22f0a1efb507e.yaml new file mode 100644 index 0000000000..4d6d78d316 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shipping-labels-for-woo-7232fed6406ae4ba37d22f0a1efb507e.yaml @@ -0,0 +1,58 @@ +id: shipping-labels-for-woo-7232fed6406ae4ba37d22f0a1efb507e + +info: + name: > + WooCommerce Shipping Label <= 2.3.8 - Authenticated (Shop Manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f770bc3-8ccc-4160-9e79-e1c0dee42b73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shipping-labels-for-woo/" + google-query: inurl:"/wp-content/plugins/shipping-labels-for-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shipping-labels-for-woo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shipping-labels-for-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shipping-labels-for-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shockingly-simple-favicon-7f858d0082d9f9b3baf67bc48e2d6a9b.yaml b/nuclei-templates/cve-less/plugins/shockingly-simple-favicon-7f858d0082d9f9b3baf67bc48e2d6a9b.yaml new file mode 100644 index 0000000000..4e13d9f973 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shockingly-simple-favicon-7f858d0082d9f9b3baf67bc48e2d6a9b.yaml @@ -0,0 +1,58 @@ +id: shockingly-simple-favicon-7f858d0082d9f9b3baf67bc48e2d6a9b + +info: + name: > + Shockingly Simple Favicon <= 1.8.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd7a1440-18f5-4bcb-a4cf-c4713375d0a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shockingly-simple-favicon/" + google-query: inurl:"/wp-content/plugins/shockingly-simple-favicon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shockingly-simple-favicon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shockingly-simple-favicon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shockingly-simple-favicon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shop-as-a-customer-for-woocommerce-204abbaf4719b0c465697b2d07725668.yaml b/nuclei-templates/cve-less/plugins/shop-as-a-customer-for-woocommerce-204abbaf4719b0c465697b2d07725668.yaml new file mode 100644 index 0000000000..fbe0063701 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shop-as-a-customer-for-woocommerce-204abbaf4719b0c465697b2d07725668.yaml @@ -0,0 +1,58 @@ +id: shop-as-a-customer-for-woocommerce-204abbaf4719b0c465697b2d07725668 + +info: + name: > + Shop as a Customer for WooCommerce <= 1.2.3 - Authenticated (Shop Manager+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c730a69-015a-4b36-aa16-eff6916a302f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shop-as-a-customer-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/shop-as-a-customer-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shop-as-a-customer-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shop-as-a-customer-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shop-as-a-customer-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shop-as-a-customer-for-woocommerce-c95fb7e9995eb1cfa4e559bcf8a93b02.yaml b/nuclei-templates/cve-less/plugins/shop-as-a-customer-for-woocommerce-c95fb7e9995eb1cfa4e559bcf8a93b02.yaml new file mode 100644 index 0000000000..b0b70ab52f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shop-as-a-customer-for-woocommerce-c95fb7e9995eb1cfa4e559bcf8a93b02.yaml @@ -0,0 +1,58 @@ +id: shop-as-a-customer-for-woocommerce-c95fb7e9995eb1cfa4e559bcf8a93b02 + +info: + name: > + Shop as a Customer for WooCommerce <= 1.1.7 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d041edb-70f3-4894-8a78-f6881541054c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shop-as-a-customer-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/shop-as-a-customer-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shop-as-a-customer-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shop-as-a-customer-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shop-as-a-customer-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shop-page-wp-2bd96fa6fc397c3dffcc3e90ed6550f2.yaml b/nuclei-templates/cve-less/plugins/shop-page-wp-2bd96fa6fc397c3dffcc3e90ed6550f2.yaml new file mode 100644 index 0000000000..bc5b10cffc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shop-page-wp-2bd96fa6fc397c3dffcc3e90ed6550f2.yaml @@ -0,0 +1,58 @@ +id: shop-page-wp-2bd96fa6fc397c3dffcc3e90ed6550f2 + +info: + name: > + Shop Page WP <= 1.2.7 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9ed9a77-5a51-4664-a8a5-579824f8eae7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shop-page-wp/" + google-query: inurl:"/wp-content/plugins/shop-page-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shop-page-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shop-page-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shop-page-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shopconstruct-f40061e389876ea9a0c58de3f34fe3a0.yaml b/nuclei-templates/cve-less/plugins/shopconstruct-f40061e389876ea9a0c58de3f34fe3a0.yaml new file mode 100644 index 0000000000..c0f9377418 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shopconstruct-f40061e389876ea9a0c58de3f34fe3a0.yaml @@ -0,0 +1,58 @@ +id: shopconstruct-f40061e389876ea9a0c58de3f34fe3a0 + +info: + name: > + ShopConstruct – Product Catalog, Shopping Cart and eCommerce solution for Store <= 1.1.2 - Reflected Cross-Site Scripting via multiple parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e74ee0d-f03d-4139-a192-2a45d5f619dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shopconstruct/" + google-query: inurl:"/wp-content/plugins/shopconstruct/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shopconstruct,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shopconstruct/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shopconstruct" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shopengine-129b979d8e67fbc88666813fc32a0c22.yaml b/nuclei-templates/cve-less/plugins/shopengine-129b979d8e67fbc88666813fc32a0c22.yaml new file mode 100644 index 0000000000..9aa8908e8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shopengine-129b979d8e67fbc88666813fc32a0c22.yaml @@ -0,0 +1,58 @@ +id: shopengine-129b979d8e67fbc88666813fc32a0c22 + +info: + name: > + ShopEngine <= 4.1.1 - Cross-Site Request Forgery via get_product + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94abb34a-4451-4f41-ba23-d2a723e5a2e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shopengine/" + google-query: inurl:"/wp-content/plugins/shopengine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shopengine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shopengine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shopengine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shopkeeper-extender-248ab13a1cecf5e500d9ad5e3403c1b5.yaml b/nuclei-templates/cve-less/plugins/shopkeeper-extender-248ab13a1cecf5e500d9ad5e3403c1b5.yaml new file mode 100644 index 0000000000..84421191fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shopkeeper-extender-248ab13a1cecf5e500d9ad5e3403c1b5.yaml @@ -0,0 +1,58 @@ +id: shopkeeper-extender-248ab13a1cecf5e500d9ad5e3403c1b5 + +info: + name: > + Shopkeeper Extender <= 3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f34195-fc03-4c3d-b25e-c9b9cf8ded3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shopkeeper-extender/" + google-query: inurl:"/wp-content/plugins/shopkeeper-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shopkeeper-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shopkeeper-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shopkeeper-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shopp-aefb5230fce9985b540fe0a540e3c3be.yaml b/nuclei-templates/cve-less/plugins/shopp-aefb5230fce9985b540fe0a540e3c3be.yaml new file mode 100644 index 0000000000..606459b69c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shopp-aefb5230fce9985b540fe0a540e3c3be.yaml @@ -0,0 +1,58 @@ +id: shopp-aefb5230fce9985b540fe0a540e3c3be + +info: + name: > + Shopp <= 1.4 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e83ad1b7-e7d6-41cd-87de-c98362e31879?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shopp/" + google-query: inurl:"/wp-content/plugins/shopp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shopp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shopp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shopp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shopping-pages-2cc21eace9abb2004f2ff03d1c79dbc9.yaml b/nuclei-templates/cve-less/plugins/shopping-pages-2cc21eace9abb2004f2ff03d1c79dbc9.yaml new file mode 100644 index 0000000000..d7979941fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shopping-pages-2cc21eace9abb2004f2ff03d1c79dbc9.yaml @@ -0,0 +1,58 @@ +id: shopping-pages-2cc21eace9abb2004f2ff03d1c79dbc9 + +info: + name: > + WP Shopping Pages <= 1.14 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f20c7d3-8987-4dc0-9d97-98a29adbab85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shopping-pages/" + google-query: inurl:"/wp-content/plugins/shopping-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shopping-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shopping-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shopping-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-addons-51577bdf9a059e7edb1dda702623d2b6.yaml b/nuclei-templates/cve-less/plugins/shortcode-addons-51577bdf9a059e7edb1dda702623d2b6.yaml new file mode 100644 index 0000000000..b9f875434a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-addons-51577bdf9a059e7edb1dda702623d2b6.yaml @@ -0,0 +1,58 @@ +id: shortcode-addons-51577bdf9a059e7edb1dda702623d2b6 + +info: + name: > + Shortcode Addons- with Visual Composer, Divi, Beaver Builder and Elementor Extension <= 3.1.2 - Authenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56439ae3-bdbc-4c57-abf4-8c94dea8c6f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-addons/" + google-query: inurl:"/wp-content/plugins/shortcode-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-addons-a26b1ca65400b2d024a19fa1088625ac.yaml b/nuclei-templates/cve-less/plugins/shortcode-addons-a26b1ca65400b2d024a19fa1088625ac.yaml new file mode 100644 index 0000000000..f2fbd05371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-addons-a26b1ca65400b2d024a19fa1088625ac.yaml @@ -0,0 +1,58 @@ +id: shortcode-addons-a26b1ca65400b2d024a19fa1088625ac + +info: + name: > + Shortcode Addons- with Visual Composer, Divi, Beaver Builder and Elementor Extension <= 3.0.2 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fa5ba38-0b6f-4eec-aac1-1c3806f0d040?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-addons/" + google-query: inurl:"/wp-content/plugins/shortcode-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-addons-e51458c52ee75e442332748b235c894d.yaml b/nuclei-templates/cve-less/plugins/shortcode-addons-e51458c52ee75e442332748b235c894d.yaml new file mode 100644 index 0000000000..e09b85de3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-addons-e51458c52ee75e442332748b235c894d.yaml @@ -0,0 +1,58 @@ +id: shortcode-addons-e51458c52ee75e442332748b235c894d + +info: + name: > + Shortcode Addons <= 3.2.5 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9addaa26-46b3-4fbf-8986-0b8c8f2dd286?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-addons/" + google-query: inurl:"/wp-content/plugins/shortcode-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-factory-0b1685f3bb7d2556abd3f8a3adda5904.yaml b/nuclei-templates/cve-less/plugins/shortcode-factory-0b1685f3bb7d2556abd3f8a3adda5904.yaml new file mode 100644 index 0000000000..71b447d40d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-factory-0b1685f3bb7d2556abd3f8a3adda5904.yaml @@ -0,0 +1,58 @@ +id: shortcode-factory-0b1685f3bb7d2556abd3f8a3adda5904 + +info: + name: > + Shortcode Factory <= 2.7 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b829b7a1-2891-402b-a48f-a7fb1202448e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-factory/" + google-query: inurl:"/wp-content/plugins/shortcode-factory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-factory,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-factory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-factory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-factory-d0a3ff8d18b2421520c07ab45424de7d.yaml b/nuclei-templates/cve-less/plugins/shortcode-factory-d0a3ff8d18b2421520c07ab45424de7d.yaml new file mode 100644 index 0000000000..e5d033fdcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-factory-d0a3ff8d18b2421520c07ab45424de7d.yaml @@ -0,0 +1,58 @@ +id: shortcode-factory-d0a3ff8d18b2421520c07ab45424de7d + +info: + name: > + Shortcode Factory <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a90e1628-3490-4aac-9e82-b3b9692813f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-factory/" + google-query: inurl:"/wp-content/plugins/shortcode-factory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-factory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-factory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-factory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-for-current-date-237f09cf608b33e2d885ba45327a8a92.yaml b/nuclei-templates/cve-less/plugins/shortcode-for-current-date-237f09cf608b33e2d885ba45327a8a92.yaml new file mode 100644 index 0000000000..fce4055b70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-for-current-date-237f09cf608b33e2d885ba45327a8a92.yaml @@ -0,0 +1,58 @@ +id: shortcode-for-current-date-237f09cf608b33e2d885ba45327a8a92 + +info: + name: > + Shortcode for Current Date <= 2.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/350719b1-0e88-4f6f-979e-0ac3d17b852b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-for-current-date/" + google-query: inurl:"/wp-content/plugins/shortcode-for-current-date/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-for-current-date,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-for-current-date/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-for-current-date" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-for-current-date-baf7113ec23d15f1819896037517b713.yaml b/nuclei-templates/cve-less/plugins/shortcode-for-current-date-baf7113ec23d15f1819896037517b713.yaml new file mode 100644 index 0000000000..d74325dee1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-for-current-date-baf7113ec23d15f1819896037517b713.yaml @@ -0,0 +1,58 @@ +id: shortcode-for-current-date-baf7113ec23d15f1819896037517b713 + +info: + name: > + Shortcode For Current Date <= 2.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1917eabd-0ba2-4878-87ea-8c0c9c00b6f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-for-current-date/" + google-query: inurl:"/wp-content/plugins/shortcode-for-current-date/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-for-current-date,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-for-current-date/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-for-current-date" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-for-font-awesome-a7ddbb09fcd7198bac10f4c61d87a90f.yaml b/nuclei-templates/cve-less/plugins/shortcode-for-font-awesome-a7ddbb09fcd7198bac10f4c61d87a90f.yaml new file mode 100644 index 0000000000..3079ab2bd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-for-font-awesome-a7ddbb09fcd7198bac10f4c61d87a90f.yaml @@ -0,0 +1,58 @@ +id: shortcode-for-font-awesome-a7ddbb09fcd7198bac10f4c61d87a90f + +info: + name: > + Shortcode for Font Awesome <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8d06b5d-43b8-4dae-abe9-abe07a63528e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-for-font-awesome/" + google-query: inurl:"/wp-content/plugins/shortcode-for-font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-for-font-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-for-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-for-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-1c68ed9adb5cb9e4bd046ceebf588774.yaml b/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-1c68ed9adb5cb9e4bd046ceebf588774.yaml new file mode 100644 index 0000000000..8bef2fd213 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-1c68ed9adb5cb9e4bd046ceebf588774.yaml @@ -0,0 +1,58 @@ +id: shortcode-gallery-for-matterport-showcase-1c68ed9adb5cb9e4bd046ceebf588774 + +info: + name: > + WP Matterport Shortcode <= 2.1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b76ce38-d9ee-4998-ba3b-9f21158ce18a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-gallery-for-matterport-showcase/" + google-query: inurl:"/wp-content/plugins/shortcode-gallery-for-matterport-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-gallery-for-matterport-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-gallery-for-matterport-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-gallery-for-matterport-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-3e2e342247ff105c5df7ef4d8c77821d.yaml b/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-3e2e342247ff105c5df7ef4d8c77821d.yaml new file mode 100644 index 0000000000..1959d1fdfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-3e2e342247ff105c5df7ef4d8c77821d.yaml @@ -0,0 +1,58 @@ +id: shortcode-gallery-for-matterport-showcase-3e2e342247ff105c5df7ef4d8c77821d + +info: + name: > + WP Matterport Shortcode <= 2.1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e03aeed-abb3-4ac8-8ff5-72ddc2430b94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-gallery-for-matterport-showcase/" + google-query: inurl:"/wp-content/plugins/shortcode-gallery-for-matterport-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-gallery-for-matterport-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-gallery-for-matterport-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-gallery-for-matterport-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-619a199c4aef0c8ec4b0e45c8c920810.yaml b/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-619a199c4aef0c8ec4b0e45c8c920810.yaml new file mode 100644 index 0000000000..ae8350ebfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-619a199c4aef0c8ec4b0e45c8c920810.yaml @@ -0,0 +1,58 @@ +id: shortcode-gallery-for-matterport-showcase-619a199c4aef0c8ec4b0e45c8c920810 + +info: + name: > + WP Matterport Shortcode <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/744310b2-ebe9-4dd5-8f18-6ba72c52dd61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-gallery-for-matterport-showcase/" + google-query: inurl:"/wp-content/plugins/shortcode-gallery-for-matterport-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-gallery-for-matterport-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-gallery-for-matterport-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-gallery-for-matterport-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-9ba37298cb6084c9a432846276355e13.yaml b/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-9ba37298cb6084c9a432846276355e13.yaml new file mode 100644 index 0000000000..0841a8756a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-gallery-for-matterport-showcase-9ba37298cb6084c9a432846276355e13.yaml @@ -0,0 +1,58 @@ +id: shortcode-gallery-for-matterport-showcase-9ba37298cb6084c9a432846276355e13 + +info: + name: > + WP Matterport Shortcode <= 2.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af48906b-f7b2-45ec-b0c1-1ac521106759?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-gallery-for-matterport-showcase/" + google-query: inurl:"/wp-content/plugins/shortcode-gallery-for-matterport-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-gallery-for-matterport-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-gallery-for-matterport-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-gallery-for-matterport-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-imdb-05c667ea35f9abbc77504891932e218e.yaml b/nuclei-templates/cve-less/plugins/shortcode-imdb-05c667ea35f9abbc77504891932e218e.yaml new file mode 100644 index 0000000000..2abeaa9e8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-imdb-05c667ea35f9abbc77504891932e218e.yaml @@ -0,0 +1,58 @@ +id: shortcode-imdb-05c667ea35f9abbc77504891932e218e + +info: + name: > + Shortcode IMDB <= 6.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/088e0d77-06bf-4420-88fb-2c6f8051ece5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-imdb/" + google-query: inurl:"/wp-content/plugins/shortcode-imdb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-imdb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-imdb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-imdb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-imdb-568ee8060d1c0b8a7ff761ffdaf606b0.yaml b/nuclei-templates/cve-less/plugins/shortcode-imdb-568ee8060d1c0b8a7ff761ffdaf606b0.yaml new file mode 100644 index 0000000000..5639e30e5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-imdb-568ee8060d1c0b8a7ff761ffdaf606b0.yaml @@ -0,0 +1,58 @@ +id: shortcode-imdb-568ee8060d1c0b8a7ff761ffdaf606b0 + +info: + name: > + Shortcode IMDB <= 6.0.8 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ae6bf2e-b39a-4bb3-9203-22ff4c23ddf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-imdb/" + google-query: inurl:"/wp-content/plugins/shortcode-imdb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-imdb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-imdb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-imdb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-menu-0d3480d611d68322f3807ad912f13fa3.yaml b/nuclei-templates/cve-less/plugins/shortcode-menu-0d3480d611d68322f3807ad912f13fa3.yaml new file mode 100644 index 0000000000..23d58eddba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-menu-0d3480d611d68322f3807ad912f13fa3.yaml @@ -0,0 +1,58 @@ +id: shortcode-menu-0d3480d611d68322f3807ad912f13fa3 + +info: + name: > + Shortcode Menu <= 3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/438b9c13-4059-4671-ab4a-07a8cf6f6122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-menu/" + google-query: inurl:"/wp-content/plugins/shortcode-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-ninja-382f2dc0e3689fe8f1bed64d23fca41f.yaml b/nuclei-templates/cve-less/plugins/shortcode-ninja-382f2dc0e3689fe8f1bed64d23fca41f.yaml new file mode 100644 index 0000000000..1c94c4b12f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-ninja-382f2dc0e3689fe8f1bed64d23fca41f.yaml @@ -0,0 +1,58 @@ +id: shortcode-ninja-382f2dc0e3689fe8f1bed64d23fca41f + +info: + name: > + Shortcode Ninja <= 1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b51ebf-4ae6-45b6-9eb3-dcfaeb8a06bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-ninja/" + google-query: inurl:"/wp-content/plugins/shortcode-ninja/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-ninja,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-ninja/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-ninja" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-redirect-552fdceb70e178ef12665118f36af7cf.yaml b/nuclei-templates/cve-less/plugins/shortcode-redirect-552fdceb70e178ef12665118f36af7cf.yaml new file mode 100644 index 0000000000..ff10168776 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-redirect-552fdceb70e178ef12665118f36af7cf.yaml @@ -0,0 +1,58 @@ +id: shortcode-redirect-552fdceb70e178ef12665118f36af7cf + +info: + name: > + Shortcode Redirect <= 1.0.01 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2821d32e-386b-4d6a-8079-b6b184d1d266?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-redirect/" + google-query: inurl:"/wp-content/plugins/shortcode-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-3558264fbd3bd3c84b28ca0ff40cd986.yaml b/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-3558264fbd3bd3c84b28ca0ff40cd986.yaml new file mode 100644 index 0000000000..e6c5f1390b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-3558264fbd3bd3c84b28ca0ff40cd986.yaml @@ -0,0 +1,58 @@ +id: shortcode-to-display-post-and-user-data-3558264fbd3bd3c84b28ca0ff40cd986 + +info: + name: > + Display custom fields in the frontend – Post and User Profile Fields <= 1.2.1 - Authenticated (Contributor+) Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0662c3a-5b82-4b9a-aa69-147094930d1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-to-display-post-and-user-data/" + google-query: inurl:"/wp-content/plugins/shortcode-to-display-post-and-user-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-to-display-post-and-user-data,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-to-display-post-and-user-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-to-display-post-and-user-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-6d61e0b46b881d3a5609918a45b30992.yaml b/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-6d61e0b46b881d3a5609918a45b30992.yaml new file mode 100644 index 0000000000..28476dd8c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-6d61e0b46b881d3a5609918a45b30992.yaml @@ -0,0 +1,58 @@ +id: shortcode-to-display-post-and-user-data-6d61e0b46b881d3a5609918a45b30992 + +info: + name: > + Display custom fields in the frontend – Post and User Profile Fields <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via vg_display_data + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3077b84e-87af-4307-83c5-0e4b15d07ff1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-to-display-post-and-user-data/" + google-query: inurl:"/wp-content/plugins/shortcode-to-display-post-and-user-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-to-display-post-and-user-data,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-to-display-post-and-user-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-to-display-post-and-user-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-a2374460bb7e70d55eb2c8c43ce8140b.yaml b/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-a2374460bb7e70d55eb2c8c43ce8140b.yaml new file mode 100644 index 0000000000..de76d9974a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-a2374460bb7e70d55eb2c8c43ce8140b.yaml @@ -0,0 +1,58 @@ +id: shortcode-to-display-post-and-user-data-a2374460bb7e70d55eb2c8c43ce8140b + +info: + name: > + Display custom fields in the frontend – Post and User Profile Fields <= 1.2.0 - Missing Authorization via vg_display_data shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdf3b629-c1a2-4fdd-b7fc-d3550bd30857?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-to-display-post-and-user-data/" + google-query: inurl:"/wp-content/plugins/shortcode-to-display-post-and-user-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-to-display-post-and-user-data,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-to-display-post-and-user-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-to-display-post-and-user-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-a8aacb001d1b5ea46e16ff44cb2daa72.yaml b/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-a8aacb001d1b5ea46e16ff44cb2daa72.yaml new file mode 100644 index 0000000000..1d83e993a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcode-to-display-post-and-user-data-a8aacb001d1b5ea46e16ff44cb2daa72.yaml @@ -0,0 +1,58 @@ +id: shortcode-to-display-post-and-user-data-a8aacb001d1b5ea46e16ff44cb2daa72 + +info: + name: > + Display custom fields in the frontend – Post and User Profile Fields <= 1.2.1 - Insecure Direct Object Reference to Authenticated (Contributor+) Post Meta Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08d43c67-df40-4f1a-a351-803e59edee13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcode-to-display-post-and-user-data/" + google-query: inurl:"/wp-content/plugins/shortcode-to-display-post-and-user-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcode-to-display-post-and-user-data,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcode-to-display-post-and-user-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcode-to-display-post-and-user-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcoder-30441a12301c990d7aaae2342a03a490.yaml b/nuclei-templates/cve-less/plugins/shortcoder-30441a12301c990d7aaae2342a03a490.yaml new file mode 100644 index 0000000000..01681fd31c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcoder-30441a12301c990d7aaae2342a03a490.yaml @@ -0,0 +1,58 @@ +id: shortcoder-30441a12301c990d7aaae2342a03a490 + +info: + name: > + Shortcoder <= 6.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a54ad0b4-b6e7-4eac-843e-261ec6c83d84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcoder/" + google-query: inurl:"/wp-content/plugins/shortcoder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcoder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcoder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcoder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-finder-0a2d3f8adac7ce1d181ce17764b6e0b6.yaml b/nuclei-templates/cve-less/plugins/shortcodes-finder-0a2d3f8adac7ce1d181ce17764b6e0b6.yaml new file mode 100644 index 0000000000..3aa51432cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-finder-0a2d3f8adac7ce1d181ce17764b6e0b6.yaml @@ -0,0 +1,58 @@ +id: shortcodes-finder-0a2d3f8adac7ce1d181ce17764b6e0b6 + +info: + name: > + Shortcodes Finder <= 1.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/299c4290-dc7e-44fb-887e-e3e53d3c070b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-finder/" + google-query: inurl:"/wp-content/plugins/shortcodes-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-finder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-finder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-finder-f57a6c83ef919f8797158e43c847775c.yaml b/nuclei-templates/cve-less/plugins/shortcodes-finder-f57a6c83ef919f8797158e43c847775c.yaml new file mode 100644 index 0000000000..5e7959110d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-finder-f57a6c83ef919f8797158e43c847775c.yaml @@ -0,0 +1,58 @@ +id: shortcodes-finder-f57a6c83ef919f8797158e43c847775c + +info: + name: > + Shortcodes Finder <= 1.5.4 - Reflected Cross-Site Scripting via nonce + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8eb77a53-4aea-46c3-8eea-a16f728dfa23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-finder/" + google-query: inurl:"/wp-content/plugins/shortcodes-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-finder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-finder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ui-2dbf94e1363346187fd0d9415f21a87d.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ui-2dbf94e1363346187fd0d9415f21a87d.yaml new file mode 100644 index 0000000000..4dd4b30e18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ui-2dbf94e1363346187fd0d9415f21a87d.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ui-2dbf94e1363346187fd0d9415f21a87d + +info: + name: > + ShortCodes UI <= 1.9.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6c14c65-a47c-4dc1-9d5a-f804061152e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ui/" + google-query: inurl:"/wp-content/plugins/shortcodes-ui/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ui,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ui/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ui" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ui-464b854a586427e5e143e4896c8caafc.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ui-464b854a586427e5e143e4896c8caafc.yaml new file mode 100644 index 0000000000..859cc1be7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ui-464b854a586427e5e143e4896c8caafc.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ui-464b854a586427e5e143e4896c8caafc + +info: + name: > + ShortCodes UI <= 1.9.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90e69e43-597c-4c18-b581-d99dacefb9b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ui/" + google-query: inurl:"/wp-content/plugins/shortcodes-ui/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ui,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ui/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ui" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-0445de609fc885d2b170effe241e7510.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-0445de609fc885d2b170effe241e7510.yaml new file mode 100644 index 0000000000..b49c92e488 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-0445de609fc885d2b170effe241e7510.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-0445de609fc885d2b170effe241e7510 + +info: + name: > + Shortcodes Ultimate <= 5.12.6 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bb6caf6-5676-49cd-8577-5a41b44b00c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-051c86487ea054ab8374342c3d7fd783.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-051c86487ea054ab8374342c3d7fd783.yaml new file mode 100644 index 0000000000..d07d870a5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-051c86487ea054ab8374342c3d7fd783.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-051c86487ea054ab8374342c3d7fd783 + +info: + name: > + Shortcodes Ultimate <= 5.12.7 - Authenticated (Subscriber+) Arbitrary Post Access via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2eddfe94-7232-4d3d-9f3a-f53fc476a012?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-235127c1445e6eee4f6de6fb13cf776e.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-235127c1445e6eee4f6de6fb13cf776e.yaml new file mode 100644 index 0000000000..bb78030cb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-235127c1445e6eee4f6de6fb13cf776e.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-235127c1445e6eee4f6de6fb13cf776e + +info: + name: > + WordPress Shortcodes Plugin — Shortcodes Ultimate <= 5.0.0 - Authenticated Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e703d411-d608-43cc-8806-1d1e837cf797?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-2b8f19b8c01bfb1b9a5352e232b91e8f.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-2b8f19b8c01bfb1b9a5352e232b91e8f.yaml new file mode 100644 index 0000000000..11149fff48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-2b8f19b8c01bfb1b9a5352e232b91e8f.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-2b8f19b8c01bfb1b9a5352e232b91e8f + +info: + name: > + Shortcodes Ultimate <= 5.12.6 - Authenticated (Subscriber+) Arbitrary File Read via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dad7348-39ba-4163-a5eb-939601645edb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-40c38cbf6914f34e30e735daee9d90f9.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-40c38cbf6914f34e30e735daee9d90f9.yaml new file mode 100644 index 0000000000..1474b3ee63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-40c38cbf6914f34e30e735daee9d90f9.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-40c38cbf6914f34e30e735daee9d90f9 + +info: + name: > + Shortcodes Ultimate <= 7.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'note_color' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bae6d3a-40eb-4af6-be4e-9bc6be1a4b07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-49026b84d0c7a958dfce935cb3d41d0b.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-49026b84d0c7a958dfce935cb3d41d0b.yaml new file mode 100644 index 0000000000..bc8682c670 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-49026b84d0c7a958dfce935cb3d41d0b.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-49026b84d0c7a958dfce935cb3d41d0b + +info: + name: > + WordPress Shortcodes Plugin — Shortcodes Ultimate <= 5.10.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98f87769-d4e4-4e27-9acf-a4e52bdbf734?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-5f9c4587b984a64216df76781ce699a0.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-5f9c4587b984a64216df76781ce699a0.yaml new file mode 100644 index 0000000000..efb9a2cca5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-5f9c4587b984a64216df76781ce699a0.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-5f9c4587b984a64216df76781ce699a0 + +info: + name: > + WP Shortcodes Plugin — Shortcodes Ultimate <= 7.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via su_qrcode Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96769a0e-d4a9-4196-8ded-b600046c0943?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-61bcaa4eb5a8e67da44b4e8cf864a6f5.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-61bcaa4eb5a8e67da44b4e8cf864a6f5.yaml new file mode 100644 index 0000000000..62ff652dac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-61bcaa4eb5a8e67da44b4e8cf864a6f5.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-61bcaa4eb5a8e67da44b4e8cf864a6f5 + +info: + name: > + WP Shortcodes Plugin — Shortcodes Ultimate <= 7.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf7b0f1b-a6d3-4a96-adaa-0adeb6ea2efd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-6211c1f22472d646cc232f92f882834f.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-6211c1f22472d646cc232f92f882834f.yaml new file mode 100644 index 0000000000..fe0e230ebf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-6211c1f22472d646cc232f92f882834f.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-6211c1f22472d646cc232f92f882834f + +info: + name: > + Shortcodes Ultimate <= 5.12.6 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d449466d-e78a-48a3-8eff-90b56646dd6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-63222bd033aa9c6bf238fe6f7d23725d.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-63222bd033aa9c6bf238fe6f7d23725d.yaml new file mode 100644 index 0000000000..96a661eada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-63222bd033aa9c6bf238fe6f7d23725d.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-63222bd033aa9c6bf238fe6f7d23725d + +info: + name: > + WP Shortcodes Plugin — Shortcodes Ultimate <= 5.13.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/558e36f6-4678-46a2-8154-42770fbb5574?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-7485c7376b8dcdbe05490b2d21b9e0de.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-7485c7376b8dcdbe05490b2d21b9e0de.yaml new file mode 100644 index 0000000000..110fa81500 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-7485c7376b8dcdbe05490b2d21b9e0de.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-7485c7376b8dcdbe05490b2d21b9e0de + +info: + name: > + WP Shortcodes Plugin — Shortcodes Ultimate <= 7.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via su_lightbox + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71564eec-426a-46fa-b614-388bebae6ebd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-88b0cb27fd508341f3181a16f7fa23a3.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-88b0cb27fd508341f3181a16f7fa23a3.yaml new file mode 100644 index 0000000000..11cf8d23fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-88b0cb27fd508341f3181a16f7fa23a3.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-88b0cb27fd508341f3181a16f7fa23a3 + +info: + name: > + Shortcodes Ultimate <= 5.12.7 - Authenticated (Subscriber+) Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/144895c9-5800-435e-9f75-a8de17ca2d93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-9485da9dcc7a2c1f998297394d9f2737.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-9485da9dcc7a2c1f998297394d9f2737.yaml new file mode 100644 index 0000000000..832edd15e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-9485da9dcc7a2c1f998297394d9f2737.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-9485da9dcc7a2c1f998297394d9f2737 + +info: + name: > + Shortcodes Ultimate <= 5.12.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02540fe4-b690-46ab-b79b-a90c8d796ec4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-aad87c0bfd109df2ae9940475ba0f22b.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-aad87c0bfd109df2ae9940475ba0f22b.yaml new file mode 100644 index 0000000000..e2bf72a973 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-aad87c0bfd109df2ae9940475ba0f22b.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-aad87c0bfd109df2ae9940475ba0f22b + +info: + name: > + Shortcodes Ultimate <= 5.12.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ac1d65c-5e09-41ca-809b-2ab3ab5f62af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-b0748dc23e38f40e5e4a1c508a030889.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-b0748dc23e38f40e5e4a1c508a030889.yaml new file mode 100644 index 0000000000..560ededba4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-b0748dc23e38f40e5e4a1c508a030889.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-b0748dc23e38f40e5e4a1c508a030889 + +info: + name: > + WordPress Shortcodes Plugin — Shortcodes Ultimate < 4.10.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58a4cb88-033e-48f4-b6fa-2a9754ab6a7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-b5878d0522eaa3cc7d6330e71db266d0.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-b5878d0522eaa3cc7d6330e71db266d0.yaml new file mode 100644 index 0000000000..1ee6d7de64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-b5878d0522eaa3cc7d6330e71db266d0.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-b5878d0522eaa3cc7d6330e71db266d0 + +info: + name: > + WP Shortcodes Plugin — Shortcodes Ultimate <= 5.13.3 - Insecure Direct Object Reference to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d936a48-b300-4a41-8d28-ba34cb3c5cb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-cdab814f5acb52d3219d4930f7ee1f81.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-cdab814f5acb52d3219d4930f7ee1f81.yaml new file mode 100644 index 0000000000..6e5539bc04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-cdab814f5acb52d3219d4930f7ee1f81.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-cdab814f5acb52d3219d4930f7ee1f81 + +info: + name: > + WP Shortcodes Plugin — Shortcodes Ultimate <= 7.0.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d8c043c-e347-4dc8-8a72-943a7e6c4394?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-dbe0cc2eb5dbae77d4244d0de7839b9b.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-dbe0cc2eb5dbae77d4244d0de7839b9b.yaml new file mode 100644 index 0000000000..8b1a6b2bff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-dbe0cc2eb5dbae77d4244d0de7839b9b.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-dbe0cc2eb5dbae77d4244d0de7839b9b + +info: + name: > + Shortcodes Ultimate <= 5.12.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/431331aa-4d9f-41f2-a522-567bbd9b8831?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-dca1a97a6a5540d73d22b80fbffbb729.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-dca1a97a6a5540d73d22b80fbffbb729.yaml new file mode 100644 index 0000000000..4bee76797a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-dca1a97a6a5540d73d22b80fbffbb729.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-dca1a97a6a5540d73d22b80fbffbb729 + +info: + name: > + WP Shortcodes Plugin — Shortcodes Ultimate <= 7.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50a89ad1-a3d0-49e3-8d2e-4cb81ac115ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-e188a014b244e93ae49b1e82bb73babe.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-e188a014b244e93ae49b1e82bb73babe.yaml new file mode 100644 index 0000000000..05ede6c71a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-e188a014b244e93ae49b1e82bb73babe.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-e188a014b244e93ae49b1e82bb73babe + +info: + name: > + WordPress Shortcodes Plugin — Shortcodes Ultimate <= 4.9.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baa720d6-1891-4557-a744-830be56862e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-edf5537839b9111e9296303d5a76a556.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-edf5537839b9111e9296303d5a76a556.yaml new file mode 100644 index 0000000000..bd0de4927a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-edf5537839b9111e9296303d5a76a556.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-edf5537839b9111e9296303d5a76a556 + +info: + name: > + WP Shortcodes Plugin — Shortcodes Ultimate <= 7.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via su_tooltip Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee03d780-076b-4501-a353-376198a4bd7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcodes-ultimate-f46955793d003bf5208172175382fed1.yaml b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-f46955793d003bf5208172175382fed1.yaml new file mode 100644 index 0000000000..8c9b7d3d29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcodes-ultimate-f46955793d003bf5208172175382fed1.yaml @@ -0,0 +1,58 @@ +id: shortcodes-ultimate-f46955793d003bf5208172175382fed1 + +info: + name: > + Shortcodes Ultimate <= 7.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b6f6f93-4c24-4b81-bd5d-470f6dccab92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcodes-ultimate/" + google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcodes-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcodes-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortcut-macros-7c4f098f276bb438e8b06c67cf08748e.yaml b/nuclei-templates/cve-less/plugins/shortcut-macros-7c4f098f276bb438e8b06c67cf08748e.yaml new file mode 100644 index 0000000000..50755f5e9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortcut-macros-7c4f098f276bb438e8b06c67cf08748e.yaml @@ -0,0 +1,58 @@ +id: shortcut-macros-7c4f098f276bb438e8b06c67cf08748e + +info: + name: > + Shortcut Macros <= 1.3 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/954ef157-ecd1-42bd-b288-d5866b9c11f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortcut-macros/" + google-query: inurl:"/wp-content/plugins/shortcut-macros/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortcut-macros,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortcut-macros/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortcut-macros" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shorten-url-1b17b31db5584b79d66232be582b7de6.yaml b/nuclei-templates/cve-less/plugins/shorten-url-1b17b31db5584b79d66232be582b7de6.yaml new file mode 100644 index 0000000000..eaaa71dbe7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shorten-url-1b17b31db5584b79d66232be582b7de6.yaml @@ -0,0 +1,58 @@ +id: shorten-url-1b17b31db5584b79d66232be582b7de6 + +info: + name: > + Short URL <= 1.6.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95c5a219-0b04-424c-a3dd-d705b1b41ddc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shorten-url/" + google-query: inurl:"/wp-content/plugins/shorten-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shorten-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shorten-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shorten-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shorten-url-258545baa917b7571f477b428889162e.yaml b/nuclei-templates/cve-less/plugins/shorten-url-258545baa917b7571f477b428889162e.yaml new file mode 100644 index 0000000000..0ec6eb2273 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shorten-url-258545baa917b7571f477b428889162e.yaml @@ -0,0 +1,58 @@ +id: shorten-url-258545baa917b7571f477b428889162e + +info: + name: > + Short URL <= 1.6.8 - Missing Authorization via multiple AJAX functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a83061c0-d8d3-4dbe-bf2a-65350d17094b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shorten-url/" + google-query: inurl:"/wp-content/plugins/shorten-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shorten-url,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shorten-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shorten-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shorten-url-6098ffaf0f2018e72b2fddb1b0994b64.yaml b/nuclei-templates/cve-less/plugins/shorten-url-6098ffaf0f2018e72b2fddb1b0994b64.yaml new file mode 100644 index 0000000000..1b57fd7af3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shorten-url-6098ffaf0f2018e72b2fddb1b0994b64.yaml @@ -0,0 +1,58 @@ +id: shorten-url-6098ffaf0f2018e72b2fddb1b0994b64 + +info: + name: > + Short URL <= 1.6.4 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5f29f35-da79-4389-a0a5-a1be0b0b8996?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shorten-url/" + google-query: inurl:"/wp-content/plugins/shorten-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shorten-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shorten-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shorten-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shorten-url-b16f37785fe5e86af56a0da58078826e.yaml b/nuclei-templates/cve-less/plugins/shorten-url-b16f37785fe5e86af56a0da58078826e.yaml new file mode 100644 index 0000000000..fbe0724c5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shorten-url-b16f37785fe5e86af56a0da58078826e.yaml @@ -0,0 +1,58 @@ +id: shorten-url-b16f37785fe5e86af56a0da58078826e + +info: + name: > + Short URL <= 1.6.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e6d4ad1-0fcc-43d9-b997-126782718c28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shorten-url/" + google-query: inurl:"/wp-content/plugins/shorten-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shorten-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shorten-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shorten-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shorten-url-cd46d97404c66642d7eaa5afb0766ece.yaml b/nuclei-templates/cve-less/plugins/shorten-url-cd46d97404c66642d7eaa5afb0766ece.yaml new file mode 100644 index 0000000000..1db8819376 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shorten-url-cd46d97404c66642d7eaa5afb0766ece.yaml @@ -0,0 +1,58 @@ +id: shorten-url-cd46d97404c66642d7eaa5afb0766ece + +info: + name: > + Short URL <= 1.6.4 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/814fcd67-9788-4392-8910-7a2bc8782fd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shorten-url/" + google-query: inurl:"/wp-content/plugins/shorten-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shorten-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shorten-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shorten-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shorten-url-e61dc6652abcb067051b61e901442c72.yaml b/nuclei-templates/cve-less/plugins/shorten-url-e61dc6652abcb067051b61e901442c72.yaml new file mode 100644 index 0000000000..7535e41e77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shorten-url-e61dc6652abcb067051b61e901442c72.yaml @@ -0,0 +1,58 @@ +id: shorten-url-e61dc6652abcb067051b61e901442c72 + +info: + name: > + Short URL <= 1.6.7 - Missing Authorization via multiple AJAX functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcd05142-9700-46a8-9ca6-f85e81dfee0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shorten-url/" + google-query: inurl:"/wp-content/plugins/shorten-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shorten-url,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shorten-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shorten-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shorten-url-ed44a5e289d05299409a4dd60c060b57.yaml b/nuclei-templates/cve-less/plugins/shorten-url-ed44a5e289d05299409a4dd60c060b57.yaml new file mode 100644 index 0000000000..dd51d58e3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shorten-url-ed44a5e289d05299409a4dd60c060b57.yaml @@ -0,0 +1,58 @@ +id: shorten-url-ed44a5e289d05299409a4dd60c060b57 + +info: + name: > + Short URL <= 1.6.4 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86908097-a5b2-427a-85c9-fbe29b519883?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shorten-url/" + google-query: inurl:"/wp-content/plugins/shorten-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shorten-url,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shorten-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shorten-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-0cf023eb74228b9523fd8b71152bf7de.yaml b/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-0cf023eb74228b9523fd8b71152bf7de.yaml new file mode 100644 index 0000000000..382029ce65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-0cf023eb74228b9523fd8b71152bf7de.yaml @@ -0,0 +1,58 @@ +id: shortpixel-adaptive-images-0cf023eb74228b9523fd8b71152bf7de + +info: + name: > + ShortPixel Adaptive Images <= 3.8.2 - Missing Authorization in activate_ai_handler and deactivate_ai_handler + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e3110ae-5e82-4176-bf9d-6c56b13f9c27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortpixel-adaptive-images/" + google-query: inurl:"/wp-content/plugins/shortpixel-adaptive-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortpixel-adaptive-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortpixel-adaptive-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortpixel-adaptive-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-40682ba05fa0921516b4be5a1906460e.yaml b/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-40682ba05fa0921516b4be5a1906460e.yaml new file mode 100644 index 0000000000..7d823c6b05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-40682ba05fa0921516b4be5a1906460e.yaml @@ -0,0 +1,58 @@ +id: shortpixel-adaptive-images-40682ba05fa0921516b4be5a1906460e + +info: + name: > + ShortPixel Adaptive Images <= 3.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acb8c11f-e175-4361-b016-e1ebc1713be0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortpixel-adaptive-images/" + google-query: inurl:"/wp-content/plugins/shortpixel-adaptive-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortpixel-adaptive-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortpixel-adaptive-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortpixel-adaptive-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-53f8d45b4de3c175288d6c924b71f816.yaml b/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-53f8d45b4de3c175288d6c924b71f816.yaml new file mode 100644 index 0000000000..4510895b9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-53f8d45b4de3c175288d6c924b71f816.yaml @@ -0,0 +1,58 @@ +id: shortpixel-adaptive-images-53f8d45b4de3c175288d6c924b71f816 + +info: + name: > + ShortPixel Adaptive Images <= 3.7.1 - Cross-Site Request Forgery via shortpixel_ai_handle_page_action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94ed918c-8f6f-4e1f-ab1d-e16632831951?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortpixel-adaptive-images/" + google-query: inurl:"/wp-content/plugins/shortpixel-adaptive-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortpixel-adaptive-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortpixel-adaptive-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortpixel-adaptive-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-a49400e133fec50151a4f33acb299a5e.yaml b/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-a49400e133fec50151a4f33acb299a5e.yaml new file mode 100644 index 0000000000..e43819da34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortpixel-adaptive-images-a49400e133fec50151a4f33acb299a5e.yaml @@ -0,0 +1,58 @@ +id: shortpixel-adaptive-images-a49400e133fec50151a4f33acb299a5e + +info: + name: > + ShortPixel Adaptive Images <= 3.3.1 - Subscriber+ Arbitrary Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/179751c8-a634-4a2e-be29-46be0aad79c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortpixel-adaptive-images/" + google-query: inurl:"/wp-content/plugins/shortpixel-adaptive-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortpixel-adaptive-images,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortpixel-adaptive-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortpixel-adaptive-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortpixel-critical-css-d937680a60653a1af5b2a6c9c069ec41.yaml b/nuclei-templates/cve-less/plugins/shortpixel-critical-css-d937680a60653a1af5b2a6c9c069ec41.yaml new file mode 100644 index 0000000000..5cea0bf509 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortpixel-critical-css-d937680a60653a1af5b2a6c9c069ec41.yaml @@ -0,0 +1,58 @@ +id: shortpixel-critical-css-d937680a60653a1af5b2a6c9c069ec41 + +info: + name: > + ShortPixel Critical CSS <= 1.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4f0513-ac9c-4eaf-b3ce-3a7c47908ef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortpixel-critical-css/" + google-query: inurl:"/wp-content/plugins/shortpixel-critical-css/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortpixel-critical-css,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortpixel-critical-css/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortpixel-critical-css" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortpixel-image-optimiser-be0e8faaebc12ffdded98e3e60be9390.yaml b/nuclei-templates/cve-less/plugins/shortpixel-image-optimiser-be0e8faaebc12ffdded98e3e60be9390.yaml new file mode 100644 index 0000000000..4b0bbf2ce6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortpixel-image-optimiser-be0e8faaebc12ffdded98e3e60be9390.yaml @@ -0,0 +1,58 @@ +id: shortpixel-image-optimiser-be0e8faaebc12ffdded98e3e60be9390 + +info: + name: > + ShortPixel Image Optimizer <= 4.22.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f9b86a3-c68a-443f-a2f3-5f31f3280a6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortpixel-image-optimiser/" + google-query: inurl:"/wp-content/plugins/shortpixel-image-optimiser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortpixel-image-optimiser,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortpixel-image-optimiser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortpixel-image-optimiser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.22.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/shortpixel-image-optimiser-edd7c00369ad56e0646da80d37cfae3b.yaml b/nuclei-templates/cve-less/plugins/shortpixel-image-optimiser-edd7c00369ad56e0646da80d37cfae3b.yaml new file mode 100644 index 0000000000..9ee1fdf4a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/shortpixel-image-optimiser-edd7c00369ad56e0646da80d37cfae3b.yaml @@ -0,0 +1,58 @@ +id: shortpixel-image-optimiser-edd7c00369ad56e0646da80d37cfae3b + +info: + name: > + ShortPixel Image Optimizer <= 5.4.1 - Authenticated(Editor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f23bf62-6008-4a9c-a7ae-a2e513699684?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shortpixel-image-optimiser/" + google-query: inurl:"/wp-content/plugins/shortpixel-image-optimiser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shortpixel-image-optimiser,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shortpixel-image-optimiser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shortpixel-image-optimiser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/show-all-comments-in-one-page-48a0237cfe1dbdec835c8ee992606292.yaml b/nuclei-templates/cve-less/plugins/show-all-comments-in-one-page-48a0237cfe1dbdec835c8ee992606292.yaml new file mode 100644 index 0000000000..b5bc696fbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/show-all-comments-in-one-page-48a0237cfe1dbdec835c8ee992606292.yaml @@ -0,0 +1,58 @@ +id: show-all-comments-in-one-page-48a0237cfe1dbdec835c8ee992606292 + +info: + name: > + Show All Comments <= 7.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba385261-bee2-491d-9b31-a1624d740dff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/show-all-comments-in-one-page/" + google-query: inurl:"/wp-content/plugins/show-all-comments-in-one-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,show-all-comments-in-one-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/show-all-comments-in-one-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "show-all-comments-in-one-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/show-hidecollapse-expand-de70b1243fed8f47eec92e24941c2439.yaml b/nuclei-templates/cve-less/plugins/show-hidecollapse-expand-de70b1243fed8f47eec92e24941c2439.yaml new file mode 100644 index 0000000000..059f1050c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/show-hidecollapse-expand-de70b1243fed8f47eec92e24941c2439.yaml @@ -0,0 +1,58 @@ +id: show-hidecollapse-expand-de70b1243fed8f47eec92e24941c2439 + +info: + name: > + Show-Hide / Collapse-Expand <= 1.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/192b5920-5405-49b8-8224-3afb36f3f816?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/show-hidecollapse-expand/" + google-query: inurl:"/wp-content/plugins/show-hidecollapse-expand/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,show-hidecollapse-expand,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/show-hidecollapse-expand/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "show-hidecollapse-expand" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/show-hidecollapse-expand-f122002b6d51991b7a2676304d17940e.yaml b/nuclei-templates/cve-less/plugins/show-hidecollapse-expand-f122002b6d51991b7a2676304d17940e.yaml new file mode 100644 index 0000000000..fb035b587e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/show-hidecollapse-expand-f122002b6d51991b7a2676304d17940e.yaml @@ -0,0 +1,58 @@ +id: show-hidecollapse-expand-f122002b6d51991b7a2676304d17940e + +info: + name: > + Show-Hide / Collapse-Expand <= 1.2.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de9a945b-31fb-4d0d-9dd1-23bcef1399c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/show-hidecollapse-expand/" + google-query: inurl:"/wp-content/plugins/show-hidecollapse-expand/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,show-hidecollapse-expand,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/show-hidecollapse-expand/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "show-hidecollapse-expand" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/show-posts-0e821b289513241b63396beff87653b4.yaml b/nuclei-templates/cve-less/plugins/show-posts-0e821b289513241b63396beff87653b4.yaml new file mode 100644 index 0000000000..88d204a041 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/show-posts-0e821b289513241b63396beff87653b4.yaml @@ -0,0 +1,58 @@ +id: show-posts-0e821b289513241b63396beff87653b4 + +info: + name: > + Weaver Show Posts <= 1.6 - Authenticated(Contributor+) Stored Cross-Site Scripting via Display Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8647c44-4879-4895-bd07-19f7d62a7326?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/show-posts/" + google-query: inurl:"/wp-content/plugins/show-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,show-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/show-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "show-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/showbizpro-1cb173d5c34f023836f0c32128d87847.yaml b/nuclei-templates/cve-less/plugins/showbizpro-1cb173d5c34f023836f0c32128d87847.yaml new file mode 100644 index 0000000000..69adac0aa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/showbizpro-1cb173d5c34f023836f0c32128d87847.yaml @@ -0,0 +1,58 @@ +id: showbizpro-1cb173d5c34f023836f0c32128d87847 + +info: + name: > + Showbiz Pro Responsive Teaser WordPress Plugin <= 1.7.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05431aaa-5d8f-422c-b7ce-955a778f7f55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/showbizpro/" + google-query: inurl:"/wp-content/plugins/showbizpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,showbizpro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/showbizpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "showbizpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/showbizpro-21b56747ef932af6a293d705a4f1c993.yaml b/nuclei-templates/cve-less/plugins/showbizpro-21b56747ef932af6a293d705a4f1c993.yaml new file mode 100644 index 0000000000..2d545c85ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/showbizpro-21b56747ef932af6a293d705a4f1c993.yaml @@ -0,0 +1,58 @@ +id: showbizpro-21b56747ef932af6a293d705a4f1c993 + +info: + name: > + Slider Revolution < 3.0.96 & Showbiz Pro < 1.7.1 - Missing Authorization to Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28cb96a9-12bd-4d9c-ac53-72e81d11b0b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/showbizpro/" + google-query: inurl:"/wp-content/plugins/showbizpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,showbizpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/showbizpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "showbizpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/si-captcha-for-wordpress-f1dda6bcbed7eecbc2cee8a7403b412e.yaml b/nuclei-templates/cve-less/plugins/si-captcha-for-wordpress-f1dda6bcbed7eecbc2cee8a7403b412e.yaml new file mode 100644 index 0000000000..452fa14cec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/si-captcha-for-wordpress-f1dda6bcbed7eecbc2cee8a7403b412e.yaml @@ -0,0 +1,58 @@ +id: si-captcha-for-wordpress-f1dda6bcbed7eecbc2cee8a7403b412e + +info: + name: > + SI CAPTCHA Anti-Spam < 2.7.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7d80a23-f55d-4ab8-b139-daf5bc436d4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/si-captcha-for-wordpress/" + google-query: inurl:"/wp-content/plugins/si-captcha-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,si-captcha-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/si-captcha-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "si-captcha-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/si-contact-form-503833e43a0634ab7984563e9c441bb9.yaml b/nuclei-templates/cve-less/plugins/si-contact-form-503833e43a0634ab7984563e9c441bb9.yaml new file mode 100644 index 0000000000..794e05127b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/si-contact-form-503833e43a0634ab7984563e9c441bb9.yaml @@ -0,0 +1,58 @@ +id: si-contact-form-503833e43a0634ab7984563e9c441bb9 + +info: + name: > + Fast Secure Contact Form <= 4.0.37 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e21524e-2470-49e1-983a-a62a0ae478f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/si-contact-form/" + google-query: inurl:"/wp-content/plugins/si-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,si-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/si-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "si-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-cart-woocommerce-5dc88e8bebac4fb35e29ff329ac029fd.yaml b/nuclei-templates/cve-less/plugins/side-cart-woocommerce-5dc88e8bebac4fb35e29ff329ac029fd.yaml new file mode 100644 index 0000000000..3f3fa422d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-cart-woocommerce-5dc88e8bebac4fb35e29ff329ac029fd.yaml @@ -0,0 +1,58 @@ +id: side-cart-woocommerce-5dc88e8bebac4fb35e29ff329ac029fd + +info: + name: > + Side Cart Woocommerce (Ajax) <= 2.0 - Cross-Site Request Forgery to Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec281e0d-0217-4cdd-af31-71158bb3a25d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-cart-woocommerce/" + google-query: inurl:"/wp-content/plugins/side-cart-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-cart-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-cart-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-cart-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-cart-woocommerce-d432100581e1c6943b259719e2daead5.yaml b/nuclei-templates/cve-less/plugins/side-cart-woocommerce-d432100581e1c6943b259719e2daead5.yaml new file mode 100644 index 0000000000..b83758c70d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-cart-woocommerce-d432100581e1c6943b259719e2daead5.yaml @@ -0,0 +1,58 @@ +id: side-cart-woocommerce-d432100581e1c6943b259719e2daead5 + +info: + name: > + Side Cart Woocommerce (Ajax) <= 2.2 Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca08679-6aed-46c5-823c-6144112eed02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-cart-woocommerce/" + google-query: inurl:"/wp-content/plugins/side-cart-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-cart-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-cart-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-cart-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-cart-woocommerce-ef1305fc1419b96443cd5e83467ca803.yaml b/nuclei-templates/cve-less/plugins/side-cart-woocommerce-ef1305fc1419b96443cd5e83467ca803.yaml new file mode 100644 index 0000000000..1222502e91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-cart-woocommerce-ef1305fc1419b96443cd5e83467ca803.yaml @@ -0,0 +1,58 @@ +id: side-cart-woocommerce-ef1305fc1419b96443cd5e83467ca803 + +info: + name: > + Side Cart Woocommerce (Ajax) < 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67d2364c-6c8b-4b30-8a0e-2f9ee94a3c26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-cart-woocommerce/" + google-query: inurl:"/wp-content/plugins/side-cart-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-cart-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-cart-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-cart-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-menu-5f3c1d80f50fc6780cc9be3d160231a8.yaml b/nuclei-templates/cve-less/plugins/side-menu-5f3c1d80f50fc6780cc9be3d160231a8.yaml new file mode 100644 index 0000000000..bb5ec4517c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-menu-5f3c1d80f50fc6780cc9be3d160231a8.yaml @@ -0,0 +1,58 @@ +id: side-menu-5f3c1d80f50fc6780cc9be3d160231a8 + +info: + name: > + Side Menu – add fixed side buttons <= 3.1.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b821fb6-abc5-411f-ad6b-00b20954142c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-menu/" + google-query: inurl:"/wp-content/plugins/side-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-menu,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-menu-lite-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/side-menu-lite-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..b8ccd16542 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-menu-lite-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: side-menu-lite-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-menu-lite/" + google-query: inurl:"/wp-content/plugins/side-menu-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-menu-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-menu-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-menu-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-menu-lite-081b5b67d5d1d150a8961aa511991ad2.yaml b/nuclei-templates/cve-less/plugins/side-menu-lite-081b5b67d5d1d150a8961aa511991ad2.yaml new file mode 100644 index 0000000000..b945091992 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-menu-lite-081b5b67d5d1d150a8961aa511991ad2.yaml @@ -0,0 +1,58 @@ +id: side-menu-lite-081b5b67d5d1d150a8961aa511991ad2 + +info: + name: > + Side Menu Lite – add sticky fixed buttons <= 4.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46aa3df1-d6ef-4614-b1cc-a4c9baa8d1c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-menu-lite/" + google-query: inurl:"/wp-content/plugins/side-menu-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-menu-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-menu-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-menu-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-menu-lite-58b47ebea36b65f50bab513dec8fd081.yaml b/nuclei-templates/cve-less/plugins/side-menu-lite-58b47ebea36b65f50bab513dec8fd081.yaml new file mode 100644 index 0000000000..96ce1394c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-menu-lite-58b47ebea36b65f50bab513dec8fd081.yaml @@ -0,0 +1,58 @@ +id: side-menu-lite-58b47ebea36b65f50bab513dec8fd081 + +info: + name: > + Side Menu Lite - add sticky fixed buttons < 2.2.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93ef0a2c-2197-4c23-b5c4-5a94bd44130d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-menu-lite/" + google-query: inurl:"/wp-content/plugins/side-menu-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-menu-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-menu-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-menu-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-menu-lite-fdccd6b56f7fe69b11c256c29780a2ae.yaml b/nuclei-templates/cve-less/plugins/side-menu-lite-fdccd6b56f7fe69b11c256c29780a2ae.yaml new file mode 100644 index 0000000000..ad270216ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-menu-lite-fdccd6b56f7fe69b11c256c29780a2ae.yaml @@ -0,0 +1,58 @@ +id: side-menu-lite-fdccd6b56f7fe69b11c256c29780a2ae + +info: + name: > + Side Menu Lite <= 4.0 - Cross-Site Request Forgery to Item Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/799b1f12-05f3-4b8b-9e1f-45c676e4f2a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-menu-lite/" + google-query: inurl:"/wp-content/plugins/side-menu-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-menu-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-menu-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-menu-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/side-menu-lite-fe8e75c60168f65685f1418c9d95c3e6.yaml b/nuclei-templates/cve-less/plugins/side-menu-lite-fe8e75c60168f65685f1418c9d95c3e6.yaml new file mode 100644 index 0000000000..3d5db93dc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/side-menu-lite-fe8e75c60168f65685f1418c9d95c3e6.yaml @@ -0,0 +1,58 @@ +id: side-menu-lite-fe8e75c60168f65685f1418c9d95c3e6 + +info: + name: > + Side Menu Lite <= 2.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ba22ed2-4cc2-4e1e-a475-a697a8bb697d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/side-menu-lite/" + google-query: inurl:"/wp-content/plugins/side-menu-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,side-menu-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/side-menu-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "side-menu-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sidebar-adder-eefcf68c0de93fc8b650bb6a4fb470d9.yaml b/nuclei-templates/cve-less/plugins/sidebar-adder-eefcf68c0de93fc8b650bb6a4fb470d9.yaml new file mode 100644 index 0000000000..85c817c766 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sidebar-adder-eefcf68c0de93fc8b650bb6a4fb470d9.yaml @@ -0,0 +1,58 @@ +id: sidebar-adder-eefcf68c0de93fc8b650bb6a4fb470d9 + +info: + name: > + Sidebar Adder 2 <= 2.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88622945-9a55-4e44-86e3-f111b9490aa8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sidebar-adder/" + google-query: inurl:"/wp-content/plugins/sidebar-adder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sidebar-adder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sidebar-adder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sidebar-adder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sidebar-manager-8fe609dfcf914f85364a28e0762bd9d8.yaml b/nuclei-templates/cve-less/plugins/sidebar-manager-8fe609dfcf914f85364a28e0762bd9d8.yaml new file mode 100644 index 0000000000..ee7acb3c68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sidebar-manager-8fe609dfcf914f85364a28e0762bd9d8.yaml @@ -0,0 +1,58 @@ +id: sidebar-manager-8fe609dfcf914f85364a28e0762bd9d8 + +info: + name: > + Lightweight Sidebar Manager <= 1.1.4 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/844c5012-f823-46ae-8de2-e2803b7cd063?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sidebar-manager/" + google-query: inurl:"/wp-content/plugins/sidebar-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sidebar-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sidebar-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sidebar-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sideblog-85bcd61b96548b75a4bebce0af8ade18.yaml b/nuclei-templates/cve-less/plugins/sideblog-85bcd61b96548b75a4bebce0af8ade18.yaml new file mode 100644 index 0000000000..0ad5b6a935 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sideblog-85bcd61b96548b75a4bebce0af8ade18.yaml @@ -0,0 +1,58 @@ +id: sideblog-85bcd61b96548b75a4bebce0af8ade18 + +info: + name: > + Sideblog WordPress Plugin <= 6.0 - Cross-Site Request Forgery to Settings Update and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8df77bb7-4453-403d-8d35-66251f6d399c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sideblog/" + google-query: inurl:"/wp-content/plugins/sideblog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sideblog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sideblog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sideblog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sign-up-sheets-20e759b7f6b75ab3b1e69a94701cd5a5.yaml b/nuclei-templates/cve-less/plugins/sign-up-sheets-20e759b7f6b75ab3b1e69a94701cd5a5.yaml new file mode 100644 index 0000000000..69964b19d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sign-up-sheets-20e759b7f6b75ab3b1e69a94701cd5a5.yaml @@ -0,0 +1,58 @@ +id: sign-up-sheets-20e759b7f6b75ab3b1e69a94701cd5a5 + +info: + name: > + Sign-up Sheets <= 2.2.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9999301a-002d-441b-bd66-6b7f4c46a8bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sign-up-sheets/" + google-query: inurl:"/wp-content/plugins/sign-up-sheets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sign-up-sheets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sign-up-sheets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sign-up-sheets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sign-up-sheets-56fc7e10ac8b22881c3f0ca008407e33.yaml b/nuclei-templates/cve-less/plugins/sign-up-sheets-56fc7e10ac8b22881c3f0ca008407e33.yaml new file mode 100644 index 0000000000..91e7a89465 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sign-up-sheets-56fc7e10ac8b22881c3f0ca008407e33.yaml @@ -0,0 +1,58 @@ +id: sign-up-sheets-56fc7e10ac8b22881c3f0ca008407e33 + +info: + name: > + Sign-up Sheets <= 1.0.13 - Authenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f0e19bc-cc1f-4804-ae81-8aa7905ce037?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sign-up-sheets/" + google-query: inurl:"/wp-content/plugins/sign-up-sheets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sign-up-sheets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sign-up-sheets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sign-up-sheets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sign-up-sheets-c68fc62b3d163e900a125613050369e5.yaml b/nuclei-templates/cve-less/plugins/sign-up-sheets-c68fc62b3d163e900a125613050369e5.yaml new file mode 100644 index 0000000000..7485b0651a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sign-up-sheets-c68fc62b3d163e900a125613050369e5.yaml @@ -0,0 +1,58 @@ +id: sign-up-sheets-c68fc62b3d163e900a125613050369e5 + +info: + name: > + Sign-up Sheets <= 2.2.11.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a38e649d-00ad-4198-a96a-e280bc810cff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sign-up-sheets/" + google-query: inurl:"/wp-content/plugins/sign-up-sheets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sign-up-sheets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sign-up-sheets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sign-up-sheets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sign-up-sheets-df5624fcfc60e06a94f15a6af052be53.yaml b/nuclei-templates/cve-less/plugins/sign-up-sheets-df5624fcfc60e06a94f15a6af052be53.yaml new file mode 100644 index 0000000000..04b05e3034 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sign-up-sheets-df5624fcfc60e06a94f15a6af052be53.yaml @@ -0,0 +1,58 @@ +id: sign-up-sheets-df5624fcfc60e06a94f15a6af052be53 + +info: + name: > + Sign-up Sheets <= 1.0.13 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f371feb6-93ae-4759-ab44-d58106093290?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sign-up-sheets/" + google-query: inurl:"/wp-content/plugins/sign-up-sheets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sign-up-sheets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sign-up-sheets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sign-up-sheets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/similar-posts-004512741c42cbbce92c569c825c6150.yaml b/nuclei-templates/cve-less/plugins/similar-posts-004512741c42cbbce92c569c825c6150.yaml new file mode 100644 index 0000000000..7433cf9267 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/similar-posts-004512741c42cbbce92c569c825c6150.yaml @@ -0,0 +1,58 @@ +id: similar-posts-004512741c42cbbce92c569c825c6150 + +info: + name: > + Similar Posts <= 3.1.5 - Admin+ Arbitrary PHP Code Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e08c3db4-6353-4bca-ab89-af46e5a0a128?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/similar-posts/" + google-query: inurl:"/wp-content/plugins/similar-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,similar-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/similar-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "similar-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/similar-posts-2474a94365b10412bcdef71534b7cdd2.yaml b/nuclei-templates/cve-less/plugins/similar-posts-2474a94365b10412bcdef71534b7cdd2.yaml new file mode 100644 index 0000000000..c752b507a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/similar-posts-2474a94365b10412bcdef71534b7cdd2.yaml @@ -0,0 +1,58 @@ +id: similar-posts-2474a94365b10412bcdef71534b7cdd2 + +info: + name: > + Similar Posts – Best Related Posts Plugin for WordPress <= 3.1.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb1cf9f1-7b87-4690-80db-0d4b3ccd98f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/similar-posts/" + google-query: inurl:"/wp-content/plugins/similar-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,similar-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/similar-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "similar-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simpel-reserveren-ff7129c5c489e7620ff9948f47fc6a7b.yaml b/nuclei-templates/cve-less/plugins/simpel-reserveren-ff7129c5c489e7620ff9948f47fc6a7b.yaml new file mode 100644 index 0000000000..225701a35f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simpel-reserveren-ff7129c5c489e7620ff9948f47fc6a7b.yaml @@ -0,0 +1,58 @@ +id: simpel-reserveren-ff7129c5c489e7620ff9948f47fc6a7b + +info: + name: > + Simpel Reserveren 3 <= 3.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d443d5f-ccf7-4eed-a5cb-ead0466a9d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simpel-reserveren/" + google-query: inurl:"/wp-content/plugins/simpel-reserveren/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simpel-reserveren,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simpel-reserveren/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simpel-reserveren" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-0a3a5e7befa978af91189dd0693b7678.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-0a3a5e7befa978af91189dd0693b7678.yaml new file mode 100644 index 0000000000..8696947115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-0a3a5e7befa978af91189dd0693b7678.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-0a3a5e7befa978af91189dd0693b7678 + +info: + name: > + Simple 301 Redirects by BetterLinks <= 2.0.7 - Missing Authorization via clicked + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddacd612-0cd5-4b07-9184-bec6f1adbb4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-129397ab97060ab9e51308f171e27b82.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-129397ab97060ab9e51308f171e27b82.yaml new file mode 100644 index 0000000000..dbd2edb3d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-129397ab97060ab9e51308f171e27b82.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-129397ab97060ab9e51308f171e27b82 + +info: + name: > + Simple 301 Redirects 2.0.0 - 2.0.3 - Unauthenticated Redirect Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/931e83b6-b05a-4f48-a159-e15cc99e0fe4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.0', '<= 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-6dffe3576454f2a64f00311b905d034a.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-6dffe3576454f2a64f00311b905d034a.yaml new file mode 100644 index 0000000000..d4cef7bbe1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-6dffe3576454f2a64f00311b905d034a.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-6dffe3576454f2a64f00311b905d034a + +info: + name: > + Simple 301 Redirects <= 2.0.7 - Cross-Site Request Forgery via 'clicked' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9945c85b-a97a-4ad0-9d0a-69faf157563a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-92f8dddef0caee0f45322f38c33da40e.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-92f8dddef0caee0f45322f38c33da40e.yaml new file mode 100644 index 0000000000..3a747a798d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-92f8dddef0caee0f45322f38c33da40e.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-92f8dddef0caee0f45322f38c33da40e + +info: + name: > + Simple 301 Redirects 2.0.0 - 2.0.3 - Authenticated Arbitrary Plugin Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b02ca3a1-4e85-4bc3-a5f6-a02bec6bddef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.0', '<= 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-addon-bulk-uploader-3c9cb9c40163b96bf6d0686c6178a29c.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-addon-bulk-uploader-3c9cb9c40163b96bf6d0686c6178a29c.yaml new file mode 100644 index 0000000000..37b1e2f2ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-addon-bulk-uploader-3c9cb9c40163b96bf6d0686c6178a29c.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-addon-bulk-uploader-3c9cb9c40163b96bf6d0686c6178a29c + +info: + name: > + Simple 301 Redirects Addon Bulk Uploader <= 1.2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c94f47a-4a1b-434c-b446-0ff1a7290e16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects-addon-bulk-uploader/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects-addon-bulk-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects-addon-bulk-uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects-addon-bulk-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects-addon-bulk-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-addon-bulk-uploader-561657a1d8eb71d24910435f19187999.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-addon-bulk-uploader-561657a1d8eb71d24910435f19187999.yaml new file mode 100644 index 0000000000..ff65f73dcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-addon-bulk-uploader-561657a1d8eb71d24910435f19187999.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-addon-bulk-uploader-561657a1d8eb71d24910435f19187999 + +info: + name: > + Simple 301 Redirects Addon Bulk Uploader <= 1.2.4 - Missing Authentication on Option Changes + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcabc099-ef35-4dcd-ba53-ef20a0ad1abc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects-addon-bulk-uploader/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects-addon-bulk-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects-addon-bulk-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects-addon-bulk-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects-addon-bulk-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-da9748807dbda454b45fa581681ad9a2.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-da9748807dbda454b45fa581681ad9a2.yaml new file mode 100644 index 0000000000..46ebceaf71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-da9748807dbda454b45fa581681ad9a2.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-da9748807dbda454b45fa581681ad9a2 + +info: + name: > + Simple 301 Redirects 2.0.0 - 2.0.3 - Authenticated Arbitrary Plugin Installation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a971c80b-c71a-4c58-8291-c8918af034d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.0', '<= 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-dfc0dcf8b3d813272459721cf312f589.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-dfc0dcf8b3d813272459721cf312f589.yaml new file mode 100644 index 0000000000..e9fdfb5f4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-dfc0dcf8b3d813272459721cf312f589.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-dfc0dcf8b3d813272459721cf312f589 + +info: + name: > + Simple 301 Redirects 2.0.0 - 2.0.3 - Unauthenticated Redirect Import + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5f19184-60ff-4cf9-85c3-86a6c84a2a63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.0', '<= 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-301-redirects-f2f204b71c27258d8bc3636a9cf0d080.yaml b/nuclei-templates/cve-less/plugins/simple-301-redirects-f2f204b71c27258d8bc3636a9cf0d080.yaml new file mode 100644 index 0000000000..dfac10e3e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-301-redirects-f2f204b71c27258d8bc3636a9cf0d080.yaml @@ -0,0 +1,58 @@ +id: simple-301-redirects-f2f204b71c27258d8bc3636a9cf0d080 + +info: + name: > + Simple 301 Redirects 2.0.0 - 2.0.3 - Authenticated Wildcard Activation and Retrieval + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a2124be-358c-47af-97c2-02afbed91a3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-301-redirects/" + google-query: inurl:"/wp-content/plugins/simple-301-redirects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-301-redirects,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-301-redirects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-301-redirects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.0', '<= 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-add-pages-or-posts-268fe7ccb3ae756c66592ca513b99e93.yaml b/nuclei-templates/cve-less/plugins/simple-add-pages-or-posts-268fe7ccb3ae756c66592ca513b99e93.yaml new file mode 100644 index 0000000000..f5ceaeae86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-add-pages-or-posts-268fe7ccb3ae756c66592ca513b99e93.yaml @@ -0,0 +1,58 @@ +id: simple-add-pages-or-posts-268fe7ccb3ae756c66592ca513b99e93 + +info: + name: > + Simple add pages or posts < 1.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e340b8-4eed-4622-b7c4-73d5bafb7e8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-add-pages-or-posts/" + google-query: inurl:"/wp-content/plugins/simple-add-pages-or-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-add-pages-or-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-add-pages-or-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-add-pages-or-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-admin-language-change-5dcc472de5e4f87aebcc632749f7aaa7.yaml b/nuclei-templates/cve-less/plugins/simple-admin-language-change-5dcc472de5e4f87aebcc632749f7aaa7.yaml new file mode 100644 index 0000000000..6e67b7b404 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-admin-language-change-5dcc472de5e4f87aebcc632749f7aaa7.yaml @@ -0,0 +1,58 @@ +id: simple-admin-language-change-5dcc472de5e4f87aebcc632749f7aaa7 + +info: + name: > + Simple Admin Language Change <= 2.0.1 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01e1b22f-9622-433f-bada-23d118dc3800?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-admin-language-change/" + google-query: inurl:"/wp-content/plugins/simple-admin-language-change/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-admin-language-change,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-admin-language-change/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-admin-language-change" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ads-manager-09660999cf2e1317d729c3b722d62caa.yaml b/nuclei-templates/cve-less/plugins/simple-ads-manager-09660999cf2e1317d729c3b722d62caa.yaml new file mode 100644 index 0000000000..a8b502f3e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ads-manager-09660999cf2e1317d729c3b722d62caa.yaml @@ -0,0 +1,58 @@ +id: simple-ads-manager-09660999cf2e1317d729c3b722d62caa + +info: + name: > + Simple Ads Manager <= 2.5.94 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8621bc52-3a71-4e01-9823-129ce0831ec4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ads-manager/" + google-query: inurl:"/wp-content/plugins/simple-ads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ads-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ads-manager-0f6c840a3fb64dbbf3be23d21800f577.yaml b/nuclei-templates/cve-less/plugins/simple-ads-manager-0f6c840a3fb64dbbf3be23d21800f577.yaml new file mode 100644 index 0000000000..fba3cf7160 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ads-manager-0f6c840a3fb64dbbf3be23d21800f577.yaml @@ -0,0 +1,58 @@ +id: simple-ads-manager-0f6c840a3fb64dbbf3be23d21800f577 + +info: + name: > + SAM Pro (Free Edition) < 1.9.7.69 & Simple Ads Manager <= 2.10.0.130 & SAM Pro Lite < 1.9.0.53 - Local/Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/730a3cde-bcbd-4d60-80bb-3944cc5386e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ads-manager/" + google-query: inurl:"/wp-content/plugins/simple-ads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ads-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.0.130') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ads-manager-975e95579a2458f3541a3c52ec1cdb1c.yaml b/nuclei-templates/cve-less/plugins/simple-ads-manager-975e95579a2458f3541a3c52ec1cdb1c.yaml new file mode 100644 index 0000000000..f3a9606628 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ads-manager-975e95579a2458f3541a3c52ec1cdb1c.yaml @@ -0,0 +1,58 @@ +id: simple-ads-manager-975e95579a2458f3541a3c52ec1cdb1c + +info: + name: > + Simple Ads Manager <= 2.9.4.116 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/806e5056-5c29-49d0-9150-add6ee485758?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ads-manager/" + google-query: inurl:"/wp-content/plugins/simple-ads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ads-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.5.118') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ads-manager-9ef58392cce08c654034b90fbf742ce5.yaml b/nuclei-templates/cve-less/plugins/simple-ads-manager-9ef58392cce08c654034b90fbf742ce5.yaml new file mode 100644 index 0000000000..83794cfb52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ads-manager-9ef58392cce08c654034b90fbf742ce5.yaml @@ -0,0 +1,58 @@ +id: simple-ads-manager-9ef58392cce08c654034b90fbf742ce5 + +info: + name: > + Simple Ads Manager <= 2.9.8.125 - Unauthenticated PHP Objection Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02665811-15ba-434c-a4d0-df5402a128f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ads-manager/" + google-query: inurl:"/wp-content/plugins/simple-ads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ads-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.0.130') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ads-manager-c16d7e5e9f240793779b7bb14373632e.yaml b/nuclei-templates/cve-less/plugins/simple-ads-manager-c16d7e5e9f240793779b7bb14373632e.yaml new file mode 100644 index 0000000000..c4116310cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ads-manager-c16d7e5e9f240793779b7bb14373632e.yaml @@ -0,0 +1,58 @@ +id: simple-ads-manager-c16d7e5e9f240793779b7bb14373632e + +info: + name: > + Simple Ads Manager 2.5.94 & 2.5.96 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd2dcc09-7de5-489a-95a5-e82cb88d8cbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ads-manager/" + google-query: inurl:"/wp-content/plugins/simple-ads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ads-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.5.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ads-manager-dd9ac89fd471fa2e15cbd7416ec1c978.yaml b/nuclei-templates/cve-less/plugins/simple-ads-manager-dd9ac89fd471fa2e15cbd7416ec1c978.yaml new file mode 100644 index 0000000000..8e97bb42a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ads-manager-dd9ac89fd471fa2e15cbd7416ec1c978.yaml @@ -0,0 +1,58 @@ +id: simple-ads-manager-dd9ac89fd471fa2e15cbd7416ec1c978 + +info: + name: > + Simple Ads Manager < 2.9.4.116 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/964601d5-8460-41c5-9791-ff9e3af964e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ads-manager/" + google-query: inurl:"/wp-content/plugins/simple-ads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ads-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4.116') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ads-manager-eea091db60550f784f9a2d189bb3b4f1.yaml b/nuclei-templates/cve-less/plugins/simple-ads-manager-eea091db60550f784f9a2d189bb3b4f1.yaml new file mode 100644 index 0000000000..0946475ab7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ads-manager-eea091db60550f784f9a2d189bb3b4f1.yaml @@ -0,0 +1,58 @@ +id: simple-ads-manager-eea091db60550f784f9a2d189bb3b4f1 + +info: + name: > + Simple Ads Manager < 2.7.97 - Multiple SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1829b4b7-5042-4972-ad05-e9a7adbf3026?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ads-manager/" + google-query: inurl:"/wp-content/plugins/simple-ads-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ads-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ads-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ads-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.97') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ajax-chat-1bbd8f2ed08db0b77690cb0df76fdffe.yaml b/nuclei-templates/cve-less/plugins/simple-ajax-chat-1bbd8f2ed08db0b77690cb0df76fdffe.yaml new file mode 100644 index 0000000000..0188b7c19e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ajax-chat-1bbd8f2ed08db0b77690cb0df76fdffe.yaml @@ -0,0 +1,58 @@ +id: simple-ajax-chat-1bbd8f2ed08db0b77690cb0df76fdffe + +info: + name: > + Simple Ajax Chat <= 20220115 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6e2ab69-2714-4bf9-a9ad-035fc15450f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ajax-chat/" + google-query: inurl:"/wp-content/plugins/simple-ajax-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ajax-chat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ajax-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ajax-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20220115') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ajax-chat-2181575a0cd142c1833c1ffdc36fbeb4.yaml b/nuclei-templates/cve-less/plugins/simple-ajax-chat-2181575a0cd142c1833c1ffdc36fbeb4.yaml new file mode 100644 index 0000000000..105733a25c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ajax-chat-2181575a0cd142c1833c1ffdc36fbeb4.yaml @@ -0,0 +1,58 @@ +id: simple-ajax-chat-2181575a0cd142c1833c1ffdc36fbeb4 + +info: + name: > + Simple Ajax Chat <= 20220115 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06a7e784-49c3-44fd-882b-c76ab8d871e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ajax-chat/" + google-query: inurl:"/wp-content/plugins/simple-ajax-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ajax-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ajax-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ajax-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20220115') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ajax-chat-6d7a079131a28ced1afc399eed5de96c.yaml b/nuclei-templates/cve-less/plugins/simple-ajax-chat-6d7a079131a28ced1afc399eed5de96c.yaml new file mode 100644 index 0000000000..737ff4cfd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ajax-chat-6d7a079131a28ced1afc399eed5de96c.yaml @@ -0,0 +1,58 @@ +id: simple-ajax-chat-6d7a079131a28ced1afc399eed5de96c + +info: + name: > + Simple Ajax Chat <= 20231101 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e9e0214-b88e-4125-8c10-850ca736e920?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ajax-chat/" + google-query: inurl:"/wp-content/plugins/simple-ajax-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ajax-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ajax-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ajax-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20231101') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ajax-chat-8097ab26da9158c6ac8991a667833327.yaml b/nuclei-templates/cve-less/plugins/simple-ajax-chat-8097ab26da9158c6ac8991a667833327.yaml new file mode 100644 index 0000000000..f6e60991b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ajax-chat-8097ab26da9158c6ac8991a667833327.yaml @@ -0,0 +1,58 @@ +id: simple-ajax-chat-8097ab26da9158c6ac8991a667833327 + +info: + name: > + Simple Ajax Chat <= 20240216 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f67b5cd8-bae8-48ca-87d5-7445724791f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ajax-chat/" + google-query: inurl:"/wp-content/plugins/simple-ajax-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ajax-chat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ajax-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ajax-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20240216') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ajax-chat-c6329477c32be141bd1ef013c37024ea.yaml b/nuclei-templates/cve-less/plugins/simple-ajax-chat-c6329477c32be141bd1ef013c37024ea.yaml new file mode 100644 index 0000000000..c097139b98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ajax-chat-c6329477c32be141bd1ef013c37024ea.yaml @@ -0,0 +1,58 @@ +id: simple-ajax-chat-c6329477c32be141bd1ef013c37024ea + +info: + name: > + Simple Ajax Chat Plugin <= 20220115 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14b6f5b6-66ab-4c47-853e-7551fad39478?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ajax-chat/" + google-query: inurl:"/wp-content/plugins/simple-ajax-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ajax-chat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ajax-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ajax-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20220115') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-author-box-4c2b5bad649e24fd03a9941d8a2a227e.yaml b/nuclei-templates/cve-less/plugins/simple-author-box-4c2b5bad649e24fd03a9941d8a2a227e.yaml new file mode 100644 index 0000000000..43ef48e09d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-author-box-4c2b5bad649e24fd03a9941d8a2a227e.yaml @@ -0,0 +1,58 @@ +id: simple-author-box-4c2b5bad649e24fd03a9941d8a2a227e + +info: + name: > + Simple Author Box <= 2.51 - Authenticated (Contributor+) Insecure Direct Object Reference to Arbitrary User Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a1b7e37-1e30-473c-aadc-176de729e619?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-author-box/" + google-query: inurl:"/wp-content/plugins/simple-author-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-author-box,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-author-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-author-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-author-box-d6de8501bae90885b4cfb5ea79dec80a.yaml b/nuclei-templates/cve-less/plugins/simple-author-box-d6de8501bae90885b4cfb5ea79dec80a.yaml new file mode 100644 index 0000000000..d952d5cb80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-author-box-d6de8501bae90885b4cfb5ea79dec80a.yaml @@ -0,0 +1,58 @@ +id: simple-author-box-d6de8501bae90885b4cfb5ea79dec80a + +info: + name: > + Simple Author Box <= 2.50 - Cross-Site Request Forgery via save_user_profile + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f670b93e-da2e-43e7-a28a-6cacba4df3a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-author-box/" + google-query: inurl:"/wp-content/plugins/simple-author-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-author-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-author-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-author-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-backup-898cc6b047f3aedcaae44caf9cb46034.yaml b/nuclei-templates/cve-less/plugins/simple-backup-898cc6b047f3aedcaae44caf9cb46034.yaml new file mode 100644 index 0000000000..7f4b6b99a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-backup-898cc6b047f3aedcaae44caf9cb46034.yaml @@ -0,0 +1,58 @@ +id: simple-backup-898cc6b047f3aedcaae44caf9cb46034 + +info: + name: > + Simple Backup <= 2.7.10 - Arbitrary File Download via Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29482b70-0ff2-4bb1-9d41-9cffb83b5ad0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-backup/" + google-query: inurl:"/wp-content/plugins/simple-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-banner-292e0cc17029954da0392c71fc757409.yaml b/nuclei-templates/cve-less/plugins/simple-banner-292e0cc17029954da0392c71fc757409.yaml new file mode 100644 index 0000000000..f4fe4dd049 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-banner-292e0cc17029954da0392c71fc757409.yaml @@ -0,0 +1,58 @@ +id: simple-banner-292e0cc17029954da0392c71fc757409 + +info: + name: > + Simple Banner <= 2.11.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb9520d-e679-4e8a-ae3c-8207f17d45a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-banner/" + google-query: inurl:"/wp-content/plugins/simple-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-banner-cc890ca86d59bec43888764af28bac9a.yaml b/nuclei-templates/cve-less/plugins/simple-banner-cc890ca86d59bec43888764af28bac9a.yaml new file mode 100644 index 0000000000..8d2b52817c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-banner-cc890ca86d59bec43888764af28bac9a.yaml @@ -0,0 +1,58 @@ +id: simple-banner-cc890ca86d59bec43888764af28bac9a + +info: + name: > + Simple Banner <= 2.10.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b890d168-9ea7-49c0-b628-71c76c0c2c9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-banner/" + google-query: inurl:"/wp-content/plugins/simple-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-banner-decbeaef5c23a80c05557edd9e92444e.yaml b/nuclei-templates/cve-less/plugins/simple-banner-decbeaef5c23a80c05557edd9e92444e.yaml new file mode 100644 index 0000000000..6e834dd4cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-banner-decbeaef5c23a80c05557edd9e92444e.yaml @@ -0,0 +1,58 @@ +id: simple-banner-decbeaef5c23a80c05557edd9e92444e + +info: + name: > + Simple Banner <= 2.11.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67953bf3-5465-4f25-874c-46dff59b2199?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-banner/" + google-query: inurl:"/wp-content/plugins/simple-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-basic-contact-form-24b6c342cef1d8274544190481da6dc0.yaml b/nuclei-templates/cve-less/plugins/simple-basic-contact-form-24b6c342cef1d8274544190481da6dc0.yaml new file mode 100644 index 0000000000..e355a79448 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-basic-contact-form-24b6c342cef1d8274544190481da6dc0.yaml @@ -0,0 +1,58 @@ +id: simple-basic-contact-form-24b6c342cef1d8274544190481da6dc0 + +info: + name: > + Simple Basic Contact Form <= 20220207 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38e831b4-8284-4fad-ac24-a2f08053c53e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-basic-contact-form/" + google-query: inurl:"/wp-content/plugins/simple-basic-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-basic-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-basic-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-basic-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20220207') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-basic-contact-form-8b606c34ee5d9927b9ffc892e04d01c1.yaml b/nuclei-templates/cve-less/plugins/simple-basic-contact-form-8b606c34ee5d9927b9ffc892e04d01c1.yaml new file mode 100644 index 0000000000..d695711680 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-basic-contact-form-8b606c34ee5d9927b9ffc892e04d01c1.yaml @@ -0,0 +1,58 @@ +id: simple-basic-contact-form-8b606c34ee5d9927b9ffc892e04d01c1 + +info: + name: > + Simple Basic Contact Form <= 20221201 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22074d7a-5dbd-4a0c-bc5d-e4c983e5edb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-basic-contact-form/" + google-query: inurl:"/wp-content/plugins/simple-basic-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-basic-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-basic-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-basic-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20221201') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-behace-portfolio-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/simple-behace-portfolio-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..0b0947e417 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-behace-portfolio-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: simple-behace-portfolio-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-behace-portfolio/" + google-query: inurl:"/wp-content/plugins/simple-behace-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-behace-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-behace-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-behace-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-behace-portfolio-542985c679cbc99f40cd1241c2489438.yaml b/nuclei-templates/cve-less/plugins/simple-behace-portfolio-542985c679cbc99f40cd1241c2489438.yaml new file mode 100644 index 0000000000..6e0eaf987c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-behace-portfolio-542985c679cbc99f40cd1241c2489438.yaml @@ -0,0 +1,58 @@ +id: simple-behace-portfolio-542985c679cbc99f40cd1241c2489438 + +info: + name: > + Simple Behance Portfolio <= 0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85581a5d-a898-4dac-af48-139b36728760?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-behace-portfolio/" + google-query: inurl:"/wp-content/plugins/simple-behace-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-behace-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-behace-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-behace-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-bitcoin-faucets-600b942b044271afb765e6ae63286c52.yaml b/nuclei-templates/cve-less/plugins/simple-bitcoin-faucets-600b942b044271afb765e6ae63286c52.yaml new file mode 100644 index 0000000000..243f107732 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-bitcoin-faucets-600b942b044271afb765e6ae63286c52.yaml @@ -0,0 +1,58 @@ +id: simple-bitcoin-faucets-600b942b044271afb765e6ae63286c52 + +info: + name: > + Bitcoin Satoshi Tools <= 1.7.0 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec5fc038-b855-4744-8797-ce2cedd88f6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-bitcoin-faucets/" + google-query: inurl:"/wp-content/plugins/simple-bitcoin-faucets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-bitcoin-faucets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-bitcoin-faucets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-bitcoin-faucets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-blog-card-38f522639c782f75ecbda00625777030.yaml b/nuclei-templates/cve-less/plugins/simple-blog-card-38f522639c782f75ecbda00625777030.yaml new file mode 100644 index 0000000000..6744d0fa58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-blog-card-38f522639c782f75ecbda00625777030.yaml @@ -0,0 +1,58 @@ +id: simple-blog-card-38f522639c782f75ecbda00625777030 + +info: + name: > + Simple Blog Card <= 1.30 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f6d878-6ba8-4d80-9c9b-1a363d6aaed5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-blog-card/" + google-query: inurl:"/wp-content/plugins/simple-blog-card/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-blog-card,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-blog-card/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-blog-card" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-blog-card-c207cf3269409384bfc7adaacb440036.yaml b/nuclei-templates/cve-less/plugins/simple-blog-card-c207cf3269409384bfc7adaacb440036.yaml new file mode 100644 index 0000000000..b9749d14e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-blog-card-c207cf3269409384bfc7adaacb440036.yaml @@ -0,0 +1,58 @@ +id: simple-blog-card-c207cf3269409384bfc7adaacb440036 + +info: + name: > + Simple Blog Card <= 1.31 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36cec19a-4631-4ada-b37a-f4b2dc264096?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-blog-card/" + google-query: inurl:"/wp-content/plugins/simple-blog-card/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-blog-card,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-blog-card/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-blog-card" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-buttons-creator-440da6ea620b4f0e53a03bec13770ad3.yaml b/nuclei-templates/cve-less/plugins/simple-buttons-creator-440da6ea620b4f0e53a03bec13770ad3.yaml new file mode 100644 index 0000000000..b262217ffd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-buttons-creator-440da6ea620b4f0e53a03bec13770ad3.yaml @@ -0,0 +1,58 @@ +id: simple-buttons-creator-440da6ea620b4f0e53a03bec13770ad3 + +info: + name: > + Simple Buttons Creator <=1.04 - Unauthenticated Stored Cross-Site Scripting via Add Button + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffbf5930-50f3-44ca-8333-7b934dcd5ef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-buttons-creator/" + google-query: inurl:"/wp-content/plugins/simple-buttons-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-buttons-creator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-buttons-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-buttons-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-buttons-creator-aaaedc139789465865fcfb0738c02925.yaml b/nuclei-templates/cve-less/plugins/simple-buttons-creator-aaaedc139789465865fcfb0738c02925.yaml new file mode 100644 index 0000000000..b12aa30b21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-buttons-creator-aaaedc139789465865fcfb0738c02925.yaml @@ -0,0 +1,58 @@ +id: simple-buttons-creator-aaaedc139789465865fcfb0738c02925 + +info: + name: > + Simple Buttons Creator <=1.04 - Cross-Site Request Forgery to Arbitrary Button Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/448ec796-e92f-410e-aa40-aaf296c1afeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-buttons-creator/" + google-query: inurl:"/wp-content/plugins/simple-buttons-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-buttons-creator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-buttons-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-buttons-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-cloudflare-turnstile-0591772600d7345412c5914adc415e3f.yaml b/nuclei-templates/cve-less/plugins/simple-cloudflare-turnstile-0591772600d7345412c5914adc415e3f.yaml new file mode 100644 index 0000000000..751fa52249 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-cloudflare-turnstile-0591772600d7345412c5914adc415e3f.yaml @@ -0,0 +1,58 @@ +id: simple-cloudflare-turnstile-0591772600d7345412c5914adc415e3f + +info: + name: > + Simple Cloudflare Turnstile <= 1.23.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91f6c9d3-641d-42f7-bf11-e3c3a44eeb76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-cloudflare-turnstile/" + google-query: inurl:"/wp-content/plugins/simple-cloudflare-turnstile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-cloudflare-turnstile,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-cloudflare-turnstile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-cloudflare-turnstile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-csv-xls-exporter-797076b6d5e9db4c8f8d40e3e026648b.yaml b/nuclei-templates/cve-less/plugins/simple-csv-xls-exporter-797076b6d5e9db4c8f8d40e3e026648b.yaml new file mode 100644 index 0000000000..7fd2995d22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-csv-xls-exporter-797076b6d5e9db4c8f8d40e3e026648b.yaml @@ -0,0 +1,58 @@ +id: simple-csv-xls-exporter-797076b6d5e9db4c8f8d40e3e026648b + +info: + name: > + Simple CSV/XLS Exporter <= 1.5.8 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/219614b7-2394-490c-baf4-14a12249c4b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-csv-xls-exporter/" + google-query: inurl:"/wp-content/plugins/simple-csv-xls-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-csv-xls-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-csv-xls-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-csv-xls-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-custom-author-profiles-a772a1bfbb77e4750a15c026120428cc.yaml b/nuclei-templates/cve-less/plugins/simple-custom-author-profiles-a772a1bfbb77e4750a15c026120428cc.yaml new file mode 100644 index 0000000000..09d430eeb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-custom-author-profiles-a772a1bfbb77e4750a15c026120428cc.yaml @@ -0,0 +1,58 @@ +id: simple-custom-author-profiles-a772a1bfbb77e4750a15c026120428cc + +info: + name: > + Simple Custom Author Profiles <= 1.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/986d16d5-f1f4-4ed9-9978-0f12ee22a543?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-custom-author-profiles/" + google-query: inurl:"/wp-content/plugins/simple-custom-author-profiles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-custom-author-profiles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-custom-author-profiles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-custom-author-profiles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-custom-website-data-740c2a0d357fce3bff875d5d58b6f9d4.yaml b/nuclei-templates/cve-less/plugins/simple-custom-website-data-740c2a0d357fce3bff875d5d58b6f9d4.yaml new file mode 100644 index 0000000000..34d1e8abeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-custom-website-data-740c2a0d357fce3bff875d5d58b6f9d4.yaml @@ -0,0 +1,58 @@ +id: simple-custom-website-data-740c2a0d357fce3bff875d5d58b6f9d4 + +info: + name: > + Custom Website Data < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f60fef0e-5b2d-4672-ab3d-21e4b6708f4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-custom-website-data/" + google-query: inurl:"/wp-content/plugins/simple-custom-website-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-custom-website-data,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-custom-website-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-custom-website-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-custom-website-data-fe349fb095cfb7a6ef8e1ff393fda6e6.yaml b/nuclei-templates/cve-less/plugins/simple-custom-website-data-fe349fb095cfb7a6ef8e1ff393fda6e6.yaml new file mode 100644 index 0000000000..c85189e224 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-custom-website-data-fe349fb095cfb7a6ef8e1ff393fda6e6.yaml @@ -0,0 +1,58 @@ +id: simple-custom-website-data-fe349fb095cfb7a6ef8e1ff393fda6e6 + +info: + name: > + Custom Website Data <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/550a8107-f639-4edc-9aad-1943d032cc26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-custom-website-data/" + google-query: inurl:"/wp-content/plugins/simple-custom-website-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-custom-website-data,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-custom-website-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-custom-website-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-button-shortcode-1d37800259dd9a7caaaf8879496d00f2.yaml b/nuclei-templates/cve-less/plugins/simple-download-button-shortcode-1d37800259dd9a7caaaf8879496d00f2.yaml new file mode 100644 index 0000000000..cbffee1e17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-button-shortcode-1d37800259dd9a7caaaf8879496d00f2.yaml @@ -0,0 +1,58 @@ +id: simple-download-button-shortcode-1d37800259dd9a7caaaf8879496d00f2 + +info: + name: > + Simple Download Button Shortcode <= 1.0 - Information Disclosure via Arbitrary File Downloads + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0fdeb83-78c3-4b29-809c-662bd2a2bb51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-button-shortcode/" + google-query: inurl:"/wp-content/plugins/simple-download-button-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-button-shortcode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-button-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-button-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-counter-a54fbae2de8a8e13d0527ba702d34945.yaml b/nuclei-templates/cve-less/plugins/simple-download-counter-a54fbae2de8a8e13d0527ba702d34945.yaml new file mode 100644 index 0000000000..c39da35ab7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-counter-a54fbae2de8a8e13d0527ba702d34945.yaml @@ -0,0 +1,58 @@ +id: simple-download-counter-a54fbae2de8a8e13d0527ba702d34945 + +info: + name: > + Simple Download Counter <= 1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa5f7f2a-c7b7-4339-a608-51fd684c18bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-counter/" + google-query: inurl:"/wp-content/plugins/simple-download-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-19ad328fea959219a0ccf5d117ad75c7.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-19ad328fea959219a0ccf5d117ad75c7.yaml new file mode 100644 index 0000000000..b4f22c26aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-19ad328fea959219a0ccf5d117ad75c7.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-19ad328fea959219a0ccf5d117ad75c7 + +info: + name: > + Simple Download Monitor <= 3.9.5 - Contributor+ Arbitrary Thumbnail Removal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/184885b0-66cd-433d-bfea-d7e8bbb02731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-49034c31f1dba0715c18246f4dd38cde.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-49034c31f1dba0715c18246f4dd38cde.yaml new file mode 100644 index 0000000000..716178b56f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-49034c31f1dba0715c18246f4dd38cde.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-49034c31f1dba0715c18246f4dd38cde + +info: + name: > + Simple Download Monitor < 3.5.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0bf4d1-ba07-4204-bb2b-cdee10e6a275?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-5017a561b2bec42e777a79d3e7f73798.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-5017a561b2bec42e777a79d3e7f73798.yaml new file mode 100644 index 0000000000..a7da0e4025 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-5017a561b2bec42e777a79d3e7f73798.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-5017a561b2bec42e777a79d3e7f73798 + +info: + name: > + Simple Download Monitor <= 3.9.4 - Contributor+ Stored Cross-Site Scripting via File Thumbnail + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12ea26be-93e4-43de-bb32-21cdc2f80569?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-5814be735a5f5cee00bab9378ee0cbea.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-5814be735a5f5cee00bab9378ee0cbea.yaml new file mode 100644 index 0000000000..8b4847665f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-5814be735a5f5cee00bab9378ee0cbea.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-5814be735a5f5cee00bab9378ee0cbea + +info: + name: > + Simple Download Monitor <= 3.2.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5ad74c5-93ba-414c-98ad-0987547f172f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-59401ea9ce38d0433cad6f039547d860.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-59401ea9ce38d0433cad6f039547d860.yaml new file mode 100644 index 0000000000..c40c32226f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-59401ea9ce38d0433cad6f039547d860.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-59401ea9ce38d0433cad6f039547d860 + +info: + name: > + Simple Download Monitor <= 3.9.10 - Contributor+ Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cf2739f-9001-409a-9b7f-024931729da3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-5d5eee8781ce2674b2c2c40cb2fcc273.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-5d5eee8781ce2674b2c2c40cb2fcc273.yaml new file mode 100644 index 0000000000..3cf7d83360 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-5d5eee8781ce2674b2c2c40cb2fcc273.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-5d5eee8781ce2674b2c2c40cb2fcc273 + +info: + name: > + Simple Download Monitor <= 3.8.8 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32f03892-500f-4925-9b3d-3160243de8a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml new file mode 100644 index 0000000000..6349c02b83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-94d6413af5bdd7c5410cee1dbb9ba3ce + +info: + name: > + Simple Download Monitor <= 3.8.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2670e15-a71a-4800-882d-5d04faeaeee1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-9b6bff957c02c5adaec64684fd5bd810.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-9b6bff957c02c5adaec64684fd5bd810.yaml new file mode 100644 index 0000000000..a6cce24c41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-9b6bff957c02c5adaec64684fd5bd810.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-9b6bff957c02c5adaec64684fd5bd810 + +info: + name: > + Simple Download Monitor <= 3.9.8 - Multiple Cross-Site Request Forgery vulnerabilities + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b8dcab4-dd13-4c08-8623-37a50dcbda1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-b170f8ef7c7061e6ad33e8f3d3426766.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-b170f8ef7c7061e6ad33e8f3d3426766.yaml new file mode 100644 index 0000000000..3ef70a26c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-b170f8ef7c7061e6ad33e8f3d3426766.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-b170f8ef7c7061e6ad33e8f3d3426766 + +info: + name: > + Simple Download Monitor <= 3.9.5 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43f38a87-ac2c-4b5a-9559-d529c4b2799c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-bbc8a2a1421137b76670971e66f228ca.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-bbc8a2a1421137b76670971e66f228ca.yaml new file mode 100644 index 0000000000..6409c8b8fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-bbc8a2a1421137b76670971e66f228ca.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-bbc8a2a1421137b76670971e66f228ca + +info: + name: > + Simple Download Monitor <= 3.9.4 - Contributor+ Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79545b24-b325-486b-b34f-87bba14b8cd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-d77dd6f710585ae9ffaedbfddc152d76.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-d77dd6f710585ae9ffaedbfddc152d76.yaml new file mode 100644 index 0000000000..ebae6b5b00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-d77dd6f710585ae9ffaedbfddc152d76.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-d77dd6f710585ae9ffaedbfddc152d76 + +info: + name: > + Simple Download Monitor < 3.5.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/410ae439-dcee-4050-81a9-110a337016e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-f2c626818640778246ca3c4d6d3ce648.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-f2c626818640778246ca3c4d6d3ce648.yaml new file mode 100644 index 0000000000..a4b37f3c34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-f2c626818640778246ca3c4d6d3ce648.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-f2c626818640778246ca3c4d6d3ce648 + +info: + name: > + Simple Download Monitor <= 3.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d91a2713-238b-4c56-bff8-9129d77f4d77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-download-monitor-fe4a2b77904ea26c425ce24d00765709.yaml b/nuclei-templates/cve-less/plugins/simple-download-monitor-fe4a2b77904ea26c425ce24d00765709.yaml new file mode 100644 index 0000000000..44d4e67da6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-download-monitor-fe4a2b77904ea26c425ce24d00765709.yaml @@ -0,0 +1,58 @@ +id: simple-download-monitor-fe4a2b77904ea26c425ce24d00765709 + +info: + name: > + Simple Download Monitor <= 3.9.5 - Log Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70493df9-82b8-4160-8d75-889fada7541f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-download-monitor/" + google-query: inurl:"/wp-content/plugins/simple-download-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-download-monitor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-download-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-download-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-dropbox-upload-form-8f5233bb2f72d4a8a72b4725ffa80041.yaml b/nuclei-templates/cve-less/plugins/simple-dropbox-upload-form-8f5233bb2f72d4a8a72b4725ffa80041.yaml new file mode 100644 index 0000000000..1e3aa92d1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-dropbox-upload-form-8f5233bb2f72d4a8a72b4725ffa80041.yaml @@ -0,0 +1,58 @@ +id: simple-dropbox-upload-form-8f5233bb2f72d4a8a72b4725ffa80041 + +info: + name: > + Simple Dropbox Upload < 1.8.8.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89904362-4ac2-450a-89ac-8935fdb4976d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-dropbox-upload-form/" + google-query: inurl:"/wp-content/plugins/simple-dropbox-upload-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-dropbox-upload-form,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-dropbox-upload-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-dropbox-upload-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-e-commerce-shopping-cart-b9227c21bfafb1eba2c9f59a2176e5a7.yaml b/nuclei-templates/cve-less/plugins/simple-e-commerce-shopping-cart-b9227c21bfafb1eba2c9f59a2176e5a7.yaml new file mode 100644 index 0000000000..ebe3d10a8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-e-commerce-shopping-cart-b9227c21bfafb1eba2c9f59a2176e5a7.yaml @@ -0,0 +1,58 @@ +id: simple-e-commerce-shopping-cart-b9227c21bfafb1eba2c9f59a2176e5a7 + +info: + name: > + Simple Ecommerce Shopping Cart Plugin- Sell products through Paypal <= 3.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc946ed-8891-4f97-af7e-2034760eef5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-e-commerce-shopping-cart/" + google-query: inurl:"/wp-content/plugins/simple-e-commerce-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-e-commerce-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-e-commerce-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-e-commerce-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-embed-code-b2367564b8e810af49ec2f68b7f40f1d.yaml b/nuclei-templates/cve-less/plugins/simple-embed-code-b2367564b8e810af49ec2f68b7f40f1d.yaml new file mode 100644 index 0000000000..0fa4ecc1f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-embed-code-b2367564b8e810af49ec2f68b7f40f1d.yaml @@ -0,0 +1,58 @@ +id: simple-embed-code-b2367564b8e810af49ec2f68b7f40f1d + +info: + name: > + Code Embed <= 2.3.6 - Authenticated(Contributor+) Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ef2ded1-dd56-4c33-98dc-d4c69e66568f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-embed-code/" + google-query: inurl:"/wp-content/plugins/simple-embed-code/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-embed-code,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-embed-code/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-embed-code" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-event-planner-0c7da527d5c5020bdc519d1c19025768.yaml b/nuclei-templates/cve-less/plugins/simple-event-planner-0c7da527d5c5020bdc519d1c19025768.yaml new file mode 100644 index 0000000000..83ad6aa84a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-event-planner-0c7da527d5c5020bdc519d1c19025768.yaml @@ -0,0 +1,58 @@ +id: simple-event-planner-0c7da527d5c5020bdc519d1c19025768 + +info: + name: > + Simple Event Planner plugin <= 1.5.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bda0d24c-b1c9-4ae4-93b3-46568982d718?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-event-planner/" + google-query: inurl:"/wp-content/plugins/simple-event-planner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-event-planner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-event-planner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-event-planner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-event-planner-0e3b2109a8f3c98e6d7b288936c49e4a.yaml b/nuclei-templates/cve-less/plugins/simple-event-planner-0e3b2109a8f3c98e6d7b288936c49e4a.yaml new file mode 100644 index 0000000000..3955f74366 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-event-planner-0e3b2109a8f3c98e6d7b288936c49e4a.yaml @@ -0,0 +1,58 @@ +id: simple-event-planner-0e3b2109a8f3c98e6d7b288936c49e4a + +info: + name: > + Simple Event Planner <= 1.5.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43c9b6f2-2b72-4326-8080-f41606c0880c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-event-planner/" + google-query: inurl:"/wp-content/plugins/simple-event-planner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-event-planner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-event-planner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-event-planner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-events-calendar-6cfd85b37acb634912f405192489654f.yaml b/nuclei-templates/cve-less/plugins/simple-events-calendar-6cfd85b37acb634912f405192489654f.yaml new file mode 100644 index 0000000000..e69e9179bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-events-calendar-6cfd85b37acb634912f405192489654f.yaml @@ -0,0 +1,58 @@ +id: simple-events-calendar-6cfd85b37acb634912f405192489654f + +info: + name: > + Simple Events Calendar < 1.3.6 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fff9fee5-3dca-447d-b7a8-981a5818ec12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-events-calendar/" + google-query: inurl:"/wp-content/plugins/simple-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-events-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-events-calendar-d3d0ad8926aafa9beab7b5840f982076.yaml b/nuclei-templates/cve-less/plugins/simple-events-calendar-d3d0ad8926aafa9beab7b5840f982076.yaml new file mode 100644 index 0000000000..26ff6b8570 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-events-calendar-d3d0ad8926aafa9beab7b5840f982076.yaml @@ -0,0 +1,58 @@ +id: simple-events-calendar-d3d0ad8926aafa9beab7b5840f982076 + +info: + name: > + Simple Events Calendar <= 1.4.0 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa5c97bc-b06f-4ee8-bbc5-72c348d2c92a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-events-calendar/" + google-query: inurl:"/wp-content/plugins/simple-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-events-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-facebook-plugin-0fc896a4acc44efa8900b336ff580b9b.yaml b/nuclei-templates/cve-less/plugins/simple-facebook-plugin-0fc896a4acc44efa8900b336ff580b9b.yaml new file mode 100644 index 0000000000..90a290a753 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-facebook-plugin-0fc896a4acc44efa8900b336ff580b9b.yaml @@ -0,0 +1,58 @@ +id: simple-facebook-plugin-0fc896a4acc44efa8900b336ff580b9b + +info: + name: > + Simple Like Page Plugin <= 1.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f81df26f-4390-4626-8539-367a52f8a027?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-facebook-plugin/" + google-query: inurl:"/wp-content/plugins/simple-facebook-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-facebook-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-facebook-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-facebook-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-facebook-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/simple-facebook-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8ad21ddb75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-facebook-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: simple-facebook-twitter-widget-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-facebook-twitter-widget/" + google-query: inurl:"/wp-content/plugins/simple-facebook-twitter-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-facebook-twitter-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-facebook-twitter-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-facebook-twitter-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-feature-requests-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/simple-feature-requests-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..fac80fb416 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-feature-requests-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: simple-feature-requests-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-feature-requests/" + google-query: inurl:"/wp-content/plugins/simple-feature-requests/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-feature-requests,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-feature-requests/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-feature-requests" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-fields-272ee2a329a8d2a28bce41429783dc10.yaml b/nuclei-templates/cve-less/plugins/simple-fields-272ee2a329a8d2a28bce41429783dc10.yaml new file mode 100644 index 0000000000..1169160324 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-fields-272ee2a329a8d2a28bce41429783dc10.yaml @@ -0,0 +1,58 @@ +id: simple-fields-272ee2a329a8d2a28bce41429783dc10 + +info: + name: > + Simple Fields < 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6206d7e-90b9-43fd-a6cd-90e98162cd09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-fields/" + google-query: inurl:"/wp-content/plugins/simple-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-fields-8ee30668d728aabff36c7b1c3fc51930.yaml b/nuclei-templates/cve-less/plugins/simple-fields-8ee30668d728aabff36c7b1c3fc51930.yaml new file mode 100644 index 0000000000..2f8d65c0c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-fields-8ee30668d728aabff36c7b1c3fc51930.yaml @@ -0,0 +1,58 @@ +id: simple-fields-8ee30668d728aabff36c7b1c3fc51930 + +info: + name: > + Simple Fields <= 1.4.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89c32230-99e4-4d08-8afb-8f6f8bf94eab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-fields/" + google-query: inurl:"/wp-content/plugins/simple-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-fields-cac4a2326e31475991ad4983e2696f4e.yaml b/nuclei-templates/cve-less/plugins/simple-fields-cac4a2326e31475991ad4983e2696f4e.yaml new file mode 100644 index 0000000000..70480e228a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-fields-cac4a2326e31475991ad4983e2696f4e.yaml @@ -0,0 +1,58 @@ +id: simple-fields-cac4a2326e31475991ad4983e2696f4e + +info: + name: > + Simple Fields <= 1.4.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f0866a4-0edf-4fb7-8628-4b8e18a2b4bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-fields/" + google-query: inurl:"/wp-content/plugins/simple-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-downloader-f7783b1b95259bfc99e8cabc59fcdb30.yaml b/nuclei-templates/cve-less/plugins/simple-file-downloader-f7783b1b95259bfc99e8cabc59fcdb30.yaml new file mode 100644 index 0000000000..7d13474675 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-downloader-f7783b1b95259bfc99e8cabc59fcdb30.yaml @@ -0,0 +1,58 @@ +id: simple-file-downloader-f7783b1b95259bfc99e8cabc59fcdb30 + +info: + name: > + Simple File Downloader <= 1.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c29c110-87ed-47e3-919f-f6e98f703805?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-downloader/" + google-query: inurl:"/wp-content/plugins/simple-file-downloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-downloader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-downloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-downloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-0bf86b2d6edcb55bd09f7e32e0eeb2ec.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-0bf86b2d6edcb55bd09f7e32e0eeb2ec.yaml new file mode 100644 index 0000000000..a28ad7ed9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-0bf86b2d6edcb55bd09f7e32e0eeb2ec.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-0bf86b2d6edcb55bd09f7e32e0eeb2ec + +info: + name: > + Simple File List <= 4.4.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da9e3db0-9cbf-4b1a-bdaa-d5d86be744af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-1035cac119c2deeb77e8b4fd1a309012.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-1035cac119c2deeb77e8b4fd1a309012.yaml new file mode 100644 index 0000000000..ae243d8c03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-1035cac119c2deeb77e8b4fd1a309012.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-1035cac119c2deeb77e8b4fd1a309012 + +info: + name: > + Simple File List <= 4.4.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6c370f5-087b-4e75-a726-b79bf792441b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-1057cae23f85520832f9b7c2f9fe55c7.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-1057cae23f85520832f9b7c2f9fe55c7.yaml new file mode 100644 index 0000000000..e7351b91b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-1057cae23f85520832f9b7c2f9fe55c7.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-1057cae23f85520832f9b7c2f9fe55c7 + +info: + name: > + Simple File List <= 6.0.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3f0032e-a6f4-47f5-b3eb-6f1c9bf9670c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-12458527208bedb32b3812054b29eb28.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-12458527208bedb32b3812054b29eb28.yaml new file mode 100644 index 0000000000..7df6415a38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-12458527208bedb32b3812054b29eb28.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-12458527208bedb32b3812054b29eb28 + +info: + name: > + Simple File List <= 3.2.7 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff21241d-e488-4460-b8c2-d5a070c8c107?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-14ceaddf4e0a3ca100c27db5abbea3a5.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-14ceaddf4e0a3ca100c27db5abbea3a5.yaml new file mode 100644 index 0000000000..1412e3a26b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-14ceaddf4e0a3ca100c27db5abbea3a5.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-14ceaddf4e0a3ca100c27db5abbea3a5 + +info: + name: > + Simple File List <= 3.2.4 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdfb5e74-e52c-4f44-acdc-9740624af9e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-5be7a97c9b94c45be28a2be5c28c5d40.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-5be7a97c9b94c45be28a2be5c28c5d40.yaml new file mode 100644 index 0000000000..c44d470cec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-5be7a97c9b94c45be28a2be5c28c5d40.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-5be7a97c9b94c45be28a2be5c28c5d40 + +info: + name: > + Simple File List <= 4.2.7 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2d26156-b88c-4cae-a830-be765e1f1473?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-99f94d5f6f5961794646e333f2e12898.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-99f94d5f6f5961794646e333f2e12898.yaml new file mode 100644 index 0000000000..ee7018a2ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-99f94d5f6f5961794646e333f2e12898.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-99f94d5f6f5961794646e333f2e12898 + +info: + name: > + Simple File List <= 6.1.9 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e61b6e54-b330-41a5-b13f-ba11c10d8bfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-ca0b8d3a53c8c8a234faae7fa7f12350.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-ca0b8d3a53c8c8a234faae7fa7f12350.yaml new file mode 100644 index 0000000000..adffa3aaa4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-ca0b8d3a53c8c8a234faae7fa7f12350.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-ca0b8d3a53c8c8a234faae7fa7f12350 + +info: + name: > + Simple File List < 4.2.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9eb835fd-6ebf-4162-856c-0366b663a07e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-d2fe1c961f4314cb633d294e6983652b.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-d2fe1c961f4314cb633d294e6983652b.yaml new file mode 100644 index 0000000000..1271907e8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-d2fe1c961f4314cb633d294e6983652b.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-d2fe1c961f4314cb633d294e6983652b + +info: + name: > + Simple File List <= 6.1.9 - Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7eada9b7-8d53-4e95-858e-aa706f74b2a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-file-list-f1ab2ba9aab33ab61ed9ab0dbb6a8c74.yaml b/nuclei-templates/cve-less/plugins/simple-file-list-f1ab2ba9aab33ab61ed9ab0dbb6a8c74.yaml new file mode 100644 index 0000000000..375edf6af3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-file-list-f1ab2ba9aab33ab61ed9ab0dbb6a8c74.yaml @@ -0,0 +1,58 @@ +id: simple-file-list-f1ab2ba9aab33ab61ed9ab0dbb6a8c74 + +info: + name: > + Simple File List <= 4.4.12 - Cross-Site Request Forgery to Page Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9a94b81-6430-4f04-ac16-4bf79318b5de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-file-list/" + google-query: inurl:"/wp-content/plugins/simple-file-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-file-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-file-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-file-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-flash-video-ec78e7994dbd34ffd9cacf3cd9b3ffa4.yaml b/nuclei-templates/cve-less/plugins/simple-flash-video-ec78e7994dbd34ffd9cacf3cd9b3ffa4.yaml new file mode 100644 index 0000000000..3668932bcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-flash-video-ec78e7994dbd34ffd9cacf3cd9b3ffa4.yaml @@ -0,0 +1,58 @@ +id: simple-flash-video-ec78e7994dbd34ffd9cacf3cd9b3ffa4 + +info: + name: > + Simple Flash Video <= 1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa16cbeb-b3ba-4ef4-83ef-69d8ebd3738f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-flash-video/" + google-query: inurl:"/wp-content/plugins/simple-flash-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-flash-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-flash-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-flash-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-forum-cb19aa38112af2f12cff55ba678ad12d.yaml b/nuclei-templates/cve-less/plugins/simple-forum-cb19aa38112af2f12cff55ba678ad12d.yaml new file mode 100644 index 0000000000..d638894e60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-forum-cb19aa38112af2f12cff55ba678ad12d.yaml @@ -0,0 +1,58 @@ +id: simple-forum-cb19aa38112af2f12cff55ba678ad12d + +info: + name: > + Yellow Swordfish Simple Forum <= 1.11 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2be3638e-3a0d-40e5-914e-9f20971abf9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-forum/" + google-query: inurl:"/wp-content/plugins/simple-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-gmail-login-6882049d71ccbb0177ed642930a8f0f7.yaml b/nuclei-templates/cve-less/plugins/simple-gmail-login-6882049d71ccbb0177ed642930a8f0f7.yaml new file mode 100644 index 0000000000..b42e8c4a88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-gmail-login-6882049d71ccbb0177ed642930a8f0f7.yaml @@ -0,0 +1,58 @@ +id: simple-gmail-login-6882049d71ccbb0177ed642930a8f0f7 + +info: + name: > + Simple Gmail Login < 1.1.4 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe685a64-a84c-4d29-b002-05d40f540391?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-gmail-login/" + google-query: inurl:"/wp-content/plugins/simple-gmail-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-gmail-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-gmail-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-gmail-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-googlebot-visit-5d0daee3984605beba0293322e7ea274.yaml b/nuclei-templates/cve-less/plugins/simple-googlebot-visit-5d0daee3984605beba0293322e7ea274.yaml new file mode 100644 index 0000000000..aa2bb1fe84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-googlebot-visit-5d0daee3984605beba0293322e7ea274.yaml @@ -0,0 +1,58 @@ +id: simple-googlebot-visit-5d0daee3984605beba0293322e7ea274 + +info: + name: > + Simple Googlebot Visit <= 1.2.4 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1e7bb04-28b4-407c-910b-e37a7e26682e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-googlebot-visit/" + google-query: inurl:"/wp-content/plugins/simple-googlebot-visit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-googlebot-visit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-googlebot-visit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-googlebot-visit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-history-29ab8049cd5f90b5e3925c4324e6bd1d.yaml b/nuclei-templates/cve-less/plugins/simple-history-29ab8049cd5f90b5e3925c4324e6bd1d.yaml new file mode 100644 index 0000000000..3b868e8f71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-history-29ab8049cd5f90b5e3925c4324e6bd1d.yaml @@ -0,0 +1,58 @@ +id: simple-history-29ab8049cd5f90b5e3925c4324e6bd1d + +info: + name: > + Simple History <= 1.0.7 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f30af3c4-82be-40d5-be9f-82631b8f3ee2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-history/" + google-query: inurl:"/wp-content/plugins/simple-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-history,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-history-4a300ce6f6f831fce9cb1c19680cdfa4.yaml b/nuclei-templates/cve-less/plugins/simple-history-4a300ce6f6f831fce9cb1c19680cdfa4.yaml new file mode 100644 index 0000000000..3b1423b126 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-history-4a300ce6f6f831fce9cb1c19680cdfa4.yaml @@ -0,0 +1,58 @@ +id: simple-history-4a300ce6f6f831fce9cb1c19680cdfa4 + +info: + name: > + Simple History <= 3.3.1 - Authenticated (Subscriber+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f1e6f04-04d4-4484-86bd-28df6388a953?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-history/" + google-query: inurl:"/wp-content/plugins/simple-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-history,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-history-db642edfb58e0acb6106afe687e6b897.yaml b/nuclei-templates/cve-less/plugins/simple-history-db642edfb58e0acb6106afe687e6b897.yaml new file mode 100644 index 0000000000..d2a776f866 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-history-db642edfb58e0acb6106afe687e6b897.yaml @@ -0,0 +1,58 @@ +id: simple-history-db642edfb58e0acb6106afe687e6b897 + +info: + name: > + Simple History Plugin < 2.7.5 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e01d59-e649-4b84-993b-9faf28a24274?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-history/" + google-query: inurl:"/wp-content/plugins/simple-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-history,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-icons-77fadf9a7971f3244b33864c9a81256e.yaml b/nuclei-templates/cve-less/plugins/simple-icons-77fadf9a7971f3244b33864c9a81256e.yaml new file mode 100644 index 0000000000..5d8e357771 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-icons-77fadf9a7971f3244b33864c9a81256e.yaml @@ -0,0 +1,58 @@ +id: simple-icons-77fadf9a7971f3244b33864c9a81256e + +info: + name: > + Popular Brand Icons - Simple Icons <= 2.7.7 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9b074ed-2edd-4774-b0b2-dc08c9647094?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-icons/" + google-query: inurl:"/wp-content/plugins/simple-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-iframe-b7ed33471f1469ef97fb3b870c3b3d8e.yaml b/nuclei-templates/cve-less/plugins/simple-iframe-b7ed33471f1469ef97fb3b870c3b3d8e.yaml new file mode 100644 index 0000000000..4331b25ee4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-iframe-b7ed33471f1469ef97fb3b870c3b3d8e.yaml @@ -0,0 +1,58 @@ +id: simple-iframe-b7ed33471f1469ef97fb3b870c3b3d8e + +info: + name: > + Simple Iframe <= 1.1.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via block attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/810faad2-b63d-497c-af00-b57a07705608?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-iframe/" + google-query: inurl:"/wp-content/plugins/simple-iframe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-iframe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-iframe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-iframe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-image-manipulator-ea364a8fa3fc256e34217f6289a9b8fd.yaml b/nuclei-templates/cve-less/plugins/simple-image-manipulator-ea364a8fa3fc256e34217f6289a9b8fd.yaml new file mode 100644 index 0000000000..172caf7729 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-image-manipulator-ea364a8fa3fc256e34217f6289a9b8fd.yaml @@ -0,0 +1,58 @@ +id: simple-image-manipulator-ea364a8fa3fc256e34217f6289a9b8fd + +info: + name: > + Simple Image Manipulator <= 1.0 - Remote File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b53bccdd-ed92-4831-bc63-3b96c9aee6e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-image-manipulator/" + google-query: inurl:"/wp-content/plugins/simple-image-manipulator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-image-manipulator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-image-manipulator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-image-manipulator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-image-popup-5bcd1f7720b268a32568c458d817b9bf.yaml b/nuclei-templates/cve-less/plugins/simple-image-popup-5bcd1f7720b268a32568c458d817b9bf.yaml new file mode 100644 index 0000000000..a7d459be85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-image-popup-5bcd1f7720b268a32568c458d817b9bf.yaml @@ -0,0 +1,58 @@ +id: simple-image-popup-5bcd1f7720b268a32568c458d817b9bf + +info: + name: > + Simple Image Popup <= 1.3.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75e89574-a0d4-4383-a6f8-bf977e2ffe4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-image-popup/" + google-query: inurl:"/wp-content/plugins/simple-image-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-image-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-image-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-image-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-image-popup-8279425e8ad5b9257ee709bdcae15c73.yaml b/nuclei-templates/cve-less/plugins/simple-image-popup-8279425e8ad5b9257ee709bdcae15c73.yaml new file mode 100644 index 0000000000..d146808e95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-image-popup-8279425e8ad5b9257ee709bdcae15c73.yaml @@ -0,0 +1,58 @@ +id: simple-image-popup-8279425e8ad5b9257ee709bdcae15c73 + +info: + name: > + Simple Image Popup <= 2.4.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13389191-cbda-4c39-8598-7c2b41f31da7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-image-popup/" + google-query: inurl:"/wp-content/plugins/simple-image-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-image-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-image-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-image-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ip-ban-288abda2cfd9da64eaad068ba5d6f96e.yaml b/nuclei-templates/cve-less/plugins/simple-ip-ban-288abda2cfd9da64eaad068ba5d6f96e.yaml new file mode 100644 index 0000000000..d362909b02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ip-ban-288abda2cfd9da64eaad068ba5d6f96e.yaml @@ -0,0 +1,58 @@ +id: simple-ip-ban-288abda2cfd9da64eaad068ba5d6f96e + +info: + name: > + IP Ban <= 1.2.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fac308c6-780d-44ea-ba78-d15e1ee260e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ip-ban/" + google-query: inurl:"/wp-content/plugins/simple-ip-ban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ip-ban,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ip-ban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ip-ban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-020ad3f8f39e050397b159e81ed4f1b3.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-020ad3f8f39e050397b159e81ed4f1b3.yaml new file mode 100644 index 0000000000..5254eb2b5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-020ad3f8f39e050397b159e81ed4f1b3.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-020ad3f8f39e050397b159e81ed4f1b3 + +info: + name: > + Simple Job Board <= 2.10.8 - Missing Authorization to Unauthenticated Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a28a161-3dbc-4ef0-a2ce-4c102cf3cbb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-0fc41c225cd6f2ddbf5e247314d75c25.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-0fc41c225cd6f2ddbf5e247314d75c25.yaml new file mode 100644 index 0000000000..95627c0ba3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-0fc41c225cd6f2ddbf5e247314d75c25.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-0fc41c225cd6f2ddbf5e247314d75c25 + +info: + name: > + Simple Job Board <= 2.9.3 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31f6032a-19f8-463b-9642-cba205069a22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-290105b1777b3869c2f6dcc0140c3419.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-290105b1777b3869c2f6dcc0140c3419.yaml new file mode 100644 index 0000000000..d873745a02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-290105b1777b3869c2f6dcc0140c3419.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-290105b1777b3869c2f6dcc0140c3419 + +info: + name: > + Simple Job Board <= 2.10.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2214264d-0f3e-455b-9420-c6a1e0d7562c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-38572faa042f019158c1451d2a7c5d7f.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-38572faa042f019158c1451d2a7c5d7f.yaml new file mode 100644 index 0000000000..54b79d2b2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-38572faa042f019158c1451d2a7c5d7f.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-38572faa042f019158c1451d2a7c5d7f + +info: + name: > + Simple Job Board <= 2.10.3 - Cross-Site Request Forgery via sjb_save_settings_section + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bbd528a-94fe-4979-b30f-02c6872db086?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-59d448dc5105924595fdd539b0bfe7c6.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-59d448dc5105924595fdd539b0bfe7c6.yaml new file mode 100644 index 0000000000..451796cd7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-59d448dc5105924595fdd539b0bfe7c6.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-59d448dc5105924595fdd539b0bfe7c6 + +info: + name: > + Simple Job Board <= 2.11.0 - Unauthenticated PHP Object Injection via Job Application Fields + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89584034-4a93-42a6-8fef-55dc3895c45c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-661f3aae79018666cdd8577c9c2b3176.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-661f3aae79018666cdd8577c9c2b3176.yaml new file mode 100644 index 0000000000..43fbf488be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-661f3aae79018666cdd8577c9c2b3176.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-661f3aae79018666cdd8577c9c2b3176 + +info: + name: > + Simple Job Board <= 2.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/564a1631-fe33-40f6-a0eb-37868be07171?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-77686428a77d266ce22bfe59b8ab3fea.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-77686428a77d266ce22bfe59b8ab3fea.yaml new file mode 100644 index 0000000000..785534294b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-77686428a77d266ce22bfe59b8ab3fea.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-77686428a77d266ce22bfe59b8ab3fea + +info: + name: > + Simple Job Board <= 2.9.4 Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37f3aca7-b728-4a27-9e08-bdc9ca2f8f0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-c2ff28d160f20eabee177d8a2b7b09d9.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-c2ff28d160f20eabee177d8a2b7b09d9.yaml new file mode 100644 index 0000000000..8b2c170cde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-c2ff28d160f20eabee177d8a2b7b09d9.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-c2ff28d160f20eabee177d8a2b7b09d9 + +info: + name: > + Simple Job Board <= 2.10.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/100b6786-7cad-4d65-b457-9beb179e293a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-job-board-d3e97b172914a58ea06088d46e467be0.yaml b/nuclei-templates/cve-less/plugins/simple-job-board-d3e97b172914a58ea06088d46e467be0.yaml new file mode 100644 index 0000000000..a935a2175f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-job-board-d3e97b172914a58ea06088d46e467be0.yaml @@ -0,0 +1,58 @@ +id: simple-job-board-d3e97b172914a58ea06088d46e467be0 + +info: + name: > + Simple Job Board <= 2.9.6 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/838ccf02-2b01-42f8-b5bf-6fafbb2db673?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-job-board/" + google-query: inurl:"/wp-content/plugins/simple-job-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-job-board,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-job-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-job-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-jwt-login-3ada0767be249ce4ccbdfd9339b2ad7e.yaml b/nuclei-templates/cve-less/plugins/simple-jwt-login-3ada0767be249ce4ccbdfd9339b2ad7e.yaml new file mode 100644 index 0000000000..689598b4b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-jwt-login-3ada0767be249ce4ccbdfd9339b2ad7e.yaml @@ -0,0 +1,58 @@ +id: simple-jwt-login-3ada0767be249ce4ccbdfd9339b2ad7e + +info: + name: > + Simple JWT Login <= 3.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f89ba641-6c78-48d3-8826-96576198274f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-jwt-login/" + google-query: inurl:"/wp-content/plugins/simple-jwt-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-jwt-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-jwt-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-jwt-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-jwt-login-8fbdf0ef245a8769540801975b5c209f.yaml b/nuclei-templates/cve-less/plugins/simple-jwt-login-8fbdf0ef245a8769540801975b5c209f.yaml new file mode 100644 index 0000000000..0e927e18b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-jwt-login-8fbdf0ef245a8769540801975b5c209f.yaml @@ -0,0 +1,58 @@ +id: simple-jwt-login-8fbdf0ef245a8769540801975b5c209f + +info: + name: > + Simple JWT Login <= 3.2.1 - Insecure Password Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/defd82dd-bda0-4f0c-88cb-4db983953097?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-jwt-login/" + google-query: inurl:"/wp-content/plugins/simple-jwt-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-jwt-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-jwt-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-jwt-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-lightbox-gallery-e6650062a97ccf46abe2dbd6696321ce.yaml b/nuclei-templates/cve-less/plugins/simple-lightbox-gallery-e6650062a97ccf46abe2dbd6696321ce.yaml new file mode 100644 index 0000000000..57c546e686 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-lightbox-gallery-e6650062a97ccf46abe2dbd6696321ce.yaml @@ -0,0 +1,58 @@ +id: simple-lightbox-gallery-e6650062a97ccf46abe2dbd6696321ce + +info: + name: > + Lightbox slider – Responsive Lightbox Gallery <= 1.9.9 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/540b2888-16fe-4791-8d08-f7772f71d511?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-lightbox-gallery/" + google-query: inurl:"/wp-content/plugins/simple-lightbox-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-lightbox-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-lightbox-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-lightbox-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-link-directory-015dffa63b4d6620c92e5c35b6af39d2.yaml b/nuclei-templates/cve-less/plugins/simple-link-directory-015dffa63b4d6620c92e5c35b6af39d2.yaml new file mode 100644 index 0000000000..e9d16c12a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-link-directory-015dffa63b4d6620c92e5c35b6af39d2.yaml @@ -0,0 +1,58 @@ +id: simple-link-directory-015dffa63b4d6620c92e5c35b6af39d2 + +info: + name: > + Simple Link Directory <= 5.6.0 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd302d8e-bba1-4fa1-bcbc-591d894ca1d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-link-directory/" + google-query: inurl:"/wp-content/plugins/simple-link-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-link-directory,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-link-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-link-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-link-directory-79157f424e30fa185835500ed275b892.yaml b/nuclei-templates/cve-less/plugins/simple-link-directory-79157f424e30fa185835500ed275b892.yaml new file mode 100644 index 0000000000..198e2ea756 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-link-directory-79157f424e30fa185835500ed275b892.yaml @@ -0,0 +1,58 @@ +id: simple-link-directory-79157f424e30fa185835500ed275b892 + +info: + name: > + Simple Link Directory <= 7.7.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16bce38a-07fa-43b7-aacb-6c932c3d0987?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-link-directory/" + google-query: inurl:"/wp-content/plugins/simple-link-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-link-directory,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-link-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-link-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-link-directory-7c915245e6d34ca005ac6f0296c41e2a.yaml b/nuclei-templates/cve-less/plugins/simple-link-directory-7c915245e6d34ca005ac6f0296c41e2a.yaml new file mode 100644 index 0000000000..713517005f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-link-directory-7c915245e6d34ca005ac6f0296c41e2a.yaml @@ -0,0 +1,58 @@ +id: simple-link-directory-7c915245e6d34ca005ac6f0296c41e2a + +info: + name: > + Simple Link Directory < 7.3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7eda36e-7cdf-444f-82ce-561ba96cd0f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-link-directory/" + google-query: inurl:"/wp-content/plugins/simple-link-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-link-directory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-link-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-link-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-local-avatars-39a5dd9e98d6f265b6feec05166e7c4e.yaml b/nuclei-templates/cve-less/plugins/simple-local-avatars-39a5dd9e98d6f265b6feec05166e7c4e.yaml new file mode 100644 index 0000000000..625f81bc8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-local-avatars-39a5dd9e98d6f265b6feec05166e7c4e.yaml @@ -0,0 +1,58 @@ +id: simple-local-avatars-39a5dd9e98d6f265b6feec05166e7c4e + +info: + name: > + http-cache-semantics < 4.1.1 - Regular Expression Denial of Service (ReDoS) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6092987-5f60-42ac-9636-e1e0a2c85147?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-local-avatars/" + google-query: inurl:"/wp-content/plugins/simple-local-avatars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-local-avatars,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-local-avatars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-local-avatars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-local-avatars-bc55ea7b509124d1a77831d4400c5030.yaml b/nuclei-templates/cve-less/plugins/simple-local-avatars-bc55ea7b509124d1a77831d4400c5030.yaml new file mode 100644 index 0000000000..d2dd896a74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-local-avatars-bc55ea7b509124d1a77831d4400c5030.yaml @@ -0,0 +1,58 @@ +id: simple-local-avatars-bc55ea7b509124d1a77831d4400c5030 + +info: + name: > + simple-git < 3.16.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46fdd494-8073-4a68-a4ab-1f5767011f67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-local-avatars/" + google-query: inurl:"/wp-content/plugins/simple-local-avatars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-local-avatars,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-local-avatars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-local-avatars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-local-avatars-c3dca1d1ef3a946c9ddf3e33caa00021.yaml b/nuclei-templates/cve-less/plugins/simple-local-avatars-c3dca1d1ef3a946c9ddf3e33caa00021.yaml new file mode 100644 index 0000000000..5b81c56ced --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-local-avatars-c3dca1d1ef3a946c9ddf3e33caa00021.yaml @@ -0,0 +1,58 @@ +id: simple-local-avatars-c3dca1d1ef3a946c9ddf3e33caa00021 + +info: + name: > + terser (JS Package) < 5.14.2 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c08c10-7358-4618-b892-7d222ba460de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-local-avatars/" + google-query: inurl:"/wp-content/plugins/simple-local-avatars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-local-avatars,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-local-avatars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-local-avatars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-login-log-12a03041cb4314274c121ed3640d2d05.yaml b/nuclei-templates/cve-less/plugins/simple-login-log-12a03041cb4314274c121ed3640d2d05.yaml new file mode 100644 index 0000000000..8afd772eb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-login-log-12a03041cb4314274c121ed3640d2d05.yaml @@ -0,0 +1,58 @@ +id: simple-login-log-12a03041cb4314274c121ed3640d2d05 + +info: + name: > + Simple Login Log < 1.1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c741350a-e083-499c-992d-727f46ca57f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-login-log/" + google-query: inurl:"/wp-content/plugins/simple-login-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-login-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-login-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-login-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-login-log-dccb2fad351753e7b3f64d92b4c6eda7.yaml b/nuclei-templates/cve-less/plugins/simple-login-log-dccb2fad351753e7b3f64d92b4c6eda7.yaml new file mode 100644 index 0000000000..4bdabc47f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-login-log-dccb2fad351753e7b3f64d92b4c6eda7.yaml @@ -0,0 +1,58 @@ +id: simple-login-log-dccb2fad351753e7b3f64d92b4c6eda7 + +info: + name: > + Simple Login Log < 1.1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33680429-8a52-412b-ab61-d261801319a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-login-log/" + google-query: inurl:"/wp-content/plugins/simple-login-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-login-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-login-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-login-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-long-form-5a0364c13a90f16b0ef1e911c302d0f2.yaml b/nuclei-templates/cve-less/plugins/simple-long-form-5a0364c13a90f16b0ef1e911c302d0f2.yaml new file mode 100644 index 0000000000..f76a7e555d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-long-form-5a0364c13a90f16b0ef1e911c302d0f2.yaml @@ -0,0 +1,58 @@ +id: simple-long-form-5a0364c13a90f16b0ef1e911c302d0f2 + +info: + name: > + Simple Long Form <= 2.2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68c22e71-c704-44c1-86e6-856f6244393d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-long-form/" + google-query: inurl:"/wp-content/plugins/simple-long-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-long-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-long-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-long-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-mail-address-encoder-af3f71c6cb2b4348d03bef1b2409408c.yaml b/nuclei-templates/cve-less/plugins/simple-mail-address-encoder-af3f71c6cb2b4348d03bef1b2409408c.yaml new file mode 100644 index 0000000000..d6dfa7bac9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-mail-address-encoder-af3f71c6cb2b4348d03bef1b2409408c.yaml @@ -0,0 +1,58 @@ +id: simple-mail-address-encoder-af3f71c6cb2b4348d03bef1b2409408c + +info: + name: > + Simple Mail Address Encoder < 1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ac68b80-31ce-4e61-b3ab-0f43cda64125?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-mail-address-encoder/" + google-query: inurl:"/wp-content/plugins/simple-mail-address-encoder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-mail-address-encoder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-mail-address-encoder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-mail-address-encoder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-matted-thumbnails-6c5121c72e7c9f744eb347ac328d000e.yaml b/nuclei-templates/cve-less/plugins/simple-matted-thumbnails-6c5121c72e7c9f744eb347ac328d000e.yaml new file mode 100644 index 0000000000..ccf3c2434a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-matted-thumbnails-6c5121c72e7c9f744eb347ac328d000e.yaml @@ -0,0 +1,58 @@ +id: simple-matted-thumbnails-6c5121c72e7c9f744eb347ac328d000e + +info: + name: > + Simple Matted Thumbnails <= 1.01 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80098d80-79f5-4016-860a-15f7f608da29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-matted-thumbnails/" + google-query: inurl:"/wp-content/plugins/simple-matted-thumbnails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-matted-thumbnails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-matted-thumbnails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-matted-thumbnails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-0e0241755c24b40325ed6519b8127a2f.yaml b/nuclei-templates/cve-less/plugins/simple-membership-0e0241755c24b40325ed6519b8127a2f.yaml new file mode 100644 index 0000000000..ce546cd155 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-0e0241755c24b40325ed6519b8127a2f.yaml @@ -0,0 +1,58 @@ +id: simple-membership-0e0241755c24b40325ed6519b8127a2f + +info: + name: > + Simple Membership <= 4.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc322548-ffc9-4246-9835-fcc5705cef3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-127d546d7f94ec42c9601b4f8349bbdc.yaml b/nuclei-templates/cve-less/plugins/simple-membership-127d546d7f94ec42c9601b4f8349bbdc.yaml new file mode 100644 index 0000000000..68cd40e702 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-127d546d7f94ec42c9601b4f8349bbdc.yaml @@ -0,0 +1,58 @@ +id: simple-membership-127d546d7f94ec42c9601b4f8349bbdc + +info: + name: > + Simple Membership <= 4.0.8 - Cross-Site Request Forgery to Arbitrary Member Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70fa060f-11eb-4b51-b985-59421f44414e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-2f13e3a17e9723ee8fd643dcd4f4cb9b.yaml b/nuclei-templates/cve-less/plugins/simple-membership-2f13e3a17e9723ee8fd643dcd4f4cb9b.yaml new file mode 100644 index 0000000000..993fc14139 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-2f13e3a17e9723ee8fd643dcd4f4cb9b.yaml @@ -0,0 +1,58 @@ +id: simple-membership-2f13e3a17e9723ee8fd643dcd4f4cb9b + +info: + name: > + Simple Membership <= 4.3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18fe9769-3681-4a5e-866a-640b4cc76199?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-3097ab413126701a31b2c663342da851.yaml b/nuclei-templates/cve-less/plugins/simple-membership-3097ab413126701a31b2c663342da851.yaml new file mode 100644 index 0000000000..1e4a33bca7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-3097ab413126701a31b2c663342da851.yaml @@ -0,0 +1,58 @@ +id: simple-membership-3097ab413126701a31b2c663342da851 + +info: + name: > + Simple Membership <= 4.4.3 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63779ab7-ba8b-459d-beb3-a32faf8f4394?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-3586a3c704c10a9bba7bafa073bac863.yaml b/nuclei-templates/cve-less/plugins/simple-membership-3586a3c704c10a9bba7bafa073bac863.yaml new file mode 100644 index 0000000000..e4c2302e47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-3586a3c704c10a9bba7bafa073bac863.yaml @@ -0,0 +1,58 @@ +id: simple-membership-3586a3c704c10a9bba7bafa073bac863 + +info: + name: > + Simple Membership <= 4.1.2 - Membership Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/792282d1-5f43-4511-becc-9c5bb5ae513a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-3af100998fbed69cbdecde044b4ff026.yaml b/nuclei-templates/cve-less/plugins/simple-membership-3af100998fbed69cbdecde044b4ff026.yaml new file mode 100644 index 0000000000..b122581aeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-3af100998fbed69cbdecde044b4ff026.yaml @@ -0,0 +1,58 @@ +id: simple-membership-3af100998fbed69cbdecde044b4ff026 + +info: + name: > + Simple Membership <= 4.3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b10172-7e54-4ff8-9fbb-41d160ce49e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-492d26185e3f340adae3b16a9841dc89.yaml b/nuclei-templates/cve-less/plugins/simple-membership-492d26185e3f340adae3b16a9841dc89.yaml new file mode 100644 index 0000000000..2becc2300f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-492d26185e3f340adae3b16a9841dc89.yaml @@ -0,0 +1,58 @@ +id: simple-membership-492d26185e3f340adae3b16a9841dc89 + +info: + name: > + Simple Membership <= 3.3.2 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f721aa1-d12f-4829-8e82-61f9af6a3519?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-4ad519606c4e4a0ac9ad3558c99fc1da.yaml b/nuclei-templates/cve-less/plugins/simple-membership-4ad519606c4e4a0ac9ad3558c99fc1da.yaml new file mode 100644 index 0000000000..0bfb2dc872 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-4ad519606c4e4a0ac9ad3558c99fc1da.yaml @@ -0,0 +1,58 @@ +id: simple-membership-4ad519606c4e4a0ac9ad3558c99fc1da + +info: + name: > + Simple Membership <= 3.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/839957ea-5186-4cce-971d-57eed84639d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-4ae0743589a43c31ae78715c1bb792c2.yaml b/nuclei-templates/cve-less/plugins/simple-membership-4ae0743589a43c31ae78715c1bb792c2.yaml new file mode 100644 index 0000000000..af7473025f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-4ae0743589a43c31ae78715c1bb792c2.yaml @@ -0,0 +1,58 @@ +id: simple-membership-4ae0743589a43c31ae78715c1bb792c2 + +info: + name: > + Simple Membership <= 4.2.1 - Authenticated (Contributor+) Cross Site Scripting via shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7772c78e-3134-4855-ac4e-3520c584c2e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-59892014ec81eb27e2ab381aff54e186.yaml b/nuclei-templates/cve-less/plugins/simple-membership-59892014ec81eb27e2ab381aff54e186.yaml new file mode 100644 index 0000000000..a727e9e015 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-59892014ec81eb27e2ab381aff54e186.yaml @@ -0,0 +1,58 @@ +id: simple-membership-59892014ec81eb27e2ab381aff54e186 + +info: + name: > + Simple Membership <= 4.4.2 - Unauthenticated Stored Self-Based Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a6ca886-de4c-4d45-a934-3e90378e7eb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-74e01ccc109391de849c5a0cd8cc8167.yaml b/nuclei-templates/cve-less/plugins/simple-membership-74e01ccc109391de849c5a0cd8cc8167.yaml new file mode 100644 index 0000000000..89e833d673 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-74e01ccc109391de849c5a0cd8cc8167.yaml @@ -0,0 +1,58 @@ +id: simple-membership-74e01ccc109391de849c5a0cd8cc8167 + +info: + name: > + Simple Membership <= 4.3.8 - Reflected Cross-Site Scripting Vulnerability via environment_mode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/366165fe-93e5-49ab-b2e5-1de624f22286?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-7928906e44428b2e974a49500a097fe0.yaml b/nuclei-templates/cve-less/plugins/simple-membership-7928906e44428b2e974a49500a097fe0.yaml new file mode 100644 index 0000000000..681528e015 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-7928906e44428b2e974a49500a097fe0.yaml @@ -0,0 +1,58 @@ +id: simple-membership-7928906e44428b2e974a49500a097fe0 + +info: + name: > + Simple Membership < 3.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95c2038f-c4f9-472a-92ab-59ee395bda3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-85baf9c84f251fb6b49e11a866b547fb.yaml b/nuclei-templates/cve-less/plugins/simple-membership-85baf9c84f251fb6b49e11a866b547fb.yaml new file mode 100644 index 0000000000..362489abf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-85baf9c84f251fb6b49e11a866b547fb.yaml @@ -0,0 +1,58 @@ +id: simple-membership-85baf9c84f251fb6b49e11a866b547fb + +info: + name: > + Simple Membership <= 4.3.4 - Privilege escalation via Registration + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cff7dc5-23e1-424c-923b-68eef49dec6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-a905027b9d2ec38752ee2efe0b3dd4df.yaml b/nuclei-templates/cve-less/plugins/simple-membership-a905027b9d2ec38752ee2efe0b3dd4df.yaml new file mode 100644 index 0000000000..27cff24519 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-a905027b9d2ec38752ee2efe0b3dd4df.yaml @@ -0,0 +1,58 @@ +id: simple-membership-a905027b9d2ec38752ee2efe0b3dd4df + +info: + name: > + Simple Membership <= 4.0.9 - Cross-Site Request Forgery to Arbitrary Transaction Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7aa6da4d-7221-4878-8532-5372227f906a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-c287a1ab95bf7ac0c8652093f1dad2f5.yaml b/nuclei-templates/cve-less/plugins/simple-membership-c287a1ab95bf7ac0c8652093f1dad2f5.yaml new file mode 100644 index 0000000000..cea3e0fc7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-c287a1ab95bf7ac0c8652093f1dad2f5.yaml @@ -0,0 +1,58 @@ +id: simple-membership-c287a1ab95bf7ac0c8652093f1dad2f5 + +info: + name: > + Simple Membership <= 4.4.1 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0086de8-448f-452f-89d1-84b77b2e25a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-d6d556bb2d97483e57922ab9c509f981.yaml b/nuclei-templates/cve-less/plugins/simple-membership-d6d556bb2d97483e57922ab9c509f981.yaml new file mode 100644 index 0000000000..a06e3b18bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-d6d556bb2d97483e57922ab9c509f981.yaml @@ -0,0 +1,58 @@ +id: simple-membership-d6d556bb2d97483e57922ab9c509f981 + +info: + name: > + Simple Membership <= 4.1.2 - Membership Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/284eafb9-94bc-4478-abff-f7dafd510a1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-d87695af989823f3f60bb3499466b104.yaml b/nuclei-templates/cve-less/plugins/simple-membership-d87695af989823f3f60bb3499466b104.yaml new file mode 100644 index 0000000000..1dc97f16c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-d87695af989823f3f60bb3499466b104.yaml @@ -0,0 +1,58 @@ +id: simple-membership-d87695af989823f3f60bb3499466b104 + +info: + name: > + Simple Membership <= 3.5.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd3f0e3-e73e-4ec2-ac67-da1cc15aa217?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-db5dfd04511983fc7ceb561728d3d97d.yaml b/nuclei-templates/cve-less/plugins/simple-membership-db5dfd04511983fc7ceb561728d3d97d.yaml new file mode 100644 index 0000000000..668f8c01ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-db5dfd04511983fc7ceb561728d3d97d.yaml @@ -0,0 +1,58 @@ +id: simple-membership-db5dfd04511983fc7ceb561728d3d97d + +info: + name: > + Simple Membership <= 4.0.3 - Authenticated (Admin+) SQL Injections + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1664fef3-6416-4678-9ee7-bed2184d7490?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-e1512d94164bf44f71f33d2c22c01840.yaml b/nuclei-templates/cve-less/plugins/simple-membership-e1512d94164bf44f71f33d2c22c01840.yaml new file mode 100644 index 0000000000..1b453e7d2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-e1512d94164bf44f71f33d2c22c01840.yaml @@ -0,0 +1,58 @@ +id: simple-membership-e1512d94164bf44f71f33d2c22c01840 + +info: + name: > + Simple Membership <= 4.4.5 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56fdbf80-8ea2-412a-b166-b7c27de88e70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-ee68d2b7440e6b2e6fe5023cb49039df.yaml b/nuclei-templates/cve-less/plugins/simple-membership-ee68d2b7440e6b2e6fe5023cb49039df.yaml new file mode 100644 index 0000000000..9dccf8c22a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-ee68d2b7440e6b2e6fe5023cb49039df.yaml @@ -0,0 +1,58 @@ +id: simple-membership-ee68d2b7440e6b2e6fe5023cb49039df + +info: + name: > + Simple Membership <= 4.3.4 - Account Takeover via Password Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e53bb240-8784-4d34-8d3f-4a7af917f3f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership/" + google-query: inurl:"/wp-content/plugins/simple-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-membership-wp-user-import-c2be66a7e8a99421d368476b2dea75ed.yaml b/nuclei-templates/cve-less/plugins/simple-membership-wp-user-import-c2be66a7e8a99421d368476b2dea75ed.yaml new file mode 100644 index 0000000000..2b35868382 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-membership-wp-user-import-c2be66a7e8a99421d368476b2dea75ed.yaml @@ -0,0 +1,58 @@ +id: simple-membership-wp-user-import-c2be66a7e8a99421d368476b2dea75ed + +info: + name: > + Simple Membership WP user Import <= 1.7 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f781533-b633-4452-95bd-c32ed0de2ea9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-membership-wp-user-import/" + google-query: inurl:"/wp-content/plugins/simple-membership-wp-user-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-membership-wp-user-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-membership-wp-user-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-membership-wp-user-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-mobile-url-redirect-8476462746ebfeabed27484bda97b80c.yaml b/nuclei-templates/cve-less/plugins/simple-mobile-url-redirect-8476462746ebfeabed27484bda97b80c.yaml new file mode 100644 index 0000000000..385c83eff8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-mobile-url-redirect-8476462746ebfeabed27484bda97b80c.yaml @@ -0,0 +1,58 @@ +id: simple-mobile-url-redirect-8476462746ebfeabed27484bda97b80c + +info: + name: > + Simple Mobile URL Redirect <= 1.7.2 - Cross-Site Request Forgery leading to Mobile Redirect Updates + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be8dcff9-1626-4919-b297-c423891f3d02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-mobile-url-redirect/" + google-query: inurl:"/wp-content/plugins/simple-mobile-url-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-mobile-url-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-mobile-url-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-mobile-url-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-org-chart-5ed062a5fc9035bd7e1a852f98a93b1f.yaml b/nuclei-templates/cve-less/plugins/simple-org-chart-5ed062a5fc9035bd7e1a852f98a93b1f.yaml new file mode 100644 index 0000000000..3c70357fb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-org-chart-5ed062a5fc9035bd7e1a852f98a93b1f.yaml @@ -0,0 +1,58 @@ +id: simple-org-chart-5ed062a5fc9035bd7e1a852f98a93b1f + +info: + name: > + Simple Org Chart <= 2.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d413350-f520-4dd9-af7d-e776628aef1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-org-chart/" + google-query: inurl:"/wp-content/plugins/simple-org-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-org-chart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-org-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-org-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-org-chart-7a420ee74601bcf08094df0c89e9ad5e.yaml b/nuclei-templates/cve-less/plugins/simple-org-chart-7a420ee74601bcf08094df0c89e9ad5e.yaml new file mode 100644 index 0000000000..1f050dd01e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-org-chart-7a420ee74601bcf08094df0c89e9ad5e.yaml @@ -0,0 +1,58 @@ +id: simple-org-chart-7a420ee74601bcf08094df0c89e9ad5e + +info: + name: > + Simple Org Chart <= 2.3.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c674ec32-7959-414a-8c31-3455bebb47bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-org-chart/" + google-query: inurl:"/wp-content/plugins/simple-org-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-org-chart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-org-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-org-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-page-access-restriction-f4f0364b52b62c50c67321424bfe5d46.yaml b/nuclei-templates/cve-less/plugins/simple-page-access-restriction-f4f0364b52b62c50c67321424bfe5d46.yaml new file mode 100644 index 0000000000..14a653d0df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-page-access-restriction-f4f0364b52b62c50c67321424bfe5d46.yaml @@ -0,0 +1,58 @@ +id: simple-page-access-restriction-f4f0364b52b62c50c67321424bfe5d46 + +info: + name: > + Simple Page Access Restriction <= 1.0.21 - Improper Access Control to Sensitive Information Exposure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d99dc270-1b28-4e76-9346-38b2b96be01c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-page-access-restriction/" + google-query: inurl:"/wp-content/plugins/simple-page-access-restriction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-page-access-restriction,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-page-access-restriction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-page-access-restriction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-page-ordering-05c2167f7f1f78fa58c980d418931b2c.yaml b/nuclei-templates/cve-less/plugins/simple-page-ordering-05c2167f7f1f78fa58c980d418931b2c.yaml new file mode 100644 index 0000000000..70e7e9e22f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-page-ordering-05c2167f7f1f78fa58c980d418931b2c.yaml @@ -0,0 +1,58 @@ +id: simple-page-ordering-05c2167f7f1f78fa58c980d418931b2c + +info: + name: > + got (JS Package) <= 11.8.4 and 12.0-<12.1.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47681954-37ed-493b-b4da-9e9032e561b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-page-ordering/" + google-query: inurl:"/wp-content/plugins/simple-page-ordering/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-page-ordering,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-page-ordering/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-page-ordering" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-page-ordering-1951707b594e6f4a4e8e4243b43c9841.yaml b/nuclei-templates/cve-less/plugins/simple-page-ordering-1951707b594e6f4a4e8e4243b43c9841.yaml new file mode 100644 index 0000000000..5dc0b2cbf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-page-ordering-1951707b594e6f4a4e8e4243b43c9841.yaml @@ -0,0 +1,58 @@ +id: simple-page-ordering-1951707b594e6f4a4e8e4243b43c9841 + +info: + name: > + loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb93138-f2f9-4a3f-a0a2-d79a315c44f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-page-ordering/" + google-query: inurl:"/wp-content/plugins/simple-page-ordering/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-page-ordering,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-page-ordering/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-page-ordering" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-page-ordering-4ae509b53172b618cff3a0afd6c091e5.yaml b/nuclei-templates/cve-less/plugins/simple-page-ordering-4ae509b53172b618cff3a0afd6c091e5.yaml new file mode 100644 index 0000000000..7eefc1d961 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-page-ordering-4ae509b53172b618cff3a0afd6c091e5.yaml @@ -0,0 +1,58 @@ +id: simple-page-ordering-4ae509b53172b618cff3a0afd6c091e5 + +info: + name: > + Simple Page Ordering <= 2.5.0 - Missing Authorization to Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77d8d29b-b730-46be-a354-7abfa83ac664?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-page-ordering/" + google-query: inurl:"/wp-content/plugins/simple-page-ordering/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-page-ordering,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-page-ordering/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-page-ordering" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-page-ordering-bd26ccd939104e13f73f569b312459d6.yaml b/nuclei-templates/cve-less/plugins/simple-page-ordering-bd26ccd939104e13f73f569b312459d6.yaml new file mode 100644 index 0000000000..9b758c4d94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-page-ordering-bd26ccd939104e13f73f569b312459d6.yaml @@ -0,0 +1,58 @@ +id: simple-page-ordering-bd26ccd939104e13f73f569b312459d6 + +info: + name: > + loader-utils (JS package) < 3.2.1 - Regular Expression Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2954a007-37ac-4811-a258-b3fdd738043f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-page-ordering/" + google-query: inurl:"/wp-content/plugins/simple-page-ordering/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-page-ordering,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-page-ordering/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-page-ordering" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-page-transition-e261c5a60aee7d653735874a5f24eea5.yaml b/nuclei-templates/cve-less/plugins/simple-page-transition-e261c5a60aee7d653735874a5f24eea5.yaml new file mode 100644 index 0000000000..cb3da5ea85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-page-transition-e261c5a60aee7d653735874a5f24eea5.yaml @@ -0,0 +1,58 @@ +id: simple-page-transition-e261c5a60aee7d653735874a5f24eea5 + +info: + name: > + Simple Page Transition <= 1.4.1 - Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3931b201-037d-4c4f-8e40-098c6c1251b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-page-transition/" + google-query: inurl:"/wp-content/plugins/simple-page-transition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-page-transition,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-page-transition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-page-transition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-pdf-viewer-03f092a688a4fa72580d80fe6ada5bb3.yaml b/nuclei-templates/cve-less/plugins/simple-pdf-viewer-03f092a688a4fa72580d80fe6ada5bb3.yaml new file mode 100644 index 0000000000..fd1f09212b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-pdf-viewer-03f092a688a4fa72580d80fe6ada5bb3.yaml @@ -0,0 +1,58 @@ +id: simple-pdf-viewer-03f092a688a4fa72580d80fe6ada5bb3 + +info: + name: > + Simple PDF Viewer <= 1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via googlepdf Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89bc17fd-14e8-4210-8cf7-a043d1ea9c22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-pdf-viewer/" + google-query: inurl:"/wp-content/plugins/simple-pdf-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-pdf-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-pdf-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-pdf-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-personal-message-b85cfdf152cc4ae0e3deb547dc1b6d6a.yaml b/nuclei-templates/cve-less/plugins/simple-personal-message-b85cfdf152cc4ae0e3deb547dc1b6d6a.yaml new file mode 100644 index 0000000000..4557991b21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-personal-message-b85cfdf152cc4ae0e3deb547dc1b6d6a.yaml @@ -0,0 +1,58 @@ +id: simple-personal-message-b85cfdf152cc4ae0e3deb547dc1b6d6a + +info: + name: > + Simple Personal Message < 2.0.0 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c99e7f4c-ba91-4d64-b8d4-23940381e79a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-personal-message/" + google-query: inurl:"/wp-content/plugins/simple-personal-message/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-personal-message,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-personal-message/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-personal-message" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-photo-gallery-8c2e6071ee4d4b147b6cf4ef074e12d8.yaml b/nuclei-templates/cve-less/plugins/simple-photo-gallery-8c2e6071ee4d4b147b6cf4ef074e12d8.yaml new file mode 100644 index 0000000000..5664a9d717 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-photo-gallery-8c2e6071ee4d4b147b6cf4ef074e12d8.yaml @@ -0,0 +1,58 @@ +id: simple-photo-gallery-8c2e6071ee4d4b147b6cf4ef074e12d8 + +info: + name: > + Simple Photo Gallery <= 1.8.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13c03af2-0bd8-4e81-8ae9-2d702da71fc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-photo-gallery/" + google-query: inurl:"/wp-content/plugins/simple-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-photo-gallery-c565f2afdd0b7bcc15b5e1a59e0b33d0.yaml b/nuclei-templates/cve-less/plugins/simple-photo-gallery-c565f2afdd0b7bcc15b5e1a59e0b33d0.yaml new file mode 100644 index 0000000000..50be8dde68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-photo-gallery-c565f2afdd0b7bcc15b5e1a59e0b33d0.yaml @@ -0,0 +1,58 @@ +id: simple-photo-gallery-c565f2afdd0b7bcc15b5e1a59e0b33d0 + +info: + name: > + Simple Photo Gallery <= 1.8.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/306fa8e1-b62f-4514-8463-e696d043f6f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-photo-gallery/" + google-query: inurl:"/wp-content/plugins/simple-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-photo-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-podcasting-05c2167f7f1f78fa58c980d418931b2c.yaml b/nuclei-templates/cve-less/plugins/simple-podcasting-05c2167f7f1f78fa58c980d418931b2c.yaml new file mode 100644 index 0000000000..62589ac354 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-podcasting-05c2167f7f1f78fa58c980d418931b2c.yaml @@ -0,0 +1,58 @@ +id: simple-podcasting-05c2167f7f1f78fa58c980d418931b2c + +info: + name: > + got (JS Package) <= 11.8.4 and 12.0-<12.1.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47681954-37ed-493b-b4da-9e9032e561b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-podcasting/" + google-query: inurl:"/wp-content/plugins/simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-podcasting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-podcasting-48cf291038d407d0c14437de80bf836d.yaml b/nuclei-templates/cve-less/plugins/simple-podcasting-48cf291038d407d0c14437de80bf836d.yaml new file mode 100644 index 0000000000..ee8b55c771 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-podcasting-48cf291038d407d0c14437de80bf836d.yaml @@ -0,0 +1,58 @@ +id: simple-podcasting-48cf291038d407d0c14437de80bf836d + +info: + name: > + json5 <= 1.0.1 and 2.0.0-2.2.1 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d5fad17-3b28-4f99-9508-f807cb06cfe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-podcasting/" + google-query: inurl:"/wp-content/plugins/simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-podcasting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-podcasting-73081b1f6f4e13a9e6e969eba5e746fc.yaml b/nuclei-templates/cve-less/plugins/simple-podcasting-73081b1f6f4e13a9e6e969eba5e746fc.yaml new file mode 100644 index 0000000000..eb309336fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-podcasting-73081b1f6f4e13a9e6e969eba5e746fc.yaml @@ -0,0 +1,58 @@ +id: simple-podcasting-73081b1f6f4e13a9e6e969eba5e746fc + +info: + name: > + simple-git < 3.15.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c747e6f-31fc-41b0-ba62-f009b5483696?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-podcasting/" + google-query: inurl:"/wp-content/plugins/simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-podcasting,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-podcasting-bc55ea7b509124d1a77831d4400c5030.yaml b/nuclei-templates/cve-less/plugins/simple-podcasting-bc55ea7b509124d1a77831d4400c5030.yaml new file mode 100644 index 0000000000..6a652f3441 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-podcasting-bc55ea7b509124d1a77831d4400c5030.yaml @@ -0,0 +1,58 @@ +id: simple-podcasting-bc55ea7b509124d1a77831d4400c5030 + +info: + name: > + simple-git < 3.16.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46fdd494-8073-4a68-a4ab-1f5767011f67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-podcasting/" + google-query: inurl:"/wp-content/plugins/simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-podcasting,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-podcasting-c3dca1d1ef3a946c9ddf3e33caa00021.yaml b/nuclei-templates/cve-less/plugins/simple-podcasting-c3dca1d1ef3a946c9ddf3e33caa00021.yaml new file mode 100644 index 0000000000..dfec196571 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-podcasting-c3dca1d1ef3a946c9ddf3e33caa00021.yaml @@ -0,0 +1,58 @@ +id: simple-podcasting-c3dca1d1ef3a946c9ddf3e33caa00021 + +info: + name: > + terser (JS Package) < 5.14.2 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c08c10-7358-4618-b892-7d222ba460de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-podcasting/" + google-query: inurl:"/wp-content/plugins/simple-podcasting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-podcasting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-podcasting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-podcasting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-popup-8a828053bf646bd38f0facf7c997017f.yaml b/nuclei-templates/cve-less/plugins/simple-popup-8a828053bf646bd38f0facf7c997017f.yaml new file mode 100644 index 0000000000..321f23a7d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-popup-8a828053bf646bd38f0facf7c997017f.yaml @@ -0,0 +1,58 @@ +id: simple-popup-8a828053bf646bd38f0facf7c997017f + +info: + name: > + Simple Popup Images <= 1.8.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18c0ecc5-b3e2-4ac0-b901-dae397e2d57c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-popup/" + google-query: inurl:"/wp-content/plugins/simple-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-popup-images-37440742787d9f260ab4813dfe2d7c5e.yaml b/nuclei-templates/cve-less/plugins/simple-popup-images-37440742787d9f260ab4813dfe2d7c5e.yaml new file mode 100644 index 0000000000..5edce5402f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-popup-images-37440742787d9f260ab4813dfe2d7c5e.yaml @@ -0,0 +1,58 @@ +id: simple-popup-images-37440742787d9f260ab4813dfe2d7c5e + +info: + name: > + Simple Popup Images <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15c35ed2-a614-4cac-8a2e-b1a2417919d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-popup-images/" + google-query: inurl:"/wp-content/plugins/simple-popup-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-popup-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-popup-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-popup-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-popup-newsletter-eb9f0a8e4e92fb7cae75094dbbc288ce.yaml b/nuclei-templates/cve-less/plugins/simple-popup-newsletter-eb9f0a8e4e92fb7cae75094dbbc288ce.yaml new file mode 100644 index 0000000000..ab7c990f51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-popup-newsletter-eb9f0a8e4e92fb7cae75094dbbc288ce.yaml @@ -0,0 +1,58 @@ +id: simple-popup-newsletter-eb9f0a8e4e92fb7cae75094dbbc288ce + +info: + name: > + Simple Popup Newsletter <= 1.4.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15655362-b77f-4ba4-a823-17085de55f85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-popup-newsletter/" + google-query: inurl:"/wp-content/plugins/simple-popup-newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-popup-newsletter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-popup-newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-popup-newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-portfolio-gallery-ace70e46c2c11dce25895020e8f9ce37.yaml b/nuclei-templates/cve-less/plugins/simple-portfolio-gallery-ace70e46c2c11dce25895020e8f9ce37.yaml new file mode 100644 index 0000000000..7b4f2124aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-portfolio-gallery-ace70e46c2c11dce25895020e8f9ce37.yaml @@ -0,0 +1,58 @@ +id: simple-portfolio-gallery-ace70e46c2c11dce25895020e8f9ce37 + +info: + name: > + Simple Portfolio Gallery <= 0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46d65fed-cb21-46e1-bafe-eda11c25a467?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-portfolio-gallery/" + google-query: inurl:"/wp-content/plugins/simple-portfolio-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-portfolio-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-portfolio-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-portfolio-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-post-79a115d0225d5e6109d2bfb5d804fc26.yaml b/nuclei-templates/cve-less/plugins/simple-post-79a115d0225d5e6109d2bfb5d804fc26.yaml new file mode 100644 index 0000000000..f87242a888 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-post-79a115d0225d5e6109d2bfb5d804fc26.yaml @@ -0,0 +1,58 @@ +id: simple-post-79a115d0225d5e6109d2bfb5d804fc26 + +info: + name: > + Simple Post <= 1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/334ecb1e-027c-4a0f-88cb-34b02482f097?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-post/" + google-query: inurl:"/wp-content/plugins/simple-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-post-gallery-dd18adf97d60be295e46212698edf568.yaml b/nuclei-templates/cve-less/plugins/simple-post-gallery-dd18adf97d60be295e46212698edf568.yaml new file mode 100644 index 0000000000..e8b08beb70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-post-gallery-dd18adf97d60be295e46212698edf568.yaml @@ -0,0 +1,58 @@ +id: simple-post-gallery-dd18adf97d60be295e46212698edf568 + +info: + name: > + Post Gallery <= 2.3.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ac31c39-abbc-427f-aba3-d9ec3b51c4d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-post-gallery/" + google-query: inurl:"/wp-content/plugins/simple-post-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-post-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-post-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-post-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-post-notes-ae1d09ace0c5a27260a5b15fa0f15e71.yaml b/nuclei-templates/cve-less/plugins/simple-post-notes-ae1d09ace0c5a27260a5b15fa0f15e71.yaml new file mode 100644 index 0000000000..f1f19d6395 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-post-notes-ae1d09ace0c5a27260a5b15fa0f15e71.yaml @@ -0,0 +1,58 @@ +id: simple-post-notes-ae1d09ace0c5a27260a5b15fa0f15e71 + +info: + name: > + Simple Post Notes <= 1.7.5 - Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8260a74a-e338-42f6-ad9d-cb30f1a9bc86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-post-notes/" + google-query: inurl:"/wp-content/plugins/simple-post-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-post-notes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-post-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-post-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-post-notes-fe9aa9fc4f7853d3cc97f567a43935dd.yaml b/nuclei-templates/cve-less/plugins/simple-post-notes-fe9aa9fc4f7853d3cc97f567a43935dd.yaml new file mode 100644 index 0000000000..22c18e0a77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-post-notes-fe9aa9fc4f7853d3cc97f567a43935dd.yaml @@ -0,0 +1,58 @@ +id: simple-post-notes-fe9aa9fc4f7853d3cc97f567a43935dd + +info: + name: > + Simple Post Notes <= 1.7.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a7bb428-dd65-47f7-aaf6-ecdad4ae3049?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-post-notes/" + google-query: inurl:"/wp-content/plugins/simple-post-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-post-notes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-post-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-post-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-post-thumbnails-a4aa366f217005e74322ff2bf7a0e182.yaml b/nuclei-templates/cve-less/plugins/simple-post-thumbnails-a4aa366f217005e74322ff2bf7a0e182.yaml new file mode 100644 index 0000000000..6becb5ac98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-post-thumbnails-a4aa366f217005e74322ff2bf7a0e182.yaml @@ -0,0 +1,58 @@ +id: simple-post-thumbnails-a4aa366f217005e74322ff2bf7a0e182 + +info: + name: > + TimThumb <= 1.33 - Remote File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e062c794-1ab7-4d44-95da-40cd401f3a37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-post-thumbnails/" + google-query: inurl:"/wp-content/plugins/simple-post-thumbnails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-post-thumbnails,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-post-thumbnails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-post-thumbnails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-posts-ticker-9431aa52549a30a720033bb06c5049ca.yaml b/nuclei-templates/cve-less/plugins/simple-posts-ticker-9431aa52549a30a720033bb06c5049ca.yaml new file mode 100644 index 0000000000..ba4360212a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-posts-ticker-9431aa52549a30a720033bb06c5049ca.yaml @@ -0,0 +1,58 @@ +id: simple-posts-ticker-9431aa52549a30a720033bb06c5049ca + +info: + name: > + Simple Posts Ticker <= 1.1.5 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec1ffc70-fc0c-4c25-926c-e78e0f206d2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-posts-ticker/" + google-query: inurl:"/wp-content/plugins/simple-posts-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-posts-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-posts-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-posts-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-posts-ticker-f09df8170b914522627f58aeacdfb8a8.yaml b/nuclei-templates/cve-less/plugins/simple-posts-ticker-f09df8170b914522627f58aeacdfb8a8.yaml new file mode 100644 index 0000000000..7f384221f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-posts-ticker-f09df8170b914522627f58aeacdfb8a8.yaml @@ -0,0 +1,58 @@ +id: simple-posts-ticker-f09df8170b914522627f58aeacdfb8a8 + +info: + name: > + Simple Posts Ticker <= 1.1.5 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ac2c929-2188-4818-880d-8793984e8df1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-posts-ticker/" + google-query: inurl:"/wp-content/plugins/simple-posts-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-posts-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-posts-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-posts-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-quotation-2ccafd0bfa63eb3f14f0d41c56ae0ce0.yaml b/nuclei-templates/cve-less/plugins/simple-quotation-2ccafd0bfa63eb3f14f0d41c56ae0ce0.yaml new file mode 100644 index 0000000000..d55197bcf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-quotation-2ccafd0bfa63eb3f14f0d41c56ae0ce0.yaml @@ -0,0 +1,58 @@ +id: simple-quotation-2ccafd0bfa63eb3f14f0d41c56ae0ce0 + +info: + name: > + Simple Quotation <= 1.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c621e57e-8483-4dde-9c83-cc4522f92c1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-quotation/" + google-query: inurl:"/wp-content/plugins/simple-quotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-quotation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-quotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-quotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-quotation-64c2c780c319f550380bf0e9ebd98976.yaml b/nuclei-templates/cve-less/plugins/simple-quotation-64c2c780c319f550380bf0e9ebd98976.yaml new file mode 100644 index 0000000000..79b3a2652e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-quotation-64c2c780c319f550380bf0e9ebd98976.yaml @@ -0,0 +1,58 @@ +id: simple-quotation-64c2c780c319f550380bf0e9ebd98976 + +info: + name: > + Simple Quotation <= 1.3.2 - SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/225123aa-1ef9-4431-b4b1-b5ac5e034ef4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-quotation/" + google-query: inurl:"/wp-content/plugins/simple-quotation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-quotation,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-quotation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-quotation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-real-estate-pack-4-b3837018bee9dc0f25b1197bd329be87.yaml b/nuclei-templates/cve-less/plugins/simple-real-estate-pack-4-b3837018bee9dc0f25b1197bd329be87.yaml new file mode 100644 index 0000000000..76debd1156 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-real-estate-pack-4-b3837018bee9dc0f25b1197bd329be87.yaml @@ -0,0 +1,58 @@ +id: simple-real-estate-pack-4-b3837018bee9dc0f25b1197bd329be87 + +info: + name: > + Simple Real Estate Pack <= 1.4.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee95976d-6454-466b-96b3-7c33ccc03d41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-real-estate-pack-4/" + google-query: inurl:"/wp-content/plugins/simple-real-estate-pack-4/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-real-estate-pack-4,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-real-estate-pack-4/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-real-estate-pack-4" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-responsive-image-gallery-0be4bbe081fe5b1039259f84286874e7.yaml b/nuclei-templates/cve-less/plugins/simple-responsive-image-gallery-0be4bbe081fe5b1039259f84286874e7.yaml new file mode 100644 index 0000000000..81e64daf91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-responsive-image-gallery-0be4bbe081fe5b1039259f84286874e7.yaml @@ -0,0 +1,58 @@ +id: simple-responsive-image-gallery-0be4bbe081fe5b1039259f84286874e7 + +info: + name: > + Simple Image Gallery <= 1.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2805267e-fd07-4bb2-b2e5-7c90c667097e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-responsive-image-gallery/" + google-query: inurl:"/wp-content/plugins/simple-responsive-image-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-responsive-image-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-responsive-image-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-responsive-image-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-restrict-aa5a6a671fb5da473aaf8781afbfa3bd.yaml b/nuclei-templates/cve-less/plugins/simple-restrict-aa5a6a671fb5da473aaf8781afbfa3bd.yaml new file mode 100644 index 0000000000..af317966da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-restrict-aa5a6a671fb5da473aaf8781afbfa3bd.yaml @@ -0,0 +1,58 @@ +id: simple-restrict-aa5a6a671fb5da473aaf8781afbfa3bd + +info: + name: > + Simple Restrict <= 1.2.6 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-restrict/" + google-query: inurl:"/wp-content/plugins/simple-restrict/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-restrict,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-restrict/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-restrict" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-retail-menus-ff68da2306359b7fb7d2ec7bcba42c9a.yaml b/nuclei-templates/cve-less/plugins/simple-retail-menus-ff68da2306359b7fb7d2ec7bcba42c9a.yaml new file mode 100644 index 0000000000..0cdb4d6a2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-retail-menus-ff68da2306359b7fb7d2ec7bcba42c9a.yaml @@ -0,0 +1,58 @@ +id: simple-retail-menus-ff68da2306359b7fb7d2ec7bcba42c9a + +info: + name: > + Simple Retail Menus <= 4.0.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11c369eb-7e5b-4fcf-a526-23466ebad420?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-retail-menus/" + google-query: inurl:"/wp-content/plugins/simple-retail-menus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-retail-menus,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-retail-menus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-retail-menus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-revisions-delete-e8203a29d9dd8569fe66a5c0b614fae4.yaml b/nuclei-templates/cve-less/plugins/simple-revisions-delete-e8203a29d9dd8569fe66a5c0b614fae4.yaml new file mode 100644 index 0000000000..23aab3e5f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-revisions-delete-e8203a29d9dd8569fe66a5c0b614fae4.yaml @@ -0,0 +1,58 @@ +id: simple-revisions-delete-e8203a29d9dd8569fe66a5c0b614fae4 + +info: + name: > + Simple Revisions Delete <= 1.5.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50212e01-4055-4e63-8cf2-6ee434f46604?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-revisions-delete/" + google-query: inurl:"/wp-content/plugins/simple-revisions-delete/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-revisions-delete,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-revisions-delete/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-revisions-delete" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-schools-staff-directory-9d4cfba6200e394cef32d487f65ab9e2.yaml b/nuclei-templates/cve-less/plugins/simple-schools-staff-directory-9d4cfba6200e394cef32d487f65ab9e2.yaml new file mode 100644 index 0000000000..102f744576 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-schools-staff-directory-9d4cfba6200e394cef32d487f65ab9e2.yaml @@ -0,0 +1,58 @@ +id: simple-schools-staff-directory-9d4cfba6200e394cef32d487f65ab9e2 + +info: + name: > + Simple Schools Staff Directory <= 1.1 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7adebd83-8186-402a-8327-c7f9c009ed62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-schools-staff-directory/" + google-query: inurl:"/wp-content/plugins/simple-schools-staff-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-schools-staff-directory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-schools-staff-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-schools-staff-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-security-2c08e7ca2855464050481f48ae1d114f.yaml b/nuclei-templates/cve-less/plugins/simple-security-2c08e7ca2855464050481f48ae1d114f.yaml new file mode 100644 index 0000000000..b7a79a5ee4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-security-2c08e7ca2855464050481f48ae1d114f.yaml @@ -0,0 +1,58 @@ +id: simple-security-2c08e7ca2855464050481f48ae1d114f + +info: + name: > + Simple Security <= 1.1.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b346ae7-e3aa-4728-8dd9-e77fc388576e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-security/" + google-query: inurl:"/wp-content/plugins/simple-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-security,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-0e06afa272317d9b882c9a62ae6109b4.yaml b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-0e06afa272317d9b882c9a62ae6109b4.yaml new file mode 100644 index 0000000000..fdf7cef03f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-0e06afa272317d9b882c9a62ae6109b4.yaml @@ -0,0 +1,58 @@ +id: simple-share-buttons-adder-0e06afa272317d9b882c9a62ae6109b4 + +info: + name: > + Simple Share Buttons Adder <= 8.4.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e57bfae5-4cc0-4d97-9431-4c8ebb2f0882?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-share-buttons-adder/" + google-query: inurl:"/wp-content/plugins/simple-share-buttons-adder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-share-buttons-adder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-share-buttons-adder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-share-buttons-adder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-47569f4c91357650e1a29f2c2f2817fe.yaml b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-47569f4c91357650e1a29f2c2f2817fe.yaml new file mode 100644 index 0000000000..b714dd6a5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-47569f4c91357650e1a29f2c2f2817fe.yaml @@ -0,0 +1,58 @@ +id: simple-share-buttons-adder-47569f4c91357650e1a29f2c2f2817fe + +info: + name: > + Simple Share Buttons Adder <= 4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f72c94f-b0b6-464b-8bc7-df3d75b22edb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-share-buttons-adder/" + google-query: inurl:"/wp-content/plugins/simple-share-buttons-adder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-share-buttons-adder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-share-buttons-adder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-share-buttons-adder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-6b9a4af9881f034177e75898019a5215.yaml b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-6b9a4af9881f034177e75898019a5215.yaml new file mode 100644 index 0000000000..229167b025 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-6b9a4af9881f034177e75898019a5215.yaml @@ -0,0 +1,58 @@ +id: simple-share-buttons-adder-6b9a4af9881f034177e75898019a5215 + +info: + name: > + Simple Share Buttons Adder <= 6.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/099b2244-1371-4418-b5ef-b28ac030dedd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-share-buttons-adder/" + google-query: inurl:"/wp-content/plugins/simple-share-buttons-adder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-share-buttons-adder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-share-buttons-adder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-share-buttons-adder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-934f2b643137558d27d763ac97da6357.yaml b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-934f2b643137558d27d763ac97da6357.yaml new file mode 100644 index 0000000000..17ae038fac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-934f2b643137558d27d763ac97da6357.yaml @@ -0,0 +1,58 @@ +id: simple-share-buttons-adder-934f2b643137558d27d763ac97da6357 + +info: + name: > + Simple Share Buttons Adder <= 4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b37e6b44-810a-49c8-8903-30a9e228027d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-share-buttons-adder/" + google-query: inurl:"/wp-content/plugins/simple-share-buttons-adder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-share-buttons-adder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-share-buttons-adder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-share-buttons-adder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-ce6741d54beed2d67ba4497c046c28fc.yaml b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-ce6741d54beed2d67ba4497c046c28fc.yaml new file mode 100644 index 0000000000..e76bd94df3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-share-buttons-adder-ce6741d54beed2d67ba4497c046c28fc.yaml @@ -0,0 +1,58 @@ +id: simple-share-buttons-adder-ce6741d54beed2d67ba4497c046c28fc + +info: + name: > + Simple Share Buttons Adder <= 8.4.11 - Authenticated(Administrator+) Stored Cross-Site Scripting via CSS Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93ab9f1a-26ce-466a-a5d3-d2046ec8f94d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-share-buttons-adder/" + google-query: inurl:"/wp-content/plugins/simple-share-buttons-adder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-share-buttons-adder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-share-buttons-adder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-share-buttons-adder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-share-follow-button-ab84cffde93b8e75b3b5fbb96c93d333.yaml b/nuclei-templates/cve-less/plugins/simple-share-follow-button-ab84cffde93b8e75b3b5fbb96c93d333.yaml new file mode 100644 index 0000000000..7ec42753b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-share-follow-button-ab84cffde93b8e75b3b5fbb96c93d333.yaml @@ -0,0 +1,58 @@ +id: simple-share-follow-button-ab84cffde93b8e75b3b5fbb96c93d333 + +info: + name: > + Simple Share Follow Button <= 1.03 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed98d335-16f9-4be8-bace-06e2b5db4cb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-share-follow-button/" + google-query: inurl:"/wp-content/plugins/simple-share-follow-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-share-follow-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-share-follow-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-share-follow-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-shipping-edd-c110f3311248c25cc2e6e53a20d9f8d7.yaml b/nuclei-templates/cve-less/plugins/simple-shipping-edd-c110f3311248c25cc2e6e53a20d9f8d7.yaml new file mode 100644 index 0000000000..96d23b3993 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-shipping-edd-c110f3311248c25cc2e6e53a20d9f8d7.yaml @@ -0,0 +1,58 @@ +id: simple-shipping-edd-c110f3311248c25cc2e6e53a20d9f8d7 + +info: + name: > + Easy Digital Downloads – Simple Shipping <= 2.1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01179ac2-ad68-4a5d-af67-70d57ed611d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-shipping-edd/" + google-query: inurl:"/wp-content/plugins/simple-shipping-edd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-shipping-edd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-shipping-edd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-shipping-edd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-site-verify-401f06c28c1cd430ed4024172948f5b4.yaml b/nuclei-templates/cve-less/plugins/simple-site-verify-401f06c28c1cd430ed4024172948f5b4.yaml new file mode 100644 index 0000000000..424fd718c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-site-verify-401f06c28c1cd430ed4024172948f5b4.yaml @@ -0,0 +1,58 @@ +id: simple-site-verify-401f06c28c1cd430ed4024172948f5b4 + +info: + name: > + Simple Site Verify <= 1.0.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1ea7e04-d3b3-43fa-be9a-a2d5ac3e34c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-site-verify/" + google-query: inurl:"/wp-content/plugins/simple-site-verify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-site-verify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-site-verify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-site-verify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-sitemap-1523648bd0f24adc2a26d45bbae47ace.yaml b/nuclei-templates/cve-less/plugins/simple-sitemap-1523648bd0f24adc2a26d45bbae47ace.yaml new file mode 100644 index 0000000000..f27a1df088 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-sitemap-1523648bd0f24adc2a26d45bbae47ace.yaml @@ -0,0 +1,58 @@ +id: simple-sitemap-1523648bd0f24adc2a26d45bbae47ace + +info: + name: > + Simple Sitemap <= 3.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f47a2ff1-627f-4d1c-b0b6-684be51526f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-sitemap/" + google-query: inurl:"/wp-content/plugins/simple-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-sitemap-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/simple-sitemap-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f39117b38a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-sitemap-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: simple-sitemap-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-sitemap/" + google-query: inurl:"/wp-content/plugins/simple-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-sitemap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-slider-c8de5b2d5272ca0aa0591b883e38753b.yaml b/nuclei-templates/cve-less/plugins/simple-slider-c8de5b2d5272ca0aa0591b883e38753b.yaml new file mode 100644 index 0000000000..109b0ef6d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-slider-c8de5b2d5272ca0aa0591b883e38753b.yaml @@ -0,0 +1,58 @@ +id: simple-slider-c8de5b2d5272ca0aa0591b883e38753b + +info: + name: > + Simple Slider < 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7e24341-b085-4412-aa7b-42712cd94f35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-slider/" + google-query: inurl:"/wp-content/plugins/simple-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-slider-ssp-596c1534922e10c637aff8c9e7564a21.yaml b/nuclei-templates/cve-less/plugins/simple-slider-ssp-596c1534922e10c637aff8c9e7564a21.yaml new file mode 100644 index 0000000000..e6cab9d914 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-slider-ssp-596c1534922e10c637aff8c9e7564a21.yaml @@ -0,0 +1,58 @@ +id: simple-slider-ssp-596c1534922e10c637aff8c9e7564a21 + +info: + name: > + WP Slider Plugin <= 1.4.5 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7bf5f3c-9577-4824-a8ae-e13827fa5166?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-slider-ssp/" + google-query: inurl:"/wp-content/plugins/simple-slider-ssp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-slider-ssp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-slider-ssp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-slider-ssp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-slideshow-manager-a60c5d49ef21710901095695504b7608.yaml b/nuclei-templates/cve-less/plugins/simple-slideshow-manager-a60c5d49ef21710901095695504b7608.yaml new file mode 100644 index 0000000000..b0c061e1b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-slideshow-manager-a60c5d49ef21710901095695504b7608.yaml @@ -0,0 +1,58 @@ +id: simple-slideshow-manager-a60c5d49ef21710901095695504b7608 + +info: + name: > + Simple Slideshow Manager <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6205b0fe-6c68-4550-b9aa-87c3fbc88ddf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-slideshow-manager/" + google-query: inurl:"/wp-content/plugins/simple-slideshow-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-slideshow-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-slideshow-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-slideshow-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-slideshow-manager-f09c7ceacd429aa043a57b7468959d50.yaml b/nuclei-templates/cve-less/plugins/simple-slideshow-manager-f09c7ceacd429aa043a57b7468959d50.yaml new file mode 100644 index 0000000000..6a347737cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-slideshow-manager-f09c7ceacd429aa043a57b7468959d50.yaml @@ -0,0 +1,58 @@ +id: simple-slideshow-manager-f09c7ceacd429aa043a57b7468959d50 + +info: + name: > + Simple Slideshow Manager <= 2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cae5b10-516a-4b60-bc15-884ece5102cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-slideshow-manager/" + google-query: inurl:"/wp-content/plugins/simple-slideshow-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-slideshow-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-slideshow-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-slideshow-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-slug-translate-59c7d1a679853ce7b01d642a9cdae84d.yaml b/nuclei-templates/cve-less/plugins/simple-slug-translate-59c7d1a679853ce7b01d642a9cdae84d.yaml new file mode 100644 index 0000000000..caca71177f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-slug-translate-59c7d1a679853ce7b01d642a9cdae84d.yaml @@ -0,0 +1,58 @@ +id: simple-slug-translate-59c7d1a679853ce7b01d642a9cdae84d + +info: + name: > + Simple Slug Translate <= 2.7.2 - Authenticated (Administrator+) Stored Cross-Site Scritping + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc19313b-f9d0-4a92-8e33-d632d8a478df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-slug-translate/" + google-query: inurl:"/wp-content/plugins/simple-slug-translate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-slug-translate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-slug-translate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-slug-translate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-social-buttons-12ff7814319c3fed879573cad73d612b.yaml b/nuclei-templates/cve-less/plugins/simple-social-buttons-12ff7814319c3fed879573cad73d612b.yaml new file mode 100644 index 0000000000..ae84333cdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-social-buttons-12ff7814319c3fed879573cad73d612b.yaml @@ -0,0 +1,58 @@ +id: simple-social-buttons-12ff7814319c3fed879573cad73d612b + +info: + name: > + Simple Social Media Share Buttons <= 3.2.3 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2f4313a-568e-4ee2-b283-cd7bb62b75fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-social-buttons/" + google-query: inurl:"/wp-content/plugins/simple-social-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-social-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-social-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-social-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-social-buttons-40fcf644d2fbb45e473e3839f27d17b7.yaml b/nuclei-templates/cve-less/plugins/simple-social-buttons-40fcf644d2fbb45e473e3839f27d17b7.yaml new file mode 100644 index 0000000000..34555673f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-social-buttons-40fcf644d2fbb45e473e3839f27d17b7.yaml @@ -0,0 +1,58 @@ +id: simple-social-buttons-40fcf644d2fbb45e473e3839f27d17b7 + +info: + name: > + Simple Social Media Share Buttons 2.0.4 - 2.0.21 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bda01a0-e995-4642-81e3-4a72e6754af6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-social-buttons/" + google-query: inurl:"/wp-content/plugins/simple-social-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-social-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-social-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-social-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.4', '<= 2.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-social-buttons-7f383db1332d5a58a59f192dff645bd4.yaml b/nuclei-templates/cve-less/plugins/simple-social-buttons-7f383db1332d5a58a59f192dff645bd4.yaml new file mode 100644 index 0000000000..dacd657694 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-social-buttons-7f383db1332d5a58a59f192dff645bd4.yaml @@ -0,0 +1,58 @@ +id: simple-social-buttons-7f383db1332d5a58a59f192dff645bd4 + +info: + name: > + Simple Social Media Share Buttons <= 5.1.0 - Unauthenticated Password Protected Post Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab87210f-1f21-4208-ab50-4f62ec8e02fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-social-buttons/" + google-query: inurl:"/wp-content/plugins/simple-social-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-social-buttons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-social-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-social-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-social-buttons-84af63ce54f1aff066c5cbc0224ece1e.yaml b/nuclei-templates/cve-less/plugins/simple-social-buttons-84af63ce54f1aff066c5cbc0224ece1e.yaml new file mode 100644 index 0000000000..40e6762b1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-social-buttons-84af63ce54f1aff066c5cbc0224ece1e.yaml @@ -0,0 +1,58 @@ +id: simple-social-buttons-84af63ce54f1aff066c5cbc0224ece1e + +info: + name: > + Simple Social Media Share Buttons <= 3.2.2 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73b93a44-1d91-4755-ae48-73f74a6fe415?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-social-buttons/" + google-query: inurl:"/wp-content/plugins/simple-social-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-social-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-social-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-social-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-social-buttons-89e9193b1c972a396e2f39602a9c0962.yaml b/nuclei-templates/cve-less/plugins/simple-social-buttons-89e9193b1c972a396e2f39602a9c0962.yaml new file mode 100644 index 0000000000..fee9ab0dde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-social-buttons-89e9193b1c972a396e2f39602a9c0962.yaml @@ -0,0 +1,58 @@ +id: simple-social-buttons-89e9193b1c972a396e2f39602a9c0962 + +info: + name: > + Simple Social Media Share Buttons <= 3.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/724dead7-0e4a-420d-a5a3-fca578451211?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-social-buttons/" + google-query: inurl:"/wp-content/plugins/simple-social-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-social-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-social-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-social-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-social-buttons-fa41e1fa9c47147fc51a8bf59061fdaf.yaml b/nuclei-templates/cve-less/plugins/simple-social-buttons-fa41e1fa9c47147fc51a8bf59061fdaf.yaml new file mode 100644 index 0000000000..ccd6c1e2ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-social-buttons-fa41e1fa9c47147fc51a8bf59061fdaf.yaml @@ -0,0 +1,58 @@ +id: simple-social-buttons-fa41e1fa9c47147fc51a8bf59061fdaf + +info: + name: > + Simple Social Media Share Buttons <= 3.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac352bb2-f624-4c31-951a-988a0b420635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-social-buttons/" + google-query: inurl:"/wp-content/plugins/simple-social-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-social-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-social-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-social-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-sortsearch-dad17a0f7cc6bf4dce65968822857b48.yaml b/nuclei-templates/cve-less/plugins/simple-sortsearch-dad17a0f7cc6bf4dce65968822857b48.yaml new file mode 100644 index 0000000000..e0ef18968f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-sortsearch-dad17a0f7cc6bf4dce65968822857b48.yaml @@ -0,0 +1,58 @@ +id: simple-sortsearch-dad17a0f7cc6bf4dce65968822857b48 + +info: + name: > + Simple Sort&Search <= 0.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e47a2d3-ab79-417d-b36b-2f8a8c515bc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-sortsearch/" + google-query: inurl:"/wp-content/plugins/simple-sortsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-sortsearch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-sortsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-sortsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-sponsorships-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/simple-sponsorships-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0e289374ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-sponsorships-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: simple-sponsorships-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-sponsorships/" + google-query: inurl:"/wp-content/plugins/simple-sponsorships/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-sponsorships,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-sponsorships/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-sponsorships" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-staff-list-065f57f30aadd88480dc295cfdb7429a.yaml b/nuclei-templates/cve-less/plugins/simple-staff-list-065f57f30aadd88480dc295cfdb7429a.yaml new file mode 100644 index 0000000000..0cd91d3df3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-staff-list-065f57f30aadd88480dc295cfdb7429a.yaml @@ -0,0 +1,58 @@ +id: simple-staff-list-065f57f30aadd88480dc295cfdb7429a + +info: + name: > + Simple Staff List <= 2.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c275b40-1155-4a86-8854-b0660e117fcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-staff-list/" + google-query: inurl:"/wp-content/plugins/simple-staff-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-staff-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-staff-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-staff-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-staff-list-7d02fb68117844792850ad968e93d6a6.yaml b/nuclei-templates/cve-less/plugins/simple-staff-list-7d02fb68117844792850ad968e93d6a6.yaml new file mode 100644 index 0000000000..1c0defcca1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-staff-list-7d02fb68117844792850ad968e93d6a6.yaml @@ -0,0 +1,58 @@ +id: simple-staff-list-7d02fb68117844792850ad968e93d6a6 + +info: + name: > + Simple Staff List <= 2.2.4 - Missing Authorization via ajax_flush_rewrite_rules and staff_member_export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ef8bf84-768f-4ef1-8037-4e51ccc20c83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-staff-list/" + google-query: inurl:"/wp-content/plugins/simple-staff-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-staff-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-staff-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-staff-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-staff-list-f7b0dea7fdc53cc395c11a147701c107.yaml b/nuclei-templates/cve-less/plugins/simple-staff-list-f7b0dea7fdc53cc395c11a147701c107.yaml new file mode 100644 index 0000000000..c6240fb4cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-staff-list-f7b0dea7fdc53cc395c11a147701c107.yaml @@ -0,0 +1,58 @@ +id: simple-staff-list-f7b0dea7fdc53cc395c11a147701c107 + +info: + name: > + Simple Staff List <= 2.2.3 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5880581-3505-4851-b32f-cd2873072f73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-staff-list/" + google-query: inurl:"/wp-content/plugins/simple-staff-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-staff-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-staff-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-staff-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-sticky-footer-e689aa17f6bf2fdc2c6603a9014c4c60.yaml b/nuclei-templates/cve-less/plugins/simple-sticky-footer-e689aa17f6bf2fdc2c6603a9014c4c60.yaml new file mode 100644 index 0000000000..bd97f80bc9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-sticky-footer-e689aa17f6bf2fdc2c6603a9014c4c60.yaml @@ -0,0 +1,58 @@ +id: simple-sticky-footer-e689aa17f6bf2fdc2c6603a9014c4c60 + +info: + name: > + Simple Sticky Footer <= 1.3.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/329f6e9b-f2f4-4c4e-9512-fcf504c2c0ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-sticky-footer/" + google-query: inurl:"/wp-content/plugins/simple-sticky-footer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-sticky-footer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-sticky-footer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-sticky-footer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-student-result-02a688a26a04ec997a303637d53b9750.yaml b/nuclei-templates/cve-less/plugins/simple-student-result-02a688a26a04ec997a303637d53b9750.yaml new file mode 100644 index 0000000000..6bf97bb876 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-student-result-02a688a26a04ec997a303637d53b9750.yaml @@ -0,0 +1,58 @@ +id: simple-student-result-02a688a26a04ec997a303637d53b9750 + +info: + name: > + Student Result or Employee Database <= 1.7.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/834e86c6-f516-4991-a693-d23db2bf14ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-student-result/" + google-query: inurl:"/wp-content/plugins/simple-student-result/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-student-result,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-student-result/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-student-result" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-student-result-1e87bae656b2627d83b3d372f1614a11.yaml b/nuclei-templates/cve-less/plugins/simple-student-result-1e87bae656b2627d83b3d372f1614a11.yaml new file mode 100644 index 0000000000..419814a94a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-student-result-1e87bae656b2627d83b3d372f1614a11.yaml @@ -0,0 +1,58 @@ +id: simple-student-result-1e87bae656b2627d83b3d372f1614a11 + +info: + name: > + Student Result or Employee Database <= 1.6.3 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba8d377f-d216-40e4-97f2-ed3eac0ec33e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-student-result/" + google-query: inurl:"/wp-content/plugins/simple-student-result/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-student-result,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-student-result/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-student-result" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-student-result-fbd5307588c0ac8cc334e800f9e7068d.yaml b/nuclei-templates/cve-less/plugins/simple-student-result-fbd5307588c0ac8cc334e800f9e7068d.yaml new file mode 100644 index 0000000000..a8c7484a0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-student-result-fbd5307588c0ac8cc334e800f9e7068d.yaml @@ -0,0 +1,58 @@ +id: simple-student-result-fbd5307588c0ac8cc334e800f9e7068d + +info: + name: > + Student Result or Employee Database <= 1.7.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc2532b4-907f-438b-baab-c3966cf30f74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-student-result/" + google-query: inurl:"/wp-content/plugins/simple-student-result/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-student-result,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-student-result/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-student-result" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-support-ticket-system-cf523f7ef0e6572480c576e8223b6d77.yaml b/nuclei-templates/cve-less/plugins/simple-support-ticket-system-cf523f7ef0e6572480c576e8223b6d77.yaml new file mode 100644 index 0000000000..79786e494f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-support-ticket-system-cf523f7ef0e6572480c576e8223b6d77.yaml @@ -0,0 +1,58 @@ +id: simple-support-ticket-system-cf523f7ef0e6572480c576e8223b6d77 + +info: + name: > + Support Ticket System < 1.2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8c08878-0f9f-4203-8110-a3772eb8de63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-support-ticket-system/" + google-query: inurl:"/wp-content/plugins/simple-support-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-support-ticket-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-support-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-support-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-table-manager-51cc1e2fa9b76200d8c0e1cffbbd6dc5.yaml b/nuclei-templates/cve-less/plugins/simple-table-manager-51cc1e2fa9b76200d8c0e1cffbbd6dc5.yaml new file mode 100644 index 0000000000..45197e592b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-table-manager-51cc1e2fa9b76200d8c0e1cffbbd6dc5.yaml @@ -0,0 +1,58 @@ +id: simple-table-manager-51cc1e2fa9b76200d8c0e1cffbbd6dc5 + +info: + name: > + Simple Table Manager <= 1.5.6 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53760acf-e8b2-4e35-8c01-768472fc0996?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-table-manager/" + google-query: inurl:"/wp-content/plugins/simple-table-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-table-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-table-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-table-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tags-1b628b6e919f163c78dec1ae22685875.yaml b/nuclei-templates/cve-less/plugins/simple-tags-1b628b6e919f163c78dec1ae22685875.yaml new file mode 100644 index 0000000000..c2766fa02a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tags-1b628b6e919f163c78dec1ae22685875.yaml @@ -0,0 +1,58 @@ +id: simple-tags-1b628b6e919f163c78dec1ae22685875 + +info: + name: > + TaxoPress <= 3.6.4 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52574d99-1ffe-4152-bf13-9cdd11d7300a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tags/" + google-query: inurl:"/wp-content/plugins/simple-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tags-4c56b6bb234842fef87202ea54089581.yaml b/nuclei-templates/cve-less/plugins/simple-tags-4c56b6bb234842fef87202ea54089581.yaml new file mode 100644 index 0000000000..4f56288eec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tags-4c56b6bb234842fef87202ea54089581.yaml @@ -0,0 +1,58 @@ +id: simple-tags-4c56b6bb234842fef87202ea54089581 + +info: + name: > + TaxoPress <= 3.6.4 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c051bfd-2754-4faf-8062-91752555166c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tags/" + google-query: inurl:"/wp-content/plugins/simple-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tags-62ca43337bd991ee98ecbcd228da04f1.yaml b/nuclei-templates/cve-less/plugins/simple-tags-62ca43337bd991ee98ecbcd228da04f1.yaml new file mode 100644 index 0000000000..7a1dba1b85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tags-62ca43337bd991ee98ecbcd228da04f1.yaml @@ -0,0 +1,58 @@ +id: simple-tags-62ca43337bd991ee98ecbcd228da04f1 + +info: + name: > + TaxoPress <= 3.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/423627a6-623d-462c-a767-cf021566d9e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tags/" + google-query: inurl:"/wp-content/plugins/simple-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tags-9af4513a0f46be16e18750162e487d0e.yaml b/nuclei-templates/cve-less/plugins/simple-tags-9af4513a0f46be16e18750162e487d0e.yaml new file mode 100644 index 0000000000..938e13764f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tags-9af4513a0f46be16e18750162e487d0e.yaml @@ -0,0 +1,58 @@ +id: simple-tags-9af4513a0f46be16e18750162e487d0e + +info: + name: > + TaxoPress <= 3.0.7.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/282fabde-c3a5-49d0-987a-39f106f766cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tags/" + google-query: inurl:"/wp-content/plugins/simple-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tags-dbd78c6bc37635ee7558d00a91a8165a.yaml b/nuclei-templates/cve-less/plugins/simple-tags-dbd78c6bc37635ee7558d00a91a8165a.yaml new file mode 100644 index 0000000000..c9b73835f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tags-dbd78c6bc37635ee7558d00a91a8165a.yaml @@ -0,0 +1,58 @@ +id: simple-tags-dbd78c6bc37635ee7558d00a91a8165a + +info: + name: > + TaxoPress <= 3.6.4 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e98ed932-4e4c-4127-ae72-500e2a34f371?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tags/" + google-query: inurl:"/wp-content/plugins/simple-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tags-f897c75665f54f7b712469c3a1014b0b.yaml b/nuclei-templates/cve-less/plugins/simple-tags-f897c75665f54f7b712469c3a1014b0b.yaml new file mode 100644 index 0000000000..697b68032d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tags-f897c75665f54f7b712469c3a1014b0b.yaml @@ -0,0 +1,58 @@ +id: simple-tags-f897c75665f54f7b712469c3a1014b0b + +info: + name: > + WordPress Tag and Category Manager – AI Autotagger <= 3.13.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f537479-d5ec-46bb-a04e-2c33a2abc759?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tags/" + google-query: inurl:"/wp-content/plugins/simple-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-telegram-for-wp-0564976f3c6b024a77575f33f874aa48.yaml b/nuclei-templates/cve-less/plugins/simple-telegram-for-wp-0564976f3c6b024a77575f33f874aa48.yaml new file mode 100644 index 0000000000..cb005f7ec5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-telegram-for-wp-0564976f3c6b024a77575f33f874aa48.yaml @@ -0,0 +1,58 @@ +id: simple-telegram-for-wp-0564976f3c6b024a77575f33f874aa48 + +info: + name: > + Simple Telegram <= 0.9.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ae939f4-5a90-48ca-ae13-2ccbd6d8d08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-telegram-for-wp/" + google-query: inurl:"/wp-content/plugins/simple-telegram-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-telegram-for-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-telegram-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-telegram-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-testimonials-showcase-af9704a1a0aaec6b76168fbe08955226.yaml b/nuclei-templates/cve-less/plugins/simple-testimonials-showcase-af9704a1a0aaec6b76168fbe08955226.yaml new file mode 100644 index 0000000000..1621eaff0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-testimonials-showcase-af9704a1a0aaec6b76168fbe08955226.yaml @@ -0,0 +1,58 @@ +id: simple-testimonials-showcase-af9704a1a0aaec6b76168fbe08955226 + +info: + name: > + Simple Testimonials Showcase <= 1.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6008237-e4a8-4757-ae14-ac20c6f1b0af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-testimonials-showcase/" + google-query: inurl:"/wp-content/plugins/simple-testimonials-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-testimonials-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-testimonials-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-testimonials-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-testimonials-showcase-f4692d4ecdfbe84f92ac77014c0e0a83.yaml b/nuclei-templates/cve-less/plugins/simple-testimonials-showcase-f4692d4ecdfbe84f92ac77014c0e0a83.yaml new file mode 100644 index 0000000000..a97fc52fd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-testimonials-showcase-f4692d4ecdfbe84f92ac77014c0e0a83.yaml @@ -0,0 +1,58 @@ +id: simple-testimonials-showcase-f4692d4ecdfbe84f92ac77014c0e0a83 + +info: + name: > + Simple Testimonials Showcase <= 1.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/717dfceb-dc0b-45ef-bc06-72658486d1f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-testimonials-showcase/" + google-query: inurl:"/wp-content/plugins/simple-testimonials-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-testimonials-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-testimonials-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-testimonials-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-theme-options-d24630671f65fdbbb367bb893bfade3c.yaml b/nuclei-templates/cve-less/plugins/simple-theme-options-d24630671f65fdbbb367bb893bfade3c.yaml new file mode 100644 index 0000000000..a51a57998d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-theme-options-d24630671f65fdbbb367bb893bfade3c.yaml @@ -0,0 +1,58 @@ +id: simple-theme-options-d24630671f65fdbbb367bb893bfade3c + +info: + name: > + Simple Tracking <= 1.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50b0eb50-fe25-487f-b5bc-13659be58ae4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-theme-options/" + google-query: inurl:"/wp-content/plugins/simple-theme-options/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-theme-options,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-theme-options/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-theme-options" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-ticker-6007724142dc6c51f92be093926036d0.yaml b/nuclei-templates/cve-less/plugins/simple-ticker-6007724142dc6c51f92be093926036d0.yaml new file mode 100644 index 0000000000..e89e48c90e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-ticker-6007724142dc6c51f92be093926036d0.yaml @@ -0,0 +1,58 @@ +id: simple-ticker-6007724142dc6c51f92be093926036d0 + +info: + name: > + Simple Ticker <= 3.05 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/162595bb-d41b-4dfd-bfda-3a1e5794eaaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-ticker/" + google-query: inurl:"/wp-content/plugins/simple-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tooltips-0a74f9768178c52be7335a4414a065a0.yaml b/nuclei-templates/cve-less/plugins/simple-tooltips-0a74f9768178c52be7335a4414a065a0.yaml new file mode 100644 index 0000000000..9c98b2c8e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tooltips-0a74f9768178c52be7335a4414a065a0.yaml @@ -0,0 +1,58 @@ +id: simple-tooltips-0a74f9768178c52be7335a4414a065a0 + +info: + name: > + Simple Tooltips <= 2.1.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc7e4235-5f40-48c2-8474-cf57af5e35bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tooltips/" + google-query: inurl:"/wp-content/plugins/simple-tooltips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tooltips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tooltips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tooltips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tooltips-6284e6441b25b9ea2f8b947793590242.yaml b/nuclei-templates/cve-less/plugins/simple-tooltips-6284e6441b25b9ea2f8b947793590242.yaml new file mode 100644 index 0000000000..b8db6d3b2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tooltips-6284e6441b25b9ea2f8b947793590242.yaml @@ -0,0 +1,58 @@ +id: simple-tooltips-6284e6441b25b9ea2f8b947793590242 + +info: + name: > + Simple Tooltips <= 2.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ead3aee-3d72-4fc0-a613-700ec75fb0bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tooltips/" + google-query: inurl:"/wp-content/plugins/simple-tooltips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tooltips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tooltips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tooltips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tweet-0cd1e08a1b0cf9639f9192490f465d8f.yaml b/nuclei-templates/cve-less/plugins/simple-tweet-0cd1e08a1b0cf9639f9192490f465d8f.yaml new file mode 100644 index 0000000000..4c63cf4985 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tweet-0cd1e08a1b0cf9639f9192490f465d8f.yaml @@ -0,0 +1,58 @@ +id: simple-tweet-0cd1e08a1b0cf9639f9192490f465d8f + +info: + name: > + Simple Tweet <= 1.4.0.2 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tweet/" + google-query: inurl:"/wp-content/plugins/simple-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tweet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-tweet-27310a1dc2397e2cac54db00506a62d4.yaml b/nuclei-templates/cve-less/plugins/simple-tweet-27310a1dc2397e2cac54db00506a62d4.yaml new file mode 100644 index 0000000000..3c22be1de5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-tweet-27310a1dc2397e2cac54db00506a62d4.yaml @@ -0,0 +1,58 @@ +id: simple-tweet-27310a1dc2397e2cac54db00506a62d4 + +info: + name: > + Simple Tweet <= 1.4.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de568a71-f51d-4948-839c-48e51d165a64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-tweet/" + google-query: inurl:"/wp-content/plugins/simple-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-tweet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-urls-15bda1e21fcfc4331fee33475b186388.yaml b/nuclei-templates/cve-less/plugins/simple-urls-15bda1e21fcfc4331fee33475b186388.yaml new file mode 100644 index 0000000000..85870c580e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-urls-15bda1e21fcfc4331fee33475b186388.yaml @@ -0,0 +1,58 @@ +id: simple-urls-15bda1e21fcfc4331fee33475b186388 + +info: + name: > + Simple URLs <= 120 - Cross-Site Request Forgery via Multiple AJAX Actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d03524-7a53-40cd-a3d5-dafea4fc9a33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-urls/" + google-query: inurl:"/wp-content/plugins/simple-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 120') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-urls-2b45864828a1aff6937ee7dc2951db60.yaml b/nuclei-templates/cve-less/plugins/simple-urls-2b45864828a1aff6937ee7dc2951db60.yaml new file mode 100644 index 0000000000..444955cc57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-urls-2b45864828a1aff6937ee7dc2951db60.yaml @@ -0,0 +1,58 @@ +id: simple-urls-2b45864828a1aff6937ee7dc2951db60 + +info: + name: > + Simple URLs <= 118 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8147f63-91a5-457c-8259-8e4ddf5c67e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-urls/" + google-query: inurl:"/wp-content/plugins/simple-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 118') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-urls-5110a92cba7ac370f8a4c5806d1c585c.yaml b/nuclei-templates/cve-less/plugins/simple-urls-5110a92cba7ac370f8a4c5806d1c585c.yaml new file mode 100644 index 0000000000..fd9f0dbe04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-urls-5110a92cba7ac370f8a4c5806d1c585c.yaml @@ -0,0 +1,58 @@ +id: simple-urls-5110a92cba7ac370f8a4c5806d1c585c + +info: + name: > + Simple URLs <= 114 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/905ced90-3a24-4dd6-b415-890804bb6f5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-urls/" + google-query: inurl:"/wp-content/plugins/simple-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 114') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-urls-675d927de3b1b53ecaa9209929290da6.yaml b/nuclei-templates/cve-less/plugins/simple-urls-675d927de3b1b53ecaa9209929290da6.yaml new file mode 100644 index 0000000000..12b6cee918 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-urls-675d927de3b1b53ecaa9209929290da6.yaml @@ -0,0 +1,58 @@ +id: simple-urls-675d927de3b1b53ecaa9209929290da6 + +info: + name: > + Simple URLs <= 117 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/118e1a8c-a638-4571-9ce9-cf2cba4b9b06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-urls/" + google-query: inurl:"/wp-content/plugins/simple-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-urls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 117') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-urls-ada2b4fe98d8efc08dd626edec328d75.yaml b/nuclei-templates/cve-less/plugins/simple-urls-ada2b4fe98d8efc08dd626edec328d75.yaml new file mode 100644 index 0000000000..479a9d2f56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-urls-ada2b4fe98d8efc08dd626edec328d75.yaml @@ -0,0 +1,58 @@ +id: simple-urls-ada2b4fe98d8efc08dd626edec328d75 + +info: + name: > + Simple URLs <= 117 - Reflected Cross-Site Scripting via 'post_id' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54c38be0-ffe7-4fa4-b5c9-cb717c11aed5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-urls/" + google-query: inurl:"/wp-content/plugins/simple-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 117') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-urls-f2a5202240be9077b802b53424bd6267.yaml b/nuclei-templates/cve-less/plugins/simple-urls-f2a5202240be9077b802b53424bd6267.yaml new file mode 100644 index 0000000000..73e28ea81c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-urls-f2a5202240be9077b802b53424bd6267.yaml @@ -0,0 +1,58 @@ +id: simple-urls-f2a5202240be9077b802b53424bd6267 + +info: + name: > + Simple URLs <= 114 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1644c2c3-11fa-48d6-ad99-416f27df4483?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-urls/" + google-query: inurl:"/wp-content/plugins/simple-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-urls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 114') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-user-listing-8fb6f9883fb5a7c53db96c756412e908.yaml b/nuclei-templates/cve-less/plugins/simple-user-listing-8fb6f9883fb5a7c53db96c756412e908.yaml new file mode 100644 index 0000000000..7a947789bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-user-listing-8fb6f9883fb5a7c53db96c756412e908.yaml @@ -0,0 +1,58 @@ +id: simple-user-listing-8fb6f9883fb5a7c53db96c756412e908 + +info: + name: > + Simple User Listing <= 1.9.2 - Reflected Cross-Site Scripting via as + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7035903-d598-4db3-ba77-6e836229c5de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-user-listing/" + google-query: inurl:"/wp-content/plugins/simple-user-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-user-listing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-user-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-user-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-video-embedder-f34299764af595ef815c30af6bd496f7.yaml b/nuclei-templates/cve-less/plugins/simple-video-embedder-f34299764af595ef815c30af6bd496f7.yaml new file mode 100644 index 0000000000..5e4d5ea404 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-video-embedder-f34299764af595ef815c30af6bd496f7.yaml @@ -0,0 +1,58 @@ +id: simple-video-embedder-f34299764af595ef815c30af6bd496f7 + +info: + name: > + Simple Video Embedder <= 2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55fd13aa-aa30-4d5b-b344-6b5d065b64ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-video-embedder/" + google-query: inurl:"/wp-content/plugins/simple-video-embedder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-video-embedder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-video-embedder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-video-embedder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-visitor-stat-c6a09e1ae4216b85c7cb7a2c1a13117a.yaml b/nuclei-templates/cve-less/plugins/simple-visitor-stat-c6a09e1ae4216b85c7cb7a2c1a13117a.yaml new file mode 100644 index 0000000000..fb966f8967 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-visitor-stat-c6a09e1ae4216b85c7cb7a2c1a13117a.yaml @@ -0,0 +1,58 @@ +id: simple-visitor-stat-c6a09e1ae4216b85c7cb7a2c1a13117a + +info: + name: > + Simple visitor stat <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/508225ab-beb7-40eb-a80b-de123650fcff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-visitor-stat/" + google-query: inurl:"/wp-content/plugins/simple-visitor-stat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-visitor-stat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-visitor-stat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-visitor-stat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-woocommerce-csv-loader-ebfae304236d531958d5ca860f60e6f8.yaml b/nuclei-templates/cve-less/plugins/simple-woocommerce-csv-loader-ebfae304236d531958d5ca860f60e6f8.yaml new file mode 100644 index 0000000000..646c9a724b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-woocommerce-csv-loader-ebfae304236d531958d5ca860f60e6f8.yaml @@ -0,0 +1,58 @@ +id: simple-woocommerce-csv-loader-ebfae304236d531958d5ca860f60e6f8 + +info: + name: > + Ultimate WooCommerce CSV Importer <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b42882f6-ccea-4d8f-940b-1ad95b1ab760?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-woocommerce-csv-loader/" + google-query: inurl:"/wp-content/plugins/simple-woocommerce-csv-loader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-woocommerce-csv-loader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-woocommerce-csv-loader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-woocommerce-csv-loader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-wp-sitemap-59259dfce205e3430d84312173c09724.yaml b/nuclei-templates/cve-less/plugins/simple-wp-sitemap-59259dfce205e3430d84312173c09724.yaml new file mode 100644 index 0000000000..6696b5ce51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-wp-sitemap-59259dfce205e3430d84312173c09724.yaml @@ -0,0 +1,58 @@ +id: simple-wp-sitemap-59259dfce205e3430d84312173c09724 + +info: + name: > + Simple Wp Sitemap <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e3dc509-73c3-4869-b520-6f5c1d691184?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-wp-sitemap/" + google-query: inurl:"/wp-content/plugins/simple-wp-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-wp-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-wp-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-wp-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-yearly-archive-d3f480cf02dc331ee92b8ba5f6c29338.yaml b/nuclei-templates/cve-less/plugins/simple-yearly-archive-d3f480cf02dc331ee92b8ba5f6c29338.yaml new file mode 100644 index 0000000000..ae42814fcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-yearly-archive-d3f480cf02dc331ee92b8ba5f6c29338.yaml @@ -0,0 +1,58 @@ +id: simple-yearly-archive-d3f480cf02dc331ee92b8ba5f6c29338 + +info: + name: > + Simple Yearly Archive <= 2.1.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8d41006-ab36-4eed-8c17-2937ca7aff1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-yearly-archive/" + google-query: inurl:"/wp-content/plugins/simple-yearly-archive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-yearly-archive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-yearly-archive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-yearly-archive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simple-youtube-responsive-a8a2129053b6265336aaeb65bc0c164a.yaml b/nuclei-templates/cve-less/plugins/simple-youtube-responsive-a8a2129053b6265336aaeb65bc0c164a.yaml new file mode 100644 index 0000000000..197988a826 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simple-youtube-responsive-a8a2129053b6265336aaeb65bc0c164a.yaml @@ -0,0 +1,58 @@ +id: simple-youtube-responsive-a8a2129053b6265336aaeb65bc0c164a + +info: + name: > + Simple YouTube Responsive <= 2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e4a605e-542b-4001-84d8-0a0aad044798?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-youtube-responsive/" + google-query: inurl:"/wp-content/plugins/simple-youtube-responsive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-youtube-responsive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-youtube-responsive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-youtube-responsive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simpleflickr-cf071fc2ff7ad6812b023519dad9013e.yaml b/nuclei-templates/cve-less/plugins/simpleflickr-cf071fc2ff7ad6812b023519dad9013e.yaml new file mode 100644 index 0000000000..5089a8e2d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simpleflickr-cf071fc2ff7ad6812b023519dad9013e.yaml @@ -0,0 +1,58 @@ +id: simpleflickr-cf071fc2ff7ad6812b023519dad9013e + +info: + name: > + SimpleFlickr <= 3.0.3 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/223ace0a-5a98-4714-90d5-06fe96bc9a2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simpleflickr/" + google-query: inurl:"/wp-content/plugins/simpleflickr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simpleflickr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simpleflickr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simpleflickr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplelife-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml b/nuclei-templates/cve-less/plugins/simplelife-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml new file mode 100644 index 0000000000..e868149660 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplelife-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml @@ -0,0 +1,58 @@ +id: simplelife-9f4b30648930a231b8f2e1e9c1a6b6c8 + +info: + name: > + Simplelife Plugin <= 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac63e451-2ab3-4ca9-bb69-a0ef04fef3a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplelife/" + google-query: inurl:"/wp-content/plugins/simplelife/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplelife,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplelife/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplelife" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplemap-50af53f1d764e968928a866f51c31158.yaml b/nuclei-templates/cve-less/plugins/simplemap-50af53f1d764e968928a866f51c31158.yaml new file mode 100644 index 0000000000..eea68e4079 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplemap-50af53f1d764e968928a866f51c31158.yaml @@ -0,0 +1,58 @@ +id: simplemap-50af53f1d764e968928a866f51c31158 + +info: + name: > + SimpleMap Store Locator <= 2.6.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a600f11-03c3-4777-b1fe-212b085bacba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplemap/" + google-query: inurl:"/wp-content/plugins/simplemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplemap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplemodal-contact-form-smcf-96b2063a0950eb9d73bc44532d96a2af.yaml b/nuclei-templates/cve-less/plugins/simplemodal-contact-form-smcf-96b2063a0950eb9d73bc44532d96a2af.yaml new file mode 100644 index 0000000000..54dce635ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplemodal-contact-form-smcf-96b2063a0950eb9d73bc44532d96a2af.yaml @@ -0,0 +1,58 @@ +id: simplemodal-contact-form-smcf-96b2063a0950eb9d73bc44532d96a2af + +info: + name: > + SimpleModal Contact Form (SMCF) <= 1.2.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8c19868-49c2-4ee2-883a-93549e65d41a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplemodal-contact-form-smcf/" + google-query: inurl:"/wp-content/plugins/simplemodal-contact-form-smcf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplemodal-contact-form-smcf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplemodal-contact-form-smcf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplemodal-contact-form-smcf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplepress-1385e98bb73a78a4b3298f9d107fe144.yaml b/nuclei-templates/cve-less/plugins/simplepress-1385e98bb73a78a4b3298f9d107fe144.yaml new file mode 100644 index 0000000000..550a2eca61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplepress-1385e98bb73a78a4b3298f9d107fe144.yaml @@ -0,0 +1,58 @@ +id: simplepress-1385e98bb73a78a4b3298f9d107fe144 + +info: + name: > + Simple:Press <= 6.8 - Authenticated (Subscriber+) Stored Cross-Site Scripting via Profile Signatures + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e77082a7-dd65-40e9-a1be-0144afa869ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplepress/" + google-query: inurl:"/wp-content/plugins/simplepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplepress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplepress-31ce7b8320b2e27875e4234cacbc73eb.yaml b/nuclei-templates/cve-less/plugins/simplepress-31ce7b8320b2e27875e4234cacbc73eb.yaml new file mode 100644 index 0000000000..b346d134e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplepress-31ce7b8320b2e27875e4234cacbc73eb.yaml @@ -0,0 +1,58 @@ +id: simplepress-31ce7b8320b2e27875e4234cacbc73eb + +info: + name: > + Simple:Press – WordPress Forum Plugin <= 6.6.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53eba5b4-7cc0-48e1-bb9c-6ed3207151ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplepress/" + google-query: inurl:"/wp-content/plugins/simplepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplepress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplepress-3f6009b49c4de5d656c7bafec85eed5e.yaml b/nuclei-templates/cve-less/plugins/simplepress-3f6009b49c4de5d656c7bafec85eed5e.yaml new file mode 100644 index 0000000000..760b1f3c24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplepress-3f6009b49c4de5d656c7bafec85eed5e.yaml @@ -0,0 +1,58 @@ +id: simplepress-3f6009b49c4de5d656c7bafec85eed5e + +info: + name: > + Simple:Press <= 6.8 - Reflected Cross-Site Scripting via Cookie Value + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55a57b5f-2f87-4060-b1c2-77086f695dda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplepress/" + google-query: inurl:"/wp-content/plugins/simplepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplepress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplepress-41182a8a3c15b1cd38397763553e436b.yaml b/nuclei-templates/cve-less/plugins/simplepress-41182a8a3c15b1cd38397763553e436b.yaml new file mode 100644 index 0000000000..0dee53c6d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplepress-41182a8a3c15b1cd38397763553e436b.yaml @@ -0,0 +1,58 @@ +id: simplepress-41182a8a3c15b1cd38397763553e436b + +info: + name: > + Simple:Press <= 6.8 - Unauthenticated Stored Cross-Site Scripting via Forum Replies + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4707fcf6-ad11-4ffc-ba56-30f6571e3d9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplepress/" + google-query: inurl:"/wp-content/plugins/simplepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplepress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplepress-64b8d0d829a31289bbb915ba2b2eb077.yaml b/nuclei-templates/cve-less/plugins/simplepress-64b8d0d829a31289bbb915ba2b2eb077.yaml new file mode 100644 index 0000000000..aeeee33180 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplepress-64b8d0d829a31289bbb915ba2b2eb077.yaml @@ -0,0 +1,58 @@ +id: simplepress-64b8d0d829a31289bbb915ba2b2eb077 + +info: + name: > + Simple:Press <= 6.8 - Authenticated (Subscriber+) Path Traversal to Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43bcf3ab-4201-4a61-82c5-2dc60b684989?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplepress/" + google-query: inurl:"/wp-content/plugins/simplepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplepress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplepress-6673123aea5f3dacd5949ff035699808.yaml b/nuclei-templates/cve-less/plugins/simplepress-6673123aea5f3dacd5949ff035699808.yaml new file mode 100644 index 0000000000..74369fbeec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplepress-6673123aea5f3dacd5949ff035699808.yaml @@ -0,0 +1,58 @@ +id: simplepress-6673123aea5f3dacd5949ff035699808 + +info: + name: > + Simple:Press <= 6.8 - Authenticated (Admin+) Path Traversal to Arbitrary File Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead1a18-9429-472e-9e88-e792eaa23ae9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplepress/" + google-query: inurl:"/wp-content/plugins/simplepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplepress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplesamlphp-authentication-66b6ce3815a5720d174a72208f049b60.yaml b/nuclei-templates/cve-less/plugins/simplesamlphp-authentication-66b6ce3815a5720d174a72208f049b60.yaml new file mode 100644 index 0000000000..6ecb04c242 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplesamlphp-authentication-66b6ce3815a5720d174a72208f049b60.yaml @@ -0,0 +1,58 @@ +id: simplesamlphp-authentication-66b6ce3815a5720d174a72208f049b60 + +info: + name: > + simpleSAMLphp Authentication <= 0.7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6f1907e-9584-4ff7-8cf5-b285b7df9ec4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplesamlphp-authentication/" + google-query: inurl:"/wp-content/plugins/simplesamlphp-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplesamlphp-authentication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplesamlphp-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplesamlphp-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simpleshop-cz-b6921c4c41be466e80b527433949b2cd.yaml b/nuclei-templates/cve-less/plugins/simpleshop-cz-b6921c4c41be466e80b527433949b2cd.yaml new file mode 100644 index 0000000000..1e1b579855 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simpleshop-cz-b6921c4c41be466e80b527433949b2cd.yaml @@ -0,0 +1,58 @@ +id: simpleshop-cz-b6921c4c41be466e80b527433949b2cd + +info: + name: > + SimpleShop <= 2.10.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9870db7f-0c8e-44a4-aa0f-13709d773756?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simpleshop-cz/" + google-query: inurl:"/wp-content/plugins/simpleshop-cz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simpleshop-cz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simpleshop-cz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simpleshop-cz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simpleshop-cz-ebdc4e179afbae0e73d5291d7befe15e.yaml b/nuclei-templates/cve-less/plugins/simpleshop-cz-ebdc4e179afbae0e73d5291d7befe15e.yaml new file mode 100644 index 0000000000..6990185348 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simpleshop-cz-ebdc4e179afbae0e73d5291d7befe15e.yaml @@ -0,0 +1,58 @@ +id: simpleshop-cz-ebdc4e179afbae0e73d5291d7befe15e + +info: + name: > + SimpleShop <= 2.10.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dc39c47-3b99-4e43-b25d-a025f3d228b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simpleshop-cz/" + google-query: inurl:"/wp-content/plugins/simpleshop-cz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simpleshop-cz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simpleshop-cz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simpleshop-cz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplified-content-f60018e6fdebf8ed4334a970a3e624c1.yaml b/nuclei-templates/cve-less/plugins/simplified-content-f60018e6fdebf8ed4334a970a3e624c1.yaml new file mode 100644 index 0000000000..33202d9f34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplified-content-f60018e6fdebf8ed4334a970a3e624c1.yaml @@ -0,0 +1,58 @@ +id: simplified-content-f60018e6fdebf8ed4334a970a3e624c1 + +info: + name: > + Simplified Content < 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbacdde1-87e0-4b3a-8580-f1d37c130a1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplified-content/" + google-query: inurl:"/wp-content/plugins/simplified-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplified-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplified-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplified-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplr-registration-form-144725995c15dd892b47406937b4c8c9.yaml b/nuclei-templates/cve-less/plugins/simplr-registration-form-144725995c15dd892b47406937b4c8c9.yaml new file mode 100644 index 0000000000..4a6f0c044f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplr-registration-form-144725995c15dd892b47406937b4c8c9.yaml @@ -0,0 +1,58 @@ +id: simplr-registration-form-144725995c15dd892b47406937b4c8c9 + +info: + name: > + Simplr Registration Form Plus+ <= 2.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/810c641b-e9e0-462c-96ef-008c083208a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplr-registration-form/" + google-query: inurl:"/wp-content/plugins/simplr-registration-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplr-registration-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplr-registration-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplr-registration-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simplr-registration-form-669be7a13bf58d1940739fe39615ab4b.yaml b/nuclei-templates/cve-less/plugins/simplr-registration-form-669be7a13bf58d1940739fe39615ab4b.yaml new file mode 100644 index 0000000000..54284716fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simplr-registration-form-669be7a13bf58d1940739fe39615ab4b.yaml @@ -0,0 +1,58 @@ +id: simplr-registration-form-669be7a13bf58d1940739fe39615ab4b + +info: + name: > + Simplr Registration Form Plus+ <= 2.4.5 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary User Password Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ddf0452-3afe-4ada-bccc-30c818968a81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simplr-registration-form/" + google-query: inurl:"/wp-content/plugins/simplr-registration-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simplr-registration-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simplr-registration-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplr-registration-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-excerpts-01f45554766c9d4c4656369fac530065.yaml b/nuclei-templates/cve-less/plugins/simply-excerpts-01f45554766c9d4c4656369fac530065.yaml new file mode 100644 index 0000000000..a0d53d3e1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-excerpts-01f45554766c9d4c4656369fac530065.yaml @@ -0,0 +1,58 @@ +id: simply-excerpts-01f45554766c9d4c4656369fac530065 + +info: + name: > + Simply Excerpts <= 1.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e6a7f09-2166-426e-a548-daafb23363a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-excerpts/" + google-query: inurl:"/wp-content/plugins/simply-excerpts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-excerpts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-excerpts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-excerpts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-exclude-9035cd59a4944d047d13b61802d65e13.yaml b/nuclei-templates/cve-less/plugins/simply-exclude-9035cd59a4944d047d13b61802d65e13.yaml new file mode 100644 index 0000000000..b4e2f0f8ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-exclude-9035cd59a4944d047d13b61802d65e13.yaml @@ -0,0 +1,58 @@ +id: simply-exclude-9035cd59a4944d047d13b61802d65e13 + +info: + name: > + Simply Exclude <= 2.0.6.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f9a3883-9755-4de8-9d60-113238b3c0ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-exclude/" + google-query: inurl:"/wp-content/plugins/simply-exclude/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-exclude,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-exclude/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-exclude" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-gallery-block-11813679c9659f7e86b27269316b1760.yaml b/nuclei-templates/cve-less/plugins/simply-gallery-block-11813679c9659f7e86b27269316b1760.yaml new file mode 100644 index 0000000000..89674e8808 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-gallery-block-11813679c9659f7e86b27269316b1760.yaml @@ -0,0 +1,58 @@ +id: simply-gallery-block-11813679c9659f7e86b27269316b1760 + +info: + name: > + Gallery Blocks with Lightbox <= 2.2.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5de488a2-72d6-4eeb-9b92-7f5bea1ee4ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-gallery-block/" + google-query: inurl:"/wp-content/plugins/simply-gallery-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-gallery-block,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-gallery-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-gallery-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-gallery-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/simply-gallery-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..911fe86411 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-gallery-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: simply-gallery-block-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-gallery-block/" + google-query: inurl:"/wp-content/plugins/simply-gallery-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-gallery-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-gallery-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-gallery-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-gallery-block-e8011af8e84e91734034cab87d49e815.yaml b/nuclei-templates/cve-less/plugins/simply-gallery-block-e8011af8e84e91734034cab87d49e815.yaml new file mode 100644 index 0000000000..c51fc18f34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-gallery-block-e8011af8e84e91734034cab87d49e815.yaml @@ -0,0 +1,58 @@ +id: simply-gallery-block-e8011af8e84e91734034cab87d49e815 + +info: + name: > + Gallery Blocks with Lightbox <= 3.0.7 - Missing Authorization in pgc_sgb_action_wizard + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7561bce2-bd70-4da3-bbf0-318e59cd1852?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-gallery-block/" + google-query: inurl:"/wp-content/plugins/simply-gallery-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-gallery-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-gallery-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-gallery-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-poll-cf17297c2e5d307d7deaa74f22821404.yaml b/nuclei-templates/cve-less/plugins/simply-poll-cf17297c2e5d307d7deaa74f22821404.yaml new file mode 100644 index 0000000000..b3a5e82321 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-poll-cf17297c2e5d307d7deaa74f22821404.yaml @@ -0,0 +1,58 @@ +id: simply-poll-cf17297c2e5d307d7deaa74f22821404 + +info: + name: > + Simply Poll <= 1.4.1 - Cross-Site Request Forgery and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63323552-354b-44b6-81a4-0b6e82480910?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-poll/" + google-query: inurl:"/wp-content/plugins/simply-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-poll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-schedule-appointments-2a22d89645a206ec3980a097270f17eb.yaml b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-2a22d89645a206ec3980a097270f17eb.yaml new file mode 100644 index 0000000000..fdb36c9b67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-2a22d89645a206ec3980a097270f17eb.yaml @@ -0,0 +1,58 @@ +id: simply-schedule-appointments-2a22d89645a206ec3980a097270f17eb + +info: + name: > + Simply Schedule Appointments <= 1.5.7.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71f059ba-1874-4e8a-80e9-3f7826f9341d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-schedule-appointments/" + google-query: inurl:"/wp-content/plugins/simply-schedule-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-schedule-appointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-schedule-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-schedule-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-schedule-appointments-4875a2fe8d20d1fa49a472eba79255a0.yaml b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-4875a2fe8d20d1fa49a472eba79255a0.yaml new file mode 100644 index 0000000000..8f55d4f4be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-4875a2fe8d20d1fa49a472eba79255a0.yaml @@ -0,0 +1,58 @@ +id: simply-schedule-appointments-4875a2fe8d20d1fa49a472eba79255a0 + +info: + name: > + Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.7.7 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0dd466-a78a-4b79-b9bd-5363f69d9a4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-schedule-appointments/" + google-query: inurl:"/wp-content/plugins/simply-schedule-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-schedule-appointments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-schedule-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-schedule-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-schedule-appointments-8913b61e532a835b143f97f633aefd8d.yaml b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-8913b61e532a835b143f97f633aefd8d.yaml new file mode 100644 index 0000000000..7b031ec41c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-8913b61e532a835b143f97f633aefd8d.yaml @@ -0,0 +1,58 @@ +id: simply-schedule-appointments-8913b61e532a835b143f97f633aefd8d + +info: + name: > + Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.7.7 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4930b03-9142-464e-98ae-a910dfa46f2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-schedule-appointments/" + google-query: inurl:"/wp-content/plugins/simply-schedule-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-schedule-appointments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-schedule-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-schedule-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-schedule-appointments-97337e0bb5451938a58c2c753a687598.yaml b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-97337e0bb5451938a58c2c753a687598.yaml new file mode 100644 index 0000000000..d390a51d57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-97337e0bb5451938a58c2c753a687598.yaml @@ -0,0 +1,58 @@ +id: simply-schedule-appointments-97337e0bb5451938a58c2c753a687598 + +info: + name: > + Simply Schedule Appointments <= 1.6.6.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4291b5c8-cce3-46ae-b9ff-a34a0f5bcdce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-schedule-appointments/" + google-query: inurl:"/wp-content/plugins/simply-schedule-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-schedule-appointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-schedule-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-schedule-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-schedule-appointments-c38981be41bbef7485b5eec0cd09e15d.yaml b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-c38981be41bbef7485b5eec0cd09e15d.yaml new file mode 100644 index 0000000000..1e7eb6163e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-c38981be41bbef7485b5eec0cd09e15d.yaml @@ -0,0 +1,58 @@ +id: simply-schedule-appointments-c38981be41bbef7485b5eec0cd09e15d + +info: + name: > + Simply Schedule Appointments <= 1.5.7.5 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9614aaa9-d343-4fd4-8a40-7366cd961bd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-schedule-appointments/" + google-query: inurl:"/wp-content/plugins/simply-schedule-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-schedule-appointments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-schedule-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-schedule-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-schedule-appointments-f9c99e185c0c70242a4641a50c06e0c6.yaml b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-f9c99e185c0c70242a4641a50c06e0c6.yaml new file mode 100644 index 0000000000..cb079cbb1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-f9c99e185c0c70242a4641a50c06e0c6.yaml @@ -0,0 +1,58 @@ +id: simply-schedule-appointments-f9c99e185c0c70242a4641a50c06e0c6 + +info: + name: > + Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin <= 1.6.6.20 - Cross-Site Request Forgery to Plugin Data Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0eec9744-6dbd-42bd-b9c5-c9d792cecf4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-schedule-appointments/" + google-query: inurl:"/wp-content/plugins/simply-schedule-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-schedule-appointments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-schedule-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-schedule-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-schedule-appointments-fb1f94792250765f89467bf81e536614.yaml b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-fb1f94792250765f89467bf81e536614.yaml new file mode 100644 index 0000000000..e301e61158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-schedule-appointments-fb1f94792250765f89467bf81e536614.yaml @@ -0,0 +1,58 @@ +id: simply-schedule-appointments-fb1f94792250765f89467bf81e536614 + +info: + name: > + Simply Schedule Appointments <= 1.6.5.27 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/775d4ba7-7198-493c-bae0-7f3f78741b90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-schedule-appointments/" + google-query: inurl:"/wp-content/plugins/simply-schedule-appointments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-schedule-appointments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-schedule-appointments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-schedule-appointments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-static-7a5d96cd355dcc2c5701c024f2ba7043.yaml b/nuclei-templates/cve-less/plugins/simply-static-7a5d96cd355dcc2c5701c024f2ba7043.yaml new file mode 100644 index 0000000000..3e35daf2c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-static-7a5d96cd355dcc2c5701c024f2ba7043.yaml @@ -0,0 +1,58 @@ +id: simply-static-7a5d96cd355dcc2c5701c024f2ba7043 + +info: + name: > + Simply Static <= 3.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/222aa8cb-95f4-4fe1-82c8-3acf82960cc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-static/" + google-query: inurl:"/wp-content/plugins/simply-static/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-static,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-static/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-static" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/simply-static-ee067e98831efc015954686b9f2f926b.yaml b/nuclei-templates/cve-less/plugins/simply-static-ee067e98831efc015954686b9f2f926b.yaml new file mode 100644 index 0000000000..21bacd9346 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/simply-static-ee067e98831efc015954686b9f2f926b.yaml @@ -0,0 +1,58 @@ +id: simply-static-ee067e98831efc015954686b9f2f926b + +info: + name: > + Simply Static <= 3.1.3 - Unauthenticated Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a669f6ef-0cf1-4fdb-855a-1d6aaa7d8f6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simply-static/" + google-query: inurl:"/wp-content/plugins/simply-static/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simply-static,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simply-static/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simply-static" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-4db0da089db1959632856d530ba9ce1d.yaml b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-4db0da089db1959632856d530ba9ce1d.yaml new file mode 100644 index 0000000000..02b37c00f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-4db0da089db1959632856d530ba9ce1d.yaml @@ -0,0 +1,58 @@ +id: sina-extension-for-elementor-4db0da089db1959632856d530ba9ce1d + +info: + name: > + Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) <= 3.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Sina Fancy Text Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78b24567-c185-4bef-b025-016b091be2e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sina-extension-for-elementor/" + google-query: inurl:"/wp-content/plugins/sina-extension-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sina-extension-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sina-extension-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sina-extension-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-5549387f2d45c534d6b21b6c2a38d654.yaml b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-5549387f2d45c534d6b21b6c2a38d654.yaml new file mode 100644 index 0000000000..13c32cf383 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-5549387f2d45c534d6b21b6c2a38d654.yaml @@ -0,0 +1,58 @@ +id: sina-extension-for-elementor-5549387f2d45c534d6b21b6c2a38d654 + +info: + name: > + Sina Extension for Elementor < 2.2.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a876469-72b1-478f-926b-57da237e3a95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sina-extension-for-elementor/" + google-query: inurl:"/wp-content/plugins/sina-extension-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sina-extension-for-elementor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sina-extension-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sina-extension-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-85fafc88eba7f097874b28a387304352.yaml b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-85fafc88eba7f097874b28a387304352.yaml new file mode 100644 index 0000000000..3fdbef1cb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-85fafc88eba7f097874b28a387304352.yaml @@ -0,0 +1,58 @@ +id: sina-extension-for-elementor-85fafc88eba7f097874b28a387304352 + +info: + name: > + Sina Extension for Elementor <= 3.3.11 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce5f4960-e47c-4926-97f2-8c94c438a4e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sina-extension-for-elementor/" + google-query: inurl:"/wp-content/plugins/sina-extension-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sina-extension-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sina-extension-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sina-extension-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-9a44744af3993590fe3bf014b0ad32e9.yaml b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-9a44744af3993590fe3bf014b0ad32e9.yaml new file mode 100644 index 0000000000..3c59fd9856 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-9a44744af3993590fe3bf014b0ad32e9.yaml @@ -0,0 +1,58 @@ +id: sina-extension-for-elementor-9a44744af3993590fe3bf014b0ad32e9 + +info: + name: > + Sina Extension for Elementor <= 3.5.1 - Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db4616f7-e685-4dc7-947c-23c378a9bdd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sina-extension-for-elementor/" + google-query: inurl:"/wp-content/plugins/sina-extension-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sina-extension-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sina-extension-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sina-extension-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-e224a4cb8b7e311ea14d699136e59c51.yaml b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-e224a4cb8b7e311ea14d699136e59c51.yaml new file mode 100644 index 0000000000..7b4b203702 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sina-extension-for-elementor-e224a4cb8b7e311ea14d699136e59c51.yaml @@ -0,0 +1,58 @@ +id: sina-extension-for-elementor-e224a4cb8b7e311ea14d699136e59c51 + +info: + name: > + Sina Extension for Elementor <= 3.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3905ebe-334c-4c6f-a430-4c25cd15c61f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sina-extension-for-elementor/" + google-query: inurl:"/wp-content/plugins/sina-extension-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sina-extension-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sina-extension-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sina-extension-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/single-post-exporter-e9772ee13db7edf1a8985c488222cdb7.yaml b/nuclei-templates/cve-less/plugins/single-post-exporter-e9772ee13db7edf1a8985c488222cdb7.yaml new file mode 100644 index 0000000000..af788aaa33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/single-post-exporter-e9772ee13db7edf1a8985c488222cdb7.yaml @@ -0,0 +1,58 @@ +id: single-post-exporter-e9772ee13db7edf1a8985c488222cdb7 + +info: + name: > + Single Post Exporter <= 1.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f6693fd-2ffc-4281-9da3-bdbf70e20cfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/single-post-exporter/" + google-query: inurl:"/wp-content/plugins/single-post-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,single-post-exporter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/single-post-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "single-post-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/single-sign-on-client-d5d7eb75824b8adafca40c78e85d9d96.yaml b/nuclei-templates/cve-less/plugins/single-sign-on-client-d5d7eb75824b8adafca40c78e85d9d96.yaml new file mode 100644 index 0000000000..b595e6917b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/single-sign-on-client-d5d7eb75824b8adafca40c78e85d9d96.yaml @@ -0,0 +1,58 @@ +id: single-sign-on-client-d5d7eb75824b8adafca40c78e85d9d96 + +info: + name: > + Simple Single Sign On <= 4.1.1 - Insecure OAuth Implementation to Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb762cd0-1925-4161-bd12-9e781de60c9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/single-sign-on-client/" + google-query: inurl:"/wp-content/plugins/single-sign-on-client/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,single-sign-on-client,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/single-sign-on-client/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "single-sign-on-client" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sintic_gallery-612c6db228099d10e3e66678f293335f.yaml b/nuclei-templates/cve-less/plugins/sintic_gallery-612c6db228099d10e3e66678f293335f.yaml new file mode 100644 index 0000000000..503702d902 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sintic_gallery-612c6db228099d10e3e66678f293335f.yaml @@ -0,0 +1,58 @@ +id: sintic_gallery-612c6db228099d10e3e66678f293335f + +info: + name: > + sintic_gallery (All Known Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d438d11-df72-431e-8956-6a7b316a6dc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sintic_gallery/" + google-query: inurl:"/wp-content/plugins/sintic_gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sintic_gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sintic_gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sintic_gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sirv-0e449c9a497e53b142f5674fb22e2a1f.yaml b/nuclei-templates/cve-less/plugins/sirv-0e449c9a497e53b142f5674fb22e2a1f.yaml new file mode 100644 index 0000000000..c8d9b28b82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sirv-0e449c9a497e53b142f5674fb22e2a1f.yaml @@ -0,0 +1,58 @@ +id: sirv-0e449c9a497e53b142f5674fb22e2a1f + +info: + name: > + Sirv <= 7.2.2 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b94583f-405e-4fd3-849e-33563b72f698?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sirv/" + google-query: inurl:"/wp-content/plugins/sirv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sirv,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sirv-20f2364245cca99badf62beb26ca57f1.yaml b/nuclei-templates/cve-less/plugins/sirv-20f2364245cca99badf62beb26ca57f1.yaml new file mode 100644 index 0000000000..318352e71e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sirv-20f2364245cca99badf62beb26ca57f1.yaml @@ -0,0 +1,58 @@ +id: sirv-20f2364245cca99badf62beb26ca57f1 + +info: + name: > + Image Optimizer, Resizer and CDN – Sirv <= 7.2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46030da6-6d9f-4934-a93c-4cd564510f36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sirv/" + google-query: inurl:"/wp-content/plugins/sirv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sirv,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sirv-28a2dfdb4b89718535fa7dedda6260e9.yaml b/nuclei-templates/cve-less/plugins/sirv-28a2dfdb4b89718535fa7dedda6260e9.yaml new file mode 100644 index 0000000000..b46bb4b5ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sirv-28a2dfdb4b89718535fa7dedda6260e9.yaml @@ -0,0 +1,58 @@ +id: sirv-28a2dfdb4b89718535fa7dedda6260e9 + +info: + name: > + Image Optimizer, Resizer and CDN – Sirv < 1.3.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98df8fbb-51c3-4b6c-8f99-56abfe11447e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sirv/" + google-query: inurl:"/wp-content/plugins/sirv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sirv,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sirv-56de812058629ef41442e0db5d74e172.yaml b/nuclei-templates/cve-less/plugins/sirv-56de812058629ef41442e0db5d74e172.yaml new file mode 100644 index 0000000000..3a9767bf5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sirv-56de812058629ef41442e0db5d74e172.yaml @@ -0,0 +1,58 @@ +id: sirv-56de812058629ef41442e0db5d74e172 + +info: + name: > + Image Optimizer, Resizer and CDN – Sirv <= 7.2.0 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d30cc136-ebde-4c76-9831-ffde79bf3c4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sirv/" + google-query: inurl:"/wp-content/plugins/sirv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sirv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sirv-6ccadf7e1366ca3249cc5950850c4bdc.yaml b/nuclei-templates/cve-less/plugins/sirv-6ccadf7e1366ca3249cc5950850c4bdc.yaml new file mode 100644 index 0000000000..2dd39415fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sirv-6ccadf7e1366ca3249cc5950850c4bdc.yaml @@ -0,0 +1,58 @@ +id: sirv-6ccadf7e1366ca3249cc5950850c4bdc + +info: + name: > + Image Optimizer, Resizer and CDN – Sirv <= 6.8.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d44f8891-cc24-4f6f-9032-3a4c632c6fb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sirv/" + google-query: inurl:"/wp-content/plugins/sirv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sirv,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sirv-da89f8a86000f654eccfee96ffe3f6a3.yaml b/nuclei-templates/cve-less/plugins/sirv-da89f8a86000f654eccfee96ffe3f6a3.yaml new file mode 100644 index 0000000000..05b9ccf448 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sirv-da89f8a86000f654eccfee96ffe3f6a3.yaml @@ -0,0 +1,58 @@ +id: sirv-da89f8a86000f654eccfee96ffe3f6a3 + +info: + name: > + Sirv <= 7.1.2 - Missing Authorization via sirv_disconnect + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a67ec6-ee13-4532-8213-d17dbf5f2c55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sirv/" + google-query: inurl:"/wp-content/plugins/sirv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sirv,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sis-handball-1d1308e4009a475d471dafd71ee14d32.yaml b/nuclei-templates/cve-less/plugins/sis-handball-1d1308e4009a475d471dafd71ee14d32.yaml new file mode 100644 index 0000000000..e0c82bce7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sis-handball-1d1308e4009a475d471dafd71ee14d32.yaml @@ -0,0 +1,58 @@ +id: sis-handball-1d1308e4009a475d471dafd71ee14d32 + +info: + name: > + SIS Handball <= 1.0.45 - Authenticated (Administrator+) SQL Injection via 'orderby' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cabdc9db-2d1c-4390-a4b7-65648ef9f16a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sis-handball/" + google-query: inurl:"/wp-content/plugins/sis-handball/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sis-handball,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sis-handball/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sis-handball" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sis-handball-3230f7ba42466d011feb76d708212b0d.yaml b/nuclei-templates/cve-less/plugins/sis-handball-3230f7ba42466d011feb76d708212b0d.yaml new file mode 100644 index 0000000000..b5d47c8bfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sis-handball-3230f7ba42466d011feb76d708212b0d.yaml @@ -0,0 +1,58 @@ +id: sis-handball-3230f7ba42466d011feb76d708212b0d + +info: + name: > + SIS Handball <= 1.0.45 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5973afaa-5a64-4db1-8e32-3b39d1367eb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sis-handball/" + google-query: inurl:"/wp-content/plugins/sis-handball/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sis-handball,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sis-handball/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sis-handball" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-audit-e422a5cf5dae135dafe01672b0f3ffbc.yaml b/nuclei-templates/cve-less/plugins/site-audit-e422a5cf5dae135dafe01672b0f3ffbc.yaml new file mode 100644 index 0000000000..e0950aa1dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-audit-e422a5cf5dae135dafe01672b0f3ffbc.yaml @@ -0,0 +1,58 @@ +id: site-audit-e422a5cf5dae135dafe01672b0f3ffbc + +info: + name: > + My Site Audit <= 1.2.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13c607d9-a8fe-4a03-972c-d0c1b752c7d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-audit/" + google-query: inurl:"/wp-content/plugins/site-audit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-audit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-audit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-audit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-editor-d269819cdfc64e9b2366e7d4a6d8de82.yaml b/nuclei-templates/cve-less/plugins/site-editor-d269819cdfc64e9b2366e7d4a6d8de82.yaml new file mode 100644 index 0000000000..e5bbdd0ef3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-editor-d269819cdfc64e9b2366e7d4a6d8de82.yaml @@ -0,0 +1,58 @@ +id: site-editor-d269819cdfc64e9b2366e7d4a6d8de82 + +info: + name: > + Site Editor <= 1.1.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99d90610-490f-44a5-8e87-63927410c804?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-editor/" + google-query: inurl:"/wp-content/plugins/site-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-editor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-is-offline-plugin-fcfe12c9ab0b540a8002a6b623d72f95.yaml b/nuclei-templates/cve-less/plugins/site-is-offline-plugin-fcfe12c9ab0b540a8002a6b623d72f95.yaml new file mode 100644 index 0000000000..4893c08b0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-is-offline-plugin-fcfe12c9ab0b540a8002a6b623d72f95.yaml @@ -0,0 +1,58 @@ +id: site-is-offline-plugin-fcfe12c9ab0b540a8002a6b623d72f95 + +info: + name: > + Site Offline or Coming Soon <= 1.6.6 - Cross-Site Request Forgery to Settings Update and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffaf7a75-de27-4361-ba04-ff17151b7eb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-is-offline-plugin/" + google-query: inurl:"/wp-content/plugins/site-is-offline-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-is-offline-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-is-offline-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-is-offline-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-notes-a184b0331f3ba7e840ac7ff2eaf4f219.yaml b/nuclei-templates/cve-less/plugins/site-notes-a184b0331f3ba7e840ac7ff2eaf4f219.yaml new file mode 100644 index 0000000000..30707174ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-notes-a184b0331f3ba7e840ac7ff2eaf4f219.yaml @@ -0,0 +1,58 @@ +id: site-notes-a184b0331f3ba7e840ac7ff2eaf4f219 + +info: + name: > + Site Notes <= 2.0.0 - Cross-Site Request Forgery to Admin Note Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89cbe41d-3765-4061-8ef6-b63556a5677c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-notes/" + google-query: inurl:"/wp-content/plugins/site-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-notes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-offline-27d8a1199f49c828fd2eeb0b1780c2d6.yaml b/nuclei-templates/cve-less/plugins/site-offline-27d8a1199f49c828fd2eeb0b1780c2d6.yaml new file mode 100644 index 0000000000..f8adb15ea5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-offline-27d8a1199f49c828fd2eeb0b1780c2d6.yaml @@ -0,0 +1,58 @@ +id: site-offline-27d8a1199f49c828fd2eeb0b1780c2d6 + +info: + name: > + Site Offline <= 1.4.9 - Maintenance Mode Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac06b9d9-51de-4f7a-87b8-c7b46a8475ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-offline/" + google-query: inurl:"/wp-content/plugins/site-offline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-offline,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-offline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-offline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-offline-4160c9c4da480f4b3c030b1d1b582ea6.yaml b/nuclei-templates/cve-less/plugins/site-offline-4160c9c4da480f4b3c030b1d1b582ea6.yaml new file mode 100644 index 0000000000..dc29452117 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-offline-4160c9c4da480f4b3c030b1d1b582ea6.yaml @@ -0,0 +1,58 @@ +id: site-offline-4160c9c4da480f4b3c030b1d1b582ea6 + +info: + name: > + Site Offline Or Coming Soon Or Maintenance Mode <= 1.4.2 - Cross-Site Request Forgery and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b105fe2a-b1fd-42d4-ab16-b80115e22531?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-offline/" + google-query: inurl:"/wp-content/plugins/site-offline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-offline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-offline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-offline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-offline-f94ad2e40424de33128764065d19c984.yaml b/nuclei-templates/cve-less/plugins/site-offline-f94ad2e40424de33128764065d19c984.yaml new file mode 100644 index 0000000000..1b3bf9194b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-offline-f94ad2e40424de33128764065d19c984.yaml @@ -0,0 +1,58 @@ +id: site-offline-f94ad2e40424de33128764065d19c984 + +info: + name: > + Site Offline <= 1.5.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96f30a22-f218-48e7-9796-b9f1d5becc2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-offline/" + google-query: inurl:"/wp-content/plugins/site-offline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-offline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-offline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-offline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-1d382a2cbfe1692803bdc9f5974b02e1.yaml b/nuclei-templates/cve-less/plugins/site-reviews-1d382a2cbfe1692803bdc9f5974b02e1.yaml new file mode 100644 index 0000000000..3a578ad708 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-1d382a2cbfe1692803bdc9f5974b02e1.yaml @@ -0,0 +1,58 @@ +id: site-reviews-1d382a2cbfe1692803bdc9f5974b02e1 + +info: + name: > + Site Reviews <= 5.13.0 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a84a021-5014-4848-a77f-d3f4802c9395?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-27b5597908113501f4beb8489633cce4.yaml b/nuclei-templates/cve-less/plugins/site-reviews-27b5597908113501f4beb8489633cce4.yaml new file mode 100644 index 0000000000..3b0b9b0f88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-27b5597908113501f4beb8489633cce4.yaml @@ -0,0 +1,58 @@ +id: site-reviews-27b5597908113501f4beb8489633cce4 + +info: + name: > + Site Reviews <= 6.10.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1accc41e-41d2-49e3-a80a-6b95b02cb42e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-363cf849a90f39fbc05b59e8ab91a270.yaml b/nuclei-templates/cve-less/plugins/site-reviews-363cf849a90f39fbc05b59e8ab91a270.yaml new file mode 100644 index 0000000000..d8928d42ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-363cf849a90f39fbc05b59e8ab91a270.yaml @@ -0,0 +1,58 @@ +id: site-reviews-363cf849a90f39fbc05b59e8ab91a270 + +info: + name: > + Site Reviews <= 2.15.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/825d9154-7385-4652-b258-cf813be9bcdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-5d6957b18909422bd5f841b070340ee6.yaml b/nuclei-templates/cve-less/plugins/site-reviews-5d6957b18909422bd5f841b070340ee6.yaml new file mode 100644 index 0000000000..85f99194b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-5d6957b18909422bd5f841b070340ee6.yaml @@ -0,0 +1,58 @@ +id: site-reviews-5d6957b18909422bd5f841b070340ee6 + +info: + name: > + Site Reviews <= 6.11.4 - Authenticated(Subscriber+) Stored Cross-Site Scripting via display name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/823418d9-a231-4306-8575-2937a491509f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.11.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-68354cec14dcc6c8c5561bd362f6a851.yaml b/nuclei-templates/cve-less/plugins/site-reviews-68354cec14dcc6c8c5561bd362f6a851.yaml new file mode 100644 index 0000000000..5c898fca29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-68354cec14dcc6c8c5561bd362f6a851.yaml @@ -0,0 +1,58 @@ +id: site-reviews-68354cec14dcc6c8c5561bd362f6a851 + +info: + name: > + Site Reviews <= 6.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de63f5bf-9cf5-428d-80da-c0030988b4a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-a344469158b924b0533b76919c9daf70.yaml b/nuclei-templates/cve-less/plugins/site-reviews-a344469158b924b0533b76919c9daf70.yaml new file mode 100644 index 0000000000..f6e32b6bca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-a344469158b924b0533b76919c9daf70.yaml @@ -0,0 +1,58 @@ +id: site-reviews-a344469158b924b0533b76919c9daf70 + +info: + name: > + Site Reviews <= 6.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via block attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03c9e4c4-c680-474e-b172-d34d3eba2183?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-c2ad47353175f44f004de63cfd387b37.yaml b/nuclei-templates/cve-less/plugins/site-reviews-c2ad47353175f44f004de63cfd387b37.yaml new file mode 100644 index 0000000000..78ccdc0a03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-c2ad47353175f44f004de63cfd387b37.yaml @@ -0,0 +1,58 @@ +id: site-reviews-c2ad47353175f44f004de63cfd387b37 + +info: + name: > + Site Reviews <= 6.11.6 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2003cef3-06b0-4012-9629-19c0765553dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-db3e14a64935e9816ff1fc8cb2d49569.yaml b/nuclei-templates/cve-less/plugins/site-reviews-db3e14a64935e9816ff1fc8cb2d49569.yaml new file mode 100644 index 0000000000..59a91df5b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-db3e14a64935e9816ff1fc8cb2d49569.yaml @@ -0,0 +1,58 @@ +id: site-reviews-db3e14a64935e9816ff1fc8cb2d49569 + +info: + name: > + Site Reviews <= 6.5.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d94f6cdd-8232-4e0c-b510-0e755c280b58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-dc0678502bda1f209b1b74a11263e93c.yaml b/nuclei-templates/cve-less/plugins/site-reviews-dc0678502bda1f209b1b74a11263e93c.yaml new file mode 100644 index 0000000000..bf9a8ee8d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-dc0678502bda1f209b1b74a11263e93c.yaml @@ -0,0 +1,58 @@ +id: site-reviews-dc0678502bda1f209b1b74a11263e93c + +info: + name: > + Site Reviews <= 6.7.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c31072d-9921-4bef-809c-b97a1020a2cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-f51b1e88d3f4e8a3ab51d6b13ceec3ec.yaml b/nuclei-templates/cve-less/plugins/site-reviews-f51b1e88d3f4e8a3ab51d6b13ceec3ec.yaml new file mode 100644 index 0000000000..e8b205607b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-f51b1e88d3f4e8a3ab51d6b13ceec3ec.yaml @@ -0,0 +1,58 @@ +id: site-reviews-f51b1e88d3f4e8a3ab51d6b13ceec3ec + +info: + name: > + Site Reviews <= 6.2.0 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ead76977-d0dc-4385-8666-c8a4694c3bbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/site-reviews-f8a3890c58a293ea8072e2174a632bd1.yaml b/nuclei-templates/cve-less/plugins/site-reviews-f8a3890c58a293ea8072e2174a632bd1.yaml new file mode 100644 index 0000000000..86c465cb35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/site-reviews-f8a3890c58a293ea8072e2174a632bd1.yaml @@ -0,0 +1,58 @@ +id: site-reviews-f8a3890c58a293ea8072e2174a632bd1 + +info: + name: > + Site Reviews <= 5.17.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/618854b9-fa85-4302-9a38-ae5cbd7c7b9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/site-reviews/" + google-query: inurl:"/wp-content/plugins/site-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,site-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/site-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "site-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.17.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitebuilder-dynamic-components-a6ba1a0da5df7762bd146ece37b9f32b.yaml b/nuclei-templates/cve-less/plugins/sitebuilder-dynamic-components-a6ba1a0da5df7762bd146ece37b9f32b.yaml new file mode 100644 index 0000000000..1627b98fbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitebuilder-dynamic-components-a6ba1a0da5df7762bd146ece37b9f32b.yaml @@ -0,0 +1,58 @@ +id: sitebuilder-dynamic-components-a6ba1a0da5df7762bd146ece37b9f32b + +info: + name: > + SiteBuilder Dynamic Components <= 1.0 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32d81267-f17c-4d53-bbc9-7b52683351e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitebuilder-dynamic-components/" + google-query: inurl:"/wp-content/plugins/sitebuilder-dynamic-components/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitebuilder-dynamic-components,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitebuilder-dynamic-components/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitebuilder-dynamic-components" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitekit-1db1c2d5f1fad40eb6b6cd9715e502a3.yaml b/nuclei-templates/cve-less/plugins/sitekit-1db1c2d5f1fad40eb6b6cd9715e502a3.yaml new file mode 100644 index 0000000000..4c073c086f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitekit-1db1c2d5f1fad40eb6b6cd9715e502a3.yaml @@ -0,0 +1,58 @@ +id: sitekit-1db1c2d5f1fad40eb6b6cd9715e502a3 + +info: + name: > + Sitekit <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'sitekit_iframe' shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/011c8a06-298e-4a53-9ef8-552585426d79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitekit/" + google-query: inurl:"/wp-content/plugins/sitekit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitekit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitekit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitekit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitekit-50ade2845c53f4bbe684ddfabd1bfd64.yaml b/nuclei-templates/cve-less/plugins/sitekit-50ade2845c53f4bbe684ddfabd1bfd64.yaml new file mode 100644 index 0000000000..3182fad2f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitekit-50ade2845c53f4bbe684ddfabd1bfd64.yaml @@ -0,0 +1,58 @@ +id: sitekit-50ade2845c53f4bbe684ddfabd1bfd64 + +info: + name: > + Sitekit <= 1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'sitekit_iframe ' shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f0be29a-7896-4166-a2a6-64f99d845236?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitekit/" + google-query: inurl:"/wp-content/plugins/sitekit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitekit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitekit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitekit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitekit-d10ca8810c9a238a95e8c428f2cea03d.yaml b/nuclei-templates/cve-less/plugins/sitekit-d10ca8810c9a238a95e8c428f2cea03d.yaml new file mode 100644 index 0000000000..60111bf006 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitekit-d10ca8810c9a238a95e8c428f2cea03d.yaml @@ -0,0 +1,58 @@ +id: sitekit-d10ca8810c9a238a95e8c428f2cea03d + +info: + name: > + Sitekit <= 1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55797931-e2eb-4cd7-8de6-ded7e1a382a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitekit/" + google-query: inurl:"/wp-content/plugins/sitekit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitekit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitekit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitekit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitemap-by-click5-61a8c97249e7ba41d1f71a1052bb0639.yaml b/nuclei-templates/cve-less/plugins/sitemap-by-click5-61a8c97249e7ba41d1f71a1052bb0639.yaml new file mode 100644 index 0000000000..165427b3be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitemap-by-click5-61a8c97249e7ba41d1f71a1052bb0639.yaml @@ -0,0 +1,58 @@ +id: sitemap-by-click5-61a8c97249e7ba41d1f71a1052bb0639 + +info: + name: > + Sitemap by click5 <= 1.0.35 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f07c1aac-28c1-47fc-a2e5-fbe48a90f051?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitemap-by-click5/" + google-query: inurl:"/wp-content/plugins/sitemap-by-click5/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitemap-by-click5,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitemap-by-click5/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitemap-by-click5" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitemap-efa61bc9a560990c025c5047443643f6.yaml b/nuclei-templates/cve-less/plugins/sitemap-efa61bc9a560990c025c5047443643f6.yaml new file mode 100644 index 0000000000..fce12fed61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitemap-efa61bc9a560990c025c5047443643f6.yaml @@ -0,0 +1,58 @@ +id: sitemap-efa61bc9a560990c025c5047443643f6 + +info: + name: > + Sitemap <= 4.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffce535f-620d-40f8-a944-11ea87a67380?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitemap/" + google-query: inurl:"/wp-content/plugins/sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitemap-index-e71a52c7f200dba2edfeb838eff9f8f3.yaml b/nuclei-templates/cve-less/plugins/sitemap-index-e71a52c7f200dba2edfeb838eff9f8f3.yaml new file mode 100644 index 0000000000..c0abf345bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitemap-index-e71a52c7f200dba2edfeb838eff9f8f3.yaml @@ -0,0 +1,58 @@ +id: sitemap-index-e71a52c7f200dba2edfeb838eff9f8f3 + +info: + name: > + Sitemap Index <= 1.2.3 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40005aed-07aa-44da-a06e-0187931105ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitemap-index/" + google-query: inurl:"/wp-content/plugins/sitemap-index/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitemap-index,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitemap-index/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitemap-index" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/siteorigin-panels-7b1460489673c879f7bd7cd256d22891.yaml b/nuclei-templates/cve-less/plugins/siteorigin-panels-7b1460489673c879f7bd7cd256d22891.yaml new file mode 100644 index 0000000000..df770391d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/siteorigin-panels-7b1460489673c879f7bd7cd256d22891.yaml @@ -0,0 +1,58 @@ +id: siteorigin-panels-7b1460489673c879f7bd7cd256d22891 + +info: + name: > + Page Builder by SiteOrigin <= 2.29.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Legacy Image Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52116a6f-506f-4eeb-9bcc-19900ef38101?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/siteorigin-panels/" + google-query: inurl:"/wp-content/plugins/siteorigin-panels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,siteorigin-panels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/siteorigin-panels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "siteorigin-panels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.29.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/siteorigin-panels-7df5e5754fb5a3c3ef39f58481635571.yaml b/nuclei-templates/cve-less/plugins/siteorigin-panels-7df5e5754fb5a3c3ef39f58481635571.yaml new file mode 100644 index 0000000000..dcefbaaba5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/siteorigin-panels-7df5e5754fb5a3c3ef39f58481635571.yaml @@ -0,0 +1,58 @@ +id: siteorigin-panels-7df5e5754fb5a3c3ef39f58481635571 + +info: + name: > + Page Builder by SiteOrigin <= 2.10.15 - Cross-Site Request Forgery to Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/704eed2c-5ea8-4c31-99c5-8c1b0572997c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/siteorigin-panels/" + google-query: inurl:"/wp-content/plugins/siteorigin-panels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,siteorigin-panels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/siteorigin-panels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "siteorigin-panels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/siteorigin-panels-86d73827337d8244a557bb98a9e7b2f5.yaml b/nuclei-templates/cve-less/plugins/siteorigin-panels-86d73827337d8244a557bb98a9e7b2f5.yaml new file mode 100644 index 0000000000..940ddf1ee3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/siteorigin-panels-86d73827337d8244a557bb98a9e7b2f5.yaml @@ -0,0 +1,58 @@ +id: siteorigin-panels-86d73827337d8244a557bb98a9e7b2f5 + +info: + name: > + Page Builder by SiteOrigin <= 2.10.15 - Cross-Site Request Forgery to Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28e1a11b-5320-41be-bc78-580322e5f407?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/siteorigin-panels/" + google-query: inurl:"/wp-content/plugins/siteorigin-panels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,siteorigin-panels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/siteorigin-panels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "siteorigin-panels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/siteorigin-panels-e99c33f11f772bd71a3e435320a873d8.yaml b/nuclei-templates/cve-less/plugins/siteorigin-panels-e99c33f11f772bd71a3e435320a873d8.yaml new file mode 100644 index 0000000000..0f3784544a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/siteorigin-panels-e99c33f11f772bd71a3e435320a873d8.yaml @@ -0,0 +1,58 @@ +id: siteorigin-panels-e99c33f11f772bd71a3e435320a873d8 + +info: + name: > + Page Builder by SiteOrigin < 2.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d10364ed-179d-4506-a6f0-42b03c005242?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/siteorigin-panels/" + google-query: inurl:"/wp-content/plugins/siteorigin-panels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,siteorigin-panels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/siteorigin-panels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "siteorigin-panels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepact-klaviyo-contact-form-7-2583927ebea3f6f03dee7ed526491728.yaml b/nuclei-templates/cve-less/plugins/sitepact-klaviyo-contact-form-7-2583927ebea3f6f03dee7ed526491728.yaml new file mode 100644 index 0000000000..781b81e434 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepact-klaviyo-contact-form-7-2583927ebea3f6f03dee7ed526491728.yaml @@ -0,0 +1,58 @@ +id: sitepact-klaviyo-contact-form-7-2583927ebea3f6f03dee7ed526491728 + +info: + name: > + Sitepact's Contact Form 7 Extension For Klaviyo <= 1.0.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2565852f-43df-41b1-949e-6c02a8946407?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepact-klaviyo-contact-form-7/" + google-query: inurl:"/wp-content/plugins/sitepact-klaviyo-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepact-klaviyo-contact-form-7,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepact-klaviyo-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepact-klaviyo-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-15159729e5663620758ffbfa0eee6068.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-15159729e5663620758ffbfa0eee6068.yaml new file mode 100644 index 0000000000..835d37a206 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-15159729e5663620758ffbfa0eee6068.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-15159729e5663620758ffbfa0eee6068 + +info: + name: > + WPML < 4.3.7 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0db3f234-111f-4c79-bb54-1a21e4fedb8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-1695c167f694fa63c272f7b2c5254e2e.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-1695c167f694fa63c272f7b2c5254e2e.yaml new file mode 100644 index 0000000000..cf6aed4bd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-1695c167f694fa63c272f7b2c5254e2e.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-1695c167f694fa63c272f7b2c5254e2e + +info: + name: > + WPML <= 4.5.10 - Missing Authorization to Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de62020b-5803-4ea7-89a1-24e5a512f2f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-46fa110da1e59fdc31ecff31d6e6ec62.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-46fa110da1e59fdc31ecff31d6e6ec62.yaml new file mode 100644 index 0000000000..b4e8895b55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-46fa110da1e59fdc31ecff31d6e6ec62.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-46fa110da1e59fdc31ecff31d6e6ec62 + +info: + name: > + WPML <= 4.5.10 - Missing Authorization to Translation Job Status Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef3d4d1-95ce-4180-bb83-afd402094f04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-491308ff9993e601a9660084e0636c41.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-491308ff9993e601a9660084e0636c41.yaml new file mode 100644 index 0000000000..bd36f4be60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-491308ff9993e601a9660084e0636c41.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-491308ff9993e601a9660084e0636c41 + +info: + name: > + WPML <= 3.6.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbdca292-89b6-4e62-bc68-4fdcd57fd504?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-6692bd08a8b42e4b9b60d9c07beac88f.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-6692bd08a8b42e4b9b60d9c07beac88f.yaml new file mode 100644 index 0000000000..d5e555d02c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-6692bd08a8b42e4b9b60d9c07beac88f.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-6692bd08a8b42e4b9b60d9c07beac88f + +info: + name: > + WPML <= 4.5.10 - Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb0b9c2b-c536-4697-be4c-7557ba66c2c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-70ddb8ac3ce5b7c3fc2fb83f47b8e6a3.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-70ddb8ac3ce5b7c3fc2fb83f47b8e6a3.yaml new file mode 100644 index 0000000000..0bcb236e08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-70ddb8ac3ce5b7c3fc2fb83f47b8e6a3.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-70ddb8ac3ce5b7c3fc2fb83f47b8e6a3 + +info: + name: > + WPML <= 3.1.9 - SQL Injection via lang Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/086b51b5-c9f6-4b30-8fa1-4bcc005c66ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-9389937eda8b2fc2252c70c4bad38de9.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-9389937eda8b2fc2252c70c4bad38de9.yaml new file mode 100644 index 0000000000..7b74d72dcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-9389937eda8b2fc2252c70c4bad38de9.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-9389937eda8b2fc2252c70c4bad38de9 + +info: + name: > + WPML <= 4.5.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69bd850d-79bf-429e-b133-6caefeba7377?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a1547a2e9b2e7ebf2c891fd062c403d1.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a1547a2e9b2e7ebf2c891fd062c403d1.yaml new file mode 100644 index 0000000000..b00645d656 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a1547a2e9b2e7ebf2c891fd062c403d1.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-a1547a2e9b2e7ebf2c891fd062c403d1 + +info: + name: > + WPML <= 3.1.9 - Arbitrary Deletion of Content + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da0c91e5-d9dc-413a-95f6-9e2fc6746ec0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a6e3a37b161efaa29dc8fd7f5584611e.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a6e3a37b161efaa29dc8fd7f5584611e.yaml new file mode 100644 index 0000000000..9a340740d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a6e3a37b161efaa29dc8fd7f5584611e.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-a6e3a37b161efaa29dc8fd7f5584611e + +info: + name: > + WPML <= 4.6.0 - Reflected Cross-Site Scripting via wp_lang + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b2302d9-426c-415b-a7d3-3a9de95d87d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a91445aaf81e735f1118d6cfce37548b.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a91445aaf81e735f1118d6cfce37548b.yaml new file mode 100644 index 0000000000..3e66c845e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-a91445aaf81e735f1118d6cfce37548b.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-a91445aaf81e735f1118d6cfce37548b + +info: + name: > + WPML <= 4.5.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acc0cb26-1199-4e71-91a5-340d80fafc24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-bf27f6ce9ebbfb831479a794b9f49858.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-bf27f6ce9ebbfb831479a794b9f49858.yaml new file mode 100644 index 0000000000..93dc00e6f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-bf27f6ce9ebbfb831479a794b9f49858.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-bf27f6ce9ebbfb831479a794b9f49858 + +info: + name: > + WPML < 3.1.8 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/490f5939-a990-4fb7-9515-f8dcee53d75a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-fc97a63071c0bdeea490fe1b61f06d10.yaml b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-fc97a63071c0bdeea490fe1b61f06d10.yaml new file mode 100644 index 0000000000..9ae336ebc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitepress-multilingual-cms-fc97a63071c0bdeea490fe1b61f06d10.yaml @@ -0,0 +1,58 @@ +id: sitepress-multilingual-cms-fc97a63071c0bdeea490fe1b61f06d10 + +info: + name: > + WPML 2.9.3-3.2.6 - Cross-Site Scripting in Accept-Language Header + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/066b3b77-7888-4037-b443-a3c6fb540cf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" + google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitepress-multilingual-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitepress-multilingual-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.9.3', '<= 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitesupercharger-4151801d30351f47d79a16fa8ebbfc4c.yaml b/nuclei-templates/cve-less/plugins/sitesupercharger-4151801d30351f47d79a16fa8ebbfc4c.yaml new file mode 100644 index 0000000000..323768b277 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitesupercharger-4151801d30351f47d79a16fa8ebbfc4c.yaml @@ -0,0 +1,58 @@ +id: sitesupercharger-4151801d30351f47d79a16fa8ebbfc4c + +info: + name: > + SiteSuperCharger <= 5.1.10 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddc91762-b1b0-4d88-bf2d-04a35aab62b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitesupercharger/" + google-query: inurl:"/wp-content/plugins/sitesupercharger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitesupercharger,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitesupercharger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitesupercharger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sitewide-notice-wp-9903b310d82da078ab37bcb7e6aa7858.yaml b/nuclei-templates/cve-less/plugins/sitewide-notice-wp-9903b310d82da078ab37bcb7e6aa7858.yaml new file mode 100644 index 0000000000..f7711a0040 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sitewide-notice-wp-9903b310d82da078ab37bcb7e6aa7858.yaml @@ -0,0 +1,58 @@ +id: sitewide-notice-wp-9903b310d82da078ab37bcb7e6aa7858 + +info: + name: > + Sitewide Notice WP <= 2.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66082207-33b6-45e4-ae93-24c9a9611300?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sitewide-notice-wp/" + google-query: inurl:"/wp-content/plugins/sitewide-notice-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sitewide-notice-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sitewide-notice-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sitewide-notice-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/skaut-bazar-9c08f0f48da441b0237405decb3b5169.yaml b/nuclei-templates/cve-less/plugins/skaut-bazar-9c08f0f48da441b0237405decb3b5169.yaml new file mode 100644 index 0000000000..8477c6372f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/skaut-bazar-9c08f0f48da441b0237405decb3b5169.yaml @@ -0,0 +1,58 @@ +id: skaut-bazar-9c08f0f48da441b0237405decb3b5169 + +info: + name: > + Skaut bazar <= 1.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcf005ba-2753-43f5-9f2b-24a8c59505c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/skaut-bazar/" + google-query: inurl:"/wp-content/plugins/skaut-bazar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,skaut-bazar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/skaut-bazar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "skaut-bazar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/skt-builder-b8c540477ad8f7b59e43be9ed6a57e18.yaml b/nuclei-templates/cve-less/plugins/skt-builder-b8c540477ad8f7b59e43be9ed6a57e18.yaml new file mode 100644 index 0000000000..83fe0d90df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/skt-builder-b8c540477ad8f7b59e43be9ed6a57e18.yaml @@ -0,0 +1,58 @@ +id: skt-builder-b8c540477ad8f7b59e43be9ed6a57e18 + +info: + name: > + SKT Page Builder <= 4.1 - Missing Authorization to Authenticated(Subscriber+) Content Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3164b96f-d876-4cbc-bddf-51e9d9becee6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/skt-builder/" + google-query: inurl:"/wp-content/plugins/skt-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,skt-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/skt-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "skt-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/skt-templates-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/skt-templates-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6287876eba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/skt-templates-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: skt-templates-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/skt-templates/" + google-query: inurl:"/wp-content/plugins/skt-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,skt-templates,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/skt-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "skt-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sky-elementor-addons-f0d3919ed390e73df44ed1542e1a826f.yaml b/nuclei-templates/cve-less/plugins/sky-elementor-addons-f0d3919ed390e73df44ed1542e1a826f.yaml new file mode 100644 index 0000000000..52b63a0153 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sky-elementor-addons-f0d3919ed390e73df44ed1542e1a826f.yaml @@ -0,0 +1,58 @@ +id: sky-elementor-addons-f0d3919ed390e73df44ed1542e1a826f + +info: + name: > + Sky Addons for Elementor <= 2.4.0 - Authenticated(Contributor+) Stored Cross-site scripting via Wrapper Link URL + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d0ccbd-a091-4897-a100-eac75ffa0e3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sky-elementor-addons/" + google-query: inurl:"/wp-content/plugins/sky-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sky-elementor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sky-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sky-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sky-login-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sky-login-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9186d0ef18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sky-login-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sky-login-redirect-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sky-login-redirect/" + google-query: inurl:"/wp-content/plugins/sky-login-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sky-login-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sky-login-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sky-login-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/skype-online-status-05ead7ef23623d246fc2b9a535b5761b.yaml b/nuclei-templates/cve-less/plugins/skype-online-status-05ead7ef23623d246fc2b9a535b5761b.yaml new file mode 100644 index 0000000000..be5c87866a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/skype-online-status-05ead7ef23623d246fc2b9a535b5761b.yaml @@ -0,0 +1,58 @@ +id: skype-online-status-05ead7ef23623d246fc2b9a535b5761b + +info: + name: > + Skype Legacy Buttons <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/914bcc8f-fecd-450e-b2a7-0989b7a0dd4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/skype-online-status/" + google-query: inurl:"/wp-content/plugins/skype-online-status/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,skype-online-status,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/skype-online-status/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "skype-online-status" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/skysa-official-8b895d6fff8c69659029604aec394ccf.yaml b/nuclei-templates/cve-less/plugins/skysa-official-8b895d6fff8c69659029604aec394ccf.yaml new file mode 100644 index 0000000000..67da59f1de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/skysa-official-8b895d6fff8c69659029604aec394ccf.yaml @@ -0,0 +1,58 @@ +id: skysa-official-8b895d6fff8c69659029604aec394ccf + +info: + name: > + Skysa App Bar Integration < 1.04 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/596d1083-2030-41f0-92d4-82e98bf07331?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/skysa-official/" + google-query: inurl:"/wp-content/plugins/skysa-official/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,skysa-official,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/skysa-official/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "skysa-official" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sl-user-create-0b9b027562576dde68a9c5ee80494e44.yaml b/nuclei-templates/cve-less/plugins/sl-user-create-0b9b027562576dde68a9c5ee80494e44.yaml new file mode 100644 index 0000000000..68e2ee1f26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sl-user-create-0b9b027562576dde68a9c5ee80494e44.yaml @@ -0,0 +1,58 @@ +id: sl-user-create-0b9b027562576dde68a9c5ee80494e44 + +info: + name: > + SL User Create < 0.2.5 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0f5b9b7-2482-4f25-b50e-e2d9b3ef4902?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sl-user-create/" + google-query: inurl:"/wp-content/plugins/sl-user-create/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sl-user-create,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sl-user-create/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sl-user-create" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slash-admin-04cfad21aa5454a8d771191b1d8fe82b.yaml b/nuclei-templates/cve-less/plugins/slash-admin-04cfad21aa5454a8d771191b1d8fe82b.yaml new file mode 100644 index 0000000000..e46ca217b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slash-admin-04cfad21aa5454a8d771191b1d8fe82b.yaml @@ -0,0 +1,58 @@ +id: slash-admin-04cfad21aa5454a8d771191b1d8fe82b + +info: + name: > + Slash Admin <= 3.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b0ff45d-0514-4090-bfa3-c3b75766ac61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slash-admin/" + google-query: inurl:"/wp-content/plugins/slash-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slash-admin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slash-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slash-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sliced-invoices-3f2e88483cb032a762f3e5f925264d0f.yaml b/nuclei-templates/cve-less/plugins/sliced-invoices-3f2e88483cb032a762f3e5f925264d0f.yaml new file mode 100644 index 0000000000..ce4d4c0a31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sliced-invoices-3f2e88483cb032a762f3e5f925264d0f.yaml @@ -0,0 +1,58 @@ +id: sliced-invoices-3f2e88483cb032a762f3e5f925264d0f + +info: + name: > + Sliced Invoices < 3.8.4 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ff96c12-1388-48a9-adf4-feca77a37ba7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sliced-invoices/" + google-query: inurl:"/wp-content/plugins/sliced-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sliced-invoices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sliced-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sliced-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sliced-invoices-3f5afe1c06de95e459f12d16b7792b0b.yaml b/nuclei-templates/cve-less/plugins/sliced-invoices-3f5afe1c06de95e459f12d16b7792b0b.yaml new file mode 100644 index 0000000000..c36c9ebde6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sliced-invoices-3f5afe1c06de95e459f12d16b7792b0b.yaml @@ -0,0 +1,58 @@ +id: sliced-invoices-3f5afe1c06de95e459f12d16b7792b0b + +info: + name: > + Sliced Invoices <= 3.9.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c17d7fba-7b98-4a7a-a35e-78f16be81aca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sliced-invoices/" + google-query: inurl:"/wp-content/plugins/sliced-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sliced-invoices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sliced-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sliced-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sliced-invoices-65575bb9311bc9f57fa766150b890bbc.yaml b/nuclei-templates/cve-less/plugins/sliced-invoices-65575bb9311bc9f57fa766150b890bbc.yaml new file mode 100644 index 0000000000..1fb527812c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sliced-invoices-65575bb9311bc9f57fa766150b890bbc.yaml @@ -0,0 +1,58 @@ +id: sliced-invoices-65575bb9311bc9f57fa766150b890bbc + +info: + name: > + Sliced Invoices <= 3.8.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0e70739-88c2-498e-b96c-1f27b8641cb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sliced-invoices/" + google-query: inurl:"/wp-content/plugins/sliced-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sliced-invoices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sliced-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sliced-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slicewp-17722d2484373a19ea1df8b15b8f0eea.yaml b/nuclei-templates/cve-less/plugins/slicewp-17722d2484373a19ea1df8b15b8f0eea.yaml new file mode 100644 index 0000000000..fbf7b30df3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slicewp-17722d2484373a19ea1df8b15b8f0eea.yaml @@ -0,0 +1,58 @@ +id: slicewp-17722d2484373a19ea1df8b15b8f0eea + +info: + name: > + WordPress Affiliates Plugin — SliceWP Affiliates <= 1.0.45 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8461a10-44e1-437a-ad6c-7107aeb66124?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slicewp/" + google-query: inurl:"/wp-content/plugins/slicewp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slicewp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slicewp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slicewp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slicewp-1e57a0095a9d05c5ba61b4bee5ed304a.yaml b/nuclei-templates/cve-less/plugins/slicewp-1e57a0095a9d05c5ba61b4bee5ed304a.yaml new file mode 100644 index 0000000000..d0853f4dad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slicewp-1e57a0095a9d05c5ba61b4bee5ed304a.yaml @@ -0,0 +1,58 @@ +id: slicewp-1e57a0095a9d05c5ba61b4bee5ed304a + +info: + name: > + WordPress Affiliates Plugin — SliceWP Affiliates <= 1.1.10 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f79fe15-65a1-44ab-a43e-1410ce1f1d77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slicewp/" + google-query: inurl:"/wp-content/plugins/slicewp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slicewp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slicewp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slicewp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slick-contact-forms-5e71c24603564ca342c0b82fb64d9b20.yaml b/nuclei-templates/cve-less/plugins/slick-contact-forms-5e71c24603564ca342c0b82fb64d9b20.yaml new file mode 100644 index 0000000000..368a9f6b78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slick-contact-forms-5e71c24603564ca342c0b82fb64d9b20.yaml @@ -0,0 +1,58 @@ +id: slick-contact-forms-5e71c24603564ca342c0b82fb64d9b20 + +info: + name: > + Slick Contact Forms <= 1.3.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22c63226-2bc6-40be-a5d1-1bd169fc78b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slick-contact-forms/" + google-query: inurl:"/wp-content/plugins/slick-contact-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slick-contact-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slick-contact-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slick-contact-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slick-popup-f2cee4c0f9afdf3e98814a937701d9b0.yaml b/nuclei-templates/cve-less/plugins/slick-popup-f2cee4c0f9afdf3e98814a937701d9b0.yaml new file mode 100644 index 0000000000..8b8fcac69a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slick-popup-f2cee4c0f9afdf3e98814a937701d9b0.yaml @@ -0,0 +1,58 @@ +id: slick-popup-f2cee4c0f9afdf3e98814a937701d9b0 + +info: + name: > + Slick Popup <= 1.7.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b16cf2-7e29-47c5-921e-188e2db33084?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slick-popup/" + google-query: inurl:"/wp-content/plugins/slick-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slick-popup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slick-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slick-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slick-popup-fe295018c777f28527f026c1db66229d.yaml b/nuclei-templates/cve-less/plugins/slick-popup-fe295018c777f28527f026c1db66229d.yaml new file mode 100644 index 0000000000..dca6616a11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slick-popup-fe295018c777f28527f026c1db66229d.yaml @@ -0,0 +1,58 @@ +id: slick-popup-fe295018c777f28527f026c1db66229d + +info: + name: > + Slick Popup: Contact Form 7 Popup Plugin <= 1.7.14 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54019f42-488d-484f-b34e-2b5bd5b0a1dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slick-popup/" + google-query: inurl:"/wp-content/plugins/slick-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slick-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slick-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slick-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slick-social-share-buttons-40d20dcfc0a9c20d06ce00b51231e085.yaml b/nuclei-templates/cve-less/plugins/slick-social-share-buttons-40d20dcfc0a9c20d06ce00b51231e085.yaml new file mode 100644 index 0000000000..94d1c9c8f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slick-social-share-buttons-40d20dcfc0a9c20d06ce00b51231e085.yaml @@ -0,0 +1,58 @@ +id: slick-social-share-buttons-40d20dcfc0a9c20d06ce00b51231e085 + +info: + name: > + Slick Social Share Buttons <= 2.4.11 - Authenticated (Subscriber+) Arbitrary Option Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79a5c01d-3867-4b1e-b0ba-9a802f0bed92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slick-social-share-buttons/" + google-query: inurl:"/wp-content/plugins/slick-social-share-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slick-social-share-buttons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slick-social-share-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slick-social-share-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slicknav-mobile-menu-5644317bfa18cf11b8235cb40790b4ed.yaml b/nuclei-templates/cve-less/plugins/slicknav-mobile-menu-5644317bfa18cf11b8235cb40790b4ed.yaml new file mode 100644 index 0000000000..5b70d09db5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slicknav-mobile-menu-5644317bfa18cf11b8235cb40790b4ed.yaml @@ -0,0 +1,58 @@ +id: slicknav-mobile-menu-5644317bfa18cf11b8235cb40790b4ed + +info: + name: > + SlickNav Mobile Menu <= 1.9.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce9aa906-72be-4551-9850-76f0adb6da97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slicknav-mobile-menu/" + google-query: inurl:"/wp-content/plugins/slicknav-mobile-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slicknav-mobile-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slicknav-mobile-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slicknav-mobile-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slickquiz-3395165ceb6b70322e35bead04697388.yaml b/nuclei-templates/cve-less/plugins/slickquiz-3395165ceb6b70322e35bead04697388.yaml new file mode 100644 index 0000000000..a9f7038ffa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slickquiz-3395165ceb6b70322e35bead04697388.yaml @@ -0,0 +1,58 @@ +id: slickquiz-3395165ceb6b70322e35bead04697388 + +info: + name: > + SlickQuiz <= 1.3.7.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd6df4fa-01b8-460f-b414-bb07fbc0436a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slickquiz/" + google-query: inurl:"/wp-content/plugins/slickquiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slickquiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slickquiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slickquiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slickquiz-53a30d941da402857e0ee8cdb2011b69.yaml b/nuclei-templates/cve-less/plugins/slickquiz-53a30d941da402857e0ee8cdb2011b69.yaml new file mode 100644 index 0000000000..63ec5f14bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slickquiz-53a30d941da402857e0ee8cdb2011b69.yaml @@ -0,0 +1,58 @@ +id: slickquiz-53a30d941da402857e0ee8cdb2011b69 + +info: + name: > + SlickQuiz <= 1.3.7.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57e724ac-8e7d-45ec-9f41-4303ea6c5d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slickquiz/" + google-query: inurl:"/wp-content/plugins/slickquiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slickquiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slickquiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slickquiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slickr-flickr-46b167768e3cac0676fa19e5201075cc.yaml b/nuclei-templates/cve-less/plugins/slickr-flickr-46b167768e3cac0676fa19e5201075cc.yaml new file mode 100644 index 0000000000..edb5963659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slickr-flickr-46b167768e3cac0676fa19e5201075cc.yaml @@ -0,0 +1,58 @@ +id: slickr-flickr-46b167768e3cac0676fa19e5201075cc + +info: + name: > + Slickr Flickr <= 2.8.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86d3ff76-49be-4517-a62e-7522e26479b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slickr-flickr/" + google-query: inurl:"/wp-content/plugins/slickr-flickr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slickr-flickr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slickr-flickr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slickr-flickr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slide-anything-125fc22aa1fac173aaf79b805fc0dafc.yaml b/nuclei-templates/cve-less/plugins/slide-anything-125fc22aa1fac173aaf79b805fc0dafc.yaml new file mode 100644 index 0000000000..f4675a5192 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slide-anything-125fc22aa1fac173aaf79b805fc0dafc.yaml @@ -0,0 +1,58 @@ +id: slide-anything-125fc22aa1fac173aaf79b805fc0dafc + +info: + name: > + Slide Anything – Responsive Content / HTML Slider and Carousel <= 2.3.46 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b31a54f1-de87-49ac-bce1-e0ea295af325?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slide-anything/" + google-query: inurl:"/wp-content/plugins/slide-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slide-anything,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slide-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slide-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slide-anything-96440e1a43df69d4a2a108bd78a1d55e.yaml b/nuclei-templates/cve-less/plugins/slide-anything-96440e1a43df69d4a2a108bd78a1d55e.yaml new file mode 100644 index 0000000000..d73b6a54a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slide-anything-96440e1a43df69d4a2a108bd78a1d55e.yaml @@ -0,0 +1,58 @@ +id: slide-anything-96440e1a43df69d4a2a108bd78a1d55e + +info: + name: > + Slide Anything <= 2.4.7 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/130b069d-d224-44af-b2b4-26be7e081f6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slide-anything/" + google-query: inurl:"/wp-content/plugins/slide-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slide-anything,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slide-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slide-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slide-anything-dba115ec2b96e48bab904dedd2103380.yaml b/nuclei-templates/cve-less/plugins/slide-anything-dba115ec2b96e48bab904dedd2103380.yaml new file mode 100644 index 0000000000..5e3cbb5bbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slide-anything-dba115ec2b96e48bab904dedd2103380.yaml @@ -0,0 +1,58 @@ +id: slide-anything-dba115ec2b96e48bab904dedd2103380 + +info: + name: > + Slide Anything – Responsive Content / HTML Slider and Carousel <= 2.3.43 - Editor+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a6e9b7-5e74-4a45-9e6e-5781bf2a4a07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slide-anything/" + google-query: inurl:"/wp-content/plugins/slide-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slide-anything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slide-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slide-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slide-show-pro-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/slide-show-pro-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..55ecc33327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slide-show-pro-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: slide-show-pro-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slide-show-pro/" + google-query: inurl:"/wp-content/plugins/slide-show-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slide-show-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slide-show-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slide-show-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slidedeck-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/slidedeck-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3ce34c7dfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slidedeck-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: slidedeck-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slidedeck/" + google-query: inurl:"/wp-content/plugins/slidedeck/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slidedeck,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slidedeck/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slidedeck" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slidedeck2-5efee1538ea17e01965c435ea80717db.yaml b/nuclei-templates/cve-less/plugins/slidedeck2-5efee1538ea17e01965c435ea80717db.yaml new file mode 100644 index 0000000000..b6c9143c75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slidedeck2-5efee1538ea17e01965c435ea80717db.yaml @@ -0,0 +1,58 @@ +id: slidedeck2-5efee1538ea17e01965c435ea80717db + +info: + name: > + SlideDeck 2 <= 2.3.3 - Local/Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f3ed0f0-897d-47f4-acdc-b483838af4bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slidedeck2/" + google-query: inurl:"/wp-content/plugins/slidedeck2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slidedeck2,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slidedeck2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slidedeck2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideonline-09f92d564944a33a7811dc40429fdb32.yaml b/nuclei-templates/cve-less/plugins/slideonline-09f92d564944a33a7811dc40429fdb32.yaml new file mode 100644 index 0000000000..4b049c1664 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideonline-09f92d564944a33a7811dc40429fdb32.yaml @@ -0,0 +1,58 @@ +id: slideonline-09f92d564944a33a7811dc40429fdb32 + +info: + name: > + SlideOnline <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/778e2191-d764-44a1-9f52-9698e9183fd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideonline/" + google-query: inurl:"/wp-content/plugins/slideonline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideonline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideonline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideonline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideoptinprox-5b04e98d5ed9360b3ebe4e58880d2319.yaml b/nuclei-templates/cve-less/plugins/slideoptinprox-5b04e98d5ed9360b3ebe4e58880d2319.yaml new file mode 100644 index 0000000000..4cc598a4aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideoptinprox-5b04e98d5ed9360b3ebe4e58880d2319.yaml @@ -0,0 +1,58 @@ +id: slideoptinprox-5b04e98d5ed9360b3ebe4e58880d2319 + +info: + name: > + Slideoptinprox (Unspecified Version) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3bdccfd-6b82-4a76-81f1-eb0f6d62d413?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideoptinprox/" + google-query: inurl:"/wp-content/plugins/slideoptinprox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideoptinprox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideoptinprox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideoptinprox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-by-supsystic-5a964b37d1f769e559a3b5969ea09bec.yaml b/nuclei-templates/cve-less/plugins/slider-by-supsystic-5a964b37d1f769e559a3b5969ea09bec.yaml new file mode 100644 index 0000000000..dde7d03dfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-by-supsystic-5a964b37d1f769e559a3b5969ea09bec.yaml @@ -0,0 +1,58 @@ +id: slider-by-supsystic-5a964b37d1f769e559a3b5969ea09bec + +info: + name: > + Slider by Supsystic <= 1.8.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eccf601-ad95-4fb5-a3a6-e916df6a6b56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-by-supsystic/" + google-query: inurl:"/wp-content/plugins/slider-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-by-supsystic-63a1aadd7fd62f660af4d37169d1f541.yaml b/nuclei-templates/cve-less/plugins/slider-by-supsystic-63a1aadd7fd62f660af4d37169d1f541.yaml new file mode 100644 index 0000000000..ad8f6f48b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-by-supsystic-63a1aadd7fd62f660af4d37169d1f541.yaml @@ -0,0 +1,58 @@ +id: slider-by-supsystic-63a1aadd7fd62f660af4d37169d1f541 + +info: + name: > + Slider by Supsystic <= 1.8.10 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14ff5609-2345-4073-8239-0ce27fa0957c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-by-supsystic/" + google-query: inurl:"/wp-content/plugins/slider-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-by-supsystic-8e2647d10010d639fca262268ba703d9.yaml b/nuclei-templates/cve-less/plugins/slider-by-supsystic-8e2647d10010d639fca262268ba703d9.yaml new file mode 100644 index 0000000000..a3aaead14e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-by-supsystic-8e2647d10010d639fca262268ba703d9.yaml @@ -0,0 +1,58 @@ +id: slider-by-supsystic-8e2647d10010d639fca262268ba703d9 + +info: + name: > + Slider by Supsystic <= 1.8.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/548731d5-078b-45a5-bcc5-9789b41ead44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-by-supsystic/" + google-query: inurl:"/wp-content/plugins/slider-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-by-supsystic-d94ab49d4d8adfed309a34be052981f9.yaml b/nuclei-templates/cve-less/plugins/slider-by-supsystic-d94ab49d4d8adfed309a34be052981f9.yaml new file mode 100644 index 0000000000..de236cf4f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-by-supsystic-d94ab49d4d8adfed309a34be052981f9.yaml @@ -0,0 +1,58 @@ +id: slider-by-supsystic-d94ab49d4d8adfed309a34be052981f9 + +info: + name: > + Slider by Supsystic <= 1.8.10 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/717e77b7-8b42-4fca-b288-2415db2d68e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-by-supsystic/" + google-query: inurl:"/wp-content/plugins/slider-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-factory-b04b6aa85a76ebddc71c9e203d10773d.yaml b/nuclei-templates/cve-less/plugins/slider-factory-b04b6aa85a76ebddc71c9e203d10773d.yaml new file mode 100644 index 0000000000..45435b5a40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-factory-b04b6aa85a76ebddc71c9e203d10773d.yaml @@ -0,0 +1,58 @@ +id: slider-factory-b04b6aa85a76ebddc71c9e203d10773d + +info: + name: > + Responsive Image Slider, Photo Gallery And Carousel < 1.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f00dfd7-3194-4459-b895-f16d3aa8d66f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-factory/" + google-query: inurl:"/wp-content/plugins/slider-factory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-factory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-factory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-factory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-factory-d5d65492c7b3878ca773e2f63b4a08a2.yaml b/nuclei-templates/cve-less/plugins/slider-factory-d5d65492c7b3878ca773e2f63b4a08a2.yaml new file mode 100644 index 0000000000..12fb7cd427 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-factory-d5d65492c7b3878ca773e2f63b4a08a2.yaml @@ -0,0 +1,58 @@ +id: slider-factory-d5d65492c7b3878ca773e2f63b4a08a2 + +info: + name: > + Responsive Image Slider, Photo Gallery And Carousel < 1.3.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c148123-9da3-4384-8aec-4ee71cb05e01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-factory/" + google-query: inurl:"/wp-content/plugins/slider-factory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-factory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-factory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-factory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-hero-3adbda03e672466ae4cf2477d48f1715.yaml b/nuclei-templates/cve-less/plugins/slider-hero-3adbda03e672466ae4cf2477d48f1715.yaml new file mode 100644 index 0000000000..18b8a298c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-hero-3adbda03e672466ae4cf2477d48f1715.yaml @@ -0,0 +1,58 @@ +id: slider-hero-3adbda03e672466ae4cf2477d48f1715 + +info: + name: > + Slider Hero <= 8.6.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41428fa7-455b-44be-8ec1-977e8cf8a303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-hero/" + google-query: inurl:"/wp-content/plugins/slider-hero/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-hero,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-hero/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-hero" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-hero-4fef6f3c1b2c07adc38d4a7abbb8304a.yaml b/nuclei-templates/cve-less/plugins/slider-hero-4fef6f3c1b2c07adc38d4a7abbb8304a.yaml new file mode 100644 index 0000000000..dc4660110b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-hero-4fef6f3c1b2c07adc38d4a7abbb8304a.yaml @@ -0,0 +1,58 @@ +id: slider-hero-4fef6f3c1b2c07adc38d4a7abbb8304a + +info: + name: > + Slider Hero with Animation, Video Background & Intro Maker <= 8.2.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5118ed50-d7be-4606-af9d-18b63359956c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-hero/" + google-query: inurl:"/wp-content/plugins/slider-hero/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-hero,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-hero/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-hero" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-hero-53fef4883b3ae390bd3ce74f9e9ddf6a.yaml b/nuclei-templates/cve-less/plugins/slider-hero-53fef4883b3ae390bd3ce74f9e9ddf6a.yaml new file mode 100644 index 0000000000..b2139fec65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-hero-53fef4883b3ae390bd3ce74f9e9ddf6a.yaml @@ -0,0 +1,58 @@ +id: slider-hero-53fef4883b3ae390bd3ce74f9e9ddf6a + +info: + name: > + Slider Hero <= 8.4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2df8ba02-30b0-49af-82cf-a0d2fd994ea2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-hero/" + google-query: inurl:"/wp-content/plugins/slider-hero/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-hero,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-hero/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-hero" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-hero-f2a7736ebfea66ac36ad813725de381e.yaml b/nuclei-templates/cve-less/plugins/slider-hero-f2a7736ebfea66ac36ad813725de381e.yaml new file mode 100644 index 0000000000..fdf31b4bd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-hero-f2a7736ebfea66ac36ad813725de381e.yaml @@ -0,0 +1,58 @@ +id: slider-hero-f2a7736ebfea66ac36ad813725de381e + +info: + name: > + Slider Hero <= 8.2.0 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d195cd-4df8-4926-b834-d695fc05f81d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-hero/" + google-query: inurl:"/wp-content/plugins/slider-hero/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-hero,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-hero/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-hero" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-image-d1752e9520f041ace82927039ac74f84.yaml b/nuclei-templates/cve-less/plugins/slider-image-d1752e9520f041ace82927039ac74f84.yaml new file mode 100644 index 0000000000..2845646165 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-image-d1752e9520f041ace82927039ac74f84.yaml @@ -0,0 +1,58 @@ +id: slider-image-d1752e9520f041ace82927039ac74f84 + +info: + name: > + Responsive Slider – Image Slider – Slideshow for WordPress <= 2.8.6 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dc548cd-16ea-47ac-b4be-eecaf4799690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-image/" + google-query: inurl:"/wp-content/plugins/slider-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-image,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-image-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml b/nuclei-templates/cve-less/plugins/slider-image-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml new file mode 100644 index 0000000000..41e2747114 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-image-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml @@ -0,0 +1,58 @@ +id: slider-image-f1a34dd1cf3f3d82d7aaeb96b1997e29 + +info: + name: > + Responsive Slider – Image Slider – Slideshow for WordPress < 2.7.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac6f7b03-6527-4d10-9320-4f94ed386f54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-image/" + google-query: inurl:"/wp-content/plugins/slider-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-image,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-images-ed271342f2446f50a4b4b39df1d986d6.yaml b/nuclei-templates/cve-less/plugins/slider-images-ed271342f2446f50a4b4b39df1d986d6.yaml new file mode 100644 index 0000000000..34b3c66e29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-images-ed271342f2446f50a4b4b39df1d986d6.yaml @@ -0,0 +1,58 @@ +id: slider-images-ed271342f2446f50a4b4b39df1d986d6 + +info: + name: > + Slider Carousel – Responsive Image Slider <= 1.5.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c32f1c6a-cf65-419e-bfcd-48ac8e3735bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-images/" + google-query: inurl:"/wp-content/plugins/slider-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-responsive-slideshow-091efbe9d1188b98a534caa4402e018b.yaml b/nuclei-templates/cve-less/plugins/slider-responsive-slideshow-091efbe9d1188b98a534caa4402e018b.yaml new file mode 100644 index 0000000000..9b245f9452 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-responsive-slideshow-091efbe9d1188b98a534caa4402e018b.yaml @@ -0,0 +1,58 @@ +id: slider-responsive-slideshow-091efbe9d1188b98a534caa4402e018b + +info: + name: > + Slider Responsive Slideshow – Image slider, Gallery slideshow <= 1.3.8 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d35266cd-41e6-4358-afaa-bc008962f2e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-responsive-slideshow/" + google-query: inurl:"/wp-content/plugins/slider-responsive-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-responsive-slideshow,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-responsive-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-responsive-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-slideshow-4b10785e370a78ae1450447cedf61d9b.yaml b/nuclei-templates/cve-less/plugins/slider-slideshow-4b10785e370a78ae1450447cedf61d9b.yaml new file mode 100644 index 0000000000..413354d916 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-slideshow-4b10785e370a78ae1450447cedf61d9b.yaml @@ -0,0 +1,58 @@ +id: slider-slideshow-4b10785e370a78ae1450447cedf61d9b + +info: + name: > + Layer Slider <= 1.1.9.7 - Cross-Site Request Forgery via save_slide_ajax + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ad366f1-2369-4fb2-aeda-301c85cf6801?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-slideshow/" + google-query: inurl:"/wp-content/plugins/slider-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-slideshow-9cf47a9aaadc1341f9d7d43e1e7e02f2.yaml b/nuclei-templates/cve-less/plugins/slider-slideshow-9cf47a9aaadc1341f9d7d43e1e7e02f2.yaml new file mode 100644 index 0000000000..7d5885e5da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-slideshow-9cf47a9aaadc1341f9d7d43e1e7e02f2.yaml @@ -0,0 +1,58 @@ +id: slider-slideshow-9cf47a9aaadc1341f9d7d43e1e7e02f2 + +info: + name: > + Layer Slider <= 1.1.9.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5ac3714-27f1-4258-a1ab-12b969b31793?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-slideshow/" + google-query: inurl:"/wp-content/plugins/slider-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-slideshow-ba96af4ca3ffeaa3bcc3879d978146cb.yaml b/nuclei-templates/cve-less/plugins/slider-slideshow-ba96af4ca3ffeaa3bcc3879d978146cb.yaml new file mode 100644 index 0000000000..8c335b6ee4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-slideshow-ba96af4ca3ffeaa3bcc3879d978146cb.yaml @@ -0,0 +1,58 @@ +id: slider-slideshow-ba96af4ca3ffeaa3bcc3879d978146cb + +info: + name: > + Layer Slider <= 1.1.9.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6df68d66-7294-4dff-8ba8-394932a64281?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-slideshow/" + google-query: inurl:"/wp-content/plugins/slider-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-video-93c0b4806bb82af1f99b4d0c878535e6.yaml b/nuclei-templates/cve-less/plugins/slider-video-93c0b4806bb82af1f99b4d0c878535e6.yaml new file mode 100644 index 0000000000..92c83f7dae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-video-93c0b4806bb82af1f99b4d0c878535e6.yaml @@ -0,0 +1,58 @@ +id: slider-video-93c0b4806bb82af1f99b4d0c878535e6 + +info: + name: > + Video Slider WordPress <= 1.4.6 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8be16fec-8961-49ad-ba2f-8bec70c33ec0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-video/" + google-query: inurl:"/wp-content/plugins/slider-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-video,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-wd-0f314421e3eb6001edc6ef983cf272a2.yaml b/nuclei-templates/cve-less/plugins/slider-wd-0f314421e3eb6001edc6ef983cf272a2.yaml new file mode 100644 index 0000000000..17d3931cdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-wd-0f314421e3eb6001edc6ef983cf272a2.yaml @@ -0,0 +1,58 @@ +id: slider-wd-0f314421e3eb6001edc6ef983cf272a2 + +info: + name: > + Slider by 10Web <= 1.2.35 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f90b6cdb-d929-493e-b078-4762b7e2f76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-wd/" + google-query: inurl:"/wp-content/plugins/slider-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-wd,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-wd-330b086d5a163173ce80e7bcf35592b2.yaml b/nuclei-templates/cve-less/plugins/slider-wd-330b086d5a163173ce80e7bcf35592b2.yaml new file mode 100644 index 0000000000..dc3183ba0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-wd-330b086d5a163173ce80e7bcf35592b2.yaml @@ -0,0 +1,58 @@ +id: slider-wd-330b086d5a163173ce80e7bcf35592b2 + +info: + name: > + Slider by 10Web <= 1.2.51 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a741446e-8600-4e02-af76-0d34a491bcfd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-wd/" + google-query: inurl:"/wp-content/plugins/slider-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-wd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-wd-3ca395cf4457963d99cc7df0953a3124.yaml b/nuclei-templates/cve-less/plugins/slider-wd-3ca395cf4457963d99cc7df0953a3124.yaml new file mode 100644 index 0000000000..90db888af4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-wd-3ca395cf4457963d99cc7df0953a3124.yaml @@ -0,0 +1,58 @@ +id: slider-wd-3ca395cf4457963d99cc7df0953a3124 + +info: + name: > + Sliderby10Web <= 1.2.52 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f3aec3a-c1d3-4f7f-9f45-7a3ec42ce260?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-wd/" + google-query: inurl:"/wp-content/plugins/slider-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-wd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slider-wd-f2f66b2c0dd30886e21fe41a945038db.yaml b/nuclei-templates/cve-less/plugins/slider-wd-f2f66b2c0dd30886e21fe41a945038db.yaml new file mode 100644 index 0000000000..5fa7c8a91e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slider-wd-f2f66b2c0dd30886e21fe41a945038db.yaml @@ -0,0 +1,58 @@ +id: slider-wd-f2f66b2c0dd30886e21fe41a945038db + +info: + name: > + Slider by 10Web – Responsive Image Slider <= 1.2.54 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d24c65b6-20da-4f17-be9f-b8fbf5e721e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slider-wd/" + google-query: inurl:"/wp-content/plugins/slider-wd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slider-wd,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slider-wd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slider-wd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.54') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sliderpro-55b1133e21935d007c80035f80fa6446.yaml b/nuclei-templates/cve-less/plugins/sliderpro-55b1133e21935d007c80035f80fa6446.yaml new file mode 100644 index 0000000000..8763d7ef59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sliderpro-55b1133e21935d007c80035f80fa6446.yaml @@ -0,0 +1,58 @@ +id: sliderpro-55b1133e21935d007c80035f80fa6446 + +info: + name: > + Slider Pro <= 4.8.6 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f813cb1a-5922-48a5-a026-66ec9aaac294?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sliderpro/" + google-query: inurl:"/wp-content/plugins/sliderpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sliderpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sliderpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sliderpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sliderspack-all-in-one-image-sliders-cabe168b618270b5c6e54c5ab98ed27e.yaml b/nuclei-templates/cve-less/plugins/sliderspack-all-in-one-image-sliders-cabe168b618270b5c6e54c5ab98ed27e.yaml new file mode 100644 index 0000000000..74689228f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sliderspack-all-in-one-image-sliders-cabe168b618270b5c6e54c5ab98ed27e.yaml @@ -0,0 +1,58 @@ +id: sliderspack-all-in-one-image-sliders-cabe168b618270b5c6e54c5ab98ed27e + +info: + name: > + Slider a SlidersPack <= 2.0.2 - Missing Authorization via wp_spaios_save_attachment_data + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb5cb7ce-127a-4f9a-b52e-1e957560ca55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sliderspack-all-in-one-image-sliders/" + google-query: inurl:"/wp-content/plugins/sliderspack-all-in-one-image-sliders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sliderspack-all-in-one-image-sliders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sliderspack-all-in-one-image-sliders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sliderspack-all-in-one-image-sliders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshare-9fb99305b4730cdc01315914158330a9.yaml b/nuclei-templates/cve-less/plugins/slideshare-9fb99305b4730cdc01315914158330a9.yaml new file mode 100644 index 0000000000..7f2a89477a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshare-9fb99305b4730cdc01315914158330a9.yaml @@ -0,0 +1,58 @@ +id: slideshare-9fb99305b4730cdc01315914158330a9 + +info: + name: > + SlideShare for WordPress by Yoast <= 1.9.1 - Admin+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78f3e63b-1d60-47bb-9366-dbdd81d6ed19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshare/" + google-query: inurl:"/wp-content/plugins/slideshare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-ck-315a1c5d119a58cae4d57802c27a1504.yaml b/nuclei-templates/cve-less/plugins/slideshow-ck-315a1c5d119a58cae4d57802c27a1504.yaml new file mode 100644 index 0000000000..cc1cf43f93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-ck-315a1c5d119a58cae4d57802c27a1504.yaml @@ -0,0 +1,58 @@ +id: slideshow-ck-315a1c5d119a58cae4d57802c27a1504 + +info: + name: > + Slideshow CK <= 1.4.9 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b0cc3a0-5a80-4a56-abeb-13046d9eaf3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-ck/" + google-query: inurl:"/wp-content/plugins/slideshow-ck/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-ck,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-ck/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-ck" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-073c0ab3bbb78673d0076b71747b0b85.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-073c0ab3bbb78673d0076b71747b0b85.yaml new file mode 100644 index 0000000000..3804a91ead --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-073c0ab3bbb78673d0076b71747b0b85.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-073c0ab3bbb78673d0076b71747b0b85 + +info: + name: > + Slideshow Gallery LITE <= 1.7.6 - Cross-Site Request Forgery via admin_galleries + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a598274-3c67-4751-94d6-49abed38422c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-0c2f46d7d5137da04a7f7e4fef5f160b.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-0c2f46d7d5137da04a7f7e4fef5f160b.yaml new file mode 100644 index 0000000000..7bf367d662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-0c2f46d7d5137da04a7f7e4fef5f160b.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-0c2f46d7d5137da04a7f7e4fef5f160b + +info: + name: > + Slideshow Gallery <= 1.5.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18aa817d-80e0-4c6f-852f-c8a91c9507c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-173ff175ba6504a9e007b9120074cdb1.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-173ff175ba6504a9e007b9120074cdb1.yaml new file mode 100644 index 0000000000..f1e943bf2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-173ff175ba6504a9e007b9120074cdb1.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-173ff175ba6504a9e007b9120074cdb1 + +info: + name: > + Slideshow Gallery < 1.7.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1eec01c-7f54-4e90-a943-c50b8ab79b22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-2-000c49df1eb1fffb19ba2879f7922470.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-2-000c49df1eb1fffb19ba2879f7922470.yaml new file mode 100644 index 0000000000..a111b4a23f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-2-000c49df1eb1fffb19ba2879f7922470.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-2-000c49df1eb1fffb19ba2879f7922470 + +info: + name: > + Slideshow Gallery <= 1.1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/396a7101-e6da-49c1-87a3-25792f3a7b76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery-2/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery-2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery-2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery-2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery-2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-3930a563943aaf08712d2221306b606c.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-3930a563943aaf08712d2221306b606c.yaml new file mode 100644 index 0000000000..04874d094c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-3930a563943aaf08712d2221306b606c.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-3930a563943aaf08712d2221306b606c + +info: + name: > + Slideshow Gallery <= 1.6.5 - Cross-Site Scripting via method + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5ba2813-56ff-45d0-966a-f83da862ec13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-3f761f29ded0c3fd592cbc7b4d2d4ba7.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-3f761f29ded0c3fd592cbc7b4d2d4ba7.yaml new file mode 100644 index 0000000000..cbbc19754d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-3f761f29ded0c3fd592cbc7b4d2d4ba7.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-3f761f29ded0c3fd592cbc7b4d2d4ba7 + +info: + name: > + Slideshow Gallery <= 1.7.8 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23d5e2ba-3a8a-4ded-aba9-fa0a7228a398?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-44893e4f1aa00774102d61f70312168f.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-44893e4f1aa00774102d61f70312168f.yaml new file mode 100644 index 0000000000..2ede9647bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-44893e4f1aa00774102d61f70312168f.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-44893e4f1aa00774102d61f70312168f + +info: + name: > + Slideshow Gallery <= 1.5.3.1 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01762804-df33-4c4d-b8f6-d94a1e5b5fc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-4dd9a3ba0bea201c247a65cf330c4a19.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-4dd9a3ba0bea201c247a65cf330c4a19.yaml new file mode 100644 index 0000000000..ea8137e573 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-4dd9a3ba0bea201c247a65cf330c4a19.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-4dd9a3ba0bea201c247a65cf330c4a19 + +info: + name: > + Slideshow Gallery <= 1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc9c0ed-a77c-4ad8-8e6e-75c1a2998fe6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-5e35179f25bd306b0effea20785c4fdf.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-5e35179f25bd306b0effea20785c4fdf.yaml new file mode 100644 index 0000000000..f1d60304bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-5e35179f25bd306b0effea20785c4fdf.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-5e35179f25bd306b0effea20785c4fdf + +info: + name: > + Slideshow Gallery < 1.4.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/068cb509-7451-4f2f-a65c-ed7686c6f6d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-710832b220893c2e7b26cd41c7676342.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-710832b220893c2e7b26cd41c7676342.yaml new file mode 100644 index 0000000000..cf56f90d38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-710832b220893c2e7b26cd41c7676342.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-710832b220893c2e7b26cd41c7676342 + +info: + name: > + Slideshow Gallery LITE <= 1.7.6 - Cross-Site Request Forgery via admin_slides + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/164ec659-e1a6-4267-b6e9-4e37a402e503?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-9ed3ad19217255e206c74e32650683d5.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-9ed3ad19217255e206c74e32650683d5.yaml new file mode 100644 index 0000000000..68c83948db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-9ed3ad19217255e206c74e32650683d5.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-9ed3ad19217255e206c74e32650683d5 + +info: + name: > + Slideshow Gallery <= 1.7.8 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6ebb590-1291-45dc-818a-258143a2d9a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-a6e5defdd0b61862c997e167d9ee2576.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-a6e5defdd0b61862c997e167d9ee2576.yaml new file mode 100644 index 0000000000..e9fcd3bc3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-a6e5defdd0b61862c997e167d9ee2576.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-a6e5defdd0b61862c997e167d9ee2576 + +info: + name: > + Slideshow Gallery LITE <= 1.7.6 - Authenticated(Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61b07604-b206-4f13-b25f-7a6d54236eb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-c799988a889ed03a659b8598e8dac08b.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-c799988a889ed03a659b8598e8dac08b.yaml new file mode 100644 index 0000000000..46a38eb600 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-c799988a889ed03a659b8598e8dac08b.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-c799988a889ed03a659b8598e8dac08b + +info: + name: > + Slideshow Gallery <= 1.6.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50c33c8d-4488-4f9e-bc58-21cb8cd679e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-ea214ec811be5112708a570a75f3ddc5.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-ea214ec811be5112708a570a75f3ddc5.yaml new file mode 100644 index 0000000000..b7ed0e7234 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-ea214ec811be5112708a570a75f3ddc5.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-ea214ec811be5112708a570a75f3ddc5 + +info: + name: > + Slideshow Gallery <= 1.6.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ffb31a5-a692-4817-ad46-cf804b97d480?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-f4f28ce30d47491a4cae733a861ef690.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-f4f28ce30d47491a4cae733a861ef690.yaml new file mode 100644 index 0000000000..b58bb5441c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-f4f28ce30d47491a4cae733a861ef690.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-f4f28ce30d47491a4cae733a861ef690 + +info: + name: > + Slideshow Gallery <= 1.7.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4aec0bf3-82d7-4479-8bd6-941404b6bd03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml new file mode 100644 index 0000000000..243744948e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-f81d8e9ecaded3d70e2eeaa0f98dacf3 + +info: + name: > + Slideshow Gallery <= 1.6.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15517a81-0913-4922-be2b-aaf9abc52a84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-gallery-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml b/nuclei-templates/cve-less/plugins/slideshow-gallery-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml new file mode 100644 index 0000000000..d6fc9570b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-gallery-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml @@ -0,0 +1,58 @@ +id: slideshow-gallery-ffb6abfc1462cb6dac9fb7d1f9f94e2a + +info: + name: > + Slideshow Gallery <= 1.6.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e8a881d-d6d0-4bcc-9894-286ce0468393?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-631caed2c41cece190cfd835b6648401.yaml b/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-631caed2c41cece190cfd835b6648401.yaml new file mode 100644 index 0000000000..49063d8f49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-631caed2c41cece190cfd835b6648401.yaml @@ -0,0 +1,58 @@ +id: slideshow-jquery-image-gallery-631caed2c41cece190cfd835b6648401 + +info: + name: > + Slideshow 2.2.8 - 2.2.21 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfa22747-b9f5-403e-81bb-87a593e603a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-jquery-image-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-jquery-image-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-jquery-image-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-jquery-image-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.2.8', '<= 2.2.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-74a8ac0075a235e0a0c14b0719aab19b.yaml b/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-74a8ac0075a235e0a0c14b0719aab19b.yaml new file mode 100644 index 0000000000..775dfe32af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-74a8ac0075a235e0a0c14b0719aab19b.yaml @@ -0,0 +1,58 @@ +id: slideshow-jquery-image-gallery-74a8ac0075a235e0a0c14b0719aab19b + +info: + name: > + Slideshow <= 2.3.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f7d7ceb-b6f0-4b63-93f7-632c13a6b496?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-jquery-image-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-jquery-image-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-jquery-image-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-jquery-image-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-f45ce441ba6fd10c3e2bec3c1e3949b8.yaml b/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-f45ce441ba6fd10c3e2bec3c1e3949b8.yaml new file mode 100644 index 0000000000..81de7ab58d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-jquery-image-gallery-f45ce441ba6fd10c3e2bec3c1e3949b8.yaml @@ -0,0 +1,58 @@ +id: slideshow-jquery-image-gallery-f45ce441ba6fd10c3e2bec3c1e3949b8 + +info: + name: > + Slideshow < 2.1.13 - Cross-Site Scripting and Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25762427-8d31-4fef-8b93-1065d15cd918?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-jquery-image-gallery/" + google-query: inurl:"/wp-content/plugins/slideshow-jquery-image-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-jquery-image-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-jquery-image-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-se-0d198fa5a9097295a41f947e62ed164f.yaml b/nuclei-templates/cve-less/plugins/slideshow-se-0d198fa5a9097295a41f947e62ed164f.yaml new file mode 100644 index 0000000000..7d9427c21f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-se-0d198fa5a9097295a41f947e62ed164f.yaml @@ -0,0 +1,58 @@ +id: slideshow-se-0d198fa5a9097295a41f947e62ed164f + +info: + name: > + Slideshow SE <= 2.5.5 - Authenticated (Subscriber+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b5e37b4-4a7e-41a1-b1ef-0c69c8658c58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-se/" + google-query: inurl:"/wp-content/plugins/slideshow-se/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-se,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-se/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-se" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slideshow-se-4c2a731e32a3d9201839b73fb37eef51.yaml b/nuclei-templates/cve-less/plugins/slideshow-se-4c2a731e32a3d9201839b73fb37eef51.yaml new file mode 100644 index 0000000000..74c438d702 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slideshow-se-4c2a731e32a3d9201839b73fb37eef51.yaml @@ -0,0 +1,58 @@ +id: slideshow-se-4c2a731e32a3d9201839b73fb37eef51 + +info: + name: > + Slideshow SE <= 2.5.5 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/047aa84b-6e6a-4975-8a3f-3f8b4518704e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slideshow-se/" + google-query: inurl:"/wp-content/plugins/slideshow-se/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slideshow-se,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slideshow-se/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slideshow-se" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sliding-social-icons-40737c0a7a095d43140be7cd03a62330.yaml b/nuclei-templates/cve-less/plugins/sliding-social-icons-40737c0a7a095d43140be7cd03a62330.yaml new file mode 100644 index 0000000000..2fe9e583fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sliding-social-icons-40737c0a7a095d43140be7cd03a62330.yaml @@ -0,0 +1,58 @@ +id: sliding-social-icons-40737c0a7a095d43140be7cd03a62330 + +info: + name: > + Sliding Social Icons <= 1.61 - Cross-Site Request Forgery and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46039930-377e-4adb-8d96-09ebf220b4a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sliding-social-icons/" + google-query: inurl:"/wp-content/plugins/sliding-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sliding-social-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sliding-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sliding-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/slivery-extender-5621a7def81227d66a22e352451dbd2f.yaml b/nuclei-templates/cve-less/plugins/slivery-extender-5621a7def81227d66a22e352451dbd2f.yaml new file mode 100644 index 0000000000..7d4498b69c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/slivery-extender-5621a7def81227d66a22e352451dbd2f.yaml @@ -0,0 +1,58 @@ +id: slivery-extender-5621a7def81227d66a22e352451dbd2f + +info: + name: > + Slivery Extender <= 1.0.2 - Authenticated(Contributor+) Remote Code Execution via shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceb25a7b-da93-41eb-bae7-8bffa96f7a1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/slivery-extender/" + google-query: inurl:"/wp-content/plugins/slivery-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,slivery-extender,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/slivery-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slivery-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sloth-logo-customizer-cd301beffca3145a1148fa46876e8ecb.yaml b/nuclei-templates/cve-less/plugins/sloth-logo-customizer-cd301beffca3145a1148fa46876e8ecb.yaml new file mode 100644 index 0000000000..fee6bcdde2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sloth-logo-customizer-cd301beffca3145a1148fa46876e8ecb.yaml @@ -0,0 +1,58 @@ +id: sloth-logo-customizer-cd301beffca3145a1148fa46876e8ecb + +info: + name: > + Sloth Logo Customizer <= 2.0.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/974f14e8-1a59-4ba5-8806-b4d8b135315e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sloth-logo-customizer/" + google-query: inurl:"/wp-content/plugins/sloth-logo-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sloth-logo-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sloth-logo-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sloth-logo-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-app-banner-4d6efde8bb592c906d33a37bc632b9bf.yaml b/nuclei-templates/cve-less/plugins/smart-app-banner-4d6efde8bb592c906d33a37bc632b9bf.yaml new file mode 100644 index 0000000000..f705dbbadc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-app-banner-4d6efde8bb592c906d33a37bc632b9bf.yaml @@ -0,0 +1,58 @@ +id: smart-app-banner-4d6efde8bb592c906d33a37bc632b9bf + +info: + name: > + Smart App Banner <= 1.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c7497fc-e42c-49a6-99ee-6ec774cc4617?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-app-banner/" + google-query: inurl:"/wp-content/plugins/smart-app-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-app-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-app-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-app-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-app-banner-bc7de60f28ed50bda8c32e87282861c6.yaml b/nuclei-templates/cve-less/plugins/smart-app-banner-bc7de60f28ed50bda8c32e87282861c6.yaml new file mode 100644 index 0000000000..5fd0df0794 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-app-banner-bc7de60f28ed50bda8c32e87282861c6.yaml @@ -0,0 +1,58 @@ +id: smart-app-banner-bc7de60f28ed50bda8c32e87282861c6 + +info: + name: > + Smart App Banner <= 1.1.2 - Cross-Site Request Forgery via wsl_smart_app_banner_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f71453d9-8bbf-4546-b69f-e86cc41da9bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-app-banner/" + google-query: inurl:"/wp-content/plugins/smart-app-banner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-app-banner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-app-banner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-app-banner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-cookie-kit-66eed7c58e1298fa04981c6c1b2ea3cc.yaml b/nuclei-templates/cve-less/plugins/smart-cookie-kit-66eed7c58e1298fa04981c6c1b2ea3cc.yaml new file mode 100644 index 0000000000..6043d2d2d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-cookie-kit-66eed7c58e1298fa04981c6c1b2ea3cc.yaml @@ -0,0 +1,58 @@ +id: smart-cookie-kit-66eed7c58e1298fa04981c6c1b2ea3cc + +info: + name: > + Smart Cookie Kit <= 2.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b726e21-ff76-43ea-beb1-f68e94d3b7a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-cookie-kit/" + google-query: inurl:"/wp-content/plugins/smart-cookie-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-cookie-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-cookie-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-cookie-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-custom-fields-0d0a2f550b1652e990ebb3d0da6393ae.yaml b/nuclei-templates/cve-less/plugins/smart-custom-fields-0d0a2f550b1652e990ebb3d0da6393ae.yaml new file mode 100644 index 0000000000..13e06138ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-custom-fields-0d0a2f550b1652e990ebb3d0da6393ae.yaml @@ -0,0 +1,58 @@ +id: smart-custom-fields-0d0a2f550b1652e990ebb3d0da6393ae + +info: + name: > + Smart Custom Fields <= 4.2.2 - Missing Authorization to Authenticated (Subscriber+) Post Content Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e966a266-4265-4a72-8a50-e872805219a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-custom-fields/" + google-query: inurl:"/wp-content/plugins/smart-custom-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-custom-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-custom-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-custom-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-donations-183ebb9bdb87985c4ca10ea8af8836ec.yaml b/nuclei-templates/cve-less/plugins/smart-donations-183ebb9bdb87985c4ca10ea8af8836ec.yaml new file mode 100644 index 0000000000..3674e437f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-donations-183ebb9bdb87985c4ca10ea8af8836ec.yaml @@ -0,0 +1,58 @@ +id: smart-donations-183ebb9bdb87985c4ca10ea8af8836ec + +info: + name: > + Donations Made Easy – Smart Donations <= 4.0.12 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/799975aa-44fe-48dc-8ac9-469c89a03c67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-donations/" + google-query: inurl:"/wp-content/plugins/smart-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-donations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-donations-37dbc4d1c954090682035935efde0d58.yaml b/nuclei-templates/cve-less/plugins/smart-donations-37dbc4d1c954090682035935efde0d58.yaml new file mode 100644 index 0000000000..eb9d5dffbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-donations-37dbc4d1c954090682035935efde0d58.yaml @@ -0,0 +1,58 @@ +id: smart-donations-37dbc4d1c954090682035935efde0d58 + +info: + name: > + Donations Made Easy – Smart Donations <= 4.0.12 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92aae1f6-e624-4619-8195-ee3c443a31fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-donations/" + google-query: inurl:"/wp-content/plugins/smart-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-donations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-donations-575d541f48b602d18582347a4f3b977f.yaml b/nuclei-templates/cve-less/plugins/smart-donations-575d541f48b602d18582347a4f3b977f.yaml new file mode 100644 index 0000000000..4d6aabde74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-donations-575d541f48b602d18582347a4f3b977f.yaml @@ -0,0 +1,58 @@ +id: smart-donations-575d541f48b602d18582347a4f3b977f + +info: + name: > + Donations Made Easy – Smart Donations <= 4.0.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cce2f9f-5f47-4e10-a846-0aab4bcad616?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-donations/" + google-query: inurl:"/wp-content/plugins/smart-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-donations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-donations-6f7b5cdd2c06fd389f02600d38bca12e.yaml b/nuclei-templates/cve-less/plugins/smart-donations-6f7b5cdd2c06fd389f02600d38bca12e.yaml new file mode 100644 index 0000000000..6632f8577d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-donations-6f7b5cdd2c06fd389f02600d38bca12e.yaml @@ -0,0 +1,58 @@ +id: smart-donations-6f7b5cdd2c06fd389f02600d38bca12e + +info: + name: > + Donations Made Easy – Smart Donations <= 4.0.12 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c4e296-f98a-4018-980d-173d5e7ade7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-donations/" + google-query: inurl:"/wp-content/plugins/smart-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-donations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-donations-974f0ab4bb265d59dbd405aba4fe0b7a.yaml b/nuclei-templates/cve-less/plugins/smart-donations-974f0ab4bb265d59dbd405aba4fe0b7a.yaml new file mode 100644 index 0000000000..8d681a1d37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-donations-974f0ab4bb265d59dbd405aba4fe0b7a.yaml @@ -0,0 +1,58 @@ +id: smart-donations-974f0ab4bb265d59dbd405aba4fe0b7a + +info: + name: > + Donations Made Easy – Smart Donations <= 4.0.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f5d3973-5bbb-4c85-9790-e12f3fc14f30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-donations/" + google-query: inurl:"/wp-content/plugins/smart-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-donations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-donations-a9d63cf96793705be5a47f94a1b589be.yaml b/nuclei-templates/cve-less/plugins/smart-donations-a9d63cf96793705be5a47f94a1b589be.yaml new file mode 100644 index 0000000000..72f1e6c970 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-donations-a9d63cf96793705be5a47f94a1b589be.yaml @@ -0,0 +1,58 @@ +id: smart-donations-a9d63cf96793705be5a47f94a1b589be + +info: + name: > + Donations Made Easy – Smart Donations <= 4.0.12 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0efebdcb-c3fb-435a-8687-6abdd5f9334b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-donations/" + google-query: inurl:"/wp-content/plugins/smart-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-donations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-email-alerts-ceb6447b3a16776fe0078a55abeaee38.yaml b/nuclei-templates/cve-less/plugins/smart-email-alerts-ceb6447b3a16776fe0078a55abeaee38.yaml new file mode 100644 index 0000000000..cd7addc5f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-email-alerts-ceb6447b3a16776fe0078a55abeaee38.yaml @@ -0,0 +1,58 @@ +id: smart-email-alerts-ceb6447b3a16776fe0078a55abeaee38 + +info: + name: > + Smart Email Alerts <= 1.0.10 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b930316-7a2f-4539-8599-360751d49cde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-email-alerts/" + google-query: inurl:"/wp-content/plugins/smart-email-alerts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-email-alerts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-email-alerts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-email-alerts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-flv-f4124706d0e19c3b0ecdc824e2dde79c.yaml b/nuclei-templates/cve-less/plugins/smart-flv-f4124706d0e19c3b0ecdc824e2dde79c.yaml new file mode 100644 index 0000000000..2d17c82169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-flv-f4124706d0e19c3b0ecdc824e2dde79c.yaml @@ -0,0 +1,58 @@ +id: smart-flv-f4124706d0e19c3b0ecdc824e2dde79c + +info: + name: > + Smart Flv <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d25f23cc-6012-4607-a643-5350175a439b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-flv/" + google-query: inurl:"/wp-content/plugins/smart-flv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-flv,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-flv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-flv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-280e3b3d0994374de6814f38b2990648.yaml b/nuclei-templates/cve-less/plugins/smart-forms-280e3b3d0994374de6814f38b2990648.yaml new file mode 100644 index 0000000000..62e86621fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-280e3b3d0994374de6814f38b2990648.yaml @@ -0,0 +1,58 @@ +id: smart-forms-280e3b3d0994374de6814f38b2990648 + +info: + name: > + Smart Forms <= 2.6.86 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29c762c7-7bb9-42bc-9e22-0f4da2a5c59b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.86') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-305aa37d733d46f38e2d556cd38a63ea.yaml b/nuclei-templates/cve-less/plugins/smart-forms-305aa37d733d46f38e2d556cd38a63ea.yaml new file mode 100644 index 0000000000..13f1270c54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-305aa37d733d46f38e2d556cd38a63ea.yaml @@ -0,0 +1,58 @@ +id: smart-forms-305aa37d733d46f38e2d556cd38a63ea + +info: + name: > + Smart Forms <= 2.6.93 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e6a896c-9cca-4e4d-b26d-0103a8b39bf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-3928f6f30c541722320412a9e71021b8.yaml b/nuclei-templates/cve-less/plugins/smart-forms-3928f6f30c541722320412a9e71021b8.yaml new file mode 100644 index 0000000000..af76bb1c45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-3928f6f30c541722320412a9e71021b8.yaml @@ -0,0 +1,58 @@ +id: smart-forms-3928f6f30c541722320412a9e71021b8 + +info: + name: > + Smart Forms < 2.6.71 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34a6d349-dfdc-4301-9380-7fc64c25f043?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-96ab3b40e77e6543e8b3a6fdd1944579.yaml b/nuclei-templates/cve-less/plugins/smart-forms-96ab3b40e77e6543e8b3a6fdd1944579.yaml new file mode 100644 index 0000000000..fca8799d2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-96ab3b40e77e6543e8b3a6fdd1944579.yaml @@ -0,0 +1,58 @@ +id: smart-forms-96ab3b40e77e6543e8b3a6fdd1944579 + +info: + name: > + Smart Forms – when you need more than just a contact form <= 2.9.95 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/372149c4-b6b4-43c8-896f-af69712f3a82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-9c331f426cf6396a6a2c802b7f7eeb8d.yaml b/nuclei-templates/cve-less/plugins/smart-forms-9c331f426cf6396a6a2c802b7f7eeb8d.yaml new file mode 100644 index 0000000000..bbe86914c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-9c331f426cf6396a6a2c802b7f7eeb8d.yaml @@ -0,0 +1,58 @@ +id: smart-forms-9c331f426cf6396a6a2c802b7f7eeb8d + +info: + name: > + Smart Forms <= 2.6.84 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ac48cd9-1de5-4840-b3f3-dc24ca52442e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.84') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-a4a6f5b9e735cb14d76827d4a578ff1c.yaml b/nuclei-templates/cve-less/plugins/smart-forms-a4a6f5b9e735cb14d76827d4a578ff1c.yaml new file mode 100644 index 0000000000..8e0c0c58f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-a4a6f5b9e735cb14d76827d4a578ff1c.yaml @@ -0,0 +1,58 @@ +id: smart-forms-a4a6f5b9e735cb14d76827d4a578ff1c + +info: + name: > + Smart Forms <= 2.6.91 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a643fa1-afdb-4710-ba1c-3b226b4098bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-a78ee203ec03252165376f049d05071b.yaml b/nuclei-templates/cve-less/plugins/smart-forms-a78ee203ec03252165376f049d05071b.yaml new file mode 100644 index 0000000000..013df494a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-a78ee203ec03252165376f049d05071b.yaml @@ -0,0 +1,58 @@ +id: smart-forms-a78ee203ec03252165376f049d05071b + +info: + name: > + Smart Forms < 2.6.26 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81939cc9-b8f7-4c40-b963-4f6f8c7043e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-c396dcb95eb5f0d3adb51913e8a502fc.yaml b/nuclei-templates/cve-less/plugins/smart-forms-c396dcb95eb5f0d3adb51913e8a502fc.yaml new file mode 100644 index 0000000000..3707d1c11d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-c396dcb95eb5f0d3adb51913e8a502fc.yaml @@ -0,0 +1,58 @@ +id: smart-forms-c396dcb95eb5f0d3adb51913e8a502fc + +info: + name: > + Smart Forms – when you need more than just a contact form <= 2.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5331c7cc-3854-4975-9f28-e9b0d6407227?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-forms-e55616747ddb7edf848ca48c3c65a365.yaml b/nuclei-templates/cve-less/plugins/smart-forms-e55616747ddb7edf848ca48c3c65a365.yaml new file mode 100644 index 0000000000..73bd55b4bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-forms-e55616747ddb7edf848ca48c3c65a365.yaml @@ -0,0 +1,58 @@ +id: smart-forms-e55616747ddb7edf848ca48c3c65a365 + +info: + name: > + Smart Forms <= 2.6.93 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ed9c59c-191f-4219-8701-ce2f088b3b6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-forms/" + google-query: inurl:"/wp-content/plugins/smart-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.943') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-google-code-inserter-61d92e4ca30273cfa735fd279e1d5fd6.yaml b/nuclei-templates/cve-less/plugins/smart-google-code-inserter-61d92e4ca30273cfa735fd279e1d5fd6.yaml new file mode 100644 index 0000000000..b87bdfb7d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-google-code-inserter-61d92e4ca30273cfa735fd279e1d5fd6.yaml @@ -0,0 +1,58 @@ +id: smart-google-code-inserter-61d92e4ca30273cfa735fd279e1d5fd6 + +info: + name: > + Smart Google Code Inserter < 3.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3bddb69-9c63-49e8-9c04-08361423b1c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-google-code-inserter/" + google-query: inurl:"/wp-content/plugins/smart-google-code-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-google-code-inserter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-google-code-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-google-code-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-google-code-inserter-8f4c726ec3ff968264c33031aafd5dd4.yaml b/nuclei-templates/cve-less/plugins/smart-google-code-inserter-8f4c726ec3ff968264c33031aafd5dd4.yaml new file mode 100644 index 0000000000..ed62dd59ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-google-code-inserter-8f4c726ec3ff968264c33031aafd5dd4.yaml @@ -0,0 +1,58 @@ +id: smart-google-code-inserter-8f4c726ec3ff968264c33031aafd5dd4 + +info: + name: > + Smart Google Code Inserter < 3.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3f3e56e-bbb6-4ceb-811d-447ed837d176?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-google-code-inserter/" + google-query: inurl:"/wp-content/plugins/smart-google-code-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-google-code-inserter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-google-code-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-google-code-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-grid-gallery-9226076d86703169a8ae6d270bd5adc3.yaml b/nuclei-templates/cve-less/plugins/smart-grid-gallery-9226076d86703169a8ae6d270bd5adc3.yaml new file mode 100644 index 0000000000..b49cb77604 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-grid-gallery-9226076d86703169a8ae6d270bd5adc3.yaml @@ -0,0 +1,58 @@ +id: smart-grid-gallery-9226076d86703169a8ae6d270bd5adc3 + +info: + name: > + Video Gallery - Vimeo and YouTube Gallery < 1.1.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae3d33dd-2591-4c4e-9769-77575e57ac49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-grid-gallery/" + google-query: inurl:"/wp-content/plugins/smart-grid-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-grid-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-grid-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-grid-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-id-96cba560d28a367fadd5acf394466224.yaml b/nuclei-templates/cve-less/plugins/smart-id-96cba560d28a367fadd5acf394466224.yaml new file mode 100644 index 0000000000..e99bda6dc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-id-96cba560d28a367fadd5acf394466224.yaml @@ -0,0 +1,58 @@ +id: smart-id-96cba560d28a367fadd5acf394466224 + +info: + name: > + eID Easy <= 4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/121022ad-a569-4a80-96ee-c7911db81a30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-id/" + google-query: inurl:"/wp-content/plugins/smart-id/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-id,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-id/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-id" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-logo-showcase-lite-32a522f1c04399b883d41fab9d9aff30.yaml b/nuclei-templates/cve-less/plugins/smart-logo-showcase-lite-32a522f1c04399b883d41fab9d9aff30.yaml new file mode 100644 index 0000000000..b96bc0049e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-logo-showcase-lite-32a522f1c04399b883d41fab9d9aff30.yaml @@ -0,0 +1,58 @@ +id: smart-logo-showcase-lite-32a522f1c04399b883d41fab9d9aff30 + +info: + name: > + Smart Logo Showcase Lite <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4664b8d-4f8f-4be3-90e9-2dba4e737b2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-logo-showcase-lite/" + google-query: inurl:"/wp-content/plugins/smart-logo-showcase-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-logo-showcase-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-logo-showcase-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-logo-showcase-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-maintenance-mode-9f6fe676338d7fcfeadb295b51a36459.yaml b/nuclei-templates/cve-less/plugins/smart-maintenance-mode-9f6fe676338d7fcfeadb295b51a36459.yaml new file mode 100644 index 0000000000..6a3edf57e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-maintenance-mode-9f6fe676338d7fcfeadb295b51a36459.yaml @@ -0,0 +1,58 @@ +id: smart-maintenance-mode-9f6fe676338d7fcfeadb295b51a36459 + +info: + name: > + Smart Maintenance Mode <= 1.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/138c636b-27fb-4d76-b01c-60a10749913d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/smart-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-manager-for-wp-e-commerce-0489a9c545313d7845eb08297287eaa5.yaml b/nuclei-templates/cve-less/plugins/smart-manager-for-wp-e-commerce-0489a9c545313d7845eb08297287eaa5.yaml new file mode 100644 index 0000000000..dc38c1ed3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-manager-for-wp-e-commerce-0489a9c545313d7845eb08297287eaa5.yaml @@ -0,0 +1,58 @@ +id: smart-manager-for-wp-e-commerce-0489a9c545313d7845eb08297287eaa5 + +info: + name: > + Smart Manager - WooCommerce Advanced Bulk Edit, Inventory Management & more... <= 8.27.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bc531a3-e246-4f2e-8657-bbdfb91dbf39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-manager-for-wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/smart-manager-for-wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-manager-for-wp-e-commerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-manager-for-wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-manager-for-wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.27.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-manager-for-wp-e-commerce-51ad2e96cf8162f9d2be287019b590c3.yaml b/nuclei-templates/cve-less/plugins/smart-manager-for-wp-e-commerce-51ad2e96cf8162f9d2be287019b590c3.yaml new file mode 100644 index 0000000000..fdbcdff9e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-manager-for-wp-e-commerce-51ad2e96cf8162f9d2be287019b590c3.yaml @@ -0,0 +1,58 @@ +id: smart-manager-for-wp-e-commerce-51ad2e96cf8162f9d2be287019b590c3 + +info: + name: > + Smart Manager For WooCommerce < 3.9.7 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41108c2c-99b2-4aff-8c06-bee0b6547a9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-manager-for-wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/smart-manager-for-wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-manager-for-wp-e-commerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-manager-for-wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-manager-for-wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-marketing-for-wp-5d316e62377c24672c816fca478bdf84.yaml b/nuclei-templates/cve-less/plugins/smart-marketing-for-wp-5d316e62377c24672c816fca478bdf84.yaml new file mode 100644 index 0000000000..dab9766ade --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-marketing-for-wp-5d316e62377c24672c816fca478bdf84.yaml @@ -0,0 +1,58 @@ +id: smart-marketing-for-wp-5d316e62377c24672c816fca478bdf84 + +info: + name: > + Smart Marketing SMS and Newsletters Forms < 2.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/351c7d18-6c1b-4a52-98ae-478dee5aaff2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-marketing-for-wp/" + google-query: inurl:"/wp-content/plugins/smart-marketing-for-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-marketing-for-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-marketing-for-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-marketing-for-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-recent-posts-widget-0b26b05fd72223ab78d0eb64dadbd40a.yaml b/nuclei-templates/cve-less/plugins/smart-recent-posts-widget-0b26b05fd72223ab78d0eb64dadbd40a.yaml new file mode 100644 index 0000000000..f2b8e0df06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-recent-posts-widget-0b26b05fd72223ab78d0eb64dadbd40a.yaml @@ -0,0 +1,58 @@ +id: smart-recent-posts-widget-0b26b05fd72223ab78d0eb64dadbd40a + +info: + name: > + Smart Recent Posts Widget <= 1.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f40e7f8a-8bca-4a87-887c-8e11b1da46a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-recent-posts-widget/" + google-query: inurl:"/wp-content/plugins/smart-recent-posts-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-recent-posts-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-recent-posts-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-recent-posts-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-seo-tool-8ac688a05969c32cd04eef86b8133c6f.yaml b/nuclei-templates/cve-less/plugins/smart-seo-tool-8ac688a05969c32cd04eef86b8133c6f.yaml new file mode 100644 index 0000000000..80f3432511 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-seo-tool-8ac688a05969c32cd04eef86b8133c6f.yaml @@ -0,0 +1,58 @@ +id: smart-seo-tool-8ac688a05969c32cd04eef86b8133c6f + +info: + name: > + Smart SEO Tool-WordPress SEO优化插件 <= 4.0.1 - Cross-Site Request Forgery via 'wp_ajax_wb_smart_seo_tool' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/078d06ad-555b-4de4-a032-d81440c7dfb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-seo-tool/" + google-query: inurl:"/wp-content/plugins/smart-seo-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-seo-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-seo-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-seo-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-seo-tool-b76eb61ef2aa1f7567f1609609758512.yaml b/nuclei-templates/cve-less/plugins/smart-seo-tool-b76eb61ef2aa1f7567f1609609758512.yaml new file mode 100644 index 0000000000..93819e7587 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-seo-tool-b76eb61ef2aa1f7567f1609609758512.yaml @@ -0,0 +1,58 @@ +id: smart-seo-tool-b76eb61ef2aa1f7567f1609609758512 + +info: + name: > + Smart SEO Tool <= 3.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32237c21-2fec-4228-8264-e9f3f1a70060?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-seo-tool/" + google-query: inurl:"/wp-content/plugins/smart-seo-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-seo-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-seo-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-seo-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slide-show-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/smart-slide-show-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..b7383d39e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slide-show-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: smart-slide-show-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slide-show/" + google-query: inurl:"/wp-content/plugins/smart-slide-show/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slide-show,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slide-show/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slide-show" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slide-show-c97035ebd849b96be34cf1445f8283fd.yaml b/nuclei-templates/cve-less/plugins/smart-slide-show-c97035ebd849b96be34cf1445f8283fd.yaml new file mode 100644 index 0000000000..ed7ee57fe0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slide-show-c97035ebd849b96be34cf1445f8283fd.yaml @@ -0,0 +1,58 @@ +id: smart-slide-show-c97035ebd849b96be34cf1445f8283fd + +info: + name: > + Smart Slideshow <= 2.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa86b98c-9690-4ef6-ac50-895035ed2b55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slide-show/" + google-query: inurl:"/wp-content/plugins/smart-slide-show/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slide-show,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slide-show/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slide-show" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slider-2-4e3fd84eb31659b1ac399191d2db7828.yaml b/nuclei-templates/cve-less/plugins/smart-slider-2-4e3fd84eb31659b1ac399191d2db7828.yaml new file mode 100644 index 0000000000..8b6936d11d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slider-2-4e3fd84eb31659b1ac399191d2db7828.yaml @@ -0,0 +1,58 @@ +id: smart-slider-2-4e3fd84eb31659b1ac399191d2db7828 + +info: + name: > + Smart Slider 2 <= 2.3.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d74ca27-7be9-4ab3-a6be-0c23b195a3cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slider-2/" + google-query: inurl:"/wp-content/plugins/smart-slider-2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slider-2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slider-2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slider-2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slider-3-01aa5492a4b5bc7532a3a46a182927f8.yaml b/nuclei-templates/cve-less/plugins/smart-slider-3-01aa5492a4b5bc7532a3a46a182927f8.yaml new file mode 100644 index 0000000000..99de279ab0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slider-3-01aa5492a4b5bc7532a3a46a182927f8.yaml @@ -0,0 +1,58 @@ +id: smart-slider-3-01aa5492a4b5bc7532a3a46a182927f8 + +info: + name: > + Smart Slider 3 <= 3.5.1.9 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae81917e-0367-4c64-9254-fd74751ada48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slider-3/" + google-query: inurl:"/wp-content/plugins/smart-slider-3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slider-3,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slider-3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slider-3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slider-3-39ab4c2294aa56f29beb5a701f23e19b.yaml b/nuclei-templates/cve-less/plugins/smart-slider-3-39ab4c2294aa56f29beb5a701f23e19b.yaml new file mode 100644 index 0000000000..e603989aed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slider-3-39ab4c2294aa56f29beb5a701f23e19b.yaml @@ -0,0 +1,58 @@ +id: smart-slider-3-39ab4c2294aa56f29beb5a701f23e19b + +info: + name: > + Smart Slider 3 <= 3.5.0.8 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c57f27b-2441-4f16-ab4b-bfb68b7b793f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slider-3/" + google-query: inurl:"/wp-content/plugins/smart-slider-3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slider-3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slider-3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slider-3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slider-3-7fcf2911100968a88895e890aa0259dd.yaml b/nuclei-templates/cve-less/plugins/smart-slider-3-7fcf2911100968a88895e890aa0259dd.yaml new file mode 100644 index 0000000000..8570a6e51d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slider-3-7fcf2911100968a88895e890aa0259dd.yaml @@ -0,0 +1,58 @@ +id: smart-slider-3-7fcf2911100968a88895e890aa0259dd + +info: + name: > + Smart Slider 3 <= 3.5.1.22 - Missing Authorization to Limited File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/915f464f-449d-4ad2-9f43-6ce5d93ccb05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slider-3/" + google-query: inurl:"/wp-content/plugins/smart-slider-3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slider-3,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slider-3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slider-3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slider-3-b789e3115d873b4f1d599f40302f434c.yaml b/nuclei-templates/cve-less/plugins/smart-slider-3-b789e3115d873b4f1d599f40302f434c.yaml new file mode 100644 index 0000000000..e10ca6c3d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slider-3-b789e3115d873b4f1d599f40302f434c.yaml @@ -0,0 +1,58 @@ +id: smart-slider-3-b789e3115d873b4f1d599f40302f434c + +info: + name: > + Smart Slider 3 <= 3.5.1.9 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/565b4026-0807-449d-a78e-798da53c3f52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slider-3/" + google-query: inurl:"/wp-content/plugins/smart-slider-3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slider-3,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slider-3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slider-3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slider-3-c9194ffc50bb3f8abe6f00ef14c4cdc5.yaml b/nuclei-templates/cve-less/plugins/smart-slider-3-c9194ffc50bb3f8abe6f00ef14c4cdc5.yaml new file mode 100644 index 0000000000..3bd9c06d98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slider-3-c9194ffc50bb3f8abe6f00ef14c4cdc5.yaml @@ -0,0 +1,58 @@ +id: smart-slider-3-c9194ffc50bb3f8abe6f00ef14c4cdc5 + +info: + name: > + Smart Slider 3 <= 3.5.1.13 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0191e5b0-b669-439b-8ad4-9f860e6ee637?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slider-3/" + google-query: inurl:"/wp-content/plugins/smart-slider-3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slider-3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slider-3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slider-3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-slider-3-f451ba2e71b9d178f196c4bee4c708ef.yaml b/nuclei-templates/cve-less/plugins/smart-slider-3-f451ba2e71b9d178f196c4bee4c708ef.yaml new file mode 100644 index 0000000000..7b2efa9af8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-slider-3-f451ba2e71b9d178f196c4bee4c708ef.yaml @@ -0,0 +1,58 @@ +id: smart-slider-3-f451ba2e71b9d178f196c4bee4c708ef + +info: + name: > + Smart Slider 3 <= 3.5.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c192425a-1e2d-4f7d-bd88-3a594d70a461?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-slider-3/" + google-query: inurl:"/wp-content/plugins/smart-slider-3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-slider-3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-slider-3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-slider-3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-variations-images-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/smart-variations-images-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..48c9ec9891 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-variations-images-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: smart-variations-images-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-variations-images/" + google-query: inurl:"/wp-content/plugins/smart-variations-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-variations-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-variations-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-variations-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-wishlist-for-more-convert-f6b44afa42d4e9ad47e5de4f61561c71.yaml b/nuclei-templates/cve-less/plugins/smart-wishlist-for-more-convert-f6b44afa42d4e9ad47e5de4f61561c71.yaml new file mode 100644 index 0000000000..2f2136e2c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-wishlist-for-more-convert-f6b44afa42d4e9ad47e5de4f61561c71.yaml @@ -0,0 +1,58 @@ +id: smart-wishlist-for-more-convert-f6b44afa42d4e9ad47e5de4f61561c71 + +info: + name: > + MC Woocommerce Wishlist <= 1.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c7f6ef2-6c50-4739-8844-0db7d9ffe7f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-wishlist-for-more-convert/" + google-query: inurl:"/wp-content/plugins/smart-wishlist-for-more-convert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-wishlist-for-more-convert,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-wishlist-for-more-convert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-wishlist-for-more-convert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-woocommerce-search-517aef4b1533709bdbf95e8d657f10e6.yaml b/nuclei-templates/cve-less/plugins/smart-woocommerce-search-517aef4b1533709bdbf95e8d657f10e6.yaml new file mode 100644 index 0000000000..cffad927bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-woocommerce-search-517aef4b1533709bdbf95e8d657f10e6.yaml @@ -0,0 +1,58 @@ +id: smart-woocommerce-search-517aef4b1533709bdbf95e8d657f10e6 + +info: + name: > + Smart WooCommerce Search <= 2.5.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59931266-766f-42d2-bcde-04d694a444b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-woocommerce-search/" + google-query: inurl:"/wp-content/plugins/smart-woocommerce-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-woocommerce-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-woocommerce-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-woocommerce-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smart-youtube-94622a9541e2d7c1e56d077f426d64ea.yaml b/nuclei-templates/cve-less/plugins/smart-youtube-94622a9541e2d7c1e56d077f426d64ea.yaml new file mode 100644 index 0000000000..eed4a586d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smart-youtube-94622a9541e2d7c1e56d077f426d64ea.yaml @@ -0,0 +1,58 @@ +id: smart-youtube-94622a9541e2d7c1e56d077f426d64ea + +info: + name: > + Smart YouTube PRO <= 4.3 - Cross-Site Request Forgery via handle_colorbox_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a184090c-0281-4d8d-bd4d-256b4ed826dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smart-youtube/" + google-query: inurl:"/wp-content/plugins/smart-youtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smart-youtube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smart-youtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smart-youtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smartcrawl-seo-0f5c5f0145a23c33dd91c0c052718e6c.yaml b/nuclei-templates/cve-less/plugins/smartcrawl-seo-0f5c5f0145a23c33dd91c0c052718e6c.yaml new file mode 100644 index 0000000000..bf443ce718 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smartcrawl-seo-0f5c5f0145a23c33dd91c0c052718e6c.yaml @@ -0,0 +1,58 @@ +id: smartcrawl-seo-0f5c5f0145a23c33dd91c0c052718e6c + +info: + name: > + SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer <= 3.10.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a77672b-340e-4f10-abe7-461c2db537b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smartcrawl-seo/" + google-query: inurl:"/wp-content/plugins/smartcrawl-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smartcrawl-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smartcrawl-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smartcrawl-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smartcrawl-seo-b9c11b54952021362ff03d2b884e46b9.yaml b/nuclei-templates/cve-less/plugins/smartcrawl-seo-b9c11b54952021362ff03d2b884e46b9.yaml new file mode 100644 index 0000000000..7525b8af29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smartcrawl-seo-b9c11b54952021362ff03d2b884e46b9.yaml @@ -0,0 +1,58 @@ +id: smartcrawl-seo-b9c11b54952021362ff03d2b884e46b9 + +info: + name: > + Simple Social Media Share Buttons <= 3.8.2 - Unauthenticated Password Protected Post Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba88964e-7487-4cd5-ab3e-bd33d14a61df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smartcrawl-seo/" + google-query: inurl:"/wp-content/plugins/smartcrawl-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smartcrawl-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smartcrawl-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smartcrawl-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smartideo-eacbf719bf265fc7ee4ac85dd80a065a.yaml b/nuclei-templates/cve-less/plugins/smartideo-eacbf719bf265fc7ee4ac85dd80a065a.yaml new file mode 100644 index 0000000000..fc3ec0d2b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smartideo-eacbf719bf265fc7ee4ac85dd80a065a.yaml @@ -0,0 +1,58 @@ +id: smartideo-eacbf719bf265fc7ee4ac85dd80a065a + +info: + name: > + SmartIdeo <= 2.7.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6be64d8d-fc71-40c2-baa8-985445d953ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smartideo/" + google-query: inurl:"/wp-content/plugins/smartideo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smartideo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smartideo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smartideo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smartkit-43e0cd9b2e64838710c022fed726ad02.yaml b/nuclei-templates/cve-less/plugins/smartkit-43e0cd9b2e64838710c022fed726ad02.yaml new file mode 100644 index 0000000000..da821c2bc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smartkit-43e0cd9b2e64838710c022fed726ad02.yaml @@ -0,0 +1,58 @@ +id: smartkit-43e0cd9b2e64838710c022fed726ad02 + +info: + name: > + Smartkit <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0b1e907-0c31-4b40-b3f9-0ac665f3394a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smartkit/" + google-query: inurl:"/wp-content/plugins/smartkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smartkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smartkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smartkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smartsoftbutton-widget-de-botones-de-chat-681d5f2f15a561b04bf2e029cc02c5b4.yaml b/nuclei-templates/cve-less/plugins/smartsoftbutton-widget-de-botones-de-chat-681d5f2f15a561b04bf2e029cc02c5b4.yaml new file mode 100644 index 0000000000..07a4ada07b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smartsoftbutton-widget-de-botones-de-chat-681d5f2f15a561b04bf2e029cc02c5b4.yaml @@ -0,0 +1,58 @@ +id: smartsoftbutton-widget-de-botones-de-chat-681d5f2f15a561b04bf2e029cc02c5b4 + +info: + name: > + Button Widget Smartsoft <= 1.0.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53757567-5024-46cc-b2ae-04b5fc55a35c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smartsoftbutton-widget-de-botones-de-chat/" + google-query: inurl:"/wp-content/plugins/smartsoftbutton-widget-de-botones-de-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smartsoftbutton-widget-de-botones-de-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smartsoftbutton-widget-de-botones-de-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smartsoftbutton-widget-de-botones-de-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smarty-for-wordpress-67cf82bcdd960b08b194bbfec613a24f.yaml b/nuclei-templates/cve-less/plugins/smarty-for-wordpress-67cf82bcdd960b08b194bbfec613a24f.yaml new file mode 100644 index 0000000000..32db35f537 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smarty-for-wordpress-67cf82bcdd960b08b194bbfec613a24f.yaml @@ -0,0 +1,58 @@ +id: smarty-for-wordpress-67cf82bcdd960b08b194bbfec613a24f + +info: + name: > + Smarty for WordPress <= 3.1.35 - Cross-Site Request Forgery via displaySmartyManagementPage + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca6756d0-d1d2-41b3-ad62-fc665a281e6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smarty-for-wordpress/" + google-query: inurl:"/wp-content/plugins/smarty-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smarty-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smarty-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smarty-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smarty-for-wordpress-714adebc0f79250fa11c7babb8af735a.yaml b/nuclei-templates/cve-less/plugins/smarty-for-wordpress-714adebc0f79250fa11c7babb8af735a.yaml new file mode 100644 index 0000000000..04547b8911 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smarty-for-wordpress-714adebc0f79250fa11c7babb8af735a.yaml @@ -0,0 +1,58 @@ +id: smarty-for-wordpress-714adebc0f79250fa11c7babb8af735a + +info: + name: > + Smarty for WordPress <= 3.1.35 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/498a10a1-8da6-4309-833f-950f6442d5ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smarty-for-wordpress/" + google-query: inurl:"/wp-content/plugins/smarty-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smarty-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smarty-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smarty-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smokesignal-43890f1f23768c00ae2a757d58110ef2.yaml b/nuclei-templates/cve-less/plugins/smokesignal-43890f1f23768c00ae2a757d58110ef2.yaml new file mode 100644 index 0000000000..23889d8b95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smokesignal-43890f1f23768c00ae2a757d58110ef2.yaml @@ -0,0 +1,58 @@ +id: smokesignal-43890f1f23768c00ae2a757d58110ef2 + +info: + name: > + SmokeSignal <= 1.2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb892e06-b32c-4cea-92e5-e214acb91a2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smokesignal/" + google-query: inurl:"/wp-content/plugins/smokesignal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smokesignal,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smokesignal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smokesignal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smokesignal-c0dc18b21bfa2b86d77830cf4a915b55.yaml b/nuclei-templates/cve-less/plugins/smokesignal-c0dc18b21bfa2b86d77830cf4a915b55.yaml new file mode 100644 index 0000000000..bee63f9b71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smokesignal-c0dc18b21bfa2b86d77830cf4a915b55.yaml @@ -0,0 +1,58 @@ +id: smokesignal-c0dc18b21bfa2b86d77830cf4a915b55 + +info: + name: > + Smoke Signal < 1.2.7 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6fc087b-c28d-4c6a-a59f-085773d542dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smokesignal/" + google-query: inurl:"/wp-content/plugins/smokesignal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smokesignal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smokesignal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smokesignal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smooth-page-scroll-updown-buttons-c1380d1b7ef910c0603f14abaf611a7b.yaml b/nuclei-templates/cve-less/plugins/smooth-page-scroll-updown-buttons-c1380d1b7ef910c0603f14abaf611a7b.yaml new file mode 100644 index 0000000000..3944b56c09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smooth-page-scroll-updown-buttons-c1380d1b7ef910c0603f14abaf611a7b.yaml @@ -0,0 +1,58 @@ +id: smooth-page-scroll-updown-buttons-c1380d1b7ef910c0603f14abaf611a7b + +info: + name: > + Smooth Scroll Page Up/Down Buttons <= 1.3 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a563439-c1c2-4a19-b5f7-22ed7be87ad7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smooth-page-scroll-updown-buttons/" + google-query: inurl:"/wp-content/plugins/smooth-page-scroll-updown-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smooth-page-scroll-updown-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smooth-page-scroll-updown-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smooth-page-scroll-updown-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smooth-page-scroll-updown-buttons-ed5e303cb61bf4126d5ebc5c9cfb7c58.yaml b/nuclei-templates/cve-less/plugins/smooth-page-scroll-updown-buttons-ed5e303cb61bf4126d5ebc5c9cfb7c58.yaml new file mode 100644 index 0000000000..775cddc87e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smooth-page-scroll-updown-buttons-ed5e303cb61bf4126d5ebc5c9cfb7c58.yaml @@ -0,0 +1,58 @@ +id: smooth-page-scroll-updown-buttons-ed5e303cb61bf4126d5ebc5c9cfb7c58 + +info: + name: > + Smooth Scroll Page Up/Down Buttons <= 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28cb1a04-5129-430a-850e-c410e95d7b87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smooth-page-scroll-updown-buttons/" + google-query: inurl:"/wp-content/plugins/smooth-page-scroll-updown-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smooth-page-scroll-updown-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smooth-page-scroll-updown-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smooth-page-scroll-updown-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smooth-scrolling-links-ssl-3ea22c02a19639aa3b53bac3d8c83192.yaml b/nuclei-templates/cve-less/plugins/smooth-scrolling-links-ssl-3ea22c02a19639aa3b53bac3d8c83192.yaml new file mode 100644 index 0000000000..58499de363 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smooth-scrolling-links-ssl-3ea22c02a19639aa3b53bac3d8c83192.yaml @@ -0,0 +1,58 @@ +id: smooth-scrolling-links-ssl-3ea22c02a19639aa3b53bac3d8c83192 + +info: + name: > + Smooth Scroll Links <= 1.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49018b4b-2833-4ced-b36a-ebe69c5cb096?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smooth-scrolling-links-ssl/" + google-query: inurl:"/wp-content/plugins/smooth-scrolling-links-ssl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smooth-scrolling-links-ssl,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smooth-scrolling-links-ssl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smooth-scrolling-links-ssl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smooth-slider-5e7c4bc77fb9b2b637c41f55c55733f0.yaml b/nuclei-templates/cve-less/plugins/smooth-slider-5e7c4bc77fb9b2b637c41f55c55733f0.yaml new file mode 100644 index 0000000000..80223a7c6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smooth-slider-5e7c4bc77fb9b2b637c41f55c55733f0.yaml @@ -0,0 +1,58 @@ +id: smooth-slider-5e7c4bc77fb9b2b637c41f55c55733f0 + +info: + name: > + Smooth Slider < 2.8.7 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/357257df-123d-4885-ad48-ff38ce29eeb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smooth-slider/" + google-query: inurl:"/wp-content/plugins/smooth-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smooth-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smooth-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smooth-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smooth-slider-60f28a7307d8376de999213f19e8d5bb.yaml b/nuclei-templates/cve-less/plugins/smooth-slider-60f28a7307d8376de999213f19e8d5bb.yaml new file mode 100644 index 0000000000..857e5ab12c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smooth-slider-60f28a7307d8376de999213f19e8d5bb.yaml @@ -0,0 +1,58 @@ +id: smooth-slider-60f28a7307d8376de999213f19e8d5bb + +info: + name: > + Smooth Slider < 2.7 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3566d9fa-faeb-4302-96e2-464a68eff66d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smooth-slider/" + google-query: inurl:"/wp-content/plugins/smooth-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smooth-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smooth-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smooth-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smoothscroller-2cf2ecadfdb85fc26b2f2d1670a74a60.yaml b/nuclei-templates/cve-less/plugins/smoothscroller-2cf2ecadfdb85fc26b2f2d1670a74a60.yaml new file mode 100644 index 0000000000..ca75fc483c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smoothscroller-2cf2ecadfdb85fc26b2f2d1670a74a60.yaml @@ -0,0 +1,58 @@ +id: smoothscroller-2cf2ecadfdb85fc26b2f2d1670a74a60 + +info: + name: > + Smoothscroller <= 1.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3aca1995-2408-423d-afb6-6cf452fbee37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smoothscroller/" + google-query: inurl:"/wp-content/plugins/smoothscroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smoothscroller,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smoothscroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smoothscroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smpl-shortcodes-c3292186ff6270827e326f6eecd76002.yaml b/nuclei-templates/cve-less/plugins/smpl-shortcodes-c3292186ff6270827e326f6eecd76002.yaml new file mode 100644 index 0000000000..abf6797e3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smpl-shortcodes-c3292186ff6270827e326f6eecd76002.yaml @@ -0,0 +1,58 @@ +id: smpl-shortcodes-c3292186ff6270827e326f6eecd76002 + +info: + name: > + Simple Shortcodes <= 1.0.20 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a153d6b2-e3fd-42db-90ba-d899a07d60c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smpl-shortcodes/" + google-query: inurl:"/wp-content/plugins/smpl-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smpl-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smpl-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smpl-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sms-alert-7c8a4badc44767125cd457fdcb3a6ffa.yaml b/nuclei-templates/cve-less/plugins/sms-alert-7c8a4badc44767125cd457fdcb3a6ffa.yaml new file mode 100644 index 0000000000..0758d9b33b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sms-alert-7c8a4badc44767125cd457fdcb3a6ffa.yaml @@ -0,0 +1,58 @@ +id: sms-alert-7c8a4badc44767125cd457fdcb3a6ffa + +info: + name: > + SMS Alert Order Notifications – WooCommerce <= 3.6.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7a28382-facb-43a7-892a-8ca9e7f0f62b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sms-alert/" + google-query: inurl:"/wp-content/plugins/sms-alert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sms-alert,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sms-alert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sms-alert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sms-alert-d6a49c02628ddcb69bd8644362723660.yaml b/nuclei-templates/cve-less/plugins/sms-alert-d6a49c02628ddcb69bd8644362723660.yaml new file mode 100644 index 0000000000..425a3c9322 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sms-alert-d6a49c02628ddcb69bd8644362723660.yaml @@ -0,0 +1,58 @@ +id: sms-alert-d6a49c02628ddcb69bd8644362723660 + +info: + name: > + SMS Alert Order Notifications – WooCommerce <= 3.4.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/215ea2de-538b-4f24-98f8-67b8314453cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sms-alert/" + google-query: inurl:"/wp-content/plugins/sms-alert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sms-alert,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sms-alert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sms-alert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sms-ovh-71d3c20a220713a113b92e288fcb3219.yaml b/nuclei-templates/cve-less/plugins/sms-ovh-71d3c20a220713a113b92e288fcb3219.yaml new file mode 100644 index 0000000000..44054dfc29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sms-ovh-71d3c20a220713a113b92e288fcb3219.yaml @@ -0,0 +1,58 @@ +id: sms-ovh-71d3c20a220713a113b92e288fcb3219 + +info: + name: > + SMS OVH <= 0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8febf4ba-ad0f-4f93-8c13-f976d583e689?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sms-ovh/" + google-query: inurl:"/wp-content/plugins/sms-ovh/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sms-ovh,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sms-ovh/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sms-ovh" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smsa-shipping-for-woocommerce-a6b4638155101fd9dca73e44a2714579.yaml b/nuclei-templates/cve-less/plugins/smsa-shipping-for-woocommerce-a6b4638155101fd9dca73e44a2714579.yaml new file mode 100644 index 0000000000..3b1b20658d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smsa-shipping-for-woocommerce-a6b4638155101fd9dca73e44a2714579.yaml @@ -0,0 +1,58 @@ +id: smsa-shipping-for-woocommerce-a6b4638155101fd9dca73e44a2714579 + +info: + name: > + SMSA Shipping for WooCommerce <= 1.0.4 - Authenticated (Subscriber+) Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e855031-eddd-45bc-9ed2-80cae03a45df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smsa-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/smsa-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smsa-shipping-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smsa-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smsa-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smsmaster-43a98edb387e539611a5da070feef314.yaml b/nuclei-templates/cve-less/plugins/smsmaster-43a98edb387e539611a5da070feef314.yaml new file mode 100644 index 0000000000..a16c173f4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smsmaster-43a98edb387e539611a5da070feef314.yaml @@ -0,0 +1,58 @@ +id: smsmaster-43a98edb387e539611a5da070feef314 + +info: + name: > + SMSmaster – Multipurpose SMS Gateway for Wordpress (All Versions) - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c2153f5-1c8b-4095-a0a8-849a7ee967c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smsmaster/" + google-query: inurl:"/wp-content/plugins/smsmaster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smsmaster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smsmaster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smsmaster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smtp-mail-504075ccb58d6f87a992a01e113a99a6.yaml b/nuclei-templates/cve-less/plugins/smtp-mail-504075ccb58d6f87a992a01e113a99a6.yaml new file mode 100644 index 0000000000..05a72971a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smtp-mail-504075ccb58d6f87a992a01e113a99a6.yaml @@ -0,0 +1,58 @@ +id: smtp-mail-504075ccb58d6f87a992a01e113a99a6 + +info: + name: > + SMTP Mail <= 1.3.21 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ae734d1-0cd4-4ff5-8448-828b0fb64f70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smtp-mail/" + google-query: inurl:"/wp-content/plugins/smtp-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smtp-mail,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smtp-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smtp-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smtp-mail-8790e1fe54b5de31a7c208c20bbec007.yaml b/nuclei-templates/cve-less/plugins/smtp-mail-8790e1fe54b5de31a7c208c20bbec007.yaml new file mode 100644 index 0000000000..abbcd727ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smtp-mail-8790e1fe54b5de31a7c208c20bbec007.yaml @@ -0,0 +1,58 @@ +id: smtp-mail-8790e1fe54b5de31a7c208c20bbec007 + +info: + name: > + SMTP Mail Plugin <= 1.3.20 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60379757-fe43-4a76-a65a-ee09163dab0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smtp-mail/" + google-query: inurl:"/wp-content/plugins/smtp-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smtp-mail,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smtp-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smtp-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smtp-mail-9b2a41c17f324bc427373274ec0c74e7.yaml b/nuclei-templates/cve-less/plugins/smtp-mail-9b2a41c17f324bc427373274ec0c74e7.yaml new file mode 100644 index 0000000000..2b3ade7605 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smtp-mail-9b2a41c17f324bc427373274ec0c74e7.yaml @@ -0,0 +1,58 @@ +id: smtp-mail-9b2a41c17f324bc427373274ec0c74e7 + +info: + name: > + SMTP Mail <= 1.2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efc434fd-320a-4808-9289-7c2f63d4f5a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smtp-mail/" + google-query: inurl:"/wp-content/plugins/smtp-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smtp-mail,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smtp-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smtp-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smtp-mail-c45322aa4144e7836fe027084e2d3416.yaml b/nuclei-templates/cve-less/plugins/smtp-mail-c45322aa4144e7836fe027084e2d3416.yaml new file mode 100644 index 0000000000..9fb407ce54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smtp-mail-c45322aa4144e7836fe027084e2d3416.yaml @@ -0,0 +1,58 @@ +id: smtp-mail-c45322aa4144e7836fe027084e2d3416 + +info: + name: > + SMTP Mail <= 1.1.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9f090bb-8e85-4fc3-a904-0a7ff85db8f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smtp-mail/" + google-query: inurl:"/wp-content/plugins/smtp-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smtp-mail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smtp-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smtp-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smtp-mailing-queue-4f005a53f32a91b958c425e9676f1ab9.yaml b/nuclei-templates/cve-less/plugins/smtp-mailing-queue-4f005a53f32a91b958c425e9676f1ab9.yaml new file mode 100644 index 0000000000..c8f3c299c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smtp-mailing-queue-4f005a53f32a91b958c425e9676f1ab9.yaml @@ -0,0 +1,58 @@ +id: smtp-mailing-queue-4f005a53f32a91b958c425e9676f1ab9 + +info: + name: > + SMTP Mailing Queue <= 1.4.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a0ba31d-d2d8-4614-8f77-a041c25c0519?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smtp-mailing-queue/" + google-query: inurl:"/wp-content/plugins/smtp-mailing-queue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smtp-mailing-queue,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smtp-mailing-queue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smtp-mailing-queue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/smtp2go-702ceb7e56323b84fbe97e278b8eb74c.yaml b/nuclei-templates/cve-less/plugins/smtp2go-702ceb7e56323b84fbe97e278b8eb74c.yaml new file mode 100644 index 0000000000..0537a9121c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/smtp2go-702ceb7e56323b84fbe97e278b8eb74c.yaml @@ -0,0 +1,58 @@ +id: smtp2go-702ceb7e56323b84fbe97e278b8eb74c + +info: + name: > + SMTP2GO <= 1.4.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cc618c8-63a9-4321-ad18-ee5277a5f5e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/smtp2go/" + google-query: inurl:"/wp-content/plugins/smtp2go/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,smtp2go,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/smtp2go/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smtp2go" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/snap-pixel-778723489fb152c7cb9e920525174271.yaml b/nuclei-templates/cve-less/plugins/snap-pixel-778723489fb152c7cb9e920525174271.yaml new file mode 100644 index 0000000000..4b51bd5907 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/snap-pixel-778723489fb152c7cb9e920525174271.yaml @@ -0,0 +1,58 @@ +id: snap-pixel-778723489fb152c7cb9e920525174271 + +info: + name: > + Snap Pixel <= 1.5.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6150fd60-069f-4ba6-8f0c-773039eaaec6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/snap-pixel/" + google-query: inurl:"/wp-content/plugins/snap-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,snap-pixel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/snap-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "snap-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/snap-pixel-ed4eb2c4883d6e7594e77a8d9e41fb0a.yaml b/nuclei-templates/cve-less/plugins/snap-pixel-ed4eb2c4883d6e7594e77a8d9e41fb0a.yaml new file mode 100644 index 0000000000..c4d8436c57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/snap-pixel-ed4eb2c4883d6e7594e77a8d9e41fb0a.yaml @@ -0,0 +1,58 @@ +id: snap-pixel-ed4eb2c4883d6e7594e77a8d9e41fb0a + +info: + name: > + Snap Pixel <= 1.5.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37686f8-6bd7-4c06-b80a-7d6849bbc7b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/snap-pixel/" + google-query: inurl:"/wp-content/plugins/snap-pixel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,snap-pixel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/snap-pixel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "snap-pixel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/snazzy-maps-2c0772cee08d9dbe384d352f3239ef5e.yaml b/nuclei-templates/cve-less/plugins/snazzy-maps-2c0772cee08d9dbe384d352f3239ef5e.yaml new file mode 100644 index 0000000000..51e369be76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/snazzy-maps-2c0772cee08d9dbe384d352f3239ef5e.yaml @@ -0,0 +1,58 @@ +id: snazzy-maps-2c0772cee08d9dbe384d352f3239ef5e + +info: + name: > + Snazzy Maps <= 1.1.4 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa355718-c08f-4a22-bf6e-697af267ad12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/snazzy-maps/" + google-query: inurl:"/wp-content/plugins/snazzy-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,snazzy-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/snazzy-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "snazzy-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/snazzyadmin-wp-admin-theme-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/snazzyadmin-wp-admin-theme-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..449a9f8047 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/snazzyadmin-wp-admin-theme-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: snazzyadmin-wp-admin-theme-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/snazzyadmin-wp-admin-theme/" + google-query: inurl:"/wp-content/plugins/snazzyadmin-wp-admin-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,snazzyadmin-wp-admin-theme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/snazzyadmin-wp-admin-theme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "snazzyadmin-wp-admin-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/snazzyadmin-wp-admin-theme-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/snazzyadmin-wp-admin-theme-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..d81dbc03c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/snazzyadmin-wp-admin-theme-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: snazzyadmin-wp-admin-theme-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/snazzyadmin-wp-admin-theme/" + google-query: inurl:"/wp-content/plugins/snazzyadmin-wp-admin-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,snazzyadmin-wp-admin-theme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/snazzyadmin-wp-admin-theme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "snazzyadmin-wp-admin-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sniplets-4361e4878576bdb762f0e4fba9f0435f.yaml b/nuclei-templates/cve-less/plugins/sniplets-4361e4878576bdb762f0e4fba9f0435f.yaml new file mode 100644 index 0000000000..a5baca3e9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sniplets-4361e4878576bdb762f0e4fba9f0435f.yaml @@ -0,0 +1,58 @@ +id: sniplets-4361e4878576bdb762f0e4fba9f0435f + +info: + name: > + Sniplets < 1.2.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfe41d6f-5026-4fcb-9ba0-a5180a03222c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sniplets/" + google-query: inurl:"/wp-content/plugins/sniplets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sniplets,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sniplets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sniplets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sniplets-4db82812dea0cad0cb375ee4495ca7c3.yaml b/nuclei-templates/cve-less/plugins/sniplets-4db82812dea0cad0cb375ee4495ca7c3.yaml new file mode 100644 index 0000000000..13453abfa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sniplets-4db82812dea0cad0cb375ee4495ca7c3.yaml @@ -0,0 +1,58 @@ +id: sniplets-4db82812dea0cad0cb375ee4495ca7c3 + +info: + name: > + Sniplets < 1.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf4d42a2-746b-4c23-b0fe-b66eafb76303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sniplets/" + google-query: inurl:"/wp-content/plugins/sniplets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sniplets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sniplets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sniplets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sniplets-5f1f84d548433ea33fa547d3daa5b883.yaml b/nuclei-templates/cve-less/plugins/sniplets-5f1f84d548433ea33fa547d3daa5b883.yaml new file mode 100644 index 0000000000..6f0dda218c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sniplets-5f1f84d548433ea33fa547d3daa5b883.yaml @@ -0,0 +1,58 @@ +id: sniplets-5f1f84d548433ea33fa547d3daa5b883 + +info: + name: > + Sniplets < 1.2.3 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e90704e-1a0c-448c-9139-542927cfa4f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sniplets/" + google-query: inurl:"/wp-content/plugins/sniplets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sniplets,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sniplets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sniplets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/snow-monkey-forms-4c37447306ccd460df466d06d390970b.yaml b/nuclei-templates/cve-less/plugins/snow-monkey-forms-4c37447306ccd460df466d06d390970b.yaml new file mode 100644 index 0000000000..aa7bd00e46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/snow-monkey-forms-4c37447306ccd460df466d06d390970b.yaml @@ -0,0 +1,58 @@ +id: snow-monkey-forms-4c37447306ccd460df466d06d390970b + +info: + name: > + Snow Monkey Forms <= 5.1.1 - Directory Traversal via 'view' REST endpiont + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83d935fc-7d7b-4c25-97f8-d3fe35307c7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/snow-monkey-forms/" + google-query: inurl:"/wp-content/plugins/snow-monkey-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,snow-monkey-forms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/snow-monkey-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "snow-monkey-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/so-audible-64658b8ae4088e2d2245fcf0b29be320.yaml b/nuclei-templates/cve-less/plugins/so-audible-64658b8ae4088e2d2245fcf0b29be320.yaml new file mode 100644 index 0000000000..cda04c3804 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/so-audible-64658b8ae4088e2d2245fcf0b29be320.yaml @@ -0,0 +1,58 @@ +id: so-audible-64658b8ae4088e2d2245fcf0b29be320 + +info: + name: > + So Audible Cloud Music Player <= 0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e252f833-3b0c-44df-969d-aff9314133b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/so-audible/" + google-query: inurl:"/wp-content/plugins/so-audible/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,so-audible,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/so-audible/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "so-audible" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/so-pinyin-slugs-8f29322bf5d9ac8d382567725e776aae.yaml b/nuclei-templates/cve-less/plugins/so-pinyin-slugs-8f29322bf5d9ac8d382567725e776aae.yaml new file mode 100644 index 0000000000..1f8d7aab02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/so-pinyin-slugs-8f29322bf5d9ac8d382567725e776aae.yaml @@ -0,0 +1,58 @@ +id: so-pinyin-slugs-8f29322bf5d9ac8d382567725e776aae + +info: + name: > + Pinyin Slugs <= 2.3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65e76681-80e0-40aa-a68b-87cb0c42b4f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/so-pinyin-slugs/" + google-query: inurl:"/wp-content/plugins/so-pinyin-slugs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,so-pinyin-slugs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/so-pinyin-slugs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "so-pinyin-slugs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/so-widgets-bundle-81727806f0ca35ac1a1911812f8bc5ed.yaml b/nuclei-templates/cve-less/plugins/so-widgets-bundle-81727806f0ca35ac1a1911812f8bc5ed.yaml new file mode 100644 index 0000000000..71279a4c48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/so-widgets-bundle-81727806f0ca35ac1a1911812f8bc5ed.yaml @@ -0,0 +1,58 @@ +id: so-widgets-bundle-81727806f0ca35ac1a1911812f8bc5ed + +info: + name: > + SiteOrigin Widgets Bundle < 1.51.0 - Authenticated (Admin+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dbdc673-b0ee-4d1d-8cd9-603056f41cda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/so-widgets-bundle/" + google-query: inurl:"/wp-content/plugins/so-widgets-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,so-widgets-bundle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/so-widgets-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "so-widgets-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.50.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/so-widgets-bundle-9b450d4afbc0c12b819c42370b2e9a09.yaml b/nuclei-templates/cve-less/plugins/so-widgets-bundle-9b450d4afbc0c12b819c42370b2e9a09.yaml new file mode 100644 index 0000000000..de784dcbc2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/so-widgets-bundle-9b450d4afbc0c12b819c42370b2e9a09.yaml @@ -0,0 +1,58 @@ +id: so-widgets-bundle-9b450d4afbc0c12b819c42370b2e9a09 + +info: + name: > + SiteOrigin Widgets Bundle <= 1.58.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f7c164f-2f78-4857-94b9-077c2dea13df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/so-widgets-bundle/" + google-query: inurl:"/wp-content/plugins/so-widgets-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,so-widgets-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/so-widgets-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "so-widgets-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.58.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/so-widgets-bundle-c33a17581ea3c88326cc98d137f0e313.yaml b/nuclei-templates/cve-less/plugins/so-widgets-bundle-c33a17581ea3c88326cc98d137f0e313.yaml new file mode 100644 index 0000000000..311cd1a371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/so-widgets-bundle-c33a17581ea3c88326cc98d137f0e313.yaml @@ -0,0 +1,58 @@ +id: so-widgets-bundle-c33a17581ea3c88326cc98d137f0e313 + +info: + name: > + SiteOrigin Widgets Bundle <= 1.58.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8b6dafb-7b2f-4459-95bd-eb7e147a4466?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/so-widgets-bundle/" + google-query: inurl:"/wp-content/plugins/so-widgets-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,so-widgets-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/so-widgets-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "so-widgets-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.58.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/so-widgets-bundle-dee8b4970935a0806a128f5493b5e0f3.yaml b/nuclei-templates/cve-less/plugins/so-widgets-bundle-dee8b4970935a0806a128f5493b5e0f3.yaml new file mode 100644 index 0000000000..ebd7e2369a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/so-widgets-bundle-dee8b4970935a0806a128f5493b5e0f3.yaml @@ -0,0 +1,58 @@ +id: so-widgets-bundle-dee8b4970935a0806a128f5493b5e0f3 + +info: + name: > + SiteOrigin Widgets Bundle <= 1.58.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e63c566d-744b-42f5-9ba6-9007cc60313a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/so-widgets-bundle/" + google-query: inurl:"/wp-content/plugins/so-widgets-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,so-widgets-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/so-widgets-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "so-widgets-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.58.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/so-widgets-bundle-e42a9ef463fb91cd20488d17488f8aed.yaml b/nuclei-templates/cve-less/plugins/so-widgets-bundle-e42a9ef463fb91cd20488d17488f8aed.yaml new file mode 100644 index 0000000000..9afcd6fa01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/so-widgets-bundle-e42a9ef463fb91cd20488d17488f8aed.yaml @@ -0,0 +1,58 @@ +id: so-widgets-bundle-e42a9ef463fb91cd20488d17488f8aed + +info: + name: > + SiteOrigin Widgets Bundle <= 1.58.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffeb766f-3684-4eec-bacb-bbf0d434aba0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/so-widgets-bundle/" + google-query: inurl:"/wp-content/plugins/so-widgets-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,so-widgets-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/so-widgets-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "so-widgets-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.58.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soccer-engine-lite-b9c46b0a4fb09a909818464ef220a0fe.yaml b/nuclei-templates/cve-less/plugins/soccer-engine-lite-b9c46b0a4fb09a909818464ef220a0fe.yaml new file mode 100644 index 0000000000..2db21e6be7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soccer-engine-lite-b9c46b0a4fb09a909818464ef220a0fe.yaml @@ -0,0 +1,58 @@ +id: soccer-engine-lite-b9c46b0a4fb09a909818464ef220a0fe + +info: + name: > + Soccer Engine – Soccer Plugin for WordPress <= 1.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57e84624-98ab-495b-b985-908302527b3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soccer-engine-lite/" + google-query: inurl:"/wp-content/plugins/soccer-engine-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soccer-engine-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soccer-engine-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soccer-engine-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sociable-4c5051d5f52547e43ba1e2683a220c8c.yaml b/nuclei-templates/cve-less/plugins/sociable-4c5051d5f52547e43ba1e2683a220c8c.yaml new file mode 100644 index 0000000000..3efa3b9172 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sociable-4c5051d5f52547e43ba1e2683a220c8c.yaml @@ -0,0 +1,58 @@ +id: sociable-4c5051d5f52547e43ba1e2683a220c8c + +info: + name: > + Sociable <= 4.3.4.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43f6a5c2-3de0-4990-89ad-64e5d866345a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sociable/" + google-query: inurl:"/wp-content/plugins/sociable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sociable,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sociable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sociable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-autho-bio-0d0deecac2c086210a1797922eb618d1.yaml b/nuclei-templates/cve-less/plugins/social-autho-bio-0d0deecac2c086210a1797922eb618d1.yaml new file mode 100644 index 0000000000..b66d4913f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-autho-bio-0d0deecac2c086210a1797922eb618d1.yaml @@ -0,0 +1,58 @@ +id: social-autho-bio-0d0deecac2c086210a1797922eb618d1 + +info: + name: > + Social Author Bio <= 2.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/603087d1-49cb-4080-b0ef-14f04dce3fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-autho-bio/" + google-query: inurl:"/wp-content/plugins/social-autho-bio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-autho-bio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-autho-bio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-autho-bio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-buttons-pack-aa3e1a0b3ade1f54e4f5b1a7d2b7227c.yaml b/nuclei-templates/cve-less/plugins/social-buttons-pack-aa3e1a0b3ade1f54e4f5b1a7d2b7227c.yaml new file mode 100644 index 0000000000..83241b23e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-buttons-pack-aa3e1a0b3ade1f54e4f5b1a7d2b7227c.yaml @@ -0,0 +1,58 @@ +id: social-buttons-pack-aa3e1a0b3ade1f54e4f5b1a7d2b7227c + +info: + name: > + Social Buttons Pack by BestWebSoft < 1.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/085b39e4-2e38-4e9d-af1a-f8981d5c6ed5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-buttons-pack/" + google-query: inurl:"/wp-content/plugins/social-buttons-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-buttons-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-buttons-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-buttons-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-connect-4382e753da7c1d916f58a427140d32b1.yaml b/nuclei-templates/cve-less/plugins/social-connect-4382e753da7c1d916f58a427140d32b1.yaml new file mode 100644 index 0000000000..dfe728a9f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-connect-4382e753da7c1d916f58a427140d32b1.yaml @@ -0,0 +1,58 @@ +id: social-connect-4382e753da7c1d916f58a427140d32b1 + +info: + name: > + Social Connect <= 0.10.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8a356db-02a2-4392-baca-46ef1bbfc801?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-connect/" + google-query: inurl:"/wp-content/plugins/social-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-connect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-connect-c1236c0c6ab8ee5053b35b87bf461df3.yaml b/nuclei-templates/cve-less/plugins/social-connect-c1236c0c6ab8ee5053b35b87bf461df3.yaml new file mode 100644 index 0000000000..1c22cfe0e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-connect-c1236c0c6ab8ee5053b35b87bf461df3.yaml @@ -0,0 +1,58 @@ +id: social-connect-c1236c0c6ab8ee5053b35b87bf461df3 + +info: + name: > + Social Connect <= 1.2 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2882d9dd-0c73-4c9a-99cb-d10900503103?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-connect/" + google-query: inurl:"/wp-content/plugins/social-connect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-connect,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-connect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-connect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-count-plus-db555c53112ae6b4ac441d3b5a76ee6d.yaml b/nuclei-templates/cve-less/plugins/social-count-plus-db555c53112ae6b4ac441d3b5a76ee6d.yaml new file mode 100644 index 0000000000..35a3b213b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-count-plus-db555c53112ae6b4ac441d3b5a76ee6d.yaml @@ -0,0 +1,58 @@ +id: social-count-plus-db555c53112ae6b4ac441d3b5a76ee6d + +info: + name: > + Social Count Plus <= 5.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35d69a35-ec19-474a-a09b-0200bfa9e1db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-count-plus/" + google-query: inurl:"/wp-content/plugins/social-count-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-count-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-count-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-count-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-discussions-d6c0976e89582e9e5113b1695c4b2cd6.yaml b/nuclei-templates/cve-less/plugins/social-discussions-d6c0976e89582e9e5113b1695c4b2cd6.yaml new file mode 100644 index 0000000000..3b88cb169b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-discussions-d6c0976e89582e9e5113b1695c4b2cd6.yaml @@ -0,0 +1,58 @@ +id: social-discussions-d6c0976e89582e9e5113b1695c4b2cd6 + +info: + name: > + Social Discussions <= 6.1.1 - Remote File Inclusion and Full Path Disclosure + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5b28fc2-4551-46dc-baa4-29ff19a1bf77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-discussions/" + google-query: inurl:"/wp-content/plugins/social-discussions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-discussions,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-discussions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-discussions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/social-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..78872b66d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: social-gallery-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-gallery-lite/" + google-query: inurl:"/wp-content/plugins/social-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-gallery-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/social-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..40031b766a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: social-gallery-lite-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-gallery-lite/" + google-query: inurl:"/wp-content/plugins/social-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-gallery-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-hashtags-941b5bba10cb296e00cbfe0b3138a5d9.yaml b/nuclei-templates/cve-less/plugins/social-hashtags-941b5bba10cb296e00cbfe0b3138a5d9.yaml new file mode 100644 index 0000000000..4737654d4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-hashtags-941b5bba10cb296e00cbfe0b3138a5d9.yaml @@ -0,0 +1,58 @@ +id: social-hashtags-941b5bba10cb296e00cbfe0b3138a5d9 + +info: + name: > + Social Hashtags <= 3.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/959ece75-b7a6-4729-abe8-1df9398d95f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-hashtags/" + google-query: inurl:"/wp-content/plugins/social-hashtags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-hashtags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-hashtags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-hashtags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-icons-widget-by-wpzoom-9590c9a713d41dcccd250e79c2d68a75.yaml b/nuclei-templates/cve-less/plugins/social-icons-widget-by-wpzoom-9590c9a713d41dcccd250e79c2d68a75.yaml new file mode 100644 index 0000000000..144ad4afba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-icons-widget-by-wpzoom-9590c9a713d41dcccd250e79c2d68a75.yaml @@ -0,0 +1,58 @@ +id: social-icons-widget-by-wpzoom-9590c9a713d41dcccd250e79c2d68a75 + +info: + name: > + Social Icons Widget & Block by WPZOOM <= 4.2.15 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27e4d27f-b943-4cb3-b38a-01192844e9ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-icons-widget-by-wpzoom/" + google-query: inurl:"/wp-content/plugins/social-icons-widget-by-wpzoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-icons-widget-by-wpzoom,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-icons-widget-by-wpzoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-icons-widget-by-wpzoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/social-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..30fe0b3f11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: social-kit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-kit/" + google-query: inurl:"/wp-content/plugins/social-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-kit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-locker-6b8f7b7b7105323e383724ec1fbf543e.yaml b/nuclei-templates/cve-less/plugins/social-locker-6b8f7b7b7105323e383724ec1fbf543e.yaml new file mode 100644 index 0000000000..2bff611527 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-locker-6b8f7b7b7105323e383724ec1fbf543e.yaml @@ -0,0 +1,58 @@ +id: social-locker-6b8f7b7b7105323e383724ec1fbf543e + +info: + name: > + OnePress Social Locker <= 5.6.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/189430b2-cf7f-46e3-b5b0-c9515b64e731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-locker/" + google-query: inurl:"/wp-content/plugins/social-locker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-locker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-locker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-locker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-locker-a5378db9ff5e403b6611ab949a2e8073.yaml b/nuclei-templates/cve-less/plugins/social-locker-a5378db9ff5e403b6611ab949a2e8073.yaml new file mode 100644 index 0000000000..47e178f271 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-locker-a5378db9ff5e403b6611ab949a2e8073.yaml @@ -0,0 +1,58 @@ +id: social-locker-a5378db9ff5e403b6611ab949a2e8073 + +info: + name: > + OnePress Social Locker < 4.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e04e2f24-ca52-4f7c-961b-f35b9ff90536?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-locker/" + google-query: inurl:"/wp-content/plugins/social-locker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-locker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-locker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-locker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-login-bws-70c3e0a35f7627ffa035ef5b1d41e423.yaml b/nuclei-templates/cve-less/plugins/social-login-bws-70c3e0a35f7627ffa035ef5b1d41e423.yaml new file mode 100644 index 0000000000..316fd56b62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-login-bws-70c3e0a35f7627ffa035ef5b1d41e423.yaml @@ -0,0 +1,58 @@ +id: social-login-bws-70c3e0a35f7627ffa035ef5b1d41e423 + +info: + name: > + Social Login by BestWebSoft <= 0.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14ee389b-8f98-4991-9a61-9da596013fea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-login-bws/" + google-query: inurl:"/wp-content/plugins/social-login-bws/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-login-bws,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-login-bws/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-login-bws" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-login-wp-338164cecd8fcca43099976a3c20b294.yaml b/nuclei-templates/cve-less/plugins/social-login-wp-338164cecd8fcca43099976a3c20b294.yaml new file mode 100644 index 0000000000..3e609e4505 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-login-wp-338164cecd8fcca43099976a3c20b294.yaml @@ -0,0 +1,58 @@ +id: social-login-wp-338164cecd8fcca43099976a3c20b294 + +info: + name: > + Social Login WP <= 5.0.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1518653c-e64d-4aba-b7f8-a928b8f2cbe3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-login-wp/" + google-query: inurl:"/wp-content/plugins/social-login-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-login-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-login-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-login-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-media-builder-d57b4e44c91b72a924430dae58b27aa4.yaml b/nuclei-templates/cve-less/plugins/social-media-builder-d57b4e44c91b72a924430dae58b27aa4.yaml new file mode 100644 index 0000000000..10e60a9f2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-media-builder-d57b4e44c91b72a924430dae58b27aa4.yaml @@ -0,0 +1,58 @@ +id: social-media-builder-d57b4e44c91b72a924430dae58b27aa4 + +info: + name: > + Social Media Share Buttons <= 2.1.0 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c17d18a-090f-4b35-a257-cfc0a16d5459?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-media-builder/" + google-query: inurl:"/wp-content/plugins/social-media-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-media-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-media-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-media-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-media-buttons-toolbar-99651f4102212266ab89ea9f71ca952d.yaml b/nuclei-templates/cve-less/plugins/social-media-buttons-toolbar-99651f4102212266ab89ea9f71ca952d.yaml new file mode 100644 index 0000000000..4ed5e25352 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-media-buttons-toolbar-99651f4102212266ab89ea9f71ca952d.yaml @@ -0,0 +1,58 @@ +id: social-media-buttons-toolbar-99651f4102212266ab89ea9f71ca952d + +info: + name: > + Social Media Follow Buttons Bar <= 4.73 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e49d389-0ae8-48e1-8ff7-67ddaa5b2867?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-media-buttons-toolbar/" + google-query: inurl:"/wp-content/plugins/social-media-buttons-toolbar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-media-buttons-toolbar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-media-buttons-toolbar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-media-buttons-toolbar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-media-feather-1588d8e6d7413910cf24de603f48ae6c.yaml b/nuclei-templates/cve-less/plugins/social-media-feather-1588d8e6d7413910cf24de603f48ae6c.yaml new file mode 100644 index 0000000000..9ed56c36e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-media-feather-1588d8e6d7413910cf24de603f48ae6c.yaml @@ -0,0 +1,58 @@ +id: social-media-feather-1588d8e6d7413910cf24de603f48ae6c + +info: + name: > + Social Media Feather <= 2.0.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6972f776-993c-4e5f-b347-5c784c42601c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-media-feather/" + google-query: inurl:"/wp-content/plugins/social-media-feather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-media-feather,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-media-feather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-media-feather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-media-feather-fb9c081792eb804457cb99e8fe8f106d.yaml b/nuclei-templates/cve-less/plugins/social-media-feather-fb9c081792eb804457cb99e8fe8f106d.yaml new file mode 100644 index 0000000000..ef5bc062d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-media-feather-fb9c081792eb804457cb99e8fe8f106d.yaml @@ -0,0 +1,58 @@ +id: social-media-feather-fb9c081792eb804457cb99e8fe8f106d + +info: + name: > + Social Media Feather <= 2.1.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4154aa02-7fa1-4858-bea7-092ec4a508ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-media-feather/" + google-query: inurl:"/wp-content/plugins/social-media-feather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-media-feather,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-media-feather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-media-feather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-media-widget-276bb0253d9d90921d2b50bb63655a6a.yaml b/nuclei-templates/cve-less/plugins/social-media-widget-276bb0253d9d90921d2b50bb63655a6a.yaml new file mode 100644 index 0000000000..6a9e5e1666 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-media-widget-276bb0253d9d90921d2b50bb63655a6a.yaml @@ -0,0 +1,58 @@ +id: social-media-widget-276bb0253d9d90921d2b50bb63655a6a + +info: + name: > + Social Media Widget 4.0 - Spam Link Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85290224-a051-4913-83c7-f54f2b67621e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-media-widget/" + google-query: inurl:"/wp-content/plugins/social-media-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-media-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-media-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-media-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-media-widget-2a26b1ebd615a5a8ab227978499778fd.yaml b/nuclei-templates/cve-less/plugins/social-media-widget-2a26b1ebd615a5a8ab227978499778fd.yaml new file mode 100644 index 0000000000..4c9d3264ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-media-widget-2a26b1ebd615a5a8ab227978499778fd.yaml @@ -0,0 +1,58 @@ +id: social-media-widget-2a26b1ebd615a5a8ab227978499778fd + +info: + name: > + Social Media Widget <= 4.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0accbee-8ab3-4e6a-b7c8-a204d681d8cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-media-widget/" + google-query: inurl:"/wp-content/plugins/social-media-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-media-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-media-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-media-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-metrics-6685df96c78b040fc19a70ee58d84842.yaml b/nuclei-templates/cve-less/plugins/social-metrics-6685df96c78b040fc19a70ee58d84842.yaml new file mode 100644 index 0000000000..209241dc81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-metrics-6685df96c78b040fc19a70ee58d84842.yaml @@ -0,0 +1,58 @@ +id: social-metrics-6685df96c78b040fc19a70ee58d84842 + +info: + name: > + Social Metrics <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3267339-2f28-40b9-b6ff-fdfe0d67bdc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-metrics/" + google-query: inurl:"/wp-content/plugins/social-metrics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-metrics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-metrics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-metrics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-network-tabs-b4a4ad1fab127bb574b5a124686073ff.yaml b/nuclei-templates/cve-less/plugins/social-network-tabs-b4a4ad1fab127bb574b5a124686073ff.yaml new file mode 100644 index 0000000000..840c7bc992 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-network-tabs-b4a4ad1fab127bb574b5a124686073ff.yaml @@ -0,0 +1,58 @@ +id: social-network-tabs-b4a4ad1fab127bb574b5a124686073ff + +info: + name: > + Social Network Tabs - Social Media API Key Leakage <= 1.7.1 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd58a528-4c01-407d-b3f9-99c0817e9820?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-network-tabs/" + google-query: inurl:"/wp-content/plugins/social-network-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-network-tabs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-network-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-network-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-00a3fc8db4a9ccf9c23a6b373ee7039a.yaml b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-00a3fc8db4a9ccf9c23a6b373ee7039a.yaml new file mode 100644 index 0000000000..0c01499ec8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-00a3fc8db4a9ccf9c23a6b373ee7039a.yaml @@ -0,0 +1,58 @@ +id: social-networks-auto-poster-facebook-twitter-g-00a3fc8db4a9ccf9c23a6b373ee7039a + +info: + name: > + NextScripts: Social Networks Auto-Poster <= 4.3.24 - Arbitrary Post Deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/418e1f3b-ca99-4576-add9-d6134ba3869d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + google-query: inurl:"/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-networks-auto-poster-facebook-twitter-g,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-networks-auto-poster-facebook-twitter-g" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-0a3b3d0ea7c2929f39d0e12eda2eee2b.yaml b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-0a3b3d0ea7c2929f39d0e12eda2eee2b.yaml new file mode 100644 index 0000000000..f2bf7abeca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-0a3b3d0ea7c2929f39d0e12eda2eee2b.yaml @@ -0,0 +1,58 @@ +id: social-networks-auto-poster-facebook-twitter-g-0a3b3d0ea7c2929f39d0e12eda2eee2b + +info: + name: > + NextScripts: Social Networks Auto-Poster <= 4.3.23 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0c1e62-1a1c-4a76-bd99-7ede232dc965?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + google-query: inurl:"/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-networks-auto-poster-facebook-twitter-g,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-networks-auto-poster-facebook-twitter-g" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-0d23421a7bc38a06fa339a0b7dfcab21.yaml b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-0d23421a7bc38a06fa339a0b7dfcab21.yaml new file mode 100644 index 0000000000..6d4036397d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-0d23421a7bc38a06fa339a0b7dfcab21.yaml @@ -0,0 +1,58 @@ +id: social-networks-auto-poster-facebook-twitter-g-0d23421a7bc38a06fa339a0b7dfcab21 + +info: + name: > + NextScripts: Social Networks Auto-Poster <= 3.4.17 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d2df49d-0276-403d-9fe8-00fdf7262818?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + google-query: inurl:"/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-networks-auto-poster-facebook-twitter-g,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-networks-auto-poster-facebook-twitter-g" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-26e31433d5fce5f379c3acf232bae66e.yaml b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-26e31433d5fce5f379c3acf232bae66e.yaml new file mode 100644 index 0000000000..3bb6e45572 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-26e31433d5fce5f379c3acf232bae66e.yaml @@ -0,0 +1,58 @@ +id: social-networks-auto-poster-facebook-twitter-g-26e31433d5fce5f379c3acf232bae66e + +info: + name: > + NextScripts: Social Networks Auto-Poster <= 4.2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3781245-14b1-4b1c-a471-a5a413cdb2ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + google-query: inurl:"/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-networks-auto-poster-facebook-twitter-g,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-networks-auto-poster-facebook-twitter-g" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-51832005d17a1bf5560310c763dc4026.yaml b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-51832005d17a1bf5560310c763dc4026.yaml new file mode 100644 index 0000000000..da56c4eed9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-51832005d17a1bf5560310c763dc4026.yaml @@ -0,0 +1,58 @@ +id: social-networks-auto-poster-facebook-twitter-g-51832005d17a1bf5560310c763dc4026 + +info: + name: > + NextScripts: Social Networks Auto-Poster <= 4.3.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f715a80-ec70-4f1e-8ec9-c6f70173e5d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + google-query: inurl:"/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-networks-auto-poster-facebook-twitter-g,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-networks-auto-poster-facebook-twitter-g" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-78405f03bea86dc35a1c5e66198ba314.yaml b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-78405f03bea86dc35a1c5e66198ba314.yaml new file mode 100644 index 0000000000..f288a78c98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-78405f03bea86dc35a1c5e66198ba314.yaml @@ -0,0 +1,58 @@ +id: social-networks-auto-poster-facebook-twitter-g-78405f03bea86dc35a1c5e66198ba314 + +info: + name: > + NextScripts: Social Networks Auto-Poster <= 4.3.17 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3709465d-6d67-45bd-abb9-4875065b8129?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + google-query: inurl:"/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-networks-auto-poster-facebook-twitter-g,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-networks-auto-poster-facebook-twitter-g" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-c00ddbff9a00f61bfe31a00b389503a1.yaml b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-c00ddbff9a00f61bfe31a00b389503a1.yaml new file mode 100644 index 0000000000..d9524bf5d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-c00ddbff9a00f61bfe31a00b389503a1.yaml @@ -0,0 +1,58 @@ +id: social-networks-auto-poster-facebook-twitter-g-c00ddbff9a00f61bfe31a00b389503a1 + +info: + name: > + NextScripts: Social Networks Auto-Poster <= 4.3.25 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/752caefe-7e87-4d4f-89e0-fbd28e4076c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + google-query: inurl:"/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-networks-auto-poster-facebook-twitter-g,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-networks-auto-poster-facebook-twitter-g" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-eb56bf16494883e891ab8b3be05b8bf5.yaml b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-eb56bf16494883e891ab8b3be05b8bf5.yaml new file mode 100644 index 0000000000..a980287d86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-networks-auto-poster-facebook-twitter-g-eb56bf16494883e891ab8b3be05b8bf5.yaml @@ -0,0 +1,58 @@ +id: social-networks-auto-poster-facebook-twitter-g-eb56bf16494883e891ab8b3be05b8bf5 + +info: + name: > + NextScripts <= 4.4.2 - Reflected Cross-Site Scripting via code + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15f00b65-8304-4132-a2cf-8145444ecfb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + google-query: inurl:"/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-networks-auto-poster-facebook-twitter-g,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-networks-auto-poster-facebook-twitter-g/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-networks-auto-poster-facebook-twitter-g" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-photo-gallery-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml b/nuclei-templates/cve-less/plugins/social-photo-gallery-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml new file mode 100644 index 0000000000..55a758db2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-photo-gallery-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml @@ -0,0 +1,58 @@ +id: social-photo-gallery-d26dfd7d1dd47d6fd5993a9ac9d20c15 + +info: + name: > + Social Photo Gallery <= 1.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/546976ff-eabe-4d24-b106-b8e66b7c2c5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-photo-gallery/" + google-query: inurl:"/wp-content/plugins/social-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-photo-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-polls-by-opinionstage-fad318487dd970b284385e44520c85d8.yaml b/nuclei-templates/cve-less/plugins/social-polls-by-opinionstage-fad318487dd970b284385e44520c85d8.yaml new file mode 100644 index 0000000000..08c9ba3e97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-polls-by-opinionstage-fad318487dd970b284385e44520c85d8.yaml @@ -0,0 +1,58 @@ +id: social-polls-by-opinionstage-fad318487dd970b284385e44520c85d8 + +info: + name: > + Poll, Survey & Quiz Maker Plugin by Opinion Stage <= 19.6.24 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0f19403-af02-4a29-b4f3-778da4c2df17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-polls-by-opinionstage/" + google-query: inurl:"/wp-content/plugins/social-polls-by-opinionstage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-polls-by-opinionstage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-polls-by-opinionstage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-polls-by-opinionstage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.6.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-proof-testimonials-slider-f60d70179169d7470d698c285c73d2aa.yaml b/nuclei-templates/cve-less/plugins/social-proof-testimonials-slider-f60d70179169d7470d698c285c73d2aa.yaml new file mode 100644 index 0000000000..e9127d24b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-proof-testimonials-slider-f60d70179169d7470d698c285c73d2aa.yaml @@ -0,0 +1,58 @@ +id: social-proof-testimonials-slider-f60d70179169d7470d698c285c73d2aa + +info: + name: > + Social Proof (Testimonial) Slider <= 2.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e324cd49-beaf-44bf-8890-5377731f0cc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-proof-testimonials-slider/" + google-query: inurl:"/wp-content/plugins/social-proof-testimonials-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-proof-testimonials-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-proof-testimonials-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-proof-testimonials-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-pug-010c78c3e5a7548cd6f10c07c7e5988f.yaml b/nuclei-templates/cve-less/plugins/social-pug-010c78c3e5a7548cd6f10c07c7e5988f.yaml new file mode 100644 index 0000000000..2a9d378ad3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-pug-010c78c3e5a7548cd6f10c07c7e5988f.yaml @@ -0,0 +1,58 @@ +id: social-pug-010c78c3e5a7548cd6f10c07c7e5988f + +info: + name: > + Grow Social <= 1.18.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d24c9310-5470-4d08-83b3-c801f4d25d3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-pug/" + google-query: inurl:"/wp-content/plugins/social-pug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-pug,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-pug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-pug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-pug-1553916233de2092a6a61d801beae073.yaml b/nuclei-templates/cve-less/plugins/social-pug-1553916233de2092a6a61d801beae073.yaml new file mode 100644 index 0000000000..699d7b8e52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-pug-1553916233de2092a6a61d801beae073.yaml @@ -0,0 +1,58 @@ +id: social-pug-1553916233de2092a6a61d801beae073 + +info: + name: > + Hubbub Lite – Fast, Reliable Social Network Sharing Buttons <= 1.33.1 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3999c59-57a9-410c-a550-7d198bdb25ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-pug/" + google-query: inurl:"/wp-content/plugins/social-pug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-pug,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-pug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-pug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.33.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-pug-614c612f12b893f0f92f502ce23d7035.yaml b/nuclei-templates/cve-less/plugins/social-pug-614c612f12b893f0f92f502ce23d7035.yaml new file mode 100644 index 0000000000..7e908feade --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-pug-614c612f12b893f0f92f502ce23d7035.yaml @@ -0,0 +1,58 @@ +id: social-pug-614c612f12b893f0f92f502ce23d7035 + +info: + name: > + Social Pug <= 1.30.0 - Missing Authorization via multiple admin_init actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22b17fcb-0c97-462d-b67c-6da2919478d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-pug/" + google-query: inurl:"/wp-content/plugins/social-pug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-pug,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-pug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-pug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.30.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-pug-870c7bd1810589217dfd341e2045182a.yaml b/nuclei-templates/cve-less/plugins/social-pug-870c7bd1810589217dfd341e2045182a.yaml new file mode 100644 index 0000000000..783f8f50d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-pug-870c7bd1810589217dfd341e2045182a.yaml @@ -0,0 +1,58 @@ +id: social-pug-870c7bd1810589217dfd341e2045182a + +info: + name: > + Hubbub Lite <= 1.31.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2290b13e-a5c6-4ec7-86c0-f2cd2a880e8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-pug/" + google-query: inurl:"/wp-content/plugins/social-pug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-pug,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-pug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-pug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-pug-b2adf01153d5956e8d9a8d75b32e133c.yaml b/nuclei-templates/cve-less/plugins/social-pug-b2adf01153d5956e8d9a8d75b32e133c.yaml new file mode 100644 index 0000000000..3d95d16b5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-pug-b2adf01153d5956e8d9a8d75b32e133c.yaml @@ -0,0 +1,58 @@ +id: social-pug-b2adf01153d5956e8d9a8d75b32e133c + +info: + name: > + Hubbub Lite <= 1.31.0 - Unauthenticated Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8bb8b3-59a6-424a-bc7b-b8740c936637?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-pug/" + google-query: inurl:"/wp-content/plugins/social-pug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-pug,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-pug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-pug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.33.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-pug-f0354930e8182da4de2a1a00399f0307.yaml b/nuclei-templates/cve-less/plugins/social-pug-f0354930e8182da4de2a1a00399f0307.yaml new file mode 100644 index 0000000000..7fff84b981 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-pug-f0354930e8182da4de2a1a00399f0307.yaml @@ -0,0 +1,58 @@ +id: social-pug-f0354930e8182da4de2a1a00399f0307 + +info: + name: > + Grow Social <= 1.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c402fcf-0c02-4a5e-89a9-8a1ddaa630d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-pug/" + google-query: inurl:"/wp-content/plugins/social-pug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-pug,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-pug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-pug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-rocket-219e55994660c3c36e84474ca074be21.yaml b/nuclei-templates/cve-less/plugins/social-rocket-219e55994660c3c36e84474ca074be21.yaml new file mode 100644 index 0000000000..2a51cd55d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-rocket-219e55994660c3c36e84474ca074be21.yaml @@ -0,0 +1,58 @@ +id: social-rocket-219e55994660c3c36e84474ca074be21 + +info: + name: > + Social Rocket <= 1.2.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e8060bc-900f-4f2d-a24e-13dc1d830fc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-rocket/" + google-query: inurl:"/wp-content/plugins/social-rocket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-rocket,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-rocket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-rocket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-rocket-d503115e692639756bb3a2ffdde34c03.yaml b/nuclei-templates/cve-less/plugins/social-rocket-d503115e692639756bb3a2ffdde34c03.yaml new file mode 100644 index 0000000000..b1be202191 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-rocket-d503115e692639756bb3a2ffdde34c03.yaml @@ -0,0 +1,58 @@ +id: social-rocket-d503115e692639756bb3a2ffdde34c03 + +info: + name: > + Social Rocket <= 1.3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e4f2725-6c93-40df-93ee-51997a4ad189?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-rocket/" + google-query: inurl:"/wp-content/plugins/social-rocket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-rocket,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-rocket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-rocket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-boost-362e89b41145042eb5431e45e53b6db2.yaml b/nuclei-templates/cve-less/plugins/social-share-boost-362e89b41145042eb5431e45e53b6db2.yaml new file mode 100644 index 0000000000..da77fb4453 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-boost-362e89b41145042eb5431e45e53b6db2.yaml @@ -0,0 +1,58 @@ +id: social-share-boost-362e89b41145042eb5431e45e53b6db2 + +info: + name: > + Social Share Boost <= 4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via ssboost shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9290532f-58d7-4e7d-9fa0-89c7f82b0466?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-boost/" + google-query: inurl:"/wp-content/plugins/social-share-boost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-boost,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-boost/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-boost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-boost-68edca1ac76c8646936a8dc6a3f4659d.yaml b/nuclei-templates/cve-less/plugins/social-share-boost-68edca1ac76c8646936a8dc6a3f4659d.yaml new file mode 100644 index 0000000000..f31c7787c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-boost-68edca1ac76c8646936a8dc6a3f4659d.yaml @@ -0,0 +1,58 @@ +id: social-share-boost-68edca1ac76c8646936a8dc6a3f4659d + +info: + name: > + Social Share Boost <= 4.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d09e93-8503-41e8-85d3-8550dc8f85bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-boost/" + google-query: inurl:"/wp-content/plugins/social-share-boost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-boost,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-boost/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-boost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-boost-bcdb06e3079fdbbb06462441ceb79bc4.yaml b/nuclei-templates/cve-less/plugins/social-share-boost-bcdb06e3079fdbbb06462441ceb79bc4.yaml new file mode 100644 index 0000000000..46c8634f6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-boost-bcdb06e3079fdbbb06462441ceb79bc4.yaml @@ -0,0 +1,58 @@ +id: social-share-boost-bcdb06e3079fdbbb06462441ceb79bc4 + +info: + name: > + Social Share Boost <= 4.5 - Cross-Site Request Forgery via 'syntatical_settings_content' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53a265b8-e34c-4683-a653-4b4b2410e9de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-boost/" + google-query: inurl:"/wp-content/plugins/social-share-boost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-boost,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-boost/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-boost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-button-de24827a638a2efce744c6eade7a73f3.yaml b/nuclei-templates/cve-less/plugins/social-share-button-de24827a638a2efce744c6eade7a73f3.yaml new file mode 100644 index 0000000000..0e172f8097 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-button-de24827a638a2efce744c6eade7a73f3.yaml @@ -0,0 +1,58 @@ +id: social-share-button-de24827a638a2efce744c6eade7a73f3 + +info: + name: > + Social Share Button <= 2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cfdb6de-41f8-4bea-a017-5708fceee762?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-button/" + google-query: inurl:"/wp-content/plugins/social-share-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-50f3815a7306e514f6cb6f2669b958ed.yaml b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-50f3815a7306e514f6cb6f2669b958ed.yaml new file mode 100644 index 0000000000..3da2fedf2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-50f3815a7306e514f6cb6f2669b958ed.yaml @@ -0,0 +1,58 @@ +id: social-share-buttons-by-supsystic-50f3815a7306e514f6cb6f2669b958ed + +info: + name: > + Social Share Buttons by Supsystic <= 2.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab693b1f-2842-4101-99f3-eaf5b7bf5d83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-buttons-by-supsystic/" + google-query: inurl:"/wp-content/plugins/social-share-buttons-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-buttons-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-buttons-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-buttons-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-aa18dc73a5ad2f3458b2829a667a4dbe.yaml b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-aa18dc73a5ad2f3458b2829a667a4dbe.yaml new file mode 100644 index 0000000000..35946a916e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-aa18dc73a5ad2f3458b2829a667a4dbe.yaml @@ -0,0 +1,58 @@ +id: social-share-buttons-by-supsystic-aa18dc73a5ad2f3458b2829a667a4dbe + +info: + name: > + Social Share Buttons by Supsystic <= 2.2.3 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3702218f-a5ad-4244-874f-53b49cc9491c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-buttons-by-supsystic/" + google-query: inurl:"/wp-content/plugins/social-share-buttons-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-buttons-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-buttons-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-buttons-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-cda45d54f4a107e20020517047ad5ad6.yaml b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-cda45d54f4a107e20020517047ad5ad6.yaml new file mode 100644 index 0000000000..670b8a78d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-cda45d54f4a107e20020517047ad5ad6.yaml @@ -0,0 +1,58 @@ +id: social-share-buttons-by-supsystic-cda45d54f4a107e20020517047ad5ad6 + +info: + name: > + Social Share Buttons by Supsystic <= 2.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c43c8c01-3f8a-4ae4-8113-d410850e721d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-buttons-by-supsystic/" + google-query: inurl:"/wp-content/plugins/social-share-buttons-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-buttons-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-buttons-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-buttons-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-daf56c568297c549e428734f0390b5eb.yaml b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-daf56c568297c549e428734f0390b5eb.yaml new file mode 100644 index 0000000000..ff908da741 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-daf56c568297c549e428734f0390b5eb.yaml @@ -0,0 +1,58 @@ +id: social-share-buttons-by-supsystic-daf56c568297c549e428734f0390b5eb + +info: + name: > + Social Share Buttons by Supsystic <= 2.2.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c81117-a9da-41bb-afc6-94196167af04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-buttons-by-supsystic/" + google-query: inurl:"/wp-content/plugins/social-share-buttons-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-buttons-by-supsystic,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-buttons-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-buttons-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-db671b595a6de4259366a24bfd717a43.yaml b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-db671b595a6de4259366a24bfd717a43.yaml new file mode 100644 index 0000000000..5c4a9be7eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-share-buttons-by-supsystic-db671b595a6de4259366a24bfd717a43.yaml @@ -0,0 +1,58 @@ +id: social-share-buttons-by-supsystic-db671b595a6de4259366a24bfd717a43 + +info: + name: > + Social Share Buttons by Supsystic <= 2.2.3 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac1c4818-6384-48cf-a1e3-a8ced6884749?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-share-buttons-by-supsystic/" + google-query: inurl:"/wp-content/plugins/social-share-buttons-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-share-buttons-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-share-buttons-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-share-buttons-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-sharing-toolkit-b594ed2c30b3954ae4ee7c97ed6645b0.yaml b/nuclei-templates/cve-less/plugins/social-sharing-toolkit-b594ed2c30b3954ae4ee7c97ed6645b0.yaml new file mode 100644 index 0000000000..279832bf15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-sharing-toolkit-b594ed2c30b3954ae4ee7c97ed6645b0.yaml @@ -0,0 +1,58 @@ +id: social-sharing-toolkit-b594ed2c30b3954ae4ee7c97ed6645b0 + +info: + name: > + Social Sharing Toolkit <= 2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6594b5ba-57e4-4ef1-93b9-ac1e90ed13be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-sharing-toolkit/" + google-query: inurl:"/wp-content/plugins/social-sharing-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-sharing-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-sharing-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-sharing-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-sharing-toolkit-dcf043d6af78599175beab95bc8309bb.yaml b/nuclei-templates/cve-less/plugins/social-sharing-toolkit-dcf043d6af78599175beab95bc8309bb.yaml new file mode 100644 index 0000000000..aea93f41d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-sharing-toolkit-dcf043d6af78599175beab95bc8309bb.yaml @@ -0,0 +1,58 @@ +id: social-sharing-toolkit-dcf043d6af78599175beab95bc8309bb + +info: + name: > + Social Sharing Toolkit < 2.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14fb6cde-3ab5-4360-add2-c0b0fa4ca114?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-sharing-toolkit/" + google-query: inurl:"/wp-content/plugins/social-sharing-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-sharing-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-sharing-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-sharing-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-sharing-toolkit-fab081bdfce9f805f8a61feef8468916.yaml b/nuclei-templates/cve-less/plugins/social-sharing-toolkit-fab081bdfce9f805f8a61feef8468916.yaml new file mode 100644 index 0000000000..d358b47524 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-sharing-toolkit-fab081bdfce9f805f8a61feef8468916.yaml @@ -0,0 +1,58 @@ +id: social-sharing-toolkit-fab081bdfce9f805f8a61feef8468916 + +info: + name: > + Social Sharing Toolkit <= 2.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/319e9662-e010-469d-bf04-ee5895077db6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-sharing-toolkit/" + google-query: inurl:"/wp-content/plugins/social-sharing-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-sharing-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-sharing-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-sharing-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-slider-fb94da76ff281a4e13dbc1c86ed0929d.yaml b/nuclei-templates/cve-less/plugins/social-slider-fb94da76ff281a4e13dbc1c86ed0929d.yaml new file mode 100644 index 0000000000..c94de9fc01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-slider-fb94da76ff281a4e13dbc1c86ed0929d.yaml @@ -0,0 +1,58 @@ +id: social-slider-fb94da76ff281a4e13dbc1c86ed0929d + +info: + name: > + Social Slider < 7.4.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dce15ea-70cf-4b4c-959a-8adf2cdcdca4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-slider/" + google-query: inurl:"/wp-content/plugins/social-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-slider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-stickers-54c5f87c18eece344632707c2a248764.yaml b/nuclei-templates/cve-less/plugins/social-stickers-54c5f87c18eece344632707c2a248764.yaml new file mode 100644 index 0000000000..b33d1b243a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-stickers-54c5f87c18eece344632707c2a248764.yaml @@ -0,0 +1,58 @@ +id: social-stickers-54c5f87c18eece344632707c2a248764 + +info: + name: > + Social Stickers <= 2.2.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad5ca2a1-06ac-4f26-9ecb-bb861c035f57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-stickers/" + google-query: inurl:"/wp-content/plugins/social-stickers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-stickers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-stickers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-stickers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-tape-f65f1ef88d2d62f17ad5f25db5f837fc.yaml b/nuclei-templates/cve-less/plugins/social-tape-f65f1ef88d2d62f17ad5f25db5f837fc.yaml new file mode 100644 index 0000000000..7b993b3255 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-tape-f65f1ef88d2d62f17ad5f25db5f837fc.yaml @@ -0,0 +1,58 @@ +id: social-tape-f65f1ef88d2d62f17ad5f25db5f837fc + +info: + name: > + Social Tape <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5ac584-61e4-4318-9e8d-9b5a7f1daf3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-tape/" + google-query: inurl:"/wp-content/plugins/social-tape/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-tape,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-tape/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-tape" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-testimonials-and-reviews-widget-109bcc0df2db9108727b125f1715f024.yaml b/nuclei-templates/cve-less/plugins/social-testimonials-and-reviews-widget-109bcc0df2db9108727b125f1715f024.yaml new file mode 100644 index 0000000000..0a8f6bc9a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-testimonials-and-reviews-widget-109bcc0df2db9108727b125f1715f024.yaml @@ -0,0 +1,58 @@ +id: social-testimonials-and-reviews-widget-109bcc0df2db9108727b125f1715f024 + +info: + name: > + Social proof testimonials and reviews by Repuso <= 4.97 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec311df2-33af-4b91-80a1-252d934c7f61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-testimonials-and-reviews-widget/" + google-query: inurl:"/wp-content/plugins/social-testimonials-and-reviews-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-testimonials-and-reviews-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-testimonials-and-reviews-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-testimonials-and-reviews-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.97') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-testimonials-and-reviews-widget-cfc720059dcf0db5379f24aec3318afb.yaml b/nuclei-templates/cve-less/plugins/social-testimonials-and-reviews-widget-cfc720059dcf0db5379f24aec3318afb.yaml new file mode 100644 index 0000000000..66d85dcffd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-testimonials-and-reviews-widget-cfc720059dcf0db5379f24aec3318afb.yaml @@ -0,0 +1,58 @@ +id: social-testimonials-and-reviews-widget-cfc720059dcf0db5379f24aec3318afb + +info: + name: > + Social proof testimonials and reviews by Repuso <= 5.01 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/526aa2e5-06bd-4b4c-a331-315f8ab37858?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-testimonials-and-reviews-widget/" + google-query: inurl:"/wp-content/plugins/social-testimonials-and-reviews-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-testimonials-and-reviews-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-testimonials-and-reviews-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-testimonials-and-reviews-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-warfare-18ca8dc6d6eaaf78aee24ea0452c8428.yaml b/nuclei-templates/cve-less/plugins/social-warfare-18ca8dc6d6eaaf78aee24ea0452c8428.yaml new file mode 100644 index 0000000000..5ea256de9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-warfare-18ca8dc6d6eaaf78aee24ea0452c8428.yaml @@ -0,0 +1,58 @@ +id: social-warfare-18ca8dc6d6eaaf78aee24ea0452c8428 + +info: + name: > + Social Warfare <= 3.5.2 - Unauthenticated Arbitrary Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fca8dba-9fe7-4ce1-8903-589e42e5604d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-warfare/" + google-query: inurl:"/wp-content/plugins/social-warfare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-warfare,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-warfare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-warfare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-warfare-357fbb3649272b57b08a032d33621319.yaml b/nuclei-templates/cve-less/plugins/social-warfare-357fbb3649272b57b08a032d33621319.yaml new file mode 100644 index 0000000000..2a3f842f77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-warfare-357fbb3649272b57b08a032d33621319.yaml @@ -0,0 +1,58 @@ +id: social-warfare-357fbb3649272b57b08a032d33621319 + +info: + name: > + Social Warfare <= 4.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bc4ba2c-32eb-46c5-bb40-7c0150fc1ca4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-warfare/" + google-query: inurl:"/wp-content/plugins/social-warfare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-warfare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-warfare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-warfare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-warfare-aa4bf5d698c5cb8e5401cc2cfa4e07c6.yaml b/nuclei-templates/cve-less/plugins/social-warfare-aa4bf5d698c5cb8e5401cc2cfa4e07c6.yaml new file mode 100644 index 0000000000..62019937ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-warfare-aa4bf5d698c5cb8e5401cc2cfa4e07c6.yaml @@ -0,0 +1,58 @@ +id: social-warfare-aa4bf5d698c5cb8e5401cc2cfa4e07c6 + +info: + name: > + Social Sharing Plugin - Social Warfare <= 4.4.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f5b9aff-0833-4887-ae59-df5bc88c7f91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-warfare/" + google-query: inurl:"/wp-content/plugins/social-warfare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-warfare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-warfare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-warfare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-warfare-cf2b6bb9f998ed8bc8db5b63bcf57bd0.yaml b/nuclei-templates/cve-less/plugins/social-warfare-cf2b6bb9f998ed8bc8db5b63bcf57bd0.yaml new file mode 100644 index 0000000000..3aca72b752 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-warfare-cf2b6bb9f998ed8bc8db5b63bcf57bd0.yaml @@ -0,0 +1,58 @@ +id: social-warfare-cf2b6bb9f998ed8bc8db5b63bcf57bd0 + +info: + name: > + Social Sharing Plugin – Social Warfare <= 4.4.6.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1016f16c-0ab2-4cac-a7a5-8d93a37e7894?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-warfare/" + google-query: inurl:"/wp-content/plugins/social-warfare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-warfare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-warfare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-warfare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-warfare-cf38fe10bb49e0d1d6d84b988c9ef72b.yaml b/nuclei-templates/cve-less/plugins/social-warfare-cf38fe10bb49e0d1d6d84b988c9ef72b.yaml new file mode 100644 index 0000000000..ebbb1e8ab9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-warfare-cf38fe10bb49e0d1d6d84b988c9ef72b.yaml @@ -0,0 +1,58 @@ +id: social-warfare-cf38fe10bb49e0d1d6d84b988c9ef72b + +info: + name: > + Social Warfare <= 3.5.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98cf2a10-cc53-4479-87d1-71489f6a8c51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-warfare/" + google-query: inurl:"/wp-content/plugins/social-warfare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-warfare,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-warfare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-warfare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/social-warfare-f488a9133074cf6ace7e478b0a192bb6.yaml b/nuclei-templates/cve-less/plugins/social-warfare-f488a9133074cf6ace7e478b0a192bb6.yaml new file mode 100644 index 0000000000..c9807970d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/social-warfare-f488a9133074cf6ace7e478b0a192bb6.yaml @@ -0,0 +1,58 @@ +id: social-warfare-f488a9133074cf6ace7e478b0a192bb6 + +info: + name: > + Social Warfare <= 4.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a36d1bb1-9446-4042-a1ec-08a3ffdcb744?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/social-warfare/" + google-query: inurl:"/wp-content/plugins/social-warfare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,social-warfare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/social-warfare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "social-warfare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/socialdriver-7c3165415d7bf963906af20d2c357430.yaml b/nuclei-templates/cve-less/plugins/socialdriver-7c3165415d7bf963906af20d2c357430.yaml new file mode 100644 index 0000000000..b2599d6e8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/socialdriver-7c3165415d7bf963906af20d2c357430.yaml @@ -0,0 +1,58 @@ +id: socialdriver-7c3165415d7bf963906af20d2c357430 + +info: + name: > + SocialDriver < 2024 - Prototype Pollution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24ac60fe-d751-43c7-89c1-5c0c9651e8f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/socialdriver/" + google-query: inurl:"/wp-content/plugins/socialdriver/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,socialdriver,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/socialdriver/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "socialdriver" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2024') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/socialgrid-ee08b0491d28739787eab972fee61b21.yaml b/nuclei-templates/cve-less/plugins/socialgrid-ee08b0491d28739787eab972fee61b21.yaml new file mode 100644 index 0000000000..ec87440ba7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/socialgrid-ee08b0491d28739787eab972fee61b21.yaml @@ -0,0 +1,58 @@ +id: socialgrid-ee08b0491d28739787eab972fee61b21 + +info: + name: > + SocialGrid <= 2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b7ab27f-566f-46f4-9c8e-aedfa3410dec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/socialgrid/" + google-query: inurl:"/wp-content/plugins/socialgrid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,socialgrid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/socialgrid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "socialgrid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/socialmark-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/socialmark-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..37309e720a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/socialmark-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: socialmark-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/socialmark/" + google-query: inurl:"/wp-content/plugins/socialmark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,socialmark,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/socialmark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "socialmark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/socialsnap-7cc4115eca0cf9c161547f1b88d6e0eb.yaml b/nuclei-templates/cve-less/plugins/socialsnap-7cc4115eca0cf9c161547f1b88d6e0eb.yaml new file mode 100644 index 0000000000..df835e91a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/socialsnap-7cc4115eca0cf9c161547f1b88d6e0eb.yaml @@ -0,0 +1,58 @@ +id: socialsnap-7cc4115eca0cf9c161547f1b88d6e0eb + +info: + name: > + Social Snap <= 1.3.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b69122e2-1af6-4425-9c25-48d7682417f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/socialsnap/" + google-query: inurl:"/wp-content/plugins/socialsnap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,socialsnap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/socialsnap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "socialsnap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sodahead-polls-18fe02250ff137adf75ad3081c09ea5f.yaml b/nuclei-templates/cve-less/plugins/sodahead-polls-18fe02250ff137adf75ad3081c09ea5f.yaml new file mode 100644 index 0000000000..332b3af501 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sodahead-polls-18fe02250ff137adf75ad3081c09ea5f.yaml @@ -0,0 +1,58 @@ +id: sodahead-polls-18fe02250ff137adf75ad3081c09ea5f + +info: + name: > + SodaHead Polls < 2.0.4 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75a5853a-7497-4312-b7e1-e21b1425dc05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sodahead-polls/" + google-query: inurl:"/wp-content/plugins/sodahead-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sodahead-polls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sodahead-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sodahead-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/software-license-manager-664ca2d87dcbd63deac8c49c5554db17.yaml b/nuclei-templates/cve-less/plugins/software-license-manager-664ca2d87dcbd63deac8c49c5554db17.yaml new file mode 100644 index 0000000000..6ff8f0943c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/software-license-manager-664ca2d87dcbd63deac8c49c5554db17.yaml @@ -0,0 +1,58 @@ +id: software-license-manager-664ca2d87dcbd63deac8c49c5554db17 + +info: + name: > + Software License Manager <= 4.5.0 - Cross-Site Request Forgery leading to Arbitrary Domain Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/484ad4ef-9d0d-4dc5-8bb4-d81d0311ebf8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/software-license-manager/" + google-query: inurl:"/wp-content/plugins/software-license-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,software-license-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/software-license-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "software-license-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/software-license-manager-b0e0ed74ea2c963635231dd123335584.yaml b/nuclei-templates/cve-less/plugins/software-license-manager-b0e0ed74ea2c963635231dd123335584.yaml new file mode 100644 index 0000000000..35ef891130 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/software-license-manager-b0e0ed74ea2c963635231dd123335584.yaml @@ -0,0 +1,58 @@ +id: software-license-manager-b0e0ed74ea2c963635231dd123335584 + +info: + name: > + Software License Manager < 4.4.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54852b3d-9830-491d-aa41-bc2bf763a55d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/software-license-manager/" + google-query: inurl:"/wp-content/plugins/software-license-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,software-license-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/software-license-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "software-license-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/software-license-manager-c4fee1f627e8de419abb2cb77fa742f7.yaml b/nuclei-templates/cve-less/plugins/software-license-manager-c4fee1f627e8de419abb2cb77fa742f7.yaml new file mode 100644 index 0000000000..080e9010bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/software-license-manager-c4fee1f627e8de419abb2cb77fa742f7.yaml @@ -0,0 +1,58 @@ +id: software-license-manager-c4fee1f627e8de419abb2cb77fa742f7 + +info: + name: > + Software License Manager <= 4.4.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89209bcb-c74d-4bf9-b1a8-5b529f4d73be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/software-license-manager/" + google-query: inurl:"/wp-content/plugins/software-license-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,software-license-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/software-license-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "software-license-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/software-license-manager-c95ffe646d0a761b10647658a7c40d15.yaml b/nuclei-templates/cve-less/plugins/software-license-manager-c95ffe646d0a761b10647658a7c40d15.yaml new file mode 100644 index 0000000000..75d877f004 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/software-license-manager-c95ffe646d0a761b10647658a7c40d15.yaml @@ -0,0 +1,58 @@ +id: software-license-manager-c95ffe646d0a761b10647658a7c40d15 + +info: + name: > + Software License Manager <= 4.4.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95633f-b5e1-4a92-b566-90fb05a289ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/software-license-manager/" + google-query: inurl:"/wp-content/plugins/software-license-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,software-license-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/software-license-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "software-license-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soisy-pagamento-rateale-b75ef217a6365bc215b41cd9f7c0293c.yaml b/nuclei-templates/cve-less/plugins/soisy-pagamento-rateale-b75ef217a6365bc215b41cd9f7c0293c.yaml new file mode 100644 index 0000000000..21fb5cfd41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soisy-pagamento-rateale-b75ef217a6365bc215b41cd9f7c0293c.yaml @@ -0,0 +1,58 @@ +id: soisy-pagamento-rateale-b75ef217a6365bc215b41cd9f7c0293c + +info: + name: > + Soisy Pagamento Rateale <= 6.0.1 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c997cd-37b4-4b9c-b99e-397be484aa36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soisy-pagamento-rateale/" + google-query: inurl:"/wp-content/plugins/soisy-pagamento-rateale/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soisy-pagamento-rateale,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soisy-pagamento-rateale/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soisy-pagamento-rateale" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sola-newsletters-6e0c27e6aa8bbd23ae1645c9db38ce34.yaml b/nuclei-templates/cve-less/plugins/sola-newsletters-6e0c27e6aa8bbd23ae1645c9db38ce34.yaml new file mode 100644 index 0000000000..fee8e5fc70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sola-newsletters-6e0c27e6aa8bbd23ae1645c9db38ce34.yaml @@ -0,0 +1,58 @@ +id: sola-newsletters-6e0c27e6aa8bbd23ae1645c9db38ce34 + +info: + name: > + Nifty Newsletters <= 4.0.23 – Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffcc85a1-fc79-4bc6-b50e-c87988d4cad3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sola-newsletters/" + google-query: inurl:"/wp-content/plugins/sola-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sola-newsletters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sola-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sola-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sola-support-tickets-753b1cfc0cff5215c4137639d86b10b2.yaml b/nuclei-templates/cve-less/plugins/sola-support-tickets-753b1cfc0cff5215c4137639d86b10b2.yaml new file mode 100644 index 0000000000..7827c05323 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sola-support-tickets-753b1cfc0cff5215c4137639d86b10b2.yaml @@ -0,0 +1,58 @@ +id: sola-support-tickets-753b1cfc0cff5215c4137639d86b10b2 + +info: + name: > + Sola Support Tickets < 3.13 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c78acf9d-89bf-4c8f-b333-31a330701614?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sola-support-tickets/" + google-query: inurl:"/wp-content/plugins/sola-support-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sola-support-tickets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sola-support-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sola-support-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/solid-affiliate-390f815591982373c000eae4c03f7206.yaml b/nuclei-templates/cve-less/plugins/solid-affiliate-390f815591982373c000eae4c03f7206.yaml new file mode 100644 index 0000000000..c2a0c39a56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/solid-affiliate-390f815591982373c000eae4c03f7206.yaml @@ -0,0 +1,58 @@ +id: solid-affiliate-390f815591982373c000eae4c03f7206 + +info: + name: > + Solid Affiliate <= 1.9.1 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d5f9fc7-fc85-4326-9295-470e8208c35a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/solid-affiliate/" + google-query: inurl:"/wp-content/plugins/solid-affiliate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,solid-affiliate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/solid-affiliate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "solid-affiliate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/solidres-22545828b4d21f4c13980a9fc5313fe5.yaml b/nuclei-templates/cve-less/plugins/solidres-22545828b4d21f4c13980a9fc5313fe5.yaml new file mode 100644 index 0000000000..3f97f3328d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/solidres-22545828b4d21f4c13980a9fc5313fe5.yaml @@ -0,0 +1,58 @@ +id: solidres-22545828b4d21f4c13980a9fc5313fe5 + +info: + name: > + Solidres <= 0.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36d9e9cd-7885-4127-b62c-ee0b3aad8846?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/solidres/" + google-query: inurl:"/wp-content/plugins/solidres/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,solidres,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/solidres/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "solidres" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/solidres-a159294bbf51e0b7e5b555bc0921d9bf.yaml b/nuclei-templates/cve-less/plugins/solidres-a159294bbf51e0b7e5b555bc0921d9bf.yaml new file mode 100644 index 0000000000..89a9ef9ee8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/solidres-a159294bbf51e0b7e5b555bc0921d9bf.yaml @@ -0,0 +1,58 @@ +id: solidres-a159294bbf51e0b7e5b555bc0921d9bf + +info: + name: > + Solidres <= 0.9.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b13ee51b-9f23-428f-9cef-4a9b9b06b0c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/solidres/" + google-query: inurl:"/wp-content/plugins/solidres/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,solidres,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/solidres/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "solidres" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soliloquy-lite-6360ed6ca296565a491121426d09e439.yaml b/nuclei-templates/cve-less/plugins/soliloquy-lite-6360ed6ca296565a491121426d09e439.yaml new file mode 100644 index 0000000000..c730217a2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soliloquy-lite-6360ed6ca296565a491121426d09e439.yaml @@ -0,0 +1,58 @@ +id: soliloquy-lite-6360ed6ca296565a491121426d09e439 + +info: + name: > + Slider by Soliloquy <= 2.7.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6331b42-f15b-46c6-b8bd-7f65c28c4a12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soliloquy-lite/" + google-query: inurl:"/wp-content/plugins/soliloquy-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soliloquy-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soliloquy-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soliloquy-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sophi-c3dca1d1ef3a946c9ddf3e33caa00021.yaml b/nuclei-templates/cve-less/plugins/sophi-c3dca1d1ef3a946c9ddf3e33caa00021.yaml new file mode 100644 index 0000000000..a923814c7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sophi-c3dca1d1ef3a946c9ddf3e33caa00021.yaml @@ -0,0 +1,58 @@ +id: sophi-c3dca1d1ef3a946c9ddf3e33caa00021 + +info: + name: > + terser (JS Package) < 5.14.2 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c08c10-7358-4618-b892-7d222ba460de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sophi/" + google-query: inurl:"/wp-content/plugins/sophi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sophi,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sophi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sophi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sort-searchresult-by-title-973fd490fc9004516881a731f3c2d83a.yaml b/nuclei-templates/cve-less/plugins/sort-searchresult-by-title-973fd490fc9004516881a731f3c2d83a.yaml new file mode 100644 index 0000000000..1d9ace45b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sort-searchresult-by-title-973fd490fc9004516881a731f3c2d83a.yaml @@ -0,0 +1,58 @@ +id: sort-searchresult-by-title-973fd490fc9004516881a731f3c2d83a + +info: + name: > + Sort SearchResult By Title <= 10.0 - Cross-Site Request Forgery via settings_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4147e973-5a17-41d8-b8d9-5e43a23c9bc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sort-searchresult-by-title/" + google-query: inurl:"/wp-content/plugins/sort-searchresult-by-title/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sort-searchresult-by-title,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sort-searchresult-by-title/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sort-searchresult-by-title" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundcloud-is-gold-4ff0e478fdb270b77d40058c8e73075a.yaml b/nuclei-templates/cve-less/plugins/soundcloud-is-gold-4ff0e478fdb270b77d40058c8e73075a.yaml new file mode 100644 index 0000000000..cd16491c25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundcloud-is-gold-4ff0e478fdb270b77d40058c8e73075a.yaml @@ -0,0 +1,58 @@ +id: soundcloud-is-gold-4ff0e478fdb270b77d40058c8e73075a + +info: + name: > + SoundCloud Is Gold <= 2.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f294175e-dfcd-4d8d-84ee-a945ec7ac7e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundcloud-is-gold/" + google-query: inurl:"/wp-content/plugins/soundcloud-is-gold/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundcloud-is-gold,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundcloud-is-gold/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundcloud-is-gold" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundcloud-is-gold-97e81ce09ae72195c5b04d7f6a992589.yaml b/nuclei-templates/cve-less/plugins/soundcloud-is-gold-97e81ce09ae72195c5b04d7f6a992589.yaml new file mode 100644 index 0000000000..c8ef68251c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundcloud-is-gold-97e81ce09ae72195c5b04d7f6a992589.yaml @@ -0,0 +1,58 @@ +id: soundcloud-is-gold-97e81ce09ae72195c5b04d7f6a992589 + +info: + name: > + Soundcloud Is Gold <= 2.5.1 - Missing Authorization to Soundcloud User Add + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14b2fa77-dc51-47b4-913a-9129f95ba766?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundcloud-is-gold/" + google-query: inurl:"/wp-content/plugins/soundcloud-is-gold/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundcloud-is-gold,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundcloud-is-gold/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundcloud-is-gold" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundcloud-is-gold-a72a870d8ea76185ed68595992193f58.yaml b/nuclei-templates/cve-less/plugins/soundcloud-is-gold-a72a870d8ea76185ed68595992193f58.yaml new file mode 100644 index 0000000000..ab7a91a30d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundcloud-is-gold-a72a870d8ea76185ed68595992193f58.yaml @@ -0,0 +1,58 @@ +id: soundcloud-is-gold-a72a870d8ea76185ed68595992193f58 + +info: + name: > + Soundcloud Is Gold <= 2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81bedea8-fbf7-411b-a31b-51af23522498?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundcloud-is-gold/" + google-query: inurl:"/wp-content/plugins/soundcloud-is-gold/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundcloud-is-gold,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundcloud-is-gold/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundcloud-is-gold" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundcloud-shortcode-69235207b58aed8fe2c8ecd662e7a82c.yaml b/nuclei-templates/cve-less/plugins/soundcloud-shortcode-69235207b58aed8fe2c8ecd662e7a82c.yaml new file mode 100644 index 0000000000..e10c6d3dd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundcloud-shortcode-69235207b58aed8fe2c8ecd662e7a82c.yaml @@ -0,0 +1,58 @@ +id: soundcloud-shortcode-69235207b58aed8fe2c8ecd662e7a82c + +info: + name: > + SoundCloud Shortcode <= 3.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5084afcc-b6fc-4d89-9ad7-c4ea3e4dae82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundcloud-shortcode/" + google-query: inurl:"/wp-content/plugins/soundcloud-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundcloud-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundcloud-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundcloud-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundcloud-shortcode-dc226a4fd8674625d0b38158fd388bcd.yaml b/nuclei-templates/cve-less/plugins/soundcloud-shortcode-dc226a4fd8674625d0b38158fd388bcd.yaml new file mode 100644 index 0000000000..8f3cfdfaea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundcloud-shortcode-dc226a4fd8674625d0b38158fd388bcd.yaml @@ -0,0 +1,58 @@ +id: soundcloud-shortcode-dc226a4fd8674625d0b38158fd388bcd + +info: + name: > + SoundCloud Shortcode <= 4.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f2ae1ff-c76e-4997-b860-f1e0b94a437d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundcloud-shortcode/" + google-query: inurl:"/wp-content/plugins/soundcloud-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundcloud-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundcloud-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundcloud-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundpress-8f924182750ff29f56bd3ee7a3546db5.yaml b/nuclei-templates/cve-less/plugins/soundpress-8f924182750ff29f56bd3ee7a3546db5.yaml new file mode 100644 index 0000000000..dc8c70881b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundpress-8f924182750ff29f56bd3ee7a3546db5.yaml @@ -0,0 +1,58 @@ +id: soundpress-8f924182750ff29f56bd3ee7a3546db5 + +info: + name: > + SoundPress Plugin <= 2.2.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a9c5f98-3457-443c-a87d-64f9c26b4f79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundpress/" + google-query: inurl:"/wp-content/plugins/soundpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundslides-6d1532fdad80760bbcdb59b753aaa43d.yaml b/nuclei-templates/cve-less/plugins/soundslides-6d1532fdad80760bbcdb59b753aaa43d.yaml new file mode 100644 index 0000000000..97c9132d20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundslides-6d1532fdad80760bbcdb59b753aaa43d.yaml @@ -0,0 +1,58 @@ +id: soundslides-6d1532fdad80760bbcdb59b753aaa43d + +info: + name: > + Soundslides < 2.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5bf1c8c-97b0-412c-aa26-88fd7bbe7c8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundslides/" + google-query: inurl:"/wp-content/plugins/soundslides/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundslides,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundslides/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundslides" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundy-audio-playlist-4c3c497ff4bf73b3f95e774197f4a725.yaml b/nuclei-templates/cve-less/plugins/soundy-audio-playlist-4c3c497ff4bf73b3f95e774197f4a725.yaml new file mode 100644 index 0000000000..bdadb2f5b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundy-audio-playlist-4c3c497ff4bf73b3f95e774197f4a725.yaml @@ -0,0 +1,58 @@ +id: soundy-audio-playlist-4c3c497ff4bf73b3f95e774197f4a725 + +info: + name: > + Soundy Audio Playlist <= 4.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb8640f2-d3cc-4a4a-8dfb-adaa8b77264c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundy-audio-playlist/" + google-query: inurl:"/wp-content/plugins/soundy-audio-playlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundy-audio-playlist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundy-audio-playlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundy-audio-playlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundy-background-music-aae33717a53aff7e44346754fe498f79.yaml b/nuclei-templates/cve-less/plugins/soundy-background-music-aae33717a53aff7e44346754fe498f79.yaml new file mode 100644 index 0000000000..cab83bc9a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundy-background-music-aae33717a53aff7e44346754fe498f79.yaml @@ -0,0 +1,58 @@ +id: soundy-background-music-aae33717a53aff7e44346754fe498f79 + +info: + name: > + Soundy Background Music <= 3.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7102fb7f-eb69-4c2f-956b-61ceace968e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundy-background-music/" + google-query: inurl:"/wp-content/plugins/soundy-background-music/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundy-background-music,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundy-background-music/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundy-background-music" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/soundy-background-music-c6e943f02c816d59dc350abe53cdb37c.yaml b/nuclei-templates/cve-less/plugins/soundy-background-music-c6e943f02c816d59dc350abe53cdb37c.yaml new file mode 100644 index 0000000000..aec9e67fb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/soundy-background-music-c6e943f02c816d59dc350abe53cdb37c.yaml @@ -0,0 +1,58 @@ +id: soundy-background-music-c6e943f02c816d59dc350abe53cdb37c + +info: + name: > + Soundy Background Music <= 3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c6d0ef-fe2c-4449-9e9c-135529a99575?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/soundy-background-music/" + google-query: inurl:"/wp-content/plugins/soundy-background-music/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,soundy-background-music,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/soundy-background-music/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundy-background-music" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sourceafrica-1a4e07a5bd173dbacaf88e7f59c17b91.yaml b/nuclei-templates/cve-less/plugins/sourceafrica-1a4e07a5bd173dbacaf88e7f59c17b91.yaml new file mode 100644 index 0000000000..72355b456b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sourceafrica-1a4e07a5bd173dbacaf88e7f59c17b91.yaml @@ -0,0 +1,58 @@ +id: sourceafrica-1a4e07a5bd173dbacaf88e7f59c17b91 + +info: + name: > + sourceAFRICA <= 0.1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0e9a09-0362-4046-a409-41a88154c7ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sourceafrica/" + google-query: inurl:"/wp-content/plugins/sourceafrica/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sourceafrica,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sourceafrica/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sourceafrica" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/south-pole-the-offset-movement-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/south-pole-the-offset-movement-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d2d8413e7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/south-pole-the-offset-movement-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: south-pole-the-offset-movement-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/south-pole-the-offset-movement/" + google-query: inurl:"/wp-content/plugins/south-pole-the-offset-movement/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,south-pole-the-offset-movement,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/south-pole-the-offset-movement/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "south-pole-the-offset-movement" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-04a07a765c467ba9a937f6672ca388bf.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-04a07a765c467ba9a937f6672ca388bf.yaml new file mode 100644 index 0000000000..4cccf0e1c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-04a07a765c467ba9a937f6672ca388bf.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-04a07a765c467ba9a937f6672ca388bf + +info: + name: > + SP Project & Document Manager <= 4.57 - Sensitive File Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8254f4ab-b7a4-4823-8bf9-0673cea1248e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-06564215bf3fbac51cfe3cf6be605864.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-06564215bf3fbac51cfe3cf6be605864.yaml new file mode 100644 index 0000000000..522962a1e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-06564215bf3fbac51cfe3cf6be605864.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-06564215bf3fbac51cfe3cf6be605864 + +info: + name: > + SP Project & Document Manager <= 4.70 - Missing Authorization Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31cb7a9d-8965-49cd-b1fb-0d141038a0e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-2363aa1bcf8789d416b82d1e475636e8.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-2363aa1bcf8789d416b82d1e475636e8.yaml new file mode 100644 index 0000000000..35d7f28b4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-2363aa1bcf8789d416b82d1e475636e8.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-2363aa1bcf8789d416b82d1e475636e8 + +info: + name: > + SP Project & Document Manager <= 2.5.9.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47b75e7f-87d3-40d5-b3c4-998d3164d48a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-2850eb23becb886717557cbcc134de27.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-2850eb23becb886717557cbcc134de27.yaml new file mode 100644 index 0000000000..6587df621b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-2850eb23becb886717557cbcc134de27.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-2850eb23becb886717557cbcc134de27 + +info: + name: > + SP Project & Document Manager <= 4.69 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c6d5a66-0eec-4a73-ad78-2b66a688c67a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-2d5254568244460078b2f5ebf11d2614.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-2d5254568244460078b2f5ebf11d2614.yaml new file mode 100644 index 0000000000..85c46bbc7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-2d5254568244460078b2f5ebf11d2614.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-2d5254568244460078b2f5ebf11d2614 + +info: + name: > + SP Project & Document Manager <= 4.69 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcdeba37-ba65-400d-9c07-36503a03e857?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-3992d1400a14226b637a309e355d88df.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-3992d1400a14226b637a309e355d88df.yaml new file mode 100644 index 0000000000..670dda0fd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-3992d1400a14226b637a309e355d88df.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-3992d1400a14226b637a309e355d88df + +info: + name: > + SP Project & Document Manager <= 4.70 - Authenticated (Subscriber+) Arbitrary Folder Name Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1951ad6c-17b5-44ae-85e2-376b99df742e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-401b607f5d2e6f27bfcb5e6df2983f64.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-401b607f5d2e6f27bfcb5e6df2983f64.yaml new file mode 100644 index 0000000000..f7ee07b094 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-401b607f5d2e6f27bfcb5e6df2983f64.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-401b607f5d2e6f27bfcb5e6df2983f64 + +info: + name: > + SP Project & Document Manager <= 4.67 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37eb77ed-0b2e-46ea-806d-8041742eab5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-5c5bdc3c3fb1d75ed0dae2921575f884.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-5c5bdc3c3fb1d75ed0dae2921575f884.yaml new file mode 100644 index 0000000000..c38d92a0b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-5c5bdc3c3fb1d75ed0dae2921575f884.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-5c5bdc3c3fb1d75ed0dae2921575f884 + +info: + name: > + SP Project & Document Manager <= 4.59 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0564a9a1-a767-4192-8cb0-65c6fc4d064d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-617c1b1381aefd6f7fe9c5ab76d6b608.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-617c1b1381aefd6f7fe9c5ab76d6b608.yaml new file mode 100644 index 0000000000..3284527150 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-617c1b1381aefd6f7fe9c5ab76d6b608.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-617c1b1381aefd6f7fe9c5ab76d6b608 + +info: + name: > + SP Projects & Document Manager <= 2.6.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48f7ad3b-608b-4802-b7ab-fad4c449cc62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-68171971cc36274d03be6fb322c19104.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-68171971cc36274d03be6fb322c19104.yaml new file mode 100644 index 0000000000..ddca487677 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-68171971cc36274d03be6fb322c19104.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-68171971cc36274d03be6fb322c19104 + +info: + name: > + SP Projects & Document Manager <= 2.5.9.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd05991d-382b-460c-b89f-e1f7dfac9e60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-6fe68888cdbcff1f92e26aa3597b8cee.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-6fe68888cdbcff1f92e26aa3597b8cee.yaml new file mode 100644 index 0000000000..16fd6819d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-6fe68888cdbcff1f92e26aa3597b8cee.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-6fe68888cdbcff1f92e26aa3597b8cee + +info: + name: > + SP Project & Document Manager <= 4.25 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bed6b603-c811-4624-9053-1e12029ba73b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-a887472c18a8df1556ea7f4984db4ec4.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-a887472c18a8df1556ea7f4984db4ec4.yaml new file mode 100644 index 0000000000..d0d4353dfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-a887472c18a8df1556ea7f4984db4ec4.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-a887472c18a8df1556ea7f4984db4ec4 + +info: + name: > + SP Project & Document Manager < 2.4.4 - Multiple SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f95f73c-2377-46b7-a96f-6014a5b012c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-ac1431b1561b6c549c99a1b7125f3596.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-ac1431b1561b6c549c99a1b7125f3596.yaml new file mode 100644 index 0000000000..6c6c29e597 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-ac1431b1561b6c549c99a1b7125f3596.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-ac1431b1561b6c549c99a1b7125f3596 + +info: + name: > + SP Project & Document Manager <= 4.71 - Authenticated (Author+) SQL Injeciton + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d8e3832-b3ed-4687-94d8-8ba2c832584c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-b4c26568b976acff74ff99cb773e576a.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-b4c26568b976acff74ff99cb773e576a.yaml new file mode 100644 index 0000000000..107fba480f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-b4c26568b976acff74ff99cb773e576a.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-b4c26568b976acff74ff99cb773e576a + +info: + name: > + SP Project & Document Manager <= 4.56 - Cross-Site Request Forgery and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/585d0368-7557-46aa-9ea3-26cd6d7df51b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-cb1e1ee6d4a86d7ed0a6cb77ed172c33.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-cb1e1ee6d4a86d7ed0a6cb77ed172c33.yaml new file mode 100644 index 0000000000..0e0dc83217 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-cb1e1ee6d4a86d7ed0a6cb77ed172c33.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-cb1e1ee6d4a86d7ed0a6cb77ed172c33 + +info: + name: > + SP Project & Document Manager <= 4.67 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary User Password Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6dc2e720-85d9-42d9-94ef-eb172425993d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-ce5dcabcccc42aa46e68f15d61979ef3.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-ce5dcabcccc42aa46e68f15d61979ef3.yaml new file mode 100644 index 0000000000..216567eb48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-ce5dcabcccc42aa46e68f15d61979ef3.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-ce5dcabcccc42aa46e68f15d61979ef3 + +info: + name: > + SP Projects & Document Manager <= 2.5.9.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8da513f-19b1-4ec4-b3ad-dc3a7bb6ab49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-dba53cd3548af35e05600706ff16691a.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-dba53cd3548af35e05600706ff16691a.yaml new file mode 100644 index 0000000000..3554dbe64f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-dba53cd3548af35e05600706ff16691a.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-dba53cd3548af35e05600706ff16691a + +info: + name: > + SP Project & Document Manager <= 4.59 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ab22aa8-399f-449b-83cf-25583c057cff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-f2cabdaf778fd02d270ecff63ff16022.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-f2cabdaf778fd02d270ecff63ff16022.yaml new file mode 100644 index 0000000000..1b67346a1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-f2cabdaf778fd02d270ecff63ff16022.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-f2cabdaf778fd02d270ecff63ff16022 + +info: + name: > + SP Project & Document Manager <= 4.67 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e489a90e-f226-4900-938c-b5a7550d199c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-f424267505cbcf902cf4e60fa01acaf4.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-f424267505cbcf902cf4e60fa01acaf4.yaml new file mode 100644 index 0000000000..55eeb6e826 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-f424267505cbcf902cf4e60fa01acaf4.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-f424267505cbcf902cf4e60fa01acaf4 + +info: + name: > + SP Project & Document Manager <= 4.21 - Authenticated Shell Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f81d9f2-f7a1-4085-aa20-d991cecacd23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-client-document-manager-f55d9ddf38ced2af39de4e46518b9654.yaml b/nuclei-templates/cve-less/plugins/sp-client-document-manager-f55d9ddf38ced2af39de4e46518b9654.yaml new file mode 100644 index 0000000000..5bb3cd5735 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-client-document-manager-f55d9ddf38ced2af39de4e46518b9654.yaml @@ -0,0 +1,58 @@ +id: sp-client-document-manager-f55d9ddf38ced2af39de4e46518b9654 + +info: + name: > + SP Project & Document Manager <= 4.23 - Subscriber+ Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b1b60f4-39f7-4981-bd8d-b1c6e63cf082?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-client-document-manager/" + google-query: inurl:"/wp-content/plugins/sp-client-document-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-client-document-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-client-document-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-client-document-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-faq-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/sp-faq-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..3033a59096 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-faq-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: sp-faq-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-faq/" + google-query: inurl:"/wp-content/plugins/sp-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-faq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-news-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/sp-news-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..a4f37c1cad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-news-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: sp-news-and-widget-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-news-and-widget/" + google-query: inurl:"/wp-content/plugins/sp-news-and-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-news-and-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-news-and-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-news-and-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sp-rental-manager-41e16d89dcc64533542d0355200f7979.yaml b/nuclei-templates/cve-less/plugins/sp-rental-manager-41e16d89dcc64533542d0355200f7979.yaml new file mode 100644 index 0000000000..469343060e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sp-rental-manager-41e16d89dcc64533542d0355200f7979.yaml @@ -0,0 +1,58 @@ +id: sp-rental-manager-41e16d89dcc64533542d0355200f7979 + +info: + name: > + SP Rental Manager <= 1.5.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2876c97-a612-4c0f-b094-3233768703b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sp-rental-manager/" + google-query: inurl:"/wp-content/plugins/sp-rental-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sp-rental-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sp-rental-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sp-rental-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spacer-d06ebbe7f6b16be606d476a52581f74c.yaml b/nuclei-templates/cve-less/plugins/spacer-d06ebbe7f6b16be606d476a52581f74c.yaml new file mode 100644 index 0000000000..2b7629fcdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spacer-d06ebbe7f6b16be606d476a52581f74c.yaml @@ -0,0 +1,58 @@ +id: spacer-d06ebbe7f6b16be606d476a52581f74c + +info: + name: > + Spacer <= 3.0.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/553255fb-2bec-48e8-bb16-1e7f66674282?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spacer/" + google-query: inurl:"/wp-content/plugins/spacer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spacer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spacer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spacer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spam-byebye-e9caa2ebc5663770aed9ca1501187910.yaml b/nuclei-templates/cve-less/plugins/spam-byebye-e9caa2ebc5663770aed9ca1501187910.yaml new file mode 100644 index 0000000000..668147dd2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spam-byebye-e9caa2ebc5663770aed9ca1501187910.yaml @@ -0,0 +1,58 @@ +id: spam-byebye-e9caa2ebc5663770aed9ca1501187910 + +info: + name: > + spam-byebye <= 2.2.1 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f8e0021-f305-45c1-b658-405ad22334ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spam-byebye/" + google-query: inurl:"/wp-content/plugins/spam-byebye/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spam-byebye,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spam-byebye/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spam-byebye" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spam-control-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/spam-control-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..cec97d937d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spam-control-xforwc-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: spam-control-xforwc-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spam-control-xforwc/" + google-query: inurl:"/wp-content/plugins/spam-control-xforwc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spam-control-xforwc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spam-control-xforwc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spam-control-xforwc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spam-free-wordpress-82c72f71ce0609e7f3c0c0507adae482.yaml b/nuclei-templates/cve-less/plugins/spam-free-wordpress-82c72f71ce0609e7f3c0c0507adae482.yaml new file mode 100644 index 0000000000..132839d069 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spam-free-wordpress-82c72f71ce0609e7f3c0c0507adae482.yaml @@ -0,0 +1,58 @@ +id: spam-free-wordpress-82c72f71ce0609e7f3c0c0507adae482 + +info: + name: > + Spam Free WordPress <= 1.9.3 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a5bcf8f-9aa0-4a78-b3a8-21571700ea8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spam-free-wordpress/" + google-query: inurl:"/wp-content/plugins/spam-free-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spam-free-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spam-free-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spam-free-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spam-free-wordpress-cbc5e9eb934f71de91a8cb0463db32ff.yaml b/nuclei-templates/cve-less/plugins/spam-free-wordpress-cbc5e9eb934f71de91a8cb0463db32ff.yaml new file mode 100644 index 0000000000..43732f1931 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spam-free-wordpress-cbc5e9eb934f71de91a8cb0463db32ff.yaml @@ -0,0 +1,58 @@ +id: spam-free-wordpress-cbc5e9eb934f71de91a8cb0463db32ff + +info: + name: > + Spam Free WordPress <= 1.9.3 - IP Protection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f7a8ee7-af69-4aff-abf7-6d69d920fe61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spam-free-wordpress/" + google-query: inurl:"/wp-content/plugins/spam-free-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spam-free-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spam-free-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spam-free-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spambam-ba683037cf589f0cf1f070f5a09f7594.yaml b/nuclei-templates/cve-less/plugins/spambam-ba683037cf589f0cf1f070f5a09f7594.yaml new file mode 100644 index 0000000000..54edbda4b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spambam-ba683037cf589f0cf1f070f5a09f7594.yaml @@ -0,0 +1,58 @@ +id: spambam-ba683037cf589f0cf1f070f5a09f7594 + +info: + name: > + Spambam <= 2.1 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/835b254a-9135-4b9d-8607-7122304601bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spambam/" + google-query: inurl:"/wp-content/plugins/spambam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spambam,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spambam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spambam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spamreferrerblock-376bf43456853b74eb2f520d8ce53233.yaml b/nuclei-templates/cve-less/plugins/spamreferrerblock-376bf43456853b74eb2f520d8ce53233.yaml new file mode 100644 index 0000000000..e464920238 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spamreferrerblock-376bf43456853b74eb2f520d8ce53233.yaml @@ -0,0 +1,58 @@ +id: spamreferrerblock-376bf43456853b74eb2f520d8ce53233 + +info: + name: > + Download SpamReferrerBlock <= 2.22 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/692e995d-cdfc-4ab8-8a8a-5423eb7f8d15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spamreferrerblock/" + google-query: inurl:"/wp-content/plugins/spamreferrerblock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spamreferrerblock,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spamreferrerblock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spamreferrerblock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spamreferrerblock-8abe61b53911c7ef41a9f9b79b5a7a76.yaml b/nuclei-templates/cve-less/plugins/spamreferrerblock-8abe61b53911c7ef41a9f9b79b5a7a76.yaml new file mode 100644 index 0000000000..e84fa3ff30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spamreferrerblock-8abe61b53911c7ef41a9f9b79b5a7a76.yaml @@ -0,0 +1,58 @@ +id: spamreferrerblock-8abe61b53911c7ef41a9f9b79b5a7a76 + +info: + name: > + SpamReferrerBlock <= 2.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d70e9d4e-2137-411b-bc01-28388a7b2519?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spamreferrerblock/" + google-query: inurl:"/wp-content/plugins/spamreferrerblock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spamreferrerblock,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spamreferrerblock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spamreferrerblock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sparkpost-74a58305bbc22438aab63e645d576e4d.yaml b/nuclei-templates/cve-less/plugins/sparkpost-74a58305bbc22438aab63e645d576e4d.yaml new file mode 100644 index 0000000000..eeb499698a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sparkpost-74a58305bbc22438aab63e645d576e4d.yaml @@ -0,0 +1,58 @@ +id: sparkpost-74a58305bbc22438aab63e645d576e4d + +info: + name: > + SparkPost <= 3.2.7 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab86ddc9-9b43-4949-b150-7b944bc40558?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sparkpost/" + google-query: inurl:"/wp-content/plugins/sparkpost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sparkpost,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sparkpost/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sparkpost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sparrow-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sparrow-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..887b42e4e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sparrow-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sparrow-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sparrow/" + google-query: inurl:"/wp-content/plugins/sparrow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sparrow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sparrow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sparrow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/speakout-a008170121378cc4ebae8dd26f86a202.yaml b/nuclei-templates/cve-less/plugins/speakout-a008170121378cc4ebae8dd26f86a202.yaml new file mode 100644 index 0000000000..4591a4cb01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/speakout-a008170121378cc4ebae8dd26f86a202.yaml @@ -0,0 +1,58 @@ +id: speakout-a008170121378cc4ebae8dd26f86a202 + +info: + name: > + SpeakOut! Email Petitions <= 4.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/624af5e1-dc40-4d33-bfac-1a409b81a096?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/speakout/" + google-query: inurl:"/wp-content/plugins/speakout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,speakout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/speakout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speakout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/speakout-bfb97206bbfb6336668e50882960e16f.yaml b/nuclei-templates/cve-less/plugins/speakout-bfb97206bbfb6336668e50882960e16f.yaml new file mode 100644 index 0000000000..3491fd9429 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/speakout-bfb97206bbfb6336668e50882960e16f.yaml @@ -0,0 +1,58 @@ +id: speakout-bfb97206bbfb6336668e50882960e16f + +info: + name: > + SpeakOut! Email Petitions <= 2.13.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be44a7e0-f0e0-4e2e-ac1e-0550d8e5d994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/speakout/" + google-query: inurl:"/wp-content/plugins/speakout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,speakout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/speakout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speakout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/speakout-c91bb87bc2ac78b385f1ba0404999869.yaml b/nuclei-templates/cve-less/plugins/speakout-c91bb87bc2ac78b385f1ba0404999869.yaml new file mode 100644 index 0000000000..4359741b68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/speakout-c91bb87bc2ac78b385f1ba0404999869.yaml @@ -0,0 +1,58 @@ +id: speakout-c91bb87bc2ac78b385f1ba0404999869 + +info: + name: > + SpeakOut! Email Petitions < 2.14.15.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab9a5d89-16be-4dc7-9361-2b1be2324239?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/speakout/" + google-query: inurl:"/wp-content/plugins/speakout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,speakout,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/speakout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speakout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.15.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/special-box-for-content-abc7b516295a7f19088f575460d378b0.yaml b/nuclei-templates/cve-less/plugins/special-box-for-content-abc7b516295a7f19088f575460d378b0.yaml new file mode 100644 index 0000000000..91687bc5a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/special-box-for-content-abc7b516295a7f19088f575460d378b0.yaml @@ -0,0 +1,58 @@ +id: special-box-for-content-abc7b516295a7f19088f575460d378b0 + +info: + name: > + Special Box for Content <= 1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4baa79da-ae4d-4e45-855f-8c7d713fb2f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/special-box-for-content/" + google-query: inurl:"/wp-content/plugins/special-box-for-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,special-box-for-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/special-box-for-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "special-box-for-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/specific-content-for-mobile-3ebf96dd87dccb36e3b3f1a2a1f3837f.yaml b/nuclei-templates/cve-less/plugins/specific-content-for-mobile-3ebf96dd87dccb36e3b3f1a2a1f3837f.yaml new file mode 100644 index 0000000000..9ae9f9b98a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/specific-content-for-mobile-3ebf96dd87dccb36e3b3f1a2a1f3837f.yaml @@ -0,0 +1,58 @@ +id: specific-content-for-mobile-3ebf96dd87dccb36e3b3f1a2a1f3837f + +info: + name: > + Specific Content For Mobile – Customize the mobile version without redirections <= 0.1.9.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51ac25ef-e5b9-4f5c-a792-fff4ceba96e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/specific-content-for-mobile/" + google-query: inurl:"/wp-content/plugins/specific-content-for-mobile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,specific-content-for-mobile,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/specific-content-for-mobile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "specific-content-for-mobile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spectra-pro-995df7f208463f40decef18bc20c7cae.yaml b/nuclei-templates/cve-less/plugins/spectra-pro-995df7f208463f40decef18bc20c7cae.yaml new file mode 100644 index 0000000000..15a47985b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spectra-pro-995df7f208463f40decef18bc20c7cae.yaml @@ -0,0 +1,58 @@ +id: spectra-pro-995df7f208463f40decef18bc20c7cae + +info: + name: > + Spectra Pro <= 1.1.5 - Authenticated (Author+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e23e7d66-4b57-4feb-bf77-46238bc6ce7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spectra-pro/" + google-query: inurl:"/wp-content/plugins/spectra-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spectra-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spectra-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spectra-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/speed-booster-pack-076ba2e4af7ca8a46ce67983592fc4f6.yaml b/nuclei-templates/cve-less/plugins/speed-booster-pack-076ba2e4af7ca8a46ce67983592fc4f6.yaml new file mode 100644 index 0000000000..e0b5e42f1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/speed-booster-pack-076ba2e4af7ca8a46ce67983592fc4f6.yaml @@ -0,0 +1,58 @@ +id: speed-booster-pack-076ba2e4af7ca8a46ce67983592fc4f6 + +info: + name: > + Speed Booster Pack PageSpeed Optimization Suite <= 4.1.9. - Authenticated (Admin+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8641dec6-a754-446a-a011-9b4b0fc252c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/speed-booster-pack/" + google-query: inurl:"/wp-content/plugins/speed-booster-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,speed-booster-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/speed-booster-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speed-booster-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/speed-booster-pack-221fa8b539336ea57a6760f06055d98c.yaml b/nuclei-templates/cve-less/plugins/speed-booster-pack-221fa8b539336ea57a6760f06055d98c.yaml new file mode 100644 index 0000000000..3916bf332d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/speed-booster-pack-221fa8b539336ea57a6760f06055d98c.yaml @@ -0,0 +1,58 @@ +id: speed-booster-pack-221fa8b539336ea57a6760f06055d98c + +info: + name: > + Speed Booster Pack <= 4.3.3 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b56a793-2a20-4bd7-aefb-a8d012c56527?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/speed-booster-pack/" + google-query: inurl:"/wp-content/plugins/speed-booster-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,speed-booster-pack,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/speed-booster-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speed-booster-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/speedycache-226c23fcac1339a85375c1a4fa7531e2.yaml b/nuclei-templates/cve-less/plugins/speedycache-226c23fcac1339a85375c1a4fa7531e2.yaml new file mode 100644 index 0000000000..19fd0b0cbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/speedycache-226c23fcac1339a85375c1a4fa7531e2.yaml @@ -0,0 +1,58 @@ +id: speedycache-226c23fcac1339a85375c1a4fa7531e2 + +info: + name: > + SpeedyCache <= 1.1.2 - Missing Authorization via speedycache_create_test_cache + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac7c0dde-5299-4938-beed-eb2fe227a812?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/speedycache/" + google-query: inurl:"/wp-content/plugins/speedycache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,speedycache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/speedycache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speedycache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/speedycache-54778688cb39f84f341e249c6ffef279.yaml b/nuclei-templates/cve-less/plugins/speedycache-54778688cb39f84f341e249c6ffef279.yaml new file mode 100644 index 0000000000..8756ab1e0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/speedycache-54778688cb39f84f341e249c6ffef279.yaml @@ -0,0 +1,58 @@ +id: speedycache-54778688cb39f84f341e249c6ffef279 + +info: + name: > + SpeedyCache <= 1.1.3 - Missing Authorization to Plugin Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db8cfdba-f3b2-45dc-9be7-6f6374fd5f39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/speedycache/" + google-query: inurl:"/wp-content/plugins/speedycache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,speedycache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/speedycache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speedycache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/speedycache-e22a3c007f773a45322f383ac43c3a2c.yaml b/nuclei-templates/cve-less/plugins/speedycache-e22a3c007f773a45322f383ac43c3a2c.yaml new file mode 100644 index 0000000000..28f235ce4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/speedycache-e22a3c007f773a45322f383ac43c3a2c.yaml @@ -0,0 +1,58 @@ +id: speedycache-e22a3c007f773a45322f383ac43c3a2c + +info: + name: > + SpeedyCache <= 1.1.2 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab922406-4af8-4ef2-bcc8-c326212546b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/speedycache/" + google-query: inurl:"/wp-content/plugins/speedycache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,speedycache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/speedycache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speedycache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spice-post-slider-65a9626411491f24b8c3f89e82e2b81b.yaml b/nuclei-templates/cve-less/plugins/spice-post-slider-65a9626411491f24b8c3f89e82e2b81b.yaml new file mode 100644 index 0000000000..ceae4f7dca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spice-post-slider-65a9626411491f24b8c3f89e82e2b81b.yaml @@ -0,0 +1,58 @@ +id: spice-post-slider-65a9626411491f24b8c3f89e82e2b81b + +info: + name: > + Carousel, Recent Post Slider and Banner Slider <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0dd70b9-6f8a-41fc-ab4f-f6cdfee8dfb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spice-post-slider/" + google-query: inurl:"/wp-content/plugins/spice-post-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spice-post-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spice-post-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spice-post-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spicy-blogroll-6adf85227442a25ea6b65f4f4a3a9b6f.yaml b/nuclei-templates/cve-less/plugins/spicy-blogroll-6adf85227442a25ea6b65f4f4a3a9b6f.yaml new file mode 100644 index 0000000000..2362f909ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spicy-blogroll-6adf85227442a25ea6b65f4f4a3a9b6f.yaml @@ -0,0 +1,58 @@ +id: spicy-blogroll-6adf85227442a25ea6b65f4f4a3a9b6f + +info: + name: > + Spicy Blogroll <= 1.0.0 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb5d3d64-a465-4c26-9cf7-7acc7dab862a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spicy-blogroll/" + google-query: inurl:"/wp-content/plugins/spicy-blogroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spicy-blogroll,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spicy-blogroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spicy-blogroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-calendar-f2155ebc56a5ab206ac221be4f14be59.yaml b/nuclei-templates/cve-less/plugins/spider-calendar-f2155ebc56a5ab206ac221be4f14be59.yaml new file mode 100644 index 0000000000..5567224106 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-calendar-f2155ebc56a5ab206ac221be4f14be59.yaml @@ -0,0 +1,58 @@ +id: spider-calendar-f2155ebc56a5ab206ac221be4f14be59 + +info: + name: > + Spider Calendar < 1.1.3 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22cb2bc4-ddf1-4e23-af1c-4f59ff88e9e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-calendar/" + google-query: inurl:"/wp-content/plugins/spider-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-event-calendar-1e97950fcbacf9ecbb58beed5fdc2b28.yaml b/nuclei-templates/cve-less/plugins/spider-event-calendar-1e97950fcbacf9ecbb58beed5fdc2b28.yaml new file mode 100644 index 0000000000..96f0296b82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-event-calendar-1e97950fcbacf9ecbb58beed5fdc2b28.yaml @@ -0,0 +1,58 @@ +id: spider-event-calendar-1e97950fcbacf9ecbb58beed5fdc2b28 + +info: + name: > + SpiderCalendar <= 1.4.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e597b677-e298-4507-86a5-70a93a9afd6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-event-calendar/" + google-query: inurl:"/wp-content/plugins/spider-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-event-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-event-calendar-2ed7504786f2c69f8fb1940cf29e910f.yaml b/nuclei-templates/cve-less/plugins/spider-event-calendar-2ed7504786f2c69f8fb1940cf29e910f.yaml new file mode 100644 index 0000000000..9e5ad45f00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-event-calendar-2ed7504786f2c69f8fb1940cf29e910f.yaml @@ -0,0 +1,58 @@ +id: spider-event-calendar-2ed7504786f2c69f8fb1940cf29e910f + +info: + name: > + SpiderCalendar <= 1.6.64 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2da965b1-1f8d-4905-9711-bb9ad30f444a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-event-calendar/" + google-query: inurl:"/wp-content/plugins/spider-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-event-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-event-calendar-8e5f1d8103bbbd8289c9adf60d58fadc.yaml b/nuclei-templates/cve-less/plugins/spider-event-calendar-8e5f1d8103bbbd8289c9adf60d58fadc.yaml new file mode 100644 index 0000000000..d77601d3b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-event-calendar-8e5f1d8103bbbd8289c9adf60d58fadc.yaml @@ -0,0 +1,58 @@ +id: spider-event-calendar-8e5f1d8103bbbd8289c9adf60d58fadc + +info: + name: > + SpiderCalendar <= 1.5.51 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4299e97c-3b91-4870-bafd-557b72b93b44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-event-calendar/" + google-query: inurl:"/wp-content/plugins/spider-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-event-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-event-calendar-f7cf93aa76a02f42c50608fccf671ed3.yaml b/nuclei-templates/cve-less/plugins/spider-event-calendar-f7cf93aa76a02f42c50608fccf671ed3.yaml new file mode 100644 index 0000000000..4959ff4e3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-event-calendar-f7cf93aa76a02f42c50608fccf671ed3.yaml @@ -0,0 +1,58 @@ +id: spider-event-calendar-f7cf93aa76a02f42c50608fccf671ed3 + +info: + name: > + SpiderCalendar <= 1.4.9 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f00b2602-b9ab-4f4a-a19e-5c2a98c232e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-event-calendar/" + google-query: inurl:"/wp-content/plugins/spider-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-event-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-facebook-3419ce492dfca943f0e1d53900563907.yaml b/nuclei-templates/cve-less/plugins/spider-facebook-3419ce492dfca943f0e1d53900563907.yaml new file mode 100644 index 0000000000..6f8ee2da27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-facebook-3419ce492dfca943f0e1d53900563907.yaml @@ -0,0 +1,58 @@ +id: spider-facebook-3419ce492dfca943f0e1d53900563907 + +info: + name: > + Spider Facebook <= 1.0.15 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a74d6b36-e0f1-4cfb-b1e9-0573081ed975?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-facebook/" + google-query: inurl:"/wp-content/plugins/spider-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-facebook-69ea852e8d20e1b9095ff76a5199f22b.yaml b/nuclei-templates/cve-less/plugins/spider-facebook-69ea852e8d20e1b9095ff76a5199f22b.yaml new file mode 100644 index 0000000000..f3b27c8187 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-facebook-69ea852e8d20e1b9095ff76a5199f22b.yaml @@ -0,0 +1,58 @@ +id: spider-facebook-69ea852e8d20e1b9095ff76a5199f22b + +info: + name: > + WordPress Facebook <= 1.0.13 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2238c9ba-6d00-4a21-a050-7b8a5f307964?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-facebook/" + google-query: inurl:"/wp-content/plugins/spider-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-facebook,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-facebook-8a173d0b76b8837ebc37d42174f4f25c.yaml b/nuclei-templates/cve-less/plugins/spider-facebook-8a173d0b76b8837ebc37d42174f4f25c.yaml new file mode 100644 index 0000000000..3a57ef0727 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-facebook-8a173d0b76b8837ebc37d42174f4f25c.yaml @@ -0,0 +1,58 @@ +id: spider-facebook-8a173d0b76b8837ebc37d42174f4f25c + +info: + name: > + Spider Facebook <= 1.0.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd15f5c3-f4c3-40d3-b0ae-eee7ed9ed434?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-facebook/" + google-query: inurl:"/wp-content/plugins/spider-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-facebook,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-facebook-913a3de69251f92dd6bb96cf67b3c77f.yaml b/nuclei-templates/cve-less/plugins/spider-facebook-913a3de69251f92dd6bb96cf67b3c77f.yaml new file mode 100644 index 0000000000..b05b8e780f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-facebook-913a3de69251f92dd6bb96cf67b3c77f.yaml @@ -0,0 +1,58 @@ +id: spider-facebook-913a3de69251f92dd6bb96cf67b3c77f + +info: + name: > + Spider Facebook <= 1.0.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a94accad-27c7-462b-b26f-0dde2036a7ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-facebook/" + google-query: inurl:"/wp-content/plugins/spider-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-facebook-e8946bc978834049177d3e02187e8035.yaml b/nuclei-templates/cve-less/plugins/spider-facebook-e8946bc978834049177d3e02187e8035.yaml new file mode 100644 index 0000000000..de94ec44bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-facebook-e8946bc978834049177d3e02187e8035.yaml @@ -0,0 +1,58 @@ +id: spider-facebook-e8946bc978834049177d3e02187e8035 + +info: + name: > + WDSocialWidgets < 1.0.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7926afb-b441-49bf-9af2-5bfc434319e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-facebook/" + google-query: inurl:"/wp-content/plugins/spider-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-facebook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spider-faq-b0259ad6d689e8e7c0c44fb374384bbb.yaml b/nuclei-templates/cve-less/plugins/spider-faq-b0259ad6d689e8e7c0c44fb374384bbb.yaml new file mode 100644 index 0000000000..cb6414876e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spider-faq-b0259ad6d689e8e7c0c44fb374384bbb.yaml @@ -0,0 +1,58 @@ +id: spider-faq-b0259ad6d689e8e7c0c44fb374384bbb + +info: + name: > + SpiderFAQ <= 1.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/688d30ac-9b30-4298-a935-316e5503a31b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spider-faq/" + google-query: inurl:"/wp-content/plugins/spider-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spider-faq,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spider-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spider-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spideranalyse-0c25180cc619839b0311e294d1b3cbd8.yaml b/nuclei-templates/cve-less/plugins/spideranalyse-0c25180cc619839b0311e294d1b3cbd8.yaml new file mode 100644 index 0000000000..a29e298b35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spideranalyse-0c25180cc619839b0311e294d1b3cbd8.yaml @@ -0,0 +1,58 @@ +id: spideranalyse-0c25180cc619839b0311e294d1b3cbd8 + +info: + name: > + spideranalyse <= 0.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3563f70d-ab0a-48ec-9bb9-294b49026c1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spideranalyse/" + google-query: inurl:"/wp-content/plugins/spideranalyse/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spideranalyse,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spideranalyse/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spideranalyse" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-6758599a3791f7538bc2d472bcdf24af.yaml b/nuclei-templates/cve-less/plugins/spiffy-6758599a3791f7538bc2d472bcdf24af.yaml new file mode 100644 index 0000000000..4a2529f42b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-6758599a3791f7538bc2d472bcdf24af.yaml @@ -0,0 +1,58 @@ +id: spiffy-6758599a3791f7538bc2d472bcdf24af + +info: + name: > + Spiffy XSPF Player <= 0.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b7f700f-e40c-4b45-b651-ab1752255083?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy/" + google-query: inurl:"/wp-content/plugins/spiffy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-08f37baf7169a857040ffc59c0868398.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-08f37baf7169a857040ffc59c0868398.yaml new file mode 100644 index 0000000000..8bb6a00f8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-08f37baf7169a857040ffc59c0868398.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-08f37baf7169a857040ffc59c0868398 + +info: + name: > + Spiffy Calendar <= 4.9.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/114e8ba9-b6b0-4b54-982c-8e9efaa616c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-154bfb5b4169e90929a178c26caff90a.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-154bfb5b4169e90929a178c26caff90a.yaml new file mode 100644 index 0000000000..18d4da63d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-154bfb5b4169e90929a178c26caff90a.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-154bfb5b4169e90929a178c26caff90a + +info: + name: > + Spiffy Calendar <= 4.9.3 - Reflected Cross-Site Scripting via page parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5adf03ff-5b87-4ed3-b7ec-b89bc814aba6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-1777236d571c6ec2a8def6ba8c1b858a.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-1777236d571c6ec2a8def6ba8c1b858a.yaml new file mode 100644 index 0000000000..078cf69381 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-1777236d571c6ec2a8def6ba8c1b858a.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-1777236d571c6ec2a8def6ba8c1b858a + +info: + name: > + Spiffy Calendar <= 4.9.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f433edb4-a8df-4548-a401-0089b605bbe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-3e09107013e755aea584073e7dd4de99.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-3e09107013e755aea584073e7dd4de99.yaml new file mode 100644 index 0000000000..5097f0009b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-3e09107013e755aea584073e7dd4de99.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-3e09107013e755aea584073e7dd4de99 + +info: + name: > + Spiffy Calendar <= 4.9.0 - Event deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ada3a69c-d113-4f92-b716-641bd5d20940?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-75045db4676725000c0fe50648ef7533.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-75045db4676725000c0fe50648ef7533.yaml new file mode 100644 index 0000000000..189d06683e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-75045db4676725000c0fe50648ef7533.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-75045db4676725000c0fe50648ef7533 + +info: + name: > + Spiffy Calendar < 3.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f78e6faf-ff1d-4944-aa54-7843cc8614f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-96ead8130baf6f3e4de85814e7242d2f.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-96ead8130baf6f3e4de85814e7242d2f.yaml new file mode 100644 index 0000000000..367756f94f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-96ead8130baf6f3e4de85814e7242d2f.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-96ead8130baf6f3e4de85814e7242d2f + +info: + name: > + Spiffy Calendar <= 4.9.0 - Edit/Delete event via IDOR + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85af2186-0807-4926-9285-f8ac93f76b93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-9cd804229a710db23428eb806db45e23.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-9cd804229a710db23428eb806db45e23.yaml new file mode 100644 index 0000000000..c7c4111a29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-9cd804229a710db23428eb806db45e23.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-9cd804229a710db23428eb806db45e23 + +info: + name: > + Spiffy Calendar <= 4.9.1 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/005b56c7-55ae-4db0-9ab2-3e22bd8a08ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-e0473e70c98ee61e4fe5a38893d2153e.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-e0473e70c98ee61e4fe5a38893d2153e.yaml new file mode 100644 index 0000000000..a4d5979522 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-e0473e70c98ee61e4fe5a38893d2153e.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-e0473e70c98ee61e4fe5a38893d2153e + +info: + name: > + Spiffy Calendar <= 4.9.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b4369f8-d3d2-4018-a262-3294b5865086?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spiffy-calendar-ec679d8af6cf4a084b96b00c5d5a19da.yaml b/nuclei-templates/cve-less/plugins/spiffy-calendar-ec679d8af6cf4a084b96b00c5d5a19da.yaml new file mode 100644 index 0000000000..4d16036c42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spiffy-calendar-ec679d8af6cf4a084b96b00c5d5a19da.yaml @@ -0,0 +1,58 @@ +id: spiffy-calendar-ec679d8af6cf4a084b96b00c5d5a19da + +info: + name: > + Spiffy Calendar <= 4.9.8 - Insufficient Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4afea729-a7d9-4b38-a0f5-5af2c31bfbb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spiffy-calendar/" + google-query: inurl:"/wp-content/plugins/spiffy-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spiffy-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spiffy-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiffy-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spin360-8be8bdb7ee929f691ca61327631de08d.yaml b/nuclei-templates/cve-less/plugins/spin360-8be8bdb7ee929f691ca61327631de08d.yaml new file mode 100644 index 0000000000..0a10532c2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spin360-8be8bdb7ee929f691ca61327631de08d.yaml @@ -0,0 +1,58 @@ +id: spin360-8be8bdb7ee929f691ca61327631de08d + +info: + name: > + Spin 360 deg and 3D Model Viewer <= 1.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab63f507-6288-48e2-81c8-52b8a8c0c28c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spin360/" + google-query: inurl:"/wp-content/plugins/spin360/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spin360,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spin360/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spin360" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/splash-header-ab94523f6e880edfade4cc9deca8c597.yaml b/nuclei-templates/cve-less/plugins/splash-header-ab94523f6e880edfade4cc9deca8c597.yaml new file mode 100644 index 0000000000..81cd3f4ed1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/splash-header-ab94523f6e880edfade4cc9deca8c597.yaml @@ -0,0 +1,58 @@ +id: splash-header-ab94523f6e880edfade4cc9deca8c597 + +info: + name: > + Splash Header < 1.20.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6c9814e-e854-4420-9ec1-d843187bd9e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/splash-header/" + google-query: inurl:"/wp-content/plugins/splash-header/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,splash-header,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/splash-header/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "splash-header" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/splash-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/splash-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..00e4b676c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/splash-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: splash-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/splash-popup-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/splash-popup-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,splash-popup-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/splash-popup-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "splash-popup-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/splashscreen-2fce51431212ec05fbe8e4b6de6695f9.yaml b/nuclei-templates/cve-less/plugins/splashscreen-2fce51431212ec05fbe8e4b6de6695f9.yaml new file mode 100644 index 0000000000..b54ed488fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/splashscreen-2fce51431212ec05fbe8e4b6de6695f9.yaml @@ -0,0 +1,58 @@ +id: splashscreen-2fce51431212ec05fbe8e4b6de6695f9 + +info: + name: > + Splashscreen <= 0.20 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1088f498-e718-41bc-866e-7027352a2a5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/splashscreen/" + google-query: inurl:"/wp-content/plugins/splashscreen/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,splashscreen,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/splashscreen/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "splashscreen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/split-test-for-elementor-b7e73505abb95891d8cab73e20eb43fb.yaml b/nuclei-templates/cve-less/plugins/split-test-for-elementor-b7e73505abb95891d8cab73e20eb43fb.yaml new file mode 100644 index 0000000000..ef893cda0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/split-test-for-elementor-b7e73505abb95891d8cab73e20eb43fb.yaml @@ -0,0 +1,58 @@ +id: split-test-for-elementor-b7e73505abb95891d8cab73e20eb43fb + +info: + name: > + Split Test For Elementor <= 1.6.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be23388e-9371-4ea0-974b-80f76de90012?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/split-test-for-elementor/" + google-query: inurl:"/wp-content/plugins/split-test-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,split-test-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/split-test-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "split-test-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spnbabble-124b0c02e423c613251c0019e72c2c54.yaml b/nuclei-templates/cve-less/plugins/spnbabble-124b0c02e423c613251c0019e72c2c54.yaml new file mode 100644 index 0000000000..197c3fbf6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spnbabble-124b0c02e423c613251c0019e72c2c54.yaml @@ -0,0 +1,58 @@ +id: spnbabble-124b0c02e423c613251c0019e72c2c54 + +info: + name: > + Spnbabble <= 1.4.1 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b12efe6c-63e9-4d5c-9437-7c0b6abe2ee5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spnbabble/" + google-query: inurl:"/wp-content/plugins/spnbabble/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spnbabble,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spnbabble/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spnbabble" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sponsors-carousel-eca4f2076644e75e750957ea6e558bad.yaml b/nuclei-templates/cve-less/plugins/sponsors-carousel-eca4f2076644e75e750957ea6e558bad.yaml new file mode 100644 index 0000000000..f41720c892 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sponsors-carousel-eca4f2076644e75e750957ea6e558bad.yaml @@ -0,0 +1,58 @@ +id: sponsors-carousel-eca4f2076644e75e750957ea6e558bad + +info: + name: > + Sponsors Carousel <= 4.02 - Authenticated (Admin+) Stored Cross-Site Scripting in show + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d61ed3e3-5102-4293-a999-e324e721ab89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sponsors-carousel/" + google-query: inurl:"/wp-content/plugins/sponsors-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sponsors-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sponsors-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sponsors-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spoontalk-social-media-icons-widget-9197b8a3552582e2b7bb578d10695dcb.yaml b/nuclei-templates/cve-less/plugins/spoontalk-social-media-icons-widget-9197b8a3552582e2b7bb578d10695dcb.yaml new file mode 100644 index 0000000000..48c258b928 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spoontalk-social-media-icons-widget-9197b8a3552582e2b7bb578d10695dcb.yaml @@ -0,0 +1,58 @@ +id: spoontalk-social-media-icons-widget-9197b8a3552582e2b7bb578d10695dcb + +info: + name: > + Social Media Icons Widget <= 1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb5abff-d762-459a-b96c-5cbbb9f5a22e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spoontalk-social-media-icons-widget/" + google-query: inurl:"/wp-content/plugins/spoontalk-social-media-icons-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spoontalk-social-media-icons-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spoontalk-social-media-icons-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spoontalk-social-media-icons-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sportspress-12303619a441af1cb4218513536dee14.yaml b/nuclei-templates/cve-less/plugins/sportspress-12303619a441af1cb4218513536dee14.yaml new file mode 100644 index 0000000000..3927000434 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sportspress-12303619a441af1cb4218513536dee14.yaml @@ -0,0 +1,58 @@ +id: sportspress-12303619a441af1cb4218513536dee14 + +info: + name: > + SportsPress – Sports Club & League Manager <= 2.7.17 - Missing Authorization to Unauthenticated Event Permalink Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/098dfee2-ba0b-420f-89ed-8ad1e41faec4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sportspress/" + google-query: inurl:"/wp-content/plugins/sportspress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sportspress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sportspress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sportspress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sportspress-6844db7940c370d06922bd9c5958a18b.yaml b/nuclei-templates/cve-less/plugins/sportspress-6844db7940c370d06922bd9c5958a18b.yaml new file mode 100644 index 0000000000..d9786f1f39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sportspress-6844db7940c370d06922bd9c5958a18b.yaml @@ -0,0 +1,58 @@ +id: sportspress-6844db7940c370d06922bd9c5958a18b + +info: + name: > + SportsPress <= 2.7.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14c9dc08-6965-4a22-a97a-5afc8152887d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sportspress/" + google-query: inurl:"/wp-content/plugins/sportspress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sportspress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sportspress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sportspress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sportspress-e4e04326ab22918580d15e25fd27ca8d.yaml b/nuclei-templates/cve-less/plugins/sportspress-e4e04326ab22918580d15e25fd27ca8d.yaml new file mode 100644 index 0000000000..d659011b3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sportspress-e4e04326ab22918580d15e25fd27ca8d.yaml @@ -0,0 +1,58 @@ +id: sportspress-e4e04326ab22918580d15e25fd27ca8d + +info: + name: > + SportsPress <= 2.7.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/324a51af-587e-4831-a48e-13bbd5038fc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sportspress/" + google-query: inurl:"/wp-content/plugins/sportspress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sportspress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sportspress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sportspress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-298d6bd79a1c9c5409fd8603fff56484.yaml b/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-298d6bd79a1c9c5409fd8603fff56484.yaml new file mode 100644 index 0000000000..55ecfb2ecf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-298d6bd79a1c9c5409fd8603fff56484.yaml @@ -0,0 +1,58 @@ +id: spotify-play-button-for-wordpress-298d6bd79a1c9c5409fd8603fff56484 + +info: + name: > + Sp*tify Play Button for WordPress <= 2.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b82fae0-4eec-41ea-90e2-9d08258805b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotify-play-button-for-wordpress/" + google-query: inurl:"/wp-content/plugins/spotify-play-button-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotify-play-button-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotify-play-button-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotify-play-button-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-31672843b36374c6d9bc9abf980ac503.yaml b/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-31672843b36374c6d9bc9abf980ac503.yaml new file mode 100644 index 0000000000..597395b9c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-31672843b36374c6d9bc9abf980ac503.yaml @@ -0,0 +1,58 @@ +id: spotify-play-button-for-wordpress-31672843b36374c6d9bc9abf980ac503 + +info: + name: > + Sp*tify Play Button for WordPress <= 2.07 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/308f6887-7c1c-4efd-85e2-b71bb6d26dab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotify-play-button-for-wordpress/" + google-query: inurl:"/wp-content/plugins/spotify-play-button-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotify-play-button-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotify-play-button-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotify-play-button-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-a7c9f85c93718ea45a6837bae9a163d3.yaml b/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-a7c9f85c93718ea45a6837bae9a163d3.yaml new file mode 100644 index 0000000000..5f7ab5e193 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotify-play-button-for-wordpress-a7c9f85c93718ea45a6837bae9a163d3.yaml @@ -0,0 +1,58 @@ +id: spotify-play-button-for-wordpress-a7c9f85c93718ea45a6837bae9a163d3 + +info: + name: > + Sp*tify Play Button for WordPress <= 2.05 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28941027-a812-4d53-b3da-4e715202f88d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotify-play-button-for-wordpress/" + google-query: inurl:"/wp-content/plugins/spotify-play-button-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotify-play-button-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotify-play-button-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotify-play-button-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotim-comments-ad069f3a56279cbff65458936b83abde.yaml b/nuclei-templates/cve-less/plugins/spotim-comments-ad069f3a56279cbff65458936b83abde.yaml new file mode 100644 index 0000000000..ac19a234de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotim-comments-ad069f3a56279cbff65458936b83abde.yaml @@ -0,0 +1,58 @@ +id: spotim-comments-ad069f3a56279cbff65458936b83abde + +info: + name: > + Spot.IM Comments < 4.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0aa3bee5-a194-4618-8f32-a0a781fe8dc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotim-comments/" + google-query: inurl:"/wp-content/plugins/spotim-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotim-comments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotim-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotim-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-2d33cf6aadd9c85f7e657c07e30320a8.yaml b/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-2d33cf6aadd9c85f7e657c07e30320a8.yaml new file mode 100644 index 0000000000..fb1fe98b21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-2d33cf6aadd9c85f7e657c07e30320a8.yaml @@ -0,0 +1,58 @@ +id: spotlight-social-photo-feeds-2d33cf6aadd9c85f7e657c07e30320a8 + +info: + name: > + Spotlight Social Feeds <= 1.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7aa700ac-32de-4cd4-9d56-eea8ec0ba61b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotlight-social-photo-feeds/" + google-query: inurl:"/wp-content/plugins/spotlight-social-photo-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotlight-social-photo-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotlight-social-photo-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotlight-social-photo-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-383f0a78726324384b13637bfb824e6d.yaml b/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-383f0a78726324384b13637bfb824e6d.yaml new file mode 100644 index 0000000000..b2a3e70152 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-383f0a78726324384b13637bfb824e6d.yaml @@ -0,0 +1,58 @@ +id: spotlight-social-photo-feeds-383f0a78726324384b13637bfb824e6d + +info: + name: > + Spotlight Social Media Feeds <= 1.6.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21e49adb-01a7-41d9-bb51-bac60d49e293?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotlight-social-photo-feeds/" + google-query: inurl:"/wp-content/plugins/spotlight-social-photo-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotlight-social-photo-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotlight-social-photo-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotlight-social-photo-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1b00092611 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotlight-social-photo-feeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: spotlight-social-photo-feeds-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotlight-social-photo-feeds/" + google-query: inurl:"/wp-content/plugins/spotlight-social-photo-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotlight-social-photo-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotlight-social-photo-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotlight-social-photo-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotlightyour-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/spotlightyour-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..946a035db5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotlightyour-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: spotlightyour-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotlightyour/" + google-query: inurl:"/wp-content/plugins/spotlightyour/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotlightyour,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotlightyour/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotlightyour" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spotlightyour-a5f4f463543df4d2c732d202ef98faae.yaml b/nuclei-templates/cve-less/plugins/spotlightyour-a5f4f463543df4d2c732d202ef98faae.yaml new file mode 100644 index 0000000000..d13871f399 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spotlightyour-a5f4f463543df4d2c732d202ef98faae.yaml @@ -0,0 +1,58 @@ +id: spotlightyour-a5f4f463543df4d2c732d202ef98faae + +info: + name: > + Spotlight <= 4.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97f2b71f-ef3e-4826-8e78-62820672ec0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spotlightyour/" + google-query: inurl:"/wp-content/plugins/spotlightyour/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spotlightyour,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spotlightyour/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spotlightyour" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sprapid-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/sprapid-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..b4284cc2a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sprapid-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: sprapid-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sprapid/" + google-query: inurl:"/wp-content/plugins/sprapid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sprapid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sprapid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sprapid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spreadshirt-rss-3d-cube-flash-gallery-a406e3b1989f167ebfda1e3281f7073d.yaml b/nuclei-templates/cve-less/plugins/spreadshirt-rss-3d-cube-flash-gallery-a406e3b1989f167ebfda1e3281f7073d.yaml new file mode 100644 index 0000000000..f3cc28490b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spreadshirt-rss-3d-cube-flash-gallery-a406e3b1989f167ebfda1e3281f7073d.yaml @@ -0,0 +1,58 @@ +id: spreadshirt-rss-3d-cube-flash-gallery-a406e3b1989f167ebfda1e3281f7073d + +info: + name: > + WP-RSS-Spreadshirt-3DCube-Gallery <= 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eaefe2d-b7f8-49ed-8ba1-833e888857b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spreadshirt-rss-3d-cube-flash-gallery/" + google-query: inurl:"/wp-content/plugins/spreadshirt-rss-3d-cube-flash-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spreadshirt-rss-3d-cube-flash-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spreadshirt-rss-3d-cube-flash-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spreadshirt-rss-3d-cube-flash-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spreadshop-1fd62c5f484f1392e0781314c57798c9.yaml b/nuclei-templates/cve-less/plugins/spreadshop-1fd62c5f484f1392e0781314c57798c9.yaml new file mode 100644 index 0000000000..7084142928 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spreadshop-1fd62c5f484f1392e0781314c57798c9.yaml @@ -0,0 +1,58 @@ +id: spreadshop-1fd62c5f484f1392e0781314c57798c9 + +info: + name: > + Spreadshop Plugin <= 1.6.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f15ac06-b5d3-4265-b69b-1d46b12a0522?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spreadshop/" + google-query: inurl:"/wp-content/plugins/spreadshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spreadshop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spreadshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spreadshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sprout-clients-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/sprout-clients-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..6ac9aaed85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sprout-clients-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: sprout-clients-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sprout-clients/" + google-query: inurl:"/wp-content/plugins/sprout-clients/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sprout-clients,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sprout-clients/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sprout-clients" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sprout-invoices-59ac68597f5d4f0100ad7ca8fa79cc45.yaml b/nuclei-templates/cve-less/plugins/sprout-invoices-59ac68597f5d4f0100ad7ca8fa79cc45.yaml new file mode 100644 index 0000000000..35e4f2cb6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sprout-invoices-59ac68597f5d4f0100ad7ca8fa79cc45.yaml @@ -0,0 +1,58 @@ +id: sprout-invoices-59ac68597f5d4f0100ad7ca8fa79cc45 + +info: + name: > + Client Invoicing by Sprout Invoices – Easy Estimates and Invoices for WordPress <= 9.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cdbd5fd-bb12-4202-b6c7-f314ad8987f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sprout-invoices/" + google-query: inurl:"/wp-content/plugins/sprout-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sprout-invoices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sprout-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sprout-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sprout-invoices-9a71754acff1f7a8a4e0b96c58483fa2.yaml b/nuclei-templates/cve-less/plugins/sprout-invoices-9a71754acff1f7a8a4e0b96c58483fa2.yaml new file mode 100644 index 0000000000..5dd375791d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sprout-invoices-9a71754acff1f7a8a4e0b96c58483fa2.yaml @@ -0,0 +1,58 @@ +id: sprout-invoices-9a71754acff1f7a8a4e0b96c58483fa2 + +info: + name: > + Sprout Invoices <= 20.5.3 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2330b18e-0907-47e1-b91f-1fe466bcf76b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sprout-invoices/" + google-query: inurl:"/wp-content/plugins/sprout-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sprout-invoices,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sprout-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sprout-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sprout-invoices-f12b94e3ed29f6a01de55ac0eaeeefde.yaml b/nuclei-templates/cve-less/plugins/sprout-invoices-f12b94e3ed29f6a01de55ac0eaeeefde.yaml new file mode 100644 index 0000000000..72b43c00ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sprout-invoices-f12b94e3ed29f6a01de55ac0eaeeefde.yaml @@ -0,0 +1,58 @@ +id: sprout-invoices-f12b94e3ed29f6a01de55ac0eaeeefde + +info: + name: > + Client Invoicing by Sprout Invoices <= 19.9.6 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59cdb3e3-06ca-4325-9dae-73ad3cdfd910?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sprout-invoices/" + google-query: inurl:"/wp-content/plugins/sprout-invoices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sprout-invoices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sprout-invoices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sprout-invoices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/spryng-payments-woocommerce-a5194bfa9db34596e371b3fb9a988aa4.yaml b/nuclei-templates/cve-less/plugins/spryng-payments-woocommerce-a5194bfa9db34596e371b3fb9a988aa4.yaml new file mode 100644 index 0000000000..fd353c990f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/spryng-payments-woocommerce-a5194bfa9db34596e371b3fb9a988aa4.yaml @@ -0,0 +1,58 @@ +id: spryng-payments-woocommerce-a5194bfa9db34596e371b3fb9a988aa4 + +info: + name: > + Spryng Payments for WooCommerce <= 1.6.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bc832fa-9845-4157-b7a6-54d8c3794085?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/spryng-payments-woocommerce/" + google-query: inurl:"/wp-content/plugins/spryng-payments-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,spryng-payments-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/spryng-payments-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spryng-payments-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sql-reporting-services-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sql-reporting-services-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..73db5ed710 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sql-reporting-services-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sql-reporting-services-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sql-reporting-services/" + google-query: inurl:"/wp-content/plugins/sql-reporting-services/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sql-reporting-services,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sql-reporting-services/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sql-reporting-services" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sql-shortcode-a25bdc4c7adc28787a5a6691ec7b0deb.yaml b/nuclei-templates/cve-less/plugins/sql-shortcode-a25bdc4c7adc28787a5a6691ec7b0deb.yaml new file mode 100644 index 0000000000..d1ca7b0f8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sql-shortcode-a25bdc4c7adc28787a5a6691ec7b0deb.yaml @@ -0,0 +1,58 @@ +id: sql-shortcode-a25bdc4c7adc28787a5a6691ec7b0deb + +info: + name: > + SQL Shortcode <= 1.1 - SQL Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c78e14b-6925-4630-b19c-13b192f9fea3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sql-shortcode/" + google-query: inurl:"/wp-content/plugins/sql-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sql-shortcode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sql-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sql-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/square-thumbnails-e4179682cad3bde3b1674a51f6f83b60.yaml b/nuclei-templates/cve-less/plugins/square-thumbnails-e4179682cad3bde3b1674a51f6f83b60.yaml new file mode 100644 index 0000000000..30b2214843 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/square-thumbnails-e4179682cad3bde3b1674a51f6f83b60.yaml @@ -0,0 +1,58 @@ +id: square-thumbnails-e4179682cad3bde3b1674a51f6f83b60 + +info: + name: > + Square Thumbnails <= 1.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31cc30c7-262d-4582-8976-fc8095bdca5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/square-thumbnails/" + google-query: inurl:"/wp-content/plugins/square-thumbnails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,square-thumbnails,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/square-thumbnails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "square-thumbnails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squelch-tabs-and-accordions-shortcodes-5bf6caeb14a9d5459f5e8842d7b83fd0.yaml b/nuclei-templates/cve-less/plugins/squelch-tabs-and-accordions-shortcodes-5bf6caeb14a9d5459f5e8842d7b83fd0.yaml new file mode 100644 index 0000000000..29a5c27ea5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squelch-tabs-and-accordions-shortcodes-5bf6caeb14a9d5459f5e8842d7b83fd0.yaml @@ -0,0 +1,58 @@ +id: squelch-tabs-and-accordions-shortcodes-5bf6caeb14a9d5459f5e8842d7b83fd0 + +info: + name: > + Squelch Tabs and Accordions Shortcodes <= 0.4.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd9490f2-ad52-477e-ae3b-be49984e8189?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squelch-tabs-and-accordions-shortcodes/" + google-query: inurl:"/wp-content/plugins/squelch-tabs-and-accordions-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squelch-tabs-and-accordions-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squelch-tabs-and-accordions-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squelch-tabs-and-accordions-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squelch-tabs-and-accordions-shortcodes-a40320a58f3885e7d8eeeafc625b97f0.yaml b/nuclei-templates/cve-less/plugins/squelch-tabs-and-accordions-shortcodes-a40320a58f3885e7d8eeeafc625b97f0.yaml new file mode 100644 index 0000000000..581ffdd048 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squelch-tabs-and-accordions-shortcodes-a40320a58f3885e7d8eeeafc625b97f0.yaml @@ -0,0 +1,58 @@ +id: squelch-tabs-and-accordions-shortcodes-a40320a58f3885e7d8eeeafc625b97f0 + +info: + name: > + Squelch Tabs and Accordions Shortcodes <= 0.4.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via accordions Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adf10ad4-38b2-44be-bdc6-ba6b62e9fbe6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squelch-tabs-and-accordions-shortcodes/" + google-query: inurl:"/wp-content/plugins/squelch-tabs-and-accordions-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squelch-tabs-and-accordions-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squelch-tabs-and-accordions-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squelch-tabs-and-accordions-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-5af8eacf37d85841618cfbc1ca1be43e.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-5af8eacf37d85841618cfbc1ca1be43e.yaml new file mode 100644 index 0000000000..fcc939acf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-5af8eacf37d85841618cfbc1ca1be43e.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-5af8eacf37d85841618cfbc1ca1be43e + +info: + name: > + SEO Plugin by Squirrly SEO < 6.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a46da16-2442-45cf-858f-0681b1106cc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo/" + google-query: inurl:"/wp-content/plugins/squirrly-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-6478aae484fa31cdf3168da6c2ae9db6.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-6478aae484fa31cdf3168da6c2ae9db6.yaml new file mode 100644 index 0000000000..36cee43d64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-6478aae484fa31cdf3168da6c2ae9db6.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-6478aae484fa31cdf3168da6c2ae9db6 + +info: + name: > + SEO Plugin by Squirrly SEO < 6.1.5 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0747b104-5be6-44eb-b62c-0026f810573c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo/" + google-query: inurl:"/wp-content/plugins/squirrly-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-6e0a660167cf480a4e16e426dedc8853.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-6e0a660167cf480a4e16e426dedc8853.yaml new file mode 100644 index 0000000000..abdbece432 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-6e0a660167cf480a4e16e426dedc8853.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-6e0a660167cf480a4e16e426dedc8853 + +info: + name: > + SEO Plugin by Squirrly SEO <= 11.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a2d6ee-ee1b-44a1-ad74-61837d9ef4b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo/" + google-query: inurl:"/wp-content/plugins/squirrly-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-83717a76e7400e087835909cd79a400f.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-83717a76e7400e087835909cd79a400f.yaml new file mode 100644 index 0000000000..e2b0b4741b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-83717a76e7400e087835909cd79a400f.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-83717a76e7400e087835909cd79a400f + +info: + name: > + SEO Plugin by Squirrly SEO <= 12.1.10 - Authenticated (Contributor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4e7f51c-5f44-4d01-8865-9d86067374ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo/" + google-query: inurl:"/wp-content/plugins/squirrly-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-83878a85b5ef451846cd41cd6a228f4f.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-83878a85b5ef451846cd41cd6a228f4f.yaml new file mode 100644 index 0000000000..5b1714aa9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-83878a85b5ef451846cd41cd6a228f4f.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-83878a85b5ef451846cd41cd6a228f4f + +info: + name: > + SEO Plugin by Squirrly SEO <= 12.1.20 - Reflected Cross-Site Scripting via 'page' and 'tab' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3edce64d-13c2-454a-b5da-0454453f69cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo/" + google-query: inurl:"/wp-content/plugins/squirrly-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-97aa7aa2977bb6f3604b4b418beecdeb.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-97aa7aa2977bb6f3604b4b418beecdeb.yaml new file mode 100644 index 0000000000..75cb676563 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-97aa7aa2977bb6f3604b4b418beecdeb.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-97aa7aa2977bb6f3604b4b418beecdeb + +info: + name: > + SEO Plugin by Squirrly SEO <= 12.1.20 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9251afbb-1a6d-40c6-b62e-a8866742f669?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo/" + google-query: inurl:"/wp-content/plugins/squirrly-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-f98418e2a88f3c300252df6d0a548031.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-f98418e2a88f3c300252df6d0a548031.yaml new file mode 100644 index 0000000000..42d595da5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-f98418e2a88f3c300252df6d0a548031.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-f98418e2a88f3c300252df6d0a548031 + +info: + name: > + SEO Plugin by Squirrly SEO <= 12.3.15 - Authenticated(Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a61a8d8b-f22f-4a16-95f6-6cf52cf545ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo/" + google-query: inurl:"/wp-content/plugins/squirrly-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-ffbd02fc4497b01dad7c0fa802b669cd.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-ffbd02fc4497b01dad7c0fa802b669cd.yaml new file mode 100644 index 0000000000..243256b4ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-ffbd02fc4497b01dad7c0fa802b669cd.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-ffbd02fc4497b01dad7c0fa802b669cd + +info: + name: > + SEO Plugin by Squirrly SEO <= 12.3.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c874c643-ceb6-4646-adfa-6cd7393bb4f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo/" + google-query: inurl:"/wp-content/plugins/squirrly-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/squirrly-seo-pack-24ebe2280a642d19c25498acc13aa5f7.yaml b/nuclei-templates/cve-less/plugins/squirrly-seo-pack-24ebe2280a642d19c25498acc13aa5f7.yaml new file mode 100644 index 0000000000..4874c844fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/squirrly-seo-pack-24ebe2280a642d19c25498acc13aa5f7.yaml @@ -0,0 +1,58 @@ +id: squirrly-seo-pack-24ebe2280a642d19c25498acc13aa5f7 + +info: + name: > + Squirrly SEO - Advanced Pack <= 2.3.8 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ce4204f-3ee3-4877-8e9d-123d01ae80f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/squirrly-seo-pack/" + google-query: inurl:"/wp-content/plugins/squirrly-seo-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,squirrly-seo-pack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/squirrly-seo-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squirrly-seo-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/srbtranslatin-4393e503b4c5e360e86d4cf75de99b91.yaml b/nuclei-templates/cve-less/plugins/srbtranslatin-4393e503b4c5e360e86d4cf75de99b91.yaml new file mode 100644 index 0000000000..550844bce8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/srbtranslatin-4393e503b4c5e360e86d4cf75de99b91.yaml @@ -0,0 +1,58 @@ +id: srbtranslatin-4393e503b4c5e360e86d4cf75de99b91 + +info: + name: > + WP-Optimize <= 3.2.12 & SrbTransLatin <= 2.4 - Stored/Reflected Cross-Site Scripting via Third Party Library + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdb822e8-583e-4437-a735-b116aa8886e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/srbtranslatin/" + google-query: inurl:"/wp-content/plugins/srbtranslatin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,srbtranslatin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/srbtranslatin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "srbtranslatin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/srbtranslatin-acbdf42f0c9734064513cf6368d19553.yaml b/nuclei-templates/cve-less/plugins/srbtranslatin-acbdf42f0c9734064513cf6368d19553.yaml new file mode 100644 index 0000000000..f7152acd52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/srbtranslatin-acbdf42f0c9734064513cf6368d19553.yaml @@ -0,0 +1,58 @@ +id: srbtranslatin-acbdf42f0c9734064513cf6368d19553 + +info: + name: > + SrbTransLatin – SrbTransLatin <= 1.46 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bf8485b-a363-44a3-93c7-a6fba034b48f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/srbtranslatin/" + google-query: inurl:"/wp-content/plugins/srbtranslatin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,srbtranslatin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/srbtranslatin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "srbtranslatin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/srbtranslatin-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml b/nuclei-templates/cve-less/plugins/srbtranslatin-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml new file mode 100644 index 0000000000..76928a88d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/srbtranslatin-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml @@ -0,0 +1,58 @@ +id: srbtranslatin-e8f7e29f1dbade4dd38e32bd0037d5fe + +info: + name: > + SrbTransLatin <= 1.46 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/340d6e92-81a0-4659-b60b-922f63476a33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/srbtranslatin/" + google-query: inurl:"/wp-content/plugins/srbtranslatin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,srbtranslatin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/srbtranslatin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "srbtranslatin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/srs-simple-hits-counter-30c7579fa3259d02083eb82bd53cf64e.yaml b/nuclei-templates/cve-less/plugins/srs-simple-hits-counter-30c7579fa3259d02083eb82bd53cf64e.yaml new file mode 100644 index 0000000000..ebf913ecb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/srs-simple-hits-counter-30c7579fa3259d02083eb82bd53cf64e.yaml @@ -0,0 +1,58 @@ +id: srs-simple-hits-counter-30c7579fa3259d02083eb82bd53cf64e + +info: + name: > + SRS Simple Hits Counter <= 1.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f76411f1-98ea-4d75-9ddd-e41a5d08c698?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/srs-simple-hits-counter/" + google-query: inurl:"/wp-content/plugins/srs-simple-hits-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,srs-simple-hits-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/srs-simple-hits-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "srs-simple-hits-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/srs-simple-hits-counter-44e9876427663f96d92e4c3c678955d5.yaml b/nuclei-templates/cve-less/plugins/srs-simple-hits-counter-44e9876427663f96d92e4c3c678955d5.yaml new file mode 100644 index 0000000000..563b9d180a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/srs-simple-hits-counter-44e9876427663f96d92e4c3c678955d5.yaml @@ -0,0 +1,58 @@ +id: srs-simple-hits-counter-44e9876427663f96d92e4c3c678955d5 + +info: + name: > + SRS Simple Hits Counter Plugin for WordPress 1.03 - 1.04 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b157356c-a4be-48d6-8c58-ad1a9c96cda3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/srs-simple-hits-counter/" + google-query: inurl:"/wp-content/plugins/srs-simple-hits-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,srs-simple-hits-counter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/srs-simple-hits-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "srs-simple-hits-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0.3', '<= 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ss-downloads-a491a4eb2f6511d2fd18eb2730601144.yaml b/nuclei-templates/cve-less/plugins/ss-downloads-a491a4eb2f6511d2fd18eb2730601144.yaml new file mode 100644 index 0000000000..36c86a6b33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ss-downloads-a491a4eb2f6511d2fd18eb2730601144.yaml @@ -0,0 +1,58 @@ +id: ss-downloads-a491a4eb2f6511d2fd18eb2730601144 + +info: + name: > + SS Downloads <= 1.4.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3871b908-a9a1-4c35-8a8d-d1a609db475a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ss-downloads/" + google-query: inurl:"/wp-content/plugins/ss-downloads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ss-downloads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ss-downloads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ss-downloads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ssl-atlas-free-ssl-certificate-https-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ssl-atlas-free-ssl-certificate-https-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..15f0ccdef3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ssl-atlas-free-ssl-certificate-https-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ssl-atlas-free-ssl-certificate-https-redirect-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ssl-atlas-free-ssl-certificate-https-redirect/" + google-query: inurl:"/wp-content/plugins/ssl-atlas-free-ssl-certificate-https-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ssl-atlas-free-ssl-certificate-https-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ssl-atlas-free-ssl-certificate-https-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ssl-atlas-free-ssl-certificate-https-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ssl-zen-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ssl-zen-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c6f951e3e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ssl-zen-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ssl-zen-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ssl-zen/" + google-query: inurl:"/wp-content/plugins/ssl-zen/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ssl-zen,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ssl-zen/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ssl-zen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ssquiz-7e5a458fe10904a2f1fd482c3506274a.yaml b/nuclei-templates/cve-less/plugins/ssquiz-7e5a458fe10904a2f1fd482c3506274a.yaml new file mode 100644 index 0000000000..b645893975 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ssquiz-7e5a458fe10904a2f1fd482c3506274a.yaml @@ -0,0 +1,58 @@ +id: ssquiz-7e5a458fe10904a2f1fd482c3506274a + +info: + name: > + SS Quiz <= 1.12.2 - Unspecified Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b08105d-711e-49ea-a0bc-7179eb021300?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ssquiz/" + google-query: inurl:"/wp-content/plugins/ssquiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ssquiz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ssquiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ssquiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/st-daily-tip-2145217038a04527e759e3c42206ab95.yaml b/nuclei-templates/cve-less/plugins/st-daily-tip-2145217038a04527e759e3c42206ab95.yaml new file mode 100644 index 0000000000..020e5d12c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/st-daily-tip-2145217038a04527e759e3c42206ab95.yaml @@ -0,0 +1,58 @@ +id: st-daily-tip-2145217038a04527e759e3c42206ab95 + +info: + name: > + St Daily Tip <= 4.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/432b71ea-dd81-4536-abda-33da8185abb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/st-daily-tip/" + google-query: inurl:"/wp-content/plugins/st-daily-tip/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,st-daily-tip,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/st-daily-tip/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "st-daily-tip" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/st_newsletter-3701fafb074b402084511d8e3b04bc0d.yaml b/nuclei-templates/cve-less/plugins/st_newsletter-3701fafb074b402084511d8e3b04bc0d.yaml new file mode 100644 index 0000000000..b6b62d8121 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/st_newsletter-3701fafb074b402084511d8e3b04bc0d.yaml @@ -0,0 +1,58 @@ +id: st_newsletter-3701fafb074b402084511d8e3b04bc0d + +info: + name: > + ShiftThis (Unspecified Version) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9f6ef14-dc04-46da-b2fc-e84b91153bfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/st_newsletter/" + google-query: inurl:"/wp-content/plugins/st_newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,st_newsletter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/st_newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "st_newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/st_newsletter-84952e15b91150d8294a112b87e25b78.yaml b/nuclei-templates/cve-less/plugins/st_newsletter-84952e15b91150d8294a112b87e25b78.yaml new file mode 100644 index 0000000000..17af74d6d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/st_newsletter-84952e15b91150d8294a112b87e25b78.yaml @@ -0,0 +1,58 @@ +id: st_newsletter-84952e15b91150d8294a112b87e25b78 + +info: + name: > + ShiftThis Newsletter <= 2.3.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60242725-200e-4794-acdc-2ab4a1e8e4fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/st_newsletter/" + google-query: inurl:"/wp-content/plugins/st_newsletter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,st_newsletter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/st_newsletter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "st_newsletter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stackable-ultimate-gutenberg-blocks-36fca09be33f968137213dd9d8d406cb.yaml b/nuclei-templates/cve-less/plugins/stackable-ultimate-gutenberg-blocks-36fca09be33f968137213dd9d8d406cb.yaml new file mode 100644 index 0000000000..35bcf39d5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stackable-ultimate-gutenberg-blocks-36fca09be33f968137213dd9d8d406cb.yaml @@ -0,0 +1,58 @@ +id: stackable-ultimate-gutenberg-blocks-36fca09be33f968137213dd9d8d406cb + +info: + name: > + Stackable – Page Builder Gutenberg Blocks <= 3.12.11 - Authenticated(Contributor+) Stored Cross-Site Scripting via Posts Block + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/daa30b1b-cb8f-43fd-8329-c64b4024408f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stackable-ultimate-gutenberg-blocks/" + google-query: inurl:"/wp-content/plugins/stackable-ultimate-gutenberg-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stackable-ultimate-gutenberg-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stackable-ultimate-gutenberg-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stackable-ultimate-gutenberg-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stackable-ultimate-gutenberg-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/stackable-ultimate-gutenberg-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5689c65eb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stackable-ultimate-gutenberg-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: stackable-ultimate-gutenberg-blocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stackable-ultimate-gutenberg-blocks/" + google-query: inurl:"/wp-content/plugins/stackable-ultimate-gutenberg-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stackable-ultimate-gutenberg-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stackable-ultimate-gutenberg-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stackable-ultimate-gutenberg-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/staff-directory-pro-ac98669a164eec200e7d954863b49097.yaml b/nuclei-templates/cve-less/plugins/staff-directory-pro-ac98669a164eec200e7d954863b49097.yaml new file mode 100644 index 0000000000..9754e1cebc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/staff-directory-pro-ac98669a164eec200e7d954863b49097.yaml @@ -0,0 +1,58 @@ +id: staff-directory-pro-ac98669a164eec200e7d954863b49097 + +info: + name: > + Staff Directory Plugin <= 3.6 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5971447d-0634-49a5-91d0-c4f0c0825a86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/staff-directory-pro/" + google-query: inurl:"/wp-content/plugins/staff-directory-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,staff-directory-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/staff-directory-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "staff-directory-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stafflist-23bc4348b9c1d4b0887cf4fec0175219.yaml b/nuclei-templates/cve-less/plugins/stafflist-23bc4348b9c1d4b0887cf4fec0175219.yaml new file mode 100644 index 0000000000..2476a0c62f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stafflist-23bc4348b9c1d4b0887cf4fec0175219.yaml @@ -0,0 +1,58 @@ +id: stafflist-23bc4348b9c1d4b0887cf4fec0175219 + +info: + name: > + StaffList <= 3.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62a6fc85-db3c-4696-8102-d0247daae56c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stafflist/" + google-query: inurl:"/wp-content/plugins/stafflist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stafflist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stafflist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stafflist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stafflist-f5c3047a64378a59b5a46efb892afcac.yaml b/nuclei-templates/cve-less/plugins/stafflist-f5c3047a64378a59b5a46efb892afcac.yaml new file mode 100644 index 0000000000..3779810fa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stafflist-f5c3047a64378a59b5a46efb892afcac.yaml @@ -0,0 +1,58 @@ +id: stafflist-f5c3047a64378a59b5a46efb892afcac + +info: + name: > + StaffList <= 3.1.2 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cde57dc8-9bfe-482c-8f04-654f4386e484?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stafflist/" + google-query: inurl:"/wp-content/plugins/stafflist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stafflist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stafflist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stafflist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stageshow-63519f47d94f5357008fbc9245726b8e.yaml b/nuclei-templates/cve-less/plugins/stageshow-63519f47d94f5357008fbc9245726b8e.yaml new file mode 100644 index 0000000000..978fe3c52d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stageshow-63519f47d94f5357008fbc9245726b8e.yaml @@ -0,0 +1,58 @@ +id: stageshow-63519f47d94f5357008fbc9245726b8e + +info: + name: > + StageShow < 5.0.9 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbc8ccc1-7b72-44fb-8bf5-e7cb46081ed5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stageshow/" + google-query: inurl:"/wp-content/plugins/stageshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stageshow,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stageshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stageshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stagtools-295c71d391fe6f97f05c0f5bc739be92.yaml b/nuclei-templates/cve-less/plugins/stagtools-295c71d391fe6f97f05c0f5bc739be92.yaml new file mode 100644 index 0000000000..93b2f83e9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stagtools-295c71d391fe6f97f05c0f5bc739be92.yaml @@ -0,0 +1,58 @@ +id: stagtools-295c71d391fe6f97f05c0f5bc739be92 + +info: + name: > + Stagtools <= 2.3.6 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45754b5b-8f94-4806-a931-bb423450682c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stagtools/" + google-query: inurl:"/wp-content/plugins/stagtools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stagtools,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stagtools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stagtools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stagtools-5f2953556f6ef8b300e083b724959d0b.yaml b/nuclei-templates/cve-less/plugins/stagtools-5f2953556f6ef8b300e083b724959d0b.yaml new file mode 100644 index 0000000000..58c91612a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stagtools-5f2953556f6ef8b300e083b724959d0b.yaml @@ -0,0 +1,58 @@ +id: stagtools-5f2953556f6ef8b300e083b724959d0b + +info: + name: > + Stagtools <= 2.3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca09ce0d-3989-420d-9457-f0acd709cc6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stagtools/" + google-query: inurl:"/wp-content/plugins/stagtools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stagtools,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stagtools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stagtools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stampedio-product-reviews-268eba465e26dd79ea6cf3787bb22b93.yaml b/nuclei-templates/cve-less/plugins/stampedio-product-reviews-268eba465e26dd79ea6cf3787bb22b93.yaml new file mode 100644 index 0000000000..23bf410fda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stampedio-product-reviews-268eba465e26dd79ea6cf3787bb22b93.yaml @@ -0,0 +1,58 @@ +id: stampedio-product-reviews-268eba465e26dd79ea6cf3787bb22b93 + +info: + name: > + Stamped.io Product Reviews & UGC for WooCommerce <= 2.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a8c4232-2e1e-4c99-83d5-d70f7ca1c879?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stampedio-product-reviews/" + google-query: inurl:"/wp-content/plugins/stampedio-product-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stampedio-product-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stampedio-product-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stampedio-product-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stampedio-product-reviews-f7de3a4183d7c85f1508bd7bcbb56139.yaml b/nuclei-templates/cve-less/plugins/stampedio-product-reviews-f7de3a4183d7c85f1508bd7bcbb56139.yaml new file mode 100644 index 0000000000..96937caa9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stampedio-product-reviews-f7de3a4183d7c85f1508bd7bcbb56139.yaml @@ -0,0 +1,58 @@ +id: stampedio-product-reviews-f7de3a4183d7c85f1508bd7bcbb56139 + +info: + name: > + Stamped.io Product Reviews & UGC for WooCommerce <= 2.3.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/490061dc-11f7-48f2-bc9a-974bedf16621?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stampedio-product-reviews/" + google-query: inurl:"/wp-content/plugins/stampedio-product-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stampedio-product-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stampedio-product-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stampedio-product-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/standout-color-boxes-and-buttons-b00282494ef0f9932dc7277c14e145b9.yaml b/nuclei-templates/cve-less/plugins/standout-color-boxes-and-buttons-b00282494ef0f9932dc7277c14e145b9.yaml new file mode 100644 index 0000000000..1eb8c22070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/standout-color-boxes-and-buttons-b00282494ef0f9932dc7277c14e145b9.yaml @@ -0,0 +1,58 @@ +id: standout-color-boxes-and-buttons-b00282494ef0f9932dc7277c14e145b9 + +info: + name: > + Standout Color Boxes and Buttons <= 0.7.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a826dff8-60ae-4e25-9d3e-be93f192aaca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/standout-color-boxes-and-buttons/" + google-query: inurl:"/wp-content/plugins/standout-color-boxes-and-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,standout-color-boxes-and-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/standout-color-boxes-and-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "standout-color-boxes-and-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/star-cloudprnt-for-woocommerce-346e0f78c8914c5524619c3f260ec3fe.yaml b/nuclei-templates/cve-less/plugins/star-cloudprnt-for-woocommerce-346e0f78c8914c5524619c3f260ec3fe.yaml new file mode 100644 index 0000000000..d8ffcd0c9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/star-cloudprnt-for-woocommerce-346e0f78c8914c5524619c3f260ec3fe.yaml @@ -0,0 +1,58 @@ +id: star-cloudprnt-for-woocommerce-346e0f78c8914c5524619c3f260ec3fe + +info: + name: > + Star CloudPRNT for WooCommerce <= 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/110c6d41-e814-41c9-a3e7-d94ec3d953e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/star-cloudprnt-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/star-cloudprnt-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,star-cloudprnt-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/star-cloudprnt-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "star-cloudprnt-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/star-cloudprnt-for-woocommerce-68ab25be74477c215ab2a821dbee384e.yaml b/nuclei-templates/cve-less/plugins/star-cloudprnt-for-woocommerce-68ab25be74477c215ab2a821dbee384e.yaml new file mode 100644 index 0000000000..b9e6b7b169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/star-cloudprnt-for-woocommerce-68ab25be74477c215ab2a821dbee384e.yaml @@ -0,0 +1,58 @@ +id: star-cloudprnt-for-woocommerce-68ab25be74477c215ab2a821dbee384e + +info: + name: > + Star CloudPRNT for WooCommerce <= 2.0.3 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f850644-4923-46c1-90f6-d29088c9cb1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/star-cloudprnt-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/star-cloudprnt-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,star-cloudprnt-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/star-cloudprnt-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "star-cloudprnt-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/starbox-55749978c55c3ff34eeaa5813711f342.yaml b/nuclei-templates/cve-less/plugins/starbox-55749978c55c3ff34eeaa5813711f342.yaml new file mode 100644 index 0000000000..4f346d57a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/starbox-55749978c55c3ff34eeaa5813711f342.yaml @@ -0,0 +1,58 @@ +id: starbox-55749978c55c3ff34eeaa5813711f342 + +info: + name: > + Starbox <= 3.4.8 - Authenticated (Subscriber+) Stored Cross-Site Scripting via Job Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f413fc2-8543-4478-987d-d983581027bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/starbox/" + google-query: inurl:"/wp-content/plugins/starbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,starbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/starbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "starbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/starbox-750a764136a41cb3d1ef7fa35a4e6897.yaml b/nuclei-templates/cve-less/plugins/starbox-750a764136a41cb3d1ef7fa35a4e6897.yaml new file mode 100644 index 0000000000..663d9571b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/starbox-750a764136a41cb3d1ef7fa35a4e6897.yaml @@ -0,0 +1,58 @@ +id: starbox-750a764136a41cb3d1ef7fa35a4e6897 + +info: + name: > + Starbox <= 3.4.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9694fae8-dfe9-4e19-bebc-2f2a607cff82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/starbox/" + google-query: inurl:"/wp-content/plugins/starbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,starbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/starbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "starbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/starbox-97fda38a75735b5bdc9de194b151a883.yaml b/nuclei-templates/cve-less/plugins/starbox-97fda38a75735b5bdc9de194b151a883.yaml new file mode 100644 index 0000000000..83b24e70bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/starbox-97fda38a75735b5bdc9de194b151a883.yaml @@ -0,0 +1,58 @@ +id: starbox-97fda38a75735b5bdc9de194b151a883 + +info: + name: > + Starbox <= 3.4.8 - Authenticated (Subscriber+) Stored Cross-Site Scripting via Profile Display Name and Social Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0eafe473-9177-47c4-aa1e-2350cb827447?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/starbox/" + google-query: inurl:"/wp-content/plugins/starbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,starbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/starbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "starbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/starbox-e415a95e174fb12ae126d3d07ffd90b5.yaml b/nuclei-templates/cve-less/plugins/starbox-e415a95e174fb12ae126d3d07ffd90b5.yaml new file mode 100644 index 0000000000..6d7b083a08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/starbox-e415a95e174fb12ae126d3d07ffd90b5.yaml @@ -0,0 +1,58 @@ +id: starbox-e415a95e174fb12ae126d3d07ffd90b5 + +info: + name: > + Starbox – the Author Box for Humans <= 3.4.7 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c47601b4-bf16-4f59-b5f3-584a8eac7c67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/starbox/" + google-query: inurl:"/wp-content/plugins/starbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,starbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/starbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "starbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/starbox-voting-b25512c67e99a5071e31e499f00e5d98.yaml b/nuclei-templates/cve-less/plugins/starbox-voting-b25512c67e99a5071e31e499f00e5d98.yaml new file mode 100644 index 0000000000..e0c0c7aa34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/starbox-voting-b25512c67e99a5071e31e499f00e5d98.yaml @@ -0,0 +1,58 @@ +id: starbox-voting-b25512c67e99a5071e31e499f00e5d98 + +info: + name: > + Starbox Voting <= 2.0.4 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f34383c7-1d98-4f8a-aa43-542fe2d9a567?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/starbox-voting/" + google-query: inurl:"/wp-content/plugins/starbox-voting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,starbox-voting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/starbox-voting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "starbox-voting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/starfish-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/starfish-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8fed4e25d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/starfish-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: starfish-reviews-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/starfish-reviews/" + google-query: inurl:"/wp-content/plugins/starfish-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,starfish-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/starfish-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "starfish-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/starfish-reviews-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/starfish-reviews-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..3e102a27c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/starfish-reviews-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: starfish-reviews-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/starfish-reviews/" + google-query: inurl:"/wp-content/plugins/starfish-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,starfish-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/starfish-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "starfish-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stars-menu-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/stars-menu-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..e604255768 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stars-menu-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: stars-menu-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stars-menu/" + google-query: inurl:"/wp-content/plugins/stars-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stars-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stars-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stars-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stars-rating-877b177b6c582a19ddf3d94a1f834d93.yaml b/nuclei-templates/cve-less/plugins/stars-rating-877b177b6c582a19ddf3d94a1f834d93.yaml new file mode 100644 index 0000000000..e0cbd6c11b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stars-rating-877b177b6c582a19ddf3d94a1f834d93.yaml @@ -0,0 +1,58 @@ +id: stars-rating-877b177b6c582a19ddf3d94a1f834d93 + +info: + name: > + Stars Rating <= 3.5.0 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47a00c6f-958f-41c7-a213-c858d8fac2ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stars-rating/" + google-query: inurl:"/wp-content/plugins/stars-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stars-rating,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stars-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stars-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/starterblocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/starterblocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..88a461b8ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/starterblocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: starterblocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/starterblocks/" + google-query: inurl:"/wp-content/plugins/starterblocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,starterblocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/starterblocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "starterblocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/startklar-elmentor-forms-extwidgets-97fdac4e69d052b8d3b0b9d3bb3a6f6c.yaml b/nuclei-templates/cve-less/plugins/startklar-elmentor-forms-extwidgets-97fdac4e69d052b8d3b0b9d3bb3a6f6c.yaml new file mode 100644 index 0000000000..bd5b69263b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/startklar-elmentor-forms-extwidgets-97fdac4e69d052b8d3b0b9d3bb3a6f6c.yaml @@ -0,0 +1,58 @@ +id: startklar-elmentor-forms-extwidgets-97fdac4e69d052b8d3b0b9d3bb3a6f6c + +info: + name: > + Startklar Elementor Addons <= 1.7.13 - Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a125bbf1-8ff6-4f3d-a4fb-caaaefe1df2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/startklar-elmentor-forms-extwidgets/" + google-query: inurl:"/wp-content/plugins/startklar-elmentor-forms-extwidgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,startklar-elmentor-forms-extwidgets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/startklar-elmentor-forms-extwidgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "startklar-elmentor-forms-extwidgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/startklar-elmentor-forms-extwidgets-d60b1c02d17322f76c1b2881d2462ff2.yaml b/nuclei-templates/cve-less/plugins/startklar-elmentor-forms-extwidgets-d60b1c02d17322f76c1b2881d2462ff2.yaml new file mode 100644 index 0000000000..40e93c20fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/startklar-elmentor-forms-extwidgets-d60b1c02d17322f76c1b2881d2462ff2.yaml @@ -0,0 +1,58 @@ +id: startklar-elmentor-forms-extwidgets-d60b1c02d17322f76c1b2881d2462ff2 + +info: + name: > + Startklar Elementor Addons <= 1.7.13 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4221b33c-5cfa-48db-92bf-bf25ff3c5a5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/startklar-elmentor-forms-extwidgets/" + google-query: inurl:"/wp-content/plugins/startklar-elmentor-forms-extwidgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,startklar-elmentor-forms-extwidgets,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/startklar-elmentor-forms-extwidgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "startklar-elmentor-forms-extwidgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/station-pro-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/station-pro-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..33d669776b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/station-pro-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: station-pro-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/station-pro/" + google-query: inurl:"/wp-content/plugins/station-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,station-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/station-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "station-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/station-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/station-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b56ce11e95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/station-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: station-pro-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/station-pro/" + google-query: inurl:"/wp-content/plugins/station-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,station-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/station-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "station-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/statpresscn-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml b/nuclei-templates/cve-less/plugins/statpresscn-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml new file mode 100644 index 0000000000..0789b3dde1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/statpresscn-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml @@ -0,0 +1,58 @@ +id: statpresscn-5ea2cc8533d8fd4f1c4801b0b4960d9d + +info: + name: > + StatPressCN <= 1.9.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b85e583-7028-4de4-8634-a331ef38a22e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/statpresscn/" + google-query: inurl:"/wp-content/plugins/statpresscn/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,statpresscn,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/statpresscn/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "statpresscn" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stats-6928e4dd3f8a754ad4543c4aa86a65d0.yaml b/nuclei-templates/cve-less/plugins/stats-6928e4dd3f8a754ad4543c4aa86a65d0.yaml new file mode 100644 index 0000000000..9363e7f448 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stats-6928e4dd3f8a754ad4543c4aa86a65d0.yaml @@ -0,0 +1,58 @@ +id: stats-6928e4dd3f8a754ad4543c4aa86a65d0 + +info: + name: > + stats <= 1.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3eec5823-f1ee-464c-8344-eed3ee991602?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stats/" + google-query: inurl:"/wp-content/plugins/stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stats,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stats-c67af2c20174cb06fdec04d2bad87d02.yaml b/nuclei-templates/cve-less/plugins/stats-c67af2c20174cb06fdec04d2bad87d02.yaml new file mode 100644 index 0000000000..0615c2cd0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stats-c67af2c20174cb06fdec04d2bad87d02.yaml @@ -0,0 +1,58 @@ +id: stats-c67af2c20174cb06fdec04d2bad87d02 + +info: + name: > + stats <= 1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d60e1a2c-a3f1-4c39-a22f-9c09d0fed2c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stats/" + google-query: inurl:"/wp-content/plugins/stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stats,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stats-counter-02fe09c7b43da12dda02e01bae697e2b.yaml b/nuclei-templates/cve-less/plugins/stats-counter-02fe09c7b43da12dda02e01bae697e2b.yaml new file mode 100644 index 0000000000..bd4e6ffebd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stats-counter-02fe09c7b43da12dda02e01bae697e2b.yaml @@ -0,0 +1,58 @@ +id: stats-counter-02fe09c7b43da12dda02e01bae697e2b + +info: + name: > + Analytics Stats Counter Statistics <= 1.2.2.5 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7af05793-b495-4cad-842b-f168d0dc8253?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stats-counter/" + google-query: inurl:"/wp-content/plugins/stats-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stats-counter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stats-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stats-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..2775828b5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: stax-addons-for-elementor-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/stax-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-b3370369626f0cd7746a33baa8f9c6f9.yaml b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-b3370369626f0cd7746a33baa8f9c6f9.yaml new file mode 100644 index 0000000000..5bc9293ebf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-b3370369626f0cd7746a33baa8f9c6f9.yaml @@ -0,0 +1,58 @@ +id: stax-addons-for-elementor-b3370369626f0cd7746a33baa8f9c6f9 + +info: + name: > + Elementor Addons, Widgets and Enhancements – Stax <= 1.4.3 - Missing Authorization in toggle_widget + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/926550bb-265d-4811-a375-10c47e9fb4d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/stax-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..1e638e3af0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: stax-addons-for-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/stax-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-cebe60a1cf2dde46346583e6502d2df4.yaml b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-cebe60a1cf2dde46346583e6502d2df4.yaml new file mode 100644 index 0000000000..4424e45dff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-cebe60a1cf2dde46346583e6502d2df4.yaml @@ -0,0 +1,58 @@ +id: stax-addons-for-elementor-cebe60a1cf2dde46346583e6502d2df4 + +info: + name: > + Elementor Addons, Widgets and Enhancements – Stax <= 1.4.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16320b5e-1cb5-4e6d-ad2e-8ccd9cfa45ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/stax-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-e4c7791fde3e7334165d62fc0d2ccc21.yaml b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-e4c7791fde3e7334165d62fc0d2ccc21.yaml new file mode 100644 index 0000000000..a66141ac81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-addons-for-elementor-e4c7791fde3e7334165d62fc0d2ccc21.yaml @@ -0,0 +1,58 @@ +id: stax-addons-for-elementor-e4c7791fde3e7334165d62fc0d2ccc21 + +info: + name: > + Elementor Addons, Widgets and Enhancements – Stax <= 1.4.3 - Cross-Site Request Forgery via toggle_widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c12094bd-aa23-4f9b-92e1-d1d4284fb2a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/stax-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/stax-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d134f34d9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: stax-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax/" + google-query: inurl:"/wp-content/plugins/stax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-buddy-builder-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/stax-buddy-builder-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..db3bcd617c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-buddy-builder-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: stax-buddy-builder-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax-buddy-builder/" + google-query: inurl:"/wp-content/plugins/stax-buddy-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax-buddy-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax-buddy-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax-buddy-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-buddy-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/stax-buddy-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..c3644d5205 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-buddy-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: stax-buddy-builder-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax-buddy-builder/" + google-query: inurl:"/wp-content/plugins/stax-buddy-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax-buddy-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax-buddy-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax-buddy-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stax-buddy-builder-cbf068b76996a12348c77160d6abfb9b.yaml b/nuclei-templates/cve-less/plugins/stax-buddy-builder-cbf068b76996a12348c77160d6abfb9b.yaml new file mode 100644 index 0000000000..0c50cc7703 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stax-buddy-builder-cbf068b76996a12348c77160d6abfb9b.yaml @@ -0,0 +1,58 @@ +id: stax-buddy-builder-cbf068b76996a12348c77160d6abfb9b + +info: + name: > + BuddyBuilder - BuddyPress Builder for Elementor <= 1.7.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23924342-3b1d-4360-bd87-104091283e35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stax-buddy-builder/" + google-query: inurl:"/wp-content/plugins/stax-buddy-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stax-buddy-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stax-buddy-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stax-buddy-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/steam-group-viewer-ba89c7968306258a1d45a93c7b938ec5.yaml b/nuclei-templates/cve-less/plugins/steam-group-viewer-ba89c7968306258a1d45a93c7b938ec5.yaml new file mode 100644 index 0000000000..ff5fab189f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/steam-group-viewer-ba89c7968306258a1d45a93c7b938ec5.yaml @@ -0,0 +1,58 @@ +id: steam-group-viewer-ba89c7968306258a1d45a93c7b938ec5 + +info: + name: > + Steam Group Viewer <= 2.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4e982d1-7ad9-490e-b606-695cafbc7f0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/steam-group-viewer/" + google-query: inurl:"/wp-content/plugins/steam-group-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,steam-group-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/steam-group-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "steam-group-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stepbyteservice-openstreetmap-e82baab8930846897895cd56a53f4176.yaml b/nuclei-templates/cve-less/plugins/stepbyteservice-openstreetmap-e82baab8930846897895cd56a53f4176.yaml new file mode 100644 index 0000000000..cf8586f26b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stepbyteservice-openstreetmap-e82baab8930846897895cd56a53f4176.yaml @@ -0,0 +1,58 @@ +id: stepbyteservice-openstreetmap-e82baab8930846897895cd56a53f4176 + +info: + name: > + OpenStreetMap for Gutenberg and WPBakery Page Builder (formerly Visual Composer) <= 1.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13d2a333-1f45-457e-a48b-38c1e0793eeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stepbyteservice-openstreetmap/" + google-query: inurl:"/wp-content/plugins/stepbyteservice-openstreetmap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stepbyteservice-openstreetmap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stepbyteservice-openstreetmap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stepbyteservice-openstreetmap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stetic-6c87924dbb6c43a2f1ddf339475f1f21.yaml b/nuclei-templates/cve-less/plugins/stetic-6c87924dbb6c43a2f1ddf339475f1f21.yaml new file mode 100644 index 0000000000..927848c168 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stetic-6c87924dbb6c43a2f1ddf339475f1f21.yaml @@ -0,0 +1,58 @@ +id: stetic-6c87924dbb6c43a2f1ddf339475f1f21 + +info: + name: > + Stetic <= 1.0.6 Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3469ba0d-8ef3-41d0-becb-cf2eb43758f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stetic/" + google-query: inurl:"/wp-content/plugins/stetic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stetic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stetic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stetic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-ad-bar-e6b604fdb9cd729f08feb0319847d447.yaml b/nuclei-templates/cve-less/plugins/sticky-ad-bar-e6b604fdb9cd729f08feb0319847d447.yaml new file mode 100644 index 0000000000..3e98299f72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-ad-bar-e6b604fdb9cd729f08feb0319847d447.yaml @@ -0,0 +1,58 @@ +id: sticky-ad-bar-e6b604fdb9cd729f08feb0319847d447 + +info: + name: > + Sticky Ad Bar <= 1.3.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/750a4a94-458c-4944-a99b-a1c8e23e57d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-ad-bar/" + google-query: inurl:"/wp-content/plugins/sticky-ad-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-ad-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-ad-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-ad-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-add-to-cart-for-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sticky-add-to-cart-for-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bbf2b83d3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-add-to-cart-for-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sticky-add-to-cart-for-woo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-add-to-cart-for-woo/" + google-query: inurl:"/wp-content/plugins/sticky-add-to-cart-for-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-add-to-cart-for-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-add-to-cart-for-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-add-to-cart-for-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-buttons-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/sticky-buttons-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..4b8c05214a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-buttons-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: sticky-buttons-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-buttons/" + google-query: inurl:"/wp-content/plugins/sticky-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-buttons-7e2dc330bdadb62eadfb9a21217d5798.yaml b/nuclei-templates/cve-less/plugins/sticky-buttons-7e2dc330bdadb62eadfb9a21217d5798.yaml new file mode 100644 index 0000000000..b41a6de4b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-buttons-7e2dc330bdadb62eadfb9a21217d5798.yaml @@ -0,0 +1,58 @@ +id: sticky-buttons-7e2dc330bdadb62eadfb9a21217d5798 + +info: + name: > + Sticky Buttons <= 3.2.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c070be-e955-4076-9878-0b1044766397?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-buttons/" + google-query: inurl:"/wp-content/plugins/sticky-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-buttons-859f059a5b5e1e007a3660b6b0f57e21.yaml b/nuclei-templates/cve-less/plugins/sticky-buttons-859f059a5b5e1e007a3660b6b0f57e21.yaml new file mode 100644 index 0000000000..f2e15217f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-buttons-859f059a5b5e1e007a3660b6b0f57e21.yaml @@ -0,0 +1,58 @@ +id: sticky-buttons-859f059a5b5e1e007a3660b6b0f57e21 + +info: + name: > + Sticky Buttons – floating buttons builder <= 3.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74ac2b14-aea1-4366-acf4-d2d86cdec4c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-buttons/" + google-query: inurl:"/wp-content/plugins/sticky-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-chat-widget-081b4b5984322d0654bd5e7e3e37d073.yaml b/nuclei-templates/cve-less/plugins/sticky-chat-widget-081b4b5984322d0654bd5e7e3e37d073.yaml new file mode 100644 index 0000000000..2cff4e5439 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-chat-widget-081b4b5984322d0654bd5e7e3e37d073.yaml @@ -0,0 +1,58 @@ +id: sticky-chat-widget-081b4b5984322d0654bd5e7e3e37d073 + +info: + name: > + Sticky Chat Widget <= 1.1.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/892fe839-57ca-45bc-aa9b-f1bf87994a77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-chat-widget/" + google-query: inurl:"/wp-content/plugins/sticky-chat-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-chat-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-chat-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-chat-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-header-oceanwp-40341532c7f84f3b54f6d735c45b3460.yaml b/nuclei-templates/cve-less/plugins/sticky-header-oceanwp-40341532c7f84f3b54f6d735c45b3460.yaml new file mode 100644 index 0000000000..2994a4ead6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-header-oceanwp-40341532c7f84f3b54f6d735c45b3460.yaml @@ -0,0 +1,58 @@ +id: sticky-header-oceanwp-40341532c7f84f3b54f6d735c45b3460 + +info: + name: > + Oceanwp sticky header <= 1.0.8 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e0d21e6-d8a2-44ab-87f3-9e5a16562020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-header-oceanwp/" + google-query: inurl:"/wp-content/plugins/sticky-header-oceanwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-header-oceanwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-header-oceanwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-header-oceanwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-menu-or-anything-on-scroll-cb59e9addcdd2f8364b25566a29199bb.yaml b/nuclei-templates/cve-less/plugins/sticky-menu-or-anything-on-scroll-cb59e9addcdd2f8364b25566a29199bb.yaml new file mode 100644 index 0000000000..5aa962de11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-menu-or-anything-on-scroll-cb59e9addcdd2f8364b25566a29199bb.yaml @@ -0,0 +1,58 @@ +id: sticky-menu-or-anything-on-scroll-cb59e9addcdd2f8364b25566a29199bb + +info: + name: > + Sticky Menu & Sticky Header <= 2.20 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4625d217-99d4-47d8-b093-fe55a3018348?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-menu-or-anything-on-scroll/" + google-query: inurl:"/wp-content/plugins/sticky-menu-or-anything-on-scroll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-menu-or-anything-on-scroll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-menu-or-anything-on-scroll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-menu-or-anything-on-scroll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-popup-309733b2329b1a831e5f4ba1b62b19a8.yaml b/nuclei-templates/cve-less/plugins/sticky-popup-309733b2329b1a831e5f4ba1b62b19a8.yaml new file mode 100644 index 0000000000..cc4f054f11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-popup-309733b2329b1a831e5f4ba1b62b19a8.yaml @@ -0,0 +1,58 @@ +id: sticky-popup-309733b2329b1a831e5f4ba1b62b19a8 + +info: + name: > + Sticky Popup <= 1.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a5262d8-d9cd-4bd9-a95e-f60782095173?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-popup/" + google-query: inurl:"/wp-content/plugins/sticky-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-related-posts-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/sticky-related-posts-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..f372ca0e00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-related-posts-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: sticky-related-posts-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-related-posts/" + google-query: inurl:"/wp-content/plugins/sticky-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sticky-social-media-icons-c9799f12c2184eb30d64cc5143268b5b.yaml b/nuclei-templates/cve-less/plugins/sticky-social-media-icons-c9799f12c2184eb30d64cc5143268b5b.yaml new file mode 100644 index 0000000000..c2a48cd7fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sticky-social-media-icons-c9799f12c2184eb30d64cc5143268b5b.yaml @@ -0,0 +1,58 @@ +id: sticky-social-media-icons-c9799f12c2184eb30d64cc5143268b5b + +info: + name: > + Sticky Social Media Icons <= 2.0 - Missing Authorization via ajax_request_handle + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58cfb328-40d0-4bea-a707-d5d6c1ce364a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sticky-social-media-icons/" + google-query: inurl:"/wp-content/plugins/sticky-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sticky-social-media-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sticky-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sticky-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-exporter-for-woocommerce-52fb89fd718db76422fb10fc104a8d62.yaml b/nuclei-templates/cve-less/plugins/stock-exporter-for-woocommerce-52fb89fd718db76422fb10fc104a8d62.yaml new file mode 100644 index 0000000000..0cb85eed69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-exporter-for-woocommerce-52fb89fd718db76422fb10fc104a8d62.yaml @@ -0,0 +1,58 @@ +id: stock-exporter-for-woocommerce-52fb89fd718db76422fb10fc104a8d62 + +info: + name: > + Stock Exporter for WooCommerce <= 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b65184e6-8072-4dd7-8291-c92817e55beb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-exporter-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/stock-exporter-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-exporter-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-exporter-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-exporter-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-exporter-for-woocommerce-7484648ba547861958c645da1722e120.yaml b/nuclei-templates/cve-less/plugins/stock-exporter-for-woocommerce-7484648ba547861958c645da1722e120.yaml new file mode 100644 index 0000000000..6dbdd8b84b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-exporter-for-woocommerce-7484648ba547861958c645da1722e120.yaml @@ -0,0 +1,58 @@ +id: stock-exporter-for-woocommerce-7484648ba547861958c645da1722e120 + +info: + name: > + Stock Exporter for WooCommerce <= 1.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c4a9092-fd49-42fe-a84d-a9f7fe708122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-exporter-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/stock-exporter-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-exporter-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-exporter-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-exporter-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-in-3f8c7e452acf0c92c2be04758743dd87.yaml b/nuclei-templates/cve-less/plugins/stock-in-3f8c7e452acf0c92c2be04758743dd87.yaml new file mode 100644 index 0000000000..f549d3ca92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-in-3f8c7e452acf0c92c2be04758743dd87.yaml @@ -0,0 +1,58 @@ +id: stock-in-3f8c7e452acf0c92c2be04758743dd87 + +info: + name: > + Stock in & out <= 1.0.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f938a446-ae0b-4e06-9d55-26e2fea4d1e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-in/" + google-query: inurl:"/wp-content/plugins/stock-in/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-in,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-in/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-in" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-in-b71491b8bf7c07dcdab705de72ac74a3.yaml b/nuclei-templates/cve-less/plugins/stock-in-b71491b8bf7c07dcdab705de72ac74a3.yaml new file mode 100644 index 0000000000..2e802628e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-in-b71491b8bf7c07dcdab705de72ac74a3.yaml @@ -0,0 +1,58 @@ +id: stock-in-b71491b8bf7c07dcdab705de72ac74a3 + +info: + name: > + Stock in & out <= 1.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c6bbdcd-9b08-4c17-9a87-e06baa4cca1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-in/" + google-query: inurl:"/wp-content/plugins/stock-in/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-in,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-in/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-in" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-locations-for-woocommerce-56e0af85bfab5155d836999c55aea415.yaml b/nuclei-templates/cve-less/plugins/stock-locations-for-woocommerce-56e0af85bfab5155d836999c55aea415.yaml new file mode 100644 index 0000000000..0be12e73f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-locations-for-woocommerce-56e0af85bfab5155d836999c55aea415.yaml @@ -0,0 +1,58 @@ +id: stock-locations-for-woocommerce-56e0af85bfab5155d836999c55aea415 + +info: + name: > + Stock Locations for WooCommerce <= 2.5.9 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6090a49-f3dc-4b7b-bc86-eb7ec57b7ba4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-locations-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/stock-locations-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-locations-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-locations-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-locations-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-market-charts-from-finviz-4d66daf76c1a504d8951d5442d44e0d6.yaml b/nuclei-templates/cve-less/plugins/stock-market-charts-from-finviz-4d66daf76c1a504d8951d5442d44e0d6.yaml new file mode 100644 index 0000000000..53236befe4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-market-charts-from-finviz-4d66daf76c1a504d8951d5442d44e0d6.yaml @@ -0,0 +1,58 @@ +id: stock-market-charts-from-finviz-4d66daf76c1a504d8951d5442d44e0d6 + +info: + name: > + Stock market charts from finviz <= 1.0.1 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d6b5a4c-1dc9-4d86-ac41-61880637fcbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-market-charts-from-finviz/" + google-query: inurl:"/wp-content/plugins/stock-market-charts-from-finviz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-market-charts-from-finviz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-market-charts-from-finviz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-market-charts-from-finviz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-quotes-list-9bd703646402672c6e3df139cb8847d8.yaml b/nuclei-templates/cve-less/plugins/stock-quotes-list-9bd703646402672c6e3df139cb8847d8.yaml new file mode 100644 index 0000000000..e83079c43c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-quotes-list-9bd703646402672c6e3df139cb8847d8.yaml @@ -0,0 +1,58 @@ +id: stock-quotes-list-9bd703646402672c6e3df139cb8847d8 + +info: + name: > + Stock Quotes List <= 2.9.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dffbb2d-69d1-495c-8c96-64c5fd878fcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-quotes-list/" + google-query: inurl:"/wp-content/plugins/stock-quotes-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-quotes-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-quotes-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-quotes-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-0a4ea8332eb63945a72a76009caecdd3.yaml b/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-0a4ea8332eb63945a72a76009caecdd3.yaml new file mode 100644 index 0000000000..7cc9c60af0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-0a4ea8332eb63945a72a76009caecdd3.yaml @@ -0,0 +1,58 @@ +id: stock-sync-for-woocommerce-0a4ea8332eb63945a72a76009caecdd3 + +info: + name: > + Stock Sync for WooCommerce <= 2.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf13732b-7c24-443a-bae9-d8cf70b5cb33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-sync-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/stock-sync-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-sync-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-sync-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-sync-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-9c2789fd4f31da6a3e682d3cde6291b3.yaml b/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-9c2789fd4f31da6a3e682d3cde6291b3.yaml new file mode 100644 index 0000000000..3a10de145d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-9c2789fd4f31da6a3e682d3cde6291b3.yaml @@ -0,0 +1,58 @@ +id: stock-sync-for-woocommerce-9c2789fd4f31da6a3e682d3cde6291b3 + +info: + name: > + Stock Sync for WooCommerce <= 2.3.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8faa34a-17fd-4a2e-b8bf-ed40fc7a88d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-sync-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/stock-sync-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-sync-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-sync-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-sync-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-c9110bf3cc68474c30b266d852672473.yaml b/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-c9110bf3cc68474c30b266d852672473.yaml new file mode 100644 index 0000000000..796b6695d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-sync-for-woocommerce-c9110bf3cc68474c30b266d852672473.yaml @@ -0,0 +1,58 @@ +id: stock-sync-for-woocommerce-c9110bf3cc68474c30b266d852672473 + +info: + name: > + Stock Sync for WooCommerce <= 2.4.0 - Reflected Cross-Site Scripting via page parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adcaf2db-2026-46bb-8fbc-0400d7c1e296?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-sync-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/stock-sync-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-sync-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-sync-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-sync-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-ticker-2ea3be25438d9c3b8022fc0114332035.yaml b/nuclei-templates/cve-less/plugins/stock-ticker-2ea3be25438d9c3b8022fc0114332035.yaml new file mode 100644 index 0000000000..be8621fca1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-ticker-2ea3be25438d9c3b8022fc0114332035.yaml @@ -0,0 +1,58 @@ +id: stock-ticker-2ea3be25438d9c3b8022fc0114332035 + +info: + name: > + Stock Ticker <= 3.23.2 - Reflected Cross-Site Scripting in ajax_stockticker_symbol_search_test + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f8321a7-863c-43ab-a42a-e01d60101c3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-ticker/" + google-query: inurl:"/wp-content/plugins/stock-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.23.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-ticker-389e4423679f1c467a852761b85f3cfd.yaml b/nuclei-templates/cve-less/plugins/stock-ticker-389e4423679f1c467a852761b85f3cfd.yaml new file mode 100644 index 0000000000..9a61fe1122 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-ticker-389e4423679f1c467a852761b85f3cfd.yaml @@ -0,0 +1,58 @@ +id: stock-ticker-389e4423679f1c467a852761b85f3cfd + +info: + name: > + Stock Ticker <= 3.23.4 - Authenticated (Contributor+) Stored Cross-Site Scritping + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8e921f4-d889-490f-a817-53d132a56f83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-ticker/" + google-query: inurl:"/wp-content/plugins/stock-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-ticker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.23.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-ticker-5d5ae51f589bad252b3ae3b1c695b8aa.yaml b/nuclei-templates/cve-less/plugins/stock-ticker-5d5ae51f589bad252b3ae3b1c695b8aa.yaml new file mode 100644 index 0000000000..6edfd5ee14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-ticker-5d5ae51f589bad252b3ae3b1c695b8aa.yaml @@ -0,0 +1,58 @@ +id: stock-ticker-5d5ae51f589bad252b3ae3b1c695b8aa + +info: + name: > + Stock Ticker <= 3.23.3 - Reflected Cross-Site Scripting in ajax_stockticker_load + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06eaf73f-273c-4733-9ff9-2d8034221814?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-ticker/" + google-query: inurl:"/wp-content/plugins/stock-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-ticker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stock-ticker-a63f1210dd076ac1af75bbdfb4936df5.yaml b/nuclei-templates/cve-less/plugins/stock-ticker-a63f1210dd076ac1af75bbdfb4936df5.yaml new file mode 100644 index 0000000000..97cbaa2bf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stock-ticker-a63f1210dd076ac1af75bbdfb4936df5.yaml @@ -0,0 +1,58 @@ +id: stock-ticker-a63f1210dd076ac1af75bbdfb4936df5 + +info: + name: > + Stock Ticker <= 3.23.0 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e81c4d77-5459-4f56-b339-8da0877a6663?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stock-ticker/" + google-query: inurl:"/wp-content/plugins/stock-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stock-ticker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stock-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stock-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.23.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stockdio-historical-chart-77325720e82684664a6b23fccd8e86e5.yaml b/nuclei-templates/cve-less/plugins/stockdio-historical-chart-77325720e82684664a6b23fccd8e86e5.yaml new file mode 100644 index 0000000000..54d429cc1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stockdio-historical-chart-77325720e82684664a6b23fccd8e86e5.yaml @@ -0,0 +1,58 @@ +id: stockdio-historical-chart-77325720e82684664a6b23fccd8e86e5 + +info: + name: > + Stockdio Historical Chart < 2.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57162a5e-5f5d-4b22-bb7f-0ff65332910b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stockdio-historical-chart/" + google-query: inurl:"/wp-content/plugins/stockdio-historical-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stockdio-historical-chart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stockdio-historical-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stockdio-historical-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stockists-manager-93d3f42fb72b82260168d21150301cb3.yaml b/nuclei-templates/cve-less/plugins/stockists-manager-93d3f42fb72b82260168d21150301cb3.yaml new file mode 100644 index 0000000000..882f725603 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stockists-manager-93d3f42fb72b82260168d21150301cb3.yaml @@ -0,0 +1,58 @@ +id: stockists-manager-93d3f42fb72b82260168d21150301cb3 + +info: + name: > + Stockists Manager for Woocommerce <= 1.0.2.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b5e0204-4a05-45c1-833a-c2e4016d9830?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stockists-manager/" + google-query: inurl:"/wp-content/plugins/stockists-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stockists-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stockists-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stockists-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-referrer-spam-e98b32d10be48dc189fcfc8cfe33a3ba.yaml b/nuclei-templates/cve-less/plugins/stop-referrer-spam-e98b32d10be48dc189fcfc8cfe33a3ba.yaml new file mode 100644 index 0000000000..58318f566f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-referrer-spam-e98b32d10be48dc189fcfc8cfe33a3ba.yaml @@ -0,0 +1,58 @@ +id: stop-referrer-spam-e98b32d10be48dc189fcfc8cfe33a3ba + +info: + name: > + Stop Referrer Spam <= 1.3.0 - Cross-Site Request Forgery via processParameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5deac61-031f-452a-a478-d5d0c7953817?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-referrer-spam/" + google-query: inurl:"/wp-content/plugins/stop-referrer-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-referrer-spam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-referrer-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-referrer-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-spam-comments-33e0e465970f1e21e7fead2332f406d1.yaml b/nuclei-templates/cve-less/plugins/stop-spam-comments-33e0e465970f1e21e7fead2332f406d1.yaml new file mode 100644 index 0000000000..74e9961f1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-spam-comments-33e0e465970f1e21e7fead2332f406d1.yaml @@ -0,0 +1,58 @@ +id: stop-spam-comments-33e0e465970f1e21e7fead2332f406d1 + +info: + name: > + Stop Spam Comments <= 0.2.1.2 - Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62061cf9-cdbf-4cb2-9890-36bdcbc65c21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-spam-comments/" + google-query: inurl:"/wp-content/plugins/stop-spam-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-spam-comments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-spam-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-spam-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-38876a8a5fbfd61cde5369e484f937f2.yaml b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-38876a8a5fbfd61cde5369e484f937f2.yaml new file mode 100644 index 0000000000..f3c15773b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-38876a8a5fbfd61cde5369e484f937f2.yaml @@ -0,0 +1,58 @@ +id: stop-spammer-registrations-plugin-38876a8a5fbfd61cde5369e484f937f2 + +info: + name: > + Stop Spammers Security <= 2022.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c83df43e-286d-4695-9c37-bee2870fd3b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-spammer-registrations-plugin/" + google-query: inurl:"/wp-content/plugins/stop-spammer-registrations-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-spammer-registrations-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-spammer-registrations-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-spammer-registrations-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2022.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-a2fadf4a6acf31a1331e23447ba2981f.yaml b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-a2fadf4a6acf31a1331e23447ba2981f.yaml new file mode 100644 index 0000000000..e7019e1c21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-a2fadf4a6acf31a1331e23447ba2981f.yaml @@ -0,0 +1,58 @@ +id: stop-spammer-registrations-plugin-a2fadf4a6acf31a1331e23447ba2981f + +info: + name: > + Stop Spammers Security <= 2022.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/889cb1d5-7f5c-4904-9b5f-cc8a505eb65c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-spammer-registrations-plugin/" + google-query: inurl:"/wp-content/plugins/stop-spammer-registrations-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-spammer-registrations-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-spammer-registrations-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-spammer-registrations-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2022.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-aaa45d66679ac35ae0d003ff8a8e5f48.yaml b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-aaa45d66679ac35ae0d003ff8a8e5f48.yaml new file mode 100644 index 0000000000..2cb1c2dcd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-aaa45d66679ac35ae0d003ff8a8e5f48.yaml @@ -0,0 +1,58 @@ +id: stop-spammer-registrations-plugin-aaa45d66679ac35ae0d003ff8a8e5f48 + +info: + name: > + Stop Spammers Security <= 2021.17 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bf805fc-4b27-47c4-b24e-79158cffaac4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-spammer-registrations-plugin/" + google-query: inurl:"/wp-content/plugins/stop-spammer-registrations-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-spammer-registrations-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-spammer-registrations-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-spammer-registrations-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2021.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-b2a65b01b1c6a6a8966ce47037369844.yaml b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-b2a65b01b1c6a6a8966ce47037369844.yaml new file mode 100644 index 0000000000..2d2cb58ec3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-b2a65b01b1c6a6a8966ce47037369844.yaml @@ -0,0 +1,58 @@ +id: stop-spammer-registrations-plugin-b2a65b01b1c6a6a8966ce47037369844 + +info: + name: > + Stop Spammers <= 2021.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2598ae85-5e91-47e6-b3f5-0d977fe80dd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-spammer-registrations-plugin/" + google-query: inurl:"/wp-content/plugins/stop-spammer-registrations-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-spammer-registrations-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-spammer-registrations-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-spammer-registrations-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2021.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-cb772dd359af032492bf762585f62bb0.yaml b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-cb772dd359af032492bf762585f62bb0.yaml new file mode 100644 index 0000000000..1e8000064d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-cb772dd359af032492bf762585f62bb0.yaml @@ -0,0 +1,58 @@ +id: stop-spammer-registrations-plugin-cb772dd359af032492bf762585f62bb0 + +info: + name: > + Stop Spammers Security <= 2022.5 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6065ad75-1685-4f1d-9ba9-d4c8ec840521?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-spammer-registrations-plugin/" + google-query: inurl:"/wp-content/plugins/stop-spammer-registrations-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-spammer-registrations-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-spammer-registrations-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-spammer-registrations-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2022.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-d2259aaa4d4ae5c5473c4b6238d48632.yaml b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-d2259aaa4d4ae5c5473c4b6238d48632.yaml new file mode 100644 index 0000000000..3e4b160765 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-spammer-registrations-plugin-d2259aaa4d4ae5c5473c4b6238d48632.yaml @@ -0,0 +1,58 @@ +id: stop-spammer-registrations-plugin-d2259aaa4d4ae5c5473c4b6238d48632 + +info: + name: > + Stop Spammers Security | Block Spam Users, Comments, Forms <= 2024.4 - Cross-Site Request Forgery (CSRF) via sfs_process + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1998cadb-2eb3-4819-aa7c-59e4f777c7f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-spammer-registrations-plugin/" + google-query: inurl:"/wp-content/plugins/stop-spammer-registrations-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-spammer-registrations-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-spammer-registrations-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-spammer-registrations-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2024.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-user-enumeration-1c50f19daed34665b30f7fb7e6a79c86.yaml b/nuclei-templates/cve-less/plugins/stop-user-enumeration-1c50f19daed34665b30f7fb7e6a79c86.yaml new file mode 100644 index 0000000000..e5f275851d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-user-enumeration-1c50f19daed34665b30f7fb7e6a79c86.yaml @@ -0,0 +1,58 @@ +id: stop-user-enumeration-1c50f19daed34665b30f7fb7e6a79c86 + +info: + name: > + Stop User Enumeration <= 1.3.4 - Username Enumeration Bypasses + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7d4830b-f60a-4556-b40f-1bf9d5a296ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-user-enumeration/" + google-query: inurl:"/wp-content/plugins/stop-user-enumeration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-user-enumeration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-user-enumeration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-user-enumeration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-user-enumeration-6c5cd06dc489c66e7f89a876c4054223.yaml b/nuclei-templates/cve-less/plugins/stop-user-enumeration-6c5cd06dc489c66e7f89a876c4054223.yaml new file mode 100644 index 0000000000..2774903810 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-user-enumeration-6c5cd06dc489c66e7f89a876c4054223.yaml @@ -0,0 +1,58 @@ +id: stop-user-enumeration-6c5cd06dc489c66e7f89a876c4054223 + +info: + name: > + Stop User Enumeration <= 1.3.8 - Unauthenticated Username Enumeration + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fd6cb72-c508-46b1-99fb-cbd6b12b45de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-user-enumeration/" + google-query: inurl:"/wp-content/plugins/stop-user-enumeration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-user-enumeration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-user-enumeration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-user-enumeration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-user-enumeration-6cfb42fd9a90247cd4a309cf7c3fa9cd.yaml b/nuclei-templates/cve-less/plugins/stop-user-enumeration-6cfb42fd9a90247cd4a309cf7c3fa9cd.yaml new file mode 100644 index 0000000000..31d46db3c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-user-enumeration-6cfb42fd9a90247cd4a309cf7c3fa9cd.yaml @@ -0,0 +1,58 @@ +id: stop-user-enumeration-6cfb42fd9a90247cd4a309cf7c3fa9cd + +info: + name: > + Stop User Enumeration plugin <1.3.9 - User Enumeration + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3c52da7-ddfb-4c47-b8d2-2e1db6ec3946?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-user-enumeration/" + google-query: inurl:"/wp-content/plugins/stop-user-enumeration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-user-enumeration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-user-enumeration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-user-enumeration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-user-enumeration-bdfa460006d70b85bf4366e301016193.yaml b/nuclei-templates/cve-less/plugins/stop-user-enumeration-bdfa460006d70b85bf4366e301016193.yaml new file mode 100644 index 0000000000..f7243fca1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-user-enumeration-bdfa460006d70b85bf4366e301016193.yaml @@ -0,0 +1,58 @@ +id: stop-user-enumeration-bdfa460006d70b85bf4366e301016193 + +info: + name: > + Stop User Enumeration <= 1.3.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6db5e9f-9b3b-44c9-a6d9-78df3ed3b1fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-user-enumeration/" + google-query: inurl:"/wp-content/plugins/stop-user-enumeration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-user-enumeration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-user-enumeration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-user-enumeration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-user-enumeration-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/stop-user-enumeration-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..07ea89226c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-user-enumeration-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: stop-user-enumeration-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-user-enumeration/" + google-query: inurl:"/wp-content/plugins/stop-user-enumeration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-user-enumeration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-user-enumeration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-user-enumeration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stop-user-enumeration-da52ec4cd6fe55fb3a74c279a252a272.yaml b/nuclei-templates/cve-less/plugins/stop-user-enumeration-da52ec4cd6fe55fb3a74c279a252a272.yaml new file mode 100644 index 0000000000..6618013794 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stop-user-enumeration-da52ec4cd6fe55fb3a74c279a252a272.yaml @@ -0,0 +1,58 @@ +id: stop-user-enumeration-da52ec4cd6fe55fb3a74c279a252a272 + +info: + name: > + Stop User Enumeration <= 1.2.4 - Security Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8a653ab-7703-4e73-8089-a15ba6cf9718?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stop-user-enumeration/" + google-query: inurl:"/wp-content/plugins/stop-user-enumeration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stop-user-enumeration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stop-user-enumeration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stop-user-enumeration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stopbadbots-24b1f52e6cf57fe2a2edbecda487edee.yaml b/nuclei-templates/cve-less/plugins/stopbadbots-24b1f52e6cf57fe2a2edbecda487edee.yaml new file mode 100644 index 0000000000..bc5b19f12c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stopbadbots-24b1f52e6cf57fe2a2edbecda487edee.yaml @@ -0,0 +1,58 @@ +id: stopbadbots-24b1f52e6cf57fe2a2edbecda487edee + +info: + name: > + StopBadBots <= 7.23 - Missing Authorization to Arbitrary Plugin Installation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/759f5687-4ff1-4b8d-a5e7-3fb409fc2ba0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stopbadbots/" + google-query: inurl:"/wp-content/plugins/stopbadbots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stopbadbots,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stopbadbots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stopbadbots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stopbadbots-2f682fb3b99f66abb1a193957df1d1e6.yaml b/nuclei-templates/cve-less/plugins/stopbadbots-2f682fb3b99f66abb1a193957df1d1e6.yaml new file mode 100644 index 0000000000..6693d4e8bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stopbadbots-2f682fb3b99f66abb1a193957df1d1e6.yaml @@ -0,0 +1,58 @@ +id: stopbadbots-2f682fb3b99f66abb1a193957df1d1e6 + +info: + name: > + WP Block and Stop Bad Bots <= 6.88 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64eb4bfe-09b4-43c7-9d7e-f14fc5edf3c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stopbadbots/" + google-query: inurl:"/wp-content/plugins/stopbadbots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stopbadbots,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stopbadbots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stopbadbots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.88') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stopbadbots-3415fa1c70f4a284c1c590e2a6e45217.yaml b/nuclei-templates/cve-less/plugins/stopbadbots-3415fa1c70f4a284c1c590e2a6e45217.yaml new file mode 100644 index 0000000000..ec34f0b9d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stopbadbots-3415fa1c70f4a284c1c590e2a6e45217.yaml @@ -0,0 +1,58 @@ +id: stopbadbots-3415fa1c70f4a284c1c590e2a6e45217 + +info: + name: > + WP Block and Stop Bad Bots <= 6.92 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b27995b1-3321-4997-8a25-80c9488b8405?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stopbadbots/" + google-query: inurl:"/wp-content/plugins/stopbadbots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stopbadbots,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stopbadbots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stopbadbots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.930') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stopbadbots-8b5bbda26afcdfaa4409d718842d5879.yaml b/nuclei-templates/cve-less/plugins/stopbadbots-8b5bbda26afcdfaa4409d718842d5879.yaml new file mode 100644 index 0000000000..e76308dc5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stopbadbots-8b5bbda26afcdfaa4409d718842d5879.yaml @@ -0,0 +1,58 @@ +id: stopbadbots-8b5bbda26afcdfaa4409d718842d5879 + +info: + name: > + Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection < 6.6.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/507fe5f4-3ac3-4e48-835e-66bad8bffc88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stopbadbots/" + google-query: inurl:"/wp-content/plugins/stopbadbots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stopbadbots,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stopbadbots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stopbadbots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stopbadbots-a56a10763fef9c6c1ee5edbd42a68314.yaml b/nuclei-templates/cve-less/plugins/stopbadbots-a56a10763fef9c6c1ee5edbd42a68314.yaml new file mode 100644 index 0000000000..35135f7b9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stopbadbots-a56a10763fef9c6c1ee5edbd42a68314.yaml @@ -0,0 +1,58 @@ +id: stopbadbots-a56a10763fef9c6c1ee5edbd42a68314 + +info: + name: > + WP Block and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection Plugin StopBadBots < 6.60 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3758f06-2b69-458f-a7c8-f604f0fbda31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stopbadbots/" + google-query: inurl:"/wp-content/plugins/stopbadbots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stopbadbots,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stopbadbots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stopbadbots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stopbadbots-c37f8531d687078be9fa5b927c4c16c4.yaml b/nuclei-templates/cve-less/plugins/stopbadbots-c37f8531d687078be9fa5b927c4c16c4.yaml new file mode 100644 index 0000000000..d94a0aac71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stopbadbots-c37f8531d687078be9fa5b927c4c16c4.yaml @@ -0,0 +1,58 @@ +id: stopbadbots-c37f8531d687078be9fa5b927c4c16c4 + +info: + name: > + WP Block and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection Plugin StopBadBots < 6.67 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1634f86-21c0-4b9a-b521-c6b9986f91fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stopbadbots/" + google-query: inurl:"/wp-content/plugins/stopbadbots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stopbadbots,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stopbadbots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stopbadbots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stopbadbots-c80c3c19565fc6e0af352542c128422a.yaml b/nuclei-templates/cve-less/plugins/stopbadbots-c80c3c19565fc6e0af352542c128422a.yaml new file mode 100644 index 0000000000..b2c63839af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stopbadbots-c80c3c19565fc6e0af352542c128422a.yaml @@ -0,0 +1,58 @@ +id: stopbadbots-c80c3c19565fc6e0af352542c128422a + +info: + name: > + Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection <= 6.61 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72d33132-aba7-4e97-90c6-359298b1c06e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stopbadbots/" + google-query: inurl:"/wp-content/plugins/stopbadbots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stopbadbots,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stopbadbots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stopbadbots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stopbadbots-cfab52d3443d4e82a03b0d2f0889ab4f.yaml b/nuclei-templates/cve-less/plugins/stopbadbots-cfab52d3443d4e82a03b0d2f0889ab4f.yaml new file mode 100644 index 0000000000..40df60a8da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stopbadbots-cfab52d3443d4e82a03b0d2f0889ab4f.yaml @@ -0,0 +1,58 @@ +id: stopbadbots-cfab52d3443d4e82a03b0d2f0889ab4f + +info: + name: > + StopBadBots <= 7.31 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38e536a5-b538-498c-b19d-adda36f76164?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stopbadbots/" + google-query: inurl:"/wp-content/plugins/stopbadbots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stopbadbots,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stopbadbots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stopbadbots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stops-core-theme-and-plugin-updates-aa4cd28c9af95c0e13ddc060c836b2b0.yaml b/nuclei-templates/cve-less/plugins/stops-core-theme-and-plugin-updates-aa4cd28c9af95c0e13ddc060c836b2b0.yaml new file mode 100644 index 0000000000..b846f307cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stops-core-theme-and-plugin-updates-aa4cd28c9af95c0e13ddc060c836b2b0.yaml @@ -0,0 +1,58 @@ +id: stops-core-theme-and-plugin-updates-aa4cd28c9af95c0e13ddc060c836b2b0 + +info: + name: > + Stops Core Theme And Plugin Updates <= 8.0.4 - Insufficient Restrictions on Option Changes + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a9feacb-ef9c-40d4-abdb-a3fcfd529901?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stops-core-theme-and-plugin-updates/" + google-query: inurl:"/wp-content/plugins/stops-core-theme-and-plugin-updates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stops-core-theme-and-plugin-updates,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stops-core-theme-and-plugin-updates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stops-core-theme-and-plugin-updates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/store-locator-118f160a8ab578043e1b061d32f15698.yaml b/nuclei-templates/cve-less/plugins/store-locator-118f160a8ab578043e1b061d32f15698.yaml new file mode 100644 index 0000000000..07ead9b120 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/store-locator-118f160a8ab578043e1b061d32f15698.yaml @@ -0,0 +1,58 @@ +id: store-locator-118f160a8ab578043e1b061d32f15698 + +info: + name: > + Store Locator <= 3.98.7 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98ae3315-8361-43bb-be2c-1564f4df8d5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/store-locator/" + google-query: inurl:"/wp-content/plugins/store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,store-locator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.98.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/store-locator-f5bef0233a73b448e858b3681231c7d1.yaml b/nuclei-templates/cve-less/plugins/store-locator-f5bef0233a73b448e858b3681231c7d1.yaml new file mode 100644 index 0000000000..ab152932d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/store-locator-f5bef0233a73b448e858b3681231c7d1.yaml @@ -0,0 +1,58 @@ +id: store-locator-f5bef0233a73b448e858b3681231c7d1 + +info: + name: > + Store Locator < 3.34 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bf743b1-5a59-4e22-8c59-3c17b2646ec8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/store-locator/" + google-query: inurl:"/wp-content/plugins/store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,store-locator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/store-locator-ff474dfbe600046b3769ad9ddb54c011.yaml b/nuclei-templates/cve-less/plugins/store-locator-ff474dfbe600046b3769ad9ddb54c011.yaml new file mode 100644 index 0000000000..74e4f5a028 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/store-locator-ff474dfbe600046b3769ad9ddb54c011.yaml @@ -0,0 +1,58 @@ +id: store-locator-ff474dfbe600046b3769ad9ddb54c011 + +info: + name: > + Store Locator 2.3 - 3.11 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51424768-27c7-40b2-8d1c-838c419add8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/store-locator/" + google-query: inurl:"/wp-content/plugins/store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,store-locator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/store-locator-le-41bea91ce3336d6adb86e1ea410b9aef.yaml b/nuclei-templates/cve-less/plugins/store-locator-le-41bea91ce3336d6adb86e1ea410b9aef.yaml new file mode 100644 index 0000000000..8e1c8c91fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/store-locator-le-41bea91ce3336d6adb86e1ea410b9aef.yaml @@ -0,0 +1,58 @@ +id: store-locator-le-41bea91ce3336d6adb86e1ea410b9aef + +info: + name: > + Store Locator Plus <= 5.12.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc7b19c7-a850-4783-9f8b-e338e03998eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/store-locator-le/" + google-query: inurl:"/wp-content/plugins/store-locator-le/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,store-locator-le,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/store-locator-le/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "store-locator-le" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/store-locator-le-81806c847f0b2c320b63849d660c9dca.yaml b/nuclei-templates/cve-less/plugins/store-locator-le-81806c847f0b2c320b63849d660c9dca.yaml new file mode 100644 index 0000000000..e0c64c1d36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/store-locator-le-81806c847f0b2c320b63849d660c9dca.yaml @@ -0,0 +1,58 @@ +id: store-locator-le-81806c847f0b2c320b63849d660c9dca + +info: + name: > + Store Locator Plus < 4.2.27 - Email Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea607a56-ed6e-44dd-be42-a0b0d970742e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/store-locator-le/" + google-query: inurl:"/wp-content/plugins/store-locator-le/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,store-locator-le,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/store-locator-le/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "store-locator-le" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/store-locator-le-e2053d18b4d79ba0e416f265a7be2f35.yaml b/nuclei-templates/cve-less/plugins/store-locator-le-e2053d18b4d79ba0e416f265a7be2f35.yaml new file mode 100644 index 0000000000..a195522890 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/store-locator-le-e2053d18b4d79ba0e416f265a7be2f35.yaml @@ -0,0 +1,58 @@ +id: store-locator-le-e2053d18b4d79ba0e416f265a7be2f35 + +info: + name: > + Store Locator Plus <= 5.5.15 - Authenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68c1776e-8e29-4eea-87d0-cf7318a64f7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/store-locator-le/" + google-query: inurl:"/wp-content/plugins/store-locator-le/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,store-locator-le,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/store-locator-le/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "store-locator-le" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/store-locator-le-fc1b2b62341494b2d9cc5ef165563a2a.yaml b/nuclei-templates/cve-less/plugins/store-locator-le-fc1b2b62341494b2d9cc5ef165563a2a.yaml new file mode 100644 index 0000000000..78f73e4d75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/store-locator-le-fc1b2b62341494b2d9cc5ef165563a2a.yaml @@ -0,0 +1,58 @@ +id: store-locator-le-fc1b2b62341494b2d9cc5ef165563a2a + +info: + name: > + Store Locator Plus <= 4.5.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f80fcadd-d6b7-4d35-bced-ada3514e60fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/store-locator-le/" + google-query: inurl:"/wp-content/plugins/store-locator-le/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,store-locator-le,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/store-locator-le/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "store-locator-le" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/store-toolkit-for-wp-e-commerce-1b9679a4f42d9c30f3b2de1ebd1889b6.yaml b/nuclei-templates/cve-less/plugins/store-toolkit-for-wp-e-commerce-1b9679a4f42d9c30f3b2de1ebd1889b6.yaml new file mode 100644 index 0000000000..57e4bf26a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/store-toolkit-for-wp-e-commerce-1b9679a4f42d9c30f3b2de1ebd1889b6.yaml @@ -0,0 +1,58 @@ +id: store-toolkit-for-wp-e-commerce-1b9679a4f42d9c30f3b2de1ebd1889b6 + +info: + name: > + WP e-Commerce – Store Toolkit <= 2.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/588ece40-a848-4b2c-9db5-e63e0d11dda0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/store-toolkit-for-wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/store-toolkit-for-wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,store-toolkit-for-wp-e-commerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/store-toolkit-for-wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "store-toolkit-for-wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/storefront-footer-text-dcf3d519c235997890c41f1336f203e6.yaml b/nuclei-templates/cve-less/plugins/storefront-footer-text-dcf3d519c235997890c41f1336f203e6.yaml new file mode 100644 index 0000000000..f92f795224 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/storefront-footer-text-dcf3d519c235997890c41f1336f203e6.yaml @@ -0,0 +1,58 @@ +id: storefront-footer-text-dcf3d519c235997890c41f1336f203e6 + +info: + name: > + Storefront Footer Text <= 1.0.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a66c2e1e-fd59-424b-bd11-0991a5c32dce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/storefront-footer-text/" + google-query: inurl:"/wp-content/plugins/storefront-footer-text/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,storefront-footer-text,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/storefront-footer-text/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "storefront-footer-text" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/story-chief-6329046104e43f1ec0f867ede19cab78.yaml b/nuclei-templates/cve-less/plugins/story-chief-6329046104e43f1ec0f867ede19cab78.yaml new file mode 100644 index 0000000000..beba3f862b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/story-chief-6329046104e43f1ec0f867ede19cab78.yaml @@ -0,0 +1,58 @@ +id: story-chief-6329046104e43f1ec0f867ede19cab78 + +info: + name: > + StoryChief <= 1.0.30 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47cc9978-6074-4e8a-a471-d8483890d161?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/story-chief/" + google-query: inurl:"/wp-content/plugins/story-chief/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,story-chief,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/story-chief/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "story-chief" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/story-chief-9bb529865a4378d4915d3b7f30503af0.yaml b/nuclei-templates/cve-less/plugins/story-chief-9bb529865a4378d4915d3b7f30503af0.yaml new file mode 100644 index 0000000000..9ae0571fc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/story-chief-9bb529865a4378d4915d3b7f30503af0.yaml @@ -0,0 +1,58 @@ +id: story-chief-9bb529865a4378d4915d3b7f30503af0 + +info: + name: > + StoryChief <= 1.0.30 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/288fdb71-1dae-4897-b5af-95c628fce288?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/story-chief/" + google-query: inurl:"/wp-content/plugins/story-chief/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,story-chief,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/story-chief/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "story-chief" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stout-google-calendar-f561113c4b166210ffa84b58619b347d.yaml b/nuclei-templates/cve-less/plugins/stout-google-calendar-f561113c4b166210ffa84b58619b347d.yaml new file mode 100644 index 0000000000..bc714061c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stout-google-calendar-f561113c4b166210ffa84b58619b347d.yaml @@ -0,0 +1,58 @@ +id: stout-google-calendar-f561113c4b166210ffa84b58619b347d + +info: + name: > + Stout Google Calendar <= 1.2.3 - Cross-Site Request Forgery via sgc_plugin_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33efcbb4-2bb9-4414-bc95-55bedb92c551?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stout-google-calendar/" + google-query: inurl:"/wp-content/plugins/stout-google-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stout-google-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stout-google-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stout-google-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stratum-b90da7474429ff0560b494c992f7386d.yaml b/nuclei-templates/cve-less/plugins/stratum-b90da7474429ff0560b494c992f7386d.yaml new file mode 100644 index 0000000000..5715d13aa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stratum-b90da7474429ff0560b494c992f7386d.yaml @@ -0,0 +1,58 @@ +id: stratum-b90da7474429ff0560b494c992f7386d + +info: + name: > + Stratum <= 1.3.15 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dbc1f95-0f21-4a37-b1f7-eba03f29f021?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stratum/" + google-query: inurl:"/wp-content/plugins/stratum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stratum,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stratum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stratum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/streak-crm-for-gmail-integration-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/streak-crm-for-gmail-integration-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0a8bc94cf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/streak-crm-for-gmail-integration-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: streak-crm-for-gmail-integration-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/streak-crm-for-gmail-integration-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/streak-crm-for-gmail-integration-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,streak-crm-for-gmail-integration-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/streak-crm-for-gmail-integration-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "streak-crm-for-gmail-integration-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stream-04699771b766f0fc714834ca199fc5ab.yaml b/nuclei-templates/cve-less/plugins/stream-04699771b766f0fc714834ca199fc5ab.yaml new file mode 100644 index 0000000000..a8b94ad690 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stream-04699771b766f0fc714834ca199fc5ab.yaml @@ -0,0 +1,58 @@ +id: stream-04699771b766f0fc714834ca199fc5ab + +info: + name: > + Stream <= 3.9.2 - Missing Authorization via load_alerts_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d58e4317-8ad5-40d5-98b8-f8f07ab37e1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stream/" + google-query: inurl:"/wp-content/plugins/stream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stream,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stream-4203dc94ef5199d201031e3f384724b9.yaml b/nuclei-templates/cve-less/plugins/stream-4203dc94ef5199d201031e3f384724b9.yaml new file mode 100644 index 0000000000..3ed938b66c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stream-4203dc94ef5199d201031e3f384724b9.yaml @@ -0,0 +1,58 @@ +id: stream-4203dc94ef5199d201031e3f384724b9 + +info: + name: > + Stream <= 3.9.1 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67f81b8a-ef0a-4b6d-a1ee-3e19bda6fd96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stream/" + google-query: inurl:"/wp-content/plugins/stream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stream,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stream-439ba91c06350a9c8bb984e5dff1a4a4.yaml b/nuclei-templates/cve-less/plugins/stream-439ba91c06350a9c8bb984e5dff1a4a4.yaml new file mode 100644 index 0000000000..93932754b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stream-439ba91c06350a9c8bb984e5dff1a4a4.yaml @@ -0,0 +1,58 @@ +id: stream-439ba91c06350a9c8bb984e5dff1a4a4 + +info: + name: > + Stream <= 3.8.1 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26926973-36b7-4ad2-8267-2de4749159ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stream/" + google-query: inurl:"/wp-content/plugins/stream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stream,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stream-aa025e6cf603e2a31820747c34b944ac.yaml b/nuclei-templates/cve-less/plugins/stream-aa025e6cf603e2a31820747c34b944ac.yaml new file mode 100644 index 0000000000..71c8ae3e58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stream-aa025e6cf603e2a31820747c34b944ac.yaml @@ -0,0 +1,58 @@ +id: stream-aa025e6cf603e2a31820747c34b944ac + +info: + name: > + Stream <= 3.0.5 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecd68933-e808-4816-b9d2-7491194f2347?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stream/" + google-query: inurl:"/wp-content/plugins/stream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stream,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stream-e2fa9b7a2ac83dce50f44abd024d6931.yaml b/nuclei-templates/cve-less/plugins/stream-e2fa9b7a2ac83dce50f44abd024d6931.yaml new file mode 100644 index 0000000000..546ac2a671 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stream-e2fa9b7a2ac83dce50f44abd024d6931.yaml @@ -0,0 +1,58 @@ +id: stream-e2fa9b7a2ac83dce50f44abd024d6931 + +info: + name: > + Stream <= 3.9.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7203b5c-5753-453c-8fc2-26fcebdeea5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stream/" + google-query: inurl:"/wp-content/plugins/stream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stream,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stream-video-player-a61b4c2ab615ad0f80b5138981abe8ce.yaml b/nuclei-templates/cve-less/plugins/stream-video-player-a61b4c2ab615ad0f80b5138981abe8ce.yaml new file mode 100644 index 0000000000..bd8f4004af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stream-video-player-a61b4c2ab615ad0f80b5138981abe8ce.yaml @@ -0,0 +1,58 @@ +id: stream-video-player-a61b4c2ab615ad0f80b5138981abe8ce + +info: + name: > + Stream Video Player <= 1.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bae06fa8-546c-4daf-8335-a5e24f6704d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stream-video-player/" + google-query: inurl:"/wp-content/plugins/stream-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stream-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stream-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stream-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/streamcast-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/streamcast-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7d562edb0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/streamcast-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: streamcast-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/streamcast/" + google-query: inurl:"/wp-content/plugins/streamcast/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,streamcast,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/streamcast/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "streamcast" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/streamcast-fe66522b1a62142749b36d39c6b2760b.yaml b/nuclei-templates/cve-less/plugins/streamcast-fe66522b1a62142749b36d39c6b2760b.yaml new file mode 100644 index 0000000000..56361cb725 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/streamcast-fe66522b1a62142749b36d39c6b2760b.yaml @@ -0,0 +1,58 @@ +id: streamcast-fe66522b1a62142749b36d39c6b2760b + +info: + name: > + StreamCast – Radio Player for WordPress <= 2.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e7b29aa-9dff-420b-8f3e-2beca0b19593?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/streamcast/" + google-query: inurl:"/wp-content/plugins/streamcast/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,streamcast,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/streamcast/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "streamcast" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-0fc7500c1842d66d6981f5c71273cba4.yaml b/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-0fc7500c1842d66d6981f5c71273cba4.yaml new file mode 100644 index 0000000000..0d43368a56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-0fc7500c1842d66d6981f5c71273cba4.yaml @@ -0,0 +1,58 @@ +id: streamweasels-twitch-integration-0fc7500c1842d66d6981f5c71273cba4 + +info: + name: > + StreamWeasels Twitch Integration <= 1.7.8 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d7b3f2a-0a82-4cd4-96a9-2b1257d7b13c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/streamweasels-twitch-integration/" + google-query: inurl:"/wp-content/plugins/streamweasels-twitch-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,streamweasels-twitch-integration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/streamweasels-twitch-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "streamweasels-twitch-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-2d2a726dfea1c83cf2d93df104a8c8d5.yaml b/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-2d2a726dfea1c83cf2d93df104a8c8d5.yaml new file mode 100644 index 0000000000..920480b9a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-2d2a726dfea1c83cf2d93df104a8c8d5.yaml @@ -0,0 +1,58 @@ +id: streamweasels-twitch-integration-2d2a726dfea1c83cf2d93df104a8c8d5 + +info: + name: > + StreamWeasels Twitch Integration <= 1.7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dd66c4f-46f8-46d2-b424-beb6ecc69675?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/streamweasels-twitch-integration/" + google-query: inurl:"/wp-content/plugins/streamweasels-twitch-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,streamweasels-twitch-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/streamweasels-twitch-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "streamweasels-twitch-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..be5fa4d1d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/streamweasels-twitch-integration-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: streamweasels-twitch-integration-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/streamweasels-twitch-integration/" + google-query: inurl:"/wp-content/plugins/streamweasels-twitch-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,streamweasels-twitch-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/streamweasels-twitch-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "streamweasels-twitch-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/string-locator-2d86b7b96a584b0abcc7bac3e11b4cae.yaml b/nuclei-templates/cve-less/plugins/string-locator-2d86b7b96a584b0abcc7bac3e11b4cae.yaml new file mode 100644 index 0000000000..7da06d8dfd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/string-locator-2d86b7b96a584b0abcc7bac3e11b4cae.yaml @@ -0,0 +1,58 @@ +id: string-locator-2d86b7b96a584b0abcc7bac3e11b4cae + +info: + name: > + String Locator <= 2.5.0 - Cross-Site Request Forgery to PHAR Deserialization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10a36e37-4188-403f-9b17-d7e79b8b8a6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/string-locator/" + google-query: inurl:"/wp-content/plugins/string-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,string-locator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/string-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "string-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/string-locator-54ef8279e490c1378421576f13667db9.yaml b/nuclei-templates/cve-less/plugins/string-locator-54ef8279e490c1378421576f13667db9.yaml new file mode 100644 index 0000000000..6e2dcf7745 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/string-locator-54ef8279e490c1378421576f13667db9.yaml @@ -0,0 +1,58 @@ +id: string-locator-54ef8279e490c1378421576f13667db9 + +info: + name: > + String Locator <= 2.4.2 - Authenticated Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb3859eb-5a1f-408c-84aa-acfc68bd0bb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/string-locator/" + google-query: inurl:"/wp-content/plugins/string-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,string-locator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/string-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "string-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stripe-for-woocommerce-47381a600b8cc2173f5be6a0287dc5d1.yaml b/nuclei-templates/cve-less/plugins/stripe-for-woocommerce-47381a600b8cc2173f5be6a0287dc5d1.yaml new file mode 100644 index 0000000000..78ac3d16cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stripe-for-woocommerce-47381a600b8cc2173f5be6a0287dc5d1.yaml @@ -0,0 +1,58 @@ +id: stripe-for-woocommerce-47381a600b8cc2173f5be6a0287dc5d1 + +info: + name: > + Stripe for WooCommerce 3.0.0 - 3.3.9 - Missing Authorization Controls to Financial Account Hijacking + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f706c15-56c8-4eb4-9790-b394d37b0e33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stripe-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/stripe-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stripe-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stripe-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stripe-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stripe-gateway-d9184aea5b0340682c329de3d4d22fd3.yaml b/nuclei-templates/cve-less/plugins/stripe-gateway-d9184aea5b0340682c329de3d4d22fd3.yaml new file mode 100644 index 0000000000..b31207f934 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stripe-gateway-d9184aea5b0340682c329de3d4d22fd3.yaml @@ -0,0 +1,58 @@ +id: stripe-gateway-d9184aea5b0340682c329de3d4d22fd3 + +info: + name: > + Easy Digital Downloads Stripe Extension <= 2.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4007814b-7e01-4188-8a42-9564444af95f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stripe-gateway/" + google-query: inurl:"/wp-content/plugins/stripe-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stripe-gateway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stripe-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stripe-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stripe-payments-560fba5c90dc74d38384277269b51dae.yaml b/nuclei-templates/cve-less/plugins/stripe-payments-560fba5c90dc74d38384277269b51dae.yaml new file mode 100644 index 0000000000..649446d318 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stripe-payments-560fba5c90dc74d38384277269b51dae.yaml @@ -0,0 +1,58 @@ +id: stripe-payments-560fba5c90dc74d38384277269b51dae + +info: + name: > + Accept Stripe Payments <= 2.0.63 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82fb1ea4-12cc-4c8c-b51e-cf878a791d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stripe-payments/" + google-query: inurl:"/wp-content/plugins/stripe-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stripe-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stripe-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stripe-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stripe-payments-5bf985e952afe6aa546a83aa3289787b.yaml b/nuclei-templates/cve-less/plugins/stripe-payments-5bf985e952afe6aa546a83aa3289787b.yaml new file mode 100644 index 0000000000..2587389fa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stripe-payments-5bf985e952afe6aa546a83aa3289787b.yaml @@ -0,0 +1,58 @@ +id: stripe-payments-5bf985e952afe6aa546a83aa3289787b + +info: + name: > + Accept Stripe Payments <= 2.0.79 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44d14692-d90a-45f9-afb4-0666ce4b3397?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stripe-payments/" + google-query: inurl:"/wp-content/plugins/stripe-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stripe-payments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stripe-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stripe-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.79') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stripe-payments-925029dc31c55bdce33ed22d851b35e1.yaml b/nuclei-templates/cve-less/plugins/stripe-payments-925029dc31c55bdce33ed22d851b35e1.yaml new file mode 100644 index 0000000000..0830719d55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stripe-payments-925029dc31c55bdce33ed22d851b35e1.yaml @@ -0,0 +1,58 @@ +id: stripe-payments-925029dc31c55bdce33ed22d851b35e1 + +info: + name: > + Accept Stripe Payments < 2.0.40 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edecb27b-ff11-4186-b8a8-41a85e3e2023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stripe-payments/" + google-query: inurl:"/wp-content/plugins/stripe-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stripe-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stripe-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stripe-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stripe-payments-d255a7962cab4ed87609083cbd5373c3.yaml b/nuclei-templates/cve-less/plugins/stripe-payments-d255a7962cab4ed87609083cbd5373c3.yaml new file mode 100644 index 0000000000..ebb8bce042 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stripe-payments-d255a7962cab4ed87609083cbd5373c3.yaml @@ -0,0 +1,58 @@ +id: stripe-payments-d255a7962cab4ed87609083cbd5373c3 + +info: + name: > + Accept Stripe Payments <= 2.0.79 - Unauthenticated Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f499d5e-eb27-4611-af27-ac9fd6a9f044?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stripe-payments/" + google-query: inurl:"/wp-content/plugins/stripe-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stripe-payments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stripe-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stripe-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.79') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stripshow-c6f782f9040ea9a039305ec1ed2ddafa.yaml b/nuclei-templates/cve-less/plugins/stripshow-c6f782f9040ea9a039305ec1ed2ddafa.yaml new file mode 100644 index 0000000000..675ed8b629 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stripshow-c6f782f9040ea9a039305ec1ed2ddafa.yaml @@ -0,0 +1,58 @@ +id: stripshow-c6f782f9040ea9a039305ec1ed2ddafa + +info: + name: > + stripShow Plugin <= 2.5.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4624c43b-6c5f-48c5-bfe4-26ec6d7de418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stripshow/" + google-query: inurl:"/wp-content/plugins/stripshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stripshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stripshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stripshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/strong-testimonials-30299c84e4a810a5d91c885ccad19e9f.yaml b/nuclei-templates/cve-less/plugins/strong-testimonials-30299c84e4a810a5d91c885ccad19e9f.yaml new file mode 100644 index 0000000000..060983780c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/strong-testimonials-30299c84e4a810a5d91c885ccad19e9f.yaml @@ -0,0 +1,58 @@ +id: strong-testimonials-30299c84e4a810a5d91c885ccad19e9f + +info: + name: > + Strong Testimonials <= 3.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1c97b99-ca39-45de-8df9-312ba1573e8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/strong-testimonials/" + google-query: inurl:"/wp-content/plugins/strong-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,strong-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/strong-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "strong-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/strong-testimonials-4c7136348e958aecb57a2e8c3842e1af.yaml b/nuclei-templates/cve-less/plugins/strong-testimonials-4c7136348e958aecb57a2e8c3842e1af.yaml new file mode 100644 index 0000000000..a6510c4295 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/strong-testimonials-4c7136348e958aecb57a2e8c3842e1af.yaml @@ -0,0 +1,58 @@ +id: strong-testimonials-4c7136348e958aecb57a2e8c3842e1af + +info: + name: > + Strong Testimonials <= 3.1.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd38d97d-db93-42ed-9d52-f70641fba442?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/strong-testimonials/" + google-query: inurl:"/wp-content/plugins/strong-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,strong-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/strong-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "strong-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/strong-testimonials-4e10d6d81d87afd9b8cf214ddcd496ad.yaml b/nuclei-templates/cve-less/plugins/strong-testimonials-4e10d6d81d87afd9b8cf214ddcd496ad.yaml new file mode 100644 index 0000000000..f6f1a31799 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/strong-testimonials-4e10d6d81d87afd9b8cf214ddcd496ad.yaml @@ -0,0 +1,58 @@ +id: strong-testimonials-4e10d6d81d87afd9b8cf214ddcd496ad + +info: + name: > + Strong Testimonials <= 3.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/454091ac-8765-4bda-ac6e-69537b43f9a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/strong-testimonials/" + google-query: inurl:"/wp-content/plugins/strong-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,strong-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/strong-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "strong-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/strong-testimonials-6733337aa2d304b28cb671c239d55eef.yaml b/nuclei-templates/cve-less/plugins/strong-testimonials-6733337aa2d304b28cb671c239d55eef.yaml new file mode 100644 index 0000000000..a3d4857f71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/strong-testimonials-6733337aa2d304b28cb671c239d55eef.yaml @@ -0,0 +1,58 @@ +id: strong-testimonials-6733337aa2d304b28cb671c239d55eef + +info: + name: > + Strong Testimonials <= 2.51.2 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba4da955-7651-42e5-aefa-72c70a7b1035?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/strong-testimonials/" + google-query: inurl:"/wp-content/plugins/strong-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,strong-testimonials,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/strong-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "strong-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.51.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/strong-testimonials-75b8a5222fb6f26aa91b12f6a779084a.yaml b/nuclei-templates/cve-less/plugins/strong-testimonials-75b8a5222fb6f26aa91b12f6a779084a.yaml new file mode 100644 index 0000000000..47a7437446 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/strong-testimonials-75b8a5222fb6f26aa91b12f6a779084a.yaml @@ -0,0 +1,58 @@ +id: strong-testimonials-75b8a5222fb6f26aa91b12f6a779084a + +info: + name: > + Strong Testimonials <= 2.40.0 - Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9832c598-aa12-4a98-8e0f-643ecbe75839?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/strong-testimonials/" + google-query: inurl:"/wp-content/plugins/strong-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,strong-testimonials,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/strong-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "strong-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.40.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/strong-testimonials-9789112c0d34ac6cf02fb911bdea5e63.yaml b/nuclei-templates/cve-less/plugins/strong-testimonials-9789112c0d34ac6cf02fb911bdea5e63.yaml new file mode 100644 index 0000000000..5591030645 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/strong-testimonials-9789112c0d34ac6cf02fb911bdea5e63.yaml @@ -0,0 +1,58 @@ +id: strong-testimonials-9789112c0d34ac6cf02fb911bdea5e63 + +info: + name: > + Strong Testimonials <= 3.1.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0ccdc0d-7c38-4dd3-be39-2359d63b2b6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/strong-testimonials/" + google-query: inurl:"/wp-content/plugins/strong-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,strong-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/strong-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "strong-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/strong-testimonials-bad0302697b20bb164a7d48924161471.yaml b/nuclei-templates/cve-less/plugins/strong-testimonials-bad0302697b20bb164a7d48924161471.yaml new file mode 100644 index 0000000000..6c6e67954e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/strong-testimonials-bad0302697b20bb164a7d48924161471.yaml @@ -0,0 +1,58 @@ +id: strong-testimonials-bad0302697b20bb164a7d48924161471 + +info: + name: > + Strong Testimonials <= 2.31.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c49c97cf-78e9-4da2-ab0d-ff014c29feaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/strong-testimonials/" + google-query: inurl:"/wp-content/plugins/strong-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,strong-testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/strong-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "strong-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.31.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/structured-content-8afca71d6fa766e9a24060d9214388e1.yaml b/nuclei-templates/cve-less/plugins/structured-content-8afca71d6fa766e9a24060d9214388e1.yaml new file mode 100644 index 0000000000..df9b0d8f41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/structured-content-8afca71d6fa766e9a24060d9214388e1.yaml @@ -0,0 +1,58 @@ +id: structured-content-8afca71d6fa766e9a24060d9214388e1 + +info: + name: > + Structured Content <= 1.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7943c21b-dfc3-4f31-a636-0a1a745628bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/structured-content/" + google-query: inurl:"/wp-content/plugins/structured-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,structured-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/structured-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "structured-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/structured-content-b00e5b46c74081e9862bff90f3aaef92.yaml b/nuclei-templates/cve-less/plugins/structured-content-b00e5b46c74081e9862bff90f3aaef92.yaml new file mode 100644 index 0000000000..2cb4c4e7cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/structured-content-b00e5b46c74081e9862bff90f3aaef92.yaml @@ -0,0 +1,58 @@ +id: structured-content-b00e5b46c74081e9862bff90f3aaef92 + +info: + name: > + Structured Content <= 1.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Classic Editor Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a013106b-4e2a-4dd9-a0ab-7e6c91e715dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/structured-content/" + google-query: inurl:"/wp-content/plugins/structured-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,structured-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/structured-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "structured-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/structured-content-b240c0fd3b8e35e0e7b7374ee39360eb.yaml b/nuclei-templates/cve-less/plugins/structured-content-b240c0fd3b8e35e0e7b7374ee39360eb.yaml new file mode 100644 index 0000000000..6c1838c423 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/structured-content-b240c0fd3b8e35e0e7b7374ee39360eb.yaml @@ -0,0 +1,58 @@ +id: structured-content-b240c0fd3b8e35e0e7b7374ee39360eb + +info: + name: > + Structured Content <= 1.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e44ad307-2663-4613-ae53-9ef6208f08f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/structured-content/" + google-query: inurl:"/wp-content/plugins/structured-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,structured-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/structured-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "structured-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/structured-content-bb8100b665f7be766e2f2566af0a9770.yaml b/nuclei-templates/cve-less/plugins/structured-content-bb8100b665f7be766e2f2566af0a9770.yaml new file mode 100644 index 0000000000..1931a717bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/structured-content-bb8100b665f7be766e2f2566af0a9770.yaml @@ -0,0 +1,58 @@ +id: structured-content-bb8100b665f7be766e2f2566af0a9770 + +info: + name: > + Structured Content <= 1.5.3 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b25252b-fad3-4212-be72-94e94779ef67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/structured-content/" + google-query: inurl:"/wp-content/plugins/structured-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,structured-content,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/structured-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "structured-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/style-it-d99f0f471a2dd63c73902853b59daf4d.yaml b/nuclei-templates/cve-less/plugins/style-it-d99f0f471a2dd63c73902853b59daf4d.yaml new file mode 100644 index 0000000000..49e7829b14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/style-it-d99f0f471a2dd63c73902853b59daf4d.yaml @@ -0,0 +1,58 @@ +id: style-it-d99f0f471a2dd63c73902853b59daf4d + +info: + name: > + Style It <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcecd7bb-85cc-406e-9fd8-e671b327dc13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/style-it/" + google-query: inurl:"/wp-content/plugins/style-it/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,style-it,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/style-it/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "style-it" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/styles-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/styles-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..c5402e6fdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/styles-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: styles-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/styles/" + google-query: inurl:"/wp-content/plugins/styles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,styles,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/styles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "styles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stylish-cost-calculator-17f69747f5418f0c498184d7a40cd5d8.yaml b/nuclei-templates/cve-less/plugins/stylish-cost-calculator-17f69747f5418f0c498184d7a40cd5d8.yaml new file mode 100644 index 0000000000..d66e65f967 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stylish-cost-calculator-17f69747f5418f0c498184d7a40cd5d8.yaml @@ -0,0 +1,58 @@ +id: stylish-cost-calculator-17f69747f5418f0c498184d7a40cd5d8 + +info: + name: > + Stylish Cost Calculator <= 7.0.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30e89955-9f2b-42e4-a7cf-558edd2e736c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stylish-cost-calculator/" + google-query: inurl:"/wp-content/plugins/stylish-cost-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stylish-cost-calculator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stylish-cost-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stylish-cost-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stylish-cost-calculator-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/stylish-cost-calculator-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..7984e4bcba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stylish-cost-calculator-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: stylish-cost-calculator-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stylish-cost-calculator/" + google-query: inurl:"/wp-content/plugins/stylish-cost-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stylish-cost-calculator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stylish-cost-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stylish-cost-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stylish-cost-calculator-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/stylish-cost-calculator-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..1971ee9f1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stylish-cost-calculator-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: stylish-cost-calculator-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stylish-cost-calculator/" + google-query: inurl:"/wp-content/plugins/stylish-cost-calculator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stylish-cost-calculator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stylish-cost-calculator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stylish-cost-calculator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stylish-cost-calculator-premium-7a44d61ebaa3b700401c1ffe420cd8f6.yaml b/nuclei-templates/cve-less/plugins/stylish-cost-calculator-premium-7a44d61ebaa3b700401c1ffe420cd8f6.yaml new file mode 100644 index 0000000000..59a1a23da3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stylish-cost-calculator-premium-7a44d61ebaa3b700401c1ffe420cd8f6.yaml @@ -0,0 +1,58 @@ +id: stylish-cost-calculator-premium-7a44d61ebaa3b700401c1ffe420cd8f6 + +info: + name: > + Stylish Cost Calculator < 7.9.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b7cc660-b430-4b0f-b2d1-68ba458de8a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stylish-cost-calculator-premium/" + google-query: inurl:"/wp-content/plugins/stylish-cost-calculator-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stylish-cost-calculator-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stylish-cost-calculator-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stylish-cost-calculator-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stylish-price-list-1162e5c3375a29dda16c38290874b6a7.yaml b/nuclei-templates/cve-less/plugins/stylish-price-list-1162e5c3375a29dda16c38290874b6a7.yaml new file mode 100644 index 0000000000..80dd3fd89f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stylish-price-list-1162e5c3375a29dda16c38290874b6a7.yaml @@ -0,0 +1,58 @@ +id: stylish-price-list-1162e5c3375a29dda16c38290874b6a7 + +info: + name: > + Stylish Price List <= 7.0.17 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d9cea4e-b619-4935-bb7c-a64ddf52d480?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stylish-price-list/" + google-query: inurl:"/wp-content/plugins/stylish-price-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stylish-price-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stylish-price-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stylish-price-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stylish-price-list-bcf6a8a116341bcac1e69fe2f154a5e2.yaml b/nuclei-templates/cve-less/plugins/stylish-price-list-bcf6a8a116341bcac1e69fe2f154a5e2.yaml new file mode 100644 index 0000000000..57fdc85e37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stylish-price-list-bcf6a8a116341bcac1e69fe2f154a5e2.yaml @@ -0,0 +1,58 @@ +id: stylish-price-list-bcf6a8a116341bcac1e69fe2f154a5e2 + +info: + name: > + Stylish Price List <= 6.9.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37a9b2d0-e27d-4a2c-945a-a06a9b9bd2ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stylish-price-list/" + google-query: inurl:"/wp-content/plugins/stylish-price-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stylish-price-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stylish-price-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stylish-price-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stylish-price-list-f10183ed44d63adcd1747764a96c820f.yaml b/nuclei-templates/cve-less/plugins/stylish-price-list-f10183ed44d63adcd1747764a96c820f.yaml new file mode 100644 index 0000000000..57b500ddf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stylish-price-list-f10183ed44d63adcd1747764a96c820f.yaml @@ -0,0 +1,58 @@ +id: stylish-price-list-f10183ed44d63adcd1747764a96c820f + +info: + name: > + Stylish Price List < 6.9.0 - Arbitrary Image Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1cf03f-265c-4cb5-b32b-8039b9e5da2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stylish-price-list/" + google-query: inurl:"/wp-content/plugins/stylish-price-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stylish-price-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stylish-price-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stylish-price-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/stylist-b62755f81eca9dc431fe91f1c1c5e844.yaml b/nuclei-templates/cve-less/plugins/stylist-b62755f81eca9dc431fe91f1c1c5e844.yaml new file mode 100644 index 0000000000..c42e559efb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/stylist-b62755f81eca9dc431fe91f1c1c5e844.yaml @@ -0,0 +1,58 @@ +id: stylist-b62755f81eca9dc431fe91f1c1c5e844 + +info: + name: > + Extra Block Design, Style, CSS for ANY Gutenberg Blocks <= 0.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2659d22f-3b54-4268-8618-b0c685278f6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/stylist/" + google-query: inurl:"/wp-content/plugins/stylist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,stylist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/stylist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "stylist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sublanguage-80e328ca936017b96ab31fe4d42f9f3e.yaml b/nuclei-templates/cve-less/plugins/sublanguage-80e328ca936017b96ab31fe4d42f9f3e.yaml new file mode 100644 index 0000000000..bcee9d15da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sublanguage-80e328ca936017b96ab31fe4d42f9f3e.yaml @@ -0,0 +1,58 @@ +id: sublanguage-80e328ca936017b96ab31fe4d42f9f3e + +info: + name: > + Sublanguage <= 2.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50726c57-8d42-4143-9e75-d30513d8d0e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sublanguage/" + google-query: inurl:"/wp-content/plugins/sublanguage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sublanguage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sublanguage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sublanguage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subpages-extended-67118eb3397203867c13f43462b990f9.yaml b/nuclei-templates/cve-less/plugins/subpages-extended-67118eb3397203867c13f43462b990f9.yaml new file mode 100644 index 0000000000..9c477168b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subpages-extended-67118eb3397203867c13f43462b990f9.yaml @@ -0,0 +1,58 @@ +id: subpages-extended-67118eb3397203867c13f43462b990f9 + +info: + name: > + Subpages Extended <= 1.6.6 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23a2fd80-65cb-4e92-978d-c365f08b4c0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subpages-extended/" + google-query: inurl:"/wp-content/plugins/subpages-extended/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subpages-extended,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subpages-extended/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subpages-extended" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-sidebar-783f6ed85330c62d6c5fe672e0ec559c.yaml b/nuclei-templates/cve-less/plugins/subscribe-sidebar-783f6ed85330c62d6c5fe672e0ec559c.yaml new file mode 100644 index 0000000000..120a28d8ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-sidebar-783f6ed85330c62d6c5fe672e0ec559c.yaml @@ -0,0 +1,58 @@ +id: subscribe-sidebar-783f6ed85330c62d6c5fe672e0ec559c + +info: + name: > + Subscribe Sidebar plugin by Blubrry <= 1.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b403b1f3-cc04-48fb-b2ae-c6c234fad29f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-sidebar/" + google-query: inurl:"/wp-content/plugins/subscribe-sidebar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-sidebar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-sidebar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-sidebar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-to-category-75e4710b6f6d108c91a0d10797676b5b.yaml b/nuclei-templates/cve-less/plugins/subscribe-to-category-75e4710b6f6d108c91a0d10797676b5b.yaml new file mode 100644 index 0000000000..00f6ad97f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-to-category-75e4710b6f6d108c91a0d10797676b5b.yaml @@ -0,0 +1,58 @@ +id: subscribe-to-category-75e4710b6f6d108c91a0d10797676b5b + +info: + name: > + Subscribe to Category <= 2.7.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fae8440-ce36-45ba-bed2-af30162e4c1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-to-category/" + google-query: inurl:"/wp-content/plugins/subscribe-to-category/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-to-category,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-to-category/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-to-category" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-to-category-f8057967039523304998e4a1e27c496f.yaml b/nuclei-templates/cve-less/plugins/subscribe-to-category-f8057967039523304998e4a1e27c496f.yaml new file mode 100644 index 0000000000..d1150a394c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-to-category-f8057967039523304998e4a1e27c496f.yaml @@ -0,0 +1,58 @@ +id: subscribe-to-category-f8057967039523304998e4a1e27c496f + +info: + name: > + Subscribe to Category <= 2.7.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f040d5b9-0db2-467b-91fa-98aede9f7280?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-to-category/" + google-query: inurl:"/wp-content/plugins/subscribe-to-category/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-to-category,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-to-category/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-to-category" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-to-comments-d227231b4f8bc2fd1ba287eabca0e5a2.yaml b/nuclei-templates/cve-less/plugins/subscribe-to-comments-d227231b4f8bc2fd1ba287eabca0e5a2.yaml new file mode 100644 index 0000000000..91b7ba9c24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-to-comments-d227231b4f8bc2fd1ba287eabca0e5a2.yaml @@ -0,0 +1,58 @@ +id: subscribe-to-comments-d227231b4f8bc2fd1ba287eabca0e5a2 + +info: + name: > + Subscribe to Comments <= 2.1.2 - Local File Includion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f92784a7-f2b3-47f8-b03f-4e234b57e40a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-to-comments/" + google-query: inurl:"/wp-content/plugins/subscribe-to-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-to-comments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-to-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-to-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-to-comments-f75bd794bdf0bce00fb43494bf16c7f1.yaml b/nuclei-templates/cve-less/plugins/subscribe-to-comments-f75bd794bdf0bce00fb43494bf16c7f1.yaml new file mode 100644 index 0000000000..d904c1f134 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-to-comments-f75bd794bdf0bce00fb43494bf16c7f1.yaml @@ -0,0 +1,58 @@ +id: subscribe-to-comments-f75bd794bdf0bce00fb43494bf16c7f1 + +info: + name: > + Subscribe to Comments <= 2.0.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81b76824-8099-433d-88e3-c05df9434fd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-to-comments/" + google-query: inurl:"/wp-content/plugins/subscribe-to-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-to-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-to-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-to-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-15bbee0302a2c0acdbacef494a071dae.yaml b/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-15bbee0302a2c0acdbacef494a071dae.yaml new file mode 100644 index 0000000000..f7bbd094a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-15bbee0302a2c0acdbacef494a071dae.yaml @@ -0,0 +1,58 @@ +id: subscribe-to-comments-reloaded-15bbee0302a2c0acdbacef494a071dae + +info: + name: > + Subscribe To Comments Reloaded <= 140129 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/014dcf08-1968-4a3f-a772-2248e65dfb07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-to-comments-reloaded/" + google-query: inurl:"/wp-content/plugins/subscribe-to-comments-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-to-comments-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-to-comments-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-to-comments-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 140129') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-218762f76a47ddcb2051ebcd055069c7.yaml b/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-218762f76a47ddcb2051ebcd055069c7.yaml new file mode 100644 index 0000000000..284dc54645 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-218762f76a47ddcb2051ebcd055069c7.yaml @@ -0,0 +1,58 @@ +id: subscribe-to-comments-reloaded-218762f76a47ddcb2051ebcd055069c7 + +info: + name: > + Subscribe To Comments Reloaded <= 211130 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5be2c2e7-f982-410d-a5dc-f3ef976dff02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-to-comments-reloaded/" + google-query: inurl:"/wp-content/plugins/subscribe-to-comments-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-to-comments-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-to-comments-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-to-comments-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 211130') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-ea7188fa96127d6768b6d958f17226e5.yaml b/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-ea7188fa96127d6768b6d958f17226e5.yaml new file mode 100644 index 0000000000..67e6d6cc5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-ea7188fa96127d6768b6d958f17226e5.yaml @@ -0,0 +1,58 @@ +id: subscribe-to-comments-reloaded-ea7188fa96127d6768b6d958f17226e5 + +info: + name: > + Subscribe To Comments Reloaded < 150820 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce03e98d-7c29-405f-81bc-4a1114d9889d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-to-comments-reloaded/" + google-query: inurl:"/wp-content/plugins/subscribe-to-comments-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-to-comments-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-to-comments-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-to-comments-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 150820') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-efa006e93668f7aca40417ac3bc81a16.yaml b/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-efa006e93668f7aca40417ac3bc81a16.yaml new file mode 100644 index 0000000000..8033058ba9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe-to-comments-reloaded-efa006e93668f7aca40417ac3bc81a16.yaml @@ -0,0 +1,58 @@ +id: subscribe-to-comments-reloaded-efa006e93668f7aca40417ac3bc81a16 + +info: + name: > + Subscribe To Comments Reloaded <= 220725 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c64956c3-b6f5-419e-82f3-3c9e90e1d677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe-to-comments-reloaded/" + google-query: inurl:"/wp-content/plugins/subscribe-to-comments-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe-to-comments-reloaded,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe-to-comments-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe-to-comments-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 220725') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe2-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/subscribe2-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..0da047935e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe2-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: subscribe2-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe2/" + google-query: inurl:"/wp-content/plugins/subscribe2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe2-6183f2ee603510ff52f63f1f006c28a4.yaml b/nuclei-templates/cve-less/plugins/subscribe2-6183f2ee603510ff52f63f1f006c28a4.yaml new file mode 100644 index 0000000000..78f8f465da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe2-6183f2ee603510ff52f63f1f006c28a4.yaml @@ -0,0 +1,58 @@ +id: subscribe2-6183f2ee603510ff52f63f1f006c28a4 + +info: + name: > + Subscribe2 – Form, Email Subscribers & Newsletters < 8.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10a54a3b-db6d-45c5-9280-7042ccc17ccd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe2/" + google-query: inurl:"/wp-content/plugins/subscribe2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe2-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/subscribe2-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..ab249ab8d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe2-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: subscribe2-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe2/" + google-query: inurl:"/wp-content/plugins/subscribe2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe2-8402c61711992f819817934b35ca7a98.yaml b/nuclei-templates/cve-less/plugins/subscribe2-8402c61711992f819817934b35ca7a98.yaml new file mode 100644 index 0000000000..9456707b83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe2-8402c61711992f819817934b35ca7a98.yaml @@ -0,0 +1,58 @@ +id: subscribe2-8402c61711992f819817934b35ca7a98 + +info: + name: > + Subscribe2 – Form, Email Subscribers & Newsletters <= 10.15 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7202c0f7-cde7-4588-95f4-367d91f2eb67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe2/" + google-query: inurl:"/wp-content/plugins/subscribe2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe2-914f38027718514db2df33bcbfa5d9b6.yaml b/nuclei-templates/cve-less/plugins/subscribe2-914f38027718514db2df33bcbfa5d9b6.yaml new file mode 100644 index 0000000000..e7e06a53a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe2-914f38027718514db2df33bcbfa5d9b6.yaml @@ -0,0 +1,58 @@ +id: subscribe2-914f38027718514db2df33bcbfa5d9b6 + +info: + name: > + Subscribe2 <= 10.37 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e43d6fc-28f1-4208-a529-f264304fe8aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe2/" + google-query: inurl:"/wp-content/plugins/subscribe2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe2-ac88ac9a4126934ac4e490020952d981.yaml b/nuclei-templates/cve-less/plugins/subscribe2-ac88ac9a4126934ac4e490020952d981.yaml new file mode 100644 index 0000000000..ab53506ffa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe2-ac88ac9a4126934ac4e490020952d981.yaml @@ -0,0 +1,58 @@ +id: subscribe2-ac88ac9a4126934ac4e490020952d981 + +info: + name: > + Subscribe2 <= 10.40 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92b4d800-2895-4f7b-8b3b-ee6df75a7908?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe2/" + google-query: inurl:"/wp-content/plugins/subscribe2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe2-b1c3c2103a95130385060251902a6b08.yaml b/nuclei-templates/cve-less/plugins/subscribe2-b1c3c2103a95130385060251902a6b08.yaml new file mode 100644 index 0000000000..00a3d9ada5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe2-b1c3c2103a95130385060251902a6b08.yaml @@ -0,0 +1,58 @@ +id: subscribe2-b1c3c2103a95130385060251902a6b08 + +info: + name: > + Subscribe2 <= 10.40 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c34ce601-5cf9-433f-bc9d-5c705eba6b08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe2/" + google-query: inurl:"/wp-content/plugins/subscribe2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribe2-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/subscribe2-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..ac72c2c294 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribe2-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: subscribe2-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribe2/" + google-query: inurl:"/wp-content/plugins/subscribe2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribe2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribe2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribe2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscriber-6e4e8347273d5c0e2b6b13d913498882.yaml b/nuclei-templates/cve-less/plugins/subscriber-6e4e8347273d5c0e2b6b13d913498882.yaml new file mode 100644 index 0000000000..f48d07108c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscriber-6e4e8347273d5c0e2b6b13d913498882.yaml @@ -0,0 +1,58 @@ +id: subscriber-6e4e8347273d5c0e2b6b13d913498882 + +info: + name: > + Subscriber by BestWebSoft <= 1.3.4 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77440d6e-b660-433b-9953-c1f92644302e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscriber/" + google-query: inurl:"/wp-content/plugins/subscriber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscriber,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscriber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscriber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribers-com-a6ba6de400353cbaf7c7146b43b770d6.yaml b/nuclei-templates/cve-less/plugins/subscribers-com-a6ba6de400353cbaf7c7146b43b770d6.yaml new file mode 100644 index 0000000000..53d99b61e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribers-com-a6ba6de400353cbaf7c7146b43b770d6.yaml @@ -0,0 +1,58 @@ +id: subscribers-com-a6ba6de400353cbaf7c7146b43b770d6 + +info: + name: > + Subscribers – Free Web Push Notifications <= 1.5.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66e78219-b3fd-40e9-a58c-8e27ef3c5e4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribers-com/" + google-query: inurl:"/wp-content/plugins/subscribers-com/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribers-com,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribers-com/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribers-com" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscribers-text-counter-912f96d113a5aa3c6fbc130ea2c63f30.yaml b/nuclei-templates/cve-less/plugins/subscribers-text-counter-912f96d113a5aa3c6fbc130ea2c63f30.yaml new file mode 100644 index 0000000000..bc6a4a0028 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscribers-text-counter-912f96d113a5aa3c6fbc130ea2c63f30.yaml @@ -0,0 +1,58 @@ +id: subscribers-text-counter-912f96d113a5aa3c6fbc130ea2c63f30 + +info: + name: > + Subscribers Text Counter <= 1.7 - Cross-Site Request Forgery to Settings Update and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a548e71f-4f36-4a29-8293-474e119f09cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscribers-text-counter/" + google-query: inurl:"/wp-content/plugins/subscribers-text-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscribers-text-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscribers-text-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscribers-text-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subscriptions-memberships-for-paypal-246acc4f8640ae460f0f934c6252b374.yaml b/nuclei-templates/cve-less/plugins/subscriptions-memberships-for-paypal-246acc4f8640ae460f0f934c6252b374.yaml new file mode 100644 index 0000000000..f73ba81cda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subscriptions-memberships-for-paypal-246acc4f8640ae460f0f934c6252b374.yaml @@ -0,0 +1,58 @@ +id: subscriptions-memberships-for-paypal-246acc4f8640ae460f0f934c6252b374 + +info: + name: > + Subscriptions & Memberships for PayPal <= 1.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdf6407-388c-4fb4-b00d-7ed389a9067d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subscriptions-memberships-for-paypal/" + google-query: inurl:"/wp-content/plugins/subscriptions-memberships-for-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subscriptions-memberships-for-paypal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subscriptions-memberships-for-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subscriptions-memberships-for-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/subway-dd1fa2d046eacdab57006cff4cc678d1.yaml b/nuclei-templates/cve-less/plugins/subway-dd1fa2d046eacdab57006cff4cc678d1.yaml new file mode 100644 index 0000000000..59d974d89a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/subway-dd1fa2d046eacdab57006cff4cc678d1.yaml @@ -0,0 +1,58 @@ +id: subway-dd1fa2d046eacdab57006cff4cc678d1 + +info: + name: > + Subway – Private Site Option <= 2.1.4 - Improper Access Control to Sensitive Information Exposure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b80638b-4dd1-47f5-9a70-6bd626ac6986?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/subway/" + google-query: inurl:"/wp-content/plugins/subway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,subway,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/subway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "subway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sucuri-scanner-783f372f4644686742e160ed2c3ab92d.yaml b/nuclei-templates/cve-less/plugins/sucuri-scanner-783f372f4644686742e160ed2c3ab92d.yaml new file mode 100644 index 0000000000..a46a8feb2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sucuri-scanner-783f372f4644686742e160ed2c3ab92d.yaml @@ -0,0 +1,58 @@ +id: sucuri-scanner-783f372f4644686742e160ed2c3ab92d + +info: + name: > + Sucuri Security <= 1.8.33 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6298192-2afa-4468-86d5-8487321a0ff6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sucuri-scanner/" + google-query: inurl:"/wp-content/plugins/sucuri-scanner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sucuri-scanner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sucuri-scanner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sucuri-scanner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sumo-divi-modules-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sumo-divi-modules-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2a6dd4ccec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sumo-divi-modules-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sumo-divi-modules-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sumo-divi-modules/" + google-query: inurl:"/wp-content/plugins/sumo-divi-modules/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sumo-divi-modules,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sumo-divi-modules/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sumo-divi-modules" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sumome-67ae2a415472885fa884ebc17419d3bf.yaml b/nuclei-templates/cve-less/plugins/sumome-67ae2a415472885fa884ebc17419d3bf.yaml new file mode 100644 index 0000000000..ac8b17654b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sumome-67ae2a415472885fa884ebc17419d3bf.yaml @@ -0,0 +1,58 @@ +id: sumome-67ae2a415472885fa884ebc17419d3bf + +info: + name: > + Sumo <= 1.34 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5f4e9bf-b452-4425-8bf2-73be7857b3ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sumome/" + google-query: inurl:"/wp-content/plugins/sumome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sumome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sumome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sumome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sunshine-photo-cart-04bb16712ffe510bd42325a97d792814.yaml b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-04bb16712ffe510bd42325a97d792814.yaml new file mode 100644 index 0000000000..6c3b69a2f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-04bb16712ffe510bd42325a97d792814.yaml @@ -0,0 +1,58 @@ +id: sunshine-photo-cart-04bb16712ffe510bd42325a97d792814 + +info: + name: > + Sunshine Photo Cart <= 2.9.13 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fd38e86-6448-47fd-a8a7-f571158e3599?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sunshine-photo-cart/" + google-query: inurl:"/wp-content/plugins/sunshine-photo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sunshine-photo-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sunshine-photo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sunshine-photo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sunshine-photo-cart-15830d6b8ea556fb257579ec9221b580.yaml b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-15830d6b8ea556fb257579ec9221b580.yaml new file mode 100644 index 0000000000..a10f47d809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-15830d6b8ea556fb257579ec9221b580.yaml @@ -0,0 +1,58 @@ +id: sunshine-photo-cart-15830d6b8ea556fb257579ec9221b580 + +info: + name: > + Sunshine Photo Cart <= 2.9.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/107918e4-fb21-40df-818d-a71b78b26928?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sunshine-photo-cart/" + google-query: inurl:"/wp-content/plugins/sunshine-photo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sunshine-photo-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sunshine-photo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sunshine-photo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sunshine-photo-cart-46f4f6351643b92d6e721f9df0cbb87d.yaml b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-46f4f6351643b92d6e721f9df0cbb87d.yaml new file mode 100644 index 0000000000..1e1c9d39f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-46f4f6351643b92d6e721f9df0cbb87d.yaml @@ -0,0 +1,58 @@ +id: sunshine-photo-cart-46f4f6351643b92d6e721f9df0cbb87d + +info: + name: > + Sunshine Photo Cart <= 2.8.28 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c043510b-6aeb-4e91-80f0-a62970c01b1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sunshine-photo-cart/" + google-query: inurl:"/wp-content/plugins/sunshine-photo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sunshine-photo-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sunshine-photo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sunshine-photo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sunshine-photo-cart-6fb4ed5587f0486cce5c1d786ad4230e.yaml b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-6fb4ed5587f0486cce5c1d786ad4230e.yaml new file mode 100644 index 0000000000..6332ecbc27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-6fb4ed5587f0486cce5c1d786ad4230e.yaml @@ -0,0 +1,58 @@ +id: sunshine-photo-cart-6fb4ed5587f0486cce5c1d786ad4230e + +info: + name: > + Sunshine Photo Cart <= 2.9.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b941db0-9d6d-4b89-8e04-8770499b6a9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sunshine-photo-cart/" + google-query: inurl:"/wp-content/plugins/sunshine-photo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sunshine-photo-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sunshine-photo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sunshine-photo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sunshine-photo-cart-a734bff91fde948cd641fb4f506275db.yaml b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-a734bff91fde948cd641fb4f506275db.yaml new file mode 100644 index 0000000000..d901d37c65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-a734bff91fde948cd641fb4f506275db.yaml @@ -0,0 +1,58 @@ +id: sunshine-photo-cart-a734bff91fde948cd641fb4f506275db + +info: + name: > + Sunshine Photo Cart <= 3.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27e0b9e8-b6b7-45fe-8c9e-5e49c4feccac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sunshine-photo-cart/" + google-query: inurl:"/wp-content/plugins/sunshine-photo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sunshine-photo-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sunshine-photo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sunshine-photo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sunshine-photo-cart-d0182d6b5ad1d47371d3d46c5ca25851.yaml b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-d0182d6b5ad1d47371d3d46c5ca25851.yaml new file mode 100644 index 0000000000..eda957a091 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-d0182d6b5ad1d47371d3d46c5ca25851.yaml @@ -0,0 +1,58 @@ +id: sunshine-photo-cart-d0182d6b5ad1d47371d3d46c5ca25851 + +info: + name: > + Sunshine Photo Cart <= 2.9.25 - Insecure Direct Object Reference to Order Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2eae7c33-2347-4b34-8b5f-7f4a6ee3e9c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sunshine-photo-cart/" + google-query: inurl:"/wp-content/plugins/sunshine-photo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sunshine-photo-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sunshine-photo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sunshine-photo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sunshine-photo-cart-d096370d5e8a77a5a56a117293d4ce98.yaml b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-d096370d5e8a77a5a56a117293d4ce98.yaml new file mode 100644 index 0000000000..4fee36ba1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-d096370d5e8a77a5a56a117293d4ce98.yaml @@ -0,0 +1,58 @@ +id: sunshine-photo-cart-d096370d5e8a77a5a56a117293d4ce98 + +info: + name: > + Sunshine Photo Cart: Free Client Galleries for Photographers <= 3.0.24 - Unauthenticated Sensitive Information Exposure via Invoice + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da76d034-3e9a-4f3f-a314-48e776028369?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sunshine-photo-cart/" + google-query: inurl:"/wp-content/plugins/sunshine-photo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sunshine-photo-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sunshine-photo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sunshine-photo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sunshine-photo-cart-f3dea6737790d88bd69a099bbefbf2b4.yaml b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-f3dea6737790d88bd69a099bbefbf2b4.yaml new file mode 100644 index 0000000000..b8a519fbdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sunshine-photo-cart-f3dea6737790d88bd69a099bbefbf2b4.yaml @@ -0,0 +1,58 @@ +id: sunshine-photo-cart-f3dea6737790d88bd69a099bbefbf2b4 + +info: + name: > + Sunshine Photo Cart: Free Client Photo Galleries for Photographers <= 3.1.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca0ce12-4759-4182-b69e-665e189b92f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sunshine-photo-cart/" + google-query: inurl:"/wp-content/plugins/sunshine-photo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sunshine-photo-cart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sunshine-photo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sunshine-photo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-forms-23939dc50089a2fd8ea8e17b2f3390a5.yaml b/nuclei-templates/cve-less/plugins/super-forms-23939dc50089a2fd8ea8e17b2f3390a5.yaml new file mode 100644 index 0000000000..9311c6cf43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-forms-23939dc50089a2fd8ea8e17b2f3390a5.yaml @@ -0,0 +1,58 @@ +id: super-forms-23939dc50089a2fd8ea8e17b2f3390a5 + +info: + name: > + Super Forms – Drag & Drop Form Builder <= 4.9.700 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/575d1353-70af-4200-9088-662f7a052b76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-forms/" + google-query: inurl:"/wp-content/plugins/super-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.700') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-forms-245a41771beb2dc7d12a123756efaedb.yaml b/nuclei-templates/cve-less/plugins/super-forms-245a41771beb2dc7d12a123756efaedb.yaml new file mode 100644 index 0000000000..ebf5307a82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-forms-245a41771beb2dc7d12a123756efaedb.yaml @@ -0,0 +1,58 @@ +id: super-forms-245a41771beb2dc7d12a123756efaedb + +info: + name: > + Super Forms - Drag & Drop Form Builder WordPress <= 6.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8e6beeb-5af9-4713-bf7f-2edc1ddaa12f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-forms/" + google-query: inurl:"/wp-content/plugins/super-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-interactive-maps-100f897c38dafe938e9af02c79c8f1ff.yaml b/nuclei-templates/cve-less/plugins/super-interactive-maps-100f897c38dafe938e9af02c79c8f1ff.yaml new file mode 100644 index 0000000000..3593d80944 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-interactive-maps-100f897c38dafe938e9af02c79c8f1ff.yaml @@ -0,0 +1,58 @@ +id: super-interactive-maps-100f897c38dafe938e9af02c79c8f1ff + +info: + name: > + Super Store Finder <= 6.1, Super Interactive Maps <= 1.9, Super Logo Showcase <= 2.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23f0315f-5523-4e16-8adf-f9fe9254032a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-interactive-maps/" + google-query: inurl:"/wp-content/plugins/super-interactive-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-interactive-maps,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-interactive-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-interactive-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-interactive-maps-93ccfea21d84c366d260e239066074ae.yaml b/nuclei-templates/cve-less/plugins/super-interactive-maps-93ccfea21d84c366d260e239066074ae.yaml new file mode 100644 index 0000000000..c877f39132 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-interactive-maps-93ccfea21d84c366d260e239066074ae.yaml @@ -0,0 +1,58 @@ +id: super-interactive-maps-93ccfea21d84c366d260e239066074ae + +info: + name: > + Super Store Finder <= 6.4, Super Interactive Maps <= 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25971f3f-4816-416c-9de9-feb6326fe948?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-interactive-maps/" + google-query: inurl:"/wp-content/plugins/super-interactive-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-interactive-maps,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-interactive-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-interactive-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-progressive-web-apps-86c50499cb2301a82786d4f168d5a72c.yaml b/nuclei-templates/cve-less/plugins/super-progressive-web-apps-86c50499cb2301a82786d4f168d5a72c.yaml new file mode 100644 index 0000000000..ffb78fe91e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-progressive-web-apps-86c50499cb2301a82786d4f168d5a72c.yaml @@ -0,0 +1,58 @@ +id: super-progressive-web-apps-86c50499cb2301a82786d4f168d5a72c + +info: + name: > + Super Progressive Web Apps <= 2.2.21 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d36e869a-5bd4-4f59-8e28-01fa586024c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-progressive-web-apps/" + google-query: inurl:"/wp-content/plugins/super-progressive-web-apps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-progressive-web-apps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-progressive-web-apps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-progressive-web-apps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-progressive-web-apps-da1b2a8c96719ab9e52f2e44ede96439.yaml b/nuclei-templates/cve-less/plugins/super-progressive-web-apps-da1b2a8c96719ab9e52f2e44ede96439.yaml new file mode 100644 index 0000000000..8d7c5209a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-progressive-web-apps-da1b2a8c96719ab9e52f2e44ede96439.yaml @@ -0,0 +1,58 @@ +id: super-progressive-web-apps-da1b2a8c96719ab9e52f2e44ede96439 + +info: + name: > + Super Progressive Web Apps <= 2.2.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7255319c-8175-4885-8f94-3f46f9e577a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-progressive-web-apps/" + google-query: inurl:"/wp-content/plugins/super-progressive-web-apps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-progressive-web-apps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-progressive-web-apps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-progressive-web-apps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-164f540fc7a38170dc136b3ff3864ea3.yaml b/nuclei-templates/cve-less/plugins/super-socializer-164f540fc7a38170dc136b3ff3864ea3.yaml new file mode 100644 index 0000000000..bb9ed6d906 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-164f540fc7a38170dc136b3ff3864ea3.yaml @@ -0,0 +1,58 @@ +id: super-socializer-164f540fc7a38170dc136b3ff3864ea3 + +info: + name: > + Super Socializer <= 7.13.44 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09cff621-3cf3-496e-ab91-66d088fe79dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-1d7bb8633b523735c234101babaefc6e.yaml b/nuclei-templates/cve-less/plugins/super-socializer-1d7bb8633b523735c234101babaefc6e.yaml new file mode 100644 index 0000000000..796ca17fdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-1d7bb8633b523735c234101babaefc6e.yaml @@ -0,0 +1,58 @@ +id: super-socializer-1d7bb8633b523735c234101babaefc6e + +info: + name: > + Super Socializer <= 7.13.54 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc6cfad1-d23a-4a96-9d6c-841b6d795a01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.54') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-2c66024442466abc661bfb4f6aa99c2f.yaml b/nuclei-templates/cve-less/plugins/super-socializer-2c66024442466abc661bfb4f6aa99c2f.yaml new file mode 100644 index 0000000000..e762b22ab9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-2c66024442466abc661bfb4f6aa99c2f.yaml @@ -0,0 +1,58 @@ +id: super-socializer-2c66024442466abc661bfb4f6aa99c2f + +info: + name: > + Social Share, Social Login and Social Comments < 7.13.30 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fd4d30b-f37f-4083-acfe-8e85c075da10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-46d7cdc90f6e4788d19f634ed2b57174.yaml b/nuclei-templates/cve-less/plugins/super-socializer-46d7cdc90f6e4788d19f634ed2b57174.yaml new file mode 100644 index 0000000000..e876b74070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-46d7cdc90f6e4788d19f634ed2b57174.yaml @@ -0,0 +1,58 @@ +id: super-socializer-46d7cdc90f6e4788d19f634ed2b57174 + +info: + name: > + Social Share, Social Login and Social Comments Plugin – Super Socializer <= 7.13.63 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47e6840e-9f6c-44eb-a6bd-e25e4c5c0bf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-55664802ca8a80e3857f1283c80160e1.yaml b/nuclei-templates/cve-less/plugins/super-socializer-55664802ca8a80e3857f1283c80160e1.yaml new file mode 100644 index 0000000000..b125b64465 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-55664802ca8a80e3857f1283c80160e1.yaml @@ -0,0 +1,58 @@ +id: super-socializer-55664802ca8a80e3857f1283c80160e1 + +info: + name: > + Super Socializer <= 7.13.52 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/558679ea-a8ee-4329-8ad7-34b708476b53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-9a23102fb64a765611d796440b87f458.yaml b/nuclei-templates/cve-less/plugins/super-socializer-9a23102fb64a765611d796440b87f458.yaml new file mode 100644 index 0000000000..38ab912058 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-9a23102fb64a765611d796440b87f458.yaml @@ -0,0 +1,58 @@ +id: super-socializer-9a23102fb64a765611d796440b87f458 + +info: + name: > + Super Socializer <= 7.13.54 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/101dd211-c3eb-4d27-9194-841bc2a968e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.54') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-d2b942d377993c80a764418d9e08cf38.yaml b/nuclei-templates/cve-less/plugins/super-socializer-d2b942d377993c80a764418d9e08cf38.yaml new file mode 100644 index 0000000000..ef6a6a55fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-d2b942d377993c80a764418d9e08cf38.yaml @@ -0,0 +1,58 @@ +id: super-socializer-d2b942d377993c80a764418d9e08cf38 + +info: + name: > + Super Socializer <= 7.13.53 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/755454cc-b1a8-4a38-9e73-c47a6ef562a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-f1616b3150e17cf700c43af1d021a1e6.yaml b/nuclei-templates/cve-less/plugins/super-socializer-f1616b3150e17cf700c43af1d021a1e6.yaml new file mode 100644 index 0000000000..e2a67cd05d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-f1616b3150e17cf700c43af1d021a1e6.yaml @@ -0,0 +1,58 @@ +id: super-socializer-f1616b3150e17cf700c43af1d021a1e6 + +info: + name: > + Social Share, Social Login and Social Comments <= 7.10.6 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdbf2658-b819-4fd3-ac89-8b90a7e3a2cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-socializer-f857ae19dab84e492640b0478274e45c.yaml b/nuclei-templates/cve-less/plugins/super-socializer-f857ae19dab84e492640b0478274e45c.yaml new file mode 100644 index 0000000000..b1c9843c17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-socializer-f857ae19dab84e492640b0478274e45c.yaml @@ -0,0 +1,58 @@ +id: super-socializer-f857ae19dab84e492640b0478274e45c + +info: + name: > + Social Share, Social Login and Social Comments <= 7.13.51 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6257739a-cd7c-4797-882a-016a01fe84b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-socializer/" + google-query: inurl:"/wp-content/plugins/super-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-socializer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.13.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-testimonial-16fe73a759651a7d3bcefdb3b3d57eae.yaml b/nuclei-templates/cve-less/plugins/super-testimonial-16fe73a759651a7d3bcefdb3b3d57eae.yaml new file mode 100644 index 0000000000..8de9e0e976 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-testimonial-16fe73a759651a7d3bcefdb3b3d57eae.yaml @@ -0,0 +1,58 @@ +id: super-testimonial-16fe73a759651a7d3bcefdb3b3d57eae + +info: + name: > + Testimonials (Free <= 2.6, Pro < 1.0.7) - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9bd9617-254a-40b3-a1ec-00d30b75e1b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-testimonial/" + google-query: inurl:"/wp-content/plugins/super-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-testimonial-a39aab4c2ab62bbbd835d18cf4082e05.yaml b/nuclei-templates/cve-less/plugins/super-testimonial-a39aab4c2ab62bbbd835d18cf4082e05.yaml new file mode 100644 index 0000000000..b9c8831fb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-testimonial-a39aab4c2ab62bbbd835d18cf4082e05.yaml @@ -0,0 +1,58 @@ +id: super-testimonial-a39aab4c2ab62bbbd835d18cf4082e05 + +info: + name: > + Super Testimonials <= 2.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52659f1c-642e-4c88-b3d0-d5c5a206b11c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-testimonial/" + google-query: inurl:"/wp-content/plugins/super-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-testimonial-f27a4c95db01a4a56d77711f77220046.yaml b/nuclei-templates/cve-less/plugins/super-testimonial-f27a4c95db01a4a56d77711f77220046.yaml new file mode 100644 index 0000000000..9469b850c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-testimonial-f27a4c95db01a4a56d77711f77220046.yaml @@ -0,0 +1,58 @@ +id: super-testimonial-f27a4c95db01a4a56d77711f77220046 + +info: + name: > + Testimonials <= 2.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d63bc735-b2ba-4be6-bd1c-f904ef860f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-testimonial/" + google-query: inurl:"/wp-content/plugins/super-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-testimonial-f50a0c6a3334b6a9833d56ea2fa95097.yaml b/nuclei-templates/cve-less/plugins/super-testimonial-f50a0c6a3334b6a9833d56ea2fa95097.yaml new file mode 100644 index 0000000000..a654a5ebcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-testimonial-f50a0c6a3334b6a9833d56ea2fa95097.yaml @@ -0,0 +1,58 @@ +id: super-testimonial-f50a0c6a3334b6a9833d56ea2fa95097 + +info: + name: > + Testimonials <= 3.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/066dfb01-4f3c-4d5a-8fbf-7e58dfc7ac91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-testimonial/" + google-query: inurl:"/wp-content/plugins/super-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-testimonial-pro-16fe73a759651a7d3bcefdb3b3d57eae.yaml b/nuclei-templates/cve-less/plugins/super-testimonial-pro-16fe73a759651a7d3bcefdb3b3d57eae.yaml new file mode 100644 index 0000000000..73501cdecb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-testimonial-pro-16fe73a759651a7d3bcefdb3b3d57eae.yaml @@ -0,0 +1,58 @@ +id: super-testimonial-pro-16fe73a759651a7d3bcefdb3b3d57eae + +info: + name: > + Testimonials (Free <= 2.6, Pro < 1.0.7) - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9bd9617-254a-40b3-a1ec-00d30b75e1b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-testimonial-pro/" + google-query: inurl:"/wp-content/plugins/super-testimonial-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-testimonial-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-testimonial-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-testimonial-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-transactional-emails-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/super-transactional-emails-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..68f0d8cb25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-transactional-emails-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: super-transactional-emails-for-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-transactional-emails-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/super-transactional-emails-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-transactional-emails-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-transactional-emails-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-transactional-emails-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/super-video-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/super-video-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c766ceccbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/super-video-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: super-video-player-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/super-video-player/" + google-query: inurl:"/wp-content/plugins/super-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,super-video-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/super-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "super-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superb-slideshow-gallery-d47a1b6b1cff7517a2e9c1cfb877c153.yaml b/nuclei-templates/cve-less/plugins/superb-slideshow-gallery-d47a1b6b1cff7517a2e9c1cfb877c153.yaml new file mode 100644 index 0000000000..2c5822c994 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superb-slideshow-gallery-d47a1b6b1cff7517a2e9c1cfb877c153.yaml @@ -0,0 +1,58 @@ +id: superb-slideshow-gallery-d47a1b6b1cff7517a2e9c1cfb877c153 + +info: + name: > + Superb slideshow gallery <= 13.1 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a12945d-a67c-4a19-a4e7-f65f5f2a21bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superb-slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/superb-slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superb-slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superb-slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superb-slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superb-social-share-and-follow-buttons-99c5f90a74d748855313b5f983dc4bc2.yaml b/nuclei-templates/cve-less/plugins/superb-social-share-and-follow-buttons-99c5f90a74d748855313b5f983dc4bc2.yaml new file mode 100644 index 0000000000..24238096ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superb-social-share-and-follow-buttons-99c5f90a74d748855313b5f983dc4bc2.yaml @@ -0,0 +1,58 @@ +id: superb-social-share-and-follow-buttons-99c5f90a74d748855313b5f983dc4bc2 + +info: + name: > + Superb Social Media Share Buttons and Follow Buttons <= 1.1.3 - Cross-Site Request Forgery via spbsmAjax + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebea0ec0-f7ee-41c5-b0a5-a78e9cd11d41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superb-social-share-and-follow-buttons/" + google-query: inurl:"/wp-content/plugins/superb-social-share-and-follow-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superb-social-share-and-follow-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superb-social-share-and-follow-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superb-social-share-and-follow-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superb-social-share-and-follow-buttons-bfcc2c70b2c01ba809a238ca61e5f88c.yaml b/nuclei-templates/cve-less/plugins/superb-social-share-and-follow-buttons-bfcc2c70b2c01ba809a238ca61e5f88c.yaml new file mode 100644 index 0000000000..1d6bdc91ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superb-social-share-and-follow-buttons-bfcc2c70b2c01ba809a238ca61e5f88c.yaml @@ -0,0 +1,58 @@ +id: superb-social-share-and-follow-buttons-bfcc2c70b2c01ba809a238ca61e5f88c + +info: + name: > + Superb Social Media Share Buttons and Follow Buttons <= 1.1.3 - Missing Authorization via spbsmAjax + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca4dead2-c6da-4613-8ce6-13699a7495a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superb-social-share-and-follow-buttons/" + google-query: inurl:"/wp-content/plugins/superb-social-share-and-follow-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superb-social-share-and-follow-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superb-social-share-and-follow-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superb-social-share-and-follow-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superfly-menu-683819db80183ccca71d3fa32fe3879a.yaml b/nuclei-templates/cve-less/plugins/superfly-menu-683819db80183ccca71d3fa32fe3879a.yaml new file mode 100644 index 0000000000..daa14953cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superfly-menu-683819db80183ccca71d3fa32fe3879a.yaml @@ -0,0 +1,58 @@ +id: superfly-menu-683819db80183ccca71d3fa32fe3879a + +info: + name: > + WordPress Menu Plugin — Superfly Responsive Menu <= 5.0.25 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/701bcf98-fcb4-4722-9bf1-b94efe3bb1fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superfly-menu/" + google-query: inurl:"/wp-content/plugins/superfly-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superfly-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superfly-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superfly-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superior-faq-043f908fb4f9351f4c0f0add9321f548.yaml b/nuclei-templates/cve-less/plugins/superior-faq-043f908fb4f9351f4c0f0add9321f548.yaml new file mode 100644 index 0000000000..2ffe6ae461 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superior-faq-043f908fb4f9351f4c0f0add9321f548.yaml @@ -0,0 +1,58 @@ +id: superior-faq-043f908fb4f9351f4c0f0add9321f548 + +info: + name: > + Superior FAQ <= 1.0.2 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f98bb2a2-6525-4e0b-8bbd-968cf5b122dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superior-faq/" + google-query: inurl:"/wp-content/plugins/superior-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superior-faq,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superior-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superior-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superlogoshowcase-wp-100f897c38dafe938e9af02c79c8f1ff.yaml b/nuclei-templates/cve-less/plugins/superlogoshowcase-wp-100f897c38dafe938e9af02c79c8f1ff.yaml new file mode 100644 index 0000000000..6bc229f27c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superlogoshowcase-wp-100f897c38dafe938e9af02c79c8f1ff.yaml @@ -0,0 +1,58 @@ +id: superlogoshowcase-wp-100f897c38dafe938e9af02c79c8f1ff + +info: + name: > + Super Store Finder <= 6.1, Super Interactive Maps <= 1.9, Super Logo Showcase <= 2.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23f0315f-5523-4e16-8adf-f9fe9254032a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superlogoshowcase-wp/" + google-query: inurl:"/wp-content/plugins/superlogoshowcase-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superlogoshowcase-wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superlogoshowcase-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superlogoshowcase-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superstorefinder-wp-100f897c38dafe938e9af02c79c8f1ff.yaml b/nuclei-templates/cve-less/plugins/superstorefinder-wp-100f897c38dafe938e9af02c79c8f1ff.yaml new file mode 100644 index 0000000000..6815736f45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superstorefinder-wp-100f897c38dafe938e9af02c79c8f1ff.yaml @@ -0,0 +1,58 @@ +id: superstorefinder-wp-100f897c38dafe938e9af02c79c8f1ff + +info: + name: > + Super Store Finder <= 6.1, Super Interactive Maps <= 1.9, Super Logo Showcase <= 2.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23f0315f-5523-4e16-8adf-f9fe9254032a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superstorefinder-wp/" + google-query: inurl:"/wp-content/plugins/superstorefinder-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superstorefinder-wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superstorefinder-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superstorefinder-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superstorefinder-wp-4f8bb1cd134e141985840e55e7337ff2.yaml b/nuclei-templates/cve-less/plugins/superstorefinder-wp-4f8bb1cd134e141985840e55e7337ff2.yaml new file mode 100644 index 0000000000..e4a2958171 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superstorefinder-wp-4f8bb1cd134e141985840e55e7337ff2.yaml @@ -0,0 +1,58 @@ +id: superstorefinder-wp-4f8bb1cd134e141985840e55e7337ff2 + +info: + name: > + Super Store Finder <= 6.9.3 - Unauthenticated Email Creation/Sending + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superstorefinder-wp/" + google-query: inurl:"/wp-content/plugins/superstorefinder-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superstorefinder-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superstorefinder-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superstorefinder-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/superstorefinder-wp-93ccfea21d84c366d260e239066074ae.yaml b/nuclei-templates/cve-less/plugins/superstorefinder-wp-93ccfea21d84c366d260e239066074ae.yaml new file mode 100644 index 0000000000..9864c30b4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/superstorefinder-wp-93ccfea21d84c366d260e239066074ae.yaml @@ -0,0 +1,58 @@ +id: superstorefinder-wp-93ccfea21d84c366d260e239066074ae + +info: + name: > + Super Store Finder <= 6.4, Super Interactive Maps <= 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25971f3f-4816-416c-9de9-feb6326fe948?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/superstorefinder-wp/" + google-query: inurl:"/wp-content/plugins/superstorefinder-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,superstorefinder-wp,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/superstorefinder-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superstorefinder-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/support-genix-lite-d0405f3a6546530ea0089cf284177266.yaml b/nuclei-templates/cve-less/plugins/support-genix-lite-d0405f3a6546530ea0089cf284177266.yaml new file mode 100644 index 0000000000..d6721bbc2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/support-genix-lite-d0405f3a6546530ea0089cf284177266.yaml @@ -0,0 +1,58 @@ +id: support-genix-lite-d0405f3a6546530ea0089cf284177266 + +info: + name: > + Support Genix <= 1.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40ade684-57a2-43be-9d4a-1c0a653807eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/support-genix-lite/" + google-query: inurl:"/wp-content/plugins/support-genix-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,support-genix-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/support-genix-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "support-genix-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportboard-2a20c012892057123c0688f9b3a4ff38.yaml b/nuclei-templates/cve-less/plugins/supportboard-2a20c012892057123c0688f9b3a4ff38.yaml new file mode 100644 index 0000000000..48aa7068a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportboard-2a20c012892057123c0688f9b3a4ff38.yaml @@ -0,0 +1,58 @@ +id: supportboard-2a20c012892057123c0688f9b3a4ff38 + +info: + name: > + Support Board < 3.3.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb3c0108-dfb6-4786-af04-9d54cb22c74c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportboard/" + google-query: inurl:"/wp-content/plugins/supportboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportboard-4b0cb38b99185f75f96c68ddb4fd5800.yaml b/nuclei-templates/cve-less/plugins/supportboard-4b0cb38b99185f75f96c68ddb4fd5800.yaml new file mode 100644 index 0000000000..c1bbf50494 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportboard-4b0cb38b99185f75f96c68ddb4fd5800.yaml @@ -0,0 +1,58 @@ +id: supportboard-4b0cb38b99185f75f96c68ddb4fd5800 + +info: + name: > + Support Board <= 3.4.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c06d868-ac71-401a-9b8e-ee04a099c095?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportboard/" + google-query: inurl:"/wp-content/plugins/supportboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportboard-79a87cfdb010addc7119ceae498cd6d2.yaml b/nuclei-templates/cve-less/plugins/supportboard-79a87cfdb010addc7119ceae498cd6d2.yaml new file mode 100644 index 0000000000..0cf362278f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportboard-79a87cfdb010addc7119ceae498cd6d2.yaml @@ -0,0 +1,58 @@ +id: supportboard-79a87cfdb010addc7119ceae498cd6d2 + +info: + name: > + Support Board <= 3.3.3 - Multiple Unauthenticated SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3eb1cb5-71ca-44c5-9434-e86301543357?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportboard/" + google-query: inurl:"/wp-content/plugins/supportboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportboard,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportboard-b10ddb53a1d55359331e1cfb5b98fd64.yaml b/nuclei-templates/cve-less/plugins/supportboard-b10ddb53a1d55359331e1cfb5b98fd64.yaml new file mode 100644 index 0000000000..844e70d4c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportboard-b10ddb53a1d55359331e1cfb5b98fd64.yaml @@ -0,0 +1,58 @@ +id: supportboard-b10ddb53a1d55359331e1cfb5b98fd64 + +info: + name: > + Support Board <= 1.2.8 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d90737b-fc4b-45a3-b970-64468e9eb431?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportboard/" + google-query: inurl:"/wp-content/plugins/supportboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportboard-c1a62af10487c310f7866304f28fe56c.yaml b/nuclei-templates/cve-less/plugins/supportboard-c1a62af10487c310f7866304f28fe56c.yaml new file mode 100644 index 0000000000..844db1f6bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportboard-c1a62af10487c310f7866304f28fe56c.yaml @@ -0,0 +1,58 @@ +id: supportboard-c1a62af10487c310f7866304f28fe56c + +info: + name: > + Support Board <= 3.3.4 - Agent+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a43adbf2-0e85-4e70-a18f-8001a86b224e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportboard/" + google-query: inurl:"/wp-content/plugins/supportboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportboard-df4750e020fd99b1db3b233a3a40020d.yaml b/nuclei-templates/cve-less/plugins/supportboard-df4750e020fd99b1db3b233a3a40020d.yaml new file mode 100644 index 0000000000..20e0cbdc15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportboard-df4750e020fd99b1db3b233a3a40020d.yaml @@ -0,0 +1,58 @@ +id: supportboard-df4750e020fd99b1db3b233a3a40020d + +info: + name: > + Support Board for WordPress <= 1.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46f144c9-2cd3-4320-b987-119b672e7e30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportboard/" + google-query: inurl:"/wp-content/plugins/supportboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-1e4fd26a738e660824e15332d3d7697a.yaml b/nuclei-templates/cve-less/plugins/supportcandy-1e4fd26a738e660824e15332d3d7697a.yaml new file mode 100644 index 0000000000..97ef880c01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-1e4fd26a738e660824e15332d3d7697a.yaml @@ -0,0 +1,58 @@ +id: supportcandy-1e4fd26a738e660824e15332d3d7697a + +info: + name: > + SupportCandy <= 3.2.3 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/663c54f4-4ca5-4916-b2a5-de3cabe77f38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-32dcf173d1237771b363c0c2887254dc.yaml b/nuclei-templates/cve-less/plugins/supportcandy-32dcf173d1237771b363c0c2887254dc.yaml new file mode 100644 index 0000000000..f76af616e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-32dcf173d1237771b363c0c2887254dc.yaml @@ -0,0 +1,58 @@ +id: supportcandy-32dcf173d1237771b363c0c2887254dc + +info: + name: > + SupportCandy <= 2.2.6 - Cross-Site Request Forgery to Arbitrary Ticket Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e1fa691-3934-4e15-b339-e679976d6d5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-3dc309d6eba7a3765b70c365b5153ae1.yaml b/nuclei-templates/cve-less/plugins/supportcandy-3dc309d6eba7a3765b70c365b5153ae1.yaml new file mode 100644 index 0000000000..4996545cec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-3dc309d6eba7a3765b70c365b5153ae1.yaml @@ -0,0 +1,58 @@ +id: supportcandy-3dc309d6eba7a3765b70c365b5153ae1 + +info: + name: > + SupportCandy <= 3.1.6 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1d2b6bd-a75a-4a07-b2f0-8ec206d41211?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-48b2566d4213ee09dc933aa00171e18b.yaml b/nuclei-templates/cve-less/plugins/supportcandy-48b2566d4213ee09dc933aa00171e18b.yaml new file mode 100644 index 0000000000..c97928b26a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-48b2566d4213ee09dc933aa00171e18b.yaml @@ -0,0 +1,58 @@ +id: supportcandy-48b2566d4213ee09dc933aa00171e18b + +info: + name: > + SupportCandy – Helpdesk & Support Ticket System <= 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcea4ecf-e690-4d1f-beab-fbb30c5bb52e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-4b6c9f5939660218c2639c17b2048a97.yaml b/nuclei-templates/cve-less/plugins/supportcandy-4b6c9f5939660218c2639c17b2048a97.yaml new file mode 100644 index 0000000000..de51f172bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-4b6c9f5939660218c2639c17b2048a97.yaml @@ -0,0 +1,58 @@ +id: supportcandy-4b6c9f5939660218c2639c17b2048a97 + +info: + name: > + SupportCandy <= 3.1.6 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75f01eb4-5d53-441d-9bee-e97857dadaf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-6e5471e206d56f7ca756740955d7ef85.yaml b/nuclei-templates/cve-less/plugins/supportcandy-6e5471e206d56f7ca756740955d7ef85.yaml new file mode 100644 index 0000000000..5eb44f6a98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-6e5471e206d56f7ca756740955d7ef85.yaml @@ -0,0 +1,58 @@ +id: supportcandy-6e5471e206d56f7ca756740955d7ef85 + +info: + name: > + SupportCandy <= 3.1.4 - Unauthenticated SQL Injection via parse_user_filters + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ca1c55a-cd4e-429a-ab74-dd1bad1a65f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-907062f692752ce26e64e57b3c581650.yaml b/nuclei-templates/cve-less/plugins/supportcandy-907062f692752ce26e64e57b3c581650.yaml new file mode 100644 index 0000000000..bd40b8e69d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-907062f692752ce26e64e57b3c581650.yaml @@ -0,0 +1,58 @@ +id: supportcandy-907062f692752ce26e64e57b3c581650 + +info: + name: > + SupportCandy <= 2.2.4 - Unauthenticated Arbitrary Ticket Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/653ab9cb-7084-47e4-b5e3-6788fa5d7496?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-a66f1036a5faeca38f844c5e78d8a411.yaml b/nuclei-templates/cve-less/plugins/supportcandy-a66f1036a5faeca38f844c5e78d8a411.yaml new file mode 100644 index 0000000000..9e5f7fd6ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-a66f1036a5faeca38f844c5e78d8a411.yaml @@ -0,0 +1,58 @@ +id: supportcandy-a66f1036a5faeca38f844c5e78d8a411 + +info: + name: > + SupportCandy <= 2.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35fb04aa-5899-4797-9ea1-24e7a98ad8d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-b305b8b934fd913e3c8bf40e033b8b8e.yaml b/nuclei-templates/cve-less/plugins/supportcandy-b305b8b934fd913e3c8bf40e033b8b8e.yaml new file mode 100644 index 0000000000..1692a2ddff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-b305b8b934fd913e3c8bf40e033b8b8e.yaml @@ -0,0 +1,58 @@ +id: supportcandy-b305b8b934fd913e3c8bf40e033b8b8e + +info: + name: > + SupportCandy <= 2.2.6 - Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fc6d947-4b6e-4dcb-9f20-02e39b4e730e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-d675073a50b5ae439cde851f96a93469.yaml b/nuclei-templates/cve-less/plugins/supportcandy-d675073a50b5ae439cde851f96a93469.yaml new file mode 100644 index 0000000000..91f0ae545a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-d675073a50b5ae439cde851f96a93469.yaml @@ -0,0 +1,58 @@ +id: supportcandy-d675073a50b5ae439cde851f96a93469 + +info: + name: > + SupportCandy – Helpdesk & Support Ticket System <= 2.2.6 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a10af61-6451-4dda-aeda-ba8fa44bee35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportcandy-e0621827f65c399f847dba7ee6445c56.yaml b/nuclei-templates/cve-less/plugins/supportcandy-e0621827f65c399f847dba7ee6445c56.yaml new file mode 100644 index 0000000000..8883f6d039 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportcandy-e0621827f65c399f847dba7ee6445c56.yaml @@ -0,0 +1,58 @@ +id: supportcandy-e0621827f65c399f847dba7ee6445c56 + +info: + name: > + SupportCandy <= 3.1.3 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07c0b4c5-d76e-4bdc-87d1-3144a1466c77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportcandy/" + google-query: inurl:"/wp-content/plugins/supportcandy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportcandy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportcandy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportcandy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportezzy-2008dfadd96c77e37701fc89701d0b2f.yaml b/nuclei-templates/cve-less/plugins/supportezzy-2008dfadd96c77e37701fc89701d0b2f.yaml new file mode 100644 index 0000000000..99eb0a0f67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportezzy-2008dfadd96c77e37701fc89701d0b2f.yaml @@ -0,0 +1,58 @@ +id: supportezzy-2008dfadd96c77e37701fc89701d0b2f + +info: + name: > + SupportEzzy Ticket System Plugin <= 1.2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3a37e6a-659b-4a40-9051-9e8b3ca1ad42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportezzy/" + google-query: inurl:"/wp-content/plugins/supportezzy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportezzy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportezzy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportezzy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportflow-ce31848b731129452978ca83014199c1.yaml b/nuclei-templates/cve-less/plugins/supportflow-ce31848b731129452978ca83014199c1.yaml new file mode 100644 index 0000000000..3b11a47c62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportflow-ce31848b731129452978ca83014199c1.yaml @@ -0,0 +1,58 @@ +id: supportflow-ce31848b731129452978ca83014199c1 + +info: + name: > + SupportFlow <= 0.6 - Cross-Site Scripting via a ticket excerpt. + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f98d50a-51cb-479b-be4c-566a72f0f221?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportflow/" + google-query: inurl:"/wp-content/plugins/supportflow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportflow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportflow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportflow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supportflow-ed6a08d26be37dfa8ba1985aca8693da.yaml b/nuclei-templates/cve-less/plugins/supportflow-ed6a08d26be37dfa8ba1985aca8693da.yaml new file mode 100644 index 0000000000..a8e051bba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supportflow-ed6a08d26be37dfa8ba1985aca8693da.yaml @@ -0,0 +1,58 @@ +id: supportflow-ed6a08d26be37dfa8ba1985aca8693da + +info: + name: > + SupportFlow <= 0.6 - Stored Cross-Site Scripting via discussion ticket title + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e63a70c-924b-4736-a712-80538bfd7ca7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supportflow/" + google-query: inurl:"/wp-content/plugins/supportflow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supportflow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supportflow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supportflow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supra-csv-parser-0f94c84212785d00cc5084f78797c691.yaml b/nuclei-templates/cve-less/plugins/supra-csv-parser-0f94c84212785d00cc5084f78797c691.yaml new file mode 100644 index 0000000000..8b12c0479e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supra-csv-parser-0f94c84212785d00cc5084f78797c691.yaml @@ -0,0 +1,58 @@ +id: supra-csv-parser-0f94c84212785d00cc5084f78797c691 + +info: + name: > + Supra CSV <= 4.0.3 - Stored Cross-Site Scripting via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a46c09a5-5127-4970-a009-b5fdc9414e81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supra-csv-parser/" + google-query: inurl:"/wp-content/plugins/supra-csv-parser/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supra-csv-parser,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supra-csv-parser/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supra-csv-parser" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/supreme-modules-for-divi-21942b6e9d955d0155ca56bc416fed6c.yaml b/nuclei-templates/cve-less/plugins/supreme-modules-for-divi-21942b6e9d955d0155ca56bc416fed6c.yaml new file mode 100644 index 0000000000..d977745fbc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/supreme-modules-for-divi-21942b6e9d955d0155ca56bc416fed6c.yaml @@ -0,0 +1,58 @@ +id: supreme-modules-for-divi-21942b6e9d955d0155ca56bc416fed6c + +info: + name: > + Supreme Modules Lite – Divi Theme, Extra Theme and Divi Builder <= 2.5.3 - Authenticated (Contributor+) DOM-Based Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17508063-3cd7-4b61-b7be-23a71b75f6a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/supreme-modules-for-divi/" + google-query: inurl:"/wp-content/plugins/supreme-modules-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,supreme-modules-for-divi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/supreme-modules-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supreme-modules-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surbma-gdpr-proof-google-analytics-65bd3240ae8121decf63d5f24c3d008f.yaml b/nuclei-templates/cve-less/plugins/surbma-gdpr-proof-google-analytics-65bd3240ae8121decf63d5f24c3d008f.yaml new file mode 100644 index 0000000000..6e3cd7c3f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surbma-gdpr-proof-google-analytics-65bd3240ae8121decf63d5f24c3d008f.yaml @@ -0,0 +1,58 @@ +id: surbma-gdpr-proof-google-analytics-65bd3240ae8121decf63d5f24c3d008f + +info: + name: > + Surbma | GDPR Proof Cookie Consent & Notice Bar <= 17.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48b9f3e3-b7fd-4d7c-8f8b-b11ed977aa92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surbma-gdpr-proof-google-analytics/" + google-query: inurl:"/wp-content/plugins/surbma-gdpr-proof-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surbma-gdpr-proof-google-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surbma-gdpr-proof-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surbma-gdpr-proof-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surbma-gdpr-proof-google-analytics-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/surbma-gdpr-proof-google-analytics-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dea82819a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surbma-gdpr-proof-google-analytics-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: surbma-gdpr-proof-google-analytics-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surbma-gdpr-proof-google-analytics/" + google-query: inurl:"/wp-content/plugins/surbma-gdpr-proof-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surbma-gdpr-proof-google-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surbma-gdpr-proof-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surbma-gdpr-proof-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surbma-magyar-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/surbma-magyar-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..91174dad35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surbma-magyar-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: surbma-magyar-woocommerce-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surbma-magyar-woocommerce/" + google-query: inurl:"/wp-content/plugins/surbma-magyar-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surbma-magyar-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surbma-magyar-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surbma-magyar-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 30.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surecart-3d8dd9beb9e2d1b17d8d01ef045ea5d3.yaml b/nuclei-templates/cve-less/plugins/surecart-3d8dd9beb9e2d1b17d8d01ef045ea5d3.yaml new file mode 100644 index 0000000000..224fe116a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surecart-3d8dd9beb9e2d1b17d8d01ef045ea5d3.yaml @@ -0,0 +1,58 @@ +id: surecart-3d8dd9beb9e2d1b17d8d01ef045ea5d3 + +info: + name: > + SureCart <= 2.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/416c13ff-15ae-4ba4-8a95-7c07bec75c22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surecart/" + google-query: inurl:"/wp-content/plugins/surecart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surecart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surecart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surecart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/suretriggers-f1d679f5d2a45e6f2ff41ed909dc0711.yaml b/nuclei-templates/cve-less/plugins/suretriggers-f1d679f5d2a45e6f2ff41ed909dc0711.yaml new file mode 100644 index 0000000000..8555393efd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/suretriggers-f1d679f5d2a45e6f2ff41ed909dc0711.yaml @@ -0,0 +1,58 @@ +id: suretriggers-f1d679f5d2a45e6f2ff41ed909dc0711 + +info: + name: > + SureTriggers <= 1.0.23 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/461211c9-951e-4ccd-abf5-84941290a6a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/suretriggers/" + google-query: inurl:"/wp-content/plugins/suretriggers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,suretriggers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/suretriggers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "suretriggers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surferseo-c3e49cc5a301ec2fc03ff611d9afd783.yaml b/nuclei-templates/cve-less/plugins/surferseo-c3e49cc5a301ec2fc03ff611d9afd783.yaml new file mode 100644 index 0000000000..e5ac7b9229 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surferseo-c3e49cc5a301ec2fc03ff611d9afd783.yaml @@ -0,0 +1,58 @@ +id: surferseo-c3e49cc5a301ec2fc03ff611d9afd783 + +info: + name: > + Surfer <= 1.3.2.357 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c06f9f6d-3cd0-4700-834b-435a99983453?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surferseo/" + google-query: inurl:"/wp-content/plugins/surferseo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surferseo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surferseo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surferseo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.357') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-10c918e1f30e41c6abab8f1a64304178.yaml b/nuclei-templates/cve-less/plugins/survey-maker-10c918e1f30e41c6abab8f1a64304178.yaml new file mode 100644 index 0000000000..90561ec0bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-10c918e1f30e41c6abab8f1a64304178.yaml @@ -0,0 +1,58 @@ +id: survey-maker-10c918e1f30e41c6abab8f1a64304178 + +info: + name: > + Survey Maker <= 3.4.6 - Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b57809-6062-48ca-8572-26032928cd16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-1918195d7c2ab5867189768d59900f1c.yaml b/nuclei-templates/cve-less/plugins/survey-maker-1918195d7c2ab5867189768d59900f1c.yaml new file mode 100644 index 0000000000..ed743ae712 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-1918195d7c2ab5867189768d59900f1c.yaml @@ -0,0 +1,58 @@ +id: survey-maker-1918195d7c2ab5867189768d59900f1c + +info: + name: > + Survey Maker – Best WordPress Survey Plugin <= 3.6.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f105f6bf-3224-4f5c-8334-1a53ff9af9c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-261de0ba624118de4ab57965a4edcc34.yaml b/nuclei-templates/cve-less/plugins/survey-maker-261de0ba624118de4ab57965a4edcc34.yaml new file mode 100644 index 0000000000..8d6dd30214 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-261de0ba624118de4ab57965a4edcc34.yaml @@ -0,0 +1,58 @@ +id: survey-maker-261de0ba624118de4ab57965a4edcc34 + +info: + name: > + Survey Maker – Best WordPress Survey Plugin <= 3.1.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2a58fab-d4a3-4333-8495-e094ed85bb61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-2bb4b724bd1a7da8929a5d331260d484.yaml b/nuclei-templates/cve-less/plugins/survey-maker-2bb4b724bd1a7da8929a5d331260d484.yaml new file mode 100644 index 0000000000..0171fa7997 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-2bb4b724bd1a7da8929a5d331260d484.yaml @@ -0,0 +1,58 @@ +id: survey-maker-2bb4b724bd1a7da8929a5d331260d484 + +info: + name: > + Survey Maker < 3.1.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d72a965-5d81-4619-ad8b-46960a89bf1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-643403eb7ff5706c9caf1f0a5a756401.yaml b/nuclei-templates/cve-less/plugins/survey-maker-643403eb7ff5706c9caf1f0a5a756401.yaml new file mode 100644 index 0000000000..c573c61e9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-643403eb7ff5706c9caf1f0a5a756401.yaml @@ -0,0 +1,58 @@ +id: survey-maker-643403eb7ff5706c9caf1f0a5a756401 + +info: + name: > + Survey Maker <= 4.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcf6a12e-969b-4627-80c8-b51bb9b710cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-669917e04d085a827cbc9c1935738ecb.yaml b/nuclei-templates/cve-less/plugins/survey-maker-669917e04d085a827cbc9c1935738ecb.yaml new file mode 100644 index 0000000000..418673f2aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-669917e04d085a827cbc9c1935738ecb.yaml @@ -0,0 +1,58 @@ +id: survey-maker-669917e04d085a827cbc9c1935738ecb + +info: + name: > + Survey Maker – Best WordPress Survey Plugin <= 1.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2594fcc-ae07-4f3f-a4fe-0c19524b0193?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-72fdd3a89359bcd594b4d65638469ed8.yaml b/nuclei-templates/cve-less/plugins/survey-maker-72fdd3a89359bcd594b4d65638469ed8.yaml new file mode 100644 index 0000000000..a4e9be0f0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-72fdd3a89359bcd594b4d65638469ed8.yaml @@ -0,0 +1,58 @@ +id: survey-maker-72fdd3a89359bcd594b4d65638469ed8 + +info: + name: > + Survey Maker < 1.5.6 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee20726a-b5a8-4778-b5b4-5ea232ca4fc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-82219905fba0330c7a27bd3f2e291fd5.yaml b/nuclei-templates/cve-less/plugins/survey-maker-82219905fba0330c7a27bd3f2e291fd5.yaml new file mode 100644 index 0000000000..78581b917e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-82219905fba0330c7a27bd3f2e291fd5.yaml @@ -0,0 +1,58 @@ +id: survey-maker-82219905fba0330c7a27bd3f2e291fd5 + +info: + name: > + Survey Maker <= 4.0.9 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce297421-506c-4230-837e-96200677e1e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-8acec0a5c8b59824f7149c3540944dde.yaml b/nuclei-templates/cve-less/plugins/survey-maker-8acec0a5c8b59824f7149c3540944dde.yaml new file mode 100644 index 0000000000..a58cc37f8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-8acec0a5c8b59824f7149c3540944dde.yaml @@ -0,0 +1,58 @@ +id: survey-maker-8acec0a5c8b59824f7149c3540944dde + +info: + name: > + Survey Maker <= 4.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75aadbf5-763b-48cb-9d9e-fb8edb894d08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-8eb8c6930c0431ff7195d8b5e7d4d215.yaml b/nuclei-templates/cve-less/plugins/survey-maker-8eb8c6930c0431ff7195d8b5e7d4d215.yaml new file mode 100644 index 0000000000..6248338aef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-8eb8c6930c0431ff7195d8b5e7d4d215.yaml @@ -0,0 +1,58 @@ +id: survey-maker-8eb8c6930c0431ff7195d8b5e7d4d215 + +info: + name: > + Survey Maker <= 2.0.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a817c960-37e9-4f72-a2ef-845d9b898d48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/survey-maker-ad612424551c0ee261f169ba5954843e.yaml b/nuclei-templates/cve-less/plugins/survey-maker-ad612424551c0ee261f169ba5954843e.yaml new file mode 100644 index 0000000000..d6fbcecf37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/survey-maker-ad612424551c0ee261f169ba5954843e.yaml @@ -0,0 +1,58 @@ +id: survey-maker-ad612424551c0ee261f169ba5954843e + +info: + name: > + Survey Maker – Best WordPress Survey Plugin <= 3.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/094c0952-4e28-4ed0-80ae-14fcf10cf2e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/survey-maker/" + google-query: inurl:"/wp-content/plugins/survey-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,survey-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/survey-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "survey-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surveyfunnel-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/surveyfunnel-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c469ed2fdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surveyfunnel-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: surveyfunnel-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surveyfunnel-lite/" + google-query: inurl:"/wp-content/plugins/surveyfunnel-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surveyfunnel-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surveyfunnel-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surveyfunnel-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surveys-73f9709e24c19194b73986ad030e8015.yaml b/nuclei-templates/cve-less/plugins/surveys-73f9709e24c19194b73986ad030e8015.yaml new file mode 100644 index 0000000000..4707229ff0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surveys-73f9709e24c19194b73986ad030e8015.yaml @@ -0,0 +1,58 @@ +id: surveys-73f9709e24c19194b73986ad030e8015 + +info: + name: > + Surveys <= 1.01.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/385c01fc-bed8-4c12-b420-9aecf4857434?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surveys/" + google-query: inurl:"/wp-content/plugins/surveys/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surveys,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surveys/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surveys" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.01.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surveys-ddf10b902ecdb6f3ecf20febec84cbe8.yaml b/nuclei-templates/cve-less/plugins/surveys-ddf10b902ecdb6f3ecf20febec84cbe8.yaml new file mode 100644 index 0000000000..b40bd690cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surveys-ddf10b902ecdb6f3ecf20febec84cbe8.yaml @@ -0,0 +1,58 @@ +id: surveys-ddf10b902ecdb6f3ecf20febec84cbe8 + +info: + name: > + surveys <= 1.01.8 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4488d982-4e57-4614-b336-f1bba8dfa91d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surveys/" + google-query: inurl:"/wp-content/plugins/surveys/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surveys,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surveys/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surveys" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.01.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/surveys-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml b/nuclei-templates/cve-less/plugins/surveys-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml new file mode 100644 index 0000000000..cac0e3c424 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/surveys-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml @@ -0,0 +1,58 @@ +id: surveys-ed4e4356cd22d0451cce02bf7c3fe0f8 + +info: + name: > + Surveys 1.01.8 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c5ce2b-9ac4-4fd2-9e49-ccb8538ba100?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/surveys/" + google-query: inurl:"/wp-content/plugins/surveys/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,surveys,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/surveys/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "surveys" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.01.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sv-provenexpert-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sv-provenexpert-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..931aefba8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sv-provenexpert-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sv-provenexpert-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sv-provenexpert/" + google-query: inurl:"/wp-content/plugins/sv-provenexpert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sv-provenexpert,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sv-provenexpert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sv-provenexpert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sv-tracking-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sv-tracking-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..47a158f7ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sv-tracking-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sv-tracking-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sv-tracking-manager/" + google-query: inurl:"/wp-content/plugins/sv-tracking-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sv-tracking-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sv-tracking-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sv-tracking-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svg-flags-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/svg-flags-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ef001cbc63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svg-flags-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: svg-flags-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svg-flags-lite/" + google-query: inurl:"/wp-content/plugins/svg-flags-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svg-flags-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svg-flags-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svg-flags-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svg-support-4cdd67f3f418a30581118cbbb5c2e501.yaml b/nuclei-templates/cve-less/plugins/svg-support-4cdd67f3f418a30581118cbbb5c2e501.yaml new file mode 100644 index 0000000000..2b6e0b57e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svg-support-4cdd67f3f418a30581118cbbb5c2e501.yaml @@ -0,0 +1,58 @@ +id: svg-support-4cdd67f3f418a30581118cbbb5c2e501 + +info: + name: > + SVG Support <= 2.3.19 Admin+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e9fcaf5-d531-4b14-b8b1-d8090243cf0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svg-support/" + google-query: inurl:"/wp-content/plugins/svg-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svg-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svg-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svg-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svg-support-5b6d277a829fbd531e952b54c0a495ad.yaml b/nuclei-templates/cve-less/plugins/svg-support-5b6d277a829fbd531e952b54c0a495ad.yaml new file mode 100644 index 0000000000..baa5bfdc4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svg-support-5b6d277a829fbd531e952b54c0a495ad.yaml @@ -0,0 +1,58 @@ +id: svg-support-5b6d277a829fbd531e952b54c0a495ad + +info: + name: > + SVG Support <= 2.4.2 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/250edcf8-b56e-4714-9207-25bab2adaf9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svg-support/" + google-query: inurl:"/wp-content/plugins/svg-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svg-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svg-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svg-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svg-support-ffa9b508bdc94d69f110d4734885da09.yaml b/nuclei-templates/cve-less/plugins/svg-support-ffa9b508bdc94d69f110d4734885da09.yaml new file mode 100644 index 0000000000..3d545da071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svg-support-ffa9b508bdc94d69f110d4734885da09.yaml @@ -0,0 +1,58 @@ +id: svg-support-ffa9b508bdc94d69f110d4734885da09 + +info: + name: > + SVG Support 2.5 - 2.5.1 - Insecure Plugin Defaults to Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddcf7901-e9cf-4ca0-87ae-70ecac09d102?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svg-support/" + google-query: inurl:"/wp-content/plugins/svg-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svg-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svg-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svg-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.5', '<= 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svg-uploads-support-4d2ea21aa8044b97f6f856b2ca032bba.yaml b/nuclei-templates/cve-less/plugins/svg-uploads-support-4d2ea21aa8044b97f6f856b2ca032bba.yaml new file mode 100644 index 0000000000..674ac70df8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svg-uploads-support-4d2ea21aa8044b97f6f856b2ca032bba.yaml @@ -0,0 +1,58 @@ +id: svg-uploads-support-4d2ea21aa8044b97f6f856b2ca032bba + +info: + name: > + SVG Uploads Support <= 2.1.1 - Authenticated (Author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad95f0b2-4d96-4f62-b495-050a89539177?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svg-uploads-support/" + google-query: inurl:"/wp-content/plugins/svg-uploads-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svg-uploads-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svg-uploads-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svg-uploads-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svg-vector-icon-plugin-03cfd10aef3dc88159ec608d4ac8800f.yaml b/nuclei-templates/cve-less/plugins/svg-vector-icon-plugin-03cfd10aef3dc88159ec608d4ac8800f.yaml new file mode 100644 index 0000000000..a7f7c67cb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svg-vector-icon-plugin-03cfd10aef3dc88159ec608d4ac8800f.yaml @@ -0,0 +1,58 @@ +id: svg-vector-icon-plugin-03cfd10aef3dc88159ec608d4ac8800f + +info: + name: > + WP SVG Icons <= 3.2.2 - Cross-Site Request Forgery to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8c16dd9-0c04-42b9-a2d3-28b442cecdb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svg-vector-icon-plugin/" + google-query: inurl:"/wp-content/plugins/svg-vector-icon-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svg-vector-icon-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svg-vector-icon-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svg-vector-icon-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svg-vector-icon-plugin-b7954fa43e16eb8eb1a34f4e676a00e3.yaml b/nuclei-templates/cve-less/plugins/svg-vector-icon-plugin-b7954fa43e16eb8eb1a34f4e676a00e3.yaml new file mode 100644 index 0000000000..adadf8571d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svg-vector-icon-plugin-b7954fa43e16eb8eb1a34f4e676a00e3.yaml @@ -0,0 +1,58 @@ +id: svg-vector-icon-plugin-b7954fa43e16eb8eb1a34f4e676a00e3 + +info: + name: > + WP SVG Icons <= 3.2.3 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e78d678-1560-401d-a409-21207332e062?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svg-vector-icon-plugin/" + google-query: inurl:"/wp-content/plugins/svg-vector-icon-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svg-vector-icon-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svg-vector-icon-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svg-vector-icon-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svgator-20391a519d77c31bd1c976dfdc89ed20.yaml b/nuclei-templates/cve-less/plugins/svgator-20391a519d77c31bd1c976dfdc89ed20.yaml new file mode 100644 index 0000000000..63084885d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svgator-20391a519d77c31bd1c976dfdc89ed20.yaml @@ -0,0 +1,58 @@ +id: svgator-20391a519d77c31bd1c976dfdc89ed20 + +info: + name: > + SVGator – Add Animated SVG Easily <= 1.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db4b92ba-b98f-4e9d-bd1e-75bf89d83977?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svgator/" + google-query: inurl:"/wp-content/plugins/svgator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svgator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svgator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svgator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svs-pricing-tables-3f854df7bfd619307ed654215e939951.yaml b/nuclei-templates/cve-less/plugins/svs-pricing-tables-3f854df7bfd619307ed654215e939951.yaml new file mode 100644 index 0000000000..2fbe5fa813 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svs-pricing-tables-3f854df7bfd619307ed654215e939951.yaml @@ -0,0 +1,58 @@ +id: svs-pricing-tables-3f854df7bfd619307ed654215e939951 + +info: + name: > + SVS Pricing Tables <= 1.0.4 - Cross-Site Request Forgery to Pricing Table Edit/Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78af081a-807b-48c8-82cd-f87fbef0fbe6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svs-pricing-tables/" + google-query: inurl:"/wp-content/plugins/svs-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svs-pricing-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svs-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svs-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svs-pricing-tables-59d35e08e05da774933855f91366b645.yaml b/nuclei-templates/cve-less/plugins/svs-pricing-tables-59d35e08e05da774933855f91366b645.yaml new file mode 100644 index 0000000000..a81863c2f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svs-pricing-tables-59d35e08e05da774933855f91366b645.yaml @@ -0,0 +1,58 @@ +id: svs-pricing-tables-59d35e08e05da774933855f91366b645 + +info: + name: > + SVS Pricing Tables <= 1.0.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/655b35a7-a532-4ceb-aa02-4a8192e6449d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svs-pricing-tables/" + google-query: inurl:"/wp-content/plugins/svs-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svs-pricing-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svs-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svs-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/svs-pricing-tables-a665f3ee73307241410449c4f67e450a.yaml b/nuclei-templates/cve-less/plugins/svs-pricing-tables-a665f3ee73307241410449c4f67e450a.yaml new file mode 100644 index 0000000000..9d2c447611 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/svs-pricing-tables-a665f3ee73307241410449c4f67e450a.yaml @@ -0,0 +1,58 @@ +id: svs-pricing-tables-a665f3ee73307241410449c4f67e450a + +info: + name: > + SVS Pricing Tables <= 1.0.4 - Cross-Site Request Forgery to Pricing Table Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7a24213-5191-4b6d-a2d1-7b79729e6517?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/svs-pricing-tables/" + google-query: inurl:"/wp-content/plugins/svs-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,svs-pricing-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/svs-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "svs-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sw-product-bundles-325c2ee814ddc7331db5383ec03956d1.yaml b/nuclei-templates/cve-less/plugins/sw-product-bundles-325c2ee814ddc7331db5383ec03956d1.yaml new file mode 100644 index 0000000000..d36e566fa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sw-product-bundles-325c2ee814ddc7331db5383ec03956d1.yaml @@ -0,0 +1,58 @@ +id: sw-product-bundles-325c2ee814ddc7331db5383ec03956d1 + +info: + name: > + SW Product Bundles <= 2.0.15 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ceff94-e312-41da-acec-15d550aba792?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sw-product-bundles/" + google-query: inurl:"/wp-content/plugins/sw-product-bundles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sw-product-bundles,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sw-product-bundles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sw-product-bundles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sw_ajax_woocommerce_search-17ca7ff5c21686a9400e80e063d3e66d.yaml b/nuclei-templates/cve-less/plugins/sw_ajax_woocommerce_search-17ca7ff5c21686a9400e80e063d3e66d.yaml new file mode 100644 index 0000000000..7a407261f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sw_ajax_woocommerce_search-17ca7ff5c21686a9400e80e063d3e66d.yaml @@ -0,0 +1,58 @@ +id: sw_ajax_woocommerce_search-17ca7ff5c21686a9400e80e063d3e66d + +info: + name: > + SW Ajax WooCommerce Search <= 1.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b404c6c4-cc05-4040-b96a-7be750020acc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sw_ajax_woocommerce_search/" + google-query: inurl:"/wp-content/plugins/sw_ajax_woocommerce_search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sw_ajax_woocommerce_search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sw_ajax_woocommerce_search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sw_ajax_woocommerce_search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swatchly-dac1076894ee7430c4ad6bf91ae05401.yaml b/nuclei-templates/cve-less/plugins/swatchly-dac1076894ee7430c4ad6bf91ae05401.yaml new file mode 100644 index 0000000000..72133f0f1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swatchly-dac1076894ee7430c4ad6bf91ae05401.yaml @@ -0,0 +1,58 @@ +id: swatchly-dac1076894ee7430c4ad6bf91ae05401 + +info: + name: > + Swatchly – WooCommerce Variation Swatches for Products <= 1.2.0 - Cross-Site Request Forgery via plugin_activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa73c2a0-a692-47db-99ca-7e7159fc96aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swatchly/" + google-query: inurl:"/wp-content/plugins/swatchly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swatchly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swatchly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swatchly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swift-framework-0b02214c516fa5bc85822569a5b642f2.yaml b/nuclei-templates/cve-less/plugins/swift-framework-0b02214c516fa5bc85822569a5b642f2.yaml new file mode 100644 index 0000000000..530c626b29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swift-framework-0b02214c516fa5bc85822569a5b642f2.yaml @@ -0,0 +1,58 @@ +id: swift-framework-0b02214c516fa5bc85822569a5b642f2 + +info: + name: > + Swift Framework <= 2.7.31 - Missing Authorization to Unauthenticated Arbitrary Content Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/855055d5-362e-4a92-9e9d-97eab328dcc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swift-framework/" + google-query: inurl:"/wp-content/plugins/swift-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swift-framework,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swift-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swift-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swift-framework-f58e0fb779a935f032e6158130723d4e.yaml b/nuclei-templates/cve-less/plugins/swift-framework-f58e0fb779a935f032e6158130723d4e.yaml new file mode 100644 index 0000000000..4a524ff1b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swift-framework-f58e0fb779a935f032e6158130723d4e.yaml @@ -0,0 +1,58 @@ +id: swift-framework-f58e0fb779a935f032e6158130723d4e + +info: + name: > + Swift Framework <= 2.7.31 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57103f8e-0874-4e56-8571-254607ada21c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swift-framework/" + google-query: inurl:"/wp-content/plugins/swift-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swift-framework,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swift-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swift-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swift-performance-lite-174bf1d87b8761ea6f77723705dffc85.yaml b/nuclei-templates/cve-less/plugins/swift-performance-lite-174bf1d87b8761ea6f77723705dffc85.yaml new file mode 100644 index 0000000000..361c219ae8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swift-performance-lite-174bf1d87b8761ea6f77723705dffc85.yaml @@ -0,0 +1,58 @@ +id: swift-performance-lite-174bf1d87b8761ea6f77723705dffc85 + +info: + name: > + Swift Performance Lite <= 2.3.6.18 - Incorrect Authorization to Authenticated (Subscriber+) Settings Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58b7736a-e3e0-4ecd-9adf-284568b02ef7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swift-performance-lite/" + google-query: inurl:"/wp-content/plugins/swift-performance-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swift-performance-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swift-performance-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swift-performance-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swift-performance-lite-7dfff8c4900f7bbdbc49f6aa2df77488.yaml b/nuclei-templates/cve-less/plugins/swift-performance-lite-7dfff8c4900f7bbdbc49f6aa2df77488.yaml new file mode 100644 index 0000000000..94ff902612 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swift-performance-lite-7dfff8c4900f7bbdbc49f6aa2df77488.yaml @@ -0,0 +1,58 @@ +id: swift-performance-lite-7dfff8c4900f7bbdbc49f6aa2df77488 + +info: + name: > + Swift Performance Lite <= 2.3.6.14 - Missing Authorization to Unauthenticated Settings Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8321f68f-da2d-4382-979d-54008de2cae7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swift-performance-lite/" + google-query: inurl:"/wp-content/plugins/swift-performance-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swift-performance-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swift-performance-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swift-performance-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swifty-bar-861a2a6e66a953eb50c087718b438c88.yaml b/nuclei-templates/cve-less/plugins/swifty-bar-861a2a6e66a953eb50c087718b438c88.yaml new file mode 100644 index 0000000000..bfab777390 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swifty-bar-861a2a6e66a953eb50c087718b438c88.yaml @@ -0,0 +1,58 @@ +id: swifty-bar-861a2a6e66a953eb50c087718b438c88 + +info: + name: > + Swifty Bar, sticky bar by WPGens <= 1.2.10 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66c90387-af23-48fc-94da-708b9c223fe3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swifty-bar/" + google-query: inurl:"/wp-content/plugins/swifty-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swifty-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swifty-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swifty-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swifty-page-manager-94a65bcd2f84366f6216e3f9b19f7582.yaml b/nuclei-templates/cve-less/plugins/swifty-page-manager-94a65bcd2f84366f6216e3f9b19f7582.yaml new file mode 100644 index 0000000000..a80fbe56ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swifty-page-manager-94a65bcd2f84366f6216e3f9b19f7582.yaml @@ -0,0 +1,58 @@ +id: swifty-page-manager-94a65bcd2f84366f6216e3f9b19f7582 + +info: + name: > + Swifty Page Manager <= 3.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75b8f71d-9f75-4b42-ac5f-c6ffb476aae4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swifty-page-manager/" + google-query: inurl:"/wp-content/plugins/swifty-page-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swifty-page-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swifty-page-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swifty-page-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swifty-page-manager-ee107d9cd894fe54bb677ea3e5052c7f.yaml b/nuclei-templates/cve-less/plugins/swifty-page-manager-ee107d9cd894fe54bb677ea3e5052c7f.yaml new file mode 100644 index 0000000000..d0206f14d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swifty-page-manager-ee107d9cd894fe54bb677ea3e5052c7f.yaml @@ -0,0 +1,58 @@ +id: swifty-page-manager-ee107d9cd894fe54bb677ea3e5052c7f + +info: + name: > + Swifty Page Manager <= 3.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8550a405-9fa2-41a3-b556-05ff9f577ce4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swifty-page-manager/" + google-query: inurl:"/wp-content/plugins/swifty-page-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swifty-page-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swifty-page-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swifty-page-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swipe-hq-checkout-for-eshop-6d412503c15b02be74462a4b525012a6.yaml b/nuclei-templates/cve-less/plugins/swipe-hq-checkout-for-eshop-6d412503c15b02be74462a4b525012a6.yaml new file mode 100644 index 0000000000..fa9910b080 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swipe-hq-checkout-for-eshop-6d412503c15b02be74462a4b525012a6.yaml @@ -0,0 +1,58 @@ +id: swipe-hq-checkout-for-eshop-6d412503c15b02be74462a4b525012a6 + +info: + name: > + eShop Swipe plugin <= 3.7.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9a603ee-183d-4130-8e03-12deb86466ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swipe-hq-checkout-for-eshop/" + google-query: inurl:"/wp-content/plugins/swipe-hq-checkout-for-eshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swipe-hq-checkout-for-eshop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swipe-hq-checkout-for-eshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swipe-hq-checkout-for-eshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swipe-hq-checkout-for-jigoshop-9dadadc2ea66cec373bf71c20060be7b.yaml b/nuclei-templates/cve-less/plugins/swipe-hq-checkout-for-jigoshop-9dadadc2ea66cec373bf71c20060be7b.yaml new file mode 100644 index 0000000000..726e265302 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swipe-hq-checkout-for-jigoshop-9dadadc2ea66cec373bf71c20060be7b.yaml @@ -0,0 +1,58 @@ +id: swipe-hq-checkout-for-jigoshop-9dadadc2ea66cec373bf71c20060be7b + +info: + name: > + Jigoshop Swipe plugin <= 3.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5fe6884-4a31-4341-b30f-354b447f5313?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swipe-hq-checkout-for-jigoshop/" + google-query: inurl:"/wp-content/plugins/swipe-hq-checkout-for-jigoshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swipe-hq-checkout-for-jigoshop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swipe-hq-checkout-for-jigoshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swipe-hq-checkout-for-jigoshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swipehq-payment-gateway-woocommerce-04275b24c87ac6163ea35464c25c26e3.yaml b/nuclei-templates/cve-less/plugins/swipehq-payment-gateway-woocommerce-04275b24c87ac6163ea35464c25c26e3.yaml new file mode 100644 index 0000000000..5f571d9336 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swipehq-payment-gateway-woocommerce-04275b24c87ac6163ea35464c25c26e3.yaml @@ -0,0 +1,58 @@ +id: swipehq-payment-gateway-woocommerce-04275b24c87ac6163ea35464c25c26e3 + +info: + name: > + SwipeHQ Payment Gateway WooCommerce <= 2.7.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ea32791-edd3-4495-893e-668f42dcf5e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swipehq-payment-gateway-woocommerce/" + google-query: inurl:"/wp-content/plugins/swipehq-payment-gateway-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swipehq-payment-gateway-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swipehq-payment-gateway-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swipehq-payment-gateway-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/swipehq-payment-gateway-wp-e-commerce-fab645de2f6e6231ff6074be3c265848.yaml b/nuclei-templates/cve-less/plugins/swipehq-payment-gateway-wp-e-commerce-fab645de2f6e6231ff6074be3c265848.yaml new file mode 100644 index 0000000000..d717bd6932 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/swipehq-payment-gateway-wp-e-commerce-fab645de2f6e6231ff6074be3c265848.yaml @@ -0,0 +1,58 @@ +id: swipehq-payment-gateway-wp-e-commerce-fab645de2f6e6231ff6074be3c265848 + +info: + name: > + WP e-Commerce Swipe plugin <= 3.1.0 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/691b080c-052a-4967-a251-98a17038448d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/swipehq-payment-gateway-wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/swipehq-payment-gateway-wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,swipehq-payment-gateway-wp-e-commerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/swipehq-payment-gateway-wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swipehq-payment-gateway-wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sydney-toolbox-49b75b404a9ba001add19a1df795abd7.yaml b/nuclei-templates/cve-less/plugins/sydney-toolbox-49b75b404a9ba001add19a1df795abd7.yaml new file mode 100644 index 0000000000..5edebbc858 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sydney-toolbox-49b75b404a9ba001add19a1df795abd7.yaml @@ -0,0 +1,58 @@ +id: sydney-toolbox-49b75b404a9ba001add19a1df795abd7 + +info: + name: > + Sydney Toolbox <= 1.26 - Authenticated (Contributor+) Stored Cross-Site Scripting via _id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b20d638-82cb-48ce-96fa-fd42d06f649f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sydney-toolbox/" + google-query: inurl:"/wp-content/plugins/sydney-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sydney-toolbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sydney-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sydney-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sydney-toolbox-5adaf21161b5d5d8e7d95c715efbd0e3.yaml b/nuclei-templates/cve-less/plugins/sydney-toolbox-5adaf21161b5d5d8e7d95c715efbd0e3.yaml new file mode 100644 index 0000000000..d3cddb6e48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sydney-toolbox-5adaf21161b5d5d8e7d95c715efbd0e3.yaml @@ -0,0 +1,58 @@ +id: sydney-toolbox-5adaf21161b5d5d8e7d95c715efbd0e3 + +info: + name: > + Sydney Toolbox <= 1.25 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1227f3bc-0bb3-4b80-ad69-2d4314fafbe4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sydney-toolbox/" + google-query: inurl:"/wp-content/plugins/sydney-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sydney-toolbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sydney-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sydney-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sydney-toolbox-c87a07214ae94f7db769181aa46e6e3e.yaml b/nuclei-templates/cve-less/plugins/sydney-toolbox-c87a07214ae94f7db769181aa46e6e3e.yaml new file mode 100644 index 0000000000..438dfeec67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sydney-toolbox-c87a07214ae94f7db769181aa46e6e3e.yaml @@ -0,0 +1,58 @@ +id: sydney-toolbox-c87a07214ae94f7db769181aa46e6e3e + +info: + name: > + Sydney Toolbox <= 1.28 - Authenticated (Contributor+) Stored Cross-Site Scripting via Filterable Gallery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccf4554e-4b34-46b0-b423-5cee7150e6c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sydney-toolbox/" + google-query: inurl:"/wp-content/plugins/sydney-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sydney-toolbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sydney-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sydney-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sydney-toolbox-f499e4efa4d99d7d76254d2c3b103977.yaml b/nuclei-templates/cve-less/plugins/sydney-toolbox-f499e4efa4d99d7d76254d2c3b103977.yaml new file mode 100644 index 0000000000..3247694689 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sydney-toolbox-f499e4efa4d99d7d76254d2c3b103977.yaml @@ -0,0 +1,58 @@ +id: sydney-toolbox-f499e4efa4d99d7d76254d2c3b103977 + +info: + name: > + Sydney Toolbox <= 1.30 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6d5275d-43d0-41f6-96c7-e7646eac4534?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sydney-toolbox/" + google-query: inurl:"/wp-content/plugins/sydney-toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sydney-toolbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sydney-toolbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sydney-toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/symbiostock-5e582ef605e9fe0c0d1cac86ea21ae85.yaml b/nuclei-templates/cve-less/plugins/symbiostock-5e582ef605e9fe0c0d1cac86ea21ae85.yaml new file mode 100644 index 0000000000..a3e145c1b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/symbiostock-5e582ef605e9fe0c0d1cac86ea21ae85.yaml @@ -0,0 +1,58 @@ +id: symbiostock-5e582ef605e9fe0c0d1cac86ea21ae85 + +info: + name: > + Symbiostock Lite <= 6.0.0 - Authenticated (Shop Manager+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/666b8b39-fab0-4e99-b365-a4ac9f964494?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/symbiostock/" + google-query: inurl:"/wp-content/plugins/symbiostock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,symbiostock,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/symbiostock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "symbiostock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sync-ecommerce-neo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/sync-ecommerce-neo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a6db01aeba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sync-ecommerce-neo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: sync-ecommerce-neo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sync-ecommerce-neo/" + google-query: inurl:"/wp-content/plugins/sync-ecommerce-neo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sync-ecommerce-neo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sync-ecommerce-neo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sync-ecommerce-neo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sync-post-with-other-site-886a02653a1926dd36921eb04bdcde64.yaml b/nuclei-templates/cve-less/plugins/sync-post-with-other-site-886a02653a1926dd36921eb04bdcde64.yaml new file mode 100644 index 0000000000..981331f9cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sync-post-with-other-site-886a02653a1926dd36921eb04bdcde64.yaml @@ -0,0 +1,58 @@ +id: sync-post-with-other-site-886a02653a1926dd36921eb04bdcde64 + +info: + name: > + Sync Post With Other Site <= 1.5.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c189bdcb-3b72-4e25-8444-6852444b89f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sync-post-with-other-site/" + google-query: inurl:"/wp-content/plugins/sync-post-with-other-site/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sync-post-with-other-site,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sync-post-with-other-site/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sync-post-with-other-site" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/sync-qcloud-cos-52c19ba3b4c4a4e86f87839bb901d71b.yaml b/nuclei-templates/cve-less/plugins/sync-qcloud-cos-52c19ba3b4c4a4e86f87839bb901d71b.yaml new file mode 100644 index 0000000000..2a95376d41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/sync-qcloud-cos-52c19ba3b4c4a4e86f87839bb901d71b.yaml @@ -0,0 +1,58 @@ +id: sync-qcloud-cos-52c19ba3b4c4a4e86f87839bb901d71b + +info: + name: > + Sync QCloud COS Plugin < 2.0.1 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5db41cdb-0795-43e7-bd36-9a85a882a760?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sync-qcloud-cos/" + google-query: inurl:"/wp-content/plugins/sync-qcloud-cos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sync-qcloud-cos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sync-qcloud-cos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sync-qcloud-cos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/syncee-for-suppliers-85d0c53e63bad002a594a7c01a2ede3c.yaml b/nuclei-templates/cve-less/plugins/syncee-for-suppliers-85d0c53e63bad002a594a7c01a2ede3c.yaml new file mode 100644 index 0000000000..9b4b84f7c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/syncee-for-suppliers-85d0c53e63bad002a594a7c01a2ede3c.yaml @@ -0,0 +1,58 @@ +id: syncee-for-suppliers-85d0c53e63bad002a594a7c01a2ede3c + +info: + name: > + Syncee for Suppliers <= 1.0.5 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3172e21-c2e4-4ec0-ad0f-4433303efcfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/syncee-for-suppliers/" + google-query: inurl:"/wp-content/plugins/syncee-for-suppliers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,syncee-for-suppliers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/syncee-for-suppliers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "syncee-for-suppliers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/syncee-global-dropshipping-d016ddea2985e3c1ec3f3ed31d67329b.yaml b/nuclei-templates/cve-less/plugins/syncee-global-dropshipping-d016ddea2985e3c1ec3f3ed31d67329b.yaml new file mode 100644 index 0000000000..6c72148231 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/syncee-global-dropshipping-d016ddea2985e3c1ec3f3ed31d67329b.yaml @@ -0,0 +1,58 @@ +id: syncee-global-dropshipping-d016ddea2985e3c1ec3f3ed31d67329b + +info: + name: > + Syncee – Global Dropshipping <= 1.0.9 - Missing Authorization. + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08511020-6129-4f55-a25e-7ed86efa721d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/syncee-global-dropshipping/" + google-query: inurl:"/wp-content/plugins/syncee-global-dropshipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,syncee-global-dropshipping,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/syncee-global-dropshipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "syncee-global-dropshipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/syndication-links-85ef6da03e1e6bb00fd985498d35a632.yaml b/nuclei-templates/cve-less/plugins/syndication-links-85ef6da03e1e6bb00fd985498d35a632.yaml new file mode 100644 index 0000000000..24379ecf65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/syndication-links-85ef6da03e1e6bb00fd985498d35a632.yaml @@ -0,0 +1,58 @@ +id: syndication-links-85ef6da03e1e6bb00fd985498d35a632 + +info: + name: > + Syndication Links < 1.0.3 - DOM-based Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5986c72-ae6d-4cd2-929d-fe2ff6462b4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/syndication-links/" + google-query: inurl:"/wp-content/plugins/syndication-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,syndication-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/syndication-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "syndication-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/syntaxhighlighter-527a854b5306cfe2112c84c3b74302ad.yaml b/nuclei-templates/cve-less/plugins/syntaxhighlighter-527a854b5306cfe2112c84c3b74302ad.yaml new file mode 100644 index 0000000000..f625a45eba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/syntaxhighlighter-527a854b5306cfe2112c84c3b74302ad.yaml @@ -0,0 +1,58 @@ +id: syntaxhighlighter-527a854b5306cfe2112c84c3b74302ad + +info: + name: > + SyntaxHighlighter Evolved < 3.5.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e94e39d3-61da-4adb-a89a-97cda4c9203d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/syntaxhighlighter/" + google-query: inurl:"/wp-content/plugins/syntaxhighlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,syntaxhighlighter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/syntaxhighlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "syntaxhighlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/syntaxhighlighter-860aeeaea687dc364b79673a2290695e.yaml b/nuclei-templates/cve-less/plugins/syntaxhighlighter-860aeeaea687dc364b79673a2290695e.yaml new file mode 100644 index 0000000000..63c971d6af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/syntaxhighlighter-860aeeaea687dc364b79673a2290695e.yaml @@ -0,0 +1,58 @@ +id: syntaxhighlighter-860aeeaea687dc364b79673a2290695e + +info: + name: > + SyntaxHighlighter Evolved <= 3.1.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6270944-31c0-4d6d-a23f-87fce37ff8b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/syntaxhighlighter/" + google-query: inurl:"/wp-content/plugins/syntaxhighlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,syntaxhighlighter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/syntaxhighlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "syntaxhighlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/synved-shortcodes-6c1c86676b3f6a00f366fd4021465d09.yaml b/nuclei-templates/cve-less/plugins/synved-shortcodes-6c1c86676b3f6a00f366fd4021465d09.yaml new file mode 100644 index 0000000000..3663bd91e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/synved-shortcodes-6c1c86676b3f6a00f366fd4021465d09.yaml @@ -0,0 +1,58 @@ +id: synved-shortcodes-6c1c86676b3f6a00f366fd4021465d09 + +info: + name: > + WordPress Shortcodes <= 1.6.36 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff2a14b1-8752-4edf-a807-88aab453451d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/synved-shortcodes/" + google-query: inurl:"/wp-content/plugins/synved-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,synved-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/synved-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "synved-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/system-dashboard-00f8b2060d8c742440ee6fd7c2090104.yaml b/nuclei-templates/cve-less/plugins/system-dashboard-00f8b2060d8c742440ee6fd7c2090104.yaml new file mode 100644 index 0000000000..44f094859e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/system-dashboard-00f8b2060d8c742440ee6fd7c2090104.yaml @@ -0,0 +1,58 @@ +id: system-dashboard-00f8b2060d8c742440ee6fd7c2090104 + +info: + name: > + System Dashboard <= 2.8.7 - Missing Authorization to Information Disclosure (sd_option_value) + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9d1a33b-2518-48f7-90b6-a94a34473d1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/system-dashboard/" + google-query: inurl:"/wp-content/plugins/system-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,system-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/system-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "system-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/system-dashboard-50be407197651ee72b3d338a1eac693d.yaml b/nuclei-templates/cve-less/plugins/system-dashboard-50be407197651ee72b3d338a1eac693d.yaml new file mode 100644 index 0000000000..d3dba5d8cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/system-dashboard-50be407197651ee72b3d338a1eac693d.yaml @@ -0,0 +1,58 @@ +id: system-dashboard-50be407197651ee72b3d338a1eac693d + +info: + name: > + System Dashboard <= 2.8.8 - Missing Authorization to Information Disclosure (sd_php_info) + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17bc3a9f-2bf9-44e3-81ef-bfa932085da9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/system-dashboard/" + google-query: inurl:"/wp-content/plugins/system-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,system-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/system-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "system-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/system-dashboard-6bb233f728b21686bbc5b5d256c952f1.yaml b/nuclei-templates/cve-less/plugins/system-dashboard-6bb233f728b21686bbc5b5d256c952f1.yaml new file mode 100644 index 0000000000..16d89b1a51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/system-dashboard-6bb233f728b21686bbc5b5d256c952f1.yaml @@ -0,0 +1,58 @@ +id: system-dashboard-6bb233f728b21686bbc5b5d256c952f1 + +info: + name: > + System Dashboard <= 2.8.7 - Missing Authorization to Information Disclosure (sd_db_specs) + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53b3ac83-847d-4bd0-a79b-531af266e1b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/system-dashboard/" + google-query: inurl:"/wp-content/plugins/system-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,system-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/system-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "system-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/system-dashboard-6d13564fb4f4f025b03f3bb2e7eff230.yaml b/nuclei-templates/cve-less/plugins/system-dashboard-6d13564fb4f4f025b03f3bb2e7eff230.yaml new file mode 100644 index 0000000000..9b9a7a0872 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/system-dashboard-6d13564fb4f4f025b03f3bb2e7eff230.yaml @@ -0,0 +1,58 @@ +id: system-dashboard-6d13564fb4f4f025b03f3bb2e7eff230 + +info: + name: > + System Dashboard <= 2.8.7 - Missing Authorization to Information Disclosure (sd_constants) + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f170379e-e833-42e0-96fd-1e1722a8331c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/system-dashboard/" + google-query: inurl:"/wp-content/plugins/system-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,system-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/system-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "system-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/system-dashboard-b60f7befa67eb443974e00d882b10881.yaml b/nuclei-templates/cve-less/plugins/system-dashboard-b60f7befa67eb443974e00d882b10881.yaml new file mode 100644 index 0000000000..fbd3412a6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/system-dashboard-b60f7befa67eb443974e00d882b10881.yaml @@ -0,0 +1,58 @@ +id: system-dashboard-b60f7befa67eb443974e00d882b10881 + +info: + name: > + System Dashboard <= 2.8.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b9e53e-d2d3-40a0-adba-f489343c6ee6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/system-dashboard/" + google-query: inurl:"/wp-content/plugins/system-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,system-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/system-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "system-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/system-dashboard-d08dba75a00314181a7ea312016fdabc.yaml b/nuclei-templates/cve-less/plugins/system-dashboard-d08dba75a00314181a7ea312016fdabc.yaml new file mode 100644 index 0000000000..10579c0ae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/system-dashboard-d08dba75a00314181a7ea312016fdabc.yaml @@ -0,0 +1,58 @@ +id: system-dashboard-d08dba75a00314181a7ea312016fdabc + +info: + name: > + System Dashboard <= 2.8.7 - Missing Authorization to Information Disclosure (sd_global_value) + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70f14d9d-6ed6-4bcb-944d-f9c5aa6a17a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/system-dashboard/" + google-query: inurl:"/wp-content/plugins/system-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,system-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/system-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "system-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tabbed-e8c1d3f10e1f58956d4fcfa9c811fff0.yaml b/nuclei-templates/cve-less/plugins/tabbed-e8c1d3f10e1f58956d4fcfa9c811fff0.yaml new file mode 100644 index 0000000000..d1013cfbe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tabbed-e8c1d3f10e1f58956d4fcfa9c811fff0.yaml @@ -0,0 +1,58 @@ +id: tabbed-e8c1d3f10e1f58956d4fcfa9c811fff0 + +info: + name: > + Tab – Accordion, FAQ < 1.3.2 - Unauthenticated Arbitrary Tab Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec002a5a-1965-4828-8a0a-19941af98e2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tabbed/" + google-query: inurl:"/wp-content/plugins/tabbed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tabbed,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tabbed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tabbed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/table-generator-fd97a9eb267d56f526d35e401fac2886.yaml b/nuclei-templates/cve-less/plugins/table-generator-fd97a9eb267d56f526d35e401fac2886.yaml new file mode 100644 index 0000000000..3495fdbbd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/table-generator-fd97a9eb267d56f526d35e401fac2886.yaml @@ -0,0 +1,58 @@ +id: table-generator-fd97a9eb267d56f526d35e401fac2886 + +info: + name: > + Table Generator <= 1.3.0 - Missing Authorization to Table Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/475ca301-32f2-4913-925c-369a9a4c83c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/table-generator/" + google-query: inurl:"/wp-content/plugins/table-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,table-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/table-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "table-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/table-of-contents-plus-59af9a4b87c64d3fc5a5f77eb6d682d2.yaml b/nuclei-templates/cve-less/plugins/table-of-contents-plus-59af9a4b87c64d3fc5a5f77eb6d682d2.yaml new file mode 100644 index 0000000000..10474000b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/table-of-contents-plus-59af9a4b87c64d3fc5a5f77eb6d682d2.yaml @@ -0,0 +1,58 @@ +id: table-of-contents-plus-59af9a4b87c64d3fc5a5f77eb6d682d2 + +info: + name: > + Table of Contents Plus <= 2302 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05206a31-033e-49b9-9b66-5a6165782643?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/table-of-contents-plus/" + google-query: inurl:"/wp-content/plugins/table-of-contents-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,table-of-contents-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/table-of-contents-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "table-of-contents-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2309') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/table-of-contents-plus-88443ca5df44ae2bdc297b09180bef0c.yaml b/nuclei-templates/cve-less/plugins/table-of-contents-plus-88443ca5df44ae2bdc297b09180bef0c.yaml new file mode 100644 index 0000000000..1f3455c04a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/table-of-contents-plus-88443ca5df44ae2bdc297b09180bef0c.yaml @@ -0,0 +1,58 @@ +id: table-of-contents-plus-88443ca5df44ae2bdc297b09180bef0c + +info: + name: > + Table of Contents Plus <= 2106 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e4c655c-9cdf-4106-9cf5-fc153de12d14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/table-of-contents-plus/" + google-query: inurl:"/wp-content/plugins/table-of-contents-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,table-of-contents-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/table-of-contents-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "table-of-contents-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2106') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/table-of-contents-plus-d17932e78accf27930222cbdfc82272b.yaml b/nuclei-templates/cve-less/plugins/table-of-contents-plus-d17932e78accf27930222cbdfc82272b.yaml new file mode 100644 index 0000000000..7813d25edf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/table-of-contents-plus-d17932e78accf27930222cbdfc82272b.yaml @@ -0,0 +1,58 @@ +id: table-of-contents-plus-d17932e78accf27930222cbdfc82272b + +info: + name: > + Table of Contents Plus <= 2302 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/624a3174-03fa-4a8e-9c02-5e24add92392?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/table-of-contents-plus/" + google-query: inurl:"/wp-content/plugins/table-of-contents-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,table-of-contents-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/table-of-contents-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "table-of-contents-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2302') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tablepress-289da9c0d14eee035f8071c1e92f71c3.yaml b/nuclei-templates/cve-less/plugins/tablepress-289da9c0d14eee035f8071c1e92f71c3.yaml new file mode 100644 index 0000000000..7705730010 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tablepress-289da9c0d14eee035f8071c1e92f71c3.yaml @@ -0,0 +1,58 @@ +id: tablepress-289da9c0d14eee035f8071c1e92f71c3 + +info: + name: > + TablePress <= 1.8 - XML External Entity Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5fcbb61-5f22-4333-bdd9-7d843dd7e45a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tablepress/" + google-query: inurl:"/wp-content/plugins/tablepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tablepress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tablepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tablepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tablepress-3fb1358d568dc8245a52a721b92fb318.yaml b/nuclei-templates/cve-less/plugins/tablepress-3fb1358d568dc8245a52a721b92fb318.yaml new file mode 100644 index 0000000000..d9bc07d01f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tablepress-3fb1358d568dc8245a52a721b92fb318.yaml @@ -0,0 +1,58 @@ +id: tablepress-3fb1358d568dc8245a52a721b92fb318 + +info: + name: > + TablePress <= 1.14 - Authenticated (Author+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24d14261-e295-4397-bad0-7a4b69b06908?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tablepress/" + google-query: inurl:"/wp-content/plugins/tablepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tablepress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tablepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tablepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tablepress-5d739fff0b557fdd4318a7044651d1e4.yaml b/nuclei-templates/cve-less/plugins/tablepress-5d739fff0b557fdd4318a7044651d1e4.yaml new file mode 100644 index 0000000000..261785d602 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tablepress-5d739fff0b557fdd4318a7044651d1e4.yaml @@ -0,0 +1,58 @@ +id: tablepress-5d739fff0b557fdd4318a7044651d1e4 + +info: + name: > + TablePress <= 2.2.4 - Authenticated(Author+) Server Side Request Forgery(SSRF) via _get_import_files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8de52b68-c273-4561-98b0-e51afd6cd47b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tablepress/" + google-query: inurl:"/wp-content/plugins/tablepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tablepress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tablepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tablepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tablesome-41bad327accd676bdd6230643f7e28a5.yaml b/nuclei-templates/cve-less/plugins/tablesome-41bad327accd676bdd6230643f7e28a5.yaml new file mode 100644 index 0000000000..19996c6cd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tablesome-41bad327accd676bdd6230643f7e28a5.yaml @@ -0,0 +1,58 @@ +id: tablesome-41bad327accd676bdd6230643f7e28a5 + +info: + name: > + Tablesome <= 1.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d769308-6273-4ed2-b64a-d9f065de4cce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tablesome/" + google-query: inurl:"/wp-content/plugins/tablesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tablesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tablesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tablesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tablesome-6d5a094525084991d10cf28cec2fcdc6.yaml b/nuclei-templates/cve-less/plugins/tablesome-6d5a094525084991d10cf28cec2fcdc6.yaml new file mode 100644 index 0000000000..610a8e46b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tablesome-6d5a094525084991d10cf28cec2fcdc6.yaml @@ -0,0 +1,58 @@ +id: tablesome-6d5a094525084991d10cf28cec2fcdc6 + +info: + name: > + Table & Contact Form 7 Database – Tablesome <= 1.0.27 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49cba28f-43dc-4947-b4bb-8556cc0409ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tablesome/" + google-query: inurl:"/wp-content/plugins/tablesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tablesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tablesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tablesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tablesome-918ad86e1bedc485af1c75c927ff2b30.yaml b/nuclei-templates/cve-less/plugins/tablesome-918ad86e1bedc485af1c75c927ff2b30.yaml new file mode 100644 index 0000000000..b279b04307 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tablesome-918ad86e1bedc485af1c75c927ff2b30.yaml @@ -0,0 +1,58 @@ +id: tablesome-918ad86e1bedc485af1c75c927ff2b30 + +info: + name: > + Table & Contact Form 7 Database – Tablesome <= 1.0.25 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9efb88e2-381f-4e26-80bb-1b034ffc1c91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tablesome/" + google-query: inurl:"/wp-content/plugins/tablesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tablesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tablesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tablesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tablesome-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tablesome-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..87dde77994 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tablesome-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tablesome-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tablesome/" + google-query: inurl:"/wp-content/plugins/tablesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tablesome,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tablesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tablesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taboola-7ecf6794fd0be35e81a6be54c3e6a722.yaml b/nuclei-templates/cve-less/plugins/taboola-7ecf6794fd0be35e81a6be54c3e6a722.yaml new file mode 100644 index 0000000000..9d09e66bbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taboola-7ecf6794fd0be35e81a6be54c3e6a722.yaml @@ -0,0 +1,58 @@ +id: taboola-7ecf6794fd0be35e81a6be54c3e6a722 + +info: + name: > + Taboola <= 2.0.1 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab015cb4-0b1e-40ff-ab9b-6c03eed3142f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taboola/" + google-query: inurl:"/wp-content/plugins/taboola/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taboola,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taboola/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taboola" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tabs-1aa0e79be369c61efc2c0807922659cb.yaml b/nuclei-templates/cve-less/plugins/tabs-1aa0e79be369c61efc2c0807922659cb.yaml new file mode 100644 index 0000000000..921410934d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tabs-1aa0e79be369c61efc2c0807922659cb.yaml @@ -0,0 +1,58 @@ +id: tabs-1aa0e79be369c61efc2c0807922659cb + +info: + name: > + Tabs & Accordion <= 1.3.10 - Authenticated (Contributor+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eaead805-b122-4418-a4a0-cf1b0925f3c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tabs/" + google-query: inurl:"/wp-content/plugins/tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tabs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tabs-pro-20d48d249a9d91a3d81b3c5c649e28eb.yaml b/nuclei-templates/cve-less/plugins/tabs-pro-20d48d249a9d91a3d81b3c5c649e28eb.yaml new file mode 100644 index 0000000000..9e40e30ae9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tabs-pro-20d48d249a9d91a3d81b3c5c649e28eb.yaml @@ -0,0 +1,58 @@ +id: tabs-pro-20d48d249a9d91a3d81b3c5c649e28eb + +info: + name: > + Tab Ultimate <= 1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08220b23-d6fa-4005-bbbb-019412d328a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tabs-pro/" + google-query: inurl:"/wp-content/plugins/tabs-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tabs-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tabs-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tabs-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tabs-responsive-f48a8e9c9fcbd8cc7a0d7249289e3206.yaml b/nuclei-templates/cve-less/plugins/tabs-responsive-f48a8e9c9fcbd8cc7a0d7249289e3206.yaml new file mode 100644 index 0000000000..e2ece9985e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tabs-responsive-f48a8e9c9fcbd8cc7a0d7249289e3206.yaml @@ -0,0 +1,58 @@ +id: tabs-responsive-f48a8e9c9fcbd8cc7a0d7249289e3206 + +info: + name: > + Tabs Responsive <= 2.2.7 - Editor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d95d8ca6-a36e-4d95-bce3-ead237dac938?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tabs-responsive/" + google-query: inurl:"/wp-content/plugins/tabs-responsive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tabs-responsive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tabs-responsive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tabs-responsive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tabs-shortcode-and-widget-713789bc3ffbd71b9430af55e34d0b0b.yaml b/nuclei-templates/cve-less/plugins/tabs-shortcode-and-widget-713789bc3ffbd71b9430af55e34d0b0b.yaml new file mode 100644 index 0000000000..604a3f2f01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tabs-shortcode-and-widget-713789bc3ffbd71b9430af55e34d0b0b.yaml @@ -0,0 +1,58 @@ +id: tabs-shortcode-and-widget-713789bc3ffbd71b9430af55e34d0b0b + +info: + name: > + Tabs Shortcode and Widget <= 1.17 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/459f6d68-ce52-4e63-8fd9-071ef517a3ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tabs-shortcode-and-widget/" + google-query: inurl:"/wp-content/plugins/tabs-shortcode-and-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tabs-shortcode-and-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tabs-shortcode-and-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tabs-shortcode-and-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tabs-with-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tabs-with-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..af5ea1cd4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tabs-with-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tabs-with-posts-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tabs-with-posts/" + google-query: inurl:"/wp-content/plugins/tabs-with-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tabs-with-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tabs-with-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tabs-with-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tag-groups-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tag-groups-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ce86158a12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tag-groups-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tag-groups-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tag-groups/" + google-query: inurl:"/wp-content/plugins/tag-groups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tag-groups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tag-groups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tag-groups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.43.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tagembed-widget-9ebf12f531ac825152bdbeecae0483e1.yaml b/nuclei-templates/cve-less/plugins/tagembed-widget-9ebf12f531ac825152bdbeecae0483e1.yaml new file mode 100644 index 0000000000..3d4a47d0d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tagembed-widget-9ebf12f531ac825152bdbeecae0483e1.yaml @@ -0,0 +1,58 @@ +id: tagembed-widget-9ebf12f531ac825152bdbeecae0483e1 + +info: + name: > + Tagembed: Embed Twitter Feed, Google Reviews, YouTube Videos, TikTok, RSS Feed & More Social Media Feeds <= 4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc6ed7d3-7a57-4146-997b-96d4a9063214?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tagembed-widget/" + google-query: inurl:"/wp-content/plugins/tagembed-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tagembed-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tagembed-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tagembed-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taggator-7066a02b08506808c19c2698c3c5e512.yaml b/nuclei-templates/cve-less/plugins/taggator-7066a02b08506808c19c2698c3c5e512.yaml new file mode 100644 index 0000000000..203781ae89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taggator-7066a02b08506808c19c2698c3c5e512.yaml @@ -0,0 +1,58 @@ +id: taggator-7066a02b08506808c19c2698c3c5e512 + +info: + name: > + TagGator Plugin < 1.33 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21e4b1fe-993b-4898-a523-e0a858c30a38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taggator/" + google-query: inurl:"/wp-content/plugins/taggator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taggator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taggator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taggator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taggbox-widget-3d53b8857bb0bf4f709b612366ce52ba.yaml b/nuclei-templates/cve-less/plugins/taggbox-widget-3d53b8857bb0bf4f709b612366ce52ba.yaml new file mode 100644 index 0000000000..cce70a152d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taggbox-widget-3d53b8857bb0bf4f709b612366ce52ba.yaml @@ -0,0 +1,58 @@ +id: taggbox-widget-3d53b8857bb0bf4f709b612366ce52ba + +info: + name: > + Taggbox <= 3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a27253d-bfc1-40b5-9da4-d16cc403ad41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taggbox-widget/" + google-query: inurl:"/wp-content/plugins/taggbox-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taggbox-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taggbox-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taggbox-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taggbox-widget-460e4d77e94c99909f00493d8717ec60.yaml b/nuclei-templates/cve-less/plugins/taggbox-widget-460e4d77e94c99909f00493d8717ec60.yaml new file mode 100644 index 0000000000..d2e8cf64df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taggbox-widget-460e4d77e94c99909f00493d8717ec60.yaml @@ -0,0 +1,58 @@ +id: taggbox-widget-460e4d77e94c99909f00493d8717ec60 + +info: + name: > + Tagbox – UGC Galleries, Social Media Widgets, User Reviews & Analytics <= 3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/237fcdb7-aef9-4d35-baf4-7d382e8b7f3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taggbox-widget/" + google-query: inurl:"/wp-content/plugins/taggbox-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taggbox-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taggbox-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taggbox-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taggbox-widget-8984d8e2e14f0b49968f909a1d35ae5c.yaml b/nuclei-templates/cve-less/plugins/taggbox-widget-8984d8e2e14f0b49968f909a1d35ae5c.yaml new file mode 100644 index 0000000000..a6d556292e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taggbox-widget-8984d8e2e14f0b49968f909a1d35ae5c.yaml @@ -0,0 +1,58 @@ +id: taggbox-widget-8984d8e2e14f0b49968f909a1d35ae5c + +info: + name: > + Taggbox <= 3.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cae6e8b9-a8a9-41d3-83e8-d833515a0244?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taggbox-widget/" + google-query: inurl:"/wp-content/plugins/taggbox-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taggbox-widget,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taggbox-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taggbox-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taggbox-widget-8d570fcab536c9b0d9a14e0fe3f1fda7.yaml b/nuclei-templates/cve-less/plugins/taggbox-widget-8d570fcab536c9b0d9a14e0fe3f1fda7.yaml new file mode 100644 index 0000000000..8836b5469f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taggbox-widget-8d570fcab536c9b0d9a14e0fe3f1fda7.yaml @@ -0,0 +1,58 @@ +id: taggbox-widget-8d570fcab536c9b0d9a14e0fe3f1fda7 + +info: + name: > + Taggbox <= 3.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d970a9f6-69f6-42d2-b863-82b8110e52c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taggbox-widget/" + google-query: inurl:"/wp-content/plugins/taggbox-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taggbox-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taggbox-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taggbox-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tagregator-42f689e89098e402a672dac5ec8f6c89.yaml b/nuclei-templates/cve-less/plugins/tagregator-42f689e89098e402a672dac5ec8f6c89.yaml new file mode 100644 index 0000000000..11e1b7c07d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tagregator-42f689e89098e402a672dac5ec8f6c89.yaml @@ -0,0 +1,58 @@ +id: tagregator-42f689e89098e402a672dac5ec8f6c89 + +info: + name: > + Tagregator <= 0.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84366708-9dcc-4f34-b1b5-7d956e3801af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tagregator/" + google-query: inurl:"/wp-content/plugins/tagregator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tagregator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tagregator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tagregator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tags-cloud-manager-582f95ad25f63ca7cc5ef7bcd4bbcf92.yaml b/nuclei-templates/cve-less/plugins/tags-cloud-manager-582f95ad25f63ca7cc5ef7bcd4bbcf92.yaml new file mode 100644 index 0000000000..bc8eb0a12d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tags-cloud-manager-582f95ad25f63ca7cc5ef7bcd4bbcf92.yaml @@ -0,0 +1,58 @@ +id: tags-cloud-manager-582f95ad25f63ca7cc5ef7bcd4bbcf92 + +info: + name: > + Tags Cloud Manager <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ad70391-7ea0-49c0-ac5c-ecf7ddb3c948?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tags-cloud-manager/" + google-query: inurl:"/wp-content/plugins/tags-cloud-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tags-cloud-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tags-cloud-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tags-cloud-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tainacan-8e6b1c0313de5c2d10a529693b2cd5e4.yaml b/nuclei-templates/cve-less/plugins/tainacan-8e6b1c0313de5c2d10a529693b2cd5e4.yaml new file mode 100644 index 0000000000..3eb51bc610 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tainacan-8e6b1c0313de5c2d10a529693b2cd5e4.yaml @@ -0,0 +1,58 @@ +id: tainacan-8e6b1c0313de5c2d10a529693b2cd5e4 + +info: + name: > + Tainacan <= 0.20.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70da8039-6526-47fa-934d-53fa29ca1bf0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tainacan/" + google-query: inurl:"/wp-content/plugins/tainacan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tainacan,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tainacan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tainacan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.20.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tainacan-9361c5082e0aaebe13dacdb499fc4e4b.yaml b/nuclei-templates/cve-less/plugins/tainacan-9361c5082e0aaebe13dacdb499fc4e4b.yaml new file mode 100644 index 0000000000..2264f8c3c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tainacan-9361c5082e0aaebe13dacdb499fc4e4b.yaml @@ -0,0 +1,58 @@ +id: tainacan-9361c5082e0aaebe13dacdb499fc4e4b + +info: + name: > + Tainacan <= 0.20.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f192811-378b-422d-8086-9a957b464bb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tainacan/" + google-query: inurl:"/wp-content/plugins/tainacan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tainacan,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tainacan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tainacan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.20.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tainacan-b7c02268f4f394ae79b51e80494204b3.yaml b/nuclei-templates/cve-less/plugins/tainacan-b7c02268f4f394ae79b51e80494204b3.yaml new file mode 100644 index 0000000000..93ad95d662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tainacan-b7c02268f4f394ae79b51e80494204b3.yaml @@ -0,0 +1,58 @@ +id: tainacan-b7c02268f4f394ae79b51e80494204b3 + +info: + name: > + Tainacan <= 0.18.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2131e418-bd95-4bd1-868f-0bd3b4abdf78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tainacan/" + google-query: inurl:"/wp-content/plugins/tainacan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tainacan,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tainacan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tainacan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.18.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tainacan-bec9a874ffcaa5ff9d2f46a18b295cfb.yaml b/nuclei-templates/cve-less/plugins/tainacan-bec9a874ffcaa5ff9d2f46a18b295cfb.yaml new file mode 100644 index 0000000000..6f2426785e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tainacan-bec9a874ffcaa5ff9d2f46a18b295cfb.yaml @@ -0,0 +1,58 @@ +id: tainacan-bec9a874ffcaa5ff9d2f46a18b295cfb + +info: + name: > + Tainacan <= 0.20.6 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db4b6c65-f6e2-46de-81d7-a31541d0a67a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tainacan/" + google-query: inurl:"/wp-content/plugins/tainacan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tainacan,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tainacan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tainacan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.20.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tajer-30f1777054f2ffb243b10c5c1e00bdab.yaml b/nuclei-templates/cve-less/plugins/tajer-30f1777054f2ffb243b10c5c1e00bdab.yaml new file mode 100644 index 0000000000..cfab780a52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tajer-30f1777054f2ffb243b10c5c1e00bdab.yaml @@ -0,0 +1,58 @@ +id: tajer-30f1777054f2ffb243b10c5c1e00bdab + +info: + name: > + Tajer <= 1.0.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e9c5e89-9ead-477b-980b-9e48969ad0cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tajer/" + google-query: inurl:"/wp-content/plugins/tajer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tajer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tajer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tajer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tallykit-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/tallykit-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..c19e878f05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tallykit-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: tallykit-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tallykit/" + google-query: inurl:"/wp-content/plugins/tallykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tallykit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tallykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tallykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tapfiliate-0bb4c4e55d3bd7066abf4b3e5c409eb3.yaml b/nuclei-templates/cve-less/plugins/tapfiliate-0bb4c4e55d3bd7066abf4b3e5c409eb3.yaml new file mode 100644 index 0000000000..6581e9f80b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tapfiliate-0bb4c4e55d3bd7066abf4b3e5c409eb3.yaml @@ -0,0 +1,58 @@ +id: tapfiliate-0bb4c4e55d3bd7066abf4b3e5c409eb3 + +info: + name: > + Tapfiliate <= 3.0.12 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a472e78c-ebd7-4ab8-9b47-96c526754387?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tapfiliate/" + google-query: inurl:"/wp-content/plugins/tapfiliate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tapfiliate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tapfiliate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tapfiliate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tarteaucitronjs-7493b4e361e65fc33d302e9a8676eef5.yaml b/nuclei-templates/cve-less/plugins/tarteaucitronjs-7493b4e361e65fc33d302e9a8676eef5.yaml new file mode 100644 index 0000000000..d391938f12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tarteaucitronjs-7493b4e361e65fc33d302e9a8676eef5.yaml @@ -0,0 +1,58 @@ +id: tarteaucitronjs-7493b4e361e65fc33d302e9a8676eef5 + +info: + name: > + tarteaucitron.js – Cookies legislation & GDPR <= 1.5.4 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e28f0ff6-eee3-45bb-be7e-91e2349a91d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tarteaucitronjs/" + google-query: inurl:"/wp-content/plugins/tarteaucitronjs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tarteaucitronjs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tarteaucitronjs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tarteaucitronjs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tarteaucitronjs-cdde9db33caece636f624a4e888cbf55.yaml b/nuclei-templates/cve-less/plugins/tarteaucitronjs-cdde9db33caece636f624a4e888cbf55.yaml new file mode 100644 index 0000000000..134592cb34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tarteaucitronjs-cdde9db33caece636f624a4e888cbf55.yaml @@ -0,0 +1,58 @@ +id: tarteaucitronjs-cdde9db33caece636f624a4e888cbf55 + +info: + name: > + tarteaucitron.js – Cookies legislation & GDPR (WordPress plugin) <= 1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a832cd41-c7be-43b5-bee3-4489170cad79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tarteaucitronjs/" + google-query: inurl:"/wp-content/plugins/tarteaucitronjs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tarteaucitronjs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tarteaucitronjs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tarteaucitronjs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/task-manager-pro-3c71f53ddfca3bc25fb132db1aac667a.yaml b/nuclei-templates/cve-less/plugins/task-manager-pro-3c71f53ddfca3bc25fb132db1aac667a.yaml new file mode 100644 index 0000000000..786e76a8c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/task-manager-pro-3c71f53ddfca3bc25fb132db1aac667a.yaml @@ -0,0 +1,58 @@ +id: task-manager-pro-3c71f53ddfca3bc25fb132db1aac667a + +info: + name: > + Task Manager Pro <= 1.3.1 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa6b63bc-6e5f-498e-83e1-45e8e6c72df4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/task-manager-pro/" + google-query: inurl:"/wp-content/plugins/task-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,task-manager-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/task-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "task-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/task-manager-pro-4c984e9d1c9a129101e93a0ae80c8a9c.yaml b/nuclei-templates/cve-less/plugins/task-manager-pro-4c984e9d1c9a129101e93a0ae80c8a9c.yaml new file mode 100644 index 0000000000..3bf2745097 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/task-manager-pro-4c984e9d1c9a129101e93a0ae80c8a9c.yaml @@ -0,0 +1,58 @@ +id: task-manager-pro-4c984e9d1c9a129101e93a0ae80c8a9c + +info: + name: > + Task Manager Pro <= 1.3.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/642400f6-9579-4065-a5a5-6fec23131778?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/task-manager-pro/" + google-query: inurl:"/wp-content/plugins/task-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,task-manager-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/task-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "task-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/task-manager-pro-fb6f222be4d39ed80f59f3fdd0187537.yaml b/nuclei-templates/cve-less/plugins/task-manager-pro-fb6f222be4d39ed80f59f3fdd0187537.yaml new file mode 100644 index 0000000000..75aea0c484 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/task-manager-pro-fb6f222be4d39ed80f59f3fdd0187537.yaml @@ -0,0 +1,58 @@ +id: task-manager-pro-fb6f222be4d39ed80f59f3fdd0187537 + +info: + name: > + Task Manager Pro <= 1.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b7c7416-16fb-4daf-8cc2-96571e1e24b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/task-manager-pro/" + google-query: inurl:"/wp-content/plugins/task-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,task-manager-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/task-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "task-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/task-scheduler-49f7af60a7d6ca8e6785ad7873768f2a.yaml b/nuclei-templates/cve-less/plugins/task-scheduler-49f7af60a7d6ca8e6785ad7873768f2a.yaml new file mode 100644 index 0000000000..e1d1a64f1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/task-scheduler-49f7af60a7d6ca8e6785ad7873768f2a.yaml @@ -0,0 +1,58 @@ +id: task-scheduler-49f7af60a7d6ca8e6785ad7873768f2a + +info: + name: > + JQueryFileTree <= 2.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f20352f-386f-45ab-b719-8a70f5c11b02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/task-scheduler/" + google-query: inurl:"/wp-content/plugins/task-scheduler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,task-scheduler,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/task-scheduler/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "task-scheduler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taskbuilder-aa1aed011557ee5dc2bfa06501123a9e.yaml b/nuclei-templates/cve-less/plugins/taskbuilder-aa1aed011557ee5dc2bfa06501123a9e.yaml new file mode 100644 index 0000000000..0dd817974c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taskbuilder-aa1aed011557ee5dc2bfa06501123a9e.yaml @@ -0,0 +1,58 @@ +id: taskbuilder-aa1aed011557ee5dc2bfa06501123a9e + +info: + name: > + Taskbuilder <= 1.0.7 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0eb875d6-03ff-441e-9a4e-69aa577c8587?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taskbuilder/" + google-query: inurl:"/wp-content/plugins/taskbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taskbuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taskbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taskbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tatsu-fbd8ecc6dba160d0b0ce8ccb8069b0ff.yaml b/nuclei-templates/cve-less/plugins/tatsu-fbd8ecc6dba160d0b0ce8ccb8069b0ff.yaml new file mode 100644 index 0000000000..9ad397fb63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tatsu-fbd8ecc6dba160d0b0ce8ccb8069b0ff.yaml @@ -0,0 +1,58 @@ +id: tatsu-fbd8ecc6dba160d0b0ce8ccb8069b0ff + +info: + name: > + Tatsu <= 3.3.12 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77ebd648-3851-47ea-a5eb-86af4899727c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tatsu/" + google-query: inurl:"/wp-content/plugins/tatsu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tatsu,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tatsu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tatsu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tawkto-live-chat-21ae3b1c550108707903a2e1d2b50e39.yaml b/nuclei-templates/cve-less/plugins/tawkto-live-chat-21ae3b1c550108707903a2e1d2b50e39.yaml new file mode 100644 index 0000000000..d2003d28b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tawkto-live-chat-21ae3b1c550108707903a2e1d2b50e39.yaml @@ -0,0 +1,58 @@ +id: tawkto-live-chat-21ae3b1c550108707903a2e1d2b50e39 + +info: + name: > + Tawk.To Live Chat <= 0.5.4 - Missing Authorization to Visitor Monitoring & Chat Removal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c3ee9fa-5d66-4f84-818f-ceec2f0c0b96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tawkto-live-chat/" + google-query: inurl:"/wp-content/plugins/tawkto-live-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tawkto-live-chat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tawkto-live-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tawkto-live-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tax-rate-upload-65ee5bf735571153b550ec180d2f83b7.yaml b/nuclei-templates/cve-less/plugins/tax-rate-upload-65ee5bf735571153b550ec180d2f83b7.yaml new file mode 100644 index 0000000000..db78b468b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tax-rate-upload-65ee5bf735571153b550ec180d2f83b7.yaml @@ -0,0 +1,58 @@ +id: tax-rate-upload-65ee5bf735571153b550ec180d2f83b7 + +info: + name: > + Tax Rate Upload <= 2.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bddbbcdf-dfcb-47dd-97e7-8563eaf70cbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tax-rate-upload/" + google-query: inurl:"/wp-content/plugins/tax-rate-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tax-rate-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tax-rate-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tax-rate-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tax-rate-upload-9b43aaab2dbac6c310bbe5db0693f0ed.yaml b/nuclei-templates/cve-less/plugins/tax-rate-upload-9b43aaab2dbac6c310bbe5db0693f0ed.yaml new file mode 100644 index 0000000000..c01953bae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tax-rate-upload-9b43aaab2dbac6c310bbe5db0693f0ed.yaml @@ -0,0 +1,58 @@ +id: tax-rate-upload-9b43aaab2dbac6c310bbe5db0693f0ed + +info: + name: > + Tax Rate Upload <= 2.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e54b0294-6829-493f-b7d3-6349000c249c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tax-rate-upload/" + google-query: inurl:"/wp-content/plugins/tax-rate-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tax-rate-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tax-rate-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tax-rate-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taxonomy-filter-f3d2115fb9f146bc796a9f84dc975747.yaml b/nuclei-templates/cve-less/plugins/taxonomy-filter-f3d2115fb9f146bc796a9f84dc975747.yaml new file mode 100644 index 0000000000..66487a2d05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taxonomy-filter-f3d2115fb9f146bc796a9f84dc975747.yaml @@ -0,0 +1,58 @@ +id: taxonomy-filter-f3d2115fb9f146bc796a9f84dc975747 + +info: + name: > + Taxonomy filter <= 2.2.9 - Cross-Site Request Forgery via taxonomy_filter_save_main_settings() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e74ff260-48af-4fc2-80d8-1ff2403f8f33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taxonomy-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taxonomy-switcher-6295a7a546ef764d879b794c2aebb334.yaml b/nuclei-templates/cve-less/plugins/taxonomy-switcher-6295a7a546ef764d879b794c2aebb334.yaml new file mode 100644 index 0000000000..1ab2578d5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taxonomy-switcher-6295a7a546ef764d879b794c2aebb334.yaml @@ -0,0 +1,58 @@ +id: taxonomy-switcher-6295a7a546ef764d879b794c2aebb334 + +info: + name: > + Taxonomy Switcher <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f7edb22-1441-4cac-9899-cd27dc313870?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taxonomy-switcher/" + google-query: inurl:"/wp-content/plugins/taxonomy-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taxonomy-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taxonomy-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taxonomy-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taxonomy-terms-order-c638d03db9f642ea8657e9efadb89fe3.yaml b/nuclei-templates/cve-less/plugins/taxonomy-terms-order-c638d03db9f642ea8657e9efadb89fe3.yaml new file mode 100644 index 0000000000..e62636a9b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taxonomy-terms-order-c638d03db9f642ea8657e9efadb89fe3.yaml @@ -0,0 +1,58 @@ +id: taxonomy-terms-order-c638d03db9f642ea8657e9efadb89fe3 + +info: + name: > + Category Order and Taxonomy Terms Order <= 1.5.2.2 - Authenticated PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe7e6a53-36c3-41fc-bae8-a9e1de2494ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taxonomy-terms-order/" + google-query: inurl:"/wp-content/plugins/taxonomy-terms-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taxonomy-terms-order,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taxonomy-terms-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taxonomy-terms-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/taxonomy-terms-order-f5ae27bdecf9c7ab3666827aa6121937.yaml b/nuclei-templates/cve-less/plugins/taxonomy-terms-order-f5ae27bdecf9c7ab3666827aa6121937.yaml new file mode 100644 index 0000000000..ce5a245616 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/taxonomy-terms-order-f5ae27bdecf9c7ab3666827aa6121937.yaml @@ -0,0 +1,58 @@ +id: taxonomy-terms-order-f5ae27bdecf9c7ab3666827aa6121937 + +info: + name: > + Category Order and Taxonomy Terms Order <1.4.6.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5e66244-2b86-491b-9eca-19e42e7f2da8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/taxonomy-terms-order/" + google-query: inurl:"/wp-content/plugins/taxonomy-terms-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,taxonomy-terms-order,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/taxonomy-terms-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "taxonomy-terms-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tc-custom-javascript-03ddcc1c34e43981b71842dcf356a652.yaml b/nuclei-templates/cve-less/plugins/tc-custom-javascript-03ddcc1c34e43981b71842dcf356a652.yaml new file mode 100644 index 0000000000..ec70eb81e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tc-custom-javascript-03ddcc1c34e43981b71842dcf356a652.yaml @@ -0,0 +1,58 @@ +id: tc-custom-javascript-03ddcc1c34e43981b71842dcf356a652 + +info: + name: > + TC Custom JavaScript <= 1.2.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5574f8ab-74b7-4f6c-b8db-901cb6e45cfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tc-custom-javascript/" + google-query: inurl:"/wp-content/plugins/tc-custom-javascript/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tc-custom-javascript,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tc-custom-javascript/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tc-custom-javascript" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tc-team-members-7cd66621baa98ee6c1094c3629ee5b9c.yaml b/nuclei-templates/cve-less/plugins/tc-team-members-7cd66621baa98ee6c1094c3629ee5b9c.yaml new file mode 100644 index 0000000000..a57405ac91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tc-team-members-7cd66621baa98ee6c1094c3629ee5b9c.yaml @@ -0,0 +1,58 @@ +id: tc-team-members-7cd66621baa98ee6c1094c3629ee5b9c + +info: + name: > + Team Members <= 5.0.3 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e5143f2-6641-4ae3-baa1-e5b83d784799?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tc-team-members/" + google-query: inurl:"/wp-content/plugins/tc-team-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tc-team-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tc-team-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tc-team-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tcd-google-maps-91e768f9e801d14e24ca5019cd490f0a.yaml b/nuclei-templates/cve-less/plugins/tcd-google-maps-91e768f9e801d14e24ca5019cd490f0a.yaml new file mode 100644 index 0000000000..4fd4db7450 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tcd-google-maps-91e768f9e801d14e24ca5019cd490f0a.yaml @@ -0,0 +1,58 @@ +id: tcd-google-maps-91e768f9e801d14e24ca5019cd490f0a + +info: + name: > + TCD Google Maps <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50f6d0aa-059d-48d9-873b-6404f288f002?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tcd-google-maps/" + google-query: inurl:"/wp-content/plugins/tcd-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tcd-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tcd-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tcd-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tcs3-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/tcs3-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..53145e188e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tcs3-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: tcs3-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tcs3/" + google-query: inurl:"/wp-content/plugins/tcs3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tcs3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tcs3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tcs3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/td-cloud-library-e9eec5a929c2311a5540a7010e91443f.yaml b/nuclei-templates/cve-less/plugins/td-cloud-library-e9eec5a929c2311a5540a7010e91443f.yaml new file mode 100644 index 0000000000..ae9de1ef5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/td-cloud-library-e9eec5a929c2311a5540a7010e91443f.yaml @@ -0,0 +1,58 @@ +id: td-cloud-library-e9eec5a929c2311a5540a7010e91443f + +info: + name: > + tagDiv Cloud Library < 2.7 - Missing Authorization to Arbitrary User Metadata Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24e8d1a4-9853-4f60-a371-7fdbe86d554b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/td-cloud-library/" + google-query: inurl:"/wp-content/plugins/td-cloud-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,td-cloud-library,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/td-cloud-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "td-cloud-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/td-composer-01793590016afb66f5a418a945e41a09.yaml b/nuclei-templates/cve-less/plugins/td-composer-01793590016afb66f5a418a945e41a09.yaml new file mode 100644 index 0000000000..002bc631e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/td-composer-01793590016afb66f5a418a945e41a09.yaml @@ -0,0 +1,58 @@ +id: td-composer-01793590016afb66f5a418a945e41a09 + +info: + name: > + tagDiv Composer <= 4.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3861f675-1a26-4947-91ef-8ab04646704f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/td-composer/" + google-query: inurl:"/wp-content/plugins/td-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,td-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/td-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "td-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/td-composer-0a8a5d2ceeee68cf5d8ceb172875b32d.yaml b/nuclei-templates/cve-less/plugins/td-composer-0a8a5d2ceeee68cf5d8ceb172875b32d.yaml new file mode 100644 index 0000000000..e19cdd34a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/td-composer-0a8a5d2ceeee68cf5d8ceb172875b32d.yaml @@ -0,0 +1,58 @@ +id: td-composer-0a8a5d2ceeee68cf5d8ceb172875b32d + +info: + name: > + tagDiv Composer < 4.4 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/199d3a1f-bfde-4081-bb68-ebb6f9d360b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/td-composer/" + google-query: inurl:"/wp-content/plugins/td-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,td-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/td-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "td-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/td-composer-5795df5f8da9d7d45bd34eff74cbbef7.yaml b/nuclei-templates/cve-less/plugins/td-composer-5795df5f8da9d7d45bd34eff74cbbef7.yaml new file mode 100644 index 0000000000..6aaf11d19e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/td-composer-5795df5f8da9d7d45bd34eff74cbbef7.yaml @@ -0,0 +1,58 @@ +id: td-composer-5795df5f8da9d7d45bd34eff74cbbef7 + +info: + name: > + tagDiv Composer <= 4.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6998cf4c-6086-402b-a95f-ee6a4980dffb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/td-composer/" + google-query: inurl:"/wp-content/plugins/td-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,td-composer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/td-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "td-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/td-composer-b10d497d51d23e43935beff2259b9524.yaml b/nuclei-templates/cve-less/plugins/td-composer-b10d497d51d23e43935beff2259b9524.yaml new file mode 100644 index 0000000000..72bc279ab2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/td-composer-b10d497d51d23e43935beff2259b9524.yaml @@ -0,0 +1,58 @@ +id: td-composer-b10d497d51d23e43935beff2259b9524 + +info: + name: > + tagDiv Composer < 4.0 - Reflected Cross-Site Scripting via ‘td_video_url’ + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/372f4908-8796-4a52-8346-bd0eb1e41adc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/td-composer/" + google-query: inurl:"/wp-content/plugins/td-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,td-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/td-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "td-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/td-composer-bff7cd3ae66179edd6f79145d30bd8a6.yaml b/nuclei-templates/cve-less/plugins/td-composer-bff7cd3ae66179edd6f79145d30bd8a6.yaml new file mode 100644 index 0000000000..9817b4d885 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/td-composer-bff7cd3ae66179edd6f79145d30bd8a6.yaml @@ -0,0 +1,58 @@ +id: td-composer-bff7cd3ae66179edd6f79145d30bd8a6 + +info: + name: > + tagDiv Composer < 3.5 - Unauthorized Account Access and Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8347b4e-a5ba-49c5-9ae6-690a1a5c9aac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/td-composer/" + google-query: inurl:"/wp-content/plugins/td-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,td-composer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/td-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "td-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tdo-mini-forms-506c24db7cc3a5984423e257c1b75a3b.yaml b/nuclei-templates/cve-less/plugins/tdo-mini-forms-506c24db7cc3a5984423e257c1b75a3b.yaml new file mode 100644 index 0000000000..bf6c1ffa17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tdo-mini-forms-506c24db7cc3a5984423e257c1b75a3b.yaml @@ -0,0 +1,58 @@ +id: tdo-mini-forms-506c24db7cc3a5984423e257c1b75a3b + +info: + name: > + TDO Mini Forms <= 0.13.9 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c6be4e1-1b24-4a95-a6fd-3196f47796a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tdo-mini-forms/" + google-query: inurl:"/wp-content/plugins/tdo-mini-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tdo-mini-forms,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tdo-mini-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tdo-mini-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.13.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/teachpress-0e20035daf500b66ef66815e5fae94f5.yaml b/nuclei-templates/cve-less/plugins/teachpress-0e20035daf500b66ef66815e5fae94f5.yaml new file mode 100644 index 0000000000..61c153cce7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/teachpress-0e20035daf500b66ef66815e5fae94f5.yaml @@ -0,0 +1,58 @@ +id: teachpress-0e20035daf500b66ef66815e5fae94f5 + +info: + name: > + teachPress <= 9.0.5 - Cross-Site Request Forgery via delete_database() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3544357f-97c9-49cb-a48d-74b60480111d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/teachpress/" + google-query: inurl:"/wp-content/plugins/teachpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,teachpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/teachpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "teachpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/teachpress-2eaa08a72f8ffd2eb931a796cf5157f4.yaml b/nuclei-templates/cve-less/plugins/teachpress-2eaa08a72f8ffd2eb931a796cf5157f4.yaml new file mode 100644 index 0000000000..54ef4957bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/teachpress-2eaa08a72f8ffd2eb931a796cf5157f4.yaml @@ -0,0 +1,58 @@ +id: teachpress-2eaa08a72f8ffd2eb931a796cf5157f4 + +info: + name: > + teachPress <= 9.0.2 - Reflected Cross-Site Scripting via meta_field_id and cite_id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a33cc275-aa0d-4b8b-863a-6a32fac37512?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/teachpress/" + google-query: inurl:"/wp-content/plugins/teachpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,teachpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/teachpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "teachpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/teachpress-3b16719dacbde5289812e70a9eb8dc52.yaml b/nuclei-templates/cve-less/plugins/teachpress-3b16719dacbde5289812e70a9eb8dc52.yaml new file mode 100644 index 0000000000..5d8bc32b92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/teachpress-3b16719dacbde5289812e70a9eb8dc52.yaml @@ -0,0 +1,58 @@ +id: teachpress-3b16719dacbde5289812e70a9eb8dc52 + +info: + name: > + teachPress <= 8.1.8 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68774d9c-7abc-416d-8ab9-2713a1bad377?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/teachpress/" + google-query: inurl:"/wp-content/plugins/teachpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,teachpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/teachpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "teachpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/teachpress-9c5b70c021deba50a223641e7218d917.yaml b/nuclei-templates/cve-less/plugins/teachpress-9c5b70c021deba50a223641e7218d917.yaml new file mode 100644 index 0000000000..5435e99686 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/teachpress-9c5b70c021deba50a223641e7218d917.yaml @@ -0,0 +1,58 @@ +id: teachpress-9c5b70c021deba50a223641e7218d917 + +info: + name: > + teachPress <= 9.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9956e04c-ff59-40c0-a8ab-3e2ed2c52d7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/teachpress/" + google-query: inurl:"/wp-content/plugins/teachpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,teachpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/teachpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "teachpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-005741c51584101e42f20f4a09530ec1.yaml b/nuclei-templates/cve-less/plugins/team-005741c51584101e42f20f4a09530ec1.yaml new file mode 100644 index 0000000000..77a0135cb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-005741c51584101e42f20f4a09530ec1.yaml @@ -0,0 +1,58 @@ +id: team-005741c51584101e42f20f4a09530ec1 + +info: + name: > + Team Showcase <= 1.22.15 - Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1da8894c-fd19-4ea1-9c05-e519c0131061?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team/" + google-query: inurl:"/wp-content/plugins/team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-1d181af5ec91b0160f1b6df2779bb251.yaml b/nuclei-templates/cve-less/plugins/team-1d181af5ec91b0160f1b6df2779bb251.yaml new file mode 100644 index 0000000000..3dcc562632 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-1d181af5ec91b0160f1b6df2779bb251.yaml @@ -0,0 +1,58 @@ +id: team-1d181af5ec91b0160f1b6df2779bb251 + +info: + name: > + Team Showcase <= 1.22.15 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9013e816-1f5c-48cc-b79b-37cd9a75c2f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team/" + google-query: inurl:"/wp-content/plugins/team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-b569d36710f81ad9bca4fdee9649f13c.yaml b/nuclei-templates/cve-less/plugins/team-b569d36710f81ad9bca4fdee9649f13c.yaml new file mode 100644 index 0000000000..b132e00164 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-b569d36710f81ad9bca4fdee9649f13c.yaml @@ -0,0 +1,58 @@ +id: team-b569d36710f81ad9bca4fdee9649f13c + +info: + name: > + Team Showcase <= 1.22.15 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52bb3328-956c-4379-879a-d321d68c39ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team/" + google-query: inurl:"/wp-content/plugins/team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-d26cb33300448e8878b411d58432ae7f.yaml b/nuclei-templates/cve-less/plugins/team-d26cb33300448e8878b411d58432ae7f.yaml new file mode 100644 index 0000000000..988f81a6e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-d26cb33300448e8878b411d58432ae7f.yaml @@ -0,0 +1,58 @@ +id: team-d26cb33300448e8878b411d58432ae7f + +info: + name: > + Team Showcase <= 1.22.15 - Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2a9a2fd-5667-4033-a273-f4f5660cb27e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team/" + google-query: inurl:"/wp-content/plugins/team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-members-3251ec6afe785e3bef31ff4841e744c5.yaml b/nuclei-templates/cve-less/plugins/team-members-3251ec6afe785e3bef31ff4841e744c5.yaml new file mode 100644 index 0000000000..9107f64e24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-members-3251ec6afe785e3bef31ff4841e744c5.yaml @@ -0,0 +1,58 @@ +id: team-members-3251ec6afe785e3bef31ff4841e744c5 + +info: + name: > + Team Members <= 5.2.0 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c68a9b05-5e60-4d5f-9d00-a9a5b85271f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team-members/" + google-query: inurl:"/wp-content/plugins/team-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-members-68a19dcbafa893fee0f134b5b9682816.yaml b/nuclei-templates/cve-less/plugins/team-members-68a19dcbafa893fee0f134b5b9682816.yaml new file mode 100644 index 0000000000..25b942eec6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-members-68a19dcbafa893fee0f134b5b9682816.yaml @@ -0,0 +1,58 @@ +id: team-members-68a19dcbafa893fee0f134b5b9682816 + +info: + name: > + Team Members <= 5.1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09277f30-9b6a-4cc9-bc8c-09c360da917a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team-members/" + google-query: inurl:"/wp-content/plugins/team-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-members-97f6d832d77568cb83cbfd8ed5696c11.yaml b/nuclei-templates/cve-less/plugins/team-members-97f6d832d77568cb83cbfd8ed5696c11.yaml new file mode 100644 index 0000000000..3dc2b1e134 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-members-97f6d832d77568cb83cbfd8ed5696c11.yaml @@ -0,0 +1,58 @@ +id: team-members-97f6d832d77568cb83cbfd8ed5696c11 + +info: + name: > + Team Members <= 5.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b14bdec-9737-4b03-8cc0-e4018494d162?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team-members/" + google-query: inurl:"/wp-content/plugins/team-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-showcase-50a35a271362419338fef58cbfdfbd44.yaml b/nuclei-templates/cve-less/plugins/team-showcase-50a35a271362419338fef58cbfdfbd44.yaml new file mode 100644 index 0000000000..de50362328 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-showcase-50a35a271362419338fef58cbfdfbd44.yaml @@ -0,0 +1,58 @@ +id: team-showcase-50a35a271362419338fef58cbfdfbd44 + +info: + name: > + Team Showcase <= 2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3b26060-294e-4d4c-9295-0b08f533d5c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team-showcase/" + google-query: inurl:"/wp-content/plugins/team-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/team-showcase-supreme-f7d812f744f4c9ca71f204033cc41839.yaml b/nuclei-templates/cve-less/plugins/team-showcase-supreme-f7d812f744f4c9ca71f204033cc41839.yaml new file mode 100644 index 0000000000..3c8070792a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/team-showcase-supreme-f7d812f744f4c9ca71f204033cc41839.yaml @@ -0,0 +1,58 @@ +id: team-showcase-supreme-f7d812f744f4c9ca71f204033cc41839 + +info: + name: > + Team Member <= 4.4 - Authenticated (Editor+) Stored Cross-Site Scripting via new_style_name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/353d22c5-dee1-485f-ae66-e9c7afe3ad8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/team-showcase-supreme/" + google-query: inurl:"/wp-content/plugins/team-showcase-supreme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,team-showcase-supreme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/team-showcase-supreme/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "team-showcase-supreme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/teaser-maker-standard-62dc43c109e10a4fb2083be6c80b9766.yaml b/nuclei-templates/cve-less/plugins/teaser-maker-standard-62dc43c109e10a4fb2083be6c80b9766.yaml new file mode 100644 index 0000000000..2c3f8d74a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/teaser-maker-standard-62dc43c109e10a4fb2083be6c80b9766.yaml @@ -0,0 +1,58 @@ +id: teaser-maker-standard-62dc43c109e10a4fb2083be6c80b9766 + +info: + name: > + Zebra_Form PHP library <= 2.9.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4ea0a8-d2f6-4209-b17f-0a26ba664c63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/teaser-maker-standard/" + google-query: inurl:"/wp-content/plugins/teaser-maker-standard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,teaser-maker-standard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/teaser-maker-standard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "teaser-maker-standard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.114') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/telefication-32f527b1fe26d5c077366894530c8689.yaml b/nuclei-templates/cve-less/plugins/telefication-32f527b1fe26d5c077366894530c8689.yaml new file mode 100644 index 0000000000..e5117b0eed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/telefication-32f527b1fe26d5c077366894530c8689.yaml @@ -0,0 +1,58 @@ +id: telefication-32f527b1fe26d5c077366894530c8689 + +info: + name: > + Telefication <= 1.8.0 - Open Relay and Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9f1719c-ef66-4c68-b25c-175c99938e7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/telefication/" + google-query: inurl:"/wp-content/plugins/telefication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,telefication,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/telefication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "telefication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/telegram-bot-0caf4f2b6437a679adbb5b527c6703b2.yaml b/nuclei-templates/cve-less/plugins/telegram-bot-0caf4f2b6437a679adbb5b527c6703b2.yaml new file mode 100644 index 0000000000..806d18e53b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/telegram-bot-0caf4f2b6437a679adbb5b527c6703b2.yaml @@ -0,0 +1,58 @@ +id: telegram-bot-0caf4f2b6437a679adbb5b527c6703b2 + +info: + name: > + Telegram Bot & Channel <= 3.6.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eb099c3-f6f6-4d9c-a9c7-fa1b81ce082e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/telegram-bot/" + google-query: inurl:"/wp-content/plugins/telegram-bot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,telegram-bot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/telegram-bot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "telegram-bot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/telephone-number-linker-a6d339b3bc08ee880c9c68cfd52a0937.yaml b/nuclei-templates/cve-less/plugins/telephone-number-linker-a6d339b3bc08ee880c9c68cfd52a0937.yaml new file mode 100644 index 0000000000..3331ce0445 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/telephone-number-linker-a6d339b3bc08ee880c9c68cfd52a0937.yaml @@ -0,0 +1,58 @@ +id: telephone-number-linker-a6d339b3bc08ee880c9c68cfd52a0937 + +info: + name: > + Telephone Number Linker <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06424d9f-0064-4101-b819-688489a18eee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/telephone-number-linker/" + google-query: inurl:"/wp-content/plugins/telephone-number-linker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,telephone-number-linker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/telephone-number-linker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "telephone-number-linker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/telsender-4150b6c5ffc14f9f916be876839f27fe.yaml b/nuclei-templates/cve-less/plugins/telsender-4150b6c5ffc14f9f916be876839f27fe.yaml new file mode 100644 index 0000000000..51bdfbe968 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/telsender-4150b6c5ffc14f9f916be876839f27fe.yaml @@ -0,0 +1,58 @@ +id: telsender-4150b6c5ffc14f9f916be876839f27fe + +info: + name: > + TelSender <= 1.14.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39193ebd-005a-4497-9939-99947323a1a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/telsender/" + google-query: inurl:"/wp-content/plugins/telsender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,telsender,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/telsender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "telsender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/telugu-bible-verse-daily-10fa074ce14cd8aff4840b1abbaf6c83.yaml b/nuclei-templates/cve-less/plugins/telugu-bible-verse-daily-10fa074ce14cd8aff4840b1abbaf6c83.yaml new file mode 100644 index 0000000000..fc60c0d8df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/telugu-bible-verse-daily-10fa074ce14cd8aff4840b1abbaf6c83.yaml @@ -0,0 +1,58 @@ +id: telugu-bible-verse-daily-10fa074ce14cd8aff4840b1abbaf6c83 + +info: + name: > + తెలుగు బైబిల్ వచనములు <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6881b0ad-7f11-4709-8c17-37aa505bad4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/telugu-bible-verse-daily/" + google-query: inurl:"/wp-content/plugins/telugu-bible-verse-daily/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,telugu-bible-verse-daily,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/telugu-bible-verse-daily/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "telugu-bible-verse-daily" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/template-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml b/nuclei-templates/cve-less/plugins/template-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml new file mode 100644 index 0000000000..03deac18f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/template-events-calendar-218c9a934953359a2e2d8f63be0a287c.yaml @@ -0,0 +1,58 @@ +id: template-events-calendar-218c9a934953359a2e2d8f63be0a287c + +info: + name: > + Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f0fb78-ad6b-4a9e-ae1a-5793f3426379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/template-events-calendar/" + google-query: inurl:"/wp-content/plugins/template-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,template-events-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/template-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "template-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/template-events-calendar-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/template-events-calendar-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..d0329e7830 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/template-events-calendar-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: template-events-calendar-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/template-events-calendar/" + google-query: inurl:"/wp-content/plugins/template-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,template-events-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/template-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "template-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/template-events-calendar-803648dc94dbeaf482d25b8433d5ee7f.yaml b/nuclei-templates/cve-less/plugins/template-events-calendar-803648dc94dbeaf482d25b8433d5ee7f.yaml new file mode 100644 index 0000000000..2f7c9778ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/template-events-calendar-803648dc94dbeaf482d25b8433d5ee7f.yaml @@ -0,0 +1,58 @@ +id: template-events-calendar-803648dc94dbeaf482d25b8433d5ee7f + +info: + name: > + Events Shortcodes & Templates For The Events Calendar <= 2.3.1 - Authenticated (Contributor+) SQL Injection via shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1d9ee9f-d8d0-4a9d-b414-bc79c4255b4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/template-events-calendar/" + google-query: inurl:"/wp-content/plugins/template-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,template-events-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/template-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "template-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/template-kit-import-1024fb2bb768926b2f10b7f06d6c4de1.yaml b/nuclei-templates/cve-less/plugins/template-kit-import-1024fb2bb768926b2f10b7f06d6c4de1.yaml new file mode 100644 index 0000000000..64455c6423 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/template-kit-import-1024fb2bb768926b2f10b7f06d6c4de1.yaml @@ -0,0 +1,58 @@ +id: template-kit-import-1024fb2bb768926b2f10b7f06d6c4de1 + +info: + name: > + Template Kit – Import <= 1.0.14 - Authenticated(Author+) Stored Cross-Site Scripting via template upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6203a15d-f90f-4147-8e43-afc424bbb750?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/template-kit-import/" + google-query: inurl:"/wp-content/plugins/template-kit-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,template-kit-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/template-kit-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "template-kit-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/template-kit-import-e259392e4e0f5c005c71447bf33a289e.yaml b/nuclei-templates/cve-less/plugins/template-kit-import-e259392e4e0f5c005c71447bf33a289e.yaml new file mode 100644 index 0000000000..b6054f0caf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/template-kit-import-e259392e4e0f5c005c71447bf33a289e.yaml @@ -0,0 +1,58 @@ +id: template-kit-import-e259392e4e0f5c005c71447bf33a289e + +info: + name: > + Envato Elements <= 2.0.10 & Template Kit <= 1.0.13 - Authenticated (Contributor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68fe17e2-d5ab-4ebd-a5c6-d65cea327abd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/template-kit-import/" + google-query: inurl:"/wp-content/plugins/template-kit-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,template-kit-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/template-kit-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "template-kit-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/templately-6db2725ca256b74963101e9d1eafe501.yaml b/nuclei-templates/cve-less/plugins/templately-6db2725ca256b74963101e9d1eafe501.yaml new file mode 100644 index 0000000000..d28f34d57c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/templately-6db2725ca256b74963101e9d1eafe501.yaml @@ -0,0 +1,58 @@ +id: templately-6db2725ca256b74963101e9d1eafe501 + +info: + name: > + Templately <= 2.2.5 - Improper Authorization to Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c74553c0-366e-44d7-8c4a-161a05ef02b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/templately/" + google-query: inurl:"/wp-content/plugins/templately/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,templately,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/templately/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "templately" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/templates-patterns-collection-0f7e356340d28416c48865e039d750ac.yaml b/nuclei-templates/cve-less/plugins/templates-patterns-collection-0f7e356340d28416c48865e039d750ac.yaml new file mode 100644 index 0000000000..f3f0af7537 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/templates-patterns-collection-0f7e356340d28416c48865e039d750ac.yaml @@ -0,0 +1,58 @@ +id: templates-patterns-collection-0f7e356340d28416c48865e039d750ac + +info: + name: > + Cloud Templates & Patterns collection <= 1.2.2 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c59baad8-b888-4475-8371-645811a6b569?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/templates-patterns-collection/" + google-query: inurl:"/wp-content/plugins/templates-patterns-collection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,templates-patterns-collection,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/templates-patterns-collection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "templates-patterns-collection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/templates-patterns-collection-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/templates-patterns-collection-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..5db5a7d926 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/templates-patterns-collection-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: templates-patterns-collection-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/templates-patterns-collection/" + google-query: inurl:"/wp-content/plugins/templates-patterns-collection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,templates-patterns-collection,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/templates-patterns-collection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "templates-patterns-collection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/templatesnext-toolkit-6880997a756b467547a9370c60ac6681.yaml b/nuclei-templates/cve-less/plugins/templatesnext-toolkit-6880997a756b467547a9370c60ac6681.yaml new file mode 100644 index 0000000000..3319bc8e0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/templatesnext-toolkit-6880997a756b467547a9370c60ac6681.yaml @@ -0,0 +1,58 @@ +id: templatesnext-toolkit-6880997a756b467547a9370c60ac6681 + +info: + name: > + TemplatesNext ToolKit <= 3.2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38ebe1d4-4ac0-4d03-8945-451902263442?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/templatesnext-toolkit/" + google-query: inurl:"/wp-content/plugins/templatesnext-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,templatesnext-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/templatesnext-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "templatesnext-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/templatesnext-toolkit-71cf8d6f1781f11cff9af8b811c7f0b2.yaml b/nuclei-templates/cve-less/plugins/templatesnext-toolkit-71cf8d6f1781f11cff9af8b811c7f0b2.yaml new file mode 100644 index 0000000000..2d9e9157f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/templatesnext-toolkit-71cf8d6f1781f11cff9af8b811c7f0b2.yaml @@ -0,0 +1,58 @@ +id: templatesnext-toolkit-71cf8d6f1781f11cff9af8b811c7f0b2 + +info: + name: > + TemplatesNext ToolKit <= 3.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7f90a88-6c19-4adf-8282-2d77234fcc11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/templatesnext-toolkit/" + google-query: inurl:"/wp-content/plugins/templatesnext-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,templatesnext-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/templatesnext-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "templatesnext-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/templatesnext-toolkit-d10130ec70ac5e95df8a68d13ca495cb.yaml b/nuclei-templates/cve-less/plugins/templatesnext-toolkit-d10130ec70ac5e95df8a68d13ca495cb.yaml new file mode 100644 index 0000000000..cb2e7ac367 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/templatesnext-toolkit-d10130ec70ac5e95df8a68d13ca495cb.yaml @@ -0,0 +1,58 @@ +id: templatesnext-toolkit-d10130ec70ac5e95df8a68d13ca495cb + +info: + name: > + TemplatesNext ToolKit <= 3.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7de5cb89-240a-4ba3-a82c-261629620948?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/templatesnext-toolkit/" + google-query: inurl:"/wp-content/plugins/templatesnext-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,templatesnext-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/templatesnext-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "templatesnext-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/temporary-login-without-password-e518402d2982dad7f3cfd89eedd61449.yaml b/nuclei-templates/cve-less/plugins/temporary-login-without-password-e518402d2982dad7f3cfd89eedd61449.yaml new file mode 100644 index 0000000000..2dabd90ea9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/temporary-login-without-password-e518402d2982dad7f3cfd89eedd61449.yaml @@ -0,0 +1,58 @@ +id: temporary-login-without-password-e518402d2982dad7f3cfd89eedd61449 + +info: + name: > + Temporary Login Without Password <= 1.7.0 - Subscriber+ Plugin Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5eb85bc1-cffd-4363-ba53-30e3f6f6fc56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/temporary-login-without-password/" + google-query: inurl:"/wp-content/plugins/temporary-login-without-password/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,temporary-login-without-password,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/temporary-login-without-password/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "temporary-login-without-password" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tencentcloud-cos-1697bad848dd1bd16f0c413821ab2401.yaml b/nuclei-templates/cve-less/plugins/tencentcloud-cos-1697bad848dd1bd16f0c413821ab2401.yaml new file mode 100644 index 0000000000..f55033bb63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tencentcloud-cos-1697bad848dd1bd16f0c413821ab2401.yaml @@ -0,0 +1,58 @@ +id: tencentcloud-cos-1697bad848dd1bd16f0c413821ab2401 + +info: + name: > + tencentcloud-cos <= 1.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0be21ac7-4f61-44fc-9ffc-ab65faa549f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tencentcloud-cos/" + google-query: inurl:"/wp-content/plugins/tencentcloud-cos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tencentcloud-cos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tencentcloud-cos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tencentcloud-cos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tencentcloud-cos-b1770f9eb849f830c90d98a4a92d2baf.yaml b/nuclei-templates/cve-less/plugins/tencentcloud-cos-b1770f9eb849f830c90d98a4a92d2baf.yaml new file mode 100644 index 0000000000..b6f0aa5323 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tencentcloud-cos-b1770f9eb849f830c90d98a4a92d2baf.yaml @@ -0,0 +1,58 @@ +id: tencentcloud-cos-b1770f9eb849f830c90d98a4a92d2baf + +info: + name: > + tencentcloud-cos <= 1.0.7 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91ea157f-7a74-427f-b1eb-a9187f2d9096?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tencentcloud-cos/" + google-query: inurl:"/wp-content/plugins/tencentcloud-cos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tencentcloud-cos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tencentcloud-cos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tencentcloud-cos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-15b5b7552cd59d4fe58cc4180bb081ff.yaml b/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-15b5b7552cd59d4fe58cc4180bb081ff.yaml new file mode 100644 index 0000000000..d1b8f4557f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-15b5b7552cd59d4fe58cc4180bb081ff.yaml @@ -0,0 +1,58 @@ +id: tenweb-speed-optimizer-15b5b7552cd59d4fe58cc4180bb081ff + +info: + name: > + 10Web Booster – Website speed optimization, Cache & Page Speed optimizer <= 2.12.23 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f3f0ef8-8a13-4110-a402-e1bcf493560a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tenweb-speed-optimizer/" + google-query: inurl:"/wp-content/plugins/tenweb-speed-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tenweb-speed-optimizer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tenweb-speed-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tenweb-speed-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-20a9d8955f3c9e8e519f715c32a5f589.yaml b/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-20a9d8955f3c9e8e519f715c32a5f589.yaml new file mode 100644 index 0000000000..cdcf0b074d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-20a9d8955f3c9e8e519f715c32a5f589.yaml @@ -0,0 +1,58 @@ +id: tenweb-speed-optimizer-20a9d8955f3c9e8e519f715c32a5f589 + +info: + name: > + 10Web Booster <= 2.24.14 - Unauthenticated Arbitrary Option Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4d9c659-ec6a-43ca-b484-02afd06f3c13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tenweb-speed-optimizer/" + google-query: inurl:"/wp-content/plugins/tenweb-speed-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tenweb-speed-optimizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tenweb-speed-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tenweb-speed-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.24.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-b27ee90d1fddd4df887e8806bf4e7ee4.yaml b/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-b27ee90d1fddd4df887e8806bf4e7ee4.yaml new file mode 100644 index 0000000000..1bfdc8d652 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-b27ee90d1fddd4df887e8806bf4e7ee4.yaml @@ -0,0 +1,58 @@ +id: tenweb-speed-optimizer-b27ee90d1fddd4df887e8806bf4e7ee4 + +info: + name: > + 10Web Booster – Website speed optimization, Cache & Page Speed optimizer <= 2.8.34 - Missing Authorization to Plugin Deactivation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f62063c8-7559-492a-9caf-fae256052d1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tenweb-speed-optimizer/" + google-query: inurl:"/wp-content/plugins/tenweb-speed-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tenweb-speed-optimizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tenweb-speed-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tenweb-speed-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-bd8227b6953d3cab7fe7bcfea80c058c.yaml b/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-bd8227b6953d3cab7fe7bcfea80c058c.yaml new file mode 100644 index 0000000000..5c7758e355 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tenweb-speed-optimizer-bd8227b6953d3cab7fe7bcfea80c058c.yaml @@ -0,0 +1,58 @@ +id: tenweb-speed-optimizer-bd8227b6953d3cab7fe7bcfea80c058c + +info: + name: > + 10Web Booster – Website speed optimization, Cache & Page Speed optimizer <= 2.13.44 - Missing Authorization in Settings Import to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c8b0de4-e3ee-4711-8f27-097dee843dd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tenweb-speed-optimizer/" + google-query: inurl:"/wp-content/plugins/tenweb-speed-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tenweb-speed-optimizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tenweb-speed-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tenweb-speed-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tera-charts-18c4c68c7c881f2ea27926221e43a5a9.yaml b/nuclei-templates/cve-less/plugins/tera-charts-18c4c68c7c881f2ea27926221e43a5a9.yaml new file mode 100644 index 0000000000..3f68a7a375 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tera-charts-18c4c68c7c881f2ea27926221e43a5a9.yaml @@ -0,0 +1,58 @@ +id: tera-charts-18c4c68c7c881f2ea27926221e43a5a9 + +info: + name: > + Tera Charts < 1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bcc353f-cdf2-4e28-a0e0-ad149ecb1c3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tera-charts/" + google-query: inurl:"/wp-content/plugins/tera-charts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tera-charts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tera-charts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tera-charts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tera-charts-c18aab0e3a8fe7ad353658faf1fddbbe.yaml b/nuclei-templates/cve-less/plugins/tera-charts-c18aab0e3a8fe7ad353658faf1fddbbe.yaml new file mode 100644 index 0000000000..95056f5f98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tera-charts-c18aab0e3a8fe7ad353658faf1fddbbe.yaml @@ -0,0 +1,58 @@ +id: tera-charts-c18aab0e3a8fe7ad353658faf1fddbbe + +info: + name: > + Tera Charts <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bbf5adc-df9c-4629-909c-932998c50508?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tera-charts/" + google-query: inurl:"/wp-content/plugins/tera-charts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tera-charts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tera-charts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tera-charts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/terillion-reviews-47c8ae751ee325a323299c1e28df1079.yaml b/nuclei-templates/cve-less/plugins/terillion-reviews-47c8ae751ee325a323299c1e28df1079.yaml new file mode 100644 index 0000000000..3f56fa70a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/terillion-reviews-47c8ae751ee325a323299c1e28df1079.yaml @@ -0,0 +1,58 @@ +id: terillion-reviews-47c8ae751ee325a323299c1e28df1079 + +info: + name: > + Terillion Reviews < 1.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be70f816-14b1-4c7b-8529-146bcd5d4cf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/terillion-reviews/" + google-query: inurl:"/wp-content/plugins/terillion-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,terillion-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/terillion-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "terillion-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/terms-and-conditions-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/terms-and-conditions-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..e2d82ead4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/terms-and-conditions-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: terms-and-conditions-popup-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/terms-and-conditions-popup-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/terms-and-conditions-popup-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,terms-and-conditions-popup-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/terms-and-conditions-popup-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "terms-and-conditions-popup-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/terms-descriptions-4ca0cd7e003f070985982d00b73cdc44.yaml b/nuclei-templates/cve-less/plugins/terms-descriptions-4ca0cd7e003f070985982d00b73cdc44.yaml new file mode 100644 index 0000000000..a301a94479 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/terms-descriptions-4ca0cd7e003f070985982d00b73cdc44.yaml @@ -0,0 +1,58 @@ +id: terms-descriptions-4ca0cd7e003f070985982d00b73cdc44 + +info: + name: > + Terms Descriptions <= 3.4.4 - Reflected Cross-Site Scripting via term_search + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6a44d36-43e6-4785-b2bc-0b4b98d847e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/terms-descriptions/" + google-query: inurl:"/wp-content/plugins/terms-descriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,terms-descriptions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/terms-descriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "terms-descriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/terraclassifieds-4be3fece7979d31adacbce90e5c628f3.yaml b/nuclei-templates/cve-less/plugins/terraclassifieds-4be3fece7979d31adacbce90e5c628f3.yaml new file mode 100644 index 0000000000..4eb73869cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/terraclassifieds-4be3fece7979d31adacbce90e5c628f3.yaml @@ -0,0 +1,58 @@ +id: terraclassifieds-4be3fece7979d31adacbce90e5c628f3 + +info: + name: > + TerraClassifieds <= 2.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a6e5f89-ebc0-413a-a76e-3cf4339430ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/terraclassifieds/" + google-query: inurl:"/wp-content/plugins/terraclassifieds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,terraclassifieds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/terraclassifieds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "terraclassifieds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/terraclassifieds-8f126edef9e9df4d2ad158f1a5a43c5d.yaml b/nuclei-templates/cve-less/plugins/terraclassifieds-8f126edef9e9df4d2ad158f1a5a43c5d.yaml new file mode 100644 index 0000000000..ad9bc5548a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/terraclassifieds-8f126edef9e9df4d2ad158f1a5a43c5d.yaml @@ -0,0 +1,58 @@ +id: terraclassifieds-8f126edef9e9df4d2ad158f1a5a43c5d + +info: + name: > + TerraClassifieds <= 2.0.3 Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0399b60-6e40-4f35-985f-845a32f69d64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/terraclassifieds/" + google-query: inurl:"/wp-content/plugins/terraclassifieds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,terraclassifieds,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/terraclassifieds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "terraclassifieds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-9fed5404f994e2e62aad7f01b29dde3c.yaml b/nuclei-templates/cve-less/plugins/testimonial-9fed5404f994e2e62aad7f01b29dde3c.yaml new file mode 100644 index 0000000000..6f0844aec8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-9fed5404f994e2e62aad7f01b29dde3c.yaml @@ -0,0 +1,58 @@ +id: testimonial-9fed5404f994e2e62aad7f01b29dde3c + +info: + name: > + Testimonial Slider <= 2.3.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9be5e54c-286a-4fec-95fb-27e3517f3eb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial/" + google-query: inurl:"/wp-content/plugins/testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-add-098a7c1e7e4a3294c0b3e783c9234d81.yaml b/nuclei-templates/cve-less/plugins/testimonial-add-098a7c1e7e4a3294c0b3e783c9234d81.yaml new file mode 100644 index 0000000000..4577a875e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-add-098a7c1e7e4a3294c0b3e783c9234d81.yaml @@ -0,0 +1,58 @@ +id: testimonial-add-098a7c1e7e4a3294c0b3e783c9234d81 + +info: + name: > + Testimonials Slider <= 3.5.8.3 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b1bfe88-2513-4acc-91e2-50a3bc9d7183?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-add/" + google-query: inurl:"/wp-content/plugins/testimonial-add/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-add,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-add/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-add" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-builder-cc8d3237ec9d31d7a17e75a3773f4b59.yaml b/nuclei-templates/cve-less/plugins/testimonial-builder-cc8d3237ec9d31d7a17e75a3773f4b59.yaml new file mode 100644 index 0000000000..a145430781 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-builder-cc8d3237ec9d31d7a17e75a3773f4b59.yaml @@ -0,0 +1,58 @@ +id: testimonial-builder-cc8d3237ec9d31d7a17e75a3773f4b59 + +info: + name: > + Testimonial < 1.6.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae9b5c7-0d76-4772-973b-be48e520c837?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-builder/" + google-query: inurl:"/wp-content/plugins/testimonial-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-builder-ebb1ebcf4f2c8c10213c00b9f2126830.yaml b/nuclei-templates/cve-less/plugins/testimonial-builder-ebb1ebcf4f2c8c10213c00b9f2126830.yaml new file mode 100644 index 0000000000..e6209ff92e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-builder-ebb1ebcf4f2c8c10213c00b9f2126830.yaml @@ -0,0 +1,58 @@ +id: testimonial-builder-ebb1ebcf4f2c8c10213c00b9f2126830 + +info: + name: > + Testimonial Builder <= 1.6.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bf511b6-1b62-43e0-9df5-674a423f6ae2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-builder/" + google-query: inurl:"/wp-content/plugins/testimonial-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-free-68309fb63b5db886058ca866de7b117b.yaml b/nuclei-templates/cve-less/plugins/testimonial-free-68309fb63b5db886058ca866de7b117b.yaml new file mode 100644 index 0000000000..f4b01a01d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-free-68309fb63b5db886058ca866de7b117b.yaml @@ -0,0 +1,58 @@ +id: testimonial-free-68309fb63b5db886058ca866de7b117b + +info: + name: > + Real Testimonials <= 2.5.11 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64d2d161-678a-4c0a-b0c5-c28a29a66a5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-free/" + google-query: inurl:"/wp-content/plugins/testimonial-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-free,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-free-bc1021396d5f2f9f59d1b9e8308f6b42.yaml b/nuclei-templates/cve-less/plugins/testimonial-free-bc1021396d5f2f9f59d1b9e8308f6b42.yaml new file mode 100644 index 0000000000..3b59735816 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-free-bc1021396d5f2f9f59d1b9e8308f6b42.yaml @@ -0,0 +1,58 @@ +id: testimonial-free-bc1021396d5f2f9f59d1b9e8308f6b42 + +info: + name: > + Real Testimonials <= 2.1.6 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23f1b1da-2ac0-49c1-bb32-2fe2cfd56192?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-free/" + google-query: inurl:"/wp-content/plugins/testimonial-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-rotator-a98e82a7c384a33ad5d0d42365168f67.yaml b/nuclei-templates/cve-less/plugins/testimonial-rotator-a98e82a7c384a33ad5d0d42365168f67.yaml new file mode 100644 index 0000000000..d6e094d175 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-rotator-a98e82a7c384a33ad5d0d42365168f67.yaml @@ -0,0 +1,58 @@ +id: testimonial-rotator-a98e82a7c384a33ad5d0d42365168f67 + +info: + name: > + Testimonial Rotator <= 3.0.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/963db13e-14aa-4fc0-8d28-3f8a22361361?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-rotator/" + google-query: inurl:"/wp-content/plugins/testimonial-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-rotator-ef09ee87048a20a553f4804a48eb6952.yaml b/nuclei-templates/cve-less/plugins/testimonial-rotator-ef09ee87048a20a553f4804a48eb6952.yaml new file mode 100644 index 0000000000..c9683d1ccb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-rotator-ef09ee87048a20a553f4804a48eb6952.yaml @@ -0,0 +1,58 @@ +id: testimonial-rotator-ef09ee87048a20a553f4804a48eb6952 + +info: + name: > + Testimonial Rotator <= 3.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ea0f826-5ae9-4dad-89d0-9fc9f10f526b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-rotator/" + google-query: inurl:"/wp-content/plugins/testimonial-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-rotator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-slider-0cd68afb7b6d648c1cc92eb32c923eff.yaml b/nuclei-templates/cve-less/plugins/testimonial-slider-0cd68afb7b6d648c1cc92eb32c923eff.yaml new file mode 100644 index 0000000000..b37816ef67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-slider-0cd68afb7b6d648c1cc92eb32c923eff.yaml @@ -0,0 +1,58 @@ +id: testimonial-slider-0cd68afb7b6d648c1cc92eb32c923eff + +info: + name: > + Testimonial Slider < 1.2.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5240171-6051-455c-b6df-630e2cd8308d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-slider/" + google-query: inurl:"/wp-content/plugins/testimonial-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-slider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-slider-6d9a6d99fa80beb8d831bc3a1d45ac3c.yaml b/nuclei-templates/cve-less/plugins/testimonial-slider-6d9a6d99fa80beb8d831bc3a1d45ac3c.yaml new file mode 100644 index 0000000000..96e039dee2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-slider-6d9a6d99fa80beb8d831bc3a1d45ac3c.yaml @@ -0,0 +1,58 @@ +id: testimonial-slider-6d9a6d99fa80beb8d831bc3a1d45ac3c + +info: + name: > + Testimonial Slider <= 1.2.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d9e0147-74ae-481a-bdc2-16bb3cdc10d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-slider/" + google-query: inurl:"/wp-content/plugins/testimonial-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-slider-and-showcase-3fcde9cc662e3ad45e20c993057641fd.yaml b/nuclei-templates/cve-less/plugins/testimonial-slider-and-showcase-3fcde9cc662e3ad45e20c993057641fd.yaml new file mode 100644 index 0000000000..a3a9633d05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-slider-and-showcase-3fcde9cc662e3ad45e20c993057641fd.yaml @@ -0,0 +1,58 @@ +id: testimonial-slider-and-showcase-3fcde9cc662e3ad45e20c993057641fd + +info: + name: > + Testimonial Slider <= 2.3.6 - Missing Authorization to Authenticated (Author+) Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bff5508-7483-4c0e-8146-a157244d6ad2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-slider-and-showcase/" + google-query: inurl:"/wp-content/plugins/testimonial-slider-and-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-slider-and-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-slider-and-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-slider-and-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-slider-and-showcase-f54e3a0500b97b96852bb8d2c3a17f16.yaml b/nuclei-templates/cve-less/plugins/testimonial-slider-and-showcase-f54e3a0500b97b96852bb8d2c3a17f16.yaml new file mode 100644 index 0000000000..8c80a3c416 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-slider-and-showcase-f54e3a0500b97b96852bb8d2c3a17f16.yaml @@ -0,0 +1,58 @@ +id: testimonial-slider-and-showcase-f54e3a0500b97b96852bb8d2c3a17f16 + +info: + name: > + Testimonial Slider <= 2.2.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc329aee-e777-41eb-8799-539c891bd03b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-slider-and-showcase/" + google-query: inurl:"/wp-content/plugins/testimonial-slider-and-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-slider-and-showcase,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-slider-and-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-slider-and-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-slider-c2d76074465a6dcb60332d83861a2a8f.yaml b/nuclei-templates/cve-less/plugins/testimonial-slider-c2d76074465a6dcb60332d83861a2a8f.yaml new file mode 100644 index 0000000000..84885578ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-slider-c2d76074465a6dcb60332d83861a2a8f.yaml @@ -0,0 +1,58 @@ +id: testimonial-slider-c2d76074465a6dcb60332d83861a2a8f + +info: + name: > + Testimonial Slider <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7ed687-4049-4957-86e9-b2f59621c747?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-slider/" + google-query: inurl:"/wp-content/plugins/testimonial-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-slider-c6bb0e4c31a358c9eb072ecaccea302f.yaml b/nuclei-templates/cve-less/plugins/testimonial-slider-c6bb0e4c31a358c9eb072ecaccea302f.yaml new file mode 100644 index 0000000000..fbcd0e765a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-slider-c6bb0e4c31a358c9eb072ecaccea302f.yaml @@ -0,0 +1,58 @@ +id: testimonial-slider-c6bb0e4c31a358c9eb072ecaccea302f + +info: + name: > + Testimonial Slider <= 1.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d557db81-9689-4fc1-b749-3595859048de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-slider/" + google-query: inurl:"/wp-content/plugins/testimonial-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-slider-shortcode-43c13d89c14426ecb661544b7d24f058.yaml b/nuclei-templates/cve-less/plugins/testimonial-slider-shortcode-43c13d89c14426ecb661544b7d24f058.yaml new file mode 100644 index 0000000000..204e0609f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-slider-shortcode-43c13d89c14426ecb661544b7d24f058.yaml @@ -0,0 +1,58 @@ +id: testimonial-slider-shortcode-43c13d89c14426ecb661544b7d24f058 + +info: + name: > + Testimonial Slider Shortcode <= 1.1.8 - Authenticated (Contributor+) Cross-Site Scripting Vulnerability via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30cb1b8c-84ce-4401-9c30-775efb257fe6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-slider-shortcode/" + google-query: inurl:"/wp-content/plugins/testimonial-slider-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-slider-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-slider-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-slider-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-widgets-064923882cd32ff7964d2ef158cf8d5f.yaml b/nuclei-templates/cve-less/plugins/testimonial-widgets-064923882cd32ff7964d2ef158cf8d5f.yaml new file mode 100644 index 0000000000..980000246f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-widgets-064923882cd32ff7964d2ef158cf8d5f.yaml @@ -0,0 +1,58 @@ +id: testimonial-widgets-064923882cd32ff7964d2ef158cf8d5f + +info: + name: > + WP Testimonials <= 1.4.2 - Cross-Site Request Forgery to Widget Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ff59aa5-a2f2-4fe1-a0b6-d9b07b0fdb1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-widgets/" + google-query: inurl:"/wp-content/plugins/testimonial-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonial-widgets-0a08727c9a8cc242989bfe2a49030a2a.yaml b/nuclei-templates/cve-less/plugins/testimonial-widgets-0a08727c9a8cc242989bfe2a49030a2a.yaml new file mode 100644 index 0000000000..11b8c7ecae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonial-widgets-0a08727c9a8cc242989bfe2a49030a2a.yaml @@ -0,0 +1,58 @@ +id: testimonial-widgets-0a08727c9a8cc242989bfe2a49030a2a + +info: + name: > + WP Testimonials <= 1.4.3 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4da18aad-3c82-4bc6-8dad-523643c12d5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonial-widgets/" + google-query: inurl:"/wp-content/plugins/testimonial-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonial-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonial-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonial-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonials-2ee541e9c869c15a8b871966c41047ce.yaml b/nuclei-templates/cve-less/plugins/testimonials-2ee541e9c869c15a8b871966c41047ce.yaml new file mode 100644 index 0000000000..9e8946b1b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonials-2ee541e9c869c15a8b871966c41047ce.yaml @@ -0,0 +1,58 @@ +id: testimonials-2ee541e9c869c15a8b871966c41047ce + +info: + name: > + Testimonials <= 3.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d9689ed-2be0-4573-a794-2c5bfadafdf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonials/" + google-query: inurl:"/wp-content/plugins/testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonials,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/testimonials-widget-f08697abe75fa6ac28d5ec1f1d0bb149.yaml b/nuclei-templates/cve-less/plugins/testimonials-widget-f08697abe75fa6ac28d5ec1f1d0bb149.yaml new file mode 100644 index 0000000000..0ea9224c87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/testimonials-widget-f08697abe75fa6ac28d5ec1f1d0bb149.yaml @@ -0,0 +1,58 @@ +id: testimonials-widget-f08697abe75fa6ac28d5ec1f1d0bb149 + +info: + name: > + Testimonials Widget <= 3.5.1 - Multiple Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae46eea5-4b7a-4cf5-97ff-c65b7e8e3261?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonials-widget/" + google-query: inurl:"/wp-content/plugins/testimonials-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonials-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonials-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonials-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tevolution-2d693d589095b4560f08a66dde7ee787.yaml b/nuclei-templates/cve-less/plugins/tevolution-2d693d589095b4560f08a66dde7ee787.yaml new file mode 100644 index 0000000000..3437913c72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tevolution-2d693d589095b4560f08a66dde7ee787.yaml @@ -0,0 +1,58 @@ +id: tevolution-2d693d589095b4560f08a66dde7ee787 + +info: + name: > + Tevolution < 2.3.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e26a1c7c-8c4d-450d-bbfa-6ab1af4bceba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Tevolution/" + google-query: inurl:"/wp-content/plugins/Tevolution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Tevolution,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Tevolution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Tevolution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/text-hover-c38399df1330c2dfd449ee16ef7996a9.yaml b/nuclei-templates/cve-less/plugins/text-hover-c38399df1330c2dfd449ee16ef7996a9.yaml new file mode 100644 index 0000000000..12fad61001 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/text-hover-c38399df1330c2dfd449ee16ef7996a9.yaml @@ -0,0 +1,58 @@ +id: text-hover-c38399df1330c2dfd449ee16ef7996a9 + +info: + name: > + Text Hover <= 4.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d8b8f54-b2af-42dd-af82-c1e8726c87e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/text-hover/" + google-query: inurl:"/wp-content/plugins/text-hover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,text-hover,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/text-hover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "text-hover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/textme-sms-integration-3832b3b7c5502757f733258a03de8f45.yaml b/nuclei-templates/cve-less/plugins/textme-sms-integration-3832b3b7c5502757f733258a03de8f45.yaml new file mode 100644 index 0000000000..c1a9b0bc4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/textme-sms-integration-3832b3b7c5502757f733258a03de8f45.yaml @@ -0,0 +1,58 @@ +id: textme-sms-integration-3832b3b7c5502757f733258a03de8f45 + +info: + name: > + TextMe SMS <= 1.9.0 - Missing Authorization via tetxme_update_option_page() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fb4ad52-a0b2-4645-bf0d-132b4ce8a0a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/textme-sms-integration/" + google-query: inurl:"/wp-content/plugins/textme-sms-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,textme-sms-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/textme-sms-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "textme-sms-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/textme-sms-integration-cc2369bd97072a25359057b15b301ff4.yaml b/nuclei-templates/cve-less/plugins/textme-sms-integration-cc2369bd97072a25359057b15b301ff4.yaml new file mode 100644 index 0000000000..1fa3b2f497 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/textme-sms-integration-cc2369bd97072a25359057b15b301ff4.yaml @@ -0,0 +1,58 @@ +id: textme-sms-integration-cc2369bd97072a25359057b15b301ff4 + +info: + name: > + TextMe SMS <= 1.8.8 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9821e51c-1042-47b8-b104-32f5651c31c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/textme-sms-integration/" + google-query: inurl:"/wp-content/plugins/textme-sms-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,textme-sms-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/textme-sms-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "textme-sms-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/texty-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/texty-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..74474b04ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/texty-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: texty-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/texty/" + google-query: inurl:"/wp-content/plugins/texty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,texty,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/texty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "texty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/texty-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/texty-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..ba626636a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/texty-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: texty-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/texty/" + google-query: inurl:"/wp-content/plugins/texty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,texty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/texty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "texty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tf-numbers-number-counter-animaton-0ca0bd9c39bf258c51c77483b135b8f5.yaml b/nuclei-templates/cve-less/plugins/tf-numbers-number-counter-animaton-0ca0bd9c39bf258c51c77483b135b8f5.yaml new file mode 100644 index 0000000000..d436e30e95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tf-numbers-number-counter-animaton-0ca0bd9c39bf258c51c77483b135b8f5.yaml @@ -0,0 +1,58 @@ +id: tf-numbers-number-counter-animaton-0ca0bd9c39bf258c51c77483b135b8f5 + +info: + name: > + Themeflection Numbers <= 1.8.1 - Authenticated(Subscriber+) Privilege Escalation via tf_numb_save_licenses + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db6616b5-4c4e-4cc7-83eb-22fac94f47f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tf-numbers-number-counter-animaton/" + google-query: inurl:"/wp-content/plugins/tf-numbers-number-counter-animaton/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tf-numbers-number-counter-animaton,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tf-numbers-number-counter-animaton/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tf-numbers-number-counter-animaton" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tfo-graphviz-04e03efeaf45c2f9ebc60f262f17a9a4.yaml b/nuclei-templates/cve-less/plugins/tfo-graphviz-04e03efeaf45c2f9ebc60f262f17a9a4.yaml new file mode 100644 index 0000000000..ba46865944 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tfo-graphviz-04e03efeaf45c2f9ebc60f262f17a9a4.yaml @@ -0,0 +1,58 @@ +id: tfo-graphviz-04e03efeaf45c2f9ebc60f262f17a9a4 + +info: + name: > + TFO Graphviz <= 1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ed5a9c4-5148-4c3f-81fd-78bdde31f258?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tfo-graphviz/" + google-query: inurl:"/wp-content/plugins/tfo-graphviz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tfo-graphviz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tfo-graphviz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tfo-graphviz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/th-advance-product-search-299542a4c8b3958179820e8901ce5f1d.yaml b/nuclei-templates/cve-less/plugins/th-advance-product-search-299542a4c8b3958179820e8901ce5f1d.yaml new file mode 100644 index 0000000000..43d4eef468 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/th-advance-product-search-299542a4c8b3958179820e8901ce5f1d.yaml @@ -0,0 +1,58 @@ +id: th-advance-product-search-299542a4c8b3958179820e8901ce5f1d + +info: + name: > + TH Advance Product Search <= 1.1.4 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9989f22-d5a0-453a-86e8-dc45c7cdd5dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/th-advance-product-search/" + google-query: inurl:"/wp-content/plugins/th-advance-product-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,th-advance-product-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/th-advance-product-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "th-advance-product-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/th-advance-product-search-9baae5fb51d9dd1141e1931574d9d7be.yaml b/nuclei-templates/cve-less/plugins/th-advance-product-search-9baae5fb51d9dd1141e1931574d9d7be.yaml new file mode 100644 index 0000000000..8d88d5eac4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/th-advance-product-search-9baae5fb51d9dd1141e1931574d9d7be.yaml @@ -0,0 +1,58 @@ +id: th-advance-product-search-9baae5fb51d9dd1141e1931574d9d7be + +info: + name: > + Multiple Plugins By ThemeHunk (Various Versions) - Missing Authorization via settings_init + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826a3fa2-ee41-4960-becb-0df8813a964a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/th-advance-product-search/" + google-query: inurl:"/wp-content/plugins/th-advance-product-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,th-advance-product-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/th-advance-product-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "th-advance-product-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/th-advance-product-search-9e3753c62120a17f21550a2c92d7d0fe.yaml b/nuclei-templates/cve-less/plugins/th-advance-product-search-9e3753c62120a17f21550a2c92d7d0fe.yaml new file mode 100644 index 0000000000..bb467df623 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/th-advance-product-search-9e3753c62120a17f21550a2c92d7d0fe.yaml @@ -0,0 +1,58 @@ +id: th-advance-product-search-9e3753c62120a17f21550a2c92d7d0fe + +info: + name: > + TH Advance Product Search <= 1.1.4 - Missing Authorization to Plugin Settings Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceb7d0a7-ea34-4c6f-a144-660debc74a9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/th-advance-product-search/" + google-query: inurl:"/wp-content/plugins/th-advance-product-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,th-advance-product-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/th-advance-product-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "th-advance-product-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/th-all-in-one-woo-cart-41d911400ca8ace536dfd110ed4dbc79.yaml b/nuclei-templates/cve-less/plugins/th-all-in-one-woo-cart-41d911400ca8ace536dfd110ed4dbc79.yaml new file mode 100644 index 0000000000..72541c7c96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/th-all-in-one-woo-cart-41d911400ca8ace536dfd110ed4dbc79.yaml @@ -0,0 +1,58 @@ +id: th-all-in-one-woo-cart-41d911400ca8ace536dfd110ed4dbc79 + +info: + name: > + TH Side Cart and Menu Cart for Woocommerce <= 1.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c0d18d3-8758-41ae-b104-dac69eee4ac9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/th-all-in-one-woo-cart/" + google-query: inurl:"/wp-content/plugins/th-all-in-one-woo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,th-all-in-one-woo-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/th-all-in-one-woo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "th-all-in-one-woo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/th-all-in-one-woo-cart-e7aa48c0891a8d823aef1576b3ef286e.yaml b/nuclei-templates/cve-less/plugins/th-all-in-one-woo-cart-e7aa48c0891a8d823aef1576b3ef286e.yaml new file mode 100644 index 0000000000..46d34ef414 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/th-all-in-one-woo-cart-e7aa48c0891a8d823aef1576b3ef286e.yaml @@ -0,0 +1,58 @@ +id: th-all-in-one-woo-cart-e7aa48c0891a8d823aef1576b3ef286e + +info: + name: > + TH Side Cart and Menu Cart for Woocommerce <= 1.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18f04566-3a63-41f3-aa9b-766304d56499?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/th-all-in-one-woo-cart/" + google-query: inurl:"/wp-content/plugins/th-all-in-one-woo-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,th-all-in-one-woo-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/th-all-in-one-woo-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "th-all-in-one-woo-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/th-product-compare-9baae5fb51d9dd1141e1931574d9d7be.yaml b/nuclei-templates/cve-less/plugins/th-product-compare-9baae5fb51d9dd1141e1931574d9d7be.yaml new file mode 100644 index 0000000000..dc10d9f074 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/th-product-compare-9baae5fb51d9dd1141e1931574d9d7be.yaml @@ -0,0 +1,58 @@ +id: th-product-compare-9baae5fb51d9dd1141e1931574d9d7be + +info: + name: > + Multiple Plugins By ThemeHunk (Various Versions) - Missing Authorization via settings_init + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826a3fa2-ee41-4960-becb-0df8813a964a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/th-product-compare/" + google-query: inurl:"/wp-content/plugins/th-product-compare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,th-product-compare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/th-product-compare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "th-product-compare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/th-variation-swatches-a125844e860a48204534272bc2a11b7b.yaml b/nuclei-templates/cve-less/plugins/th-variation-swatches-a125844e860a48204534272bc2a11b7b.yaml new file mode 100644 index 0000000000..191c2ab58f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/th-variation-swatches-a125844e860a48204534272bc2a11b7b.yaml @@ -0,0 +1,58 @@ +id: th-variation-swatches-a125844e860a48204534272bc2a11b7b + +info: + name: > + TH Variation Swatches <= 1.2.7 - Cross-Site Request Forgery via delete_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e98fb74-46f2-4a6a-8012-e2824bd77070?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/th-variation-swatches/" + google-query: inurl:"/wp-content/plugins/th-variation-swatches/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,th-variation-swatches,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/th-variation-swatches/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "th-variation-swatches" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/th23-social-f1d890dd18142758b1c8cdecbd50795b.yaml b/nuclei-templates/cve-less/plugins/th23-social-f1d890dd18142758b1c8cdecbd50795b.yaml new file mode 100644 index 0000000000..ad8a59c70f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/th23-social-f1d890dd18142758b1c8cdecbd50795b.yaml @@ -0,0 +1,58 @@ +id: th23-social-f1d890dd18142758b1c8cdecbd50795b + +info: + name: > + th23 Social <= 1.2.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6867d573-4ba1-4b82-b285-0696134d42fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/th23-social/" + google-query: inurl:"/wp-content/plugins/th23-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,th23-social,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/th23-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "th23-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thank-me-later-5e0fa9fcba55bce0a7d159ec1d8e3486.yaml b/nuclei-templates/cve-less/plugins/thank-me-later-5e0fa9fcba55bce0a7d159ec1d8e3486.yaml new file mode 100644 index 0000000000..2cc5602d4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thank-me-later-5e0fa9fcba55bce0a7d159ec1d8e3486.yaml @@ -0,0 +1,58 @@ +id: thank-me-later-5e0fa9fcba55bce0a7d159ec1d8e3486 + +info: + name: > + Thank Me Later <= 3.3.4 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d73fd485-cb59-42eb-9426-9b89299bb6bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thank-me-later/" + google-query: inurl:"/wp-content/plugins/thank-me-later/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thank-me-later,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thank-me-later/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thank-me-later" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thanks-you-counter-button-60056c59f58d08c739eaa4877baa7622.yaml b/nuclei-templates/cve-less/plugins/thanks-you-counter-button-60056c59f58d08c739eaa4877baa7622.yaml new file mode 100644 index 0000000000..2b9440de8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thanks-you-counter-button-60056c59f58d08c739eaa4877baa7622.yaml @@ -0,0 +1,58 @@ +id: thanks-you-counter-button-60056c59f58d08c739eaa4877baa7622 + +info: + name: > + Thank You Counter Button <= 1.9.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a984bd8-ca43-4676-9985-b111111c17ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thanks-you-counter-button/" + google-query: inurl:"/wp-content/plugins/thanks-you-counter-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thanks-you-counter-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thanks-you-counter-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thanks-you-counter-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-buffer-button-073c84bcdcba646c59175dbb887b7a95.yaml b/nuclei-templates/cve-less/plugins/the-buffer-button-073c84bcdcba646c59175dbb887b7a95.yaml new file mode 100644 index 0000000000..c32aa150b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-buffer-button-073c84bcdcba646c59175dbb887b7a95.yaml @@ -0,0 +1,58 @@ +id: the-buffer-button-073c84bcdcba646c59175dbb887b7a95 + +info: + name: > + The Buffer Button <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d5a9a2d-63d3-411c-af22-2829fd79c72b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-buffer-button/" + google-query: inurl:"/wp-content/plugins/the-buffer-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-buffer-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-buffer-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-buffer-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-events-calendar-15adc07dcc170bd663dc3c1e94fa94e1.yaml b/nuclei-templates/cve-less/plugins/the-events-calendar-15adc07dcc170bd663dc3c1e94fa94e1.yaml new file mode 100644 index 0000000000..d1fec87f21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-events-calendar-15adc07dcc170bd663dc3c1e94fa94e1.yaml @@ -0,0 +1,58 @@ +id: the-events-calendar-15adc07dcc170bd663dc3c1e94fa94e1 + +info: + name: > + The Events Calendar <= 4.8.1 - Cross-Site Scripting via tribe_paged Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2314cfeb-52e4-40c5-91e9-ebd7d7eab809?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-events-calendar/" + google-query: inurl:"/wp-content/plugins/the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-events-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-events-calendar-362ad579ac93dd9d0975339b992aaf7d.yaml b/nuclei-templates/cve-less/plugins/the-events-calendar-362ad579ac93dd9d0975339b992aaf7d.yaml new file mode 100644 index 0000000000..ab73028089 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-events-calendar-362ad579ac93dd9d0975339b992aaf7d.yaml @@ -0,0 +1,58 @@ +id: the-events-calendar-362ad579ac93dd9d0975339b992aaf7d + +info: + name: > + The Events Calendar <= 6.1.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c513e674-c027-4335-8ba3-b19696a1ce9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-events-calendar/" + google-query: inurl:"/wp-content/plugins/the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-events-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-events-calendar-55a397e3ac510c4f6b8de73dafe73c50.yaml b/nuclei-templates/cve-less/plugins/the-events-calendar-55a397e3ac510c4f6b8de73dafe73c50.yaml new file mode 100644 index 0000000000..a0b37fb7f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-events-calendar-55a397e3ac510c4f6b8de73dafe73c50.yaml @@ -0,0 +1,58 @@ +id: the-events-calendar-55a397e3ac510c4f6b8de73dafe73c50 + +info: + name: > + The Events Calendar <= 6.3.0 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30e0289c-b893-41bd-aad9-d7ec62bf2b23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-events-calendar/" + google-query: inurl:"/wp-content/plugins/the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-events-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-events-calendar-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/the-events-calendar-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3b91ac356f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-events-calendar-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: the-events-calendar-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-events-calendar/" + google-query: inurl:"/wp-content/plugins/the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-events-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.14.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-events-calendar-c982f06cdd6fece879cc973f1756a4e5.yaml b/nuclei-templates/cve-less/plugins/the-events-calendar-c982f06cdd6fece879cc973f1756a4e5.yaml new file mode 100644 index 0000000000..7640904db7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-events-calendar-c982f06cdd6fece879cc973f1756a4e5.yaml @@ -0,0 +1,58 @@ +id: the-events-calendar-c982f06cdd6fece879cc973f1756a4e5 + +info: + name: > + The Events Calendar < 4.1.1.1 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bb026a4-02b1-4422-8c78-9983c49df43e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-events-calendar/" + google-query: inurl:"/wp-content/plugins/the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-events-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-events-calendar-dce291168af66dac21606f747d77714a.yaml b/nuclei-templates/cve-less/plugins/the-events-calendar-dce291168af66dac21606f747d77714a.yaml new file mode 100644 index 0000000000..ab83deea00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-events-calendar-dce291168af66dac21606f747d77714a.yaml @@ -0,0 +1,58 @@ +id: the-events-calendar-dce291168af66dac21606f747d77714a + +info: + name: > + The Events Calendar <= 6.2.8 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8291fd89-aea1-4f7b-abd8-dee8438c3ed5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-events-calendar/" + google-query: inurl:"/wp-content/plugins/the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-events-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-events-calendar-eventbrite-tickets-86cd270f4cc1442525b2973b263a3c27.yaml b/nuclei-templates/cve-less/plugins/the-events-calendar-eventbrite-tickets-86cd270f4cc1442525b2973b263a3c27.yaml new file mode 100644 index 0000000000..d2ecb1dadd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-events-calendar-eventbrite-tickets-86cd270f4cc1442525b2973b263a3c27.yaml @@ -0,0 +1,58 @@ +id: the-events-calendar-eventbrite-tickets-86cd270f4cc1442525b2973b263a3c27 + +info: + name: > + The Events Calendar: Eventbrite Tickets < 3.10.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7346eeba-904b-4cf9-9d10-33a33120aea4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-events-calendar-eventbrite-tickets/" + google-query: inurl:"/wp-content/plugins/the-events-calendar-eventbrite-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-events-calendar-eventbrite-tickets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-events-calendar-eventbrite-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-events-calendar-eventbrite-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-events-calendar-f52eb0f0fb1dc47ee06378a3c186f4e1.yaml b/nuclei-templates/cve-less/plugins/the-events-calendar-f52eb0f0fb1dc47ee06378a3c186f4e1.yaml new file mode 100644 index 0000000000..aefef67359 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-events-calendar-f52eb0f0fb1dc47ee06378a3c186f4e1.yaml @@ -0,0 +1,58 @@ +id: the-events-calendar-f52eb0f0fb1dc47ee06378a3c186f4e1 + +info: + name: > + The Events Calendar <= 6.2.8.2 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc40196e-c0f3-4bc6-ac4b-b866902def61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-events-calendar/" + google-query: inurl:"/wp-content/plugins/the-events-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-events-calendar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-events-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-events-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-hackers-diet-e7aa2e734d6d80e9f42443bea3734579.yaml b/nuclei-templates/cve-less/plugins/the-hackers-diet-e7aa2e734d6d80e9f42443bea3734579.yaml new file mode 100644 index 0000000000..c7936109dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-hackers-diet-e7aa2e734d6d80e9f42443bea3734579.yaml @@ -0,0 +1,58 @@ +id: the-hackers-diet-e7aa2e734d6d80e9f42443bea3734579 + +info: + name: > + The Hacker's Diet <= 0.9.6b - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cbd298c-cba3-4986-b44c-a75b005b4340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-hackers-diet/" + google-query: inurl:"/wp-content/plugins/the-hackers-diet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-hackers-diet,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-hackers-diet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-hackers-diet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.6b') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-holiday-calendar-a669ab86f241324d8d2f2b22eaec997d.yaml b/nuclei-templates/cve-less/plugins/the-holiday-calendar-a669ab86f241324d8d2f2b22eaec997d.yaml new file mode 100644 index 0000000000..09c6472431 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-holiday-calendar-a669ab86f241324d8d2f2b22eaec997d.yaml @@ -0,0 +1,58 @@ +id: the-holiday-calendar-a669ab86f241324d8d2f2b22eaec997d + +info: + name: > + The Holiday Calendar < 1.11.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4211712-26b2-4f59-82b8-928e405cd08d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-holiday-calendar/" + google-query: inurl:"/wp-content/plugins/the-holiday-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-holiday-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-holiday-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-holiday-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-moneytizer-fb202acb909978e8641eabe44749f8ea.yaml b/nuclei-templates/cve-less/plugins/the-moneytizer-fb202acb909978e8641eabe44749f8ea.yaml new file mode 100644 index 0000000000..50a93e6db5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-moneytizer-fb202acb909978e8641eabe44749f8ea.yaml @@ -0,0 +1,58 @@ +id: the-moneytizer-fb202acb909978e8641eabe44749f8ea + +info: + name: > + The Moneytizer <= 9.5.20 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4d9e8fa-abc5-477a-bf99-dc910f0aabda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-moneytizer/" + google-query: inurl:"/wp-content/plugins/the-moneytizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-moneytizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-moneytizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-moneytizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.5.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-pack-addon-d8bfc01f0d93fad4fb2e1a339254a3ed.yaml b/nuclei-templates/cve-less/plugins/the-pack-addon-d8bfc01f0d93fad4fb2e1a339254a3ed.yaml new file mode 100644 index 0000000000..d313077c27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-pack-addon-d8bfc01f0d93fad4fb2e1a339254a3ed.yaml @@ -0,0 +1,58 @@ +id: the-pack-addon-d8bfc01f0d93fad4fb2e1a339254a3ed + +info: + name: > + The Pack Elementor addons (Header Footer & WooCommerce Builder, Template Library) <= 2.0.8.2 - Authenticated (Subscriber+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42de41f1-cfb2-4413-8841-c63d0e764be3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-pack-addon/" + google-query: inurl:"/wp-content/plugins/the-pack-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-pack-addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-pack-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-pack-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-pack-addon-e89c86876a9fa2c6c7251b6a1cdc42b1.yaml b/nuclei-templates/cve-less/plugins/the-pack-addon-e89c86876a9fa2c6c7251b6a1cdc42b1.yaml new file mode 100644 index 0000000000..c798971509 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-pack-addon-e89c86876a9fa2c6c7251b6a1cdc42b1.yaml @@ -0,0 +1,58 @@ +id: the-pack-addon-e89c86876a9fa2c6c7251b6a1cdc42b1 + +info: + name: > + The Pack Elementor addons (Header Footer & WooCommerce Builder, Template Library) <= 2.0.8.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8232ff9e-e8de-4bd1-9a73-2383a4a25b80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-pack-addon/" + google-query: inurl:"/wp-content/plugins/the-pack-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-pack-addon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-pack-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-pack-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-block-editor-64920ba860c3e3d6855bec6b3359aa95.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-block-editor-64920ba860c3e3d6855bec6b3359aa95.yaml new file mode 100644 index 0000000000..e0201e922f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-block-editor-64920ba860c3e3d6855bec6b3359aa95.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-block-editor-64920ba860c3e3d6855bec6b3359aa95 + +info: + name: > + The Plus Blocks for Block Editor | Gutenberg <= 3.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c3f1202-886a-471c-9b93-0efbf4282618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-block-editor/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-block-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-block-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-block-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-block-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-block-editor-fdbe6ed30963d2d89b9e4d6d9ea6d03d.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-block-editor-fdbe6ed30963d2d89b9e4d6d9ea6d03d.yaml new file mode 100644 index 0000000000..ac5183d9cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-block-editor-fdbe6ed30963d2d89b9e4d6d9ea6d03d.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-block-editor-fdbe6ed30963d2d89b9e4d6d9ea6d03d + +info: + name: > + The Plus Blocks for Block Editor | Gutenberg <= 3.2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d6c19e2-b280-4937-8f66-eac1da3cd365?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-block-editor/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-block-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-block-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-block-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-block-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-20984fc62bd28bb51dbd02e6ae5eacfc.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-20984fc62bd28bb51dbd02e6ae5eacfc.yaml new file mode 100644 index 0000000000..4b53f2b5ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-20984fc62bd28bb51dbd02e6ae5eacfc.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-20984fc62bd28bb51dbd02e6ae5eacfc + +info: + name: > + The Plus Addons for Elementor <= 5.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af650c7a-c413-4f4a-9e4b-8ddcd8da5397?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-28b13ccb507cfeb174aa819fc3235b5f.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-28b13ccb507cfeb174aa819fc3235b5f.yaml new file mode 100644 index 0000000000..9560895ccf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-28b13ccb507cfeb174aa819fc3235b5f.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-28b13ccb507cfeb174aa819fc3235b5f + +info: + name: > + The Plus Addons for Elementor PRO <= 4.1.9 & The Plus Addons for Elementor <= 2.0.6 - Authenticated (Contributor+) Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa698e7e-b1c7-4ead-aa2e-7fbfc9dfac80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.0', '<= 4.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-3835c81a3b054f8f577b5a29958ca111.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-3835c81a3b054f8f577b5a29958ca111.yaml new file mode 100644 index 0000000000..1db03b7ad7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-3835c81a3b054f8f577b5a29958ca111.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-3835c81a3b054f8f577b5a29958ca111 + +info: + name: > + The Plus Addons for Elementor Page Builder Lite < 2.0.6 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7707ca04-e136-4d4b-869b-cd270359991e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-3d06eee6979cba3a65776c3770040194.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-3d06eee6979cba3a65776c3770040194.yaml new file mode 100644 index 0000000000..d77faccc81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-3d06eee6979cba3a65776c3770040194.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-3d06eee6979cba3a65776c3770040194 + +info: + name: > + The Plus Addons for Elementor <= 5.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab15fe2b-974c-41b0-ab6b-68322d2d3396?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-421c48e1cd35997d3959562c69cf5279.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-421c48e1cd35997d3959562c69cf5279.yaml new file mode 100644 index 0000000000..fbb932e028 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-421c48e1cd35997d3959562c69cf5279.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-421c48e1cd35997d3959562c69cf5279 + +info: + name: > + The Plus Addons for Elementor <= 5.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting Header Meta Content Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0b3d83b-9695-40c5-b6ee-2a76c940de6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-53696e5218de6a7c32a3a9109583afd7.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-53696e5218de6a7c32a3a9109583afd7.yaml new file mode 100644 index 0000000000..50d15f40b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-53696e5218de6a7c32a3a9109583afd7.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-53696e5218de6a7c32a3a9109583afd7 + +info: + name: > + The Plus Addons for Elementor <= 5.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e66b5c12-3acb-41f7-ae5f-8a9130053e45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-6b109b8afc142f70c57afa63265ae2e5.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-6b109b8afc142f70c57afa63265ae2e5.yaml new file mode 100644 index 0000000000..89d8cc95ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-6b109b8afc142f70c57afa63265ae2e5.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-6b109b8afc142f70c57afa63265ae2e5 + +info: + name: > + The Plus Addons for Elementor <= 5.4.1 - Authenticated (Contributor+) Local File Inclusion via Clients Widget + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc7ff863-3a8e-41cd-ae20-78bb4577c16a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-712959520f4dede71b7a2d9e44002c33.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-712959520f4dede71b7a2d9e44002c33.yaml new file mode 100644 index 0000000000..0109fa3475 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-712959520f4dede71b7a2d9e44002c33.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-712959520f4dede71b7a2d9e44002c33 + +info: + name: > + The Plus Addons for Elementor <= 5.4.1 - Authenticated (Contributor+) Local File Inclusion via Team Member Listing + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30579058-54f4-4496-9275-078faf99823f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-ad74c1853755393f0d665754f820d681.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-ad74c1853755393f0d665754f820d681.yaml new file mode 100644 index 0000000000..e38c7751d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-ad74c1853755393f0d665754f820d681.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-ad74c1853755393f0d665754f820d681 + +info: + name: > + The Plus Addons for Elementor PRO <= 4.1.9 & The Plus Addons for Elementor <= 2.0.6 - Authenticated (Contributor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96388c82-2392-42b3-b0a0-c3d92910fb5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-c3136cf32a8ee994d42daa37c82bd5e1.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-c3136cf32a8ee994d42daa37c82bd5e1.yaml new file mode 100644 index 0000000000..efe7c15c24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-c3136cf32a8ee994d42daa37c82bd5e1.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-c3136cf32a8ee994d42daa37c82bd5e1 + +info: + name: > + The Plus Addons for Elementor <= 5.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a412e682-869a-46ba-a2d0-d84ed542adc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-cd4c918fd5ff72f1664fbf0ef99c4299.yaml b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-cd4c918fd5ff72f1664fbf0ef99c4299.yaml new file mode 100644 index 0000000000..642e7f5d60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-plus-addons-for-elementor-page-builder-cd4c918fd5ff72f1664fbf0ef99c4299.yaml @@ -0,0 +1,58 @@ +id: the-plus-addons-for-elementor-page-builder-cd4c918fd5ff72f1664fbf0ef99c4299 + +info: + name: > + The Plus Addons for Elementor <= 5.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Age Gate + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0117436-7a2a-42f3-8c05-75dfddfb9d09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-plus-addons-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-post-grid-6d37d0911eec8eaf770eb1eec58145bc.yaml b/nuclei-templates/cve-less/plugins/the-post-grid-6d37d0911eec8eaf770eb1eec58145bc.yaml new file mode 100644 index 0000000000..6cd6ca042c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-post-grid-6d37d0911eec8eaf770eb1eec58145bc.yaml @@ -0,0 +1,58 @@ +id: the-post-grid-6d37d0911eec8eaf770eb1eec58145bc + +info: + name: > + The Post Grid – Shortcode, Gutenberg Blocks and Elementor Addon for Post Grid <= 5.0.4 - Cross-Site Request Forgery in rttpg_spare_me + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b352be87-ea61-4666-a4d0-cf93fef40e33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-post-grid/" + google-query: inurl:"/wp-content/plugins/the-post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-post-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-post-grid-aa24420637d5fac56ca63b2271fa8b9f.yaml b/nuclei-templates/cve-less/plugins/the-post-grid-aa24420637d5fac56ca63b2271fa8b9f.yaml new file mode 100644 index 0000000000..1a032eaa6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-post-grid-aa24420637d5fac56ca63b2271fa8b9f.yaml @@ -0,0 +1,58 @@ +id: the-post-grid-aa24420637d5fac56ca63b2271fa8b9f + +info: + name: > + The Post Grid – Shortcode, Gutenberg Blocks and Elementor Addon for Post Grid <= 7.6.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4ef2ced-3c82-4379-8b14-1cf11482fd35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-post-grid/" + google-query: inurl:"/wp-content/plugins/the-post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-post-grid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-post-grid-dc7632e71a497cfee47279611e30245e.yaml b/nuclei-templates/cve-less/plugins/the-post-grid-dc7632e71a497cfee47279611e30245e.yaml new file mode 100644 index 0000000000..00c6129734 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-post-grid-dc7632e71a497cfee47279611e30245e.yaml @@ -0,0 +1,58 @@ +id: the-post-grid-dc7632e71a497cfee47279611e30245e + +info: + name: > + The Post Grid <= 7.2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7de4282f-157b-4ba0-b400-e4e9982beb31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-post-grid/" + google-query: inurl:"/wp-content/plugins/the-post-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-post-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-post-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-post-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-sorter-ca1b64ffb0ccae02fca2d23bb2d6ec12.yaml b/nuclei-templates/cve-less/plugins/the-sorter-ca1b64ffb0ccae02fca2d23bb2d6ec12.yaml new file mode 100644 index 0000000000..141e9e7d4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-sorter-ca1b64ffb0ccae02fca2d23bb2d6ec12.yaml @@ -0,0 +1,58 @@ +id: the-sorter-ca1b64ffb0ccae02fca2d23bb2d6ec12 + +info: + name: > + The Sorter <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64b10a7d-ca11-47ec-ba8a-e2b838fd8a2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-sorter/" + google-query: inurl:"/wp-content/plugins/the-sorter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-sorter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-sorter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-sorter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/the-very-simple-vimeo-shortcode-be0ba3aacccf6ba5116887341d902b74.yaml b/nuclei-templates/cve-less/plugins/the-very-simple-vimeo-shortcode-be0ba3aacccf6ba5116887341d902b74.yaml new file mode 100644 index 0000000000..ce9c732aae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/the-very-simple-vimeo-shortcode-be0ba3aacccf6ba5116887341d902b74.yaml @@ -0,0 +1,58 @@ +id: the-very-simple-vimeo-shortcode-be0ba3aacccf6ba5116887341d902b74 + +info: + name: > + Simple Vimeo Shortcode <= 2.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66edd8e5-1d5e-425d-a4f4-5359683c1e36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/the-very-simple-vimeo-shortcode/" + google-query: inurl:"/wp-content/plugins/the-very-simple-vimeo-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,the-very-simple-vimeo-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/the-very-simple-vimeo-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-very-simple-vimeo-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theatre-69bd71812f8b19e052624d1ea9f84cfd.yaml b/nuclei-templates/cve-less/plugins/theatre-69bd71812f8b19e052624d1ea9f84cfd.yaml new file mode 100644 index 0000000000..1e97838852 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theatre-69bd71812f8b19e052624d1ea9f84cfd.yaml @@ -0,0 +1,58 @@ +id: theatre-69bd71812f8b19e052624d1ea9f84cfd + +info: + name: > + Theater for WordPress <= 0.18.3 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0fdad22-5aee-468f-885c-f65c068cf413?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theatre/" + google-query: inurl:"/wp-content/plugins/theatre/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theatre,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theatre/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theatre" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thecartpress-0918a1cd67495fb4f2501b4a07ebe974.yaml b/nuclei-templates/cve-less/plugins/thecartpress-0918a1cd67495fb4f2501b4a07ebe974.yaml new file mode 100644 index 0000000000..1a01e51c3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thecartpress-0918a1cd67495fb4f2501b4a07ebe974.yaml @@ -0,0 +1,58 @@ +id: thecartpress-0918a1cd67495fb4f2501b4a07ebe974 + +info: + name: > + TheCartPress eCommerce Shopping Cart <= 1.5.3.6 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8150619-9710-4dc0-ab62-ffd3e9fa8cd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thecartpress/" + google-query: inurl:"/wp-content/plugins/thecartpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thecartpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thecartpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thecartpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thecartpress-380b3f09b95ab564acee2d8952a33e71.yaml b/nuclei-templates/cve-less/plugins/thecartpress-380b3f09b95ab564acee2d8952a33e71.yaml new file mode 100644 index 0000000000..51db0ab82e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thecartpress-380b3f09b95ab564acee2d8952a33e71.yaml @@ -0,0 +1,58 @@ +id: thecartpress-380b3f09b95ab564acee2d8952a33e71 + +info: + name: > + TheCartPress eCommerce Shopping Cart <= 1.5.3.6 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b26dd2e-3d0b-4c6b-8819-6d1e437207fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thecartpress/" + google-query: inurl:"/wp-content/plugins/thecartpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thecartpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thecartpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thecartpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thecartpress-566549d4981430f7717caf8e709d7d50.yaml b/nuclei-templates/cve-less/plugins/thecartpress-566549d4981430f7717caf8e709d7d50.yaml new file mode 100644 index 0000000000..2b078b23b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thecartpress-566549d4981430f7717caf8e709d7d50.yaml @@ -0,0 +1,58 @@ +id: thecartpress-566549d4981430f7717caf8e709d7d50 + +info: + name: > + TheCartPress eCommerce Shopping Cart <= 1.5.3.6 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73a049de-f4b2-4b87-a78b-62cd333853b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thecartpress/" + google-query: inurl:"/wp-content/plugins/thecartpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thecartpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thecartpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thecartpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thecartpress-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml b/nuclei-templates/cve-less/plugins/thecartpress-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml new file mode 100644 index 0000000000..debd69b321 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thecartpress-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml @@ -0,0 +1,58 @@ +id: thecartpress-c4a1c6ea67bd01790c36ea2fb1f58bd3 + +info: + name: > + TheCartPress eCommerce Shopping Cart <= 1.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caae093e-58e8-48b1-8665-2a5f49e98c58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thecartpress/" + google-query: inurl:"/wp-content/plugins/thecartpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thecartpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thecartpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thecartpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thecartpress-e7c178a2471ea08f4ec99b9eb663cf05.yaml b/nuclei-templates/cve-less/plugins/thecartpress-e7c178a2471ea08f4ec99b9eb663cf05.yaml new file mode 100644 index 0000000000..e90b9cfc1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thecartpress-e7c178a2471ea08f4ec99b9eb663cf05.yaml @@ -0,0 +1,58 @@ +id: thecartpress-e7c178a2471ea08f4ec99b9eb663cf05 + +info: + name: > + TheCartPress eCommerce Shopping Cart <= 1.5.3.6 Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8593b14e-672d-43b8-b516-d068cbd735b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thecartpress/" + google-query: inurl:"/wp-content/plugins/thecartpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thecartpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thecartpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thecartpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-blvd-layout-builder-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/plugins/theme-blvd-layout-builder-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..c983eb2386 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-blvd-layout-builder-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: theme-blvd-layout-builder-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-blvd-layout-builder/" + google-query: inurl:"/wp-content/plugins/theme-blvd-layout-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-blvd-layout-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-blvd-layout-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-blvd-layout-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-blvd-responsive-google-maps-9be84376d34a812060ad8aba2e71f1f0.yaml b/nuclei-templates/cve-less/plugins/theme-blvd-responsive-google-maps-9be84376d34a812060ad8aba2e71f1f0.yaml new file mode 100644 index 0000000000..2d639e27da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-blvd-responsive-google-maps-9be84376d34a812060ad8aba2e71f1f0.yaml @@ -0,0 +1,58 @@ +id: theme-blvd-responsive-google-maps-9be84376d34a812060ad8aba2e71f1f0 + +info: + name: > + Theme Blvd Responsive Google Maps <= 1.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d97761cb-8645-474d-9f9a-15ecdd426db4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-blvd-responsive-google-maps/" + google-query: inurl:"/wp-content/plugins/theme-blvd-responsive-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-blvd-responsive-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-blvd-responsive-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-blvd-responsive-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-blvd-shortcodes-7ba8529af3436a78498f1c21893b7e85.yaml b/nuclei-templates/cve-less/plugins/theme-blvd-shortcodes-7ba8529af3436a78498f1c21893b7e85.yaml new file mode 100644 index 0000000000..7552b49dda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-blvd-shortcodes-7ba8529af3436a78498f1c21893b7e85.yaml @@ -0,0 +1,58 @@ +id: theme-blvd-shortcodes-7ba8529af3436a78498f1c21893b7e85 + +info: + name: > + Theme Blvd Shortcodes <= 1.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88809668-ea6b-41df-b2a7-ffe03a931c86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-blvd-shortcodes/" + google-query: inurl:"/wp-content/plugins/theme-blvd-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-blvd-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-blvd-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-blvd-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-blvd-shortcodes-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/plugins/theme-blvd-shortcodes-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..ede3c23e1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-blvd-shortcodes-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: theme-blvd-shortcodes-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-blvd-shortcodes/" + google-query: inurl:"/wp-content/plugins/theme-blvd-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-blvd-shortcodes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-blvd-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-blvd-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-blvd-sliders-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/plugins/theme-blvd-sliders-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..4becddf552 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-blvd-sliders-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: theme-blvd-sliders-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-blvd-sliders/" + google-query: inurl:"/wp-content/plugins/theme-blvd-sliders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-blvd-sliders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-blvd-sliders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-blvd-sliders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-blvd-widget-areas-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/plugins/theme-blvd-widget-areas-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..2426328e70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-blvd-widget-areas-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: theme-blvd-widget-areas-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-blvd-widget-areas/" + google-query: inurl:"/wp-content/plugins/theme-blvd-widget-areas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-blvd-widget-areas,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-blvd-widget-areas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-blvd-widget-areas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-demo-import-42bbb29a21ceaaa3011864640412a5ea.yaml b/nuclei-templates/cve-less/plugins/theme-demo-import-42bbb29a21ceaaa3011864640412a5ea.yaml new file mode 100644 index 0000000000..ea14cc37f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-demo-import-42bbb29a21ceaaa3011864640412a5ea.yaml @@ -0,0 +1,58 @@ +id: theme-demo-import-42bbb29a21ceaaa3011864640412a5ea + +info: + name: > + Theme Demo Import <= 1.1.1 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/186180ed-321f-4618-8828-65b93fa054a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-demo-import/" + google-query: inurl:"/wp-content/plugins/theme-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-demo-import-acd2f33fed5535f04cc63cbd673f8668.yaml b/nuclei-templates/cve-less/plugins/theme-demo-import-acd2f33fed5535f04cc63cbd673f8668.yaml new file mode 100644 index 0000000000..e1897a027a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-demo-import-acd2f33fed5535f04cc63cbd673f8668.yaml @@ -0,0 +1,58 @@ +id: theme-demo-import-acd2f33fed5535f04cc63cbd673f8668 + +info: + name: > + Theme Demo Import <= 1.1.1 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9636b15-1259-4c6e-8691-b1d573ef0417?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-demo-import/" + google-query: inurl:"/wp-content/plugins/theme-demo-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-demo-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-demo-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-demo-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-editor-2dfa0b8f134cf415442ecf4c309e85d2.yaml b/nuclei-templates/cve-less/plugins/theme-editor-2dfa0b8f134cf415442ecf4c309e85d2.yaml new file mode 100644 index 0000000000..6673944fe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-editor-2dfa0b8f134cf415442ecf4c309e85d2.yaml @@ -0,0 +1,58 @@ +id: theme-editor-2dfa0b8f134cf415442ecf4c309e85d2 + +info: + name: > + Theme Editor <= 2.5 - Authenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d81b2927-f855-48f2-b7ae-f1411bee0040?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-editor/" + google-query: inurl:"/wp-content/plugins/theme-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-editor-eb3be0c0cf31ccd39967171afebb18b6.yaml b/nuclei-templates/cve-less/plugins/theme-editor-eb3be0c0cf31ccd39967171afebb18b6.yaml new file mode 100644 index 0000000000..b1273d9f53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-editor-eb3be0c0cf31ccd39967171afebb18b6.yaml @@ -0,0 +1,58 @@ +id: theme-editor-eb3be0c0cf31ccd39967171afebb18b6 + +info: + name: > + Theme Editor <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98286172-99b0-43d6-9876-972e270aa19f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-editor/" + google-query: inurl:"/wp-content/plugins/theme-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-editor-fd1e677494c37ae823f0277f9b7da0c4.yaml b/nuclei-templates/cve-less/plugins/theme-editor-fd1e677494c37ae823f0277f9b7da0c4.yaml new file mode 100644 index 0000000000..ec61df73b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-editor-fd1e677494c37ae823f0277f9b7da0c4.yaml @@ -0,0 +1,58 @@ +id: theme-editor-fd1e677494c37ae823f0277f9b7da0c4 + +info: + name: > + Theme Editor <= 2.7.1 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6ede290-a6c4-4c13-872b-60c9601d39db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-editor/" + google-query: inurl:"/wp-content/plugins/theme-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-junkie-shortcodes-4f1dddafa18fba59ec7aef53cc2b0d3d.yaml b/nuclei-templates/cve-less/plugins/theme-junkie-shortcodes-4f1dddafa18fba59ec7aef53cc2b0d3d.yaml new file mode 100644 index 0000000000..232d935aec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-junkie-shortcodes-4f1dddafa18fba59ec7aef53cc2b0d3d.yaml @@ -0,0 +1,58 @@ +id: theme-junkie-shortcodes-4f1dddafa18fba59ec7aef53cc2b0d3d + +info: + name: > + TJ Shortcodes 0.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f88ef4cf-3f22-40e0-b651-59cb40f148fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-junkie-shortcodes/" + google-query: inurl:"/wp-content/plugins/theme-junkie-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-junkie-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-junkie-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-junkie-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-minifier-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/theme-minifier-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..18df759e31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-minifier-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: theme-minifier-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-minifier/" + google-query: inurl:"/wp-content/plugins/theme-minifier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-minifier,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-minifier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-minifier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-my-login-755306c8577963b7e9a15f996cc38136.yaml b/nuclei-templates/cve-less/plugins/theme-my-login-755306c8577963b7e9a15f996cc38136.yaml new file mode 100644 index 0000000000..aff2e7d194 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-my-login-755306c8577963b7e9a15f996cc38136.yaml @@ -0,0 +1,58 @@ +id: theme-my-login-755306c8577963b7e9a15f996cc38136 + +info: + name: > + Theme My Login <= 7.1.6 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e56d98b5-ae38-4059-bc32-d0fffd326740?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-my-login/" + google-query: inurl:"/wp-content/plugins/theme-my-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-my-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-my-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-my-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-my-login-ef20cf055251e93d9b846f8776b699ac.yaml b/nuclei-templates/cve-less/plugins/theme-my-login-ef20cf055251e93d9b846f8776b699ac.yaml new file mode 100644 index 0000000000..bcea51b0df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-my-login-ef20cf055251e93d9b846f8776b699ac.yaml @@ -0,0 +1,58 @@ +id: theme-my-login-ef20cf055251e93d9b846f8776b699ac + +info: + name: > + Theme My Login <= 6.3.9 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fee990a-8ac0-40a2-9f25-96defd62263d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-my-login/" + google-query: inurl:"/wp-content/plugins/theme-my-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-my-login,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-my-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-my-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-per-user-220d44d27b32ec5f1770ce6de644f463.yaml b/nuclei-templates/cve-less/plugins/theme-per-user-220d44d27b32ec5f1770ce6de644f463.yaml new file mode 100644 index 0000000000..8fc14a1070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-per-user-220d44d27b32ec5f1770ce6de644f463.yaml @@ -0,0 +1,58 @@ +id: theme-per-user-220d44d27b32ec5f1770ce6de644f463 + +info: + name: > + Theme per user <= 1.0.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc7e6844-23e2-4523-8261-21d4cba87db3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-per-user/" + google-query: inurl:"/wp-content/plugins/theme-per-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-per-user,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-per-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-per-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-switcha-b4a41681eefe755efd70571167096dd9.yaml b/nuclei-templates/cve-less/plugins/theme-switcha-b4a41681eefe755efd70571167096dd9.yaml new file mode 100644 index 0000000000..7f05848333 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-switcha-b4a41681eefe755efd70571167096dd9.yaml @@ -0,0 +1,58 @@ +id: theme-switcha-b4a41681eefe755efd70571167096dd9 + +info: + name: > + Theme Switcha <= 3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b0937fe-3ea6-427a-aef7-539c08687abb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-switcha/" + google-query: inurl:"/wp-content/plugins/theme-switcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-switcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-switcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-switcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-test-drive-9aa568df84b066bcc0755624fabcc470.yaml b/nuclei-templates/cve-less/plugins/theme-test-drive-9aa568df84b066bcc0755624fabcc470.yaml new file mode 100644 index 0000000000..4bb38ade35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-test-drive-9aa568df84b066bcc0755624fabcc470.yaml @@ -0,0 +1,58 @@ +id: theme-test-drive-9aa568df84b066bcc0755624fabcc470 + +info: + name: > + Theme Test Drive <= 2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9de946c-941a-41d7-b1c4-440b4fcec9b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-test-drive/" + google-query: inurl:"/wp-content/plugins/theme-test-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-test-drive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-test-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-test-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-translation-for-polylang-f5d278de8a6f52f6b1d00da3aecdfc57.yaml b/nuclei-templates/cve-less/plugins/theme-translation-for-polylang-f5d278de8a6f52f6b1d00da3aecdfc57.yaml new file mode 100644 index 0000000000..3cb52a4662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-translation-for-polylang-f5d278de8a6f52f6b1d00da3aecdfc57.yaml @@ -0,0 +1,58 @@ +id: theme-translation-for-polylang-f5d278de8a6f52f6b1d00da3aecdfc57 + +info: + name: > + Theme and plugin translation for Polylang <= 3.2.16 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f6a358a-333c-4eb7-9149-348bf3713943?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-translation-for-polylang/" + google-query: inurl:"/wp-content/plugins/theme-translation-for-polylang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-translation-for-polylang,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-translation-for-polylang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-translation-for-polylang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-tuner-66f3161d1022633589022b156d74abba.yaml b/nuclei-templates/cve-less/plugins/theme-tuner-66f3161d1022633589022b156d74abba.yaml new file mode 100644 index 0000000000..a65774e2c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-tuner-66f3161d1022633589022b156d74abba.yaml @@ -0,0 +1,58 @@ +id: theme-tuner-66f3161d1022633589022b156d74abba + +info: + name: > + Theme Tuner < 0.8 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3b9ccb1-3854-4aa6-9f03-ff7f861ecc14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-tuner/" + google-query: inurl:"/wp-content/plugins/theme-tuner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-tuner,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-tuner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-tuner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theme-tweaker-lite-f61528b18c019a7fd52fbe924751e5b4.yaml b/nuclei-templates/cve-less/plugins/theme-tweaker-lite-f61528b18c019a7fd52fbe924751e5b4.yaml new file mode 100644 index 0000000000..2872e7c509 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theme-tweaker-lite-f61528b18c019a7fd52fbe924751e5b4.yaml @@ -0,0 +1,58 @@ +id: theme-tweaker-lite-f61528b18c019a7fd52fbe924751e5b4 + +info: + name: > + Theme Tweaker <= 5.20 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dd67111-514f-4f7d-8cdd-7b10ea718530?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theme-tweaker-lite/" + google-query: inurl:"/wp-content/plugins/theme-tweaker-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theme-tweaker-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theme-tweaker-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theme-tweaker-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themegrill-demo-importer-96a6eb43348a230ce62c16f4c805f2b0.yaml b/nuclei-templates/cve-less/plugins/themegrill-demo-importer-96a6eb43348a230ce62c16f4c805f2b0.yaml new file mode 100644 index 0000000000..338a0c9cfa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themegrill-demo-importer-96a6eb43348a230ce62c16f4c805f2b0.yaml @@ -0,0 +1,58 @@ +id: themegrill-demo-importer-96a6eb43348a230ce62c16f4c805f2b0 + +info: + name: > + ThemeGrill Demo Importer 1.3.4 - 1.6.1 - Authorization Bypass to Site Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c0dc694-854e-4f96-8c2d-7251c41a3ee9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themegrill-demo-importer/" + google-query: inurl:"/wp-content/plugins/themegrill-demo-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themegrill-demo-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themegrill-demo-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themegrill-demo-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.3.4', '<= 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-058a642e0573877c079f2c954605d344.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-058a642e0573877c079f2c954605d344.yaml new file mode 100644 index 0000000000..71c7b3e9fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-058a642e0573877c079f2c954605d344.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-058a642e0573877c079f2c954605d344 + +info: + name: > + Orbit Fox Companion <= 2.10.26 - Authenticated (Contributor+) Stored Cross-Site Scripting via custom fields + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23e39019-c322-4027-84f2-faabd9ca4983?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-0b0a53122105422e3ec1a7c6051d3302.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-0b0a53122105422e3ec1a7c6051d3302.yaml new file mode 100644 index 0000000000..39ff1cceb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-0b0a53122105422e3ec1a7c6051d3302.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-0b0a53122105422e3ec1a7c6051d3302 + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.29 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88f6a24f-f14a-4d0a-be5a-f8c84910b4fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-175f5f197d39e1751001f35acbaf01df.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-175f5f197d39e1751001f35acbaf01df.yaml new file mode 100644 index 0000000000..7b3e92aa21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-175f5f197d39e1751001f35acbaf01df.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-175f5f197d39e1751001f35acbaf01df + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.2 - Authenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53c9d3d0-5fea-4e36-b356-8d3c0e672cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-46672cc6093b70f0f99b8c9c1af2d835.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-46672cc6093b70f0f99b8c9c1af2d835.yaml new file mode 100644 index 0000000000..936fe9eada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-46672cc6093b70f0f99b8c9c1af2d835.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-46672cc6093b70f0f99b8c9c1af2d835 + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.32 - Authenticated (Contributor+) Stored Cross-Site Scripiting via Registration Form Widget + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/020052ba-dece-4e70-88e7-8bd8918b8376?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-6440d16b09a3de3d5784ee99cd71888c.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-6440d16b09a3de3d5784ee99cd71888c.yaml new file mode 100644 index 0000000000..0b365fc4bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-6440d16b09a3de3d5784ee99cd71888c.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-6440d16b09a3de3d5784ee99cd71888c + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.30 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0241a9fc-ce42-4a97-9f33-f07cf53c0f52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-6738f168d7a8aa50cafb43b72d6946b9.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-6738f168d7a8aa50cafb43b72d6946b9.yaml new file mode 100644 index 0000000000..9656f301e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-6738f168d7a8aa50cafb43b72d6946b9.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-6738f168d7a8aa50cafb43b72d6946b9 + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.27 - Authenticated(Contributor+) Stored Cross-site Scripting via Pricing Table Elementor Widget + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecc5a17e-c716-48bd-9b4d-49d870ae6bf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-6f08ab84e1cb8caf7e2c6c058fbbbb3c.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-6f08ab84e1cb8caf7e2c6c058fbbbb3c.yaml new file mode 100644 index 0000000000..ed46830657 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-6f08ab84e1cb8caf7e2c6c058fbbbb3c.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-6f08ab84e1cb8caf7e2c6c058fbbbb3c + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.30 - Authenticated (Contributor+) Stored Cross-Site Scripting via form widget addr2_width attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4603b58-0972-4e04-91ac-ffc846964722?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-79fb0bcc374a70f9a1181c9553d664f5.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-79fb0bcc374a70f9a1181c9553d664f5.yaml new file mode 100644 index 0000000000..991de5ead7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-79fb0bcc374a70f9a1181c9553d664f5.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-79fb0bcc374a70f9a1181c9553d664f5 + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.2 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b964df21-5648-4fe1-b2a7-99f8a0f02026?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-911f38a48744ee0cba908ae42a0febe1.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-911f38a48744ee0cba908ae42a0febe1.yaml new file mode 100644 index 0000000000..27bfba26df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-911f38a48744ee0cba908ae42a0febe1.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-911f38a48744ee0cba908ae42a0febe1 + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.30 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df40eb21-2080-4de5-9055-09246a8a275e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..9303ea10cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-a3f525d7b3a02a872519446805f2e5b1.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-a3f525d7b3a02a872519446805f2e5b1.yaml new file mode 100644 index 0000000000..657230f0f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-a3f525d7b3a02a872519446805f2e5b1.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-a3f525d7b3a02a872519446805f2e5b1 + +info: + name: > + Orbit Fox by ThemeIsle <= 2.6.3 - Improper REST Capabilities Checks + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f53e5192-e809-400c-aed9-36b5d6415a9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themeisle-companion-f0869bd6c833a2dcca8d781669a8f39f.yaml b/nuclei-templates/cve-less/plugins/themeisle-companion-f0869bd6c833a2dcca8d781669a8f39f.yaml new file mode 100644 index 0000000000..c193eda480 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themeisle-companion-f0869bd6c833a2dcca8d781669a8f39f.yaml @@ -0,0 +1,58 @@ +id: themeisle-companion-f0869bd6c833a2dcca8d781669a8f39f + +info: + name: > + Orbit Fox by ThemeIsle <= 2.10.23 - Authenticated (Author+) Server-Side Request Forgery via URL + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c30b925-47ca-4e14-a418-d9524648db2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themeisle-companion/" + google-query: inurl:"/wp-content/plugins/themeisle-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themeisle-companion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themeisle-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themesflat-addons-for-elementor-6e2990d184d8844f6771deadef053685.yaml b/nuclei-templates/cve-less/plugins/themesflat-addons-for-elementor-6e2990d184d8844f6771deadef053685.yaml new file mode 100644 index 0000000000..c8374af33c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themesflat-addons-for-elementor-6e2990d184d8844f6771deadef053685.yaml @@ -0,0 +1,58 @@ +id: themesflat-addons-for-elementor-6e2990d184d8844f6771deadef053685 + +info: + name: > + Themesflat Addons For Elementor <= 2.0.0 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f33d080c-6d64-46d1-b01c-ef859106159f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themesflat-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/themesflat-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themesflat-addons-for-elementor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themesflat-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themesflat-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-builder-30397736441a65fb1b71b67544e3f42a.yaml b/nuclei-templates/cve-less/plugins/themify-builder-30397736441a65fb1b71b67544e3f42a.yaml new file mode 100644 index 0000000000..50f0795069 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-builder-30397736441a65fb1b71b67544e3f42a.yaml @@ -0,0 +1,58 @@ +id: themify-builder-30397736441a65fb1b71b67544e3f42a + +info: + name: > + Themify Builder <= 5.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f62713c9-bf87-44be-9b7e-c088989bad77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-builder/" + google-query: inurl:"/wp-content/plugins/themify-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-builder-a4983d33df5e385e92545ad0082911fc.yaml b/nuclei-templates/cve-less/plugins/themify-builder-a4983d33df5e385e92545ad0082911fc.yaml new file mode 100644 index 0000000000..fbfceb83f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-builder-a4983d33df5e385e92545ad0082911fc.yaml @@ -0,0 +1,58 @@ +id: themify-builder-a4983d33df5e385e92545ad0082911fc + +info: + name: > + Themify Builder <= 7.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6840c91f-a5d9-4940-8a08-d62acc5d43eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-builder/" + google-query: inurl:"/wp-content/plugins/themify-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-event-post-9036b0b68d189e2a08606b1361a322c6.yaml b/nuclei-templates/cve-less/plugins/themify-event-post-9036b0b68d189e2a08606b1361a322c6.yaml new file mode 100644 index 0000000000..b5283cb404 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-event-post-9036b0b68d189e2a08606b1361a322c6.yaml @@ -0,0 +1,58 @@ +id: themify-event-post-9036b0b68d189e2a08606b1361a322c6 + +info: + name: > + Themify Event Post <= 1.2.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9aa5247a-b85b-4a0d-ac3e-4b4ef8ccd8ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-event-post/" + google-query: inurl:"/wp-content/plugins/themify-event-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-event-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-event-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-event-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-icons-2317e44c2f1aa246df478fdf378e128f.yaml b/nuclei-templates/cve-less/plugins/themify-icons-2317e44c2f1aa246df478fdf378e128f.yaml new file mode 100644 index 0000000000..7e6b53c49d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-icons-2317e44c2f1aa246df478fdf378e128f.yaml @@ -0,0 +1,58 @@ +id: themify-icons-2317e44c2f1aa246df478fdf378e128f + +info: + name: > + Themify Icons <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efa156b7-ab18-414d-80a5-3a1c2a977b3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-icons/" + google-query: inurl:"/wp-content/plugins/themify-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-portfolio-post-293ee203790c9494dd9271c2d0887ade.yaml b/nuclei-templates/cve-less/plugins/themify-portfolio-post-293ee203790c9494dd9271c2d0887ade.yaml new file mode 100644 index 0000000000..189bffc223 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-portfolio-post-293ee203790c9494dd9271c2d0887ade.yaml @@ -0,0 +1,58 @@ +id: themify-portfolio-post-293ee203790c9494dd9271c2d0887ade + +info: + name: > + Themify Portfolio Post <= 1.1.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71d916aa-5382-495b-8142-80de0a0912e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-portfolio-post/" + google-query: inurl:"/wp-content/plugins/themify-portfolio-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-portfolio-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-portfolio-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-portfolio-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-portfolio-post-4ad06cea9bbed1fbf99a4d128c33e936.yaml b/nuclei-templates/cve-less/plugins/themify-portfolio-post-4ad06cea9bbed1fbf99a4d128c33e936.yaml new file mode 100644 index 0000000000..fa1f1c2447 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-portfolio-post-4ad06cea9bbed1fbf99a4d128c33e936.yaml @@ -0,0 +1,58 @@ +id: themify-portfolio-post-4ad06cea9bbed1fbf99a4d128c33e936 + +info: + name: > + Themify Portfolio Post <= 1.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df9b0578-d5fb-459b-b857-d907e4ca22b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-portfolio-post/" + google-query: inurl:"/wp-content/plugins/themify-portfolio-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-portfolio-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-portfolio-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-portfolio-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-portfolio-post-be668a1f67bf2032bc65bfbd87433e2e.yaml b/nuclei-templates/cve-less/plugins/themify-portfolio-post-be668a1f67bf2032bc65bfbd87433e2e.yaml new file mode 100644 index 0000000000..be2cac13c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-portfolio-post-be668a1f67bf2032bc65bfbd87433e2e.yaml @@ -0,0 +1,58 @@ +id: themify-portfolio-post-be668a1f67bf2032bc65bfbd87433e2e + +info: + name: > + Themify Portfolio Post <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3bb5bb0-2c70-4416-8ee1-97aba100cc1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-portfolio-post/" + google-query: inurl:"/wp-content/plugins/themify-portfolio-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-portfolio-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-portfolio-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-portfolio-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-portfolio-post-eeb643b56c37992255be8d889b1e9ae2.yaml b/nuclei-templates/cve-less/plugins/themify-portfolio-post-eeb643b56c37992255be8d889b1e9ae2.yaml new file mode 100644 index 0000000000..e55ac3258a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-portfolio-post-eeb643b56c37992255be8d889b1e9ae2.yaml @@ -0,0 +1,58 @@ +id: themify-portfolio-post-eeb643b56c37992255be8d889b1e9ae2 + +info: + name: > + Themify Portfolio Post <= 1.2.4 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f3c3629-b7a9-4f83-a821-64119ed662ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-portfolio-post/" + google-query: inurl:"/wp-content/plugins/themify-portfolio-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-portfolio-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-portfolio-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-portfolio-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-portfolio-post-ef2ccc3b2c02ce044d17cf1db08c67d1.yaml b/nuclei-templates/cve-less/plugins/themify-portfolio-post-ef2ccc3b2c02ce044d17cf1db08c67d1.yaml new file mode 100644 index 0000000000..a4c1f08129 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-portfolio-post-ef2ccc3b2c02ce044d17cf1db08c67d1.yaml @@ -0,0 +1,58 @@ +id: themify-portfolio-post-ef2ccc3b2c02ce044d17cf1db08c67d1 + +info: + name: > + Themify Portfolio Post <= 1.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a67df40b-7179-47a7-9cde-1c512ecc2253?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-portfolio-post/" + google-query: inurl:"/wp-content/plugins/themify-portfolio-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-portfolio-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-portfolio-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-portfolio-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-ptb-1cf2042a7f76cab8ad8de631e6023745.yaml b/nuclei-templates/cve-less/plugins/themify-ptb-1cf2042a7f76cab8ad8de631e6023745.yaml new file mode 100644 index 0000000000..9f590c2e7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-ptb-1cf2042a7f76cab8ad8de631e6023745.yaml @@ -0,0 +1,58 @@ +id: themify-ptb-1cf2042a7f76cab8ad8de631e6023745 + +info: + name: > + Post Type Builder <= 2.0.8 - Missing Authorization to Arbitrary Post/Page Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cccfdcc-643c-4330-b345-aca4025e3327?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-ptb/" + google-query: inurl:"/wp-content/plugins/themify-ptb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-ptb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-ptb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-ptb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-ptb-30618ae67f4be74afbd8c2992d6203d9.yaml b/nuclei-templates/cve-less/plugins/themify-ptb-30618ae67f4be74afbd8c2992d6203d9.yaml new file mode 100644 index 0000000000..892af02abc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-ptb-30618ae67f4be74afbd8c2992d6203d9.yaml @@ -0,0 +1,58 @@ +id: themify-ptb-30618ae67f4be74afbd8c2992d6203d9 + +info: + name: > + Post Type Builder <= 2.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e75cc91a-9117-4d18-ba70-d8cbae42cd08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-ptb/" + google-query: inurl:"/wp-content/plugins/themify-ptb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-ptb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-ptb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-ptb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-ptb-search-76258f27176a5343dd9686e2b8dcac25.yaml b/nuclei-templates/cve-less/plugins/themify-ptb-search-76258f27176a5343dd9686e2b8dcac25.yaml new file mode 100644 index 0000000000..c26f4deae7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-ptb-search-76258f27176a5343dd9686e2b8dcac25.yaml @@ -0,0 +1,58 @@ +id: themify-ptb-search-76258f27176a5343dd9686e2b8dcac25 + +info: + name: > + Themify PTB Search Addon <= 1.3.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c81b2dca-d830-4901-8b16-5feb7cd1a4d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-ptb-search/" + google-query: inurl:"/wp-content/plugins/themify-ptb-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-ptb-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-ptb-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-ptb-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-shortcodes-52e89cc1870832c0bf35fd7b63eefddc.yaml b/nuclei-templates/cve-less/plugins/themify-shortcodes-52e89cc1870832c0bf35fd7b63eefddc.yaml new file mode 100644 index 0000000000..6d64fdcefa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-shortcodes-52e89cc1870832c0bf35fd7b63eefddc.yaml @@ -0,0 +1,58 @@ +id: themify-shortcodes-52e89cc1870832c0bf35fd7b63eefddc + +info: + name: > + Themify Shortcodes <= 2.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via themify_button Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c63ff9d7-6a14-4186-8550-4e5c50855e7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-shortcodes/" + google-query: inurl:"/wp-content/plugins/themify-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-shortcodes-6d39c5dd9e079ccbe9ac0c1a99d74a94.yaml b/nuclei-templates/cve-less/plugins/themify-shortcodes-6d39c5dd9e079ccbe9ac0c1a99d74a94.yaml new file mode 100644 index 0000000000..4c7582403f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-shortcodes-6d39c5dd9e079ccbe9ac0c1a99d74a94.yaml @@ -0,0 +1,58 @@ +id: themify-shortcodes-6d39c5dd9e079ccbe9ac0c1a99d74a94 + +info: + name: > + Themify Shortcodes <= 2.0.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0aeb63e7-a24d-4d76-a8c7-f082dad87a55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-shortcodes/" + google-query: inurl:"/wp-content/plugins/themify-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-shortcodes-7fb1bb76537e399dfae9ca2dc54c6a8c.yaml b/nuclei-templates/cve-less/plugins/themify-shortcodes-7fb1bb76537e399dfae9ca2dc54c6a8c.yaml new file mode 100644 index 0000000000..bc8ea290f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-shortcodes-7fb1bb76537e399dfae9ca2dc54c6a8c.yaml @@ -0,0 +1,58 @@ +id: themify-shortcodes-7fb1bb76537e399dfae9ca2dc54c6a8c + +info: + name: > + Themify Shortcodes <= 2.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d8fb548-0737-4b69-bf64-838bfc6d409a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-shortcodes/" + google-query: inurl:"/wp-content/plugins/themify-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-wc-product-filter-50b5d414fd08ab5c52f1201434d28062.yaml b/nuclei-templates/cve-less/plugins/themify-wc-product-filter-50b5d414fd08ab5c52f1201434d28062.yaml new file mode 100644 index 0000000000..3b8fc8525a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-wc-product-filter-50b5d414fd08ab5c52f1201434d28062.yaml @@ -0,0 +1,58 @@ +id: themify-wc-product-filter-50b5d414fd08ab5c52f1201434d28062 + +info: + name: > + Themify – WooCommerce Product Filter <= 1.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f621cfa-d02e-4414-bb1d-6e23da3c92b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-wc-product-filter/" + google-query: inurl:"/wp-content/plugins/themify-wc-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-wc-product-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-wc-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-wc-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-wc-product-filter-cac21e55f896febf57888b4da2df94b8.yaml b/nuclei-templates/cve-less/plugins/themify-wc-product-filter-cac21e55f896febf57888b4da2df94b8.yaml new file mode 100644 index 0000000000..7172b098eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-wc-product-filter-cac21e55f896febf57888b4da2df94b8.yaml @@ -0,0 +1,58 @@ +id: themify-wc-product-filter-cac21e55f896febf57888b4da2df94b8 + +info: + name: > + Themify – WooCommerce Product Filter <= 1.4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a753823a-1f95-430b-8b74-cc33f2ab018e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-wc-product-filter/" + google-query: inurl:"/wp-content/plugins/themify-wc-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-wc-product-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-wc-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-wc-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-wc-product-filter-cf981f122fbf50e8a58080fdccd2e915.yaml b/nuclei-templates/cve-less/plugins/themify-wc-product-filter-cf981f122fbf50e8a58080fdccd2e915.yaml new file mode 100644 index 0000000000..12ae37c0e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-wc-product-filter-cf981f122fbf50e8a58080fdccd2e915.yaml @@ -0,0 +1,58 @@ +id: themify-wc-product-filter-cf981f122fbf50e8a58080fdccd2e915 + +info: + name: > + Themify - WooCommerce Product Filter <= 1.3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28928a78-24c2-44d2-a9e4-33c2f352d089?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-wc-product-filter/" + google-query: inurl:"/wp-content/plugins/themify-wc-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-wc-product-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-wc-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-wc-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/themify-wc-product-filter-d0c7733d559f41b4b35373b971b25453.yaml b/nuclei-templates/cve-less/plugins/themify-wc-product-filter-d0c7733d559f41b4b35373b971b25453.yaml new file mode 100644 index 0000000000..8e31dae293 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/themify-wc-product-filter-d0c7733d559f41b4b35373b971b25453.yaml @@ -0,0 +1,58 @@ +id: themify-wc-product-filter-d0c7733d559f41b4b35373b971b25453 + +info: + name: > + Themify – WooCommerce Product Filter <= 1.4.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0992ac60-14c6-4432-bd6e-c11c6a7bf603?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/themify-wc-product-filter/" + google-query: inurl:"/wp-content/plugins/themify-wc-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,themify-wc-product-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/themify-wc-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-wc-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theplus_elementor_addon-42da06bbd85810d2b121cf524da3d863.yaml b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-42da06bbd85810d2b121cf524da3d863.yaml new file mode 100644 index 0000000000..3c084bdafb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-42da06bbd85810d2b121cf524da3d863.yaml @@ -0,0 +1,58 @@ +id: theplus_elementor_addon-42da06bbd85810d2b121cf524da3d863 + +info: + name: > + Plus Addons for Elementor Page Builder <= 4.1.6 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd3a7af1-0cae-4872-9e61-58e9a9e3eda5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theplus_elementor_addon/" + google-query: inurl:"/wp-content/plugins/theplus_elementor_addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theplus_elementor_addon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theplus_elementor_addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theplus_elementor_addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theplus_elementor_addon-5a73608ad73ff1099a14f74919aa1eff.yaml b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-5a73608ad73ff1099a14f74919aa1eff.yaml new file mode 100644 index 0000000000..dc62df63d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-5a73608ad73ff1099a14f74919aa1eff.yaml @@ -0,0 +1,58 @@ +id: theplus_elementor_addon-5a73608ad73ff1099a14f74919aa1eff + +info: + name: > + The Plus Addons for Elementor Page Builder <= 4.1.10 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c959d881-b00d-465c-bafa-988ffcf86995?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theplus_elementor_addon/" + google-query: inurl:"/wp-content/plugins/theplus_elementor_addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theplus_elementor_addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theplus_elementor_addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theplus_elementor_addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theplus_elementor_addon-82599fc80ce8e9167026a24befbd5025.yaml b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-82599fc80ce8e9167026a24befbd5025.yaml new file mode 100644 index 0000000000..95c7079dd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-82599fc80ce8e9167026a24befbd5025.yaml @@ -0,0 +1,58 @@ +id: theplus_elementor_addon-82599fc80ce8e9167026a24befbd5025 + +info: + name: > + The Plus Addons for Elementor Pro <= 5.0.6 - Sensitive Data Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cb96b56-82cb-4429-b645-dfe8a14931e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theplus_elementor_addon/" + google-query: inurl:"/wp-content/plugins/theplus_elementor_addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theplus_elementor_addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theplus_elementor_addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theplus_elementor_addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theplus_elementor_addon-a014fe0d588971955e094229935a8c6e.yaml b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-a014fe0d588971955e094229935a8c6e.yaml new file mode 100644 index 0000000000..aacc69a9cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-a014fe0d588971955e094229935a8c6e.yaml @@ -0,0 +1,58 @@ +id: theplus_elementor_addon-a014fe0d588971955e094229935a8c6e + +info: + name: > + The Plus Addons for Elementor - Pro <= 5.0.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edd1b549-0975-446d-8ff8-770dbc957f92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theplus_elementor_addon/" + google-query: inurl:"/wp-content/plugins/theplus_elementor_addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theplus_elementor_addon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theplus_elementor_addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theplus_elementor_addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ad74c1853755393f0d665754f820d681.yaml b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ad74c1853755393f0d665754f820d681.yaml new file mode 100644 index 0000000000..a1a7189537 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ad74c1853755393f0d665754f820d681.yaml @@ -0,0 +1,58 @@ +id: theplus_elementor_addon-ad74c1853755393f0d665754f820d681 + +info: + name: > + The Plus Addons for Elementor PRO <= 4.1.9 & The Plus Addons for Elementor <= 2.0.6 - Authenticated (Contributor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96388c82-2392-42b3-b0a0-c3d92910fb5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theplus_elementor_addon/" + google-query: inurl:"/wp-content/plugins/theplus_elementor_addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theplus_elementor_addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theplus_elementor_addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theplus_elementor_addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theplus_elementor_addon-b93cfae43335af57ef88a10fac024249.yaml b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-b93cfae43335af57ef88a10fac024249.yaml new file mode 100644 index 0000000000..82b1788eb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-b93cfae43335af57ef88a10fac024249.yaml @@ -0,0 +1,58 @@ +id: theplus_elementor_addon-b93cfae43335af57ef88a10fac024249 + +info: + name: > + The Plus Addons for Elementor Page Builder < 4.1.10 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97c921e4-a05d-43db-9fe7-3dac8ea4d249?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theplus_elementor_addon/" + google-query: inurl:"/wp-content/plugins/theplus_elementor_addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theplus_elementor_addon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theplus_elementor_addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theplus_elementor_addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ecbb50223a0cdb771fc6a4f617780de7.yaml b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ecbb50223a0cdb771fc6a4f617780de7.yaml new file mode 100644 index 0000000000..bcf7a51949 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ecbb50223a0cdb771fc6a4f617780de7.yaml @@ -0,0 +1,58 @@ +id: theplus_elementor_addon-ecbb50223a0cdb771fc6a4f617780de7 + +info: + name: > + The Plus Addons for Elementor Page Builder <= 4.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caa09e12-60f9-4ef4-85f7-dadb6833e077?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theplus_elementor_addon/" + google-query: inurl:"/wp-content/plugins/theplus_elementor_addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theplus_elementor_addon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theplus_elementor_addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theplus_elementor_addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ee363fd534d1a755fb5facda5882c857.yaml b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ee363fd534d1a755fb5facda5882c857.yaml new file mode 100644 index 0000000000..ce6cc971e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/theplus_elementor_addon-ee363fd534d1a755fb5facda5882c857.yaml @@ -0,0 +1,58 @@ +id: theplus_elementor_addon-ee363fd534d1a755fb5facda5882c857 + +info: + name: > + The Plus Addons for Elementor Pro <= 5.2.8 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d739821-569d-42d7-a4c5-70e32d5d41a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/theplus_elementor_addon/" + google-query: inurl:"/wp-content/plugins/theplus_elementor_addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,theplus_elementor_addon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/theplus_elementor_addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theplus_elementor_addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thesis-openhook-a514048fb251bf33fbe7f38a2147dc40.yaml b/nuclei-templates/cve-less/plugins/thesis-openhook-a514048fb251bf33fbe7f38a2147dc40.yaml new file mode 100644 index 0000000000..5276d21302 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thesis-openhook-a514048fb251bf33fbe7f38a2147dc40.yaml @@ -0,0 +1,58 @@ +id: thesis-openhook-a514048fb251bf33fbe7f38a2147dc40 + +info: + name: > + OpenHook <= 4.3.0 - Authenticated (Subscriber+) Remote Code Execution via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2da-8d103e4c31bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thesis-openhook/" + google-query: inurl:"/wp-content/plugins/thesis-openhook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thesis-openhook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thesis-openhook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thesis-openhook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thesography-4f6c9e5f134bc3a7357c0b3f26384141.yaml b/nuclei-templates/cve-less/plugins/thesography-4f6c9e5f134bc3a7357c0b3f26384141.yaml new file mode 100644 index 0000000000..51103f5725 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thesography-4f6c9e5f134bc3a7357c0b3f26384141.yaml @@ -0,0 +1,58 @@ +id: thesography-4f6c9e5f134bc3a7357c0b3f26384141 + +info: + name: > + Exifography <= 1.3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ef9b22f-a0dc-43e5-9597-5dcc6ca3fc23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thesography/" + google-query: inurl:"/wp-content/plugins/thesography/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thesography,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thesography/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thesography" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thim-elementor-kit-1eee2854f94957b31e7d0d2d3c4c5271.yaml b/nuclei-templates/cve-less/plugins/thim-elementor-kit-1eee2854f94957b31e7d0d2d3c4c5271.yaml new file mode 100644 index 0000000000..1e85291e86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thim-elementor-kit-1eee2854f94957b31e7d0d2d3c4c5271.yaml @@ -0,0 +1,58 @@ +id: thim-elementor-kit-1eee2854f94957b31e7d0d2d3c4c5271 + +info: + name: > + Thim Elementor Kit <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via id Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3275c47d-caf5-49e6-8aa2-20a6d8106f26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thim-elementor-kit/" + google-query: inurl:"/wp-content/plugins/thim-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thim-elementor-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thim-elementor-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thim-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thinkific-uploader-d35fe59b43f4760392f4ec7a5eaa4ede.yaml b/nuclei-templates/cve-less/plugins/thinkific-uploader-d35fe59b43f4760392f4ec7a5eaa4ede.yaml new file mode 100644 index 0000000000..6352e6c06e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thinkific-uploader-d35fe59b43f4760392f4ec7a5eaa4ede.yaml @@ -0,0 +1,58 @@ +id: thinkific-uploader-d35fe59b43f4760392f4ec7a5eaa4ede + +info: + name: > + Thinkific Uploader <= 1.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826f75dd-ff37-459a-8a28-c70e403b720a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thinkific-uploader/" + google-query: inurl:"/wp-content/plugins/thinkific-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thinkific-uploader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thinkific-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thinkific-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thinkit-wp-contact-form-3134d0e942033e6ac2b7d54901e657a7.yaml b/nuclei-templates/cve-less/plugins/thinkit-wp-contact-form-3134d0e942033e6ac2b7d54901e657a7.yaml new file mode 100644 index 0000000000..6f479a850d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thinkit-wp-contact-form-3134d0e942033e6ac2b7d54901e657a7.yaml @@ -0,0 +1,58 @@ +id: thinkit-wp-contact-form-3134d0e942033e6ac2b7d54901e657a7 + +info: + name: > + ThinkIT WP Contact Form Plugin < 0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81062f13-98ed-4ba7-8725-35406ac71568?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thinkit-wp-contact-form/" + google-query: inurl:"/wp-content/plugins/thinkit-wp-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thinkit-wp-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thinkit-wp-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thinkit-wp-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thinkit-wp-contact-form-4ffa4f4b774dde3b240b3f91f3c7533e.yaml b/nuclei-templates/cve-less/plugins/thinkit-wp-contact-form-4ffa4f4b774dde3b240b3f91f3c7533e.yaml new file mode 100644 index 0000000000..edc0e473a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thinkit-wp-contact-form-4ffa4f4b774dde3b240b3f91f3c7533e.yaml @@ -0,0 +1,58 @@ +id: thinkit-wp-contact-form-4ffa4f4b774dde3b240b3f91f3c7533e + +info: + name: > + ThinkIT WP Contact Form < 0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3ea5e75-9b6a-4710-bb2c-458c2a924bb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thinkit-wp-contact-form/" + google-query: inurl:"/wp-content/plugins/thinkit-wp-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thinkit-wp-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thinkit-wp-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thinkit-wp-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thinktwit-eae5f7c2210c1cdf959e29a045115865.yaml b/nuclei-templates/cve-less/plugins/thinktwit-eae5f7c2210c1cdf959e29a045115865.yaml new file mode 100644 index 0000000000..3d2f830216 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thinktwit-eae5f7c2210c1cdf959e29a045115865.yaml @@ -0,0 +1,58 @@ +id: thinktwit-eae5f7c2210c1cdf959e29a045115865 + +info: + name: > + ThinkTwit < 1.7.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4e3e818-8d47-467a-b5cf-7eebd6a624a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thinktwit/" + google-query: inurl:"/wp-content/plugins/thinktwit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thinktwit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thinktwit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thinktwit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thinkun-remind-0777ed3a3a96e55428342d8be3673b96.yaml b/nuclei-templates/cve-less/plugins/thinkun-remind-0777ed3a3a96e55428342d8be3673b96.yaml new file mode 100644 index 0000000000..8c783f565c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thinkun-remind-0777ed3a3a96e55428342d8be3673b96.yaml @@ -0,0 +1,58 @@ +id: thinkun-remind-0777ed3a3a96e55428342d8be3673b96 + +info: + name: > + Thinkun Remind <= 1.1.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0afcdec7-dd22-4f10-b8f9-96a1e57d8f0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thinkun-remind/" + google-query: inurl:"/wp-content/plugins/thinkun-remind/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thinkun-remind,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thinkun-remind/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thinkun-remind" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thirstyaffiliates-7f32d3ac2f0177d9329a7490c025ed06.yaml b/nuclei-templates/cve-less/plugins/thirstyaffiliates-7f32d3ac2f0177d9329a7490c025ed06.yaml new file mode 100644 index 0000000000..18334baa3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thirstyaffiliates-7f32d3ac2f0177d9329a7490c025ed06.yaml @@ -0,0 +1,58 @@ +id: thirstyaffiliates-7f32d3ac2f0177d9329a7490c025ed06 + +info: + name: > + ThirstyAffiliates Affiliate Link Manager <= 3.9.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/114ea55e-a3a4-420e-9202-73ebbd95d7b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thirstyaffiliates/" + google-query: inurl:"/wp-content/plugins/thirstyaffiliates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thirstyaffiliates,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thirstyaffiliates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thirstyaffiliates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thirstyaffiliates-8982f505d6a79ae940fb4ce5e211ca2b.yaml b/nuclei-templates/cve-less/plugins/thirstyaffiliates-8982f505d6a79ae940fb4ce5e211ca2b.yaml new file mode 100644 index 0000000000..01efb42013 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thirstyaffiliates-8982f505d6a79ae940fb4ce5e211ca2b.yaml @@ -0,0 +1,58 @@ +id: thirstyaffiliates-8982f505d6a79ae940fb4ce5e211ca2b + +info: + name: > + ThirstyAffiliates Affiliate Link Manager <= 3.10.4 - Subscriber+ Arbitrary Affiliate Links Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7661d648-543e-46c8-a859-fb722a0c3fc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thirstyaffiliates/" + google-query: inurl:"/wp-content/plugins/thirstyaffiliates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thirstyaffiliates,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thirstyaffiliates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thirstyaffiliates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thirstyaffiliates-edc3a8280c90c700d2ea22dbd7cd3a1b.yaml b/nuclei-templates/cve-less/plugins/thirstyaffiliates-edc3a8280c90c700d2ea22dbd7cd3a1b.yaml new file mode 100644 index 0000000000..62b5cefb94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thirstyaffiliates-edc3a8280c90c700d2ea22dbd7cd3a1b.yaml @@ -0,0 +1,58 @@ +id: thirstyaffiliates-edc3a8280c90c700d2ea22dbd7cd3a1b + +info: + name: > + ThirstyAffiliates Affiliate Link Manager <= 3.10.4 - Authorization Bypass and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e361a98-94c5-4775-a306-b343997e1cde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thirstyaffiliates/" + google-query: inurl:"/wp-content/plugins/thirstyaffiliates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thirstyaffiliates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thirstyaffiliates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thirstyaffiliates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/this-day-in-history-6254bdc184e74d40b3b0be9a1c286f34.yaml b/nuclei-templates/cve-less/plugins/this-day-in-history-6254bdc184e74d40b3b0be9a1c286f34.yaml new file mode 100644 index 0000000000..9d19db8477 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/this-day-in-history-6254bdc184e74d40b3b0be9a1c286f34.yaml @@ -0,0 +1,58 @@ +id: this-day-in-history-6254bdc184e74d40b3b0be9a1c286f34 + +info: + name: > + This Day In History <= 3.10.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b88a8a9-d3e1-4c21-a4e8-d9afa34d7a2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/this-day-in-history/" + google-query: inurl:"/wp-content/plugins/this-day-in-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,this-day-in-history,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/this-day-in-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "this-day-in-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/threewp-email-reflector-260d59850520222ae9e82cf8d0c5f77a.yaml b/nuclei-templates/cve-less/plugins/threewp-email-reflector-260d59850520222ae9e82cf8d0c5f77a.yaml new file mode 100644 index 0000000000..971a5fc1bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/threewp-email-reflector-260d59850520222ae9e82cf8d0c5f77a.yaml @@ -0,0 +1,58 @@ +id: threewp-email-reflector-260d59850520222ae9e82cf8d0c5f77a + +info: + name: > + ThreeWP Email Reflector < 1.16 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89c588e4-2f42-4ec5-8d05-3b45b23066c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/threewp-email-reflector/" + google-query: inurl:"/wp-content/plugins/threewp-email-reflector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,threewp-email-reflector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/threewp-email-reflector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "threewp-email-reflector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-ab-page-testing-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-ab-page-testing-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..a4bc7edd50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-ab-page-testing-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-ab-page-testing-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-ab-page-testing/" + google-query: inurl:"/wp-content/plugins/thrive-ab-page-testing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-ab-page-testing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-ab-page-testing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-ab-page-testing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.13.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-apprentice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-apprentice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..3865920bec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-apprentice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-apprentice-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-apprentice/" + google-query: inurl:"/wp-content/plugins/thrive-apprentice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-apprentice,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-apprentice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-apprentice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-automator-954cc7b2d6b89c7d92594b8f26d6124a.yaml b/nuclei-templates/cve-less/plugins/thrive-automator-954cc7b2d6b89c7d92594b8f26d6124a.yaml new file mode 100644 index 0000000000..d714cc6c13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-automator-954cc7b2d6b89c7d92594b8f26d6124a.yaml @@ -0,0 +1,58 @@ +id: thrive-automator-954cc7b2d6b89c7d92594b8f26d6124a + +info: + name: > + Thrive Automator <= 1.17 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d5b1a3d-ce7f-4d5d-b72b-61024d5c5378?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-automator/" + google-query: inurl:"/wp-content/plugins/thrive-automator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-automator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-automator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-automator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-clever-widgets-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-clever-widgets-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..db77dabbc7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-clever-widgets-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-clever-widgets-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-clever-widgets/" + google-query: inurl:"/wp-content/plugins/thrive-clever-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-clever-widgets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-clever-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-clever-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.57.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-comments-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-comments-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..cd3850fb23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-comments-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-comments-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-comments/" + google-query: inurl:"/wp-content/plugins/thrive-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-comments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-dashboard-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-dashboard-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..27f7a3dcd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-dashboard-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-dashboard-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-dashboard/" + google-query: inurl:"/wp-content/plugins/thrive-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-dashboard,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-headline-optimizer-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-headline-optimizer-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..e7960d967c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-headline-optimizer-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-headline-optimizer-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-headline-optimizer/" + google-query: inurl:"/wp-content/plugins/thrive-headline-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-headline-optimizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-headline-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-headline-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-leads-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-leads-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..70e9f54ab6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-leads-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-leads-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-leads/" + google-query: inurl:"/wp-content/plugins/thrive-leads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-leads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-leads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-leads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-ovation-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-ovation-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..09173962bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-ovation-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-ovation-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-ovation/" + google-query: inurl:"/wp-content/plugins/thrive-ovation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-ovation,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-ovation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-ovation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-quiz-builder-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-quiz-builder-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..f46718ef61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-quiz-builder-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-quiz-builder-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-quiz-builder/" + google-query: inurl:"/wp-content/plugins/thrive-quiz-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-quiz-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-quiz-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-quiz-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-ultimatum-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-ultimatum-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..9d35b48783 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-ultimatum-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-ultimatum-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-ultimatum/" + google-query: inurl:"/wp-content/plugins/thrive-ultimatum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-ultimatum,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-ultimatum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-ultimatum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thrive-visual-editor-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/plugins/thrive-visual-editor-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..1b4db6daad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thrive-visual-editor-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-visual-editor-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thrive-visual-editor/" + google-query: inurl:"/wp-content/plugins/thrive-visual-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thrive-visual-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thrive-visual-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-visual-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/throws-spam-away-36c982ede7470d2e3e88a740557c4530.yaml b/nuclei-templates/cve-less/plugins/throws-spam-away-36c982ede7470d2e3e88a740557c4530.yaml new file mode 100644 index 0000000000..166818431a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/throws-spam-away-36c982ede7470d2e3e88a740557c4530.yaml @@ -0,0 +1,58 @@ +id: throws-spam-away-36c982ede7470d2e3e88a740557c4530 + +info: + name: > + Throws SPAM Away <= 3.3 - Cross-Site Request Forgery to Comment Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ce0fece-a7e5-4d27-a70a-37ab0973c15f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/throws-spam-away/" + google-query: inurl:"/wp-content/plugins/throws-spam-away/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,throws-spam-away,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/throws-spam-away/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "throws-spam-away" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thumbnail-for-excerpts-bab8c0d44e1c325d945380a6221bd569.yaml b/nuclei-templates/cve-less/plugins/thumbnail-for-excerpts-bab8c0d44e1c325d945380a6221bd569.yaml new file mode 100644 index 0000000000..bd0d34eb5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thumbnail-for-excerpts-bab8c0d44e1c325d945380a6221bd569.yaml @@ -0,0 +1,58 @@ +id: thumbnail-for-excerpts-bab8c0d44e1c325d945380a6221bd569 + +info: + name: > + Thumbnail For Excerpts <= 2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b536028d-4e11-4bda-8097-b37857a28309?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thumbnail-for-excerpts/" + google-query: inurl:"/wp-content/plugins/thumbnail-for-excerpts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thumbnail-for-excerpts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thumbnail-for-excerpts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thumbnail-for-excerpts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thumbs-rating-28083443631175bd4dcd05294b64aae6.yaml b/nuclei-templates/cve-less/plugins/thumbs-rating-28083443631175bd4dcd05294b64aae6.yaml new file mode 100644 index 0000000000..a4eb23e784 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thumbs-rating-28083443631175bd4dcd05294b64aae6.yaml @@ -0,0 +1,58 @@ +id: thumbs-rating-28083443631175bd4dcd05294b64aae6 + +info: + name: > + Thumbs Rating <= 5.1.0 - Unauthenticated Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e98b0a3a-6c14-45f1-a6b2-9911ba34ce0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thumbs-rating/" + google-query: inurl:"/wp-content/plugins/thumbs-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thumbs-rating,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thumbs-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thumbs-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/thumbs-rating-f00e3cac8717028c6c69750368de6108.yaml b/nuclei-templates/cve-less/plugins/thumbs-rating-f00e3cac8717028c6c69750368de6108.yaml new file mode 100644 index 0000000000..f2327c0d4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/thumbs-rating-f00e3cac8717028c6c69750368de6108.yaml @@ -0,0 +1,58 @@ +id: thumbs-rating-f00e3cac8717028c6c69750368de6108 + +info: + name: > + Thumbs Rating <= 5.0.0 - Race Condition + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb1105fc-ed12-4a82-9cc4-4b45aa34cdc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/thumbs-rating/" + google-query: inurl:"/wp-content/plugins/thumbs-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,thumbs-rating,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/thumbs-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thumbs-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-566c05bbe9b725b2c0c80f4e03660720.yaml b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-566c05bbe9b725b2c0c80f4e03660720.yaml new file mode 100644 index 0000000000..c013a24bf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-566c05bbe9b725b2c0c80f4e03660720.yaml @@ -0,0 +1,58 @@ +id: ti-woocommerce-wishlist-566c05bbe9b725b2c0c80f4e03660720 + +info: + name: > + TI WooCommerce Wishlist <= 2.7.3 - Unauthenticated Blind SQL Injection via Rest API + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82420667-9ba6-46ed-9a53-d16850755bb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ti-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/ti-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ti-woocommerce-wishlist,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ti-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ti-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-728e240a198c7c451039858fc71e171c.yaml b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-728e240a198c7c451039858fc71e171c.yaml new file mode 100644 index 0000000000..50865d86d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-728e240a198c7c451039858fc71e171c.yaml @@ -0,0 +1,58 @@ +id: ti-woocommerce-wishlist-728e240a198c7c451039858fc71e171c + +info: + name: > + TI WooCommerce Wishlist <= 1.21.11 and TI WooCommerce Wishlist Pro <= 1.21.4 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d60b5741-5496-4e87-bcb0-adaa0db07d90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ti-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/ti-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ti-woocommerce-wishlist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ti-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ti-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-c1e85ed5dbff1aadf024b8bce56884f9.yaml b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-c1e85ed5dbff1aadf024b8bce56884f9.yaml new file mode 100644 index 0000000000..6f57bfcaca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-c1e85ed5dbff1aadf024b8bce56884f9.yaml @@ -0,0 +1,58 @@ +id: ti-woocommerce-wishlist-c1e85ed5dbff1aadf024b8bce56884f9 + +info: + name: > + TI WooCommerce Wishlist / TI WooCommerce Wishlist Pro < 1.40.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc3457a5-3d5b-40dc-b9b1-e819187c4d99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ti-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/ti-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ti-woocommerce-wishlist,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ti-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ti-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.40.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-premium-728e240a198c7c451039858fc71e171c.yaml b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-premium-728e240a198c7c451039858fc71e171c.yaml new file mode 100644 index 0000000000..b9a48c7608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-premium-728e240a198c7c451039858fc71e171c.yaml @@ -0,0 +1,58 @@ +id: ti-woocommerce-wishlist-premium-728e240a198c7c451039858fc71e171c + +info: + name: > + TI WooCommerce Wishlist <= 1.21.11 and TI WooCommerce Wishlist Pro <= 1.21.4 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d60b5741-5496-4e87-bcb0-adaa0db07d90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ti-woocommerce-wishlist-premium/" + google-query: inurl:"/wp-content/plugins/ti-woocommerce-wishlist-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ti-woocommerce-wishlist-premium,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ti-woocommerce-wishlist-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ti-woocommerce-wishlist-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-premium-c1e85ed5dbff1aadf024b8bce56884f9.yaml b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-premium-c1e85ed5dbff1aadf024b8bce56884f9.yaml new file mode 100644 index 0000000000..cda4afd137 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ti-woocommerce-wishlist-premium-c1e85ed5dbff1aadf024b8bce56884f9.yaml @@ -0,0 +1,58 @@ +id: ti-woocommerce-wishlist-premium-c1e85ed5dbff1aadf024b8bce56884f9 + +info: + name: > + TI WooCommerce Wishlist / TI WooCommerce Wishlist Pro < 1.40.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc3457a5-3d5b-40dc-b9b1-e819187c4d99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ti-woocommerce-wishlist-premium/" + google-query: inurl:"/wp-content/plugins/ti-woocommerce-wishlist-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ti-woocommerce-wishlist-premium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ti-woocommerce-wishlist-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ti-woocommerce-wishlist-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.40.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ticker-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/ticker-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..f9285332d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ticker-ultimate-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: ticker-ultimate-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ticker-ultimate/" + google-query: inurl:"/wp-content/plugins/ticker-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ticker-ultimate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ticker-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ticker-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-207f27a384ef3a3941e38d3aa57e12b4.yaml b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-207f27a384ef3a3941e38d3aa57e12b4.yaml new file mode 100644 index 0000000000..e050a4be61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-207f27a384ef3a3941e38d3aa57e12b4.yaml @@ -0,0 +1,58 @@ +id: tickera-event-ticketing-system-207f27a384ef3a3941e38d3aa57e12b4 + +info: + name: > + Tickera <= 3.5.1.0 - Cross-Site Request Forgery to Ticket Post Status Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb0f8a0c-d02f-46e2-8808-3ffada105d13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tickera-event-ticketing-system/" + google-query: inurl:"/wp-content/plugins/tickera-event-ticketing-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tickera-event-ticketing-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tickera-event-ticketing-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tickera-event-ticketing-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-2d0717f7b86d7fd0bf523aa76bbbaeb6.yaml b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-2d0717f7b86d7fd0bf523aa76bbbaeb6.yaml new file mode 100644 index 0000000000..2e272ea3c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-2d0717f7b86d7fd0bf523aa76bbbaeb6.yaml @@ -0,0 +1,58 @@ +id: tickera-event-ticketing-system-2d0717f7b86d7fd0bf523aa76bbbaeb6 + +info: + name: > + Tickera – WordPress Event Ticketing <= 3.5.2.4 - Insecure Direct Object Reference to Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08ab3d7d-b58a-4dec-a085-84a9938be328?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tickera-event-ticketing-system/" + google-query: inurl:"/wp-content/plugins/tickera-event-ticketing-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tickera-event-ticketing-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tickera-event-ticketing-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tickera-event-ticketing-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7b77b861f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tickera-event-ticketing-system-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tickera-event-ticketing-system/" + google-query: inurl:"/wp-content/plugins/tickera-event-ticketing-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tickera-event-ticketing-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tickera-event-ticketing-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tickera-event-ticketing-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-c24d0aa2f1031533f0515499592257fe.yaml b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-c24d0aa2f1031533f0515499592257fe.yaml new file mode 100644 index 0000000000..fcdb677b48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-c24d0aa2f1031533f0515499592257fe.yaml @@ -0,0 +1,58 @@ +id: tickera-event-ticketing-system-c24d0aa2f1031533f0515499592257fe + +info: + name: > + Tickera <= 3.4.9.9 - Cross-Site Request Forgery to Plugin Data Deletion & Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fba419b8-bab0-4918-8d68-1e5bf75186c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tickera-event-ticketing-system/" + google-query: inurl:"/wp-content/plugins/tickera-event-ticketing-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tickera-event-ticketing-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tickera-event-ticketing-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tickera-event-ticketing-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-e6aee90d79a8ce1370df8b0531e47510.yaml b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-e6aee90d79a8ce1370df8b0531e47510.yaml new file mode 100644 index 0000000000..94587cd1cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tickera-event-ticketing-system-e6aee90d79a8ce1370df8b0531e47510.yaml @@ -0,0 +1,58 @@ +id: tickera-event-ticketing-system-e6aee90d79a8ce1370df8b0531e47510 + +info: + name: > + Tickera <= 3.4.8.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06c63f82-fe0f-435c-9cf8-5db6a7ce0677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tickera-event-ticketing-system/" + google-query: inurl:"/wp-content/plugins/tickera-event-ticketing-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tickera-event-ticketing-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tickera-event-ticketing-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tickera-event-ticketing-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ticket-manager-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/ticket-manager-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..56a385b3b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ticket-manager-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: ticket-manager-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ticket-manager/" + google-query: inurl:"/wp-content/plugins/ticket-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ticket-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ticket-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ticket-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ticket-tailor-64923c9a5ffa9c7e5e2ff84955e346c3.yaml b/nuclei-templates/cve-less/plugins/ticket-tailor-64923c9a5ffa9c7e5e2ff84955e346c3.yaml new file mode 100644 index 0000000000..1245dbe607 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ticket-tailor-64923c9a5ffa9c7e5e2ff84955e346c3.yaml @@ -0,0 +1,58 @@ +id: ticket-tailor-64923c9a5ffa9c7e5e2ff84955e346c3 + +info: + name: > + Ticket Tailor <= 1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88d19782-492f-4306-a8c0-5eaa470e457d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ticket-tailor/" + google-query: inurl:"/wp-content/plugins/ticket-tailor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ticket-tailor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ticket-tailor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ticket-tailor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tidio-form-885c0e7d869967a6d9428aa8fe4ebe55.yaml b/nuclei-templates/cve-less/plugins/tidio-form-885c0e7d869967a6d9428aa8fe4ebe55.yaml new file mode 100644 index 0000000000..c6148b4055 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tidio-form-885c0e7d869967a6d9428aa8fe4ebe55.yaml @@ -0,0 +1,58 @@ +id: tidio-form-885c0e7d869967a6d9428aa8fe4ebe55 + +info: + name: > + Easy Contact Form Builder < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e249e50b-44fb-4e68-9efa-701f4ecdcdcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tidio-form/" + google-query: inurl:"/wp-content/plugins/tidio-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tidio-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tidio-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tidio-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tidio-gallery-051fe49289887077b7bf7774208d8ef1.yaml b/nuclei-templates/cve-less/plugins/tidio-gallery-051fe49289887077b7bf7774208d8ef1.yaml new file mode 100644 index 0000000000..87eca5f0d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tidio-gallery-051fe49289887077b7bf7774208d8ef1.yaml @@ -0,0 +1,58 @@ +id: tidio-gallery-051fe49289887077b7bf7774208d8ef1 + +info: + name: > + Tidio Gallery <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36f4e51d-d613-4db6-8d79-d26398c3e5df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tidio-gallery/" + google-query: inurl:"/wp-content/plugins/tidio-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tidio-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tidio-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tidio-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tidio-live-chat-3713d3bbe5441b73f08676feaf2b85ec.yaml b/nuclei-templates/cve-less/plugins/tidio-live-chat-3713d3bbe5441b73f08676feaf2b85ec.yaml new file mode 100644 index 0000000000..a18dbe92ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tidio-live-chat-3713d3bbe5441b73f08676feaf2b85ec.yaml @@ -0,0 +1,58 @@ +id: tidio-live-chat-3713d3bbe5441b73f08676feaf2b85ec + +info: + name: > + Tidio Live Chat < 4.2.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7886708a-8daa-465b-b820-53bf409e682c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tidio-live-chat/" + google-query: inurl:"/wp-content/plugins/tidio-live-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tidio-live-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tidio-live-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tidio-live-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tidio-live-chat-a8fc519a1878f904c76257237b147fde.yaml b/nuclei-templates/cve-less/plugins/tidio-live-chat-a8fc519a1878f904c76257237b147fde.yaml new file mode 100644 index 0000000000..7072da3b33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tidio-live-chat-a8fc519a1878f904c76257237b147fde.yaml @@ -0,0 +1,58 @@ +id: tidio-live-chat-a8fc519a1878f904c76257237b147fde + +info: + name: > + Tidio – Live Chat, Chatbots & Email Integration <= 5.2.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbdb3be2-50c5-4516-bce1-8785e338fe5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tidio-live-chat/" + google-query: inurl:"/wp-content/plugins/tidio-live-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tidio-live-chat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tidio-live-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tidio-live-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tiempocom-1e76bb40e4de81280c04372b8a422f59.yaml b/nuclei-templates/cve-less/plugins/tiempocom-1e76bb40e4de81280c04372b8a422f59.yaml new file mode 100644 index 0000000000..4298b8e9d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tiempocom-1e76bb40e4de81280c04372b8a422f59.yaml @@ -0,0 +1,58 @@ +id: tiempocom-1e76bb40e4de81280c04372b8a422f59 + +info: + name: > + Tiempo.com <= 0.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a5e3d82-4722-47ff-b66f-448cb2851c1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tiempocom/" + google-query: inurl:"/wp-content/plugins/tiempocom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tiempocom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tiempocom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tiempocom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tiempocom-3cda5f6cbc287806403c6627673d9151.yaml b/nuclei-templates/cve-less/plugins/tiempocom-3cda5f6cbc287806403c6627673d9151.yaml new file mode 100644 index 0000000000..2ef7fe483e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tiempocom-3cda5f6cbc287806403c6627673d9151.yaml @@ -0,0 +1,58 @@ +id: tiempocom-3cda5f6cbc287806403c6627673d9151 + +info: + name: > + Tiempo.com <= 0.1.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62ac2725-0071-4a7d-8561-256e6a232de3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tiempocom/" + google-query: inurl:"/wp-content/plugins/tiempocom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tiempocom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tiempocom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tiempocom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tiempocom-f4fc2d0ee12c0981504dfb21225895dd.yaml b/nuclei-templates/cve-less/plugins/tiempocom-f4fc2d0ee12c0981504dfb21225895dd.yaml new file mode 100644 index 0000000000..546f224be8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tiempocom-f4fc2d0ee12c0981504dfb21225895dd.yaml @@ -0,0 +1,58 @@ +id: tiempocom-f4fc2d0ee12c0981504dfb21225895dd + +info: + name: > + Tiempo.com <= 0.1.2 - Cross-Site Request Forgery to Shortcode Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3dacef70-a881-400e-b9f7-c0a815cf624a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tiempocom/" + google-query: inurl:"/wp-content/plugins/tiempocom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tiempocom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tiempocom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tiempocom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tier-pricing-table-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tier-pricing-table-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5a1c3614a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tier-pricing-table-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tier-pricing-table-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tier-pricing-table/" + google-query: inurl:"/wp-content/plugins/tier-pricing-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tier-pricing-table,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tier-pricing-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tier-pricing-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tiger-form-e900f7eced6fb67094982ccf0f2ecdaa.yaml b/nuclei-templates/cve-less/plugins/tiger-form-e900f7eced6fb67094982ccf0f2ecdaa.yaml new file mode 100644 index 0000000000..d9b3e032bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tiger-form-e900f7eced6fb67094982ccf0f2ecdaa.yaml @@ -0,0 +1,58 @@ +id: tiger-form-e900f7eced6fb67094982ccf0f2ecdaa + +info: + name: > + Tiger Forms <= 2.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/286e52b4-2694-4f3b-9d1d-fd1ebf1d1e50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tiger-form/" + google-query: inurl:"/wp-content/plugins/tiger-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tiger-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tiger-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tiger-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tilda-publishing-2da3bb827430b38a292fe600fab2f658.yaml b/nuclei-templates/cve-less/plugins/tilda-publishing-2da3bb827430b38a292fe600fab2f658.yaml new file mode 100644 index 0000000000..d235d0a59f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tilda-publishing-2da3bb827430b38a292fe600fab2f658.yaml @@ -0,0 +1,58 @@ +id: tilda-publishing-2da3bb827430b38a292fe600fab2f658 + +info: + name: > + Tilda Publishing <= 0.3.23 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a992bb2-67b9-48db-a536-c3af79e93af4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tilda-publishing/" + google-query: inurl:"/wp-content/plugins/tilda-publishing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tilda-publishing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tilda-publishing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tilda-publishing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/time-sheets-1e381af0c631b13f86322331880f1612.yaml b/nuclei-templates/cve-less/plugins/time-sheets-1e381af0c631b13f86322331880f1612.yaml new file mode 100644 index 0000000000..a29818321a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/time-sheets-1e381af0c631b13f86322331880f1612.yaml @@ -0,0 +1,58 @@ +id: time-sheets-1e381af0c631b13f86322331880f1612 + +info: + name: > + Time Sheets < 1.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47906575-b88a-4e12-b134-accf47a264a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/time-sheets/" + google-query: inurl:"/wp-content/plugins/time-sheets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,time-sheets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/time-sheets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "time-sheets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/time-sheets-49fe99f51fd3a93a572d1c7ee54d4741.yaml b/nuclei-templates/cve-less/plugins/time-sheets-49fe99f51fd3a93a572d1c7ee54d4741.yaml new file mode 100644 index 0000000000..dd18b70156 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/time-sheets-49fe99f51fd3a93a572d1c7ee54d4741.yaml @@ -0,0 +1,58 @@ +id: time-sheets-49fe99f51fd3a93a572d1c7ee54d4741 + +info: + name: > + Time Sheets <= 1.29.2 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7e25e64-4504-4aad-aeb6-d58b5c36a4bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/time-sheets/" + google-query: inurl:"/wp-content/plugins/time-sheets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,time-sheets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/time-sheets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "time-sheets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/time-sheets-f2aba70ce8a44005876e1620c7a6d111.yaml b/nuclei-templates/cve-less/plugins/time-sheets-f2aba70ce8a44005876e1620c7a6d111.yaml new file mode 100644 index 0000000000..25d8c29b6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/time-sheets-f2aba70ce8a44005876e1620c7a6d111.yaml @@ -0,0 +1,58 @@ +id: time-sheets-f2aba70ce8a44005876e1620c7a6d111 + +info: + name: > + Time Sheets < 1.5.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/984bfc69-e203-4a06-9d4b-2185ecf771bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/time-sheets/" + google-query: inurl:"/wp-content/plugins/time-sheets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,time-sheets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/time-sheets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "time-sheets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timed-content-2049615ded6008298be273ad480dccbb.yaml b/nuclei-templates/cve-less/plugins/timed-content-2049615ded6008298be273ad480dccbb.yaml new file mode 100644 index 0000000000..f2efa08c74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timed-content-2049615ded6008298be273ad480dccbb.yaml @@ -0,0 +1,58 @@ +id: timed-content-2049615ded6008298be273ad480dccbb + +info: + name: > + Timed Content <= 2.72 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/443a4afc-5dfc-499c-8701-249c71215b5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timed-content/" + google-query: inurl:"/wp-content/plugins/timed-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timed-content,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timed-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timed-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timeline-and-history-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/timeline-and-history-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..945d053475 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timeline-and-history-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: timeline-and-history-slider-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timeline-and-history-slider/" + google-query: inurl:"/wp-content/plugins/timeline-and-history-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timeline-and-history-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timeline-and-history-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timeline-and-history-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timeline-awesome-4dec1d95d84aa9956ba49479ab4962de.yaml b/nuclei-templates/cve-less/plugins/timeline-awesome-4dec1d95d84aa9956ba49479ab4962de.yaml new file mode 100644 index 0000000000..e233f2b9b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timeline-awesome-4dec1d95d84aa9956ba49479ab4962de.yaml @@ -0,0 +1,58 @@ +id: timeline-awesome-4dec1d95d84aa9956ba49479ab4962de + +info: + name: > + History Timeline <= 1.0.5 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/446fadbc-b927-4245-9095-fd545a906b9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timeline-awesome/" + google-query: inurl:"/wp-content/plugins/timeline-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timeline-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timeline-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timeline-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timeline-calendar-85e4c9b56c88bebde438fcf37c31b92a.yaml b/nuclei-templates/cve-less/plugins/timeline-calendar-85e4c9b56c88bebde438fcf37c31b92a.yaml new file mode 100644 index 0000000000..1cf44ab4a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timeline-calendar-85e4c9b56c88bebde438fcf37c31b92a.yaml @@ -0,0 +1,58 @@ +id: timeline-calendar-85e4c9b56c88bebde438fcf37c31b92a + +info: + name: > + Timeline Calendar <= 1.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c2f0e74-cdc0-4da9-bd79-8d09f5459be7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timeline-calendar/" + google-query: inurl:"/wp-content/plugins/timeline-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timeline-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timeline-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timeline-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timeline-widget-addon-for-elementor-e56f591ae1b5802507934b44dcafdc98.yaml b/nuclei-templates/cve-less/plugins/timeline-widget-addon-for-elementor-e56f591ae1b5802507934b44dcafdc98.yaml new file mode 100644 index 0000000000..432ca431d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timeline-widget-addon-for-elementor-e56f591ae1b5802507934b44dcafdc98.yaml @@ -0,0 +1,58 @@ +id: timeline-widget-addon-for-elementor-e56f591ae1b5802507934b44dcafdc98 + +info: + name: > + Timeline Widget For Elementor (Elementor Timeline, Vertical & Horizontal Timeline) <= 1.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03073726-58d0-45b3-b7a6-7d12dbede919?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timeline-widget-addon-for-elementor/" + google-query: inurl:"/wp-content/plugins/timeline-widget-addon-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timeline-widget-addon-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timeline-widget-addon-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timeline-widget-addon-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timelineoptinpro-7246f496264a94e15a1d8c35393cc7dd.yaml b/nuclei-templates/cve-less/plugins/timelineoptinpro-7246f496264a94e15a1d8c35393cc7dd.yaml new file mode 100644 index 0000000000..c284f6683f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timelineoptinpro-7246f496264a94e15a1d8c35393cc7dd.yaml @@ -0,0 +1,58 @@ +id: timelineoptinpro-7246f496264a94e15a1d8c35393cc7dd + +info: + name: > + timelineoptinpro Plugin (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1de8404-5c7b-48d7-ab7f-7f99b309ee43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timelineoptinpro/" + google-query: inurl:"/wp-content/plugins/timelineoptinpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timelineoptinpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timelineoptinpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timelineoptinpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timely-booking-button-a2f77566f40955cc7451f648aaec112c.yaml b/nuclei-templates/cve-less/plugins/timely-booking-button-a2f77566f40955cc7451f648aaec112c.yaml new file mode 100644 index 0000000000..c41f4a3aae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timely-booking-button-a2f77566f40955cc7451f648aaec112c.yaml @@ -0,0 +1,58 @@ +id: timely-booking-button-a2f77566f40955cc7451f648aaec112c + +info: + name: > + Timely Booking Button <= 2.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2eb3b568-8689-4184-8091-0b84aa6b472d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timely-booking-button/" + google-query: inurl:"/wp-content/plugins/timely-booking-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timely-booking-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timely-booking-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timely-booking-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timesheet-22a755155bed2f04b1157ca6e2e3c976.yaml b/nuclei-templates/cve-less/plugins/timesheet-22a755155bed2f04b1157ca6e2e3c976.yaml new file mode 100644 index 0000000000..f3972ed54e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timesheet-22a755155bed2f04b1157ca6e2e3c976.yaml @@ -0,0 +1,58 @@ +id: timesheet-22a755155bed2f04b1157ca6e2e3c976 + +info: + name: > + Help Center by BestWebSoft < 0.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e0f903a-e882-4de9-953a-c377b591004e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timesheet/" + google-query: inurl:"/wp-content/plugins/timesheet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timesheet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timesheet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timesheet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timthumb-a4aa366f217005e74322ff2bf7a0e182.yaml b/nuclei-templates/cve-less/plugins/timthumb-a4aa366f217005e74322ff2bf7a0e182.yaml new file mode 100644 index 0000000000..c99d84e2db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timthumb-a4aa366f217005e74322ff2bf7a0e182.yaml @@ -0,0 +1,58 @@ +id: timthumb-a4aa366f217005e74322ff2bf7a0e182 + +info: + name: > + TimThumb <= 1.33 - Remote File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e062c794-1ab7-4d44-95da-40cd401f3a37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timthumb/" + google-query: inurl:"/wp-content/plugins/timthumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timthumb,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timthumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timthumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timthumb-b970262dad30a7d484efebc698a4fbb7.yaml b/nuclei-templates/cve-less/plugins/timthumb-b970262dad30a7d484efebc698a4fbb7.yaml new file mode 100644 index 0000000000..6387fd0003 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timthumb-b970262dad30a7d484efebc698a4fbb7.yaml @@ -0,0 +1,58 @@ +id: timthumb-b970262dad30a7d484efebc698a4fbb7 + +info: + name: > + TimThumb <= 2.8.13 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73776e0a-4d2a-44f9-97a2-f06055ce2c63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timthumb/" + google-query: inurl:"/wp-content/plugins/timthumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timthumb,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timthumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timthumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/timthumb-vulnerability-scanner-5eff25f23e727e07861c6b9793205529.yaml b/nuclei-templates/cve-less/plugins/timthumb-vulnerability-scanner-5eff25f23e727e07861c6b9793205529.yaml new file mode 100644 index 0000000000..1840fa6ef2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/timthumb-vulnerability-scanner-5eff25f23e727e07861c6b9793205529.yaml @@ -0,0 +1,58 @@ +id: timthumb-vulnerability-scanner-5eff25f23e727e07861c6b9793205529 + +info: + name: > + Timthumb Vulnerability Scanner <= 1.54 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0e8d029-af6b-43cb-aa90-f92777c5ac99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/timthumb-vulnerability-scanner/" + google-query: inurl:"/wp-content/plugins/timthumb-vulnerability-scanner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,timthumb-vulnerability-scanner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/timthumb-vulnerability-scanner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "timthumb-vulnerability-scanner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.54') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tiny-carousel-horizontal-slider-54520ac61a70e176cb0b123fca675fcd.yaml b/nuclei-templates/cve-less/plugins/tiny-carousel-horizontal-slider-54520ac61a70e176cb0b123fca675fcd.yaml new file mode 100644 index 0000000000..b2f0f7ec87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tiny-carousel-horizontal-slider-54520ac61a70e176cb0b123fca675fcd.yaml @@ -0,0 +1,58 @@ +id: tiny-carousel-horizontal-slider-54520ac61a70e176cb0b123fca675fcd + +info: + name: > + Tiny Carousel Horizontal Slider <= 8.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2a3ad97-b4ea-4ad9-ac83-071e56cb8df7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tiny-carousel-horizontal-slider/" + google-query: inurl:"/wp-content/plugins/tiny-carousel-horizontal-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tiny-carousel-horizontal-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tiny-carousel-horizontal-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tiny-carousel-horizontal-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tiny-carousel-horizontal-slider-plus-e0a3631cbe633a42d5989c02ecf7206b.yaml b/nuclei-templates/cve-less/plugins/tiny-carousel-horizontal-slider-plus-e0a3631cbe633a42d5989c02ecf7206b.yaml new file mode 100644 index 0000000000..5b23ac3134 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tiny-carousel-horizontal-slider-plus-e0a3631cbe633a42d5989c02ecf7206b.yaml @@ -0,0 +1,58 @@ +id: tiny-carousel-horizontal-slider-plus-e0a3631cbe633a42d5989c02ecf7206b + +info: + name: > + Tiny carousel horizontal slider plus <= 3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/167ae586-1f18-43ac-a7c1-e67a00ce8787?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tiny-carousel-horizontal-slider-plus/" + google-query: inurl:"/wp-content/plugins/tiny-carousel-horizontal-slider-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tiny-carousel-horizontal-slider-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tiny-carousel-horizontal-slider-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tiny-carousel-horizontal-slider-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tiny-contact-form-daddd512be0305b66a7c59d444cececf.yaml b/nuclei-templates/cve-less/plugins/tiny-contact-form-daddd512be0305b66a7c59d444cececf.yaml new file mode 100644 index 0000000000..a67e96469c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tiny-contact-form-daddd512be0305b66a7c59d444cececf.yaml @@ -0,0 +1,58 @@ +id: tiny-contact-form-daddd512be0305b66a7c59d444cececf + +info: + name: > + Tiny Contact Form <= 0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a71d13b2-5c0b-4e19-b1b3-b97a996d4019?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tiny-contact-form/" + google-query: inurl:"/wp-content/plugins/tiny-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tiny-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tiny-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tiny-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinychat-roomspy-9f9e4858911ea4301e5e57019a58fb6b.yaml b/nuclei-templates/cve-less/plugins/tinychat-roomspy-9f9e4858911ea4301e5e57019a58fb6b.yaml new file mode 100644 index 0000000000..17d1e28e71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinychat-roomspy-9f9e4858911ea4301e5e57019a58fb6b.yaml @@ -0,0 +1,58 @@ +id: tinychat-roomspy-9f9e4858911ea4301e5e57019a58fb6b + +info: + name: > + TinyChat Room Spy <= 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64cf73fa-cdb9-4703-869e-343ee6f8178e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinychat-roomspy/" + google-query: inurl:"/wp-content/plugins/tinychat-roomspy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinychat-roomspy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinychat-roomspy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinychat-roomspy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-advanced-43f501281b9dc8f645fd47c4a0800fba.yaml b/nuclei-templates/cve-less/plugins/tinymce-advanced-43f501281b9dc8f645fd47c4a0800fba.yaml new file mode 100644 index 0000000000..09f54e7f1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-advanced-43f501281b9dc8f645fd47c4a0800fba.yaml @@ -0,0 +1,58 @@ +id: tinymce-advanced-43f501281b9dc8f645fd47c4a0800fba + +info: + name: > + TinyMCE Advanced <= 4.1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb427792-8675-4c38-a4e6-ba2b8091003f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-advanced/" + google-query: inurl:"/wp-content/plugins/tinymce-advanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-advanced,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-advanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-advanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-and-tinymce-advanced-professsional-formats-and-styles-a238023f989616cc05c2de1d1e0516a1.yaml b/nuclei-templates/cve-less/plugins/tinymce-and-tinymce-advanced-professsional-formats-and-styles-a238023f989616cc05c2de1d1e0516a1.yaml new file mode 100644 index 0000000000..974903b19f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-and-tinymce-advanced-professsional-formats-and-styles-a238023f989616cc05c2de1d1e0516a1.yaml @@ -0,0 +1,58 @@ +id: tinymce-and-tinymce-advanced-professsional-formats-and-styles-a238023f989616cc05c2de1d1e0516a1 + +info: + name: > + TinyMCE Professional Formats and Styles <= 1.1.2 - Cross-Site Request Forgery via bb_taps_backend_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63370972-a6cb-40ed-91f2-4f469dc5335b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-and-tinymce-advanced-professsional-formats-and-styles/" + google-query: inurl:"/wp-content/plugins/tinymce-and-tinymce-advanced-professsional-formats-and-styles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-and-tinymce-advanced-professsional-formats-and-styles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-and-tinymce-advanced-professsional-formats-and-styles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-and-tinymce-advanced-professsional-formats-and-styles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-annotate-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tinymce-annotate-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..b972a6de5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-annotate-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tinymce-annotate-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-annotate/" + google-query: inurl:"/wp-content/plugins/tinymce-annotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-annotate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-annotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-annotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-annotate-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/tinymce-annotate-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..c74cacc8b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-annotate-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: tinymce-annotate-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-annotate/" + google-query: inurl:"/wp-content/plugins/tinymce-annotate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-annotate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-annotate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-annotate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-colorpicker-63703d9ee4495028e03f0458c1905965.yaml b/nuclei-templates/cve-less/plugins/tinymce-colorpicker-63703d9ee4495028e03f0458c1905965.yaml new file mode 100644 index 0000000000..e3b5ec295c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-colorpicker-63703d9ee4495028e03f0458c1905965.yaml @@ -0,0 +1,58 @@ +id: tinymce-colorpicker-63703d9ee4495028e03f0458c1905965 + +info: + name: > + TinyMCE Color Picker < 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f9cd0f2-1ca6-47cb-94bd-5c286cf9c67f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-colorpicker/" + google-query: inurl:"/wp-content/plugins/tinymce-colorpicker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-colorpicker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-colorpicker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-colorpicker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-colorpicker-ffaf15e9710e51e22815d7c14866275b.yaml b/nuclei-templates/cve-less/plugins/tinymce-colorpicker-ffaf15e9710e51e22815d7c14866275b.yaml new file mode 100644 index 0000000000..217b8dc60d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-colorpicker-ffaf15e9710e51e22815d7c14866275b.yaml @@ -0,0 +1,58 @@ +id: tinymce-colorpicker-ffaf15e9710e51e22815d7c14866275b + +info: + name: > + TinyMCE Color Picker <= 1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9cefc8e-9c1c-4b5e-adf8-665b8d4dc774?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-colorpicker/" + google-query: inurl:"/wp-content/plugins/tinymce-colorpicker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-colorpicker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-colorpicker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-colorpicker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-custom-styles-500071d87ecb0967bf74f13aaaaabbd7.yaml b/nuclei-templates/cve-less/plugins/tinymce-custom-styles-500071d87ecb0967bf74f13aaaaabbd7.yaml new file mode 100644 index 0000000000..f75f3d0b6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-custom-styles-500071d87ecb0967bf74f13aaaaabbd7.yaml @@ -0,0 +1,58 @@ +id: tinymce-custom-styles-500071d87ecb0967bf74f13aaaaabbd7 + +info: + name: > + TinyMCE Custom Styles <= 1.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31058d2e-9c23-4057-89a4-5847b6012330?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-custom-styles/" + google-query: inurl:"/wp-content/plugins/tinymce-custom-styles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-custom-styles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-custom-styles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-custom-styles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-custom-styles-c3680e3206f99027fb5f3986ae69948a.yaml b/nuclei-templates/cve-less/plugins/tinymce-custom-styles-c3680e3206f99027fb5f3986ae69948a.yaml new file mode 100644 index 0000000000..570863f410 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-custom-styles-c3680e3206f99027fb5f3986ae69948a.yaml @@ -0,0 +1,58 @@ +id: tinymce-custom-styles-c3680e3206f99027fb5f3986ae69948a + +info: + name: > + TinyMCE Custom Styles <= 1.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2a77443-9fca-4686-be48-b3905a33c87f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-custom-styles/" + google-query: inurl:"/wp-content/plugins/tinymce-custom-styles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-custom-styles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-custom-styles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-custom-styles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tinymce-thumbnail-gallery-d4668154e14e969595c9de23505f40d2.yaml b/nuclei-templates/cve-less/plugins/tinymce-thumbnail-gallery-d4668154e14e969595c9de23505f40d2.yaml new file mode 100644 index 0000000000..b033b5ac58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tinymce-thumbnail-gallery-d4668154e14e969595c9de23505f40d2.yaml @@ -0,0 +1,58 @@ +id: tinymce-thumbnail-gallery-d4668154e14e969595c9de23505f40d2 + +info: + name: > + Tinymce Thumbnail Gallery <= 1.0.7 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78914fef-6ab4-49b8-8c67-3a634759194c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tinymce-thumbnail-gallery/" + google-query: inurl:"/wp-content/plugins/tinymce-thumbnail-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tinymce-thumbnail-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tinymce-thumbnail-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tinymce-thumbnail-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tippy-13d220693e087642304f87b309abc136.yaml b/nuclei-templates/cve-less/plugins/tippy-13d220693e087642304f87b309abc136.yaml new file mode 100644 index 0000000000..f6b33bac2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tippy-13d220693e087642304f87b309abc136.yaml @@ -0,0 +1,58 @@ +id: tippy-13d220693e087642304f87b309abc136 + +info: + name: > + Tippy <= 6.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via tippy shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6460406-da83-4dad-97a5-fe961f0c46fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tippy/" + google-query: inurl:"/wp-content/plugins/tippy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tippy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tippy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tippy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tipsacarrier-3a70527433a2343d8a6eb73d336b1d11.yaml b/nuclei-templates/cve-less/plugins/tipsacarrier-3a70527433a2343d8a6eb73d336b1d11.yaml new file mode 100644 index 0000000000..d1d170e68c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tipsacarrier-3a70527433a2343d8a6eb73d336b1d11.yaml @@ -0,0 +1,58 @@ +id: tipsacarrier-3a70527433a2343d8a6eb73d336b1d11 + +info: + name: > + Tipsacarrier <= 1.4.4.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e08d455e-925d-4a94-8d57-484aedc25411?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tipsacarrier/" + google-query: inurl:"/wp-content/plugins/tipsacarrier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tipsacarrier,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tipsacarrier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tipsacarrier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tipsacarrier-6007b8b9442eb6013d2d90e94b8a6f90.yaml b/nuclei-templates/cve-less/plugins/tipsacarrier-6007b8b9442eb6013d2d90e94b8a6f90.yaml new file mode 100644 index 0000000000..224eb60421 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tipsacarrier-6007b8b9442eb6013d2d90e94b8a6f90.yaml @@ -0,0 +1,58 @@ +id: tipsacarrier-6007b8b9442eb6013d2d90e94b8a6f90 + +info: + name: > + Tipsacarrier <= 1.4.4.2 - Missing Authorization to Order Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd6becbf-29cc-4744-8c9b-5b75f8c5f402?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tipsacarrier/" + google-query: inurl:"/wp-content/plugins/tipsacarrier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tipsacarrier,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tipsacarrier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tipsacarrier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/titan-framework-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/titan-framework-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..cddb18e523 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/titan-framework-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: titan-framework-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/titan-framework/" + google-query: inurl:"/wp-content/plugins/titan-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,titan-framework,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/titan-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "titan-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/titan-framework-8048ca5fa2e5dc8c9443b2fbef022686.yaml b/nuclei-templates/cve-less/plugins/titan-framework-8048ca5fa2e5dc8c9443b2fbef022686.yaml new file mode 100644 index 0000000000..4b5c5dd9a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/titan-framework-8048ca5fa2e5dc8c9443b2fbef022686.yaml @@ -0,0 +1,58 @@ +id: titan-framework-8048ca5fa2e5dc8c9443b2fbef022686 + +info: + name: > + Titan Framework <= 1.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/009084cf-0a49-41ab-8b3b-fe46c00a889b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/titan-framework/" + google-query: inurl:"/wp-content/plugins/titan-framework/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,titan-framework,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/titan-framework/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "titan-framework" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/titan-labs-security-audit-cb74790ba4bbb7de85dca1c3cb33c74c.yaml b/nuclei-templates/cve-less/plugins/titan-labs-security-audit-cb74790ba4bbb7de85dca1c3cb33c74c.yaml new file mode 100644 index 0000000000..323cbd9df9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/titan-labs-security-audit-cb74790ba4bbb7de85dca1c3cb33c74c.yaml @@ -0,0 +1,58 @@ +id: titan-labs-security-audit-cb74790ba4bbb7de85dca1c3cb33c74c + +info: + name: > + Security Audit <= 1.0.0 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dab3786b-1f8e-428c-afee-afd3e43f40ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/titan-labs-security-audit/" + google-query: inurl:"/wp-content/plugins/titan-labs-security-audit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,titan-labs-security-audit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/titan-labs-security-audit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "titan-labs-security-audit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/title-field-validation-32a996c823f220857a5611dc8238f0fc.yaml b/nuclei-templates/cve-less/plugins/title-field-validation-32a996c823f220857a5611dc8238f0fc.yaml new file mode 100644 index 0000000000..333ede8fb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/title-field-validation-32a996c823f220857a5611dc8238f0fc.yaml @@ -0,0 +1,58 @@ +id: title-field-validation-32a996c823f220857a5611dc8238f0fc + +info: + name: > + Title Field Validation <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bb43b6c-4f14-401c-9964-1c4c19fc9e51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/title-field-validation/" + google-query: inurl:"/wp-content/plugins/title-field-validation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,title-field-validation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/title-field-validation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "title-field-validation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tk-google-fonts-0439b5ba8ec01f6ad565e8fbfefdff7e.yaml b/nuclei-templates/cve-less/plugins/tk-google-fonts-0439b5ba8ec01f6ad565e8fbfefdff7e.yaml new file mode 100644 index 0000000000..08d01fa871 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tk-google-fonts-0439b5ba8ec01f6ad565e8fbfefdff7e.yaml @@ -0,0 +1,58 @@ +id: tk-google-fonts-0439b5ba8ec01f6ad565e8fbfefdff7e + +info: + name: > + TK Google Fonts GDPR Compliant <= 2.2.11 - Missing Authorization to Font Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bc772a6-95a1-4420-bd97-1778002e2168?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tk-google-fonts/" + google-query: inurl:"/wp-content/plugins/tk-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tk-google-fonts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tk-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tk-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tk-google-fonts-75dc3c235e29287a43892beb13ca3ae4.yaml b/nuclei-templates/cve-less/plugins/tk-google-fonts-75dc3c235e29287a43892beb13ca3ae4.yaml new file mode 100644 index 0000000000..50c2a1ac19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tk-google-fonts-75dc3c235e29287a43892beb13ca3ae4.yaml @@ -0,0 +1,58 @@ +id: tk-google-fonts-75dc3c235e29287a43892beb13ca3ae4 + +info: + name: > + TK Google Fonts GDPR Compliant <= 2.2.11 - Missing Authorization to Font Addition + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7546b0b7-8081-4762-9e20-76dfb3c8a8a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tk-google-fonts/" + google-query: inurl:"/wp-content/plugins/tk-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tk-google-fonts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tk-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tk-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tk-google-fonts-8ac6490c5c7ec2a3665c4caa676311dd.yaml b/nuclei-templates/cve-less/plugins/tk-google-fonts-8ac6490c5c7ec2a3665c4caa676311dd.yaml new file mode 100644 index 0000000000..ef1b0eb766 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tk-google-fonts-8ac6490c5c7ec2a3665c4caa676311dd.yaml @@ -0,0 +1,58 @@ +id: tk-google-fonts-8ac6490c5c7ec2a3665c4caa676311dd + +info: + name: > + TK Google Fonts GDPR Compliant <= 2.2.7 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c1e005f-c0f1-4dff-928b-18919f117048?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tk-google-fonts/" + google-query: inurl:"/wp-content/plugins/tk-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tk-google-fonts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tk-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tk-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tk-google-fonts-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tk-google-fonts-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5df30c174b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tk-google-fonts-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tk-google-fonts-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tk-google-fonts/" + google-query: inurl:"/wp-content/plugins/tk-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tk-google-fonts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tk-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tk-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tk-smugmug-slideshow-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tk-smugmug-slideshow-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9bdca14f3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tk-smugmug-slideshow-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tk-smugmug-slideshow-shortcode-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tk-smugmug-slideshow-shortcode/" + google-query: inurl:"/wp-content/plugins/tk-smugmug-slideshow-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tk-smugmug-slideshow-shortcode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tk-smugmug-slideshow-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tk-smugmug-slideshow-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tlp-portfolio-104358d8439dd47eecd1fd56dc0931ad.yaml b/nuclei-templates/cve-less/plugins/tlp-portfolio-104358d8439dd47eecd1fd56dc0931ad.yaml new file mode 100644 index 0000000000..3431719e78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tlp-portfolio-104358d8439dd47eecd1fd56dc0931ad.yaml @@ -0,0 +1,58 @@ +id: tlp-portfolio-104358d8439dd47eecd1fd56dc0931ad + +info: + name: > + Portfolio – WordPress Portfolio Plugin <= 2.8.8 - Cross-Site Request Forgery in rtport_spare_me + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15d479e7-f0b8-4175-84b0-cd611b73233a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tlp-portfolio/" + google-query: inurl:"/wp-content/plugins/tlp-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tlp-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tlp-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tlp-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tlp-portfolio-248c17eb0194783cca6065d1efba6689.yaml b/nuclei-templates/cve-less/plugins/tlp-portfolio-248c17eb0194783cca6065d1efba6689.yaml new file mode 100644 index 0000000000..01aa05ebe9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tlp-portfolio-248c17eb0194783cca6065d1efba6689.yaml @@ -0,0 +1,58 @@ +id: tlp-portfolio-248c17eb0194783cca6065d1efba6689 + +info: + name: > + Portfolio – WordPress Portfolio Plugin <= 2.8.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c95bbba-6459-420f-a072-3b02c7d58ea0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tlp-portfolio/" + google-query: inurl:"/wp-content/plugins/tlp-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tlp-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tlp-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tlp-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tlp-team-cdba025b70cc52735f49fc0178ac6ba2.yaml b/nuclei-templates/cve-less/plugins/tlp-team-cdba025b70cc52735f49fc0178ac6ba2.yaml new file mode 100644 index 0000000000..115521ed21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tlp-team-cdba025b70cc52735f49fc0178ac6ba2.yaml @@ -0,0 +1,58 @@ +id: tlp-team-cdba025b70cc52735f49fc0178ac6ba2 + +info: + name: > + Team - WordPress Team Member Showcase Plugin <= 4.1.1 - Directory Traversal to Arbitrary File Read/Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/497cfc87-85ac-41d0-aeea-63c5fc64db0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tlp-team/" + google-query: inurl:"/wp-content/plugins/tlp-team/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tlp-team,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tlp-team/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tlp-team" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tm-woocommerce-compare-wishlist-4951c2f84359ebbaf9ae45fa01138a5f.yaml b/nuclei-templates/cve-less/plugins/tm-woocommerce-compare-wishlist-4951c2f84359ebbaf9ae45fa01138a5f.yaml new file mode 100644 index 0000000000..e8c5254d1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tm-woocommerce-compare-wishlist-4951c2f84359ebbaf9ae45fa01138a5f.yaml @@ -0,0 +1,58 @@ +id: tm-woocommerce-compare-wishlist-4951c2f84359ebbaf9ae45fa01138a5f + +info: + name: > + TM WooCommerce Compare & Wishlist <= 1.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/771ecb8c-feb1-40ea-b47b-a2ae033b3c87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tm-woocommerce-compare-wishlist/" + google-query: inurl:"/wp-content/plugins/tm-woocommerce-compare-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tm-woocommerce-compare-wishlist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tm-woocommerce-compare-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tm-woocommerce-compare-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tml-2fa-df76c0e1569130642f03fed33b459e14.yaml b/nuclei-templates/cve-less/plugins/tml-2fa-df76c0e1569130642f03fed33b459e14.yaml new file mode 100644 index 0000000000..369e6668a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tml-2fa-df76c0e1569130642f03fed33b459e14.yaml @@ -0,0 +1,58 @@ +id: tml-2fa-df76c0e1569130642f03fed33b459e14 + +info: + name: > + Theme My Login 2FA < 1.2 - 2FA Bypass via Brute Force + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1398e296-9b20-4f8e-85f2-896888abc67e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tml-2fa/" + google-query: inurl:"/wp-content/plugins/tml-2fa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tml-2fa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tml-2fa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tml-2fa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tnit-filter-gallery-for-beaver-builder-ad314c516dbfab27754190c924b97ec4.yaml b/nuclei-templates/cve-less/plugins/tnit-filter-gallery-for-beaver-builder-ad314c516dbfab27754190c924b97ec4.yaml new file mode 100644 index 0000000000..0c4d0f8a1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tnit-filter-gallery-for-beaver-builder-ad314c516dbfab27754190c924b97ec4.yaml @@ -0,0 +1,58 @@ +id: tnit-filter-gallery-for-beaver-builder-ad314c516dbfab27754190c924b97ec4 + +info: + name: > + TNIT Filter Gallery Plugin <= 0.0.6 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f2eccc6-8e66-4235-aec3-9948b8753bf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tnit-filter-gallery-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/tnit-filter-gallery-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tnit-filter-gallery-for-beaver-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tnit-filter-gallery-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tnit-filter-gallery-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/to-top-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml b/nuclei-templates/cve-less/plugins/to-top-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml new file mode 100644 index 0000000000..0358b41c67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/to-top-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml @@ -0,0 +1,58 @@ +id: to-top-1ebcfb0d802f2876f9cb0982be3e0fd0 + +info: + name: > + CatchThemes Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5656b9-615d-4764-974a-301d3dd748e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/to-top/" + google-query: inurl:"/wp-content/plugins/to-top/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,to-top,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/to-top/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "to-top" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/toast-stick-anything-439f898124b090bed262004bd1d51e22.yaml b/nuclei-templates/cve-less/plugins/toast-stick-anything-439f898124b090bed262004bd1d51e22.yaml new file mode 100644 index 0000000000..6a1d9911f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/toast-stick-anything-439f898124b090bed262004bd1d51e22.yaml @@ -0,0 +1,58 @@ +id: toast-stick-anything-439f898124b090bed262004bd1d51e22 + +info: + name: > + Sticky Anything <= 2.1.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba5485be-7612-406d-870d-6827f6c7ea71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/toast-stick-anything/" + google-query: inurl:"/wp-content/plugins/toast-stick-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,toast-stick-anything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/toast-stick-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "toast-stick-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/toast-stick-anything-9efc44a2e2c2df22995a8fc10affc12c.yaml b/nuclei-templates/cve-less/plugins/toast-stick-anything-9efc44a2e2c2df22995a8fc10affc12c.yaml new file mode 100644 index 0000000000..fea45b961c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/toast-stick-anything-9efc44a2e2c2df22995a8fc10affc12c.yaml @@ -0,0 +1,58 @@ +id: toast-stick-anything-9efc44a2e2c2df22995a8fc10affc12c + +info: + name: > + Sticky Anything <= 2.1.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c33bab-a27b-43b1-aa48-3f8c09a38528?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/toast-stick-anything/" + google-query: inurl:"/wp-content/plugins/toast-stick-anything/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,toast-stick-anything,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/toast-stick-anything/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "toast-stick-anything" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/toggle-the-title-d02abc95243fe34c87855a6ca2a95d58.yaml b/nuclei-templates/cve-less/plugins/toggle-the-title-d02abc95243fe34c87855a6ca2a95d58.yaml new file mode 100644 index 0000000000..3582a0e51b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/toggle-the-title-d02abc95243fe34c87855a6ca2a95d58.yaml @@ -0,0 +1,58 @@ +id: toggle-the-title-d02abc95243fe34c87855a6ca2a95d58 + +info: + name: > + Toggle The Title <= 1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1abdc53b-7abe-422b-aeea-5bf31733bdad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/toggle-the-title/" + google-query: inurl:"/wp-content/plugins/toggle-the-title/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,toggle-the-title,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/toggle-the-title/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "toggle-the-title" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tom-m8te-999f932c9f3d9b513b20f73dd0f5752b.yaml b/nuclei-templates/cve-less/plugins/tom-m8te-999f932c9f3d9b513b20f73dd0f5752b.yaml new file mode 100644 index 0000000000..5c26548074 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tom-m8te-999f932c9f3d9b513b20f73dd0f5752b.yaml @@ -0,0 +1,58 @@ +id: tom-m8te-999f932c9f3d9b513b20f73dd0f5752b + +info: + name: > + Tom M8te <= 1.5.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3c3c740-8ebe-44b2-a0ba-6beffe970cf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tom-m8te/" + google-query: inurl:"/wp-content/plugins/tom-m8te/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tom-m8te,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tom-m8te/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tom-m8te" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/toolbar-to-share-4c6e2168599e221f42c1bf26fb04cbf7.yaml b/nuclei-templates/cve-less/plugins/toolbar-to-share-4c6e2168599e221f42c1bf26fb04cbf7.yaml new file mode 100644 index 0000000000..93e8c020f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/toolbar-to-share-4c6e2168599e221f42c1bf26fb04cbf7.yaml @@ -0,0 +1,58 @@ +id: toolbar-to-share-4c6e2168599e221f42c1bf26fb04cbf7 + +info: + name: > + ToolBar to Share <= 2.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbda7670-179a-41ed-8ec9-ae7f5102e645?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/toolbar-to-share/" + google-query: inurl:"/wp-content/plugins/toolbar-to-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,toolbar-to-share,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/toolbar-to-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "toolbar-to-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/toolpage-fc90c64fe13a7ebe4bd7cb7436d1b567.yaml b/nuclei-templates/cve-less/plugins/toolpage-fc90c64fe13a7ebe4bd7cb7436d1b567.yaml new file mode 100644 index 0000000000..0bc6502d94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/toolpage-fc90c64fe13a7ebe4bd7cb7436d1b567.yaml @@ -0,0 +1,58 @@ +id: toolpage-fc90c64fe13a7ebe4bd7cb7436d1b567 + +info: + name: > + Toolpage <= 1.6.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5f23c14-e9ed-474c-9acc-2d6d43201572?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/toolpage/" + google-query: inurl:"/wp-content/plugins/toolpage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,toolpage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/toolpage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "toolpage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-11f988700fa46a478a10a059a72cb6a3.yaml b/nuclei-templates/cve-less/plugins/top-10-11f988700fa46a478a10a059a72cb6a3.yaml new file mode 100644 index 0000000000..7e2f564fff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-11f988700fa46a478a10a059a72cb6a3.yaml @@ -0,0 +1,58 @@ +id: top-10-11f988700fa46a478a10a059a72cb6a3 + +info: + name: > + Top 10 <= 3.3.2 - Cross-Site Request Forgery via edit_count_ajax + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e7d3bf0-1860-45b0-b928-2291b0f98902?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-4b2149909b70a0a5dde344497a2540e6.yaml b/nuclei-templates/cve-less/plugins/top-10-4b2149909b70a0a5dde344497a2540e6.yaml new file mode 100644 index 0000000000..c515015168 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-4b2149909b70a0a5dde344497a2540e6.yaml @@ -0,0 +1,58 @@ +id: top-10-4b2149909b70a0a5dde344497a2540e6 + +info: + name: > + Top 10 – Popular posts plugin for WordPress < 2.3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81437db2-252e-4031-884e-34112bc7b179?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-8a2fdef7cc698ec15988b37831ded08d.yaml b/nuclei-templates/cve-less/plugins/top-10-8a2fdef7cc698ec15988b37831ded08d.yaml new file mode 100644 index 0000000000..a4a58a84f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-8a2fdef7cc698ec15988b37831ded08d.yaml @@ -0,0 +1,58 @@ +id: top-10-8a2fdef7cc698ec15988b37831ded08d + +info: + name: > + Top 10 – Popular posts plugin - <= 3.2.4 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f50f1e64-5015-4e40-912e-92a4f16e1398?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-91499f9c529069cc8bb058d78e92bdab.yaml b/nuclei-templates/cve-less/plugins/top-10-91499f9c529069cc8bb058d78e92bdab.yaml new file mode 100644 index 0000000000..39d0851f9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-91499f9c529069cc8bb058d78e92bdab.yaml @@ -0,0 +1,58 @@ +id: top-10-91499f9c529069cc8bb058d78e92bdab + +info: + name: > + Top 10 – Popular posts plugin for WordPress <= 3.2.3 - Cross-Site Request Forgery via tptn_ajax_clearcache + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c7edfad-b45b-4297-876d-a063e02af0bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-a631956fae26932cfe37dec9f8eea277.yaml b/nuclei-templates/cve-less/plugins/top-10-a631956fae26932cfe37dec9f8eea277.yaml new file mode 100644 index 0000000000..492617e09a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-a631956fae26932cfe37dec9f8eea277.yaml @@ -0,0 +1,58 @@ +id: top-10-a631956fae26932cfe37dec9f8eea277 + +info: + name: > + Top 10 – Popular posts plugin for WordPress <= 3.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Blocks + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa23a535-f290-4517-b203-86e0331f55e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-aebc987297daa60ebc9f62d4c873ab22.yaml b/nuclei-templates/cve-less/plugins/top-10-aebc987297daa60ebc9f62d4c873ab22.yaml new file mode 100644 index 0000000000..26b3c4cf2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-aebc987297daa60ebc9f62d4c873ab22.yaml @@ -0,0 +1,58 @@ +id: top-10-aebc987297daa60ebc9f62d4c873ab22 + +info: + name: > + Top 10 – Popular posts plugin for WordPress <= 3.2.4 - Missing Authorization on tptn_chart_data + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbff7ec1-535d-43bf-be61-83a1e7625c77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-d6080d1f6e6aba862d174924fa49080e.yaml b/nuclei-templates/cve-less/plugins/top-10-d6080d1f6e6aba862d174924fa49080e.yaml new file mode 100644 index 0000000000..d157e6bd69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-d6080d1f6e6aba862d174924fa49080e.yaml @@ -0,0 +1,58 @@ +id: top-10-d6080d1f6e6aba862d174924fa49080e + +info: + name: > + Top 10 – Popular posts plugin for WordPress <= 2.4.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b320755-1255-4331-8176-ee67d8d4873e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-e382c8222b1abf6c6b2e0b2db7e0beeb.yaml b/nuclei-templates/cve-less/plugins/top-10-e382c8222b1abf6c6b2e0b2db7e0beeb.yaml new file mode 100644 index 0000000000..0b561b4794 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-e382c8222b1abf6c6b2e0b2db7e0beeb.yaml @@ -0,0 +1,58 @@ +id: top-10-e382c8222b1abf6c6b2e0b2db7e0beeb + +info: + name: > + Top 10 <= 2.9.4 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0af86e4-c30b-49e2-ad6a-97a415a74d18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-10-e7e948bfa89ef889d57ad4a644f6ffc0.yaml b/nuclei-templates/cve-less/plugins/top-10-e7e948bfa89ef889d57ad4a644f6ffc0.yaml new file mode 100644 index 0000000000..b8c983e050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-10-e7e948bfa89ef889d57ad4a644f6ffc0.yaml @@ -0,0 +1,58 @@ +id: top-10-e7e948bfa89ef889d57ad4a644f6ffc0 + +info: + name: > + Top 10 – Popular posts plugin for WordPress <= 3.2.3 - Missing Authorization on tptn_ajax_clearcache + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14e832ec-7181-44d9-8d26-2f77e6111763?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-10/" + google-query: inurl:"/wp-content/plugins/top-10/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-10,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-10/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-10" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-25-social-icons-34bed79fb50712c291365a8ff729b6f4.yaml b/nuclei-templates/cve-less/plugins/top-25-social-icons-34bed79fb50712c291365a8ff729b6f4.yaml new file mode 100644 index 0000000000..f3b559e443 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-25-social-icons-34bed79fb50712c291365a8ff729b6f4.yaml @@ -0,0 +1,58 @@ +id: top-25-social-icons-34bed79fb50712c291365a8ff729b6f4 + +info: + name: > + Download Top 25 Social Icons <= 3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9e3e417-d8a8-4e32-99aa-650e0a25a415?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-25-social-icons/" + google-query: inurl:"/wp-content/plugins/top-25-social-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-25-social-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-25-social-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-25-social-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-bar-4f0560b0cde9af506953920ade591947.yaml b/nuclei-templates/cve-less/plugins/top-bar-4f0560b0cde9af506953920ade591947.yaml new file mode 100644 index 0000000000..48a6449e53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-bar-4f0560b0cde9af506953920ade591947.yaml @@ -0,0 +1,58 @@ +id: top-bar-4f0560b0cde9af506953920ade591947 + +info: + name: > + Top Bar <= 3.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05ee4692-451b-4ff4-9bf0-8a16d39404ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-bar/" + google-query: inurl:"/wp-content/plugins/top-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-bar-7b68da6e2373d2ac5c585efcf03c710b.yaml b/nuclei-templates/cve-less/plugins/top-bar-7b68da6e2373d2ac5c585efcf03c710b.yaml new file mode 100644 index 0000000000..a22bcbb360 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-bar-7b68da6e2373d2ac5c585efcf03c710b.yaml @@ -0,0 +1,58 @@ +id: top-bar-7b68da6e2373d2ac5c585efcf03c710b + +info: + name: > + Top Bar <= 3.0.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36abd7e9-0ca4-4c22-ab13-08f2632a6797?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-bar/" + google-query: inurl:"/wp-content/plugins/top-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-bar-f8df3f710c2acd675329722d570c9bc9.yaml b/nuclei-templates/cve-less/plugins/top-bar-f8df3f710c2acd675329722d570c9bc9.yaml new file mode 100644 index 0000000000..b0bd0ff32c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-bar-f8df3f710c2acd675329722d570c9bc9.yaml @@ -0,0 +1,58 @@ +id: top-bar-f8df3f710c2acd675329722d570c9bc9 + +info: + name: > + Top Bar <= 3.0.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4195dbd4-7b6b-4201-887f-6da9bda618b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-bar/" + google-query: inurl:"/wp-content/plugins/top-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/top-table-of-contents-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/top-table-of-contents-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..c8819ea71d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/top-table-of-contents-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: top-table-of-contents-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/top-table-of-contents/" + google-query: inurl:"/wp-content/plugins/top-table-of-contents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,top-table-of-contents,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/top-table-of-contents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "top-table-of-contents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/topquark-40135bc4e3a937389149719d0bfc1b0d.yaml b/nuclei-templates/cve-less/plugins/topquark-40135bc4e3a937389149719d0bfc1b0d.yaml new file mode 100644 index 0000000000..c3ec4fb490 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/topquark-40135bc4e3a937389149719d0bfc1b0d.yaml @@ -0,0 +1,58 @@ +id: topquark-40135bc4e3a937389149719d0bfc1b0d + +info: + name: > + Top Quark Architecture Plugin < 2.1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67b152b5-e662-4dbd-a7db-87fc63cfb307?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/topquark/" + google-query: inurl:"/wp-content/plugins/topquark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,topquark,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/topquark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "topquark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/torro-forms-0b90da005dc4b695e711677701780a3d.yaml b/nuclei-templates/cve-less/plugins/torro-forms-0b90da005dc4b695e711677701780a3d.yaml new file mode 100644 index 0000000000..fdeaf389de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/torro-forms-0b90da005dc4b695e711677701780a3d.yaml @@ -0,0 +1,58 @@ +id: torro-forms-0b90da005dc4b695e711677701780a3d + +info: + name: > + Torro Forms <= 1.0.16 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e9641e2-fe33-4e22-895e-7974b4da6866?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/torro-forms/" + google-query: inurl:"/wp-content/plugins/torro-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,torro-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/torro-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "torro-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/total-donations-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml b/nuclei-templates/cve-less/plugins/total-donations-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml new file mode 100644 index 0000000000..de54f286f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/total-donations-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml @@ -0,0 +1,58 @@ +id: total-donations-618ad32a66dd6a63ff6bcc4f51e7ca7b + +info: + name: > + Total Donations <= 2.0.5 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/206c3f15-72d2-4aac-9500-0f794485639e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/total-donations/" + google-query: inurl:"/wp-content/plugins/total-donations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,total-donations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/total-donations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "total-donations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/total-sales-for-woocommerce-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/total-sales-for-woocommerce-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..28f24e8b2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/total-sales-for-woocommerce-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: total-sales-for-woocommerce-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/total-sales-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/total-sales-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,total-sales-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/total-sales-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "total-sales-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/total-security-d59208c9d25614855049428d0906a55a.yaml b/nuclei-templates/cve-less/plugins/total-security-d59208c9d25614855049428d0906a55a.yaml new file mode 100644 index 0000000000..9ebab152af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/total-security-d59208c9d25614855049428d0906a55a.yaml @@ -0,0 +1,58 @@ +id: total-security-d59208c9d25614855049428d0906a55a + +info: + name: > + Total Security <= 3.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45d3cff1-3a86-4b79-bf43-1623d41ac821?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/total-security/" + google-query: inurl:"/wp-content/plugins/total-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,total-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/total-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "total-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/total-security-fa39168559be958bde89e0128746256e.yaml b/nuclei-templates/cve-less/plugins/total-security-fa39168559be958bde89e0128746256e.yaml new file mode 100644 index 0000000000..332157d999 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/total-security-fa39168559be958bde89e0128746256e.yaml @@ -0,0 +1,58 @@ +id: total-security-fa39168559be958bde89e0128746256e + +info: + name: > + Total Security <= 3.4.0 - Unauthenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e24339c3-f8f8-4357-9717-a3077420603a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/total-security/" + google-query: inurl:"/wp-content/plugins/total-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,total-security,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/total-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "total-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/totalpoll-lite-79e3222cd5781d3ee2de3dbd9ec9763f.yaml b/nuclei-templates/cve-less/plugins/totalpoll-lite-79e3222cd5781d3ee2de3dbd9ec9763f.yaml new file mode 100644 index 0000000000..9abd214ae5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/totalpoll-lite-79e3222cd5781d3ee2de3dbd9ec9763f.yaml @@ -0,0 +1,58 @@ +id: totalpoll-lite-79e3222cd5781d3ee2de3dbd9ec9763f + +info: + name: > + Total Poll Lite <= 4.9.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ef57441-8e35-44c4-b566-56e8f1dd18d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/totalpoll-lite/" + google-query: inurl:"/wp-content/plugins/totalpoll-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,totalpoll-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/totalpoll-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "totalpoll-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/totalpoll-lite-dfd03aad01c26cf05b1c4c93b960bbc9.yaml b/nuclei-templates/cve-less/plugins/totalpoll-lite-dfd03aad01c26cf05b1c4c93b960bbc9.yaml new file mode 100644 index 0000000000..fd83c80e0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/totalpoll-lite-dfd03aad01c26cf05b1c4c93b960bbc9.yaml @@ -0,0 +1,58 @@ +id: totalpoll-lite-dfd03aad01c26cf05b1c4c93b960bbc9 + +info: + name: > + Total Poll Lite <= 4.8.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e3ae5e7-1f41-48cd-8aea-698e3b00066c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/totalpoll-lite/" + google-query: inurl:"/wp-content/plugins/totalpoll-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,totalpoll-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/totalpoll-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "totalpoll-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/totop-link-60f02b8fa4eb1579a77b1a967b981a9d.yaml b/nuclei-templates/cve-less/plugins/totop-link-60f02b8fa4eb1579a77b1a967b981a9d.yaml new file mode 100644 index 0000000000..415d09cb6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/totop-link-60f02b8fa4eb1579a77b1a967b981a9d.yaml @@ -0,0 +1,58 @@ +id: totop-link-60f02b8fa4eb1579a77b1a967b981a9d + +info: + name: > + ToTop Link <= 1.7.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b159d4f-494e-4ab4-8ed7-3421b437597e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/totop-link/" + google-query: inurl:"/wp-content/plugins/totop-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,totop-link,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/totop-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "totop-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tour-booking-manager-54c41ad802aaebe2d928746014c08472.yaml b/nuclei-templates/cve-less/plugins/tour-booking-manager-54c41ad802aaebe2d928746014c08472.yaml new file mode 100644 index 0000000000..0694603da1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tour-booking-manager-54c41ad802aaebe2d928746014c08472.yaml @@ -0,0 +1,58 @@ +id: tour-booking-manager-54c41ad802aaebe2d928746014c08472 + +info: + name: > + WpTravelly <= 1.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e34e774-30fe-49dc-b1f8-8dd63da65d23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tour-booking-manager/" + google-query: inurl:"/wp-content/plugins/tour-booking-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tour-booking-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tour-booking-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tour-booking-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tourfic-2b22d0b76b6d55c94058bbf5818916eb.yaml b/nuclei-templates/cve-less/plugins/tourfic-2b22d0b76b6d55c94058bbf5818916eb.yaml new file mode 100644 index 0000000000..ed4eef46d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tourfic-2b22d0b76b6d55c94058bbf5818916eb.yaml @@ -0,0 +1,58 @@ +id: tourfic-2b22d0b76b6d55c94058bbf5818916eb + +info: + name: > + Tourfic <= 2.11.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32d4c259-b56d-4f8f-84b8-7ef451fd02ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tourfic/" + google-query: inurl:"/wp-content/plugins/tourfic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tourfic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tourfic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tourfic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tourfic-98b35360d65753a713db3a25c694f42c.yaml b/nuclei-templates/cve-less/plugins/tourfic-98b35360d65753a713db3a25c694f42c.yaml new file mode 100644 index 0000000000..774f15fdf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tourfic-98b35360d65753a713db3a25c694f42c.yaml @@ -0,0 +1,58 @@ +id: tourfic-98b35360d65753a713db3a25c694f42c + +info: + name: > + Tourfic <= 2.11.15 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae39fac4-6b65-42a6-bd34-c364922ef675?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tourfic/" + google-query: inurl:"/wp-content/plugins/tourfic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tourfic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tourfic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tourfic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tourfic-edd8e3c62f3b71f626ad36553a59802b.yaml b/nuclei-templates/cve-less/plugins/tourfic-edd8e3c62f3b71f626ad36553a59802b.yaml new file mode 100644 index 0000000000..af122b1865 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tourfic-edd8e3c62f3b71f626ad36553a59802b.yaml @@ -0,0 +1,58 @@ +id: tourfic-edd8e3c62f3b71f626ad36553a59802b + +info: + name: > + Tourfic <= 2.11.17 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6973c8e0-d14b-4945-be1c-b7c8b44a4bcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tourfic/" + google-query: inurl:"/wp-content/plugins/tourfic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tourfic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tourfic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tourfic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tourfic-f0ebaf7908d2916224db8f5d1ff59d88.yaml b/nuclei-templates/cve-less/plugins/tourfic-f0ebaf7908d2916224db8f5d1ff59d88.yaml new file mode 100644 index 0000000000..4e5c394c1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tourfic-f0ebaf7908d2916224db8f5d1ff59d88.yaml @@ -0,0 +1,58 @@ +id: tourfic-f0ebaf7908d2916224db8f5d1ff59d88 + +info: + name: > + Tourfic <= 2.11.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b258fa40-4e76-4c84-b32f-e6c46fee770a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tourfic/" + google-query: inurl:"/wp-content/plugins/tourfic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tourfic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tourfic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tourfic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tp-education-da386ce90f0520e508b80fb1a2e2a0c2.yaml b/nuclei-templates/cve-less/plugins/tp-education-da386ce90f0520e508b80fb1a2e2a0c2.yaml new file mode 100644 index 0000000000..bff847e6bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tp-education-da386ce90f0520e508b80fb1a2e2a0c2.yaml @@ -0,0 +1,58 @@ +id: tp-education-da386ce90f0520e508b80fb1a2e2a0c2 + +info: + name: > + TP Education <= 4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfba9979-44a2-4ad4-bb6a-f54f73b628d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tp-education/" + google-query: inurl:"/wp-content/plugins/tp-education/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tp-education,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tp-education/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tp-education" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tpg-redirect-98c7efbdf31bd767f6d42c5af6007d9c.yaml b/nuclei-templates/cve-less/plugins/tpg-redirect-98c7efbdf31bd767f6d42c5af6007d9c.yaml new file mode 100644 index 0000000000..95c9c2175f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tpg-redirect-98c7efbdf31bd767f6d42c5af6007d9c.yaml @@ -0,0 +1,58 @@ +id: tpg-redirect-98c7efbdf31bd767f6d42c5af6007d9c + +info: + name: > + TPG Redirect <= 1.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d92b9c21-067b-41c3-a385-a65faa8dd0ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tpg-redirect/" + google-query: inurl:"/wp-content/plugins/tpg-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tpg-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tpg-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tpg-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tr-easy-google-analytics-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/tr-easy-google-analytics-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..abc47e00d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tr-easy-google-analytics-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: tr-easy-google-analytics-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tr-easy-google-analytics/" + google-query: inurl:"/wp-content/plugins/tr-easy-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tr-easy-google-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tr-easy-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tr-easy-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/track-geolocation-of-users-using-contact-form-7-5fc14f2bf72ff01c08c1f94583d480b0.yaml b/nuclei-templates/cve-less/plugins/track-geolocation-of-users-using-contact-form-7-5fc14f2bf72ff01c08c1f94583d480b0.yaml new file mode 100644 index 0000000000..c8a55caca2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/track-geolocation-of-users-using-contact-form-7-5fc14f2bf72ff01c08c1f94583d480b0.yaml @@ -0,0 +1,58 @@ +id: track-geolocation-of-users-using-contact-form-7-5fc14f2bf72ff01c08c1f94583d480b0 + +info: + name: > + Track Geolocation Of Users Using Contact Form 7 <= 1.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/724d8f79-f683-4b06-841d-a9104c87f3c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/track-geolocation-of-users-using-contact-form-7/" + google-query: inurl:"/wp-content/plugins/track-geolocation-of-users-using-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,track-geolocation-of-users-using-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/track-geolocation-of-users-using-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "track-geolocation-of-users-using-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/track-that-stat-9b7b630dc39bbb454cf973350a25b5ed.yaml b/nuclei-templates/cve-less/plugins/track-that-stat-9b7b630dc39bbb454cf973350a25b5ed.yaml new file mode 100644 index 0000000000..6b51fc722f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/track-that-stat-9b7b630dc39bbb454cf973350a25b5ed.yaml @@ -0,0 +1,58 @@ +id: track-that-stat-9b7b630dc39bbb454cf973350a25b5ed + +info: + name: > + Track That Stat < 1.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c425635-b1a1-4085-a68c-2c159a38623f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/track-that-stat/" + google-query: inurl:"/wp-content/plugins/track-that-stat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,track-that-stat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/track-that-stat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "track-that-stat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/track-the-click-61b51e0560f095cce3544140b3170777.yaml b/nuclei-templates/cve-less/plugins/track-the-click-61b51e0560f095cce3544140b3170777.yaml new file mode 100644 index 0000000000..0119da7c9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/track-the-click-61b51e0560f095cce3544140b3170777.yaml @@ -0,0 +1,58 @@ +id: track-the-click-61b51e0560f095cce3544140b3170777 + +info: + name: > + Track The Click <= 0.3.11 - Authenticated (Author+) SQL Injection via 'stats' REST Endpoint + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcddb0f3-41d5-4635-88ac-556ee3eec49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/track-the-click/" + google-query: inurl:"/wp-content/plugins/track-the-click/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,track-the-click,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/track-the-click/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "track-the-click" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tracked-tweets-0d742014c6c6d4f612dc93a0d8ee844f.yaml b/nuclei-templates/cve-less/plugins/tracked-tweets-0d742014c6c6d4f612dc93a0d8ee844f.yaml new file mode 100644 index 0000000000..5a50b79ded --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tracked-tweets-0d742014c6c6d4f612dc93a0d8ee844f.yaml @@ -0,0 +1,58 @@ +id: tracked-tweets-0d742014c6c6d4f612dc93a0d8ee844f + +info: + name: > + Tracked Tweets <= 0.2.9 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d762b22-5563-454f-8c1c-485a2a3a0d0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tracked-tweets/" + google-query: inurl:"/wp-content/plugins/tracked-tweets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tracked-tweets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tracked-tweets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tracked-tweets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tracking-code-manager-421ea02f0f2faaa78ee159ebbd1f2ea2.yaml b/nuclei-templates/cve-less/plugins/tracking-code-manager-421ea02f0f2faaa78ee159ebbd1f2ea2.yaml new file mode 100644 index 0000000000..e1a1a696d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tracking-code-manager-421ea02f0f2faaa78ee159ebbd1f2ea2.yaml @@ -0,0 +1,58 @@ +id: tracking-code-manager-421ea02f0f2faaa78ee159ebbd1f2ea2 + +info: + name: > + Tracking Code Manager <= 2.0.16 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0c962ba-43ef-4713-acd9-1e499f857df8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tracking-code-manager/" + google-query: inurl:"/wp-content/plugins/tracking-code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tracking-code-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tracking-code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tracking-code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tracking-code-manager-6e8a9152de2bbc5b83be5ce9d45091f1.yaml b/nuclei-templates/cve-less/plugins/tracking-code-manager-6e8a9152de2bbc5b83be5ce9d45091f1.yaml new file mode 100644 index 0000000000..479e820e88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tracking-code-manager-6e8a9152de2bbc5b83be5ce9d45091f1.yaml @@ -0,0 +1,58 @@ +id: tracking-code-manager-6e8a9152de2bbc5b83be5ce9d45091f1 + +info: + name: > + Tracking Code Manager <= 2.1.0 - Missing Authorization via change_order() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d54e5ad-0a97-4dd4-b53b-ad3f885dc506?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tracking-code-manager/" + google-query: inurl:"/wp-content/plugins/tracking-code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tracking-code-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tracking-code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tracking-code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tracking-code-manager-d699893673e058c723134b07631ea093.yaml b/nuclei-templates/cve-less/plugins/tracking-code-manager-d699893673e058c723134b07631ea093.yaml new file mode 100644 index 0000000000..912e7d7f98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tracking-code-manager-d699893673e058c723134b07631ea093.yaml @@ -0,0 +1,58 @@ +id: tracking-code-manager-d699893673e058c723134b07631ea093 + +info: + name: > + Tracking Code Manager < 1.11.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f52fd57-abfe-48c4-a950-66d72a5a9627?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tracking-code-manager/" + google-query: inurl:"/wp-content/plugins/tracking-code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tracking-code-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tracking-code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tracking-code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tracking-code-manager-f9f8c7475cd82f380479dbcd08cdc45c.yaml b/nuclei-templates/cve-less/plugins/tracking-code-manager-f9f8c7475cd82f380479dbcd08cdc45c.yaml new file mode 100644 index 0000000000..3e5cf1380f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tracking-code-manager-f9f8c7475cd82f380479dbcd08cdc45c.yaml @@ -0,0 +1,58 @@ +id: tracking-code-manager-f9f8c7475cd82f380479dbcd08cdc45c + +info: + name: > + Tracking Code Manager < 1.11.5 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99418bd5-041a-4210-9571-fee6842fb692?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tracking-code-manager/" + google-query: inurl:"/wp-content/plugins/tracking-code-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tracking-code-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tracking-code-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tracking-code-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trackship-for-woocommerce-8c789a924b584ff9b2a3b88bc5b7e816.yaml b/nuclei-templates/cve-less/plugins/trackship-for-woocommerce-8c789a924b584ff9b2a3b88bc5b7e816.yaml new file mode 100644 index 0000000000..ac5f18b994 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trackship-for-woocommerce-8c789a924b584ff9b2a3b88bc5b7e816.yaml @@ -0,0 +1,58 @@ +id: trackship-for-woocommerce-8c789a924b584ff9b2a3b88bc5b7e816 + +info: + name: > + TrackShip for WooCommerce <= 1.7.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41de0cf6-d093-4c33-8123-a097ba3e0add?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trackship-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/trackship-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trackship-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trackship-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trackship-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/traderunner-0335e77335774af60e62b59ea8bf3dff.yaml b/nuclei-templates/cve-less/plugins/traderunner-0335e77335774af60e62b59ea8bf3dff.yaml new file mode 100644 index 0000000000..5996e42315 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/traderunner-0335e77335774af60e62b59ea8bf3dff.yaml @@ -0,0 +1,58 @@ +id: traderunner-0335e77335774af60e62b59ea8bf3dff + +info: + name: > + Trade Runner <= 3.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d0d44bb-a6b9-44cc-ba38-0e28ad318594?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/traderunner/" + google-query: inurl:"/wp-content/plugins/traderunner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,traderunner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/traderunner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traderunner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/traderunner-38e522344d31819f399f7be27a471788.yaml b/nuclei-templates/cve-less/plugins/traderunner-38e522344d31819f399f7be27a471788.yaml new file mode 100644 index 0000000000..4f2c499628 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/traderunner-38e522344d31819f399f7be27a471788.yaml @@ -0,0 +1,58 @@ +id: traderunner-38e522344d31819f399f7be27a471788 + +info: + name: > + Trade Runner <= 3.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8c0cd48-b27c-4bc1-9e5f-d918448290fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/traderunner/" + google-query: inurl:"/wp-content/plugins/traderunner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,traderunner,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/traderunner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traderunner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tradetracker-store-1ff709162f10c9c6eac55480ea55c5a7.yaml b/nuclei-templates/cve-less/plugins/tradetracker-store-1ff709162f10c9c6eac55480ea55c5a7.yaml new file mode 100644 index 0000000000..49f44efdd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tradetracker-store-1ff709162f10c9c6eac55480ea55c5a7.yaml @@ -0,0 +1,58 @@ +id: tradetracker-store-1ff709162f10c9c6eac55480ea55c5a7 + +info: + name: > + Tradetracker-Store < 4.6.60 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2ebbb5-0590-4e4a-a9b6-abc80b220d18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tradetracker-store/" + google-query: inurl:"/wp-content/plugins/tradetracker-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tradetracker-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tradetracker-store/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tradetracker-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/traffic-manager-0cc0200594a7eced582455e86333c795.yaml b/nuclei-templates/cve-less/plugins/traffic-manager-0cc0200594a7eced582455e86333c795.yaml new file mode 100644 index 0000000000..8b88b5c0f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/traffic-manager-0cc0200594a7eced582455e86333c795.yaml @@ -0,0 +1,58 @@ +id: traffic-manager-0cc0200594a7eced582455e86333c795 + +info: + name: > + Traffic Manager <= 1.4.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3610644e-3481-4fed-a83c-cd9ce09775d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/traffic-manager/" + google-query: inurl:"/wp-content/plugins/traffic-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,traffic-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/traffic-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traffic-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/traffic-manager-1b0051f6cdacf52fc28a89570f274917.yaml b/nuclei-templates/cve-less/plugins/traffic-manager-1b0051f6cdacf52fc28a89570f274917.yaml new file mode 100644 index 0000000000..f48b3629fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/traffic-manager-1b0051f6cdacf52fc28a89570f274917.yaml @@ -0,0 +1,58 @@ +id: traffic-manager-1b0051f6cdacf52fc28a89570f274917 + +info: + name: > + Traffic Manager <= 1.4.5 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc98e78b-5388-4573-b2a1-9bad7901d507?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/traffic-manager/" + google-query: inurl:"/wp-content/plugins/traffic-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,traffic-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/traffic-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traffic-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trafficanalyzer-f3bf3aa52e1e30ba08101ace5617af2a.yaml b/nuclei-templates/cve-less/plugins/trafficanalyzer-f3bf3aa52e1e30ba08101ace5617af2a.yaml new file mode 100644 index 0000000000..2ce4242a92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trafficanalyzer-f3bf3aa52e1e30ba08101ace5617af2a.yaml @@ -0,0 +1,58 @@ +id: trafficanalyzer-f3bf3aa52e1e30ba08101ace5617af2a + +info: + name: > + Traffic Analyzer < 3.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a385d286-c15c-4e95-b360-fec1ec455b47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trafficanalyzer/" + google-query: inurl:"/wp-content/plugins/trafficanalyzer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trafficanalyzer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trafficanalyzer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trafficanalyzer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transbank-webpay-plus-rest-73d72f655c3b804018b0ad6a3a400257.yaml b/nuclei-templates/cve-less/plugins/transbank-webpay-plus-rest-73d72f655c3b804018b0ad6a3a400257.yaml new file mode 100644 index 0000000000..1bfdead11b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transbank-webpay-plus-rest-73d72f655c3b804018b0ad6a3a400257.yaml @@ -0,0 +1,58 @@ +id: transbank-webpay-plus-rest-73d72f655c3b804018b0ad6a3a400257 + +info: + name: > + Transbank Webpay REST <= 1.6.6 - Authenticated (Administrator+) SQL Injection via orderby + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b737a26-e4ae-4c9f-a98a-a22a31ac4f99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transbank-webpay-plus-rest/" + google-query: inurl:"/wp-content/plugins/transbank-webpay-plus-rest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transbank-webpay-plus-rest,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transbank-webpay-plus-rest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transbank-webpay-plus-rest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transcoder-d2e24dc9b57b626b239083dab805eaec.yaml b/nuclei-templates/cve-less/plugins/transcoder-d2e24dc9b57b626b239083dab805eaec.yaml new file mode 100644 index 0000000000..1832aa205a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transcoder-d2e24dc9b57b626b239083dab805eaec.yaml @@ -0,0 +1,58 @@ +id: transcoder-d2e24dc9b57b626b239083dab805eaec + +info: + name: > + Transcoder <= 1.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd47f21c-70e1-4458-a552-377956141a65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transcoder/" + google-query: inurl:"/wp-content/plugins/transcoder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transcoder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transcoder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transcoder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/translatepress-multilingual-17f9d007266f9a0cab0ee55eb44edcc9.yaml b/nuclei-templates/cve-less/plugins/translatepress-multilingual-17f9d007266f9a0cab0ee55eb44edcc9.yaml new file mode 100644 index 0000000000..6680b77025 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/translatepress-multilingual-17f9d007266f9a0cab0ee55eb44edcc9.yaml @@ -0,0 +1,58 @@ +id: translatepress-multilingual-17f9d007266f9a0cab0ee55eb44edcc9 + +info: + name: > + TranslatePress <= 2.3.2 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77582ba1-98b0-41c1-a665-e49704313823?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/translatepress-multilingual/" + google-query: inurl:"/wp-content/plugins/translatepress-multilingual/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,translatepress-multilingual,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/translatepress-multilingual/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "translatepress-multilingual" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/translatepress-multilingual-1bcc8deaed7a36dfed3699cc2606446d.yaml b/nuclei-templates/cve-less/plugins/translatepress-multilingual-1bcc8deaed7a36dfed3699cc2606446d.yaml new file mode 100644 index 0000000000..d4b76eeee3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/translatepress-multilingual-1bcc8deaed7a36dfed3699cc2606446d.yaml @@ -0,0 +1,58 @@ +id: translatepress-multilingual-1bcc8deaed7a36dfed3699cc2606446d + +info: + name: > + TranslatePress <= 2.0.8 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d00e477-8e01-4144-86e6-f1cc00fb1d0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/translatepress-multilingual/" + google-query: inurl:"/wp-content/plugins/translatepress-multilingual/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,translatepress-multilingual,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/translatepress-multilingual/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "translatepress-multilingual" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/translation-exchange-31af361d998f1bee646666eb75e8dde6.yaml b/nuclei-templates/cve-less/plugins/translation-exchange-31af361d998f1bee646666eb75e8dde6.yaml new file mode 100644 index 0000000000..5967286dab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/translation-exchange-31af361d998f1bee646666eb75e8dde6.yaml @@ -0,0 +1,58 @@ +id: translation-exchange-31af361d998f1bee646666eb75e8dde6 + +info: + name: > + Translation Exchange <= 1.0.14 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85ba54cc-3ef8-49ee-bef0-6fef8e116871?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/translation-exchange/" + google-query: inurl:"/wp-content/plugins/translation-exchange/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,translation-exchange,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/translation-exchange/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "translation-exchange" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-49c0e5a87593ae8cdbc066b20e281fbc.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-49c0e5a87593ae8cdbc066b20e281fbc.yaml new file mode 100644 index 0000000000..17ebf0a526 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-49c0e5a87593ae8cdbc066b20e281fbc.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-49c0e5a87593ae8cdbc066b20e281fbc + +info: + name: > + Transposh WordPress Translation <= 1.0.7 - Reflected Cross-Site Scripting via tp_tp + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf1cc19a-2ca2-4322-9f37-3f7e24ea38c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-4b35d32175d8c6a60caf01bbc915cbc9.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-4b35d32175d8c6a60caf01bbc915cbc9.yaml new file mode 100644 index 0000000000..39174df814 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-4b35d32175d8c6a60caf01bbc915cbc9.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-4b35d32175d8c6a60caf01bbc915cbc9 + +info: + name: > + Transposh WordPress Translation <= 1.0.8.1 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e1d8afa-0a38-434b-b3d8-04019010ab21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-4b9ec610b796c8632d430b70259226bd.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-4b9ec610b796c8632d430b70259226bd.yaml new file mode 100644 index 0000000000..1ecba16a4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-4b9ec610b796c8632d430b70259226bd.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-4b9ec610b796c8632d430b70259226bd + +info: + name: > + Transposh WordPress Translation <= 1.0.8.1 - Unauthorized Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/223373fc-9d78-47f0-b283-109f8e00b802?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-99547d0fc21ffda2676b791122585c77.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-99547d0fc21ffda2676b791122585c77.yaml new file mode 100644 index 0000000000..5044055451 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-99547d0fc21ffda2676b791122585c77.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-99547d0fc21ffda2676b791122585c77 + +info: + name: > + Transposh WordPress Translation <= 1.0.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6a99d7f-f5b1-4bdc-ad67-353fea94d649?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-a687f130dc4fb0dc3fa1596936a6c928.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-a687f130dc4fb0dc3fa1596936a6c928.yaml new file mode 100644 index 0000000000..b6509174b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-a687f130dc4fb0dc3fa1596936a6c928.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-a687f130dc4fb0dc3fa1596936a6c928 + +info: + name: > + Transposh WordPress Translation <= 1.0.8.1 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbf8a398-334b-4b89-8a39-b8f0032fefc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-bc943b920a596196582824c3eeb70aba.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-bc943b920a596196582824c3eeb70aba.yaml new file mode 100644 index 0000000000..d9ca3bff32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-bc943b920a596196582824c3eeb70aba.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-bc943b920a596196582824c3eeb70aba + +info: + name: > + Transposh WordPress Translation <= 1.0.8.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd1f12ac-86ac-4be9-9575-98381c3b4291?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-d8f6d24ae9aefabd89bc3732379fc08a.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-d8f6d24ae9aefabd89bc3732379fc08a.yaml new file mode 100644 index 0000000000..f6920f645f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-d8f6d24ae9aefabd89bc3732379fc08a.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-d8f6d24ae9aefabd89bc3732379fc08a + +info: + name: > + Transposh WordPress Translation <= 1.0.7 - Unauthenticated Stored Cross-Site Scripting via 'tp_translation' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8aa19b3a-229e-460d-b592-c0a2c7fd5c06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-f437ea7631a9816d78b50dbf1934085a.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-f437ea7631a9816d78b50dbf1934085a.yaml new file mode 100644 index 0000000000..51e1d85224 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-f437ea7631a9816d78b50dbf1934085a.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-f437ea7631a9816d78b50dbf1934085a + +info: + name: > + Transposh WordPress Translation <= 1.0.8.1 - Authenticated (Admin+) SQL Injection via 'tp_editor' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/deb912f0-bfba-470f-9a18-47c3d65905dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-ff4e9233f972b9e92d912d8cb47ef8e2.yaml b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-ff4e9233f972b9e92d912d8cb47ef8e2.yaml new file mode 100644 index 0000000000..cba0f51c49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/transposh-translation-filter-for-wordpress-ff4e9233f972b9e92d912d8cb47ef8e2.yaml @@ -0,0 +1,58 @@ +id: transposh-translation-filter-for-wordpress-ff4e9233f972b9e92d912d8cb47ef8e2 + +info: + name: > + Transposh WordPress Translation <= 1.0.8.1 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c774b520-9d9f-4102-8564-49673d5ae1e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/transposh-translation-filter-for-wordpress/" + google-query: inurl:"/wp-content/plugins/transposh-translation-filter-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,transposh-translation-filter-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/transposh-translation-filter-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transposh-translation-filter-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tranzly-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tranzly-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..13fa1875e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tranzly-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tranzly-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tranzly/" + google-query: inurl:"/wp-content/plugins/tranzly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tranzly,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tranzly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tranzly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/travel-light-23bff824abe3c334624b92f8ce9d99b5.yaml b/nuclei-templates/cve-less/plugins/travel-light-23bff824abe3c334624b92f8ce9d99b5.yaml new file mode 100644 index 0000000000..dd706e2918 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/travel-light-23bff824abe3c334624b92f8ce9d99b5.yaml @@ -0,0 +1,58 @@ +id: travel-light-23bff824abe3c334624b92f8ce9d99b5 + +info: + name: > + Travel Light <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9fe858e-5c89-4cc2-8b66-5c86965f7889?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/travel-light/" + google-query: inurl:"/wp-content/plugins/travel-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,travel-light,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/travel-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "travel-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/travelers-map-d60ef1067dd86b18895f878c5b5156fd.yaml b/nuclei-templates/cve-less/plugins/travelers-map-d60ef1067dd86b18895f878c5b5156fd.yaml new file mode 100644 index 0000000000..fad5cd1834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/travelers-map-d60ef1067dd86b18895f878c5b5156fd.yaml @@ -0,0 +1,58 @@ +id: travelers-map-d60ef1067dd86b18895f878c5b5156fd + +info: + name: > + Travelers' Map <= 2.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23af50ec-e293-4c06-be64-474057e25845?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/travelers-map/" + google-query: inurl:"/wp-content/plugins/travelers-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,travelers-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/travelers-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "travelers-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/travelmap-blog-24d707836e835d320b88fb566bce9822.yaml b/nuclei-templates/cve-less/plugins/travelmap-blog-24d707836e835d320b88fb566bce9822.yaml new file mode 100644 index 0000000000..efce0193d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/travelmap-blog-24d707836e835d320b88fb566bce9822.yaml @@ -0,0 +1,58 @@ +id: travelmap-blog-24d707836e835d320b88fb566bce9822 + +info: + name: > + Travel Map <= 1.0.1 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f04a742-56be-42e9-9080-2131c6e98325?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/travelmap-blog/" + google-query: inurl:"/wp-content/plugins/travelmap-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,travelmap-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/travelmap-blog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "travelmap-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/travelpayouts-6ab0ff32728ffec64a0e21f4658b6bb5.yaml b/nuclei-templates/cve-less/plugins/travelpayouts-6ab0ff32728ffec64a0e21f4658b6bb5.yaml new file mode 100644 index 0000000000..e3d5022fd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/travelpayouts-6ab0ff32728ffec64a0e21f4658b6bb5.yaml @@ -0,0 +1,58 @@ +id: travelpayouts-6ab0ff32728ffec64a0e21f4658b6bb5 + +info: + name: > + Travelpayouts <= 1.0.16 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e199cd3-e2ce-4969-a517-4a9c2a84bf44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/travelpayouts/" + google-query: inurl:"/wp-content/plugins/travelpayouts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,travelpayouts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/travelpayouts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "travelpayouts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/travelpayouts-b09a62954fc53a69adf6069c4bfa2ef7.yaml b/nuclei-templates/cve-less/plugins/travelpayouts-b09a62954fc53a69adf6069c4bfa2ef7.yaml new file mode 100644 index 0000000000..c7607c02ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/travelpayouts-b09a62954fc53a69adf6069c4bfa2ef7.yaml @@ -0,0 +1,58 @@ +id: travelpayouts-b09a62954fc53a69adf6069c4bfa2ef7 + +info: + name: > + Travelpayouts: All Travel Brands in One Place <= 1.1.16 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d19571-f0a1-4f15-a292-89b938c49afc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/travelpayouts/" + google-query: inurl:"/wp-content/plugins/travelpayouts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,travelpayouts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/travelpayouts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "travelpayouts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tree-website-map-77f419c6676bae16b665cb7bfb361770.yaml b/nuclei-templates/cve-less/plugins/tree-website-map-77f419c6676bae16b665cb7bfb361770.yaml new file mode 100644 index 0000000000..5874fcb884 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tree-website-map-77f419c6676bae16b665cb7bfb361770.yaml @@ -0,0 +1,58 @@ +id: tree-website-map-77f419c6676bae16b665cb7bfb361770 + +info: + name: > + Tree Sitemap (Pages, Posts & Categories list) <= 2.9 - Missing Authorization to Arbitrary Plugin Installation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf893b1e-9fcf-4a3a-862e-4f050617acc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tree-website-map/" + google-query: inurl:"/wp-content/plugins/tree-website-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tree-website-map,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tree-website-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tree-website-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tree-website-map-94fb995c7fcb31381238e0489629c885.yaml b/nuclei-templates/cve-less/plugins/tree-website-map-94fb995c7fcb31381238e0489629c885.yaml new file mode 100644 index 0000000000..8bf28fedf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tree-website-map-94fb995c7fcb31381238e0489629c885.yaml @@ -0,0 +1,58 @@ +id: tree-website-map-94fb995c7fcb31381238e0489629c885 + +info: + name: > + Tree Sitemap (Pages, Posts & Categories list) <= 2.9 - Cross-Site Request Forgery to Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5658f62b-2f4a-46f7-b229-8e239c7ef148?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tree-website-map/" + google-query: inurl:"/wp-content/plugins/tree-website-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tree-website-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tree-website-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tree-website-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/treepress-537feb2660b274ef93e595158af0eec1.yaml b/nuclei-templates/cve-less/plugins/treepress-537feb2660b274ef93e595158af0eec1.yaml new file mode 100644 index 0000000000..1fdd2d83ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/treepress-537feb2660b274ef93e595158af0eec1.yaml @@ -0,0 +1,58 @@ +id: treepress-537feb2660b274ef93e595158af0eec1 + +info: + name: > + TreePress – Easy Family Trees & Ancestor Profiles <= 2.0.22 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'post_title' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbef8738-d639-48a5-98b7-abf9a7e9fec1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/treepress/" + google-query: inurl:"/wp-content/plugins/treepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,treepress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/treepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "treepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/treepress-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/treepress-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..65225f231e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/treepress-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: treepress-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/treepress/" + google-query: inurl:"/wp-content/plugins/treepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,treepress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/treepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "treepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trexanh-property-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/trexanh-property-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..bf9cc21c72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trexanh-property-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: trexanh-property-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trexanh-property/" + google-query: inurl:"/wp-content/plugins/trexanh-property/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trexanh-property,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trexanh-property/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trexanh-property" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/triberr-wordpress-plugin-feb2ed9a776f1da5d8e1058653f64bda.yaml b/nuclei-templates/cve-less/plugins/triberr-wordpress-plugin-feb2ed9a776f1da5d8e1058653f64bda.yaml new file mode 100644 index 0000000000..c110172204 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/triberr-wordpress-plugin-feb2ed9a776f1da5d8e1058653f64bda.yaml @@ -0,0 +1,58 @@ +id: triberr-wordpress-plugin-feb2ed9a776f1da5d8e1058653f64bda + +info: + name: > + Triberr <= 4.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e8a8e0e-6dc0-4d9f-aee3-1fd940c49d3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/triberr-wordpress-plugin/" + google-query: inurl:"/wp-content/plugins/triberr-wordpress-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,triberr-wordpress-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/triberr-wordpress-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "triberr-wordpress-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tripay-payment-gateway-3b9f3653c0029d132688d85fbc757af3.yaml b/nuclei-templates/cve-less/plugins/tripay-payment-gateway-3b9f3653c0029d132688d85fbc757af3.yaml new file mode 100644 index 0000000000..af8efdda92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tripay-payment-gateway-3b9f3653c0029d132688d85fbc757af3.yaml @@ -0,0 +1,58 @@ +id: tripay-payment-gateway-3b9f3653c0029d132688d85fbc757af3 + +info: + name: > + TriPay Payment Gateway <= 3.2.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/946add6f-4cd5-4c55-9399-a782140f217c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tripay-payment-gateway/" + google-query: inurl:"/wp-content/plugins/tripay-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tripay-payment-gateway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tripay-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tripay-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tripetto-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/tripetto-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..26a95cf950 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tripetto-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: tripetto-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tripetto/" + google-query: inurl:"/wp-content/plugins/tripetto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tripetto,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tripetto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tripetto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tripetto-cbd3eb6cc45789e5134a8a2c5f167a39.yaml b/nuclei-templates/cve-less/plugins/tripetto-cbd3eb6cc45789e5134a8a2c5f167a39.yaml new file mode 100644 index 0000000000..4533adc041 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tripetto-cbd3eb6cc45789e5134a8a2c5f167a39.yaml @@ -0,0 +1,58 @@ +id: tripetto-cbd3eb6cc45789e5134a8a2c5f167a39 + +info: + name: > + WordPress form builder plugin for contact forms, surveys and quizzes – Tripetto <= 5.1.4 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b430f0a-d50c-4923-8916-2c26bf5d619a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tripetto/" + google-query: inurl:"/wp-content/plugins/tripetto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tripetto,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tripetto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tripetto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trust-form-68ca9f8a242a5c678fbfe7eb11cba349.yaml b/nuclei-templates/cve-less/plugins/trust-form-68ca9f8a242a5c678fbfe7eb11cba349.yaml new file mode 100644 index 0000000000..8d92c65e02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trust-form-68ca9f8a242a5c678fbfe7eb11cba349.yaml @@ -0,0 +1,58 @@ +id: trust-form-68ca9f8a242a5c678fbfe7eb11cba349 + +info: + name: > + Trust Form <= 2.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d2daa67-50b6-4850-92bf-49f29b1d8eb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trust-form/" + google-query: inurl:"/wp-content/plugins/trust-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trust-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trust-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trust-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trust-payments-gateway-3ds2-54a8519739469e9488888f770d59f330.yaml b/nuclei-templates/cve-less/plugins/trust-payments-gateway-3ds2-54a8519739469e9488888f770d59f330.yaml new file mode 100644 index 0000000000..c92639b251 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trust-payments-gateway-3ds2-54a8519739469e9488888f770d59f330.yaml @@ -0,0 +1,58 @@ +id: trust-payments-gateway-3ds2-54a8519739469e9488888f770d59f330 + +info: + name: > + Trust Payments Gateway (3DS2) <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/175d8dc0-fc12-464b-b651-50a060851eb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trust-payments-gateway-3ds2/" + google-query: inurl:"/wp-content/plugins/trust-payments-gateway-3ds2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trust-payments-gateway-3ds2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trust-payments-gateway-3ds2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trust-payments-gateway-3ds2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trust-payments-gateway-3ds2-98fdced366cbe609ca2059360fd4aeb3.yaml b/nuclei-templates/cve-less/plugins/trust-payments-gateway-3ds2-98fdced366cbe609ca2059360fd4aeb3.yaml new file mode 100644 index 0000000000..480c7dc30f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trust-payments-gateway-3ds2-98fdced366cbe609ca2059360fd4aeb3.yaml @@ -0,0 +1,58 @@ +id: trust-payments-gateway-3ds2-98fdced366cbe609ca2059360fd4aeb3 + +info: + name: > + Trust Payments Gateway (3DS2) <= 1.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbb51383-1eab-4490-aa4c-bd1488312400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trust-payments-gateway-3ds2/" + google-query: inurl:"/wp-content/plugins/trust-payments-gateway-3ds2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trust-payments-gateway-3ds2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trust-payments-gateway-3ds2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trust-payments-gateway-3ds2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trustmate-io-integration-for-woocommerce-6a7609985d974c1a4f6bfca880ceff9a.yaml b/nuclei-templates/cve-less/plugins/trustmate-io-integration-for-woocommerce-6a7609985d974c1a4f6bfca880ceff9a.yaml new file mode 100644 index 0000000000..0b6310d0b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trustmate-io-integration-for-woocommerce-6a7609985d974c1a4f6bfca880ceff9a.yaml @@ -0,0 +1,58 @@ +id: trustmate-io-integration-for-woocommerce-6a7609985d974c1a4f6bfca880ceff9a + +info: + name: > + TrustMate.io integration for WooCommerce < 1.8.12 - Authenticated (Subscriber+) Arbitrary Blog Option Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc912ace-65d9-4833-a3ad-dc5d37989269?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trustmate-io-integration-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/trustmate-io-integration-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trustmate-io-integration-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trustmate-io-integration-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trustmate-io-integration-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trustmate-io-integration-for-woocommerce-83fc5c78890dc3902a4d33e267bdeee6.yaml b/nuclei-templates/cve-less/plugins/trustmate-io-integration-for-woocommerce-83fc5c78890dc3902a4d33e267bdeee6.yaml new file mode 100644 index 0000000000..2be6f10105 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trustmate-io-integration-for-woocommerce-83fc5c78890dc3902a4d33e267bdeee6.yaml @@ -0,0 +1,58 @@ +id: trustmate-io-integration-for-woocommerce-83fc5c78890dc3902a4d33e267bdeee6 + +info: + name: > + TrustMate.io integration for WooCommerce < 1.8.12 - Authenticated (Subscriber+) Arbitrary Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6bfe229-88a9-45bf-8321-0afe52797c46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trustmate-io-integration-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/trustmate-io-integration-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trustmate-io-integration-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trustmate-io-integration-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trustmate-io-integration-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trustprofile-d9e69153baef2dd2b92bf1c6141dd476.yaml b/nuclei-templates/cve-less/plugins/trustprofile-d9e69153baef2dd2b92bf1c6141dd476.yaml new file mode 100644 index 0000000000..e8c49f31cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trustprofile-d9e69153baef2dd2b92bf1c6141dd476.yaml @@ -0,0 +1,58 @@ +id: trustprofile-d9e69153baef2dd2b92bf1c6141dd476 + +info: + name: > + TrustProfile <= 3.24 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/296f15eb-0782-4351-a2c5-c8ef6f005352?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trustprofile/" + google-query: inurl:"/wp-content/plugins/trustprofile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trustprofile,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trustprofile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trustprofile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/trx_addons-69db74f4852004f23d22f9fcc0555117.yaml b/nuclei-templates/cve-less/plugins/trx_addons-69db74f4852004f23d22f9fcc0555117.yaml new file mode 100644 index 0000000000..27b70e0bd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/trx_addons-69db74f4852004f23d22f9fcc0555117.yaml @@ -0,0 +1,58 @@ +id: trx_addons-69db74f4852004f23d22f9fcc0555117 + +info: + name: > + ThemeREX Addons (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a14b674-620e-4247-a200-92d9f23acbca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/trx_addons/" + google-query: inurl:"/wp-content/plugins/trx_addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,trx_addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/trx_addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trx_addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.70.3', '<= 1.70.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ts-webfonts-for-conoha-dfc5edcffb51809997c1a8d53e1c44ad.yaml b/nuclei-templates/cve-less/plugins/ts-webfonts-for-conoha-dfc5edcffb51809997c1a8d53e1c44ad.yaml new file mode 100644 index 0000000000..6a2b4e8a75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ts-webfonts-for-conoha-dfc5edcffb51809997c1a8d53e1c44ad.yaml @@ -0,0 +1,58 @@ +id: ts-webfonts-for-conoha-dfc5edcffb51809997c1a8d53e1c44ad + +info: + name: > + TypeSquare Webfonts for ConoHa <= 2.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80e9aa1f-166f-47df-bc50-c7dd55c6e7cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ts-webfonts-for-conoha/" + google-query: inurl:"/wp-content/plugins/ts-webfonts-for-conoha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ts-webfonts-for-conoha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ts-webfonts-for-conoha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ts-webfonts-for-conoha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-20e7688da466978fa975c03a8c97cece.yaml b/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-20e7688da466978fa975c03a8c97cece.yaml new file mode 100644 index 0000000000..5b9b3bbc36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-20e7688da466978fa975c03a8c97cece.yaml @@ -0,0 +1,58 @@ +id: ts-webfonts-for-sakura-20e7688da466978fa975c03a8c97cece + +info: + name: > + TS Webfonts for SAKURA <= 3.1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/887a1697-608e-4bf8-8c15-188737cb22c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ts-webfonts-for-sakura/" + google-query: inurl:"/wp-content/plugins/ts-webfonts-for-sakura/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ts-webfonts-for-sakura,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ts-webfonts-for-sakura/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ts-webfonts-for-sakura" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-a105732b2a52f48ea5c6c2e4cd20e7e6.yaml b/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-a105732b2a52f48ea5c6c2e4cd20e7e6.yaml new file mode 100644 index 0000000000..20132f0662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-a105732b2a52f48ea5c6c2e4cd20e7e6.yaml @@ -0,0 +1,58 @@ +id: ts-webfonts-for-sakura-a105732b2a52f48ea5c6c2e4cd20e7e6 + +info: + name: > + TS Webfonts for SAKURA <= 3.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48be0157-5eb9-4e06-b406-0af659de034b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ts-webfonts-for-sakura/" + google-query: inurl:"/wp-content/plugins/ts-webfonts-for-sakura/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ts-webfonts-for-sakura,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ts-webfonts-for-sakura/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ts-webfonts-for-sakura" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-c6294db0063d8f01b936cac40a7466ae.yaml b/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-c6294db0063d8f01b936cac40a7466ae.yaml new file mode 100644 index 0000000000..1bde1798ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ts-webfonts-for-sakura-c6294db0063d8f01b936cac40a7466ae.yaml @@ -0,0 +1,58 @@ +id: ts-webfonts-for-sakura-c6294db0063d8f01b936cac40a7466ae + +info: + name: > + TS Webfonts for さくらのレンタルサーバ <= 3.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/025d576b-7342-4863-ac30-f1ff0205d638?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ts-webfonts-for-sakura/" + google-query: inurl:"/wp-content/plugins/ts-webfonts-for-sakura/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ts-webfonts-for-sakura,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ts-webfonts-for-sakura/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ts-webfonts-for-sakura" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ttv-easy-embed-player-f7f846ee6a2643596409a73557db5ac2.yaml b/nuclei-templates/cve-less/plugins/ttv-easy-embed-player-f7f846ee6a2643596409a73557db5ac2.yaml new file mode 100644 index 0000000000..ac9f05d01d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ttv-easy-embed-player-f7f846ee6a2643596409a73557db5ac2.yaml @@ -0,0 +1,58 @@ +id: ttv-easy-embed-player-f7f846ee6a2643596409a73557db5ac2 + +info: + name: > + Twitch Player <= 2.1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03c8ec0a-f75f-450f-86e7-a18dfbae9461?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ttv-easy-embed-player/" + google-query: inurl:"/wp-content/plugins/ttv-easy-embed-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ttv-easy-embed-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ttv-easy-embed-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ttv-easy-embed-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tubepress-57636a2970a5968684b69eba7f56b3ea.yaml b/nuclei-templates/cve-less/plugins/tubepress-57636a2970a5968684b69eba7f56b3ea.yaml new file mode 100644 index 0000000000..54e4c5a3ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tubepress-57636a2970a5968684b69eba7f56b3ea.yaml @@ -0,0 +1,58 @@ +id: tubepress-57636a2970a5968684b69eba7f56b3ea + +info: + name: > + TubePress < 1.6.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a80d13c7-21e4-4cb5-b28d-340668732c0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tubepress/" + google-query: inurl:"/wp-content/plugins/tubepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tubepress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tubepress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tubepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tumult-hype-animations-6b17719b7745b3293d6a68a531034051.yaml b/nuclei-templates/cve-less/plugins/tumult-hype-animations-6b17719b7745b3293d6a68a531034051.yaml new file mode 100644 index 0000000000..4f4af507b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tumult-hype-animations-6b17719b7745b3293d6a68a531034051.yaml @@ -0,0 +1,58 @@ +id: tumult-hype-animations-6b17719b7745b3293d6a68a531034051 + +info: + name: > + Tumult Hype Animations <= 1.9.12 - Authenticated (Author+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb267bbd-cd62-49f7-9abc-c6734b23be22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tumult-hype-animations/" + google-query: inurl:"/wp-content/plugins/tumult-hype-animations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tumult-hype-animations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tumult-hype-animations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tumult-hype-animations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tumult-hype-animations-be55063f7f98deaf97bbbf0199feb448.yaml b/nuclei-templates/cve-less/plugins/tumult-hype-animations-be55063f7f98deaf97bbbf0199feb448.yaml new file mode 100644 index 0000000000..945e7430a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tumult-hype-animations-be55063f7f98deaf97bbbf0199feb448.yaml @@ -0,0 +1,58 @@ +id: tumult-hype-animations-be55063f7f98deaf97bbbf0199feb448 + +info: + name: > + Tumult Hype Animations <= 1.9.11 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee7408d2-3cff-4c80-bc07-b0418676e961?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tumult-hype-animations/" + google-query: inurl:"/wp-content/plugins/tumult-hype-animations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tumult-hype-animations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tumult-hype-animations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tumult-hype-animations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tune-library-61d4a8b20f3ed6218af8118f12f3c6f5.yaml b/nuclei-templates/cve-less/plugins/tune-library-61d4a8b20f3ed6218af8118f12f3c6f5.yaml new file mode 100644 index 0000000000..2a2c1c07aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tune-library-61d4a8b20f3ed6218af8118f12f3c6f5.yaml @@ -0,0 +1,58 @@ +id: tune-library-61d4a8b20f3ed6218af8118f12f3c6f5 + +info: + name: > + Tune Library < 1.5.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23aa8a2f-9238-4d93-b2d2-de7838ccb156?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tune-library/" + google-query: inurl:"/wp-content/plugins/tune-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tune-library,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tune-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tune-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/turbo-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/turbo-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..cdd871f8b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/turbo-widgets-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: turbo-widgets-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/turbo-widgets/" + google-query: inurl:"/wp-content/plugins/turbo-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,turbo-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/turbo-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "turbo-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/turbo-widgets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/turbo-widgets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..cf03f9210f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/turbo-widgets-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: turbo-widgets-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/turbo-widgets/" + google-query: inurl:"/wp-content/plugins/turbo-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,turbo-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/turbo-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "turbo-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/turn-off-comments-for-all-posts-0e14619d4299f9ad0b2cbdadcef1842c.yaml b/nuclei-templates/cve-less/plugins/turn-off-comments-for-all-posts-0e14619d4299f9ad0b2cbdadcef1842c.yaml new file mode 100644 index 0000000000..ecad3f6885 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/turn-off-comments-for-all-posts-0e14619d4299f9ad0b2cbdadcef1842c.yaml @@ -0,0 +1,58 @@ +id: turn-off-comments-for-all-posts-0e14619d4299f9ad0b2cbdadcef1842c + +info: + name: > + Turn off all comments <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ee49082-5255-4ab7-9562-bd786a32382c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/turn-off-comments-for-all-posts/" + google-query: inurl:"/wp-content/plugins/turn-off-comments-for-all-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,turn-off-comments-for-all-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/turn-off-comments-for-all-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "turn-off-comments-for-all-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-015631a41e17e7c68847b5f1f1c1e6e5.yaml b/nuclei-templates/cve-less/plugins/tutor-015631a41e17e7c68847b5f1f1c1e6e5.yaml new file mode 100644 index 0000000000..4cb4314ce8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-015631a41e17e7c68847b5f1f1c1e6e5.yaml @@ -0,0 +1,58 @@ +id: tutor-015631a41e17e7c68847b5f1f1c1e6e5 + +info: + name: > + Tutor LMS <= 2.6.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a7c04a-1fa0-434d-8161-7a32cefb44c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-06bc0f0b4cde81f2a3c25e5d1294f81f.yaml b/nuclei-templates/cve-less/plugins/tutor-06bc0f0b4cde81f2a3c25e5d1294f81f.yaml new file mode 100644 index 0000000000..3f7ae432d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-06bc0f0b4cde81f2a3c25e5d1294f81f.yaml @@ -0,0 +1,58 @@ +id: tutor-06bc0f0b4cde81f2a3c25e5d1294f81f + +info: + name: > + Tutor LMS <= 2.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed579468-c998-4bec-b3a5-01d0ff206d35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-0f7d324b49374ff1264595834ad272cb.yaml b/nuclei-templates/cve-less/plugins/tutor-0f7d324b49374ff1264595834ad272cb.yaml new file mode 100644 index 0000000000..0154b003bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-0f7d324b49374ff1264595834ad272cb.yaml @@ -0,0 +1,58 @@ +id: tutor-0f7d324b49374ff1264595834ad272cb + +info: + name: > + Tutor LMS <= 1.8.2 - SQL Injection via tutor_quiz_builder_get_question_form + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79f9632e-cfaf-48bd-aeed-919fc729f2b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-14663e06b0c267ee32922b2e7b917924.yaml b/nuclei-templates/cve-less/plugins/tutor-14663e06b0c267ee32922b2e7b917924.yaml new file mode 100644 index 0000000000..46613e936f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-14663e06b0c267ee32922b2e7b917924.yaml @@ -0,0 +1,58 @@ +id: tutor-14663e06b0c267ee32922b2e7b917924 + +info: + name: > + Tutor LMS <= 2.0.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aff79ef-6c96-4386-abf1-b4e6931ef0d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-1a3c55b78621c5a0f1132cb6e90ef267.yaml b/nuclei-templates/cve-less/plugins/tutor-1a3c55b78621c5a0f1132cb6e90ef267.yaml new file mode 100644 index 0000000000..d19fbe3890 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-1a3c55b78621c5a0f1132cb6e90ef267.yaml @@ -0,0 +1,58 @@ +id: tutor-1a3c55b78621c5a0f1132cb6e90ef267 + +info: + name: > + Tutor LMS <=1.8.2 - SQL Injection via tutor_answering_quiz_question/get_answer_by_id + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec83bf1f-a2da-4ecf-8d82-9a555c751073?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-1b5a3539f272e50644f8022d37b4430b.yaml b/nuclei-templates/cve-less/plugins/tutor-1b5a3539f272e50644f8022d37b4430b.yaml new file mode 100644 index 0000000000..8046458897 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-1b5a3539f272e50644f8022d37b4430b.yaml @@ -0,0 +1,58 @@ +id: tutor-1b5a3539f272e50644f8022d37b4430b + +info: + name: > + Tutor LMS – eLearning and online course solution <= 2.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'tutor_instructor_list' Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/324fc401-04ca-4707-8727-b8c3a66f7fd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-2219d30096a201736b1d63372957d1b1.yaml b/nuclei-templates/cve-less/plugins/tutor-2219d30096a201736b1d63372957d1b1.yaml new file mode 100644 index 0000000000..78296749dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-2219d30096a201736b1d63372957d1b1.yaml @@ -0,0 +1,58 @@ +id: tutor-2219d30096a201736b1d63372957d1b1 + +info: + name: > + Tutor LMS <= 1.9.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76d57372-9fb5-4166-bfa9-835e3ff7b755?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-2b473e1a0769986163223c209e7c2396.yaml b/nuclei-templates/cve-less/plugins/tutor-2b473e1a0769986163223c209e7c2396.yaml new file mode 100644 index 0000000000..6d64b7a984 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-2b473e1a0769986163223c209e7c2396.yaml @@ -0,0 +1,58 @@ +id: tutor-2b473e1a0769986163223c209e7c2396 + +info: + name: > + Tutor LMS <= 2.2.0 - Missing Authorization via REST API + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d6c9765-6936-4b22-835e-e899f62c14c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-3a1a2462f10e12efaa2197ad33a42396.yaml b/nuclei-templates/cve-less/plugins/tutor-3a1a2462f10e12efaa2197ad33a42396.yaml new file mode 100644 index 0000000000..2a9f0f6d8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-3a1a2462f10e12efaa2197ad33a42396.yaml @@ -0,0 +1,58 @@ +id: tutor-3a1a2462f10e12efaa2197ad33a42396 + +info: + name: > + Tutor LMS <= 2.1.10 - Authenticated (Tutor Instructor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d623512-ee99-4a73-a752-ecbb6ad96b63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-583b3f0f882e9563f461b70129fd6f7b.yaml b/nuclei-templates/cve-less/plugins/tutor-583b3f0f882e9563f461b70129fd6f7b.yaml new file mode 100644 index 0000000000..60b5c4fb5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-583b3f0f882e9563f461b70129fd6f7b.yaml @@ -0,0 +1,58 @@ +id: tutor-583b3f0f882e9563f461b70129fd6f7b + +info: + name: > + Tutor LMS <= 2.1.8 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf16617d-cec2-4943-bd20-7ade31878714?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-5979ee9f3da8926b114aaafc108d86c3.yaml b/nuclei-templates/cve-less/plugins/tutor-5979ee9f3da8926b114aaafc108d86c3.yaml new file mode 100644 index 0000000000..88b7299124 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-5979ee9f3da8926b114aaafc108d86c3.yaml @@ -0,0 +1,58 @@ +id: tutor-5979ee9f3da8926b114aaafc108d86c3 + +info: + name: > + Tutor LMS <= 1.9.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/234a847b-3ffa-4c5c-9bba-39df227de0bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-728966d9c09b57c99055d67de463c279.yaml b/nuclei-templates/cve-less/plugins/tutor-728966d9c09b57c99055d67de463c279.yaml new file mode 100644 index 0000000000..46aa939e9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-728966d9c09b57c99055d67de463c279.yaml @@ -0,0 +1,58 @@ +id: tutor-728966d9c09b57c99055d67de463c279 + +info: + name: > + Tutor LMS <= 2.2.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a8b5554-b4d9-48f2-ad16-cf96aabcbb6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-78fae6f744a75ffe299dd93a24365b9f.yaml b/nuclei-templates/cve-less/plugins/tutor-78fae6f744a75ffe299dd93a24365b9f.yaml new file mode 100644 index 0000000000..b5e0f3d74e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-78fae6f744a75ffe299dd93a24365b9f.yaml @@ -0,0 +1,58 @@ +id: tutor-78fae6f744a75ffe299dd93a24365b9f + +info: + name: > + Tutor LMS – eLearning and online course solution <= 2.6.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/834c4ca9-7173-4c84-8287-9916ec72935d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-78ff72d9346255abccb5396c4cac06cb.yaml b/nuclei-templates/cve-less/plugins/tutor-78ff72d9346255abccb5396c4cac06cb.yaml new file mode 100644 index 0000000000..9cb0006a4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-78ff72d9346255abccb5396c4cac06cb.yaml @@ -0,0 +1,58 @@ +id: tutor-78ff72d9346255abccb5396c4cac06cb + +info: + name: > + Tutor LMS <= 1.8.7 - Authenticated Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76c0d4f8-230d-452a-b39d-cbcb0af0fd72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-7feda050b3f384761620a931ffec2f7f.yaml b/nuclei-templates/cve-less/plugins/tutor-7feda050b3f384761620a931ffec2f7f.yaml new file mode 100644 index 0000000000..9f956e9941 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-7feda050b3f384761620a931ffec2f7f.yaml @@ -0,0 +1,58 @@ +id: tutor-7feda050b3f384761620a931ffec2f7f + +info: + name: > + Tutor LMS <= 2.6.0 - Authenticated(Student+) HTML Injection via Q&A + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22420c2d-788c-4577-ae54-7b48f6063f5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-805b776aa99780dfe83d45b24c67ce87.yaml b/nuclei-templates/cve-less/plugins/tutor-805b776aa99780dfe83d45b24c67ce87.yaml new file mode 100644 index 0000000000..fb0502ae13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-805b776aa99780dfe83d45b24c67ce87.yaml @@ -0,0 +1,58 @@ +id: tutor-805b776aa99780dfe83d45b24c67ce87 + +info: + name: > + Tutor LMS <= 1.9.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65526517-aec5-454b-94c0-973359d840e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-853a8966d699d4f6cdb8b175598ce3ed.yaml b/nuclei-templates/cve-less/plugins/tutor-853a8966d699d4f6cdb8b175598ce3ed.yaml new file mode 100644 index 0000000000..a60b8d90c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-853a8966d699d4f6cdb8b175598ce3ed.yaml @@ -0,0 +1,58 @@ +id: tutor-853a8966d699d4f6cdb8b175598ce3ed + +info: + name: > + Tutor LMS <= 2.1.10 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dfee325-9001-4483-b3eb-846da0314529?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-982f78919d6ffdbae69689e67e460d30.yaml b/nuclei-templates/cve-less/plugins/tutor-982f78919d6ffdbae69689e67e460d30.yaml new file mode 100644 index 0000000000..a5239c96d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-982f78919d6ffdbae69689e67e460d30.yaml @@ -0,0 +1,58 @@ +id: tutor-982f78919d6ffdbae69689e67e460d30 + +info: + name: > + Tutor LMS – eLearning and online course solution <= 1.7.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1b81a26-c12c-4b57-9ef1-c53e0b87ad9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-a9f74f94f7fdfe42f50099f4c0f55e53.yaml b/nuclei-templates/cve-less/plugins/tutor-a9f74f94f7fdfe42f50099f4c0f55e53.yaml new file mode 100644 index 0000000000..ae28fe8ccd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-a9f74f94f7fdfe42f50099f4c0f55e53.yaml @@ -0,0 +1,58 @@ +id: tutor-a9f74f94f7fdfe42f50099f4c0f55e53 + +info: + name: > + Tutor LMS <= 1.9.8 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6db9c59e-16bc-4e61-9040-7000b212675f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-b38686638c5362ebcaa7af99aefa8146.yaml b/nuclei-templates/cve-less/plugins/tutor-b38686638c5362ebcaa7af99aefa8146.yaml new file mode 100644 index 0000000000..06f1108869 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-b38686638c5362ebcaa7af99aefa8146.yaml @@ -0,0 +1,58 @@ +id: tutor-b38686638c5362ebcaa7af99aefa8146 + +info: + name: > + Tutor LMS <= 2.6.2 - Missing Authorization to Unauthenticated Limited Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8d4029e-07b0-4ceb-ae6e-11a3f7416ebc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml b/nuclei-templates/cve-less/plugins/tutor-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml new file mode 100644 index 0000000000..4b13735a37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml @@ -0,0 +1,58 @@ +id: tutor-b4ca6e1dc02a9ba7306fb5b7361185cc + +info: + name: > + Tutor LMS < 1.5.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d276af21-fa9d-46bd-94e3-03776d4f2238?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-b9268ddd3338fe184d978d9f6b4b6b66.yaml b/nuclei-templates/cve-less/plugins/tutor-b9268ddd3338fe184d978d9f6b4b6b66.yaml new file mode 100644 index 0000000000..641c2bb1f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-b9268ddd3338fe184d978d9f6b4b6b66.yaml @@ -0,0 +1,58 @@ +id: tutor-b9268ddd3338fe184d978d9f6b4b6b66 + +info: + name: > + Tutor LMS – eLearning and online course solution <=1.7.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6072f47-91b3-4c5d-b16e-61bcd7760604?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-c0f6a6341ec834d167178ebdcad90073.yaml b/nuclei-templates/cve-less/plugins/tutor-c0f6a6341ec834d167178ebdcad90073.yaml new file mode 100644 index 0000000000..6344602cca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-c0f6a6341ec834d167178ebdcad90073.yaml @@ -0,0 +1,58 @@ +id: tutor-c0f6a6341ec834d167178ebdcad90073 + +info: + name: > + Tutor LMS <= 1.9.11 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66130071-668e-4692-afd3-5fcc9039f10f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-c52e67edc9fcaef058b0a6422fbb16e8.yaml b/nuclei-templates/cve-less/plugins/tutor-c52e67edc9fcaef058b0a6422fbb16e8.yaml new file mode 100644 index 0000000000..5ed69d691b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-c52e67edc9fcaef058b0a6422fbb16e8.yaml @@ -0,0 +1,58 @@ +id: tutor-c52e67edc9fcaef058b0a6422fbb16e8 + +info: + name: > + Tutor LMS <= 1.9.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0b14d91-f8f9-41df-b2eb-12792fb3a197?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-c75d16ff72ec9720f6fa40f4e6a40b23.yaml b/nuclei-templates/cve-less/plugins/tutor-c75d16ff72ec9720f6fa40f4e6a40b23.yaml new file mode 100644 index 0000000000..d4c96f53a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-c75d16ff72ec9720f6fa40f4e6a40b23.yaml @@ -0,0 +1,58 @@ +id: tutor-c75d16ff72ec9720f6fa40f4e6a40b23 + +info: + name: > + Tutor LMS <= 2.2.0 - Authenticated (Student+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a64b1ff-0d3f-42fa-bab2-4f31bb8f0476?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-cb03fd3d39a18ba5fc9dfbdcafc632b1.yaml b/nuclei-templates/cve-less/plugins/tutor-cb03fd3d39a18ba5fc9dfbdcafc632b1.yaml new file mode 100644 index 0000000000..3d779a6a57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-cb03fd3d39a18ba5fc9dfbdcafc632b1.yaml @@ -0,0 +1,58 @@ +id: tutor-cb03fd3d39a18ba5fc9dfbdcafc632b1 + +info: + name: > + Tutor LMS <= 2.2.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2b2a90f-7a0a-4150-8a24-14b2ed11663e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-d8208bd4e60d421585f9ef9118f52dc1.yaml b/nuclei-templates/cve-less/plugins/tutor-d8208bd4e60d421585f9ef9118f52dc1.yaml new file mode 100644 index 0000000000..51492e970e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-d8208bd4e60d421585f9ef9118f52dc1.yaml @@ -0,0 +1,58 @@ +id: tutor-d8208bd4e60d421585f9ef9118f52dc1 + +info: + name: > + Tutor LMS <=1.8.2 - SQL Injection via tutor_quiz_builder_get_answers_by_question + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6489214-2155-47f4-83ef-0119b3c26e43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-e2363905c79cd827257e78bbd587e9a9.yaml b/nuclei-templates/cve-less/plugins/tutor-e2363905c79cd827257e78bbd587e9a9.yaml new file mode 100644 index 0000000000..9412b9e710 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-e2363905c79cd827257e78bbd587e9a9.yaml @@ -0,0 +1,58 @@ +id: tutor-e2363905c79cd827257e78bbd587e9a9 + +info: + name: > + Tutor LMS – eLearning and online course solution <= 2.6.1 - Cross-Site Request Forgery to Plugin Deactivation and Data Erase + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/050647a8-6743-46e4-b31c-0b5bd4a1007f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-e8391494de925affdef94809fe41363c.yaml b/nuclei-templates/cve-less/plugins/tutor-e8391494de925affdef94809fe41363c.yaml new file mode 100644 index 0000000000..8a4788bf8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-e8391494de925affdef94809fe41363c.yaml @@ -0,0 +1,58 @@ +id: tutor-e8391494de925affdef94809fe41363c + +info: + name: > + Tutor LMS <= 1.9.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad7eee97-332a-4f3c-bba1-d108a769599d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-ee13651f12379100949dbc5d6ec901e8.yaml b/nuclei-templates/cve-less/plugins/tutor-ee13651f12379100949dbc5d6ec901e8.yaml new file mode 100644 index 0000000000..c43eee2abe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-ee13651f12379100949dbc5d6ec901e8.yaml @@ -0,0 +1,58 @@ +id: tutor-ee13651f12379100949dbc5d6ec901e8 + +info: + name: > + Tutor LMS – eLearning and online course solution <= 2.6.1 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9cee379-79f8-4a60-b1bb-ccab1e954512?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-f530ac7e06964741f1f737d7f624d307.yaml b/nuclei-templates/cve-less/plugins/tutor-f530ac7e06964741f1f737d7f624d307.yaml new file mode 100644 index 0000000000..f2b405e314 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-f530ac7e06964741f1f737d7f624d307.yaml @@ -0,0 +1,58 @@ +id: tutor-f530ac7e06964741f1f737d7f624d307 + +info: + name: > + Tutor LMS – eLearning and online course solution <= 1.7.6 - Unprotected AJAX including Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64bae119-12c3-4b3e-88a7-2eb5a7b1b537?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-f99975c48c34eedbd4615cb8e4e07928.yaml b/nuclei-templates/cve-less/plugins/tutor-f99975c48c34eedbd4615cb8e4e07928.yaml new file mode 100644 index 0000000000..7b1d02a8b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-f99975c48c34eedbd4615cb8e4e07928.yaml @@ -0,0 +1,58 @@ +id: tutor-f99975c48c34eedbd4615cb8e4e07928 + +info: + name: > + Tutor LMS – eLearning and online course solution 2.0.0-2.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcaf9b92-5e59-47c5-a04e-3ef5c53a2640?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor/" + google-query: inurl:"/wp-content/plugins/tutor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.0', '<= 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tutor-lms-elementor-addons-57be4142bba97742b3c54d88f289eda5.yaml b/nuclei-templates/cve-less/plugins/tutor-lms-elementor-addons-57be4142bba97742b3c54d88f289eda5.yaml new file mode 100644 index 0000000000..8108b20d75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tutor-lms-elementor-addons-57be4142bba97742b3c54d88f289eda5.yaml @@ -0,0 +1,58 @@ +id: tutor-lms-elementor-addons-57be4142bba97742b3c54d88f289eda5 + +info: + name: > + Tutor LMS Elementor Addons <= 2.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/959ce050-bafc-4d17-93bd-a9b09b4b4baa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tutor-lms-elementor-addons/" + google-query: inurl:"/wp-content/plugins/tutor-lms-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tutor-lms-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tutor-lms-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tutor-lms-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tuxedo-big-file-uploads-e87d1b56c2a442f8852b77f4c58543d2.yaml b/nuclei-templates/cve-less/plugins/tuxedo-big-file-uploads-e87d1b56c2a442f8852b77f4c58543d2.yaml new file mode 100644 index 0000000000..1fc9263284 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tuxedo-big-file-uploads-e87d1b56c2a442f8852b77f4c58543d2.yaml @@ -0,0 +1,58 @@ +id: tuxedo-big-file-uploads-e87d1b56c2a442f8852b77f4c58543d2 + +info: + name: > + Big File Uploads <= 2.1.1 - Cross-Site Request Forgery via actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93b527a8-30c0-4e47-bb2b-522380b21699?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tuxedo-big-file-uploads/" + google-query: inurl:"/wp-content/plugins/tuxedo-big-file-uploads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tuxedo-big-file-uploads,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tuxedo-big-file-uploads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tuxedo-big-file-uploads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twb-woocommerce-reviews-276bf528dcf846639fd31e2f34582a53.yaml b/nuclei-templates/cve-less/plugins/twb-woocommerce-reviews-276bf528dcf846639fd31e2f34582a53.yaml new file mode 100644 index 0000000000..eb86ca0701 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twb-woocommerce-reviews-276bf528dcf846639fd31e2f34582a53.yaml @@ -0,0 +1,58 @@ +id: twb-woocommerce-reviews-276bf528dcf846639fd31e2f34582a53 + +info: + name: > + TWB Woocommerce Reviews <= 1.7.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f85df8f1-9283-48d0-8f19-88a4a839d501?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twb-woocommerce-reviews/" + google-query: inurl:"/wp-content/plugins/twb-woocommerce-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twb-woocommerce-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twb-woocommerce-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twb-woocommerce-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twchat-1b6d6a3b10f19ccd74a4ee734a0f0ee6.yaml b/nuclei-templates/cve-less/plugins/twchat-1b6d6a3b10f19ccd74a4ee734a0f0ee6.yaml new file mode 100644 index 0000000000..03e4ac666d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twchat-1b6d6a3b10f19ccd74a4ee734a0f0ee6.yaml @@ -0,0 +1,58 @@ +id: twchat-1b6d6a3b10f19ccd74a4ee734a0f0ee6 + +info: + name: > + Two Way Chat <= 3.1.4 - Authenticated (Admin+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9699118a-e12f-491f-b464-51129888fb1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twchat/" + google-query: inurl:"/wp-content/plugins/twchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twchat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twchat-f2bbc682244e8a496bf0cb76f67467d1.yaml b/nuclei-templates/cve-less/plugins/twchat-f2bbc682244e8a496bf0cb76f67467d1.yaml new file mode 100644 index 0000000000..b5ae91cfd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twchat-f2bbc682244e8a496bf0cb76f67467d1.yaml @@ -0,0 +1,58 @@ +id: twchat-f2bbc682244e8a496bf0cb76f67467d1 + +info: + name: > + Two Way CHAT – Send or receive messages to your user <= 3.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccad206a-407e-4c49-9a4a-d5dce3e9612a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twchat/" + google-query: inurl:"/wp-content/plugins/twchat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twchat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twchat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twchat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweeple-ca308dcf17a0b7f5d26b3212b813a6aa.yaml b/nuclei-templates/cve-less/plugins/tweeple-ca308dcf17a0b7f5d26b3212b813a6aa.yaml new file mode 100644 index 0000000000..ab3fd066d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweeple-ca308dcf17a0b7f5d26b3212b813a6aa.yaml @@ -0,0 +1,58 @@ +id: tweeple-ca308dcf17a0b7f5d26b3212b813a6aa + +info: + name: > + Tweeple <= 0.9.5 - Reflected Cross-Site Scripting via id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9b1c96c-ab87-43a8-a3ac-17fea337b690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweeple/" + google-query: inurl:"/wp-content/plugins/tweeple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweeple,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweeple/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweeple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweet-blender-b04c389a2c7db09e215c22221497896f.yaml b/nuclei-templates/cve-less/plugins/tweet-blender-b04c389a2c7db09e215c22221497896f.yaml new file mode 100644 index 0000000000..dde5f37b6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweet-blender-b04c389a2c7db09e215c22221497896f.yaml @@ -0,0 +1,58 @@ +id: tweet-blender-b04c389a2c7db09e215c22221497896f + +info: + name: > + Tweet Blender <= 4.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af838653-d575-48fc-bded-f0068a6c6ebf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweet-blender/" + google-query: inurl:"/wp-content/plugins/tweet-blender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweet-blender,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweet-blender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweet-blender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweet-old-post-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/tweet-old-post-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..5ca935a3b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweet-old-post-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: tweet-old-post-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweet-old-post/" + google-query: inurl:"/wp-content/plugins/tweet-old-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweet-old-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweet-old-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweet-old-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweet-old-post-9cdc97f4b49b38ab2b29bd8a59a5e2a0.yaml b/nuclei-templates/cve-less/plugins/tweet-old-post-9cdc97f4b49b38ab2b29bd8a59a5e2a0.yaml new file mode 100644 index 0000000000..28d326c401 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweet-old-post-9cdc97f4b49b38ab2b29bd8a59a5e2a0.yaml @@ -0,0 +1,58 @@ +id: tweet-old-post-9cdc97f4b49b38ab2b29bd8a59a5e2a0 + +info: + name: > + Revive Old Posts – Social Media Auto Post and Scheduling Plugin < 8.0.0 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb1742fd-7f0c-4a14-aa9c-f2863fcccd17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweet-old-post/" + google-query: inurl:"/wp-content/plugins/tweet-old-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweet-old-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweet-old-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweet-old-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweet-old-post-b4cd17df95bd140cf7c61464c7525ad6.yaml b/nuclei-templates/cve-less/plugins/tweet-old-post-b4cd17df95bd140cf7c61464c7525ad6.yaml new file mode 100644 index 0000000000..4415d65fcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweet-old-post-b4cd17df95bd140cf7c61464c7525ad6.yaml @@ -0,0 +1,58 @@ +id: tweet-old-post-b4cd17df95bd140cf7c61464c7525ad6 + +info: + name: > + Revive Old Posts <= 9.0.10 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6322e9be-ad71-4a91-ab9f-760107d920be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweet-old-post/" + google-query: inurl:"/wp-content/plugins/tweet-old-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweet-old-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweet-old-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweet-old-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweet-wheel-79a6c6928e7e7b780f5e2d2e60aa16c6.yaml b/nuclei-templates/cve-less/plugins/tweet-wheel-79a6c6928e7e7b780f5e2d2e60aa16c6.yaml new file mode 100644 index 0000000000..c2ebe73acf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweet-wheel-79a6c6928e7e7b780f5e2d2e60aa16c6.yaml @@ -0,0 +1,58 @@ +id: tweet-wheel-79a6c6928e7e7b780f5e2d2e60aa16c6 + +info: + name: > + Tweet Wheel <= 0.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/daaa6507-cd8a-40c9-95af-34cc96551417?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweet-wheel/" + google-query: inurl:"/wp-content/plugins/tweet-wheel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweet-wheel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweet-wheel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweet-wheel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweet-wheel-afd2744612e8626c5e5d28907e19b048.yaml b/nuclei-templates/cve-less/plugins/tweet-wheel-afd2744612e8626c5e5d28907e19b048.yaml new file mode 100644 index 0000000000..efe66a0171 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweet-wheel-afd2744612e8626c5e5d28907e19b048.yaml @@ -0,0 +1,58 @@ +id: tweet-wheel-afd2744612e8626c5e5d28907e19b048 + +info: + name: > + Tweet Wheel < 1.0.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8db6a27-111b-4e6d-966e-0af0833307b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweet-wheel/" + google-query: inurl:"/wp-content/plugins/tweet-wheel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweet-wheel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweet-wheel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweet-wheel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweetscribe-181c4a45776e23b2e4688d3d65b94f78.yaml b/nuclei-templates/cve-less/plugins/tweetscribe-181c4a45776e23b2e4688d3d65b94f78.yaml new file mode 100644 index 0000000000..5ba7a81593 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweetscribe-181c4a45776e23b2e4688d3d65b94f78.yaml @@ -0,0 +1,58 @@ +id: tweetscribe-181c4a45776e23b2e4688d3d65b94f78 + +info: + name: > + TweetScribe <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/396f785f-0354-462e-bcaa-69e364c8c4b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweetscribe/" + google-query: inurl:"/wp-content/plugins/tweetscribe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweetscribe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweetscribe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweetscribe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tweetscroll-widget-a75aed58343a47e8c366c92bf6c30f08.yaml b/nuclei-templates/cve-less/plugins/tweetscroll-widget-a75aed58343a47e8c366c92bf6c30f08.yaml new file mode 100644 index 0000000000..8e44017cae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tweetscroll-widget-a75aed58343a47e8c366c92bf6c30f08.yaml @@ -0,0 +1,58 @@ +id: tweetscroll-widget-a75aed58343a47e8c366c92bf6c30f08 + +info: + name: > + TweetScroll Widget <= 1.3.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3f3ff3b-d621-46d4-a98a-e5ebf65ddace?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tweetscroll-widget/" + google-query: inurl:"/wp-content/plugins/tweetscroll-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tweetscroll-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tweetscroll-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tweetscroll-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twenty20-227a5c7ee9b9e5c6c608ba88b684ac16.yaml b/nuclei-templates/cve-less/plugins/twenty20-227a5c7ee9b9e5c6c608ba88b684ac16.yaml new file mode 100644 index 0000000000..b903a99b1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twenty20-227a5c7ee9b9e5c6c608ba88b684ac16.yaml @@ -0,0 +1,58 @@ +id: twenty20-227a5c7ee9b9e5c6c608ba88b684ac16 + +info: + name: > + Twenty20 Image Before-After <= 1.5.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a992dd59-ac56-4da0-9be7-fe32df440e5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twenty20/" + google-query: inurl:"/wp-content/plugins/twenty20/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twenty20,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twenty20/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twenty20" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twentyfourth-wp-scraper-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/twentyfourth-wp-scraper-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1fefd2deb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twentyfourth-wp-scraper-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: twentyfourth-wp-scraper-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twentyfourth-wp-scraper/" + google-query: inurl:"/wp-content/plugins/twentyfourth-wp-scraper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twentyfourth-wp-scraper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twentyfourth-wp-scraper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twentyfourth-wp-scraper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twimp-wp-f1ba708b36938f8403e7e3c932465c6c.yaml b/nuclei-templates/cve-less/plugins/twimp-wp-f1ba708b36938f8403e7e3c932465c6c.yaml new file mode 100644 index 0000000000..dbfb616d49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twimp-wp-f1ba708b36938f8403e7e3c932465c6c.yaml @@ -0,0 +1,58 @@ +id: twimp-wp-f1ba708b36938f8403e7e3c932465c6c + +info: + name: > + Twimp WP <= 0.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25e4abf4-9869-436c-8fd3-9f59b2363ba7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twimp-wp/" + google-query: inurl:"/wp-content/plugins/twimp-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twimp-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twimp-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twimp-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitget-1280f1445230b7ae1ede9b8d16dcfe7d.yaml b/nuclei-templates/cve-less/plugins/twitget-1280f1445230b7ae1ede9b8d16dcfe7d.yaml new file mode 100644 index 0000000000..8ae049051a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitget-1280f1445230b7ae1ede9b8d16dcfe7d.yaml @@ -0,0 +1,58 @@ +id: twitget-1280f1445230b7ae1ede9b8d16dcfe7d + +info: + name: > + Twitget <= 3.3.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89ed1f07-a230-4478-b6d4-7f74c9dd7656?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitget/" + google-query: inurl:"/wp-content/plugins/twitget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitget-ae271d2d4ccc1afd11c18a1dfce05e0c.yaml b/nuclei-templates/cve-less/plugins/twitget-ae271d2d4ccc1afd11c18a1dfce05e0c.yaml new file mode 100644 index 0000000000..1e3cba10d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitget-ae271d2d4ccc1afd11c18a1dfce05e0c.yaml @@ -0,0 +1,58 @@ +id: twitget-ae271d2d4ccc1afd11c18a1dfce05e0c + +info: + name: > + Twitget < 3.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d252639-8cbe-4c62-9218-ebdcbaf98393?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitget/" + google-query: inurl:"/wp-content/plugins/twitget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twittee-text-tweet-95e6d76ba8d0fec093b1906b71015aa5.yaml b/nuclei-templates/cve-less/plugins/twittee-text-tweet-95e6d76ba8d0fec093b1906b71015aa5.yaml new file mode 100644 index 0000000000..710a0f1b08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twittee-text-tweet-95e6d76ba8d0fec093b1906b71015aa5.yaml @@ -0,0 +1,58 @@ +id: twittee-text-tweet-95e6d76ba8d0fec093b1906b71015aa5 + +info: + name: > + Twittee Text Tweet <= 1.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e16d8d28-e1e5-46ab-a64c-1da07747559e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twittee-text-tweet/" + google-query: inurl:"/wp-content/plugins/twittee-text-tweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twittee-text-tweet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twittee-text-tweet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twittee-text-tweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-bootstrap-slider-bb937d8b80c96bf28d192769190e5a64.yaml b/nuclei-templates/cve-less/plugins/twitter-bootstrap-slider-bb937d8b80c96bf28d192769190e5a64.yaml new file mode 100644 index 0000000000..1267395d0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-bootstrap-slider-bb937d8b80c96bf28d192769190e5a64.yaml @@ -0,0 +1,58 @@ +id: twitter-bootstrap-slider-bb937d8b80c96bf28d192769190e5a64 + +info: + name: > + Twitter Bootstrap Slider <= 1.1.3 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc37397e-cd23-4ffd-9771-316d7f9ff9fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-bootstrap-slider/" + google-query: inurl:"/wp-content/plugins/twitter-bootstrap-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-bootstrap-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-bootstrap-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-bootstrap-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-cards-meta-61a96d10635962decc1ce6046743090a.yaml b/nuclei-templates/cve-less/plugins/twitter-cards-meta-61a96d10635962decc1ce6046743090a.yaml new file mode 100644 index 0000000000..84db69e5c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-cards-meta-61a96d10635962decc1ce6046743090a.yaml @@ -0,0 +1,58 @@ +id: twitter-cards-meta-61a96d10635962decc1ce6046743090a + +info: + name: > + Twitter Cards Meta <= 2.4.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f753b536-6ccd-4f79-83da-48cabb15b72a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-cards-meta/" + google-query: inurl:"/wp-content/plugins/twitter-cards-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-cards-meta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-cards-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-cards-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-cards-meta-dc78477c8100a1cf79517cd718961ced.yaml b/nuclei-templates/cve-less/plugins/twitter-cards-meta-dc78477c8100a1cf79517cd718961ced.yaml new file mode 100644 index 0000000000..78e270c6d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-cards-meta-dc78477c8100a1cf79517cd718961ced.yaml @@ -0,0 +1,58 @@ +id: twitter-cards-meta-dc78477c8100a1cf79517cd718961ced + +info: + name: > + Twitter Cards Meta <= 2.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b6ab7bc-e815-4b3f-bda1-dd816ca457cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-cards-meta/" + google-query: inurl:"/wp-content/plugins/twitter-cards-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-cards-meta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-cards-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-cards-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-cards-meta-f47b58aa7a47ddf3e1cee744a91d58ee.yaml b/nuclei-templates/cve-less/plugins/twitter-cards-meta-f47b58aa7a47ddf3e1cee744a91d58ee.yaml new file mode 100644 index 0000000000..cb920541c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-cards-meta-f47b58aa7a47ddf3e1cee744a91d58ee.yaml @@ -0,0 +1,58 @@ +id: twitter-cards-meta-f47b58aa7a47ddf3e1cee744a91d58ee + +info: + name: > + Twitter Cards Meta – Best Twitter Card Plugin for WordPress < 2.5.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21fb5a51-f1e6-49d2-8289-4f4146bc9b28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-cards-meta/" + google-query: inurl:"/wp-content/plugins/twitter-cards-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-cards-meta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-cards-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-cards-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-friends-widget-d6876da6619cc37a90baffbdd9833da4.yaml b/nuclei-templates/cve-less/plugins/twitter-friends-widget-d6876da6619cc37a90baffbdd9833da4.yaml new file mode 100644 index 0000000000..fc542907bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-friends-widget-d6876da6619cc37a90baffbdd9833da4.yaml @@ -0,0 +1,58 @@ +id: twitter-friends-widget-d6876da6619cc37a90baffbdd9833da4 + +info: + name: > + Twitter Friends Widget <= 3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4888a1dc-ed12-41c0-910b-6c9740a54ef0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-friends-widget/" + google-query: inurl:"/wp-content/plugins/twitter-friends-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-friends-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-friends-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-friends-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-liveblog-42c67e99f4b0956315e05e4c9000cee0.yaml b/nuclei-templates/cve-less/plugins/twitter-liveblog-42c67e99f4b0956315e05e4c9000cee0.yaml new file mode 100644 index 0000000000..526740b85b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-liveblog-42c67e99f4b0956315e05e4c9000cee0.yaml @@ -0,0 +1,58 @@ +id: twitter-liveblog-42c67e99f4b0956315e05e4c9000cee0 + +info: + name: > + Twitter LiveBlog <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c20e288e-492d-49ed-89cb-e1ee3e8c204e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-liveblog/" + google-query: inurl:"/wp-content/plugins/twitter-liveblog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-liveblog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-liveblog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-liveblog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-plugin-0be6c78c98564af0756cb75d83e4ca54.yaml b/nuclei-templates/cve-less/plugins/twitter-plugin-0be6c78c98564af0756cb75d83e4ca54.yaml new file mode 100644 index 0000000000..0dc1c3c765 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-plugin-0be6c78c98564af0756cb75d83e4ca54.yaml @@ -0,0 +1,58 @@ +id: twitter-plugin-0be6c78c98564af0756cb75d83e4ca54 + +info: + name: > + BestWebSoft's Twitter <= 2.14 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6198e3e-a8e8-4d67-a0d6-b62f187d4903?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-plugin/" + google-query: inurl:"/wp-content/plugins/twitter-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-plugin-d8d27a0f27f9a3ef698ef167496cc3cc.yaml b/nuclei-templates/cve-less/plugins/twitter-plugin-d8d27a0f27f9a3ef698ef167496cc3cc.yaml new file mode 100644 index 0000000000..6a9c6d6dfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-plugin-d8d27a0f27f9a3ef698ef167496cc3cc.yaml @@ -0,0 +1,58 @@ +id: twitter-plugin-d8d27a0f27f9a3ef698ef167496cc3cc + +info: + name: > + BestWebSoft's Twitter <= 1.3.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74bf6cb2-318f-4b2a-b79c-729fe09570fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-plugin/" + google-query: inurl:"/wp-content/plugins/twitter-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitter-plugin-df50b4bafe4c4501f744155f1ffc2d55.yaml b/nuclei-templates/cve-less/plugins/twitter-plugin-df50b4bafe4c4501f744155f1ffc2d55.yaml new file mode 100644 index 0000000000..9dcab7a298 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitter-plugin-df50b4bafe4c4501f744155f1ffc2d55.yaml @@ -0,0 +1,58 @@ +id: twitter-plugin-df50b4bafe4c4501f744155f1ffc2d55 + +info: + name: > + BestWebSoft's Twitter < 2.55 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b1d4180-091c-4679-a8d2-a6915ec05772?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitter-plugin/" + google-query: inurl:"/wp-content/plugins/twitter-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitter-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitter-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitter-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twitterdash-29127228d14d384699d6b5442d961328.yaml b/nuclei-templates/cve-less/plugins/twitterdash-29127228d14d384699d6b5442d961328.yaml new file mode 100644 index 0000000000..2466b4a5d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twitterdash-29127228d14d384699d6b5442d961328.yaml @@ -0,0 +1,58 @@ +id: twitterdash-29127228d14d384699d6b5442d961328 + +info: + name: > + twitterDash <= 2.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b631b92-b8fb-4f9b-ae2a-bbfd16440ebb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twitterdash/" + google-query: inurl:"/wp-content/plugins/twitterdash/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twitterdash,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twitterdash/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twitterdash" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/twl-easy-call-953b50610487338e685a5cf5fb66996e.yaml b/nuclei-templates/cve-less/plugins/twl-easy-call-953b50610487338e685a5cf5fb66996e.yaml new file mode 100644 index 0000000000..45b916d7cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/twl-easy-call-953b50610487338e685a5cf5fb66996e.yaml @@ -0,0 +1,58 @@ +id: twl-easy-call-953b50610487338e685a5cf5fb66996e + +info: + name: > + Easy Call With Twilio <= 1.0.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72113d42-1a93-4979-849b-ba8038231417?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/twl-easy-call/" + google-query: inurl:"/wp-content/plugins/twl-easy-call/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,twl-easy-call,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/twl-easy-call/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twl-easy-call" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/two-factor-authentication-5e2cda3c648eae11638d20b64a6ac7f2.yaml b/nuclei-templates/cve-less/plugins/two-factor-authentication-5e2cda3c648eae11638d20b64a6ac7f2.yaml new file mode 100644 index 0000000000..98b9488bce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/two-factor-authentication-5e2cda3c648eae11638d20b64a6ac7f2.yaml @@ -0,0 +1,58 @@ +id: two-factor-authentication-5e2cda3c648eae11638d20b64a6ac7f2 + +info: + name: > + Two Factor Authentication < 1.1.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd6b3ebe-a29b-4509-bb8c-d101073f21dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/two-factor-authentication/" + google-query: inurl:"/wp-content/plugins/two-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,two-factor-authentication,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/two-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "two-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/two-factor-authentication-f066ce4a5d628014aa8c478503783258.yaml b/nuclei-templates/cve-less/plugins/two-factor-authentication-f066ce4a5d628014aa8c478503783258.yaml new file mode 100644 index 0000000000..d65fbb0e82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/two-factor-authentication-f066ce4a5d628014aa8c478503783258.yaml @@ -0,0 +1,58 @@ +id: two-factor-authentication-f066ce4a5d628014aa8c478503783258 + +info: + name: > + Two Factor Authentication <= 1.3.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76fb7f1d-4f41-4a73-acbf-c0f49f0123b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/two-factor-authentication/" + google-query: inurl:"/wp-content/plugins/two-factor-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,two-factor-authentication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/two-factor-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "two-factor-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/tx-onepager-a3ea3eadba50d012fd5181689a40ff84.yaml b/nuclei-templates/cve-less/plugins/tx-onepager-a3ea3eadba50d012fd5181689a40ff84.yaml new file mode 100644 index 0000000000..3e56e5e4a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/tx-onepager-a3ea3eadba50d012fd5181689a40ff84.yaml @@ -0,0 +1,58 @@ +id: tx-onepager-a3ea3eadba50d012fd5181689a40ff84 + +info: + name: > + Onepage Builder – Easiest Landing Page Builder For WordPress <= 2.4.1 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1db940b-6cfc-4109-aa02-37ddadcc1f8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tx-onepager/" + google-query: inurl:"/wp-content/plugins/tx-onepager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tx-onepager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tx-onepager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tx-onepager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/typea-ftc-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/typea-ftc-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..16363dc2a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/typea-ftc-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: typea-ftc-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/typea-ftc-disclosure/" + google-query: inurl:"/wp-content/plugins/typea-ftc-disclosure/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,typea-ftc-disclosure,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/typea-ftc-disclosure/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "typea-ftc-disclosure" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/typebot-2dfca9afbcd5108da5d0b371a8c3da93.yaml b/nuclei-templates/cve-less/plugins/typebot-2dfca9afbcd5108da5d0b371a8c3da93.yaml new file mode 100644 index 0000000000..8a6018165c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/typebot-2dfca9afbcd5108da5d0b371a8c3da93.yaml @@ -0,0 +1,58 @@ +id: typebot-2dfca9afbcd5108da5d0b371a8c3da93 + +info: + name: > + Typebot | Build beautiful conversational forms < 1.4.3 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8f45c31-6e35-4f28-8f49-74cb08ff65bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/typebot/" + google-query: inurl:"/wp-content/plugins/typebot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,typebot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/typebot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "typebot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/types-0a99c8d6ca146b58134b86cdf1bd1b53.yaml b/nuclei-templates/cve-less/plugins/types-0a99c8d6ca146b58134b86cdf1bd1b53.yaml new file mode 100644 index 0000000000..6338824b8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/types-0a99c8d6ca146b58134b86cdf1bd1b53.yaml @@ -0,0 +1,58 @@ +id: types-0a99c8d6ca146b58134b86cdf1bd1b53 + +info: + name: > + Toolset Types <= 1.2.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7d8d1e9-04d6-43f0-86a1-386cc1255802?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/types/" + google-query: inurl:"/wp-content/plugins/types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,types,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/types-30b50f08ba3bd834d5cba525e28c2ad2.yaml b/nuclei-templates/cve-less/plugins/types-30b50f08ba3bd834d5cba525e28c2ad2.yaml new file mode 100644 index 0000000000..6af65a5173 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/types-30b50f08ba3bd834d5cba525e28c2ad2.yaml @@ -0,0 +1,58 @@ +id: types-30b50f08ba3bd834d5cba525e28c2ad2 + +info: + name: > + Toolset Types < 1.8.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d6d394e-a8e7-4b12-b2ed-7d1495643106?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/types/" + google-query: inurl:"/wp-content/plugins/types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,types,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/types-f2d9478a61ae546bc6c42d7e589dc8be.yaml b/nuclei-templates/cve-less/plugins/types-f2d9478a61ae546bc6c42d7e589dc8be.yaml new file mode 100644 index 0000000000..1452804a36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/types-f2d9478a61ae546bc6c42d7e589dc8be.yaml @@ -0,0 +1,58 @@ +id: types-f2d9478a61ae546bc6c42d7e589dc8be + +info: + name: > + Types <= 3.4.17 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09ec4633-7639-4d46-8070-9fc6909bc610?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/types/" + google-query: inurl:"/wp-content/plugins/types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,types,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/typofr-4d609a345d021b6f474f9e27302e1298.yaml b/nuclei-templates/cve-less/plugins/typofr-4d609a345d021b6f474f9e27302e1298.yaml new file mode 100644 index 0000000000..a33c66c646 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/typofr-4d609a345d021b6f474f9e27302e1298.yaml @@ -0,0 +1,58 @@ +id: typofr-4d609a345d021b6f474f9e27302e1298 + +info: + name: > + TypoFR <= 0.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8faa8bb-0ebe-4671-87cf-98edbebe913e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/typofr/" + google-query: inurl:"/wp-content/plugins/typofr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,typofr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/typofr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "typofr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ubigeo-peru-f2c3929c09b259d783ad3e308478fb8e.yaml b/nuclei-templates/cve-less/plugins/ubigeo-peru-f2c3929c09b259d783ad3e308478fb8e.yaml new file mode 100644 index 0000000000..f2fb6404d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ubigeo-peru-f2c3929c09b259d783ad3e308478fb8e.yaml @@ -0,0 +1,58 @@ +id: ubigeo-peru-f2c3929c09b259d783ad3e308478fb8e + +info: + name: > + Ubigeo de Perú para Woocommerce y WordPress <= 3.6.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23521bba-8f3a-4d87-901a-cf2d666eefa4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ubigeo-peru/" + google-query: inurl:"/wp-content/plugins/ubigeo-peru/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ubigeo-peru,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ubigeo-peru/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ubigeo-peru" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ucontext-474821f1bfc79c7314fe0d7eec328e34.yaml b/nuclei-templates/cve-less/plugins/ucontext-474821f1bfc79c7314fe0d7eec328e34.yaml new file mode 100644 index 0000000000..9e29e695b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ucontext-474821f1bfc79c7314fe0d7eec328e34.yaml @@ -0,0 +1,58 @@ +id: ucontext-474821f1bfc79c7314fe0d7eec328e34 + +info: + name: > + uContext for Clickbank <= 3.9.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4af83d4b-2eae-481f-b3fd-d5bcacc1d709?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ucontext/" + google-query: inurl:"/wp-content/plugins/ucontext/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ucontext,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ucontext/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ucontext" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ucontext-for-amazon-cac3c9ade2b34b60466d535155587563.yaml b/nuclei-templates/cve-less/plugins/ucontext-for-amazon-cac3c9ade2b34b60466d535155587563.yaml new file mode 100644 index 0000000000..eb616dbc77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ucontext-for-amazon-cac3c9ade2b34b60466d535155587563.yaml @@ -0,0 +1,58 @@ +id: ucontext-for-amazon-cac3c9ade2b34b60466d535155587563 + +info: + name: > + uContext for Amazon <= 3.9.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f7c43d4-cf21-4324-bc77-50bdc2c24661?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ucontext-for-amazon/" + google-query: inurl:"/wp-content/plugins/ucontext-for-amazon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ucontext-for-amazon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ucontext-for-amazon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ucontext-for-amazon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/udraw-bdbcc1232260c01ca170cb0fd5c807cf.yaml b/nuclei-templates/cve-less/plugins/udraw-bdbcc1232260c01ca170cb0fd5c807cf.yaml new file mode 100644 index 0000000000..6947e0c686 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/udraw-bdbcc1232260c01ca170cb0fd5c807cf.yaml @@ -0,0 +1,58 @@ +id: udraw-bdbcc1232260c01ca170cb0fd5c807cf + +info: + name: > + Web To Print Shop : uDraw <= 3.3.3 - Unauthenticated Arbitrary File Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5629d479-143d-4a03-ac64-cb304954a5ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/udraw/" + google-query: inurl:"/wp-content/plugins/udraw/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,udraw,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/udraw/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "udraw" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uji-countdown-15a33f4bb5e2d06a85f82ec34f8865fa.yaml b/nuclei-templates/cve-less/plugins/uji-countdown-15a33f4bb5e2d06a85f82ec34f8865fa.yaml new file mode 100644 index 0000000000..af21bfe161 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uji-countdown-15a33f4bb5e2d06a85f82ec34f8865fa.yaml @@ -0,0 +1,58 @@ +id: uji-countdown-15a33f4bb5e2d06a85f82ec34f8865fa + +info: + name: > + Uji Countdown <= 2.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe44fe7f-0ccf-4297-a9a7-107695abfe13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uji-countdown/" + google-query: inurl:"/wp-content/plugins/uji-countdown/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uji-countdown,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uji-countdown/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uji-countdown" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uji-countdown-72e728e9748e016a77172519c9f57dce.yaml b/nuclei-templates/cve-less/plugins/uji-countdown-72e728e9748e016a77172519c9f57dce.yaml new file mode 100644 index 0000000000..903c1db126 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uji-countdown-72e728e9748e016a77172519c9f57dce.yaml @@ -0,0 +1,58 @@ +id: uji-countdown-72e728e9748e016a77172519c9f57dce + +info: + name: > + Uji Countdown <= 2.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b9793e5-2a56-49d3-8c59-f552a4b08166?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uji-countdown/" + google-query: inurl:"/wp-content/plugins/uji-countdown/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uji-countdown,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uji-countdown/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uji-countdown" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uji-popup-de9e079bb83ef0de7a86b06c72e28cbc.yaml b/nuclei-templates/cve-less/plugins/uji-popup-de9e079bb83ef0de7a86b06c72e28cbc.yaml new file mode 100644 index 0000000000..a63f088a7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uji-popup-de9e079bb83ef0de7a86b06c72e28cbc.yaml @@ -0,0 +1,58 @@ +id: uji-popup-de9e079bb83ef0de7a86b06c72e28cbc + +info: + name: > + Uji Popup <= 1.4.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via uji_popup_code shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e81208c-771f-409e-b665-b07def0ca774?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uji-popup/" + google-query: inurl:"/wp-content/plugins/uji-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uji-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uji-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uji-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uk-cookie-187ba8ada5a41b0d7770ae8aebf496fa.yaml b/nuclei-templates/cve-less/plugins/uk-cookie-187ba8ada5a41b0d7770ae8aebf496fa.yaml new file mode 100644 index 0000000000..c575dca2d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uk-cookie-187ba8ada5a41b0d7770ae8aebf496fa.yaml @@ -0,0 +1,58 @@ +id: uk-cookie-187ba8ada5a41b0d7770ae8aebf496fa + +info: + name: > + Uk Cookie <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3df5cc6-f998-409a-93fe-e514633e4905?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uk-cookie/" + google-query: inurl:"/wp-content/plugins/uk-cookie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uk-cookie,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uk-cookie/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uk-cookie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uk-cookie-consent-c62e1a09b5d25064f2b824e42c65ea26.yaml b/nuclei-templates/cve-less/plugins/uk-cookie-consent-c62e1a09b5d25064f2b824e42c65ea26.yaml new file mode 100644 index 0000000000..fc45ecabcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uk-cookie-consent-c62e1a09b5d25064f2b824e42c65ea26.yaml @@ -0,0 +1,58 @@ +id: uk-cookie-consent-c62e1a09b5d25064f2b824e42c65ea26 + +info: + name: > + Catapult UK Cookie Consent <= 2.3.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/465af9c6-9687-4417-96fb-b7df3d221a1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uk-cookie-consent/" + google-query: inurl:"/wp-content/plugins/uk-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uk-cookie-consent,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uk-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uk-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ukuupeople-the-simple-crm-27f214402efdbe2c3b0f5b6769f3d129.yaml b/nuclei-templates/cve-less/plugins/ukuupeople-the-simple-crm-27f214402efdbe2c3b0f5b6769f3d129.yaml new file mode 100644 index 0000000000..38d5997c4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ukuupeople-the-simple-crm-27f214402efdbe2c3b0f5b6769f3d129.yaml @@ -0,0 +1,58 @@ +id: ukuupeople-the-simple-crm-27f214402efdbe2c3b0f5b6769f3d129 + +info: + name: > + CRM: Contact Management Simplified – UkuuPeople <= 1.6.3 - Cross-Site Request Forgery to Favorite Addition/Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29b4c20b-486c-45d4-904f-561d6624d477?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ukuupeople-the-simple-crm/" + google-query: inurl:"/wp-content/plugins/ukuupeople-the-simple-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ukuupeople-the-simple-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ukuupeople-the-simple-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ukuupeople-the-simple-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uleak-security-dashboard-19a7dd3894c625a145c40adc74330444.yaml b/nuclei-templates/cve-less/plugins/uleak-security-dashboard-19a7dd3894c625a145c40adc74330444.yaml new file mode 100644 index 0000000000..b35a9709f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uleak-security-dashboard-19a7dd3894c625a145c40adc74330444.yaml @@ -0,0 +1,58 @@ +id: uleak-security-dashboard-19a7dd3894c625a145c40adc74330444 + +info: + name: > + ULeak Security & Monitoring Plugin <= 1.2.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45785032-2bbf-4398-94a1-f819f8e8a9ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uleak-security-dashboard/" + google-query: inurl:"/wp-content/plugins/uleak-security-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uleak-security-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uleak-security-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uleak-security-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-2082dbaf9edb41272f9cdbee4745f6ea.yaml b/nuclei-templates/cve-less/plugins/ulisting-2082dbaf9edb41272f9cdbee4745f6ea.yaml new file mode 100644 index 0000000000..d7dfee601a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-2082dbaf9edb41272f9cdbee4745f6ea.yaml @@ -0,0 +1,58 @@ +id: ulisting-2082dbaf9edb41272f9cdbee4745f6ea + +info: + name: > + uListing <= 1.6.6 - Unauthenticated Wordpress Options Changes via AJAX + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1814537d-8307-4d1f-86c8-801519172be5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-24b23f372a9b3fb67e55f59a220932b6.yaml b/nuclei-templates/cve-less/plugins/ulisting-24b23f372a9b3fb67e55f59a220932b6.yaml new file mode 100644 index 0000000000..a4d8291a2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-24b23f372a9b3fb67e55f59a220932b6.yaml @@ -0,0 +1,58 @@ +id: ulisting-24b23f372a9b3fb67e55f59a220932b6 + +info: + name: > + uListing <= 1.6.6 - Unauthenticated Arbitrary Roles and Capabilities Creation/Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44e112a7-8f51-4d2a-a4b3-74a47ef3aec7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-3262dd8277294ea89d83139475cd5b78.yaml b/nuclei-templates/cve-less/plugins/ulisting-3262dd8277294ea89d83139475cd5b78.yaml new file mode 100644 index 0000000000..474cfe4a55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-3262dd8277294ea89d83139475cd5b78.yaml @@ -0,0 +1,58 @@ +id: ulisting-3262dd8277294ea89d83139475cd5b78 + +info: + name: > + uListing <= 1.6.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5ada976-03b8-4219-9ae3-9060fb7b9de5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-36444e5193280ad0907d2e76be8be503.yaml b/nuclei-templates/cve-less/plugins/ulisting-36444e5193280ad0907d2e76be8be503.yaml new file mode 100644 index 0000000000..6afa7b136c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-36444e5193280ad0907d2e76be8be503.yaml @@ -0,0 +1,58 @@ +id: ulisting-36444e5193280ad0907d2e76be8be503 + +info: + name: > + Listing, Classified Ads & Business Directory – uListing <= 2.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c892e5da-bab2-4689-bad0-4b4789015113?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-3f0cdd113a5dc6e8c57d6d8884bb2046.yaml b/nuclei-templates/cve-less/plugins/ulisting-3f0cdd113a5dc6e8c57d6d8884bb2046.yaml new file mode 100644 index 0000000000..55b21ed64b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-3f0cdd113a5dc6e8c57d6d8884bb2046.yaml @@ -0,0 +1,58 @@ +id: ulisting-3f0cdd113a5dc6e8c57d6d8884bb2046 + +info: + name: > + Listing, Classified Ads & Business Directory – uListing <= 2.0.5 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/613f22f2-2f84-4d01-a1ea-c14a25843700?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-470a77f2468b82bfe33702afea1bef64.yaml b/nuclei-templates/cve-less/plugins/ulisting-470a77f2468b82bfe33702afea1bef64.yaml new file mode 100644 index 0000000000..e38154c4c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-470a77f2468b82bfe33702afea1bef64.yaml @@ -0,0 +1,58 @@ +id: ulisting-470a77f2468b82bfe33702afea1bef64 + +info: + name: > + uListing <= 1.6.6 - Unauthenticated Options Changes via wp_route + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff5755dc-2262-47f6-ac3a-6bca9529d088?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-6543c4464af9cc8a7951778c3557602f.yaml b/nuclei-templates/cve-less/plugins/ulisting-6543c4464af9cc8a7951778c3557602f.yaml new file mode 100644 index 0000000000..83e0380b37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-6543c4464af9cc8a7951778c3557602f.yaml @@ -0,0 +1,58 @@ +id: ulisting-6543c4464af9cc8a7951778c3557602f + +info: + name: > + Listing, Classified Ads & Business Directory – uListing <= 2.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f4bd246-5632-4701-aa57-3855e73e6eb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-83811d9b1f9b97a8bbd0a5e724834401.yaml b/nuclei-templates/cve-less/plugins/ulisting-83811d9b1f9b97a8bbd0a5e724834401.yaml new file mode 100644 index 0000000000..af16f84a71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-83811d9b1f9b97a8bbd0a5e724834401.yaml @@ -0,0 +1,58 @@ +id: ulisting-83811d9b1f9b97a8bbd0a5e724834401 + +info: + name: > + uListing <= 1.6.6 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a6615fd-7c37-45d9-a657-0ba00df840e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-854fbb986eea30c9b6ae9000bc6d9efa.yaml b/nuclei-templates/cve-less/plugins/ulisting-854fbb986eea30c9b6ae9000bc6d9efa.yaml new file mode 100644 index 0000000000..9592f6ab8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-854fbb986eea30c9b6ae9000bc6d9efa.yaml @@ -0,0 +1,58 @@ +id: ulisting-854fbb986eea30c9b6ae9000bc6d9efa + +info: + name: > + uListing <= 1.6.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10b7a88f-ce46-42aa-ab5a-81f38288a659?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-929d1756f21a22cbefc18ee9e80a95fd.yaml b/nuclei-templates/cve-less/plugins/ulisting-929d1756f21a22cbefc18ee9e80a95fd.yaml new file mode 100644 index 0000000000..a18ab4d7b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-929d1756f21a22cbefc18ee9e80a95fd.yaml @@ -0,0 +1,58 @@ +id: ulisting-929d1756f21a22cbefc18ee9e80a95fd + +info: + name: > + Listing, Classified Ads & Business Directory – uListing <= 2.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/284b9b04-aa8f-41ff-b944-3488c5da8e20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-93bdb0cf774445292043ebf14695588f.yaml b/nuclei-templates/cve-less/plugins/ulisting-93bdb0cf774445292043ebf14695588f.yaml new file mode 100644 index 0000000000..13353b27fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-93bdb0cf774445292043ebf14695588f.yaml @@ -0,0 +1,58 @@ +id: ulisting-93bdb0cf774445292043ebf14695588f + +info: + name: > + uListing <= 2.0.5 - Cross-Site Request Forgery leading to Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7fe06c1-fe51-42b5-9c56-cb9e6513f4af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-97376ff2f9573b5a393871b387b01b84.yaml b/nuclei-templates/cve-less/plugins/ulisting-97376ff2f9573b5a393871b387b01b84.yaml new file mode 100644 index 0000000000..07ffccd6bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-97376ff2f9573b5a393871b387b01b84.yaml @@ -0,0 +1,58 @@ +id: ulisting-97376ff2f9573b5a393871b387b01b84 + +info: + name: > + uListing <= 1.6.6 - Unauthenticated Arbitrary Account Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c6bf45b-b02d-43bb-b682-7f1ae994e1d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-992243a3e82e516c6ec6b7febbf82953.yaml b/nuclei-templates/cve-less/plugins/ulisting-992243a3e82e516c6ec6b7febbf82953.yaml new file mode 100644 index 0000000000..0e09245544 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-992243a3e82e516c6ec6b7febbf82953.yaml @@ -0,0 +1,58 @@ +id: ulisting-992243a3e82e516c6ec6b7febbf82953 + +info: + name: > + uListing plugin <= 2.0.5 - Authenticated Insecure Direct Object References (IDOR) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85fd3e3c-f1cb-4384-86fd-3691f1deb963?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-a1f1c6c86ee1f2f79ad0b2ee7c41833d.yaml b/nuclei-templates/cve-less/plugins/ulisting-a1f1c6c86ee1f2f79ad0b2ee7c41833d.yaml new file mode 100644 index 0000000000..e7c4324e20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-a1f1c6c86ee1f2f79ad0b2ee7c41833d.yaml @@ -0,0 +1,58 @@ +id: ulisting-a1f1c6c86ee1f2f79ad0b2ee7c41833d + +info: + name: > + Listing, Classified Ads & Business Directory – uListing <= 2.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0eba1e2-d34e-4164-a7cb-55148d308439?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-a20ba6f3c763563b32768dda0edf95aa.yaml b/nuclei-templates/cve-less/plugins/ulisting-a20ba6f3c763563b32768dda0edf95aa.yaml new file mode 100644 index 0000000000..afbaa0a4a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-a20ba6f3c763563b32768dda0edf95aa.yaml @@ -0,0 +1,58 @@ +id: ulisting-a20ba6f3c763563b32768dda0edf95aa + +info: + name: > + Listing, Classified Ads & Business Directory – uListing <= 2.0.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87d153df-93b0-40a3-b119-9fad41fbd0ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-a847b30526e9eda8af7322c234934756.yaml b/nuclei-templates/cve-less/plugins/ulisting-a847b30526e9eda8af7322c234934756.yaml new file mode 100644 index 0000000000..1dea4c48af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-a847b30526e9eda8af7322c234934756.yaml @@ -0,0 +1,58 @@ +id: ulisting-a847b30526e9eda8af7322c234934756 + +info: + name: > + uListing <= 1.6.6 - Unauthenticated Arbitrary Post/Page Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71aa14b8-39bc-4b91-a7cf-9d203fdf44ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ulisting-c1bd4d0b368ec2fd5b9252cc36742695.yaml b/nuclei-templates/cve-less/plugins/ulisting-c1bd4d0b368ec2fd5b9252cc36742695.yaml new file mode 100644 index 0000000000..05c6505361 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ulisting-c1bd4d0b368ec2fd5b9252cc36742695.yaml @@ -0,0 +1,58 @@ +id: ulisting-c1bd4d0b368ec2fd5b9252cc36742695 + +info: + name: > + uListing <= 1.6.6 - Unauthenticated Arbitrary Account Changes + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41800ea9-1ace-42fc-9e7f-d760a126342b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ulisting/" + google-query: inurl:"/wp-content/plugins/ulisting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ulisting,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ulisting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ulisting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-410-80866fdc72be2b54c095a4fd7f7db5e4.yaml b/nuclei-templates/cve-less/plugins/ultimate-410-80866fdc72be2b54c095a4fd7f7db5e4.yaml new file mode 100644 index 0000000000..dcf3eef933 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-410-80866fdc72be2b54c095a4fd7f7db5e4.yaml @@ -0,0 +1,58 @@ +id: ultimate-410-80866fdc72be2b54c095a4fd7f7db5e4 + +info: + name: > + Ultimate 410 Gone Status Code <= 1.1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c10be28-43ff-4b43-8186-6ad9a487321e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-410/" + google-query: inurl:"/wp-content/plugins/ultimate-410/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-410,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-410/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-410" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-d5ab4dadd75fec9af134144e666ff1a3.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-d5ab4dadd75fec9af134144e666ff1a3.yaml new file mode 100644 index 0000000000..5fcff58482 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-d5ab4dadd75fec9af134144e666ff1a3.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-d5ab4dadd75fec9af134144e666ff1a3 + +info: + name: > + Ultimate Addons for Beaver Builder – Lite <= 1.24.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f70b66ad-55fb-45f8-944a-2c8712071113?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-1a33452c961e3444957f4bc07615cf79.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-1a33452c961e3444957f4bc07615cf79.yaml new file mode 100644 index 0000000000..aa3084e095 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-1a33452c961e3444957f4bc07615cf79.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-lite-1a33452c961e3444957f4bc07615cf79 + +info: + name: > + Ultimate Addons for Beaver Builder - Lite <= 1.5.5 - Authenticated (Subscriber+) Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64452bb0-32bc-4acf-8e89-f6ae7c75cef4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-33a470e219d30f02e24dacca366cf3a9.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-33a470e219d30f02e24dacca366cf3a9.yaml new file mode 100644 index 0000000000..fd0f0b3309 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-33a470e219d30f02e24dacca366cf3a9.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-lite-33a470e219d30f02e24dacca366cf3a9 + +info: + name: > + Ultimate Addons for Beaver Builder – Lite <= 1.5.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7c808ff-546b-445e-af38-0b45cab3f307?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-6a22eab260469991c892609c3554e5c2.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-6a22eab260469991c892609c3554e5c2.yaml new file mode 100644 index 0000000000..7f56a7c62b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-6a22eab260469991c892609c3554e5c2.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-lite-6a22eab260469991c892609c3554e5c2 + +info: + name: > + Ultimate Addons for Beaver Builder – Lite <= 1.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Advanced Icons Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c6c35f-1095-4897-b4a6-e7b295c187de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-71c8544bfd8e2585abc3fe4c509dc5e8.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-71c8544bfd8e2585abc3fe4c509dc5e8.yaml new file mode 100644 index 0000000000..2a0dfeba7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-71c8544bfd8e2585abc3fe4c509dc5e8.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-lite-71c8544bfd8e2585abc3fe4c509dc5e8 + +info: + name: > + Ultimate Addons for Beaver Builder – Lite <= 1.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Separator Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/552c0810-9687-4a66-91a4-e34228552a15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-74e928a44773876c1faeda39f648c8c1.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-74e928a44773876c1faeda39f648c8c1.yaml new file mode 100644 index 0000000000..0e8da14d74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-74e928a44773876c1faeda39f648c8c1.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-lite-74e928a44773876c1faeda39f648c8c1 + +info: + name: > + Ultimate Addons for Beaver Builder – Lite <= 1.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Heading Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b290f4c-293d-41d5-b43e-b9c5c350552b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-909eee3c64db045125d6a0e9ea1350a2.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-909eee3c64db045125d6a0e9ea1350a2.yaml new file mode 100644 index 0000000000..0d98e8e5cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-909eee3c64db045125d6a0e9ea1350a2.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-lite-909eee3c64db045125d6a0e9ea1350a2 + +info: + name: > + Ultimate Addons for Beaver Builder – Lite <= 1.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Info Table Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b6c6e10-3feb-4ecd-a17a-81e15c471d3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-933cb3c57cef1616939f9329edac577e.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-933cb3c57cef1616939f9329edac577e.yaml new file mode 100644 index 0000000000..72b516c4a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-933cb3c57cef1616939f9329edac577e.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-lite-933cb3c57cef1616939f9329edac577e + +info: + name: > + Ultimate Addons for Beaver Builder – Lite <= 1.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fa5ac48-57b6-4367-81a0-8310360d0c7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-b79883c3437a6dd7938862f157254782.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-b79883c3437a6dd7938862f157254782.yaml new file mode 100644 index 0000000000..8df2507d02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-beaver-builder-lite-b79883c3437a6dd7938862f157254782.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-beaver-builder-lite-b79883c3437a6dd7938862f157254782 + +info: + name: > + Ultimate Addons for Beaver Builder – Lite <= 1.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61c3a517-70c8-4fc2-b8d6-1dcb2ad811d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-beaver-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-beaver-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-beaver-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-4c7073bcb34b91519f3886f6522a24df.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-4c7073bcb34b91519f3886f6522a24df.yaml new file mode 100644 index 0000000000..992a1f5189 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-4c7073bcb34b91519f3886f6522a24df.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-contact-form-7-4c7073bcb34b91519f3886f6522a24df + +info: + name: > + Ultimate Addons for Contact Form 7 <= 3.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/364946a5-ce1e-4872-895d-e7cf795a04f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-6cf0838d8f56929452bab2f8ff3f1bd8.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-6cf0838d8f56929452bab2f8ff3f1bd8.yaml new file mode 100644 index 0000000000..8c9e1d0ccd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-6cf0838d8f56929452bab2f8ff3f1bd8.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-contact-form-7-6cf0838d8f56929452bab2f8ff3f1bd8 + +info: + name: > + Ultimate Addons for Contact Form 7 <= 3.1.23 - Authenticated(Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-6ecaac8965c567964f683839f3212253.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-6ecaac8965c567964f683839f3212253.yaml new file mode 100644 index 0000000000..28e4b9e568 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-6ecaac8965c567964f683839f3212253.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-contact-form-7-6ecaac8965c567964f683839f3212253 + +info: + name: > + Ultimate Addons for Contact Form 7 <= 3.1.23 - Authenticated (Subscriber+) SQL Injection via id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5db5c5e0-f2ba-4082-b3eb-33cc0ce418e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-8461759ea5a4f2c3230ae2ba89953371.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-8461759ea5a4f2c3230ae2ba89953371.yaml new file mode 100644 index 0000000000..92e621cf13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-8461759ea5a4f2c3230ae2ba89953371.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-contact-form-7-8461759ea5a4f2c3230ae2ba89953371 + +info: + name: > + Ultimate Addons for Contact Form 7 <= 3.1.28 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d1517d4-79d0-4d4b-b54d-86e00dabd874?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-89c7530bb0ccb65cbe93d8710754fbde.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-89c7530bb0ccb65cbe93d8710754fbde.yaml new file mode 100644 index 0000000000..016c336b19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-89c7530bb0ccb65cbe93d8710754fbde.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-contact-form-7-89c7530bb0ccb65cbe93d8710754fbde + +info: + name: > + Ultimate Addons for Contact Form 7 <= 3.1.28 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1723a465-75ca-4fea-ad9c-d96ffb5625a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-b2845fc817c419db85576f698a4d3013.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-b2845fc817c419db85576f698a4d3013.yaml new file mode 100644 index 0000000000..2a4c209c44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-b2845fc817c419db85576f698a4d3013.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-contact-form-7-b2845fc817c419db85576f698a4d3013 + +info: + name: > + Ultimate Addons for Contact Form 7 <= 3.1.23 - Unauthenticated SQL Injection via form_id + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f10e5eef-1ccf-4f98-b0e9-5ed05b3881a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-contact-form-7,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-b8421311d76851450148e6c1e68c8aa3.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-b8421311d76851450148e6c1e68c8aa3.yaml new file mode 100644 index 0000000000..b48ff288d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-b8421311d76851450148e6c1e68c8aa3.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-contact-form-7-b8421311d76851450148e6c1e68c8aa3 + +info: + name: > + Ultimate Addons for Contact Form 7 <= 3.2.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73720e67-79e5-4b4c-8720-e28ad718b2b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-c0847a869834cac59e5bd8ee9a8f049f.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-c0847a869834cac59e5bd8ee9a8f049f.yaml new file mode 100644 index 0000000000..da5e0b568f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-contact-form-7-c0847a869834cac59e5bd8ee9a8f049f.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-contact-form-7-c0847a869834cac59e5bd8ee9a8f049f + +info: + name: > + Ultimate Addons for Contact Form 7 <= 3.1.0 - Reflected Cross-Site Scripting via 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d857324c-94c9-471a-9da8-0b8c9bb50262?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-contact-form-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-elementor-688329ccf7bb0b49cbf94f9e95fe056a.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-elementor-688329ccf7bb0b49cbf94f9e95fe056a.yaml new file mode 100644 index 0000000000..af524fa77b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-elementor-688329ccf7bb0b49cbf94f9e95fe056a.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-elementor-688329ccf7bb0b49cbf94f9e95fe056a + +info: + name: > + Mega Addons For Elementor <= 1.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f557c6e-2fbd-478d-8dc3-cdc550e523b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-11a2580b3d0abb5ce4a2d1b75225b077.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-11a2580b3d0abb5ce4a2d1b75225b077.yaml new file mode 100644 index 0000000000..7dffbee51c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-11a2580b3d0abb5ce4a2d1b75225b077.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-11a2580b3d0abb5ce4a2d1b75225b077 + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.12.6 - Authenticated (Contributor+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/110e5e67-b318-4ab2-9b4d-59aabcf7db7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-2e1aa97d2a69303c55e94b8b3fd49dd1.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-2e1aa97d2a69303c55e94b8b3fd49dd1.yaml new file mode 100644 index 0000000000..9d71880556 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-2e1aa97d2a69303c55e94b8b3fd49dd1.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-2e1aa97d2a69303c55e94b8b3fd49dd1 + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.3.1 - Cross-Site Request Forgery to WPForm/Blocks Import + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b225e5e-7207-4af4-b023-ad23fd540d56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-54ca82ae8ec1733aa6ce2fbfb7528cc8.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-54ca82ae8ec1733aa6ce2fbfb7528cc8.yaml new file mode 100644 index 0000000000..d7e5c98d50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-54ca82ae8ec1733aa6ce2fbfb7528cc8.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-54ca82ae8ec1733aa6ce2fbfb7528cc8 + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.3.1 - HTML Injection in Emails + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73323c62-c23f-4bf2-b266-df63db63d4d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-5e747ec4420f9649cb9fa7868eb33968.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-5e747ec4420f9649cb9fa7868eb33968.yaml new file mode 100644 index 0000000000..353a878f67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-5e747ec4420f9649cb9fa7868eb33968.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-5e747ec4420f9649cb9fa7868eb33968 + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.3.1 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7e33fbc-da1b-4109-8b29-37e1050a559b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-74062d3bc6524d681fbfe5faf76c4ab5.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-74062d3bc6524d681fbfe5faf76c4ab5.yaml new file mode 100644 index 0000000000..72177437fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-74062d3bc6524d681fbfe5faf76c4ab5.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-74062d3bc6524d681fbfe5faf76c4ab5 + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 1.14.11 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d9b5f4e-5d98-49b2-adbb-1db906b07c45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-7be36c301f6852821a57629c849c8dbf.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-7be36c301f6852821a57629c849c8dbf.yaml new file mode 100644 index 0000000000..6c26b0a6f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-7be36c301f6852821a57629c849c8dbf.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-7be36c301f6852821a57629c849c8dbf + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 1.25.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/099c8e23-31e3-47de-a33a-fe5812ca14d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-7f4172230ab5f4cfd3c2df5f07ea6d4e.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-7f4172230ab5f4cfd3c2df5f07ea6d4e.yaml new file mode 100644 index 0000000000..e6a617b845 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-7f4172230ab5f4cfd3c2df5f07ea6d4e.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-7f4172230ab5f4cfd3c2df5f07ea6d4e + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.3.1 - Missing Authorization to Captcha Setting Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/559c83e9-8c85-4d2a-b835-d6b314ba7eab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-baf6f9647aa6e6045c6bf5dfb25901ae.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-baf6f9647aa6e6045c6bf5dfb25901ae.yaml new file mode 100644 index 0000000000..e11f760cee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-baf6f9647aa6e6045c6bf5dfb25901ae.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-baf6f9647aa6e6045c6bf5dfb25901ae + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.3.1 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/242e99d1-db27-45fa-a90d-5a26c2d1901b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-c5f769a2ad53c678c35d169acd9dd76e.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-c5f769a2ad53c678c35d169acd9dd76e.yaml new file mode 100644 index 0000000000..bd1dca4c7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-c5f769a2ad53c678c35d169acd9dd76e.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-c5f769a2ad53c678c35d169acd9dd76e + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 1.14.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4419a302-4305-44f8-a256-dd276b5cd751?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-d75adb1e1a8470a2c11b41a61ac1c215.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-d75adb1e1a8470a2c11b41a61ac1c215.yaml new file mode 100644 index 0000000000..45cec40fde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-d75adb1e1a8470a2c11b41a61ac1c215.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-d75adb1e1a8470a2c11b41a61ac1c215 + +info: + name: > + Spectra <= 2.6.6 - Authenticated (Contributor+) Server-Side Request Forgery in import_wpforms + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5886128e-e72f-4d84-8c17-1ed4a0fcc17e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-da3f3594c596e882f29a46f5eb088351.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-da3f3594c596e882f29a46f5eb088351.yaml new file mode 100644 index 0000000000..266952f554 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-da3f3594c596e882f29a46f5eb088351.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-da3f3594c596e882f29a46f5eb088351 + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.10.3 - Authenticated(Contributor+) Cross-Site Scripting via Custom CSS + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4933a30-974f-487d-9444-b0ea1283a09c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-e2ba51cd3a24abd61ca453335ef98edb.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-e2ba51cd3a24abd61ca453335ef98edb.yaml new file mode 100644 index 0000000000..9d98c865a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-e2ba51cd3a24abd61ca453335ef98edb.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-e2ba51cd3a24abd61ca453335ef98edb + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.3.1 - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2f8cdd3-f873-42bd-9891-a63a398df846?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-e57055214b95f532f53777eeb789b4ce.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-e57055214b95f532f53777eeb789b4ce.yaml new file mode 100644 index 0000000000..729b2d3f2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-e57055214b95f532f53777eeb789b4ce.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-e57055214b95f532f53777eeb789b4ce + +info: + name: > + Spectra <= 2.7.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0df493cb-2b5e-4a16-b6d8-4cd9a473540d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-f25e6249bdc00f58ed87833d8179196d.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-f25e6249bdc00f58ed87833d8179196d.yaml new file mode 100644 index 0000000000..edbe608eb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-f25e6249bdc00f58ed87833d8179196d.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-f25e6249bdc00f58ed87833d8179196d + +info: + name: > + Spectra – WordPress Gutenberg Blocks <= 2.3.1 - Cross-Site Request Forgery to Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e828fbc-d465-4d69-b7d6-42e2ad87f73d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-fbe34f85c5c0e3a0ed7be431ce9a9754.yaml b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-fbe34f85c5c0e3a0ed7be431ce9a9754.yaml new file mode 100644 index 0000000000..1f24e9167e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-addons-for-gutenberg-fbe34f85c5c0e3a0ed7be431ce9a9754.yaml @@ -0,0 +1,58 @@ +id: ultimate-addons-for-gutenberg-fbe34f85c5c0e3a0ed7be431ce9a9754 + +info: + name: > + Spectra <= 2.6.6 - Authenticated (Contributor+) Server-Side Request Forgery in template_importer + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b139260b-7741-4e35-b23f-896f23719739?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-addons-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-addons-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-appointment-scheduling-9936959fd813ccd389d4906204f0314e.yaml b/nuclei-templates/cve-less/plugins/ultimate-appointment-scheduling-9936959fd813ccd389d4906204f0314e.yaml new file mode 100644 index 0000000000..666945bc2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-appointment-scheduling-9936959fd813ccd389d4906204f0314e.yaml @@ -0,0 +1,58 @@ +id: ultimate-appointment-scheduling-9936959fd813ccd389d4906204f0314e + +info: + name: > + Ultimate Appointment Booking & Scheduling < 1.1.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2339c392-49bc-4744-b82a-d40f3bb4a81e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-appointment-scheduling/" + google-query: inurl:"/wp-content/plugins/ultimate-appointment-scheduling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-appointment-scheduling,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-appointment-scheduling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-appointment-scheduling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-auction-06c61feebda6eda56577372883413c6b.yaml b/nuclei-templates/cve-less/plugins/ultimate-auction-06c61feebda6eda56577372883413c6b.yaml new file mode 100644 index 0000000000..ceb3bc83c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-auction-06c61feebda6eda56577372883413c6b.yaml @@ -0,0 +1,58 @@ +id: ultimate-auction-06c61feebda6eda56577372883413c6b + +info: + name: > + Ultimate WordPress Auction Plugin < 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c01bce24-3563-40bd-83c5-8d54bd622151?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-auction/" + google-query: inurl:"/wp-content/plugins/ultimate-auction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-auction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-auction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-auction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-auction-2b8dbf4f0e346913342b93011c311311.yaml b/nuclei-templates/cve-less/plugins/ultimate-auction-2b8dbf4f0e346913342b93011c311311.yaml new file mode 100644 index 0000000000..6ce492ff62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-auction-2b8dbf4f0e346913342b93011c311311.yaml @@ -0,0 +1,58 @@ +id: ultimate-auction-2b8dbf4f0e346913342b93011c311311 + +info: + name: > + Ultimate Auction <= 4.0.5 - Cross-Site Request Forgery and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bbd8851-09ae-40a1-ba88-0a2c439f102d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-auction/" + google-query: inurl:"/wp-content/plugins/ultimate-auction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-auction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-auction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-auction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-blocks-8ecac7c0d333dc76f1706559fa2ff22f.yaml b/nuclei-templates/cve-less/plugins/ultimate-blocks-8ecac7c0d333dc76f1706559fa2ff22f.yaml new file mode 100644 index 0000000000..d54120abe2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-blocks-8ecac7c0d333dc76f1706559fa2ff22f.yaml @@ -0,0 +1,58 @@ +id: ultimate-blocks-8ecac7c0d333dc76f1706559fa2ff22f + +info: + name: > + Ultimate Blocks <= 3.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Advanced Heading + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/387d28fa-f582-4d68-a781-fc210ef5bd30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-blocks/" + google-query: inurl:"/wp-content/plugins/ultimate-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ultimate-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..18f643c932 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ultimate-blocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-blocks/" + google-query: inurl:"/wp-content/plugins/ultimate-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-bootstrap-elements-for-elementor-825ff2ff95290127035d7fc582cf6f47.yaml b/nuclei-templates/cve-less/plugins/ultimate-bootstrap-elements-for-elementor-825ff2ff95290127035d7fc582cf6f47.yaml new file mode 100644 index 0000000000..1a04a6ff04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-bootstrap-elements-for-elementor-825ff2ff95290127035d7fc582cf6f47.yaml @@ -0,0 +1,58 @@ +id: ultimate-bootstrap-elements-for-elementor-825ff2ff95290127035d7fc582cf6f47 + +info: + name: > + Ultimate Bootstrap Elements for Elementor <= 1.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cb43deb-63f6-42d8-8dd6-55a59fca31ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-bootstrap-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/ultimate-bootstrap-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-bootstrap-elements-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-bootstrap-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-bootstrap-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-bootstrap-elements-for-elementor-b7beb3a7782030a0bf8580cffcb377f0.yaml b/nuclei-templates/cve-less/plugins/ultimate-bootstrap-elements-for-elementor-b7beb3a7782030a0bf8580cffcb377f0.yaml new file mode 100644 index 0000000000..338402ad43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-bootstrap-elements-for-elementor-b7beb3a7782030a0bf8580cffcb377f0.yaml @@ -0,0 +1,58 @@ +id: ultimate-bootstrap-elements-for-elementor-b7beb3a7782030a0bf8580cffcb377f0 + +info: + name: > + Ultimate Bootstrap Elements for Elementor <= 1.3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed191380-6037-4d59-8db7-cb33136a304e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-bootstrap-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/ultimate-bootstrap-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-bootstrap-elements-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-bootstrap-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-bootstrap-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-bulk-seo-noindex-nofollow-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ultimate-bulk-seo-noindex-nofollow-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2d40bcbdce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-bulk-seo-noindex-nofollow-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ultimate-bulk-seo-noindex-nofollow-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-bulk-seo-noindex-nofollow/" + google-query: inurl:"/wp-content/plugins/ultimate-bulk-seo-noindex-nofollow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-bulk-seo-noindex-nofollow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-bulk-seo-noindex-nofollow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-bulk-seo-noindex-nofollow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ultimate-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ec5bb430cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ultimate-carousel-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-carousel-for-divi/" + google-query: inurl:"/wp-content/plugins/ultimate-carousel-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-carousel-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-carousel-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-carousel-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-carousel-for-elementor-d246c52e9d4725c7b245a84d679cf9a0.yaml b/nuclei-templates/cve-less/plugins/ultimate-carousel-for-elementor-d246c52e9d4725c7b245a84d679cf9a0.yaml new file mode 100644 index 0000000000..410125f955 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-carousel-for-elementor-d246c52e9d4725c7b245a84d679cf9a0.yaml @@ -0,0 +1,58 @@ +id: ultimate-carousel-for-elementor-d246c52e9d4725c7b245a84d679cf9a0 + +info: + name: > + Ultimate Carousel For Elementor <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0e35280-0c2a-4fe1-bfbe-3321338ff1a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-carousel-for-elementor/" + google-query: inurl:"/wp-content/plugins/ultimate-carousel-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-carousel-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-carousel-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-carousel-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-carousel-for-visual-composer-5829eead4c96879234a4f24b2d7f9ad4.yaml b/nuclei-templates/cve-less/plugins/ultimate-carousel-for-visual-composer-5829eead4c96879234a4f24b2d7f9ad4.yaml new file mode 100644 index 0000000000..85f6a16c28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-carousel-for-visual-composer-5829eead4c96879234a4f24b2d7f9ad4.yaml @@ -0,0 +1,58 @@ +id: ultimate-carousel-for-visual-composer-5829eead4c96879234a4f24b2d7f9ad4 + +info: + name: > + Ultimate Carousel For WPBakery Page Builder <= 2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c97fc289-1ee3-4401-a57e-b4c8d998259e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-carousel-for-visual-composer/" + google-query: inurl:"/wp-content/plugins/ultimate-carousel-for-visual-composer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-carousel-for-visual-composer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-carousel-for-visual-composer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-carousel-for-visual-composer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-category-excluder-47b41bc2712a70e4aff6fb8649c1924a.yaml b/nuclei-templates/cve-less/plugins/ultimate-category-excluder-47b41bc2712a70e4aff6fb8649c1924a.yaml new file mode 100644 index 0000000000..1f2a63e2f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-category-excluder-47b41bc2712a70e4aff6fb8649c1924a.yaml @@ -0,0 +1,58 @@ +id: ultimate-category-excluder-47b41bc2712a70e4aff6fb8649c1924a + +info: + name: > + Ultimate Category Excluder <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e30d2ca-1918-4fcf-979e-7cae0d84529e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-category-excluder/" + google-query: inurl:"/wp-content/plugins/ultimate-category-excluder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-category-excluder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-category-excluder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-category-excluder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-dashboard-5955a72c6d4dde7cf5a0b6e449e430ae.yaml b/nuclei-templates/cve-less/plugins/ultimate-dashboard-5955a72c6d4dde7cf5a0b6e449e430ae.yaml new file mode 100644 index 0000000000..79cca54df0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-dashboard-5955a72c6d4dde7cf5a0b6e449e430ae.yaml @@ -0,0 +1,58 @@ +id: ultimate-dashboard-5955a72c6d4dde7cf5a0b6e449e430ae + +info: + name: > + Ultimate Dashboard <= 3.7.10 - Login Page Disclosure on Multi-site + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56f3cb34-0452-4e3d-9442-0decc77f5e63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-dashboard/" + google-query: inurl:"/wp-content/plugins/ultimate-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-dashboard,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-dashboard-74982fb1ee6ee7e80b9e6c7f6db4f09f.yaml b/nuclei-templates/cve-less/plugins/ultimate-dashboard-74982fb1ee6ee7e80b9e6c7f6db4f09f.yaml new file mode 100644 index 0000000000..00cefb675a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-dashboard-74982fb1ee6ee7e80b9e6c7f6db4f09f.yaml @@ -0,0 +1,58 @@ +id: ultimate-dashboard-74982fb1ee6ee7e80b9e6c7f6db4f09f + +info: + name: > + Ultimate Dashboard <= 3.7.11 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10c1b000-537a-4009-a740-19666505989e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-dashboard/" + google-query: inurl:"/wp-content/plugins/ultimate-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-dashboard-b6be8c11fad37e887646a283e9c47ba4.yaml b/nuclei-templates/cve-less/plugins/ultimate-dashboard-b6be8c11fad37e887646a283e9c47ba4.yaml new file mode 100644 index 0000000000..f7489ad237 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-dashboard-b6be8c11fad37e887646a283e9c47ba4.yaml @@ -0,0 +1,58 @@ +id: ultimate-dashboard-b6be8c11fad37e887646a283e9c47ba4 + +info: + name: > + Ultimate Dashboard <= 3.7.7 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79cce1fc-a27f-4842-b1a2-2c53857add4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-dashboard/" + google-query: inurl:"/wp-content/plugins/ultimate-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-dashboard-c5b5b783e98de972c2044e0acdd3ca83.yaml b/nuclei-templates/cve-less/plugins/ultimate-dashboard-c5b5b783e98de972c2044e0acdd3ca83.yaml new file mode 100644 index 0000000000..49276037df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-dashboard-c5b5b783e98de972c2044e0acdd3ca83.yaml @@ -0,0 +1,58 @@ +id: ultimate-dashboard-c5b5b783e98de972c2044e0acdd3ca83 + +info: + name: > + Ultimate Dashboard <= 3.7.5 - Authenticated(Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5103e60-771f-46cf-b432-21d131e30bcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-dashboard/" + google-query: inurl:"/wp-content/plugins/ultimate-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-dashboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-elementor-6c08edd49eae20ef345d45ae5326d421.yaml b/nuclei-templates/cve-less/plugins/ultimate-elementor-6c08edd49eae20ef345d45ae5326d421.yaml new file mode 100644 index 0000000000..763aa8ea16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-elementor-6c08edd49eae20ef345d45ae5326d421.yaml @@ -0,0 +1,58 @@ +id: ultimate-elementor-6c08edd49eae20ef345d45ae5326d421 + +info: + name: > + Ultimate Addons for Elementor <= 1.24.1 - Registration Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71e2db7c-53a7-4b17-b00a-ce71a00bf546?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-elementor/" + google-query: inurl:"/wp-content/plugins/ultimate-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-elementor-9d2da4be0bb177af2af2d4539faa65e1.yaml b/nuclei-templates/cve-less/plugins/ultimate-elementor-9d2da4be0bb177af2af2d4539faa65e1.yaml new file mode 100644 index 0000000000..dcde475214 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-elementor-9d2da4be0bb177af2af2d4539faa65e1.yaml @@ -0,0 +1,58 @@ +id: ultimate-elementor-9d2da4be0bb177af2af2d4539faa65e1 + +info: + name: > + Ultimate Addons for Elementor < 1.20.1 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee678085-ce74-4a35-9d90-3b94a3d39a8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-elementor/" + google-query: inurl:"/wp-content/plugins/ultimate-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-elementor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-elementor-b3de31ba898622222026a1275ef3dc05.yaml b/nuclei-templates/cve-less/plugins/ultimate-elementor-b3de31ba898622222026a1275ef3dc05.yaml new file mode 100644 index 0000000000..157fefc4ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-elementor-b3de31ba898622222026a1275ef3dc05.yaml @@ -0,0 +1,58 @@ +id: ultimate-elementor-b3de31ba898622222026a1275ef3dc05 + +info: + name: > + Ultimate Addons for Elementor < 1.30.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99e8017a-346e-42d8-b9c1-29ed15da1156?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-elementor/" + google-query: inurl:"/wp-content/plugins/ultimate-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.30.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-facebook-comments-507dc7ea634baa930020adb83f291cb6.yaml b/nuclei-templates/cve-less/plugins/ultimate-facebook-comments-507dc7ea634baa930020adb83f291cb6.yaml new file mode 100644 index 0000000000..ad60d1fded --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-facebook-comments-507dc7ea634baa930020adb83f291cb6.yaml @@ -0,0 +1,58 @@ +id: ultimate-facebook-comments-507dc7ea634baa930020adb83f291cb6 + +info: + name: > + Ultimate Social Comments – Email Notification & Lazy Load <= 1.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7de6415a-5236-46ec-ae2e-f4ec40c90f4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-facebook-comments/" + google-query: inurl:"/wp-content/plugins/ultimate-facebook-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-facebook-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-facebook-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-facebook-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-faqs-01d841cc481bc716c0f7b858b4f11c39.yaml b/nuclei-templates/cve-less/plugins/ultimate-faqs-01d841cc481bc716c0f7b858b4f11c39.yaml new file mode 100644 index 0000000000..0acade1b9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-faqs-01d841cc481bc716c0f7b858b4f11c39.yaml @@ -0,0 +1,58 @@ +id: ultimate-faqs-01d841cc481bc716c0f7b858b4f11c39 + +info: + name: > + Ultimate Faqs <= 1.8.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1818e80-e580-45d4-88ab-018cb1723947?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-faqs/" + google-query: inurl:"/wp-content/plugins/ultimate-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-faqs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-faqs-91fd3dac9c4d5ede970602c4fc325980.yaml b/nuclei-templates/cve-less/plugins/ultimate-faqs-91fd3dac9c4d5ede970602c4fc325980.yaml new file mode 100644 index 0000000000..e8dcdf915a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-faqs-91fd3dac9c4d5ede970602c4fc325980.yaml @@ -0,0 +1,58 @@ +id: ultimate-faqs-91fd3dac9c4d5ede970602c4fc325980 + +info: + name: > + Ultimate FAQ <= 1.8.24 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67f9f44b-badc-48d5-b1d9-11cd6501fa9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-faqs/" + google-query: inurl:"/wp-content/plugins/ultimate-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-faqs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-faqs-b632dc6cba0c61ee2bf8f89345f7cf19.yaml b/nuclei-templates/cve-less/plugins/ultimate-faqs-b632dc6cba0c61ee2bf8f89345f7cf19.yaml new file mode 100644 index 0000000000..3e21642eec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-faqs-b632dc6cba0c61ee2bf8f89345f7cf19.yaml @@ -0,0 +1,58 @@ +id: ultimate-faqs-b632dc6cba0c61ee2bf8f89345f7cf19 + +info: + name: > + Ultimate FAQ <= 1.8.29 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7eaa196b-429a-4d15-903b-16f33cc0bd6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-faqs/" + google-query: inurl:"/wp-content/plugins/ultimate-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-faqs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-faqs-c31ec2a99302fba742cc98be29fde1f0.yaml b/nuclei-templates/cve-less/plugins/ultimate-faqs-c31ec2a99302fba742cc98be29fde1f0.yaml new file mode 100644 index 0000000000..8d4dc1f200 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-faqs-c31ec2a99302fba742cc98be29fde1f0.yaml @@ -0,0 +1,58 @@ +id: ultimate-faqs-c31ec2a99302fba742cc98be29fde1f0 + +info: + name: > + Ultimate FAQ <= 1.8.24 - Unauthenticated Options Import/Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb562efb-eb17-4366-9f6d-02653df6ece1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-faqs/" + google-query: inurl:"/wp-content/plugins/ultimate-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-faqs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-faqs-deca81735cc88aee9510bee96ebea3f5.yaml b/nuclei-templates/cve-less/plugins/ultimate-faqs-deca81735cc88aee9510bee96ebea3f5.yaml new file mode 100644 index 0000000000..563efb6fb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-faqs-deca81735cc88aee9510bee96ebea3f5.yaml @@ -0,0 +1,58 @@ +id: ultimate-faqs-deca81735cc88aee9510bee96ebea3f5 + +info: + name: > + Ultimate FAQ <= 2.1.1 - Missing Authorization to Arbitrary FAQ Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80b3c2d3-b8dc-429f-b2d7-6a697ad47a9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-faqs/" + google-query: inurl:"/wp-content/plugins/ultimate-faqs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-faqs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-faqs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-faqs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-296629ec48c2e29c001ff73c83d740a4.yaml b/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-296629ec48c2e29c001ff73c83d740a4.yaml new file mode 100644 index 0000000000..59fd82a5f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-296629ec48c2e29c001ff73c83d740a4.yaml @@ -0,0 +1,58 @@ +id: ultimate-form-builder-lite-296629ec48c2e29c001ff73c83d740a4 + +info: + name: > + Ultimate Form Builder Lite <= 1.3.6 - SQL Injection to PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13031db7-aeac-4d44-94f9-1cdb84781a55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-form-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-form-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-form-builder-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-form-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-form-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-343d05bc9d208789b5e376940d559b37.yaml b/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-343d05bc9d208789b5e376940d559b37.yaml new file mode 100644 index 0000000000..89856639b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-343d05bc9d208789b5e376940d559b37.yaml @@ -0,0 +1,58 @@ +id: ultimate-form-builder-lite-343d05bc9d208789b5e376940d559b37 + +info: + name: > + Ultimate Form Builder Lite <= 1.3.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19f3d3a4-1742-4e3f-97c5-acf960c3cdb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-form-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-form-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-form-builder-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-form-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-form-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-8222ebd9d6f8937e984983c872335120.yaml b/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-8222ebd9d6f8937e984983c872335120.yaml new file mode 100644 index 0000000000..53bee84e92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-form-builder-lite-8222ebd9d6f8937e984983c872335120.yaml @@ -0,0 +1,58 @@ +id: ultimate-form-builder-lite-8222ebd9d6f8937e984983c872335120 + +info: + name: > + Ultimate Form Builder Lite <= 1.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/041807ab-9354-4438-8e8a-77140f41eedb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-form-builder-lite/" + google-query: inurl:"/wp-content/plugins/ultimate-form-builder-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-form-builder-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-form-builder-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-form-builder-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-gutenberg-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ultimate-gutenberg-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e3dc899254 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-gutenberg-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ultimate-gutenberg-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-gutenberg/" + google-query: inurl:"/wp-content/plugins/ultimate-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-gutenberg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-instagram-feed-8056d85f33dbcf3eacb36ae8419af314.yaml b/nuclei-templates/cve-less/plugins/ultimate-instagram-feed-8056d85f33dbcf3eacb36ae8419af314.yaml new file mode 100644 index 0000000000..f69d0b06e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-instagram-feed-8056d85f33dbcf3eacb36ae8419af314.yaml @@ -0,0 +1,58 @@ +id: ultimate-instagram-feed-8056d85f33dbcf3eacb36ae8419af314 + +info: + name: > + Ultimate Instagram Feed - WordPress Plugin < 1.3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2aea3e1-60cb-4992-a217-4250bed2641e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-instagram-feed/" + google-query: inurl:"/wp-content/plugins/ultimate-instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-instagram-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-instagram-feed-ccaa53f193d436f82f09665a210de68c.yaml b/nuclei-templates/cve-less/plugins/ultimate-instagram-feed-ccaa53f193d436f82f09665a210de68c.yaml new file mode 100644 index 0000000000..633b7d9055 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-instagram-feed-ccaa53f193d436f82f09665a210de68c.yaml @@ -0,0 +1,58 @@ +id: ultimate-instagram-feed-ccaa53f193d436f82f09665a210de68c + +info: + name: > + Ultimate Instagram Feed – WordPress Plugin < 1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6fe59e8-78cf-47f4-90eb-920f8e4fd204?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-instagram-feed/" + google-query: inurl:"/wp-content/plugins/ultimate-instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-instagram-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-landing-page-55c8be1b98f905c0f97aa18a603d7cea.yaml b/nuclei-templates/cve-less/plugins/ultimate-landing-page-55c8be1b98f905c0f97aa18a603d7cea.yaml new file mode 100644 index 0000000000..b3513d2816 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-landing-page-55c8be1b98f905c0f97aa18a603d7cea.yaml @@ -0,0 +1,58 @@ +id: ultimate-landing-page-55c8be1b98f905c0f97aa18a603d7cea + +info: + name: > + Landing Page Builder – Free Landing Page Templates <= 3.1.9.8 - Local File Inclusion via 'lpp_template_select' + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c40bf215-81c1-423a-9d41-9a231dfc8053?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-landing-page/" + google-query: inurl:"/wp-content/plugins/ultimate-landing-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-landing-page,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-landing-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-landing-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-358ac8b0121729fe99fde2c984a71ee0.yaml b/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-358ac8b0121729fe99fde2c984a71ee0.yaml new file mode 100644 index 0000000000..d969e849a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-358ac8b0121729fe99fde2c984a71ee0.yaml @@ -0,0 +1,58 @@ +id: ultimate-maps-by-supsystic-358ac8b0121729fe99fde2c984a71ee0 + +info: + name: > + Ultimate Maps by Supsystic <= 1.2.16 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b4108b7-fa78-4f1f-9eee-0e2383b4988c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-maps-by-supsystic/" + google-query: inurl:"/wp-content/plugins/ultimate-maps-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-maps-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-maps-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-maps-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-6f6b50e35dbc0c6deca59671d5ec0737.yaml b/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-6f6b50e35dbc0c6deca59671d5ec0737.yaml new file mode 100644 index 0000000000..964bfb536c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-6f6b50e35dbc0c6deca59671d5ec0737.yaml @@ -0,0 +1,58 @@ +id: ultimate-maps-by-supsystic-6f6b50e35dbc0c6deca59671d5ec0737 + +info: + name: > + Ultimate Maps by Supsystic <= 1.2.4 - Reflected Cross-Site scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5848d3a-d6a8-4e56-9012-9d600a3cf7fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-maps-by-supsystic/" + google-query: inurl:"/wp-content/plugins/ultimate-maps-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-maps-by-supsystic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-maps-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-maps-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-705a4f41d4e1aa767a8f267fa3454855.yaml b/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-705a4f41d4e1aa767a8f267fa3454855.yaml new file mode 100644 index 0000000000..51fd2c9820 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-705a4f41d4e1aa767a8f267fa3454855.yaml @@ -0,0 +1,58 @@ +id: ultimate-maps-by-supsystic-705a4f41d4e1aa767a8f267fa3454855 + +info: + name: > + Ultimate Maps by Supsystic <= 1.1.16 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/758e23e4-72e6-4dc1-94f9-d02b75bb9857?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-maps-by-supsystic/" + google-query: inurl:"/wp-content/plugins/ultimate-maps-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-maps-by-supsystic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-maps-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-maps-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-d90dc94bb51dfa2f24514c386a4ae9c2.yaml b/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-d90dc94bb51dfa2f24514c386a4ae9c2.yaml new file mode 100644 index 0000000000..4d6a2fc0b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-maps-by-supsystic-d90dc94bb51dfa2f24514c386a4ae9c2.yaml @@ -0,0 +1,58 @@ +id: ultimate-maps-by-supsystic-d90dc94bb51dfa2f24514c386a4ae9c2 + +info: + name: > + Ultimate Maps by Supsystic <= 1.2.15 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d170af2a-9b8c-43ad-b712-b89bcfadd5b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-maps-by-supsystic/" + google-query: inurl:"/wp-content/plugins/ultimate-maps-by-supsystic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-maps-by-supsystic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-maps-by-supsystic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-maps-by-supsystic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml new file mode 100644 index 0000000000..e18eb7b3ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-00490e9d02fc53f4fe0fd6d4af30aaaa + +info: + name: > + Ultimate Member <= 2.0.53 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eedf009-116c-4a98-8b84-e01bd35e7e60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-08b6d9dc73cde56d748bcfad89022c1b.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-08b6d9dc73cde56d748bcfad89022c1b.yaml new file mode 100644 index 0000000000..546d53a269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-08b6d9dc73cde56d748bcfad89022c1b.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-08b6d9dc73cde56d748bcfad89022c1b + +info: + name: > + Ultimate Member <= 2.0.10 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/244a23a2-8899-4ab4-8f8d-62756e4ea56b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-0e25a5015b31f614947b39dfb4bdedd7.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-0e25a5015b31f614947b39dfb4bdedd7.yaml new file mode 100644 index 0000000000..d589687136 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-0e25a5015b31f614947b39dfb4bdedd7.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-0e25a5015b31f614947b39dfb4bdedd7 + +info: + name: > + Ultimate Member <= 2.1.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c340b7c0-35ab-4707-a999-261a721a9a37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-0e4c98f58a3149e9a232e9c95d40a56b.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-0e4c98f58a3149e9a232e9c95d40a56b.yaml new file mode 100644 index 0000000000..bd8785af15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-0e4c98f58a3149e9a232e9c95d40a56b.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-0e4c98f58a3149e9a232e9c95d40a56b + +info: + name: > + Ultimate Member <= 2.0.21 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5143a2d2-504a-46b8-b82b-19beba4da64d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-0f6437cf628a3bd90ee26c228a1c0006.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-0f6437cf628a3bd90ee26c228a1c0006.yaml new file mode 100644 index 0000000000..9ef5868a07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-0f6437cf628a3bd90ee26c228a1c0006.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-0f6437cf628a3bd90ee26c228a1c0006 + +info: + name: > + Ultimate Member 1.2.98 - 1.2.997 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/461d5d5a-7bc2-4855-bc40-0edb9c538c33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.2.98', '<= 1.2.997') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-18ceaed7f43455d18367a3a1c3285ab3.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-18ceaed7f43455d18367a3a1c3285ab3.yaml new file mode 100644 index 0000000000..e1dc09c5fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-18ceaed7f43455d18367a3a1c3285ab3.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-18ceaed7f43455d18367a3a1c3285ab3 + +info: + name: > + Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.5.0 - Authenticated (Admin+) Remote Code Execution via Multi-Select + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed28fe16-0835-4e94-a30e-305e7ba03740?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-1c487d7f0e032490b79fb7ae13bd082b.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-1c487d7f0e032490b79fb7ae13bd082b.yaml new file mode 100644 index 0000000000..60fa715daa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-1c487d7f0e032490b79fb7ae13bd082b.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-1c487d7f0e032490b79fb7ae13bd082b + +info: + name: > + Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin <= 2.6.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5b08a10-f6bc-44a0-865a-5ad71a1772f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-1f4b95ce58b10f02cade4467768773cc.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-1f4b95ce58b10f02cade4467768773cc.yaml new file mode 100644 index 0000000000..900446e44c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-1f4b95ce58b10f02cade4467768773cc.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-1f4b95ce58b10f02cade4467768773cc + +info: + name: > + Ultimate Member <= 2.0.3 - Improper Access Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3221af7-13ea-4c90-b2ca-75eb3d373ed3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-242a068db50aca331a847418abd23c68.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-242a068db50aca331a847418abd23c68.yaml new file mode 100644 index 0000000000..50d3a0ab22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-242a068db50aca331a847418abd23c68.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-242a068db50aca331a847418abd23c68 + +info: + name: > + Ultimate Member <= 2.0.45 - Low-Privileged Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0c0562f-1f3b-4630-bbc5-4ea2985d71d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-2502f9d9353560a8e219bba8c12b1db1.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-2502f9d9353560a8e219bba8c12b1db1.yaml new file mode 100644 index 0000000000..e1e4165dec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-2502f9d9353560a8e219bba8c12b1db1.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-2502f9d9353560a8e219bba8c12b1db1 + +info: + name: > + Ultimate Member <= 2.1.6 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db3b206d-16c5-48fb-800d-d017a0c76630?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-255674fc07ae81595ebffe932a85af22.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-255674fc07ae81595ebffe932a85af22.yaml new file mode 100644 index 0000000000..0145e70c96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-255674fc07ae81595ebffe932a85af22.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-255674fc07ae81595ebffe932a85af22 + +info: + name: > + Ultimate Member <= 2.0.45 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4890ec6f-ba73-48bd-8dd7-f896d6b4a140?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-29ac257d0d3d26be4d0323f19b8203fa.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-29ac257d0d3d26be4d0323f19b8203fa.yaml new file mode 100644 index 0000000000..a86d8023fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-29ac257d0d3d26be4d0323f19b8203fa.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-29ac257d0d3d26be4d0323f19b8203fa + +info: + name: > + Ultimate Member <= 2.8.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8bc1653-8fee-468a-bb6d-f24959846ee5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-33abe543df77e7949cb3756acaf591a2.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-33abe543df77e7949cb3756acaf591a2.yaml new file mode 100644 index 0000000000..f10d419547 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-33abe543df77e7949cb3756acaf591a2.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-33abe543df77e7949cb3756acaf591a2 + +info: + name: > + Ultimate Member <= 1.3.88 - Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0549acd5-686b-4505-af68-f3f854096f63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.88') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-3c91005e14cc5d86d18c2bf91cfcd5a0.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-3c91005e14cc5d86d18c2bf91cfcd5a0.yaml new file mode 100644 index 0000000000..a2d2e69933 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-3c91005e14cc5d86d18c2bf91cfcd5a0.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-3c91005e14cc5d86d18c2bf91cfcd5a0 + +info: + name: > + Ultimate Member <= 2.0.51 - Cross-Site Request Forgery and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acbe1c36-04e7-49af-90fa-d8acbe351b57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-3cc251560d3b16f1b023b3769603bce5.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-3cc251560d3b16f1b023b3769603bce5.yaml new file mode 100644 index 0000000000..77cc3daeb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-3cc251560d3b16f1b023b3769603bce5.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-3cc251560d3b16f1b023b3769603bce5 + +info: + name: > + Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.5.0 - Authenticated (Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04cd8da4-9da3-4c80-a77e-c2f792391593?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0', '<= 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-40c98f25ab20a5cec3c5a2b4260a50d3.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-40c98f25ab20a5cec3c5a2b4260a50d3.yaml new file mode 100644 index 0000000000..6badfced8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-40c98f25ab20a5cec3c5a2b4260a50d3.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-40c98f25ab20a5cec3c5a2b4260a50d3 + +info: + name: > + Ultimate Member <= 2.1.11 - Unauthenticated Privilege Escalation via User Meta + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef2ac5c8-9e76-40b8-a2a4-8cb4291871f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-40e897d2ffdca51f7bd6bf3f82372d65.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-40e897d2ffdca51f7bd6bf3f82372d65.yaml new file mode 100644 index 0000000000..2e4bd27dd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-40e897d2ffdca51f7bd6bf3f82372d65.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-40e897d2ffdca51f7bd6bf3f82372d65 + +info: + name: > + Ultimate Member <= 2.0.3 - Unauthorized Image File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e75e877-14e6-4e51-b435-d78f8ab95d12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-43eec6271332d7e594aedf23b6c236f2.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-43eec6271332d7e594aedf23b6c236f2.yaml new file mode 100644 index 0000000000..4e82d2de47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-43eec6271332d7e594aedf23b6c236f2.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-43eec6271332d7e594aedf23b6c236f2 + +info: + name: > + Ultimate Member <= 2.0.3 - Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9b6c62f-b53f-44f7-8fe2-22bac0074f9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-468eaebc73eb5b6623a0434366ab7c6e.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-468eaebc73eb5b6623a0434366ab7c6e.yaml new file mode 100644 index 0000000000..c55930e8d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-468eaebc73eb5b6623a0434366ab7c6e.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-468eaebc73eb5b6623a0434366ab7c6e + +info: + name: > + Ultimate Member <= 2.0.32 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2e1948a-9513-43e4-aadd-369a7f4dc137?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-4bd6ca2ba70df51b819fed4e8082314e.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-4bd6ca2ba70df51b819fed4e8082314e.yaml new file mode 100644 index 0000000000..71af8ed692 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-4bd6ca2ba70df51b819fed4e8082314e.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-4bd6ca2ba70df51b819fed4e8082314e + +info: + name: > + Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.0.45 - Arbitrary File Deletion/Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/618f644b-a92c-4f7f-aaea-c03ee7d6e0f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-6192c67ee2c3bd9b9e931c78efebf58a.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-6192c67ee2c3bd9b9e931c78efebf58a.yaml new file mode 100644 index 0000000000..7d30998b75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-6192c67ee2c3bd9b9e931c78efebf58a.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-6192c67ee2c3bd9b9e931c78efebf58a + +info: + name: > + Ultimate Member <= 2.6.0 - Cross-Site Request Forgery to Form Duplication + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97ced4ed-915b-4234-b59d-75db983f90e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-662783c84d37079d21b3524fa95f4917.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-662783c84d37079d21b3524fa95f4917.yaml new file mode 100644 index 0000000000..ed1649d162 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-662783c84d37079d21b3524fa95f4917.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-662783c84d37079d21b3524fa95f4917 + +info: + name: > + Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin 2.1.3 - 2.8.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/005fa621-3c49-4c23-add5-d6b7a9110055?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.1.3', '<= 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-674e9e8ffc19e4d579a57273137742ea.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-674e9e8ffc19e4d579a57273137742ea.yaml new file mode 100644 index 0000000000..89468d2678 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-674e9e8ffc19e4d579a57273137742ea.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-674e9e8ffc19e4d579a57273137742ea + +info: + name: > + Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.5.0 - Authenticated (Admin+) Limited Remote Code Execution via um_populate_dropdown_options + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdcdbba7-8280-457b-a511-66a486978a31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-7333037ca30b5f74ef217bf9466f85b1.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-7333037ca30b5f74ef217bf9466f85b1.yaml new file mode 100644 index 0000000000..545e7d3514 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-7333037ca30b5f74ef217bf9466f85b1.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-7333037ca30b5f74ef217bf9466f85b1 + +info: + name: > + Ultimate Member <= 2.4.1 - Username Enumeration + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4832fbb-94ed-41c4-8434-1972f4d92476?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-7db7009418abd13063c2d118e09483f4.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-7db7009418abd13063c2d118e09483f4.yaml new file mode 100644 index 0000000000..b8b05b5bb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-7db7009418abd13063c2d118e09483f4.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-7db7009418abd13063c2d118e09483f4 + +info: + name: > + Ultimate Member <= 2.4.0 - Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45f32160-36eb-4d66-a6a6-a3d6f2f7bf1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml new file mode 100644 index 0000000000..2457f2d461 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-7e2ae7bf2efb6bc23e281ebe6c72a235 + +info: + name: > + Ultimate Member <= 2.1.11 - Authenticated Privilege Escalation via Profile Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3805936-675e-474f-a3f7-acea69bd72f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-7f5926ab268dbc1681fd3a5de983583a.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-7f5926ab268dbc1681fd3a5de983583a.yaml new file mode 100644 index 0000000000..58249f4a39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-7f5926ab268dbc1681fd3a5de983583a.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-7f5926ab268dbc1681fd3a5de983583a + +info: + name: > + Ultimate Member <= 2.8.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86ddd5fd-137b-478e-952e-b36fc6a5c28d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-80c655d3d796ab546d2bd2d7a2a197bc.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-80c655d3d796ab546d2bd2d7a2a197bc.yaml new file mode 100644 index 0000000000..34ca1a6cdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-80c655d3d796ab546d2bd2d7a2a197bc.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-80c655d3d796ab546d2bd2d7a2a197bc + +info: + name: > + Ultimate Member – User Profile, User Registration, Login & Membership Plugin <= 2.5.0 - Authenticated (Contributor+) Directory Traversal via Shortcodes + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c7d5fbe-d272-46d4-9b33-889ba77dcc52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-85405b283a5b7488c3b527272c63f06e.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-85405b283a5b7488c3b527272c63f06e.yaml new file mode 100644 index 0000000000..6f311aaeff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-85405b283a5b7488c3b527272c63f06e.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-85405b283a5b7488c3b527272c63f06e + +info: + name: > + Ultimate Member < 2.0.4 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13033a3c-f020-4821-a7ad-bfcfca407df0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-913680c7cc113c5e372d717a86269c4e.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-913680c7cc113c5e372d717a86269c4e.yaml new file mode 100644 index 0000000000..282e55f251 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-913680c7cc113c5e372d717a86269c4e.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-913680c7cc113c5e372d717a86269c4e + +info: + name: > + Ultimate Member <= 2.0.39 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa0881ab-d731-4e57-8323-c49b9306bf50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-9c147c1fb503983534bc4ea0ae8ec8cf.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-9c147c1fb503983534bc4ea0ae8ec8cf.yaml new file mode 100644 index 0000000000..b6cdc2cc45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-9c147c1fb503983534bc4ea0ae8ec8cf.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-9c147c1fb503983534bc4ea0ae8ec8cf + +info: + name: > + Ultimate Member <= 1.3.39 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8d4dc12-ae17-477f-a8d2-da9747672a26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-a3c4d74b63323bef472fb10b591d6314.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-a3c4d74b63323bef472fb10b591d6314.yaml new file mode 100644 index 0000000000..a8f62fc08c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-a3c4d74b63323bef472fb10b591d6314.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-a3c4d74b63323bef472fb10b591d6314 + +info: + name: > + Ultimate Member <= 2.0.17 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/561c8bcf-30b0-4ee6-b507-4cacf22c1e58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-a52442145dbdbdaec9bfaa19c0573b9d.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-a52442145dbdbdaec9bfaa19c0573b9d.yaml new file mode 100644 index 0000000000..dd8abdf0b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-a52442145dbdbdaec9bfaa19c0573b9d.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-a52442145dbdbdaec9bfaa19c0573b9d + +info: + name: > + Ultimate Member < 1.0.84 - Authorization Bypass to Arbitrary File Upload/Delete + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ae243af-619f-4405-b1e0-9b44c1869501?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.84') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-a6054d32c09f0a33057b0746bec92f89.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-a6054d32c09f0a33057b0746bec92f89.yaml new file mode 100644 index 0000000000..f4fa567e29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-a6054d32c09f0a33057b0746bec92f89.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-a6054d32c09f0a33057b0746bec92f89 + +info: + name: > + Ultimate Member <= 2.0.6 - Multiple Cross-Site Request Forgery Issues + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9742a4d0-34b0-4f7f-aa2b-a6f7cb6aacd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-aaa278b6b3d118139396380f3db91970.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-aaa278b6b3d118139396380f3db91970.yaml new file mode 100644 index 0000000000..34879fc7d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-aaa278b6b3d118139396380f3db91970.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-aaa278b6b3d118139396380f3db91970 + +info: + name: > + Ultimate Member <= 2.3.1 - Arbitrary Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d638120b-5396-408b-8273-d003ff9dd01d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-afb0b6e6fbde3c83cc029e81733d53ca.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-afb0b6e6fbde3c83cc029e81733d53ca.yaml new file mode 100644 index 0000000000..d52418d346 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-afb0b6e6fbde3c83cc029e81733d53ca.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-afb0b6e6fbde3c83cc029e81733d53ca + +info: + name: > + Ultimate Member <= 2.1.11 - Unauthenticated Privilege Escalation via User Roles + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1081eeb1-3240-478d-8679-7bf9293b5a95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-afb15d666e098434f8ebcb7a76b5d273.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-afb15d666e098434f8ebcb7a76b5d273.yaml new file mode 100644 index 0000000000..25cd625140 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-afb15d666e098434f8ebcb7a76b5d273.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-afb15d666e098434f8ebcb7a76b5d273 + +info: + name: > + Ultimate Member <= 1.3.17 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d8bee60-33f8-465b-80a9-90bc7a4d2054?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-b9f884e6575d690e9989d7d2f0484ed9.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-b9f884e6575d690e9989d7d2f0484ed9.yaml new file mode 100644 index 0000000000..8cd0e308ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-b9f884e6575d690e9989d7d2f0484ed9.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-b9f884e6575d690e9989d7d2f0484ed9 + +info: + name: > + Ultimate Member <= 2.1.2 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65a0033d-2266-429c-aab2-80bd46c93b91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-bcc49c967f35b7af17804d1e16dc2e60.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-bcc49c967f35b7af17804d1e16dc2e60.yaml new file mode 100644 index 0000000000..334df4254a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-bcc49c967f35b7af17804d1e16dc2e60.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-bcc49c967f35b7af17804d1e16dc2e60 + +info: + name: > + Ultimate Member <= 2.0.39 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cec3799-cf44-412b-8590-b8fc60c58535?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-bcd9ca517989975e14b7cf4813bc0e1b.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-bcd9ca517989975e14b7cf4813bc0e1b.yaml new file mode 100644 index 0000000000..6eb684ed34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-bcd9ca517989975e14b7cf4813bc0e1b.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-bcd9ca517989975e14b7cf4813bc0e1b + +info: + name: > + Ultimate Member <= 2.1.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd46a2c3-f24d-4dff-b899-a95acb6310f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-c040e1b7f1d715ec00a05b885aa3bea9.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-c040e1b7f1d715ec00a05b885aa3bea9.yaml new file mode 100644 index 0000000000..613a8e99ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-c040e1b7f1d715ec00a05b885aa3bea9.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-c040e1b7f1d715ec00a05b885aa3bea9 + +info: + name: > + Ultimate Member <= 2.0.27 - Multiple Cross-Site Scripting vulnerabilities + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baab325d-58c2-446b-af70-6951eeef3bb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-c30bc91af795fd14b3e08b79d07d649a.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-c30bc91af795fd14b3e08b79d07d649a.yaml new file mode 100644 index 0000000000..908c94febe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-c30bc91af795fd14b3e08b79d07d649a.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-c30bc91af795fd14b3e08b79d07d649a + +info: + name: > + Ultimate Member <= 2.0.39 - Unauthorized Profile Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00b4b903-4682-458b-9681-751179460b75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-c814b16777b5d2f124bf7a293b35df9d.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-c814b16777b5d2f124bf7a293b35df9d.yaml new file mode 100644 index 0000000000..62b19846d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-c814b16777b5d2f124bf7a293b35df9d.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-c814b16777b5d2f124bf7a293b35df9d + +info: + name: > + Ultimate Member <= 2.0.51 - Cross-Site Request Forgery and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf238e9d-be91-4c9a-8506-ee01927f5173?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-ca3f8b736fe25e4b904e1b16b1beb376.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-ca3f8b736fe25e4b904e1b16b1beb376.yaml new file mode 100644 index 0000000000..fc948cd04f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-ca3f8b736fe25e4b904e1b16b1beb376.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-ca3f8b736fe25e4b904e1b16b1beb376 + +info: + name: > + Ultimate Member <= 2.0.39 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e556d8c9-3ca5-4bec-a840-7a6d67532e59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-caa94527ec89b606495dedb1b363e9ed.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-caa94527ec89b606495dedb1b363e9ed.yaml new file mode 100644 index 0000000000..e777a32ba5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-caa94527ec89b606495dedb1b363e9ed.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-caa94527ec89b606495dedb1b363e9ed + +info: + name: > + Ultimate Member < 2.0.4 - Authenticated Unrestricted File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc2af96c-09c5-4ddf-a910-04291aeeef49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-cb65508cd745e36647cf4ef3930d3944.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-cb65508cd745e36647cf4ef3930d3944.yaml new file mode 100644 index 0000000000..42147e2cee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-cb65508cd745e36647cf4ef3930d3944.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-cb65508cd745e36647cf4ef3930d3944 + +info: + name: > + Ultimate Member <= 1.3.75 - Missing Authorization to Password Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8911642f-6061-42a1-b733-8cc44b2870f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-cf4cd1ad5bd449a05295e57107462f9b.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-cf4cd1ad5bd449a05295e57107462f9b.yaml new file mode 100644 index 0000000000..1671f10a26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-cf4cd1ad5bd449a05295e57107462f9b.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-cf4cd1ad5bd449a05295e57107462f9b + +info: + name: > + Ultimate Member <= 1.3.83 - Shortcode Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bab67a5c-3390-4423-8fa9-b5ffbc98324d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.83') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-d14d68253fb2c57056fb03621a5ee651.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-d14d68253fb2c57056fb03621a5ee651.yaml new file mode 100644 index 0000000000..271b1588c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-d14d68253fb2c57056fb03621a5ee651.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-d14d68253fb2c57056fb03621a5ee651 + +info: + name: > + Ultimate Member <= 1.3.28 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97fd7952-a7f0-4797-82cd-840c0a3e5fbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-d6ddc334180239abe617a7bb4b11e74b.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-d6ddc334180239abe617a7bb4b11e74b.yaml new file mode 100644 index 0000000000..54994d9f7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-d6ddc334180239abe617a7bb4b11e74b.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-d6ddc334180239abe617a7bb4b11e74b + +info: + name: > + Ultimate Member <= 2.3.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93cf6dce-892e-4106-bb37-b7952e5ea5a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-d96c9d39ba81c10e5ff2a55a63974daf.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-d96c9d39ba81c10e5ff2a55a63974daf.yaml new file mode 100644 index 0000000000..453456caaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-d96c9d39ba81c10e5ff2a55a63974daf.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-d96c9d39ba81c10e5ff2a55a63974daf + +info: + name: > + Ultimate Member <= 1.3.64 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc046b72-692a-4980-90ad-26c8fc2a131a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-dac7bdda4e28b985a7da6425e9bc4314.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-dac7bdda4e28b985a7da6425e9bc4314.yaml new file mode 100644 index 0000000000..53a079d2e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-dac7bdda4e28b985a7da6425e9bc4314.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-dac7bdda4e28b985a7da6425e9bc4314 + +info: + name: > + Ultimate Member <= 2.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43b5a321-c82e-4d0b-9def-b74c3cf439d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-e00b98ac8c54622a944850cb2d386b43.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-e00b98ac8c54622a944850cb2d386b43.yaml new file mode 100644 index 0000000000..c27a123ede --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-e00b98ac8c54622a944850cb2d386b43.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-e00b98ac8c54622a944850cb2d386b43 + +info: + name: > + Ultimate Member <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7162b78-65b7-4f80-83f0-47d9afc2ed65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-e44d6ae66963d07b80fddcfb06cf2f83.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-e44d6ae66963d07b80fddcfb06cf2f83.yaml new file mode 100644 index 0000000000..deaf4b8bc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-e44d6ae66963d07b80fddcfb06cf2f83.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-e44d6ae66963d07b80fddcfb06cf2f83 + +info: + name: > + Ultimate Member <= 2.0.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1be1928-a278-48d5-beb2-00e3c8df3fa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-f6c1c83fdf17318a9a2aff5f238d4136.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-f6c1c83fdf17318a9a2aff5f238d4136.yaml new file mode 100644 index 0000000000..3f69aefbc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-f6c1c83fdf17318a9a2aff5f238d4136.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-f6c1c83fdf17318a9a2aff5f238d4136 + +info: + name: > + Ultimate Member <= 2.0.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f24cfefe-f671-456d-a378-44a41fc81c0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-member-fd2089a519aca4aa15a99f294c4457f0.yaml b/nuclei-templates/cve-less/plugins/ultimate-member-fd2089a519aca4aa15a99f294c4457f0.yaml new file mode 100644 index 0000000000..31de8e03e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-member-fd2089a519aca4aa15a99f294c4457f0.yaml @@ -0,0 +1,58 @@ +id: ultimate-member-fd2089a519aca4aa15a99f294c4457f0 + +info: + name: > + Ultimate Member <= 2.6.6 - Privilege Escalation via Arbitrary User Meta Updates + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b0e763e-f03e-41fb-8c6c-4de5d3acae00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-member/" + google-query: inurl:"/wp-content/plugins/ultimate-member/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-member,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-member/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-member" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-noindex-nofollow-tool-349558c766b935473393c8c3c8e1f5f7.yaml b/nuclei-templates/cve-less/plugins/ultimate-noindex-nofollow-tool-349558c766b935473393c8c3c8e1f5f7.yaml new file mode 100644 index 0000000000..3e5859eefd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-noindex-nofollow-tool-349558c766b935473393c8c3c8e1f5f7.yaml @@ -0,0 +1,58 @@ +id: ultimate-noindex-nofollow-tool-349558c766b935473393c8c3c8e1f5f7 + +info: + name: > + Ultimate Noindex Nofollow Tool <= 1.1.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d7ca3ff-eae4-425f-8340-9d9b4952ce4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-noindex-nofollow-tool/" + google-query: inurl:"/wp-content/plugins/ultimate-noindex-nofollow-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-noindex-nofollow-tool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-noindex-nofollow-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-noindex-nofollow-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-noindex-nofollow-tool-ii-4a5a32357411170270407ccbec6bd523.yaml b/nuclei-templates/cve-less/plugins/ultimate-noindex-nofollow-tool-ii-4a5a32357411170270407ccbec6bd523.yaml new file mode 100644 index 0000000000..2e3aeb1be3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-noindex-nofollow-tool-ii-4a5a32357411170270407ccbec6bd523.yaml @@ -0,0 +1,58 @@ +id: ultimate-noindex-nofollow-tool-ii-4a5a32357411170270407ccbec6bd523 + +info: + name: > + Ultimate Noindex Nofollow Tool II <= 1.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7761fe7c-e7f5-4bab-8820-42e6fcabcb2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-noindex-nofollow-tool-ii/" + google-query: inurl:"/wp-content/plugins/ultimate-noindex-nofollow-tool-ii/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-noindex-nofollow-tool-ii,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-noindex-nofollow-tool-ii/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-noindex-nofollow-tool-ii" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-6bd54388aa30b6dc806cb18d7d914f6a.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-6bd54388aa30b6dc806cb18d7d914f6a.yaml new file mode 100644 index 0000000000..baf1bb1df6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-6bd54388aa30b6dc806cb18d7d914f6a.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-6bd54388aa30b6dc806cb18d7d914f6a + +info: + name: > + PostX - Gutenberg Blocks for Post Grid <= 2.4.9 - Unauthorized Access Controls + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b323d910-23f6-41e2-9d64-d60398994996?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-769f278ef7d8854e596567a95f8b276a.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-769f278ef7d8854e596567a95f8b276a.yaml new file mode 100644 index 0000000000..22c96398c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-769f278ef7d8854e596567a95f8b276a.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-769f278ef7d8854e596567a95f8b276a + +info: + name: > + Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX <= 4.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/482bf861-e556-40af-b522-c22ef6c9938b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-93a0069582fa34f4857779b646fe9dc3.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-93a0069582fa34f4857779b646fe9dc3.yaml new file mode 100644 index 0000000000..5d97208bc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-93a0069582fa34f4857779b646fe9dc3.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-93a0069582fa34f4857779b646fe9dc3 + +info: + name: > + PostX Gutenberg Blocks Saved Templates Addon <= 2.4.9 - Private Content Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/830a8e85-6134-4f85-996f-b0cb7ccb9d5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-cd3ebd9e5b8349096037121f145eb200.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-cd3ebd9e5b8349096037121f145eb200.yaml new file mode 100644 index 0000000000..4168a3607b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-cd3ebd9e5b8349096037121f145eb200.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-cd3ebd9e5b8349096037121f145eb200 + +info: + name: > + Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX <= 4.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cce4d44a-4613-4230-ace1-2d26c7c487b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-d5a9675642b3846bb1039f5b8393297a.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-d5a9675642b3846bb1039f5b8393297a.yaml new file mode 100644 index 0000000000..d6fc8f9056 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-d5a9675642b3846bb1039f5b8393297a.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-d5a9675642b3846bb1039f5b8393297a + +info: + name: > + PostX - Gutenberg Blocks for Post Grid <= 2.4.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52b1d515-4965-4ab9-80dd-526b4ebeb3a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-d8c9bea1d4420a5baa6bb9e5a5a7051e.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-d8c9bea1d4420a5baa6bb9e5a5a7051e.yaml new file mode 100644 index 0000000000..674ae90516 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-d8c9bea1d4420a5baa6bb9e5a5a7051e.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-d8c9bea1d4420a5baa6bb9e5a5a7051e + +info: + name: > + PostX - Gutenberg Post Grid Blocks <= 3.0.5 - Reflected Cross-Site Scripting via 'postx_type' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ab2e2ae-6f46-4815-a2d2-407767bfaba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-d9d7cdc24ee2887d8625dc92279b0527.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-d9d7cdc24ee2887d8625dc92279b0527.yaml new file mode 100644 index 0000000000..7ba7a656b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-d9d7cdc24ee2887d8625dc92279b0527.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-d9d7cdc24ee2887d8625dc92279b0527 + +info: + name: > + PostX - Gutenberg Blocks for Post Grid <= 2.4.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b6ac72f-11f4-46bd-a972-fbcb46b34ce6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-e855f3857fc0bf41fee74940fd262c9f.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-e855f3857fc0bf41fee74940fd262c9f.yaml new file mode 100644 index 0000000000..fb874c2445 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-e855f3857fc0bf41fee74940fd262c9f.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-e855f3857fc0bf41fee74940fd262c9f + +info: + name: > + PostX – Gutenberg Blocks for Post Grid <= 3.2.3 - Incorrect Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2fd1bd8-dcc2-4c9a-be3f-b0a58992a239?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-f1550f59a752c11a5990aadbb66d56bb.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-f1550f59a752c11a5990aadbb66d56bb.yaml new file mode 100644 index 0000000000..d9547107d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-f1550f59a752c11a5990aadbb66d56bb.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-f1550f59a752c11a5990aadbb66d56bb + +info: + name: > + PostX – Gutenberg Blocks for Post Grid <= 2.9.9 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0c9f4c5-a4f6-4cab-8531-5b88b3f347ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post/" + google-query: inurl:"/wp-content/plugins/ultimate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-post-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ultimate-post-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..10d8b2a254 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-post-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ultimate-post-kit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-post-kit/" + google-query: inurl:"/wp-content/plugins/ultimate-post-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-post-kit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-post-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-post-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-posts-widget-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/ultimate-posts-widget-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..60a3fd06ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-posts-widget-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: ultimate-posts-widget-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-posts-widget/" + google-query: inurl:"/wp-content/plugins/ultimate-posts-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-posts-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-posts-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-posts-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-posts-widget-36882e902da34c7275792dd2c6fee99b.yaml b/nuclei-templates/cve-less/plugins/ultimate-posts-widget-36882e902da34c7275792dd2c6fee99b.yaml new file mode 100644 index 0000000000..9c46e5eec9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-posts-widget-36882e902da34c7275792dd2c6fee99b.yaml @@ -0,0 +1,58 @@ +id: ultimate-posts-widget-36882e902da34c7275792dd2c6fee99b + +info: + name: > + Ultimate Posts Widget <= 2.3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d21209a7-efed-4526-8dd6-199e0fdf8657?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-posts-widget/" + google-query: inurl:"/wp-content/plugins/ultimate-posts-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-posts-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-posts-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-posts-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-posts-widget-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/ultimate-posts-widget-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..b7d55f9e43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-posts-widget-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: ultimate-posts-widget-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-posts-widget/" + google-query: inurl:"/wp-content/plugins/ultimate-posts-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-posts-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-posts-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-posts-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-posts-widget-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/ultimate-posts-widget-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..4c60d00b30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-posts-widget-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: ultimate-posts-widget-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-posts-widget/" + google-query: inurl:"/wp-content/plugins/ultimate-posts-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-posts-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-posts-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-posts-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-premium-plugin-0a55a8c44319eebd91a4589219732011.yaml b/nuclei-templates/cve-less/plugins/ultimate-premium-plugin-0a55a8c44319eebd91a4589219732011.yaml new file mode 100644 index 0000000000..3247d5bb0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-premium-plugin-0a55a8c44319eebd91a4589219732011.yaml @@ -0,0 +1,58 @@ +id: ultimate-premium-plugin-0a55a8c44319eebd91a4589219732011 + +info: + name: > + USM Premium <= 16.2 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/631fc709-98e8-4655-96fc-c37717705a80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Ultimate-Premium-Plugin/" + google-query: inurl:"/wp-content/plugins/Ultimate-Premium-Plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Ultimate-Premium-Plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Ultimate-Premium-Plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Ultimate-Premium-Plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 16.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-0aceb6e391e9a8017538f79a192451fd.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-0aceb6e391e9a8017538f79a192451fd.yaml new file mode 100644 index 0000000000..98799c3c55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-0aceb6e391e9a8017538f79a192451fd.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-0aceb6e391e9a8017538f79a192451fd + +info: + name: > + Ultimate Product Catalog <= 3.8.1 - Missing Authorization to Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cff84a4-9264-4789-997b-bc11a8bac449?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-1c142e2aa6457c78b7a30e33f81ed033.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-1c142e2aa6457c78b7a30e33f81ed033.yaml new file mode 100644 index 0000000000..c3df0b0307 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-1c142e2aa6457c78b7a30e33f81ed033.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-1c142e2aa6457c78b7a30e33f81ed033 + +info: + name: > + Ultimate Product Catalogue < 3.1.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21930a4f-2f78-42c5-8ffa-2993333db2fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-299e26f66452f89b69cd95a12049938a.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-299e26f66452f89b69cd95a12049938a.yaml new file mode 100644 index 0000000000..652cf634e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-299e26f66452f89b69cd95a12049938a.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-299e26f66452f89b69cd95a12049938a + +info: + name: > + Ultimate Product Catalog <= 4.2.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d216f8ea-2253-475d-9d23-9a83bfa2c21f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-3e1e0e265d4d4fc05de3487796f682db.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-3e1e0e265d4d4fc05de3487796f682db.yaml new file mode 100644 index 0000000000..0dceb2f7d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-3e1e0e265d4d4fc05de3487796f682db.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-3e1e0e265d4d4fc05de3487796f682db + +info: + name: > + Ultimate Product Catalog <= 4.2.22 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/283b10e6-61ae-4e1d-be7b-a63aece6ffda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-50a03dd43db2d419331c54a14051f151.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-50a03dd43db2d419331c54a14051f151.yaml new file mode 100644 index 0000000000..1aa116bd54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-50a03dd43db2d419331c54a14051f151.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-50a03dd43db2d419331c54a14051f151 + +info: + name: > + Ultimate Product Catalog – WordPress Catalog Plugin <= 5.0.25 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffe1eca0-eba0-4b4c-afe5-9bff4aa2f3f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-6ff591cfb79ba4ed5cb37dfcdc90b581.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-6ff591cfb79ba4ed5cb37dfcdc90b581.yaml new file mode 100644 index 0000000000..9cbcc9174c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-6ff591cfb79ba4ed5cb37dfcdc90b581.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-6ff591cfb79ba4ed5cb37dfcdc90b581 + +info: + name: > + Ultimate Product Catalog < 4.2.22 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a30863c5-2e94-4952-b360-856394262023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-7cfd32fcdabda7adb9a40d5e10f1b10f.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-7cfd32fcdabda7adb9a40d5e10f1b10f.yaml new file mode 100644 index 0000000000..f5bf5a17ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-7cfd32fcdabda7adb9a40d5e10f1b10f.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-7cfd32fcdabda7adb9a40d5e10f1b10f + +info: + name: > + Ultimate Product Catalog <= 4.2.21 - Authorization Bypass and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edcc23e0-075a-47e6-979d-7e75eed4337d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-7d8c18514116a3d9cb2fadc12704ae7f.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-7d8c18514116a3d9cb2fadc12704ae7f.yaml new file mode 100644 index 0000000000..0d480f1dc5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-7d8c18514116a3d9cb2fadc12704ae7f.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-7d8c18514116a3d9cb2fadc12704ae7f + +info: + name: > + Ultimate Product Catalog < 4.2.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb4e3b3c-20f4-4591-af0a-539b405d675e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-b03c4c87ff7bab2ae236d29a941caaa0.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-b03c4c87ff7bab2ae236d29a941caaa0.yaml new file mode 100644 index 0000000000..19bc3aab92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-b03c4c87ff7bab2ae236d29a941caaa0.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-b03c4c87ff7bab2ae236d29a941caaa0 + +info: + name: > + Ultimate Product Catalog < 3.1.3 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f2e39b3-c18c-4660-b23d-00790156bc7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-cde26cb38667ced94a7ae59e21d1dd95.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-cde26cb38667ced94a7ae59e21d1dd95.yaml new file mode 100644 index 0000000000..19bec77738 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-cde26cb38667ced94a7ae59e21d1dd95.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-cde26cb38667ced94a7ae59e21d1dd95 + +info: + name: > + Ultimate Product Catalogue <= 5.2.15 - Cross-Site Request Forgery via reset_settings() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68721ded-0a80-4cff-aaf0-59b2fcf67456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-cdfdacefadee3ac15d930a67722d11e2.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-cdfdacefadee3ac15d930a67722d11e2.yaml new file mode 100644 index 0000000000..7b68d7106b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-cdfdacefadee3ac15d930a67722d11e2.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-cdfdacefadee3ac15d930a67722d11e2 + +info: + name: > + Ultimate Product Catalog <= 5.2.5 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/288559f0-eab6-4933-a026-8413476af6eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-f9aadb3cdc138771a95f01e67d7ac253.yaml b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-f9aadb3cdc138771a95f01e67d7ac253.yaml new file mode 100644 index 0000000000..b2d91c45f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-product-catalogue-f9aadb3cdc138771a95f01e67d7ac253.yaml @@ -0,0 +1,58 @@ +id: ultimate-product-catalogue-f9aadb3cdc138771a95f01e67d7ac253 + +info: + name: > + Ultimate Product Catalog < 2.1.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1419f089-7656-43a1-aeee-c33eef604c84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-product-catalogue/" + google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-product-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-product-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-profile-builder-2efc0981a055a3e602c4cd88e853b098.yaml b/nuclei-templates/cve-less/plugins/ultimate-profile-builder-2efc0981a055a3e602c4cd88e853b098.yaml new file mode 100644 index 0000000000..92a99c636a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-profile-builder-2efc0981a055a3e602c4cd88e853b098.yaml @@ -0,0 +1,58 @@ +id: ultimate-profile-builder-2efc0981a055a3e602c4cd88e853b098 + +info: + name: > + Ultimate Profile Builder < 3.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/868bbe8c-6d21-4d4b-ae23-e08dfb7a1277?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-profile-builder/" + google-query: inurl:"/wp-content/plugins/ultimate-profile-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-profile-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-profile-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-profile-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-responsive-image-slider-5ed7439fdc6a179319e68a6091db0e8d.yaml b/nuclei-templates/cve-less/plugins/ultimate-responsive-image-slider-5ed7439fdc6a179319e68a6091db0e8d.yaml new file mode 100644 index 0000000000..7465d0b05d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-responsive-image-slider-5ed7439fdc6a179319e68a6091db0e8d.yaml @@ -0,0 +1,58 @@ +id: ultimate-responsive-image-slider-5ed7439fdc6a179319e68a6091db0e8d + +info: + name: > + Ultimate Responsive Image Slider <= 3.5.11 - Missing Authorization via AJAX action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c92beb0-1fcf-4352-bd34-00e31b265c04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-responsive-image-slider/" + google-query: inurl:"/wp-content/plugins/ultimate-responsive-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-responsive-image-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-responsive-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-responsive-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-reviews-708bf4cdcd042a35006425f5ea7145d1.yaml b/nuclei-templates/cve-less/plugins/ultimate-reviews-708bf4cdcd042a35006425f5ea7145d1.yaml new file mode 100644 index 0000000000..721ff0a5bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-reviews-708bf4cdcd042a35006425f5ea7145d1.yaml @@ -0,0 +1,58 @@ +id: ultimate-reviews-708bf4cdcd042a35006425f5ea7145d1 + +info: + name: > + Ultimate Reviews < 2.1.33 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db30acd7-ce51-45d9-8ff0-6ceea8237a8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-reviews/" + google-query: inurl:"/wp-content/plugins/ultimate-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-reviews,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-reviews-9cac9db84fd0e9e4554d820862a40ccc.yaml b/nuclei-templates/cve-less/plugins/ultimate-reviews-9cac9db84fd0e9e4554d820862a40ccc.yaml new file mode 100644 index 0000000000..b9ec68d269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-reviews-9cac9db84fd0e9e4554d820862a40ccc.yaml @@ -0,0 +1,58 @@ +id: ultimate-reviews-9cac9db84fd0e9e4554d820862a40ccc + +info: + name: > + Ultimate Reviews <= 3.0.15 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e889182-f02f-4b6b-bb98-357fadae3dc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-reviews/" + google-query: inurl:"/wp-content/plugins/ultimate-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-reviews-c2f057b1286b0479a330a6cf26c60c67.yaml b/nuclei-templates/cve-less/plugins/ultimate-reviews-c2f057b1286b0479a330a6cf26c60c67.yaml new file mode 100644 index 0000000000..58b127eddf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-reviews-c2f057b1286b0479a330a6cf26c60c67.yaml @@ -0,0 +1,58 @@ +id: ultimate-reviews-c2f057b1286b0479a330a6cf26c60c67 + +info: + name: > + Ultimate Reviews <= 3.2.8 - Unauthenticated stored Cross-Site Scripting via reviews + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69e15a1b-4984-4889-8c57-a731a0334963?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-reviews/" + google-query: inurl:"/wp-content/plugins/ultimate-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-sms-notifications-7e5407bb7184b7940282a0b93fde7bc8.yaml b/nuclei-templates/cve-less/plugins/ultimate-sms-notifications-7e5407bb7184b7940282a0b93fde7bc8.yaml new file mode 100644 index 0000000000..fd6ebbf06f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-sms-notifications-7e5407bb7184b7940282a0b93fde7bc8.yaml @@ -0,0 +1,58 @@ +id: ultimate-sms-notifications-7e5407bb7184b7940282a0b93fde7bc8 + +info: + name: > + Ultimate SMS Notifications for WooCommerce <= 1.4.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b3df470-d0b7-49e8-bcb2-ac999e0b71d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-sms-notifications/" + google-query: inurl:"/wp-content/plugins/ultimate-sms-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-sms-notifications,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-sms-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-sms-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-0e6b771f58abc47bc1cd00cdb88a6b13.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-0e6b771f58abc47bc1cd00cdb88a6b13.yaml new file mode 100644 index 0000000000..ad2ef433ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-0e6b771f58abc47bc1cd00cdb88a6b13.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-0e6b771f58abc47bc1cd00cdb88a6b13 + +info: + name: > + Social Media & Share Icons <= 2.8.1 - Missing Authorization via handle_installation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bfb5d34-738d-4842-be93-9668fceb3334?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-18e30a879d28e13fe4c17653ed1fbf81.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-18e30a879d28e13fe4c17653ed1fbf81.yaml new file mode 100644 index 0000000000..d065f7a037 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-18e30a879d28e13fe4c17653ed1fbf81.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-18e30a879d28e13fe4c17653ed1fbf81 + +info: + name: > + Social Media Share Buttons & Social Sharing Icons <= 2.8.5 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e43c5b-a094-44ab-a8a3-52d437f0e00d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..b394fd44c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-2c0845cf5ef92a44ab74f2dd40912af0.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-2c0845cf5ef92a44ab74f2dd40912af0.yaml new file mode 100644 index 0000000000..9648e49795 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-2c0845cf5ef92a44ab74f2dd40912af0.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-2c0845cf5ef92a44ab74f2dd40912af0 + +info: + name: > + Social Media Share Buttons & Social Sharing Icons <= 1.5.1 - Arbitrary Options Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86167b8c-6d4e-495d-96f7-8cda8e2c80b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-3744994d57ee508f70c6a9f678c510bd.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-3744994d57ee508f70c6a9f678c510bd.yaml new file mode 100644 index 0000000000..05cb130d8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-3744994d57ee508f70c6a9f678c510bd.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-3744994d57ee508f70c6a9f678c510bd + +info: + name: > + Social Media & Share Icons <= 2.8.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a8998db-ffc2-40b2-a191-09380984adac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-50ee1df3b648d8ffe7c8bf72d2de42cd.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-50ee1df3b648d8ffe7c8bf72d2de42cd.yaml new file mode 100644 index 0000000000..b5d9063ab0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-50ee1df3b648d8ffe7c8bf72d2de42cd.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-50ee1df3b648d8ffe7c8bf72d2de42cd + +info: + name: > + Social Media Share Buttons & Social Sharing Icons <= 2.8.1 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cf2013a-d403-456f-aeb4-46b6e00b057f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-87dbe2addf6a62fa336594e2b679e9d7.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-87dbe2addf6a62fa336594e2b679e9d7.yaml new file mode 100644 index 0000000000..d832e7e5ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-87dbe2addf6a62fa336594e2b679e9d7.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-87dbe2addf6a62fa336594e2b679e9d7 + +info: + name: > + Social Media Share Buttons <= 2.8.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e01fd891-631e-47df-9f29-f3d4d5afa02f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-b3e3aaaac8096f0ab040a4994ceb701a.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-b3e3aaaac8096f0ab040a4994ceb701a.yaml new file mode 100644 index 0000000000..d2d4b461ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-b3e3aaaac8096f0ab040a4994ceb701a.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-b3e3aaaac8096f0ab040a4994ceb701a + +info: + name: > + Social Media Share Buttons & Social Sharing Icons <= 2.8.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d44a45fb-3bff-4a1f-8319-a58a47a9d76b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-baba5d57c66f94a59676f999b229ed40.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-baba5d57c66f94a59676f999b229ed40.yaml new file mode 100644 index 0000000000..0e162a12fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-baba5d57c66f94a59676f999b229ed40.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-baba5d57c66f94a59676f999b229ed40 + +info: + name: > + Social Media Share Buttons & Social Sharing Icons < 1.1.1.12 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0d79ae1-e9e4-4798-aa29-519b80759be6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..fd9e2e81e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-f2357db60079c2fc441be42e2dc1b954.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-f2357db60079c2fc441be42e2dc1b954.yaml new file mode 100644 index 0000000000..182202c73b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-f2357db60079c2fc441be42e2dc1b954.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-f2357db60079c2fc441be42e2dc1b954 + +info: + name: > + Social Media Share Buttons & Social Sharing Icons <= 1.2.1 - Unspecified Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f771cf62-3aa9-472e-beb5-011a4f28e335?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-fbb313009acd3079ce8680fb05b3abe6.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-fbb313009acd3079ce8680fb05b3abe6.yaml new file mode 100644 index 0000000000..756bbbd662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-icons-fbb313009acd3079ce8680fb05b3abe6.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-icons-fbb313009acd3079ce8680fb05b3abe6 + +info: + name: > + Social Media Share Buttons & Social Sharing Icons <= 2.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b09c98f2-6492-41e1-8d87-e10ed2ef5f9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..3bb296770a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-plus-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-plus/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..eba2bce66c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-plus-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-plus/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..c5631873f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-plus-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-plus/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..2f52f4061d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-plus-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-plus/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-ea8ebad551118883e1feafe80a786b1f.yaml b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-ea8ebad551118883e1feafe80a786b1f.yaml new file mode 100644 index 0000000000..3773a98cda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-social-media-plus-ea8ebad551118883e1feafe80a786b1f.yaml @@ -0,0 +1,58 @@ +id: ultimate-social-media-plus-ea8ebad551118883e1feafe80a786b1f + +info: + name: > + Social Share Icons & Social Share Buttons <= 3.6.2 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cce13008-a0f8-458f-ade5-450d0dcc966a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-plus/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-store-kit-dd1f48796d4f00ba40c7555318c798d9.yaml b/nuclei-templates/cve-less/plugins/ultimate-store-kit-dd1f48796d4f00ba40c7555318c798d9.yaml new file mode 100644 index 0000000000..eca3940cd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-store-kit-dd1f48796d4f00ba40c7555318c798d9.yaml @@ -0,0 +1,58 @@ +id: ultimate-store-kit-dd1f48796d4f00ba40c7555318c798d9 + +info: + name: > + Ultimate Store Kit Elementor Addons <= 1.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea630be6-16f8-4d93-ae27-8a29f82c5db9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-store-kit/" + google-query: inurl:"/wp-content/plugins/ultimate-store-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-store-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-store-kit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-store-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-tables-f75d5e3e7f3e99d9ce25d5222799613b.yaml b/nuclei-templates/cve-less/plugins/ultimate-tables-f75d5e3e7f3e99d9ce25d5222799613b.yaml new file mode 100644 index 0000000000..8903dd483b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-tables-f75d5e3e7f3e99d9ce25d5222799613b.yaml @@ -0,0 +1,58 @@ +id: ultimate-tables-f75d5e3e7f3e99d9ce25d5222799613b + +info: + name: > + ULTIMATE TABLES <= 1.6.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eeb6df1-9857-47a2-ad7d-f1eb082e9448?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-tables/" + google-query: inurl:"/wp-content/plugins/ultimate-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-taxonomy-manager-4ebf29f3b4a848c6cc95b046c1f56126.yaml b/nuclei-templates/cve-less/plugins/ultimate-taxonomy-manager-4ebf29f3b4a848c6cc95b046c1f56126.yaml new file mode 100644 index 0000000000..30db656441 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-taxonomy-manager-4ebf29f3b4a848c6cc95b046c1f56126.yaml @@ -0,0 +1,58 @@ +id: ultimate-taxonomy-manager-4ebf29f3b4a848c6cc95b046c1f56126 + +info: + name: > + XYDAC Ultimate Taxonomy Manager <= 2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4baf39fd-4191-47eb-9b37-cdf290d6345b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-taxonomy-manager/" + google-query: inurl:"/wp-content/plugins/ultimate-taxonomy-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-taxonomy-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-taxonomy-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-taxonomy-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-taxonomy-manager-b8296fd7e9d3d8c36b36cd4afd336fd3.yaml b/nuclei-templates/cve-less/plugins/ultimate-taxonomy-manager-b8296fd7e9d3d8c36b36cd4afd336fd3.yaml new file mode 100644 index 0000000000..f283c1f392 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-taxonomy-manager-b8296fd7e9d3d8c36b36cd4afd336fd3.yaml @@ -0,0 +1,58 @@ +id: ultimate-taxonomy-manager-b8296fd7e9d3d8c36b36cd4afd336fd3 + +info: + name: > + Ultimate Taxonomy Manager <= 2.0 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06f56834-e1e9-4a02-988a-df4c563182c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-taxonomy-manager/" + google-query: inurl:"/wp-content/plugins/ultimate-taxonomy-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-taxonomy-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-taxonomy-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-taxonomy-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-tinymce-f63b14eb213bbc6239ffa4f4e582cbbd.yaml b/nuclei-templates/cve-less/plugins/ultimate-tinymce-f63b14eb213bbc6239ffa4f4e582cbbd.yaml new file mode 100644 index 0000000000..1d95194c44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-tinymce-f63b14eb213bbc6239ffa4f4e582cbbd.yaml @@ -0,0 +1,58 @@ +id: ultimate-tinymce-f63b14eb213bbc6239ffa4f4e582cbbd + +info: + name: > + Ultimate TinyMCE < 3.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e4c0500-9081-446e-b34b-968c718dfce0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-tinymce/" + google-query: inurl:"/wp-content/plugins/ultimate-tinymce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-tinymce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-tinymce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-tinymce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-under-construction-4d6b9908316d738d104a51fdd9ba9967.yaml b/nuclei-templates/cve-less/plugins/ultimate-under-construction-4d6b9908316d738d104a51fdd9ba9967.yaml new file mode 100644 index 0000000000..91027b7cdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-under-construction-4d6b9908316d738d104a51fdd9ba9967.yaml @@ -0,0 +1,58 @@ +id: ultimate-under-construction-4d6b9908316d738d104a51fdd9ba9967 + +info: + name: > + Ultimate Under Construction <= 1.9.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdbd089d-1b7d-42e9-8f47-fec19a4dd7c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-under-construction/" + google-query: inurl:"/wp-content/plugins/ultimate-under-construction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-under-construction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-under-construction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-under-construction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-weather-plugin-6dfcf8980861ee5739e5b83eb5156f9e.yaml b/nuclei-templates/cve-less/plugins/ultimate-weather-plugin-6dfcf8980861ee5739e5b83eb5156f9e.yaml new file mode 100644 index 0000000000..35a29c8533 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-weather-plugin-6dfcf8980861ee5739e5b83eb5156f9e.yaml @@ -0,0 +1,58 @@ +id: ultimate-weather-plugin-6dfcf8980861ee5739e5b83eb5156f9e + +info: + name: > + Local Weather <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2da9c3d0-7efb-4c34-bf31-2f17a52c21f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-weather-plugin/" + google-query: inurl:"/wp-content/plugins/ultimate-weather-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-weather-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-weather-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-weather-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-widgets-light-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ultimate-widgets-light-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1103b16aeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-widgets-light-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ultimate-widgets-light-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-widgets-light/" + google-query: inurl:"/wp-content/plugins/ultimate-widgets-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-widgets-light,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-widgets-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-widgets-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-widgets-light-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/ultimate-widgets-light-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..3bc4bea2ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-widgets-light-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: ultimate-widgets-light-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-widgets-light/" + google-query: inurl:"/wp-content/plugins/ultimate-widgets-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-widgets-light,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-widgets-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-widgets-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate-wp-query-search-filter-f48aa8ce150f50f9f99d4d22650a952e.yaml b/nuclei-templates/cve-less/plugins/ultimate-wp-query-search-filter-f48aa8ce150f50f9f99d4d22650a952e.yaml new file mode 100644 index 0000000000..1290ba0c87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate-wp-query-search-filter-f48aa8ce150f50f9f99d4d22650a952e.yaml @@ -0,0 +1,58 @@ +id: ultimate-wp-query-search-filter-f48aa8ce150f50f9f99d4d22650a952e + +info: + name: > + Ultimate WP Query Search Filter <= 1.0.10 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ef0c46-5765-458e-80c0-ecfc6ead6df6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-wp-query-search-filter/" + google-query: inurl:"/wp-content/plugins/ultimate-wp-query-search-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-wp-query-search-filter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-wp-query-search-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-wp-query-search-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate_vc_addons-1dd6b9575ac3d36dc5c340f7191b2a11.yaml b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-1dd6b9575ac3d36dc5c340f7191b2a11.yaml new file mode 100644 index 0000000000..cf55d23b52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-1dd6b9575ac3d36dc5c340f7191b2a11.yaml @@ -0,0 +1,58 @@ +id: ultimate_vc_addons-1dd6b9575ac3d36dc5c340f7191b2a11 + +info: + name: > + Ultimate Addons for WPBakery <= 3.19.17 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ece4eca1-9dc1-4f17-92e4-8b2e3e1a7306?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Ultimate_VC_Addons/" + google-query: inurl:"/wp-content/plugins/Ultimate_VC_Addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Ultimate_VC_Addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Ultimate_VC_Addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Ultimate_VC_Addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate_vc_addons-42a6391e7ed0fe5a4ef825a270130c8a.yaml b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-42a6391e7ed0fe5a4ef825a270130c8a.yaml new file mode 100644 index 0000000000..6172111c5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-42a6391e7ed0fe5a4ef825a270130c8a.yaml @@ -0,0 +1,58 @@ +id: ultimate_vc_addons-42a6391e7ed0fe5a4ef825a270130c8a + +info: + name: > + Ultimate Addons for WPBakery Page Builder <= 3.19.14 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90a8230f-7008-48af-a1a9-fbaf38dcb21c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Ultimate_VC_Addons/" + google-query: inurl:"/wp-content/plugins/Ultimate_VC_Addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Ultimate_VC_Addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Ultimate_VC_Addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Ultimate_VC_Addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate_vc_addons-86920ea2244bf931a0a9455591658b64.yaml b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-86920ea2244bf931a0a9455591658b64.yaml new file mode 100644 index 0000000000..711d5dfc79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-86920ea2244bf931a0a9455591658b64.yaml @@ -0,0 +1,58 @@ +id: ultimate_vc_addons-86920ea2244bf931a0a9455591658b64 + +info: + name: > + Ultimate Addons for WPBakery <= 3.16.11 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b48cae6-254c-4882-a464-3a44a63cadf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Ultimate_VC_Addons/" + google-query: inurl:"/wp-content/plugins/Ultimate_VC_Addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Ultimate_VC_Addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Ultimate_VC_Addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Ultimate_VC_Addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.16.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate_vc_addons-97e102e48e3400c8c2827b76216fe5ac.yaml b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-97e102e48e3400c8c2827b76216fe5ac.yaml new file mode 100644 index 0000000000..dd769d719f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-97e102e48e3400c8c2827b76216fe5ac.yaml @@ -0,0 +1,58 @@ +id: ultimate_vc_addons-97e102e48e3400c8c2827b76216fe5ac + +info: + name: > + Ultimate Addons for WPBakery <= 3.16.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/910d98a3-bfdb-4bb9-bd24-c57fa1a1a107?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Ultimate_VC_Addons/" + google-query: inurl:"/wp-content/plugins/Ultimate_VC_Addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Ultimate_VC_Addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Ultimate_VC_Addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Ultimate_VC_Addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.16.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimate_vc_addons-c12fe9671d21c1c91257ccad7444bd6a.yaml b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-c12fe9671d21c1c91257ccad7444bd6a.yaml new file mode 100644 index 0000000000..f179a823d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimate_vc_addons-c12fe9671d21c1c91257ccad7444bd6a.yaml @@ -0,0 +1,58 @@ +id: ultimate_vc_addons-c12fe9671d21c1c91257ccad7444bd6a + +info: + name: > + Ultimate Addons for WPBakery Page Builder <= 3.19.14 - Authenticated(Contributor+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5222ce69-ac9f-4bb0-9832-8cdff1f8b078?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/Ultimate_VC_Addons/" + google-query: inurl:"/wp-content/plugins/Ultimate_VC_Addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,Ultimate_VC_Addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/Ultimate_VC_Addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Ultimate_VC_Addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimatewoo-6717e2739d81d19391ed1a7f5eb33e10.yaml b/nuclei-templates/cve-less/plugins/ultimatewoo-6717e2739d81d19391ed1a7f5eb33e10.yaml new file mode 100644 index 0000000000..bb5c8edc78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimatewoo-6717e2739d81d19391ed1a7f5eb33e10.yaml @@ -0,0 +1,58 @@ +id: ultimatewoo-6717e2739d81d19391ed1a7f5eb33e10 + +info: + name: > + UltimateWoo – The Ultimate WooCommerce Plugin with Unlimited Usage <= 0.1.10 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53580b24-c0a7-4578-bb11-5952ebcacc42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimatewoo/" + google-query: inurl:"/wp-content/plugins/ultimatewoo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimatewoo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimatewoo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimatewoo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimeter-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ultimeter-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c0481d66e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimeter-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ultimeter-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimeter/" + google-query: inurl:"/wp-content/plugins/ultimeter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimeter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimeter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimeter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultimeter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/ultimeter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..c8a3f0e61a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultimeter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: ultimeter-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimeter/" + google-query: inurl:"/wp-content/plugins/ultimeter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimeter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimeter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimeter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultra-companion-c2d16b936c79c5f7cc118ed34032bc44.yaml b/nuclei-templates/cve-less/plugins/ultra-companion-c2d16b936c79c5f7cc118ed34032bc44.yaml new file mode 100644 index 0000000000..7980b8a4e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultra-companion-c2d16b936c79c5f7cc118ed34032bc44.yaml @@ -0,0 +1,58 @@ +id: ultra-companion-c2d16b936c79c5f7cc118ed34032bc44 + +info: + name: > + Ultra Companion <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3639d0a6-6d9f-4f3e-bb25-85d4eb40b547?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultra-companion/" + google-query: inurl:"/wp-content/plugins/ultra-companion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultra-companion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultra-companion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultra-companion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ultra-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ultra-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4d2484cffa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ultra-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ultra-elementor-addons-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultra-elementor-addons/" + google-query: inurl:"/wp-content/plugins/ultra-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultra-elementor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultra-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultra-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncanny-automator-2ee8042813603dca155007c66d9f6e42.yaml b/nuclei-templates/cve-less/plugins/uncanny-automator-2ee8042813603dca155007c66d9f6e42.yaml new file mode 100644 index 0000000000..b203bf9ba1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncanny-automator-2ee8042813603dca155007c66d9f6e42.yaml @@ -0,0 +1,58 @@ +id: uncanny-automator-2ee8042813603dca155007c66d9f6e42 + +info: + name: > + Uncanny Automator <= 5.1.0.2 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5098e74a-9a99-48b3-9f44-b780bfdeb24e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncanny-automator/" + google-query: inurl:"/wp-content/plugins/uncanny-automator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncanny-automator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncanny-automator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncanny-automator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncanny-automator-bece17e1f0cb0904484a2c28333a822a.yaml b/nuclei-templates/cve-less/plugins/uncanny-automator-bece17e1f0cb0904484a2c28333a822a.yaml new file mode 100644 index 0000000000..d89febb0c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncanny-automator-bece17e1f0cb0904484a2c28333a822a.yaml @@ -0,0 +1,58 @@ +id: uncanny-automator-bece17e1f0cb0904484a2c28333a822a + +info: + name: > + Uncanny Automator <= 4.14 - Cross-Site Request Forgery via update_automator_connect + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd0d8661-4725-41dd-88ce-8e94e285d5b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncanny-automator/" + google-query: inurl:"/wp-content/plugins/uncanny-automator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncanny-automator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncanny-automator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncanny-automator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-05449252a81a55fa1aedbb41d626d3a8.yaml b/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-05449252a81a55fa1aedbb41d626d3a8.yaml new file mode 100644 index 0000000000..2529e6a82c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-05449252a81a55fa1aedbb41d626d3a8.yaml @@ -0,0 +1,58 @@ +id: uncanny-learndash-toolkit-05449252a81a55fa1aedbb41d626d3a8 + +info: + name: > + Uncanny Toolkit for LearnDash <= 3.6.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61992821-a053-4bc6-853a-1a826d096746?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncanny-learndash-toolkit/" + google-query: inurl:"/wp-content/plugins/uncanny-learndash-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncanny-learndash-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncanny-learndash-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncanny-learndash-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-66d45612d48c50a420406488ffbcd2d8.yaml b/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-66d45612d48c50a420406488ffbcd2d8.yaml new file mode 100644 index 0000000000..6ebe58bedc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-66d45612d48c50a420406488ffbcd2d8.yaml @@ -0,0 +1,58 @@ +id: uncanny-learndash-toolkit-66d45612d48c50a420406488ffbcd2d8 + +info: + name: > + Uncanny Toolkit for LearnDash <= 3.6.4.3 - Missing Authorization via review-banner-visibility REST route + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdaa7450-3b51-470d-8903-52fd1d4215a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncanny-learndash-toolkit/" + google-query: inurl:"/wp-content/plugins/uncanny-learndash-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncanny-learndash-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncanny-learndash-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncanny-learndash-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-a75e8600265672ffbfe8fc90d6a06636.yaml b/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-a75e8600265672ffbfe8fc90d6a06636.yaml new file mode 100644 index 0000000000..d9804cf55d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-a75e8600265672ffbfe8fc90d6a06636.yaml @@ -0,0 +1,58 @@ +id: uncanny-learndash-toolkit-a75e8600265672ffbfe8fc90d6a06636 + +info: + name: > + Uncanny Toolkit for LearnDash <= 3.6.4.1 - Cross-Site Request Forgery to Arbitrary Plugin Install and Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ea4ca2d-6a67-43ad-817d-960cad3030b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncanny-learndash-toolkit/" + google-query: inurl:"/wp-content/plugins/uncanny-learndash-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncanny-learndash-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncanny-learndash-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncanny-learndash-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-c6423cfe94699f968f30f91786e41914.yaml b/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-c6423cfe94699f968f30f91786e41914.yaml new file mode 100644 index 0000000000..2dde8b5f31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncanny-learndash-toolkit-c6423cfe94699f968f30f91786e41914.yaml @@ -0,0 +1,58 @@ +id: uncanny-learndash-toolkit-c6423cfe94699f968f30f91786e41914 + +info: + name: > + Uncanny Toolkit for LearnDash <= 3.6.4.3 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66e5a569-1dd5-40e9-8356-d7c82c8e30ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncanny-learndash-toolkit/" + google-query: inurl:"/wp-content/plugins/uncanny-learndash-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncanny-learndash-toolkit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncanny-learndash-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncanny-learndash-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncode-core-0aa92524ef3f479006bf6a6cae10326a.yaml b/nuclei-templates/cve-less/plugins/uncode-core-0aa92524ef3f479006bf6a6cae10326a.yaml new file mode 100644 index 0000000000..a383bf8491 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncode-core-0aa92524ef3f479006bf6a6cae10326a.yaml @@ -0,0 +1,58 @@ +id: uncode-core-0aa92524ef3f479006bf6a6cae10326a + +info: + name: > + Uncode Core <= 2.8.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4efe60a-d8e3-4e51-95b2-246e30e90e89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncode-core/" + google-query: inurl:"/wp-content/plugins/uncode-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncode-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncode-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncode-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncode-core-7a2fa40c9c3153d28c4763e5656c59b8.yaml b/nuclei-templates/cve-less/plugins/uncode-core-7a2fa40c9c3153d28c4763e5656c59b8.yaml new file mode 100644 index 0000000000..f5ee89c233 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncode-core-7a2fa40c9c3153d28c4763e5656c59b8.yaml @@ -0,0 +1,58 @@ +id: uncode-core-7a2fa40c9c3153d28c4763e5656c59b8 + +info: + name: > + Uncode Core <= 2.8.8 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5e6767-d0a9-4ac4-816f-6fb57b1e5f9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncode-core/" + google-query: inurl:"/wp-content/plugins/uncode-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncode-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncode-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncode-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uncode-core-9ed7e89f3675608a54d511e5410f33f1.yaml b/nuclei-templates/cve-less/plugins/uncode-core-9ed7e89f3675608a54d511e5410f33f1.yaml new file mode 100644 index 0000000000..c3c1a49f36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uncode-core-9ed7e89f3675608a54d511e5410f33f1.yaml @@ -0,0 +1,58 @@ +id: uncode-core-9ed7e89f3675608a54d511e5410f33f1 + +info: + name: > + Uncode Core <= 2.8.8 - Authenticated (Subscriber+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74ab025d-4e76-46e5-b8f8-963eeea5b802?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uncode-core/" + google-query: inurl:"/wp-content/plugins/uncode-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uncode-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uncode-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncode-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unconfirmed-a24ad83ed56eb98da964ec89f37324d1.yaml b/nuclei-templates/cve-less/plugins/unconfirmed-a24ad83ed56eb98da964ec89f37324d1.yaml new file mode 100644 index 0000000000..812bf70eda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unconfirmed-a24ad83ed56eb98da964ec89f37324d1.yaml @@ -0,0 +1,58 @@ +id: unconfirmed-a24ad83ed56eb98da964ec89f37324d1 + +info: + name: > + Unconfirmed < 1.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62128061-1ecc-484c-a054-4925f9ac6105?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unconfirmed/" + google-query: inurl:"/wp-content/plugins/unconfirmed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unconfirmed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unconfirmed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unconfirmed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/under-construction-maintenance-mode-1a77d096fd122735e7059db4ae2493a4.yaml b/nuclei-templates/cve-less/plugins/under-construction-maintenance-mode-1a77d096fd122735e7059db4ae2493a4.yaml new file mode 100644 index 0000000000..d15041716c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/under-construction-maintenance-mode-1a77d096fd122735e7059db4ae2493a4.yaml @@ -0,0 +1,58 @@ +id: under-construction-maintenance-mode-1a77d096fd122735e7059db4ae2493a4 + +info: + name: > + Under Construction, Coming Soon & Maintenance Mode <= 1.1.1 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f6b88fb-1070-427b-a51f-23fbede3dd59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/under-construction-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/under-construction-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,under-construction-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/under-construction-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "under-construction-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/under-construction-maintenance-mode-98a55f47607149620a63e3a8f43662c3.yaml b/nuclei-templates/cve-less/plugins/under-construction-maintenance-mode-98a55f47607149620a63e3a8f43662c3.yaml new file mode 100644 index 0000000000..c3ebcd2965 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/under-construction-maintenance-mode-98a55f47607149620a63e3a8f43662c3.yaml @@ -0,0 +1,58 @@ +id: under-construction-maintenance-mode-98a55f47607149620a63e3a8f43662c3 + +info: + name: > + Under Construction, Coming Soon & Maintenance Mode <= 1.1.1 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86c1b729-e8fe-46e8-8d57-c6312087c6b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/under-construction-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/under-construction-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,under-construction-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/under-construction-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "under-construction-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/under-construction-page-74c4f31916c7f5bc337751afa8a7f10e.yaml b/nuclei-templates/cve-less/plugins/under-construction-page-74c4f31916c7f5bc337751afa8a7f10e.yaml new file mode 100644 index 0000000000..b0b14844d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/under-construction-page-74c4f31916c7f5bc337751afa8a7f10e.yaml @@ -0,0 +1,58 @@ +id: under-construction-page-74c4f31916c7f5bc337751afa8a7f10e + +info: + name: > + Under Construction <= 3.96 - Cross-Site Request Forgery via admin_action_ucp_dismiss_notice + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/031a1203-6b0d-453b-be8a-12e7f55cb401?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/under-construction-page/" + google-query: inurl:"/wp-content/plugins/under-construction-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,under-construction-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/under-construction-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "under-construction-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/under-construction-page-88940c0e9fa7615075a5fc8e9bc16c56.yaml b/nuclei-templates/cve-less/plugins/under-construction-page-88940c0e9fa7615075a5fc8e9bc16c56.yaml new file mode 100644 index 0000000000..e5d31e6313 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/under-construction-page-88940c0e9fa7615075a5fc8e9bc16c56.yaml @@ -0,0 +1,58 @@ +id: under-construction-page-88940c0e9fa7615075a5fc8e9bc16c56 + +info: + name: > + Under Construction <= 3.96 - Cross-Site Request Forgery via admin_action_install_weglot + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fa84388-3597-4a54-9ae8-d6e04afe9061?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/under-construction-page/" + google-query: inurl:"/wp-content/plugins/under-construction-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,under-construction-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/under-construction-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "under-construction-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/under-construction-page-c8d3a5bffd1b0c28a6e17cfdad5deb52.yaml b/nuclei-templates/cve-less/plugins/under-construction-page-c8d3a5bffd1b0c28a6e17cfdad5deb52.yaml new file mode 100644 index 0000000000..716f0eb515 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/under-construction-page-c8d3a5bffd1b0c28a6e17cfdad5deb52.yaml @@ -0,0 +1,58 @@ +id: under-construction-page-c8d3a5bffd1b0c28a6e17cfdad5deb52 + +info: + name: > + Under Construction <= 3.85 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5df75f8-1250-4b79-a796-9146d3037bec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/under-construction-page/" + google-query: inurl:"/wp-content/plugins/under-construction-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,under-construction-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/under-construction-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "under-construction-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.85') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/underconstruction-0e39d853b3d4654c80796b1245bb017e.yaml b/nuclei-templates/cve-less/plugins/underconstruction-0e39d853b3d4654c80796b1245bb017e.yaml new file mode 100644 index 0000000000..4d62aceb23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/underconstruction-0e39d853b3d4654c80796b1245bb017e.yaml @@ -0,0 +1,58 @@ +id: underconstruction-0e39d853b3d4654c80796b1245bb017e + +info: + name: > + underConstruction < 1.09 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90bab2a1-7c19-45d2-909f-05014fb24740?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/underconstruction/" + google-query: inurl:"/wp-content/plugins/underconstruction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,underconstruction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/underconstruction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "underconstruction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.09') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/underconstruction-49a29c208dcdf8c767e242ee9b07c664.yaml b/nuclei-templates/cve-less/plugins/underconstruction-49a29c208dcdf8c767e242ee9b07c664.yaml new file mode 100644 index 0000000000..3b23265518 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/underconstruction-49a29c208dcdf8c767e242ee9b07c664.yaml @@ -0,0 +1,58 @@ +id: underconstruction-49a29c208dcdf8c767e242ee9b07c664 + +info: + name: > + underConstruction <= 1.19 - Cross-Site Request Forgery to Construction Mode Disabled + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da9b1132-fb02-443d-8d56-9e89658aad89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/underconstruction/" + google-query: inurl:"/wp-content/plugins/underconstruction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,underconstruction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/underconstruction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "underconstruction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/underconstruction-52197fd3d372d9ca3330b7fb6abe6c1e.yaml b/nuclei-templates/cve-less/plugins/underconstruction-52197fd3d372d9ca3330b7fb6abe6c1e.yaml new file mode 100644 index 0000000000..692a7d3ec0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/underconstruction-52197fd3d372d9ca3330b7fb6abe6c1e.yaml @@ -0,0 +1,58 @@ +id: underconstruction-52197fd3d372d9ca3330b7fb6abe6c1e + +info: + name: > + underConstruction <= 1.20 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/045717f4-0e31-41f8-b0c3-8118c768b648?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/underconstruction/" + google-query: inurl:"/wp-content/plugins/underconstruction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,underconstruction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/underconstruction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "underconstruction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/underconstruction-8f08fc8519e9426e0c9c0ec2b77bcf6d.yaml b/nuclei-templates/cve-less/plugins/underconstruction-8f08fc8519e9426e0c9c0ec2b77bcf6d.yaml new file mode 100644 index 0000000000..80d8a60b33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/underconstruction-8f08fc8519e9426e0c9c0ec2b77bcf6d.yaml @@ -0,0 +1,58 @@ +id: underconstruction-8f08fc8519e9426e0c9c0ec2b77bcf6d + +info: + name: > + underConstruction <= 1.18 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/059e5358-6a29-4cae-96b4-23897797b367?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/underconstruction/" + google-query: inurl:"/wp-content/plugins/underconstruction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,underconstruction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/underconstruction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "underconstruction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/underconstruction-931565033fc7a18f04b3f4a474f02d5f.yaml b/nuclei-templates/cve-less/plugins/underconstruction-931565033fc7a18f04b3f4a474f02d5f.yaml new file mode 100644 index 0000000000..a41c040b81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/underconstruction-931565033fc7a18f04b3f4a474f02d5f.yaml @@ -0,0 +1,58 @@ +id: underconstruction-931565033fc7a18f04b3f4a474f02d5f + +info: + name: > + underConstruction <= 1.21 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/177f7111-b487-4e52-9106-54e0095a5dd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/underconstruction/" + google-query: inurl:"/wp-content/plugins/underconstruction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,underconstruction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/underconstruction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "underconstruction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ungallery-054a0cbde4f5e83c80e6fe80ca873ffc.yaml b/nuclei-templates/cve-less/plugins/ungallery-054a0cbde4f5e83c80e6fe80ca873ffc.yaml new file mode 100644 index 0000000000..cc882e98d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ungallery-054a0cbde4f5e83c80e6fe80ca873ffc.yaml @@ -0,0 +1,58 @@ +id: ungallery-054a0cbde4f5e83c80e6fe80ca873ffc + +info: + name: > + UnGallery < 2.1.6 - Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5875a4c2-a309-41fb-8845-2935511ec6c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ungallery/" + google-query: inurl:"/wp-content/plugins/ungallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ungallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ungallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ungallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uni-woo-custom-product-options-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/uni-woo-custom-product-options-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c27079691b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uni-woo-custom-product-options-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: uni-woo-custom-product-options-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uni-woo-custom-product-options/" + google-query: inurl:"/wp-content/plugins/uni-woo-custom-product-options/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uni-woo-custom-product-options,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uni-woo-custom-product-options/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uni-woo-custom-product-options" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uniconsent-cmp-52d99f3d726c6a2b0f9591cf7e9202f7.yaml b/nuclei-templates/cve-less/plugins/uniconsent-cmp-52d99f3d726c6a2b0f9591cf7e9202f7.yaml new file mode 100644 index 0000000000..2389dc5359 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uniconsent-cmp-52d99f3d726c6a2b0f9591cf7e9202f7.yaml @@ -0,0 +1,58 @@ +id: uniconsent-cmp-52d99f3d726c6a2b0f9591cf7e9202f7 + +info: + name: > + UniConsent Cookie Consent CMP for GDPR / CCPA <= 1.4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19c9cf3e-553b-4cbd-9f2c-803e188a2581?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uniconsent-cmp/" + google-query: inurl:"/wp-content/plugins/uniconsent-cmp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uniconsent-cmp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uniconsent-cmp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uniconsent-cmp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unify-06c85397dccc182d76ce00ddb1fdcc56.yaml b/nuclei-templates/cve-less/plugins/unify-06c85397dccc182d76ce00ddb1fdcc56.yaml new file mode 100644 index 0000000000..9d57c3a76d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unify-06c85397dccc182d76ce00ddb1fdcc56.yaml @@ -0,0 +1,58 @@ +id: unify-06c85397dccc182d76ce00ddb1fdcc56 + +info: + name: > + Unify <= 3.2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e6218e5-84d9-4180-8275-7da24c554c72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unify/" + google-query: inurl:"/wp-content/plugins/unify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uninstall-e0876152720c53588a74ce9328051604.yaml b/nuclei-templates/cve-less/plugins/uninstall-e0876152720c53588a74ce9328051604.yaml new file mode 100644 index 0000000000..8875f5dae0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uninstall-e0876152720c53588a74ce9328051604.yaml @@ -0,0 +1,58 @@ +id: uninstall-e0876152720c53588a74ce9328051604 + +info: + name: > + WordPress Uninstall <= 1.2.1 - Cross-Site Request Forgery to Site Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f975d32-a008-46a9-bc00-420610464ecb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uninstall/" + google-query: inurl:"/wp-content/plugins/uninstall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uninstall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uninstall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uninstall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unite-gallery-lite-103ae57e192be7c58d97324e70895c9f.yaml b/nuclei-templates/cve-less/plugins/unite-gallery-lite-103ae57e192be7c58d97324e70895c9f.yaml new file mode 100644 index 0000000000..1f44db5d06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unite-gallery-lite-103ae57e192be7c58d97324e70895c9f.yaml @@ -0,0 +1,58 @@ +id: unite-gallery-lite-103ae57e192be7c58d97324e70895c9f + +info: + name: > + Unite Gallery Lite <= 1.4.6 - Cross-Site Request Forgery & Authenticated SQL Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/046fde5c-9f11-4f09-a4eb-83c289680a18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unite-gallery-lite/" + google-query: inurl:"/wp-content/plugins/unite-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unite-gallery-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unite-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unite-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unite-gallery-lite-1ccd8092085adf5a5342024d683bb79b.yaml b/nuclei-templates/cve-less/plugins/unite-gallery-lite-1ccd8092085adf5a5342024d683bb79b.yaml new file mode 100644 index 0000000000..199e339457 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unite-gallery-lite-1ccd8092085adf5a5342024d683bb79b.yaml @@ -0,0 +1,58 @@ +id: unite-gallery-lite-1ccd8092085adf5a5342024d683bb79b + +info: + name: > + Unite Gallery Lite < 1.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a30bb9-501b-44bd-8121-c137bb1c3ae5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unite-gallery-lite/" + google-query: inurl:"/wp-content/plugins/unite-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unite-gallery-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unite-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unite-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unite-gallery-lite-4b751d7bee414741f3c79461b74b4584.yaml b/nuclei-templates/cve-less/plugins/unite-gallery-lite-4b751d7bee414741f3c79461b74b4584.yaml new file mode 100644 index 0000000000..7569efb2c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unite-gallery-lite-4b751d7bee414741f3c79461b74b4584.yaml @@ -0,0 +1,58 @@ +id: unite-gallery-lite-4b751d7bee414741f3c79461b74b4584 + +info: + name: > + Unite Gallery Lite <= 1.7.61 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/577d8986-edc5-445f-80cf-7a7f2cca9749?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unite-gallery-lite/" + google-query: inurl:"/wp-content/plugins/unite-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unite-gallery-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unite-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unite-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unite-gallery-lite-d8d7674d520927a7ad2ed94f66363231.yaml b/nuclei-templates/cve-less/plugins/unite-gallery-lite-d8d7674d520927a7ad2ed94f66363231.yaml new file mode 100644 index 0000000000..ea09a5dfdd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unite-gallery-lite-d8d7674d520927a7ad2ed94f66363231.yaml @@ -0,0 +1,58 @@ +id: unite-gallery-lite-d8d7674d520927a7ad2ed94f66363231 + +info: + name: > + Unite Gallery Lite <= 1.7.59 - Authenticated(Administrator+) Local File Inclusion via 'view' parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c2925c1-f5c6-45b9-bc61-96f325c0372f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unite-gallery-lite/" + google-query: inurl:"/wp-content/plugins/unite-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unite-gallery-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unite-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unite-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unite-gallery-lite-e8e6f489ccaee4d00c096c7d8c466fc5.yaml b/nuclei-templates/cve-less/plugins/unite-gallery-lite-e8e6f489ccaee4d00c096c7d8c466fc5.yaml new file mode 100644 index 0000000000..6898d876e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unite-gallery-lite-e8e6f489ccaee4d00c096c7d8c466fc5.yaml @@ -0,0 +1,58 @@ +id: unite-gallery-lite-e8e6f489ccaee4d00c096c7d8c466fc5 + +info: + name: > + Unite Gallery Lite < 1.5 - Cross-Site Request Forgery and SQL Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6a6fa09-f7bd-4ed0-8fdc-3f927b33af02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unite-gallery-lite/" + google-query: inurl:"/wp-content/plugins/unite-gallery-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unite-gallery-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unite-gallery-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unite-gallery-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unitegallery-24e3cfedb16e14aa15147d4ebb35d6c8.yaml b/nuclei-templates/cve-less/plugins/unitegallery-24e3cfedb16e14aa15147d4ebb35d6c8.yaml new file mode 100644 index 0000000000..2fba47396b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unitegallery-24e3cfedb16e14aa15147d4ebb35d6c8.yaml @@ -0,0 +1,58 @@ +id: unitegallery-24e3cfedb16e14aa15147d4ebb35d6c8 + +info: + name: > + Portfolio Gallery <= 1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0593311a-54d7-42b2-ad5e-185938b42452?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unitegallery/" + google-query: inurl:"/wp-content/plugins/unitegallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unitegallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unitegallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unitegallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/universal-analytics-ac061f34e871527fabbabb8afc45c209.yaml b/nuclei-templates/cve-less/plugins/universal-analytics-ac061f34e871527fabbabb8afc45c209.yaml new file mode 100644 index 0000000000..0e116426af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/universal-analytics-ac061f34e871527fabbabb8afc45c209.yaml @@ -0,0 +1,58 @@ +id: universal-analytics-ac061f34e871527fabbabb8afc45c209 + +info: + name: > + Universal Analytics <= 1.3.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19bf984d-fb2b-4a7e-828c-4f75175b4c1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/universal-analytics/" + google-query: inurl:"/wp-content/plugins/universal-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,universal-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/universal-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "universal-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/universal-star-rating-09395db7be64b2d03b62fa45ed0398d7.yaml b/nuclei-templates/cve-less/plugins/universal-star-rating-09395db7be64b2d03b62fa45ed0398d7.yaml new file mode 100644 index 0000000000..b7315c3e50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/universal-star-rating-09395db7be64b2d03b62fa45ed0398d7.yaml @@ -0,0 +1,58 @@ +id: universal-star-rating-09395db7be64b2d03b62fa45ed0398d7 + +info: + name: > + Universal Star Rating <= 2.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/767bd8dd-993f-48d3-92f1-669d2329f1ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/universal-star-rating/" + google-query: inurl:"/wp-content/plugins/universal-star-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,universal-star-rating,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/universal-star-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "universal-star-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/universal-star-rating-d853e52fe1d33267e0c81c91100de86c.yaml b/nuclei-templates/cve-less/plugins/universal-star-rating-d853e52fe1d33267e0c81c91100de86c.yaml new file mode 100644 index 0000000000..95249949cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/universal-star-rating-d853e52fe1d33267e0c81c91100de86c.yaml @@ -0,0 +1,58 @@ +id: universal-star-rating-d853e52fe1d33267e0c81c91100de86c + +info: + name: > + Universal Star Rating <= 1.10.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21dbe11c-8c9f-4b4c-98ef-3ba6eb5bb686?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/universal-star-rating/" + google-query: inurl:"/wp-content/plugins/universal-star-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,universal-star-rating,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/universal-star-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "universal-star-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2013-0291-deleteme-58ddfbc8f08958c578758b38baef9c64.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2013-0291-deleteme-58ddfbc8f08958c578758b38baef9c64.yaml new file mode 100644 index 0000000000..5831018cba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2013-0291-deleteme-58ddfbc8f08958c578758b38baef9c64.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2013-0291-deleteme-58ddfbc8f08958c578758b38baef9c64 + +info: + name: > + NextGEN Gallery Plugin <= 0.96 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ff27af-2b78-4214-9232-042357287ba8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2013-0291-DELETEME/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2013-0291-DELETEME/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2013-0291-DELETEME,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2013-0291-DELETEME/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2013-0291-DELETEME" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2014-4663-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2014-4663-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..4bfd28dbe8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2014-4663-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2014-4663-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2014-4663/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2014-4663/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2014-4663,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2014-4663/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2014-4663" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2015-10099-1-e1d1dd2650750b2b23a32becb4d086f9.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2015-10099-1-e1d1dd2650750b2b23a32becb4d086f9.yaml new file mode 100644 index 0000000000..6cbedf14c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2015-10099-1-e1d1dd2650750b2b23a32becb4d086f9.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2015-10099-1-e1d1dd2650750b2b23a32becb4d086f9 + +info: + name: > + CP Appointment Calendar <= 1.1.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/948d40f5-2c87-4439-b4ef-3e02c397bf0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2015-10099-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2015-10099-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2015-10099-1,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2015-10099-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2015-10099-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2015-10100-1-57f7b5f0694f05830341c7de29cc9c44.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2015-10100-1-57f7b5f0694f05830341c7de29cc9c44.yaml new file mode 100644 index 0000000000..68a88f152d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2015-10100-1-57f7b5f0694f05830341c7de29cc9c44.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2015-10100-1-57f7b5f0694f05830341c7de29cc9c44 + +info: + name: > + Dynamic Widgets <= 1.5.10 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c5a6fcb-72f0-4188-b883-d1dcaf1d13ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2015-10100-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2015-10100-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2015-10100-1,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2015-10100-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2015-10100-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2015-10122-1-fb63d7c63da2917737fade2e6962cd5e.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2015-10122-1-fb63d7c63da2917737fade2e6962cd5e.yaml new file mode 100644 index 0000000000..e371858382 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2015-10122-1-fb63d7c63da2917737fade2e6962cd5e.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2015-10122-1-fb63d7c63da2917737fade2e6962cd5e + +info: + name: > + WP Donate <= 1.4 - Unauthenticated SQL Injection in donate-display.php + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58bd4a75-8e24-4810-8b9d-c9ffad1c2208?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2015-10122-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2015-10122-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2015-10122-1,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2015-10122-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2015-10122-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml new file mode 100644 index 0000000000..ad82061098 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc + +info: + name: > + Social Rocket – Social Sharing Plugin < 1.2.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4aa2813-6920-4886-b6d2-78fbcd00bdf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2020-5611/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2020-5611/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2020-5611,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2020-5611/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2020-5611" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2021-24916-1-6c82b87e7c42a19481f1690450d14b67.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2021-24916-1-6c82b87e7c42a19481f1690450d14b67.yaml new file mode 100644 index 0000000000..bd15e2a0f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2021-24916-1-6c82b87e7c42a19481f1690450d14b67.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2021-24916-1-6c82b87e7c42a19481f1690450d14b67 + +info: + name: > + Qubely – Advanced Gutenberg Blocks <= 1.8.5 - Insufficient Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a6b3ae2-796b-4084-ad19-4b67ea6dea25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2021-24916-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2021-24916-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2021-24916-1,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2021-24916-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2021-24916-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2021-25120-dcded48546674d8a7147bd7b9ee5af2d.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2021-25120-dcded48546674d8a7147bd7b9ee5af2d.yaml new file mode 100644 index 0000000000..7b96e779c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2021-25120-dcded48546674d8a7147bd7b9ee5af2d.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2021-25120-dcded48546674d8a7147bd7b9ee5af2d + +info: + name: > + Easy Social Feed <= 6.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24c7e7da-39b4-4969-b24f-be7a8628236b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2021-25120/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2021-25120/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2021-25120,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2021-25120/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2021-25120" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2022-1772-4ebbec62da7dd4744569d093e5a7ca36.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2022-1772-4ebbec62da7dd4744569d093e5a7ca36.yaml new file mode 100644 index 0000000000..7d1bee4bdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2022-1772-4ebbec62da7dd4744569d093e5a7ca36.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2022-1772-4ebbec62da7dd4744569d093e5a7ca36 + +info: + name: > + Google Places Reviews < 2.0.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6935bca8-ad64-4c55-9cf0-c7dd088d8c0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2022-1772/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2022-1772/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2022-1772,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2022-1772/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2022-1772" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2022-28700-eee72fcaef7d6d7710f8503cc05b2365.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2022-28700-eee72fcaef7d6d7710f8503cc05b2365.yaml new file mode 100644 index 0000000000..85f03366a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2022-28700-eee72fcaef7d6d7710f8503cc05b2365.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2022-28700-eee72fcaef7d6d7710f8503cc05b2365 + +info: + name: > + GiveWP <= 2.20.2 - Authenticated Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fe1bb24-1f60-40f6-9b5e-58e0158bdfd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2022-28700/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2022-28700/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2022-28700,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2022-28700/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2022-28700" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2022-30536-dcbc0003781c6decb5bf6d916532822b.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2022-30536-dcbc0003781c6decb5bf6d916532822b.yaml new file mode 100644 index 0000000000..4459645f16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2022-30536-dcbc0003781c6decb5bf6d916532822b.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2022-30536-dcbc0003781c6decb5bf6d916532822b + +info: + name: > + WP Maintenance <= 6.0.7 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c4749b8-cfaf-4a6e-a093-0c2bfd22b809?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2022-30536/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2022-30536/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2022-30536,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2022-30536/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2022-30536" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2023-0865-1-af4d8c78cfc5d18ffd2467d3a5581338.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2023-0865-1-af4d8c78cfc5d18ffd2467d3a5581338.yaml new file mode 100644 index 0000000000..d68d6e6e94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2023-0865-1-af4d8c78cfc5d18ffd2467d3a5581338.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2023-0865-1-af4d8c78cfc5d18ffd2467d3a5581338 + +info: + name: > + WooCommerce Multiple Customer Addresses & Shipping <= 21.6 - Missing Authorization leading to Authenticated (Subscriber+) Arbitrary Address Creation/Deletion/View/Updates + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec5e4e3f-df8f-4e07-a6e0-72247b2dd7a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2023-0865-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2023-0865-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2023-0865-1,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2023-0865-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2023-0865-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2023-35776-1-5558112c84605e9bc74e93c1eb9fbe3b.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2023-35776-1-5558112c84605e9bc74e93c1eb9fbe3b.yaml new file mode 100644 index 0000000000..0e135242a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2023-35776-1-5558112c84605e9bc74e93c1eb9fbe3b.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2023-35776-1-5558112c84605e9bc74e93c1eb9fbe3b + +info: + name: > + Sermon'e <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08b5f399-018c-4e0b-aefc-55463d4ac48d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2023-35776-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2023-35776-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2023-35776-1,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2023-35776-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2023-35776-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2023-3650-1-5ef4178486944c845329dc8d7715fea8.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2023-3650-1-5ef4178486944c845329dc8d7715fea8.yaml new file mode 100644 index 0000000000..a4174d0a10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2023-3650-1-5ef4178486944c845329dc8d7715fea8.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2023-3650-1-5ef4178486944c845329dc8d7715fea8 + +info: + name: > + Bubble Menu <= 3.0.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96896174-3ad9-4dcf-b06b-cd5ee91a6240?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2023-3650-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2023-3650-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2023-3650-1,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2023-3650-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2023-3650-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2023-50831-1-f3d1f4048a78d100d7199aa687dd970a.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2023-50831-1-f3d1f4048a78d100d7199aa687dd970a.yaml new file mode 100644 index 0000000000..a0475a45db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2023-50831-1-f3d1f4048a78d100d7199aa687dd970a.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2023-50831-1-f3d1f4048a78d100d7199aa687dd970a + +info: + name: > + CURCY – Multi Currency for WooCommerce <= 2.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b7dee9e-1272-4e70-926c-a73e2897968c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2023-50831-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2023-50831-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2023-50831-1,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2023-50831-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2023-50831-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2023-5530-1-7e83efd5775fb18032b0a614d3a4dbf4.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2023-5530-1-7e83efd5775fb18032b0a614d3a4dbf4.yaml new file mode 100644 index 0000000000..dcbc9f4fb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2023-5530-1-7e83efd5775fb18032b0a614d3a4dbf4.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2023-5530-1-7e83efd5775fb18032b0a614d3a4dbf4 + +info: + name: > + Ninja Forms Contact Form <= 3.6.33 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8b3419e-23c7-48de-898f-133a52ae286a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2023-5530-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2023-5530-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2023-5530-1,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2023-5530-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2023-5530-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2023-6485-1-3e71b451d444e56f20cac2bd5a92795e.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2023-6485-1-3e71b451d444e56f20cac2bd5a92795e.yaml new file mode 100644 index 0000000000..6439b39333 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2023-6485-1-3e71b451d444e56f20cac2bd5a92795e.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2023-6485-1-3e71b451d444e56f20cac2bd5a92795e + +info: + name: > + HTML5 Video Player <= 2.5.24 - Unauthenticated SQL Injection via id + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0abd2533-5cb3-4568-8ad2-f2852ab3a8db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2023-6485-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2023-6485-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2023-6485-1,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2023-6485-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2023-6485-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2024-2908-1-62601b5430c03a6d792da3905efea1b8.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2024-2908-1-62601b5430c03a6d792da3905efea1b8.yaml new file mode 100644 index 0000000000..65c7e8dcd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2024-2908-1-62601b5430c03a6d792da3905efea1b8.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2024-2908-1-62601b5430c03a6d792da3905efea1b8 + +info: + name: > + Call Now Button <= 1.4.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0aac81b0-8d40-4c16-99b0-558ad7132698?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2024-2908-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2024-2908-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2024-2908-1,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2024-2908-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2024-2908-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unknown-cve-2024-30226-1-e5bdd89e96929b7bea4a7677f7939bf4.yaml b/nuclei-templates/cve-less/plugins/unknown-cve-2024-30226-1-e5bdd89e96929b7bea4a7677f7939bf4.yaml new file mode 100644 index 0000000000..4e1cf3d6f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unknown-cve-2024-30226-1-e5bdd89e96929b7bea4a7677f7939bf4.yaml @@ -0,0 +1,58 @@ +id: unknown-cve-2024-30226-1-e5bdd89e96929b7bea4a7677f7939bf4 + +info: + name: > + BetterDocs – Best Documentation, FAQ & Knowledge Base Plugin with AI Support & Instant Answer for Elementor & Gutenberg <= 3.3.3 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95ff5150-ff45-48f8-bd39-0df79838942e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/UNKNOWN-CVE-2024-30226-1/" + google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2024-30226-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2024-30226-1,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/UNKNOWN-CVE-2024-30226-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "UNKNOWN-CVE-2024-30226-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-addons-for-wpbakery-page-builder-7222dd54a342eb0ec1d2eb49f0d0425a.yaml b/nuclei-templates/cve-less/plugins/unlimited-addons-for-wpbakery-page-builder-7222dd54a342eb0ec1d2eb49f0d0425a.yaml new file mode 100644 index 0000000000..20e66d6e4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-addons-for-wpbakery-page-builder-7222dd54a342eb0ec1d2eb49f0d0425a.yaml @@ -0,0 +1,58 @@ +id: unlimited-addons-for-wpbakery-page-builder-7222dd54a342eb0ec1d2eb49f0d0425a + +info: + name: > + Unlimited Addons for WPBakery Page Builder <= 1.0.42 - Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a78b76d6-4068-4141-9726-7db439aa6a9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-addons-for-wpbakery-page-builder/" + google-query: inurl:"/wp-content/plugins/unlimited-addons-for-wpbakery-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-addons-for-wpbakery-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-addons-for-wpbakery-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-addons-for-wpbakery-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..e31a161a1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: unlimited-elementor-inner-sections-by-boomdevs-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/" + google-query: inurl:"/wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elementor-inner-sections-by-boomdevs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elementor-inner-sections-by-boomdevs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-83be4877901e862ff402253df3e3d6d7.yaml b/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-83be4877901e862ff402253df3e3d6d7.yaml new file mode 100644 index 0000000000..506c716435 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-83be4877901e862ff402253df3e3d6d7.yaml @@ -0,0 +1,58 @@ +id: unlimited-elementor-inner-sections-by-boomdevs-83be4877901e862ff402253df3e3d6d7 + +info: + name: > + Appsero <= 2.0.0 - Missing Authorization via handle_optin_optout + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376c5091-7921-4470-acbf-44db53db38fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/" + google-query: inurl:"/wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elementor-inner-sections-by-boomdevs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elementor-inner-sections-by-boomdevs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..9112a133c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elementor-inner-sections-by-boomdevs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: unlimited-elementor-inner-sections-by-boomdevs-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/" + google-query: inurl:"/wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elementor-inner-sections-by-boomdevs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elementor-inner-sections-by-boomdevs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elementor-inner-sections-by-boomdevs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-0115c4f456db0247c3530a55e2dfe13e.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-0115c4f456db0247c3530a55e2dfe13e.yaml new file mode 100644 index 0000000000..30f5bf84b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-0115c4f456db0247c3530a55e2dfe13e.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-0115c4f456db0247c3530a55e2dfe13e + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.66 - Authenticated (Contributor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce1ac711-6026-49ef-b66b-2cc199697942?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.66') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-0ecdecef5b5861d9228c5e4232350428.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-0ecdecef5b5861d9228c5e4232350428.yaml new file mode 100644 index 0000000000..3093be48da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-0ecdecef5b5861d9228c5e4232350428.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-0ecdecef5b5861d9228c5e4232350428 + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.102 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f629fc93-84ce-4c33-b1c0-3a3194aac477?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.102') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-1f2c777b2d1a87f6daecfabe8050a1d2.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-1f2c777b2d1a87f6daecfabe8050a1d2.yaml new file mode 100644 index 0000000000..9fc296ee44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-1f2c777b2d1a87f6daecfabe8050a1d2.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-1f2c777b2d1a87f6daecfabe8050a1d2 + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.93 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b3fc000-57e7-4be4-959f-27dac9717b9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-2304b21574018f9296b7348b5813fb8e.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-2304b21574018f9296b7348b5813fb8e.yaml new file mode 100644 index 0000000000..8a84a6a299 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-2304b21574018f9296b7348b5813fb8e.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-2304b21574018f9296b7348b5813fb8e + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.102 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebc0c8e6-a365-4ef7-9c1a-41454855096c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.102') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-6a7387f7988e4dac2eb8210534154d2a.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-6a7387f7988e4dac2eb8210534154d2a.yaml new file mode 100644 index 0000000000..169552a19b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-6a7387f7988e4dac2eb8210534154d2a.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-6a7387f7988e4dac2eb8210534154d2a + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.60 - Arbitrary File Upload in File Manager + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a09102c-391e-4057-b883-3d2eef1671ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-8b1647a7cae04c475a434c97e40430f4.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-8b1647a7cae04c475a434c97e40430f4.yaml new file mode 100644 index 0000000000..74fe3dff15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-8b1647a7cae04c475a434c97e40430f4.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-8b1647a7cae04c475a434c97e40430f4 + +info: + name: > + Unlimited Elements For Elementor <= 1.5.96 - Authenticated (Contributor+) Stored Cross-Site Scripting via Widget Link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47853750-0bf1-4df3-9c56-c6852543cfad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-a4e1a6eed6af75293ee8acc33aa5bb7f.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-a4e1a6eed6af75293ee8acc33aa5bb7f.yaml new file mode 100644 index 0000000000..a9dc54949b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-a4e1a6eed6af75293ee8acc33aa5bb7f.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-a4e1a6eed6af75293ee8acc33aa5bb7f + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.102 - Authenticated (Admin+) Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58492dbb-b9e0-4477-b85d-ace06dba954c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.102') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-a752917f99712ba0255e64b4033cf044.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-a752917f99712ba0255e64b4033cf044.yaml new file mode 100644 index 0000000000..350b24b59b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-a752917f99712ba0255e64b4033cf044.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-a752917f99712ba0255e64b4033cf044 + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.66 - Zip Extraction to Arbitrary File Upload in File Manager + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f600361c-cf7a-498c-aa3d-beeb28d27101?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.66') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..57146835f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-ba7ba7554cf607d5d507c2c2d4751a5b.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-ba7ba7554cf607d5d507c2c2d4751a5b.yaml new file mode 100644 index 0000000000..88a2acac0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-ba7ba7554cf607d5d507c2c2d4751a5b.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-ba7ba7554cf607d5d507c2c2d4751a5b + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.48 - Authenticated (Admin+) Cross Site Scripting (XSS) + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22bc7a0c-8a89-461b-8838-788dd6d5c63b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.48') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-f213f0cf0f29187e1d444e194fee045d.yaml b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-f213f0cf0f29187e1d444e194fee045d.yaml new file mode 100644 index 0000000000..acd8def39e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-elements-for-elementor-f213f0cf0f29187e1d444e194fee045d.yaml @@ -0,0 +1,58 @@ +id: unlimited-elements-for-elementor-f213f0cf0f29187e1d444e194fee045d + +info: + name: > + Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.65 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d49e28b-8b5e-4c67-a36d-c78ee33ffc6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-elements-for-elementor/" + google-query: inurl:"/wp-content/plugins/unlimited-elements-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-elements-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-elements-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-elements-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-popups-87cd3b8d44051ebe8fa42c56e4d1cbb3.yaml b/nuclei-templates/cve-less/plugins/unlimited-popups-87cd3b8d44051ebe8fa42c56e4d1cbb3.yaml new file mode 100644 index 0000000000..becc9aff06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-popups-87cd3b8d44051ebe8fa42c56e4d1cbb3.yaml @@ -0,0 +1,58 @@ +id: unlimited-popups-87cd3b8d44051ebe8fa42c56e4d1cbb3 + +info: + name: > + Unlimited PopUps <= 4.5.3 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61a3c83f-1910-4c25-9b79-293c75d06e5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-popups/" + google-query: inurl:"/wp-content/plugins/unlimited-popups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-popups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-popups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-popups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unlimited-popups-f4a8622061e5460b0d2e3667b1d15b03.yaml b/nuclei-templates/cve-less/plugins/unlimited-popups-f4a8622061e5460b0d2e3667b1d15b03.yaml new file mode 100644 index 0000000000..88bede54f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unlimited-popups-f4a8622061e5460b0d2e3667b1d15b03.yaml @@ -0,0 +1,58 @@ +id: unlimited-popups-f4a8622061e5460b0d2e3667b1d15b03 + +info: + name: > + Unlimited Pop-Ups < 1.4.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61516b71-3346-4033-b55b-a35c5b4ca3dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unlimited-popups/" + google-query: inurl:"/wp-content/plugins/unlimited-popups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unlimited-popups,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unlimited-popups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unlimited-popups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-0fee961f47a5a9afb9a972a5a5342a98.yaml b/nuclei-templates/cve-less/plugins/unusedcss-0fee961f47a5a9afb9a972a5a5342a98.yaml new file mode 100644 index 0000000000..496789fe75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-0fee961f47a5a9afb9a972a5a5342a98.yaml @@ -0,0 +1,58 @@ +id: unusedcss-0fee961f47a5a9afb9a972a5a5342a98 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'uucss_update_rule' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19f126f8-1d59-44b5-8e0e-c37f1fbedf5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-26699e962c9e60112283bf64ac1ad60a.yaml b/nuclei-templates/cve-less/plugins/unusedcss-26699e962c9e60112283bf64ac1ad60a.yaml new file mode 100644 index 0000000000..958baabe65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-26699e962c9e60112283bf64ac1ad60a.yaml @@ -0,0 +1,58 @@ +id: unusedcss-26699e962c9e60112283bf64ac1ad60a + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery via 'clear_uucss_logs' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/488e26e2-d4d7-4036-a672-53c2d4c9d39b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-2a1f9d077aaf4e3fadb41e60e62e6854.yaml b/nuclei-templates/cve-less/plugins/unusedcss-2a1f9d077aaf4e3fadb41e60e62e6854.yaml new file mode 100644 index 0000000000..5b1a65efdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-2a1f9d077aaf4e3fadb41e60e62e6854.yaml @@ -0,0 +1,58 @@ +id: unusedcss-2a1f9d077aaf4e3fadb41e60e62e6854 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'queue_posts' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3108ef4-f889-4ae1-b86f-cedf46dcea19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-2b045fe9c22899f178f1269f6a026542.yaml b/nuclei-templates/cve-less/plugins/unusedcss-2b045fe9c22899f178f1269f6a026542.yaml new file mode 100644 index 0000000000..2310c23a1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-2b045fe9c22899f178f1269f6a026542.yaml @@ -0,0 +1,58 @@ +id: unusedcss-2b045fe9c22899f178f1269f6a026542 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery via 'queue_posts' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d16fa590-1409-4f04-b8b7-0cce17412a5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-2b7ae4ca78bd06166aae6152ceb4da4c.yaml b/nuclei-templates/cve-less/plugins/unusedcss-2b7ae4ca78bd06166aae6152ceb4da4c.yaml new file mode 100644 index 0000000000..08c73524c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-2b7ae4ca78bd06166aae6152ceb4da4c.yaml @@ -0,0 +1,58 @@ +id: unusedcss-2b7ae4ca78bd06166aae6152ceb4da4c + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f9ee168-82b1-4d13-a84e-379f16dcb283?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-5c781006f6fca5d11eb9b4f46b04eda7.yaml b/nuclei-templates/cve-less/plugins/unusedcss-5c781006f6fca5d11eb9b4f46b04eda7.yaml new file mode 100644 index 0000000000..10343d3ba0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-5c781006f6fca5d11eb9b4f46b04eda7.yaml @@ -0,0 +1,58 @@ +id: unusedcss-5c781006f6fca5d11eb9b4f46b04eda7 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery via 'ajax_deactivate' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d95b01c3-5db4-40ac-8787-0db58a9cc3a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-6ec723a75cd7d5a7782b1351c8098782.yaml b/nuclei-templates/cve-less/plugins/unusedcss-6ec723a75cd7d5a7782b1351c8098782.yaml new file mode 100644 index 0000000000..1df1207304 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-6ec723a75cd7d5a7782b1351c8098782.yaml @@ -0,0 +1,58 @@ +id: unusedcss-6ec723a75cd7d5a7782b1351c8098782 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery via 'clear_page_cache' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b228f8b1-dd68-41ee-bc49-6a62e5267233?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-76ac5b6d638212e0347ed800db5531d1.yaml b/nuclei-templates/cve-less/plugins/unusedcss-76ac5b6d638212e0347ed800db5531d1.yaml new file mode 100644 index 0000000000..2a2a0890b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-76ac5b6d638212e0347ed800db5531d1.yaml @@ -0,0 +1,58 @@ +id: unusedcss-76ac5b6d638212e0347ed800db5531d1 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'clear_uucss_logs' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a52325f9-51b5-469c-865e-73a22002d46f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-7fabd60d3b2198be95329f47bacc886f.yaml b/nuclei-templates/cve-less/plugins/unusedcss-7fabd60d3b2198be95329f47bacc886f.yaml new file mode 100644 index 0000000000..5d5f3e6113 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-7fabd60d3b2198be95329f47bacc886f.yaml @@ -0,0 +1,58 @@ +id: unusedcss-7fabd60d3b2198be95329f47bacc886f + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'ajax_deactivate' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2296800-93d6-48fa-aa09-3d28fa6371d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-9a0b6c64179538a07b644a9798c3ccee.yaml b/nuclei-templates/cve-less/plugins/unusedcss-9a0b6c64179538a07b644a9798c3ccee.yaml new file mode 100644 index 0000000000..9c39c69596 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-9a0b6c64179538a07b644a9798c3ccee.yaml @@ -0,0 +1,58 @@ +id: unusedcss-9a0b6c64179538a07b644a9798c3ccee + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'clear_page_cache' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cba74f7-7183-4297-8f04-4818c01358ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-a0e3ff5d3be6b2d76d2f97e392703cee.yaml b/nuclei-templates/cve-less/plugins/unusedcss-a0e3ff5d3be6b2d76d2f97e392703cee.yaml new file mode 100644 index 0000000000..a18a831de5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-a0e3ff5d3be6b2d76d2f97e392703cee.yaml @@ -0,0 +1,58 @@ +id: unusedcss-a0e3ff5d3be6b2d76d2f97e392703cee + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'attach_rule' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb55b22-a0d0-424f-8e4f-57d3f239c149?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-a339149dde9b1d7d6ce8f5a68c95c72b.yaml b/nuclei-templates/cve-less/plugins/unusedcss-a339149dde9b1d7d6ce8f5a68c95c72b.yaml new file mode 100644 index 0000000000..137e21cf8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-a339149dde9b1d7d6ce8f5a68c95c72b.yaml @@ -0,0 +1,58 @@ +id: unusedcss-a339149dde9b1d7d6ce8f5a68c95c72b + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery via 'uucss_update_rule' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/263153c9-61c5-4df4-803b-8d274e2a5e35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-a5b2d252972ec3a0a983d2f147eccab3.yaml b/nuclei-templates/cve-less/plugins/unusedcss-a5b2d252972ec3a0a983d2f147eccab3.yaml new file mode 100644 index 0000000000..6c7902c876 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-a5b2d252972ec3a0a983d2f147eccab3.yaml @@ -0,0 +1,58 @@ +id: unusedcss-a5b2d252972ec3a0a983d2f147eccab3 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery via 'ucss_connect' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c66894a-8d0f-4946-ae4d-bffd35f3ffb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-bc3c5983bb2636786bed9c036578261b.yaml b/nuclei-templates/cve-less/plugins/unusedcss-bc3c5983bb2636786bed9c036578261b.yaml new file mode 100644 index 0000000000..ea6aeef36e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-bc3c5983bb2636786bed9c036578261b.yaml @@ -0,0 +1,58 @@ +id: unusedcss-bc3c5983bb2636786bed9c036578261b + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 2.2.11 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebdb591-4fd4-4ea3-a0db-b934c67176de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-dea1282ba49458404fbdca77bb502b69.yaml b/nuclei-templates/cve-less/plugins/unusedcss-dea1282ba49458404fbdca77bb502b69.yaml new file mode 100644 index 0000000000..45ec0f36f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-dea1282ba49458404fbdca77bb502b69.yaml @@ -0,0 +1,58 @@ +id: unusedcss-dea1282ba49458404fbdca77bb502b69 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'ucss_connect' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eba48c51-87d9-4e7e-b4c1-0205cd96d033?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-e06f0873eb001cb3482364eb50615d1b.yaml b/nuclei-templates/cve-less/plugins/unusedcss-e06f0873eb001cb3482364eb50615d1b.yaml new file mode 100644 index 0000000000..3635ffabec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-e06f0873eb001cb3482364eb50615d1b.yaml @@ -0,0 +1,58 @@ +id: unusedcss-e06f0873eb001cb3482364eb50615d1b + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery via 'attach_rule' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11f74b86-a050-4247-b310-045bf48fd4bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unusedcss-fdaa7c7a6a16dd831123dd45077162f8.yaml b/nuclei-templates/cve-less/plugins/unusedcss-fdaa7c7a6a16dd831123dd45077162f8.yaml new file mode 100644 index 0000000000..95fd043f22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unusedcss-fdaa7c7a6a16dd831123dd45077162f8.yaml @@ -0,0 +1,58 @@ +id: unusedcss-fdaa7c7a6a16dd831123dd45077162f8 + +info: + name: > + RapidLoad Power-Up for Autoptimize <= 1.6.35 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb71befb-8b79-46b0-9d0b-0159542147c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unusedcss/" + google-query: inurl:"/wp-content/plugins/unusedcss/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unusedcss,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unusedcss/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unusedcss" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unyson-610d128e626440e80c8a487da8ac96e5.yaml b/nuclei-templates/cve-less/plugins/unyson-610d128e626440e80c8a487da8ac96e5.yaml new file mode 100644 index 0000000000..646fff1671 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unyson-610d128e626440e80c8a487da8ac96e5.yaml @@ -0,0 +1,58 @@ +id: unyson-610d128e626440e80c8a487da8ac96e5 + +info: + name: > + Unyson <= 2.7.26 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32648d65-88a7-48fa-adeb-3060a1cf5b93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unyson/" + google-query: inurl:"/wp-content/plugins/unyson/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unyson,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unyson/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unyson" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unyson-90e033d103f597ab6ef613db20a319e8.yaml b/nuclei-templates/cve-less/plugins/unyson-90e033d103f597ab6ef613db20a319e8.yaml new file mode 100644 index 0000000000..5cf64fb866 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unyson-90e033d103f597ab6ef613db20a319e8.yaml @@ -0,0 +1,58 @@ +id: unyson-90e033d103f597ab6ef613db20a319e8 + +info: + name: > + Unyson <= 2.7.28 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35421b32-701a-4fc9-bcec-80684d874bab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unyson/" + google-query: inurl:"/wp-content/plugins/unyson/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unyson,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unyson/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unyson" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/unyson-ec632236ed321f22549e49610f9ecc8d.yaml b/nuclei-templates/cve-less/plugins/unyson-ec632236ed321f22549e49610f9ecc8d.yaml new file mode 100644 index 0000000000..5485ab9f4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/unyson-ec632236ed321f22549e49610f9ecc8d.yaml @@ -0,0 +1,58 @@ +id: unyson-ec632236ed321f22549e49610f9ecc8d + +info: + name: > + Unyson <= 2.7.18 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4d8f5a9-56e1-4676-b03f-1f5464c5b29a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/unyson/" + google-query: inurl:"/wp-content/plugins/unyson/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,unyson,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/unyson/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unyson" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/up-down-image-slideshow-gallery-7138d2ba8421f62a9d8f037aab75e745.yaml b/nuclei-templates/cve-less/plugins/up-down-image-slideshow-gallery-7138d2ba8421f62a9d8f037aab75e745.yaml new file mode 100644 index 0000000000..136daff543 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/up-down-image-slideshow-gallery-7138d2ba8421f62a9d8f037aab75e745.yaml @@ -0,0 +1,58 @@ +id: up-down-image-slideshow-gallery-7138d2ba8421f62a9d8f037aab75e745 + +info: + name: > + Up down image slideshow gallery <= 12.0 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b72cf6f-4924-4fa5-8e1a-4054dfe73be0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/up-down-image-slideshow-gallery/" + google-query: inurl:"/wp-content/plugins/up-down-image-slideshow-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,up-down-image-slideshow-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/up-down-image-slideshow-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "up-down-image-slideshow-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/update-alt-attribute-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/update-alt-attribute-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..3801b3e1bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/update-alt-attribute-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: update-alt-attribute-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/update-alt-attribute/" + google-query: inurl:"/wp-content/plugins/update-alt-attribute/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,update-alt-attribute,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/update-alt-attribute/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "update-alt-attribute" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/update-alt-attribute-a1741d936a6f3f09256d6ab3128f4cf5.yaml b/nuclei-templates/cve-less/plugins/update-alt-attribute-a1741d936a6f3f09256d6ab3128f4cf5.yaml new file mode 100644 index 0000000000..370e3efaa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/update-alt-attribute-a1741d936a6f3f09256d6ab3128f4cf5.yaml @@ -0,0 +1,58 @@ +id: update-alt-attribute-a1741d936a6f3f09256d6ab3128f4cf5 + +info: + name: > + Update Image Tag Alt Attribute <= 2.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25b13322-d305-45db-8ac7-20762398dc21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/update-alt-attribute/" + google-query: inurl:"/wp-content/plugins/update-alt-attribute/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,update-alt-attribute,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/update-alt-attribute/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "update-alt-attribute" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/update-alt-attribute-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/update-alt-attribute-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..b5dc6ef9ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/update-alt-attribute-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: update-alt-attribute-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/update-alt-attribute/" + google-query: inurl:"/wp-content/plugins/update-alt-attribute/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,update-alt-attribute,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/update-alt-attribute/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "update-alt-attribute" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/update-theme-and-plugins-from-zip-file-f49cbe09035132568d19e52e79936740.yaml b/nuclei-templates/cve-less/plugins/update-theme-and-plugins-from-zip-file-f49cbe09035132568d19e52e79936740.yaml new file mode 100644 index 0000000000..82c6491191 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/update-theme-and-plugins-from-zip-file-f49cbe09035132568d19e52e79936740.yaml @@ -0,0 +1,58 @@ +id: update-theme-and-plugins-from-zip-file-f49cbe09035132568d19e52e79936740 + +info: + name: > + Update Theme and Plugins from Zip File <= 2.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e59293a6-cc61-4913-9ed0-13fa16299705?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/update-theme-and-plugins-from-zip-file/" + google-query: inurl:"/wp-content/plugins/update-theme-and-plugins-from-zip-file/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,update-theme-and-plugins-from-zip-file,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/update-theme-and-plugins-from-zip-file/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "update-theme-and-plugins-from-zip-file" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updater-5a578f0ccecd9e70dbf98ea6c2ad1d23.yaml b/nuclei-templates/cve-less/plugins/updater-5a578f0ccecd9e70dbf98ea6c2ad1d23.yaml new file mode 100644 index 0000000000..ce07a0584c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updater-5a578f0ccecd9e70dbf98ea6c2ad1d23.yaml @@ -0,0 +1,58 @@ +id: updater-5a578f0ccecd9e70dbf98ea6c2ad1d23 + +info: + name: > + Updater by BestWebSoft <= 1.34 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83157b37-75f6-4ab9-8759-3d9a9cb9303d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updater/" + google-query: inurl:"/wp-content/plugins/updater/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updater,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updater/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updater" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraft-c7d89f14d724c38d6f5b1f1ce939143f.yaml b/nuclei-templates/cve-less/plugins/updraft-c7d89f14d724c38d6f5b1f1ce939143f.yaml new file mode 100644 index 0000000000..f890c6cab7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraft-c7d89f14d724c38d6f5b1f1ce939143f.yaml @@ -0,0 +1,58 @@ +id: updraft-c7d89f14d724c38d6f5b1f1ce939143f + +info: + name: > + Updraft <= 0.6.1 - Reflected Cross-Site Scripting via 'backup_timestamp' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02bfc849-0f36-4647-9290-eddbacdb419b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraft/" + google-query: inurl:"/wp-content/plugins/updraft/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraft,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraft/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraft" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftcentral-54f7c8a344914499dc39be96b51e8433.yaml b/nuclei-templates/cve-less/plugins/updraftcentral-54f7c8a344914499dc39be96b51e8433.yaml new file mode 100644 index 0000000000..5874d3e46a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftcentral-54f7c8a344914499dc39be96b51e8433.yaml @@ -0,0 +1,58 @@ +id: updraftcentral-54f7c8a344914499dc39be96b51e8433 + +info: + name: > + UpdraftCentral Dashboard 0.8.23 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef1468eb-9b98-4d45-b357-70998ba17de7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftcentral/" + google-query: inurl:"/wp-content/plugins/updraftcentral/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftcentral,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftcentral/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftcentral" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.8.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-00045a0149ac4849a8afd76259c91e36.yaml b/nuclei-templates/cve-less/plugins/updraftplus-00045a0149ac4849a8afd76259c91e36.yaml new file mode 100644 index 0000000000..0d64fb6dca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-00045a0149ac4849a8afd76259c91e36.yaml @@ -0,0 +1,58 @@ +id: updraftplus-00045a0149ac4849a8afd76259c91e36 + +info: + name: > + UpdraftPlus <= 1.23.3 - Cross-Site Request Forgery to Cross-Site Scripting via action_authenticate_storage + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/597f06ac-f9c7-4dcb-bb72-15ed7e9d8ac6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-1962b90b79f7e959c4385d817037dc9e.yaml b/nuclei-templates/cve-less/plugins/updraftplus-1962b90b79f7e959c4385d817037dc9e.yaml new file mode 100644 index 0000000000..30c5e7d2d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-1962b90b79f7e959c4385d817037dc9e.yaml @@ -0,0 +1,58 @@ +id: updraftplus-1962b90b79f7e959c4385d817037dc9e + +info: + name: > + UpdraftPlus WordPress Backup Plugin < 1.22.9 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aafa8eb8-73e6-48b5-a94e-85730d6250f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-1eca727a0c6686a8bab81174d47e18f7.yaml b/nuclei-templates/cve-less/plugins/updraftplus-1eca727a0c6686a8bab81174d47e18f7.yaml new file mode 100644 index 0000000000..05b89bac71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-1eca727a0c6686a8bab81174d47e18f7.yaml @@ -0,0 +1,58 @@ +id: updraftplus-1eca727a0c6686a8bab81174d47e18f7 + +info: + name: > + UpdraftPlus < 1.16.59 - Authenticated (Admin+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40d80e47-3411-4e70-8a20-2e698daad6e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-25f70760f08292d981b9d26ac7ec9db4.yaml b/nuclei-templates/cve-less/plugins/updraftplus-25f70760f08292d981b9d26ac7ec9db4.yaml new file mode 100644 index 0000000000..a0ef65afff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-25f70760f08292d981b9d26ac7ec9db4.yaml @@ -0,0 +1,58 @@ +id: updraftplus-25f70760f08292d981b9d26ac7ec9db4 + +info: + name: > + UpdraftPlus WordPress Backup Plugin <= 1.16.65 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17d11c96-fd3c-478e-9b0e-ba58116ee27f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.66') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-4bbd3789375ef8b0ef3fbe16cd0df54c.yaml b/nuclei-templates/cve-less/plugins/updraftplus-4bbd3789375ef8b0ef3fbe16cd0df54c.yaml new file mode 100644 index 0000000000..79d523be63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-4bbd3789375ef8b0ef3fbe16cd0df54c.yaml @@ -0,0 +1,58 @@ +id: updraftplus-4bbd3789375ef8b0ef3fbe16cd0df54c + +info: + name: > + UpdraftPlus WordPress Backup <= 1.9.6.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/800a06f3-8a5b-4ba1-ad16-3d3a214f372f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-50aa046ee7fe3b1495c79cf309977bf9.yaml b/nuclei-templates/cve-less/plugins/updraftplus-50aa046ee7fe3b1495c79cf309977bf9.yaml new file mode 100644 index 0000000000..9eaadc31d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-50aa046ee7fe3b1495c79cf309977bf9.yaml @@ -0,0 +1,58 @@ +id: updraftplus-50aa046ee7fe3b1495c79cf309977bf9 + +info: + name: > + UpdraftPlus WordPress Backup Plugin < 1.22.3 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/266b1004-a374-4770-9659-bac3d167b585?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.16.7', '<= 1.22.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-53e761311ef3248ba3af1f39cba27328.yaml b/nuclei-templates/cve-less/plugins/updraftplus-53e761311ef3248ba3af1f39cba27328.yaml new file mode 100644 index 0000000000..dad466c6cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-53e761311ef3248ba3af1f39cba27328.yaml @@ -0,0 +1,58 @@ +id: updraftplus-53e761311ef3248ba3af1f39cba27328 + +info: + name: > + UpdraftPlus 1.22.14 to 1.23.2 and UpdraftPlus (Premium) 2.22.14 to 2.23.2 - Privilege Escalation via updraft_central_ajax_handler + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e329432-c404-4312-969b-42cac345637d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.22.14', '<= 2.23.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-72d990255d7638d74a26d5dede988b7c.yaml b/nuclei-templates/cve-less/plugins/updraftplus-72d990255d7638d74a26d5dede988b7c.yaml new file mode 100644 index 0000000000..af6c4d7800 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-72d990255d7638d74a26d5dede988b7c.yaml @@ -0,0 +1,58 @@ +id: updraftplus-72d990255d7638d74a26d5dede988b7c + +info: + name: > + Updraft Plus <= 1.22.24 - Information Disclosure via updraft_ajaxrestore + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/343cbdda-2ec5-437f-b563-96c61663314d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-84290819179c80fad98664a6919a3707.yaml b/nuclei-templates/cve-less/plugins/updraftplus-84290819179c80fad98664a6919a3707.yaml new file mode 100644 index 0000000000..16d36fdd5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-84290819179c80fad98664a6919a3707.yaml @@ -0,0 +1,58 @@ +id: updraftplus-84290819179c80fad98664a6919a3707 + +info: + name: > + UpdraftPlus <= 1.9.63 and UpdraftPlus (paid) <= 2.9.63 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31db39a3-1b0b-4fdf-bef1-72308e38c9ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-adb867864793eef1f6a24c287d50691a.yaml b/nuclei-templates/cve-less/plugins/updraftplus-adb867864793eef1f6a24c287d50691a.yaml new file mode 100644 index 0000000000..9a6729ccf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-adb867864793eef1f6a24c287d50691a.yaml @@ -0,0 +1,58 @@ +id: updraftplus-adb867864793eef1f6a24c287d50691a + +info: + name: > + UpdraftPlus <= 1.23.10 - Cross-Site Request Forgery to Google Drive Storage Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1be11c5-0a44-4816-b6bf-d330cb51dbf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-c3cfc3a43625bfa414c3f27665757d46.yaml b/nuclei-templates/cve-less/plugins/updraftplus-c3cfc3a43625bfa414c3f27665757d46.yaml new file mode 100644 index 0000000000..77d52bb92c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-c3cfc3a43625bfa414c3f27665757d46.yaml @@ -0,0 +1,58 @@ +id: updraftplus-c3cfc3a43625bfa414c3f27665757d46 + +info: + name: > + UpdraftPlus <= 1.13.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71b3bec2-3fb2-4b0a-aa6d-5c761d0796e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-dfc59073972648e0153f8a7cda52c6bd.yaml b/nuclei-templates/cve-less/plugins/updraftplus-dfc59073972648e0153f8a7cda52c6bd.yaml new file mode 100644 index 0000000000..35179780fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-dfc59073972648e0153f8a7cda52c6bd.yaml @@ -0,0 +1,58 @@ +id: updraftplus-dfc59073972648e0153f8a7cda52c6bd + +info: + name: > + UpdraftPlus WordPress Backup Plugin <= 1.9.50 - Nonce Leak to Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c75bfba9-b25a-4966-835c-8d22736de809?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-eed5fef42a38602252bb39c1154507e2.yaml b/nuclei-templates/cve-less/plugins/updraftplus-eed5fef42a38602252bb39c1154507e2.yaml new file mode 100644 index 0000000000..ea6f77a40a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-eed5fef42a38602252bb39c1154507e2.yaml @@ -0,0 +1,58 @@ +id: updraftplus-eed5fef42a38602252bb39c1154507e2 + +info: + name: > + UpdraftPlus WordPress Backup Plugin <= 1.16.68 - Reflected Cross-Site Scripting via updraft_restore + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58c63799-7d6a-417d-9992-4ab425ae1f1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.7.4', '<= 1.16.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-f1749872ec46f0f647fe9218c75359fd.yaml b/nuclei-templates/cve-less/plugins/updraftplus-f1749872ec46f0f647fe9218c75359fd.yaml new file mode 100644 index 0000000000..9826187c81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-f1749872ec46f0f647fe9218c75359fd.yaml @@ -0,0 +1,58 @@ +id: updraftplus-f1749872ec46f0f647fe9218c75359fd + +info: + name: > + UpdraftPlus WordPress Backup Plugin < 1.6.59 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0987f9a5-eb11-4756-a09a-26dc66a8c690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus/" + google-query: inurl:"/wp-content/plugins/updraftplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-pro-50aa046ee7fe3b1495c79cf309977bf9.yaml b/nuclei-templates/cve-less/plugins/updraftplus-pro-50aa046ee7fe3b1495c79cf309977bf9.yaml new file mode 100644 index 0000000000..074508ba69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-pro-50aa046ee7fe3b1495c79cf309977bf9.yaml @@ -0,0 +1,58 @@ +id: updraftplus-pro-50aa046ee7fe3b1495c79cf309977bf9 + +info: + name: > + UpdraftPlus WordPress Backup Plugin < 1.22.3 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/266b1004-a374-4770-9659-bac3d167b585?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus-pro/" + google-query: inurl:"/wp-content/plugins/updraftplus-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.22.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/updraftplus-pro-84290819179c80fad98664a6919a3707.yaml b/nuclei-templates/cve-less/plugins/updraftplus-pro-84290819179c80fad98664a6919a3707.yaml new file mode 100644 index 0000000000..2e2392b1ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/updraftplus-pro-84290819179c80fad98664a6919a3707.yaml @@ -0,0 +1,58 @@ +id: updraftplus-pro-84290819179c80fad98664a6919a3707 + +info: + name: > + UpdraftPlus <= 1.9.63 and UpdraftPlus (paid) <= 2.9.63 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31db39a3-1b0b-4fdf-bef1-72308e38c9ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/updraftplus-pro/" + google-query: inurl:"/wp-content/plugins/updraftplus-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,updraftplus-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/updraftplus-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "updraftplus-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/upfiv-complete-all-in-one-seo-wizard-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/upfiv-complete-all-in-one-seo-wizard-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c8ceeac25a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/upfiv-complete-all-in-one-seo-wizard-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: upfiv-complete-all-in-one-seo-wizard-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/upfiv-complete-all-in-one-seo-wizard/" + google-query: inurl:"/wp-content/plugins/upfiv-complete-all-in-one-seo-wizard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,upfiv-complete-all-in-one-seo-wizard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/upfiv-complete-all-in-one-seo-wizard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "upfiv-complete-all-in-one-seo-wizard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/upload-file-type-settings-plugin-5edfe37e0774673d507ae94c41a64138.yaml b/nuclei-templates/cve-less/plugins/upload-file-type-settings-plugin-5edfe37e0774673d507ae94c41a64138.yaml new file mode 100644 index 0000000000..ba12077250 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/upload-file-type-settings-plugin-5edfe37e0774673d507ae94c41a64138.yaml @@ -0,0 +1,58 @@ +id: upload-file-type-settings-plugin-5edfe37e0774673d507ae94c41a64138 + +info: + name: > + Upload File Type Settings Plugin <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4dd4479-2f41-426f-b98c-7c654a82ccfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/upload-file-type-settings-plugin/" + google-query: inurl:"/wp-content/plugins/upload-file-type-settings-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,upload-file-type-settings-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/upload-file-type-settings-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "upload-file-type-settings-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/upload-media-by-url-bd97d62d56ce3ddf250859ccd5e19efb.yaml b/nuclei-templates/cve-less/plugins/upload-media-by-url-bd97d62d56ce3ddf250859ccd5e19efb.yaml new file mode 100644 index 0000000000..dafdd60f3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/upload-media-by-url-bd97d62d56ce3ddf250859ccd5e19efb.yaml @@ -0,0 +1,58 @@ +id: upload-media-by-url-bd97d62d56ce3ddf250859ccd5e19efb + +info: + name: > + Upload Media By URL <= 1.0.7 - Cross-Site Request Forgery via 'umbu_download' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18a0b8f2-4512-46a5-92a6-66d375c986dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/upload-media-by-url/" + google-query: inurl:"/wp-content/plugins/upload-media-by-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,upload-media-by-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/upload-media-by-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "upload-media-by-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uploader-38106c08054956ec9ec0eb985cd6a30a.yaml b/nuclei-templates/cve-less/plugins/uploader-38106c08054956ec9ec0eb985cd6a30a.yaml new file mode 100644 index 0000000000..1a8ee1bb60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uploader-38106c08054956ec9ec0eb985cd6a30a.yaml @@ -0,0 +1,58 @@ +id: uploader-38106c08054956ec9ec0eb985cd6a30a + +info: + name: > + Uploader <= 1.0.4 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99afde73-3f2b-4ba4-a82b-a6df42462384?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uploader/" + google-query: inurl:"/wp-content/plugins/uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uploader,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uploader-735ef8c38ee5ffe28e9bc5668b5d3f8c.yaml b/nuclei-templates/cve-less/plugins/uploader-735ef8c38ee5ffe28e9bc5668b5d3f8c.yaml new file mode 100644 index 0000000000..34475fd1bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uploader-735ef8c38ee5ffe28e9bc5668b5d3f8c.yaml @@ -0,0 +1,58 @@ +id: uploader-735ef8c38ee5ffe28e9bc5668b5d3f8c + +info: + name: > + Uploader <= 1.0.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14f86410-a21c-43ee-8d78-6fcce3a5b99b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uploader/" + google-query: inurl:"/wp-content/plugins/uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uploadify-b4755c12ff5cf84e1e1eeb1202ce1555.yaml b/nuclei-templates/cve-less/plugins/uploadify-b4755c12ff5cf84e1e1eeb1202ce1555.yaml new file mode 100644 index 0000000000..d5d22ecb1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uploadify-b4755c12ff5cf84e1e1eeb1202ce1555.yaml @@ -0,0 +1,58 @@ +id: uploadify-b4755c12ff5cf84e1e1eeb1202ce1555 + +info: + name: > + Uploadify <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4893d7a7-6e37-4b58-b7ae-53feb0c85ff5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uploadify/" + google-query: inurl:"/wp-content/plugins/uploadify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uploadify,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uploadify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uploadify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uploadify-integration-16a665c0b98de9adb6d4047ea6cb1588.yaml b/nuclei-templates/cve-less/plugins/uploadify-integration-16a665c0b98de9adb6d4047ea6cb1588.yaml new file mode 100644 index 0000000000..11ab8e8402 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uploadify-integration-16a665c0b98de9adb6d4047ea6cb1588.yaml @@ -0,0 +1,58 @@ +id: uploadify-integration-16a665c0b98de9adb6d4047ea6cb1588 + +info: + name: > + Uploadify Integration <= 0.9.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8fa1f97-72f6-4e84-bee4-0d3f7e16eb96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uploadify-integration/" + google-query: inurl:"/wp-content/plugins/uploadify-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uploadify-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uploadify-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uploadify-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-31f526f5fc6023df268597ecb0e81e2e.yaml b/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-31f526f5fc6023df268597ecb0e81e2e.yaml new file mode 100644 index 0000000000..d230da82c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-31f526f5fc6023df268597ecb0e81e2e.yaml @@ -0,0 +1,58 @@ +id: uploading-svgwebp-and-ico-files-31f526f5fc6023df268597ecb0e81e2e + +info: + name: > + Uploading SVG, WEBP and ICO files <= 1.0.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bc38197-3827-4c0e-a0a8-42d55f50605f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uploading-svgwebp-and-ico-files/" + google-query: inurl:"/wp-content/plugins/uploading-svgwebp-and-ico-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uploading-svgwebp-and-ico-files,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uploading-svgwebp-and-ico-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uploading-svgwebp-and-ico-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-3e6fcba7da4eb2d07480c9678c589c91.yaml b/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-3e6fcba7da4eb2d07480c9678c589c91.yaml new file mode 100644 index 0000000000..122100c26c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-3e6fcba7da4eb2d07480c9678c589c91.yaml @@ -0,0 +1,58 @@ +id: uploading-svgwebp-and-ico-files-3e6fcba7da4eb2d07480c9678c589c91 + +info: + name: > + Uploading SVG, WEBP and ICO files <= 1.2.1 - Authenticated (Author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eff83c19-c223-4f70-affc-adb0f560264a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uploading-svgwebp-and-ico-files/" + google-query: inurl:"/wp-content/plugins/uploading-svgwebp-and-ico-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uploading-svgwebp-and-ico-files,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uploading-svgwebp-and-ico-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uploading-svgwebp-and-ico-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-5c305c85e58387c07315e703af6d187a.yaml b/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-5c305c85e58387c07315e703af6d187a.yaml new file mode 100644 index 0000000000..ab8bb0dedf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/uploading-svgwebp-and-ico-files-5c305c85e58387c07315e703af6d187a.yaml @@ -0,0 +1,58 @@ +id: uploading-svgwebp-and-ico-files-5c305c85e58387c07315e703af6d187a + +info: + name: > + Uploading SVG, WEBP and ICO files <= 1.0.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9116cfea-eef8-480c-b75a-c6825d14f37a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/uploading-svgwebp-and-ico-files/" + google-query: inurl:"/wp-content/plugins/uploading-svgwebp-and-ico-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,uploading-svgwebp-and-ico-files,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/uploading-svgwebp-and-ico-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uploading-svgwebp-and-ico-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/upqode-google-maps-21d62382cf0e1f6a821aaecd2963e3e4.yaml b/nuclei-templates/cve-less/plugins/upqode-google-maps-21d62382cf0e1f6a821aaecd2963e3e4.yaml new file mode 100644 index 0000000000..5c068f715a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/upqode-google-maps-21d62382cf0e1f6a821aaecd2963e3e4.yaml @@ -0,0 +1,58 @@ +id: upqode-google-maps-21d62382cf0e1f6a821aaecd2963e3e4 + +info: + name: > + UpQode Google Maps <= 1.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6963b3ed-1b88-49bb-aa2e-99905c14f4c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/upqode-google-maps/" + google-query: inurl:"/wp-content/plugins/upqode-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,upqode-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/upqode-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "upqode-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/url-cloak-encrypt-2e334a9b30a8a16758bc7c2d1620372e.yaml b/nuclei-templates/cve-less/plugins/url-cloak-encrypt-2e334a9b30a8a16758bc7c2d1620372e.yaml new file mode 100644 index 0000000000..d97df9a6a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/url-cloak-encrypt-2e334a9b30a8a16758bc7c2d1620372e.yaml @@ -0,0 +1,58 @@ +id: url-cloak-encrypt-2e334a9b30a8a16758bc7c2d1620372e + +info: + name: > + Cloak & Encrypt < 3.8.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dd2705e-d78c-4f31-b28f-1ba8b2495c80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/url-cloak-encrypt/" + google-query: inurl:"/wp-content/plugins/url-cloak-encrypt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,url-cloak-encrypt,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/url-cloak-encrypt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "url-cloak-encrypt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/url-params-89a1787cccb90fd10317497361aed1fe.yaml b/nuclei-templates/cve-less/plugins/url-params-89a1787cccb90fd10317497361aed1fe.yaml new file mode 100644 index 0000000000..16d83d8018 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/url-params-89a1787cccb90fd10317497361aed1fe.yaml @@ -0,0 +1,58 @@ +id: url-params-89a1787cccb90fd10317497361aed1fe + +info: + name: > + URL Params <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98e22884-f7d6-47df-9b1b-9232c48e3685?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/url-params/" + google-query: inurl:"/wp-content/plugins/url-params/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,url-params,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/url-params/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "url-params" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/url-shortify-776a14f8c4824ce1b1f773d4a2d1c83a.yaml b/nuclei-templates/cve-less/plugins/url-shortify-776a14f8c4824ce1b1f773d4a2d1c83a.yaml new file mode 100644 index 0000000000..a70051145a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/url-shortify-776a14f8c4824ce1b1f773d4a2d1c83a.yaml @@ -0,0 +1,58 @@ +id: url-shortify-776a14f8c4824ce1b1f773d4a2d1c83a + +info: + name: > + URL Shortify <= 1.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a66388d6-cf78-48b2-9363-53d1f72d1ff0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/url-shortify/" + google-query: inurl:"/wp-content/plugins/url-shortify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,url-shortify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/url-shortify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "url-shortify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/url-shortify-7d73c621a5e8b7d0767350621fede4eb.yaml b/nuclei-templates/cve-less/plugins/url-shortify-7d73c621a5e8b7d0767350621fede4eb.yaml new file mode 100644 index 0000000000..ba3dc3a1c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/url-shortify-7d73c621a5e8b7d0767350621fede4eb.yaml @@ -0,0 +1,58 @@ +id: url-shortify-7d73c621a5e8b7d0767350621fede4eb + +info: + name: > + URL Shortify – Simple, Powerful and Easy URL Shortener Plugin For WordPress <= 1.6.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe82e9d2-764b-49da-a062-c5fc7c876396?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/url-shortify/" + google-query: inurl:"/wp-content/plugins/url-shortify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,url-shortify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/url-shortify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "url-shortify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/url-shortify-8987091ef60f2278d438fac982e52804.yaml b/nuclei-templates/cve-less/plugins/url-shortify-8987091ef60f2278d438fac982e52804.yaml new file mode 100644 index 0000000000..af4f0f0545 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/url-shortify-8987091ef60f2278d438fac982e52804.yaml @@ -0,0 +1,58 @@ +id: url-shortify-8987091ef60f2278d438fac982e52804 + +info: + name: > + URL Shortify <= 1.7.5 - Unauthenticated Stored Cross-Site Scripting via Referrer Header + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b452283-9f0d-469b-b1b8-4bd253f9ea1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/url-shortify/" + google-query: inurl:"/wp-content/plugins/url-shortify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,url-shortify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/url-shortify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "url-shortify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/url-shortify-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/url-shortify-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f8aec49bb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/url-shortify-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: url-shortify-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/url-shortify/" + google-query: inurl:"/wp-content/plugins/url-shortify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,url-shortify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/url-shortify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "url-shortify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/url-shortify-c2468d3ae2dd3b63e789f3e42f85078a.yaml b/nuclei-templates/cve-less/plugins/url-shortify-c2468d3ae2dd3b63e789f3e42f85078a.yaml new file mode 100644 index 0000000000..3a6d57f3ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/url-shortify-c2468d3ae2dd3b63e789f3e42f85078a.yaml @@ -0,0 +1,58 @@ +id: url-shortify-c2468d3ae2dd3b63e789f3e42f85078a + +info: + name: > + URL Shortify <= 1.7.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddc4b758-5a1e-4d0a-949e-869fcd9df0bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/url-shortify/" + google-query: inurl:"/wp-content/plugins/url-shortify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,url-shortify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/url-shortify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "url-shortify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/urvanov-syntax-highlighter-05f9b585294ccf338dddc9365df56f99.yaml b/nuclei-templates/cve-less/plugins/urvanov-syntax-highlighter-05f9b585294ccf338dddc9365df56f99.yaml new file mode 100644 index 0000000000..6e58de4f3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/urvanov-syntax-highlighter-05f9b585294ccf338dddc9365df56f99.yaml @@ -0,0 +1,58 @@ +id: urvanov-syntax-highlighter-05f9b585294ccf338dddc9365df56f99 + +info: + name: > + Urvanov Syntax Highlighter <= 2.8.33 - Cross-Site Request Forgery via init_ajax + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c85fa64-4761-4b92-bd4f-7c220cf18288?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/urvanov-syntax-highlighter/" + google-query: inurl:"/wp-content/plugins/urvanov-syntax-highlighter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,urvanov-syntax-highlighter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/urvanov-syntax-highlighter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "urvanov-syntax-highlighter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-030644f38346879c8062677144e765a1.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-030644f38346879c8062677144e765a1.yaml new file mode 100644 index 0000000000..8fe961b951 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-030644f38346879c8062677144e765a1.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-030644f38346879c8062677144e765a1 + +info: + name: > + Welcart e-Commerce <= 2.1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ecd712-a7b3-40e2-b982-be8b58e9b8c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-038cd4d7f3a85c2e02153b9f3d732338.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-038cd4d7f3a85c2e02153b9f3d732338.yaml new file mode 100644 index 0000000000..2931fa04e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-038cd4d7f3a85c2e02153b9f3d732338.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-038cd4d7f3a85c2e02153b9f3d732338 + +info: + name: > + Welcart e-Commerce <= 2.8.3 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad0ed141-3d17-4fff-b788-7ff43f79d04c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-096aec3054df6ba2321176f02f5a1d37.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-096aec3054df6ba2321176f02f5a1d37.yaml new file mode 100644 index 0000000000..ae39c7ab6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-096aec3054df6ba2321176f02f5a1d37.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-096aec3054df6ba2321176f02f5a1d37 + +info: + name: > + Welcart e-Commerce <= 2.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/162afd58-3534-401b-9119-c1c26e15cd0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-1dc13a6a71c3d10751ef8c16460e007d.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-1dc13a6a71c3d10751ef8c16460e007d.yaml new file mode 100644 index 0000000000..60ea444ead --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-1dc13a6a71c3d10751ef8c16460e007d.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-1dc13a6a71c3d10751ef8c16460e007d + +info: + name: > + Welcart e-Commerce < 1.8.3 - Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/321d0121-5cc9-4736-89b0-228e45b48b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-1e7c916b690d74cb7822c04675caf429.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-1e7c916b690d74cb7822c04675caf429.yaml new file mode 100644 index 0000000000..337ecdedf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-1e7c916b690d74cb7822c04675caf429.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-1e7c916b690d74cb7822c04675caf429 + +info: + name: > + Welcart e-Commerce <= 2.9.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f59004bb-b026-4137-a332-f46a09237e7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-210ee561ccacfc2a5ebd14551c7ee8ef.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-210ee561ccacfc2a5ebd14551c7ee8ef.yaml new file mode 100644 index 0000000000..a04275d788 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-210ee561ccacfc2a5ebd14551c7ee8ef.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-210ee561ccacfc2a5ebd14551c7ee8ef + +info: + name: > + Welcart e-Commerce 2.6.0-2.7.7 - Information Disclosure via Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8ab165-57b8-4509-86b8-6e5226812264?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.6.0', '<= 2.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-21d8c490b865a29263e262b969e2ce3d.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-21d8c490b865a29263e262b969e2ce3d.yaml new file mode 100644 index 0000000000..67b761a5eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-21d8c490b865a29263e262b969e2ce3d.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-21d8c490b865a29263e262b969e2ce3d + +info: + name: > + Welcart e-Commerce <= 2.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/513f4a39-afba-4819-abf2-6ed168d11dfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-229b28e3351ab434cc4be3a1c3322160.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-229b28e3351ab434cc4be3a1c3322160.yaml new file mode 100644 index 0000000000..2c9e083853 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-229b28e3351ab434cc4be3a1c3322160.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-229b28e3351ab434cc4be3a1c3322160 + +info: + name: > + Welcart e-Commerce <= 2.8.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f4c9a5b-93ec-4979-921a-91134cb09566?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-2711228331aed4ad8d57b410230e7202.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-2711228331aed4ad8d57b410230e7202.yaml new file mode 100644 index 0000000000..2e21528fda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-2711228331aed4ad8d57b410230e7202.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-2711228331aed4ad8d57b410230e7202 + +info: + name: > + Welcart e-Commerce <= 2.9.6 - Authenticated (Administrator+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2677cea6-d60d-4e10-afd7-e088a5592b19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-27b0c9418a17896ce00c7f804b61f8d8.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-27b0c9418a17896ce00c7f804b61f8d8.yaml new file mode 100644 index 0000000000..d9555ab11e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-27b0c9418a17896ce00c7f804b61f8d8.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-27b0c9418a17896ce00c7f804b61f8d8 + +info: + name: > + Welcart e-Commerce <= 2.8.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b71805c-15bb-4cde-b91f-4f3e9b7ab520?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-2ddf644540fef01e3b57f8fb75bbef89.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-2ddf644540fef01e3b57f8fb75bbef89.yaml new file mode 100644 index 0000000000..d606e091e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-2ddf644540fef01e3b57f8fb75bbef89.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-2ddf644540fef01e3b57f8fb75bbef89 + +info: + name: > + Welcart e-Commerce <= 2.9.3 - Authenticated(Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a328643a-ab12-427e-9bcd-2d40738afb61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-2ff5131571517bfee0f572e860d19db4.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-2ff5131571517bfee0f572e860d19db4.yaml new file mode 100644 index 0000000000..766a19ca7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-2ff5131571517bfee0f572e860d19db4.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-2ff5131571517bfee0f572e860d19db4 + +info: + name: > + Welcart e-Commerce <= 2.8.5 - Authenticated (Subscriber+) Information Disclosure and PHAR deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/518be2c6-36ca-4015-8b7f-451a806c7b1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-31114b788d1703e5027b3d9e13cfe612.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-31114b788d1703e5027b3d9e13cfe612.yaml new file mode 100644 index 0000000000..7a1d0e1211 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-31114b788d1703e5027b3d9e13cfe612.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-31114b788d1703e5027b3d9e13cfe612 + +info: + name: > + Welcart e-Commerce <= 1.9.35 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c694bce-e389-492a-827d-ae5293730612?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-4b4264267e112c94d109dcec42a2f42e.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-4b4264267e112c94d109dcec42a2f42e.yaml new file mode 100644 index 0000000000..e2fb224dc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-4b4264267e112c94d109dcec42a2f42e.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-4b4264267e112c94d109dcec42a2f42e + +info: + name: > + Welcart e-Commerce <= 2.9.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f23aa0e-eb1f-4310-9615-d67eb39389fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-4cfd2c744e2f57cb62950af3a51becf5.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-4cfd2c744e2f57cb62950af3a51becf5.yaml new file mode 100644 index 0000000000..ac23ada94d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-4cfd2c744e2f57cb62950af3a51becf5.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-4cfd2c744e2f57cb62950af3a51becf5 + +info: + name: > + Welcart e-Commerce <= 2.9.14 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61799fbc-05dc-4de9-90f9-8712ba554607?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-4f7978d908f1ff8c4cd9a4c00b97533c.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-4f7978d908f1ff8c4cd9a4c00b97533c.yaml new file mode 100644 index 0000000000..8a0353cd76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-4f7978d908f1ff8c4cd9a4c00b97533c.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-4f7978d908f1ff8c4cd9a4c00b97533c + +info: + name: > + Welcart e-Commerce < 1.4.18 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec2edcdf-3a0c-40bc-8b33-1ad15cad5acb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-4fe7d1bc981304a877651572e2d01606.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-4fe7d1bc981304a877651572e2d01606.yaml new file mode 100644 index 0000000000..54ad522f99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-4fe7d1bc981304a877651572e2d01606.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-4fe7d1bc981304a877651572e2d01606 + +info: + name: > + Welcart e-Commerce <= 1.8.2 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f8f6ade-84a2-4a42-9208-a74f5ebe19b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-536d118f42dde4ae5564cdbfac7489ee.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-536d118f42dde4ae5564cdbfac7489ee.yaml new file mode 100644 index 0000000000..dcffa29883 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-536d118f42dde4ae5564cdbfac7489ee.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-536d118f42dde4ae5564cdbfac7489ee + +info: + name: > + Welcart e-Commerce <= 2.8.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6572568-5586-4ed9-b0e2-32509b42ed31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-559ca835d1ba91752b5fda135b9252b7.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-559ca835d1ba91752b5fda135b9252b7.yaml new file mode 100644 index 0000000000..1459ba7fec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-559ca835d1ba91752b5fda135b9252b7.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-559ca835d1ba91752b5fda135b9252b7 + +info: + name: > + Welcart e-Commerce <= 2.9.5 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91f86c22-94db-4c43-985a-2f3dd96ece21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-72bbf06194176f982771d77cb4853bda.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-72bbf06194176f982771d77cb4853bda.yaml new file mode 100644 index 0000000000..8cfe0db9f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-72bbf06194176f982771d77cb4853bda.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-72bbf06194176f982771d77cb4853bda + +info: + name: > + Welcart e-Commerce < 1.5.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be6c08b9-bba7-4780-99b9-4b80e6b4872a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-774c036e84ef68a0e067057a5470d4c6.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-774c036e84ef68a0e067057a5470d4c6.yaml new file mode 100644 index 0000000000..591745c673 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-774c036e84ef68a0e067057a5470d4c6.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-774c036e84ef68a0e067057a5470d4c6 + +info: + name: > + Welcart e-Commerce < 2.2.8 - Missing Capabilities Check to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/671f5ba5-1f18-49fa-aa97-eaebdb3417bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-87df231a3fe89988f05561dc4a2eda17.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-87df231a3fe89988f05561dc4a2eda17.yaml new file mode 100644 index 0000000000..769147ac01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-87df231a3fe89988f05561dc4a2eda17.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-87df231a3fe89988f05561dc4a2eda17 + +info: + name: > + Welcart e-Commerce < 1.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2022fa8b-2b2a-43a3-9447-90eed326f187?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-88d558d73b2f64520cd166163d121c99.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-88d558d73b2f64520cd166163d121c99.yaml new file mode 100644 index 0000000000..fe1c44fff0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-88d558d73b2f64520cd166163d121c99.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-88d558d73b2f64520cd166163d121c99 + +info: + name: > + Welcart e-Commerce 2.6.10-2.8.4 - Information Disclosure via Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdfabd43-0ffa-4c25-aa72-0572e7007a01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.6.10', '<= 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-8cf84dc81a40a5707b5bcb6a5de08836.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-8cf84dc81a40a5707b5bcb6a5de08836.yaml new file mode 100644 index 0000000000..fcd95852c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-8cf84dc81a40a5707b5bcb6a5de08836.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-8cf84dc81a40a5707b5bcb6a5de08836 + +info: + name: > + Welcart e-Commerce <= 2.8.10 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/772c9330-97d5-42d5-a49c-d9a86a14b235?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-b635a88aed40383d80b165aae1551858.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-b635a88aed40383d80b165aae1551858.yaml new file mode 100644 index 0000000000..ae9edf83f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-b635a88aed40383d80b165aae1551858.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-b635a88aed40383d80b165aae1551858 + +info: + name: > + Welcart e-Commerce <= 1.3.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d681fcaf-c7b3-496f-b0d8-a8ed48901cec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-c124fe326fda2227cda364e6977789ed.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-c124fe326fda2227cda364e6977789ed.yaml new file mode 100644 index 0000000000..9422fff736 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-c124fe326fda2227cda364e6977789ed.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-c124fe326fda2227cda364e6977789ed + +info: + name: > + Welcart e-Commerce <= 1.8.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/103ce24e-1c21-4c25-b3d0-6f595bf58979?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-c85d6be596b55b91d137e8053b85f064.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-c85d6be596b55b91d137e8053b85f064.yaml new file mode 100644 index 0000000000..6913d23cf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-c85d6be596b55b91d137e8053b85f064.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-c85d6be596b55b91d137e8053b85f064 + +info: + name: > + Welcart e-Commerce <= 2.8.21 - Authenticated(Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5eb9b1f-39d5-4c5d-8fb3-71d4bbe5f43a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-cfe5fa3015f2fc55d2b05163019ba81a.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-cfe5fa3015f2fc55d2b05163019ba81a.yaml new file mode 100644 index 0000000000..64556a019e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-cfe5fa3015f2fc55d2b05163019ba81a.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-cfe5fa3015f2fc55d2b05163019ba81a + +info: + name: > + Welcart e-Commerce <= 2.8.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b27b2e40-c703-4fa0-bff0-788e7a0351c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-defc78f281b1b753471f78628f828031.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-defc78f281b1b753471f78628f828031.yaml new file mode 100644 index 0000000000..638431680e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-defc78f281b1b753471f78628f828031.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-defc78f281b1b753471f78628f828031 + +info: + name: > + Welcart e-Commerce <= 2.8.4 - Authenticated (Subscriber+) Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f87df7cc-54bb-454c-94be-c8c4768cbe44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-e3d6a99c1f59024071ddea4c2fb68561.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-e3d6a99c1f59024071ddea4c2fb68561.yaml new file mode 100644 index 0000000000..60a0e7e6fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-e3d6a99c1f59024071ddea4c2fb68561.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-e3d6a99c1f59024071ddea4c2fb68561 + +info: + name: > + Welcart e-Commerce < 2.2.8 - Missing Capabilities Check to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d82e856b-c8c9-4139-ad54-89368e3b7125?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-e4a8e0f95ee7761efbfd23ea0c0e9596.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-e4a8e0f95ee7761efbfd23ea0c0e9596.yaml new file mode 100644 index 0000000000..dc40d45424 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-e4a8e0f95ee7761efbfd23ea0c0e9596.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-e4a8e0f95ee7761efbfd23ea0c0e9596 + +info: + name: > + Welcart e-Commerce <= 2.9.4 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23399606-20b6-4d0b-b613-06dc838dc1e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-ed4c279d09c7012524c7ccab923e2ae4.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-ed4c279d09c7012524c7ccab923e2ae4.yaml new file mode 100644 index 0000000000..deea1bd616 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-ed4c279d09c7012524c7ccab923e2ae4.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-ed4c279d09c7012524c7ccab923e2ae4 + +info: + name: > + Welcart e-Commerce < 1.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16a4ebde-7c92-4ad2-9c8d-3bef0a8c600b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-f06d882e6e9ca473dc32139014858b23.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-f06d882e6e9ca473dc32139014858b23.yaml new file mode 100644 index 0000000000..d6769b8f9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-f06d882e6e9ca473dc32139014858b23.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-f06d882e6e9ca473dc32139014858b23 + +info: + name: > + Welcart e-Commerce < 1.8.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b86a774-a420-41a8-85ad-44fe8b32d4c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-f56dc5bbdc913e57ded42347de5ef8aa.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-f56dc5bbdc913e57ded42347de5ef8aa.yaml new file mode 100644 index 0000000000..22aa25b327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-f56dc5bbdc913e57ded42347de5ef8aa.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-f56dc5bbdc913e57ded42347de5ef8aa + +info: + name: > + Welcart e-Commerce <= 2.8.21 - Authenticated(level_5+) SQL Injection via get_logs + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35dadb9c-f0c6-4b74-bb31-5e9d504b3db5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-fc6e5379eaab092cc08185fd85a10348.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-fc6e5379eaab092cc08185fd85a10348.yaml new file mode 100644 index 0000000000..232b12d7b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-fc6e5379eaab092cc08185fd85a10348.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-fc6e5379eaab092cc08185fd85a10348 + +info: + name: > + Welcart e-Commerce <= 2.8.21 - Authenticated(Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a908ac17-666f-4725-86f4-c9af4589fb69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usc-e-shop-fdd08ff4357466d1ef831234fd4686a2.yaml b/nuclei-templates/cve-less/plugins/usc-e-shop-fdd08ff4357466d1ef831234fd4686a2.yaml new file mode 100644 index 0000000000..d95b7c2095 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usc-e-shop-fdd08ff4357466d1ef831234fd4686a2.yaml @@ -0,0 +1,58 @@ +id: usc-e-shop-fdd08ff4357466d1ef831234fd4686a2 + +info: + name: > + Welcart e-Commerce <= 2.9.4 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f690e67c-119f-4ea6-9505-101e7f7a3dea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usc-e-shop/" + google-query: inurl:"/wp-content/plugins/usc-e-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usc-e-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usc-e-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usc-e-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/use-any-font-4c69021959bdea7c58c778958310ad50.yaml b/nuclei-templates/cve-less/plugins/use-any-font-4c69021959bdea7c58c778958310ad50.yaml new file mode 100644 index 0000000000..4896048fe8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/use-any-font-4c69021959bdea7c58c778958310ad50.yaml @@ -0,0 +1,58 @@ +id: use-any-font-4c69021959bdea7c58c778958310ad50 + +info: + name: > + Use Any Font <= 6.1.7 - Cross-Site Request Forgery to API Key Deactivation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e60428e-1641-470f-a6f1-7c2b4140a6bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/use-any-font/" + google-query: inurl:"/wp-content/plugins/use-any-font/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,use-any-font,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/use-any-font/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "use-any-font" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/use-any-font-bdb0853cb6d84b9abe929218f47378a4.yaml b/nuclei-templates/cve-less/plugins/use-any-font-bdb0853cb6d84b9abe929218f47378a4.yaml new file mode 100644 index 0000000000..8361e99c44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/use-any-font-bdb0853cb6d84b9abe929218f47378a4.yaml @@ -0,0 +1,58 @@ +id: use-any-font-bdb0853cb6d84b9abe929218f47378a4 + +info: + name: > + Use Any Font <= 6.2.0 - Unauthenticated Arbitrary CSS Appending + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb6de4da-0d60-4332-be25-5521e430a4fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/use-any-font/" + google-query: inurl:"/wp-content/plugins/use-any-font/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,use-any-font,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/use-any-font/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "use-any-font" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/use-any-font-ce93f109973b52b249a7106eb15a123c.yaml b/nuclei-templates/cve-less/plugins/use-any-font-ce93f109973b52b249a7106eb15a123c.yaml new file mode 100644 index 0000000000..710e123b8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/use-any-font-ce93f109973b52b249a7106eb15a123c.yaml @@ -0,0 +1,58 @@ +id: use-any-font-ce93f109973b52b249a7106eb15a123c + +info: + name: > + Use Any Font | Custom Font Uploader <= 6.2.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58884dcb-dad3-4856-aa54-c5b769d4f9e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/use-any-font/" + google-query: inurl:"/wp-content/plugins/use-any-font/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,use-any-font,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/use-any-font/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "use-any-font" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/use-memcached-f91c9276892eda169cc400a6c1591e0c.yaml b/nuclei-templates/cve-less/plugins/use-memcached-f91c9276892eda169cc400a6c1591e0c.yaml new file mode 100644 index 0000000000..cc826d3f92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/use-memcached-f91c9276892eda169cc400a6c1591e0c.yaml @@ -0,0 +1,58 @@ +id: use-memcached-f91c9276892eda169cc400a6c1591e0c + +info: + name: > + Use Memcached <= 1.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b63f4de2-32e1-4c5e-a64d-fb66d2e2b3a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/use-memcached/" + google-query: inurl:"/wp-content/plugins/use-memcached/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,use-memcached,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/use-memcached/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "use-memcached" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/use-your-drive-97b7c398dfbcdf367ba6ab6fa80d3110.yaml b/nuclei-templates/cve-less/plugins/use-your-drive-97b7c398dfbcdf367ba6ab6fa80d3110.yaml new file mode 100644 index 0000000000..e91d6c1034 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/use-your-drive-97b7c398dfbcdf367ba6ab6fa80d3110.yaml @@ -0,0 +1,58 @@ +id: use-your-drive-97b7c398dfbcdf367ba6ab6fa80d3110 + +info: + name: > + Use-Your-Drive < 1.18.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1087f744-44c2-4fa1-92d9-872a5bfd571d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/use-your-drive/" + google-query: inurl:"/wp-content/plugins/use-your-drive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,use-your-drive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/use-your-drive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "use-your-drive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/useful-banner-manager-663fd6040ba08a6cf95a5d56aa372c7d.yaml b/nuclei-templates/cve-less/plugins/useful-banner-manager-663fd6040ba08a6cf95a5d56aa372c7d.yaml new file mode 100644 index 0000000000..ec7d253976 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/useful-banner-manager-663fd6040ba08a6cf95a5d56aa372c7d.yaml @@ -0,0 +1,58 @@ +id: useful-banner-manager-663fd6040ba08a6cf95a5d56aa372c7d + +info: + name: > + Useful Banner Manager <= 1.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57a39691-8fff-4e62-a03a-70b428025d77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/useful-banner-manager/" + google-query: inurl:"/wp-content/plugins/useful-banner-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,useful-banner-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/useful-banner-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "useful-banner-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-access-manager-17f86cc37ff70d41fe6fd01dc9d4117f.yaml b/nuclei-templates/cve-less/plugins/user-access-manager-17f86cc37ff70d41fe6fd01dc9d4117f.yaml new file mode 100644 index 0000000000..70dd3550aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-access-manager-17f86cc37ff70d41fe6fd01dc9d4117f.yaml @@ -0,0 +1,58 @@ +id: user-access-manager-17f86cc37ff70d41fe6fd01dc9d4117f + +info: + name: > + User Access Manager <= 2.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c6e233f-c612-4625-8097-0637e976190d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-access-manager/" + google-query: inurl:"/wp-content/plugins/user-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-access-manager-6233e05856841c02f1c38924069a60ef.yaml b/nuclei-templates/cve-less/plugins/user-access-manager-6233e05856841c02f1c38924069a60ef.yaml new file mode 100644 index 0000000000..bf5e716026 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-access-manager-6233e05856841c02f1c38924069a60ef.yaml @@ -0,0 +1,58 @@ +id: user-access-manager-6233e05856841c02f1c38924069a60ef + +info: + name: > + User Access Manager <= 2.2.16 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88c5752c-ef4e-4343-810e-ecf1f33d3538?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-access-manager/" + google-query: inurl:"/wp-content/plugins/user-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-access-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-access-manager-96bfdb264056a59de7cf266b01d0316c.yaml b/nuclei-templates/cve-less/plugins/user-access-manager-96bfdb264056a59de7cf266b01d0316c.yaml new file mode 100644 index 0000000000..9f3e63e965 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-access-manager-96bfdb264056a59de7cf266b01d0316c.yaml @@ -0,0 +1,58 @@ +id: user-access-manager-96bfdb264056a59de7cf266b01d0316c + +info: + name: > + User Access Manager < 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14d81210-9360-4153-9b5a-35d12cc0cbf0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-access-manager/" + google-query: inurl:"/wp-content/plugins/user-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-access-manager-a6c764475f8c46f0276397b9437e1a40.yaml b/nuclei-templates/cve-less/plugins/user-access-manager-a6c764475f8c46f0276397b9437e1a40.yaml new file mode 100644 index 0000000000..e1027f5833 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-access-manager-a6c764475f8c46f0276397b9437e1a40.yaml @@ -0,0 +1,58 @@ +id: user-access-manager-a6c764475f8c46f0276397b9437e1a40 + +info: + name: > + User Access Manager <= 1.2.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b3268c2-7cdd-4839-9859-42218d4d632b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-access-manager/" + google-query: inurl:"/wp-content/plugins/user-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activation-email-044b344fe9d706549aa3d52095be3dd2.yaml b/nuclei-templates/cve-less/plugins/user-activation-email-044b344fe9d706549aa3d52095be3dd2.yaml new file mode 100644 index 0000000000..7944fac131 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activation-email-044b344fe9d706549aa3d52095be3dd2.yaml @@ -0,0 +1,58 @@ +id: user-activation-email-044b344fe9d706549aa3d52095be3dd2 + +info: + name: > + User Activation Email <= 1.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a7687fe-6246-4bd3-9d4f-e7fa6398f265?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activation-email/" + google-query: inurl:"/wp-content/plugins/user-activation-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activation-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activation-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activation-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-a9046caf138583ab295d7c397e7fc905.yaml b/nuclei-templates/cve-less/plugins/user-activity-a9046caf138583ab295d7c397e7fc905.yaml new file mode 100644 index 0000000000..8775c7fd78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-a9046caf138583ab295d7c397e7fc905.yaml @@ -0,0 +1,58 @@ +id: user-activity-a9046caf138583ab295d7c397e7fc905 + +info: + name: > + User Activity <= 1.0.1 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a38a72a-7336-4aa5-8491-6879dfa4d0ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity/" + google-query: inurl:"/wp-content/plugins/user-activity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-01d78cbce70a1dfeb3bb295a9cdc3356.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-01d78cbce70a1dfeb3bb295a9cdc3356.yaml new file mode 100644 index 0000000000..705b1ba5ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-01d78cbce70a1dfeb3bb295a9cdc3356.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-01d78cbce70a1dfeb3bb295a9cdc3356 + +info: + name: > + User Activity Log <= 1.4.6 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57be47e2-9aac-42bd-af6a-5060d2f86449?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-02cae5f64c7458f6a2f1e1b080ca9389.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-02cae5f64c7458f6a2f1e1b080ca9389.yaml new file mode 100644 index 0000000000..6e29f0d7b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-02cae5f64c7458f6a2f1e1b080ca9389.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-02cae5f64c7458f6a2f1e1b080ca9389 + +info: + name: > + User Activity Log <= 1.6.5 - Unauthenticated Data Export to Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb7e9ea4-c450-491f-b924-47ed4abec64a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-1e01dff414d04212c3c6453a2d281edc.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-1e01dff414d04212c3c6453a2d281edc.yaml new file mode 100644 index 0000000000..42c2f94130 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-1e01dff414d04212c3c6453a2d281edc.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-1e01dff414d04212c3c6453a2d281edc + +info: + name: > + User Activity Log <= 1.6.2 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64be6e85-00c9-49f5-9ee2-08dbe434a848?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-60c68d204f0a8a653bebafe6c6059142.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-60c68d204f0a8a653bebafe6c6059142.yaml new file mode 100644 index 0000000000..33f4c5454f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-60c68d204f0a8a653bebafe6c6059142.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-60c68d204f0a8a653bebafe6c6059142 + +info: + name: > + User Activity Log <= 1.6.2 - Unauthenticated SQL Injection via username + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8483196e-f476-41e5-a988-bcd8a9952a64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-784f32f658992df1fedbc6c38d15c1f5.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-784f32f658992df1fedbc6c38d15c1f5.yaml new file mode 100644 index 0000000000..f58c90373c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-784f32f658992df1fedbc6c38d15c1f5.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-784f32f658992df1fedbc6c38d15c1f5 + +info: + name: > + User Activity Log <= 1.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/001e066f-6add-4426-8cd7-32229a9188d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-cf0ba687a6ace638f9be60d1f6b85b3d.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-cf0ba687a6ace638f9be60d1f6b85b3d.yaml new file mode 100644 index 0000000000..eedd97f490 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-cf0ba687a6ace638f9be60d1f6b85b3d.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-cf0ba687a6ace638f9be60d1f6b85b3d + +info: + name: > + User Activity Log <= 1.6.6 - IP Address Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77462f1f-f7d8-4d11-aaf1-82395897fcfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-e27368e4785bcd7f22809f69244573f8.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-e27368e4785bcd7f22809f69244573f8.yaml new file mode 100644 index 0000000000..ee78c13203 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-e27368e4785bcd7f22809f69244573f8.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-e27368e4785bcd7f22809f69244573f8 + +info: + name: > + User Activity Log <= 1.9 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9df788e-a92e-4519-9e23-8aed08479b68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-e95622a863397746d0d019b16e681085.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-e95622a863397746d0d019b16e681085.yaml new file mode 100644 index 0000000000..a96ff3e751 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-e95622a863397746d0d019b16e681085.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-e95622a863397746d0d019b16e681085 + +info: + name: > + User Activity Log <= 1.6.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4ca985e-cae1-4e26-ad2d-413724cfd45d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-ee6d7181de7e06427ee243be8abb06fb.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-ee6d7181de7e06427ee243be8abb06fb.yaml new file mode 100644 index 0000000000..48853ee32a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-ee6d7181de7e06427ee243be8abb06fb.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-ee6d7181de7e06427ee243be8abb06fb + +info: + name: > + User Activity Log <= 1.6.2 - Authenticated(Administrator+) SQL Injection via txtsearch + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17a787da-5630-42ec-b5b0-47435db765a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log/" + google-query: inurl:"/wp-content/plugins/user-activity-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-pro-580004f61a42f3e8c462a7bbd946dd47.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-pro-580004f61a42f3e8c462a7bbd946dd47.yaml new file mode 100644 index 0000000000..d79e3af5f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-pro-580004f61a42f3e8c462a7bbd946dd47.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-pro-580004f61a42f3e8c462a7bbd946dd47 + +info: + name: > + User Activity Log Pro <= 2.3.4 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2054dcd-1a65-48bc-9dcf-824fa448921d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log-pro/" + google-query: inurl:"/wp-content/plugins/user-activity-log-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-pro-948ee2018064c5e8007e811b1634bf17.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-pro-948ee2018064c5e8007e811b1634bf17.yaml new file mode 100644 index 0000000000..30825b2038 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-pro-948ee2018064c5e8007e811b1634bf17.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-pro-948ee2018064c5e8007e811b1634bf17 + +info: + name: > + User Activity Log Pro <= 2.3.3 - Unauthenticated Stored Cross-Site Scripting via User-Agent header + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcf205a3-be7b-49e7-ba02-3f69632ed65f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log-pro/" + google-query: inurl:"/wp-content/plugins/user-activity-log-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-log-pro-cab9aea0ec63087506e1760b3541b9ef.yaml b/nuclei-templates/cve-less/plugins/user-activity-log-pro-cab9aea0ec63087506e1760b3541b9ef.yaml new file mode 100644 index 0000000000..6cdb2a12a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-log-pro-cab9aea0ec63087506e1760b3541b9ef.yaml @@ -0,0 +1,58 @@ +id: user-activity-log-pro-cab9aea0ec63087506e1760b3541b9ef + +info: + name: > + User Activity Log Pro <= 2.3.3 - Tracking Bypass via IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9666913e-55a3-441c-85ef-8a12756e37ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-log-pro/" + google-query: inurl:"/wp-content/plugins/user-activity-log-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-log-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-log-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-log-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-tracking-and-log-86f9a1d2e10b6f707453e4230d5a4770.yaml b/nuclei-templates/cve-less/plugins/user-activity-tracking-and-log-86f9a1d2e10b6f707453e4230d5a4770.yaml new file mode 100644 index 0000000000..a2e2ef13ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-tracking-and-log-86f9a1d2e10b6f707453e4230d5a4770.yaml @@ -0,0 +1,58 @@ +id: user-activity-tracking-and-log-86f9a1d2e10b6f707453e4230d5a4770 + +info: + name: > + User Activity Tracking and Log <= 4.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/420f56de-4c83-4c9f-933c-0422467bbc7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-tracking-and-log/" + google-query: inurl:"/wp-content/plugins/user-activity-tracking-and-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-tracking-and-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-tracking-and-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-tracking-and-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-activity-tracking-and-log-aceb5c3c8c29eefd527f85b61425b8aa.yaml b/nuclei-templates/cve-less/plugins/user-activity-tracking-and-log-aceb5c3c8c29eefd527f85b61425b8aa.yaml new file mode 100644 index 0000000000..d5406f7eb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-activity-tracking-and-log-aceb5c3c8c29eefd527f85b61425b8aa.yaml @@ -0,0 +1,58 @@ +id: user-activity-tracking-and-log-aceb5c3c8c29eefd527f85b61425b8aa + +info: + name: > + User Activity Tracking and Log <= 4.1.3 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e2268fc-5f29-4c69-9585-81240354ae77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-activity-tracking-and-log/" + google-query: inurl:"/wp-content/plugins/user-activity-tracking-and-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-activity-tracking-and-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-activity-tracking-and-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-activity-tracking-and-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-avatar-1a7905e3891eb108823307ae3d6bb4ec.yaml b/nuclei-templates/cve-less/plugins/user-avatar-1a7905e3891eb108823307ae3d6bb4ec.yaml new file mode 100644 index 0000000000..34b6c4cffe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-avatar-1a7905e3891eb108823307ae3d6bb4ec.yaml @@ -0,0 +1,58 @@ +id: user-avatar-1a7905e3891eb108823307ae3d6bb4ec + +info: + name: > + User Avatar <= 1.4.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6903e37e-5251-47bb-8023-755821af4689?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-avatar/" + google-query: inurl:"/wp-content/plugins/user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-avatar-reloaded-48546947f3dbea6a3d1c0687b8db90bb.yaml b/nuclei-templates/cve-less/plugins/user-avatar-reloaded-48546947f3dbea6a3d1c0687b8db90bb.yaml new file mode 100644 index 0000000000..90cd7e8fff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-avatar-reloaded-48546947f3dbea6a3d1c0687b8db90bb.yaml @@ -0,0 +1,58 @@ +id: user-avatar-reloaded-48546947f3dbea6a3d1c0687b8db90bb + +info: + name: > + User Avatar – Reloaded <= 1.2.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3ecf638-dfc4-4e9d-bca8-cd008227e934?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-avatar-reloaded/" + google-query: inurl:"/wp-content/plugins/user-avatar-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-avatar-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-avatar-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-avatar-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-blocker-78588e22a79e99f07ccbdc69fa52af87.yaml b/nuclei-templates/cve-less/plugins/user-blocker-78588e22a79e99f07ccbdc69fa52af87.yaml new file mode 100644 index 0000000000..fd6a5cd3ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-blocker-78588e22a79e99f07ccbdc69fa52af87.yaml @@ -0,0 +1,58 @@ +id: user-blocker-78588e22a79e99f07ccbdc69fa52af87 + +info: + name: > + User Blocker <= 1.5.5 - Authenticated (Admin+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ee6dedb-72bc-43b0-a7cb-9069533df705?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-blocker/" + google-query: inurl:"/wp-content/plugins/user-blocker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-blocker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-blocker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-blocker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-control-18d2c8e769b3a1ea9cd3276288e3748d.yaml b/nuclei-templates/cve-less/plugins/user-control-18d2c8e769b3a1ea9cd3276288e3748d.yaml new file mode 100644 index 0000000000..6be8e423d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-control-18d2c8e769b3a1ea9cd3276288e3748d.yaml @@ -0,0 +1,58 @@ +id: user-control-18d2c8e769b3a1ea9cd3276288e3748d + +info: + name: > + User Control <= 2.1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb6cd3a6-565e-4acf-82f0-25e85f0678bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-control/" + google-query: inurl:"/wp-content/plugins/user-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-control,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-domain-whitelist-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml b/nuclei-templates/cve-less/plugins/user-domain-whitelist-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml new file mode 100644 index 0000000000..6992807833 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-domain-whitelist-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml @@ -0,0 +1,58 @@ +id: user-domain-whitelist-3f3bfd2ca93dfdb22d963aa7b5cb0c46 + +info: + name: > + User Domain Whitelist <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82df7569-919a-4f95-b0e2-f866133771eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-domain-whitelist/" + google-query: inurl:"/wp-content/plugins/user-domain-whitelist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-domain-whitelist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-domain-whitelist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-domain-whitelist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-export-with-their-meta-data-07eca49e75cf7db4ec73f20f42d19592.yaml b/nuclei-templates/cve-less/plugins/user-export-with-their-meta-data-07eca49e75cf7db4ec73f20f42d19592.yaml new file mode 100644 index 0000000000..70d8e0a0f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-export-with-their-meta-data-07eca49e75cf7db4ec73f20f42d19592.yaml @@ -0,0 +1,58 @@ +id: user-export-with-their-meta-data-07eca49e75cf7db4ec73f20f42d19592 + +info: + name: > + Export Users With Meta <= 0.6.8 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e8aa5c4-7e80-42c9-9f89-e9957e613cd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-export-with-their-meta-data/" + google-query: inurl:"/wp-content/plugins/user-export-with-their-meta-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-export-with-their-meta-data,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-export-with-their-meta-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-export-with-their-meta-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-export-with-their-meta-data-b68fe278807d5bbe8b9f9515e0348d4e.yaml b/nuclei-templates/cve-less/plugins/user-export-with-their-meta-data-b68fe278807d5bbe8b9f9515e0348d4e.yaml new file mode 100644 index 0000000000..3df6d745ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-export-with-their-meta-data-b68fe278807d5bbe8b9f9515e0348d4e.yaml @@ -0,0 +1,58 @@ +id: user-export-with-their-meta-data-b68fe278807d5bbe8b9f9515e0348d4e + +info: + name: > + Export Users With Meta < 0.6.5 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69618c44-5298-4b03-a63a-76f195206c8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-export-with-their-meta-data/" + google-query: inurl:"/wp-content/plugins/user-export-with-their-meta-data/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-export-with-their-meta-data,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-export-with-their-meta-data/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-export-with-their-meta-data" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-ip-and-location-0fd2b55ebd627169d7e7b82b7b9c0e52.yaml b/nuclei-templates/cve-less/plugins/user-ip-and-location-0fd2b55ebd627169d7e7b82b7b9c0e52.yaml new file mode 100644 index 0000000000..1f351e91a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-ip-and-location-0fd2b55ebd627169d7e7b82b7b9c0e52.yaml @@ -0,0 +1,58 @@ +id: user-ip-and-location-0fd2b55ebd627169d7e7b82b7b9c0e52 + +info: + name: > + User IP and Location <= 2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c557fc55-3c0d-43ff-8575-32f669299b39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-ip-and-location/" + google-query: inurl:"/wp-content/plugins/user-ip-and-location/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-ip-and-location,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-ip-and-location/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-ip-and-location" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-location-and-ip-2ccf4a97a0b2b289a9997f10c05da014.yaml b/nuclei-templates/cve-less/plugins/user-location-and-ip-2ccf4a97a0b2b289a9997f10c05da014.yaml new file mode 100644 index 0000000000..72371fa15a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-location-and-ip-2ccf4a97a0b2b289a9997f10c05da014.yaml @@ -0,0 +1,58 @@ +id: user-location-and-ip-2ccf4a97a0b2b289a9997f10c05da014 + +info: + name: > + User Location and IP <= 1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e501592-4411-4c0a-aa67-e2d0a29d5d35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-location-and-ip/" + google-query: inurl:"/wp-content/plugins/user-location-and-ip/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-location-and-ip,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-location-and-ip/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-location-and-ip" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-login-history-933c9d4b3eacccddbe4abc821f273b41.yaml b/nuclei-templates/cve-less/plugins/user-login-history-933c9d4b3eacccddbe4abc821f273b41.yaml new file mode 100644 index 0000000000..b176999434 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-login-history-933c9d4b3eacccddbe4abc821f273b41.yaml @@ -0,0 +1,58 @@ +id: user-login-history-933c9d4b3eacccddbe4abc821f273b41 + +info: + name: > + User Login History Plugin <= 1.5.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b5dc0af-90cf-41dd-a77b-4b99f267c0d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-login-history/" + google-query: inurl:"/wp-content/plugins/user-login-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-login-history,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-login-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-login-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-login-history-9be06bea648875a81d4dd1ca47dd3d3b.yaml b/nuclei-templates/cve-less/plugins/user-login-history-9be06bea648875a81d4dd1ca47dd3d3b.yaml new file mode 100644 index 0000000000..ffa0d0a274 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-login-history-9be06bea648875a81d4dd1ca47dd3d3b.yaml @@ -0,0 +1,58 @@ +id: user-login-history-9be06bea648875a81d4dd1ca47dd3d3b + +info: + name: > + User Login History <= 1.7.0 - SQL Injection via OrderBy + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fb2d9ec-1082-4209-9fc9-6f10ba3a2398?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-login-history/" + google-query: inurl:"/wp-content/plugins/user-login-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-login-history,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-login-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-login-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-login-history-d5d36dd3296371bddd49874e159fc4e0.yaml b/nuclei-templates/cve-less/plugins/user-login-history-d5d36dd3296371bddd49874e159fc4e0.yaml new file mode 100644 index 0000000000..e714cb5929 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-login-history-d5d36dd3296371bddd49874e159fc4e0.yaml @@ -0,0 +1,58 @@ +id: user-login-history-d5d36dd3296371bddd49874e159fc4e0 + +info: + name: > + User Login History <= 1.7.0 - SQL Injection via Order By + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c25a344-4876-4ba8-bbc6-d1a32f4b1d08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-login-history/" + google-query: inurl:"/wp-content/plugins/user-login-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-login-history,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-login-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-login-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-login-log-f899587161f02b977d621dc3afe7bca7.yaml b/nuclei-templates/cve-less/plugins/user-login-log-f899587161f02b977d621dc3afe7bca7.yaml new file mode 100644 index 0000000000..aacab915bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-login-log-f899587161f02b977d621dc3afe7bca7.yaml @@ -0,0 +1,58 @@ +id: user-login-log-f899587161f02b977d621dc3afe7bca7 + +info: + name: > + User Login Log <= 2.2.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5684366b-f09c-4710-a43e-ff451d88b0e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-login-log/" + google-query: inurl:"/wp-content/plugins/user-login-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-login-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-login-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-login-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-menus-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/user-menus-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..099b32d654 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-menus-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: user-menus-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-menus/" + google-query: inurl:"/wp-content/plugins/user-menus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-menus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-menus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-menus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-1bdc37d166ed1b52a0580bcf09d995a0.yaml b/nuclei-templates/cve-less/plugins/user-meta-1bdc37d166ed1b52a0580bcf09d995a0.yaml new file mode 100644 index 0000000000..5278b8b4db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-1bdc37d166ed1b52a0580bcf09d995a0.yaml @@ -0,0 +1,58 @@ +id: user-meta-1bdc37d166ed1b52a0580bcf09d995a0 + +info: + name: > + User Meta – User Profile Builder and User management plugin <= 2.4.3 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba20a30c-7dd2-4cb7-b055-9a105461f7d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta/" + google-query: inurl:"/wp-content/plugins/user-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-27ff799b988fb677dadaedc3ce5f35d5.yaml b/nuclei-templates/cve-less/plugins/user-meta-27ff799b988fb677dadaedc3ce5f35d5.yaml new file mode 100644 index 0000000000..97bfb0ae49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-27ff799b988fb677dadaedc3ce5f35d5.yaml @@ -0,0 +1,58 @@ +id: user-meta-27ff799b988fb677dadaedc3ce5f35d5 + +info: + name: > + User Meta – User Profile Builder and User management plugin 1.1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08bebfbd-08f4-45d9-9570-46f5c848afca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta/" + google-query: inurl:"/wp-content/plugins/user-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-5115b57fde3d1e0fc01f9c1b4fc604ad.yaml b/nuclei-templates/cve-less/plugins/user-meta-5115b57fde3d1e0fc01f9c1b4fc604ad.yaml new file mode 100644 index 0000000000..28f489a9e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-5115b57fde3d1e0fc01f9c1b4fc604ad.yaml @@ -0,0 +1,58 @@ +id: user-meta-5115b57fde3d1e0fc01f9c1b4fc604ad + +info: + name: > + User Meta <= 3.0 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/662fcf6c-1095-4cea-949f-91af8fba1e47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta/" + google-query: inurl:"/wp-content/plugins/user-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-ef13d8f60909d5e2009ffdcbdc23e29a.yaml b/nuclei-templates/cve-less/plugins/user-meta-ef13d8f60909d5e2009ffdcbdc23e29a.yaml new file mode 100644 index 0000000000..b9e4845247 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-ef13d8f60909d5e2009ffdcbdc23e29a.yaml @@ -0,0 +1,58 @@ +id: user-meta-ef13d8f60909d5e2009ffdcbdc23e29a + +info: + name: > + User Meta <= 2.4.2 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abe8efec-8f00-40bc-bc28-98435d11ebd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta/" + google-query: inurl:"/wp-content/plugins/user-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-manager-2a280bf41720079c39a3d0371323f56e.yaml b/nuclei-templates/cve-less/plugins/user-meta-manager-2a280bf41720079c39a3d0371323f56e.yaml new file mode 100644 index 0000000000..615010ad14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-manager-2a280bf41720079c39a3d0371323f56e.yaml @@ -0,0 +1,58 @@ +id: user-meta-manager-2a280bf41720079c39a3d0371323f56e + +info: + name: > + User Meta Manager < 3.4.8 - Missing Authorization to Sensitive Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0365efc-f443-40a6-a365-fd36c1818242?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta-manager/" + google-query: inurl:"/wp-content/plugins/user-meta-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-manager-9613ac9ff24ae943d3cd927f06034317.yaml b/nuclei-templates/cve-less/plugins/user-meta-manager-9613ac9ff24ae943d3cd927f06034317.yaml new file mode 100644 index 0000000000..4f4eb1d036 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-manager-9613ac9ff24ae943d3cd927f06034317.yaml @@ -0,0 +1,58 @@ +id: user-meta-manager-9613ac9ff24ae943d3cd927f06034317 + +info: + name: > + User Meta Manager <= 3.4.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0e02954-a2e7-417b-a467-fee0076d9b2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta-manager/" + google-query: inurl:"/wp-content/plugins/user-meta-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-manager-baba7e4c328e9317fa2b2839a155f748.yaml b/nuclei-templates/cve-less/plugins/user-meta-manager-baba7e4c328e9317fa2b2839a155f748.yaml new file mode 100644 index 0000000000..f53f9a0131 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-manager-baba7e4c328e9317fa2b2839a155f748.yaml @@ -0,0 +1,58 @@ +id: user-meta-manager-baba7e4c328e9317fa2b2839a155f748 + +info: + name: > + User Meta Manager < 3.4.7 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f795a46c-ba0c-45d5-9ff7-638752f1681b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta-manager/" + google-query: inurl:"/wp-content/plugins/user-meta-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-manager-d08b89da5a56f4cae4fcae784a8807f4.yaml b/nuclei-templates/cve-less/plugins/user-meta-manager-d08b89da5a56f4cae4fcae784a8807f4.yaml new file mode 100644 index 0000000000..f9856c65fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-manager-d08b89da5a56f4cae4fcae784a8807f4.yaml @@ -0,0 +1,58 @@ +id: user-meta-manager-d08b89da5a56f4cae4fcae784a8807f4 + +info: + name: > + User Meta Manager Plugin < 3.4.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/616c65e7-8d0c-4be8-bd6f-f98187ff1539?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta-manager/" + google-query: inurl:"/wp-content/plugins/user-meta-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-manager-fd49f8dca96bc998246e314731906420.yaml b/nuclei-templates/cve-less/plugins/user-meta-manager-fd49f8dca96bc998246e314731906420.yaml new file mode 100644 index 0000000000..837519bfad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-manager-fd49f8dca96bc998246e314731906420.yaml @@ -0,0 +1,58 @@ +id: user-meta-manager-fd49f8dca96bc998246e314731906420 + +info: + name: > + User Meta Manager <= 3.4.9 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db6bb000-4f46-4a5a-b118-dcd3e78e4029?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta-manager/" + google-query: inurl:"/wp-content/plugins/user-meta-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-meta-shortcodes-5edf46c467e512c2a9c72dfadcf57fa5.yaml b/nuclei-templates/cve-less/plugins/user-meta-shortcodes-5edf46c467e512c2a9c72dfadcf57fa5.yaml new file mode 100644 index 0000000000..a58bf56979 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-meta-shortcodes-5edf46c467e512c2a9c72dfadcf57fa5.yaml @@ -0,0 +1,58 @@ +id: user-meta-shortcodes-5edf46c467e512c2a9c72dfadcf57fa5 + +info: + name: > + User meta shortcodes <= 0.5 - Improper Access Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2e76535-b97e-4104-8e90-ac21348b34ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-meta-shortcodes/" + google-query: inurl:"/wp-content/plugins/user-meta-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-meta-shortcodes,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-meta-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-meta-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-notes-e04c0fd89ca49cf41266e90f8d4a7135.yaml b/nuclei-templates/cve-less/plugins/user-notes-e04c0fd89ca49cf41266e90f8d4a7135.yaml new file mode 100644 index 0000000000..0cb0c5f8fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-notes-e04c0fd89ca49cf41266e90f8d4a7135.yaml @@ -0,0 +1,58 @@ +id: user-notes-e04c0fd89ca49cf41266e90f8d4a7135 + +info: + name: > + User Notes <= 1.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5bdf47a-1116-4d3a-8ded-89d76b5a6f82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-notes/" + google-query: inurl:"/wp-content/plugins/user-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-notes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-photo-70ddedc5487f163b43d7ace431e3f2c6.yaml b/nuclei-templates/cve-less/plugins/user-photo-70ddedc5487f163b43d7ace431e3f2c6.yaml new file mode 100644 index 0000000000..0fd55849dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-photo-70ddedc5487f163b43d7ace431e3f2c6.yaml @@ -0,0 +1,58 @@ +id: user-photo-70ddedc5487f163b43d7ace431e3f2c6 + +info: + name: > + User Photo <= 0.9.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76eff464-69f0-47c1-bdcb-f8caa28a1280?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-photo/" + google-query: inurl:"/wp-content/plugins/user-photo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-photo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-photo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-photo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-photo-8e79000a55d2a7778e1f3a653b09e17f.yaml b/nuclei-templates/cve-less/plugins/user-photo-8e79000a55d2a7778e1f3a653b09e17f.yaml new file mode 100644 index 0000000000..895fe47da2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-photo-8e79000a55d2a7778e1f3a653b09e17f.yaml @@ -0,0 +1,58 @@ +id: user-photo-8e79000a55d2a7778e1f3a653b09e17f + +info: + name: > + User Photo <= 0.9.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa39debf-b2c0-4e85-bef9-90e1365f96f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-photo/" + google-query: inurl:"/wp-content/plugins/user-photo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-photo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-photo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-photo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-private-files-2203cb02480ab13ddbd56959a93d1555.yaml b/nuclei-templates/cve-less/plugins/user-private-files-2203cb02480ab13ddbd56959a93d1555.yaml new file mode 100644 index 0000000000..7edcbe107a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-private-files-2203cb02480ab13ddbd56959a93d1555.yaml @@ -0,0 +1,58 @@ +id: user-private-files-2203cb02480ab13ddbd56959a93d1555 + +info: + name: > + Frontend File Manager & Sharing – User Private Files <= 1.1.2 - Subscriber+ Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67ca3305-9a04-421f-a38e-66b69d2bbd38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-private-files/" + google-query: inurl:"/wp-content/plugins/user-private-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-private-files,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-private-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-private-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-private-files-2fc467eab8e252aba51501d739ddcb42.yaml b/nuclei-templates/cve-less/plugins/user-private-files-2fc467eab8e252aba51501d739ddcb42.yaml new file mode 100644 index 0000000000..cb697b3774 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-private-files-2fc467eab8e252aba51501d739ddcb42.yaml @@ -0,0 +1,58 @@ +id: user-private-files-2fc467eab8e252aba51501d739ddcb42 + +info: + name: > + Frontend File Manager & Sharing – User Private Files <= 1.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2c5e232-3561-43a1-bdfa-4a68f20b5889?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-private-files/" + google-query: inurl:"/wp-content/plugins/user-private-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-private-files,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-private-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-private-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-private-files-34d2a65b3d8097e555cf3aab3134db2d.yaml b/nuclei-templates/cve-less/plugins/user-private-files-34d2a65b3d8097e555cf3aab3134db2d.yaml new file mode 100644 index 0000000000..bde182ded4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-private-files-34d2a65b3d8097e555cf3aab3134db2d.yaml @@ -0,0 +1,58 @@ +id: user-private-files-34d2a65b3d8097e555cf3aab3134db2d + +info: + name: > + WordPress File Sharing Plugin <= 2.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1df04293-87e9-4ab4-975d-54d36a993ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-private-files/" + google-query: inurl:"/wp-content/plugins/user-private-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-private-files,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-private-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-private-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-private-files-d150ec7618e98f105f22738eb7217f44.yaml b/nuclei-templates/cve-less/plugins/user-private-files-d150ec7618e98f105f22738eb7217f44.yaml new file mode 100644 index 0000000000..c307fb970d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-private-files-d150ec7618e98f105f22738eb7217f44.yaml @@ -0,0 +1,58 @@ +id: user-private-files-d150ec7618e98f105f22738eb7217f44 + +info: + name: > + User Private Files < 2.0.5 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e53e75be-d4d6-4c10-b192-fe9691f27dd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-private-files/" + google-query: inurl:"/wp-content/plugins/user-private-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-private-files,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-private-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-private-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-private-files-d51a1ba95a0d2e1117f38d0ea2128650.yaml b/nuclei-templates/cve-less/plugins/user-private-files-d51a1ba95a0d2e1117f38d0ea2128650.yaml new file mode 100644 index 0000000000..de01edd064 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-private-files-d51a1ba95a0d2e1117f38d0ea2128650.yaml @@ -0,0 +1,58 @@ +id: user-private-files-d51a1ba95a0d2e1117f38d0ea2128650 + +info: + name: > + Frontend File Manager & Sharing – User Private Files <= 1.1.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afc9114b-80b7-4caf-ab6b-35747ff5057b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-private-files/" + google-query: inurl:"/wp-content/plugins/user-private-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-private-files,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-private-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-private-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-profile-103b877d6c6654d012dcfb8c68378ae3.yaml b/nuclei-templates/cve-less/plugins/user-profile-103b877d6c6654d012dcfb8c68378ae3.yaml new file mode 100644 index 0000000000..b6b596efb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-profile-103b877d6c6654d012dcfb8c68378ae3.yaml @@ -0,0 +1,58 @@ +id: user-profile-103b877d6c6654d012dcfb8c68378ae3 + +info: + name: > + User profile <= 2.0.20 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20d16cc4-3bc2-4f1b-b7ba-17993199a997?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-profile/" + google-query: inurl:"/wp-content/plugins/user-profile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-profile,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-profile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-profile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-1ab35ec2ada14325b98997bb858be8c8.yaml b/nuclei-templates/cve-less/plugins/user-registration-1ab35ec2ada14325b98997bb858be8c8.yaml new file mode 100644 index 0000000000..28221abd02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-1ab35ec2ada14325b98997bb858be8c8.yaml @@ -0,0 +1,58 @@ +id: user-registration-1ab35ec2ada14325b98997bb858be8c8 + +info: + name: > + User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin <= 3.1.4 - Unauthenticated Stored Self-Based Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62b809dc-4089-4822-8aeb-7049fcfe376e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-2612ae00d02e310a6680f563b8b56eab.yaml b/nuclei-templates/cve-less/plugins/user-registration-2612ae00d02e310a6680f563b8b56eab.yaml new file mode 100644 index 0000000000..692ac04823 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-2612ae00d02e310a6680f563b8b56eab.yaml @@ -0,0 +1,58 @@ +id: user-registration-2612ae00d02e310a6680f563b8b56eab + +info: + name: > + User Registration <= 2.3.2.1 - Missing Authorization via send_test_email + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a671128a-74e6-4f92-94af-9e5e37ed7b7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-3d14b08568400569a677dd320c2e823a.yaml b/nuclei-templates/cve-less/plugins/user-registration-3d14b08568400569a677dd320c2e823a.yaml new file mode 100644 index 0000000000..e162b8d5da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-3d14b08568400569a677dd320c2e823a.yaml @@ -0,0 +1,58 @@ +id: user-registration-3d14b08568400569a677dd320c2e823a + +info: + name: > + User Registration <= 3.0.1 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3590277a-3319-4707-b728-d75ea59e8ad9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-4d9fd3b2756396c2e2474f36f3b3ed72.yaml b/nuclei-templates/cve-less/plugins/user-registration-4d9fd3b2756396c2e2474f36f3b3ed72.yaml new file mode 100644 index 0000000000..1c591ee7c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-4d9fd3b2756396c2e2474f36f3b3ed72.yaml @@ -0,0 +1,58 @@ +id: user-registration-4d9fd3b2756396c2e2474f36f3b3ed72 + +info: + name: > + User Registration <= 2.3.0 - Authenticated (Administrator+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26529849-c52c-40e5-8085-6764c22a03e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-563b5a5f445bb7fdee347bcd0ac2e921.yaml b/nuclei-templates/cve-less/plugins/user-registration-563b5a5f445bb7fdee347bcd0ac2e921.yaml new file mode 100644 index 0000000000..07f30d1662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-563b5a5f445bb7fdee347bcd0ac2e921.yaml @@ -0,0 +1,58 @@ +id: user-registration-563b5a5f445bb7fdee347bcd0ac2e921 + +info: + name: > + User Registration <= 2.3.2.1 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5835fed0-5b9d-47b5-82ae-f0f19830ae2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-5a06b4b0b81af48987e3d90166388572.yaml b/nuclei-templates/cve-less/plugins/user-registration-5a06b4b0b81af48987e3d90166388572.yaml new file mode 100644 index 0000000000..5bdeb0b6ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-5a06b4b0b81af48987e3d90166388572.yaml @@ -0,0 +1,58 @@ +id: user-registration-5a06b4b0b81af48987e3d90166388572 + +info: + name: > + User Registration – Custom Registration Form, Login Form And User Profile For WordPress <= 3.0.4.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b70b9b1-bde9-4a32-ae7b-a4c8d73abbc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-89a71e03ca88d2c02f3be0f2c0d21756.yaml b/nuclei-templates/cve-less/plugins/user-registration-89a71e03ca88d2c02f3be0f2c0d21756.yaml new file mode 100644 index 0000000000..e568885652 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-89a71e03ca88d2c02f3be0f2c0d21756.yaml @@ -0,0 +1,58 @@ +id: user-registration-89a71e03ca88d2c02f3be0f2c0d21756 + +info: + name: > + User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin <= 3.1.5 - Missing Authorization to Unauthenticated Media Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/864a3444-0479-4b9f-beca-584a4a9b8682?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-a3ab87ca43ceb26b3f09e3ed0047a2de.yaml b/nuclei-templates/cve-less/plugins/user-registration-a3ab87ca43ceb26b3f09e3ed0047a2de.yaml new file mode 100644 index 0000000000..d45141a29c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-a3ab87ca43ceb26b3f09e3ed0047a2de.yaml @@ -0,0 +1,58 @@ +id: user-registration-a3ab87ca43ceb26b3f09e3ed0047a2de + +info: + name: > + User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin <= 3.1.5 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d03459d8-b1f2-4270-a294-403754db1f2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-d2e28c2323c53d6e9cc43d245f41b33e.yaml b/nuclei-templates/cve-less/plugins/user-registration-d2e28c2323c53d6e9cc43d245f41b33e.yaml new file mode 100644 index 0000000000..63486d0eed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-d2e28c2323c53d6e9cc43d245f41b33e.yaml @@ -0,0 +1,58 @@ +id: user-registration-d2e28c2323c53d6e9cc43d245f41b33e + +info: + name: > + User Registration <= 1.5.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/761a4801-fc4a-40a0-b5aa-303d88a87062?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-d95100aaa0c0f9fcb84493d4239628ac.yaml b/nuclei-templates/cve-less/plugins/user-registration-d95100aaa0c0f9fcb84493d4239628ac.yaml new file mode 100644 index 0000000000..7b6e4ba794 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-d95100aaa0c0f9fcb84493d4239628ac.yaml @@ -0,0 +1,58 @@ +id: user-registration-d95100aaa0c0f9fcb84493d4239628ac + +info: + name: > + User Registration <= 3.0.2 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a979e885-f7dd-4616-a881-64f3d97c309d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-registration-f2f2b27ba49b35955a269b199809763e.yaml b/nuclei-templates/cve-less/plugins/user-registration-f2f2b27ba49b35955a269b199809763e.yaml new file mode 100644 index 0000000000..d0723e252d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-registration-f2f2b27ba49b35955a269b199809763e.yaml @@ -0,0 +1,58 @@ +id: user-registration-f2f2b27ba49b35955a269b199809763e + +info: + name: > + User Registration <= 2.2.4 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c07ea205-5a05-43f5-993e-c6e30f660ac8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-registration/" + google-query: inurl:"/wp-content/plugins/user-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-registration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-rights-access-manager-0b9fcb239ed2ed2b5bab0eed8480c44c.yaml b/nuclei-templates/cve-less/plugins/user-rights-access-manager-0b9fcb239ed2ed2b5bab0eed8480c44c.yaml new file mode 100644 index 0000000000..6f2ad18fb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-rights-access-manager-0b9fcb239ed2ed2b5bab0eed8480c44c.yaml @@ -0,0 +1,58 @@ +id: user-rights-access-manager-0b9fcb239ed2ed2b5bab0eed8480c44c + +info: + name: > + User Rights Access Manager <= 1.0.7 - Access Restriction Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b15b10a4-04fd-4860-9cc9-cefcdbbbf507?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-rights-access-manager/" + google-query: inurl:"/wp-content/plugins/user-rights-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-rights-access-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-rights-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-rights-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-rights-access-manager-954c2405c628d0efb2aa813bafba83c6.yaml b/nuclei-templates/cve-less/plugins/user-rights-access-manager-954c2405c628d0efb2aa813bafba83c6.yaml new file mode 100644 index 0000000000..ae6fc3fb51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-rights-access-manager-954c2405c628d0efb2aa813bafba83c6.yaml @@ -0,0 +1,58 @@ +id: user-rights-access-manager-954c2405c628d0efb2aa813bafba83c6 + +info: + name: > + User Rights Access Manager <= 1.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/033b0f16-02fb-44b9-9e07-2393afe14cc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-rights-access-manager/" + google-query: inurl:"/wp-content/plugins/user-rights-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-rights-access-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-rights-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-rights-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-rights-access-manager-a0b7b51da946e56980c587504bc9c3d1.yaml b/nuclei-templates/cve-less/plugins/user-rights-access-manager-a0b7b51da946e56980c587504bc9c3d1.yaml new file mode 100644 index 0000000000..2d3d7d175e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-rights-access-manager-a0b7b51da946e56980c587504bc9c3d1.yaml @@ -0,0 +1,58 @@ +id: user-rights-access-manager-a0b7b51da946e56980c587504bc9c3d1 + +info: + name: > + User Rights Access Manager <= 1.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c7beb26-a4ac-47a3-9ee1-64f399e3218b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-rights-access-manager/" + google-query: inurl:"/wp-content/plugins/user-rights-access-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-rights-access-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-rights-access-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-rights-access-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-role-19953c61fa61f206c9ea957d11e2d617.yaml b/nuclei-templates/cve-less/plugins/user-role-19953c61fa61f206c9ea957d11e2d617.yaml new file mode 100644 index 0000000000..c006a21a3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-role-19953c61fa61f206c9ea957d11e2d617.yaml @@ -0,0 +1,58 @@ +id: user-role-19953c61fa61f206c9ea957d11e2d617 + +info: + name: > + User Role <= 1.5.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/277ee4f8-4b13-4a58-a4ea-28f639ecea5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-role/" + google-query: inurl:"/wp-content/plugins/user-role/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-role,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-role/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-role" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-role-be510149fd1b62e5b5bb38762ffb0573.yaml b/nuclei-templates/cve-less/plugins/user-role-be510149fd1b62e5b5bb38762ffb0573.yaml new file mode 100644 index 0000000000..32c5bb0f18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-role-be510149fd1b62e5b5bb38762ffb0573.yaml @@ -0,0 +1,58 @@ +id: user-role-be510149fd1b62e5b5bb38762ffb0573 + +info: + name: > + User Role by BestWebSoft <= 1.6.6 - Cross-Site Request Forgery to Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b4bc525-a21f-46f2-895a-c8474f72eb92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-role/" + google-query: inurl:"/wp-content/plugins/user-role/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-role,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-role/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-role" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-role-editor-19fa35bb35a821be90be40a4df1f6407.yaml b/nuclei-templates/cve-less/plugins/user-role-editor-19fa35bb35a821be90be40a4df1f6407.yaml new file mode 100644 index 0000000000..e20934dc95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-role-editor-19fa35bb35a821be90be40a4df1f6407.yaml @@ -0,0 +1,58 @@ +id: user-role-editor-19fa35bb35a821be90be40a4df1f6407 + +info: + name: > + User Role Editor <= 4.24 - Authenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7a57c3b-0d1b-40ad-9e55-6a1eab4e0380?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-role-editor/" + google-query: inurl:"/wp-content/plugins/user-role-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-role-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-role-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-role-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-shortcodes-plus-4c45cf0c9392dc7bd44f9128bee077ba.yaml b/nuclei-templates/cve-less/plugins/user-shortcodes-plus-4c45cf0c9392dc7bd44f9128bee077ba.yaml new file mode 100644 index 0000000000..df12c14cf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-shortcodes-plus-4c45cf0c9392dc7bd44f9128bee077ba.yaml @@ -0,0 +1,58 @@ +id: user-shortcodes-plus-4c45cf0c9392dc7bd44f9128bee077ba + +info: + name: > + User Shortcodes Plus <= 2.0.2 - Insecure Direct Object Reference to Authenticated (Contributor+) Sensitive Information Disclosure via user_meta Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76a0a87a-dff0-4a51-bad0-8868c342ecde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-shortcodes-plus/" + google-query: inurl:"/wp-content/plugins/user-shortcodes-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-shortcodes-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-shortcodes-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-shortcodes-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-spam-remover-6c1be9857aef3e70d84394860b7ed82f.yaml b/nuclei-templates/cve-less/plugins/user-spam-remover-6c1be9857aef3e70d84394860b7ed82f.yaml new file mode 100644 index 0000000000..d7c0fd152e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-spam-remover-6c1be9857aef3e70d84394860b7ed82f.yaml @@ -0,0 +1,58 @@ +id: user-spam-remover-6c1be9857aef3e70d84394860b7ed82f + +info: + name: > + User Spam Remover <= 1.0 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6efadbe7-ee9b-44cb-b7c6-4c38a872abf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-spam-remover/" + google-query: inurl:"/wp-content/plugins/user-spam-remover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-spam-remover,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-spam-remover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-spam-remover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-submitted-posts-17a41e1a16870158d7b7f29143acb1a4.yaml b/nuclei-templates/cve-less/plugins/user-submitted-posts-17a41e1a16870158d7b7f29143acb1a4.yaml new file mode 100644 index 0000000000..3716a2eb0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-submitted-posts-17a41e1a16870158d7b7f29143acb1a4.yaml @@ -0,0 +1,58 @@ +id: user-submitted-posts-17a41e1a16870158d7b7f29143acb1a4 + +info: + name: > + User Submitted Posts <= 20230809 - Unauthenticated Stored Cross-Site Scripting via 'user-submitted-content' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb4d37c-c4c2-4523-9b4e-73ffb7be81ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-submitted-posts/" + google-query: inurl:"/wp-content/plugins/user-submitted-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-submitted-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-submitted-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-submitted-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20230809') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-submitted-posts-36cace1718aa377bc2a0687653bc5015.yaml b/nuclei-templates/cve-less/plugins/user-submitted-posts-36cace1718aa377bc2a0687653bc5015.yaml new file mode 100644 index 0000000000..b3dcf08252 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-submitted-posts-36cace1718aa377bc2a0687653bc5015.yaml @@ -0,0 +1,58 @@ +id: user-submitted-posts-36cace1718aa377bc2a0687653bc5015 + +info: + name: > + User Submitted Posts <= 20190312 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a97877b-fb4d-4e87-bcff-56be65fee6ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-submitted-posts/" + google-query: inurl:"/wp-content/plugins/user-submitted-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-submitted-posts,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-submitted-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-submitted-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20190426') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-submitted-posts-b4200cfb6c25751d846b15f9be817013.yaml b/nuclei-templates/cve-less/plugins/user-submitted-posts-b4200cfb6c25751d846b15f9be817013.yaml new file mode 100644 index 0000000000..27e548c5e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-submitted-posts-b4200cfb6c25751d846b15f9be817013.yaml @@ -0,0 +1,58 @@ +id: user-submitted-posts-b4200cfb6c25751d846b15f9be817013 + +info: + name: > + User Submitted Posts <= 20230902 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/babbe506-3abd-462a-b5b8-5979696eb6e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-submitted-posts/" + google-query: inurl:"/wp-content/plugins/user-submitted-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-submitted-posts,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-submitted-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-submitted-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20230902') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-submitted-posts-e52fe8ccbb854729b4cd4efd3c029a6b.yaml b/nuclei-templates/cve-less/plugins/user-submitted-posts-e52fe8ccbb854729b4cd4efd3c029a6b.yaml new file mode 100644 index 0000000000..ddfb46e219 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-submitted-posts-e52fe8ccbb854729b4cd4efd3c029a6b.yaml @@ -0,0 +1,58 @@ +id: user-submitted-posts-e52fe8ccbb854729b4cd4efd3c029a6b + +info: + name: > + User Submitted Posts < 20160215 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da848ced-acc4-48bc-8fbe-e90cdd53b3e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-submitted-posts/" + google-query: inurl:"/wp-content/plugins/user-submitted-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-submitted-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-submitted-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-submitted-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20160215') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-submitted-posts-ec6e68cb23a447be8fad62b8d99d082d.yaml b/nuclei-templates/cve-less/plugins/user-submitted-posts-ec6e68cb23a447be8fad62b8d99d082d.yaml new file mode 100644 index 0000000000..536d9ef705 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-submitted-posts-ec6e68cb23a447be8fad62b8d99d082d.yaml @@ -0,0 +1,58 @@ +id: user-submitted-posts-ec6e68cb23a447be8fad62b8d99d082d + +info: + name: > + User Submitted Posts <= 20230901 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7fca965-86f8-4ee4-a9d6-cb18fe5f098e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-submitted-posts/" + google-query: inurl:"/wp-content/plugins/user-submitted-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-submitted-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-submitted-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-submitted-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20230901') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-submitted-posts-ef952e49d818ad8d9f5105858ddc8b74.yaml b/nuclei-templates/cve-less/plugins/user-submitted-posts-ef952e49d818ad8d9f5105858ddc8b74.yaml new file mode 100644 index 0000000000..86e16fa85f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-submitted-posts-ef952e49d818ad8d9f5105858ddc8b74.yaml @@ -0,0 +1,58 @@ +id: user-submitted-posts-ef952e49d818ad8d9f5105858ddc8b74 + +info: + name: > + User Submitted Posts – Enable Users to Submit Posts from the Front End <= 20230811 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d21ca709-183f-4dd1-849c-f1b2a4f7ec43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-submitted-posts/" + google-query: inurl:"/wp-content/plugins/user-submitted-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-submitted-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-submitted-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-submitted-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20230811') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/user-verification-ca88165c86af83d72c5c99df7036335e.yaml b/nuclei-templates/cve-less/plugins/user-verification-ca88165c86af83d72c5c99df7036335e.yaml new file mode 100644 index 0000000000..0980c81bbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/user-verification-ca88165c86af83d72c5c99df7036335e.yaml @@ -0,0 +1,58 @@ +id: user-verification-ca88165c86af83d72c5c99df7036335e + +info: + name: > + User Verification <= 1.0.93 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7e3a8ee-9950-4da4-8450-8b5902b3b876?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/user-verification/" + google-query: inurl:"/wp-content/plugins/user-verification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,user-verification,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/user-verification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "user-verification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/useragent-spy-6cfb5c63bbc7af6b76f9e01d4d2fe2ac.yaml b/nuclei-templates/cve-less/plugins/useragent-spy-6cfb5c63bbc7af6b76f9e01d4d2fe2ac.yaml new file mode 100644 index 0000000000..595beba434 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/useragent-spy-6cfb5c63bbc7af6b76f9e01d4d2fe2ac.yaml @@ -0,0 +1,58 @@ +id: useragent-spy-6cfb5c63bbc7af6b76f9e01d4d2fe2ac + +info: + name: > + UserAgent-Spy <= 1.3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/434755f8-b2af-4f35-9af9-f0b9578718c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/useragent-spy/" + google-query: inurl:"/wp-content/plugins/useragent-spy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,useragent-spy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/useragent-spy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "useragent-spy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userback-0c4c2f31024fbf5cfab7d01fe111d650.yaml b/nuclei-templates/cve-less/plugins/userback-0c4c2f31024fbf5cfab7d01fe111d650.yaml new file mode 100644 index 0000000000..8914cfcab5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userback-0c4c2f31024fbf5cfab7d01fe111d650.yaml @@ -0,0 +1,58 @@ +id: userback-0c4c2f31024fbf5cfab7d01fe111d650 + +info: + name: > + Userback <= 1.0.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2178b39c-5341-4f53-82be-668b400d7f25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userback/" + google-query: inurl:"/wp-content/plugins/userback/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userback,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userback/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userback" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userfeedback-lite-1e3a0fb44323bb8b37d482026ed1bcb6.yaml b/nuclei-templates/cve-less/plugins/userfeedback-lite-1e3a0fb44323bb8b37d482026ed1bcb6.yaml new file mode 100644 index 0000000000..57e9f8b79a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userfeedback-lite-1e3a0fb44323bb8b37d482026ed1bcb6.yaml @@ -0,0 +1,58 @@ +id: userfeedback-lite-1e3a0fb44323bb8b37d482026ed1bcb6 + +info: + name: > + User Feedback <= 1.0.9 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abc056b0-55a2-439c-b7f6-4a2fc48c9823?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userfeedback-lite/" + google-query: inurl:"/wp-content/plugins/userfeedback-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userfeedback-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userfeedback-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userfeedback-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userfeedback-lite-61ee64923a0fe1e6df3a4bb79ec27733.yaml b/nuclei-templates/cve-less/plugins/userfeedback-lite-61ee64923a0fe1e6df3a4bb79ec27733.yaml new file mode 100644 index 0000000000..07615eeea2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userfeedback-lite-61ee64923a0fe1e6df3a4bb79ec27733.yaml @@ -0,0 +1,58 @@ +id: userfeedback-lite-61ee64923a0fe1e6df3a4bb79ec27733 + +info: + name: > + User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds <= 1.0.13 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a649fbea-65cf-45c9-b853-2733f27518af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userfeedback-lite/" + google-query: inurl:"/wp-content/plugins/userfeedback-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userfeedback-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userfeedback-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userfeedback-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userfeedback-lite-bc5c4137940b6ee9a3fd20aa718b68a9.yaml b/nuclei-templates/cve-less/plugins/userfeedback-lite-bc5c4137940b6ee9a3fd20aa718b68a9.yaml new file mode 100644 index 0000000000..82ac3888dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userfeedback-lite-bc5c4137940b6ee9a3fd20aa718b68a9.yaml @@ -0,0 +1,58 @@ +id: userfeedback-lite-bc5c4137940b6ee9a3fd20aa718b68a9 + +info: + name: > + User Feedback <= 1.0.7 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9e45bc2-6db6-49cd-8a4a-58489a8ddac2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userfeedback-lite/" + google-query: inurl:"/wp-content/plugins/userfeedback-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userfeedback-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userfeedback-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userfeedback-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userfeedback-lite-bdeaf570096cf99a20e12f37d41beaeb.yaml b/nuclei-templates/cve-less/plugins/userfeedback-lite-bdeaf570096cf99a20e12f37d41beaeb.yaml new file mode 100644 index 0000000000..a9f8880ea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userfeedback-lite-bdeaf570096cf99a20e12f37d41beaeb.yaml @@ -0,0 +1,58 @@ +id: userfeedback-lite-bdeaf570096cf99a20e12f37d41beaeb + +info: + name: > + User Feedback <= 1.0.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63c7bb29-c8b2-49ee-8ac4-1046b61b7e6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userfeedback-lite/" + google-query: inurl:"/wp-content/plugins/userfeedback-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userfeedback-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userfeedback-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userfeedback-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userheat-783cdb329475b25222f6cb9b44f2e64c.yaml b/nuclei-templates/cve-less/plugins/userheat-783cdb329475b25222f6cb9b44f2e64c.yaml new file mode 100644 index 0000000000..23c604d45d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userheat-783cdb329475b25222f6cb9b44f2e64c.yaml @@ -0,0 +1,58 @@ +id: userheat-783cdb329475b25222f6cb9b44f2e64c + +info: + name: > + UserHeat Plugin <= 1.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c03b5670-9f7e-4001-ba90-197559b794a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userheat/" + google-query: inurl:"/wp-content/plugins/userheat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userheat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userheat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userheat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userlike-e37188c1de6df4d33488960fa6e214fa.yaml b/nuclei-templates/cve-less/plugins/userlike-e37188c1de6df4d33488960fa6e214fa.yaml new file mode 100644 index 0000000000..bf494cf32e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userlike-e37188c1de6df4d33488960fa6e214fa.yaml @@ -0,0 +1,58 @@ +id: userlike-e37188c1de6df4d33488960fa6e214fa + +info: + name: > + Userlike <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14c94d47-c911-4874-a897-58f4c0800329?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userlike/" + google-query: inurl:"/wp-content/plugins/userlike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userlike,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userlike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userlike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/username-updater-2508566224c9697f712ccd556a0ee74e.yaml b/nuclei-templates/cve-less/plugins/username-updater-2508566224c9697f712ccd556a0ee74e.yaml new file mode 100644 index 0000000000..9a5cf5041d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/username-updater-2508566224c9697f712ccd556a0ee74e.yaml @@ -0,0 +1,58 @@ +id: username-updater-2508566224c9697f712ccd556a0ee74e + +info: + name: > + Easy Username Updater <= 1.0.3 - Cross-Site Request Forgery to Username Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e3e996b-6988-42ab-9766-ddc070243c1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/username-updater/" + google-query: inurl:"/wp-content/plugins/username-updater/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,username-updater,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/username-updater/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "username-updater" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usernoise-b99ce0637c979eb1d01fd84441afddba.yaml b/nuclei-templates/cve-less/plugins/usernoise-b99ce0637c979eb1d01fd84441afddba.yaml new file mode 100644 index 0000000000..00e0a22e02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usernoise-b99ce0637c979eb1d01fd84441afddba.yaml @@ -0,0 +1,58 @@ +id: usernoise-b99ce0637c979eb1d01fd84441afddba + +info: + name: > + Usernoise modal feedback / contact form < 3.7.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c42095d-c5b5-448a-8c6e-9a6c0e15a660?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usernoise/" + google-query: inurl:"/wp-content/plugins/usernoise/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usernoise,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usernoise/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usernoise" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userplus-dbb603a582acad18868b604587ba2dff.yaml b/nuclei-templates/cve-less/plugins/userplus-dbb603a582acad18868b604587ba2dff.yaml new file mode 100644 index 0000000000..3c1265acdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userplus-dbb603a582acad18868b604587ba2dff.yaml @@ -0,0 +1,58 @@ +id: userplus-dbb603a582acad18868b604587ba2dff + +info: + name: > + UserPlus <= 2.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acd0349b-7864-4e4e-84ba-6f0ec5b585f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userplus/" + google-query: inurl:"/wp-content/plugins/userplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userplus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userplus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-04f8df43c58f1fcfe62ac6f2791a6403.yaml b/nuclei-templates/cve-less/plugins/userpro-04f8df43c58f1fcfe62ac6f2791a6403.yaml new file mode 100644 index 0000000000..45e57b572e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-04f8df43c58f1fcfe62ac6f2791a6403.yaml @@ -0,0 +1,58 @@ +id: userpro-04f8df43c58f1fcfe62ac6f2791a6403 + +info: + name: > + UserPro <= 5.1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting via userpro_save_userdata + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d30adc5-27a5-4549-84fc-b930f27f03e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-0738939cc65ce7903ad33d05a6227fd2.yaml b/nuclei-templates/cve-less/plugins/userpro-0738939cc65ce7903ad33d05a6227fd2.yaml new file mode 100644 index 0000000000..b0976e368f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-0738939cc65ce7903ad33d05a6227fd2.yaml @@ -0,0 +1,58 @@ +id: userpro-0738939cc65ce7903ad33d05a6227fd2 + +info: + name: > + UserPro <= 5.1.1 - Sensitive Information Disclosure via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4072ba5f-6385-4fa3-85b6-89dac7b60a92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-154b839caaa4713224f0ab043264e6ea.yaml b/nuclei-templates/cve-less/plugins/userpro-154b839caaa4713224f0ab043264e6ea.yaml new file mode 100644 index 0000000000..c5573ff75c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-154b839caaa4713224f0ab043264e6ea.yaml @@ -0,0 +1,58 @@ +id: userpro-154b839caaa4713224f0ab043264e6ea + +info: + name: > + UserPro <= 5.1.1 - Authentication Bypass to Administrator + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3cf9f38-c20e-40dc-a7a1-65b0c6ba7925?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-183bcbf1ecc01c4bcdfd0244c1054c88.yaml b/nuclei-templates/cve-less/plugins/userpro-183bcbf1ecc01c4bcdfd0244c1054c88.yaml new file mode 100644 index 0000000000..7d18c647af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-183bcbf1ecc01c4bcdfd0244c1054c88.yaml @@ -0,0 +1,58 @@ +id: userpro-183bcbf1ecc01c4bcdfd0244c1054c88 + +info: + name: > + UserPro <= 5.1.1 - Cross-Site Request Forgery to Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73600498-f55c-4b8e-a625-4f292e58e0ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-299d4f6f43babb859c2fe770a633ef35.yaml b/nuclei-templates/cve-less/plugins/userpro-299d4f6f43babb859c2fe770a633ef35.yaml new file mode 100644 index 0000000000..0bc9ee46e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-299d4f6f43babb859c2fe770a633ef35.yaml @@ -0,0 +1,58 @@ +id: userpro-299d4f6f43babb859c2fe770a633ef35 + +info: + name: > + UserPro <= 4.9.27 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7d6d15c-067f-44cb-bd61-ff39bed7e356?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-3c7a7bda89b03e9d2cc247c341834e4e.yaml b/nuclei-templates/cve-less/plugins/userpro-3c7a7bda89b03e9d2cc247c341834e4e.yaml new file mode 100644 index 0000000000..29cc06ddb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-3c7a7bda89b03e9d2cc247c341834e4e.yaml @@ -0,0 +1,58 @@ +id: userpro-3c7a7bda89b03e9d2cc247c341834e4e + +info: + name: > + UserPro <= 4.9.17 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51957ee1-a423-485b-8cfd-8eafaf6744e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.17.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-3e54e940d7f7e91b150b3a2075b3abc6.yaml b/nuclei-templates/cve-less/plugins/userpro-3e54e940d7f7e91b150b3a2075b3abc6.yaml new file mode 100644 index 0000000000..0d43b5f500 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-3e54e940d7f7e91b150b3a2075b3abc6.yaml @@ -0,0 +1,58 @@ +id: userpro-3e54e940d7f7e91b150b3a2075b3abc6 + +info: + name: > + UserPro <= 5.1.4 - Missing Authorization to Arbitrary Shortcode Execution via userpro_shortcode_template + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cbe9175-4a6f-4eb6-8d31-9a9fda9b4f40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-656244efbeeadce5c71da45e29bb9a67.yaml b/nuclei-templates/cve-less/plugins/userpro-656244efbeeadce5c71da45e29bb9a67.yaml new file mode 100644 index 0000000000..b8fd8b5a51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-656244efbeeadce5c71da45e29bb9a67.yaml @@ -0,0 +1,58 @@ +id: userpro-656244efbeeadce5c71da45e29bb9a67 + +info: + name: > + UserPro <= 4.9.23 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e90fe49-4ead-4468-b3cc-30040e4f278f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-73550b54c3b3918e019ec5d1a646e218.yaml b/nuclei-templates/cve-less/plugins/userpro-73550b54c3b3918e019ec5d1a646e218.yaml new file mode 100644 index 0000000000..9276185ed8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-73550b54c3b3918e019ec5d1a646e218.yaml @@ -0,0 +1,58 @@ +id: userpro-73550b54c3b3918e019ec5d1a646e218 + +info: + name: > + UserPro <= 5.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21cb424c-4efd-4c12-a08a-6d574f118c28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '5.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-89d956efcfdb19ea855c5732e7ba78c5.yaml b/nuclei-templates/cve-less/plugins/userpro-89d956efcfdb19ea855c5732e7ba78c5.yaml new file mode 100644 index 0000000000..fa2ad148aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-89d956efcfdb19ea855c5732e7ba78c5.yaml @@ -0,0 +1,58 @@ +id: userpro-89d956efcfdb19ea855c5732e7ba78c5 + +info: + name: > + UserPro <= 4.9.34 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/741028c9-6021-4522-b7e5-b31f0c3a9f10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-ae32c7f72e10e74657f2f9c1c4ca3ce3.yaml b/nuclei-templates/cve-less/plugins/userpro-ae32c7f72e10e74657f2f9c1c4ca3ce3.yaml new file mode 100644 index 0000000000..c35c06d6f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-ae32c7f72e10e74657f2f9c1c4ca3ce3.yaml @@ -0,0 +1,58 @@ +id: userpro-ae32c7f72e10e74657f2f9c1c4ca3ce3 + +info: + name: > + UserPro <= 5.1.6 - Disabled Membership Registration Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea070d9c-c04c-432f-a110-47b9eaa67614?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-caff8f6f354132f41c0e30a99b04fa75.yaml b/nuclei-templates/cve-less/plugins/userpro-caff8f6f354132f41c0e30a99b04fa75.yaml new file mode 100644 index 0000000000..658d26ac83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-caff8f6f354132f41c0e30a99b04fa75.yaml @@ -0,0 +1,58 @@ +id: userpro-caff8f6f354132f41c0e30a99b04fa75 + +info: + name: > + UserPro <= 5.1.4 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8bed9c0-dae3-405e-a946-5f28a3c30851?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-dc4223fef5ec45deab1fbfe214a6cedd.yaml b/nuclei-templates/cve-less/plugins/userpro-dc4223fef5ec45deab1fbfe214a6cedd.yaml new file mode 100644 index 0000000000..0fc45fc87c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-dc4223fef5ec45deab1fbfe214a6cedd.yaml @@ -0,0 +1,58 @@ +id: userpro-dc4223fef5ec45deab1fbfe214a6cedd + +info: + name: > + UserPro <= 5.1.1 - Cross-Site Request Forgery via multiple functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed6e2b9e-3d70-4c07-a779-45164816b89c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-df416b9c3abe234cfa201d8c25a6cb67.yaml b/nuclei-templates/cve-less/plugins/userpro-df416b9c3abe234cfa201d8c25a6cb67.yaml new file mode 100644 index 0000000000..821907a1b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-df416b9c3abe234cfa201d8c25a6cb67.yaml @@ -0,0 +1,58 @@ +id: userpro-df416b9c3abe234cfa201d8c25a6cb67 + +info: + name: > + UserPro <= 4.9.20 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff32cb12-f010-45ae-97d7-f36ce2003f3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-e552b5aef7987e0ab7219edb686bfcc2.yaml b/nuclei-templates/cve-less/plugins/userpro-e552b5aef7987e0ab7219edb686bfcc2.yaml new file mode 100644 index 0000000000..ea8f0c9488 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-e552b5aef7987e0ab7219edb686bfcc2.yaml @@ -0,0 +1,58 @@ +id: userpro-e552b5aef7987e0ab7219edb686bfcc2 + +info: + name: > + UserPro <= 5.1.1 - Cross-Site Request Forgery to Sensitive Information Exposure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0372efe4-b5be-4601-be43-5c12332ea1a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-e9ae8122ab019b9f575d632976e78882.yaml b/nuclei-templates/cve-less/plugins/userpro-e9ae8122ab019b9f575d632976e78882.yaml new file mode 100644 index 0000000000..f26b9edae8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-e9ae8122ab019b9f575d632976e78882.yaml @@ -0,0 +1,58 @@ +id: userpro-e9ae8122ab019b9f575d632976e78882 + +info: + name: > + UserPro <= 5.1.0 - Cross-Site Request Forgery to PHP Object Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbb601ce-a884-4894-af13-dab14885c7eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-ec4b5ca541f179f9756ae5a9210d5761.yaml b/nuclei-templates/cve-less/plugins/userpro-ec4b5ca541f179f9756ae5a9210d5761.yaml new file mode 100644 index 0000000000..51d967c5df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-ec4b5ca541f179f9756ae5a9210d5761.yaml @@ -0,0 +1,58 @@ +id: userpro-ec4b5ca541f179f9756ae5a9210d5761 + +info: + name: > + UserPro <= 5.1.1 - Insecure Password Reset Mechanism + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de9be7bc-4f8a-4393-8ebb-1b1f141b7585?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userpro-fbcad9f6d7319e6ca8392a71ea0bffb3.yaml b/nuclei-templates/cve-less/plugins/userpro-fbcad9f6d7319e6ca8392a71ea0bffb3.yaml new file mode 100644 index 0000000000..6082069513 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userpro-fbcad9f6d7319e6ca8392a71ea0bffb3.yaml @@ -0,0 +1,58 @@ +id: userpro-fbcad9f6d7319e6ca8392a71ea0bffb3 + +info: + name: > + UserPro <= 5.1.1 - Missing Authorization via multiple functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c4f8798-c0f9-4d05-808e-375864a0ad95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userpro/" + google-query: inurl:"/wp-content/plugins/userpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userpro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml new file mode 100644 index 0000000000..af41a3913f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml @@ -0,0 +1,58 @@ +id: users-customers-import-export-for-wp-woocommerce-0088814ed74fd156e9ee132de51ef1d2 + +info: + name: > + WebToffee Plugins <= (Various Versions) - Arbitrary User Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27ac48a7-52ee-46cb-a6d0-efbd2b516445?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + google-query: inurl:"/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-customers-import-export-for-wp-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-customers-import-export-for-wp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-0ced1508729f529a88bdefd2f552e467.yaml b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-0ced1508729f529a88bdefd2f552e467.yaml new file mode 100644 index 0000000000..75e872c337 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-0ced1508729f529a88bdefd2f552e467.yaml @@ -0,0 +1,58 @@ +id: users-customers-import-export-for-wp-woocommerce-0ced1508729f529a88bdefd2f552e467 + +info: + name: > + Export and Import Users and Customers <= 2.4.8 - Authenticated (Shop Manager+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55b3e2dc-dc4f-408b-bbc6-da72ed5ad245?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + google-query: inurl:"/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-customers-import-export-for-wp-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-customers-import-export-for-wp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-2178e4e9767ddbb5794b39d1005e082d.yaml b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-2178e4e9767ddbb5794b39d1005e082d.yaml new file mode 100644 index 0000000000..5e734b5a3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-2178e4e9767ddbb5794b39d1005e082d.yaml @@ -0,0 +1,58 @@ +id: users-customers-import-export-for-wp-woocommerce-2178e4e9767ddbb5794b39d1005e082d + +info: + name: > + Export and Import Users and Customers <= 2.5.3 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f7a5e27-af7e-4e32-be9b-08e1133bb323?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + google-query: inurl:"/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-customers-import-export-for-wp-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-customers-import-export-for-wp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-4f3805308ff329789ed39fb1a7c50453.yaml b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-4f3805308ff329789ed39fb1a7c50453.yaml new file mode 100644 index 0000000000..d324838f7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-4f3805308ff329789ed39fb1a7c50453.yaml @@ -0,0 +1,58 @@ +id: users-customers-import-export-for-wp-woocommerce-4f3805308ff329789ed39fb1a7c50453 + +info: + name: > + Export and Import Users and Customers <= 2.4.1 - Missing Authorization to Authenticated (Shop Manager) Arbitrary User Password Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47337214-9cc3-4b12-bb71-9acbab3649b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + google-query: inurl:"/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-customers-import-export-for-wp-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-customers-import-export-for-wp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-a5584c4a9e33feea6b14b638918b3b10.yaml b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-a5584c4a9e33feea6b14b638918b3b10.yaml new file mode 100644 index 0000000000..f123e7f7e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-a5584c4a9e33feea6b14b638918b3b10.yaml @@ -0,0 +1,58 @@ +id: users-customers-import-export-for-wp-woocommerce-a5584c4a9e33feea6b14b638918b3b10 + +info: + name: > + Import Export WordPress Users and WooCommerce Customers <= 1.3.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5966a86c-f1e6-4d53-b32a-fa1440d65819?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + google-query: inurl:"/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-customers-import-export-for-wp-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-customers-import-export-for-wp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-b9a49aa567e405f97048b32968f3519a.yaml b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-b9a49aa567e405f97048b32968f3519a.yaml new file mode 100644 index 0000000000..63d73281af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-customers-import-export-for-wp-woocommerce-b9a49aa567e405f97048b32968f3519a.yaml @@ -0,0 +1,58 @@ +id: users-customers-import-export-for-wp-woocommerce-b9a49aa567e405f97048b32968f3519a + +info: + name: > + Import Export WordPress Users <= 2.5.2 - Authenticated (Shop Manager+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a8d0f86-73fe-43a6-a03a-38bf815dd30b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + google-query: inurl:"/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-customers-import-export-for-wp-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-customers-import-export-for-wp-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-customers-import-export-for-wp-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-profile-picture-28ec3275d51e7b8c31fce132b1bffc74.yaml b/nuclei-templates/cve-less/plugins/users-profile-picture-28ec3275d51e7b8c31fce132b1bffc74.yaml new file mode 100644 index 0000000000..cf18bd2ab7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-profile-picture-28ec3275d51e7b8c31fce132b1bffc74.yaml @@ -0,0 +1,58 @@ +id: users-profile-picture-28ec3275d51e7b8c31fce132b1bffc74 + +info: + name: > + User Profile Picture < 2.6.0 - Authenticated Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f963cd2-0069-4e58-a5e5-8a9bfea65168?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-profile-picture/" + google-query: inurl:"/wp-content/plugins/users-profile-picture/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-profile-picture,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-profile-picture/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-profile-picture" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-profile-picture-e433366cbf26ba8f78929a0ce010f58a.yaml b/nuclei-templates/cve-less/plugins/users-profile-picture-e433366cbf26ba8f78929a0ce010f58a.yaml new file mode 100644 index 0000000000..1a78612637 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-profile-picture-e433366cbf26ba8f78929a0ce010f58a.yaml @@ -0,0 +1,58 @@ +id: users-profile-picture-e433366cbf26ba8f78929a0ce010f58a + +info: + name: > + User Profile Picture <= 2.4.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6535f932-3aa4-4686-adf6-4e7a1f494e02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-profile-picture/" + google-query: inurl:"/wp-content/plugins/users-profile-picture/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-profile-picture,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-profile-picture/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-profile-picture" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-to-csv-3f8947e2a587b0ae5ce07c0ba75d46bc.yaml b/nuclei-templates/cve-less/plugins/users-to-csv-3f8947e2a587b0ae5ce07c0ba75d46bc.yaml new file mode 100644 index 0000000000..6a66bbd1e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-to-csv-3f8947e2a587b0ae5ce07c0ba75d46bc.yaml @@ -0,0 +1,58 @@ +id: users-to-csv-3f8947e2a587b0ae5ce07c0ba75d46bc + +info: + name: > + Users To CSV <= 1.4.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/beadd35b-2bce-431e-8347-2d1a87d02f01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-to-csv/" + google-query: inurl:"/wp-content/plugins/users-to-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-to-csv,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-to-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-to-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-37103802a9b9cdbc51b5059fa8045bc3.yaml b/nuclei-templates/cve-less/plugins/users-ultra-37103802a9b9cdbc51b5059fa8045bc3.yaml new file mode 100644 index 0000000000..caba786538 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-37103802a9b9cdbc51b5059fa8045bc3.yaml @@ -0,0 +1,58 @@ +id: users-ultra-37103802a9b9cdbc51b5059fa8045bc3 + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin <= 1.3.58 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c7d539-2ea7-4f72-b0d2-6082e26918ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.58') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-3e0e02d0ef91eed396842fb253ab425c.yaml b/nuclei-templates/cve-less/plugins/users-ultra-3e0e02d0ef91eed396842fb253ab425c.yaml new file mode 100644 index 0000000000..0389ee738d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-3e0e02d0ef91eed396842fb253ab425c.yaml @@ -0,0 +1,58 @@ +id: users-ultra-3e0e02d0ef91eed396842fb253ab425c + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin <= 3.1.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e327239-b4f0-4d21-b25e-f015498981cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-4d92bacdb897e72bc7c9b888465bfb12.yaml b/nuclei-templates/cve-less/plugins/users-ultra-4d92bacdb897e72bc7c9b888465bfb12.yaml new file mode 100644 index 0000000000..560ed5cb15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-4d92bacdb897e72bc7c9b888465bfb12.yaml @@ -0,0 +1,58 @@ +id: users-ultra-4d92bacdb897e72bc7c9b888465bfb12 + +info: + name: > + Users Ultra Membership Plugin <= 1.5.63 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49754f41-b809-4a97-ab8f-233f51dc058f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-4ee3b92fe5cef5ace6e0821bce6a628f.yaml b/nuclei-templates/cve-less/plugins/users-ultra-4ee3b92fe5cef5ace6e0821bce6a628f.yaml new file mode 100644 index 0000000000..d07c1eb24a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-4ee3b92fe5cef5ace6e0821bce6a628f.yaml @@ -0,0 +1,58 @@ +id: users-ultra-4ee3b92fe5cef5ace6e0821bce6a628f + +info: + name: > + Users Ultra <= 1.5.15 - Multiple SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/235c9967-808f-45f2-85cf-7ee7a523593d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-741cff403a911873546d8451aea6b8dc.yaml b/nuclei-templates/cve-less/plugins/users-ultra-741cff403a911873546d8451aea6b8dc.yaml new file mode 100644 index 0000000000..074fda9860 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-741cff403a911873546d8451aea6b8dc.yaml @@ -0,0 +1,58 @@ +id: users-ultra-741cff403a911873546d8451aea6b8dc + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin < 1.4.36 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e92cc6a3-062c-4f0e-9539-07d0fa0e9404?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-7d8cf8e800d2870ca230bed514c737c3.yaml b/nuclei-templates/cve-less/plugins/users-ultra-7d8cf8e800d2870ca230bed514c737c3.yaml new file mode 100644 index 0000000000..e07e0faeab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-7d8cf8e800d2870ca230bed514c737c3.yaml @@ -0,0 +1,58 @@ +id: users-ultra-7d8cf8e800d2870ca230bed514c737c3 + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin <= 1.5.58 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef4134a1-e2c6-495a-bc00-cc8cd783cd7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-9ae9897b899214e88181a9313e35781d.yaml b/nuclei-templates/cve-less/plugins/users-ultra-9ae9897b899214e88181a9313e35781d.yaml new file mode 100644 index 0000000000..b7b5d944fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-9ae9897b899214e88181a9313e35781d.yaml @@ -0,0 +1,58 @@ +id: users-ultra-9ae9897b899214e88181a9313e35781d + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin < 1.5.63 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a9f7a61-535f-45c8-a7e7-e8b095cacaa1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-cace5e5791cd3b60783efcb6a58bc103.yaml b/nuclei-templates/cve-less/plugins/users-ultra-cace5e5791cd3b60783efcb6a58bc103.yaml new file mode 100644 index 0000000000..8b840663a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-cace5e5791cd3b60783efcb6a58bc103.yaml @@ -0,0 +1,58 @@ +id: users-ultra-cace5e5791cd3b60783efcb6a58bc103 + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin <= 1.3.58 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d3fd9b8-b9b7-4884-9188-6bf255058323?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.58') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-ccec5144654bab62438c0000b0cd001b.yaml b/nuclei-templates/cve-less/plugins/users-ultra-ccec5144654bab62438c0000b0cd001b.yaml new file mode 100644 index 0000000000..ad2ad8d953 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-ccec5144654bab62438c0000b0cd001b.yaml @@ -0,0 +1,58 @@ +id: users-ultra-ccec5144654bab62438c0000b0cd001b + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin < 1.5.63 - Cross-Site Scripting via p_name parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00cb5ce9-cca2-4e41-8d00-1d2ca7770dce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-d475119af8f003a2c6e0eb9a10044dee.yaml b/nuclei-templates/cve-less/plugins/users-ultra-d475119af8f003a2c6e0eb9a10044dee.yaml new file mode 100644 index 0000000000..d9de3d072c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-d475119af8f003a2c6e0eb9a10044dee.yaml @@ -0,0 +1,58 @@ +id: users-ultra-d475119af8f003a2c6e0eb9a10044dee + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin <= 1.4.95 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/784e3b21-08f5-4cbc-b726-fe60e1faefea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-d7cc53ebc89a0251fb7abbabbb69e870.yaml b/nuclei-templates/cve-less/plugins/users-ultra-d7cc53ebc89a0251fb7abbabbb69e870.yaml new file mode 100644 index 0000000000..6780ee38de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-d7cc53ebc89a0251fb7abbabbb69e870.yaml @@ -0,0 +1,58 @@ +id: users-ultra-d7cc53ebc89a0251fb7abbabbb69e870 + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin < 1.5.63 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe2a538b-60a5-4595-b901-4477679e6b8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/users-ultra-ee6588c23752ef8db22d5c7efc9281bf.yaml b/nuclei-templates/cve-less/plugins/users-ultra-ee6588c23752ef8db22d5c7efc9281bf.yaml new file mode 100644 index 0000000000..8376a97536 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/users-ultra-ee6588c23752ef8db22d5c7efc9281bf.yaml @@ -0,0 +1,58 @@ +id: users-ultra-ee6588c23752ef8db22d5c7efc9281bf + +info: + name: > + Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin <= 3.1.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9ffbf3-520a-4563-85e1-27c1cc544856?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/users-ultra/" + google-query: inurl:"/wp-content/plugins/users-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,users-ultra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/users-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "users-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/usersnap-650d3965dc4c579880213651d87a4777.yaml b/nuclei-templates/cve-less/plugins/usersnap-650d3965dc4c579880213651d87a4777.yaml new file mode 100644 index 0000000000..f6a361fb85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/usersnap-650d3965dc4c579880213651d87a4777.yaml @@ -0,0 +1,58 @@ +id: usersnap-650d3965dc4c579880213651d87a4777 + +info: + name: > + Usersnap <= 4.16 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ad00419-e9fa-4f78-b0d9-02cfb412a04d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/usersnap/" + google-query: inurl:"/wp-content/plugins/usersnap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,usersnap,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/usersnap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "usersnap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userswp-467ae4d6a0b8db0e5b6c781618b2d3ee.yaml b/nuclei-templates/cve-less/plugins/userswp-467ae4d6a0b8db0e5b6c781618b2d3ee.yaml new file mode 100644 index 0000000000..19b467ef5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userswp-467ae4d6a0b8db0e5b6c781618b2d3ee.yaml @@ -0,0 +1,58 @@ +id: userswp-467ae4d6a0b8db0e5b6c781618b2d3ee + +info: + name: > + UsersWP <= 1.2.6 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ef53c2c-01fb-41b6-b329-d952ce3424e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userswp/" + google-query: inurl:"/wp-content/plugins/userswp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userswp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userswp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userswp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userswp-608aad3fd1d4f9ba2d0904fa4c5d78c2.yaml b/nuclei-templates/cve-less/plugins/userswp-608aad3fd1d4f9ba2d0904fa4c5d78c2.yaml new file mode 100644 index 0000000000..37486b45be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userswp-608aad3fd1d4f9ba2d0904fa4c5d78c2.yaml @@ -0,0 +1,58 @@ +id: userswp-608aad3fd1d4f9ba2d0904fa4c5d78c2 + +info: + name: > + UsersWP <= 1.2.3 - Subscriber+ User Avatar Override + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f31b42c8-cf82-49cf-ac4c-d42a28252d66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userswp/" + google-query: inurl:"/wp-content/plugins/userswp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userswp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userswp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userswp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userswp-83754afd4792513884989ed11f95add6.yaml b/nuclei-templates/cve-less/plugins/userswp-83754afd4792513884989ed11f95add6.yaml new file mode 100644 index 0000000000..8f657e0ba4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userswp-83754afd4792513884989ed11f95add6.yaml @@ -0,0 +1,58 @@ +id: userswp-83754afd4792513884989ed11f95add6 + +info: + name: > + UsersWP <= 1.2.3.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/413d3ec0-8d04-4bef-9394-f666cfed733e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userswp/" + google-query: inurl:"/wp-content/plugins/userswp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userswp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userswp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userswp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userswp-8d1c622642cdaf2469921f84335dfe12.yaml b/nuclei-templates/cve-less/plugins/userswp-8d1c622642cdaf2469921f84335dfe12.yaml new file mode 100644 index 0000000000..2c23527649 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userswp-8d1c622642cdaf2469921f84335dfe12.yaml @@ -0,0 +1,58 @@ +id: userswp-8d1c622642cdaf2469921f84335dfe12 + +info: + name: > + UsersWP <= 1.2.3.9 - Authenticated (Administrator+) CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/567c4487-32e3-4afd-aec7-2f8171a49ebc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userswp/" + google-query: inurl:"/wp-content/plugins/userswp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userswp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userswp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userswp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userswp-e839aa50a0f3e00f901dfe5f18166d4a.yaml b/nuclei-templates/cve-less/plugins/userswp-e839aa50a0f3e00f901dfe5f18166d4a.yaml new file mode 100644 index 0000000000..fa65df26db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userswp-e839aa50a0f3e00f901dfe5f18166d4a.yaml @@ -0,0 +1,58 @@ +id: userswp-e839aa50a0f3e00f901dfe5f18166d4a + +info: + name: > + UsersWP <= 1.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a308056-aadc-4fc3-8133-2b05f3d9aabe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userswp/" + google-query: inurl:"/wp-content/plugins/userswp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userswp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userswp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userswp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/userswp-fbc5f16f0d879df70b9a5d8bd9595927.yaml b/nuclei-templates/cve-less/plugins/userswp-fbc5f16f0d879df70b9a5d8bd9595927.yaml new file mode 100644 index 0000000000..d2df94eb35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/userswp-fbc5f16f0d879df70b9a5d8bd9595927.yaml @@ -0,0 +1,58 @@ +id: userswp-fbc5f16f0d879df70b9a5d8bd9595927 + +info: + name: > + UsersWP – User Registration & User Profile <= 1.2.2.28 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1522d23b-7655-4fde-a18b-b46c6625185f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/userswp/" + google-query: inurl:"/wp-content/plugins/userswp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,userswp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/userswp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "userswp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/utm-tracker-fae9c4f5e42508587fcd2ed1f9caedd8.yaml b/nuclei-templates/cve-less/plugins/utm-tracker-fae9c4f5e42508587fcd2ed1f9caedd8.yaml new file mode 100644 index 0000000000..c90321bbb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/utm-tracker-fae9c4f5e42508587fcd2ed1f9caedd8.yaml @@ -0,0 +1,58 @@ +id: utm-tracker-fae9c4f5e42508587fcd2ed1f9caedd8 + +info: + name: > + UTM Tracker <= 1.3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/077ec165-edd3-4c2c-b1ea-01ca5b80f779?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/utm-tracker/" + google-query: inurl:"/wp-content/plugins/utm-tracker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,utm-tracker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/utm-tracker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "utm-tracker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/utubevideo-gallery-17199c68a13d9adf35ea73d24856f5f8.yaml b/nuclei-templates/cve-less/plugins/utubevideo-gallery-17199c68a13d9adf35ea73d24856f5f8.yaml new file mode 100644 index 0000000000..fec0e161de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/utubevideo-gallery-17199c68a13d9adf35ea73d24856f5f8.yaml @@ -0,0 +1,58 @@ +id: utubevideo-gallery-17199c68a13d9adf35ea73d24856f5f8 + +info: + name: > + uTubeVideo Gallery <= 2.0.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7f7b6b1-61d6-4911-ad1f-16a14c16618d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/utubevideo-gallery/" + google-query: inurl:"/wp-content/plugins/utubevideo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,utubevideo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/utubevideo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "utubevideo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ux-flat-58b2abf7cb460597ca6a6d20fc9fbdcc.yaml b/nuclei-templates/cve-less/plugins/ux-flat-58b2abf7cb460597ca6a6d20fc9fbdcc.yaml new file mode 100644 index 0000000000..0128762ca3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ux-flat-58b2abf7cb460597ca6a6d20fc9fbdcc.yaml @@ -0,0 +1,58 @@ +id: ux-flat-58b2abf7cb460597ca6a6d20fc9fbdcc + +info: + name: > + UX Flat <= 4.6 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d93db2c-7baf-42d8-9b4a-be91b27221a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ux-flat/" + google-query: inurl:"/wp-content/plugins/ux-flat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ux-flat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ux-flat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ux-flat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/validated-22471b3f81db400388be79d0e5d0cf32.yaml b/nuclei-templates/cve-less/plugins/validated-22471b3f81db400388be79d0e5d0cf32.yaml new file mode 100644 index 0000000000..bb8ee21fbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/validated-22471b3f81db400388be79d0e5d0cf32.yaml @@ -0,0 +1,58 @@ +id: validated-22471b3f81db400388be79d0e5d0cf32 + +info: + name: > + Validated <= 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf808fec-8d84-43ab-85bc-b3b60ab4df31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/validated/" + google-query: inurl:"/wp-content/plugins/validated/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,validated,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/validated/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "validated" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vanguard-eef4fef4e9f3255888f8b403eb0a1916.yaml b/nuclei-templates/cve-less/plugins/vanguard-eef4fef4e9f3255888f8b403eb0a1916.yaml new file mode 100644 index 0000000000..94c7faf63e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vanguard-eef4fef4e9f3255888f8b403eb0a1916.yaml @@ -0,0 +1,58 @@ +id: vanguard-eef4fef4e9f3255888f8b403eb0a1916 + +info: + name: > + Vanguard - Marketplace Digital Products PHP7 <= 2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9799ebf-1810-4c34-8262-2559de61c1c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vanguard/" + google-query: inurl:"/wp-content/plugins/vanguard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vanguard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vanguard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vanguard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vaultpress-a000811d6a7f224f2863a66f08bbbdef.yaml b/nuclei-templates/cve-less/plugins/vaultpress-a000811d6a7f224f2863a66f08bbbdef.yaml new file mode 100644 index 0000000000..8cb428889c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vaultpress-a000811d6a7f224f2863a66f08bbbdef.yaml @@ -0,0 +1,58 @@ +id: vaultpress-a000811d6a7f224f2863a66f08bbbdef + +info: + name: > + VaultPress <= 1.8.6 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f321b8f6-0712-4932-b861-b208debb368f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vaultpress/" + google-query: inurl:"/wp-content/plugins/vaultpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vaultpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vaultpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vaultpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vaultpress-e4890ed290e8d1de6f994e789f5bdedd.yaml b/nuclei-templates/cve-less/plugins/vaultpress-e4890ed290e8d1de6f994e789f5bdedd.yaml new file mode 100644 index 0000000000..e5fe620cf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vaultpress-e4890ed290e8d1de6f994e789f5bdedd.yaml @@ -0,0 +1,58 @@ +id: vaultpress-e4890ed290e8d1de6f994e789f5bdedd + +info: + name: > + VaultPress <=1.9 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f71f2096-e4c9-406a-a4e5-0006b380fbaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vaultpress/" + google-query: inurl:"/wp-content/plugins/vaultpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vaultpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vaultpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vaultpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vc-addons-by-bit14-64fc1c1aeafb0b67c8b714966bfc2dcb.yaml b/nuclei-templates/cve-less/plugins/vc-addons-by-bit14-64fc1c1aeafb0b67c8b714966bfc2dcb.yaml new file mode 100644 index 0000000000..5ff5738488 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vc-addons-by-bit14-64fc1c1aeafb0b67c8b714966bfc2dcb.yaml @@ -0,0 +1,58 @@ +id: vc-addons-by-bit14-64fc1c1aeafb0b67c8b714966bfc2dcb + +info: + name: > + Web and WooCommerce Addons for WPBakery Builder <= 1.4.4.1 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e697e7f-8d5b-4a9f-9148-f2dc5fb1ba38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vc-addons-by-bit14/" + google-query: inurl:"/wp-content/plugins/vc-addons-by-bit14/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vc-addons-by-bit14,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vc-addons-by-bit14/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vc-addons-by-bit14" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vc-tabs-02e92fc9d8edd2a31ef37844cc4fdd57.yaml b/nuclei-templates/cve-less/plugins/vc-tabs-02e92fc9d8edd2a31ef37844cc4fdd57.yaml new file mode 100644 index 0000000000..2b68919091 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vc-tabs-02e92fc9d8edd2a31ef37844cc4fdd57.yaml @@ -0,0 +1,58 @@ +id: vc-tabs-02e92fc9d8edd2a31ef37844cc4fdd57 + +info: + name: > + Tabs – Responsive Tabs with WooCommerce Product Tab Extension <= 3.6.0 - Authenticated (Admin+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f48e35e-12fd-4f75-bcb1-6820846298a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vc-tabs/" + google-query: inurl:"/wp-content/plugins/vc-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vc-tabs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vc-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vc-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vc-tabs-36ee3fb721eebb245b42e5817603a92b.yaml b/nuclei-templates/cve-less/plugins/vc-tabs-36ee3fb721eebb245b42e5817603a92b.yaml new file mode 100644 index 0000000000..0e6d308f5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vc-tabs-36ee3fb721eebb245b42e5817603a92b.yaml @@ -0,0 +1,58 @@ +id: vc-tabs-36ee3fb721eebb245b42e5817603a92b + +info: + name: > + Responsive Tabs with WooCommerce Product Tab Extension <= 3.5.4 - Unauthenticated Arbitrary Option Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8698529-4c55-45ad-a0c2-5f1d01944bf0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vc-tabs/" + google-query: inurl:"/wp-content/plugins/vc-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vc-tabs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vc-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vc-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vc-tabs-e4bedac25bcf1a2f58f7010119167cc3.yaml b/nuclei-templates/cve-less/plugins/vc-tabs-e4bedac25bcf1a2f58f7010119167cc3.yaml new file mode 100644 index 0000000000..6470148c10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vc-tabs-e4bedac25bcf1a2f58f7010119167cc3.yaml @@ -0,0 +1,58 @@ +id: vc-tabs-e4bedac25bcf1a2f58f7010119167cc3 + +info: + name: > + Tabs <= 3.7.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7723579-33ca-4007-a6fa-31b15f3e70a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vc-tabs/" + google-query: inurl:"/wp-content/plugins/vc-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vc-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vc-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vc-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vc_clipboard-02e2e7490cf032ead7b1cdd23b1c4e3e.yaml b/nuclei-templates/cve-less/plugins/vc_clipboard-02e2e7490cf032ead7b1cdd23b1c4e3e.yaml new file mode 100644 index 0000000000..c2dad35386 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vc_clipboard-02e2e7490cf032ead7b1cdd23b1c4e3e.yaml @@ -0,0 +1,58 @@ +id: vc_clipboard-02e2e7490cf032ead7b1cdd23b1c4e3e + +info: + name: > + WPBakery Page Builder Clipboard < 4.5.8 - Arbitrary License Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57a12c21-4a5d-4fbd-8720-93e78164f216?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vc_clipboard/" + google-query: inurl:"/wp-content/plugins/vc_clipboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vc_clipboard,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vc_clipboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vc_clipboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vc_clipboard-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml b/nuclei-templates/cve-less/plugins/vc_clipboard-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml new file mode 100644 index 0000000000..b50317e43c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vc_clipboard-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml @@ -0,0 +1,58 @@ +id: vc_clipboard-3ff23277c9ba98ae052e3b9f7bce2ce5 + +info: + name: > + WPBakery Page Builder Clipboard <= 4.5.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2dae6b53-11f3-432c-ad27-940c429055a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vc_clipboard/" + google-query: inurl:"/wp-content/plugins/vc_clipboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vc_clipboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vc_clipboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vc_clipboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vdz-call-back-e460da3b1111d5e40e60d6fa9f63a75a.yaml b/nuclei-templates/cve-less/plugins/vdz-call-back-e460da3b1111d5e40e60d6fa9f63a75a.yaml new file mode 100644 index 0000000000..5fc23d6d37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vdz-call-back-e460da3b1111d5e40e60d6fa9f63a75a.yaml @@ -0,0 +1,58 @@ +id: vdz-call-back-e460da3b1111d5e40e60d6fa9f63a75a + +info: + name: > + VDZ CallBack Plugin < 1.14.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a40944fa-9729-4d34-adc0-857bf00d6666?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vdz-call-back/" + google-query: inurl:"/wp-content/plugins/vdz-call-back/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vdz-call-back,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vdz-call-back/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vdz-call-back" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vdz-google-analytics-7f3d4ae07c7ffdb4fa4da20576013347.yaml b/nuclei-templates/cve-less/plugins/vdz-google-analytics-7f3d4ae07c7ffdb4fa4da20576013347.yaml new file mode 100644 index 0000000000..21d1ad4d6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vdz-google-analytics-7f3d4ae07c7ffdb4fa4da20576013347.yaml @@ -0,0 +1,58 @@ +id: vdz-google-analytics-7f3d4ae07c7ffdb4fa4da20576013347 + +info: + name: > + VDZ Google Analytics or Google Tag Manager < 1.4.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9222c74-7f4f-4d20-8c1e-03be125709ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vdz-google-analytics/" + google-query: inurl:"/wp-content/plugins/vdz-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vdz-google-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vdz-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vdz-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vdz-google-analytics-820c42b11e0167933dfc728bc7134cba.yaml b/nuclei-templates/cve-less/plugins/vdz-google-analytics-820c42b11e0167933dfc728bc7134cba.yaml new file mode 100644 index 0000000000..f1cbd7a915 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vdz-google-analytics-820c42b11e0167933dfc728bc7134cba.yaml @@ -0,0 +1,58 @@ +id: vdz-google-analytics-820c42b11e0167933dfc728bc7134cba + +info: + name: > + VDZ Google Analytics or Google Tag Manager / GTM <= 1.5.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b90267c6-e6b4-4ca0-8779-c20f62016eeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vdz-google-analytics/" + google-query: inurl:"/wp-content/plugins/vdz-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vdz-google-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vdz-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vdz-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vdz-verification-1b1edb5a0481b6f1c207bb5bde4a4999.yaml b/nuclei-templates/cve-less/plugins/vdz-verification-1b1edb5a0481b6f1c207bb5bde4a4999.yaml new file mode 100644 index 0000000000..4e35ee4590 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vdz-verification-1b1edb5a0481b6f1c207bb5bde4a4999.yaml @@ -0,0 +1,58 @@ +id: vdz-verification-1b1edb5a0481b6f1c207bb5bde4a4999 + +info: + name: > + VDZ Verification <= 1.3.12 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79b859ef-5417-47e5-8b9a-763c62a6a127?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vdz-verification/" + google-query: inurl:"/wp-content/plugins/vdz-verification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vdz-verification,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vdz-verification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vdz-verification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/venture-event-manager-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/venture-event-manager-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..df49a90edb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/venture-event-manager-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: venture-event-manager-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/venture-event-manager/" + google-query: inurl:"/wp-content/plugins/venture-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,venture-event-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/venture-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "venture-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/verge3d-61bd18cfe47ff36978c91845f9ffc1e4.yaml b/nuclei-templates/cve-less/plugins/verge3d-61bd18cfe47ff36978c91845f9ffc1e4.yaml new file mode 100644 index 0000000000..1a23ca303d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/verge3d-61bd18cfe47ff36978c91845f9ffc1e4.yaml @@ -0,0 +1,58 @@ +id: verge3d-61bd18cfe47ff36978c91845f9ffc1e4 + +info: + name: > + Verge3D <= 4.5.2 - Authenticated(Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71dd864f-1975-4cee-be26-0cdb0d54be95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/verge3d/" + google-query: inurl:"/wp-content/plugins/verge3d/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,verge3d,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/verge3d/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "verge3d" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/verification-code-for-comments-f5a38f2fe44d1f55847f0985e9ae01e0.yaml b/nuclei-templates/cve-less/plugins/verification-code-for-comments-f5a38f2fe44d1f55847f0985e9ae01e0.yaml new file mode 100644 index 0000000000..8d20bb50d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/verification-code-for-comments-f5a38f2fe44d1f55847f0985e9ae01e0.yaml @@ -0,0 +1,58 @@ +id: verification-code-for-comments-f5a38f2fe44d1f55847f0985e9ae01e0 + +info: + name: > + Verification Code for Comments <= 2.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51ff2654-fa38-4807-87f5-53a9996839c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/verification-code-for-comments/" + google-query: inurl:"/wp-content/plugins/verification-code-for-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,verification-code-for-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/verification-code-for-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "verification-code-for-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/verse-o-matic-6172c422eaf36f3edbfde89320e25329.yaml b/nuclei-templates/cve-less/plugins/verse-o-matic-6172c422eaf36f3edbfde89320e25329.yaml new file mode 100644 index 0000000000..751e24edcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/verse-o-matic-6172c422eaf36f3edbfde89320e25329.yaml @@ -0,0 +1,58 @@ +id: verse-o-matic-6172c422eaf36f3edbfde89320e25329 + +info: + name: > + Verse-O-Matic <= 4.1.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c16543db-2f8c-4266-9fb2-fc429f5647b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/verse-o-matic/" + google-query: inurl:"/wp-content/plugins/verse-o-matic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,verse-o-matic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/verse-o-matic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "verse-o-matic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vertical-marquee-plugin-673a5e282a31715aadad077526dcf5b4.yaml b/nuclei-templates/cve-less/plugins/vertical-marquee-plugin-673a5e282a31715aadad077526dcf5b4.yaml new file mode 100644 index 0000000000..ad20405ce1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vertical-marquee-plugin-673a5e282a31715aadad077526dcf5b4.yaml @@ -0,0 +1,58 @@ +id: vertical-marquee-plugin-673a5e282a31715aadad077526dcf5b4 + +info: + name: > + Vertical Marquee Plugin <= 7.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06c86c87-840c-4ca6-9582-98254194eb1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vertical-marquee-plugin/" + google-query: inurl:"/wp-content/plugins/vertical-marquee-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vertical-marquee-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vertical-marquee-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vertical-marquee-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vertical-marquee-plugin-67a5e177b639db224cce52014e47431a.yaml b/nuclei-templates/cve-less/plugins/vertical-marquee-plugin-67a5e177b639db224cce52014e47431a.yaml new file mode 100644 index 0000000000..e1ca4f47f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vertical-marquee-plugin-67a5e177b639db224cce52014e47431a.yaml @@ -0,0 +1,58 @@ +id: vertical-marquee-plugin-67a5e177b639db224cce52014e47431a + +info: + name: > + Vertical marquee plugin <= 7.1 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd90d9c0-0cab-4fd3-b016-106032f300f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vertical-marquee-plugin/" + google-query: inurl:"/wp-content/plugins/vertical-marquee-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vertical-marquee-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vertical-marquee-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vertical-marquee-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-3cd2547007d3bd29308efde9fcc7a52a.yaml b/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-3cd2547007d3bd29308efde9fcc7a52a.yaml new file mode 100644 index 0000000000..30f13b8a47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-3cd2547007d3bd29308efde9fcc7a52a.yaml @@ -0,0 +1,58 @@ +id: vertical-scroll-recent-post-3cd2547007d3bd29308efde9fcc7a52a + +info: + name: > + Vertical scroll recent post <= 13.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9002fe5c-d7c7-4d4a-9e92-db6ff390d78b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vertical-scroll-recent-post/" + google-query: inurl:"/wp-content/plugins/vertical-scroll-recent-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vertical-scroll-recent-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vertical-scroll-recent-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vertical-scroll-recent-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-4703f57dd95a665cc36f6d5726f726bb.yaml b/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-4703f57dd95a665cc36f6d5726f726bb.yaml new file mode 100644 index 0000000000..90b2701e54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-4703f57dd95a665cc36f6d5726f726bb.yaml @@ -0,0 +1,58 @@ +id: vertical-scroll-recent-post-4703f57dd95a665cc36f6d5726f726bb + +info: + name: > + Vertical scroll recent post <= 14.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a0e93cb-4311-4b38-8eb4-17152e1f3475?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vertical-scroll-recent-post/" + google-query: inurl:"/wp-content/plugins/vertical-scroll-recent-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vertical-scroll-recent-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vertical-scroll-recent-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vertical-scroll-recent-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-c284496133c2f9c59611c8aa7ef34141.yaml b/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-c284496133c2f9c59611c8aa7ef34141.yaml new file mode 100644 index 0000000000..163cfc8b05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vertical-scroll-recent-post-c284496133c2f9c59611c8aa7ef34141.yaml @@ -0,0 +1,58 @@ +id: vertical-scroll-recent-post-c284496133c2f9c59611c8aa7ef34141 + +info: + name: > + Vertical scroll recent post <= 14.0 - Cross-Site Request Forgery via vsrp_admin_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/307bbfe6-8a57-461d-aa7d-bce962da4239?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vertical-scroll-recent-post/" + google-query: inurl:"/wp-content/plugins/vertical-scroll-recent-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vertical-scroll-recent-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vertical-scroll-recent-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vertical-scroll-recent-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/verweise-wordpress-twitter-011e0a807fc0a0f2b6240634cb1a2fc2.yaml b/nuclei-templates/cve-less/plugins/verweise-wordpress-twitter-011e0a807fc0a0f2b6240634cb1a2fc2.yaml new file mode 100644 index 0000000000..0909b4a0ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/verweise-wordpress-twitter-011e0a807fc0a0f2b6240634cb1a2fc2.yaml @@ -0,0 +1,58 @@ +id: verweise-wordpress-twitter-011e0a807fc0a0f2b6240634cb1a2fc2 + +info: + name: > + verwei.se – WordPress – Twitter <= 1.0 2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9291a17-7add-4cc2-ab44-9b640940c6b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/verweise-wordpress-twitter/" + google-query: inurl:"/wp-content/plugins/verweise-wordpress-twitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,verweise-wordpress-twitter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/verweise-wordpress-twitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "verweise-wordpress-twitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/very-simple-breadcrumb-af6a5ec90875038596d2be175f9973f4.yaml b/nuclei-templates/cve-less/plugins/very-simple-breadcrumb-af6a5ec90875038596d2be175f9973f4.yaml new file mode 100644 index 0000000000..b5476ce99c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/very-simple-breadcrumb-af6a5ec90875038596d2be175f9973f4.yaml @@ -0,0 +1,58 @@ +id: very-simple-breadcrumb-af6a5ec90875038596d2be175f9973f4 + +info: + name: > + Very Simple Breadcrumb <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13874012-09b4-4e6a-a364-07321dbd0167?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/very-simple-breadcrumb/" + google-query: inurl:"/wp-content/plugins/very-simple-breadcrumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,very-simple-breadcrumb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/very-simple-breadcrumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "very-simple-breadcrumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/very-simple-contact-form-6cdecc6c25d61ef54d3cce62a39d5781.yaml b/nuclei-templates/cve-less/plugins/very-simple-contact-form-6cdecc6c25d61ef54d3cce62a39d5781.yaml new file mode 100644 index 0000000000..c7353203bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/very-simple-contact-form-6cdecc6c25d61ef54d3cce62a39d5781.yaml @@ -0,0 +1,58 @@ +id: very-simple-contact-form-6cdecc6c25d61ef54d3cce62a39d5781 + +info: + name: > + VS Contact Form <= 13.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3f665b8-fbd5-4100-baf6-3fa99332a5dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/very-simple-contact-form/" + google-query: inurl:"/wp-content/plugins/very-simple-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,very-simple-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/very-simple-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "very-simple-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/very-simple-contact-form-ac7f9e7a96a60fd50d34edd3ddfed5fd.yaml b/nuclei-templates/cve-less/plugins/very-simple-contact-form-ac7f9e7a96a60fd50d34edd3ddfed5fd.yaml new file mode 100644 index 0000000000..4d8c8708cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/very-simple-contact-form-ac7f9e7a96a60fd50d34edd3ddfed5fd.yaml @@ -0,0 +1,58 @@ +id: very-simple-contact-form-ac7f9e7a96a60fd50d34edd3ddfed5fd + +info: + name: > + VS Contact Form <= 14.7 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cc5c663-d1e3-4656-ac69-0d610eeaf774?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/very-simple-contact-form/" + google-query: inurl:"/wp-content/plugins/very-simple-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,very-simple-contact-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/very-simple-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "very-simple-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/very-simple-contact-form-c4a0d7f41c623cf7ed897902ed58a4d2.yaml b/nuclei-templates/cve-less/plugins/very-simple-contact-form-c4a0d7f41c623cf7ed897902ed58a4d2.yaml new file mode 100644 index 0000000000..6dbc656488 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/very-simple-contact-form-c4a0d7f41c623cf7ed897902ed58a4d2.yaml @@ -0,0 +1,58 @@ +id: very-simple-contact-form-c4a0d7f41c623cf7ed897902ed58a4d2 + +info: + name: > + Very Simple Contact Form <= 11.5 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25a8b9c9-da25-48b9-ada1-ca8a5941b2c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/very-simple-contact-form/" + google-query: inurl:"/wp-content/plugins/very-simple-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,very-simple-contact-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/very-simple-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "very-simple-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/very-simple-contact-form-fee860b7d0f6d3f1d84550b3137cfcb6.yaml b/nuclei-templates/cve-less/plugins/very-simple-contact-form-fee860b7d0f6d3f1d84550b3137cfcb6.yaml new file mode 100644 index 0000000000..230f2312fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/very-simple-contact-form-fee860b7d0f6d3f1d84550b3137cfcb6.yaml @@ -0,0 +1,58 @@ +id: very-simple-contact-form-fee860b7d0f6d3f1d84550b3137cfcb6 + +info: + name: > + VS Contact Form <= 11.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef7d7378-fa94-4964-916b-a41f69866d76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/very-simple-contact-form/" + google-query: inurl:"/wp-content/plugins/very-simple-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,very-simple-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/very-simple-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "very-simple-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/very-simple-google-maps-1f531b026c2443d4ba9e4c6118234d6d.yaml b/nuclei-templates/cve-less/plugins/very-simple-google-maps-1f531b026c2443d4ba9e4c6118234d6d.yaml new file mode 100644 index 0000000000..c1714fa29b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/very-simple-google-maps-1f531b026c2443d4ba9e4c6118234d6d.yaml @@ -0,0 +1,58 @@ +id: very-simple-google-maps-1f531b026c2443d4ba9e4c6118234d6d + +info: + name: > + Very Simple Google Maps <= 2.8.4 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e11fcc5-c9af-43e7-8c1d-803124e04e63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/very-simple-google-maps/" + google-query: inurl:"/wp-content/plugins/very-simple-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,very-simple-google-maps,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/very-simple-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "very-simple-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/very-simple-google-maps-3937fc851cb1ff4a5bb8e086fcf8881e.yaml b/nuclei-templates/cve-less/plugins/very-simple-google-maps-3937fc851cb1ff4a5bb8e086fcf8881e.yaml new file mode 100644 index 0000000000..551c91bfb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/very-simple-google-maps-3937fc851cb1ff4a5bb8e086fcf8881e.yaml @@ -0,0 +1,58 @@ +id: very-simple-google-maps-3937fc851cb1ff4a5bb8e086fcf8881e + +info: + name: > + Very Simple Google Maps <= 2.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca7837c-ad24-44ce-b073-7df3f8bc4300?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/very-simple-google-maps/" + google-query: inurl:"/wp-content/plugins/very-simple-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,very-simple-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/very-simple-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "very-simple-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/very-simple-quiz-2dc0412984b0bc2f2e238ad04ba47e6a.yaml b/nuclei-templates/cve-less/plugins/very-simple-quiz-2dc0412984b0bc2f2e238ad04ba47e6a.yaml new file mode 100644 index 0000000000..ed22e3a58c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/very-simple-quiz-2dc0412984b0bc2f2e238ad04ba47e6a.yaml @@ -0,0 +1,58 @@ +id: very-simple-quiz-2dc0412984b0bc2f2e238ad04ba47e6a + +info: + name: > + Very Simple Quiz <= 1.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39e3fcf3-95f6-4844-b87a-5540041fe6a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/very-simple-quiz/" + google-query: inurl:"/wp-content/plugins/very-simple-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,very-simple-quiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/very-simple-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "very-simple-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-background-5826ca6dc34aaca6ed2393f60977f5a4.yaml b/nuclei-templates/cve-less/plugins/video-background-5826ca6dc34aaca6ed2393f60977f5a4.yaml new file mode 100644 index 0000000000..475185b555 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-background-5826ca6dc34aaca6ed2393f60977f5a4.yaml @@ -0,0 +1,58 @@ +id: video-background-5826ca6dc34aaca6ed2393f60977f5a4 + +info: + name: > + Video Background <= 2.7.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45792c95-8abf-4d0c-85a1-cda6f505949d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-background/" + google-query: inurl:"/wp-content/plugins/video-background/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-background,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-background/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-background" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-central-0c9e1bdf3a0788fe28746e6155355583.yaml b/nuclei-templates/cve-less/plugins/video-central-0c9e1bdf3a0788fe28746e6155355583.yaml new file mode 100644 index 0000000000..a25423af0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-central-0c9e1bdf3a0788fe28746e6155355583.yaml @@ -0,0 +1,58 @@ +id: video-central-0c9e1bdf3a0788fe28746e6155355583 + +info: + name: > + Video Central for WordPress <= 1.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87eb6644-fd70-42a1-b05d-b166cb89c45c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-central/" + google-query: inurl:"/wp-content/plugins/video-central/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-central,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-central/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-central" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-comments-webcam-recorder-78372eee8a5b2f566eb2e73090f227ad.yaml b/nuclei-templates/cve-less/plugins/video-comments-webcam-recorder-78372eee8a5b2f566eb2e73090f227ad.yaml new file mode 100644 index 0000000000..d03861f239 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-comments-webcam-recorder-78372eee8a5b2f566eb2e73090f227ad.yaml @@ -0,0 +1,58 @@ +id: video-comments-webcam-recorder-78372eee8a5b2f566eb2e73090f227ad + +info: + name: > + HTML5 Webcam Microphone Recorder Forms < 1.55 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ddb9fc8-bed4-42ff-9664-6ea8fb136ec0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-comments-webcam-recorder/" + google-query: inurl:"/wp-content/plugins/video-comments-webcam-recorder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-comments-webcam-recorder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-comments-webcam-recorder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-comments-webcam-recorder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-04b07d5a23563c59738fac6ed8c55499.yaml b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-04b07d5a23563c59738fac6ed8c55499.yaml new file mode 100644 index 0000000000..95a90eeb0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-04b07d5a23563c59738fac6ed8c55499.yaml @@ -0,0 +1,58 @@ +id: video-conferencing-with-zoom-api-04b07d5a23563c59738fac6ed8c55499 + +info: + name: > + Video Conferencing with Zoom <= 4.4.5 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0966057b-8a3c-4d3c-84cb-cf36f1d97922?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-conferencing-with-zoom-api/" + google-query: inurl:"/wp-content/plugins/video-conferencing-with-zoom-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-conferencing-with-zoom-api,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-conferencing-with-zoom-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-conferencing-with-zoom-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-0f74188fa6907e010455dac3c70a8990.yaml b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-0f74188fa6907e010455dac3c70a8990.yaml new file mode 100644 index 0000000000..fa22addbe3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-0f74188fa6907e010455dac3c70a8990.yaml @@ -0,0 +1,58 @@ +id: video-conferencing-with-zoom-api-0f74188fa6907e010455dac3c70a8990 + +info: + name: > + Video Conferencing with Zoom <= 4.2.1 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba2515d9-ced0-4b49-87c4-04c8391c2608?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-conferencing-with-zoom-api/" + google-query: inurl:"/wp-content/plugins/video-conferencing-with-zoom-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-conferencing-with-zoom-api,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-conferencing-with-zoom-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-conferencing-with-zoom-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-53bb78dfe8f49d4c148bc03b41d5bdd1.yaml b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-53bb78dfe8f49d4c148bc03b41d5bdd1.yaml new file mode 100644 index 0000000000..104d7f41b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-53bb78dfe8f49d4c148bc03b41d5bdd1.yaml @@ -0,0 +1,58 @@ +id: video-conferencing-with-zoom-api-53bb78dfe8f49d4c148bc03b41d5bdd1 + +info: + name: > + Video Conferencing with Zoom <= 3.9.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33707b80-5cc1-4678-bf87-8c5131634c94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-conferencing-with-zoom-api/" + google-query: inurl:"/wp-content/plugins/video-conferencing-with-zoom-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-conferencing-with-zoom-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-conferencing-with-zoom-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-conferencing-with-zoom-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-9285e52d6060d6dfe3360f4e1f181cf7.yaml b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-9285e52d6060d6dfe3360f4e1f181cf7.yaml new file mode 100644 index 0000000000..1b793ee67a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-9285e52d6060d6dfe3360f4e1f181cf7.yaml @@ -0,0 +1,58 @@ +id: video-conferencing-with-zoom-api-9285e52d6060d6dfe3360f4e1f181cf7 + +info: + name: > + Video Conferencing with Zoom <= 4.4.4 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14da4735-894e-408a-864b-cdc76feacde9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-conferencing-with-zoom-api/" + google-query: inurl:"/wp-content/plugins/video-conferencing-with-zoom-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-conferencing-with-zoom-api,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-conferencing-with-zoom-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-conferencing-with-zoom-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-b3301724d1287a8bf29be9b1cdb836e4.yaml b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-b3301724d1287a8bf29be9b1cdb836e4.yaml new file mode 100644 index 0000000000..7ff142e921 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-b3301724d1287a8bf29be9b1cdb836e4.yaml @@ -0,0 +1,58 @@ +id: video-conferencing-with-zoom-api-b3301724d1287a8bf29be9b1cdb836e4 + +info: + name: > + Video Conferencing with Zoom <= 3.8.16 - E-mail Address Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a528a2b5-55e5-46e4-8f04-0d2b49f2f683?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-conferencing-with-zoom-api/" + google-query: inurl:"/wp-content/plugins/video-conferencing-with-zoom-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-conferencing-with-zoom-api,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-conferencing-with-zoom-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-conferencing-with-zoom-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-bb335261eec45408126dfda83cd4c302.yaml b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-bb335261eec45408126dfda83cd4c302.yaml new file mode 100644 index 0000000000..bf52c27a6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-bb335261eec45408126dfda83cd4c302.yaml @@ -0,0 +1,58 @@ +id: video-conferencing-with-zoom-api-bb335261eec45408126dfda83cd4c302 + +info: + name: > + Video Conferencing with Zoom <= 4.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89bdd732-a9ee-4ab8-a70e-195b92142fe1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-conferencing-with-zoom-api/" + google-query: inurl:"/wp-content/plugins/video-conferencing-with-zoom-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-conferencing-with-zoom-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-conferencing-with-zoom-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-conferencing-with-zoom-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-f10237083d4fb8765ca105c0d369da21.yaml b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-f10237083d4fb8765ca105c0d369da21.yaml new file mode 100644 index 0000000000..58da79db08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-f10237083d4fb8765ca105c0d369da21.yaml @@ -0,0 +1,58 @@ +id: video-conferencing-with-zoom-api-f10237083d4fb8765ca105c0d369da21 + +info: + name: > + Video Conferencing with Zoom <= 4.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06e48355-6932-4401-8787-e6432444930f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-conferencing-with-zoom-api/" + google-query: inurl:"/wp-content/plugins/video-conferencing-with-zoom-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-conferencing-with-zoom-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-conferencing-with-zoom-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-conferencing-with-zoom-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-fd0cb242cefa0526fbeeee9f82de8f3b.yaml b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-fd0cb242cefa0526fbeeee9f82de8f3b.yaml new file mode 100644 index 0000000000..9bfa5e5dc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-conferencing-with-zoom-api-fd0cb242cefa0526fbeeee9f82de8f3b.yaml @@ -0,0 +1,58 @@ +id: video-conferencing-with-zoom-api-fd0cb242cefa0526fbeeee9f82de8f3b + +info: + name: > + Video Conferencing with Zoom < 3.8.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4ba4365-449e-4271-b46e-7f149efc752c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-conferencing-with-zoom-api/" + google-query: inurl:"/wp-content/plugins/video-conferencing-with-zoom-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-conferencing-with-zoom-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-conferencing-with-zoom-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-conferencing-with-zoom-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-contest-9390ac5e66dccc4c03531e3f70a3187f.yaml b/nuclei-templates/cve-less/plugins/video-contest-9390ac5e66dccc4c03531e3f70a3187f.yaml new file mode 100644 index 0000000000..229363faff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-contest-9390ac5e66dccc4c03531e3f70a3187f.yaml @@ -0,0 +1,58 @@ +id: video-contest-9390ac5e66dccc4c03531e3f70a3187f + +info: + name: > + Video Contest WordPress Plugin <= 3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86079059-11c7-4545-b254-6bf524367b46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-contest/" + google-query: inurl:"/wp-content/plugins/video-contest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-contest,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-contest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-contest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-contest-9c305cd17e2c5e4b31590488ef7540fc.yaml b/nuclei-templates/cve-less/plugins/video-contest-9c305cd17e2c5e4b31590488ef7540fc.yaml new file mode 100644 index 0000000000..b182a99958 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-contest-9c305cd17e2c5e4b31590488ef7540fc.yaml @@ -0,0 +1,58 @@ +id: video-contest-9c305cd17e2c5e4b31590488ef7540fc + +info: + name: > + Video Contest WordPress Plugin <= 3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/597fe53e-769e-4edd-b0b9-2bd2cff50da6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-contest/" + google-query: inurl:"/wp-content/plugins/video-contest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-contest,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-contest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-contest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-embed-box-a38e11881f3b1727628c06798dde0846.yaml b/nuclei-templates/cve-less/plugins/video-embed-box-a38e11881f3b1727628c06798dde0846.yaml new file mode 100644 index 0000000000..2269031cba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-embed-box-a38e11881f3b1727628c06798dde0846.yaml @@ -0,0 +1,58 @@ +id: video-embed-box-a38e11881f3b1727628c06798dde0846 + +info: + name: > + Video Embed <= 1.0 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/667023f9-9c45-4182-b1f1-9d85d17aaf58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-embed-box/" + google-query: inurl:"/wp-content/plugins/video-embed-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-embed-box,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-embed-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-embed-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml b/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml new file mode 100644 index 0000000000..2db278319c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml @@ -0,0 +1,58 @@ +id: video-embed-thumbnail-generator-062f64c8e6a3f6d8894bd4ff8b102cb3 + +info: + name: > + Videopack (formerly Video Embed & Thumbnail Generator) < 2.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbdfef0e-aadd-456b-84f6-ecd626400cbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-embed-thumbnail-generator/" + google-query: inurl:"/wp-content/plugins/video-embed-thumbnail-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-embed-thumbnail-generator,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-embed-thumbnail-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-embed-thumbnail-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-98fa09468510e4f3d608da204df8d702.yaml b/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-98fa09468510e4f3d608da204df8d702.yaml new file mode 100644 index 0000000000..22f7f54680 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-98fa09468510e4f3d608da204df8d702.yaml @@ -0,0 +1,58 @@ +id: video-embed-thumbnail-generator-98fa09468510e4f3d608da204df8d702 + +info: + name: > + VideoJS (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d73f773-f084-40da-b18f-8b30b0d0c08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-embed-thumbnail-generator/" + google-query: inurl:"/wp-content/plugins/video-embed-thumbnail-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-embed-thumbnail-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-embed-thumbnail-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-embed-thumbnail-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4283af487d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: video-embed-thumbnail-generator-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-embed-thumbnail-generator/" + google-query: inurl:"/wp-content/plugins/video-embed-thumbnail-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-embed-thumbnail-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-embed-thumbnail-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-embed-thumbnail-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-e01f827fa521817af1e20ee7feffc395.yaml b/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-e01f827fa521817af1e20ee7feffc395.yaml new file mode 100644 index 0000000000..e7e80e9465 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-embed-thumbnail-generator-e01f827fa521817af1e20ee7feffc395.yaml @@ -0,0 +1,58 @@ +id: video-embed-thumbnail-generator-e01f827fa521817af1e20ee7feffc395 + +info: + name: > + Videopack (formerly Video Embed & Thumbnail Generator) <= 1.1 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f743d15a-a283-4138-9a12-7cf4dd235431?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-embed-thumbnail-generator/" + google-query: inurl:"/wp-content/plugins/video-embed-thumbnail-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-embed-thumbnail-generator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-embed-thumbnail-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-embed-thumbnail-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-grid-966b09d5da742736124d86ca165e04fd.yaml b/nuclei-templates/cve-less/plugins/video-grid-966b09d5da742736124d86ca165e04fd.yaml new file mode 100644 index 0000000000..e25fbf3772 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-grid-966b09d5da742736124d86ca165e04fd.yaml @@ -0,0 +1,58 @@ +id: video-grid-966b09d5da742736124d86ca165e04fd + +info: + name: > + Video Grid <= 1.21 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db5247ad-dbbf-4d8e-92f5-3a673b97d080?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-grid/" + google-query: inurl:"/wp-content/plugins/video-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-grid-da5e4c18307210c3c7624c0c204213c5.yaml b/nuclei-templates/cve-less/plugins/video-grid-da5e4c18307210c3c7624c0c204213c5.yaml new file mode 100644 index 0000000000..3574d99fd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-grid-da5e4c18307210c3c7624c0c204213c5.yaml @@ -0,0 +1,58 @@ +id: video-grid-da5e4c18307210c3c7624c0c204213c5 + +info: + name: > + Video Grid <= 1.21 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c92e166d-2ede-4280-a875-d30c0cf6f467?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-grid/" + google-query: inurl:"/wp-content/plugins/video-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-grid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-lead-form-2c3b5f42630b423898a1e16a09268499.yaml b/nuclei-templates/cve-less/plugins/video-lead-form-2c3b5f42630b423898a1e16a09268499.yaml new file mode 100644 index 0000000000..b3ae542c6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-lead-form-2c3b5f42630b423898a1e16a09268499.yaml @@ -0,0 +1,58 @@ +id: video-lead-form-2c3b5f42630b423898a1e16a09268499 + +info: + name: > + Video Lead Form < 0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cae1f5c7-ae91-4f45-8b4f-b2be89d36437?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-lead-form/" + google-query: inurl:"/wp-content/plugins/video-lead-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-lead-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-lead-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-lead-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-list-manager-0641eb85b540308df0a59914e6860d1d.yaml b/nuclei-templates/cve-less/plugins/video-list-manager-0641eb85b540308df0a59914e6860d1d.yaml new file mode 100644 index 0000000000..213ad321f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-list-manager-0641eb85b540308df0a59914e6860d1d.yaml @@ -0,0 +1,58 @@ +id: video-list-manager-0641eb85b540308df0a59914e6860d1d + +info: + name: > + Video List Manager <= 1.7 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b2d42ab-46c1-4c3e-b99a-1cdcade1b5bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-list-manager/" + google-query: inurl:"/wp-content/plugins/video-list-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-list-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-list-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-list-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-metabox-75efd2c629134e3b1ce9051b730e0f50.yaml b/nuclei-templates/cve-less/plugins/video-metabox-75efd2c629134e3b1ce9051b730e0f50.yaml new file mode 100644 index 0000000000..eee99cf4fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-metabox-75efd2c629134e3b1ce9051b730e0f50.yaml @@ -0,0 +1,58 @@ +id: video-metabox-75efd2c629134e3b1ce9051b730e0f50 + +info: + name: > + Video Metabox <= 1.1 - Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e49afbd-9038-4d1d-b545-4dc86bb1be61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-metabox/" + google-query: inurl:"/wp-content/plugins/video-metabox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-metabox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-metabox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-metabox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-playlist-and-gallery-plugin-b02a15f7379c80def93c3f96c6e69608.yaml b/nuclei-templates/cve-less/plugins/video-playlist-and-gallery-plugin-b02a15f7379c80def93c3f96c6e69608.yaml new file mode 100644 index 0000000000..5b921dbbe7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-playlist-and-gallery-plugin-b02a15f7379c80def93c3f96c6e69608.yaml @@ -0,0 +1,58 @@ +id: video-playlist-and-gallery-plugin-b02a15f7379c80def93c3f96c6e69608 + +info: + name: > + Cincopa video and media plug-in < 1.137 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c671f1e-21a7-45b7-951d-41b1c308dc9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-playlist-and-gallery-plugin/" + google-query: inurl:"/wp-content/plugins/video-playlist-and-gallery-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-playlist-and-gallery-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-playlist-and-gallery-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-playlist-and-gallery-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.137') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-playlist-and-gallery-plugin-cf54779dba07a41267cf823153d0f954.yaml b/nuclei-templates/cve-less/plugins/video-playlist-and-gallery-plugin-cf54779dba07a41267cf823153d0f954.yaml new file mode 100644 index 0000000000..6384d6b327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-playlist-and-gallery-plugin-cf54779dba07a41267cf823153d0f954.yaml @@ -0,0 +1,58 @@ +id: video-playlist-and-gallery-plugin-cf54779dba07a41267cf823153d0f954 + +info: + name: > + Post Video Players <= 1.159 - Cross-Site Request Forgery via cincopa_mp_mt_options_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/285d2b85-cdd0-4447-8cdc-b641751e4a5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-playlist-and-gallery-plugin/" + google-query: inurl:"/wp-content/plugins/video-playlist-and-gallery-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-playlist-and-gallery-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-playlist-and-gallery-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-playlist-and-gallery-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.159') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-playlist-for-youtube-a0ce396e7f670f307c62bda6d8db01dd.yaml b/nuclei-templates/cve-less/plugins/video-playlist-for-youtube-a0ce396e7f670f307c62bda6d8db01dd.yaml new file mode 100644 index 0000000000..eec9d7b428 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-playlist-for-youtube-a0ce396e7f670f307c62bda6d8db01dd.yaml @@ -0,0 +1,58 @@ +id: video-playlist-for-youtube-a0ce396e7f670f307c62bda6d8db01dd + +info: + name: > + Video Playlist For YouTube <= 6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d72c8140-90f1-49f5-bc42-925e29ecc0b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-playlist-for-youtube/" + google-query: inurl:"/wp-content/plugins/video-playlist-for-youtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-playlist-for-youtube,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-playlist-for-youtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-playlist-for-youtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-popup-73b8394a2820dad4a75a3855507d242d.yaml b/nuclei-templates/cve-less/plugins/video-popup-73b8394a2820dad4a75a3855507d242d.yaml new file mode 100644 index 0000000000..ba0a6e02de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-popup-73b8394a2820dad4a75a3855507d242d.yaml @@ -0,0 +1,58 @@ +id: video-popup-73b8394a2820dad4a75a3855507d242d + +info: + name: > + Video PopUp <= 1.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/670ea03e-2f76-48a4-9f40-bc4cfd987a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-popup/" + google-query: inurl:"/wp-content/plugins/video-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-posts-webcam-recorder-5db7f2428ab16ac575d716a8cfad3c32.yaml b/nuclei-templates/cve-less/plugins/video-posts-webcam-recorder-5db7f2428ab16ac575d716a8cfad3c32.yaml new file mode 100644 index 0000000000..871939e47d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-posts-webcam-recorder-5db7f2428ab16ac575d716a8cfad3c32.yaml @@ -0,0 +1,58 @@ +id: video-posts-webcam-recorder-5db7f2428ab16ac575d716a8cfad3c32 + +info: + name: > + Video Posts Webcam Recorder < 3.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4e343eb-b83d-43bf-a26d-db10dac18099?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-posts-webcam-recorder/" + google-query: inurl:"/wp-content/plugins/video-posts-webcam-recorder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-posts-webcam-recorder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-posts-webcam-recorder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-posts-webcam-recorder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-posts-webcam-recorder-c54528cc487e7accd04a692896738ff0.yaml b/nuclei-templates/cve-less/plugins/video-posts-webcam-recorder-c54528cc487e7accd04a692896738ff0.yaml new file mode 100644 index 0000000000..b899697ea1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-posts-webcam-recorder-c54528cc487e7accd04a692896738ff0.yaml @@ -0,0 +1,58 @@ +id: video-posts-webcam-recorder-c54528cc487e7accd04a692896738ff0 + +info: + name: > + Video Posts Webcam Recorder <= 1.55.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e0e022b-857d-4e7f-99d2-3837014c254e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-posts-webcam-recorder/" + google-query: inurl:"/wp-content/plugins/video-posts-webcam-recorder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-posts-webcam-recorder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-posts-webcam-recorder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-posts-webcam-recorder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.55.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-sidebar-widgets-24e6c274146f1f712f8edfca9e42b8b8.yaml b/nuclei-templates/cve-less/plugins/video-sidebar-widgets-24e6c274146f1f712f8edfca9e42b8b8.yaml new file mode 100644 index 0000000000..f2cc2ba7a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-sidebar-widgets-24e6c274146f1f712f8edfca9e42b8b8.yaml @@ -0,0 +1,58 @@ +id: video-sidebar-widgets-24e6c274146f1f712f8edfca9e42b8b8 + +info: + name: > + Video Sidebar Widgets <= 6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50e85f2c-3e3a-40b0-af82-7278656533d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-sidebar-widgets/" + google-query: inurl:"/wp-content/plugins/video-sidebar-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-sidebar-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-sidebar-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-sidebar-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-slider-with-thumbnails-8d15869c84f7bfe6c6e24ef3e0872ddf.yaml b/nuclei-templates/cve-less/plugins/video-slider-with-thumbnails-8d15869c84f7bfe6c6e24ef3e0872ddf.yaml new file mode 100644 index 0000000000..b38bce5d3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-slider-with-thumbnails-8d15869c84f7bfe6c6e24ef3e0872ddf.yaml @@ -0,0 +1,58 @@ +id: video-slider-with-thumbnails-8d15869c84f7bfe6c6e24ef3e0872ddf + +info: + name: > + Video Gallery <= 1.0.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cfbad9f-61ba-4216-9078-c1e7e809899a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-slider-with-thumbnails/" + google-query: inurl:"/wp-content/plugins/video-slider-with-thumbnails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-slider-with-thumbnails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-slider-with-thumbnails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-slider-with-thumbnails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-synchro-pdf-a674e9a5d2840820506909b7c50b3d92.yaml b/nuclei-templates/cve-less/plugins/video-synchro-pdf-a674e9a5d2840820506909b7c50b3d92.yaml new file mode 100644 index 0000000000..22350e4202 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-synchro-pdf-a674e9a5d2840820506909b7c50b3d92.yaml @@ -0,0 +1,58 @@ +id: video-synchro-pdf-a674e9a5d2840820506909b7c50b3d92 + +info: + name: > + Videos sync PDF <= 1.7.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4554235f-1790-4be7-a575-02fb18c6a4a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-synchro-pdf/" + google-query: inurl:"/wp-content/plugins/video-synchro-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-synchro-pdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-synchro-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-synchro-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-synchro-pdf-b6332548231f9e6746e56fba70247618.yaml b/nuclei-templates/cve-less/plugins/video-synchro-pdf-b6332548231f9e6746e56fba70247618.yaml new file mode 100644 index 0000000000..c182401833 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-synchro-pdf-b6332548231f9e6746e56fba70247618.yaml @@ -0,0 +1,58 @@ +id: video-synchro-pdf-b6332548231f9e6746e56fba70247618 + +info: + name: > + Videos sync PDF <= 1.7.4 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/068d9502-705e-45dc-a7fb-e75866226fdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-synchro-pdf/" + google-query: inurl:"/wp-content/plugins/video-synchro-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-synchro-pdf,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-synchro-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-synchro-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-thumbnails-66fc8c140dcc821532233cac0866d8de.yaml b/nuclei-templates/cve-less/plugins/video-thumbnails-66fc8c140dcc821532233cac0866d8de.yaml new file mode 100644 index 0000000000..b35728e58d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-thumbnails-66fc8c140dcc821532233cac0866d8de.yaml @@ -0,0 +1,58 @@ +id: video-thumbnails-66fc8c140dcc821532233cac0866d8de + +info: + name: > + Video Thumbnails <= 2.12.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb2f463f-2c99-4a6c-92b9-45fb2192381d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-thumbnails/" + google-query: inurl:"/wp-content/plugins/video-thumbnails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-thumbnails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-thumbnails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-thumbnails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/video-xml-sitemap-generator-6dedc798f36ce152fba54a352e7344d1.yaml b/nuclei-templates/cve-less/plugins/video-xml-sitemap-generator-6dedc798f36ce152fba54a352e7344d1.yaml new file mode 100644 index 0000000000..e07d37df46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/video-xml-sitemap-generator-6dedc798f36ce152fba54a352e7344d1.yaml @@ -0,0 +1,58 @@ +id: video-xml-sitemap-generator-6dedc798f36ce152fba54a352e7344d1 + +info: + name: > + Video XML Sitemap Generator <= 1.0.0 - Cross-Site Request Forgery via video_sitemap_generate + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e11e1b5-dbba-4920-a65c-210600878861?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/video-xml-sitemap-generator/" + google-query: inurl:"/wp-content/plugins/video-xml-sitemap-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,video-xml-sitemap-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/video-xml-sitemap-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "video-xml-sitemap-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videojs-html5-player-affad12bbe06868aff921eeaa6373196.yaml b/nuclei-templates/cve-less/plugins/videojs-html5-player-affad12bbe06868aff921eeaa6373196.yaml new file mode 100644 index 0000000000..d2bb3f8378 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videojs-html5-player-affad12bbe06868aff921eeaa6373196.yaml @@ -0,0 +1,58 @@ +id: videojs-html5-player-affad12bbe06868aff921eeaa6373196 + +info: + name: > + Videojs HTML5 Player <= 1.1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef4ecdd3-1041-4dbe-a804-59a51f6123e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videojs-html5-player/" + google-query: inurl:"/wp-content/plugins/videojs-html5-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videojs-html5-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videojs-html5-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videojs-html5-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videojs-html5-video-player-for-wordpress-cb800bf450a42c7a99ab39154ac260ab.yaml b/nuclei-templates/cve-less/plugins/videojs-html5-video-player-for-wordpress-cb800bf450a42c7a99ab39154ac260ab.yaml new file mode 100644 index 0000000000..44bc057ad9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videojs-html5-video-player-for-wordpress-cb800bf450a42c7a99ab39154ac260ab.yaml @@ -0,0 +1,58 @@ +id: videojs-html5-video-player-for-wordpress-cb800bf450a42c7a99ab39154ac260ab + +info: + name: > + Video.js – HTML5 Video Player for WordPress <= 4.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92084af7-142b-45de-8881-dee5cf1367e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videojs-html5-video-player-for-wordpress/" + google-query: inurl:"/wp-content/plugins/videojs-html5-video-player-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videojs-html5-video-player-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videojs-html5-video-player-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videojs-html5-video-player-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videos-on-admin-dashboard-8391bb351216c4e82b25becd62acbe04.yaml b/nuclei-templates/cve-less/plugins/videos-on-admin-dashboard-8391bb351216c4e82b25becd62acbe04.yaml new file mode 100644 index 0000000000..723cb4c425 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videos-on-admin-dashboard-8391bb351216c4e82b25becd62acbe04.yaml @@ -0,0 +1,58 @@ +id: videos-on-admin-dashboard-8391bb351216c4e82b25becd62acbe04 + +info: + name: > + Videos on Admin Dashboard < 1.1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aae57fed-1003-4b3a-8489-cfc85c250a04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videos-on-admin-dashboard/" + google-query: inurl:"/wp-content/plugins/videos-on-admin-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videos-on-admin-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videos-on-admin-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videos-on-admin-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowall-00e5ad7e3bf399641d532ed3e720874e.yaml b/nuclei-templates/cve-less/plugins/videowall-00e5ad7e3bf399641d532ed3e720874e.yaml new file mode 100644 index 0000000000..1f1fa6a7db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowall-00e5ad7e3bf399641d532ed3e720874e.yaml @@ -0,0 +1,58 @@ +id: videowall-00e5ad7e3bf399641d532ed3e720874e + +info: + name: > + videowall (All Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd112c38-e6c1-435c-b62d-8fab06e90eb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowall/" + google-query: inurl:"/wp-content/plugins/videowall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-03b6c1fcf0f57a257ac2a3d2a55d5120.yaml b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-03b6c1fcf0f57a257ac2a3d2a55d5120.yaml new file mode 100644 index 0000000000..b7ecbc40da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-03b6c1fcf0f57a257ac2a3d2a55d5120.yaml @@ -0,0 +1,58 @@ +id: videowhisper-live-streaming-integration-03b6c1fcf0f57a257ac2a3d2a55d5120 + +info: + name: > + Broadcast Live Video – Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP <= 4.25.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51880262-78ad-4791-8e3d-f6718de9f2a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-live-streaming-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-live-streaming-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.25.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-42a62f1f71a30dceae90a70ace46a441.yaml b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-42a62f1f71a30dceae90a70ace46a441.yaml new file mode 100644 index 0000000000..98fdc000a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-42a62f1f71a30dceae90a70ace46a441.yaml @@ -0,0 +1,58 @@ +id: videowhisper-live-streaming-integration-42a62f1f71a30dceae90a70ace46a441 + +info: + name: > + Broadcast Live Video – Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP <= 4.27.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6e4c583-c0d5-4040-86d5-0f1b4dddcb81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-live-streaming-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-live-streaming-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.27.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-6a21a7f0a6f77d602fe9c552fd42f33f.yaml b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-6a21a7f0a6f77d602fe9c552fd42f33f.yaml new file mode 100644 index 0000000000..9721ac6a48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-6a21a7f0a6f77d602fe9c552fd42f33f.yaml @@ -0,0 +1,58 @@ +id: videowhisper-live-streaming-integration-6a21a7f0a6f77d602fe9c552fd42f33f + +info: + name: > + Broadcast Live Video – Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP < 4.29.5 - Arbitrary File Read/Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5e45e96-3cfb-42a9-b8b7-519489bc03ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-live-streaming-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-live-streaming-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.29.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-7d1e8292f93556701618a4f3a10127bf.yaml b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-7d1e8292f93556701618a4f3a10127bf.yaml new file mode 100644 index 0000000000..67d388acbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-7d1e8292f93556701618a4f3a10127bf.yaml @@ -0,0 +1,58 @@ +id: videowhisper-live-streaming-integration-7d1e8292f93556701618a4f3a10127bf + +info: + name: > + Broadcast Live Video – Live Streaming < 4.29.5 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/959846a3-0e57-4227-a52b-942b589596f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-live-streaming-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-live-streaming-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.29.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-86f850e8e3017abf354eb04e885cbf48.yaml b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-86f850e8e3017abf354eb04e885cbf48.yaml new file mode 100644 index 0000000000..a0f6e9f8c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-86f850e8e3017abf354eb04e885cbf48.yaml @@ -0,0 +1,58 @@ +id: videowhisper-live-streaming-integration-86f850e8e3017abf354eb04e885cbf48 + +info: + name: > + Live Streaming - Broadcast Live Video <= 5.5.15 - Missing Authorization to Unauthenticated Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27180d98-223a-4d86-b8ea-e47da1d61bbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-live-streaming-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-live-streaming-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-a2cc7daca48d70191ab86ec84c12d114.yaml b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-a2cc7daca48d70191ab86ec84c12d114.yaml new file mode 100644 index 0000000000..ef4fbce3e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-a2cc7daca48d70191ab86ec84c12d114.yaml @@ -0,0 +1,58 @@ +id: videowhisper-live-streaming-integration-a2cc7daca48d70191ab86ec84c12d114 + +info: + name: > + Broadcast Live Video – Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP <= 4.29.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b3a2738-5312-4b34-9bd3-4ff95a91706e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-live-streaming-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-live-streaming-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.29.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-e248f5c6da990a6a809a8d58910d242b.yaml b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-e248f5c6da990a6a809a8d58910d242b.yaml new file mode 100644 index 0000000000..1d2018a1b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-e248f5c6da990a6a809a8d58910d242b.yaml @@ -0,0 +1,58 @@ +id: videowhisper-live-streaming-integration-e248f5c6da990a6a809a8d58910d242b + +info: + name: > + Broadcast Live Video – Live Streaming < 4.27.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a96da08b-f43d-4432-8c47-c86a1a1299ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-live-streaming-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-live-streaming-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.27.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-e3eb91ea8e0abf266056dc6051ae44be.yaml b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-e3eb91ea8e0abf266056dc6051ae44be.yaml new file mode 100644 index 0000000000..4f07e20b2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-live-streaming-integration-e3eb91ea8e0abf266056dc6051ae44be.yaml @@ -0,0 +1,58 @@ +id: videowhisper-live-streaming-integration-e3eb91ea8e0abf266056dc6051ae44be + +info: + name: > + Broadcast Live Video – Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP < 4.29.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36aecabd-4982-426d-be47-075c23a452a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-live-streaming-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-live-streaming-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.29.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-482450ad7baa658a3b68c206f814d808.yaml b/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-482450ad7baa658a3b68c206f814d808.yaml new file mode 100644 index 0000000000..e65beba201 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-482450ad7baa658a3b68c206f814d808.yaml @@ -0,0 +1,58 @@ +id: videowhisper-video-conference-integration-482450ad7baa658a3b68c206f814d808 + +info: + name: > + Webcam Video Conference <= 4.91.8 - Unrestricted File Upload leading to Remote Code Execuction + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ef5e73e-a627-4e9c-9784-493ace5c8614?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-video-conference-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-video-conference-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-video-conference-integration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-video-conference-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-video-conference-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.91.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-6f6f44e45d5eee07a0df86633d90ebbf.yaml b/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-6f6f44e45d5eee07a0df86633d90ebbf.yaml new file mode 100644 index 0000000000..d1f6e7945d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-6f6f44e45d5eee07a0df86633d90ebbf.yaml @@ -0,0 +1,58 @@ +id: videowhisper-video-conference-integration-6f6f44e45d5eee07a0df86633d90ebbf + +info: + name: > + Webcam Video Conference < 4.51 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a4d5a40-2ec0-468e-bafb-a713629f6006?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-video-conference-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-video-conference-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-video-conference-integration,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-video-conference-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-video-conference-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-eb64a1dd7efbf5edcd293e2db2a6feb2.yaml b/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-eb64a1dd7efbf5edcd293e2db2a6feb2.yaml new file mode 100644 index 0000000000..a03e0a5473 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-video-conference-integration-eb64a1dd7efbf5edcd293e2db2a6feb2.yaml @@ -0,0 +1,58 @@ +id: videowhisper-video-conference-integration-eb64a1dd7efbf5edcd293e2db2a6feb2 + +info: + name: > + Webcam Video Conference <= 3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96084352-cc53-45fc-a33f-2ebf470f81a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-video-conference-integration/" + google-query: inurl:"/wp-content/plugins/videowhisper-video-conference-integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-video-conference-integration,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-video-conference-integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-video-conference-integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-video-presentation-9998c7f7c7bb7712cfa7f84562a697aa.yaml b/nuclei-templates/cve-less/plugins/videowhisper-video-presentation-9998c7f7c7bb7712cfa7f84562a697aa.yaml new file mode 100644 index 0000000000..5fde0ecbf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-video-presentation-9998c7f7c7bb7712cfa7f84562a697aa.yaml @@ -0,0 +1,58 @@ +id: videowhisper-video-presentation-9998c7f7c7bb7712cfa7f84562a697aa + +info: + name: > + VideoWhisper Video Presentation <= 3.25 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f57458b-0cd2-4958-8190-c89076771e86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-video-presentation/" + google-query: inurl:"/wp-content/plugins/videowhisper-video-presentation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-video-presentation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-video-presentation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-video-presentation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/videowhisper-video-presentation-cefd687fbbabebb599cedccce0e05504.yaml b/nuclei-templates/cve-less/plugins/videowhisper-video-presentation-cefd687fbbabebb599cedccce0e05504.yaml new file mode 100644 index 0000000000..4d39953cc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/videowhisper-video-presentation-cefd687fbbabebb599cedccce0e05504.yaml @@ -0,0 +1,58 @@ +id: videowhisper-video-presentation-cefd687fbbabebb599cedccce0e05504 + +info: + name: > + VideoWhisper Video Presentation <= 4.1.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc26d20e-3ecd-438e-a123-5015ecc17290?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/videowhisper-video-presentation/" + google-query: inurl:"/wp-content/plugins/videowhisper-video-presentation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,videowhisper-video-presentation,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/videowhisper-video-presentation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "videowhisper-video-presentation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vidseo-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/vidseo-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1be2752427 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vidseo-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: vidseo-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vidseo/" + google-query: inurl:"/wp-content/plugins/vidseo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vidseo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vidseo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vidseo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/view-all-posts-pages-2a6d9f6b466aaa4a0be1aebe9eb53633.yaml b/nuclei-templates/cve-less/plugins/view-all-posts-pages-2a6d9f6b466aaa4a0be1aebe9eb53633.yaml new file mode 100644 index 0000000000..c465b56c0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/view-all-posts-pages-2a6d9f6b466aaa4a0be1aebe9eb53633.yaml @@ -0,0 +1,58 @@ +id: view-all-posts-pages-2a6d9f6b466aaa4a0be1aebe9eb53633 + +info: + name: > + View All Post's Pages <= 0.9.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61d731cb-2c1b-4835-b8ea-4d1b330fdad9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/view-all-posts-pages/" + google-query: inurl:"/wp-content/plugins/view-all-posts-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,view-all-posts-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/view-all-posts-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "view-all-posts-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-0b7d0113722a4b24cdf6bdf7adba767c.yaml b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-0b7d0113722a4b24cdf6bdf7adba767c.yaml new file mode 100644 index 0000000000..392e15e500 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-0b7d0113722a4b24cdf6bdf7adba767c.yaml @@ -0,0 +1,58 @@ +id: views-for-wpforms-lite-0b7d0113722a4b24cdf6bdf7adba767c + +info: + name: > + Views for WPForms <= 3.2.2 - Missing Authorization via save_view + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c4c8113-4c46-4179-9c7f-9d5d4337254d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/views-for-wpforms-lite/" + google-query: inurl:"/wp-content/plugins/views-for-wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,views-for-wpforms-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/views-for-wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "views-for-wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-56d2c56931ff57a31974c2c98619fbfb.yaml b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-56d2c56931ff57a31974c2c98619fbfb.yaml new file mode 100644 index 0000000000..a3a19657e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-56d2c56931ff57a31974c2c98619fbfb.yaml @@ -0,0 +1,58 @@ +id: views-for-wpforms-lite-56d2c56931ff57a31974c2c98619fbfb + +info: + name: > + Views for WPForms <= 3.2.2 - Missing Authorization via get_form_fields + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ab58add-ab81-4c84-b773-7daf382492b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/views-for-wpforms-lite/" + google-query: inurl:"/wp-content/plugins/views-for-wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,views-for-wpforms-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/views-for-wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "views-for-wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-8cd4e41bc9637a2e580f2b8d0e6a5222.yaml b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-8cd4e41bc9637a2e580f2b8d0e6a5222.yaml new file mode 100644 index 0000000000..05e230827b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-8cd4e41bc9637a2e580f2b8d0e6a5222.yaml @@ -0,0 +1,58 @@ +id: views-for-wpforms-lite-8cd4e41bc9637a2e580f2b8d0e6a5222 + +info: + name: > + Views for WPForms <= 3.2.2 - Missing Authorization via create_view + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9565693-fd0b-4412-944c-81b3cd79492e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/views-for-wpforms-lite/" + google-query: inurl:"/wp-content/plugins/views-for-wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,views-for-wpforms-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/views-for-wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "views-for-wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-a603f2f7b17ff9bc553bc5b3bf9dd764.yaml b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-a603f2f7b17ff9bc553bc5b3bf9dd764.yaml new file mode 100644 index 0000000000..f0ca5e5164 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-a603f2f7b17ff9bc553bc5b3bf9dd764.yaml @@ -0,0 +1,58 @@ +id: views-for-wpforms-lite-a603f2f7b17ff9bc553bc5b3bf9dd764 + +info: + name: > + Views for WPForms <= 3.2.2 - Cross-Site Request Forgery via save_view + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2273c53-bc8a-45c7-914d-a3b934c2cb18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/views-for-wpforms-lite/" + google-query: inurl:"/wp-content/plugins/views-for-wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,views-for-wpforms-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/views-for-wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "views-for-wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-c6f76b277135a527f7d758e51abc2864.yaml b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-c6f76b277135a527f7d758e51abc2864.yaml new file mode 100644 index 0000000000..ea1855bd94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/views-for-wpforms-lite-c6f76b277135a527f7d758e51abc2864.yaml @@ -0,0 +1,58 @@ +id: views-for-wpforms-lite-c6f76b277135a527f7d758e51abc2864 + +info: + name: > + Views for WPForms <= 3.2.2 - Cross-Site Request Forgery via create_view + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34c0c676-37f9-49f2-ad50-2d70831fda53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/views-for-wpforms-lite/" + google-query: inurl:"/wp-content/plugins/views-for-wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,views-for-wpforms-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/views-for-wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "views-for-wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vigilantor-9d9f04adbd773a74d47487580aa614ff.yaml b/nuclei-templates/cve-less/plugins/vigilantor-9d9f04adbd773a74d47487580aa614ff.yaml new file mode 100644 index 0000000000..3fc9a9fe40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vigilantor-9d9f04adbd773a74d47487580aa614ff.yaml @@ -0,0 +1,58 @@ +id: vigilantor-9d9f04adbd773a74d47487580aa614ff + +info: + name: > + VigilanTor <= 1.3.10 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ea71d63-27ce-4f24-b3ef-de38e6f25e0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vigilantor/" + google-query: inurl:"/wp-content/plugins/vigilantor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vigilantor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vigilantor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vigilantor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-059937c2ab51cec2bc81f288819c3352.yaml b/nuclei-templates/cve-less/plugins/vikbooking-059937c2ab51cec2bc81f288819c3352.yaml new file mode 100644 index 0000000000..d5a060edf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-059937c2ab51cec2bc81f288819c3352.yaml @@ -0,0 +1,58 @@ +id: vikbooking-059937c2ab51cec2bc81f288819c3352 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in admin_widgets_welcome function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/035d5f4a-1145-48e0-8388-e319088ebd52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-0f884ba817e82a09c51444fd8fb9e0c3.yaml b/nuclei-templates/cve-less/plugins/vikbooking-0f884ba817e82a09c51444fd8fb9e0c3.yaml new file mode 100644 index 0000000000..575dd4819a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-0f884ba817e82a09c51444fd8fb9e0c3.yaml @@ -0,0 +1,58 @@ +id: vikbooking-0f884ba817e82a09c51444fd8fb9e0c3 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c3f4796-3496-4786-9afb-bd32827764ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-1132ab9cdb5e1aa03187f7d03bdc59a2.yaml b/nuclei-templates/cve-less/plugins/vikbooking-1132ab9cdb5e1aa03187f7d03bdc59a2.yaml new file mode 100644 index 0000000000..bb2a2c8517 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-1132ab9cdb5e1aa03187f7d03bdc59a2.yaml @@ -0,0 +1,58 @@ +id: vikbooking-1132ab9cdb5e1aa03187f7d03bdc59a2 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.3 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3df8a0a2-e248-4c2e-a9c2-b5afc79cdd2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-11c30745c195f14e48360fc77cdc8022.yaml b/nuclei-templates/cve-less/plugins/vikbooking-11c30745c195f14e48360fc77cdc8022.yaml new file mode 100644 index 0000000000..8c0fe47e3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-11c30745c195f14e48360fc77cdc8022.yaml @@ -0,0 +1,58 @@ +id: vikbooking-11c30745c195f14e48360fc77cdc8022 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.6.1 - Cross-Site Request Forgery in listenTosFieldSavingTask function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8445aed7-107c-4627-9390-b4b5eb402b11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-12086c6161e4cc7ce0b879de54cf11f6.yaml b/nuclei-templates/cve-less/plugins/vikbooking-12086c6161e4cc7ce0b879de54cf11f6.yaml new file mode 100644 index 0000000000..ffa1710ec0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-12086c6161e4cc7ce0b879de54cf11f6.yaml @@ -0,0 +1,58 @@ +id: vikbooking-12086c6161e4cc7ce0b879de54cf11f6 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.11 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/530ee998-de16-407f-8e84-b0d7c31c6f5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-149a8ac4ac482f385c63390cadbe0a31.yaml b/nuclei-templates/cve-less/plugins/vikbooking-149a8ac4ac482f385c63390cadbe0a31.yaml new file mode 100644 index 0000000000..abef554706 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-149a8ac4ac482f385c63390cadbe0a31.yaml @@ -0,0 +1,58 @@ +id: vikbooking-149a8ac4ac482f385c63390cadbe0a31 + +info: + name: > + VikBooking <= 1.5.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b7f31c-084e-489c-a902-c16e62b99e45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-3dd533aeaca3a609962577867487da63.yaml b/nuclei-templates/cve-less/plugins/vikbooking-3dd533aeaca3a609962577867487da63.yaml new file mode 100644 index 0000000000..7ffd5a944e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-3dd533aeaca3a609962577867487da63.yaml @@ -0,0 +1,58 @@ +id: vikbooking-3dd533aeaca3a609962577867487da63 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in exec_admin_widget function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5ef15c4-c96b-4e88-a941-e34d23a0e06a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-403f4119f5106c46647a3bb6c05fea16.yaml b/nuclei-templates/cve-less/plugins/vikbooking-403f4119f5106c46647a3bb6c05fea16.yaml new file mode 100644 index 0000000000..b1be6489c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-403f4119f5106c46647a3bb6c05fea16.yaml @@ -0,0 +1,58 @@ +id: vikbooking-403f4119f5106c46647a3bb6c05fea16 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d806853-48c7-4c1c-9a9f-37d493695682?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-9ff0528f3bdcbc7bc2a574ec76b7073c.yaml b/nuclei-templates/cve-less/plugins/vikbooking-9ff0528f3bdcbc7bc2a574ec76b7073c.yaml new file mode 100644 index 0000000000..6f041ec3b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-9ff0528f3bdcbc7bc2a574ec76b7073c.yaml @@ -0,0 +1,58 @@ +id: vikbooking-9ff0528f3bdcbc7bc2a574ec76b7073c + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64196936-a0b8-48a7-ba5c-01ce061df82c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-ba194baade8141b72395aa7c5242d733.yaml b/nuclei-templates/cve-less/plugins/vikbooking-ba194baade8141b72395aa7c5242d733.yaml new file mode 100644 index 0000000000..23b8f0a35c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-ba194baade8141b72395aa7c5242d733.yaml @@ -0,0 +1,58 @@ +id: vikbooking-ba194baade8141b72395aa7c5242d733 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.6.1 - Cross-Site Request Forgery in multiple functions in admin/controller.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b670550-cf04-4db1-95e7-0330b5793c58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-c0b90ff70024ded1dfbdce03e3404db4.yaml b/nuclei-templates/cve-less/plugins/vikbooking-c0b90ff70024ded1dfbdce03e3404db4.yaml new file mode 100644 index 0000000000..0af8c5447b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-c0b90ff70024ded1dfbdce03e3404db4.yaml @@ -0,0 +1,58 @@ +id: vikbooking-c0b90ff70024ded1dfbdce03e3404db4 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in saveconfig function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/385c6324-3d8e-4dc7-b8ca-309b05e7bdcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-c19786c26a81604ba7bc3b6d58623c1b.yaml b/nuclei-templates/cve-less/plugins/vikbooking-c19786c26a81604ba7bc3b6d58623c1b.yaml new file mode 100644 index 0000000000..070cbc4ca9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-c19786c26a81604ba7bc3b6d58623c1b.yaml @@ -0,0 +1,58 @@ +id: vikbooking-c19786c26a81604ba7bc3b6d58623c1b + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in savetranslation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0631ac6-2d85-4073-be2c-05480deecf97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-c235b99db232fa89dbe1e8ea3f927b66.yaml b/nuclei-templates/cve-less/plugins/vikbooking-c235b99db232fa89dbe1e8ea3f927b66.yaml new file mode 100644 index 0000000000..a7e07b23b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-c235b99db232fa89dbe1e8ea3f927b66.yaml @@ -0,0 +1,58 @@ +id: vikbooking-c235b99db232fa89dbe1e8ea3f927b66 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in savetmplfile function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ad32ff7-0557-439d-aa0f-49c5ea4271ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-d0ed43596ccad23cf6dcc12ca585066a.yaml b/nuclei-templates/cve-less/plugins/vikbooking-d0ed43596ccad23cf6dcc12ca585066a.yaml new file mode 100644 index 0000000000..5b802f0169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-d0ed43596ccad23cf6dcc12ca585066a.yaml @@ -0,0 +1,58 @@ +id: vikbooking-d0ed43596ccad23cf6dcc12ca585066a + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in savetranslationstay function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2594cef-6bde-425f-9412-fd4ed3da312e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-ea274279c76479017f4b24af2da83e22.yaml b/nuclei-templates/cve-less/plugins/vikbooking-ea274279c76479017f4b24af2da83e22.yaml new file mode 100644 index 0000000000..b34f04497d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-ea274279c76479017f4b24af2da83e22.yaml @@ -0,0 +1,58 @@ +id: vikbooking-ea274279c76479017f4b24af2da83e22 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in widgets_watch_data function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b07b46a6-8a5d-40cb-8af9-baf0f1722736?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-f0f2d05530912202185a73680e9244c7.yaml b/nuclei-templates/cve-less/plugins/vikbooking-f0f2d05530912202185a73680e9244c7.yaml new file mode 100644 index 0000000000..8638f31346 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-f0f2d05530912202185a73680e9244c7.yaml @@ -0,0 +1,58 @@ +id: vikbooking-f0f2d05530912202185a73680e9244c7 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.6.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/364c8488-dab2-46bd-84b6-adfa59e2b013?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-fa15faecec3c0097e1e35ec5d5e47da4.yaml b/nuclei-templates/cve-less/plugins/vikbooking-fa15faecec3c0097e1e35ec5d5e47da4.yaml new file mode 100644 index 0000000000..31641158a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-fa15faecec3c0097e1e35ec5d5e47da4.yaml @@ -0,0 +1,58 @@ +id: vikbooking-fa15faecec3c0097e1e35ec5d5e47da4 + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.7 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebe215c6-b328-49b7-aed7-e164e1c5f0d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-fcfcdfbc5ea20598aae14247eec11a2c.yaml b/nuclei-templates/cve-less/plugins/vikbooking-fcfcdfbc5ea20598aae14247eec11a2c.yaml new file mode 100644 index 0000000000..867b5cdc8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-fcfcdfbc5ea20598aae14247eec11a2c.yaml @@ -0,0 +1,58 @@ +id: vikbooking-fcfcdfbc5ea20598aae14247eec11a2c + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in save_admin_widgets function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2945971-80c6-44a2-bc65-1243af365692?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikbooking-ffb7f4edd06313966de8aad6a57d25cc.yaml b/nuclei-templates/cve-less/plugins/vikbooking-ffb7f4edd06313966de8aad6a57d25cc.yaml new file mode 100644 index 0000000000..e58fa2b826 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikbooking-ffb7f4edd06313966de8aad6a57d25cc.yaml @@ -0,0 +1,58 @@ +id: vikbooking-ffb7f4edd06313966de8aad6a57d25cc + +info: + name: > + VikBooking Hotel Booking Engine & PMS <= 1.5.12 - Cross-Site Request Forgery in exec_multitask_widgets function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6adc0154-169a-4d72-8687-66dbf6766139?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikbooking/" + google-query: inurl:"/wp-content/plugins/vikbooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikbooking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikbooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikbooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikrentcar-16743b52ce55d3a70d56b31f8a11af2a.yaml b/nuclei-templates/cve-less/plugins/vikrentcar-16743b52ce55d3a70d56b31f8a11af2a.yaml new file mode 100644 index 0000000000..32e24bd395 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikrentcar-16743b52ce55d3a70d56b31f8a11af2a.yaml @@ -0,0 +1,58 @@ +id: vikrentcar-16743b52ce55d3a70d56b31f8a11af2a + +info: + name: > + Vik Rent Car <= 1.1.6 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a79fda3-44eb-41fd-b049-971b959daecf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikrentcar/" + google-query: inurl:"/wp-content/plugins/vikrentcar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikrentcar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikrentcar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikrentcar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikrentcar-24d354774853bc075905dadb9ff31bb3.yaml b/nuclei-templates/cve-less/plugins/vikrentcar-24d354774853bc075905dadb9ff31bb3.yaml new file mode 100644 index 0000000000..a3cf351496 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikrentcar-24d354774853bc075905dadb9ff31bb3.yaml @@ -0,0 +1,58 @@ +id: vikrentcar-24d354774853bc075905dadb9ff31bb3 + +info: + name: > + VikRentCar Car Rental Management System <= 1.3.2 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c01a8fbc-c16a-40e2-b628-f874cd3b21e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikrentcar/" + google-query: inurl:"/wp-content/plugins/vikrentcar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikrentcar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikrentcar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikrentcar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikrentcar-89a7d7a1b88043a7292e56fadd9f32f2.yaml b/nuclei-templates/cve-less/plugins/vikrentcar-89a7d7a1b88043a7292e56fadd9f32f2.yaml new file mode 100644 index 0000000000..35b965fa4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikrentcar-89a7d7a1b88043a7292e56fadd9f32f2.yaml @@ -0,0 +1,58 @@ +id: vikrentcar-89a7d7a1b88043a7292e56fadd9f32f2 + +info: + name: > + VikRentCar Car Rental Management System <= 1.3.0 - Authenticated (Admin+) Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05dcfd2d-6488-4f82-b20b-4968e4a00796?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikrentcar/" + google-query: inurl:"/wp-content/plugins/vikrentcar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikrentcar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikrentcar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikrentcar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vikrentcar-8e0a508178120443600d129a2e7dbdba.yaml b/nuclei-templates/cve-less/plugins/vikrentcar-8e0a508178120443600d129a2e7dbdba.yaml new file mode 100644 index 0000000000..468de5c7e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vikrentcar-8e0a508178120443600d129a2e7dbdba.yaml @@ -0,0 +1,58 @@ +id: vikrentcar-8e0a508178120443600d129a2e7dbdba + +info: + name: > + VikRentCar Car Rental Management System < 1.1.10 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acbe0ccd-f814-4cdd-ab70-6b8d29166e25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vikrentcar/" + google-query: inurl:"/wp-content/plugins/vikrentcar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vikrentcar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vikrentcar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vikrentcar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vimeo-video-autoplay-automute-eaecffa52785ff552863c4cf8f09811c.yaml b/nuclei-templates/cve-less/plugins/vimeo-video-autoplay-automute-eaecffa52785ff552863c4cf8f09811c.yaml new file mode 100644 index 0000000000..dc5db01be1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vimeo-video-autoplay-automute-eaecffa52785ff552863c4cf8f09811c.yaml @@ -0,0 +1,58 @@ +id: vimeo-video-autoplay-automute-eaecffa52785ff552863c4cf8f09811c + +info: + name: > + Vimeo Video Autoplay Automute <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3494e39-b4dc-46c1-9e8f-2c04fa3df940?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vimeo-video-autoplay-automute/" + google-query: inurl:"/wp-content/plugins/vimeo-video-autoplay-automute/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vimeo-video-autoplay-automute,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vimeo-video-autoplay-automute/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vimeo-video-autoplay-automute" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vimeography-bebe54861e63e8c1edcba180c7d233b2.yaml b/nuclei-templates/cve-less/plugins/vimeography-bebe54861e63e8c1edcba180c7d233b2.yaml new file mode 100644 index 0000000000..bd834688a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vimeography-bebe54861e63e8c1edcba180c7d233b2.yaml @@ -0,0 +1,58 @@ +id: vimeography-bebe54861e63e8c1edcba180c7d233b2 + +info: + name: > + Vimeography: Vimeo Video Gallery WordPress Plugin <= 2.3.2 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/853516b2-ec50-4937-89d3-d16042a6f71c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vimeography/" + google-query: inurl:"/wp-content/plugins/vimeography/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vimeography,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vimeography/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vimeography" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/virim-88ade2a77a8822c9ff6c3f53c1bb583d.yaml b/nuclei-templates/cve-less/plugins/virim-88ade2a77a8822c9ff6c3f53c1bb583d.yaml new file mode 100644 index 0000000000..14b45669a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/virim-88ade2a77a8822c9ff6c3f53c1bb583d.yaml @@ -0,0 +1,58 @@ +id: virim-88ade2a77a8822c9ff6c3f53c1bb583d + +info: + name: > + Virim <= 0.4 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b12deaa4-246e-4502-8091-fcbe5a2eae15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/virim/" + google-query: inurl:"/wp-content/plugins/virim/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,virim,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/virim/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "virim" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/virtual-robotstxt-littlebizzy-2d9ff787627cd2e1924f86a1568cd815.yaml b/nuclei-templates/cve-less/plugins/virtual-robotstxt-littlebizzy-2d9ff787627cd2e1924f86a1568cd815.yaml new file mode 100644 index 0000000000..c55053d2b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/virtual-robotstxt-littlebizzy-2d9ff787627cd2e1924f86a1568cd815.yaml @@ -0,0 +1,58 @@ +id: virtual-robotstxt-littlebizzy-2d9ff787627cd2e1924f86a1568cd815 + +info: + name: > + Virtual Robots.txt < 1.10 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11653fa1-c6f5-4bcc-81d2-dd469300b40a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/virtual-robotstxt-littlebizzy/" + google-query: inurl:"/wp-content/plugins/virtual-robotstxt-littlebizzy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,virtual-robotstxt-littlebizzy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/virtual-robotstxt-littlebizzy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "virtual-robotstxt-littlebizzy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visibility-logic-elementor-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/visibility-logic-elementor-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..be827e9369 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visibility-logic-elementor-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: visibility-logic-elementor-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visibility-logic-elementor/" + google-query: inurl:"/wp-content/plugins/visibility-logic-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visibility-logic-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visibility-logic-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visibility-logic-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visibility-logic-elementor-3bd671f811e3dbd6eac29209e9039fd8.yaml b/nuclei-templates/cve-less/plugins/visibility-logic-elementor-3bd671f811e3dbd6eac29209e9039fd8.yaml new file mode 100644 index 0000000000..9e1849d170 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visibility-logic-elementor-3bd671f811e3dbd6eac29209e9039fd8.yaml @@ -0,0 +1,58 @@ +id: visibility-logic-elementor-3bd671f811e3dbd6eac29209e9039fd8 + +info: + name: > + Visibility Logic for Elementor <= 2.3.4 - Missing Authorization via admin_post 'toggle_option' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72c04de6-78d2-4a45-834a-01ed879b528f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visibility-logic-elementor/" + google-query: inurl:"/wp-content/plugins/visibility-logic-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visibility-logic-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visibility-logic-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visibility-logic-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visibility-logic-elementor-72146eb794f4fa05966f36db5696ae7f.yaml b/nuclei-templates/cve-less/plugins/visibility-logic-elementor-72146eb794f4fa05966f36db5696ae7f.yaml new file mode 100644 index 0000000000..84eb2d3c00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visibility-logic-elementor-72146eb794f4fa05966f36db5696ae7f.yaml @@ -0,0 +1,58 @@ +id: visibility-logic-elementor-72146eb794f4fa05966f36db5696ae7f + +info: + name: > + Visibility Logic for Elementor <= 2.3.4 - Cross-Site Request Forgery via toggle_option + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb8aca3a-e4f7-41d6-9ea9-d189817c2c04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visibility-logic-elementor/" + google-query: inurl:"/wp-content/plugins/visibility-logic-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visibility-logic-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visibility-logic-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visibility-logic-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visibility-logic-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/visibility-logic-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..c686ee5b8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visibility-logic-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: visibility-logic-elementor-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visibility-logic-elementor/" + google-query: inurl:"/wp-content/plugins/visibility-logic-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visibility-logic-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visibility-logic-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visibility-logic-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vision-b3d167dc589e1f7c398305699f98be68.yaml b/nuclei-templates/cve-less/plugins/vision-b3d167dc589e1f7c398305699f98be68.yaml new file mode 100644 index 0000000000..a899b15695 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vision-b3d167dc589e1f7c398305699f98be68.yaml @@ -0,0 +1,58 @@ +id: vision-b3d167dc589e1f7c398305699f98be68 + +info: + name: > + Vision Interactive <= 1.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e99c10d-6632-4520-9239-9b831becd103?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vision/" + google-query: inurl:"/wp-content/plugins/vision/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vision,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vision/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vision" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vision-c13eb59a9d6116b65835e8ca21a2d0eb.yaml b/nuclei-templates/cve-less/plugins/vision-c13eb59a9d6116b65835e8ca21a2d0eb.yaml new file mode 100644 index 0000000000..22ae5d4411 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vision-c13eb59a9d6116b65835e8ca21a2d0eb.yaml @@ -0,0 +1,58 @@ +id: vision-c13eb59a9d6116b65835e8ca21a2d0eb + +info: + name: > + Vision Interactive <= 1.7.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24c4449e-0f20-4c77-a83c-05f547a9d853?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vision/" + google-query: inurl:"/wp-content/plugins/vision/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vision,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vision/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vision" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vision-f802cbbf070d1570e17c10fd49d87b73.yaml b/nuclei-templates/cve-less/plugins/vision-f802cbbf070d1570e17c10fd49d87b73.yaml new file mode 100644 index 0000000000..f960163154 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vision-f802cbbf070d1570e17c10fd49d87b73.yaml @@ -0,0 +1,58 @@ +id: vision-f802cbbf070d1570e17c10fd49d87b73 + +info: + name: > + Vision Interactive For WordPress <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/202a8724-14da-4edb-870e-2fee205b1d53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vision/" + google-query: inurl:"/wp-content/plugins/vision/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vision,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vision/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vision" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitor-analytics-io-8e9a9f02c6675b20e9272fbaa352217c.yaml b/nuclei-templates/cve-less/plugins/visitor-analytics-io-8e9a9f02c6675b20e9272fbaa352217c.yaml new file mode 100644 index 0000000000..0eafb64479 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitor-analytics-io-8e9a9f02c6675b20e9272fbaa352217c.yaml @@ -0,0 +1,58 @@ +id: visitor-analytics-io-8e9a9f02c6675b20e9272fbaa352217c + +info: + name: > + TWIPLA (Visitor Analytics IO) <= 1.2.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a604c8d-1e4a-42c2-b7cf-ee6cae54730c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitor-analytics-io/" + google-query: inurl:"/wp-content/plugins/visitor-analytics-io/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitor-analytics-io,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitor-analytics-io/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitor-analytics-io" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitor-info-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/visitor-info-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dc21ddc178 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitor-info-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: visitor-info-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitor-info/" + google-query: inurl:"/wp-content/plugins/visitor-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitor-info,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitor-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitor-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitor-maps-41e6c56837296bd4311fa3f480bdbffa.yaml b/nuclei-templates/cve-less/plugins/visitor-maps-41e6c56837296bd4311fa3f480bdbffa.yaml new file mode 100644 index 0000000000..fd208d8848 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitor-maps-41e6c56837296bd4311fa3f480bdbffa.yaml @@ -0,0 +1,58 @@ +id: visitor-maps-41e6c56837296bd4311fa3f480bdbffa + +info: + name: > + Visitor Maps <= 1.5.8.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06ff683d-b3ef-4cae-84f4-be6ada37d5bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitor-maps/" + google-query: inurl:"/wp-content/plugins/visitor-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitor-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitor-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitor-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-app-e71ce69c47edc4e510fe6e645722913d.yaml b/nuclei-templates/cve-less/plugins/visitors-app-e71ce69c47edc4e510fe6e645722913d.yaml new file mode 100644 index 0000000000..23ee7c2a9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-app-e71ce69c47edc4e510fe6e645722913d.yaml @@ -0,0 +1,58 @@ +id: visitors-app-e71ce69c47edc4e510fe6e645722913d + +info: + name: > + Visitors <= 0.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae9df4e5-b1d2-400b-89c7-eac5fbf2a8d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-app/" + google-query: inurl:"/wp-content/plugins/visitors-app/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-app,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-app/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-app" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-online-25b24f1a950efe4f8999613471b96c47.yaml b/nuclei-templates/cve-less/plugins/visitors-online-25b24f1a950efe4f8999613471b96c47.yaml new file mode 100644 index 0000000000..d0cb7306d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-online-25b24f1a950efe4f8999613471b96c47.yaml @@ -0,0 +1,58 @@ +id: visitors-online-25b24f1a950efe4f8999613471b96c47 + +info: + name: > + Visitors Online by BestWebSoft <= 0.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dfa4ddf-bbe7-49b1-8b0d-c030ae81d0e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-online/" + google-query: inurl:"/wp-content/plugins/visitors-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-online,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-online-fa2ea82db1a96118628c1703677b3f4f.yaml b/nuclei-templates/cve-less/plugins/visitors-online-fa2ea82db1a96118628c1703677b3f4f.yaml new file mode 100644 index 0000000000..8a74f1316c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-online-fa2ea82db1a96118628c1703677b3f4f.yaml @@ -0,0 +1,58 @@ +id: visitors-online-fa2ea82db1a96118628c1703677b3f4f + +info: + name: > + Visitors Online by BestWebSoft < 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9032d416-28d1-4fdc-ac95-ba807df165a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-online/" + google-query: inurl:"/wp-content/plugins/visitors-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-online,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-354f6d128f8dd6bd63a76dae47bd8628.yaml b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-354f6d128f8dd6bd63a76dae47bd8628.yaml new file mode 100644 index 0000000000..4d8f304ccf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-354f6d128f8dd6bd63a76dae47bd8628.yaml @@ -0,0 +1,58 @@ +id: visitors-traffic-real-time-statistics-354f6d128f8dd6bd63a76dae47bd8628 + +info: + name: > + Visitor Traffic Real Time Statistics <= 1.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae741363-b0aa-4263-bb49-d3baa213167a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" + google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-traffic-real-time-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-traffic-real-time-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-36f12570b7647f69d0074b300c5e8c91.yaml b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-36f12570b7647f69d0074b300c5e8c91.yaml new file mode 100644 index 0000000000..e6ed877297 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-36f12570b7647f69d0074b300c5e8c91.yaml @@ -0,0 +1,58 @@ +id: visitors-traffic-real-time-statistics-36f12570b7647f69d0074b300c5e8c91 + +info: + name: > + Visitor Traffic Real Time Statistics <= 2.11 - Missing Authorization to Arbitrary Plugin Installation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33086968-359f-46d7-825e-29c4e4449899?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" + google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-traffic-real-time-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-traffic-real-time-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-4fea783b4afcd4b123f2e73a82fb91f6.yaml b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-4fea783b4afcd4b123f2e73a82fb91f6.yaml new file mode 100644 index 0000000000..7aa8d88420 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-4fea783b4afcd4b123f2e73a82fb91f6.yaml @@ -0,0 +1,58 @@ +id: visitors-traffic-real-time-statistics-4fea783b4afcd4b123f2e73a82fb91f6 + +info: + name: > + Visitor Traffic Real Time Statistics <= 3.8 - Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17f85a52-7f55-4e11-8be3-f088eaad41b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" + google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-traffic-real-time-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-traffic-real-time-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-57b54adcb0ab1b8bfd870b37f7db6b68.yaml b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-57b54adcb0ab1b8bfd870b37f7db6b68.yaml new file mode 100644 index 0000000000..f724d0e769 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-57b54adcb0ab1b8bfd870b37f7db6b68.yaml @@ -0,0 +1,58 @@ +id: visitors-traffic-real-time-statistics-57b54adcb0ab1b8bfd870b37f7db6b68 + +info: + name: > + Visitor Traffic Real Time Statistics <= 6.7 - Missing Authorization to Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7ab5a00-ce1c-4d74-9192-c9834e2d702d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" + google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-traffic-real-time-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-traffic-real-time-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-5a91aad28267261ebd2de3c8343f1995.yaml b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-5a91aad28267261ebd2de3c8343f1995.yaml new file mode 100644 index 0000000000..dbf9e9151e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-5a91aad28267261ebd2de3c8343f1995.yaml @@ -0,0 +1,58 @@ +id: visitors-traffic-real-time-statistics-5a91aad28267261ebd2de3c8343f1995 + +info: + name: > + Visitors Traffic Real Time Statistics <= 7.2 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4aac424-abf3-4d6c-a0a4-a95e2cf89864?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" + google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-traffic-real-time-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-traffic-real-time-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-95fcd32657de195d1ff10c3dd6c72f1b.yaml b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-95fcd32657de195d1ff10c3dd6c72f1b.yaml new file mode 100644 index 0000000000..f4d3d026ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-95fcd32657de195d1ff10c3dd6c72f1b.yaml @@ -0,0 +1,58 @@ +id: visitors-traffic-real-time-statistics-95fcd32657de195d1ff10c3dd6c72f1b + +info: + name: > + Visitor Traffic Real Time Statistics <= 1.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/043f5052-6606-4f0e-a6f2-d7276eb50106?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" + google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-traffic-real-time-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-traffic-real-time-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-c591eeb2c7d14c7927ba6447beaabc1b.yaml b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-c591eeb2c7d14c7927ba6447beaabc1b.yaml new file mode 100644 index 0000000000..3e5f564212 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visitors-traffic-real-time-statistics-c591eeb2c7d14c7927ba6447beaabc1b.yaml @@ -0,0 +1,58 @@ +id: visitors-traffic-real-time-statistics-c591eeb2c7d14c7927ba6447beaabc1b + +info: + name: > + Visitor Traffic Real Time Statistics <= 2.13 - Cross-Site Request Forgery to Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4e9263-36f7-490c-9dad-d3b806bcfdf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" + google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visitors-traffic-real-time-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visitors-traffic-real-time-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-footer-credit-remover-364c4ddc9c54073c09edf9a8678d0eaa.yaml b/nuclei-templates/cve-less/plugins/visual-footer-credit-remover-364c4ddc9c54073c09edf9a8678d0eaa.yaml new file mode 100644 index 0000000000..a2784d0e1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-footer-credit-remover-364c4ddc9c54073c09edf9a8678d0eaa.yaml @@ -0,0 +1,58 @@ +id: visual-footer-credit-remover-364c4ddc9c54073c09edf9a8678d0eaa + +info: + name: > + Visual Footer Credit Remover <= 1.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fcb65a0-4218-4728-9c29-0d1a03f438a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-footer-credit-remover/" + google-query: inurl:"/wp-content/plugins/visual-footer-credit-remover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-footer-credit-remover,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-footer-credit-remover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-footer-credit-remover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-form-builder-02a51eb116d83b932887ff5f7b3fb4a8.yaml b/nuclei-templates/cve-less/plugins/visual-form-builder-02a51eb116d83b932887ff5f7b3fb4a8.yaml new file mode 100644 index 0000000000..b9e31b3d9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-form-builder-02a51eb116d83b932887ff5f7b3fb4a8.yaml @@ -0,0 +1,58 @@ +id: visual-form-builder-02a51eb116d83b932887ff5f7b3fb4a8 + +info: + name: > + Visual Form Builder <= 3.0.6 - Admin+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/897824d0-17cc-4322-bcd9-5e41d141bf62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-form-builder/" + google-query: inurl:"/wp-content/plugins/visual-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-form-builder-101912c034e5833d5a8cc53836ca2a9d.yaml b/nuclei-templates/cve-less/plugins/visual-form-builder-101912c034e5833d5a8cc53836ca2a9d.yaml new file mode 100644 index 0000000000..37f5c13127 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-form-builder-101912c034e5833d5a8cc53836ca2a9d.yaml @@ -0,0 +1,58 @@ +id: visual-form-builder-101912c034e5833d5a8cc53836ca2a9d + +info: + name: > + Visual Form Builder <= 2.8.2 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79289ad7-f289-4472-973d-d0ec2996c5c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-form-builder/" + google-query: inurl:"/wp-content/plugins/visual-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-form-builder-4c347b72fa44728662f7bf8d25a3a220.yaml b/nuclei-templates/cve-less/plugins/visual-form-builder-4c347b72fa44728662f7bf8d25a3a220.yaml new file mode 100644 index 0000000000..67e69570a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-form-builder-4c347b72fa44728662f7bf8d25a3a220.yaml @@ -0,0 +1,58 @@ +id: visual-form-builder-4c347b72fa44728662f7bf8d25a3a220 + +info: + name: > + Visual Form Builder <= 3.0.3 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50e373bd-4408-4406-a411-3284fa71e7ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-form-builder/" + google-query: inurl:"/wp-content/plugins/visual-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-form-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-form-builder-531bd0b3fee40b8878bba597b7ee560f.yaml b/nuclei-templates/cve-less/plugins/visual-form-builder-531bd0b3fee40b8878bba597b7ee560f.yaml new file mode 100644 index 0000000000..34574f6a02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-form-builder-531bd0b3fee40b8878bba597b7ee560f.yaml @@ -0,0 +1,58 @@ +id: visual-form-builder-531bd0b3fee40b8878bba597b7ee560f + +info: + name: > + Visual Form Builder <= 3.0.5 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fe81113-6ed1-48f2-a6d0-db4c19f6df10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-form-builder/" + google-query: inurl:"/wp-content/plugins/visual-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-form-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-form-builder-666310311f6b757b5edf8f0953dbd9e0.yaml b/nuclei-templates/cve-less/plugins/visual-form-builder-666310311f6b757b5edf8f0953dbd9e0.yaml new file mode 100644 index 0000000000..fa895e97ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-form-builder-666310311f6b757b5edf8f0953dbd9e0.yaml @@ -0,0 +1,58 @@ +id: visual-form-builder-666310311f6b757b5edf8f0953dbd9e0 + +info: + name: > + Visual Form Builder <= 2.8.2 - Cross-Site Request Forgery to SQL Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/373e9a7c-cdc3-43cb-9c8f-2be25f514b61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-form-builder/" + google-query: inurl:"/wp-content/plugins/visual-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-form-builder-ae7a817c1a6cf436dfde12a47c0fecc0.yaml b/nuclei-templates/cve-less/plugins/visual-form-builder-ae7a817c1a6cf436dfde12a47c0fecc0.yaml new file mode 100644 index 0000000000..b6e606578c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-form-builder-ae7a817c1a6cf436dfde12a47c0fecc0.yaml @@ -0,0 +1,58 @@ +id: visual-form-builder-ae7a817c1a6cf436dfde12a47c0fecc0 + +info: + name: > + Visual Form Builder <= 2.8.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16e2c051-6ec6-4b09-8802-adb537fa9af0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-form-builder/" + google-query: inurl:"/wp-content/plugins/visual-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-form-builder-bbd390969a32b30a2e60ec6fbae2e10c.yaml b/nuclei-templates/cve-less/plugins/visual-form-builder-bbd390969a32b30a2e60ec6fbae2e10c.yaml new file mode 100644 index 0000000000..073ff8a1a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-form-builder-bbd390969a32b30a2e60ec6fbae2e10c.yaml @@ -0,0 +1,58 @@ +id: visual-form-builder-bbd390969a32b30a2e60ec6fbae2e10c + +info: + name: > + Visual Form Builder <= 3.0.7 - Cross-Site Request Forgery to Data Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a26473b9-8cc1-47e6-a3d3-4ebf1f9e902a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-form-builder/" + google-query: inurl:"/wp-content/plugins/visual-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-form-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-form-builder-fd65d6ef4219e436898ad3cacb24b677.yaml b/nuclei-templates/cve-less/plugins/visual-form-builder-fd65d6ef4219e436898ad3cacb24b677.yaml new file mode 100644 index 0000000000..39e188d120 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-form-builder-fd65d6ef4219e436898ad3cacb24b677.yaml @@ -0,0 +1,58 @@ +id: visual-form-builder-fd65d6ef4219e436898ad3cacb24b677 + +info: + name: > + Visual Form Builder <= 3.0.5 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdbd3a1a-a206-4e50-893d-1b2d6c8d153a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-form-builder/" + google-query: inurl:"/wp-content/plugins/visual-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-form-builder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-link-preview-1ba012726d7c27bdaaa5794ed01a43ce.yaml b/nuclei-templates/cve-less/plugins/visual-link-preview-1ba012726d7c27bdaaa5794ed01a43ce.yaml new file mode 100644 index 0000000000..5175e8974c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-link-preview-1ba012726d7c27bdaaa5794ed01a43ce.yaml @@ -0,0 +1,58 @@ +id: visual-link-preview-1ba012726d7c27bdaaa5794ed01a43ce + +info: + name: > + Visual Link Preview <= 2.2.2 - Unauthorised AJAX Calls + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/012e019f-9146-45bc-b4d7-aa724dbebdc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-link-preview/" + google-query: inurl:"/wp-content/plugins/visual-link-preview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-link-preview,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-link-preview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-link-preview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-portfolio-904ef9700805f0f3f94a1742149713b3.yaml b/nuclei-templates/cve-less/plugins/visual-portfolio-904ef9700805f0f3f94a1742149713b3.yaml new file mode 100644 index 0000000000..b07e8f48eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-portfolio-904ef9700805f0f3f94a1742149713b3.yaml @@ -0,0 +1,58 @@ +id: visual-portfolio-904ef9700805f0f3f94a1742149713b3 + +info: + name: > + Visual Portfolio, Photo Gallery & Post Grid <= 2.17.1 - Unauthenticated CSS Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e20082a0-dca6-4a26-919f-d59752dfbe90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-portfolio/" + google-query: inurl:"/wp-content/plugins/visual-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-portfolio,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visual-portfolio-f7bdb4090710d2db62425857f01fcc9d.yaml b/nuclei-templates/cve-less/plugins/visual-portfolio-f7bdb4090710d2db62425857f01fcc9d.yaml new file mode 100644 index 0000000000..232dbf9408 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visual-portfolio-f7bdb4090710d2db62425857f01fcc9d.yaml @@ -0,0 +1,58 @@ +id: visual-portfolio-f7bdb4090710d2db62425857f01fcc9d + +info: + name: > + Visual Portfolio, Photo Gallery & Post Grid <= 2.18.0 - Contributor+ CSS Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7519c43-d8d1-4412-b2f3-77f59736924c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visual-portfolio/" + google-query: inurl:"/wp-content/plugins/visual-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visual-portfolio,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visual-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visual-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualcomposer-1390282d7da53f6dd62f69c33ae3d8da.yaml b/nuclei-templates/cve-less/plugins/visualcomposer-1390282d7da53f6dd62f69c33ae3d8da.yaml new file mode 100644 index 0000000000..adc0869deb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualcomposer-1390282d7da53f6dd62f69c33ae3d8da.yaml @@ -0,0 +1,58 @@ +id: visualcomposer-1390282d7da53f6dd62f69c33ae3d8da + +info: + name: > + Visual Composer Premium <= 45.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/622b9b46-774d-4251-9a79-73e5b398de57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualcomposer/" + google-query: inurl:"/wp-content/plugins/visualcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualcomposer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 45.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualcomposer-8a58bcfdfe2c7ef0990c9f0e6222a7d9.yaml b/nuclei-templates/cve-less/plugins/visualcomposer-8a58bcfdfe2c7ef0990c9f0e6222a7d9.yaml new file mode 100644 index 0000000000..0b4919dba1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualcomposer-8a58bcfdfe2c7ef0990c9f0e6222a7d9.yaml @@ -0,0 +1,58 @@ +id: visualcomposer-8a58bcfdfe2c7ef0990c9f0e6222a7d9 + +info: + name: > + Visual Composer Website Builder <= 45.0 - Authenticated Stored Cross-Site Scripting via 'Title' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26c7be89-a83d-4912-aef5-4cc046b5d768?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualcomposer/" + google-query: inurl:"/wp-content/plugins/visualcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualcomposer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 45.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualcomposer-9c4cf933125615aec48f1e67f49080b2.yaml b/nuclei-templates/cve-less/plugins/visualcomposer-9c4cf933125615aec48f1e67f49080b2.yaml new file mode 100644 index 0000000000..04ac3eb24d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualcomposer-9c4cf933125615aec48f1e67f49080b2.yaml @@ -0,0 +1,58 @@ +id: visualcomposer-9c4cf933125615aec48f1e67f49080b2 + +info: + name: > + Visual Composer Website Builder <= 45.0 - Authenticated Stored Cross-Site Scripting via 'Text Block' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38dd95b2-d747-44f3-a3f5-d32221381554?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualcomposer/" + google-query: inurl:"/wp-content/plugins/visualcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualcomposer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 45.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualcomposer-b1162d19127bf06b82fd09bfd50f373f.yaml b/nuclei-templates/cve-less/plugins/visualcomposer-b1162d19127bf06b82fd09bfd50f373f.yaml new file mode 100644 index 0000000000..8c93c0f12a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualcomposer-b1162d19127bf06b82fd09bfd50f373f.yaml @@ -0,0 +1,58 @@ +id: visualcomposer-b1162d19127bf06b82fd09bfd50f373f + +info: + name: > + Visual Composer <= 26.0 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c476d9af-9060-4294-874a-86e550253d3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualcomposer/" + google-query: inurl:"/wp-content/plugins/visualcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualcomposer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualcomposer-f7c4402196deebd8e7afa93ed50fb9fe.yaml b/nuclei-templates/cve-less/plugins/visualcomposer-f7c4402196deebd8e7afa93ed50fb9fe.yaml new file mode 100644 index 0000000000..9bdfd5d87d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualcomposer-f7c4402196deebd8e7afa93ed50fb9fe.yaml @@ -0,0 +1,58 @@ +id: visualcomposer-f7c4402196deebd8e7afa93ed50fb9fe + +info: + name: > + Visual Composer Website Builder <= 45.6.0 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3042586-dd23-487f-a79c-7ad5b5e38677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualcomposer/" + google-query: inurl:"/wp-content/plugins/visualcomposer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualcomposer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualcomposer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualcomposer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 45.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-2124b535b772d79cc24446b949f6de44.yaml b/nuclei-templates/cve-less/plugins/visualizer-2124b535b772d79cc24446b949f6de44.yaml new file mode 100644 index 0000000000..ce23b1a057 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-2124b535b772d79cc24446b949f6de44.yaml @@ -0,0 +1,58 @@ +id: visualizer-2124b535b772d79cc24446b949f6de44 + +info: + name: > + Visualizer: Tables and Charts Manager for WordPress <= 3.7.9 - Authenticated (Contributor+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9606d92-8061-4dfc-a6e2-509b54613277?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-41ad3634ff8212271a6b431b84da2b4e.yaml b/nuclei-templates/cve-less/plugins/visualizer-41ad3634ff8212271a6b431b84da2b4e.yaml new file mode 100644 index 0000000000..55150e6b77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-41ad3634ff8212271a6b431b84da2b4e.yaml @@ -0,0 +1,58 @@ +id: visualizer-41ad3634ff8212271a6b431b84da2b4e + +info: + name: > + Visualizer: Tables and Charts Manager for WordPress <= 3.3.0 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54a425b0-592a-433d-b9e7-776760536668?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-4f85b81befb670bebb2829a27d7eeb09.yaml b/nuclei-templates/cve-less/plugins/visualizer-4f85b81befb670bebb2829a27d7eeb09.yaml new file mode 100644 index 0000000000..f30b6ccda6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-4f85b81befb670bebb2829a27d7eeb09.yaml @@ -0,0 +1,58 @@ +id: visualizer-4f85b81befb670bebb2829a27d7eeb09 + +info: + name: > + Visualizer <= 3.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88829cca-4389-4b1a-a376-7abfbc37508e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-586527cb70d024f19104907acee04683.yaml b/nuclei-templates/cve-less/plugins/visualizer-586527cb70d024f19104907acee04683.yaml new file mode 100644 index 0000000000..0934f45e02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-586527cb70d024f19104907acee04683.yaml @@ -0,0 +1,58 @@ +id: visualizer-586527cb70d024f19104907acee04683 + +info: + name: > + Visualizer <= 3.9.1 - Authenticated(Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d32ceb67-8ad1-4f59-b4a8-63c9c3e8b90c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-9153236cbe43b83fd86d1f43d04bc623.yaml b/nuclei-templates/cve-less/plugins/visualizer-9153236cbe43b83fd86d1f43d04bc623.yaml new file mode 100644 index 0000000000..756590638b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-9153236cbe43b83fd86d1f43d04bc623.yaml @@ -0,0 +1,58 @@ +id: visualizer-9153236cbe43b83fd86d1f43d04bc623 + +info: + name: > + Visualizer: Tables and Charts Manager for WordPress <= 3.3.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eaaf1ac0-1ea6-4bcb-a385-87267525801c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/visualizer-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..c3b7ea45e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: visualizer-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-9bbff95ee11b793fca5a68930a481dc0.yaml b/nuclei-templates/cve-less/plugins/visualizer-9bbff95ee11b793fca5a68930a481dc0.yaml new file mode 100644 index 0000000000..ff019f6169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-9bbff95ee11b793fca5a68930a481dc0.yaml @@ -0,0 +1,58 @@ +id: visualizer-9bbff95ee11b793fca5a68930a481dc0 + +info: + name: > + Visualizer <= 3.10.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a97f74bf-c3a5-4bb3-a7fd-d3f43af6ec42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-a42d8ff7a7669fd14fcfc52a34b52ce7.yaml b/nuclei-templates/cve-less/plugins/visualizer-a42d8ff7a7669fd14fcfc52a34b52ce7.yaml new file mode 100644 index 0000000000..8bfd021d24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-a42d8ff7a7669fd14fcfc52a34b52ce7.yaml @@ -0,0 +1,58 @@ +id: visualizer-a42d8ff7a7669fd14fcfc52a34b52ce7 + +info: + name: > + Visualizer: Tables and Charts Manager for WordPress <= 3.7.9 - Authenticated (Contributor+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d25ed357-2895-47c7-9418-628068c6d18e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/visualizer-ec448d87fbb2bc9f763dfc52911d4e7b.yaml b/nuclei-templates/cve-less/plugins/visualizer-ec448d87fbb2bc9f763dfc52911d4e7b.yaml new file mode 100644 index 0000000000..3f4516848e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/visualizer-ec448d87fbb2bc9f763dfc52911d4e7b.yaml @@ -0,0 +1,58 @@ +id: visualizer-ec448d87fbb2bc9f763dfc52911d4e7b + +info: + name: > + Visualizer <= 3.7.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abc14a00-5560-440b-a5ba-4ff41a6c54c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/visualizer/" + google-query: inurl:"/wp-content/plugins/visualizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,visualizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/visualizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "visualizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vit-website-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/vit-website-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..315d69db6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vit-website-reviews-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: vit-website-reviews-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vit-website-reviews/" + google-query: inurl:"/wp-content/plugins/vit-website-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vit-website-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vit-website-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vit-website-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vitamin-78063a4bd6e10b68423683776f51a447.yaml b/nuclei-templates/cve-less/plugins/vitamin-78063a4bd6e10b68423683776f51a447.yaml new file mode 100644 index 0000000000..19226056e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vitamin-78063a4bd6e10b68423683776f51a447.yaml @@ -0,0 +1,58 @@ +id: vitamin-78063a4bd6e10b68423683776f51a447 + +info: + name: > + Vitamin < 1.1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/992a91da-724f-40cc-b552-113d62fe20c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vitamin/" + google-query: inurl:"/wp-content/plugins/vitamin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vitamin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vitamin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vitamin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vitepos-lite-d6b6bc643ec1ba18798cef4b6b37fe69.yaml b/nuclei-templates/cve-less/plugins/vitepos-lite-d6b6bc643ec1ba18798cef4b6b37fe69.yaml new file mode 100644 index 0000000000..bb19dc2781 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vitepos-lite-d6b6bc643ec1ba18798cef4b6b37fe69.yaml @@ -0,0 +1,58 @@ +id: vitepos-lite-d6b6bc643ec1ba18798cef4b6b37fe69 + +info: + name: > + Vitepos <= 3.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ece7e74-ffd9-48f9-b66b-58708233b24b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vitepos-lite/" + google-query: inurl:"/wp-content/plugins/vitepos-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vitepos-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vitepos-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vitepos-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-12bc74e09861e7d74d799801df685593.yaml b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-12bc74e09861e7d74d799801df685593.yaml new file mode 100644 index 0000000000..5b9685d50e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-12bc74e09861e7d74d799801df685593.yaml @@ -0,0 +1,58 @@ +id: vk-all-in-one-expansion-unit-12bc74e09861e7d74d799801df685593 + +info: + name: > + VK All in One Expansion Unit <= 9.96.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via className + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bc697b3-20f6-46df-a250-f2009a60200e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-all-in-one-expansion-unit/" + google-query: inurl:"/wp-content/plugins/vk-all-in-one-expansion-unit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-all-in-one-expansion-unit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-all-in-one-expansion-unit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-all-in-one-expansion-unit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.96.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-5f7a0857cd225d8f715faf1ad377962f.yaml b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-5f7a0857cd225d8f715faf1ad377962f.yaml new file mode 100644 index 0000000000..63f51bab30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-5f7a0857cd225d8f715faf1ad377962f.yaml @@ -0,0 +1,58 @@ +id: vk-all-in-one-expansion-unit-5f7a0857cd225d8f715faf1ad377962f + +info: + name: > + VK All in One Expansion Unit <= 9.88.1.0 - Stored (Contributor+) Cross-Site Scripting in Profile Setting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40c5dd26-6063-4ab2-a370-464e84d806b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-all-in-one-expansion-unit/" + google-query: inurl:"/wp-content/plugins/vk-all-in-one-expansion-unit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-all-in-one-expansion-unit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-all-in-one-expansion-unit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-all-in-one-expansion-unit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.88.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-649bbe5603010e1e08e8da0606e10331.yaml b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-649bbe5603010e1e08e8da0606e10331.yaml new file mode 100644 index 0000000000..066f4ca933 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-649bbe5603010e1e08e8da0606e10331.yaml @@ -0,0 +1,58 @@ +id: vk-all-in-one-expansion-unit-649bbe5603010e1e08e8da0606e10331 + +info: + name: > + VK All in One Expansion Unit <= 9.95.0.1 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea2b5dca-42a5-49d4-800d-b268572968a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-all-in-one-expansion-unit/" + google-query: inurl:"/wp-content/plugins/vk-all-in-one-expansion-unit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-all-in-one-expansion-unit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-all-in-one-expansion-unit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-all-in-one-expansion-unit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.95.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-8f7f33ee1e4675fee4c38d5051fea8e5.yaml b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-8f7f33ee1e4675fee4c38d5051fea8e5.yaml new file mode 100644 index 0000000000..d35b695a78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-8f7f33ee1e4675fee4c38d5051fea8e5.yaml @@ -0,0 +1,58 @@ +id: vk-all-in-one-expansion-unit-8f7f33ee1e4675fee4c38d5051fea8e5 + +info: + name: > + VK All in One Expansion Unit <= 9.88.1.0 - Stored (Contributor+) Cross-Site Scripting in CTA Post + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1da39f3d-512c-49e0-89cb-672783e5ca4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-all-in-one-expansion-unit/" + google-query: inurl:"/wp-content/plugins/vk-all-in-one-expansion-unit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-all-in-one-expansion-unit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-all-in-one-expansion-unit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-all-in-one-expansion-unit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.88.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-c77161a5bde1c663570a6c8d07d1524e.yaml b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-c77161a5bde1c663570a6c8d07d1524e.yaml new file mode 100644 index 0000000000..cc81e76ec9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-c77161a5bde1c663570a6c8d07d1524e.yaml @@ -0,0 +1,58 @@ +id: vk-all-in-one-expansion-unit-c77161a5bde1c663570a6c8d07d1524e + +info: + name: > + VK All in One Expansion Unit <= 9.85.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1f10e67-d301-46ba-b92e-432819cb9606?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-all-in-one-expansion-unit/" + google-query: inurl:"/wp-content/plugins/vk-all-in-one-expansion-unit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-all-in-one-expansion-unit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-all-in-one-expansion-unit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-all-in-one-expansion-unit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.85.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-c9d94923a4b0892540bbb0f51f12aa0e.yaml b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-c9d94923a4b0892540bbb0f51f12aa0e.yaml new file mode 100644 index 0000000000..e40e9d9a07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-all-in-one-expansion-unit-c9d94923a4b0892540bbb0f51f12aa0e.yaml @@ -0,0 +1,58 @@ +id: vk-all-in-one-expansion-unit-c9d94923a4b0892540bbb0f51f12aa0e + +info: + name: > + VK All in One Expansion Unit <= 9.87.0.1 - Reflected Cross-Site Scripting via REQUEST_URI + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/390e9c30-e4c0-474d-9915-dd46f5464cea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-all-in-one-expansion-unit/" + google-query: inurl:"/wp-content/plugins/vk-all-in-one-expansion-unit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-all-in-one-expansion-unit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-all-in-one-expansion-unit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-all-in-one-expansion-unit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.87.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-block-patterns-0d1db255d715c554771e21ce6d36684e.yaml b/nuclei-templates/cve-less/plugins/vk-block-patterns-0d1db255d715c554771e21ce6d36684e.yaml new file mode 100644 index 0000000000..1a389b0115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-block-patterns-0d1db255d715c554771e21ce6d36684e.yaml @@ -0,0 +1,58 @@ +id: vk-block-patterns-0d1db255d715c554771e21ce6d36684e + +info: + name: > + VK Block Patterns <= 1.31.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90c0be4a-1146-4a17-918e-ed5362bde022?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-block-patterns/" + google-query: inurl:"/wp-content/plugins/vk-block-patterns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-block-patterns,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-block-patterns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-block-patterns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-block-patterns-eda825401e6ca5d10a15871a11cf4f40.yaml b/nuclei-templates/cve-less/plugins/vk-block-patterns-eda825401e6ca5d10a15871a11cf4f40.yaml new file mode 100644 index 0000000000..04a0357a01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-block-patterns-eda825401e6ca5d10a15871a11cf4f40.yaml @@ -0,0 +1,58 @@ +id: vk-block-patterns-eda825401e6ca5d10a15871a11cf4f40 + +info: + name: > + VK Block Patterns <= 1.31.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9af6c319-7660-4368-b2f8-1ed1d01ee73a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-block-patterns/" + google-query: inurl:"/wp-content/plugins/vk-block-patterns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-block-patterns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-block-patterns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-block-patterns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-blocks-06ebadedd58b7ae3403fa022e6ae3a90.yaml b/nuclei-templates/cve-less/plugins/vk-blocks-06ebadedd58b7ae3403fa022e6ae3a90.yaml new file mode 100644 index 0000000000..d5076c8045 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-blocks-06ebadedd58b7ae3403fa022e6ae3a90.yaml @@ -0,0 +1,58 @@ +id: vk-blocks-06ebadedd58b7ae3403fa022e6ae3a90 + +info: + name: > + VK Blocks <= 1.57.0.5 - Authenticated(Contributor+) Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12a94f5b-bc30-4a65-b397-54488c836ec3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-blocks/" + google-query: inurl:"/wp-content/plugins/vk-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.57.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-blocks-30ce892560143a1889e7a76a4e09b69d.yaml b/nuclei-templates/cve-less/plugins/vk-blocks-30ce892560143a1889e7a76a4e09b69d.yaml new file mode 100644 index 0000000000..e41eb15cdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-blocks-30ce892560143a1889e7a76a4e09b69d.yaml @@ -0,0 +1,58 @@ +id: vk-blocks-30ce892560143a1889e7a76a4e09b69d + +info: + name: > + VK Blocks <= 1.57.0.5 - Authenticated(Contributor+) Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b90b7f6c-df7f-48a5-b283-cf5facbd71e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-blocks/" + google-query: inurl:"/wp-content/plugins/vk-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-blocks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.57.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-blocks-4131547f48ef03f81376294e8bfec1f9.yaml b/nuclei-templates/cve-less/plugins/vk-blocks-4131547f48ef03f81376294e8bfec1f9.yaml new file mode 100644 index 0000000000..ce6557477c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-blocks-4131547f48ef03f81376294e8bfec1f9.yaml @@ -0,0 +1,58 @@ +id: vk-blocks-4131547f48ef03f81376294e8bfec1f9 + +info: + name: > + VK Blocks <= 1.53.0.1 - Stored (Contributor+) Cross-Site Scripting in Tag Edit + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e01f5bd8-de0f-48aa-8007-61a0ebd0ebf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-blocks/" + google-query: inurl:"/wp-content/plugins/vk-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.53.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-blocks-768fa7749718c2471763f91755f4694f.yaml b/nuclei-templates/cve-less/plugins/vk-blocks-768fa7749718c2471763f91755f4694f.yaml new file mode 100644 index 0000000000..3534a21b03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-blocks-768fa7749718c2471763f91755f4694f.yaml @@ -0,0 +1,58 @@ +id: vk-blocks-768fa7749718c2471763f91755f4694f + +info: + name: > + VK Blocks <= 1.63.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05dd7c96-7880-44a8-a06f-037bc627fd8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-blocks/" + google-query: inurl:"/wp-content/plugins/vk-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.63.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-blocks-7d646a32d0c4bc3814bc480ca69d5434.yaml b/nuclei-templates/cve-less/plugins/vk-blocks-7d646a32d0c4bc3814bc480ca69d5434.yaml new file mode 100644 index 0000000000..ec84078b6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-blocks-7d646a32d0c4bc3814bc480ca69d5434.yaml @@ -0,0 +1,58 @@ +id: vk-blocks-7d646a32d0c4bc3814bc480ca69d5434 + +info: + name: > + VK Blocks <= 1.53.0.1 - Stored (Contributor+) Cross-Site Scripting in Post + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03d05c74-da50-4175-86f5-f39a89dbffd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-blocks/" + google-query: inurl:"/wp-content/plugins/vk-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.53.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-blocks-pro-4131547f48ef03f81376294e8bfec1f9.yaml b/nuclei-templates/cve-less/plugins/vk-blocks-pro-4131547f48ef03f81376294e8bfec1f9.yaml new file mode 100644 index 0000000000..d127e82431 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-blocks-pro-4131547f48ef03f81376294e8bfec1f9.yaml @@ -0,0 +1,58 @@ +id: vk-blocks-pro-4131547f48ef03f81376294e8bfec1f9 + +info: + name: > + VK Blocks <= 1.53.0.1 - Stored (Contributor+) Cross-Site Scripting in Tag Edit + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e01f5bd8-de0f-48aa-8007-61a0ebd0ebf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-blocks-pro/" + google-query: inurl:"/wp-content/plugins/vk-blocks-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-blocks-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-blocks-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-blocks-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.53.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-blocks-pro-7d646a32d0c4bc3814bc480ca69d5434.yaml b/nuclei-templates/cve-less/plugins/vk-blocks-pro-7d646a32d0c4bc3814bc480ca69d5434.yaml new file mode 100644 index 0000000000..9b2a7359d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-blocks-pro-7d646a32d0c4bc3814bc480ca69d5434.yaml @@ -0,0 +1,58 @@ +id: vk-blocks-pro-7d646a32d0c4bc3814bc480ca69d5434 + +info: + name: > + VK Blocks <= 1.53.0.1 - Stored (Contributor+) Cross-Site Scripting in Post + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03d05c74-da50-4175-86f5-f39a89dbffd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-blocks-pro/" + google-query: inurl:"/wp-content/plugins/vk-blocks-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-blocks-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-blocks-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-blocks-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.53.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-filter-search-0ade74287dacdefe3e19153b1abafe0f.yaml b/nuclei-templates/cve-less/plugins/vk-filter-search-0ade74287dacdefe3e19153b1abafe0f.yaml new file mode 100644 index 0000000000..49119f8c82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-filter-search-0ade74287dacdefe3e19153b1abafe0f.yaml @@ -0,0 +1,58 @@ +id: vk-filter-search-0ade74287dacdefe3e19153b1abafe0f + +info: + name: > + VK Filter Search <= 2.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/012946d4-82ce-48b9-9b9a-1fc49846dca6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-filter-search/" + google-query: inurl:"/wp-content/plugins/vk-filter-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-filter-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-filter-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-filter-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vk-poster-group-d8b1183c7012780dff9901b361328ade.yaml b/nuclei-templates/cve-less/plugins/vk-poster-group-d8b1183c7012780dff9901b361328ade.yaml new file mode 100644 index 0000000000..911b41a041 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vk-poster-group-d8b1183c7012780dff9901b361328ade.yaml @@ -0,0 +1,58 @@ +id: vk-poster-group-d8b1183c7012780dff9901b361328ade + +info: + name: > + VK Poster Group <= 2.0.3 - Reflected Cross-Site Scripting via vkp_repost + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14f030bd-8d8d-4152-817d-d72c9b7a0152?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vk-poster-group/" + google-query: inurl:"/wp-content/plugins/vk-poster-group/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vk-poster-group,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vk-poster-group/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vk-poster-group" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vm-backups-213063abe242012045731163716041ce.yaml b/nuclei-templates/cve-less/plugins/vm-backups-213063abe242012045731163716041ce.yaml new file mode 100644 index 0000000000..5bf92b890a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vm-backups-213063abe242012045731163716041ce.yaml @@ -0,0 +1,58 @@ +id: vm-backups-213063abe242012045731163716041ce + +info: + name: > + VM Backups <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/450d4c30-b799-44c9-b60e-a1d701e9055e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vm-backups/" + google-query: inurl:"/wp-content/plugins/vm-backups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vm-backups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vm-backups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vm-backups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vm-backups-a4378f0df660425c1f67e7a182915736.yaml b/nuclei-templates/cve-less/plugins/vm-backups-a4378f0df660425c1f67e7a182915736.yaml new file mode 100644 index 0000000000..5defbc32c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vm-backups-a4378f0df660425c1f67e7a182915736.yaml @@ -0,0 +1,58 @@ +id: vm-backups-a4378f0df660425c1f67e7a182915736 + +info: + name: > + VM Backups <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67c86b04-fdbd-4782-a362-fdec5e1f7c92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vm-backups/" + google-query: inurl:"/wp-content/plugins/vm-backups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vm-backups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vm-backups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vm-backups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vn-calendar-495d298d6c0fc5fe1a9847d638c40959.yaml b/nuclei-templates/cve-less/plugins/vn-calendar-495d298d6c0fc5fe1a9847d638c40959.yaml new file mode 100644 index 0000000000..2ead35a359 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vn-calendar-495d298d6c0fc5fe1a9847d638c40959.yaml @@ -0,0 +1,58 @@ +id: vn-calendar-495d298d6c0fc5fe1a9847d638c40959 + +info: + name: > + VN Calendar <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5224233f-6cb4-4fd9-b25b-e32db612cb7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vn-calendar/" + google-query: inurl:"/wp-content/plugins/vn-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vn-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vn-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vn-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vo-locator-the-wp-store-locator-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/vo-locator-the-wp-store-locator-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..441b3e7278 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vo-locator-the-wp-store-locator-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: vo-locator-the-wp-store-locator-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vo-locator-the-wp-store-locator/" + google-query: inurl:"/wp-content/plugins/vo-locator-the-wp-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vo-locator-the-wp-store-locator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vo-locator-the-wp-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vo-locator-the-wp-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vod-infomaniak-a84518c46b40e343620d7d2d2c269c9e.yaml b/nuclei-templates/cve-less/plugins/vod-infomaniak-a84518c46b40e343620d7d2d2c269c9e.yaml new file mode 100644 index 0000000000..9fe4aa7019 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vod-infomaniak-a84518c46b40e343620d7d2d2c269c9e.yaml @@ -0,0 +1,58 @@ +id: vod-infomaniak-a84518c46b40e343620d7d2d2c269c9e + +info: + name: > + VOD Infomaniak <= 1.5.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd805cb5-45ce-4213-b313-d9e300527265?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vod-infomaniak/" + google-query: inurl:"/wp-content/plugins/vod-infomaniak/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vod-infomaniak,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vod-infomaniak/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vod-infomaniak" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vodpod-video-gallery-7d553117936251fe3b1ece76fb8572be.yaml b/nuclei-templates/cve-less/plugins/vodpod-video-gallery-7d553117936251fe3b1ece76fb8572be.yaml new file mode 100644 index 0000000000..53261ab6a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vodpod-video-gallery-7d553117936251fe3b1ece76fb8572be.yaml @@ -0,0 +1,58 @@ +id: vodpod-video-gallery-7d553117936251fe3b1ece76fb8572be + +info: + name: > + Vodpod Video Gallery <= 3.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c609a29-3c72-4921-ab7a-2f2593b2e4b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vodpod-video-gallery/" + google-query: inurl:"/wp-content/plugins/vodpod-video-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vodpod-video-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vodpod-video-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vodpod-video-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/void-elementor-post-grid-addon-for-elementor-page-builder-e26003fb15eb8dfdd3862b141bc3094e.yaml b/nuclei-templates/cve-less/plugins/void-elementor-post-grid-addon-for-elementor-page-builder-e26003fb15eb8dfdd3862b141bc3094e.yaml new file mode 100644 index 0000000000..5353f0b900 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/void-elementor-post-grid-addon-for-elementor-page-builder-e26003fb15eb8dfdd3862b141bc3094e.yaml @@ -0,0 +1,58 @@ +id: void-elementor-post-grid-addon-for-elementor-page-builder-e26003fb15eb8dfdd3862b141bc3094e + +info: + name: > + Void Elementor Post Grid Addon for Elementor Page builder <= 2.1.10 - Missing Authorization to Review Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b847857-5dc9-4793-b9d6-759f27377fe3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/void-elementor-post-grid-addon-for-elementor-page-builder/" + google-query: inurl:"/wp-content/plugins/void-elementor-post-grid-addon-for-elementor-page-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,void-elementor-post-grid-addon-for-elementor-page-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/void-elementor-post-grid-addon-for-elementor-page-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "void-elementor-post-grid-addon-for-elementor-page-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/void-elementor-whmcs-elements-261bb3f8fcb24ed57cf7abcc44aedfa4.yaml b/nuclei-templates/cve-less/plugins/void-elementor-whmcs-elements-261bb3f8fcb24ed57cf7abcc44aedfa4.yaml new file mode 100644 index 0000000000..e78c3257e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/void-elementor-whmcs-elements-261bb3f8fcb24ed57cf7abcc44aedfa4.yaml @@ -0,0 +1,58 @@ +id: void-elementor-whmcs-elements-261bb3f8fcb24ed57cf7abcc44aedfa4 + +info: + name: > + Void Elementor WHMCS Elements For Elementor Page Builder <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dabfdab-2c7a-4c9b-9c8f-a93639da1a35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/void-elementor-whmcs-elements/" + google-query: inurl:"/wp-content/plugins/void-elementor-whmcs-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,void-elementor-whmcs-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/void-elementor-whmcs-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "void-elementor-whmcs-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vospari-forms-c401610c8e651db75595790ef198f851.yaml b/nuclei-templates/cve-less/plugins/vospari-forms-c401610c8e651db75595790ef198f851.yaml new file mode 100644 index 0000000000..3ebc09cc44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vospari-forms-c401610c8e651db75595790ef198f851.yaml @@ -0,0 +1,58 @@ +id: vospari-forms-c401610c8e651db75595790ef198f851 + +info: + name: > + Vospari Forms < 1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb4a3f3-495d-4ece-9436-9c317688982c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vospari-forms/" + google-query: inurl:"/wp-content/plugins/vospari-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vospari-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vospari-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vospari-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/votecount-for-balatarin-77ab2c9cedf221b773b22cab621c11cd.yaml b/nuclei-templates/cve-less/plugins/votecount-for-balatarin-77ab2c9cedf221b773b22cab621c11cd.yaml new file mode 100644 index 0000000000..4b31ccc0c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/votecount-for-balatarin-77ab2c9cedf221b773b22cab621c11cd.yaml @@ -0,0 +1,58 @@ +id: votecount-for-balatarin-77ab2c9cedf221b773b22cab621c11cd + +info: + name: > + Votecount For Balatarin <= 0.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/507464cf-43a3-49bd-b8d8-9bc8030670e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/votecount-for-balatarin/" + google-query: inurl:"/wp-content/plugins/votecount-for-balatarin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,votecount-for-balatarin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/votecount-for-balatarin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "votecount-for-balatarin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/voting-record-ad8900917be83354859c30baad4cca67.yaml b/nuclei-templates/cve-less/plugins/voting-record-ad8900917be83354859c30baad4cca67.yaml new file mode 100644 index 0000000000..ee7620216f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/voting-record-ad8900917be83354859c30baad4cca67.yaml @@ -0,0 +1,58 @@ +id: voting-record-ad8900917be83354859c30baad4cca67 + +info: + name: > + Voting Record <= 2.0 - Cross-Site Request Forgery to Settings Update and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f93aa003-5b8b-4836-af65-80df2f9fbdb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/voting-record/" + google-query: inurl:"/wp-content/plugins/voting-record/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,voting-record,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/voting-record/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "voting-record" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/voting-record-d7a48a2145831cedc1837e88079bf034.yaml b/nuclei-templates/cve-less/plugins/voting-record-d7a48a2145831cedc1837e88079bf034.yaml new file mode 100644 index 0000000000..ca1968ac8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/voting-record-d7a48a2145831cedc1837e88079bf034.yaml @@ -0,0 +1,58 @@ +id: voting-record-d7a48a2145831cedc1837e88079bf034 + +info: + name: > + Voting Record <= 2.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/286c3e26-07a8-4fca-9fdc-98e62ae88b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/voting-record/" + google-query: inurl:"/wp-content/plugins/voting-record/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,voting-record,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/voting-record/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "voting-record" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vr-calendar-sync-56742077a11be41d865b1f712520ef41.yaml b/nuclei-templates/cve-less/plugins/vr-calendar-sync-56742077a11be41d865b1f712520ef41.yaml new file mode 100644 index 0000000000..c47146af3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vr-calendar-sync-56742077a11be41d865b1f712520ef41.yaml @@ -0,0 +1,58 @@ +id: vr-calendar-sync-56742077a11be41d865b1f712520ef41 + +info: + name: > + VR Calendar <= 2.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17cb7420-b4e1-4959-beae-d3c0a8c4b1ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vr-calendar-sync/" + google-query: inurl:"/wp-content/plugins/vr-calendar-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vr-calendar-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vr-calendar-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vr-calendar-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vr-calendar-sync-616950a87be3ab946c404a2c6a2e1022.yaml b/nuclei-templates/cve-less/plugins/vr-calendar-sync-616950a87be3ab946c404a2c6a2e1022.yaml new file mode 100644 index 0000000000..192df399fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vr-calendar-sync-616950a87be3ab946c404a2c6a2e1022.yaml @@ -0,0 +1,58 @@ +id: vr-calendar-sync-616950a87be3ab946c404a2c6a2e1022 + +info: + name: > + VR Calendar <= 2.3.1 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf2a57fa-28f8-4fd0-814b-a4c9ae77817a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vr-calendar-sync/" + google-query: inurl:"/wp-content/plugins/vr-calendar-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vr-calendar-sync,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vr-calendar-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vr-calendar-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vr-calendar-sync-7396a7e456a789122fb4ba49d41fa089.yaml b/nuclei-templates/cve-less/plugins/vr-calendar-sync-7396a7e456a789122fb4ba49d41fa089.yaml new file mode 100644 index 0000000000..3a3a18fa4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vr-calendar-sync-7396a7e456a789122fb4ba49d41fa089.yaml @@ -0,0 +1,58 @@ +id: vr-calendar-sync-7396a7e456a789122fb4ba49d41fa089 + +info: + name: > + VR Calendar <= 2.4.0 - Authenticated (Administrator+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8163dc0-e380-4a0b-bd18-34a3e80ca3dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vr-calendar-sync/" + google-query: inurl:"/wp-content/plugins/vr-calendar-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vr-calendar-sync,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vr-calendar-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vr-calendar-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vr-calendar-sync-a514896a8210fef61861b6a5fb93d0c5.yaml b/nuclei-templates/cve-less/plugins/vr-calendar-sync-a514896a8210fef61861b6a5fb93d0c5.yaml new file mode 100644 index 0000000000..22401bda71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vr-calendar-sync-a514896a8210fef61861b6a5fb93d0c5.yaml @@ -0,0 +1,58 @@ +id: vr-calendar-sync-a514896a8210fef61861b6a5fb93d0c5 + +info: + name: > + VR Calendar <= 2.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a868226f-4ca1-4ec1-b55e-3029e3ed2d5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vr-calendar-sync/" + google-query: inurl:"/wp-content/plugins/vr-calendar-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vr-calendar-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vr-calendar-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vr-calendar-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vrm360-739af30ba304d3e19c7edf50976bcb67.yaml b/nuclei-templates/cve-less/plugins/vrm360-739af30ba304d3e19c7edf50976bcb67.yaml new file mode 100644 index 0000000000..113d59e7c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vrm360-739af30ba304d3e19c7edf50976bcb67.yaml @@ -0,0 +1,58 @@ +id: vrm360-739af30ba304d3e19c7edf50976bcb67 + +info: + name: > + Vrm 360 3D Model Viewer <= 1.2.1 - Authenticated (Contributor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92a543e2-1af1-4857-8e2f-c8658eac7fe0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vrm360/" + google-query: inurl:"/wp-content/plugins/vrm360/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vrm360,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vrm360/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vrm360" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vrm360-902c45e06d6e22c072a9fbbf19901e92.yaml b/nuclei-templates/cve-less/plugins/vrm360-902c45e06d6e22c072a9fbbf19901e92.yaml new file mode 100644 index 0000000000..d48edb5655 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vrm360-902c45e06d6e22c072a9fbbf19901e92.yaml @@ -0,0 +1,58 @@ +id: vrm360-902c45e06d6e22c072a9fbbf19901e92 + +info: + name: > + Vrm 360 3D Model Viewer <= 1.2.1 - Authenticated(Subscriber+) Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c71183f-45e7-44de-a957-614ce417db90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vrm360/" + google-query: inurl:"/wp-content/plugins/vrm360/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vrm360,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vrm360/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vrm360" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vrview-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml b/nuclei-templates/cve-less/plugins/vrview-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml new file mode 100644 index 0000000000..289a46aca6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vrview-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml @@ -0,0 +1,58 @@ +id: vrview-5a2127bf03219f3d8bbf0c6e20f59ac5 + +info: + name: > + VRView <= 1.1.3 and WP-VR-view <= 1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6c906b3-8819-409c-946a-eeb9d938142d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vrview/" + google-query: inurl:"/wp-content/plugins/vrview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vrview,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vrview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vrview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vslider-ae05ec43cb054e1a5de163d4a7addf3a.yaml b/nuclei-templates/cve-less/plugins/vslider-ae05ec43cb054e1a5de163d4a7addf3a.yaml new file mode 100644 index 0000000000..1f44bd9ed7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vslider-ae05ec43cb054e1a5de163d4a7addf3a.yaml @@ -0,0 +1,58 @@ +id: vslider-ae05ec43cb054e1a5de163d4a7addf3a + +info: + name: > + vSlider Multi Image Slider <= 4.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0c7324f-4c22-44e0-8d2a-9b95fd89467d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vslider/" + google-query: inurl:"/wp-content/plugins/vslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vslider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vslider-c05c9af186400589f780a92d671602c2.yaml b/nuclei-templates/cve-less/plugins/vslider-c05c9af186400589f780a92d671602c2.yaml new file mode 100644 index 0000000000..2258ae6f28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vslider-c05c9af186400589f780a92d671602c2.yaml @@ -0,0 +1,58 @@ +id: vslider-c05c9af186400589f780a92d671602c2 + +info: + name: > + vSlider Multi Image Slider <= 4.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72a2449c-4292-45e6-bfe8-106f8043fcad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vslider/" + google-query: inurl:"/wp-content/plugins/vslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/vslider-f6de196088ccb0c72ee71de4440a1879.yaml b/nuclei-templates/cve-less/plugins/vslider-f6de196088ccb0c72ee71de4440a1879.yaml new file mode 100644 index 0000000000..95e3241aef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/vslider-f6de196088ccb0c72ee71de4440a1879.yaml @@ -0,0 +1,58 @@ +id: vslider-f6de196088ccb0c72ee71de4440a1879 + +info: + name: > + vSlider Multi Image Slider <= 4.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14376064-13c4-4874-afea-395af2a1933d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/vslider/" + google-query: inurl:"/wp-content/plugins/vslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,vslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/vslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w-dalil-a9e063bb904bfdeb89be1c3d634b4901.yaml b/nuclei-templates/cve-less/plugins/w-dalil-a9e063bb904bfdeb89be1c3d634b4901.yaml new file mode 100644 index 0000000000..14b9bbbaee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w-dalil-a9e063bb904bfdeb89be1c3d634b4901.yaml @@ -0,0 +1,58 @@ +id: w-dalil-a9e063bb904bfdeb89be1c3d634b4901 + +info: + name: > + W-DALIL <= 2.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c6f4890-8bc9-4ead-8d69-478fa51c2176?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w-dalil/" + google-query: inurl:"/wp-content/plugins/w-dalil/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w-dalil,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w-dalil/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w-dalil" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-237d90f247ac40e7588399f654c2f945.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-237d90f247ac40e7588399f654c2f945.yaml new file mode 100644 index 0000000000..ac7e943504 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-237d90f247ac40e7588399f654c2f945.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-237d90f247ac40e7588399f654c2f945 + +info: + name: > + W3 Total Cache <= 2.1.3 - Reflected Cross-Site Scripting via extension + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abbf1bb8-16db-48b6-b2ff-d828fcb7f7c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-2c04466110be8251bf39f71f2f0129f9.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-2c04466110be8251bf39f71f2f0129f9.yaml new file mode 100644 index 0000000000..663da75c81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-2c04466110be8251bf39f71f2f0129f9.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-2c04466110be8251bf39f71f2f0129f9 + +info: + name: > + W3 Total Cache <= 0.9.4 - Server-Side Request Forgery leading to Host Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b09c6da0-14d8-4e44-95bd-b5b6b0df97e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-33afd6f00d43406e27d753729de8f990.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-33afd6f00d43406e27d753729de8f990.yaml new file mode 100644 index 0000000000..52ec454340 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-33afd6f00d43406e27d753729de8f990.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-33afd6f00d43406e27d753729de8f990 + +info: + name: > + W3 Total Cache <= 0.9.4.1 - Arbitrary Code Execution via settings import + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb367998-5c5c-4c4d-81cb-519023f028e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-389652b9ed2920a4e8345ff324a62971.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-389652b9ed2920a4e8345ff324a62971.yaml new file mode 100644 index 0000000000..923bbc885c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-389652b9ed2920a4e8345ff324a62971.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-389652b9ed2920a4e8345ff324a62971 + +info: + name: > + W3 Total Cache <= 0.9.2.8 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f9a6fc2-0375-480e-8c42-c6b97613bf68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-3b7846f9454db2dd18a15d1689f18426.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-3b7846f9454db2dd18a15d1689f18426.yaml new file mode 100644 index 0000000000..b76c774019 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-3b7846f9454db2dd18a15d1689f18426.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-3b7846f9454db2dd18a15d1689f18426 + +info: + name: > + W3 Total Cache <= 2.1.4 - Reflected Cross-Site Scripting via extension + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4d421df-310b-4a83-b521-c0d00045df52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.5', '<= 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-4ca0a5e4c5d3b1a483a53f4021ede181.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-4ca0a5e4c5d3b1a483a53f4021ede181.yaml new file mode 100644 index 0000000000..e91a9928c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-4ca0a5e4c5d3b1a483a53f4021ede181.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-4ca0a5e4c5d3b1a483a53f4021ede181 + +info: + name: > + W3 Total Cache <= 0.9.2.4 - Insecure Cryptography to Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/836bac94-fd74-4ef9-a79b-4ea13de8f44f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-57ae0f701129b967301e9690233d7d6d.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-57ae0f701129b967301e9690233d7d6d.yaml new file mode 100644 index 0000000000..05c1e5db46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-57ae0f701129b967301e9690233d7d6d.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-57ae0f701129b967301e9690233d7d6d + +info: + name: > + W3 Total Cache plugin <= 0.9.7.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d20eb274-e578-445f-95f4-5e677d9ad7f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-61d22084a07ab6379ed5a9d407ab8f1e.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-61d22084a07ab6379ed5a9d407ab8f1e.yaml new file mode 100644 index 0000000000..c7f7b3b42a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-61d22084a07ab6379ed5a9d407ab8f1e.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-61d22084a07ab6379ed5a9d407ab8f1e + +info: + name: > + W3 Total Cache <= 0.9.2.4 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/110f4ca6-3e59-4348-bb45-6e5fcfa81491?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-656dd25ede0c1a0fb3db612c85cade65.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-656dd25ede0c1a0fb3db612c85cade65.yaml new file mode 100644 index 0000000000..e95bbdca95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-656dd25ede0c1a0fb3db612c85cade65.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-656dd25ede0c1a0fb3db612c85cade65 + +info: + name: > + W3 Total Cache <= 0.9.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71114965-c8e3-4f2f-b308-f75adc7f2d31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-674672e1e54ec2d3fc7aad7c1b44634e.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-674672e1e54ec2d3fc7aad7c1b44634e.yaml new file mode 100644 index 0000000000..65e0f3c1da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-674672e1e54ec2d3fc7aad7c1b44634e.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-674672e1e54ec2d3fc7aad7c1b44634e + +info: + name: > + W3 Total Cache <= 0.9.4.1 - Security Token Bypass via Type Juggling + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a07bc541-2113-43db-acdf-9ecb00dd50e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-6cc6a3d6d739a61d420343f25551dbad.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-6cc6a3d6d739a61d420343f25551dbad.yaml new file mode 100644 index 0000000000..38ac5a0baa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-6cc6a3d6d739a61d420343f25551dbad.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-6cc6a3d6d739a61d420343f25551dbad + +info: + name: > + W3 Total Cache <= 2.1.2 Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d9cf724-9ae7-4414-88d1-10640491df34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-8437380ee000b7b821ec06d0f6614d78.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-8437380ee000b7b821ec06d0f6614d78.yaml new file mode 100644 index 0000000000..da42ee3fce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-8437380ee000b7b821ec06d0f6614d78.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-8437380ee000b7b821ec06d0f6614d78 + +info: + name: > + W3 Total Cache <= 0.9.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a910fd44-4de1-41e8-8da2-d72a2f835797?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-8a10bd5b823c6c28d5929375c43a3ded.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-8a10bd5b823c6c28d5929375c43a3ded.yaml new file mode 100644 index 0000000000..0fd29f84f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-8a10bd5b823c6c28d5929375c43a3ded.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-8a10bd5b823c6c28d5929375c43a3ded + +info: + name: > + W3 Total Cache <= 0.9.4.1 - Cross-Site Scripting via request_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b8282a2-8265-4fa0-b137-6272b9e44fc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-9634b52b6b740b73ed118cf9bfbd4f9e.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-9634b52b6b740b73ed118cf9bfbd4f9e.yaml new file mode 100644 index 0000000000..ffbcb1a708 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-9634b52b6b740b73ed118cf9bfbd4f9e.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-9634b52b6b740b73ed118cf9bfbd4f9e + +info: + name: > + W3 Total Cache <= 0.9.4.1 - Weak validation of Amazon SNS push messages + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9373c82d-15a8-495a-8290-1b85c096f7e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-b37fca0bdc8729c2bc44a693e998aecd.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-b37fca0bdc8729c2bc44a693e998aecd.yaml new file mode 100644 index 0000000000..138d37aee3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-b37fca0bdc8729c2bc44a693e998aecd.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-b37fca0bdc8729c2bc44a693e998aecd + +info: + name: > + W3 Total Cache <= 0.9.7.3 - Improper Input Validation via openssl_verify + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b002d1a1-a536-4865-b263-594390941ed4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-b5d8ded2a6d665cb05a255daa76e0cda.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-b5d8ded2a6d665cb05a255daa76e0cda.yaml new file mode 100644 index 0000000000..a20fbf7f35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-b5d8ded2a6d665cb05a255daa76e0cda.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-b5d8ded2a6d665cb05a255daa76e0cda + +info: + name: > + W3 Total Cache <= 0.9.7.3 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b19ce745-2cc4-48eb-b5f3-5011be7cceec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-ba551800e95fe2ce106bcd3e144638e2.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-ba551800e95fe2ce106bcd3e144638e2.yaml new file mode 100644 index 0000000000..bcbc63d7b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-ba551800e95fe2ce106bcd3e144638e2.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-ba551800e95fe2ce106bcd3e144638e2 + +info: + name: > + W3 Total Cache <= 0.9.2.4 - Password Hash Extraction + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00599865-9091-46e1-b2a9-78cbd10f6f22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-cf834d46bd9b982d7dc5819942daefcd.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-cf834d46bd9b982d7dc5819942daefcd.yaml new file mode 100644 index 0000000000..662e49d154 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-cf834d46bd9b982d7dc5819942daefcd.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-cf834d46bd9b982d7dc5819942daefcd + +info: + name: > + W3 Total Cache <= 0.9.4.1 - Authenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd2c5d9-6489-4154-a494-20392f435bc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-d85a4206680fff0382032f3de61ef4b1.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-d85a4206680fff0382032f3de61ef4b1.yaml new file mode 100644 index 0000000000..f167bf044f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-d85a4206680fff0382032f3de61ef4b1.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-d85a4206680fff0382032f3de61ef4b1 + +info: + name: > + Guzzle <= 6.5.7 and 7.0-7.4.4 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2a4b5bb-d3c9-42e0-8714-ae75069c7c3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-e3b3066110fe8b51abc2330a4086e518.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-e3b3066110fe8b51abc2330a4086e518.yaml new file mode 100644 index 0000000000..84ca9e2564 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-e3b3066110fe8b51abc2330a4086e518.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-e3b3066110fe8b51abc2330a4086e518 + +info: + name: > + W3 Total Cache 0.9.2.6-0.9.3 - File Read / Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b34dd60-359c-44a0-9e47-dc8c4e66b50e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 0.9.2.6', '<= 0.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-f9f79bf204290d6d3c8b8009bb85feff.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-f9f79bf204290d6d3c8b8009bb85feff.yaml new file mode 100644 index 0000000000..9ed5eb679b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-f9f79bf204290d6d3c8b8009bb85feff.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-f9f79bf204290d6d3c8b8009bb85feff + +info: + name: > + W3 Total Cache <= 0.9.4 - Cross-Site Request Forgery leading to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84227fd2-c322-45e3-82cd-70e1d870eceb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3-total-cache-fa0b9f9e638380f9e9ab2db59f133c49.yaml b/nuclei-templates/cve-less/plugins/w3-total-cache-fa0b9f9e638380f9e9ab2db59f133c49.yaml new file mode 100644 index 0000000000..a2ab9c0b6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3-total-cache-fa0b9f9e638380f9e9ab2db59f133c49.yaml @@ -0,0 +1,58 @@ +id: w3-total-cache-fa0b9f9e638380f9e9ab2db59f133c49 + +info: + name: > + W3 Total Cache <= 0.9.4.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c187ed25-6ba7-4a58-97df-5fea723d485a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3-total-cache/" + google-query: inurl:"/wp-content/plugins/w3-total-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3-total-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3-total-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3-total-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3s-cf7-zoho-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/w3s-cf7-zoho-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..6d376f6e12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3s-cf7-zoho-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: w3s-cf7-zoho-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3s-cf7-zoho/" + google-query: inurl:"/wp-content/plugins/w3s-cf7-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3s-cf7-zoho,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3s-cf7-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3s-cf7-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3s-cf7-zoho-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/w3s-cf7-zoho-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d989c6fdd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3s-cf7-zoho-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: w3s-cf7-zoho-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3s-cf7-zoho/" + google-query: inurl:"/wp-content/plugins/w3s-cf7-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3s-cf7-zoho,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3s-cf7-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3s-cf7-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w3speedster-wp-a31d8c67055bd157a9c5d5f833b91a5a.yaml b/nuclei-templates/cve-less/plugins/w3speedster-wp-a31d8c67055bd157a9c5d5f833b91a5a.yaml new file mode 100644 index 0000000000..4ac07a221f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w3speedster-wp-a31d8c67055bd157a9c5d5f833b91a5a.yaml @@ -0,0 +1,58 @@ +id: w3speedster-wp-a31d8c67055bd157a9c5d5f833b91a5a + +info: + name: > + W3SPEEDSTER <= 7.19 - Cross-Site Request Forgery via launch + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e358355e-097c-4a6d-a21a-3d08098efff0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w3speedster-wp/" + google-query: inurl:"/wp-content/plugins/w3speedster-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w3speedster-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w3speedster-wp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w3speedster-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w4-post-list-081112230905e11fac17a07fd3185d02.yaml b/nuclei-templates/cve-less/plugins/w4-post-list-081112230905e11fac17a07fd3185d02.yaml new file mode 100644 index 0000000000..5ddff305a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w4-post-list-081112230905e11fac17a07fd3185d02.yaml @@ -0,0 +1,58 @@ +id: w4-post-list-081112230905e11fac17a07fd3185d02 + +info: + name: > + W4 Post List <= 2.4.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64ed8547-0dc1-4f0a-8b0b-27ce20b8bbd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w4-post-list/" + google-query: inurl:"/wp-content/plugins/w4-post-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w4-post-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w4-post-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w4-post-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w4-post-list-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/w4-post-list-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..67e5d565b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w4-post-list-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: w4-post-list-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w4-post-list/" + google-query: inurl:"/wp-content/plugins/w4-post-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w4-post-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w4-post-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w4-post-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w4-post-list-9ce8bccb779cbb91638a31953a621086.yaml b/nuclei-templates/cve-less/plugins/w4-post-list-9ce8bccb779cbb91638a31953a621086.yaml new file mode 100644 index 0000000000..55e63bafa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w4-post-list-9ce8bccb779cbb91638a31953a621086.yaml @@ -0,0 +1,58 @@ +id: w4-post-list-9ce8bccb779cbb91638a31953a621086 + +info: + name: > + W4 Post List <= 2.4.5 - Information Disclosure via post_excerpt + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ac7408d-8ec7-415b-bf52-024182888cb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w4-post-list/" + google-query: inurl:"/wp-content/plugins/w4-post-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w4-post-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w4-post-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w4-post-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w4-post-list-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/w4-post-list-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..1a0d9385b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w4-post-list-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: w4-post-list-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w4-post-list/" + google-query: inurl:"/wp-content/plugins/w4-post-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w4-post-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w4-post-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w4-post-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w4-post-list-bfcfe2a24b673f9c7c3adba8fe6586b3.yaml b/nuclei-templates/cve-less/plugins/w4-post-list-bfcfe2a24b673f9c7c3adba8fe6586b3.yaml new file mode 100644 index 0000000000..1201ebe9e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w4-post-list-bfcfe2a24b673f9c7c3adba8fe6586b3.yaml @@ -0,0 +1,58 @@ +id: w4-post-list-bfcfe2a24b673f9c7c3adba8fe6586b3 + +info: + name: > + W4 Post List <= 2.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'w4pl[no_items_text]' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/feb9af10-7df2-4eb1-8546-debaa925df42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w4-post-list/" + google-query: inurl:"/wp-content/plugins/w4-post-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w4-post-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w4-post-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w4-post-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/w4-post-list-d895c4410550575e217cad2419400870.yaml b/nuclei-templates/cve-less/plugins/w4-post-list-d895c4410550575e217cad2419400870.yaml new file mode 100644 index 0000000000..bb3f897ac5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/w4-post-list-d895c4410550575e217cad2419400870.yaml @@ -0,0 +1,58 @@ +id: w4-post-list-d895c4410550575e217cad2419400870 + +info: + name: > + W4 Post List <= 2.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d6a7230-07c7-43f3-a844-77d2bb19545d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/w4-post-list/" + google-query: inurl:"/wp-content/plugins/w4-post-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,w4-post-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/w4-post-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "w4-post-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wa-form-builder-74a80222591ee08f7fca8ee1f11e45fa.yaml b/nuclei-templates/cve-less/plugins/wa-form-builder-74a80222591ee08f7fca8ee1f11e45fa.yaml new file mode 100644 index 0000000000..d8bd23edf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wa-form-builder-74a80222591ee08f7fca8ee1f11e45fa.yaml @@ -0,0 +1,58 @@ +id: wa-form-builder-74a80222591ee08f7fca8ee1f11e45fa + +info: + name: > + WA Form Builder <= 1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59a645e4-2a23-4440-a463-fa197dfa20b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wa-form-builder/" + google-query: inurl:"/wp-content/plugins/wa-form-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wa-form-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wa-form-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wa-form-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wa-sticky-button-bbd0071d59903fe2f31999b2357a095e.yaml b/nuclei-templates/cve-less/plugins/wa-sticky-button-bbd0071d59903fe2f31999b2357a095e.yaml new file mode 100644 index 0000000000..2633d8516a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wa-sticky-button-bbd0071d59903fe2f31999b2357a095e.yaml @@ -0,0 +1,58 @@ +id: wa-sticky-button-bbd0071d59903fe2f31999b2357a095e + +info: + name: > + WP Sticky Button <= 1.4 - Missing Authorization to Arbitrary Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a39e9b54-6beb-4dbd-a4cf-ba05e73a58a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wa-sticky-button/" + google-query: inurl:"/wp-content/plugins/wa-sticky-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wa-sticky-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wa-sticky-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wa-sticky-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wa-sticky-button-bc4698e238b0c0be70f90cf3e64702b5.yaml b/nuclei-templates/cve-less/plugins/wa-sticky-button-bc4698e238b0c0be70f90cf3e64702b5.yaml new file mode 100644 index 0000000000..fe3dbf9a4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wa-sticky-button-bc4698e238b0c0be70f90cf3e64702b5.yaml @@ -0,0 +1,58 @@ +id: wa-sticky-button-bc4698e238b0c0be70f90cf3e64702b5 + +info: + name: > + WP Sticky Button <= 1.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c80e6f0b-ccca-4755-b64e-cfcebc5cc1fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wa-sticky-button/" + google-query: inurl:"/wp-content/plugins/wa-sticky-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wa-sticky-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wa-sticky-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wa-sticky-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wadi-survey-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wadi-survey-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4a16780383 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wadi-survey-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wadi-survey-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wadi-survey/" + google-query: inurl:"/wp-content/plugins/wadi-survey/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wadi-survey,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wadi-survey/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wadi-survey" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/waiting-1209e60c33aa42384c4d16b88f0a5ed8.yaml b/nuclei-templates/cve-less/plugins/waiting-1209e60c33aa42384c4d16b88f0a5ed8.yaml new file mode 100644 index 0000000000..6ca59ac067 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/waiting-1209e60c33aa42384c4d16b88f0a5ed8.yaml @@ -0,0 +1,58 @@ +id: waiting-1209e60c33aa42384c4d16b88f0a5ed8 + +info: + name: > + Waiting: One-click countdowns <= 0.6.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/293070c8-783f-404d-9250-392713703ce4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/waiting/" + google-query: inurl:"/wp-content/plugins/waiting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,waiting,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/waiting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "waiting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/waiting-2724145ee24f5785e7f7e4619d00fbc8.yaml b/nuclei-templates/cve-less/plugins/waiting-2724145ee24f5785e7f7e4619d00fbc8.yaml new file mode 100644 index 0000000000..8b33dca7f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/waiting-2724145ee24f5785e7f7e4619d00fbc8.yaml @@ -0,0 +1,58 @@ +id: waiting-2724145ee24f5785e7f7e4619d00fbc8 + +info: + name: > + Waiting: One-click countdowns <= 0.6.2 - Missing Authorization Checks leading to Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38cc5a39-6ec3-4ce9-b9ad-d4ca5dafe9a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/waiting/" + google-query: inurl:"/wp-content/plugins/waiting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,waiting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/waiting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "waiting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/waiting-8c1942cb96af03432bec152c3b3fb8a0.yaml b/nuclei-templates/cve-less/plugins/waiting-8c1942cb96af03432bec152c3b3fb8a0.yaml new file mode 100644 index 0000000000..280d4b27da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/waiting-8c1942cb96af03432bec152c3b3fb8a0.yaml @@ -0,0 +1,58 @@ +id: waiting-8c1942cb96af03432bec152c3b3fb8a0 + +info: + name: > + Waiting: One-click countdowns <= 0.6.2 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ef5b0de-0b8b-4286-86ea-6dca0dbc1a52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/waiting/" + google-query: inurl:"/wp-content/plugins/waiting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,waiting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/waiting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "waiting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/waiting-e15e05d52edf8dfda475d35365b1fa33.yaml b/nuclei-templates/cve-less/plugins/waiting-e15e05d52edf8dfda475d35365b1fa33.yaml new file mode 100644 index 0000000000..b42bca8493 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/waiting-e15e05d52edf8dfda475d35365b1fa33.yaml @@ -0,0 +1,58 @@ +id: waiting-e15e05d52edf8dfda475d35365b1fa33 + +info: + name: > + Waiting: One-click countdowns <= 0.6.2 - Authenticated (Subscriber+) SQL Injection via 'pbc_down[meta][id]' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17d12a35-35a1-4f7b-aa03-33ddafe17f5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/waiting/" + google-query: inurl:"/wp-content/plugins/waiting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,waiting,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/waiting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "waiting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/waiting-f0771147e509df66bb2795f5abd8b650.yaml b/nuclei-templates/cve-less/plugins/waiting-f0771147e509df66bb2795f5abd8b650.yaml new file mode 100644 index 0000000000..17f4738881 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/waiting-f0771147e509df66bb2795f5abd8b650.yaml @@ -0,0 +1,58 @@ +id: waiting-f0771147e509df66bb2795f5abd8b650 + +info: + name: > + Waiting: One-click countdowns <= 0.6.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ffba592-6d0d-408f-89fa-079066750b0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/waiting/" + google-query: inurl:"/wp-content/plugins/waiting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,waiting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/waiting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "waiting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/waitlist-woocommerce-15f73ea2399f5741a02449d49b638dc5.yaml b/nuclei-templates/cve-less/plugins/waitlist-woocommerce-15f73ea2399f5741a02449d49b638dc5.yaml new file mode 100644 index 0000000000..f4a8734f7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/waitlist-woocommerce-15f73ea2399f5741a02449d49b638dc5.yaml @@ -0,0 +1,58 @@ +id: waitlist-woocommerce-15f73ea2399f5741a02449d49b638dc5 + +info: + name: > + Waitlist Woocommerce ( Back in stock notifier ) <= 2.5.2 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20910787-b99d-475e-acc9-cc2bb669aa56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/waitlist-woocommerce/" + google-query: inurl:"/wp-content/plugins/waitlist-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,waitlist-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/waitlist-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "waitlist-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/waitlist-woocommerce-9c997af79b10bc0805f0be2e95bc48ad.yaml b/nuclei-templates/cve-less/plugins/waitlist-woocommerce-9c997af79b10bc0805f0be2e95bc48ad.yaml new file mode 100644 index 0000000000..9db6968b3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/waitlist-woocommerce-9c997af79b10bc0805f0be2e95bc48ad.yaml @@ -0,0 +1,58 @@ +id: waitlist-woocommerce-9c997af79b10bc0805f0be2e95bc48ad + +info: + name: > + Waitlist Woocommerce ( Back in stock notifier ) <= 2.5.1 - Cross-Site Request Forgery to Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c056904-5b2d-4ca6-8dcf-8ab5c1a7645b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/waitlist-woocommerce/" + google-query: inurl:"/wp-content/plugins/waitlist-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,waitlist-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/waitlist-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "waitlist-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/walk-score-bde36549e6c813f81edb8dd7a9a04ef9.yaml b/nuclei-templates/cve-less/plugins/walk-score-bde36549e6c813f81edb8dd7a9a04ef9.yaml new file mode 100644 index 0000000000..25c88b70f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/walk-score-bde36549e6c813f81edb8dd7a9a04ef9.yaml @@ -0,0 +1,58 @@ +id: walk-score-bde36549e6c813f81edb8dd7a9a04ef9 + +info: + name: > + Walk Score Plugin <= 0.5.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91d72089-6ad9-401b-ab7b-0996e28d3be9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/walk-score/" + google-query: inurl:"/wp-content/plugins/walk-score/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,walk-score,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/walk-score/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "walk-score" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/walker-core-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/walker-core-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d7878fa1b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/walker-core-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: walker-core-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/walker-core/" + google-query: inurl:"/wp-content/plugins/walker-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,walker-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/walker-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "walker-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wallet-system-for-woocommerce-7706ecb0938b8fb85c383697e07572be.yaml b/nuclei-templates/cve-less/plugins/wallet-system-for-woocommerce-7706ecb0938b8fb85c383697e07572be.yaml new file mode 100644 index 0000000000..b51c8e25cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wallet-system-for-woocommerce-7706ecb0938b8fb85c383697e07572be.yaml @@ -0,0 +1,58 @@ +id: wallet-system-for-woocommerce-7706ecb0938b8fb85c383697e07572be + +info: + name: > + Wallet System for WooCommerce <= 2.5.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b81b06b4-559f-4b69-9fdd-e09e66525867?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wallet-system-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/wallet-system-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wallet-system-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wallet-system-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wallet-system-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wangguard-537a2dc42705104ff023fd51b5c2411d.yaml b/nuclei-templates/cve-less/plugins/wangguard-537a2dc42705104ff023fd51b5c2411d.yaml new file mode 100644 index 0000000000..e6c6895d9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wangguard-537a2dc42705104ff023fd51b5c2411d.yaml @@ -0,0 +1,58 @@ +id: wangguard-537a2dc42705104ff023fd51b5c2411d + +info: + name: > + WangGuard < 1.8.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcd50211-447c-4097-9281-551a3caad1a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wangguard/" + google-query: inurl:"/wp-content/plugins/wangguard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wangguard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wangguard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wangguard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wangguard-54e8332ab2042b90448af1c552f2e323.yaml b/nuclei-templates/cve-less/plugins/wangguard-54e8332ab2042b90448af1c552f2e323.yaml new file mode 100644 index 0000000000..bf7ac9034c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wangguard-54e8332ab2042b90448af1c552f2e323.yaml @@ -0,0 +1,58 @@ +id: wangguard-54e8332ab2042b90448af1c552f2e323 + +info: + name: > + WangGuard < 1.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cfbafce-ba3b-477f-ad8d-ca4e57332f0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wangguard/" + google-query: inurl:"/wp-content/plugins/wangguard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wangguard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wangguard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wangguard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wangguard-db49793104c02948c0a70acebb25609e.yaml b/nuclei-templates/cve-less/plugins/wangguard-db49793104c02948c0a70acebb25609e.yaml new file mode 100644 index 0000000000..5dca8f8029 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wangguard-db49793104c02948c0a70acebb25609e.yaml @@ -0,0 +1,58 @@ +id: wangguard-db49793104c02948c0a70acebb25609e + +info: + name: > + WangGuard <= 1.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec6ea63d-60de-4b3f-8b7c-cbd951c3f737?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wangguard/" + google-query: inurl:"/wp-content/plugins/wangguard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wangguard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wangguard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wangguard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wappointment-002ef48540e20a0d89d1ec091c0333a2.yaml b/nuclei-templates/cve-less/plugins/wappointment-002ef48540e20a0d89d1ec091c0333a2.yaml new file mode 100644 index 0000000000..7af4ff55da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wappointment-002ef48540e20a0d89d1ec091c0333a2.yaml @@ -0,0 +1,58 @@ +id: wappointment-002ef48540e20a0d89d1ec091c0333a2 + +info: + name: > + Appointment Bookings for Zoom GoogleMeet and more – Wappointment <= 2.2.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ded73f27-6b3a-435a-861f-5e10938d6d1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wappointment/" + google-query: inurl:"/wp-content/plugins/wappointment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wappointment,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wappointment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wappointment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wappointment-169d659b2a655a618a75f90fea3adcb4.yaml b/nuclei-templates/cve-less/plugins/wappointment-169d659b2a655a618a75f90fea3adcb4.yaml new file mode 100644 index 0000000000..712d26a00d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wappointment-169d659b2a655a618a75f90fea3adcb4.yaml @@ -0,0 +1,58 @@ +id: wappointment-169d659b2a655a618a75f90fea3adcb4 + +info: + name: > + Appointment Bookings for Zoom GoogleMeet and more – Wappointment <= 2.6.0 - Authenticated (Administrator+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf753fcf-9db0-4161-97e5-0f09c3452544?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wappointment/" + google-query: inurl:"/wp-content/plugins/wappointment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wappointment,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wappointment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wappointment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wapppress-builds-android-app-for-website-d09fc1530295f530d642bfbf2434f308.yaml b/nuclei-templates/cve-less/plugins/wapppress-builds-android-app-for-website-d09fc1530295f530d642bfbf2434f308.yaml new file mode 100644 index 0000000000..f2cda5dd4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wapppress-builds-android-app-for-website-d09fc1530295f530d642bfbf2434f308.yaml @@ -0,0 +1,58 @@ +id: wapppress-builds-android-app-for-website-d09fc1530295f530d642bfbf2434f308 + +info: + name: > + WappPress <= 5.0.3 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07eab536-6f20-45ec-9f9e-70ab35555db2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wapppress-builds-android-app-for-website/" + google-query: inurl:"/wp-content/plugins/wapppress-builds-android-app-for-website/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wapppress-builds-android-app-for-website,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wapppress-builds-android-app-for-website/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wapppress-builds-android-app-for-website" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wassup-0d76cdabd99991797881aa307b9b2932.yaml b/nuclei-templates/cve-less/plugins/wassup-0d76cdabd99991797881aa307b9b2932.yaml new file mode 100644 index 0000000000..2d0f3e68d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wassup-0d76cdabd99991797881aa307b9b2932.yaml @@ -0,0 +1,58 @@ +id: wassup-0d76cdabd99991797881aa307b9b2932 + +info: + name: > + WassUp Real Time Analytics <= 1.9.4.5 - Unauthenticated Stored Cross-Site Scripting via IP + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5318c2d-7b58-4830-bbc0-6d160968290f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wassup/" + google-query: inurl:"/wp-content/plugins/wassup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wassup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wassup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wassup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wassup-20a5a74760194c2a8f6292ec671e20a6.yaml b/nuclei-templates/cve-less/plugins/wassup-20a5a74760194c2a8f6292ec671e20a6.yaml new file mode 100644 index 0000000000..ea537b824e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wassup-20a5a74760194c2a8f6292ec671e20a6.yaml @@ -0,0 +1,58 @@ +id: wassup-20a5a74760194c2a8f6292ec671e20a6 + +info: + name: > + WassUp Real Time Analytics 1.4 - 1.4.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5205fcde-2e6c-49de-b132-1ebefcd1ba59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wassup/" + google-query: inurl:"/wp-content/plugins/wassup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wassup,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wassup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wassup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.4', '<= 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wassup-4b2830a65cedd0c5dc26608a77f72c10.yaml b/nuclei-templates/cve-less/plugins/wassup-4b2830a65cedd0c5dc26608a77f72c10.yaml new file mode 100644 index 0000000000..dd3d3b0384 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wassup-4b2830a65cedd0c5dc26608a77f72c10.yaml @@ -0,0 +1,58 @@ +id: wassup-4b2830a65cedd0c5dc26608a77f72c10 + +info: + name: > + WassUp Real Time Analytics < 1.8.3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f4a0b8d-0f3b-4ab1-929e-071b45781ca7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wassup/" + google-query: inurl:"/wp-content/plugins/wassup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wassup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wassup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wassup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wassup-c1bbee5af74211de37a39642515f7de2.yaml b/nuclei-templates/cve-less/plugins/wassup-c1bbee5af74211de37a39642515f7de2.yaml new file mode 100644 index 0000000000..f3c6565ee0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wassup-c1bbee5af74211de37a39642515f7de2.yaml @@ -0,0 +1,58 @@ +id: wassup-c1bbee5af74211de37a39642515f7de2 + +info: + name: > + WassUp Real Time Analytics < 1.9.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b72bf37-05c8-424e-98d1-39fe032368ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wassup/" + google-query: inurl:"/wp-content/plugins/wassup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wassup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wassup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wassup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wassup-f20cc872feace3e3660ec95d470c9be3.yaml b/nuclei-templates/cve-less/plugins/wassup-f20cc872feace3e3660ec95d470c9be3.yaml new file mode 100644 index 0000000000..94a21b9f0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wassup-f20cc872feace3e3660ec95d470c9be3.yaml @@ -0,0 +1,58 @@ +id: wassup-f20cc872feace3e3660ec95d470c9be3 + +info: + name: > + WassUp Real Time Analytics <= 1.9.4.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a253b04-bbe9-42d1-b6d9-1a62ad37855c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wassup/" + google-query: inurl:"/wp-content/plugins/wassup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wassup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wassup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wassup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watcheezy-798f3fd97aa989f25f329926174d2a78.yaml b/nuclei-templates/cve-less/plugins/watcheezy-798f3fd97aa989f25f329926174d2a78.yaml new file mode 100644 index 0000000000..6e3e981d1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watcheezy-798f3fd97aa989f25f329926174d2a78.yaml @@ -0,0 +1,58 @@ +id: watcheezy-798f3fd97aa989f25f329926174d2a78 + +info: + name: > + Watcheezy Live chat plugin for WordPress <= 2.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee1a3105-ebb2-44ce-bbbe-3ab95d69670a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watcheezy/" + google-query: inurl:"/wp-content/plugins/watcheezy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watcheezy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watcheezy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watcheezy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watchtowerhq-7f144a6800afc0e683d9d4b4e5524bee.yaml b/nuclei-templates/cve-less/plugins/watchtowerhq-7f144a6800afc0e683d9d4b4e5524bee.yaml new file mode 100644 index 0000000000..ea752a9f16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watchtowerhq-7f144a6800afc0e683d9d4b4e5524bee.yaml @@ -0,0 +1,58 @@ +id: watchtowerhq-7f144a6800afc0e683d9d4b4e5524bee + +info: + name: > + WatchTowerHQ <= 3.6.16 - Type Juggling to Authentication Bypass in check_ota + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/481c738e-d544-4587-8632-e85a7ddd8b14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watchtowerhq/" + google-query: inurl:"/wp-content/plugins/watchtowerhq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watchtowerhq,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watchtowerhq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watchtowerhq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watchtowerhq-b817d9941d4ed7ec0b863760a17d14b5.yaml b/nuclei-templates/cve-less/plugins/watchtowerhq-b817d9941d4ed7ec0b863760a17d14b5.yaml new file mode 100644 index 0000000000..e5b3b9fd08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watchtowerhq-b817d9941d4ed7ec0b863760a17d14b5.yaml @@ -0,0 +1,58 @@ +id: watchtowerhq-b817d9941d4ed7ec0b863760a17d14b5 + +info: + name: > + WatchTowerHQ <= 3.6.15 - Unauthenticated Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38526b0c-a5d9-4f54-bd6f-30ab34d266f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watchtowerhq/" + google-query: inurl:"/wp-content/plugins/watchtowerhq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watchtowerhq,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watchtowerhq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watchtowerhq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watchtowerhq-c416f9baa331de51ce04675f6be775e1.yaml b/nuclei-templates/cve-less/plugins/watchtowerhq-c416f9baa331de51ce04675f6be775e1.yaml new file mode 100644 index 0000000000..72ca931858 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watchtowerhq-c416f9baa331de51ce04675f6be775e1.yaml @@ -0,0 +1,58 @@ +id: watchtowerhq-c416f9baa331de51ce04675f6be775e1 + +info: + name: > + WatchTowerHQ <= 3.6.15 - Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04e2f1f3-95c9-4a90-8c76-7b405a3815f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watchtowerhq/" + google-query: inurl:"/wp-content/plugins/watchtowerhq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watchtowerhq,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watchtowerhq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watchtowerhq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watermark-reloaded-b5016fe0cbf526aff24bd66f2a8d0464.yaml b/nuclei-templates/cve-less/plugins/watermark-reloaded-b5016fe0cbf526aff24bd66f2a8d0464.yaml new file mode 100644 index 0000000000..a2577dcd00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watermark-reloaded-b5016fe0cbf526aff24bd66f2a8d0464.yaml @@ -0,0 +1,58 @@ +id: watermark-reloaded-b5016fe0cbf526aff24bd66f2a8d0464 + +info: + name: > + Watermark RELOADED <= 1.3.5 - Cross-Site Request Forgery via optionsPage + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/656300ce-6e94-4382-b0ed-9cecca5b917c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watermark-reloaded/" + google-query: inurl:"/wp-content/plugins/watermark-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watermark-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watermark-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watermark-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wats-8cc533b05aae8f8735d3033cbbcc92b8.yaml b/nuclei-templates/cve-less/plugins/wats-8cc533b05aae8f8735d3033cbbcc92b8.yaml new file mode 100644 index 0000000000..f38c92e988 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wats-8cc533b05aae8f8735d3033cbbcc92b8.yaml @@ -0,0 +1,58 @@ +id: wats-8cc533b05aae8f8735d3033cbbcc92b8 + +info: + name: > + WordPress Advanced Ticket System, Elite Support Helpdesk <= 1.0.63 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9ae8fa3-206c-496d-9902-c6468964b717?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wats/" + google-query: inurl:"/wp-content/plugins/wats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-10c1cecb5e025d7fe3193dda4559f4a3.yaml b/nuclei-templates/cve-less/plugins/watu-10c1cecb5e025d7fe3193dda4559f4a3.yaml new file mode 100644 index 0000000000..ed5d4f491d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-10c1cecb5e025d7fe3193dda4559f4a3.yaml @@ -0,0 +1,58 @@ +id: watu-10c1cecb5e025d7fe3193dda4559f4a3 + +info: + name: > + Watu Quiz <= 3.3.9.2 - Reflected Cross-Site Scripting via 'question' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d24dbdf-8fb0-41c3-8c35-e0d65c6b96f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-22dc3c966bc99d033ff51a2a9e75f62c.yaml b/nuclei-templates/cve-less/plugins/watu-22dc3c966bc99d033ff51a2a9e75f62c.yaml new file mode 100644 index 0000000000..5775e8c1c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-22dc3c966bc99d033ff51a2a9e75f62c.yaml @@ -0,0 +1,58 @@ +id: watu-22dc3c966bc99d033ff51a2a9e75f62c + +info: + name: > + Watu Quiz <= 3.3.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36ef164e-33cc-41b1-8e28-d2af89739f04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-38df56fa1dc5330e530e8cc53cb9a80a.yaml b/nuclei-templates/cve-less/plugins/watu-38df56fa1dc5330e530e8cc53cb9a80a.yaml new file mode 100644 index 0000000000..01bf4d4eb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-38df56fa1dc5330e530e8cc53cb9a80a.yaml @@ -0,0 +1,58 @@ +id: watu-38df56fa1dc5330e530e8cc53cb9a80a + +info: + name: > + Watu Quiz 3.1.2.1 - 3.1.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aed2ec57-2475-4e77-8219-399cf769ba5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.1.2.1', '<= 3.1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-498902087f55cd027211cbff49f69fac.yaml b/nuclei-templates/cve-less/plugins/watu-498902087f55cd027211cbff49f69fac.yaml new file mode 100644 index 0000000000..6baa2588f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-498902087f55cd027211cbff49f69fac.yaml @@ -0,0 +1,58 @@ +id: watu-498902087f55cd027211cbff49f69fac + +info: + name: > + Watu Quiz <= 3.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c31732fa-eb35-4932-bee6-08955a14b010?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-89a35a79088c1cac6da4471e1521db2a.yaml b/nuclei-templates/cve-less/plugins/watu-89a35a79088c1cac6da4471e1521db2a.yaml new file mode 100644 index 0000000000..67adba2651 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-89a35a79088c1cac6da4471e1521db2a.yaml @@ -0,0 +1,58 @@ +id: watu-89a35a79088c1cac6da4471e1521db2a + +info: + name: > + Watu Quiz <= 2.6.7 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34526c98-caf8-42d9-8782-7ea9b3a75e9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-b8cc2d0576f53610bf8d4065262e9115.yaml b/nuclei-templates/cve-less/plugins/watu-b8cc2d0576f53610bf8d4065262e9115.yaml new file mode 100644 index 0000000000..57d38be0d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-b8cc2d0576f53610bf8d4065262e9115.yaml @@ -0,0 +1,58 @@ +id: watu-b8cc2d0576f53610bf8d4065262e9115 + +info: + name: > + Watu Quiz <= 2.5.0.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efdf76b2-7640-4384-a72b-789159eb9c86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-bc7de59ba516744b35b1924de01c50d6.yaml b/nuclei-templates/cve-less/plugins/watu-bc7de59ba516744b35b1924de01c50d6.yaml new file mode 100644 index 0000000000..05912913d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-bc7de59ba516744b35b1924de01c50d6.yaml @@ -0,0 +1,58 @@ +id: watu-bc7de59ba516744b35b1924de01c50d6 + +info: + name: > + Watu Quiz <= 3.3.8.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/965b5979-9bf6-4124-86c4-e246f8f17270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-c2cbb8ef0136e2fd003d5d3fa4115b69.yaml b/nuclei-templates/cve-less/plugins/watu-c2cbb8ef0136e2fd003d5d3fa4115b69.yaml new file mode 100644 index 0000000000..088352d4f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-c2cbb8ef0136e2fd003d5d3fa4115b69.yaml @@ -0,0 +1,58 @@ +id: watu-c2cbb8ef0136e2fd003d5d3fa4115b69 + +info: + name: > + Watu Quiz <= 3.3.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81936c52-feb7-4f10-940d-cfce5963f400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-ce97e7aa4395e3d292936b1987fa10a3.yaml b/nuclei-templates/cve-less/plugins/watu-ce97e7aa4395e3d292936b1987fa10a3.yaml new file mode 100644 index 0000000000..ea45b485d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-ce97e7aa4395e3d292936b1987fa10a3.yaml @@ -0,0 +1,58 @@ +id: watu-ce97e7aa4395e3d292936b1987fa10a3 + +info: + name: > + Watu Quiz <= 3.3.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6341bdcc-c99f-40c3-81c4-ad90ff19f802?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watu-dc2fc518b05ca80ce1806da39fabb982.yaml b/nuclei-templates/cve-less/plugins/watu-dc2fc518b05ca80ce1806da39fabb982.yaml new file mode 100644 index 0000000000..c67789328b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watu-dc2fc518b05ca80ce1806da39fabb982.yaml @@ -0,0 +1,58 @@ +id: watu-dc2fc518b05ca80ce1806da39fabb982 + +info: + name: > + Watu Quiz <= 3.4.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acc261eb-fafa-4e9d-b7ab-a449f14a7638?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watu/" + google-query: inurl:"/wp-content/plugins/watu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watupro-cee24bd7bc9abfcb337ea3d0346213d6.yaml b/nuclei-templates/cve-less/plugins/watupro-cee24bd7bc9abfcb337ea3d0346213d6.yaml new file mode 100644 index 0000000000..abf9d8409f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watupro-cee24bd7bc9abfcb337ea3d0346213d6.yaml @@ -0,0 +1,58 @@ +id: watupro-cee24bd7bc9abfcb337ea3d0346213d6 + +info: + name: > + WatuPRO < 5.5.3.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6226ae5-3b75-4521-b060-004f291203c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watupro/" + google-query: inurl:"/wp-content/plugins/watupro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watupro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watupro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watupro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/watupro-e908001e4e531adbaea4081ce2990e50.yaml b/nuclei-templates/cve-less/plugins/watupro-e908001e4e531adbaea4081ce2990e50.yaml new file mode 100644 index 0000000000..4d778b0d30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/watupro-e908001e4e531adbaea4081ce2990e50.yaml @@ -0,0 +1,58 @@ +id: watupro-e908001e4e531adbaea4081ce2990e50 + +info: + name: > + WatuPRO < 4.9.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48f39d6c-621b-4c78-9459-68bb67a94f57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/watupro/" + google-query: inurl:"/wp-content/plugins/watupro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,watupro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/watupro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "watupro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wbcom-designs-buddypress-ads-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/wbcom-designs-buddypress-ads-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..8789e9b330 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wbcom-designs-buddypress-ads-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: wbcom-designs-buddypress-ads-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wbcom-designs-buddypress-ads/" + google-query: inurl:"/wp-content/plugins/wbcom-designs-buddypress-ads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wbcom-designs-buddypress-ads,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wbcom-designs-buddypress-ads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wbcom-designs-buddypress-ads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wbcom-designs-buddypress-search-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/wbcom-designs-buddypress-search-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..3a0d452722 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wbcom-designs-buddypress-search-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: wbcom-designs-buddypress-search-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wbcom-designs-buddypress-search/" + google-query: inurl:"/wp-content/plugins/wbcom-designs-buddypress-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wbcom-designs-buddypress-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wbcom-designs-buddypress-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wbcom-designs-buddypress-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-basic-slider-826769e27edbc5a7e8c99a41d2b44f99.yaml b/nuclei-templates/cve-less/plugins/wc-basic-slider-826769e27edbc5a7e8c99a41d2b44f99.yaml new file mode 100644 index 0000000000..bf5a4a3afb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-basic-slider-826769e27edbc5a7e8c99a41d2b44f99.yaml @@ -0,0 +1,58 @@ +id: wc-basic-slider-826769e27edbc5a7e8c99a41d2b44f99 + +info: + name: > + Unlimited Category slider for WooCommerce <= 2.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75e5e1eb-300f-4ddf-aec5-4fae9dba0f5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-basic-slider/" + google-query: inurl:"/wp-content/plugins/wc-basic-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-basic-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-basic-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-basic-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-builder-898754090db0c7c53df1a53b0a6b37dc.yaml b/nuclei-templates/cve-less/plugins/wc-builder-898754090db0c7c53df1a53b0a6b37dc.yaml new file mode 100644 index 0000000000..22ff0be67f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-builder-898754090db0c7c53df1a53b0a6b37dc.yaml @@ -0,0 +1,58 @@ +id: wc-builder-898754090db0c7c53df1a53b0a6b37dc + +info: + name: > + WC Builder <= 1.0.18 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e984ff1-9dcf-4cd3-b617-1f9e25ecae0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-builder/" + google-query: inurl:"/wp-content/plugins/wc-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-captcha-59d95b9687e55d617dd1230a739e9c20.yaml b/nuclei-templates/cve-less/plugins/wc-captcha-59d95b9687e55d617dd1230a739e9c20.yaml new file mode 100644 index 0000000000..a6ef227184 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-captcha-59d95b9687e55d617dd1230a739e9c20.yaml @@ -0,0 +1,58 @@ +id: wc-captcha-59d95b9687e55d617dd1230a739e9c20 + +info: + name: > + WC Captcha <= 1.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/400dde23-eafb-4ace-8b4a-ac88d0b200ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-captcha/" + google-query: inurl:"/wp-content/plugins/wc-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-category-showcase-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wc-category-showcase-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..03d6b754a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-category-showcase-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wc-category-showcase-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-category-showcase/" + google-query: inurl:"/wp-content/plugins/wc-category-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-category-showcase,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-category-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-category-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-category-showcase-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wc-category-showcase-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..a0a9c574d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-category-showcase-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wc-category-showcase-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-category-showcase/" + google-query: inurl:"/wp-content/plugins/wc-category-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-category-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-category-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-category-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-ciudades-y-regiones-de-chile-dfcbb5ca7eda2dc1efe66c0932fc3702.yaml b/nuclei-templates/cve-less/plugins/wc-ciudades-y-regiones-de-chile-dfcbb5ca7eda2dc1efe66c0932fc3702.yaml new file mode 100644 index 0000000000..4ef7a0958b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-ciudades-y-regiones-de-chile-dfcbb5ca7eda2dc1efe66c0932fc3702.yaml @@ -0,0 +1,58 @@ +id: wc-ciudades-y-regiones-de-chile-dfcbb5ca7eda2dc1efe66c0932fc3702 + +info: + name: > + MkRapel Regiones y Ciudades de Chile para WC <= 4.3.0 - Cross-Site Request Forgery via multiple functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70bac5e0-8182-426c-94da-e6832af8c487?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-ciudades-y-regiones-de-chile/" + google-query: inurl:"/wp-content/plugins/wc-ciudades-y-regiones-de-chile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-ciudades-y-regiones-de-chile,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-ciudades-y-regiones-de-chile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-ciudades-y-regiones-de-chile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-customer-source-324d03958cfaceefa9e17d53cf4690e2.yaml b/nuclei-templates/cve-less/plugins/wc-customer-source-324d03958cfaceefa9e17d53cf4690e2.yaml new file mode 100644 index 0000000000..7c3ea9e315 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-customer-source-324d03958cfaceefa9e17d53cf4690e2.yaml @@ -0,0 +1,58 @@ +id: wc-customer-source-324d03958cfaceefa9e17d53cf4690e2 + +info: + name: > + Where Did You Hear About Us Checkout Field for WooCommerce <= 1.3.1 - Authenticated (Shop Manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbee3720-6ab9-4470-b2d2-09824db8de4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-customer-source/" + google-query: inurl:"/wp-content/plugins/wc-customer-source/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-customer-source,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-customer-source/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-customer-source" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-donation-platform-c92c28d92f174db02a0c2fa3d5d985bd.yaml b/nuclei-templates/cve-less/plugins/wc-donation-platform-c92c28d92f174db02a0c2fa3d5d985bd.yaml new file mode 100644 index 0000000000..0258b0ef9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-donation-platform-c92c28d92f174db02a0c2fa3d5d985bd.yaml @@ -0,0 +1,58 @@ +id: wc-donation-platform-c92c28d92f174db02a0c2fa3d5d985bd + +info: + name: > + Donation Platform for WooCommerce: Fundraising & Donation Management <= 1.2.9 - Cross-Site Request Forgery to Survey Submission + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c8602ed-6c0d-4357-93e6-bab1ab38ffb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-donation-platform/" + google-query: inurl:"/wp-content/plugins/wc-donation-platform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-donation-platform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-donation-platform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-donation-platform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-dynamic-pricing-and-discounts-9febd7c017184f2da162cbcd9ca6acbf.yaml b/nuclei-templates/cve-less/plugins/wc-dynamic-pricing-and-discounts-9febd7c017184f2da162cbcd9ca6acbf.yaml new file mode 100644 index 0000000000..6bad1dc9a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-dynamic-pricing-and-discounts-9febd7c017184f2da162cbcd9ca6acbf.yaml @@ -0,0 +1,58 @@ +id: wc-dynamic-pricing-and-discounts-9febd7c017184f2da162cbcd9ca6acbf + +info: + name: > + WooCommerce Dynamic Pricing and Discounts <= 2.4.1 - Unauthenticated Settings Import/Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c1e6685-44a7-452e-89ab-b9fffb65a12b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-dynamic-pricing-and-discounts/" + google-query: inurl:"/wp-content/plugins/wc-dynamic-pricing-and-discounts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-dynamic-pricing-and-discounts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-dynamic-pricing-and-discounts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-dynamic-pricing-and-discounts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-dynamic-pricing-and-discounts-e783401602a498d4131896498c1a16c5.yaml b/nuclei-templates/cve-less/plugins/wc-dynamic-pricing-and-discounts-e783401602a498d4131896498c1a16c5.yaml new file mode 100644 index 0000000000..7bedd907b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-dynamic-pricing-and-discounts-e783401602a498d4131896498c1a16c5.yaml @@ -0,0 +1,58 @@ +id: wc-dynamic-pricing-and-discounts-e783401602a498d4131896498c1a16c5 + +info: + name: > + WooCommerce Dynamic Pricing and Discounts <= 2.4.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcaa5d0e-b764-4566-bd46-2d41dc391c36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-dynamic-pricing-and-discounts/" + google-query: inurl:"/wp-content/plugins/wc-dynamic-pricing-and-discounts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-dynamic-pricing-and-discounts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-dynamic-pricing-and-discounts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-dynamic-pricing-and-discounts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-fields-factory-6351a80c46e754ccfc255c93464a7133.yaml b/nuclei-templates/cve-less/plugins/wc-fields-factory-6351a80c46e754ccfc255c93464a7133.yaml new file mode 100644 index 0000000000..4978a9c4f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-fields-factory-6351a80c46e754ccfc255c93464a7133.yaml @@ -0,0 +1,58 @@ +id: wc-fields-factory-6351a80c46e754ccfc255c93464a7133 + +info: + name: > + WC Fields Factory <= 4.1.5 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70ca7ad4-6848-4f87-ae2d-4b9c2ffa668e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-fields-factory/" + google-query: inurl:"/wp-content/plugins/wc-fields-factory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-fields-factory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-fields-factory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-fields-factory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-fields-factory-c91fc0c595c28d56281ceceb582f95ca.yaml b/nuclei-templates/cve-less/plugins/wc-fields-factory-c91fc0c595c28d56281ceceb582f95ca.yaml new file mode 100644 index 0000000000..20ce25a954 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-fields-factory-c91fc0c595c28d56281ceceb582f95ca.yaml @@ -0,0 +1,58 @@ +id: wc-fields-factory-c91fc0c595c28d56281ceceb582f95ca + +info: + name: > + WC Fields Factory <= 4.1.5 - Authenticated(Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c51f55f-6e8c-467c-999b-4e6a1a6f7bbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-fields-factory/" + google-query: inurl:"/wp-content/plugins/wc-fields-factory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-fields-factory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-fields-factory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-fields-factory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-frontend-manager-0c52b9ced5fad811a9c32501960e026a.yaml b/nuclei-templates/cve-less/plugins/wc-frontend-manager-0c52b9ced5fad811a9c32501960e026a.yaml new file mode 100644 index 0000000000..54d8e2958d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-frontend-manager-0c52b9ced5fad811a9c32501960e026a.yaml @@ -0,0 +1,58 @@ +id: wc-frontend-manager-0c52b9ced5fad811a9c32501960e026a + +info: + name: > + WCFM Frontend Manager <= 6.6.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d946d4b5-bed7-4808-b133-783b2dcd7992?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-frontend-manager/" + google-query: inurl:"/wp-content/plugins/wc-frontend-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-frontend-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-frontend-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-frontend-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '6.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-frontend-manager-21c7f53627abc5f5c7e2ab4c4c0be8ef.yaml b/nuclei-templates/cve-less/plugins/wc-frontend-manager-21c7f53627abc5f5c7e2ab4c4c0be8ef.yaml new file mode 100644 index 0000000000..c90949ad47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-frontend-manager-21c7f53627abc5f5c7e2ab4c4c0be8ef.yaml @@ -0,0 +1,58 @@ +id: wc-frontend-manager-21c7f53627abc5f5c7e2ab4c4c0be8ef + +info: + name: > + WCFM - Frontend Manager for WooCommerce <= 6.5.11 - Customer/Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eb23014-7bc6-4505-85d7-91d29bb2d8fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-frontend-manager/" + google-query: inurl:"/wp-content/plugins/wc-frontend-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-frontend-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-frontend-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-frontend-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-frontend-manager-3e07b6da33478750c50e5b536bd946ad.yaml b/nuclei-templates/cve-less/plugins/wc-frontend-manager-3e07b6da33478750c50e5b536bd946ad.yaml new file mode 100644 index 0000000000..d4a5a7bcc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-frontend-manager-3e07b6da33478750c50e5b536bd946ad.yaml @@ -0,0 +1,58 @@ +id: wc-frontend-manager-3e07b6da33478750c50e5b536bd946ad + +info: + name: > + WCFM Frontend Manager <= 6.5.13 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/798b57ad-0922-435c-8b4d-8a96b388b314?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-frontend-manager/" + google-query: inurl:"/wp-content/plugins/wc-frontend-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-frontend-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-frontend-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-frontend-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-frontend-manager-678114ef3e2b187e51ff0be3e7f2cb83.yaml b/nuclei-templates/cve-less/plugins/wc-frontend-manager-678114ef3e2b187e51ff0be3e7f2cb83.yaml new file mode 100644 index 0000000000..820678c7cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-frontend-manager-678114ef3e2b187e51ff0be3e7f2cb83.yaml @@ -0,0 +1,58 @@ +id: wc-frontend-manager-678114ef3e2b187e51ff0be3e7f2cb83 + +info: + name: > + WCFM – Frontend Manager for WooCommerce <= 6.7.8 - Authenticated (Shop manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e30e4615-f9b6-4ff6-a227-82cace868f93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-frontend-manager/" + google-query: inurl:"/wp-content/plugins/wc-frontend-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-frontend-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-frontend-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-frontend-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-gsheetconnector-561949f2365cf48493988b7c3c181142.yaml b/nuclei-templates/cve-less/plugins/wc-gsheetconnector-561949f2365cf48493988b7c3c181142.yaml new file mode 100644 index 0000000000..1cbb75a837 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-gsheetconnector-561949f2365cf48493988b7c3c181142.yaml @@ -0,0 +1,58 @@ +id: wc-gsheetconnector-561949f2365cf48493988b7c3c181142 + +info: + name: > + WooCommerce Google Sheet Connector <= 1.3.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e30e64e7-5de9-4eb3-914f-457daa6f3fe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-gsheetconnector/" + google-query: inurl:"/wp-content/plugins/wc-gsheetconnector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-gsheetconnector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-gsheetconnector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-gsheetconnector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-gsheetconnector-792043f233fdfdf73c23cd58a8394e1e.yaml b/nuclei-templates/cve-less/plugins/wc-gsheetconnector-792043f233fdfdf73c23cd58a8394e1e.yaml new file mode 100644 index 0000000000..ad18c1f227 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-gsheetconnector-792043f233fdfdf73c23cd58a8394e1e.yaml @@ -0,0 +1,58 @@ +id: wc-gsheetconnector-792043f233fdfdf73c23cd58a8394e1e + +info: + name: > + WooCommerce Google Sheet Connector <= 1.3.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e36df7b7-fcbc-4e5d-812c-861bfe8abb55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-gsheetconnector/" + google-query: inurl:"/wp-content/plugins/wc-gsheetconnector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-gsheetconnector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-gsheetconnector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-gsheetconnector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multi-currency-4ff702381866f61703ebf71fe12af15e.yaml b/nuclei-templates/cve-less/plugins/wc-multi-currency-4ff702381866f61703ebf71fe12af15e.yaml new file mode 100644 index 0000000000..49aa85f1b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multi-currency-4ff702381866f61703ebf71fe12af15e.yaml @@ -0,0 +1,58 @@ +id: wc-multi-currency-4ff702381866f61703ebf71fe12af15e + +info: + name: > + Multi Currency For WooCommerce <= 1.5.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97bc3a8-ce82-47c2-9ff1-174b2656a296?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multi-currency/" + google-query: inurl:"/wp-content/plugins/wc-multi-currency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multi-currency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multi-currency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multi-currency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multi-currency-cb35d75b82f07351d5d16e14c21403c2.yaml b/nuclei-templates/cve-less/plugins/wc-multi-currency-cb35d75b82f07351d5d16e14c21403c2.yaml new file mode 100644 index 0000000000..67b7712da8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multi-currency-cb35d75b82f07351d5d16e14c21403c2.yaml @@ -0,0 +1,58 @@ +id: wc-multi-currency-cb35d75b82f07351d5d16e14c21403c2 + +info: + name: > + Multi Currency For WooCommerce <= 1.5.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a19d494-08d1-479a-8ba4-edeb2873866a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multi-currency/" + google-query: inurl:"/wp-content/plugins/wc-multi-currency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multi-currency,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multi-currency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multi-currency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multishipping-7255e5fa9e3ec3cf7fa69588c79329ad.yaml b/nuclei-templates/cve-less/plugins/wc-multishipping-7255e5fa9e3ec3cf7fa69588c79329ad.yaml new file mode 100644 index 0000000000..dc36b6061e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multishipping-7255e5fa9e3ec3cf7fa69588c79329ad.yaml @@ -0,0 +1,58 @@ +id: wc-multishipping-7255e5fa9e3ec3cf7fa69588c79329ad + +info: + name: > + WCMultiShipping <= 2.3.5 - Missing Authorization to Log Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b19657c-3e95-42cf-8d1a-64fa50b3b82b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multishipping/" + google-query: inurl:"/wp-content/plugins/wc-multishipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multishipping,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multishipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multishipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multishipping-f0926dfe58b2d68873b90253a8c8de31.yaml b/nuclei-templates/cve-less/plugins/wc-multishipping-f0926dfe58b2d68873b90253a8c8de31.yaml new file mode 100644 index 0000000000..8eaff08496 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multishipping-f0926dfe58b2d68873b90253a8c8de31.yaml @@ -0,0 +1,58 @@ +id: wc-multishipping-f0926dfe58b2d68873b90253a8c8de31 + +info: + name: > + Chronopost & Mondial relay pour WooCommerce - WCMultiShipping <= 2.3.7 - Incorrect Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16a3469d-6264-4ed7-b6ae-fdd7a80c8ca5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multishipping/" + google-query: inurl:"/wp-content/plugins/wc-multishipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multishipping,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multishipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multishipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-09629550fe11748b689836fcea30749f.yaml b/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-09629550fe11748b689836fcea30749f.yaml new file mode 100644 index 0000000000..b6a1434abe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-09629550fe11748b689836fcea30749f.yaml @@ -0,0 +1,58 @@ +id: wc-multivendor-marketplace-09629550fe11748b689836fcea30749f + +info: + name: > + WCFM Marketplace <= 3.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f99e9f01-cc98-4af5-bb95-f56f6a550e96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multivendor-marketplace/" + google-query: inurl:"/wp-content/plugins/wc-multivendor-marketplace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multivendor-marketplace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multivendor-marketplace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multivendor-marketplace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-1478aed4c0e54759cab266ed6c352f80.yaml b/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-1478aed4c0e54759cab266ed6c352f80.yaml new file mode 100644 index 0000000000..9b4c8b0d2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-1478aed4c0e54759cab266ed6c352f80.yaml @@ -0,0 +1,58 @@ +id: wc-multivendor-marketplace-1478aed4c0e54759cab266ed6c352f80 + +info: + name: > + WCFM Marketplace <= 3.4.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85730e9b-c5da-473c-a324-891c5c9f7ba3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multivendor-marketplace/" + google-query: inurl:"/wp-content/plugins/wc-multivendor-marketplace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multivendor-marketplace,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multivendor-marketplace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multivendor-marketplace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-5567b70c50ecdd16ecc424f15907fa4e.yaml b/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-5567b70c50ecdd16ecc424f15907fa4e.yaml new file mode 100644 index 0000000000..3bf9f6e1a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-5567b70c50ecdd16ecc424f15907fa4e.yaml @@ -0,0 +1,58 @@ +id: wc-multivendor-marketplace-5567b70c50ecdd16ecc424f15907fa4e + +info: + name: > + WCFM - WooCommerce Multivendor Marketplace <= 3.4.11 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d6e9aea-6ccb-4c83-83bb-63c9c9f59005?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multivendor-marketplace/" + google-query: inurl:"/wp-content/plugins/wc-multivendor-marketplace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multivendor-marketplace,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multivendor-marketplace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multivendor-marketplace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-f2b7f592ec3ba706f4f8d466824a06fa.yaml b/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-f2b7f592ec3ba706f4f8d466824a06fa.yaml new file mode 100644 index 0000000000..089d1faf8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multivendor-marketplace-f2b7f592ec3ba706f4f8d466824a06fa.yaml @@ -0,0 +1,58 @@ +id: wc-multivendor-marketplace-f2b7f592ec3ba706f4f8d466824a06fa + +info: + name: > + WCFM Marketplace <= 3.4.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c2cc9a3-cd20-4c9e-baa4-1aea69f84331?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multivendor-marketplace/" + google-query: inurl:"/wp-content/plugins/wc-multivendor-marketplace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multivendor-marketplace,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multivendor-marketplace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multivendor-marketplace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multivendor-membership-30f699fd6cdbd468ddc76c3c8a6a1ad8.yaml b/nuclei-templates/cve-less/plugins/wc-multivendor-membership-30f699fd6cdbd468ddc76c3c8a6a1ad8.yaml new file mode 100644 index 0000000000..96b1a88ec8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multivendor-membership-30f699fd6cdbd468ddc76c3c8a6a1ad8.yaml @@ -0,0 +1,58 @@ +id: wc-multivendor-membership-30f699fd6cdbd468ddc76c3c8a6a1ad8 + +info: + name: > + WCFM Membership <= 2.9.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3758db41-a3c5-436a-bb9a-5886f10d1519?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multivendor-membership/" + google-query: inurl:"/wp-content/plugins/wc-multivendor-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multivendor-membership,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multivendor-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multivendor-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multivendor-membership-56e813efb82c352fb78dd0b9d790ba93.yaml b/nuclei-templates/cve-less/plugins/wc-multivendor-membership-56e813efb82c352fb78dd0b9d790ba93.yaml new file mode 100644 index 0000000000..6aa2c949a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multivendor-membership-56e813efb82c352fb78dd0b9d790ba93.yaml @@ -0,0 +1,58 @@ +id: wc-multivendor-membership-56e813efb82c352fb78dd0b9d790ba93 + +info: + name: > + WCFM Membership <= 2.10.0 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0870de2d-bca5-4d57-a07f-877a416ce0d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multivendor-membership/" + google-query: inurl:"/wp-content/plugins/wc-multivendor-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multivendor-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multivendor-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multivendor-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multivendor-membership-97518b1e79707fc1ebbeb0e1daae9dba.yaml b/nuclei-templates/cve-less/plugins/wc-multivendor-membership-97518b1e79707fc1ebbeb0e1daae9dba.yaml new file mode 100644 index 0000000000..19f535c6b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multivendor-membership-97518b1e79707fc1ebbeb0e1daae9dba.yaml @@ -0,0 +1,58 @@ +id: wc-multivendor-membership-97518b1e79707fc1ebbeb0e1daae9dba + +info: + name: > + WCFM Membership – WooCommerce Memberships for Multivendor Marketplace <= 2.10.7 - Unauthenticated Insecure Direct Object Reference to Arbitrary User Password Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42222c64-6492-4774-b5bc-8e62a1a328cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multivendor-membership/" + google-query: inurl:"/wp-content/plugins/wc-multivendor-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multivendor-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multivendor-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multivendor-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-multivendor-membership-a335f75177dafe5e24035ba2e131a198.yaml b/nuclei-templates/cve-less/plugins/wc-multivendor-membership-a335f75177dafe5e24035ba2e131a198.yaml new file mode 100644 index 0000000000..603d20db32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-multivendor-membership-a335f75177dafe5e24035ba2e131a198.yaml @@ -0,0 +1,58 @@ +id: wc-multivendor-membership-a335f75177dafe5e24035ba2e131a198 + +info: + name: > + WCFM Membership <= 2.10.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c6577a2-6722-4d3b-958d-1143dca414cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-multivendor-membership/" + google-query: inurl:"/wp-content/plugins/wc-multivendor-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-multivendor-membership,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-multivendor-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-multivendor-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-order-limit-lite-87d943234d9fd7c1b966ece253dc1110.yaml b/nuclei-templates/cve-less/plugins/wc-order-limit-lite-87d943234d9fd7c1b966ece253dc1110.yaml new file mode 100644 index 0000000000..10e34ce890 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-order-limit-lite-87d943234d9fd7c1b966ece253dc1110.yaml @@ -0,0 +1,58 @@ +id: wc-order-limit-lite-87d943234d9fd7c1b966ece253dc1110 + +info: + name: > + Order Limit for WooCommerce <= 2.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1d32a1d-076e-4a93-a678-145d154edb3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-order-limit-lite/" + google-query: inurl:"/wp-content/plugins/wc-order-limit-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-order-limit-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-order-limit-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-order-limit-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-payment-gateway-per-category-dd705d1a34267a8e434a4d7783906fdf.yaml b/nuclei-templates/cve-less/plugins/wc-payment-gateway-per-category-dd705d1a34267a8e434a4d7783906fdf.yaml new file mode 100644 index 0000000000..bf898cc32d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-payment-gateway-per-category-dd705d1a34267a8e434a4d7783906fdf.yaml @@ -0,0 +1,58 @@ +id: wc-payment-gateway-per-category-dd705d1a34267a8e434a4d7783906fdf + +info: + name: > + WooCommerce Payment Gateway Per Category <= 2.0.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39719351-3388-4175-89a0-8ce153a8bf44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-payment-gateway-per-category/" + google-query: inurl:"/wp-content/plugins/wc-payment-gateway-per-category/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-payment-gateway-per-category,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-payment-gateway-per-category/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-payment-gateway-per-category" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-peach-payments-gateway-bf0e4365c0a80682381fd05937032a09.yaml b/nuclei-templates/cve-less/plugins/wc-peach-payments-gateway-bf0e4365c0a80682381fd05937032a09.yaml new file mode 100644 index 0000000000..129050bfdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-peach-payments-gateway-bf0e4365c0a80682381fd05937032a09.yaml @@ -0,0 +1,58 @@ +id: wc-peach-payments-gateway-bf0e4365c0a80682381fd05937032a09 + +info: + name: > + Peach Payments Gateway <= 3.1.9 - Missing Authorization via peach_core_version_rollback() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3152208e-e4f7-4f48-b6a1-05a656d9c826?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-peach-payments-gateway/" + google-query: inurl:"/wp-content/plugins/wc-peach-payments-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-peach-payments-gateway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-peach-payments-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-peach-payments-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-place-order-without-payment-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wc-place-order-without-payment-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0ef86cc5c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-place-order-without-payment-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wc-place-order-without-payment-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-place-order-without-payment/" + google-query: inurl:"/wp-content/plugins/wc-place-order-without-payment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-place-order-without-payment,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-place-order-without-payment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-place-order-without-payment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-product-author-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wc-product-author-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8d3d67293b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-product-author-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wc-product-author-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-product-author/" + google-query: inurl:"/wp-content/plugins/wc-product-author/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-product-author,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-product-author/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-product-author" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-product-customer-list-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wc-product-customer-list-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..df753d7b5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-product-customer-list-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wc-product-customer-list-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-product-customer-list/" + google-query: inurl:"/wp-content/plugins/wc-product-customer-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-product-customer-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-product-customer-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-product-customer-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-product-table-lite-a4d40046e4eca99f143d32a308572489.yaml b/nuclei-templates/cve-less/plugins/wc-product-table-lite-a4d40046e4eca99f143d32a308572489.yaml new file mode 100644 index 0000000000..0f31484bb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-product-table-lite-a4d40046e4eca99f143d32a308572489.yaml @@ -0,0 +1,58 @@ +id: wc-product-table-lite-a4d40046e4eca99f143d32a308572489 + +info: + name: > + WooCommerce Product Table Lite <= 2.6.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4528f805-bbf3-4a0f-a06f-879c6e607bfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-product-table-lite/" + google-query: inurl:"/wp-content/plugins/wc-product-table-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-product-table-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-product-table-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-product-table-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-product-table-lite-ddad3bba44bb780c0ca045c9e513315e.yaml b/nuclei-templates/cve-less/plugins/wc-product-table-lite-ddad3bba44bb780c0ca045c9e513315e.yaml new file mode 100644 index 0000000000..e878f87909 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-product-table-lite-ddad3bba44bb780c0ca045c9e513315e.yaml @@ -0,0 +1,58 @@ +id: wc-product-table-lite-ddad3bba44bb780c0ca045c9e513315e + +info: + name: > + WooCommerce Product Table Lite <= 2.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36ae359b-7694-4e8b-9fe6-5e9e40345305?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-product-table-lite/" + google-query: inurl:"/wp-content/plugins/wc-product-table-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-product-table-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-product-table-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-product-table-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-quantity-plus-minus-button-43fc63136cea65380642c1d5a8771c07.yaml b/nuclei-templates/cve-less/plugins/wc-quantity-plus-minus-button-43fc63136cea65380642c1d5a8771c07.yaml new file mode 100644 index 0000000000..91246a918a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-quantity-plus-minus-button-43fc63136cea65380642c1d5a8771c07.yaml @@ -0,0 +1,58 @@ +id: wc-quantity-plus-minus-button-43fc63136cea65380642c1d5a8771c07 + +info: + name: > + Quantity Plus Minus Button for WooCommerce by CodeAstrology <= 1.1.9 - Cross-Site Request Forgery via wqpmb_form_submit + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/658ff7da-6496-4cca-8b1c-76b794c20aad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-quantity-plus-minus-button/" + google-query: inurl:"/wp-content/plugins/wc-quantity-plus-minus-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-quantity-plus-minus-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-quantity-plus-minus-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-quantity-plus-minus-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-remove-tabs-and-fields-3bc9c18ecec44e99a8a9ea6dc1c2be4b.yaml b/nuclei-templates/cve-less/plugins/wc-remove-tabs-and-fields-3bc9c18ecec44e99a8a9ea6dc1c2be4b.yaml new file mode 100644 index 0000000000..891628bd27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-remove-tabs-and-fields-3bc9c18ecec44e99a8a9ea6dc1c2be4b.yaml @@ -0,0 +1,58 @@ +id: wc-remove-tabs-and-fields-3bc9c18ecec44e99a8a9ea6dc1c2be4b + +info: + name: > + Remove tabs and fields from WooCommerce <= 1.68 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb828160-b537-4435-9d85-47e0d70a6704?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-remove-tabs-and-fields/" + google-query: inurl:"/wp-content/plugins/wc-remove-tabs-and-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-remove-tabs-and-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-remove-tabs-and-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-remove-tabs-and-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-return-warrranty-50a3dde160b2a73e3a26cf26d3c385b6.yaml b/nuclei-templates/cve-less/plugins/wc-return-warrranty-50a3dde160b2a73e3a26cf26d3c385b6.yaml new file mode 100644 index 0000000000..00fa2adf3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-return-warrranty-50a3dde160b2a73e3a26cf26d3c385b6.yaml @@ -0,0 +1,58 @@ +id: wc-return-warrranty-50a3dde160b2a73e3a26cf26d3c385b6 + +info: + name: > + Return and Warranty Management System for WooCommerce <= 1.2.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa1e6527-d874-4003-b36b-5769c2950864?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-return-warrranty/" + google-query: inurl:"/wp-content/plugins/wc-return-warrranty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-return-warrranty,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-return-warrranty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-return-warrranty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-sales-notification-9a08cd964e2072002295aa2ccec0ac6e.yaml b/nuclei-templates/cve-less/plugins/wc-sales-notification-9a08cd964e2072002295aa2ccec0ac6e.yaml new file mode 100644 index 0000000000..627d30201e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-sales-notification-9a08cd964e2072002295aa2ccec0ac6e.yaml @@ -0,0 +1,58 @@ +id: wc-sales-notification-9a08cd964e2072002295aa2ccec0ac6e + +info: + name: > + WC Sales Notification <= 1.2.2 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43fc71bb-87ba-4cf9-ae4d-1cba7bd84806?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-sales-notification/" + google-query: inurl:"/wp-content/plugins/wc-sales-notification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-sales-notification,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-sales-notification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-sales-notification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-serial-numbers-a6e3e3fb130ca53fe59b00bde1e4c562.yaml b/nuclei-templates/cve-less/plugins/wc-serial-numbers-a6e3e3fb130ca53fe59b00bde1e4c562.yaml new file mode 100644 index 0000000000..cc949ce3d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-serial-numbers-a6e3e3fb130ca53fe59b00bde1e4c562.yaml @@ -0,0 +1,58 @@ +id: wc-serial-numbers-a6e3e3fb130ca53fe59b00bde1e4c562 + +info: + name: > + Serial Numbers for WooCommerce – License Manager <= 1.6.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8671b549-2cce-4f38-ad2d-a9472f7e8e7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-serial-numbers/" + google-query: inurl:"/wp-content/plugins/wc-serial-numbers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-serial-numbers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-serial-numbers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-serial-numbers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-shortcodes-603a30eceae4e23d58fec3225b0d2f29.yaml b/nuclei-templates/cve-less/plugins/wc-shortcodes-603a30eceae4e23d58fec3225b0d2f29.yaml new file mode 100644 index 0000000000..21302aa324 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-shortcodes-603a30eceae4e23d58fec3225b0d2f29.yaml @@ -0,0 +1,58 @@ +id: wc-shortcodes-603a30eceae4e23d58fec3225b0d2f29 + +info: + name: > + Galleries by Angie Makes <= 1.67 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bb7920b-2999-4bd3-bfef-3b9971f845e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-shortcodes/" + google-query: inurl:"/wp-content/plugins/wc-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.67') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-shortcodes-8911dada79ef696f6a6182ef72e3da28.yaml b/nuclei-templates/cve-less/plugins/wc-shortcodes-8911dada79ef696f6a6182ef72e3da28.yaml new file mode 100644 index 0000000000..37a791d51c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-shortcodes-8911dada79ef696f6a6182ef72e3da28.yaml @@ -0,0 +1,58 @@ +id: wc-shortcodes-8911dada79ef696f6a6182ef72e3da28 + +info: + name: > + Shortcodes by Angie Makes < 2.07 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9652575b-389c-42e3-800a-0f133e0c224b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-shortcodes/" + google-query: inurl:"/wp-content/plugins/wc-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-shortcodes-d28bd5fd4f3450ea3f311605e6d65b1d.yaml b/nuclei-templates/cve-less/plugins/wc-shortcodes-d28bd5fd4f3450ea3f311605e6d65b1d.yaml new file mode 100644 index 0000000000..2d3568de06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-shortcodes-d28bd5fd4f3450ea3f311605e6d65b1d.yaml @@ -0,0 +1,58 @@ +id: wc-shortcodes-d28bd5fd4f3450ea3f311605e6d65b1d + +info: + name: > + Shortcodes by Angie Makes <= 3.46 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e20feb23-f78e-42e7-8922-e7cf37dbdcb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-shortcodes/" + google-query: inurl:"/wp-content/plugins/wc-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-shortcodes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-support-system-1b283946c80a7878d62493f2e843e97b.yaml b/nuclei-templates/cve-less/plugins/wc-support-system-1b283946c80a7878d62493f2e843e97b.yaml new file mode 100644 index 0000000000..a7f91a3ce5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-support-system-1b283946c80a7878d62493f2e843e97b.yaml @@ -0,0 +1,58 @@ +id: wc-support-system-1b283946c80a7878d62493f2e843e97b + +info: + name: > + Woocommerce Support System <= 1.2.1 - Authenticated (Administrator+) SQL Injection via 'orderby' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efab7ec7-7143-4556-8d68-4a7e34f46e9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-support-system/" + google-query: inurl:"/wp-content/plugins/wc-support-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-support-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-support-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-support-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-support-system-a215ad133aa4b98aa9f0101d4d17e0cc.yaml b/nuclei-templates/cve-less/plugins/wc-support-system-a215ad133aa4b98aa9f0101d4d17e0cc.yaml new file mode 100644 index 0000000000..1ea82fe3f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-support-system-a215ad133aa4b98aa9f0101d4d17e0cc.yaml @@ -0,0 +1,58 @@ +id: wc-support-system-a215ad133aa4b98aa9f0101d4d17e0cc + +info: + name: > + Woocommerce Support System <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8004a306-4c8f-40e9-accc-a12d65b5f2f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-support-system/" + google-query: inurl:"/wp-content/plugins/wc-support-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-support-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-support-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-support-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-thanks-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wc-thanks-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..eb045cea3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-thanks-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wc-thanks-redirect-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-thanks-redirect/" + google-query: inurl:"/wp-content/plugins/wc-thanks-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-thanks-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-thanks-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-thanks-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-vendors-07b010f0b7d81d013a7b9731f936031d.yaml b/nuclei-templates/cve-less/plugins/wc-vendors-07b010f0b7d81d013a7b9731f936031d.yaml new file mode 100644 index 0000000000..13c145da4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-vendors-07b010f0b7d81d013a7b9731f936031d.yaml @@ -0,0 +1,58 @@ +id: wc-vendors-07b010f0b7d81d013a7b9731f936031d + +info: + name: > + WC Vendors Marketplace <= 2.4.7 - Authenticated (Shop manager+) SQL Injection via search dates + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64f879af-aa8f-4edf-8369-ca032603d529?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-vendors/" + google-query: inurl:"/wp-content/plugins/wc-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-vendors,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-vendors-e8bc31ae76ca92a9ee7834937815ba80.yaml b/nuclei-templates/cve-less/plugins/wc-vendors-e8bc31ae76ca92a9ee7834937815ba80.yaml new file mode 100644 index 0000000000..2b13b6d96b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-vendors-e8bc31ae76ca92a9ee7834937815ba80.yaml @@ -0,0 +1,58 @@ +id: wc-vendors-e8bc31ae76ca92a9ee7834937815ba80 + +info: + name: > + WC Vendors Marketplace <= 2.4.4 - Authenticated (Contributor+) Stored Cross-Sites Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de805955-b7c7-455b-bc1a-69b8a14ba79d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-vendors/" + google-query: inurl:"/wp-content/plugins/wc-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-vendors,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-venipak-shipping-1f67e045b6e7fe7d437958d4ed1bb1b5.yaml b/nuclei-templates/cve-less/plugins/wc-venipak-shipping-1f67e045b6e7fe7d437958d4ed1bb1b5.yaml new file mode 100644 index 0000000000..c3ba6e3307 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-venipak-shipping-1f67e045b6e7fe7d437958d4ed1bb1b5.yaml @@ -0,0 +1,58 @@ +id: wc-venipak-shipping-1f67e045b6e7fe7d437958d4ed1bb1b5 + +info: + name: > + Shipping with Venipak for WooCommerce <= 1.19.5 - Reflected Cross-Site Scripting via 'venipak_labels_link' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58e8befa-bc8d-4731-be2c-ccf613b39fdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-venipak-shipping/" + google-query: inurl:"/wp-content/plugins/wc-venipak-shipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-venipak-shipping,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-venipak-shipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-venipak-shipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.19.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-zelle-7957be3fab19e29df56fc4f0499a1aaf.yaml b/nuclei-templates/cve-less/plugins/wc-zelle-7957be3fab19e29df56fc4f0499a1aaf.yaml new file mode 100644 index 0000000000..1cf33bdc9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-zelle-7957be3fab19e29df56fc4f0499a1aaf.yaml @@ -0,0 +1,58 @@ +id: wc-zelle-7957be3fab19e29df56fc4f0499a1aaf + +info: + name: > + Checkout with Zelle on Woocommerce <= 3.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ad5544a-6694-41e4-940f-fa96daf4b41d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-zelle/" + google-query: inurl:"/wp-content/plugins/wc-zelle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-zelle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-zelle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-zelle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc-zelle-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wc-zelle-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..40bf16a986 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc-zelle-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wc-zelle-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc-zelle/" + google-query: inurl:"/wp-content/plugins/wc-zelle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc-zelle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc-zelle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc-zelle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc4bp-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wc4bp-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..55ad376814 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc4bp-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wc4bp-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc4bp/" + google-query: inurl:"/wp-content/plugins/wc4bp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc4bp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc4bp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc4bp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc4bp-bf0f79649962d2d1514ad595e16e29b6.yaml b/nuclei-templates/cve-less/plugins/wc4bp-bf0f79649962d2d1514ad595e16e29b6.yaml new file mode 100644 index 0000000000..2c2dc3202f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc4bp-bf0f79649962d2d1514ad595e16e29b6.yaml @@ -0,0 +1,58 @@ +id: wc4bp-bf0f79649962d2d1514ad595e16e29b6 + +info: + name: > + BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages <= 3.4.20 - Authenticated (Subscriber+) PHP Object Injection in get_simple_request + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78da9e79-399e-43e3-ac27-a162861cae71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc4bp/" + google-query: inurl:"/wp-content/plugins/wc4bp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc4bp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc4bp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc4bp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wc4bp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wc4bp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..6dcafee9d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wc4bp-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wc4bp-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wc4bp/" + google-query: inurl:"/wp-content/plugins/wc4bp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wc4bp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wc4bp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wc4bp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wcc-seo-keyword-research-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wcc-seo-keyword-research-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..2a535dc3c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wcc-seo-keyword-research-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wcc-seo-keyword-research-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wcc-seo-keyword-research/" + google-query: inurl:"/wp-content/plugins/wcc-seo-keyword-research/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wcc-seo-keyword-research,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wcc-seo-keyword-research/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wcc-seo-keyword-research" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wcfm-marketplace-rest-api-054a823a88fd659044cb1d5f3fc034a5.yaml b/nuclei-templates/cve-less/plugins/wcfm-marketplace-rest-api-054a823a88fd659044cb1d5f3fc034a5.yaml new file mode 100644 index 0000000000..f705844f47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wcfm-marketplace-rest-api-054a823a88fd659044cb1d5f3fc034a5.yaml @@ -0,0 +1,58 @@ +id: wcfm-marketplace-rest-api-054a823a88fd659044cb1d5f3fc034a5 + +info: + name: > + WooCommerce Multivendor Marketplace – REST API <= 1.5.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Order/Order Note Disclosure, Order Note Addition via REST API + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0520601-7e5c-412d-a8da-df1bf8ce28df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wcfm-marketplace-rest-api/" + google-query: inurl:"/wp-content/plugins/wcfm-marketplace-rest-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wcfm-marketplace-rest-api,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wcfm-marketplace-rest-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wcfm-marketplace-rest-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wck-custom-fields-and-custom-post-types-creator-1e89a13fba73865588209c9be692cd21.yaml b/nuclei-templates/cve-less/plugins/wck-custom-fields-and-custom-post-types-creator-1e89a13fba73865588209c9be692cd21.yaml new file mode 100644 index 0000000000..0cb143a2e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wck-custom-fields-and-custom-post-types-creator-1e89a13fba73865588209c9be692cd21.yaml @@ -0,0 +1,58 @@ +id: wck-custom-fields-and-custom-post-types-creator-1e89a13fba73865588209c9be692cd21 + +info: + name: > + Custom Post Types and Custom Fields creator <= 2.3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/796e35bc-db5f-45e3-8f79-73b30add877f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wck-custom-fields-and-custom-post-types-creator/" + google-query: inurl:"/wp-content/plugins/wck-custom-fields-and-custom-post-types-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wck-custom-fields-and-custom-post-types-creator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wck-custom-fields-and-custom-post-types-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wck-custom-fields-and-custom-post-types-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wcp-contact-form-313015abf6a4029981fb303ae0c8c403.yaml b/nuclei-templates/cve-less/plugins/wcp-contact-form-313015abf6a4029981fb303ae0c8c403.yaml new file mode 100644 index 0000000000..04cf3589e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wcp-contact-form-313015abf6a4029981fb303ae0c8c403.yaml @@ -0,0 +1,58 @@ +id: wcp-contact-form-313015abf6a4029981fb303ae0c8c403 + +info: + name: > + WCP Contact Form <= 3.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9844b47-427a-4f2f-9f42-00adcbcf133c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wcp-contact-form/" + google-query: inurl:"/wp-content/plugins/wcp-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wcp-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wcp-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wcp-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wcp-contact-form-d5eec60f27d6879accd492bf02988af0.yaml b/nuclei-templates/cve-less/plugins/wcp-contact-form-d5eec60f27d6879accd492bf02988af0.yaml new file mode 100644 index 0000000000..d35fe790a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wcp-contact-form-d5eec60f27d6879accd492bf02988af0.yaml @@ -0,0 +1,58 @@ +id: wcp-contact-form-d5eec60f27d6879accd492bf02988af0 + +info: + name: > + WCP Contact Form <= 3.1.0 - Missing Authorization via downloadCsv + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17a4bd5c-0cd3-46e4-b6ee-edf87f0e92ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wcp-contact-form/" + google-query: inurl:"/wp-content/plugins/wcp-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wcp-contact-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wcp-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wcp-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wcp-contact-form-dcababdc75851dd1c392ab090e66bbb5.yaml b/nuclei-templates/cve-less/plugins/wcp-contact-form-dcababdc75851dd1c392ab090e66bbb5.yaml new file mode 100644 index 0000000000..6760b86d58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wcp-contact-form-dcababdc75851dd1c392ab090e66bbb5.yaml @@ -0,0 +1,58 @@ +id: wcp-contact-form-dcababdc75851dd1c392ab090e66bbb5 + +info: + name: > + WCP Contact Form <= 3.1.0 - Reflected Cross-Site Scripting via tab parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33fd4542-0a46-4779-be02-d713dcbc8f96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wcp-contact-form/" + google-query: inurl:"/wp-content/plugins/wcp-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wcp-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wcp-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wcp-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wcp-openweather-16ac809b05b30c0b6fd94eeae5705ae7.yaml b/nuclei-templates/cve-less/plugins/wcp-openweather-16ac809b05b30c0b6fd94eeae5705ae7.yaml new file mode 100644 index 0000000000..12dfcf6e23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wcp-openweather-16ac809b05b30c0b6fd94eeae5705ae7.yaml @@ -0,0 +1,58 @@ +id: wcp-openweather-16ac809b05b30c0b6fd94eeae5705ae7 + +info: + name: > + WCP OpenWeather <= 2.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5b573e2-373f-41bc-8d9a-ea42e908ac4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wcp-openweather/" + google-query: inurl:"/wp-content/plugins/wcp-openweather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wcp-openweather,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wcp-openweather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wcp-openweather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wcp-openweather-f67cd9a7d9946e522cc9799584d6f928.yaml b/nuclei-templates/cve-less/plugins/wcp-openweather-f67cd9a7d9946e522cc9799584d6f928.yaml new file mode 100644 index 0000000000..8be9d1d265 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wcp-openweather-f67cd9a7d9946e522cc9799584d6f928.yaml @@ -0,0 +1,58 @@ +id: wcp-openweather-f67cd9a7d9946e522cc9799584d6f928 + +info: + name: > + WCP OpenWeather <= 2.5.0 - Reflected Cross-Site Scripting via 'tab' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8cc5d1-8ea2-4590-90c4-6541f336b057?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wcp-openweather/" + google-query: inurl:"/wp-content/plugins/wcp-openweather/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wcp-openweather,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wcp-openweather/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wcp-openweather" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-facebook-feed-416f9daf88fd1151a6d830797c7cec0b.yaml b/nuclei-templates/cve-less/plugins/wd-facebook-feed-416f9daf88fd1151a6d830797c7cec0b.yaml new file mode 100644 index 0000000000..2bbcee5874 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-facebook-feed-416f9daf88fd1151a6d830797c7cec0b.yaml @@ -0,0 +1,58 @@ +id: wd-facebook-feed-416f9daf88fd1151a6d830797c7cec0b + +info: + name: > + 10Web Social Post Feed <= 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db959eaf-300c-4ecd-ac15-216a17ec5a50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-facebook-feed/" + google-query: inurl:"/wp-content/plugins/wd-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-facebook-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-facebook-feed-692a59847419e00f01e0e2c7d8867aaa.yaml b/nuclei-templates/cve-less/plugins/wd-facebook-feed-692a59847419e00f01e0e2c7d8867aaa.yaml new file mode 100644 index 0000000000..63bf90bdc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-facebook-feed-692a59847419e00f01e0e2c7d8867aaa.yaml @@ -0,0 +1,58 @@ +id: wd-facebook-feed-692a59847419e00f01e0e2c7d8867aaa + +info: + name: > + 10WebSocial <= 1.1.26 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38d5d951-588f-4808-b691-5105021eb1e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-facebook-feed/" + google-query: inurl:"/wp-content/plugins/wd-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-facebook-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-analytics-68962a84ced90a9ac882bf37153f6810.yaml b/nuclei-templates/cve-less/plugins/wd-google-analytics-68962a84ced90a9ac882bf37153f6810.yaml new file mode 100644 index 0000000000..7a3177d8ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-analytics-68962a84ced90a9ac882bf37153f6810.yaml @@ -0,0 +1,58 @@ +id: wd-google-analytics-68962a84ced90a9ac882bf37153f6810 + +info: + name: > + 10WebAnalytics <= 1.2.12 - Missing Authorization via gawd_wd_bp_install_notice_status + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dd2a4cb-dd74-4b00-82f5-3bf1452e71a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-analytics/" + google-query: inurl:"/wp-content/plugins/wd-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-analytics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-analytics-bec851a00ad3a57c79ae718c7939bfce.yaml b/nuclei-templates/cve-less/plugins/wd-google-analytics-bec851a00ad3a57c79ae718c7939bfce.yaml new file mode 100644 index 0000000000..bcb3c97ab0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-analytics-bec851a00ad3a57c79ae718c7939bfce.yaml @@ -0,0 +1,58 @@ +id: wd-google-analytics-bec851a00ad3a57c79ae718c7939bfce + +info: + name: > + 10WebAnalytics <= 1.2.8 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db29f17d-1d2b-4f78-a78d-1579e2a5d975?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-analytics/" + google-query: inurl:"/wp-content/plugins/wd-google-analytics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-analytics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-analytics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-analytics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-maps-2dba3f9d9e05a82800f2a05f03266828.yaml b/nuclei-templates/cve-less/plugins/wd-google-maps-2dba3f9d9e05a82800f2a05f03266828.yaml new file mode 100644 index 0000000000..60724ba51b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-maps-2dba3f9d9e05a82800f2a05f03266828.yaml @@ -0,0 +1,58 @@ +id: wd-google-maps-2dba3f9d9e05a82800f2a05f03266828 + +info: + name: > + 10Web Map Builder for Google Maps <= 1.0.74 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e20afee-9336-458e-ab5c-b320c6887b83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-maps/" + google-query: inurl:"/wp-content/plugins/wd-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.74') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-maps-49fe0ec6f2b7aab6fa4c17842c7d352a.yaml b/nuclei-templates/cve-less/plugins/wd-google-maps-49fe0ec6f2b7aab6fa4c17842c7d352a.yaml new file mode 100644 index 0000000000..021baab9ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-maps-49fe0ec6f2b7aab6fa4c17842c7d352a.yaml @@ -0,0 +1,58 @@ +id: wd-google-maps-49fe0ec6f2b7aab6fa4c17842c7d352a + +info: + name: > + 10Web Map Builder for Google Maps <= 1.0.72 - Unauthenticated SQL Injection via Multiple Parameters + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64e806df-4919-4a58-8f21-075f09668174?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-maps/" + google-query: inurl:"/wp-content/plugins/wd-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-maps,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-maps-69de6d03812ceef96ce6fe7bde70be19.yaml b/nuclei-templates/cve-less/plugins/wd-google-maps-69de6d03812ceef96ce6fe7bde70be19.yaml new file mode 100644 index 0000000000..bb6fa90a58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-maps-69de6d03812ceef96ce6fe7bde70be19.yaml @@ -0,0 +1,58 @@ +id: wd-google-maps-69de6d03812ceef96ce6fe7bde70be19 + +info: + name: > + 10Web Map Builder for Google Maps <= 1.0.72 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0a261e9-8b96-4065-8fd3-7be53cc3c9a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-maps/" + google-query: inurl:"/wp-content/plugins/wd-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-maps,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-maps-7e3117bf0f4e61f1c6678c5ed0029bc5.yaml b/nuclei-templates/cve-less/plugins/wd-google-maps-7e3117bf0f4e61f1c6678c5ed0029bc5.yaml new file mode 100644 index 0000000000..8595e09a91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-maps-7e3117bf0f4e61f1c6678c5ed0029bc5.yaml @@ -0,0 +1,58 @@ +id: wd-google-maps-7e3117bf0f4e61f1c6678c5ed0029bc5 + +info: + name: > + 10WebMapBuilder <= 1.0.71 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ace1a3-81e2-4887-be27-606b49f77357?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-maps/" + google-query: inurl:"/wp-content/plugins/wd-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-maps-913aecbb55aeada0646124d3b1f7ac2e.yaml b/nuclei-templates/cve-less/plugins/wd-google-maps-913aecbb55aeada0646124d3b1f7ac2e.yaml new file mode 100644 index 0000000000..eb71cbc8d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-maps-913aecbb55aeada0646124d3b1f7ac2e.yaml @@ -0,0 +1,58 @@ +id: wd-google-maps-913aecbb55aeada0646124d3b1f7ac2e + +info: + name: > + 10Web Map Builder for Google Maps <= 1.0.69 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9fc118e-f402-4042-85b0-2175cb0e3048?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-maps/" + google-query: inurl:"/wp-content/plugins/wd-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-maps-918f1e8f5b006a783c5bc9147cfd6f61.yaml b/nuclei-templates/cve-less/plugins/wd-google-maps-918f1e8f5b006a783c5bc9147cfd6f61.yaml new file mode 100644 index 0000000000..0826bf12b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-maps-918f1e8f5b006a783c5bc9147cfd6f61.yaml @@ -0,0 +1,58 @@ +id: wd-google-maps-918f1e8f5b006a783c5bc9147cfd6f61 + +info: + name: > + 10WebMapBuilder <= 1.0.63 - Unauthenticated Stored Cross-Site Scripting via Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c1c24cc-9388-4d91-8dc6-c67d3420cc94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-maps/" + google-query: inurl:"/wp-content/plugins/wd-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-google-maps-beb09afd16c7dbf0c14aa5a401d0f673.yaml b/nuclei-templates/cve-less/plugins/wd-google-maps-beb09afd16c7dbf0c14aa5a401d0f673.yaml new file mode 100644 index 0000000000..78ae21b737 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-google-maps-beb09afd16c7dbf0c14aa5a401d0f673.yaml @@ -0,0 +1,58 @@ +id: wd-google-maps-beb09afd16c7dbf0c14aa5a401d0f673 + +info: + name: > + 10Web Map Builder for Google Maps <= 1.0.73 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63666c16-9f68-4a27-b163-4c25f0a7589e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-google-maps/" + google-query: inurl:"/wp-content/plugins/wd-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-google-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.74') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-instagram-feed-12d0498f23c173f6e13e28a5406baf6c.yaml b/nuclei-templates/cve-less/plugins/wd-instagram-feed-12d0498f23c173f6e13e28a5406baf6c.yaml new file mode 100644 index 0000000000..a049a67742 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-instagram-feed-12d0498f23c173f6e13e28a5406baf6c.yaml @@ -0,0 +1,58 @@ +id: wd-instagram-feed-12d0498f23c173f6e13e28a5406baf6c + +info: + name: > + WD Instagram Feed <= 1.3.0 - Cross-site scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8daa685-d366-4b08-9f30-b14700fdee03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-instagram-feed/" + google-query: inurl:"/wp-content/plugins/wd-instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-instagram-feed,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wd-instagram-feed-6c265d4dd5a13df1986f278910f69c7d.yaml b/nuclei-templates/cve-less/plugins/wd-instagram-feed-6c265d4dd5a13df1986f278910f69c7d.yaml new file mode 100644 index 0000000000..43d520395d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wd-instagram-feed-6c265d4dd5a13df1986f278910f69c7d.yaml @@ -0,0 +1,58 @@ +id: wd-instagram-feed-6c265d4dd5a13df1986f278910f69c7d + +info: + name: > + 10Web Social Photo Feed <= 1.4.28 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5aa0006-435d-4874-8d71-659d5d72e702?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wd-instagram-feed/" + google-query: inurl:"/wp-content/plugins/wd-instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wd-instagram-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wd-instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wd-instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wds-multisite-aggregate-ab7b45d23a9e44cbc1f94f5b43ecd585.yaml b/nuclei-templates/cve-less/plugins/wds-multisite-aggregate-ab7b45d23a9e44cbc1f94f5b43ecd585.yaml new file mode 100644 index 0000000000..795e05fdbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wds-multisite-aggregate-ab7b45d23a9e44cbc1f94f5b43ecd585.yaml @@ -0,0 +1,58 @@ +id: wds-multisite-aggregate-ab7b45d23a9e44cbc1f94f5b43ecd585 + +info: + name: > + WDS Multisite Aggregate <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dad12b10-2e04-4bc2-b5ad-c00cb287e456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wds-multisite-aggregate/" + google-query: inurl:"/wp-content/plugins/wds-multisite-aggregate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wds-multisite-aggregate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wds-multisite-aggregate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wds-multisite-aggregate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weather-atlas-f48e8a5fbf1e696f1cc387a7e678c77c.yaml b/nuclei-templates/cve-less/plugins/weather-atlas-f48e8a5fbf1e696f1cc387a7e678c77c.yaml new file mode 100644 index 0000000000..c7aa34ea19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weather-atlas-f48e8a5fbf1e696f1cc387a7e678c77c.yaml @@ -0,0 +1,58 @@ +id: weather-atlas-f48e8a5fbf1e696f1cc387a7e678c77c + +info: + name: > + Weather Atlas Widget <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2324caa-f804-4f76-9d08-8951fbee4669?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weather-atlas/" + google-query: inurl:"/wp-content/plugins/weather-atlas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weather-atlas,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weather-atlas/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weather-atlas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weather-effect-f85537b61e94963bbc9d5c86e5b9998c.yaml b/nuclei-templates/cve-less/plugins/weather-effect-f85537b61e94963bbc9d5c86e5b9998c.yaml new file mode 100644 index 0000000000..333a6d47de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weather-effect-f85537b61e94963bbc9d5c86e5b9998c.yaml @@ -0,0 +1,58 @@ +id: weather-effect-f85537b61e94963bbc9d5c86e5b9998c + +info: + name: > + Weather Effect – Christmas Santa Snow Falling <= 1.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/041c4d44-28ee-49a4-8407-367ad2960cf6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weather-effect/" + google-query: inurl:"/wp-content/plugins/weather-effect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weather-effect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weather-effect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weather-effect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weather-effect-fa8d9c6fc1b3f748c9c03e858b8946b9.yaml b/nuclei-templates/cve-less/plugins/weather-effect-fa8d9c6fc1b3f748c9c03e858b8946b9.yaml new file mode 100644 index 0000000000..3a4db09ac0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weather-effect-fa8d9c6fc1b3f748c9c03e858b8946b9.yaml @@ -0,0 +1,58 @@ +id: weather-effect-fa8d9c6fc1b3f748c9c03e858b8946b9 + +info: + name: > + Weather Effect – Christmas Santa Snow Falling <= 1.3.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3ace116-69e1-44b1-a63f-693153ab4679?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weather-effect/" + google-query: inurl:"/wp-content/plugins/weather-effect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weather-effect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weather-effect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weather-effect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weaverx-theme-support-5614f511e973e614fd375402d8486642.yaml b/nuclei-templates/cve-less/plugins/weaverx-theme-support-5614f511e973e614fd375402d8486642.yaml new file mode 100644 index 0000000000..8036dff397 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weaverx-theme-support-5614f511e973e614fd375402d8486642.yaml @@ -0,0 +1,58 @@ +id: weaverx-theme-support-5614f511e973e614fd375402d8486642 + +info: + name: > + Weaver Xtreme Theme Support <= 6.3.0 - Authenticated (Administrator+) PHP Object Injection via Imported File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/572689c6-d7d6-46c3-9e96-b9185337e8ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weaverx-theme-support/" + google-query: inurl:"/wp-content/plugins/weaverx-theme-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weaverx-theme-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weaverx-theme-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weaverx-theme-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weaverx-theme-support-d8d38e7154b358bc9b031a2ad78ce806.yaml b/nuclei-templates/cve-less/plugins/weaverx-theme-support-d8d38e7154b358bc9b031a2ad78ce806.yaml new file mode 100644 index 0000000000..2934d6b76d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weaverx-theme-support-d8d38e7154b358bc9b031a2ad78ce806.yaml @@ -0,0 +1,58 @@ +id: weaverx-theme-support-d8d38e7154b358bc9b031a2ad78ce806 + +info: + name: > + Weaver Xtreme Theme Support <= 6.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7431ee0f-f485-48a4-9cdd-8fb2ac43e216?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weaverx-theme-support/" + google-query: inurl:"/wp-content/plugins/weaverx-theme-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weaverx-theme-support,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weaverx-theme-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weaverx-theme-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-application-firewall-504399029097a5e86b5ba9c9da19637b.yaml b/nuclei-templates/cve-less/plugins/web-application-firewall-504399029097a5e86b5ba9c9da19637b.yaml new file mode 100644 index 0000000000..aa7290acd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-application-firewall-504399029097a5e86b5ba9c9da19637b.yaml @@ -0,0 +1,58 @@ +id: web-application-firewall-504399029097a5e86b5ba9c9da19637b + +info: + name: > + Malware Scanner <= 4.7.2 and Web Application Firewall <= 2.1.1 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6347f588-a3fd-4909-ad57-9d78787b5728?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-application-firewall/" + google-query: inurl:"/wp-content/plugins/web-application-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-application-firewall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-application-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-application-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-directory-free-263813b94544d66ca6de0f83221d4012.yaml b/nuclei-templates/cve-less/plugins/web-directory-free-263813b94544d66ca6de0f83221d4012.yaml new file mode 100644 index 0000000000..ced3834a31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-directory-free-263813b94544d66ca6de0f83221d4012.yaml @@ -0,0 +1,58 @@ +id: web-directory-free-263813b94544d66ca6de0f83221d4012 + +info: + name: > + Web Directory Free <= 1.6.8 - Authenticated (Contributor+) SQL Injection via post_id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d831fa81-4714-4757-b75d-0a8f5edda910?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-directory-free/" + google-query: inurl:"/wp-content/plugins/web-directory-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-directory-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-directory-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-directory-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-disrupt-funnelmentals-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/web-disrupt-funnelmentals-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..967f620e37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-disrupt-funnelmentals-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: web-disrupt-funnelmentals-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-disrupt-funnelmentals/" + google-query: inurl:"/wp-content/plugins/web-disrupt-funnelmentals/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-disrupt-funnelmentals,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-disrupt-funnelmentals/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-disrupt-funnelmentals" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-disrupt-funnelmentals-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/web-disrupt-funnelmentals-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..d19c9c0703 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-disrupt-funnelmentals-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: web-disrupt-funnelmentals-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-disrupt-funnelmentals/" + google-query: inurl:"/wp-content/plugins/web-disrupt-funnelmentals/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-disrupt-funnelmentals,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-disrupt-funnelmentals/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-disrupt-funnelmentals" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-en-mantenimiento-0c1ff6bda54a1c54ef1a2295ae5e33e6.yaml b/nuclei-templates/cve-less/plugins/web-en-mantenimiento-0c1ff6bda54a1c54ef1a2295ae5e33e6.yaml new file mode 100644 index 0000000000..8227f92d02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-en-mantenimiento-0c1ff6bda54a1c54ef1a2295ae5e33e6.yaml @@ -0,0 +1,58 @@ +id: web-en-mantenimiento-0c1ff6bda54a1c54ef1a2295ae5e33e6 + +info: + name: > + Web en Mantenimiento <= 1.0.6 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/321bfc32-a08d-46ea-98c8-c7be10905307?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-en-mantenimiento/" + google-query: inurl:"/wp-content/plugins/web-en-mantenimiento/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-en-mantenimiento,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-en-mantenimiento/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-en-mantenimiento" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-instant-messenger-dcf62ae8561beba15cd72e7dcb3bf604.yaml b/nuclei-templates/cve-less/plugins/web-instant-messenger-dcf62ae8561beba15cd72e7dcb3bf604.yaml new file mode 100644 index 0000000000..1d2ab84ab9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-instant-messenger-dcf62ae8561beba15cd72e7dcb3bf604.yaml @@ -0,0 +1,58 @@ +id: web-instant-messenger-dcf62ae8561beba15cd72e7dcb3bf604 + +info: + name: > + Web Instant Messenger <= 1.1.2 and LocalWeb In One <= 1.6.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f3328c2-290f-410b-a6c8-2825d415f511?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-instant-messenger/" + google-query: inurl:"/wp-content/plugins/web-instant-messenger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-instant-messenger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-instant-messenger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-instant-messenger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-invoice-1da82cb5548de3f68423707825b69043.yaml b/nuclei-templates/cve-less/plugins/web-invoice-1da82cb5548de3f68423707825b69043.yaml new file mode 100644 index 0000000000..5b4c98056a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-invoice-1da82cb5548de3f68423707825b69043.yaml @@ -0,0 +1,58 @@ +id: web-invoice-1da82cb5548de3f68423707825b69043 + +info: + name: > + Web Invoice <= 2.1.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/272515e3-18ae-4e7f-8503-722d7964b3c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-invoice/" + google-query: inurl:"/wp-content/plugins/web-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-invoice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-invoice-4d7353aae0306a1d0c2e5c68f3406ced.yaml b/nuclei-templates/cve-less/plugins/web-invoice-4d7353aae0306a1d0c2e5c68f3406ced.yaml new file mode 100644 index 0000000000..ebc3a4e33e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-invoice-4d7353aae0306a1d0c2e5c68f3406ced.yaml @@ -0,0 +1,58 @@ +id: web-invoice-4d7353aae0306a1d0c2e5c68f3406ced + +info: + name: > + Web Invoice <= 2.1.3 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1add368-81d2-455f-a95a-c13566c58d39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-invoice/" + google-query: inurl:"/wp-content/plugins/web-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-invoice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-stat-6f7706168cb1bf8ff1d56088b3f10d22.yaml b/nuclei-templates/cve-less/plugins/web-stat-6f7706168cb1bf8ff1d56088b3f10d22.yaml new file mode 100644 index 0000000000..84dadbba23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-stat-6f7706168cb1bf8ff1d56088b3f10d22.yaml @@ -0,0 +1,58 @@ +id: web-stat-6f7706168cb1bf8ff1d56088b3f10d22 + +info: + name: > + Web-Stat <= 1.4.0 - API Key Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83e396c3-e843-4337-bf90-894d9d7de2a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-stat/" + google-query: inurl:"/wp-content/plugins/web-stat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-stat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-stat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-stat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-stories-1c085614f4dda72120112eb265cf3956.yaml b/nuclei-templates/cve-less/plugins/web-stories-1c085614f4dda72120112eb265cf3956.yaml new file mode 100644 index 0000000000..e41eb2cdde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-stories-1c085614f4dda72120112eb265cf3956.yaml @@ -0,0 +1,58 @@ +id: web-stories-1c085614f4dda72120112eb265cf3956 + +info: + name: > + Web Stories for WordPress <= 1.31.0 - Insufficient Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f2e02c-baa4-446c-bf1c-96ce099ad02e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-stories/" + google-query: inurl:"/wp-content/plugins/web-stories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-stories,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-stories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-stories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.32.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web-stories-6090167e88ca71d53352f4ae35082be0.yaml b/nuclei-templates/cve-less/plugins/web-stories-6090167e88ca71d53352f4ae35082be0.yaml new file mode 100644 index 0000000000..a106c5a620 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web-stories-6090167e88ca71d53352f4ae35082be0.yaml @@ -0,0 +1,58 @@ +id: web-stories-6090167e88ca71d53352f4ae35082be0 + +info: + name: > + Web Stories <= 1.24.0 - Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7817a840-325a-4709-8374-84bb32d98d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web-stories/" + google-query: inurl:"/wp-content/plugins/web-stories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web-stories,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web-stories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-stories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.24.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web3-authentication-a39c97187fc8c6885698e5dd59bde6ea.yaml b/nuclei-templates/cve-less/plugins/web3-authentication-a39c97187fc8c6885698e5dd59bde6ea.yaml new file mode 100644 index 0000000000..0d6ba3bf46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web3-authentication-a39c97187fc8c6885698e5dd59bde6ea.yaml @@ -0,0 +1,58 @@ +id: web3-authentication-a39c97187fc8c6885698e5dd59bde6ea + +info: + name: > + Web3 – Crypto wallet Login & NFT token gating <= 2.6.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e30b62de-7280-4c29-b882-dfa83e65966b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web3-authentication/" + google-query: inurl:"/wp-content/plugins/web3-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web3-authentication,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web3-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web3-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/web3-authentication-de99acad607297a91554bdcebfb71c6e.yaml b/nuclei-templates/cve-less/plugins/web3-authentication-de99acad607297a91554bdcebfb71c6e.yaml new file mode 100644 index 0000000000..5cdf6365ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/web3-authentication-de99acad607297a91554bdcebfb71c6e.yaml @@ -0,0 +1,58 @@ +id: web3-authentication-de99acad607297a91554bdcebfb71c6e + +info: + name: > + Web3 <= 2.8.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/079d60c1-a15a-4d3e-b295-8c1e024b74ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/web3-authentication/" + google-query: inurl:"/wp-content/plugins/web3-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,web3-authentication,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/web3-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web3-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webapp-builder-f2c489e7cd964714f8d10d151c46e5bf.yaml b/nuclei-templates/cve-less/plugins/webapp-builder-f2c489e7cd964714f8d10d151c46e5bf.yaml new file mode 100644 index 0000000000..0be860443a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webapp-builder-f2c489e7cd964714f8d10d151c46e5bf.yaml @@ -0,0 +1,58 @@ +id: webapp-builder-f2c489e7cd964714f8d10d151c46e5bf + +info: + name: > + Webapp builder 2.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb866476-14c0-4ade-90b0-670418b397fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webapp-builder/" + google-query: inurl:"/wp-content/plugins/webapp-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webapp-builder,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webapp-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webapp-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webappick-pdf-invoice-for-woocommerce-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/webappick-pdf-invoice-for-woocommerce-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..43e6bdfba1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webappick-pdf-invoice-for-woocommerce-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: webappick-pdf-invoice-for-woocommerce-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webappick-pdf-invoice-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/webappick-pdf-invoice-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webappick-pdf-invoice-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webappick-pdf-invoice-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webappick-pdf-invoice-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webappick-pdf-invoice-for-woocommerce-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/webappick-pdf-invoice-for-woocommerce-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..c7d0d62ad7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webappick-pdf-invoice-for-woocommerce-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: webappick-pdf-invoice-for-woocommerce-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webappick-pdf-invoice-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/webappick-pdf-invoice-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webappick-pdf-invoice-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webappick-pdf-invoice-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webappick-pdf-invoice-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webappick-product-feed-for-woocommerce-e28aab5b6692c380e9af77bda5d75a97.yaml b/nuclei-templates/cve-less/plugins/webappick-product-feed-for-woocommerce-e28aab5b6692c380e9af77bda5d75a97.yaml new file mode 100644 index 0000000000..966086a7cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webappick-product-feed-for-woocommerce-e28aab5b6692c380e9af77bda5d75a97.yaml @@ -0,0 +1,58 @@ +id: webappick-product-feed-for-woocommerce-e28aab5b6692c380e9af77bda5d75a97 + +info: + name: > + WooCommerce Product Feed for Google, Facebook, eBay and Many More <= 3.1.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64aa45bd-7bf8-4fe9-85e7-ace226e09f34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webappick-product-feed-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/webappick-product-feed-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webappick-product-feed-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webappick-product-feed-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webappick-product-feed-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webarx-01553cdc4d088a5ffa18c2b6b9ad5640.yaml b/nuclei-templates/cve-less/plugins/webarx-01553cdc4d088a5ffa18c2b6b9ad5640.yaml new file mode 100644 index 0000000000..0347a95722 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webarx-01553cdc4d088a5ffa18c2b6b9ad5640.yaml @@ -0,0 +1,58 @@ +id: webarx-01553cdc4d088a5ffa18c2b6b9ad5640 + +info: + name: > + WebARX <= 1.3.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8534891-2269-4afe-b83f-df512ca36456?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webarx/" + google-query: inurl:"/wp-content/plugins/webarx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webarx,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webarx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webarx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webarx-c1098b6c3ef986df5a9cd4bcd3f22c1d.yaml b/nuclei-templates/cve-less/plugins/webarx-c1098b6c3ef986df5a9cd4bcd3f22c1d.yaml new file mode 100644 index 0000000000..73f40f126a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webarx-c1098b6c3ef986df5a9cd4bcd3f22c1d.yaml @@ -0,0 +1,58 @@ +id: webarx-c1098b6c3ef986df5a9cd4bcd3f22c1d + +info: + name: > + WebARX <= 1.3.0 - Firewall Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504fca80-7e81-412b-891f-2679451ff6e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webarx/" + google-query: inurl:"/wp-content/plugins/webarx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webarx,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webarx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webarx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webba-booking-lite-2a09ce4f54ecaad8c53766c936fa0a77.yaml b/nuclei-templates/cve-less/plugins/webba-booking-lite-2a09ce4f54ecaad8c53766c936fa0a77.yaml new file mode 100644 index 0000000000..e0d6443513 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webba-booking-lite-2a09ce4f54ecaad8c53766c936fa0a77.yaml @@ -0,0 +1,58 @@ +id: webba-booking-lite-2a09ce4f54ecaad8c53766c936fa0a77 + +info: + name: > + Webba Booking <= 4.5.33 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12a195a0-f992-462d-9b4e-69e8a2975635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webba-booking-lite/" + google-query: inurl:"/wp-content/plugins/webba-booking-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webba-booking-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webba-booking-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webba-booking-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webba-booking-lite-852d49969bf0838b042595dfd6400dc8.yaml b/nuclei-templates/cve-less/plugins/webba-booking-lite-852d49969bf0838b042595dfd6400dc8.yaml new file mode 100644 index 0000000000..5bcd199b57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webba-booking-lite-852d49969bf0838b042595dfd6400dc8.yaml @@ -0,0 +1,58 @@ +id: webba-booking-lite-852d49969bf0838b042595dfd6400dc8 + +info: + name: > + Webba Booking <= 4.2.21 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f6c33f4-58e7-4a0b-8293-5cb951f63ffc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webba-booking-lite/" + google-query: inurl:"/wp-content/plugins/webba-booking-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webba-booking-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webba-booking-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webba-booking-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webba-booking-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/webba-booking-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..715c4b1efa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webba-booking-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: webba-booking-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webba-booking-lite/" + google-query: inurl:"/wp-content/plugins/webba-booking-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webba-booking-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webba-booking-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webba-booking-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webcam-2way-videochat-0f5da3ff5cb74e14389716d803ec3198.yaml b/nuclei-templates/cve-less/plugins/webcam-2way-videochat-0f5da3ff5cb74e14389716d803ec3198.yaml new file mode 100644 index 0000000000..86ee92cae6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webcam-2way-videochat-0f5da3ff5cb74e14389716d803ec3198.yaml @@ -0,0 +1,58 @@ +id: webcam-2way-videochat-0f5da3ff5cb74e14389716d803ec3198 + +info: + name: > + 2Way VideoCalls and Random Chat – HTML5 Webcam Videochat <= 5.2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26f8a133-c4a0-4c6c-a09e-47b81c65a731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webcam-2way-videochat/" + google-query: inurl:"/wp-content/plugins/webcam-2way-videochat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webcam-2way-videochat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webcam-2way-videochat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webcam-2way-videochat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webcam-2way-videochat-e6c1637e24e361150992210212c2ee7c.yaml b/nuclei-templates/cve-less/plugins/webcam-2way-videochat-e6c1637e24e361150992210212c2ee7c.yaml new file mode 100644 index 0000000000..a94f9b2eef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webcam-2way-videochat-e6c1637e24e361150992210212c2ee7c.yaml @@ -0,0 +1,58 @@ +id: webcam-2way-videochat-e6c1637e24e361150992210212c2ee7c + +info: + name: > + Webcam 2Way Videochat <= 4.41 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92b1a47e-31e2-4cfd-a24c-460ff2f00d09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webcam-2way-videochat/" + google-query: inurl:"/wp-content/plugins/webcam-2way-videochat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webcam-2way-videochat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webcam-2way-videochat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webcam-2way-videochat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webengage-a81e63270dce3acdb86d52d988c823c1.yaml b/nuclei-templates/cve-less/plugins/webengage-a81e63270dce3acdb86d52d988c823c1.yaml new file mode 100644 index 0000000000..5bf72f9732 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webengage-a81e63270dce3acdb86d52d988c823c1.yaml @@ -0,0 +1,58 @@ +id: webengage-a81e63270dce3acdb86d52d988c823c1 + +info: + name: > + WebEngage Feedback, Survey and Notification < 2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f82845c-55db-491a-90c1-326884abb5d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webengage/" + google-query: inurl:"/wp-content/plugins/webengage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webengage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webengage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webengage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weberino-timed-quiz-creator-424714e0619eb7899a426abc7531d5d4.yaml b/nuclei-templates/cve-less/plugins/weberino-timed-quiz-creator-424714e0619eb7899a426abc7531d5d4.yaml new file mode 100644 index 0000000000..ffc1d9bc92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weberino-timed-quiz-creator-424714e0619eb7899a426abc7531d5d4.yaml @@ -0,0 +1,58 @@ +id: weberino-timed-quiz-creator-424714e0619eb7899a426abc7531d5d4 + +info: + name: > + Weberino Timed Quiz <= 0.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a418687-7359-4ebf-8912-2c9f511fe46d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weberino-timed-quiz-creator/" + google-query: inurl:"/wp-content/plugins/weberino-timed-quiz-creator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weberino-timed-quiz-creator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weberino-timed-quiz-creator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weberino-timed-quiz-creator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webflow-pages-d242d8704b7ccc1eaddd7fe775c62763.yaml b/nuclei-templates/cve-less/plugins/webflow-pages-d242d8704b7ccc1eaddd7fe775c62763.yaml new file mode 100644 index 0000000000..f458748f3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webflow-pages-d242d8704b7ccc1eaddd7fe775c62763.yaml @@ -0,0 +1,58 @@ +id: webflow-pages-d242d8704b7ccc1eaddd7fe775c62763 + +info: + name: > + Webflow Pages <= 1.0.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a01141ed-9b9c-426f-96b3-c6ceade4d35c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webflow-pages/" + google-query: inurl:"/wp-content/plugins/webflow-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webflow-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webflow-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webflow-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webful-simple-grocery-shop-4107aeeea36af4cc92554c8214549a0c.yaml b/nuclei-templates/cve-less/plugins/webful-simple-grocery-shop-4107aeeea36af4cc92554c8214549a0c.yaml new file mode 100644 index 0000000000..7d2683dadf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webful-simple-grocery-shop-4107aeeea36af4cc92554c8214549a0c.yaml @@ -0,0 +1,58 @@ +id: webful-simple-grocery-shop-4107aeeea36af4cc92554c8214549a0c + +info: + name: > + WordPress Simple Shop <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/937e56cc-58dc-483c-8f17-ced3b1f7a481?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webful-simple-grocery-shop/" + google-query: inurl:"/wp-content/plugins/webful-simple-grocery-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webful-simple-grocery-shop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webful-simple-grocery-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webful-simple-grocery-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webhotelier-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/webhotelier-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..22c031f4e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webhotelier-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: webhotelier-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webhotelier/" + google-query: inurl:"/wp-content/plugins/webhotelier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webhotelier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webhotelier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webhotelier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..7bc8b3b13b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: webinar-and-video-conference-with-jitsi-meet-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/" + google-query: inurl:"/wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-and-video-conference-with-jitsi-meet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-and-video-conference-with-jitsi-meet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..e082b48761 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: webinar-and-video-conference-with-jitsi-meet-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/" + google-query: inurl:"/wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-and-video-conference-with-jitsi-meet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-and-video-conference-with-jitsi-meet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-c115c2b38773f756d29db80a784da83d.yaml b/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-c115c2b38773f756d29db80a784da83d.yaml new file mode 100644 index 0000000000..836ac8e161 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-and-video-conference-with-jitsi-meet-c115c2b38773f756d29db80a784da83d.yaml @@ -0,0 +1,58 @@ +id: webinar-and-video-conference-with-jitsi-meet-c115c2b38773f756d29db80a784da83d + +info: + name: > + Webinar and Video Conference with Jitsi Meet <= 2.6.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f610d7ef-fb7c-4c3b-bde2-d7071331be70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/" + google-query: inurl:"/wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-and-video-conference-with-jitsi-meet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-and-video-conference-with-jitsi-meet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-and-video-conference-with-jitsi-meet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-ignition-24235010dc5f596c69c8fc2e49290c79.yaml b/nuclei-templates/cve-less/plugins/webinar-ignition-24235010dc5f596c69c8fc2e49290c79.yaml new file mode 100644 index 0000000000..dda75fac56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-ignition-24235010dc5f596c69c8fc2e49290c79.yaml @@ -0,0 +1,58 @@ +id: webinar-ignition-24235010dc5f596c69c8fc2e49290c79 + +info: + name: > + WebinarIgnition <= 3.05.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4ea6044-bf7b-469d-89ec-a9b89ef5715e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-ignition/" + google-query: inurl:"/wp-content/plugins/webinar-ignition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-ignition,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-ignition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-ignition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.05.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-ignition-248f6a7272fbf1cbf24050ac1a199f58.yaml b/nuclei-templates/cve-less/plugins/webinar-ignition-248f6a7272fbf1cbf24050ac1a199f58.yaml new file mode 100644 index 0000000000..783879e595 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-ignition-248f6a7272fbf1cbf24050ac1a199f58.yaml @@ -0,0 +1,58 @@ +id: webinar-ignition-248f6a7272fbf1cbf24050ac1a199f58 + +info: + name: > + WebinarIgnition <= 3.05.0 - Missing Authorization to Unauthenticated Privilege Escalation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24517dc6-4995-48ee-9b02-5c7c29d359f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-ignition/" + google-query: inurl:"/wp-content/plugins/webinar-ignition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-ignition,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-ignition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-ignition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.05.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-ignition-5178d59b66e68e951d4f7950c9fe1897.yaml b/nuclei-templates/cve-less/plugins/webinar-ignition-5178d59b66e68e951d4f7950c9fe1897.yaml new file mode 100644 index 0000000000..87c3d9ed3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-ignition-5178d59b66e68e951d4f7950c9fe1897.yaml @@ -0,0 +1,58 @@ +id: webinar-ignition-5178d59b66e68e951d4f7950c9fe1897 + +info: + name: > + WebinarIgnition <= 3.05.0 - Authenticated(Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa4244d3-a611-416d-8159-2f6a8cf61b30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-ignition/" + google-query: inurl:"/wp-content/plugins/webinar-ignition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-ignition,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-ignition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-ignition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.05.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-ignition-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/webinar-ignition-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..46eeb15a49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-ignition-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: webinar-ignition-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-ignition/" + google-query: inurl:"/wp-content/plugins/webinar-ignition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-ignition,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-ignition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-ignition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-ignition-ce19f0865e2754bb33aa14bd9af59e12.yaml b/nuclei-templates/cve-less/plugins/webinar-ignition-ce19f0865e2754bb33aa14bd9af59e12.yaml new file mode 100644 index 0000000000..155dbf1284 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-ignition-ce19f0865e2754bb33aa14bd9af59e12.yaml @@ -0,0 +1,58 @@ +id: webinar-ignition-ce19f0865e2754bb33aa14bd9af59e12 + +info: + name: > + WebinarIgnition <= 3.05.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cef43a2-7917-4abd-b8f5-4a7604eadb70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-ignition/" + google-query: inurl:"/wp-content/plugins/webinar-ignition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-ignition,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-ignition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-ignition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.05.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webinar-ignition-ea72a950c1ec7c195be94a36b1f4a88b.yaml b/nuclei-templates/cve-less/plugins/webinar-ignition-ea72a950c1ec7c195be94a36b1f4a88b.yaml new file mode 100644 index 0000000000..e8b5937d9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webinar-ignition-ea72a950c1ec7c195be94a36b1f4a88b.yaml @@ -0,0 +1,58 @@ +id: webinar-ignition-ea72a950c1ec7c195be94a36b1f4a88b + +info: + name: > + WebinarIgnition <= 2.14.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49c65776-130d-4c22-b4f8-ababac8cf341?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webinar-ignition/" + google-query: inurl:"/wp-content/plugins/webinar-ignition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webinar-ignition,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webinar-ignition/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webinar-ignition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblibrarian-078737c487b7cb7dd59dfa47479456c5.yaml b/nuclei-templates/cve-less/plugins/weblibrarian-078737c487b7cb7dd59dfa47479456c5.yaml new file mode 100644 index 0000000000..9c1cd82388 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblibrarian-078737c487b7cb7dd59dfa47479456c5.yaml @@ -0,0 +1,58 @@ +id: weblibrarian-078737c487b7cb7dd59dfa47479456c5 + +info: + name: > + WebLibrarian < 3.4.8.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d918cfa5-8bae-45a0-a888-06f4cdb2ef33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblibrarian/" + google-query: inurl:"/wp-content/plugins/weblibrarian/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblibrarian,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblibrarian/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblibrarian" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblibrarian-09a7bcc8ea30f2211fb747659d8fc0b2.yaml b/nuclei-templates/cve-less/plugins/weblibrarian-09a7bcc8ea30f2211fb747659d8fc0b2.yaml new file mode 100644 index 0000000000..e38e039835 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblibrarian-09a7bcc8ea30f2211fb747659d8fc0b2.yaml @@ -0,0 +1,58 @@ +id: weblibrarian-09a7bcc8ea30f2211fb747659d8fc0b2 + +info: + name: > + WebLibrarian < 3.4.8.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73fae3a0-6987-45bf-a20e-4ea9c6f73924?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblibrarian/" + google-query: inurl:"/wp-content/plugins/weblibrarian/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblibrarian,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblibrarian/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblibrarian" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblibrarian-19dc9eaf0f82c574889586e002e668f6.yaml b/nuclei-templates/cve-less/plugins/weblibrarian-19dc9eaf0f82c574889586e002e668f6.yaml new file mode 100644 index 0000000000..998fc3900c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblibrarian-19dc9eaf0f82c574889586e002e668f6.yaml @@ -0,0 +1,58 @@ +id: weblibrarian-19dc9eaf0f82c574889586e002e668f6 + +info: + name: > + Web Librarian <= 3.5.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ca2d48b-5fb6-4eb9-85ea-be5a21130039?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblibrarian/" + google-query: inurl:"/wp-content/plugins/weblibrarian/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblibrarian,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblibrarian/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblibrarian" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblibrarian-721a4bb5a70d51824521f6e59c15ccd0.yaml b/nuclei-templates/cve-less/plugins/weblibrarian-721a4bb5a70d51824521f6e59c15ccd0.yaml new file mode 100644 index 0000000000..8fcc666241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblibrarian-721a4bb5a70d51824521f6e59c15ccd0.yaml @@ -0,0 +1,58 @@ +id: weblibrarian-721a4bb5a70d51824521f6e59c15ccd0 + +info: + name: > + WebLibrarian < 3.4.8.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8881c74f-9941-4919-8a15-99407fca0946?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblibrarian/" + google-query: inurl:"/wp-content/plugins/weblibrarian/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblibrarian,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblibrarian/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblibrarian" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblibrarian-df8c113b5a2942a4fbbfe352003deb48.yaml b/nuclei-templates/cve-less/plugins/weblibrarian-df8c113b5a2942a4fbbfe352003deb48.yaml new file mode 100644 index 0000000000..0bfcfa2ca5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblibrarian-df8c113b5a2942a4fbbfe352003deb48.yaml @@ -0,0 +1,58 @@ +id: weblibrarian-df8c113b5a2942a4fbbfe352003deb48 + +info: + name: > + WebLibrarian <= 3.5.8.1 - Reflected Cross-Site Scripting via multiple parameters + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b4b05a8-3a32-4fa9-9ff5-a2a62b11a05d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblibrarian/" + google-query: inurl:"/wp-content/plugins/weblibrarian/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblibrarian,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblibrarian/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblibrarian" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-2f71afc8c2d9293f41fbc23cbef8e12e.yaml b/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-2f71afc8c2d9293f41fbc23cbef8e12e.yaml new file mode 100644 index 0000000000..581ff6192b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-2f71afc8c2d9293f41fbc23cbef8e12e.yaml @@ -0,0 +1,58 @@ +id: weblizar-pinterest-feeds-2f71afc8c2d9293f41fbc23cbef8e12e + +info: + name: > + Weblizar Pin Feeds < 1.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd052762-5bd3-4008-b6b9-aca7be1151c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblizar-pinterest-feeds/" + google-query: inurl:"/wp-content/plugins/weblizar-pinterest-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblizar-pinterest-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblizar-pinterest-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-658f027744f04fc24b4bbaa34345300a.yaml b/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-658f027744f04fc24b4bbaa34345300a.yaml new file mode 100644 index 0000000000..711d66fa1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-658f027744f04fc24b4bbaa34345300a.yaml @@ -0,0 +1,58 @@ +id: weblizar-pinterest-feeds-658f027744f04fc24b4bbaa34345300a + +info: + name: > + Weblizar Pin Feeds < 1.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c291da3-1326-40d8-b8e1-dfcf006ace0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblizar-pinterest-feeds/" + google-query: inurl:"/wp-content/plugins/weblizar-pinterest-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblizar-pinterest-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblizar-pinterest-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-9052f6be826c55f21c5dca387bdd8f58.yaml b/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-9052f6be826c55f21c5dca387bdd8f58.yaml new file mode 100644 index 0000000000..408564a066 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-9052f6be826c55f21c5dca387bdd8f58.yaml @@ -0,0 +1,58 @@ +id: weblizar-pinterest-feeds-9052f6be826c55f21c5dca387bdd8f58 + +info: + name: > + Weblizar Pin Feeds < 1.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aeacc3e5-020f-44b9-b412-c5a9114e0178?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblizar-pinterest-feeds/" + google-query: inurl:"/wp-content/plugins/weblizar-pinterest-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblizar-pinterest-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblizar-pinterest-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-c4fa0744bf528288e2b344cf15e3e525.yaml b/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-c4fa0744bf528288e2b344cf15e3e525.yaml new file mode 100644 index 0000000000..5b5132c74f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weblizar-pinterest-feeds-c4fa0744bf528288e2b344cf15e3e525.yaml @@ -0,0 +1,58 @@ +id: weblizar-pinterest-feeds-c4fa0744bf528288e2b344cf15e3e525 + +info: + name: > + Weblizar Pin Feeds < 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9adc6f3e-2360-480c-9f91-f47474e66c78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weblizar-pinterest-feeds/" + google-query: inurl:"/wp-content/plugins/weblizar-pinterest-feeds/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weblizar-pinterest-feeds/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weblizar-pinterest-feeds" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webmaster-tools-ed6d1649ba9976ebdf4a57c36e036026.yaml b/nuclei-templates/cve-less/plugins/webmaster-tools-ed6d1649ba9976ebdf4a57c36e036026.yaml new file mode 100644 index 0000000000..1b3e82c82a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webmaster-tools-ed6d1649ba9976ebdf4a57c36e036026.yaml @@ -0,0 +1,58 @@ +id: webmaster-tools-ed6d1649ba9976ebdf4a57c36e036026 + +info: + name: > + Webmaster Tools <= 2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e80bb7de-ce18-40d5-bf4c-9616739b2f9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webmaster-tools/" + google-query: inurl:"/wp-content/plugins/webmaster-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webmaster-tools,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webmaster-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webmaster-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webmaster-tools-fcf19f2a25a048981731715a2abd665b.yaml b/nuclei-templates/cve-less/plugins/webmaster-tools-fcf19f2a25a048981731715a2abd665b.yaml new file mode 100644 index 0000000000..718fe704f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webmaster-tools-fcf19f2a25a048981731715a2abd665b.yaml @@ -0,0 +1,58 @@ +id: webmaster-tools-fcf19f2a25a048981731715a2abd665b + +info: + name: > + Webmaster Tools <= 2.0 - Cross-Site Request Forgery vin lionscripts_plg_f + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4112ca9a-39fa-4fe8-a060-9f8f492eb846?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webmaster-tools/" + google-query: inurl:"/wp-content/plugins/webmaster-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webmaster-tools,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webmaster-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webmaster-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webmaster-tools-verification-200b5675cd7f93f9a3a59f8b16a025dd.yaml b/nuclei-templates/cve-less/plugins/webmaster-tools-verification-200b5675cd7f93f9a3a59f8b16a025dd.yaml new file mode 100644 index 0000000000..55845087db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webmaster-tools-verification-200b5675cd7f93f9a3a59f8b16a025dd.yaml @@ -0,0 +1,58 @@ +id: webmaster-tools-verification-200b5675cd7f93f9a3a59f8b16a025dd + +info: + name: > + Webmaster Tools Verification <= 1.2 - Missing Authorization to Arbitrary Plugin Deactivation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/546f388e-16e2-4c0b-acb0-a462bff4ef77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webmaster-tools-verification/" + google-query: inurl:"/wp-content/plugins/webmaster-tools-verification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webmaster-tools-verification,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webmaster-tools-verification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webmaster-tools-verification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webmention-83bb2c4151dabc454448c4004e1bc5d5.yaml b/nuclei-templates/cve-less/plugins/webmention-83bb2c4151dabc454448c4004e1bc5d5.yaml new file mode 100644 index 0000000000..961c038e60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webmention-83bb2c4151dabc454448c4004e1bc5d5.yaml @@ -0,0 +1,58 @@ +id: webmention-83bb2c4151dabc454448c4004e1bc5d5 + +info: + name: > + Webmention <= 4.0.8 - Reflected Cross-Site Scripting via 'replytocom' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d12d692-231b-4e15-a119-80fd74566af4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webmention/" + google-query: inurl:"/wp-content/plugins/webmention/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webmention,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webmention/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webmention" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webp-converter-for-media-52ad3a4045cbc52c94981ea4e45a3cca.yaml b/nuclei-templates/cve-less/plugins/webp-converter-for-media-52ad3a4045cbc52c94981ea4e45a3cca.yaml new file mode 100644 index 0000000000..d223a6e6db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webp-converter-for-media-52ad3a4045cbc52c94981ea4e45a3cca.yaml @@ -0,0 +1,58 @@ +id: webp-converter-for-media-52ad3a4045cbc52c94981ea4e45a3cca + +info: + name: > + WebP Converter for Media – Convert WebP and AVIF & Optimize Images <= 1.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cbb8495-70e0-48cc-84d9-6d3cf3ec5355?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webp-converter-for-media/" + google-query: inurl:"/wp-content/plugins/webp-converter-for-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webp-converter-for-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webp-converter-for-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webp-converter-for-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webp-converter-for-media-a5e6cd84098c70182c2285443d912164.yaml b/nuclei-templates/cve-less/plugins/webp-converter-for-media-a5e6cd84098c70182c2285443d912164.yaml new file mode 100644 index 0000000000..09d59a6f9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webp-converter-for-media-a5e6cd84098c70182c2285443d912164.yaml @@ -0,0 +1,58 @@ +id: webp-converter-for-media-a5e6cd84098c70182c2285443d912164 + +info: + name: > + WebP Converter for Media <= 4.0.2 - Unauthenticated Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16919724-e495-492e-8cc7-639e6d8473c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webp-converter-for-media/" + google-query: inurl:"/wp-content/plugins/webp-converter-for-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webp-converter-for-media,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webp-converter-for-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webp-converter-for-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webp-express-3d333cad26fc8b3d5422c9b862bc540d.yaml b/nuclei-templates/cve-less/plugins/webp-express-3d333cad26fc8b3d5422c9b862bc540d.yaml new file mode 100644 index 0000000000..2ff4f19139 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webp-express-3d333cad26fc8b3d5422c9b862bc540d.yaml @@ -0,0 +1,58 @@ +id: webp-express-3d333cad26fc8b3d5422c9b862bc540d + +info: + name: > + WebP Express <= 0.14.10 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b7108fc-0eb2-4f9f-b747-3b83c57a1b53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webp-express/" + google-query: inurl:"/wp-content/plugins/webp-express/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webp-express,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webp-express/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webp-express" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.14.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webp-express-a115c09e275d981be8fd48f835f5a022.yaml b/nuclei-templates/cve-less/plugins/webp-express-a115c09e275d981be8fd48f835f5a022.yaml new file mode 100644 index 0000000000..963f086568 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webp-express-a115c09e275d981be8fd48f835f5a022.yaml @@ -0,0 +1,58 @@ +id: webp-express-a115c09e275d981be8fd48f835f5a022 + +info: + name: > + WebP Express < 0.14.11 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f4893b9-e032-45d6-a542-0ead70c61e2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webp-express/" + google-query: inurl:"/wp-content/plugins/webp-express/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webp-express,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webp-express/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webp-express" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.14.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-8ddc4ba3a0f497ef212e13a7d6e63ce3.yaml b/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-8ddc4ba3a0f497ef212e13a7d6e63ce3.yaml new file mode 100644 index 0000000000..f833f4accd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-8ddc4ba3a0f497ef212e13a7d6e63ce3.yaml @@ -0,0 +1,58 @@ +id: webpushr-web-push-notifications-8ddc4ba3a0f497ef212e13a7d6e63ce3 + +info: + name: > + Webpushr <= 4.35.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32348f79-232f-42e6-bbea-aba6203d9f26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webpushr-web-push-notifications/" + google-query: inurl:"/wp-content/plugins/webpushr-web-push-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webpushr-web-push-notifications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webpushr-web-push-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webpushr-web-push-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.35.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-99ed4f84114970decbe599553d25ef62.yaml b/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-99ed4f84114970decbe599553d25ef62.yaml new file mode 100644 index 0000000000..17dadbc8a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-99ed4f84114970decbe599553d25ef62.yaml @@ -0,0 +1,58 @@ +id: webpushr-web-push-notifications-99ed4f84114970decbe599553d25ef62 + +info: + name: > + Webpushr <= 4.34.0 - Cross-Site Request Forgery to Local File Inclusion via menu + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e140973b-d37c-45bf-aed2-9223bd812957?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webpushr-web-push-notifications/" + google-query: inurl:"/wp-content/plugins/webpushr-web-push-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webpushr-web-push-notifications,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webpushr-web-push-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webpushr-web-push-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.34.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-c54aa5c11f04ffd29f7bfb4d878ecdae.yaml b/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-c54aa5c11f04ffd29f7bfb4d878ecdae.yaml new file mode 100644 index 0000000000..07d7202515 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webpushr-web-push-notifications-c54aa5c11f04ffd29f7bfb4d878ecdae.yaml @@ -0,0 +1,58 @@ +id: webpushr-web-push-notifications-c54aa5c11f04ffd29f7bfb4d878ecdae + +info: + name: > + Webpushr <= 4.34.0 - Missing Authorization to Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e092d67-ab81-4366-824c-cfb240ba3042?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webpushr-web-push-notifications/" + google-query: inurl:"/wp-content/plugins/webpushr-web-push-notifications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webpushr-web-push-notifications,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webpushr-web-push-notifications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webpushr-web-push-notifications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.34.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webriti-smtp-mail-65f94ea0710a1cc5f2df8da6f9883ee7.yaml b/nuclei-templates/cve-less/plugins/webriti-smtp-mail-65f94ea0710a1cc5f2df8da6f9883ee7.yaml new file mode 100644 index 0000000000..1aebfc4388 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webriti-smtp-mail-65f94ea0710a1cc5f2df8da6f9883ee7.yaml @@ -0,0 +1,58 @@ +id: webriti-smtp-mail-65f94ea0710a1cc5f2df8da6f9883ee7 + +info: + name: > + Webriti SMTP Mail <= 1.0 - Cross-Site Request Forgery to options update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/053d374e-68b2-4d48-af6d-45087d5ce211?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webriti-smtp-mail/" + google-query: inurl:"/wp-content/plugins/webriti-smtp-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webriti-smtp-mail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webriti-smtp-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webriti-smtp-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webrotate-360-product-viewer-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/webrotate-360-product-viewer-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..2b172e4e24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webrotate-360-product-viewer-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: webrotate-360-product-viewer-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webrotate-360-product-viewer/" + google-query: inurl:"/wp-content/plugins/webrotate-360-product-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webrotate-360-product-viewer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webrotate-360-product-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webrotate-360-product-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/websimon-tables-eb4c190ad02fb7be0bb121747087fd9e.yaml b/nuclei-templates/cve-less/plugins/websimon-tables-eb4c190ad02fb7be0bb121747087fd9e.yaml new file mode 100644 index 0000000000..680327bca7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/websimon-tables-eb4c190ad02fb7be0bb121747087fd9e.yaml @@ -0,0 +1,58 @@ +id: websimon-tables-eb4c190ad02fb7be0bb121747087fd9e + +info: + name: > + Websimon Tables <= 1.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51c1c4ee-c17f-4565-b800-f306569fc502?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/websimon-tables/" + google-query: inurl:"/wp-content/plugins/websimon-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,websimon-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/websimon-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "websimon-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/website-article-monetization-by-magenet-9f77fe459a0e5283ffcbf11ae93f5733.yaml b/nuclei-templates/cve-less/plugins/website-article-monetization-by-magenet-9f77fe459a0e5283ffcbf11ae93f5733.yaml new file mode 100644 index 0000000000..b79e858a9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/website-article-monetization-by-magenet-9f77fe459a0e5283ffcbf11ae93f5733.yaml @@ -0,0 +1,58 @@ +id: website-article-monetization-by-magenet-9f77fe459a0e5283ffcbf11ae93f5733 + +info: + name: > + Website Article Monetization By MageNet <= 1.0.11 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8564dbb-6be8-4999-be65-d28609e05451?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/website-article-monetization-by-magenet/" + google-query: inurl:"/wp-content/plugins/website-article-monetization-by-magenet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,website-article-monetization-by-magenet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/website-article-monetization-by-magenet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "website-article-monetization-by-magenet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/website-contact-form-with-file-upload-33759bcda67b63222c81180460386592.yaml b/nuclei-templates/cve-less/plugins/website-contact-form-with-file-upload-33759bcda67b63222c81180460386592.yaml new file mode 100644 index 0000000000..ea70403bf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/website-contact-form-with-file-upload-33759bcda67b63222c81180460386592.yaml @@ -0,0 +1,58 @@ +id: website-contact-form-with-file-upload-33759bcda67b63222c81180460386592 + +info: + name: > + Website Contact Form With File Upload < 1.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fd76c2b-ce5d-49a8-8c37-bd204e42d3c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/website-contact-form-with-file-upload/" + google-query: inurl:"/wp-content/plugins/website-contact-form-with-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,website-contact-form-with-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/website-contact-form-with-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "website-contact-form-with-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/website-contact-form-with-file-upload-e6a88eb36d00e8ebcfe3d81bafc03b1e.yaml b/nuclei-templates/cve-less/plugins/website-contact-form-with-file-upload-e6a88eb36d00e8ebcfe3d81bafc03b1e.yaml new file mode 100644 index 0000000000..dbfd71b142 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/website-contact-form-with-file-upload-e6a88eb36d00e8ebcfe3d81bafc03b1e.yaml @@ -0,0 +1,58 @@ +id: website-contact-form-with-file-upload-e6a88eb36d00e8ebcfe3d81bafc03b1e + +info: + name: > + Website Contact Form With File Upload <= 1.3.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8395e0c4-3feb-4551-9f2f-7b80cd187eca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/website-contact-form-with-file-upload/" + google-query: inurl:"/wp-content/plugins/website-contact-form-with-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,website-contact-form-with-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/website-contact-form-with-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "website-contact-form-with-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/website-file-changes-monitor-b4286607d776cde455809a59a67464fa.yaml b/nuclei-templates/cve-less/plugins/website-file-changes-monitor-b4286607d776cde455809a59a67464fa.yaml new file mode 100644 index 0000000000..9c417fc440 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/website-file-changes-monitor-b4286607d776cde455809a59a67464fa.yaml @@ -0,0 +1,58 @@ +id: website-file-changes-monitor-b4286607d776cde455809a59a67464fa + +info: + name: > + Website File Changes Monitor <= 1.8.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2046c6cf-32fa-4fac-a4bc-00f11f739d14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/website-file-changes-monitor/" + google-query: inurl:"/wp-content/plugins/website-file-changes-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,website-file-changes-monitor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/website-file-changes-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "website-file-changes-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/website-monetization-by-magenet-fb6bf968c60057d0db8de1f7c72a739d.yaml b/nuclei-templates/cve-less/plugins/website-monetization-by-magenet-fb6bf968c60057d0db8de1f7c72a739d.yaml new file mode 100644 index 0000000000..4874c3b759 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/website-monetization-by-magenet-fb6bf968c60057d0db8de1f7c72a739d.yaml @@ -0,0 +1,58 @@ +id: website-monetization-by-magenet-fb6bf968c60057d0db8de1f7c72a739d + +info: + name: > + Website Monetization by MageNet <= 1.0.29.1 - Cross-Site Request Forgery via admin_magenet_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f1f3562-f869-4442-b77f-c06c5683c1b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/website-monetization-by-magenet/" + google-query: inurl:"/wp-content/plugins/website-monetization-by-magenet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,website-monetization-by-magenet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/website-monetization-by-magenet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "website-monetization-by-magenet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.29.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/webwinkelkeur-bb474de523e33ab78eb1474118c2fa7e.yaml b/nuclei-templates/cve-less/plugins/webwinkelkeur-bb474de523e33ab78eb1474118c2fa7e.yaml new file mode 100644 index 0000000000..c0758e7a70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/webwinkelkeur-bb474de523e33ab78eb1474118c2fa7e.yaml @@ -0,0 +1,58 @@ +id: webwinkelkeur-bb474de523e33ab78eb1474118c2fa7e + +info: + name: > + WebwinkelKeur <= 3.24 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a077e95f-7912-4b94-89f3-54f37adfcd8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/webwinkelkeur/" + google-query: inurl:"/wp-content/plugins/webwinkelkeur/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,webwinkelkeur,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/webwinkelkeur/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webwinkelkeur" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wechat-broadcast-71573a0535f08f2db438af64d10b0f1d.yaml b/nuclei-templates/cve-less/plugins/wechat-broadcast-71573a0535f08f2db438af64d10b0f1d.yaml new file mode 100644 index 0000000000..c902e123a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wechat-broadcast-71573a0535f08f2db438af64d10b0f1d.yaml @@ -0,0 +1,58 @@ +id: wechat-broadcast-71573a0535f08f2db438af64d10b0f1d + +info: + name: > + 微信群发助手-Wechat Broadcast <= 1.2.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/324fcf1b-a811-4750-bf48-87cb6570d51a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wechat-broadcast/" + google-query: inurl:"/wp-content/plugins/wechat-broadcast/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wechat-broadcast,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wechat-broadcast/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wechat-broadcast" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wechat-reward-bcff2870cae12c5758ea4c72282891f6.yaml b/nuclei-templates/cve-less/plugins/wechat-reward-bcff2870cae12c5758ea4c72282891f6.yaml new file mode 100644 index 0000000000..70dcbf3851 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wechat-reward-bcff2870cae12c5758ea4c72282891f6.yaml @@ -0,0 +1,58 @@ +id: wechat-reward-bcff2870cae12c5758ea4c72282891f6 + +info: + name: > + Wechat Reward <= 1.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b0f5c2c-f01a-4a09-99c2-2b7dfe3bcd05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wechat-reward/" + google-query: inurl:"/wp-content/plugins/wechat-reward/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wechat-reward,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wechat-reward/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wechat-reward" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedevs-project-manager-0a72b6924fec36fec1dd6c3deccd8793.yaml b/nuclei-templates/cve-less/plugins/wedevs-project-manager-0a72b6924fec36fec1dd6c3deccd8793.yaml new file mode 100644 index 0000000000..ef1ae1f19b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedevs-project-manager-0a72b6924fec36fec1dd6c3deccd8793.yaml @@ -0,0 +1,58 @@ +id: wedevs-project-manager-0a72b6924fec36fec1dd6c3deccd8793 + +info: + name: > + WP Project Manager <= 2.6.4 - Arbitrary Usermeta Update to Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a5e4708-db3e-483c-852f-1a487825cf92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedevs-project-manager/" + google-query: inurl:"/wp-content/plugins/wedevs-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedevs-project-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedevs-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedevs-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedevs-project-manager-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wedevs-project-manager-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..6e9a7a0372 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedevs-project-manager-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wedevs-project-manager-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedevs-project-manager/" + google-query: inurl:"/wp-content/plugins/wedevs-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedevs-project-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedevs-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedevs-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedevs-project-manager-4c439a45b0012520f242bad12e03107a.yaml b/nuclei-templates/cve-less/plugins/wedevs-project-manager-4c439a45b0012520f242bad12e03107a.yaml new file mode 100644 index 0000000000..7e12ff57d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedevs-project-manager-4c439a45b0012520f242bad12e03107a.yaml @@ -0,0 +1,58 @@ +id: wedevs-project-manager-4c439a45b0012520f242bad12e03107a + +info: + name: > + WP Project Manager <= 2.6.7 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd625d24-c1e9-465d-896a-bff75d8c534f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedevs-project-manager/" + google-query: inurl:"/wp-content/plugins/wedevs-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedevs-project-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedevs-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedevs-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedevs-project-manager-8a54587701c521af8ba2b5105bfe686a.yaml b/nuclei-templates/cve-less/plugins/wedevs-project-manager-8a54587701c521af8ba2b5105bfe686a.yaml new file mode 100644 index 0000000000..8fdbf79e5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedevs-project-manager-8a54587701c521af8ba2b5105bfe686a.yaml @@ -0,0 +1,58 @@ +id: wedevs-project-manager-8a54587701c521af8ba2b5105bfe686a + +info: + name: > + WP Project Manager <= 2.4.13 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef5859b7-0f15-43ad-9f45-aa846d045f5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedevs-project-manager/" + google-query: inurl:"/wp-content/plugins/wedevs-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedevs-project-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedevs-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedevs-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedevs-project-manager-b61b6ac3b97f0d01cb8ed1723488895c.yaml b/nuclei-templates/cve-less/plugins/wedevs-project-manager-b61b6ac3b97f0d01cb8ed1723488895c.yaml new file mode 100644 index 0000000000..f397832787 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedevs-project-manager-b61b6ac3b97f0d01cb8ed1723488895c.yaml @@ -0,0 +1,58 @@ +id: wedevs-project-manager-b61b6ac3b97f0d01cb8ed1723488895c + +info: + name: > + WP Project Manager <= 2.6.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f83a6631-ff6c-422e-8b6c-49576fadb89f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedevs-project-manager/" + google-query: inurl:"/wp-content/plugins/wedevs-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedevs-project-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedevs-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedevs-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedevs-project-manager-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wedevs-project-manager-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..4e46c4c4b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedevs-project-manager-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wedevs-project-manager-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedevs-project-manager/" + google-query: inurl:"/wp-content/plugins/wedevs-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedevs-project-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedevs-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedevs-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedevs-project-manager-df9102694b36792bdabf02d0dae189bc.yaml b/nuclei-templates/cve-less/plugins/wedevs-project-manager-df9102694b36792bdabf02d0dae189bc.yaml new file mode 100644 index 0000000000..de36b4e321 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedevs-project-manager-df9102694b36792bdabf02d0dae189bc.yaml @@ -0,0 +1,58 @@ +id: wedevs-project-manager-df9102694b36792bdabf02d0dae189bc + +info: + name: > + WP Project Manager <= 2.6.0 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79dabaa6-d907-4fa6-bc6f-f28f39578256?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedevs-project-manager/" + google-query: inurl:"/wp-content/plugins/wedevs-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedevs-project-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedevs-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedevs-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedevs-project-manager-edc5ca28f14c37c2e01dbf4e23653e4f.yaml b/nuclei-templates/cve-less/plugins/wedevs-project-manager-edc5ca28f14c37c2e01dbf4e23653e4f.yaml new file mode 100644 index 0000000000..a8fb4c045b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedevs-project-manager-edc5ca28f14c37c2e01dbf4e23653e4f.yaml @@ -0,0 +1,58 @@ +id: wedevs-project-manager-edc5ca28f14c37c2e01dbf4e23653e4f + +info: + name: > + WP Project Manager <= 2.4.0 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/456c13f5-4a8b-4eea-a2a0-f37f8508551b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedevs-project-manager/" + google-query: inurl:"/wp-content/plugins/wedevs-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedevs-project-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedevs-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedevs-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedocs-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wedocs-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..7e2c925ca7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedocs-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wedocs-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedocs/" + google-query: inurl:"/wp-content/plugins/wedocs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedocs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedocs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedocs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.6', '<= 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wedocs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wedocs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..2b16001d02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wedocs-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wedocs-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wedocs/" + google-query: inurl:"/wp-content/plugins/wedocs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wedocs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wedocs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wedocs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.6', '<= 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weebotlite-910100abea99ef6c374051083d0fe4ff.yaml b/nuclei-templates/cve-less/plugins/weebotlite-910100abea99ef6c374051083d0fe4ff.yaml new file mode 100644 index 0000000000..2587fe9aa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weebotlite-910100abea99ef6c374051083d0fe4ff.yaml @@ -0,0 +1,58 @@ +id: weebotlite-910100abea99ef6c374051083d0fe4ff + +info: + name: > + weebotLite <= 1.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66518929-d5e7-4b4d-a04c-a96ad0df308c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weebotlite/" + google-query: inurl:"/wp-content/plugins/weebotlite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weebotlite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weebotlite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weebotlite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weekly-class-schedule-b226e8f4a0772170244c06930bdb6dc9.yaml b/nuclei-templates/cve-less/plugins/weekly-class-schedule-b226e8f4a0772170244c06930bdb6dc9.yaml new file mode 100644 index 0000000000..e7bf1ae916 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weekly-class-schedule-b226e8f4a0772170244c06930bdb6dc9.yaml @@ -0,0 +1,58 @@ +id: weekly-class-schedule-b226e8f4a0772170244c06930bdb6dc9 + +info: + name: > + Weekly Class Schedule <= 3.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6951a50-954b-4c2b-8499-7623027406c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weekly-class-schedule/" + google-query: inurl:"/wp-content/plugins/weekly-class-schedule/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weekly-class-schedule,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weekly-class-schedule/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weekly-class-schedule" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weekly-schedule-a7639c71f3241814b9c95f17c5919356.yaml b/nuclei-templates/cve-less/plugins/weekly-schedule-a7639c71f3241814b9c95f17c5919356.yaml new file mode 100644 index 0000000000..7bc75089d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weekly-schedule-a7639c71f3241814b9c95f17c5919356.yaml @@ -0,0 +1,58 @@ +id: weekly-schedule-a7639c71f3241814b9c95f17c5919356 + +info: + name: > + Weekly Schedule <= 3.4.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94f03821-eb33-4eb6-b7ff-b32a74facdd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weekly-schedule/" + google-query: inurl:"/wp-content/plugins/weekly-schedule/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weekly-schedule,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weekly-schedule/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weekly-schedule" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weforms-20aadb46b84139edf712ada2a54996af.yaml b/nuclei-templates/cve-less/plugins/weforms-20aadb46b84139edf712ada2a54996af.yaml new file mode 100644 index 0000000000..8177e5dbb5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weforms-20aadb46b84139edf712ada2a54996af.yaml @@ -0,0 +1,58 @@ +id: weforms-20aadb46b84139edf712ada2a54996af + +info: + name: > + weForms <= 1.6.18 - Missing Authorization via export_form_entries + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2b7258e-c594-415a-a872-d5b28397e40d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weforms/" + google-query: inurl:"/wp-content/plugins/weforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weforms-22ec989ac05e231b0a72ec153f660e8e.yaml b/nuclei-templates/cve-less/plugins/weforms-22ec989ac05e231b0a72ec153f660e8e.yaml new file mode 100644 index 0000000000..3836a79d4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weforms-22ec989ac05e231b0a72ec153f660e8e.yaml @@ -0,0 +1,58 @@ +id: weforms-22ec989ac05e231b0a72ec153f660e8e + +info: + name: > + weForms – Easy Drag & Drop Contact Form Builder For WordPress <= 1.6.17 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c44efe0-bdc0-42e0-9bdd-cf25bff1d2d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weforms/" + google-query: inurl:"/wp-content/plugins/weforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weforms-38f8a2f1ccb6fa8679c01ae474dc43d3.yaml b/nuclei-templates/cve-less/plugins/weforms-38f8a2f1ccb6fa8679c01ae474dc43d3.yaml new file mode 100644 index 0000000000..b11281c351 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weforms-38f8a2f1ccb6fa8679c01ae474dc43d3.yaml @@ -0,0 +1,58 @@ +id: weforms-38f8a2f1ccb6fa8679c01ae474dc43d3 + +info: + name: > + weForms <= 1.6.20 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c71dc22-0b1b-4628-bbab-4154714e8804?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weforms/" + google-query: inurl:"/wp-content/plugins/weforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weforms-4e68aefc025803a73af9ddad4f651646.yaml b/nuclei-templates/cve-less/plugins/weforms-4e68aefc025803a73af9ddad4f651646.yaml new file mode 100644 index 0000000000..e71ca70297 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weforms-4e68aefc025803a73af9ddad4f651646.yaml @@ -0,0 +1,58 @@ +id: weforms-4e68aefc025803a73af9ddad4f651646 + +info: + name: > + weForms <= 1.6.21 - Unauthenticated Stored Cross-Site Scripting via Referer + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f436ab65-a59c-4b2a-abc8-a7fc038678dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weforms/" + google-query: inurl:"/wp-content/plugins/weforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weforms-61c13420e3dc8f41c004527b0a6dcd7f.yaml b/nuclei-templates/cve-less/plugins/weforms-61c13420e3dc8f41c004527b0a6dcd7f.yaml new file mode 100644 index 0000000000..bf3af936e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weforms-61c13420e3dc8f41c004527b0a6dcd7f.yaml @@ -0,0 +1,58 @@ +id: weforms-61c13420e3dc8f41c004527b0a6dcd7f + +info: + name: > + weForms <= 1.6.13 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e67057-7086-4108-a629-87610a12ec19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weforms/" + google-query: inurl:"/wp-content/plugins/weforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weforms-b76b106cd104db99c0e761b215cfa76f.yaml b/nuclei-templates/cve-less/plugins/weforms-b76b106cd104db99c0e761b215cfa76f.yaml new file mode 100644 index 0000000000..8746b4a3e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weforms-b76b106cd104db99c0e761b215cfa76f.yaml @@ -0,0 +1,58 @@ +id: weforms-b76b106cd104db99c0e761b215cfa76f + +info: + name: > + WeForms <= 1.4.7 - CSV injection via form entry + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53bffb82-b9df-40a0-947b-ecae512f363a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weforms/" + google-query: inurl:"/wp-content/plugins/weforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weforms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weglot-9b9cbf166c5c9952b460a90920fbb492.yaml b/nuclei-templates/cve-less/plugins/weglot-9b9cbf166c5c9952b460a90920fbb492.yaml new file mode 100644 index 0000000000..1cc1e83a4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weglot-9b9cbf166c5c9952b460a90920fbb492.yaml @@ -0,0 +1,58 @@ +id: weglot-9b9cbf166c5c9952b460a90920fbb492 + +info: + name: > + Translate WordPress and go Multilingual – Weglot <= 4.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d87134e8-9d73-4a39-b071-37a5dac033b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weglot/" + google-query: inurl:"/wp-content/plugins/weglot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weglot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weglot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weglot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weight-based-shipping-for-woocommerce-962608679c37b286812f3dffa30e38de.yaml b/nuclei-templates/cve-less/plugins/weight-based-shipping-for-woocommerce-962608679c37b286812f3dffa30e38de.yaml new file mode 100644 index 0000000000..a0980d9cde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weight-based-shipping-for-woocommerce-962608679c37b286812f3dffa30e38de.yaml @@ -0,0 +1,58 @@ +id: weight-based-shipping-for-woocommerce-962608679c37b286812f3dffa30e38de + +info: + name: > + WooCommerce Weight Based Shipping <= 5.4.1 - Cross-Site Request Forgery leading to Plugin Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5086b8d-6c74-4970-9937-5ddc5b528495?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weight-based-shipping-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/weight-based-shipping-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weight-based-shipping-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weight-based-shipping-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weight-based-shipping-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/weixin-robot-advanced-2bcf120ca9cfae0292d17d841a512698.yaml b/nuclei-templates/cve-less/plugins/weixin-robot-advanced-2bcf120ca9cfae0292d17d841a512698.yaml new file mode 100644 index 0000000000..d0b22ead5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/weixin-robot-advanced-2bcf120ca9cfae0292d17d841a512698.yaml @@ -0,0 +1,58 @@ +id: weixin-robot-advanced-2bcf120ca9cfae0292d17d841a512698 + +info: + name: > + 微信机器人高级版 <= 6.2.1 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d2a238f-7192-49f0-be2e-3a35fca651d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/weixin-robot-advanced/" + google-query: inurl:"/wp-content/plugins/weixin-robot-advanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,weixin-robot-advanced,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/weixin-robot-advanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weixin-robot-advanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/welcome-email-editor-3d2b6fc11dbb30b7c1a2b1d4703e5965.yaml b/nuclei-templates/cve-less/plugins/welcome-email-editor-3d2b6fc11dbb30b7c1a2b1d4703e5965.yaml new file mode 100644 index 0000000000..4aa4f16f1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/welcome-email-editor-3d2b6fc11dbb30b7c1a2b1d4703e5965.yaml @@ -0,0 +1,58 @@ +id: welcome-email-editor-3d2b6fc11dbb30b7c1a2b1d4703e5965 + +info: + name: > + Swift SMTP <= 5.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b9ed184-814d-46cb-979c-908bc9359fae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/welcome-email-editor/" + google-query: inurl:"/wp-content/plugins/welcome-email-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,welcome-email-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/welcome-email-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "welcome-email-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/welcome-email-editor-9ad568f26d284db1bbd80573c9ce9895.yaml b/nuclei-templates/cve-less/plugins/welcome-email-editor-9ad568f26d284db1bbd80573c9ce9895.yaml new file mode 100644 index 0000000000..5b758eeae3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/welcome-email-editor-9ad568f26d284db1bbd80573c9ce9895.yaml @@ -0,0 +1,58 @@ +id: welcome-email-editor-9ad568f26d284db1bbd80573c9ce9895 + +info: + name: > + Welcome Email Editor <= 5.0.5 - Missing Authorization via ajax_handler + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/943cd10b-1b58-4803-ba6f-291f73353422?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/welcome-email-editor/" + google-query: inurl:"/wp-content/plugins/welcome-email-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,welcome-email-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/welcome-email-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "welcome-email-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wemail-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wemail-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..cd484e984e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wemail-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wemail-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wemail/" + google-query: inurl:"/wp-content/plugins/wemail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wemail,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wemail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wemail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wemail-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wemail-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..bbb88a8bca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wemail-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wemail-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wemail/" + google-query: inurl:"/wp-content/plugins/wemail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wemail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wemail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wemail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wemanage-app-worker-5b8de369a947d5ef9762408c0a15df35.yaml b/nuclei-templates/cve-less/plugins/wemanage-app-worker-5b8de369a947d5ef9762408c0a15df35.yaml new file mode 100644 index 0000000000..f3f78b3b06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wemanage-app-worker-5b8de369a947d5ef9762408c0a15df35.yaml @@ -0,0 +1,58 @@ +id: wemanage-app-worker-5b8de369a947d5ef9762408c0a15df35 + +info: + name: > + Management App for WooCommerce – Order notifications, Order management, Lead management, Uptime Monitoring <= 1.2.2 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4219c10-9d2a-429d-9ac7-61efc02bd4cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wemanage-app-worker/" + google-query: inurl:"/wp-content/plugins/wemanage-app-worker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wemanage-app-worker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wemanage-app-worker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wemanage-app-worker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wen-responsive-columns-c849c5ba3c9b4616d8436c9196e9a011.yaml b/nuclei-templates/cve-less/plugins/wen-responsive-columns-c849c5ba3c9b4616d8436c9196e9a011.yaml new file mode 100644 index 0000000000..36e103167d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wen-responsive-columns-c849c5ba3c9b4616d8436c9196e9a011.yaml @@ -0,0 +1,58 @@ +id: wen-responsive-columns-c849c5ba3c9b4616d8436c9196e9a011 + +info: + name: > + WEN Responsive Columns <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9755323f-42bd-491d-8d82-b1905eed0d9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wen-responsive-columns/" + google-query: inurl:"/wp-content/plugins/wen-responsive-columns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wen-responsive-columns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wen-responsive-columns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wen-responsive-columns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wens-responsive-column-layout-shortcodes-a04fa743a93c3af81940f7c153cec33e.yaml b/nuclei-templates/cve-less/plugins/wens-responsive-column-layout-shortcodes-a04fa743a93c3af81940f7c153cec33e.yaml new file mode 100644 index 0000000000..17aff97d93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wens-responsive-column-layout-shortcodes-a04fa743a93c3af81940f7c153cec33e.yaml @@ -0,0 +1,58 @@ +id: wens-responsive-column-layout-shortcodes-a04fa743a93c3af81940f7c153cec33e + +info: + name: > + eVision Responsive Column Layout Shortcodes <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c47e9220-d7d7-4a66-b555-8fa837d45d59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wens-responsive-column-layout-shortcodes/" + google-query: inurl:"/wp-content/plugins/wens-responsive-column-layout-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wens-responsive-column-layout-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wens-responsive-column-layout-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wens-responsive-column-layout-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wepos-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wepos-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..28a2460184 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wepos-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wepos-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wepos/" + google-query: inurl:"/wp-content/plugins/wepos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wepos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wepos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wepos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wepos-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wepos-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..720f16fe20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wepos-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wepos-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wepos/" + google-query: inurl:"/wp-content/plugins/wepos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wepos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wepos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wepos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wesecur-security-b205c6392eb0136cf0df5ea96fc73a56.yaml b/nuclei-templates/cve-less/plugins/wesecur-security-b205c6392eb0136cf0df5ea96fc73a56.yaml new file mode 100644 index 0000000000..11bd473174 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wesecur-security-b205c6392eb0136cf0df5ea96fc73a56.yaml @@ -0,0 +1,58 @@ +id: wesecur-security-b205c6392eb0136cf0df5ea96fc73a56 + +info: + name: > + WeSecur Security <= 1.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d732ea2d-c763-4735-b541-6c5fd5167cb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wesecur-security/" + google-query: inurl:"/wp-content/plugins/wesecur-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wesecur-security,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wesecur-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wesecur-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wf-cookie-consent-0533a60780cf9a211a23b93d336f2dae.yaml b/nuclei-templates/cve-less/plugins/wf-cookie-consent-0533a60780cf9a211a23b93d336f2dae.yaml new file mode 100644 index 0000000000..b95004cf16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wf-cookie-consent-0533a60780cf9a211a23b93d336f2dae.yaml @@ -0,0 +1,58 @@ +id: wf-cookie-consent-0533a60780cf9a211a23b93d336f2dae + +info: + name: > + WF Cookie Consent <= 1.1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00fa2ca1-a1bd-4b58-ae64-1b61534c1e3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wf-cookie-consent/" + google-query: inurl:"/wp-content/plugins/wf-cookie-consent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wf-cookie-consent,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wf-cookie-consent/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wf-cookie-consent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wgauge-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wgauge-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c870bf595e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wgauge-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wgauge-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wgauge/" + google-query: inurl:"/wp-content/plugins/wgauge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wgauge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wgauge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wgauge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wgauge-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wgauge-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..aa20979c75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wgauge-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wgauge-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wgauge/" + google-query: inurl:"/wp-content/plugins/wgauge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wgauge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wgauge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wgauge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wh-testimonials-d863abcdf052b29c71bf4158cc87a13f.yaml b/nuclei-templates/cve-less/plugins/wh-testimonials-d863abcdf052b29c71bf4158cc87a13f.yaml new file mode 100644 index 0000000000..9a9d352345 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wh-testimonials-d863abcdf052b29c71bf4158cc87a13f.yaml @@ -0,0 +1,58 @@ +id: wh-testimonials-d863abcdf052b29c71bf4158cc87a13f + +info: + name: > + WH Testimonials <= 3.0.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6fe5f1a-787e-4662-915f-c6f04961e194?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wh-testimonials/" + google-query: inurl:"/wp-content/plugins/wh-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wh-testimonials,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wh-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wh-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wha-crossword-363aa4459971c85215990cb3c8eb5496.yaml b/nuclei-templates/cve-less/plugins/wha-crossword-363aa4459971c85215990cb3c8eb5496.yaml new file mode 100644 index 0000000000..7080db7143 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wha-crossword-363aa4459971c85215990cb3c8eb5496.yaml @@ -0,0 +1,58 @@ +id: wha-crossword-363aa4459971c85215990cb3c8eb5496 + +info: + name: > + WHA Crossword <= 1.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16b0947e-3bb2-4150-b810-2e77de3e75da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wha-crossword/" + google-query: inurl:"/wp-content/plugins/wha-crossword/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wha-crossword,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wha-crossword/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wha-crossword" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wha-crossword-c67d4649ea18743c5c7a2e3701c4b78b.yaml b/nuclei-templates/cve-less/plugins/wha-crossword-c67d4649ea18743c5c7a2e3701c4b78b.yaml new file mode 100644 index 0000000000..992bba929f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wha-crossword-c67d4649ea18743c5c7a2e3701c4b78b.yaml @@ -0,0 +1,58 @@ +id: wha-crossword-c67d4649ea18743c5c7a2e3701c4b78b + +info: + name: > + WHA Crossword <= 1.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb7316cd-8a15-4b81-b57c-b8e4adcaf1ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wha-crossword/" + google-query: inurl:"/wp-content/plugins/wha-crossword/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wha-crossword,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wha-crossword/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wha-crossword" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wha-puzzle-054cca949d3d20e70e41393d4d7ba0fa.yaml b/nuclei-templates/cve-less/plugins/wha-puzzle-054cca949d3d20e70e41393d4d7ba0fa.yaml new file mode 100644 index 0000000000..333784135d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wha-puzzle-054cca949d3d20e70e41393d4d7ba0fa.yaml @@ -0,0 +1,58 @@ +id: wha-puzzle-054cca949d3d20e70e41393d4d7ba0fa + +info: + name: > + WHA Puzzle <= 1.0.9 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36f7eb57-76ac-4130-abb3-6521f9d042ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wha-puzzle/" + google-query: inurl:"/wp-content/plugins/wha-puzzle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wha-puzzle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wha-puzzle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wha-puzzle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wha-wordsearch-6fde6e46382738cc90cbede415252e23.yaml b/nuclei-templates/cve-less/plugins/wha-wordsearch-6fde6e46382738cc90cbede415252e23.yaml new file mode 100644 index 0000000000..525b373114 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wha-wordsearch-6fde6e46382738cc90cbede415252e23.yaml @@ -0,0 +1,58 @@ +id: wha-wordsearch-6fde6e46382738cc90cbede415252e23 + +info: + name: > + Word Search Puzzles game <= 2.0.1 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7566beda-649f-4dfc-860f-fb1c48809461?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wha-wordsearch/" + google-query: inurl:"/wp-content/plugins/wha-wordsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wha-wordsearch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wha-wordsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wha-wordsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wha-wordsearch-9c32419221ff25df45de1a2bef4b454c.yaml b/nuclei-templates/cve-less/plugins/wha-wordsearch-9c32419221ff25df45de1a2bef4b454c.yaml new file mode 100644 index 0000000000..bfba1ae187 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wha-wordsearch-9c32419221ff25df45de1a2bef4b454c.yaml @@ -0,0 +1,58 @@ +id: wha-wordsearch-9c32419221ff25df45de1a2bef4b454c + +info: + name: > + Word Search Puzzles game <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9efbbb82-8127-4f11-84d4-2ce27f2cbefe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wha-wordsearch/" + google-query: inurl:"/wp-content/plugins/wha-wordsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wha-wordsearch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wha-wordsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wha-wordsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whats-new-genarator-4f768a2e6ed5431813ce2815c2416c7e.yaml b/nuclei-templates/cve-less/plugins/whats-new-genarator-4f768a2e6ed5431813ce2815c2416c7e.yaml new file mode 100644 index 0000000000..490f1c0591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whats-new-genarator-4f768a2e6ed5431813ce2815c2416c7e.yaml @@ -0,0 +1,58 @@ +id: whats-new-genarator-4f768a2e6ed5431813ce2815c2416c7e + +info: + name: > + What's New Generator <= 2.0.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da11abe7-49fa-496b-bcd7-c666eef63896?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whats-new-genarator/" + google-query: inurl:"/wp-content/plugins/whats-new-genarator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whats-new-genarator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whats-new-genarator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whats-new-genarator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whatsapp-35617caa27e1534d5543f128d4268283.yaml b/nuclei-templates/cve-less/plugins/whatsapp-35617caa27e1534d5543f128d4268283.yaml new file mode 100644 index 0000000000..fcc06e4a9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whatsapp-35617caa27e1534d5543f128d4268283.yaml @@ -0,0 +1,58 @@ +id: whatsapp-35617caa27e1534d5543f128d4268283 + +info: + name: > + WhatsApp Share Button <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77911b0f-c028-49ae-b85e-15909d806e30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whatsapp/" + google-query: inurl:"/wp-content/plugins/whatsapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whatsapp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whatsapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whatsapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whatshelp-chat-button-5010f538683e4ce673730780a1277a01.yaml b/nuclei-templates/cve-less/plugins/whatshelp-chat-button-5010f538683e4ce673730780a1277a01.yaml new file mode 100644 index 0000000000..a5c5842e63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whatshelp-chat-button-5010f538683e4ce673730780a1277a01.yaml @@ -0,0 +1,58 @@ +id: whatshelp-chat-button-5010f538683e4ce673730780a1277a01 + +info: + name: > + Chat Button <= 1.8.9.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f2ed813-3bf3-4ee3-a030-778cbd93bba3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whatshelp-chat-button/" + google-query: inurl:"/wp-content/plugins/whatshelp-chat-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whatshelp-chat-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whatshelp-chat-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whatshelp-chat-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/when-last-login-e5890c71dc0cd4588ccd030aa7bc5fbd.yaml b/nuclei-templates/cve-less/plugins/when-last-login-e5890c71dc0cd4588ccd030aa7bc5fbd.yaml new file mode 100644 index 0000000000..8099e12221 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/when-last-login-e5890c71dc0cd4588ccd030aa7bc5fbd.yaml @@ -0,0 +1,58 @@ +id: when-last-login-e5890c71dc0cd4588ccd030aa7bc5fbd + +info: + name: > + When Last Login <= 1.2.1 - Cross-Site Request Forgery via wll_hide_subscription_notice + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81638472-b635-4100-8fb9-3daf35fa172e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/when-last-login/" + google-query: inurl:"/wp-content/plugins/when-last-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,when-last-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/when-last-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "when-last-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/which-template-file-93c626578b9ec2f6ee1b804fc44e2116.yaml b/nuclei-templates/cve-less/plugins/which-template-file-93c626578b9ec2f6ee1b804fc44e2116.yaml new file mode 100644 index 0000000000..8c01667996 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/which-template-file-93c626578b9ec2f6ee1b804fc44e2116.yaml @@ -0,0 +1,58 @@ +id: which-template-file-93c626578b9ec2f6ee1b804fc44e2116 + +info: + name: > + which template file <= 4.8.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/279314a4-2d70-4036-ae9a-27bb694b03db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/which-template-file/" + google-query: inurl:"/wp-content/plugins/which-template-file/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,which-template-file,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/which-template-file/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "which-template-file" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/which-template-file-c6789a8c4ddf7f4894074b67cbbeecc0.yaml b/nuclei-templates/cve-less/plugins/which-template-file-c6789a8c4ddf7f4894074b67cbbeecc0.yaml new file mode 100644 index 0000000000..76ad283463 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/which-template-file-c6789a8c4ddf7f4894074b67cbbeecc0.yaml @@ -0,0 +1,58 @@ +id: which-template-file-c6789a8c4ddf7f4894074b67cbbeecc0 + +info: + name: > + which template file <= 5.0.0 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be3208c8-aceb-4ac9-91e1-d5de5a85f74d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/which-template-file/" + google-query: inurl:"/wp-content/plugins/which-template-file/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,which-template-file,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/which-template-file/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "which-template-file" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-label-5163255cf1a46ed12d467697bfe3f205.yaml b/nuclei-templates/cve-less/plugins/white-label-5163255cf1a46ed12d467697bfe3f205.yaml new file mode 100644 index 0000000000..710544daf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-label-5163255cf1a46ed12d467697bfe3f205.yaml @@ -0,0 +1,58 @@ +id: white-label-5163255cf1a46ed12d467697bfe3f205 + +info: + name: > + White Label <= 2.9.0 - Cross-Site Request Forgery via white_label_reset_wl_admins + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/383da457-b930-470c-a68a-db3e87af7a80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-label/" + google-query: inurl:"/wp-content/plugins/white-label/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-label,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-label/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-label" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-label-branding-elementor-e6a4bf4b7def7461fd0f2bf14330f22c.yaml b/nuclei-templates/cve-less/plugins/white-label-branding-elementor-e6a4bf4b7def7461fd0f2bf14330f22c.yaml new file mode 100644 index 0000000000..2c1c35625e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-label-branding-elementor-e6a4bf4b7def7461fd0f2bf14330f22c.yaml @@ -0,0 +1,58 @@ +id: white-label-branding-elementor-e6a4bf4b7def7461fd0f2bf14330f22c + +info: + name: > + White Label Branding for Elementor Page Builder <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e187b71-860e-4404-bbe2-193c6ecfd485?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-label-branding-elementor/" + google-query: inurl:"/wp-content/plugins/white-label-branding-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-label-branding-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-label-branding-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-label-branding-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-label-cms-5442adae59d3e3922670d74f56222668.yaml b/nuclei-templates/cve-less/plugins/white-label-cms-5442adae59d3e3922670d74f56222668.yaml new file mode 100644 index 0000000000..688b26f76d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-label-cms-5442adae59d3e3922670d74f56222668.yaml @@ -0,0 +1,58 @@ +id: white-label-cms-5442adae59d3e3922670d74f56222668 + +info: + name: > + White Label CMS <= 2.7.3 - Missing Authorization to Plugin Settings Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13a206ea-0890-4535-9da7-54a7a45f0452?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-label-cms/" + google-query: inurl:"/wp-content/plugins/white-label-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-label-cms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-label-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-label-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-label-cms-7987b5631645ef011c12aa6fb80cc221.yaml b/nuclei-templates/cve-less/plugins/white-label-cms-7987b5631645ef011c12aa6fb80cc221.yaml new file mode 100644 index 0000000000..de9316ebf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-label-cms-7987b5631645ef011c12aa6fb80cc221.yaml @@ -0,0 +1,58 @@ +id: white-label-cms-7987b5631645ef011c12aa6fb80cc221 + +info: + name: > + White Label CMS < 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62dacee5-9b55-4d0e-aa35-d97a1666f9e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-label-cms/" + google-query: inurl:"/wp-content/plugins/white-label-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-label-cms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-label-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-label-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-label-cms-84f16791aafe87d42cf363331892fb65.yaml b/nuclei-templates/cve-less/plugins/white-label-cms-84f16791aafe87d42cf363331892fb65.yaml new file mode 100644 index 0000000000..b85d25aaf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-label-cms-84f16791aafe87d42cf363331892fb65.yaml @@ -0,0 +1,58 @@ +id: white-label-cms-84f16791aafe87d42cf363331892fb65 + +info: + name: > + White Label CMS <= 2.4 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cae74177-7bfc-4fe2-9d45-0bc567a17909?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-label-cms/" + google-query: inurl:"/wp-content/plugins/white-label-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-label-cms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-label-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-label-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-label-cms-c371077c38bdbe69f0a63c723cbb2e25.yaml b/nuclei-templates/cve-less/plugins/white-label-cms-c371077c38bdbe69f0a63c723cbb2e25.yaml new file mode 100644 index 0000000000..06ad75e790 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-label-cms-c371077c38bdbe69f0a63c723cbb2e25.yaml @@ -0,0 +1,58 @@ +id: white-label-cms-c371077c38bdbe69f0a63c723cbb2e25 + +info: + name: > + White Label CMS < 1.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97fc00d0-ca3d-462a-ac9f-bfac4c882cc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-label-cms/" + google-query: inurl:"/wp-content/plugins/white-label-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-label-cms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-label-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-label-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-label-cms-ed7d98d793a5f352e711f6139453960a.yaml b/nuclei-templates/cve-less/plugins/white-label-cms-ed7d98d793a5f352e711f6139453960a.yaml new file mode 100644 index 0000000000..fa5a719ef8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-label-cms-ed7d98d793a5f352e711f6139453960a.yaml @@ -0,0 +1,58 @@ +id: white-label-cms-ed7d98d793a5f352e711f6139453960a + +info: + name: > + White Label MS <= 2.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08f59eb8-8865-401f-bb02-3192184e0415?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-label-cms/" + google-query: inurl:"/wp-content/plugins/white-label-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-label-cms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-label-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-label-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-label-cms-fbf7c3cd22ded693b164bcbaa6ae36f2.yaml b/nuclei-templates/cve-less/plugins/white-label-cms-fbf7c3cd22ded693b164bcbaa6ae36f2.yaml new file mode 100644 index 0000000000..096a6069bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-label-cms-fbf7c3cd22ded693b164bcbaa6ae36f2.yaml @@ -0,0 +1,58 @@ +id: white-label-cms-fbf7c3cd22ded693b164bcbaa6ae36f2 + +info: + name: > + White Label CMS <= 1.5.2 - Cross-Site Request Forgery leading to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b36fcc5-1f09-43b9-8877-7af6c7652db7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-label-cms/" + google-query: inurl:"/wp-content/plugins/white-label-cms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-label-cms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-label-cms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-label-cms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/white-page-publication-4a259e9179bf39bf0792ee310ede4901.yaml b/nuclei-templates/cve-less/plugins/white-page-publication-4a259e9179bf39bf0792ee310ede4901.yaml new file mode 100644 index 0000000000..40caca9664 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/white-page-publication-4a259e9179bf39bf0792ee310ede4901.yaml @@ -0,0 +1,58 @@ +id: white-page-publication-4a259e9179bf39bf0792ee310ede4901 + +info: + name: > + WhitePage <= 1.1.5 - Cross-Site Request Forgery via params_api_form.php + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b377236-bb56-4d31-837a-c5064d46a6c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/white-page-publication/" + google-query: inurl:"/wp-content/plugins/white-page-publication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,white-page-publication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/white-page-publication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "white-page-publication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whizz-8475202b9f0509bc3f7f733c6c0c1b7b.yaml b/nuclei-templates/cve-less/plugins/whizz-8475202b9f0509bc3f7f733c6c0c1b7b.yaml new file mode 100644 index 0000000000..ba91cb2204 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whizz-8475202b9f0509bc3f7f733c6c0c1b7b.yaml @@ -0,0 +1,58 @@ +id: whizz-8475202b9f0509bc3f7f733c6c0c1b7b + +info: + name: > + WHIZZ < 1.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3abac0a1-a696-48b1-88d9-d0b102c82ac3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whizz/" + google-query: inurl:"/wp-content/plugins/whizz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whizz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whizz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whizz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whizz-b7bde08d72b1bc77eb8f6cd0fab4feae.yaml b/nuclei-templates/cve-less/plugins/whizz-b7bde08d72b1bc77eb8f6cd0fab4feae.yaml new file mode 100644 index 0000000000..82c433951d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whizz-b7bde08d72b1bc77eb8f6cd0fab4feae.yaml @@ -0,0 +1,58 @@ +id: whizz-b7bde08d72b1bc77eb8f6cd0fab4feae + +info: + name: > + WHIZZ < 1.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acde42e4-7445-427a-b4fa-9ef225049bb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whizz/" + google-query: inurl:"/wp-content/plugins/whizz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whizz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whizz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whizz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whizzy-41404190c9a7f512053b049611a997bf.yaml b/nuclei-templates/cve-less/plugins/whizzy-41404190c9a7f512053b049611a997bf.yaml new file mode 100644 index 0000000000..1caf7552b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whizzy-41404190c9a7f512053b049611a997bf.yaml @@ -0,0 +1,58 @@ +id: whizzy-41404190c9a7f512053b049611a997bf + +info: + name: > + Whizzy <= 1.1.18 - Authenticated (Subscriber+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ededa54-654f-48dc-87d5-7321e041e6fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whizzy/" + google-query: inurl:"/wp-content/plugins/whizzy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whizzy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whizzy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whizzy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whizzy-6ab5c2b9e9da3c807bbb85a9044847fe.yaml b/nuclei-templates/cve-less/plugins/whizzy-6ab5c2b9e9da3c807bbb85a9044847fe.yaml new file mode 100644 index 0000000000..4dbaf95ac2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whizzy-6ab5c2b9e9da3c807bbb85a9044847fe.yaml @@ -0,0 +1,58 @@ +id: whizzy-6ab5c2b9e9da3c807bbb85a9044847fe + +info: + name: > + Whizzy <= 1.1.18 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8278f5bf-2f40-4f3d-b38d-0ecea9d47f83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whizzy/" + google-query: inurl:"/wp-content/plugins/whizzy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whizzy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whizzy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whizzy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whmcs-bridge-239a7878d9add7cd58180811b224bdbf.yaml b/nuclei-templates/cve-less/plugins/whmcs-bridge-239a7878d9add7cd58180811b224bdbf.yaml new file mode 100644 index 0000000000..7c5d34caef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whmcs-bridge-239a7878d9add7cd58180811b224bdbf.yaml @@ -0,0 +1,58 @@ +id: whmcs-bridge-239a7878d9add7cd58180811b224bdbf + +info: + name: > + WHMCS Bridge <= 6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f08fd6e-4c1b-40e7-92ba-72cdd03ff585?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whmcs-bridge/" + google-query: inurl:"/wp-content/plugins/whmcs-bridge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whmcs-bridge,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whmcs-bridge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whmcs-bridge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whmcs-bridge-f7ea807ec289aa8d8be34a1208e9ebb9.yaml b/nuclei-templates/cve-less/plugins/whmcs-bridge-f7ea807ec289aa8d8be34a1208e9ebb9.yaml new file mode 100644 index 0000000000..1e501eaa64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whmcs-bridge-f7ea807ec289aa8d8be34a1208e9ebb9.yaml @@ -0,0 +1,58 @@ +id: whmcs-bridge-f7ea807ec289aa8d8be34a1208e9ebb9 + +info: + name: > + WHMCS Bridge <= 6.1 Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24ba85a0-dbc7-4c9d-a67f-d449c1d275ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whmcs-bridge/" + google-query: inurl:"/wp-content/plugins/whmcs-bridge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whmcs-bridge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whmcs-bridge/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whmcs-bridge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-4d3c4e1a467914ea53537050432b3938.yaml b/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-4d3c4e1a467914ea53537050432b3938.yaml new file mode 100644 index 0000000000..7be6604170 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-4d3c4e1a467914ea53537050432b3938.yaml @@ -0,0 +1,58 @@ +id: who-hit-the-page-hit-counter-4d3c4e1a467914ea53537050432b3938 + +info: + name: > + Who Hit The Page – Hit Counter <= 1.4.14.3 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54c94de4-59b4-4f0b-85db-2074a41d04f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/who-hit-the-page-hit-counter/" + google-query: inurl:"/wp-content/plugins/who-hit-the-page-hit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,who-hit-the-page-hit-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/who-hit-the-page-hit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "who-hit-the-page-hit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-a52b3eb784f2d8ce0a9c250a80d5caf4.yaml b/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-a52b3eb784f2d8ce0a9c250a80d5caf4.yaml new file mode 100644 index 0000000000..22800b9d99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-a52b3eb784f2d8ce0a9c250a80d5caf4.yaml @@ -0,0 +1,58 @@ +id: who-hit-the-page-hit-counter-a52b3eb784f2d8ce0a9c250a80d5caf4 + +info: + name: > + Who Hit The Page – Hit Counter <= 1.4.14.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/714d7811-0425-4833-a7b2-a408799181e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/who-hit-the-page-hit-counter/" + google-query: inurl:"/wp-content/plugins/who-hit-the-page-hit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,who-hit-the-page-hit-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/who-hit-the-page-hit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "who-hit-the-page-hit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-de2e48f236e18fa41cbab430238c4a68.yaml b/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-de2e48f236e18fa41cbab430238c4a68.yaml new file mode 100644 index 0000000000..93f6847e80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/who-hit-the-page-hit-counter-de2e48f236e18fa41cbab430238c4a68.yaml @@ -0,0 +1,58 @@ +id: who-hit-the-page-hit-counter-de2e48f236e18fa41cbab430238c4a68 + +info: + name: > + Who Hit The Page – Hit Counter <= 1.4.14.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07663fae-53e9-45d2-834c-6e1392484e0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/who-hit-the-page-hit-counter/" + google-query: inurl:"/wp-content/plugins/who-hit-the-page-hit-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,who-hit-the-page-hit-counter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/who-hit-the-page-hit-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "who-hit-the-page-hit-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wholesale-market-8c2cb48bfeb76279d7566cc81ccb49f0.yaml b/nuclei-templates/cve-less/plugins/wholesale-market-8c2cb48bfeb76279d7566cc81ccb49f0.yaml new file mode 100644 index 0000000000..435682177e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wholesale-market-8c2cb48bfeb76279d7566cc81ccb49f0.yaml @@ -0,0 +1,58 @@ +id: wholesale-market-8c2cb48bfeb76279d7566cc81ccb49f0 + +info: + name: > + Wholesale Market <= 2.2.0 - Information Disclosure via Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adcbb70e-c99f-4f05-8869-50cf16f6de79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wholesale-market/" + google-query: inurl:"/wp-content/plugins/wholesale-market/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wholesale-market,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wholesale-market/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wholesale-market" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-519740287ea130c472e2b41307bc4416.yaml b/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-519740287ea130c472e2b41307bc4416.yaml new file mode 100644 index 0000000000..d4635a09a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-519740287ea130c472e2b41307bc4416.yaml @@ -0,0 +1,58 @@ +id: wholesale-market-for-woocommerce-519740287ea130c472e2b41307bc4416 + +info: + name: > + Wholesale Market for WooCommerce <= 1.0.7 - Authenticated (Administrator+) Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52f820c5-d4ce-4925-a055-a7c75a320971?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wholesale-market-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/wholesale-market-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wholesale-market-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wholesale-market-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wholesale-market-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-cb9daa85351403585e36c2f7a51816cd.yaml b/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-cb9daa85351403585e36c2f7a51816cd.yaml new file mode 100644 index 0000000000..38cfd216b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-cb9daa85351403585e36c2f7a51816cd.yaml @@ -0,0 +1,58 @@ +id: wholesale-market-for-woocommerce-cb9daa85351403585e36c2f7a51816cd + +info: + name: > + Wholesale Market for WooCommerce <= 1.0.6 - Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/959f7e13-ef58-4b02-a721-7bb10373aaaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wholesale-market-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/wholesale-market-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wholesale-market-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wholesale-market-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wholesale-market-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-f7ab3183d6a1c8faf8c7fa4cce5c285d.yaml b/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-f7ab3183d6a1c8faf8c7fa4cce5c285d.yaml new file mode 100644 index 0000000000..d2cc0c70df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wholesale-market-for-woocommerce-f7ab3183d6a1c8faf8c7fa4cce5c285d.yaml @@ -0,0 +1,58 @@ +id: wholesale-market-for-woocommerce-f7ab3183d6a1c8faf8c7fa4cce5c285d + +info: + name: > + Wholesale Market for WooCommerce < 2.0.0 - Authenticated (Administrator+) Arbitrary Log File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8436ba39-b236-4d76-95b6-d2bed3728d8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wholesale-market-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/wholesale-market-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wholesale-market-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wholesale-market-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wholesale-market-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wholesalex-315c913a950b5ab55bf23c5c0352b368.yaml b/nuclei-templates/cve-less/plugins/wholesalex-315c913a950b5ab55bf23c5c0352b368.yaml new file mode 100644 index 0000000000..dda01e274a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wholesalex-315c913a950b5ab55bf23c5c0352b368.yaml @@ -0,0 +1,58 @@ +id: wholesalex-315c913a950b5ab55bf23c5c0352b368 + +info: + name: > + WholesaleX <= 1.3.2 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cf7ec81-625b-4abf-9304-256701e933ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wholesalex/" + google-query: inurl:"/wp-content/plugins/wholesalex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wholesalex,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wholesalex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wholesalex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wholesalex-6923c1be5ff9c6a809243f9a5e70bfcf.yaml b/nuclei-templates/cve-less/plugins/wholesalex-6923c1be5ff9c6a809243f9a5e70bfcf.yaml new file mode 100644 index 0000000000..03d03107ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wholesalex-6923c1be5ff9c6a809243f9a5e70bfcf.yaml @@ -0,0 +1,58 @@ +id: wholesalex-6923c1be5ff9c6a809243f9a5e70bfcf + +info: + name: > + WholesaleX – WooCommerce Wholesale Plugin (Wholesale Prices, Dynamic Pricing, Tiered Pricing) <= 1.3.2 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4bce9d1-38b9-4c25-b5dc-fd9dedfc3ede?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wholesalex/" + google-query: inurl:"/wp-content/plugins/wholesalex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wholesalex,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wholesalex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wholesalex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wholesalex-dee36755177c71d5de078f0f334f5c8c.yaml b/nuclei-templates/cve-less/plugins/wholesalex-dee36755177c71d5de078f0f334f5c8c.yaml new file mode 100644 index 0000000000..0754ca834c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wholesalex-dee36755177c71d5de078f0f334f5c8c.yaml @@ -0,0 +1,58 @@ +id: wholesalex-dee36755177c71d5de078f0f334f5c8c + +info: + name: > + WholesaleX <= 1.3.1 - Authenticated(Subscriber+) Missing Authorization via multiple AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64df8260-603b-48ba-b88b-f89994dd8329?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wholesalex/" + google-query: inurl:"/wp-content/plugins/wholesalex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wholesalex,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wholesalex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wholesalex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wholesalex-fcf9aaed3d1b8f79608285d878f326bc.yaml b/nuclei-templates/cve-less/plugins/wholesalex-fcf9aaed3d1b8f79608285d878f326bc.yaml new file mode 100644 index 0000000000..344418abc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wholesalex-fcf9aaed3d1b8f79608285d878f326bc.yaml @@ -0,0 +1,58 @@ +id: wholesalex-fcf9aaed3d1b8f79608285d878f326bc + +info: + name: > + WholesaleX <= 1.3.1 - Sensitive Information Exposure via export_users + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/710f663a-c8ff-457b-8b3f-4f6601ba321f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wholesalex/" + google-query: inurl:"/wp-content/plugins/wholesalex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wholesalex,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wholesalex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wholesalex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whydowork-adsense-13ab8a3f776049bebae928b8bd527987.yaml b/nuclei-templates/cve-less/plugins/whydowork-adsense-13ab8a3f776049bebae928b8bd527987.yaml new file mode 100644 index 0000000000..dcf002a78d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whydowork-adsense-13ab8a3f776049bebae928b8bd527987.yaml @@ -0,0 +1,58 @@ +id: whydowork-adsense-13ab8a3f776049bebae928b8bd527987 + +info: + name: > + WhyDoWork AdSense <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd36530d-4165-4b98-a75f-b9c88178a5b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whydowork-adsense/" + google-query: inurl:"/wp-content/plugins/whydowork-adsense/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whydowork-adsense,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whydowork-adsense/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whydowork-adsense" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/whydowork-adsense-29fe63e56224db942ac29ad8bcab73cb.yaml b/nuclei-templates/cve-less/plugins/whydowork-adsense-29fe63e56224db942ac29ad8bcab73cb.yaml new file mode 100644 index 0000000000..4df2b9b2f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/whydowork-adsense-29fe63e56224db942ac29ad8bcab73cb.yaml @@ -0,0 +1,58 @@ +id: whydowork-adsense-29fe63e56224db942ac29ad8bcab73cb + +info: + name: > + WhyDoWork AdSense <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0719db26-da88-4bda-ae83-f489591c8128?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/whydowork-adsense/" + google-query: inurl:"/wp-content/plugins/whydowork-adsense/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,whydowork-adsense,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/whydowork-adsense/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "whydowork-adsense" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-094fc0c37d514333a53dda18143a300a.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-094fc0c37d514333a53dda18143a300a.yaml new file mode 100644 index 0000000000..fc152fbc28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-094fc0c37d514333a53dda18143a300a.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-094fc0c37d514333a53dda18143a300a + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization on ajax_save_sort_order + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b26604b-2423-4130-b0ef-8f63a392c760?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-0b0e708bccfb3aa959792527101f43e8.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-0b0e708bccfb3aa959792527101f43e8.yaml new file mode 100644 index 0000000000..8826aae512 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-0b0e708bccfb3aa959792527101f43e8.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-0b0e708bccfb3aa959792527101f43e8 + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization on ajax_edit_folder + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ad60a11-e307-4ec9-9099-091a87ff1d3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-192adf4b1d06945fee5aacceae89bc97.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-192adf4b1d06945fee5aacceae89bc97.yaml new file mode 100644 index 0000000000..8864f59cff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-192adf4b1d06945fee5aacceae89bc97.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-192adf4b1d06945fee5aacceae89bc97 + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_save_folder_order + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4104f69f-b185-498a-aabf-2126ffb94ab3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-1ae6c66606c2f76330e0314294bf793f.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-1ae6c66606c2f76330e0314294bf793f.yaml new file mode 100644 index 0000000000..7a09f1613a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-1ae6c66606c2f76330e0314294bf793f.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-1ae6c66606c2f76330e0314294bf793f + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery on ajax_move_object + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc01108f-e781-484b-997a-c1d4e218a3f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-30f703a8acc3080fb74debd07614d86d.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-30f703a8acc3080fb74debd07614d86d.yaml new file mode 100644 index 0000000000..e21b4a2cfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-30f703a8acc3080fb74debd07614d86d.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-30f703a8acc3080fb74debd07614d86d + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization on ajax_add_folder + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2764b360-228d-48c1-8a29-d3764e532799?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-3831d6e441ebd610665743a8c0a63dc7.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-3831d6e441ebd610665743a8c0a63dc7.yaml new file mode 100644 index 0000000000..2f8eb881e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-3831d6e441ebd610665743a8c0a63dc7.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-3831d6e441ebd610665743a8c0a63dc7 + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization via ajax_unassign_folders + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29358ea9-21b7-4294-8fc9-0d38e689cf53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-38cfa7354fceb66defa5b11a8b1426c0.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-38cfa7354fceb66defa5b11a8b1426c0.yaml new file mode 100644 index 0000000000..08b3eb8471 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-38cfa7354fceb66defa5b11a8b1426c0.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-38cfa7354fceb66defa5b11a8b1426c0 + +info: + name: > + Wicked Folders <= 2.18.9 - Subscriber+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edd7f442-32a1-4ce9-bf47-96f313a8d5df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-414ea88c3052f2317af7072cb92eace3.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-414ea88c3052f2317af7072cb92eace3.yaml new file mode 100644 index 0000000000..3524aebafe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-414ea88c3052f2317af7072cb92eace3.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-414ea88c3052f2317af7072cb92eace3 + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization via ajax_save_state + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c43e93-69a3-407e-860e-ab25af5d7177?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-41e14165ad1acfba7a5c854923e3ff08.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-41e14165ad1acfba7a5c854923e3ff08.yaml new file mode 100644 index 0000000000..1ecc155f17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-41e14165ad1acfba7a5c854923e3ff08.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-41e14165ad1acfba7a5c854923e3ff08 + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_save_sort_order + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8dbf54-ea62-4901-b34f-079b708ca0b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-4604c654a4b997b8c024a5034ff5a092.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-4604c654a4b997b8c024a5034ff5a092.yaml new file mode 100644 index 0000000000..da18777295 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-4604c654a4b997b8c024a5034ff5a092.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-4604c654a4b997b8c024a5034ff5a092 + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_unassign_folders + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e52b27fa-10e8-43d0-be29-774c2f5487ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-4d2d5a55f2e91189ca973872c711a490.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-4d2d5a55f2e91189ca973872c711a490.yaml new file mode 100644 index 0000000000..5227fcc462 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-4d2d5a55f2e91189ca973872c711a490.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-4d2d5a55f2e91189ca973872c711a490 + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_clone_folder + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80797183-c69f-4dce-a2e0-52a395ceffaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-5f610251a978e5acf9ae5800b76c24c6.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-5f610251a978e5acf9ae5800b76c24c6.yaml new file mode 100644 index 0000000000..cf81e13a37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-5f610251a978e5acf9ae5800b76c24c6.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-5f610251a978e5acf9ae5800b76c24c6 + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery on ajax_save_folder + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43b43802-f301-4748-98b9-eea78a249355?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-68f67c3c9420931e292f3ba3431422cd.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-68f67c3c9420931e292f3ba3431422cd.yaml new file mode 100644 index 0000000000..9428ac3b53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-68f67c3c9420931e292f3ba3431422cd.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-68f67c3c9420931e292f3ba3431422cd + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_save_state + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/261a1bf0-a147-48c8-878e-f9b725ac74d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-84c888c9934970f66e3e629431140250.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-84c888c9934970f66e3e629431140250.yaml new file mode 100644 index 0000000000..c9f5f43e01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-84c888c9934970f66e3e629431140250.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-84c888c9934970f66e3e629431140250 + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization on ajax_move_object + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0be428ae-40ae-4cc0-82ad-d121b6d2d27e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-893145b250531536b2c0fa0f1e330f2c.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-893145b250531536b2c0fa0f1e330f2c.yaml new file mode 100644 index 0000000000..fb692a3d1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-893145b250531536b2c0fa0f1e330f2c.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-893145b250531536b2c0fa0f1e330f2c + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization on ajax_clone_folder + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3728280-3487-4cb2-8e37-f33811bc0a22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-98f5671f8000cd41848d0242c4d503d1.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-98f5671f8000cd41848d0242c4d503d1.yaml new file mode 100644 index 0000000000..6df43ff7c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-98f5671f8000cd41848d0242c4d503d1.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-98f5671f8000cd41848d0242c4d503d1 + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization on ajax_save_folder + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c26d6de-5653-4be8-9526-39b30cb61625?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-be4129faca04d80ed9ac385cd5b2bcc3.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-be4129faca04d80ed9ac385cd5b2bcc3.yaml new file mode 100644 index 0000000000..ac195ddbb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-be4129faca04d80ed9ac385cd5b2bcc3.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-be4129faca04d80ed9ac385cd5b2bcc3 + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization via ajax_delete_folder + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35fb658f-6ffa-4df7-bfcd-25307d89fc26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-d79b94a0512e6933bbccf753fd89114f.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-d79b94a0512e6933bbccf753fd89114f.yaml new file mode 100644 index 0000000000..a2ef82930c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-d79b94a0512e6933bbccf753fd89114f.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-d79b94a0512e6933bbccf753fd89114f + +info: + name: > + Wicked Folders <= 2.18.16 - Missing Authorization on ajax_save_folder_order + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d392d0b-f286-44da-aa32-a08d0279baed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-de667b04628eecce001a8b74a40e92e3.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-de667b04628eecce001a8b74a40e92e3.yaml new file mode 100644 index 0000000000..657ac82967 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-de667b04628eecce001a8b74a40e92e3.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-de667b04628eecce001a8b74a40e92e3 + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_edit_folder + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51b88442-3961-42e2-8ff4-7726819a7f0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-dfd279bb4131501197e1f533c2de9f14.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-dfd279bb4131501197e1f533c2de9f14.yaml new file mode 100644 index 0000000000..4e95a858a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-dfd279bb4131501197e1f533c2de9f14.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-dfd279bb4131501197e1f533c2de9f14 + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_add_folder + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08c0ea6c-7e2f-482f-b30c-0e3bcd992159?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wicked-folders-e8700910e77f438a47719067618b1f42.yaml b/nuclei-templates/cve-less/plugins/wicked-folders-e8700910e77f438a47719067618b1f42.yaml new file mode 100644 index 0000000000..e69f9c2c0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wicked-folders-e8700910e77f438a47719067618b1f42.yaml @@ -0,0 +1,58 @@ +id: wicked-folders-e8700910e77f438a47719067618b1f42 + +info: + name: > + Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_delete_folder + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62b56928-7125-4211-b233-07b5b51881c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wicked-folders/" + google-query: inurl:"/wp-content/plugins/wicked-folders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wicked-folders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wicked-folders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wicked-folders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-control-powered-by-everyblock-123c61ec8b7e4bc9b57cbeaee02f12fe.yaml b/nuclei-templates/cve-less/plugins/widget-control-powered-by-everyblock-123c61ec8b7e4bc9b57cbeaee02f12fe.yaml new file mode 100644 index 0000000000..4a448e43ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-control-powered-by-everyblock-123c61ec8b7e4bc9b57cbeaee02f12fe.yaml @@ -0,0 +1,58 @@ +id: widget-control-powered-by-everyblock-123c61ec8b7e4bc9b57cbeaee02f12fe + +info: + name: > + Widget Control Powered By Everyblock <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b802b6bf-e70f-47ab-a72d-35f6341920eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-control-powered-by-everyblock/" + google-query: inurl:"/wp-content/plugins/widget-control-powered-by-everyblock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-control-powered-by-everyblock,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-control-powered-by-everyblock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-control-powered-by-everyblock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-detector-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/widget-detector-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c3cde0fe3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-detector-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: widget-detector-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-detector-elementor/" + google-query: inurl:"/wp-content/plugins/widget-detector-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-detector-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-detector-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-detector-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-extend-builtin-query-8fe3695ecc567c29e92906730f596df1.yaml b/nuclei-templates/cve-less/plugins/widget-extend-builtin-query-8fe3695ecc567c29e92906730f596df1.yaml new file mode 100644 index 0000000000..9995eb65ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-extend-builtin-query-8fe3695ecc567c29e92906730f596df1.yaml @@ -0,0 +1,58 @@ +id: widget-extend-builtin-query-8fe3695ecc567c29e92906730f596df1 + +info: + name: > + Built-in Widgets Query extend <= 1.05 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87b8386e-863e-4a33-8beb-aab3e704ecb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-extend-builtin-query/" + google-query: inurl:"/wp-content/plugins/widget-extend-builtin-query/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-extend-builtin-query,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-extend-builtin-query/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-extend-builtin-query" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/widget-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d037c83f1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: widget-for-contact-form-7-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-for-contact-form-7/" + google-query: inurl:"/wp-content/plugins/widget-for-contact-form-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-for-contact-form-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-for-contact-form-7/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-for-contact-form-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-for-eventbrite-api-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/widget-for-eventbrite-api-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c257cc74a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-for-eventbrite-api-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: widget-for-eventbrite-api-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-for-eventbrite-api/" + google-query: inurl:"/wp-content/plugins/widget-for-eventbrite-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-for-eventbrite-api,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-for-eventbrite-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-for-eventbrite-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-google-reviews-459b18886f45ada6d060921939e88905.yaml b/nuclei-templates/cve-less/plugins/widget-google-reviews-459b18886f45ada6d060921939e88905.yaml new file mode 100644 index 0000000000..6824c9bb06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-google-reviews-459b18886f45ada6d060921939e88905.yaml @@ -0,0 +1,58 @@ +id: widget-google-reviews-459b18886f45ada6d060921939e88905 + +info: + name: > + Plugin for Google Reviews <= 3.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8971d54-b54e-4e62-9db2-fa87d2564599?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-google-reviews/" + google-query: inurl:"/wp-content/plugins/widget-google-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-google-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-google-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-google-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-google-reviews-4de563d96c4862070b39ddbeaaf2aa52.yaml b/nuclei-templates/cve-less/plugins/widget-google-reviews-4de563d96c4862070b39ddbeaaf2aa52.yaml new file mode 100644 index 0000000000..50c4cfde81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-google-reviews-4de563d96c4862070b39ddbeaaf2aa52.yaml @@ -0,0 +1,58 @@ +id: widget-google-reviews-4de563d96c4862070b39ddbeaaf2aa52 + +info: + name: > + Plugin for Google Reviews <= 2.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed128ef2-0399-4daa-95f6-f5ba74281d89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-google-reviews/" + google-query: inurl:"/wp-content/plugins/widget-google-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-google-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-google-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-google-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-google-reviews-648a32c4399962c7e8df779124e03350.yaml b/nuclei-templates/cve-less/plugins/widget-google-reviews-648a32c4399962c7e8df779124e03350.yaml new file mode 100644 index 0000000000..092f344a0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-google-reviews-648a32c4399962c7e8df779124e03350.yaml @@ -0,0 +1,58 @@ +id: widget-google-reviews-648a32c4399962c7e8df779124e03350 + +info: + name: > + Plugin for Google Reviews <= 2.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5ca3c84-9d3d-4bbe-90f7-44c9d77a6690?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-google-reviews/" + google-query: inurl:"/wp-content/plugins/widget-google-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-google-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-google-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-google-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-google-reviews-69fd4d1a3d07810924c63e0b65d11e51.yaml b/nuclei-templates/cve-less/plugins/widget-google-reviews-69fd4d1a3d07810924c63e0b65d11e51.yaml new file mode 100644 index 0000000000..698935ec24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-google-reviews-69fd4d1a3d07810924c63e0b65d11e51.yaml @@ -0,0 +1,58 @@ +id: widget-google-reviews-69fd4d1a3d07810924c63e0b65d11e51 + +info: + name: > + Plugin for Google Reviews <= 2.2.3 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75aa7541-d9d4-4526-9831-238327d0f3ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-google-reviews/" + google-query: inurl:"/wp-content/plugins/widget-google-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-google-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-google-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-google-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-logic-068331b2d9acf141050172c5e67910ff.yaml b/nuclei-templates/cve-less/plugins/widget-logic-068331b2d9acf141050172c5e67910ff.yaml new file mode 100644 index 0000000000..c39bbb14be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-logic-068331b2d9acf141050172c5e67910ff.yaml @@ -0,0 +1,58 @@ +id: widget-logic-068331b2d9acf141050172c5e67910ff + +info: + name: > + Widget Logic < 5.10.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4999de1-07b7-49ef-8897-267b836bc469?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-logic/" + google-query: inurl:"/wp-content/plugins/widget-logic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-logic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-logic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-logic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-post-slider-7bdd14c359e34ad7380502271a0ac656.yaml b/nuclei-templates/cve-less/plugins/widget-post-slider-7bdd14c359e34ad7380502271a0ac656.yaml new file mode 100644 index 0000000000..60b6410571 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-post-slider-7bdd14c359e34ad7380502271a0ac656.yaml @@ -0,0 +1,58 @@ +id: widget-post-slider-7bdd14c359e34ad7380502271a0ac656 + +info: + name: > + Widget Post Slider <= 1.3.5. - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74e15c52-4245-41b0-8005-41e9ac2c2edc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-post-slider/" + google-query: inurl:"/wp-content/plugins/widget-post-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-post-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-post-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-post-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-settings-importexport-a5767736936a5d7db756e536a6ac0996.yaml b/nuclei-templates/cve-less/plugins/widget-settings-importexport-a5767736936a5d7db756e536a6ac0996.yaml new file mode 100644 index 0000000000..dda59ddabe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-settings-importexport-a5767736936a5d7db756e536a6ac0996.yaml @@ -0,0 +1,58 @@ +id: widget-settings-importexport-a5767736936a5d7db756e536a6ac0996 + +info: + name: > + Widget Settings Importer/Exporter Plugin <= 1.5.3 - Unauthorized Widget Import to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e14f0fc6-fca4-4dd7-8f7b-ed5ed535c9af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-settings-importexport/" + google-query: inurl:"/wp-content/plugins/widget-settings-importexport/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-settings-importexport,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-settings-importexport/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-settings-importexport" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-shortcode-6ec64fa1d5347bc867f5cb9d59094e81.yaml b/nuclei-templates/cve-less/plugins/widget-shortcode-6ec64fa1d5347bc867f5cb9d59094e81.yaml new file mode 100644 index 0000000000..38d4baba2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-shortcode-6ec64fa1d5347bc867f5cb9d59094e81.yaml @@ -0,0 +1,58 @@ +id: widget-shortcode-6ec64fa1d5347bc867f5cb9d59094e81 + +info: + name: > + Widget Shortcode <= 0.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e8abfd1-6e16-4c86-b430-44cec21a5267?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-shortcode/" + google-query: inurl:"/wp-content/plugins/widget-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widget-twitter-b5c74375abda0734f64c322204bc8108.yaml b/nuclei-templates/cve-less/plugins/widget-twitter-b5c74375abda0734f64c322204bc8108.yaml new file mode 100644 index 0000000000..2103464e04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widget-twitter-b5c74375abda0734f64c322204bc8108.yaml @@ -0,0 +1,58 @@ +id: widget-twitter-b5c74375abda0734f64c322204bc8108 + +info: + name: > + WD WidgetTwitter <= 1.0.9 - Authenticated (Contributor+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86cdbfec-b1af-48ec-ae70-f97768694e44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widget-twitter/" + google-query: inurl:"/wp-content/plugins/widget-twitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widget-twitter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widget-twitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widget-twitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-20b8b7b7f0087daadf58f3d74ba2a999.yaml b/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-20b8b7b7f0087daadf58f3d74ba2a999.yaml new file mode 100644 index 0000000000..c66199f384 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-20b8b7b7f0087daadf58f3d74ba2a999.yaml @@ -0,0 +1,58 @@ +id: widgetkit-for-elementor-20b8b7b7f0087daadf58f3d74ba2a999 + +info: + name: > + All-in-One Addons for Elementor - WidgetKit <= 2.4.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/988f102e-08b6-4436-be03-fc37a4084ca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgetkit-for-elementor/" + google-query: inurl:"/wp-content/plugins/widgetkit-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgetkit-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgetkit-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgetkit-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-85a1c6e007a9a1b0879129219d595f5f.yaml b/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-85a1c6e007a9a1b0879129219d595f5f.yaml new file mode 100644 index 0000000000..389b453b1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-85a1c6e007a9a1b0879129219d595f5f.yaml @@ -0,0 +1,58 @@ +id: widgetkit-for-elementor-85a1c6e007a9a1b0879129219d595f5f + +info: + name: > + All-in-One Addons for Elementor - WidgetKit <= 2.3.9 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/916a9d2b-0da6-494a-a3aa-5d5f4ccdd4b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgetkit-for-elementor/" + google-query: inurl:"/wp-content/plugins/widgetkit-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgetkit-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgetkit-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgetkit-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-bc4814d8e32bebe97767bb786c515063.yaml b/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-bc4814d8e32bebe97767bb786c515063.yaml new file mode 100644 index 0000000000..d8489c8824 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-bc4814d8e32bebe97767bb786c515063.yaml @@ -0,0 +1,58 @@ +id: widgetkit-for-elementor-bc4814d8e32bebe97767bb786c515063 + +info: + name: > + WidgetKit <= 2.5.0 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e809cd39-7bb0-475f-a2ae-c7bc4bdba63c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgetkit-for-elementor/" + google-query: inurl:"/wp-content/plugins/widgetkit-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgetkit-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgetkit-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgetkit-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-f92fdb8def6ac7c07ce14435754a7ffa.yaml b/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-f92fdb8def6ac7c07ce14435754a7ffa.yaml new file mode 100644 index 0000000000..815ed4ec9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgetkit-for-elementor-f92fdb8def6ac7c07ce14435754a7ffa.yaml @@ -0,0 +1,58 @@ +id: widgetkit-for-elementor-f92fdb8def6ac7c07ce14435754a7ffa + +info: + name: > + All-in-One Addons for Elementor – WidgetKit <= 2.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Pricing Widgets + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27945f52-7594-46f6-a760-2ee5dd094914?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgetkit-for-elementor/" + google-query: inurl:"/wp-content/plugins/widgetkit-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgetkit-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgetkit-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgetkit-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-controller-bcfdb3c82ae0485dc6fcdad4aba69c36.yaml b/nuclei-templates/cve-less/plugins/widgets-controller-bcfdb3c82ae0485dc6fcdad4aba69c36.yaml new file mode 100644 index 0000000000..51f9a7f622 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-controller-bcfdb3c82ae0485dc6fcdad4aba69c36.yaml @@ -0,0 +1,58 @@ +id: widgets-controller-bcfdb3c82ae0485dc6fcdad4aba69c36 + +info: + name: > + Widgets Controller <= 1.1 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c1d671c-017e-454b-8aa3-86f6d396b437?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-controller/" + google-query: inurl:"/wp-content/plugins/widgets-controller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-controller,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-controller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-controller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-for-alibaba-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/widgets-for-alibaba-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..ba6f46868e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-for-alibaba-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: widgets-for-alibaba-reviews-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-for-alibaba-reviews/" + google-query: inurl:"/wp-content/plugins/widgets-for-alibaba-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-for-alibaba-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-for-alibaba-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-for-alibaba-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-for-aliexpress-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/widgets-for-aliexpress-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..f335a45e88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-for-aliexpress-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: widgets-for-aliexpress-reviews-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-for-aliexpress-reviews/" + google-query: inurl:"/wp-content/plugins/widgets-for-aliexpress-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-for-aliexpress-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-for-aliexpress-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-for-aliexpress-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-for-ebay-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/widgets-for-ebay-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..c0c4fe766c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-for-ebay-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: widgets-for-ebay-reviews-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-for-ebay-reviews/" + google-query: inurl:"/wp-content/plugins/widgets-for-ebay-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-for-ebay-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-for-ebay-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-for-ebay-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-for-siteorigin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/widgets-for-siteorigin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..0f68ec2faf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-for-siteorigin-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: widgets-for-siteorigin-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-for-siteorigin/" + google-query: inurl:"/wp-content/plugins/widgets-for-siteorigin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-for-siteorigin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-for-siteorigin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-for-siteorigin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-for-sourceforge-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/widgets-for-sourceforge-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..1b233dd877 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-for-sourceforge-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: widgets-for-sourceforge-reviews-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-for-sourceforge-reviews/" + google-query: inurl:"/wp-content/plugins/widgets-for-sourceforge-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-for-sourceforge-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-for-sourceforge-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-for-sourceforge-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-for-thumbtack-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/widgets-for-thumbtack-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..9584faf88d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-for-thumbtack-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: widgets-for-thumbtack-reviews-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-for-thumbtack-reviews/" + google-query: inurl:"/wp-content/plugins/widgets-for-thumbtack-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-for-thumbtack-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-for-thumbtack-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-for-thumbtack-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-for-zillow-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/widgets-for-zillow-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..0c422dc92b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-for-zillow-reviews-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: widgets-for-zillow-reviews-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-for-zillow-reviews/" + google-query: inurl:"/wp-content/plugins/widgets-for-zillow-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-for-zillow-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-for-zillow-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-for-zillow-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-on-pages-022d6e4b68c3750efdb62382e3088ee3.yaml b/nuclei-templates/cve-less/plugins/widgets-on-pages-022d6e4b68c3750efdb62382e3088ee3.yaml new file mode 100644 index 0000000000..b988f80caa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-on-pages-022d6e4b68c3750efdb62382e3088ee3.yaml @@ -0,0 +1,58 @@ +id: widgets-on-pages-022d6e4b68c3750efdb62382e3088ee3 + +info: + name: > + Widgets on Pages <= 1.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57be3e10-6920-4ad8-b9cf-cf5a703ca373?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-on-pages/" + google-query: inurl:"/wp-content/plugins/widgets-on-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-on-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-on-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-on-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-on-pages-and-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/widgets-on-pages-and-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..939bd5ce97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-on-pages-and-posts-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: widgets-on-pages-and-posts-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-on-pages-and-posts/" + google-query: inurl:"/wp-content/plugins/widgets-on-pages-and-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-on-pages-and-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-on-pages-and-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-on-pages-and-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-on-pages-and-posts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/widgets-on-pages-and-posts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..c550d68ae9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-on-pages-and-posts-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: widgets-on-pages-and-posts-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-on-pages-and-posts/" + google-query: inurl:"/wp-content/plugins/widgets-on-pages-and-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-on-pages-and-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-on-pages-and-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-on-pages-and-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgets-on-pages-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/widgets-on-pages-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e632e308c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgets-on-pages-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: widgets-on-pages-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgets-on-pages/" + google-query: inurl:"/wp-content/plugins/widgets-on-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgets-on-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgets-on-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgets-on-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/widgetshortcode-d17eaa15397a887312aedfb1919c156f.yaml b/nuclei-templates/cve-less/plugins/widgetshortcode-d17eaa15397a887312aedfb1919c156f.yaml new file mode 100644 index 0000000000..4b52670f79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/widgetshortcode-d17eaa15397a887312aedfb1919c156f.yaml @@ -0,0 +1,58 @@ +id: widgetshortcode-d17eaa15397a887312aedfb1919c156f + +info: + name: > + WidgetShortcode <= 0.3.5 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00234d96-cece-4217-89c9-1a329887e8da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/widgetshortcode/" + google-query: inurl:"/wp-content/plugins/widgetshortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,widgetshortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/widgetshortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "widgetshortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wikipop-11d411cbc5ec47f84a5a874c5f4a706d.yaml b/nuclei-templates/cve-less/plugins/wikipop-11d411cbc5ec47f84a5a874c5f4a706d.yaml new file mode 100644 index 0000000000..2599a8d48d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wikipop-11d411cbc5ec47f84a5a874c5f4a706d.yaml @@ -0,0 +1,58 @@ +id: wikipop-11d411cbc5ec47f84a5a874c5f4a706d + +info: + name: > + WikiPop <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dbebce4-599b-4241-aa9a-3d2486a57d52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wikipop/" + google-query: inurl:"/wp-content/plugins/wikipop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wikipop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wikipop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wikipop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/winterlock-a51f4e9f249cf27f338341ad1f220702.yaml b/nuclei-templates/cve-less/plugins/winterlock-a51f4e9f249cf27f338341ad1f220702.yaml new file mode 100644 index 0000000000..15f3682bfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/winterlock-a51f4e9f249cf27f338341ad1f220702.yaml @@ -0,0 +1,58 @@ +id: winterlock-a51f4e9f249cf27f338341ad1f220702 + +info: + name: > + WP System Log < 1.0.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5733a60-8078-48ed-9395-ea79b4199f7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/winterlock/" + google-query: inurl:"/wp-content/plugins/winterlock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,winterlock,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/winterlock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "winterlock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/winterlock-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/winterlock-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..78a1b618df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/winterlock-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: winterlock-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/winterlock/" + google-query: inurl:"/wp-content/plugins/winterlock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,winterlock,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/winterlock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "winterlock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wip-custom-login-41ebdf42bbd34392f33d2e300bcf1f22.yaml b/nuclei-templates/cve-less/plugins/wip-custom-login-41ebdf42bbd34392f33d2e300bcf1f22.yaml new file mode 100644 index 0000000000..6e970677aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wip-custom-login-41ebdf42bbd34392f33d2e300bcf1f22.yaml @@ -0,0 +1,58 @@ +id: wip-custom-login-41ebdf42bbd34392f33d2e300bcf1f22 + +info: + name: > + WIP Custom Login <= 1.2.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e41a12d-44a6-4851-b72a-ffa65bbbeb0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wip-custom-login/" + google-query: inurl:"/wp-content/plugins/wip-custom-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wip-custom-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wip-custom-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wip-custom-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wip-custom-login-604150a52b0430463d87d2c334416504.yaml b/nuclei-templates/cve-less/plugins/wip-custom-login-604150a52b0430463d87d2c334416504.yaml new file mode 100644 index 0000000000..a66c2b4e61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wip-custom-login-604150a52b0430463d87d2c334416504.yaml @@ -0,0 +1,58 @@ +id: wip-custom-login-604150a52b0430463d87d2c334416504 + +info: + name: > + WIP Custom Login <= 1.2.9 - Cross-Site Request Forgery via save_option + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b93e63-5ef2-4fb1-8c6b-28fcfab8e34d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wip-custom-login/" + google-query: inurl:"/wp-content/plugins/wip-custom-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wip-custom-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wip-custom-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wip-custom-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wise-chat-6a2f9e4e8b4608d42296886211931452.yaml b/nuclei-templates/cve-less/plugins/wise-chat-6a2f9e4e8b4608d42296886211931452.yaml new file mode 100644 index 0000000000..152398aada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wise-chat-6a2f9e4e8b4608d42296886211931452.yaml @@ -0,0 +1,58 @@ +id: wise-chat-6a2f9e4e8b4608d42296886211931452 + +info: + name: > + Wise Chat <= 2.6.3 - Reverse Tabnabbing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c46b26c7-3302-4730-915c-1882b315600c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wise-chat/" + google-query: inurl:"/wp-content/plugins/wise-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wise-chat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wise-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wise-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wise-chat-6b39b952a5d8522421f2815fd5e705bc.yaml b/nuclei-templates/cve-less/plugins/wise-chat-6b39b952a5d8522421f2815fd5e705bc.yaml new file mode 100644 index 0000000000..1c789def9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wise-chat-6b39b952a5d8522421f2815fd5e705bc.yaml @@ -0,0 +1,58 @@ +id: wise-chat-6b39b952a5d8522421f2815fd5e705bc + +info: + name: > + Wise Chat <= 2.8.3 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7112f34-3055-4033-82ba-d59489cd8c6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wise-chat/" + google-query: inurl:"/wp-content/plugins/wise-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wise-chat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wise-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wise-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wise-chat-af5cb5e26919d347db9037fb5a77d7dd.yaml b/nuclei-templates/cve-less/plugins/wise-chat-af5cb5e26919d347db9037fb5a77d7dd.yaml new file mode 100644 index 0000000000..698f90620f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wise-chat-af5cb5e26919d347db9037fb5a77d7dd.yaml @@ -0,0 +1,58 @@ +id: wise-chat-af5cb5e26919d347db9037fb5a77d7dd + +info: + name: > + Wise Chat <= 3.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a9ed6f2-3def-420c-b6d5-6343fcd7b147?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wise-chat/" + google-query: inurl:"/wp-content/plugins/wise-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wise-chat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wise-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wise-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wiseagentleadform-b236dd17f6f9d64bfcd1ad06166ef939.yaml b/nuclei-templates/cve-less/plugins/wiseagentleadform-b236dd17f6f9d64bfcd1ad06166ef939.yaml new file mode 100644 index 0000000000..69039138e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wiseagentleadform-b236dd17f6f9d64bfcd1ad06166ef939.yaml @@ -0,0 +1,58 @@ +id: wiseagentleadform-b236dd17f6f9d64bfcd1ad06166ef939 + +info: + name: > + Wise Agent Capture Forms <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c2c5b41-bc56-428f-9edc-2a8fd8212310?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wiseagentleadform/" + google-query: inurl:"/wp-content/plugins/wiseagentleadform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wiseagentleadform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wiseagentleadform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wiseagentleadform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wiser-notify-6b2cae5676cc752aa89b0a0ababa3a92.yaml b/nuclei-templates/cve-less/plugins/wiser-notify-6b2cae5676cc752aa89b0a0ababa3a92.yaml new file mode 100644 index 0000000000..e1a7e5ab8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wiser-notify-6b2cae5676cc752aa89b0a0ababa3a92.yaml @@ -0,0 +1,58 @@ +id: wiser-notify-6b2cae5676cc752aa89b0a0ababa3a92 + +info: + name: > + WiserNotify Social Proof <= 2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86055b1b-23a6-4e33-8818-0af58c8e6383?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wiser-notify/" + google-query: inurl:"/wp-content/plugins/wiser-notify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wiser-notify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wiser-notify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wiser-notify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wish-wait-list-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml b/nuclei-templates/cve-less/plugins/wish-wait-list-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml new file mode 100644 index 0000000000..8e30c29e85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wish-wait-list-for-woocommerce-dfec65d3ffe11067030127a9c011404a.yaml @@ -0,0 +1,58 @@ +id: wish-wait-list-for-woocommerce-dfec65d3ffe11067030127a9c011404a + +info: + name: > + BeRocket Plugins <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8fc89c0-292d-47b4-90b3-79edf3a9e76d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wish-wait-list-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/wish-wait-list-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wish-wait-list-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wish-wait-list-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wish-wait-list-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wishlist-and-compare-d336c1132b5fe2aa3919365b360cd97c.yaml b/nuclei-templates/cve-less/plugins/wishlist-and-compare-d336c1132b5fe2aa3919365b360cd97c.yaml new file mode 100644 index 0000000000..d39aecc21b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wishlist-and-compare-d336c1132b5fe2aa3919365b360cd97c.yaml @@ -0,0 +1,58 @@ +id: wishlist-and-compare-d336c1132b5fe2aa3919365b360cd97c + +info: + name: > + Wishlist and Compare for WooCommerce <= 1.0.4 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d99614e6-4543-4594-9a46-71ecc986be45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wishlist-and-compare/" + google-query: inurl:"/wp-content/plugins/wishlist-and-compare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wishlist-and-compare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wishlist-and-compare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wishlist-and-compare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wishsuite-636baab4ac31da3f60a0d64060238890.yaml b/nuclei-templates/cve-less/plugins/wishsuite-636baab4ac31da3f60a0d64060238890.yaml new file mode 100644 index 0000000000..c6e08af276 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wishsuite-636baab4ac31da3f60a0d64060238890.yaml @@ -0,0 +1,58 @@ +id: wishsuite-636baab4ac31da3f60a0d64060238890 + +info: + name: > + WishSuite <= 1.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b515782a-d7ec-41a6-92f8-91823f2c0dcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wishsuite/" + google-query: inurl:"/wp-content/plugins/wishsuite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wishsuite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wishsuite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wishsuite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wishsuite-b1e2122cdc23a9d17ef80227bd4601b9.yaml b/nuclei-templates/cve-less/plugins/wishsuite-b1e2122cdc23a9d17ef80227bd4601b9.yaml new file mode 100644 index 0000000000..75f93d2970 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wishsuite-b1e2122cdc23a9d17ef80227bd4601b9.yaml @@ -0,0 +1,58 @@ +id: wishsuite-b1e2122cdc23a9d17ef80227bd4601b9 + +info: + name: > + WishSuite <= 1.3.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7d13d78-4d3f-476a-ba67-b47d0195a1ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wishsuite/" + google-query: inurl:"/wp-content/plugins/wishsuite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wishsuite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wishsuite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wishsuite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wishsuite-cab8156a963bed782ca63418d284864e.yaml b/nuclei-templates/cve-less/plugins/wishsuite-cab8156a963bed782ca63418d284864e.yaml new file mode 100644 index 0000000000..8e3e079fe6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wishsuite-cab8156a963bed782ca63418d284864e.yaml @@ -0,0 +1,58 @@ +id: wishsuite-cab8156a963bed782ca63418d284864e + +info: + name: > + WishSuite <= 1.3.3 - Cross-Site Request Forgery via plugin_activation() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2f3fcd1-6dff-409b-b8c1-46c5485980ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wishsuite/" + google-query: inurl:"/wp-content/plugins/wishsuite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wishsuite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wishsuite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wishsuite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woc-open-close-4690da6a9cd43936031eeb63dbe5ba89.yaml b/nuclei-templates/cve-less/plugins/woc-open-close-4690da6a9cd43936031eeb63dbe5ba89.yaml new file mode 100644 index 0000000000..e34f3a9911 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woc-open-close-4690da6a9cd43936031eeb63dbe5ba89.yaml @@ -0,0 +1,58 @@ +id: woc-open-close-4690da6a9cd43936031eeb63dbe5ba89 + +info: + name: > + Open Close WooCommerce Store <= 4.9.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93b5525c-a298-420d-80cd-84cb35913981?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woc-open-close/" + google-query: inurl:"/wp-content/plugins/woc-open-close/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woc-open-close,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woc-open-close/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woc-open-close" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woc-open-close-7a36c8dbdadc012c88743cb1cfe1ebe4.yaml b/nuclei-templates/cve-less/plugins/woc-open-close-7a36c8dbdadc012c88743cb1cfe1ebe4.yaml new file mode 100644 index 0000000000..d8a92f570d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woc-open-close-7a36c8dbdadc012c88743cb1cfe1ebe4.yaml @@ -0,0 +1,58 @@ +id: woc-open-close-7a36c8dbdadc012c88743cb1cfe1ebe4 + +info: + name: > + Woocommerce Open Close – Best Business Schedules Manager <= 4.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e471ef4-94c1-47d9-98ae-f79f7662e21a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woc-open-close/" + google-query: inurl:"/wp-content/plugins/woc-open-close/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woc-open-close,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woc-open-close/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woc-open-close" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woc-order-alert-484dd45c6c89790208a6369cc9e3257b.yaml b/nuclei-templates/cve-less/plugins/woc-order-alert-484dd45c6c89790208a6369cc9e3257b.yaml new file mode 100644 index 0000000000..af02e6c6b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woc-order-alert-484dd45c6c89790208a6369cc9e3257b.yaml @@ -0,0 +1,58 @@ +id: woc-order-alert-484dd45c6c89790208a6369cc9e3257b + +info: + name: > + Order Listener for WooCommerce – Play Sounds Instantly on New Orders <= 3.2.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a2f4c83-27a6-4c50-b701-8374f21b3799?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woc-order-alert/" + google-query: inurl:"/wp-content/plugins/woc-order-alert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woc-order-alert,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woc-order-alert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woc-order-alert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wolfnet-idx-for-wordpress-b64173f040b81fec7a1fc17ca0c0ce07.yaml b/nuclei-templates/cve-less/plugins/wolfnet-idx-for-wordpress-b64173f040b81fec7a1fc17ca0c0ce07.yaml new file mode 100644 index 0000000000..ee099c9ec3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wolfnet-idx-for-wordpress-b64173f040b81fec7a1fc17ca0c0ce07.yaml @@ -0,0 +1,58 @@ +id: wolfnet-idx-for-wordpress-b64173f040b81fec7a1fc17ca0c0ce07 + +info: + name: > + WolfNet IDX for WordPress <= 1.19.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c226ca9a-8a2e-4e56-a039-96c31526a379?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wolfnet-idx-for-wordpress/" + google-query: inurl:"/wp-content/plugins/wolfnet-idx-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wolfnet-idx-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wolfnet-idx-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wolfnet-idx-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wonderm00ns-simple-facebook-open-graph-tags-a603cc9c5e1a7b03e0366ddf1342a158.yaml b/nuclei-templates/cve-less/plugins/wonderm00ns-simple-facebook-open-graph-tags-a603cc9c5e1a7b03e0366ddf1342a158.yaml new file mode 100644 index 0000000000..84c28f8508 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wonderm00ns-simple-facebook-open-graph-tags-a603cc9c5e1a7b03e0366ddf1342a158.yaml @@ -0,0 +1,58 @@ +id: wonderm00ns-simple-facebook-open-graph-tags-a603cc9c5e1a7b03e0366ddf1342a158 + +info: + name: > + Open Graph and Twitter Card Tags < 2.2.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27ec8f97-9b34-4737-bb45-37baf59598f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wonderm00ns-simple-facebook-open-graph-tags/" + google-query: inurl:"/wp-content/plugins/wonderm00ns-simple-facebook-open-graph-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wonderm00ns-simple-facebook-open-graph-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wonderm00ns-simple-facebook-open-graph-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wonderm00ns-simple-facebook-open-graph-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wonderm00ns-simple-facebook-open-graph-tags-d2fc1c819ff763ffa1233f51f7546ae8.yaml b/nuclei-templates/cve-less/plugins/wonderm00ns-simple-facebook-open-graph-tags-d2fc1c819ff763ffa1233f51f7546ae8.yaml new file mode 100644 index 0000000000..4fdda8e5a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wonderm00ns-simple-facebook-open-graph-tags-d2fc1c819ff763ffa1233f51f7546ae8.yaml @@ -0,0 +1,58 @@ +id: wonderm00ns-simple-facebook-open-graph-tags-d2fc1c819ff763ffa1233f51f7546ae8 + +info: + name: > + Open Graph and Twitter Card Tags <= 2.2.4.1 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9242cebe-3394-4df9-9c60-8d8d6297d791?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wonderm00ns-simple-facebook-open-graph-tags/" + google-query: inurl:"/wp-content/plugins/wonderm00ns-simple-facebook-open-graph-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wonderm00ns-simple-facebook-open-graph-tags,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wonderm00ns-simple-facebook-open-graph-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wonderm00ns-simple-facebook-open-graph-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wonderplugin-audio-065dcae4701acc4da94fbbf470a429a5.yaml b/nuclei-templates/cve-less/plugins/wonderplugin-audio-065dcae4701acc4da94fbbf470a429a5.yaml new file mode 100644 index 0000000000..aaec774214 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wonderplugin-audio-065dcae4701acc4da94fbbf470a429a5.yaml @@ -0,0 +1,58 @@ +id: wonderplugin-audio-065dcae4701acc4da94fbbf470a429a5 + +info: + name: > + WonderPlugin Audio Player < 2.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99721c3e-cddf-4709-aef9-92bb42e43f83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wonderplugin-audio/" + google-query: inurl:"/wp-content/plugins/wonderplugin-audio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wonderplugin-audio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wonderplugin-audio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wonderplugin-audio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wonderplugin-audio-66fd05b591a1b1e766cf1d8976a2f593.yaml b/nuclei-templates/cve-less/plugins/wonderplugin-audio-66fd05b591a1b1e766cf1d8976a2f593.yaml new file mode 100644 index 0000000000..b54d34f5d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wonderplugin-audio-66fd05b591a1b1e766cf1d8976a2f593.yaml @@ -0,0 +1,58 @@ +id: wonderplugin-audio-66fd05b591a1b1e766cf1d8976a2f593 + +info: + name: > + WonderPlugin Audio Player <= 2.0 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d7fb9fd-5551-43aa-8bab-e99430a08124?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wonderplugin-audio/" + google-query: inurl:"/wp-content/plugins/wonderplugin-audio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wonderplugin-audio,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wonderplugin-audio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wonderplugin-audio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wonderplugin-pdf-embed-4fd129ac95b2130cc2038525d8a627da.yaml b/nuclei-templates/cve-less/plugins/wonderplugin-pdf-embed-4fd129ac95b2130cc2038525d8a627da.yaml new file mode 100644 index 0000000000..e581a28acc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wonderplugin-pdf-embed-4fd129ac95b2130cc2038525d8a627da.yaml @@ -0,0 +1,58 @@ +id: wonderplugin-pdf-embed-4fd129ac95b2130cc2038525d8a627da + +info: + name: > + Wonder PDF Embed <= 1.6 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d8331ce-666d-4d5a-b9cd-08562e3eea43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wonderplugin-pdf-embed/" + google-query: inurl:"/wp-content/plugins/wonderplugin-pdf-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wonderplugin-pdf-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wonderplugin-pdf-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wonderplugin-pdf-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wonderplugin-slider-lite-e6c6234529a7a371a2050a65eda4af25.yaml b/nuclei-templates/cve-less/plugins/wonderplugin-slider-lite-e6c6234529a7a371a2050a65eda4af25.yaml new file mode 100644 index 0000000000..d1672f27f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wonderplugin-slider-lite-e6c6234529a7a371a2050a65eda4af25.yaml @@ -0,0 +1,58 @@ +id: wonderplugin-slider-lite-e6c6234529a7a371a2050a65eda4af25 + +info: + name: > + Wonder Slider Lite <= 13.9 - Reflected Cross-Site Scripting via 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/712d2d8b-2103-4262-807e-bb26cabb771c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wonderplugin-slider-lite/" + google-query: inurl:"/wp-content/plugins/wonderplugin-slider-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wonderplugin-slider-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wonderplugin-slider-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wonderplugin-slider-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wonderplugin-video-embed-da919374ddf5731e45e304b65e085880.yaml b/nuclei-templates/cve-less/plugins/wonderplugin-video-embed-da919374ddf5731e45e304b65e085880.yaml new file mode 100644 index 0000000000..ca0c12a150 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wonderplugin-video-embed-da919374ddf5731e45e304b65e085880.yaml @@ -0,0 +1,58 @@ +id: wonderplugin-video-embed-da919374ddf5731e45e304b65e085880 + +info: + name: > + Wonder Video Embed <= 1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c232ddc0-35e8-42e0-8fff-831c74457615?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wonderplugin-video-embed/" + google-query: inurl:"/wp-content/plugins/wonderplugin-video-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wonderplugin-video-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wonderplugin-video-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wonderplugin-video-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-abandoned-cart-recovery-919e97db9044ec7b244c9151671a753a.yaml b/nuclei-templates/cve-less/plugins/woo-abandoned-cart-recovery-919e97db9044ec7b244c9151671a753a.yaml new file mode 100644 index 0000000000..620c1fa8ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-abandoned-cart-recovery-919e97db9044ec7b244c9151671a753a.yaml @@ -0,0 +1,58 @@ +id: woo-abandoned-cart-recovery-919e97db9044ec7b244c9151671a753a + +info: + name: > + Abandoned Cart Recovery for WooCommerce <= 1.0.4 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45b627f9-e7c6-4bf6-b1c7-d607f3e083f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-abandoned-cart-recovery/" + google-query: inurl:"/wp-content/plugins/woo-abandoned-cart-recovery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-abandoned-cart-recovery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-abandoned-cart-recovery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-abandoned-cart-recovery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-add-to-cart-text-change-e6dc5c65c5e3da715fdfcb77e5293453.yaml b/nuclei-templates/cve-less/plugins/woo-add-to-cart-text-change-e6dc5c65c5e3da715fdfcb77e5293453.yaml new file mode 100644 index 0000000000..1ed9c40b58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-add-to-cart-text-change-e6dc5c65c5e3da715fdfcb77e5293453.yaml @@ -0,0 +1,58 @@ +id: woo-add-to-cart-text-change-e6dc5c65c5e3da715fdfcb77e5293453 + +info: + name: > + Add to Cart Text Changer and Customize Button, Add Custom Icon <= 2.0 - Cross-Site Request Forgery via wactc_text_form + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4470c03-64fc-46d9-b224-de5a3149c3d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-add-to-cart-text-change/" + google-query: inurl:"/wp-content/plugins/woo-add-to-cart-text-change/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-add-to-cart-text-change,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-add-to-cart-text-change/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-add-to-cart-text-change" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-add-to-quote-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-add-to-quote-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..844622fef4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-add-to-quote-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-add-to-quote-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-add-to-quote/" + google-query: inurl:"/wp-content/plugins/woo-add-to-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-add-to-quote,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-add-to-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-add-to-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-address-book-35ff0530e249316fdf7a2ba6a6ea24d8.yaml b/nuclei-templates/cve-less/plugins/woo-address-book-35ff0530e249316fdf7a2ba6a6ea24d8.yaml new file mode 100644 index 0000000000..b33d7cc414 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-address-book-35ff0530e249316fdf7a2ba6a6ea24d8.yaml @@ -0,0 +1,58 @@ +id: woo-address-book-35ff0530e249316fdf7a2ba6a6ea24d8 + +info: + name: > + WooCommerce Address Book < 1.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/642b589d-cb4b-46a0-b9f3-fad8b26bba0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-address-book/" + google-query: inurl:"/wp-content/plugins/woo-address-book/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-address-book,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-address-book/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-address-book" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-admin-product-notes-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-admin-product-notes-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ffac715529 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-admin-product-notes-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-admin-product-notes-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-admin-product-notes/" + google-query: inurl:"/wp-content/plugins/woo-admin-product-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-admin-product-notes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-admin-product-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-admin-product-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-admin-product-notes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/woo-admin-product-notes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..fe258b3760 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-admin-product-notes-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: woo-admin-product-notes-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-admin-product-notes/" + google-query: inurl:"/wp-content/plugins/woo-admin-product-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-admin-product-notes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-admin-product-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-admin-product-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-advance-search-c0b1d947b4291937f57429344da7ac74.yaml b/nuclei-templates/cve-less/plugins/woo-advance-search-c0b1d947b4291937f57429344da7ac74.yaml new file mode 100644 index 0000000000..1508fd0907 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-advance-search-c0b1d947b4291937f57429344da7ac74.yaml @@ -0,0 +1,58 @@ +id: woo-advance-search-c0b1d947b4291937f57429344da7ac74 + +info: + name: > + Advance Search for WooCommerce < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e46732ac-1aa4-434d-8c49-7ed065bc907b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-advance-search/" + google-query: inurl:"/wp-content/plugins/woo-advance-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-advance-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-advance-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-advance-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-advance-search-cd59c1c91da7bd7850f2d8eefef7525f.yaml b/nuclei-templates/cve-less/plugins/woo-advance-search-cd59c1c91da7bd7850f2d8eefef7525f.yaml new file mode 100644 index 0000000000..81acc2901f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-advance-search-cd59c1c91da7bd7850f2d8eefef7525f.yaml @@ -0,0 +1,58 @@ +id: woo-advance-search-cd59c1c91da7bd7850f2d8eefef7525f + +info: + name: > + Advance Search for WooCommerce <= 1.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/236dd639-7f05-4fe8-bb81-5d023ebe7962?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-advance-search/" + google-query: inurl:"/wp-content/plugins/woo-advance-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-advance-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-advance-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-advance-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-advanced-product-size-chart-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-advanced-product-size-chart-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..efc5962529 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-advanced-product-size-chart-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-advanced-product-size-chart-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-advanced-product-size-chart/" + google-query: inurl:"/wp-content/plugins/woo-advanced-product-size-chart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-advanced-product-size-chart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-advanced-product-size-chart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-advanced-product-size-chart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-advanced-sales-report-email-1a3d5e6e024266b84857a352fd89d5d4.yaml b/nuclei-templates/cve-less/plugins/woo-advanced-sales-report-email-1a3d5e6e024266b84857a352fd89d5d4.yaml new file mode 100644 index 0000000000..14f6434ffe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-advanced-sales-report-email-1a3d5e6e024266b84857a352fd89d5d4.yaml @@ -0,0 +1,58 @@ +id: woo-advanced-sales-report-email-1a3d5e6e024266b84857a352fd89d5d4 + +info: + name: > + Sales Report Email for WooCommerce <= 2.8.0 - Missing Authorization for Email Functionality + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8befbf2-0d9d-4d0e-87de-0f1b26c0acd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-advanced-sales-report-email/" + google-query: inurl:"/wp-content/plugins/woo-advanced-sales-report-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-advanced-sales-report-email,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-advanced-sales-report-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-advanced-sales-report-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-advanced-shipment-tracking-7d0205a12fc304106a260b15c9e203c3.yaml b/nuclei-templates/cve-less/plugins/woo-advanced-shipment-tracking-7d0205a12fc304106a260b15c9e203c3.yaml new file mode 100644 index 0000000000..cdff90bd2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-advanced-shipment-tracking-7d0205a12fc304106a260b15c9e203c3.yaml @@ -0,0 +1,58 @@ +id: woo-advanced-shipment-tracking-7d0205a12fc304106a260b15c9e203c3 + +info: + name: > + Advanced Shipment Tracking for WooCommerce <= 3.5.2 - Cross-Site Request Forgery via paginate_shipping_provider_list and filter_shipping_provider_list + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b55a80ed-5e27-4087-a792-e78066a41399?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-advanced-shipment-tracking/" + google-query: inurl:"/wp-content/plugins/woo-advanced-shipment-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-advanced-shipment-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-advanced-shipment-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-advanced-shipment-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-advanced-shipment-tracking-c176f376f5ace8dd8c28eea850150499.yaml b/nuclei-templates/cve-less/plugins/woo-advanced-shipment-tracking-c176f376f5ace8dd8c28eea850150499.yaml new file mode 100644 index 0000000000..325a4b70dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-advanced-shipment-tracking-c176f376f5ace8dd8c28eea850150499.yaml @@ -0,0 +1,58 @@ +id: woo-advanced-shipment-tracking-c176f376f5ace8dd8c28eea850150499 + +info: + name: > + Advanced Shipment Tracking for WooCommerce <= 3.2.6 - Authenticated WordPress Options Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4174b47a-75d0-4ada-bd4d-efbaf0b1a049?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-advanced-shipment-tracking/" + google-query: inurl:"/wp-content/plugins/woo-advanced-shipment-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-advanced-shipment-tracking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-advanced-shipment-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-advanced-shipment-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-alidropship-321cda5857ad757ce4e9e189c0e44351.yaml b/nuclei-templates/cve-less/plugins/woo-alidropship-321cda5857ad757ce4e9e189c0e44351.yaml new file mode 100644 index 0000000000..8f74dbbffc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-alidropship-321cda5857ad757ce4e9e189c0e44351.yaml @@ -0,0 +1,58 @@ +id: woo-alidropship-321cda5857ad757ce4e9e189c0e44351 + +info: + name: > + ALD Dropping and Fulfillment for AliExpress and WooCommerce <= 1.0.21 - Cross-Site Request Forgery to Order Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4352b2dc-d2a7-4cc9-a44f-1f5be46e2482?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-alidropship/" + google-query: inurl:"/wp-content/plugins/woo-alidropship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-alidropship,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-alidropship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-alidropship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-alidropship-f3d781217508c2a98509cd1c1ad7df6d.yaml b/nuclei-templates/cve-less/plugins/woo-alidropship-f3d781217508c2a98509cd1c1ad7df6d.yaml new file mode 100644 index 0000000000..31f95f747a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-alidropship-f3d781217508c2a98509cd1c1ad7df6d.yaml @@ -0,0 +1,58 @@ +id: woo-alidropship-f3d781217508c2a98509cd1c1ad7df6d + +info: + name: > + ALD Dropping and Fulfillment for AliExpress and WooCommerce <= 1.0.21 - Missing Authorization to Order Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75f0bc5a-f588-4aeb-9e55-72e180d39ddf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-alidropship/" + google-query: inurl:"/wp-content/plugins/woo-alidropship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-alidropship,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-alidropship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-alidropship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-aliexpress-dropshipping-665a15eb3c74a6909c9a809b40156100.yaml b/nuclei-templates/cve-less/plugins/woo-aliexpress-dropshipping-665a15eb3c74a6909c9a809b40156100.yaml new file mode 100644 index 0000000000..6111f91fae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-aliexpress-dropshipping-665a15eb3c74a6909c9a809b40156100.yaml @@ -0,0 +1,58 @@ +id: woo-aliexpress-dropshipping-665a15eb3c74a6909c9a809b40156100 + +info: + name: > + Sharkdropship dropshipping for Aliexpress, eBay, Amazon, etsy <= 2.1.1 - Unauthenticated Arbitrary Content Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02d994b7-2891-47d0-92d3-c33c4eac54f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-aliexpress-dropshipping/" + google-query: inurl:"/wp-content/plugins/woo-aliexpress-dropshipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-aliexpress-dropshipping,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-aliexpress-dropshipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-aliexpress-dropshipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-aliexpress-dropshipping-b53f2739c791cac0974587f72b226309.yaml b/nuclei-templates/cve-less/plugins/woo-aliexpress-dropshipping-b53f2739c791cac0974587f72b226309.yaml new file mode 100644 index 0000000000..bf21b28646 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-aliexpress-dropshipping-b53f2739c791cac0974587f72b226309.yaml @@ -0,0 +1,58 @@ +id: woo-aliexpress-dropshipping-b53f2739c791cac0974587f72b226309 + +info: + name: > + Sharkdropship dropshipping for Aliexpress, eBay, Amazon, etsy <= 2.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbc7e515-c712-4a39-a0f7-c3f646083060?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-aliexpress-dropshipping/" + google-query: inurl:"/wp-content/plugins/woo-aliexpress-dropshipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-aliexpress-dropshipping,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-aliexpress-dropshipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-aliexpress-dropshipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-altcoin-payment-gateway-30b073e9b1352950780f07d63c18b80e.yaml b/nuclei-templates/cve-less/plugins/woo-altcoin-payment-gateway-30b073e9b1352950780f07d63c18b80e.yaml new file mode 100644 index 0000000000..bae826d5a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-altcoin-payment-gateway-30b073e9b1352950780f07d63c18b80e.yaml @@ -0,0 +1,58 @@ +id: woo-altcoin-payment-gateway-30b073e9b1352950780f07d63c18b80e + +info: + name: > + Bitcoin / AltCoin Payment Gateway for WooCommerce & Multivendor store / shop <= 1.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/626ea1f2-df66-4903-9cbe-7186cf62291b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-altcoin-payment-gateway/" + google-query: inurl:"/wp-content/plugins/woo-altcoin-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-altcoin-payment-gateway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-altcoin-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-altcoin-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-altcoin-payment-gateway-fa3a0e16158897f1a5622777bde0d373.yaml b/nuclei-templates/cve-less/plugins/woo-altcoin-payment-gateway-fa3a0e16158897f1a5622777bde0d373.yaml new file mode 100644 index 0000000000..11690fff94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-altcoin-payment-gateway-fa3a0e16158897f1a5622777bde0d373.yaml @@ -0,0 +1,58 @@ +id: woo-altcoin-payment-gateway-fa3a0e16158897f1a5622777bde0d373 + +info: + name: > + Bitcoin / AltCoin Payment Gateway for WooCommerce <= 1.7.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4e1315b-31e5-428c-9a48-6185b4eeb2fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-altcoin-payment-gateway/" + google-query: inurl:"/wp-content/plugins/woo-altcoin-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-altcoin-payment-gateway,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-altcoin-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-altcoin-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-audio-preview-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/woo-audio-preview-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..57d1fc8268 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-audio-preview-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: woo-audio-preview-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-audio-preview/" + google-query: inurl:"/wp-content/plugins/woo-audio-preview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-audio-preview,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-audio-preview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-audio-preview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-authorize-net-gateway-aim-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-authorize-net-gateway-aim-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a62b9034b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-authorize-net-gateway-aim-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-authorize-net-gateway-aim-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-authorize-net-gateway-aim/" + google-query: inurl:"/wp-content/plugins/woo-authorize-net-gateway-aim/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-authorize-net-gateway-aim,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-authorize-net-gateway-aim/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-authorize-net-gateway-aim" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-availability-date-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/woo-availability-date-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..3d36b229ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-availability-date-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: woo-availability-date-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-availability-date/" + google-query: inurl:"/wp-content/plugins/woo-availability-date/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-availability-date,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-availability-date/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-availability-date" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-billingo-plus-ed2236ee570598966dd60e4e75f31def.yaml b/nuclei-templates/cve-less/plugins/woo-billingo-plus-ed2236ee570598966dd60e4e75f31def.yaml new file mode 100644 index 0000000000..063cb558e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-billingo-plus-ed2236ee570598966dd60e4e75f31def.yaml @@ -0,0 +1,58 @@ +id: woo-billingo-plus-ed2236ee570598966dd60e4e75f31def + +info: + name: > + Multiple Plugins from Viszt Peter - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f70a2a58-d9b8-456d-ae4f-9c60b3d6b8a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-billingo-plus/" + google-query: inurl:"/wp-content/plugins/woo-billingo-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-billingo-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-billingo-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-billingo-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-6028c54ef4ac7396964867f4a36d1c6f.yaml b/nuclei-templates/cve-less/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-6028c54ef4ac7396964867f4a36d1c6f.yaml new file mode 100644 index 0000000000..7e002f75c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-6028c54ef4ac7396964867f4a36d1c6f.yaml @@ -0,0 +1,58 @@ +id: woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-6028c54ef4ac7396964867f4a36d1c6f + +info: + name: > + Woocommerce Blocker Lite <= 2.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4f84b2a-2674-42a1-9db1-d9c1f3db2376?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers/" + google-query: inurl:"/wp-content/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9e1506c011 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers/" + google-query: inurl:"/wp-content/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bookings-calendar-beebd9357e523ac8ce9429685a86283c.yaml b/nuclei-templates/cve-less/plugins/woo-bookings-calendar-beebd9357e523ac8ce9429685a86283c.yaml new file mode 100644 index 0000000000..12b7bc52be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bookings-calendar-beebd9357e523ac8ce9429685a86283c.yaml @@ -0,0 +1,58 @@ +id: woo-bookings-calendar-beebd9357e523ac8ce9429685a86283c + +info: + name: > + WooCommerce Bookings Calendar <= 1.0.36 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aff1ea6-c6d2-4195-899b-3a038b73a7f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bookings-calendar/" + google-query: inurl:"/wp-content/plugins/woo-bookings-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bookings-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bookings-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bookings-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bought-together-75a6b15f48d4510d78d2b82a83179681.yaml b/nuclei-templates/cve-less/plugins/woo-bought-together-75a6b15f48d4510d78d2b82a83179681.yaml new file mode 100644 index 0000000000..63deda1a89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bought-together-75a6b15f48d4510d78d2b82a83179681.yaml @@ -0,0 +1,58 @@ +id: woo-bought-together-75a6b15f48d4510d78d2b82a83179681 + +info: + name: > + WPC Frequently Bought Together for WooCommerce <= 7.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2e98359-6b38-4132-9699-a0180813bff3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bought-together/" + google-query: inurl:"/wp-content/plugins/woo-bought-together/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bought-together,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bought-together/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bought-together" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-edit-products-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-edit-products-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..52c6274154 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-edit-products-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-edit-products-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-edit-products/" + google-query: inurl:"/wp-content/plugins/woo-bulk-edit-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-edit-products,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-edit-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-edit-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-0d7505c66909a7f3ed3a00f6a96e3574.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-0d7505c66909a7f3ed3a00f6a96e3574.yaml new file mode 100644 index 0000000000..3f1f98b90d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-0d7505c66909a7f3ed3a00f6a96e3574.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-0d7505c66909a7f3ed3a00f6a96e3574 + +info: + name: > + BEAR <= 1.1.3.1 - Cross-Site Request Forgery via Multiple Functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7e3818c-883f-4633-a460-a8c0446edffc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-1a98182627ada5df6f3381c144225d78.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-1a98182627ada5df6f3381c144225d78.yaml new file mode 100644 index 0000000000..62a88ff1ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-1a98182627ada5df6f3381c144225d78.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-1a98182627ada5df6f3381c144225d78 + +info: + name: > + BEAR <= 1.1.3.3 - Missing Authorization to Product Manipulation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c42f56a2-b9f9-40ef-86ad-fea6cf2e29f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-279b072b9f314efe6eaa0526f843e1e3.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-279b072b9f314efe6eaa0526f843e1e3.yaml new file mode 100644 index 0000000000..558da6c01d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-279b072b9f314efe6eaa0526f843e1e3.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-279b072b9f314efe6eaa0526f843e1e3 + +info: + name: > + BEAR <= 1.1.3.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58d25eeb-b12c-4850-8308-eaa30982b5a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-2c64ec746b7e41f305498188d926d390.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-2c64ec746b7e41f305498188d926d390.yaml new file mode 100644 index 0000000000..26593742a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-2c64ec746b7e41f305498188d926d390.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-2c64ec746b7e41f305498188d926d390 + +info: + name: > + BEAR <= 1.1.3.3 - Cross-Site Request Forgery to Product Manipulation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26d8b75b-befa-4c6a-b072-0da44e437174?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-3174ef274fa543dfe91589efb1d4f079.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-3174ef274fa543dfe91589efb1d4f079.yaml new file mode 100644 index 0000000000..5b484a1439 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-3174ef274fa543dfe91589efb1d4f079.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-3174ef274fa543dfe91589efb1d4f079 + +info: + name: > + BEAR <= 1.1.4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2df8570b-c1a2-4a1b-b4d4-fe7a75eb05b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-31c3ed011ea62ab6b0c75e066a9aedba.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-31c3ed011ea62ab6b0c75e066a9aedba.yaml new file mode 100644 index 0000000000..6fcc6109c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-31c3ed011ea62ab6b0c75e066a9aedba.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-31c3ed011ea62ab6b0c75e066a9aedba + +info: + name: > + BEAR <= 1.1.3.3 - Cross-Site Request Forgery to Product Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab633506-63a1-4be1-b402-c7f0bcc4ea7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-40d6fd2347c9fdc44764f85da9bdf3cd.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-40d6fd2347c9fdc44764f85da9bdf3cd.yaml new file mode 100644 index 0000000000..5f2043cfa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-40d6fd2347c9fdc44764f85da9bdf3cd.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-40d6fd2347c9fdc44764f85da9bdf3cd + +info: + name: > + BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net <= 1.1.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f14b0b9-6ccd-4f53-b015-e8537127b909?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-4c865f41093e5024a99224cc98999126.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-4c865f41093e5024a99224cc98999126.yaml new file mode 100644 index 0000000000..78c9b52681 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-4c865f41093e5024a99224cc98999126.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-4c865f41093e5024a99224cc98999126 + +info: + name: > + BEAR <= 1.1.3.3 - Cross-Site Request Forgery to Product Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a4db03d-ec40-4145-aa95-fee78bda5205?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-8717d29877e2716945b774b8b7bdcce3.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-8717d29877e2716945b774b8b7bdcce3.yaml new file mode 100644 index 0000000000..96ce92b657 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-8717d29877e2716945b774b8b7bdcce3.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-8717d29877e2716945b774b8b7bdcce3 + +info: + name: > + BEAR <= 1.1.3.3 - Cross-Site Request Forgery to Profile Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c045b31f-b4d6-470e-8f93-36eb70bb75f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-a16906c099275dafdc8327b1b913b90b.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-a16906c099275dafdc8327b1b913b90b.yaml new file mode 100644 index 0000000000..a2eacfe31e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-a16906c099275dafdc8327b1b913b90b.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-a16906c099275dafdc8327b1b913b90b + +info: + name: > + BEAR <= 1.1.4 - Authenticated (Shop manager+) Stored Cross-Site Scripting via Plugin Options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32682598-ad1c-4aa1-bdf2-a7966a4d1dbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-ad48b0930ccb8ba605ddc4459d92eb83.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-ad48b0930ccb8ba605ddc4459d92eb83.yaml new file mode 100644 index 0000000000..18b0030314 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-ad48b0930ccb8ba605ddc4459d92eb83.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-ad48b0930ccb8ba605ddc4459d92eb83 + +info: + name: > + BEAR <= 1.1.3.3 - Cross-Site Request Forgery to Product Manipulation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31c5e524-ef4d-48c7-baa0-595f8060a167?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-b5f79719a2f0199ef2281b12f3375388.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-b5f79719a2f0199ef2281b12f3375388.yaml new file mode 100644 index 0000000000..15aeebbf72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-b5f79719a2f0199ef2281b12f3375388.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-b5f79719a2f0199ef2281b12f3375388 + +info: + name: > + BEAR <= 1.1.3.3 - Missing Authorization to Product Manipulation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc20f303-cac3-4517-9c45-153c410a13af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-b9712f471d4d13ca925287df646b0e0b.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-b9712f471d4d13ca925287df646b0e0b.yaml new file mode 100644 index 0000000000..f873aef251 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-b9712f471d4d13ca925287df646b0e0b.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-b9712f471d4d13ca925287df646b0e0b + +info: + name: > + BEAR <= 1.1.4 - Missing Authorization via Several Functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/411b7889-c2c6-48cb-967d-091585705e17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml new file mode 100644 index 0000000000..b3373845d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-bfb67ddb86bdaa0fb13f07ddf26fc0aa + +info: + name: > + BEAR <= 1.1.4.1 & WOLF <= 1.0.8.1 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12188a74-b1a6-4aa4-88b4-2d0d0dd32916?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-c7c8e86fe8e5b4d368e1042cf3070ec8.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-c7c8e86fe8e5b4d368e1042cf3070ec8.yaml new file mode 100644 index 0000000000..f29ccb4c6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-c7c8e86fe8e5b4d368e1042cf3070ec8.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-c7c8e86fe8e5b4d368e1042cf3070ec8 + +info: + name: > + BEAR <= 1.1.3.3 - Missing Authorization to Product Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dfd0246-4265-4dde-8a1e-18b7042eae74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-de9fc871b36bb1f0c6b5f7fa879cfa84.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-de9fc871b36bb1f0c6b5f7fa879cfa84.yaml new file mode 100644 index 0000000000..00344bb716 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-de9fc871b36bb1f0c6b5f7fa879cfa84.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-de9fc871b36bb1f0c6b5f7fa879cfa84 + +info: + name: > + BEAR <= 1.1.3.3 - Cross-Site Request Forgery to Product Manipulation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40bf51bf-efb2-4504-815b-4681d1078f77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-df6b45b19424e9077c2131a407f92c61.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-df6b45b19424e9077c2131a407f92c61.yaml new file mode 100644 index 0000000000..161bca4c5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-df6b45b19424e9077c2131a407f92c61.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-df6b45b19424e9077c2131a407f92c61 + +info: + name: > + BEAR <= 1.1.3.3 - Missing Authorization to Product Manipulation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d10475f-83dd-4e59-83e4-aeaa72a22b96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-editor-f064b3d43557a2b70b82cf2abcbc206d.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-editor-f064b3d43557a2b70b82cf2abcbc206d.yaml new file mode 100644 index 0000000000..322f586bf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-editor-f064b3d43557a2b70b82cf2abcbc206d.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-editor-f064b3d43557a2b70b82cf2abcbc206d + +info: + name: > + BEAR <= 1.1.3.3 - Cross-Site Request Forgery to Profile Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/639f3941-7783-4500-aca4-5e8155db6460?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-bulk-price-update-9bae62947b00cd1f996b54815106f5ed.yaml b/nuclei-templates/cve-less/plugins/woo-bulk-price-update-9bae62947b00cd1f996b54815106f5ed.yaml new file mode 100644 index 0000000000..cab3c2b0de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-bulk-price-update-9bae62947b00cd1f996b54815106f5ed.yaml @@ -0,0 +1,58 @@ +id: woo-bulk-price-update-9bae62947b00cd1f996b54815106f5ed + +info: + name: > + Bulk Price Update for Woocommerce <= 2.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc3af81e-7fa3-43a0-a403-87a042253632?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-bulk-price-update/" + google-query: inurl:"/wp-content/plugins/woo-bulk-price-update/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-bulk-price-update,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-bulk-price-update/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-bulk-price-update" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-cart-abandonment-recovery-2cb72da676dcd5a807c86a857bed18a6.yaml b/nuclei-templates/cve-less/plugins/woo-cart-abandonment-recovery-2cb72da676dcd5a807c86a857bed18a6.yaml new file mode 100644 index 0000000000..596eaf6486 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-cart-abandonment-recovery-2cb72da676dcd5a807c86a857bed18a6.yaml @@ -0,0 +1,58 @@ +id: woo-cart-abandonment-recovery-2cb72da676dcd5a807c86a857bed18a6 + +info: + name: > + WooCommerce Cart Abandonment Recovery <= 1.2.26 - Cross-Site Request Forgery to Templates/Abandoned Orders Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a466c8f-835d-4d37-a273-7b5689dfbcea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-cart-abandonment-recovery/" + google-query: inurl:"/wp-content/plugins/woo-cart-abandonment-recovery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-cart-abandonment-recovery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-cart-abandonment-recovery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-cart-abandonment-recovery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-cart-all-in-one-b8b7b83ec8db40ca0658077a3631988b.yaml b/nuclei-templates/cve-less/plugins/woo-cart-all-in-one-b8b7b83ec8db40ca0658077a3631988b.yaml new file mode 100644 index 0000000000..ef967b8725 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-cart-all-in-one-b8b7b83ec8db40ca0658077a3631988b.yaml @@ -0,0 +1,58 @@ +id: woo-cart-all-in-one-b8b7b83ec8db40ca0658077a3631988b + +info: + name: > + Cart All In One For WooCommerce <= 1.1.10 - Cross-Site Request Forgery to Cart Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d5d2217-306c-4ea2-9727-5c02f7d67c2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-cart-all-in-one/" + google-query: inurl:"/wp-content/plugins/woo-cart-all-in-one/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-cart-all-in-one,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-cart-all-in-one/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-cart-all-in-one" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-category-slider-by-pluginever-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/woo-category-slider-by-pluginever-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..ad08541e86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-category-slider-by-pluginever-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: woo-category-slider-by-pluginever-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-category-slider-by-pluginever/" + google-query: inurl:"/wp-content/plugins/woo-category-slider-by-pluginever/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-category-slider-by-pluginever,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-category-slider-by-pluginever/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-category-slider-by-pluginever" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-category-slider-by-pluginever-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/woo-category-slider-by-pluginever-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..0adc98bd79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-category-slider-by-pluginever-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: woo-category-slider-by-pluginever-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-category-slider-by-pluginever/" + google-query: inurl:"/wp-content/plugins/woo-category-slider-by-pluginever/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-category-slider-by-pluginever,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-category-slider-by-pluginever/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-category-slider-by-pluginever" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-category-slider-grid-9d69b5dedc1dea8d291f6cedb75f3be2.yaml b/nuclei-templates/cve-less/plugins/woo-category-slider-grid-9d69b5dedc1dea8d291f6cedb75f3be2.yaml new file mode 100644 index 0000000000..4f0c1aad3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-category-slider-grid-9d69b5dedc1dea8d291f6cedb75f3be2.yaml @@ -0,0 +1,58 @@ +id: woo-category-slider-grid-9d69b5dedc1dea8d291f6cedb75f3be2 + +info: + name: > + Category Slider for WooCommerce <= 1.4.15 - Missing Authorization via notice dismissal functionality + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab1bd64b-8575-4ab4-bca5-8d5ce6f476d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-category-slider-grid/" + google-query: inurl:"/wp-content/plugins/woo-category-slider-grid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-category-slider-grid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-category-slider-grid/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-category-slider-grid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-checkout-field-editor-pro-d8db32c50c0bea30a973b5af0530e9fa.yaml b/nuclei-templates/cve-less/plugins/woo-checkout-field-editor-pro-d8db32c50c0bea30a973b5af0530e9fa.yaml new file mode 100644 index 0000000000..38c98a5db9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-checkout-field-editor-pro-d8db32c50c0bea30a973b5af0530e9fa.yaml @@ -0,0 +1,58 @@ +id: woo-checkout-field-editor-pro-d8db32c50c0bea30a973b5af0530e9fa + +info: + name: > + Checkout Field Editor <= 1.7.2 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a176f206-eb96-4902-8355-eec3c9ff6809?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-checkout-field-editor-pro/" + google-query: inurl:"/wp-content/plugins/woo-checkout-field-editor-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-checkout-field-editor-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-checkout-field-editor-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-checkout-field-editor-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-checkout-for-digital-goods-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-checkout-for-digital-goods-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8cd05b0ca0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-checkout-for-digital-goods-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-checkout-for-digital-goods-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-checkout-for-digital-goods/" + google-query: inurl:"/wp-content/plugins/woo-checkout-for-digital-goods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-checkout-for-digital-goods,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-checkout-for-digital-goods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-checkout-for-digital-goods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-checkout-for-digital-goods-d6e20ffc56fbb7647d56a679f340333c.yaml b/nuclei-templates/cve-less/plugins/woo-checkout-for-digital-goods-d6e20ffc56fbb7647d56a679f340333c.yaml new file mode 100644 index 0000000000..3eea11448d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-checkout-for-digital-goods-d6e20ffc56fbb7647d56a679f340333c.yaml @@ -0,0 +1,58 @@ +id: woo-checkout-for-digital-goods-d6e20ffc56fbb7647d56a679f340333c + +info: + name: > + Digital Goods < 2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/601ad4f3-2160-4af6-b3d5-c2af52746aab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-checkout-for-digital-goods/" + google-query: inurl:"/wp-content/plugins/woo-checkout-for-digital-goods/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-checkout-for-digital-goods,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-checkout-for-digital-goods/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-checkout-for-digital-goods" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-checkout-regsiter-field-editor-f717a47fafca36f7d936ae0544056836.yaml b/nuclei-templates/cve-less/plugins/woo-checkout-regsiter-field-editor-f717a47fafca36f7d936ae0544056836.yaml new file mode 100644 index 0000000000..6168b248e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-checkout-regsiter-field-editor-f717a47fafca36f7d936ae0544056836.yaml @@ -0,0 +1,58 @@ +id: woo-checkout-regsiter-field-editor-f717a47fafca36f7d936ae0544056836 + +info: + name: > + WooCommerce Checkout Field Editor (Checkout Manager) <= 2.1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f99d8b5-e71d-4b40-8223-f0e53b9dd84f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-checkout-regsiter-field-editor/" + google-query: inurl:"/wp-content/plugins/woo-checkout-regsiter-field-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-checkout-regsiter-field-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-checkout-regsiter-field-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-checkout-regsiter-field-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-clover-gateway-by-zaytech-bfd48818a8f8d2ed09939883a8a76d0e.yaml b/nuclei-templates/cve-less/plugins/woo-clover-gateway-by-zaytech-bfd48818a8f8d2ed09939883a8a76d0e.yaml new file mode 100644 index 0000000000..2e662f87cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-clover-gateway-by-zaytech-bfd48818a8f8d2ed09939883a8a76d0e.yaml @@ -0,0 +1,58 @@ +id: woo-clover-gateway-by-zaytech-bfd48818a8f8d2ed09939883a8a76d0e + +info: + name: > + WooCommerce Clover Payment Gateway <= 1.3.1 - Missing Authorization via callback_handler + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57aacffa-0f49-4a33-ae40-d1c151363284?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-clover-gateway-by-zaytech/" + google-query: inurl:"/wp-content/plugins/woo-clover-gateway-by-zaytech/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-clover-gateway-by-zaytech,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-clover-gateway-by-zaytech/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-clover-gateway-by-zaytech" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-conditional-discount-rules-for-checkout-74ac9426139c38e6a637e2d13087eef0.yaml b/nuclei-templates/cve-less/plugins/woo-conditional-discount-rules-for-checkout-74ac9426139c38e6a637e2d13087eef0.yaml new file mode 100644 index 0000000000..f5ef1cfa59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-conditional-discount-rules-for-checkout-74ac9426139c38e6a637e2d13087eef0.yaml @@ -0,0 +1,58 @@ +id: woo-conditional-discount-rules-for-checkout-74ac9426139c38e6a637e2d13087eef0 + +info: + name: > + WooCommerce Dynamic Pricing and Discount Rules <= 2.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d624f234-c57a-4a66-900d-362194a79d34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-conditional-discount-rules-for-checkout/" + google-query: inurl:"/wp-content/plugins/woo-conditional-discount-rules-for-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-conditional-discount-rules-for-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-conditional-discount-rules-for-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-conditional-discount-rules-for-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-conditional-discount-rules-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-conditional-discount-rules-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c0815594b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-conditional-discount-rules-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-conditional-discount-rules-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-conditional-discount-rules-for-checkout/" + google-query: inurl:"/wp-content/plugins/woo-conditional-discount-rules-for-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-conditional-discount-rules-for-checkout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-conditional-discount-rules-for-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-conditional-discount-rules-for-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-conditional-payment-gateways-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-conditional-payment-gateways-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f3ab3c31ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-conditional-payment-gateways-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-conditional-payment-gateways-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-conditional-payment-gateways/" + google-query: inurl:"/wp-content/plugins/woo-conditional-payment-gateways/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-conditional-payment-gateways,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-conditional-payment-gateways/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-conditional-payment-gateways" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-conditional-product-fees-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-conditional-product-fees-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8402befc99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-conditional-product-fees-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-conditional-product-fees-for-checkout-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-conditional-product-fees-for-checkout/" + google-query: inurl:"/wp-content/plugins/woo-conditional-product-fees-for-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-conditional-product-fees-for-checkout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-conditional-product-fees-for-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-conditional-product-fees-for-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-confirmation-email-1d7d1acaaeae708601e11c980ce64351.yaml b/nuclei-templates/cve-less/plugins/woo-confirmation-email-1d7d1acaaeae708601e11c980ce64351.yaml new file mode 100644 index 0000000000..718b2bb0e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-confirmation-email-1d7d1acaaeae708601e11c980ce64351.yaml @@ -0,0 +1,58 @@ +id: woo-confirmation-email-1d7d1acaaeae708601e11c980ce64351 + +info: + name: > + User Email Verification for WooCommerce <= 3.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/282ef0bb-4db5-4b07-9aad-b128e8fdb915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-confirmation-email/" + google-query: inurl:"/wp-content/plugins/woo-confirmation-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-confirmation-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-confirmation-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-confirmation-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-confirmation-email-20bfb39c28e57afafa73126a681ef707.yaml b/nuclei-templates/cve-less/plugins/woo-confirmation-email-20bfb39c28e57afafa73126a681ef707.yaml new file mode 100644 index 0000000000..ded5043187 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-confirmation-email-20bfb39c28e57afafa73126a681ef707.yaml @@ -0,0 +1,58 @@ +id: woo-confirmation-email-20bfb39c28e57afafa73126a681ef707 + +info: + name: > + User Email Verification for WooCommerce <= 3.5.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1e31357-7fbc-414b-a4f4-53fa5f2fc715?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-confirmation-email/" + google-query: inurl:"/wp-content/plugins/woo-confirmation-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-confirmation-email,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-confirmation-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-confirmation-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-confirmation-email-b62e00bc83e523a8ff2af72e62215cf4.yaml b/nuclei-templates/cve-less/plugins/woo-confirmation-email-b62e00bc83e523a8ff2af72e62215cf4.yaml new file mode 100644 index 0000000000..08899bca5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-confirmation-email-b62e00bc83e523a8ff2af72e62215cf4.yaml @@ -0,0 +1,58 @@ +id: woo-confirmation-email-b62e00bc83e523a8ff2af72e62215cf4 + +info: + name: > + Woo Confirmation Email < 3.2.0 - Improper Access Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fccfe581-16aa-4a6e-a6aa-60c05e4d26cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-confirmation-email/" + google-query: inurl:"/wp-content/plugins/woo-confirmation-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-confirmation-email,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-confirmation-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-confirmation-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-confirmation-email-d1b51a702a678b8f9406ba962cb571a3.yaml b/nuclei-templates/cve-less/plugins/woo-confirmation-email-d1b51a702a678b8f9406ba962cb571a3.yaml new file mode 100644 index 0000000000..38f6964a83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-confirmation-email-d1b51a702a678b8f9406ba962cb571a3.yaml @@ -0,0 +1,58 @@ +id: woo-confirmation-email-d1b51a702a678b8f9406ba962cb571a3 + +info: + name: > + User Email Verification for WooCommerce <= 3.3.0 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56fce928-108d-4e59-8746-3699a9db427e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-confirmation-email/" + google-query: inurl:"/wp-content/plugins/woo-confirmation-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-confirmation-email,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-confirmation-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-confirmation-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-country-restrictions-advanced-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-country-restrictions-advanced-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..abd387fb7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-country-restrictions-advanced-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-country-restrictions-advanced-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-country-restrictions-advanced/" + google-query: inurl:"/wp-content/plugins/woo-country-restrictions-advanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-country-restrictions-advanced,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-country-restrictions-advanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-country-restrictions-advanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-coupon-usage-4ea02dc94cad5b57a77c42e7c7c8d042.yaml b/nuclei-templates/cve-less/plugins/woo-coupon-usage-4ea02dc94cad5b57a77c42e7c7c8d042.yaml new file mode 100644 index 0000000000..c331c1dc73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-coupon-usage-4ea02dc94cad5b57a77c42e7c7c8d042.yaml @@ -0,0 +1,58 @@ +id: woo-coupon-usage-4ea02dc94cad5b57a77c42e7c7c8d042 + +info: + name: > + WooCommerce Affiliate Plugin – Coupon Affiliates < 4.11.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2657aa8a-b2de-4cb4-b9f8-e7fb0c887a7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-coupon-usage/" + google-query: inurl:"/wp-content/plugins/woo-coupon-usage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-coupon-usage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-coupon-usage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-coupon-usage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-coupon-usage-7ef27e6173494edb101fd9088d250a65.yaml b/nuclei-templates/cve-less/plugins/woo-coupon-usage-7ef27e6173494edb101fd9088d250a65.yaml new file mode 100644 index 0000000000..a952f808af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-coupon-usage-7ef27e6173494edb101fd9088d250a65.yaml @@ -0,0 +1,58 @@ +id: woo-coupon-usage-7ef27e6173494edb101fd9088d250a65 + +info: + name: > + WooCommerce Affiliate Plugin – Coupon Affiliates <= 4.11.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdd0bdf3-6952-4b87-a3e8-156757d22e74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-coupon-usage/" + google-query: inurl:"/wp-content/plugins/woo-coupon-usage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-coupon-usage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-coupon-usage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-coupon-usage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-coupon-usage-929f7bccf6d99dcdb90fbc58af16ac0f.yaml b/nuclei-templates/cve-less/plugins/woo-coupon-usage-929f7bccf6d99dcdb90fbc58af16ac0f.yaml new file mode 100644 index 0000000000..84cf478e57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-coupon-usage-929f7bccf6d99dcdb90fbc58af16ac0f.yaml @@ -0,0 +1,58 @@ +id: woo-coupon-usage-929f7bccf6d99dcdb90fbc58af16ac0f + +info: + name: > + Coupon Affiliates <= 5.4.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0d93ee4-63e1-4fa7-9346-f56354124b9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-coupon-usage/" + google-query: inurl:"/wp-content/plugins/woo-coupon-usage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-coupon-usage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-coupon-usage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-coupon-usage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-coupon-usage-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-coupon-usage-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..98773c0125 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-coupon-usage-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-coupon-usage-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-coupon-usage/" + google-query: inurl:"/wp-content/plugins/woo-coupon-usage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-coupon-usage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-coupon-usage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-coupon-usage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-coupon-usage-d6c1488951c377a5fdee8dcb8a391129.yaml b/nuclei-templates/cve-less/plugins/woo-coupon-usage-d6c1488951c377a5fdee8dcb8a391129.yaml new file mode 100644 index 0000000000..c0e3af9085 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-coupon-usage-d6c1488951c377a5fdee8dcb8a391129.yaml @@ -0,0 +1,58 @@ +id: woo-coupon-usage-d6c1488951c377a5fdee8dcb8a391129 + +info: + name: > + Coupon Affiliates <= 5.4.5 - Reflected Cross-Site Scripting via 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c6fc6be-7e9a-40cb-b9cd-bb71d4f487f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-coupon-usage/" + google-query: inurl:"/wp-content/plugins/woo-coupon-usage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-coupon-usage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-coupon-usage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-coupon-usage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-coupon-usage-dfbc847d6328add5c7ec6fda715f3e24.yaml b/nuclei-templates/cve-less/plugins/woo-coupon-usage-dfbc847d6328add5c7ec6fda715f3e24.yaml new file mode 100644 index 0000000000..ffc5fac7ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-coupon-usage-dfbc847d6328add5c7ec6fda715f3e24.yaml @@ -0,0 +1,58 @@ +id: woo-coupon-usage-dfbc847d6328add5c7ec6fda715f3e24 + +info: + name: > + WooCommerce Affiliate Plugin - Coupon Affiliates < 4.16.4.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb7fc87c-4680-477e-94f5-9c502edce61d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-coupon-usage/" + google-query: inurl:"/wp-content/plugins/woo-coupon-usage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-coupon-usage,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-coupon-usage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-coupon-usage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-coupon-usage-f98bb5a74d2fa1a9c0b6c8217a328496.yaml b/nuclei-templates/cve-less/plugins/woo-coupon-usage-f98bb5a74d2fa1a9c0b6c8217a328496.yaml new file mode 100644 index 0000000000..55144cf31f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-coupon-usage-f98bb5a74d2fa1a9c0b6c8217a328496.yaml @@ -0,0 +1,58 @@ +id: woo-coupon-usage-f98bb5a74d2fa1a9c0b6c8217a328496 + +info: + name: > + Coupon Affiliates <= 5.12.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17cb080f-83f5-4917-af76-bfcc741ae053?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-coupon-usage/" + google-query: inurl:"/wp-content/plugins/woo-coupon-usage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-coupon-usage,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-coupon-usage/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-coupon-usage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-coupons-bulk-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-coupons-bulk-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..542b4e04d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-coupons-bulk-editor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-coupons-bulk-editor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-coupons-bulk-editor/" + google-query: inurl:"/wp-content/plugins/woo-coupons-bulk-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-coupons-bulk-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-coupons-bulk-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-coupons-bulk-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-currency-daeaf69e03551f5a39540769cb2822ca.yaml b/nuclei-templates/cve-less/plugins/woo-currency-daeaf69e03551f5a39540769cb2822ca.yaml new file mode 100644 index 0000000000..cfd889e8d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-currency-daeaf69e03551f5a39540769cb2822ca.yaml @@ -0,0 +1,58 @@ +id: woo-currency-daeaf69e03551f5a39540769cb2822ca + +info: + name: > + WBW Currency Switcher <= 1.6.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb56b00c-31dd-4076-aeaf-9b249f04f1c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-currency/" + google-query: inurl:"/wp-content/plugins/woo-currency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-currency,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-currency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-currency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-custom-and-sequential-order-number-1c1bae32227727e0a4d5c09c16777000.yaml b/nuclei-templates/cve-less/plugins/woo-custom-and-sequential-order-number-1c1bae32227727e0a4d5c09c16777000.yaml new file mode 100644 index 0000000000..e7883641b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-custom-and-sequential-order-number-1c1bae32227727e0a4d5c09c16777000.yaml @@ -0,0 +1,58 @@ +id: woo-custom-and-sequential-order-number-1c1bae32227727e0a4d5c09c16777000 + +info: + name: > + Woo Custom and Sequential Order Number <= 2.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67279c70-c416-4d18-9951-470773b9221a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-custom-and-sequential-order-number/" + google-query: inurl:"/wp-content/plugins/woo-custom-and-sequential-order-number/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-custom-and-sequential-order-number,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-custom-and-sequential-order-number/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-custom-and-sequential-order-number" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-custom-checkout-field-5e5aa6772ed81579447472ccdd176622.yaml b/nuclei-templates/cve-less/plugins/woo-custom-checkout-field-5e5aa6772ed81579447472ccdd176622.yaml new file mode 100644 index 0000000000..23e13a615f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-custom-checkout-field-5e5aa6772ed81579447472ccdd176622.yaml @@ -0,0 +1,58 @@ +id: woo-custom-checkout-field-5e5aa6772ed81579447472ccdd176622 + +info: + name: > + Woo Custom Checkout Field < 1.3.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cae1e984-95b2-4b76-b6b3-563dc3104a72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-custom-checkout-field/" + google-query: inurl:"/wp-content/plugins/woo-custom-checkout-field/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-custom-checkout-field,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-custom-checkout-field/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-custom-checkout-field" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-custom-checkout-fields-49cbb81571d3991f2ef26ba874e53110.yaml b/nuclei-templates/cve-less/plugins/woo-custom-checkout-fields-49cbb81571d3991f2ef26ba874e53110.yaml new file mode 100644 index 0000000000..8d487dec5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-custom-checkout-fields-49cbb81571d3991f2ef26ba874e53110.yaml @@ -0,0 +1,58 @@ +id: woo-custom-checkout-fields-49cbb81571d3991f2ef26ba874e53110 + +info: + name: > + Woocommerce Custom Checkout Fields Editor With Drag & Drop <= 0.1 - Reflected Cross-Site Scripting via 'tab' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e3899d8-170e-481f-8c80-90addc66eb41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-custom-checkout-fields/" + google-query: inurl:"/wp-content/plugins/woo-custom-checkout-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-custom-checkout-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-custom-checkout-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-custom-checkout-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-custom-emails-05692bb82558cd77ced2449a9947331d.yaml b/nuclei-templates/cve-less/plugins/woo-custom-emails-05692bb82558cd77ced2449a9947331d.yaml new file mode 100644 index 0000000000..8d6a286182 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-custom-emails-05692bb82558cd77ced2449a9947331d.yaml @@ -0,0 +1,58 @@ +id: woo-custom-emails-05692bb82558cd77ced2449a9947331d + +info: + name: > + Woo Custom Emails <= 2.2 - Missing Authorization to Unauthenticated Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ee1660e-10c0-447b-8562-c3af07997f56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-custom-emails/" + google-query: inurl:"/wp-content/plugins/woo-custom-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-custom-emails,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-custom-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-custom-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-custom-emails-6fa0ab83d8badc8c29c9bbd5b82377a3.yaml b/nuclei-templates/cve-less/plugins/woo-custom-emails-6fa0ab83d8badc8c29c9bbd5b82377a3.yaml new file mode 100644 index 0000000000..db4b399f34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-custom-emails-6fa0ab83d8badc8c29c9bbd5b82377a3.yaml @@ -0,0 +1,58 @@ +id: woo-custom-emails-6fa0ab83d8badc8c29c9bbd5b82377a3 + +info: + name: > + Woo Custom Emails <= 2.2 - Reflected Cross-Site Scripting via wcemails_edit + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6782d8b3-32f9-42e1-874c-35a1e93ffde0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-custom-emails/" + google-query: inurl:"/wp-content/plugins/woo-custom-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-custom-emails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-custom-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-custom-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-customers-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-customers-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a7c974169f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-customers-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-customers-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-customers-manager/" + google-query: inurl:"/wp-content/plugins/woo-customers-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-customers-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-customers-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-customers-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-customers-order-history-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-customers-order-history-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7a84bdb07d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-customers-order-history-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-customers-order-history-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-customers-order-history/" + google-query: inurl:"/wp-content/plugins/woo-customers-order-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-customers-order-history,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-customers-order-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-customers-order-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-customers-spreadsheet-bulk-edit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-customers-spreadsheet-bulk-edit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..cac18848b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-customers-spreadsheet-bulk-edit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-customers-spreadsheet-bulk-edit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-customers-spreadsheet-bulk-edit/" + google-query: inurl:"/wp-content/plugins/woo-customers-spreadsheet-bulk-edit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-customers-spreadsheet-bulk-edit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-customers-spreadsheet-bulk-edit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-customers-spreadsheet-bulk-edit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-discount-rules-b3abc33ac5c0eee824c171ffc996d70e.yaml b/nuclei-templates/cve-less/plugins/woo-discount-rules-b3abc33ac5c0eee824c171ffc996d70e.yaml new file mode 100644 index 0000000000..26163a781c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-discount-rules-b3abc33ac5c0eee824c171ffc996d70e.yaml @@ -0,0 +1,58 @@ +id: woo-discount-rules-b3abc33ac5c0eee824c171ffc996d70e + +info: + name: > + Discount Rules for WooCommerce <= 2.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33cf27ba-a01b-4e34-9584-b1d3fc87af34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-discount-rules/" + google-query: inurl:"/wp-content/plugins/woo-discount-rules/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-discount-rules,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-discount-rules/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-discount-rules" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-discount-rules-d279b5b7a9de7113552384d130438d18.yaml b/nuclei-templates/cve-less/plugins/woo-discount-rules-d279b5b7a9de7113552384d130438d18.yaml new file mode 100644 index 0000000000..3e4fe23579 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-discount-rules-d279b5b7a9de7113552384d130438d18.yaml @@ -0,0 +1,58 @@ +id: woo-discount-rules-d279b5b7a9de7113552384d130438d18 + +info: + name: > + Discount Rules for WooCommerce <= 2.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40c20b9d-9a7d-46ca-81d1-c58150dae2cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-discount-rules/" + google-query: inurl:"/wp-content/plugins/woo-discount-rules/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-discount-rules,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-discount-rules/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-discount-rules" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-discount-rules-d3067d7741f8700134e947d8ed10ad79.yaml b/nuclei-templates/cve-less/plugins/woo-discount-rules-d3067d7741f8700134e947d8ed10ad79.yaml new file mode 100644 index 0000000000..f88e846e01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-discount-rules-d3067d7741f8700134e947d8ed10ad79.yaml @@ -0,0 +1,58 @@ +id: woo-discount-rules-d3067d7741f8700134e947d8ed10ad79 + +info: + name: > + Discount Rules for WooCommerce <= 2.2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac3a7732-c076-4418-b44a-748cc5668107?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-discount-rules/" + google-query: inurl:"/wp-content/plugins/woo-discount-rules/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-discount-rules,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-discount-rules/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-discount-rules" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-document-preview-c53ac682d18711081effb4af801447e3.yaml b/nuclei-templates/cve-less/plugins/woo-document-preview-c53ac682d18711081effb4af801447e3.yaml new file mode 100644 index 0000000000..683cdf2c10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-document-preview-c53ac682d18711081effb4af801447e3.yaml @@ -0,0 +1,58 @@ +id: woo-document-preview-c53ac682d18711081effb4af801447e3 + +info: + name: > + Wbcom Designs Plugins (Various Versions) - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74d222b9-22e9-485d-8111-d3bee505b200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-document-preview/" + google-query: inurl:"/wp-content/plugins/woo-document-preview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-document-preview,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-document-preview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-document-preview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-easy-duplicate-product-6c3c2bf7b8f6a532d25d6bbbc66fa7c9.yaml b/nuclei-templates/cve-less/plugins/woo-easy-duplicate-product-6c3c2bf7b8f6a532d25d6bbbc66fa7c9.yaml new file mode 100644 index 0000000000..926889468d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-easy-duplicate-product-6c3c2bf7b8f6a532d25d6bbbc66fa7c9.yaml @@ -0,0 +1,58 @@ +id: woo-easy-duplicate-product-6c3c2bf7b8f6a532d25d6bbbc66fa7c9 + +info: + name: > + WooCommerce Easy Duplicate Product <= 0.3.0.0 - Reflected Cross-Site Scripting via wedp_duplicated + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b06d68e-153d-4cee-94d5-cbeac7468665?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-easy-duplicate-product/" + google-query: inurl:"/wp-content/plugins/woo-easy-duplicate-product/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-easy-duplicate-product,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-easy-duplicate-product/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-easy-duplicate-product" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-easy-duplicate-product-7afdbaf504234dadcc9587b5a57a9cbb.yaml b/nuclei-templates/cve-less/plugins/woo-easy-duplicate-product-7afdbaf504234dadcc9587b5a57a9cbb.yaml new file mode 100644 index 0000000000..8f89c37507 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-easy-duplicate-product-7afdbaf504234dadcc9587b5a57a9cbb.yaml @@ -0,0 +1,58 @@ +id: woo-easy-duplicate-product-7afdbaf504234dadcc9587b5a57a9cbb + +info: + name: > + WooCommerce Easy Duplicate Product <= 0.3.0.7 - Missing Authorization via wedp_duplicate_product_action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02d11be0-2e2e-4c76-8a8e-f3f637b99809?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-easy-duplicate-product/" + google-query: inurl:"/wp-content/plugins/woo-easy-duplicate-product/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-easy-duplicate-product,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-easy-duplicate-product/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-easy-duplicate-product" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-ecommerce-tracking-for-google-and-facebook-0870bc8b1d530b3be68df9963ba1cc56.yaml b/nuclei-templates/cve-less/plugins/woo-ecommerce-tracking-for-google-and-facebook-0870bc8b1d530b3be68df9963ba1cc56.yaml new file mode 100644 index 0000000000..8fb0c6486e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-ecommerce-tracking-for-google-and-facebook-0870bc8b1d530b3be68df9963ba1cc56.yaml @@ -0,0 +1,58 @@ +id: woo-ecommerce-tracking-for-google-and-facebook-0870bc8b1d530b3be68df9963ba1cc56 + +info: + name: > + WooCommerce Enhanced Ecommerce Analytics Integration with Conversion Tracking <= 3.7.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3f7e1a4-88b2-4069-adb8-d51278b48234?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-ecommerce-tracking-for-google-and-facebook/" + google-query: inurl:"/wp-content/plugins/woo-ecommerce-tracking-for-google-and-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-ecommerce-tracking-for-google-and-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-ecommerce-tracking-for-google-and-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-ecommerce-tracking-for-google-and-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-ecommerce-tracking-for-google-and-facebook-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-ecommerce-tracking-for-google-and-facebook-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7e4b215f96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-ecommerce-tracking-for-google-and-facebook-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-ecommerce-tracking-for-google-and-facebook-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-ecommerce-tracking-for-google-and-facebook/" + google-query: inurl:"/wp-content/plugins/woo-ecommerce-tracking-for-google-and-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-ecommerce-tracking-for-google-and-facebook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-ecommerce-tracking-for-google-and-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-ecommerce-tracking-for-google-and-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-edit-templates-fd2527f160b6f8cee6c4ddf5aa4628c1.yaml b/nuclei-templates/cve-less/plugins/woo-edit-templates-fd2527f160b6f8cee6c4ddf5aa4628c1.yaml new file mode 100644 index 0000000000..fbb828a5b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-edit-templates-fd2527f160b6f8cee6c4ddf5aa4628c1.yaml @@ -0,0 +1,58 @@ +id: woo-edit-templates-fd2527f160b6f8cee6c4ddf5aa4628c1 + +info: + name: > + Edit WooCommerce Templates <= 1.1.1 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34f7ab72-a4e3-4264-b6d3-530dd255dc87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-edit-templates/" + google-query: inurl:"/wp-content/plugins/woo-edit-templates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-edit-templates,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-edit-templates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-edit-templates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-email-control-12c1c0291f579d50f27573549b527d0e.yaml b/nuclei-templates/cve-less/plugins/woo-email-control-12c1c0291f579d50f27573549b527d0e.yaml new file mode 100644 index 0000000000..5fa8c3a3c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-email-control-12c1c0291f579d50f27573549b527d0e.yaml @@ -0,0 +1,58 @@ +id: woo-email-control-12c1c0291f579d50f27573549b527d0e + +info: + name: > + Woo Email Control < 1.02 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66a2a159-5748-49bd-9204-e85e1c6729df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-email-control/" + google-query: inurl:"/wp-content/plugins/woo-email-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-email-control,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-email-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-email-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-enviopack-fb541598017032d47ba3cc3277c46760.yaml b/nuclei-templates/cve-less/plugins/woo-enviopack-fb541598017032d47ba3cc3277c46760.yaml new file mode 100644 index 0000000000..4f6c37eabe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-enviopack-fb541598017032d47ba3cc3277c46760.yaml @@ -0,0 +1,58 @@ +id: woo-enviopack-fb541598017032d47ba3cc3277c46760 + +info: + name: > + WooCommerce EnvioPack <= 1.2 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da81c849-fc85-4794-a79f-fcc3ef6a3bbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-enviopack/" + google-query: inurl:"/wp-content/plugins/woo-enviopack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-enviopack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-enviopack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-enviopack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-esto-57f4b88a911e06a50ba6bc2f26eebab2.yaml b/nuclei-templates/cve-less/plugins/woo-esto-57f4b88a911e06a50ba6bc2f26eebab2.yaml new file mode 100644 index 0000000000..6dc3192361 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-esto-57f4b88a911e06a50ba6bc2f26eebab2.yaml @@ -0,0 +1,58 @@ +id: woo-esto-57f4b88a911e06a50ba6bc2f26eebab2 + +info: + name: > + Woocommerce ESTO <= 2.23.1 - Cross-Site Request Forgery via saveSetting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49f7e35d-e453-4e60-8f73-12891def267a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-esto/" + google-query: inurl:"/wp-content/plugins/woo-esto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-esto,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-esto/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-esto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.23.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-extra-cost-67ed94f8d8db54b41e53c8a3a1c3d065.yaml b/nuclei-templates/cve-less/plugins/woo-extra-cost-67ed94f8d8db54b41e53c8a3a1c3d065.yaml new file mode 100644 index 0000000000..af69043860 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-extra-cost-67ed94f8d8db54b41e53c8a3a1c3d065.yaml @@ -0,0 +1,58 @@ +id: woo-extra-cost-67ed94f8d8db54b41e53c8a3a1c3d065 + +info: + name: > + WooCommerce Extra Cost <= 2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53409aeb-67a6-4a44-993a-fb23f8fb1344?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-extra-cost/" + google-query: inurl:"/wp-content/plugins/woo-extra-cost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-extra-cost,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-extra-cost/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-extra-cost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-extra-flat-rate-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-extra-flat-rate-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e649ea85ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-extra-flat-rate-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-extra-flat-rate-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-extra-flat-rate/" + google-query: inurl:"/wp-content/plugins/woo-extra-flat-rate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-extra-flat-rate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-extra-flat-rate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-extra-flat-rate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-fiscalita-italiana-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-fiscalita-italiana-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1c7e30579f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-fiscalita-italiana-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-fiscalita-italiana-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-fiscalita-italiana/" + google-query: inurl:"/wp-content/plugins/woo-fiscalita-italiana/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-fiscalita-italiana,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-fiscalita-italiana/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-fiscalita-italiana" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-floating-cart-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-floating-cart-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..db2f591c88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-floating-cart-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-floating-cart-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-floating-cart-lite/" + google-query: inurl:"/wp-content/plugins/woo-floating-cart-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-floating-cart-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-floating-cart-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-floating-cart-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-gerencianet-official-121f872296f7b7ce0005b54c410bc320.yaml b/nuclei-templates/cve-less/plugins/woo-gerencianet-official-121f872296f7b7ce0005b54c410bc320.yaml new file mode 100644 index 0000000000..e113d2f216 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-gerencianet-official-121f872296f7b7ce0005b54c410bc320.yaml @@ -0,0 +1,58 @@ +id: woo-gerencianet-official-121f872296f7b7ce0005b54c410bc320 + +info: + name: > + Gerencianet Oficial <= 1.4.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f440a5c5-2a48-4beb-849f-3f7cde5a8653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-gerencianet-official/" + google-query: inurl:"/wp-content/plugins/woo-gerencianet-official/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-gerencianet-official,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-gerencianet-official/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-gerencianet-official" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-gerencianet-official-4ee9faaf80de869a01f1ea65d80acfbb.yaml b/nuclei-templates/cve-less/plugins/woo-gerencianet-official-4ee9faaf80de869a01f1ea65d80acfbb.yaml new file mode 100644 index 0000000000..f8e0370682 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-gerencianet-official-4ee9faaf80de869a01f1ea65d80acfbb.yaml @@ -0,0 +1,58 @@ +id: woo-gerencianet-official-4ee9faaf80de869a01f1ea65d80acfbb + +info: + name: > + Gerencianet Oficial <= 1.4.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5edaf310-c410-47dd-89cf-9aa15ab97acd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-gerencianet-official/" + google-query: inurl:"/wp-content/plugins/woo-gerencianet-official/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-gerencianet-official,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-gerencianet-official/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-gerencianet-official" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-gift-cards-lite-3a32b3729ec435ff7a8be0b786f133fc.yaml b/nuclei-templates/cve-less/plugins/woo-gift-cards-lite-3a32b3729ec435ff7a8be0b786f133fc.yaml new file mode 100644 index 0000000000..1c8e65b9a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-gift-cards-lite-3a32b3729ec435ff7a8be0b786f133fc.yaml @@ -0,0 +1,58 @@ +id: woo-gift-cards-lite-3a32b3729ec435ff7a8be0b786f133fc + +info: + name: > + Ultimate Gift Cards for WooCommerce – Create, Redeem & Manage Digital Gift Certificates with Personalized Templates <= 2.6.6 - Missing Authorization to Unauthenticated Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b0d0c44-0ee8-400b-a4ea-e5520c2a6710?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-gift-cards-lite/" + google-query: inurl:"/wp-content/plugins/woo-gift-cards-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-gift-cards-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-gift-cards-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-gift-cards-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-gift-cards-lite-dea87137a3d1b873f5ca5b46839f87d8.yaml b/nuclei-templates/cve-less/plugins/woo-gift-cards-lite-dea87137a3d1b873f5ca5b46839f87d8.yaml new file mode 100644 index 0000000000..edc062c04a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-gift-cards-lite-dea87137a3d1b873f5ca5b46839f87d8.yaml @@ -0,0 +1,58 @@ +id: woo-gift-cards-lite-dea87137a3d1b873f5ca5b46839f87d8 + +info: + name: > + Ultimate Gift Cards for WooCommerce <= 2.1.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2da322ea-0206-4838-8ac4-9dd201bb00bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-gift-cards-lite/" + google-query: inurl:"/wp-content/plugins/woo-gift-cards-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-gift-cards-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-gift-cards-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-gift-cards-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-03ab94cbc5738569e6dbfc88111c85a5.yaml b/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-03ab94cbc5738569e6dbfc88111c85a5.yaml new file mode 100644 index 0000000000..0539c7e7ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-03ab94cbc5738569e6dbfc88111c85a5.yaml @@ -0,0 +1,58 @@ +id: woo-gutenberg-products-block-03ab94cbc5738569e6dbfc88111c85a5 + +info: + name: > + WooCommerce <= 8.1.1 & WooCommerce Blocks <= 11.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Featured Image alt Attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/525dec5b-b457-483c-ab2d-09dd320edcaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-gutenberg-products-block/" + google-query: inurl:"/wp-content/plugins/woo-gutenberg-products-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-gutenberg-products-block,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-gutenberg-products-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-gutenberg-products-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-749a7702ffa607983798f5d2868f83ea.yaml b/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-749a7702ffa607983798f5d2868f83ea.yaml new file mode 100644 index 0000000000..c3d530f340 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-749a7702ffa607983798f5d2868f83ea.yaml @@ -0,0 +1,58 @@ +id: woo-gutenberg-products-block-749a7702ffa607983798f5d2868f83ea + +info: + name: > + WooCommerce Blocks < 5.5 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6d9d093-1e31-4d36-ac55-79cf82b231bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-gutenberg-products-block/" + google-query: inurl:"/wp-content/plugins/woo-gutenberg-products-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-gutenberg-products-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-gutenberg-products-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-gutenberg-products-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-9198fc1dbd756abf9188b781cecd0f68.yaml b/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-9198fc1dbd756abf9188b781cecd0f68.yaml new file mode 100644 index 0000000000..f88dafee8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-9198fc1dbd756abf9188b781cecd0f68.yaml @@ -0,0 +1,58 @@ +id: woo-gutenberg-products-block-9198fc1dbd756abf9188b781cecd0f68 + +info: + name: > + WooCommerce Blocks <= 3.7.0 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0a311b7-5582-4581-bf4e-636d8a936ac6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-gutenberg-products-block/" + google-query: inurl:"/wp-content/plugins/woo-gutenberg-products-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-gutenberg-products-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-gutenberg-products-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-gutenberg-products-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-9b394c0cb664e18a38599c0b1cdfdbd2.yaml b/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-9b394c0cb664e18a38599c0b1cdfdbd2.yaml new file mode 100644 index 0000000000..8f038546a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-gutenberg-products-block-9b394c0cb664e18a38599c0b1cdfdbd2.yaml @@ -0,0 +1,58 @@ +id: woo-gutenberg-products-block-9b394c0cb664e18a38599c0b1cdfdbd2 + +info: + name: > + WooCommerce <= 4.6.1 & WooCommerce Blocks <= 3.7.0 - Settings Bypass leading to Account Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c6a49d1-633b-47aa-8390-5df3bf8f71a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-gutenberg-products-block/" + google-query: inurl:"/wp-content/plugins/woo-gutenberg-products-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-gutenberg-products-block,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-gutenberg-products-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-gutenberg-products-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-login-redirect-63de733b8b1cbcf5195bd25b24651bd1.yaml b/nuclei-templates/cve-less/plugins/woo-login-redirect-63de733b8b1cbcf5195bd25b24651bd1.yaml new file mode 100644 index 0000000000..45a570ffcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-login-redirect-63de733b8b1cbcf5195bd25b24651bd1.yaml @@ -0,0 +1,58 @@ +id: woo-login-redirect-63de733b8b1cbcf5195bd25b24651bd1 + +info: + name: > + WooCommerce Login Redirect <= 2.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53d5fbcf-7af7-4345-b207-0a3277f78065?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-login-redirect/" + google-query: inurl:"/wp-content/plugins/woo-login-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-login-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-login-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-login-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-login-redirect-ce92d15642911831d9ca92e448d0dc45.yaml b/nuclei-templates/cve-less/plugins/woo-login-redirect-ce92d15642911831d9ca92e448d0dc45.yaml new file mode 100644 index 0000000000..62ef864d5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-login-redirect-ce92d15642911831d9ca92e448d0dc45.yaml @@ -0,0 +1,58 @@ +id: woo-login-redirect-ce92d15642911831d9ca92e448d0dc45 + +info: + name: > + WooCommerce Login Redirect <= 2.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8b0d708-4f74-4e6d-9581-f65caf976d45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-login-redirect/" + google-query: inurl:"/wp-content/plugins/woo-login-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-login-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-login-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-login-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-lucky-wheel-3ef982ad02fa7fc67bd896ba5c9c238f.yaml b/nuclei-templates/cve-less/plugins/woo-lucky-wheel-3ef982ad02fa7fc67bd896ba5c9c238f.yaml new file mode 100644 index 0000000000..51b93a18e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-lucky-wheel-3ef982ad02fa7fc67bd896ba5c9c238f.yaml @@ -0,0 +1,58 @@ +id: woo-lucky-wheel-3ef982ad02fa7fc67bd896ba5c9c238f + +info: + name: > + Lucky Wheel for WooCommerce – Spin a Sale <= 1.0.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61aaeca4-6b5c-4b00-ab71-bba976d9e1b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-lucky-wheel/" + google-query: inurl:"/wp-content/plugins/woo-lucky-wheel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-lucky-wheel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-lucky-wheel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-lucky-wheel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-mailerlite-88cd9d196e2b824c736badcdf2c60486.yaml b/nuclei-templates/cve-less/plugins/woo-mailerlite-88cd9d196e2b824c736badcdf2c60486.yaml new file mode 100644 index 0000000000..f25b0f687c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-mailerlite-88cd9d196e2b824c736badcdf2c60486.yaml @@ -0,0 +1,58 @@ +id: woo-mailerlite-88cd9d196e2b824c736badcdf2c60486 + +info: + name: > + MailerLite – WooCommerce integration <= 2.0.8 - Missing Authorization via Multiple Functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/757690b0-6c59-4e74-aad2-f5fde9f7a2fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-mailerlite/" + google-query: inurl:"/wp-content/plugins/woo-mailerlite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-mailerlite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-mailerlite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-mailerlite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-mailerlite-cca05bc5622e1c098579dbd96b0cb97a.yaml b/nuclei-templates/cve-less/plugins/woo-mailerlite-cca05bc5622e1c098579dbd96b0cb97a.yaml new file mode 100644 index 0000000000..25c8fd16d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-mailerlite-cca05bc5622e1c098579dbd96b0cb97a.yaml @@ -0,0 +1,58 @@ +id: woo-mailerlite-cca05bc5622e1c098579dbd96b0cb97a + +info: + name: > + MailerLite – WooCommerce integration <= 2.0.8 - Cross-Site Request Forgery via Multiple AJAX Functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ea7ccb0-c0fb-4ef3-8041-9bf5abe36e3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-mailerlite/" + google-query: inurl:"/wp-content/plugins/woo-mailerlite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-mailerlite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-mailerlite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-mailerlite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-merchantx-775b75e12971ef700fb478179dfd07a1.yaml b/nuclei-templates/cve-less/plugins/woo-merchantx-775b75e12971ef700fb478179dfd07a1.yaml new file mode 100644 index 0000000000..232fc6dccb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-merchantx-775b75e12971ef700fb478179dfd07a1.yaml @@ -0,0 +1,58 @@ +id: woo-merchantx-775b75e12971ef700fb478179dfd07a1 + +info: + name: > + Woo MerchantX <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28c3b377-4cab-4c17-adc3-6ce8b600b20a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-merchantx/" + google-query: inurl:"/wp-content/plugins/woo-merchantx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-merchantx,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-merchantx/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-merchantx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-min-max-quantity-step-control-single-c32694721413767cb44f24e1463718a9.yaml b/nuclei-templates/cve-less/plugins/woo-min-max-quantity-step-control-single-c32694721413767cb44f24e1463718a9.yaml new file mode 100644 index 0000000000..4357b655e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-min-max-quantity-step-control-single-c32694721413767cb44f24e1463718a9.yaml @@ -0,0 +1,58 @@ +id: woo-min-max-quantity-step-control-single-c32694721413767cb44f24e1463718a9 + +info: + name: > + Min Max Control <= 4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4240fcda-c61d-4888-8837-5012e5ba1f26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-min-max-quantity-step-control-single/" + google-query: inurl:"/wp-content/plugins/woo-min-max-quantity-step-control-single/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-min-max-quantity-step-control-single,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-min-max-quantity-step-control-single/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-min-max-quantity-step-control-single" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-moneybird-23c9a6bcdbbbbe8c2bbfd755ec5ced2f.yaml b/nuclei-templates/cve-less/plugins/woo-moneybird-23c9a6bcdbbbbe8c2bbfd755ec5ced2f.yaml new file mode 100644 index 0000000000..fd27ccd065 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-moneybird-23c9a6bcdbbbbe8c2bbfd755ec5ced2f.yaml @@ -0,0 +1,58 @@ +id: woo-moneybird-23c9a6bcdbbbbe8c2bbfd755ec5ced2f + +info: + name: > + Integration of Moneybird for WooCommerce <= 2.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/962c0440-04d7-4201-829c-dad9b8f796d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-moneybird/" + google-query: inurl:"/wp-content/plugins/woo-moneybird/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-moneybird,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-moneybird/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-moneybird" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-multi-currency-04585caadf98109f09006297093db829.yaml b/nuclei-templates/cve-less/plugins/woo-multi-currency-04585caadf98109f09006297093db829.yaml new file mode 100644 index 0000000000..fb71a9a5a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-multi-currency-04585caadf98109f09006297093db829.yaml @@ -0,0 +1,58 @@ +id: woo-multi-currency-04585caadf98109f09006297093db829 + +info: + name: > + CURCY <= 2.1.25 - Missing Authorization to Currency Exchange Retrieval + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca24aa2f-5d31-4128-af75-68bd24637ee7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-multi-currency/" + google-query: inurl:"/wp-content/plugins/woo-multi-currency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-multi-currency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-multi-currency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-multi-currency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-multi-currency-284ad5b3246186f6f3b938546b4129a9.yaml b/nuclei-templates/cve-less/plugins/woo-multi-currency-284ad5b3246186f6f3b938546b4129a9.yaml new file mode 100644 index 0000000000..3e6c1c6d48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-multi-currency-284ad5b3246186f6f3b938546b4129a9.yaml @@ -0,0 +1,58 @@ +id: woo-multi-currency-284ad5b3246186f6f3b938546b4129a9 + +info: + name: > + CURCY <= 2.1.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7870badf-a1c8-4a47-adac-d6535ab81d79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-multi-currency/" + google-query: inurl:"/wp-content/plugins/woo-multi-currency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-multi-currency,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-multi-currency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-multi-currency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-multi-currency-4e4599c0d5b0830c29196e68a72f1714.yaml b/nuclei-templates/cve-less/plugins/woo-multi-currency-4e4599c0d5b0830c29196e68a72f1714.yaml new file mode 100644 index 0000000000..ace3666682 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-multi-currency-4e4599c0d5b0830c29196e68a72f1714.yaml @@ -0,0 +1,58 @@ +id: woo-multi-currency-4e4599c0d5b0830c29196e68a72f1714 + +info: + name: > + WooCommerce Multi Currency <= 2.1.17 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8a490c6-14c1-4c71-b44c-1e362cc892a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-multi-currency/" + google-query: inurl:"/wp-content/plugins/woo-multi-currency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-multi-currency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-multi-currency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-multi-currency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-myghpay-payment-gateway-eb8db2756daf0437e7a0fbebd28c57f2.yaml b/nuclei-templates/cve-less/plugins/woo-myghpay-payment-gateway-eb8db2756daf0437e7a0fbebd28c57f2.yaml new file mode 100644 index 0000000000..87d8bf6a10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-myghpay-payment-gateway-eb8db2756daf0437e7a0fbebd28c57f2.yaml @@ -0,0 +1,58 @@ +id: woo-myghpay-payment-gateway-eb8db2756daf0437e7a0fbebd28c57f2 + +info: + name: > + WooCommerce myghpay Payment Gateway <= 3.0 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4528a772-6758-4a6e-a325-5f9fd9f1b71d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-myghpay-payment-gateway/" + google-query: inurl:"/wp-content/plugins/woo-myghpay-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-myghpay-payment-gateway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-myghpay-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-myghpay-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-nmi-three-step-3be6a8dd2db55478dab854bd989a4208.yaml b/nuclei-templates/cve-less/plugins/woo-nmi-three-step-3be6a8dd2db55478dab854bd989a4208.yaml new file mode 100644 index 0000000000..3ac36b1278 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-nmi-three-step-3be6a8dd2db55478dab854bd989a4208.yaml @@ -0,0 +1,58 @@ +id: woo-nmi-three-step-3be6a8dd2db55478dab854bd989a4208 + +info: + name: > + NMI Gateway For WooCommerce <= 1.6.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d0a709e-1514-43dd-8719-e9bdfdc610d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-nmi-three-step/" + google-query: inurl:"/wp-content/plugins/woo-nmi-three-step/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-nmi-three-step,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-nmi-three-step/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-nmi-three-step" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-order-export-lite-17a0ab6b1d7221d78713c85b5cfc7d09.yaml b/nuclei-templates/cve-less/plugins/woo-order-export-lite-17a0ab6b1d7221d78713c85b5cfc7d09.yaml new file mode 100644 index 0000000000..ea76d51c4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-order-export-lite-17a0ab6b1d7221d78713c85b5cfc7d09.yaml @@ -0,0 +1,58 @@ +id: woo-order-export-lite-17a0ab6b1d7221d78713c85b5cfc7d09 + +info: + name: > + Advanced Order Export For WooCommerce <= 1.5.4 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92bd8f53-7845-4741-84e7-4930dfa973ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-order-export-lite/" + google-query: inurl:"/wp-content/plugins/woo-order-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-order-export-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-order-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-order-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-order-export-lite-45f3255db2b21cf02cfd20c83ca9648c.yaml b/nuclei-templates/cve-less/plugins/woo-order-export-lite-45f3255db2b21cf02cfd20c83ca9648c.yaml new file mode 100644 index 0000000000..b712b58a76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-order-export-lite-45f3255db2b21cf02cfd20c83ca9648c.yaml @@ -0,0 +1,58 @@ +id: woo-order-export-lite-45f3255db2b21cf02cfd20c83ca9648c + +info: + name: > + Advanced Order Export for WooCommerce <= 3.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2628f9dd-a020-49e6-bcea-f839e1d1a8a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-order-export-lite/" + google-query: inurl:"/wp-content/plugins/woo-order-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-order-export-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-order-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-order-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-order-export-lite-585b04156d64682d18676fed41ed4dfa.yaml b/nuclei-templates/cve-less/plugins/woo-order-export-lite-585b04156d64682d18676fed41ed4dfa.yaml new file mode 100644 index 0000000000..3b6f0b21a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-order-export-lite-585b04156d64682d18676fed41ed4dfa.yaml @@ -0,0 +1,58 @@ +id: woo-order-export-lite-585b04156d64682d18676fed41ed4dfa + +info: + name: > + Advanced Order Export For WooCommerce <= 3.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a425e1c-9b18-468f-975a-57239ce24601?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-order-export-lite/" + google-query: inurl:"/wp-content/plugins/woo-order-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-order-export-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-order-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-order-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-order-export-lite-82c4fdf6c165bae11c6baa8d84cc1665.yaml b/nuclei-templates/cve-less/plugins/woo-order-export-lite-82c4fdf6c165bae11c6baa8d84cc1665.yaml new file mode 100644 index 0000000000..fc0d6a74d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-order-export-lite-82c4fdf6c165bae11c6baa8d84cc1665.yaml @@ -0,0 +1,58 @@ +id: woo-order-export-lite-82c4fdf6c165bae11c6baa8d84cc1665 + +info: + name: > + Advanced Order Export For WooCommerce <= 3.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e9291e8-b4f5-4fd1-aded-4690f82f6905?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-order-export-lite/" + google-query: inurl:"/wp-content/plugins/woo-order-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-order-export-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-order-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-order-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-order-export-lite-8cd31768dc61f0033829ab9bfd911338.yaml b/nuclei-templates/cve-less/plugins/woo-order-export-lite-8cd31768dc61f0033829ab9bfd911338.yaml new file mode 100644 index 0000000000..0a139c23f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-order-export-lite-8cd31768dc61f0033829ab9bfd911338.yaml @@ -0,0 +1,58 @@ +id: woo-order-export-lite-8cd31768dc61f0033829ab9bfd911338 + +info: + name: > + Advanced Order Export for WooCommerce <= 3.1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c89d541f-d34e-46f9-a7cd-aeb00b2e8ad0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-order-export-lite/" + google-query: inurl:"/wp-content/plugins/woo-order-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-order-export-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-order-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-order-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-order-export-lite-b59d3f14536598579f52eca567b11500.yaml b/nuclei-templates/cve-less/plugins/woo-order-export-lite-b59d3f14536598579f52eca567b11500.yaml new file mode 100644 index 0000000000..c223514542 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-order-export-lite-b59d3f14536598579f52eca567b11500.yaml @@ -0,0 +1,58 @@ +id: woo-order-export-lite-b59d3f14536598579f52eca567b11500 + +info: + name: > + Advanced Order Export For WooCommerce <= 3.4.4 - Authenticated (Shop Manager+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86d5af9f-ffe9-4d22-885d-e117da7687de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-order-export-lite/" + google-query: inurl:"/wp-content/plugins/woo-order-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-order-export-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-order-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-order-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-order-export-lite-db3f5d95cd42ccb9361196cfcc805ca2.yaml b/nuclei-templates/cve-less/plugins/woo-order-export-lite-db3f5d95cd42ccb9361196cfcc805ca2.yaml new file mode 100644 index 0000000000..17f9d14e09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-order-export-lite-db3f5d95cd42ccb9361196cfcc805ca2.yaml @@ -0,0 +1,58 @@ +id: woo-order-export-lite-db3f5d95cd42ccb9361196cfcc805ca2 + +info: + name: > + Advanced Order Export For WooCommerce <= 3.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d6488ce-e34a-4b23-806d-fa2fb948ea8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-order-export-lite/" + google-query: inurl:"/wp-content/plugins/woo-order-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-order-export-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-order-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-order-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-orders-tracking-1a6f3983d747959c89e7ec5dc65f9024.yaml b/nuclei-templates/cve-less/plugins/woo-orders-tracking-1a6f3983d747959c89e7ec5dc65f9024.yaml new file mode 100644 index 0000000000..d62de8ee25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-orders-tracking-1a6f3983d747959c89e7ec5dc65f9024.yaml @@ -0,0 +1,58 @@ +id: woo-orders-tracking-1a6f3983d747959c89e7ec5dc65f9024 + +info: + name: > + Orders Tracking for WooCommerce <= 1.2.10 - Unauthenticated Arbitrary Shortcode Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/991ab188-869c-4875-80f3-940000a1717b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-orders-tracking/" + google-query: inurl:"/wp-content/plugins/woo-orders-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-orders-tracking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-orders-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-orders-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-orders-tracking-685c428e53c4340f09b6fcad98e8d448.yaml b/nuclei-templates/cve-less/plugins/woo-orders-tracking-685c428e53c4340f09b6fcad98e8d448.yaml new file mode 100644 index 0000000000..5e64c6f32c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-orders-tracking-685c428e53c4340f09b6fcad98e8d448.yaml @@ -0,0 +1,58 @@ +id: woo-orders-tracking-685c428e53c4340f09b6fcad98e8d448 + +info: + name: > + Orders Tracking for WooCommerce <= 1.2.5 - Authenticated (Administrator+) Directory Traversal via 'file_url' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a62e8b2-7606-4842-8be5-dff8634539d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-orders-tracking/" + google-query: inurl:"/wp-content/plugins/woo-orders-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-orders-tracking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-orders-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-orders-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-orders-tracking-dc785a9dfefaca6a0bea1613af751930.yaml b/nuclei-templates/cve-less/plugins/woo-orders-tracking-dc785a9dfefaca6a0bea1613af751930.yaml new file mode 100644 index 0000000000..5d629592ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-orders-tracking-dc785a9dfefaca6a0bea1613af751930.yaml @@ -0,0 +1,58 @@ +id: woo-orders-tracking-dc785a9dfefaca6a0bea1613af751930 + +info: + name: > + Orders Tracking for WooCommerce <= 1.0.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0eed0fd-8841-41d1-80fb-dd02f2a1edf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-orders-tracking/" + google-query: inurl:"/wp-content/plugins/woo-orders-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-orders-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-orders-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-orders-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-parcel-pro-24c087c6076b1a75e662317afa8f98e8.yaml b/nuclei-templates/cve-less/plugins/woo-parcel-pro-24c087c6076b1a75e662317afa8f98e8.yaml new file mode 100644 index 0000000000..420b593bfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-parcel-pro-24c087c6076b1a75e662317afa8f98e8.yaml @@ -0,0 +1,58 @@ +id: woo-parcel-pro-24c087c6076b1a75e662317afa8f98e8 + +info: + name: > + Parcel Pro <= 1.6.11 - Open Redirect via 'redirect' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95d4fbf6-e21a-48db-bfb3-32fc9116afa0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-parcel-pro/" + google-query: inurl:"/wp-content/plugins/woo-parcel-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-parcel-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-parcel-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-parcel-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-parcel-pro-6aa82d20e38845c6379edadfe73f8c79.yaml b/nuclei-templates/cve-less/plugins/woo-parcel-pro-6aa82d20e38845c6379edadfe73f8c79.yaml new file mode 100644 index 0000000000..3dbc495850 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-parcel-pro-6aa82d20e38845c6379edadfe73f8c79.yaml @@ -0,0 +1,58 @@ +id: woo-parcel-pro-6aa82d20e38845c6379edadfe73f8c79 + +info: + name: > + WooCommerce Parcel Pro <= 1.6.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbf54852-f3fe-4c9e-9348-44a73f9a8131?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-parcel-pro/" + google-query: inurl:"/wp-content/plugins/woo-parcel-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-parcel-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-parcel-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-parcel-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-paylate-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-paylate-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6be4d62b8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-paylate-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-paylate-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-paylate/" + google-query: inurl:"/wp-content/plugins/woo-paylate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-paylate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-paylate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-paylate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-payment-gateway-for-piraeus-bank-1c405e04f6277e8f63afc203bd74a63b.yaml b/nuclei-templates/cve-less/plugins/woo-payment-gateway-for-piraeus-bank-1c405e04f6277e8f63afc203bd74a63b.yaml new file mode 100644 index 0000000000..f36453b6df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-payment-gateway-for-piraeus-bank-1c405e04f6277e8f63afc203bd74a63b.yaml @@ -0,0 +1,58 @@ +id: woo-payment-gateway-for-piraeus-bank-1c405e04f6277e8f63afc203bd74a63b + +info: + name: > + Piraeus Bank WooCommerce Payment Gateway <= 1.6.5.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f17c4748-2a95-495c-ad3b-86b272855791?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-payment-gateway-for-piraeus-bank/" + google-query: inurl:"/wp-content/plugins/woo-payment-gateway-for-piraeus-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-payment-gateway-for-piraeus-bank,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-payment-gateway-for-piraeus-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-payment-gateway-for-piraeus-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-16eec9967d2bcd67afac046816dc70ce.yaml b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-16eec9967d2bcd67afac046816dc70ce.yaml new file mode 100644 index 0000000000..bdc2c6285d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-16eec9967d2bcd67afac046816dc70ce.yaml @@ -0,0 +1,58 @@ +id: woo-pdf-invoice-builder-16eec9967d2bcd67afac046816dc70ce + +info: + name: > + WooCommerce PDF Invoice Builder <= 1.2.101 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/652367a0-fca2-4313-8217-d8811ada0ab5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pdf-invoice-builder/" + google-query: inurl:"/wp-content/plugins/woo-pdf-invoice-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pdf-invoice-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pdf-invoice-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pdf-invoice-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.101') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-5fd419efd8243713404055494bed8420.yaml b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-5fd419efd8243713404055494bed8420.yaml new file mode 100644 index 0000000000..ccfc220851 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-5fd419efd8243713404055494bed8420.yaml @@ -0,0 +1,58 @@ +id: woo-pdf-invoice-builder-5fd419efd8243713404055494bed8420 + +info: + name: > + WooCommerce PDF Invoice Builder <= 1.2.103 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb0d093b-c339-4b19-a6cd-d2589b8e57ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pdf-invoice-builder/" + google-query: inurl:"/wp-content/plugins/woo-pdf-invoice-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pdf-invoice-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pdf-invoice-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pdf-invoice-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.103') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-6173b7b86957899221b3529556dc4a8a.yaml b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-6173b7b86957899221b3529556dc4a8a.yaml new file mode 100644 index 0000000000..e56be2ec7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-6173b7b86957899221b3529556dc4a8a.yaml @@ -0,0 +1,58 @@ +id: woo-pdf-invoice-builder-6173b7b86957899221b3529556dc4a8a + +info: + name: > + WooCommerce PDF Invoice Builder <= 1.2.89 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/200fbfc1-df21-43b0-8eb1-b2ba0cc0c0df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pdf-invoice-builder/" + google-query: inurl:"/wp-content/plugins/woo-pdf-invoice-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pdf-invoice-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pdf-invoice-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pdf-invoice-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-669481af47f05337ab733ec932b4b377.yaml b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-669481af47f05337ab733ec932b4b377.yaml new file mode 100644 index 0000000000..c7db2d8d43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-669481af47f05337ab733ec932b4b377.yaml @@ -0,0 +1,58 @@ +id: woo-pdf-invoice-builder-669481af47f05337ab733ec932b4b377 + +info: + name: > + WooCommerce PDF Invoice Builder <= 1.2.90 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a765360-8603-4ba1-a6db-dd0175ff3ddf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pdf-invoice-builder/" + google-query: inurl:"/wp-content/plugins/woo-pdf-invoice-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pdf-invoice-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pdf-invoice-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pdf-invoice-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.90') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-83c650e19a6e1371f9525c06e9d1b62b.yaml b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-83c650e19a6e1371f9525c06e9d1b62b.yaml new file mode 100644 index 0000000000..a98b151e73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-83c650e19a6e1371f9525c06e9d1b62b.yaml @@ -0,0 +1,58 @@ +id: woo-pdf-invoice-builder-83c650e19a6e1371f9525c06e9d1b62b + +info: + name: > + WooCommerce PDF Invoice Builder <= 1.2.90 - Cross-Site Request Forgery to Custom Field Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b7aac1c-6962-49cf-850f-ab7b1d220090?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pdf-invoice-builder/" + google-query: inurl:"/wp-content/plugins/woo-pdf-invoice-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pdf-invoice-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pdf-invoice-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pdf-invoice-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.90') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-c34ad7d49b6b5e2f77c281c8865fee0c.yaml b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-c34ad7d49b6b5e2f77c281c8865fee0c.yaml new file mode 100644 index 0000000000..59eccaa981 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-c34ad7d49b6b5e2f77c281c8865fee0c.yaml @@ -0,0 +1,58 @@ +id: woo-pdf-invoice-builder-c34ad7d49b6b5e2f77c281c8865fee0c + +info: + name: > + WooCommerce PDF Invoice Builder <= 1.2.90 - Cross-Site Request Forgery via Save + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebf2e701-9f9b-4a78-a61a-0cf90cdd9755?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pdf-invoice-builder/" + google-query: inurl:"/wp-content/plugins/woo-pdf-invoice-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pdf-invoice-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pdf-invoice-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pdf-invoice-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.90') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-e3fb45d4e1d6f55f124a91bc17024113.yaml b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-e3fb45d4e1d6f55f124a91bc17024113.yaml new file mode 100644 index 0000000000..12a0cae1f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pdf-invoice-builder-e3fb45d4e1d6f55f124a91bc17024113.yaml @@ -0,0 +1,58 @@ +id: woo-pdf-invoice-builder-e3fb45d4e1d6f55f124a91bc17024113 + +info: + name: > + WooCommerce PDF Invoice Builder <= 1.2.89 - Authenticated (Subscriber+) SQL Injection via Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4336d597-7e87-46eb-8abd-9fafd6cd25d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pdf-invoice-builder/" + google-query: inurl:"/wp-content/plugins/woo-pdf-invoice-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pdf-invoice-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pdf-invoice-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pdf-invoice-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.89') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pdf-invoices-bulk-download-c19240e29be09298009c0e0215eb1f86.yaml b/nuclei-templates/cve-less/plugins/woo-pdf-invoices-bulk-download-c19240e29be09298009c0e0215eb1f86.yaml new file mode 100644 index 0000000000..70fb5682c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pdf-invoices-bulk-download-c19240e29be09298009c0e0215eb1f86.yaml @@ -0,0 +1,58 @@ +id: woo-pdf-invoices-bulk-download-c19240e29be09298009c0e0215eb1f86 + +info: + name: > + PHPRelativePath Library - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ae01053-e6cd-4ddf-9e2a-4658cdb60f8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pdf-invoices-bulk-download/" + google-query: inurl:"/wp-content/plugins/woo-pdf-invoices-bulk-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pdf-invoices-bulk-download,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pdf-invoices-bulk-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pdf-invoices-bulk-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-pensopay-4745429fbf9ec000c34eb26fe0eb2f46.yaml b/nuclei-templates/cve-less/plugins/woo-pensopay-4745429fbf9ec000c34eb26fe0eb2f46.yaml new file mode 100644 index 0000000000..49c6e57715 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-pensopay-4745429fbf9ec000c34eb26fe0eb2f46.yaml @@ -0,0 +1,58 @@ +id: woo-pensopay-4745429fbf9ec000c34eb26fe0eb2f46 + +info: + name: > + WooCommerce PensoPay <= 6.3.1 - Reflected Cross-Site Scripting via 'pensopay_action' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6845b506-3d38-47f6-9348-d7931e65707a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-pensopay/" + google-query: inurl:"/wp-content/plugins/woo-pensopay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-pensopay,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-pensopay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-pensopay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-permalink-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-permalink-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..57038f2812 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-permalink-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-permalink-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-permalink-manager/" + google-query: inurl:"/wp-content/plugins/woo-permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-permalink-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-permalink-manager-cb1f5da1a0250368a9a1a2840b5fd8ff.yaml b/nuclei-templates/cve-less/plugins/woo-permalink-manager-cb1f5da1a0250368a9a1a2840b5fd8ff.yaml new file mode 100644 index 0000000000..b86574d1da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-permalink-manager-cb1f5da1a0250368a9a1a2840b5fd8ff.yaml @@ -0,0 +1,58 @@ +id: woo-permalink-manager-cb1f5da1a0250368a9a1a2840b5fd8ff + +info: + name: > + Premmerce Permalink Manager for WooCommerce <= 2.3.10 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e206ad70-c50d-46c3-b3d8-ad7305bfaa32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-permalink-manager/" + google-query: inurl:"/wp-content/plugins/woo-permalink-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-permalink-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-permalink-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-permalink-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-popup-cecf0eea6a928571e9c6c0b109812dde.yaml b/nuclei-templates/cve-less/plugins/woo-popup-cecf0eea6a928571e9c6c0b109812dde.yaml new file mode 100644 index 0000000000..7c634ba73f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-popup-cecf0eea6a928571e9c6c0b109812dde.yaml @@ -0,0 +1,58 @@ +id: woo-popup-cecf0eea6a928571e9c6c0b109812dde + +info: + name: > + woo-popup <= 1.2.2 - Reflecte Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/568d9b75-3ac9-47eb-b958-4f1781a6edc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-popup/" + google-query: inurl:"/wp-content/plugins/woo-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-preview-emails-4696b6dfedb443693738f04c3e5960c7.yaml b/nuclei-templates/cve-less/plugins/woo-preview-emails-4696b6dfedb443693738f04c3e5960c7.yaml new file mode 100644 index 0000000000..9b85b5dcd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-preview-emails-4696b6dfedb443693738f04c3e5960c7.yaml @@ -0,0 +1,58 @@ +id: woo-preview-emails-4696b6dfedb443693738f04c3e5960c7 + +info: + name: > + Preview E-Mails for WooCommerce <= 1.6.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0de5502-20a4-4436-89c6-ef42b8b40c08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-preview-emails/" + google-query: inurl:"/wp-content/plugins/woo-preview-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-preview-emails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-preview-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-preview-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-preview-emails-f05f9460461d72edc72c6f486798730b.yaml b/nuclei-templates/cve-less/plugins/woo-preview-emails-f05f9460461d72edc72c6f486798730b.yaml new file mode 100644 index 0000000000..7ef07ab04e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-preview-emails-f05f9460461d72edc72c6f486798730b.yaml @@ -0,0 +1,58 @@ +id: woo-preview-emails-f05f9460461d72edc72c6f486798730b + +info: + name: > + Preview E-mails for WooCommerce <= 2.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9e80da-4cc6-425c-892f-1ff34b07583f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-preview-emails/" + google-query: inurl:"/wp-content/plugins/woo-preview-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-preview-emails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-preview-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-preview-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-attachment-8ec1d88a0440fb4d4bbc8ae34370a592.yaml b/nuclei-templates/cve-less/plugins/woo-product-attachment-8ec1d88a0440fb4d4bbc8ae34370a592.yaml new file mode 100644 index 0000000000..3d75cd3b83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-attachment-8ec1d88a0440fb4d4bbc8ae34370a592.yaml @@ -0,0 +1,58 @@ +id: woo-product-attachment-8ec1d88a0440fb4d4bbc8ae34370a592 + +info: + name: > + WooCommerce Product Attachment <= 2.1.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8be9c76-08aa-4d41-8599-cc3494be7e58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-attachment/" + google-query: inurl:"/wp-content/plugins/woo-product-attachment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-attachment,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-attachment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-attachment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-attachment-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-product-attachment-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a3a3652c36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-attachment-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-product-attachment-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-attachment/" + google-query: inurl:"/wp-content/plugins/woo-product-attachment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-attachment,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-attachment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-attachment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-bundle-9b89103e6239de0df78ba6046e07241b.yaml b/nuclei-templates/cve-less/plugins/woo-product-bundle-9b89103e6239de0df78ba6046e07241b.yaml new file mode 100644 index 0000000000..4a7a50bdf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-bundle-9b89103e6239de0df78ba6046e07241b.yaml @@ -0,0 +1,58 @@ +id: woo-product-bundle-9b89103e6239de0df78ba6046e07241b + +info: + name: > + WPC Product Bundles for WooCommerce <= 7.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5188dc72-a00d-4a07-b178-3f3ef26d7fc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-bundle/" + google-query: inurl:"/wp-content/plugins/woo-product-bundle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-bundle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-bundle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-bundle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..8b864820c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: woo-product-carousel-slider-and-grid-ultimate-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/" + google-query: inurl:"/wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-carousel-slider-and-grid-ultimate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-carousel-slider-and-grid-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-26d0ee067e8dc6608c7e062864b37750.yaml b/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-26d0ee067e8dc6608c7e062864b37750.yaml new file mode 100644 index 0000000000..5ffc6dbc09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-26d0ee067e8dc6608c7e062864b37750.yaml @@ -0,0 +1,58 @@ +id: woo-product-carousel-slider-and-grid-ultimate-26d0ee067e8dc6608c7e062864b37750 + +info: + name: > + Product Carousel Slider & Grid Ultimate for WooCommerce <= 1.9.7 - Authenticated(Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed8636bf-229a-42a5-a19c-332679613dd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/" + google-query: inurl:"/wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-carousel-slider-and-grid-ultimate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-carousel-slider-and-grid-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-ace737eb3d27f2ecec85cbe6fb6964e9.yaml b/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-ace737eb3d27f2ecec85cbe6fb6964e9.yaml new file mode 100644 index 0000000000..e3d2874ee4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-ace737eb3d27f2ecec85cbe6fb6964e9.yaml @@ -0,0 +1,58 @@ +id: woo-product-carousel-slider-and-grid-ultimate-ace737eb3d27f2ecec85cbe6fb6964e9 + +info: + name: > + WooCommerce Product Carousel, Slider & Grid Ultimate <= 1.8.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12ad3c6c-9a01-4801-b754-79e6e1b2d2a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/" + google-query: inurl:"/wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-carousel-slider-and-grid-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-carousel-slider-and-grid-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..861995c13e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-carousel-slider-and-grid-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: woo-product-carousel-slider-and-grid-ultimate-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/" + google-query: inurl:"/wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-carousel-slider-and-grid-ultimate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-carousel-slider-and-grid-ultimate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-carousel-slider-and-grid-ultimate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-category-discount-01c368446b8700dac5340c9b9ddef1fe.yaml b/nuclei-templates/cve-less/plugins/woo-product-category-discount-01c368446b8700dac5340c9b9ddef1fe.yaml new file mode 100644 index 0000000000..834019e421 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-category-discount-01c368446b8700dac5340c9b9ddef1fe.yaml @@ -0,0 +1,58 @@ +id: woo-product-category-discount-01c368446b8700dac5340c9b9ddef1fe + +info: + name: > + Category Discount Woocommerce <= 4.12 - Missing Authorization via wpcd_save_discount() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/996b44bb-d1e0-4f82-b8ee-a98b0ae994f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-category-discount/" + google-query: inurl:"/wp-content/plugins/woo-product-category-discount/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-category-discount,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-category-discount/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-category-discount" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-category-discount-96e5ec11f01f1860b01e6de9ecd0a44e.yaml b/nuclei-templates/cve-less/plugins/woo-product-category-discount-96e5ec11f01f1860b01e6de9ecd0a44e.yaml new file mode 100644 index 0000000000..b5d2f8e5c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-category-discount-96e5ec11f01f1860b01e6de9ecd0a44e.yaml @@ -0,0 +1,58 @@ +id: woo-product-category-discount-96e5ec11f01f1860b01e6de9ecd0a44e + +info: + name: > + Category Discount Woocommerce <= 4.11 - Cross-Site Request Forgery via wpcd_save_discount() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f04dee5b-d16f-4ef0-88a4-1567e2287bd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-category-discount/" + google-query: inurl:"/wp-content/plugins/woo-product-category-discount/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-category-discount,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-category-discount/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-category-discount" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-enquiry-971d7261bd1edf88014f77f83ee8b436.yaml b/nuclei-templates/cve-less/plugins/woo-product-enquiry-971d7261bd1edf88014f77f83ee8b436.yaml new file mode 100644 index 0000000000..4f9fd1c396 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-enquiry-971d7261bd1edf88014f77f83ee8b436.yaml @@ -0,0 +1,58 @@ +id: woo-product-enquiry-971d7261bd1edf88014f77f83ee8b436 + +info: + name: > + WooCommerce Product Enquiry <= 2.3.4 - Unauthenticated Self-Based Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97c68df7-69fd-4817-9473-3d3e1fd6d348?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-enquiry/" + google-query: inurl:"/wp-content/plugins/woo-product-enquiry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-enquiry,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-enquiry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-enquiry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-feed-pro-08b219082c14d0a4ceb2c461431d5022.yaml b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-08b219082c14d0a4ceb2c461431d5022.yaml new file mode 100644 index 0000000000..1a5fa153b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-08b219082c14d0a4ceb2c461431d5022.yaml @@ -0,0 +1,58 @@ +id: woo-product-feed-pro-08b219082c14d0a4ceb2c461431d5022 + +info: + name: > + Product Feed PRO for WooCommerce <= 12.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c80833c3-8ffc-41a1-8d11-dafa962191fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-feed-pro/" + google-query: inurl:"/wp-content/plugins/woo-product-feed-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-feed-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-feed-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-feed-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-feed-pro-092da9a0754379d27798e711aadf357a.yaml b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-092da9a0754379d27798e711aadf357a.yaml new file mode 100644 index 0000000000..dce816c169 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-092da9a0754379d27798e711aadf357a.yaml @@ -0,0 +1,58 @@ +id: woo-product-feed-pro-092da9a0754379d27798e711aadf357a + +info: + name: > + Product Feed PRO for WooCommerce <= 12.4.0 - Cross-Site Request Forgery via update_project + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b0939a-1699-483c-9a4f-7978155e6ad1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-feed-pro/" + google-query: inurl:"/wp-content/plugins/woo-product-feed-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-feed-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-feed-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-feed-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-feed-pro-57778ba99fa499e925c126c40d1e19eb.yaml b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-57778ba99fa499e925c126c40d1e19eb.yaml new file mode 100644 index 0000000000..c6a0e52d25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-57778ba99fa499e925c126c40d1e19eb.yaml @@ -0,0 +1,58 @@ +id: woo-product-feed-pro-57778ba99fa499e925c126c40d1e19eb + +info: + name: > + Product Feed PRO for WooCommerce <= 11.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d990802-a964-493a-8f34-4b5784f52e60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-feed-pro/" + google-query: inurl:"/wp-content/plugins/woo-product-feed-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-feed-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-feed-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-feed-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-feed-pro-b6ba556ddde027cab29e149fd92ec34e.yaml b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-b6ba556ddde027cab29e149fd92ec34e.yaml new file mode 100644 index 0000000000..cf5af4c38d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-b6ba556ddde027cab29e149fd92ec34e.yaml @@ -0,0 +1,58 @@ +id: woo-product-feed-pro-b6ba556ddde027cab29e149fd92ec34e + +info: + name: > + Product Feed PRO for WooCommerce by AdTribes – WooCommerce Product Feeds for Google, Facebook/Meta, Bing, & More <= 13.3.1 - Sensitive Information Exposure via Log Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6edff9f-9876-4824-b057-8acbda861ffa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-feed-pro/" + google-query: inurl:"/wp-content/plugins/woo-product-feed-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-feed-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-feed-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-feed-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-feed-pro-e33771324145cc65657e7a62ea2644b5.yaml b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-e33771324145cc65657e7a62ea2644b5.yaml new file mode 100644 index 0000000000..275d1b091b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-e33771324145cc65657e7a62ea2644b5.yaml @@ -0,0 +1,58 @@ +id: woo-product-feed-pro-e33771324145cc65657e7a62ea2644b5 + +info: + name: > + Product Feed PRO for WooCommerce <= 11.0.6 - Settings Update to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b7e0b5-56a2-4f1f-be13-92721f4055fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-feed-pro/" + google-query: inurl:"/wp-content/plugins/woo-product-feed-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-feed-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-feed-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-feed-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-feed-pro-f7380d2067d81298695b7ed10624b075.yaml b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-f7380d2067d81298695b7ed10624b075.yaml new file mode 100644 index 0000000000..fbea1e24c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-feed-pro-f7380d2067d81298695b7ed10624b075.yaml @@ -0,0 +1,58 @@ +id: woo-product-feed-pro-f7380d2067d81298695b7ed10624b075 + +info: + name: > + Product Feed PRO for WooCommerce by AdTribes – WooCommerce Product Feeds for Google, Facebook/Meta, Bing, & More <= 13.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42da00cf-5fda-4ad7-ad74-0328f492abcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-feed-pro/" + google-query: inurl:"/wp-content/plugins/woo-product-feed-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-feed-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-feed-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-feed-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-filter-44c408e8dae2b7e08323b9972af77572.yaml b/nuclei-templates/cve-less/plugins/woo-product-filter-44c408e8dae2b7e08323b9972af77572.yaml new file mode 100644 index 0000000000..54779a8768 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-filter-44c408e8dae2b7e08323b9972af77572.yaml @@ -0,0 +1,58 @@ +id: woo-product-filter-44c408e8dae2b7e08323b9972af77572 + +info: + name: > + Product Filter by WBW <= 2.5.0 - Missing Authorization via getListForTbl + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77acb885-1776-4a74-96d0-4edbf1a92917?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-filter/" + google-query: inurl:"/wp-content/plugins/woo-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-filter-b0a7fb767afdd59226d27d99a02d7966.yaml b/nuclei-templates/cve-less/plugins/woo-product-filter-b0a7fb767afdd59226d27d99a02d7966.yaml new file mode 100644 index 0000000000..fa6519405d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-filter-b0a7fb767afdd59226d27d99a02d7966.yaml @@ -0,0 +1,58 @@ +id: woo-product-filter-b0a7fb767afdd59226d27d99a02d7966 + +info: + name: > + Product Filter by WooBeWoo <= 1.4.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30b6b0bf-e632-4e83-89ee-a424382534da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-filter/" + google-query: inurl:"/wp-content/plugins/woo-product-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..083801f380 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: woo-product-gallery-slider-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-gallery-slider/" + google-query: inurl:"/wp-content/plugins/woo-product-gallery-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-gallery-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-gallery-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-gallery-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-35e78d37b187cb4c7fe5d6abc5c15922.yaml b/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-35e78d37b187cb4c7fe5d6abc5c15922.yaml new file mode 100644 index 0000000000..4a186aeaec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-35e78d37b187cb4c7fe5d6abc5c15922.yaml @@ -0,0 +1,58 @@ +id: woo-product-gallery-slider-35e78d37b187cb4c7fe5d6abc5c15922 + +info: + name: > + Product Gallery Slider for WooCommerce <= 2.2.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df911497-8504-424e-8717-42d0bb6c90f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-gallery-slider/" + google-query: inurl:"/wp-content/plugins/woo-product-gallery-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-gallery-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-gallery-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-gallery-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..035586d0e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-gallery-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: woo-product-gallery-slider-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-gallery-slider/" + google-query: inurl:"/wp-content/plugins/woo-product-gallery-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-gallery-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-gallery-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-gallery-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-reviews-shortcode-345d3d45cedd9f71e91c6e61868d3c59.yaml b/nuclei-templates/cve-less/plugins/woo-product-reviews-shortcode-345d3d45cedd9f71e91c6e61868d3c59.yaml new file mode 100644 index 0000000000..53bb1a66f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-reviews-shortcode-345d3d45cedd9f71e91c6e61868d3c59.yaml @@ -0,0 +1,58 @@ +id: woo-product-reviews-shortcode-345d3d45cedd9f71e91c6e61868d3c59 + +info: + name: > + Builder for WooCommerce reviews shortcodes – ReviewShort <= 1.01.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62805bc2-16e6-4252-bea1-5c2b69cf9bc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-reviews-shortcode/" + google-query: inurl:"/wp-content/plugins/woo-product-reviews-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-reviews-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-reviews-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-reviews-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.01.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-reviews-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-product-reviews-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..992243a9c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-reviews-shortcode-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-product-reviews-shortcode-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-reviews-shortcode/" + google-query: inurl:"/wp-content/plugins/woo-product-reviews-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-reviews-shortcode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-reviews-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-reviews-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-slider-and-carousel-with-category-ba63b488e2407e68ac5be6c07d4b813b.yaml b/nuclei-templates/cve-less/plugins/woo-product-slider-and-carousel-with-category-ba63b488e2407e68ac5be6c07d4b813b.yaml new file mode 100644 index 0000000000..4a08487dd0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-slider-and-carousel-with-category-ba63b488e2407e68ac5be6c07d4b813b.yaml @@ -0,0 +1,58 @@ +id: woo-product-slider-and-carousel-with-category-ba63b488e2407e68ac5be6c07d4b813b + +info: + name: > + Product Slider and Carousel with Category for WooCommerce <= 2.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf464e16-f5cf-4b3e-a9ee-b3df9aa38c9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-slider-and-carousel-with-category/" + google-query: inurl:"/wp-content/plugins/woo-product-slider-and-carousel-with-category/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-slider-and-carousel-with-category,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-slider-and-carousel-with-category/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-slider-and-carousel-with-category" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-slider-c1072dc6be25d5ca69ffa07a2d068093.yaml b/nuclei-templates/cve-less/plugins/woo-product-slider-c1072dc6be25d5ca69ffa07a2d068093.yaml new file mode 100644 index 0000000000..bd3fb38890 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-slider-c1072dc6be25d5ca69ffa07a2d068093.yaml @@ -0,0 +1,58 @@ +id: woo-product-slider-c1072dc6be25d5ca69ffa07a2d068093 + +info: + name: > + Product Slider for WooCommerce <= 2.6.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d11e8124-1028-4dba-bbd9-c45699d78909?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-slider/" + google-query: inurl:"/wp-content/plugins/woo-product-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-slider-f700ae3c5b4e92d34fddc6f86f957267.yaml b/nuclei-templates/cve-less/plugins/woo-product-slider-f700ae3c5b4e92d34fddc6f86f957267.yaml new file mode 100644 index 0000000000..4909ffe96a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-slider-f700ae3c5b4e92d34fddc6f86f957267.yaml @@ -0,0 +1,58 @@ +id: woo-product-slider-f700ae3c5b4e92d34fddc6f86f957267 + +info: + name: > + Product Slider for WooCommerce <= 2.5.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2e8d217-51a7-4653-bb23-c53f5c75cb85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-slider/" + google-query: inurl:"/wp-content/plugins/woo-product-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-table-e2d12fb1743cf7c34146fef09c867ef4.yaml b/nuclei-templates/cve-less/plugins/woo-product-table-e2d12fb1743cf7c34146fef09c867ef4.yaml new file mode 100644 index 0000000000..e4c67fc6ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-table-e2d12fb1743cf7c34146fef09c867ef4.yaml @@ -0,0 +1,58 @@ +id: woo-product-table-e2d12fb1743cf7c34146fef09c867ef4 + +info: + name: > + Product Table for WooCommerce <= 3.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4494a0f-57fb-4ed7-8fdc-85b5dcee6549?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-table/" + google-query: inurl:"/wp-content/plugins/woo-product-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-table,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-tables-ff403ca55433c3790064bbfc25253b20.yaml b/nuclei-templates/cve-less/plugins/woo-product-tables-ff403ca55433c3790064bbfc25253b20.yaml new file mode 100644 index 0000000000..56249c628e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-tables-ff403ca55433c3790064bbfc25253b20.yaml @@ -0,0 +1,58 @@ +id: woo-product-tables-ff403ca55433c3790064bbfc25253b20 + +info: + name: > + Product Table by WBW <= 1.8.6 - Cross-Site Request Forgery via saveGroup + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eff03dbc-1bb7-4a72-b57c-f1bde966c286?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-tables/" + google-query: inurl:"/wp-content/plugins/woo-product-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-variation-gallery-865b10a62092a11efd2388d72979b0d5.yaml b/nuclei-templates/cve-less/plugins/woo-product-variation-gallery-865b10a62092a11efd2388d72979b0d5.yaml new file mode 100644 index 0000000000..4815ca2c06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-variation-gallery-865b10a62092a11efd2388d72979b0d5.yaml @@ -0,0 +1,58 @@ +id: woo-product-variation-gallery-865b10a62092a11efd2388d72979b0d5 + +info: + name: > + Variation Images Gallery for WooCommerce <= 2.3.3 - Reflected Cross-Site Scripting via style + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aaf7107c-1e9f-4020-aed3-a6a687a0cf6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-variation-gallery/" + google-query: inurl:"/wp-content/plugins/woo-product-variation-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-variation-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-variation-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-variation-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-product-variation-swatches-820cc233aa3e1e97214079c055bbd5fb.yaml b/nuclei-templates/cve-less/plugins/woo-product-variation-swatches-820cc233aa3e1e97214079c055bbd5fb.yaml new file mode 100644 index 0000000000..d2e2908507 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-product-variation-swatches-820cc233aa3e1e97214079c055bbd5fb.yaml @@ -0,0 +1,58 @@ +id: woo-product-variation-swatches-820cc233aa3e1e97214079c055bbd5fb + +info: + name: > + Variation Swatches for WooCommerce <= 2.3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72a0df23-38cd-4926-9099-8eb652e05a15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-product-variation-swatches/" + google-query: inurl:"/wp-content/plugins/woo-product-variation-swatches/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-product-variation-swatches,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-product-variation-swatches/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-product-variation-swatches" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-products-widgets-for-elementor-b224632750bfc8c01cfd4c8878280cb5.yaml b/nuclei-templates/cve-less/plugins/woo-products-widgets-for-elementor-b224632750bfc8c01cfd4c8878280cb5.yaml new file mode 100644 index 0000000000..2c240107c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-products-widgets-for-elementor-b224632750bfc8c01cfd4c8878280cb5.yaml @@ -0,0 +1,58 @@ +id: woo-products-widgets-for-elementor-b224632750bfc8c01cfd4c8878280cb5 + +info: + name: > + Woo Products Widgets For Elementor <= 1.0.7 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5652587e-280b-4bdf-b096-e09fe0194658?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-products-widgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/woo-products-widgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-products-widgets-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-products-widgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-products-widgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-products-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-products-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d23fe6a3a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-products-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-products-widgets-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-products-widgets-for-elementor/" + google-query: inurl:"/wp-content/plugins/woo-products-widgets-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-products-widgets-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-products-widgets-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-products-widgets-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-razorpay-d60970bed3416d1d0688f40201a3d447.yaml b/nuclei-templates/cve-less/plugins/woo-razorpay-d60970bed3416d1d0688f40201a3d447.yaml new file mode 100644 index 0000000000..af44b67a85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-razorpay-d60970bed3416d1d0688f40201a3d447.yaml @@ -0,0 +1,58 @@ +id: woo-razorpay-d60970bed3416d1d0688f40201a3d447 + +info: + name: > + Razorpay for WooCommerce <= 4.5.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f59cf3d6-06a0-42ec-a604-5f59c6b2be40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-razorpay/" + google-query: inurl:"/wp-content/plugins/woo-razorpay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-razorpay,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-razorpay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-razorpay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-refund-and-exchange-lite-96ff12fd53b9282c4a2c4aeb674ac66e.yaml b/nuclei-templates/cve-less/plugins/woo-refund-and-exchange-lite-96ff12fd53b9282c4a2c4aeb674ac66e.yaml new file mode 100644 index 0000000000..b161170a18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-refund-and-exchange-lite-96ff12fd53b9282c4a2c4aeb674ac66e.yaml @@ -0,0 +1,58 @@ +id: woo-refund-and-exchange-lite-96ff12fd53b9282c4a2c4aeb674ac66e + +info: + name: > + Return Refund and Exchange For WooCommerce <= 4.0.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3871bae4-f954-4692-8af8-1f96f8fcb778?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-refund-and-exchange-lite/" + google-query: inurl:"/wp-content/plugins/woo-refund-and-exchange-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-refund-and-exchange-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-refund-and-exchange-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-refund-and-exchange-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-related-products-refresh-on-reload-f9f7aa614950622531a31e76990cf4c8.yaml b/nuclei-templates/cve-less/plugins/woo-related-products-refresh-on-reload-f9f7aa614950622531a31e76990cf4c8.yaml new file mode 100644 index 0000000000..c84bef4661 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-related-products-refresh-on-reload-f9f7aa614950622531a31e76990cf4c8.yaml @@ -0,0 +1,58 @@ +id: woo-related-products-refresh-on-reload-f9f7aa614950622531a31e76990cf4c8 + +info: + name: > + Related Products for WooCommerce <= 3.3.15 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a98498b8-9397-42e9-9c99-a576975c9ac9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-related-products-refresh-on-reload/" + google-query: inurl:"/wp-content/plugins/woo-related-products-refresh-on-reload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-related-products-refresh-on-reload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-related-products-refresh-on-reload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-related-products-refresh-on-reload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-reviews-by-wiremo-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/woo-reviews-by-wiremo-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..1861dfdb49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-reviews-by-wiremo-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: woo-reviews-by-wiremo-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-reviews-by-wiremo/" + google-query: inurl:"/wp-content/plugins/woo-reviews-by-wiremo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-reviews-by-wiremo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-reviews-by-wiremo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-reviews-by-wiremo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-reviews-by-wiremo-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/woo-reviews-by-wiremo-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..db3ca8cd9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-reviews-by-wiremo-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: woo-reviews-by-wiremo-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-reviews-by-wiremo/" + google-query: inurl:"/wp-content/plugins/woo-reviews-by-wiremo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-reviews-by-wiremo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-reviews-by-wiremo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-reviews-by-wiremo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.96') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-reviews-manager-1b1e66fd36e59457695196db22e1a6e9.yaml b/nuclei-templates/cve-less/plugins/woo-reviews-manager-1b1e66fd36e59457695196db22e1a6e9.yaml new file mode 100644 index 0000000000..97187e98a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-reviews-manager-1b1e66fd36e59457695196db22e1a6e9.yaml @@ -0,0 +1,58 @@ +id: woo-reviews-manager-1b1e66fd36e59457695196db22e1a6e9 + +info: + name: > + eBay Dropshipping and Affiliate by Wooshark <= 1.5.6 - Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58a1f3a1-e00c-4b63-83ad-73205c67c0ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-reviews-manager/" + google-query: inurl:"/wp-content/plugins/woo-reviews-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-reviews-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-reviews-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-reviews-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-salesforce-plugin-crm-perks-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/woo-salesforce-plugin-crm-perks-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..f02389afde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-salesforce-plugin-crm-perks-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: woo-salesforce-plugin-crm-perks-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-salesforce-plugin-crm-perks/" + google-query: inurl:"/wp-content/plugins/woo-salesforce-plugin-crm-perks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-salesforce-plugin-crm-perks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-salesforce-plugin-crm-perks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-salesforce-plugin-crm-perks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-seo-addon-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-seo-addon-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..386838bc5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-seo-addon-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-seo-addon-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-seo-addon/" + google-query: inurl:"/wp-content/plugins/woo-seo-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-seo-addon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-seo-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-seo-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-shipping-display-mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-shipping-display-mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..92aa997915 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-shipping-display-mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-shipping-display-mode-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-shipping-display-mode/" + google-query: inurl:"/wp-content/plugins/woo-shipping-display-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-shipping-display-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-shipping-display-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-shipping-display-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-shipping-dpd-baltic-39e0cd9a1bb57b7c976fa340879a57c5.yaml b/nuclei-templates/cve-less/plugins/woo-shipping-dpd-baltic-39e0cd9a1bb57b7c976fa340879a57c5.yaml new file mode 100644 index 0000000000..edf129e778 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-shipping-dpd-baltic-39e0cd9a1bb57b7c976fa340879a57c5.yaml @@ -0,0 +1,58 @@ +id: woo-shipping-dpd-baltic-39e0cd9a1bb57b7c976fa340879a57c5 + +info: + name: > + WooCommerce Shipping – DPD baltic <= 1.2.54 - Missing Authorization to Arbitrary Options Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4b13a45-9141-47e3-ba11-c0ce15235936?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-shipping-dpd-baltic/" + google-query: inurl:"/wp-content/plugins/woo-shipping-dpd-baltic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-shipping-dpd-baltic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-shipping-dpd-baltic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-shipping-dpd-baltic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.56') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-shipping-dpd-baltic-bbc1707c7a5ee3103ec07e525a958c37.yaml b/nuclei-templates/cve-less/plugins/woo-shipping-dpd-baltic-bbc1707c7a5ee3103ec07e525a958c37.yaml new file mode 100644 index 0000000000..b201ef1e77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-shipping-dpd-baltic-bbc1707c7a5ee3103ec07e525a958c37.yaml @@ -0,0 +1,58 @@ +id: woo-shipping-dpd-baltic-bbc1707c7a5ee3103ec07e525a958c37 + +info: + name: > + WooCommerce Shipping – DPD baltic <= 1.2.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/926827a5-4231-4188-bece-fd37c1829412?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-shipping-dpd-baltic/" + google-query: inurl:"/wp-content/plugins/woo-shipping-dpd-baltic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-shipping-dpd-baltic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-shipping-dpd-baltic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-shipping-dpd-baltic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-sku-label-changer-8f9a4b2e27aff6f1c97baa2ca96cfe9f.yaml b/nuclei-templates/cve-less/plugins/woo-sku-label-changer-8f9a4b2e27aff6f1c97baa2ca96cfe9f.yaml new file mode 100644 index 0000000000..8236e020d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-sku-label-changer-8f9a4b2e27aff6f1c97baa2ca96cfe9f.yaml @@ -0,0 +1,58 @@ +id: woo-sku-label-changer-8f9a4b2e27aff6f1c97baa2ca96cfe9f + +info: + name: > + SKU Label Changer For WooCommerce <= 3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/793594f7-6325-4561-ad74-a08aebc20c53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-sku-label-changer/" + google-query: inurl:"/wp-content/plugins/woo-sku-label-changer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-sku-label-changer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-sku-label-changer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-sku-label-changer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-smart-quick-view-a4bcc5ba22f6cf25dbecf393d91d5f77.yaml b/nuclei-templates/cve-less/plugins/woo-smart-quick-view-a4bcc5ba22f6cf25dbecf393d91d5f77.yaml new file mode 100644 index 0000000000..7c5d07f88e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-smart-quick-view-a4bcc5ba22f6cf25dbecf393d91d5f77.yaml @@ -0,0 +1,58 @@ +id: woo-smart-quick-view-a4bcc5ba22f6cf25dbecf393d91d5f77 + +info: + name: > + WPC Smart Quick View for WooCommerce <= 4.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45ac52e1-9f0e-499e-9125-2581940f5bdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-smart-quick-view/" + google-query: inurl:"/wp-content/plugins/woo-smart-quick-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-smart-quick-view,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-smart-quick-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-smart-quick-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-smart-wishlist-0960254cf84107ae737889786d951876.yaml b/nuclei-templates/cve-less/plugins/woo-smart-wishlist-0960254cf84107ae737889786d951876.yaml new file mode 100644 index 0000000000..aa429dc358 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-smart-wishlist-0960254cf84107ae737889786d951876.yaml @@ -0,0 +1,58 @@ +id: woo-smart-wishlist-0960254cf84107ae737889786d951876 + +info: + name: > + WPC Smart Wishlist for WooCommerce <= 2.9.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30c0118c-3dae-4d76-8e9f-ea747d44a788?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-smart-wishlist/" + google-query: inurl:"/wp-content/plugins/woo-smart-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-smart-wishlist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-smart-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-smart-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-smart-wishlist-6ecaf4687f30a18c2f1e4bdfe098e4f9.yaml b/nuclei-templates/cve-less/plugins/woo-smart-wishlist-6ecaf4687f30a18c2f1e4bdfe098e4f9.yaml new file mode 100644 index 0000000000..5b6671b866 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-smart-wishlist-6ecaf4687f30a18c2f1e4bdfe098e4f9.yaml @@ -0,0 +1,58 @@ +id: woo-smart-wishlist-6ecaf4687f30a18c2f1e4bdfe098e4f9 + +info: + name: > + WPC Smart Wishlist for WooCommerce <= 4.7.1 - Cross-Site Request Forgery via wishlist_add and wishlist_remove + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/655fc91d-5920-4214-8ef1-8191e2683f9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-smart-wishlist/" + google-query: inurl:"/wp-content/plugins/woo-smart-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-smart-wishlist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-smart-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-smart-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-smart-wishlist-de4740107fbd20caea40fce59ea96c07.yaml b/nuclei-templates/cve-less/plugins/woo-smart-wishlist-de4740107fbd20caea40fce59ea96c07.yaml new file mode 100644 index 0000000000..21729f6d4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-smart-wishlist-de4740107fbd20caea40fce59ea96c07.yaml @@ -0,0 +1,58 @@ +id: woo-smart-wishlist-de4740107fbd20caea40fce59ea96c07 + +info: + name: > + WPC Smart Wishlist for WooCommerce <= 2.9.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2a5d8ef-109c-471b-a135-c834f090eb5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-smart-wishlist/" + google-query: inurl:"/wp-content/plugins/woo-smart-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-smart-wishlist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-smart-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-smart-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-swatches-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-swatches-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..61a23f8e70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-swatches-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-swatches-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-swatches-manager/" + google-query: inurl:"/wp-content/plugins/woo-swatches-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-swatches-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-swatches-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-swatches-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-179df283f6f4faa0dd973e427dd4bc30.yaml b/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-179df283f6f4faa0dd973e427dd4bc30.yaml new file mode 100644 index 0000000000..39dc11ec18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-179df283f6f4faa0dd973e427dd4bc30.yaml @@ -0,0 +1,58 @@ +id: woo-thank-you-page-customizer-179df283f6f4faa0dd973e427dd4bc30 + +info: + name: > + Thank You Page Customizer for WooCommerce – Increase Your Sales <= 1.1.2 - Missing Authorization to Authenticated (Subscriber+) Data Export + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e7ebc0c-6936-4632-a602-7131c7d8bd6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-thank-you-page-customizer/" + google-query: inurl:"/wp-content/plugins/woo-thank-you-page-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-thank-you-page-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-thank-you-page-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-thank-you-page-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-5cee27767ae5190db018a1cdcac6e39b.yaml b/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-5cee27767ae5190db018a1cdcac6e39b.yaml new file mode 100644 index 0000000000..af062c9eb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-5cee27767ae5190db018a1cdcac6e39b.yaml @@ -0,0 +1,58 @@ +id: woo-thank-you-page-customizer-5cee27767ae5190db018a1cdcac6e39b + +info: + name: > + Thank You Page Customizer for WooCommerce – Increase Your Sales <= 1.1.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Shortcode Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/310afe02-3a51-4633-b359-65ae58d0c032?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-thank-you-page-customizer/" + google-query: inurl:"/wp-content/plugins/woo-thank-you-page-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-thank-you-page-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-thank-you-page-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-thank-you-page-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-7bdefad8c5305dfe4fbbdb047ffa82e3.yaml b/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-7bdefad8c5305dfe4fbbdb047ffa82e3.yaml new file mode 100644 index 0000000000..d94f31678f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-thank-you-page-customizer-7bdefad8c5305dfe4fbbdb047ffa82e3.yaml @@ -0,0 +1,58 @@ +id: woo-thank-you-page-customizer-7bdefad8c5305dfe4fbbdb047ffa82e3 + +info: + name: > + Thank You Page Customizer for WooCommerce – Increase Your Sales <= 1.0.13 - Cross-Site Request Forgery via send_email + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecd504ad-8812-46ec-be18-e98d05982312?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-thank-you-page-customizer/" + google-query: inurl:"/wp-content/plugins/woo-thank-you-page-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-thank-you-page-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-thank-you-page-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-thank-you-page-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-13f75b4807aa41447c76b6287198f0e6.yaml b/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-13f75b4807aa41447c76b6287198f0e6.yaml new file mode 100644 index 0000000000..6751a15b9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-13f75b4807aa41447c76b6287198f0e6.yaml @@ -0,0 +1,58 @@ +id: woo-thank-you-page-nextmove-lite-13f75b4807aa41447c76b6287198f0e6 + +info: + name: > + NextMove Lite – Thank You Page for WooCommerce & Finale Lite – Sales Countdown Timer & Discount for WooCommerce <= 2.17.0 - Missing Authorization to Unauthenticated System Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d9332be-2cf0-46cd-81e4-6436aeec0f83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-thank-you-page-nextmove-lite/" + google-query: inurl:"/wp-content/plugins/woo-thank-you-page-nextmove-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-thank-you-page-nextmove-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-thank-you-page-nextmove-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-thank-you-page-nextmove-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-87df5cc36f24c1b7dd693537f9d2db36.yaml b/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-87df5cc36f24c1b7dd693537f9d2db36.yaml new file mode 100644 index 0000000000..5a5a5d6548 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-87df5cc36f24c1b7dd693537f9d2db36.yaml @@ -0,0 +1,58 @@ +id: woo-thank-you-page-nextmove-lite-87df5cc36f24c1b7dd693537f9d2db36 + +info: + name: > + NextMove Lite <= 2.17.0 - Missing Authorization to Authenticated(Subscriber+) Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b04ab77-880b-423a-bba6-59822f0463bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-thank-you-page-nextmove-lite/" + google-query: inurl:"/wp-content/plugins/woo-thank-you-page-nextmove-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-thank-you-page-nextmove-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-thank-you-page-nextmove-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-thank-you-page-nextmove-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-c43b2bc97ac2bdb36f5cf0cc1582221c.yaml b/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-c43b2bc97ac2bdb36f5cf0cc1582221c.yaml new file mode 100644 index 0000000000..23cd30a82c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-thank-you-page-nextmove-lite-c43b2bc97ac2bdb36f5cf0cc1582221c.yaml @@ -0,0 +1,58 @@ +id: woo-thank-you-page-nextmove-lite-c43b2bc97ac2bdb36f5cf0cc1582221c + +info: + name: > + NextMove Lite <= 2.18.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8add6b9-8d53-4239-bbbc-d32a562fd9b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-thank-you-page-nextmove-lite/" + google-query: inurl:"/wp-content/plugins/woo-thank-you-page-nextmove-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-thank-you-page-nextmove-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-thank-you-page-nextmove-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-thank-you-page-nextmove-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.18.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-tipdonation-45a6c5ecbb4131cfd2ebe25ca43d9a26.yaml b/nuclei-templates/cve-less/plugins/woo-tipdonation-45a6c5ecbb4131cfd2ebe25ca43d9a26.yaml new file mode 100644 index 0000000000..0d75572c9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-tipdonation-45a6c5ecbb4131cfd2ebe25ca43d9a26.yaml @@ -0,0 +1,58 @@ +id: woo-tipdonation-45a6c5ecbb4131cfd2ebe25ca43d9a26 + +info: + name: > + Woocommerce Tip/Donation <= 1.2 - Authenticated (Shop manager+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ec83425-c756-450e-ac46-c897ad72714c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-tipdonation/" + google-query: inurl:"/wp-content/plugins/woo-tipdonation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-tipdonation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-tipdonation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-tipdonation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-total-sales-60fd57f03f391911c0b737f75f701788.yaml b/nuclei-templates/cve-less/plugins/woo-total-sales-60fd57f03f391911c0b737f75f701788.yaml new file mode 100644 index 0000000000..84b40ff7d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-total-sales-60fd57f03f391911c0b737f75f701788.yaml @@ -0,0 +1,58 @@ +id: woo-total-sales-60fd57f03f391911c0b737f75f701788 + +info: + name: > + Woo Total Sales <= 3.1.4 - Missing Authorization to Unauthenticated Sales Report Retrieval + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/630d5dcc-ee51-4c2d-b4fb-191637311d6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-total-sales/" + google-query: inurl:"/wp-content/plugins/woo-total-sales/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-total-sales,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-total-sales/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-total-sales" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-tranzila-gateway-24387a4b139635373353e5f045ea2527.yaml b/nuclei-templates/cve-less/plugins/woo-tranzila-gateway-24387a4b139635373353e5f045ea2527.yaml new file mode 100644 index 0000000000..19cb4f667f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-tranzila-gateway-24387a4b139635373353e5f045ea2527.yaml @@ -0,0 +1,58 @@ +id: woo-tranzila-gateway-24387a4b139635373353e5f045ea2527 + +info: + name: > + WooCommerce Tranzila Gateway <= 1.0.8 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ed30ebb-cb06-428c-a60e-676f36e75fa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-tranzila-gateway/" + google-query: inurl:"/wp-content/plugins/woo-tranzila-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-tranzila-gateway,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-tranzila-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-tranzila-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-ukrposhta-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-ukrposhta-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4c352409b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-ukrposhta-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-ukrposhta-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-ukrposhta/" + google-query: inurl:"/wp-content/plugins/woo-ukrposhta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-ukrposhta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-ukrposhta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-ukrposhta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-variation-gallery-9404e968e946456749ff0111b0225ba5.yaml b/nuclei-templates/cve-less/plugins/woo-variation-gallery-9404e968e946456749ff0111b0225ba5.yaml new file mode 100644 index 0000000000..93f231ef71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-variation-gallery-9404e968e946456749ff0111b0225ba5.yaml @@ -0,0 +1,58 @@ +id: woo-variation-gallery-9404e968e946456749ff0111b0225ba5 + +info: + name: > + Additional Variation Images Gallery for WooCommerce <= 1.1.28 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76e46759-ff83-4a6b-b510-28965c88bb94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-variation-gallery/" + google-query: inurl:"/wp-content/plugins/woo-variation-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-variation-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-variation-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-variation-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-variation-swatches-2b30ea73d6d558993d47f6388caba82c.yaml b/nuclei-templates/cve-less/plugins/woo-variation-swatches-2b30ea73d6d558993d47f6388caba82c.yaml new file mode 100644 index 0000000000..111ef0a3d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-variation-swatches-2b30ea73d6d558993d47f6388caba82c.yaml @@ -0,0 +1,58 @@ +id: woo-variation-swatches-2b30ea73d6d558993d47f6388caba82c + +info: + name: > + Variation Swatches for WooCommerce <= 1.0.61 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9c3ab75-93fb-4c63-a430-61d02a031e46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-variation-swatches/" + google-query: inurl:"/wp-content/plugins/woo-variation-swatches/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-variation-swatches,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-variation-swatches/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-variation-swatches" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-viet-4246ff71c6ef488c4b4e4889ffbb362f.yaml b/nuclei-templates/cve-less/plugins/woo-viet-4246ff71c6ef488c4b4e4889ffbb362f.yaml new file mode 100644 index 0000000000..3b3751d2a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-viet-4246ff71c6ef488c4b4e4889ffbb362f.yaml @@ -0,0 +1,58 @@ +id: woo-viet-4246ff71c6ef488c4b4e4889ffbb362f + +info: + name: > + Woo Viet <= 1.5.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4204209b-054f-4249-87d0-a0837ac172d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-viet/" + google-query: inurl:"/wp-content/plugins/woo-viet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-viet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-viet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-viet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-56d4c43d31e2f8fea26c256a0553165d.yaml b/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-56d4c43d31e2f8fea26c256a0553165d.yaml new file mode 100644 index 0000000000..caf3d7c205 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-56d4c43d31e2f8fea26c256a0553165d.yaml @@ -0,0 +1,58 @@ +id: woo-vietnam-checkout-56d4c43d31e2f8fea26c256a0553165d + +info: + name: > + Woocommerce Vietnam Checkout <= 2.0.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4483fb33-3815-4ec9-9df4-a971844f4855?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-vietnam-checkout/" + google-query: inurl:"/wp-content/plugins/woo-vietnam-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-vietnam-checkout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-vietnam-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-vietnam-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-b2ee5069c05c98988181a6b0620a514c.yaml b/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-b2ee5069c05c98988181a6b0620a514c.yaml new file mode 100644 index 0000000000..5e308e4097 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-b2ee5069c05c98988181a6b0620a514c.yaml @@ -0,0 +1,58 @@ +id: woo-vietnam-checkout-b2ee5069c05c98988181a6b0620a514c + +info: + name: > + Woocommerce Vietnam Checkout <= 2.0.7 - Authenticated (Shop manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02402620-89db-448d-9028-379856735a2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-vietnam-checkout/" + google-query: inurl:"/wp-content/plugins/woo-vietnam-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-vietnam-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-vietnam-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-vietnam-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-e718f73216a4ec4310297c0a9de0ac63.yaml b/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-e718f73216a4ec4310297c0a9de0ac63.yaml new file mode 100644 index 0000000000..77c1e3d2c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-e718f73216a4ec4310297c0a9de0ac63.yaml @@ -0,0 +1,58 @@ +id: woo-vietnam-checkout-e718f73216a4ec4310297c0a9de0ac63 + +info: + name: > + Woocommerce Vietnam Checkout <= 2.0.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5344499d-c183-4164-a52c-0dca7873f63d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-vietnam-checkout/" + google-query: inurl:"/wp-content/plugins/woo-vietnam-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-vietnam-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-vietnam-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-vietnam-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-eab2919aee1646dd0938cff504effdc4.yaml b/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-eab2919aee1646dd0938cff504effdc4.yaml new file mode 100644 index 0000000000..bd65b9c8d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-vietnam-checkout-eab2919aee1646dd0938cff504effdc4.yaml @@ -0,0 +1,58 @@ +id: woo-vietnam-checkout-eab2919aee1646dd0938cff504effdc4 + +info: + name: > + Woocommerce Vietnam Checkout <= 2.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7d6f828-0d7b-4ee2-a316-ab55eb7a3d70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-vietnam-checkout/" + google-query: inurl:"/wp-content/plugins/woo-vietnam-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-vietnam-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-vietnam-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-vietnam-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-vipps-e6cf650c13f11df4cb2b334fe314415e.yaml b/nuclei-templates/cve-less/plugins/woo-vipps-e6cf650c13f11df4cb2b334fe314415e.yaml new file mode 100644 index 0000000000..eb7cdc1ba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-vipps-e6cf650c13f11df4cb2b334fe314415e.yaml @@ -0,0 +1,58 @@ +id: woo-vipps-e6cf650c13f11df4cb2b334fe314415e + +info: + name: > + Pay with Vipps for WooCommerce <= 1.14.13 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2950a264-b60c-48ad-b8e0-6d0e1a230982?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-vipps/" + google-query: inurl:"/wp-content/plugins/woo-vipps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-vipps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-vipps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-vipps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-wallet-6cf5df1f5906c35e420af33d77451aff.yaml b/nuclei-templates/cve-less/plugins/woo-wallet-6cf5df1f5906c35e420af33d77451aff.yaml new file mode 100644 index 0000000000..aabf0c7e62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-wallet-6cf5df1f5906c35e420af33d77451aff.yaml @@ -0,0 +1,58 @@ +id: woo-wallet-6cf5df1f5906c35e420af33d77451aff + +info: + name: > + TeraWallet – For WooCommerce <= 1.3.24 - Cross-Site Request Forgery via lock_unlock_terawallet + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65189c49-600d-4a69-a687-0ff9e327783e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-wallet/" + google-query: inurl:"/wp-content/plugins/woo-wallet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-wallet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-wallet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-wallet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-wallet-b6b61804ee61270fd88ffc6edea74fbb.yaml b/nuclei-templates/cve-less/plugins/woo-wallet-b6b61804ee61270fd88ffc6edea74fbb.yaml new file mode 100644 index 0000000000..81a3ff7d5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-wallet-b6b61804ee61270fd88ffc6edea74fbb.yaml @@ -0,0 +1,58 @@ +id: woo-wallet-b6b61804ee61270fd88ffc6edea74fbb + +info: + name: > + TeraWallet – For WooCommerce <= 1.4.3 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec57e0b2-61b0-4b67-9784-dbb4e6c4e4a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-wallet/" + google-query: inurl:"/wp-content/plugins/woo-wallet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-wallet,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-wallet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-wallet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-wallet-d38b07bf476ecd6b9ce90d545b02abb0.yaml b/nuclei-templates/cve-less/plugins/woo-wallet-d38b07bf476ecd6b9ce90d545b02abb0.yaml new file mode 100644 index 0000000000..58be8d1abb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-wallet-d38b07bf476ecd6b9ce90d545b02abb0.yaml @@ -0,0 +1,58 @@ +id: woo-wallet-d38b07bf476ecd6b9ce90d545b02abb0 + +info: + name: > + TeraWallet – For WooCommerce <= 1.3.24 - Cross-Site Request Forgery via admin_options + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d274f8b1-0f7c-44cc-8063-3d04a33a9404?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-wallet/" + google-query: inurl:"/wp-content/plugins/woo-wallet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-wallet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-wallet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-wallet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-wallet-d844d4bb69ae6b349312f77792834a3c.yaml b/nuclei-templates/cve-less/plugins/woo-wallet-d844d4bb69ae6b349312f77792834a3c.yaml new file mode 100644 index 0000000000..d7a954ef3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-wallet-d844d4bb69ae6b349312f77792834a3c.yaml @@ -0,0 +1,58 @@ +id: woo-wallet-d844d4bb69ae6b349312f77792834a3c + +info: + name: > + TeraWallet – Best WooCommerce Wallet System With Cashback Rewards, Partial Payment, Wallet Refunds <= 1.5.0 - Authenticated (Shop Manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e35b077-8bb4-49fb-bd79-d9086d9a26dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-wallet/" + google-query: inurl:"/wp-content/plugins/woo-wallet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-wallet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-wallet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-wallet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-wallet-fcef50fc4ab0d04c6eb8673c640961fc.yaml b/nuclei-templates/cve-less/plugins/woo-wallet-fcef50fc4ab0d04c6eb8673c640961fc.yaml new file mode 100644 index 0000000000..8ccd6c6ee1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-wallet-fcef50fc4ab0d04c6eb8673c640961fc.yaml @@ -0,0 +1,58 @@ +id: woo-wallet-fcef50fc4ab0d04c6eb8673c640961fc + +info: + name: > + TeraWallet – Best WooCommerce Wallet System With Cashback Rewards, Partial Payment, Wallet Refunds <= 1.4.10 - Missing Authorization to Authenticated (Subscriber+) User Email Export + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18e24a2e-cbc6-4285-b846-bea513b6ff69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-wallet/" + google-query: inurl:"/wp-content/plugins/woo-wallet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-wallet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-wallet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-wallet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-whatsapp-request-quote-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/woo-whatsapp-request-quote-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..b8dde40700 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-whatsapp-request-quote-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: woo-whatsapp-request-quote-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-whatsapp-request-quote/" + google-query: inurl:"/wp-content/plugins/woo-whatsapp-request-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-whatsapp-request-quote,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-whatsapp-request-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-whatsapp-request-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woo-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..11f58bf988 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woo-wholesale-pricing-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-wholesale-pricing/" + google-query: inurl:"/wp-content/plugins/woo-wholesale-pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-wholesale-pricing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-wholesale-pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-wholesale-pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-widget-product-slideshow-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/woo-widget-product-slideshow-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..0d087aaf90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-widget-product-slideshow-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: woo-widget-product-slideshow-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-widget-product-slideshow/" + google-query: inurl:"/wp-content/plugins/woo-widget-product-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-widget-product-slideshow,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-widget-product-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-widget-product-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-zoho-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/woo-zoho-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..e59f52411b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-zoho-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: woo-zoho-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-zoho/" + google-query: inurl:"/wp-content/plugins/woo-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-zoho,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woo-zoho-359caa278db872385828cbff71df46b1.yaml b/nuclei-templates/cve-less/plugins/woo-zoho-359caa278db872385828cbff71df46b1.yaml new file mode 100644 index 0000000000..0103594448 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woo-zoho-359caa278db872385828cbff71df46b1.yaml @@ -0,0 +1,58 @@ +id: woo-zoho-359caa278db872385828cbff71df46b1 + +info: + name: > + Integration for WooCommerce and Zoho CRM <= 1.3.6 - Open Redirect via setup_plugin + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb3b1429-4d58-41e3-bc99-9d0d38885293?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-zoho/" + google-query: inurl:"/wp-content/plugins/woo-zoho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-zoho,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-zoho/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-zoho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-03ab94cbc5738569e6dbfc88111c85a5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-03ab94cbc5738569e6dbfc88111c85a5.yaml new file mode 100644 index 0000000000..cf8dacc013 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-03ab94cbc5738569e6dbfc88111c85a5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-03ab94cbc5738569e6dbfc88111c85a5 + +info: + name: > + WooCommerce <= 8.1.1 & WooCommerce Blocks <= 11.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Featured Image alt Attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/525dec5b-b457-483c-ab2d-09dd320edcaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-13f4465ab134739f41610e238895c266.yaml b/nuclei-templates/cve-less/plugins/woocommerce-13f4465ab134739f41610e238895c266.yaml new file mode 100644 index 0000000000..645e9b875c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-13f4465ab134739f41610e238895c266.yaml @@ -0,0 +1,58 @@ +id: woocommerce-13f4465ab134739f41610e238895c266 + +info: + name: > + WooCommerce < 8.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43810a17-89b4-44f5-887e-1ad0989ea5b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-1645d7b438ae878dd17947c113ddb596.yaml b/nuclei-templates/cve-less/plugins/woocommerce-1645d7b438ae878dd17947c113ddb596.yaml new file mode 100644 index 0000000000..28280f9626 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-1645d7b438ae878dd17947c113ddb596.yaml @@ -0,0 +1,58 @@ +id: woocommerce-1645d7b438ae878dd17947c113ddb596 + +info: + name: > + WooCommerce <= 2.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0324852f-9e19-467c-9b0b-4c9fe2dd1cc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-2checkout-payment-ff847df8e45ccd8c8631d5e2f3e5787c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-2checkout-payment-ff847df8e45ccd8c8631d5e2f3e5787c.yaml new file mode 100644 index 0000000000..4d7f77e0cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-2checkout-payment-ff847df8e45ccd8c8631d5e2f3e5787c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-2checkout-payment-ff847df8e45ccd8c8631d5e2f3e5787c + +info: + name: > + 2Checkout Payment Gateway for WooCommerce <= 6.2 - Missing Authorization via sniff_ins + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcc6a4a5-b133-4ee1-a345-a7c812624b03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-2checkout-payment/" + google-query: inurl:"/wp-content/plugins/woocommerce-2checkout-payment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-2checkout-payment,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-2checkout-payment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-2checkout-payment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-4074eef51d8ca4819a222281bd576993.yaml b/nuclei-templates/cve-less/plugins/woocommerce-4074eef51d8ca4819a222281bd576993.yaml new file mode 100644 index 0000000000..abf78cb611 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-4074eef51d8ca4819a222281bd576993.yaml @@ -0,0 +1,58 @@ +id: woocommerce-4074eef51d8ca4819a222281bd576993 + +info: + name: > + WooCommerce <= 6.2.0 - Path Traversal via Tax Importer + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cbf597e-7a2f-416c-8969-3679b487f57a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-42f5857c1a1a9fe3bd07b32288faed9d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-42f5857c1a1a9fe3bd07b32288faed9d.yaml new file mode 100644 index 0000000000..8aee90dc05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-42f5857c1a1a9fe3bd07b32288faed9d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-42f5857c1a1a9fe3bd07b32288faed9d + +info: + name: > + WooCommerce <= 3.5.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2283bd6-7d69-40b9-a1f3-56b9c71c8574?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-43309247b72224f5060fd8cc3b8291fb.yaml b/nuclei-templates/cve-less/plugins/woocommerce-43309247b72224f5060fd8cc3b8291fb.yaml new file mode 100644 index 0000000000..75116fe1af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-43309247b72224f5060fd8cc3b8291fb.yaml @@ -0,0 +1,58 @@ +id: woocommerce-43309247b72224f5060fd8cc3b8291fb + +info: + name: > + WooCommerce <= 4.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/def0da23-248b-40e2-9d70-8dd1ecbe3d45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-487085694140471bbcc32f33541e46e2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-487085694140471bbcc32f33541e46e2.yaml new file mode 100644 index 0000000000..e77b4d6269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-487085694140471bbcc32f33541e46e2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-487085694140471bbcc32f33541e46e2 + +info: + name: > + WooCommerce < 5.5 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a17560b-4fe0-4e1b-b4a2-c411f1123914?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-55e1b5df5b9827c27e5df23a7321f7ee.yaml b/nuclei-templates/cve-less/plugins/woocommerce-55e1b5df5b9827c27e5df23a7321f7ee.yaml new file mode 100644 index 0000000000..adc7c19d90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-55e1b5df5b9827c27e5df23a7321f7ee.yaml @@ -0,0 +1,58 @@ +id: woocommerce-55e1b5df5b9827c27e5df23a7321f7ee + +info: + name: > + WooCommerce <= 2.3.10 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88b3a69d-2c94-48e6-b965-8a67b2fe42b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-57d45ec0a5be7d9e2195cf95b8c7f148.yaml b/nuclei-templates/cve-less/plugins/woocommerce-57d45ec0a5be7d9e2195cf95b8c7f148.yaml new file mode 100644 index 0000000000..52ade10e2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-57d45ec0a5be7d9e2195cf95b8c7f148.yaml @@ -0,0 +1,58 @@ +id: woocommerce-57d45ec0a5be7d9e2195cf95b8c7f148 + +info: + name: > + WooCommerce <= 3.5.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5193d1c0-5111-4e97-a433-a41a76acbde9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-5e6273100f90a46acd28f79e1bdc6d60.yaml b/nuclei-templates/cve-less/plugins/woocommerce-5e6273100f90a46acd28f79e1bdc6d60.yaml new file mode 100644 index 0000000000..5e4922cd8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-5e6273100f90a46acd28f79e1bdc6d60.yaml @@ -0,0 +1,58 @@ +id: woocommerce-5e6273100f90a46acd28f79e1bdc6d60 + +info: + name: > + WooCommerce < 6.3.1 - Unauthorized Order Status Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ed1f200-5a27-4905-ac88-394b214bb430?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 6.3', '<= 6.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-6b3293fc7e42148d6c0cc437d12f11f2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-6b3293fc7e42148d6c0cc437d12f11f2.yaml new file mode 100644 index 0000000000..b4b7b13234 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-6b3293fc7e42148d6c0cc437d12f11f2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-6b3293fc7e42148d6c0cc437d12f11f2 + +info: + name: > + WooCommerce <= 2.3.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29b9cb4a-741d-4c38-b458-abd9900a8dce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-6bdece41810a5c3396f0d8933c273aac.yaml b/nuclei-templates/cve-less/plugins/woocommerce-6bdece41810a5c3396f0d8933c273aac.yaml new file mode 100644 index 0000000000..04517d3421 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-6bdece41810a5c3396f0d8933c273aac.yaml @@ -0,0 +1,58 @@ +id: woocommerce-6bdece41810a5c3396f0d8933c273aac + +info: + name: > + WooCommerce <= 8.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb8517bc-f45f-40a1-ae80-ed227c8b32d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-74b60f27afca1a7a8208f5a85162c261.yaml b/nuclei-templates/cve-less/plugins/woocommerce-74b60f27afca1a7a8208f5a85162c261.yaml new file mode 100644 index 0000000000..6e6939b14f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-74b60f27afca1a7a8208f5a85162c261.yaml @@ -0,0 +1,58 @@ +id: woocommerce-74b60f27afca1a7a8208f5a85162c261 + +info: + name: > + WooCommerce <= 2.2.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4309271-f93a-46ac-8b0b-d6193487ac98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-754810521866facb83b95cb8c9ef612b.yaml b/nuclei-templates/cve-less/plugins/woocommerce-754810521866facb83b95cb8c9ef612b.yaml new file mode 100644 index 0000000000..223a2faba4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-754810521866facb83b95cb8c9ef612b.yaml @@ -0,0 +1,58 @@ +id: woocommerce-754810521866facb83b95cb8c9ef612b + +info: + name: > + WooCommerce <= 2.0.17 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1eeabdb-f1c0-49c5-9234-8ff4eaa38087?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-774e498835f1c205f8e5e4fbdea2e637.yaml b/nuclei-templates/cve-less/plugins/woocommerce-774e498835f1c205f8e5e4fbdea2e637.yaml new file mode 100644 index 0000000000..0f34700ba1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-774e498835f1c205f8e5e4fbdea2e637.yaml @@ -0,0 +1,58 @@ +id: woocommerce-774e498835f1c205f8e5e4fbdea2e637 + +info: + name: > + WooCommerce <= 2.6.3 - Stored Cross-Site Scripting via REST-API + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e10a95e3-e834-4f84-85c1-4a1ffad41b5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-78f0103ede56d833dde1d4c6ee111bb8.yaml b/nuclei-templates/cve-less/plugins/woocommerce-78f0103ede56d833dde1d4c6ee111bb8.yaml new file mode 100644 index 0000000000..ac736e2b77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-78f0103ede56d833dde1d4c6ee111bb8.yaml @@ -0,0 +1,58 @@ +id: woocommerce-78f0103ede56d833dde1d4c6ee111bb8 + +info: + name: > + WooCommerce <= 6.2.0 - Incorrect Authorization Checks on REST API Endpoints + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e6c1e98-72a2-4e74-bfd4-4054187d4d19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-7c984cea3d0bc3b9e0b3fd7eb2901db1.yaml b/nuclei-templates/cve-less/plugins/woocommerce-7c984cea3d0bc3b9e0b3fd7eb2901db1.yaml new file mode 100644 index 0000000000..0e3679e5a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-7c984cea3d0bc3b9e0b3fd7eb2901db1.yaml @@ -0,0 +1,58 @@ +id: woocommerce-7c984cea3d0bc3b9e0b3fd7eb2901db1 + +info: + name: > + WooCommerce <= 4.0.4 - Unauthorized Post Meta Creation/Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c232b39c-7144-4d3a-9770-883986ca8b29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-7cf6ee2913d01ef81ee274bec7bbaacd.yaml b/nuclei-templates/cve-less/plugins/woocommerce-7cf6ee2913d01ef81ee274bec7bbaacd.yaml new file mode 100644 index 0000000000..ba0c37183e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-7cf6ee2913d01ef81ee274bec7bbaacd.yaml @@ -0,0 +1,58 @@ +id: woocommerce-7cf6ee2913d01ef81ee274bec7bbaacd + +info: + name: > + WooCommerce <= 3.6.4 - Missing File Type Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/162a194c-a7de-44c4-a659-8188e303b6a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-7f0ce5b9ec72dd2d493ed1d295a17a8c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-7f0ce5b9ec72dd2d493ed1d295a17a8c.yaml new file mode 100644 index 0000000000..47ff45b947 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-7f0ce5b9ec72dd2d493ed1d295a17a8c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-7f0ce5b9ec72dd2d493ed1d295a17a8c + +info: + name: > + WooCommerce <= 8.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa2258e4-f802-490b-8c10-4f008698a032?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-8157d8b031515138cda4bb1e1c15680c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-8157d8b031515138cda4bb1e1c15680c.yaml new file mode 100644 index 0000000000..577412f295 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-8157d8b031515138cda4bb1e1c15680c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-8157d8b031515138cda4bb1e1c15680c + +info: + name: > + WooCommerce <= 2.6.8 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36f107cf-4b85-4016-b7af-b73a706cf1a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-8278cbb2c639762ea7b3c55a978dbdc6.yaml b/nuclei-templates/cve-less/plugins/woocommerce-8278cbb2c639762ea7b3c55a978dbdc6.yaml new file mode 100644 index 0000000000..c9080feee0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-8278cbb2c639762ea7b3c55a978dbdc6.yaml @@ -0,0 +1,58 @@ +id: woocommerce-8278cbb2c639762ea7b3c55a978dbdc6 + +info: + name: > + WooCommerce <= 3.4.5 - WooCommerce File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54acaeeb-bc39-441a-b0bc-6005dc452d27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-8558a4e07d53714cf571da3da3c60ba1.yaml b/nuclei-templates/cve-less/plugins/woocommerce-8558a4e07d53714cf571da3da3c60ba1.yaml new file mode 100644 index 0000000000..dc74f1be32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-8558a4e07d53714cf571da3da3c60ba1.yaml @@ -0,0 +1,58 @@ +id: woocommerce-8558a4e07d53714cf571da3da3c60ba1 + +info: + name: > + WooCommerce < 2.4.9 - Cross-site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56953c6f-7ff9-45bf-9265-01240938e395?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-8e8520225c7963139985f5c0746f0ebf.yaml b/nuclei-templates/cve-less/plugins/woocommerce-8e8520225c7963139985f5c0746f0ebf.yaml new file mode 100644 index 0000000000..47700c0fd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-8e8520225c7963139985f5c0746f0ebf.yaml @@ -0,0 +1,58 @@ +id: woocommerce-8e8520225c7963139985f5c0746f0ebf + +info: + name: > + WooCommerce <= 7.8.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2d1879-c337-41c9-9f47-f9c2fe8e5928?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-96783cf4f584cdb85a4c3bf872b8f294.yaml b/nuclei-templates/cve-less/plugins/woocommerce-96783cf4f584cdb85a4c3bf872b8f294.yaml new file mode 100644 index 0000000000..abe8ea1500 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-96783cf4f584cdb85a4c3bf872b8f294.yaml @@ -0,0 +1,58 @@ +id: woocommerce-96783cf4f584cdb85a4c3bf872b8f294 + +info: + name: > + WooCommerce <= 7.0.0 - Authenticated(Shop Manager+) Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1efcff5-3af6-4c44-9654-b917523419aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-97e4eb2a7cf055f8f422858c1ea33b8e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-97e4eb2a7cf055f8f422858c1ea33b8e.yaml new file mode 100644 index 0000000000..a0bf7fd165 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-97e4eb2a7cf055f8f422858c1ea33b8e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-97e4eb2a7cf055f8f422858c1ea33b8e + +info: + name: > + WooCommerce < 5.7.0 & WooCommerce Admin < 2.6.4 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c32d967-85b9-4c93-a948-0126efb78f39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 5.6', '<= 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-9b394c0cb664e18a38599c0b1cdfdbd2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-9b394c0cb664e18a38599c0b1cdfdbd2.yaml new file mode 100644 index 0000000000..7c8189b039 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-9b394c0cb664e18a38599c0b1cdfdbd2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-9b394c0cb664e18a38599c0b1cdfdbd2 + +info: + name: > + WooCommerce <= 4.6.1 & WooCommerce Blocks <= 3.7.0 - Settings Bypass leading to Account Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c6a49d1-633b-47aa-8390-5df3bf8f71a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-2042df62ed2200315f3bbe8811391a51.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-2042df62ed2200315f3bbe8811391a51.yaml new file mode 100644 index 0000000000..cdfe6f5aed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-2042df62ed2200315f3bbe8811391a51.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-2042df62ed2200315f3bbe8811391a51 + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.8.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/562d0052-7f1a-441b-9ff7-1c8bcb4b74b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-632ea9fb21b1d6ea9e4243a233a18985.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-632ea9fb21b1d6ea9e4243a233a18985.yaml new file mode 100644 index 0000000000..695d1e2b48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-632ea9fb21b1d6ea9e4243a233a18985.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-632ea9fb21b1d6ea9e4243a233a18985 + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.16.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ce1316b-674a-4436-968f-9ffca4e8f726?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-652c5c7de96b7353e84cc91a0e987c70.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-652c5c7de96b7353e84cc91a0e987c70.yaml new file mode 100644 index 0000000000..5310c6668b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-652c5c7de96b7353e84cc91a0e987c70.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-652c5c7de96b7353e84cc91a0e987c70 + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.16.0 - Improper Authorization via wcal_delete_expired_used_coupon_code + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52d1f9a3-243e-4e2c-a752-f40b6d275121?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-6f4ff6b3d32734c83c5aee8986e3f499.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-6f4ff6b3d32734c83c5aee8986e3f499.yaml new file mode 100644 index 0000000000..3299792580 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-6f4ff6b3d32734c83c5aee8986e3f499.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-6f4ff6b3d32734c83c5aee8986e3f499 + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.14.1 - Cross-Site Request Forgery via delete_expired_used_coupon_code + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1e51a99-f5d4-47d4-bead-00ca1f5f72c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.14.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-7b4674feefc9f627315c264f6661bb7a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-7b4674feefc9f627315c264f6661bb7a.yaml new file mode 100644 index 0000000000..246d650027 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-7b4674feefc9f627315c264f6661bb7a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-7b4674feefc9f627315c264f6661bb7a + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.14.1 - Cross-Site Request Forgery via ts_reset_tracking_setting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e743e656-2dd9-43ed-a190-b03af7c75c54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.14.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-a3fbd1fe770668e38f708933d8dad89a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-a3fbd1fe770668e38f708933d8dad89a.yaml new file mode 100644 index 0000000000..570d8ea402 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-a3fbd1fe770668e38f708933d8dad89a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-a3fbd1fe770668e38f708933d8dad89a + +info: + name: > + Abandoned Cart Lite for WooCommerce < 5.2.0 and Abandoned Cart Pro for WooCommerce < 7.13.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9cc5c6d-4396-4ebf-8788-f01dd9e9cfbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-af9a5eb02914599951c2e164f6765355.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-af9a5eb02914599951c2e164f6765355.yaml new file mode 100644 index 0000000000..c6c6d05e61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-af9a5eb02914599951c2e164f6765355.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-af9a5eb02914599951c2e164f6765355 + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.15.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/524e9ec1-9c7c-4b06-915c-8122ea6c3601?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.15.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-d06e8f101fc29e27f35965c937d312fd.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-d06e8f101fc29e27f35965c937d312fd.yaml new file mode 100644 index 0000000000..eec34465c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-d06e8f101fc29e27f35965c937d312fd.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-d06e8f101fc29e27f35965c937d312fd + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.15.1 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68052614-204f-4237-af0e-4b8210ebd59f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.15.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-d3760060833c9e24b772fab4457401bf.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-d3760060833c9e24b772fab4457401bf.yaml new file mode 100644 index 0000000000..55c9d0ead3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-d3760060833c9e24b772fab4457401bf.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-d3760060833c9e24b772fab4457401bf + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.16.1 - Missing Authorization via multiple AJAX functions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51cfe955-f854-4f88-a009-93f92ae13d86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-e28866aa63369c2f108c411b915f57f5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-e28866aa63369c2f108c411b915f57f5.yaml new file mode 100644 index 0000000000..7b2a656104 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-e28866aa63369c2f108c411b915f57f5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-e28866aa63369c2f108c411b915f57f5 + +info: + name: > + Abandoned Cart Lite for WooCommerce < 1.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00243844-a2ec-42fd-84d9-03e89619e361?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-ea2c685d00d1a8d5b19ac5e3ca2b27ac.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-ea2c685d00d1a8d5b19ac5e3ca2b27ac.yaml new file mode 100644 index 0000000000..60e33ab251 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-ea2c685d00d1a8d5b19ac5e3ca2b27ac.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-ea2c685d00d1a8d5b19ac5e3ca2b27ac + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.8.5 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab5d87d2-f3cb-4926-9cbf-acdbe9169f64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-f6a7581692765a7c832e5e3df2035856.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-f6a7581692765a7c832e5e3df2035856.yaml new file mode 100644 index 0000000000..3c5f53aa1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-f6a7581692765a7c832e5e3df2035856.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-f6a7581692765a7c832e5e3df2035856 + +info: + name: > + Abandoned Cart Lite for WooCommerce <= 5.16.0 - Improper Authorization via wcal_preview_emails + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4edbfeee-b668-4a85-a030-c15d6583dc82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.16.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-pro-a3fbd1fe770668e38f708933d8dad89a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-pro-a3fbd1fe770668e38f708933d8dad89a.yaml new file mode 100644 index 0000000000..5193f1896f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-abandoned-cart-pro-a3fbd1fe770668e38f708933d8dad89a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-abandoned-cart-pro-a3fbd1fe770668e38f708933d8dad89a + +info: + name: > + Abandoned Cart Lite for WooCommerce < 5.2.0 and Abandoned Cart Pro for WooCommerce < 7.13.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9cc5c6d-4396-4ebf-8788-f01dd9e9cfbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart-pro/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-abandoned-cart-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-aca82f89029d85161f52ea200f7cad49.yaml b/nuclei-templates/cve-less/plugins/woocommerce-aca82f89029d85161f52ea200f7cad49.yaml new file mode 100644 index 0000000000..007cb3589f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-aca82f89029d85161f52ea200f7cad49.yaml @@ -0,0 +1,58 @@ +id: woocommerce-aca82f89029d85161f52ea200f7cad49 + +info: + name: > + WooCommerce <= 3.2.3 - Authenticated PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69fa0b8f-8509-47a8-951a-830271b2b29e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-add-to-cart-custom-redirect-754ce0f32f23ec71660fa4b4da98462b.yaml b/nuclei-templates/cve-less/plugins/woocommerce-add-to-cart-custom-redirect-754ce0f32f23ec71660fa4b4da98462b.yaml new file mode 100644 index 0000000000..5dde7d762c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-add-to-cart-custom-redirect-754ce0f32f23ec71660fa4b4da98462b.yaml @@ -0,0 +1,58 @@ +id: woocommerce-add-to-cart-custom-redirect-754ce0f32f23ec71660fa4b4da98462b + +info: + name: > + WooCommerce Add to Cart Custom Redirect <= 1.2.13 - Authenticated(Contributor+) Missing Authorization to Limited Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36c6a116-37cc-4ade-b601-5f9d6aaf9217?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-add-to-cart-custom-redirect/" + google-query: inurl:"/wp-content/plugins/woocommerce-add-to-cart-custom-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-add-to-cart-custom-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-add-to-cart-custom-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-add-to-cart-custom-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-admin-97e4eb2a7cf055f8f422858c1ea33b8e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-admin-97e4eb2a7cf055f8f422858c1ea33b8e.yaml new file mode 100644 index 0000000000..c99d346dda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-admin-97e4eb2a7cf055f8f422858c1ea33b8e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-admin-97e4eb2a7cf055f8f422858c1ea33b8e + +info: + name: > + WooCommerce < 5.7.0 & WooCommerce Admin < 2.6.4 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c32d967-85b9-4c93-a948-0126efb78f39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-admin/" + google-query: inurl:"/wp-content/plugins/woocommerce-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-admin,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.6', '<= 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-ajax-filters-34cd193453255faacca3d3995f1433f7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-ajax-filters-34cd193453255faacca3d3995f1433f7.yaml new file mode 100644 index 0000000000..1320f40429 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-ajax-filters-34cd193453255faacca3d3995f1433f7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-ajax-filters-34cd193453255faacca3d3995f1433f7 + +info: + name: > + WooCommerce AJAX Product Filters <= 1.3.6 - Arbitrary Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d23fdc-081a-4228-897f-2470a9327887?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-ajax-filters/" + google-query: inurl:"/wp-content/plugins/woocommerce-ajax-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-ajax-filters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-ajax-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-ajax-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-ajax-filters-d6de9c59d6ad94b2ef11d2e62d1ccaa3.yaml b/nuclei-templates/cve-less/plugins/woocommerce-ajax-filters-d6de9c59d6ad94b2ef11d2e62d1ccaa3.yaml new file mode 100644 index 0000000000..d0dfcf0411 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-ajax-filters-d6de9c59d6ad94b2ef11d2e62d1ccaa3.yaml @@ -0,0 +1,58 @@ +id: woocommerce-ajax-filters-d6de9c59d6ad94b2ef11d2e62d1ccaa3 + +info: + name: > + Advanced AJAX Product Filters <= 1.5.4.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e282a23-07e8-464a-9d6e-a2eb506064bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-ajax-filters/" + google-query: inurl:"/wp-content/plugins/woocommerce-ajax-filters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-ajax-filters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-ajax-filters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-ajax-filters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-alidropship-a08ed7f8c49cfccd0922eb203ec35499.yaml b/nuclei-templates/cve-less/plugins/woocommerce-alidropship-a08ed7f8c49cfccd0922eb203ec35499.yaml new file mode 100644 index 0000000000..990e7e5e84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-alidropship-a08ed7f8c49cfccd0922eb203ec35499.yaml @@ -0,0 +1,58 @@ +id: woocommerce-alidropship-a08ed7f8c49cfccd0922eb203ec35499 + +info: + name: > + ALD - AliExpress Dropshipping and Fulfillment for WooCommerce Premium <= 1.1.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/192728d1-786d-41eb-9133-ad8517052478?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-alidropship/" + google-query: inurl:"/wp-content/plugins/woocommerce-alidropship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-alidropship,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-alidropship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-alidropship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-amazon-affiliates-light-version-11c10e4dc5f28f5f7b4e3c822488409f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-amazon-affiliates-light-version-11c10e4dc5f28f5f7b4e3c822488409f.yaml new file mode 100644 index 0000000000..5678cf170d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-amazon-affiliates-light-version-11c10e4dc5f28f5f7b4e3c822488409f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-amazon-affiliates-light-version-11c10e4dc5f28f5f7b4e3c822488409f + +info: + name: > + WZone - Lite <= 3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2278347-d961-47d7-b89d-61a82441597c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-amazon-affiliates-light-version/" + google-query: inurl:"/wp-content/plugins/woocommerce-amazon-affiliates-light-version/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-amazon-affiliates-light-version,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-amazon-affiliates-light-version/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-amazon-affiliates-light-version" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-anti-fraud-eaf081771c47b844dc7170803f97eae4.yaml b/nuclei-templates/cve-less/plugins/woocommerce-anti-fraud-eaf081771c47b844dc7170803f97eae4.yaml new file mode 100644 index 0000000000..5f925e1b94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-anti-fraud-eaf081771c47b844dc7170803f97eae4.yaml @@ -0,0 +1,58 @@ +id: woocommerce-anti-fraud-eaf081771c47b844dc7170803f97eae4 + +info: + name: > + WooCommerce Anti-Fraud <= 3.2 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27337cf2-18a0-4f26-a674-3ab2003b4838?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-anti-fraud/" + google-query: inurl:"/wp-content/plugins/woocommerce-anti-fraud/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-anti-fraud,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-anti-fraud/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-anti-fraud" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-aweber-newsletter-subscription-31cb28ae35765828074fe75a48e7d24a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-aweber-newsletter-subscription-31cb28ae35765828074fe75a48e7d24a.yaml new file mode 100644 index 0000000000..9e7312a5be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-aweber-newsletter-subscription-31cb28ae35765828074fe75a48e7d24a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-aweber-newsletter-subscription-31cb28ae35765828074fe75a48e7d24a + +info: + name: > + WooCommerce AWeber Newsletter Subscription <= 4.0.2 - Missing Authorization to Access Token Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d187a8d6-fa81-45c6-a107-f8b96b130e6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-aweber-newsletter-subscription/" + google-query: inurl:"/wp-content/plugins/woocommerce-aweber-newsletter-subscription/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-aweber-newsletter-subscription,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-aweber-newsletter-subscription/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-aweber-newsletter-subscription" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-bb197c9271e2ac64456b0775acafc71f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-bb197c9271e2ac64456b0775acafc71f.yaml new file mode 100644 index 0000000000..5aa51e4278 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-bb197c9271e2ac64456b0775acafc71f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-bb197c9271e2ac64456b0775acafc71f + +info: + name: > + WooCommerce <= 2.0.12 - Self-Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77f3db0c-d575-48a8-872a-a64fd77486de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-beta-tester-ef09f842dc72675ee253130a4cf363a3.yaml b/nuclei-templates/cve-less/plugins/woocommerce-beta-tester-ef09f842dc72675ee253130a4cf363a3.yaml new file mode 100644 index 0000000000..06bf948ebb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-beta-tester-ef09f842dc72675ee253130a4cf363a3.yaml @@ -0,0 +1,58 @@ +id: woocommerce-beta-tester-ef09f842dc72675ee253130a4cf363a3 + +info: + name: > + WooCommerce Beta Tester < 2.2.4 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6cbec61-cbe8-44a6-8cc8-8603393ed6b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-beta-tester/" + google-query: inurl:"/wp-content/plugins/woocommerce-beta-tester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-beta-tester,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-beta-tester/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-beta-tester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-bookings-469be2a58c38c17e864a03db20b30c4c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-bookings-469be2a58c38c17e864a03db20b30c4c.yaml new file mode 100644 index 0000000000..d2e63dd979 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-bookings-469be2a58c38c17e864a03db20b30c4c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-bookings-469be2a58c38c17e864a03db20b30c4c + +info: + name: > + WooCommerce Bookings <= 2.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a54841af-65ce-4434-a67e-79ea673ec8f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-bookings/" + google-query: inurl:"/wp-content/plugins/woocommerce-bookings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-bookings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-bookings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-bookings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-bookings-88bae4ee7812477c9e872ff70c893eb5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-bookings-88bae4ee7812477c9e872ff70c893eb5.yaml new file mode 100644 index 0000000000..fea4d86371 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-bookings-88bae4ee7812477c9e872ff70c893eb5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-bookings-88bae4ee7812477c9e872ff70c893eb5 + +info: + name: > + WooCommerce Bookings <= 1.15.78 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b365fb8-7a93-4306-b2b1-ce47dc19457a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-bookings/" + google-query: inurl:"/wp-content/plugins/woocommerce-bookings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-bookings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-bookings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-bookings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15.78') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-box-office-26df4386152f6b2123dc8be12dc2c025.yaml b/nuclei-templates/cve-less/plugins/woocommerce-box-office-26df4386152f6b2123dc8be12dc2c025.yaml new file mode 100644 index 0000000000..52c9c82a78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-box-office-26df4386152f6b2123dc8be12dc2c025.yaml @@ -0,0 +1,58 @@ +id: woocommerce-box-office-26df4386152f6b2123dc8be12dc2c025 + +info: + name: > + WooCommerce Box Office <= 1.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff2097a9-fe7a-48f3-be9c-dc0caef74262?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-box-office/" + google-query: inurl:"/wp-content/plugins/woocommerce-box-office/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-box-office,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-box-office/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-box-office" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-box-office-615764f544ee769c8562683adf2e3c22.yaml b/nuclei-templates/cve-less/plugins/woocommerce-box-office-615764f544ee769c8562683adf2e3c22.yaml new file mode 100644 index 0000000000..6f855b00c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-box-office-615764f544ee769c8562683adf2e3c22.yaml @@ -0,0 +1,58 @@ +id: woocommerce-box-office-615764f544ee769c8562683adf2e3c22 + +info: + name: > + WooCommerce Box Office <= 1.1.50 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebd05d5-a65d-49df-a865-882e9d17fc0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-box-office/" + google-query: inurl:"/wp-content/plugins/woocommerce-box-office/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-box-office,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-box-office/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-box-office" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-box-office-e7840c043e4c24ed6e535dc7a65aee86.yaml b/nuclei-templates/cve-less/plugins/woocommerce-box-office-e7840c043e4c24ed6e535dc7a65aee86.yaml new file mode 100644 index 0000000000..51ad09960e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-box-office-e7840c043e4c24ed6e535dc7a65aee86.yaml @@ -0,0 +1,58 @@ +id: woocommerce-box-office-e7840c043e4c24ed6e535dc7a65aee86 + +info: + name: > + WooCommerce Box Office <= 1.1.51 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8872eca8-4812-4f5f-b775-cbfab90ba2ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-box-office/" + google-query: inurl:"/wp-content/plugins/woocommerce-box-office/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-box-office,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-box-office/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-box-office" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-brands-36407f459596fb4be9dff24b707a16b5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-brands-36407f459596fb4be9dff24b707a16b5.yaml new file mode 100644 index 0000000000..d09c77c692 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-brands-36407f459596fb4be9dff24b707a16b5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-brands-36407f459596fb4be9dff24b707a16b5 + +info: + name: > + WooCommerce Brands <= 1.6.45 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/accdcff0-f361-4632-b0b7-e55975adeebb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-brands/" + google-query: inurl:"/wp-content/plugins/woocommerce-brands/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-brands,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-brands/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-brands" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-brands-e749226d2f0bc5e5b3821630005dc969.yaml b/nuclei-templates/cve-less/plugins/woocommerce-brands-e749226d2f0bc5e5b3821630005dc969.yaml new file mode 100644 index 0000000000..206e2ff38f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-brands-e749226d2f0bc5e5b3821630005dc969.yaml @@ -0,0 +1,58 @@ +id: woocommerce-brands-e749226d2f0bc5e5b3821630005dc969 + +info: + name: > + WooCommerce Brands <= 1.6.49 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a26a6f28-4a7f-421d-a69e-2afbe1367106?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-brands/" + google-query: inurl:"/wp-content/plugins/woocommerce-brands/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-brands,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-brands/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-brands" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.49') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-buddypress-integration-xprofile-checkout-manager-ebcec202e20e94c78709b42424b149aa.yaml b/nuclei-templates/cve-less/plugins/woocommerce-buddypress-integration-xprofile-checkout-manager-ebcec202e20e94c78709b42424b149aa.yaml new file mode 100644 index 0000000000..461a6c0107 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-buddypress-integration-xprofile-checkout-manager-ebcec202e20e94c78709b42424b149aa.yaml @@ -0,0 +1,58 @@ +id: woocommerce-buddypress-integration-xprofile-checkout-manager-ebcec202e20e94c78709b42424b149aa + +info: + name: > + BuddyPress xProfile Checkout Manager for WooCommerce <= 1.3.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5203a17-cc4f-4545-a231-dfbfb900f0fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-buddypress-integration-xprofile-checkout-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-buddypress-integration-xprofile-checkout-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-buddypress-integration-xprofile-checkout-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-buddypress-integration-xprofile-checkout-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-buddypress-integration-xprofile-checkout-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-bulk-order-form-24628850cd8464ffd20b56d41e476477.yaml b/nuclei-templates/cve-less/plugins/woocommerce-bulk-order-form-24628850cd8464ffd20b56d41e476477.yaml new file mode 100644 index 0000000000..221052d509 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-bulk-order-form-24628850cd8464ffd20b56d41e476477.yaml @@ -0,0 +1,58 @@ +id: woocommerce-bulk-order-form-24628850cd8464ffd20b56d41e476477 + +info: + name: > + Bulk Order Form for WooCommerce <= 3.5.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d549fcd5-6808-4d7d-bf1f-df8cfa458744?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-bulk-order-form/" + google-query: inurl:"/wp-content/plugins/woocommerce-bulk-order-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-bulk-order-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-bulk-order-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-bulk-order-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-bulk-order-form-d9e29420afd04acd93625f8acad7ad8f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-bulk-order-form-d9e29420afd04acd93625f8acad7ad8f.yaml new file mode 100644 index 0000000000..83e3487367 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-bulk-order-form-d9e29420afd04acd93625f8acad7ad8f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-bulk-order-form-d9e29420afd04acd93625f8acad7ad8f + +info: + name: > + Quick/Bulk Order Form for WooCommerce <= 3.5.7 - Authenticated (Shop manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/898af9aa-72c4-46a6-afc2-76dd17672fbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-bulk-order-form/" + google-query: inurl:"/wp-content/plugins/woocommerce-bulk-order-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-bulk-order-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-bulk-order-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-bulk-order-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-bulk-stock-management-8a651f3bc7f119f869db333cd8567d87.yaml b/nuclei-templates/cve-less/plugins/woocommerce-bulk-stock-management-8a651f3bc7f119f869db333cd8567d87.yaml new file mode 100644 index 0000000000..598be49194 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-bulk-stock-management-8a651f3bc7f119f869db333cd8567d87.yaml @@ -0,0 +1,58 @@ +id: woocommerce-bulk-stock-management-8a651f3bc7f119f869db333cd8567d87 + +info: + name: > + WooCommerce Bulk Stock Management <= 2.2.33 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f5d874a-d70e-4d3f-a9aa-d24707a3f7f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-bulk-stock-management/" + google-query: inurl:"/wp-content/plugins/woocommerce-bulk-stock-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-bulk-stock-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-bulk-stock-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-bulk-stock-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-c27b32abd810b7ccfab57cf684c27b3d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-c27b32abd810b7ccfab57cf684c27b3d.yaml new file mode 100644 index 0000000000..3443b9d834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-c27b32abd810b7ccfab57cf684c27b3d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-c27b32abd810b7ccfab57cf684c27b3d + +info: + name: > + WooCommerce <= 6.5.1 - Authenticated (Admin+) HTML Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94d682bb-ed94-40fc-98b4-2f404d6cd8ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-c2df943b1eb079c6b9fb4ba610f1737e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-c2df943b1eb079c6b9fb4ba610f1737e.yaml new file mode 100644 index 0000000000..c2670747dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-c2df943b1eb079c6b9fb4ba610f1737e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-c2df943b1eb079c6b9fb4ba610f1737e + +info: + name: > + WooCommerce <= 3.4.4 - Authenticated PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ab26526-9fbb-4c2e-be41-73450225b834?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-12f3d91aee2db4ef957651a35087221c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-12f3d91aee2db4ef957651a35087221c.yaml new file mode 100644 index 0000000000..e06d7bee7c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-12f3d91aee2db4ef957651a35087221c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-catalog-enquiry-12f3d91aee2db4ef957651a35087221c + +info: + name: > + Product Catalog Enquiry for WooCommerce by MultiVendorX <= 5.0.5 - Cross-Site Request Forgery via REST API + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cb00342-64f9-4eeb-ba75-1c1544b11334?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-catalog-enquiry/" + google-query: inurl:"/wp-content/plugins/woocommerce-catalog-enquiry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-catalog-enquiry,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-catalog-enquiry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-catalog-enquiry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-9c5f7452ef32bc2b3e47c8bc589c9872.yaml b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-9c5f7452ef32bc2b3e47c8bc589c9872.yaml new file mode 100644 index 0000000000..d013fb9ada --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-9c5f7452ef32bc2b3e47c8bc589c9872.yaml @@ -0,0 +1,58 @@ +id: woocommerce-catalog-enquiry-9c5f7452ef32bc2b3e47c8bc589c9872 + +info: + name: > + WC Catalog Enquiry <= 3.0.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfe1d122-610a-47c1-944d-bf7352e9ff38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-catalog-enquiry/" + google-query: inurl:"/wp-content/plugins/woocommerce-catalog-enquiry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-catalog-enquiry,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-catalog-enquiry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-catalog-enquiry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-a21ec241225c68d34de1331139c91c71.yaml b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-a21ec241225c68d34de1331139c91c71.yaml new file mode 100644 index 0000000000..92ae44c587 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-a21ec241225c68d34de1331139c91c71.yaml @@ -0,0 +1,58 @@ +id: woocommerce-catalog-enquiry-a21ec241225c68d34de1331139c91c71 + +info: + name: > + Product Catalog Mode For WooCommerce <= 5.0.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52c4c16f-2e6e-4cbd-b061-4324a6002eab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-catalog-enquiry/" + google-query: inurl:"/wp-content/plugins/woocommerce-catalog-enquiry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-catalog-enquiry,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-catalog-enquiry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-catalog-enquiry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-b8512840012a562de1323a1815a4b21e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-b8512840012a562de1323a1815a4b21e.yaml new file mode 100644 index 0000000000..35a725b2f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-b8512840012a562de1323a1815a4b21e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-catalog-enquiry-b8512840012a562de1323a1815a4b21e + +info: + name: > + Product Catalog Enquiry <= 5.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03177018-94cb-4e14-9476-e2d369414c38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-catalog-enquiry/" + google-query: inurl:"/wp-content/plugins/woocommerce-catalog-enquiry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-catalog-enquiry,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-catalog-enquiry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-catalog-enquiry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-f62206ccce82eddd9f38650d3ec27d0d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-f62206ccce82eddd9f38650d3ec27d0d.yaml new file mode 100644 index 0000000000..b4b0f52287 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-catalog-enquiry-f62206ccce82eddd9f38650d3ec27d0d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-catalog-enquiry-f62206ccce82eddd9f38650d3ec27d0d + +info: + name: > + Product Catalog Mode For Woocommerce <= 5.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e881ba2f-0e88-4c7b-aa0d-84e816019db9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-catalog-enquiry/" + google-query: inurl:"/wp-content/plugins/woocommerce-catalog-enquiry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-catalog-enquiry,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-catalog-enquiry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-catalog-enquiry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-chained-products-a49761e8700910d2b10517900bb96f1c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-chained-products-a49761e8700910d2b10517900bb96f1c.yaml new file mode 100644 index 0000000000..9bd7f1d312 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-chained-products-a49761e8700910d2b10517900bb96f1c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-chained-products-a49761e8700910d2b10517900bb96f1c + +info: + name: > + WooCommerce Chained Products < 2.12.0 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b839c7d-76fb-465e-9f27-1882cf0099fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-chained-products/" + google-query: inurl:"/wp-content/plugins/woocommerce-chained-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-chained-products,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-chained-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-chained-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-checkout-field-editor-067d07e6d5151cb4c0893a5aec05a2dd.yaml b/nuclei-templates/cve-less/plugins/woocommerce-checkout-field-editor-067d07e6d5151cb4c0893a5aec05a2dd.yaml new file mode 100644 index 0000000000..8c48118158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-checkout-field-editor-067d07e6d5151cb4c0893a5aec05a2dd.yaml @@ -0,0 +1,58 @@ +id: woocommerce-checkout-field-editor-067d07e6d5151cb4c0893a5aec05a2dd + +info: + name: > + Checkout Field Editor <= 1.7.4 - Cross-Site Request Forgery to Checkout Fields Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad430706-749f-4582-af07-6c543b8d5aad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-checkout-field-editor/" + google-query: inurl:"/wp-content/plugins/woocommerce-checkout-field-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-checkout-field-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-checkout-field-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-checkout-field-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-checkout-field-editor-63101b083d74ba3046ffc1cbbf2b131c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-checkout-field-editor-63101b083d74ba3046ffc1cbbf2b131c.yaml new file mode 100644 index 0000000000..af2dd696e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-checkout-field-editor-63101b083d74ba3046ffc1cbbf2b131c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-checkout-field-editor-63101b083d74ba3046ffc1cbbf2b131c + +info: + name: > + Checkout Field Editor (Premium) < 1.7.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4647210-ba7e-4233-83d6-12572213f5fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-checkout-field-editor/" + google-query: inurl:"/wp-content/plugins/woocommerce-checkout-field-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-checkout-field-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-checkout-field-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-checkout-field-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-c27f182f563d1fb6d07ba79eda84b6fe.yaml b/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-c27f182f563d1fb6d07ba79eda84b6fe.yaml new file mode 100644 index 0000000000..cfccaa135b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-c27f182f563d1fb6d07ba79eda84b6fe.yaml @@ -0,0 +1,58 @@ +id: woocommerce-checkout-manager-c27f182f563d1fb6d07ba79eda84b6fe + +info: + name: > + WooCommerce Checkout Manager <= 7.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fffd7d50-6563-4652-8fae-3fe698125c59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-checkout-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-checkout-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-checkout-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-checkout-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-checkout-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-eb73f0a8b99b79a58df7341a863670b9.yaml b/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-eb73f0a8b99b79a58df7341a863670b9.yaml new file mode 100644 index 0000000000..9634731430 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-eb73f0a8b99b79a58df7341a863670b9.yaml @@ -0,0 +1,58 @@ +id: woocommerce-checkout-manager-eb73f0a8b99b79a58df7341a863670b9 + +info: + name: > + WooCommerce Checkout Manager <= 4.2.6 - Unauthenticated Arbitrary Media Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37d13a43-13f4-460d-b5ea-5def8a379d54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-checkout-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-checkout-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-checkout-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-checkout-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-checkout-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-f0bd7cf2208f5a7facbcde43d480de7a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-f0bd7cf2208f5a7facbcde43d480de7a.yaml new file mode 100644 index 0000000000..810e17ff06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-checkout-manager-f0bd7cf2208f5a7facbcde43d480de7a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-checkout-manager-f0bd7cf2208f5a7facbcde43d480de7a + +info: + name: > + Checkout Fields Manager for WooCommerce <= 5.5.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11aec50c-2531-4d30-92da-8513fdca741e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-checkout-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-checkout-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-checkout-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-checkout-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-checkout-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-cloak-affiliate-links-45dd3e2337c1445444e70d9c65cc1e8d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-cloak-affiliate-links-45dd3e2337c1445444e70d9c65cc1e8d.yaml new file mode 100644 index 0000000000..caa054fe68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-cloak-affiliate-links-45dd3e2337c1445444e70d9c65cc1e8d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-cloak-affiliate-links-45dd3e2337c1445444e70d9c65cc1e8d + +info: + name: > + WooCommerce Cloak Affiliate Links <= 1.0.33 - Missing Authorization to Unauthenticated Permalink Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c731e39-998e-44d2-8cf9-4d9c39731c5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-cloak-affiliate-links/" + google-query: inurl:"/wp-content/plugins/woocommerce-cloak-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-cloak-affiliate-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-cloak-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-cloak-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-compare-products-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/woocommerce-compare-products-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..e75efe8a14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-compare-products-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: woocommerce-compare-products-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-compare-products/" + google-query: inurl:"/wp-content/plugins/woocommerce-compare-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-compare-products,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-compare-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-compare-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-compare-products-b935aac9392ea74d48c16c20e8b0b995.yaml b/nuclei-templates/cve-less/plugins/woocommerce-compare-products-b935aac9392ea74d48c16c20e8b0b995.yaml new file mode 100644 index 0000000000..a4662725e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-compare-products-b935aac9392ea74d48c16c20e8b0b995.yaml @@ -0,0 +1,58 @@ +id: woocommerce-compare-products-b935aac9392ea74d48c16c20e8b0b995 + +info: + name: > + a3rev Multiple Plugins <= Various Versions - Cross-Site Request Forgery to Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9133fa10-036b-4f42-9d0c-8e15d2625f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-compare-products/" + google-query: inurl:"/wp-content/plugins/woocommerce-compare-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-compare-products,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-compare-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-compare-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-composite-products-866b0214eeca06aa312ee4f312dac633.yaml b/nuclei-templates/cve-less/plugins/woocommerce-composite-products-866b0214eeca06aa312ee4f312dac633.yaml new file mode 100644 index 0000000000..9a6e502c88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-composite-products-866b0214eeca06aa312ee4f312dac633.yaml @@ -0,0 +1,58 @@ +id: woocommerce-composite-products-866b0214eeca06aa312ee4f312dac633 + +info: + name: > + WooCommerce Composite Products <= 8.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d45bd32-d693-40e6-9b30-9e0b91eb4660?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-composite-products/" + google-query: inurl:"/wp-content/plugins/woocommerce-composite-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-composite-products,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-composite-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-composite-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..c424195593 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: woocommerce-conversion-tracking-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-conversion-tracking/" + google-query: inurl:"/wp-content/plugins/woocommerce-conversion-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-conversion-tracking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-conversion-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-conversion-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-552bb0df3849cc75dcf6d19f97ba3b05.yaml b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-552bb0df3849cc75dcf6d19f97ba3b05.yaml new file mode 100644 index 0000000000..20f6a97d0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-552bb0df3849cc75dcf6d19f97ba3b05.yaml @@ -0,0 +1,58 @@ +id: woocommerce-conversion-tracking-552bb0df3849cc75dcf6d19f97ba3b05 + +info: + name: > + WooCommerce Conversion Tracking <= 2.0.4 - Cross-Site Request Forgery and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e203fc8f-fc57-4918-8ef2-3ba6ae979d40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-conversion-tracking/" + google-query: inurl:"/wp-content/plugins/woocommerce-conversion-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-conversion-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-conversion-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-conversion-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-8f3437550e10d6083b697e38767da0b0.yaml b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-8f3437550e10d6083b697e38767da0b0.yaml new file mode 100644 index 0000000000..59db74231c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-8f3437550e10d6083b697e38767da0b0.yaml @@ -0,0 +1,58 @@ +id: woocommerce-conversion-tracking-8f3437550e10d6083b697e38767da0b0 + +info: + name: > + WooCommerce Conversion Tracking <= 2.0.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf798142-4daf-41f5-8416-701d03476520?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-conversion-tracking/" + google-query: inurl:"/wp-content/plugins/woocommerce-conversion-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-conversion-tracking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-conversion-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-conversion-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..c30ec4c39a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: woocommerce-conversion-tracking-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-conversion-tracking/" + google-query: inurl:"/wp-content/plugins/woocommerce-conversion-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-conversion-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-conversion-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-conversion-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-f4f0c2c884affbdbf175616a0bb1ff76.yaml b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-f4f0c2c884affbdbf175616a0bb1ff76.yaml new file mode 100644 index 0000000000..9c27f63cba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-conversion-tracking-f4f0c2c884affbdbf175616a0bb1ff76.yaml @@ -0,0 +1,58 @@ +id: woocommerce-conversion-tracking-f4f0c2c884affbdbf175616a0bb1ff76 + +info: + name: > + WooCommerce Conversion Tracking <= 2.0.11 - Missing Authorization via wcct_install_happy_addons + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4775ef21-01d6-4c5a-9e3e-f9b6e093fc7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-conversion-tracking/" + google-query: inurl:"/wp-content/plugins/woocommerce-conversion-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-conversion-tracking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-conversion-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-conversion-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-country-based-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-country-based-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1b62114407 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-country-based-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-country-based-payments-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-country-based-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-country-based-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-country-based-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-country-based-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-country-based-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-csvimport-d33187604cb9b21d8a56ab4bd171d46f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-csvimport-d33187604cb9b21d8a56ab4bd171d46f.yaml new file mode 100644 index 0000000000..2be1c0e219 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-csvimport-d33187604cb9b21d8a56ab4bd171d46f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-csvimport-d33187604cb9b21d8a56ab4bd171d46f + +info: + name: > + Woocommerce CSV importer <= 3.3.6 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86c0f530-bf4c-4de4-84db-e8469cea76c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-csvimport/" + google-query: inurl:"/wp-content/plugins/woocommerce-csvimport/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-csvimport,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-csvimport/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-csvimport" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-2e62f757ecb9e88c7028d520dbc7db1f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-2e62f757ecb9e88c7028d520dbc7db1f.yaml new file mode 100644 index 0000000000..df8e7ea98b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-2e62f757ecb9e88c7028d520dbc7db1f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-2e62f757ecb9e88c7028d520dbc7db1f + +info: + name: > + WOOCS – WooCommerce Currency Switcher <= 1.4.1.4 - Cross-Site Request Forgery via delete_profiles_data + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/139d4ec2-1147-4332-a56d-633890f32560?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-406a6ababbf7eb821b04527364536110.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-406a6ababbf7eb821b04527364536110.yaml new file mode 100644 index 0000000000..07357bac8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-406a6ababbf7eb821b04527364536110.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-406a6ababbf7eb821b04527364536110 + +info: + name: > + WOOCS – WooCommerce Currency Switcher <= 1.4.1.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6db5f214-ba1a-4528-9bb6-0592822bf8bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-419388b03e7c101be5aa9e9f67fb81d9.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-419388b03e7c101be5aa9e9f67fb81d9.yaml new file mode 100644 index 0000000000..b54b46ece1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-419388b03e7c101be5aa9e9f67fb81d9.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-419388b03e7c101be5aa9e9f67fb81d9 + +info: + name: > + WOOCS <= 1.3.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5442453-6b72-4c8b-8b9f-59b8536aac73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-4a8f4a33d3fd03ddfa522524f9449c10.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-4a8f4a33d3fd03ddfa522524f9449c10.yaml new file mode 100644 index 0000000000..4fa3f7f19a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-4a8f4a33d3fd03ddfa522524f9449c10.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-4a8f4a33d3fd03ddfa522524f9449c10 + +info: + name: > + WOOCS <= 1.3.9.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cbcb659-6732-4893-b6a0-52a558cea351?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-6bedb1579a7e4736e9514fa8e953db76.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-6bedb1579a7e4736e9514fa8e953db76.yaml new file mode 100644 index 0000000000..3f56c94da7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-6bedb1579a7e4736e9514fa8e953db76.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-6bedb1579a7e4736e9514fa8e953db76 + +info: + name: > + WOOCS <= 1.3.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d3fcadf-60bd-4a2e-a30c-e276dd04368c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-730d551e137dbe1c7e3252334b46b802.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-730d551e137dbe1c7e3252334b46b802.yaml new file mode 100644 index 0000000000..7ab3d2baf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-730d551e137dbe1c7e3252334b46b802.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-730d551e137dbe1c7e3252334b46b802 + +info: + name: > + FOX – Currency Switcher Professional for WooCommerce <= 1.4.1.8 - Unauthenticated Arbitrary Shortcode Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c1d49d0-c9aa-401c-80b9-d4df7fe97691?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-92d281b70c0c1113532c8a9e6c09ac40.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-92d281b70c0c1113532c8a9e6c09ac40.yaml new file mode 100644 index 0000000000..580691b72c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-92d281b70c0c1113532c8a9e6c09ac40.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-92d281b70c0c1113532c8a9e6c09ac40 + +info: + name: > + WooCommerce Currency Switcher <= 1.3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b85d8451-5283-4a76-8565-c667a3d2d917?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-94b50ea832a6fb6b13dcb5407b94970f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-94b50ea832a6fb6b13dcb5407b94970f.yaml new file mode 100644 index 0000000000..99eb1ce9db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-94b50ea832a6fb6b13dcb5407b94970f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-94b50ea832a6fb6b13dcb5407b94970f + +info: + name: > + FOX – Currency Switcher Professional for WooCommerce <= 1.4.1.6 - Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cb37019-33f6-4f72-adfc-befbfbf69e47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-a667090a25b41229ec62a693f2dae2ee.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-a667090a25b41229ec62a693f2dae2ee.yaml new file mode 100644 index 0000000000..d411105cd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-a667090a25b41229ec62a693f2dae2ee.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-a667090a25b41229ec62a693f2dae2ee + +info: + name: > + WOOCS <= 1.3.7.4 - Reflected Cross-Site Scripting via AJAX action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd53147f-2230-4b8b-a1a1-df377b334072?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-ddc4061947d45933e373a65e6831e3d2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-ddc4061947d45933e373a65e6831e3d2.yaml new file mode 100644 index 0000000000..1fbf1cc4fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-currency-switcher-ddc4061947d45933e373a65e6831e3d2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-currency-switcher-ddc4061947d45933e373a65e6831e3d2 + +info: + name: > + WOOCS – Currency Switcher for WooCommerce Professional Free <= 1.3.7 - Authenticated Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c15eda1f-dc9f-4601-a337-ad3e66baf3b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-currency-switcher/" + google-query: inurl:"/wp-content/plugins/woocommerce-currency-switcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-currency-switcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-currency-switcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-currency-switcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-custom-product-tabs-lite-32cfeb3b1e33f847bf448188352666fd.yaml b/nuclei-templates/cve-less/plugins/woocommerce-custom-product-tabs-lite-32cfeb3b1e33f847bf448188352666fd.yaml new file mode 100644 index 0000000000..fa79f5077e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-custom-product-tabs-lite-32cfeb3b1e33f847bf448188352666fd.yaml @@ -0,0 +1,58 @@ +id: woocommerce-custom-product-tabs-lite-32cfeb3b1e33f847bf448188352666fd + +info: + name: > + Custom Product Tabs Lite for WooCommerce <= 1.7.6 - Authenticated (Store Manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88f447d5-990f-4d86-93a3-fd11b63af408?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-custom-product-tabs-lite/" + google-query: inurl:"/wp-content/plugins/woocommerce-custom-product-tabs-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-custom-product-tabs-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-custom-product-tabs-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-custom-product-tabs-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-1cb42f62394546a329e0486aa05cce34.yaml b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-1cb42f62394546a329e0486aa05cce34.yaml new file mode 100644 index 0000000000..feaf512ac1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-1cb42f62394546a329e0486aa05cce34.yaml @@ -0,0 +1,58 @@ +id: woocommerce-customers-manager-1cb42f62394546a329e0486aa05cce34 + +info: + name: > + WooCommerce Customers Manager <= 29.6 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a14cf955-e354-49c3-a685-d5bd51c79ba9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-customers-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-customers-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-customers-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-customers-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-customers-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 29.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-367546d5612217d94f1a8cf076937dba.yaml b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-367546d5612217d94f1a8cf076937dba.yaml new file mode 100644 index 0000000000..6d430683ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-367546d5612217d94f1a8cf076937dba.yaml @@ -0,0 +1,58 @@ +id: woocommerce-customers-manager-367546d5612217d94f1a8cf076937dba + +info: + name: > + Woocommerce Customers Manager <= 26.4 - Authenticated Account Creation and Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/486fa1a6-aa47-4bf9-b1da-582e316f6bcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-customers-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-customers-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-customers-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-customers-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-customers-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-5e7acd4f9908a648514410cb186a2982.yaml b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-5e7acd4f9908a648514410cb186a2982.yaml new file mode 100644 index 0000000000..360d4ec363 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-5e7acd4f9908a648514410cb186a2982.yaml @@ -0,0 +1,58 @@ +id: woocommerce-customers-manager-5e7acd4f9908a648514410cb186a2982 + +info: + name: > + Woocommerce Customers Manager < 26.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0444eff7-88bd-4933-94c5-bcb21a044b88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-customers-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-customers-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-customers-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-customers-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-customers-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-95abb58d27d0cf8744e0e12e5ec2a346.yaml b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-95abb58d27d0cf8744e0e12e5ec2a346.yaml new file mode 100644 index 0000000000..d605ad72d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-95abb58d27d0cf8744e0e12e5ec2a346.yaml @@ -0,0 +1,58 @@ +id: woocommerce-customers-manager-95abb58d27d0cf8744e0e12e5ec2a346 + +info: + name: > + Woocommerce Customers Manager <= 26.5 - Cross-Site Request Forgery to Account Creation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/992b362b-b01f-4c91-83ac-dd612b93ee03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-customers-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-customers-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-customers-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-customers-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-customers-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-9ab63666836232ba83e4036d46f6e9b9.yaml b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-9ab63666836232ba83e4036d46f6e9b9.yaml new file mode 100644 index 0000000000..7bbc491067 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-9ab63666836232ba83e4036d46f6e9b9.yaml @@ -0,0 +1,58 @@ +id: woocommerce-customers-manager-9ab63666836232ba83e4036d46f6e9b9 + +info: + name: > + WooCommerce Customers Manager <= 29.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4c438e0-ea25-4372-8e4e-5d7163cc3447?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-customers-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-customers-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-customers-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-customers-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-customers-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 29.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-fc1bee3fb68d7c35aad200db5adf3590.yaml b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-fc1bee3fb68d7c35aad200db5adf3590.yaml new file mode 100644 index 0000000000..5ccc51dce0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-customers-manager-fc1bee3fb68d7c35aad200db5adf3590.yaml @@ -0,0 +1,58 @@ +id: woocommerce-customers-manager-fc1bee3fb68d7c35aad200db5adf3590 + +info: + name: > + WooCommerce Customers Manager <= 29.7 - Missing Authorization to Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e904a619-4388-4c83-af7b-9642cb0b97c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-customers-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-customers-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-customers-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-customers-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-customers-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 29.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-cvr-payment-gateway-47a69422b8abe1dcc847b3db9997fa97.yaml b/nuclei-templates/cve-less/plugins/woocommerce-cvr-payment-gateway-47a69422b8abe1dcc847b3db9997fa97.yaml new file mode 100644 index 0000000000..fff35ef5aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-cvr-payment-gateway-47a69422b8abe1dcc847b3db9997fa97.yaml @@ -0,0 +1,58 @@ +id: woocommerce-cvr-payment-gateway-47a69422b8abe1dcc847b3db9997fa97 + +info: + name: > + WooCommerce CVR Payment Gateway < 6.1.0 - Missing Authorization to Authenticated (Contributor+) CVR Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f72ba0e2-a9c4-43b0-a01f-185554090162?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-cvr-payment-gateway/" + google-query: inurl:"/wp-content/plugins/woocommerce-cvr-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-cvr-payment-gateway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-cvr-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-cvr-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-d12b3c547439468c334a187596dd5c5f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-d12b3c547439468c334a187596dd5c5f.yaml new file mode 100644 index 0000000000..6710a06235 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-d12b3c547439468c334a187596dd5c5f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-d12b3c547439468c334a187596dd5c5f + +info: + name: > + WooCommerce <= 3.6.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2edb574d-74b7-4f72-91a1-bb6632709b7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-dd9c5510a5d40b29d6b46c88b274a46a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-dd9c5510a5d40b29d6b46c88b274a46a.yaml new file mode 100644 index 0000000000..7650c9f22c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-dd9c5510a5d40b29d6b46c88b274a46a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-dd9c5510a5d40b29d6b46c88b274a46a + +info: + name: > + WooCommerce <= 5.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dbaeabb-2610-4b24-8c47-a04b073bd290?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-0416673ace5e88173c78bb032365c216.yaml b/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-0416673ace5e88173c78bb032365c216.yaml new file mode 100644 index 0000000000..6e93fb95f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-0416673ace5e88173c78bb032365c216.yaml @@ -0,0 +1,58 @@ +id: woocommerce-delivery-notes-0416673ace5e88173c78bb032365c216 + +info: + name: > + Print Invoice & Delivery Notes for WooCommerce <= 4.7.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ddd27ba-ae65-4bb4-989d-0d677e15077a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-delivery-notes/" + google-query: inurl:"/wp-content/plugins/woocommerce-delivery-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-delivery-notes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-delivery-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-delivery-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-1ba99d8d0c43c59d761a87f64764e3da.yaml b/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-1ba99d8d0c43c59d761a87f64764e3da.yaml new file mode 100644 index 0000000000..b83b8092c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-1ba99d8d0c43c59d761a87f64764e3da.yaml @@ -0,0 +1,58 @@ +id: woocommerce-delivery-notes-1ba99d8d0c43c59d761a87f64764e3da + +info: + name: > + Print Invoice & Delivery Notes for WooCommerce <= 4.7.2 - Cross-Site Request Forgery via ts_reset_tracking_setting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d811782e-3b59-4a46-9a2e-f24ef3dfbd4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-delivery-notes/" + google-query: inurl:"/wp-content/plugins/woocommerce-delivery-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-delivery-notes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-delivery-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-delivery-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml new file mode 100644 index 0000000000..cd120a8fa4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-delivery-notes-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-delivery-notes-1fa3ecb606b6c8eedf4f6c369e031dd5 + +info: + name: > + Multiple Plugins by tychesoftwares <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a07d293-4c50-4be0-955f-b7c4a0eaef4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-delivery-notes/" + google-query: inurl:"/wp-content/plugins/woocommerce-delivery-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-delivery-notes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-delivery-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-delivery-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-discounts-plus-96b191d228294e43622c1d713d7ed4e0.yaml b/nuclei-templates/cve-less/plugins/woocommerce-discounts-plus-96b191d228294e43622c1d713d7ed4e0.yaml new file mode 100644 index 0000000000..ca320e212c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-discounts-plus-96b191d228294e43622c1d713d7ed4e0.yaml @@ -0,0 +1,58 @@ +id: woocommerce-discounts-plus-96b191d228294e43622c1d713d7ed4e0 + +info: + name: > + Discounts Manager for Products <= 3.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2c9b82a-b63c-4647-a561-d567b6e9ff0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-discounts-plus/" + google-query: inurl:"/wp-content/plugins/woocommerce-discounts-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-discounts-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-discounts-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-discounts-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-dropshipping-397fa61492d70ec7211788fe03e433d9.yaml b/nuclei-templates/cve-less/plugins/woocommerce-dropshipping-397fa61492d70ec7211788fe03e433d9.yaml new file mode 100644 index 0000000000..e72a7a0412 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-dropshipping-397fa61492d70ec7211788fe03e433d9.yaml @@ -0,0 +1,58 @@ +id: woocommerce-dropshipping-397fa61492d70ec7211788fe03e433d9 + +info: + name: > + WooCommerce Dropshipping Premium <= 4.3 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be0a6471-a78e-4fab-8ef5-93d16859bff4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-dropshipping/" + google-query: inurl:"/wp-content/plugins/woocommerce-dropshipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-dropshipping,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-dropshipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-dropshipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-dynamic-gallery-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/woocommerce-dynamic-gallery-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..cd28ee14a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-dynamic-gallery-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: woocommerce-dynamic-gallery-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-dynamic-gallery/" + google-query: inurl:"/wp-content/plugins/woocommerce-dynamic-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-dynamic-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-dynamic-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-dynamic-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-dynamic-gallery-b935aac9392ea74d48c16c20e8b0b995.yaml b/nuclei-templates/cve-less/plugins/woocommerce-dynamic-gallery-b935aac9392ea74d48c16c20e8b0b995.yaml new file mode 100644 index 0000000000..028b8ab523 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-dynamic-gallery-b935aac9392ea74d48c16c20e8b0b995.yaml @@ -0,0 +1,58 @@ +id: woocommerce-dynamic-gallery-b935aac9392ea74d48c16c20e8b0b995 + +info: + name: > + a3rev Multiple Plugins <= Various Versions - Cross-Site Request Forgery to Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9133fa10-036b-4f42-9d0c-8e15d2625f5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-dynamic-gallery/" + google-query: inurl:"/wp-content/plugins/woocommerce-dynamic-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-dynamic-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-dynamic-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-dynamic-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-e115a05599db838c2333feb6f8913d93.yaml b/nuclei-templates/cve-less/plugins/woocommerce-e115a05599db838c2333feb6f8913d93.yaml new file mode 100644 index 0000000000..5a3b3f2e05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-e115a05599db838c2333feb6f8913d93.yaml @@ -0,0 +1,58 @@ +id: woocommerce-e115a05599db838c2333feb6f8913d93 + +info: + name: > + WooCommerce <= 2.2.2 - Cross-Site Scripting via range Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3d5f51f-6abd-49d0-b8cd-bbe518787ab8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-e456b215f29a4067fb78fdf79a4f6d54.yaml b/nuclei-templates/cve-less/plugins/woocommerce-e456b215f29a4067fb78fdf79a4f6d54.yaml new file mode 100644 index 0000000000..142c54e922 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-e456b215f29a4067fb78fdf79a4f6d54.yaml @@ -0,0 +1,58 @@ +id: woocommerce-e456b215f29a4067fb78fdf79a4f6d54 + +info: + name: > + WooCommerce <= 2.6.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e5e16c9-53d2-4fdd-8370-920b22f52033?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-ean-payment-gateway-327db16d1bb219d0ce7124ea14eed0f3.yaml b/nuclei-templates/cve-less/plugins/woocommerce-ean-payment-gateway-327db16d1bb219d0ce7124ea14eed0f3.yaml new file mode 100644 index 0000000000..abe3af5905 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-ean-payment-gateway-327db16d1bb219d0ce7124ea14eed0f3.yaml @@ -0,0 +1,58 @@ +id: woocommerce-ean-payment-gateway-327db16d1bb219d0ce7124ea14eed0f3 + +info: + name: > + WooCommerce EAN Payment Gateway < 6.1.0 - Missing Authorization to Authenticated (Contributor+) EAN Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2760b183-3c15-4f0e-b72f-7c0333f9d4b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-ean-payment-gateway/" + google-query: inurl:"/wp-content/plugins/woocommerce-ean-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-ean-payment-gateway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-ean-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-ean-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-ef7a31408ee94f0eeed2849750238bac.yaml b/nuclei-templates/cve-less/plugins/woocommerce-ef7a31408ee94f0eeed2849750238bac.yaml new file mode 100644 index 0000000000..8eb2959755 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-ef7a31408ee94f0eeed2849750238bac.yaml @@ -0,0 +1,58 @@ +id: woocommerce-ef7a31408ee94f0eeed2849750238bac + +info: + name: > + WooCommerce < 4.7.0 - Insecure Direct Object Reference via order_id Parameter + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4279efe9-df57-405a-85a0-6c22e912662c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce/" + google-query: inurl:"/wp-content/plugins/woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-email-test-a44ca1908d9450fd4614e4ea737f8275.yaml b/nuclei-templates/cve-less/plugins/woocommerce-email-test-a44ca1908d9450fd4614e4ea737f8275.yaml new file mode 100644 index 0000000000..d361dd87f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-email-test-a44ca1908d9450fd4614e4ea737f8275.yaml @@ -0,0 +1,58 @@ +id: woocommerce-email-test-a44ca1908d9450fd4614e4ea737f8275 + +info: + name: > + WooCommerce Email Test <= 1.5 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b024f6ce-c3ec-4ed9-a8ea-54f926e38443?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-email-test/" + google-query: inurl:"/wp-content/plugins/woocommerce-email-test/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-email-test,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-email-test/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-email-test" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-es-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-es-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5d207ea16c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-es-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-es-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-es/" + google-query: inurl:"/wp-content/plugins/woocommerce-es/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-es,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-es/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-es" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-eu-vat-assistant-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-eu-vat-assistant-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4418a03adb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-eu-vat-assistant-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-eu-vat-assistant-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-eu-vat-assistant/" + google-query: inurl:"/wp-content/plugins/woocommerce-eu-vat-assistant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-eu-vat-assistant,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-eu-vat-assistant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-eu-vat-assistant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.28.220224') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-exporter-0a7c54bda59de606bfaad194d1e6aebd.yaml b/nuclei-templates/cve-less/plugins/woocommerce-exporter-0a7c54bda59de606bfaad194d1e6aebd.yaml new file mode 100644 index 0000000000..9614d6adb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-exporter-0a7c54bda59de606bfaad194d1e6aebd.yaml @@ -0,0 +1,58 @@ +id: woocommerce-exporter-0a7c54bda59de606bfaad194d1e6aebd + +info: + name: > + WooCommerce – Store Exporter <= 1.7.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eeae2042-ccad-4e4b-a321-8ea58af9d775?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-exporter/" + google-query: inurl:"/wp-content/plugins/woocommerce-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-exporter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-exporter-108c66426e710c3a88abb1208f5ec4da.yaml b/nuclei-templates/cve-less/plugins/woocommerce-exporter-108c66426e710c3a88abb1208f5ec4da.yaml new file mode 100644 index 0000000000..ce35807835 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-exporter-108c66426e710c3a88abb1208f5ec4da.yaml @@ -0,0 +1,58 @@ +id: woocommerce-exporter-108c66426e710c3a88abb1208f5ec4da + +info: + name: > + WooCommerce Store Exporter <= 1.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b59f13b9-8ad3-44a7-90a0-1f959ba55700?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-exporter/" + google-query: inurl:"/wp-content/plugins/woocommerce-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-exporter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-exporter-63060da1b9f2c3cbd43712f8f4871703.yaml b/nuclei-templates/cve-less/plugins/woocommerce-exporter-63060da1b9f2c3cbd43712f8f4871703.yaml new file mode 100644 index 0000000000..4f9786af5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-exporter-63060da1b9f2c3cbd43712f8f4871703.yaml @@ -0,0 +1,58 @@ +id: woocommerce-exporter-63060da1b9f2c3cbd43712f8f4871703 + +info: + name: > + WooCommerce - Store Exporter <= 2.7.2 - Reflected Cross-Site Scripting via 'filter' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/947286b0-347f-47ab-885a-7805b50f0be8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-exporter/" + google-query: inurl:"/wp-content/plugins/woocommerce-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-exporter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-exporter-675cb8bcb438f10a9bd4c15d9cbed954.yaml b/nuclei-templates/cve-less/plugins/woocommerce-exporter-675cb8bcb438f10a9bd4c15d9cbed954.yaml new file mode 100644 index 0000000000..fc02e29cf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-exporter-675cb8bcb438f10a9bd4c15d9cbed954.yaml @@ -0,0 +1,58 @@ +id: woocommerce-exporter-675cb8bcb438f10a9bd4c15d9cbed954 + +info: + name: > + WooCommerce – Store Exporter <= 1.8.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d748e0f8-fe00-4751-9c24-561fd27e62c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-exporter/" + google-query: inurl:"/wp-content/plugins/woocommerce-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-exporter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-exporter-91f566864bd30a277df8beb598ea361a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-exporter-91f566864bd30a277df8beb598ea361a.yaml new file mode 100644 index 0000000000..2908e46252 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-exporter-91f566864bd30a277df8beb598ea361a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-exporter-91f566864bd30a277df8beb598ea361a + +info: + name: > + WooCommerce - Store Exporter <= 2.3.1 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3ecc238-1f84-47fd-96b9-753d4b528c47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-exporter/" + google-query: inurl:"/wp-content/plugins/woocommerce-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-exporter-94e6a09d2cc84f5575e6e27866d15b32.yaml b/nuclei-templates/cve-less/plugins/woocommerce-exporter-94e6a09d2cc84f5575e6e27866d15b32.yaml new file mode 100644 index 0000000000..58f17b25e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-exporter-94e6a09d2cc84f5575e6e27866d15b32.yaml @@ -0,0 +1,58 @@ +id: woocommerce-exporter-94e6a09d2cc84f5575e6e27866d15b32 + +info: + name: > + WooCommerce – Store Exporter <= 2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bae23a4-0f25-430f-8bad-6ec7b2de3dbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-exporter/" + google-query: inurl:"/wp-content/plugins/woocommerce-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-exporter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-extra-charges-to-payment-gateways-b3d7ce698d96885aab2b92e8488d08ec.yaml b/nuclei-templates/cve-less/plugins/woocommerce-extra-charges-to-payment-gateways-b3d7ce698d96885aab2b92e8488d08ec.yaml new file mode 100644 index 0000000000..701573adc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-extra-charges-to-payment-gateways-b3d7ce698d96885aab2b92e8488d08ec.yaml @@ -0,0 +1,58 @@ +id: woocommerce-extra-charges-to-payment-gateways-b3d7ce698d96885aab2b92e8488d08ec + +info: + name: > + Extra Charges To Payment Gateway For WooCommerce <= 2.0.2.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14c07d55-285b-4c7c-bed6-4c5224a7044a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-extra-charges-to-payment-gateways/" + google-query: inurl:"/wp-content/plugins/woocommerce-extra-charges-to-payment-gateways/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-extra-charges-to-payment-gateways,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-extra-charges-to-payment-gateways/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-extra-charges-to-payment-gateways" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-09fe90e01138ef94b76cf31af60e964c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-09fe90e01138ef94b76cf31af60e964c.yaml new file mode 100644 index 0000000000..5277c20942 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-09fe90e01138ef94b76cf31af60e964c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-follow-up-emails-09fe90e01138ef94b76cf31af60e964c + +info: + name: > + WooCommerce Follow-Up Emails <= 4.9.40 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fee61cd-7359-4193-8cf2-86e0527a8ef1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-follow-up-emails/" + google-query: inurl:"/wp-content/plugins/woocommerce-follow-up-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-follow-up-emails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-follow-up-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-follow-up-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-1a8df042079c3b5a71f5229720de76a0.yaml b/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-1a8df042079c3b5a71f5229720de76a0.yaml new file mode 100644 index 0000000000..dd403f3089 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-1a8df042079c3b5a71f5229720de76a0.yaml @@ -0,0 +1,58 @@ +id: woocommerce-follow-up-emails-1a8df042079c3b5a71f5229720de76a0 + +info: + name: > + WooCommerce Follow-Up Emails <= 4.9.40 - Authenticated Arbitrary File Upload in Template Editing + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a169934d-17ce-4d34-be00-c5ac0b488066?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-follow-up-emails/" + google-query: inurl:"/wp-content/plugins/woocommerce-follow-up-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-follow-up-emails,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-follow-up-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-follow-up-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-9f39bbe8da0a79b61b743c5fac55c881.yaml b/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-9f39bbe8da0a79b61b743c5fac55c881.yaml new file mode 100644 index 0000000000..04bb8f2b24 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-9f39bbe8da0a79b61b743c5fac55c881.yaml @@ -0,0 +1,58 @@ +id: woocommerce-follow-up-emails-9f39bbe8da0a79b61b743c5fac55c881 + +info: + name: > + WooCommerce Follow-Up Emails <= 4.9.50 - Authenticated (Follow-up emails manager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc5276e2-e9de-4409-bbe0-4d0b37244367?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-follow-up-emails/" + google-query: inurl:"/wp-content/plugins/woocommerce-follow-up-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-follow-up-emails,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-follow-up-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-follow-up-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-c78f898e91c2c10e61af831a7f77760d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-c78f898e91c2c10e61af831a7f77760d.yaml new file mode 100644 index 0000000000..8fad7e93fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-follow-up-emails-c78f898e91c2c10e61af831a7f77760d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-follow-up-emails-c78f898e91c2c10e61af831a7f77760d + +info: + name: > + WooCommerce Follow-Up Emails <= 4.9.40 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4487391e-baa4-4320-a23d-b52a42e2de90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-follow-up-emails/" + google-query: inurl:"/wp-content/plugins/woocommerce-follow-up-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-follow-up-emails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-follow-up-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-follow-up-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-for-japan-010c2fa504f8e0c5ce7acdd2e0b14e5d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-for-japan-010c2fa504f8e0c5ce7acdd2e0b14e5d.yaml new file mode 100644 index 0000000000..af6cb4856c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-for-japan-010c2fa504f8e0c5ce7acdd2e0b14e5d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-for-japan-010c2fa504f8e0c5ce7acdd2e0b14e5d + +info: + name: > + Japanized For WooCommerce <= 2.6.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fc675e8-8ba1-40b0-829e-7a48d5eb586d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-for-japan/" + google-query: inurl:"/wp-content/plugins/woocommerce-for-japan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-for-japan,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-for-japan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-for-japan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-for-japan-8d1e93909b79d28537c696fa4ea3a13b.yaml b/nuclei-templates/cve-less/plugins/woocommerce-for-japan-8d1e93909b79d28537c696fa4ea3a13b.yaml new file mode 100644 index 0000000000..884d6c3b88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-for-japan-8d1e93909b79d28537c696fa4ea3a13b.yaml @@ -0,0 +1,58 @@ +id: woocommerce-for-japan-8d1e93909b79d28537c696fa4ea3a13b + +info: + name: > + Japanized For WooCommerce <= 2.5.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea7d643c-3388-469f-b4a9-5c68341e2af0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-for-japan/" + google-query: inurl:"/wp-content/plugins/woocommerce-for-japan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-for-japan,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-for-japan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-for-japan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-for-japan-af335eaec6af4f82a164161fc36ab9ea.yaml b/nuclei-templates/cve-less/plugins/woocommerce-for-japan-af335eaec6af4f82a164161fc36ab9ea.yaml new file mode 100644 index 0000000000..26d3aa695d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-for-japan-af335eaec6af4f82a164161fc36ab9ea.yaml @@ -0,0 +1,58 @@ +id: woocommerce-for-japan-af335eaec6af4f82a164161fc36ab9ea + +info: + name: > + Japanized For WooCommerce <= 2.5.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb606a30-2f7c-41e9-9ebc-9f1b0b84fff8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-for-japan/" + google-query: inurl:"/wp-content/plugins/woocommerce-for-japan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-for-japan,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-for-japan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-for-japan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-frontend-shop-manager-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-frontend-shop-manager-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..10b8a5e01c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-frontend-shop-manager-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-frontend-shop-manager-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-frontend-shop-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-frontend-shop-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-frontend-shop-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-frontend-shop-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-frontend-shop-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-amazon-payments-advanced-c2c0a2ea7f55bd32da478c30032d1869.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-amazon-payments-advanced-c2c0a2ea7f55bd32da478c30032d1869.yaml new file mode 100644 index 0000000000..64475a9d1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-amazon-payments-advanced-c2c0a2ea7f55bd32da478c30032d1869.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-amazon-payments-advanced-c2c0a2ea7f55bd32da478c30032d1869 + +info: + name: > + WooCommerce Amazon Pay 2.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88fdd087-4bce-4ead-bc78-c6bdbaa70d9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-amazon-payments-advanced/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-amazon-payments-advanced/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-amazon-payments-advanced,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-amazon-payments-advanced/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-amazon-payments-advanced" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz-ffaaa29eafbfa43f1ab24fb78aa6ea85.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz-ffaaa29eafbfa43f1ab24fb78aa6ea85.yaml new file mode 100644 index 0000000000..85a2c950de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz-ffaaa29eafbfa43f1ab24fb78aa6ea85.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz-ffaaa29eafbfa43f1ab24fb78aa6ea85 + +info: + name: > + Kiwiz - Certification de facturation - Woocommerce <= 2.1.3 - Unauthenticated Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/603f0c9d-6964-4911-b4a5-bdad24a1a8dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-certification-de-facture-et-gestion-de-pdf-kiwiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-eway-b9c5331c1740635695be7100e378bb1c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-eway-b9c5331c1740635695be7100e378bb1c.yaml new file mode 100644 index 0000000000..5b2bbf0205 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-eway-b9c5331c1740635695be7100e378bb1c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-eway-b9c5331c1740635695be7100e378bb1c + +info: + name: > + WooCommerce Eway Gateway <= 3.5.0 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6bff35f-f881-4c60-9611-4a04727bac36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-eway/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-eway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-eway,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-eway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-eway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-gocardless-372a57ef9400497453c7017d55fedd93.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-gocardless-372a57ef9400497453c7017d55fedd93.yaml new file mode 100644 index 0000000000..9713d2e086 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-gocardless-372a57ef9400497453c7017d55fedd93.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-gocardless-372a57ef9400497453c7017d55fedd93 + +info: + name: > + WooCommerce GoCardless Gateway <= 2.5.6 - Unauthenticated Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa174135-d7aa-44f1-8924-44313fc70a75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-gocardless/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-gocardless/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-gocardless,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-gocardless/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-gocardless" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-nab-dp-ab20415721ed085ae618181a838033a3.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-nab-dp-ab20415721ed085ae618181a838033a3.yaml new file mode 100644 index 0000000000..c5ed2bd385 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-nab-dp-ab20415721ed085ae618181a838033a3.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-nab-dp-ab20415721ed085ae618181a838033a3 + +info: + name: > + NAB Transact < 2.1.2 - Payment System Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1dccdbbd-fd3c-4d76-a05a-42f1c7f7132f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-nab-dp/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-nab-dp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-nab-dp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-nab-dp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-nab-dp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-0187684b30a8dd357634d24962eef6bd.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-0187684b30a8dd357634d24962eef6bd.yaml new file mode 100644 index 0000000000..c032861d81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-0187684b30a8dd357634d24962eef6bd.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-stripe-0187684b30a8dd357634d24962eef6bd + +info: + name: > + Stripe Gateway <= 7.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e4ad8fa-b04c-4821-aadb-3120f824557f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-stripe/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-stripe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-stripe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-stripe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-stripe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-0b81aaa01f44c52b0f6d2c057df8ef8e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-0b81aaa01f44c52b0f6d2c057df8ef8e.yaml new file mode 100644 index 0000000000..c349e67d04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-0b81aaa01f44c52b0f6d2c057df8ef8e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-stripe-0b81aaa01f44c52b0f6d2c057df8ef8e + +info: + name: > + WooCommerce Stripe Payment Gateway <= 7.4.0 - Unauthenticated Insecure Direct Object Reference to Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70971072-d743-466b-affe-d7f79d5712aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-stripe/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-stripe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-stripe,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-stripe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-stripe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '7.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-1dd78a63fe389dc209197bb2e45c0680.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-1dd78a63fe389dc209197bb2e45c0680.yaml new file mode 100644 index 0000000000..4c11385456 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-1dd78a63fe389dc209197bb2e45c0680.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-stripe-1dd78a63fe389dc209197bb2e45c0680 + +info: + name: > + WooCommerce Stripe Payment Gateway <= 7.6.1 - Insecure Direct Object Reference via update_payment_intent_ajax + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ee04e4d-4385-4854-9bfe-1b957ca13963?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-stripe/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-stripe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-stripe,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-stripe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-stripe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-3b50ede48b2cfc5cc49521992d3d9653.yaml b/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-3b50ede48b2cfc5cc49521992d3d9653.yaml new file mode 100644 index 0000000000..8bd0281e49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-gateway-stripe-3b50ede48b2cfc5cc49521992d3d9653.yaml @@ -0,0 +1,58 @@ +id: woocommerce-gateway-stripe-3b50ede48b2cfc5cc49521992d3d9653 + +info: + name: > + WooCommerce Stripe Payment Gateway <= 7.4.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c3789d0-6872-4691-94d9-58e1ac303c31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-gateway-stripe/" + google-query: inurl:"/wp-content/plugins/woocommerce-gateway-stripe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-gateway-stripe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-gateway-stripe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-gateway-stripe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-germanized-efd088c138987744c27fa2ae009c995c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-germanized-efd088c138987744c27fa2ae009c995c.yaml new file mode 100644 index 0000000000..65fb864cac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-germanized-efd088c138987744c27fa2ae009c995c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-germanized-efd088c138987744c27fa2ae009c995c + +info: + name: > + Germanized for WooCommerce <= 3.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b430f98-255b-454f-97f5-2d2c9a572225?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-germanized/" + google-query: inurl:"/wp-content/plugins/woocommerce-germanized/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-germanized,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-germanized/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-germanized" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-google-adwords-conversion-tracking-tag-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-google-adwords-conversion-tracking-tag-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4b9c5ac736 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-google-adwords-conversion-tracking-tag-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-google-adwords-conversion-tracking-tag-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-google-adwords-conversion-tracking-tag/" + google-query: inurl:"/wp-content/plugins/woocommerce-google-adwords-conversion-tracking-tag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-google-adwords-conversion-tracking-tag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-google-adwords-conversion-tracking-tag/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-google-adwords-conversion-tracking-tag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-help-scout-be181067e24f0cdc8c0b449617d32f97.yaml b/nuclei-templates/cve-less/plugins/woocommerce-help-scout-be181067e24f0cdc8c0b449617d32f97.yaml new file mode 100644 index 0000000000..bcc4019e36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-help-scout-be181067e24f0cdc8c0b449617d32f97.yaml @@ -0,0 +1,58 @@ +id: woocommerce-help-scout-be181067e24f0cdc8c0b449617d32f97 + +info: + name: > + WooCommerce Help Scout <= 2.9.1 - Arbitrary File Upload to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f98f4b3-8cce-45dd-a138-5f2c8031fab5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-help-scout/" + google-query: inurl:"/wp-content/plugins/woocommerce-help-scout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-help-scout,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-help-scout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-help-scout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-127ab045dd12eca20b1f05cdaef8b291.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-127ab045dd12eca20b1f05cdaef8b291.yaml new file mode 100644 index 0000000000..8f9ed7e556 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-127ab045dd12eca20b1f05cdaef8b291.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-127ab045dd12eca20b1f05cdaef8b291 + +info: + name: > + Booster (<= 5.6.6) and Booster Plus (<= 5.6.4) for WooCommerce - Authenticated (Shop Manager+) Information Exposure via Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d8f7252-5e91-4e42-a6a5-056da491b4f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-21b746fb77ead6544f6c7dbfa1edc718.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-21b746fb77ead6544f6c7dbfa1edc718.yaml new file mode 100644 index 0000000000..8faf0f0995 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-21b746fb77ead6544f6c7dbfa1edc718.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-21b746fb77ead6544f6c7dbfa1edc718 + +info: + name: > + Booster for WooCommerce <= 7.1.1 - Authenticated (Subscriber+) Information Disclosure via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1426809-b245-4868-be87-c96b3c5c05f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-2594adb9a7b091439405e835629ab066.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-2594adb9a7b091439405e835629ab066.yaml new file mode 100644 index 0000000000..c1f6900498 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-2594adb9a7b091439405e835629ab066.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-2594adb9a7b091439405e835629ab066 + +info: + name: > + Booster (<= 5.6.6), Booster Plus (<= 5.6.5), and Booster Elite (<= 1.1.7) for WooCommerce - Cross-Site Request Forgery leading to Arbitrary Custom Role Creation/Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21cc3f71-7591-4111-a58a-d863df74587f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-38cbe872337aaa11f53f5f047e11de00.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-38cbe872337aaa11f53f5f047e11de00.yaml new file mode 100644 index 0000000000..073c253676 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-38cbe872337aaa11f53f5f047e11de00.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-38cbe872337aaa11f53f5f047e11de00 + +info: + name: > + Booster for WooCommerce <= 7.1.2 - Missing Authorization to Product Creation/Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00ec2f57-48ee-49ea-ae8f-e7b24bf4535c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-3ae6c1779315005d2af44a96ee77af2d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-3ae6c1779315005d2af44a96ee77af2d.yaml new file mode 100644 index 0000000000..a166207bee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-3ae6c1779315005d2af44a96ee77af2d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-3ae6c1779315005d2af44a96ee77af2d + +info: + name: > + Booster for WooCommerce (Free <= 5.6.6, Premium <= 5.6.4) - Cross-Site Request Forgery to File Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3acbdb2a-e7c6-4062-b48a-7035e464edaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-4281d6cbf86b1cb2ecab3675e42347ac.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-4281d6cbf86b1cb2ecab3675e42347ac.yaml new file mode 100644 index 0000000000..09d7279c37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-4281d6cbf86b1cb2ecab3675e42347ac.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-4281d6cbf86b1cb2ecab3675e42347ac + +info: + name: > + Booster for WooCommerce <= 7.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0257620-3a0e-4011-9378-7aa423e7c0b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-42e7549e05a04879d284fb2372860cb2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-42e7549e05a04879d284fb2372860cb2.yaml new file mode 100644 index 0000000000..591bcb427b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-42e7549e05a04879d284fb2372860cb2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-42e7549e05a04879d284fb2372860cb2 + +info: + name: > + Booster for WooCommerce <= 5.4.8 - Reflected Cross-Site Scripting in General Module + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd861a13-4215-4a69-adb5-cd28dce4509b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-58678de90c143fa9b35140b23ca7ba6c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-58678de90c143fa9b35140b23ca7ba6c.yaml new file mode 100644 index 0000000000..b86edd7567 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-58678de90c143fa9b35140b23ca7ba6c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-58678de90c143fa9b35140b23ca7ba6c + +info: + name: > + Booster (<= 6.0.0), Booster Plus (<= 6.0.0), and Booster Elite (<= 6.0.0) for WooCommerce - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0af6e55d-def9-4bb1-ade9-56aa8184961c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-6db5d1fe8cacae7e42ba1eadc757c2cf.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-6db5d1fe8cacae7e42ba1eadc757c2cf.yaml new file mode 100644 index 0000000000..45e1a7f64c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-6db5d1fe8cacae7e42ba1eadc757c2cf.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-6db5d1fe8cacae7e42ba1eadc757c2cf + +info: + name: > + Booster for WooCommerce <= 7.1.8 - Unauthenticated Arbitrary Shortcode Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1653de8f-62eb-488b-9e97-8b30221b509f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-761ad1a5f416d5f845100fe45755bedf.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-761ad1a5f416d5f845100fe45755bedf.yaml new file mode 100644 index 0000000000..f12eaa2667 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-761ad1a5f416d5f845100fe45755bedf.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-761ad1a5f416d5f845100fe45755bedf + +info: + name: > + Booster for WooCommerce <= 5.6.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07ca231c-5b88-4721-a01f-8c135d4cf50b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-7832435d7568bbf632e364a36f5e57e1.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-7832435d7568bbf632e364a36f5e57e1.yaml new file mode 100644 index 0000000000..9ec0de48a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-7832435d7568bbf632e364a36f5e57e1.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-7832435d7568bbf632e364a36f5e57e1 + +info: + name: > + Booster for WooCommerce <= 7.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortocde + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56dc5138-c864-4e36-8b7d-38ac49589c06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-7ee31b33feb435cadd87c62f79cebfe3.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-7ee31b33feb435cadd87c62f79cebfe3.yaml new file mode 100644 index 0000000000..244aedb8b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-7ee31b33feb435cadd87c62f79cebfe3.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-7ee31b33feb435cadd87c62f79cebfe3 + +info: + name: > + Booster for WooCommerce 7.0.0 - Authenticated (Shop Manager+) Missing Authorization to Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0903bd2b-240f-4791-bfa6-f727d193af4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '7.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-882bdd3fdb6681642f156a22924c9a36.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-882bdd3fdb6681642f156a22924c9a36.yaml new file mode 100644 index 0000000000..64aa42ca51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-882bdd3fdb6681642f156a22924c9a36.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-882bdd3fdb6681642f156a22924c9a36 + +info: + name: > + Booster (<= 5.6.2), Booster Plus (< 6.0.0), and Booster Elite (< 6.0.0) for WooCommerce - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4d86204-51df-4adf-aac4-f5e007d9f3c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-885fb17b6662f56f045b926c01f35175.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-885fb17b6662f56f045b926c01f35175.yaml new file mode 100644 index 0000000000..8d25ee8fce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-885fb17b6662f56f045b926c01f35175.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-885fb17b6662f56f045b926c01f35175 + +info: + name: > + Booster for WooCommerce <= 7.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/981639a3-63c4-4b3f-827f-4d770bd44806?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-9c19725e7330d8a4aba8b2ac8de32961.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-9c19725e7330d8a4aba8b2ac8de32961.yaml new file mode 100644 index 0000000000..61df6c33f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-9c19725e7330d8a4aba8b2ac8de32961.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-9c19725e7330d8a4aba8b2ac8de32961 + +info: + name: > + Booster for WooCommerce <= 7.1.1 - Missing Authorization to Authenticated (Subscriber+) Order Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d94661c1-2d70-4943-9452-b51a76116ebb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-a2e4cd3309d1f111f649373058fb4d50.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-a2e4cd3309d1f111f649373058fb4d50.yaml new file mode 100644 index 0000000000..63633b0b45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-a2e4cd3309d1f111f649373058fb4d50.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-a2e4cd3309d1f111f649373058fb4d50 + +info: + name: > + Booster for WooCommerce <= 7.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0b86c45-c346-4df7-844e-01de027bbc1e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-ab678c0df2a17e9783905e758a6050b6.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-ab678c0df2a17e9783905e758a6050b6.yaml new file mode 100644 index 0000000000..6aedde6550 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-ab678c0df2a17e9783905e758a6050b6.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-ab678c0df2a17e9783905e758a6050b6 + +info: + name: > + Booster for WooCommerce <= 5.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2030698f-1180-432b-9a66-3039fdda79fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-aca759ef038f25525825e47a4ffc724f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-aca759ef038f25525825e47a4ffc724f.yaml new file mode 100644 index 0000000000..d2d5b060fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-aca759ef038f25525825e47a4ffc724f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-aca759ef038f25525825e47a4ffc724f + +info: + name: > + Booster for WooCommerce <= 5.4.3 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af37f301-d97f-47d3-b6a8-88cb41344541?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-ae7ec62fe186e1a7a30df795c82f42a1.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-ae7ec62fe186e1a7a30df795c82f42a1.yaml new file mode 100644 index 0000000000..fd86705ae4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-ae7ec62fe186e1a7a30df795c82f42a1.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-ae7ec62fe186e1a7a30df795c82f42a1 + +info: + name: > + Booster for WooCommerce <= 3.7.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/befd6971-29e1-477e-95b8-e7385fbd247d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-b4d2681789aa51cbc2f0247a1fc077e0.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-b4d2681789aa51cbc2f0247a1fc077e0.yaml new file mode 100644 index 0000000000..3af13390f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-b4d2681789aa51cbc2f0247a1fc077e0.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-b4d2681789aa51cbc2f0247a1fc077e0 + +info: + name: > + Booster for WooCommerce <= 5.5.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fe5a834-487e-4da8-8b30-384427e26e6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-bea7c217c1714d6e73035b13fbfa872c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-bea7c217c1714d6e73035b13fbfa872c.yaml new file mode 100644 index 0000000000..22f6d1064a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-bea7c217c1714d6e73035b13fbfa872c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-bea7c217c1714d6e73035b13fbfa872c + +info: + name: > + Booster for WooCommerce <= 5.6.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa7ca972-ddb0-416b-8c5a-b4e9648ca957?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-bf615bf143d1873d5b3b8d3683682f8b.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-bf615bf143d1873d5b3b8d3683682f8b.yaml new file mode 100644 index 0000000000..6926633110 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-bf615bf143d1873d5b3b8d3683682f8b.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-bf615bf143d1873d5b3b8d3683682f8b + +info: + name: > + Booster for WooCommerce <= 5.4.8 - Reflected Cross-Site Scripting in Product XML Feeds Module + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81b4a218-7752-4276-a523-1edbe1e36442?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-cba7d92a9ae2afc427a931dcb7ec0c7f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-cba7d92a9ae2afc427a931dcb7ec0c7f.yaml new file mode 100644 index 0000000000..c0fe714122 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-cba7d92a9ae2afc427a931dcb7ec0c7f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-cba7d92a9ae2afc427a931dcb7ec0c7f + +info: + name: > + Booster for WooCommerce <= 7.1.0 - Authenticated (Subscriber+) Information Disclosure via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4cd49b2-ff93-4582-906b-b690d8472c38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-e3b83c4eb77b086c6d4b79728a8e33f2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-e3b83c4eb77b086c6d4b79728a8e33f2.yaml new file mode 100644 index 0000000000..a172f808fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-e3b83c4eb77b086c6d4b79728a8e33f2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-e3b83c4eb77b086c6d4b79728a8e33f2 + +info: + name: > + Booster for WooCommerce <= 5.4.8 - Reflected Cross-Site Scripting in PDF Invoicing Module + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96265dd0-ed3d-4557-80e9-41f8b943b2a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f2f846fb0dd5d9b11e1e9659c07919f7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f2f846fb0dd5d9b11e1e9659c07919f7.yaml new file mode 100644 index 0000000000..df202a32a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f2f846fb0dd5d9b11e1e9659c07919f7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-f2f846fb0dd5d9b11e1e9659c07919f7 + +info: + name: > + Booster for WooCommerce <= 7.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/819f93ae-cfbd-4ba5-979f-18adc7b9c8fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f7a2331fcfcd2f54c326b52127a157a4.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f7a2331fcfcd2f54c326b52127a157a4.yaml new file mode 100644 index 0000000000..76d297cd07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f7a2331fcfcd2f54c326b52127a157a4.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-f7a2331fcfcd2f54c326b52127a157a4 + +info: + name: > + Booster for WooCommerce <= 5.5.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/985fd6a4-282a-48e9-9149-69e6ee794667?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f91c2602522656e11d82af368c387634.yaml b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f91c2602522656e11d82af368c387634.yaml new file mode 100644 index 0000000000..9f667075fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-jetpack-f91c2602522656e11d82af368c387634.yaml @@ -0,0 +1,58 @@ +id: woocommerce-jetpack-f91c2602522656e11d82af368c387634 + +info: + name: > + Booster for WooCommerce (Free <= 5.6.2 and Premium <= 5.6.0) - Authenticated (Subscriber+) Order Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48784892-443f-452c-9fe9-12e73af1cf7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-jetpack/" + google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-jetpack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-jetpack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-menu-bar-cart-4c6eee0db8572f7bcd30530fa44d18aa.yaml b/nuclei-templates/cve-less/plugins/woocommerce-menu-bar-cart-4c6eee0db8572f7bcd30530fa44d18aa.yaml new file mode 100644 index 0000000000..e83c7615e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-menu-bar-cart-4c6eee0db8572f7bcd30530fa44d18aa.yaml @@ -0,0 +1,58 @@ +id: woocommerce-menu-bar-cart-4c6eee0db8572f7bcd30530fa44d18aa + +info: + name: > + WooCommerce Menu Cart <= 2.11.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0b223e8-7659-4220-acb6-70dfd4c101f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-menu-bar-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-menu-bar-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-menu-bar-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-menu-bar-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-menu-bar-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-menu-extension-a56026625ece44a82e5e6eba005e9ec0.yaml b/nuclei-templates/cve-less/plugins/woocommerce-menu-extension-a56026625ece44a82e5e6eba005e9ec0.yaml new file mode 100644 index 0000000000..34e38e3796 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-menu-extension-a56026625ece44a82e5e6eba005e9ec0.yaml @@ -0,0 +1,58 @@ +id: woocommerce-menu-extension-a56026625ece44a82e5e6eba005e9ec0 + +info: + name: > + WooCommerce Menu Extension <= 1.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/173c8c8a-a015-4522-b957-1805f520a77d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-menu-extension/" + google-query: inurl:"/wp-content/plugins/woocommerce-menu-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-menu-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-menu-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-menu-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-mercadopago-792751d76323c735bfedba81a5c362e9.yaml b/nuclei-templates/cve-less/plugins/woocommerce-mercadopago-792751d76323c735bfedba81a5c362e9.yaml new file mode 100644 index 0000000000..bb1275a81a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-mercadopago-792751d76323c735bfedba81a5c362e9.yaml @@ -0,0 +1,58 @@ +id: woocommerce-mercadopago-792751d76323c735bfedba81a5c362e9 + +info: + name: > + Mercado Pago payments for WooCommerce <= 6.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce30649a-c1a0-42d5-b2e7-1ebe7989efa3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-mercadopago/" + google-query: inurl:"/wp-content/plugins/woocommerce-mercadopago/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-mercadopago,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-mercadopago/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-mercadopago" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-mercadopago-9a89bb3aae603e90bebf5f173e16f83b.yaml b/nuclei-templates/cve-less/plugins/woocommerce-mercadopago-9a89bb3aae603e90bebf5f173e16f83b.yaml new file mode 100644 index 0000000000..5a08ee2383 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-mercadopago-9a89bb3aae603e90bebf5f173e16f83b.yaml @@ -0,0 +1,58 @@ +id: woocommerce-mercadopago-9a89bb3aae603e90bebf5f173e16f83b + +info: + name: > + Mercado Pago payments for WooCommerce <= 6.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b20b4eba-54df-4e08-ba4c-96f8bb463125?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-mercadopago/" + google-query: inurl:"/wp-content/plugins/woocommerce-mercadopago/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-mercadopago,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-mercadopago/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-mercadopago" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-multi-currency-fdd08f1e50818f896e8c8a898740f26b.yaml b/nuclei-templates/cve-less/plugins/woocommerce-multi-currency-fdd08f1e50818f896e8c8a898740f26b.yaml new file mode 100644 index 0000000000..b60e47e5f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-multi-currency-fdd08f1e50818f896e8c8a898740f26b.yaml @@ -0,0 +1,58 @@ +id: woocommerce-multi-currency-fdd08f1e50818f896e8c8a898740f26b + +info: + name: > + WooCommerce Multi Currency <= 2.1.17 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2318ae9-4115-442e-9293-a9251787c5f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-multi-currency/" + google-query: inurl:"/wp-content/plugins/woocommerce-multi-currency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-multi-currency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-multi-currency/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-multi-currency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-multilingual-405af1244e8e91b41a724bfd16213a75.yaml b/nuclei-templates/cve-less/plugins/woocommerce-multilingual-405af1244e8e91b41a724bfd16213a75.yaml new file mode 100644 index 0000000000..0418a817eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-multilingual-405af1244e8e91b41a724bfd16213a75.yaml @@ -0,0 +1,58 @@ +id: woocommerce-multilingual-405af1244e8e91b41a724bfd16213a75 + +info: + name: > + WooCommerce Multilingual & Multicurrency <= 5.3.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc34de39-bd2f-4ca2-8363-d436d5e2db8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-multilingual/" + google-query: inurl:"/wp-content/plugins/woocommerce-multilingual/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-multilingual,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-multilingual/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-multilingual" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-multilingual-a3fe0d186555bfccf2ee6cc4060fb41e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-multilingual-a3fe0d186555bfccf2ee6cc4060fb41e.yaml new file mode 100644 index 0000000000..0f95cb0803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-multilingual-a3fe0d186555bfccf2ee6cc4060fb41e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-multilingual-a3fe0d186555bfccf2ee6cc4060fb41e + +info: + name: > + WooCommerce Multilingual & Multicurrency with WPML <= 5.3.3.1 - Authenticated (Shop Manager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b0f58b8-46d6-4deb-bfcc-806bb635b060?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-multilingual/" + google-query: inurl:"/wp-content/plugins/woocommerce-multilingual/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-multilingual,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-multilingual/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-multilingual" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-ninjaforms-product-addons-293d0db4cdca8f446d52a99ed91cf4be.yaml b/nuclei-templates/cve-less/plugins/woocommerce-ninjaforms-product-addons-293d0db4cdca8f446d52a99ed91cf4be.yaml new file mode 100644 index 0000000000..a4f4ca86d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-ninjaforms-product-addons-293d0db4cdca8f446d52a99ed91cf4be.yaml @@ -0,0 +1,58 @@ +id: woocommerce-ninjaforms-product-addons-293d0db4cdca8f446d52a99ed91cf4be + +info: + name: > + WooCommerce Ninja Forms Product Add-ons <= 1.7.0 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/601d70ff-2e0e-403b-9c58-130d378a8240?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-ninjaforms-product-addons/" + google-query: inurl:"/wp-content/plugins/woocommerce-ninjaforms-product-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-ninjaforms-product-addons,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-ninjaforms-product-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-ninjaforms-product-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-one-page-checkout-3df49792a8ece76a8d711abde91f5cbd.yaml b/nuclei-templates/cve-less/plugins/woocommerce-one-page-checkout-3df49792a8ece76a8d711abde91f5cbd.yaml new file mode 100644 index 0000000000..2a018ee63a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-one-page-checkout-3df49792a8ece76a8d711abde91f5cbd.yaml @@ -0,0 +1,58 @@ +id: woocommerce-one-page-checkout-3df49792a8ece76a8d711abde91f5cbd + +info: + name: > + WooCommerce One Page Checkout <= 2.3.0 - Authenticated (Contributor+) Local File Inclusion via `woocommerce_one_page_checkout` + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffac779c-c17f-46bd-9276-a1ce2db4e95c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-one-page-checkout/" + google-query: inurl:"/wp-content/plugins/woocommerce-one-page-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-one-page-checkout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-one-page-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-one-page-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-order-address-print-b81127029753923b54df2f74db7ead66.yaml b/nuclei-templates/cve-less/plugins/woocommerce-order-address-print-b81127029753923b54df2f74db7ead66.yaml new file mode 100644 index 0000000000..176175c5bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-order-address-print-b81127029753923b54df2f74db7ead66.yaml @@ -0,0 +1,58 @@ +id: woocommerce-order-address-print-b81127029753923b54df2f74db7ead66 + +info: + name: > + Woocommerce Order address Print <= 3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bbf4e86-308c-43f3-a54c-e1c6ee21260e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-order-address-print/" + google-query: inurl:"/wp-content/plugins/woocommerce-order-address-print/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-order-address-print,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-order-address-print/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-order-address-print" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-order-barcodes-d43224e006298ab64602bb491da85360.yaml b/nuclei-templates/cve-less/plugins/woocommerce-order-barcodes-d43224e006298ab64602bb491da85360.yaml new file mode 100644 index 0000000000..3b9f7cc457 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-order-barcodes-d43224e006298ab64602bb491da85360.yaml @@ -0,0 +1,58 @@ +id: woocommerce-order-barcodes-d43224e006298ab64602bb491da85360 + +info: + name: > + WooCommerce Order Barcodes <= 1.6.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cefa38d0-7da1-48dd-98d7-fe2f36e19d7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-order-barcodes/" + google-query: inurl:"/wp-content/plugins/woocommerce-order-barcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-order-barcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-order-barcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-order-barcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-order-status-change-notifier-ae1b1a51b391401549de89991091def2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-order-status-change-notifier-ae1b1a51b391401549de89991091def2.yaml new file mode 100644 index 0000000000..f6bda55f29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-order-status-change-notifier-ae1b1a51b391401549de89991091def2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-order-status-change-notifier-ae1b1a51b391401549de89991091def2 + +info: + name: > + WooCommerce Order Status Change Notifier <= 1.1.0 - Authenticated (Subscriber+) Arbitrary Order Status Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66bc83f5-0f6c-425f-a560-e79e777b76ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-order-status-change-notifier/" + google-query: inurl:"/wp-content/plugins/woocommerce-order-status-change-notifier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-order-status-change-notifier,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-order-status-change-notifier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-order-status-change-notifier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pay-per-post-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pay-per-post-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ccf466e177 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pay-per-post-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pay-per-post-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pay-per-post/" + google-query: inurl:"/wp-content/plugins/woocommerce-pay-per-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pay-per-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pay-per-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pay-per-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-payments-3c1095436fd6552a40c2bd2c4e117041.yaml b/nuclei-templates/cve-less/plugins/woocommerce-payments-3c1095436fd6552a40c2bd2c4e117041.yaml new file mode 100644 index 0000000000..3514c3740a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-payments-3c1095436fd6552a40c2bd2c4e117041.yaml @@ -0,0 +1,58 @@ +id: woocommerce-payments-3c1095436fd6552a40c2bd2c4e117041 + +info: + name: > + WooCommerce Payments <= 4.5.0 - Payment Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d604200-91b0-4885-8fe2-1323b9d6fed5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-payments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-payments-477398bcb43958a50c7a7519798e0391.yaml b/nuclei-templates/cve-less/plugins/woocommerce-payments-477398bcb43958a50c7a7519798e0391.yaml new file mode 100644 index 0000000000..a213863b90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-payments-477398bcb43958a50c7a7519798e0391.yaml @@ -0,0 +1,58 @@ +id: woocommerce-payments-477398bcb43958a50c7a7519798e0391 + +info: + name: > + WooCommerce Payments <= 5.9.0 - Missing Authorization via redirect_pay_for_order_to_update_payment_method + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1811827d-88ae-45e0-a41e-d15fd0adf44a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-payments-8f2275f20711e7ff52e234ab96188172.yaml b/nuclei-templates/cve-less/plugins/woocommerce-payments-8f2275f20711e7ff52e234ab96188172.yaml new file mode 100644 index 0000000000..d898dcd268 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-payments-8f2275f20711e7ff52e234ab96188172.yaml @@ -0,0 +1,58 @@ +id: woocommerce-payments-8f2275f20711e7ff52e234ab96188172 + +info: + name: > + WooCommerce Payments <= 6.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13617b70-9b57-4873-9942-12bffed411e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-payments-b9180b9244a3340bd6331bb97ffb0fd1.yaml b/nuclei-templates/cve-less/plugins/woocommerce-payments-b9180b9244a3340bd6331bb97ffb0fd1.yaml new file mode 100644 index 0000000000..0ac66e81cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-payments-b9180b9244a3340bd6331bb97ffb0fd1.yaml @@ -0,0 +1,58 @@ +id: woocommerce-payments-b9180b9244a3340bd6331bb97ffb0fd1 + +info: + name: > + WooCommerce Payments 4.8.0 - 5.6.1 Authentication Bypass and Privilege Escalation + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41cf57ff-421d-4db2-894f-17f2c4d4b9ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-payments,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.8.0', '<= 5.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-payments-ce1aa5091f6bad027f616e3d2a1d6732.yaml b/nuclei-templates/cve-less/plugins/woocommerce-payments-ce1aa5091f6bad027f616e3d2a1d6732.yaml new file mode 100644 index 0000000000..263c0acb41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-payments-ce1aa5091f6bad027f616e3d2a1d6732.yaml @@ -0,0 +1,58 @@ +id: woocommerce-payments-ce1aa5091f6bad027f616e3d2a1d6732 + +info: + name: > + WooPayments – Fully Integrated Solution Built and Supported by Woo <= 6.6.2 - Unauthenticated Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68f5bc13-b0b2-48b6-82ac-ff02367f4780?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-payments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-payments-f291a0b96ba11ad5b48df58ad86c38db.yaml b/nuclei-templates/cve-less/plugins/woocommerce-payments-f291a0b96ba11ad5b48df58ad86c38db.yaml new file mode 100644 index 0000000000..eb62ffdd14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-payments-f291a0b96ba11ad5b48df58ad86c38db.yaml @@ -0,0 +1,58 @@ +id: woocommerce-payments-f291a0b96ba11ad5b48df58ad86c38db + +info: + name: > + WooCommerce Payments <= 5.9.0 - Authenticated (Shop manager+) SQL Injection via currency parameters + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1f0ec5c-6853-4df9-816a-1790f3dc86e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-paypal-payments-4f7331e8a3ba4696249e7fcea579fa07.yaml b/nuclei-templates/cve-less/plugins/woocommerce-paypal-payments-4f7331e8a3ba4696249e7fcea579fa07.yaml new file mode 100644 index 0000000000..7a0cb32651 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-paypal-payments-4f7331e8a3ba4696249e7fcea579fa07.yaml @@ -0,0 +1,58 @@ +id: woocommerce-paypal-payments-4f7331e8a3ba4696249e7fcea579fa07 + +info: + name: > + WooCommerce PayPal Payments <= 2.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1023edcb-9879-4dde-b62e-3ce65d7fef2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-paypal-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-paypal-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-paypal-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-paypal-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-paypal-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-payplug-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-payplug-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5972fade2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-payplug-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-payplug-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-payplug/" + google-query: inurl:"/wp-content/plugins/woocommerce-payplug/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-payplug,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-payplug/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-payplug" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-payu-paisa-a236237c099e41f3f0f40af4eb789d56.yaml b/nuclei-templates/cve-less/plugins/woocommerce-payu-paisa-a236237c099e41f3f0f40af4eb789d56.yaml new file mode 100644 index 0000000000..cfd4a4ce20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-payu-paisa-a236237c099e41f3f0f40af4eb789d56.yaml @@ -0,0 +1,58 @@ +id: woocommerce-payu-paisa-a236237c099e41f3f0f40af4eb789d56 + +info: + name: > + WooCommerce PayU India <= 2.1.1 - Improper Input Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9428f710-db34-418f-9918-b35609ca5185?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-payu-paisa/" + google-query: inurl:"/wp-content/plugins/woocommerce-payu-paisa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-payu-paisa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-payu-paisa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-payu-paisa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-20e967f496e19df1e9123f3c23d87252.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-20e967f496e19df1e9123f3c23d87252.yaml new file mode 100644 index 0000000000..baa22a9fbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-20e967f496e19df1e9123f3c23d87252.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-20e967f496e19df1e9123f3c23d87252 + +info: + name: > + PDF Invoices & Packing Slips for WooCommerce <= 3.7.6 - Authenticated (Shop Manager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a92e307d-b3c0-441a-abac-580a60dd44cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-300feb509f489660d5d15d529d154d5c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-300feb509f489660d5d15d529d154d5c.yaml new file mode 100644 index 0000000000..640ae008f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-300feb509f489660d5d15d529d154d5c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-300feb509f489660d5d15d529d154d5c + +info: + name: > + PDF Invoices & Packing Slips for WooCommerce <= 3.8.0 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18f16148-b4a8-4f89-af0d-c0baba8f9ccf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-682c136fe192ebcfc486e6f937b67fae.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-682c136fe192ebcfc486e6f937b67fae.yaml new file mode 100644 index 0000000000..51f5007ad5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-682c136fe192ebcfc486e6f937b67fae.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-682c136fe192ebcfc486e6f937b67fae + +info: + name: > + WooCommerce PDF Invoices & Packing Slips <= 3.2.5 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d33a880-0238-4d27-a433-6a09844bef3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-7e729c66876df948651c9d3837d1f01c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-7e729c66876df948651c9d3837d1f01c.yaml new file mode 100644 index 0000000000..561566ea0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-7e729c66876df948651c9d3837d1f01c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-7e729c66876df948651c9d3837d1f01c + +info: + name: > + WooCommerce PDF Invoices & Packing Slips <= 2.0.12 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cf7075f-7209-49e6-acf9-6739b178d4dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-822c565b84349831aeea48fc4b498976.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-822c565b84349831aeea48fc4b498976.yaml new file mode 100644 index 0000000000..55d001ad5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-822c565b84349831aeea48fc4b498976.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-822c565b84349831aeea48fc4b498976 + +info: + name: > + PDF Invoices & Packing Slips for WooCommerce <= 3.8.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d0e5d24-5d65-4ed5-8086-347969cbd3ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-94f5b565df6f54587e7f38dd2d74f17d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-94f5b565df6f54587e7f38dd2d74f17d.yaml new file mode 100644 index 0000000000..52d4bac76f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-94f5b565df6f54587e7f38dd2d74f17d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-94f5b565df6f54587e7f38dd2d74f17d + +info: + name: > + WooCommerce PDF Invoices & Packing Slips <= 2.14.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b96349da-e2b4-4b29-94b4-1039427bce8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.14.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-c7680f1772f94d4abf62aaaeb8635605.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-c7680f1772f94d4abf62aaaeb8635605.yaml new file mode 100644 index 0000000000..ab12fc33c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-c7680f1772f94d4abf62aaaeb8635605.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-c7680f1772f94d4abf62aaaeb8635605 + +info: + name: > + WooCommerce PDF Invoices & Packing Slips <= 2.10.4 - Reflected Cross-Site Scripting via tab and section parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d7f9291-5a57-4aca-b18f-623bf07348a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-f245b6f7ab151ad35769fbe02b21bebd.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-f245b6f7ab151ad35769fbe02b21bebd.yaml new file mode 100644 index 0000000000..fcc9228e2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-f245b6f7ab151ad35769fbe02b21bebd.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-f245b6f7ab151ad35769fbe02b21bebd + +info: + name: > + WooCommerce PDF Invoices & Packing Slips <= 2.15.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9aeb996c-723a-402a-a0f8-4212391c64eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-fe9c9963c880e901919af258a30c3298.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-fe9c9963c880e901919af258a30c3298.yaml new file mode 100644 index 0000000000..951d1dec33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pdf-invoices-packing-slips-fe9c9963c880e901919af258a30c3298.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pdf-invoices-packing-slips-fe9c9963c880e901919af258a30c3298 + +info: + name: > + WooCommerce PDF Invoices & Packing Slips 2.14.0 - 3.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1cb99dc-31a7-4d0f-afee-ca8c04cee5fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pdf-invoices-packing-slips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.14.0', '<= 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pos-c5f695dbb7b3e9a0ae3b6a589e6824c0.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pos-c5f695dbb7b3e9a0ae3b6a589e6824c0.yaml new file mode 100644 index 0000000000..22f526089c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pos-c5f695dbb7b3e9a0ae3b6a589e6824c0.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pos-c5f695dbb7b3e9a0ae3b6a589e6824c0 + +info: + name: > + WooCommerce POS <= 1.4.11 - Insufficient Verification of Data Authenticity to Authenticated (Customer+) Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6b8ba69-aa8b-436f-990c-39e283f5d2f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pos/" + google-query: inurl:"/wp-content/plugins/woocommerce-pos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pos,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-0fc3c475af9db5468072b0d596ac658f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-0fc3c475af9db5468072b0d596ac658f.yaml new file mode 100644 index 0000000000..9b89db2b42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-0fc3c475af9db5468072b0d596ac658f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pre-orders-0fc3c475af9db5468072b0d596ac658f + +info: + name: > + WooCommerce Pre-Orders <= 2.0.2 - Cross-Site Request Forgery to Order Cancellation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14e6e06c-edc0-44ef-ba07-50fcfc4fd7b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pre-orders/" + google-query: inurl:"/wp-content/plugins/woocommerce-pre-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pre-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pre-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pre-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-32013e3714497eae530c018b20664f08.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-32013e3714497eae530c018b20664f08.yaml new file mode 100644 index 0000000000..9ec241c57e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-32013e3714497eae530c018b20664f08.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pre-orders-32013e3714497eae530c018b20664f08 + +info: + name: > + WooCommerce Pre-Orders <= 1.9.0 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b93f66ac-5c9b-483a-a7ad-0a404d3935e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pre-orders/" + google-query: inurl:"/wp-content/plugins/woocommerce-pre-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pre-orders,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pre-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pre-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-43b4713bd32261291b78f5d694cd58d4.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-43b4713bd32261291b78f5d694cd58d4.yaml new file mode 100644 index 0000000000..3ab6a62b64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-43b4713bd32261291b78f5d694cd58d4.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pre-orders-43b4713bd32261291b78f5d694cd58d4 + +info: + name: > + WooCommerce Pre-Orders <= 2.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f73d0a6-2eae-4d85-96ce-db5902bd6e3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pre-orders/" + google-query: inurl:"/wp-content/plugins/woocommerce-pre-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pre-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pre-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pre-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-7d14368de367a2adadf4a2871484c186.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-7d14368de367a2adadf4a2871484c186.yaml new file mode 100644 index 0000000000..6c6cc62757 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-7d14368de367a2adadf4a2871484c186.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pre-orders-7d14368de367a2adadf4a2871484c186 + +info: + name: > + WooCommerce Pre-Orders <= 2.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3915c2f-400d-433d-bbc8-4d88258123dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pre-orders/" + google-query: inurl:"/wp-content/plugins/woocommerce-pre-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pre-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pre-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pre-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-875dd3da0012185a61616213c415a5c6.yaml b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-875dd3da0012185a61616213c415a5c6.yaml new file mode 100644 index 0000000000..7da0a2fbb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-pre-orders-875dd3da0012185a61616213c415a5c6.yaml @@ -0,0 +1,58 @@ +id: woocommerce-pre-orders-875dd3da0012185a61616213c415a5c6 + +info: + name: > + WooCommerce Pre-Orders <= 2.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1436ca4-933b-426a-987d-c5cbbc29353b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-pre-orders/" + google-query: inurl:"/wp-content/plugins/woocommerce-pre-orders/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-pre-orders,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-pre-orders/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-pre-orders" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-8943f00b83bb9af4ef7c839b2bef305e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-8943f00b83bb9af4ef7c839b2bef305e.yaml new file mode 100644 index 0000000000..1fad2f8bbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-8943f00b83bb9af4ef7c839b2bef305e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-predictive-search-8943f00b83bb9af4ef7c839b2bef305e + +info: + name: > + WooCommerce Predictive Search <= 5.8.0 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ea2726a-a601-45ac-9f20-c34b82edf441?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-predictive-search/" + google-query: inurl:"/wp-content/plugins/woocommerce-predictive-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-predictive-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-predictive-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-predictive-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-eec24adc2af4f908f31797f26239353a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-eec24adc2af4f908f31797f26239353a.yaml new file mode 100644 index 0000000000..82f89e02fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-eec24adc2af4f908f31797f26239353a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-predictive-search-eec24adc2af4f908f31797f26239353a + +info: + name: > + WooCommerce Predictive Search <= 5.8.0 - Cross-Site Request Forgery via multiple AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc428f4b-fe82-419a-aee3-38f0bb582506?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-predictive-search/" + google-query: inurl:"/wp-content/plugins/woocommerce-predictive-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-predictive-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-predictive-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-predictive-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-f2d13e82f4916c94ee541da275776204.yaml b/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-f2d13e82f4916c94ee541da275776204.yaml new file mode 100644 index 0000000000..15bf0024f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-predictive-search-f2d13e82f4916c94ee541da275776204.yaml @@ -0,0 +1,58 @@ +id: woocommerce-predictive-search-f2d13e82f4916c94ee541da275776204 + +info: + name: > + Predictive Search for WooCommerce <= 1.0.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0c698e-a5c2-473c-8dfb-31745b7d7c38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-predictive-search/" + google-query: inurl:"/wp-content/plugins/woocommerce-predictive-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-predictive-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-predictive-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-predictive-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addon-16c0c6fbe1e44f95ba18add61d515572.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-16c0c6fbe1e44f95ba18add61d515572.yaml new file mode 100644 index 0000000000..bbbefd6389 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-16c0c6fbe1e44f95ba18add61d515572.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addon-16c0c6fbe1e44f95ba18add61d515572 + +info: + name: > + PPOM for WooCommerce <= 1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b0198c8-4be8-44e0-9728-d5d2aa376796?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addon/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addon-1f1d174c2e97694f79432cc5756f8ec3.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-1f1d174c2e97694f79432cc5756f8ec3.yaml new file mode 100644 index 0000000000..052beb7a5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-1f1d174c2e97694f79432cc5756f8ec3.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addon-1f1d174c2e97694f79432cc5756f8ec3 + +info: + name: > + Product Addons & Fields for WooCommerce <= 32.0.18 - Unauthenticated Arbitrary File Upload via ppom_upload_file + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f95bcc3-354e-4016-9a17-945569b076b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addon/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 32.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addon-3385cb8b008c9eac317535d656ebf7b2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-3385cb8b008c9eac317535d656ebf7b2.yaml new file mode 100644 index 0000000000..b9251c6f5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-3385cb8b008c9eac317535d656ebf7b2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addon-3385cb8b008c9eac317535d656ebf7b2 + +info: + name: > + PPOM for WooCommerce <= 18.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b84c0f8c-25a7-47c7-93cf-9b5060c07c72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addon/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addon-3e690c446445b36926062b98d511c3ea.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-3e690c446445b36926062b98d511c3ea.yaml new file mode 100644 index 0000000000..81ea1d8677 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-3e690c446445b36926062b98d511c3ea.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addon-3e690c446445b36926062b98d511c3ea + +info: + name: > + PPOM for WooCommerce <= 32.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d223de07-6377-491f-8d2c-9c31aa814792?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addon/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 32.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addon-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..06b0bb1ef8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addon-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addon/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 32.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addon-c42befeaabe8cc2f04b4d79fa9968af7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-c42befeaabe8cc2f04b4d79fa9968af7.yaml new file mode 100644 index 0000000000..7c8c4622d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-c42befeaabe8cc2f04b4d79fa9968af7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addon-c42befeaabe8cc2f04b4d79fa9968af7 + +info: + name: > + PPOM for WooCommerce <= 23.9 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bde357d-e34a-4931-a1a4-bd3ed3b72cec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addon/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 23.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addon-cad557e1501fb237a72952936969ee8d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-cad557e1501fb237a72952936969ee8d.yaml new file mode 100644 index 0000000000..43e90daf04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addon-cad557e1501fb237a72952936969ee8d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addon-cad557e1501fb237a72952936969ee8d + +info: + name: > + PPOM for WooCommerce <= 32.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f105002-a19a-4376-af65-7e9416175174?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addon/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 32.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addons-0250c115051a0a19911ae4becfbbb8c8.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addons-0250c115051a0a19911ae4becfbbb8c8.yaml new file mode 100644 index 0000000000..37f1650682 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addons-0250c115051a0a19911ae4becfbbb8c8.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addons-0250c115051a0a19911ae4becfbbb8c8 + +info: + name: > + WooCommerce Product Add-ons <= 6.1.3 - Authenticated (Shop Manager+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d77666b5-956d-420b-93ed-a15cdbfcced7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addons/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-addons-60ae0dd0a6141b106409f50a537c78fa.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-addons-60ae0dd0a6141b106409f50a537c78fa.yaml new file mode 100644 index 0000000000..c861526aba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-addons-60ae0dd0a6141b106409f50a537c78fa.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-addons-60ae0dd0a6141b106409f50a537c78fa + +info: + name: > + WooCommerce Product Add-ons <= 6.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5bd3852-c1a5-4d7d-b4fb-59911fba4873?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-addons/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-category-selection-widget-a51a38d55ed23a34d7d068afc04d5742.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-category-selection-widget-a51a38d55ed23a34d7d068afc04d5742.yaml new file mode 100644 index 0000000000..f0f1abade4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-category-selection-widget-a51a38d55ed23a34d7d068afc04d5742.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-category-selection-widget-a51a38d55ed23a34d7d068afc04d5742 + +info: + name: > + WooCommerce Product Categories Selection Widget <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f68c70b-9fde-43a6-8a7c-00938aa0e109?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-category-selection-widget/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-category-selection-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-category-selection-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-category-selection-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-category-selection-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-importer-370954cd310380bf196a7af5fabc1594.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-importer-370954cd310380bf196a7af5fabc1594.yaml new file mode 100644 index 0000000000..a42493b26f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-importer-370954cd310380bf196a7af5fabc1594.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-importer-370954cd310380bf196a7af5fabc1594 + +info: + name: > + WooCommerce – Product Importer <= 1.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8d44f9b-0eee-49ee-b640-40f3bd377be0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-importer/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-payments-ad492c1cfb90e87fe9d66d5cf28a0298.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-payments-ad492c1cfb90e87fe9d66d5cf28a0298.yaml new file mode 100644 index 0000000000..781bbd7780 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-payments-ad492c1cfb90e87fe9d66d5cf28a0298.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-payments-ad492c1cfb90e87fe9d66d5cf28a0298 + +info: + name: > + Payment gateway per Product for WooCommerce <= 3.2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/597786ce-58eb-4e96-a80e-bad3e75787fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-payments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8821623392 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-payments-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-payments-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-payments/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-payments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-payments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-payments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-payments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-recommendations-ad4e5ec7c446d0edde1fe1894b44d8fb.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-recommendations-ad4e5ec7c446d0edde1fe1894b44d8fb.yaml new file mode 100644 index 0000000000..3dc151db17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-recommendations-ad4e5ec7c446d0edde1fe1894b44d8fb.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-recommendations-ad4e5ec7c446d0edde1fe1894b44d8fb + +info: + name: > + WooCommerce Product Recommendations < 2.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/826fe5a8-3290-4f70-b9bb-8bd4aec3634c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-recommendations/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-recommendations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-recommendations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-recommendations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-recommendations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-sort-and-display-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-sort-and-display-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..bc8490ed2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-sort-and-display-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-sort-and-display-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-sort-and-display/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-sort-and-display/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-sort-and-display,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-sort-and-display/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-sort-and-display" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-sort-and-display-65c990e02c196c01529c8a603f8098c6.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-sort-and-display-65c990e02c196c01529c8a603f8098c6.yaml new file mode 100644 index 0000000000..8537b04b2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-sort-and-display-65c990e02c196c01529c8a603f8098c6.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-sort-and-display-65c990e02c196c01529c8a603f8098c6 + +info: + name: > + Product Sort and Display for WooCommerce <= 2.4.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8bd778b-1d56-4544-b2c3-a77a7ec05aa4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-sort-and-display/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-sort-and-display/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-sort-and-display,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-sort-and-display/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-sort-and-display" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-stock-alert-e39ea928bd894c6c2a483c3234cd1111.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-stock-alert-e39ea928bd894c6c2a483c3234cd1111.yaml new file mode 100644 index 0000000000..f39707dba7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-stock-alert-e39ea928bd894c6c2a483c3234cd1111.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-stock-alert-e39ea928bd894c6c2a483c3234cd1111 + +info: + name: > + WooCommerce Product Stock Alert <= 2.0.1 - Missing Authorization via API + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09bdfade-85d0-4922-a83a-3e213adfa4ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-stock-alert/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-stock-alert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-stock-alert,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-stock-alert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-stock-alert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-stock-alert-e8c2deda009bcec0877e0c00cb99051a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-stock-alert-e8c2deda009bcec0877e0c00cb99051a.yaml new file mode 100644 index 0000000000..43ba21c864 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-stock-alert-e8c2deda009bcec0877e0c00cb99051a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-stock-alert-e8c2deda009bcec0877e0c00cb99051a + +info: + name: > + WooCommerce Product Stock Alert <= 2.0.1 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91e1a199-f062-4555-ae7b-ed8732686303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-stock-alert/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-stock-alert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-stock-alert,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-stock-alert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-stock-alert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-2b07cb3c5e7b07e516cdc03a041ab509.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-2b07cb3c5e7b07e516cdc03a041ab509.yaml new file mode 100644 index 0000000000..98444d8e71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-2b07cb3c5e7b07e516cdc03a041ab509.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-2b07cb3c5e7b07e516cdc03a041ab509 + +info: + name: > + WooCommerce Products Vendor <= 2.1.65 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5c17dea-7b61-4e73-ac61-3fe536c22962?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-85987e7f67f649cd4fc002f1b0337124.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-85987e7f67f649cd4fc002f1b0337124.yaml new file mode 100644 index 0000000000..8e7e8515f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-85987e7f67f649cd4fc002f1b0337124.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-85987e7f67f649cd4fc002f1b0337124 + +info: + name: > + WooCommerce Product Vendors <= 2.2.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4457df6-81ca-4149-bcca-623cff2cbeef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-b89386d59e4ac2c68e4b5b1c7b8ceed1.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-b89386d59e4ac2c68e4b5b1c7b8ceed1.yaml new file mode 100644 index 0000000000..00bfa7ea17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-b89386d59e4ac2c68e4b5b1c7b8ceed1.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-b89386d59e4ac2c68e4b5b1c7b8ceed1 + +info: + name: > + WooCommerce Product Vendors <= 2.1.78 - Authenticated (Shop manager+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1388873f-8053-4ba9-8707-093bc0e8f2f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.78') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-c1ee2d06e4183c51b8ff1009cad4dc30.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-c1ee2d06e4183c51b8ff1009cad4dc30.yaml new file mode 100644 index 0000000000..fc6351affe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-c1ee2d06e4183c51b8ff1009cad4dc30.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-c1ee2d06e4183c51b8ff1009cad4dc30 + +info: + name: > + Product Vendors <= 2.0.35 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a224e745-f9c7-4ca6-b656-e94862b1dc57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-c7798079a12ba87e21be5abb7f463202.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-c7798079a12ba87e21be5abb7f463202.yaml new file mode 100644 index 0000000000..70947ff1d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-c7798079a12ba87e21be5abb7f463202.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-c7798079a12ba87e21be5abb7f463202 + +info: + name: > + WooCommerce Products Vendor <= 2.1.65 - Insecure Direct Object Reference to Note Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57465fce-e8ad-41ac-9dd6-e340ec314913?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.65') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-d7d028793891883b49da58d28555fdb8.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-d7d028793891883b49da58d28555fdb8.yaml new file mode 100644 index 0000000000..d6e32af4a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-d7d028793891883b49da58d28555fdb8.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-d7d028793891883b49da58d28555fdb8 + +info: + name: > + WooCommerce Products Vendor <= 2.1.68 - Insecure Direct Object Reference to Vendor Commission Percentage Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8b0bad8-7ee6-4c7c-95da-7adf37c9cb1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-d801fbca464a51e293e83c92692f388d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-d801fbca464a51e293e83c92692f388d.yaml new file mode 100644 index 0000000000..d988944af6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-d801fbca464a51e293e83c92692f388d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-d801fbca464a51e293e83c92692f388d + +info: + name: > + WooCommerce Product Vendors <= 2.1.76 - Authenticated (Vendor admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed8f8984-bea6-44aa-9bde-5b40b455767f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-de80de004725b03b45137b9eba24ca0e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-de80de004725b03b45137b9eba24ca0e.yaml new file mode 100644 index 0000000000..a792e3eecb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-de80de004725b03b45137b9eba24ca0e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-de80de004725b03b45137b9eba24ca0e + +info: + name: > + WooCommerce Product Vendors <= 2.1.76 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a93c0dd4-8341-438d-8730-470e9a230d97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-e78a0243a637937a0520333d07ecbb4e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-e78a0243a637937a0520333d07ecbb4e.yaml new file mode 100644 index 0000000000..65b0d3b6b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-product-vendors-e78a0243a637937a0520333d07ecbb4e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-product-vendors-e78a0243a637937a0520333d07ecbb4e + +info: + name: > + WooCommerce Product Vendors <= 2.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcce0a92-520d-45ac-845e-a1635f763eed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-product-vendors,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-designer-9d44943de528e08b2e8164cbb922f935.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-designer-9d44943de528e08b2e8164cbb922f935.yaml new file mode 100644 index 0000000000..83093de929 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-designer-9d44943de528e08b2e8164cbb922f935.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-designer-9d44943de528e08b2e8164cbb922f935 + +info: + name: > + Woocommerce Product Designer <= 4.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70d168a4-a659-4354-889e-7907215351a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-designer/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-designer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-designer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-designer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-designer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-0a19ecfdd9174c31fe37388d883b8078.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-0a19ecfdd9174c31fe37388d883b8078.yaml new file mode 100644 index 0000000000..cdfb0fdf61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-0a19ecfdd9174c31fe37388d883b8078.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-0a19ecfdd9174c31fe37388d883b8078 + +info: + name: > + HUSKY – Products Filter for WooCommerce Professional <= 1.3.1 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/518f23c3-f3e3-4cff-bd30-a8211f74c3ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-174314b50918543554df901d90f75335.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-174314b50918543554df901d90f75335.yaml new file mode 100644 index 0000000000..81ea6e0ffd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-174314b50918543554df901d90f75335.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-174314b50918543554df901d90f75335 + +info: + name: > + HUSKY – Products Filter for WooCommerce (formerly WOOF) <= 1.3.5.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86e3eae3-21bb-4695-8650-4c6ba6ababe3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-2662479a714ea06abb48b0b84a949600.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-2662479a714ea06abb48b0b84a949600.yaml new file mode 100644 index 0000000000..ee339a677b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-2662479a714ea06abb48b0b84a949600.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-2662479a714ea06abb48b0b84a949600 + +info: + name: > + HUSKY – Products Filter for WooCommerce (formerly WOOF) <= 1.3.4.2 - Unauthenticated SQL Injection via search terms + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b905b8ec-d13d-4455-9c5f-61aaa09d75ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-4d5b5eea5b0d303e259444505b764438.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-4d5b5eea5b0d303e259444505b764438.yaml new file mode 100644 index 0000000000..63285bbeed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-4d5b5eea5b0d303e259444505b764438.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-4d5b5eea5b0d303e259444505b764438 + +info: + name: > + HUSKY – Products Filter Professional for WooCommerce <= 1.3.5.2 - Authenticated (Admin+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a0a0395-c193-4686-ba97-73fdd40d3048?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-57308f16648d2cd63200f80e8b82615f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-57308f16648d2cd63200f80e8b82615f.yaml new file mode 100644 index 0000000000..37de555ab7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-57308f16648d2cd63200f80e8b82615f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-57308f16648d2cd63200f80e8b82615f + +info: + name: > + HUSKY – Products Filter for WooCommerce (formerly WOOF) <= 1.3.4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d9179d2-2e90-4de7-8178-073a0ce5865b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-745b890d4e4ab266ecb625f54f34190e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-745b890d4e4ab266ecb625f54f34190e.yaml new file mode 100644 index 0000000000..49da119701 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-745b890d4e4ab266ecb625f54f34190e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-745b890d4e4ab266ecb625f54f34190e + +info: + name: > + WOOF - Products Filter for WooCommerce <= 1.1.9 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e650516-49eb-4475-8faa-76ca123d531f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-b127fca718a0b357c2daf67816c8cec2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-b127fca718a0b357c2daf67816c8cec2.yaml new file mode 100644 index 0000000000..21db7a472f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-b127fca718a0b357c2daf67816c8cec2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-b127fca718a0b357c2daf67816c8cec2 + +info: + name: > + HUSKY – Products Filter for WooCommerce (formerly WOOF) <= 1.3.4.2 - Missing Authorization via woof_meta_get_keys() + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d00edaf1-2a97-4000-afd9-432ca8fa3df4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-d449c0063627e88ef77e8f2a6b150e88.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-d449c0063627e88ef77e8f2a6b150e88.yaml new file mode 100644 index 0000000000..63d85d01ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-d449c0063627e88ef77e8f2a6b150e88.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-d449c0063627e88ef77e8f2a6b150e88 + +info: + name: > + WOOF - Products Filter for WooCommerce <= 1.1.9 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9f4760c-a794-43e0-80a3-88b3f41810f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-d97caddab7bd05fd7de5182cc29d4629.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-d97caddab7bd05fd7de5182cc29d4629.yaml new file mode 100644 index 0000000000..69f4f1254e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-d97caddab7bd05fd7de5182cc29d4629.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-d97caddab7bd05fd7de5182cc29d4629 + +info: + name: > + HUSKY – Products Filter for WooCommerce Professional <= 1.3.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/748bc714-25ba-404e-ac3d-e588fd95b2f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-dbbbee37e25f2954b72ee20a77edf10c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-dbbbee37e25f2954b72ee20a77edf10c.yaml new file mode 100644 index 0000000000..9963d9216e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-dbbbee37e25f2954b72ee20a77edf10c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-dbbbee37e25f2954b72ee20a77edf10c + +info: + name: > + WOOF - Products Filter for WooCommerce <= 1.2.6.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d94c0775-3852-463f-b393-1a12e63548e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-f93c186c199b2993e134631be68ea0a1.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-f93c186c199b2993e134631be68ea0a1.yaml new file mode 100644 index 0000000000..bbeab60424 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-f93c186c199b2993e134631be68ea0a1.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-f93c186c199b2993e134631be68ea0a1 + +info: + name: > + HUSKY – Products Filter for WooCommerce (formerly WOOF) <= 1.3.5.2 - Authenticated (Subscriber+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fed4181-400b-4414-aa50-1e7bc92d542f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-filter-fc942581b6d806c7e158aaa084482451.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-fc942581b6d806c7e158aaa084482451.yaml new file mode 100644 index 0000000000..ebdd20006c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-filter-fc942581b6d806c7e158aaa084482451.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-filter-fc942581b6d806c7e158aaa084482451 + +info: + name: > + HUSKY – Products Filter for WooCommerce Professional <= 1.3.5.2 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fff8dfbc-fd59-47db-85bb-de2a7c6a9a5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-filter/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-quick-view-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-quick-view-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..a7cd4067a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-quick-view-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-quick-view-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-quick-view/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-quick-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-quick-view,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-quick-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-quick-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-quick-view-666b088d7e486f0731500dc6b44206fb.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-quick-view-666b088d7e486f0731500dc6b44206fb.yaml new file mode 100644 index 0000000000..bd8141acb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-quick-view-666b088d7e486f0731500dc6b44206fb.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-quick-view-666b088d7e486f0731500dc6b44206fb + +info: + name: > + Products Quick View for WooCommerce <= 2.2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39c9f055-2527-4678-bda1-27a29ab24acd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-quick-view/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-quick-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-quick-view,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-quick-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-quick-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-slider-333375d8287e28edefeeceeb32f12475.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-slider-333375d8287e28edefeeceeb32f12475.yaml new file mode 100644 index 0000000000..67ae694c75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-slider-333375d8287e28edefeeceeb32f12475.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-slider-333375d8287e28edefeeceeb32f12475 + +info: + name: > + PickPlugins Product Slider for WooCommerce <= 1.13.21 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f803e16-7f47-4696-927f-450aaa5fda5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-slider/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-products-slider-b143f95f119acbc330075f594bca9125.yaml b/nuclei-templates/cve-less/plugins/woocommerce-products-slider-b143f95f119acbc330075f594bca9125.yaml new file mode 100644 index 0000000000..49b1a6348c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-products-slider-b143f95f119acbc330075f594bca9125.yaml @@ -0,0 +1,58 @@ +id: woocommerce-products-slider-b143f95f119acbc330075f594bca9125 + +info: + name: > + PickPlugins Product Slider for WooCommerce <= 1.13.41 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43854ca5-02ba-4926-9a5e-d9fd5b1af448?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-products-slider/" + google-query: inurl:"/wp-content/plugins/woocommerce-products-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-products-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-products-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-products-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-putler-connector-0c5c03e535c02675bf0d5fbe19ae065d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-putler-connector-0c5c03e535c02675bf0d5fbe19ae065d.yaml new file mode 100644 index 0000000000..5f56d64378 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-putler-connector-0c5c03e535c02675bf0d5fbe19ae065d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-putler-connector-0c5c03e535c02675bf0d5fbe19ae065d + +info: + name: > + Putler Connector for WooCommerce <= 2.12.0 - Missing Authorization via 'putler_connector_sync_complete' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09a1388e-6c87-44cd-a137-4212b569423b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-putler-connector/" + google-query: inurl:"/wp-content/plugins/woocommerce-putler-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-putler-connector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-putler-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-putler-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-putler-connector-cb9adf9824210ad3d3e7d6f714b65556.yaml b/nuclei-templates/cve-less/plugins/woocommerce-putler-connector-cb9adf9824210ad3d3e7d6f714b65556.yaml new file mode 100644 index 0000000000..d03c2044fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-putler-connector-cb9adf9824210ad3d3e7d6f714b65556.yaml @@ -0,0 +1,58 @@ +id: woocommerce-putler-connector-cb9adf9824210ad3d3e7d6f714b65556 + +info: + name: > + Putler Connector for WooCommerce <= 2.12.0 - Missing Authorization via 'send_resync_request' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38537f60-52f4-4007-b26f-6948b9263931?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-putler-connector/" + google-query: inurl:"/wp-content/plugins/woocommerce-putler-connector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-putler-connector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-putler-connector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-putler-connector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-sendinblue-newsletter-subscription-a4d2edadf2ab61a5bc7487773709b53f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-sendinblue-newsletter-subscription-a4d2edadf2ab61a5bc7487773709b53f.yaml new file mode 100644 index 0000000000..0535ef7e53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-sendinblue-newsletter-subscription-a4d2edadf2ab61a5bc7487773709b53f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-sendinblue-newsletter-subscription-a4d2edadf2ab61a5bc7487773709b53f + +info: + name: > + Sendinblue for WooCommerce <= 4.0.17 - Authenticated (Editor+) Arbitrary File Download and Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a24378f-cf76-4937-99e5-a5fb2d206859?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-sendinblue-newsletter-subscription/" + google-query: inurl:"/wp-content/plugins/woocommerce-sendinblue-newsletter-subscription/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-sendinblue-newsletter-subscription,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-sendinblue-newsletter-subscription/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-sendinblue-newsletter-subscription" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-services-4f8b1165a8fd4674c47b694bb6769361.yaml b/nuclei-templates/cve-less/plugins/woocommerce-services-4f8b1165a8fd4674c47b694bb6769361.yaml new file mode 100644 index 0000000000..a894e66b5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-services-4f8b1165a8fd4674c47b694bb6769361.yaml @@ -0,0 +1,58 @@ +id: woocommerce-services-4f8b1165a8fd4674c47b694bb6769361 + +info: + name: > + WooCommerce Shipping & Tax <= 2.2.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57156ebc-2858-4295-ba08-57bcab6db229?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-services/" + google-query: inurl:"/wp-content/plugins/woocommerce-services/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-services,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-services/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-services" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-canada-post-38e07b44fffc0387d1db0b5b701e8767.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-canada-post-38e07b44fffc0387d1db0b5b701e8767.yaml new file mode 100644 index 0000000000..787e72320e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-canada-post-38e07b44fffc0387d1db0b5b701e8767.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-canada-post-38e07b44fffc0387d1db0b5b701e8767 + +info: + name: > + WooCommerce Canada Post Shipping <= 2.8.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff850f88-6e89-48dd-ad70-dda4018c22fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-canada-post/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-canada-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-canada-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-canada-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-canada-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-canada-post-df5510828b9908f177a3676bf0d29efa.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-canada-post-df5510828b9908f177a3676bf0d29efa.yaml new file mode 100644 index 0000000000..f8824f7d10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-canada-post-df5510828b9908f177a3676bf0d29efa.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-canada-post-df5510828b9908f177a3676bf0d29efa + +info: + name: > + WooCommerce Canada Post Shipping <= 2.8.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/549788e3-e31a-46a6-a2de-361747c98514?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-canada-post/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-canada-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-canada-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-canada-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-canada-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-gateway-per-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-gateway-per-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8475ba51db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-gateway-per-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-gateway-per-product-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-gateway-per-product/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-gateway-per-product/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-gateway-per-product,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-gateway-per-product/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-gateway-per-product" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-2fa400cde48ebbb1e062c53ea041ad86.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-2fa400cde48ebbb1e062c53ea041ad86.yaml new file mode 100644 index 0000000000..406b64d0e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-2fa400cde48ebbb1e062c53ea041ad86.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-multiple-addresses-2fa400cde48ebbb1e062c53ea041ad86 + +info: + name: > + WooCommerce Ship to Multiple Addresses <= 3.8.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63ab255f-e061-447b-a2b6-21a85eed9d57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-multiple-addresses/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-multiple-addresses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-multiple-addresses,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-multiple-addresses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-multiple-addresses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-a044d35c75736c87fd061116f4c5b4e5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-a044d35c75736c87fd061116f4c5b4e5.yaml new file mode 100644 index 0000000000..2d9e3e30c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-a044d35c75736c87fd061116f4c5b4e5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-multiple-addresses-a044d35c75736c87fd061116f4c5b4e5 + +info: + name: > + WooCommerce Ship to Multiple Addresses <= 3.8.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bda44801-6599-459d-a70c-164f563bf158?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-multiple-addresses/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-multiple-addresses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-multiple-addresses,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-multiple-addresses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-multiple-addresses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-c19f8aaf85e78b37bfb8827bc7a43d0f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-c19f8aaf85e78b37bfb8827bc7a43d0f.yaml new file mode 100644 index 0000000000..575fe57660 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-c19f8aaf85e78b37bfb8827bc7a43d0f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-multiple-addresses-c19f8aaf85e78b37bfb8827bc7a43d0f + +info: + name: > + WooCommerce Ship to Multiple Addresses <= 3.8.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b32c517-ef6b-4cc9-8316-6289676d8222?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-multiple-addresses/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-multiple-addresses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-multiple-addresses,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-multiple-addresses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-multiple-addresses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-d3e334361801ef90de8fcb6bd64767c5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-d3e334361801ef90de8fcb6bd64767c5.yaml new file mode 100644 index 0000000000..f15b95e26c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-d3e334361801ef90de8fcb6bd64767c5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-multiple-addresses-d3e334361801ef90de8fcb6bd64767c5 + +info: + name: > + WooCommerce Ship to Multiple Addresses <= 3.8.3 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/163328e9-2918-4bc0-8bbc-90d7e992754d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-multiple-addresses/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-multiple-addresses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-multiple-addresses,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-multiple-addresses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-multiple-addresses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-fd721cac9b419bce8f15888dfbaef077.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-fd721cac9b419bce8f15888dfbaef077.yaml new file mode 100644 index 0000000000..8ed65094fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-multiple-addresses-fd721cac9b419bce8f15888dfbaef077.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-multiple-addresses-fd721cac9b419bce8f15888dfbaef077 + +info: + name: > + WooCommerce Ship to Multiple Addresses <= 3.8.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ac43ba-cc49-4688-9efa-585551f3c40c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-multiple-addresses/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-multiple-addresses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-multiple-addresses,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-multiple-addresses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-multiple-addresses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-shipping-per-product-40b2ce035ef569465fd6e4b21f17410c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-shipping-per-product-40b2ce035ef569465fd6e4b21f17410c.yaml new file mode 100644 index 0000000000..1460766dfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-shipping-per-product-40b2ce035ef569465fd6e4b21f17410c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-shipping-per-product-40b2ce035ef569465fd6e4b21f17410c + +info: + name: > + WooCommerce Shipping Per Product <= 2.5.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b0504f3-f8df-4b37-bafa-5320920e9571?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-shipping-per-product/" + google-query: inurl:"/wp-content/plugins/woocommerce-shipping-per-product/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-shipping-per-product,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-shipping-per-product/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-shipping-per-product" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-simple-registration-806f7834f371ee46a5b9d44d9bbedb5e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-simple-registration-806f7834f371ee46a5b9d44d9bbedb5e.yaml new file mode 100644 index 0000000000..10018e569a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-simple-registration-806f7834f371ee46a5b9d44d9bbedb5e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-simple-registration-806f7834f371ee46a5b9d44d9bbedb5e + +info: + name: > + Simple Registration for WooCommerce <= 1.5.6 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80178b72-56ff-448f-a558-de0b63198e44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-simple-registration/" + google-query: inurl:"/wp-content/plugins/woocommerce-simple-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-simple-registration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-simple-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-simple-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-smart-coupons-57a83ff4d8f574921eb2f0df37539660.yaml b/nuclei-templates/cve-less/plugins/woocommerce-smart-coupons-57a83ff4d8f574921eb2f0df37539660.yaml new file mode 100644 index 0000000000..da8769c5eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-smart-coupons-57a83ff4d8f574921eb2f0df37539660.yaml @@ -0,0 +1,58 @@ +id: woocommerce-smart-coupons-57a83ff4d8f574921eb2f0df37539660 + +info: + name: > + WooCommerce Smart Coupons <= 4.6.0 - Unauthenticated Coupon Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eeeb03f7-5f78-4462-b0b4-5080bbc419a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-smart-coupons/" + google-query: inurl:"/wp-content/plugins/woocommerce-smart-coupons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-smart-coupons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-smart-coupons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-smart-coupons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-social-media-share-buttons-3cf6e0cef1945cb6c17b1720f47371b0.yaml b/nuclei-templates/cve-less/plugins/woocommerce-social-media-share-buttons-3cf6e0cef1945cb6c17b1720f47371b0.yaml new file mode 100644 index 0000000000..f6723d48a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-social-media-share-buttons-3cf6e0cef1945cb6c17b1720f47371b0.yaml @@ -0,0 +1,58 @@ +id: woocommerce-social-media-share-buttons-3cf6e0cef1945cb6c17b1720f47371b0 + +info: + name: > + Woocommerce Social Media Share Buttons <= 1.3.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5c96063-a6ac-4325-9f44-a6f8344e00ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-social-media-share-buttons/" + google-query: inurl:"/wp-content/plugins/woocommerce-social-media-share-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-social-media-share-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-social-media-share-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-social-media-share-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-square-249dbfd7183b6684ad412dc7f00e598b.yaml b/nuclei-templates/cve-less/plugins/woocommerce-square-249dbfd7183b6684ad412dc7f00e598b.yaml new file mode 100644 index 0000000000..412fb15839 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-square-249dbfd7183b6684ad412dc7f00e598b.yaml @@ -0,0 +1,58 @@ +id: woocommerce-square-249dbfd7183b6684ad412dc7f00e598b + +info: + name: > + WooCommerce Square <= 3.8.1 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0660d753-177e-419a-9e81-3ee2d08cfbc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-square/" + google-query: inurl:"/wp-content/plugins/woocommerce-square/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-square,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-square/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-square" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-738d94ad59cff1e1ce944d9227e0e807.yaml b/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-738d94ad59cff1e1ce944d9227e0e807.yaml new file mode 100644 index 0000000000..fbd9f12b86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-738d94ad59cff1e1ce944d9227e0e807.yaml @@ -0,0 +1,58 @@ +id: woocommerce-stock-manager-738d94ad59cff1e1ce944d9227e0e807 + +info: + name: > + WooCommerce Stock Manager < 1.0.9 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ae70225-3597-463b-907c-d2a3a7bcecb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-stock-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-stock-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-stock-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-stock-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-stock-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-814789c90e4385b5926fdbf0791f6c8c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-814789c90e4385b5926fdbf0791f6c8c.yaml new file mode 100644 index 0000000000..a02234329b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-814789c90e4385b5926fdbf0791f6c8c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-stock-manager-814789c90e4385b5926fdbf0791f6c8c + +info: + name: > + Stock Manager for WooCommerce <= 2.10.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99984fff-94e3-46fb-8241-88fcda556054?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-stock-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-stock-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-stock-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-stock-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-stock-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-febc39f061d4ea440e6c2d9bf3acdb4c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-febc39f061d4ea440e6c2d9bf3acdb4c.yaml new file mode 100644 index 0000000000..b37fab2f30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-stock-manager-febc39f061d4ea440e6c2d9bf3acdb4c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-stock-manager-febc39f061d4ea440e6c2d9bf3acdb4c + +info: + name: > + WooCommerce Stock Manager <= 2.5.7 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376f2fbf-98a4-49d9-bd22-40da5d37b62d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-stock-manager/" + google-query: inurl:"/wp-content/plugins/woocommerce-stock-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-stock-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-stock-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-stock-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-22e18aac0c8974a11f388cc18919e7ec.yaml b/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-22e18aac0c8974a11f388cc18919e7ec.yaml new file mode 100644 index 0000000000..870d5f2510 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-22e18aac0c8974a11f388cc18919e7ec.yaml @@ -0,0 +1,58 @@ +id: woocommerce-store-toolkit-22e18aac0c8974a11f388cc18919e7ec + +info: + name: > + Store Toolkit for WooCommerce <= 2.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a769f8a-c1c1-4be1-b7ae-e1cb6eeda28c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-store-toolkit/" + google-query: inurl:"/wp-content/plugins/woocommerce-store-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-store-toolkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-store-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-store-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-6604e9811397b340324d84776057ca87.yaml b/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-6604e9811397b340324d84776057ca87.yaml new file mode 100644 index 0000000000..e61d1dcc93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-6604e9811397b340324d84776057ca87.yaml @@ -0,0 +1,58 @@ +id: woocommerce-store-toolkit-6604e9811397b340324d84776057ca87 + +info: + name: > + Store Toolkit for WooCommerce <= 1.5.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbd4a482-7176-446f-804d-e0cd0764a2cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-store-toolkit/" + google-query: inurl:"/wp-content/plugins/woocommerce-store-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-store-toolkit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-store-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-store-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-a07726826b94a32080195c3e79a97baf.yaml b/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-a07726826b94a32080195c3e79a97baf.yaml new file mode 100644 index 0000000000..eaf9ce4618 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-a07726826b94a32080195c3e79a97baf.yaml @@ -0,0 +1,58 @@ +id: woocommerce-store-toolkit-a07726826b94a32080195c3e79a97baf + +info: + name: > + Store Toolkit for WooCommerce <= 1.5.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26399541-a6a7-4c01-b72c-1ebf73f18c84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-store-toolkit/" + google-query: inurl:"/wp-content/plugins/woocommerce-store-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-store-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-store-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-store-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..435b3d7cc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-store-toolkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-store-toolkit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-store-toolkit/" + google-query: inurl:"/wp-content/plugins/woocommerce-store-toolkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-store-toolkit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-store-toolkit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-store-toolkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-38d794189585526f4580cbcbd32cd51a.yaml b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-38d794189585526f4580cbcbd32cd51a.yaml new file mode 100644 index 0000000000..88b16a2cec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-38d794189585526f4580cbcbd32cd51a.yaml @@ -0,0 +1,58 @@ +id: woocommerce-subscriptions-38d794189585526f4580cbcbd32cd51a + +info: + name: > + WooCommerce Subscriptions <= 3.0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbc98f55-a8f9-4234-84aa-df38302bf0b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-subscriptions/" + google-query: inurl:"/wp-content/plugins/woocommerce-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-subscriptions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-5d14f17d0a9567bc2e5e172cd96c2e2f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-5d14f17d0a9567bc2e5e172cd96c2e2f.yaml new file mode 100644 index 0000000000..27db75145c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-5d14f17d0a9567bc2e5e172cd96c2e2f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-subscriptions-5d14f17d0a9567bc2e5e172cd96c2e2f + +info: + name: > + WooCommerce Subscriptions < 5.8.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c01e3a86-8a2a-4200-b328-fb71afb2b196?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-subscriptions/" + google-query: inurl:"/wp-content/plugins/woocommerce-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-subscriptions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-825cedb504a9d0b999d8eff2bf66435d.yaml b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-825cedb504a9d0b999d8eff2bf66435d.yaml new file mode 100644 index 0000000000..2bac0d113d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-825cedb504a9d0b999d8eff2bf66435d.yaml @@ -0,0 +1,58 @@ +id: woocommerce-subscriptions-825cedb504a9d0b999d8eff2bf66435d + +info: + name: > + WooCommerce Subscription < 4.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08a98c08-cddc-4bc3-bc07-15d084070abd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-subscriptions/" + google-query: inurl:"/wp-content/plugins/woocommerce-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-subscriptions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-c710e29aeb4a754ea209ddfa89b2e510.yaml b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-c710e29aeb4a754ea209ddfa89b2e510.yaml new file mode 100644 index 0000000000..d915b00f4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-c710e29aeb4a754ea209ddfa89b2e510.yaml @@ -0,0 +1,58 @@ +id: woocommerce-subscriptions-c710e29aeb4a754ea209ddfa89b2e510 + +info: + name: > + WooCommerce Subscriptions <= 5.1.2 - Missing Authorization to Insecure Direct Object Reference + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a45a6b3d-49e1-4e25-aa66-15b396da8986?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-subscriptions/" + google-query: inurl:"/wp-content/plugins/woocommerce-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-subscriptions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-f9c4b5a4e9087a30d794272cce966354.yaml b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-f9c4b5a4e9087a30d794272cce966354.yaml new file mode 100644 index 0000000000..12de7f8801 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-subscriptions-f9c4b5a4e9087a30d794272cce966354.yaml @@ -0,0 +1,58 @@ +id: woocommerce-subscriptions-f9c4b5a4e9087a30d794272cce966354 + +info: + name: > + WooCommerce Subscriptions < 2.6.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a71fda4-3c67-4053-ac1e-9cf3f5feb8c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-subscriptions/" + google-query: inurl:"/wp-content/plugins/woocommerce-subscriptions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-subscriptions,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-subscriptions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-subscriptions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-superfaktura-c713f885667125d83707da22fe966bb2.yaml b/nuclei-templates/cve-less/plugins/woocommerce-superfaktura-c713f885667125d83707da22fe966bb2.yaml new file mode 100644 index 0000000000..7be9dc4813 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-superfaktura-c713f885667125d83707da22fe966bb2.yaml @@ -0,0 +1,58 @@ +id: woocommerce-superfaktura-c713f885667125d83707da22fe966bb2 + +info: + name: > + SuperFaktura WooCommerce <= 1.40.3 - Authenticated (Subscriber+) Blind Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/520598d7-863f-4bf3-ba74-fa9b2cc32767?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-superfaktura/" + google-query: inurl:"/wp-content/plugins/woocommerce-superfaktura/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-superfaktura,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-superfaktura/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-superfaktura" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.40.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-upcoming-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-upcoming-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8dbbc7b740 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-upcoming-product-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-upcoming-product-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-upcoming-product/" + google-query: inurl:"/wp-content/plugins/woocommerce-upcoming-product/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-upcoming-product,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-upcoming-product/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-upcoming-product" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-upload-files-82ad20df19b26c5e50cfbeea380e1cf4.yaml b/nuclei-templates/cve-less/plugins/woocommerce-upload-files-82ad20df19b26c5e50cfbeea380e1cf4.yaml new file mode 100644 index 0000000000..0c46597a88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-upload-files-82ad20df19b26c5e50cfbeea380e1cf4.yaml @@ -0,0 +1,58 @@ +id: woocommerce-upload-files-82ad20df19b26c5e50cfbeea380e1cf4 + +info: + name: > + WooCommerce Upload Files <= 59.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e353a269-c7f5-4b6a-9f9e-be459ead0335?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-upload-files/" + google-query: inurl:"/wp-content/plugins/woocommerce-upload-files/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-upload-files,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-upload-files/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-upload-files" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 59.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-warranties-and-returns-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/woocommerce-warranties-and-returns-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..c9b34555bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-warranties-and-returns-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: woocommerce-warranties-and-returns-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-warranties-and-returns/" + google-query: inurl:"/wp-content/plugins/woocommerce-warranties-and-returns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-warranties-and-returns,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-warranties-and-returns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-warranties-and-returns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-warranty-17db65035566800d21b599e4302d577c.yaml b/nuclei-templates/cve-less/plugins/woocommerce-warranty-17db65035566800d21b599e4302d577c.yaml new file mode 100644 index 0000000000..2394f552a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-warranty-17db65035566800d21b599e4302d577c.yaml @@ -0,0 +1,58 @@ +id: woocommerce-warranty-17db65035566800d21b599e4302d577c + +info: + name: > + WooCommerce Warranty Requests <= 2.2.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8970d08-6c75-4dbb-ad24-6d9ba4c07530?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-warranty/" + google-query: inurl:"/wp-content/plugins/woocommerce-warranty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-warranty,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-warranty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-warranty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-warranty-90191aff4f4fd94ead6048a6f9309bb7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-warranty-90191aff4f4fd94ead6048a6f9309bb7.yaml new file mode 100644 index 0000000000..08c6385426 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-warranty-90191aff4f4fd94ead6048a6f9309bb7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-warranty-90191aff4f4fd94ead6048a6f9309bb7 + +info: + name: > + WooCommerce Warranty Requests <= 2.2.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03e96aea-30a2-4cd3-8967-52e1870cc293?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-warranty/" + google-query: inurl:"/wp-content/plugins/woocommerce-warranty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-warranty,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-warranty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-warranty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-warranty-ac9e437a3a3be183da02189f782c1fad.yaml b/nuclei-templates/cve-less/plugins/woocommerce-warranty-ac9e437a3a3be183da02189f782c1fad.yaml new file mode 100644 index 0000000000..dd59730d9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-warranty-ac9e437a3a3be183da02189f782c1fad.yaml @@ -0,0 +1,58 @@ +id: woocommerce-warranty-ac9e437a3a3be183da02189f782c1fad + +info: + name: > + WooCommerce Warranty Requests <= 2.1.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59b09f36-79e8-4f14-b970-a7994d193782?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-warranty/" + google-query: inurl:"/wp-content/plugins/woocommerce-warranty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-warranty,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-warranty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-warranty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-warranty-d1c23493ccad67b72beabba59496692f.yaml b/nuclei-templates/cve-less/plugins/woocommerce-warranty-d1c23493ccad67b72beabba59496692f.yaml new file mode 100644 index 0000000000..de47e93d2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-warranty-d1c23493ccad67b72beabba59496692f.yaml @@ -0,0 +1,58 @@ +id: woocommerce-warranty-d1c23493ccad67b72beabba59496692f + +info: + name: > + WooCommerce Warranty Requests <= 2.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1665fda6-005d-42ba-883d-2e3ad7abe0ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-warranty/" + google-query: inurl:"/wp-content/plugins/woocommerce-warranty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-warranty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-warranty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-warranty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-6d6e0436ccffe0043617b48128024cf4.yaml b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-6d6e0436ccffe0043617b48128024cf4.yaml new file mode 100644 index 0000000000..0065fa4ac7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-6d6e0436ccffe0043617b48128024cf4.yaml @@ -0,0 +1,58 @@ +id: woocommerce-wholesale-prices-6d6e0436ccffe0043617b48128024cf4 + +info: + name: > + Wholesale Suite <= 2.1.5 - Authenticated (Subscriber+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/972fba75-8230-4991-a697-34ab850ddee5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-wholesale-prices/" + google-query: inurl:"/wp-content/plugins/woocommerce-wholesale-prices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-wholesale-prices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-wholesale-prices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-wholesale-prices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-ea695aba033f5eaa6e1bbebc4ad1cb3b.yaml b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-ea695aba033f5eaa6e1bbebc4ad1cb3b.yaml new file mode 100644 index 0000000000..1f099554d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-ea695aba033f5eaa6e1bbebc4ad1cb3b.yaml @@ -0,0 +1,58 @@ +id: woocommerce-wholesale-prices-ea695aba033f5eaa6e1bbebc4ad1cb3b + +info: + name: > + Wholesale Suite <= 2.1.5 - Missing Authorization to Plugin Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f713f2f8-545a-4f54-a028-8422c0942a63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-wholesale-prices/" + google-query: inurl:"/wp-content/plugins/woocommerce-wholesale-prices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-wholesale-prices,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-wholesale-prices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-wholesale-prices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-f863836bfdeb95471721235ad3d4953e.yaml b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-f863836bfdeb95471721235ad3d4953e.yaml new file mode 100644 index 0000000000..50dccff33e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-prices-f863836bfdeb95471721235ad3d4953e.yaml @@ -0,0 +1,58 @@ +id: woocommerce-wholesale-prices-f863836bfdeb95471721235ad3d4953e + +info: + name: > + Wholesale Suite <= 2.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7372314-fff1-42c4-99b6-10d7541d1a29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-wholesale-prices/" + google-query: inurl:"/wp-content/plugins/woocommerce-wholesale-prices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-wholesale-prices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-wholesale-prices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-wholesale-prices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-wholesale-pricing-a0de754d48741e450291ec842fdf7fcc.yaml b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-pricing-a0de754d48741e450291ec842fdf7fcc.yaml new file mode 100644 index 0000000000..3f325ccb6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-pricing-a0de754d48741e450291ec842fdf7fcc.yaml @@ -0,0 +1,58 @@ +id: woocommerce-wholesale-pricing-a0de754d48741e450291ec842fdf7fcc + +info: + name: > + Wholesale For WooCommerce <= 2.3.0 - Unauthenticated Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1c208e-ae4a-40fb-9495-5268e5e929e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-wholesale-pricing/" + google-query: inurl:"/wp-content/plugins/woocommerce-wholesale-pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-wholesale-pricing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-wholesale-pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-wholesale-pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-wholesale-pricing-f5210926c29e7df2401ce419d82b4fb7.yaml b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-pricing-f5210926c29e7df2401ce419d82b4fb7.yaml new file mode 100644 index 0000000000..d154bc2d4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-wholesale-pricing-f5210926c29e7df2401ce419d82b4fb7.yaml @@ -0,0 +1,58 @@ +id: woocommerce-wholesale-pricing-f5210926c29e7df2401ce419d82b4fb7 + +info: + name: > + Wholesale For WooCommerce <= 2.3.0 - Unauthenticated Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f734db8-216e-43f3-8082-ebdcc28d3606?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-wholesale-pricing/" + google-query: inurl:"/wp-content/plugins/woocommerce-wholesale-pricing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-wholesale-pricing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-wholesale-pricing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-wholesale-pricing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocommerce-woocart-popup-lite-90a621b8b64ebeedf4e6b4f1f9506dab.yaml b/nuclei-templates/cve-less/plugins/woocommerce-woocart-popup-lite-90a621b8b64ebeedf4e6b4f1f9506dab.yaml new file mode 100644 index 0000000000..8d90828442 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocommerce-woocart-popup-lite-90a621b8b64ebeedf4e6b4f1f9506dab.yaml @@ -0,0 +1,58 @@ +id: woocommerce-woocart-popup-lite-90a621b8b64ebeedf4e6b4f1f9506dab + +info: + name: > + Popup Cart Lite for WooCommerce <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05cac571-6689-4a69-b600-3cfeaa1d3c47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocommerce-woocart-popup-lite/" + google-query: inurl:"/wp-content/plugins/woocommerce-woocart-popup-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocommerce-woocart-popup-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocommerce-woocart-popup-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocommerce-woocart-popup-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woocustomizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woocustomizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5fcbd2b5e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woocustomizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woocustomizer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woocustomizer/" + google-query: inurl:"/wp-content/plugins/woocustomizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woocustomizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woocustomizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woocustomizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woodiscuz-woocommerce-comments-11d5ca6aae21b29aac64f7355ab7d838.yaml b/nuclei-templates/cve-less/plugins/woodiscuz-woocommerce-comments-11d5ca6aae21b29aac64f7355ab7d838.yaml new file mode 100644 index 0000000000..dd51d6583e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woodiscuz-woocommerce-comments-11d5ca6aae21b29aac64f7355ab7d838.yaml @@ -0,0 +1,58 @@ +id: woodiscuz-woocommerce-comments-11d5ca6aae21b29aac64f7355ab7d838 + +info: + name: > + WooDiscuz – WooCommerce Comments <= 2.2.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01bd8a24-5580-4b16-94b3-c231d5fe7a01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woodiscuz-woocommerce-comments/" + google-query: inurl:"/wp-content/plugins/woodiscuz-woocommerce-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woodiscuz-woocommerce-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woodiscuz-woocommerce-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodiscuz-woocommerce-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woodiscuz-woocommerce-comments-1dbd0f5d4eba498d79dffc911453625c.yaml b/nuclei-templates/cve-less/plugins/woodiscuz-woocommerce-comments-1dbd0f5d4eba498d79dffc911453625c.yaml new file mode 100644 index 0000000000..0f3c1d4f23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woodiscuz-woocommerce-comments-1dbd0f5d4eba498d79dffc911453625c.yaml @@ -0,0 +1,58 @@ +id: woodiscuz-woocommerce-comments-1dbd0f5d4eba498d79dffc911453625c + +info: + name: > + WooDiscuz – WooCommerce Comments <= 2.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0bfa461-5cea-40e8-af9f-800cdbb6efb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woodiscuz-woocommerce-comments/" + google-query: inurl:"/wp-content/plugins/woodiscuz-woocommerce-comments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woodiscuz-woocommerce-comments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woodiscuz-woocommerce-comments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodiscuz-woocommerce-comments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woodmart-core-32a5c2fd9daa910750906c2719426827.yaml b/nuclei-templates/cve-less/plugins/woodmart-core-32a5c2fd9daa910750906c2719426827.yaml new file mode 100644 index 0000000000..2d346cabb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woodmart-core-32a5c2fd9daa910750906c2719426827.yaml @@ -0,0 +1,58 @@ +id: woodmart-core-32a5c2fd9daa910750906c2719426827 + +info: + name: > + Woodmart Core <= 1.0.36 - Authentication Bypass to Privilege Escalation + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60f043e9-7947-4fff-a9a8-94a1f421db7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woodmart-core/" + google-query: inurl:"/wp-content/plugins/woodmart-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woodmart-core,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woodmart-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodmart-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woodmart-core-e297cccd68c340cc70a93b54e4b06686.yaml b/nuclei-templates/cve-less/plugins/woodmart-core-e297cccd68c340cc70a93b54e4b06686.yaml new file mode 100644 index 0000000000..79adc9378c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woodmart-core-e297cccd68c340cc70a93b54e4b06686.yaml @@ -0,0 +1,58 @@ +id: woodmart-core-e297cccd68c340cc70a93b54e4b06686 + +info: + name: > + Woodmart Core <= 1.0.36 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef79e5a8-8bac-42b3-a064-6eea597701c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woodmart-core/" + google-query: inurl:"/wp-content/plugins/woodmart-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woodmart-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woodmart-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodmart-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wooemailreport-b8484e4bbe43b173d4b67998a26e2ce3.yaml b/nuclei-templates/cve-less/plugins/wooemailreport-b8484e4bbe43b173d4b67998a26e2ce3.yaml new file mode 100644 index 0000000000..a1e37b7a09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wooemailreport-b8484e4bbe43b173d4b67998a26e2ce3.yaml @@ -0,0 +1,58 @@ +id: wooemailreport-b8484e4bbe43b173d4b67998a26e2ce3 + +info: + name: > + Woocommerce Email Report <= 2.4 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abdbee50-b8c3-4254-a828-37629a798c92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wooemailreport/" + google-query: inurl:"/wp-content/plugins/wooemailreport/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wooemailreport,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wooemailreport/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wooemailreport" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wooframework-branding-1cab07c4811f7b84831ca9fc37bca8af.yaml b/nuclei-templates/cve-less/plugins/wooframework-branding-1cab07c4811f7b84831ca9fc37bca8af.yaml new file mode 100644 index 0000000000..364e764efd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wooframework-branding-1cab07c4811f7b84831ca9fc37bca8af.yaml @@ -0,0 +1,58 @@ +id: wooframework-branding-1cab07c4811f7b84831ca9fc37bca8af + +info: + name: > + WooFramework Branding <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/930d8c9e-4af0-49f0-adcc-246800e71284?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wooframework-branding/" + google-query: inurl:"/wp-content/plugins/wooframework-branding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wooframework-branding,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wooframework-branding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wooframework-branding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wooframework-tweaks-9657eccbcacadfd84a104020a1ba720f.yaml b/nuclei-templates/cve-less/plugins/wooframework-tweaks-9657eccbcacadfd84a104020a1ba720f.yaml new file mode 100644 index 0000000000..74c65c2939 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wooframework-tweaks-9657eccbcacadfd84a104020a1ba720f.yaml @@ -0,0 +1,58 @@ +id: wooframework-tweaks-9657eccbcacadfd84a104020a1ba720f + +info: + name: > + WooFramework Tweaks <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d8056cb-58e5-468b-9316-c862c6d8c930?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wooframework-tweaks/" + google-query: inurl:"/wp-content/plugins/wooframework-tweaks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wooframework-tweaks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wooframework-tweaks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wooframework-tweaks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-211b4e2e29da3a6c7a3f6f46fc11c764.yaml b/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-211b4e2e29da3a6c7a3f6f46fc11c764.yaml new file mode 100644 index 0000000000..bf0ca8b0e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-211b4e2e29da3a6c7a3f6f46fc11c764.yaml @@ -0,0 +1,58 @@ +id: woofunnels-aero-checkout-211b4e2e29da3a6c7a3f6f46fc11c764 + +info: + name: > + FunnelKit Checkout <= 3.10.3 - Authenticated(Subscriber+) Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f789ff9-5d86-4911-8b2f-2a425393c61d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woofunnels-aero-checkout/" + google-query: inurl:"/wp-content/plugins/woofunnels-aero-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woofunnels-aero-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woofunnels-aero-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woofunnels-aero-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-3553b5d538c18918d9dc4a1b5515d805.yaml b/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-3553b5d538c18918d9dc4a1b5515d805.yaml new file mode 100644 index 0000000000..108d93bcf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-3553b5d538c18918d9dc4a1b5515d805.yaml @@ -0,0 +1,58 @@ +id: woofunnels-aero-checkout-3553b5d538c18918d9dc4a1b5515d805 + +info: + name: > + FunnelKit Checkout <= 3.10.3 - Unauthenticated Arbitrary Content Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9d07faf-cc88-4233-a552-55e3376a2fc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woofunnels-aero-checkout/" + google-query: inurl:"/wp-content/plugins/woofunnels-aero-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woofunnels-aero-checkout,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woofunnels-aero-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woofunnels-aero-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-a3e402dfd0b7363889b8931013656dea.yaml b/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-a3e402dfd0b7363889b8931013656dea.yaml new file mode 100644 index 0000000000..c2f2e38e89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woofunnels-aero-checkout-a3e402dfd0b7363889b8931013656dea.yaml @@ -0,0 +1,58 @@ +id: woofunnels-aero-checkout-a3e402dfd0b7363889b8931013656dea + +info: + name: > + FunnelKit Checkout <= 3.10.3 - Authenticated(Subscriber+) Missing Authorization to Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9603e394-b358-4599-8610-ef5737a39de0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woofunnels-aero-checkout/" + google-query: inurl:"/wp-content/plugins/woofunnels-aero-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woofunnels-aero-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woofunnels-aero-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woofunnels-aero-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-00621ef6c76184f88ccca1414d74fac7.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-00621ef6c76184f88ccca1414d74fac7.yaml new file mode 100644 index 0000000000..680530fa44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-00621ef6c76184f88ccca1414d74fac7.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-00621ef6c76184f88ccca1414d74fac7 + +info: + name: > + ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) <= 2.8.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via WL Universal Product Layout + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27b8e0c0-fb0b-4d36-abc4-3e66ec7b5195?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-092f1fde35361407c0c7db51482b885d.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-092f1fde35361407c0c7db51482b885d.yaml new file mode 100644 index 0000000000..fd4f4d4446 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-092f1fde35361407c0c7db51482b885d.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-092f1fde35361407c0c7db51482b885d + +info: + name: > + ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) <= 2.8.7 - Authenticated (contributor+) Stored Cross-Site Scripting via _id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/563d44cd-5f5a-4914-8312-c554085b0821?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-0affc1d09cec859aeeea9abdfeb1c7b6.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-0affc1d09cec859aeeea9abdfeb1c7b6.yaml new file mode 100644 index 0000000000..0239d9f003 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-0affc1d09cec859aeeea9abdfeb1c7b6.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-0affc1d09cec859aeeea9abdfeb1c7b6 + +info: + name: > + ShopLentor <= 2.8.1 - Improper Authorization via woolentor_template_store + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/860c2339-b2a9-4a4e-a186-07a5fb042b06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-2f369022c90ab11184f498c7e18175e1.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-2f369022c90ab11184f498c7e18175e1.yaml new file mode 100644 index 0000000000..b2e97f5321 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-2f369022c90ab11184f498c7e18175e1.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-2f369022c90ab11184f498c7e18175e1 + +info: + name: > + WooLentor <= 2.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c101b69d-02c2-4075-8de7-0988ba3c74cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-7c425cf580174869d5b1f033a9941ff6.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-7c425cf580174869d5b1f033a9941ff6.yaml new file mode 100644 index 0000000000..5d875f1da4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-7c425cf580174869d5b1f033a9941ff6.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-7c425cf580174869d5b1f033a9941ff6 + +info: + name: > + WooLentor <= 2.6.2 - Cross-Site Request Forgery via process_data + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c068079-0857-4116-8edb-1bc2fea3c6b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-925ecf8dc9bb2b2baefb9be7dfe4e0e0.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-925ecf8dc9bb2b2baefb9be7dfe4e0e0.yaml new file mode 100644 index 0000000000..59559f99f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-925ecf8dc9bb2b2baefb9be7dfe4e0e0.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-925ecf8dc9bb2b2baefb9be7dfe4e0e0 + +info: + name: > + ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) <= 2.8.4 - Authenticated (Contributor+) Stored Cross-site Scripting via QR Code Widget + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8e64525-6080-40f3-a296-389b800a5e8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-9d840efd84947ddae0da773e8bea6c66.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-9d840efd84947ddae0da773e8bea6c66.yaml new file mode 100644 index 0000000000..ace3c548d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-9d840efd84947ddae0da773e8bea6c66.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-9d840efd84947ddae0da773e8bea6c66 + +info: + name: > + ShopLentor <= 2.8.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via Banner Link + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32b70801-d80f-40dc-8321-e12ac0b8c695?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-a09c2c9abc79ca137e522820700cc3d7.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-a09c2c9abc79ca137e522820700cc3d7.yaml new file mode 100644 index 0000000000..3811a2ca51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-a09c2c9abc79ca137e522820700cc3d7.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-a09c2c9abc79ca137e522820700cc3d7 + +info: + name: > + ShopLentor – WooCommerce Builder for Elementor & Gutenberg +10 Modules – All in One Solution (formerly WooLentor) <= 2.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6d8212d-7e72-487d-a4e8-0582fa72f602?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-bd64f1f16c4920e8819a833f00007e5e.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-bd64f1f16c4920e8819a833f00007e5e.yaml new file mode 100644 index 0000000000..295aa560df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-bd64f1f16c4920e8819a833f00007e5e.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-bd64f1f16c4920e8819a833f00007e5e + +info: + name: > + WooLentor – WooCommerce Elementor Addons + Builder <= 1.8.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2edc7c4d-598d-4c9c-9aad-ccc97f6a3ac0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-c4fa40659d43973eb06846ab990bf0bc.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-c4fa40659d43973eb06846ab990bf0bc.yaml new file mode 100644 index 0000000000..0b77c98d1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-c4fa40659d43973eb06846ab990bf0bc.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-c4fa40659d43973eb06846ab990bf0bc + +info: + name: > + WooLentor <= 2.5.3 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fdb6e4d-a94d-448c-aaea-0f38eeafd033?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-e2e16530577d94aba470c5d11e9df874.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-e2e16530577d94aba470c5d11e9df874.yaml new file mode 100644 index 0000000000..0b62075b17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-e2e16530577d94aba470c5d11e9df874.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-e2e16530577d94aba470c5d11e9df874 + +info: + name: > + ShopLentor <= 2.5.1 - Cross-Site Request Forgery to Post Updates + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db952443-2588-4da0-87d8-5bd2d3be039c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woolentor-addons-f19b67578553b4899e4857d2a0013f9e.yaml b/nuclei-templates/cve-less/plugins/woolentor-addons-f19b67578553b4899e4857d2a0013f9e.yaml new file mode 100644 index 0000000000..0631cade9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woolentor-addons-f19b67578553b4899e4857d2a0013f9e.yaml @@ -0,0 +1,58 @@ +id: woolentor-addons-f19b67578553b4899e4857d2a0013f9e + +info: + name: > + ShopLentor (formerly WooLentor) <= 2.8.7 - Missing Authorization via purchased_new_products + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/263324cb-31b7-40ad-ad7d-4582e128cd75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woolentor-addons/" + google-query: inurl:"/wp-content/plugins/woolentor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woolentor-addons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woolentor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woolentor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woomotiv-fb36175cd4f9026269e4e65b050f0b1c.yaml b/nuclei-templates/cve-less/plugins/woomotiv-fb36175cd4f9026269e4e65b050f0b1c.yaml new file mode 100644 index 0000000000..0213de573d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woomotiv-fb36175cd4f9026269e4e65b050f0b1c.yaml @@ -0,0 +1,58 @@ +id: woomotiv-fb36175cd4f9026269e4e65b050f0b1c + +info: + name: > + Live Sales Notification for Woocommerce – Woomotiv <= 3.4.3 - Cross-Site Request Forgery via ajax_cancel_review + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca1c1b43-def2-4f9f-b5c7-075ca188f6e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woomotiv/" + google-query: inurl:"/wp-content/plugins/woomotiv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woomotiv,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woomotiv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woomotiv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woopra-4e90b64e5c0880980f44418deca3c91b.yaml b/nuclei-templates/cve-less/plugins/woopra-4e90b64e5c0880980f44418deca3c91b.yaml new file mode 100644 index 0000000000..504fdd503a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woopra-4e90b64e5c0880980f44418deca3c91b.yaml @@ -0,0 +1,58 @@ +id: woopra-4e90b64e5c0880980f44418deca3c91b + +info: + name: > + Various Affected Software (Various Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d5d9ef7-3832-495c-b61b-7e24c2e60893?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woopra/" + google-query: inurl:"/wp-content/plugins/woopra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woopra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woopra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woopra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woopra-aa8c984fec41bb48489f399f6ec63ef2.yaml b/nuclei-templates/cve-less/plugins/woopra-aa8c984fec41bb48489f399f6ec63ef2.yaml new file mode 100644 index 0000000000..d86daf182b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woopra-aa8c984fec41bb48489f399f6ec63ef2.yaml @@ -0,0 +1,58 @@ +id: woopra-aa8c984fec41bb48489f399f6ec63ef2 + +info: + name: > + Woopra Analytics Plugin < 1.4.3.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a22932d8-14d4-43a1-86ba-7afadc0bec1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woopra/" + google-query: inurl:"/wp-content/plugins/woopra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woopra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woopra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woopra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wooreviews-importer-b55a13d9b3421679e7e8eb49d23be81c.yaml b/nuclei-templates/cve-less/plugins/wooreviews-importer-b55a13d9b3421679e7e8eb49d23be81c.yaml new file mode 100644 index 0000000000..719415752a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wooreviews-importer-b55a13d9b3421679e7e8eb49d23be81c.yaml @@ -0,0 +1,58 @@ +id: wooreviews-importer-b55a13d9b3421679e7e8eb49d23be81c + +info: + name: > + IRivYou <= 2.2.1 - Cross-Site Request Forgery via saveOptionsReviewsPlugin + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5607cc07-5104-45d0-8279-ba0ef3ebcbe9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wooreviews-importer/" + google-query: inurl:"/wp-content/plugins/wooreviews-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wooreviews-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wooreviews-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wooreviews-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woorewards-9d13f1d3852ef39a0de552cc88d8fec7.yaml b/nuclei-templates/cve-less/plugins/woorewards-9d13f1d3852ef39a0de552cc88d8fec7.yaml new file mode 100644 index 0000000000..c836eb615c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woorewards-9d13f1d3852ef39a0de552cc88d8fec7.yaml @@ -0,0 +1,58 @@ +id: woorewards-9d13f1d3852ef39a0de552cc88d8fec7 + +info: + name: > + MyRewards <= 5.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eff0dfd-f7e6-4f5f-b1c8-00f69fa0df78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woorewards/" + google-query: inurl:"/wp-content/plugins/woorewards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woorewards,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woorewards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woorewards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woorocks-magic-content-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/woorocks-magic-content-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..d2dbee67dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woorocks-magic-content-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: woorocks-magic-content-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woorocks-magic-content/" + google-query: inurl:"/wp-content/plugins/woorocks-magic-content/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woorocks-magic-content,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woorocks-magic-content/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woorocks-magic-content" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woorocks-magic-content-for-siteorigins-pagebuilder-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/woorocks-magic-content-for-siteorigins-pagebuilder-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..3c88f636ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woorocks-magic-content-for-siteorigins-pagebuilder-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: woorocks-magic-content-for-siteorigins-pagebuilder-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woorocks-magic-content-for-siteorigins-pagebuilder/" + google-query: inurl:"/wp-content/plugins/woorocks-magic-content-for-siteorigins-pagebuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woorocks-magic-content-for-siteorigins-pagebuilder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woorocks-magic-content-for-siteorigins-pagebuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woorocks-magic-content-for-siteorigins-pagebuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woorousell-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woorousell-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d3fffe3667 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woorousell-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woorousell-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woorousell/" + google-query: inurl:"/wp-content/plugins/woorousell/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woorousell,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woorousell/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woorousell" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woosaleskit-bar-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/woosaleskit-bar-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..c030c455fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woosaleskit-bar-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: woosaleskit-bar-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woosaleskit-bar/" + google-query: inurl:"/wp-content/plugins/woosaleskit-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woosaleskit-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woosaleskit-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woosaleskit-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wooshark-aliexpress-importer-362d3676648172fe24d0a4f6ea7f422f.yaml b/nuclei-templates/cve-less/plugins/wooshark-aliexpress-importer-362d3676648172fe24d0a4f6ea7f422f.yaml new file mode 100644 index 0000000000..ed537adedb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wooshark-aliexpress-importer-362d3676648172fe24d0a4f6ea7f422f.yaml @@ -0,0 +1,58 @@ +id: wooshark-aliexpress-importer-362d3676648172fe24d0a4f6ea7f422f + +info: + name: > + Sharkdropship for AliExpress Dropship and Affiliate <= 2.2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8812cfe-4bbe-44ba-9513-7f81bad68d11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wooshark-aliexpress-importer/" + google-query: inurl:"/wp-content/plugins/wooshark-aliexpress-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wooshark-aliexpress-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wooshark-aliexpress-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wooshark-aliexpress-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wooshark-aliexpress-importer-b2a85d8fd51446e550fee890b46b39fe.yaml b/nuclei-templates/cve-less/plugins/wooshark-aliexpress-importer-b2a85d8fd51446e550fee890b46b39fe.yaml new file mode 100644 index 0000000000..540a57af8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wooshark-aliexpress-importer-b2a85d8fd51446e550fee890b46b39fe.yaml @@ -0,0 +1,58 @@ +id: wooshark-aliexpress-importer-b2a85d8fd51446e550fee890b46b39fe + +info: + name: > + Sharkdropship for AliExpress Dropshipping and Affiliate <= 2.2.4 - Missing Authorization to Unauthenticated Arbitrary Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a2e636d-e602-4ab0-80f2-525a8a1f8388?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wooshark-aliexpress-importer/" + google-query: inurl:"/wp-content/plugins/wooshark-aliexpress-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wooshark-aliexpress-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wooshark-aliexpress-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wooshark-aliexpress-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wooshark-woocommerce-dropshipping-d9f05f56ca3567e886c01941a461d782.yaml b/nuclei-templates/cve-less/plugins/wooshark-woocommerce-dropshipping-d9f05f56ca3567e886c01941a461d782.yaml new file mode 100644 index 0000000000..e4ab1f72f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wooshark-woocommerce-dropshipping-d9f05f56ca3567e886c01941a461d782.yaml @@ -0,0 +1,58 @@ +id: wooshark-woocommerce-dropshipping-d9f05f56ca3567e886c01941a461d782 + +info: + name: > + Dropshipping and affiliates for Amazon and woocommerce <= 1.4.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9303719-3d48-4a55-ac19-0c603801d458?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wooshark-woocommerce-dropshipping/" + google-query: inurl:"/wp-content/plugins/wooshark-woocommerce-dropshipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wooshark-woocommerce-dropshipping,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wooshark-woocommerce-dropshipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wooshark-woocommerce-dropshipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woosidebars-354dafbbd9f0f8346bf3ecdcdb25b186.yaml b/nuclei-templates/cve-less/plugins/woosidebars-354dafbbd9f0f8346bf3ecdcdb25b186.yaml new file mode 100644 index 0000000000..b86c69ac97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woosidebars-354dafbbd9f0f8346bf3ecdcdb25b186.yaml @@ -0,0 +1,58 @@ +id: woosidebars-354dafbbd9f0f8346bf3ecdcdb25b186 + +info: + name: > + WooSidebars <= 1.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e15b81f7-4d3b-4505-b345-1019fed0fef1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woosidebars/" + google-query: inurl:"/wp-content/plugins/woosidebars/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woosidebars,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woosidebars/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woosidebars" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woosidebars-sbm-converter-209b59f9f6a6704c1242005d050454d8.yaml b/nuclei-templates/cve-less/plugins/woosidebars-sbm-converter-209b59f9f6a6704c1242005d050454d8.yaml new file mode 100644 index 0000000000..0723ffcd50 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woosidebars-sbm-converter-209b59f9f6a6704c1242005d050454d8.yaml @@ -0,0 +1,58 @@ +id: woosidebars-sbm-converter-209b59f9f6a6704c1242005d050454d8 + +info: + name: > + WooSidebars Sidebar Manager Converter <= 1.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3462a1b7-74d9-431a-b1c6-9960f1ad0c19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woosidebars-sbm-converter/" + google-query: inurl:"/wp-content/plugins/woosidebars-sbm-converter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woosidebars-sbm-converter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woosidebars-sbm-converter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woosidebars-sbm-converter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woosms-sms-module-for-woocommerce-9cbc81546b21a100994e807b3ec7d261.yaml b/nuclei-templates/cve-less/plugins/woosms-sms-module-for-woocommerce-9cbc81546b21a100994e807b3ec7d261.yaml new file mode 100644 index 0000000000..9c1b860f56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woosms-sms-module-for-woocommerce-9cbc81546b21a100994e807b3ec7d261.yaml @@ -0,0 +1,58 @@ +id: woosms-sms-module-for-woocommerce-9cbc81546b21a100994e807b3ec7d261 + +info: + name: > + BulkGate SMS Plugin for WooCommerce <= 3.0.2 - Missing Authorization via Multiple AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93e590f8-5f8d-4ee5-bcff-96bcb8daf4b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woosms-sms-module-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/woosms-sms-module-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woosms-sms-module-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woosms-sms-module-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woosms-sms-module-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woosquare-19746aa654bdce1c5c57da933bb299ae.yaml b/nuclei-templates/cve-less/plugins/woosquare-19746aa654bdce1c5c57da933bb299ae.yaml new file mode 100644 index 0000000000..27c465b07b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woosquare-19746aa654bdce1c5c57da933bb299ae.yaml @@ -0,0 +1,58 @@ +id: woosquare-19746aa654bdce1c5c57da933bb299ae + +info: + name: > + APIExperts Square for WooCommerce <= 4.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e43713c7-32bd-4b82-a4da-6c02d91f3d3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woosquare/" + google-query: inurl:"/wp-content/plugins/woosquare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woosquare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woosquare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woosquare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woosquare-63a838c07fa7f4dbcc749cd4ec305acf.yaml b/nuclei-templates/cve-less/plugins/woosquare-63a838c07fa7f4dbcc749cd4ec305acf.yaml new file mode 100644 index 0000000000..faebe7f6ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woosquare-63a838c07fa7f4dbcc749cd4ec305acf.yaml @@ -0,0 +1,58 @@ +id: woosquare-63a838c07fa7f4dbcc749cd4ec305acf + +info: + name: > + APIExperts Square for WooCommerce <= 4.4.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e1193b1-6e5a-4ecc-ae97-1a3129ad330e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woosquare/" + google-query: inurl:"/wp-content/plugins/woosquare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woosquare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woosquare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woosquare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woosquare-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woosquare-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ed34112bff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woosquare-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woosquare-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woosquare/" + google-query: inurl:"/wp-content/plugins/woosquare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woosquare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woosquare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woosquare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woostify-sites-library-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/woostify-sites-library-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..4f157c6d89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woostify-sites-library-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: woostify-sites-library-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woostify-sites-library/" + google-query: inurl:"/wp-content/plugins/woostify-sites-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woostify-sites-library,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woostify-sites-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woostify-sites-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woostify-sites-library-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/woostify-sites-library-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..0e05c218df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woostify-sites-library-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: woostify-sites-library-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woostify-sites-library/" + google-query: inurl:"/wp-content/plugins/woostify-sites-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woostify-sites-library,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woostify-sites-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woostify-sites-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woostify-sites-library-bf6365dff081103c217daff8833cbf80.yaml b/nuclei-templates/cve-less/plugins/woostify-sites-library-bf6365dff081103c217daff8833cbf80.yaml new file mode 100644 index 0000000000..9e696735ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woostify-sites-library-bf6365dff081103c217daff8833cbf80.yaml @@ -0,0 +1,58 @@ +id: woostify-sites-library-bf6365dff081103c217daff8833cbf80 + +info: + name: > + Woostify Sites Library + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/977ab23a-06b2-4f54-a2c2-3be2316eaceb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woostify-sites-library/" + google-query: inurl:"/wp-content/plugins/woostify-sites-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woostify-sites-library,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woostify-sites-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woostify-sites-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woosupply-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/woosupply-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..d584048067 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woosupply-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: woosupply-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woosupply/" + google-query: inurl:"/wp-content/plugins/woosupply/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woosupply,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woosupply/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woosupply" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wooswipe-e20e9bcb00e5e945a6bb2c24c79d65cf.yaml b/nuclei-templates/cve-less/plugins/wooswipe-e20e9bcb00e5e945a6bb2c24c79d65cf.yaml new file mode 100644 index 0000000000..85e9aad4c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wooswipe-e20e9bcb00e5e945a6bb2c24c79d65cf.yaml @@ -0,0 +1,58 @@ +id: wooswipe-e20e9bcb00e5e945a6bb2c24c79d65cf + +info: + name: > + WooSwipe WooCommerce Gallery <= 3.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d66665b6-8cb2-4bc0-929d-4a8689bada9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wooswipe/" + google-query: inurl:"/wp-content/plugins/wooswipe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wooswipe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wooswipe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wooswipe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wootrello-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wootrello-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d8b13a1487 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wootrello-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wootrello-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wootrello/" + google-query: inurl:"/wp-content/plugins/wootrello/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wootrello,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wootrello/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wootrello" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woovip-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/woovip-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..538d87ef4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woovip-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: woovip-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woovip/" + google-query: inurl:"/wp-content/plugins/woovip/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woovip,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woovip/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woovip" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woovirtualwallet-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/woovirtualwallet-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..ae70249d94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woovirtualwallet-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: woovirtualwallet-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woovirtualwallet/" + google-query: inurl:"/wp-content/plugins/woovirtualwallet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woovirtualwallet,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woovirtualwallet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woovirtualwallet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woowgallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/woowgallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f159e48659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woowgallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: woowgallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woowgallery/" + google-query: inurl:"/wp-content/plugins/woowgallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woowgallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woowgallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woowgallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woozone-605a67411fb1b4e46eb2a9b231a35b01.yaml b/nuclei-templates/cve-less/plugins/woozone-605a67411fb1b4e46eb2a9b231a35b01.yaml new file mode 100644 index 0000000000..0127d5d795 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woozone-605a67411fb1b4e46eb2a9b231a35b01.yaml @@ -0,0 +1,58 @@ +id: woozone-605a67411fb1b4e46eb2a9b231a35b01 + +info: + name: > + WooCommerce Amazon Affiliates - Wordpress Plugin <= 14.0.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8abe5885-0f04-4545-a2fe-7aa2a1dcbbe6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woozone/" + google-query: inurl:"/wp-content/plugins/woozone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woozone,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woozone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woozone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woozone-854e0c6e8605c626361126b016b08a27.yaml b/nuclei-templates/cve-less/plugins/woozone-854e0c6e8605c626361126b016b08a27.yaml new file mode 100644 index 0000000000..456863362a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woozone-854e0c6e8605c626361126b016b08a27.yaml @@ -0,0 +1,58 @@ +id: woozone-854e0c6e8605c626361126b016b08a27 + +info: + name: > + WooCommerce Amazon Affiliates - Wordpress Plugin <= 14.0.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7193052f-1bef-426c-b0fe-4d70931f47ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woozone/" + google-query: inurl:"/wp-content/plugins/woozone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woozone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woozone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woozone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woozone-9fc89469f8a530afdf83c67ae386fe4e.yaml b/nuclei-templates/cve-less/plugins/woozone-9fc89469f8a530afdf83c67ae386fe4e.yaml new file mode 100644 index 0000000000..cd991c474c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woozone-9fc89469f8a530afdf83c67ae386fe4e.yaml @@ -0,0 +1,58 @@ +id: woozone-9fc89469f8a530afdf83c67ae386fe4e + +info: + name: > + WZone <= 14.0.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2621d2f1-7ce3-4858-9633-080ef916d374?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woozone/" + google-query: inurl:"/wp-content/plugins/woozone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woozone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woozone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woozone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woozone-c9f6ba5dc3a76ccaf9e57d79e18e6ca4.yaml b/nuclei-templates/cve-less/plugins/woozone-c9f6ba5dc3a76ccaf9e57d79e18e6ca4.yaml new file mode 100644 index 0000000000..492a77b6f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woozone-c9f6ba5dc3a76ccaf9e57d79e18e6ca4.yaml @@ -0,0 +1,58 @@ +id: woozone-c9f6ba5dc3a76ccaf9e57d79e18e6ca4 + +info: + name: > + WooCommerce Amazon Affiliates - Wordpress Plugin <= 14.0.10 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca88c62d-0f27-40e0-9dd2-21d3d133fda3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woozone/" + google-query: inurl:"/wp-content/plugins/woozone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woozone,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woozone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woozone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woozone-e261de97ae518fadfa674900f6884131.yaml b/nuclei-templates/cve-less/plugins/woozone-e261de97ae518fadfa674900f6884131.yaml new file mode 100644 index 0000000000..aa94c621b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woozone-e261de97ae518fadfa674900f6884131.yaml @@ -0,0 +1,58 @@ +id: woozone-e261de97ae518fadfa674900f6884131 + +info: + name: > + WooCommerce Amazon Affiliates - Wordpress Plugin <= 14.0.10 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1a14fc2-cebe-4a0e-92b0-af2a9c805401?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woozone/" + google-query: inurl:"/wp-content/plugins/woozone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woozone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woozone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woozone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/woozone-e2b6dedf58550635a9af3b0cb010148d.yaml b/nuclei-templates/cve-less/plugins/woozone-e2b6dedf58550635a9af3b0cb010148d.yaml new file mode 100644 index 0000000000..c1970b1547 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/woozone-e2b6dedf58550635a9af3b0cb010148d.yaml @@ -0,0 +1,58 @@ +id: woozone-e2b6dedf58550635a9af3b0cb010148d + +info: + name: > + WooCommerce Amazon Affiliates - Wordpress Plugin <= 14.0.10 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5b110a5-4027-4c98-a348-325c8b9c8405?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woozone/" + google-query: inurl:"/wp-content/plugins/woozone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woozone,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woozone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woozone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/word-balloon-367b7f8831e5629ea2336d98cf86a14a.yaml b/nuclei-templates/cve-less/plugins/word-balloon-367b7f8831e5629ea2336d98cf86a14a.yaml new file mode 100644 index 0000000000..88b5d39898 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/word-balloon-367b7f8831e5629ea2336d98cf86a14a.yaml @@ -0,0 +1,58 @@ +id: word-balloon-367b7f8831e5629ea2336d98cf86a14a + +info: + name: > + Word Balloon <= 4.19.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/503dcefe-1147-4b8e-96e2-c21f49a7bc5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/word-balloon/" + google-query: inurl:"/wp-content/plugins/word-balloon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,word-balloon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/word-balloon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "word-balloon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/word-balloon-a3cc2155590ae1415e931b5fb88c4ba6.yaml b/nuclei-templates/cve-less/plugins/word-balloon-a3cc2155590ae1415e931b5fb88c4ba6.yaml new file mode 100644 index 0000000000..3f041d956d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/word-balloon-a3cc2155590ae1415e931b5fb88c4ba6.yaml @@ -0,0 +1,58 @@ +id: word-balloon-a3cc2155590ae1415e931b5fb88c4ba6 + +info: + name: > + Word Balloon <= 4.20.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54297bce-e5b7-469e-9c28-1d88e78aacc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/word-balloon/" + google-query: inurl:"/wp-content/plugins/word-balloon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,word-balloon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/word-balloon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "word-balloon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/word-replacer-ultra-82ccd5e1aeac71fd905aec731ee6d6b0.yaml b/nuclei-templates/cve-less/plugins/word-replacer-ultra-82ccd5e1aeac71fd905aec731ee6d6b0.yaml new file mode 100644 index 0000000000..00408d88fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/word-replacer-ultra-82ccd5e1aeac71fd905aec731ee6d6b0.yaml @@ -0,0 +1,58 @@ +id: word-replacer-ultra-82ccd5e1aeac71fd905aec731ee6d6b0 + +info: + name: > + Word Replacer Pro <= 1.0 - Missing Authorization to Unauthenticated Arbitrary Content Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1da53718-c2a2-45d0-ad43-daff3c68342d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/word-replacer-ultra/" + google-query: inurl:"/wp-content/plugins/word-replacer-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,word-replacer-ultra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/word-replacer-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "word-replacer-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/word-replacer-ultra-ca80be8d82d9f4b7b474971b5f658d56.yaml b/nuclei-templates/cve-less/plugins/word-replacer-ultra-ca80be8d82d9f4b7b474971b5f658d56.yaml new file mode 100644 index 0000000000..daa627c762 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/word-replacer-ultra-ca80be8d82d9f4b7b474971b5f658d56.yaml @@ -0,0 +1,58 @@ +id: word-replacer-ultra-ca80be8d82d9f4b7b474971b5f658d56 + +info: + name: > + Word Replacer Pro <= 1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd31e8b0-6089-4521-a80f-e65e61ad062f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/word-replacer-ultra/" + google-query: inurl:"/wp-content/plugins/word-replacer-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,word-replacer-ultra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/word-replacer-ultra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "word-replacer-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordable-3161964a915ebff8fbd41c85d4b1281d.yaml b/nuclei-templates/cve-less/plugins/wordable-3161964a915ebff8fbd41c85d4b1281d.yaml new file mode 100644 index 0000000000..bbf0a5af27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordable-3161964a915ebff8fbd41c85d4b1281d.yaml @@ -0,0 +1,58 @@ +id: wordable-3161964a915ebff8fbd41c85d4b1281d + +info: + name: > + Wordable <= 3.1.1 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be1ab218-37bd-407a-8cb9-66f761849c21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordable/" + google-query: inurl:"/wp-content/plugins/wordable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordable,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordapp-755ac9508c7a76c31cd7d0edf80b8b6e.yaml b/nuclei-templates/cve-less/plugins/wordapp-755ac9508c7a76c31cd7d0edf80b8b6e.yaml new file mode 100644 index 0000000000..e5f005c667 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordapp-755ac9508c7a76c31cd7d0edf80b8b6e.yaml @@ -0,0 +1,58 @@ +id: wordapp-755ac9508c7a76c31cd7d0edf80b8b6e + +info: + name: > + Wordapp <= 1.5.0 - Authorization Bypass through Use of Insufficiently Unique Cryptographic Signature + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80440bfa-4a02-4441-bbdb-52d7dd065a9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordapp/" + google-query: inurl:"/wp-content/plugins/wordapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordapp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordcamp-talks-7a96e3ef8700d304a9dfa367fee4cef2.yaml b/nuclei-templates/cve-less/plugins/wordcamp-talks-7a96e3ef8700d304a9dfa367fee4cef2.yaml new file mode 100644 index 0000000000..130ffb77b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordcamp-talks-7a96e3ef8700d304a9dfa367fee4cef2.yaml @@ -0,0 +1,58 @@ +id: wordcamp-talks-7a96e3ef8700d304a9dfa367fee4cef2 + +info: + name: > + WordCamp Talks < 1.0.0 Beta3 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48f148ee-800d-4c8f-bf43-893ec7961f3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordcamp-talks/" + google-query: inurl:"/wp-content/plugins/wordcamp-talks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordcamp-talks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordcamp-talks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordcamp-talks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0-beta3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-058c5e78b9996f732b9318d662c631ea.yaml b/nuclei-templates/cve-less/plugins/wordfence-058c5e78b9996f732b9318d662c631ea.yaml new file mode 100644 index 0000000000..89615cd2fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-058c5e78b9996f732b9318d662c631ea.yaml @@ -0,0 +1,58 @@ +id: wordfence-058c5e78b9996f732b9318d662c631ea + +info: + name: > + Wordfence Security – Firewall & Malware Scan <= 5.1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58c79117-3a36-4a23-9f3d-067094d13edf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-0b892f42133b0cde6baf163046912807.yaml b/nuclei-templates/cve-less/plugins/wordfence-0b892f42133b0cde6baf163046912807.yaml new file mode 100644 index 0000000000..baacb30e58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-0b892f42133b0cde6baf163046912807.yaml @@ -0,0 +1,58 @@ +id: wordfence-0b892f42133b0cde6baf163046912807 + +info: + name: > + Wordfence Security – Firewall & Malware Scan 6.1.1 - 6.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/809d0632-39a7-44a7-b368-9dc58270c666?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 6.1.1', '<= 6.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-123ae05dae80d93502cd649f5ec1d55b.yaml b/nuclei-templates/cve-less/plugins/wordfence-123ae05dae80d93502cd649f5ec1d55b.yaml new file mode 100644 index 0000000000..422f06b336 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-123ae05dae80d93502cd649f5ec1d55b.yaml @@ -0,0 +1,58 @@ +id: wordfence-123ae05dae80d93502cd649f5ec1d55b + +info: + name: > + Wordfence Security <= 3.8.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63a2d09d-9cb8-47ba-8e40-5b43894552e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-20a5446793c82d7b30a3e33ca0d2737f.yaml b/nuclei-templates/cve-less/plugins/wordfence-20a5446793c82d7b30a3e33ca0d2737f.yaml new file mode 100644 index 0000000000..40e0d47087 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-20a5446793c82d7b30a3e33ca0d2737f.yaml @@ -0,0 +1,58 @@ +id: wordfence-20a5446793c82d7b30a3e33ca0d2737f + +info: + name: > + Wordfence Security <= 5.2.3 - Stored Cross-Site Scripting via HTTP_HOST + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47938357-7d51-4d62-a08c-4b2bf3f3a062?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-2be64cfcc4c65cd88d9acc6ffb63f29d.yaml b/nuclei-templates/cve-less/plugins/wordfence-2be64cfcc4c65cd88d9acc6ffb63f29d.yaml new file mode 100644 index 0000000000..fc633a5c6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-2be64cfcc4c65cd88d9acc6ffb63f29d.yaml @@ -0,0 +1,58 @@ +id: wordfence-2be64cfcc4c65cd88d9acc6ffb63f29d + +info: + name: > + Wordfence <= 5.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b56dcd7-f261-42db-833d-5673c8805bb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-2fe978140d6bb192dbe8f6347a246620.yaml b/nuclei-templates/cve-less/plugins/wordfence-2fe978140d6bb192dbe8f6347a246620.yaml new file mode 100644 index 0000000000..0d70aead0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-2fe978140d6bb192dbe8f6347a246620.yaml @@ -0,0 +1,58 @@ +id: wordfence-2fe978140d6bb192dbe8f6347a246620 + +info: + name: > + Wordfence Security - Firewall & Malware Scan <= 3.3.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93f9862f-745f-44d5-ac49-f8d2d19b35ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-3c3ca8f76126413596e767724c529582.yaml b/nuclei-templates/cve-less/plugins/wordfence-3c3ca8f76126413596e767724c529582.yaml new file mode 100644 index 0000000000..b66f3c3675 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-3c3ca8f76126413596e767724c529582.yaml @@ -0,0 +1,58 @@ +id: wordfence-3c3ca8f76126413596e767724c529582 + +info: + name: > + Wordfence < 3.3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc39e21-f39c-4581-895a-04e352e9b383?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-59e1a99c9f0b45a9f6f61c16b82c38c9.yaml b/nuclei-templates/cve-less/plugins/wordfence-59e1a99c9f0b45a9f6f61c16b82c38c9.yaml new file mode 100644 index 0000000000..48e6cc2582 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-59e1a99c9f0b45a9f6f61c16b82c38c9.yaml @@ -0,0 +1,58 @@ +id: wordfence-59e1a99c9f0b45a9f6f61c16b82c38c9 + +info: + name: > + Wordfence <= 5.2.3 - Multiple Protection Mechanism Bypasses + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be700f83-248f-4d22-b53d-7cc61e1f7d7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-5af88d26b08538821fbf3df9c9788c30.yaml b/nuclei-templates/cve-less/plugins/wordfence-5af88d26b08538821fbf3df9c9788c30.yaml new file mode 100644 index 0000000000..752ffafd06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-5af88d26b08538821fbf3df9c9788c30.yaml @@ -0,0 +1,58 @@ +id: wordfence-5af88d26b08538821fbf3df9c9788c30 + +info: + name: > + Wordfence <= 5.2.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f315fff8-d616-4a5c-91bc-d8b0ec0f028f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-5feccb7307b20851729f7d1fe5c16402.yaml b/nuclei-templates/cve-less/plugins/wordfence-5feccb7307b20851729f7d1fe5c16402.yaml new file mode 100644 index 0000000000..816b5ba11d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-5feccb7307b20851729f7d1fe5c16402.yaml @@ -0,0 +1,58 @@ +id: wordfence-5feccb7307b20851729f7d1fe5c16402 + +info: + name: > + Wordfence Security – Firewall & Malware Scan <= 7.1.13 - Reflected Cross-Site Scripting and Information Disclosure + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7819dbf-fbcc-4dca-8300-b75ec096c541?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-6e3aec88bbc3b7a8585b22a385ae7c31.yaml b/nuclei-templates/cve-less/plugins/wordfence-6e3aec88bbc3b7a8585b22a385ae7c31.yaml new file mode 100644 index 0000000000..523cfd5eac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-6e3aec88bbc3b7a8585b22a385ae7c31.yaml @@ -0,0 +1,58 @@ +id: wordfence-6e3aec88bbc3b7a8585b22a385ae7c31 + +info: + name: > + Wordfence <= 5.2.3 - Stored Cross-Site Scripting via REQUEST_URI + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdfa2336-dda2-4945-9278-1a85f8b5f88b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordfence-aaccf9d8425eddd13e4ac4f8c70f1e50.yaml b/nuclei-templates/cve-less/plugins/wordfence-aaccf9d8425eddd13e4ac4f8c70f1e50.yaml new file mode 100644 index 0000000000..f6d36f5b89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordfence-aaccf9d8425eddd13e4ac4f8c70f1e50.yaml @@ -0,0 +1,58 @@ +id: wordfence-aaccf9d8425eddd13e4ac4f8c70f1e50 + +info: + name: > + Wordfence Security – Firewall & Malware Scan <= 7.6.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/833eb481-4fb4-432e-8e93-3f497ccbf1eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordfence/" + google-query: inurl:"/wp-content/plugins/wordfence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordfence,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordfence/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordfence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordlift-4626cb693582f4ef4c3fd754ef5fda3a.yaml b/nuclei-templates/cve-less/plugins/wordlift-4626cb693582f4ef4c3fd754ef5fda3a.yaml new file mode 100644 index 0000000000..ec7029071e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordlift-4626cb693582f4ef4c3fd754ef5fda3a.yaml @@ -0,0 +1,58 @@ +id: wordlift-4626cb693582f4ef4c3fd754ef5fda3a + +info: + name: > + Wordlift <= 3.37.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b644e61a-5842-43a6-9525-97e1339dcc94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordlift/" + google-query: inurl:"/wp-content/plugins/wordlift/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordlift,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordlift/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordlift" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.37.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-23-related-posts-plugin-0a3943b43f76d9a29800828b188b084b.yaml b/nuclei-templates/cve-less/plugins/wordpress-23-related-posts-plugin-0a3943b43f76d9a29800828b188b084b.yaml new file mode 100644 index 0000000000..21d5c8061f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-23-related-posts-plugin-0a3943b43f76d9a29800828b188b084b.yaml @@ -0,0 +1,58 @@ +id: wordpress-23-related-posts-plugin-0a3943b43f76d9a29800828b188b084b + +info: + name: > + Related Posts < 2.7.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ae3ad65-54d7-4ee0-894f-8ffd9fa8ac35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-23-related-posts-plugin/" + google-query: inurl:"/wp-content/plugins/wordpress-23-related-posts-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-23-related-posts-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-23-related-posts-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-23-related-posts-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-23-related-posts-plugin-c52e6603b19e1ddbfb9c023a9a70f51b.yaml b/nuclei-templates/cve-less/plugins/wordpress-23-related-posts-plugin-c52e6603b19e1ddbfb9c023a9a70f51b.yaml new file mode 100644 index 0000000000..71f3737a05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-23-related-posts-plugin-c52e6603b19e1ddbfb9c023a9a70f51b.yaml @@ -0,0 +1,58 @@ +id: wordpress-23-related-posts-plugin-c52e6603b19e1ddbfb9c023a9a70f51b + +info: + name: > + WordPress Related Posts <= 3.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c55792d6-3f31-4635-ad5c-17d03a5b2977?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-23-related-posts-plugin/" + google-query: inurl:"/wp-content/plugins/wordpress-23-related-posts-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-23-related-posts-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-23-related-posts-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-23-related-posts-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-access-control-6ab743a2d3b53689e8dd020c482ecaf3.yaml b/nuclei-templates/cve-less/plugins/wordpress-access-control-6ab743a2d3b53689e8dd020c482ecaf3.yaml new file mode 100644 index 0000000000..e5a5aafe3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-access-control-6ab743a2d3b53689e8dd020c482ecaf3.yaml @@ -0,0 +1,58 @@ +id: wordpress-access-control-6ab743a2d3b53689e8dd020c482ecaf3 + +info: + name: > + WordPress Access Control <= 4.0.13 - Improper Access Control to Sensitive Information Exposure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31f13524-2bd7-4157-b378-455ac4f822a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-access-control/" + google-query: inurl:"/wp-content/plugins/wordpress-access-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-access-control,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-access-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-access-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-admanager-8fd44c63d94c422a14e4d5e118df7d97.yaml b/nuclei-templates/cve-less/plugins/wordpress-admanager-8fd44c63d94c422a14e4d5e118df7d97.yaml new file mode 100644 index 0000000000..841611ad6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-admanager-8fd44c63d94c422a14e4d5e118df7d97.yaml @@ -0,0 +1,58 @@ +id: wordpress-admanager-8fd44c63d94c422a14e4d5e118df7d97 + +info: + name: > + Ad Manager <= 1.1.2 - Open Redirection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c19d9288-39b2-4db1-abc6-ba87f98fecad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-admanager/" + google-query: inurl:"/wp-content/plugins/wordpress-admanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-admanager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-admanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-admanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-backup-to-dropbox-5ae574c1617e1bfbc92584f8f9bebe8c.yaml b/nuclei-templates/cve-less/plugins/wordpress-backup-to-dropbox-5ae574c1617e1bfbc92584f8f9bebe8c.yaml new file mode 100644 index 0000000000..168aa71512 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-backup-to-dropbox-5ae574c1617e1bfbc92584f8f9bebe8c.yaml @@ -0,0 +1,58 @@ +id: wordpress-backup-to-dropbox-5ae574c1617e1bfbc92584f8f9bebe8c + +info: + name: > + WordPress Backup to Dropbox < 4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c10c2256-4ffd-489a-afae-b455bf45c3ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-backup-to-dropbox/" + google-query: inurl:"/wp-content/plugins/wordpress-backup-to-dropbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-backup-to-dropbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-backup-to-dropbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-backup-to-dropbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-checkout-7a57451a1f089e6fb01f4c4c10c089ef.yaml b/nuclei-templates/cve-less/plugins/wordpress-checkout-7a57451a1f089e6fb01f4c4c10c089ef.yaml new file mode 100644 index 0000000000..edc62eef77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-checkout-7a57451a1f089e6fb01f4c4c10c089ef.yaml @@ -0,0 +1,58 @@ +id: wordpress-checkout-7a57451a1f089e6fb01f4c4c10c089ef + +info: + name: > + wp-checkout (Unknown Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/345834f2-e95e-4ea1-b171-1c3f4aa17e0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-checkout/" + google-query: inurl:"/wp-content/plugins/wordpress-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-checkout,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-console-97c1ceb18f16975e668ed8d0bd718768.yaml b/nuclei-templates/cve-less/plugins/wordpress-console-97c1ceb18f16975e668ed8d0bd718768.yaml new file mode 100644 index 0000000000..149b394dec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-console-97c1ceb18f16975e668ed8d0bd718768.yaml @@ -0,0 +1,58 @@ +id: wordpress-console-97c1ceb18f16975e668ed8d0bd718768 + +info: + name: > + WordPress Console <= 0.3.9 - Missing Authorization via reload.php + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd3cd605-6292-4a04-9aee-f4b9a8127e8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-console/" + google-query: inurl:"/wp-content/plugins/wordpress-console/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-console,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-console/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-console" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-0c91dc81841b4946dcdd188b1f4f59d9.yaml b/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-0c91dc81841b4946dcdd188b1f4f59d9.yaml new file mode 100644 index 0000000000..1660fde22c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-0c91dc81841b4946dcdd188b1f4f59d9.yaml @@ -0,0 +1,58 @@ +id: wordpress-countdown-widget-0c91dc81841b4946dcdd188b1f4f59d9 + +info: + name: > + WordPress Countdown Widget <= 3.1.9.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c79cbc1-4d8f-4330-b063-e5987238fca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-countdown-widget/" + google-query: inurl:"/wp-content/plugins/wordpress-countdown-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-countdown-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-countdown-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-countdown-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-475773ebaa71f55189abb950928342c8.yaml b/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-475773ebaa71f55189abb950928342c8.yaml new file mode 100644 index 0000000000..79324ab0d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-475773ebaa71f55189abb950928342c8.yaml @@ -0,0 +1,58 @@ +id: wordpress-countdown-widget-475773ebaa71f55189abb950928342c8 + +info: + name: > + WordPress Countdown Widget <= 3.1.9.1 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bd2ce54-9ccb-4943-a01a-c9e8c1ff2d0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-countdown-widget/" + google-query: inurl:"/wp-content/plugins/wordpress-countdown-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-countdown-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-countdown-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-countdown-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-a672faba2cf5fa34711e0d654497c3c5.yaml b/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-a672faba2cf5fa34711e0d654497c3c5.yaml new file mode 100644 index 0000000000..2bb557ef3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-countdown-widget-a672faba2cf5fa34711e0d654497c3c5.yaml @@ -0,0 +1,58 @@ +id: wordpress-countdown-widget-a672faba2cf5fa34711e0d654497c3c5 + +info: + name: > + WordPress Countdown Widget <= 3.1.9.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/259ed1a0-1bfa-4d38-845c-e5655c330702?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-countdown-widget/" + google-query: inurl:"/wp-content/plugins/wordpress-countdown-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-countdown-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-countdown-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-countdown-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-country-selector-004a45b0040859f9d7a9047f0ccf10be.yaml b/nuclei-templates/cve-less/plugins/wordpress-country-selector-004a45b0040859f9d7a9047f0ccf10be.yaml new file mode 100644 index 0000000000..c867b4d016 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-country-selector-004a45b0040859f9d7a9047f0ccf10be.yaml @@ -0,0 +1,58 @@ +id: wordpress-country-selector-004a45b0040859f9d7a9047f0ccf10be + +info: + name: > + WordPress Country Selector <= 1.6.5 - Reflected Cross-Site Scripting via AJAX call of check_country_selector + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef80a076-98cb-42c1-8d7d-0a6b38d7bfc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-country-selector/" + google-query: inurl:"/wp-content/plugins/wordpress-country-selector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-country-selector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-country-selector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-country-selector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-database-reset-93f8396aa2e225fac63eb4694d99073e.yaml b/nuclei-templates/cve-less/plugins/wordpress-database-reset-93f8396aa2e225fac63eb4694d99073e.yaml new file mode 100644 index 0000000000..7290d179f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-database-reset-93f8396aa2e225fac63eb4694d99073e.yaml @@ -0,0 +1,58 @@ +id: wordpress-database-reset-93f8396aa2e225fac63eb4694d99073e + +info: + name: > + WP Database Reset <= 3.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ca6605f-7c9c-43c7-ae32-ca1d781c1e86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-database-reset/" + google-query: inurl:"/wp-content/plugins/wordpress-database-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-database-reset,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-database-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-database-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-database-reset-eb85d378289992deb2bdae8ab06df635.yaml b/nuclei-templates/cve-less/plugins/wordpress-database-reset-eb85d378289992deb2bdae8ab06df635.yaml new file mode 100644 index 0000000000..80dcbb1813 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-database-reset-eb85d378289992deb2bdae8ab06df635.yaml @@ -0,0 +1,58 @@ +id: wordpress-database-reset-eb85d378289992deb2bdae8ab06df635 + +info: + name: > + Database Reset <= 3.22 - Cross-Site Request Forgery to WP Reset Plugin Installation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2e493cf-d022-404d-a501-a6671e6116f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-database-reset/" + google-query: inurl:"/wp-content/plugins/wordpress-database-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-database-reset,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-database-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-database-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-database-reset-f4aa3f1d5ea67fd4f48e9da5d1dfcb26.yaml b/nuclei-templates/cve-less/plugins/wordpress-database-reset-f4aa3f1d5ea67fd4f48e9da5d1dfcb26.yaml new file mode 100644 index 0000000000..440d1e1727 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-database-reset-f4aa3f1d5ea67fd4f48e9da5d1dfcb26.yaml @@ -0,0 +1,58 @@ +id: wordpress-database-reset-f4aa3f1d5ea67fd4f48e9da5d1dfcb26 + +info: + name: > + WP Database Reset <= 3.1 - Unauthenticated Database Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a29aea7-9e22-4edb-80d9-266843a416a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-database-reset/" + google-query: inurl:"/wp-content/plugins/wordpress-database-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-database-reset,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-database-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-database-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin-b86559278d78c8a80909bf3088ee795a.yaml b/nuclei-templates/cve-less/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin-b86559278d78c8a80909bf3088ee795a.yaml new file mode 100644 index 0000000000..801622873b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin-b86559278d78c8a80909bf3088ee795a.yaml @@ -0,0 +1,58 @@ +id: wordpress-easy-paypal-payment-or-donation-accept-plugin-b86559278d78c8a80909bf3088ee795a + +info: + name: > + Easy Accept Payments <= 4.9.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd340ecc-d698-43e1-a15c-479088fb8cf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin/" + google-query: inurl:"/wp-content/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-easy-paypal-payment-or-donation-accept-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-easy-paypal-payment-or-donation-accept-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin-c10b1142778769e9493bfb35c88879e4.yaml b/nuclei-templates/cve-less/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin-c10b1142778769e9493bfb35c88879e4.yaml new file mode 100644 index 0000000000..91b5a148ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin-c10b1142778769e9493bfb35c88879e4.yaml @@ -0,0 +1,58 @@ +id: wordpress-easy-paypal-payment-or-donation-accept-plugin-c10b1142778769e9493bfb35c88879e4 + +info: + name: > + Easy Accept Payments for PayPal <= 4.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1871009-8bf1-47a6-9fef-9ab2798b057c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin/" + google-query: inurl:"/wp-content/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-easy-paypal-payment-or-donation-accept-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-easy-paypal-payment-or-donation-accept-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-easy-paypal-payment-or-donation-accept-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-ecommerce-5245595392095b6ab4fe76ec4a372258.yaml b/nuclei-templates/cve-less/plugins/wordpress-ecommerce-5245595392095b6ab4fe76ec4a372258.yaml new file mode 100644 index 0000000000..fd2bb72420 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-ecommerce-5245595392095b6ab4fe76ec4a372258.yaml @@ -0,0 +1,58 @@ +id: wordpress-ecommerce-5245595392095b6ab4fe76ec4a372258 + +info: + name: > + MarketPress <= 3.2.6 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74a26e81-c063-4590-abe8-6cac9ec62316?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-ecommerce/" + google-query: inurl:"/wp-content/plugins/wordpress-ecommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-ecommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-ecommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-ecommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-exit-box-lite-31081287c88cb43d85e54ce23366ff88.yaml b/nuclei-templates/cve-less/plugins/wordpress-exit-box-lite-31081287c88cb43d85e54ce23366ff88.yaml new file mode 100644 index 0000000000..468a17391a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-exit-box-lite-31081287c88cb43d85e54ce23366ff88.yaml @@ -0,0 +1,58 @@ +id: wordpress-exit-box-lite-31081287c88cb43d85e54ce23366ff88 + +info: + name: > + WordPress Exit Box Lite <= 1.06 - Full Path Dislcosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1abf0bbd-c502-4db8-9e01-413517082dd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-exit-box-lite/" + google-query: inurl:"/wp-content/plugins/wordpress-exit-box-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-exit-box-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-exit-box-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-exit-box-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-exit-box-lite-3b6f736b0a47011b88af56143e4fb668.yaml b/nuclei-templates/cve-less/plugins/wordpress-exit-box-lite-3b6f736b0a47011b88af56143e4fb668.yaml new file mode 100644 index 0000000000..8dfa26f659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-exit-box-lite-3b6f736b0a47011b88af56143e4fb668.yaml @@ -0,0 +1,58 @@ +id: wordpress-exit-box-lite-3b6f736b0a47011b88af56143e4fb668 + +info: + name: > + WordPress Exit Box Lite <= 1.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c865d60-9e9f-450a-a3c4-43d991bf2478?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-exit-box-lite/" + google-query: inurl:"/wp-content/plugins/wordpress-exit-box-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-exit-box-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-exit-box-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-exit-box-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-feed-statistics-53e4fc6f46b4ed911de81fb486aade37.yaml b/nuclei-templates/cve-less/plugins/wordpress-feed-statistics-53e4fc6f46b4ed911de81fb486aade37.yaml new file mode 100644 index 0000000000..ef7a57aeb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-feed-statistics-53e4fc6f46b4ed911de81fb486aade37.yaml @@ -0,0 +1,58 @@ +id: wordpress-feed-statistics-53e4fc6f46b4ed911de81fb486aade37 + +info: + name: > + Feed Statistics <= 4.1 - Cross-Site Request Forgery via init + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5740c07-28b3-40ce-997e-e4ec76348cf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-feed-statistics/" + google-query: inurl:"/wp-content/plugins/wordpress-feed-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-feed-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-feed-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-feed-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-feed-statistics-de270735c8bc70be908d067be8516116.yaml b/nuclei-templates/cve-less/plugins/wordpress-feed-statistics-de270735c8bc70be908d067be8516116.yaml new file mode 100644 index 0000000000..ed3d8f9cb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-feed-statistics-de270735c8bc70be908d067be8516116.yaml @@ -0,0 +1,58 @@ +id: wordpress-feed-statistics-de270735c8bc70be908d067be8516116 + +info: + name: > + Feed Statistics < 4.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dca8f186-c58a-40bc-b1d1-b29bcf4631c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-feed-statistics/" + google-query: inurl:"/wp-content/plugins/wordpress-feed-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-feed-statistics,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-feed-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-feed-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-file-monitor-573f32cd1b90d92ebe8ccd29c90cebc9.yaml b/nuclei-templates/cve-less/plugins/wordpress-file-monitor-573f32cd1b90d92ebe8ccd29c90cebc9.yaml new file mode 100644 index 0000000000..78881aab78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-file-monitor-573f32cd1b90d92ebe8ccd29c90cebc9.yaml @@ -0,0 +1,58 @@ +id: wordpress-file-monitor-573f32cd1b90d92ebe8ccd29c90cebc9 + +info: + name: > + WordPress File Monitor <= 2.3.3 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76d96ab1-e667-4242-aee3-95f8dfb07ccd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-file-monitor/" + google-query: inurl:"/wp-content/plugins/wordpress-file-monitor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-file-monitor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-file-monitor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-file-monitor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-12fc948c06bbe2558fcf0a602f5f480e.yaml b/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-12fc948c06bbe2558fcf0a602f5f480e.yaml new file mode 100644 index 0000000000..248c1319be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-12fc948c06bbe2558fcf0a602f5f480e.yaml @@ -0,0 +1,58 @@ +id: wordpress-file-upload-pro-12fc948c06bbe2558fcf0a602f5f480e + +info: + name: > + WordPress File Upload / WordPress File Upload Pro <= 4.19.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23334d94-e5b8-4c88-8765-02ad19e17248?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-file-upload-pro/" + google-query: inurl:"/wp-content/plugins/wordpress-file-upload-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-file-upload-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-file-upload-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-file-upload-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-6bee4ceb90dc1010814fe03431f27200.yaml b/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-6bee4ceb90dc1010814fe03431f27200.yaml new file mode 100644 index 0000000000..e28973f39d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-6bee4ceb90dc1010814fe03431f27200.yaml @@ -0,0 +1,58 @@ +id: wordpress-file-upload-pro-6bee4ceb90dc1010814fe03431f27200 + +info: + name: > + WordPress File Upload / WordPress File Upload Pro <= 4.19.1 - Authenticated (Administrator+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abd6eeac-0a7e-4762-809f-593cd85f303d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-file-upload-pro/" + google-query: inurl:"/wp-content/plugins/wordpress-file-upload-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-file-upload-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-file-upload-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-file-upload-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-7723e642214a4cc19dd0a90f922c5611.yaml b/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-7723e642214a4cc19dd0a90f922c5611.yaml new file mode 100644 index 0000000000..a039e9c3a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-file-upload-pro-7723e642214a4cc19dd0a90f922c5611.yaml @@ -0,0 +1,58 @@ +id: wordpress-file-upload-pro-7723e642214a4cc19dd0a90f922c5611 + +info: + name: > + WordPress File Upload / WordPress File Upload Pro <= 4.16.2 - Authenticated (Contributor+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9cc0348-396e-4be1-92f5-851d20804ef5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-file-upload-pro/" + google-query: inurl:"/wp-content/plugins/wordpress-file-upload-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-file-upload-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-file-upload-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-file-upload-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-firewall-2-82484b577e47d68881c7ffa118db364c.yaml b/nuclei-templates/cve-less/plugins/wordpress-firewall-2-82484b577e47d68881c7ffa118db364c.yaml new file mode 100644 index 0000000000..113e2251f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-firewall-2-82484b577e47d68881c7ffa118db364c.yaml @@ -0,0 +1,58 @@ +id: wordpress-firewall-2-82484b577e47d68881c7ffa118db364c + +info: + name: > + WordPress Firewall 2 <= 1.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae771d1-9c4e-4123-9221-146e7ba2c2ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-firewall-2/" + google-query: inurl:"/wp-content/plugins/wordpress-firewall-2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-firewall-2,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-firewall-2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-firewall-2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-flash-uploader-c25ccd4ececc7e49a3a30276bcef3c5c.yaml b/nuclei-templates/cve-less/plugins/wordpress-flash-uploader-c25ccd4ececc7e49a3a30276bcef3c5c.yaml new file mode 100644 index 0000000000..0e5b7870f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-flash-uploader-c25ccd4ececc7e49a3a30276bcef3c5c.yaml @@ -0,0 +1,58 @@ +id: wordpress-flash-uploader-c25ccd4ececc7e49a3a30276bcef3c5c + +info: + name: > + Flash Uploader <= 3.1.2 - Arbitrary Command Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1388322-d935-4101-a6c4-a7c99228ddec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-flash-uploader/" + google-query: inurl:"/wp-content/plugins/wordpress-flash-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-flash-uploader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-flash-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-flash-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-form-manager-19a0491cf914c310a86ae542abd14b9a.yaml b/nuclei-templates/cve-less/plugins/wordpress-form-manager-19a0491cf914c310a86ae542abd14b9a.yaml new file mode 100644 index 0000000000..74fa4103fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-form-manager-19a0491cf914c310a86ae542abd14b9a.yaml @@ -0,0 +1,58 @@ +id: wordpress-form-manager-19a0491cf914c310a86ae542abd14b9a + +info: + name: > + Form Manager <= 1.7.2 - Authenticated Remote Command Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f033d5d-d76b-4c63-80bc-32fdd0e7987e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-form-manager/" + google-query: inurl:"/wp-content/plugins/wordpress-form-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-form-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-form-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-form-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-gallery-plugin-757461bd55fd10188ca28b32819858c1.yaml b/nuclei-templates/cve-less/plugins/wordpress-gallery-plugin-757461bd55fd10188ca28b32819858c1.yaml new file mode 100644 index 0000000000..98d582344f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-gallery-plugin-757461bd55fd10188ca28b32819858c1.yaml @@ -0,0 +1,58 @@ +id: wordpress-gallery-plugin-757461bd55fd10188ca28b32819858c1 + +info: + name: > + WordPress Gallery Plugin <= 1.4 - Unauthenticated Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1374b266-4b20-4706-a4d2-482122964693?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-gallery-plugin/" + google-query: inurl:"/wp-content/plugins/wordpress-gallery-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-gallery-plugin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-gallery-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-gallery-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-gallery-transformation-352ac8649ed0ca01e334a505a5c69503.yaml b/nuclei-templates/cve-less/plugins/wordpress-gallery-transformation-352ac8649ed0ca01e334a505a5c69503.yaml new file mode 100644 index 0000000000..e3c9b99ccd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-gallery-transformation-352ac8649ed0ca01e334a505a5c69503.yaml @@ -0,0 +1,58 @@ +id: wordpress-gallery-transformation-352ac8649ed0ca01e334a505a5c69503 + +info: + name: > + WordPress Gallery Transforation < 0.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35b74f5b-f088-4307-81ba-2c379754c4a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-gallery-transformation/" + google-query: inurl:"/wp-content/plugins/wordpress-gallery-transformation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-gallery-transformation,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-gallery-transformation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-gallery-transformation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-gdpr-8d35451021499279a9a8ae84e508d492.yaml b/nuclei-templates/cve-less/plugins/wordpress-gdpr-8d35451021499279a9a8ae84e508d492.yaml new file mode 100644 index 0000000000..784b0ef2e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-gdpr-8d35451021499279a9a8ae84e508d492.yaml @@ -0,0 +1,58 @@ +id: wordpress-gdpr-8d35451021499279a9a8ae84e508d492 + +info: + name: > + WordPress GDPR & CCPA < 1.9.26 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe023bc0-11b9-4520-874a-4656f633d4ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-gdpr/" + google-query: inurl:"/wp-content/plugins/wordpress-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-gdpr-fcc5426738caa36fef03b50110efc0b4.yaml b/nuclei-templates/cve-less/plugins/wordpress-gdpr-fcc5426738caa36fef03b50110efc0b4.yaml new file mode 100644 index 0000000000..0536897e34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-gdpr-fcc5426738caa36fef03b50110efc0b4.yaml @@ -0,0 +1,58 @@ +id: wordpress-gdpr-fcc5426738caa36fef03b50110efc0b4 + +info: + name: > + WordPress GDPR & CCPA <= 1.9.26 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e91f4af-7ac6-4c85-bbf4-ac06d516a570?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-gdpr/" + google-query: inurl:"/wp-content/plugins/wordpress-gdpr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-gdpr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-gdpr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-gdpr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-https-0f5a748a6662b40f3b68d87419a0f759.yaml b/nuclei-templates/cve-less/plugins/wordpress-https-0f5a748a6662b40f3b68d87419a0f759.yaml new file mode 100644 index 0000000000..63561f5312 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-https-0f5a748a6662b40f3b68d87419a0f759.yaml @@ -0,0 +1,58 @@ +id: wordpress-https-0f5a748a6662b40f3b68d87419a0f759 + +info: + name: > + WordPress HTTPS (SSL) <= 3.4.0 - Missing Authorization to Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49e4dc41-dd5a-4689-9818-e742d1def2f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-https/" + google-query: inurl:"/wp-content/plugins/wordpress-https/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-https,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-https/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-https" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-instagram-feed-81a1379b5306a9cfccfcaaf08bd3abdb.yaml b/nuclei-templates/cve-less/plugins/wordpress-instagram-feed-81a1379b5306a9cfccfcaaf08bd3abdb.yaml new file mode 100644 index 0000000000..c99d3670a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-instagram-feed-81a1379b5306a9cfccfcaaf08bd3abdb.yaml @@ -0,0 +1,58 @@ +id: wordpress-instagram-feed-81a1379b5306a9cfccfcaaf08bd3abdb + +info: + name: > + WD Instagram Feed Premium <= 1.3.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a2c11bb-88cb-43ae-b9b7-5b6262a315e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-instagram-feed/" + google-query: inurl:"/wp-content/plugins/wordpress-instagram-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-instagram-feed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-instagram-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-instagram-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-language-a96c597219ed29fc68772417c5a3093c.yaml b/nuclei-templates/cve-less/plugins/wordpress-language-a96c597219ed29fc68772417c5a3093c.yaml new file mode 100644 index 0000000000..3ace245dea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-language-a96c597219ed29fc68772417c5a3093c.yaml @@ -0,0 +1,58 @@ +id: wordpress-language-a96c597219ed29fc68772417c5a3093c + +info: + name: > + Language <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11fc48b0-cee2-4392-866b-5c0f366e5d98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-language/" + google-query: inurl:"/wp-content/plugins/wordpress-language/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-language,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-language/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-language" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-member-private-conversation-06202f5e4de9fb07c515215afeba85ee.yaml b/nuclei-templates/cve-less/plugins/wordpress-member-private-conversation-06202f5e4de9fb07c515215afeba85ee.yaml new file mode 100644 index 0000000000..3bf0b45a83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-member-private-conversation-06202f5e4de9fb07c515215afeba85ee.yaml @@ -0,0 +1,58 @@ +id: wordpress-member-private-conversation-06202f5e4de9fb07c515215afeba85ee + +info: + name: > + Nmedia WordPress Member Conversation < 1.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9b67fc9-87a2-4bd6-a45b-fdfe43ce7ed8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-member-private-conversation/" + google-query: inurl:"/wp-content/plugins/wordpress-member-private-conversation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-member-private-conversation,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-member-private-conversation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-member-private-conversation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-meta-robots-f1ed96d1b2d98c3026e1dd704ae2087a.yaml b/nuclei-templates/cve-less/plugins/wordpress-meta-robots-f1ed96d1b2d98c3026e1dd704ae2087a.yaml new file mode 100644 index 0000000000..219b3a1175 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-meta-robots-f1ed96d1b2d98c3026e1dd704ae2087a.yaml @@ -0,0 +1,58 @@ +id: wordpress-meta-robots-f1ed96d1b2d98c3026e1dd704ae2087a + +info: + name: > + WordPress Meta Robots <= 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/974b9211-04e4-4309-8a7b-aeccc5b55ce7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-meta-robots/" + google-query: inurl:"/wp-content/plugins/wordpress-meta-robots/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-meta-robots,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-meta-robots/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-meta-robots" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-6e0d2cdfe1ad1668438fc68f481cce1d.yaml b/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-6e0d2cdfe1ad1668438fc68f481cce1d.yaml new file mode 100644 index 0000000000..d49f43e3a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-6e0d2cdfe1ad1668438fc68f481cce1d.yaml @@ -0,0 +1,58 @@ +id: wordpress-mobile-pack-6e0d2cdfe1ad1668438fc68f481cce1d + +info: + name: > + WordPress Mobile Pack – Mobile Plugin for Progressive Web Apps & Hybrid Mobile Apps < 2.1.3 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32594284-a7ed-4f43-b0cf-dc0e561768c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-mobile-pack/" + google-query: inurl:"/wp-content/plugins/wordpress-mobile-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-mobile-pack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-mobile-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-mobile-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-860afca6e31101e845f00131fa4002f8.yaml b/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-860afca6e31101e845f00131fa4002f8.yaml new file mode 100644 index 0000000000..d594a4b941 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-860afca6e31101e845f00131fa4002f8.yaml @@ -0,0 +1,58 @@ +id: wordpress-mobile-pack-860afca6e31101e845f00131fa4002f8 + +info: + name: > + WordPress Mobile Pack – Mobile Plugin for Progressive Web Apps & Hybrid Mobile Apps < 2.0.2 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb6bbbbb-b201-4fd5-8ee1-2369fb27070f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-mobile-pack/" + google-query: inurl:"/wp-content/plugins/wordpress-mobile-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-mobile-pack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-mobile-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-mobile-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-961d82f12e20011650e9c4bbef7df9eb.yaml b/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-961d82f12e20011650e9c4bbef7df9eb.yaml new file mode 100644 index 0000000000..1f03570d4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-mobile-pack-961d82f12e20011650e9c4bbef7df9eb.yaml @@ -0,0 +1,58 @@ +id: wordpress-mobile-pack-961d82f12e20011650e9c4bbef7df9eb + +info: + name: > + WordPress Mobile Pack <= 3.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f545c20-5be1-42bc-9268-640590ee4bf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-mobile-pack/" + google-query: inurl:"/wp-content/plugins/wordpress-mobile-pack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-mobile-pack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-mobile-pack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-mobile-pack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-multisite-user-sync-438cf6d09d279a07d988d54f0a418a95.yaml b/nuclei-templates/cve-less/plugins/wordpress-multisite-user-sync-438cf6d09d279a07d988d54f0a418a95.yaml new file mode 100644 index 0000000000..340b688774 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-multisite-user-sync-438cf6d09d279a07d988d54f0a418a95.yaml @@ -0,0 +1,58 @@ +id: wordpress-multisite-user-sync-438cf6d09d279a07d988d54f0a418a95 + +info: + name: > + WordPress Multisite User Sync/Unsync (Premium) <= 2.1.1 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c6e444a-3737-46ab-b5e8-b0c1f215050a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-multisite-user-sync/" + google-query: inurl:"/wp-content/plugins/wordpress-multisite-user-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-multisite-user-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-multisite-user-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-multisite-user-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-nextgen-galleryview-64d1005014509c77d54b45b09764489b.yaml b/nuclei-templates/cve-less/plugins/wordpress-nextgen-galleryview-64d1005014509c77d54b45b09764489b.yaml new file mode 100644 index 0000000000..f7c1874b23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-nextgen-galleryview-64d1005014509c77d54b45b09764489b.yaml @@ -0,0 +1,58 @@ +id: wordpress-nextgen-galleryview-64d1005014509c77d54b45b09764489b + +info: + name: > + NextGen GalleryView <= 0.5.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/052ea3af-96d8-4e83-b4e7-3db30b556d0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-nextgen-galleryview/" + google-query: inurl:"/wp-content/plugins/wordpress-nextgen-galleryview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-nextgen-galleryview,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-nextgen-galleryview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-nextgen-galleryview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-nextgen-galleryview-8517e4991bb30bbf1e9448cc624f7284.yaml b/nuclei-templates/cve-less/plugins/wordpress-nextgen-galleryview-8517e4991bb30bbf1e9448cc624f7284.yaml new file mode 100644 index 0000000000..bede9296ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-nextgen-galleryview-8517e4991bb30bbf1e9448cc624f7284.yaml @@ -0,0 +1,58 @@ +id: wordpress-nextgen-galleryview-8517e4991bb30bbf1e9448cc624f7284 + +info: + name: > + NextGen GalleryView <= 0.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/043ed446-3af3-4d90-8da7-b1fe73e06bba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-nextgen-galleryview/" + google-query: inurl:"/wp-content/plugins/wordpress-nextgen-galleryview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-nextgen-galleryview,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-nextgen-galleryview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-nextgen-galleryview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-ping-optimizer-2760701a1ef8db138bc19b206575f1f8.yaml b/nuclei-templates/cve-less/plugins/wordpress-ping-optimizer-2760701a1ef8db138bc19b206575f1f8.yaml new file mode 100644 index 0000000000..86907520b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-ping-optimizer-2760701a1ef8db138bc19b206575f1f8.yaml @@ -0,0 +1,58 @@ +id: wordpress-ping-optimizer-2760701a1ef8db138bc19b206575f1f8 + +info: + name: > + WordPress Ping Optimizer <= 2.35.1.3.0 - Cross-Site Request Forgery to Log Clearing + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e93072c-eb0c-46a7-8ed7-7f48916dab50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-ping-optimizer/" + google-query: inurl:"/wp-content/plugins/wordpress-ping-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-ping-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-ping-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-ping-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.35.1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-ping-optimizer-6b5c7dbafc7933afc0d5047343324578.yaml b/nuclei-templates/cve-less/plugins/wordpress-ping-optimizer-6b5c7dbafc7933afc0d5047343324578.yaml new file mode 100644 index 0000000000..5d3850aa4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-ping-optimizer-6b5c7dbafc7933afc0d5047343324578.yaml @@ -0,0 +1,58 @@ +id: wordpress-ping-optimizer-6b5c7dbafc7933afc0d5047343324578 + +info: + name: > + WordPress Ping Optimizer <= 2.35.1.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f9ce7a1-3e90-4b98-9fc2-4fcd37d332ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-ping-optimizer/" + google-query: inurl:"/wp-content/plugins/wordpress-ping-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-ping-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-ping-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-ping-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.35.1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-plugin-for-simple-google-adsense-insertion-1bd642d2e3ff9973b88e9924e704fbb7.yaml b/nuclei-templates/cve-less/plugins/wordpress-plugin-for-simple-google-adsense-insertion-1bd642d2e3ff9973b88e9924e704fbb7.yaml new file mode 100644 index 0000000000..a573bd8b8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-plugin-for-simple-google-adsense-insertion-1bd642d2e3ff9973b88e9924e704fbb7.yaml @@ -0,0 +1,58 @@ +id: wordpress-plugin-for-simple-google-adsense-insertion-1bd642d2e3ff9973b88e9924e704fbb7 + +info: + name: > + WP Simple Adsense Insertion <= 2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08e7125a-0fab-4a4c-8428-127f71847810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-plugin-for-simple-google-adsense-insertion/" + google-query: inurl:"/wp-content/plugins/wordpress-plugin-for-simple-google-adsense-insertion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-plugin-for-simple-google-adsense-insertion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-plugin-for-simple-google-adsense-insertion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-plugin-for-simple-google-adsense-insertion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popular-posts-05a7a0498d570dab847e4a9ab6951cdd.yaml b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-05a7a0498d570dab847e4a9ab6951cdd.yaml new file mode 100644 index 0000000000..e91fe3a31a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-05a7a0498d570dab847e4a9ab6951cdd.yaml @@ -0,0 +1,58 @@ +id: wordpress-popular-posts-05a7a0498d570dab847e4a9ab6951cdd + +info: + name: > + WordPress Popular Posts <= 5.3.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9012824-7221-4b93-a5fb-65caf7994e92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popular-posts/" + google-query: inurl:"/wp-content/plugins/wordpress-popular-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popular-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popular-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popular-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popular-posts-178d99b6f6579f15b7e84dce26c43816.yaml b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-178d99b6f6579f15b7e84dce26c43816.yaml new file mode 100644 index 0000000000..a010714949 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-178d99b6f6579f15b7e84dce26c43816.yaml @@ -0,0 +1,58 @@ +id: wordpress-popular-posts-178d99b6f6579f15b7e84dce26c43816 + +info: + name: > + WordPress Popular Posts <= 5.3.2 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47d4cf6a-400f-4001-95de-f93e574bb2ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popular-posts/" + google-query: inurl:"/wp-content/plugins/wordpress-popular-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popular-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popular-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popular-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popular-posts-93d2bfa4a5e5debcba57e4ef188367d5.yaml b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-93d2bfa4a5e5debcba57e4ef188367d5.yaml new file mode 100644 index 0000000000..b3340960e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-93d2bfa4a5e5debcba57e4ef188367d5.yaml @@ -0,0 +1,58 @@ +id: wordpress-popular-posts-93d2bfa4a5e5debcba57e4ef188367d5 + +info: + name: > + WordPress Popular Posts <= 6.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a91e8713-a760-4acd-9987-2a6b11dbdd56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popular-posts/" + google-query: inurl:"/wp-content/plugins/wordpress-popular-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popular-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popular-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popular-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popular-posts-9912c297cff35bf8bf01c7b24d0db7f5.yaml b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-9912c297cff35bf8bf01c7b24d0db7f5.yaml new file mode 100644 index 0000000000..ef0baba919 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-9912c297cff35bf8bf01c7b24d0db7f5.yaml @@ -0,0 +1,58 @@ +id: wordpress-popular-posts-9912c297cff35bf8bf01c7b24d0db7f5 + +info: + name: > + WordPress Popular Posts <= 5.3.2 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb37b784-b1ff-4cee-889d-751218e5b95d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popular-posts/" + google-query: inurl:"/wp-content/plugins/wordpress-popular-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popular-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popular-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popular-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popular-posts-b56b584c99468f4e887375bc7db1f73b.yaml b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-b56b584c99468f4e887375bc7db1f73b.yaml new file mode 100644 index 0000000000..f485cc7550 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-b56b584c99468f4e887375bc7db1f73b.yaml @@ -0,0 +1,58 @@ +id: wordpress-popular-posts-b56b584c99468f4e887375bc7db1f73b + +info: + name: > + WordPress Popular Posts <= 5.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db2a0b6f-5629-4ebe-8431-ebb3bc583e31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popular-posts/" + google-query: inurl:"/wp-content/plugins/wordpress-popular-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popular-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popular-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popular-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popular-posts-c4493263837f30eb253dcd6ff28e47dc.yaml b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-c4493263837f30eb253dcd6ff28e47dc.yaml new file mode 100644 index 0000000000..75315f460d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popular-posts-c4493263837f30eb253dcd6ff28e47dc.yaml @@ -0,0 +1,58 @@ +id: wordpress-popular-posts-c4493263837f30eb253dcd6ff28e47dc + +info: + name: > + WordPress Popular Posts <= 6.0.5 - Unauthenticated Views Changes + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f42b3fc-cb2a-4e95-a55b-608ae64d8b58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popular-posts/" + google-query: inurl:"/wp-content/plugins/wordpress-popular-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popular-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popular-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popular-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popup-38f6be428d034f5c009a03a3e9513d4f.yaml b/nuclei-templates/cve-less/plugins/wordpress-popup-38f6be428d034f5c009a03a3e9513d4f.yaml new file mode 100644 index 0000000000..369cf0db15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popup-38f6be428d034f5c009a03a3e9513d4f.yaml @@ -0,0 +1,58 @@ +id: wordpress-popup-38f6be428d034f5c009a03a3e9513d4f + +info: + name: > + Hustle <= 7.6.4 = Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e74be387-1413-49c5-91c6-66e620562b42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popup/" + google-query: inurl:"/wp-content/plugins/wordpress-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popup-a5647b646e9ca22a1d24f5022994a6b7.yaml b/nuclei-templates/cve-less/plugins/wordpress-popup-a5647b646e9ca22a1d24f5022994a6b7.yaml new file mode 100644 index 0000000000..a8cc307ab9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popup-a5647b646e9ca22a1d24f5022994a6b7.yaml @@ -0,0 +1,58 @@ +id: wordpress-popup-a5647b646e9ca22a1d24f5022994a6b7 + +info: + name: > + Hustle <= 6.0.7 - Unauthenticated CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57d0991b-f10e-4ab8-a8a2-55bf708eefee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popup/" + google-query: inurl:"/wp-content/plugins/wordpress-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-popup-a9d45b4a14ad045ecea1bcd26aa66e30.yaml b/nuclei-templates/cve-less/plugins/wordpress-popup-a9d45b4a14ad045ecea1bcd26aa66e30.yaml new file mode 100644 index 0000000000..c89ccd358d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-popup-a9d45b4a14ad045ecea1bcd26aa66e30.yaml @@ -0,0 +1,58 @@ +id: wordpress-popup-a9d45b4a14ad045ecea1bcd26aa66e30 + +info: + name: > + Hustle <= 7.8.3 - Sensitive Information Exposure via Exposed Hubspot API Keys + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-popup/" + google-query: inurl:"/wp-content/plugins/wordpress-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-popup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-processing-embed-336c529affe134c8a71f1e7879ec0dcb.yaml b/nuclei-templates/cve-less/plugins/wordpress-processing-embed-336c529affe134c8a71f1e7879ec0dcb.yaml new file mode 100644 index 0000000000..f1285d0113 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-processing-embed-336c529affe134c8a71f1e7879ec0dcb.yaml @@ -0,0 +1,58 @@ +id: wordpress-processing-embed-336c529affe134c8a71f1e7879ec0dcb + +info: + name: > + WordPress Processing Embed <= 0.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3cc196c8-1f8f-4ddd-9f27-45d318895b91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-processing-embed/" + google-query: inurl:"/wp-content/plugins/wordpress-processing-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-processing-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-processing-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-processing-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-sentinel-3d4fded5713d977453c4246e8903bc20.yaml b/nuclei-templates/cve-less/plugins/wordpress-sentinel-3d4fded5713d977453c4246e8903bc20.yaml new file mode 100644 index 0000000000..9156025be4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-sentinel-3d4fded5713d977453c4246e8903bc20.yaml @@ -0,0 +1,58 @@ +id: wordpress-sentinel-3d4fded5713d977453c4246e8903bc20 + +info: + name: > + WordPress Sentinel <= 1.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2642726-a878-46d1-9c17-a4c8f4d5e315?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-sentinel/" + google-query: inurl:"/wp-content/plugins/wordpress-sentinel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-sentinel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-sentinel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-sentinel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-sentinel-909fb52910e98c1692077a1c3b14b033.yaml b/nuclei-templates/cve-less/plugins/wordpress-sentinel-909fb52910e98c1692077a1c3b14b033.yaml new file mode 100644 index 0000000000..46a2b5cac4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-sentinel-909fb52910e98c1692077a1c3b14b033.yaml @@ -0,0 +1,58 @@ +id: wordpress-sentinel-909fb52910e98c1692077a1c3b14b033 + +info: + name: > + WordPress Sentinel < 1.0.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c16b6a15-9f15-44a6-8663-201f64af81cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-sentinel/" + google-query: inurl:"/wp-content/plugins/wordpress-sentinel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-sentinel,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-sentinel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-sentinel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-sentinel-aeea609833832e1baa1f0bd27367ec6d.yaml b/nuclei-templates/cve-less/plugins/wordpress-sentinel-aeea609833832e1baa1f0bd27367ec6d.yaml new file mode 100644 index 0000000000..a35228eb04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-sentinel-aeea609833832e1baa1f0bd27367ec6d.yaml @@ -0,0 +1,58 @@ +id: wordpress-sentinel-aeea609833832e1baa1f0bd27367ec6d + +info: + name: > + WordPress Sentinel <= 1.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a691a44d-0a33-4f13-9afe-255c557ee10f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-sentinel/" + google-query: inurl:"/wp-content/plugins/wordpress-sentinel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-sentinel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-sentinel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-sentinel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-0cab757218d53679bf548112d251d15c.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-0cab757218d53679bf548112d251d15c.yaml new file mode 100644 index 0000000000..d4bae013ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-0cab757218d53679bf548112d251d15c.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-0cab757218d53679bf548112d251d15c + +info: + name: > + Yoast SEO <= 1.7.3.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc7d0124-9ddd-4f88-bffd-e09e10137a3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.7', '<= 1.7.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-307e49126b500d4032b9dda6877b05b0.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-307e49126b500d4032b9dda6877b05b0.yaml new file mode 100644 index 0000000000..4136655c60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-307e49126b500d4032b9dda6877b05b0.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-307e49126b500d4032b9dda6877b05b0 + +info: + name: > + Yoast SEO <= 2.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fe34989-493c-4883-a1ca-454262919202?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-3bbe5a341cf1e072236bafa671320c7b.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-3bbe5a341cf1e072236bafa671320c7b.yaml new file mode 100644 index 0000000000..4c88962b49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-3bbe5a341cf1e072236bafa671320c7b.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-3bbe5a341cf1e072236bafa671320c7b + +info: + name: > + Yoast SEO <= 22.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e04b161-3cd0-454d-869c-56f42bd8afb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 22.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-3ea36d65c6ea5b35072fe01e09307dfa.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-3ea36d65c6ea5b35072fe01e09307dfa.yaml new file mode 100644 index 0000000000..166e62b4ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-3ea36d65c6ea5b35072fe01e09307dfa.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-3ea36d65c6ea5b35072fe01e09307dfa + +info: + name: > + Yoast SEO <= 9.1.0 - Race Condition to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8b62157-8c32-462f-aba7-dab137f98f32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-4a0b4f088a324947da6aaf5af5ea450e.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-4a0b4f088a324947da6aaf5af5ea450e.yaml new file mode 100644 index 0000000000..fadaf99af6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-4a0b4f088a324947da6aaf5af5ea450e.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-4a0b4f088a324947da6aaf5af5ea450e + +info: + name: > + Yoast SEO <= 1.7.3.3 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddf4ec13-bca3-4994-9e11-11fbbead371a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.7', '<= 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-5b5b01b1109744d37f0c0118833ce729.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-5b5b01b1109744d37f0c0118833ce729.yaml new file mode 100644 index 0000000000..5f6dfc38f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-5b5b01b1109744d37f0c0118833ce729.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-5b5b01b1109744d37f0c0118833ce729 + +info: + name: > + Yoast SEO <= 3.2.4 - Sensitive Data Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7701dd2-8452-4529-a931-db2553ca1ae5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-5e0b93fe3a022a24343b38fe5a2f7283.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-5e0b93fe3a022a24343b38fe5a2f7283.yaml new file mode 100644 index 0000000000..178e25ce82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-5e0b93fe3a022a24343b38fe5a2f7283.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-5e0b93fe3a022a24343b38fe5a2f7283 + +info: + name: > + Yoast SEO <= 3.4.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cde6b5b-f760-467b-940f-06a1f983ddc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-729af181e052b537a824f590788c4026.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-729af181e052b537a824f590788c4026.yaml new file mode 100644 index 0000000000..ff967c853d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-729af181e052b537a824f590788c4026.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-729af181e052b537a824f590788c4026 + +info: + name: > + Yoast SEO <= 1.4.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d33594b-e7b7-4685-97c1-37a2fecc1b8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-828cafaa2f518b65826b98ac79418f2d.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-828cafaa2f518b65826b98ac79418f2d.yaml new file mode 100644 index 0000000000..3bfedaf167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-828cafaa2f518b65826b98ac79418f2d.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-828cafaa2f518b65826b98ac79418f2d + +info: + name: > + Yoast SEO <= 3.2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48d0e0e0-81db-46ef-ba64-daa2a4079b79?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-a3fa83da79405e5abf7cb2c0fd1ed37b.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-a3fa83da79405e5abf7cb2c0fd1ed37b.yaml new file mode 100644 index 0000000000..5546ca7a04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-a3fa83da79405e5abf7cb2c0fd1ed37b.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-a3fa83da79405e5abf7cb2c0fd1ed37b + +info: + name: > + Yoast SEO <= 21.0 - Authenticated (Seo Manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/385a82ff-50ad-4787-845b-fb5f639f6466?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-c4ae1764980f5453e8096a0bd6623d73.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-c4ae1764980f5453e8096a0bd6623d73.yaml new file mode 100644 index 0000000000..09bd7419ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-c4ae1764980f5453e8096a0bd6623d73.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-c4ae1764980f5453e8096a0bd6623d73 + +info: + name: > + Yoast SEO <= 2.1.1 - Cross Site Scripting via post_title parameter + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4187f559-87ba-46ab-9b45-7a36dd98d71d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-e132f1944facf59d50c4939f26f4d93f.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-e132f1944facf59d50c4939f26f4d93f.yaml new file mode 100644 index 0000000000..12cb192345 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-e132f1944facf59d50c4939f26f4d93f.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-e132f1944facf59d50c4939f26f4d93f + +info: + name: > + Yoast SEO <= 5.7.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbc393a6-8357-47b2-9abd-aa611b09eb1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-ec23ceaa5e6474fc50d6e6ec68c64eb6.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-ec23ceaa5e6474fc50d6e6ec68c64eb6.yaml new file mode 100644 index 0000000000..62c718448d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-ec23ceaa5e6474fc50d6e6ec68c64eb6.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-ec23ceaa5e6474fc50d6e6ec68c64eb6 + +info: + name: > + Yoast SEO <= 17.2 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f162e046-a7d3-4f2c-899d-6c46cb92c8ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-edb5aff062fcd8aac278362a1ce01bce.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-edb5aff062fcd8aac278362a1ce01bce.yaml new file mode 100644 index 0000000000..e95b0cd795 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-edb5aff062fcd8aac278362a1ce01bce.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-edb5aff062fcd8aac278362a1ce01bce + +info: + name: > + Yoast SEO <= 20.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0e58807-bccc-469f-82c3-a4bbf088a626?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-faaf1948155c5f302388ba2e8f465a89.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-faaf1948155c5f302388ba2e8f465a89.yaml new file mode 100644 index 0000000000..7240dd5558 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-faaf1948155c5f302388ba2e8f465a89.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-faaf1948155c5f302388ba2e8f465a89 + +info: + name: > + Yoast SEO <= 11.5 - Authenticated Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69b173ec-f7e9-4473-9b85-9a204a51cdf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo/" + google-query: inurl:"/wp-content/plugins/wordpress-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-seo-premium-4b1052f9f0f7a36afef9bbca9c94d0af.yaml b/nuclei-templates/cve-less/plugins/wordpress-seo-premium-4b1052f9f0f7a36afef9bbca9c94d0af.yaml new file mode 100644 index 0000000000..481dbd8897 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-seo-premium-4b1052f9f0f7a36afef9bbca9c94d0af.yaml @@ -0,0 +1,58 @@ +id: wordpress-seo-premium-4b1052f9f0f7a36afef9bbca9c94d0af + +info: + name: > + Yoast SEO Premium <= 20.4 - Missing Authorization to Zapier Key Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c54770f1-1409-4208-a4ab-0ff3dbc3835d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-seo-premium/" + google-query: inurl:"/wp-content/plugins/wordpress-seo-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-seo-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-seo-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-seo-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 20.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-02744bc958048e60b6fe8becee3f2311.yaml b/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-02744bc958048e60b6fe8becee3f2311.yaml new file mode 100644 index 0000000000..ed33c6404a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-02744bc958048e60b6fe8becee3f2311.yaml @@ -0,0 +1,58 @@ +id: wordpress-simple-paypal-shopping-cart-02744bc958048e60b6fe8becee3f2311 + +info: + name: > + WordPress Simple PayPal Shopping Cart <= 4.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63a9fd8b-c71a-4945-bc02-1761331df832?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-simple-paypal-shopping-cart/" + google-query: inurl:"/wp-content/plugins/wordpress-simple-paypal-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-simple-paypal-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-simple-paypal-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-simple-paypal-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-6b95e055e3edeffca7582f29e2098070.yaml b/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-6b95e055e3edeffca7582f29e2098070.yaml new file mode 100644 index 0000000000..e21bc581df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-6b95e055e3edeffca7582f29e2098070.yaml @@ -0,0 +1,58 @@ +id: wordpress-simple-paypal-shopping-cart-6b95e055e3edeffca7582f29e2098070 + +info: + name: > + WordPress Simple Shopping Cart <= 4.7.1 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac6201a1-7ca9-461b-b9ad-16407120dfae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-simple-paypal-shopping-cart/" + google-query: inurl:"/wp-content/plugins/wordpress-simple-paypal-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-simple-paypal-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-simple-paypal-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-simple-paypal-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-9a4d0d65ff4983f3b672d24a253f60cd.yaml b/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-9a4d0d65ff4983f3b672d24a253f60cd.yaml new file mode 100644 index 0000000000..b5199d9325 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-9a4d0d65ff4983f3b672d24a253f60cd.yaml @@ -0,0 +1,58 @@ +id: wordpress-simple-paypal-shopping-cart-9a4d0d65ff4983f3b672d24a253f60cd + +info: + name: > + WP Simple Shopping Cart <= 4.6.3 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4453bc-557b-4abf-85c6-4aecfd8f4012?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-simple-paypal-shopping-cart/" + google-query: inurl:"/wp-content/plugins/wordpress-simple-paypal-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-simple-paypal-shopping-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-simple-paypal-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-simple-paypal-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-d8a3146b821fb343fd351d5a10339bc8.yaml b/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-d8a3146b821fb343fd351d5a10339bc8.yaml new file mode 100644 index 0000000000..0e3d286729 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-simple-paypal-shopping-cart-d8a3146b821fb343fd351d5a10339bc8.yaml @@ -0,0 +1,58 @@ +id: wordpress-simple-paypal-shopping-cart-d8a3146b821fb343fd351d5a10339bc8 + +info: + name: > + WordPress Simple PayPal Shopping Cart < 3.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4071c361-3a68-49b7-ac50-4b32e2e1c3ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-simple-paypal-shopping-cart/" + google-query: inurl:"/wp-content/plugins/wordpress-simple-paypal-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-simple-paypal-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-simple-paypal-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-simple-paypal-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-simple-shout-box-00010ebed83feef9acaee37ee3019824.yaml b/nuclei-templates/cve-less/plugins/wordpress-simple-shout-box-00010ebed83feef9acaee37ee3019824.yaml new file mode 100644 index 0000000000..506b907a4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-simple-shout-box-00010ebed83feef9acaee37ee3019824.yaml @@ -0,0 +1,58 @@ +id: wordpress-simple-shout-box-00010ebed83feef9acaee37ee3019824 + +info: + name: > + WordPress Shout Box Widget <= 2.0.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d10f043-df2c-4e81-bd99-e478a2dca0cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-simple-shout-box/" + google-query: inurl:"/wp-content/plugins/wordpress-simple-shout-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-simple-shout-box,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-simple-shout-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-simple-shout-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-social-login-40cf6c93cbbc13dcb57a60ba2f57fb5f.yaml b/nuclei-templates/cve-less/plugins/wordpress-social-login-40cf6c93cbbc13dcb57a60ba2f57fb5f.yaml new file mode 100644 index 0000000000..a9c53d40a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-social-login-40cf6c93cbbc13dcb57a60ba2f57fb5f.yaml @@ -0,0 +1,58 @@ +id: wordpress-social-login-40cf6c93cbbc13dcb57a60ba2f57fb5f + +info: + name: > + WordPress Social Login <= 3.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b987822d-2b1b-4f79-988b-4bd731864b63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-social-login/" + google-query: inurl:"/wp-content/plugins/wordpress-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-social-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-social-login-710e5bb2b38338950e0e2ed07d09069e.yaml b/nuclei-templates/cve-less/plugins/wordpress-social-login-710e5bb2b38338950e0e2ed07d09069e.yaml new file mode 100644 index 0000000000..2496effd4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-social-login-710e5bb2b38338950e0e2ed07d09069e.yaml @@ -0,0 +1,58 @@ +id: wordpress-social-login-710e5bb2b38338950e0e2ed07d09069e + +info: + name: > + WordPress Social Login <= 3.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8b03deb-4134-4dde-8545-a14977a47209?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-social-login/" + google-query: inurl:"/wp-content/plugins/wordpress-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-social-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-social-login-adeb22f24ece0b4bc846eeeff12f100f.yaml b/nuclei-templates/cve-less/plugins/wordpress-social-login-adeb22f24ece0b4bc846eeeff12f100f.yaml new file mode 100644 index 0000000000..02e176cb71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-social-login-adeb22f24ece0b4bc846eeeff12f100f.yaml @@ -0,0 +1,58 @@ +id: wordpress-social-login-adeb22f24ece0b4bc846eeeff12f100f + +info: + name: > + WordPress Social Login <= 3.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc2c3bdb-65b9-4e0b-899f-bd08077bc8ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-social-login/" + google-query: inurl:"/wp-content/plugins/wordpress-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-social-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-social-login-e0d816c541690f9c52144ee19295acfb.yaml b/nuclei-templates/cve-less/plugins/wordpress-social-login-e0d816c541690f9c52144ee19295acfb.yaml new file mode 100644 index 0000000000..b2de4c936b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-social-login-e0d816c541690f9c52144ee19295acfb.yaml @@ -0,0 +1,58 @@ +id: wordpress-social-login-e0d816c541690f9c52144ee19295acfb + +info: + name: > + WordPress Social Login <= 2.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13e77d77-8f09-4fb9-8ff9-a8e66afe0393?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-social-login/" + google-query: inurl:"/wp-content/plugins/wordpress-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-social-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-social-ring-62254c40802e5286c6fd0b29e99ea8df.yaml b/nuclei-templates/cve-less/plugins/wordpress-social-ring-62254c40802e5286c6fd0b29e99ea8df.yaml new file mode 100644 index 0000000000..0872d7d101 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-social-ring-62254c40802e5286c6fd0b29e99ea8df.yaml @@ -0,0 +1,58 @@ +id: wordpress-social-ring-62254c40802e5286c6fd0b29e99ea8df + +info: + name: > + Social Ring (Facebook Like, Google +1, ReTweet, LinkedIn and Pin It) <= 1.1.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0db32d66-4def-4356-96d8-74ba49e7604a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-social-ring/" + google-query: inurl:"/wp-content/plugins/wordpress-social-ring/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-social-ring,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-social-ring/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-social-ring" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-tabs-slides-b256004910fed4c7647ff561ae5de5c8.yaml b/nuclei-templates/cve-less/plugins/wordpress-tabs-slides-b256004910fed4c7647ff561ae5de5c8.yaml new file mode 100644 index 0000000000..82b1ce7b1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-tabs-slides-b256004910fed4c7647ff561ae5de5c8.yaml @@ -0,0 +1,58 @@ +id: wordpress-tabs-slides-b256004910fed4c7647ff561ae5de5c8 + +info: + name: > + WP Tabs Slides <= 2.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98ebcc70-58c3-4c9d-a1cd-776c159647ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-tabs-slides/" + google-query: inurl:"/wp-content/plugins/wordpress-tabs-slides/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-tabs-slides,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-tabs-slides/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-tabs-slides" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-toolbar-5d23bca1d1789e21db9aa8a0def5c93b.yaml b/nuclei-templates/cve-less/plugins/wordpress-toolbar-5d23bca1d1789e21db9aa8a0def5c93b.yaml new file mode 100644 index 0000000000..ca62a5aef7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-toolbar-5d23bca1d1789e21db9aa8a0def5c93b.yaml @@ -0,0 +1,58 @@ +id: wordpress-toolbar-5d23bca1d1789e21db9aa8a0def5c93b + +info: + name: > + WordPress Toolbar Plugin <= 2.2.6 - Open Redirect via wptbto + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e88a45e5-f882-419e-b0b0-612912666693?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-toolbar/" + google-query: inurl:"/wp-content/plugins/wordpress-toolbar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-toolbar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-toolbar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-toolbar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-tooltips-166d139550be5e578382c81fd839bb55.yaml b/nuclei-templates/cve-less/plugins/wordpress-tooltips-166d139550be5e578382c81fd839bb55.yaml new file mode 100644 index 0000000000..067d3e8028 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-tooltips-166d139550be5e578382c81fd839bb55.yaml @@ -0,0 +1,58 @@ +id: wordpress-tooltips-166d139550be5e578382c81fd839bb55 + +info: + name: > + WordPress Tooltips <= 9.4.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fe28cf5-466d-4a28-b6bd-6d77c54b97f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-tooltips/" + google-query: inurl:"/wp-content/plugins/wordpress-tooltips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-tooltips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-tooltips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-tooltips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-tooltips-68662c1466a6ef85961a45678881f8c7.yaml b/nuclei-templates/cve-less/plugins/wordpress-tooltips-68662c1466a6ef85961a45678881f8c7.yaml new file mode 100644 index 0000000000..76b161357d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-tooltips-68662c1466a6ef85961a45678881f8c7.yaml @@ -0,0 +1,58 @@ +id: wordpress-tooltips-68662c1466a6ef85961a45678881f8c7 + +info: + name: > + WordPress Tooltips <= 8.2.5 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6b9e63f-0492-4d51-a8ae-0874ef57e852?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-tooltips/" + google-query: inurl:"/wp-content/plugins/wordpress-tooltips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-tooltips,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-tooltips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-tooltips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-tooltips-8904938c0e9840b0a2511b1de74ee529.yaml b/nuclei-templates/cve-less/plugins/wordpress-tooltips-8904938c0e9840b0a2511b1de74ee529.yaml new file mode 100644 index 0000000000..1dc3356bcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-tooltips-8904938c0e9840b0a2511b1de74ee529.yaml @@ -0,0 +1,58 @@ +id: wordpress-tooltips-8904938c0e9840b0a2511b1de74ee529 + +info: + name: > + WordPress Tooltips <= 9.4.3 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83189c51-2605-4808-a0fa-3e5245cc0806?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-tooltips/" + google-query: inurl:"/wp-content/plugins/wordpress-tooltips/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-tooltips,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-tooltips/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-tooltips" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-twitterbot-773ba4639bef3a2cc4abde5ded928895.yaml b/nuclei-templates/cve-less/plugins/wordpress-twitterbot-773ba4639bef3a2cc4abde5ded928895.yaml new file mode 100644 index 0000000000..fe3c151586 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-twitterbot-773ba4639bef3a2cc4abde5ded928895.yaml @@ -0,0 +1,58 @@ +id: wordpress-twitterbot-773ba4639bef3a2cc4abde5ded928895 + +info: + name: > + Marketing Twitter Bot <= 1.11 - Cross-Site Request Forgery to Settings Update and Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2795202-64e6-488b-a0e1-da2923f6f791?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-twitterbot/" + google-query: inurl:"/wp-content/plugins/wordpress-twitterbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-twitterbot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-twitterbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-twitterbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-users-41da9a8fbffc2a03fc19ba494b850b3a.yaml b/nuclei-templates/cve-less/plugins/wordpress-users-41da9a8fbffc2a03fc19ba494b850b3a.yaml new file mode 100644 index 0000000000..c8891e7c56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-users-41da9a8fbffc2a03fc19ba494b850b3a.yaml @@ -0,0 +1,58 @@ +id: wordpress-users-41da9a8fbffc2a03fc19ba494b850b3a + +info: + name: > + WordPress Users <= 1.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef8a43c7-f391-44fc-882c-26c1c8b5df78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-users/" + google-query: inurl:"/wp-content/plugins/wordpress-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-users,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-users-4944da448643beff513f9225eb7219f0.yaml b/nuclei-templates/cve-less/plugins/wordpress-users-4944da448643beff513f9225eb7219f0.yaml new file mode 100644 index 0000000000..e4d908d471 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-users-4944da448643beff513f9225eb7219f0.yaml @@ -0,0 +1,58 @@ +id: wordpress-users-4944da448643beff513f9225eb7219f0 + +info: + name: > + WordPress Users <= 1.4 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c1a7bda-29c5-4b4b-bbd8-71187609892e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-users/" + google-query: inurl:"/wp-content/plugins/wordpress-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-users,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-whois-search-bd7b626f96c68af8d6a9ffc833f69a62.yaml b/nuclei-templates/cve-less/plugins/wordpress-whois-search-bd7b626f96c68af8d6a9ffc833f69a62.yaml new file mode 100644 index 0000000000..f7f7403d63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-whois-search-bd7b626f96c68af8d6a9ffc833f69a62.yaml @@ -0,0 +1,58 @@ +id: wordpress-whois-search-bd7b626f96c68af8d6a9ffc833f69a62 + +info: + name: > + WHOIS <= 1.4.2.2 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f625b10b-f104-49a8-9dbb-f880f5df8693?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-whois-search/" + google-query: inurl:"/wp-content/plugins/wordpress-whois-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-whois-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-whois-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-whois-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordpress-whois-search-e7674c99987b6c4c7435d1f976b8d7fb.yaml b/nuclei-templates/cve-less/plugins/wordpress-whois-search-e7674c99987b6c4c7435d1f976b8d7fb.yaml new file mode 100644 index 0000000000..71d542411a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordpress-whois-search-e7674c99987b6c4c7435d1f976b8d7fb.yaml @@ -0,0 +1,58 @@ +id: wordpress-whois-search-e7674c99987b6c4c7435d1f976b8d7fb + +info: + name: > + WHOIS <= 1.4.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1dbd73-6ea6-4e9d-84e2-055ab9db5f4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-whois-search/" + google-query: inurl:"/wp-content/plugins/wordpress-whois-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-whois-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-whois-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-whois-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordprezi-a32e0707f724d294df7bedd19626586f.yaml b/nuclei-templates/cve-less/plugins/wordprezi-a32e0707f724d294df7bedd19626586f.yaml new file mode 100644 index 0000000000..e2dd690dcb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordprezi-a32e0707f724d294df7bedd19626586f.yaml @@ -0,0 +1,58 @@ +id: wordprezi-a32e0707f724d294df7bedd19626586f + +info: + name: > + WordPrezi <= 0.8.2 - Authenticated (Contributor+) Strored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f8e836e-c9af-4614-83b2-c15e77d51155?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordprezi/" + google-query: inurl:"/wp-content/plugins/wordprezi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordprezi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordprezi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordprezi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordspew-cd4550e19ad68ff40f21b1f3220a5912.yaml b/nuclei-templates/cve-less/plugins/wordspew-cd4550e19ad68ff40f21b1f3220a5912.yaml new file mode 100644 index 0000000000..87d5d0df31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordspew-cd4550e19ad68ff40f21b1f3220a5912.yaml @@ -0,0 +1,58 @@ +id: wordspew-cd4550e19ad68ff40f21b1f3220a5912 + +info: + name: > + WordSpew <= 3.71 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8028b14b-8a41-4284-9560-4b8595e7eaa9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordspew/" + google-query: inurl:"/wp-content/plugins/wordspew/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordspew,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordspew/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordspew" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordthumb-b970262dad30a7d484efebc698a4fbb7.yaml b/nuclei-templates/cve-less/plugins/wordthumb-b970262dad30a7d484efebc698a4fbb7.yaml new file mode 100644 index 0000000000..8d9697d558 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordthumb-b970262dad30a7d484efebc698a4fbb7.yaml @@ -0,0 +1,58 @@ +id: wordthumb-b970262dad30a7d484efebc698a4fbb7 + +info: + name: > + TimThumb <= 2.8.13 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73776e0a-4d2a-44f9-97a2-f06055ce2c63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordthumb/" + google-query: inurl:"/wp-content/plugins/wordthumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordthumb,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordthumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordthumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordtube-95162b6c7bf303f9400020b8a2a23185.yaml b/nuclei-templates/cve-less/plugins/wordtube-95162b6c7bf303f9400020b8a2a23185.yaml new file mode 100644 index 0000000000..0c5fa81d28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordtube-95162b6c7bf303f9400020b8a2a23185.yaml @@ -0,0 +1,58 @@ +id: wordtube-95162b6c7bf303f9400020b8a2a23185 + +info: + name: > + wordTube <= 1.43 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42ff1e17-ccc2-478b-a3b5-88e3bea28a5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordtube/" + google-query: inurl:"/wp-content/plugins/wordtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordtube,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wordtube-d61196f45e716711cfb53207a0939fc2.yaml b/nuclei-templates/cve-less/plugins/wordtube-d61196f45e716711cfb53207a0939fc2.yaml new file mode 100644 index 0000000000..65b5c39183 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wordtube-d61196f45e716711cfb53207a0939fc2.yaml @@ -0,0 +1,58 @@ +id: wordtube-d61196f45e716711cfb53207a0939fc2 + +info: + name: > + wordTube <= 1.43 - Directory Traversal and File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c652a98-2762-4ecf-8037-58377d6e1b5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordtube/" + google-query: inurl:"/wp-content/plugins/wordtube/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordtube,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordtube/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordtube" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/work-the-flow-file-upload-b450a44aefe31f7479f070620cd005a5.yaml b/nuclei-templates/cve-less/plugins/work-the-flow-file-upload-b450a44aefe31f7479f070620cd005a5.yaml new file mode 100644 index 0000000000..171d0b199d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/work-the-flow-file-upload-b450a44aefe31f7479f070620cd005a5.yaml @@ -0,0 +1,58 @@ +id: work-the-flow-file-upload-b450a44aefe31f7479f070620cd005a5 + +info: + name: > + Work The Flow <= 2.3.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1833720c-e714-4ec5-9ebb-24a4612195d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/work-the-flow-file-upload/" + google-query: inurl:"/wp-content/plugins/work-the-flow-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,work-the-flow-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/work-the-flow-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "work-the-flow-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/work-the-flow-file-upload-b6c3a1e30e85d38e350b01bfe2c5f9b5.yaml b/nuclei-templates/cve-less/plugins/work-the-flow-file-upload-b6c3a1e30e85d38e350b01bfe2c5f9b5.yaml new file mode 100644 index 0000000000..378b8a482b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/work-the-flow-file-upload-b6c3a1e30e85d38e350b01bfe2c5f9b5.yaml @@ -0,0 +1,58 @@ +id: work-the-flow-file-upload-b6c3a1e30e85d38e350b01bfe2c5f9b5 + +info: + name: > + Work The Flow File Upload <= 2.5.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb271cc8-01ec-45eb-9d6f-efc55c7c3923?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/work-the-flow-file-upload/" + google-query: inurl:"/wp-content/plugins/work-the-flow-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,work-the-flow-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/work-the-flow-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "work-the-flow-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/worker-9869e7dbba52086c75e55654db902ff3.yaml b/nuclei-templates/cve-less/plugins/worker-9869e7dbba52086c75e55654db902ff3.yaml new file mode 100644 index 0000000000..434d3fc5e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/worker-9869e7dbba52086c75e55654db902ff3.yaml @@ -0,0 +1,58 @@ +id: worker-9869e7dbba52086c75e55654db902ff3 + +info: + name: > + Manage WP Worker <= 4.9.2 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92915943-c6ff-46df-adbd-382eabe44021?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/worker/" + google-query: inurl:"/wp-content/plugins/worker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,worker,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/worker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "worker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/workscout-core-295565d6c00c49b75df12a1f75ae3147.yaml b/nuclei-templates/cve-less/plugins/workscout-core-295565d6c00c49b75df12a1f75ae3147.yaml new file mode 100644 index 0000000000..159f02744a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/workscout-core-295565d6c00c49b75df12a1f75ae3147.yaml @@ -0,0 +1,58 @@ +id: workscout-core-295565d6c00c49b75df12a1f75ae3147 + +info: + name: > + WorkScout - Job Board WordPress Theme <= 2.0.31 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3785938d-d55a-487d-8709-2d3bdd4b8c0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/workscout-core/" + google-query: inurl:"/wp-content/plugins/workscout-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,workscout-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/workscout-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workscout-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/world-of-warcraft-armory-table-d94ecce4e6207ecfb48491b051e2c22d.yaml b/nuclei-templates/cve-less/plugins/world-of-warcraft-armory-table-d94ecce4e6207ecfb48491b051e2c22d.yaml new file mode 100644 index 0000000000..020275c5e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/world-of-warcraft-armory-table-d94ecce4e6207ecfb48491b051e2c22d.yaml @@ -0,0 +1,58 @@ +id: world-of-warcraft-armory-table-d94ecce4e6207ecfb48491b051e2c22d + +info: + name: > + World of Warcraft – Armory Table < 0.2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/983c603b-b9bb-4942-b554-345535886aea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/world-of-warcraft-armory-table/" + google-query: inurl:"/wp-content/plugins/world-of-warcraft-armory-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,world-of-warcraft-armory-table,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/world-of-warcraft-armory-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "world-of-warcraft-armory-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/world-travel-information-feb69abbe38ff9a6a9b07a48bdd2d2c8.yaml b/nuclei-templates/cve-less/plugins/world-travel-information-feb69abbe38ff9a6a9b07a48bdd2d2c8.yaml new file mode 100644 index 0000000000..e79056c4eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/world-travel-information-feb69abbe38ff9a6a9b07a48bdd2d2c8.yaml @@ -0,0 +1,58 @@ +id: world-travel-information-feb69abbe38ff9a6a9b07a48bdd2d2c8 + +info: + name: > + World Travel Information <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fe0df91-21f0-4eef-8064-2b283f38b181?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/world-travel-information/" + google-query: inurl:"/wp-content/plugins/world-travel-information/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,world-travel-information,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/world-travel-information/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "world-travel-information" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/worth-the-read-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/worth-the-read-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..a9ef55ddb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/worth-the-read-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: worth-the-read-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/worth-the-read/" + google-query: inurl:"/wp-content/plugins/worth-the-read/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,worth-the-read,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/worth-the-read/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "worth-the-read" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/worth-the-read-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/worth-the-read-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..e8841c6b55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/worth-the-read-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: worth-the-read-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/worth-the-read/" + google-query: inurl:"/wp-content/plugins/worth-the-read/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,worth-the-read,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/worth-the-read/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "worth-the-read" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wow-moodboard-lite-046715d681a1f3005e1ea96f6c71e30f.yaml b/nuclei-templates/cve-less/plugins/wow-moodboard-lite-046715d681a1f3005e1ea96f6c71e30f.yaml new file mode 100644 index 0000000000..87e4df7ba5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wow-moodboard-lite-046715d681a1f3005e1ea96f6c71e30f.yaml @@ -0,0 +1,58 @@ +id: wow-moodboard-lite-046715d681a1f3005e1ea96f6c71e30f + +info: + name: > + Wow Moodboard Lite <= 1.1.1.1 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f815a4e5-cca2-4b86-96f4-ad956814d685?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wow-moodboard-lite/" + google-query: inurl:"/wp-content/plugins/wow-moodboard-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wow-moodboard-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wow-moodboard-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wow-moodboard-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wowrestro-06578949edf7886954089bf5ea02f690.yaml b/nuclei-templates/cve-less/plugins/wowrestro-06578949edf7886954089bf5ea02f690.yaml new file mode 100644 index 0000000000..94e36dfea5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wowrestro-06578949edf7886954089bf5ea02f690.yaml @@ -0,0 +1,58 @@ +id: wowrestro-06578949edf7886954089bf5ea02f690 + +info: + name: > + WOWRestro – Online Ordering System For WooCommerce < 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47ccda70-8c89-4e0f-a7fa-5b80515e60dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wowrestro/" + google-query: inurl:"/wp-content/plugins/wowrestro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wowrestro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wowrestro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wowrestro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-2fa-01aeea137ad62c07f9208d787662a3f3.yaml b/nuclei-templates/cve-less/plugins/wp-2fa-01aeea137ad62c07f9208d787662a3f3.yaml new file mode 100644 index 0000000000..bbb7114e17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-2fa-01aeea137ad62c07f9208d787662a3f3.yaml @@ -0,0 +1,58 @@ +id: wp-2fa-01aeea137ad62c07f9208d787662a3f3 + +info: + name: > + WP 2FA <= 2.2.1 - Time-Based TOTP attack to Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d2ebbc4-dc8b-47e5-b8d9-758424de4426?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-2fa/" + google-query: inurl:"/wp-content/plugins/wp-2fa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-2fa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-2fa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-2fa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-2fa-2becdaea6cfb27f349b62f01ae364f94.yaml b/nuclei-templates/cve-less/plugins/wp-2fa-2becdaea6cfb27f349b62f01ae364f94.yaml new file mode 100644 index 0000000000..11d817f399 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-2fa-2becdaea6cfb27f349b62f01ae364f94.yaml @@ -0,0 +1,58 @@ +id: wp-2fa-2becdaea6cfb27f349b62f01ae364f94 + +info: + name: > + WP 2FA – Two-factor authentication for WordPress <= 2.1.0 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13c07b63-f436-45ae-9c00-d1e593a32754?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-2fa/" + google-query: inurl:"/wp-content/plugins/wp-2fa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-2fa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-2fa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-2fa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-2fa-2cdb07f7994925a2e6c4e7d56439a615.yaml b/nuclei-templates/cve-less/plugins/wp-2fa-2cdb07f7994925a2e6c4e7d56439a615.yaml new file mode 100644 index 0000000000..f06fd00674 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-2fa-2cdb07f7994925a2e6c4e7d56439a615.yaml @@ -0,0 +1,58 @@ +id: wp-2fa-2cdb07f7994925a2e6c4e7d56439a615 + +info: + name: > + WP 2FA – Two-factor authentication for WordPress <= 2.6.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8620d181-22f9-4054-9d5c-1b26a315d10c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-2fa/" + google-query: inurl:"/wp-content/plugins/wp-2fa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-2fa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-2fa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-2fa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-2fa-35260dcdba60bfeb24022f0e25251913.yaml b/nuclei-templates/cve-less/plugins/wp-2fa-35260dcdba60bfeb24022f0e25251913.yaml new file mode 100644 index 0000000000..b4b1beeac4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-2fa-35260dcdba60bfeb24022f0e25251913.yaml @@ -0,0 +1,58 @@ +id: wp-2fa-35260dcdba60bfeb24022f0e25251913 + +info: + name: > + WP 2FA – Two-factor authentication for WordPress <= 2.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0af451be-2477-453c-a230-7f3fb804398b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-2fa/" + google-query: inurl:"/wp-content/plugins/wp-2fa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-2fa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-2fa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-2fa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-2fa-4ff6298b795b2324bce636d08965d81d.yaml b/nuclei-templates/cve-less/plugins/wp-2fa-4ff6298b795b2324bce636d08965d81d.yaml new file mode 100644 index 0000000000..4bfcffd295 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-2fa-4ff6298b795b2324bce636d08965d81d.yaml @@ -0,0 +1,58 @@ +id: wp-2fa-4ff6298b795b2324bce636d08965d81d + +info: + name: > + WP 2FA – Two-factor authentication for WordPress <= 2.2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c51a3f8-dee1-4744-8353-864312c89021?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-2fa/" + google-query: inurl:"/wp-content/plugins/wp-2fa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-2fa,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-2fa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-2fa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-2fa-681ba8b639ed4b20d46dc5044edc1ee3.yaml b/nuclei-templates/cve-less/plugins/wp-2fa-681ba8b639ed4b20d46dc5044edc1ee3.yaml new file mode 100644 index 0000000000..79109de239 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-2fa-681ba8b639ed4b20d46dc5044edc1ee3.yaml @@ -0,0 +1,58 @@ +id: wp-2fa-681ba8b639ed4b20d46dc5044edc1ee3 + +info: + name: > + WP 2FA <= 2.5.0 - Insecure Direct Object Reference to Arbitrary Email Sending + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caff9be6-4161-47a0-ba47-6c8fc0c4ab40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-2fa/" + google-query: inurl:"/wp-content/plugins/wp-2fa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-2fa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-2fa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-2fa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-2fa-c057e704d00bbfb4a8d170d3b72c040a.yaml b/nuclei-templates/cve-less/plugins/wp-2fa-c057e704d00bbfb4a8d170d3b72c040a.yaml new file mode 100644 index 0000000000..7bb44d0452 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-2fa-c057e704d00bbfb4a8d170d3b72c040a.yaml @@ -0,0 +1,58 @@ +id: wp-2fa-c057e704d00bbfb4a8d170d3b72c040a + +info: + name: > + WP 2FA – Two-factor authentication for WordPress <= 2.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0feaff52-062f-45d3-bece-b2c78bdd720e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-2fa/" + google-query: inurl:"/wp-content/plugins/wp-2fa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-2fa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-2fa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-2fa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-3dbanner-rotator-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/wp-3dbanner-rotator-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..1cf71d989b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-3dbanner-rotator-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: wp-3dbanner-rotator-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-3dbanner-rotator/" + google-query: inurl:"/wp-content/plugins/wp-3dbanner-rotator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-3dbanner-rotator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-3dbanner-rotator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-3dbanner-rotator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-3dflick-slideshow-9c37c1dadae3a910f37cc6fe2a02a906.yaml b/nuclei-templates/cve-less/plugins/wp-3dflick-slideshow-9c37c1dadae3a910f37cc6fe2a02a906.yaml new file mode 100644 index 0000000000..fa06599c01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-3dflick-slideshow-9c37c1dadae3a910f37cc6fe2a02a906.yaml @@ -0,0 +1,58 @@ +id: wp-3dflick-slideshow-9c37c1dadae3a910f37cc6fe2a02a906 + +info: + name: > + 3D Flick Slideshow < 2.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff6fc652-dcf8-4ff6-b8d8-cb9fad5b34bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-3dflick-slideshow/" + google-query: inurl:"/wp-content/plugins/wp-3dflick-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-3dflick-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-3dflick-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-3dflick-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-aab17c6b24a2dfba03255d9a47e0c674.yaml b/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-aab17c6b24a2dfba03255d9a47e0c674.yaml new file mode 100644 index 0000000000..6f97252ed7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-aab17c6b24a2dfba03255d9a47e0c674.yaml @@ -0,0 +1,58 @@ +id: wp-404-auto-redirect-to-similar-post-aab17c6b24a2dfba03255d9a47e0c674 + +info: + name: > + WP 404 Auto Redirect to Similar Post <= 1.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33166510-41b2-4e9a-8bd7-501235729346?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-404-auto-redirect-to-similar-post/" + google-query: inurl:"/wp-content/plugins/wp-404-auto-redirect-to-similar-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-404-auto-redirect-to-similar-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-404-auto-redirect-to-similar-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-404-auto-redirect-to-similar-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-bdbbe04b17b8a1ca6597cc1e008085c0.yaml b/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-bdbbe04b17b8a1ca6597cc1e008085c0.yaml new file mode 100644 index 0000000000..a1937f6e90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-bdbbe04b17b8a1ca6597cc1e008085c0.yaml @@ -0,0 +1,58 @@ +id: wp-404-auto-redirect-to-similar-post-bdbbe04b17b8a1ca6597cc1e008085c0 + +info: + name: > + WP 404 Auto Redirect to Similar Post <= 1.0.4 - Reflected Cross-Site Scripting via Debug Mode URI + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/297b9605-602f-458f-8b36-a184cdbd20df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-404-auto-redirect-to-similar-post/" + google-query: inurl:"/wp-content/plugins/wp-404-auto-redirect-to-similar-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-404-auto-redirect-to-similar-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-404-auto-redirect-to-similar-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-404-auto-redirect-to-similar-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-e213c95c0a4a994ef52b0b98d3d99e14.yaml b/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-e213c95c0a4a994ef52b0b98d3d99e14.yaml new file mode 100644 index 0000000000..427ed0a797 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-404-auto-redirect-to-similar-post-e213c95c0a4a994ef52b0b98d3d99e14.yaml @@ -0,0 +1,58 @@ +id: wp-404-auto-redirect-to-similar-post-e213c95c0a4a994ef52b0b98d3d99e14 + +info: + name: > + WP 404 Auto Redirect to Similar Post <= 1.0.3 - Reflected Cross-Site Scripting via request + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eef5549-3f89-4d6f-8c4e-6e4ee6082042?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-404-auto-redirect-to-similar-post/" + google-query: inurl:"/wp-content/plugins/wp-404-auto-redirect-to-similar-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-404-auto-redirect-to-similar-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-404-auto-redirect-to-similar-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-404-auto-redirect-to-similar-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-0f680b0fba849d5d9ea4bc12dadd3c2e.yaml b/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-0f680b0fba849d5d9ea4bc12dadd3c2e.yaml new file mode 100644 index 0000000000..76b436862c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-0f680b0fba849d5d9ea4bc12dadd3c2e.yaml @@ -0,0 +1,58 @@ +id: wp-abstracts-manuscripts-manager-0f680b0fba849d5d9ea4bc12dadd3c2e + +info: + name: > + WP Abstracts <= 2.6.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba03ee30-6da7-42fc-9cc9-2408bfbb09ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-abstracts-manuscripts-manager/" + google-query: inurl:"/wp-content/plugins/wp-abstracts-manuscripts-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-abstracts-manuscripts-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-abstracts-manuscripts-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-abstracts-manuscripts-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-de1f04792375136ec89153b76014f079.yaml b/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-de1f04792375136ec89153b76014f079.yaml new file mode 100644 index 0000000000..92c75d41ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-de1f04792375136ec89153b76014f079.yaml @@ -0,0 +1,58 @@ +id: wp-abstracts-manuscripts-manager-de1f04792375136ec89153b76014f079 + +info: + name: > + WP Abstracts <= 2.6.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b74908-65ed-4b6f-856f-e95cfd64f998?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-abstracts-manuscripts-manager/" + google-query: inurl:"/wp-content/plugins/wp-abstracts-manuscripts-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-abstracts-manuscripts-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-abstracts-manuscripts-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-abstracts-manuscripts-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-fbf758a644d0a5c8124110ba01ca9800.yaml b/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-fbf758a644d0a5c8124110ba01ca9800.yaml new file mode 100644 index 0000000000..653da503ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-abstracts-manuscripts-manager-fbf758a644d0a5c8124110ba01ca9800.yaml @@ -0,0 +1,58 @@ +id: wp-abstracts-manuscripts-manager-fbf758a644d0a5c8124110ba01ca9800 + +info: + name: > + WP Abstracts <= 2.6.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/495df695-864e-4a77-bcd1-d1845c55a6c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-abstracts-manuscripts-manager/" + google-query: inurl:"/wp-content/plugins/wp-abstracts-manuscripts-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-abstracts-manuscripts-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-abstracts-manuscripts-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-abstracts-manuscripts-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-academic-people-52128069b8783cc721b252c69306747a.yaml b/nuclei-templates/cve-less/plugins/wp-academic-people-52128069b8783cc721b252c69306747a.yaml new file mode 100644 index 0000000000..6f210af24a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-academic-people-52128069b8783cc721b252c69306747a.yaml @@ -0,0 +1,58 @@ +id: wp-academic-people-52128069b8783cc721b252c69306747a + +info: + name: > + WP Academic People List <= 0.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce5efd37-131f-4b75-b682-023a07070ca0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-academic-people/" + google-query: inurl:"/wp-content/plugins/wp-academic-people/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-academic-people,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-academic-people/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-academic-people" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-accessibility-ad7eb7a1c6f0dd20fda9c7137924de5c.yaml b/nuclei-templates/cve-less/plugins/wp-accessibility-ad7eb7a1c6f0dd20fda9c7137924de5c.yaml new file mode 100644 index 0000000000..cc12ae867d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-accessibility-ad7eb7a1c6f0dd20fda9c7137924de5c.yaml @@ -0,0 +1,58 @@ +id: wp-accessibility-ad7eb7a1c6f0dd20fda9c7137924de5c + +info: + name: > + WP Accessibility < 1.7.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/766b5c62-0701-47d5-9839-445c2654d3e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-accessibility/" + google-query: inurl:"/wp-content/plugins/wp-accessibility/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-accessibility,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-accessibility/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-accessibility" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-accessibility-helper-3be3a9644337351c7a40dbeb1dd937c1.yaml b/nuclei-templates/cve-less/plugins/wp-accessibility-helper-3be3a9644337351c7a40dbeb1dd937c1.yaml new file mode 100644 index 0000000000..f7e59b12ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-accessibility-helper-3be3a9644337351c7a40dbeb1dd937c1.yaml @@ -0,0 +1,58 @@ +id: wp-accessibility-helper-3be3a9644337351c7a40dbeb1dd937c1 + +info: + name: > + WP Accessibility Helper <= 0.6.0.6 - Reflected Cross-Site Scripting via wahi + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/261b5905-9194-40d3-99cb-1c7a832218dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-accessibility-helper/" + google-query: inurl:"/wp-content/plugins/wp-accessibility-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-accessibility-helper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-accessibility-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-accessibility-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-accessibility-helper-6194829f785c406e2e428c86316d96c5.yaml b/nuclei-templates/cve-less/plugins/wp-accessibility-helper-6194829f785c406e2e428c86316d96c5.yaml new file mode 100644 index 0000000000..07a2341034 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-accessibility-helper-6194829f785c406e2e428c86316d96c5.yaml @@ -0,0 +1,58 @@ +id: wp-accessibility-helper-6194829f785c406e2e428c86316d96c5 + +info: + name: > + WP Accessibility Helper (WAH) <= 0.6.2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc186712-5314-4471-bf02-4fd580c338c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-accessibility-helper/" + google-query: inurl:"/wp-content/plugins/wp-accessibility-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-accessibility-helper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-accessibility-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-accessibility-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-accessibility-helper-bd68d113848e70b56a089eb9f2977075.yaml b/nuclei-templates/cve-less/plugins/wp-accessibility-helper-bd68d113848e70b56a089eb9f2977075.yaml new file mode 100644 index 0000000000..2064e05fd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-accessibility-helper-bd68d113848e70b56a089eb9f2977075.yaml @@ -0,0 +1,58 @@ +id: wp-accessibility-helper-bd68d113848e70b56a089eb9f2977075 + +info: + name: > + WP Accessibility Helper (WAH) <= 0.6.2.4 - Missing Authorization via AJAX action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b97b84a8-cf4e-4648-8d58-b81a71b7988c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-accessibility-helper/" + google-query: inurl:"/wp-content/plugins/wp-accessibility-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-accessibility-helper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-accessibility-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-accessibility-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-action-network-17cbc81bfbd2835ea082db7b23dfca8c.yaml b/nuclei-templates/cve-less/plugins/wp-action-network-17cbc81bfbd2835ea082db7b23dfca8c.yaml new file mode 100644 index 0000000000..1101b73f63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-action-network-17cbc81bfbd2835ea082db7b23dfca8c.yaml @@ -0,0 +1,58 @@ +id: wp-action-network-17cbc81bfbd2835ea082db7b23dfca8c + +info: + name: > + Action Network <= 1.4.2 - Reflected Cross-Site Scripting via 'search' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4366cf8-bf50-4d9f-9a85-2c2de7f7e90d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-action-network/" + google-query: inurl:"/wp-content/plugins/wp-action-network/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-action-network,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-action-network/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-action-network" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-action-network-8fe65facf4fd0cb40e8b7fae00de182d.yaml b/nuclei-templates/cve-less/plugins/wp-action-network-8fe65facf4fd0cb40e8b7fae00de182d.yaml new file mode 100644 index 0000000000..64f6bf1c40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-action-network-8fe65facf4fd0cb40e8b7fae00de182d.yaml @@ -0,0 +1,58 @@ +id: wp-action-network-8fe65facf4fd0cb40e8b7fae00de182d + +info: + name: > + WordPress Action Network 1.4.3 -Authentcated (Admin+) SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdf18ae2-f0d4-44d4-9dd1-6ac36d859d68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-action-network/" + google-query: inurl:"/wp-content/plugins/wp-action-network/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-action-network,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-action-network/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-action-network" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ada-compliance-check-basic-33ab7e0d75c2ed6bd56f09ac49100c0b.yaml b/nuclei-templates/cve-less/plugins/wp-ada-compliance-check-basic-33ab7e0d75c2ed6bd56f09ac49100c0b.yaml new file mode 100644 index 0000000000..bcf54cb2c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ada-compliance-check-basic-33ab7e0d75c2ed6bd56f09ac49100c0b.yaml @@ -0,0 +1,58 @@ +id: wp-ada-compliance-check-basic-33ab7e0d75c2ed6bd56f09ac49100c0b + +info: + name: > + WP ADA Compliance Check Basic – Most Comprehensive Web Accessibility Solution for WordPress <= 3.1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/689ed1b8-8ef9-4994-8a39-9e0b079aed9a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ada-compliance-check-basic/" + google-query: inurl:"/wp-content/plugins/wp-ada-compliance-check-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ada-compliance-check-basic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ada-compliance-check-basic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ada-compliance-check-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-admin-logo-changer-410921c5c60a1f559b97b16f075ad4ff.yaml b/nuclei-templates/cve-less/plugins/wp-admin-logo-changer-410921c5c60a1f559b97b16f075ad4ff.yaml new file mode 100644 index 0000000000..6edd50bbba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-admin-logo-changer-410921c5c60a1f559b97b16f075ad4ff.yaml @@ -0,0 +1,58 @@ +id: wp-admin-logo-changer-410921c5c60a1f559b97b16f075ad4ff + +info: + name: > + WP Admin Logo Changer <= 1.0 - Plugin's Settings Update via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd01d83e-a337-4f93-8bd0-0c9f3c786583?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-admin-logo-changer/" + google-query: inurl:"/wp-content/plugins/wp-admin-logo-changer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-admin-logo-changer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-admin-logo-changer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-admin-logo-changer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-admin-notification-center-b82cc40f758ba3c73375abdf46eafb06.yaml b/nuclei-templates/cve-less/plugins/wp-admin-notification-center-b82cc40f758ba3c73375abdf46eafb06.yaml new file mode 100644 index 0000000000..32c9a86d5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-admin-notification-center-b82cc40f758ba3c73375abdf46eafb06.yaml @@ -0,0 +1,58 @@ +id: wp-admin-notification-center-b82cc40f758ba3c73375abdf46eafb06 + +info: + name: > + Hide admin notices – Admin Notification Center <= 2.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b98c5623-15fe-4937-9a0e-770aa0ab06f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-admin-notification-center/" + google-query: inurl:"/wp-content/plugins/wp-admin-notification-center/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-admin-notification-center,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-admin-notification-center/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-admin-notification-center" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-admin-style-04d32a3642a2c96352c83010608db77d.yaml b/nuclei-templates/cve-less/plugins/wp-admin-style-04d32a3642a2c96352c83010608db77d.yaml new file mode 100644 index 0000000000..38f80f1d46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-admin-style-04d32a3642a2c96352c83010608db77d.yaml @@ -0,0 +1,58 @@ +id: wp-admin-style-04d32a3642a2c96352c83010608db77d + +info: + name: > + WP Admin Style <= 0.1.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c755b87-68b9-4a42-bb4d-ecdb4cff6de2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-admin-style/" + google-query: inurl:"/wp-content/plugins/wp-admin-style/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-admin-style,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-admin-style/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-admin-style" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-admin-ui-customize-d5f34e92eea10518421633a7bf6a6987.yaml b/nuclei-templates/cve-less/plugins/wp-admin-ui-customize-d5f34e92eea10518421633a7bf6a6987.yaml new file mode 100644 index 0000000000..b328bc9520 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-admin-ui-customize-d5f34e92eea10518421633a7bf6a6987.yaml @@ -0,0 +1,58 @@ +id: wp-admin-ui-customize-d5f34e92eea10518421633a7bf6a6987 + +info: + name: > + WP Admin UI Customize <= 1.5.12 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0306c785-0dc3-44fb-a3cc-9afb5ab81651?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-admin-ui-customize/" + google-query: inurl:"/wp-content/plugins/wp-admin-ui-customize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-admin-ui-customize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-admin-ui-customize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-admin-ui-customize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-advance-comment-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-advance-comment-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..3c5fb0152c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-advance-comment-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-advance-comment-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-advance-comment/" + google-query: inurl:"/wp-content/plugins/wp-advance-comment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-advance-comment,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-advance-comment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-advance-comment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-advanced-importer-59ca924932c6a0bc7545937f3874e3e1.yaml b/nuclei-templates/cve-less/plugins/wp-advanced-importer-59ca924932c6a0bc7545937f3874e3e1.yaml new file mode 100644 index 0000000000..60b3a9745d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-advanced-importer-59ca924932c6a0bc7545937f3874e3e1.yaml @@ -0,0 +1,58 @@ +id: wp-advanced-importer-59ca924932c6a0bc7545937f3874e3e1 + +info: + name: > + WP Advanced Importer <= 2.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf02db2c-5fd2-4f21-a95c-e7645e22ecc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-advanced-importer/" + google-query: inurl:"/wp-content/plugins/wp-advanced-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-advanced-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-advanced-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-advanced-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-advanced-search-5c6787fa63866ceaebca40b1eb3f19f3.yaml b/nuclei-templates/cve-less/plugins/wp-advanced-search-5c6787fa63866ceaebca40b1eb3f19f3.yaml new file mode 100644 index 0000000000..68594daf27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-advanced-search-5c6787fa63866ceaebca40b1eb3f19f3.yaml @@ -0,0 +1,58 @@ +id: wp-advanced-search-5c6787fa63866ceaebca40b1eb3f19f3 + +info: + name: > + WordPress WP-Advanced-Search <= 3.3.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8071f117-c341-45bc-8d6e-8aa5d677d65c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-advanced-search/" + google-query: inurl:"/wp-content/plugins/wp-advanced-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-advanced-search,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-advanced-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-advanced-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-advanced-search-84ddf5342f72d908358cc5325eb7e319.yaml b/nuclei-templates/cve-less/plugins/wp-advanced-search-84ddf5342f72d908358cc5325eb7e319.yaml new file mode 100644 index 0000000000..d2292cf175 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-advanced-search-84ddf5342f72d908358cc5325eb7e319.yaml @@ -0,0 +1,58 @@ +id: wp-advanced-search-84ddf5342f72d908358cc5325eb7e319 + +info: + name: > + WordPress WP-Advanced-Search <= 3.3.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33129b72-0976-4c09-9cea-b5ba321ae46f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-advanced-search/" + google-query: inurl:"/wp-content/plugins/wp-advanced-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-advanced-search,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-advanced-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-advanced-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-advanced-search-a4635161f2aa6600f48d00dc0b0a15b3.yaml b/nuclei-templates/cve-less/plugins/wp-advanced-search-a4635161f2aa6600f48d00dc0b0a15b3.yaml new file mode 100644 index 0000000000..59c50c42ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-advanced-search-a4635161f2aa6600f48d00dc0b0a15b3.yaml @@ -0,0 +1,58 @@ +id: wp-advanced-search-a4635161f2aa6600f48d00dc0b0a15b3 + +info: + name: > + WordPress WP-Advanced-Search <= 3.3.3 - Unauthenticated Database Export + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b71e6219-09cc-484e-8c48-536797d974ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-advanced-search/" + google-query: inurl:"/wp-content/plugins/wp-advanced-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-advanced-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-advanced-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-advanced-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-advanced-search-e8896aaa278ff92ff4eab642f544ea11.yaml b/nuclei-templates/cve-less/plugins/wp-advanced-search-e8896aaa278ff92ff4eab642f544ea11.yaml new file mode 100644 index 0000000000..efb70e00f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-advanced-search-e8896aaa278ff92ff4eab642f544ea11.yaml @@ -0,0 +1,58 @@ +id: wp-advanced-search-e8896aaa278ff92ff4eab642f544ea11 + +info: + name: > + WP-Advanced-Search <= 3.3.8 - Cross-Site Request Forgery leading to Plugin Settings Updates + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2ba21cd-d8f3-402a-b067-1758937d9eb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-advanced-search/" + google-query: inurl:"/wp-content/plugins/wp-advanced-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-advanced-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-advanced-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-advanced-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-78aa7f4c0fd135cd902e3c93c245e07f.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-78aa7f4c0fd135cd902e3c93c245e07f.yaml new file mode 100644 index 0000000000..12918db369 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-78aa7f4c0fd135cd902e3c93c245e07f.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-disclosure-78aa7f4c0fd135cd902e3c93c245e07f + +info: + name: > + WP Affiliate Disclosure <= 1.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via $id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e38ee27-30a4-45be-bab6-a3e65ada215f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-disclosure/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-disclosure/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-disclosure,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-disclosure/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-disclosure" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..705af9a56d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-disclosure-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-disclosure/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-disclosure/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-disclosure,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-disclosure/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-disclosure" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-c87c4ea28269200455ab4fe854f72ca0.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-c87c4ea28269200455ab4fe854f72ca0.yaml new file mode 100644 index 0000000000..9f8bf54f3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-c87c4ea28269200455ab4fe854f72ca0.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-disclosure-c87c4ea28269200455ab4fe854f72ca0 + +info: + name: > + WP Affiliate Disclosure <= 1.2.6 - Cross-Site Request Forgery via check_capability + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11cc8c6e-b60e-46b3-966e-07b1fb2bf8e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-disclosure/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-disclosure/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-disclosure,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-disclosure/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-disclosure" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..9474faae83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-disclosure-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-disclosure/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-disclosure/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-disclosure,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-disclosure/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-disclosure" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-links-7a21d7c86e8ebeab0cea551daecba3fc.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-links-7a21d7c86e8ebeab0cea551daecba3fc.yaml new file mode 100644 index 0000000000..c48624a6fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-links-7a21d7c86e8ebeab0cea551daecba3fc.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-links-7a21d7c86e8ebeab0cea551daecba3fc + +info: + name: > + WP Affiliate Links <= 0.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba4638be-29d3-4638-84d3-6a9d540bfa33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-platform-9760015c4d350e201fad6b9179af7df3.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-platform-9760015c4d350e201fad6b9179af7df3.yaml new file mode 100644 index 0000000000..6c68f15ed1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-platform-9760015c4d350e201fad6b9179af7df3.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-platform-9760015c4d350e201fad6b9179af7df3 + +info: + name: > + WP Affiliate Platform <= 6.3.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b49af95-2310-4f71-921b-ee66588dd6d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-platform/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-platform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-platform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-platform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-platform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-platform-9d26ce45ae3e2b9cd30cf1aaa62ddd92.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-platform-9d26ce45ae3e2b9cd30cf1aaa62ddd92.yaml new file mode 100644 index 0000000000..4a29df0d9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-platform-9d26ce45ae3e2b9cd30cf1aaa62ddd92.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-platform-9d26ce45ae3e2b9cd30cf1aaa62ddd92 + +info: + name: > + WP Affiliate Platform <= 6.3.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6096b9a-f7bb-454a-8203-50ac99d37100?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-platform/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-platform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-platform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-platform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-platform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-platform-d9821340f78ed9354be13076604f5c91.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-platform-d9821340f78ed9354be13076604f5c91.yaml new file mode 100644 index 0000000000..57ae7ac90e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-platform-d9821340f78ed9354be13076604f5c91.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-platform-d9821340f78ed9354be13076604f5c91 + +info: + name: > + WP Affiliate Platform <= 6.3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6f7c956-16ce-4739-845b-15f426968808?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-platform/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-platform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-platform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-platform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-platform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-affiliate-platform-f655053c752606f8cf271b5e2d50d49f.yaml b/nuclei-templates/cve-less/plugins/wp-affiliate-platform-f655053c752606f8cf271b5e2d50d49f.yaml new file mode 100644 index 0000000000..c520c910e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-affiliate-platform-f655053c752606f8cf271b5e2d50d49f.yaml @@ -0,0 +1,58 @@ +id: wp-affiliate-platform-f655053c752606f8cf271b5e2d50d49f + +info: + name: > + WP Affiliate Platform <= 6.3.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b96e5ff-804c-41b6-ae34-5184a704b38e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-affiliate-platform/" + google-query: inurl:"/wp-content/plugins/wp-affiliate-platform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-affiliate-platform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-affiliate-platform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-affiliate-platform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-airbnb-review-slider-5f97cab1c787955760a43df34e0be9d5.yaml b/nuclei-templates/cve-less/plugins/wp-airbnb-review-slider-5f97cab1c787955760a43df34e0be9d5.yaml new file mode 100644 index 0000000000..1b899d7c1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-airbnb-review-slider-5f97cab1c787955760a43df34e0be9d5.yaml @@ -0,0 +1,58 @@ +id: wp-airbnb-review-slider-5f97cab1c787955760a43df34e0be9d5 + +info: + name: > + WP Airbnb Review Slider <= 3.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/038d1144-81b8-4e4b-b0d5-60516f02dbdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-airbnb-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-airbnb-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-airbnb-review-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-airbnb-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-airbnb-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-airbnb-review-slider-bbbfb24fae80d53d9d732dd1134e3189.yaml b/nuclei-templates/cve-less/plugins/wp-airbnb-review-slider-bbbfb24fae80d53d9d732dd1134e3189.yaml new file mode 100644 index 0000000000..dbd0d23862 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-airbnb-review-slider-bbbfb24fae80d53d9d732dd1134e3189.yaml @@ -0,0 +1,58 @@ +id: wp-airbnb-review-slider-bbbfb24fae80d53d9d732dd1134e3189 + +info: + name: > + WP Airbnb Review Slider <= 3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c265590c-be4f-4191-8368-7d366d182dc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-airbnb-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-airbnb-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-airbnb-review-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-airbnb-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-airbnb-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-backup-8616428f32a57e2652dd917dc2c90d74.yaml b/nuclei-templates/cve-less/plugins/wp-all-backup-8616428f32a57e2652dd917dc2c90d74.yaml new file mode 100644 index 0000000000..ec670cd0bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-backup-8616428f32a57e2652dd917dc2c90d74.yaml @@ -0,0 +1,58 @@ +id: wp-all-backup-8616428f32a57e2652dd917dc2c90d74 + +info: + name: > + WP All Backup <= 2.4.3 - Cross-Site Request Forgery to Backup Storage Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e087817e-9edb-4c93-96c6-e8d8e99d4d9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-backup/" + google-query: inurl:"/wp-content/plugins/wp-all-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-1ab755d3e95de25c386caeb2d042c3d1.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-1ab755d3e95de25c386caeb2d042c3d1.yaml new file mode 100644 index 0000000000..09f269ed0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-1ab755d3e95de25c386caeb2d042c3d1.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-1ab755d3e95de25c386caeb2d042c3d1 + +info: + name: > + WP All Export <= 1.3.0 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28bdf97b-86e7-4d4b-a3e4-6624e9858a93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export/" + google-query: inurl:"/wp-content/plugins/wp-all-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-3e761f82934df2ab4021a24d8a5d3f17.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-3e761f82934df2ab4021a24d8a5d3f17.yaml new file mode 100644 index 0000000000..b65b13313e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-3e761f82934df2ab4021a24d8a5d3f17.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-3e761f82934df2ab4021a24d8a5d3f17 + +info: + name: > + Export any WordPress data to XML/CSV < 1.4.1 & WP ALL Export Pro < 1.8.6 - Authenticated (Admin+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43f976ee-cba7-4f5d-b9c6-a6f66c0011d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export/" + google-query: inurl:"/wp-content/plugins/wp-all-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-54815dfa4753d9cdf9883b354532f577.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-54815dfa4753d9cdf9883b354532f577.yaml new file mode 100644 index 0000000000..0d2ea8c18c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-54815dfa4753d9cdf9883b354532f577.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-54815dfa4753d9cdf9883b354532f577 + +info: + name: > + Export any WordPress data to XML/CSV < 1.4.1 & WP ALL Export Pro < 1.8.6 - Cross-Site Request Forgery to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b70e8bce-1793-40f0-bdb1-100cf5f431e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export/" + google-query: inurl:"/wp-content/plugins/wp-all-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-a04852934ccd4497c8403afda3917aa6.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-a04852934ccd4497c8403afda3917aa6.yaml new file mode 100644 index 0000000000..af1826a047 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-a04852934ccd4497c8403afda3917aa6.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-a04852934ccd4497c8403afda3917aa6 + +info: + name: > + Export any WordPress data to XML/CSV < 1.4.1 & WP ALL Export Pro < 1.8.6 - Cross-Site Request Forgery to PHAR Deserialization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdc18341-135b-4522-a9db-510e4c4d9704?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export/" + google-query: inurl:"/wp-content/plugins/wp-all-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-c1088d4a7272923461f43cf76023c143.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-c1088d4a7272923461f43cf76023c143.yaml new file mode 100644 index 0000000000..75c0cb058a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-c1088d4a7272923461f43cf76023c143.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-c1088d4a7272923461f43cf76023c143 + +info: + name: > + Export any WordPress data to XML/CSV <= 1.3.4 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8613acf-d6e8-434f-820b-d854ed1f6299?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export/" + google-query: inurl:"/wp-content/plugins/wp-all-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-ddbeec70f5c8cc5ed33b819f003e57b0.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-ddbeec70f5c8cc5ed33b819f003e57b0.yaml new file mode 100644 index 0000000000..8385454ca1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-ddbeec70f5c8cc5ed33b819f003e57b0.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-ddbeec70f5c8cc5ed33b819f003e57b0 + +info: + name: > + Export any WordPress data to XML/CSV <= 1.3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/658ccd08-5f46-4a11-8d86-38b49027f83e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export/" + google-query: inurl:"/wp-content/plugins/wp-all-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-pro-3e761f82934df2ab4021a24d8a5d3f17.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-pro-3e761f82934df2ab4021a24d8a5d3f17.yaml new file mode 100644 index 0000000000..4b37312a54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-pro-3e761f82934df2ab4021a24d8a5d3f17.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-pro-3e761f82934df2ab4021a24d8a5d3f17 + +info: + name: > + Export any WordPress data to XML/CSV < 1.4.1 & WP ALL Export Pro < 1.8.6 - Authenticated (Admin+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43f976ee-cba7-4f5d-b9c6-a6f66c0011d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-export-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-pro-54815dfa4753d9cdf9883b354532f577.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-pro-54815dfa4753d9cdf9883b354532f577.yaml new file mode 100644 index 0000000000..2ec6a82102 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-pro-54815dfa4753d9cdf9883b354532f577.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-pro-54815dfa4753d9cdf9883b354532f577 + +info: + name: > + Export any WordPress data to XML/CSV < 1.4.1 & WP ALL Export Pro < 1.8.6 - Cross-Site Request Forgery to Remote Code Execution + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b70e8bce-1793-40f0-bdb1-100cf5f431e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-export-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-pro-92aa647881d350b340f99ec0dcdafcc3.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-pro-92aa647881d350b340f99ec0dcdafcc3.yaml new file mode 100644 index 0000000000..d2e5d2c086 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-pro-92aa647881d350b340f99ec0dcdafcc3.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-pro-92aa647881d350b340f99ec0dcdafcc3 + +info: + name: > + WP ALL Export Pro <= 1.7.8 - Authenticated Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c901f85d-fcdb-43e5-8626-f2410e4e328f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-export-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-pro-a04852934ccd4497c8403afda3917aa6.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-pro-a04852934ccd4497c8403afda3917aa6.yaml new file mode 100644 index 0000000000..b10de51a1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-pro-a04852934ccd4497c8403afda3917aa6.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-pro-a04852934ccd4497c8403afda3917aa6 + +info: + name: > + Export any WordPress data to XML/CSV < 1.4.1 & WP ALL Export Pro < 1.8.6 - Cross-Site Request Forgery to PHAR Deserialization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdc18341-135b-4522-a9db-510e4c4d9704?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-export-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-export-pro-c8d77620d025f09aeefa4638ee5b37e1.yaml b/nuclei-templates/cve-less/plugins/wp-all-export-pro-c8d77620d025f09aeefa4638ee5b37e1.yaml new file mode 100644 index 0000000000..fa6dafbb10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-export-pro-c8d77620d025f09aeefa4638ee5b37e1.yaml @@ -0,0 +1,58 @@ +id: wp-all-export-pro-c8d77620d025f09aeefa4638ee5b37e1 + +info: + name: > + WP ALL Export Pro <= 1.7.8 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4421c1b-742c-4307-9736-d6263bab4ae4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-export-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-export-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-export-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-export-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-export-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-23f6ba2f9c75b4517345ed804d2e1ff6.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-23f6ba2f9c75b4517345ed804d2e1ff6.yaml new file mode 100644 index 0000000000..56517e12fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-23f6ba2f9c75b4517345ed804d2e1ff6.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-23f6ba2f9c75b4517345ed804d2e1ff6 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.2.4 - Missing Authorization and Cross-Site Request Forgery Checks + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aae5b1d-9b84-4628-b0b6-7b39054e08a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-490b87f43f2fe349a60db708b8fdfe27.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-490b87f43f2fe349a60db708b8fdfe27.yaml new file mode 100644 index 0000000000..715ee7474a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-490b87f43f2fe349a60db708b8fdfe27.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-490b87f43f2fe349a60db708b8fdfe27 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.6.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbd4f08c-9989-4af9-b615-1db82909a1db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-54d38a1874377a19e755c0dd341fe745.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-54d38a1874377a19e755c0dd341fe745.yaml new file mode 100644 index 0000000000..6f42c43d56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-54d38a1874377a19e755c0dd341fe745.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-54d38a1874377a19e755c0dd341fe745 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.7.3 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/121cad41-d3cd-4042-b568-3d91909a38d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-5b6052811294a634af9b6d15efbb8d49.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-5b6052811294a634af9b6d15efbb8d49.yaml new file mode 100644 index 0000000000..aff4f48f73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-5b6052811294a634af9b6d15efbb8d49.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-5b6052811294a634af9b6d15efbb8d49 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f999f89-29eb-4871-a304-0ba6954e7e5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-5fbee904a26db0083f1a4d8da7695a16.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-5fbee904a26db0083f1a4d8da7695a16.yaml new file mode 100644 index 0000000000..a5268a76ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-5fbee904a26db0083f1a4d8da7695a16.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-5fbee904a26db0083f1a4d8da7695a16 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.2.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52d390e0-95ca-4570-8d4c-f679ee86ffea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-6542eb9293767f9620f37e7f59fd2a40.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-6542eb9293767f9620f37e7f59fd2a40.yaml new file mode 100644 index 0000000000..b590107640 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-6542eb9293767f9620f37e7f59fd2a40.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-6542eb9293767f9620f37e7f59fd2a40 + +info: + name: > + WP All Import <= 3.4.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/406fe34a-0991-4653-9924-b6586091d7df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-655d94e53e4a588a8f5f35013abd45f6.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-655d94e53e4a588a8f5f35013abd45f6.yaml new file mode 100644 index 0000000000..5998d7d27d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-655d94e53e4a588a8f5f35013abd45f6.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-655d94e53e4a588a8f5f35013abd45f6 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.4.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9704b633-5779-42a7-90d7-e532448f2e51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-6e8d8a68dd9873805b5f71eb69761022.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-6e8d8a68dd9873805b5f71eb69761022.yaml new file mode 100644 index 0000000000..cde145370e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-6e8d8a68dd9873805b5f71eb69761022.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-6e8d8a68dd9873805b5f71eb69761022 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.6.8 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eab85a0a-f328-4cb6-b01f-d7e57540969d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-7f5752064f65cad24bb5910cabcdce74.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-7f5752064f65cad24bb5910cabcdce74.yaml new file mode 100644 index 0000000000..99904a97c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-7f5752064f65cad24bb5910cabcdce74.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-7f5752064f65cad24bb5910cabcdce74 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.6.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c06b79a-0803-4973-ba88-b97d7145f82b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-81844f67a8cb300bf38ea9c090e351aa.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-81844f67a8cb300bf38ea9c090e351aa.yaml new file mode 100644 index 0000000000..e5b4871ea5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-81844f67a8cb300bf38ea9c090e351aa.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-81844f67a8cb300bf38ea9c090e351aa + +info: + name: > + Import any XML or CSV File to WordPress <= 3.2.3 & PRO < 4.1.1 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1bdda78-e0e3-4d0b-81b8-9c018f445225?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-8b209ab2ce1916ae647e2542cfaaa488.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-8b209ab2ce1916ae647e2542cfaaa488.yaml new file mode 100644 index 0000000000..16ef9d18ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-8b209ab2ce1916ae647e2542cfaaa488.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-8b209ab2ce1916ae647e2542cfaaa488 + +info: + name: > + Import any XML or CSV File to WordPress < 3.2.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b39c8e1-f2b7-436d-97d1-2d503d7ac835?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-8f60c3b6446189e3058b9237676dd33f.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-8f60c3b6446189e3058b9237676dd33f.yaml new file mode 100644 index 0000000000..ea3a8967d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-8f60c3b6446189e3058b9237676dd33f.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-8f60c3b6446189e3058b9237676dd33f + +info: + name: > + Import any XML or CSV File to WordPress <= 3.6.8 - Authenticated (Administrator+) Arbitrary File Upload via Path Traversal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/420bcda3-e275-4811-ae37-df69d4d60cee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-aed64fd523c0d1b492fdf86a110cd8b5.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-aed64fd523c0d1b492fdf86a110cd8b5.yaml new file mode 100644 index 0000000000..d29a89dee2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-aed64fd523c0d1b492fdf86a110cd8b5.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-aed64fd523c0d1b492fdf86a110cd8b5 + +info: + name: > + WP All Import <= 3.6.7 - Authenticated (Administrator+) Arbitrary Code Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a5ce873-e90b-4bdc-b428-426818ff9a86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-c459c6390d6920d9836ff6f1ec3a05e1.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-c459c6390d6920d9836ff6f1ec3a05e1.yaml new file mode 100644 index 0000000000..03d1d916ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-c459c6390d6920d9836ff6f1ec3a05e1.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-c459c6390d6920d9836ff6f1ec3a05e1 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.4.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4d19f85-e39f-46e6-b62c-b6d3dc51a0df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-d244aad713442e8917ed457759893c6e.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-d244aad713442e8917ed457759893c6e.yaml new file mode 100644 index 0000000000..55bf253a7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-d244aad713442e8917ed457759893c6e.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-d244aad713442e8917ed457759893c6e + +info: + name: > + WP All Import <= 3.4.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/deb6821e-93ff-4636-912b-887deba59577?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-dcb0952ba59e4cf6e5088fb4c3d3565e.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-dcb0952ba59e4cf6e5088fb4c3d3565e.yaml new file mode 100644 index 0000000000..f439ed5bc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-dcb0952ba59e4cf6e5088fb4c3d3565e.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-dcb0952ba59e4cf6e5088fb4c3d3565e + +info: + name: > + WP All Import <= 3.6.7 - Admin+ Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1072ad88-5760-4f2a-82b3-d515d6f73e52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-e69997328ca18e69bd3343eedbb036ad.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-e69997328ca18e69bd3343eedbb036ad.yaml new file mode 100644 index 0000000000..e248db4140 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-e69997328ca18e69bd3343eedbb036ad.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-e69997328ca18e69bd3343eedbb036ad + +info: + name: > + Import any XML or CSV File <= 3.7.2 - Authenticated (Admin+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40682959-6cb0-4ffb-9338-519e82eb746e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-ea7f76443ee4f847f0d00da3e01a11a3.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-ea7f76443ee4f847f0d00da3e01a11a3.yaml new file mode 100644 index 0000000000..720460195c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-ea7f76443ee4f847f0d00da3e01a11a3.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-ea7f76443ee4f847f0d00da3e01a11a3 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.6.7 - Admin+ Malicious File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d281333-d9af-4eb7-bc5c-ea7ceeddac03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-pro-23f6ba2f9c75b4517345ed804d2e1ff6.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-pro-23f6ba2f9c75b4517345ed804d2e1ff6.yaml new file mode 100644 index 0000000000..d7966a6759 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-pro-23f6ba2f9c75b4517345ed804d2e1ff6.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-pro-23f6ba2f9c75b4517345ed804d2e1ff6 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.2.4 - Missing Authorization and Cross-Site Request Forgery Checks + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aae5b1d-9b84-4628-b0b6-7b39054e08a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-import-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-pro-5b6052811294a634af9b6d15efbb8d49.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-pro-5b6052811294a634af9b6d15efbb8d49.yaml new file mode 100644 index 0000000000..ae5a87a7e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-pro-5b6052811294a634af9b6d15efbb8d49.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-pro-5b6052811294a634af9b6d15efbb8d49 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f999f89-29eb-4871-a304-0ba6954e7e5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-import-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-pro-5fbee904a26db0083f1a4d8da7695a16.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-pro-5fbee904a26db0083f1a4d8da7695a16.yaml new file mode 100644 index 0000000000..c22a32b7d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-pro-5fbee904a26db0083f1a4d8da7695a16.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-pro-5fbee904a26db0083f1a4d8da7695a16 + +info: + name: > + Import any XML or CSV File to WordPress <= 3.2.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52d390e0-95ca-4570-8d4c-f679ee86ffea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-import-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-pro-81844f67a8cb300bf38ea9c090e351aa.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-pro-81844f67a8cb300bf38ea9c090e351aa.yaml new file mode 100644 index 0000000000..8cb9b09096 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-pro-81844f67a8cb300bf38ea9c090e351aa.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-pro-81844f67a8cb300bf38ea9c090e351aa + +info: + name: > + Import any XML or CSV File to WordPress <= 3.2.3 & PRO < 4.1.1 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1bdda78-e0e3-4d0b-81b8-9c018f445225?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-import-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-pro-a9e3662a53271551df51fdd8b8a5f31b.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-pro-a9e3662a53271551df51fdd8b8a5f31b.yaml new file mode 100644 index 0000000000..be72142c77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-pro-a9e3662a53271551df51fdd8b8a5f31b.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-pro-a9e3662a53271551df51fdd8b8a5f31b + +info: + name: > + All Import Pro Plugin < 4.1.2 - SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e4e1afd-604d-45c2-ab6b-fa9ccac0c361?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-import-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-all-import-pro-df4cc539ef140fa3859e0e46cb3bb0b2.yaml b/nuclei-templates/cve-less/plugins/wp-all-import-pro-df4cc539ef140fa3859e0e46cb3bb0b2.yaml new file mode 100644 index 0000000000..1a263fc746 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-all-import-pro-df4cc539ef140fa3859e0e46cb3bb0b2.yaml @@ -0,0 +1,58 @@ +id: wp-all-import-pro-df4cc539ef140fa3859e0e46cb3bb0b2 + +info: + name: > + WP All Import Pro < 4.1.1 - Reflected Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/404aabc5-1ff4-492d-8cab-4b83eb68157a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-all-import-pro/" + google-query: inurl:"/wp-content/plugins/wp-all-import-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-all-import-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-all-import-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-all-import-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-amasin-the-amazon-affiliate-shop-5595c7f205cd9ae7c0c1e3237881d78f.yaml b/nuclei-templates/cve-less/plugins/wp-amasin-the-amazon-affiliate-shop-5595c7f205cd9ae7c0c1e3237881d78f.yaml new file mode 100644 index 0000000000..da2cff1923 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-amasin-the-amazon-affiliate-shop-5595c7f205cd9ae7c0c1e3237881d78f.yaml @@ -0,0 +1,58 @@ +id: wp-amasin-the-amazon-affiliate-shop-5595c7f205cd9ae7c0c1e3237881d78f + +info: + name: > + WP AmASIN – The Amazon Affiliate Shop <= 0.9.6 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/649cbd38-d926-4638-9fb9-6704befa1660?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-amasin-the-amazon-affiliate-shop/" + google-query: inurl:"/wp-content/plugins/wp-amasin-the-amazon-affiliate-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-amasin-the-amazon-affiliate-shop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-amasin-the-amazon-affiliate-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-amasin-the-amazon-affiliate-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-amazon-shop-90f8bc64469472ae0cd3174d5b6a7976.yaml b/nuclei-templates/cve-less/plugins/wp-amazon-shop-90f8bc64469472ae0cd3174d5b6a7976.yaml new file mode 100644 index 0000000000..d30fdaf867 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-amazon-shop-90f8bc64469472ae0cd3174d5b6a7976.yaml @@ -0,0 +1,58 @@ +id: wp-amazon-shop-90f8bc64469472ae0cd3174d5b6a7976 + +info: + name: > + Dropshipping & Affiliation with Amazon <= 2.1.2 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17240c75-4e2a-45d2-8114-414c7e81af87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-amazon-shop/" + google-query: inurl:"/wp-content/plugins/wp-amazon-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-amazon-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-amazon-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-amazon-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-amo-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/wp-amo-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..92b8b807b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-amo-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: wp-amo-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-amo/" + google-query: inurl:"/wp-content/plugins/wp-amo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-amo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-amo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-amo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-analytify-4570eda0c03b7f7b441d2c3a25dcd80e.yaml b/nuclei-templates/cve-less/plugins/wp-analytify-4570eda0c03b7f7b441d2c3a25dcd80e.yaml new file mode 100644 index 0000000000..b6fe8ce8f2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-analytify-4570eda0c03b7f7b441d2c3a25dcd80e.yaml @@ -0,0 +1,58 @@ +id: wp-analytify-4570eda0c03b7f7b441d2c3a25dcd80e + +info: + name: > + Analytify – Google Analytics Dashboard For WordPress <= 4.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6efb57a-9638-44d1-a8d1-8eeadcc81ecc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-analytify/" + google-query: inurl:"/wp-content/plugins/wp-analytify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-analytify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-analytify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-analytify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-analytify-66b6d0074514ae9bf7d808b0d7b9a6e2.yaml b/nuclei-templates/cve-less/plugins/wp-analytify-66b6d0074514ae9bf7d808b0d7b9a6e2.yaml new file mode 100644 index 0000000000..54f89275b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-analytify-66b6d0074514ae9bf7d808b0d7b9a6e2.yaml @@ -0,0 +1,58 @@ +id: wp-analytify-66b6d0074514ae9bf7d808b0d7b9a6e2 + +info: + name: > + Analytify – Google Analytics Dashboard For WordPress <= 4.2.2 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b899ca76-d6f4-4369-8f66-738b144433b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-analytify/" + google-query: inurl:"/wp-content/plugins/wp-analytify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-analytify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-analytify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-analytify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-analytify-70ab06ad0d2802465de5c71330534e85.yaml b/nuclei-templates/cve-less/plugins/wp-analytify-70ab06ad0d2802465de5c71330534e85.yaml new file mode 100644 index 0000000000..7526f8def0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-analytify-70ab06ad0d2802465de5c71330534e85.yaml @@ -0,0 +1,58 @@ +id: wp-analytify-70ab06ad0d2802465de5c71330534e85 + +info: + name: > + Analytify – Google Analytics Dashboard For WordPress (GA4 analytics made easy) <= 5.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a659071-df11-4318-86c2-7881163c8b62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-analytify/" + google-query: inurl:"/wp-content/plugins/wp-analytify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-analytify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-analytify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-analytify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-analytify-899a0dde0ba2e19723247e16c93f4325.yaml b/nuclei-templates/cve-less/plugins/wp-analytify-899a0dde0ba2e19723247e16c93f4325.yaml new file mode 100644 index 0000000000..b41e375adc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-analytify-899a0dde0ba2e19723247e16c93f4325.yaml @@ -0,0 +1,58 @@ +id: wp-analytify-899a0dde0ba2e19723247e16c93f4325 + +info: + name: > + Analytify Dashboard <= 5.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7362f3f-c5d9-4ba0-b9c3-282c58861e2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-analytify/" + google-query: inurl:"/wp-content/plugins/wp-analytify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-analytify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-analytify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-analytify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-analytify-8fa6b82859e5d82c0a64a9973f57957b.yaml b/nuclei-templates/cve-less/plugins/wp-analytify-8fa6b82859e5d82c0a64a9973f57957b.yaml new file mode 100644 index 0000000000..206cc161bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-analytify-8fa6b82859e5d82c0a64a9973f57957b.yaml @@ -0,0 +1,58 @@ +id: wp-analytify-8fa6b82859e5d82c0a64a9973f57957b + +info: + name: > + Analytify <= 5.2.1 - Missing Authorization to Unauthenticated Google Analytics Tracking ID Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c399c6a-d5e4-4b88-a0a9-003233d5d59f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-analytify/" + google-query: inurl:"/wp-content/plugins/wp-analytify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-analytify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-analytify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-analytify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-analytify-d12af8e80ae1c421ffa919ff53dc2e47.yaml b/nuclei-templates/cve-less/plugins/wp-analytify-d12af8e80ae1c421ffa919ff53dc2e47.yaml new file mode 100644 index 0000000000..854dee7995 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-analytify-d12af8e80ae1c421ffa919ff53dc2e47.yaml @@ -0,0 +1,58 @@ +id: wp-analytify-d12af8e80ae1c421ffa919ff53dc2e47 + +info: + name: > + Analytify Dashboard <= 5.1.0 - Missing Authorization to Opt-In + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/970b3a0f-c1cc-4d85-8271-a523ccdbcc39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-analytify/" + google-query: inurl:"/wp-content/plugins/wp-analytify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-analytify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-analytify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-analytify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-analytify-d2645755bf5586970e23e1757a9c7bfe.yaml b/nuclei-templates/cve-less/plugins/wp-analytify-d2645755bf5586970e23e1757a9c7bfe.yaml new file mode 100644 index 0000000000..d0579d43a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-analytify-d2645755bf5586970e23e1757a9c7bfe.yaml @@ -0,0 +1,58 @@ +id: wp-analytify-d2645755bf5586970e23e1757a9c7bfe + +info: + name: > + Analytify <= 4.2.3 - Missing Authorization & Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a462789a-d311-47d7-9f54-190eaf5da03f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-analytify/" + google-query: inurl:"/wp-content/plugins/wp-analytify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-analytify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-analytify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-analytify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-analytify-f76c0706f43a6aad759753a6e61a5e5f.yaml b/nuclei-templates/cve-less/plugins/wp-analytify-f76c0706f43a6aad759753a6e61a5e5f.yaml new file mode 100644 index 0000000000..caa7afbe12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-analytify-f76c0706f43a6aad759753a6e61a5e5f.yaml @@ -0,0 +1,58 @@ +id: wp-analytify-f76c0706f43a6aad759753a6e61a5e5f + +info: + name: > + Analytify <= 4.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27cfd3cd-e622-4be7-af47-84324d6f6ea3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-analytify/" + google-query: inurl:"/wp-content/plugins/wp-analytify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-analytify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-analytify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-analytify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-anything-slider-aaaf4480d575f84ecd3c01a63e4a0287.yaml b/nuclei-templates/cve-less/plugins/wp-anything-slider-aaaf4480d575f84ecd3c01a63e4a0287.yaml new file mode 100644 index 0000000000..92d8b7100b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-anything-slider-aaaf4480d575f84ecd3c01a63e4a0287.yaml @@ -0,0 +1,58 @@ +id: wp-anything-slider-aaaf4480d575f84ecd3c01a63e4a0287 + +info: + name: > + Wp anything slider <= 9.1 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/535e754e-f851-4809-a148-d9ba808b9d8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-anything-slider/" + google-query: inurl:"/wp-content/plugins/wp-anything-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-anything-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-anything-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-anything-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-aparat-098bdb5ff12e782e87bacda8082a6346.yaml b/nuclei-templates/cve-less/plugins/wp-aparat-098bdb5ff12e782e87bacda8082a6346.yaml new file mode 100644 index 0000000000..3a72245317 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-aparat-098bdb5ff12e782e87bacda8082a6346.yaml @@ -0,0 +1,58 @@ +id: wp-aparat-098bdb5ff12e782e87bacda8082a6346 + +info: + name: > + Aparat for WordPress <= 2.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf1000eb-fac3-4710-bfcd-a6cc2c6327d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-aparat/" + google-query: inurl:"/wp-content/plugins/wp-aparat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-aparat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-aparat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-aparat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-app-maker-2b14d8058c7a99881803f353bd15c8bf.yaml b/nuclei-templates/cve-less/plugins/wp-app-maker-2b14d8058c7a99881803f353bd15c8bf.yaml new file mode 100644 index 0000000000..6d0d23c73c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-app-maker-2b14d8058c7a99881803f353bd15c8bf.yaml @@ -0,0 +1,58 @@ +id: wp-app-maker-2b14d8058c7a99881803f353bd15c8bf + +info: + name: > + WP App Maker <= 1.0.16.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2413083-262c-4646-91fa-f9b51010f3e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-app-maker/" + google-query: inurl:"/wp-content/plugins/wp-app-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-app-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-app-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-app-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-appbox-7765fb8469b9b88a34d6b432871e62d3.yaml b/nuclei-templates/cve-less/plugins/wp-appbox-7765fb8469b9b88a34d6b432871e62d3.yaml new file mode 100644 index 0000000000..de85585cde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-appbox-7765fb8469b9b88a34d6b432871e62d3.yaml @@ -0,0 +1,58 @@ +id: wp-appbox-7765fb8469b9b88a34d6b432871e62d3 + +info: + name: > + WP-Appbox <= 4.3.17 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c718d65-eb40-43db-821f-344c6eca2384?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-appbox/" + google-query: inurl:"/wp-content/plugins/wp-appbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-appbox,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-appbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-appbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-appbox-e587e1665fb732b10014cf1110ac13b4.yaml b/nuclei-templates/cve-less/plugins/wp-appbox-e587e1665fb732b10014cf1110ac13b4.yaml new file mode 100644 index 0000000000..add907b636 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-appbox-e587e1665fb732b10014cf1110ac13b4.yaml @@ -0,0 +1,58 @@ +id: wp-appbox-e587e1665fb732b10014cf1110ac13b4 + +info: + name: > + WP-Appbox <= 4.3.20 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73c3dfc7-58de-4b24-ad91-0f8040d1f75e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-appbox/" + google-query: inurl:"/wp-content/plugins/wp-appbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-appbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-appbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-appbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-appointment-schedule-booking-system-041adfd3c39d4b3580e02b6803d8c84d.yaml b/nuclei-templates/cve-less/plugins/wp-appointment-schedule-booking-system-041adfd3c39d4b3580e02b6803d8c84d.yaml new file mode 100644 index 0000000000..41add6f4b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-appointment-schedule-booking-system-041adfd3c39d4b3580e02b6803d8c84d.yaml @@ -0,0 +1,58 @@ +id: wp-appointment-schedule-booking-system-041adfd3c39d4b3580e02b6803d8c84d + +info: + name: > + WordPress Appointment Schedule Booking System <=1.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d7cd3eb-3ab7-44b3-8568-ce145977dfab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-appointment-schedule-booking-system/" + google-query: inurl:"/wp-content/plugins/wp-appointment-schedule-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-appointment-schedule-booking-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-appointment-schedule-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-appointment-schedule-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-appointments-schedules-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml b/nuclei-templates/cve-less/plugins/wp-appointments-schedules-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml new file mode 100644 index 0000000000..4308de2294 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-appointments-schedules-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml @@ -0,0 +1,58 @@ +id: wp-appointments-schedules-2d20c9ee33e7e10b4c0f0dcd5f256173 + +info: + name: > + Appointments Scheduler <= 1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2afa0d46-eead-4eb3-9bf1-81fafd3f0f88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-appointments-schedules/" + google-query: inurl:"/wp-content/plugins/wp-appointments-schedules/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-appointments-schedules,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-appointments-schedules/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-appointments-schedules" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-asset-clean-up-157e1680396fa809586b361348ce2314.yaml b/nuclei-templates/cve-less/plugins/wp-asset-clean-up-157e1680396fa809586b361348ce2314.yaml new file mode 100644 index 0000000000..f4b4d922b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-asset-clean-up-157e1680396fa809586b361348ce2314.yaml @@ -0,0 +1,58 @@ +id: wp-asset-clean-up-157e1680396fa809586b361348ce2314 + +info: + name: > + Asset CleanUp <= 1.3.8.4 - Reflected Cross-Site Scripting via AJAX Action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81a3460e-f2c8-422f-9256-3aef24afb42b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-asset-clean-up/" + google-query: inurl:"/wp-content/plugins/wp-asset-clean-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-asset-clean-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-asset-clean-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-asset-clean-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-asset-clean-up-16b8fc2e25c46e7423213d8067c33e6d.yaml b/nuclei-templates/cve-less/plugins/wp-asset-clean-up-16b8fc2e25c46e7423213d8067c33e6d.yaml new file mode 100644 index 0000000000..4ad7c1742c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-asset-clean-up-16b8fc2e25c46e7423213d8067c33e6d.yaml @@ -0,0 +1,58 @@ +id: wp-asset-clean-up-16b8fc2e25c46e7423213d8067c33e6d + +info: + name: > + Asset CleanUp: Page Speed Booster <= 1.3.8.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/752e3d68-001b-4523-9040-b1ef8fbffa7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-asset-clean-up/" + google-query: inurl:"/wp-content/plugins/wp-asset-clean-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-asset-clean-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-asset-clean-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-asset-clean-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-asset-clean-up-5a7f7124402fcdd1661001779df0ff58.yaml b/nuclei-templates/cve-less/plugins/wp-asset-clean-up-5a7f7124402fcdd1661001779df0ff58.yaml new file mode 100644 index 0000000000..079cc1dca3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-asset-clean-up-5a7f7124402fcdd1661001779df0ff58.yaml @@ -0,0 +1,58 @@ +id: wp-asset-clean-up-5a7f7124402fcdd1661001779df0ff58 + +info: + name: > + Asset CleanUp: Page Speed Booster <= 1.3.6.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfd638bb-ae0b-403d-8d34-c4b62a749d7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-asset-clean-up/" + google-query: inurl:"/wp-content/plugins/wp-asset-clean-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-asset-clean-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-asset-clean-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-asset-clean-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-asset-clean-up-7caff55cfec661a72791dee0bee83561.yaml b/nuclei-templates/cve-less/plugins/wp-asset-clean-up-7caff55cfec661a72791dee0bee83561.yaml new file mode 100644 index 0000000000..c55a5dc291 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-asset-clean-up-7caff55cfec661a72791dee0bee83561.yaml @@ -0,0 +1,58 @@ +id: wp-asset-clean-up-7caff55cfec661a72791dee0bee83561 + +info: + name: > + Asset CleanUp <= 1.3.8.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4835539-a66c-4d14-b3c3-9a3a64e89ea6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-asset-clean-up/" + google-query: inurl:"/wp-content/plugins/wp-asset-clean-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-asset-clean-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-asset-clean-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-asset-clean-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-athletics-3b9b22b591de089c72309692f7ac4907.yaml b/nuclei-templates/cve-less/plugins/wp-athletics-3b9b22b591de089c72309692f7ac4907.yaml new file mode 100644 index 0000000000..104f464fba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-athletics-3b9b22b591de089c72309692f7ac4907.yaml @@ -0,0 +1,58 @@ +id: wp-athletics-3b9b22b591de089c72309692f7ac4907 + +info: + name: > + WP Athletics <= 1.1.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d62da9a3-3a57-4bbd-b07d-8df39fa14c52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-athletics/" + google-query: inurl:"/wp-content/plugins/wp-athletics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-athletics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-athletics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-athletics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-athletics-6a4f3e2a82b7793dde5ce79a450d31bf.yaml b/nuclei-templates/cve-less/plugins/wp-athletics-6a4f3e2a82b7793dde5ce79a450d31bf.yaml new file mode 100644 index 0000000000..1a04eb731d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-athletics-6a4f3e2a82b7793dde5ce79a450d31bf.yaml @@ -0,0 +1,58 @@ +id: wp-athletics-6a4f3e2a82b7793dde5ce79a450d31bf + +info: + name: > + WP Athletics <= 1.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df20aa75-c6d3-48a6-9b19-7547bf12fb82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-athletics/" + google-query: inurl:"/wp-content/plugins/wp-athletics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-athletics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-athletics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-athletics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-attachment-export-512d60f62525369cb1c0a614152e673f.yaml b/nuclei-templates/cve-less/plugins/wp-attachment-export-512d60f62525369cb1c0a614152e673f.yaml new file mode 100644 index 0000000000..25398645db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-attachment-export-512d60f62525369cb1c0a614152e673f.yaml @@ -0,0 +1,58 @@ +id: wp-attachment-export-512d60f62525369cb1c0a614152e673f + +info: + name: > + WP Attachment Export < 0.2.4 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbd8d37d-50f7-4480-acef-cdec33c9f07f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-attachment-export/" + google-query: inurl:"/wp-content/plugins/wp-attachment-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-attachment-export,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-attachment-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-attachment-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-attachments-607d97f75ca23282557e4dc2fc682915.yaml b/nuclei-templates/cve-less/plugins/wp-attachments-607d97f75ca23282557e4dc2fc682915.yaml new file mode 100644 index 0000000000..7bc8cce055 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-attachments-607d97f75ca23282557e4dc2fc682915.yaml @@ -0,0 +1,58 @@ +id: wp-attachments-607d97f75ca23282557e4dc2fc682915 + +info: + name: > + WP Attachments <= 5.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c715f9-8655-448e-a8d2-71f24c9d48ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-attachments/" + google-query: inurl:"/wp-content/plugins/wp-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-attachments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-attachments-bb80630c4629833cfa0b6983a79076e1.yaml b/nuclei-templates/cve-less/plugins/wp-attachments-bb80630c4629833cfa0b6983a79076e1.yaml new file mode 100644 index 0000000000..036eba3723 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-attachments-bb80630c4629833cfa0b6983a79076e1.yaml @@ -0,0 +1,58 @@ +id: wp-attachments-bb80630c4629833cfa0b6983a79076e1 + +info: + name: > + WP Attachments <= 5.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f23b144e-4380-4099-89b5-816c8c2f710f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-attachments/" + google-query: inurl:"/wp-content/plugins/wp-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-attachments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-attachments-d368d355a42efc82f9add75ee0c1d079.yaml b/nuclei-templates/cve-less/plugins/wp-attachments-d368d355a42efc82f9add75ee0c1d079.yaml new file mode 100644 index 0000000000..447445f942 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-attachments-d368d355a42efc82f9add75ee0c1d079.yaml @@ -0,0 +1,58 @@ +id: wp-attachments-d368d355a42efc82f9add75ee0c1d079 + +info: + name: > + WP Attachments <= 5.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/360cba3a-dfae-4b1c-9b33-f531fb9b12e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-attachments/" + google-query: inurl:"/wp-content/plugins/wp-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-attachments,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-attest-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-attest-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bfc635a632 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-attest-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-attest-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-attest/" + google-query: inurl:"/wp-content/plugins/wp-attest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-attest,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-attest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-attest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-0f1369367add235ed7f30ce397da16e3.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-0f1369367add235ed7f30ce397da16e3.yaml new file mode 100644 index 0000000000..24fae6295e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-0f1369367add235ed7f30ce397da16e3.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-0f1369367add235ed7f30ce397da16e3 + +info: + name: > + Auto Affiliate Links <= 6.3 - Cross-Site Request Forgery via aalDeleteLink function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f738ecf3-5f10-43ab-b8ce-34ac41229e9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-30897ef76876a3c79e7909e7acb376e5.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-30897ef76876a3c79e7909e7acb376e5.yaml new file mode 100644 index 0000000000..498b651311 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-30897ef76876a3c79e7909e7acb376e5.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-30897ef76876a3c79e7909e7acb376e5 + +info: + name: > + Auto Affiliate Links <= 6.4.2.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c84ffd3-e000-4d67-9789-e439e7c128e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-599f329db78aa16926991b18378d93d9.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-599f329db78aa16926991b18378d93d9.yaml new file mode 100644 index 0000000000..fe1191003d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-599f329db78aa16926991b18378d93d9.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-599f329db78aa16926991b18378d93d9 + +info: + name: > + Auto Affiliate Links <= 6.4.3.1 - Authenticated (Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d34b675-ff66-475e-b838-657dd51fc48c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-5a61a27c8209633543dc7131ccce0c7b.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-5a61a27c8209633543dc7131ccce0c7b.yaml new file mode 100644 index 0000000000..90868d2590 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-5a61a27c8209633543dc7131ccce0c7b.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-5a61a27c8209633543dc7131ccce0c7b + +info: + name: > + Auto Affiliate Links <= 6.4.3 - Missing Authorization via aalAddLink + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09e5aa34-ab28-4349-ac5f-6a0479e641e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-a3e119e35f3f29987c194ca1040f096b.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-a3e119e35f3f29987c194ca1040f096b.yaml new file mode 100644 index 0000000000..af556895cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-a3e119e35f3f29987c194ca1040f096b.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-a3e119e35f3f29987c194ca1040f096b + +info: + name: > + Auto Affiliate Links <= 6.4.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17453fa5-af14-477b-9b3d-b245511ad8ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-ade8d23b5006403a0ff80adcff26f453.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-ade8d23b5006403a0ff80adcff26f453.yaml new file mode 100644 index 0000000000..5a80135409 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-ade8d23b5006403a0ff80adcff26f453.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-ade8d23b5006403a0ff80adcff26f453 + +info: + name: > + Auto Affiliate Links <= 6.2.1.5 - Authenticated (Subscriber+) Plugin Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f787c75-7b27-4256-ac0c-abc2988ea7c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-b84aaa0eb34e70d57406b1fb31a3db1e.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-b84aaa0eb34e70d57406b1fb31a3db1e.yaml new file mode 100644 index 0000000000..638a91560a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-b84aaa0eb34e70d57406b1fb31a3db1e.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-b84aaa0eb34e70d57406b1fb31a3db1e + +info: + name: > + Auto Affiliate Links <= 6.4.2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d89918e1-b525-4d32-9b11-5e014eb02c16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-d7c92809e4625ed3fe6e7ee1f56c18ee.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-d7c92809e4625ed3fe6e7ee1f56c18ee.yaml new file mode 100644 index 0000000000..ca8f63a749 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-d7c92809e4625ed3fe6e7ee1f56c18ee.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-d7c92809e4625ed3fe6e7ee1f56c18ee + +info: + name: > + Auto Affiliate Links <= 6.3.0.2 - Cross-Site Request Forgery via aalChangeOptions function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/611af50f-7f60-4c09-be64-3f2705e06206?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-e4074964cc7b7dad2faeab0f0074d7ea.yaml b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-e4074964cc7b7dad2faeab0f0074d7ea.yaml new file mode 100644 index 0000000000..1504238838 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-affiliate-links-e4074964cc7b7dad2faeab0f0074d7ea.yaml @@ -0,0 +1,58 @@ +id: wp-auto-affiliate-links-e4074964cc7b7dad2faeab0f0074d7ea + +info: + name: > + Auto Affiliate Links < 5.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/438d73bb-80f1-460f-8c62-2a40856e4c29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-affiliate-links/" + google-query: inurl:"/wp-content/plugins/wp-auto-affiliate-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-affiliate-links,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-affiliate-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-affiliate-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-republish-83c485f2e43507746d6f598a094e8632.yaml b/nuclei-templates/cve-less/plugins/wp-auto-republish-83c485f2e43507746d6f598a094e8632.yaml new file mode 100644 index 0000000000..3ae38dd791 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-republish-83c485f2e43507746d6f598a094e8632.yaml @@ -0,0 +1,58 @@ +id: wp-auto-republish-83c485f2e43507746d6f598a094e8632 + +info: + name: > + RevivePress – Keep your Old Content Evergreen <= 1.5.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63ecb518-50d6-49ad-92e4-c5a7494ced82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-republish/" + google-query: inurl:"/wp-content/plugins/wp-auto-republish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-republish,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-republish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-republish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-auto-republish-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-auto-republish-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5d3fb4c84d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-auto-republish-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-auto-republish-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-auto-republish/" + google-query: inurl:"/wp-content/plugins/wp-auto-republish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-auto-republish,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-auto-republish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-auto-republish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-automatic-47dfd7659803e2a498c5473e1e3ec44c.yaml b/nuclei-templates/cve-less/plugins/wp-automatic-47dfd7659803e2a498c5473e1e3ec44c.yaml new file mode 100644 index 0000000000..555942115d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-automatic-47dfd7659803e2a498c5473e1e3ec44c.yaml @@ -0,0 +1,58 @@ +id: wp-automatic-47dfd7659803e2a498c5473e1e3ec44c + +info: + name: > + WordPress Automatic Plugin <= 2.0.3 - Cross-Site Request Forgery to SQL Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa45d830-fa28-4d94-a6d5-2dc2b8456cf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-automatic/" + google-query: inurl:"/wp-content/plugins/wp-automatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-automatic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-automatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-automatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-automatic-652fe9285b64528e4143d85b4b2dc5a1.yaml b/nuclei-templates/cve-less/plugins/wp-automatic-652fe9285b64528e4143d85b4b2dc5a1.yaml new file mode 100644 index 0000000000..ed2f666ed9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-automatic-652fe9285b64528e4143d85b4b2dc5a1.yaml @@ -0,0 +1,58 @@ +id: wp-automatic-652fe9285b64528e4143d85b4b2dc5a1 + +info: + name: > + Automatic <= 3.92.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8b319be-f312-4d02-840f-e2a91c16b67a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-automatic/" + google-query: inurl:"/wp-content/plugins/wp-automatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-automatic,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-automatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-automatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.92.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-automatic-6d3dc09a9fc43aca247841d5ac80b15c.yaml b/nuclei-templates/cve-less/plugins/wp-automatic-6d3dc09a9fc43aca247841d5ac80b15c.yaml new file mode 100644 index 0000000000..c1c178f47c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-automatic-6d3dc09a9fc43aca247841d5ac80b15c.yaml @@ -0,0 +1,58 @@ +id: wp-automatic-6d3dc09a9fc43aca247841d5ac80b15c + +info: + name: > + WordPress Automatic Plugin <= 3.53.2 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0567dc8-7a4c-42f4-bf45-f31a8efaa354?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-automatic/" + google-query: inurl:"/wp-content/plugins/wp-automatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-automatic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-automatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-automatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.53.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-automatic-90f8c1652860b9223ed16176900d2afd.yaml b/nuclei-templates/cve-less/plugins/wp-automatic-90f8c1652860b9223ed16176900d2afd.yaml new file mode 100644 index 0000000000..097db871cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-automatic-90f8c1652860b9223ed16176900d2afd.yaml @@ -0,0 +1,58 @@ +id: wp-automatic-90f8c1652860b9223ed16176900d2afd + +info: + name: > + Automatic <= 3.92.0 - Cross-Site Request Forgery to Privilege Escalation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12adf619-4be8-4ecf-8f67-284fc44d87d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-automatic/" + google-query: inurl:"/wp-content/plugins/wp-automatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-automatic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-automatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-automatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.92.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-automatic-bb78f143e91055aae4c346dd861f8fa1.yaml b/nuclei-templates/cve-less/plugins/wp-automatic-bb78f143e91055aae4c346dd861f8fa1.yaml new file mode 100644 index 0000000000..e632d2df71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-automatic-bb78f143e91055aae4c346dd861f8fa1.yaml @@ -0,0 +1,58 @@ +id: wp-automatic-bb78f143e91055aae4c346dd861f8fa1 + +info: + name: > + WordPress Automatic Plugin <= 3.92.1 Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6231e47e-2120-4746-97c1-2aa80aa18f4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-automatic/" + google-query: inurl:"/wp-content/plugins/wp-automatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-automatic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-automatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-automatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.92.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-automatic-bfe038d664cd2a78c28c48237b8f9052.yaml b/nuclei-templates/cve-less/plugins/wp-automatic-bfe038d664cd2a78c28c48237b8f9052.yaml new file mode 100644 index 0000000000..2a68098c98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-automatic-bfe038d664cd2a78c28c48237b8f9052.yaml @@ -0,0 +1,58 @@ +id: wp-automatic-bfe038d664cd2a78c28c48237b8f9052 + +info: + name: > + Automatic <= 3.92.0 - Unauthenticated Arbitrary File Download and Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/620e8931-64f0-4d9c-9a4c-1f5a703845ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-automatic/" + google-query: inurl:"/wp-content/plugins/wp-automatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-automatic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-automatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-automatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.92.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-automedic-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-automedic-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..775fcd2085 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-automedic-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-automedic-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-automedic/" + google-query: inurl:"/wp-content/plugins/wp-automedic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-automedic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-automedic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-automedic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-autosearch-8757d0b374234a37718f99a73c9ea57a.yaml b/nuclei-templates/cve-less/plugins/wp-autosearch-8757d0b374234a37718f99a73c9ea57a.yaml new file mode 100644 index 0000000000..93fcda18b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-autosearch-8757d0b374234a37718f99a73c9ea57a.yaml @@ -0,0 +1,58 @@ +id: wp-autosearch-8757d0b374234a37718f99a73c9ea57a + +info: + name: > + WP AutoComplete Search <= 1.0.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b498e274-db8c-438f-8e19-43f3018d1663?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-autosearch/" + google-query: inurl:"/wp-content/plugins/wp-autosearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-autosearch,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-autosearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-autosearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-awesome-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-awesome-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..811c8c27cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-awesome-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-awesome-faq-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-awesome-faq/" + google-query: inurl:"/wp-content/plugins/wp-awesome-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-awesome-faq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-awesome-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-awesome-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-backgrounds-lite-275ca735c51459885db221498880b57d.yaml b/nuclei-templates/cve-less/plugins/wp-backgrounds-lite-275ca735c51459885db221498880b57d.yaml new file mode 100644 index 0000000000..e9643878b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-backgrounds-lite-275ca735c51459885db221498880b57d.yaml @@ -0,0 +1,58 @@ +id: wp-backgrounds-lite-275ca735c51459885db221498880b57d + +info: + name: > + WP-Backgrounds Lite <= 2.3 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7a05894-8f9d-442f-961c-2e80aa25c3db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-backgrounds-lite/" + google-query: inurl:"/wp-content/plugins/wp-backgrounds-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-backgrounds-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-backgrounds-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-backgrounds-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-backitup-6dee28ffa5289832e7634748227965f3.yaml b/nuclei-templates/cve-less/plugins/wp-backitup-6dee28ffa5289832e7634748227965f3.yaml new file mode 100644 index 0000000000..d7d5998557 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-backitup-6dee28ffa5289832e7634748227965f3.yaml @@ -0,0 +1,58 @@ +id: wp-backitup-6dee28ffa5289832e7634748227965f3 + +info: + name: > + Backup and Restore WordPress – Backup Plugin <= 1.9 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/facb10e9-23f3-4152-bc9a-cecaafebea94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-backitup/" + google-query: inurl:"/wp-content/plugins/wp-backitup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-backitup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-backitup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-backitup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-backitup-bb87858762b8ce23abd3059540eaff9b.yaml b/nuclei-templates/cve-less/plugins/wp-backitup-bb87858762b8ce23abd3059540eaff9b.yaml new file mode 100644 index 0000000000..336dc2efe5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-backitup-bb87858762b8ce23abd3059540eaff9b.yaml @@ -0,0 +1,58 @@ +id: wp-backitup-bb87858762b8ce23abd3059540eaff9b + +info: + name: > + Backup and Restore WordPress – Backup Plugin <= 1.9 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75685f2f-b1d0-4f38-a2b4-1cc0259aedc7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-backitup/" + google-query: inurl:"/wp-content/plugins/wp-backitup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-backitup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-backitup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-backitup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-backitup-ef2dda421f64bcf3a7eba43646d7c8ab.yaml b/nuclei-templates/cve-less/plugins/wp-backitup-ef2dda421f64bcf3a7eba43646d7c8ab.yaml new file mode 100644 index 0000000000..69dbe00fb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-backitup-ef2dda421f64bcf3a7eba43646d7c8ab.yaml @@ -0,0 +1,58 @@ +id: wp-backitup-ef2dda421f64bcf3a7eba43646d7c8ab + +info: + name: > + Backup and Restore WordPress WordPress <= 1.45 - Unauthenticated Information Exposure via Log Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6db51b8e-2e4b-4041-b261-d46cfdb372dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-backitup/" + google-query: inurl:"/wp-content/plugins/wp-backitup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-backitup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-backitup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-backitup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-backup-bank-133f9da4970886f2c6daa016271571ae.yaml b/nuclei-templates/cve-less/plugins/wp-backup-bank-133f9da4970886f2c6daa016271571ae.yaml new file mode 100644 index 0000000000..9c1166b137 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-backup-bank-133f9da4970886f2c6daa016271571ae.yaml @@ -0,0 +1,58 @@ +id: wp-backup-bank-133f9da4970886f2c6daa016271571ae + +info: + name: > + Backup Bank: WordPress Backup Plugin <= 4.0.28 - Missing Authorization via post_user_feedback_backup_bank + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5ab6dcd-ef22-4fea-9e35-9358ede3ff5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-backup-bank/" + google-query: inurl:"/wp-content/plugins/wp-backup-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-backup-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-backup-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-backup-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-backup-manager-24094706612b6a6d63025fb464dc964d.yaml b/nuclei-templates/cve-less/plugins/wp-backup-manager-24094706612b6a6d63025fb464dc964d.yaml new file mode 100644 index 0000000000..b230eb53ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-backup-manager-24094706612b6a6d63025fb464dc964d.yaml @@ -0,0 +1,58 @@ +id: wp-backup-manager-24094706612b6a6d63025fb464dc964d + +info: + name: > + WP Backup Manager <= 1.13.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ee3416b-d6df-4f8b-834b-4e78516c00ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-backup-manager/" + google-query: inurl:"/wp-content/plugins/wp-backup-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-backup-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-backup-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-backup-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-backup-plus-09ab64106100b0ec32bd19145f93c2e8.yaml b/nuclei-templates/cve-less/plugins/wp-backup-plus-09ab64106100b0ec32bd19145f93c2e8.yaml new file mode 100644 index 0000000000..e3c7ab6197 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-backup-plus-09ab64106100b0ec32bd19145f93c2e8.yaml @@ -0,0 +1,58 @@ +id: wp-backup-plus-09ab64106100b0ec32bd19145f93c2e8 + +info: + name: > + WP Backup+ (Unknown Versions) - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fa4585d-9ffa-4a32-aeb7-60cdad63187b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-backup-plus/" + google-query: inurl:"/wp-content/plugins/wp-backup-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-backup-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-backup-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-backup-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-backup-plus-54581f8752e2a09c1534ddfc5763d754.yaml b/nuclei-templates/cve-less/plugins/wp-backup-plus-54581f8752e2a09c1534ddfc5763d754.yaml new file mode 100644 index 0000000000..1d6d034e56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-backup-plus-54581f8752e2a09c1534ddfc5763d754.yaml @@ -0,0 +1,58 @@ +id: wp-backup-plus-54581f8752e2a09c1534ddfc5763d754 + +info: + name: > + WP Backup+ <= 2018-11-22 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbcb33c1-d8f4-4ff9-8148-7bce494b2f0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-backup-plus/" + google-query: inurl:"/wp-content/plugins/wp-backup-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-backup-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-backup-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-backup-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2018-11-22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-baidu-submit-2820cb8fd83fcd8f6cd4181103e215ab.yaml b/nuclei-templates/cve-less/plugins/wp-baidu-submit-2820cb8fd83fcd8f6cd4181103e215ab.yaml new file mode 100644 index 0000000000..08baf98a1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-baidu-submit-2820cb8fd83fcd8f6cd4181103e215ab.yaml @@ -0,0 +1,58 @@ +id: wp-baidu-submit-2820cb8fd83fcd8f6cd4181103e215ab + +info: + name: > + WP BaiDu Submit <= 1.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2241fa07-b6b7-4e5d-8951-ae844a7b88e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-baidu-submit/" + google-query: inurl:"/wp-content/plugins/wp-baidu-submit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-baidu-submit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-baidu-submit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-baidu-submit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ban-012d37d1a0419e2b4d417ad1bf8624b8.yaml b/nuclei-templates/cve-less/plugins/wp-ban-012d37d1a0419e2b4d417ad1bf8624b8.yaml new file mode 100644 index 0000000000..b69b6c38ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ban-012d37d1a0419e2b4d417ad1bf8624b8.yaml @@ -0,0 +1,58 @@ +id: wp-ban-012d37d1a0419e2b4d417ad1bf8624b8 + +info: + name: > + WP-Ban <= 1.69 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5be89866-f60d-4cc6-ac00-80ad15a07fe3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ban/" + google-query: inurl:"/wp-content/plugins/wp-ban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ban,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ban-cd2f40630317ec8325a0d94cdae423ba.yaml b/nuclei-templates/cve-less/plugins/wp-ban-cd2f40630317ec8325a0d94cdae423ba.yaml new file mode 100644 index 0000000000..413418e1bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ban-cd2f40630317ec8325a0d94cdae423ba.yaml @@ -0,0 +1,58 @@ +id: wp-ban-cd2f40630317ec8325a0d94cdae423ba + +info: + name: > + WP-Ban < 1.64 - Improper Input Validation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee8f274b-fe25-4111-94a4-e67dd17dc24b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ban/" + google-query: inurl:"/wp-content/plugins/wp-ban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ban,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-bannerize-b6ce71d23b8bb3b641046b5238bd95ce.yaml b/nuclei-templates/cve-less/plugins/wp-bannerize-b6ce71d23b8bb3b641046b5238bd95ce.yaml new file mode 100644 index 0000000000..0f73367b6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-bannerize-b6ce71d23b8bb3b641046b5238bd95ce.yaml @@ -0,0 +1,58 @@ +id: wp-bannerize-b6ce71d23b8bb3b641046b5238bd95ce + +info: + name: > + WP Bannerize 2.0.0 - 4.0.2 - Authenticated SQL Injection via id Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bafadafe-4aa5-4349-8a9c-89b21ada47ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-bannerize/" + google-query: inurl:"/wp-content/plugins/wp-bannerize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-bannerize,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-bannerize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-bannerize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0.0', '<= 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-bannerize-pro-aedddcad604ad7e5d2eeb8d8f5ee448e.yaml b/nuclei-templates/cve-less/plugins/wp-bannerize-pro-aedddcad604ad7e5d2eeb8d8f5ee448e.yaml new file mode 100644 index 0000000000..06294c309c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-bannerize-pro-aedddcad604ad7e5d2eeb8d8f5ee448e.yaml @@ -0,0 +1,58 @@ +id: wp-bannerize-pro-aedddcad604ad7e5d2eeb8d8f5ee448e + +info: + name: > + WP Bannerize Pro <= 1.6.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edc35f8c-f916-433e-9d3f-4992e8c9d7cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-bannerize-pro/" + google-query: inurl:"/wp-content/plugins/wp-bannerize-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-bannerize-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-bannerize-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-bannerize-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-banners-lite-2a0c0ac8cd49182e6cdc6ee30b392712.yaml b/nuclei-templates/cve-less/plugins/wp-banners-lite-2a0c0ac8cd49182e6cdc6ee30b392712.yaml new file mode 100644 index 0000000000..4f189232e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-banners-lite-2a0c0ac8cd49182e6cdc6ee30b392712.yaml @@ -0,0 +1,58 @@ +id: wp-banners-lite-2a0c0ac8cd49182e6cdc6ee30b392712 + +info: + name: > + WP-Banners-Lite 1.29, 1.31, 1.40 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49f572ab-befe-44a3-b4bd-01b39d4209ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-banners-lite/" + google-query: inurl:"/wp-content/plugins/wp-banners-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-banners-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-banners-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-banners-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-basic-elements-ae553332abea3b98510af17f933a8bf7.yaml b/nuclei-templates/cve-less/plugins/wp-basic-elements-ae553332abea3b98510af17f933a8bf7.yaml new file mode 100644 index 0000000000..675182bd23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-basic-elements-ae553332abea3b98510af17f933a8bf7.yaml @@ -0,0 +1,58 @@ +id: wp-basic-elements-ae553332abea3b98510af17f933a8bf7 + +info: + name: > + WP Basic Elements <= 5.2.15 - Cross-Site Request Forgery via wpbe_save_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78e79423-7b69-4d85-a939-96eb5385624c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-basic-elements/" + google-query: inurl:"/wp-content/plugins/wp-basic-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-basic-elements,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-basic-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-basic-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-basic-elements-fc8825d6c61c86ccb18ee45ace94f66b.yaml b/nuclei-templates/cve-less/plugins/wp-basic-elements-fc8825d6c61c86ccb18ee45ace94f66b.yaml new file mode 100644 index 0000000000..a9ebc3ea9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-basic-elements-fc8825d6c61c86ccb18ee45ace94f66b.yaml @@ -0,0 +1,58 @@ +id: wp-basic-elements-fc8825d6c61c86ccb18ee45ace94f66b + +info: + name: > + WP Basic Elements <= 5.2.15 - Missing Authorization to Plugin Settings Update via wpbe_save_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6516fc0-4ef8-423b-9cdb-a275996fd98b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-basic-elements/" + google-query: inurl:"/wp-content/plugins/wp-basic-elements/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-basic-elements,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-basic-elements/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-basic-elements" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-best-quiz-d89cd4d50e467aee5b89a046ed25a308.yaml b/nuclei-templates/cve-less/plugins/wp-best-quiz-d89cd4d50e467aee5b89a046ed25a308.yaml new file mode 100644 index 0000000000..dcfb3a26d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-best-quiz-d89cd4d50e467aee5b89a046ed25a308.yaml @@ -0,0 +1,58 @@ +id: wp-best-quiz-d89cd4d50e467aee5b89a046ed25a308 + +info: + name: > + WP Best Quiz <= 1.0 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70254a2f-08da-4f78-85d1-08c746167e0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-best-quiz/" + google-query: inurl:"/wp-content/plugins/wp-best-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-best-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-best-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-best-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-better-emails-91762f25ca1ba53290ed2c419bfe3a07.yaml b/nuclei-templates/cve-less/plugins/wp-better-emails-91762f25ca1ba53290ed2c419bfe3a07.yaml new file mode 100644 index 0000000000..c38c1ae1bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-better-emails-91762f25ca1ba53290ed2c419bfe3a07.yaml @@ -0,0 +1,58 @@ +id: wp-better-emails-91762f25ca1ba53290ed2c419bfe3a07 + +info: + name: > + WP Better Emails <= 0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b96d71cb-3af4-4d67-a4af-41bab79a7f61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-better-emails/" + google-query: inurl:"/wp-content/plugins/wp-better-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-better-emails,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-better-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-better-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-better-permalinks-1fb46247dc51fca766c3b6cc15fb0753.yaml b/nuclei-templates/cve-less/plugins/wp-better-permalinks-1fb46247dc51fca766c3b6cc15fb0753.yaml new file mode 100644 index 0000000000..4fd8297db7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-better-permalinks-1fb46247dc51fca766c3b6cc15fb0753.yaml @@ -0,0 +1,58 @@ +id: wp-better-permalinks-1fb46247dc51fca766c3b6cc15fb0753 + +info: + name: > + WP Better Permalinks < 3.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8ccf307-3bb8-45c5-91da-7d0f46e96694?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-better-permalinks/" + google-query: inurl:"/wp-content/plugins/wp-better-permalinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-better-permalinks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-better-permalinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-better-permalinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-bitly-d6f90ea934e0ed467a2133d2d162346d.yaml b/nuclei-templates/cve-less/plugins/wp-bitly-d6f90ea934e0ed467a2133d2d162346d.yaml new file mode 100644 index 0000000000..c2ed52790d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-bitly-d6f90ea934e0ed467a2133d2d162346d.yaml @@ -0,0 +1,58 @@ +id: wp-bitly-d6f90ea934e0ed467a2133d2d162346d + +info: + name: > + Bitly's WordPress Plugin <= 2.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31522e54-f260-46d0-8d57-2d46af7d3450?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-bitly/" + google-query: inurl:"/wp-content/plugins/wp-bitly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-bitly,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-bitly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-bitly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-blipbot-549e52f202fcfb1294c6d1e3496da00f.yaml b/nuclei-templates/cve-less/plugins/wp-blipbot-549e52f202fcfb1294c6d1e3496da00f.yaml new file mode 100644 index 0000000000..07d10f914c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-blipbot-549e52f202fcfb1294c6d1e3496da00f.yaml @@ -0,0 +1,58 @@ +id: wp-blipbot-549e52f202fcfb1294c6d1e3496da00f + +info: + name: > + WP BlipBot <= 3.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd89c6ff-2737-4c48-8b0f-f305c4735775?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-blipbot/" + google-query: inurl:"/wp-content/plugins/wp-blipbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-blipbot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-blipbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-blipbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-blog-and-widgets-8bfdb58ec24e0630da2bd7f7847728ae.yaml b/nuclei-templates/cve-less/plugins/wp-blog-and-widgets-8bfdb58ec24e0630da2bd7f7847728ae.yaml new file mode 100644 index 0000000000..acf8971b2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-blog-and-widgets-8bfdb58ec24e0630da2bd7f7847728ae.yaml @@ -0,0 +1,58 @@ +id: wp-blog-and-widgets-8bfdb58ec24e0630da2bd7f7847728ae + +info: + name: > + WP Blog and Widget <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/434a724e-0bc6-4218-8ad4-c52e1880a75f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-blog-and-widgets/" + google-query: inurl:"/wp-content/plugins/wp-blog-and-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-blog-and-widgets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-blog-and-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-blog-and-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-blog-and-widgets-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/wp-blog-and-widgets-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..3225b07059 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-blog-and-widgets-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: wp-blog-and-widgets-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-blog-and-widgets/" + google-query: inurl:"/wp-content/plugins/wp-blog-and-widgets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-blog-and-widgets,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-blog-and-widgets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-blog-and-widgets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-blogs-planetarium-34fbecc9c7ff44a06fa49fc5283f7c1f.yaml b/nuclei-templates/cve-less/plugins/wp-blogs-planetarium-34fbecc9c7ff44a06fa49fc5283f7c1f.yaml new file mode 100644 index 0000000000..cd0658a809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-blogs-planetarium-34fbecc9c7ff44a06fa49fc5283f7c1f.yaml @@ -0,0 +1,58 @@ +id: wp-blogs-planetarium-34fbecc9c7ff44a06fa49fc5283f7c1f + +info: + name: > + WP Blogs' Planetarium <= 1.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b203694-e18a-4262-bf58-f1dcd0358890?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-blogs-planetarium/" + google-query: inurl:"/wp-content/plugins/wp-blogs-planetarium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-blogs-planetarium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-blogs-planetarium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-blogs-planetarium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-board-4e8e6308af14cc738d0cb86b4562e1c4.yaml b/nuclei-templates/cve-less/plugins/wp-board-4e8e6308af14cc738d0cb86b4562e1c4.yaml new file mode 100644 index 0000000000..3a3091d598 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-board-4e8e6308af14cc738d0cb86b4562e1c4.yaml @@ -0,0 +1,58 @@ +id: wp-board-4e8e6308af14cc738d0cb86b4562e1c4 + +info: + name: > + WP Board <= 1.1(Beta) - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbedf0da-699e-429d-9ec7-6803f3c77a84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-board/" + google-query: inurl:"/wp-content/plugins/wp-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-board,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1(Beta)') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-booking-system-4f49b393f88ca9ff4cbed10f183193ed.yaml b/nuclei-templates/cve-less/plugins/wp-booking-system-4f49b393f88ca9ff4cbed10f183193ed.yaml new file mode 100644 index 0000000000..a08d83effa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-booking-system-4f49b393f88ca9ff4cbed10f183193ed.yaml @@ -0,0 +1,58 @@ +id: wp-booking-system-4f49b393f88ca9ff4cbed10f183193ed + +info: + name: > + WP Booking System <= 2.0.18 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/540fef7f-8952-4525-9d07-fe3b3d777359?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-booking-system/" + google-query: inurl:"/wp-content/plugins/wp-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-booking-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-booking-system-7be8b313071b390988085960c7a1cc2b.yaml b/nuclei-templates/cve-less/plugins/wp-booking-system-7be8b313071b390988085960c7a1cc2b.yaml new file mode 100644 index 0000000000..632737028d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-booking-system-7be8b313071b390988085960c7a1cc2b.yaml @@ -0,0 +1,58 @@ +id: wp-booking-system-7be8b313071b390988085960c7a1cc2b + +info: + name: > + WP Booking System – Booking Calendar <= 2.0.14 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f294575d-ce83-4301-ae38-3f0761d9b610?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-booking-system/" + google-query: inurl:"/wp-content/plugins/wp-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-booking-system-96e25e69c7f878ae73c7f29f99c97760.yaml b/nuclei-templates/cve-less/plugins/wp-booking-system-96e25e69c7f878ae73c7f29f99c97760.yaml new file mode 100644 index 0000000000..2e0198a547 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-booking-system-96e25e69c7f878ae73c7f29f99c97760.yaml @@ -0,0 +1,58 @@ +id: wp-booking-system-96e25e69c7f878ae73c7f29f99c97760 + +info: + name: > + WP Booking System Free version < 1.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/843822f0-dd4c-4ae6-823d-96dd7a59df8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-booking-system/" + google-query: inurl:"/wp-content/plugins/wp-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-booking-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-booking-system-bba48b2b3db8c722b3183d512e2cbe2e.yaml b/nuclei-templates/cve-less/plugins/wp-booking-system-bba48b2b3db8c722b3183d512e2cbe2e.yaml new file mode 100644 index 0000000000..835728a870 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-booking-system-bba48b2b3db8c722b3183d512e2cbe2e.yaml @@ -0,0 +1,58 @@ +id: wp-booking-system-bba48b2b3db8c722b3183d512e2cbe2e + +info: + name: > + WP Booking System <= 2.0.19.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/805c46ec-0b8a-4a40-bfc9-5d2d8d43a17b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-booking-system/" + google-query: inurl:"/wp-content/plugins/wp-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-booking-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.19.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-booking-system-cb489cb39876b1f1dad08fd79397698a.yaml b/nuclei-templates/cve-less/plugins/wp-booking-system-cb489cb39876b1f1dad08fd79397698a.yaml new file mode 100644 index 0000000000..fd100ac144 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-booking-system-cb489cb39876b1f1dad08fd79397698a.yaml @@ -0,0 +1,58 @@ +id: wp-booking-system-cb489cb39876b1f1dad08fd79397698a + +info: + name: > + WP Booking System – Booking Calendar < 1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae35a02c-ba33-478d-a054-98b486e2192a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-booking-system/" + google-query: inurl:"/wp-content/plugins/wp-booking-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-booking-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-booking-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-booking-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-booking-system-premium-cb489cb39876b1f1dad08fd79397698a.yaml b/nuclei-templates/cve-less/plugins/wp-booking-system-premium-cb489cb39876b1f1dad08fd79397698a.yaml new file mode 100644 index 0000000000..c5bc59662a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-booking-system-premium-cb489cb39876b1f1dad08fd79397698a.yaml @@ -0,0 +1,58 @@ +id: wp-booking-system-premium-cb489cb39876b1f1dad08fd79397698a + +info: + name: > + WP Booking System – Booking Calendar < 1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae35a02c-ba33-478d-a054-98b486e2192a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-booking-system-premium/" + google-query: inurl:"/wp-content/plugins/wp-booking-system-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-booking-system-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-booking-system-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-booking-system-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-booklet-12bc7ed9ac4b4df7c9585c5a1693f987.yaml b/nuclei-templates/cve-less/plugins/wp-booklet-12bc7ed9ac4b4df7c9585c5a1693f987.yaml new file mode 100644 index 0000000000..1b29a48d8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-booklet-12bc7ed9ac4b4df7c9585c5a1693f987.yaml @@ -0,0 +1,58 @@ +id: wp-booklet-12bc7ed9ac4b4df7c9585c5a1693f987 + +info: + name: > + WP Booklet <= 2.1.8 - Authenticated (Subscriber+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02551726-672d-481a-8b77-ec7bf33a22c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-booklet/" + google-query: inurl:"/wp-content/plugins/wp-booklet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-booklet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-booklet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-booklet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-books-gallery-6e616d77f2461fd1d3e6a21e8750c36c.yaml b/nuclei-templates/cve-less/plugins/wp-books-gallery-6e616d77f2461fd1d3e6a21e8750c36c.yaml new file mode 100644 index 0000000000..c1e06ec132 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-books-gallery-6e616d77f2461fd1d3e6a21e8750c36c.yaml @@ -0,0 +1,58 @@ +id: wp-books-gallery-6e616d77f2461fd1d3e6a21e8750c36c + +info: + name: > + WordPress Books Gallery <= 4.4.8 - Cross-Site Request Forgery leading to Plugin Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2e10791-7158-47ae-85c9-4a5a53b25d68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-books-gallery/" + google-query: inurl:"/wp-content/plugins/wp-books-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-books-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-books-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-books-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-books-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-books-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..992160338e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-books-gallery-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-books-gallery-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-books-gallery/" + google-query: inurl:"/wp-content/plugins/wp-books-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-books-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-books-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-books-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-bootstrap-gallery-2326f2ccfd7003acca183b6e98abdbd2.yaml b/nuclei-templates/cve-less/plugins/wp-bootstrap-gallery-2326f2ccfd7003acca183b6e98abdbd2.yaml new file mode 100644 index 0000000000..af5f7666b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-bootstrap-gallery-2326f2ccfd7003acca183b6e98abdbd2.yaml @@ -0,0 +1,58 @@ +id: wp-bootstrap-gallery-2326f2ccfd7003acca183b6e98abdbd2 + +info: + name: > + WP Bootstrap Gallery <= 1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/040005bc-bdc3-4085-8192-cd0a7e38fee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-bootstrap-gallery/" + google-query: inurl:"/wp-content/plugins/wp-bootstrap-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-bootstrap-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-bootstrap-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-bootstrap-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-born-babies-2a429e3083a4c7d371b1df483f6771d1.yaml b/nuclei-templates/cve-less/plugins/wp-born-babies-2a429e3083a4c7d371b1df483f6771d1.yaml new file mode 100644 index 0000000000..f7531eae59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-born-babies-2a429e3083a4c7d371b1df483f6771d1.yaml @@ -0,0 +1,58 @@ +id: wp-born-babies-2a429e3083a4c7d371b1df483f6771d1 + +info: + name: > + //// WP BORN BABIES PLUGIN /// <= 1.0 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f97d97fd-5eac-4fdb-b65a-4c42c3005a2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-born-babies/" + google-query: inurl:"/wp-content/plugins/wp-born-babies/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-born-babies,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-born-babies/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-born-babies" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-broken-images-9dbf8fc670267468d6465754d6800d70.yaml b/nuclei-templates/cve-less/plugins/wp-broken-images-9dbf8fc670267468d6465754d6800d70.yaml new file mode 100644 index 0000000000..bb1c701a8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-broken-images-9dbf8fc670267468d6465754d6800d70.yaml @@ -0,0 +1,58 @@ +id: wp-broken-images-9dbf8fc670267468d6465754d6800d70 + +info: + name: > + Broken Images <= 0.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d6e97cd-7da7-43ab-bd88-ebd442d50aa3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-broken-images/" + google-query: inurl:"/wp-content/plugins/wp-broken-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-broken-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-broken-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-broken-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-browser-update-1bed895aa03e840b8e1fbdc433b64dc4.yaml b/nuclei-templates/cve-less/plugins/wp-browser-update-1bed895aa03e840b8e1fbdc433b64dc4.yaml new file mode 100644 index 0000000000..bf16554bf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-browser-update-1bed895aa03e840b8e1fbdc433b64dc4.yaml @@ -0,0 +1,58 @@ +id: wp-browser-update-1bed895aa03e840b8e1fbdc433b64dc4 + +info: + name: > + WP BrowserUpdate <= 4.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d3fa716-6f11-428c-b2da-2bb768a92fe0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-browser-update/" + google-query: inurl:"/wp-content/plugins/wp-browser-update/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-browser-update,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-browser-update/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-browser-update" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-browser-update-324762b1db43ab659ab273b35e9a6427.yaml b/nuclei-templates/cve-less/plugins/wp-browser-update-324762b1db43ab659ab273b35e9a6427.yaml new file mode 100644 index 0000000000..27aa0e1b8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-browser-update-324762b1db43ab659ab273b35e9a6427.yaml @@ -0,0 +1,58 @@ +id: wp-browser-update-324762b1db43ab659ab273b35e9a6427 + +info: + name: > + WP BrowserUpdate <= 4.4.1 - Cross-Site Request Forgery via wpbu_administration + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/050ca18d-7596-4094-b24a-752857f5e478?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-browser-update/" + google-query: inurl:"/wp-content/plugins/wp-browser-update/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-browser-update,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-browser-update/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-browser-update" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-buddha-free-adwords-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-buddha-free-adwords-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..1be20a413a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-buddha-free-adwords-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-buddha-free-adwords-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-buddha-free-adwords/" + google-query: inurl:"/wp-content/plugins/wp-buddha-free-adwords/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-buddha-free-adwords,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-buddha-free-adwords/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-buddha-free-adwords" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-bugbot-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-bugbot-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..10ca5ad560 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-bugbot-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-bugbot-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-bugbot/" + google-query: inurl:"/wp-content/plugins/wp-bugbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-bugbot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-bugbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-bugbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-business-directory-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/wp-business-directory-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..3bb238f0d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-business-directory-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: wp-business-directory-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-business-directory/" + google-query: inurl:"/wp-content/plugins/wp-business-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-business-directory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-business-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-business-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-business-intelligence-lite-1163b6a8ec95736fa4c6fa05104ece7e.yaml b/nuclei-templates/cve-less/plugins/wp-business-intelligence-lite-1163b6a8ec95736fa4c6fa05104ece7e.yaml new file mode 100644 index 0000000000..865639ee3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-business-intelligence-lite-1163b6a8ec95736fa4c6fa05104ece7e.yaml @@ -0,0 +1,58 @@ +id: wp-business-intelligence-lite-1163b6a8ec95736fa4c6fa05104ece7e + +info: + name: > + WP Business intelligence lite < 1.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee8ad691-b598-4eeb-b8a7-645c3bd968ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-business-intelligence-lite/" + google-query: inurl:"/wp-content/plugins/wp-business-intelligence-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-business-intelligence-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-business-intelligence-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-business-intelligence-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-business-intelligence-lite-f8cc4565cf41b4df5b2b7d0c05a42787.yaml b/nuclei-templates/cve-less/plugins/wp-business-intelligence-lite-f8cc4565cf41b4df5b2b7d0c05a42787.yaml new file mode 100644 index 0000000000..d063ef1c7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-business-intelligence-lite-f8cc4565cf41b4df5b2b7d0c05a42787.yaml @@ -0,0 +1,58 @@ +id: wp-business-intelligence-lite-f8cc4565cf41b4df5b2b7d0c05a42787 + +info: + name: > + WP Business Intelligence Lite <= 1.6.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7eb6137-5c03-4f73-a478-c1c18ee91fba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-business-intelligence-lite/" + google-query: inurl:"/wp-content/plugins/wp-business-intelligence-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-business-intelligence-lite,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-business-intelligence-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-business-intelligence-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cachecom-648854ce1a941daab3125afb660bc4a5.yaml b/nuclei-templates/cve-less/plugins/wp-cachecom-648854ce1a941daab3125afb660bc4a5.yaml new file mode 100644 index 0000000000..8136ee2957 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cachecom-648854ce1a941daab3125afb660bc4a5.yaml @@ -0,0 +1,58 @@ +id: wp-cachecom-648854ce1a941daab3125afb660bc4a5 + +info: + name: > + WP-Cache.com <= 1.1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9a28625-19e4-4696-bb51-7115368120d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cachecom/" + google-query: inurl:"/wp-content/plugins/wp-cachecom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cachecom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cachecom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cachecom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cafe-34721fea6a2d4e3ec618e5f696ce767f.yaml b/nuclei-templates/cve-less/plugins/wp-cafe-34721fea6a2d4e3ec618e5f696ce767f.yaml new file mode 100644 index 0000000000..97972cc89f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cafe-34721fea6a2d4e3ec618e5f696ce767f.yaml @@ -0,0 +1,58 @@ +id: wp-cafe-34721fea6a2d4e3ec618e5f696ce767f + +info: + name: > + WPCafe <= 2.2.22 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4261bc62-a091-408b-8643-e6fa61d62103?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cafe/" + google-query: inurl:"/wp-content/plugins/wp-cafe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cafe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cafe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cafe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cafe-352ffd44ce61ab8d22bcb3394c22313a.yaml b/nuclei-templates/cve-less/plugins/wp-cafe-352ffd44ce61ab8d22bcb3394c22313a.yaml new file mode 100644 index 0000000000..3e2d4ac8c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cafe-352ffd44ce61ab8d22bcb3394c22313a.yaml @@ -0,0 +1,58 @@ +id: wp-cafe-352ffd44ce61ab8d22bcb3394c22313a + +info: + name: > + WPCafe – Food Menu, WooCommerce Food Ordering, Food Delivery, Pickup and Restaurant Reservation <= 2.1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b49ae7fc-e860-4387-b596-12640ec7277f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cafe/" + google-query: inurl:"/wp-content/plugins/wp-cafe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cafe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cafe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cafe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cal-f584c8e11a9dac20a4d8a5133459696f.yaml b/nuclei-templates/cve-less/plugins/wp-cal-f584c8e11a9dac20a4d8a5133459696f.yaml new file mode 100644 index 0000000000..dd264c1200 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cal-f584c8e11a9dac20a4d8a5133459696f.yaml @@ -0,0 +1,58 @@ +id: wp-cal-f584c8e11a9dac20a4d8a5133459696f + +info: + name: > + WP-Cal <= 0.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bb7ee83-f75a-4f19-8595-f5cf2ee97ae0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cal/" + google-query: inurl:"/wp-content/plugins/wp-cal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cal,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-calameo-d827c61ecd6e1b49bd9f088b6451ceb2.yaml b/nuclei-templates/cve-less/plugins/wp-calameo-d827c61ecd6e1b49bd9f088b6451ceb2.yaml new file mode 100644 index 0000000000..be82ec4164 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-calameo-d827c61ecd6e1b49bd9f088b6451ceb2.yaml @@ -0,0 +1,58 @@ +id: wp-calameo-d827c61ecd6e1b49bd9f088b6451ceb2 + +info: + name: > + WP Calameo <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebe03cde-7956-4185-8990-8d47f174e60a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-calameo/" + google-query: inurl:"/wp-content/plugins/wp-calameo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-calameo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-calameo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-calameo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-calendar-7d771013dd99d35b0d7273344b75ad3f.yaml b/nuclei-templates/cve-less/plugins/wp-calendar-7d771013dd99d35b0d7273344b75ad3f.yaml new file mode 100644 index 0000000000..95a695c3e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-calendar-7d771013dd99d35b0d7273344b75ad3f.yaml @@ -0,0 +1,58 @@ +id: wp-calendar-7d771013dd99d35b0d7273344b75ad3f + +info: + name: > + WP Calendar <= 1.5.3 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c16cd71e-a09e-4d34-99be-b632a3e64253?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-calendar/" + google-query: inurl:"/wp-content/plugins/wp-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-captcha-0a98ad5ece69d0c7228854255adb9a0c.yaml b/nuclei-templates/cve-less/plugins/wp-captcha-0a98ad5ece69d0c7228854255adb9a0c.yaml new file mode 100644 index 0000000000..8c04618f2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-captcha-0a98ad5ece69d0c7228854255adb9a0c.yaml @@ -0,0 +1,58 @@ +id: wp-captcha-0a98ad5ece69d0c7228854255adb9a0c + +info: + name: > + WP Captcha <= 2.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/810adc9a-d4e1-46a8-89e4-22615cbbb9c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-captcha/" + google-query: inurl:"/wp-content/plugins/wp-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-captcha-da8dfca2c41b22eddf583b5ba482b227.yaml b/nuclei-templates/cve-less/plugins/wp-captcha-da8dfca2c41b22eddf583b5ba482b227.yaml new file mode 100644 index 0000000000..93e6ff7d46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-captcha-da8dfca2c41b22eddf583b5ba482b227.yaml @@ -0,0 +1,58 @@ +id: wp-captcha-da8dfca2c41b22eddf583b5ba482b227 + +info: + name: > + WP Captcha <= 2.0.0 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bc2a04c-7b7c-483f-b81b-97a7caac179c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-captcha/" + google-query: inurl:"/wp-content/plugins/wp-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-captcha,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-carousel-free-4b6f3787781ed281c4bf315d7815f11d.yaml b/nuclei-templates/cve-less/plugins/wp-carousel-free-4b6f3787781ed281c4bf315d7815f11d.yaml new file mode 100644 index 0000000000..a6d9ba50d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-carousel-free-4b6f3787781ed281c4bf315d7815f11d.yaml @@ -0,0 +1,58 @@ +id: wp-carousel-free-4b6f3787781ed281c4bf315d7815f11d + +info: + name: > + Carousel, Slider, Gallery by WP Carousel <= 2.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3559bba-daa2-4a00-958c-6568cdbb592f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-carousel-free/" + google-query: inurl:"/wp-content/plugins/wp-carousel-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-carousel-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-carousel-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-carousel-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-carousel-free-6ae6ba71c1c511094e234e44db33e39b.yaml b/nuclei-templates/cve-less/plugins/wp-carousel-free-6ae6ba71c1c511094e234e44db33e39b.yaml new file mode 100644 index 0000000000..51be442a83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-carousel-free-6ae6ba71c1c511094e234e44db33e39b.yaml @@ -0,0 +1,58 @@ +id: wp-carousel-free-6ae6ba71c1c511094e234e44db33e39b + +info: + name: > + Carousel, Slider, Gallery by WP Carousel – Image Carousel & Photo Gallery, Post Carousel & Post Grid, Product Carousel & Product Grid for WooCommerce <= 2.6.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'sp_wp_carousel_shortcode' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9349208c-3e86-4ec6-9e10-5ecaa4923922?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-carousel-free/" + google-query: inurl:"/wp-content/plugins/wp-carousel-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-carousel-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-carousel-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-carousel-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-carousel-free-91917d1d663ea184f4f2f69e04c99474.yaml b/nuclei-templates/cve-less/plugins/wp-carousel-free-91917d1d663ea184f4f2f69e04c99474.yaml new file mode 100644 index 0000000000..5d14f98aaa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-carousel-free-91917d1d663ea184f4f2f69e04c99474.yaml @@ -0,0 +1,58 @@ +id: wp-carousel-free-91917d1d663ea184f4f2f69e04c99474 + +info: + name: > + Carousel, Slider, Gallery by WP Carousel – Image Carousel & Photo Gallery, Post Carousel & Post Grid, Product Carousel & Product Grid for WooCommerce <= 2.6.3 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d66df15e-1a0a-49e9-bcf9-67091499b24e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-carousel-free/" + google-query: inurl:"/wp-content/plugins/wp-carousel-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-carousel-free,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-carousel-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-carousel-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-catalogue-525630ec5598f74dd721d94a531fba2f.yaml b/nuclei-templates/cve-less/plugins/wp-catalogue-525630ec5598f74dd721d94a531fba2f.yaml new file mode 100644 index 0000000000..d6b8e18ef4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-catalogue-525630ec5598f74dd721d94a531fba2f.yaml @@ -0,0 +1,58 @@ +id: wp-catalogue-525630ec5598f74dd721d94a531fba2f + +info: + name: > + WP Catalogue <= 1.7.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5684d4b7-8a3e-47ee-9d7b-195cb5db9a66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-catalogue/" + google-query: inurl:"/wp-content/plugins/wp-catalogue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-catalogue,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-catalogue/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-catalogue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-categories-widget-aab20aa3ba5a82ccff2265ebe56cac66.yaml b/nuclei-templates/cve-less/plugins/wp-categories-widget-aab20aa3ba5a82ccff2265ebe56cac66.yaml new file mode 100644 index 0000000000..bcb5bbbf93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-categories-widget-aab20aa3ba5a82ccff2265ebe56cac66.yaml @@ -0,0 +1,58 @@ +id: wp-categories-widget-aab20aa3ba5a82ccff2265ebe56cac66 + +info: + name: > + WP Categories Widget <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6240290-4b6c-46ba-9f78-e6bba3504f17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-categories-widget/" + google-query: inurl:"/wp-content/plugins/wp-categories-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-categories-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-categories-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-categories-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-category-meta-070f5b1993a30da98cfd837719ef997d.yaml b/nuclei-templates/cve-less/plugins/wp-category-meta-070f5b1993a30da98cfd837719ef997d.yaml new file mode 100644 index 0000000000..af1e5d486b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-category-meta-070f5b1993a30da98cfd837719ef997d.yaml @@ -0,0 +1,58 @@ +id: wp-category-meta-070f5b1993a30da98cfd837719ef997d + +info: + name: > + Category Meta <= 1.2.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf2ddc42-9910-40e5-9546-89f229b852da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-category-meta/" + google-query: inurl:"/wp-content/plugins/wp-category-meta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-category-meta,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-category-meta/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-category-meta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-category-posts-list-2349a7bd555a58451ac9e6f7145fe711.yaml b/nuclei-templates/cve-less/plugins/wp-category-posts-list-2349a7bd555a58451ac9e6f7145fe711.yaml new file mode 100644 index 0000000000..6e6aecf95f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-category-posts-list-2349a7bd555a58451ac9e6f7145fe711.yaml @@ -0,0 +1,58 @@ +id: wp-category-posts-list-2349a7bd555a58451ac9e6f7145fe711 + +info: + name: > + WP Category Post List Widget <= 2.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15d61530-5ef9-4dce-8ace-6d8cc07c7b5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-category-posts-list/" + google-query: inurl:"/wp-content/plugins/wp-category-posts-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-category-posts-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-category-posts-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-category-posts-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-category-posts-list-91173f58fb32fd621503c873c6d8b146.yaml b/nuclei-templates/cve-less/plugins/wp-category-posts-list-91173f58fb32fd621503c873c6d8b146.yaml new file mode 100644 index 0000000000..b6a3e8d0f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-category-posts-list-91173f58fb32fd621503c873c6d8b146.yaml @@ -0,0 +1,58 @@ +id: wp-category-posts-list-91173f58fb32fd621503c873c6d8b146 + +info: + name: > + WP Category Post List Widget <= 2.0.3 - Cross-Site Request Forgery via gen_set_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c61b5668-18d8-42e0-9ee3-d26ab7424350?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-category-posts-list/" + google-query: inurl:"/wp-content/plugins/wp-category-posts-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-category-posts-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-category-posts-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-category-posts-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-central-124c235f99b301743df1e63ff167148a.yaml b/nuclei-templates/cve-less/plugins/wp-central-124c235f99b301743df1e63ff167148a.yaml new file mode 100644 index 0000000000..fb8784b894 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-central-124c235f99b301743df1e63ff167148a.yaml @@ -0,0 +1,58 @@ +id: wp-central-124c235f99b301743df1e63ff167148a + +info: + name: > + wpCentral <= 1.5.0 - Improper Access Control to Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/540d444f-7a6c-4c14-a9c7-52209ad59a11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-central/" + google-query: inurl:"/wp-content/plugins/wp-central/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-central,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-central/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-central" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-central-3814938e3640604c2b661225dcd59b9c.yaml b/nuclei-templates/cve-less/plugins/wp-central-3814938e3640604c2b661225dcd59b9c.yaml new file mode 100644 index 0000000000..97aa8c54e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-central-3814938e3640604c2b661225dcd59b9c.yaml @@ -0,0 +1,58 @@ +id: wp-central-3814938e3640604c2b661225dcd59b9c + +info: + name: > + wpCentral <= 1.4.7 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b06792e-0b4e-4c1e-b7e9-8cbbae343298?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-central/" + google-query: inurl:"/wp-content/plugins/wp-central/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-central,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-central/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-central" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-central-40f584e497f01d406cc7fecd2f3771f0.yaml b/nuclei-templates/cve-less/plugins/wp-central-40f584e497f01d406cc7fecd2f3771f0.yaml new file mode 100644 index 0000000000..8a2c18065d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-central-40f584e497f01d406cc7fecd2f3771f0.yaml @@ -0,0 +1,58 @@ +id: wp-central-40f584e497f01d406cc7fecd2f3771f0 + +info: + name: > + wpCentral <= 1.5.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49d03254-7399-4a5d-9ce9-7d4736b8b2ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-central/" + google-query: inurl:"/wp-content/plugins/wp-central/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-central,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-central/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-central" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cerber-00e68b1df25f64641326f1dec4151572.yaml b/nuclei-templates/cve-less/plugins/wp-cerber-00e68b1df25f64641326f1dec4151572.yaml new file mode 100644 index 0000000000..ea426dc576 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cerber-00e68b1df25f64641326f1dec4151572.yaml @@ -0,0 +1,58 @@ +id: wp-cerber-00e68b1df25f64641326f1dec4151572 + +info: + name: > + WP Cerber Security <= 9.3.2 - User Enumeration Bypass via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a700c1c-2ac2-47b8-95e6-ee1a02f50c12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cerber/" + google-query: inurl:"/wp-content/plugins/wp-cerber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cerber,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cerber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cerber-42ad4e32d4737220d58f4a4e7f0c15a2.yaml b/nuclei-templates/cve-less/plugins/wp-cerber-42ad4e32d4737220d58f4a4e7f0c15a2.yaml new file mode 100644 index 0000000000..3c35d813f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cerber-42ad4e32d4737220d58f4a4e7f0c15a2.yaml @@ -0,0 +1,58 @@ +id: wp-cerber-42ad4e32d4737220d58f4a4e7f0c15a2 + +info: + name: > + Cerber Security, Anti-spam & Malware Scan < 2.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df657cdc-00fc-476a-a64f-abfdd6b30739?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cerber/" + google-query: inurl:"/wp-content/plugins/wp-cerber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cerber,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cerber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cerber-47b0a77f72cd6358c4ce2e9a58f14fae.yaml b/nuclei-templates/cve-less/plugins/wp-cerber-47b0a77f72cd6358c4ce2e9a58f14fae.yaml new file mode 100644 index 0000000000..3b247177e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cerber-47b0a77f72cd6358c4ce2e9a58f14fae.yaml @@ -0,0 +1,58 @@ +id: wp-cerber-47b0a77f72cd6358c4ce2e9a58f14fae + +info: + name: > + WP Cerber Security <= 9.0 - User Enumeration Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/081a5fda-abe2-4f20-bea2-3f7dd3c3a6cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cerber/" + google-query: inurl:"/wp-content/plugins/wp-cerber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cerber,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cerber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cerber-5915172b226df8e80423b0b8b00c97b9.yaml b/nuclei-templates/cve-less/plugins/wp-cerber-5915172b226df8e80423b0b8b00c97b9.yaml new file mode 100644 index 0000000000..0b597ddc30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cerber-5915172b226df8e80423b0b8b00c97b9.yaml @@ -0,0 +1,58 @@ +id: wp-cerber-5915172b226df8e80423b0b8b00c97b9 + +info: + name: > + WP Cerber Security <= 9.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cd9cbba-10b0-4fb0-ad49-4593a307a615?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cerber/" + google-query: inurl:"/wp-content/plugins/wp-cerber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cerber,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cerber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cerber-ae6491998df759b28d14cdb429fd6751.yaml b/nuclei-templates/cve-less/plugins/wp-cerber-ae6491998df759b28d14cdb429fd6751.yaml new file mode 100644 index 0000000000..9c7f90c22f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cerber-ae6491998df759b28d14cdb429fd6751.yaml @@ -0,0 +1,58 @@ +id: wp-cerber-ae6491998df759b28d14cdb429fd6751 + +info: + name: > + WP Cerber Security <= 9.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc5050dc-39de-4544-bf51-0927b2972d34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cerber/" + google-query: inurl:"/wp-content/plugins/wp-cerber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cerber,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cerber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cerber-e40d5c75fb230023d171a6172222366a.yaml b/nuclei-templates/cve-less/plugins/wp-cerber-e40d5c75fb230023d171a6172222366a.yaml new file mode 100644 index 0000000000..3322872ad0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cerber-e40d5c75fb230023d171a6172222366a.yaml @@ -0,0 +1,58 @@ +id: wp-cerber-e40d5c75fb230023d171a6172222366a + +info: + name: > + WP Cerber Security <= 8.9.5.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03329efa-6ffd-42e1-ab7e-cc21cb48866f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cerber/" + google-query: inurl:"/wp-content/plugins/wp-cerber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cerber,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cerber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.9.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cerber-f1c926e99dc13eb40c609c7d4094f9b0.yaml b/nuclei-templates/cve-less/plugins/wp-cerber-f1c926e99dc13eb40c609c7d4094f9b0.yaml new file mode 100644 index 0000000000..42acc7fead --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cerber-f1c926e99dc13eb40c609c7d4094f9b0.yaml @@ -0,0 +1,58 @@ +id: wp-cerber-f1c926e99dc13eb40c609c7d4094f9b0 + +info: + name: > + WP Cerber Security < 8.9.3 - Multifactor Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/855d3e2a-8ab1-4e7b-b435-f3c31171deeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cerber/" + google-query: inurl:"/wp-content/plugins/wp-cerber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cerber,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cerber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cerber-f203d2dfc14bc6efd92b667d0eba2f47.yaml b/nuclei-templates/cve-less/plugins/wp-cerber-f203d2dfc14bc6efd92b667d0eba2f47.yaml new file mode 100644 index 0000000000..5daedbba7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cerber-f203d2dfc14bc6efd92b667d0eba2f47.yaml @@ -0,0 +1,58 @@ +id: wp-cerber-f203d2dfc14bc6efd92b667d0eba2f47 + +info: + name: > + WP Cerber < 8.9.3 - Access Bypass Control + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6e48963-e773-46e1-ae45-03fe5e20f09e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cerber/" + google-query: inurl:"/wp-content/plugins/wp-cerber/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cerber,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cerber" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cfm-23d9a477d53eb5ee302467e17a43e605.yaml b/nuclei-templates/cve-less/plugins/wp-cfm-23d9a477d53eb5ee302467e17a43e605.yaml new file mode 100644 index 0000000000..46b3fc0938 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cfm-23d9a477d53eb5ee302467e17a43e605.yaml @@ -0,0 +1,58 @@ +id: wp-cfm-23d9a477d53eb5ee302467e17a43e605 + +info: + name: > + WP-CFM <= 1.7.8 - Cross-Site Request Forgery via multiple AJAX functions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9790c592-1445-4f9d-987e-ae5ab49c4dcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cfm/" + google-query: inurl:"/wp-content/plugins/wp-cfm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cfm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cfm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cfm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-championship-cb362ac834e4e127112e662b8e597a11.yaml b/nuclei-templates/cve-less/plugins/wp-championship-cb362ac834e4e127112e662b8e597a11.yaml new file mode 100644 index 0000000000..63540efb60 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-championship-cb362ac834e4e127112e662b8e597a11.yaml @@ -0,0 +1,58 @@ +id: wp-championship-cb362ac834e4e127112e662b8e597a11 + +info: + name: > + wp-championship <= 9.2 - Multiple Cross-Site Request Forgery Vulnerabilities + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd1838c4-00df-4177-84be-1f8c19ceae4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-championship/" + google-query: inurl:"/wp-content/plugins/wp-championship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-championship,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-championship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-championship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-championship-cb7fe4a1f5c046460e4d69413b578527.yaml b/nuclei-templates/cve-less/plugins/wp-championship-cb7fe4a1f5c046460e4d69413b578527.yaml new file mode 100644 index 0000000000..74d35f4658 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-championship-cb7fe4a1f5c046460e4d69413b578527.yaml @@ -0,0 +1,58 @@ +id: wp-championship-cb7fe4a1f5c046460e4d69413b578527 + +info: + name: > + wp-championship < 5.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28d3388e-0731-46b6-bf66-e7a1d98c321a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-championship/" + google-query: inurl:"/wp-content/plugins/wp-championship/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-championship,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-championship/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-championship" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-change-email-sender-f5fc5ba02aa4560ef332189f36172c97.yaml b/nuclei-templates/cve-less/plugins/wp-change-email-sender-f5fc5ba02aa4560ef332189f36172c97.yaml new file mode 100644 index 0000000000..5f104ea67b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-change-email-sender-f5fc5ba02aa4560ef332189f36172c97.yaml @@ -0,0 +1,58 @@ +id: wp-change-email-sender-f5fc5ba02aa4560ef332189f36172c97 + +info: + name: > + WP Change Email Sender <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88855d83-d182-4b10-b44f-cd0edec07db1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-change-email-sender/" + google-query: inurl:"/wp-content/plugins/wp-change-email-sender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-change-email-sender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-change-email-sender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-change-email-sender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-charts-c499c5763cb0c8fadcbd79a7862db8b4.yaml b/nuclei-templates/cve-less/plugins/wp-charts-c499c5763cb0c8fadcbd79a7862db8b4.yaml new file mode 100644 index 0000000000..84305181f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-charts-c499c5763cb0c8fadcbd79a7862db8b4.yaml @@ -0,0 +1,58 @@ +id: wp-charts-c499c5763cb0c8fadcbd79a7862db8b4 + +info: + name: > + WordPress Charts <= 0.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2de2d2c5-1373-45b6-93a0-575713226669?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-charts/" + google-query: inurl:"/wp-content/plugins/wp-charts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-charts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-charts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-charts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-chatbot-3243534248880dc4d13208e428d3bdd1.yaml b/nuclei-templates/cve-less/plugins/wp-chatbot-3243534248880dc4d13208e428d3bdd1.yaml new file mode 100644 index 0000000000..ac4eb868fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-chatbot-3243534248880dc4d13208e428d3bdd1.yaml @@ -0,0 +1,58 @@ +id: wp-chatbot-3243534248880dc4d13208e428d3bdd1 + +info: + name: > + WP-Chatbot for Messenger <= 4.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/432df51f-2855-4bf2-8be1-77a893e3aa29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-chatbot/" + google-query: inurl:"/wp-content/plugins/wp-chatbot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-chatbot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-chatbot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-chatbot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-chgfontsize-13481b1ed77fd504fee89b917516fad5.yaml b/nuclei-templates/cve-less/plugins/wp-chgfontsize-13481b1ed77fd504fee89b917516fad5.yaml new file mode 100644 index 0000000000..bc6b83348c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-chgfontsize-13481b1ed77fd504fee89b917516fad5.yaml @@ -0,0 +1,58 @@ +id: wp-chgfontsize-13481b1ed77fd504fee89b917516fad5 + +info: + name: > + WP-chgFontSize <= 1.8 - Cross-Site Request Forgery to Settings Update and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b897790-43f7-4ca4-8abe-9dc736a7c011?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-chgfontsize/" + google-query: inurl:"/wp-content/plugins/wp-chgfontsize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-chgfontsize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-chgfontsize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-chgfontsize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-child-theme-generator-c4cf1ef74f307e3d974c13ea6edd24eb.yaml b/nuclei-templates/cve-less/plugins/wp-child-theme-generator-c4cf1ef74f307e3d974c13ea6edd24eb.yaml new file mode 100644 index 0000000000..af0265da4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-child-theme-generator-c4cf1ef74f307e3d974c13ea6edd24eb.yaml @@ -0,0 +1,58 @@ +id: wp-child-theme-generator-c4cf1ef74f307e3d974c13ea6edd24eb + +info: + name: > + WP Child Theme Generator <= 1.1.0 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49fcd2cb-d880-4152-a736-33fd90f07083?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-child-theme-generator/" + google-query: inurl:"/wp-content/plugins/wp-child-theme-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-child-theme-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-child-theme-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-child-theme-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-chinese-conversion-ba1043324d157b0279fb5fef89ed3d34.yaml b/nuclei-templates/cve-less/plugins/wp-chinese-conversion-ba1043324d157b0279fb5fef89ed3d34.yaml new file mode 100644 index 0000000000..0874ccdc0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-chinese-conversion-ba1043324d157b0279fb5fef89ed3d34.yaml @@ -0,0 +1,58 @@ +id: wp-chinese-conversion-ba1043324d157b0279fb5fef89ed3d34 + +info: + name: > + WP Chinese Conversion <= 1.1.16 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95c47c7b-df83-43ee-9091-136b6622e88c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-chinese-conversion/" + google-query: inurl:"/wp-content/plugins/wp-chinese-conversion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-chinese-conversion,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-chinese-conversion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-chinese-conversion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cirrus-217b5f3c17336fde467ad6d4d4052a6d.yaml b/nuclei-templates/cve-less/plugins/wp-cirrus-217b5f3c17336fde467ad6d4d4052a6d.yaml new file mode 100644 index 0000000000..131692f9ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cirrus-217b5f3c17336fde467ad6d4d4052a6d.yaml @@ -0,0 +1,58 @@ +id: wp-cirrus-217b5f3c17336fde467ad6d4d4052a6d + +info: + name: > + WP-Cirrus <= 0.6.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/710aa0fd-34e2-4f0e-b354-0722d9692410?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cirrus/" + google-query: inurl:"/wp-content/plugins/wp-cirrus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cirrus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cirrus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cirrus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cirrus-a7963745ff69e39eb4bbcfe48cff5818.yaml b/nuclei-templates/cve-less/plugins/wp-cirrus-a7963745ff69e39eb4bbcfe48cff5818.yaml new file mode 100644 index 0000000000..8a4f6b9566 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cirrus-a7963745ff69e39eb4bbcfe48cff5818.yaml @@ -0,0 +1,58 @@ +id: wp-cirrus-a7963745ff69e39eb4bbcfe48cff5818 + +info: + name: > + WP-Cirrus <= 0.6.11 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cab3c9c-39c6-4279-9573-858b0592c3fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cirrus/" + google-query: inurl:"/wp-content/plugins/wp-cirrus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cirrus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cirrus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cirrus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-clean-up-2b8ff50cbfd95099e68cc6637c86457e.yaml b/nuclei-templates/cve-less/plugins/wp-clean-up-2b8ff50cbfd95099e68cc6637c86457e.yaml new file mode 100644 index 0000000000..ea3978a744 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-clean-up-2b8ff50cbfd95099e68cc6637c86457e.yaml @@ -0,0 +1,58 @@ +id: wp-clean-up-2b8ff50cbfd95099e68cc6637c86457e + +info: + name: > + WP Clean Up <= 1.2.3 - Cross-Site Request Forgery via wp_clean_up_optimize + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f342fb7-8f52-43d9-a887-1cf1fffa6ec6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-clean-up/" + google-query: inurl:"/wp-content/plugins/wp-clean-up/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-clean-up,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-clean-up/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-clean-up" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cleanfix-3dc2fefb55b6d17e837bc91376ca059e.yaml b/nuclei-templates/cve-less/plugins/wp-cleanfix-3dc2fefb55b6d17e837bc91376ca059e.yaml new file mode 100644 index 0000000000..b38545f834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cleanfix-3dc2fefb55b6d17e837bc91376ca059e.yaml @@ -0,0 +1,58 @@ +id: wp-cleanfix-3dc2fefb55b6d17e837bc91376ca059e + +info: + name: > + WP Cleanfix <= 3.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d594e40-ae4d-43f7-b57e-8070a68d1c94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cleanfix/" + google-query: inurl:"/wp-content/plugins/wp-cleanfix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cleanfix,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cleanfix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cleanfix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cleanfix-40d1328c8d4c642fffaf6abab5865649.yaml b/nuclei-templates/cve-less/plugins/wp-cleanfix-40d1328c8d4c642fffaf6abab5865649.yaml new file mode 100644 index 0000000000..8b472d4826 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cleanfix-40d1328c8d4c642fffaf6abab5865649.yaml @@ -0,0 +1,58 @@ +id: wp-cleanfix-40d1328c8d4c642fffaf6abab5865649 + +info: + name: > + WP Cleanfix <= 5.6.2 - Missing Authorization via register + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57896fa8-9360-41e8-a60e-8b95d01c25ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cleanfix/" + google-query: inurl:"/wp-content/plugins/wp-cleanfix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cleanfix,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cleanfix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cleanfix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cleanfix-75c70b1bb438dfcca6e33d6263e0e86e.yaml b/nuclei-templates/cve-less/plugins/wp-cleanfix-75c70b1bb438dfcca6e33d6263e0e86e.yaml new file mode 100644 index 0000000000..ae00644cb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cleanfix-75c70b1bb438dfcca6e33d6263e0e86e.yaml @@ -0,0 +1,58 @@ +id: wp-cleanfix-75c70b1bb438dfcca6e33d6263e0e86e + +info: + name: > + WP Cleanfix Plugin < 5.0.0 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a2c62a8-bc00-43b7-a3e8-a45d0cb75854?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cleanfix/" + google-query: inurl:"/wp-content/plugins/wp-cleanfix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cleanfix,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cleanfix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cleanfix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-client-logo-carousel-119ed13ee8d9c38858fd75fb1eb0a4cd.yaml b/nuclei-templates/cve-less/plugins/wp-client-logo-carousel-119ed13ee8d9c38858fd75fb1eb0a4cd.yaml new file mode 100644 index 0000000000..4ecd06b14d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-client-logo-carousel-119ed13ee8d9c38858fd75fb1eb0a4cd.yaml @@ -0,0 +1,58 @@ +id: wp-client-logo-carousel-119ed13ee8d9c38858fd75fb1eb0a4cd + +info: + name: > + Client Logo Carousel <= 3.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1c11388-fff4-4206-b7b5-3d7e3e0da16a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-client-logo-carousel/" + google-query: inurl:"/wp-content/plugins/wp-client-logo-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-client-logo-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-client-logo-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-client-logo-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-client-reports-11a9c2fdd6ced3454ae2f484273892ee.yaml b/nuclei-templates/cve-less/plugins/wp-client-reports-11a9c2fdd6ced3454ae2f484273892ee.yaml new file mode 100644 index 0000000000..9f94f9a1a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-client-reports-11a9c2fdd6ced3454ae2f484273892ee.yaml @@ -0,0 +1,58 @@ +id: wp-client-reports-11a9c2fdd6ced3454ae2f484273892ee + +info: + name: > + WP Client Reports <= 1.0.16 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34cddc7b-575c-4494-afa0-cd85c7b313e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-client-reports/" + google-query: inurl:"/wp-content/plugins/wp-client-reports/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-client-reports,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-client-reports/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-client-reports" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-client-reports-a5b46952d543f797449f79e0a9cccb18.yaml b/nuclei-templates/cve-less/plugins/wp-client-reports-a5b46952d543f797449f79e0a9cccb18.yaml new file mode 100644 index 0000000000..c48bf90d01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-client-reports-a5b46952d543f797449f79e0a9cccb18.yaml @@ -0,0 +1,58 @@ +id: wp-client-reports-a5b46952d543f797449f79e0a9cccb18 + +info: + name: > + WP Client Reports <= 1.0.22 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd95f517-baf6-4feb-a9a5-f73008634dd4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-client-reports/" + google-query: inurl:"/wp-content/plugins/wp-client-reports/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-client-reports,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-client-reports/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-client-reports" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-25a10466c42d47292b8a71c862e9a26a.yaml b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-25a10466c42d47292b8a71c862e9a26a.yaml new file mode 100644 index 0000000000..81b15d8c8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-25a10466c42d47292b8a71c862e9a26a.yaml @@ -0,0 +1,58 @@ +id: wp-clone-by-wp-academy-25a10466c42d47292b8a71c862e9a26a + +info: + name: > + Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-clone-by-wp-academy/" + google-query: inurl:"/wp-content/plugins/wp-clone-by-wp-academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-clone-by-wp-academy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-clone-by-wp-academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-clone-by-wp-academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-6ac56b73dfbde68009426ab1366ff6c2.yaml b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-6ac56b73dfbde68009426ab1366ff6c2.yaml new file mode 100644 index 0000000000..8f8524a311 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-6ac56b73dfbde68009426ab1366ff6c2.yaml @@ -0,0 +1,58 @@ +id: wp-clone-by-wp-academy-6ac56b73dfbde68009426ab1366ff6c2 + +info: + name: > + Inisev Analyst Module <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fee47bb5-5af9-426c-8760-193276e046ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-clone-by-wp-academy/" + google-query: inurl:"/wp-content/plugins/wp-clone-by-wp-academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-clone-by-wp-academy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-clone-by-wp-academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-clone-by-wp-academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-7379020b548b14b7be62b539ae5d76a2.yaml b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-7379020b548b14b7be62b539ae5d76a2.yaml new file mode 100644 index 0000000000..24399d6cac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-7379020b548b14b7be62b539ae5d76a2.yaml @@ -0,0 +1,58 @@ +id: wp-clone-by-wp-academy-7379020b548b14b7be62b539ae5d76a2 + +info: + name: > + Clone <= 2.3.7 - Missing Authorization via wp_ajax_tifm_save_decision + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b6db928-f8ff-4e78-bfc7-51f1d1ccd1fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-clone-by-wp-academy/" + google-query: inurl:"/wp-content/plugins/wp-clone-by-wp-academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-clone-by-wp-academy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-clone-by-wp-academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-clone-by-wp-academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-a1129a205ef2deec4965e57f9f73108e.yaml b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-a1129a205ef2deec4965e57f9f73108e.yaml new file mode 100644 index 0000000000..496b4104bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-a1129a205ef2deec4965e57f9f73108e.yaml @@ -0,0 +1,58 @@ +id: wp-clone-by-wp-academy-a1129a205ef2deec4965e57f9f73108e + +info: + name: > + WP Clone <= 2.4.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44a921e7-cce3-4347-968d-76dab243fcd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-clone-by-wp-academy/" + google-query: inurl:"/wp-content/plugins/wp-clone-by-wp-academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-clone-by-wp-academy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-clone-by-wp-academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-clone-by-wp-academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-c451f687ef3559dbeeebe92c1e87ed44.yaml b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-c451f687ef3559dbeeebe92c1e87ed44.yaml new file mode 100644 index 0000000000..a40445487d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-c451f687ef3559dbeeebe92c1e87ed44.yaml @@ -0,0 +1,58 @@ +id: wp-clone-by-wp-academy-c451f687ef3559dbeeebe92c1e87ed44 + +info: + name: > + Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-clone-by-wp-academy/" + google-query: inurl:"/wp-content/plugins/wp-clone-by-wp-academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-clone-by-wp-academy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-clone-by-wp-academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-clone-by-wp-academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-ec34a021a2077f3815f991d8c8d817ea.yaml b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-ec34a021a2077f3815f991d8c8d817ea.yaml new file mode 100644 index 0000000000..1ae08edb33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-clone-by-wp-academy-ec34a021a2077f3815f991d8c8d817ea.yaml @@ -0,0 +1,58 @@ +id: wp-clone-by-wp-academy-ec34a021a2077f3815f991d8c8d817ea + +info: + name: > + Clone <= 2.3.7 - Cross-Site Request Forgery via wp_ajax_tifm_save_decision + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/314d3e0c-ba29-4795-a646-40e0acfc3405?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-clone-by-wp-academy/" + google-query: inurl:"/wp-content/plugins/wp-clone-by-wp-academy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-clone-by-wp-academy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-clone-by-wp-academy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-clone-by-wp-academy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cloudflare-page-cache-7da86808d4989a68c5d31062aa40a7e0.yaml b/nuclei-templates/cve-less/plugins/wp-cloudflare-page-cache-7da86808d4989a68c5d31062aa40a7e0.yaml new file mode 100644 index 0000000000..3f036c2a74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cloudflare-page-cache-7da86808d4989a68c5d31062aa40a7e0.yaml @@ -0,0 +1,58 @@ +id: wp-cloudflare-page-cache-7da86808d4989a68c5d31062aa40a7e0 + +info: + name: > + Super Page Cache for Cloudflare <= 4.7.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a853bbb4-9866-4bc4-94da-d7826863d23b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cloudflare-page-cache/" + google-query: inurl:"/wp-content/plugins/wp-cloudflare-page-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cloudflare-page-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cloudflare-page-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cloudflare-page-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cloudflare-page-cache-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/wp-cloudflare-page-cache-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..6cd8d0aaef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cloudflare-page-cache-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: wp-cloudflare-page-cache-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cloudflare-page-cache/" + google-query: inurl:"/wp-content/plugins/wp-cloudflare-page-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cloudflare-page-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cloudflare-page-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cloudflare-page-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cloudy-0ad53ed111e4c9bd0fa768a28b64118e.yaml b/nuclei-templates/cve-less/plugins/wp-cloudy-0ad53ed111e4c9bd0fa768a28b64118e.yaml new file mode 100644 index 0000000000..5ce9a2bbaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cloudy-0ad53ed111e4c9bd0fa768a28b64118e.yaml @@ -0,0 +1,58 @@ +id: wp-cloudy-0ad53ed111e4c9bd0fa768a28b64118e + +info: + name: > + WP Cloudy <= 4.4.9 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d85b98c3-c912-4467-962c-eb64465266b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cloudy/" + google-query: inurl:"/wp-content/plugins/wp-cloudy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cloudy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cloudy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cloudy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-club-manager-88ba893aacf7da3ba8fb038d6bba0a0b.yaml b/nuclei-templates/cve-less/plugins/wp-club-manager-88ba893aacf7da3ba8fb038d6bba0a0b.yaml new file mode 100644 index 0000000000..f7a26f926e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-club-manager-88ba893aacf7da3ba8fb038d6bba0a0b.yaml @@ -0,0 +1,58 @@ +id: wp-club-manager-88ba893aacf7da3ba8fb038d6bba0a0b + +info: + name: > + WP Club Manager <= 2.2.11 - Authenticated (Player+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb364d54-bd44-426f-8f11-8ee5a7527c5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-club-manager/" + google-query: inurl:"/wp-content/plugins/wp-club-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-club-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-club-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-club-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-club-manager-980a1e8d0e2c9d6875260534aa15c2ab.yaml b/nuclei-templates/cve-less/plugins/wp-club-manager-980a1e8d0e2c9d6875260534aa15c2ab.yaml new file mode 100644 index 0000000000..ffcb80025e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-club-manager-980a1e8d0e2c9d6875260534aa15c2ab.yaml @@ -0,0 +1,58 @@ +id: wp-club-manager-980a1e8d0e2c9d6875260534aa15c2ab + +info: + name: > + WP Club Manager <= 2.2.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29137748-91b1-4b01-9f05-63da592e941a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-club-manager/" + google-query: inurl:"/wp-content/plugins/wp-club-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-club-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-club-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-club-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-club-manager-dabe11ac9a89ef7717da39d4e9cb7dcc.yaml b/nuclei-templates/cve-less/plugins/wp-club-manager-dabe11ac9a89ef7717da39d4e9cb7dcc.yaml new file mode 100644 index 0000000000..dcd31c94a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-club-manager-dabe11ac9a89ef7717da39d4e9cb7dcc.yaml @@ -0,0 +1,58 @@ +id: wp-club-manager-dabe11ac9a89ef7717da39d4e9cb7dcc + +info: + name: > + WP Club Manager – WordPress Sports Club Plugin <= 2.2.10 - Missing Authorization to Unauthenticated Event Permalink Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64c2c8c2-58f5-4b7d-b226-39ba39e887d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-club-manager/" + google-query: inurl:"/wp-content/plugins/wp-club-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-club-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-club-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-club-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-code-highlightjs-c1479c1cda6995c80979468ade477a9b.yaml b/nuclei-templates/cve-less/plugins/wp-code-highlightjs-c1479c1cda6995c80979468ade477a9b.yaml new file mode 100644 index 0000000000..1dd3da5692 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-code-highlightjs-c1479c1cda6995c80979468ade477a9b.yaml @@ -0,0 +1,58 @@ +id: wp-code-highlightjs-c1479c1cda6995c80979468ade477a9b + +info: + name: > + WP Code Highlight.js <= 0.6.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aacd4a33-499d-4630-a0fb-8a1acfcfb7dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-code-highlightjs/" + google-query: inurl:"/wp-content/plugins/wp-code-highlightjs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-code-highlightjs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-code-highlightjs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-code-highlightjs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-code-highlightjs-ca875a69734817c022d2b5742d18b09a.yaml b/nuclei-templates/cve-less/plugins/wp-code-highlightjs-ca875a69734817c022d2b5742d18b09a.yaml new file mode 100644 index 0000000000..396d79d570 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-code-highlightjs-ca875a69734817c022d2b5742d18b09a.yaml @@ -0,0 +1,58 @@ +id: wp-code-highlightjs-ca875a69734817c022d2b5742d18b09a + +info: + name: > + WP Code Highlight.js <= 0.6.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef7727e5-fb20-4d9b-baaa-c123a0100ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-code-highlightjs/" + google-query: inurl:"/wp-content/plugins/wp-code-highlightjs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-code-highlightjs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-code-highlightjs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-code-highlightjs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-codemirror-block-291a48e25bfa003aa951458172971d46.yaml b/nuclei-templates/cve-less/plugins/wp-codemirror-block-291a48e25bfa003aa951458172971d46.yaml new file mode 100644 index 0000000000..da9acf104b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-codemirror-block-291a48e25bfa003aa951458172971d46.yaml @@ -0,0 +1,58 @@ +id: wp-codemirror-block-291a48e25bfa003aa951458172971d46 + +info: + name: > + CodeMirror Blocks <= 1.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52569aac-1e9e-40fb-9ff4-5eeb7940375d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-codemirror-block/" + google-query: inurl:"/wp-content/plugins/wp-codemirror-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-codemirror-block,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-codemirror-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-codemirror-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-coder-03747b0c7844da2a502c367644e13831.yaml b/nuclei-templates/cve-less/plugins/wp-coder-03747b0c7844da2a502c367644e13831.yaml new file mode 100644 index 0000000000..a934a88ee6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-coder-03747b0c7844da2a502c367644e13831.yaml @@ -0,0 +1,58 @@ +id: wp-coder-03747b0c7844da2a502c367644e13831 + +info: + name: > + Multiple Wow-Company Plugins (Various Versions) -- Reflected Cross-Site Scripting via 'page' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a95af34-559c-4644-9941-7bd1551aba33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-coder/" + google-query: inurl:"/wp-content/plugins/wp-coder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-coder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-coder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-coder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-coder-245098f6b0653f99e8181fe1d0b4d9ec.yaml b/nuclei-templates/cve-less/plugins/wp-coder-245098f6b0653f99e8181fe1d0b4d9ec.yaml new file mode 100644 index 0000000000..8d89156661 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-coder-245098f6b0653f99e8181fe1d0b4d9ec.yaml @@ -0,0 +1,58 @@ +id: wp-coder-245098f6b0653f99e8181fe1d0b4d9ec + +info: + name: > + WP Coder <= 3.5 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7394f468-b1d6-477e-9213-e01c74e2e504?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-coder/" + google-query: inurl:"/wp-content/plugins/wp-coder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-coder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-coder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-coder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-coder-83f22a47dbd6befc1b5b2de701a66592.yaml b/nuclei-templates/cve-less/plugins/wp-coder-83f22a47dbd6befc1b5b2de701a66592.yaml new file mode 100644 index 0000000000..91665760df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-coder-83f22a47dbd6befc1b5b2de701a66592.yaml @@ -0,0 +1,58 @@ +id: wp-coder-83f22a47dbd6befc1b5b2de701a66592 + +info: + name: > + WP Coder <= 2.5.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc64c550-0d19-42d4-aa2b-829e74b166bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-coder/" + google-query: inurl:"/wp-content/plugins/wp-coder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-coder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-coder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-coder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-coder-d4baf5319f8e6cff227085b65be4db6a.yaml b/nuclei-templates/cve-less/plugins/wp-coder-d4baf5319f8e6cff227085b65be4db6a.yaml new file mode 100644 index 0000000000..558d2c3564 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-coder-d4baf5319f8e6cff227085b65be4db6a.yaml @@ -0,0 +1,58 @@ +id: wp-coder-d4baf5319f8e6cff227085b65be4db6a + +info: + name: > + WP Coder – add custom html, css and js code <= 2.5.3 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b6a9cd-4d29-4bd8-afa3-b5d455ad8340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-coder/" + google-query: inurl:"/wp-content/plugins/wp-coder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-coder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-coder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-coder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-coder-ed25dc4554a62fa61ab6134b2e367cf7.yaml b/nuclei-templates/cve-less/plugins/wp-coder-ed25dc4554a62fa61ab6134b2e367cf7.yaml new file mode 100644 index 0000000000..fcaaf70bf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-coder-ed25dc4554a62fa61ab6134b2e367cf7.yaml @@ -0,0 +1,58 @@ +id: wp-coder-ed25dc4554a62fa61ab6134b2e367cf7 + +info: + name: > + WP Coder <= 2.5.1 - Remote File Inclusion leading to Remote Code Execution via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f53e3c-b038-4722-b5ba-7212e50b5978?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-coder/" + google-query: inurl:"/wp-content/plugins/wp-coder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-coder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-coder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-coder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-colorbox-4c3b7c4b9ee3cb503e7f1c307a295ea7.yaml b/nuclei-templates/cve-less/plugins/wp-colorbox-4c3b7c4b9ee3cb503e7f1c307a295ea7.yaml new file mode 100644 index 0000000000..7cff8bb19a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-colorbox-4c3b7c4b9ee3cb503e7f1c307a295ea7.yaml @@ -0,0 +1,58 @@ +id: wp-colorbox-4c3b7c4b9ee3cb503e7f1c307a295ea7 + +info: + name: > + WordPress Colorbox Lightbox Plugin <= 1.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/969b54d4-50db-4a2f-afa1-e22b29af661e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-colorbox/" + google-query: inurl:"/wp-content/plugins/wp-colorbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-colorbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-colorbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-colorbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-comment-fields-0cde94286321975aa282d120f32f5bac.yaml b/nuclei-templates/cve-less/plugins/wp-comment-fields-0cde94286321975aa282d120f32f5bac.yaml new file mode 100644 index 0000000000..2aba24d3f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-comment-fields-0cde94286321975aa282d120f32f5bac.yaml @@ -0,0 +1,58 @@ +id: wp-comment-fields-0cde94286321975aa282d120f32f5bac + +info: + name: > + Comments Extra Fields For Post,Pages and CPT <= 5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-comment-fields/" + google-query: inurl:"/wp-content/plugins/wp-comment-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-comment-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-comment-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-comment-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-comment-fields-287b97d3800f658fb6c7787e238d09c5.yaml b/nuclei-templates/cve-less/plugins/wp-comment-fields-287b97d3800f658fb6c7787e238d09c5.yaml new file mode 100644 index 0000000000..051828eb83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-comment-fields-287b97d3800f658fb6c7787e238d09c5.yaml @@ -0,0 +1,58 @@ +id: wp-comment-fields-287b97d3800f658fb6c7787e238d09c5 + +info: + name: > + WordPress Comments Fields <= 4.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ebe34fd-6860-4074-ae86-37f979f54dc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-comment-fields/" + google-query: inurl:"/wp-content/plugins/wp-comment-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-comment-fields,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-comment-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-comment-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-comment-fields-6fee77f4c30ccce8c47c0e8979fa4163.yaml b/nuclei-templates/cve-less/plugins/wp-comment-fields-6fee77f4c30ccce8c47c0e8979fa4163.yaml new file mode 100644 index 0000000000..193177ac02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-comment-fields-6fee77f4c30ccce8c47c0e8979fa4163.yaml @@ -0,0 +1,58 @@ +id: wp-comment-fields-6fee77f4c30ccce8c47c0e8979fa4163 + +info: + name: > + Comments Extra Fields For Post,Pages and CPT <= 5.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-comment-fields/" + google-query: inurl:"/wp-content/plugins/wp-comment-fields/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-comment-fields,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-comment-fields/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-comment-fields" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-comment-remix-1498b56c7721705e179b43bd40cfa29f.yaml b/nuclei-templates/cve-less/plugins/wp-comment-remix-1498b56c7721705e179b43bd40cfa29f.yaml new file mode 100644 index 0000000000..94bcbf3857 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-comment-remix-1498b56c7721705e179b43bd40cfa29f.yaml @@ -0,0 +1,58 @@ +id: wp-comment-remix-1498b56c7721705e179b43bd40cfa29f + +info: + name: > + WP Comment Remix < 1.4.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5de56a2e-f8e2-47d9-8a2b-989de640f018?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-comment-remix/" + google-query: inurl:"/wp-content/plugins/wp-comment-remix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-comment-remix,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-comment-remix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-comment-remix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-comment-remix-574c183518fa14bb1a854e4b68f72a19.yaml b/nuclei-templates/cve-less/plugins/wp-comment-remix-574c183518fa14bb1a854e4b68f72a19.yaml new file mode 100644 index 0000000000..df0c8a00d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-comment-remix-574c183518fa14bb1a854e4b68f72a19.yaml @@ -0,0 +1,58 @@ +id: wp-comment-remix-574c183518fa14bb1a854e4b68f72a19 + +info: + name: > + WP Comment Remix <= 1.4.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e619e8e-e04b-4e42-9cee-65e5dedff3b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-comment-remix/" + google-query: inurl:"/wp-content/plugins/wp-comment-remix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-comment-remix,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-comment-remix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-comment-remix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-comment-remix-5defb55cded48a565a064567cc9f2fde.yaml b/nuclei-templates/cve-less/plugins/wp-comment-remix-5defb55cded48a565a064567cc9f2fde.yaml new file mode 100644 index 0000000000..0465039dda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-comment-remix-5defb55cded48a565a064567cc9f2fde.yaml @@ -0,0 +1,58 @@ +id: wp-comment-remix-5defb55cded48a565a064567cc9f2fde + +info: + name: > + WP Comment Remix < 1.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0459d852-4d6b-4457-ad8d-47a3cddded8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-comment-remix/" + google-query: inurl:"/wp-content/plugins/wp-comment-remix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-comment-remix,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-comment-remix/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-comment-remix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-commentnavi-c4c58ad76c633d16084174a989d36082.yaml b/nuclei-templates/cve-less/plugins/wp-commentnavi-c4c58ad76c633d16084174a989d36082.yaml new file mode 100644 index 0000000000..fa6ec49004 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-commentnavi-c4c58ad76c633d16084174a989d36082.yaml @@ -0,0 +1,58 @@ +id: wp-commentnavi-c4c58ad76c633d16084174a989d36082 + +info: + name: > + WP-CommentNavi <= 1.12.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ba3b414-82a0-4793-9702-cec64d92271e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-commentnavi/" + google-query: inurl:"/wp-content/plugins/wp-commentnavi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-commentnavi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-commentnavi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-commentnavi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-214d7a66a2d3ba448e1f7f45ccd8e5f3.yaml b/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-214d7a66a2d3ba448e1f7f45ccd8e5f3.yaml new file mode 100644 index 0000000000..0fa654cc45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-214d7a66a2d3ba448e1f7f45ccd8e5f3.yaml @@ -0,0 +1,58 @@ +id: wp-compress-image-optimizer-214d7a66a2d3ba448e1f7f45ccd8e5f3 + +info: + name: > + WP Compress – Image Optimizer [All-In-One] <= 6.10.33 - Unauthenticated Directory Traversal via css + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/defb87dd-bf5f-411f-b948-699337d05d44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-compress-image-optimizer/" + google-query: inurl:"/wp-content/plugins/wp-compress-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-compress-image-optimizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-compress-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-compress-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-388de01a3c00f86461e75b59a8e80e96.yaml b/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-388de01a3c00f86461e75b59a8e80e96.yaml new file mode 100644 index 0000000000..101b53b5ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-388de01a3c00f86461e75b59a8e80e96.yaml @@ -0,0 +1,58 @@ +id: wp-compress-image-optimizer-388de01a3c00f86461e75b59a8e80e96 + +info: + name: > + WP Compress – Image Optimizer [All-In-One] <= 6.10.35 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81fd6ec4-9cff-4604-8b7f-5b8683096c34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-compress-image-optimizer/" + google-query: inurl:"/wp-content/plugins/wp-compress-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-compress-image-optimizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-compress-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-compress-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-ab5c346298e5bc332a45956af170b3b8.yaml b/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-ab5c346298e5bc332a45956af170b3b8.yaml new file mode 100644 index 0000000000..76cbf557a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-compress-image-optimizer-ab5c346298e5bc332a45956af170b3b8.yaml @@ -0,0 +1,58 @@ +id: wp-compress-image-optimizer-ab5c346298e5bc332a45956af170b3b8 + +info: + name: > + WP Compress – Image Optimizer <= 6.11.10 - Missing Authorization to Unauthenticated CDN Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88a46a24-6d46-44cc-ac01-70a1c329cb51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-compress-image-optimizer/" + google-query: inurl:"/wp-content/plugins/wp-compress-image-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-compress-image-optimizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-compress-image-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-compress-image-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.11.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-concours-31a7c57e145b1990f031344b13acb01b.yaml b/nuclei-templates/cve-less/plugins/wp-concours-31a7c57e145b1990f031344b13acb01b.yaml new file mode 100644 index 0000000000..1e470a491c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-concours-31a7c57e145b1990f031344b13acb01b.yaml @@ -0,0 +1,58 @@ +id: wp-concours-31a7c57e145b1990f031344b13acb01b + +info: + name: > + WP Concours <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76f32441-ce6a-472d-a437-c284cb91eb8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-concours/" + google-query: inurl:"/wp-content/plugins/wp-concours/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-concours,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-concours/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-concours" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-conference-schedule-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-conference-schedule-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e727a5c2e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-conference-schedule-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-conference-schedule-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-conference-schedule/" + google-query: inurl:"/wp-content/plugins/wp-conference-schedule/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-conference-schedule,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-conference-schedule/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-conference-schedule" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-config-file-editor-416feeed72e481e9c6ade025bb1108e9.yaml b/nuclei-templates/cve-less/plugins/wp-config-file-editor-416feeed72e481e9c6ade025bb1108e9.yaml new file mode 100644 index 0000000000..8951c42e16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-config-file-editor-416feeed72e481e9c6ade025bb1108e9.yaml @@ -0,0 +1,58 @@ +id: wp-config-file-editor-416feeed72e481e9c6ade025bb1108e9 + +info: + name: > + WP Config File Editor <= 1.7.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2ce4a14-5c56-4ca0-9deb-80cd609b71e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-config-file-editor/" + google-query: inurl:"/wp-content/plugins/wp-config-file-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-config-file-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-config-file-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-config-file-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-construction-mode-aadc81f29bdd98e82b479da656b5f939.yaml b/nuclei-templates/cve-less/plugins/wp-construction-mode-aadc81f29bdd98e82b479da656b5f939.yaml new file mode 100644 index 0000000000..b1c2c81d59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-construction-mode-aadc81f29bdd98e82b479da656b5f939.yaml @@ -0,0 +1,58 @@ +id: wp-construction-mode-aadc81f29bdd98e82b479da656b5f939 + +info: + name: > + WP Construction Mode <= 1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e4dbf38-e955-4634-9a07-775ea49b0051?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-construction-mode/" + google-query: inurl:"/wp-content/plugins/wp-construction-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-construction-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-construction-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-construction-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-construction-mode-c4b1471de80c6f40eddc08f35e8d5a25.yaml b/nuclei-templates/cve-less/plugins/wp-construction-mode-c4b1471de80c6f40eddc08f35e8d5a25.yaml new file mode 100644 index 0000000000..7affaf1039 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-construction-mode-c4b1471de80c6f40eddc08f35e8d5a25.yaml @@ -0,0 +1,58 @@ +id: wp-construction-mode-c4b1471de80c6f40eddc08f35e8d5a25 + +info: + name: > + WP Construction Mode <= 1.91 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c54bbfe-f505-4c93-89fb-1a624bfcfe10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-construction-mode/" + google-query: inurl:"/wp-content/plugins/wp-construction-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-construction-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-construction-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-construction-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-consultant-ac90b1e42401eceeda1d0c4445ebc72b.yaml b/nuclei-templates/cve-less/plugins/wp-consultant-ac90b1e42401eceeda1d0c4445ebc72b.yaml new file mode 100644 index 0000000000..ceb76d99e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-consultant-ac90b1e42401eceeda1d0c4445ebc72b.yaml @@ -0,0 +1,58 @@ +id: wp-consultant-ac90b1e42401eceeda1d0c4445ebc72b + +info: + name: > + WP Consultant <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e54613a-24c7-4e2d-a14b-07912acfb69a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-consultant/" + google-query: inurl:"/wp-content/plugins/wp-consultant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-consultant,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-consultant/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-consultant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-contact-form-007c1b62fcbe28eefc7df62d2a9616c8.yaml b/nuclei-templates/cve-less/plugins/wp-contact-form-007c1b62fcbe28eefc7df62d2a9616c8.yaml new file mode 100644 index 0000000000..54ed4ce3c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-contact-form-007c1b62fcbe28eefc7df62d2a9616c8.yaml @@ -0,0 +1,58 @@ +id: wp-contact-form-007c1b62fcbe28eefc7df62d2a9616c8 + +info: + name: > + WP Contact Form <= 1.6 - Cross-Site Request Forgery via wpcf_adminpage + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5decbb3-05a0-403f-918a-9b516df85778?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-contact-form/" + google-query: inurl:"/wp-content/plugins/wp-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-contact-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-contact-sidebar-widget-faf2b2d46d16f4cbc167cb1d3ca32849.yaml b/nuclei-templates/cve-less/plugins/wp-contact-sidebar-widget-faf2b2d46d16f4cbc167cb1d3ca32849.yaml new file mode 100644 index 0000000000..3b992d7ba7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-contact-sidebar-widget-faf2b2d46d16f4cbc167cb1d3ca32849.yaml @@ -0,0 +1,58 @@ +id: wp-contact-sidebar-widget-faf2b2d46d16f4cbc167cb1d3ca32849 + +info: + name: > + WP-Contact <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0051e869-47b1-42ea-911a-49a4462d33ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-contact-sidebar-widget/" + google-query: inurl:"/wp-content/plugins/wp-contact-sidebar-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-contact-sidebar-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-contact-sidebar-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-contact-sidebar-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-contact-slider-13a0eed39cd76523725bdb9ac6f8ad2f.yaml b/nuclei-templates/cve-less/plugins/wp-contact-slider-13a0eed39cd76523725bdb9ac6f8ad2f.yaml new file mode 100644 index 0000000000..6cf5600cb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-contact-slider-13a0eed39cd76523725bdb9ac6f8ad2f.yaml @@ -0,0 +1,58 @@ +id: wp-contact-slider-13a0eed39cd76523725bdb9ac6f8ad2f + +info: + name: > + WP Contact Slider <= 2.4.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9ef419c-3546-489b-b841-b12b8918abdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-contact-slider/" + google-query: inurl:"/wp-content/plugins/wp-contact-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-contact-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-contact-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-contact-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-contact-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-contact-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ae375a4954 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-contact-slider-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-contact-slider-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-contact-slider/" + google-query: inurl:"/wp-content/plugins/wp-contact-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-contact-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-contact-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-contact-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-contact-slider-d8df0d0d76816bab3218aaeebd329b4b.yaml b/nuclei-templates/cve-less/plugins/wp-contact-slider-d8df0d0d76816bab3218aaeebd329b4b.yaml new file mode 100644 index 0000000000..0eaf440c6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-contact-slider-d8df0d0d76816bab3218aaeebd329b4b.yaml @@ -0,0 +1,58 @@ +id: wp-contact-slider-d8df0d0d76816bab3218aaeebd329b4b + +info: + name: > + WP Contact Slider <= 2.4.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/217b4ed7-90d3-4871-b034-7e1b324dc6a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-contact-slider/" + google-query: inurl:"/wp-content/plugins/wp-contact-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-contact-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-contact-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-contact-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-contactform-03e041af34914994b5b4b3e20ec8ee2e.yaml b/nuclei-templates/cve-less/plugins/wp-contactform-03e041af34914994b5b4b3e20ec8ee2e.yaml new file mode 100644 index 0000000000..927c591f57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-contactform-03e041af34914994b5b4b3e20ec8ee2e.yaml @@ -0,0 +1,58 @@ +id: wp-contactform-03e041af34914994b5b4b3e20ec8ee2e + +info: + name: > + WP-ContactForm <= 1.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c2465b8-09d2-4895-bc97-6f6f2e349d50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-contactform/" + google-query: inurl:"/wp-content/plugins/wp-contactform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-contactform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-contactform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-contactform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-contactform-fbe96c78719e34780f9334cd4775f2cc.yaml b/nuclei-templates/cve-less/plugins/wp-contactform-fbe96c78719e34780f9334cd4775f2cc.yaml new file mode 100644 index 0000000000..f662c4ce20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-contactform-fbe96c78719e34780f9334cd4775f2cc.yaml @@ -0,0 +1,58 @@ +id: wp-contactform-fbe96c78719e34780f9334cd4775f2cc + +info: + name: > + WP-ContactForm <= 1.5.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00f9fd4b-4730-4fa5-80b2-00d97dc72b8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-contactform/" + google-query: inurl:"/wp-content/plugins/wp-contactform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-contactform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-contactform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-contactform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-contacts-manager-49aab57e3a849669daec0648093b2a24.yaml b/nuclei-templates/cve-less/plugins/wp-contacts-manager-49aab57e3a849669daec0648093b2a24.yaml new file mode 100644 index 0000000000..c763e8b69e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-contacts-manager-49aab57e3a849669daec0648093b2a24.yaml @@ -0,0 +1,58 @@ +id: wp-contacts-manager-49aab57e3a849669daec0648093b2a24 + +info: + name: > + WP Contacts Manager <= 2.2.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b352b2e4-8d72-4ebd-8dcd-8e2740759f3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-contacts-manager/" + google-query: inurl:"/wp-content/plugins/wp-contacts-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-contacts-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-contacts-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-contacts-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-content-copy-protection-d51d69d330a061dad190bd18258e5c37.yaml b/nuclei-templates/cve-less/plugins/wp-content-copy-protection-d51d69d330a061dad190bd18258e5c37.yaml new file mode 100644 index 0000000000..a0d6bb1c68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-content-copy-protection-d51d69d330a061dad190bd18258e5c37.yaml @@ -0,0 +1,58 @@ +id: wp-content-copy-protection-d51d69d330a061dad190bd18258e5c37 + +info: + name: > + WP Content Copy Protection <= 3.4.4 - Cross-Site Request Forgery to Setting Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbc8e925-878a-42e2-ae78-35ec95e07526?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-content-copy-protection/" + google-query: inurl:"/wp-content/plugins/wp-content-copy-protection/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-content-copy-protection,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-content-copy-protection/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-content-copy-protection" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-content-copy-protector-d40e32a5b0b2b53caa45979ec9bf9c5b.yaml b/nuclei-templates/cve-less/plugins/wp-content-copy-protector-d40e32a5b0b2b53caa45979ec9bf9c5b.yaml new file mode 100644 index 0000000000..ad9cfb60f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-content-copy-protector-d40e32a5b0b2b53caa45979ec9bf9c5b.yaml @@ -0,0 +1,58 @@ +id: wp-content-copy-protector-d40e32a5b0b2b53caa45979ec9bf9c5b + +info: + name: > + WP Content Copy Protection & No Right Click <= 3.3 - Cross-Site Request Forgery to Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70c144c9-2d96-404d-bcca-707519c9b71c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-content-copy-protector/" + google-query: inurl:"/wp-content/plugins/wp-content-copy-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-content-copy-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-content-copy-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-content-copy-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-content-copy-protector-d7e80e6f1bf77fdb58c4ef0772ba692b.yaml b/nuclei-templates/cve-less/plugins/wp-content-copy-protector-d7e80e6f1bf77fdb58c4ef0772ba692b.yaml new file mode 100644 index 0000000000..d4706d1ae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-content-copy-protector-d7e80e6f1bf77fdb58c4ef0772ba692b.yaml @@ -0,0 +1,58 @@ +id: wp-content-copy-protector-d7e80e6f1bf77fdb58c4ef0772ba692b + +info: + name: > + WP Content Copy Protection & No Right Click <= 3.5.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9589d44b-55c3-45b4-84bb-c86143de3f95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-content-copy-protector/" + google-query: inurl:"/wp-content/plugins/wp-content-copy-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-content-copy-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-content-copy-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-content-copy-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-content-copy-protector-e6f9d411cfc36ab403436e5079e013a0.yaml b/nuclei-templates/cve-less/plugins/wp-content-copy-protector-e6f9d411cfc36ab403436e5079e013a0.yaml new file mode 100644 index 0000000000..fc558f3ba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-content-copy-protector-e6f9d411cfc36ab403436e5079e013a0.yaml @@ -0,0 +1,58 @@ +id: wp-content-copy-protector-e6f9d411cfc36ab403436e5079e013a0 + +info: + name: > + WP Copy Protection & No Right Click <= 3.1.4 - Missing Authorization to Arbitrary Plugin Installation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c062d60b-eda8-4039-8655-64f32e70839a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-content-copy-protector/" + google-query: inurl:"/wp-content/plugins/wp-content-copy-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-content-copy-protector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-content-copy-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-content-copy-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-content-filter-cf0e16a0243bc8e5fbe7907a0ee34454.yaml b/nuclei-templates/cve-less/plugins/wp-content-filter-cf0e16a0243bc8e5fbe7907a0ee34454.yaml new file mode 100644 index 0000000000..794126bca1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-content-filter-cf0e16a0243bc8e5fbe7907a0ee34454.yaml @@ -0,0 +1,58 @@ +id: wp-content-filter-cf0e16a0243bc8e5fbe7907a0ee34454 + +info: + name: > + WP Content Filter – Censor All Offensive Content From Your Site <= 3.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95ffefff-80e1-4f5a-8939-47a00f75493d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-content-filter/" + google-query: inurl:"/wp-content/plugins/wp-content-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-content-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-content-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-content-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-content-pilot-0eba82d1fba78dd21145988eca694adc.yaml b/nuclei-templates/cve-less/plugins/wp-content-pilot-0eba82d1fba78dd21145988eca694adc.yaml new file mode 100644 index 0000000000..1d619b4556 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-content-pilot-0eba82d1fba78dd21145988eca694adc.yaml @@ -0,0 +1,58 @@ +id: wp-content-pilot-0eba82d1fba78dd21145988eca694adc + +info: + name: > + WP Content Pilot – Autoblogging & Affiliate Marketing Plugin <= 1.3.3 - Authenticated (Contributor+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/373c10df-0d9c-4f76-8d1f-cad6bcfed141?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-content-pilot/" + google-query: inurl:"/wp-content/plugins/wp-content-pilot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-content-pilot,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-content-pilot/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-content-pilot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cookie-user-info-11d8ae615e422011cdb2e654cf3c2a37.yaml b/nuclei-templates/cve-less/plugins/wp-cookie-user-info-11d8ae615e422011cdb2e654cf3c2a37.yaml new file mode 100644 index 0000000000..be13bed3d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cookie-user-info-11d8ae615e422011cdb2e654cf3c2a37.yaml @@ -0,0 +1,58 @@ +id: wp-cookie-user-info-11d8ae615e422011cdb2e654cf3c2a37 + +info: + name: > + Cookie Notification Plugin for WordPress < 1.0.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e61a5989-ea75-4c11-a937-66488ecdb10d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cookie-user-info/" + google-query: inurl:"/wp-content/plugins/wp-cookie-user-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cookie-user-info,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cookie-user-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cookie-user-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cookiechoise-e18f49f80ec9826dcfb049693894ccc8.yaml b/nuclei-templates/cve-less/plugins/wp-cookiechoise-e18f49f80ec9826dcfb049693894ccc8.yaml new file mode 100644 index 0000000000..b1a54b2697 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cookiechoise-e18f49f80ec9826dcfb049693894ccc8.yaml @@ -0,0 +1,58 @@ +id: wp-cookiechoise-e18f49f80ec9826dcfb049693894ccc8 + +info: + name: > + Wp Cookie Choice <= 1.1.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/278d2d44-16e1-4560-9988-02d900443e42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cookiechoise/" + google-query: inurl:"/wp-content/plugins/wp-cookiechoise/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cookiechoise,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cookiechoise/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cookiechoise" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-copyprotect-e1febe978f6ac681c905f0209b923309.yaml b/nuclei-templates/cve-less/plugins/wp-copyprotect-e1febe978f6ac681c905f0209b923309.yaml new file mode 100644 index 0000000000..92c40544aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-copyprotect-e1febe978f6ac681c905f0209b923309.yaml @@ -0,0 +1,58 @@ +id: wp-copyprotect-e1febe978f6ac681c905f0209b923309 + +info: + name: > + WP-CopyProtect [Protect your blog posts] <= 3.1.0 - Cross-Site Request Forgery via CopyProtect_options_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6461a8f-297e-49ad-aa9b-9379f0984423?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-copyprotect/" + google-query: inurl:"/wp-content/plugins/wp-copyprotect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-copyprotect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-copyprotect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-copyprotect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-copyprotect-e4e5ff4fcb64dcafb0055252dafcef0a.yaml b/nuclei-templates/cve-less/plugins/wp-copyprotect-e4e5ff4fcb64dcafb0055252dafcef0a.yaml new file mode 100644 index 0000000000..9983a2a087 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-copyprotect-e4e5ff4fcb64dcafb0055252dafcef0a.yaml @@ -0,0 +1,58 @@ +id: wp-copyprotect-e4e5ff4fcb64dcafb0055252dafcef0a + +info: + name: > + WP-CopyProtect [Protect your blog posts] <= 3.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f34302c-b08c-4542-9aa9-c66fe1f0288d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-copyprotect/" + google-query: inurl:"/wp-content/plugins/wp-copyprotect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-copyprotect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-copyprotect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-copyprotect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-copysafe-web-0146139ec324fe379ee6ec8f57dc3c30.yaml b/nuclei-templates/cve-less/plugins/wp-copysafe-web-0146139ec324fe379ee6ec8f57dc3c30.yaml new file mode 100644 index 0000000000..dd4628a42d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-copysafe-web-0146139ec324fe379ee6ec8f57dc3c30.yaml @@ -0,0 +1,58 @@ +id: wp-copysafe-web-0146139ec324fe379ee6ec8f57dc3c30 + +info: + name: > + CopySafe Web Protection <= 3.13 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07e110b3-ef10-482d-a564-c9f23631e5f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-copysafe-web/" + google-query: inurl:"/wp-content/plugins/wp-copysafe-web/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-copysafe-web,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-copysafe-web/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-copysafe-web" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-copysafe-web-79179ad54ba7abdd62ae8ef75c3ac232.yaml b/nuclei-templates/cve-less/plugins/wp-copysafe-web-79179ad54ba7abdd62ae8ef75c3ac232.yaml new file mode 100644 index 0000000000..c2d87f4d6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-copysafe-web-79179ad54ba7abdd62ae8ef75c3ac232.yaml @@ -0,0 +1,58 @@ +id: wp-copysafe-web-79179ad54ba7abdd62ae8ef75c3ac232 + +info: + name: > + CopySafe Web Protection < 2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f47d50dc-ec14-40c8-95a2-f393986ed71b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-copysafe-web/" + google-query: inurl:"/wp-content/plugins/wp-copysafe-web/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-copysafe-web,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-copysafe-web/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-copysafe-web" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cors-e46a5a03ceb7f18070858cdd9f1f8b5c.yaml b/nuclei-templates/cve-less/plugins/wp-cors-e46a5a03ceb7f18070858cdd9f1f8b5c.yaml new file mode 100644 index 0000000000..ce859bf413 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cors-e46a5a03ceb7f18070858cdd9f1f8b5c.yaml @@ -0,0 +1,58 @@ +id: wp-cors-e46a5a03ceb7f18070858cdd9f1f8b5c + +info: + name: > + WP-CORS <= 0.2.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d571dcc-74a4-4380-8961-890f10443b80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cors/" + google-query: inurl:"/wp-content/plugins/wp-cors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-countdown-block-c70d49119f4b9f186615bc657f763711.yaml b/nuclei-templates/cve-less/plugins/wp-countdown-block-c70d49119f4b9f186615bc657f763711.yaml new file mode 100644 index 0000000000..b8fd0876e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-countdown-block-c70d49119f4b9f186615bc657f763711.yaml @@ -0,0 +1,58 @@ +id: wp-countdown-block-c70d49119f4b9f186615bc657f763711 + +info: + name: > + Countdown Block <= 1.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a656052-3b8a-4a93-b4f8-372b448a8373?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-countdown-block/" + google-query: inurl:"/wp-content/plugins/wp-countdown-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-countdown-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-countdown-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-countdown-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-coupons-and-deals-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-coupons-and-deals-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..235646bd45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-coupons-and-deals-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-coupons-and-deals-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-coupons-and-deals/" + google-query: inurl:"/wp-content/plugins/wp-coupons-and-deals/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-coupons-and-deals,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-coupons-and-deals/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-coupons-and-deals" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-courses-33d299e06297ee744f8b2ab0f31bf14e.yaml b/nuclei-templates/cve-less/plugins/wp-courses-33d299e06297ee744f8b2ab0f31bf14e.yaml new file mode 100644 index 0000000000..1bba873175 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-courses-33d299e06297ee744f8b2ab0f31bf14e.yaml @@ -0,0 +1,58 @@ +id: wp-courses-33d299e06297ee744f8b2ab0f31bf14e + +info: + name: > + WP Courses LMS <= 3.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1127fe1e-4359-4dff-93a7-392a8bfded51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-courses/" + google-query: inurl:"/wp-content/plugins/wp-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-courses,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-courses-863ed304215cd2e175d9703d88e6083d.yaml b/nuclei-templates/cve-less/plugins/wp-courses-863ed304215cd2e175d9703d88e6083d.yaml new file mode 100644 index 0000000000..840700a7a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-courses-863ed304215cd2e175d9703d88e6083d.yaml @@ -0,0 +1,58 @@ +id: wp-courses-863ed304215cd2e175d9703d88e6083d + +info: + name: > + WP Courses LMS < 2.0.44 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49fc7174-9263-4158-8cdc-cd249179eb3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-courses/" + google-query: inurl:"/wp-content/plugins/wp-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-courses,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-courses-940c6ab33d2bde0b6449cfe6f3d13395.yaml b/nuclei-templates/cve-less/plugins/wp-courses-940c6ab33d2bde0b6449cfe6f3d13395.yaml new file mode 100644 index 0000000000..1d92573122 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-courses-940c6ab33d2bde0b6449cfe6f3d13395.yaml @@ -0,0 +1,58 @@ +id: wp-courses-940c6ab33d2bde0b6449cfe6f3d13395 + +info: + name: > + WP Courses <= 2.0.28 - Improper Access Controls + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0bce89d-6b1d-4e7f-bd7f-6143a3b622de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-courses/" + google-query: inurl:"/wp-content/plugins/wp-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-courses,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-courses-97452a6bc86602fd42828322e14bf1a4.yaml b/nuclei-templates/cve-less/plugins/wp-courses-97452a6bc86602fd42828322e14bf1a4.yaml new file mode 100644 index 0000000000..a369014fee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-courses-97452a6bc86602fd42828322e14bf1a4.yaml @@ -0,0 +1,58 @@ +id: wp-courses-97452a6bc86602fd42828322e14bf1a4 + +info: + name: > + WP Courses LMS <= 3.2.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a6f7952-cb64-4cff-aae7-0f03692cd95f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-courses/" + google-query: inurl:"/wp-content/plugins/wp-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-courses,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-courses-f5cb3f8d334ac2311e5f8501cefe50c7.yaml b/nuclei-templates/cve-less/plugins/wp-courses-f5cb3f8d334ac2311e5f8501cefe50c7.yaml new file mode 100644 index 0000000000..982ae96413 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-courses-f5cb3f8d334ac2311e5f8501cefe50c7.yaml @@ -0,0 +1,58 @@ +id: wp-courses-f5cb3f8d334ac2311e5f8501cefe50c7 + +info: + name: > + WP Courses LMS <= 3.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/487e23c9-9100-4240-8992-c4c85930c4a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-courses/" + google-query: inurl:"/wp-content/plugins/wp-courses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-courses,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-courses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-courses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crm-977852d7cbd71ce5f22a0af60232cc54.yaml b/nuclei-templates/cve-less/plugins/wp-crm-977852d7cbd71ce5f22a0af60232cc54.yaml new file mode 100644 index 0000000000..157101796d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crm-977852d7cbd71ce5f22a0af60232cc54.yaml @@ -0,0 +1,58 @@ +id: wp-crm-977852d7cbd71ce5f22a0af60232cc54 + +info: + name: > + WP-CRM – Customer Relations Management for WordPress <= 1.2.1 - CSV injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/313af4a0-f32b-443f-a976-e06499d3c94b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crm/" + google-query: inurl:"/wp-content/plugins/wp-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crm,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crm-system-0f98500a56d8bff1fd15d46c8720db00.yaml b/nuclei-templates/cve-less/plugins/wp-crm-system-0f98500a56d8bff1fd15d46c8720db00.yaml new file mode 100644 index 0000000000..9478fe24ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crm-system-0f98500a56d8bff1fd15d46c8720db00.yaml @@ -0,0 +1,58 @@ +id: wp-crm-system-0f98500a56d8bff1fd15d46c8720db00 + +info: + name: > + WP-CRM System <= 3.2.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c70865c8-3c63-4988-a1fd-f8f10c20228f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crm-system/" + google-query: inurl:"/wp-content/plugins/wp-crm-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crm-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crm-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crm-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cron-dashboard-2f795470b566b4d4e27fdf7c4b01f4e4.yaml b/nuclei-templates/cve-less/plugins/wp-cron-dashboard-2f795470b566b4d4e27fdf7c4b01f4e4.yaml new file mode 100644 index 0000000000..9026ca726e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cron-dashboard-2f795470b566b4d4e27fdf7c4b01f4e4.yaml @@ -0,0 +1,58 @@ +id: wp-cron-dashboard-2f795470b566b4d4e27fdf7c4b01f4e4 + +info: + name: > + WP-Cron Dashboard < 1.1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70ac8447-3d42-4577-8d46-528966a9f002?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cron-dashboard/" + google-query: inurl:"/wp-content/plugins/wp-cron-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cron-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cron-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cron-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cron-status-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-cron-status-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9ea12f8c0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cron-status-checker-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-cron-status-checker-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cron-status-checker/" + google-query: inurl:"/wp-content/plugins/wp-cron-status-checker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cron-status-checker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cron-status-checker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cron-status-checker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crontrol-4868cf7c42be3158ef073642ac63d2ca.yaml b/nuclei-templates/cve-less/plugins/wp-crontrol-4868cf7c42be3158ef073642ac63d2ca.yaml new file mode 100644 index 0000000000..064bf90ca9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crontrol-4868cf7c42be3158ef073642ac63d2ca.yaml @@ -0,0 +1,58 @@ +id: wp-crontrol-4868cf7c42be3158ef073642ac63d2ca + +info: + name: > + WP Crontrol < 1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a82666d-4c35-4aba-9163-834eef6c50ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crontrol/" + google-query: inurl:"/wp-content/plugins/wp-crontrol/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crontrol,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crontrol/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crontrol" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crontrol-ab25c765042411f076e2c34c06b3fa2a.yaml b/nuclei-templates/cve-less/plugins/wp-crontrol-ab25c765042411f076e2c34c06b3fa2a.yaml new file mode 100644 index 0000000000..e0b0808d19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crontrol-ab25c765042411f076e2c34c06b3fa2a.yaml @@ -0,0 +1,58 @@ +id: wp-crontrol-ab25c765042411f076e2c34c06b3fa2a + +info: + name: > + WP Crontrol <= 1.16.1 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b0c1afc-0e77-4a56-89cb-84e2fcc8aa21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crontrol/" + google-query: inurl:"/wp-content/plugins/wp-crontrol/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crontrol,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crontrol/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crontrol" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crowdfunding-1dcb303214a4e16964564ee6c958b8e1.yaml b/nuclei-templates/cve-less/plugins/wp-crowdfunding-1dcb303214a4e16964564ee6c958b8e1.yaml new file mode 100644 index 0000000000..43914e7d23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crowdfunding-1dcb303214a4e16964564ee6c958b8e1.yaml @@ -0,0 +1,58 @@ +id: wp-crowdfunding-1dcb303214a4e16964564ee6c958b8e1 + +info: + name: > + WP Crowdfunding <= 2.1.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fb42402-4cd8-4d5d-b95a-47076ace27c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crowdfunding/" + google-query: inurl:"/wp-content/plugins/wp-crowdfunding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crowdfunding,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crowdfunding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crowdfunding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crowdfunding-1ed0f12e4f8286a9294dfd9901458db7.yaml b/nuclei-templates/cve-less/plugins/wp-crowdfunding-1ed0f12e4f8286a9294dfd9901458db7.yaml new file mode 100644 index 0000000000..60b16a3a0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crowdfunding-1ed0f12e4f8286a9294dfd9901458db7.yaml @@ -0,0 +1,58 @@ +id: wp-crowdfunding-1ed0f12e4f8286a9294dfd9901458db7 + +info: + name: > + WP Crowdfunding <= 2.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/294b5bd1-a7c8-4c06-b107-e80bf3b35da8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crowdfunding/" + google-query: inurl:"/wp-content/plugins/wp-crowdfunding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crowdfunding,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crowdfunding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crowdfunding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crowdfunding-29e9ddd5b76fa0248f97f07fd01dc1e5.yaml b/nuclei-templates/cve-less/plugins/wp-crowdfunding-29e9ddd5b76fa0248f97f07fd01dc1e5.yaml new file mode 100644 index 0000000000..682427ba6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crowdfunding-29e9ddd5b76fa0248f97f07fd01dc1e5.yaml @@ -0,0 +1,58 @@ +id: wp-crowdfunding-29e9ddd5b76fa0248f97f07fd01dc1e5 + +info: + name: > + WP Crowdfunding <= 2.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4dc8f18-d990-4e41-8bf8-dfa9de4c0f6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crowdfunding/" + google-query: inurl:"/wp-content/plugins/wp-crowdfunding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crowdfunding,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crowdfunding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crowdfunding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crowdfunding-53abed64d2c7da6e29618b2b45471eff.yaml b/nuclei-templates/cve-less/plugins/wp-crowdfunding-53abed64d2c7da6e29618b2b45471eff.yaml new file mode 100644 index 0000000000..c05e66be41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crowdfunding-53abed64d2c7da6e29618b2b45471eff.yaml @@ -0,0 +1,58 @@ +id: wp-crowdfunding-53abed64d2c7da6e29618b2b45471eff + +info: + name: > + WP Crowdfunding <= 2.1.4 - Missing Authorization via settings_reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cddf4aa1-5c7d-4aa1-9384-1c352f0c6da9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crowdfunding/" + google-query: inurl:"/wp-content/plugins/wp-crowdfunding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crowdfunding,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crowdfunding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crowdfunding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crowdfunding-738aec4d264c39b57fdb9fa2e1cd1e49.yaml b/nuclei-templates/cve-less/plugins/wp-crowdfunding-738aec4d264c39b57fdb9fa2e1cd1e49.yaml new file mode 100644 index 0000000000..71952764ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crowdfunding-738aec4d264c39b57fdb9fa2e1cd1e49.yaml @@ -0,0 +1,58 @@ +id: wp-crowdfunding-738aec4d264c39b57fdb9fa2e1cd1e49 + +info: + name: > + WP Crowdfunding <= 2.1.6 - Reflected Cross-Site Scripting via postid + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f13a432-e37d-4183-85ff-e2a04b40cda8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crowdfunding/" + google-query: inurl:"/wp-content/plugins/wp-crowdfunding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crowdfunding,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crowdfunding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crowdfunding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crowdfunding-91cfe4c5d855055ec913db3b32084f9f.yaml b/nuclei-templates/cve-less/plugins/wp-crowdfunding-91cfe4c5d855055ec913db3b32084f9f.yaml new file mode 100644 index 0000000000..f5661aa18c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crowdfunding-91cfe4c5d855055ec913db3b32084f9f.yaml @@ -0,0 +1,58 @@ +id: wp-crowdfunding-91cfe4c5d855055ec913db3b32084f9f + +info: + name: > + WP Crowdfunding <= 2.1.7 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9842bb5-0a71-40a9-83bc-f1841b660693?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crowdfunding/" + google-query: inurl:"/wp-content/plugins/wp-crowdfunding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crowdfunding,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crowdfunding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crowdfunding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-crowdfunding-c28a0d08c5fbf894a1f8488da42215b4.yaml b/nuclei-templates/cve-less/plugins/wp-crowdfunding-c28a0d08c5fbf894a1f8488da42215b4.yaml new file mode 100644 index 0000000000..7e55e60c31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-crowdfunding-c28a0d08c5fbf894a1f8488da42215b4.yaml @@ -0,0 +1,58 @@ +id: wp-crowdfunding-c28a0d08c5fbf894a1f8488da42215b4 + +info: + name: > + WP Crowdfunding <= 2.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2546ea7e-133a-44b8-9cdb-1b345a45d583?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-crowdfunding/" + google-query: inurl:"/wp-content/plugins/wp-crowdfunding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-crowdfunding,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-crowdfunding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-crowdfunding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-csv-1f51055337b26e17849cecf509bf67bf.yaml b/nuclei-templates/cve-less/plugins/wp-csv-1f51055337b26e17849cecf509bf67bf.yaml new file mode 100644 index 0000000000..22a7dc9fb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-csv-1f51055337b26e17849cecf509bf67bf.yaml @@ -0,0 +1,58 @@ +id: wp-csv-1f51055337b26e17849cecf509bf67bf + +info: + name: > + WP CSV <= 1.8.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75b91e92-7c00-447d-80fa-6e20ca8df7ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-csv/" + google-query: inurl:"/wp-content/plugins/wp-csv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-csv,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-csv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-csv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-csv-exporter-4e6e2faa30d1cb67b640ff4b64c7c434.yaml b/nuclei-templates/cve-less/plugins/wp-csv-exporter-4e6e2faa30d1cb67b640ff4b64c7c434.yaml new file mode 100644 index 0000000000..2a575c66e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-csv-exporter-4e6e2faa30d1cb67b640ff4b64c7c434.yaml @@ -0,0 +1,58 @@ +id: wp-csv-exporter-4e6e2faa30d1cb67b640ff4b64c7c434 + +info: + name: > + WP CSV Exporter <= 1.3.6 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32f47b68-e1ae-4ed1-9513-bba60aab65fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-csv-exporter/" + google-query: inurl:"/wp-content/plugins/wp-csv-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-csv-exporter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-csv-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-csv-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-csv-exporter-968c8d1a2b35e84ec8cc4db089cc5a0f.yaml b/nuclei-templates/cve-less/plugins/wp-csv-exporter-968c8d1a2b35e84ec8cc4db089cc5a0f.yaml new file mode 100644 index 0000000000..65c30dd762 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-csv-exporter-968c8d1a2b35e84ec8cc4db089cc5a0f.yaml @@ -0,0 +1,58 @@ +id: wp-csv-exporter-968c8d1a2b35e84ec8cc4db089cc5a0f + +info: + name: > + WP CSV Exporter <= 1.3.6 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/442551ba-409d-4b46-bdba-111a8df00a47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-csv-exporter/" + google-query: inurl:"/wp-content/plugins/wp-csv-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-csv-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-csv-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-csv-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-csv-to-database-83d9cd71e386193f00255f0781416f64.yaml b/nuclei-templates/cve-less/plugins/wp-csv-to-database-83d9cd71e386193f00255f0781416f64.yaml new file mode 100644 index 0000000000..36275a007b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-csv-to-database-83d9cd71e386193f00255f0781416f64.yaml @@ -0,0 +1,58 @@ +id: wp-csv-to-database-83d9cd71e386193f00255f0781416f64 + +info: + name: > + WP CSV to Database <= 2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/136bf4c5-5309-479e-8d6b-f8a7334da9b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-csv-to-database/" + google-query: inurl:"/wp-content/plugins/wp-csv-to-database/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-csv-to-database,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-csv-to-database/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-csv-to-database" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cufon-ec9648c71f1130788ab995bdc3f376ab.yaml b/nuclei-templates/cve-less/plugins/wp-cufon-ec9648c71f1130788ab995bdc3f376ab.yaml new file mode 100644 index 0000000000..2616daff4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cufon-ec9648c71f1130788ab995bdc3f376ab.yaml @@ -0,0 +1,58 @@ +id: wp-cufon-ec9648c71f1130788ab995bdc3f376ab + +info: + name: > + WP-Cufon <= 1.6.10 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3041bb06-504c-4de1-8a1a-12041e09400e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cufon/" + google-query: inurl:"/wp-content/plugins/wp-cufon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cufon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cufon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cufon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cumulus-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml b/nuclei-templates/cve-less/plugins/wp-cumulus-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml new file mode 100644 index 0000000000..57bb6f36e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cumulus-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml @@ -0,0 +1,58 @@ +id: wp-cumulus-ac62ca2ddae58ee9be23fe2a4d7fe3df + +info: + name: > + WP-Cumulus <= 1.22 - Cross-Site Scripting via tagcloud + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a7737b3-d85b-471f-8252-3ee6b598786d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cumulus/" + google-query: inurl:"/wp-content/plugins/wp-cumulus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cumulus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cumulus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cumulus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cumulus-ae74e5195b986dc457ca3bcab394fb91.yaml b/nuclei-templates/cve-less/plugins/wp-cumulus-ae74e5195b986dc457ca3bcab394fb91.yaml new file mode 100644 index 0000000000..8f4dee90ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cumulus-ae74e5195b986dc457ca3bcab394fb91.yaml @@ -0,0 +1,58 @@ +id: wp-cumulus-ae74e5195b986dc457ca3bcab394fb91 + +info: + name: > + WP Cumulus < 1.22 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c637882-1854-4502-9907-88053d141cfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cumulus/" + google-query: inurl:"/wp-content/plugins/wp-cumulus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cumulus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cumulus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cumulus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cumulus-b5fa15c1717b09cfe3a9444e5c71ce00.yaml b/nuclei-templates/cve-less/plugins/wp-cumulus-b5fa15c1717b09cfe3a9444e5c71ce00.yaml new file mode 100644 index 0000000000..5daaa79862 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cumulus-b5fa15c1717b09cfe3a9444e5c71ce00.yaml @@ -0,0 +1,58 @@ +id: wp-cumulus-b5fa15c1717b09cfe3a9444e5c71ce00 + +info: + name: > + WP-Cumulus <= 1.20 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21ec0fc9-4fb2-43fd-aba5-8f452d35d7b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cumulus/" + google-query: inurl:"/wp-content/plugins/wp-cumulus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cumulus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cumulus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cumulus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-cumulus-df02c18fa8558df79345e6d025074ade.yaml b/nuclei-templates/cve-less/plugins/wp-cumulus-df02c18fa8558df79345e6d025074ade.yaml new file mode 100644 index 0000000000..586d4eac2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-cumulus-df02c18fa8558df79345e6d025074ade.yaml @@ -0,0 +1,58 @@ +id: wp-cumulus-df02c18fa8558df79345e6d025074ade + +info: + name: > + WP-Cumulus <= 1.22 - Cross-Site Scripting via xmlpath + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91fcb76f-89b5-492e-b595-b0f91bca14a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cumulus/" + google-query: inurl:"/wp-content/plugins/wp-cumulus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cumulus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cumulus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cumulus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-curriculo-vitae-3e2d48fb8718138bcd53c5ef0645702a.yaml b/nuclei-templates/cve-less/plugins/wp-curriculo-vitae-3e2d48fb8718138bcd53c5ef0645702a.yaml new file mode 100644 index 0000000000..522abc51ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-curriculo-vitae-3e2d48fb8718138bcd53c5ef0645702a.yaml @@ -0,0 +1,58 @@ +id: wp-curriculo-vitae-3e2d48fb8718138bcd53c5ef0645702a + +info: + name: > + WP-Curriculo Vitae Free <= 6.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bc0969f-7b29-41fb-8d41-869049f87c7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-curriculo-vitae/" + google-query: inurl:"/wp-content/plugins/wp-curriculo-vitae/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-curriculo-vitae,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-curriculo-vitae/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-curriculo-vitae" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-32ed4b36d9532730d50e66214a30b7fa.yaml b/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-32ed4b36d9532730d50e66214a30b7fa.yaml new file mode 100644 index 0000000000..482b3c58d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-32ed4b36d9532730d50e66214a30b7fa.yaml @@ -0,0 +1,58 @@ +id: wp-custom-admin-interface-32ed4b36d9532730d50e66214a30b7fa + +info: + name: > + WP Custom Admin Interface <= 7.28 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e57f4853-cade-4bb5-8f12-4a88a200921f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-admin-interface/" + google-query: inurl:"/wp-content/plugins/wp-custom-admin-interface/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-admin-interface,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-admin-interface/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-admin-interface" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-440ba93423360c612c2bdc92f81276f2.yaml b/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-440ba93423360c612c2bdc92f81276f2.yaml new file mode 100644 index 0000000000..6b4e4422d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-440ba93423360c612c2bdc92f81276f2.yaml @@ -0,0 +1,58 @@ +id: wp-custom-admin-interface-440ba93423360c612c2bdc92f81276f2 + +info: + name: > + WP Custom Admin Interface <= 7.31 - Missing Authorization via wpcai_pro_notice_disable + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b040f47-b126-4640-9fc5-bda8650f6c69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-admin-interface/" + google-query: inurl:"/wp-content/plugins/wp-custom-admin-interface/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-admin-interface,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-admin-interface/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-admin-interface" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-5bdecbba58ada95bd7bc5fd2be57ef44.yaml b/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-5bdecbba58ada95bd7bc5fd2be57ef44.yaml new file mode 100644 index 0000000000..b1f07186d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-5bdecbba58ada95bd7bc5fd2be57ef44.yaml @@ -0,0 +1,58 @@ +id: wp-custom-admin-interface-5bdecbba58ada95bd7bc5fd2be57ef44 + +info: + name: > + WP Custom Admin Interface <= 7.32 - Missing Authorization to Transients Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/418b9138-9ae0-41f1-a75b-69cbcaffbb88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-admin-interface/" + google-query: inurl:"/wp-content/plugins/wp-custom-admin-interface/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-admin-interface,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-admin-interface/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-admin-interface" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-c74c11d5784e405e62062349c0e1950a.yaml b/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-c74c11d5784e405e62062349c0e1950a.yaml new file mode 100644 index 0000000000..1be3739591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-admin-interface-c74c11d5784e405e62062349c0e1950a.yaml @@ -0,0 +1,58 @@ +id: wp-custom-admin-interface-c74c11d5784e405e62062349c0e1950a + +info: + name: > + WP Custom Admin Interface <= 7.32 - Cross-Site Request Forgery to Transients Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5bc6097-d6ed-4598-b3c8-9159d5ce04ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-admin-interface/" + google-query: inurl:"/wp-content/plugins/wp-custom-admin-interface/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-admin-interface,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-admin-interface/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-admin-interface" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-author-url-050cddb029ad5e41b8d75ac57910a3a4.yaml b/nuclei-templates/cve-less/plugins/wp-custom-author-url-050cddb029ad5e41b8d75ac57910a3a4.yaml new file mode 100644 index 0000000000..b4d16c7ae2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-author-url-050cddb029ad5e41b8d75ac57910a3a4.yaml @@ -0,0 +1,58 @@ +id: wp-custom-author-url-050cddb029ad5e41b8d75ac57910a3a4 + +info: + name: > + WP Custom Author URL <= 1.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f3a57ce-eead-4631-93da-ba1a0a33ec2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-author-url/" + google-query: inurl:"/wp-content/plugins/wp-custom-author-url/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-author-url,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-author-url/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-author-url" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-body-class-64d4110e0f9003166c73a24b6fad0a3d.yaml b/nuclei-templates/cve-less/plugins/wp-custom-body-class-64d4110e0f9003166c73a24b6fad0a3d.yaml new file mode 100644 index 0000000000..2499499788 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-body-class-64d4110e0f9003166c73a24b6fad0a3d.yaml @@ -0,0 +1,58 @@ +id: wp-custom-body-class-64d4110e0f9003166c73a24b6fad0a3d + +info: + name: > + Custom Body Class <= 0.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69a9f449-9f94-4da3-9fd0-4eac72b6d8be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-body-class/" + google-query: inurl:"/wp-content/plugins/wp-custom-body-class/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-body-class,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-body-class/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-body-class" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-body-class-d03a7182da2d0e0b179ec3d956910e32.yaml b/nuclei-templates/cve-less/plugins/wp-custom-body-class-d03a7182da2d0e0b179ec3d956910e32.yaml new file mode 100644 index 0000000000..259a19a352 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-body-class-d03a7182da2d0e0b179ec3d956910e32.yaml @@ -0,0 +1,58 @@ +id: wp-custom-body-class-d03a7182da2d0e0b179ec3d956910e32 + +info: + name: > + Custom Body Class <= 0.6.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e013542-8a8c-440d-9130-61057d97990d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-body-class/" + google-query: inurl:"/wp-content/plugins/wp-custom-body-class/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-body-class,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-body-class/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-body-class" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-cursors-31292a415c3bd76b8562016d2514c1b7.yaml b/nuclei-templates/cve-less/plugins/wp-custom-cursors-31292a415c3bd76b8562016d2514c1b7.yaml new file mode 100644 index 0000000000..a5e305e437 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-cursors-31292a415c3bd76b8562016d2514c1b7.yaml @@ -0,0 +1,58 @@ +id: wp-custom-cursors-31292a415c3bd76b8562016d2514c1b7 + +info: + name: > + WP Custom Cursors <= 3.0.1 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3034130-98f8-4907-862f-e04ff67b4d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-cursors/" + google-query: inurl:"/wp-content/plugins/wp-custom-cursors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-cursors,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-cursors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-cursors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-cursors-5c48a008fb4b7cf800ee3deda45c5f7c.yaml b/nuclei-templates/cve-less/plugins/wp-custom-cursors-5c48a008fb4b7cf800ee3deda45c5f7c.yaml new file mode 100644 index 0000000000..82c0e6b4a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-cursors-5c48a008fb4b7cf800ee3deda45c5f7c.yaml @@ -0,0 +1,58 @@ +id: wp-custom-cursors-5c48a008fb4b7cf800ee3deda45c5f7c + +info: + name: > + WP Custom Cursors | WordPress Cursor <= 3.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0c04f12-7602-4d57-aa0c-54ecbf7f8875?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-cursors/" + google-query: inurl:"/wp-content/plugins/wp-custom-cursors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-cursors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-cursors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-cursors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-cursors-9698878f57267bfd24968203a9fc1400.yaml b/nuclei-templates/cve-less/plugins/wp-custom-cursors-9698878f57267bfd24968203a9fc1400.yaml new file mode 100644 index 0000000000..f2699685fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-cursors-9698878f57267bfd24968203a9fc1400.yaml @@ -0,0 +1,58 @@ +id: wp-custom-cursors-9698878f57267bfd24968203a9fc1400 + +info: + name: > + WP Custom Cursors < 3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efadd529-f369-4c7a-ab71-170e72c997f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-cursors/" + google-query: inurl:"/wp-content/plugins/wp-custom-cursors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-cursors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-cursors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-cursors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-cursors-990bebfd04ffccf7784d9ed7851bc9ac.yaml b/nuclei-templates/cve-less/plugins/wp-custom-cursors-990bebfd04ffccf7784d9ed7851bc9ac.yaml new file mode 100644 index 0000000000..37ecad65af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-cursors-990bebfd04ffccf7784d9ed7851bc9ac.yaml @@ -0,0 +1,58 @@ +id: wp-custom-cursors-990bebfd04ffccf7784d9ed7851bc9ac + +info: + name: > + WP Custom Cursors <= 3.0 - Cross-Site Request Forgery to Cursor Manipulation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/112e4abe-aac7-4fac-b03f-b998374846c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-cursors/" + google-query: inurl:"/wp-content/plugins/wp-custom-cursors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-cursors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-cursors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-cursors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-cursors-ece3289501587998363581768a050e75.yaml b/nuclei-templates/cve-less/plugins/wp-custom-cursors-ece3289501587998363581768a050e75.yaml new file mode 100644 index 0000000000..df869c40af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-cursors-ece3289501587998363581768a050e75.yaml @@ -0,0 +1,58 @@ +id: wp-custom-cursors-ece3289501587998363581768a050e75 + +info: + name: > + WP Custom Cursors <= 3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27885b7f-ef8c-45ea-995c-92cd1939e1c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-cursors/" + google-query: inurl:"/wp-content/plugins/wp-custom-cursors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-cursors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-cursors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-cursors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-fields-search-0b1be450ec6216c739b3d0139ea02732.yaml b/nuclei-templates/cve-less/plugins/wp-custom-fields-search-0b1be450ec6216c739b3d0139ea02732.yaml new file mode 100644 index 0000000000..a9f7f53d8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-fields-search-0b1be450ec6216c739b3d0139ea02732.yaml @@ -0,0 +1,58 @@ +id: wp-custom-fields-search-0b1be450ec6216c739b3d0139ea02732 + +info: + name: > + WP Custom Fields Search <= 1.2.34 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce106c3a-e99b-4182-84d8-8f896edbbefd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-fields-search/" + google-query: inurl:"/wp-content/plugins/wp-custom-fields-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-fields-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-fields-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-fields-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-fields-search-8eccd870a6d15f799494bf58d6a610b0.yaml b/nuclei-templates/cve-less/plugins/wp-custom-fields-search-8eccd870a6d15f799494bf58d6a610b0.yaml new file mode 100644 index 0000000000..5aed54124f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-fields-search-8eccd870a6d15f799494bf58d6a610b0.yaml @@ -0,0 +1,58 @@ +id: wp-custom-fields-search-8eccd870a6d15f799494bf58d6a610b0 + +info: + name: > + WP Custom Fields Search <= 0.3.28 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52696d42-b522-47d3-9a59-92078145c2be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-fields-search/" + google-query: inurl:"/wp-content/plugins/wp-custom-fields-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-fields-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-fields-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-fields-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-login-page-4fd05a735543332a71cc4808699480af.yaml b/nuclei-templates/cve-less/plugins/wp-custom-login-page-4fd05a735543332a71cc4808699480af.yaml new file mode 100644 index 0000000000..e379dc43fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-login-page-4fd05a735543332a71cc4808699480af.yaml @@ -0,0 +1,58 @@ +id: wp-custom-login-page-4fd05a735543332a71cc4808699480af + +info: + name: > + Custom Login Page <= 2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44cde2d1-8cb4-4185-a7e6-58a2bec0dae9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-login-page/" + google-query: inurl:"/wp-content/plugins/wp-custom-login-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-login-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-login-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-login-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-pages-4e0f6a7fdb6146beb66009561f485674.yaml b/nuclei-templates/cve-less/plugins/wp-custom-pages-4e0f6a7fdb6146beb66009561f485674.yaml new file mode 100644 index 0000000000..236b054c28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-pages-4e0f6a7fdb6146beb66009561f485674.yaml @@ -0,0 +1,58 @@ +id: wp-custom-pages-4e0f6a7fdb6146beb66009561f485674 + +info: + name: > + WP Custom Pages <= 0.5.0.1 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b1b0dbd-084a-44e5-b711-1d5bafb0a300?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-pages/" + google-query: inurl:"/wp-content/plugins/wp-custom-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-pages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-post-template-fae9e4b7c0dc6fb3f6341b0fd31d1ab6.yaml b/nuclei-templates/cve-less/plugins/wp-custom-post-template-fae9e4b7c0dc6fb3f6341b0fd31d1ab6.yaml new file mode 100644 index 0000000000..1b417b4947 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-post-template-fae9e4b7c0dc6fb3f6341b0fd31d1ab6.yaml @@ -0,0 +1,58 @@ +id: wp-custom-post-template-fae9e4b7c0dc6fb3f6341b0fd31d1ab6 + +info: + name: > + WP Custom Post Template <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b796b514-b6ca-4a22-9340-df02fec97075?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-post-template/" + google-query: inurl:"/wp-content/plugins/wp-custom-post-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-post-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-post-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-post-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-custom-widget-area-23aac587b81f89d6096ca89681943380.yaml b/nuclei-templates/cve-less/plugins/wp-custom-widget-area-23aac587b81f89d6096ca89681943380.yaml new file mode 100644 index 0000000000..e2ce2ca240 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-custom-widget-area-23aac587b81f89d6096ca89681943380.yaml @@ -0,0 +1,58 @@ +id: wp-custom-widget-area-23aac587b81f89d6096ca89681943380 + +info: + name: > + WP Custom Widget area <= 1.2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64559d37-0c6b-45f5-8a2a-6e70cb5e423c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-custom-widget-area/" + google-query: inurl:"/wp-content/plugins/wp-custom-widget-area/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-custom-widget-area,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-custom-widget-area/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-custom-widget-area" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-customer-reviews-11af501cd400c11d4471a7dd2fad2f1e.yaml b/nuclei-templates/cve-less/plugins/wp-customer-reviews-11af501cd400c11d4471a7dd2fad2f1e.yaml new file mode 100644 index 0000000000..d9b5a97cf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-customer-reviews-11af501cd400c11d4471a7dd2fad2f1e.yaml @@ -0,0 +1,58 @@ +id: wp-customer-reviews-11af501cd400c11d4471a7dd2fad2f1e + +info: + name: > + WP Customer Reviews <= 3.7.0 - Authenticated (Contributor+) Malicious Redirect via HTTP-EQUIV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1beb2a35-0346-4aa1-8cc3-a18a47e82eb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-customer-reviews/" + google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-customer-reviews,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-customer-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-customer-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-customer-reviews-6ed86de0b04577fc056eab4066eb09a3.yaml b/nuclei-templates/cve-less/plugins/wp-customer-reviews-6ed86de0b04577fc056eab4066eb09a3.yaml new file mode 100644 index 0000000000..929a51518e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-customer-reviews-6ed86de0b04577fc056eab4066eb09a3.yaml @@ -0,0 +1,58 @@ +id: wp-customer-reviews-6ed86de0b04577fc056eab4066eb09a3 + +info: + name: > + WP Customer Reviews <= 3.5.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd67e334-88fd-49c7-a20c-9c2f95e9950c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-customer-reviews/" + google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-customer-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-customer-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-customer-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-customer-reviews-a0746efee95fbf7d166096b25b7d8be2.yaml b/nuclei-templates/cve-less/plugins/wp-customer-reviews-a0746efee95fbf7d166096b25b7d8be2.yaml new file mode 100644 index 0000000000..6db428da28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-customer-reviews-a0746efee95fbf7d166096b25b7d8be2.yaml @@ -0,0 +1,58 @@ +id: wp-customer-reviews-a0746efee95fbf7d166096b25b7d8be2 + +info: + name: > + WP Customer Reviews <= 3.6.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f81950be-de32-4fa1-94fe-42667414fe2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-customer-reviews/" + google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-customer-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-customer-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-customer-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-customer-reviews-b3f06bebea4c15ec9085029db00fb9fa.yaml b/nuclei-templates/cve-less/plugins/wp-customer-reviews-b3f06bebea4c15ec9085029db00fb9fa.yaml new file mode 100644 index 0000000000..0527c6aa84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-customer-reviews-b3f06bebea4c15ec9085029db00fb9fa.yaml @@ -0,0 +1,58 @@ +id: wp-customer-reviews-b3f06bebea4c15ec9085029db00fb9fa + +info: + name: > + WP Customer Reviews <= 3.4.2 - Multiple Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51e1a30e-774e-4478-be34-486ed4142a7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-customer-reviews/" + google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-customer-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-customer-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-customer-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-customer-reviews-c2b458a87e9095667109688e878e4bb7.yaml b/nuclei-templates/cve-less/plugins/wp-customer-reviews-c2b458a87e9095667109688e878e4bb7.yaml new file mode 100644 index 0000000000..074230ea94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-customer-reviews-c2b458a87e9095667109688e878e4bb7.yaml @@ -0,0 +1,58 @@ +id: wp-customer-reviews-c2b458a87e9095667109688e878e4bb7 + +info: + name: > + WP Customer Reviews <= 3.6.6 - Authenticated (Subscriber+) Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24b9984c-ec33-4492-815b-67a21ac4da0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-customer-reviews/" + google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-customer-reviews,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-customer-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-customer-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-customer-reviews-daafab6254624f5514eee093537d860d.yaml b/nuclei-templates/cve-less/plugins/wp-customer-reviews-daafab6254624f5514eee093537d860d.yaml new file mode 100644 index 0000000000..a8c9c9d7de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-customer-reviews-daafab6254624f5514eee093537d860d.yaml @@ -0,0 +1,58 @@ +id: wp-customer-reviews-daafab6254624f5514eee093537d860d + +info: + name: > + WP Customer Reviews <= 3.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f70ec123-fff3-4f03-a424-37e0e579b765?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-customer-reviews/" + google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-customer-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-customer-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-customer-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-customer-reviews-e97ef8cef65f1238fc33971be91c7b6a.yaml b/nuclei-templates/cve-less/plugins/wp-customer-reviews-e97ef8cef65f1238fc33971be91c7b6a.yaml new file mode 100644 index 0000000000..bbe57c14a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-customer-reviews-e97ef8cef65f1238fc33971be91c7b6a.yaml @@ -0,0 +1,58 @@ +id: wp-customer-reviews-e97ef8cef65f1238fc33971be91c7b6a + +info: + name: > + Customer Reviews < 3.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f682b623-f9c5-44ce-90db-c6ee4c27a93b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-customer-reviews/" + google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-customer-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-customer-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-customer-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-d3-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml b/nuclei-templates/cve-less/plugins/wp-d3-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml new file mode 100644 index 0000000000..99e4c31437 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-d3-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml @@ -0,0 +1,58 @@ +id: wp-d3-5b558ed2503b6bdcb6a02e6d5ffb6d95 + +info: + name: > + Wp-D3 < 2.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec6331e1-7a7c-486d-873b-02b3af38387c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-d3/" + google-query: inurl:"/wp-content/plugins/wp-d3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-d3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-d3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-d3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-d3-8e3ce96babe760c2cb16640799a8d0b9.yaml b/nuclei-templates/cve-less/plugins/wp-d3-8e3ce96babe760c2cb16640799a8d0b9.yaml new file mode 100644 index 0000000000..aa52adfb36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-d3-8e3ce96babe760c2cb16640799a8d0b9.yaml @@ -0,0 +1,58 @@ +id: wp-d3-8e3ce96babe760c2cb16640799a8d0b9 + +info: + name: > + Wp-D3 <= 2.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89409461-c87e-4882-bf53-cc789e459b4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-d3/" + google-query: inurl:"/wp-content/plugins/wp-d3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-d3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-d3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-d3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dark-mode-129be45dc62378c19cbd82aa0287c865.yaml b/nuclei-templates/cve-less/plugins/wp-dark-mode-129be45dc62378c19cbd82aa0287c865.yaml new file mode 100644 index 0000000000..4cf9d7fcb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dark-mode-129be45dc62378c19cbd82aa0287c865.yaml @@ -0,0 +1,58 @@ +id: wp-dark-mode-129be45dc62378c19cbd82aa0287c865 + +info: + name: > + WP Dark Mode <= 4.0.7 - Authenticated (Subscriber+) Local File Inclusion via 'style' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d43234d0-5f44-4484-a8d6-16d43d1db51e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dark-mode/" + google-query: inurl:"/wp-content/plugins/wp-dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dark-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dark-mode-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wp-dark-mode-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..481f4fe855 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dark-mode-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wp-dark-mode-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dark-mode/" + google-query: inurl:"/wp-content/plugins/wp-dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dark-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dark-mode-9b4ecfa65ce2bd75653c853011940f82.yaml b/nuclei-templates/cve-less/plugins/wp-dark-mode-9b4ecfa65ce2bd75653c853011940f82.yaml new file mode 100644 index 0000000000..38abbcd642 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dark-mode-9b4ecfa65ce2bd75653c853011940f82.yaml @@ -0,0 +1,58 @@ +id: wp-dark-mode-9b4ecfa65ce2bd75653c853011940f82 + +info: + name: > + WP Dark Mode <= 3.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/108f3e7b-f4c1-445c-914c-97960b21b5fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dark-mode/" + google-query: inurl:"/wp-content/plugins/wp-dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dark-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..c9d8758f02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wp-dark-mode-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dark-mode/" + google-query: inurl:"/wp-content/plugins/wp-dark-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dark-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dark-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dark-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dashboard-notes-49ce77ee7ff4dfc9b11f4efe4714eccb.yaml b/nuclei-templates/cve-less/plugins/wp-dashboard-notes-49ce77ee7ff4dfc9b11f4efe4714eccb.yaml new file mode 100644 index 0000000000..d069bced03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dashboard-notes-49ce77ee7ff4dfc9b11f4efe4714eccb.yaml @@ -0,0 +1,58 @@ +id: wp-dashboard-notes-49ce77ee7ff4dfc9b11f4efe4714eccb + +info: + name: > + WP Dashboard Notes <= 1.0.10 - Missing Authorization to Arbitrary Private Notes Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64a36778-c17c-44ee-8b09-c221d27184f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dashboard-notes/" + google-query: inurl:"/wp-content/plugins/wp-dashboard-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dashboard-notes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dashboard-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dashboard-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dashboard-notes-d64722e01dc579e8e1b721ed84873800.yaml b/nuclei-templates/cve-less/plugins/wp-dashboard-notes-d64722e01dc579e8e1b721ed84873800.yaml new file mode 100644 index 0000000000..3355ab4e8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dashboard-notes-d64722e01dc579e8e1b721ed84873800.yaml @@ -0,0 +1,58 @@ +id: wp-dashboard-notes-d64722e01dc579e8e1b721ed84873800 + +info: + name: > + WP Dashboard Notes <= 1.0.10 - Insecure Direct Object References to Authenticated Private Note Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6f1233b-55d6-488a-8667-b5454f71020c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dashboard-notes/" + google-query: inurl:"/wp-content/plugins/wp-dashboard-notes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dashboard-notes,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dashboard-notes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dashboard-notes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-data-access-69231840a822d24bacb2d776a5d46cf4.yaml b/nuclei-templates/cve-less/plugins/wp-data-access-69231840a822d24bacb2d776a5d46cf4.yaml new file mode 100644 index 0000000000..72c9c420a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-data-access-69231840a822d24bacb2d776a5d46cf4.yaml @@ -0,0 +1,58 @@ +id: wp-data-access-69231840a822d24bacb2d776a5d46cf4 + +info: + name: > + WP Data Access <= 5.3.7 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f562e33-2aef-46f0-8a65-691155ede9e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-data-access/" + google-query: inurl:"/wp-content/plugins/wp-data-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-data-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-data-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-data-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-data-access-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-data-access-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..d56cb0ddd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-data-access-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-data-access-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-data-access/" + google-query: inurl:"/wp-content/plugins/wp-data-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-data-access,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-data-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-data-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-data-access-f5497363e91c49e85823434d8464dab9.yaml b/nuclei-templates/cve-less/plugins/wp-data-access-f5497363e91c49e85823434d8464dab9.yaml new file mode 100644 index 0000000000..f578c684bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-data-access-f5497363e91c49e85823434d8464dab9.yaml @@ -0,0 +1,58 @@ +id: wp-data-access-f5497363e91c49e85823434d8464dab9 + +info: + name: > + WP Data Access <= 4.3.1 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cb9cc24-920f-402d-8a87-8b6c6a1b1a51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-data-access/" + google-query: inurl:"/wp-content/plugins/wp-data-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-data-access,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-data-access/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-data-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-admin-6cf9abd0a55631980f6943dc1552464b.yaml b/nuclei-templates/cve-less/plugins/wp-database-admin-6cf9abd0a55631980f6943dc1552464b.yaml new file mode 100644 index 0000000000..2b10e01b5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-admin-6cf9abd0a55631980f6943dc1552464b.yaml @@ -0,0 +1,58 @@ +id: wp-database-admin-6cf9abd0a55631980f6943dc1552464b + +info: + name: > + WordPress Database Administrator <= 1.0.3 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c314acf-d5bb-433a-8e2d-4ca333944bb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-admin/" + google-query: inurl:"/wp-content/plugins/wp-database-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-01a81435c686a1247dfccda6d4fceb1e.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-01a81435c686a1247dfccda6d4fceb1e.yaml new file mode 100644 index 0000000000..01f293af52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-01a81435c686a1247dfccda6d4fceb1e.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-01a81435c686a1247dfccda6d4fceb1e + +info: + name: > + WP Database Backup <= 4.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acf1e98a-9e9d-453d-afce-6e47fce3a2d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-0ccf2aeb067cc807426227d06027c42a.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-0ccf2aeb067cc807426227d06027c42a.yaml new file mode 100644 index 0000000000..9aada4bc6e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-0ccf2aeb067cc807426227d06027c42a.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-0ccf2aeb067cc807426227d06027c42a + +info: + name: > + WP Database Backup <= 5.5 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c58a2de0-8bb3-4e48-889e-0a8f47ca2959?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-230f648691b91c6194be1f415c1bb8f9.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-230f648691b91c6194be1f415c1bb8f9.yaml new file mode 100644 index 0000000000..023c4a8f54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-230f648691b91c6194be1f415c1bb8f9.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-230f648691b91c6194be1f415c1bb8f9 + +info: + name: > + WP Database Backup <= 4.3.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30b9c4ca-1744-4907-930b-28ef5494d29c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-434ae7a95fc78d705c7843354abb6396.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-434ae7a95fc78d705c7843354abb6396.yaml new file mode 100644 index 0000000000..303e1e4069 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-434ae7a95fc78d705c7843354abb6396.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-434ae7a95fc78d705c7843354abb6396 + +info: + name: > + WP Database Backup <= 4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17422c79-494a-4c90-a48c-1aad9e0fa4c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-4e3789575d49b1ac4382fdd75784e5a5.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-4e3789575d49b1ac4382fdd75784e5a5.yaml new file mode 100644 index 0000000000..4d39ae2a96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-4e3789575d49b1ac4382fdd75784e5a5.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-4e3789575d49b1ac4382fdd75784e5a5 + +info: + name: > + WP Database Backup < 5.2 - OS Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d21cf285-9d75-43a2-9e81-67116f0bf896?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-570d7dad3e17c051e824f46c008efb18.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-570d7dad3e17c051e824f46c008efb18.yaml new file mode 100644 index 0000000000..62d3dce4a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-570d7dad3e17c051e824f46c008efb18.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-570d7dad3e17c051e824f46c008efb18 + +info: + name: > + WP Database Backup <= 5.8.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ccd7f4e-46c6-4783-9a3f-30c72bbc981e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-71e8880d940289fc5d83f840f7f72d23.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-71e8880d940289fc5d83f840f7f72d23.yaml new file mode 100644 index 0000000000..3592dc0643 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-71e8880d940289fc5d83f840f7f72d23.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-71e8880d940289fc5d83f840f7f72d23 + +info: + name: > + WP Database Backup <= 5.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf0f87fe-d318-4f49-993c-3255f4e77ef1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-72a1bd2cf4b65d84a10506cf15cba770.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-72a1bd2cf4b65d84a10506cf15cba770.yaml new file mode 100644 index 0000000000..1ba5cecaf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-72a1bd2cf4b65d84a10506cf15cba770.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-72a1bd2cf4b65d84a10506cf15cba770 + +info: + name: > + WP Database Backup < 3.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a684ca7-0856-418e-9229-3e74dafb5c89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-8927f27721e1d8b23d2e73cb09a3c9b9.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-8927f27721e1d8b23d2e73cb09a3c9b9.yaml new file mode 100644 index 0000000000..8f372bec3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-8927f27721e1d8b23d2e73cb09a3c9b9.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-8927f27721e1d8b23d2e73cb09a3c9b9 + +info: + name: > + WP Database Backup <= 5.8.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f49670e-6a7f-46f9-ad1e-44f66dc32f7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-89f1af83c5f7816ee1b237c0d204c470.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-89f1af83c5f7816ee1b237c0d204c470.yaml new file mode 100644 index 0000000000..cc834dd2c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-89f1af83c5f7816ee1b237c0d204c470.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-89f1af83c5f7816ee1b237c0d204c470 + +info: + name: > + WP Database Backup <= 4.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76f9d37e-1339-4267-aaf6-38a591e97fa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-ad22dd4e7945e819f768594bfd7f51a8.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-ad22dd4e7945e819f768594bfd7f51a8.yaml new file mode 100644 index 0000000000..92d1183f2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-ad22dd4e7945e819f768594bfd7f51a8.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-ad22dd4e7945e819f768594bfd7f51a8 + +info: + name: > + WP Database Backup <= 4.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c80d994e-997f-457b-b6f9-3589815dc86e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-d37ffc3b204cc5bf91198dd14b07cd91.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-d37ffc3b204cc5bf91198dd14b07cd91.yaml new file mode 100644 index 0000000000..ff8bb8d046 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-d37ffc3b204cc5bf91198dd14b07cd91.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-d37ffc3b204cc5bf91198dd14b07cd91 + +info: + name: > + WP Database Backup <= 5.1.2 - Unauthenticated Settings Update to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8035ed9-d267-44da-9de4-cf3d6ece7059?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-backup-f1bef4e2b058a613299e0bc52fb82835.yaml b/nuclei-templates/cve-less/plugins/wp-database-backup-f1bef4e2b058a613299e0bc52fb82835.yaml new file mode 100644 index 0000000000..2d75bfbc1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-backup-f1bef4e2b058a613299e0bc52fb82835.yaml @@ -0,0 +1,58 @@ +id: wp-database-backup-f1bef4e2b058a613299e0bc52fb82835 + +info: + name: > + WP Database Backup <= 5.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31496229-bf54-466c-a87b-cc32e65500a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-backup/" + google-query: inurl:"/wp-content/plugins/wp-database-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-database-error-manager-fe4659922c34e5697cab9b458b24c4e0.yaml b/nuclei-templates/cve-less/plugins/wp-database-error-manager-fe4659922c34e5697cab9b458b24c4e0.yaml new file mode 100644 index 0000000000..c0c432b511 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-database-error-manager-fe4659922c34e5697cab9b458b24c4e0.yaml @@ -0,0 +1,58 @@ +id: wp-database-error-manager-fe4659922c34e5697cab9b458b24c4e0 + +info: + name: > + WP Database Error Manager <= 2.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a56c38c-93ba-4e22-92b4-72d79ba8cca4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-database-error-manager/" + google-query: inurl:"/wp-content/plugins/wp-database-error-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-database-error-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-database-error-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-database-error-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-datepicker-e6aa8433ac2636bbe0e1dd25466b1760.yaml b/nuclei-templates/cve-less/plugins/wp-datepicker-e6aa8433ac2636bbe0e1dd25466b1760.yaml new file mode 100644 index 0000000000..9e8a05e0c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-datepicker-e6aa8433ac2636bbe0e1dd25466b1760.yaml @@ -0,0 +1,58 @@ +id: wp-datepicker-e6aa8433ac2636bbe0e1dd25466b1760 + +info: + name: > + WP Datepicker <= 2.1.0 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45a42f20-a4d7-4c8e-a144-505a6723a2a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-datepicker/" + google-query: inurl:"/wp-content/plugins/wp-datepicker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-datepicker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-datepicker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-datepicker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-db-backup-067d3779b4dc783cbbb0a5aaab128700.yaml b/nuclei-templates/cve-less/plugins/wp-db-backup-067d3779b4dc783cbbb0a5aaab128700.yaml new file mode 100644 index 0000000000..c67a44295d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-db-backup-067d3779b4dc783cbbb0a5aaab128700.yaml @@ -0,0 +1,58 @@ +id: wp-db-backup-067d3779b4dc783cbbb0a5aaab128700 + +info: + name: > + Database Backup for WordPress <= 2.3.3 - Authenticated Stored Cross-Site Scripting via backup_receipient Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/453c656a-c26d-44c3-bc7d-7fc502a00b03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-db-backup/" + google-query: inurl:"/wp-content/plugins/wp-db-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-db-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-db-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-db-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-db-backup-39941d45971237ca65a192ec3e53bd89.yaml b/nuclei-templates/cve-less/plugins/wp-db-backup-39941d45971237ca65a192ec3e53bd89.yaml new file mode 100644 index 0000000000..2ad1fb28ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-db-backup-39941d45971237ca65a192ec3e53bd89.yaml @@ -0,0 +1,58 @@ +id: wp-db-backup-39941d45971237ca65a192ec3e53bd89 + +info: + name: > + Database Backup for WordPress <= 2.2.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b73d309-5c3a-4a46-95df-fd7a59c66275?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-db-backup/" + google-query: inurl:"/wp-content/plugins/wp-db-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-db-backup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-db-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-db-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-db-backup-5741da0b171618ff87448def21553be2.yaml b/nuclei-templates/cve-less/plugins/wp-db-backup-5741da0b171618ff87448def21553be2.yaml new file mode 100644 index 0000000000..e8088df529 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-db-backup-5741da0b171618ff87448def21553be2.yaml @@ -0,0 +1,58 @@ +id: wp-db-backup-5741da0b171618ff87448def21553be2 + +info: + name: > + Database Backup for WordPress <= 2.5.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/211350ac-24c4-4aa7-aea6-5dc44f753185?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-db-backup/" + google-query: inurl:"/wp-content/plugins/wp-db-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-db-backup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-db-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-db-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-db-backup-b872392d30229399db8513dcb00793fb.yaml b/nuclei-templates/cve-less/plugins/wp-db-backup-b872392d30229399db8513dcb00793fb.yaml new file mode 100644 index 0000000000..800cf3932b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-db-backup-b872392d30229399db8513dcb00793fb.yaml @@ -0,0 +1,58 @@ +id: wp-db-backup-b872392d30229399db8513dcb00793fb + +info: + name: > + Database Backup for WordPress <= 2.5 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4062f981-a1d2-4e54-8fd9-f8855af0a7db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-db-backup/" + google-query: inurl:"/wp-content/plugins/wp-db-backup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-db-backup,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-db-backup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-db-backup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-db-backup.php-1354435c4f5fd2cf36a77bfe4d9efd70.yaml b/nuclei-templates/cve-less/plugins/wp-db-backup.php-1354435c4f5fd2cf36a77bfe4d9efd70.yaml new file mode 100644 index 0000000000..7c2c9b780f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-db-backup.php-1354435c4f5fd2cf36a77bfe4d9efd70.yaml @@ -0,0 +1,58 @@ +id: wp-db-backup.php-1354435c4f5fd2cf36a77bfe4d9efd70 + +info: + name: > + Skippy WP-DB Backup (Legacy Plugin) <= 1.7 - Authenticated (Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e38b567-9567-4b08-8fab-3971547394b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-db-backup.php/" + google-query: inurl:"/wp-content/plugins/wp-db-backup.php/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-db-backup.php,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-db-backup.php/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-db-backup.php" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dbmanager-28a1f826666cf3d5563d0cfab46756c5.yaml b/nuclei-templates/cve-less/plugins/wp-dbmanager-28a1f826666cf3d5563d0cfab46756c5.yaml new file mode 100644 index 0000000000..652b06d539 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dbmanager-28a1f826666cf3d5563d0cfab46756c5.yaml @@ -0,0 +1,58 @@ +id: wp-dbmanager-28a1f826666cf3d5563d0cfab46756c5 + +info: + name: > + WP-DBManager <= 2.79.1 - Directory Traversal Allowing Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52c24f18-832b-4416-a148-a23e38b257e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dbmanager/" + google-query: inurl:"/wp-content/plugins/wp-dbmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dbmanager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dbmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dbmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.79.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dbmanager-2e5e8e1009429a76d7f18bdd3c57a7a9.yaml b/nuclei-templates/cve-less/plugins/wp-dbmanager-2e5e8e1009429a76d7f18bdd3c57a7a9.yaml new file mode 100644 index 0000000000..02077dc034 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dbmanager-2e5e8e1009429a76d7f18bdd3c57a7a9.yaml @@ -0,0 +1,58 @@ +id: wp-dbmanager-2e5e8e1009429a76d7f18bdd3c57a7a9 + +info: + name: > + WP DB Manager < 2.7.2 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c3192ee-f241-47b2-b10f-fc38f394012a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dbmanager/" + google-query: inurl:"/wp-content/plugins/wp-dbmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dbmanager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dbmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dbmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dbmanager-46753bc0e0a5000c6953d11b4c87a555.yaml b/nuclei-templates/cve-less/plugins/wp-dbmanager-46753bc0e0a5000c6953d11b4c87a555.yaml new file mode 100644 index 0000000000..1ea76dae95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dbmanager-46753bc0e0a5000c6953d11b4c87a555.yaml @@ -0,0 +1,58 @@ +id: wp-dbmanager-46753bc0e0a5000c6953d11b4c87a555 + +info: + name: > + WP-DBManager < 2.72 - Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7aca3b02-6c97-4d86-9378-e808c184e84c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dbmanager/" + google-query: inurl:"/wp-content/plugins/wp-dbmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dbmanager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dbmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dbmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dbmanager-d56c9f9434c8eee9514eb927acff9263.yaml b/nuclei-templates/cve-less/plugins/wp-dbmanager-d56c9f9434c8eee9514eb927acff9263.yaml new file mode 100644 index 0000000000..d4fd6ae31d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dbmanager-d56c9f9434c8eee9514eb927acff9263.yaml @@ -0,0 +1,58 @@ +id: wp-dbmanager-d56c9f9434c8eee9514eb927acff9263 + +info: + name: > + WP-DBManager < 2.72 - OS Command Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de476d40-47eb-417f-927f-d80d32745965?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dbmanager/" + google-query: inurl:"/wp-content/plugins/wp-dbmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dbmanager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dbmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dbmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.72') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dbmanager-ee247de60df1bfe0f1ecd93cf598296f.yaml b/nuclei-templates/cve-less/plugins/wp-dbmanager-ee247de60df1bfe0f1ecd93cf598296f.yaml new file mode 100644 index 0000000000..4a2606543d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dbmanager-ee247de60df1bfe0f1ecd93cf598296f.yaml @@ -0,0 +1,58 @@ +id: wp-dbmanager-ee247de60df1bfe0f1ecd93cf598296f + +info: + name: > + WP-DBManager <= 2.80.7 - Authenticated (Admin+) Remote Code Execution on Multi-Site + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00500322-0984-49f5-8a6f-8cf72d125e6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dbmanager/" + google-query: inurl:"/wp-content/plugins/wp-dbmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dbmanager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dbmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dbmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.80.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-debugging-54ecced4ec6b955678ac66c0d0f02ad3.yaml b/nuclei-templates/cve-less/plugins/wp-debugging-54ecced4ec6b955678ac66c0d0f02ad3.yaml new file mode 100644 index 0000000000..3aa033f017 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-debugging-54ecced4ec6b955678ac66c0d0f02ad3.yaml @@ -0,0 +1,58 @@ +id: wp-debugging-54ecced4ec6b955678ac66c0d0f02ad3 + +info: + name: > + WP Debugging <= 2.11.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3624708c-b0da-4177-a8e8-cf5f5c432f97?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-debugging/" + google-query: inurl:"/wp-content/plugins/wp-debugging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-debugging,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-debugging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-debugging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-debugging-7f4824acb6f88f468d76a43937c8bc24.yaml b/nuclei-templates/cve-less/plugins/wp-debugging-7f4824acb6f88f468d76a43937c8bc24.yaml new file mode 100644 index 0000000000..363ffab72c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-debugging-7f4824acb6f88f468d76a43937c8bc24.yaml @@ -0,0 +1,58 @@ +id: wp-debugging-7f4824acb6f88f468d76a43937c8bc24 + +info: + name: > + WP Debugging <= 2.10.2 - Unauthenticated Plugin Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c6aef41-e4f9-4494-a5fd-47f55973d1d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-debugging/" + google-query: inurl:"/wp-content/plugins/wp-debugging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-debugging,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-debugging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-debugging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-default-feature-image-498a64542dbb51a5eba70d23bf7af5b7.yaml b/nuclei-templates/cve-less/plugins/wp-default-feature-image-498a64542dbb51a5eba70d23bf7af5b7.yaml new file mode 100644 index 0000000000..458274e39e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-default-feature-image-498a64542dbb51a5eba70d23bf7af5b7.yaml @@ -0,0 +1,58 @@ +id: wp-default-feature-image-498a64542dbb51a5eba70d23bf7af5b7 + +info: + name: > + WP Default Feature Image <= 1.0.1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/380024dc-ed2a-4a7b-b5f8-47879ad2d659?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-default-feature-image/" + google-query: inurl:"/wp-content/plugins/wp-default-feature-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-default-feature-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-default-feature-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-default-feature-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-design-maps-places-9a9c52cdec433248e8d2c508fc3c6161.yaml b/nuclei-templates/cve-less/plugins/wp-design-maps-places-9a9c52cdec433248e8d2c508fc3c6161.yaml new file mode 100644 index 0000000000..b39123e6bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-design-maps-places-9a9c52cdec433248e8d2c508fc3c6161.yaml @@ -0,0 +1,58 @@ +id: wp-design-maps-places-9a9c52cdec433248e8d2c508fc3c6161 + +info: + name: > + WP Design Maps & Places <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd2c0c2-49b5-4745-9e52-d0ae6b997640?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-design-maps-places/" + google-query: inurl:"/wp-content/plugins/wp-design-maps-places/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-design-maps-places,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-design-maps-places/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-design-maps-places" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dev-powers-acf-color-coded-field-types-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-dev-powers-acf-color-coded-field-types-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9949d638fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dev-powers-acf-color-coded-field-types-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-dev-powers-acf-color-coded-field-types-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dev-powers-acf-color-coded-field-types/" + google-query: inurl:"/wp-content/plugins/wp-dev-powers-acf-color-coded-field-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dev-powers-acf-color-coded-field-types,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dev-powers-acf-color-coded-field-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dev-powers-acf-color-coded-field-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dev-powers-display-screen-dimensions-to-admin-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-dev-powers-display-screen-dimensions-to-admin-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..866961b2a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dev-powers-display-screen-dimensions-to-admin-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-dev-powers-display-screen-dimensions-to-admin-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dev-powers-display-screen-dimensions-to-admin/" + google-query: inurl:"/wp-content/plugins/wp-dev-powers-display-screen-dimensions-to-admin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dev-powers-display-screen-dimensions-to-admin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dev-powers-display-screen-dimensions-to-admin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dev-powers-display-screen-dimensions-to-admin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dev-powers-element-selector-jquery-powers-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-dev-powers-element-selector-jquery-powers-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ef56fdd5d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dev-powers-element-selector-jquery-powers-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-dev-powers-element-selector-jquery-powers-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dev-powers-element-selector-jquery-powers/" + google-query: inurl:"/wp-content/plugins/wp-dev-powers-element-selector-jquery-powers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dev-powers-element-selector-jquery-powers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dev-powers-element-selector-jquery-powers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dev-powers-element-selector-jquery-powers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dialog-0b351fbbceddd3af3b8762c10e45e612.yaml b/nuclei-templates/cve-less/plugins/wp-dialog-0b351fbbceddd3af3b8762c10e45e612.yaml new file mode 100644 index 0000000000..ff9c3569c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dialog-0b351fbbceddd3af3b8762c10e45e612.yaml @@ -0,0 +1,58 @@ +id: wp-dialog-0b351fbbceddd3af3b8762c10e45e612 + +info: + name: > + WP Dialog <= 1.2.5.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03d02297-0cc6-4935-b282-9b95d8292954?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dialog/" + google-query: inurl:"/wp-content/plugins/wp-dialog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dialog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dialog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dialog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-disable-sitemap-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-disable-sitemap-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..114462e40e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-disable-sitemap-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-disable-sitemap-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-disable-sitemap/" + google-query: inurl:"/wp-content/plugins/wp-disable-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-disable-sitemap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-disable-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-disable-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-discord-invite-9f99c3916170112c6519a28e2f1378e6.yaml b/nuclei-templates/cve-less/plugins/wp-discord-invite-9f99c3916170112c6519a28e2f1378e6.yaml new file mode 100644 index 0000000000..c7e2f4ebf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-discord-invite-9f99c3916170112c6519a28e2f1378e6.yaml @@ -0,0 +1,58 @@ +id: wp-discord-invite-9f99c3916170112c6519a28e2f1378e6 + +info: + name: > + WP Discord Invite <= 2.5.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc4048a9-b69c-4f4c-8a30-e57bb057b00c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-discord-invite/" + google-query: inurl:"/wp-content/plugins/wp-discord-invite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-discord-invite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-discord-invite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-discord-invite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-discord-invite-d4039daa19b11d4d7dd3d98ae4448907.yaml b/nuclei-templates/cve-less/plugins/wp-discord-invite-d4039daa19b11d4d7dd3d98ae4448907.yaml new file mode 100644 index 0000000000..bcde66fd94 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-discord-invite-d4039daa19b11d4d7dd3d98ae4448907.yaml @@ -0,0 +1,58 @@ +id: wp-discord-invite-d4039daa19b11d4d7dd3d98ae4448907 + +info: + name: > + WP Discord Invite < 2.5.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d92bfa61-7ae2-427a-8f3a-82709471735b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-discord-invite/" + google-query: inurl:"/wp-content/plugins/wp-discord-invite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-discord-invite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-discord-invite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-discord-invite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-discord-invite-fef6aa22cfe22d9b149697c3717922bc.yaml b/nuclei-templates/cve-less/plugins/wp-discord-invite-fef6aa22cfe22d9b149697c3717922bc.yaml new file mode 100644 index 0000000000..1b5d9a3985 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-discord-invite-fef6aa22cfe22d9b149697c3717922bc.yaml @@ -0,0 +1,58 @@ +id: wp-discord-invite-fef6aa22cfe22d9b149697c3717922bc + +info: + name: > + WP Discord Invite <= 2.4.1 - Reflected Cross-Site Scripting via webhook + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a961d30e-f2cb-458d-8f1a-18f6e769efbc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-discord-invite/" + google-query: inurl:"/wp-content/plugins/wp-discord-invite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-discord-invite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-discord-invite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-discord-invite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-discussion-board-78755e457e479cae23d5dca42eeac5db.yaml b/nuclei-templates/cve-less/plugins/wp-discussion-board-78755e457e479cae23d5dca42eeac5db.yaml new file mode 100644 index 0000000000..fe7f2ca33a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-discussion-board-78755e457e479cae23d5dca42eeac5db.yaml @@ -0,0 +1,58 @@ +id: wp-discussion-board-78755e457e479cae23d5dca42eeac5db + +info: + name: > + Discussion Board <= 2.4.8 - Authenticated (Subscriber+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e9d7776-aa96-47c8-9e31-5484ab65bc66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-discussion-board/" + google-query: inurl:"/wp-content/plugins/wp-discussion-board/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-discussion-board,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-discussion-board/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-discussion-board" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-display-users-426286a65b9c6cb22be8026fc66ac3eb.yaml b/nuclei-templates/cve-less/plugins/wp-display-users-426286a65b9c6cb22be8026fc66ac3eb.yaml new file mode 100644 index 0000000000..e3f5603b0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-display-users-426286a65b9c6cb22be8026fc66ac3eb.yaml @@ -0,0 +1,58 @@ +id: wp-display-users-426286a65b9c6cb22be8026fc66ac3eb + +info: + name: > + Display Users <= 2.0.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/660058f0-ccd9-4bb9-9e11-f1e1d1100ef2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-display-users/" + google-query: inurl:"/wp-content/plugins/wp-display-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-display-users,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-display-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-display-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-docs-35dda5414154f53d96b973b68d2be63d.yaml b/nuclei-templates/cve-less/plugins/wp-docs-35dda5414154f53d96b973b68d2be63d.yaml new file mode 100644 index 0000000000..7b848e49dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-docs-35dda5414154f53d96b973b68d2be63d.yaml @@ -0,0 +1,58 @@ +id: wp-docs-35dda5414154f53d96b973b68d2be63d + +info: + name: > + WP Docs <= 1.9.8 - Cross-Site Request Forgery to folder management + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6003b1bf-b176-4ca9-9de2-58133259e0f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-docs/" + google-query: inurl:"/wp-content/plugins/wp-docs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-docs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-docs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-docs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-docs-8438c9473d07feba9507b08f7b2ca394.yaml b/nuclei-templates/cve-less/plugins/wp-docs-8438c9473d07feba9507b08f7b2ca394.yaml new file mode 100644 index 0000000000..7d60aa44eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-docs-8438c9473d07feba9507b08f7b2ca394.yaml @@ -0,0 +1,58 @@ +id: wp-docs-8438c9473d07feba9507b08f7b2ca394 + +info: + name: > + WP Docs <= 1.9.8 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45a870f4-7ad1-447b-81ea-5d9e9b67b1bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-docs/" + google-query: inurl:"/wp-content/plugins/wp-docs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-docs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-docs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-docs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-docs-de718f2bd31fc4ccd0bdde8aa56c6557.yaml b/nuclei-templates/cve-less/plugins/wp-docs-de718f2bd31fc4ccd0bdde8aa56c6557.yaml new file mode 100644 index 0000000000..8f28c4e6ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-docs-de718f2bd31fc4ccd0bdde8aa56c6557.yaml @@ -0,0 +1,58 @@ +id: wp-docs-de718f2bd31fc4ccd0bdde8aa56c6557 + +info: + name: > + WP Docs <= 1.9.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ac15c0d-74d3-4121-a63e-97dbbe594274?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-docs/" + google-query: inurl:"/wp-content/plugins/wp-docs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-docs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-docs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-docs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-domain-redirect-4e4e50f7a420b0e140281c805ef6a928.yaml b/nuclei-templates/cve-less/plugins/wp-domain-redirect-4e4e50f7a420b0e140281c805ef6a928.yaml new file mode 100644 index 0000000000..4b931065bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-domain-redirect-4e4e50f7a420b0e140281c805ef6a928.yaml @@ -0,0 +1,58 @@ +id: wp-domain-redirect-4e4e50f7a420b0e140281c805ef6a928 + +info: + name: > + WP Domain Redirect <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/188b6da2-1d4f-44af-82e1-a642170bcb36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-domain-redirect/" + google-query: inurl:"/wp-content/plugins/wp-domain-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-domain-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-domain-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-domain-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-donate-9f7bf70b345ad8176b09c272029728d7.yaml b/nuclei-templates/cve-less/plugins/wp-donate-9f7bf70b345ad8176b09c272029728d7.yaml new file mode 100644 index 0000000000..89b3bb5586 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-donate-9f7bf70b345ad8176b09c272029728d7.yaml @@ -0,0 +1,58 @@ +id: wp-donate-9f7bf70b345ad8176b09c272029728d7 + +info: + name: > + WP Donate <= 1.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ef36265-bf71-4b6a-ae76-9318d6896aac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-donate/" + google-query: inurl:"/wp-content/plugins/wp-donate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-donate,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-donate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-donate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-donottrack-6d5c3a6b6510902181c0fc950daad824.yaml b/nuclei-templates/cve-less/plugins/wp-donottrack-6d5c3a6b6510902181c0fc950daad824.yaml new file mode 100644 index 0000000000..352d12039a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-donottrack-6d5c3a6b6510902181c0fc950daad824.yaml @@ -0,0 +1,58 @@ +id: wp-donottrack-6d5c3a6b6510902181c0fc950daad824 + +info: + name: > + WP DoNotTrack <= 0.8.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd4a1fd2-8831-482d-8ae3-fb78c2657b86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-donottrack/" + google-query: inurl:"/wp-content/plugins/wp-donottrack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-donottrack,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-donottrack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-donottrack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-downgrade-c8a533331a66588a41e484e2593bc634.yaml b/nuclei-templates/cve-less/plugins/wp-downgrade-c8a533331a66588a41e484e2593bc634.yaml new file mode 100644 index 0000000000..83f8f631a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-downgrade-c8a533331a66588a41e484e2593bc634.yaml @@ -0,0 +1,58 @@ +id: wp-downgrade-c8a533331a66588a41e484e2593bc634 + +info: + name: > + WP Downgrade <= 1.2.2 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d1f9fb7-fcb8-41ec-8c2f-0864e245f873?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-downgrade/" + google-query: inurl:"/wp-content/plugins/wp-downgrade/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-downgrade,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-downgrade/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-downgrade" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-download-38075b2ddd2270a10fc2d087e129aea8.yaml b/nuclei-templates/cve-less/plugins/wp-download-38075b2ddd2270a10fc2d087e129aea8.yaml new file mode 100644 index 0000000000..2bc90235ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-download-38075b2ddd2270a10fc2d087e129aea8.yaml @@ -0,0 +1,58 @@ +id: wp-download-38075b2ddd2270a10fc2d087e129aea8 + +info: + name: > + WP-Download <= 1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb8232cd-4fd5-4e0f-90d0-91e5eb7e70c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-download/" + google-query: inurl:"/wp-content/plugins/wp-download/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-download,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-download/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-download" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-download-manager-f8b195ad87a5a50c5754f7800933e00c.yaml b/nuclei-templates/cve-less/plugins/wp-download-manager-f8b195ad87a5a50c5754f7800933e00c.yaml new file mode 100644 index 0000000000..c0774cefc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-download-manager-f8b195ad87a5a50c5754f7800933e00c.yaml @@ -0,0 +1,58 @@ +id: wp-download-manager-f8b195ad87a5a50c5754f7800933e00c + +info: + name: > + WP-DownloadManager Plugin < 1.61 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/822f5b92-8c58-4132-80a7-d15e1215c934?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-download-manager/" + google-query: inurl:"/wp-content/plugins/wp-download-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-download-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-download-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-download-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-downloadmanager-2a2c96d8b7e05bdda2ce23679852b0ec.yaml b/nuclei-templates/cve-less/plugins/wp-downloadmanager-2a2c96d8b7e05bdda2ce23679852b0ec.yaml new file mode 100644 index 0000000000..a224ca471b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-downloadmanager-2a2c96d8b7e05bdda2ce23679852b0ec.yaml @@ -0,0 +1,58 @@ +id: wp-downloadmanager-2a2c96d8b7e05bdda2ce23679852b0ec + +info: + name: > + WP-DownloadManager <= 1.68.4 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfe48948-7fc9-4806-b1b5-9fac5a6c7d96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-downloadmanager/" + google-query: inurl:"/wp-content/plugins/wp-downloadmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-downloadmanager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-downloadmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-downloadmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.68.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-downloadmanager-46ca57fda9611a4d8d3fe3eb2317d1ac.yaml b/nuclei-templates/cve-less/plugins/wp-downloadmanager-46ca57fda9611a4d8d3fe3eb2317d1ac.yaml new file mode 100644 index 0000000000..a80054ebfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-downloadmanager-46ca57fda9611a4d8d3fe3eb2317d1ac.yaml @@ -0,0 +1,58 @@ +id: wp-downloadmanager-46ca57fda9611a4d8d3fe3eb2317d1ac + +info: + name: > + WP-DownloadManager <= 1.68.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f15d39ba-9211-4d35-8252-20d53c6bc249?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-downloadmanager/" + google-query: inurl:"/wp-content/plugins/wp-downloadmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-downloadmanager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-downloadmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-downloadmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.68.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-downloadmanager-504f4fd7f6488b8460fa7b0e025293ef.yaml b/nuclei-templates/cve-less/plugins/wp-downloadmanager-504f4fd7f6488b8460fa7b0e025293ef.yaml new file mode 100644 index 0000000000..2c9e26e05a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-downloadmanager-504f4fd7f6488b8460fa7b0e025293ef.yaml @@ -0,0 +1,58 @@ +id: wp-downloadmanager-504f4fd7f6488b8460fa7b0e025293ef + +info: + name: > + WP-DownloadManager plugin <= 1.68.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a27da737-d925-471f-b0e0-25bc27a95714?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-downloadmanager/" + google-query: inurl:"/wp-content/plugins/wp-downloadmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-downloadmanager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-downloadmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-downloadmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.68.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-downloadmanager-fde55a7ed22dac34f683215367ee2443.yaml b/nuclei-templates/cve-less/plugins/wp-downloadmanager-fde55a7ed22dac34f683215367ee2443.yaml new file mode 100644 index 0000000000..dee72dac7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-downloadmanager-fde55a7ed22dac34f683215367ee2443.yaml @@ -0,0 +1,58 @@ +id: wp-downloadmanager-fde55a7ed22dac34f683215367ee2443 + +info: + name: > + WP-DownloadManager plugin <= 1.68.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bede3241-6383-4bdb-ac28-cd9781b608d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-downloadmanager/" + google-query: inurl:"/wp-content/plugins/wp-downloadmanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-downloadmanager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-downloadmanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-downloadmanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.68.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dreamworkgallery-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/wp-dreamworkgallery-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..199a739e81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dreamworkgallery-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: wp-dreamworkgallery-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dreamworkgallery/" + google-query: inurl:"/wp-content/plugins/wp-dreamworkgallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dreamworkgallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dreamworkgallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dreamworkgallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ds-blog-map-7fd62997a96edc06785da25d5644aff0.yaml b/nuclei-templates/cve-less/plugins/wp-ds-blog-map-7fd62997a96edc06785da25d5644aff0.yaml new file mode 100644 index 0000000000..befef687fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ds-blog-map-7fd62997a96edc06785da25d5644aff0.yaml @@ -0,0 +1,58 @@ +id: wp-ds-blog-map-7fd62997a96edc06785da25d5644aff0 + +info: + name: > + WP DS Blog Map <= 3.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89384b42-8c66-469d-a7d2-1c50c89cfe7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ds-blog-map/" + google-query: inurl:"/wp-content/plugins/wp-ds-blog-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ds-blog-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ds-blog-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ds-blog-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ds-faq-plus-56b48bd0a46510cdd09a4ee245e5ae52.yaml b/nuclei-templates/cve-less/plugins/wp-ds-faq-plus-56b48bd0a46510cdd09a4ee245e5ae52.yaml new file mode 100644 index 0000000000..9aafa8c592 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ds-faq-plus-56b48bd0a46510cdd09a4ee245e5ae52.yaml @@ -0,0 +1,58 @@ +id: wp-ds-faq-plus-56b48bd0a46510cdd09a4ee245e5ae52 + +info: + name: > + WP DS FAQ Plus < 1.4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d097d918-04dc-4291-bb82-3f5cc8eea158?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ds-faq-plus/" + google-query: inurl:"/wp-content/plugins/wp-ds-faq-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ds-faq-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ds-faq-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ds-faq-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dtree-30-1f13b5881c3d355245302cf4439befbf.yaml b/nuclei-templates/cve-less/plugins/wp-dtree-30-1f13b5881c3d355245302cf4439befbf.yaml new file mode 100644 index 0000000000..c79c6a456d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dtree-30-1f13b5881c3d355245302cf4439befbf.yaml @@ -0,0 +1,58 @@ +id: wp-dtree-30-1f13b5881c3d355245302cf4439befbf + +info: + name: > + WP-dTree <= 4.4.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61808624-b2c7-4e86-b5a1-56f32fca9eaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dtree-30/" + google-query: inurl:"/wp-content/plugins/wp-dtree-30/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dtree-30,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dtree-30/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dtree-30" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dtree-30-21fdda375898746027e6f9dda342b8cd.yaml b/nuclei-templates/cve-less/plugins/wp-dtree-30-21fdda375898746027e6f9dda342b8cd.yaml new file mode 100644 index 0000000000..f32611b722 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dtree-30-21fdda375898746027e6f9dda342b8cd.yaml @@ -0,0 +1,58 @@ +id: wp-dtree-30-21fdda375898746027e6f9dda342b8cd + +info: + name: > + WP-dTree <= 4.4.5 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cde92185-d63a-47b3-a17e-3f2b2b20270c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dtree-30/" + google-query: inurl:"/wp-content/plugins/wp-dtree-30/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dtree-30,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dtree-30/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dtree-30" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dtree-30-5a34f6e49c7ef01f010ae75476cc8b14.yaml b/nuclei-templates/cve-less/plugins/wp-dtree-30-5a34f6e49c7ef01f010ae75476cc8b14.yaml new file mode 100644 index 0000000000..f77775f7ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dtree-30-5a34f6e49c7ef01f010ae75476cc8b14.yaml @@ -0,0 +1,58 @@ +id: wp-dtree-30-5a34f6e49c7ef01f010ae75476cc8b14 + +info: + name: > + WP-dTree <= 4.4.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c01da54-fbbe-42f9-a76e-8e823027d62a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dtree-30/" + google-query: inurl:"/wp-content/plugins/wp-dtree-30/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dtree-30,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dtree-30/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dtree-30" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-422c4f76899e03c0666b1907832b3ab3.yaml b/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-422c4f76899e03c0666b1907832b3ab3.yaml new file mode 100644 index 0000000000..a8bf759b64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-422c4f76899e03c0666b1907832b3ab3.yaml @@ -0,0 +1,58 @@ +id: wp-dummy-content-generator-422c4f76899e03c0666b1907832b3ab3 + +info: + name: > + WP Dummy Content Generator <= 2.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4dad030-41e4-4d67-8650-8d268c44d352?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dummy-content-generator/" + google-query: inurl:"/wp-content/plugins/wp-dummy-content-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dummy-content-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dummy-content-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dummy-content-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-4b8f53dac7b962db019d821a894cbb82.yaml b/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-4b8f53dac7b962db019d821a894cbb82.yaml new file mode 100644 index 0000000000..7725b75dcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-4b8f53dac7b962db019d821a894cbb82.yaml @@ -0,0 +1,58 @@ +id: wp-dummy-content-generator-4b8f53dac7b962db019d821a894cbb82 + +info: + name: > + WP Dummy Content Generator <= 3.2.1 - Unauthenticated Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2bda5d0-9589-4925-baa6-6e207e6fc978?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dummy-content-generator/" + google-query: inurl:"/wp-content/plugins/wp-dummy-content-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dummy-content-generator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dummy-content-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dummy-content-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-65d839a96475e08e7231c85cc5b59ef7.yaml b/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-65d839a96475e08e7231c85cc5b59ef7.yaml new file mode 100644 index 0000000000..e5d2e07ae9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-65d839a96475e08e7231c85cc5b59ef7.yaml @@ -0,0 +1,58 @@ +id: wp-dummy-content-generator-65d839a96475e08e7231c85cc5b59ef7 + +info: + name: > + WP Dummy Content Generator <= 3.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b44d23c-4872-491f-8a91-b0feb888ac54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dummy-content-generator/" + google-query: inurl:"/wp-content/plugins/wp-dummy-content-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dummy-content-generator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dummy-content-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dummy-content-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-e41b83efa869789b0f40a748caa1121d.yaml b/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-e41b83efa869789b0f40a748caa1121d.yaml new file mode 100644 index 0000000000..38c8b90a5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dummy-content-generator-e41b83efa869789b0f40a748caa1121d.yaml @@ -0,0 +1,58 @@ +id: wp-dummy-content-generator-e41b83efa869789b0f40a748caa1121d + +info: + name: > + WP Dummy Content Generator <= 2.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0576737d-8330-4a80-af70-4f0eab6657ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dummy-content-generator/" + google-query: inurl:"/wp-content/plugins/wp-dummy-content-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dummy-content-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dummy-content-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dummy-content-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-duplicate-page-783792bc349c3286b30c741d65b88b21.yaml b/nuclei-templates/cve-less/plugins/wp-duplicate-page-783792bc349c3286b30c741d65b88b21.yaml new file mode 100644 index 0000000000..3029f9a7a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-duplicate-page-783792bc349c3286b30c741d65b88b21.yaml @@ -0,0 +1,58 @@ +id: wp-duplicate-page-783792bc349c3286b30c741d65b88b21 + +info: + name: > + WP Duplicate Page <= 1.2 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52944aa6-a6ee-46ce-bd0c-18c69fe1ada7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-duplicate-page/" + google-query: inurl:"/wp-content/plugins/wp-duplicate-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-duplicate-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-duplicate-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-duplicate-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dynamic-keywords-injector-9cb0eb94b28c3edb80588351824c0d35.yaml b/nuclei-templates/cve-less/plugins/wp-dynamic-keywords-injector-9cb0eb94b28c3edb80588351824c0d35.yaml new file mode 100644 index 0000000000..d5012f3513 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dynamic-keywords-injector-9cb0eb94b28c3edb80588351824c0d35.yaml @@ -0,0 +1,58 @@ +id: wp-dynamic-keywords-injector-9cb0eb94b28c3edb80588351824c0d35 + +info: + name: > + WP Dynamic Keywords Injector <= 2.3.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5b00784-9120-403d-9788-3cd3c3c020aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dynamic-keywords-injector/" + google-query: inurl:"/wp-content/plugins/wp-dynamic-keywords-injector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dynamic-keywords-injector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dynamic-keywords-injector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dynamic-keywords-injector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-dynamic-keywords-injector-a13ac145586953796d79d44892866da5.yaml b/nuclei-templates/cve-less/plugins/wp-dynamic-keywords-injector-a13ac145586953796d79d44892866da5.yaml new file mode 100644 index 0000000000..4e58a6a509 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-dynamic-keywords-injector-a13ac145586953796d79d44892866da5.yaml @@ -0,0 +1,58 @@ +id: wp-dynamic-keywords-injector-a13ac145586953796d79d44892866da5 + +info: + name: > + WP Dynamic Keywords Injector <= 2.3.21 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/992f9f08-82c1-4bbd-bbd2-543ad8affe53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-dynamic-keywords-injector/" + google-query: inurl:"/wp-content/plugins/wp-dynamic-keywords-injector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-dynamic-keywords-injector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-dynamic-keywords-injector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-dynamic-keywords-injector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-18d6c29d9809d383ee48c11e640d6bfc.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-18d6c29d9809d383ee48c11e640d6bfc.yaml new file mode 100644 index 0000000000..90b60e8bdb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-18d6c29d9809d383ee48c11e640d6bfc.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-18d6c29d9809d383ee48c11e640d6bfc + +info: + name: > + WP eCommerce <= 3.15.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ba5da2b-6944-4243-a4f2-0f887abf7a66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.15.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-289d7937d831ca65d987bd5d70a6be46.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-289d7937d831ca65d987bd5d70a6be46.yaml new file mode 100644 index 0000000000..eeea18039b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-289d7937d831ca65d987bd5d70a6be46.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-289d7937d831ca65d987bd5d70a6be46 + +info: + name: > + WP eCommerce <= 3.8.14.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e92f35dc-7e19-464a-bb8a-40a662e2270a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-47355e6b7ab75ca2f167e153c73e9cb8.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-47355e6b7ab75ca2f167e153c73e9cb8.yaml new file mode 100644 index 0000000000..a6d3cf81a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-47355e6b7ab75ca2f167e153c73e9cb8.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-47355e6b7ab75ca2f167e153c73e9cb8 + +info: + name: > + WP eCommerce <= 3.8.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0753e172-3ff7-42a9-8651-d12573406d11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-5f327ec92a2ed47a19cfa74c78839e26.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-5f327ec92a2ed47a19cfa74c78839e26.yaml new file mode 100644 index 0000000000..058792b331 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-5f327ec92a2ed47a19cfa74c78839e26.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-5f327ec92a2ed47a19cfa74c78839e26 + +info: + name: > + WP eCommerce < 3.8.7.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d1302c4-7aeb-49f4-aa11-2c0e08bd9c71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-79dc45699a7994a2167adb230c8ff41d.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-79dc45699a7994a2167adb230c8ff41d.yaml new file mode 100644 index 0000000000..295eaef0e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-79dc45699a7994a2167adb230c8ff41d.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-79dc45699a7994a2167adb230c8ff41d + +info: + name: > + WP eCommerce <= 3.9.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed0860db-0e1f-4929-90d5-ff2766ba71ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-985a4d5103b9ddb67f837c1ceb401728.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-985a4d5103b9ddb67f837c1ceb401728.yaml new file mode 100644 index 0000000000..8500f156e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-985a4d5103b9ddb67f837c1ceb401728.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-985a4d5103b9ddb67f837c1ceb401728 + +info: + name: > + WP eCommerce < 3.8.7.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4aa89fab-b6fe-423a-a7f5-dbe6c92d1b56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-bf5cbdf8020a636cc9f21e15a59d9023.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-bf5cbdf8020a636cc9f21e15a59d9023.yaml new file mode 100644 index 0000000000..6fd78f178e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-bf5cbdf8020a636cc9f21e15a59d9023.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-bf5cbdf8020a636cc9f21e15a59d9023 + +info: + name: > + WP eCommerce <= 3.15.1 - Missing Authorization to Unauthenticated Arbitrary Post Creation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0a9f3d2-aa7f-4fc2-9cfd-b69ec3f63160?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.15.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-cb27559ef010c67b27e71c1d47ff78e4.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-cb27559ef010c67b27e71c1d47ff78e4.yaml new file mode 100644 index 0000000000..2f70f8b5b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-cb27559ef010c67b27e71c1d47ff78e4.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-cb27559ef010c67b27e71c1d47ff78e4 + +info: + name: > + WP eCommerce <= 3.8.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c42a966-0035-4c12-8aa1-226a0157d98f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-exporter-b87c02ac90f7b6f2632497368ebe2ad8.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-exporter-b87c02ac90f7b6f2632497368ebe2ad8.yaml new file mode 100644 index 0000000000..17ca286a3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-exporter-b87c02ac90f7b6f2632497368ebe2ad8.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-exporter-b87c02ac90f7b6f2632497368ebe2ad8 + +info: + name: > + WP e-Commerce – Store Exporter <= 1.6.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/668ba3a9-d53c-45ab-854f-1a9e83dd54b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce-exporter/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce-exporter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-e-commerce-f774eebe4f23829fc94b7eafdba5ce4e.yaml b/nuclei-templates/cve-less/plugins/wp-e-commerce-f774eebe4f23829fc94b7eafdba5ce4e.yaml new file mode 100644 index 0000000000..6efcb7bfd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-e-commerce-f774eebe4f23829fc94b7eafdba5ce4e.yaml @@ -0,0 +1,58 @@ +id: wp-e-commerce-f774eebe4f23829fc94b7eafdba5ce4e + +info: + name: > + WP eCommerce < 3.11.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c43939f-c0c7-4388-80ae-44bdf67675c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-e-commerce/" + google-query: inurl:"/wp-content/plugins/wp-e-commerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-e-commerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-e-commerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-e-commerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-contact-1a94885b829a17aaf2fa1ae77773a27a.yaml b/nuclei-templates/cve-less/plugins/wp-easy-contact-1a94885b829a17aaf2fa1ae77773a27a.yaml new file mode 100644 index 0000000000..fa79927e2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-contact-1a94885b829a17aaf2fa1ae77773a27a.yaml @@ -0,0 +1,58 @@ +id: wp-easy-contact-1a94885b829a17aaf2fa1ae77773a27a + +info: + name: > + Best Contact Management Software <= 3.7.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80ba732f-b3cc-4b42-8c56-9fa1cee08c7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-contact/" + google-query: inurl:"/wp-content/plugins/wp-easy-contact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-contact,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-contact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-contact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-events-3c60189d6f13a72d771cf945af5deabf.yaml b/nuclei-templates/cve-less/plugins/wp-easy-events-3c60189d6f13a72d771cf945af5deabf.yaml new file mode 100644 index 0000000000..60f6b679d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-events-3c60189d6f13a72d771cf945af5deabf.yaml @@ -0,0 +1,58 @@ +id: wp-easy-events-3c60189d6f13a72d771cf945af5deabf + +info: + name: > + Event Management, Events Calendar, RSVP Event Tickets Plugin <= 3.8.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cae1e209-96f3-49ed-a233-768db8e36c5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-events/" + google-query: inurl:"/wp-content/plugins/wp-easy-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-events,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-gallery-0a9f08b24926b461870620f84309d060.yaml b/nuclei-templates/cve-less/plugins/wp-easy-gallery-0a9f08b24926b461870620f84309d060.yaml new file mode 100644 index 0000000000..b48d577b8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-gallery-0a9f08b24926b461870620f84309d060.yaml @@ -0,0 +1,58 @@ +id: wp-easy-gallery-0a9f08b24926b461870620f84309d060 + +info: + name: > + WP Easy Gallery <= 1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22602d63-235a-4bdb-b907-e61be04e96c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-gallery/" + google-query: inurl:"/wp-content/plugins/wp-easy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-gallery-4b99edd00f6941b4dd18ce780651f43a.yaml b/nuclei-templates/cve-less/plugins/wp-easy-gallery-4b99edd00f6941b4dd18ce780651f43a.yaml new file mode 100644 index 0000000000..e911ea521d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-gallery-4b99edd00f6941b4dd18ce780651f43a.yaml @@ -0,0 +1,58 @@ +id: wp-easy-gallery-4b99edd00f6941b4dd18ce780651f43a + +info: + name: > + WP Easy Gallery <= 2.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73e4b097-a33b-47c4-8899-f14e2858a1d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-gallery/" + google-query: inurl:"/wp-content/plugins/wp-easy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-gallery-53e584ae34c9d1aad8bceb6896eca3e1.yaml b/nuclei-templates/cve-less/plugins/wp-easy-gallery-53e584ae34c9d1aad8bceb6896eca3e1.yaml new file mode 100644 index 0000000000..0128f0152d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-gallery-53e584ae34c9d1aad8bceb6896eca3e1.yaml @@ -0,0 +1,58 @@ +id: wp-easy-gallery-53e584ae34c9d1aad8bceb6896eca3e1 + +info: + name: > + WP Easy Gallery <= 4.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/436d77d9-242a-452b-93d4-707881f59034?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-gallery/" + google-query: inurl:"/wp-content/plugins/wp-easy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-gallery-609b7c2d6b7906e24d1cf69e810126a4.yaml b/nuclei-templates/cve-less/plugins/wp-easy-gallery-609b7c2d6b7906e24d1cf69e810126a4.yaml new file mode 100644 index 0000000000..efe2a192af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-gallery-609b7c2d6b7906e24d1cf69e810126a4.yaml @@ -0,0 +1,58 @@ +id: wp-easy-gallery-609b7c2d6b7906e24d1cf69e810126a4 + +info: + name: > + WP Easy Gallery <= 2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/327f645b-4990-4b5e-b39c-6c55ac4e66f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-gallery/" + google-query: inurl:"/wp-content/plugins/wp-easy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/wp-easy-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..fe801e1535 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: wp-easy-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-gallery/" + google-query: inurl:"/wp-content/plugins/wp-easy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-gallery-f0840392ae02502b377a0491bc44f08d.yaml b/nuclei-templates/cve-less/plugins/wp-easy-gallery-f0840392ae02502b377a0491bc44f08d.yaml new file mode 100644 index 0000000000..dedad7e940 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-gallery-f0840392ae02502b377a0491bc44f08d.yaml @@ -0,0 +1,58 @@ +id: wp-easy-gallery-f0840392ae02502b377a0491bc44f08d + +info: + name: > + WP Easy Gallery <= 2.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e223e0e-959f-498e-8c0e-daae36bd28cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-gallery/" + google-query: inurl:"/wp-content/plugins/wp-easy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-gallery-fe0e146c52658b7a7e60347935b3c568.yaml b/nuclei-templates/cve-less/plugins/wp-easy-gallery-fe0e146c52658b7a7e60347935b3c568.yaml new file mode 100644 index 0000000000..47f0420d33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-gallery-fe0e146c52658b7a7e60347935b3c568.yaml @@ -0,0 +1,58 @@ +id: wp-easy-gallery-fe0e146c52658b7a7e60347935b3c568 + +info: + name: > + WP Easy Gallery <= 2.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35e2f081-41ca-4465-933a-db5c30b058da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-gallery/" + google-query: inurl:"/wp-content/plugins/wp-easy-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-gallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-pay-7019ae891ef15e3836bd8cf0d5c1f6e9.yaml b/nuclei-templates/cve-less/plugins/wp-easy-pay-7019ae891ef15e3836bd8cf0d5c1f6e9.yaml new file mode 100644 index 0000000000..c2543abc7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-pay-7019ae891ef15e3836bd8cf0d5c1f6e9.yaml @@ -0,0 +1,58 @@ +id: wp-easy-pay-7019ae891ef15e3836bd8cf0d5c1f6e9 + +info: + name: > + WP EasyPay <= 4.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8786f44-09b9-4281-b615-5df4b494a083?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-pay/" + google-query: inurl:"/wp-content/plugins/wp-easy-pay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-pay,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-pay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-pay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-pay-978317c4070e7121d6a698893d413687.yaml b/nuclei-templates/cve-less/plugins/wp-easy-pay-978317c4070e7121d6a698893d413687.yaml new file mode 100644 index 0000000000..7b6c444539 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-pay-978317c4070e7121d6a698893d413687.yaml @@ -0,0 +1,58 @@ +id: wp-easy-pay-978317c4070e7121d6a698893d413687 + +info: + name: > + WP EasyPay <= 4.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2c1606e-b6b6-4f7d-8473-1015677ded7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-pay/" + google-query: inurl:"/wp-content/plugins/wp-easy-pay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-pay,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-pay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-pay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-pay-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-easy-pay-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..34aaa9e5d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-pay-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-easy-pay-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-pay/" + google-query: inurl:"/wp-content/plugins/wp-easy-pay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-pay,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-pay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-pay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easy-pay-e9841c7d453db007ae94f5b33ac69fd2.yaml b/nuclei-templates/cve-less/plugins/wp-easy-pay-e9841c7d453db007ae94f5b33ac69fd2.yaml new file mode 100644 index 0000000000..e5a35c5eea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easy-pay-e9841c7d453db007ae94f5b33ac69fd2.yaml @@ -0,0 +1,58 @@ +id: wp-easy-pay-e9841c7d453db007ae94f5b33ac69fd2 + +info: + name: > + WP EasyPay – Square for WordPress <= 3.2.0 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1fbb3a6-fcc2-47c5-a086-331e69292add?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easy-pay/" + google-query: inurl:"/wp-content/plugins/wp-easy-pay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easy-pay,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easy-pay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easy-pay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easybooking-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml b/nuclei-templates/cve-less/plugins/wp-easybooking-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml new file mode 100644 index 0000000000..244cce4681 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easybooking-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml @@ -0,0 +1,58 @@ +id: wp-easybooking-e5c5d5728e5c08ed8fa4fe79d2c3e420 + +info: + name: > + WP Easybooking <= 1.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e23bdcf9-8068-40c5-b27e-4562040068ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easybooking/" + google-query: inurl:"/wp-content/plugins/wp-easybooking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easybooking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easybooking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easybooking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-00935a43a6eeac3216e5733aff1322b8.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-00935a43a6eeac3216e5733aff1322b8.yaml new file mode 100644 index 0000000000..74671a6f46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-00935a43a6eeac3216e5733aff1322b8.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-00935a43a6eeac3216e5733aff1322b8 + +info: + name: > + Shopping Cart & eCommerce Store <= 5.4.2 - Authenticated (Admin+) Local File Inclusion via import_file_url + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/936e753b-b3e9-43c9-8686-c610faa8b20e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-039f1cb39ecb5839b4ea52ff55c41eac.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-039f1cb39ecb5839b4ea52ff55c41eac.yaml new file mode 100644 index 0000000000..7125f08e10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-039f1cb39ecb5839b4ea52ff55c41eac.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-039f1cb39ecb5839b4ea52ff55c41eac + +info: + name: > + Shopping Cart & eCommerce Store < 3.0.16 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ed683bf-be49-43e9-a1ba-9af7c2bf97b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-0cbf88d6c1cf37efa7d39650814fcfdb.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-0cbf88d6c1cf37efa7d39650814fcfdb.yaml new file mode 100644 index 0000000000..ae8cbf6bb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-0cbf88d6c1cf37efa7d39650814fcfdb.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-0cbf88d6c1cf37efa7d39650814fcfdb + +info: + name: > + WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_duplicate_product + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/041830b8-f059-46f5-961b-3ba908d161f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-2b72a770047348328de1929b10696b75.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-2b72a770047348328de1929b10696b75.yaml new file mode 100644 index 0000000000..7c91a15a5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-2b72a770047348328de1929b10696b75.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-2b72a770047348328de1929b10696b75 + +info: + name: > + Shopping Cart & eCommerce Store <= 5.6.3 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/576ca901-45e2-4e6d-9bc4-370bf1f68077?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-2e1c1b8086549c30cda9ee97a6f1462b.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-2e1c1b8086549c30cda9ee97a6f1462b.yaml new file mode 100644 index 0000000000..29a11165d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-2e1c1b8086549c30cda9ee97a6f1462b.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-2e1c1b8086549c30cda9ee97a6f1462b + +info: + name: > + WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_bulk_delete_product + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b36e94e4-b1e8-4803-9377-c4d710b029de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-32c514a1869a13a710a63935ad684892.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-32c514a1869a13a710a63935ad684892.yaml new file mode 100644 index 0000000000..113b4cc4bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-32c514a1869a13a710a63935ad684892.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-32c514a1869a13a710a63935ad684892 + +info: + name: > + Shopping Cart & eCommerce Store <= 5.6.4 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93daab72-1243-4a05-91d3-9254a1aac727?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-333442feab2beac98ba52d2344da3703.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-333442feab2beac98ba52d2344da3703.yaml new file mode 100644 index 0000000000..15efb05fef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-333442feab2beac98ba52d2344da3703.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-333442feab2beac98ba52d2344da3703 + +info: + name: > + WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_delete_product + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcca7ade-8b35-4ba1-a8b4-b1e815b025e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-3c89e27202b3ceefaa020a7f1c33e993.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-3c89e27202b3ceefaa020a7f1c33e993.yaml new file mode 100644 index 0000000000..d18d218f26 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-3c89e27202b3ceefaa020a7f1c33e993.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-3c89e27202b3ceefaa020a7f1c33e993 + +info: + name: > + WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_bulk_activate_product + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02fd8469-cd99-42dc-9a28-c0ea08512bb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-558868c7563df01c1f5dedf319b2c882.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-558868c7563df01c1f5dedf319b2c882.yaml new file mode 100644 index 0000000000..8b377862c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-558868c7563df01c1f5dedf319b2c882.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-558868c7563df01c1f5dedf319b2c882 + +info: + name: > + WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_deactivate_product + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1268604c-08eb-4d86-8e97-9cdaa3e19c1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-5c5967c0bbcbea315d0f076aa78401d0.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-5c5967c0bbcbea315d0f076aa78401d0.yaml new file mode 100644 index 0000000000..4efecd6d1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-5c5967c0bbcbea315d0f076aa78401d0.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-5c5967c0bbcbea315d0f076aa78401d0 + +info: + name: > + WP EasyCart <= 5.4.10 - Authenticated (Administrator+) SQL Injection via 'orderby' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c1ddaf-4bf2-4937-b7bf-a09162db043e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-634f36268feec63bbd65254294b6c4f9.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-634f36268feec63bbd65254294b6c4f9.yaml new file mode 100644 index 0000000000..ba15337608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-634f36268feec63bbd65254294b6c4f9.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-634f36268feec63bbd65254294b6c4f9 + +info: + name: > + Shopping Cart & eCommerce Store <= 5.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ebc1b85-4682-4467-b17c-9a35cc3f0f15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-6a08a7b07ff874974a20d821c1b5579b.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-6a08a7b07ff874974a20d821c1b5579b.yaml new file mode 100644 index 0000000000..f4a5dfe99d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-6a08a7b07ff874974a20d821c1b5579b.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-6a08a7b07ff874974a20d821c1b5579b + +info: + name: > + EasyCart <= 2.0.5 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d76b6355-a1c5-41a0-b3b6-ee13e5490314?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-72e9256e7194c6f152bbcbf59294459d.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-72e9256e7194c6f152bbcbf59294459d.yaml new file mode 100644 index 0000000000..32a4027c4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-72e9256e7194c6f152bbcbf59294459d.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-72e9256e7194c6f152bbcbf59294459d + +info: + name: > + WP EasyCart <= 5.5.19 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f21955b-1fd2-4d92-acfd-07fc1ff194fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-850e9ef75c282ac77bdc710fb921007a.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-850e9ef75c282ac77bdc710fb921007a.yaml new file mode 100644 index 0000000000..52361dbbea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-850e9ef75c282ac77bdc710fb921007a.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-850e9ef75c282ac77bdc710fb921007a + +info: + name: > + WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_bulk_deactivate_product + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a68b8df9-9b50-4617-9308-76a2a9036d7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-8bf5f589d084befe53d71ebadbbe38a9.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-8bf5f589d084befe53d71ebadbbe38a9.yaml new file mode 100644 index 0000000000..1d38e00bdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-8bf5f589d084befe53d71ebadbbe38a9.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-8bf5f589d084befe53d71ebadbbe38a9 + +info: + name: > + Shopping Cart & eCommerce Store <= 5.1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d20ffc7c-0e12-45ec-940f-a42655093021?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-8d0780ef9cdce64a723061f380152be4.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-8d0780ef9cdce64a723061f380152be4.yaml new file mode 100644 index 0000000000..3afe16b49a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-8d0780ef9cdce64a723061f380152be4.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-8d0780ef9cdce64a723061f380152be4 + +info: + name: > + Shopping Cart & eCommerce Store <= 5.2.4 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46258dc2-3e05-4050-baad-3b3ded912bfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-easycart-b86446f22d4643018e6ef2052ed1d120.yaml b/nuclei-templates/cve-less/plugins/wp-easycart-b86446f22d4643018e6ef2052ed1d120.yaml new file mode 100644 index 0000000000..a621b9a452 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-easycart-b86446f22d4643018e6ef2052ed1d120.yaml @@ -0,0 +1,58 @@ +id: wp-easycart-b86446f22d4643018e6ef2052ed1d120 + +info: + name: > + EasyCart 1.1.30 - 3.0.20 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91c147f9-8179-4ce0-8d17-87ea47cf08fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-easycart/" + google-query: inurl:"/wp-content/plugins/wp-easycart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-easycart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-easycart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-easycart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.1.30', '<= 3.0.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ecommerce-cvs-importer-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/wp-ecommerce-cvs-importer-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..b4bfcce6a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ecommerce-cvs-importer-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: wp-ecommerce-cvs-importer-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ecommerce-cvs-importer/" + google-query: inurl:"/wp-content/plugins/wp-ecommerce-cvs-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ecommerce-cvs-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ecommerce-cvs-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ecommerce-cvs-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-51e05e1842b40dddcacbdfa060eb58f3.yaml b/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-51e05e1842b40dddcacbdfa060eb58f3.yaml new file mode 100644 index 0000000000..9716618286 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-51e05e1842b40dddcacbdfa060eb58f3.yaml @@ -0,0 +1,58 @@ +id: wp-ecommerce-paypal-51e05e1842b40dddcacbdfa060eb58f3 + +info: + name: > + Easy PayPal Buy Now Button <= 1.7.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e8ff1f4-1217-4bb5-ba2d-6d2ff847072a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ecommerce-paypal/" + google-query: inurl:"/wp-content/plugins/wp-ecommerce-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ecommerce-paypal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ecommerce-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ecommerce-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-8bdc053cc4675755b000b5fc58ac8d1d.yaml b/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-8bdc053cc4675755b000b5fc58ac8d1d.yaml new file mode 100644 index 0000000000..16cdf95068 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-8bdc053cc4675755b000b5fc58ac8d1d.yaml @@ -0,0 +1,58 @@ +id: wp-ecommerce-paypal-8bdc053cc4675755b000b5fc58ac8d1d + +info: + name: > + Easy PayPal Buy Now Button <= 1.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f6fd0bb-d37b-40b6-b84e-9b21aae891cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ecommerce-paypal/" + google-query: inurl:"/wp-content/plugins/wp-ecommerce-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ecommerce-paypal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ecommerce-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ecommerce-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-a742d112c80df865f27dc03fd5bad80a.yaml b/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-a742d112c80df865f27dc03fd5bad80a.yaml new file mode 100644 index 0000000000..ad38f1bd59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-a742d112c80df865f27dc03fd5bad80a.yaml @@ -0,0 +1,58 @@ +id: wp-ecommerce-paypal-a742d112c80df865f27dc03fd5bad80a + +info: + name: > + Easy PayPal & Stripe Buy Now Button <= 1.8.3 & Contact Form 7 – PayPal & Stripe Add-on <= 2.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5276227-9bd4-4ad8-a6b7-ac7d05e8b056?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ecommerce-paypal/" + google-query: inurl:"/wp-content/plugins/wp-ecommerce-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ecommerce-paypal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ecommerce-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ecommerce-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-f76ae0a1a5395e01d11e666acc5af070.yaml b/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-f76ae0a1a5395e01d11e666acc5af070.yaml new file mode 100644 index 0000000000..d7ced77f13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ecommerce-paypal-f76ae0a1a5395e01d11e666acc5af070.yaml @@ -0,0 +1,58 @@ +id: wp-ecommerce-paypal-f76ae0a1a5395e01d11e666acc5af070 + +info: + name: > + Easy PayPal Buy Now Button <= 1.7.2 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80ae05c4-64de-48df-b302-6110403b79d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ecommerce-paypal/" + google-query: inurl:"/wp-content/plugins/wp-ecommerce-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ecommerce-paypal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ecommerce-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ecommerce-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ecommerce-shop-styling-3b47626efde37c9b368853074eff5ac4.yaml b/nuclei-templates/cve-less/plugins/wp-ecommerce-shop-styling-3b47626efde37c9b368853074eff5ac4.yaml new file mode 100644 index 0000000000..641b7350e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ecommerce-shop-styling-3b47626efde37c9b368853074eff5ac4.yaml @@ -0,0 +1,58 @@ +id: wp-ecommerce-shop-styling-3b47626efde37c9b368853074eff5ac4 + +info: + name: > + WP eCommerce Shop Styling < 2.6 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc737b3-4072-4dd4-8e50-ec94dc2a17d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ecommerce-shop-styling/" + google-query: inurl:"/wp-content/plugins/wp-ecommerce-shop-styling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ecommerce-shop-styling,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ecommerce-shop-styling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ecommerce-shop-styling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ecommerce-shop-styling-ea6169545e62509ba8c9c97e59403c47.yaml b/nuclei-templates/cve-less/plugins/wp-ecommerce-shop-styling-ea6169545e62509ba8c9c97e59403c47.yaml new file mode 100644 index 0000000000..ab1f444d9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ecommerce-shop-styling-ea6169545e62509ba8c9c97e59403c47.yaml @@ -0,0 +1,58 @@ +id: wp-ecommerce-shop-styling-ea6169545e62509ba8c9c97e59403c47 + +info: + name: > + WP eCommerce Shop Styling < 1.8 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0de1962-13bd-4710-ae1f-ab5ced7cc59d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ecommerce-shop-styling/" + google-query: inurl:"/wp-content/plugins/wp-ecommerce-shop-styling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ecommerce-shop-styling,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ecommerce-shop-styling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ecommerce-shop-styling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-edit-menu-466f828dbbe6a38b41f50c90b304f162.yaml b/nuclei-templates/cve-less/plugins/wp-edit-menu-466f828dbbe6a38b41f50c90b304f162.yaml new file mode 100644 index 0000000000..d454ca9528 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-edit-menu-466f828dbbe6a38b41f50c90b304f162.yaml @@ -0,0 +1,58 @@ +id: wp-edit-menu-466f828dbbe6a38b41f50c90b304f162 + +info: + name: > + WP Edit Menu < 1.5.0 - Missing Authorization to Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dce76d59-e798-4762-8247-eddebd38c165?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-edit-menu/" + google-query: inurl:"/wp-content/plugins/wp-edit-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-edit-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-edit-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-edit-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-edit-menu-d194b7c99710bb89f1ee39dafcb5d71b.yaml b/nuclei-templates/cve-less/plugins/wp-edit-menu-d194b7c99710bb89f1ee39dafcb5d71b.yaml new file mode 100644 index 0000000000..d30418300a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-edit-menu-d194b7c99710bb89f1ee39dafcb5d71b.yaml @@ -0,0 +1,58 @@ +id: wp-edit-menu-d194b7c99710bb89f1ee39dafcb5d71b + +info: + name: > + WP Edit Menu <= 1.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71415e73-0c7c-4f4a-9322-8d8a1d61c0d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-edit-menu/" + google-query: inurl:"/wp-content/plugins/wp-edit-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-edit-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-edit-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-edit-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-edit-password-protected-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wp-edit-password-protected-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..c55b0ad5de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-edit-password-protected-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wp-edit-password-protected-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-edit-password-protected/" + google-query: inurl:"/wp-content/plugins/wp-edit-password-protected/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-edit-password-protected,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-edit-password-protected/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-edit-password-protected" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-edit-password-protected-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wp-edit-password-protected-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..3e8718b265 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-edit-password-protected-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wp-edit-password-protected-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-edit-password-protected/" + google-query: inurl:"/wp-content/plugins/wp-edit-password-protected/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-edit-password-protected,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-edit-password-protected/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-edit-password-protected" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-edit-username-267f0e0e2934a72d1de6f6f1105dcde9.yaml b/nuclei-templates/cve-less/plugins/wp-edit-username-267f0e0e2934a72d1de6f6f1105dcde9.yaml new file mode 100644 index 0000000000..ebe6cc5578 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-edit-username-267f0e0e2934a72d1de6f6f1105dcde9.yaml @@ -0,0 +1,58 @@ +id: wp-edit-username-267f0e0e2934a72d1de6f6f1105dcde9 + +info: + name: > + WP Edit Username <= 1.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f445de97-b6fd-4180-b63e-5b8da40dae6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-edit-username/" + google-query: inurl:"/wp-content/plugins/wp-edit-username/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-edit-username,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-edit-username/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-edit-username" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-edit-username-7b1e0db7c2338cbba544192fa7f81810.yaml b/nuclei-templates/cve-less/plugins/wp-edit-username-7b1e0db7c2338cbba544192fa7f81810.yaml new file mode 100644 index 0000000000..c62a9dc57b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-edit-username-7b1e0db7c2338cbba544192fa7f81810.yaml @@ -0,0 +1,58 @@ +id: wp-edit-username-7b1e0db7c2338cbba544192fa7f81810 + +info: + name: > + WP Edit Username <= 1.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47461b7b-e986-4048-88aa-175242305795?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-edit-username/" + google-query: inurl:"/wp-content/plugins/wp-edit-username/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-edit-username,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-edit-username/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-edit-username" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-editor-1184e292a35a8344c32cddb99a8fcb99.yaml b/nuclei-templates/cve-less/plugins/wp-editor-1184e292a35a8344c32cddb99a8fcb99.yaml new file mode 100644 index 0000000000..ca17525b81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-editor-1184e292a35a8344c32cddb99a8fcb99.yaml @@ -0,0 +1,58 @@ +id: wp-editor-1184e292a35a8344c32cddb99a8fcb99 + +info: + name: > + WP Editor <= 1.2.6.3 - Authenticated (Admin+) SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d5a1aec-11f5-4516-9454-651ca4cd6600?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-editor/" + google-query: inurl:"/wp-content/plugins/wp-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-editor-1681b68cd41846205691e7808fd5da5e.yaml b/nuclei-templates/cve-less/plugins/wp-editor-1681b68cd41846205691e7808fd5da5e.yaml new file mode 100644 index 0000000000..2ae501f413 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-editor-1681b68cd41846205691e7808fd5da5e.yaml @@ -0,0 +1,58 @@ +id: wp-editor-1681b68cd41846205691e7808fd5da5e + +info: + name: > + WP Editor <= 1.2.7 - Sensitive Information Exposure via log file + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66b1f539-9192-43f5-a77d-9763024e6b74?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-editor/" + google-query: inurl:"/wp-content/plugins/wp-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-editor-38bda0676f9c2f71340a844a3a8819c1.yaml b/nuclei-templates/cve-less/plugins/wp-editor-38bda0676f9c2f71340a844a3a8819c1.yaml new file mode 100644 index 0000000000..5fb097317c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-editor-38bda0676f9c2f71340a844a3a8819c1.yaml @@ -0,0 +1,58 @@ +id: wp-editor-38bda0676f9c2f71340a844a3a8819c1 + +info: + name: > + WP Editor < 1.2.6 - Incorrect Permission Assignment or Protection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72aa362f-927d-427f-8de9-f5119d53497e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-editor/" + google-query: inurl:"/wp-content/plugins/wp-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-editor-b9526b8daaa2ae88bfa635ff810051bf.yaml b/nuclei-templates/cve-less/plugins/wp-editor-b9526b8daaa2ae88bfa635ff810051bf.yaml new file mode 100644 index 0000000000..6393a64c61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-editor-b9526b8daaa2ae88bfa635ff810051bf.yaml @@ -0,0 +1,58 @@ +id: wp-editor-b9526b8daaa2ae88bfa635ff810051bf + +info: + name: > + WP Editor <= 1.2.6.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4e16526-89a5-4d49-ab9d-dcc7ad3bc8d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-editor/" + google-query: inurl:"/wp-content/plugins/wp-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-editor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-editor-eb8ded5298215dd0e82d0abb7c7916df.yaml b/nuclei-templates/cve-less/plugins/wp-editor-eb8ded5298215dd0e82d0abb7c7916df.yaml new file mode 100644 index 0000000000..e0a0120580 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-editor-eb8ded5298215dd0e82d0abb7c7916df.yaml @@ -0,0 +1,58 @@ +id: wp-editor-eb8ded5298215dd0e82d0abb7c7916df + +info: + name: > + WP Editor < 1.2.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aee4fb6f-8ee6-4d6e-8167-876c9453f78f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-editor/" + google-query: inurl:"/wp-content/plugins/wp-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-editor-fd1c6aef8498143f615d9a33fd78c139.yaml b/nuclei-templates/cve-less/plugins/wp-editor-fd1c6aef8498143f615d9a33fd78c139.yaml new file mode 100644 index 0000000000..c0a0b2e863 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-editor-fd1c6aef8498143f615d9a33fd78c139.yaml @@ -0,0 +1,58 @@ +id: wp-editor-fd1c6aef8498143f615d9a33fd78c139 + +info: + name: > + WP Editor <= 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50bbcfcb-7001-42e7-926c-ec4bf4ea35f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-editor/" + google-query: inurl:"/wp-content/plugins/wp-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-editormd-74293ce2d79dd2a7920de3a46ed52f1d.yaml b/nuclei-templates/cve-less/plugins/wp-editormd-74293ce2d79dd2a7920de3a46ed52f1d.yaml new file mode 100644 index 0000000000..6ea66d6b1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-editormd-74293ce2d79dd2a7920de3a46ed52f1d.yaml @@ -0,0 +1,58 @@ +id: wp-editormd-74293ce2d79dd2a7920de3a46ed52f1d + +info: + name: > + WP Editor.md – The Perfect WordPress Markdown Editor < 10.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdc46d3e-dfb7-4586-86d2-8e4b3805ec22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-editormd/" + google-query: inurl:"/wp-content/plugins/wp-editormd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-editormd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-editormd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-editormd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-education-6bb2bf3114fc53c78aea9aa0493d5c3b.yaml b/nuclei-templates/cve-less/plugins/wp-education-6bb2bf3114fc53c78aea9aa0493d5c3b.yaml new file mode 100644 index 0000000000..c7513b9909 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-education-6bb2bf3114fc53c78aea9aa0493d5c3b.yaml @@ -0,0 +1,58 @@ +id: wp-education-6bb2bf3114fc53c78aea9aa0493d5c3b + +info: + name: > + WP Education <= 1.2.6 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91062d2c-f2a6-4a92-b684-e133391afe60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-education/" + google-query: inurl:"/wp-content/plugins/wp-education/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-education,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-education/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-education" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-eggdrop-af2b2579ba875af3f2aa500d0c6dc341.yaml b/nuclei-templates/cve-less/plugins/wp-eggdrop-af2b2579ba875af3f2aa500d0c6dc341.yaml new file mode 100644 index 0000000000..f0518a2fd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-eggdrop-af2b2579ba875af3f2aa500d0c6dc341.yaml @@ -0,0 +1,58 @@ +id: wp-eggdrop-af2b2579ba875af3f2aa500d0c6dc341 + +info: + name: > + WP-Eggdrop <= 0.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cd509f7-100a-4f28-8d5a-b6b906456c52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-eggdrop/" + google-query: inurl:"/wp-content/plugins/wp-eggdrop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-eggdrop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-eggdrop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-eggdrop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-eggdrop-f0134606fede470163532ed054b5ffbb.yaml b/nuclei-templates/cve-less/plugins/wp-eggdrop-f0134606fede470163532ed054b5ffbb.yaml new file mode 100644 index 0000000000..6bf6599748 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-eggdrop-f0134606fede470163532ed054b5ffbb.yaml @@ -0,0 +1,58 @@ +id: wp-eggdrop-f0134606fede470163532ed054b5ffbb + +info: + name: > + WP-Eggdrop <= 0.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21238925-b87c-43ea-b4ab-9b5d311d3a0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-eggdrop/" + google-query: inurl:"/wp-content/plugins/wp-eggdrop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-eggdrop,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-eggdrop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-eggdrop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-elegant-testimonial-2bdde235df4e60ece644c15f4a368e21.yaml b/nuclei-templates/cve-less/plugins/wp-elegant-testimonial-2bdde235df4e60ece644c15f4a368e21.yaml new file mode 100644 index 0000000000..4de8b4b01c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-elegant-testimonial-2bdde235df4e60ece644c15f4a368e21.yaml @@ -0,0 +1,58 @@ +id: wp-elegant-testimonial-2bdde235df4e60ece644c15f4a368e21 + +info: + name: > + WP Elegant Testimonial <= 1.1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bcc6192-b9fa-4444-b06d-2b44d53d9cfe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-elegant-testimonial/" + google-query: inurl:"/wp-content/plugins/wp-elegant-testimonial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-elegant-testimonial,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-elegant-testimonial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-elegant-testimonial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-00703f6574c6499c4c754c18b06e2fac.yaml b/nuclei-templates/cve-less/plugins/wp-email-00703f6574c6499c4c754c18b06e2fac.yaml new file mode 100644 index 0000000000..52577c84fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-00703f6574c6499c4c754c18b06e2fac.yaml @@ -0,0 +1,58 @@ +id: wp-email-00703f6574c6499c4c754c18b06e2fac + +info: + name: > + WP-EMail <= 2.69.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8745da-fd3a-44b3-b288-9a2b83e8dcd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email/" + google-query: inurl:"/wp-content/plugins/wp-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.69.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-1692bf36a577861d7694fe5e6a6349e9.yaml b/nuclei-templates/cve-less/plugins/wp-email-1692bf36a577861d7694fe5e6a6349e9.yaml new file mode 100644 index 0000000000..c010cca593 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-1692bf36a577861d7694fe5e6a6349e9.yaml @@ -0,0 +1,58 @@ +id: wp-email-1692bf36a577861d7694fe5e6a6349e9 + +info: + name: > + WP-EMail < 2.67.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af90aef0-fd96-43ff-8400-09bd5cebed28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email/" + google-query: inurl:"/wp-content/plugins/wp-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.67.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-9f58597847e89287848eee54c2091729.yaml b/nuclei-templates/cve-less/plugins/wp-email-9f58597847e89287848eee54c2091729.yaml new file mode 100644 index 0000000000..3bc499f2fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-9f58597847e89287848eee54c2091729.yaml @@ -0,0 +1,58 @@ +id: wp-email-9f58597847e89287848eee54c2091729 + +info: + name: > + WP-EMail <= 2.68.2 - Spam Protection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89a02485-a2a5-467d-ad19-6b267059389d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email/" + google-query: inurl:"/wp-content/plugins/wp-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.69.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-aff34bbee6abae075d8a005450eb25f1.yaml b/nuclei-templates/cve-less/plugins/wp-email-aff34bbee6abae075d8a005450eb25f1.yaml new file mode 100644 index 0000000000..d40741be53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-aff34bbee6abae075d8a005450eb25f1.yaml @@ -0,0 +1,58 @@ +id: wp-email-aff34bbee6abae075d8a005450eb25f1 + +info: + name: > + WP-EMail <= 2.68.2 - Cross-Site Request Forgery to Log Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ba90d0f-5ef9-4931-85a9-edf08275510f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email/" + google-query: inurl:"/wp-content/plugins/wp-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.69.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-capture-01c32de4da27201264daa86cce20846d.yaml b/nuclei-templates/cve-less/plugins/wp-email-capture-01c32de4da27201264daa86cce20846d.yaml new file mode 100644 index 0000000000..b488106ae7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-capture-01c32de4da27201264daa86cce20846d.yaml @@ -0,0 +1,58 @@ +id: wp-email-capture-01c32de4da27201264daa86cce20846d + +info: + name: > + WordPress Email Marketing Plugin – WP Email Capture <= 3.10 - Missing Authorization to Email Capture List Download + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a41d78b9-9bdb-48dd-b3ec-2559e79fa251?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email-capture/" + google-query: inurl:"/wp-content/plugins/wp-email-capture/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email-capture,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email-capture/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email-capture" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-capture-8b5e824a12086cc74066614f2e4e51cc.yaml b/nuclei-templates/cve-less/plugins/wp-email-capture-8b5e824a12086cc74066614f2e4e51cc.yaml new file mode 100644 index 0000000000..103e0b7284 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-capture-8b5e824a12086cc74066614f2e4e51cc.yaml @@ -0,0 +1,58 @@ +id: wp-email-capture-8b5e824a12086cc74066614f2e4e51cc + +info: + name: > + WP Email Capture <= 3.9.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3924b6f4-75ba-4ee8-b02f-a23fbd24ed67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email-capture/" + google-query: inurl:"/wp-content/plugins/wp-email-capture/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email-capture,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email-capture/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email-capture" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-capture-c12916d335310986eaec85514752de0c.yaml b/nuclei-templates/cve-less/plugins/wp-email-capture-c12916d335310986eaec85514752de0c.yaml new file mode 100644 index 0000000000..fd68ea7f45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-capture-c12916d335310986eaec85514752de0c.yaml @@ -0,0 +1,58 @@ +id: wp-email-capture-c12916d335310986eaec85514752de0c + +info: + name: > + WordPress Email Marketing Plugin – WP Email Capture <= 3.9.3 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f052dfc-609d-43ed-a8bb-e30294749d03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email-capture/" + google-query: inurl:"/wp-content/plugins/wp-email-capture/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email-capture,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email-capture/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email-capture" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-capture-f31ccb9cf3abf671f018dab7c32b0baa.yaml b/nuclei-templates/cve-less/plugins/wp-email-capture-f31ccb9cf3abf671f018dab7c32b0baa.yaml new file mode 100644 index 0000000000..8ea9aac25c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-capture-f31ccb9cf3abf671f018dab7c32b0baa.yaml @@ -0,0 +1,58 @@ +id: wp-email-capture-f31ccb9cf3abf671f018dab7c32b0baa + +info: + name: > + WordPress Email Marketing Plugin – WP Email Capture <= 3.10 - Information Exposure via wp_email_capture_options_process + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4570948-1625-44b3-8af6-73765d9710ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email-capture/" + google-query: inurl:"/wp-content/plugins/wp-email-capture/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email-capture,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email-capture/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email-capture" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-d7c41c4fc68b394974bfd23e0a1efa8e.yaml b/nuclei-templates/cve-less/plugins/wp-email-d7c41c4fc68b394974bfd23e0a1efa8e.yaml new file mode 100644 index 0000000000..116f08a098 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-d7c41c4fc68b394974bfd23e0a1efa8e.yaml @@ -0,0 +1,58 @@ +id: wp-email-d7c41c4fc68b394974bfd23e0a1efa8e + +info: + name: > + WP-EMail <= 2.67.2 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ebbe9a4-3769-4e05-9377-907b43e3fe10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email/" + google-query: inurl:"/wp-content/plugins/wp-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.67.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-template-2961759aa56e979f7c4730d8320eec28.yaml b/nuclei-templates/cve-less/plugins/wp-email-template-2961759aa56e979f7c4730d8320eec28.yaml new file mode 100644 index 0000000000..94df5e0145 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-template-2961759aa56e979f7c4730d8320eec28.yaml @@ -0,0 +1,58 @@ +id: wp-email-template-2961759aa56e979f7c4730d8320eec28 + +info: + name: > + a3 Lazy Load <= 2.6.0 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5a0ca6-f355-4110-a533-04e46c741ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email-template/" + google-query: inurl:"/wp-content/plugins/wp-email-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email-template,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-template-6f39409e9cc737c9be51051f78033048.yaml b/nuclei-templates/cve-less/plugins/wp-email-template-6f39409e9cc737c9be51051f78033048.yaml new file mode 100644 index 0000000000..064a7f2881 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-template-6f39409e9cc737c9be51051f78033048.yaml @@ -0,0 +1,58 @@ +id: wp-email-template-6f39409e9cc737c9be51051f78033048 + +info: + name: > + WP HTML Mail < 2.2.11 - HTML injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/946ba166-3309-4e47-8b6b-d3f017bbfcc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email-template/" + google-query: inurl:"/wp-content/plugins/wp-email-template/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email-template,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email-template/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email-template" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-users-2c7df8a6a41b0cfad78e17028e8be6b9.yaml b/nuclei-templates/cve-less/plugins/wp-email-users-2c7df8a6a41b0cfad78e17028e8be6b9.yaml new file mode 100644 index 0000000000..d94d5e6374 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-users-2c7df8a6a41b0cfad78e17028e8be6b9.yaml @@ -0,0 +1,58 @@ +id: wp-email-users-2c7df8a6a41b0cfad78e17028e8be6b9 + +info: + name: > + WP Email Users <= 1.4.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/390ee957-f06f-4952-b740-4578c130925f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email-users/" + google-query: inurl:"/wp-content/plugins/wp-email-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email-users,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-email-users-f523c60311785f4d77bdd4f2724550c9.yaml b/nuclei-templates/cve-less/plugins/wp-email-users-f523c60311785f4d77bdd4f2724550c9.yaml new file mode 100644 index 0000000000..f2c1c50a7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-email-users-f523c60311785f4d77bdd4f2724550c9.yaml @@ -0,0 +1,58 @@ +id: wp-email-users-f523c60311785f4d77bdd4f2724550c9 + +info: + name: > + WP Email Users <= 1.7.6 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ad9f8c-9b76-4b3e-987c-ed99beeb2937?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-email-users/" + google-query: inurl:"/wp-content/plugins/wp-email-users/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-email-users,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-email-users/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-email-users" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-emaily-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-emaily-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7d99ba258b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-emaily-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-emaily-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-emaily/" + google-query: inurl:"/wp-content/plugins/wp-emaily/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-emaily,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-emaily/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-emaily" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-embed-facebook-d255ee9fa48bc6c366622d018f796d6c.yaml b/nuclei-templates/cve-less/plugins/wp-embed-facebook-d255ee9fa48bc6c366622d018f796d6c.yaml new file mode 100644 index 0000000000..5106dbddb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-embed-facebook-d255ee9fa48bc6c366622d018f796d6c.yaml @@ -0,0 +1,58 @@ +id: wp-embed-facebook-d255ee9fa48bc6c366622d018f796d6c + +info: + name: > + Magic Embeds <= 3.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88ade7a7-da31-4752-b100-40dae81735b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-embed-facebook/" + google-query: inurl:"/wp-content/plugins/wp-embed-facebook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-embed-facebook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-embed-facebook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-embed-facebook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-emoji-one-dba2619ab2d561166f40c11574711a13.yaml b/nuclei-templates/cve-less/plugins/wp-emoji-one-dba2619ab2d561166f40c11574711a13.yaml new file mode 100644 index 0000000000..204717e5f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-emoji-one-dba2619ab2d561166f40c11574711a13.yaml @@ -0,0 +1,58 @@ +id: wp-emoji-one-dba2619ab2d561166f40c11574711a13 + +info: + name: > + WP Emoji One <= 0.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbcf3487-c1d4-4173-b197-1dd381990eb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-emoji-one/" + google-query: inurl:"/wp-content/plugins/wp-emoji-one/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-emoji-one,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-emoji-one/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-emoji-one" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-estimation-form-55c899bce76676ae0bd2f27011d06ab7.yaml b/nuclei-templates/cve-less/plugins/wp-estimation-form-55c899bce76676ae0bd2f27011d06ab7.yaml new file mode 100644 index 0000000000..6e3ac15f5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-estimation-form-55c899bce76676ae0bd2f27011d06ab7.yaml @@ -0,0 +1,58 @@ +id: wp-estimation-form-55c899bce76676ae0bd2f27011d06ab7 + +info: + name: > + WP Cost Estimation & Payment Forms Builder <= 10.1.75 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ae916a0-b0a8-4722-9d8a-3d1f163bc8e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-estimation-form/" + google-query: inurl:"/wp-content/plugins/wp-estimation-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-estimation-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-estimation-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-estimation-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.1.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-estimation-form-56c7f8b22a3b891b810a80379c9e7a01.yaml b/nuclei-templates/cve-less/plugins/wp-estimation-form-56c7f8b22a3b891b810a80379c9e7a01.yaml new file mode 100644 index 0000000000..b58490f8a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-estimation-form-56c7f8b22a3b891b810a80379c9e7a01.yaml @@ -0,0 +1,58 @@ +id: wp-estimation-form-56c7f8b22a3b891b810a80379c9e7a01 + +info: + name: > + WP Cost Estimation & Payment Forms Builder <= 10.1.75 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bf1fe22-2cee-4828-bd68-7269b66152b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-estimation-form/" + google-query: inurl:"/wp-content/plugins/wp-estimation-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-estimation-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-estimation-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-estimation-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.1.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-estimation-form-f77ac51d7f87288e232b2c219c40d8d5.yaml b/nuclei-templates/cve-less/plugins/wp-estimation-form-f77ac51d7f87288e232b2c219c40d8d5.yaml new file mode 100644 index 0000000000..17b4b34648 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-estimation-form-f77ac51d7f87288e232b2c219c40d8d5.yaml @@ -0,0 +1,58 @@ +id: wp-estimation-form-f77ac51d7f87288e232b2c219c40d8d5 + +info: + name: > + WP Cost Estimation & Payment Forms Builder <= 10.1.76 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/563d01c1-dead-4d1a-9f4a-39351b8e94cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-estimation-form/" + google-query: inurl:"/wp-content/plugins/wp-estimation-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-estimation-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-estimation-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-estimation-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.1.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-aggregator-e5c02072906413fc46145a5e93a1996b.yaml b/nuclei-templates/cve-less/plugins/wp-event-aggregator-e5c02072906413fc46145a5e93a1996b.yaml new file mode 100644 index 0000000000..1c46761425 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-aggregator-e5c02072906413fc46145a5e93a1996b.yaml @@ -0,0 +1,58 @@ +id: wp-event-aggregator-e5c02072906413fc46145a5e93a1996b + +info: + name: > + WP Event Aggregator <= 1.7.6 - Cross-Site Request Forgery via wpea_deauthorize_user() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b26e5f7-bd35-4412-a608-9cdfeff0b025?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-aggregator/" + google-query: inurl:"/wp-content/plugins/wp-event-aggregator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-aggregator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-aggregator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-aggregator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-manager-0d45a6acc266b9099e698fb6465812c3.yaml b/nuclei-templates/cve-less/plugins/wp-event-manager-0d45a6acc266b9099e698fb6465812c3.yaml new file mode 100644 index 0000000000..dd84bc1394 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-manager-0d45a6acc266b9099e698fb6465812c3.yaml @@ -0,0 +1,58 @@ +id: wp-event-manager-0d45a6acc266b9099e698fb6465812c3 + +info: + name: > + WP Event Manager <= 3.1.41 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f25b2a4b-d863-4f24-ae67-4c8e41602c6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-manager/" + google-query: inurl:"/wp-content/plugins/wp-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-manager-0e1bfe9ca60605b5abd7dce920ae439f.yaml b/nuclei-templates/cve-less/plugins/wp-event-manager-0e1bfe9ca60605b5abd7dce920ae439f.yaml new file mode 100644 index 0000000000..40a510e5de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-manager-0e1bfe9ca60605b5abd7dce920ae439f.yaml @@ -0,0 +1,58 @@ +id: wp-event-manager-0e1bfe9ca60605b5abd7dce920ae439f + +info: + name: > + WP Event Manager – Easily Build your Calendar of Events! <= 3.1.27 - Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01c3c913-2296-4ec3-b7cb-6418ab2f0ea1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-manager/" + google-query: inurl:"/wp-content/plugins/wp-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-manager-1c01adecb12aee3257c9d0dbd49129d4.yaml b/nuclei-templates/cve-less/plugins/wp-event-manager-1c01adecb12aee3257c9d0dbd49129d4.yaml new file mode 100644 index 0000000000..4cb30af970 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-manager-1c01adecb12aee3257c9d0dbd49129d4.yaml @@ -0,0 +1,58 @@ +id: wp-event-manager-1c01adecb12aee3257c9d0dbd49129d4 + +info: + name: > + WP Event Manager <= 3.1.41 - Reflected Cross-Site Scripting via plugin + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d7f4d17-8318-4ab3-b4a2-81d7a017c397?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-manager/" + google-query: inurl:"/wp-content/plugins/wp-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-manager-5dfd39caa2a4a17a9d81b2bcb48fe7a9.yaml b/nuclei-templates/cve-less/plugins/wp-event-manager-5dfd39caa2a4a17a9d81b2bcb48fe7a9.yaml new file mode 100644 index 0000000000..290f1cfc4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-manager-5dfd39caa2a4a17a9d81b2bcb48fe7a9.yaml @@ -0,0 +1,58 @@ +id: wp-event-manager-5dfd39caa2a4a17a9d81b2bcb48fe7a9 + +info: + name: > + WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce <= 3.1.37.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd9d22b0-a84a-4bf2-b8b4-89bae2970f29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-manager/" + google-query: inurl:"/wp-content/plugins/wp-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.37.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-manager-b1c130064cba38fde3b249c93cb244d8.yaml b/nuclei-templates/cve-less/plugins/wp-event-manager-b1c130064cba38fde3b249c93cb244d8.yaml new file mode 100644 index 0000000000..5f9cc531cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-manager-b1c130064cba38fde3b249c93cb244d8.yaml @@ -0,0 +1,58 @@ +id: wp-event-manager-b1c130064cba38fde3b249c93cb244d8 + +info: + name: > + WP Event Manager <= 3.1.22 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c31f7d3-1f2f-4ec5-802b-ec0b22087d43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-manager/" + google-query: inurl:"/wp-content/plugins/wp-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-manager-c18f4199236ac87f44c609c0bce30e9b.yaml b/nuclei-templates/cve-less/plugins/wp-event-manager-c18f4199236ac87f44c609c0bce30e9b.yaml new file mode 100644 index 0000000000..f60f3c8f9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-manager-c18f4199236ac87f44c609c0bce30e9b.yaml @@ -0,0 +1,58 @@ +id: wp-event-manager-c18f4199236ac87f44c609c0bce30e9b + +info: + name: > + WP Event Manager <= 3.1.42 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dc83aca-f533-4a8c-b12c-e21156ce6088?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-manager/" + google-query: inurl:"/wp-content/plugins/wp-event-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-partners-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-event-partners-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..fb2489bedf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-partners-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-event-partners-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-partners/" + google-query: inurl:"/wp-content/plugins/wp-event-partners/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-partners,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-partners/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-partners" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-solution-0b82fadb36c481a1a5ef36694d259943.yaml b/nuclei-templates/cve-less/plugins/wp-event-solution-0b82fadb36c481a1a5ef36694d259943.yaml new file mode 100644 index 0000000000..870820ec45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-solution-0b82fadb36c481a1a5ef36694d259943.yaml @@ -0,0 +1,58 @@ +id: wp-event-solution-0b82fadb36c481a1a5ef36694d259943 + +info: + name: > + Eventin <= 3.3.52 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f256036d-11e8-4311-baa0-d15193c72da0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-solution/" + google-query: inurl:"/wp-content/plugins/wp-event-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-solution,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-event-solution-470fcf5d296c10b95ff256d3ed543789.yaml b/nuclei-templates/cve-less/plugins/wp-event-solution-470fcf5d296c10b95ff256d3ed543789.yaml new file mode 100644 index 0000000000..1ada35ef12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-event-solution-470fcf5d296c10b95ff256d3ed543789.yaml @@ -0,0 +1,58 @@ +id: wp-event-solution-470fcf5d296c10b95ff256d3ed543789 + +info: + name: > + Event Manager, Events Calendar, Events Tickets for WooCommerce – Eventin <= 3.3.50 - Missing Authorization to Unauthenticated Events Export + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cbdf679-1657-4249-a433-8fe0cddd94be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-event-solution/" + google-query: inurl:"/wp-content/plugins/wp-event-solution/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-event-solution,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-event-solution/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-event-solution" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.50') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-events-725f7191ecab88079bfff1263c7f0b6b.yaml b/nuclei-templates/cve-less/plugins/wp-events-725f7191ecab88079bfff1263c7f0b6b.yaml new file mode 100644 index 0000000000..a8faea8b0a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-events-725f7191ecab88079bfff1263c7f0b6b.yaml @@ -0,0 +1,58 @@ +id: wp-events-725f7191ecab88079bfff1263c7f0b6b + +info: + name: > + WP Events <= 2.3.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2330005e-c3ab-4556-aba9-f194a1ace329?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-events/" + google-query: inurl:"/wp-content/plugins/wp-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-events,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-2fc3b192219eef2561c8cf224133798e.yaml b/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-2fc3b192219eef2561c8cf224133798e.yaml new file mode 100644 index 0000000000..75a83d56a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-2fc3b192219eef2561c8cf224133798e.yaml @@ -0,0 +1,58 @@ +id: wp-expand-tabs-free-2fc3b192219eef2561c8cf224133798e + +info: + name: > + WP Tabs <= 2.1.14 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28a8b3fe-6f15-4085-a370-a2e867f7018b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-expand-tabs-free/" + google-query: inurl:"/wp-content/plugins/wp-expand-tabs-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-expand-tabs-free,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-expand-tabs-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-expand-tabs-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-92b868ab957b2d6b33921f7b3f3c0643.yaml b/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-92b868ab957b2d6b33921f7b3f3c0643.yaml new file mode 100644 index 0000000000..b733cadc9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-92b868ab957b2d6b33921f7b3f3c0643.yaml @@ -0,0 +1,58 @@ +id: wp-expand-tabs-free-92b868ab957b2d6b33921f7b3f3c0643 + +info: + name: > + WP Tabs – Responsive Tabs Plugin for WordPress <= 1.8.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69401e9f-6bd3-49b8-8ebd-6904db680610?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-expand-tabs-free/" + google-query: inurl:"/wp-content/plugins/wp-expand-tabs-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-expand-tabs-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-expand-tabs-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-expand-tabs-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-e352fc57a2782b7212eb2f2b84743eba.yaml b/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-e352fc57a2782b7212eb2f2b84743eba.yaml new file mode 100644 index 0000000000..d3beab686b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-e352fc57a2782b7212eb2f2b84743eba.yaml @@ -0,0 +1,58 @@ +id: wp-expand-tabs-free-e352fc57a2782b7212eb2f2b84743eba + +info: + name: > + WP Tabs <= 2.1.16 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf4dcdab-6c74-4c0e-bdda-67e60025a873?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-expand-tabs-free/" + google-query: inurl:"/wp-content/plugins/wp-expand-tabs-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-expand-tabs-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-expand-tabs-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-expand-tabs-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-e835818e3176559c0f65d870084d0fe9.yaml b/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-e835818e3176559c0f65d870084d0fe9.yaml new file mode 100644 index 0000000000..47e6c02c86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-expand-tabs-free-e835818e3176559c0f65d870084d0fe9.yaml @@ -0,0 +1,58 @@ +id: wp-expand-tabs-free-e835818e3176559c0f65d870084d0fe9 + +info: + name: > + WP Tabs <= 2.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/433c8908-587e-4086-9d0c-c9b1819b26e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-expand-tabs-free/" + google-query: inurl:"/wp-content/plugins/wp-expand-tabs-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-expand-tabs-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-expand-tabs-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-expand-tabs-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-experiments-free-2560e5ea38a398fb682ed22ee1d9efc5.yaml b/nuclei-templates/cve-less/plugins/wp-experiments-free-2560e5ea38a398fb682ed22ee1d9efc5.yaml new file mode 100644 index 0000000000..ac90671687 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-experiments-free-2560e5ea38a398fb682ed22ee1d9efc5.yaml @@ -0,0 +1,58 @@ +id: wp-experiments-free-2560e5ea38a398fb682ed22ee1d9efc5 + +info: + name: > + Title Experiments Free <= 9.0.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f35cc8b-11be-4664-be48-12a8db872d66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-experiments-free/" + google-query: inurl:"/wp-content/plugins/wp-experiments-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-experiments-free,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-experiments-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-experiments-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-express-checkout-ba0174f27e21e2789733491b8587f8b7.yaml b/nuclei-templates/cve-less/plugins/wp-express-checkout-ba0174f27e21e2789733491b8587f8b7.yaml new file mode 100644 index 0000000000..2da6f6a116 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-express-checkout-ba0174f27e21e2789733491b8587f8b7.yaml @@ -0,0 +1,58 @@ +id: wp-express-checkout-ba0174f27e21e2789733491b8587f8b7 + +info: + name: > + WP Express Checkout <= 2.2.8 - Authenticated (Admin+) Stored Cross-Site Scripting via pec_coupon[code] + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b35ee801-f04d-4b22-8238-053b02a6ee0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-express-checkout/" + google-query: inurl:"/wp-content/plugins/wp-express-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-express-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-express-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-express-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-express-checkout-e4fa85790fd0d4e4853e9542fdd405a2.yaml b/nuclei-templates/cve-less/plugins/wp-express-checkout-e4fa85790fd0d4e4853e9542fdd405a2.yaml new file mode 100644 index 0000000000..07cba70b88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-express-checkout-e4fa85790fd0d4e4853e9542fdd405a2.yaml @@ -0,0 +1,58 @@ +id: wp-express-checkout-e4fa85790fd0d4e4853e9542fdd405a2 + +info: + name: > + WP Express Checkout (Accept PayPal Payments) <= 2.3.7 - Unauthenticated Price Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42cd1b53-400f-4933-b3cc-2fd9079e241c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-express-checkout/" + google-query: inurl:"/wp-content/plugins/wp-express-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-express-checkout,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-express-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-express-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-extended-search-2124f2372d43d33c582fb413bf11d2cf.yaml b/nuclei-templates/cve-less/plugins/wp-extended-search-2124f2372d43d33c582fb413bf11d2cf.yaml new file mode 100644 index 0000000000..8c324a0fc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-extended-search-2124f2372d43d33c582fb413bf11d2cf.yaml @@ -0,0 +1,58 @@ +id: wp-extended-search-2124f2372d43d33c582fb413bf11d2cf + +info: + name: > + WP Extended Search <= 2.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b47478f-3bd5-4eda-897f-4570aea4530a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-extended-search/" + google-query: inurl:"/wp-content/plugins/wp-extended-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-extended-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-extended-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-extended-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-external-links-8503267448a714d1d5d099f1366cd0ea.yaml b/nuclei-templates/cve-less/plugins/wp-external-links-8503267448a714d1d5d099f1366cd0ea.yaml new file mode 100644 index 0000000000..e91e027e80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-external-links-8503267448a714d1d5d099f1366cd0ea.yaml @@ -0,0 +1,58 @@ +id: wp-external-links-8503267448a714d1d5d099f1366cd0ea + +info: + name: > + WP External Links < 1.81 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3621801a-231b-4678-bfb5-fbf18e58a658?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-external-links/" + google-query: inurl:"/wp-content/plugins/wp-external-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-external-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-external-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-external-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-external-links-acbe4c57371265432a7073cce828c9b8.yaml b/nuclei-templates/cve-less/plugins/wp-external-links-acbe4c57371265432a7073cce828c9b8.yaml new file mode 100644 index 0000000000..50878c41f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-external-links-acbe4c57371265432a7073cce828c9b8.yaml @@ -0,0 +1,58 @@ +id: wp-external-links-acbe4c57371265432a7073cce828c9b8 + +info: + name: > + External Links <= 2.55 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1254e0ad-852e-4fd4-8317-61bfbbc9f737?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-external-links/" + google-query: inurl:"/wp-content/plugins/wp-external-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-external-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-external-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-external-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-external-links-c77650d093057aaa003b4663a520daa0.yaml b/nuclei-templates/cve-less/plugins/wp-external-links-c77650d093057aaa003b4663a520daa0.yaml new file mode 100644 index 0000000000..d7fcf5f9aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-external-links-c77650d093057aaa003b4663a520daa0.yaml @@ -0,0 +1,58 @@ +id: wp-external-links-c77650d093057aaa003b4663a520daa0 + +info: + name: > + External Links <= 2.57 - Cross-Site Request Forgery via action_admin_action_wpel_dismiss_notice + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae7d54a5-3952-4206-a5f4-be60aac27767?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-external-links/" + google-query: inurl:"/wp-content/plugins/wp-external-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-external-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-external-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-external-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-extra-04bca0e78f8b136ea82b1c4e9e1fafd4.yaml b/nuclei-templates/cve-less/plugins/wp-extra-04bca0e78f8b136ea82b1c4e9e1fafd4.yaml new file mode 100644 index 0000000000..77ff91f6a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-extra-04bca0e78f8b136ea82b1c4e9e1fafd4.yaml @@ -0,0 +1,58 @@ +id: wp-extra-04bca0e78f8b136ea82b1c4e9e1fafd4 + +info: + name: > + WP EXtra <= 6.2 - Missing Authorization to Arbitrary Email Sending + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93c10a58-c5f2-440b-a88e-5314143fdd90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-extra/" + google-query: inurl:"/wp-content/plugins/wp-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-extra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-extra-1bacae6a1e466eb95d42535d2732f49e.yaml b/nuclei-templates/cve-less/plugins/wp-extra-1bacae6a1e466eb95d42535d2732f49e.yaml new file mode 100644 index 0000000000..28f3b83d10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-extra-1bacae6a1e466eb95d42535d2732f49e.yaml @@ -0,0 +1,58 @@ +id: wp-extra-1bacae6a1e466eb95d42535d2732f49e + +info: + name: > + WP EXtra <= 6.2 - Missing Authorization to Export Settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed5c433b-eaab-4716-8749-2a5598a1dbb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-extra/" + google-query: inurl:"/wp-content/plugins/wp-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-extra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-extra-72f52b3195cda1a84eb378b7230b5a8a.yaml b/nuclei-templates/cve-less/plugins/wp-extra-72f52b3195cda1a84eb378b7230b5a8a.yaml new file mode 100644 index 0000000000..d86a45c644 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-extra-72f52b3195cda1a84eb378b7230b5a8a.yaml @@ -0,0 +1,58 @@ +id: wp-extra-72f52b3195cda1a84eb378b7230b5a8a + +info: + name: > + WP EXtra <= 6.2 - Missing Authorization to .htaccess File Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87e3dd5e-0d77-4d78-8171-0beaf9482699?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-extra/" + google-query: inurl:"/wp-content/plugins/wp-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-extra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-extra-cf9d9e6d9a79f949d859a47a9fc67035.yaml b/nuclei-templates/cve-less/plugins/wp-extra-cf9d9e6d9a79f949d859a47a9fc67035.yaml new file mode 100644 index 0000000000..0d9731e1bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-extra-cf9d9e6d9a79f949d859a47a9fc67035.yaml @@ -0,0 +1,58 @@ +id: wp-extra-cf9d9e6d9a79f949d859a47a9fc67035 + +info: + name: > + WP EXtra <= 6.4 - Cross-Site Request Forgery ToolImport + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e3f3104-e213-4b0f-9821-b3f1a5c06191?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-extra/" + google-query: inurl:"/wp-content/plugins/wp-extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-extra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-extra-file-types-388ae826ccb91352f7d4e90d33114225.yaml b/nuclei-templates/cve-less/plugins/wp-extra-file-types-388ae826ccb91352f7d4e90d33114225.yaml new file mode 100644 index 0000000000..118c0349ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-extra-file-types-388ae826ccb91352f7d4e90d33114225.yaml @@ -0,0 +1,58 @@ +id: wp-extra-file-types-388ae826ccb91352f7d4e90d33114225 + +info: + name: > + WP Extra File Types <= 0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae397949-12d2-4323-871e-4fd4f14f35c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-extra-file-types/" + google-query: inurl:"/wp-content/plugins/wp-extra-file-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-extra-file-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-extra-file-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-extra-file-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facebook-feed-0680dda962d6629defb4aaff80f780c3.yaml b/nuclei-templates/cve-less/plugins/wp-facebook-feed-0680dda962d6629defb4aaff80f780c3.yaml new file mode 100644 index 0000000000..aca3d40d54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facebook-feed-0680dda962d6629defb4aaff80f780c3.yaml @@ -0,0 +1,58 @@ +id: wp-facebook-feed-0680dda962d6629defb4aaff80f780c3 + +info: + name: > + The Awesome Feed – Custom Feed <= 2.2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01878991-37c7-4c7b-b68c-d59ca66521e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facebook-feed/" + google-query: inurl:"/wp-content/plugins/wp-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facebook-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facebook-feed-19cdc4c29e421f2a623449d500d3da59.yaml b/nuclei-templates/cve-less/plugins/wp-facebook-feed-19cdc4c29e421f2a623449d500d3da59.yaml new file mode 100644 index 0000000000..fc8b8862f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facebook-feed-19cdc4c29e421f2a623449d500d3da59.yaml @@ -0,0 +1,58 @@ +id: wp-facebook-feed-19cdc4c29e421f2a623449d500d3da59 + +info: + name: > + The Awesome Feed – Custom Feed <= 2.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6892fefa-3866-4dbf-8604-dd4bc1e7d481?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facebook-feed/" + google-query: inurl:"/wp-content/plugins/wp-facebook-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facebook-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facebook-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facebook-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facebook-group-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-facebook-group-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6ec8bb5738 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facebook-group-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-facebook-group-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facebook-group/" + google-query: inurl:"/wp-content/plugins/wp-facebook-group/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facebook-group,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facebook-group/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facebook-group" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facebook-messenger-e11138180e51155554e951dfca6551c2.yaml b/nuclei-templates/cve-less/plugins/wp-facebook-messenger-e11138180e51155554e951dfca6551c2.yaml new file mode 100644 index 0000000000..9267abf4a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facebook-messenger-e11138180e51155554e951dfca6551c2.yaml @@ -0,0 +1,58 @@ +id: wp-facebook-messenger-e11138180e51155554e951dfca6551c2 + +info: + name: > + Live Chat with Facebook Messenger <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa32a790-242f-4142-9f4d-e1b2a07045bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facebook-messenger/" + google-query: inurl:"/wp-content/plugins/wp-facebook-messenger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facebook-messenger,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facebook-messenger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facebook-messenger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facebook-reviews-1f98c7de637a490b84e9178dba93c59d.yaml b/nuclei-templates/cve-less/plugins/wp-facebook-reviews-1f98c7de637a490b84e9178dba93c59d.yaml new file mode 100644 index 0000000000..47e55de2b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facebook-reviews-1f98c7de637a490b84e9178dba93c59d.yaml @@ -0,0 +1,58 @@ +id: wp-facebook-reviews-1f98c7de637a490b84e9178dba93c59d + +info: + name: > + WP Review Slider <= 12.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9985cac5-30bf-4e8b-91d5-0b3da36ed851?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facebook-reviews/" + google-query: inurl:"/wp-content/plugins/wp-facebook-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facebook-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facebook-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facebook-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facebook-reviews-33420cd1d54a09491bc3d21e0f948bd1.yaml b/nuclei-templates/cve-less/plugins/wp-facebook-reviews-33420cd1d54a09491bc3d21e0f948bd1.yaml new file mode 100644 index 0000000000..6d455d160a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facebook-reviews-33420cd1d54a09491bc3d21e0f948bd1.yaml @@ -0,0 +1,58 @@ +id: wp-facebook-reviews-33420cd1d54a09491bc3d21e0f948bd1 + +info: + name: > + WP Review Slider <= 12.1 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab770acd-9420-4201-9e67-dfea86dba168?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facebook-reviews/" + google-query: inurl:"/wp-content/plugins/wp-facebook-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facebook-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facebook-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facebook-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facebook-reviews-a6734b6686a1620a7fb5250d66545fe3.yaml b/nuclei-templates/cve-less/plugins/wp-facebook-reviews-a6734b6686a1620a7fb5250d66545fe3.yaml new file mode 100644 index 0000000000..f8aaf7a5e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facebook-reviews-a6734b6686a1620a7fb5250d66545fe3.yaml @@ -0,0 +1,58 @@ +id: wp-facebook-reviews-a6734b6686a1620a7fb5250d66545fe3 + +info: + name: > + WP Review Slider <= 12.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62233370-3b54-4d89-93e7-07afdae4a413?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facebook-reviews/" + google-query: inurl:"/wp-content/plugins/wp-facebook-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facebook-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facebook-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facebook-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facebook-reviews-de4b42af1ef3e90d957d2f6f01c968f1.yaml b/nuclei-templates/cve-less/plugins/wp-facebook-reviews-de4b42af1ef3e90d957d2f6f01c968f1.yaml new file mode 100644 index 0000000000..54e9b2f309 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facebook-reviews-de4b42af1ef3e90d957d2f6f01c968f1.yaml @@ -0,0 +1,58 @@ +id: wp-facebook-reviews-de4b42af1ef3e90d957d2f6f01c968f1 + +info: + name: > + WP Review Slider < 11.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8a87f7b-471b-44c0-a0bd-06a9ba24a566?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facebook-reviews/" + google-query: inurl:"/wp-content/plugins/wp-facebook-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facebook-reviews,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facebook-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facebook-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facethumb-00db16fbca7a4f9a03bd9187fe606bf2.yaml b/nuclei-templates/cve-less/plugins/wp-facethumb-00db16fbca7a4f9a03bd9187fe606bf2.yaml new file mode 100644 index 0000000000..58ba080ec4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facethumb-00db16fbca7a4f9a03bd9187fe606bf2.yaml @@ -0,0 +1,58 @@ +id: wp-facethumb-00db16fbca7a4f9a03bd9187fe606bf2 + +info: + name: > + WP-FaceThumb < 0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5bb8804-0b90-44c3-bf74-bbc6b4baf229?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facethumb/" + google-query: inurl:"/wp-content/plugins/wp-facethumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facethumb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facethumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facethumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-facethumb-f4af8d356c8b91106f18b8295f1a09bd.yaml b/nuclei-templates/cve-less/plugins/wp-facethumb-f4af8d356c8b91106f18b8295f1a09bd.yaml new file mode 100644 index 0000000000..64cb9d5535 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-facethumb-f4af8d356c8b91106f18b8295f1a09bd.yaml @@ -0,0 +1,58 @@ +id: wp-facethumb-f4af8d356c8b91106f18b8295f1a09bd + +info: + name: > + WP Facethumb <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/835db0c0-f3c9-4acd-aee8-bf7b52447ac9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-facethumb/" + google-query: inurl:"/wp-content/plugins/wp-facethumb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-facethumb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-facethumb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-facethumb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fade-in-text-news-eac77b73e6b9904c178e050ff0c75895.yaml b/nuclei-templates/cve-less/plugins/wp-fade-in-text-news-eac77b73e6b9904c178e050ff0c75895.yaml new file mode 100644 index 0000000000..ab0b94e8a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fade-in-text-news-eac77b73e6b9904c178e050ff0c75895.yaml @@ -0,0 +1,58 @@ +id: wp-fade-in-text-news-eac77b73e6b9904c178e050ff0c75895 + +info: + name: > + WP fade in text news <= 12.0 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4accf10-710e-4cba-8d61-04e422324f9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fade-in-text-news/" + google-query: inurl:"/wp-content/plugins/wp-fade-in-text-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fade-in-text-news,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fade-in-text-news/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fade-in-text-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fail2ban-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-fail2ban-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..960e1b478b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fail2ban-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-fail2ban-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fail2ban/" + google-query: inurl:"/wp-content/plugins/wp-fail2ban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fail2ban,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fail2ban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fail2ban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fail2ban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-fail2ban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..ad27f173f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fail2ban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-fail2ban-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fail2ban/" + google-query: inurl:"/wp-content/plugins/wp-fail2ban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fail2ban,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fail2ban/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fail2ban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fancybox-8282698eb41cb94eaba8ce79ac54a59f.yaml b/nuclei-templates/cve-less/plugins/wp-fancybox-8282698eb41cb94eaba8ce79ac54a59f.yaml new file mode 100644 index 0000000000..d7504faa2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fancybox-8282698eb41cb94eaba8ce79ac54a59f.yaml @@ -0,0 +1,58 @@ +id: wp-fancybox-8282698eb41cb94eaba8ce79ac54a59f + +info: + name: > + WordPress fancybox <= 1.0.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25f782c4-7ece-47cb-9e64-9c93fd8858e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fancybox/" + google-query: inurl:"/wp-content/plugins/wp-fancybox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fancybox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fancybox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fancybox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fast-cache-8db2ce4fbc6df6bbc133a98c76aaa326.yaml b/nuclei-templates/cve-less/plugins/wp-fast-cache-8db2ce4fbc6df6bbc133a98c76aaa326.yaml new file mode 100644 index 0000000000..dd05f1186a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fast-cache-8db2ce4fbc6df6bbc133a98c76aaa326.yaml @@ -0,0 +1,58 @@ +id: wp-fast-cache-8db2ce4fbc6df6bbc133a98c76aaa326 + +info: + name: > + WP Fast Cache <= 1.4 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/655e6486-e35f-4e7b-b894-55606d3eba56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fast-cache/" + google-query: inurl:"/wp-content/plugins/wp-fast-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fast-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fast-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fast-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-2bc9467a4d3e89abb47c57f5fb5c5502.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-2bc9467a4d3e89abb47c57f5fb5c5502.yaml new file mode 100644 index 0000000000..56ba53b631 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-2bc9467a4d3e89abb47c57f5fb5c5502.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-2bc9467a4d3e89abb47c57f5fb5c5502 + +info: + name: > + WP Fastest Cache < 0.8.4.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c23c3b24-893f-4589-8fab-bd54259bd105?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-2c2de25348b7c75ca7429eb5ebee61e0.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-2c2de25348b7c75ca7429eb5ebee61e0.yaml new file mode 100644 index 0000000000..049b36d707 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-2c2de25348b7c75ca7429eb5ebee61e0.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-2c2de25348b7c75ca7429eb5ebee61e0 + +info: + name: > + WP Fastest Cache <= 0.8.9.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07fc1249-a50d-4038-8cbe-35ff7a3d28b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-308394f6b31625a7b3cc64b85e9f4dc2.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-308394f6b31625a7b3cc64b85e9f4dc2.yaml new file mode 100644 index 0000000000..772061345f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-308394f6b31625a7b3cc64b85e9f4dc2.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-308394f6b31625a7b3cc64b85e9f4dc2 + +info: + name: > + WP Fastest Cache <= 0.8.5.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcbd718b-4d7d-48a4-9db2-dd938de7c7eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-34c60f50f8424840987ed5ec10c2ec3b.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-34c60f50f8424840987ed5ec10c2ec3b.yaml new file mode 100644 index 0000000000..e1d05242a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-34c60f50f8424840987ed5ec10c2ec3b.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-34c60f50f8424840987ed5ec10c2ec3b + +info: + name: > + WP Fastest Cache <= 0.8.8.5 - Cross-Site Scripting via rules[0][content] parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dac1d91-b9a9-47e0-86cb-2000659196c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-434e9952fd09ca91a230586603143cbf.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-434e9952fd09ca91a230586603143cbf.yaml new file mode 100644 index 0000000000..a252b25ccd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-434e9952fd09ca91a230586603143cbf.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-434e9952fd09ca91a230586603143cbf + +info: + name: > + WP Fastest Cache <= 0.8.7.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65b3baaf-86e4-4dd2-b3eb-84c21eabdd6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-5159dc207c489f95e16ee89d4e708b82.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-5159dc207c489f95e16ee89d4e708b82.yaml new file mode 100644 index 0000000000..c644049fd2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-5159dc207c489f95e16ee89d4e708b82.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-5159dc207c489f95e16ee89d4e708b82 + +info: + name: > + WP Fastest Cache <= 0.9.1.6 - Authenticated (Admin+) Directory Traversal to Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20989781-def0-4ffd-bf24-40ed34b3e922?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-528f5db23cd029b151a95682806084f9.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-528f5db23cd029b151a95682806084f9.yaml new file mode 100644 index 0000000000..1ea087b0d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-528f5db23cd029b151a95682806084f9.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-528f5db23cd029b151a95682806084f9 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Missing Authorization to Cache Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae643666-70cb-4eb4-a183-e1649264ded4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-5c10da7a2c723b79d143625ddb915594.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-5c10da7a2c723b79d143625ddb915594.yaml new file mode 100644 index 0000000000..26423dcf83 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-5c10da7a2c723b79d143625ddb915594.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-5c10da7a2c723b79d143625ddb915594 + +info: + name: > + WP Fastest Cache <= 0.8.8.5 - Cross-Site Scripting via wpFastestCachePage options, wpFastestCachePreload_number or wpFastestCacheLanguage parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8ca195d-312b-41d2-a9d7-4d306fc800ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-5f9f7bf290ea80a41025c30b0ffd1db1.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-5f9f7bf290ea80a41025c30b0ffd1db1.yaml new file mode 100644 index 0000000000..4cafdf5506 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-5f9f7bf290ea80a41025c30b0ffd1db1.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-5f9f7bf290ea80a41025c30b0ffd1db1 + +info: + name: > + WP Fastest Cache <= 0.8.5.7 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebe25a7-fa4d-4e3f-b969-2ff3a8388b06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-6c168d1ea28ed0681002f0d31c5c68ec.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-6c168d1ea28ed0681002f0d31c5c68ec.yaml new file mode 100644 index 0000000000..83cde4e53d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-6c168d1ea28ed0681002f0d31c5c68ec.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-6c168d1ea28ed0681002f0d31c5c68ec + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'wpfc_toolbar_save_settings_callback' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a87f610a-c1ef-4365-bd74-569989587d41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-781be145445f4ecc9aced0ff98acc796.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-781be145445f4ecc9aced0ff98acc796.yaml new file mode 100644 index 0000000000..352bff1158 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-781be145445f4ecc9aced0ff98acc796.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-781be145445f4ecc9aced0ff98acc796 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'wpfc_preload_single_save_settings_callback' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/024f4058-065b-48b4-a08a-d9732d4375cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-7bdbbcae3cce706a901ef3f3a6b92425.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-7bdbbcae3cce706a901ef3f3a6b92425.yaml new file mode 100644 index 0000000000..aec80c3715 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-7bdbbcae3cce706a901ef3f3a6b92425.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-7bdbbcae3cce706a901ef3f3a6b92425 + +info: + name: > + WP Fastest Cache < 0.8.3.5 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df32e1d0-3645-432c-a2e4-2d63709c4ffd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-87d8a616e4f6cf2eb5659e011debac27.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-87d8a616e4f6cf2eb5659e011debac27.yaml new file mode 100644 index 0000000000..dac4499e5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-87d8a616e4f6cf2eb5659e011debac27.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-87d8a616e4f6cf2eb5659e011debac27 + +info: + name: > + WP Fastest Cache <= 0.8.8.5 - Cross-Site Scripting via the rules[0][content] parameter in a wpfc_save_exclude_pages action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef6538e7-8cde-4c49-9965-0624a25ffe65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-880d7d40699b96b833547889085219bd.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-880d7d40699b96b833547889085219bd.yaml new file mode 100644 index 0000000000..66458f9af5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-880d7d40699b96b833547889085219bd.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-880d7d40699b96b833547889085219bd + +info: + name: > + WP Fastest Cache <= 1.1.4 - Authenticated(Administrator+) Blind Server Side Request Forgery via check_url + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b937940c-a3e0-49d3-b066-550b78351b54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-8cc833441ebc75f63db145d2a0ea886f.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-8cc833441ebc75f63db145d2a0ea886f.yaml new file mode 100644 index 0000000000..4db264f63d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-8cc833441ebc75f63db145d2a0ea886f.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-8cc833441ebc75f63db145d2a0ea886f + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'wpfc_clear_cache_of_allsites_callback' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/096257a4-6ee9-41e1-8a59-4ffcd309f83c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-a5a9392a98391031218baa6258f9a301.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-a5a9392a98391031218baa6258f9a301.yaml new file mode 100644 index 0000000000..17592eee98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-a5a9392a98391031218baa6258f9a301.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-a5a9392a98391031218baa6258f9a301 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'wpfc_pause_cdn_integration_ajax_request_callback' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1743b26-861e-4a61-80de-b8cc82308228?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-a984dcb982c3439de2d89b2a845332c4.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-a984dcb982c3439de2d89b2a845332c4.yaml new file mode 100644 index 0000000000..baa8b5f859 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-a984dcb982c3439de2d89b2a845332c4.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-a984dcb982c3439de2d89b2a845332c4 + +info: + name: > + WP Fastest Cache < 0.9.5 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/859fe629-701e-4d47-8e90-59860f7c6b82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-aa83e2ade173c8a794348dca58308ca5.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-aa83e2ade173c8a794348dca58308ca5.yaml new file mode 100644 index 0000000000..7b14b941c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-aa83e2ade173c8a794348dca58308ca5.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-aa83e2ade173c8a794348dca58308ca5 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'deleteCacheToolbar' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b793a4cb-3130-428e-9b61-8ce29fcdaf70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-aee951aa25d6cb6b8a83ee793cc48cd4.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-aee951aa25d6cb6b8a83ee793cc48cd4.yaml new file mode 100644 index 0000000000..b265833882 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-aee951aa25d6cb6b8a83ee793cc48cd4.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-aee951aa25d6cb6b8a83ee793cc48cd4 + +info: + name: > + WP Fastest Cache <= 0.8.9.0 - Directory Traversal to Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d1ad409-d5d3-4231-9a7c-de881c7b9de2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-b042f2e0c8fff5912a04fa9b2c227c26.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-b042f2e0c8fff5912a04fa9b2c227c26.yaml new file mode 100644 index 0000000000..2b8072abbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-b042f2e0c8fff5912a04fa9b2c227c26.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-b042f2e0c8fff5912a04fa9b2c227c26 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'wpfc_start_cdn_integration_ajax_request_callback' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17c7c61d-c110-448e-ad8a-bc1c00393524?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-b07a02f9d4db7fe492ff4a4ebc6a38ba.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-b07a02f9d4db7fe492ff4a4ebc6a38ba.yaml new file mode 100644 index 0000000000..02fd301e6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-b07a02f9d4db7fe492ff4a4ebc6a38ba.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-b07a02f9d4db7fe492ff4a4ebc6a38ba + +info: + name: > + WP Fastest Cache <= 0.9.0.2 - Authenticated (Subscriber+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82f80916-37ab-4c5a-9787-2544c620acac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-c154f039f669a6109ec8e5a85b87164a.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-c154f039f669a6109ec8e5a85b87164a.yaml new file mode 100644 index 0000000000..10c56726e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-c154f039f669a6109ec8e5a85b87164a.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-c154f039f669a6109ec8e5a85b87164a + +info: + name: > + WP Fastest Cache <= 0.8.8.5 - Cross-Site Request Forgery via page to wpfastestcacheoptions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5965a8b6-116e-4029-9a76-b64c03c25ece?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-c21f1786e3abdb7c657091d8024583d5.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-c21f1786e3abdb7c657091d8024583d5.yaml new file mode 100644 index 0000000000..b79a9c9627 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-c21f1786e3abdb7c657091d8024583d5.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-c21f1786e3abdb7c657091d8024583d5 + +info: + name: > + WP Fastest Cache < 0.9.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/372a4550-c38e-46d6-b7f2-15e05708d128?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-c81b4ef2016d652c733da1bfa6c2e44c.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-c81b4ef2016d652c733da1bfa6c2e44c.yaml new file mode 100644 index 0000000000..2512f48c6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-c81b4ef2016d652c733da1bfa6c2e44c.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-c81b4ef2016d652c733da1bfa6c2e44c + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'deleteCssAndJsCacheToolbar' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d3858f5-3f13-400c-acf4-eb3dc3a43308?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-cda6fd724330a43ee464ed21db562f0f.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-cda6fd724330a43ee464ed21db562f0f.yaml new file mode 100644 index 0000000000..8235df41d8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-cda6fd724330a43ee464ed21db562f0f.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-cda6fd724330a43ee464ed21db562f0f + +info: + name: > + WP Fastest Cache <= 1.1.2 - Missing Authorization in 'wpfc_clear_cache_of_allsites_callback' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bae67a68-4bd1-4b52-b3dd-af0eef014028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-da0ca9a834853b4f5e811265296c5adc.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-da0ca9a834853b4f5e811265296c5adc.yaml new file mode 100644 index 0000000000..d124994f7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-da0ca9a834853b4f5e811265296c5adc.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-da0ca9a834853b4f5e811265296c5adc + +info: + name: > + WP Fastest Cache <= 1.2.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/876efd71-8867-44b8-8017-86fad2a1b89f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-dca77da230ccc48431ba72fffaf1572c.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-dca77da230ccc48431ba72fffaf1572c.yaml new file mode 100644 index 0000000000..5a926a1527 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-dca77da230ccc48431ba72fffaf1572c.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-dca77da230ccc48431ba72fffaf1572c + +info: + name: > + WP Fastest Cache <= 1.1.2 - Missing Authorization in 'wpfc_preload_single_callback' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56a90042-a6c0-4487-811b-ced23c97f9f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-e73d249d01ad89f85ce6653e71044320.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-e73d249d01ad89f85ce6653e71044320.yaml new file mode 100644 index 0000000000..02d271f9f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-e73d249d01ad89f85ce6653e71044320.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-e73d249d01ad89f85ce6653e71044320 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Missing Authorization in 'deleteCssAndJsCacheToolbar' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4bb2d72-ff31-4220-acb3-ed17bb9229b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-e894ea885bc953386f78fce46ae1e024.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-e894ea885bc953386f78fce46ae1e024.yaml new file mode 100644 index 0000000000..79d2110dac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-e894ea885bc953386f78fce46ae1e024.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-e894ea885bc953386f78fce46ae1e024 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'wpfc_preload_single_callback' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c8034ff-cf36-498f-9efc-a4e6bbb92b2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-eff26e4e38ea08eb75bc359769b06555.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-eff26e4e38ea08eb75bc359769b06555.yaml new file mode 100644 index 0000000000..c44a8415d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-eff26e4e38ea08eb75bc359769b06555.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-eff26e4e38ea08eb75bc359769b06555 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'wpfc_purgecache_varnish_callback' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8e90994-3b5c-4ae6-a27f-890a9101b440?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-f28e9e3f4825fae9f836906b103e0875.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-f28e9e3f4825fae9f836906b103e0875.yaml new file mode 100644 index 0000000000..0e16b1e6ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-f28e9e3f4825fae9f836906b103e0875.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-f28e9e3f4825fae9f836906b103e0875 + +info: + name: > + WP Fastest Cache <= 0.8.5.9 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8fe4aa7-13e6-48ec-afec-2888edd999f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-fc23a4effa46a10b3b1c7e7c56d41874.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-fc23a4effa46a10b3b1c7e7c56d41874.yaml new file mode 100644 index 0000000000..41307f04ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-fc23a4effa46a10b3b1c7e7c56d41874.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-fc23a4effa46a10b3b1c7e7c56d41874 + +info: + name: > + WP Fastest Cache <= 1.1.2 - Missing Authorization in 'wpfc_purgecache_varnish_callback' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e567aec-07e5-494a-936d-93b40d3e3043?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fastest-cache-feb6288652d7faad54d04d9b1b85ce3b.yaml b/nuclei-templates/cve-less/plugins/wp-fastest-cache-feb6288652d7faad54d04d9b1b85ce3b.yaml new file mode 100644 index 0000000000..81f5355c6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fastest-cache-feb6288652d7faad54d04d9b1b85ce3b.yaml @@ -0,0 +1,58 @@ +id: wp-fastest-cache-feb6288652d7faad54d04d9b1b85ce3b + +info: + name: > + WP Fastest Cache <= 1.1.2 - Cross-Site Request Forgery via 'wpfc_remove_cdn_integration_ajax_request_callback' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49ba5cfa-c2cc-49ac-b22d-7e36ccca6ac5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fastest-cache/" + google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fastest-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fastest-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-favorite-posts-7d31af080da908940b0bf5332e53662b.yaml b/nuclei-templates/cve-less/plugins/wp-favorite-posts-7d31af080da908940b0bf5332e53662b.yaml new file mode 100644 index 0000000000..9ad15b828f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-favorite-posts-7d31af080da908940b0bf5332e53662b.yaml @@ -0,0 +1,58 @@ +id: wp-favorite-posts-7d31af080da908940b0bf5332e53662b + +info: + name: > + WP Favorite Posts <= 1.6.5 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2211d0d0-e7ab-485f-81b0-f52f87b7d01e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-favorite-posts/" + google-query: inurl:"/wp-content/plugins/wp-favorite-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-favorite-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-favorite-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-favorite-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-1649363ae97196f303e072aa7eb1a4bc.yaml b/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-1649363ae97196f303e072aa7eb1a4bc.yaml new file mode 100644 index 0000000000..56cd24e88e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-1649363ae97196f303e072aa7eb1a4bc.yaml @@ -0,0 +1,58 @@ +id: wp-fb-autoconnect-1649363ae97196f303e072aa7eb1a4bc + +info: + name: > + WP-FB-AutoConnect <= 4.0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d118beb2-bcb1-4d35-b25e-172fa4b6d916?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fb-autoconnect/" + google-query: inurl:"/wp-content/plugins/wp-fb-autoconnect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fb-autoconnect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fb-autoconnect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fb-autoconnect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-92964841ce29c9fa3f7d3cfce6a290be.yaml b/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-92964841ce29c9fa3f7d3cfce6a290be.yaml new file mode 100644 index 0000000000..5ba624b46b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-92964841ce29c9fa3f7d3cfce6a290be.yaml @@ -0,0 +1,58 @@ +id: wp-fb-autoconnect-92964841ce29c9fa3f7d3cfce6a290be + +info: + name: > + WP-FB-AutoConnect <= 4.6.1 - Cross-Site Request Forgery via jfb_admin_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eab1fe39-dda2-49c9-9c76-c1127626a85c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fb-autoconnect/" + google-query: inurl:"/wp-content/plugins/wp-fb-autoconnect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fb-autoconnect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fb-autoconnect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fb-autoconnect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-c2d92bf1dd144f0becd8dbed310ba478.yaml b/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-c2d92bf1dd144f0becd8dbed310ba478.yaml new file mode 100644 index 0000000000..6d38e25334 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fb-autoconnect-c2d92bf1dd144f0becd8dbed310ba478.yaml @@ -0,0 +1,58 @@ +id: wp-fb-autoconnect-c2d92bf1dd144f0becd8dbed310ba478 + +info: + name: > + WP Social AutoConnect <= 4.6.1 - Cross-Site Request Forgery via jfb_admin_page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50f69182-66c0-4d3a-aabe-015b72937f3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fb-autoconnect/" + google-query: inurl:"/wp-content/plugins/wp-fb-autoconnect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fb-autoconnect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fb-autoconnect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fb-autoconnect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-featured-content-and-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/wp-featured-content-and-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..ccaabf4d77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-featured-content-and-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: wp-featured-content-and-slider-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-featured-content-and-slider/" + google-query: inurl:"/wp-content/plugins/wp-featured-content-and-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-featured-content-and-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-featured-content-and-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-featured-content-and-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fevents-book-0b46297c5a1cfd566b6a7dde332d02ec.yaml b/nuclei-templates/cve-less/plugins/wp-fevents-book-0b46297c5a1cfd566b6a7dde332d02ec.yaml new file mode 100644 index 0000000000..33f6b233e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fevents-book-0b46297c5a1cfd566b6a7dde332d02ec.yaml @@ -0,0 +1,58 @@ +id: wp-fevents-book-0b46297c5a1cfd566b6a7dde332d02ec + +info: + name: > + WP FEvents Book <= 0.46 - Authenticated (Subscriber+) Insecure Direct Object Reference to Booking Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f63d494c-1d1e-4faa-930a-3fcf2b136182?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fevents-book/" + google-query: inurl:"/wp-content/plugins/wp-fevents-book/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fevents-book,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fevents-book/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fevents-book" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fevents-book-6baff9c0f37923203f19e1b9ed3bec89.yaml b/nuclei-templates/cve-less/plugins/wp-fevents-book-6baff9c0f37923203f19e1b9ed3bec89.yaml new file mode 100644 index 0000000000..f2483d87bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fevents-book-6baff9c0f37923203f19e1b9ed3bec89.yaml @@ -0,0 +1,58 @@ +id: wp-fevents-book-6baff9c0f37923203f19e1b9ed3bec89 + +info: + name: > + WP FEvents Book <= 0.46 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/088aead8-37bb-4277-81e0-b7e2c13e9072?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fevents-book/" + google-query: inurl:"/wp-content/plugins/wp-fevents-book/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fevents-book,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fevents-book/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fevents-book" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-download-light-91e729c82f2d9f67d872d81509700a6c.yaml b/nuclei-templates/cve-less/plugins/wp-file-download-light-91e729c82f2d9f67d872d81509700a6c.yaml new file mode 100644 index 0000000000..6190971283 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-download-light-91e729c82f2d9f67d872d81509700a6c.yaml @@ -0,0 +1,58 @@ +id: wp-file-download-light-91e729c82f2d9f67d872d81509700a6c + +info: + name: > + WP File Download Light <= 1.3.3 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb2f764f-1e50-4e42-9b70-88f9967906fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-download-light/" + google-query: inurl:"/wp-content/plugins/wp-file-download-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-download-light,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-download-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-download-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-get-contents-255053b922939496ac6eb4ab1dee395c.yaml b/nuclei-templates/cve-less/plugins/wp-file-get-contents-255053b922939496ac6eb4ab1dee395c.yaml new file mode 100644 index 0000000000..c45c0455eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-get-contents-255053b922939496ac6eb4ab1dee395c.yaml @@ -0,0 +1,58 @@ +id: wp-file-get-contents-255053b922939496ac6eb4ab1dee395c + +info: + name: > + JSM file_get_contents() Shortcode <= 2.7.0 - Authenticated (Contributor+) Server-Side Request Forgery via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/191d5bcc-70d8-430b-9215-00ffdc04be87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-get-contents/" + google-query: inurl:"/wp-content/plugins/wp-file-get-contents/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-get-contents,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-get-contents/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-get-contents" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-04ad31792d5c51d45b79863f46499a91.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-04ad31792d5c51d45b79863f46499a91.yaml new file mode 100644 index 0000000000..6830570b02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-04ad31792d5c51d45b79863f46499a91.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-04ad31792d5c51d45b79863f46499a91 + +info: + name: > + WP File Manager <= 7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb088999-0727-4645-890b-f584b85cda48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-125b5a46ac07b4fbf1d6669e65082c22.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-125b5a46ac07b4fbf1d6669e65082c22.yaml new file mode 100644 index 0000000000..ef4591b5fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-125b5a46ac07b4fbf1d6669e65082c22.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-125b5a46ac07b4fbf1d6669e65082c22 + +info: + name: > + File Manager <= 7.2.4 - Cross-Site Request Forgery to Local JS File Inclusion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57cc15a6-2cf5-481f-bb81-ada48aa74009?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-1560744dca5de73758ff3516e44b8c1d.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-1560744dca5de73758ff3516e44b8c1d.yaml new file mode 100644 index 0000000000..bb15991dce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-1560744dca5de73758ff3516e44b8c1d.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-1560744dca5de73758ff3516e44b8c1d + +info: + name: > + File Manager <= 3.0 - Unauthenticated Arbitrary File Upload/Download + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a56d5a2f-ae13-4523-bc4a-17bb2fb4c6f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-51f90b4356078332ed05b86ecb626225.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-51f90b4356078332ed05b86ecb626225.yaml new file mode 100644 index 0000000000..a2e5f88586 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-51f90b4356078332ed05b86ecb626225.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-51f90b4356078332ed05b86ecb626225 + +info: + name: > + File Manager <= 6.8 - Arbitrary File Upload/Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dab7e451-f2ea-4f41-8e38-a2a983ccb18b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-6943b3fa4f51347e8c8fc20d043e8814.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-6943b3fa4f51347e8c8fc20d043e8814.yaml new file mode 100644 index 0000000000..debe14e9ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-6943b3fa4f51347e8c8fc20d043e8814.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-6943b3fa4f51347e8c8fc20d043e8814 + +info: + name: > + File Manager <= 3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e93632e3-7321-48ee-828a-c539e16f07b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-7b25308fe9b7c95a04987753945e2077.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-7b25308fe9b7c95a04987753945e2077.yaml new file mode 100644 index 0000000000..3fe4b9d6ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-7b25308fe9b7c95a04987753945e2077.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-7b25308fe9b7c95a04987753945e2077 + +info: + name: > + File Manager <= 7.2.1 - Sensitive Information Exposure via Backup Filenames + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1928f8e4-8bbe-4a3f-8284-aa12ca2f5176?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-8ce49b249ec2d999d67fd390598bddc7.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-8ce49b249ec2d999d67fd390598bddc7.yaml new file mode 100644 index 0000000000..cfeb2d8325 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-8ce49b249ec2d999d67fd390598bddc7.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-8ce49b249ec2d999d67fd390598bddc7 + +info: + name: > + File Manager And File Manager Pro (Multiple Versions) - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93f377a1-2c33-4dd7-8fd6-190d9148e804?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-ab69897227314aa3081e7c66ae76a1a8.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-ab69897227314aa3081e7c66ae76a1a8.yaml new file mode 100644 index 0000000000..12c2211164 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-ab69897227314aa3081e7c66ae76a1a8.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-ab69897227314aa3081e7c66ae76a1a8 + +info: + name: > + WP File Manager <= 6.4 - Unauthenticated Resource Access to Site Backups + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46438bd3-7c4a-4939-ab46-05dc8bbe461f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-e2709c74f557b8f05efa6466674d741e.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-e2709c74f557b8f05efa6466674d741e.yaml new file mode 100644 index 0000000000..6d46579864 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-e2709c74f557b8f05efa6466674d741e.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-e2709c74f557b8f05efa6466674d741e + +info: + name: > + File Manager <= 3.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6208afdb-502c-44e8-b50a-22fa87ee80df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-e29d6db8a3a02793b21f4d3bff2f8cc9.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-e29d6db8a3a02793b21f4d3bff2f8cc9.yaml new file mode 100644 index 0000000000..e087db00ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-e29d6db8a3a02793b21f4d3bff2f8cc9.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-e29d6db8a3a02793b21f4d3bff2f8cc9 + +info: + name: > + File Manager <= 4.8 - Missing Authorization on AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/077b3483-ab1c-401d-aa67-c4da5fca90b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-f02efca96aea9cf0bcb75d72789d8419.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-f02efca96aea9cf0bcb75d72789d8419.yaml new file mode 100644 index 0000000000..30f537a1d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-f02efca96aea9cf0bcb75d72789d8419.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-f02efca96aea9cf0bcb75d72789d8419 + +info: + name: > + File Manager <= 7.2.5 - Authenticated (Administrator+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca98fbc6-8cfa-4997-8a46-344afb75a97e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-fd8eab398a722e719e1bf89dd3138490.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-fd8eab398a722e719e1bf89dd3138490.yaml new file mode 100644 index 0000000000..a6fccc1676 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-fd8eab398a722e719e1bf89dd3138490.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-fd8eab398a722e719e1bf89dd3138490 + +info: + name: > + File Manager <= 2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69e92c75-5b14-43d9-a169-a1f8b51ab41d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager/" + google-query: inurl:"/wp-content/plugins/wp-file-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-pro-8ce49b249ec2d999d67fd390598bddc7.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-pro-8ce49b249ec2d999d67fd390598bddc7.yaml new file mode 100644 index 0000000000..ea6092379e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-pro-8ce49b249ec2d999d67fd390598bddc7.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-pro-8ce49b249ec2d999d67fd390598bddc7 + +info: + name: > + File Manager And File Manager Pro (Multiple Versions) - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93f377a1-2c33-4dd7-8fd6-190d9148e804?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager-pro/" + google-query: inurl:"/wp-content/plugins/wp-file-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-pro-d3109a73b6d87d8103efae9f126590cb.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-pro-d3109a73b6d87d8103efae9f126590cb.yaml new file mode 100644 index 0000000000..8cbb3b2fe0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-pro-d3109a73b6d87d8103efae9f126590cb.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-pro-d3109a73b6d87d8103efae9f126590cb + +info: + name: > + File Manager Pro <= 8.3.4 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e8e0257-a745-495f-a103-c032b95209fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager-pro/" + google-query: inurl:"/wp-content/plugins/wp-file-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-manager-pro-f7fdc67eadf58def32919b2ae093d4d8.yaml b/nuclei-templates/cve-less/plugins/wp-file-manager-pro-f7fdc67eadf58def32919b2ae093d4d8.yaml new file mode 100644 index 0000000000..b5ab85c1b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-manager-pro-f7fdc67eadf58def32919b2ae093d4d8.yaml @@ -0,0 +1,58 @@ +id: wp-file-manager-pro-f7fdc67eadf58def32919b2ae093d4d8 + +info: + name: > + File Manager Pro <= 8.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94750424-bb52-4236-962e-aa8cbdeb1459?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-manager-pro/" + google-query: inurl:"/wp-content/plugins/wp-file-manager-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-manager-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-manager-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-manager-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-1145c2b3c9a783cc9ddbd56cf0e9e202.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-1145c2b3c9a783cc9ddbd56cf0e9e202.yaml new file mode 100644 index 0000000000..6b5a3a3137 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-1145c2b3c9a783cc9ddbd56cf0e9e202.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-1145c2b3c9a783cc9ddbd56cf0e9e202 + +info: + name: > + WordPress File Upload <= 4.12.2 - Directory Traversal to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb5a65a2-e748-4c23-8cae-cb0a7de74911?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.12.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-12655be83937ecd726e038deb4f658d4.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-12655be83937ecd726e038deb4f658d4.yaml new file mode 100644 index 0000000000..127167f760 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-12655be83937ecd726e038deb4f658d4.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-12655be83937ecd726e038deb4f658d4 + +info: + name: > + WordPress File Upload < 3.9.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ada8a27-752c-4726-b330-895b967ea290?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-12fc948c06bbe2558fcf0a602f5f480e.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-12fc948c06bbe2558fcf0a602f5f480e.yaml new file mode 100644 index 0000000000..e9b31ce4ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-12fc948c06bbe2558fcf0a602f5f480e.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-12fc948c06bbe2558fcf0a602f5f480e + +info: + name: > + WordPress File Upload / WordPress File Upload Pro <= 4.19.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23334d94-e5b8-4c88-8765-02ad19e17248?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-1d2216e58fa97236cb9e7bf56c440d7a.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-1d2216e58fa97236cb9e7bf56c440d7a.yaml new file mode 100644 index 0000000000..9b128e9922 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-1d2216e58fa97236cb9e7bf56c440d7a.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-1d2216e58fa97236cb9e7bf56c440d7a + +info: + name: > + WordPress File Upload < 2.4.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3083afd-ca84-4088-8e72-95254d56a0c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-1ea0fe6e846ccbee16701a333d122fbe.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-1ea0fe6e846ccbee16701a333d122fbe.yaml new file mode 100644 index 0000000000..c28b93c60c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-1ea0fe6e846ccbee16701a333d122fbe.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-1ea0fe6e846ccbee16701a333d122fbe + +info: + name: > + WordPress File Upload <= 4.16.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Malicious SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19e9a9f7-d2e3-4ebb-b121-99c7c81ede4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-257266db439be46c584223cbad6695eb.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-257266db439be46c584223cbad6695eb.yaml new file mode 100644 index 0000000000..c94141a691 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-257266db439be46c584223cbad6695eb.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-257266db439be46c584223cbad6695eb + +info: + name: > + WordPress File Upload <= 3.4.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd8e6b8a-0161-4bf7-b480-77258337e9b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-3384b3561233822afc35f30b762beb0e.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-3384b3561233822afc35f30b762beb0e.yaml new file mode 100644 index 0000000000..588044c032 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-3384b3561233822afc35f30b762beb0e.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-3384b3561233822afc35f30b762beb0e + +info: + name: > + WordPress File Upload <= 4.16.2 - Authenticated Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/499483a0-957b-459e-b2f5-fc39c4f86c9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-392e3e13340828fa089ab176edcbfb0e.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-392e3e13340828fa089ab176edcbfb0e.yaml new file mode 100644 index 0000000000..3650879873 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-392e3e13340828fa089ab176edcbfb0e.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-392e3e13340828fa089ab176edcbfb0e + +info: + name: > + Wordpress File Upload <= 4.23.2 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e1915d9-8ea9-4ab2-9746-3c49bc0bd7c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-50251b72083cccfc7a4f498fee677478.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-50251b72083cccfc7a4f498fee677478.yaml new file mode 100644 index 0000000000..2a9bfb3a18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-50251b72083cccfc7a4f498fee677478.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-50251b72083cccfc7a4f498fee677478 + +info: + name: > + WordPress File Upload <= 2.4.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85bea3da-f54a-4a77-9abe-6c24bbdcc25c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-558dd2abba5a0995e4e08d93b33b9766.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-558dd2abba5a0995e4e08d93b33b9766.yaml new file mode 100644 index 0000000000..92300a3256 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-558dd2abba5a0995e4e08d93b33b9766.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-558dd2abba5a0995e4e08d93b33b9766 + +info: + name: > + WordPress File Upload < 2.7.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65a02152-be62-4e27-8a31-e88f23e0236f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-6bee4ceb90dc1010814fe03431f27200.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-6bee4ceb90dc1010814fe03431f27200.yaml new file mode 100644 index 0000000000..d111e6563b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-6bee4ceb90dc1010814fe03431f27200.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-6bee4ceb90dc1010814fe03431f27200 + +info: + name: > + WordPress File Upload / WordPress File Upload Pro <= 4.19.1 - Authenticated (Administrator+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abd6eeac-0a7e-4762-809f-593cd85f303d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-7723e642214a4cc19dd0a90f922c5611.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-7723e642214a4cc19dd0a90f922c5611.yaml new file mode 100644 index 0000000000..baee066d9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-7723e642214a4cc19dd0a90f922c5611.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-7723e642214a4cc19dd0a90f922c5611 + +info: + name: > + WordPress File Upload / WordPress File Upload Pro <= 4.16.2 - Authenticated (Contributor+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9cc0348-396e-4be1-92f5-851d20804ef5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-8e67911649c9d62ea26bf9814db29d96.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-8e67911649c9d62ea26bf9814db29d96.yaml new file mode 100644 index 0000000000..f892a68bd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-8e67911649c9d62ea26bf9814db29d96.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-8e67911649c9d62ea26bf9814db29d96 + +info: + name: > + WordPress File Upload <= 4.24.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f665099-d1c3-43a9-b37b-c9f42c9172ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.24.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-90d37fd2fba0470460729c814dc702e8.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-90d37fd2fba0470460729c814dc702e8.yaml new file mode 100644 index 0000000000..5fecbb484c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-90d37fd2fba0470460729c814dc702e8.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-90d37fd2fba0470460729c814dc702e8 + +info: + name: > + WordPress File Upload <= 4.3.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd60fa87-d3da-4e3f-bd9b-b9d117bdbc4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-95115eb6cd7773daea0c3290d4bc4306.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-95115eb6cd7773daea0c3290d4bc4306.yaml new file mode 100644 index 0000000000..3e1c216f7f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-95115eb6cd7773daea0c3290d4bc4306.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-95115eb6cd7773daea0c3290d4bc4306 + +info: + name: > + WordPress File Upload <= 4.3.2 - Cross-Site Scripting via Shortcodes + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d65a987-e8a6-4615-b681-9f48b7caed4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-c497e96a3198128f634a2cba43cbd62b.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-c497e96a3198128f634a2cba43cbd62b.yaml new file mode 100644 index 0000000000..009715d210 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-c497e96a3198128f634a2cba43cbd62b.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-c497e96a3198128f634a2cba43cbd62b + +info: + name: > + WordPress File Upload <= 2.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a85eec18-49cc-44c0-ac86-ccc192a621a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-c865a729c4dbcf73f4c0bf83297ccf74.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-c865a729c4dbcf73f4c0bf83297ccf74.yaml new file mode 100644 index 0000000000..07ba3ce773 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-c865a729c4dbcf73f4c0bf83297ccf74.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-c865a729c4dbcf73f4c0bf83297ccf74 + +info: + name: > + WordPress File Upload <= 4.16.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7534f2e5-a296-4c54-99e3-d84f5c9a5b51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.16.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-e144ec17062b8eeed75efab5b0c01953.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-e144ec17062b8eeed75efab5b0c01953.yaml new file mode 100644 index 0000000000..a87079ca29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-e144ec17062b8eeed75efab5b0c01953.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-e144ec17062b8eeed75efab5b0c01953 + +info: + name: > + Wordpress File Upload 4.24.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6048088-c11c-4741-8dde-da707f8f84f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.24.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-upload-ee7a8e2edf67246d96fc10ab588599db.yaml b/nuclei-templates/cve-less/plugins/wp-file-upload-ee7a8e2edf67246d96fc10ab588599db.yaml new file mode 100644 index 0000000000..f25fbb93a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-upload-ee7a8e2edf67246d96fc10ab588599db.yaml @@ -0,0 +1,58 @@ +id: wp-file-upload-ee7a8e2edf67246d96fc10ab588599db + +info: + name: > + WordPress File Upload < 3.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffeb4b5e-4c83-4b0e-a513-6b5cada95073?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-upload/" + google-query: inurl:"/wp-content/plugins/wp-file-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-upload,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-file-uploader-4f06deea31f34880211b0c4ef80881fe.yaml b/nuclei-templates/cve-less/plugins/wp-file-uploader-4f06deea31f34880211b0c4ef80881fe.yaml new file mode 100644 index 0000000000..9eb22e6639 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-file-uploader-4f06deea31f34880211b0c4ef80881fe.yaml @@ -0,0 +1,58 @@ +id: wp-file-uploader-4f06deea31f34880211b0c4ef80881fe + +info: + name: > + WordPress File Uploader <= 1.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae5b5f1-77a7-4626-a9b5-6f146c32a6db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-file-uploader/" + google-query: inurl:"/wp-content/plugins/wp-file-uploader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-file-uploader,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-file-uploader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-file-uploader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-filebase-5624e3de57e88dce47b0f6296615cfd9.yaml b/nuclei-templates/cve-less/plugins/wp-filebase-5624e3de57e88dce47b0f6296615cfd9.yaml new file mode 100644 index 0000000000..bb8b3f01de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-filebase-5624e3de57e88dce47b0f6296615cfd9.yaml @@ -0,0 +1,58 @@ +id: wp-filebase-5624e3de57e88dce47b0f6296615cfd9 + +info: + name: > + WP-Filebase <= 3.4.23 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94e9a982-a46d-4dda-9145-e7f74cf09820?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-filebase/" + google-query: inurl:"/wp-content/plugins/wp-filebase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-filebase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-filebase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-filebase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-filebase-de989fc706fa629e883c0763f12184c4.yaml b/nuclei-templates/cve-less/plugins/wp-filebase-de989fc706fa629e883c0763f12184c4.yaml new file mode 100644 index 0000000000..acb8bbd26e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-filebase-de989fc706fa629e883c0763f12184c4.yaml @@ -0,0 +1,58 @@ +id: wp-filebase-de989fc706fa629e883c0763f12184c4 + +info: + name: > + WP-Filebase <= 0.2.9.24 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eebfa8de-8a20-4fac-b43a-f7ae674d9184?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-filebase/" + google-query: inurl:"/wp-content/plugins/wp-filebase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-filebase,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-filebase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-filebase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.9.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-filebase-e9c482adf3dbad1f07b295406e0bf073.yaml b/nuclei-templates/cve-less/plugins/wp-filebase-e9c482adf3dbad1f07b295406e0bf073.yaml new file mode 100644 index 0000000000..f06454f3b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-filebase-e9c482adf3dbad1f07b295406e0bf073.yaml @@ -0,0 +1,58 @@ +id: wp-filebase-e9c482adf3dbad1f07b295406e0bf073 + +info: + name: > + WP-Filebase Download Manager <= 0.3.0.03 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5933fc11-8f06-4d58-9483-d06997e5d731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-filebase/" + google-query: inurl:"/wp-content/plugins/wp-filebase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-filebase,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-filebase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-filebase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.0.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-filemanager-de2762b35b84b3a5bdda7739f2f6324a.yaml b/nuclei-templates/cve-less/plugins/wp-filemanager-de2762b35b84b3a5bdda7739f2f6324a.yaml new file mode 100644 index 0000000000..b6d0a12877 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-filemanager-de2762b35b84b3a5bdda7739f2f6324a.yaml @@ -0,0 +1,58 @@ +id: wp-filemanager-de2762b35b84b3a5bdda7739f2f6324a + +info: + name: > + Wp-FileManager <= 1.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/117e797a-1878-4b5f-9846-4a73b5396ece?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-filemanager/" + google-query: inurl:"/wp-content/plugins/wp-filemanager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-filemanager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-filemanager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-filemanager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-film-studio-074487038ea654261d72956b1f3003fc.yaml b/nuclei-templates/cve-less/plugins/wp-film-studio-074487038ea654261d72956b1f3003fc.yaml new file mode 100644 index 0000000000..09cb3f58cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-film-studio-074487038ea654261d72956b1f3003fc.yaml @@ -0,0 +1,58 @@ +id: wp-film-studio-074487038ea654261d72956b1f3003fc + +info: + name: > + WP Film Studio <= 1.3.4 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae5121bd-2f3f-4d87-a2fd-d11bb9f8dc2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-film-studio/" + google-query: inurl:"/wp-content/plugins/wp-film-studio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-film-studio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-film-studio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-film-studio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-flash-player-23ae728eb43f332c22abd8b17feda1e5.yaml b/nuclei-templates/cve-less/plugins/wp-flash-player-23ae728eb43f332c22abd8b17feda1e5.yaml new file mode 100644 index 0000000000..039036d64b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-flash-player-23ae728eb43f332c22abd8b17feda1e5.yaml @@ -0,0 +1,58 @@ +id: wp-flash-player-23ae728eb43f332c22abd8b17feda1e5 + +info: + name: > + FLASH PLAYER PLUGIN <= 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70544986-af4a-48e4-8497-8ee78589676e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-flash-player/" + google-query: inurl:"/wp-content/plugins/wp-flash-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-flash-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-flash-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-flash-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-flipclock-d86c9fbec6faeed6e24c9e1120c7e0c6.yaml b/nuclei-templates/cve-less/plugins/wp-flipclock-d86c9fbec6faeed6e24c9e1120c7e0c6.yaml new file mode 100644 index 0000000000..564eec6662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-flipclock-d86c9fbec6faeed6e24c9e1120c7e0c6.yaml @@ -0,0 +1,58 @@ +id: wp-flipclock-d86c9fbec6faeed6e24c9e1120c7e0c6 + +info: + name: > + WP Flipclock <= 1.7.4 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/376404a5-176e-4c73-8281-27b138218879?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-flipclock/" + google-query: inurl:"/wp-content/plugins/wp-flipclock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-flipclock,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-flipclock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-flipclock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-floating-menu-4aff32f6f1228de170ce7ff458bf1831.yaml b/nuclei-templates/cve-less/plugins/wp-floating-menu-4aff32f6f1228de170ce7ff458bf1831.yaml new file mode 100644 index 0000000000..a716e44440 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-floating-menu-4aff32f6f1228de170ce7ff458bf1831.yaml @@ -0,0 +1,58 @@ +id: wp-floating-menu-4aff32f6f1228de170ce7ff458bf1831 + +info: + name: > + WP Floating Menu <= 1.4.0 - Cross-Site Scripting via id Parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1b8ac82-4c2d-44bf-ac9e-1c1abead0613?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-floating-menu/" + google-query: inurl:"/wp-content/plugins/wp-floating-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-floating-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-floating-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-floating-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-flybox-216ef8528cdb19a4a187eee0e2877db5.yaml b/nuclei-templates/cve-less/plugins/wp-flybox-216ef8528cdb19a4a187eee0e2877db5.yaml new file mode 100644 index 0000000000..cbe858d5ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-flybox-216ef8528cdb19a4a187eee0e2877db5.yaml @@ -0,0 +1,58 @@ +id: wp-flybox-216ef8528cdb19a4a187eee0e2877db5 + +info: + name: > + WP-FlyBox <= 6.46 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09c60d0a-bc1f-407f-aa0e-2ae0b7db5ae3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-flybox/" + google-query: inurl:"/wp-content/plugins/wp-flybox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-flybox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-flybox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-flybox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-font-awesome-7e2bbcff98524a357bbf2e605454a087.yaml b/nuclei-templates/cve-less/plugins/wp-font-awesome-7e2bbcff98524a357bbf2e605454a087.yaml new file mode 100644 index 0000000000..1fdd885f02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-font-awesome-7e2bbcff98524a357bbf2e605454a087.yaml @@ -0,0 +1,58 @@ +id: wp-font-awesome-7e2bbcff98524a357bbf2e605454a087 + +info: + name: > + WP Font Awesome <= 1.7.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9c4c5c-78cd-4c58-911a-fb67de0c1dca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-font-awesome/" + google-query: inurl:"/wp-content/plugins/wp-font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-font-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-font-awesome-cedcad8fb42c104219ce15d5179e2ec0.yaml b/nuclei-templates/cve-less/plugins/wp-font-awesome-cedcad8fb42c104219ce15d5179e2ec0.yaml new file mode 100644 index 0000000000..48d8ca6d23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-font-awesome-cedcad8fb42c104219ce15d5179e2ec0.yaml @@ -0,0 +1,58 @@ +id: wp-font-awesome-cedcad8fb42c104219ce15d5179e2ec0 + +info: + name: > + WP Font Awesome <= 1.7.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59ee0b56-c11f-4951-aac0-8344200e4484?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-font-awesome/" + google-query: inurl:"/wp-content/plugins/wp-font-awesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-font-awesome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-food-manager-af40b53dc8c1c75f92915027f96fff8f.yaml b/nuclei-templates/cve-less/plugins/wp-food-manager-af40b53dc8c1c75f92915027f96fff8f.yaml new file mode 100644 index 0000000000..4333497db2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-food-manager-af40b53dc8c1c75f92915027f96fff8f.yaml @@ -0,0 +1,58 @@ +id: wp-food-manager-af40b53dc8c1c75f92915027f96fff8f + +info: + name: > + WP Food Manager <= 1.0.3 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a78b274-f83f-4168-a8d2-9ee945518b60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-food-manager/" + google-query: inurl:"/wp-content/plugins/wp-food-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-food-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-food-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-food-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-football-40f4199a368e88456e06377e7668ed2b.yaml b/nuclei-templates/cve-less/plugins/wp-football-40f4199a368e88456e06377e7668ed2b.yaml new file mode 100644 index 0000000000..0dfeccda2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-football-40f4199a368e88456e06377e7668ed2b.yaml @@ -0,0 +1,58 @@ +id: wp-football-40f4199a368e88456e06377e7668ed2b + +info: + name: > + wp-football <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15e06f6e-2a13-490e-8e41-d9f7db8e78e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-football/" + google-query: inurl:"/wp-content/plugins/wp-football/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-football,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-football/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-football" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-footnotes-a8ccc8e656f57b6f03393d18f5ac6d44.yaml b/nuclei-templates/cve-less/plugins/wp-footnotes-a8ccc8e656f57b6f03393d18f5ac6d44.yaml new file mode 100644 index 0000000000..b305ad5a22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-footnotes-a8ccc8e656f57b6f03393d18f5ac6d44.yaml @@ -0,0 +1,58 @@ +id: wp-footnotes-a8ccc8e656f57b6f03393d18f5ac6d44 + +info: + name: > + WP-Footnotes <= 2.2 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8369d83a-bfbf-4e29-8b0b-ceb371a271b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-footnotes/" + google-query: inurl:"/wp-content/plugins/wp-footnotes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-footnotes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-footnotes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-footnotes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-forecast-ac7ff3acb8eeb83f868977100c1901f2.yaml b/nuclei-templates/cve-less/plugins/wp-forecast-ac7ff3acb8eeb83f868977100c1901f2.yaml new file mode 100644 index 0000000000..54c526f458 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-forecast-ac7ff3acb8eeb83f868977100c1901f2.yaml @@ -0,0 +1,58 @@ +id: wp-forecast-ac7ff3acb8eeb83f868977100c1901f2 + +info: + name: > + wp-forecast <= 9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e53cd64c-9278-48cc-8181-1d6c40a05eb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-forecast/" + google-query: inurl:"/wp-content/plugins/wp-forecast/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-forecast,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-forecast/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-forecast" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-forecast-f00922a5d35b3c6ca276e64048795ab0.yaml b/nuclei-templates/cve-less/plugins/wp-forecast-f00922a5d35b3c6ca276e64048795ab0.yaml new file mode 100644 index 0000000000..3c95985952 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-forecast-f00922a5d35b3c6ca276e64048795ab0.yaml @@ -0,0 +1,58 @@ +id: wp-forecast-f00922a5d35b3c6ca276e64048795ab0 + +info: + name: > + wp-forecast <= 7.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0551a2ca-b920-4a60-9c16-0bb14fd63a23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-forecast/" + google-query: inurl:"/wp-content/plugins/wp-forecast/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-forecast,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-forecast/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-forecast" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-67bff2c5d8fb36a5ed2e0ba46f102703.yaml b/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-67bff2c5d8fb36a5ed2e0ba46f102703.yaml new file mode 100644 index 0000000000..74e7d431a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-67bff2c5d8fb36a5ed2e0ba46f102703.yaml @@ -0,0 +1,58 @@ +id: wp-forms-puzzle-captcha-67bff2c5d8fb36a5ed2e0ba46f102703 + +info: + name: > + WP Forms Puzzle Captcha <= 4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c75edd2-fc38-48b1-b58c-1d19c95c3db8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-forms-puzzle-captcha/" + google-query: inurl:"/wp-content/plugins/wp-forms-puzzle-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-forms-puzzle-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-forms-puzzle-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-forms-puzzle-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-d806a63c536300d0b583cd9fc85457ce.yaml b/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-d806a63c536300d0b583cd9fc85457ce.yaml new file mode 100644 index 0000000000..c02a0e527d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-d806a63c536300d0b583cd9fc85457ce.yaml @@ -0,0 +1,58 @@ +id: wp-forms-puzzle-captcha-d806a63c536300d0b583cd9fc85457ce + +info: + name: > + WP Forms Puzzle Captcha <= 4.1 - Captcha Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58502e48-c1cf-4b94-954c-71046256c917?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-forms-puzzle-captcha/" + google-query: inurl:"/wp-content/plugins/wp-forms-puzzle-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-forms-puzzle-captcha,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-forms-puzzle-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-forms-puzzle-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-f1e4ab77de69b73a462cc92d770eba6e.yaml b/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-f1e4ab77de69b73a462cc92d770eba6e.yaml new file mode 100644 index 0000000000..37850f5cea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-forms-puzzle-captcha-f1e4ab77de69b73a462cc92d770eba6e.yaml @@ -0,0 +1,58 @@ +id: wp-forms-puzzle-captcha-f1e4ab77de69b73a462cc92d770eba6e + +info: + name: > + WP Forms Puzzle Captcha <= 4.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f34854a-5ca1-48a3-81d5-80f80f3a85fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-forms-puzzle-captcha/" + google-query: inurl:"/wp-content/plugins/wp-forms-puzzle-captcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-forms-puzzle-captcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-forms-puzzle-captcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-forms-puzzle-captcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-forum-3baacd5c535501f1e7c594d4e91f33bf.yaml b/nuclei-templates/cve-less/plugins/wp-forum-3baacd5c535501f1e7c594d4e91f33bf.yaml new file mode 100644 index 0000000000..7507eb9a2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-forum-3baacd5c535501f1e7c594d4e91f33bf.yaml @@ -0,0 +1,58 @@ +id: wp-forum-3baacd5c535501f1e7c594d4e91f33bf + +info: + name: > + WP Forum <= 2.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d7b4428-99ac-4f84-8595-941124121eb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-forum/" + google-query: inurl:"/wp-content/plugins/wp-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-forum-6e024b27bbd5dc8c98695441370b8501.yaml b/nuclei-templates/cve-less/plugins/wp-forum-6e024b27bbd5dc8c98695441370b8501.yaml new file mode 100644 index 0000000000..c9f4c3e69e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-forum-6e024b27bbd5dc8c98695441370b8501.yaml @@ -0,0 +1,58 @@ +id: wp-forum-6e024b27bbd5dc8c98695441370b8501 + +info: + name: > + WP Forum <= 2.3 - Multiple SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8259785-b15b-49df-bf9c-9108a6a59070?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-forum/" + google-query: inurl:"/wp-content/plugins/wp-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-forum-a6e364da6e9eb1d449de394f7ac6c782.yaml b/nuclei-templates/cve-less/plugins/wp-forum-a6e364da6e9eb1d449de394f7ac6c782.yaml new file mode 100644 index 0000000000..193f92accc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-forum-a6e364da6e9eb1d449de394f7ac6c782.yaml @@ -0,0 +1,58 @@ +id: wp-forum-a6e364da6e9eb1d449de394f7ac6c782 + +info: + name: > + WP-Forum <= 1.7.4 - Remote SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1d354fc-8137-44fa-980a-215dbeb7d15c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-forum/" + google-query: inurl:"/wp-content/plugins/wp-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-forum,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fountain-5cd702313892426c4d5db9e30cd43042.yaml b/nuclei-templates/cve-less/plugins/wp-fountain-5cd702313892426c4d5db9e30cd43042.yaml new file mode 100644 index 0000000000..099f4dde52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fountain-5cd702313892426c4d5db9e30cd43042.yaml @@ -0,0 +1,58 @@ +id: wp-fountain-5cd702313892426c4d5db9e30cd43042 + +info: + name: > + WP Fountain <= 1.5.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ded05261-36f2-4414-b30a-7467b0c79938?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fountain/" + google-query: inurl:"/wp-content/plugins/wp-fountain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fountain,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fountain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fountain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-free-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-free-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..da7b9ad47b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-free-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-free-ssl-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-free-ssl/" + google-query: inurl:"/wp-content/plugins/wp-free-ssl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-free-ssl,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-free-ssl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-free-ssl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-front-end-profile-0ed606409f522ba3351ac7659014c32c.yaml b/nuclei-templates/cve-less/plugins/wp-front-end-profile-0ed606409f522ba3351ac7659014c32c.yaml new file mode 100644 index 0000000000..5d0d72b460 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-front-end-profile-0ed606409f522ba3351ac7659014c32c.yaml @@ -0,0 +1,58 @@ +id: wp-front-end-profile-0ed606409f522ba3351ac7659014c32c + +info: + name: > + WP Front End Profile <= 0.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46825646-f611-4e9d-bee8-36656a1d54ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-front-end-profile/" + google-query: inurl:"/wp-content/plugins/wp-front-end-profile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-front-end-profile,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-front-end-profile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-front-end-profile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-front-end-profile-b37c0d0d71a59763b804ee0d533397e0.yaml b/nuclei-templates/cve-less/plugins/wp-front-end-profile-b37c0d0d71a59763b804ee0d533397e0.yaml new file mode 100644 index 0000000000..19d762452d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-front-end-profile-b37c0d0d71a59763b804ee0d533397e0.yaml @@ -0,0 +1,58 @@ +id: wp-front-end-profile-b37c0d0d71a59763b804ee0d533397e0 + +info: + name: > + WP Frontend Profile <= 1.2.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab520bcb-5739-4b99-ad93-73416ab39084?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-front-end-profile/" + google-query: inurl:"/wp-content/plugins/wp-front-end-profile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-front-end-profile,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-front-end-profile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-front-end-profile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-front-end-profile-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-front-end-profile-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8ad22b1241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-front-end-profile-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-front-end-profile-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-front-end-profile/" + google-query: inurl:"/wp-content/plugins/wp-front-end-profile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-front-end-profile,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-front-end-profile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-front-end-profile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-front-end-profile-c8cceb90ecf899fbb284e13c71ee2405.yaml b/nuclei-templates/cve-less/plugins/wp-front-end-profile-c8cceb90ecf899fbb284e13c71ee2405.yaml new file mode 100644 index 0000000000..2117e865e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-front-end-profile-c8cceb90ecf899fbb284e13c71ee2405.yaml @@ -0,0 +1,58 @@ +id: wp-front-end-profile-c8cceb90ecf899fbb284e13c71ee2405 + +info: + name: > + WP Front End Profile <= 0.2.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8aefc77-b5fb-45b0-b3ba-67d850c72e77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-front-end-profile/" + google-query: inurl:"/wp-content/plugins/wp-front-end-profile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-front-end-profile,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-front-end-profile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-front-end-profile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-front-end-profile-fc6a57b91ab486b0b4aef62bb7676ee2.yaml b/nuclei-templates/cve-less/plugins/wp-front-end-profile-fc6a57b91ab486b0b4aef62bb7676ee2.yaml new file mode 100644 index 0000000000..45dbe9350c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-front-end-profile-fc6a57b91ab486b0b4aef62bb7676ee2.yaml @@ -0,0 +1,58 @@ +id: wp-front-end-profile-fc6a57b91ab486b0b4aef62bb7676ee2 + +info: + name: > + WP Frontend Profile <= 1.3.1 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91de6cf4-e5df-4130-bb96-92b89717a678?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-front-end-profile/" + google-query: inurl:"/wp-content/plugins/wp-front-end-profile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-front-end-profile,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-front-end-profile/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-front-end-profile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-front-end-repository-94c180de31d25f5739b8f87267d3c1b7.yaml b/nuclei-templates/cve-less/plugins/wp-front-end-repository-94c180de31d25f5739b8f87267d3c1b7.yaml new file mode 100644 index 0000000000..4a6f27bc44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-front-end-repository-94c180de31d25f5739b8f87267d3c1b7.yaml @@ -0,0 +1,58 @@ +id: wp-front-end-repository-94c180de31d25f5739b8f87267d3c1b7 + +info: + name: > + WP Front-End Repository Manager <= 1.1 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/111c46c3-7c70-454b-8e99-1552cf0104e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-front-end-repository/" + google-query: inurl:"/wp-content/plugins/wp-front-end-repository/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-front-end-repository,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-front-end-repository/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-front-end-repository" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-full-auto-tags-manager-73b4a317dbf4f39375dbd58ae18a9d97.yaml b/nuclei-templates/cve-less/plugins/wp-full-auto-tags-manager-73b4a317dbf4f39375dbd58ae18a9d97.yaml new file mode 100644 index 0000000000..d6cd1338d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-full-auto-tags-manager-73b4a317dbf4f39375dbd58ae18a9d97.yaml @@ -0,0 +1,58 @@ +id: wp-full-auto-tags-manager-73b4a317dbf4f39375dbd58ae18a9d97 + +info: + name: > + WP Full Auto Tags Manager <= 2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bf209b8-7c12-4fc3-af7f-4fd25777caab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-full-auto-tags-manager/" + google-query: inurl:"/wp-content/plugins/wp-full-auto-tags-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-full-auto-tags-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-full-auto-tags-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-full-auto-tags-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-full-stripe-free-667e350f42b763781ac08f9d6c648e0b.yaml b/nuclei-templates/cve-less/plugins/wp-full-stripe-free-667e350f42b763781ac08f9d6c648e0b.yaml new file mode 100644 index 0000000000..ef5360b559 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-full-stripe-free-667e350f42b763781ac08f9d6c648e0b.yaml @@ -0,0 +1,58 @@ +id: wp-full-stripe-free-667e350f42b763781ac08f9d6c648e0b + +info: + name: > + WP Full Stripe Free <= 7.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7c630c0-b37f-48d5-a87c-8e7c60103a30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-full-stripe-free/" + google-query: inurl:"/wp-content/plugins/wp-full-stripe-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-full-stripe-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-full-stripe-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-full-stripe-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-full-stripe-free-75e488bcf8c81561792f2b21f5fbd763.yaml b/nuclei-templates/cve-less/plugins/wp-full-stripe-free-75e488bcf8c81561792f2b21f5fbd763.yaml new file mode 100644 index 0000000000..181b778d77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-full-stripe-free-75e488bcf8c81561792f2b21f5fbd763.yaml @@ -0,0 +1,58 @@ +id: wp-full-stripe-free-75e488bcf8c81561792f2b21f5fbd763 + +info: + name: > + WP Full Stripe Free <= 7.0.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4f7211b-0ff0-406e-9a0a-2dd7b1314d6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-full-stripe-free/" + google-query: inurl:"/wp-content/plugins/wp-full-stripe-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-full-stripe-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-full-stripe-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-full-stripe-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-full-stripe-free-c18b0aa1f2de13dec1ee3b9448c0e5ba.yaml b/nuclei-templates/cve-less/plugins/wp-full-stripe-free-c18b0aa1f2de13dec1ee3b9448c0e5ba.yaml new file mode 100644 index 0000000000..537d819280 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-full-stripe-free-c18b0aa1f2de13dec1ee3b9448c0e5ba.yaml @@ -0,0 +1,58 @@ +id: wp-full-stripe-free-c18b0aa1f2de13dec1ee3b9448c0e5ba + +info: + name: > + WP Full Stripe Free <= 7.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2afbc0a4-32ad-4fc4-9b10-5c06784f72f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-full-stripe-free/" + google-query: inurl:"/wp-content/plugins/wp-full-stripe-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-full-stripe-free,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-full-stripe-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-full-stripe-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fullcalendar-4d29004b4f45680a61808cd7f630a100.yaml b/nuclei-templates/cve-less/plugins/wp-fullcalendar-4d29004b4f45680a61808cd7f630a100.yaml new file mode 100644 index 0000000000..d1cb25b684 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fullcalendar-4d29004b4f45680a61808cd7f630a100.yaml @@ -0,0 +1,58 @@ +id: wp-fullcalendar-4d29004b4f45680a61808cd7f630a100 + +info: + name: > + WP FullCalendar <= 1.4.1 - Missing Authorization to Information Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27d25885-1a85-40a0-9759-3ae0c8d73d11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fullcalendar/" + google-query: inurl:"/wp-content/plugins/wp-fullcalendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fullcalendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fullcalendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fullcalendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fundraising-donation-62232a302f7fe9f8b0db43176a902970.yaml b/nuclei-templates/cve-less/plugins/wp-fundraising-donation-62232a302f7fe9f8b0db43176a902970.yaml new file mode 100644 index 0000000000..f44370a7a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fundraising-donation-62232a302f7fe9f8b0db43176a902970.yaml @@ -0,0 +1,58 @@ +id: wp-fundraising-donation-62232a302f7fe9f8b0db43176a902970 + +info: + name: > + WP Fundraising Donation and Crowdfunding Platform <= 1.4.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdb35927-b239-4243-a2d0-2e2c2cc61668?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fundraising-donation/" + google-query: inurl:"/wp-content/plugins/wp-fundraising-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fundraising-donation,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fundraising-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fundraising-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-funeral-press-45b180f701bbda6c2ac66302babf8238.yaml b/nuclei-templates/cve-less/plugins/wp-funeral-press-45b180f701bbda6c2ac66302babf8238.yaml new file mode 100644 index 0000000000..749bcd3335 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-funeral-press-45b180f701bbda6c2ac66302babf8238.yaml @@ -0,0 +1,58 @@ +id: wp-funeral-press-45b180f701bbda6c2ac66302babf8238 + +info: + name: > + WP FuneralPress <= 1.1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aeb5f26-32a4-4eba-829d-759e4c92a034?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-funeral-press/" + google-query: inurl:"/wp-content/plugins/wp-funeral-press/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-funeral-press,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-funeral-press/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-funeral-press" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fusion-lite-815613664281ce9641a420b93ff49909.yaml b/nuclei-templates/cve-less/plugins/wp-fusion-lite-815613664281ce9641a420b93ff49909.yaml new file mode 100644 index 0000000000..23aa36c6e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fusion-lite-815613664281ce9641a420b93ff49909.yaml @@ -0,0 +1,58 @@ +id: wp-fusion-lite-815613664281ce9641a420b93ff49909 + +info: + name: > + WP Fusion Lite <= 3.41.24 - Authenticated (Contributor+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d22013e5-896a-4dcb-bbe4-e6be7d697816?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fusion-lite/" + google-query: inurl:"/wp-content/plugins/wp-fusion-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fusion-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fusion-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fusion-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.41.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fusion-lite-91f81bae19c8e6b1e95305d25a17b6e0.yaml b/nuclei-templates/cve-less/plugins/wp-fusion-lite-91f81bae19c8e6b1e95305d25a17b6e0.yaml new file mode 100644 index 0000000000..5da058bbf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fusion-lite-91f81bae19c8e6b1e95305d25a17b6e0.yaml @@ -0,0 +1,58 @@ +id: wp-fusion-lite-91f81bae19c8e6b1e95305d25a17b6e0 + +info: + name: > + WP Fusion Lite <= 3.37.18 – Cross-Site Request Forgery to Data Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a539a4e-f4df-46c7-83c2-9f189f081405?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fusion-lite/" + google-query: inurl:"/wp-content/plugins/wp-fusion-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fusion-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fusion-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fusion-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.37.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fusion-lite-cdfacbb67934ca9294af25220e6a52b7.yaml b/nuclei-templates/cve-less/plugins/wp-fusion-lite-cdfacbb67934ca9294af25220e6a52b7.yaml new file mode 100644 index 0000000000..18d5a5b477 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fusion-lite-cdfacbb67934ca9294af25220e6a52b7.yaml @@ -0,0 +1,58 @@ +id: wp-fusion-lite-cdfacbb67934ca9294af25220e6a52b7 + +info: + name: > + WP Fusion Lite <= 3.37.18 – Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/651df16c-2472-4124-90a3-69b98e478ed3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fusion-lite/" + google-query: inurl:"/wp-content/plugins/wp-fusion-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fusion-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fusion-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fusion-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.37.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-fusion-lite-e8cf37239a5b69d21791d9c5728d4701.yaml b/nuclei-templates/cve-less/plugins/wp-fusion-lite-e8cf37239a5b69d21791d9c5728d4701.yaml new file mode 100644 index 0000000000..bb9518c970 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-fusion-lite-e8cf37239a5b69d21791d9c5728d4701.yaml @@ -0,0 +1,58 @@ +id: wp-fusion-lite-e8cf37239a5b69d21791d9c5728d4701 + +info: + name: > + WP Fusion Lite – Marketing Automation and CRM Integration for WordPress <= 3.42.10 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b245791-6aac-4ee3-9278-5b7c01f13263?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-fusion-lite/" + google-query: inurl:"/wp-content/plugins/wp-fusion-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-fusion-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-fusion-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-fusion-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.42.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gallery-exporter-de0285827724428521077b71df2ee67d.yaml b/nuclei-templates/cve-less/plugins/wp-gallery-exporter-de0285827724428521077b71df2ee67d.yaml new file mode 100644 index 0000000000..5d2a24d590 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gallery-exporter-de0285827724428521077b71df2ee67d.yaml @@ -0,0 +1,58 @@ +id: wp-gallery-exporter-de0285827724428521077b71df2ee67d + +info: + name: > + WordPress Gallery Exporter <= 1.3 - Authenticated (Administrator+) Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b871883c-509b-4776-b550-349b3f5aa365?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gallery-exporter/" + google-query: inurl:"/wp-content/plugins/wp-gallery-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gallery-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gallery-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gallery-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gallery-metabox-377dfbc1893c3f82b60d799556ea4360.yaml b/nuclei-templates/cve-less/plugins/wp-gallery-metabox-377dfbc1893c3f82b60d799556ea4360.yaml new file mode 100644 index 0000000000..86363459fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gallery-metabox-377dfbc1893c3f82b60d799556ea4360.yaml @@ -0,0 +1,58 @@ +id: wp-gallery-metabox-377dfbc1893c3f82b60d799556ea4360 + +info: + name: > + WP Gallery Metabox <= 1.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46c4b7f7-e3e6-46b8-b959-07775db8bb6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gallery-metabox/" + google-query: inurl:"/wp-content/plugins/wp-gallery-metabox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gallery-metabox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gallery-metabox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gallery-metabox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-6e07c5d5d730f2ffaadc2b47ec323077.yaml b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-6e07c5d5d730f2ffaadc2b47ec323077.yaml new file mode 100644 index 0000000000..d2445f2ffc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-6e07c5d5d730f2ffaadc2b47ec323077.yaml @@ -0,0 +1,58 @@ +id: wp-gdpr-compliance-6e07c5d5d730f2ffaadc2b47ec323077 + +info: + name: > + WP GDPR Compliance <= 2.0.23 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46fccb4e-8dd9-414d-bd65-e62acffee18d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gdpr-compliance/" + google-query: inurl:"/wp-content/plugins/wp-gdpr-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gdpr-compliance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gdpr-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gdpr-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-7963dd486edaf4e2c2e742763011f365.yaml b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-7963dd486edaf4e2c2e742763011f365.yaml new file mode 100644 index 0000000000..a18ee3e34f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-7963dd486edaf4e2c2e742763011f365.yaml @@ -0,0 +1,58 @@ +id: wp-gdpr-compliance-7963dd486edaf4e2c2e742763011f365 + +info: + name: > + WP GDPR Compliance <= 1.4.2 - Arbitrary Options Update and Action Calling + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9312c73d-8eb6-4ca0-a03b-566099dc6487?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gdpr-compliance/" + google-query: inurl:"/wp-content/plugins/wp-gdpr-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gdpr-compliance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gdpr-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gdpr-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-8501b849b0f302eafdaedb3a9eb077f6.yaml b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-8501b849b0f302eafdaedb3a9eb077f6.yaml new file mode 100644 index 0000000000..db185b2bfc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-8501b849b0f302eafdaedb3a9eb077f6.yaml @@ -0,0 +1,58 @@ +id: wp-gdpr-compliance-8501b849b0f302eafdaedb3a9eb077f6 + +info: + name: > + Cookie Information | Free GDPR Consent Solution <= 2.0.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c0b0bf7-55dd-40a1-8f12-f0ec0315c0ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gdpr-compliance/" + google-query: inurl:"/wp-content/plugins/wp-gdpr-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gdpr-compliance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gdpr-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gdpr-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-9a25bf02d1d516ebfa83ea0a4af36e6d.yaml b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-9a25bf02d1d516ebfa83ea0a4af36e6d.yaml new file mode 100644 index 0000000000..50f0c90444 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-9a25bf02d1d516ebfa83ea0a4af36e6d.yaml @@ -0,0 +1,58 @@ +id: wp-gdpr-compliance-9a25bf02d1d516ebfa83ea0a4af36e6d + +info: + name: > + Cookie Information | Free GDPR Consent Solution <= 2.0.22 - Authenticated (Subscriber+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42a4ef37-c842-4925-b06a-3e6423337567?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gdpr-compliance/" + google-query: inurl:"/wp-content/plugins/wp-gdpr-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gdpr-compliance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gdpr-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gdpr-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-d47084b590cbc795c568485d3590251a.yaml b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-d47084b590cbc795c568485d3590251a.yaml new file mode 100644 index 0000000000..ca2c979332 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gdpr-compliance-d47084b590cbc795c568485d3590251a.yaml @@ -0,0 +1,58 @@ +id: wp-gdpr-compliance-d47084b590cbc795c568485d3590251a + +info: + name: > + Cookie Information | Free GDPR Consent Solution <= 1.5.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79a574c4-1faf-4572-801c-00b50923a669?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gdpr-compliance/" + google-query: inurl:"/wp-content/plugins/wp-gdpr-compliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gdpr-compliance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gdpr-compliance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gdpr-compliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gdpr-core-97711fb53683ab26635f9b3f2754784c.yaml b/nuclei-templates/cve-less/plugins/wp-gdpr-core-97711fb53683ab26635f9b3f2754784c.yaml new file mode 100644 index 0000000000..c8ce0c78b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gdpr-core-97711fb53683ab26635f9b3f2754784c.yaml @@ -0,0 +1,58 @@ +id: wp-gdpr-core-97711fb53683ab26635f9b3f2754784c + +info: + name: > + WP GDPR <= 2.1.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee3fdeb2-9e2a-4fe7-aa74-aaf60a74c060?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gdpr-core/" + google-query: inurl:"/wp-content/plugins/wp-gdpr-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gdpr-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gdpr-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gdpr-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gdpr-core-ccf9bbc2066dab286ce4f7f98f9f46d7.yaml b/nuclei-templates/cve-less/plugins/wp-gdpr-core-ccf9bbc2066dab286ce4f7f98f9f46d7.yaml new file mode 100644 index 0000000000..fdcd2266f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gdpr-core-ccf9bbc2066dab286ce4f7f98f9f46d7.yaml @@ -0,0 +1,58 @@ +id: wp-gdpr-core-ccf9bbc2066dab286ce4f7f98f9f46d7 + +info: + name: > + WP GDPR <= 2.1.1 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/032e775a-97be-4d93-bac3-094e35be4b11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gdpr-core/" + google-query: inurl:"/wp-content/plugins/wp-gdpr-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gdpr-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gdpr-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gdpr-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-get-personal-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-get-personal-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ad9b138313 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-get-personal-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-get-personal-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-get-personal-lite/" + google-query: inurl:"/wp-content/plugins/wp-get-personal-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-get-personal-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-get-personal-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-get-personal-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-githuber-md-37948e20cc8aeb00d7f629d9bf7d79ee.yaml b/nuclei-templates/cve-less/plugins/wp-githuber-md-37948e20cc8aeb00d7f629d9bf7d79ee.yaml new file mode 100644 index 0000000000..07f160cc9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-githuber-md-37948e20cc8aeb00d7f629d9bf7d79ee.yaml @@ -0,0 +1,58 @@ +id: wp-githuber-md-37948e20cc8aeb00d7f629d9bf7d79ee + +info: + name: > + WP Githuber MD <= 1.16.2 - Authenticated (Author+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6fda35d-8b82-4a7a-8db6-21dc38a841f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-githuber-md/" + google-query: inurl:"/wp-content/plugins/wp-githuber-md/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-githuber-md,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-githuber-md/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-githuber-md" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-glossary-782e75e9ade7cd09f2f9dfc0e07ecdf7.yaml b/nuclei-templates/cve-less/plugins/wp-glossary-782e75e9ade7cd09f2f9dfc0e07ecdf7.yaml new file mode 100644 index 0000000000..a3ad09e2de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-glossary-782e75e9ade7cd09f2f9dfc0e07ecdf7.yaml @@ -0,0 +1,58 @@ +id: wp-glossary-782e75e9ade7cd09f2f9dfc0e07ecdf7 + +info: + name: > + Glossary <= 3.1.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca34e4e-3324-4942-854b-a4511f88af8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-glossary/" + google-query: inurl:"/wp-content/plugins/wp-glossary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-glossary,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-glossary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-glossary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-glossary-c8baa9ed85af66dd4a921b8f2c5af1ac.yaml b/nuclei-templates/cve-less/plugins/wp-glossary-c8baa9ed85af66dd4a921b8f2c5af1ac.yaml new file mode 100644 index 0000000000..55e74e1ef2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-glossary-c8baa9ed85af66dd4a921b8f2c5af1ac.yaml @@ -0,0 +1,58 @@ +id: wp-glossary-c8baa9ed85af66dd4a921b8f2c5af1ac + +info: + name: > + WP Glossary <= 3.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a189e25-0d9e-4e0c-b74d-e7f9d2556872?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-glossary/" + google-query: inurl:"/wp-content/plugins/wp-glossary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-glossary,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-glossary/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-glossary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gmappity-easy-google-maps-8f06cbf2f40450a7e41adaa2e12c5c0e.yaml b/nuclei-templates/cve-less/plugins/wp-gmappity-easy-google-maps-8f06cbf2f40450a7e41adaa2e12c5c0e.yaml new file mode 100644 index 0000000000..40ad51e8ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gmappity-easy-google-maps-8f06cbf2f40450a7e41adaa2e12c5c0e.yaml @@ -0,0 +1,58 @@ +id: wp-gmappity-easy-google-maps-8f06cbf2f40450a7e41adaa2e12c5c0e + +info: + name: > + Google Maps made Simple <= 0.6 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/262db9aa-0db5-48cd-a85b-3e6302e88a42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gmappity-easy-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-gmappity-easy-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gmappity-easy-google-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gmappity-easy-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gmappity-easy-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-analytics-events-cf4a1e3cd78f1384d3dc34cdb54fb3f8.yaml b/nuclei-templates/cve-less/plugins/wp-google-analytics-events-cf4a1e3cd78f1384d3dc34cdb54fb3f8.yaml new file mode 100644 index 0000000000..9c6ff3813b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-analytics-events-cf4a1e3cd78f1384d3dc34cdb54fb3f8.yaml @@ -0,0 +1,58 @@ +id: wp-google-analytics-events-cf4a1e3cd78f1384d3dc34cdb54fb3f8 + +info: + name: > + WP Google Analytics Events <= 2.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb112c12-2587-46de-a688-d0f04e1ec431?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-analytics-events/" + google-query: inurl:"/wp-content/plugins/wp-google-analytics-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-analytics-events,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-analytics-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-analytics-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-fonts-0bd9393f43d814fb82bad26dc2a66a03.yaml b/nuclei-templates/cve-less/plugins/wp-google-fonts-0bd9393f43d814fb82bad26dc2a66a03.yaml new file mode 100644 index 0000000000..3f0214bf1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-fonts-0bd9393f43d814fb82bad26dc2a66a03.yaml @@ -0,0 +1,58 @@ +id: wp-google-fonts-0bd9393f43d814fb82bad26dc2a66a03 + +info: + name: > + WP Google Fonts <= 3.1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/030def71-2949-46d5-a545-f3472433324e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-fonts/" + google-query: inurl:"/wp-content/plugins/wp-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-fonts-693e37cf0d606fc058da1d65dc80c30a.yaml b/nuclei-templates/cve-less/plugins/wp-google-fonts-693e37cf0d606fc058da1d65dc80c30a.yaml new file mode 100644 index 0000000000..fd35ca29ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-fonts-693e37cf0d606fc058da1d65dc80c30a.yaml @@ -0,0 +1,58 @@ +id: wp-google-fonts-693e37cf0d606fc058da1d65dc80c30a + +info: + name: > + WP Google Fonts <= 3.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/561b2487-0d6a-4cc7-b41c-0e88f45d3038?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-fonts/" + google-query: inurl:"/wp-content/plugins/wp-google-fonts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-fonts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-fonts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-fonts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-0677fc472ce6636d2560dd0fee27206d.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-0677fc472ce6636d2560dd0fee27206d.yaml new file mode 100644 index 0000000000..0334d1dfba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-0677fc472ce6636d2560dd0fee27206d.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-0677fc472ce6636d2560dd0fee27206d + +info: + name: > + WP Google Map Plugin < 2.3.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc3bc6e8-aae7-451e-b26a-cc5e8fcd0a33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-0680dcfefb929cf836c59db202cd40da.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-0680dcfefb929cf836c59db202cd40da.yaml new file mode 100644 index 0000000000..c073ac7b59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-0680dcfefb929cf836c59db202cd40da.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-0680dcfefb929cf836c59db202cd40da + +info: + name: > + WP Google Map Plugin <= 4.1.4 - Authenticated SQL Injection via Orderby + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/470d91c1-bcde-4497-a558-35bc0156ddca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-09e6dfe7f784e608ed0fba91188d7274.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-09e6dfe7f784e608ed0fba91188d7274.yaml new file mode 100644 index 0000000000..646cb740f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-09e6dfe7f784e608ed0fba91188d7274.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-09e6dfe7f784e608ed0fba91188d7274 + +info: + name: > + WP Google Map Plugin < 2.3.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8555b662-f1c8-418a-896e-1558e6e34c14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-4778c289f09f336f1a397e49c205f5e1.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-4778c289f09f336f1a397e49c205f5e1.yaml new file mode 100644 index 0000000000..ac26d37ee7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-4778c289f09f336f1a397e49c205f5e1.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-4778c289f09f336f1a397e49c205f5e1 + +info: + name: > + WP Google Map Plugin <= 4.4.2 - Cross-Site Request Forgery via delete() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71f58781-3fb3-4eba-8e5a-f98f006f4607?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-5237dfae31b24b8180bcd6193ab8bd7f.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-5237dfae31b24b8180bcd6193ab8bd7f.yaml new file mode 100644 index 0000000000..d0113017b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-5237dfae31b24b8180bcd6193ab8bd7f.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-5237dfae31b24b8180bcd6193ab8bd7f + +info: + name: > + WP MAPS <= 4.3.9 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98553e47-f121-4300-b6d9-ab309516cf1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-6a35bf1797897f8d13c75911c491ac65.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-6a35bf1797897f8d13c75911c491ac65.yaml new file mode 100644 index 0000000000..ff7fe5789e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-6a35bf1797897f8d13c75911c491ac65.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-6a35bf1797897f8d13c75911c491ac65 + +info: + name: > + WP Google Map Plugin < 2.3.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f89718f2-e25b-4393-986a-34ef3076a59c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-70c01b9021b52ac03758d9968f42dcbe.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-70c01b9021b52ac03758d9968f42dcbe.yaml new file mode 100644 index 0000000000..51d696146c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-70c01b9021b52ac03758d9968f42dcbe.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-70c01b9021b52ac03758d9968f42dcbe + +info: + name: > + WP MAPS – Easiest & Most Advanced WordPress Plugin for Google Maps <= 4.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4186fe8d-ca09-4b82-9500-7b16bd10b044?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-7149f44d871608d660e807410983089b.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-7149f44d871608d660e807410983089b.yaml new file mode 100644 index 0000000000..8df15f79dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-7149f44d871608d660e807410983089b.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-7149f44d871608d660e807410983089b + +info: + name: > + WP MAPS – Easiest & Most Advanced WordPress Plugin for Google Maps < 4.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aa41416-c945-489b-81a3-1222a5e24469?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-7382281cd5a556c25b2c10e2b81ec2b8.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-7382281cd5a556c25b2c10e2b81ec2b8.yaml new file mode 100644 index 0000000000..bd2622a17f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-7382281cd5a556c25b2c10e2b81ec2b8.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-7382281cd5a556c25b2c10e2b81ec2b8 + +info: + name: > + WP Google Map Plugin <= 3.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94f803f4-0a06-4b77-9483-5c63f6dfd2f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-73f135de232fc553a1861c313e9ab548.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-73f135de232fc553a1861c313e9ab548.yaml new file mode 100644 index 0000000000..4295f50d22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-73f135de232fc553a1861c313e9ab548.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-73f135de232fc553a1861c313e9ab548 + +info: + name: > + WP Google Map Plugin <= 4.0.9 - Cross-Site Request Forgery to PHP Object Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5ba9285-9f41-44dd-83c7-e9c377d9de51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-a5532d15dce91adaa57b29acc9d33bb8.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-a5532d15dce91adaa57b29acc9d33bb8.yaml new file mode 100644 index 0000000000..2510b51b3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-a5532d15dce91adaa57b29acc9d33bb8.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-a5532d15dce91adaa57b29acc9d33bb8 + +info: + name: > + WP Google Map Plugin < 3.0.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01105d96-e181-4228-b785-074a4b49ce18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-ab2c33982fe57a3db954e28d388810a5.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-ab2c33982fe57a3db954e28d388810a5.yaml new file mode 100644 index 0000000000..c318a45d9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-ab2c33982fe57a3db954e28d388810a5.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-ab2c33982fe57a3db954e28d388810a5 + +info: + name: > + WP Google Map Plugin < 2.3.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca32fd93-cab3-431b-91c3-9ed244f9d1f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-map-plugin-b619ff669f813db2e4bf72a01401c559.yaml b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-b619ff669f813db2e4bf72a01401c559.yaml new file mode 100644 index 0000000000..c522494065 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-map-plugin-b619ff669f813db2e4bf72a01401c559.yaml @@ -0,0 +1,58 @@ +id: wp-google-map-plugin-b619ff669f813db2e4bf72a01401c559 + +info: + name: > + WP MAPS – Easiest & Most Advanced WordPress Plugin for Google Maps <= 4.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/beceb191-654b-48ea-9b8f-3f4ca974160e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-map-plugin/" + google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-map-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-map-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-019dd8c7d843763da77dfac2e01453aa.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-019dd8c7d843763da77dfac2e01453aa.yaml new file mode 100644 index 0000000000..9f414dd9b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-019dd8c7d843763da77dfac2e01453aa.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-019dd8c7d843763da77dfac2e01453aa + +info: + name: > + WP Google Maps < 7.10.43 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b23d4868-068a-4ee9-8253-8f7063cdb03e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.10.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-2cd3d2328b9309d385778042d73c86e8.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-2cd3d2328b9309d385778042d73c86e8.yaml new file mode 100644 index 0000000000..73225cf56a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-2cd3d2328b9309d385778042d73c86e8.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-2cd3d2328b9309d385778042d73c86e8 + +info: + name: > + WP Google Maps <= 7.11.34 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4744edff-d130-4f45-93a0-a67ec91dbe10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-363421e443d86bf6a03f6199bd5c6045.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-363421e443d86bf6a03f6199bd5c6045.yaml new file mode 100644 index 0000000000..7d29822545 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-363421e443d86bf6a03f6199bd5c6045.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-363421e443d86bf6a03f6199bd5c6045 + +info: + name: > + WP Google Maps <= 8.1.11 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/328438ba-128d-4094-83a5-bfd6e1616fa4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-3d197f1213a479cd13434bd580bc4732.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-3d197f1213a479cd13434bd580bc4732.yaml new file mode 100644 index 0000000000..f63a6a400e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-3d197f1213a479cd13434bd580bc4732.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-3d197f1213a479cd13434bd580bc4732 + +info: + name: > + WP Google Maps <= 7.11.27 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f10f6b12-5bf0-475a-ad9e-084ce5801b84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-5938cf4c59a1d8ebf45c155344fba09e.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-5938cf4c59a1d8ebf45c155344fba09e.yaml new file mode 100644 index 0000000000..6846273f82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-5938cf4c59a1d8ebf45c155344fba09e.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-5938cf4c59a1d8ebf45c155344fba09e + +info: + name: > + WP Google Maps <= 6.3.14 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a739b805-e631-461e-802f-196e4117d403?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-69657f4112d937c57fc4155d562b7525.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-69657f4112d937c57fc4155d562b7525.yaml new file mode 100644 index 0000000000..02f993f20e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-69657f4112d937c57fc4155d562b7525.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-69657f4112d937c57fc4155d562b7525 + +info: + name: > + WP Go Maps <= 9.0.32 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/208c5ed1-879f-45ea-833e-d2e54c4f063f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-69aedfc905a5a0f0e668841416c424fd.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-69aedfc905a5a0f0e668841416c424fd.yaml new file mode 100644 index 0000000000..7606498fde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-69aedfc905a5a0f0e668841416c424fd.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-69aedfc905a5a0f0e668841416c424fd + +info: + name: > + WP Google Maps <= 8.1.12 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84520916-3c9e-4b01-918f-d1fc86eb5e0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-73bf56678d08f13f561affd2573b6e8a.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-73bf56678d08f13f561affd2573b6e8a.yaml new file mode 100644 index 0000000000..099e9f3bf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-73bf56678d08f13f561affd2573b6e8a.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-73bf56678d08f13f561affd2573b6e8a + +info: + name: > + WP Go Maps (formerly WP Google Maps) <= 9.0.32 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67f405d0-7139-4b5c-ab3c-cd1de5592866?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-7b9a92238f85900b8c03567a6a71f188.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-7b9a92238f85900b8c03567a6a71f188.yaml new file mode 100644 index 0000000000..43101292bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-7b9a92238f85900b8c03567a6a71f188.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-7b9a92238f85900b8c03567a6a71f188 + +info: + name: > + WP Google Maps <= 9.0.27 - Unauthenticated Stored Cross-Site Scripting via REST API + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a468814-ecb7-4414-9472-6c2aaa5f5c2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-8a13eb8b9bb39899a8b48afee98189b2.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-8a13eb8b9bb39899a8b48afee98189b2.yaml new file mode 100644 index 0000000000..375a569839 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-8a13eb8b9bb39899a8b48afee98189b2.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-8a13eb8b9bb39899a8b48afee98189b2 + +info: + name: > + WP Google Maps <= 9.0.29 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89dec659-5427-46bb-8250-1e4a132611df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-8c03b52626997e166cccabfb7426db2b.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-8c03b52626997e166cccabfb7426db2b.yaml new file mode 100644 index 0000000000..83b4eb8352 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-8c03b52626997e166cccabfb7426db2b.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-8c03b52626997e166cccabfb7426db2b + +info: + name: > + WP Go Maps <= 9.0.15 - Authenticated (Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e7c1eab-78d7-48f8-810b-db6cea668d92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-9c83e22896300f312af778a1727c5b7c.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-9c83e22896300f312af778a1727c5b7c.yaml new file mode 100644 index 0000000000..f6c4d011bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-9c83e22896300f312af778a1727c5b7c.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-9c83e22896300f312af778a1727c5b7c + +info: + name: > + WP Go Maps (formerly WP Google Maps) <= 9.0.28 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c3115b-8921-429d-b517-b946edab1cd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-9fa457edab3267f4204b5dd4138a4aa0.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-9fa457edab3267f4204b5dd4138a4aa0.yaml new file mode 100644 index 0000000000..bdc62f4ea6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-9fa457edab3267f4204b5dd4138a4aa0.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-9fa457edab3267f4204b5dd4138a4aa0 + +info: + name: > + WP Google Maps <= 6.0.26 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17d3a2e4-d6f3-4302-91b0-2408ccd8958a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-ea627a7f49b873c84bcdde34c37b25bd.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-ea627a7f49b873c84bcdde34c37b25bd.yaml new file mode 100644 index 0000000000..b4f2b4d144 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-ea627a7f49b873c84bcdde34c37b25bd.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-ea627a7f49b873c84bcdde34c37b25bd + +info: + name: > + WP Go Maps (formerly WP Google Maps) <= 9.0.34 - Information Exposure to Potential Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/509cccbd-3aa0-45f1-84a0-387d678ebf65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-f4a3d95a0a4f34bdd233d89b3cc7dec8.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-f4a3d95a0a4f34bdd233d89b3cc7dec8.yaml new file mode 100644 index 0000000000..1674bd846f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-f4a3d95a0a4f34bdd233d89b3cc7dec8.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-f4a3d95a0a4f34bdd233d89b3cc7dec8 + +info: + name: > + WP Go Maps (formerly WP Google Maps) <= 7.11.17 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a672c18b-1426-49fd-9590-eab8204afd5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps/" + google-query: inurl:"/wp-content/plugins/wp-google-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-maps-pro-622602817799a1869bfcc5c18c23392a.yaml b/nuclei-templates/cve-less/plugins/wp-google-maps-pro-622602817799a1869bfcc5c18c23392a.yaml new file mode 100644 index 0000000000..a9d71cc77d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-maps-pro-622602817799a1869bfcc5c18c23392a.yaml @@ -0,0 +1,58 @@ +id: wp-google-maps-pro-622602817799a1869bfcc5c18c23392a + +info: + name: > + WP Google Maps Pro <= 8.1.11 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45700ca9-8bda-4148-b19f-86ed39c60117?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-maps-pro/" + google-query: inurl:"/wp-content/plugins/wp-google-maps-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-maps-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-maps-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-maps-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-my-business-auto-publish-1f645d98bf29f7b2e378ac42457eb0cd.yaml b/nuclei-templates/cve-less/plugins/wp-google-my-business-auto-publish-1f645d98bf29f7b2e378ac42457eb0cd.yaml new file mode 100644 index 0000000000..1f49a4fad3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-my-business-auto-publish-1f645d98bf29f7b2e378ac42457eb0cd.yaml @@ -0,0 +1,58 @@ +id: wp-google-my-business-auto-publish-1f645d98bf29f7b2e378ac42457eb0cd + +info: + name: > + WP Google My Business Auto Publish <= 3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb9bcd3e-bb8c-4c7b-8904-56790acd2655?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-my-business-auto-publish/" + google-query: inurl:"/wp-content/plugins/wp-google-my-business-auto-publish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-my-business-auto-publish,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-my-business-auto-publish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-my-business-auto-publish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-my-business-auto-publish-5bc39e042d909c5c804ae61b49719209.yaml b/nuclei-templates/cve-less/plugins/wp-google-my-business-auto-publish-5bc39e042d909c5c804ae61b49719209.yaml new file mode 100644 index 0000000000..39eae57e1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-my-business-auto-publish-5bc39e042d909c5c804ae61b49719209.yaml @@ -0,0 +1,58 @@ +id: wp-google-my-business-auto-publish-5bc39e042d909c5c804ae61b49719209 + +info: + name: > + Auto Publish for Google My Business <= 3.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d4b9f07-a4a0-4cbd-a147-281570bc7f4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-my-business-auto-publish/" + google-query: inurl:"/wp-content/plugins/wp-google-my-business-auto-publish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-my-business-auto-publish,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-my-business-auto-publish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-my-business-auto-publish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-12c0516e02b16dc0e022502178a348b1.yaml b/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-12c0516e02b16dc0e022502178a348b1.yaml new file mode 100644 index 0000000000..39332ae4b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-12c0516e02b16dc0e022502178a348b1.yaml @@ -0,0 +1,58 @@ +id: wp-google-places-review-slider-12c0516e02b16dc0e022502178a348b1 + +info: + name: > + WP Google Review Slider <= 13.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fe11179-6e18-44ae-a5f9-334e334cff73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-places-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-google-places-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-places-review-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-places-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-places-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-63e8aaca3bf1d75703f616e718360745.yaml b/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-63e8aaca3bf1d75703f616e718360745.yaml new file mode 100644 index 0000000000..c42909489b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-63e8aaca3bf1d75703f616e718360745.yaml @@ -0,0 +1,58 @@ +id: wp-google-places-review-slider-63e8aaca3bf1d75703f616e718360745 + +info: + name: > + WP Google Review Slider <= 11.7 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cbb1e71-baf1-4d1d-96c8-93fd2686297d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-places-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-google-places-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-places-review-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-places-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-places-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-8f14563b89ae2fb865ea87d5f251bc48.yaml b/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-8f14563b89ae2fb865ea87d5f251bc48.yaml new file mode 100644 index 0000000000..047b4af103 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-places-review-slider-8f14563b89ae2fb865ea87d5f251bc48.yaml @@ -0,0 +1,58 @@ +id: wp-google-places-review-slider-8f14563b89ae2fb865ea87d5f251bc48 + +info: + name: > + WP Google Review Slider <= 11.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5985318-2ce6-4ecb-a92f-362bc5909bd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-places-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-google-places-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-places-review-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-places-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-places-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-street-view-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-google-street-view-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..53b054a74b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-street-view-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-google-street-view-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-street-view/" + google-query: inurl:"/wp-content/plugins/wp-google-street-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-street-view,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-street-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-street-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-google-tag-manager-8a0f63d90f622470f02014f08a84be2f.yaml b/nuclei-templates/cve-less/plugins/wp-google-tag-manager-8a0f63d90f622470f02014f08a84be2f.yaml new file mode 100644 index 0000000000..cc9ddebb39 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-google-tag-manager-8a0f63d90f622470f02014f08a84be2f.yaml @@ -0,0 +1,58 @@ +id: wp-google-tag-manager-8a0f63d90f622470f02014f08a84be2f + +info: + name: > + WP Google Tag Manager <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cb265d8-eb18-42ee-9141-2fe81c0c4585?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-google-tag-manager/" + google-query: inurl:"/wp-content/plugins/wp-google-tag-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-google-tag-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-google-tag-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-google-tag-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gotowebinar-352c9721f769a69dbdfdbca5d48088a2.yaml b/nuclei-templates/cve-less/plugins/wp-gotowebinar-352c9721f769a69dbdfdbca5d48088a2.yaml new file mode 100644 index 0000000000..832c872b01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gotowebinar-352c9721f769a69dbdfdbca5d48088a2.yaml @@ -0,0 +1,58 @@ +id: wp-gotowebinar-352c9721f769a69dbdfdbca5d48088a2 + +info: + name: > + WP GoToWebinar <= 14.45 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e40f07b5-9e6e-430b-86fc-3bb863a51b01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gotowebinar/" + google-query: inurl:"/wp-content/plugins/wp-gotowebinar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gotowebinar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gotowebinar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gotowebinar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gotowebinar-7ef847bd47bcec43447f7d6368de1312.yaml b/nuclei-templates/cve-less/plugins/wp-gotowebinar-7ef847bd47bcec43447f7d6368de1312.yaml new file mode 100644 index 0000000000..c0f8462a7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gotowebinar-7ef847bd47bcec43447f7d6368de1312.yaml @@ -0,0 +1,58 @@ +id: wp-gotowebinar-7ef847bd47bcec43447f7d6368de1312 + +info: + name: > + WP GoToWebinar <= 14.46 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b229ea2-3a7d-42bd-a235-ffd18e206c8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gotowebinar/" + google-query: inurl:"/wp-content/plugins/wp-gotowebinar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gotowebinar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gotowebinar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gotowebinar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gpx-maps-2948a715e4c44d771b627432c9f5701c.yaml b/nuclei-templates/cve-less/plugins/wp-gpx-maps-2948a715e4c44d771b627432c9f5701c.yaml new file mode 100644 index 0000000000..2941865d04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gpx-maps-2948a715e4c44d771b627432c9f5701c.yaml @@ -0,0 +1,58 @@ +id: wp-gpx-maps-2948a715e4c44d771b627432c9f5701c + +info: + name: > + WP GPX Maps < 1.1.23 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7a6eff3-a592-4476-aff4-c133bb4e5870?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gpx-maps/" + google-query: inurl:"/wp-content/plugins/wp-gpx-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gpx-maps,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gpx-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gpx-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gpx-maps-87f838d84fa79999236dcd79f1342013.yaml b/nuclei-templates/cve-less/plugins/wp-gpx-maps-87f838d84fa79999236dcd79f1342013.yaml new file mode 100644 index 0000000000..430c30e077 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gpx-maps-87f838d84fa79999236dcd79f1342013.yaml @@ -0,0 +1,58 @@ +id: wp-gpx-maps-87f838d84fa79999236dcd79f1342013 + +info: + name: > + WP GPX Map <= 1.7.05 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/625c1df5-6655-4319-8833-5519b464e53e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gpx-maps/" + google-query: inurl:"/wp-content/plugins/wp-gpx-maps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gpx-maps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gpx-maps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gpx-maps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-graphql-026295425673c504bf7857c72ec29c89.yaml b/nuclei-templates/cve-less/plugins/wp-graphql-026295425673c504bf7857c72ec29c89.yaml new file mode 100644 index 0000000000..a17f7ceae4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-graphql-026295425673c504bf7857c72ec29c89.yaml @@ -0,0 +1,58 @@ +id: wp-graphql-026295425673c504bf7857c72ec29c89 + +info: + name: > + WPGraphQL <= 0.2.3 - Administrative User Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80e74852-517e-4cd0-a7d3-6f6fe3433bff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-graphql/" + google-query: inurl:"/wp-content/plugins/wp-graphql/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-graphql,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-graphql/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-graphql" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-graphql-3ce969cc21aaadf47f9f21f5d1e9275b.yaml b/nuclei-templates/cve-less/plugins/wp-graphql-3ce969cc21aaadf47f9f21f5d1e9275b.yaml new file mode 100644 index 0000000000..f264f5e90d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-graphql-3ce969cc21aaadf47f9f21f5d1e9275b.yaml @@ -0,0 +1,58 @@ +id: wp-graphql-3ce969cc21aaadf47f9f21f5d1e9275b + +info: + name: > + WPGraphQL <= 1.3.5 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd22276b-41d4-4795-a79e-d770d0cf4b76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-graphql/" + google-query: inurl:"/wp-content/plugins/wp-graphql/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-graphql,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-graphql/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-graphql" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-graphql-57520ddea3aef158b3f4c190e8c7e07c.yaml b/nuclei-templates/cve-less/plugins/wp-graphql-57520ddea3aef158b3f4c190e8c7e07c.yaml new file mode 100644 index 0000000000..26413bfe64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-graphql-57520ddea3aef158b3f4c190e8c7e07c.yaml @@ -0,0 +1,58 @@ +id: wp-graphql-57520ddea3aef158b3f4c190e8c7e07c + +info: + name: > + WPGraphQL <= 0.2.3 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cb7bc91-b2e9-4ede-80cf-6b961ac6dcb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-graphql/" + google-query: inurl:"/wp-content/plugins/wp-graphql/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-graphql,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-graphql/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-graphql" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-graphql-b238fd34b5c3e924a09fd674d5421611.yaml b/nuclei-templates/cve-less/plugins/wp-graphql-b238fd34b5c3e924a09fd674d5421611.yaml new file mode 100644 index 0000000000..0062d3384f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-graphql-b238fd34b5c3e924a09fd674d5421611.yaml @@ -0,0 +1,58 @@ +id: wp-graphql-b238fd34b5c3e924a09fd674d5421611 + +info: + name: > + WPGraphQL <= 1.14.5 - Authenticated (Editor+) Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38efd6d6-b931-41a7-b55d-b98cdeef4145?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-graphql/" + google-query: inurl:"/wp-content/plugins/wp-graphql/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-graphql,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-graphql/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-graphql" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-graphql-b842e16402f90d1b3c5bd6bd8d47b010.yaml b/nuclei-templates/cve-less/plugins/wp-graphql-b842e16402f90d1b3c5bd6bd8d47b010.yaml new file mode 100644 index 0000000000..70b483c94c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-graphql-b842e16402f90d1b3c5bd6bd8d47b010.yaml @@ -0,0 +1,58 @@ +id: wp-graphql-b842e16402f90d1b3c5bd6bd8d47b010 + +info: + name: > + WPGraphQL <= 0.2.3 - Unauthenticated Comment Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2be9815d-56c6-4574-9b4c-75fff40a148d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-graphql/" + google-query: inurl:"/wp-content/plugins/wp-graphql/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-graphql,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-graphql/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-graphql" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-graphql-ffeca4920c42635f66f540ad7d4822e8.yaml b/nuclei-templates/cve-less/plugins/wp-graphql-ffeca4920c42635f66f540ad7d4822e8.yaml new file mode 100644 index 0000000000..40a0f21ace --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-graphql-ffeca4920c42635f66f540ad7d4822e8.yaml @@ -0,0 +1,58 @@ +id: wp-graphql-ffeca4920c42635f66f540ad7d4822e8 + +info: + name: > + WPGraphQL <= 0.3.4 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af455697-59da-488e-82fe-bb0fad65a810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-graphql/" + google-query: inurl:"/wp-content/plugins/wp-graphql/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-graphql,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-graphql/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-graphql" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-graphql-woocommerce-bc8d13f34974a281819e2214a599c545.yaml b/nuclei-templates/cve-less/plugins/wp-graphql-woocommerce-bc8d13f34974a281819e2214a599c545.yaml new file mode 100644 index 0000000000..bd9fe2835a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-graphql-woocommerce-bc8d13f34974a281819e2214a599c545.yaml @@ -0,0 +1,58 @@ +id: wp-graphql-woocommerce-bc8d13f34974a281819e2214a599c545 + +info: + name: > + WPGraphQL WooCommerce <= 0.11.0 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c926145-f0b5-44cf-bea6-e9bdf6e8e687?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-graphql-woocommerce/" + google-query: inurl:"/wp-content/plugins/wp-graphql-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-graphql-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-graphql-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-graphql-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gratify-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-gratify-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c1e4c54262 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gratify-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-gratify-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gratify/" + google-query: inurl:"/wp-content/plugins/wp-gratify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gratify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gratify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gratify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-gravity-forms-spreadsheets-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/wp-gravity-forms-spreadsheets-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..53fdcf30f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-gravity-forms-spreadsheets-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: wp-gravity-forms-spreadsheets-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-gravity-forms-spreadsheets/" + google-query: inurl:"/wp-content/plugins/wp-gravity-forms-spreadsheets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-gravity-forms-spreadsheets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-gravity-forms-spreadsheets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-gravity-forms-spreadsheets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-guestmap-25e2788cf757f6544d551ea3a1e2ff53.yaml b/nuclei-templates/cve-less/plugins/wp-guestmap-25e2788cf757f6544d551ea3a1e2ff53.yaml new file mode 100644 index 0000000000..0159129c0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-guestmap-25e2788cf757f6544d551ea3a1e2ff53.yaml @@ -0,0 +1,58 @@ +id: wp-guestmap-25e2788cf757f6544d551ea3a1e2ff53 + +info: + name: > + WP Guestmap <= 1.8 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54560426-a9c9-4a60-9690-8e797e0e7e8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-guestmap/" + google-query: inurl:"/wp-content/plugins/wp-guestmap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-guestmap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-guestmap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-guestmap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-guppy-a903ab4eb75c172e6eca10c67cb489f2.yaml b/nuclei-templates/cve-less/plugins/wp-guppy-a903ab4eb75c172e6eca10c67cb489f2.yaml new file mode 100644 index 0000000000..f34607d44b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-guppy-a903ab4eb75c172e6eca10c67cb489f2.yaml @@ -0,0 +1,58 @@ +id: wp-guppy-a903ab4eb75c172e6eca10c67cb489f2 + +info: + name: > + WP Guppy < 1.3 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1983cc82-c527-47d9-84ba-f903dda1b1ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-guppy/" + google-query: inurl:"/wp-content/plugins/wp-guppy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-guppy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-guppy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-guppy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-header-images-40e3027a5e804a97b0f46e2e4f30f502.yaml b/nuclei-templates/cve-less/plugins/wp-header-images-40e3027a5e804a97b0f46e2e4f30f502.yaml new file mode 100644 index 0000000000..0075dad5a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-header-images-40e3027a5e804a97b0f46e2e4f30f502.yaml @@ -0,0 +1,58 @@ +id: wp-header-images-40e3027a5e804a97b0f46e2e4f30f502 + +info: + name: > + WP Header Images <= 2.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43412c79-3612-4e73-ba79-cb8688e776fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-header-images/" + google-query: inurl:"/wp-content/plugins/wp-header-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-header-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-header-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-header-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-helper-lite-7a5eb553f654c8abb18f57d79b8b5c6d.yaml b/nuclei-templates/cve-less/plugins/wp-helper-lite-7a5eb553f654c8abb18f57d79b8b5c6d.yaml new file mode 100644 index 0000000000..4ad585caa0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-helper-lite-7a5eb553f654c8abb18f57d79b8b5c6d.yaml @@ -0,0 +1,58 @@ +id: wp-helper-lite-7a5eb553f654c8abb18f57d79b8b5c6d + +info: + name: > + WP Helper Premium <= 4.5.1 - Cross-Site Request Forgery via whp_fields + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73e2c5bd-c81d-48ee-a5fc-346dd820d0a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-helper-lite/" + google-query: inurl:"/wp-content/plugins/wp-helper-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-helper-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-helper-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-helper-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-helper-lite-a7962c57d554ba3791bc1c180659f4a3.yaml b/nuclei-templates/cve-less/plugins/wp-helper-lite-a7962c57d554ba3791bc1c180659f4a3.yaml new file mode 100644 index 0000000000..4943bddc3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-helper-lite-a7962c57d554ba3791bc1c180659f4a3.yaml @@ -0,0 +1,58 @@ +id: wp-helper-lite-a7962c57d554ba3791bc1c180659f4a3 + +info: + name: > + WP Helper Premium <= 4.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce8526f0-9dfb-4020-aa58-d2ff5bd652bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-helper-lite/" + google-query: inurl:"/wp-content/plugins/wp-helper-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-helper-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-helper-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-helper-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-helper-lite-b94cc0b7afe53c571ed57e681c321c40.yaml b/nuclei-templates/cve-less/plugins/wp-helper-lite-b94cc0b7afe53c571ed57e681c321c40.yaml new file mode 100644 index 0000000000..12224f4318 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-helper-lite-b94cc0b7afe53c571ed57e681c321c40.yaml @@ -0,0 +1,58 @@ +id: wp-helper-lite-b94cc0b7afe53c571ed57e681c321c40 + +info: + name: > + WP Helper Premium < 4.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faa3eb51-fdee-443e-aacb-04900f609efd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-helper-lite/" + google-query: inurl:"/wp-content/plugins/wp-helper-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-helper-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-helper-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-helper-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-helper-lite-eb9d1a9f33f022abcf9d4898480aa085.yaml b/nuclei-templates/cve-less/plugins/wp-helper-lite-eb9d1a9f33f022abcf9d4898480aa085.yaml new file mode 100644 index 0000000000..986d1b0c3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-helper-lite-eb9d1a9f33f022abcf9d4898480aa085.yaml @@ -0,0 +1,58 @@ +id: wp-helper-lite-eb9d1a9f33f022abcf9d4898480aa085 + +info: + name: > + WP Helper Premium <= 4.2.0 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d6ea02d-df63-476c-b205-fa64ada18db5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-helper-lite/" + google-query: inurl:"/wp-content/plugins/wp-helper-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-helper-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-helper-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-helper-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hide-9e68449652754ef8472e39a728f388be.yaml b/nuclei-templates/cve-less/plugins/wp-hide-9e68449652754ef8472e39a728f388be.yaml new file mode 100644 index 0000000000..453123e456 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hide-9e68449652754ef8472e39a728f388be.yaml @@ -0,0 +1,58 @@ +id: wp-hide-9e68449652754ef8472e39a728f388be + +info: + name: > + WP Hide <= 0.0.2 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e534021-1c63-4db9-914b-7f9b3b613087?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hide/" + google-query: inurl:"/wp-content/plugins/wp-hide/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hide,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hide/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hide" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hide-backed-notices-d44a9e8c9bb990d8de78849d0af5d4fe.yaml b/nuclei-templates/cve-less/plugins/wp-hide-backed-notices-d44a9e8c9bb990d8de78849d0af5d4fe.yaml new file mode 100644 index 0000000000..19adc9cb85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hide-backed-notices-d44a9e8c9bb990d8de78849d0af5d4fe.yaml @@ -0,0 +1,58 @@ +id: wp-hide-backed-notices-d44a9e8c9bb990d8de78849d0af5d4fe + +info: + name: > + Hide Dashboard Notifications <= 1.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/186e4147-4cb4-4337-9c3c-d47589b06b20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hide-backed-notices/" + google-query: inurl:"/wp-content/plugins/wp-hide-backed-notices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hide-backed-notices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hide-backed-notices/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hide-backed-notices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hide-pages-0d6956dd795b21ad1b36b190e37feb8e.yaml b/nuclei-templates/cve-less/plugins/wp-hide-pages-0d6956dd795b21ad1b36b190e37feb8e.yaml new file mode 100644 index 0000000000..32029991e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hide-pages-0d6956dd795b21ad1b36b190e37feb8e.yaml @@ -0,0 +1,58 @@ +id: wp-hide-pages-0d6956dd795b21ad1b36b190e37feb8e + +info: + name: > + WP Hide Pages <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46e7ca97-6dd9-4e27-8e69-2e73f9490ea7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hide-pages/" + google-query: inurl:"/wp-content/plugins/wp-hide-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hide-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hide-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hide-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hide-post-1f01b8aac13069c5d246c4165063f59f.yaml b/nuclei-templates/cve-less/plugins/wp-hide-post-1f01b8aac13069c5d246c4165063f59f.yaml new file mode 100644 index 0000000000..d70118d269 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hide-post-1f01b8aac13069c5d246c4165063f59f.yaml @@ -0,0 +1,58 @@ +id: wp-hide-post-1f01b8aac13069c5d246c4165063f59f + +info: + name: > + WP Hide Post <= 2.0.10 - Cross-Site Request Forgery via save_bulk_edit_data + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c957f3f-fb98-49ff-b317-93b1accd0d47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hide-post/" + google-query: inurl:"/wp-content/plugins/wp-hide-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hide-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hide-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hide-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hide-security-enhancer-7d8abe3c50b03fecc955bd5577c71ca3.yaml b/nuclei-templates/cve-less/plugins/wp-hide-security-enhancer-7d8abe3c50b03fecc955bd5577c71ca3.yaml new file mode 100644 index 0000000000..3d47f05936 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hide-security-enhancer-7d8abe3c50b03fecc955bd5577c71ca3.yaml @@ -0,0 +1,58 @@ +id: wp-hide-security-enhancer-7d8abe3c50b03fecc955bd5577c71ca3 + +info: + name: > + WP Hide & Security Enhancer <= 1.7.9.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08aa24a3-4306-4857-88ac-ecdcc578cdf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hide-security-enhancer/" + google-query: inurl:"/wp-content/plugins/wp-hide-security-enhancer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hide-security-enhancer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hide-security-enhancer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hide-security-enhancer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hide-security-enhancer-abbf4b405ae85f6f94a6172993fba981.yaml b/nuclei-templates/cve-less/plugins/wp-hide-security-enhancer-abbf4b405ae85f6f94a6172993fba981.yaml new file mode 100644 index 0000000000..6dd304cc1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hide-security-enhancer-abbf4b405ae85f6f94a6172993fba981.yaml @@ -0,0 +1,58 @@ +id: wp-hide-security-enhancer-abbf4b405ae85f6f94a6172993fba981 + +info: + name: > + WP Hide & Security Enhancer <= 1.3.9.2 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aee59a8f-7f21-4572-b146-ab1b6350ddb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hide-security-enhancer/" + google-query: inurl:"/wp-content/plugins/wp-hide-security-enhancer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hide-security-enhancer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hide-security-enhancer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hide-security-enhancer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hijri-4daf2f8ba4a45a7e36fb255ce745667e.yaml b/nuclei-templates/cve-less/plugins/wp-hijri-4daf2f8ba4a45a7e36fb255ce745667e.yaml new file mode 100644 index 0000000000..b3a2be6ae1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hijri-4daf2f8ba4a45a7e36fb255ce745667e.yaml @@ -0,0 +1,58 @@ +id: wp-hijri-4daf2f8ba4a45a7e36fb255ce745667e + +info: + name: > + WP-Hijri <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67aaf9fa-e92b-42f2-94ac-f27c5d073002?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hijri/" + google-query: inurl:"/wp-content/plugins/wp-hijri/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hijri,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hijri/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hijri" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-home-page-menu-1663017756a06282bb3d18d015739d82.yaml b/nuclei-templates/cve-less/plugins/wp-home-page-menu-1663017756a06282bb3d18d015739d82.yaml new file mode 100644 index 0000000000..0cacd677c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-home-page-menu-1663017756a06282bb3d18d015739d82.yaml @@ -0,0 +1,58 @@ +id: wp-home-page-menu-1663017756a06282bb3d18d015739d82 + +info: + name: > + WP Home Page Menu < 3.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9394801-4a74-4327-9afd-35f4166c2abb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-home-page-menu/" + google-query: inurl:"/wp-content/plugins/wp-home-page-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-home-page-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-home-page-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-home-page-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-homepage-slideshow-086786b1308db5fa85a4991de8593d04.yaml b/nuclei-templates/cve-less/plugins/wp-homepage-slideshow-086786b1308db5fa85a4991de8593d04.yaml new file mode 100644 index 0000000000..f92e03eb76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-homepage-slideshow-086786b1308db5fa85a4991de8593d04.yaml @@ -0,0 +1,58 @@ +id: wp-homepage-slideshow-086786b1308db5fa85a4991de8593d04 + +info: + name: > + Homepage SlideShow Plugin < 2.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/946d5a2c-f20f-483a-8150-0266a631a112?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-homepage-slideshow/" + google-query: inurl:"/wp-content/plugins/wp-homepage-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-homepage-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-homepage-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-homepage-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-homepage-slideshow-47a30f13a712f0b51de3660787ce6dab.yaml b/nuclei-templates/cve-less/plugins/wp-homepage-slideshow-47a30f13a712f0b51de3660787ce6dab.yaml new file mode 100644 index 0000000000..eccba9cf52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-homepage-slideshow-47a30f13a712f0b51de3660787ce6dab.yaml @@ -0,0 +1,58 @@ +id: wp-homepage-slideshow-47a30f13a712f0b51de3660787ce6dab + +info: + name: > + Homepage SlideShow <= 2.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebcbeb7c-eadb-4541-94f0-6e85f7f3e6a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-homepage-slideshow/" + google-query: inurl:"/wp-content/plugins/wp-homepage-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-homepage-slideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-homepage-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-homepage-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-1ca57b94b0c3924da7aeb6a7b470fb34.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-1ca57b94b0c3924da7aeb6a7b470fb34.yaml new file mode 100644 index 0000000000..ff873c73f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-1ca57b94b0c3924da7aeb6a7b470fb34.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-1ca57b94b0c3924da7aeb6a7b470fb34 + +info: + name: > + WP Hotel Booking <= 1.10.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71fe1729-4bb5-4b95-9183-b4d793bcfd72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-1dcd89bf2988fc6137fe33f02a552c95.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-1dcd89bf2988fc6137fe33f02a552c95.yaml new file mode 100644 index 0000000000..e1854cb696 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-1dcd89bf2988fc6137fe33f02a552c95.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-1dcd89bf2988fc6137fe33f02a552c95 + +info: + name: > + WP Hotel Booking <= 1.10.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd9826d7-f8f5-4d3d-8145-3d4e6a63d784?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-75ba043cb8adfd31b0f166864fde485a.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-75ba043cb8adfd31b0f166864fde485a.yaml new file mode 100644 index 0000000000..829e7ed001 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-75ba043cb8adfd31b0f166864fde485a.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-75ba043cb8adfd31b0f166864fde485a + +info: + name: > + WP Hotel Booking <= 2.0.0 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b56a5ff2-10cb-4eee-9409-7f8a22d00358?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-9d40d7d424169039478e2bac7970cbe4.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-9d40d7d424169039478e2bac7970cbe4.yaml new file mode 100644 index 0000000000..5dcb80b948 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-9d40d7d424169039478e2bac7970cbe4.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-9d40d7d424169039478e2bac7970cbe4 + +info: + name: > + WP Hotel Booking <= 1.10.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c31d037-1f9e-4887-aaff-3c32fb8b4501?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-b9f4dda3ee3f676f0c301784c74a1eb5.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-b9f4dda3ee3f676f0c301784c74a1eb5.yaml new file mode 100644 index 0000000000..370376e803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-b9f4dda3ee3f676f0c301784c74a1eb5.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-b9f4dda3ee3f676f0c301784c74a1eb5 + +info: + name: > + WP Hotel Booking <= 2.0.7 - Missing Authorization to (Subscriber+) Arbitrary Post Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0439d2ee-7742-4aa7-ba4e-db55c6b2718e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-c965265cd81e4009a888757a2fe10108.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-c965265cd81e4009a888757a2fe10108.yaml new file mode 100644 index 0000000000..3d2e5a2503 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-c965265cd81e4009a888757a2fe10108.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-c965265cd81e4009a888757a2fe10108 + +info: + name: > + WP Hotel Booking <= 2.0.7 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6a02da1-b005-4fa9-9657-1c5f019f3858?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-da3e165cf3ef701df2ce9756df8e0a3e.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-da3e165cf3ef701df2ce9756df8e0a3e.yaml new file mode 100644 index 0000000000..cbaac6dda2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-da3e165cf3ef701df2ce9756df8e0a3e.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-da3e165cf3ef701df2ce9756df8e0a3e + +info: + name: > + WP Hotel Booking <= 2.0.9.2 - Improper Authorization on Multiple REST API Routes + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86f15e94-6ca7-4eb2-8a38-b4add9251dab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-e2b770c20c0fc55c7a4f89e727dd45de.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-e2b770c20c0fc55c7a4f89e727dd45de.yaml new file mode 100644 index 0000000000..2dd69066a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-e2b770c20c0fc55c7a4f89e727dd45de.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-e2b770c20c0fc55c7a4f89e727dd45de + +info: + name: > + WP Hotel Booking <= 2.0.9.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/489256a8-e28f-4d7c-895a-928e9463bb1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hotel-booking-f3912809d80374ed45475cdb257fbe88.yaml b/nuclei-templates/cve-less/plugins/wp-hotel-booking-f3912809d80374ed45475cdb257fbe88.yaml new file mode 100644 index 0000000000..e73584f8d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hotel-booking-f3912809d80374ed45475cdb257fbe88.yaml @@ -0,0 +1,58 @@ +id: wp-hotel-booking-f3912809d80374ed45475cdb257fbe88 + +info: + name: > + WP Hotel Booking <= 2.0.8 - Insufficient Authorization to Unauthorized Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/370ccbad-4001-4af5-8d32-fd6b04a8fc41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hotel-booking/" + google-query: inurl:"/wp-content/plugins/wp-hotel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hotel-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hotel-booking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hotel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hr-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-hr-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4521ec4743 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hr-manager-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-hr-manager-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hr-manager/" + google-query: inurl:"/wp-content/plugins/wp-hr-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hr-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hr-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hr-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-htaccess-control-4c313c7653b942a477e04e3a6c17f18a.yaml b/nuclei-templates/cve-less/plugins/wp-htaccess-control-4c313c7653b942a477e04e3a6c17f18a.yaml new file mode 100644 index 0000000000..df97baea76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-htaccess-control-4c313c7653b942a477e04e3a6c17f18a.yaml @@ -0,0 +1,58 @@ +id: wp-htaccess-control-4c313c7653b942a477e04e3a6c17f18a + +info: + name: > + WP htaccess Control <= 3.5.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6741b770-79d3-4797-8f8f-4ca83fde4705?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-htaccess-control/" + google-query: inurl:"/wp-content/plugins/wp-htaccess-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-htaccess-control,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-htaccess-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-htaccess-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-html-author-bio-by-ahmad-awais-752b08f32f0cfee54f18be53421a36cb.yaml b/nuclei-templates/cve-less/plugins/wp-html-author-bio-by-ahmad-awais-752b08f32f0cfee54f18be53421a36cb.yaml new file mode 100644 index 0000000000..33137821d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-html-author-bio-by-ahmad-awais-752b08f32f0cfee54f18be53421a36cb.yaml @@ -0,0 +1,58 @@ +id: wp-html-author-bio-by-ahmad-awais-752b08f32f0cfee54f18be53421a36cb + +info: + name: > + WP HTML Author Bio <= 1.2.0 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11b640a9-a031-4061-a4d2-93decd634acf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-html-author-bio-by-ahmad-awais/" + google-query: inurl:"/wp-content/plugins/wp-html-author-bio-by-ahmad-awais/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-html-author-bio-by-ahmad-awais,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-html-author-bio-by-ahmad-awais/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-html-author-bio-by-ahmad-awais" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-html-mail-0d54afc8ed70fc0c6271f164073322bf.yaml b/nuclei-templates/cve-less/plugins/wp-html-mail-0d54afc8ed70fc0c6271f164073322bf.yaml new file mode 100644 index 0000000000..72591bc629 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-html-mail-0d54afc8ed70fc0c6271f164073322bf.yaml @@ -0,0 +1,58 @@ +id: wp-html-mail-0d54afc8ed70fc0c6271f164073322bf + +info: + name: > + WP HTML Mail < 2.9.1 - HTML Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3af900c-4048-4f4f-93e9-c60ca34d015b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-html-mail/" + google-query: inurl:"/wp-content/plugins/wp-html-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-html-mail,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-html-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-html-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-html-mail-29dfa6e3862f7e4332686362811dfe12.yaml b/nuclei-templates/cve-less/plugins/wp-html-mail-29dfa6e3862f7e4332686362811dfe12.yaml new file mode 100644 index 0000000000..aab9cb6b11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-html-mail-29dfa6e3862f7e4332686362811dfe12.yaml @@ -0,0 +1,58 @@ +id: wp-html-mail-29dfa6e3862f7e4332686362811dfe12 + +info: + name: > + WP HTML Mail <= 3.0.9 - Missing Authorization on Rest Route + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a42449f-aef1-42b8-af58-4f4aab7008f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-html-mail/" + google-query: inurl:"/wp-content/plugins/wp-html-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-html-mail,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-html-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-html-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-html-mail-a97999937eba2822f909f308d3c02136.yaml b/nuclei-templates/cve-less/plugins/wp-html-mail-a97999937eba2822f909f308d3c02136.yaml new file mode 100644 index 0000000000..6188174651 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-html-mail-a97999937eba2822f909f308d3c02136.yaml @@ -0,0 +1,58 @@ +id: wp-html-mail-a97999937eba2822f909f308d3c02136 + +info: + name: > + WordPress Email Template Designer < 3.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/532ce349-0f4c-4197-bbbd-1e3dcbd0c9d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-html-mail/" + google-query: inurl:"/wp-content/plugins/wp-html-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-html-mail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-html-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-html-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-html-mail-e6cee718e04226d8b1f750fff9c130ff.yaml b/nuclei-templates/cve-less/plugins/wp-html-mail-e6cee718e04226d8b1f750fff9c130ff.yaml new file mode 100644 index 0000000000..b6d7736954 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-html-mail-e6cee718e04226d8b1f750fff9c130ff.yaml @@ -0,0 +1,58 @@ +id: wp-html-mail-e6cee718e04226d8b1f750fff9c130ff + +info: + name: > + WP HTML Mail <= 3.4.0 - Cross-Site Request Forgery via 'send_test' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dda9aa4a-bac7-4aa1-b0c3-c8e37b1fbe70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-html-mail/" + google-query: inurl:"/wp-content/plugins/wp-html-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-html-mail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-html-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-html-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-html-sitemap-817be9a0bd25037cf51f3d6111fd059e.yaml b/nuclei-templates/cve-less/plugins/wp-html-sitemap-817be9a0bd25037cf51f3d6111fd059e.yaml new file mode 100644 index 0000000000..e94927b75a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-html-sitemap-817be9a0bd25037cf51f3d6111fd059e.yaml @@ -0,0 +1,58 @@ +id: wp-html-sitemap-817be9a0bd25037cf51f3d6111fd059e + +info: + name: > + WP HTML Sitemap <= 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e766f735-f5b2-4189-b4b1-40161c5aba8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-html-sitemap/" + google-query: inurl:"/wp-content/plugins/wp-html-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-html-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-html-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-html-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-htpasswd-f030486cf056eab3637611e650524a05.yaml b/nuclei-templates/cve-less/plugins/wp-htpasswd-f030486cf056eab3637611e650524a05.yaml new file mode 100644 index 0000000000..f17f0fd801 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-htpasswd-f030486cf056eab3637611e650524a05.yaml @@ -0,0 +1,58 @@ +id: wp-htpasswd-f030486cf056eab3637611e650524a05 + +info: + name: > + WP htpasswd <= 1.7 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36fd8125-f876-49c2-a0bb-4c7ef95b462c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-htpasswd/" + google-query: inurl:"/wp-content/plugins/wp-htpasswd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-htpasswd,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-htpasswd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-htpasswd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-hubspot-woocommerce-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/wp-hubspot-woocommerce-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..aea63c670b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-hubspot-woocommerce-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: wp-hubspot-woocommerce-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-hubspot-woocommerce/" + google-query: inurl:"/wp-content/plugins/wp-hubspot-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-hubspot-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-hubspot-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-hubspot-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-humanstxt-e4bd7eea0fd05e8e2fe20b6f0c6b7046.yaml b/nuclei-templates/cve-less/plugins/wp-humanstxt-e4bd7eea0fd05e8e2fe20b6f0c6b7046.yaml new file mode 100644 index 0000000000..9830bd3af0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-humanstxt-e4bd7eea0fd05e8e2fe20b6f0c6b7046.yaml @@ -0,0 +1,58 @@ +id: wp-humanstxt-e4bd7eea0fd05e8e2fe20b6f0c6b7046 + +info: + name: > + WP Humans.txt <= 1.0.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/617c850f-8d7b-42d4-ac40-2381c4c6bde6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-humanstxt/" + google-query: inurl:"/wp-content/plugins/wp-humanstxt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-humanstxt,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-humanstxt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-humanstxt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ical-availability-2d9904a0be3734fb0155be062ed61702.yaml b/nuclei-templates/cve-less/plugins/wp-ical-availability-2d9904a0be3734fb0155be062ed61702.yaml new file mode 100644 index 0000000000..0fcd194cb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ical-availability-2d9904a0be3734fb0155be062ed61702.yaml @@ -0,0 +1,58 @@ +id: wp-ical-availability-2d9904a0be3734fb0155be062ed61702 + +info: + name: > + WP iCal Availability <= 1.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc3f1d4e-84f7-4878-8b06-10444caa7dcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ical-availability/" + google-query: inurl:"/wp-content/plugins/wp-ical-availability/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ical-availability,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ical-availability/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ical-availability" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ical-availability-e3f695a2140d0d6b1618f7ffa872601f.yaml b/nuclei-templates/cve-less/plugins/wp-ical-availability-e3f695a2140d0d6b1618f7ffa872601f.yaml new file mode 100644 index 0000000000..848ca703bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ical-availability-e3f695a2140d0d6b1618f7ffa872601f.yaml @@ -0,0 +1,58 @@ +id: wp-ical-availability-e3f695a2140d0d6b1618f7ffa872601f + +info: + name: > + WP iCal Availability <= 1.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c38ac30d-95dc-415e-8ea6-507ed87d34db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ical-availability/" + google-query: inurl:"/wp-content/plugins/wp-ical-availability/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ical-availability,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ical-availability/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ical-availability" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-icommerce-f4d44f135652b4f97e23ce29c089eca6.yaml b/nuclei-templates/cve-less/plugins/wp-icommerce-f4d44f135652b4f97e23ce29c089eca6.yaml new file mode 100644 index 0000000000..783aced384 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-icommerce-f4d44f135652b4f97e23ce29c089eca6.yaml @@ -0,0 +1,58 @@ +id: wp-icommerce-f4d44f135652b4f97e23ce29c089eca6 + +info: + name: > + WP iCommerce – the first interactive ecommerce for wordpress <= 1.1.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffd44a71-486b-4182-bd91-e31dd06d0d4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-icommerce/" + google-query: inurl:"/wp-content/plugins/wp-icommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-icommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-icommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-icommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-image-carousel-074f8cb869df86a1b6d64a4a39d460b8.yaml b/nuclei-templates/cve-less/plugins/wp-image-carousel-074f8cb869df86a1b6d64a4a39d460b8.yaml new file mode 100644 index 0000000000..f72226dc5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-image-carousel-074f8cb869df86a1b6d64a4a39d460b8.yaml @@ -0,0 +1,58 @@ +id: wp-image-carousel-074f8cb869df86a1b6d64a4a39d460b8 + +info: + name: > + WP Image Carousel WordPress - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f4bb514-80bd-4d66-a60f-0a6a287af5de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-image-carousel/" + google-query: inurl:"/wp-content/plugins/wp-image-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-image-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-image-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-image-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-image-news-slider-05168237faa874bd973125b39bd200d2.yaml b/nuclei-templates/cve-less/plugins/wp-image-news-slider-05168237faa874bd973125b39bd200d2.yaml new file mode 100644 index 0000000000..0a6fc2b86a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-image-news-slider-05168237faa874bd973125b39bd200d2.yaml @@ -0,0 +1,58 @@ +id: wp-image-news-slider-05168237faa874bd973125b39bd200d2 + +info: + name: > + Image News Slider <= 3.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2971547d-39da-46f1-b62c-1918042ae654?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-image-news-slider/" + google-query: inurl:"/wp-content/plugins/wp-image-news-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-image-news-slider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-image-news-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-image-news-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-image-news-slider-2d5c1e4ab0db1f2ad3a139f4145f58ad.yaml b/nuclei-templates/cve-less/plugins/wp-image-news-slider-2d5c1e4ab0db1f2ad3a139f4145f58ad.yaml new file mode 100644 index 0000000000..b496ca500a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-image-news-slider-2d5c1e4ab0db1f2ad3a139f4145f58ad.yaml @@ -0,0 +1,58 @@ +id: wp-image-news-slider-2d5c1e4ab0db1f2ad3a139f4145f58ad + +info: + name: > + Image News Slider <= 3.2 - Unspecified Vulnerability + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2735f9a5-3f5b-4eac-a19a-59925c1fe1b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-image-news-slider/" + google-query: inurl:"/wp-content/plugins/wp-image-news-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-image-news-slider,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-image-news-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-image-news-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-image-news-slider-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/wp-image-news-slider-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..e444c70663 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-image-news-slider-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: wp-image-news-slider-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-image-news-slider/" + google-query: inurl:"/wp-content/plugins/wp-image-news-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-image-news-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-image-news-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-image-news-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-image-resizer-8b089becf530f93c37bff15846437ba4.yaml b/nuclei-templates/cve-less/plugins/wp-image-resizer-8b089becf530f93c37bff15846437ba4.yaml new file mode 100644 index 0000000000..4499c1e5de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-image-resizer-8b089becf530f93c37bff15846437ba4.yaml @@ -0,0 +1,58 @@ +id: wp-image-resizer-8b089becf530f93c37bff15846437ba4 + +info: + name: > + WP Image Resizer (Unspecified Version) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee5af42d-71d8-4e65-bd74-55456480da8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-image-resizer/" + google-query: inurl:"/wp-content/plugins/wp-image-resizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-image-resizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-image-resizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-image-resizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-image-slideshow-b5617dec0fcbbbc761aa88231d94be83.yaml b/nuclei-templates/cve-less/plugins/wp-image-slideshow-b5617dec0fcbbbc761aa88231d94be83.yaml new file mode 100644 index 0000000000..59e15ec2d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-image-slideshow-b5617dec0fcbbbc761aa88231d94be83.yaml @@ -0,0 +1,58 @@ +id: wp-image-slideshow-b5617dec0fcbbbc761aa88231d94be83 + +info: + name: > + wp image slideshow <= 12.0 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e24383b-5b0f-4114-908b-4c2778632f73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-image-slideshow/" + google-query: inurl:"/wp-content/plugins/wp-image-slideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-image-slideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-image-slideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-image-slideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-image-zoooom-11ece8e5656573afec625cc63879b1c5.yaml b/nuclei-templates/cve-less/plugins/wp-image-zoooom-11ece8e5656573afec625cc63879b1c5.yaml new file mode 100644 index 0000000000..18042723ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-image-zoooom-11ece8e5656573afec625cc63879b1c5.yaml @@ -0,0 +1,58 @@ +id: wp-image-zoooom-11ece8e5656573afec625cc63879b1c5 + +info: + name: > + WP Image Zoom <= 1.23 - Cross-Site Request Forgery to Denial of Service + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/312bb534-2a40-42f1-9a3e-8b1395e1e199?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-image-zoooom/" + google-query: inurl:"/wp-content/plugins/wp-image-zoooom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-image-zoooom,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-image-zoooom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-image-zoooom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-image-zoooom-fdc1c524e165c5f1685c267f450ebcb9.yaml b/nuclei-templates/cve-less/plugins/wp-image-zoooom-fdc1c524e165c5f1685c267f450ebcb9.yaml new file mode 100644 index 0000000000..e57ca9c721 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-image-zoooom-fdc1c524e165c5f1685c267f450ebcb9.yaml @@ -0,0 +1,58 @@ +id: wp-image-zoooom-fdc1c524e165c5f1685c267f450ebcb9 + +info: + name: > + WP Image Zoom <= 1.46 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee1aab28-e9db-4010-ad46-ad4aec1d5dab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-image-zoooom/" + google-query: inurl:"/wp-content/plugins/wp-image-zoooom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-image-zoooom,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-image-zoooom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-image-zoooom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.46') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-imagezoom-324709497ee87aa1c88e83eb2c996e98.yaml b/nuclei-templates/cve-less/plugins/wp-imagezoom-324709497ee87aa1c88e83eb2c996e98.yaml new file mode 100644 index 0000000000..bc4a5056f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-imagezoom-324709497ee87aa1c88e83eb2c996e98.yaml @@ -0,0 +1,58 @@ +id: wp-imagezoom-324709497ee87aa1c88e83eb2c996e98 + +info: + name: > + Wp-ImageZoom <= 1.0.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e57f7912-4af3-4dcb-b267-afec1c373b00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-imagezoom/" + google-query: inurl:"/wp-content/plugins/wp-imagezoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-imagezoom,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-imagezoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-imagezoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-imagezoom-3de3e5de16fc382e7b8fe56b08addd2e.yaml b/nuclei-templates/cve-less/plugins/wp-imagezoom-3de3e5de16fc382e7b8fe56b08addd2e.yaml new file mode 100644 index 0000000000..71947b1993 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-imagezoom-3de3e5de16fc382e7b8fe56b08addd2e.yaml @@ -0,0 +1,58 @@ +id: wp-imagezoom-3de3e5de16fc382e7b8fe56b08addd2e + +info: + name: > + Wp-ImageZoom < 1.0.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eea99e1e-63c9-4021-80a0-1ed732b58ca9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-imagezoom/" + google-query: inurl:"/wp-content/plugins/wp-imagezoom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-imagezoom,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-imagezoom/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-imagezoom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-import-export-lite-5f94fd73fc44e0e8d375d47e5fc1e6c1.yaml b/nuclei-templates/cve-less/plugins/wp-import-export-lite-5f94fd73fc44e0e8d375d47e5fc1e6c1.yaml new file mode 100644 index 0000000000..9b48b4b963 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-import-export-lite-5f94fd73fc44e0e8d375d47e5fc1e6c1.yaml @@ -0,0 +1,58 @@ +id: wp-import-export-lite-5f94fd73fc44e0e8d375d47e5fc1e6c1 + +info: + name: > + WP Import Export Lite <= 3.9.26 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfc6b4a5-ff13-457f-9e06-de15e8cb5510?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-import-export-lite/" + google-query: inurl:"/wp-content/plugins/wp-import-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-import-export-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-import-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-import-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-import-export-lite-a9b4271e0f7289a56cd0261063f73943.yaml b/nuclei-templates/cve-less/plugins/wp-import-export-lite-a9b4271e0f7289a56cd0261063f73943.yaml new file mode 100644 index 0000000000..61c2c9fd9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-import-export-lite-a9b4271e0f7289a56cd0261063f73943.yaml @@ -0,0 +1,58 @@ +id: wp-import-export-lite-a9b4271e0f7289a56cd0261063f73943 + +info: + name: > + WP Import Export Lite & WP Import Export <= 3.9.15 - Unauthenticated Sensitive Data Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c9cbe99-699a-4812-a8ae-aefd2b1e2c00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-import-export-lite/" + google-query: inurl:"/wp-content/plugins/wp-import-export-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-import-export-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-import-export-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-import-export-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-infusionsoft-woocommerce-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/wp-infusionsoft-woocommerce-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..478a7680b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-infusionsoft-woocommerce-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: wp-infusionsoft-woocommerce-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-infusionsoft-woocommerce/" + google-query: inurl:"/wp-content/plugins/wp-infusionsoft-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-infusionsoft-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-infusionsoft-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-infusionsoft-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-inimat-62dc43c109e10a4fb2083be6c80b9766.yaml b/nuclei-templates/cve-less/plugins/wp-inimat-62dc43c109e10a4fb2083be6c80b9766.yaml new file mode 100644 index 0000000000..e8fa3f9402 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-inimat-62dc43c109e10a4fb2083be6c80b9766.yaml @@ -0,0 +1,58 @@ +id: wp-inimat-62dc43c109e10a4fb2083be6c80b9766 + +info: + name: > + Zebra_Form PHP library <= 2.9.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4ea0a8-d2f6-4209-b17f-0a26ba664c63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-inimat/" + google-query: inurl:"/wp-content/plugins/wp-inimat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-inimat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-inimat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-inimat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-inject-807cd0a33bfd97782e746e860be1d566.yaml b/nuclei-templates/cve-less/plugins/wp-inject-807cd0a33bfd97782e746e860be1d566.yaml new file mode 100644 index 0000000000..ce25d40ee3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-inject-807cd0a33bfd97782e746e860be1d566.yaml @@ -0,0 +1,58 @@ +id: wp-inject-807cd0a33bfd97782e746e860be1d566 + +info: + name: > + ImageInject <= 1.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bdb68bc-b773-4537-98dd-c54ffa5309c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-inject/" + google-query: inurl:"/wp-content/plugins/wp-inject/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-inject,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-inject/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-inject" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-inject-9741c51413af2327faa27cd2e2fade6e.yaml b/nuclei-templates/cve-less/plugins/wp-inject-9741c51413af2327faa27cd2e2fade6e.yaml new file mode 100644 index 0000000000..5a4d5f91a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-inject-9741c51413af2327faa27cd2e2fade6e.yaml @@ -0,0 +1,58 @@ +id: wp-inject-9741c51413af2327faa27cd2e2fade6e + +info: + name: > + ImageInject <= 1.18 - Authenticated (Admin+) Stored XSS + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3dd3b5e-b0df-45b0-b42d-eaea765f3193?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-inject/" + google-query: inurl:"/wp-content/plugins/wp-inject/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-inject,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-inject/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-inject" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-inject-eaace189d52939bb1c67d181a1aa5e03.yaml b/nuclei-templates/cve-less/plugins/wp-inject-eaace189d52939bb1c67d181a1aa5e03.yaml new file mode 100644 index 0000000000..3282d3da88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-inject-eaace189d52939bb1c67d181a1aa5e03.yaml @@ -0,0 +1,58 @@ +id: wp-inject-eaace189d52939bb1c67d181a1aa5e03 + +info: + name: > + ImageInject <= 1.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb38d3bc-ae82-40ef-b20d-525d51432b1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-inject/" + google-query: inurl:"/wp-content/plugins/wp-inject/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-inject,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-inject/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-inject" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-insert-6cca6746a9736e02869580a9ebe96b4c.yaml b/nuclei-templates/cve-less/plugins/wp-insert-6cca6746a9736e02869580a9ebe96b4c.yaml new file mode 100644 index 0000000000..c12f25aec4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-insert-6cca6746a9736e02869580a9ebe96b4c.yaml @@ -0,0 +1,58 @@ +id: wp-insert-6cca6746a9736e02869580a9ebe96b4c + +info: + name: > + Wp-Insert <= 2.4.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2df89ab9-5cc2-46cb-99b2-bc864e960a35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-insert/" + google-query: inurl:"/wp-content/plugins/wp-insert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-insert,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-insert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-insert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-insert-c33e053383feb22bc4a0a09a68717fb4.yaml b/nuclei-templates/cve-less/plugins/wp-insert-c33e053383feb22bc4a0a09a68717fb4.yaml new file mode 100644 index 0000000000..d9756f1677 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-insert-c33e053383feb22bc4a0a09a68717fb4.yaml @@ -0,0 +1,58 @@ +id: wp-insert-c33e053383feb22bc4a0a09a68717fb4 + +info: + name: > + Wp-Insert <= 2.5.0 Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f607b33a-58ef-4526-9ca1-aaa444aa12bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-insert/" + google-query: inurl:"/wp-content/plugins/wp-insert/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-insert,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-insert/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-insert" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-instagram-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/wp-instagram-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..cf17139f1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-instagram-bank-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: wp-instagram-bank-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-instagram-bank/" + google-query: inurl:"/wp-content/plugins/wp-instagram-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-instagram-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-instagram-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-instagram-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-instance-rename-cfe80c2324444169a4424a703a8b6196.yaml b/nuclei-templates/cve-less/plugins/wp-instance-rename-cfe80c2324444169a4424a703a8b6196.yaml new file mode 100644 index 0000000000..d6e3c45be5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-instance-rename-cfe80c2324444169a4424a703a8b6196.yaml @@ -0,0 +1,58 @@ +id: wp-instance-rename-cfe80c2324444169a4424a703a8b6196 + +info: + name: > + WordPress Renaming Tool by Vlajo <= 1.0 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20140f76-b369-4191-bfd1-0f508112ce0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-instance-rename/" + google-query: inurl:"/wp-content/plugins/wp-instance-rename/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-instance-rename,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-instance-rename/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-instance-rename" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-insurance-be2ba6e35694514824b8df64e723158d.yaml b/nuclei-templates/cve-less/plugins/wp-insurance-be2ba6e35694514824b8df64e723158d.yaml new file mode 100644 index 0000000000..dbc65b4342 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-insurance-be2ba6e35694514824b8df64e723158d.yaml @@ -0,0 +1,58 @@ +id: wp-insurance-be2ba6e35694514824b8df64e723158d + +info: + name: > + WP Insurance – WordPress Insurance Service Plugin <= 2.1.3 - Cross-Site Request Forgery leading to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37264b0f-b021-41f8-a72d-3ee0d06b19a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-insurance/" + google-query: inurl:"/wp-content/plugins/wp-insurance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-insurance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-insurance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-insurance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-integrator-ef0c35cfc8264d312ebd8c7577e88c19.yaml b/nuclei-templates/cve-less/plugins/wp-integrator-ef0c35cfc8264d312ebd8c7577e88c19.yaml new file mode 100644 index 0000000000..eed7c69f9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-integrator-ef0c35cfc8264d312ebd8c7577e88c19.yaml @@ -0,0 +1,58 @@ +id: wp-integrator-ef0c35cfc8264d312ebd8c7577e88c19 + +info: + name: > + WordPress Integrator <= 1.32 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/615efe27-3f3f-4d99-ba8d-a575608121c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-integrator/" + google-query: inurl:"/wp-content/plugins/wp-integrator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-integrator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-integrator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-integrator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-intercom-slack-280619c8c575de4aa0faedb1d7908342.yaml b/nuclei-templates/cve-less/plugins/wp-intercom-slack-280619c8c575de4aa0faedb1d7908342.yaml new file mode 100644 index 0000000000..05761cd4f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-intercom-slack-280619c8c575de4aa0faedb1d7908342.yaml @@ -0,0 +1,58 @@ +id: wp-intercom-slack-280619c8c575de4aa0faedb1d7908342 + +info: + name: > + WP Intercom Slack <= 1.2.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ca30fef-a014-4d19-b9f8-c51db512795b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-intercom-slack/" + google-query: inurl:"/wp-content/plugins/wp-intercom-slack/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-intercom-slack,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-intercom-slack/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-intercom-slack" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-inventory-manager-363c3c176ac2ef6391bdaf79f83140e3.yaml b/nuclei-templates/cve-less/plugins/wp-inventory-manager-363c3c176ac2ef6391bdaf79f83140e3.yaml new file mode 100644 index 0000000000..73cf42cc0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-inventory-manager-363c3c176ac2ef6391bdaf79f83140e3.yaml @@ -0,0 +1,58 @@ +id: wp-inventory-manager-363c3c176ac2ef6391bdaf79f83140e3 + +info: + name: > + WP Inventory Manager <= 2.1.0.12 - Reflected Cross-Site Scripting via 'message' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b168045-9b68-43a7-89ce-d00a88bf8acd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-inventory-manager/" + google-query: inurl:"/wp-content/plugins/wp-inventory-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-inventory-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-inventory-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-inventory-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-inventory-manager-52c7fb159214201f2c95219274f70ec6.yaml b/nuclei-templates/cve-less/plugins/wp-inventory-manager-52c7fb159214201f2c95219274f70ec6.yaml new file mode 100644 index 0000000000..3b4897df00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-inventory-manager-52c7fb159214201f2c95219274f70ec6.yaml @@ -0,0 +1,58 @@ +id: wp-inventory-manager-52c7fb159214201f2c95219274f70ec6 + +info: + name: > + WP Inventory Manager <= 2.1.0.13 - Cross-Site Request Forgery via delete_item + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95986a4d-94fb-4afe-ba1e-382d6f4c550f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-inventory-manager/" + google-query: inurl:"/wp-content/plugins/wp-inventory-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-inventory-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-inventory-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-inventory-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-inventory-manager-d6fda2db9aef5ee17aff3a1a9d5aae26.yaml b/nuclei-templates/cve-less/plugins/wp-inventory-manager-d6fda2db9aef5ee17aff3a1a9d5aae26.yaml new file mode 100644 index 0000000000..1eadad26e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-inventory-manager-d6fda2db9aef5ee17aff3a1a9d5aae26.yaml @@ -0,0 +1,58 @@ +id: wp-inventory-manager-d6fda2db9aef5ee17aff3a1a9d5aae26 + +info: + name: > + WP Inventory Manager <= 2.1.0.11 - Reflected Cross-Site Scripting via 'message' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/363ece80-1fa6-4019-84c9-e0a65f02625d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-inventory-manager/" + google-query: inurl:"/wp-content/plugins/wp-inventory-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-inventory-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-inventory-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-inventory-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-inventory-manager-da8ea76dfd26f4abbbdb294a05baca1e.yaml b/nuclei-templates/cve-less/plugins/wp-inventory-manager-da8ea76dfd26f4abbbdb294a05baca1e.yaml new file mode 100644 index 0000000000..ddbf18d2d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-inventory-manager-da8ea76dfd26f4abbbdb294a05baca1e.yaml @@ -0,0 +1,58 @@ +id: wp-inventory-manager-da8ea76dfd26f4abbbdb294a05baca1e + +info: + name: > + WP Inventory Manager <= 2.1.0.13 - Cross-Site Request Forgery via delete_item + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d51f0230-b85c-4c2d-9fa0-e68b52e51c76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-inventory-manager/" + google-query: inurl:"/wp-content/plugins/wp-inventory-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-inventory-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-inventory-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-inventory-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-invoice-57a112bd1c50a2fbcdf02a29f1461095.yaml b/nuclei-templates/cve-less/plugins/wp-invoice-57a112bd1c50a2fbcdf02a29f1461095.yaml new file mode 100644 index 0000000000..e2f6c365e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-invoice-57a112bd1c50a2fbcdf02a29f1461095.yaml @@ -0,0 +1,58 @@ +id: wp-invoice-57a112bd1c50a2fbcdf02a29f1461095 + +info: + name: > + WP-Invoice – Web Invoice and Billing <= 4.1.0 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/def28d93-744f-4232-b745-8430d466b9fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-invoice/" + google-query: inurl:"/wp-content/plugins/wp-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-invoice,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-invoice-68ccb9bcad04a1c6dd8014a68d2d5fe9.yaml b/nuclei-templates/cve-less/plugins/wp-invoice-68ccb9bcad04a1c6dd8014a68d2d5fe9.yaml new file mode 100644 index 0000000000..00227b4dd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-invoice-68ccb9bcad04a1c6dd8014a68d2d5fe9.yaml @@ -0,0 +1,58 @@ +id: wp-invoice-68ccb9bcad04a1c6dd8014a68d2d5fe9 + +info: + name: > + WP-Invoice – Web Invoice and Billing <= 4.1.0 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57ed9593-787c-41c0-abad-c70459e1d128?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-invoice/" + google-query: inurl:"/wp-content/plugins/wp-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-invoice,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-invoice-7137b8fac252650babdfc2fa8502b307.yaml b/nuclei-templates/cve-less/plugins/wp-invoice-7137b8fac252650babdfc2fa8502b307.yaml new file mode 100644 index 0000000000..f618c1644e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-invoice-7137b8fac252650babdfc2fa8502b307.yaml @@ -0,0 +1,58 @@ +id: wp-invoice-7137b8fac252650babdfc2fa8502b307 + +info: + name: > + WP-Invoice – Web Invoice and Billing <= 4.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/965107bd-e1ee-4a0c-af9e-bdd765d3eab5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-invoice/" + google-query: inurl:"/wp-content/plugins/wp-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-invoice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-invoice-875ad9422b6c5059d922fea2bec00a1f.yaml b/nuclei-templates/cve-less/plugins/wp-invoice-875ad9422b6c5059d922fea2bec00a1f.yaml new file mode 100644 index 0000000000..3d19169d4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-invoice-875ad9422b6c5059d922fea2bec00a1f.yaml @@ -0,0 +1,58 @@ +id: wp-invoice-875ad9422b6c5059d922fea2bec00a1f + +info: + name: > + WP-Invoice – Web Invoice and Billing <= 4.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ffdcc0f-8214-4056-abe1-926ed255e9f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-invoice/" + google-query: inurl:"/wp-content/plugins/wp-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-invoice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-invoice-891def7bec49bf5ec54dedc52d9240f9.yaml b/nuclei-templates/cve-less/plugins/wp-invoice-891def7bec49bf5ec54dedc52d9240f9.yaml new file mode 100644 index 0000000000..df6dc26db9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-invoice-891def7bec49bf5ec54dedc52d9240f9.yaml @@ -0,0 +1,58 @@ +id: wp-invoice-891def7bec49bf5ec54dedc52d9240f9 + +info: + name: > + WP-Invoice – Web Invoice and Billing <= 4.1.0 - Unauthorized Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10ed13e9-f196-47cc-9e45-a7646444cc5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-invoice/" + google-query: inurl:"/wp-content/plugins/wp-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-invoice,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-invoice-916c5b9976a17729e06d1b6fb0458ebf.yaml b/nuclei-templates/cve-less/plugins/wp-invoice-916c5b9976a17729e06d1b6fb0458ebf.yaml new file mode 100644 index 0000000000..d73fb734ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-invoice-916c5b9976a17729e06d1b6fb0458ebf.yaml @@ -0,0 +1,58 @@ +id: wp-invoice-916c5b9976a17729e06d1b6fb0458ebf + +info: + name: > + WP-Invoice – Web Invoice and Billing <= 4.1.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e036fd56-c13f-486d-acae-66378426d380?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-invoice/" + google-query: inurl:"/wp-content/plugins/wp-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-invoice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-invoice-e02e4d31cf49a5cf3437bdef98608b60.yaml b/nuclei-templates/cve-less/plugins/wp-invoice-e02e4d31cf49a5cf3437bdef98608b60.yaml new file mode 100644 index 0000000000..28098f98c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-invoice-e02e4d31cf49a5cf3437bdef98608b60.yaml @@ -0,0 +1,58 @@ +id: wp-invoice-e02e4d31cf49a5cf3437bdef98608b60 + +info: + name: > + WP-Invoice – Web Invoice and Billing <= 4.3.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c248f11c-f381-4335-b6f7-bb18bbf1f7b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-invoice/" + google-query: inurl:"/wp-content/plugins/wp-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-invoice,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-manager-249ae1950a1aba5232af2a232fae47b2.yaml b/nuclei-templates/cve-less/plugins/wp-job-manager-249ae1950a1aba5232af2a232fae47b2.yaml new file mode 100644 index 0000000000..9c9e7608fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-manager-249ae1950a1aba5232af2a232fae47b2.yaml @@ -0,0 +1,58 @@ +id: wp-job-manager-249ae1950a1aba5232af2a232fae47b2 + +info: + name: > + WP Job Manager <= 1.29.2 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61e6db2f-5dfd-44ef-9500-9f0cb5cd67ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-manager/" + google-query: inurl:"/wp-content/plugins/wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.29.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-manager-778debf79e02e51fc617919e605d5f31.yaml b/nuclei-templates/cve-less/plugins/wp-job-manager-778debf79e02e51fc617919e605d5f31.yaml new file mode 100644 index 0000000000..c37c6c2636 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-manager-778debf79e02e51fc617919e605d5f31.yaml @@ -0,0 +1,58 @@ +id: wp-job-manager-778debf79e02e51fc617919e605d5f31 + +info: + name: > + WP Job Manager <= 1.31.2 - PHP Object Injection via PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b96f40fe-3ffa-4fc5-b51a-ff3771224bd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-manager/" + google-query: inurl:"/wp-content/plugins/wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-manager-a866bf8732fbf685f3dd9ae8b9f07dfa.yaml b/nuclei-templates/cve-less/plugins/wp-job-manager-a866bf8732fbf685f3dd9ae8b9f07dfa.yaml new file mode 100644 index 0000000000..af036ca9d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-manager-a866bf8732fbf685f3dd9ae8b9f07dfa.yaml @@ -0,0 +1,58 @@ +id: wp-job-manager-a866bf8732fbf685f3dd9ae8b9f07dfa + +info: + name: > + WP Job Manager <= 2.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69430e1a-db2f-4715-84aa-5a1dfd712180?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-manager/" + google-query: inurl:"/wp-content/plugins/wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-manager-ab18ce3ab5c885047a8f794ed3023e87.yaml b/nuclei-templates/cve-less/plugins/wp-job-manager-ab18ce3ab5c885047a8f794ed3023e87.yaml new file mode 100644 index 0000000000..42edbd26f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-manager-ab18ce3ab5c885047a8f794ed3023e87.yaml @@ -0,0 +1,58 @@ +id: wp-job-manager-ab18ce3ab5c885047a8f794ed3023e87 + +info: + name: > + WP Job Manager <= 2.0.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b1af76a-3836-4527-9ea6-8bffa173a84e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-manager/" + google-query: inurl:"/wp-content/plugins/wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-manager-ad1a7b10885844b515902d55c9660f2d.yaml b/nuclei-templates/cve-less/plugins/wp-job-manager-ad1a7b10885844b515902d55c9660f2d.yaml new file mode 100644 index 0000000000..bf797cd2ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-manager-ad1a7b10885844b515902d55c9660f2d.yaml @@ -0,0 +1,58 @@ +id: wp-job-manager-ad1a7b10885844b515902d55c9660f2d + +info: + name: > + WP Job Manager <= 1.26.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8029737-f3ad-4025-948a-ba0298c0869d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-manager/" + google-query: inurl:"/wp-content/plugins/wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.26.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-manager-f05562fc94116db3e2f5dd9c7a1bb0d7.yaml b/nuclei-templates/cve-less/plugins/wp-job-manager-f05562fc94116db3e2f5dd9c7a1bb0d7.yaml new file mode 100644 index 0000000000..5356eb04d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-manager-f05562fc94116db3e2f5dd9c7a1bb0d7.yaml @@ -0,0 +1,58 @@ +id: wp-job-manager-f05562fc94116db3e2f5dd9c7a1bb0d7 + +info: + name: > + WP Job Manager < 1.23.8 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/696d5fe3-1344-461b-a26f-e5099a836c33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-manager/" + google-query: inurl:"/wp-content/plugins/wp-job-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.23.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-openings-e0b60cc25d6815b825cf11a25f942d5d.yaml b/nuclei-templates/cve-less/plugins/wp-job-openings-e0b60cc25d6815b825cf11a25f942d5d.yaml new file mode 100644 index 0000000000..84256acf81 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-openings-e0b60cc25d6815b825cf11a25f942d5d.yaml @@ -0,0 +1,58 @@ +id: wp-job-openings-e0b60cc25d6815b825cf11a25f942d5d + +info: + name: > + WP Job Openings <= 3.4.2 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/334be95c-438a-4e03-9ee4-9a6d2c2fa5f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-openings/" + google-query: inurl:"/wp-content/plugins/wp-job-openings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-openings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-openings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-openings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-portal-549d5bc8afbc0ac7d09fc136717ff89d.yaml b/nuclei-templates/cve-less/plugins/wp-job-portal-549d5bc8afbc0ac7d09fc136717ff89d.yaml new file mode 100644 index 0000000000..a803e0d9fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-portal-549d5bc8afbc0ac7d09fc136717ff89d.yaml @@ -0,0 +1,58 @@ +id: wp-job-portal-549d5bc8afbc0ac7d09fc136717ff89d + +info: + name: > + WP Job Portal <= 2.0.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d68d2144-96b9-482e-9791-c3506661596e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-portal/" + google-query: inurl:"/wp-content/plugins/wp-job-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-portal,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-portal-965d1bb3ea0dc7dd2bd7703dedecb0bb.yaml b/nuclei-templates/cve-less/plugins/wp-job-portal-965d1bb3ea0dc7dd2bd7703dedecb0bb.yaml new file mode 100644 index 0000000000..1108a6c5e9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-portal-965d1bb3ea0dc7dd2bd7703dedecb0bb.yaml @@ -0,0 +1,58 @@ +id: wp-job-portal-965d1bb3ea0dc7dd2bd7703dedecb0bb + +info: + name: > + WP Job Portal <= 2.0.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0aa1fad-1ff4-4bc5-a584-99b528470990?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-portal/" + google-query: inurl:"/wp-content/plugins/wp-job-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-portal-a5de647c0bebb3ff3775ad99edcea819.yaml b/nuclei-templates/cve-less/plugins/wp-job-portal-a5de647c0bebb3ff3775ad99edcea819.yaml new file mode 100644 index 0000000000..08b4452341 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-portal-a5de647c0bebb3ff3775ad99edcea819.yaml @@ -0,0 +1,58 @@ +id: wp-job-portal-a5de647c0bebb3ff3775ad99edcea819 + +info: + name: > + WP Job Portal <= 2.0.1 - Missing Authorization to Settings Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ce039db-b597-4bbf-8067-933a262ae1b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-portal/" + google-query: inurl:"/wp-content/plugins/wp-job-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-portal,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-portal-b1effc0c53914bb4a1c16ea81ae4e1e7.yaml b/nuclei-templates/cve-less/plugins/wp-job-portal-b1effc0c53914bb4a1c16ea81ae4e1e7.yaml new file mode 100644 index 0000000000..6914bd4ca7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-portal-b1effc0c53914bb4a1c16ea81ae4e1e7.yaml @@ -0,0 +1,58 @@ +id: wp-job-portal-b1effc0c53914bb4a1c16ea81ae4e1e7 + +info: + name: > + WP Job Portal <= 2.0.1 - Cross-Site Request Forgery to Settings Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98a2570c-c757-44ad-9981-af0bf2d3c341?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-portal/" + google-query: inurl:"/wp-content/plugins/wp-job-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-job-portal-f2a0a0a17a439c3fab0b66d207898f19.yaml b/nuclei-templates/cve-less/plugins/wp-job-portal-f2a0a0a17a439c3fab0b66d207898f19.yaml new file mode 100644 index 0000000000..357a4704ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-job-portal-f2a0a0a17a439c3fab0b66d207898f19.yaml @@ -0,0 +1,58 @@ +id: wp-job-portal-f2a0a0a17a439c3fab0b66d207898f19 + +info: + name: > + WP Job Portal <= 2.0.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f11ea6b2-1225-42a5-aa7b-260315d0bec5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-job-portal/" + google-query: inurl:"/wp-content/plugins/wp-job-portal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-job-portal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-job-portal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-job-portal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobhunt-8605cf70b09f39b80921d3235eaa5a54.yaml b/nuclei-templates/cve-less/plugins/wp-jobhunt-8605cf70b09f39b80921d3235eaa5a54.yaml new file mode 100644 index 0000000000..f89fda2f8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobhunt-8605cf70b09f39b80921d3235eaa5a54.yaml @@ -0,0 +1,58 @@ +id: wp-jobhunt-8605cf70b09f39b80921d3235eaa5a54 + +info: + name: > + JobCareer | Job Board Responsive WordPress Theme < 2.4 - User Enumeration + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3c515e2-dc69-4686-b60f-413542bf2118?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobhunt/" + google-query: inurl:"/wp-content/plugins/wp-jobhunt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobhunt,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobhunt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobhunt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobhunt-8b266025d0f3695c542ad07de2e9b34c.yaml b/nuclei-templates/cve-less/plugins/wp-jobhunt-8b266025d0f3695c542ad07de2e9b34c.yaml new file mode 100644 index 0000000000..a72c5d3985 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobhunt-8b266025d0f3695c542ad07de2e9b34c.yaml @@ -0,0 +1,58 @@ +id: wp-jobhunt-8b266025d0f3695c542ad07de2e9b34c + +info: + name: > + JobCareer | Job Board Responsive WordPress Theme < 2.4 - Unauthenticated Arbitrary Password Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acbea2eb-fa87-4117-b347-049c819599c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobhunt/" + google-query: inurl:"/wp-content/plugins/wp-jobhunt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobhunt,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobhunt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobhunt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobs-1a1e231870f2d36ae969bc3201047b95.yaml b/nuclei-templates/cve-less/plugins/wp-jobs-1a1e231870f2d36ae969bc3201047b95.yaml new file mode 100644 index 0000000000..73ef372cf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobs-1a1e231870f2d36ae969bc3201047b95.yaml @@ -0,0 +1,58 @@ +id: wp-jobs-1a1e231870f2d36ae969bc3201047b95 + +info: + name: > + WP Jobs < 1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66ed3f4d-1977-487a-942e-3dd599586957?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobs/" + google-query: inurl:"/wp-content/plugins/wp-jobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobs-b2a0f64728c134eb1a214207f2b340c0.yaml b/nuclei-templates/cve-less/plugins/wp-jobs-b2a0f64728c134eb1a214207f2b340c0.yaml new file mode 100644 index 0000000000..b6bf8e301a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobs-b2a0f64728c134eb1a214207f2b340c0.yaml @@ -0,0 +1,58 @@ +id: wp-jobs-b2a0f64728c134eb1a214207f2b340c0 + +info: + name: > + WP Jobs < 1.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/921489e9-a083-47b3-a20d-e2566b51d8d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobs/" + google-query: inurl:"/wp-content/plugins/wp-jobs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobs,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-06bec6e8b710a7efd7b4113567911744.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-06bec6e8b710a7efd7b4113567911744.yaml new file mode 100644 index 0000000000..12dd0153fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-06bec6e8b710a7efd7b4113567911744.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-06bec6e8b710a7efd7b4113567911744 + +info: + name: > + JobSearch WP Job Board <= 1.5.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef5bccca-39d6-40e2-94fa-b321da58789d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-0757689ccb9eb2501cdd998e2d1228fe.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-0757689ccb9eb2501cdd998e2d1228fe.yaml new file mode 100644 index 0000000000..2e59041ffd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-0757689ccb9eb2501cdd998e2d1228fe.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-0757689ccb9eb2501cdd998e2d1228fe + +info: + name: > + JobSearch WP Job Board <= 1.5.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a2460ab-2f45-4ee2-a3ef-77e769a678d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-0b45e780227d592e1f06fb820f3146b8.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-0b45e780227d592e1f06fb820f3146b8.yaml new file mode 100644 index 0000000000..21928cf43d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-0b45e780227d592e1f06fb820f3146b8.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-0b45e780227d592e1f06fb820f3146b8 + +info: + name: > + WP JobSearch <= 2.3.3 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71cc804f-6146-4594-8e7a-854754a1ff20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-32e08ef17f0f9f45149490d3fa9aaf1b.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-32e08ef17f0f9f45149490d3fa9aaf1b.yaml new file mode 100644 index 0000000000..c05b3ca393 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-32e08ef17f0f9f45149490d3fa9aaf1b.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-32e08ef17f0f9f45149490d3fa9aaf1b + +info: + name: > + JobSearch WP Job Board < 1.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2987a5cf-4655-4d37-ae85-6f4775cc6802?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-485819fe9f0636879bb1f6cfba46a621.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-485819fe9f0636879bb1f6cfba46a621.yaml new file mode 100644 index 0000000000..ba87de1f3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-485819fe9f0636879bb1f6cfba46a621.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-485819fe9f0636879bb1f6cfba46a621 + +info: + name: > + JobSearch WP Job Board <= 1.5.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b80eb9fd-81f6-4bbf-ada1-125977a2ac01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-493970b9d6651de9fd021a267048266d.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-493970b9d6651de9fd021a267048266d.yaml new file mode 100644 index 0000000000..7f8d09b9c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-493970b9d6651de9fd021a267048266d.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-493970b9d6651de9fd021a267048266d + +info: + name: > + JobSearch WP Job Board <= 1.5.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d89ff7ef-e184-4993-9496-867f7bf28a4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-5e2c242003cfedf04505fc0b33fa0f84.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-5e2c242003cfedf04505fc0b33fa0f84.yaml new file mode 100644 index 0000000000..f55403e0cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-5e2c242003cfedf04505fc0b33fa0f84.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-5e2c242003cfedf04505fc0b33fa0f84 + +info: + name: > + JobSearch WP Job Board <= 1.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2006dbb8-2aa8-4890-b6ce-18257c64b970?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-91fa130b7c3ea6431b231102505db7d5.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-91fa130b7c3ea6431b231102505db7d5.yaml new file mode 100644 index 0000000000..ac4e60c613 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-91fa130b7c3ea6431b231102505db7d5.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-91fa130b7c3ea6431b231102505db7d5 + +info: + name: > + JobSearch WP Job Board <= 1.8.1 - Missing Authorization to Settings Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59170f0a-975e-487c-bdb0-585c802b3127?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-a75fd23fc24c5b8e6f032ef260fd0fc8.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-a75fd23fc24c5b8e6f032ef260fd0fc8.yaml new file mode 100644 index 0000000000..d15579a0d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-a75fd23fc24c5b8e6f032ef260fd0fc8.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-a75fd23fc24c5b8e6f032ef260fd0fc8 + +info: + name: > + WP JobSearch <= 2.3.3 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f51f66d7-ba47-4b7b-9b94-ea4459cf6233?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-a7b8efd454ece6d5c8233c73f0d61099.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-a7b8efd454ece6d5c8233c73f0d61099.yaml new file mode 100644 index 0000000000..09fd4c136b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-a7b8efd454ece6d5c8233c73f0d61099.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-a7b8efd454ece6d5c8233c73f0d61099 + +info: + name: > + JobSearch WP Job Board <= 1.8.1 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/839a0cc0-a656-4107-a748-4ad85e950237?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-a81ba5cd5b7c78f82a652995b8b78367.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-a81ba5cd5b7c78f82a652995b8b78367.yaml new file mode 100644 index 0000000000..cc9458367c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-a81ba5cd5b7c78f82a652995b8b78367.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-a81ba5cd5b7c78f82a652995b8b78367 + +info: + name: > + JobSearch WP Job Board < = 1.8.1 - Missing Authorization on jobsearch_update_job_import_schedule_call() function + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9114018f-0678-4973-bb1e-932f0d93f963?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-ab32f6a94ae805ae0f774665898eaf69.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-ab32f6a94ae805ae0f774665898eaf69.yaml new file mode 100644 index 0000000000..0a64d5bbcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-ab32f6a94ae805ae0f774665898eaf69.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-ab32f6a94ae805ae0f774665898eaf69 + +info: + name: > + JobSearch WP Job Board <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc308f4-c94f-48ae-9d65-0685236cdfbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jobsearch-e1e8b509fbe86c6565ac6936dc65e181.yaml b/nuclei-templates/cve-less/plugins/wp-jobsearch-e1e8b509fbe86c6565ac6936dc65e181.yaml new file mode 100644 index 0000000000..0d5dd9e081 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jobsearch-e1e8b509fbe86c6565ac6936dc65e181.yaml @@ -0,0 +1,58 @@ +id: wp-jobsearch-e1e8b509fbe86c6565ac6936dc65e181 + +info: + name: > + JobSearch WP Job Board <= 1.5.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe400dbe-43eb-41c1-8e31-c350228e0f8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jobsearch/" + google-query: inurl:"/wp-content/plugins/wp-jobsearch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jobsearch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jobsearch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jobsearch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-js-6c30c87bb2fee4db66c7047f9fb31811.yaml b/nuclei-templates/cve-less/plugins/wp-js-6c30c87bb2fee4db66c7047f9fb31811.yaml new file mode 100644 index 0000000000..e3d1f05810 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-js-6c30c87bb2fee4db66c7047f9fb31811.yaml @@ -0,0 +1,58 @@ +id: wp-js-6c30c87bb2fee4db66c7047f9fb31811 + +info: + name: > + WP JS <= 2.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ab82117-73dd-4257-8dfc-01dadcc3a83f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-js/" + google-query: inurl:"/wp-content/plugins/wp-js/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-js,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-js/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-js" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-js-external-link-info-0d9b0b8cf0e1e0917d4472d07a7d609b.yaml b/nuclei-templates/cve-less/plugins/wp-js-external-link-info-0d9b0b8cf0e1e0917d4472d07a7d609b.yaml new file mode 100644 index 0000000000..cc34f9304a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-js-external-link-info-0d9b0b8cf0e1e0917d4472d07a7d609b.yaml @@ -0,0 +1,58 @@ +id: wp-js-external-link-info-0d9b0b8cf0e1e0917d4472d07a7d609b + +info: + name: > + WP Js External Link Info <= 1.21 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19dc0b31-9e34-493c-ab38-6cae64c75162?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-js-external-link-info/" + google-query: inurl:"/wp-content/plugins/wp-js-external-link-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-js-external-link-info,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-js-external-link-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-js-external-link-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-jump-menu-9a1755a05c804d6305bb91e5146a62c4.yaml b/nuclei-templates/cve-less/plugins/wp-jump-menu-9a1755a05c804d6305bb91e5146a62c4.yaml new file mode 100644 index 0000000000..3058ecbef1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-jump-menu-9a1755a05c804d6305bb91e5146a62c4.yaml @@ -0,0 +1,58 @@ +id: wp-jump-menu-9a1755a05c804d6305bb91e5146a62c4 + +info: + name: > + WP Jump Menu <= 3.6.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d34c665-e99c-408e-b7ab-d08a1a51c6c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-jump-menu/" + google-query: inurl:"/wp-content/plugins/wp-jump-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-jump-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-jump-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-jump-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-keyword-link-f68af0f4ef5270237a2dac4a79c88b36.yaml b/nuclei-templates/cve-less/plugins/wp-keyword-link-f68af0f4ef5270237a2dac4a79c88b36.yaml new file mode 100644 index 0000000000..e1788a66eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-keyword-link-f68af0f4ef5270237a2dac4a79c88b36.yaml @@ -0,0 +1,58 @@ +id: wp-keyword-link-f68af0f4ef5270237a2dac4a79c88b36 + +info: + name: > + WP Keyword link <= 1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/836e3ca0-9f41-4ab2-a9bf-64a593f37c8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-keyword-link/" + google-query: inurl:"/wp-content/plugins/wp-keyword-link/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-keyword-link,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-keyword-link/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-keyword-link" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-knowledgebase-fe2e1db48888e950bcc3a91fea1678a4.yaml b/nuclei-templates/cve-less/plugins/wp-knowledgebase-fe2e1db48888e950bcc3a91fea1678a4.yaml new file mode 100644 index 0000000000..d8287f911c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-knowledgebase-fe2e1db48888e950bcc3a91fea1678a4.yaml @@ -0,0 +1,58 @@ +id: wp-knowledgebase-fe2e1db48888e950bcc3a91fea1678a4 + +info: + name: > + WP Knowledgebase <= 1.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa5ee133-e38a-4dfe-975c-f194aa6e90b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-knowledgebase/" + google-query: inurl:"/wp-content/plugins/wp-knowledgebase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-knowledgebase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-knowledgebase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-knowledgebase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-last-modified-info-524d5feb3bdf1faf2643f61f231563b9.yaml b/nuclei-templates/cve-less/plugins/wp-last-modified-info-524d5feb3bdf1faf2643f61f231563b9.yaml new file mode 100644 index 0000000000..c66935f08e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-last-modified-info-524d5feb3bdf1faf2643f61f231563b9.yaml @@ -0,0 +1,58 @@ +id: wp-last-modified-info-524d5feb3bdf1faf2643f61f231563b9 + +info: + name: > + WP Last Modified Info <= 1.6.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9694c8b6-3e2f-499f-bdac-eed78d89e08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-last-modified-info/" + google-query: inurl:"/wp-content/plugins/wp-last-modified-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-last-modified-info,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-last-modified-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-last-modified-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-latest-posts-2f5edb5bb8d4702a159f34742943af0d.yaml b/nuclei-templates/cve-less/plugins/wp-latest-posts-2f5edb5bb8d4702a159f34742943af0d.yaml new file mode 100644 index 0000000000..14c587a4df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-latest-posts-2f5edb5bb8d4702a159f34742943af0d.yaml @@ -0,0 +1,58 @@ +id: wp-latest-posts-2f5edb5bb8d4702a159f34742943af0d + +info: + name: > + WP Latest Posts <= 5.0.7 - Authenticated (Subscriber+) Arbitrary Shortcode Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57d90ba7-b655-4655-981c-548ff96c3bb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-latest-posts/" + google-query: inurl:"/wp-content/plugins/wp-latest-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-latest-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-latest-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-latest-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-latest-posts-ebb04d83edca666591b8c2ebf9b4b8bd.yaml b/nuclei-templates/cve-less/plugins/wp-latest-posts-ebb04d83edca666591b8c2ebf9b4b8bd.yaml new file mode 100644 index 0000000000..88e6eacbb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-latest-posts-ebb04d83edca666591b8c2ebf9b4b8bd.yaml @@ -0,0 +1,58 @@ +id: wp-latest-posts-ebb04d83edca666591b8c2ebf9b4b8bd + +info: + name: > + WP Latest Posts <= 3.7.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/942aad86-787e-4c25-a98b-9b7fe64aec23?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-latest-posts/" + google-query: inurl:"/wp-content/plugins/wp-latest-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-latest-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-latest-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-latest-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lead-stream-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-lead-stream-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6018083b34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lead-stream-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-lead-stream-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lead-stream/" + google-query: inurl:"/wp-content/plugins/wp-lead-stream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lead-stream,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lead-stream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lead-stream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-less-to-css-378840583bbe122d719ad92f2c75681f.yaml b/nuclei-templates/cve-less/plugins/wp-less-to-css-378840583bbe122d719ad92f2c75681f.yaml new file mode 100644 index 0000000000..b492e72bc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-less-to-css-378840583bbe122d719ad92f2c75681f.yaml @@ -0,0 +1,58 @@ +id: wp-less-to-css-378840583bbe122d719ad92f2c75681f + +info: + name: > + WP LESS to CSS <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22de2da7-f7db-46de-9305-52bce6e56937?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-less-to-css/" + google-query: inurl:"/wp-content/plugins/wp-less-to-css/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-less-to-css,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-less-to-css/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-less-to-css" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-letsencrypt-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-letsencrypt-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8388b37f03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-letsencrypt-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-letsencrypt-ssl-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-letsencrypt-ssl/" + google-query: inurl:"/wp-content/plugins/wp-letsencrypt-ssl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-letsencrypt-ssl,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-letsencrypt-ssl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-letsencrypt-ssl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-letsencrypt-ssl-f5a7556a27575fd8d1312f715924210f.yaml b/nuclei-templates/cve-less/plugins/wp-letsencrypt-ssl-f5a7556a27575fd8d1312f715924210f.yaml new file mode 100644 index 0000000000..dd1c1c556e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-letsencrypt-ssl-f5a7556a27575fd8d1312f715924210f.yaml @@ -0,0 +1,58 @@ +id: wp-letsencrypt-ssl-f5a7556a27575fd8d1312f715924210f + +info: + name: > + WP Encryption – One Click Free SSL Certificate & SSL / HTTPS Redirect to Force HTTPS, SSL Score <= 7.0 - Sensitive Information Exposure via insufficiently protected files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ab99751-24b7-41db-8a27-d86eda3eeee5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-letsencrypt-ssl/" + google-query: inurl:"/wp-content/plugins/wp-letsencrypt-ssl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-letsencrypt-ssl,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-letsencrypt-ssl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-letsencrypt-ssl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-levoslideshow-5088078af30c234ceab9ea2c99baf901.yaml b/nuclei-templates/cve-less/plugins/wp-levoslideshow-5088078af30c234ceab9ea2c99baf901.yaml new file mode 100644 index 0000000000..98936bab9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-levoslideshow-5088078af30c234ceab9ea2c99baf901.yaml @@ -0,0 +1,58 @@ +id: wp-levoslideshow-5088078af30c234ceab9ea2c99baf901 + +info: + name: > + Levo Slideshow <= 2.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9acdbd48-8d38-4d75-b2b1-c993e25cf92a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-levoslideshow/" + google-query: inurl:"/wp-content/plugins/wp-levoslideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-levoslideshow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-levoslideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-levoslideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-levoslideshow-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/wp-levoslideshow-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..97a4b69884 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-levoslideshow-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: wp-levoslideshow-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-levoslideshow/" + google-query: inurl:"/wp-content/plugins/wp-levoslideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-levoslideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-levoslideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-levoslideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-levoslideshow-99ce085e8b4d878765e949a7f07f6195.yaml b/nuclei-templates/cve-less/plugins/wp-levoslideshow-99ce085e8b4d878765e949a7f07f6195.yaml new file mode 100644 index 0000000000..d469b78d7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-levoslideshow-99ce085e8b4d878765e949a7f07f6195.yaml @@ -0,0 +1,58 @@ +id: wp-levoslideshow-99ce085e8b4d878765e949a7f07f6195 + +info: + name: > + Levo Slideshow <= 2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81b9cebd-eff6-4650-977e-ee81089e683a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-levoslideshow/" + google-query: inurl:"/wp-content/plugins/wp-levoslideshow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-levoslideshow,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-levoslideshow/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-levoslideshow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lightbox-2-9d391b643840d9b9d7ead6e546f2d7b1.yaml b/nuclei-templates/cve-less/plugins/wp-lightbox-2-9d391b643840d9b9d7ead6e546f2d7b1.yaml new file mode 100644 index 0000000000..9822f43fc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lightbox-2-9d391b643840d9b9d7ead6e546f2d7b1.yaml @@ -0,0 +1,58 @@ +id: wp-lightbox-2-9d391b643840d9b9d7ead6e546f2d7b1 + +info: + name: > + WP Lightbox 2 <= 3.0.6.5 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ef104ae-b67c-4669-adeb-e5397561c0ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lightbox-2/" + google-query: inurl:"/wp-content/plugins/wp-lightbox-2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lightbox-2,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lightbox-2/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lightbox-2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lightpop-7ceecb4a33f59ca62a5f2246eb0be6e8.yaml b/nuclei-templates/cve-less/plugins/wp-lightpop-7ceecb4a33f59ca62a5f2246eb0be6e8.yaml new file mode 100644 index 0000000000..071ec015bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lightpop-7ceecb4a33f59ca62a5f2246eb0be6e8.yaml @@ -0,0 +1,58 @@ +id: wp-lightpop-7ceecb4a33f59ca62a5f2246eb0be6e8 + +info: + name: > + WP-lightpop <= 0.8.5.6 - Remote Media File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83009e29-6860-4d0c-954a-8035dc361cdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lightpop/" + google-query: inurl:"/wp-content/plugins/wp-lightpop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lightpop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lightpop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lightpop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-like-button-00aa1f64cb2e6c80b8a5546f8e6d1be0.yaml b/nuclei-templates/cve-less/plugins/wp-like-button-00aa1f64cb2e6c80b8a5546f8e6d1be0.yaml new file mode 100644 index 0000000000..d37795da9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-like-button-00aa1f64cb2e6c80b8a5546f8e6d1be0.yaml @@ -0,0 +1,58 @@ +id: wp-like-button-00aa1f64cb2e6c80b8a5546f8e6d1be0 + +info: + name: > + WP Like Button <= 1.7.0 - Missing Authorization via crublabFBLBAjax + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da550fd7-3c1a-4b07-afc0-2366e0f5cccd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-like-button/" + google-query: inurl:"/wp-content/plugins/wp-like-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-like-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-like-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-like-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-like-button-d25b2870a2ba1a71b2f08074d958c754.yaml b/nuclei-templates/cve-less/plugins/wp-like-button-d25b2870a2ba1a71b2f08074d958c754.yaml new file mode 100644 index 0000000000..5774c4345b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-like-button-d25b2870a2ba1a71b2f08074d958c754.yaml @@ -0,0 +1,58 @@ +id: wp-like-button-d25b2870a2ba1a71b2f08074d958c754 + +info: + name: > + WP Like Button <= 1.6.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6d054e4-0ef7-401d-9d81-24cc0f875432?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-like-button/" + google-query: inurl:"/wp-content/plugins/wp-like-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-like-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-like-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-like-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-like-button-d4b7dbaa3f20ba708731c645b0814aa7.yaml b/nuclei-templates/cve-less/plugins/wp-like-button-d4b7dbaa3f20ba708731c645b0814aa7.yaml new file mode 100644 index 0000000000..c0ccdb8488 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-like-button-d4b7dbaa3f20ba708731c645b0814aa7.yaml @@ -0,0 +1,58 @@ +id: wp-like-button-d4b7dbaa3f20ba708731c645b0814aa7 + +info: + name: > + WP Like Button <= 1.6.11 - Cross-Site Request Forgery via 'saveData' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/989836fc-a15d-4424-be0e-348e1acc7466?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-like-button/" + google-query: inurl:"/wp-content/plugins/wp-like-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-like-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-like-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-like-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-03550082734f798d8bdd156b8cc8a2c2.yaml b/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-03550082734f798d8bdd156b8cc8a2c2.yaml new file mode 100644 index 0000000000..7a0955e0e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-03550082734f798d8bdd156b8cc8a2c2.yaml @@ -0,0 +1,58 @@ +id: wp-limit-failed-login-attempts-03550082734f798d8bdd156b8cc8a2c2 + +info: + name: > + Limit Login Attempts (Spam Protection) <= 2.9 - Cross-Site Request Forgery to Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d525c50-5911-4be6-a860-b48db619adba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-limit-failed-login-attempts/" + google-query: inurl:"/wp-content/plugins/wp-limit-failed-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-limit-failed-login-attempts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-limit-failed-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-limit-failed-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-6a540f27193664ae64c1c9c67379218b.yaml b/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-6a540f27193664ae64c1c9c67379218b.yaml new file mode 100644 index 0000000000..022e5874f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-6a540f27193664ae64c1c9c67379218b.yaml @@ -0,0 +1,58 @@ +id: wp-limit-failed-login-attempts-6a540f27193664ae64c1c9c67379218b + +info: + name: > + Limit Login Attempts (Spam Protection) <= 2.8 - Missing Authorization to Arbitrary Plugin Installation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da24aad2-ae6b-411e-a229-0df585215731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-limit-failed-login-attempts/" + google-query: inurl:"/wp-content/plugins/wp-limit-failed-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-limit-failed-login-attempts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-limit-failed-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-limit-failed-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-a7118940def94872d54ec018ff1c6fc1.yaml b/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-a7118940def94872d54ec018ff1c6fc1.yaml new file mode 100644 index 0000000000..f5d99e5b38 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-limit-failed-login-attempts-a7118940def94872d54ec018ff1c6fc1.yaml @@ -0,0 +1,58 @@ +id: wp-limit-failed-login-attempts-a7118940def94872d54ec018ff1c6fc1 + +info: + name: > + Limit Login Attempts (Spam Protection) <= 4.9.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49ea8af1-7171-4498-bfb0-bb3cbd72e6f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-limit-failed-login-attempts/" + google-query: inurl:"/wp-content/plugins/wp-limit-failed-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-limit-failed-login-attempts,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-limit-failed-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-limit-failed-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-limit-login-attempts-6811a32eecdf5ce987fe449d57d50384.yaml b/nuclei-templates/cve-less/plugins/wp-limit-login-attempts-6811a32eecdf5ce987fe449d57d50384.yaml new file mode 100644 index 0000000000..1a071dd4d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-limit-login-attempts-6811a32eecdf5ce987fe449d57d50384.yaml @@ -0,0 +1,58 @@ +id: wp-limit-login-attempts-6811a32eecdf5ce987fe449d57d50384 + +info: + name: > + WP Limit Login Attempts < 2.0.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db7234a1-e888-454d-8a1c-4de19c4cbec4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-limit-login-attempts/" + google-query: inurl:"/wp-content/plugins/wp-limit-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-limit-login-attempts,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-limit-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-limit-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-limit-login-attempts-b0713874d1e1aea3108651f256578abe.yaml b/nuclei-templates/cve-less/plugins/wp-limit-login-attempts-b0713874d1e1aea3108651f256578abe.yaml new file mode 100644 index 0000000000..ae6203e84f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-limit-login-attempts-b0713874d1e1aea3108651f256578abe.yaml @@ -0,0 +1,58 @@ +id: wp-limit-login-attempts-b0713874d1e1aea3108651f256578abe + +info: + name: > + WP Limit Login Attempts <= 2.6.4 - IP Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef60c109-30e2-48e9-8599-6f226e74b6bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-limit-login-attempts/" + google-query: inurl:"/wp-content/plugins/wp-limit-login-attempts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-limit-login-attempts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-limit-login-attempts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-limit-login-attempts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-limit-posts-automatically-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml b/nuclei-templates/cve-less/plugins/wp-limit-posts-automatically-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml new file mode 100644 index 0000000000..70eff25435 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-limit-posts-automatically-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml @@ -0,0 +1,58 @@ +id: wp-limit-posts-automatically-fe81b0cd67440d8b6f9d1a6ebbe2565c + +info: + name: > + WP Limit Posts Automatically <= 0.7 - Cross-Site Request Forgery leading to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee03ca88-97c1-45b0-a9d9-1ed57e124f13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-limit-posts-automatically/" + google-query: inurl:"/wp-content/plugins/wp-limit-posts-automatically/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-limit-posts-automatically,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-limit-posts-automatically/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-limit-posts-automatically" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-limits-f3e27a924e055b88af7811293412cc67.yaml b/nuclei-templates/cve-less/plugins/wp-limits-f3e27a924e055b88af7811293412cc67.yaml new file mode 100644 index 0000000000..d5b75c59d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-limits-f3e27a924e055b88af7811293412cc67.yaml @@ -0,0 +1,58 @@ +id: wp-limits-f3e27a924e055b88af7811293412cc67 + +info: + name: > + Wp Limits <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee3ff4ee-48d3-4b35-b6c9-320bd42780d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-limits/" + google-query: inurl:"/wp-content/plugins/wp-limits/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-limits,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-limits/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-limits" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-line-notify-b546805f046a6ab76ad9842bd21444bd.yaml b/nuclei-templates/cve-less/plugins/wp-line-notify-b546805f046a6ab76ad9842bd21444bd.yaml new file mode 100644 index 0000000000..2d924171d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-line-notify-b546805f046a6ab76ad9842bd21444bd.yaml @@ -0,0 +1,58 @@ +id: wp-line-notify-b546805f046a6ab76ad9842bd21444bd + +info: + name: > + LINE Notify <= 1.4.4 - Reflected Cross-Site Scripting via 'uid' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b4e7c02-48d3-4271-a3bc-e7d3256b7217?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-line-notify/" + google-query: inurl:"/wp-content/plugins/wp-line-notify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-line-notify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-line-notify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-line-notify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-link-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-link-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0464622152 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-link-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-link-bio-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-link-bio/" + google-query: inurl:"/wp-content/plugins/wp-link-bio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-link-bio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-link-bio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-link-bio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-linkedin-auto-publish-e30e15a9c4996773efb6051e3f90c9c4.yaml b/nuclei-templates/cve-less/plugins/wp-linkedin-auto-publish-e30e15a9c4996773efb6051e3f90c9c4.yaml new file mode 100644 index 0000000000..6e2f912179 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-linkedin-auto-publish-e30e15a9c4996773efb6051e3f90c9c4.yaml @@ -0,0 +1,58 @@ +id: wp-linkedin-auto-publish-e30e15a9c4996773efb6051e3f90c9c4 + +info: + name: > + WP LinkedIn Auto Publish <= 8.11 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c1c8310-76c3-4505-9504-993e594804a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-linkedin-auto-publish/" + google-query: inurl:"/wp-content/plugins/wp-linkedin-auto-publish/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-linkedin-auto-publish,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-linkedin-auto-publish/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-linkedin-auto-publish" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-links-page-c714b4c448de917cbe9dde73273b4f80.yaml b/nuclei-templates/cve-less/plugins/wp-links-page-c714b4c448de917cbe9dde73273b4f80.yaml new file mode 100644 index 0000000000..3655ea85d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-links-page-c714b4c448de917cbe9dde73273b4f80.yaml @@ -0,0 +1,58 @@ +id: wp-links-page-c714b4c448de917cbe9dde73273b4f80 + +info: + name: > + WP Links Page <= 4.9.4 - Cross-Site Request Forgery via wplf_ajax_update_screenshots + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fa70ddc-9a5c-4001-967a-5aad789c862c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-links-page/" + google-query: inurl:"/wp-content/plugins/wp-links-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-links-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-links-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-links-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-links-page-e52be0435f55047670368cd34b580535.yaml b/nuclei-templates/cve-less/plugins/wp-links-page-e52be0435f55047670368cd34b580535.yaml new file mode 100644 index 0000000000..99f3a38918 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-links-page-e52be0435f55047670368cd34b580535.yaml @@ -0,0 +1,58 @@ +id: wp-links-page-e52be0435f55047670368cd34b580535 + +info: + name: > + WP Links Page <= 4.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ef3297d-8686-44aa-ac73-793b644be3f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-links-page/" + google-query: inurl:"/wp-content/plugins/wp-links-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-links-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-links-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-links-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-178c8e00fd5bfb5400710e1fa21e320a.yaml b/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-178c8e00fd5bfb5400710e1fa21e320a.yaml new file mode 100644 index 0000000000..8312e2c226 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-178c8e00fd5bfb5400710e1fa21e320a.yaml @@ -0,0 +1,58 @@ +id: wp-lister-for-amazon-178c8e00fd5bfb5400710e1fa21e320a + +info: + name: > + WP-Lister Lite for Amazon <= 2.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08746755-9abe-4120-8ffb-90f2f9f1b7cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lister-for-amazon/" + google-query: inurl:"/wp-content/plugins/wp-lister-for-amazon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lister-for-amazon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lister-for-amazon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lister-for-amazon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-6cd99d073813881160ae0f456cc4a754.yaml b/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-6cd99d073813881160ae0f456cc4a754.yaml new file mode 100644 index 0000000000..6f8889074f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-6cd99d073813881160ae0f456cc4a754.yaml @@ -0,0 +1,58 @@ +id: wp-lister-for-amazon-6cd99d073813881160ae0f456cc4a754 + +info: + name: > + WP-Lister Lite for Amazon <= 2.6.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0814c64e-f786-4cc3-85ee-c8cfbebf7e2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lister-for-amazon/" + google-query: inurl:"/wp-content/plugins/wp-lister-for-amazon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lister-for-amazon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lister-for-amazon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lister-for-amazon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-fbce84a8ee57be3789217c9b7a75a712.yaml b/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-fbce84a8ee57be3789217c9b7a75a712.yaml new file mode 100644 index 0000000000..9e565ad9f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lister-for-amazon-fbce84a8ee57be3789217c9b7a75a712.yaml @@ -0,0 +1,58 @@ +id: wp-lister-for-amazon-fbce84a8ee57be3789217c9b7a75a712 + +info: + name: > + WP-Lister Lite for Amazon <= 2.6.11 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36f37875-69fe-41cb-a68d-ad73d53d1a83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lister-for-amazon/" + google-query: inurl:"/wp-content/plugins/wp-lister-for-amazon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lister-for-amazon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lister-for-amazon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lister-for-amazon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-1691930e201b6c9ce529fab20806ab3a.yaml b/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-1691930e201b6c9ce529fab20806ab3a.yaml new file mode 100644 index 0000000000..0ea7769974 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-1691930e201b6c9ce529fab20806ab3a.yaml @@ -0,0 +1,58 @@ +id: wp-lister-for-ebay-1691930e201b6c9ce529fab20806ab3a + +info: + name: > + WP-Lister Lite for eBay <= 3.5.11 - Authenticated (Shop Manager+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7179fe0d-8cfa-4b43-82d6-5523d65ff780?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lister-for-ebay/" + google-query: inurl:"/wp-content/plugins/wp-lister-for-ebay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lister-for-ebay,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lister-for-ebay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lister-for-ebay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-d5ae4878a4d320a4dee3c301e3085c64.yaml b/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-d5ae4878a4d320a4dee3c301e3085c64.yaml new file mode 100644 index 0000000000..3e0bd375cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-d5ae4878a4d320a4dee3c301e3085c64.yaml @@ -0,0 +1,58 @@ +id: wp-lister-for-ebay-d5ae4878a4d320a4dee3c301e3085c64 + +info: + name: > + WP-Lister Lite for eBay <= 3.5.7 - Reflected Cross-Site Scripting via 's' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70d05b9e-bead-42f9-9d19-c92c8e6440cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lister-for-ebay/" + google-query: inurl:"/wp-content/plugins/wp-lister-for-ebay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lister-for-ebay,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lister-for-ebay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lister-for-ebay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-dc87f7ad02889b2fba3b573d8f507b49.yaml b/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-dc87f7ad02889b2fba3b573d8f507b49.yaml new file mode 100644 index 0000000000..8749aa55bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lister-for-ebay-dc87f7ad02889b2fba3b573d8f507b49.yaml @@ -0,0 +1,58 @@ +id: wp-lister-for-ebay-dc87f7ad02889b2fba3b573d8f507b49 + +info: + name: > + WP-Lister Lite for eBay <= 3.5.11 - Authenticated (Shop Manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/613b4ad3-9aea-4c1c-9d73-1fb51da26477?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lister-for-ebay/" + google-query: inurl:"/wp-content/plugins/wp-lister-for-ebay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lister-for-ebay,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lister-for-ebay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lister-for-ebay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-listings-1732e4e08bdb234132d824677ffb996f.yaml b/nuclei-templates/cve-less/plugins/wp-listings-1732e4e08bdb234132d824677ffb996f.yaml new file mode 100644 index 0000000000..a4d965055f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-listings-1732e4e08bdb234132d824677ffb996f.yaml @@ -0,0 +1,58 @@ +id: wp-listings-1732e4e08bdb234132d824677ffb996f + +info: + name: > + IMPress Listings <= 2.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b98668e-a20f-49a3-a6d6-6da6d1c044d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-listings/" + google-query: inurl:"/wp-content/plugins/wp-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-listings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-listings-828d5e38dbe1047738a24a003f9a3134.yaml b/nuclei-templates/cve-less/plugins/wp-listings-828d5e38dbe1047738a24a003f9a3134.yaml new file mode 100644 index 0000000000..98f9fe92b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-listings-828d5e38dbe1047738a24a003f9a3134.yaml @@ -0,0 +1,58 @@ +id: wp-listings-828d5e38dbe1047738a24a003f9a3134 + +info: + name: > + IMPress Listings <= 2.6.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f426c32e-a376-4447-b83f-409a8eb0c499?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-listings/" + google-query: inurl:"/wp-content/plugins/wp-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-listings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-listings-c94bdab6658e87ec5036df9af1fd3f36.yaml b/nuclei-templates/cve-less/plugins/wp-listings-c94bdab6658e87ec5036df9af1fd3f36.yaml new file mode 100644 index 0000000000..128d0ad120 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-listings-c94bdab6658e87ec5036df9af1fd3f36.yaml @@ -0,0 +1,58 @@ +id: wp-listings-c94bdab6658e87ec5036df9af1fd3f36 + +info: + name: > + IMPress Listings <= 2.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Listing Fields + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d31b9022-ae45-4bc2-b820-fb88faf0796f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-listings/" + google-query: inurl:"/wp-content/plugins/wp-listings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-listings,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-listings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-listings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-software-for-wordpress-614cced2da1395e72b78e478d2060077.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-software-for-wordpress-614cced2da1395e72b78e478d2060077.yaml new file mode 100644 index 0000000000..2c1e92b252 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-software-for-wordpress-614cced2da1395e72b78e478d2060077.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-software-for-wordpress-614cced2da1395e72b78e478d2060077 + +info: + name: > + WP LiveChat <= 3.7.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68ddc0a1-2f5a-446d-9d83-b6028d012956?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-software-for-wordpress/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-software-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-software-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-software-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-software-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-software-for-wordpress-7695d17d2a6f043e2b7067503447a869.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-software-for-wordpress-7695d17d2a6f043e2b7067503447a869.yaml new file mode 100644 index 0000000000..52441cfa59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-software-for-wordpress-7695d17d2a6f043e2b7067503447a869.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-software-for-wordpress-7695d17d2a6f043e2b7067503447a869 + +info: + name: > + LiveChat <= 4.5.15 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b80e90d-72bd-4253-b84b-d2706e1abd4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-software-for-wordpress/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-software-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-software-for-wordpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-software-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-software-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-0afdcc5a66b8604c315ccd15a101d49e.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-0afdcc5a66b8604c315ccd15a101d49e.yaml new file mode 100644 index 0000000000..748b482e5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-0afdcc5a66b8604c315ccd15a101d49e.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-0afdcc5a66b8604c315ccd15a101d49e + +info: + name: > + WP Live Chat Support <= 7.1.04 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0fc2b6cb-cca1-4d90-a229-12ec9d1f4b8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-1006dbdfc9efb098ea5160eab40a333c.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-1006dbdfc9efb098ea5160eab40a333c.yaml new file mode 100644 index 0000000000..02b3f72bf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-1006dbdfc9efb098ea5160eab40a333c.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-1006dbdfc9efb098ea5160eab40a333c + +info: + name: > + 3CX Live Chat <= 9.4.2 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c298a24-b68b-450e-b823-f91841046783?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-18d01dbad64386da194504c3f5ffe26e.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-18d01dbad64386da194504c3f5ffe26e.yaml new file mode 100644 index 0000000000..0720c8d62d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-18d01dbad64386da194504c3f5ffe26e.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-18d01dbad64386da194504c3f5ffe26e + +info: + name: > + WP Live Chat Support <= 8.0.27 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35b5a6ab-8909-49aa-8427-19355e6a7303?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-245c40ef7971bdcc79b4668a4d4b1ccf.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-245c40ef7971bdcc79b4668a4d4b1ccf.yaml new file mode 100644 index 0000000000..ee3e82fb2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-245c40ef7971bdcc79b4668a4d4b1ccf.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-245c40ef7971bdcc79b4668a4d4b1ccf + +info: + name: > + WP Live Chat Support <= 7.0.06 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbc1d257-bc56-4e8f-bdb4-b2a323026625?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-39656d176cfde17eb173675dd34ae675.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-39656d176cfde17eb173675dd34ae675.yaml new file mode 100644 index 0000000000..e3b6af70b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-39656d176cfde17eb173675dd34ae675.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-39656d176cfde17eb173675dd34ae675 + +info: + name: > + WP Live Chat Support <= 8.0.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67e2636a-1a5d-4526-aace-b276faf321a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-3ae5086ca70170003dc9a3bdb44eba92.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-3ae5086ca70170003dc9a3bdb44eba92.yaml new file mode 100644 index 0000000000..666806b558 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-3ae5086ca70170003dc9a3bdb44eba92.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-3ae5086ca70170003dc9a3bdb44eba92 + +info: + name: > + WP Live Chat Support <= 8.0.32 - Unprotected Functions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90689ba2-4f82-4116-85d7-1266189aa34e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-423d9d2c6628472db1ad6145d184fab1.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-423d9d2c6628472db1ad6145d184fab1.yaml new file mode 100644 index 0000000000..9ae307831e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-423d9d2c6628472db1ad6145d184fab1.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-423d9d2c6628472db1ad6145d184fab1 + +info: + name: > + WP Live Chat Support <= 4.3.5 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07067eb5-d15e-4342-914f-5e2a08ea8bb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-5b3f76eca7d765ff7782b4367d966247.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-5b3f76eca7d765ff7782b4367d966247.yaml new file mode 100644 index 0000000000..839185a28e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-5b3f76eca7d765ff7782b4367d966247.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-5b3f76eca7d765ff7782b4367d966247 + +info: + name: > + WP Live Chat Support <= 8.1.9 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a72ce900-7999-45ee-a46a-6dd0a8f5931d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-66eb7f5c446de79e267dceb74a880097.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-66eb7f5c446de79e267dceb74a880097.yaml new file mode 100644 index 0000000000..7150a89590 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-66eb7f5c446de79e267dceb74a880097.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-66eb7f5c446de79e267dceb74a880097 + +info: + name: > + 3CX Live Chat <= 8.0.07 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/220133fe-ebf3-4cfe-8882-1c961b384ff3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-74010eb8fa617d9fb39895a55a268c3c.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-74010eb8fa617d9fb39895a55a268c3c.yaml new file mode 100644 index 0000000000..8c812dea47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-74010eb8fa617d9fb39895a55a268c3c.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-74010eb8fa617d9fb39895a55a268c3c + +info: + name: > + WP Live Chat Support <= 4.3.5 - Stored Cross-site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/550ae92f-6250-4cbd-85d0-a9054aee3916?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-84da1bcb85beb132b593a5fff336db83.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-84da1bcb85beb132b593a5fff336db83.yaml new file mode 100644 index 0000000000..78e19b871b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-84da1bcb85beb132b593a5fff336db83.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-84da1bcb85beb132b593a5fff336db83 + +info: + name: > + WP Live Chat Support <= 8.0.17 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef3b11ef-c328-489e-8c12-331621a0327c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-875e2588a6c7f11db1b0d18dfa5a3b24.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-875e2588a6c7f11db1b0d18dfa5a3b24.yaml new file mode 100644 index 0000000000..2a36f255c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-875e2588a6c7f11db1b0d18dfa5a3b24.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-875e2588a6c7f11db1b0d18dfa5a3b24 + +info: + name: > + WP Live Chat Support <= 8.0.05 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab58a6e8-624b-4268-a95a-0e004f8e8c86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.05') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-ac9a4353796cc2c432e6ec8cb3e235d2.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-ac9a4353796cc2c432e6ec8cb3e235d2.yaml new file mode 100644 index 0000000000..7af2f0d274 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-ac9a4353796cc2c432e6ec8cb3e235d2.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-ac9a4353796cc2c432e6ec8cb3e235d2 + +info: + name: > + 3CX Free Live Chat <= 6.2.03 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f33bc98-167d-4913-8de5-b80296955673?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-b1af204538776bc3f4caa86c078ec978.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-b1af204538776bc3f4caa86c078ec978.yaml new file mode 100644 index 0000000000..50ad8b29e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-b1af204538776bc3f4caa86c078ec978.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-b1af204538776bc3f4caa86c078ec978 + +info: + name: > + WP Live Chat Support < 4.1.0 - JavaScript Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9a6e27-c18f-4edf-b793-16021ebf0a6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-e810e3355fe67bdcfcad0632d29d1e56.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-e810e3355fe67bdcfcad0632d29d1e56.yaml new file mode 100644 index 0000000000..680983dd59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-e810e3355fe67bdcfcad0632d29d1e56.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-e810e3355fe67bdcfcad0632d29d1e56 + +info: + name: > + WP Live Chat Support <= 7.1.02 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ee1a4de-25be-46fa-907e-1856862ae52e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-pro-5dad5dd2cab63732345a28406c0429ec.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-pro-5dad5dd2cab63732345a28406c0429ec.yaml new file mode 100644 index 0000000000..cb90b4fa5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-pro-5dad5dd2cab63732345a28406c0429ec.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-pro-5dad5dd2cab63732345a28406c0429ec + +info: + name: > + WP Live Chat Support Pro <= 8.0.26 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/227fb6d1-3515-4172-9d7c-57a66d17858f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support-pro/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-chat-support-pro-f4c8de2dff39667b20d17f36ad03ed25.yaml b/nuclei-templates/cve-less/plugins/wp-live-chat-support-pro-f4c8de2dff39667b20d17f36ad03ed25.yaml new file mode 100644 index 0000000000..85744ea5fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-chat-support-pro-f4c8de2dff39667b20d17f36ad03ed25.yaml @@ -0,0 +1,58 @@ +id: wp-live-chat-support-pro-f4c8de2dff39667b20d17f36ad03ed25 + +info: + name: > + WP Live Chat Support Pro <= 8.0.06 - Remote Code Execution via unrestricted file upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfd3926e-cdb6-44a6-bada-cb83458ca172?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-chat-support-pro/" + google-query: inurl:"/wp-content/plugins/wp-live-chat-support-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-chat-support-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-chat-support-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-chat-support-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-live-tv-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-live-tv-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6f04b35503 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-live-tv-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-live-tv-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-live-tv/" + google-query: inurl:"/wp-content/plugins/wp-live-tv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-live-tv,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-live-tv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-live-tv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-livephp-9088cbacca16ddb298ad417146be5fc5.yaml b/nuclei-templates/cve-less/plugins/wp-livephp-9088cbacca16ddb298ad417146be5fc5.yaml new file mode 100644 index 0000000000..a66338fe47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-livephp-9088cbacca16ddb298ad417146be5fc5.yaml @@ -0,0 +1,58 @@ +id: wp-livephp-9088cbacca16ddb298ad417146be5fc5 + +info: + name: > + WP Live.php <= 1.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37f7edb2-4fc0-4785-a49d-6bae9aa57d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-livephp/" + google-query: inurl:"/wp-content/plugins/wp-livephp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-livephp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-livephp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-livephp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-login-and-logout-redirect-73c1cd9e5bfe098bfeb3d4b81b96f05b.yaml b/nuclei-templates/cve-less/plugins/wp-login-and-logout-redirect-73c1cd9e5bfe098bfeb3d4b81b96f05b.yaml new file mode 100644 index 0000000000..81bbdc13e8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-login-and-logout-redirect-73c1cd9e5bfe098bfeb3d4b81b96f05b.yaml @@ -0,0 +1,58 @@ +id: wp-login-and-logout-redirect-73c1cd9e5bfe098bfeb3d4b81b96f05b + +info: + name: > + WP Login and Logout Redirect <= 1.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c293c3a-383d-4e3c-bf1b-4d64e9cd3eb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-login-and-logout-redirect/" + google-query: inurl:"/wp-content/plugins/wp-login-and-logout-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-login-and-logout-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-login-and-logout-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-login-and-logout-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-login-box-1b107fac39fc60c6674fcf9f0d2a0f84.yaml b/nuclei-templates/cve-less/plugins/wp-login-box-1b107fac39fc60c6674fcf9f0d2a0f84.yaml new file mode 100644 index 0000000000..379c21a8b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-login-box-1b107fac39fc60c6674fcf9f0d2a0f84.yaml @@ -0,0 +1,58 @@ +id: wp-login-box-1b107fac39fc60c6674fcf9f0d2a0f84 + +info: + name: > + WP Login Box <= 2.0.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66c58d4c-8c36-40af-827d-0e86f2110e3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-login-box/" + google-query: inurl:"/wp-content/plugins/wp-login-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-login-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-login-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-login-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-login-security-and-history-d5419bc1feddd2eafb9324b9b87684d7.yaml b/nuclei-templates/cve-less/plugins/wp-login-security-and-history-d5419bc1feddd2eafb9324b9b87684d7.yaml new file mode 100644 index 0000000000..39f2765dab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-login-security-and-history-d5419bc1feddd2eafb9324b9b87684d7.yaml @@ -0,0 +1,58 @@ +id: wp-login-security-and-history-d5419bc1feddd2eafb9324b9b87684d7 + +info: + name: > + WP Login Security and History <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78a411e3-5228-4ac2-bf39-6bdec5d9e313?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-login-security-and-history/" + google-query: inurl:"/wp-content/plugins/wp-login-security-and-history/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-login-security-and-history,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-login-security-and-history/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-login-security-and-history" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-logo-showcase-99abe0055e8aeebf770fa9b05612b4e1.yaml b/nuclei-templates/cve-less/plugins/wp-logo-showcase-99abe0055e8aeebf770fa9b05612b4e1.yaml new file mode 100644 index 0000000000..e5c6ea243d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-logo-showcase-99abe0055e8aeebf770fa9b05612b4e1.yaml @@ -0,0 +1,58 @@ +id: wp-logo-showcase-99abe0055e8aeebf770fa9b05612b4e1 + +info: + name: > + Logo Slider and Showcase <= 1.3.36 - Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7ac9097-b02b-4f0a-8bc3-6c6af0bdab89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-logo-showcase/" + google-query: inurl:"/wp-content/plugins/wp-logo-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-logo-showcase,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-logo-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-logo-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-logo-showcase-responsive-slider-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/wp-logo-showcase-responsive-slider-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..3b0d4b08f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-logo-showcase-responsive-slider-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: wp-logo-showcase-responsive-slider-slider-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-logo-showcase-responsive-slider-slider/" + google-query: inurl:"/wp-content/plugins/wp-logo-showcase-responsive-slider-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-logo-showcase-responsive-slider-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-logo-showcase-responsive-slider-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-logo-showcase-responsive-slider-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-lytebox-cda07eafd840bbbfe97d5dd1471777f9.yaml b/nuclei-templates/cve-less/plugins/wp-lytebox-cda07eafd840bbbfe97d5dd1471777f9.yaml new file mode 100644 index 0000000000..b757a0e855 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-lytebox-cda07eafd840bbbfe97d5dd1471777f9.yaml @@ -0,0 +1,58 @@ +id: wp-lytebox-cda07eafd840bbbfe97d5dd1471777f9 + +info: + name: > + Lytebox <= 1.3 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b865fde-1c47-4574-932c-334ebefb3579?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-lytebox/" + google-query: inurl:"/wp-content/plugins/wp-lytebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-lytebox,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-lytebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-lytebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-bank-7bbbf63e0874145284bff009623a4860.yaml b/nuclei-templates/cve-less/plugins/wp-mail-bank-7bbbf63e0874145284bff009623a4860.yaml new file mode 100644 index 0000000000..a5cfdfb9f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-bank-7bbbf63e0874145284bff009623a4860.yaml @@ -0,0 +1,58 @@ +id: wp-mail-bank-7bbbf63e0874145284bff009623a4860 + +info: + name: > + Mail Bank - #1 Mail SMTP Plugin for WordPress <= 4.0.14 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31a3a3c1-be0e-46d5-9fa3-563febc5569b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-bank/" + google-query: inurl:"/wp-content/plugins/wp-mail-bank/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-bank,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-bank/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-bank" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-catcher-2f15c2e1797d3dce53478e732579afa9.yaml b/nuclei-templates/cve-less/plugins/wp-mail-catcher-2f15c2e1797d3dce53478e732579afa9.yaml new file mode 100644 index 0000000000..201bfd451d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-catcher-2f15c2e1797d3dce53478e732579afa9.yaml @@ -0,0 +1,58 @@ +id: wp-mail-catcher-2f15c2e1797d3dce53478e732579afa9 + +info: + name: > + Mail logging – WP Mail Catcher <= 2.1.3 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47aed582-efb6-4caf-a65b-57995907ecaa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-catcher/" + google-query: inurl:"/wp-content/plugins/wp-mail-catcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-catcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-catcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-catcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-catcher-3aca48d71f7f1c4be4b57fb19e19bd9d.yaml b/nuclei-templates/cve-less/plugins/wp-mail-catcher-3aca48d71f7f1c4be4b57fb19e19bd9d.yaml new file mode 100644 index 0000000000..89d2a097a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-catcher-3aca48d71f7f1c4be4b57fb19e19bd9d.yaml @@ -0,0 +1,58 @@ +id: wp-mail-catcher-3aca48d71f7f1c4be4b57fb19e19bd9d + +info: + name: > + WP Mail Catcher <= 2.1.2 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1525e1c9-4b94-4f9f-92c5-fc69fe000771?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-catcher/" + google-query: inurl:"/wp-content/plugins/wp-mail-catcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-catcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-catcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-catcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-catcher-6c96ae1b407264caa660411d1fa4575c.yaml b/nuclei-templates/cve-less/plugins/wp-mail-catcher-6c96ae1b407264caa660411d1fa4575c.yaml new file mode 100644 index 0000000000..f084f8f7ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-catcher-6c96ae1b407264caa660411d1fa4575c.yaml @@ -0,0 +1,58 @@ +id: wp-mail-catcher-6c96ae1b407264caa660411d1fa4575c + +info: + name: > + WP Mail Catcher <= 2.1.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfb45af3-c22a-4045-b564-22f7081868d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-catcher/" + google-query: inurl:"/wp-content/plugins/wp-mail-catcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-catcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-catcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-catcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-catcher-e5e442420905170833a6af8d927d5a01.yaml b/nuclei-templates/cve-less/plugins/wp-mail-catcher-e5e442420905170833a6af8d927d5a01.yaml new file mode 100644 index 0000000000..d4bb06a059 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-catcher-e5e442420905170833a6af8d927d5a01.yaml @@ -0,0 +1,58 @@ +id: wp-mail-catcher-e5e442420905170833a6af8d927d5a01 + +info: + name: > + Mail logging - WP Mail Catcher <= 2.1.3 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ebbf7f-61f2-403f-8131-8cedeb13c2d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-catcher/" + google-query: inurl:"/wp-content/plugins/wp-mail-catcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-catcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-catcher/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-catcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-cfbf975d1c5266eb2e6c08324dadc438.yaml b/nuclei-templates/cve-less/plugins/wp-mail-cfbf975d1c5266eb2e6c08324dadc438.yaml new file mode 100644 index 0000000000..ad8a3b0fd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-cfbf975d1c5266eb2e6c08324dadc438.yaml @@ -0,0 +1,58 @@ +id: wp-mail-cfbf975d1c5266eb2e6c08324dadc438 + +info: + name: > + WP Mail <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08ded669-7e43-4da4-87e7-c7d75fa53d8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail/" + google-query: inurl:"/wp-content/plugins/wp-mail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-log-179315a1d6d0707060d355a5241e7195.yaml b/nuclei-templates/cve-less/plugins/wp-mail-log-179315a1d6d0707060d355a5241e7195.yaml new file mode 100644 index 0000000000..798f4ebc9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-log-179315a1d6d0707060d355a5241e7195.yaml @@ -0,0 +1,58 @@ +id: wp-mail-log-179315a1d6d0707060d355a5241e7195 + +info: + name: > + WP Mail Log <= 1.1.1 - Unauthenticated Stored Cross-Site Scripting via Email + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86ee1acb-6f0c-40e6-80a0-fc93b61c1602?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-log/" + google-query: inurl:"/wp-content/plugins/wp-mail-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-log-31c57eb5baf7bb0acd957fca651b5df2.yaml b/nuclei-templates/cve-less/plugins/wp-mail-log-31c57eb5baf7bb0acd957fca651b5df2.yaml new file mode 100644 index 0000000000..8c321e4b72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-log-31c57eb5baf7bb0acd957fca651b5df2.yaml @@ -0,0 +1,58 @@ +id: wp-mail-log-31c57eb5baf7bb0acd957fca651b5df2 + +info: + name: > + WP Mail Log Plugin <= 1.1.2 - Authenticated(Contributor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0542f8bf-8fb1-4c47-89b7-106a6feacca1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-log/" + google-query: inurl:"/wp-content/plugins/wp-mail-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-log-74effda90864a740ff398e9c12c52b1c.yaml b/nuclei-templates/cve-less/plugins/wp-mail-log-74effda90864a740ff398e9c12c52b1c.yaml new file mode 100644 index 0000000000..dcaa8da900 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-log-74effda90864a740ff398e9c12c52b1c.yaml @@ -0,0 +1,58 @@ +id: wp-mail-log-74effda90864a740ff398e9c12c52b1c + +info: + name: > + WP Mail Log <= 1.1.2 - Authenticated (Contributor+) SQL injection via key + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64c72788-a8fa-4f5b-a5b0-8754e952a14d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-log/" + google-query: inurl:"/wp-content/plugins/wp-mail-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-log-8be88bbbbf187ed081686352f66fd170.yaml b/nuclei-templates/cve-less/plugins/wp-mail-log-8be88bbbbf187ed081686352f66fd170.yaml new file mode 100644 index 0000000000..102bd522c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-log-8be88bbbbf187ed081686352f66fd170.yaml @@ -0,0 +1,58 @@ +id: wp-mail-log-8be88bbbbf187ed081686352f66fd170 + +info: + name: > + WP Mail Log <= 1.1.2 - Authenticated (Contributor+) Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3d14d8f-61f4-4942-9eff-42264bb036bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-log/" + google-query: inurl:"/wp-content/plugins/wp-mail-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-log-95ff4ff837620d6ea480a2d73422a590.yaml b/nuclei-templates/cve-less/plugins/wp-mail-log-95ff4ff837620d6ea480a2d73422a590.yaml new file mode 100644 index 0000000000..1f09ac603a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-log-95ff4ff837620d6ea480a2d73422a590.yaml @@ -0,0 +1,58 @@ +id: wp-mail-log-95ff4ff837620d6ea480a2d73422a590 + +info: + name: > + WP Mail Log <= 1.1.2 - Authenticated (Contributor+) SQL Injection via id + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/099cc754-6a56-498f-848a-a242733e7fb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-log/" + google-query: inurl:"/wp-content/plugins/wp-mail-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-log-e4f7324bab65bcd3d88d8e669baede29.yaml b/nuclei-templates/cve-less/plugins/wp-mail-log-e4f7324bab65bcd3d88d8e669baede29.yaml new file mode 100644 index 0000000000..00eafbf776 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-log-e4f7324bab65bcd3d88d8e669baede29.yaml @@ -0,0 +1,58 @@ +id: wp-mail-log-e4f7324bab65bcd3d88d8e669baede29 + +info: + name: > + WP Mail Log <= 1.1.2 - Incorrect Authorization to Authenticated (Contributor+) Data Viewing and Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf169c9c-26f6-4af7-926e-1be34e638fd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-log/" + google-query: inurl:"/wp-content/plugins/wp-mail-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-log-fe1c7e5641b372bf56ee629133d6f4e5.yaml b/nuclei-templates/cve-less/plugins/wp-mail-log-fe1c7e5641b372bf56ee629133d6f4e5.yaml new file mode 100644 index 0000000000..a4fe8a6faf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-log-fe1c7e5641b372bf56ee629133d6f4e5.yaml @@ -0,0 +1,58 @@ +id: wp-mail-log-fe1c7e5641b372bf56ee629133d6f4e5 + +info: + name: > + WP Mail Log <= 1.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5155cee-df51-4da3-be86-38df2ab9908f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-log/" + google-query: inurl:"/wp-content/plugins/wp-mail-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-logging-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wp-mail-logging-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..fdd29251eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-logging-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wp-mail-logging-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-logging/" + google-query: inurl:"/wp-content/plugins/wp-mail-logging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-logging,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-logging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-logging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-logging-642e4603076cf5b4473a13c75fbb4249.yaml b/nuclei-templates/cve-less/plugins/wp-mail-logging-642e4603076cf5b4473a13c75fbb4249.yaml new file mode 100644 index 0000000000..7a822e3146 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-logging-642e4603076cf5b4473a13c75fbb4249.yaml @@ -0,0 +1,58 @@ +id: wp-mail-logging-642e4603076cf5b4473a13c75fbb4249 + +info: + name: > + WP Mail Logging < 1.10.0 - Unauthenticated Arbitrary Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79ff583b-f18a-4e04-9c23-9d3a4eca8c6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-logging/" + google-query: inurl:"/wp-content/plugins/wp-mail-logging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-logging,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-logging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-logging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-logging-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wp-mail-logging-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..85cd47b16e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-logging-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wp-mail-logging-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-logging/" + google-query: inurl:"/wp-content/plugins/wp-mail-logging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-logging,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-logging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-logging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-logging-d4ae66d5784ee57fd8bb24dc427e9062.yaml b/nuclei-templates/cve-less/plugins/wp-mail-logging-d4ae66d5784ee57fd8bb24dc427e9062.yaml new file mode 100644 index 0000000000..687f513e6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-logging-d4ae66d5784ee57fd8bb24dc427e9062.yaml @@ -0,0 +1,58 @@ +id: wp-mail-logging-d4ae66d5784ee57fd8bb24dc427e9062 + +info: + name: > + WP Mail Logging <= 1.8.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c8a4708-eb74-45e1-ba47-e245491a8c2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-logging/" + google-query: inurl:"/wp-content/plugins/wp-mail-logging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-logging,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-logging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-logging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-logging-e516ec301b4cffad1129ddeea6a2940a.yaml b/nuclei-templates/cve-less/plugins/wp-mail-logging-e516ec301b4cffad1129ddeea6a2940a.yaml new file mode 100644 index 0000000000..2daaa58739 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-logging-e516ec301b4cffad1129ddeea6a2940a.yaml @@ -0,0 +1,58 @@ +id: wp-mail-logging-e516ec301b4cffad1129ddeea6a2940a + +info: + name: > + WP Mail Logging <= 1.11.2 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de00d13b-fab9-4284-9594-abd000fbb7ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-logging/" + google-query: inurl:"/wp-content/plugins/wp-mail-logging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-logging,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-logging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-logging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-logging-e597c8ed0035e8185b143a4799be8f2d.yaml b/nuclei-templates/cve-less/plugins/wp-mail-logging-e597c8ed0035e8185b143a4799be8f2d.yaml new file mode 100644 index 0000000000..3550f2fe6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-logging-e597c8ed0035e8185b143a4799be8f2d.yaml @@ -0,0 +1,58 @@ +id: wp-mail-logging-e597c8ed0035e8185b143a4799be8f2d + +info: + name: > + WP Mail Logging <= 1.11.1 - Unauthenticated Stored Cross-Site Scripting via Email + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef20b3e6-d8f4-458e-b604-b46ef16e229e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-logging/" + google-query: inurl:"/wp-content/plugins/wp-mail-logging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-logging,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-logging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-logging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-smtp-1f2e61c0dd580a01c313ec65237451a6.yaml b/nuclei-templates/cve-less/plugins/wp-mail-smtp-1f2e61c0dd580a01c313ec65237451a6.yaml new file mode 100644 index 0000000000..ddcbb3f69b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-smtp-1f2e61c0dd580a01c313ec65237451a6.yaml @@ -0,0 +1,58 @@ +id: wp-mail-smtp-1f2e61c0dd580a01c313ec65237451a6 + +info: + name: > + WP Mail SMTP by WPForms <= 1.3.3 - Unspecified Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5438a03c-9081-4e1a-ad81-2e7a0f180e84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-smtp/" + google-query: inurl:"/wp-content/plugins/wp-mail-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mail-smtp-pro-da10288b29dd37bfe67b8eab58492860.yaml b/nuclei-templates/cve-less/plugins/wp-mail-smtp-pro-da10288b29dd37bfe67b8eab58492860.yaml new file mode 100644 index 0000000000..411253c4ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mail-smtp-pro-da10288b29dd37bfe67b8eab58492860.yaml @@ -0,0 +1,58 @@ +id: wp-mail-smtp-pro-da10288b29dd37bfe67b8eab58492860 + +info: + name: > + WP Mail SMTP Pro <= 3.8.0 - Missing Authorization to Information Dislcosure via is_print_page + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a813251b-a4c1-4b23-ad03-dcc1f4f19eb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mail-smtp-pro/" + google-query: inurl:"/wp-content/plugins/wp-mail-smtp-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mail-smtp-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mail-smtp-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mail-smtp-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mailster-6435ffbe89f0f4a16cb704e9095f5d40.yaml b/nuclei-templates/cve-less/plugins/wp-mailster-6435ffbe89f0f4a16cb704e9095f5d40.yaml new file mode 100644 index 0000000000..2f499ac12e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mailster-6435ffbe89f0f4a16cb704e9095f5d40.yaml @@ -0,0 +1,58 @@ +id: wp-mailster-6435ffbe89f0f4a16cb704e9095f5d40 + +info: + name: > + WP Mailster < 1.5.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f61bda49-1eb0-49a3-8af1-8cadf088464f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mailster/" + google-query: inurl:"/wp-content/plugins/wp-mailster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mailster,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mailster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mailster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mailto-links-d9f0423766ca387f95476b5cd1e1b1e4.yaml b/nuclei-templates/cve-less/plugins/wp-mailto-links-d9f0423766ca387f95476b5cd1e1b1e4.yaml new file mode 100644 index 0000000000..3fff4c7232 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mailto-links-d9f0423766ca387f95476b5cd1e1b1e4.yaml @@ -0,0 +1,58 @@ +id: wp-mailto-links-d9f0423766ca387f95476b5cd1e1b1e4 + +info: + name: > + WP Mailto Links – Protect Email Addresses <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec882062-0059-47ca-a007-3347e7adb70b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mailto-links/" + google-query: inurl:"/wp-content/plugins/wp-mailto-links/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mailto-links,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mailto-links/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mailto-links" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mailup-5be3d6220be540ab529a6f616f5316f8.yaml b/nuclei-templates/cve-less/plugins/wp-mailup-5be3d6220be540ab529a6f616f5316f8.yaml new file mode 100644 index 0000000000..f4ca70242d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mailup-5be3d6220be540ab529a6f616f5316f8.yaml @@ -0,0 +1,58 @@ +id: wp-mailup-5be3d6220be540ab529a6f616f5316f8 + +info: + name: > + MailUp newsletter sign-up form < 1.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20227433-a2f0-4a00-b6cc-95708135c0b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mailup/" + google-query: inurl:"/wp-content/plugins/wp-mailup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mailup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mailup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mailup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mailup-74a3eb8891dcef7e1892db3c005e178d.yaml b/nuclei-templates/cve-less/plugins/wp-mailup-74a3eb8891dcef7e1892db3c005e178d.yaml new file mode 100644 index 0000000000..e4a22a8ed4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mailup-74a3eb8891dcef7e1892db3c005e178d.yaml @@ -0,0 +1,58 @@ +id: wp-mailup-74a3eb8891dcef7e1892db3c005e178d + +info: + name: > + MailUp newsletter sign-up form < 1.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c793bf75-5e44-4511-9005-4175f349cef4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mailup/" + google-query: inurl:"/wp-content/plugins/wp-mailup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mailup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mailup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mailup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml new file mode 100644 index 0000000000..6d3b67566d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-6dc10d5c3a8a61c313df3cbcf576a1b8 + +info: + name: > + WP Maintenance <= 5.0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f2fa602-79db-4bb3-a55c-75da59116f06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance/" + google-query: inurl:"/wp-content/plugins/wp-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-aab671eab1f3a35319bc119c20a62b84.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-aab671eab1f3a35319bc119c20a62b84.yaml new file mode 100644 index 0000000000..03f1c7a077 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-aab671eab1f3a35319bc119c20a62b84.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-aab671eab1f3a35319bc119c20a62b84 + +info: + name: > + WP Maintenance <= 6.0.5 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002e61b-7395-4ba7-8695-da17cfc001cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance/" + google-query: inurl:"/wp-content/plugins/wp-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-d9b09bd810ab52f398f0afdd79c897af.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-d9b09bd810ab52f398f0afdd79c897af.yaml new file mode 100644 index 0000000000..3bab0bd353 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-d9b09bd810ab52f398f0afdd79c897af.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-d9b09bd810ab52f398f0afdd79c897af + +info: + name: > + WP Maintenance <= 6.1.6 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/645328f3-2bcb-4287-952c-2e23ec57bb4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance/" + google-query: inurl:"/wp-content/plugins/wp-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-e8d379239814ced6a5f09013cbb811b8.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-e8d379239814ced6a5f09013cbb811b8.yaml new file mode 100644 index 0000000000..1927f23d6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-e8d379239814ced6a5f09013cbb811b8.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-e8d379239814ced6a5f09013cbb811b8 + +info: + name: > + WP Maintenance <= 6.1.3 - IP Restriction Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87a1cc00-330c-40c3-a174-8ea50075c4bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance/" + google-query: inurl:"/wp-content/plugins/wp-maintenance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-12a42b489a4f41309029bce2b7df59b4.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-12a42b489a4f41309029bce2b7df59b4.yaml new file mode 100644 index 0000000000..a8245a46e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-12a42b489a4f41309029bce2b7df59b4.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-12a42b489a4f41309029bce2b7df59b4 + +info: + name: > + WP Maintenance Mode & Coming Soon <= 2.4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/840e9a50-ce53-4b9a-b6ae-c5016e11373b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-18112388a9914d1cf0c8f86d0f31e148.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-18112388a9914d1cf0c8f86d0f31e148.yaml new file mode 100644 index 0000000000..6624abe60c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-18112388a9914d1cf0c8f86d0f31e148.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-18112388a9914d1cf0c8f86d0f31e148 + +info: + name: > + WP Maintenance Mode <= 1.8.7 - Missing Authorization Checks & Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f42dc6ab-4035-4e9e-b956-40395c7e309f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-27c270156b5cf78eb4bb31035b7f5db8.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-27c270156b5cf78eb4bb31035b7f5db8.yaml new file mode 100644 index 0000000000..ae1b4dfa35 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-27c270156b5cf78eb4bb31035b7f5db8.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-27c270156b5cf78eb4bb31035b7f5db8 + +info: + name: > + WP Maintenance Mode <= 2.0.6 - Authenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3de6969-a27c-40a1-87ff-ce09a702613c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-92df025ccfa89a1351393b8f44caea90.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-92df025ccfa89a1351393b8f44caea90.yaml new file mode 100644 index 0000000000..2a59131e54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-92df025ccfa89a1351393b8f44caea90.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-92df025ccfa89a1351393b8f44caea90 + +info: + name: > + ThemeIsle SDK <= Various Versions - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6147582f-578a-47ad-b16c-65c37896783d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-a8309537878561527873c9aaba1b29f6.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-a8309537878561527873c9aaba1b29f6.yaml new file mode 100644 index 0000000000..8f7b75b8f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-a8309537878561527873c9aaba1b29f6.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-a8309537878561527873c9aaba1b29f6 + +info: + name: > + WP Maintenance Mode <= 2.0.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/00d69e80-36fa-4b74-8138-56c0bf576e44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-c03b6eeac707e2faa28a70a9e28fd5e0.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-c03b6eeac707e2faa28a70a9e28fd5e0.yaml new file mode 100644 index 0000000000..5476409f71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-c03b6eeac707e2faa28a70a9e28fd5e0.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-c03b6eeac707e2faa28a70a9e28fd5e0 + +info: + name: > + LightStart – Maintenance Mode, Coming Soon and Landing Page Builder <= 2.6.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b57d3d1d-dcdb-4f11-82d8-183778baa075?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-f508bbced58788f18196a525afb794c1.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-f508bbced58788f18196a525afb794c1.yaml new file mode 100644 index 0000000000..d9b6c5c861 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-f508bbced58788f18196a525afb794c1.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-f508bbced58788f18196a525afb794c1 + +info: + name: > + WP Maintenance Mode <= 2.0.6 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cf2201d-6da0-4f66-9135-c6b34ef7c65f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-7393cd06bd9f0a8e6b160ee1e40091a1.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-7393cd06bd9f0a8e6b160ee1e40091a1.yaml new file mode 100644 index 0000000000..21694603dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-7393cd06bd9f0a8e6b160ee1e40091a1.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-site-under-construction-7393cd06bd9f0a8e6b160ee1e40091a1 + +info: + name: > + WooCommerce Conditional Marketing Mailer <= 1.5.1 - Improper Authorization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37a25fdf-da5d-42bd-a803-afb3787aabf4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode-site-under-construction/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode-site-under-construction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode-site-under-construction,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode-site-under-construction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode-site-under-construction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-9a4983ebf76516d5539ccc05a21c897b.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-9a4983ebf76516d5539ccc05a21c897b.yaml new file mode 100644 index 0000000000..61723334ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-9a4983ebf76516d5539ccc05a21c897b.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-site-under-construction-9a4983ebf76516d5539ccc05a21c897b + +info: + name: > + WP Maintenance Mode & Site Under Construction < 1.8.2 - Missing Authorization to Arbitrary Plugin Installation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/808e5246-30b1-4706-b11f-27fb74b117ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode-site-under-construction/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode-site-under-construction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode-site-under-construction,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode-site-under-construction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode-site-under-construction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-acbdf3cc478f1988c5c3adc520bf6766.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-acbdf3cc478f1988c5c3adc520bf6766.yaml new file mode 100644 index 0000000000..2834f97d27 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-acbdf3cc478f1988c5c3adc520bf6766.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-site-under-construction-acbdf3cc478f1988c5c3adc520bf6766 + +info: + name: > + WP Maintenance Mode & Site Under Construction <= 1.8.2 - Cross-Site Request Forgery to Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4d33e69-3620-42d9-adb3-267a5ed02a58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode-site-under-construction/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode-site-under-construction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode-site-under-construction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode-site-under-construction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode-site-under-construction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-dc3b48b4dca1bdc6da00b0dd6c2512e9.yaml b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-dc3b48b4dca1bdc6da00b0dd6c2512e9.yaml new file mode 100644 index 0000000000..dafca12096 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maintenance-mode-site-under-construction-dc3b48b4dca1bdc6da00b0dd6c2512e9.yaml @@ -0,0 +1,58 @@ +id: wp-maintenance-mode-site-under-construction-dc3b48b4dca1bdc6da00b0dd6c2512e9 + +info: + name: > + Conditional Marketing Mailer for WooCommerce <= 1.5.2 - Cross-Site Request Forgery to Arbitrary Plugin Installation/Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22713937-d834-46cf-83ec-6f9f61b548e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maintenance-mode-site-under-construction/" + google-query: inurl:"/wp-content/plugins/wp-maintenance-mode-site-under-construction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maintenance-mode-site-under-construction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maintenance-mode-site-under-construction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maintenance-mode-site-under-construction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-manutencao-a9cc9d2366f33cd5741768b12deb923f.yaml b/nuclei-templates/cve-less/plugins/wp-manutencao-a9cc9d2366f33cd5741768b12deb923f.yaml new file mode 100644 index 0000000000..891aaccc2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-manutencao-a9cc9d2366f33cd5741768b12deb923f.yaml @@ -0,0 +1,58 @@ +id: wp-manutencao-a9cc9d2366f33cd5741768b12deb923f + +info: + name: > + WordPress Manutenção <= 1.0.6 - IP Spoofing to Maintenance Mode Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6664039-554b-43bf-8925-00c1e62e28f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-manutencao/" + google-query: inurl:"/wp-content/plugins/wp-manutencao/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-manutencao,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-manutencao/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-manutencao" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-map-block-5b50465ae2f78659823d6ff4bd2ffc8a.yaml b/nuclei-templates/cve-less/plugins/wp-map-block-5b50465ae2f78659823d6ff4bd2ffc8a.yaml new file mode 100644 index 0000000000..a17e704e51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-map-block-5b50465ae2f78659823d6ff4bd2ffc8a.yaml @@ -0,0 +1,58 @@ +id: wp-map-block-5b50465ae2f78659823d6ff4bd2ffc8a + +info: + name: > + WP Map Block – Gutenberg Map Block for Google Map and OpenStreet Map <= 1.2.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8eba82b9-20cd-4bf1-85bc-2daea4423ee8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-map-block/" + google-query: inurl:"/wp-content/plugins/wp-map-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-map-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-map-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-map-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mapa-politico-spain-85d2798dcbad09cd3df8222f6cc3a39d.yaml b/nuclei-templates/cve-less/plugins/wp-mapa-politico-spain-85d2798dcbad09cd3df8222f6cc3a39d.yaml new file mode 100644 index 0000000000..0b8458e780 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mapa-politico-spain-85d2798dcbad09cd3df8222f6cc3a39d.yaml @@ -0,0 +1,58 @@ +id: wp-mapa-politico-spain-85d2798dcbad09cd3df8222f6cc3a39d + +info: + name: > + Mapa Politico España < 3.7.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd2f7567-a438-417b-bf0f-dec7a9f098b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mapa-politico-spain/" + google-query: inurl:"/wp-content/plugins/wp-mapa-politico-spain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mapa-politico-spain,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mapa-politico-spain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mapa-politico-spain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mapit-76a5d195529e4a00633fd456330950cc.yaml b/nuclei-templates/cve-less/plugins/wp-mapit-76a5d195529e4a00633fd456330950cc.yaml new file mode 100644 index 0000000000..0b82e74ec3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mapit-76a5d195529e4a00633fd456330950cc.yaml @@ -0,0 +1,58 @@ +id: wp-mapit-76a5d195529e4a00633fd456330950cc + +info: + name: > + WP MapIt <= 2.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ef6f598-e1a7-4036-9485-1aad0416349a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mapit/" + google-query: inurl:"/wp-content/plugins/wp-mapit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mapit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mapit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mapit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-marketing-automations-17e239a9a613785a57f9dff8c47dabbc.yaml b/nuclei-templates/cve-less/plugins/wp-marketing-automations-17e239a9a613785a57f9dff8c47dabbc.yaml new file mode 100644 index 0000000000..1351373a28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-marketing-automations-17e239a9a613785a57f9dff8c47dabbc.yaml @@ -0,0 +1,58 @@ +id: wp-marketing-automations-17e239a9a613785a57f9dff8c47dabbc + +info: + name: > + Abandoned Cart Recovery for WooCommerce by Autonami <= 2.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/245ae6f7-3539-4c91-89f1-29d1e12493b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-marketing-automations/" + google-query: inurl:"/wp-content/plugins/wp-marketing-automations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-marketing-automations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-marketing-automations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-marketing-automations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-marketing-automations-2d0f997ee92e7b6c06625a4a937305f5.yaml b/nuclei-templates/cve-less/plugins/wp-marketing-automations-2d0f997ee92e7b6c06625a4a937305f5.yaml new file mode 100644 index 0000000000..81a2a66ab1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-marketing-automations-2d0f997ee92e7b6c06625a4a937305f5.yaml @@ -0,0 +1,58 @@ +id: wp-marketing-automations-2d0f997ee92e7b6c06625a4a937305f5 + +info: + name: > + Automation By Autonami <= 2.6.1 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8af44af4-ea56-4686-ad35-5bcdd98ba2cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-marketing-automations/" + google-query: inurl:"/wp-content/plugins/wp-marketing-automations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-marketing-automations,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-marketing-automations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-marketing-automations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-marketing-automations-d18e40088a787bdccb931530c8848277.yaml b/nuclei-templates/cve-less/plugins/wp-marketing-automations-d18e40088a787bdccb931530c8848277.yaml new file mode 100644 index 0000000000..efe3b0c042 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-marketing-automations-d18e40088a787bdccb931530c8848277.yaml @@ -0,0 +1,58 @@ +id: wp-marketing-automations-d18e40088a787bdccb931530c8848277 + +info: + name: > + Automation By Autonami <= 2.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ec1d883-147f-4a15-89ab-bd9c41893589?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-marketing-automations/" + google-query: inurl:"/wp-content/plugins/wp-marketing-automations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-marketing-automations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-marketing-automations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-marketing-automations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-masquerade-923b7799c6c4b8b6606ee152480bc325.yaml b/nuclei-templates/cve-less/plugins/wp-masquerade-923b7799c6c4b8b6606ee152480bc325.yaml new file mode 100644 index 0000000000..11144b51eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-masquerade-923b7799c6c4b8b6606ee152480bc325.yaml @@ -0,0 +1,58 @@ +id: wp-masquerade-923b7799c6c4b8b6606ee152480bc325 + +info: + name: > + WP Masquerade <= 1.1.0 - Authenticated (Subscriber+) Account Takeover + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d79dc179-8f0e-47e3-9697-82d9c9d44be2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-masquerade/" + google-query: inurl:"/wp-content/plugins/wp-masquerade/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-masquerade,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-masquerade/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-masquerade" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maximum-upload-file-size-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wp-maximum-upload-file-size-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..d9285e9dac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maximum-upload-file-size-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wp-maximum-upload-file-size-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maximum-upload-file-size/" + google-query: inurl:"/wp-content/plugins/wp-maximum-upload-file-size/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maximum-upload-file-size,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maximum-upload-file-size/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maximum-upload-file-size" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-maximum-upload-file-size-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wp-maximum-upload-file-size-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..f17521fa33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-maximum-upload-file-size-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wp-maximum-upload-file-size-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-maximum-upload-file-size/" + google-query: inurl:"/wp-content/plugins/wp-maximum-upload-file-size/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-maximum-upload-file-size,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-maximum-upload-file-size/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-maximum-upload-file-size" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-media-category-management-5a3ba228c7ef68acd338809eb5946660.yaml b/nuclei-templates/cve-less/plugins/wp-media-category-management-5a3ba228c7ef68acd338809eb5946660.yaml new file mode 100644 index 0000000000..e2d0fbc59d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-media-category-management-5a3ba228c7ef68acd338809eb5946660.yaml @@ -0,0 +1,58 @@ +id: wp-media-category-management-5a3ba228c7ef68acd338809eb5946660 + +info: + name: > + WP Media Category Management <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cce0fd52-b4a3-4608-81ca-f50c859ae6a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-media-category-management/" + google-query: inurl:"/wp-content/plugins/wp-media-category-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-media-category-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-media-category-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-media-category-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-media-cleaner-ee67de5781e7fd9c2318027f775c66d6.yaml b/nuclei-templates/cve-less/plugins/wp-media-cleaner-ee67de5781e7fd9c2318027f775c66d6.yaml new file mode 100644 index 0000000000..089335ee73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-media-cleaner-ee67de5781e7fd9c2318027f775c66d6.yaml @@ -0,0 +1,58 @@ +id: wp-media-cleaner-ee67de5781e7fd9c2318027f775c66d6 + +info: + name: > + WP Media Cleaner <= 2.2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0654ddef-0a6e-4241-b226-947b5b0415b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-media-cleaner/" + google-query: inurl:"/wp-content/plugins/wp-media-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-media-cleaner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-media-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-media-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-media-folder-1196705650803cf1c8c204bb4b542a25.yaml b/nuclei-templates/cve-less/plugins/wp-media-folder-1196705650803cf1c8c204bb4b542a25.yaml new file mode 100644 index 0000000000..c7372bdc96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-media-folder-1196705650803cf1c8c204bb4b542a25.yaml @@ -0,0 +1,58 @@ +id: wp-media-folder-1196705650803cf1c8c204bb4b542a25 + +info: + name: > + WP Media folder <= 5.7.2 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5e4a172-38de-49d3-8a5d-62253cf6d67c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-media-folder/" + google-query: inurl:"/wp-content/plugins/wp-media-folder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-media-folder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-media-folder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-media-folder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-media-folder-2da7a3f2515edfb050506d62d2d86fdd.yaml b/nuclei-templates/cve-less/plugins/wp-media-folder-2da7a3f2515edfb050506d62d2d86fdd.yaml new file mode 100644 index 0000000000..08b3946647 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-media-folder-2da7a3f2515edfb050506d62d2d86fdd.yaml @@ -0,0 +1,58 @@ +id: wp-media-folder-2da7a3f2515edfb050506d62d2d86fdd + +info: + name: > + WP Media folder <= 5.7.2 - Missing Authorization to Authenticated(Subscriber+) Plugin settings change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d96a3d43-81dd-4c23-984b-a9ddf450164b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-media-folder/" + google-query: inurl:"/wp-content/plugins/wp-media-folder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-media-folder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-media-folder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-media-folder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-media-folder-a0b0c399b7514c70fcf0e05e68ca4408.yaml b/nuclei-templates/cve-less/plugins/wp-media-folder-a0b0c399b7514c70fcf0e05e68ca4408.yaml new file mode 100644 index 0000000000..69601d358e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-media-folder-a0b0c399b7514c70fcf0e05e68ca4408.yaml @@ -0,0 +1,58 @@ +id: wp-media-folder-a0b0c399b7514c70fcf0e05e68ca4408 + +info: + name: > + WP Media folder <= 5.7.2 - Missing Authorization to Authenticated(Subscriber+) Title Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eed4626-1fa5-49b1-864e-c37e4cf58ad8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-media-folder/" + google-query: inurl:"/wp-content/plugins/wp-media-folder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-media-folder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-media-folder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-media-folder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-media-library-categories-5a62a90392d8e5e62d1e1ad4b9531478.yaml b/nuclei-templates/cve-less/plugins/wp-media-library-categories-5a62a90392d8e5e62d1e1ad4b9531478.yaml new file mode 100644 index 0000000000..fae4757b2a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-media-library-categories-5a62a90392d8e5e62d1e1ad4b9531478.yaml @@ -0,0 +1,58 @@ +id: wp-media-library-categories-5a62a90392d8e5e62d1e1ad4b9531478 + +info: + name: > + Media Library Categories <= 1.9.9 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d542c1e8-7e9f-4687-8739-0ebcb865b998?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-media-library-categories/" + google-query: inurl:"/wp-content/plugins/wp-media-library-categories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-media-library-categories,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-media-library-categories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-media-library-categories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-media-library-categories-9fd777f73c4ef625b6fdbf9d8363a65e.yaml b/nuclei-templates/cve-less/plugins/wp-media-library-categories-9fd777f73c4ef625b6fdbf9d8363a65e.yaml new file mode 100644 index 0000000000..dec4fc9a04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-media-library-categories-9fd777f73c4ef625b6fdbf9d8363a65e.yaml @@ -0,0 +1,58 @@ +id: wp-media-library-categories-9fd777f73c4ef625b6fdbf9d8363a65e + +info: + name: > + Media Library Categories <= 2.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44982138-7ebb-4562-a869-f17bfecd16d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-media-library-categories/" + google-query: inurl:"/wp-content/plugins/wp-media-library-categories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-media-library-categories,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-media-library-categories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-media-library-categories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-media-player-cf07672d5cc5a9d43b461f631786b4cf.yaml b/nuclei-templates/cve-less/plugins/wp-media-player-cf07672d5cc5a9d43b461f631786b4cf.yaml new file mode 100644 index 0000000000..6035cd5d2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-media-player-cf07672d5cc5a9d43b461f631786b4cf.yaml @@ -0,0 +1,58 @@ +id: wp-media-player-cf07672d5cc5a9d43b461f631786b4cf + +info: + name: > + WP Silverlight Media Player <= 0.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a9dd9b6-28c7-4f7d-95bb-e93ccc6abc30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-media-player/" + google-query: inurl:"/wp-content/plugins/wp-media-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-media-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-media-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-media-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-megamenu-c6355382690553750aa0f80495721ab6.yaml b/nuclei-templates/cve-less/plugins/wp-megamenu-c6355382690553750aa0f80495721ab6.yaml new file mode 100644 index 0000000000..4cfebfeba9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-megamenu-c6355382690553750aa0f80495721ab6.yaml @@ -0,0 +1,58 @@ +id: wp-megamenu-c6355382690553750aa0f80495721ab6 + +info: + name: > + WP Mega Menu <= 1.3.6 - Unauthenticated Settings Update to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/184ee992-1479-4528-9ff7-036affaecdbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-megamenu/" + google-query: inurl:"/wp-content/plugins/wp-megamenu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-megamenu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-megamenu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-megamenu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-00ca2c99ad053400f72b1ad04cedfa49.yaml b/nuclei-templates/cve-less/plugins/wp-members-00ca2c99ad053400f72b1ad04cedfa49.yaml new file mode 100644 index 0000000000..2ef2da10d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-00ca2c99ad053400f72b1ad04cedfa49.yaml @@ -0,0 +1,58 @@ +id: wp-members-00ca2c99ad053400f72b1ad04cedfa49 + +info: + name: > + WP-Members Membership Plugin <= 3.4.8 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46c61f38-553e-43b2-a666-b160db40e66d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-0a288cfd79394a91cc2f2e98f7ebe8f7.yaml b/nuclei-templates/cve-less/plugins/wp-members-0a288cfd79394a91cc2f2e98f7ebe8f7.yaml new file mode 100644 index 0000000000..7f701a1de3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-0a288cfd79394a91cc2f2e98f7ebe8f7.yaml @@ -0,0 +1,58 @@ +id: wp-members-0a288cfd79394a91cc2f2e98f7ebe8f7 + +info: + name: > + WP-Members Membership Plugin <= 3.4.9.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/033069d2-8e0f-4c67-b18c-fdd471d85f87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-7700c6b035beec7a0abef5d3cdd6b1cf.yaml b/nuclei-templates/cve-less/plugins/wp-members-7700c6b035beec7a0abef5d3cdd6b1cf.yaml new file mode 100644 index 0000000000..6a6b1cfde4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-7700c6b035beec7a0abef5d3cdd6b1cf.yaml @@ -0,0 +1,58 @@ +id: wp-members-7700c6b035beec7a0abef5d3cdd6b1cf + +info: + name: > + WP-Members <= 3.2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/249ac834-e7de-42cc-9ac1-82e7c18eac31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-927acdfb36c0f4e522e79fd5612163d3.yaml b/nuclei-templates/cve-less/plugins/wp-members-927acdfb36c0f4e522e79fd5612163d3.yaml new file mode 100644 index 0000000000..7155a7abb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-927acdfb36c0f4e522e79fd5612163d3.yaml @@ -0,0 +1,58 @@ +id: wp-members-927acdfb36c0f4e522e79fd5612163d3 + +info: + name: > + WP-Members Membership Plugin <= 2.8.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/379408c3-399d-4aff-9a6b-43913aaa52b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-a980d40221670f484b92312f4acbd125.yaml b/nuclei-templates/cve-less/plugins/wp-members-a980d40221670f484b92312f4acbd125.yaml new file mode 100644 index 0000000000..5eea36ce8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-a980d40221670f484b92312f4acbd125.yaml @@ -0,0 +1,58 @@ +id: wp-members-a980d40221670f484b92312f4acbd125 + +info: + name: > + WP-Members < 3.1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4db5d4ec-0f49-40fb-97b3-f0146cbbbe52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-ceb215b10a19ec9d161edd4eed36fac8.yaml b/nuclei-templates/cve-less/plugins/wp-members-ceb215b10a19ec9d161edd4eed36fac8.yaml new file mode 100644 index 0000000000..ed34c48d56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-ceb215b10a19ec9d161edd4eed36fac8.yaml @@ -0,0 +1,58 @@ +id: wp-members-ceb215b10a19ec9d161edd4eed36fac8 + +info: + name: > + WP-Members Membership Plugin <= 3.4.9.3 - Unprotected Storage of Potentially Sensitive Files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4319fa2e-8826-4100-9156-cbe80582367e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-dcbc79daa691cad653de67a9ff1a5707.yaml b/nuclei-templates/cve-less/plugins/wp-members-dcbc79daa691cad653de67a9ff1a5707.yaml new file mode 100644 index 0000000000..4b27dace2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-dcbc79daa691cad653de67a9ff1a5707.yaml @@ -0,0 +1,58 @@ +id: wp-members-dcbc79daa691cad653de67a9ff1a5707 + +info: + name: > + WP-Members Membership <= 3.4.7.3 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf05a79a-0375-4c9d-bbf0-a87484327b87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-e2f5ffd9a4d18c5b5627131fa4317643.yaml b/nuclei-templates/cve-less/plugins/wp-members-e2f5ffd9a4d18c5b5627131fa4317643.yaml new file mode 100644 index 0000000000..c0cb395118 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-e2f5ffd9a4d18c5b5627131fa4317643.yaml @@ -0,0 +1,58 @@ +id: wp-members-e2f5ffd9a4d18c5b5627131fa4317643 + +info: + name: > + WP-Members Membership Plugin <= 3.4.9.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/631e1061-50b1-4df2-b876-37b4cd3e2478?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-members-e3501204b93612b8ff957cf7e1036632.yaml b/nuclei-templates/cve-less/plugins/wp-members-e3501204b93612b8ff957cf7e1036632.yaml new file mode 100644 index 0000000000..d047cb3afc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-members-e3501204b93612b8ff957cf7e1036632.yaml @@ -0,0 +1,58 @@ +id: wp-members-e3501204b93612b8ff957cf7e1036632 + +info: + name: > + WP-Members Membership <= 3.4.7.3 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dabc2ae0-6005-4287-b1b0-385bc6d5c467?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-members/" + google-query: inurl:"/wp-content/plugins/wp-members/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-members,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-members/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-members" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-membership-398e2e434c59ceafeecf5e603168a0d7.yaml b/nuclei-templates/cve-less/plugins/wp-membership-398e2e434c59ceafeecf5e603168a0d7.yaml new file mode 100644 index 0000000000..9efdcb0350 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-membership-398e2e434c59ceafeecf5e603168a0d7.yaml @@ -0,0 +1,58 @@ +id: wp-membership-398e2e434c59ceafeecf5e603168a0d7 + +info: + name: > + WP Membership <= 1.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/443bae1e-21a0-44b3-bda0-a189f5c69a16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-membership/" + google-query: inurl:"/wp-content/plugins/wp-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-membership,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-membership-a284426b60f71419209b182f0b3fc61e.yaml b/nuclei-templates/cve-less/plugins/wp-membership-a284426b60f71419209b182f0b3fc61e.yaml new file mode 100644 index 0000000000..0fa4e92773 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-membership-a284426b60f71419209b182f0b3fc61e.yaml @@ -0,0 +1,58 @@ +id: wp-membership-a284426b60f71419209b182f0b3fc61e + +info: + name: > + WP Membership <= 1.2.3 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5607fffa-341f-4237-b064-00fe2e6c9c9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-membership/" + google-query: inurl:"/wp-content/plugins/wp-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-membership-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/cve-less/plugins/wp-membership-c1fc6421a52e6ac7d9b0f476667cd29a.yaml new file mode 100644 index 0000000000..b7491d3554 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-membership-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -0,0 +1,58 @@ +id: wp-membership-c1fc6421a52e6ac7d9b0f476667cd29a + +info: + name: > + Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629d4809-1dd2-4b67-8d8d-9c55f5240f94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-membership/" + google-query: inurl:"/wp-content/plugins/wp-membership/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-membership,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-membership/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-membership" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-memory-da896910a5cacf8279e4d7de14e16a7d.yaml b/nuclei-templates/cve-less/plugins/wp-memory-da896910a5cacf8279e4d7de14e16a7d.yaml new file mode 100644 index 0000000000..7e722aac1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-memory-da896910a5cacf8279e4d7de14e16a7d.yaml @@ -0,0 +1,58 @@ +id: wp-memory-da896910a5cacf8279e4d7de14e16a7d + +info: + name: > + Memory Usage <= 2.45 - Missing Authorization to Arbitrary Plugin Installation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4349f322-41ee-43d2-b0a9-567b89aa5d76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-memory/" + google-query: inurl:"/wp-content/plugins/wp-memory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-memory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-memory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-memory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.45') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-memory-e5755ab6ce28e69bf31d165e7430384a.yaml b/nuclei-templates/cve-less/plugins/wp-memory-e5755ab6ce28e69bf31d165e7430384a.yaml new file mode 100644 index 0000000000..0b8cec3118 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-memory-e5755ab6ce28e69bf31d165e7430384a.yaml @@ -0,0 +1,58 @@ +id: wp-memory-e5755ab6ce28e69bf31d165e7430384a + +info: + name: > + Memory Usage, Memory Limit, PHP and Server Memory Health Check and Fix Plugin <= 2.43 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45f3568c-b6d9-4d00-a8cd-571443d80fd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-memory/" + google-query: inurl:"/wp-content/plugins/wp-memory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-memory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-memory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-memory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-menu-cart-3600d02bff1e230933e1bf9df683d80b.yaml b/nuclei-templates/cve-less/plugins/wp-menu-cart-3600d02bff1e230933e1bf9df683d80b.yaml new file mode 100644 index 0000000000..2cf9cbc612 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-menu-cart-3600d02bff1e230933e1bf9df683d80b.yaml @@ -0,0 +1,58 @@ +id: wp-menu-cart-3600d02bff1e230933e1bf9df683d80b + +info: + name: > + WP Menu Cart <= 2.11.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee862f44-903d-4b1c-9a5c-98e63379d5cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-menu-cart/" + google-query: inurl:"/wp-content/plugins/wp-menu-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-menu-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-menu-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-menu-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-9a466e34216ffe71aad25917ff6bfb32.yaml b/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-9a466e34216ffe71aad25917ff6bfb32.yaml new file mode 100644 index 0000000000..40f3e69bd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-9a466e34216ffe71aad25917ff6bfb32.yaml @@ -0,0 +1,58 @@ +id: wp-meta-and-date-remover-9a466e34216ffe71aad25917ff6bfb32 + +info: + name: > + WP Meta and Date Remover < 2.2.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3da0a44f-d4b4-4330-a2e3-d25a2a7df926?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-and-date-remover/" + google-query: inurl:"/wp-content/plugins/wp-meta-and-date-remover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-and-date-remover,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-and-date-remover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-and-date-remover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..205017852f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-meta-and-date-remover-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-and-date-remover/" + google-query: inurl:"/wp-content/plugins/wp-meta-and-date-remover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-and-date-remover,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-and-date-remover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-and-date-remover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-d52eb2dcb52eaf5c45a9c76db66b7765.yaml b/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-d52eb2dcb52eaf5c45a9c76db66b7765.yaml new file mode 100644 index 0000000000..8c6f36402a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-and-date-remover-d52eb2dcb52eaf5c45a9c76db66b7765.yaml @@ -0,0 +1,58 @@ +id: wp-meta-and-date-remover-d52eb2dcb52eaf5c45a9c76db66b7765 + +info: + name: > + WP Meta and Date Remover <= 2.3.0 - Cross-Site Request Forgery via updateSettings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faa9ad87-44b2-47b3-a05c-52e59af7255a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-and-date-remover/" + google-query: inurl:"/wp-content/plugins/wp-meta-and-date-remover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-and-date-remover,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-and-date-remover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-and-date-remover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-320c57cb813e49326995b9fd67784965.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-320c57cb813e49326995b9fd67784965.yaml new file mode 100644 index 0000000000..0dbff260f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-320c57cb813e49326995b9fd67784965.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-320c57cb813e49326995b9fd67784965 + +info: + name: > + MDTF – Meta Data and Taxonomies Filter <= 1.3.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a5ab5f1-db14-4448-9186-35a5f382cd1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-388ffda3d201191cb375824a74d92ffc.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-388ffda3d201191cb375824a74d92ffc.yaml new file mode 100644 index 0000000000..c11d6f279f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-388ffda3d201191cb375824a74d92ffc.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-388ffda3d201191cb375824a74d92ffc + +info: + name: > + Meta Data Filter & Taxonomies Filter <= 1.2.7.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77b7fb02-1b79-4b0b-99ab-fa042e86391a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-407035e57e51b9b24244b7b6677f36c6.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-407035e57e51b9b24244b7b6677f36c6.yaml new file mode 100644 index 0000000000..771a6b4f7d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-407035e57e51b9b24244b7b6677f36c6.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-407035e57e51b9b24244b7b6677f36c6 + +info: + name: > + WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d338b583-4587-4b8d-b78e-a1b9a1054435?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-412021edf597308d1e073bd0f08f6dda.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-412021edf597308d1e073bd0f08f6dda.yaml new file mode 100644 index 0000000000..b8e14e4f4e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-412021edf597308d1e073bd0f08f6dda.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-412021edf597308d1e073bd0f08f6dda + +info: + name: > + WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.3.2 - Unauthenticated Arbitrary Shortcode Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3da58a5-3b07-4c53-ae20-35b3d7750023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-4f95fbf5d542e431aaee4d569011a0a0.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-4f95fbf5d542e431aaee4d569011a0a0.yaml new file mode 100644 index 0000000000..555b4a2c2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-4f95fbf5d542e431aaee4d569011a0a0.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-4f95fbf5d542e431aaee4d569011a0a0 + +info: + name: > + WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09bc815e-cf79-4d94-a934-366c251be551?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-6028fbb33888953a639d7f4fdb105b84.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-6028fbb33888953a639d7f4fdb105b84.yaml new file mode 100644 index 0000000000..2e5b799bef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-6028fbb33888953a639d7f4fdb105b84.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-6028fbb33888953a639d7f4fdb105b84 + +info: + name: > + MDTF – Meta Data and Taxonomies Filter <= 1.3.0.1 - Relected Cross-Site Scripting via 'tax_name' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6edb6604-9da8-421e-933b-bac02b179bd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-74e2cca43a241e929e4d02ce42179766.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-74e2cca43a241e929e4d02ce42179766.yaml new file mode 100644 index 0000000000..458b1ca2b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-74e2cca43a241e929e4d02ce42179766.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-74e2cca43a241e929e4d02ce42179766 + +info: + name: > + WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/325298a6-954b-4cf7-a96a-9571cdb0b5a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-a210c90325ac6434534abb97976ad7c8.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-a210c90325ac6434534abb97976ad7c8.yaml new file mode 100644 index 0000000000..165b59c8fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-a210c90325ac6434534abb97976ad7c8.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-a210c90325ac6434534abb97976ad7c8 + +info: + name: > + WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.3 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1f482d3-d2f6-4161-8bcf-3d43d5ac10ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-cd3ec729b30fa6c24f2c8dc5202be75f.yaml b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-cd3ec729b30fa6c24f2c8dc5202be75f.yaml new file mode 100644 index 0000000000..bf308ab071 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-data-filter-and-taxonomy-filter-cd3ec729b30fa6c24f2c8dc5202be75f.yaml @@ -0,0 +1,58 @@ +id: wp-meta-data-filter-and-taxonomy-filter-cd3ec729b30fa6c24f2c8dc5202be75f + +info: + name: > + WordPress Meta Data and Taxonomies Filter (MDTF) <= 1.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c33b51bb-d368-4056-97f2-03543c4e9f8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-data-filter-and-taxonomy-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-051ffefc51104be6bb17d2b5cf41b941.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-051ffefc51104be6bb17d2b5cf41b941.yaml new file mode 100644 index 0000000000..57ba3b7da7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-051ffefc51104be6bb17d2b5cf41b941.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-051ffefc51104be6bb17d2b5cf41b941 + +info: + name: > + WP Meta SEO <= 4.5.3 - Missing Authorization in 'checkAllCategoryInSitemap' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f589e21-7417-4b43-b580-4f1d3c2041f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-2e08f88f4d646fb37132bf634ea9d86a.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-2e08f88f4d646fb37132bf634ea9d86a.yaml new file mode 100644 index 0000000000..5734f8a0ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-2e08f88f4d646fb37132bf634ea9d86a.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-2e08f88f4d646fb37132bf634ea9d86a + +info: + name: > + WP Meta SEO <= 4.4.6 - Admin+ Stored Cross-Site Scripting via breadcrumbs + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bce8b43a-a69e-44d1-adab-98253e86cb33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-2f2d8b93ad701e19ec6f3207f936eef8.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-2f2d8b93ad701e19ec6f3207f936eef8.yaml new file mode 100644 index 0000000000..a4a5166693 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-2f2d8b93ad701e19ec6f3207f936eef8.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-2f2d8b93ad701e19ec6f3207f936eef8 + +info: + name: > + WP Meta SEO <= 4.5.3 - Missing Authorization in 'regenerateSitemaps' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a3f835e-0aa9-4581-9150-fe5041e0f293?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-48db89bfccb085b8a9e9bacdc76c0af1.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-48db89bfccb085b8a9e9bacdc76c0af1.yaml new file mode 100644 index 0000000000..b92555f6d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-48db89bfccb085b8a9e9bacdc76c0af1.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-48db89bfccb085b8a9e9bacdc76c0af1 + +info: + name: > + WP Meta SEO <= 4.5.3 - Missing Authorization in 'wpmsGGSaveInformation' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/702f9d3b-5d33-4215-ac76-9aae3162d775?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-8315a66d2bff25e165368a9ba5b2cd91.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-8315a66d2bff25e165368a9ba5b2cd91.yaml new file mode 100644 index 0000000000..5ee646a9c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-8315a66d2bff25e165368a9ba5b2cd91.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-8315a66d2bff25e165368a9ba5b2cd91 + +info: + name: > + WP Meta SEO <= 4.5.2 - Missing Authorization in 'startProcess' to Arbitrary Redirect via 'update_link_redirect' task + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29c47391-5d37-4f49-8806-1f378a6306d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-853440dc6a0bac372d49c0a52406c979.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-853440dc6a0bac372d49c0a52406c979.yaml new file mode 100644 index 0000000000..7252a93936 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-853440dc6a0bac372d49c0a52406c979.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-853440dc6a0bac372d49c0a52406c979 + +info: + name: > + WP Meta SEO <= 4.4.8 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69c7b0e4-89bf-480c-8e89-b1514d2bfefe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-8f211e542f6f3ea8f0872b9525089564.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-8f211e542f6f3ea8f0872b9525089564.yaml new file mode 100644 index 0000000000..cee944788b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-8f211e542f6f3ea8f0872b9525089564.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-8f211e542f6f3ea8f0872b9525089564 + +info: + name: > + WP Meta SEO <= 4.5.2 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2c83287-13ca-4fdc-95b6-97da150b0c09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-9ba2b29c37ba8aee356eadac5eafa36d.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-9ba2b29c37ba8aee356eadac5eafa36d.yaml new file mode 100644 index 0000000000..cba481ad18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-9ba2b29c37ba8aee356eadac5eafa36d.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-9ba2b29c37ba8aee356eadac5eafa36d + +info: + name: > + WP Meta SEO <= 4.5.4 - Authenticated (Author+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f07d76e-1973-4ea7-b448-666466cd688f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-a77598a8619865ebfa5a440835fd61e6.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-a77598a8619865ebfa5a440835fd61e6.yaml new file mode 100644 index 0000000000..0542301271 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-a77598a8619865ebfa5a440835fd61e6.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-a77598a8619865ebfa5a440835fd61e6 + +info: + name: > + WP Meta SEO <= 4.5.3 - Missing Authorization in 'saveSitemapSettings' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d1e498a-ddcb-4c67-bf0d-bb45b6fe0e9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-b140b905bbbe2df2a34bd620d01bfe72.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-b140b905bbbe2df2a34bd620d01bfe72.yaml new file mode 100644 index 0000000000..c2c2fb8dcd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-b140b905bbbe2df2a34bd620d01bfe72.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-b140b905bbbe2df2a34bd620d01bfe72 + +info: + name: > + WP Meta SEO <= 4.5.3 - Cross-Site Request Forgery via 'setIgnore' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b978749-7ea5-45f4-9f69-66a19c0e39ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-b8cc5900239df821d12d0c9f9351444a.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-b8cc5900239df821d12d0c9f9351444a.yaml new file mode 100644 index 0000000000..05cdecdd6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-b8cc5900239df821d12d0c9f9351444a.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-b8cc5900239df821d12d0c9f9351444a + +info: + name: > + WP Meta SEO <= 4.5.12 - Information Exposure via Meta Description + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0323b54b-c15b-4d2d-9e8f-3df87c84dd49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-c8739a5f40e6869f84a528bbf32f369f.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-c8739a5f40e6869f84a528bbf32f369f.yaml new file mode 100644 index 0000000000..7d4686077d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-c8739a5f40e6869f84a528bbf32f369f.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-c8739a5f40e6869f84a528bbf32f369f + +info: + name: > + WP Meta SEO <= 4.5.3 - Cross-Site Request Forgery via 'regenerateSitemaps' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/764aec73-f291-4372-9dde-812ffaf025ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-c9a67836be647194b958b42b1afed33a.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-c9a67836be647194b958b42b1afed33a.yaml new file mode 100644 index 0000000000..5caf7ac4c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-c9a67836be647194b958b42b1afed33a.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-c9a67836be647194b958b42b1afed33a + +info: + name: > + WP Meta SEO <= 4.5.12 - Unauthenticated Stored Cross-Site Scripting via Referer header + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca91e41d-b728-4eb0-86d5-043813d8c2c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meta-seo-eb91f445c10e82b7c3e98be1062a0e24.yaml b/nuclei-templates/cve-less/plugins/wp-meta-seo-eb91f445c10e82b7c3e98be1062a0e24.yaml new file mode 100644 index 0000000000..9a35c986d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meta-seo-eb91f445c10e82b7c3e98be1062a0e24.yaml @@ -0,0 +1,58 @@ +id: wp-meta-seo-eb91f445c10e82b7c3e98be1062a0e24 + +info: + name: > + WP Meta SEO <= 4.5.3 - Missing Authorization in 'listPostsCategory' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/978d5715-7993-4f89-8d69-895467633bfb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meta-seo/" + google-query: inurl:"/wp-content/plugins/wp-meta-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meta-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meta-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meta-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meteor-a24478d45a578be442865b8c295c465f.yaml b/nuclei-templates/cve-less/plugins/wp-meteor-a24478d45a578be442865b8c295c465f.yaml new file mode 100644 index 0000000000..265a9aa572 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meteor-a24478d45a578be442865b8c295c465f.yaml @@ -0,0 +1,58 @@ +id: wp-meteor-a24478d45a578be442865b8c295c465f + +info: + name: > + WP Meteor Page Speed Optimization Topping <= 3.1.4 - Cross-Site Request Forgery via processAjaxNoticeDismiss + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d246a99-fd92-4132-9576-efa065a58f59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meteor/" + google-query: inurl:"/wp-content/plugins/wp-meteor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meteor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meteor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meteor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-meteor-e8d8c624f6e6d23d2dff82c9385b3265.yaml b/nuclei-templates/cve-less/plugins/wp-meteor-e8d8c624f6e6d23d2dff82c9385b3265.yaml new file mode 100644 index 0000000000..72798fafac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-meteor-e8d8c624f6e6d23d2dff82c9385b3265.yaml @@ -0,0 +1,58 @@ +id: wp-meteor-e8d8c624f6e6d23d2dff82c9385b3265 + +info: + name: > + WP Meteor Page Speed Optimization Topping <= 3.1.4 -Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b335807-f4d1-43b3-9e1b-2215eb00a3f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-meteor/" + google-query: inurl:"/wp-content/plugins/wp-meteor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-meteor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-meteor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-meteor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-microblogs-a4cab622005282169cece09a74ca7822.yaml b/nuclei-templates/cve-less/plugins/wp-microblogs-a4cab622005282169cece09a74ca7822.yaml new file mode 100644 index 0000000000..debdbd5153 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-microblogs-a4cab622005282169cece09a74ca7822.yaml @@ -0,0 +1,58 @@ +id: wp-microblogs-a4cab622005282169cece09a74ca7822 + +info: + name: > + WP Microblogs <= 0.4.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b84f9b-2b01-4e25-907d-4be735594d07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-microblogs/" + google-query: inurl:"/wp-content/plugins/wp-microblogs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-microblogs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-microblogs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-microblogs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-migrate-db-pro-94e62ec82b514bdceccaf12bf9504a39.yaml b/nuclei-templates/cve-less/plugins/wp-migrate-db-pro-94e62ec82b514bdceccaf12bf9504a39.yaml new file mode 100644 index 0000000000..c9742ef203 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-migrate-db-pro-94e62ec82b514bdceccaf12bf9504a39.yaml @@ -0,0 +1,58 @@ +id: wp-migrate-db-pro-94e62ec82b514bdceccaf12bf9504a39 + +info: + name: > + WP Migrate Pro <= 2.6.10 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b69f90a-1dd3-4184-aee3-9b0251b981cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-migrate-db-pro/" + google-query: inurl:"/wp-content/plugins/wp-migrate-db-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-migrate-db-pro,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-migrate-db-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-migrate-db-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-migration-duplicator-0db6e70cdcdc7229b4099d9f0f9133ae.yaml b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-0db6e70cdcdc7229b4099d9f0f9133ae.yaml new file mode 100644 index 0000000000..893cedb2cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-0db6e70cdcdc7229b4099d9f0f9133ae.yaml @@ -0,0 +1,58 @@ +id: wp-migration-duplicator-0db6e70cdcdc7229b4099d9f0f9133ae + +info: + name: > + WordPress Backup & Migration <= 1.4.7 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40570bb7-1638-4305-876e-86ad4c336944?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-migration-duplicator/" + google-query: inurl:"/wp-content/plugins/wp-migration-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-migration-duplicator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-migration-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-migration-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-migration-duplicator-4b9b30de695a6c7d318c6f418b6450d0.yaml b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-4b9b30de695a6c7d318c6f418b6450d0.yaml new file mode 100644 index 0000000000..63ee311905 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-4b9b30de695a6c7d318c6f418b6450d0.yaml @@ -0,0 +1,58 @@ +id: wp-migration-duplicator-4b9b30de695a6c7d318c6f418b6450d0 + +info: + name: > + WordPress Backup & Migration <= 1.4.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93de1604-2494-4c51-a93d-b01bf7ed4c07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-migration-duplicator/" + google-query: inurl:"/wp-content/plugins/wp-migration-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-migration-duplicator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-migration-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-migration-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-migration-duplicator-766e921c63902196b3dd14a962737125.yaml b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-766e921c63902196b3dd14a962737125.yaml new file mode 100644 index 0000000000..2dfbeee06f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-766e921c63902196b3dd14a962737125.yaml @@ -0,0 +1,58 @@ +id: wp-migration-duplicator-766e921c63902196b3dd14a962737125 + +info: + name: > + WordPress Backup & Migration <= 1.4.8 - Missing Authorization to Directory Traversal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/339c4eba-fa34-4db6-be4b-bcf0ba98121a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-migration-duplicator/" + google-query: inurl:"/wp-content/plugins/wp-migration-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-migration-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-migration-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-migration-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-migration-duplicator-9cffec44ea772b6c67672a3ffd4bf0f4.yaml b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-9cffec44ea772b6c67672a3ffd4bf0f4.yaml new file mode 100644 index 0000000000..8896337184 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-9cffec44ea772b6c67672a3ffd4bf0f4.yaml @@ -0,0 +1,58 @@ +id: wp-migration-duplicator-9cffec44ea772b6c67672a3ffd4bf0f4 + +info: + name: > + WordPress Backup & Migration <= 1.4.3 - Missing Authorization to Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7de132d5-51c9-464c-b687-8e367dd8d846?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-migration-duplicator/" + google-query: inurl:"/wp-content/plugins/wp-migration-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-migration-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-migration-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-migration-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-migration-duplicator-beccbd5d983b56da7098c3b6df8c3b57.yaml b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-beccbd5d983b56da7098c3b6df8c3b57.yaml new file mode 100644 index 0000000000..8082430ba3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-beccbd5d983b56da7098c3b6df8c3b57.yaml @@ -0,0 +1,58 @@ +id: wp-migration-duplicator-beccbd5d983b56da7098c3b6df8c3b57 + +info: + name: > + WordPress Backup & Migration <= 1.4.0 - Missing Authorization via wt_delete_schedule + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce978334-42e1-4334-a2d1-c3966339e4fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-migration-duplicator/" + google-query: inurl:"/wp-content/plugins/wp-migration-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-migration-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-migration-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-migration-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-migration-duplicator-f9b95c5df8218e5c27a0db54debfd7c6.yaml b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-f9b95c5df8218e5c27a0db54debfd7c6.yaml new file mode 100644 index 0000000000..8d6fba9f43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-migration-duplicator-f9b95c5df8218e5c27a0db54debfd7c6.yaml @@ -0,0 +1,58 @@ +id: wp-migration-duplicator-f9b95c5df8218e5c27a0db54debfd7c6 + +info: + name: > + WordPress Backup & Migration <= 1.4.1 - Missing Authorization to Settings and Schedule Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adfc5084-ed33-4600-bd34-d3516f1a1b96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-migration-duplicator/" + google-query: inurl:"/wp-content/plugins/wp-migration-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-migration-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-migration-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-migration-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-miniaudioplayer-4c9bbb5092eaa29d7b825a0537618beb.yaml b/nuclei-templates/cve-less/plugins/wp-miniaudioplayer-4c9bbb5092eaa29d7b825a0537618beb.yaml new file mode 100644 index 0000000000..1f63bf97c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-miniaudioplayer-4c9bbb5092eaa29d7b825a0537618beb.yaml @@ -0,0 +1,58 @@ +id: wp-miniaudioplayer-4c9bbb5092eaa29d7b825a0537618beb + +info: + name: > + mb.mb.miniAudioPlayer < 1.4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/979bb48d-6dbf-4bb2-90f3-573797ff23f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-miniaudioplayer/" + google-query: inurl:"/wp-content/plugins/wp-miniaudioplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-miniaudioplayer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-miniaudioplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-miniaudioplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-miniaudioplayer-c27c7bc4ca057439f5c832171e19b8eb.yaml b/nuclei-templates/cve-less/plugins/wp-miniaudioplayer-c27c7bc4ca057439f5c832171e19b8eb.yaml new file mode 100644 index 0000000000..1e5f0168b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-miniaudioplayer-c27c7bc4ca057439f5c832171e19b8eb.yaml @@ -0,0 +1,58 @@ +id: wp-miniaudioplayer-c27c7bc4ca057439f5c832171e19b8eb + +info: + name: > + mb.miniAudioPlayer <= 1.7.6 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/381708ae-3180-4058-a6f4-e925bfc658ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-miniaudioplayer/" + google-query: inurl:"/wp-content/plugins/wp-miniaudioplayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-miniaudioplayer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-miniaudioplayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-miniaudioplayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mlm-1d57464ff64efe2d03c6cb93be9a6afe.yaml b/nuclei-templates/cve-less/plugins/wp-mlm-1d57464ff64efe2d03c6cb93be9a6afe.yaml new file mode 100644 index 0000000000..4334d8c3f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mlm-1d57464ff64efe2d03c6cb93be9a6afe.yaml @@ -0,0 +1,58 @@ +id: wp-mlm-1d57464ff64efe2d03c6cb93be9a6afe + +info: + name: > + WP MLM Unilevel <= 4.0 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abcc1ed6-1871-4e8c-9469-c44dbfca5a17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mlm/" + google-query: inurl:"/wp-content/plugins/wp-mlm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mlm,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mlm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mlm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mlm-7ab1b8001b5218efd4de7d54884624ea.yaml b/nuclei-templates/cve-less/plugins/wp-mlm-7ab1b8001b5218efd4de7d54884624ea.yaml new file mode 100644 index 0000000000..17eece0fef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mlm-7ab1b8001b5218efd4de7d54884624ea.yaml @@ -0,0 +1,58 @@ +id: wp-mlm-7ab1b8001b5218efd4de7d54884624ea + +info: + name: > + WP MLM <= 4.0 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3451ed9-9a9a-443f-b1ce-dcd07bd3e6ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mlm/" + google-query: inurl:"/wp-content/plugins/wp-mlm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mlm,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mlm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mlm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mobile-bankid-integration-85ff2c77617a0afcf489782fd73dc851.yaml b/nuclei-templates/cve-less/plugins/wp-mobile-bankid-integration-85ff2c77617a0afcf489782fd73dc851.yaml new file mode 100644 index 0000000000..61a0cb1779 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mobile-bankid-integration-85ff2c77617a0afcf489782fd73dc851.yaml @@ -0,0 +1,58 @@ +id: wp-mobile-bankid-integration-85ff2c77617a0afcf489782fd73dc851 + +info: + name: > + WP-Mobile-BankID-Integration <= 1.0.0 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4712b12f-097b-4106-b2ba-e4c6cb7c32c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/WP-Mobile-BankID-Integration/" + google-query: inurl:"/wp-content/plugins/WP-Mobile-BankID-Integration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,WP-Mobile-BankID-Integration,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/WP-Mobile-BankID-Integration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "WP-Mobile-BankID-Integration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mobile-detector-b8f1b94a4c4fb9902f110573ce1ff5a4.yaml b/nuclei-templates/cve-less/plugins/wp-mobile-detector-b8f1b94a4c4fb9902f110573ce1ff5a4.yaml new file mode 100644 index 0000000000..c11c06d0e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mobile-detector-b8f1b94a4c4fb9902f110573ce1ff5a4.yaml @@ -0,0 +1,58 @@ +id: wp-mobile-detector-b8f1b94a4c4fb9902f110573ce1ff5a4 + +info: + name: > + WP Mobile Detector <= 3.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a5d5dbd-36f0-4886-adf8-045ec9c2e306?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mobile-detector/" + google-query: inurl:"/wp-content/plugins/wp-mobile-detector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mobile-detector,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mobile-detector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mobile-detector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mobile-detector-f753e4eb4ef42bb2c3d71aa325c61612.yaml b/nuclei-templates/cve-less/plugins/wp-mobile-detector-f753e4eb4ef42bb2c3d71aa325c61612.yaml new file mode 100644 index 0000000000..62104bfc29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mobile-detector-f753e4eb4ef42bb2c3d71aa325c61612.yaml @@ -0,0 +1,58 @@ +id: wp-mobile-detector-f753e4eb4ef42bb2c3d71aa325c61612 + +info: + name: > + WP Mobile Detector <= 3.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2f16704-6c96-4ff1-b1b1-75c4f16df039?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mobile-detector/" + google-query: inurl:"/wp-content/plugins/wp-mobile-detector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mobile-detector,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mobile-detector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mobile-detector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mon-18d17e555e96ada9756147d2b8dcb4f4.yaml b/nuclei-templates/cve-less/plugins/wp-mon-18d17e555e96ada9756147d2b8dcb4f4.yaml new file mode 100644 index 0000000000..8fa2adc2e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mon-18d17e555e96ada9756147d2b8dcb4f4.yaml @@ -0,0 +1,58 @@ +id: wp-mon-18d17e555e96ada9756147d2b8dcb4f4 + +info: + name: > + WP-Mon <= 0.5.1 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfe10de1-1c1f-437b-8851-7024fce753be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mon/" + google-query: inurl:"/wp-content/plugins/wp-mon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-monalisa-4a1f8595afbd88494aea9ace0d288d1b.yaml b/nuclei-templates/cve-less/plugins/wp-monalisa-4a1f8595afbd88494aea9ace0d288d1b.yaml new file mode 100644 index 0000000000..885601235d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-monalisa-4a1f8595afbd88494aea9ace0d288d1b.yaml @@ -0,0 +1,58 @@ +id: wp-monalisa-4a1f8595afbd88494aea9ace0d288d1b + +info: + name: > + wp-Monalisa <= 6.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6619b370-dd2a-4945-a776-1fecf407119e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-monalisa/" + google-query: inurl:"/wp-content/plugins/wp-monalisa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-monalisa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-monalisa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-monalisa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mpdf-587a081cbf30acea89ba24ccbad04bdd.yaml b/nuclei-templates/cve-less/plugins/wp-mpdf-587a081cbf30acea89ba24ccbad04bdd.yaml new file mode 100644 index 0000000000..d6a5e9a957 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mpdf-587a081cbf30acea89ba24ccbad04bdd.yaml @@ -0,0 +1,58 @@ +id: wp-mpdf-587a081cbf30acea89ba24ccbad04bdd + +info: + name: > + wp-mpdf <= 3.5.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c47386ee-25c8-4a77-92e8-5a82afc9c826?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mpdf/" + google-query: inurl:"/wp-content/plugins/wp-mpdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mpdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mpdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mpdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mpdf-d805f3809c5645b75249ec0ee72ac4c8.yaml b/nuclei-templates/cve-less/plugins/wp-mpdf-d805f3809c5645b75249ec0ee72ac4c8.yaml new file mode 100644 index 0000000000..dc60db84d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mpdf-d805f3809c5645b75249ec0ee72ac4c8.yaml @@ -0,0 +1,58 @@ +id: wp-mpdf-d805f3809c5645b75249ec0ee72ac4c8 + +info: + name: > + wp-mpdf <= 3.7.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc26fef6-58e8-441c-ae72-19a3822903a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mpdf/" + google-query: inurl:"/wp-content/plugins/wp-mpdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mpdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mpdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mpdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-mui-mass-user-input-5efd2ce0ed5c8f6b3ada49f2773bc973.yaml b/nuclei-templates/cve-less/plugins/wp-mui-mass-user-input-5efd2ce0ed5c8f6b3ada49f2773bc973.yaml new file mode 100644 index 0000000000..fed6d87a3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-mui-mass-user-input-5efd2ce0ed5c8f6b3ada49f2773bc973.yaml @@ -0,0 +1,58 @@ +id: wp-mui-mass-user-input-5efd2ce0ed5c8f6b3ada49f2773bc973 + +info: + name: > + WP-MUI – Mass User Input – Add and Export WP Users Quickly <= 1.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2e36b11-db93-4bac-a9bd-16d2e22efe4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-mui-mass-user-input/" + google-query: inurl:"/wp-content/plugins/wp-mui-mass-user-input/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-mui-mass-user-input,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-mui-mass-user-input/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-mui-mass-user-input" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-multi-store-locator-f8b65cf3e0a27eff31bc4c61ee628d1e.yaml b/nuclei-templates/cve-less/plugins/wp-multi-store-locator-f8b65cf3e0a27eff31bc4c61ee628d1e.yaml new file mode 100644 index 0000000000..ba4a965b62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-multi-store-locator-f8b65cf3e0a27eff31bc4c61ee628d1e.yaml @@ -0,0 +1,58 @@ +id: wp-multi-store-locator-f8b65cf3e0a27eff31bc4c61ee628d1e + +info: + name: > + WP Multi Store Locator <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9da31ff-4173-4aee-a3a6-8eebaa0d71ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-multi-store-locator/" + google-query: inurl:"/wp-content/plugins/wp-multi-store-locator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-multi-store-locator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-multi-store-locator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-multi-store-locator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-600f23cea45d49c9fbecd578c78ad87f.yaml b/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-600f23cea45d49c9fbecd578c78ad87f.yaml new file mode 100644 index 0000000000..6ebf6d2521 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-600f23cea45d49c9fbecd578c78ad87f.yaml @@ -0,0 +1,58 @@ +id: wp-multisite-content-copier-600f23cea45d49c9fbecd578c78ad87f + +info: + name: > + WordPress Multisite Content Copier/Updater <= 1.4.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/426021d3-e302-4c2a-8d5c-f2a2fc20e45b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-multisite-content-copier/" + google-query: inurl:"/wp-content/plugins/wp-multisite-content-copier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-multisite-content-copier,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-multisite-content-copier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-multisite-content-copier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-f964c84de99e9a1b22168e1a03305b04.yaml b/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-f964c84de99e9a1b22168e1a03305b04.yaml new file mode 100644 index 0000000000..42cbbe6581 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-f964c84de99e9a1b22168e1a03305b04.yaml @@ -0,0 +1,58 @@ +id: wp-multisite-content-copier-f964c84de99e9a1b22168e1a03305b04 + +info: + name: > + Multisite Content Copier/Updater <= 1.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4953b95-e013-482c-bcc7-1a95f8941624?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-multisite-content-copier/" + google-query: inurl:"/wp-content/plugins/wp-multisite-content-copier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-multisite-content-copier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-multisite-content-copier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-multisite-content-copier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-pro-b01e4229acbf8d04a3ea8a3add02fd51.yaml b/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-pro-b01e4229acbf8d04a3ea8a3add02fd51.yaml new file mode 100644 index 0000000000..24e367d66b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-multisite-content-copier-pro-b01e4229acbf8d04a3ea8a3add02fd51.yaml @@ -0,0 +1,58 @@ +id: wp-multisite-content-copier-pro-b01e4229acbf8d04a3ea8a3add02fd51 + +info: + name: > + Multisite Content Copier/Updater Pro < 2.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e152d9f-4fb9-41b9-baa4-b1bebac89641?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-multisite-content-copier-pro/" + google-query: inurl:"/wp-content/plugins/wp-multisite-content-copier-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-multisite-content-copier-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-multisite-content-copier-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-multisite-content-copier-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-munich-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-munich-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..94a05004ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-munich-blocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-munich-blocks-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-munich-blocks/" + google-query: inurl:"/wp-content/plugins/wp-munich-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-munich-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-munich-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-munich-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-munich-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-munich-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..9643248cb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-munich-blocks-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-munich-blocks-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-munich-blocks/" + google-query: inurl:"/wp-content/plugins/wp-munich-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-munich-blocks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-munich-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-munich-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-my-admin-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-my-admin-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..378d5672af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-my-admin-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-my-admin-bar-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-my-admin-bar/" + google-query: inurl:"/wp-content/plugins/wp-my-admin-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-my-admin-bar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-my-admin-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-my-admin-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-nested-pages-1f2c3201ce6430a901ea9b9ce7fb0cee.yaml b/nuclei-templates/cve-less/plugins/wp-nested-pages-1f2c3201ce6430a901ea9b9ce7fb0cee.yaml new file mode 100644 index 0000000000..2a64abe713 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-nested-pages-1f2c3201ce6430a901ea9b9ce7fb0cee.yaml @@ -0,0 +1,58 @@ +id: wp-nested-pages-1f2c3201ce6430a901ea9b9ce7fb0cee + +info: + name: > + Nested Pages <= 3.0.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a76571a-f820-4902-afa9-287b59a11d14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-nested-pages/" + google-query: inurl:"/wp-content/plugins/wp-nested-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-nested-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-nested-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-nested-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-nested-pages-2628ec35fd0d634f503face1acac9f3d.yaml b/nuclei-templates/cve-less/plugins/wp-nested-pages-2628ec35fd0d634f503face1acac9f3d.yaml new file mode 100644 index 0000000000..9941280cb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-nested-pages-2628ec35fd0d634f503face1acac9f3d.yaml @@ -0,0 +1,58 @@ +id: wp-nested-pages-2628ec35fd0d634f503face1acac9f3d + +info: + name: > + Nested Pages <= 3.1.20 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dcc6225-b47a-4184-a2f3-1292e5abe1bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-nested-pages/" + google-query: inurl:"/wp-content/plugins/wp-nested-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-nested-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-nested-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-nested-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-nested-pages-45c1e4dae128391ea2cc462d89ea9873.yaml b/nuclei-templates/cve-less/plugins/wp-nested-pages-45c1e4dae128391ea2cc462d89ea9873.yaml new file mode 100644 index 0000000000..75e4c9dcf3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-nested-pages-45c1e4dae128391ea2cc462d89ea9873.yaml @@ -0,0 +1,58 @@ +id: wp-nested-pages-45c1e4dae128391ea2cc462d89ea9873 + +info: + name: > + Nested Pages <= 3.1.15 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40a08542-5e2e-4689-b26f-99a1350185cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-nested-pages/" + google-query: inurl:"/wp-content/plugins/wp-nested-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-nested-pages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-nested-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-nested-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-nested-pages-a1585fbfbb722da035628da67638c64a.yaml b/nuclei-templates/cve-less/plugins/wp-nested-pages-a1585fbfbb722da035628da67638c64a.yaml new file mode 100644 index 0000000000..b5591cdc95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-nested-pages-a1585fbfbb722da035628da67638c64a.yaml @@ -0,0 +1,58 @@ +id: wp-nested-pages-a1585fbfbb722da035628da67638c64a + +info: + name: > + Nested Pages <= 3.2.3 - Missing Authorization to Authenticated (Editor+) Plugin Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c3e61e9-3610-41b5-9820-28012dc657fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-nested-pages/" + google-query: inurl:"/wp-content/plugins/wp-nested-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-nested-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-nested-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-nested-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-nested-pages-a5430dc528533c2edeaccbfbb9028a8f.yaml b/nuclei-templates/cve-less/plugins/wp-nested-pages-a5430dc528533c2edeaccbfbb9028a8f.yaml new file mode 100644 index 0000000000..3f9c84f51d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-nested-pages-a5430dc528533c2edeaccbfbb9028a8f.yaml @@ -0,0 +1,58 @@ +id: wp-nested-pages-a5430dc528533c2edeaccbfbb9028a8f + +info: + name: > + Nested Pages <= 3.2.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec9029a3-be05-469a-a8e2-20987a4a4ad9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-nested-pages/" + google-query: inurl:"/wp-content/plugins/wp-nested-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-nested-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-nested-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-nested-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-nested-pages-fa85581f8faec8e54a152a5a0efaf823.yaml b/nuclei-templates/cve-less/plugins/wp-nested-pages-fa85581f8faec8e54a152a5a0efaf823.yaml new file mode 100644 index 0000000000..8013e58f6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-nested-pages-fa85581f8faec8e54a152a5a0efaf823.yaml @@ -0,0 +1,58 @@ +id: wp-nested-pages-fa85581f8faec8e54a152a5a0efaf823 + +info: + name: > + Nested Pages <= 3.1.15 - Cross-Site Request Forgery to Arbitrary Post Deletion and Modification + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecbbe9f0-bf6c-4153-9843-8ae7713adef9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-nested-pages/" + google-query: inurl:"/wp-content/plugins/wp-nested-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-nested-pages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-nested-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-nested-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-news-magazine-444a6d6c5748b1105adf9f2574afc368.yaml b/nuclei-templates/cve-less/plugins/wp-news-magazine-444a6d6c5748b1105adf9f2574afc368.yaml new file mode 100644 index 0000000000..bd8ba11692 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-news-magazine-444a6d6c5748b1105adf9f2574afc368.yaml @@ -0,0 +1,58 @@ +id: wp-news-magazine-444a6d6c5748b1105adf9f2574afc368 + +info: + name: > + WP News <= 1.1.9 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f53e9354-248f-4d13-a1c0-8355b268fae2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-news-magazine/" + google-query: inurl:"/wp-content/plugins/wp-news-magazine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-news-magazine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-news-magazine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-news-magazine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-noexternallinks-e8487dc3f356aea666909141340ca69c.yaml b/nuclei-templates/cve-less/plugins/wp-noexternallinks-e8487dc3f356aea666909141340ca69c.yaml new file mode 100644 index 0000000000..3814f8c30d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-noexternallinks-e8487dc3f356aea666909141340ca69c.yaml @@ -0,0 +1,58 @@ +id: wp-noexternallinks-e8487dc3f356aea666909141340ca69c + +info: + name: > + WP No External Links < 3.5.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b4568dc-afcd-4172-b39a-0d06dfa2f87a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-noexternallinks/" + google-query: inurl:"/wp-content/plugins/wp-noexternallinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-noexternallinks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-noexternallinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-noexternallinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-noexternallinks-e9f11c328847b06004cf712b0d79f902.yaml b/nuclei-templates/cve-less/plugins/wp-noexternallinks-e9f11c328847b06004cf712b0d79f902.yaml new file mode 100644 index 0000000000..e28caa2737 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-noexternallinks-e9f11c328847b06004cf712b0d79f902.yaml @@ -0,0 +1,58 @@ +id: wp-noexternallinks-e9f11c328847b06004cf712b0d79f902 + +info: + name: > + WP No External Links < 3.5.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc91cae0-6d54-43f3-8c0e-d1f972573d13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-noexternallinks/" + google-query: inurl:"/wp-content/plugins/wp-noexternallinks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-noexternallinks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-noexternallinks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-noexternallinks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-not-login-hide-wpnlh-e4874305a11ba506fee5f820a68e7e63.yaml b/nuclei-templates/cve-less/plugins/wp-not-login-hide-wpnlh-e4874305a11ba506fee5f820a68e7e63.yaml new file mode 100644 index 0000000000..da0195313c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-not-login-hide-wpnlh-e4874305a11ba506fee5f820a68e7e63.yaml @@ -0,0 +1,58 @@ +id: wp-not-login-hide-wpnlh-e4874305a11ba506fee5f820a68e7e63 + +info: + name: > + WP Not Login Hide <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fc46de4-af1c-4e38-9caa-55b7b18a69ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-not-login-hide-wpnlh/" + google-query: inurl:"/wp-content/plugins/wp-not-login-hide-wpnlh/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-not-login-hide-wpnlh,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-not-login-hide-wpnlh/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-not-login-hide-wpnlh" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-notification-bell-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-notification-bell-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..39610f0a36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-notification-bell-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-notification-bell-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-notification-bell/" + google-query: inurl:"/wp-content/plugins/wp-notification-bell/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-notification-bell,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-notification-bell/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-notification-bell" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-oer-3eb3affb644d24e715bf8fc2c2551c12.yaml b/nuclei-templates/cve-less/plugins/wp-oer-3eb3affb644d24e715bf8fc2c2551c12.yaml new file mode 100644 index 0000000000..d692b91060 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-oer-3eb3affb644d24e715bf8fc2c2551c12.yaml @@ -0,0 +1,58 @@ +id: wp-oer-3eb3affb644d24e715bf8fc2c2551c12 + +info: + name: > + WP OER <= 0.9.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af4058cd-79bc-433c-96e1-fb0aad12969c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-oer/" + google-query: inurl:"/wp-content/plugins/wp-oer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-oer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-oer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-oer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-offers-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-offers-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..23a4848ca9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-offers-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-offers-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-offers/" + google-query: inurl:"/wp-content/plugins/wp-offers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-offers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-offers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-offers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-olivecart-57987a7ef285cce42daf7bbeebe78cfc.yaml b/nuclei-templates/cve-less/plugins/wp-olivecart-57987a7ef285cce42daf7bbeebe78cfc.yaml new file mode 100644 index 0000000000..1a5db192e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-olivecart-57987a7ef285cce42daf7bbeebe78cfc.yaml @@ -0,0 +1,58 @@ +id: wp-olivecart-57987a7ef285cce42daf7bbeebe78cfc + +info: + name: > + WP-OliveCart <= 1.1.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5a124b3-257b-4331-ac8f-eecd7a759127?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-olivecart/" + google-query: inurl:"/wp-content/plugins/wp-olivecart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-olivecart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-olivecart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-olivecart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-open-street-map-a2b96140a75a31f47368cade76c6e421.yaml b/nuclei-templates/cve-less/plugins/wp-open-street-map-a2b96140a75a31f47368cade76c6e421.yaml new file mode 100644 index 0000000000..1f20cc1f4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-open-street-map-a2b96140a75a31f47368cade76c6e421.yaml @@ -0,0 +1,58 @@ +id: wp-open-street-map-a2b96140a75a31f47368cade76c6e421 + +info: + name: > + WP Open Street Map <= 1.25 - Cross-Site Request Forgery via wp_openstreetmaps + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa0fd9d-6c9f-4110-92a0-064fa4b9b589?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-open-street-map/" + google-query: inurl:"/wp-content/plugins/wp-open-street-map/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-open-street-map,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-open-street-map/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-open-street-map" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-opening-hours-59655d2ccadb8aa0cfd1aeca8138f97d.yaml b/nuclei-templates/cve-less/plugins/wp-opening-hours-59655d2ccadb8aa0cfd1aeca8138f97d.yaml new file mode 100644 index 0000000000..190ba1e266 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-opening-hours-59655d2ccadb8aa0cfd1aeca8138f97d.yaml @@ -0,0 +1,58 @@ +id: wp-opening-hours-59655d2ccadb8aa0cfd1aeca8138f97d + +info: + name: > + Opening Hours <= 2.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb9bce29-9842-4d8a-ac9b-24432a28851c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-opening-hours/" + google-query: inurl:"/wp-content/plugins/wp-opening-hours/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-opening-hours,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-opening-hours/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-opening-hours" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-opening-hours-acd8ba84e60cbc0f092ddfff82c451e8.yaml b/nuclei-templates/cve-less/plugins/wp-opening-hours-acd8ba84e60cbc0f092ddfff82c451e8.yaml new file mode 100644 index 0000000000..e58ada237f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-opening-hours-acd8ba84e60cbc0f092ddfff82c451e8.yaml @@ -0,0 +1,58 @@ +id: wp-opening-hours-acd8ba84e60cbc0f092ddfff82c451e8 + +info: + name: > + Opening Hours <= 2.3.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfc59e3d-13c6-4051-8a1a-d109ea06b10b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-opening-hours/" + google-query: inurl:"/wp-content/plugins/wp-opening-hours/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-opening-hours,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-opening-hours/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-opening-hours" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-opt-in-1045ae974bdd8bcaee8ec5d4a243aff7.yaml b/nuclei-templates/cve-less/plugins/wp-opt-in-1045ae974bdd8bcaee8ec5d4a243aff7.yaml new file mode 100644 index 0000000000..200972680b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-opt-in-1045ae974bdd8bcaee8ec5d4a243aff7.yaml @@ -0,0 +1,58 @@ +id: wp-opt-in-1045ae974bdd8bcaee8ec5d4a243aff7 + +info: + name: > + WP Opt-in <= 1.4.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eac9d9b5-6812-4fe2-9427-500d4bb2ea09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-opt-in/" + google-query: inurl:"/wp-content/plugins/wp-opt-in/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-opt-in,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-opt-in/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-opt-in" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-optimize-4393e503b4c5e360e86d4cf75de99b91.yaml b/nuclei-templates/cve-less/plugins/wp-optimize-4393e503b4c5e360e86d4cf75de99b91.yaml new file mode 100644 index 0000000000..fdc191327f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-optimize-4393e503b4c5e360e86d4cf75de99b91.yaml @@ -0,0 +1,58 @@ +id: wp-optimize-4393e503b4c5e360e86d4cf75de99b91 + +info: + name: > + WP-Optimize <= 3.2.12 & SrbTransLatin <= 2.4 - Stored/Reflected Cross-Site Scripting via Third Party Library + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdb822e8-583e-4437-a735-b116aa8886e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-optimize/" + google-query: inurl:"/wp-content/plugins/wp-optimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-optimize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-optimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-optimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-optimize-e272d49a412192b851a22b514c20a44d.yaml b/nuclei-templates/cve-less/plugins/wp-optimize-e272d49a412192b851a22b514c20a44d.yaml new file mode 100644 index 0000000000..5f24e0675d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-optimize-e272d49a412192b851a22b514c20a44d.yaml @@ -0,0 +1,58 @@ +id: wp-optimize-e272d49a412192b851a22b514c20a44d + +info: + name: > + WP-Optimize <= 3.2.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3190f9f-8b2f-4251-8804-f386e2c5678f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-optimize/" + google-query: inurl:"/wp-content/plugins/wp-optimize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-optimize,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-optimize/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-optimize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-optin-wheel-411b8509491892139820c81fdaf43572.yaml b/nuclei-templates/cve-less/plugins/wp-optin-wheel-411b8509491892139820c81fdaf43572.yaml new file mode 100644 index 0000000000..4b696302bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-optin-wheel-411b8509491892139820c81fdaf43572.yaml @@ -0,0 +1,58 @@ +id: wp-optin-wheel-411b8509491892139820c81fdaf43572 + +info: + name: > + WP Optin Wheel <= 1.4.2 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a83ade5-5e53-4d53-ada0-43d487e5e23f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-optin-wheel/" + google-query: inurl:"/wp-content/plugins/wp-optin-wheel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-optin-wheel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-optin-wheel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-optin-wheel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-original-media-path-40022e8f0d8dd6d5dda3b842e2bc95ed.yaml b/nuclei-templates/cve-less/plugins/wp-original-media-path-40022e8f0d8dd6d5dda3b842e2bc95ed.yaml new file mode 100644 index 0000000000..0370ae60fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-original-media-path-40022e8f0d8dd6d5dda3b842e2bc95ed.yaml @@ -0,0 +1,58 @@ +id: wp-original-media-path-40022e8f0d8dd6d5dda3b842e2bc95ed + +info: + name: > + WP Original Media Path <= 2.4.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/277eb517-c949-41e9-becf-af056fd32f35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-original-media-path/" + google-query: inurl:"/wp-content/plugins/wp-original-media-path/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-original-media-path,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-original-media-path/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-original-media-path" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-page-duplicator-73f67eef9808ee2307cc661b7742b37f.yaml b/nuclei-templates/cve-less/plugins/wp-page-duplicator-73f67eef9808ee2307cc661b7742b37f.yaml new file mode 100644 index 0000000000..5970a4cb2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-page-duplicator-73f67eef9808ee2307cc661b7742b37f.yaml @@ -0,0 +1,58 @@ +id: wp-page-duplicator-73f67eef9808ee2307cc661b7742b37f + +info: + name: > + Page Duplicator <= 0.1.1 - Missing Authorization to Unauthenticated Post/Page Duplication + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcc10e91-4810-4a0d-919c-de3e87137f76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-page-duplicator/" + google-query: inurl:"/wp-content/plugins/wp-page-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-page-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-page-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-page-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-page-numbers-ff4872dcc815f541fc27c739fcf1dea7.yaml b/nuclei-templates/cve-less/plugins/wp-page-numbers-ff4872dcc815f541fc27c739fcf1dea7.yaml new file mode 100644 index 0000000000..533dee81d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-page-numbers-ff4872dcc815f541fc27c739fcf1dea7.yaml @@ -0,0 +1,58 @@ +id: wp-page-numbers-ff4872dcc815f541fc27c739fcf1dea7 + +info: + name: > + WP Page Numbers <= 0.5 - Cross-Site Request Forgery via wp_page_numbers_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44a2e2f3-1902-43c5-8e3c-4174cb1ffa63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-page-numbers/" + google-query: inurl:"/wp-content/plugins/wp-page-numbers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-page-numbers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-page-numbers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-page-numbers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-page-post-widget-clone-f6874af8a1671c63716fd288efc17414.yaml b/nuclei-templates/cve-less/plugins/wp-page-post-widget-clone-f6874af8a1671c63716fd288efc17414.yaml new file mode 100644 index 0000000000..a94d1bb619 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-page-post-widget-clone-f6874af8a1671c63716fd288efc17414.yaml @@ -0,0 +1,58 @@ +id: wp-page-post-widget-clone-f6874af8a1671c63716fd288efc17414 + +info: + name: > + WP Page Post Widget Clone <= 1.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7006aa50-8fcf-46ad-921b-b47cbdb7d9e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-page-post-widget-clone/" + google-query: inurl:"/wp-content/plugins/wp-page-post-widget-clone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-page-post-widget-clone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-page-post-widget-clone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-page-post-widget-clone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-page-widget-55f93685840531332a73837cca77e23f.yaml b/nuclei-templates/cve-less/plugins/wp-page-widget-55f93685840531332a73837cca77e23f.yaml new file mode 100644 index 0000000000..d444701a21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-page-widget-55f93685840531332a73837cca77e23f.yaml @@ -0,0 +1,58 @@ +id: wp-page-widget-55f93685840531332a73837cca77e23f + +info: + name: > + WP Page Widget <= 2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3acc1464-18cf-4085-8cb4-946563d70b16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-page-widget/" + google-query: inurl:"/wp-content/plugins/wp-page-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-page-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-page-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-page-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-page-widget-62e712c4c51e2629997a1a286dd08453.yaml b/nuclei-templates/cve-less/plugins/wp-page-widget-62e712c4c51e2629997a1a286dd08453.yaml new file mode 100644 index 0000000000..0edad320bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-page-widget-62e712c4c51e2629997a1a286dd08453.yaml @@ -0,0 +1,58 @@ +id: wp-page-widget-62e712c4c51e2629997a1a286dd08453 + +info: + name: > + WP Page Widget <= 3.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e6654b6-90ae-4a5e-bff3-82848813872a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-page-widget/" + google-query: inurl:"/wp-content/plugins/wp-page-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-page-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-page-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-page-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pagebuilder-1b7c0478a7036329e96c3ed903574a31.yaml b/nuclei-templates/cve-less/plugins/wp-pagebuilder-1b7c0478a7036329e96c3ed903574a31.yaml new file mode 100644 index 0000000000..8bf11afa9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pagebuilder-1b7c0478a7036329e96c3ed903574a31.yaml @@ -0,0 +1,58 @@ +id: wp-pagebuilder-1b7c0478a7036329e96c3ed903574a31 + +info: + name: > + WP Page Builder <= 1.2.3 - Multiple Stored Cross-Site scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0383bc6-919d-4858-a5b7-abe8a4a6c684?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pagebuilder/" + google-query: inurl:"/wp-content/plugins/wp-pagebuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pagebuilder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pagebuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pagebuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pagebuilder-3e7f60a3df49d0f7fb4057d158598ecf.yaml b/nuclei-templates/cve-less/plugins/wp-pagebuilder-3e7f60a3df49d0f7fb4057d158598ecf.yaml new file mode 100644 index 0000000000..546596ec1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pagebuilder-3e7f60a3df49d0f7fb4057d158598ecf.yaml @@ -0,0 +1,58 @@ +id: wp-pagebuilder-3e7f60a3df49d0f7fb4057d158598ecf + +info: + name: > + WP Page Builder <= 1.2.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecf1ce11-58cd-459c-ab9e-6ac40535fabd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pagebuilder/" + google-query: inurl:"/wp-content/plugins/wp-pagebuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pagebuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pagebuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pagebuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pagebuilder-a43b3bc12796ff1c85d44370263684f7.yaml b/nuclei-templates/cve-less/plugins/wp-pagebuilder-a43b3bc12796ff1c85d44370263684f7.yaml new file mode 100644 index 0000000000..1e52282b0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pagebuilder-a43b3bc12796ff1c85d44370263684f7.yaml @@ -0,0 +1,58 @@ +id: wp-pagebuilder-a43b3bc12796ff1c85d44370263684f7 + +info: + name: > + WP Page Builder <= 1.2.3 - Insecure Default to Unauthorized Page Editing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3ec9b11-e689-4796-8b05-59ab05a98184?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pagebuilder/" + google-query: inurl:"/wp-content/plugins/wp-pagebuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pagebuilder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pagebuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pagebuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pagebuilder-dcd836cebf0e20586e7baffdfe54c10c.yaml b/nuclei-templates/cve-less/plugins/wp-pagebuilder-dcd836cebf0e20586e7baffdfe54c10c.yaml new file mode 100644 index 0000000000..e5a9a576ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pagebuilder-dcd836cebf0e20586e7baffdfe54c10c.yaml @@ -0,0 +1,58 @@ +id: wp-pagebuilder-dcd836cebf0e20586e7baffdfe54c10c + +info: + name: > + WP Page Builder <= 1.2.6 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7b40a67-40b2-4f9b-9f31-0afaeaebbeab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pagebuilder/" + google-query: inurl:"/wp-content/plugins/wp-pagebuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pagebuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pagebuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pagebuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-paginate-2cf1a19662092e1fd3d184af328e1b57.yaml b/nuclei-templates/cve-less/plugins/wp-paginate-2cf1a19662092e1fd3d184af328e1b57.yaml new file mode 100644 index 0000000000..c73c8ddab8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-paginate-2cf1a19662092e1fd3d184af328e1b57.yaml @@ -0,0 +1,58 @@ +id: wp-paginate-2cf1a19662092e1fd3d184af328e1b57 + +info: + name: > + WP-Paginate <= 2.1.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6d45e18-7aa0-4f73-bf07-069870b467f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-paginate/" + google-query: inurl:"/wp-content/plugins/wp-paginate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-paginate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-paginate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-paginate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-paginate-ac056be778ddfca7dda3b1e72c3f8315.yaml b/nuclei-templates/cve-less/plugins/wp-paginate-ac056be778ddfca7dda3b1e72c3f8315.yaml new file mode 100644 index 0000000000..df953ab4fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-paginate-ac056be778ddfca7dda3b1e72c3f8315.yaml @@ -0,0 +1,58 @@ +id: wp-paginate-ac056be778ddfca7dda3b1e72c3f8315 + +info: + name: > + WP Paginate <= 2.1.3 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b3786d2-b1b5-4d96-9ef7-957909061186?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-paginate/" + google-query: inurl:"/wp-content/plugins/wp-paginate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-paginate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-paginate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-paginate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-parsidate-2692648b62c683c1169af33c43d304ff.yaml b/nuclei-templates/cve-less/plugins/wp-parsidate-2692648b62c683c1169af33c43d304ff.yaml new file mode 100644 index 0000000000..819e1766d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-parsidate-2692648b62c683c1169af33c43d304ff.yaml @@ -0,0 +1,58 @@ +id: wp-parsidate-2692648b62c683c1169af33c43d304ff + +info: + name: > + Parsi Date <= 4.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4955368-85bc-4a9c-8d3a-446e09955f6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-parsidate/" + google-query: inurl:"/wp-content/plugins/wp-parsidate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-parsidate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-parsidate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-parsidate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-payeezy-pay-d4e69b9467d19a12ce87ff85410a8c01.yaml b/nuclei-templates/cve-less/plugins/wp-payeezy-pay-d4e69b9467d19a12ce87ff85410a8c01.yaml new file mode 100644 index 0000000000..3bd6557d2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-payeezy-pay-d4e69b9467d19a12ce87ff85410a8c01.yaml @@ -0,0 +1,58 @@ +id: wp-payeezy-pay-d4e69b9467d19a12ce87ff85410a8c01 + +info: + name: > + WP Payeezy Pay < 2.98 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6a4872e-0f62-44b1-b77e-0817b065980f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-payeezy-pay/" + google-query: inurl:"/wp-content/plugins/wp-payeezy-pay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-payeezy-pay,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-payeezy-pay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-payeezy-pay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-payment-form-899cd60c14dae78cdc6100d2ac624744.yaml b/nuclei-templates/cve-less/plugins/wp-payment-form-899cd60c14dae78cdc6100d2ac624744.yaml new file mode 100644 index 0000000000..c3969f19ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-payment-form-899cd60c14dae78cdc6100d2ac624744.yaml @@ -0,0 +1,58 @@ +id: wp-payment-form-899cd60c14dae78cdc6100d2ac624744 + +info: + name: > + Simple Payment Donations <= 4.2.0 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a453a38f-0ef5-446b-886f-c208c1baa648?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-payment-form/" + google-query: inurl:"/wp-content/plugins/wp-payment-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-payment-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-payment-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-payment-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-payment-form-b1068b6e2a026b74220f30a25a306c1a.yaml b/nuclei-templates/cve-less/plugins/wp-payment-form-b1068b6e2a026b74220f30a25a306c1a.yaml new file mode 100644 index 0000000000..42d2964d5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-payment-form-b1068b6e2a026b74220f30a25a306c1a.yaml @@ -0,0 +1,58 @@ +id: wp-payment-form-b1068b6e2a026b74220f30a25a306c1a + +info: + name: > + Simple Payment Donations <= 4.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cffe745d-2fe2-4959-9641-9a0ae33bff4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-payment-form/" + google-query: inurl:"/wp-content/plugins/wp-payment-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-payment-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-payment-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-payment-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-paypal-f591ec3fd6349f415ea113a1e0a8f96c.yaml b/nuclei-templates/cve-less/plugins/wp-paypal-f591ec3fd6349f415ea113a1e0a8f96c.yaml new file mode 100644 index 0000000000..f59d2b4375 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-paypal-f591ec3fd6349f415ea113a1e0a8f96c.yaml @@ -0,0 +1,58 @@ +id: wp-paypal-f591ec3fd6349f415ea113a1e0a8f96c + +info: + name: > + WP PayPal <= 1.2.3.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ac3b00e-26f2-471d-a682-6cb4939e819e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-paypal/" + google-query: inurl:"/wp-content/plugins/wp-paypal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-paypal,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-paypal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-paypal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-paytm-pay-0b2d1a45be009b6e70cf642e2a8cf8b0.yaml b/nuclei-templates/cve-less/plugins/wp-paytm-pay-0b2d1a45be009b6e70cf642e2a8cf8b0.yaml new file mode 100644 index 0000000000..0623483093 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-paytm-pay-0b2d1a45be009b6e70cf642e2a8cf8b0.yaml @@ -0,0 +1,58 @@ +id: wp-paytm-pay-0b2d1a45be009b6e70cf642e2a8cf8b0 + +info: + name: > + Paytm – Donation Plugin <= 1.3.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b88efc1b-dc2d-4fe2-ba2b-e29898ed1bc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-paytm-pay/" + google-query: inurl:"/wp-content/plugins/wp-paytm-pay/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-paytm-pay,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-paytm-pay/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-paytm-pay" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pdf-generator-c703a061b8844fae5d93d775fc4ecbe8.yaml b/nuclei-templates/cve-less/plugins/wp-pdf-generator-c703a061b8844fae5d93d775fc4ecbe8.yaml new file mode 100644 index 0000000000..d5c63bba29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pdf-generator-c703a061b8844fae5d93d775fc4ecbe8.yaml @@ -0,0 +1,58 @@ +id: wp-pdf-generator-c703a061b8844fae5d93d775fc4ecbe8 + +info: + name: > + WP PDF Generator <= 1.2.2 - Cross-Site Request Forgery to PDF Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28a4c868-a24d-4fd8-ae0e-d5c0bf3a7436?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pdf-generator/" + google-query: inurl:"/wp-content/plugins/wp-pdf-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pdf-generator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pdf-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pdf-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-people-1077c15755f408817e721c74b28ad3a7.yaml b/nuclei-templates/cve-less/plugins/wp-people-1077c15755f408817e721c74b28ad3a7.yaml new file mode 100644 index 0000000000..a8aa714986 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-people-1077c15755f408817e721c74b28ad3a7.yaml @@ -0,0 +1,58 @@ +id: wp-people-1077c15755f408817e721c74b28ad3a7 + +info: + name: > + WP People <= 3.4.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22a42dc3-0b9b-47c8-9236-5dc3b58149c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-people/" + google-query: inurl:"/wp-content/plugins/wp-people/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-people,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-people/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-people" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-performance-score-booster-b7c469773d7593a7dd075aebd86fb19a.yaml b/nuclei-templates/cve-less/plugins/wp-performance-score-booster-b7c469773d7593a7dd075aebd86fb19a.yaml new file mode 100644 index 0000000000..045c1d7099 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-performance-score-booster-b7c469773d7593a7dd075aebd86fb19a.yaml @@ -0,0 +1,58 @@ +id: wp-performance-score-booster-b7c469773d7593a7dd075aebd86fb19a + +info: + name: > + WP Performance Score Booster <= 2.0 - Settings Change via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d97af468-d345-4d19-a1b0-f42d890a34d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-performance-score-booster/" + google-query: inurl:"/wp-content/plugins/wp-performance-score-booster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-performance-score-booster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-performance-score-booster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-performance-score-booster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-persistent-login-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-persistent-login-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..86436cd472 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-persistent-login-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-persistent-login-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-persistent-login/" + google-query: inurl:"/wp-content/plugins/wp-persistent-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-persistent-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-persistent-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-persistent-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pexels-free-stock-photos-f9cd598e625ead7b114953b55ded2f31.yaml b/nuclei-templates/cve-less/plugins/wp-pexels-free-stock-photos-f9cd598e625ead7b114953b55ded2f31.yaml new file mode 100644 index 0000000000..e425e05cd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pexels-free-stock-photos-f9cd598e625ead7b114953b55ded2f31.yaml @@ -0,0 +1,58 @@ +id: wp-pexels-free-stock-photos-f9cd598e625ead7b114953b55ded2f31 + +info: + name: > + Pexels: Free Stock Photos <= 1.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/597660c5-8c99-40b1-8780-5a2ab9c07656?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pexels-free-stock-photos/" + google-query: inurl:"/wp-content/plugins/wp-pexels-free-stock-photos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pexels-free-stock-photos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pexels-free-stock-photos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pexels-free-stock-photos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-1738a4677acfcf43b6595c38e083bc1c.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-1738a4677acfcf43b6595c38e083bc1c.yaml new file mode 100644 index 0000000000..23e050acdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-1738a4677acfcf43b6595c38e083bc1c.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-1738a4677acfcf43b6595c38e083bc1c + +info: + name: > + WP Photo Album Plus <= 8.5.02.005 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/017fe804-a1a5-4f8d-a531-e928d668dbc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.02.005') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-1a15d3860222a3fd81a5cd2f0cd29cc3.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-1a15d3860222a3fd81a5cd2f0cd29cc3.yaml new file mode 100644 index 0000000000..48fb6b3d8d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-1a15d3860222a3fd81a5cd2f0cd29cc3.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-1a15d3860222a3fd81a5cd2f0cd29cc3 + +info: + name: > + WP Photo Album Plus <= 8.5.02.005 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72f3925d-6b3a-43bf-bfd1-fef7e71d5e43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.02.005') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-20a2e4a6290983370284d76170f55741.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-20a2e4a6290983370284d76170f55741.yaml new file mode 100644 index 0000000000..b66fa8915a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-20a2e4a6290983370284d76170f55741.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-20a2e4a6290983370284d76170f55741 + +info: + name: > + WP Photo Album Plus <= 8.6.03.004 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80f7e161-b071-4cb1-8080-ff0ad926a5ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6.03.004') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-669581ec1a30e7b96468876d795acc3e.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-669581ec1a30e7b96468876d795acc3e.yaml new file mode 100644 index 0000000000..3e37964d31 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-669581ec1a30e7b96468876d795acc3e.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-669581ec1a30e7b96468876d795acc3e + +info: + name: > + WP Photo Album Plus <= 5.4.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d5a7f60-0850-4322-a7d8-8e5c144efe51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-6e313c2d32fa44151bb5398004b93815.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-6e313c2d32fa44151bb5398004b93815.yaml new file mode 100644 index 0000000000..ac09a0dfcf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-6e313c2d32fa44151bb5398004b93815.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-6e313c2d32fa44151bb5398004b93815 + +info: + name: > + WP Photo Album Plus <= 8.5.02.005 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5486d50c-8544-4368-b58b-66024a8ae86d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.5.02.005') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-8ca87aad5255d876a5c1cfa42d199cb3.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-8ca87aad5255d876a5c1cfa42d199cb3.yaml new file mode 100644 index 0000000000..0b6994b510 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-8ca87aad5255d876a5c1cfa42d199cb3.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-8ca87aad5255d876a5c1cfa42d199cb3 + +info: + name: > + WP Photo Album Plus <= 1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb102a58-2fc0-4441-8f51-a6109e323878?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-9cb518fd50dfbf2df48bad0ade9b992b.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-9cb518fd50dfbf2df48bad0ade9b992b.yaml new file mode 100644 index 0000000000..9b489fbae2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-9cb518fd50dfbf2df48bad0ade9b992b.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-9cb518fd50dfbf2df48bad0ade9b992b + +info: + name: > + WP Photo Album Plus < 6.1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97f6e03b-19ac-450b-9895-45f7d5328907?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-b3f583df01b20215cf8c32eded7781af.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-b3f583df01b20215cf8c32eded7781af.yaml new file mode 100644 index 0000000000..40c0de8882 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-b3f583df01b20215cf8c32eded7781af.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-b3f583df01b20215cf8c32eded7781af + +info: + name: > + WP Photo Album Plus < 5.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bd90ca2-85ae-42e3-b2a0-fae6ec28d6b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-b6b6c7434231029039b20df85b5959db.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-b6b6c7434231029039b20df85b5959db.yaml new file mode 100644 index 0000000000..0e275f48b2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-b6b6c7434231029039b20df85b5959db.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-b6b6c7434231029039b20df85b5959db + +info: + name: > + WP Photo Album Plus <= 5.4.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdbb60e5-4d67-4deb-94e0-788c1fb0e42f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-album-plus-e0955365088800798455704629f84855.yaml b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-e0955365088800798455704629f84855.yaml new file mode 100644 index 0000000000..3512de1bbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-album-plus-e0955365088800798455704629f84855.yaml @@ -0,0 +1,58 @@ +id: wp-photo-album-plus-e0955365088800798455704629f84855 + +info: + name: > + WP Photo Album Plus <= 8.0.10 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0c01e62-7a31-49de-851c-f52ce578bd95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-album-plus/" + google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-album-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-album-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-effects-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-photo-effects-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c2c82dfd2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-effects-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-photo-effects-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-effects/" + google-query: inurl:"/wp-content/plugins/wp-photo-effects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-effects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-effects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-effects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-effects-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-photo-effects-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..64b2ed4889 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-effects-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-photo-effects-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-effects/" + google-query: inurl:"/wp-content/plugins/wp-photo-effects/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-effects,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-effects/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-effects" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-photo-text-slider-50-6068fa535a8253f59a90a4115ac59459.yaml b/nuclei-templates/cve-less/plugins/wp-photo-text-slider-50-6068fa535a8253f59a90a4115ac59459.yaml new file mode 100644 index 0000000000..fc860df858 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-photo-text-slider-50-6068fa535a8253f59a90a4115ac59459.yaml @@ -0,0 +1,58 @@ +id: wp-photo-text-slider-50-6068fa535a8253f59a90a4115ac59459 + +info: + name: > + Wp photo text slider 50 <= 8.0 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/515502b5-c344-4855-aff1-57833233c5d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-photo-text-slider-50/" + google-query: inurl:"/wp-content/plugins/wp-photo-text-slider-50/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-photo-text-slider-50,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-photo-text-slider-50/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-photo-text-slider-50" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-php-widget-744495d3ff838bb26ab75ce1cff94317.yaml b/nuclei-templates/cve-less/plugins/wp-php-widget-744495d3ff838bb26ab75ce1cff94317.yaml new file mode 100644 index 0000000000..56fcbdd77f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-php-widget-744495d3ff838bb26ab75ce1cff94317.yaml @@ -0,0 +1,58 @@ +id: wp-php-widget-744495d3ff838bb26ab75ce1cff94317 + +info: + name: > + WP PHP Widget <= 1.0.2 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac402867-baa3-412c-b5de-c01e6a790ded?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-php-widget/" + google-query: inurl:"/wp-content/plugins/wp-php-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-php-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-php-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-php-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-phpmyadmin-extension-2dede50337ae844885c0bf328702828d.yaml b/nuclei-templates/cve-less/plugins/wp-phpmyadmin-extension-2dede50337ae844885c0bf328702828d.yaml new file mode 100644 index 0000000000..043d36ba79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-phpmyadmin-extension-2dede50337ae844885c0bf328702828d.yaml @@ -0,0 +1,58 @@ +id: wp-phpmyadmin-extension-2dede50337ae844885c0bf328702828d + +info: + name: > + WP phpMyAdmin <= 5.2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0234419b-9e39-4153-a3b7-bb913f2b6bcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-phpmyadmin-extension/" + google-query: inurl:"/wp-content/plugins/wp-phpmyadmin-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-phpmyadmin-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-phpmyadmin-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-phpmyadmin-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-phpmyadmin-extension-8d1c748e2defc5d91fbb1dd267386d44.yaml b/nuclei-templates/cve-less/plugins/wp-phpmyadmin-extension-8d1c748e2defc5d91fbb1dd267386d44.yaml new file mode 100644 index 0000000000..b6c81770f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-phpmyadmin-extension-8d1c748e2defc5d91fbb1dd267386d44.yaml @@ -0,0 +1,58 @@ +id: wp-phpmyadmin-extension-8d1c748e2defc5d91fbb1dd267386d44 + +info: + name: > + WP phpMyAdmin <= 5.2.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d056ad60-0102-490e-89a8-31fe6513645e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-phpmyadmin-extension/" + google-query: inurl:"/wp-content/plugins/wp-phpmyadmin-extension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-phpmyadmin-extension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-phpmyadmin-extension/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-phpmyadmin-extension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-picasa-image-453e6aa482844b66a1b60332d0011a80.yaml b/nuclei-templates/cve-less/plugins/wp-picasa-image-453e6aa482844b66a1b60332d0011a80.yaml new file mode 100644 index 0000000000..bd73421acf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-picasa-image-453e6aa482844b66a1b60332d0011a80.yaml @@ -0,0 +1,58 @@ +id: wp-picasa-image-453e6aa482844b66a1b60332d0011a80 + +info: + name: > + WP-Picasa-Image <= 1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60030ee9-ad5d-4d84-a019-1906b20ebbc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-picasa-image/" + google-query: inurl:"/wp-content/plugins/wp-picasa-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-picasa-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-picasa-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-picasa-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pinterest-automatic-9c4aad914c8baa77edd573a5d1dca1f4.yaml b/nuclei-templates/cve-less/plugins/wp-pinterest-automatic-9c4aad914c8baa77edd573a5d1dca1f4.yaml new file mode 100644 index 0000000000..d386e8632c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pinterest-automatic-9c4aad914c8baa77edd573a5d1dca1f4.yaml @@ -0,0 +1,58 @@ +id: wp-pinterest-automatic-9c4aad914c8baa77edd573a5d1dca1f4 + +info: + name: > + Pinterest Automatic <= 4.14.3 - Unuathenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4fdc902-4cfe-4116-a294-9a0fcb2de346?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pinterest-automatic/" + google-query: inurl:"/wp-content/plugins/wp-pinterest-automatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pinterest-automatic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pinterest-automatic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pinterest-automatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pipes-a48d0e7d0d0abab8208c9ac988b86701.yaml b/nuclei-templates/cve-less/plugins/wp-pipes-a48d0e7d0d0abab8208c9ac988b86701.yaml new file mode 100644 index 0000000000..c9e3afa090 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pipes-a48d0e7d0d0abab8208c9ac988b86701.yaml @@ -0,0 +1,58 @@ +id: wp-pipes-a48d0e7d0d0abab8208c9ac988b86701 + +info: + name: > + WP Pipes <= 1.33 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bca8b173-8e7c-41ad-9316-b38cc2ce0e66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pipes/" + google-query: inurl:"/wp-content/plugins/wp-pipes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pipes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pipes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pipes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pipes-d7894fe3e27e0eed0959b050f56097d8.yaml b/nuclei-templates/cve-less/plugins/wp-pipes-d7894fe3e27e0eed0959b050f56097d8.yaml new file mode 100644 index 0000000000..1d0ee145ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pipes-d7894fe3e27e0eed0959b050f56097d8.yaml @@ -0,0 +1,58 @@ +id: wp-pipes-d7894fe3e27e0eed0959b050f56097d8 + +info: + name: > + WP Pipes <= 1.4.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/094bf4e2-b774-4015-b6c6-c829c16556eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pipes/" + google-query: inurl:"/wp-content/plugins/wp-pipes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pipes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pipes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pipes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-piwik-011e9219619a7fcb5d0b0fb47e00200b.yaml b/nuclei-templates/cve-less/plugins/wp-piwik-011e9219619a7fcb5d0b0fb47e00200b.yaml new file mode 100644 index 0000000000..c0f5ab1aea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-piwik-011e9219619a7fcb5d0b0fb47e00200b.yaml @@ -0,0 +1,58 @@ +id: wp-piwik-011e9219619a7fcb5d0b0fb47e00200b + +info: + name: > + WP-Matomo Integration (WP-Piwik) <= 1.0.26 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abb10680-6208-44c8-8cf0-8d2531465a04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-piwik/" + google-query: inurl:"/wp-content/plugins/wp-piwik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-piwik,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-piwik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-piwik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-piwik-26274ac2ac485b632b4597df6467189e.yaml b/nuclei-templates/cve-less/plugins/wp-piwik-26274ac2ac485b632b4597df6467189e.yaml new file mode 100644 index 0000000000..78ced7892e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-piwik-26274ac2ac485b632b4597df6467189e.yaml @@ -0,0 +1,58 @@ +id: wp-piwik-26274ac2ac485b632b4597df6467189e + +info: + name: > + WP-Matomo Integration (WP-Piwik) < 1.0.11 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39564fad-a8cb-4a95-a893-d61e8ff91a53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-piwik/" + google-query: inurl:"/wp-content/plugins/wp-piwik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-piwik,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-piwik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-piwik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-piwik-2cdd87e3f80dc46e464c425f1498ee45.yaml b/nuclei-templates/cve-less/plugins/wp-piwik-2cdd87e3f80dc46e464c425f1498ee45.yaml new file mode 100644 index 0000000000..5553a0e76b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-piwik-2cdd87e3f80dc46e464c425f1498ee45.yaml @@ -0,0 +1,58 @@ +id: wp-piwik-2cdd87e3f80dc46e464c425f1498ee45 + +info: + name: > + WP-Piwik <= 1.0.27 - Authenticated (Administrator+) Stored Cross-Site Scripting via Plugin Display Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68a520bb-261a-43f0-993d-de208035afe5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-piwik/" + google-query: inurl:"/wp-content/plugins/wp-piwik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-piwik,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-piwik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-piwik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-piwik-59221c8c4cf4b83ed678f38b12740d87.yaml b/nuclei-templates/cve-less/plugins/wp-piwik-59221c8c4cf4b83ed678f38b12740d87.yaml new file mode 100644 index 0000000000..35e7de5cdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-piwik-59221c8c4cf4b83ed678f38b12740d87.yaml @@ -0,0 +1,58 @@ +id: wp-piwik-59221c8c4cf4b83ed678f38b12740d87 + +info: + name: > + WP-Matomo Integration (WP-Piwik) < 1.0.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c46cf202-320b-40a0-9de0-e4992f23395f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-piwik/" + google-query: inurl:"/wp-content/plugins/wp-piwik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-piwik,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-piwik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-piwik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-piwik-9872ae4cefad3c4ed3119e4c32d1b891.yaml b/nuclei-templates/cve-less/plugins/wp-piwik-9872ae4cefad3c4ed3119e4c32d1b891.yaml new file mode 100644 index 0000000000..c05d044997 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-piwik-9872ae4cefad3c4ed3119e4c32d1b891.yaml @@ -0,0 +1,58 @@ +id: wp-piwik-9872ae4cefad3c4ed3119e4c32d1b891 + +info: + name: > + WP-Matomo Integration (WP-Piwik) <= 1.0.28 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/faa4f041-4740-4ebb-afb3-10019ce571be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-piwik/" + google-query: inurl:"/wp-content/plugins/wp-piwik/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-piwik,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-piwik/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-piwik" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-planet-b888730346b1af7ed35cfb04de015b09.yaml b/nuclei-templates/cve-less/plugins/wp-planet-b888730346b1af7ed35cfb04de015b09.yaml new file mode 100644 index 0000000000..75b492421a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-planet-b888730346b1af7ed35cfb04de015b09.yaml @@ -0,0 +1,58 @@ +id: wp-planet-b888730346b1af7ed35cfb04de015b09 + +info: + name: > + WP-Planet <= 0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e520850-5cc7-40f8-9222-e7e50d21f347?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-planet/" + google-query: inurl:"/wp-content/plugins/wp-planet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-planet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-planet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-planet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-plotly-2304e691feb866a99a567fd410649f69.yaml b/nuclei-templates/cve-less/plugins/wp-plotly-2304e691feb866a99a567fd410649f69.yaml new file mode 100644 index 0000000000..df56b74183 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-plotly-2304e691feb866a99a567fd410649f69.yaml @@ -0,0 +1,58 @@ +id: wp-plotly-2304e691feb866a99a567fd410649f69 + +info: + name: > + Plotly <= 1.0.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ec7f51d-5d65-40ff-9fe5-0fa6d5225fba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-plotly/" + google-query: inurl:"/wp-content/plugins/wp-plotly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-plotly,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-plotly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-plotly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-plotly-9098123c91e037cb8b4722ce5e0246b6.yaml b/nuclei-templates/cve-less/plugins/wp-plotly-9098123c91e037cb8b4722ce5e0246b6.yaml new file mode 100644 index 0000000000..707db48977 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-plotly-9098123c91e037cb8b4722ce5e0246b6.yaml @@ -0,0 +1,58 @@ +id: wp-plotly-9098123c91e037cb8b4722ce5e0246b6 + +info: + name: > + Plotly < 1.0.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50cb130d-2e9c-429c-a56c-4546e705981a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-plotly/" + google-query: inurl:"/wp-content/plugins/wp-plotly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-plotly,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-plotly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-plotly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-plugin-info-card-25b6bae2090d69c4b65ae56919567a18.yaml b/nuclei-templates/cve-less/plugins/wp-plugin-info-card-25b6bae2090d69c4b65ae56919567a18.yaml new file mode 100644 index 0000000000..847e7d7167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-plugin-info-card-25b6bae2090d69c4b65ae56919567a18.yaml @@ -0,0 +1,58 @@ +id: wp-plugin-info-card-25b6bae2090d69c4b65ae56919567a18 + +info: + name: > + WP Plugin Info Card < 2.3.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/691c0f3b-b723-4310-b4df-ed3e1db9d548?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-plugin-info-card/" + google-query: inurl:"/wp-content/plugins/wp-plugin-info-card/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-plugin-info-card,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-plugin-info-card/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-plugin-info-card" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-plugin-lister-7ae4b63767ade919d8f9b4392d05e652.yaml b/nuclei-templates/cve-less/plugins/wp-plugin-lister-7ae4b63767ade919d8f9b4392d05e652.yaml new file mode 100644 index 0000000000..cfc061c222 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-plugin-lister-7ae4b63767ade919d8f9b4392d05e652.yaml @@ -0,0 +1,58 @@ +id: wp-plugin-lister-7ae4b63767ade919d8f9b4392d05e652 + +info: + name: > + WP Plugin Lister <= 2.1.0 - Cross-Site Request Forgery to Settings Update and Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b819e88-111a-4611-ae23-87ac7a878b4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-plugin-lister/" + google-query: inurl:"/wp-content/plugins/wp-plugin-lister/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-plugin-lister,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-plugin-lister/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-plugin-lister" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-plugin-manager-a447458eea9f44bc06114a67289afadc.yaml b/nuclei-templates/cve-less/plugins/wp-plugin-manager-a447458eea9f44bc06114a67289afadc.yaml new file mode 100644 index 0000000000..ac5b846351 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-plugin-manager-a447458eea9f44bc06114a67289afadc.yaml @@ -0,0 +1,58 @@ +id: wp-plugin-manager-a447458eea9f44bc06114a67289afadc + +info: + name: > + WP Plugin Manager <= 1.1.7 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/623decc5-bdb7-42c9-8531-8004ddc16682?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-plugin-manager/" + google-query: inurl:"/wp-content/plugins/wp-plugin-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-plugin-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-plugin-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-plugin-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pocket-urls-d20347ab3694d4969b9a9d128b6ebd42.yaml b/nuclei-templates/cve-less/plugins/wp-pocket-urls-d20347ab3694d4969b9a9d128b6ebd42.yaml new file mode 100644 index 0000000000..e779cf0cd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pocket-urls-d20347ab3694d4969b9a9d128b6ebd42.yaml @@ -0,0 +1,58 @@ +id: wp-pocket-urls-d20347ab3694d4969b9a9d128b6ebd42 + +info: + name: > + WP Pocket URLs <= 1.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a22873f-6f09-4183-92c5-a84e0d378920?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pocket-urls/" + google-query: inurl:"/wp-content/plugins/wp-pocket-urls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pocket-urls,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pocket-urls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pocket-urls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-politic-1981b0b53f874fc3ac5cfb1e486c1b8b.yaml b/nuclei-templates/cve-less/plugins/wp-politic-1981b0b53f874fc3ac5cfb1e486c1b8b.yaml new file mode 100644 index 0000000000..a59a9c7617 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-politic-1981b0b53f874fc3ac5cfb1e486c1b8b.yaml @@ -0,0 +1,58 @@ +id: wp-politic-1981b0b53f874fc3ac5cfb1e486c1b8b + +info: + name: > + HT Politic <= 2.3.7 - Cross-Site Request Forgery leading to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b127a47-d22f-47b5-92a8-440a5892a181?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-politic/" + google-query: inurl:"/wp-content/plugins/wp-politic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-politic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-politic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-politic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-poll-65871570265ff3cbf8c9f9629c5ab326.yaml b/nuclei-templates/cve-less/plugins/wp-poll-65871570265ff3cbf8c9f9629c5ab326.yaml new file mode 100644 index 0000000000..934f493964 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-poll-65871570265ff3cbf8c9f9629c5ab326.yaml @@ -0,0 +1,58 @@ +id: wp-poll-65871570265ff3cbf8c9f9629c5ab326 + +info: + name: > + LiquidPoll – Advanced Polls for Creators and Brands <= 3.3.68 - Missing Authorization via activate_addon + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa154536-9f9f-48c3-96c7-4091991e4f6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-poll/" + google-query: inurl:"/wp-content/plugins/wp-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-poll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-poll-b72d7e0205356324b67801ccf623ea08.yaml b/nuclei-templates/cve-less/plugins/wp-poll-b72d7e0205356324b67801ccf623ea08.yaml new file mode 100644 index 0000000000..b4e1dab58f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-poll-b72d7e0205356324b67801ccf623ea08.yaml @@ -0,0 +1,58 @@ +id: wp-poll-b72d7e0205356324b67801ccf623ea08 + +info: + name: > + LiquidPoll – Polls, Surveys, NPS and Feedback Reviews <= 3.3.76 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84f57623-b6a6-4717-857d-93fa9d279882?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-poll/" + google-query: inurl:"/wp-content/plugins/wp-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-poll,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-polls-228a265800d06a8158d2945ad50b57f5.yaml b/nuclei-templates/cve-less/plugins/wp-polls-228a265800d06a8158d2945ad50b57f5.yaml new file mode 100644 index 0000000000..e907958796 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-polls-228a265800d06a8158d2945ad50b57f5.yaml @@ -0,0 +1,58 @@ +id: wp-polls-228a265800d06a8158d2945ad50b57f5 + +info: + name: > + WP-Polls <= 2.71 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1cc604a-b3dc-4dc1-b20b-4021b5b7d426?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-polls/" + google-query: inurl:"/wp-content/plugins/wp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-polls,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.71') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-polls-72b547593d28ba78083c2d30dcb45b59.yaml b/nuclei-templates/cve-less/plugins/wp-polls-72b547593d28ba78083c2d30dcb45b59.yaml new file mode 100644 index 0000000000..c6955212ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-polls-72b547593d28ba78083c2d30dcb45b59.yaml @@ -0,0 +1,58 @@ +id: wp-polls-72b547593d28ba78083c2d30dcb45b59 + +info: + name: > + WP-Polls <= 2.73 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa105250-7d19-49c9-af20-6d5e033314e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-polls/" + google-query: inurl:"/wp-content/plugins/wp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-polls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.73') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-polls-a90ac74b16b2e57f70d959075904445d.yaml b/nuclei-templates/cve-less/plugins/wp-polls-a90ac74b16b2e57f70d959075904445d.yaml new file mode 100644 index 0000000000..a1c5fe2641 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-polls-a90ac74b16b2e57f70d959075904445d.yaml @@ -0,0 +1,58 @@ +id: wp-polls-a90ac74b16b2e57f70d959075904445d + +info: + name: > + WP-Polls <= 2.70 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e25f524e-360d-4c80-a0ab-90ee94825b1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-polls/" + google-query: inurl:"/wp-content/plugins/wp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-polls,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-polls-bc43778c342efbd129c6364212fbe04d.yaml b/nuclei-templates/cve-less/plugins/wp-polls-bc43778c342efbd129c6364212fbe04d.yaml new file mode 100644 index 0000000000..33fc874fb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-polls-bc43778c342efbd129c6364212fbe04d.yaml @@ -0,0 +1,58 @@ +id: wp-polls-bc43778c342efbd129c6364212fbe04d + +info: + name: > + WP-Polls <= 2.76.0 - Race Condition + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d19b433f-2245-4ba3-8f46-36a184c2454d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-polls/" + google-query: inurl:"/wp-content/plugins/wp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-polls,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.76.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-polls-d279c90e5e616e3125c9a657ba8ab939.yaml b/nuclei-templates/cve-less/plugins/wp-polls-d279c90e5e616e3125c9a657ba8ab939.yaml new file mode 100644 index 0000000000..2abad18398 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-polls-d279c90e5e616e3125c9a657ba8ab939.yaml @@ -0,0 +1,58 @@ +id: wp-polls-d279c90e5e616e3125c9a657ba8ab939 + +info: + name: > + WP-Polls <= 2.75.6 - IP Validation Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc53ad70-d630-4d4a-bcca-79732134e6a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-polls/" + google-query: inurl:"/wp-content/plugins/wp-polls/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-polls,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-polls/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-polls" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.75.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-popup-banners-10b51d35ae6aafbea477ae24a9c22ccc.yaml b/nuclei-templates/cve-less/plugins/wp-popup-banners-10b51d35ae6aafbea477ae24a9c22ccc.yaml new file mode 100644 index 0000000000..f70c629dc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-popup-banners-10b51d35ae6aafbea477ae24a9c22ccc.yaml @@ -0,0 +1,58 @@ +id: wp-popup-banners-10b51d35ae6aafbea477ae24a9c22ccc + +info: + name: > + WP Popup Banners <= 1.2.5 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8281cb20-73d3-4ab5-910e-d353b2a5cbd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popup-banners/" + google-query: inurl:"/wp-content/plugins/wp-popup-banners/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popup-banners,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popup-banners/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popup-banners" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-popup-banners-92d1ed4c27e6f1a39ae5c39770d54c23.yaml b/nuclei-templates/cve-less/plugins/wp-popup-banners-92d1ed4c27e6f1a39ae5c39770d54c23.yaml new file mode 100644 index 0000000000..3c94591ddf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-popup-banners-92d1ed4c27e6f1a39ae5c39770d54c23.yaml @@ -0,0 +1,58 @@ +id: wp-popup-banners-92d1ed4c27e6f1a39ae5c39770d54c23 + +info: + name: > + WP Popup Banners <= 1.2.5 - Authenticated (Subscriber+) SQL Injection via 'value' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa64d6b4-5673-4d88-b5c7-d3441eaa0706?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popup-banners/" + google-query: inurl:"/wp-content/plugins/wp-popup-banners/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popup-banners,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popup-banners/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popup-banners" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-popup-builder-aad2940a7ed6f57fa5fd0a2a1f283a4d.yaml b/nuclei-templates/cve-less/plugins/wp-popup-builder-aad2940a7ed6f57fa5fd0a2a1f283a4d.yaml new file mode 100644 index 0000000000..f99b12242a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-popup-builder-aad2940a7ed6f57fa5fd0a2a1f283a4d.yaml @@ -0,0 +1,58 @@ +id: wp-popup-builder-aad2940a7ed6f57fa5fd0a2a1f283a4d + +info: + name: > + WP Popup Builder <= 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbc14a5f-fa6b-47fa-8e8b-502409b18ed6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popup-builder/" + google-query: inurl:"/wp-content/plugins/wp-popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-popup-builder-c232fc614c70c66e672cbac2a32ca9cd.yaml b/nuclei-templates/cve-less/plugins/wp-popup-builder-c232fc614c70c66e672cbac2a32ca9cd.yaml new file mode 100644 index 0000000000..430617c244 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-popup-builder-c232fc614c70c66e672cbac2a32ca9cd.yaml @@ -0,0 +1,58 @@ +id: wp-popup-builder-c232fc614c70c66e672cbac2a32ca9cd + +info: + name: > + WP Popup Builder <= 1.2.9 - Missing Authorization and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f613411e-2b2e-401d-87cd-a002e9c2fc08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popup-builder/" + google-query: inurl:"/wp-content/plugins/wp-popup-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popup-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popup-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popup-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-popups-lite-2aa273895136d445a6cf0ea6a1d06c8e.yaml b/nuclei-templates/cve-less/plugins/wp-popups-lite-2aa273895136d445a6cf0ea6a1d06c8e.yaml new file mode 100644 index 0000000000..6d6538b5ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-popups-lite-2aa273895136d445a6cf0ea6a1d06c8e.yaml @@ -0,0 +1,58 @@ +id: wp-popups-lite-2aa273895136d445a6cf0ea6a1d06c8e + +info: + name: > + WP Popups <= 2.1.5.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8810d237-06d5-45a0-8402-a2e7e15418d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popups-lite/" + google-query: inurl:"/wp-content/plugins/wp-popups-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popups-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popups-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popups-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-popups-lite-3f71ab9bea10d44c97baaae5fd797060.yaml b/nuclei-templates/cve-less/plugins/wp-popups-lite-3f71ab9bea10d44c97baaae5fd797060.yaml new file mode 100644 index 0000000000..32b6d8ede8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-popups-lite-3f71ab9bea10d44c97baaae5fd797060.yaml @@ -0,0 +1,58 @@ +id: wp-popups-lite-3f71ab9bea10d44c97baaae5fd797060 + +info: + name: > + WP Popups <= 2.1.4.7 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa441e45-9c33-483e-8332-49ac4dc7eaa3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popups-lite/" + google-query: inurl:"/wp-content/plugins/wp-popups-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popups-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popups-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popups-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-popups-lite-44f42e89daa3749af5c9d461caa7bbaa.yaml b/nuclei-templates/cve-less/plugins/wp-popups-lite-44f42e89daa3749af5c9d461caa7bbaa.yaml new file mode 100644 index 0000000000..ade7357918 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-popups-lite-44f42e89daa3749af5c9d461caa7bbaa.yaml @@ -0,0 +1,58 @@ +id: wp-popups-lite-44f42e89daa3749af5c9d461caa7bbaa + +info: + name: > + WP Popups – WordPress Popup builder <= 2.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9747cda-735c-4087-8c4d-9c445c6d1596?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popups-lite/" + google-query: inurl:"/wp-content/plugins/wp-popups-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popups-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popups-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popups-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-popups-lite-690de1b98dd30a46cb8901aa5c2f16aa.yaml b/nuclei-templates/cve-less/plugins/wp-popups-lite-690de1b98dd30a46cb8901aa5c2f16aa.yaml new file mode 100644 index 0000000000..9d15a63ac9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-popups-lite-690de1b98dd30a46cb8901aa5c2f16aa.yaml @@ -0,0 +1,58 @@ +id: wp-popups-lite-690de1b98dd30a46cb8901aa5c2f16aa + +info: + name: > + WP Popups <= 2.1.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccb6275e-d933-428c-890c-dbfb95d5e4a1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popups-lite/" + google-query: inurl:"/wp-content/plugins/wp-popups-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popups-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popups-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popups-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-portfolio-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/wp-portfolio-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..c75efdf320 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-portfolio-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: wp-portfolio-gallery-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-portfolio-gallery/" + google-query: inurl:"/wp-content/plugins/wp-portfolio-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-portfolio-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-portfolio-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-portfolio-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-author-b3367042bf6f7f08c7f7fe623f66bded.yaml b/nuclei-templates/cve-less/plugins/wp-post-author-b3367042bf6f7f08c7f7fe623f66bded.yaml new file mode 100644 index 0000000000..c244edb1dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-author-b3367042bf6f7f08c7f7fe623f66bded.yaml @@ -0,0 +1,58 @@ +id: wp-post-author-b3367042bf6f7f08c7f7fe623f66bded + +info: + name: > + WP Post Author – Enhance Your Posts with the Author Bio, Co-Authors, Guest Authors, and Post Rating System, including User Registration Form Builder <= 3.6.4 - Missing Authorization to Rating Manipulation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a82a3b7-eb05-4f52-84b7-f1a97dddedf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-author/" + google-query: inurl:"/wp-content/plugins/wp-post-author/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-author,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-author/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-author" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-author-bdfab040be8b5ddc53b63b2720a5db99.yaml b/nuclei-templates/cve-less/plugins/wp-post-author-bdfab040be8b5ddc53b63b2720a5db99.yaml new file mode 100644 index 0000000000..532324691c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-author-bdfab040be8b5ddc53b63b2720a5db99.yaml @@ -0,0 +1,58 @@ +id: wp-post-author-bdfab040be8b5ddc53b63b2720a5db99 + +info: + name: > + WP Post Author <= 3.2.3 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/155e3de1-e115-4683-bb4d-a0c5667dc3d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-author/" + google-query: inurl:"/wp-content/plugins/wp-post-author/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-author,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-author/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-author" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-author-de2cc205752867abbe773a0b92ad0ea7.yaml b/nuclei-templates/cve-less/plugins/wp-post-author-de2cc205752867abbe773a0b92ad0ea7.yaml new file mode 100644 index 0000000000..7fe686a5c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-author-de2cc205752867abbe773a0b92ad0ea7.yaml @@ -0,0 +1,58 @@ +id: wp-post-author-de2cc205752867abbe773a0b92ad0ea7 + +info: + name: > + WP Post Author – Enhance Your Posts with the Author Bio, Co-Authors, Guest Authors, and Post Rating System, including User Registration Form Builder <= 3.6.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df681544-f64b-4590-a377-08b05693ff1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-author/" + google-query: inurl:"/wp-content/plugins/wp-post-author/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-author,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-author/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-author" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-post-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8544fcc4ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-block-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-post-block-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-block/" + google-query: inurl:"/wp-content/plugins/wp-post-block/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-block,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-block/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-block" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-columns-2e27bbe1226fc43e3aceee610de45550.yaml b/nuclei-templates/cve-less/plugins/wp-post-columns-2e27bbe1226fc43e3aceee610de45550.yaml new file mode 100644 index 0000000000..57de989737 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-columns-2e27bbe1226fc43e3aceee610de45550.yaml @@ -0,0 +1,58 @@ +id: wp-post-columns-2e27bbe1226fc43e3aceee610de45550 + +info: + name: > + WP Post Columns <= 2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d96e5986-8c89-4e7e-aa63-f41aa13eeff4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-columns/" + google-query: inurl:"/wp-content/plugins/wp-post-columns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-columns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-columns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-columns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-comment-rating-872e77979f08b8dfa6cf8411f0e84c8f.yaml b/nuclei-templates/cve-less/plugins/wp-post-comment-rating-872e77979f08b8dfa6cf8411f0e84c8f.yaml new file mode 100644 index 0000000000..3fbdda9cf5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-comment-rating-872e77979f08b8dfa6cf8411f0e84c8f.yaml @@ -0,0 +1,58 @@ +id: wp-post-comment-rating-872e77979f08b8dfa6cf8411f0e84c8f + +info: + name: > + WP Post Rating <= 2.4.6 - Missing Authorization to Vote Manipulation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/96ab5bb0-724c-434b-acc4-be8265b4838f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-comment-rating/" + google-query: inurl:"/wp-content/plugins/wp-post-comment-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-comment-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-comment-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-comment-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-disclaimer-1387aa003d8d347fdc448b66fea447f4.yaml b/nuclei-templates/cve-less/plugins/wp-post-disclaimer-1387aa003d8d347fdc448b66fea447f4.yaml new file mode 100644 index 0000000000..23af3940d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-disclaimer-1387aa003d8d347fdc448b66fea447f4.yaml @@ -0,0 +1,58 @@ +id: wp-post-disclaimer-1387aa003d8d347fdc448b66fea447f4 + +info: + name: > + WP Post Disclaimer <= 1.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb2829eb-3079-429e-ab0f-e23a2c32d616?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-disclaimer/" + google-query: inurl:"/wp-content/plugins/wp-post-disclaimer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-disclaimer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-disclaimer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-disclaimer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-frontend-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml b/nuclei-templates/cve-less/plugins/wp-post-frontend-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml new file mode 100644 index 0000000000..fd46f6caf0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-frontend-0cce3cf19b35c3ae0ac1e97020e9cf5e.yaml @@ -0,0 +1,58 @@ +id: wp-post-frontend-0cce3cf19b35c3ae0ac1e97020e9cf5e + +info: + name: > + Frontend File Manager < 4.0 & N-Media Post Front-end Form < 1.1 & - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1e6298-f243-49a5-b1b7-52bd6a6c8858?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-frontend/" + google-query: inurl:"/wp-content/plugins/wp-post-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-frontend,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-modal-8e3b2acb0664262c6a53a39a282fbea3.yaml b/nuclei-templates/cve-less/plugins/wp-post-modal-8e3b2acb0664262c6a53a39a282fbea3.yaml new file mode 100644 index 0000000000..57aa521702 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-modal-8e3b2acb0664262c6a53a39a282fbea3.yaml @@ -0,0 +1,58 @@ +id: wp-post-modal-8e3b2acb0664262c6a53a39a282fbea3 + +info: + name: > + WP Post Popup <= 3.7.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fe46da6-add5-42d4-a2db-7a8bada2968c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-modal/" + google-query: inurl:"/wp-content/plugins/wp-post-modal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-modal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-modal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-modal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-page-clone-2d87c0364307edea9fea6b2a2be6834f.yaml b/nuclei-templates/cve-less/plugins/wp-post-page-clone-2d87c0364307edea9fea6b2a2be6834f.yaml new file mode 100644 index 0000000000..2777613317 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-page-clone-2d87c0364307edea9fea6b2a2be6834f.yaml @@ -0,0 +1,58 @@ +id: wp-post-page-clone-2d87c0364307edea9fea6b2a2be6834f + +info: + name: > + Duplicate Page Plugins <= (Various Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76044985-477c-4d62-aec3-1905add0a9e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-page-clone/" + google-query: inurl:"/wp-content/plugins/wp-post-page-clone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-page-clone,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-page-clone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-page-clone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-page-clone-477f1ad4dc386cbc51b27ed2633fd23f.yaml b/nuclei-templates/cve-less/plugins/wp-post-page-clone-477f1ad4dc386cbc51b27ed2633fd23f.yaml new file mode 100644 index 0000000000..db0081168b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-page-clone-477f1ad4dc386cbc51b27ed2633fd23f.yaml @@ -0,0 +1,58 @@ +id: wp-post-page-clone-477f1ad4dc386cbc51b27ed2633fd23f + +info: + name: > + WP Post Page Clone <= 1.1 - Missing Authorization to Post Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c62b50a-f760-40c5-a408-27a6cfd44126?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-page-clone/" + google-query: inurl:"/wp-content/plugins/wp-post-page-clone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-page-clone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-page-clone/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-page-clone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-real-time-statistics-67f1d03c366ffc7cf370449f40680bad.yaml b/nuclei-templates/cve-less/plugins/wp-post-real-time-statistics-67f1d03c366ffc7cf370449f40680bad.yaml new file mode 100644 index 0000000000..207ffe0e67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-real-time-statistics-67f1d03c366ffc7cf370449f40680bad.yaml @@ -0,0 +1,58 @@ +id: wp-post-real-time-statistics-67f1d03c366ffc7cf370449f40680bad + +info: + name: > + WP Post Statistics (Visitors & Visits Counter) <= 2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/907329af-2ff0-475e-b4b2-3ac7ae4b9ced?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-real-time-statistics/" + google-query: inurl:"/wp-content/plugins/wp-post-real-time-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-real-time-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-real-time-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-real-time-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-styling-4746a61d808453b3b90542c6699809d7.yaml b/nuclei-templates/cve-less/plugins/wp-post-styling-4746a61d808453b3b90542c6699809d7.yaml new file mode 100644 index 0000000000..e74debb3de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-styling-4746a61d808453b3b90542c6699809d7.yaml @@ -0,0 +1,58 @@ +id: wp-post-styling-4746a61d808453b3b90542c6699809d7 + +info: + name: > + WP Post Styling <= 1.3.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c8529fc-9995-45c5-ad21-c960eb796fb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-styling/" + google-query: inurl:"/wp-content/plugins/wp-post-styling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-styling,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-styling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-styling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-post-to-pdf-e97d01552bb2ae8d753dbf0013cb0c0b.yaml b/nuclei-templates/cve-less/plugins/wp-post-to-pdf-e97d01552bb2ae8d753dbf0013cb0c0b.yaml new file mode 100644 index 0000000000..c26a1c7759 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-post-to-pdf-e97d01552bb2ae8d753dbf0013cb0c0b.yaml @@ -0,0 +1,58 @@ +id: wp-post-to-pdf-e97d01552bb2ae8d753dbf0013cb0c0b + +info: + name: > + WP Post to PDF <= 2.3.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f24743c-3894-40a8-9128-7d04bc2c8345?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-post-to-pdf/" + google-query: inurl:"/wp-content/plugins/wp-post-to-pdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-post-to-pdf,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-post-to-pdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-post-to-pdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-postratings-230dca5ad7a4f65f364511571d38f472.yaml b/nuclei-templates/cve-less/plugins/wp-postratings-230dca5ad7a4f65f364511571d38f472.yaml new file mode 100644 index 0000000000..1ae2457744 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-postratings-230dca5ad7a4f65f364511571d38f472.yaml @@ -0,0 +1,58 @@ +id: wp-postratings-230dca5ad7a4f65f364511571d38f472 + +info: + name: > + WP-PostRatings <= 1.86 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8d1c4ab-1207-4414-9351-3ef2a3cd131b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-postratings/" + google-query: inurl:"/wp-content/plugins/wp-postratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-postratings,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-postratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-postratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.86') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-postratings-421d9d9506623e25232b233cfeaf22ca.yaml b/nuclei-templates/cve-less/plugins/wp-postratings-421d9d9506623e25232b233cfeaf22ca.yaml new file mode 100644 index 0000000000..99c760cec1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-postratings-421d9d9506623e25232b233cfeaf22ca.yaml @@ -0,0 +1,58 @@ +id: wp-postratings-421d9d9506623e25232b233cfeaf22ca + +info: + name: > + WP-PostRatings <= 1.91 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aed9434-1681-47d6-bbc1-0815db548a24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-postratings/" + google-query: inurl:"/wp-content/plugins/wp-postratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-postratings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-postratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-postratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-postratings-8dec592932911140013173fa65adb3b3.yaml b/nuclei-templates/cve-less/plugins/wp-postratings-8dec592932911140013173fa65adb3b3.yaml new file mode 100644 index 0000000000..1d43f0384f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-postratings-8dec592932911140013173fa65adb3b3.yaml @@ -0,0 +1,58 @@ +id: wp-postratings-8dec592932911140013173fa65adb3b3 + +info: + name: > + WP-PostRatings <= 1.89 - Race Condition + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba27d52e-e43a-4f03-ad99-632c18279413?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-postratings/" + google-query: inurl:"/wp-content/plugins/wp-postratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-postratings,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-postratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-postratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.89') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-postratings-ac814100e213d264685a18f0bee470c2.yaml b/nuclei-templates/cve-less/plugins/wp-postratings-ac814100e213d264685a18f0bee470c2.yaml new file mode 100644 index 0000000000..0a679ecd2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-postratings-ac814100e213d264685a18f0bee470c2.yaml @@ -0,0 +1,58 @@ +id: wp-postratings-ac814100e213d264685a18f0bee470c2 + +info: + name: > + WP-PostRatings <= 1.61 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b8306b8-1f4c-48fb-8eb7-bf02a2f77e04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-postratings/" + google-query: inurl:"/wp-content/plugins/wp-postratings/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-postratings,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-postratings/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-postratings" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.61') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-posturl-544ee7aee750c4df26fe7f3c5d3e9353.yaml b/nuclei-templates/cve-less/plugins/wp-posturl-544ee7aee750c4df26fe7f3c5d3e9353.yaml new file mode 100644 index 0000000000..fa2e144a67 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-posturl-544ee7aee750c4df26fe7f3c5d3e9353.yaml @@ -0,0 +1,58 @@ +id: wp-posturl-544ee7aee750c4df26fe7f3c5d3e9353 + +info: + name: > + Add Post URL <= 2.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24d08127-67b6-434a-8dbe-233a47854f9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-posturl/" + google-query: inurl:"/wp-content/plugins/wp-posturl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-posturl,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-posturl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-posturl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-postviews-888312a64923f43849174a79d906913e.yaml b/nuclei-templates/cve-less/plugins/wp-postviews-888312a64923f43849174a79d906913e.yaml new file mode 100644 index 0000000000..a454c4d32c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-postviews-888312a64923f43849174a79d906913e.yaml @@ -0,0 +1,58 @@ +id: wp-postviews-888312a64923f43849174a79d906913e + +info: + name: > + WP-PostViews < 1.63 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87eaa518-44fb-48ae-b700-ac65141905b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-postviews/" + google-query: inurl:"/wp-content/plugins/wp-postviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-postviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-postviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-postviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.63') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-power-stats-d2359b1121bed9933888a9df14ebd74e.yaml b/nuclei-templates/cve-less/plugins/wp-power-stats-d2359b1121bed9933888a9df14ebd74e.yaml new file mode 100644 index 0000000000..cb4a53e88a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-power-stats-d2359b1121bed9933888a9df14ebd74e.yaml @@ -0,0 +1,58 @@ +id: wp-power-stats-d2359b1121bed9933888a9df14ebd74e + +info: + name: > + WP Power Stats <= 2.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a86a694b-5e45-4e94-a22c-2c5faa7172a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-power-stats/" + google-query: inurl:"/wp-content/plugins/wp-power-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-power-stats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-power-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-power-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-powerplaygallery-3fd0f15662f38cc8cf4de2e9cf15e403.yaml b/nuclei-templates/cve-less/plugins/wp-powerplaygallery-3fd0f15662f38cc8cf4de2e9cf15e403.yaml new file mode 100644 index 0000000000..9e0c79230d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-powerplaygallery-3fd0f15662f38cc8cf4de2e9cf15e403.yaml @@ -0,0 +1,58 @@ +id: wp-powerplaygallery-3fd0f15662f38cc8cf4de2e9cf15e403 + +info: + name: > + Powerplay Gallery <= 3.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/474ad5a5-6384-41cb-a60b-e25477d48ad7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-powerplaygallery/" + google-query: inurl:"/wp-content/plugins/wp-powerplaygallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-powerplaygallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-powerplaygallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-powerplaygallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-powerplaygallery-4d6fdc24cec05dab8e1448ebdf64ba23.yaml b/nuclei-templates/cve-less/plugins/wp-powerplaygallery-4d6fdc24cec05dab8e1448ebdf64ba23.yaml new file mode 100644 index 0000000000..4938b89c49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-powerplaygallery-4d6fdc24cec05dab8e1448ebdf64ba23.yaml @@ -0,0 +1,58 @@ +id: wp-powerplaygallery-4d6fdc24cec05dab8e1448ebdf64ba23 + +info: + name: > + Powerplay Gallery <= 3.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c44b9eb6-96a8-4e19-b4c1-72a69b9f159f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-powerplaygallery/" + google-query: inurl:"/wp-content/plugins/wp-powerplaygallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-powerplaygallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-powerplaygallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-powerplaygallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-powerplaygallery-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/wp-powerplaygallery-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..f1a1c7cf3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-powerplaygallery-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: wp-powerplaygallery-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-powerplaygallery/" + google-query: inurl:"/wp-content/plugins/wp-powerplaygallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-powerplaygallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-powerplaygallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-powerplaygallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-powerplaygallery-f8194d7ca5455df0340759073541f5a7.yaml b/nuclei-templates/cve-less/plugins/wp-powerplaygallery-f8194d7ca5455df0340759073541f5a7.yaml new file mode 100644 index 0000000000..c0e4e54875 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-powerplaygallery-f8194d7ca5455df0340759073541f5a7.yaml @@ -0,0 +1,58 @@ +id: wp-powerplaygallery-f8194d7ca5455df0340759073541f5a7 + +info: + name: > + Powerplay Gallery <= 3.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2655ec9f-471f-48e7-8e1c-a428ef3b46ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-powerplaygallery/" + google-query: inurl:"/wp-content/plugins/wp-powerplaygallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-powerplaygallery,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-powerplaygallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-powerplaygallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-prayer-83bea5d4bb17e709cec571f15c9f09ce.yaml b/nuclei-templates/cve-less/plugins/wp-prayer-83bea5d4bb17e709cec571f15c9f09ce.yaml new file mode 100644 index 0000000000..8e8567d94d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-prayer-83bea5d4bb17e709cec571f15c9f09ce.yaml @@ -0,0 +1,58 @@ +id: wp-prayer-83bea5d4bb17e709cec571f15c9f09ce + +info: + name: > + WP Prayer <= 1.5.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c881ddce-05f8-4b56-ac72-52c9b7773db0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-prayer/" + google-query: inurl:"/wp-content/plugins/wp-prayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-prayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-prayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-prayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-prayer-93817db5fd5a790f9a8413665f75bc03.yaml b/nuclei-templates/cve-less/plugins/wp-prayer-93817db5fd5a790f9a8413665f75bc03.yaml new file mode 100644 index 0000000000..471fd26375 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-prayer-93817db5fd5a790f9a8413665f75bc03.yaml @@ -0,0 +1,58 @@ +id: wp-prayer-93817db5fd5a790f9a8413665f75bc03 + +info: + name: > + WP Prayer <= 1.6.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc23d52c-68e5-4f5c-9334-acae70fd4c42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-prayer/" + google-query: inurl:"/wp-content/plugins/wp-prayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-prayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-prayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-prayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-prayer-c57cd7bd5b015a60858f3a01ad1d45ea.yaml b/nuclei-templates/cve-less/plugins/wp-prayer-c57cd7bd5b015a60858f3a01ad1d45ea.yaml new file mode 100644 index 0000000000..22f6472c85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-prayer-c57cd7bd5b015a60858f3a01ad1d45ea.yaml @@ -0,0 +1,58 @@ +id: wp-prayer-c57cd7bd5b015a60858f3a01ad1d45ea + +info: + name: > + WP Prayer <= 1.6.5 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7efbdb1-989f-4171-ab55-aff66014337a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-prayer/" + google-query: inurl:"/wp-content/plugins/wp-prayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-prayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-prayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-prayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-prayer-fc6f44579727101979a58b50043c9f62.yaml b/nuclei-templates/cve-less/plugins/wp-prayer-fc6f44579727101979a58b50043c9f62.yaml new file mode 100644 index 0000000000..fac0676751 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-prayer-fc6f44579727101979a58b50043c9f62.yaml @@ -0,0 +1,58 @@ +id: wp-prayer-fc6f44579727101979a58b50043c9f62 + +info: + name: > + WP Prayer <= 1.9.6 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9738054-058f-47be-9973-f119fbfd4396?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-prayer/" + google-query: inurl:"/wp-content/plugins/wp-prayer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-prayer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-prayer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-prayer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-print-b73d87f96280b93d84cc00f272e356ef.yaml b/nuclei-templates/cve-less/plugins/wp-print-b73d87f96280b93d84cc00f272e356ef.yaml new file mode 100644 index 0000000000..ff6185d500 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-print-b73d87f96280b93d84cc00f272e356ef.yaml @@ -0,0 +1,58 @@ +id: wp-print-b73d87f96280b93d84cc00f272e356ef + +info: + name: > + WP-Print <= 2.51 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f8945e9-51db-46aa-b198-3762b6628553?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-print/" + google-query: inurl:"/wp-content/plugins/wp-print/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-print,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-print/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-print" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-print-friendly-07ab0ae27a6f3fee8bb775502300d8a3.yaml b/nuclei-templates/cve-less/plugins/wp-print-friendly-07ab0ae27a6f3fee8bb775502300d8a3.yaml new file mode 100644 index 0000000000..825293b0d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-print-friendly-07ab0ae27a6f3fee8bb775502300d8a3.yaml @@ -0,0 +1,58 @@ +id: wp-print-friendly-07ab0ae27a6f3fee8bb775502300d8a3 + +info: + name: > + WP Print Friendly <= 0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/980ed456-b6a9-4ca0-99ce-513b20af6d8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-print-friendly/" + google-query: inurl:"/wp-content/plugins/wp-print-friendly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-print-friendly,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-print-friendly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-print-friendly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-print-friendly-82ee0ecca0569c5ee6149d011bc22c2e.yaml b/nuclei-templates/cve-less/plugins/wp-print-friendly-82ee0ecca0569c5ee6149d011bc22c2e.yaml new file mode 100644 index 0000000000..df8eee5cd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-print-friendly-82ee0ecca0569c5ee6149d011bc22c2e.yaml @@ -0,0 +1,58 @@ +id: wp-print-friendly-82ee0ecca0569c5ee6149d011bc22c2e + +info: + name: > + WP Print Friendly <= 0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7bfc7bf-19bb-43aa-95fc-7f4558699f41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-print-friendly/" + google-query: inurl:"/wp-content/plugins/wp-print-friendly/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-print-friendly,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-print-friendly/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-print-friendly" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-private-content-plus-13ab88959bcdd9c68f7d9d04453c2d2d.yaml b/nuclei-templates/cve-less/plugins/wp-private-content-plus-13ab88959bcdd9c68f7d9d04453c2d2d.yaml new file mode 100644 index 0000000000..fbc20b4bc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-private-content-plus-13ab88959bcdd9c68f7d9d04453c2d2d.yaml @@ -0,0 +1,58 @@ +id: wp-private-content-plus-13ab88959bcdd9c68f7d9d04453c2d2d + +info: + name: > + WP Private Content Plus <= 1.31 - Unauthenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb26ea7b-fc54-4cef-aaa8-3a41e8d0c371?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-private-content-plus/" + google-query: inurl:"/wp-content/plugins/wp-private-content-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-private-content-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-private-content-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-private-content-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-private-content-plus-aed641f4c8c8fbdbffc5591e24cc25c4.yaml b/nuclei-templates/cve-less/plugins/wp-private-content-plus-aed641f4c8c8fbdbffc5591e24cc25c4.yaml new file mode 100644 index 0000000000..a6074795b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-private-content-plus-aed641f4c8c8fbdbffc5591e24cc25c4.yaml @@ -0,0 +1,58 @@ +id: wp-private-content-plus-aed641f4c8c8fbdbffc5591e24cc25c4 + +info: + name: > + WP Private Content Plus <= 3.6 - Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43d8904f-3bc9-4c67-b44b-8d78762b6b30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-private-content-plus/" + google-query: inurl:"/wp-content/plugins/wp-private-content-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-private-content-plus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-private-content-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-private-content-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-private-content-plus-d5107af4decc8fb0ccbe36135deb72d1.yaml b/nuclei-templates/cve-less/plugins/wp-private-content-plus-d5107af4decc8fb0ccbe36135deb72d1.yaml new file mode 100644 index 0000000000..d1b9ed39ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-private-content-plus-d5107af4decc8fb0ccbe36135deb72d1.yaml @@ -0,0 +1,58 @@ +id: wp-private-content-plus-d5107af4decc8fb0ccbe36135deb72d1 + +info: + name: > + WP Private Content Plus <= 3.4 - Authenticated(Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcb82472-e18c-447e-acad-796724188515?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-private-content-plus/" + google-query: inurl:"/wp-content/plugins/wp-private-content-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-private-content-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-private-content-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-private-content-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-private-content-plus-ed06ada3e2d61861fecb8610e5d7a1ac.yaml b/nuclei-templates/cve-less/plugins/wp-private-content-plus-ed06ada3e2d61861fecb8610e5d7a1ac.yaml new file mode 100644 index 0000000000..e8b018142d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-private-content-plus-ed06ada3e2d61861fecb8610e5d7a1ac.yaml @@ -0,0 +1,58 @@ +id: wp-private-content-plus-ed06ada3e2d61861fecb8610e5d7a1ac + +info: + name: > + WP Private Content Plus <= 3.1 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/238f6d81-78ba-426c-866a-31f9279e4f99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-private-content-plus/" + google-query: inurl:"/wp-content/plugins/wp-private-content-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-private-content-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-private-content-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-private-content-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-private-media-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-private-media-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..30f311fff4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-private-media-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-private-media-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-private-media/" + google-query: inurl:"/wp-content/plugins/wp-private-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-private-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-private-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-private-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-private-message-f96de744475c9f8a69cb4acf328a0bc2.yaml b/nuclei-templates/cve-less/plugins/wp-private-message-f96de744475c9f8a69cb4acf328a0bc2.yaml new file mode 100644 index 0000000000..57ded98b44 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-private-message-f96de744475c9f8a69cb4acf328a0bc2.yaml @@ -0,0 +1,58 @@ +id: wp-private-message-f96de744475c9f8a69cb4acf328a0bc2 + +info: + name: > + WP Private Message < 1.0.6 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14026e96-7e21-45db-b258-13b014ec478c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-private-message/" + google-query: inurl:"/wp-content/plugins/wp-private-message/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-private-message,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-private-message/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-private-message" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-private-messages-dc7758f91293ce9c92573a1104c733de.yaml b/nuclei-templates/cve-less/plugins/wp-private-messages-dc7758f91293ce9c92573a1104c733de.yaml new file mode 100644 index 0000000000..1dff5f7077 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-private-messages-dc7758f91293ce9c92573a1104c733de.yaml @@ -0,0 +1,58 @@ +id: wp-private-messages-dc7758f91293ce9c92573a1104c733de + +info: + name: > + WP Private Messages <= 1.0.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4aae4571-671a-46d7-b490-6cd0feced0af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-private-messages/" + google-query: inurl:"/wp-content/plugins/wp-private-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-private-messages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-private-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-private-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pro-counter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-pro-counter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..56e5b369d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pro-counter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-pro-counter-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pro-counter/" + google-query: inurl:"/wp-content/plugins/wp-pro-counter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pro-counter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pro-counter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pro-counter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-pro-quiz-f47da71d7fbe6f22fdb13d8b16b739c2.yaml b/nuclei-templates/cve-less/plugins/wp-pro-quiz-f47da71d7fbe6f22fdb13d8b16b739c2.yaml new file mode 100644 index 0000000000..a81c59b0ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-pro-quiz-f47da71d7fbe6f22fdb13d8b16b739c2.yaml @@ -0,0 +1,58 @@ +id: wp-pro-quiz-f47da71d7fbe6f22fdb13d8b16b739c2 + +info: + name: > + WP-Pro-Quiz <= 0.37 - Arbitrary Quiz Deletion via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/303bdead-96e4-45f4-8b57-f1cb703bbe16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-pro-quiz/" + google-query: inurl:"/wp-content/plugins/wp-pro-quiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-pro-quiz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-pro-quiz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-pro-quiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-product-feed-manager-68254971cbcf2fc6d5bd7c51c76b34c5.yaml b/nuclei-templates/cve-less/plugins/wp-product-feed-manager-68254971cbcf2fc6d5bd7c51c76b34c5.yaml new file mode 100644 index 0000000000..9adf45018e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-product-feed-manager-68254971cbcf2fc6d5bd7c51c76b34c5.yaml @@ -0,0 +1,58 @@ +id: wp-product-feed-manager-68254971cbcf2fc6d5bd7c51c76b34c5 + +info: + name: > + WooCommerce Google Feed Manager <= 2.4.2 - Authenticated (Admin+) SQL Injection to Reflected Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37bfb60d-8e2d-4c77-880c-3d17a6a434b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-product-feed-manager/" + google-query: inurl:"/wp-content/plugins/wp-product-feed-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-product-feed-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-product-feed-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-product-feed-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-product-feed-manager-ac3cdb02dfa19f5b0080855ac08f88be.yaml b/nuclei-templates/cve-less/plugins/wp-product-feed-manager-ac3cdb02dfa19f5b0080855ac08f88be.yaml new file mode 100644 index 0000000000..caa69e614e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-product-feed-manager-ac3cdb02dfa19f5b0080855ac08f88be.yaml @@ -0,0 +1,58 @@ +id: wp-product-feed-manager-ac3cdb02dfa19f5b0080855ac08f88be + +info: + name: > + WooCommerce Google Feed Manager <= 2.2.0 - Authenticated (Shop manager+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf36c00f-e6a2-4630-b5ef-9015365be436?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-product-feed-manager/" + google-query: inurl:"/wp-content/plugins/wp-product-feed-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-product-feed-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-product-feed-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-product-feed-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-product-review-4d1a3458be4ae0555d1a0720658316fe.yaml b/nuclei-templates/cve-less/plugins/wp-product-review-4d1a3458be4ae0555d1a0720658316fe.yaml new file mode 100644 index 0000000000..b652487ad0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-product-review-4d1a3458be4ae0555d1a0720658316fe.yaml @@ -0,0 +1,58 @@ +id: wp-product-review-4d1a3458be4ae0555d1a0720658316fe + +info: + name: > + WP Product Review Lite <= 3.7.5 - Unauthenticated Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c09743a-cf0a-4eaa-8508-ecde32de4fce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-product-review/" + google-query: inurl:"/wp-content/plugins/wp-product-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-product-review,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-product-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-product-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-property-403a3d4815913e613911a54871a0f61d.yaml b/nuclei-templates/cve-less/plugins/wp-property-403a3d4815913e613911a54871a0f61d.yaml new file mode 100644 index 0000000000..e62ff2d937 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-property-403a3d4815913e613911a54871a0f61d.yaml @@ -0,0 +1,58 @@ +id: wp-property-403a3d4815913e613911a54871a0f61d + +info: + name: > + WP Property <= 1.35.0 - Remote File Upload + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6f68904-e575-457d-9040-c791b645e6c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-property/" + google-query: inurl:"/wp-content/plugins/wp-property/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-property,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-property/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-property" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.35.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-property-eece58b4ed3b36911722cf60f06d0f49.yaml b/nuclei-templates/cve-less/plugins/wp-property-eece58b4ed3b36911722cf60f06d0f49.yaml new file mode 100644 index 0000000000..b7d57cf082 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-property-eece58b4ed3b36911722cf60f06d0f49.yaml @@ -0,0 +1,58 @@ +id: wp-property-eece58b4ed3b36911722cf60f06d0f49 + +info: + name: > + WP-Property – WordPress Powered Real Estate and Property Management < 1.38.4 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83460136-5a51-4c11-a695-ea2b2d60d68f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-property/" + google-query: inurl:"/wp-content/plugins/wp-property/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-property,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-property/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-property" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.38.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-publications-76cc9ef157cda8ab12c517a7c91088af.yaml b/nuclei-templates/cve-less/plugins/wp-publications-76cc9ef157cda8ab12c517a7c91088af.yaml new file mode 100644 index 0000000000..14455f2efa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-publications-76cc9ef157cda8ab12c517a7c91088af.yaml @@ -0,0 +1,58 @@ +id: wp-publications-76cc9ef157cda8ab12c517a7c91088af + +info: + name: > + wp-publications < 1.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c08b7a7-297b-4ad7-b829-3ccbae7b2e41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-publications/" + google-query: inurl:"/wp-content/plugins/wp-publications/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-publications,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-publications/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-publications" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-qrcode-me-v-card-800d1ab574434819322506f176feb04a.yaml b/nuclei-templates/cve-less/plugins/wp-qrcode-me-v-card-800d1ab574434819322506f176feb04a.yaml new file mode 100644 index 0000000000..430ca34479 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-qrcode-me-v-card-800d1ab574434819322506f176feb04a.yaml @@ -0,0 +1,58 @@ +id: wp-qrcode-me-v-card-800d1ab574434819322506f176feb04a + +info: + name: > + QR code MeCard/vCard generator <= 1.6.0 - Missing Authorization via wqm_make_url_permanent + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8896fa5a-1642-4fcd-8fff-1e5828c28523?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-qrcode-me-v-card/" + google-query: inurl:"/wp-content/plugins/wp-qrcode-me-v-card/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-qrcode-me-v-card,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-qrcode-me-v-card/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-qrcode-me-v-card" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-18ba5164adc930f4c13bf8eac8771529.yaml b/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-18ba5164adc930f4c13bf8eac8771529.yaml new file mode 100644 index 0000000000..179f120945 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-18ba5164adc930f4c13bf8eac8771529.yaml @@ -0,0 +1,58 @@ +id: wp-quick-front-end-editor-18ba5164adc930f4c13bf8eac8771529 + +info: + name: > + WP Quick FrontEnd Editor <= 5.5 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c392750b-ae4a-48b5-9ccb-43852fb13e27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-quick-front-end-editor/" + google-query: inurl:"/wp-content/plugins/wp-quick-front-end-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-quick-front-end-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-quick-front-end-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-quick-front-end-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-34686e9b40a6d9c4dcc8e1fbb6d4343b.yaml b/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-34686e9b40a6d9c4dcc8e1fbb6d4343b.yaml new file mode 100644 index 0000000000..3707144218 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-34686e9b40a6d9c4dcc8e1fbb6d4343b.yaml @@ -0,0 +1,58 @@ +id: wp-quick-front-end-editor-34686e9b40a6d9c4dcc8e1fbb6d4343b + +info: + name: > + WP Quick FrontEnd Editor <= 5.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed137706-1313-4bff-882b-13d9fa11498c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-quick-front-end-editor/" + google-query: inurl:"/wp-content/plugins/wp-quick-front-end-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-quick-front-end-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-quick-front-end-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-quick-front-end-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-480b8a3eac01c8a8ea01d02be8cf6e9e.yaml b/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-480b8a3eac01c8a8ea01d02be8cf6e9e.yaml new file mode 100644 index 0000000000..46d5fd1c78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-480b8a3eac01c8a8ea01d02be8cf6e9e.yaml @@ -0,0 +1,58 @@ +id: wp-quick-front-end-editor-480b8a3eac01c8a8ea01d02be8cf6e9e + +info: + name: > + WP Quick FrontEnd Editor <= 5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce8ae7d-c2a5-4da3-8bdd-20dfdb5ce700?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-quick-front-end-editor/" + google-query: inurl:"/wp-content/plugins/wp-quick-front-end-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-quick-front-end-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-quick-front-end-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-quick-front-end-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-f945b2013c9f8db455b1c19cba6e241e.yaml b/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-f945b2013c9f8db455b1c19cba6e241e.yaml new file mode 100644 index 0000000000..894b27362e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-quick-front-end-editor-f945b2013c9f8db455b1c19cba6e241e.yaml @@ -0,0 +1,58 @@ +id: wp-quick-front-end-editor-f945b2013c9f8db455b1c19cba6e241e + +info: + name: > + WP Quick FrontEnd Editor <= 5.5 - Authenticated (Subscriber+) Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5492bff-cfd9-41ed-a59b-4445d5e83e86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-quick-front-end-editor/" + google-query: inurl:"/wp-content/plugins/wp-quick-front-end-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-quick-front-end-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-quick-front-end-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-quick-front-end-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-quick-post-duplicator-10b5f73ced4f4ae8f40389dd6e188b1c.yaml b/nuclei-templates/cve-less/plugins/wp-quick-post-duplicator-10b5f73ced4f4ae8f40389dd6e188b1c.yaml new file mode 100644 index 0000000000..0e34bed248 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-quick-post-duplicator-10b5f73ced4f4ae8f40389dd6e188b1c.yaml @@ -0,0 +1,58 @@ +id: wp-quick-post-duplicator-10b5f73ced4f4ae8f40389dd6e188b1c + +info: + name: > + WP Quick Post Duplicator <= 2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12a576ee-f8a9-4740-b87b-091a46970d53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-quick-post-duplicator/" + google-query: inurl:"/wp-content/plugins/wp-quick-post-duplicator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-quick-post-duplicator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-quick-post-duplicator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-quick-post-duplicator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-radio-4750f217b4fbd830bf2a4ee2b5c1530d.yaml b/nuclei-templates/cve-less/plugins/wp-radio-4750f217b4fbd830bf2a4ee2b5c1530d.yaml new file mode 100644 index 0000000000..8913c09b04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-radio-4750f217b4fbd830bf2a4ee2b5c1530d.yaml @@ -0,0 +1,58 @@ +id: wp-radio-4750f217b4fbd830bf2a4ee2b5c1530d + +info: + name: > + WP Radio – Worldwide Online Radio Stations Directory for WordPress <= 3.1.9 - Missing Authorization via multiple AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b46e9771-37ff-4825-9af9-02ecde424653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-radio/" + google-query: inurl:"/wp-content/plugins/wp-radio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-radio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-radio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-radio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-radio-785b1c3458487127cc883fbac1f1ef7f.yaml b/nuclei-templates/cve-less/plugins/wp-radio-785b1c3458487127cc883fbac1f1ef7f.yaml new file mode 100644 index 0000000000..a74e15853d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-radio-785b1c3458487127cc883fbac1f1ef7f.yaml @@ -0,0 +1,58 @@ +id: wp-radio-785b1c3458487127cc883fbac1f1ef7f + +info: + name: > + WP Radio – Worldwide Online Radio Stations Directory for WordPress <= 3.1.9 - Authenticated(Subscriber+) Stored Cross-Site Scripting via Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/486ffdc9-a3e7-4f4c-89b1-b668a5d41aa5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-radio/" + google-query: inurl:"/wp-content/plugins/wp-radio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-radio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-radio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-radio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-radio-86ac2d003a393175395c9b05a6663062.yaml b/nuclei-templates/cve-less/plugins/wp-radio-86ac2d003a393175395c9b05a6663062.yaml new file mode 100644 index 0000000000..203cbd49ae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-radio-86ac2d003a393175395c9b05a6663062.yaml @@ -0,0 +1,58 @@ +id: wp-radio-86ac2d003a393175395c9b05a6663062 + +info: + name: > + WP Radio – Worldwide Online Radio Stations Directory for WordPress <= 3.1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/874e9e14-1330-40f0-8199-8abcaae58e98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-radio/" + google-query: inurl:"/wp-content/plugins/wp-radio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-radio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-radio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-radio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-radio-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-radio-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..69b6774c8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-radio-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-radio-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-radio/" + google-query: inurl:"/wp-content/plugins/wp-radio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-radio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-radio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-radio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reactions-lite-0b686c4cb6f413d46dafa7ed933109c6.yaml b/nuclei-templates/cve-less/plugins/wp-reactions-lite-0b686c4cb6f413d46dafa7ed933109c6.yaml new file mode 100644 index 0000000000..efb2b328ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reactions-lite-0b686c4cb6f413d46dafa7ed933109c6.yaml @@ -0,0 +1,58 @@ +id: wp-reactions-lite-0b686c4cb6f413d46dafa7ed933109c6 + +info: + name: > + WP Reactions Lite <= 1.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cceca0e-5411-4b8c-a261-91098a8bc7fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reactions-lite/" + google-query: inurl:"/wp-content/plugins/wp-reactions-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reactions-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reactions-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reactions-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reactions-lite-1fa1c4ce292a4074e0d2a4792b491027.yaml b/nuclei-templates/cve-less/plugins/wp-reactions-lite-1fa1c4ce292a4074e0d2a4792b491027.yaml new file mode 100644 index 0000000000..157e42e5f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reactions-lite-1fa1c4ce292a4074e0d2a4792b491027.yaml @@ -0,0 +1,58 @@ +id: wp-reactions-lite-1fa1c4ce292a4074e0d2a4792b491027 + +info: + name: > + WP Reactions Lite <= 1.3.8 - Cross-Site Request Forgery via AJAX action + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/558b4b31-fd4f-4265-bddc-baf484d48fc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reactions-lite/" + google-query: inurl:"/wp-content/plugins/wp-reactions-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reactions-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reactions-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reactions-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-realty-0434ab5209741c3f7521537eabd69256.yaml b/nuclei-templates/cve-less/plugins/wp-realty-0434ab5209741c3f7521537eabd69256.yaml new file mode 100644 index 0000000000..7c5f5bae3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-realty-0434ab5209741c3f7521537eabd69256.yaml @@ -0,0 +1,58 @@ +id: wp-realty-0434ab5209741c3f7521537eabd69256 + +info: + name: > + WPRealty <= 2.9.1 - Time-Based Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81354461-70a9-4a5d-9a75-1f2445f7e8aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-realty/" + google-query: inurl:"/wp-content/plugins/wp-realty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-realty,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-realty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-realty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-realty-d2c57b8ede776b72c978f813e6d0a827.yaml b/nuclei-templates/cve-less/plugins/wp-realty-d2c57b8ede776b72c978f813e6d0a827.yaml new file mode 100644 index 0000000000..d6be064685 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-realty-d2c57b8ede776b72c978f813e6d0a827.yaml @@ -0,0 +1,58 @@ +id: wp-realty-d2c57b8ede776b72c978f813e6d0a827 + +info: + name: > + WPRealty <= 2.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0798cd-bf1a-4c1c-82c5-e417b9983c77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-realty/" + google-query: inurl:"/wp-content/plugins/wp-realty/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-realty,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-realty/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-realty" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recall-4d45d2a7dc106d49db836138495ed8c3.yaml b/nuclei-templates/cve-less/plugins/wp-recall-4d45d2a7dc106d49db836138495ed8c3.yaml new file mode 100644 index 0000000000..9a479b0b5d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recall-4d45d2a7dc106d49db836138495ed8c3.yaml @@ -0,0 +1,58 @@ +id: wp-recall-4d45d2a7dc106d49db836138495ed8c3 + +info: + name: > + WP-Recall <= 16.24.47 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccd2ef23-23b7-4a32-aeda-41ea9439f166?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recall/" + google-query: inurl:"/wp-content/plugins/wp-recall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 16.24.47') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recall-60df39bb0575c5dbb8ccfec2f18ede40.yaml b/nuclei-templates/cve-less/plugins/wp-recall-60df39bb0575c5dbb8ccfec2f18ede40.yaml new file mode 100644 index 0000000000..c724b4658a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recall-60df39bb0575c5dbb8ccfec2f18ede40.yaml @@ -0,0 +1,58 @@ +id: wp-recall-60df39bb0575c5dbb8ccfec2f18ede40 + +info: + name: > + WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99a21d91-e17a-400e-9013-c074e76bbf6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recall/" + google-query: inurl:"/wp-content/plugins/wp-recall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recall,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 16.26.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recall-8d8383b244607eb18513c4f27a52d173.yaml b/nuclei-templates/cve-less/plugins/wp-recall-8d8383b244607eb18513c4f27a52d173.yaml new file mode 100644 index 0000000000..2ac974c9aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recall-8d8383b244607eb18513c4f27a52d173.yaml @@ -0,0 +1,58 @@ +id: wp-recall-8d8383b244607eb18513c4f27a52d173 + +info: + name: > + WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/813821c8-a9f9-408e-b85e-1c24d90f5e4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recall/" + google-query: inurl:"/wp-content/plugins/wp-recall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recall,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 16.26.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recall-c0cb61dd6fecf2d07db617deb2e20095.yaml b/nuclei-templates/cve-less/plugins/wp-recall-c0cb61dd6fecf2d07db617deb2e20095.yaml new file mode 100644 index 0000000000..31535149c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recall-c0cb61dd6fecf2d07db617deb2e20095.yaml @@ -0,0 +1,58 @@ +id: wp-recall-c0cb61dd6fecf2d07db617deb2e20095 + +info: + name: > + WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97ed0ef5-2a01-4531-a844-81766bdfc7c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recall/" + google-query: inurl:"/wp-content/plugins/wp-recall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 16.26.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recaptcha-9b84dd02ba8c932cd7e6589112f001f1.yaml b/nuclei-templates/cve-less/plugins/wp-recaptcha-9b84dd02ba8c932cd7e6589112f001f1.yaml new file mode 100644 index 0000000000..02d2e5e143 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recaptcha-9b84dd02ba8c932cd7e6589112f001f1.yaml @@ -0,0 +1,58 @@ +id: wp-recaptcha-9b84dd02ba8c932cd7e6589112f001f1 + +info: + name: > + WordPress Google reCAPTCHA <= 3.1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56c719dc-b97a-4eb1-ae7a-e435c2f5a69e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recaptcha/" + google-query: inurl:"/wp-content/plugins/wp-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recaptcha-e3d831bb072ff08836a63c6a4ebecea3.yaml b/nuclei-templates/cve-less/plugins/wp-recaptcha-e3d831bb072ff08836a63c6a4ebecea3.yaml new file mode 100644 index 0000000000..df21660a8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recaptcha-e3d831bb072ff08836a63c6a4ebecea3.yaml @@ -0,0 +1,58 @@ +id: wp-recaptcha-e3d831bb072ff08836a63c6a4ebecea3 + +info: + name: > + WP-reCAPTCHA <= 2.9.8.2 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a437e3ac-5428-4820-8037-8592b86e0dd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recaptcha/" + google-query: inurl:"/wp-content/plugins/wp-recaptcha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recaptcha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recaptcha/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recaptcha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recentcomments-7e43f159f02a44d44b4f5f778ba799d4.yaml b/nuclei-templates/cve-less/plugins/wp-recentcomments-7e43f159f02a44d44b4f5f778ba799d4.yaml new file mode 100644 index 0000000000..5fc2c8a241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recentcomments-7e43f159f02a44d44b4f5f778ba799d4.yaml @@ -0,0 +1,58 @@ +id: wp-recentcomments-7e43f159f02a44d44b4f5f778ba799d4 + +info: + name: > + WP-RecentComments <= 2.2.7 - Unauthenticated Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3becd450-b0de-466a-9721-b156a2ba1de3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recentcomments/" + google-query: inurl:"/wp-content/plugins/wp-recentcomments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recentcomments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recentcomments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recentcomments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recentcomments-a8f25522ea55ec9a76938298a24a0acc.yaml b/nuclei-templates/cve-less/plugins/wp-recentcomments-a8f25522ea55ec9a76938298a24a0acc.yaml new file mode 100644 index 0000000000..f7e0680c6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recentcomments-a8f25522ea55ec9a76938298a24a0acc.yaml @@ -0,0 +1,58 @@ +id: wp-recentcomments-a8f25522ea55ec9a76938298a24a0acc + +info: + name: > + WP-RecentComments <= 2.0.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9ddbb9c-c2c9-4e34-ac22-2afe8050e15b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recentcomments/" + google-query: inurl:"/wp-content/plugins/wp-recentcomments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recentcomments,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recentcomments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recentcomments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recentcomments-d9b7779382ec9bca0dc96d41eb9855af.yaml b/nuclei-templates/cve-less/plugins/wp-recentcomments-d9b7779382ec9bca0dc96d41eb9855af.yaml new file mode 100644 index 0000000000..849bf317ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recentcomments-d9b7779382ec9bca0dc96d41eb9855af.yaml @@ -0,0 +1,58 @@ +id: wp-recentcomments-d9b7779382ec9bca0dc96d41eb9855af + +info: + name: > + WP-RecentComments <= 2.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c6f44ba-a8c1-4248-8f54-ee86d4b5aa20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recentcomments/" + google-query: inurl:"/wp-content/plugins/wp-recentcomments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recentcomments,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recentcomments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recentcomments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-08ecb188f4c24bff415036a618bb6f62.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-08ecb188f4c24bff415036a618bb6f62.yaml new file mode 100644 index 0000000000..6fdbe2c6f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-08ecb188f4c24bff415036a618bb6f62.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-08ecb188f4c24bff415036a618bb6f62 + +info: + name: > + WP Recipe Maker <= 9.1.0 - Reflected Cross-Site Scripting via Referer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20842e95-4b91-4138-9e32-7c090724bf64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-30317bfce905faf2637e9a9df56ecb43.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-30317bfce905faf2637e9a9df56ecb43.yaml new file mode 100644 index 0000000000..00dd79d1d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-30317bfce905faf2637e9a9df56ecb43.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-30317bfce905faf2637e9a9df56ecb43 + +info: + name: > + WP Recipe Maker <= 8.6.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f75093a5-e0cc-4d3b-bdef-a65561127b3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-348b2d2c08f931f9d2b3643ac2152b3a.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-348b2d2c08f931f9d2b3643ac2152b3a.yaml new file mode 100644 index 0000000000..d8a750ae62 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-348b2d2c08f931f9d2b3643ac2152b3a.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-348b2d2c08f931f9d2b3643ac2152b3a + +info: + name: > + WP Recipe Maker <= 9.2.1 - Authenticated Stored Cross-Site Scripting via Video Embed + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c098b35-606e-4dde-8683-4c90f518ddb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-55265bc94a3e60f3cd5f796b692a1dbf.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-55265bc94a3e60f3cd5f796b692a1dbf.yaml new file mode 100644 index 0000000000..ef1e986b54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-55265bc94a3e60f3cd5f796b692a1dbf.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-55265bc94a3e60f3cd5f796b692a1dbf + +info: + name: > + WP Recipe Maker <= 9.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Recipe Notes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/749c5d09-1e9a-4aa1-b7c2-6f9d24f3a09b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-563c86924064bbeed4e8a4af90017e06.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-563c86924064bbeed4e8a4af90017e06.yaml new file mode 100644 index 0000000000..379319ae2d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-563c86924064bbeed4e8a4af90017e06.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-563c86924064bbeed4e8a4af90017e06 + +info: + name: > + WP Recipe Maker <= 9.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via header_tag + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f463ed1-06ad-430f-b450-1a73dc54f8a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-827537b84b4ae3840c51006c12ccc5df.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-827537b84b4ae3840c51006c12ccc5df.yaml new file mode 100644 index 0000000000..e51a025659 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-827537b84b4ae3840c51006c12ccc5df.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-827537b84b4ae3840c51006c12ccc5df + +info: + name: > + WP Recipe Maker <= 9.1.2 - Missing Authorization to Authenticated (Subscriber+) SQL Injecton + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b10d8f8a-517f-4286-b501-0ca040529362?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-948461229b764fced19a13ef5ba11252.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-948461229b764fced19a13ef5ba11252.yaml new file mode 100644 index 0000000000..9339bf18b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-948461229b764fced19a13ef5ba11252.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-948461229b764fced19a13ef5ba11252 + +info: + name: > + WP Recipe Maker <= 9.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'tag' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7c949f0-fcd1-4984-95a2-b19fb72f04bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-96587021500f654fee1593a976493ca2.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-96587021500f654fee1593a976493ca2.yaml new file mode 100644 index 0000000000..1f38d28881 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-96587021500f654fee1593a976493ca2.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-96587021500f654fee1593a976493ca2 + +info: + name: > + WP Recipe Maker <= 9.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via wprm-recipe-roundup-item Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69cc7b6c-b6c2-4bba-afb4-86ba1b36b295?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-c3b5c2246526b047e580623567471684.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-c3b5c2246526b047e580623567471684.yaml new file mode 100644 index 0000000000..513c0f0e45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-c3b5c2246526b047e580623567471684.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-c3b5c2246526b047e580623567471684 + +info: + name: > + WP Recipe Maker <= 9.1.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec201702-8c8c-4049-b647-422d18001b7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-cb50f73b0638afd5cd0d186b2a6577a5.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-cb50f73b0638afd5cd0d186b2a6577a5.yaml new file mode 100644 index 0000000000..dfa3ccefda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-cb50f73b0638afd5cd0d186b2a6577a5.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-cb50f73b0638afd5cd0d186b2a6577a5 + +info: + name: > + WP Recipe Maker <= 9.1.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/457c4e56-c2a0-451f-a4a6-e7fb7bf7b0e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-recipe-maker-f594e103526836b64061a1f68427567d.yaml b/nuclei-templates/cve-less/plugins/wp-recipe-maker-f594e103526836b64061a1f68427567d.yaml new file mode 100644 index 0000000000..979e42cf3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-recipe-maker-f594e103526836b64061a1f68427567d.yaml @@ -0,0 +1,58 @@ +id: wp-recipe-maker-f594e103526836b64061a1f68427567d + +info: + name: > + WP Recipe Maker <= 9.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via icon_color + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53a51408-e5d8-4727-9dec-8321c062c31e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-recipe-maker/" + google-query: inurl:"/wp-content/plugins/wp-recipe-maker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-recipe-maker,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-recipe-maker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-recipe-maker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-register-profile-with-shortcode-7ae915288e9c3c74b018a1157e470354.yaml b/nuclei-templates/cve-less/plugins/wp-register-profile-with-shortcode-7ae915288e9c3c74b018a1157e470354.yaml new file mode 100644 index 0000000000..5a391b3bba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-register-profile-with-shortcode-7ae915288e9c3c74b018a1157e470354.yaml @@ -0,0 +1,58 @@ +id: wp-register-profile-with-shortcode-7ae915288e9c3c74b018a1157e470354 + +info: + name: > + WP Register Profile With Shortcode <= 3.5.9 - Cross-Site Request Forgery to User Password Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca564941-4780-4da2-b937-c9bd45966d81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-register-profile-with-shortcode/" + google-query: inurl:"/wp-content/plugins/wp-register-profile-with-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-register-profile-with-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-register-profile-with-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-register-profile-with-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-register-profile-with-shortcode-e5cd3f1b72f8c188bcce67a3cd5ccf0a.yaml b/nuclei-templates/cve-less/plugins/wp-register-profile-with-shortcode-e5cd3f1b72f8c188bcce67a3cd5ccf0a.yaml new file mode 100644 index 0000000000..94b88ff843 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-register-profile-with-shortcode-e5cd3f1b72f8c188bcce67a3cd5ccf0a.yaml @@ -0,0 +1,58 @@ +id: wp-register-profile-with-shortcode-e5cd3f1b72f8c188bcce67a3cd5ccf0a + +info: + name: > + WP Register Profile With Shortcode <= 3.5.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c20f87e-3670-444c-aa8a-28988dfe2fd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-register-profile-with-shortcode/" + google-query: inurl:"/wp-content/plugins/wp-register-profile-with-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-register-profile-with-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-register-profile-with-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-register-profile-with-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-related-posts-7db34627f1b70dfb15b3a62077ab868f.yaml b/nuclei-templates/cve-less/plugins/wp-related-posts-7db34627f1b70dfb15b3a62077ab868f.yaml new file mode 100644 index 0000000000..d240eb78c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-related-posts-7db34627f1b70dfb15b3a62077ab868f.yaml @@ -0,0 +1,58 @@ +id: wp-related-posts-7db34627f1b70dfb15b3a62077ab868f + +info: + name: > + WP Related Posts <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87e9d29b-9e0d-409c-97a5-7c444dff7382?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-related-posts/" + google-query: inurl:"/wp-content/plugins/wp-related-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-related-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-related-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-related-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-relevant-ads-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-relevant-ads-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e91836b3c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-relevant-ads-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-relevant-ads-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-relevant-ads/" + google-query: inurl:"/wp-content/plugins/wp-relevant-ads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-relevant-ads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-relevant-ads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-relevant-ads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-relevant-ads-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-relevant-ads-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..21c99e05c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-relevant-ads-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-relevant-ads-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-relevant-ads/" + google-query: inurl:"/wp-content/plugins/wp-relevant-ads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-relevant-ads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-relevant-ads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-relevant-ads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-remote-site-search-07a16aaf94526ab4a5492ec25d7bc965.yaml b/nuclei-templates/cve-less/plugins/wp-remote-site-search-07a16aaf94526ab4a5492ec25d7bc965.yaml new file mode 100644 index 0000000000..4171f794e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-remote-site-search-07a16aaf94526ab4a5492ec25d7bc965.yaml @@ -0,0 +1,58 @@ +id: wp-remote-site-search-07a16aaf94526ab4a5492ec25d7bc965 + +info: + name: > + WP Remote Site Search <= 1.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79d4e5a8-028a-488e-b419-77a0981a28a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-remote-site-search/" + google-query: inurl:"/wp-content/plugins/wp-remote-site-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-remote-site-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-remote-site-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-remote-site-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-remote-users-sync-b5b3726a38a0d1a56eeda75879ed92d9.yaml b/nuclei-templates/cve-less/plugins/wp-remote-users-sync-b5b3726a38a0d1a56eeda75879ed92d9.yaml new file mode 100644 index 0000000000..cc618da54a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-remote-users-sync-b5b3726a38a0d1a56eeda75879ed92d9.yaml @@ -0,0 +1,58 @@ +id: wp-remote-users-sync-b5b3726a38a0d1a56eeda75879ed92d9 + +info: + name: > + WP Remote Users Sync <= 1.2.11 - Missing Authorization to Authenticated (Subscriber+) Log View + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e87cfc4-8e7c-47d6-80fc-9c293cdd8acb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-remote-users-sync/" + google-query: inurl:"/wp-content/plugins/wp-remote-users-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-remote-users-sync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-remote-users-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-remote-users-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-remote-users-sync-be653cd14bcab55a461716f49e0f0156.yaml b/nuclei-templates/cve-less/plugins/wp-remote-users-sync-be653cd14bcab55a461716f49e0f0156.yaml new file mode 100644 index 0000000000..146aab435b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-remote-users-sync-be653cd14bcab55a461716f49e0f0156.yaml @@ -0,0 +1,58 @@ +id: wp-remote-users-sync-be653cd14bcab55a461716f49e0f0156 + +info: + name: > + WP Remote Users Sync <= 1.2.12 - Authenticated (Subscriber+) Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e78c759-4a54-4ee4-8eff-df91fe9dad46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-remote-users-sync/" + google-query: inurl:"/wp-content/plugins/wp-remote-users-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-remote-users-sync,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-remote-users-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-remote-users-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-replicate-post-64ddeafe0a6eb1f3dc3db9049ece872d.yaml b/nuclei-templates/cve-less/plugins/wp-replicate-post-64ddeafe0a6eb1f3dc3db9049ece872d.yaml new file mode 100644 index 0000000000..fc563b9e1e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-replicate-post-64ddeafe0a6eb1f3dc3db9049ece872d.yaml @@ -0,0 +1,58 @@ +id: wp-replicate-post-64ddeafe0a6eb1f3dc3db9049ece872d + +info: + name: > + WP Replicate Post <= 4.0.2 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/916e6f8b-cb29-4062-9a05-0337cfdb382a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-replicate-post/" + google-query: inurl:"/wp-content/plugins/wp-replicate-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-replicate-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-replicate-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-replicate-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reply-notify-ad6d214a4db8beee18bddf61121faca2.yaml b/nuclei-templates/cve-less/plugins/wp-reply-notify-ad6d214a4db8beee18bddf61121faca2.yaml new file mode 100644 index 0000000000..48d1d40fbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reply-notify-ad6d214a4db8beee18bddf61121faca2.yaml @@ -0,0 +1,58 @@ +id: wp-reply-notify-ad6d214a4db8beee18bddf61121faca2 + +info: + name: > + WP-Reply Notify <= 1.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/837e596e-a4a7-4fcf-a761-aed35a789770?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reply-notify/" + google-query: inurl:"/wp-content/plugins/wp-reply-notify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reply-notify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reply-notify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reply-notify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-report-post-1540a4d1322834c5a338a51354b58ee1.yaml b/nuclei-templates/cve-less/plugins/wp-report-post-1540a4d1322834c5a338a51354b58ee1.yaml new file mode 100644 index 0000000000..83326a6f00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-report-post-1540a4d1322834c5a338a51354b58ee1.yaml @@ -0,0 +1,58 @@ +id: wp-report-post-1540a4d1322834c5a338a51354b58ee1 + +info: + name: > + WP Report Post <= 2.1.2 - Authenticated (Editor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dae13e5-cee7-4392-af71-7d466ba6f6c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-report-post/" + google-query: inurl:"/wp-content/plugins/wp-report-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-report-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-report-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-report-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-report-post-b9c578185717d2a2b3d8049789a9a952.yaml b/nuclei-templates/cve-less/plugins/wp-report-post-b9c578185717d2a2b3d8049789a9a952.yaml new file mode 100644 index 0000000000..f12df6ba5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-report-post-b9c578185717d2a2b3d8049789a9a952.yaml @@ -0,0 +1,58 @@ +id: wp-report-post-b9c578185717d2a2b3d8049789a9a952 + +info: + name: > + WP Report Post <= 2.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09e28b72-55c6-4f2f-b689-a8989945651b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-report-post/" + google-query: inurl:"/wp-content/plugins/wp-report-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-report-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-report-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-report-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-report-post-fdf3c9a8ce0d028a3ed00c7adbf8cbb4.yaml b/nuclei-templates/cve-less/plugins/wp-report-post-fdf3c9a8ce0d028a3ed00c7adbf8cbb4.yaml new file mode 100644 index 0000000000..7128e43d88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-report-post-fdf3c9a8ce0d028a3ed00c7adbf8cbb4.yaml @@ -0,0 +1,58 @@ +id: wp-report-post-fdf3c9a8ce0d028a3ed00c7adbf8cbb4 + +info: + name: > + WP Report Post <= 2.1.2 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a273e7-eb8a-4cfa-80c2-f87d04a6a33e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-report-post/" + google-query: inurl:"/wp-content/plugins/wp-report-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-report-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-report-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-report-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-repost-0e94306a43ae08419eb38c17f3bdf17f.yaml b/nuclei-templates/cve-less/plugins/wp-repost-0e94306a43ae08419eb38c17f3bdf17f.yaml new file mode 100644 index 0000000000..d6fe3cd29d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-repost-0e94306a43ae08419eb38c17f3bdf17f.yaml @@ -0,0 +1,58 @@ +id: wp-repost-0e94306a43ae08419eb38c17f3bdf17f + +info: + name: > + WP Repost <= 0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbf0f614-e5e9-486c-a0dd-cd494708a2a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-repost/" + google-query: inurl:"/wp-content/plugins/wp-repost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-repost,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-repost/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-repost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-repost-f62d90a1456165ae9d04c07d4bf69a25.yaml b/nuclei-templates/cve-less/plugins/wp-repost-f62d90a1456165ae9d04c07d4bf69a25.yaml new file mode 100644 index 0000000000..5565daef40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-repost-f62d90a1456165ae9d04c07d4bf69a25.yaml @@ -0,0 +1,58 @@ +id: wp-repost-f62d90a1456165ae9d04c07d4bf69a25 + +info: + name: > + WP Repost <= 0.1 - Authenticated (Administrator+) Stored Cross-Site Scritping + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/438689aa-3b85-4dd7-ac3e-a37906efd79c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-repost/" + google-query: inurl:"/wp-content/plugins/wp-repost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-repost,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-repost/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-repost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reroute-email-1c70785f67dd945fd36f027518750446.yaml b/nuclei-templates/cve-less/plugins/wp-reroute-email-1c70785f67dd945fd36f027518750446.yaml new file mode 100644 index 0000000000..59b9ccbd22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reroute-email-1c70785f67dd945fd36f027518750446.yaml @@ -0,0 +1,58 @@ +id: wp-reroute-email-1c70785f67dd945fd36f027518750446 + +info: + name: > + WP Reroute Email <= 1.4.9 - Unauthenticated Stored Cross-Site Scripting via Email Subject + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a0e962b-b6a0-4179-91d0-5ede508a9895?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reroute-email/" + google-query: inurl:"/wp-content/plugins/wp-reroute-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reroute-email,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reroute-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reroute-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reroute-email-20b79e43dd02b60a0996dbe99e7ba439.yaml b/nuclei-templates/cve-less/plugins/wp-reroute-email-20b79e43dd02b60a0996dbe99e7ba439.yaml new file mode 100644 index 0000000000..0ece48b932 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reroute-email-20b79e43dd02b60a0996dbe99e7ba439.yaml @@ -0,0 +1,58 @@ +id: wp-reroute-email-20b79e43dd02b60a0996dbe99e7ba439 + +info: + name: > + WP Reroute Email <= 1.4.6 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/395a8ca6-78b8-43f2-8e8c-896702b5da0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reroute-email/" + google-query: inurl:"/wp-content/plugins/wp-reroute-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reroute-email,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reroute-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reroute-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reroute-email-ca75f0bb6be077d73d2ab1f9278e0078.yaml b/nuclei-templates/cve-less/plugins/wp-reroute-email-ca75f0bb6be077d73d2ab1f9278e0078.yaml new file mode 100644 index 0000000000..fdb255e47f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reroute-email-ca75f0bb6be077d73d2ab1f9278e0078.yaml @@ -0,0 +1,58 @@ +id: wp-reroute-email-ca75f0bb6be077d73d2ab1f9278e0078 + +info: + name: > + WP Reroute Email <= 1.4.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c3a047f-be12-4308-a4a5-fbbbc37f674d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reroute-email/" + google-query: inurl:"/wp-content/plugins/wp-reroute-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reroute-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reroute-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reroute-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reset-07bd4b69b402b2bb38b733353ad05536.yaml b/nuclei-templates/cve-less/plugins/wp-reset-07bd4b69b402b2bb38b733353ad05536.yaml new file mode 100644 index 0000000000..f60268d608 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reset-07bd4b69b402b2bb38b733353ad05536.yaml @@ -0,0 +1,58 @@ +id: wp-reset-07bd4b69b402b2bb38b733353ad05536 + +info: + name: > + WP Reset – Most Advanced WordPress Reset Tool (PRO) 5.00- 5.98 - Missing Authorization to Database Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e91fabe-469f-4743-bb8d-76ef20313b37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reset/" + google-query: inurl:"/wp-content/plugins/wp-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reset,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 5.00', '<= 5.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reset-1ac9ed75dda676d9de3cd3380fd4d32a.yaml b/nuclei-templates/cve-less/plugins/wp-reset-1ac9ed75dda676d9de3cd3380fd4d32a.yaml new file mode 100644 index 0000000000..da7f7e3356 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reset-1ac9ed75dda676d9de3cd3380fd4d32a.yaml @@ -0,0 +1,58 @@ +id: wp-reset-1ac9ed75dda676d9de3cd3380fd4d32a + +info: + name: > + WP Reset PRO 5.00-5.98 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66afddee-a136-4c71-9e5d-3cc1552010cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reset/" + google-query: inurl:"/wp-content/plugins/wp-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reset,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 5.00', '<= 5.98') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reset-83fdf9d48a350c095ff472b1a9a82eb4.yaml b/nuclei-templates/cve-less/plugins/wp-reset-83fdf9d48a350c095ff472b1a9a82eb4.yaml new file mode 100644 index 0000000000..ffb88c83db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reset-83fdf9d48a350c095ff472b1a9a82eb4.yaml @@ -0,0 +1,58 @@ +id: wp-reset-83fdf9d48a350c095ff472b1a9a82eb4 + +info: + name: > + WP Reset <= 2.0 - Sensitive Information Exposure due to Insufficient Randomness + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68f41e88-ed36-4361-bddd-41495a540cd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reset/" + google-query: inurl:"/wp-content/plugins/wp-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reset,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reset-dc229c244bcfffc7d06d63944e8371c4.yaml b/nuclei-templates/cve-less/plugins/wp-reset-dc229c244bcfffc7d06d63944e8371c4.yaml new file mode 100644 index 0000000000..5de803641f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reset-dc229c244bcfffc7d06d63944e8371c4.yaml @@ -0,0 +1,58 @@ +id: wp-reset-dc229c244bcfffc7d06d63944e8371c4 + +info: + name: > + WP Reset <= 1.86 - Authenticated Stored Cross-Site Scripting via extra_data Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0252d07a-cf84-479d-a71b-a9b13a9765d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reset/" + google-query: inurl:"/wp-content/plugins/wp-reset/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reset,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reset/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reset" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.86') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-menu-56eaa7b8dc455f22f829544599237693.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-menu-56eaa7b8dc455f22f829544599237693.yaml new file mode 100644 index 0000000000..ae63b584c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-menu-56eaa7b8dc455f22f829544599237693.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-menu-56eaa7b8dc455f22f829544599237693 + +info: + name: > + WP Responsive Menu <= 3.1.7 - Missing Authorization to Settings Update & Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d0a822f-94b2-4875-b4b2-5c866555e3bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-menu/" + google-query: inurl:"/wp-content/plugins/wp-responsive-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-menu,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-photo-gallery-d5756f65fb344b6553377b88f83d5a57.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-photo-gallery-d5756f65fb344b6553377b88f83d5a57.yaml new file mode 100644 index 0000000000..f4566ceb65 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-photo-gallery-d5756f65fb344b6553377b88f83d5a57.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-photo-gallery-d5756f65fb344b6553377b88f83d5a57 + +info: + name: > + Photo Gallery Slideshow & Masonry Tiled Gallery <= 1.0.13 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51a1c2de-56be-4487-874a-a916e8a6992a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-photo-gallery/" + google-query: inurl:"/wp-content/plugins/wp-responsive-photo-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-photo-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-photo-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-photo-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-preview-9f9f1456664e215602c73448e19f0749.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-preview-9f9f1456664e215602c73448e19f0749.yaml new file mode 100644 index 0000000000..c79edbc62d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-preview-9f9f1456664e215602c73448e19f0749.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-preview-9f9f1456664e215602c73448e19f0749 + +info: + name: > + WordPress Responsive Preview <= 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/221a8ff6-1f6e-41a0-82ef-eaa14ff84a26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-preview/" + google-query: inurl:"/wp-content/plugins/wp-responsive-preview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-preview,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-preview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-preview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-recent-post-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-recent-post-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..e0a08ddd93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-recent-post-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-recent-post-slider-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-recent-post-slider/" + google-query: inurl:"/wp-content/plugins/wp-responsive-recent-post-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-recent-post-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-recent-post-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-recent-post-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-25a9f7730c5842083500e9e166082efc.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-25a9f7730c5842083500e9e166082efc.yaml new file mode 100644 index 0000000000..2e59c1cba0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-25a9f7730c5842083500e9e166082efc.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-slider-with-lightbox-25a9f7730c5842083500e9e166082efc + +info: + name: > + Thumbnail Slider With Lightbox <= 1.0 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e51e1cd2-6de9-4820-8bba-1c6b5053e2c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-slider-with-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-responsive-slider-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-slider-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-slider-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-slider-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-892de5c9148c6f8df52be6ed544382d2.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-892de5c9148c6f8df52be6ed544382d2.yaml new file mode 100644 index 0000000000..c4afd254fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-892de5c9148c6f8df52be6ed544382d2.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-slider-with-lightbox-892de5c9148c6f8df52be6ed544382d2 + +info: + name: > + Thumbnail Slider With Lightbox <= 1.0.17 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33b92a86-bb3e-4307-b2cb-7dfde56505cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-slider-with-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-responsive-slider-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-slider-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-slider-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-slider-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-bd4c9f634768986dc47827bf4d97837f.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-bd4c9f634768986dc47827bf4d97837f.yaml new file mode 100644 index 0000000000..5134e7e563 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-bd4c9f634768986dc47827bf4d97837f.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-slider-with-lightbox-bd4c9f634768986dc47827bf4d97837f + +info: + name: > + Thumbnail Slider With Lightbox <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/055b7ed5-268a-485e-ac7d-8082dc9fb2ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-slider-with-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-responsive-slider-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-slider-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-slider-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-slider-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-f125bb3227f74edc5c60e8c9d6eb9da3.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-f125bb3227f74edc5c60e8c9d6eb9da3.yaml new file mode 100644 index 0000000000..d826fc3960 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-slider-with-lightbox-f125bb3227f74edc5c60e8c9d6eb9da3.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-slider-with-lightbox-f125bb3227f74edc5c60e8c9d6eb9da3 + +info: + name: > + Thumbnail Slider With Lightbox <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via Image Title + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/547c425d-8b0f-4e65-8b8a-c3a3059301fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-slider-with-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-responsive-slider-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-slider-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-slider-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-slider-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-testimonials-slider-and-widget-6ee9ba365ca511bfc329f7df63da810e.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-testimonials-slider-and-widget-6ee9ba365ca511bfc329f7df63da810e.yaml new file mode 100644 index 0000000000..3f10d660bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-testimonials-slider-and-widget-6ee9ba365ca511bfc329f7df63da810e.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-testimonials-slider-and-widget-6ee9ba365ca511bfc329f7df63da810e + +info: + name: > + WP Responsive Testimonials Slider And Widget <= 1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17f118c5-c485-448b-8ab7-3f7fd44be583?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-testimonials-slider-and-widget/" + google-query: inurl:"/wp-content/plugins/wp-responsive-testimonials-slider-and-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-testimonials-slider-and-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-testimonials-slider-and-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-testimonials-slider-and-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-2f648ce81ebcdfff75d3b5dc6ad4dbca.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-2f648ce81ebcdfff75d3b5dc6ad4dbca.yaml new file mode 100644 index 0000000000..55d10a4d3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-2f648ce81ebcdfff75d3b5dc6ad4dbca.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-thumbnail-slider-2f648ce81ebcdfff75d3b5dc6ad4dbca + +info: + name: > + Thumbnail carousel slider <= 1.1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4bf4e12-5cbb-45bc-938e-62163baaa15d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-thumbnail-slider/" + google-query: inurl:"/wp-content/plugins/wp-responsive-thumbnail-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-thumbnail-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-thumbnail-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-thumbnail-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-44dea4f7c7575cbbd8f534048f1c0dce.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-44dea4f7c7575cbbd8f534048f1c0dce.yaml new file mode 100644 index 0000000000..07d54a640b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-44dea4f7c7575cbbd8f534048f1c0dce.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-thumbnail-slider-44dea4f7c7575cbbd8f534048f1c0dce + +info: + name: > + Responsive Thumbnail Slider < 1.0.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c396ae6-d34c-4554-b670-28868dc136a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-thumbnail-slider/" + google-query: inurl:"/wp-content/plugins/wp-responsive-thumbnail-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-thumbnail-slider,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-thumbnail-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-thumbnail-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-568c91e024801d5d2e19e257aa73eeab.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-568c91e024801d5d2e19e257aa73eeab.yaml new file mode 100644 index 0000000000..9be89b5dd6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-568c91e024801d5d2e19e257aa73eeab.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-thumbnail-slider-568c91e024801d5d2e19e257aa73eeab + +info: + name: > + Thumbnail carousel slider < 1.0.1 - Stored Cross-Site Scripting and Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f87d37a-879f-4506-a651-8c965a558e28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-thumbnail-slider/" + google-query: inurl:"/wp-content/plugins/wp-responsive-thumbnail-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-thumbnail-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-thumbnail-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-thumbnail-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-961b204cf44c68d337a8c4abce4e5661.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-961b204cf44c68d337a8c4abce4e5661.yaml new file mode 100644 index 0000000000..f778efd63c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-961b204cf44c68d337a8c4abce4e5661.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-thumbnail-slider-961b204cf44c68d337a8c4abce4e5661 + +info: + name: > + Thumbnail carousel slider <= 1.0 - Cross-Site Request Forgery to Mass Slider Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bde75c5a-b0b7-4f26-91e9-dd4816e276c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-thumbnail-slider/" + google-query: inurl:"/wp-content/plugins/wp-responsive-thumbnail-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-thumbnail-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-thumbnail-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-thumbnail-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-b2718ea6f3f6ed667b8cfc7c6db95d2f.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-b2718ea6f3f6ed667b8cfc7c6db95d2f.yaml new file mode 100644 index 0000000000..7ab3e9a34b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-thumbnail-slider-b2718ea6f3f6ed667b8cfc7c6db95d2f.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-thumbnail-slider-b2718ea6f3f6ed667b8cfc7c6db95d2f + +info: + name: > + Thumbnail carousel slider <= 1.1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99711f41-d21b-4725-acc8-9542283daf12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-thumbnail-slider/" + google-query: inurl:"/wp-content/plugins/wp-responsive-thumbnail-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-thumbnail-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-thumbnail-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-thumbnail-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-video-gallery-with-lightbox-c3b3583607c5150ae09b547b67030790.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-video-gallery-with-lightbox-c3b3583607c5150ae09b547b67030790.yaml new file mode 100644 index 0000000000..a8113a54d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-video-gallery-with-lightbox-c3b3583607c5150ae09b547b67030790.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-video-gallery-with-lightbox-c3b3583607c5150ae09b547b67030790 + +info: + name: > + video carousel slider with lightbox 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc052b00-65a7-4668-8bdd-b06d69d12a4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-video-gallery-with-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-responsive-video-gallery-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-video-gallery-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-video-gallery-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-video-gallery-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-responsive-video-gallery-with-lightbox-e1d3d085ab54042265af9032b57a352b.yaml b/nuclei-templates/cve-less/plugins/wp-responsive-video-gallery-with-lightbox-e1d3d085ab54042265af9032b57a352b.yaml new file mode 100644 index 0000000000..6d01016589 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-responsive-video-gallery-with-lightbox-e1d3d085ab54042265af9032b57a352b.yaml @@ -0,0 +1,58 @@ +id: wp-responsive-video-gallery-with-lightbox-e1d3d085ab54042265af9032b57a352b + +info: + name: > + video carousel slider with lightbox <= 1.0.22 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e88bb3a8-de24-46fb-a3e4-9ca3fdd4cca7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-responsive-video-gallery-with-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-responsive-video-gallery-with-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-responsive-video-gallery-with-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-responsive-video-gallery-with-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-responsive-video-gallery-with-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rest-api-authentication-c4daa9433506094793f25873e18663b9.yaml b/nuclei-templates/cve-less/plugins/wp-rest-api-authentication-c4daa9433506094793f25873e18663b9.yaml new file mode 100644 index 0000000000..c280110779 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rest-api-authentication-c4daa9433506094793f25873e18663b9.yaml @@ -0,0 +1,58 @@ +id: wp-rest-api-authentication-c4daa9433506094793f25873e18663b9 + +info: + name: > + WordPress REST API Authentication <= 2.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bdb35f31-60a6-40b5-aed3-102a1c8c4fd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rest-api-authentication/" + google-query: inurl:"/wp-content/plugins/wp-rest-api-authentication/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rest-api-authentication,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rest-api-authentication/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rest-api-authentication" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-restful-db7767ed937dfde97dcfb07b299497ed.yaml b/nuclei-templates/cve-less/plugins/wp-restful-db7767ed937dfde97dcfb07b299497ed.yaml new file mode 100644 index 0000000000..65997d06f6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-restful-db7767ed937dfde97dcfb07b299497ed.yaml @@ -0,0 +1,58 @@ +id: wp-restful-db7767ed937dfde97dcfb07b299497ed + +info: + name: > + WP Restful <= 0.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fab1e59-5123-4ccb-bc0c-b8908643af89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-restful/" + google-query: inurl:"/wp-content/plugins/wp-restful/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-restful,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-restful/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-restful" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-retina-2x-575007d168cd026eefe7a606e43b0e70.yaml b/nuclei-templates/cve-less/plugins/wp-retina-2x-575007d168cd026eefe7a606e43b0e70.yaml new file mode 100644 index 0000000000..c05473c95c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-retina-2x-575007d168cd026eefe7a606e43b0e70.yaml @@ -0,0 +1,58 @@ +id: wp-retina-2x-575007d168cd026eefe7a606e43b0e70 + +info: + name: > + WP Retina 2x <= 6.4.5 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52c2aae5-17c2-45eb-b55f-bb27555fb1f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-retina-2x/" + google-query: inurl:"/wp-content/plugins/wp-retina-2x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-retina-2x,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-retina-2x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-retina-2x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-retina-2x-6bed45cc7ffa2c1423965f9f86a13b79.yaml b/nuclei-templates/cve-less/plugins/wp-retina-2x-6bed45cc7ffa2c1423965f9f86a13b79.yaml new file mode 100644 index 0000000000..e0f4e8d5b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-retina-2x-6bed45cc7ffa2c1423965f9f86a13b79.yaml @@ -0,0 +1,58 @@ +id: wp-retina-2x-6bed45cc7ffa2c1423965f9f86a13b79 + +info: + name: > + Perfect Images <= 5.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9f3349e-de64-498e-bb82-5ceff1456265?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-retina-2x/" + google-query: inurl:"/wp-content/plugins/wp-retina-2x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-retina-2x,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-retina-2x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-retina-2x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-retina-2x-ad6eca81b2e556f270b3ae3f5090cf96.yaml b/nuclei-templates/cve-less/plugins/wp-retina-2x-ad6eca81b2e556f270b3ae3f5090cf96.yaml new file mode 100644 index 0000000000..b90b0c1d1a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-retina-2x-ad6eca81b2e556f270b3ae3f5090cf96.yaml @@ -0,0 +1,58 @@ +id: wp-retina-2x-ad6eca81b2e556f270b3ae3f5090cf96 + +info: + name: > + WP Retina 2x <= 5.2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09618198-06fd-438b-a526-c7bf5b2570a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-retina-2x/" + google-query: inurl:"/wp-content/plugins/wp-retina-2x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-retina-2x,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-retina-2x/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-retina-2x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-46456613c7a836ce3b1a8f48d3151f77.yaml b/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-46456613c7a836ce3b1a8f48d3151f77.yaml new file mode 100644 index 0000000000..1499d42664 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-46456613c7a836ce3b1a8f48d3151f77.yaml @@ -0,0 +1,58 @@ +id: wp-reviews-plugin-for-google-46456613c7a836ce3b1a8f48d3151f77 + +info: + name: > + Widgets for Google Reviews < 9.8 - Authenticated (Contributor+) Stored XSS + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8540b8f3-aace-4559-b83c-6244f2249548?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reviews-plugin-for-google/" + google-query: inurl:"/wp-content/plugins/wp-reviews-plugin-for-google/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reviews-plugin-for-google,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reviews-plugin-for-google/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reviews-plugin-for-google" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-61b7e681fc2aebd347be4e6d876bf4f7.yaml b/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-61b7e681fc2aebd347be4e6d876bf4f7.yaml new file mode 100644 index 0000000000..cc4a644f06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-61b7e681fc2aebd347be4e6d876bf4f7.yaml @@ -0,0 +1,58 @@ +id: wp-reviews-plugin-for-google-61b7e681fc2aebd347be4e6d876bf4f7 + +info: + name: > + Multiple Plugins by Trustindex.io <= (Various Versions)- Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/504c0132-530b-4184-b19a-97e68df79b48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reviews-plugin-for-google/" + google-query: inurl:"/wp-content/plugins/wp-reviews-plugin-for-google/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reviews-plugin-for-google,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reviews-plugin-for-google/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reviews-plugin-for-google" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-ed0f9423d4c48dfd65b856931b8ae551.yaml b/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-ed0f9423d4c48dfd65b856931b8ae551.yaml new file mode 100644 index 0000000000..3a41030f37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-reviews-plugin-for-google-ed0f9423d4c48dfd65b856931b8ae551.yaml @@ -0,0 +1,58 @@ +id: wp-reviews-plugin-for-google-ed0f9423d4c48dfd65b856931b8ae551 + +info: + name: > + Widgets for Google Reviews <= 10.9 - Cross-Site Request Forgery to Plugin Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70968476-b064-477f-999f-4aa2c51d89cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-reviews-plugin-for-google/" + google-query: inurl:"/wp-content/plugins/wp-reviews-plugin-for-google/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-reviews-plugin-for-google,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-reviews-plugin-for-google/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-reviews-plugin-for-google" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-roadmap-1c48d6771b0e3d17023908b8bdc75005.yaml b/nuclei-templates/cve-less/plugins/wp-roadmap-1c48d6771b0e3d17023908b8bdc75005.yaml new file mode 100644 index 0000000000..1f0eca942f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-roadmap-1c48d6771b0e3d17023908b8bdc75005.yaml @@ -0,0 +1,58 @@ +id: wp-roadmap-1c48d6771b0e3d17023908b8bdc75005 + +info: + name: > + WP Roadmap <= 1.0.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24fc2554-375a-4216-91bf-41921cc4b436?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-roadmap/" + google-query: inurl:"/wp-content/plugins/wp-roadmap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-roadmap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-roadmap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-roadmap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rocket-b300eab2789f0638494228aea0ada3b0.yaml b/nuclei-templates/cve-less/plugins/wp-rocket-b300eab2789f0638494228aea0ada3b0.yaml new file mode 100644 index 0000000000..052403df5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rocket-b300eab2789f0638494228aea0ada3b0.yaml @@ -0,0 +1,58 @@ +id: wp-rocket-b300eab2789f0638494228aea0ada3b0 + +info: + name: > + WP Rocket <= 2.10.3 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9167e4bd-74be-46c9-b06e-566c13c02c7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rocket/" + google-query: inurl:"/wp-content/plugins/wp-rocket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rocket,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rocket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rocket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-roles-at-registration-0822b2c02c49629a19bf084eb6d8580a.yaml b/nuclei-templates/cve-less/plugins/wp-roles-at-registration-0822b2c02c49629a19bf084eb6d8580a.yaml new file mode 100644 index 0000000000..a13810b1f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-roles-at-registration-0822b2c02c49629a19bf084eb6d8580a.yaml @@ -0,0 +1,58 @@ +id: wp-roles-at-registration-0822b2c02c49629a19bf084eb6d8580a + +info: + name: > + WP Roles at Registration <= 0.23 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a4eeb77-7a8b-489f-8ded-bbe09e881758?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-roles-at-registration/" + google-query: inurl:"/wp-content/plugins/wp-roles-at-registration/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-roles-at-registration,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-roles-at-registration/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-roles-at-registration" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.23') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rollback-79ab1b5d546d12b519823b2566724735.yaml b/nuclei-templates/cve-less/plugins/wp-rollback-79ab1b5d546d12b519823b2566724735.yaml new file mode 100644 index 0000000000..33cec0e4da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rollback-79ab1b5d546d12b519823b2566724735.yaml @@ -0,0 +1,58 @@ +id: wp-rollback-79ab1b5d546d12b519823b2566724735 + +info: + name: > + Rollback < 1.2.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0d68506-ee5c-4b01-a0d2-caf2482106e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rollback/" + google-query: inurl:"/wp-content/plugins/wp-rollback/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rollback,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rollback/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rollback" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rollback-7a4c9972726e4955d433f6a7b81c1d28.yaml b/nuclei-templates/cve-less/plugins/wp-rollback-7a4c9972726e4955d433f6a7b81c1d28.yaml new file mode 100644 index 0000000000..ce4ca90aa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rollback-7a4c9972726e4955d433f6a7b81c1d28.yaml @@ -0,0 +1,58 @@ +id: wp-rollback-7a4c9972726e4955d433f6a7b81c1d28 + +info: + name: > + WP Rollback < 1.2.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a3cfa87-ad48-401c-b823-f61d5a7af680?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rollback/" + google-query: inurl:"/wp-content/plugins/wp-rollback/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rollback,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rollback/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rollback" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-aggregator-2565b37cf24425d8b3b9a64e0058d4a4.yaml b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-2565b37cf24425d8b3b9a64e0058d4a4.yaml new file mode 100644 index 0000000000..305d330ace --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-2565b37cf24425d8b3b9a64e0058d4a4.yaml @@ -0,0 +1,58 @@ +id: wp-rss-aggregator-2565b37cf24425d8b3b9a64e0058d4a4 + +info: + name: > + WP RSS Aggregator <= 4.23.4 - Authenticated (Admin+) Stored Cross-Site Scripting via RSS Feed Source + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93cb3b29-b1a0-4d40-a057-1b41f3b181f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-aggregator/" + google-query: inurl:"/wp-content/plugins/wp-rss-aggregator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-aggregator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-aggregator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-aggregator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.23.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-aggregator-49339be9905399af5760c326a04d9feb.yaml b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-49339be9905399af5760c326a04d9feb.yaml new file mode 100644 index 0000000000..be0e8f8223 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-49339be9905399af5760c326a04d9feb.yaml @@ -0,0 +1,58 @@ +id: wp-rss-aggregator-49339be9905399af5760c326a04d9feb + +info: + name: > + WP RSS Aggregator – News Feeds, Autoblogging, Youtube Video Feeds and More <= 4.6.3 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a46364f4-9258-4f5e-9d53-dcbaf726f2f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-aggregator/" + google-query: inurl:"/wp-content/plugins/wp-rss-aggregator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-aggregator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-aggregator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-aggregator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-aggregator-788781eedb2bbfc885e59d651ce4ff66.yaml b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-788781eedb2bbfc885e59d651ce4ff66.yaml new file mode 100644 index 0000000000..38f9a98534 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-788781eedb2bbfc885e59d651ce4ff66.yaml @@ -0,0 +1,58 @@ +id: wp-rss-aggregator-788781eedb2bbfc885e59d651ce4ff66 + +info: + name: > + WP RSS Aggregator <= 4.19.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b4bb70a-ee8e-4e1a-9989-7658307bedc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-aggregator/" + google-query: inurl:"/wp-content/plugins/wp-rss-aggregator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-aggregator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-aggregator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-aggregator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-aggregator-7a5699f4eb992769878daf8812d2e5b5.yaml b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-7a5699f4eb992769878daf8812d2e5b5.yaml new file mode 100644 index 0000000000..18fde34361 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-7a5699f4eb992769878daf8812d2e5b5.yaml @@ -0,0 +1,58 @@ +id: wp-rss-aggregator-7a5699f4eb992769878daf8812d2e5b5 + +info: + name: > + WP RSS Aggregator <= 4.23.5 - Authenticated (Admin+) Server-Side Request Forgery via RSS Feed Source + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2154383e-eabb-4964-8991-423dd68d5efb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-aggregator/" + google-query: inurl:"/wp-content/plugins/wp-rss-aggregator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-aggregator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-aggregator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-aggregator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '4.23.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-aggregator-b26100fb2d07199c87c48d6d1e20e10e.yaml b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-b26100fb2d07199c87c48d6d1e20e10e.yaml new file mode 100644 index 0000000000..12de2d62dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-b26100fb2d07199c87c48d6d1e20e10e.yaml @@ -0,0 +1,58 @@ +id: wp-rss-aggregator-b26100fb2d07199c87c48d6d1e20e10e + +info: + name: > + WP RSS Aggregator <= 4.19.2 - Subscriber+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5776ae23-3846-41bf-92dd-948230c334bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-aggregator/" + google-query: inurl:"/wp-content/plugins/wp-rss-aggregator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-aggregator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-aggregator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-aggregator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-aggregator-c9743e9890778c464db472a56cb6fc0e.yaml b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-c9743e9890778c464db472a56cb6fc0e.yaml new file mode 100644 index 0000000000..0b76bb299b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-aggregator-c9743e9890778c464db472a56cb6fc0e.yaml @@ -0,0 +1,58 @@ +id: wp-rss-aggregator-c9743e9890778c464db472a56cb6fc0e + +info: + name: > + WP RSS Aggregator <= 4.19.1 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d8a530-53fd-4e2f-aa57-d75c89dc2a51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-aggregator/" + google-query: inurl:"/wp-content/plugins/wp-rss-aggregator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-aggregator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-aggregator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-aggregator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-462fb716ec2f0ec4e2f418a785fb1df8.yaml b/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-462fb716ec2f0ec4e2f418a785fb1df8.yaml new file mode 100644 index 0000000000..6b8284c70f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-462fb716ec2f0ec4e2f418a785fb1df8.yaml @@ -0,0 +1,58 @@ +id: wp-rss-by-publishers-462fb716ec2f0ec4e2f418a785fb1df8 + +info: + name: > + WP RSS By Publishers <= 0.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3940232c-b3d4-488b-830d-797bdab9cfbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-by-publishers/" + google-query: inurl:"/wp-content/plugins/wp-rss-by-publishers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-by-publishers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-by-publishers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-by-publishers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-74b1a71215563001aea36d2a3bce8f35.yaml b/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-74b1a71215563001aea36d2a3bce8f35.yaml new file mode 100644 index 0000000000..9b5b0e69d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-74b1a71215563001aea36d2a3bce8f35.yaml @@ -0,0 +1,58 @@ +id: wp-rss-by-publishers-74b1a71215563001aea36d2a3bce8f35 + +info: + name: > + WP RSS By Publishers <= 0.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66bc8d9c-1a5f-4dca-b15f-8fdf821dbc6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-by-publishers/" + google-query: inurl:"/wp-content/plugins/wp-rss-by-publishers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-by-publishers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-by-publishers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-by-publishers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-ee3fe625ab8f88885d07211e8987b8d5.yaml b/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-ee3fe625ab8f88885d07211e8987b8d5.yaml new file mode 100644 index 0000000000..b343116db7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-by-publishers-ee3fe625ab8f88885d07211e8987b8d5.yaml @@ -0,0 +1,58 @@ +id: wp-rss-by-publishers-ee3fe625ab8f88885d07211e8987b8d5 + +info: + name: > + WP RSS By Publishers <= 0.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3745b681-cb09-4a5b-a57b-c7f35b8c5133?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-by-publishers/" + google-query: inurl:"/wp-content/plugins/wp-rss-by-publishers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-by-publishers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-by-publishers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-by-publishers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-images-2efaa05e7b1e6abe1f42ac71047e9bba.yaml b/nuclei-templates/cve-less/plugins/wp-rss-images-2efaa05e7b1e6abe1f42ac71047e9bba.yaml new file mode 100644 index 0000000000..063c09ad59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-images-2efaa05e7b1e6abe1f42ac71047e9bba.yaml @@ -0,0 +1,58 @@ +id: wp-rss-images-2efaa05e7b1e6abe1f42ac71047e9bba + +info: + name: > + WP RSS Images <= 1.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adb70798-2ef9-4384-bcca-8862afa044ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-images/" + google-query: inurl:"/wp-content/plugins/wp-rss-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-multi-importer-7725287d44cd6757cf277fdd17b26ca6.yaml b/nuclei-templates/cve-less/plugins/wp-rss-multi-importer-7725287d44cd6757cf277fdd17b26ca6.yaml new file mode 100644 index 0000000000..e16ff90034 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-multi-importer-7725287d44cd6757cf277fdd17b26ca6.yaml @@ -0,0 +1,58 @@ +id: wp-rss-multi-importer-7725287d44cd6757cf277fdd17b26ca6 + +info: + name: > + WP RSS Multi Importer < 3.14 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe0fedc1-d4bd-40bf-8d8f-953db4bf2120?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-multi-importer/" + google-query: inurl:"/wp-content/plugins/wp-rss-multi-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-multi-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-multi-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-multi-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-poster-59933ed8813fc650ac85aae65e91d1d9.yaml b/nuclei-templates/cve-less/plugins/wp-rss-poster-59933ed8813fc650ac85aae65e91d1d9.yaml new file mode 100644 index 0000000000..3d2802c55e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-poster-59933ed8813fc650ac85aae65e91d1d9.yaml @@ -0,0 +1,58 @@ +id: wp-rss-poster-59933ed8813fc650ac85aae65e91d1d9 + +info: + name: > + WP Rss Poster <= 1.0.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fd2ed33-6977-4480-bdcb-d7afae7bfd06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-poster/" + google-query: inurl:"/wp-content/plugins/wp-rss-poster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-poster,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-poster/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-poster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-retriever-122cd7a43161913d8685a15b660bcb12.yaml b/nuclei-templates/cve-less/plugins/wp-rss-retriever-122cd7a43161913d8685a15b660bcb12.yaml new file mode 100644 index 0000000000..9b0860d4dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-retriever-122cd7a43161913d8685a15b660bcb12.yaml @@ -0,0 +1,58 @@ +id: wp-rss-retriever-122cd7a43161913d8685a15b660bcb12 + +info: + name: > + WordPress RSS Feed Retriever <= 1.6.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62559fd6-a338-4f0f-ab1a-33fffbdc687e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-retriever/" + google-query: inurl:"/wp-content/plugins/wp-rss-retriever/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-retriever,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-retriever/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-retriever" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-rss-retriever-9183c93b61003074c2d21915934372a5.yaml b/nuclei-templates/cve-less/plugins/wp-rss-retriever-9183c93b61003074c2d21915934372a5.yaml new file mode 100644 index 0000000000..c61badc08e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-rss-retriever-9183c93b61003074c2d21915934372a5.yaml @@ -0,0 +1,58 @@ +id: wp-rss-retriever-9183c93b61003074c2d21915934372a5 + +info: + name: > + WordPress RSS Feed Retriever <= 1.6.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/822a3b3b-db39-4edc-ae68-80fb82359316?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-rss-retriever/" + google-query: inurl:"/wp-content/plugins/wp-rss-retriever/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-rss-retriever,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-rss-retriever/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-rss-retriever" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-s3-693d96d86e403672dd1c5e131a4895d3.yaml b/nuclei-templates/cve-less/plugins/wp-s3-693d96d86e403672dd1c5e131a4895d3.yaml new file mode 100644 index 0000000000..f998b4ddb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-s3-693d96d86e403672dd1c5e131a4895d3.yaml @@ -0,0 +1,58 @@ +id: wp-s3-693d96d86e403672dd1c5e131a4895d3 + +info: + name: > + WordPress Amazon S3 Plugin <= 1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab779713-7004-47f6-af16-2db2c7c1013b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-s3/" + google-query: inurl:"/wp-content/plugins/wp-s3/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-s3,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-s3/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-s3" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-s3-smart-upload-00fe1d8fca57ad1440836b41da0ce6fd.yaml b/nuclei-templates/cve-less/plugins/wp-s3-smart-upload-00fe1d8fca57ad1440836b41da0ce6fd.yaml new file mode 100644 index 0000000000..52eb62de11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-s3-smart-upload-00fe1d8fca57ad1440836b41da0ce6fd.yaml @@ -0,0 +1,58 @@ +id: wp-s3-smart-upload-00fe1d8fca57ad1440836b41da0ce6fd + +info: + name: > + SSU <= 1.5.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d488cfef-8ee7-483a-94f2-c172e5576005?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-s3-smart-upload/" + google-query: inurl:"/wp-content/plugins/wp-s3-smart-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-s3-smart-upload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-s3-smart-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-s3-smart-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-safe-search-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml b/nuclei-templates/cve-less/plugins/wp-safe-search-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml new file mode 100644 index 0000000000..d4f814691d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-safe-search-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml @@ -0,0 +1,58 @@ +id: wp-safe-search-e4bfbf2cbba7e1243929a6da3f0f2ec5 + +info: + name: > + WP Safe Search <= 0.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3669af4-06b4-4088-ae23-c167ba65f79c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-safe-search/" + google-query: inurl:"/wp-content/plugins/wp-safe-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-safe-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-safe-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-safe-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-scheduled-posts-49f4f7442b45f88ffafdd0b100d2831c.yaml b/nuclei-templates/cve-less/plugins/wp-scheduled-posts-49f4f7442b45f88ffafdd0b100d2831c.yaml new file mode 100644 index 0000000000..273e28993e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-scheduled-posts-49f4f7442b45f88ffafdd0b100d2831c.yaml @@ -0,0 +1,58 @@ +id: wp-scheduled-posts-49f4f7442b45f88ffafdd0b100d2831c + +info: + name: > + SchedulePress <= 5.0.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72be8df6-7489-4214-af6e-d1d95f79fd8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-scheduled-posts/" + google-query: inurl:"/wp-content/plugins/wp-scheduled-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-scheduled-posts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-scheduled-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-scheduled-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-scheduled-posts-f11abc39d7b4372ca1d0f7ca1556eb9b.yaml b/nuclei-templates/cve-less/plugins/wp-scheduled-posts-f11abc39d7b4372ca1d0f7ca1556eb9b.yaml new file mode 100644 index 0000000000..c198318b25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-scheduled-posts-f11abc39d7b4372ca1d0f7ca1556eb9b.yaml @@ -0,0 +1,58 @@ +id: wp-scheduled-posts-f11abc39d7b4372ca1d0f7ca1556eb9b + +info: + name: > + SchedulePress <= 5.0.4 - Insufficient Authorization to Authenticated (Contributor+) Arbitrary Post Modifications + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd2c9b28-d5b5-4930-a441-f889ee2778cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-scheduled-posts/" + google-query: inurl:"/wp-content/plugins/wp-scheduled-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-scheduled-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-scheduled-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-scheduled-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-schema-pro-8bdef51e6a9551cb787f034110fc0fe2.yaml b/nuclei-templates/cve-less/plugins/wp-schema-pro-8bdef51e6a9551cb787f034110fc0fe2.yaml new file mode 100644 index 0000000000..1133521504 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-schema-pro-8bdef51e6a9551cb787f034110fc0fe2.yaml @@ -0,0 +1,58 @@ +id: wp-schema-pro-8bdef51e6a9551cb787f034110fc0fe2 + +info: + name: > + Schema Pro <= 2.7.15 - Authenticated (Contributor+) Custom Field Access + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dafc355c-18e7-4312-bd16-8ef65ad54dad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-schema-pro/" + google-query: inurl:"/wp-content/plugins/wp-schema-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-schema-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-schema-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-schema-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-schema-pro-c23d0468fa1aa29e9cff4258e8e5f1b7.yaml b/nuclei-templates/cve-less/plugins/wp-schema-pro-c23d0468fa1aa29e9cff4258e8e5f1b7.yaml new file mode 100644 index 0000000000..9ed7545a54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-schema-pro-c23d0468fa1aa29e9cff4258e8e5f1b7.yaml @@ -0,0 +1,58 @@ +id: wp-schema-pro-c23d0468fa1aa29e9cff4258e8e5f1b7 + +info: + name: > + Schema Pro <= 2.7.8 - Authenticated(Contributor+) Missing Authorization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/645ab4b9-e421-4610-b99b-960a7fbb7779?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-schema-pro/" + google-query: inurl:"/wp-content/plugins/wp-schema-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-schema-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-schema-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-schema-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-schema-pro-e2131dbbacfbe2a2f95adf59d0db7bef.yaml b/nuclei-templates/cve-less/plugins/wp-schema-pro-e2131dbbacfbe2a2f95adf59d0db7bef.yaml new file mode 100644 index 0000000000..1dbacda8f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-schema-pro-e2131dbbacfbe2a2f95adf59d0db7bef.yaml @@ -0,0 +1,58 @@ +id: wp-schema-pro-e2131dbbacfbe2a2f95adf59d0db7bef + +info: + name: > + Schema Pro <= 2.7.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8808e4bd-76ea-4e31-8a2c-92c5b7dd3c68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-schema-pro/" + google-query: inurl:"/wp-content/plugins/wp-schema-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-schema-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-schema-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-schema-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-school-calendar-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-school-calendar-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..532c0eea07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-school-calendar-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-school-calendar-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-school-calendar-lite/" + google-query: inurl:"/wp-content/plugins/wp-school-calendar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-school-calendar-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-school-calendar-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-school-calendar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-scrippets-57f5b93dff7110d58cb432e56910af6c.yaml b/nuclei-templates/cve-less/plugins/wp-scrippets-57f5b93dff7110d58cb432e56910af6c.yaml new file mode 100644 index 0000000000..e7b358cceb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-scrippets-57f5b93dff7110d58cb432e56910af6c.yaml @@ -0,0 +1,58 @@ +id: wp-scrippets-57f5b93dff7110d58cb432e56910af6c + +info: + name: > + WP Scrippets <= 1.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e02cf6d3-3c50-4da5-b28c-7bda30deca3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-scrippets/" + google-query: inurl:"/wp-content/plugins/wp-scrippets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-scrippets,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-scrippets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-scrippets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-search-filter-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-search-filter-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1473426ad6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-search-filter-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-search-filter-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-search-filter/" + google-query: inurl:"/wp-content/plugins/wp-search-filter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-search-filter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-search-filter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-search-filter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-search-keyword-redirect-f19084b39601e7bc7ba34fa7ad78104e.yaml b/nuclei-templates/cve-less/plugins/wp-search-keyword-redirect-f19084b39601e7bc7ba34fa7ad78104e.yaml new file mode 100644 index 0000000000..2b3a1e3f70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-search-keyword-redirect-f19084b39601e7bc7ba34fa7ad78104e.yaml @@ -0,0 +1,58 @@ +id: wp-search-keyword-redirect-f19084b39601e7bc7ba34fa7ad78104e + +info: + name: > + Search Keyword Redirect <= 1.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb1f5fc6-9e0e-423a-bd71-32e12d201c37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-search-keyword-redirect/" + google-query: inurl:"/wp-content/plugins/wp-search-keyword-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-search-keyword-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-search-keyword-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-search-keyword-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-0918e7c524803020ebc3787f7788ecb1.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-0918e7c524803020ebc3787f7788ecb1.yaml new file mode 100644 index 0000000000..a434a9eabb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-0918e7c524803020ebc3787f7788ecb1.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-0918e7c524803020ebc3787f7788ecb1 + +info: + name: > + WP Activity Log <= 4.1.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea00bcc9-6f9c-4704-8337-074d5356e9e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-64c7c31089552dec4abb3ef175072235.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-64c7c31089552dec4abb3ef175072235.yaml new file mode 100644 index 0000000000..172f01f180 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-64c7c31089552dec4abb3ef175072235.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-64c7c31089552dec4abb3ef175072235 + +info: + name: > + WP Activity Log <= 4.0.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d0a8be3-6630-4cf7-b6cb-cdc86b99acb3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-896c32b149ebcd3122663a40d0461f18.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-896c32b149ebcd3122663a40d0461f18.yaml new file mode 100644 index 0000000000..4a3baf65de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-896c32b149ebcd3122663a40d0461f18.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-896c32b149ebcd3122663a40d0461f18 + +info: + name: > + WP Activity Log <= 4.6.1 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63c6eca6-9b55-48b5-ada3-97dd20d60f31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-908a2c5a645886182a7c18816c5cda70.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-908a2c5a645886182a7c18816c5cda70.yaml new file mode 100644 index 0000000000..ef0460e70e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-908a2c5a645886182a7c18816c5cda70.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-908a2c5a645886182a7c18816c5cda70 + +info: + name: > + WP Activity Log 1.5 - 2.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6173d307-9917-4d76-b6bf-d5646b9e33d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.5', '<= 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-a5b0543470506882efb8fd3f9daadcc9.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-a5b0543470506882efb8fd3f9daadcc9.yaml new file mode 100644 index 0000000000..dd391b7c54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-a5b0543470506882efb8fd3f9daadcc9.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-a5b0543470506882efb8fd3f9daadcc9 + +info: + name: > + WP Security Audit Log <= 3.1.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12837ce3-eeeb-4034-a90d-fc615056a818?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..207b112949 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..9aede07eec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-dd3770633c5e3f81d160a943bc75a752.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-dd3770633c5e3f81d160a943bc75a752.yaml new file mode 100644 index 0000000000..f939d31367 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-dd3770633c5e3f81d160a943bc75a752.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-dd3770633c5e3f81d160a943bc75a752 + +info: + name: > + WP Activity Log <= 4.5.0 - Missing Capabilities Check to User Enumeration + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f51f0919-498e-4f86-a933-1b7f2c4a10a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-eacb463d459e2bbbfb442e19685437c7.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-eacb463d459e2bbbfb442e19685437c7.yaml new file mode 100644 index 0000000000..544cc51645 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-eacb463d459e2bbbfb442e19685437c7.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-eacb463d459e2bbbfb442e19685437c7 + +info: + name: > + WP Activity Log <= 1.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f025b73-9a1a-4890-90ef-700f73ac018f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-f0b0a230f7453036382fc231a8391538.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-f0b0a230f7453036382fc231a8391538.yaml new file mode 100644 index 0000000000..1c3ce4d83e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-f0b0a230f7453036382fc231a8391538.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-f0b0a230f7453036382fc231a8391538 + +info: + name: > + WP Activity Log <= 4.5.0 - Cross-Site Request Forgery via ajax_run_cleanup + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2008e0b-32c6-46fb-93b9-2b0004f478e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-b55e1b34aba62c4a9df9aec2a27f5d8a.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-b55e1b34aba62c4a9df9aec2a27f5d8a.yaml new file mode 100644 index 0000000000..46e7ed488f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-b55e1b34aba62c4a9df9aec2a27f5d8a.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-premium-b55e1b34aba62c4a9df9aec2a27f5d8a + +info: + name: > + WP Activity Log Premium <= 4.6.4 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f060ea1-01e2-4e5b-82ba-b5cdd0d8290a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log-premium/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-dd3770633c5e3f81d160a943bc75a752.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-dd3770633c5e3f81d160a943bc75a752.yaml new file mode 100644 index 0000000000..9c640aa1eb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-dd3770633c5e3f81d160a943bc75a752.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-premium-dd3770633c5e3f81d160a943bc75a752 + +info: + name: > + WP Activity Log <= 4.5.0 - Missing Capabilities Check to User Enumeration + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f51f0919-498e-4f86-a933-1b7f2c4a10a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log-premium/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log-premium,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-f0b0a230f7453036382fc231a8391538.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-f0b0a230f7453036382fc231a8391538.yaml new file mode 100644 index 0000000000..00bc5749ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-f0b0a230f7453036382fc231a8391538.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-premium-f0b0a230f7453036382fc231a8391538 + +info: + name: > + WP Activity Log <= 4.5.0 - Cross-Site Request Forgery via ajax_run_cleanup + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2008e0b-32c6-46fb-93b9-2b0004f478e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log-premium/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-f254c1351f2a36bee58dc6381cb8f93e.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-f254c1351f2a36bee58dc6381cb8f93e.yaml new file mode 100644 index 0000000000..96007c9451 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-f254c1351f2a36bee58dc6381cb8f93e.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-premium-f254c1351f2a36bee58dc6381cb8f93e + +info: + name: > + WP Activity Log Premium <= 4.5.0 - Cross-Site Request Forgery via ajax_switch_db + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c659f6d-e02b-42ab-ba02-eb9b00602ad4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log-premium/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-fb8070a3ea093b2b03c1a0de45c253ff.yaml b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-fb8070a3ea093b2b03c1a0de45c253ff.yaml new file mode 100644 index 0000000000..9afcba9b76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-audit-log-premium-fb8070a3ea093b2b03c1a0de45c253ff.yaml @@ -0,0 +1,58 @@ +id: wp-security-audit-log-premium-fb8070a3ea093b2b03c1a0de45c253ff + +info: + name: > + WP Activity Log Premium <= 4.5.0 - Missing Authorization via ajax_switch_db + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e29fd6b-462a-42be-9a2a-b6717b20a937?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-audit-log-premium/" + google-query: inurl:"/wp-content/plugins/wp-security-audit-log-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-audit-log-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-audit-log-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-audit-log-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-hardening-02cf6d254ae1f4fae318bf77bab478be.yaml b/nuclei-templates/cve-less/plugins/wp-security-hardening-02cf6d254ae1f4fae318bf77bab478be.yaml new file mode 100644 index 0000000000..f8860766bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-hardening-02cf6d254ae1f4fae318bf77bab478be.yaml @@ -0,0 +1,58 @@ +id: wp-security-hardening-02cf6d254ae1f4fae318bf77bab478be + +info: + name: > + WP Hardening – Fix Your WordPress Security <= 1.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/acd61330-eba8-4311-8b60-30c3124067f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-hardening/" + google-query: inurl:"/wp-content/plugins/wp-security-hardening/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-hardening,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-hardening/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-hardening" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-hardening-4db11f352c6c8a3ad49ea7bd3d7d466b.yaml b/nuclei-templates/cve-less/plugins/wp-security-hardening-4db11f352c6c8a3ad49ea7bd3d7d466b.yaml new file mode 100644 index 0000000000..2f634c3dc0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-hardening-4db11f352c6c8a3ad49ea7bd3d7d466b.yaml @@ -0,0 +1,58 @@ +id: wp-security-hardening-4db11f352c6c8a3ad49ea7bd3d7d466b + +info: + name: > + WP Hardening – Fix Your WordPress Security <= 1.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdf6d876-631f-493d-a324-3bb8efedd84a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-hardening/" + google-query: inurl:"/wp-content/plugins/wp-security-hardening/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-hardening,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-hardening/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-hardening" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-pro-8e950dd64eb760b48f921b3528ca5c9f.yaml b/nuclei-templates/cve-less/plugins/wp-security-pro-8e950dd64eb760b48f921b3528ca5c9f.yaml new file mode 100644 index 0000000000..7886977fa5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-pro-8e950dd64eb760b48f921b3528ca5c9f.yaml @@ -0,0 +1,58 @@ +id: wp-security-pro-8e950dd64eb760b48f921b3528ca5c9f + +info: + name: > + WordPress Security <= 4.2 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9462b048-0e01-43b0-894d-43a53f744eb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-pro/" + google-query: inurl:"/wp-content/plugins/wp-security-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-questions-5eaff96b7044868ab9324ffea89f33a1.yaml b/nuclei-templates/cve-less/plugins/wp-security-questions-5eaff96b7044868ab9324ffea89f33a1.yaml new file mode 100644 index 0000000000..2df1fa8809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-questions-5eaff96b7044868ab9324ffea89f33a1.yaml @@ -0,0 +1,58 @@ +id: wp-security-questions-5eaff96b7044868ab9324ffea89f33a1 + +info: + name: > + WP Security Question <= 1.0.5 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23f9d758-4b5e-44e5-9f58-a37b01c4ffdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-questions/" + google-query: inurl:"/wp-content/plugins/wp-security-questions/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-questions,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-questions/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-questions" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-security-scan-c9a2376716cf70bca17532d4183c4633.yaml b/nuclei-templates/cve-less/plugins/wp-security-scan-c9a2376716cf70bca17532d4183c4633.yaml new file mode 100644 index 0000000000..90329fc5fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-security-scan-c9a2376716cf70bca17532d4183c4633.yaml @@ -0,0 +1,58 @@ +id: wp-security-scan-c9a2376716cf70bca17532d4183c4633 + +info: + name: > + Acunetix WP Security <= 4.0.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3368e4b4-9876-447b-acb4-3648e83ed997?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-security-scan/" + google-query: inurl:"/wp-content/plugins/wp-security-scan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-security-scan,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-security-scan/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-security-scan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sendfox-492dc981351dd6fd004e149962bdd870.yaml b/nuclei-templates/cve-less/plugins/wp-sendfox-492dc981351dd6fd004e149962bdd870.yaml new file mode 100644 index 0000000000..2359e86809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sendfox-492dc981351dd6fd004e149962bdd870.yaml @@ -0,0 +1,58 @@ +id: wp-sendfox-492dc981351dd6fd004e149962bdd870 + +info: + name: > + WP SendFox <= 1.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d79b092c-9e2c-4752-bf95-d3a6ac145073?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sendfox/" + google-query: inurl:"/wp-content/plugins/wp-sendfox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sendfox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sendfox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sendfox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sentry-d34327d1e992d219d0a1381df1c090fa.yaml b/nuclei-templates/cve-less/plugins/wp-sentry-d34327d1e992d219d0a1381df1c090fa.yaml new file mode 100644 index 0000000000..05c7a74d3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sentry-d34327d1e992d219d0a1381df1c090fa.yaml @@ -0,0 +1,58 @@ +id: wp-sentry-d34327d1e992d219d0a1381df1c090fa + +info: + name: > + WP Sentry <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/697e9828-2bc9-4732-b564-4cb44a1dc369?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sentry/" + google-query: inurl:"/wp-content/plugins/wp-sentry/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sentry,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sentry/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sentry" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seo-keyword-optimizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-seo-keyword-optimizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..62c38f1463 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seo-keyword-optimizer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-seo-keyword-optimizer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seo-keyword-optimizer/" + google-query: inurl:"/wp-content/plugins/wp-seo-keyword-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seo-keyword-optimizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seo-keyword-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seo-keyword-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seo-keyword-optimizer-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-seo-keyword-optimizer-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..3ed1e1192a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seo-keyword-optimizer-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-seo-keyword-optimizer-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seo-keyword-optimizer/" + google-query: inurl:"/wp-content/plugins/wp-seo-keyword-optimizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seo-keyword-optimizer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seo-keyword-optimizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seo-keyword-optimizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seo-redirect-301-0da88a23adab8991ac9273c6a18e2665.yaml b/nuclei-templates/cve-less/plugins/wp-seo-redirect-301-0da88a23adab8991ac9273c6a18e2665.yaml new file mode 100644 index 0000000000..fa2714c324 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seo-redirect-301-0da88a23adab8991ac9273c6a18e2665.yaml @@ -0,0 +1,58 @@ +id: wp-seo-redirect-301-0da88a23adab8991ac9273c6a18e2665 + +info: + name: > + WP SEO Redirect 301 <= 2.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55bd9bb4-6a81-4e9d-b0a9-76725aba6635?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seo-redirect-301/" + google-query: inurl:"/wp-content/plugins/wp-seo-redirect-301/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seo-redirect-301,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seo-redirect-301/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seo-redirect-301" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seo-tags-d9e051e1f4b85b4ae8c0ea3e691890cc.yaml b/nuclei-templates/cve-less/plugins/wp-seo-tags-d9e051e1f4b85b4ae8c0ea3e691890cc.yaml new file mode 100644 index 0000000000..18c4d8a096 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seo-tags-d9e051e1f4b85b4ae8c0ea3e691890cc.yaml @@ -0,0 +1,58 @@ +id: wp-seo-tags-d9e051e1f4b85b4ae8c0ea3e691890cc + +info: + name: > + WP SEO Tags <= 2.2.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16e7a7c5-b845-4f28-bee6-fde54d003e13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seo-tags/" + google-query: inurl:"/wp-content/plugins/wp-seo-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seo-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seo-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seo-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seo-tdk-faf3d9f40dc5bc77ef5ec90bb9977185.yaml b/nuclei-templates/cve-less/plugins/wp-seo-tdk-faf3d9f40dc5bc77ef5ec90bb9977185.yaml new file mode 100644 index 0000000000..99d3dcdbb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seo-tdk-faf3d9f40dc5bc77ef5ec90bb9977185.yaml @@ -0,0 +1,58 @@ +id: wp-seo-tdk-faf3d9f40dc5bc77ef5ec90bb9977185 + +info: + name: > + WP SEO TDK <= 2.1.2 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc62adbf-1f04-46b2-9ae9-aac3dbce8759?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seo-tdk/" + google-query: inurl:"/wp-content/plugins/wp-seo-tdk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seo-tdk,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seo-tdk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seo-tdk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seopress-13e2a2185dde6af6bd269d22e183dd35.yaml b/nuclei-templates/cve-less/plugins/wp-seopress-13e2a2185dde6af6bd269d22e183dd35.yaml new file mode 100644 index 0000000000..f349a77ba2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seopress-13e2a2185dde6af6bd269d22e183dd35.yaml @@ -0,0 +1,58 @@ +id: wp-seopress-13e2a2185dde6af6bd269d22e183dd35 + +info: + name: > + SEOPress <= 6.5.0.2 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06863974-e428-418b-891a-ade59ee46c4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seopress/" + google-query: inurl:"/wp-content/plugins/wp-seopress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seopress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seopress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seopress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seopress-c6c1e0bf86c779c9f71689d63880acf1.yaml b/nuclei-templates/cve-less/plugins/wp-seopress-c6c1e0bf86c779c9f71689d63880acf1.yaml new file mode 100644 index 0000000000..24b04229c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seopress-c6c1e0bf86c779c9f71689d63880acf1.yaml @@ -0,0 +1,58 @@ +id: wp-seopress-c6c1e0bf86c779c9f71689d63880acf1 + +info: + name: > + SEOPress 5.0.0 - 5.0.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9157fa5e-3af8-48ee-bb73-3df6109aae76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seopress/" + google-query: inurl:"/wp-content/plugins/wp-seopress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seopress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seopress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seopress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '5.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seopress-e3109d7817fd480896a3a3bc464556af.yaml b/nuclei-templates/cve-less/plugins/wp-seopress-e3109d7817fd480896a3a3bc464556af.yaml new file mode 100644 index 0000000000..9cea88b83a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seopress-e3109d7817fd480896a3a3bc464556af.yaml @@ -0,0 +1,58 @@ +id: wp-seopress-e3109d7817fd480896a3a3bc464556af + +info: + name: > + SEOPress – On-site SEO <= 7.5.2.1 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46e66230-06d6-452e-a7aa-862b2bb8c27d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seopress/" + google-query: inurl:"/wp-content/plugins/wp-seopress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seopress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seopress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seopress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seopress-fa9cf150c44f8d9dc935bb57af5fe0c5.yaml b/nuclei-templates/cve-less/plugins/wp-seopress-fa9cf150c44f8d9dc935bb57af5fe0c5.yaml new file mode 100644 index 0000000000..9017fed69d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seopress-fa9cf150c44f8d9dc935bb57af5fe0c5.yaml @@ -0,0 +1,58 @@ +id: wp-seopress-fa9cf150c44f8d9dc935bb57af5fe0c5 + +info: + name: > + SEOPress <= 7.6.1 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c6ba21-7631-4bbd-b08e-926d2f129cc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seopress/" + google-query: inurl:"/wp-content/plugins/wp-seopress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seopress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seopress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seopress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-seopress-fb48c2712fa8a78f7a012c1644582d5a.yaml b/nuclei-templates/cve-less/plugins/wp-seopress-fb48c2712fa8a78f7a012c1644582d5a.yaml new file mode 100644 index 0000000000..cb9edb4a0e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-seopress-fb48c2712fa8a78f7a012c1644582d5a.yaml @@ -0,0 +1,58 @@ +id: wp-seopress-fb48c2712fa8a78f7a012c1644582d5a + +info: + name: > + SEOPress – On-site SEO <= 7.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/098efef9-f5e0-4827-bd4e-88867b7dc3b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-seopress/" + google-query: inurl:"/wp-content/plugins/wp-seopress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-seopress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-seopress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-seopress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-server-stats-47415a21e09795154df1ff35281901c5.yaml b/nuclei-templates/cve-less/plugins/wp-server-stats-47415a21e09795154df1ff35281901c5.yaml new file mode 100644 index 0000000000..9069e9a3da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-server-stats-47415a21e09795154df1ff35281901c5.yaml @@ -0,0 +1,58 @@ +id: wp-server-stats-47415a21e09795154df1ff35281901c5 + +info: + name: > + WP Server Health Stats <= 1.6.10 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c394295f-d1b5-48be-978f-f15a6b56e40f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-server-stats/" + google-query: inurl:"/wp-content/plugins/wp-server-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-server-stats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-server-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-server-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-server-stats-be1ae498f783b881934c37ce01f5e849.yaml b/nuclei-templates/cve-less/plugins/wp-server-stats-be1ae498f783b881934c37ce01f5e849.yaml new file mode 100644 index 0000000000..5f3448e50f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-server-stats-be1ae498f783b881934c37ce01f5e849.yaml @@ -0,0 +1,58 @@ +id: wp-server-stats-be1ae498f783b881934c37ce01f5e849 + +info: + name: > + WP Server Health Stats <= 1.7.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68fc0a8b-b667-49fd-b015-ced27f5ccce8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-server-stats/" + google-query: inurl:"/wp-content/plugins/wp-server-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-server-stats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-server-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-server-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ses-13e3b44160360e3746c78b8d29452ac0.yaml b/nuclei-templates/cve-less/plugins/wp-ses-13e3b44160360e3746c78b8d29452ac0.yaml new file mode 100644 index 0000000000..1941b8e8d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ses-13e3b44160360e3746c78b8d29452ac0.yaml @@ -0,0 +1,58 @@ +id: wp-ses-13e3b44160360e3746c78b8d29452ac0 + +info: + name: > + guzzlehttp/psr7 < 1.9.1 & 2.4.5 - Interpretation Conflict + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2638bb80-7066-45c0-ab74-4ba407d50cae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ses/" + google-query: inurl:"/wp-content/plugins/wp-ses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ses,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ses-e6c4489ab4760cc2610080b31e1c8d78.yaml b/nuclei-templates/cve-less/plugins/wp-ses-e6c4489ab4760cc2610080b31e1c8d78.yaml new file mode 100644 index 0000000000..5eec889d48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ses-e6c4489ab4760cc2610080b31e1c8d78.yaml @@ -0,0 +1,58 @@ +id: wp-ses-e6c4489ab4760cc2610080b31e1c8d78 + +info: + name: > + WP Offload SES Lite <= 1.4.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/132a6661-c21b-4ba6-955a-2c905425de6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ses/" + google-query: inurl:"/wp-content/plugins/wp-ses/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ses,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ses/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ses" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-setup-wizard-c10fda9bfdd3663d875e2a0fc2207f2e.yaml b/nuclei-templates/cve-less/plugins/wp-setup-wizard-c10fda9bfdd3663d875e2a0fc2207f2e.yaml new file mode 100644 index 0000000000..cfed454f8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-setup-wizard-c10fda9bfdd3663d875e2a0fc2207f2e.yaml @@ -0,0 +1,58 @@ +id: wp-setup-wizard-c10fda9bfdd3663d875e2a0fc2207f2e + +info: + name: > + WP Setup Wizard <= 1.0.8.1 - Authenticated (Subscriber+) Full Database Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f46b01e4-1022-45aa-8511-6d2519e4e562?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-setup-wizard/" + google-query: inurl:"/wp-content/plugins/wp-setup-wizard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-setup-wizard,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-setup-wizard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-setup-wizard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shamsi-26e6e5cc3851b03fa772529952303fc4.yaml b/nuclei-templates/cve-less/plugins/wp-shamsi-26e6e5cc3851b03fa772529952303fc4.yaml new file mode 100644 index 0000000000..d82aea1493 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shamsi-26e6e5cc3851b03fa772529952303fc4.yaml @@ -0,0 +1,58 @@ +id: wp-shamsi-26e6e5cc3851b03fa772529952303fc4 + +info: + name: > + WP Shamsi <= 4.1.1 - Missing Authorization to Plugin Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35a0a0b8-2d62-4675-9bec-d26164271a03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shamsi/" + google-query: inurl:"/wp-content/plugins/wp-shamsi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shamsi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shamsi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shamsi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shamsi-4a71f65ecef18d04fe003f6a65b7d9e2.yaml b/nuclei-templates/cve-less/plugins/wp-shamsi-4a71f65ecef18d04fe003f6a65b7d9e2.yaml new file mode 100644 index 0000000000..af4af60541 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shamsi-4a71f65ecef18d04fe003f6a65b7d9e2.yaml @@ -0,0 +1,58 @@ +id: wp-shamsi-4a71f65ecef18d04fe003f6a65b7d9e2 + +info: + name: > + WP Shamsi <= 4.3.3 - Missing Authorization leading to Authenticated (Subscriber+) Attachment Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8fc88821-b2be-49a5-a2cf-53e87d0349a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shamsi/" + google-query: inurl:"/wp-content/plugins/wp-shamsi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shamsi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shamsi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shamsi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shamsi-738fbfc3eb4f88850a59e7c7149f1534.yaml b/nuclei-templates/cve-less/plugins/wp-shamsi-738fbfc3eb4f88850a59e7c7149f1534.yaml new file mode 100644 index 0000000000..e75109b457 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shamsi-738fbfc3eb4f88850a59e7c7149f1534.yaml @@ -0,0 +1,58 @@ +id: wp-shamsi-738fbfc3eb4f88850a59e7c7149f1534 + +info: + name: > + WP Shamsi <= 4.1.0 - Missing Authorization to Arbitrary Plugin Deactivation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b498c5a-9fd1-43b8-b456-f6cec65d5077?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shamsi/" + google-query: inurl:"/wp-content/plugins/wp-shamsi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shamsi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shamsi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shamsi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-share-buttons-analytics-by-getsocial-28f21eddf2463cba2cb6b77e1419e5f9.yaml b/nuclei-templates/cve-less/plugins/wp-share-buttons-analytics-by-getsocial-28f21eddf2463cba2cb6b77e1419e5f9.yaml new file mode 100644 index 0000000000..4b338186c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-share-buttons-analytics-by-getsocial-28f21eddf2463cba2cb6b77e1419e5f9.yaml @@ -0,0 +1,58 @@ +id: wp-share-buttons-analytics-by-getsocial-28f21eddf2463cba2cb6b77e1419e5f9 + +info: + name: > + Social Share Buttons & Analytics Plugin – GetSocial.io <= 4.3.12 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/513124f6-ea14-46ca-94c5-f9fa15b19d8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-share-buttons-analytics-by-getsocial/" + google-query: inurl:"/wp-content/plugins/wp-share-buttons-analytics-by-getsocial/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-share-buttons-analytics-by-getsocial,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-share-buttons-analytics-by-getsocial/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-share-buttons-analytics-by-getsocial" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..458c3bb7f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages/" + google-query: inurl:"/wp-content/plugins/wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sheet-editor-bulk-spreadsheet-editor-for-posts-and-pages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.24.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shieldon-61c8d3fe6528b22ae362e184d779fcaf.yaml b/nuclei-templates/cve-less/plugins/wp-shieldon-61c8d3fe6528b22ae362e184d779fcaf.yaml new file mode 100644 index 0000000000..de2138b278 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shieldon-61c8d3fe6528b22ae362e184d779fcaf.yaml @@ -0,0 +1,58 @@ +id: wp-shieldon-61c8d3fe6528b22ae362e184d779fcaf + +info: + name: > + WP Shieldon <= 1.6.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c8eaba3-9c23-4f35-8669-0ce345918fa6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shieldon/" + google-query: inurl:"/wp-content/plugins/wp-shieldon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shieldon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shieldon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shieldon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shop-original-9bf86f14d92b1788e3ded94564f9e0cb.yaml b/nuclei-templates/cve-less/plugins/wp-shop-original-9bf86f14d92b1788e3ded94564f9e0cb.yaml new file mode 100644 index 0000000000..0a95ce84ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shop-original-9bf86f14d92b1788e3ded94564f9e0cb.yaml @@ -0,0 +1,58 @@ +id: wp-shop-original-9bf86f14d92b1788e3ded94564f9e0cb + +info: + name: > + WP Shop <= 3.9.6 - Missing Authentication to Settings Change and Order Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f1700c2-9c1f-4882-9f11-13b4ee8477a9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shop-original/" + google-query: inurl:"/wp-content/plugins/wp-shop-original/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shop-original,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shop-original/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shop-original" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shop-original-a0116eeab00e009fd4fa3d22d8f45407.yaml b/nuclei-templates/cve-less/plugins/wp-shop-original-a0116eeab00e009fd4fa3d22d8f45407.yaml new file mode 100644 index 0000000000..c3c3ed6164 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shop-original-a0116eeab00e009fd4fa3d22d8f45407.yaml @@ -0,0 +1,58 @@ +id: wp-shop-original-a0116eeab00e009fd4fa3d22d8f45407 + +info: + name: > + WP Shop <= 3.4.3.18 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/115f966d-b0f4-46c0-af05-48dd5bf72098?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shop-original/" + google-query: inurl:"/wp-content/plugins/wp-shop-original/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shop-original,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shop-original/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shop-original" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shop-original-b4f93738fd70e3a8da5c44b9944ae088.yaml b/nuclei-templates/cve-less/plugins/wp-shop-original-b4f93738fd70e3a8da5c44b9944ae088.yaml new file mode 100644 index 0000000000..9ed62f1a9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shop-original-b4f93738fd70e3a8da5c44b9944ae088.yaml @@ -0,0 +1,58 @@ +id: wp-shop-original-b4f93738fd70e3a8da5c44b9944ae088 + +info: + name: > + WP Shop < 3.4.3.16 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f4806a3-643e-45b0-953f-6c0628359495?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shop-original/" + google-query: inurl:"/wp-content/plugins/wp-shop-original/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shop-original,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shop-original/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shop-original" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shopping-cart-1033fcda6639f4daeff0c508d8a82d3b.yaml b/nuclei-templates/cve-less/plugins/wp-shopping-cart-1033fcda6639f4daeff0c508d8a82d3b.yaml new file mode 100644 index 0000000000..021afae115 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shopping-cart-1033fcda6639f4daeff0c508d8a82d3b.yaml @@ -0,0 +1,58 @@ +id: wp-shopping-cart-1033fcda6639f4daeff0c508d8a82d3b + +info: + name: > + Instinct WP e-Commerce <= 3.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9be4ad83-14da-499e-b216-e5f26016fa35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shopping-cart/" + google-query: inurl:"/wp-content/plugins/wp-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shopping-cart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shortcode-485c8e5c2bb61a87b483e8c051daba67.yaml b/nuclei-templates/cve-less/plugins/wp-shortcode-485c8e5c2bb61a87b483e8c051daba67.yaml new file mode 100644 index 0000000000..0e35000381 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shortcode-485c8e5c2bb61a87b483e8c051daba67.yaml @@ -0,0 +1,58 @@ +id: wp-shortcode-485c8e5c2bb61a87b483e8c051daba67 + +info: + name: > + WP Shortcode by MyThemeShop <= 1.4.16 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/763fec04-72c5-4910-af97-f58b5b69a02e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shortcode/" + google-query: inurl:"/wp-content/plugins/wp-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shoutbox-live-chat-adaa6144e39af9e742e7ba711c4a036d.yaml b/nuclei-templates/cve-less/plugins/wp-shoutbox-live-chat-adaa6144e39af9e742e7ba711c4a036d.yaml new file mode 100644 index 0000000000..b727194afd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shoutbox-live-chat-adaa6144e39af9e742e7ba711c4a036d.yaml @@ -0,0 +1,58 @@ +id: wp-shoutbox-live-chat-adaa6144e39af9e742e7ba711c4a036d + +info: + name: > + Steveas WP Live Chat Shoutbox <= 1.4.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2630dbfe-2e11-4671-9a75-377237ac1ea1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shoutbox-live-chat/" + google-query: inurl:"/wp-content/plugins/wp-shoutbox-live-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shoutbox-live-chat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shoutbox-live-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shoutbox-live-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-shoutbox-live-chat-c35613a2745b5628f153e1858939c22a.yaml b/nuclei-templates/cve-less/plugins/wp-shoutbox-live-chat-c35613a2745b5628f153e1858939c22a.yaml new file mode 100644 index 0000000000..6b37bb9387 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-shoutbox-live-chat-c35613a2745b5628f153e1858939c22a.yaml @@ -0,0 +1,58 @@ +id: wp-shoutbox-live-chat-c35613a2745b5628f153e1858939c22a + +info: + name: > + Steveas WP Live Chat Shoutbox <= 1.4.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4e1ca02-4eb5-4a46-99d5-89630f37d9ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-shoutbox-live-chat/" + google-query: inurl:"/wp-content/plugins/wp-shoutbox-live-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-shoutbox-live-chat,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-shoutbox-live-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-shoutbox-live-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-show-posts-10f63d314e85015ce49d2337fc605c93.yaml b/nuclei-templates/cve-less/plugins/wp-show-posts-10f63d314e85015ce49d2337fc605c93.yaml new file mode 100644 index 0000000000..8c79467ab1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-show-posts-10f63d314e85015ce49d2337fc605c93.yaml @@ -0,0 +1,58 @@ +id: wp-show-posts-10f63d314e85015ce49d2337fc605c93 + +info: + name: > + WP Show Posts <= 1.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40733449-7953-452e-aa11-60306be9bc5d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-show-posts/" + google-query: inurl:"/wp-content/plugins/wp-show-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-show-posts,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-show-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-show-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-show-posts-353fc9ffdc08426a0ffe5e2540b9087b.yaml b/nuclei-templates/cve-less/plugins/wp-show-posts-353fc9ffdc08426a0ffe5e2540b9087b.yaml new file mode 100644 index 0000000000..55e822e2f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-show-posts-353fc9ffdc08426a0ffe5e2540b9087b.yaml @@ -0,0 +1,58 @@ +id: wp-show-posts-353fc9ffdc08426a0ffe5e2540b9087b + +info: + name: > + WP Show Posts <= 1.1.4 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6788e2ee-ce61-494b-8d7f-6d1144466e58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-show-posts/" + google-query: inurl:"/wp-content/plugins/wp-show-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-show-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-show-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-show-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-show-posts-d8e5ca43d4d7693416e241c26cbea0ec.yaml b/nuclei-templates/cve-less/plugins/wp-show-posts-d8e5ca43d4d7693416e241c26cbea0ec.yaml new file mode 100644 index 0000000000..92cea26ef9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-show-posts-d8e5ca43d4d7693416e241c26cbea0ec.yaml @@ -0,0 +1,58 @@ +id: wp-show-posts-d8e5ca43d4d7693416e241c26cbea0ec + +info: + name: > + WP Show Posts <= 1.1.5 - Improper Authorization to Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6bb3680-0623-4633-971e-3bc4a52dfad3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-show-posts/" + google-query: inurl:"/wp-content/plugins/wp-show-posts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-show-posts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-show-posts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-show-posts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-showhide-d3ed4033e1c7b404f15d64bf377cadc7.yaml b/nuclei-templates/cve-less/plugins/wp-showhide-d3ed4033e1c7b404f15d64bf377cadc7.yaml new file mode 100644 index 0000000000..4dd227169c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-showhide-d3ed4033e1c7b404f15d64bf377cadc7.yaml @@ -0,0 +1,58 @@ +id: wp-showhide-d3ed4033e1c7b404f15d64bf377cadc7 + +info: + name: > + WP-ShowHide <= 1.04 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1c4b5e9-e141-4d0d-866a-ff4fb8b68dea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-showhide/" + google-query: inurl:"/wp-content/plugins/wp-showhide/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-showhide,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-showhide/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-showhide" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-booking-calendar-839915408da31966610f43b45f853f1c.yaml b/nuclei-templates/cve-less/plugins/wp-simple-booking-calendar-839915408da31966610f43b45f853f1c.yaml new file mode 100644 index 0000000000..77e6d34fce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-booking-calendar-839915408da31966610f43b45f853f1c.yaml @@ -0,0 +1,58 @@ +id: wp-simple-booking-calendar-839915408da31966610f43b45f853f1c + +info: + name: > + WP Simple Booking Calendar <= 2.0.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f72e5bb-e076-4379-8699-e399761c043f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-booking-calendar/" + google-query: inurl:"/wp-content/plugins/wp-simple-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-booking-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-booking-calendar-bac170dcd3835d8bbf7c00e58b6af261.yaml b/nuclei-templates/cve-less/plugins/wp-simple-booking-calendar-bac170dcd3835d8bbf7c00e58b6af261.yaml new file mode 100644 index 0000000000..1073dd74a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-booking-calendar-bac170dcd3835d8bbf7c00e58b6af261.yaml @@ -0,0 +1,58 @@ +id: wp-simple-booking-calendar-bac170dcd3835d8bbf7c00e58b6af261 + +info: + name: > + WP Simple Booking Calendar <= 2.0.6 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93164941-effe-4363-811e-3161cff10c88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-booking-calendar/" + google-query: inurl:"/wp-content/plugins/wp-simple-booking-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-booking-calendar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-booking-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-booking-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-events-9bd31a69895b603beba548b13ee3a848.yaml b/nuclei-templates/cve-less/plugins/wp-simple-events-9bd31a69895b603beba548b13ee3a848.yaml new file mode 100644 index 0000000000..12207eb088 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-events-9bd31a69895b603beba548b13ee3a848.yaml @@ -0,0 +1,58 @@ +id: wp-simple-events-9bd31a69895b603beba548b13ee3a848 + +info: + name: > + WP Simple Events <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53de68ad-76a6-4043-8369-7679c1c5c1cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-events/" + google-query: inurl:"/wp-content/plugins/wp-simple-events/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-events,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-events/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-events" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-firewall-380d905325ab5069c99a7e476a1a4f89.yaml b/nuclei-templates/cve-less/plugins/wp-simple-firewall-380d905325ab5069c99a7e476a1a4f89.yaml new file mode 100644 index 0000000000..8d18d1afba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-firewall-380d905325ab5069c99a7e476a1a4f89.yaml @@ -0,0 +1,58 @@ +id: wp-simple-firewall-380d905325ab5069c99a7e476a1a4f89 + +info: + name: > + Shield Security <= 17.0.17 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/674461ad-9b61-48c4-af2a-5dfcaeb38215?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-firewall/" + google-query: inurl:"/wp-content/plugins/wp-simple-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-firewall-3f0faa20d6a05156c4a1c46312d50cf7.yaml b/nuclei-templates/cve-less/plugins/wp-simple-firewall-3f0faa20d6a05156c4a1c46312d50cf7.yaml new file mode 100644 index 0000000000..aec516f3ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-firewall-3f0faa20d6a05156c4a1c46312d50cf7.yaml @@ -0,0 +1,58 @@ +id: wp-simple-firewall-3f0faa20d6a05156c4a1c46312d50cf7 + +info: + name: > + Shield Security – Smart Bot Blocking & Intrusion Prevention Security <= 18.5.9 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/063826cc-7ff3-4869-9831-f6a4a4bbe74c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-firewall/" + google-query: inurl:"/wp-content/plugins/wp-simple-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-firewall,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-firewall-90c7f750404de09cdcd8955a310ab0ab.yaml b/nuclei-templates/cve-less/plugins/wp-simple-firewall-90c7f750404de09cdcd8955a310ab0ab.yaml new file mode 100644 index 0000000000..1cb547ecb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-firewall-90c7f750404de09cdcd8955a310ab0ab.yaml @@ -0,0 +1,58 @@ +id: wp-simple-firewall-90c7f750404de09cdcd8955a310ab0ab + +info: + name: > + Shield Security <= 13.0.5 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/287c6cdc-f534-4b87-8a97-ee1e3666cd25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-firewall/" + google-query: inurl:"/wp-content/plugins/wp-simple-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-firewall-c9d4c4f2e6258505d4c75758afeb7ff1.yaml b/nuclei-templates/cve-less/plugins/wp-simple-firewall-c9d4c4f2e6258505d4c75758afeb7ff1.yaml new file mode 100644 index 0000000000..e2734e728f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-firewall-c9d4c4f2e6258505d4c75758afeb7ff1.yaml @@ -0,0 +1,58 @@ +id: wp-simple-firewall-c9d4c4f2e6258505d4c75758afeb7ff1 + +info: + name: > + Shield Security <= 18.5.7 - Unauthenticated Stored Cross-Site Scripting via getColumnContent_Page + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcd02dfa-688e-4375-92cb-8d0e7cbaaa6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-firewall/" + google-query: inurl:"/wp-content/plugins/wp-simple-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-firewall-ce7b15ad921b8740cd4f98bd5c07c031.yaml b/nuclei-templates/cve-less/plugins/wp-simple-firewall-ce7b15ad921b8740cd4f98bd5c07c031.yaml new file mode 100644 index 0000000000..103be7166b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-firewall-ce7b15ad921b8740cd4f98bd5c07c031.yaml @@ -0,0 +1,58 @@ +id: wp-simple-firewall-ce7b15ad921b8740cd4f98bd5c07c031 + +info: + name: > + Shield Security <= 17.0.17 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/162dff28-94ea-4a47-a6cb-a13317cf1a04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-firewall/" + google-query: inurl:"/wp-content/plugins/wp-simple-firewall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-firewall,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-firewall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-firewall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 17.0.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-galleries-49548450e8e603c888246b4324b9abfb.yaml b/nuclei-templates/cve-less/plugins/wp-simple-galleries-49548450e8e603c888246b4324b9abfb.yaml new file mode 100644 index 0000000000..55a603030d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-galleries-49548450e8e603c888246b4324b9abfb.yaml @@ -0,0 +1,58 @@ +id: wp-simple-galleries-49548450e8e603c888246b4324b9abfb + +info: + name: > + WP Simple Galleries <= 1.34 - Authenticated (Contributor+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dc8f7cf-d8be-4229-b823-3bd9bc9f6eda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-galleries/" + google-query: inurl:"/wp-content/plugins/wp-simple-galleries/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-galleries,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-galleries/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-galleries" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-0ec33f0610c3b4ae6a2adacc48ffade7.yaml b/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-0ec33f0610c3b4ae6a2adacc48ffade7.yaml new file mode 100644 index 0000000000..8670c57f2e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-0ec33f0610c3b4ae6a2adacc48ffade7.yaml @@ -0,0 +1,58 @@ +id: wp-simple-html-sitemap-0ec33f0610c3b4ae6a2adacc48ffade7 + +info: + name: > + WP Simple HTML Sitemap <= 2.2 - Reflected Cross-Site Scripting via id + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26e52072-9465-4b56-9794-f17861b7c70c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-html-sitemap/" + google-query: inurl:"/wp-content/plugins/wp-simple-html-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-html-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-html-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-html-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-1697fb18453f32ca7e1c0790f12f9bda.yaml b/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-1697fb18453f32ca7e1c0790f12f9bda.yaml new file mode 100644 index 0000000000..51a1a2e413 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-1697fb18453f32ca7e1c0790f12f9bda.yaml @@ -0,0 +1,58 @@ +id: wp-simple-html-sitemap-1697fb18453f32ca7e1c0790f12f9bda + +info: + name: > + WP Simple HTML Sitemap <= 2.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eff4cb35-492b-448a-8d16-b9210917c567?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-html-sitemap/" + google-query: inurl:"/wp-content/plugins/wp-simple-html-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-html-sitemap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-html-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-html-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-56ca15387b80b4855859eb683a9c79c5.yaml b/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-56ca15387b80b4855859eb683a9c79c5.yaml new file mode 100644 index 0000000000..71de17703a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-56ca15387b80b4855859eb683a9c79c5.yaml @@ -0,0 +1,58 @@ +id: wp-simple-html-sitemap-56ca15387b80b4855859eb683a9c79c5 + +info: + name: > + WordPress Simple HTML Sitemap <= 2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a0bc461-d4fa-46d5-8725-9ab4c540b80e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-html-sitemap/" + google-query: inurl:"/wp-content/plugins/wp-simple-html-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-html-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-html-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-html-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-be653a8d2bee2421f88f0e6d66ccc0f3.yaml b/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-be653a8d2bee2421f88f0e6d66ccc0f3.yaml new file mode 100644 index 0000000000..5c62ca8739 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-html-sitemap-be653a8d2bee2421f88f0e6d66ccc0f3.yaml @@ -0,0 +1,58 @@ +id: wp-simple-html-sitemap-be653a8d2bee2421f88f0e6d66ccc0f3 + +info: + name: > + WP Simple HTML Sitemap <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fca6d469-60e7-4866-a53c-d207817c9204?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-html-sitemap/" + google-query: inurl:"/wp-content/plugins/wp-simple-html-sitemap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-html-sitemap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-html-sitemap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-html-sitemap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-login-registration-plugin-3019f115da4ce05058864e5dcdcaacab.yaml b/nuclei-templates/cve-less/plugins/wp-simple-login-registration-plugin-3019f115da4ce05058864e5dcdcaacab.yaml new file mode 100644 index 0000000000..3e9f13a4e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-login-registration-plugin-3019f115da4ce05058864e5dcdcaacab.yaml @@ -0,0 +1,58 @@ +id: wp-simple-login-registration-plugin-3019f115da4ce05058864e5dcdcaacab + +info: + name: > + Simple Login Registration <= 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94dc8fc6-8212-4f83-a844-f08174531d3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-login-registration-plugin/" + google-query: inurl:"/wp-content/plugins/wp-simple-login-registration-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-login-registration-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-login-registration-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-login-registration-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-post-view-170b4d1a9ba8f9c16cc0bc165c8fd973.yaml b/nuclei-templates/cve-less/plugins/wp-simple-post-view-170b4d1a9ba8f9c16cc0bc165c8fd973.yaml new file mode 100644 index 0000000000..52421e5872 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-post-view-170b4d1a9ba8f9c16cc0bc165c8fd973.yaml @@ -0,0 +1,58 @@ +id: wp-simple-post-view-170b4d1a9ba8f9c16cc0bc165c8fd973 + +info: + name: > + Post View Count <= 2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/114cf149-e923-4e21-9eb0-e38941799304?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-post-view/" + google-query: inurl:"/wp-content/plugins/wp-simple-post-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-post-view,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-post-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-post-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simple-spreadsheet-fetcher-for-google-0df69cb46add8b6c0a7b0f63ee7a53a7.yaml b/nuclei-templates/cve-less/plugins/wp-simple-spreadsheet-fetcher-for-google-0df69cb46add8b6c0a7b0f63ee7a53a7.yaml new file mode 100644 index 0000000000..cf580e46fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simple-spreadsheet-fetcher-for-google-0df69cb46add8b6c0a7b0f63ee7a53a7.yaml @@ -0,0 +1,58 @@ +id: wp-simple-spreadsheet-fetcher-for-google-0df69cb46add8b6c0a7b0f63ee7a53a7 + +info: + name: > + WP Simple Spreadsheet Fetcher for Google < 0.3.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc314c13-4be4-40fc-a035-5de0acb36c91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simple-spreadsheet-fetcher-for-google/" + google-query: inurl:"/wp-content/plugins/wp-simple-spreadsheet-fetcher-for-google/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simple-spreadsheet-fetcher-for-google,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simple-spreadsheet-fetcher-for-google/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simple-spreadsheet-fetcher-for-google" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-simplemail-bdefbe0337f0d8136e413e9977ce9dce.yaml b/nuclei-templates/cve-less/plugins/wp-simplemail-bdefbe0337f0d8136e413e9977ce9dce.yaml new file mode 100644 index 0000000000..9f101a919e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-simplemail-bdefbe0337f0d8136e413e9977ce9dce.yaml @@ -0,0 +1,58 @@ +id: wp-simplemail-bdefbe0337f0d8136e413e9977ce9dce + +info: + name: > + WP SimpleMail <= 1.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53a58c45-b7fd-469e-8c67-4f20707f2363?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-simplemail/" + google-query: inurl:"/wp-content/plugins/wp-simplemail/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-simplemail,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-simplemail/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-simplemail" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-site-protect-cd4b20c0b028ccb6a7d2b5c1ffeba918.yaml b/nuclei-templates/cve-less/plugins/wp-site-protect-cd4b20c0b028ccb6a7d2b5c1ffeba918.yaml new file mode 100644 index 0000000000..c688d667c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-site-protect-cd4b20c0b028ccb6a7d2b5c1ffeba918.yaml @@ -0,0 +1,58 @@ +id: wp-site-protect-cd4b20c0b028ccb6a7d2b5c1ffeba918 + +info: + name: > + WP Site Protect <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e63da1a9-235d-4a6e-95e0-ac4488dc9eff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-site-protect/" + google-query: inurl:"/wp-content/plugins/wp-site-protect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-site-protect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-site-protect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-site-protect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-site-protector-edb0b1b70571f2dd40f46a09b0477a9b.yaml b/nuclei-templates/cve-less/plugins/wp-site-protector-edb0b1b70571f2dd40f46a09b0477a9b.yaml new file mode 100644 index 0000000000..10a9ea48d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-site-protector-edb0b1b70571f2dd40f46a09b0477a9b.yaml @@ -0,0 +1,58 @@ +id: wp-site-protector-edb0b1b70571f2dd40f46a09b0477a9b + +info: + name: > + WP Site Protector <= 2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f92f614b-162a-4ca5-bf7d-9d7088f59af9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-site-protector/" + google-query: inurl:"/wp-content/plugins/wp-site-protector/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-site-protector,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-site-protector/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-site-protector" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sitemap-page-f2a1201d248d9810b0b0d58bf8df9f81.yaml b/nuclei-templates/cve-less/plugins/wp-sitemap-page-f2a1201d248d9810b0b0d58bf8df9f81.yaml new file mode 100644 index 0000000000..73ae6054a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sitemap-page-f2a1201d248d9810b0b0d58bf8df9f81.yaml @@ -0,0 +1,58 @@ +id: wp-sitemap-page-f2a1201d248d9810b0b0d58bf8df9f81 + +info: + name: > + WP Sitemap Page <= 1.6.6 - Admin+ Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6616c4b-6021-42c8-afe1-bfd789b895ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sitemap-page/" + google-query: inurl:"/wp-content/plugins/wp-sitemap-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sitemap-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sitemap-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sitemap-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slick-slider-and-image-carousel-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/wp-slick-slider-and-image-carousel-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..cf5dda282a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slick-slider-and-image-carousel-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: wp-slick-slider-and-image-carousel-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slick-slider-and-image-carousel/" + google-query: inurl:"/wp-content/plugins/wp-slick-slider-and-image-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slick-slider-and-image-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slick-slider-and-image-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slick-slider-and-image-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-04e23ac1b6365010d31ca471e4c11f32.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-04e23ac1b6365010d31ca471e4c11f32.yaml new file mode 100644 index 0000000000..b78d02c241 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-04e23ac1b6365010d31ca471e4c11f32.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-04e23ac1b6365010d31ca471e4c11f32 + +info: + name: > + Slimstat Analytics <= 4.8.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f87e78c5-e7f4-4af6-b64f-444fef23e890?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-3171c38b67df36d18560a0a3bce363f3.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-3171c38b67df36d18560a0a3bce363f3.yaml new file mode 100644 index 0000000000..b6c1e19d28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-3171c38b67df36d18560a0a3bce363f3.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-3171c38b67df36d18560a0a3bce363f3 + +info: + name: > + SlimStat Analytics <= 5.1.3 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33cba63c-4629-48fd-850f-f68dad626a67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-323a2528ecc021abe5c2c6bd363f0d32.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-323a2528ecc021abe5c2c6bd363f0d32.yaml new file mode 100644 index 0000000000..0b361a04fe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-323a2528ecc021abe5c2c6bd363f0d32.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-323a2528ecc021abe5c2c6bd363f0d32 + +info: + name: > + Slimstat Analytics <= 3.9.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1e30342-143d-4ea3-9947-b5e5c55725a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-423f90da633eb79297c96d8f0abf8be5.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-423f90da633eb79297c96d8f0abf8be5.yaml new file mode 100644 index 0000000000..edfff1b7a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-423f90da633eb79297c96d8f0abf8be5.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-423f90da633eb79297c96d8f0abf8be5 + +info: + name: > + Slimstat Analytics <= 5.0.8 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c14a863-2aed-4f65-a0e3-eb73e485ce85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-49bd4bae2777384dde2f9b06bf68d410.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-49bd4bae2777384dde2f9b06bf68d410.yaml new file mode 100644 index 0000000000..37b6bc23c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-49bd4bae2777384dde2f9b06bf68d410.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-49bd4bae2777384dde2f9b06bf68d410 + +info: + name: > + Slimstat Analytics <= 5.0.9 - Authenticated (Contributor+) Blind SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07c0f5a5-3455-4f06-b481-f4d678309c50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-597e668e79f61dad3842fcd6906ce6f8.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-597e668e79f61dad3842fcd6906ce6f8.yaml new file mode 100644 index 0000000000..2978089dee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-597e668e79f61dad3842fcd6906ce6f8.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-597e668e79f61dad3842fcd6906ce6f8 + +info: + name: > + Slimstat Analytics <= 4.9.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f533dbd-4dd0-48ec-b083-e6284acab067?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-64166b21a8975f062b52f4886bce7163.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-64166b21a8975f062b52f4886bce7163.yaml new file mode 100644 index 0000000000..f703b144db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-64166b21a8975f062b52f4886bce7163.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-64166b21a8975f062b52f4886bce7163 + +info: + name: > + Slimstat Analytics <= 5.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52aee4b8-f494-4eeb-8357-71ce8d5bc656?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-9024f709636fd6877d65d2f3b4c1635e.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-9024f709636fd6877d65d2f3b4c1635e.yaml new file mode 100644 index 0000000000..2de497e5ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-9024f709636fd6877d65d2f3b4c1635e.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-9024f709636fd6877d65d2f3b4c1635e + +info: + name: > + WP Slimstat <= 4.8 - Unauthenticated Stored Cross-Site Scripting from Visitors + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fd8277c-b096-4cee-bd13-fcb8c8b00ca0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-971075c7b5684cf126577f8a88b91254.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-971075c7b5684cf126577f8a88b91254.yaml new file mode 100644 index 0000000000..58c4e3c47c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-971075c7b5684cf126577f8a88b91254.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-971075c7b5684cf126577f8a88b91254 + +info: + name: > + Slimstat Analytics <= 5.0.5.1 - Missing Authorization via delete_pageview + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbb8501e-7e8b-4ed6-8792-c685a69de982?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-9ab73d918da016b8bea0197df7034889.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-9ab73d918da016b8bea0197df7034889.yaml new file mode 100644 index 0000000000..5228b700c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-9ab73d918da016b8bea0197df7034889.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-9ab73d918da016b8bea0197df7034889 + +info: + name: > + Slimstat Analytics <= 5.0.4 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6334b02e-ffab-49f9-969b-d015c2babc29?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-b3e91448e22115e9d095b2a1e488e5df.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-b3e91448e22115e9d095b2a1e488e5df.yaml new file mode 100644 index 0000000000..4f1a84819c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-b3e91448e22115e9d095b2a1e488e5df.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-b3e91448e22115e9d095b2a1e488e5df + +info: + name: > + Slimstat Analytics < 3.9.6 - Unauthenticated Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2c11005-dcb3-40b3-863a-0612132acb08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-c568408b66270ee8858beb6b5337a826.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-c568408b66270ee8858beb6b5337a826.yaml new file mode 100644 index 0000000000..dd38b09e1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-c568408b66270ee8858beb6b5337a826.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-c568408b66270ee8858beb6b5337a826 + +info: + name: > + Slimstat Analytics < 4.1.6.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/046526ef-3db9-47e4-b454-472def7935e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-d15c506a6326f67745ff7867b3d43cbf.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-d15c506a6326f67745ff7867b3d43cbf.yaml new file mode 100644 index 0000000000..e3e0d5deb6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-d15c506a6326f67745ff7867b3d43cbf.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-d15c506a6326f67745ff7867b3d43cbf + +info: + name: > + Slimstat Analytics <= 4.9.3.2 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fce15e1c-e2eb-4bd9-8b07-78d87a6ae1cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-e97cf38eec743d7e32a9d6f2848bc70b.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-e97cf38eec743d7e32a9d6f2848bc70b.yaml new file mode 100644 index 0000000000..2431a4aa02 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-e97cf38eec743d7e32a9d6f2848bc70b.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-e97cf38eec743d7e32a9d6f2848bc70b + +info: + name: > + Slimstat Analytics <= 4.9.2 - Reflected Cross-Site Scripting via REQUEST_URI + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9933ca13-32fd-4481-a18f-21e9a11c423c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-ex-2e45916daba26c04ce6c83d3b1938df3.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-ex-2e45916daba26c04ce6c83d3b1938df3.yaml new file mode 100644 index 0000000000..70ebb3d62c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-ex-2e45916daba26c04ce6c83d3b1938df3.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-ex-2e45916daba26c04ce6c83d3b1938df3 + +info: + name: > + SlimStat-Ex <= 2.1.2 - Arbitrary Code Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef104a10-9e47-420b-aba9-71095870bf4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat-ex/" + google-query: inurl:"/wp-content/plugins/wp-slimstat-ex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat-ex,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat-ex/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat-ex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-f260533813247786590cffbf5861c8f5.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-f260533813247786590cffbf5861c8f5.yaml new file mode 100644 index 0000000000..165446b92f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-f260533813247786590cffbf5861c8f5.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-f260533813247786590cffbf5861c8f5 + +info: + name: > + Slimstat Analytics <= 3.5.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/915d73ed-33ae-4580-9a51-aa4e9a015ff6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-f800126fa2e8457384feccc64971626b.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-f800126fa2e8457384feccc64971626b.yaml new file mode 100644 index 0000000000..2d64432c08 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-f800126fa2e8457384feccc64971626b.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-f800126fa2e8457384feccc64971626b + +info: + name: > + Slimstat Analytics <= 5.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/875c6474-5bf3-4556-b529-299cd2f65afe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-slimstat-f8bccfc95e7537d4400b0b6737b24e5f.yaml b/nuclei-templates/cve-less/plugins/wp-slimstat-f8bccfc95e7537d4400b0b6737b24e5f.yaml new file mode 100644 index 0000000000..51f4740953 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-slimstat-f8bccfc95e7537d4400b0b6737b24e5f.yaml @@ -0,0 +1,58 @@ +id: wp-slimstat-f8bccfc95e7537d4400b0b6737b24e5f + +info: + name: > + Slimstat Analytics <= 4.9.3.3 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af075ffe-553a-4351-a696-5c678788f3b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-slimstat/" + google-query: inurl:"/wp-content/plugins/wp-slimstat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-slimstat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-slimstat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-slimstat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-contracts-221016fc8948bfb930fdcdca33f79836.yaml b/nuclei-templates/cve-less/plugins/wp-smart-contracts-221016fc8948bfb930fdcdca33f79836.yaml new file mode 100644 index 0000000000..e80e988b05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-contracts-221016fc8948bfb930fdcdca33f79836.yaml @@ -0,0 +1,58 @@ +id: wp-smart-contracts-221016fc8948bfb930fdcdca33f79836 + +info: + name: > + WPSmartContracts <= 1.3.11 - Authenticated (Author+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4aff8870-4222-454a-90cd-044784cb4224?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-contracts/" + google-query: inurl:"/wp-content/plugins/wp-smart-contracts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-contracts,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-contracts/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-contracts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-crm-invoices-free-ee95b664445938e62cfbf4d8ed5ffe44.yaml b/nuclei-templates/cve-less/plugins/wp-smart-crm-invoices-free-ee95b664445938e62cfbf4d8ed5ffe44.yaml new file mode 100644 index 0000000000..c38df9537e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-crm-invoices-free-ee95b664445938e62cfbf4d8ed5ffe44.yaml @@ -0,0 +1,58 @@ +id: wp-smart-crm-invoices-free-ee95b664445938e62cfbf4d8ed5ffe44 + +info: + name: > + WP smart CRM & Invoices FREE <= 1.8.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a2eb266-a050-48b9-a0bb-5d48b2c0f970?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-crm-invoices-free/" + google-query: inurl:"/wp-content/plugins/wp-smart-crm-invoices-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-crm-invoices-free,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-crm-invoices-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-crm-invoices-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-editor-475ba1df38c75381825efc84071f7c9f.yaml b/nuclei-templates/cve-less/plugins/wp-smart-editor-475ba1df38c75381825efc84071f7c9f.yaml new file mode 100644 index 0000000000..e3c7874e36 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-editor-475ba1df38c75381825efc84071f7c9f.yaml @@ -0,0 +1,58 @@ +id: wp-smart-editor-475ba1df38c75381825efc84071f7c9f + +info: + name: > + WP Smart Editor <= 1.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e6bd1d4-25ba-4475-8840-06f3d614d6d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-editor/" + google-query: inurl:"/wp-content/plugins/wp-smart-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-export-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-smart-export-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..82ef135e34 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-export-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-smart-export-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-export/" + google-query: inurl:"/wp-content/plugins/wp-smart-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-export,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-import-7d8c7a6621cd6acf11eab3f4d618152a.yaml b/nuclei-templates/cve-less/plugins/wp-smart-import-7d8c7a6621cd6acf11eab3f4d618152a.yaml new file mode 100644 index 0000000000..1882ddf3e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-import-7d8c7a6621cd6acf11eab3f4d618152a.yaml @@ -0,0 +1,58 @@ +id: wp-smart-import-7d8c7a6621cd6acf11eab3f4d618152a + +info: + name: > + WordPress Importer : Import any XML File to WordPress < 1.0.1 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fcd44c2-5b06-4c3c-b6b2-c58771245fe2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-import/" + google-query: inurl:"/wp-content/plugins/wp-smart-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-import,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-import-ba1778641ae55d3040d21a76affd5b00.yaml b/nuclei-templates/cve-less/plugins/wp-smart-import-ba1778641ae55d3040d21a76affd5b00.yaml new file mode 100644 index 0000000000..beb85c2134 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-import-ba1778641ae55d3040d21a76affd5b00.yaml @@ -0,0 +1,58 @@ +id: wp-smart-import-ba1778641ae55d3040d21a76affd5b00 + +info: + name: > + WordPress Importer <= 1.0.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f86e1ef-c898-4a54-8204-a9ec4caab586?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-import/" + google-query: inurl:"/wp-content/plugins/wp-smart-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-import-ccfe47d5faf99f962197429daac2a562.yaml b/nuclei-templates/cve-less/plugins/wp-smart-import-ccfe47d5faf99f962197429daac2a562.yaml new file mode 100644 index 0000000000..2d99ceb7d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-import-ccfe47d5faf99f962197429daac2a562.yaml @@ -0,0 +1,58 @@ +id: wp-smart-import-ccfe47d5faf99f962197429daac2a562 + +info: + name: > + WP Smart Import : Import any XML File to WordPress <= 1.0.7 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28bc0672-3469-4f58-860d-9e13da46804e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-import/" + google-query: inurl:"/wp-content/plugins/wp-smart-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-import-ed2e7de8683ce4c367d3321852d1f7db.yaml b/nuclei-templates/cve-less/plugins/wp-smart-import-ed2e7de8683ce4c367d3321852d1f7db.yaml new file mode 100644 index 0000000000..fd540c2916 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-import-ed2e7de8683ce4c367d3321852d1f7db.yaml @@ -0,0 +1,58 @@ +id: wp-smart-import-ed2e7de8683ce4c367d3321852d1f7db + +info: + name: > + WordPress Importer: Import any XML File to WordPress <= 1.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22dbd787-2b9a-4883-9203-c79fc241596d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-import/" + google-query: inurl:"/wp-content/plugins/wp-smart-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smart-preloader-19694fc6eba31e53a1ac14bdaf6f6028.yaml b/nuclei-templates/cve-less/plugins/wp-smart-preloader-19694fc6eba31e53a1ac14bdaf6f6028.yaml new file mode 100644 index 0000000000..27d256e20f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smart-preloader-19694fc6eba31e53a1ac14bdaf6f6028.yaml @@ -0,0 +1,58 @@ +id: wp-smart-preloader-19694fc6eba31e53a1ac14bdaf6f6028 + +info: + name: > + WP Smart Preloader <= 1.15 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e43fb223-8b0a-4232-8e15-43f8b38652c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smart-preloader/" + google-query: inurl:"/wp-content/plugins/wp-smart-preloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smart-preloader,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smart-preloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smart-preloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smiley-77e2d5337a10d2b6f8dfe7d3c316ea63.yaml b/nuclei-templates/cve-less/plugins/wp-smiley-77e2d5337a10d2b6f8dfe7d3c316ea63.yaml new file mode 100644 index 0000000000..50718c5344 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smiley-77e2d5337a10d2b6f8dfe7d3c316ea63.yaml @@ -0,0 +1,58 @@ +id: wp-smiley-77e2d5337a10d2b6f8dfe7d3c316ea63 + +info: + name: > + WP Smiley <= 1.4.1 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c12e6063-2db7-4f8b-a7c3-3e40bc9ff2a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smiley/" + google-query: inurl:"/wp-content/plugins/wp-smiley/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smiley,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smiley/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smiley" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smiley-ae9135d7bf1c7296c12f3a734a25c4bf.yaml b/nuclei-templates/cve-less/plugins/wp-smiley-ae9135d7bf1c7296c12f3a734a25c4bf.yaml new file mode 100644 index 0000000000..00ba289af1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smiley-ae9135d7bf1c7296c12f3a734a25c4bf.yaml @@ -0,0 +1,58 @@ +id: wp-smiley-ae9135d7bf1c7296c12f3a734a25c4bf + +info: + name: > + WP Smiley <= 1.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/629fe670-f48b-4eb6-86f9-e1bac3771530?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smiley/" + google-query: inurl:"/wp-content/plugins/wp-smiley/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smiley,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smiley/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smiley" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-2a19a88ce4a92a9c8fbf2df45764b32f.yaml b/nuclei-templates/cve-less/plugins/wp-sms-2a19a88ce4a92a9c8fbf2df45764b32f.yaml new file mode 100644 index 0000000000..6f36a69206 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-2a19a88ce4a92a9c8fbf2df45764b32f.yaml @@ -0,0 +1,58 @@ +id: wp-sms-2a19a88ce4a92a9c8fbf2df45764b32f + +info: + name: > + WP SMS <= 6.5 - Authenticated (Admin+) SQL Injection to Reflected Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8f53053-5150-4fba-b8d6-3d6c9df32c69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-2eac9220f1c0d85aff9cba25bec21ed8.yaml b/nuclei-templates/cve-less/plugins/wp-sms-2eac9220f1c0d85aff9cba25bec21ed8.yaml new file mode 100644 index 0000000000..29a6427952 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-2eac9220f1c0d85aff9cba25bec21ed8.yaml @@ -0,0 +1,58 @@ +id: wp-sms-2eac9220f1c0d85aff9cba25bec21ed8 + +info: + name: > + WP SMS <= 6.1.4 - Reflected Cross-Site Scripting via 'delete_mobile' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04970416-06db-4339-ac22-34fde5a48f2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-604205ec49f025926385a1b0eaceae3d.yaml b/nuclei-templates/cve-less/plugins/wp-sms-604205ec49f025926385a1b0eaceae3d.yaml new file mode 100644 index 0000000000..b9e9d001e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-604205ec49f025926385a1b0eaceae3d.yaml @@ -0,0 +1,58 @@ +id: wp-sms-604205ec49f025926385a1b0eaceae3d + +info: + name: > + WP SMS <= 5.4.12 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90ebe593-6511-4998-a45e-795f3597b191?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-69342488f4f3aabf705547384317c745.yaml b/nuclei-templates/cve-less/plugins/wp-sms-69342488f4f3aabf705547384317c745.yaml new file mode 100644 index 0000000000..6f710e9e22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-69342488f4f3aabf705547384317c745.yaml @@ -0,0 +1,58 @@ +id: wp-sms-69342488f4f3aabf705547384317c745 + +info: + name: > + WP SMS <= 6.6.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e07e570-e4c0-472c-b582-40a87a6507bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-7216efc8a277e31e7bc37bcee5ad9a4b.yaml b/nuclei-templates/cve-less/plugins/wp-sms-7216efc8a277e31e7bc37bcee5ad9a4b.yaml new file mode 100644 index 0000000000..f6fbae1ddf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-7216efc8a277e31e7bc37bcee5ad9a4b.yaml @@ -0,0 +1,58 @@ +id: wp-sms-7216efc8a277e31e7bc37bcee5ad9a4b + +info: + name: > + WP SMS <= 6.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9141ad3-86cf-47ae-be99-d78f0337f2ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-84f2aef7f11acfd2b73b896d3ef7cd04.yaml b/nuclei-templates/cve-less/plugins/wp-sms-84f2aef7f11acfd2b73b896d3ef7cd04.yaml new file mode 100644 index 0000000000..b8a1db0366 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-84f2aef7f11acfd2b73b896d3ef7cd04.yaml @@ -0,0 +1,58 @@ +id: wp-sms-84f2aef7f11acfd2b73b896d3ef7cd04 + +info: + name: > + WP SMS <= 6.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6d874a2-f0cd-49d2-b531-5d780db7d25d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-9026afc07d244baf4060b61e93a40775.yaml b/nuclei-templates/cve-less/plugins/wp-sms-9026afc07d244baf4060b61e93a40775.yaml new file mode 100644 index 0000000000..82c62c0e1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-9026afc07d244baf4060b61e93a40775.yaml @@ -0,0 +1,58 @@ +id: wp-sms-9026afc07d244baf4060b61e93a40775 + +info: + name: > + WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc <= 5.4.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b597e8a5-043e-440e-aaa2-38fb3eeb0731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-a21f47d4523bdd1432738c19a9cc15fb.yaml b/nuclei-templates/cve-less/plugins/wp-sms-a21f47d4523bdd1432738c19a9cc15fb.yaml new file mode 100644 index 0000000000..7361a2a402 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-a21f47d4523bdd1432738c19a9cc15fb.yaml @@ -0,0 +1,58 @@ +id: wp-sms-a21f47d4523bdd1432738c19a9cc15fb + +info: + name: > + WP SMS <= 6.0.4 - Information Disclosure via REST API + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57377380-0435-4747-abba-50063978d8e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-e1ececf98f98b05b8b9294fdacec5d2d.yaml b/nuclei-templates/cve-less/plugins/wp-sms-e1ececf98f98b05b8b9294fdacec5d2d.yaml new file mode 100644 index 0000000000..99a4675de3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-e1ececf98f98b05b8b9294fdacec5d2d.yaml @@ -0,0 +1,58 @@ +id: wp-sms-e1ececf98f98b05b8b9294fdacec5d2d + +info: + name: > + WP SMS <= 6.1.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/747afa58-182a-4fb3-bfe3-f15db0b1d85a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-f21ce23a89308829a19c21d66925ddd0.yaml b/nuclei-templates/cve-less/plugins/wp-sms-f21ce23a89308829a19c21d66925ddd0.yaml new file mode 100644 index 0000000000..028b04ef99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-f21ce23a89308829a19c21d66925ddd0.yaml @@ -0,0 +1,58 @@ +id: wp-sms-f21ce23a89308829a19c21d66925ddd0 + +info: + name: > + WP SMS <= 6.5.2 - Reflected Cross-Site Scripting via 'page' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31f7dc1e-2008-4672-85ba-56fa35f4f0e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sms-f7c37966d32c6dbab8ccdc2a7eb8df23.yaml b/nuclei-templates/cve-less/plugins/wp-sms-f7c37966d32c6dbab8ccdc2a7eb8df23.yaml new file mode 100644 index 0000000000..6755cef457 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sms-f7c37966d32c6dbab8ccdc2a7eb8df23.yaml @@ -0,0 +1,58 @@ +id: wp-sms-f7c37966d32c6dbab8ccdc2a7eb8df23 + +info: + name: > + WP SMS <= 6.5 - Cross-Site Request Forgery to Subscriber Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94ad6b51-ff8d-48d5-9a70-1781d13990a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sms/" + google-query: inurl:"/wp-content/plugins/wp-sms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smtp-4cb0701b6db05c073e2060623ec2f204.yaml b/nuclei-templates/cve-less/plugins/wp-smtp-4cb0701b6db05c073e2060623ec2f204.yaml new file mode 100644 index 0000000000..2fd2c35318 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smtp-4cb0701b6db05c073e2060623ec2f204.yaml @@ -0,0 +1,58 @@ +id: wp-smtp-4cb0701b6db05c073e2060623ec2f204 + +info: + name: > + WP SMTP 1.2 - 1.2.6 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee269bc7-2822-4a07-be91-6763c1cf6cf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smtp/" + google-query: inurl:"/wp-content/plugins/wp-smtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.2', '<= 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smushit-2b972fb379a3ef9946c652caaa66df2d.yaml b/nuclei-templates/cve-less/plugins/wp-smushit-2b972fb379a3ef9946c652caaa66df2d.yaml new file mode 100644 index 0000000000..70e1e47cf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smushit-2b972fb379a3ef9946c652caaa66df2d.yaml @@ -0,0 +1,58 @@ +id: wp-smushit-2b972fb379a3ef9946c652caaa66df2d + +info: + name: > + Smush – Lazy Load Images, Optimize & Compress Images <= 3.0.0 - Authenticated PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15654ff3-2e61-44d2-ae3f-4a353db320cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smushit/" + google-query: inurl:"/wp-content/plugins/wp-smushit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smushit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smushit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smushit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smushit-3baba46cc5a286838f8fb9a60b0d6094.yaml b/nuclei-templates/cve-less/plugins/wp-smushit-3baba46cc5a286838f8fb9a60b0d6094.yaml new file mode 100644 index 0000000000..131e42f0d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smushit-3baba46cc5a286838f8fb9a60b0d6094.yaml @@ -0,0 +1,58 @@ +id: wp-smushit-3baba46cc5a286838f8fb9a60b0d6094 + +info: + name: > + Smush – Lazy Load Images, Optimize & Compress Images <= 2.9.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53b5a052-6e84-4eb5-a7f4-4e32f757f4d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smushit/" + google-query: inurl:"/wp-content/plugins/wp-smushit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smushit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smushit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smushit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smushit-607f1baa27192c23513225845ec25b9b.yaml b/nuclei-templates/cve-less/plugins/wp-smushit-607f1baa27192c23513225845ec25b9b.yaml new file mode 100644 index 0000000000..673296c355 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smushit-607f1baa27192c23513225845ec25b9b.yaml @@ -0,0 +1,58 @@ +id: wp-smushit-607f1baa27192c23513225845ec25b9b + +info: + name: > + Smush – Lazy Load Images, Optimize & Compress Images <= 2.7.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a4c36d4-5d0f-4e73-b356-0b7326fcb524?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smushit/" + google-query: inurl:"/wp-content/plugins/wp-smushit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smushit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smushit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smushit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-smushit-7a3ab4b4d26a299b96225464ccb1d356.yaml b/nuclei-templates/cve-less/plugins/wp-smushit-7a3ab4b4d26a299b96225464ccb1d356.yaml new file mode 100644 index 0000000000..04247b1c3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-smushit-7a3ab4b4d26a299b96225464ccb1d356.yaml @@ -0,0 +1,58 @@ +id: wp-smushit-7a3ab4b4d26a299b96225464ccb1d356 + +info: + name: > + Smush – Lazy Load Images, Optimize & Compress Images <= 3.9.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64b22728-cb07-48be-94b7-1089156490cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-smushit/" + google-query: inurl:"/wp-content/plugins/wp-smushit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-smushit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-smushit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-smushit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-0f9348eac96a42ea06d72213f997cb8e.yaml b/nuclei-templates/cve-less/plugins/wp-social-0f9348eac96a42ea06d72213f997cb8e.yaml new file mode 100644 index 0000000000..feedc2b246 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-0f9348eac96a42ea06d72213f997cb8e.yaml @@ -0,0 +1,58 @@ +id: wp-social-0f9348eac96a42ea06d72213f997cb8e + +info: + name: > + Wp Social Login and Register Social Counter <= 3.0.0 - Missing Authorization to Unauthenticated Social Login/Share Status Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f145c85-f3c6-46a7-b8ae-d486dd23087d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social/" + google-query: inurl:"/wp-content/plugins/wp-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-bookmark-menu-8682c5fbeed29195fc3c6e36608df123.yaml b/nuclei-templates/cve-less/plugins/wp-social-bookmark-menu-8682c5fbeed29195fc3c6e36608df123.yaml new file mode 100644 index 0000000000..95ac448acd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-bookmark-menu-8682c5fbeed29195fc3c6e36608df123.yaml @@ -0,0 +1,58 @@ +id: wp-social-bookmark-menu-8682c5fbeed29195fc3c6e36608df123 + +info: + name: > + WP Social Bookmark Menu <= 1.2 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/120a75c5-4fff-4a77-b376-d6968853b40e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-bookmark-menu/" + google-query: inurl:"/wp-content/plugins/wp-social-bookmark-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-bookmark-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-bookmark-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-bookmark-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-bookmarking-light-7e1c6a231bffdfe14a3a2ce673d73608.yaml b/nuclei-templates/cve-less/plugins/wp-social-bookmarking-light-7e1c6a231bffdfe14a3a2ce673d73608.yaml new file mode 100644 index 0000000000..73535dcc2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-bookmarking-light-7e1c6a231bffdfe14a3a2ce673d73608.yaml @@ -0,0 +1,58 @@ +id: wp-social-bookmarking-light-7e1c6a231bffdfe14a3a2ce673d73608 + +info: + name: > + WP Social Bookmarking Light < 1.7.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4a63360-01eb-491e-b25d-501adb83f57f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-bookmarking-light/" + google-query: inurl:"/wp-content/plugins/wp-social-bookmarking-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-bookmarking-light,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-bookmarking-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-bookmarking-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-bookmarking-light-df9c64a17ee3d013ca8c6b78de44f86b.yaml b/nuclei-templates/cve-less/plugins/wp-social-bookmarking-light-df9c64a17ee3d013ca8c6b78de44f86b.yaml new file mode 100644 index 0000000000..b90a0e5a53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-bookmarking-light-df9c64a17ee3d013ca8c6b78de44f86b.yaml @@ -0,0 +1,58 @@ +id: wp-social-bookmarking-light-df9c64a17ee3d013ca8c6b78de44f86b + +info: + name: > + WP Social Bookmarking Light <= 2.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7997ae20-88d2-4e12-87a0-a6e83808a495?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-bookmarking-light/" + google-query: inurl:"/wp-content/plugins/wp-social-bookmarking-light/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-bookmarking-light,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-bookmarking-light/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-bookmarking-light" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-buttons-7b54be45a2f07bfa9d249dae96b2b8a9.yaml b/nuclei-templates/cve-less/plugins/wp-social-buttons-7b54be45a2f07bfa9d249dae96b2b8a9.yaml new file mode 100644 index 0000000000..09a82eb050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-buttons-7b54be45a2f07bfa9d249dae96b2b8a9.yaml @@ -0,0 +1,58 @@ +id: wp-social-buttons-7b54be45a2f07bfa9d249dae96b2b8a9 + +info: + name: > + WP Social Buttons <= 2.1 - Admin+ Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4198c51-4a26-4a50-b2c5-0467f8008b5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-buttons/" + google-query: inurl:"/wp-content/plugins/wp-social-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-buttons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-f8238c64411cb9dd2c01251b0ae0655a.yaml b/nuclei-templates/cve-less/plugins/wp-social-f8238c64411cb9dd2c01251b0ae0655a.yaml new file mode 100644 index 0000000000..bd20222315 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-f8238c64411cb9dd2c01251b0ae0655a.yaml @@ -0,0 +1,58 @@ +id: wp-social-f8238c64411cb9dd2c01251b0ae0655a + +info: + name: > + Wp Social <= 1.9.0 - Authenticated (Subscriber+) Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/105dcbbb-9ee2-4a5a-9b65-bbac931d1080?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social/" + google-query: inurl:"/wp-content/plugins/wp-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-feed-3799bad4858d7913f9586ea4576ffdaf.yaml b/nuclei-templates/cve-less/plugins/wp-social-feed-3799bad4858d7913f9586ea4576ffdaf.yaml new file mode 100644 index 0000000000..f1c4dbb7a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-feed-3799bad4858d7913f9586ea4576ffdaf.yaml @@ -0,0 +1,58 @@ +id: wp-social-feed-3799bad4858d7913f9586ea4576ffdaf + +info: + name: > + Social Feed <= 2.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f124b5a0-b58b-45ff-bd22-7a09a9abd9bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-feed/" + google-query: inurl:"/wp-content/plugins/wp-social-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-invitations-4abec42ea1e0860b972b9757ce0cdb30.yaml b/nuclei-templates/cve-less/plugins/wp-social-invitations-4abec42ea1e0860b972b9757ce0cdb30.yaml new file mode 100644 index 0000000000..ea6228beb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-invitations-4abec42ea1e0860b972b9757ce0cdb30.yaml @@ -0,0 +1,58 @@ +id: wp-social-invitations-4abec42ea1e0860b972b9757ce0cdb30 + +info: + name: > + WordPress Social Invitations – Lite <= 1.4.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57a68d4a-4857-4631-8863-6ff847490ef5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-invitations/" + google-query: inurl:"/wp-content/plugins/wp-social-invitations/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-invitations,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-invitations/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-invitations" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-sharing-bde0dbf50dee086cf6c52ee659134929.yaml b/nuclei-templates/cve-less/plugins/wp-social-sharing-bde0dbf50dee086cf6c52ee659134929.yaml new file mode 100644 index 0000000000..c23ee5abf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-sharing-bde0dbf50dee086cf6c52ee659134929.yaml @@ -0,0 +1,58 @@ +id: wp-social-sharing-bde0dbf50dee086cf6c52ee659134929 + +info: + name: > + WP Social Sharing <= 2.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c2c8025-6a1b-475d-bc28-9f2ec3ad7bdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-sharing/" + google-query: inurl:"/wp-content/plugins/wp-social-sharing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-sharing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-sharing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-sharing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-widget-78c7195ce152d6d5bdeab7f38e20a1db.yaml b/nuclei-templates/cve-less/plugins/wp-social-widget-78c7195ce152d6d5bdeab7f38e20a1db.yaml new file mode 100644 index 0000000000..50492ac516 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-widget-78c7195ce152d6d5bdeab7f38e20a1db.yaml @@ -0,0 +1,58 @@ +id: wp-social-widget-78c7195ce152d6d5bdeab7f38e20a1db + +info: + name: > + WP Social Widget <= 2.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bebedaa9-6689-4863-91c6-2ab52a9353db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-widget/" + google-query: inurl:"/wp-content/plugins/wp-social-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-social-widget-877e1c3b42118075385c29c980e6d4e6.yaml b/nuclei-templates/cve-less/plugins/wp-social-widget-877e1c3b42118075385c29c980e6d4e6.yaml new file mode 100644 index 0000000000..4ce119643d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-social-widget-877e1c3b42118075385c29c980e6d4e6.yaml @@ -0,0 +1,58 @@ +id: wp-social-widget-877e1c3b42118075385c29c980e6d4e6 + +info: + name: > + WP Social Widget <= 2.2.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1df421ac-c8fc-4505-989e-1d822ca6de7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-social-widget/" + google-query: inurl:"/wp-content/plugins/wp-social-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-social-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-social-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-social-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-socializer-9c5f430746b739fbae6902b53c806e7a.yaml b/nuclei-templates/cve-less/plugins/wp-socializer-9c5f430746b739fbae6902b53c806e7a.yaml new file mode 100644 index 0000000000..61db44fb10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-socializer-9c5f430746b739fbae6902b53c806e7a.yaml @@ -0,0 +1,58 @@ +id: wp-socializer-9c5f430746b739fbae6902b53c806e7a + +info: + name: > + WP Socializer – Simple & Easy Social Media Share Icons <= 7.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0016c624-9c0c-4157-8597-8b374dff7f14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-socializer/" + google-query: inurl:"/wp-content/plugins/wp-socializer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-socializer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-socializer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-socializer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-songbook-04e0aa1c786990263905d4523aa6fa2d.yaml b/nuclei-templates/cve-less/plugins/wp-songbook-04e0aa1c786990263905d4523aa6fa2d.yaml new file mode 100644 index 0000000000..f7c5b1a42f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-songbook-04e0aa1c786990263905d4523aa6fa2d.yaml @@ -0,0 +1,58 @@ +id: wp-songbook-04e0aa1c786990263905d4523aa6fa2d + +info: + name: > + WP Songbook <= 2.0.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2809d55f-14f8-4916-800f-4d4fb9ee88c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-songbook/" + google-query: inurl:"/wp-content/plugins/wp-songbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-songbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-songbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-songbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-soononline-page-52e5de8cae8585e04365085f31752913.yaml b/nuclei-templates/cve-less/plugins/wp-soononline-page-52e5de8cae8585e04365085f31752913.yaml new file mode 100644 index 0000000000..f286f6eb85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-soononline-page-52e5de8cae8585e04365085f31752913.yaml @@ -0,0 +1,58 @@ +id: wp-soononline-page-52e5de8cae8585e04365085f31752913 + +info: + name: > + WPsoonOnlinePage <= 1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a554b365-b54b-4696-87f6-df5099e15708?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-soononline-page/" + google-query: inurl:"/wp-content/plugins/wp-soononline-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-soononline-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-soononline-page/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-soononline-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sort-order-a561a450756c85ce3eedf88a4f646811.yaml b/nuclei-templates/cve-less/plugins/wp-sort-order-a561a450756c85ce3eedf88a4f646811.yaml new file mode 100644 index 0000000000..b0b2329086 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sort-order-a561a450756c85ce3eedf88a4f646811.yaml @@ -0,0 +1,58 @@ +id: wp-sort-order-a561a450756c85ce3eedf88a4f646811 + +info: + name: > + WP Sort Order <= 1.3.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6499f46-b3b6-496f-a9bc-531bcbba2418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sort-order/" + google-query: inurl:"/wp-content/plugins/wp-sort-order/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sort-order,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sort-order/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sort-order" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-source-control-4c18709c2b499b4e0a77ed40ef54cc76.yaml b/nuclei-templates/cve-less/plugins/wp-source-control-4c18709c2b499b4e0a77ed40ef54cc76.yaml new file mode 100644 index 0000000000..5de70d2ee9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-source-control-4c18709c2b499b4e0a77ed40ef54cc76.yaml @@ -0,0 +1,58 @@ +id: wp-source-control-4c18709c2b499b4e0a77ed40ef54cc76 + +info: + name: > + WP Source Control < 3.1.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cec4d7a-81e0-489a-b549-5848ed9a8449?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-source-control/" + google-query: inurl:"/wp-content/plugins/wp-source-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-source-control,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-source-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-source-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-spamfree-3506e96eaa45f558b87763e6782644a7.yaml b/nuclei-templates/cve-less/plugins/wp-spamfree-3506e96eaa45f558b87763e6782644a7.yaml new file mode 100644 index 0000000000..f7b4347118 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spamfree-3506e96eaa45f558b87763e6782644a7.yaml @@ -0,0 +1,58 @@ +id: wp-spamfree-3506e96eaa45f558b87763e6782644a7 + +info: + name: > + WP-SpamFree Anti-Spam <= 2.1.1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5954369b-ff1b-40ff-a20d-1b2b237a6f42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spamfree/" + google-query: inurl:"/wp-content/plugins/wp-spamfree/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spamfree,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spamfree/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spamfree" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-special-textboxes-1e506d7d0a79883a044afbbb48ac382a.yaml b/nuclei-templates/cve-less/plugins/wp-special-textboxes-1e506d7d0a79883a044afbbb48ac382a.yaml new file mode 100644 index 0000000000..49c181de4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-special-textboxes-1e506d7d0a79883a044afbbb48ac382a.yaml @@ -0,0 +1,58 @@ +id: wp-special-textboxes-1e506d7d0a79883a044afbbb48ac382a + +info: + name: > + Special Text Boxes <= 5.9.109 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/938d24c2-24f5-42d4-9a8f-f25b65a312f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-special-textboxes/" + google-query: inurl:"/wp-content/plugins/wp-special-textboxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-special-textboxes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-special-textboxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-special-textboxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.109') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-special-textboxes-e6b578c644b8dec6cfd9f0e734409896.yaml b/nuclei-templates/cve-less/plugins/wp-special-textboxes-e6b578c644b8dec6cfd9f0e734409896.yaml new file mode 100644 index 0000000000..46eca5989e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-special-textboxes-e6b578c644b8dec6cfd9f0e734409896.yaml @@ -0,0 +1,58 @@ +id: wp-special-textboxes-e6b578c644b8dec6cfd9f0e734409896 + +info: + name: > + Special Text Boxes <= 5.9.110 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ad239d3-c761-4c78-903d-119133fcb79b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-special-textboxes/" + google-query: inurl:"/wp-content/plugins/wp-special-textboxes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-special-textboxes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-special-textboxes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-special-textboxes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.110') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-spell-check-1775b7a8bc86b1994bca20dc9c550675.yaml b/nuclei-templates/cve-less/plugins/wp-spell-check-1775b7a8bc86b1994bca20dc9c550675.yaml new file mode 100644 index 0000000000..b3ca6a272d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spell-check-1775b7a8bc86b1994bca20dc9c550675.yaml @@ -0,0 +1,58 @@ +id: wp-spell-check-1775b7a8bc86b1994bca20dc9c550675 + +info: + name: > + WP Spell Check <= 9.12 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/787a19cf-a553-4aec-96c5-978956826756?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spell-check/" + google-query: inurl:"/wp-content/plugins/wp-spell-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spell-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spell-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spell-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-spell-check-98dad0bdb32669bad2542d8ed31dc9ac.yaml b/nuclei-templates/cve-less/plugins/wp-spell-check-98dad0bdb32669bad2542d8ed31dc9ac.yaml new file mode 100644 index 0000000000..907e0ee825 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spell-check-98dad0bdb32669bad2542d8ed31dc9ac.yaml @@ -0,0 +1,58 @@ +id: wp-spell-check-98dad0bdb32669bad2542d8ed31dc9ac + +info: + name: > + WP Spell Check <= 9.17 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9eef053c-16a1-4624-8393-08e78b221d4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spell-check/" + google-query: inurl:"/wp-content/plugins/wp-spell-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spell-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spell-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spell-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-spell-check-b804d82967d372f1edcb1ab799e70f37.yaml b/nuclei-templates/cve-less/plugins/wp-spell-check-b804d82967d372f1edcb1ab799e70f37.yaml new file mode 100644 index 0000000000..363befa9ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spell-check-b804d82967d372f1edcb1ab799e70f37.yaml @@ -0,0 +1,58 @@ +id: wp-spell-check-b804d82967d372f1edcb1ab799e70f37 + +info: + name: > + WP Spell Check <= 9.12 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e5674e2-593a-4f53-bb03-9184eccc3244?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spell-check/" + google-query: inurl:"/wp-content/plugins/wp-spell-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spell-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spell-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spell-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-spell-check-d87dde15977bcc3d1ce01f496b79774b.yaml b/nuclei-templates/cve-less/plugins/wp-spell-check-d87dde15977bcc3d1ce01f496b79774b.yaml new file mode 100644 index 0000000000..e599a82b92 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spell-check-d87dde15977bcc3d1ce01f496b79774b.yaml @@ -0,0 +1,58 @@ +id: wp-spell-check-d87dde15977bcc3d1ce01f496b79774b + +info: + name: > + WP Spell Check <= 9.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b28ba929-d057-43f9-b839-62347c06c1bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spell-check/" + google-query: inurl:"/wp-content/plugins/wp-spell-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spell-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spell-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spell-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-spell-check-fc588495329f4334ef4deb847bcc6bbe.yaml b/nuclei-templates/cve-less/plugins/wp-spell-check-fc588495329f4334ef4deb847bcc6bbe.yaml new file mode 100644 index 0000000000..340b953066 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spell-check-fc588495329f4334ef4deb847bcc6bbe.yaml @@ -0,0 +1,58 @@ +id: wp-spell-check-fc588495329f4334ef4deb847bcc6bbe + +info: + name: > + WP Spell Check <= 7.1.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76c39a00-b40a-4d06-96bc-864624e0ef8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spell-check/" + google-query: inurl:"/wp-content/plugins/wp-spell-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spell-check,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spell-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spell-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-spid-italia-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-spid-italia-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..30bf60e46c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spid-italia-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-spid-italia-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spid-italia/" + google-query: inurl:"/wp-content/plugins/wp-spid-italia/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spid-italia,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spid-italia/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spid-italia" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-splashing-images-3ea0e1871dec257bfd7cde582f2ade2e.yaml b/nuclei-templates/cve-less/plugins/wp-splashing-images-3ea0e1871dec257bfd7cde582f2ade2e.yaml new file mode 100644 index 0000000000..00c355c378 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-splashing-images-3ea0e1871dec257bfd7cde582f2ade2e.yaml @@ -0,0 +1,58 @@ +id: wp-splashing-images-3ea0e1871dec257bfd7cde582f2ade2e + +info: + name: > + Splashing Images < 2.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae77b00e-bbcf-4fe2-ab7f-d2e21ef54d3e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-splashing-images/" + google-query: inurl:"/wp-content/plugins/wp-splashing-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-splashing-images,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-splashing-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-splashing-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-splashing-images-8a665769e5dbc54922bf72bb281bcb8c.yaml b/nuclei-templates/cve-less/plugins/wp-splashing-images-8a665769e5dbc54922bf72bb281bcb8c.yaml new file mode 100644 index 0000000000..5e74947db3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-splashing-images-8a665769e5dbc54922bf72bb281bcb8c.yaml @@ -0,0 +1,58 @@ +id: wp-splashing-images-8a665769e5dbc54922bf72bb281bcb8c + +info: + name: > + Splashing Images <= 2.1 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efc2a21d-b6f9-405d-a9a0-779a736e5d94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-splashing-images/" + google-query: inurl:"/wp-content/plugins/wp-splashing-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-splashing-images,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-splashing-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-splashing-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sponsors-6e76234b4d1dbafb645996466faffb64.yaml b/nuclei-templates/cve-less/plugins/wp-sponsors-6e76234b4d1dbafb645996466faffb64.yaml new file mode 100644 index 0000000000..8d1cea857d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sponsors-6e76234b4d1dbafb645996466faffb64.yaml @@ -0,0 +1,58 @@ +id: wp-sponsors-6e76234b4d1dbafb645996466faffb64 + +info: + name: > + Sponsors <= 3.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4af04219-26c5-401d-94ef-11d2321f98bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sponsors/" + google-query: inurl:"/wp-content/plugins/wp-sponsors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sponsors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sponsors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sponsors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sponsors-dfaf8f13c7a5730a90b10c23bd27623b.yaml b/nuclei-templates/cve-less/plugins/wp-sponsors-dfaf8f13c7a5730a90b10c23bd27623b.yaml new file mode 100644 index 0000000000..b2acfa7d5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sponsors-dfaf8f13c7a5730a90b10c23bd27623b.yaml @@ -0,0 +1,58 @@ +id: wp-sponsors-dfaf8f13c7a5730a90b10c23bd27623b + +info: + name: > + Sponsors <= 3.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3235ecfb-8aac-4e0c-b11e-77727c362194?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sponsors/" + google-query: inurl:"/wp-content/plugins/wp-sponsors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sponsors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sponsors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sponsors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-spreadplugin-70f0c41d6aa67cd78e36b9d8660c315e.yaml b/nuclei-templates/cve-less/plugins/wp-spreadplugin-70f0c41d6aa67cd78e36b9d8660c315e.yaml new file mode 100644 index 0000000000..e7bd28a0dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spreadplugin-70f0c41d6aa67cd78e36b9d8660c315e.yaml @@ -0,0 +1,58 @@ +id: wp-spreadplugin-70f0c41d6aa67cd78e36b9d8660c315e + +info: + name: > + WP SpreadPlugin < 3.8.6.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/308b4cfa-3d4f-46a1-a6a8-eaa2653b4953?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spreadplugin/" + google-query: inurl:"/wp-content/plugins/wp-spreadplugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spreadplugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spreadplugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spreadplugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-staging-3d60381961999c332401ff6c0d1b2fcd.yaml b/nuclei-templates/cve-less/plugins/wp-staging-3d60381961999c332401ff6c0d1b2fcd.yaml new file mode 100644 index 0000000000..fa7b8d5f0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-staging-3d60381961999c332401ff6c0d1b2fcd.yaml @@ -0,0 +1,58 @@ +id: wp-staging-3d60381961999c332401ff6c0d1b2fcd + +info: + name: > + WP STAGING – Backup Duplicator & Migration <= 2.9.17 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/184c07ad-e0d9-47c9-9582-828947cc97f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-staging/" + google-query: inurl:"/wp-content/plugins/wp-staging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-staging,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-staging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-staging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-staging-491b3ba699d00a68d515de73a1bb974a.yaml b/nuclei-templates/cve-less/plugins/wp-staging-491b3ba699d00a68d515de73a1bb974a.yaml new file mode 100644 index 0000000000..5255eec919 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-staging-491b3ba699d00a68d515de73a1bb974a.yaml @@ -0,0 +1,58 @@ +id: wp-staging-491b3ba699d00a68d515de73a1bb974a + +info: + name: > + WP STAGING WordPress Backup Plugin < 3.2.0 - Sensitive Information Exposure via cache files + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe8816d8-1687-4a3c-9f2a-23f21d679cc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-staging/" + google-query: inurl:"/wp-content/plugins/wp-staging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-staging,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-staging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-staging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-staging-84e23826180e38f8c23713de5476118f.yaml b/nuclei-templates/cve-less/plugins/wp-staging-84e23826180e38f8c23713de5476118f.yaml new file mode 100644 index 0000000000..9856053100 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-staging-84e23826180e38f8c23713de5476118f.yaml @@ -0,0 +1,58 @@ +id: wp-staging-84e23826180e38f8c23713de5476118f + +info: + name: > + WP STAGING WordPress Backup Plugin Free <= 3.1.2 and Pro <= 5.1.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3e03668-c9ee-4c4b-8240-998ef45a5326?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-staging/" + google-query: inurl:"/wp-content/plugins/wp-staging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-staging,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-staging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-staging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-staging-cb4f2a317f426735af573c79456925c6.yaml b/nuclei-templates/cve-less/plugins/wp-staging-cb4f2a317f426735af573c79456925c6.yaml new file mode 100644 index 0000000000..44a2280438 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-staging-cb4f2a317f426735af573c79456925c6.yaml @@ -0,0 +1,58 @@ +id: wp-staging-cb4f2a317f426735af573c79456925c6 + +info: + name: > + WP STAGING <= 3.4.3 and WP STAGING Pro <= 5.4.3 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75eab54b-dbe0-4440-b4ab-601c5041e180?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-staging/" + google-query: inurl:"/wp-content/plugins/wp-staging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-staging,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-staging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-staging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-staging-f1e3da63f99b2cc6fa2a68c3535839bf.yaml b/nuclei-templates/cve-less/plugins/wp-staging-f1e3da63f99b2cc6fa2a68c3535839bf.yaml new file mode 100644 index 0000000000..4d34f0ecf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-staging-f1e3da63f99b2cc6fa2a68c3535839bf.yaml @@ -0,0 +1,58 @@ +id: wp-staging-f1e3da63f99b2cc6fa2a68c3535839bf + +info: + name: > + WP Staging (Free <= 3.3.3, Pro <= 5.3.3) - Authenticated (Administrator+) Stored Cross-Site-Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bcbdf6f-770c-4496-a643-94dbf63e893a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-staging/" + google-query: inurl:"/wp-content/plugins/wp-staging/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-staging,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-staging/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-staging" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-staging-pro-84e23826180e38f8c23713de5476118f.yaml b/nuclei-templates/cve-less/plugins/wp-staging-pro-84e23826180e38f8c23713de5476118f.yaml new file mode 100644 index 0000000000..91a3202ab6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-staging-pro-84e23826180e38f8c23713de5476118f.yaml @@ -0,0 +1,58 @@ +id: wp-staging-pro-84e23826180e38f8c23713de5476118f + +info: + name: > + WP STAGING WordPress Backup Plugin Free <= 3.1.2 and Pro <= 5.1.2 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3e03668-c9ee-4c4b-8240-998ef45a5326?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-staging-pro/" + google-query: inurl:"/wp-content/plugins/wp-staging-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-staging-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-staging-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-staging-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-staging-pro-cb4f2a317f426735af573c79456925c6.yaml b/nuclei-templates/cve-less/plugins/wp-staging-pro-cb4f2a317f426735af573c79456925c6.yaml new file mode 100644 index 0000000000..39e1307ac4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-staging-pro-cb4f2a317f426735af573c79456925c6.yaml @@ -0,0 +1,58 @@ +id: wp-staging-pro-cb4f2a317f426735af573c79456925c6 + +info: + name: > + WP STAGING <= 3.4.3 and WP STAGING Pro <= 5.4.3 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75eab54b-dbe0-4440-b4ab-601c5041e180?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-staging-pro/" + google-query: inurl:"/wp-content/plugins/wp-staging-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-staging-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-staging-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-staging-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-staging-pro-f1e3da63f99b2cc6fa2a68c3535839bf.yaml b/nuclei-templates/cve-less/plugins/wp-staging-pro-f1e3da63f99b2cc6fa2a68c3535839bf.yaml new file mode 100644 index 0000000000..9efa1b8844 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-staging-pro-f1e3da63f99b2cc6fa2a68c3535839bf.yaml @@ -0,0 +1,58 @@ +id: wp-staging-pro-f1e3da63f99b2cc6fa2a68c3535839bf + +info: + name: > + WP Staging (Free <= 3.3.3, Pro <= 5.3.3) - Authenticated (Administrator+) Stored Cross-Site-Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bcbdf6f-770c-4496-a643-94dbf63e893a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-staging-pro/" + google-query: inurl:"/wp-content/plugins/wp-staging-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-staging-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-staging-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-staging-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stateless-1aa8a227283e43da0f41a656224571d0.yaml b/nuclei-templates/cve-less/plugins/wp-stateless-1aa8a227283e43da0f41a656224571d0.yaml new file mode 100644 index 0000000000..2a504d6bd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stateless-1aa8a227283e43da0f41a656224571d0.yaml @@ -0,0 +1,58 @@ +id: wp-stateless-1aa8a227283e43da0f41a656224571d0 + +info: + name: > + WP-Stateless – Google Cloud Storage <= 3.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38b8151f-4938-4101-9886-783f54984d20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stateless/" + google-query: inurl:"/wp-content/plugins/wp-stateless/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stateless,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stateless/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stateless" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stateless-99a5656c2d3d84a74af5b274cf1cca3f.yaml b/nuclei-templates/cve-less/plugins/wp-stateless-99a5656c2d3d84a74af5b274cf1cca3f.yaml new file mode 100644 index 0000000000..664c4c3464 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stateless-99a5656c2d3d84a74af5b274cf1cca3f.yaml @@ -0,0 +1,58 @@ +id: wp-stateless-99a5656c2d3d84a74af5b274cf1cca3f + +info: + name: > + WP-Stateless – Google Cloud Storage <= 3.4.0 - Missing Authorization to Limited Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a475017-ef45-4614-bdc6-ddd619b8caf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stateless/" + google-query: inurl:"/wp-content/plugins/wp-stateless/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stateless,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stateless/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stateless" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-077764df60648b9aef2b2fc6c9e65d50.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-077764df60648b9aef2b2fc6c9e65d50.yaml new file mode 100644 index 0000000000..719f277664 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-077764df60648b9aef2b2fc6c9e65d50.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-077764df60648b9aef2b2fc6c9e65d50 + +info: + name: > + WP Statistics <= 13.1.5 - Unauthenticated Blind SQL Injection via IP + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9555c48f-5ce3-4c0c-88f3-83776b42b808?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-089f9d6847e0d3965eee292fee99d926.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-089f9d6847e0d3965eee292fee99d926.yaml new file mode 100644 index 0000000000..237ac5f61b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-089f9d6847e0d3965eee292fee99d926.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-089f9d6847e0d3965eee292fee99d926 + +info: + name: > + WP Statistics <= 13.1.1 - Cross-Site Request Forgery to Arbitrary Plugin Activation and Deactivation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/215937d9-739b-4198-b375-6d171bbac64a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-0ec38a5c1835d15197b4df3637b60941.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-0ec38a5c1835d15197b4df3637b60941.yaml new file mode 100644 index 0000000000..347bcaaf54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-0ec38a5c1835d15197b4df3637b60941.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-0ec38a5c1835d15197b4df3637b60941 + +info: + name: > + WP Statistics <= 8.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b8af407-b49d-4d3f-a7a5-c3ad3d56fcba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-1510080b156a41f0be0cec87e4c71c9d.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-1510080b156a41f0be0cec87e4c71c9d.yaml new file mode 100644 index 0000000000..f05c45fc15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-1510080b156a41f0be0cec87e4c71c9d.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-1510080b156a41f0be0cec87e4c71c9d + +info: + name: > + WP Statistics <= 13.2.5 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/42f54887-ce98-4360-8d07-37b1a48fc3fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-1c8db3326f7e7fbd2267d1b19822a630.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-1c8db3326f7e7fbd2267d1b19822a630.yaml new file mode 100644 index 0000000000..b5671c76bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-1c8db3326f7e7fbd2267d1b19822a630.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-1c8db3326f7e7fbd2267d1b19822a630 + +info: + name: > + WP Statistics <= 13.1.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46545227-3c04-40a4-a25c-8f43845e90d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-268f3c8028825c46a53ec35cc9415801.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-268f3c8028825c46a53ec35cc9415801.yaml new file mode 100644 index 0000000000..e0ad146f2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-268f3c8028825c46a53ec35cc9415801.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-268f3c8028825c46a53ec35cc9415801 + +info: + name: > + WP Statistics <= 2.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3a4aeb2-3929-4f6b-ac6e-bccc1c3bf0dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-2a14d3fb0a465f1cdb9f64f93f69aedd.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-2a14d3fb0a465f1cdb9f64f93f69aedd.yaml new file mode 100644 index 0000000000..b3584b7419 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-2a14d3fb0a465f1cdb9f64f93f69aedd.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-2a14d3fb0a465f1cdb9f64f93f69aedd + +info: + name: > + WP Statistics <= 13.1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb7e922a-fae0-46f9-b8c1-0986b88f2813?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-2fefd80a39593e8b391e705011e7dfb1.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-2fefd80a39593e8b391e705011e7dfb1.yaml new file mode 100644 index 0000000000..10984444a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-2fefd80a39593e8b391e705011e7dfb1.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-2fefd80a39593e8b391e705011e7dfb1 + +info: + name: > + WP Statistics <= 13.1.5 - Unauthenticated Stored Cross-Site Scripting via platform + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2165d61-dc86-4893-91c4-85f0a577fc1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-3465e5292d73a551eb6c16bb4b06a27c.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-3465e5292d73a551eb6c16bb4b06a27c.yaml new file mode 100644 index 0000000000..686dc77c89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-3465e5292d73a551eb6c16bb4b06a27c.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-3465e5292d73a551eb6c16bb4b06a27c + +info: + name: > + WP Statistics <= 13.1.5 - Unauthenticated Blind SQL Injection via current_page_type + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f0051d5-b236-420c-ae65-14610d05c6d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-3a4442e88172a0a47b7f5df765c70f36.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-3a4442e88172a0a47b7f5df765c70f36.yaml new file mode 100644 index 0000000000..5deb46ebec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-3a4442e88172a0a47b7f5df765c70f36.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-3a4442e88172a0a47b7f5df765c70f36 + +info: + name: > + WP Statistics <= 14.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e44e4bdd-d84e-4315-9232-48a3b240242d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-402d7d7b6c58cc7a536b0d43e9d4a1fc.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-402d7d7b6c58cc7a536b0d43e9d4a1fc.yaml new file mode 100644 index 0000000000..4ae9c06b7a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-402d7d7b6c58cc7a536b0d43e9d4a1fc.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-402d7d7b6c58cc7a536b0d43e9d4a1fc + +info: + name: > + WP Statistics <= 12.0.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63f588c6-6bad-44d2-a9d9-832d3a7d33ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.0.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-419ac020ad7416a34796c2fb1e817b8f.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-419ac020ad7416a34796c2fb1e817b8f.yaml new file mode 100644 index 0000000000..0169a8288f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-419ac020ad7416a34796c2fb1e817b8f.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-419ac020ad7416a34796c2fb1e817b8f + +info: + name: > + WP Statistics <= 13.0.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba88a1f5-9ebf-4899-81b3-e65587ae2fe2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-4533ca9d47b3b4f7b077cc893cacad61.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-4533ca9d47b3b4f7b077cc893cacad61.yaml new file mode 100644 index 0000000000..d49bf47aa1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-4533ca9d47b3b4f7b077cc893cacad61.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-4533ca9d47b3b4f7b077cc893cacad61 + +info: + name: > + WP Statistics <= 12.0.7 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3be36cd6-27a3-4b15-9e43-b1f6c25efae6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-4ab5b9d0741d36fdeb0d5b8e06672d39.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-4ab5b9d0741d36fdeb0d5b8e06672d39.yaml new file mode 100644 index 0000000000..9291dbf51c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-4ab5b9d0741d36fdeb0d5b8e06672d39.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-4ab5b9d0741d36fdeb0d5b8e06672d39 + +info: + name: > + WP Statistics <= 13.2.16 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ffd60d2-ae8d-4738-a4f4-6df6e0ffa8c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-4c0f6a08d37bb188811061a17ff42cfa.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-4c0f6a08d37bb188811061a17ff42cfa.yaml new file mode 100644 index 0000000000..029d0f6fa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-4c0f6a08d37bb188811061a17ff42cfa.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-4c0f6a08d37bb188811061a17ff42cfa + +info: + name: > + WP Statistics <= 12.6.3 - Referer Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdbad4b2-961a-41df-b284-14deb0a76677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-50c234504ff6b18931188a11546b06e4.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-50c234504ff6b18931188a11546b06e4.yaml new file mode 100644 index 0000000000..d289a2f7e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-50c234504ff6b18931188a11546b06e4.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-50c234504ff6b18931188a11546b06e4 + +info: + name: > + WP Statistics <= 13.2.5 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a0c6425-866d-4b50-b464-87a8173c4abd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '13.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-5a1aec8bb448585f2b3947c8d2f43d52.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-5a1aec8bb448585f2b3947c8d2f43d52.yaml new file mode 100644 index 0000000000..4cde07c6d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-5a1aec8bb448585f2b3947c8d2f43d52.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-5a1aec8bb448585f2b3947c8d2f43d52 + +info: + name: > + WP Statistics <= 12.6.6.1 - Unauthenticated Stored Cross-Site Scripting via IP Manipulation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69f861bf-933f-4413-a5c0-fd39ee78e594?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-5c2247e17c791b6fdfbffdac85a13840.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-5c2247e17c791b6fdfbffdac85a13840.yaml new file mode 100644 index 0000000000..080cdd2661 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-5c2247e17c791b6fdfbffdac85a13840.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-5c2247e17c791b6fdfbffdac85a13840 + +info: + name: > + WP Statistics <= 13.2.10 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7638fd24-d376-4b5b-98bb-4a40ada6a4da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-5cdc77b83509c234be9fd2621b4d50a6.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-5cdc77b83509c234be9fd2621b4d50a6.yaml new file mode 100644 index 0000000000..0650c2fbd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-5cdc77b83509c234be9fd2621b4d50a6.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-5cdc77b83509c234be9fd2621b4d50a6 + +info: + name: > + WP Statistics <= 13.2.8 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6e4d8c3-f3ab-40f9-a8d2-77b53a8dba72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-6600d372243624aa436749b499ef6260.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-6600d372243624aa436749b499ef6260.yaml new file mode 100644 index 0000000000..c49d1869aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-6600d372243624aa436749b499ef6260.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-6600d372243624aa436749b499ef6260 + +info: + name: > + WP Statistics < 9.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7cb3540-ffdb-4b4c-a518-4ca8232ab53f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-84d819f2c5dbd24e5ca9102c42b9b228.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-84d819f2c5dbd24e5ca9102c42b9b228.yaml new file mode 100644 index 0000000000..8349d7f767 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-84d819f2c5dbd24e5ca9102c42b9b228.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-84d819f2c5dbd24e5ca9102c42b9b228 + +info: + name: > + WP Statistics <= 13.1.5 - Unauthenticated Stored Cross-Site Scripting via browser + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcb68038-96a6-40b6-a37c-757fc19cbe0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-98db2564f4a4bc79566064c237408008.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-98db2564f4a4bc79566064c237408008.yaml new file mode 100644 index 0000000000..fcd078cf49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-98db2564f4a4bc79566064c237408008.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-98db2564f4a4bc79566064c237408008 + +info: + name: > + WP Statistics <= 13.2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6f549c8-673b-4032-9b56-5a2e2239eff3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-99d2db479f6570516dd28aa787f58742.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-99d2db479f6570516dd28aa787f58742.yaml new file mode 100644 index 0000000000..d880181a7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-99d2db479f6570516dd28aa787f58742.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-99d2db479f6570516dd28aa787f58742 + +info: + name: > + WP Statistics <= 13.1.5 - Unauthenticated Stored Cross-Site Scripting via IP + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e3bcd70-d19c-4c0f-80d0-a69e2ab947d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-b396ad7ddae66e7db7a5d4c1747eea0d.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-b396ad7ddae66e7db7a5d4c1747eea0d.yaml new file mode 100644 index 0000000000..1e14225227 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-b396ad7ddae66e7db7a5d4c1747eea0d.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-b396ad7ddae66e7db7a5d4c1747eea0d + +info: + name: > + WP Statistics <= 12.0.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcd981fb-ef75-4ed3-a18f-4ad9eaa148f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-c6fa1f77c447ad70ead1d031770de1e9.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-c6fa1f77c447ad70ead1d031770de1e9.yaml new file mode 100644 index 0000000000..354bd5fe15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-c6fa1f77c447ad70ead1d031770de1e9.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-c6fa1f77c447ad70ead1d031770de1e9 + +info: + name: > + WP Statistics <= 9.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/70db1a8e-ebff-4505-9e43-1ce48e94f3c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-c7e70d0a47cc47b927ca88ef25cbbeb3.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-c7e70d0a47cc47b927ca88ef25cbbeb3.yaml new file mode 100644 index 0000000000..2938297624 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-c7e70d0a47cc47b927ca88ef25cbbeb3.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-c7e70d0a47cc47b927ca88ef25cbbeb3 + +info: + name: > + WP Statistics <= 12.6.6.1 - Unauthenticated Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f9fd9e1-c4b8-420e-a4d3-30c934853a98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.6.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-cf0e8508a150a92dcb38be8ebc42b5eb.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-cf0e8508a150a92dcb38be8ebc42b5eb.yaml new file mode 100644 index 0000000000..f1c9a9f097 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-cf0e8508a150a92dcb38be8ebc42b5eb.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-cf0e8508a150a92dcb38be8ebc42b5eb + +info: + name: > + WP Statistics <= 13.0.7 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f561cce-1c0c-40f5-abba-ada8bc503aa8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-d323b2ee541571a78879d377867cb57c.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-d323b2ee541571a78879d377867cb57c.yaml new file mode 100644 index 0000000000..bd6e8198f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-d323b2ee541571a78879d377867cb57c.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-d323b2ee541571a78879d377867cb57c + +info: + name: > + WP Statistics <= 12.0.9 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb519441-2598-4907-8e49-036c455176ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-e9a7d43315eb08a5c15f9831030945e8.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-e9a7d43315eb08a5c15f9831030945e8.yaml new file mode 100644 index 0000000000..6f177882fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-e9a7d43315eb08a5c15f9831030945e8.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-e9a7d43315eb08a5c15f9831030945e8 + +info: + name: > + WP Statistics < 9.4.1 - Authenticated Blind SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/364804a5-8699-46be-b25e-890a10134a25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-f2b175b82a16e321f13c2528d80eed13.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-f2b175b82a16e321f13c2528d80eed13.yaml new file mode 100644 index 0000000000..217720c28a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-f2b175b82a16e321f13c2528d80eed13.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-f2b175b82a16e321f13c2528d80eed13 + +info: + name: > + WP Statistics < 8.3.1 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d14779f-3ee5-4a55-b49d-e9162db2f4a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-fba6fe4ba924ddd9440214f83e497b37.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-fba6fe4ba924ddd9440214f83e497b37.yaml new file mode 100644 index 0000000000..c49321114d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-fba6fe4ba924ddd9440214f83e497b37.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-fba6fe4ba924ddd9440214f83e497b37 + +info: + name: > + WP Statistics <= 13.1.4 - Unauthenticated Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbc2a1f7-4c3c-4f37-a187-572f40e9b792?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-statistics-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml b/nuclei-templates/cve-less/plugins/wp-statistics-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml new file mode 100644 index 0000000000..a11dcbcefd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-statistics-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml @@ -0,0 +1,58 @@ +id: wp-statistics-fe0f4f4fb6e560c8f83991dc7a6212ad + +info: + name: > + WP Statistics <= 12.6.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc684cd2-f01a-4c2d-b979-a47b83d01bd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-statistics/" + google-query: inurl:"/wp-content/plugins/wp-statistics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-statistics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-statistics/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-statistics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-422debdfe258e02ddb505987826a2ea3.yaml b/nuclei-templates/cve-less/plugins/wp-stats-422debdfe258e02ddb505987826a2ea3.yaml new file mode 100644 index 0000000000..774efe4b41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-422debdfe258e02ddb505987826a2ea3.yaml @@ -0,0 +1,58 @@ +id: wp-stats-422debdfe258e02ddb505987826a2ea3 + +info: + name: > + WP-Stats < 2.52 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3df11929-37be-4c52-ae53-fbbe926659b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats/" + google-query: inurl:"/wp-content/plugins/wp-stats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.52') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-dashboard-cca20bceb29d548b71fff2c6b265d9c3.yaml b/nuclei-templates/cve-less/plugins/wp-stats-dashboard-cca20bceb29d548b71fff2c6b265d9c3.yaml new file mode 100644 index 0000000000..30345101da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-dashboard-cca20bceb29d548b71fff2c6b265d9c3.yaml @@ -0,0 +1,58 @@ +id: wp-stats-dashboard-cca20bceb29d548b71fff2c6b265d9c3 + +info: + name: > + WP-Stats-Dashboard <= 2.9.4 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53a28cee-fda0-43eb-8012-5059bb061694?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats-dashboard/" + google-query: inurl:"/wp-content/plugins/wp-stats-dashboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats-dashboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats-dashboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats-dashboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-manager-1085089f2339a1b75325ca6667c1e32b.yaml b/nuclei-templates/cve-less/plugins/wp-stats-manager-1085089f2339a1b75325ca6667c1e32b.yaml new file mode 100644 index 0000000000..af04b5d1e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-manager-1085089f2339a1b75325ca6667c1e32b.yaml @@ -0,0 +1,58 @@ +id: wp-stats-manager-1085089f2339a1b75325ca6667c1e32b + +info: + name: > + WP Visitor Statistics (Real Time Traffic) <= 6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ef9a757-625b-417a-b0ec-f13e2ff4f0f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats-manager/" + google-query: inurl:"/wp-content/plugins/wp-stats-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-manager-1be66c0880c6c44fa345977c011d45e4.yaml b/nuclei-templates/cve-less/plugins/wp-stats-manager-1be66c0880c6c44fa345977c011d45e4.yaml new file mode 100644 index 0000000000..76229297b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-manager-1be66c0880c6c44fa345977c011d45e4.yaml @@ -0,0 +1,58 @@ +id: wp-stats-manager-1be66c0880c6c44fa345977c011d45e4 + +info: + name: > + WP Visitor Statistics (Real Time Traffic) <= 5.5 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd3c1e65-fcb2-4e31-973b-8271a833c6ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats-manager/" + google-query: inurl:"/wp-content/plugins/wp-stats-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-manager-6d7c8242c157e79033d5cce1ebd197e9.yaml b/nuclei-templates/cve-less/plugins/wp-stats-manager-6d7c8242c157e79033d5cce1ebd197e9.yaml new file mode 100644 index 0000000000..f2e78607dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-manager-6d7c8242c157e79033d5cce1ebd197e9.yaml @@ -0,0 +1,58 @@ +id: wp-stats-manager-6d7c8242c157e79033d5cce1ebd197e9 + +info: + name: > + WP Visitor Statistics (Real Time Traffic) <= 5.4 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/693fbac2-46b8-4771-99b5-6cd97096286e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats-manager/" + google-query: inurl:"/wp-content/plugins/wp-stats-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-manager-784bab21dbff631c360386613afa3af2.yaml b/nuclei-templates/cve-less/plugins/wp-stats-manager-784bab21dbff631c360386613afa3af2.yaml new file mode 100644 index 0000000000..62cf26eaa8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-manager-784bab21dbff631c360386613afa3af2.yaml @@ -0,0 +1,58 @@ +id: wp-stats-manager-784bab21dbff631c360386613afa3af2 + +info: + name: > + WP Visitor Statistics (Real Time Traffic) <= 5.7 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79f14b3f-3163-41c2-88ff-a1e0879e8248?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats-manager/" + google-query: inurl:"/wp-content/plugins/wp-stats-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-manager-8bca0401c2687aab215b4ddd44231c26.yaml b/nuclei-templates/cve-less/plugins/wp-stats-manager-8bca0401c2687aab215b4ddd44231c26.yaml new file mode 100644 index 0000000000..5ba7c96470 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-manager-8bca0401c2687aab215b4ddd44231c26.yaml @@ -0,0 +1,58 @@ +id: wp-stats-manager-8bca0401c2687aab215b4ddd44231c26 + +info: + name: > + WP Visitor Statistics (Real Time Traffic) <= 4.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9687e8e5-add1-477d-9cb7-f94b8af10da5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats-manager/" + google-query: inurl:"/wp-content/plugins/wp-stats-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-manager-933664bac0ba7d546ec800941231f6f3.yaml b/nuclei-templates/cve-less/plugins/wp-stats-manager-933664bac0ba7d546ec800941231f6f3.yaml new file mode 100644 index 0000000000..5b60cf6f2c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-manager-933664bac0ba7d546ec800941231f6f3.yaml @@ -0,0 +1,58 @@ +id: wp-stats-manager-933664bac0ba7d546ec800941231f6f3 + +info: + name: > + WP Visitor Statistics (Real Time Traffic) <= 6.9.4 - Sensitive Information Exposure via Log File + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2d69d59-390d-4f3c-96ba-487707cac7a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats-manager/" + google-query: inurl:"/wp-content/plugins/wp-stats-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stats-manager-a3d20ed9da7c57fc778f0d01bfbac322.yaml b/nuclei-templates/cve-less/plugins/wp-stats-manager-a3d20ed9da7c57fc778f0d01bfbac322.yaml new file mode 100644 index 0000000000..f73f20c38f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stats-manager-a3d20ed9da7c57fc778f0d01bfbac322.yaml @@ -0,0 +1,58 @@ +id: wp-stats-manager-a3d20ed9da7c57fc778f0d01bfbac322 + +info: + name: > + WP Visitor Statistics (Real Time Traffic) <= 6.8.1 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8e511ec-93d3-45f3-98ee-ffa7a79bf74e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stats-manager/" + google-query: inurl:"/wp-content/plugins/wp-stats-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stats-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stats-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stats-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-sticky-social-a15cdcee1d81fbf41320a2105863ebbb.yaml b/nuclei-templates/cve-less/plugins/wp-sticky-social-a15cdcee1d81fbf41320a2105863ebbb.yaml new file mode 100644 index 0000000000..e63a31ea22 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-sticky-social-a15cdcee1d81fbf41320a2105863ebbb.yaml @@ -0,0 +1,58 @@ +id: wp-sticky-social-a15cdcee1d81fbf41320a2105863ebbb + +info: + name: > + WP Sticky Social <= 1.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a272e12b-97a2-421a-a703-3acce2ed8313?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-sticky-social/" + google-query: inurl:"/wp-content/plugins/wp-sticky-social/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-sticky-social,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-sticky-social/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sticky-social" + part: body + + - type: dsl + dsl: + - compare_versions(version, '1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stripe-checkout-23d71c471ed57b8e6edb42812714c4cc.yaml b/nuclei-templates/cve-less/plugins/wp-stripe-checkout-23d71c471ed57b8e6edb42812714c4cc.yaml new file mode 100644 index 0000000000..7ffffbca1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stripe-checkout-23d71c471ed57b8e6edb42812714c4cc.yaml @@ -0,0 +1,58 @@ +id: wp-stripe-checkout-23d71c471ed57b8e6edb42812714c4cc + +info: + name: > + WP Stripe Checkout <= 1.2.2.37 - Sensitive Information Exposure via Debug Log + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f244b8e-94ae-4d95-83a7-53b826e98656?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stripe-checkout/" + google-query: inurl:"/wp-content/plugins/wp-stripe-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stripe-checkout,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stripe-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stripe-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.37') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stripe-checkout-8a4ffb5cbc3cc45c48f96fc0d6e8fdac.yaml b/nuclei-templates/cve-less/plugins/wp-stripe-checkout-8a4ffb5cbc3cc45c48f96fc0d6e8fdac.yaml new file mode 100644 index 0000000000..d6602749f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stripe-checkout-8a4ffb5cbc3cc45c48f96fc0d6e8fdac.yaml @@ -0,0 +1,58 @@ +id: wp-stripe-checkout-8a4ffb5cbc3cc45c48f96fc0d6e8fdac + +info: + name: > + WP Stripe Checkout <= 1.2.2.20 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bf6b196-6dd8-41b7-9838-287be16559fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stripe-checkout/" + google-query: inurl:"/wp-content/plugins/wp-stripe-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stripe-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stripe-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stripe-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stripe-checkout-deed3fa156af1c41e337b8275419b59f.yaml b/nuclei-templates/cve-less/plugins/wp-stripe-checkout-deed3fa156af1c41e337b8275419b59f.yaml new file mode 100644 index 0000000000..f9b645273d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stripe-checkout-deed3fa156af1c41e337b8275419b59f.yaml @@ -0,0 +1,58 @@ +id: wp-stripe-checkout-deed3fa156af1c41e337b8275419b59f + +info: + name: > + WP Stripe Checkout <= 1.2.2.41 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe5227f0-3f7f-4d31-8d46-de2eec44b514?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stripe-checkout/" + google-query: inurl:"/wp-content/plugins/wp-stripe-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stripe-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stripe-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stripe-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stripe-donation-538423ca9f2308dfd7db2d7106fab896.yaml b/nuclei-templates/cve-less/plugins/wp-stripe-donation-538423ca9f2308dfd7db2d7106fab896.yaml new file mode 100644 index 0000000000..7d82eaee6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stripe-donation-538423ca9f2308dfd7db2d7106fab896.yaml @@ -0,0 +1,58 @@ +id: wp-stripe-donation-538423ca9f2308dfd7db2d7106fab896 + +info: + name: > + Accept Stripe Donation – AidWP <= 3.1.5 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27161b4b-d11c-487b-b1ce-7e43bf7b2e57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stripe-donation/" + google-query: inurl:"/wp-content/plugins/wp-stripe-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stripe-donation,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stripe-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stripe-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-stripe-donation-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-stripe-donation-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..260fd476a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-stripe-donation-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-stripe-donation-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-stripe-donation/" + google-query: inurl:"/wp-content/plugins/wp-stripe-donation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-stripe-donation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-stripe-donation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-stripe-donation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-structured-data-schema-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-structured-data-schema-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0acd741a7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-structured-data-schema-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-structured-data-schema-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-structured-data-schema/" + google-query: inurl:"/wp-content/plugins/wp-structured-data-schema/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-structured-data-schema,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-structured-data-schema/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-structured-data-schema" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-structuring-markup-d5d53242307fbcb60f1d07b6a75cb319.yaml b/nuclei-templates/cve-less/plugins/wp-structuring-markup-d5d53242307fbcb60f1d07b6a75cb319.yaml new file mode 100644 index 0000000000..56e9571e6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-structuring-markup-d5d53242307fbcb60f1d07b6a75cb319.yaml @@ -0,0 +1,58 @@ +id: wp-structuring-markup-d5d53242307fbcb60f1d07b6a75cb319 + +info: + name: > + Markup <= 4.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9ac2142-7872-4061-9557-d27015403595?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-structuring-markup/" + google-query: inurl:"/wp-content/plugins/wp-structuring-markup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-structuring-markup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-structuring-markup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-structuring-markup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-subscribe-a4b9301f609713ae947856e0a785959d.yaml b/nuclei-templates/cve-less/plugins/wp-subscribe-a4b9301f609713ae947856e0a785959d.yaml new file mode 100644 index 0000000000..b610c2cdf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-subscribe-a4b9301f609713ae947856e0a785959d.yaml @@ -0,0 +1,58 @@ +id: wp-subscribe-a4b9301f609713ae947856e0a785959d + +info: + name: > + WP Subscribe <= 1.2.12 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46ca2967-5b75-49f5-8b0c-1e9274423c93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-subscribe/" + google-query: inurl:"/wp-content/plugins/wp-subscribe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-subscribe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-subscribe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-subscribe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-subtitle-8e8d26048a256bd2a6af10c450c287bb.yaml b/nuclei-templates/cve-less/plugins/wp-subtitle-8e8d26048a256bd2a6af10c450c287bb.yaml new file mode 100644 index 0000000000..7d26a01014 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-subtitle-8e8d26048a256bd2a6af10c450c287bb.yaml @@ -0,0 +1,58 @@ +id: wp-subtitle-8e8d26048a256bd2a6af10c450c287bb + +info: + name: > + WP Subtitle <= 3.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bc66669-ee38-408a-9dea-e6421cc6f75c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-subtitle/" + google-query: inurl:"/wp-content/plugins/wp-subtitle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-subtitle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-subtitle/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-subtitle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-0063bb4beaa99595ff7d4e40026fb686.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-0063bb4beaa99595ff7d4e40026fb686.yaml new file mode 100644 index 0000000000..c7e9b0f5c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-0063bb4beaa99595ff7d4e40026fb686.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-0063bb4beaa99595ff7d4e40026fb686 + +info: + name: > + WP Super Cache <= 1.4.4 - Authenticated File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51b6c73d-fd4f-4469-9859-fbae61b5924c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-0a730b29011862fa99f3ba28ddcb0a8c.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-0a730b29011862fa99f3ba28ddcb0a8c.yaml new file mode 100644 index 0000000000..3836bcba21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-0a730b29011862fa99f3ba28ddcb0a8c.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-0a730b29011862fa99f3ba28ddcb0a8c + +info: + name: > + WP Super Cache <= 1.7.2 - Authenticated Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/733ae8c8-fa52-418d-b42e-75516906fb66?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-3a746d0bb8a8a4bacac9da6a17fd5b77.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-3a746d0bb8a8a4bacac9da6a17fd5b77.yaml new file mode 100644 index 0000000000..99100fe5b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-3a746d0bb8a8a4bacac9da6a17fd5b77.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-3a746d0bb8a8a4bacac9da6a17fd5b77 + +info: + name: > + WP Super Cache < 1.4.3 - Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/353804e8-0d5a-4633-974c-6eb7a3eeba61?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-5536ba6a87acebd391c60f6bc2e48bf9.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-5536ba6a87acebd391c60f6bc2e48bf9.yaml new file mode 100644 index 0000000000..c192919b28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-5536ba6a87acebd391c60f6bc2e48bf9.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-5536ba6a87acebd391c60f6bc2e48bf9 + +info: + name: > + WP Super Cache <= 1.4.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/51d98277-a1d7-4708-8daf-88948a235375?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-578845e46f5e10ee10237d1397f1fce9.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-578845e46f5e10ee10237d1397f1fce9.yaml new file mode 100644 index 0000000000..d26c9b5988 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-578845e46f5e10ee10237d1397f1fce9.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-578845e46f5e10ee10237d1397f1fce9 + +info: + name: > + WP Super Cache <= 1.7.2 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18afd787-2b1f-452c-90d8-75e0df9322fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-725f6537c801584f5af7c0692e2d6c4d.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-725f6537c801584f5af7c0692e2d6c4d.yaml new file mode 100644 index 0000000000..421e015a66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-725f6537c801584f5af7c0692e2d6c4d.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-725f6537c801584f5af7c0692e2d6c4d + +info: + name: > + WP Super Cache <= 1.8 - Unauthenticated Cache Poisoning + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/505edcf7-7015-453e-abd2-e2cd68a3a9f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-a4d897fcad2378851d5e9f3438f9cdff.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-a4d897fcad2378851d5e9f3438f9cdff.yaml new file mode 100644 index 0000000000..14cfa016ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-a4d897fcad2378851d5e9f3438f9cdff.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-a4d897fcad2378851d5e9f3438f9cdff + +info: + name: > + WP Super Cache <= 1.4.4 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/634ccd08-4f2e-4a06-8c64-dfe38fa3a481?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-ab30f037d37814a0114fbff89d19c5f7.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-ab30f037d37814a0114fbff89d19c5f7.yaml new file mode 100644 index 0000000000..a92d78ddd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-ab30f037d37814a0114fbff89d19c5f7.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-ab30f037d37814a0114fbff89d19c5f7 + +info: + name: > + WP Super Cache <= 1.4.4 - Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13981037-e698-42a7-9471-e27486cf1a4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-afeb8327fb03504a0b5ac79fd5a442f7.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-afeb8327fb03504a0b5ac79fd5a442f7.yaml new file mode 100644 index 0000000000..dd3d46a225 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-afeb8327fb03504a0b5ac79fd5a442f7.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-afeb8327fb03504a0b5ac79fd5a442f7 + +info: + name: > + WP Super Cache <= 1.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9d70f5c-e05f-47c9-994c-0e1da5b2fe01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-c29571f39de26e98c4a31202523c55d7.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-c29571f39de26e98c4a31202523c55d7.yaml new file mode 100644 index 0000000000..330dca07fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-c29571f39de26e98c4a31202523c55d7.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-c29571f39de26e98c4a31202523c55d7 + +info: + name: > + WP Super Cache < 1.3.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6196b07-a2fc-45ac-8700-a1ce2713a960?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-d80662422b2866b3d65a5445924467ed.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-d80662422b2866b3d65a5445924467ed.yaml new file mode 100644 index 0000000000..a4fb55f085 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-d80662422b2866b3d65a5445924467ed.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-d80662422b2866b3d65a5445924467ed + +info: + name: > + WP Super Cache Plugin <= 1.3 - Multiple Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2fcbd6c5-dd03-439c-b6b8-54b0c24a1c27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-cache-fce354233cc8042e718d5365b3a58e08.yaml b/nuclei-templates/cve-less/plugins/wp-super-cache-fce354233cc8042e718d5365b3a58e08.yaml new file mode 100644 index 0000000000..1880fceff8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-cache-fce354233cc8042e718d5365b3a58e08.yaml @@ -0,0 +1,58 @@ +id: wp-super-cache-fce354233cc8042e718d5365b3a58e08 + +info: + name: > + WP Super Cache <= 1.7.1 - Authenticated (Admin+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f6bc166-8489-44bc-862e-dd4dcc1dcff8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-cache/" + google-query: inurl:"/wp-content/plugins/wp-super-cache/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-cache,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-cache/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-cache" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-minify-83ffcb1b7b93055d3871683fd17b0c51.yaml b/nuclei-templates/cve-less/plugins/wp-super-minify-83ffcb1b7b93055d3871683fd17b0c51.yaml new file mode 100644 index 0000000000..4c17df1e8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-minify-83ffcb1b7b93055d3871683fd17b0c51.yaml @@ -0,0 +1,58 @@ +id: wp-super-minify-83ffcb1b7b93055d3871683fd17b0c51 + +info: + name: > + WP Super Minify <= 1.5.1 - Cross-Site Request Forgery via 'wpsmy_admin_options' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af59fcf6-4435-45f0-8904-ff520ea86157?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-minify/" + google-query: inurl:"/wp-content/plugins/wp-super-minify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-minify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-minify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-minify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-super-popup-39af241a774d2dcd3cc32b6204b6cb7b.yaml b/nuclei-templates/cve-less/plugins/wp-super-popup-39af241a774d2dcd3cc32b6204b6cb7b.yaml new file mode 100644 index 0000000000..8a60d9dc5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-super-popup-39af241a774d2dcd3cc32b6204b6cb7b.yaml @@ -0,0 +1,58 @@ +id: wp-super-popup-39af241a774d2dcd3cc32b6204b6cb7b + +info: + name: > + WP Super Popup <= 1.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b458e27-331b-4ae2-ade8-8b14aeffb1e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-super-popup/" + google-query: inurl:"/wp-content/plugins/wp-super-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-super-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-super-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-super-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-385055003f5f62851bef6489ef8b74ea.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-385055003f5f62851bef6489ef8b74ea.yaml new file mode 100644 index 0000000000..074882acf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-385055003f5f62851bef6489ef8b74ea.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-385055003f5f62851bef6489ef8b74ea + +info: + name: > + WP Support Plus Responsive Ticket System <= 4.0 - JavaScript Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b22aaac4-39f1-482b-9fc7-79825cf2e818?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-43205c5c452a1868decf3021c2397818.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-43205c5c452a1868decf3021c2397818.yaml new file mode 100644 index 0000000000..2565be378c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-43205c5c452a1868decf3021c2397818.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-43205c5c452a1868decf3021c2397818 + +info: + name: > + WP Support Plus Responsive Ticket System <= 8.0.7 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1de36458-d7e5-43cf-af40-0fd7a6eea5bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-45e53acb580bbd675bfc6be68ad774dd.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-45e53acb580bbd675bfc6be68ad774dd.yaml new file mode 100644 index 0000000000..96cadf3f47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-45e53acb580bbd675bfc6be68ad774dd.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-45e53acb580bbd675bfc6be68ad774dd + +info: + name: > + WP Support Plus Responsive Ticket System <= 4.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99433521-721b-41c3-8736-fd2943901b4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-497a0a1ea8afe0e920601e57f5c6ccaa.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-497a0a1ea8afe0e920601e57f5c6ccaa.yaml new file mode 100644 index 0000000000..76b8f143cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-497a0a1ea8afe0e920601e57f5c6ccaa.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-497a0a1ea8afe0e920601e57f5c6ccaa + +info: + name: > + WP Support Plus Responsive Ticket System <= 9.1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80b31295-474e-4375-b566-c628e869da10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-4fb356daa205fa86efebf393915d0c50.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-4fb356daa205fa86efebf393915d0c50.yaml new file mode 100644 index 0000000000..25cea6a1b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-4fb356daa205fa86efebf393915d0c50.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-4fb356daa205fa86efebf393915d0c50 + +info: + name: > + Support Plus Responsive Ticket System <= 4.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92c79e51-3b14-4d1c-893b-a683b55f3011?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-8775037057b715229697772ba91f4bf3.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-8775037057b715229697772ba91f4bf3.yaml new file mode 100644 index 0000000000..af1eca4806 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-8775037057b715229697772ba91f4bf3.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-8775037057b715229697772ba91f4bf3 + +info: + name: > + Support Plus Responsive Ticket System < 7.1.0 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59da86c4-1a68-4077-8b56-9c6c8afe26ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-8c62c79ac1c1ebf901388664001a676c.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-8c62c79ac1c1ebf901388664001a676c.yaml new file mode 100644 index 0000000000..c3b265f40f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-8c62c79ac1c1ebf901388664001a676c.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-8c62c79ac1c1ebf901388664001a676c + +info: + name: > + WP Support Plus Responsive Ticket System <= 7.1.4 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4804081-67b1-4c62-af8e-bdbcea2ba6e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-9ffc56b5ea5f6b924435376642f18ea0.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-9ffc56b5ea5f6b924435376642f18ea0.yaml new file mode 100644 index 0000000000..b903b3bd18 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-9ffc56b5ea5f6b924435376642f18ea0.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-9ffc56b5ea5f6b924435376642f18ea0 + +info: + name: > + Support Plus Responsive Ticket System <= 4.1 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bac8245c-292a-4b16-950f-fa3d06e41a09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-d69b023495447f633ec6d9d561e7345f.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-d69b023495447f633ec6d9d561e7345f.yaml new file mode 100644 index 0000000000..4565b7f998 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-d69b023495447f633ec6d9d561e7345f.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-d69b023495447f633ec6d9d561e7345f + +info: + name: > + WP Support Plus Responsive Ticket System <= 9.0.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72ed9cba-fe5c-4cee-9e1b-c3edde2521ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-e87da4fdaddc8c3f88dc163d8c30bc5e.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-e87da4fdaddc8c3f88dc163d8c30bc5e.yaml new file mode 100644 index 0000000000..4afa4bad0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-e87da4fdaddc8c3f88dc163d8c30bc5e.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-e87da4fdaddc8c3f88dc163d8c30bc5e + +info: + name: > + WP Support Plus Responsive Ticket System <= 4.1 - Improper Authentication + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e744c77-efa2-4910-af18-56aa15424412?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-f30cbcc00e52a547df9af466cf2eeb9d.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-f30cbcc00e52a547df9af466cf2eeb9d.yaml new file mode 100644 index 0000000000..78ccc5e1e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-f30cbcc00e52a547df9af466cf2eeb9d.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-f30cbcc00e52a547df9af466cf2eeb9d + +info: + name: > + WP Support Plus Responsive Ticket System <= 9.1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9a989db-683c-492c-8c26-abef0fecf00e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-fac707dbaf41d85badb955071bceca40.yaml b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-fac707dbaf41d85badb955071bceca40.yaml new file mode 100644 index 0000000000..565a63d41f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-support-plus-responsive-ticket-system-fac707dbaf41d85badb955071bceca40.yaml @@ -0,0 +1,58 @@ +id: wp-support-plus-responsive-ticket-system-fac707dbaf41d85badb955071bceca40 + +info: + name: > + WP Support Plus Responsive Ticket System <= 7.1.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1690fe3-f03f-4640-9948-2109d73a841c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" + google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-support-plus-responsive-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-support-plus-responsive-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-survey-and-poll-7aeb0cb02f45fcefa48994c17b9a07f7.yaml b/nuclei-templates/cve-less/plugins/wp-survey-and-poll-7aeb0cb02f45fcefa48994c17b9a07f7.yaml new file mode 100644 index 0000000000..6c3491019f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-survey-and-poll-7aeb0cb02f45fcefa48994c17b9a07f7.yaml @@ -0,0 +1,58 @@ +id: wp-survey-and-poll-7aeb0cb02f45fcefa48994c17b9a07f7 + +info: + name: > + WordPress Survey & Poll – Quiz, Survey and Poll Plugin for WordPress < 1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/944cd237-d5cb-44da-8d4a-5cf7edd368a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-survey-and-poll/" + google-query: inurl:"/wp-content/plugins/wp-survey-and-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-survey-and-poll,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-survey-and-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-survey-and-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-survey-and-quiz-tool-19c5c13179457ac1c8bd83d2fa6c9156.yaml b/nuclei-templates/cve-less/plugins/wp-survey-and-quiz-tool-19c5c13179457ac1c8bd83d2fa6c9156.yaml new file mode 100644 index 0000000000..28fd0cb050 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-survey-and-quiz-tool-19c5c13179457ac1c8bd83d2fa6c9156.yaml @@ -0,0 +1,58 @@ +id: wp-survey-and-quiz-tool-19c5c13179457ac1c8bd83d2fa6c9156 + +info: + name: > + WP Survey And Quiz Tool < 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a77f8a2b-c61b-4942-93b5-202ebce4cf96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-survey-and-quiz-tool/" + google-query: inurl:"/wp-content/plugins/wp-survey-and-quiz-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-survey-and-quiz-tool,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-survey-and-quiz-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-survey-and-quiz-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-survey-and-quiz-tool-fe7166fce08ea1c027bfc2808eb6d8de.yaml b/nuclei-templates/cve-less/plugins/wp-survey-and-quiz-tool-fe7166fce08ea1c027bfc2808eb6d8de.yaml new file mode 100644 index 0000000000..8875c400c2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-survey-and-quiz-tool-fe7166fce08ea1c027bfc2808eb6d8de.yaml @@ -0,0 +1,58 @@ +id: wp-survey-and-quiz-tool-fe7166fce08ea1c027bfc2808eb6d8de + +info: + name: > + Survey And Quiz Tool <= 2.9.2 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a279832-64d8-4e0b-8eba-b7b89c80069d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-survey-and-quiz-tool/" + google-query: inurl:"/wp-content/plugins/wp-survey-and-quiz-tool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-survey-and-quiz-tool,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-survey-and-quiz-tool/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-survey-and-quiz-tool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-survey-plus-e9cbfa821e4a40c5bf6ec29f2c85944c.yaml b/nuclei-templates/cve-less/plugins/wp-survey-plus-e9cbfa821e4a40c5bf6ec29f2c85944c.yaml new file mode 100644 index 0000000000..6a37092164 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-survey-plus-e9cbfa821e4a40c5bf6ec29f2c85944c.yaml @@ -0,0 +1,58 @@ +id: wp-survey-plus-e9cbfa821e4a40c5bf6ec29f2c85944c + +info: + name: > + WP Survey Plus <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/496249cf-f75e-42e6-a189-332dd73d14bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-survey-plus/" + google-query: inurl:"/wp-content/plugins/wp-survey-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-survey-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-survey-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-survey-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-svg-images-d123d567f469bf81fa1efe0cec4fc6a4.yaml b/nuclei-templates/cve-less/plugins/wp-svg-images-d123d567f469bf81fa1efe0cec4fc6a4.yaml new file mode 100644 index 0000000000..fbb1d453ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-svg-images-d123d567f469bf81fa1efe0cec4fc6a4.yaml @@ -0,0 +1,58 @@ +id: wp-svg-images-d123d567f469bf81fa1efe0cec4fc6a4 + +info: + name: > + WP SVG Images <= 3.3 - Authenticated (author+) Stored Cross-Site Scripting via SVG + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b72a26dd-0d20-462e-bb71-ed83eae6766e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-svg-images/" + google-query: inurl:"/wp-content/plugins/wp-svg-images/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-svg-images,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-svg-images/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-svg-images" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-swimteam-99900192dbf1fe9dc977df0b62f5f3df.yaml b/nuclei-templates/cve-less/plugins/wp-swimteam-99900192dbf1fe9dc977df0b62f5f3df.yaml new file mode 100644 index 0000000000..c75e97acb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-swimteam-99900192dbf1fe9dc977df0b62f5f3df.yaml @@ -0,0 +1,58 @@ +id: wp-swimteam-99900192dbf1fe9dc977df0b62f5f3df + +info: + name: > + Swim Team < 1.45.1085 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98d008a4-5dbf-410f-8753-d5aeb28b4447?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-swimteam/" + google-query: inurl:"/wp-content/plugins/wp-swimteam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-swimteam,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-swimteam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-swimteam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.44.1077') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-2fec5b54bae57b8457c08f84660fdcc9.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-2fec5b54bae57b8457c08f84660fdcc9.yaml new file mode 100644 index 0000000000..5a8bea31b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-2fec5b54bae57b8457c08f84660fdcc9.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-2fec5b54bae57b8457c08f84660fdcc9 + +info: + name: > + WP Symposium <= 15.8 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ad379ad-8733-4015-a892-375604339695?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml new file mode 100644 index 0000000000..018e52ebc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-320ea2b9c0bedd9f6c8b24cfa2e671a3 + +info: + name: > + WP Symposium <= 14.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccc7fd8b-ac7d-4b40-816a-a5a1565c422a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-491436cd325d5b03202c1b421dcad671.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-491436cd325d5b03202c1b421dcad671.yaml new file mode 100644 index 0000000000..6eaec62fa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-491436cd325d5b03202c1b421dcad671.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-491436cd325d5b03202c1b421dcad671 + +info: + name: > + WP Symposium < 14.11 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a14c04e8-72cc-4415-a95c-e26f6335b485?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-4ae9af0b470e9693506c7f0dea29cf9b.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-4ae9af0b470e9693506c7f0dea29cf9b.yaml new file mode 100644 index 0000000000..8028ece4b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-4ae9af0b470e9693506c7f0dea29cf9b.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-4ae9af0b470e9693506c7f0dea29cf9b + +info: + name: > + WP Symposium < 15.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbba83c2-4dc3-4850-8bbf-f9c700247b49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-8339317d8346b6724b17c27a89e2d93a.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-8339317d8346b6724b17c27a89e2d93a.yaml new file mode 100644 index 0000000000..234ae5625b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-8339317d8346b6724b17c27a89e2d93a.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-8339317d8346b6724b17c27a89e2d93a + +info: + name: > + WP Symposium < 13.04 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28286b89-0fcd-4616-8246-d8a19d632674?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-94c6416d0acf4ef5543b79e97739f29b.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-94c6416d0acf4ef5543b79e97739f29b.yaml new file mode 100644 index 0000000000..0eff3ce2cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-94c6416d0acf4ef5543b79e97739f29b.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-94c6416d0acf4ef5543b79e97739f29b + +info: + name: > + WP Symposium <= 14.11 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3eee437-e65e-461e-9350-c89f21171e3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-ab05d89891e41c4ee487b45fc002d7f7.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-ab05d89891e41c4ee487b45fc002d7f7.yaml new file mode 100644 index 0000000000..c613b6875c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-ab05d89891e41c4ee487b45fc002d7f7.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-ab05d89891e41c4ee487b45fc002d7f7 + +info: + name: > + WP Symposium <= 13.04 - Open Redirection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd4d7c44-890c-4560-b637-cdc0ca00de31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 13.04') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-ae07dd3ec22029a67416995c9e379fb8.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-ae07dd3ec22029a67416995c9e379fb8.yaml new file mode 100644 index 0000000000..0159fd25a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-ae07dd3ec22029a67416995c9e379fb8.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-ae07dd3ec22029a67416995c9e379fb8 + +info: + name: > + WP Symposium <= 12.11 - SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45163d7f-59c9-4bce-95a7-5b56e1cc018b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-ea4a5a60afde85ede6fced3685c1e946.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-ea4a5a60afde85ede6fced3685c1e946.yaml new file mode 100644 index 0000000000..e83ab442f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-ea4a5a60afde85ede6fced3685c1e946.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-ea4a5a60afde85ede6fced3685c1e946 + +info: + name: > + WP Symposium < 11.12.24 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a03f2dc-21c4-44e9-b7bf-8d4420430466?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.12.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-f25290eae54007b679e22d13b90a23ce.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-f25290eae54007b679e22d13b90a23ce.yaml new file mode 100644 index 0000000000..f763bd7d33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-f25290eae54007b679e22d13b90a23ce.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-f25290eae54007b679e22d13b90a23ce + +info: + name: > + WP Symposium < 15.8 - Blind SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21c87602-bbe7-4fde-8ba2-031120212a8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-f66731d5fdc6cfd1b64d52850c4933f1.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-f66731d5fdc6cfd1b64d52850c4933f1.yaml new file mode 100644 index 0000000000..f9c689f35b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-f66731d5fdc6cfd1b64d52850c4933f1.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-f66731d5fdc6cfd1b64d52850c4933f1 + +info: + name: > + WP Symposium <= 15.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59971f3d-2f98-44fd-a105-621a315721ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-f6896d23342ecbcbdbcbfcb5cd72746c.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-f6896d23342ecbcbdbcbfcb5cd72746c.yaml new file mode 100644 index 0000000000..6f97fc4f87 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-f6896d23342ecbcbdbcbfcb5cd72746c.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-f6896d23342ecbcbdbcbfcb5cd72746c + +info: + name: > + WP Symposium <= 11.11.26 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a896f57-e742-4eb6-85dc-c45d3f0747d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium/" + google-query: inurl:"/wp-content/plugins/wp-symposium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.11.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-pro-22fdef306e2010977a36342bab3a6db5.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-pro-22fdef306e2010977a36342bab3a6db5.yaml new file mode 100644 index 0000000000..6907e082a2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-pro-22fdef306e2010977a36342bab3a6db5.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-pro-22fdef306e2010977a36342bab3a6db5 + +info: + name: > + WP Symposium Pro < 16.01 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7296fdb-d5d6-4d4f-ac80-b9d5452191b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium-pro/" + google-query: inurl:"/wp-content/plugins/wp-symposium-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 16.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-symposium-pro-e1a78698f63c6c67c8d3c4fb4ad0041f.yaml b/nuclei-templates/cve-less/plugins/wp-symposium-pro-e1a78698f63c6c67c8d3c4fb4ad0041f.yaml new file mode 100644 index 0000000000..e62acf8ff7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-symposium-pro-e1a78698f63c6c67c8d3c4fb4ad0041f.yaml @@ -0,0 +1,58 @@ +id: wp-symposium-pro-e1a78698f63c6c67c8d3c4fb4ad0041f + +info: + name: > + WP Symposium Pro < 16.01 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52c7edcc-d8dd-401a-9d36-e395fa7189bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-symposium-pro/" + google-query: inurl:"/wp-content/plugins/wp-symposium-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-symposium-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-symposium-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-symposium-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 16.01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-syntax-2f32fe11ebe5c9f4865c13025a6e4323.yaml b/nuclei-templates/cve-less/plugins/wp-syntax-2f32fe11ebe5c9f4865c13025a6e4323.yaml new file mode 100644 index 0000000000..e531affdf8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-syntax-2f32fe11ebe5c9f4865c13025a6e4323.yaml @@ -0,0 +1,58 @@ +id: wp-syntax-2f32fe11ebe5c9f4865c13025a6e4323 + +info: + name: > + WP Syntax < 0.9.10 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46b3b01c-8739-4b51-be34-1dd3c50d772e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-syntax/" + google-query: inurl:"/wp-content/plugins/wp-syntax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-syntax,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-syntax/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-syntax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-t-wap-9296439439a688a4e97beee133155172.yaml b/nuclei-templates/cve-less/plugins/wp-t-wap-9296439439a688a4e97beee133155172.yaml new file mode 100644 index 0000000000..1ec25fd215 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-t-wap-9296439439a688a4e97beee133155172.yaml @@ -0,0 +1,58 @@ +id: wp-t-wap-9296439439a688a4e97beee133155172 + +info: + name: > + WP-T-Wap <= 1.13.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f14e464-cf48-4f8a-a1db-a8adced8321f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-t-wap/" + google-query: inurl:"/wp-content/plugins/wp-t-wap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-t-wap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-t-wap/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-t-wap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-table-a6d8f41f2ddaf46a5ebf99480a45e53f.yaml b/nuclei-templates/cve-less/plugins/wp-table-a6d8f41f2ddaf46a5ebf99480a45e53f.yaml new file mode 100644 index 0000000000..14e586dece --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-table-a6d8f41f2ddaf46a5ebf99480a45e53f.yaml @@ -0,0 +1,58 @@ +id: wp-table-a6d8f41f2ddaf46a5ebf99480a45e53f + +info: + name: > + WP-Table <= 1.43 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/182370f5-0f56-4757-8276-1399606c1a2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-table/" + google-query: inurl:"/wp-content/plugins/wp-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-table,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-table-builder-995599fd4bfe995b20d11fbb5655b003.yaml b/nuclei-templates/cve-less/plugins/wp-table-builder-995599fd4bfe995b20d11fbb5655b003.yaml new file mode 100644 index 0000000000..e206066bc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-table-builder-995599fd4bfe995b20d11fbb5655b003.yaml @@ -0,0 +1,58 @@ +id: wp-table-builder-995599fd4bfe995b20d11fbb5655b003 + +info: + name: > + WP Table Builder – WordPress Table Plugin <= 1.3.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb4681a5-d722-4585-97d3-370938c079a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-table-builder/" + google-query: inurl:"/wp-content/plugins/wp-table-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-table-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-table-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-table-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-table-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-table-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..cabdd7037e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-table-builder-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-table-builder-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-table-builder/" + google-query: inurl:"/wp-content/plugins/wp-table-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-table-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-table-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-table-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-table-builder-fe0115e4206583520304b505b1843190.yaml b/nuclei-templates/cve-less/plugins/wp-table-builder-fe0115e4206583520304b505b1843190.yaml new file mode 100644 index 0000000000..ba41bcfb73 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-table-builder-fe0115e4206583520304b505b1843190.yaml @@ -0,0 +1,58 @@ +id: wp-table-builder-fe0115e4206583520304b505b1843190 + +info: + name: > + WP Table Builder – WordPress Table Plugin <= 1.4.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91d5d052-d219-4c2f-9341-19f415ff90c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-table-builder/" + google-query: inurl:"/wp-content/plugins/wp-table-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-table-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-table-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-table-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-table-cc04ccc2cdbcd0bde6cfa02b200848c8.yaml b/nuclei-templates/cve-less/plugins/wp-table-cc04ccc2cdbcd0bde6cfa02b200848c8.yaml new file mode 100644 index 0000000000..fb930e6f88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-table-cc04ccc2cdbcd0bde6cfa02b200848c8.yaml @@ -0,0 +1,58 @@ +id: wp-table-cc04ccc2cdbcd0bde6cfa02b200848c8 + +info: + name: > + wp-Table <= 1.43 - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b2b5da9-a421-48fb-9e91-8ef495cbdc37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-table/" + google-query: inurl:"/wp-content/plugins/wp-table/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-table,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-table/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-table" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.43') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-table-manager-63379065ec53581cef23820054e2a064.yaml b/nuclei-templates/cve-less/plugins/wp-table-manager-63379065ec53581cef23820054e2a064.yaml new file mode 100644 index 0000000000..5396ee3f42 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-table-manager-63379065ec53581cef23820054e2a064.yaml @@ -0,0 +1,58 @@ +id: wp-table-manager-63379065ec53581cef23820054e2a064 + +info: + name: > + WP Table Manager <= 3.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f835944-fd27-4f7e-a10d-330fd0fe4ff4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-table-manager/" + google-query: inurl:"/wp-content/plugins/wp-table-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-table-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-table-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-table-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-table-reloaded-4fd8626c11bff94fd8a393ce1bb61f0e.yaml b/nuclei-templates/cve-less/plugins/wp-table-reloaded-4fd8626c11bff94fd8a393ce1bb61f0e.yaml new file mode 100644 index 0000000000..d1b73c1385 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-table-reloaded-4fd8626c11bff94fd8a393ce1bb61f0e.yaml @@ -0,0 +1,58 @@ +id: wp-table-reloaded-4fd8626c11bff94fd8a393ce1bb61f0e + +info: + name: > + WP-Table Reloaded <= 1.9.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bacae6f-d23d-414c-8d8a-0f1702eafd84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-table-reloaded/" + google-query: inurl:"/wp-content/plugins/wp-table-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-table-reloaded,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-table-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-table-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-table-reloaded-c5db9aebd1fc40e9e4c7b7eca92c3a88.yaml b/nuclei-templates/cve-less/plugins/wp-table-reloaded-c5db9aebd1fc40e9e4c7b7eca92c3a88.yaml new file mode 100644 index 0000000000..6c7d69ef74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-table-reloaded-c5db9aebd1fc40e9e4c7b7eca92c3a88.yaml @@ -0,0 +1,58 @@ +id: wp-table-reloaded-c5db9aebd1fc40e9e4c7b7eca92c3a88 + +info: + name: > + WP-Table Reloaded <= 1.9.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6065d77d-33ca-4f54-b485-ff1ce71b5e2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-table-reloaded/" + google-query: inurl:"/wp-content/plugins/wp-table-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-table-reloaded,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-table-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-table-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-taxonomy-import-ea4dc9da45a9f3810a9a2f98b5102871.yaml b/nuclei-templates/cve-less/plugins/wp-taxonomy-import-ea4dc9da45a9f3810a9a2f98b5102871.yaml new file mode 100644 index 0000000000..4e96017b5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-taxonomy-import-ea4dc9da45a9f3810a9a2f98b5102871.yaml @@ -0,0 +1,58 @@ +id: wp-taxonomy-import-ea4dc9da45a9f3810a9a2f98b5102871 + +info: + name: > + WP Taxonomy Import <= 1.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a200bb51-09bd-4eaa-8a57-93c3515f720c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-taxonomy-import/" + google-query: inurl:"/wp-content/plugins/wp-taxonomy-import/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-taxonomy-import,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-taxonomy-import/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-taxonomy-import" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-team-manager-092e64b42de134fb4233d6bec85b9415.yaml b/nuclei-templates/cve-less/plugins/wp-team-manager-092e64b42de134fb4233d6bec85b9415.yaml new file mode 100644 index 0000000000..614ac89275 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-team-manager-092e64b42de134fb4233d6bec85b9415.yaml @@ -0,0 +1,58 @@ +id: wp-team-manager-092e64b42de134fb4233d6bec85b9415 + +info: + name: > + WordPress Team Manager <= 2.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62d1b4a2-5c1e-4381-a455-082bee734ff2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-team-manager/" + google-query: inurl:"/wp-content/plugins/wp-team-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-team-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-team-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-team-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-team-showcase-and-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/wp-team-showcase-and-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..f411824715 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-team-showcase-and-slider-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: wp-team-showcase-and-slider-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-team-showcase-and-slider/" + google-query: inurl:"/wp-content/plugins/wp-team-showcase-and-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-team-showcase-and-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-team-showcase-and-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-team-showcase-and-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tell-a-friend-popup-form-98b6ebee95a026d40c782ddad544fd4e.yaml b/nuclei-templates/cve-less/plugins/wp-tell-a-friend-popup-form-98b6ebee95a026d40c782ddad544fd4e.yaml new file mode 100644 index 0000000000..684c49b8c6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tell-a-friend-popup-form-98b6ebee95a026d40c782ddad544fd4e.yaml @@ -0,0 +1,58 @@ +id: wp-tell-a-friend-popup-form-98b6ebee95a026d40c782ddad544fd4e + +info: + name: > + wp tell a friend popup form <= 7.1 - Cross-Site Request Forgery via 'TellAFriend_admin' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f760821-98d4-4154-a4ae-861283f991f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tell-a-friend-popup-form/" + google-query: inurl:"/wp-content/plugins/wp-tell-a-friend-popup-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tell-a-friend-popup-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tell-a-friend-popup-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tell-a-friend-popup-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tell-a-friend-popup-form-d4c59ee10654dc665fe7870643db894a.yaml b/nuclei-templates/cve-less/plugins/wp-tell-a-friend-popup-form-d4c59ee10654dc665fe7870643db894a.yaml new file mode 100644 index 0000000000..9940ed016e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tell-a-friend-popup-form-d4c59ee10654dc665fe7870643db894a.yaml @@ -0,0 +1,58 @@ +id: wp-tell-a-friend-popup-form-d4c59ee10654dc665fe7870643db894a + +info: + name: > + wp tell a friend popup form <= 7.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec860ad9-7054-4ed2-a8f2-6589e4db36cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tell-a-friend-popup-form/" + google-query: inurl:"/wp-content/plugins/wp-tell-a-friend-popup-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tell-a-friend-popup-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tell-a-friend-popup-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tell-a-friend-popup-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-terms-popup-d03335b5fcf3342ce30e3d6994089bf1.yaml b/nuclei-templates/cve-less/plugins/wp-terms-popup-d03335b5fcf3342ce30e3d6994089bf1.yaml new file mode 100644 index 0000000000..4e22d8f3db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-terms-popup-d03335b5fcf3342ce30e3d6994089bf1.yaml @@ -0,0 +1,58 @@ +id: wp-terms-popup-d03335b5fcf3342ce30e3d6994089bf1 + +info: + name: > + WP Terms Popup <= 2.6.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fae586f3-dc4b-45ee-83b2-cdaa0336fe07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-terms-popup/" + google-query: inurl:"/wp-content/plugins/wp-terms-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-terms-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-terms-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-terms-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-testimonial-with-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/wp-testimonial-with-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..9bfb2b138e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-testimonial-with-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: wp-testimonial-with-widget-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-testimonial-with-widget/" + google-query: inurl:"/wp-content/plugins/wp-testimonial-with-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-testimonial-with-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-testimonial-with-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-testimonial-with-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-testimonials-b810e04fd2ee9ba72626a776c33f0a7b.yaml b/nuclei-templates/cve-less/plugins/wp-testimonials-b810e04fd2ee9ba72626a776c33f0a7b.yaml new file mode 100644 index 0000000000..ae2c7c2e4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-testimonials-b810e04fd2ee9ba72626a776c33f0a7b.yaml @@ -0,0 +1,58 @@ +id: wp-testimonials-b810e04fd2ee9ba72626a776c33f0a7b + +info: + name: > + WP-Testimonials <= 3.4.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06b8d1ce-fd4d-423d-aadf-f114f8a92add?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-testimonials/" + google-query: inurl:"/wp-content/plugins/wp-testimonials/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-testimonials,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-testimonials/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-testimonials" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-testing-23d65a0c7f78efb0a00d9004db77bb73.yaml b/nuclei-templates/cve-less/plugins/wp-testing-23d65a0c7f78efb0a00d9004db77bb73.yaml new file mode 100644 index 0000000000..e28f5bec1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-testing-23d65a0c7f78efb0a00d9004db77bb73.yaml @@ -0,0 +1,58 @@ +id: wp-testing-23d65a0c7f78efb0a00d9004db77bb73 + +info: + name: > + Psychological tests & quizzes <= 0.21.19 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/daa9abc2-310f-4bd9-9b88-d6f3024ab5f1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-testing/" + google-query: inurl:"/wp-content/plugins/wp-testing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-testing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-testing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-testing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.21.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-testing-a2c4b877b0651ff620e8169263705757.yaml b/nuclei-templates/cve-less/plugins/wp-testing-a2c4b877b0651ff620e8169263705757.yaml new file mode 100644 index 0000000000..6ffa3985e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-testing-a2c4b877b0651ff620e8169263705757.yaml @@ -0,0 +1,58 @@ +id: wp-testing-a2c4b877b0651ff620e8169263705757 + +info: + name: > + Psychological tests & quizzes <= 0.21.19 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d463709-8afd-4db6-bd0a-524d7b27f4ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-testing/" + google-query: inurl:"/wp-content/plugins/wp-testing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-testing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-testing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-testing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.21.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ticket-2335d22fc63434a5bcaa426b8fe660ca.yaml b/nuclei-templates/cve-less/plugins/wp-ticket-2335d22fc63434a5bcaa426b8fe660ca.yaml new file mode 100644 index 0000000000..8c9e97adde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ticket-2335d22fc63434a5bcaa426b8fe660ca.yaml @@ -0,0 +1,58 @@ +id: wp-ticket-2335d22fc63434a5bcaa426b8fe660ca + +info: + name: > + Customer Service Software & Support Ticket System < 5.10.4 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e67422cc-c1ad-40b6-abae-23447e2ff491?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ticket/" + google-query: inurl:"/wp-content/plugins/wp-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ticket,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ticket-62dc43c109e10a4fb2083be6c80b9766.yaml b/nuclei-templates/cve-less/plugins/wp-ticket-62dc43c109e10a4fb2083be6c80b9766.yaml new file mode 100644 index 0000000000..4b23c5aad2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ticket-62dc43c109e10a4fb2083be6c80b9766.yaml @@ -0,0 +1,58 @@ +id: wp-ticket-62dc43c109e10a4fb2083be6c80b9766 + +info: + name: > + Zebra_Form PHP library <= 2.9.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d4ea0a8-d2f6-4209-b17f-0a26ba664c63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ticket/" + google-query: inurl:"/wp-content/plugins/wp-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ticket,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ticket-96b4fb44cfb3ecbb2e1732d4d6ba46bb.yaml b/nuclei-templates/cve-less/plugins/wp-ticket-96b4fb44cfb3ecbb2e1732d4d6ba46bb.yaml new file mode 100644 index 0000000000..fc0639ece9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ticket-96b4fb44cfb3ecbb2e1732d4d6ba46bb.yaml @@ -0,0 +1,58 @@ +id: wp-ticket-96b4fb44cfb3ecbb2e1732d4d6ba46bb + +info: + name: > + Customer Service Software & Support Ticket System <= 5.12.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b27338c7-2fbc-4985-a25e-8e2a9fdef8c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ticket/" + google-query: inurl:"/wp-content/plugins/wp-ticket/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ticket,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ticket/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ticket" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tiles-b470f5de6fb2ae7a347b8e6eaf7d8ee9.yaml b/nuclei-templates/cve-less/plugins/wp-tiles-b470f5de6fb2ae7a347b8e6eaf7d8ee9.yaml new file mode 100644 index 0000000000..85bdd63af3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tiles-b470f5de6fb2ae7a347b8e6eaf7d8ee9.yaml @@ -0,0 +1,58 @@ +id: wp-tiles-b470f5de6fb2ae7a347b8e6eaf7d8ee9 + +info: + name: > + WP Tiles <= 1.1.2 - Authenticated(Subscriber+) Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efaef405-9721-4fb6-bcb4-4bd4f78742fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tiles/" + google-query: inurl:"/wp-content/plugins/wp-tiles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tiles,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tiles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tiles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tiles-bb37f5b838caa5657fedd0a448ebd7d3.yaml b/nuclei-templates/cve-less/plugins/wp-tiles-bb37f5b838caa5657fedd0a448ebd7d3.yaml new file mode 100644 index 0000000000..bfd9fff70e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tiles-bb37f5b838caa5657fedd0a448ebd7d3.yaml @@ -0,0 +1,58 @@ +id: wp-tiles-bb37f5b838caa5657fedd0a448ebd7d3 + +info: + name: > + WP Tiles <= 1.1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/52876909-3d2a-480d-9c47-39e96d088ff3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tiles/" + google-query: inurl:"/wp-content/plugins/wp-tiles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tiles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tiles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tiles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tiles-d83c363445764249cee1964637302b09.yaml b/nuclei-templates/cve-less/plugins/wp-tiles-d83c363445764249cee1964637302b09.yaml new file mode 100644 index 0000000000..12b07fcc10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tiles-d83c363445764249cee1964637302b09.yaml @@ -0,0 +1,58 @@ +id: wp-tiles-d83c363445764249cee1964637302b09 + +info: + name: > + WP Tiles <= 1.1.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d128197-802c-48fb-8782-eb4e10126e55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tiles/" + google-query: inurl:"/wp-content/plugins/wp-tiles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tiles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tiles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tiles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-time-capsule-09442a8e62653817975163ce52e15dd6.yaml b/nuclei-templates/cve-less/plugins/wp-time-capsule-09442a8e62653817975163ce52e15dd6.yaml new file mode 100644 index 0000000000..48ca9a2c49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-time-capsule-09442a8e62653817975163ce52e15dd6.yaml @@ -0,0 +1,58 @@ +id: wp-time-capsule-09442a8e62653817975163ce52e15dd6 + +info: + name: > + Backup and Staging by WP Time Capsule <= 1.22.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d4df759-1d5a-478a-aab1-f728fe909b5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-time-capsule/" + google-query: inurl:"/wp-content/plugins/wp-time-capsule/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-time-capsule,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-time-capsule/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-time-capsule" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.22.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-time-capsule-3a16571e5ca596c6b7dc35af4b36d41d.yaml b/nuclei-templates/cve-less/plugins/wp-time-capsule-3a16571e5ca596c6b7dc35af4b36d41d.yaml new file mode 100644 index 0000000000..1159be9a17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-time-capsule-3a16571e5ca596c6b7dc35af4b36d41d.yaml @@ -0,0 +1,58 @@ +id: wp-time-capsule-3a16571e5ca596c6b7dc35af4b36d41d + +info: + name: > + Backup and Staging by WP Time Capsule <= 1.21.15 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8672fd2-dc7a-4717-9d25-84180ad9b134?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-time-capsule/" + google-query: inurl:"/wp-content/plugins/wp-time-capsule/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-time-capsule,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-time-capsule/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-time-capsule" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-099c9bac2b6d7ddf1f9ecc25ace0905e.yaml b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-099c9bac2b6d7ddf1f9ecc25ace0905e.yaml new file mode 100644 index 0000000000..89d02ffdcc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-099c9bac2b6d7ddf1f9ecc25ace0905e.yaml @@ -0,0 +1,58 @@ +id: wp-time-slots-booking-form-099c9bac2b6d7ddf1f9ecc25ace0905e + +info: + name: > + WP Time Slots Booking Form <= 1.1.81 - Authenticated (Admin+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72c16a66-05fa-4d47-937d-415f18cec0ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-time-slots-booking-form/" + google-query: inurl:"/wp-content/plugins/wp-time-slots-booking-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-time-slots-booking-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-time-slots-booking-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-time-slots-booking-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.81') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-1b5cbc1452a8c85b5da51d915487aec1.yaml b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-1b5cbc1452a8c85b5da51d915487aec1.yaml new file mode 100644 index 0000000000..b394a391ca --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-1b5cbc1452a8c85b5da51d915487aec1.yaml @@ -0,0 +1,58 @@ +id: wp-time-slots-booking-form-1b5cbc1452a8c85b5da51d915487aec1 + +info: + name: > + WP Time Slots Booking Form <= 1.1.62 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e584e2e-0625-4777-b44c-2d682c9a4c34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-time-slots-booking-form/" + google-query: inurl:"/wp-content/plugins/wp-time-slots-booking-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-time-slots-booking-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-time-slots-booking-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-time-slots-booking-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-23b8ee7d3cf1c8b343f01dee0e6b0127.yaml b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-23b8ee7d3cf1c8b343f01dee0e6b0127.yaml new file mode 100644 index 0000000000..12f8a8ef6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-23b8ee7d3cf1c8b343f01dee0e6b0127.yaml @@ -0,0 +1,58 @@ +id: wp-time-slots-booking-form-23b8ee7d3cf1c8b343f01dee0e6b0127 + +info: + name: > + WP Time Slots Booking Form <= 1.1.76 - Missing Authorization to Feedback Submission + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c732b0e-9898-48f2-99b2-068f31532b17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-time-slots-booking-form/" + google-query: inurl:"/wp-content/plugins/wp-time-slots-booking-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-time-slots-booking-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-time-slots-booking-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-time-slots-booking-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-35d905a17c07bb22f6bef2c153cb7c2c.yaml b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-35d905a17c07bb22f6bef2c153cb7c2c.yaml new file mode 100644 index 0000000000..d81f2dc42b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-35d905a17c07bb22f6bef2c153cb7c2c.yaml @@ -0,0 +1,58 @@ +id: wp-time-slots-booking-form-35d905a17c07bb22f6bef2c153cb7c2c + +info: + name: > + WP Time Slots Booking Form <= 1.2.06 - Unauthenticated Price Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7a731ff-12e9-4fab-a055-c0193b3b2da8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-time-slots-booking-form/" + google-query: inurl:"/wp-content/plugins/wp-time-slots-booking-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-time-slots-booking-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-time-slots-booking-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-time-slots-booking-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-b9b9aa6a14a97f87b3f16ec3dcb05759.yaml b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-b9b9aa6a14a97f87b3f16ec3dcb05759.yaml new file mode 100644 index 0000000000..5c182f607d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-b9b9aa6a14a97f87b3f16ec3dcb05759.yaml @@ -0,0 +1,58 @@ +id: wp-time-slots-booking-form-b9b9aa6a14a97f87b3f16ec3dcb05759 + +info: + name: > + WP Time Slots Booking Form <= 1.1.76 - Cross-Site Request Forgery to Feedback Submission + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/032f3363-83c0-4548-81f0-724a71931add?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-time-slots-booking-form/" + google-query: inurl:"/wp-content/plugins/wp-time-slots-booking-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-time-slots-booking-form,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-time-slots-booking-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-time-slots-booking-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-ba2fa23f53107ae20224ebf362890e0c.yaml b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-ba2fa23f53107ae20224ebf362890e0c.yaml new file mode 100644 index 0000000000..f0028c0ed9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-time-slots-booking-form-ba2fa23f53107ae20224ebf362890e0c.yaml @@ -0,0 +1,58 @@ +id: wp-time-slots-booking-form-ba2fa23f53107ae20224ebf362890e0c + +info: + name: > + WP Time Slots Booking Form <= 1.1.82 - Improper Authorization Checks + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a748589-51e5-4e3c-930c-d073d5cc94bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-time-slots-booking-form/" + google-query: inurl:"/wp-content/plugins/wp-time-slots-booking-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-time-slots-booking-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-time-slots-booking-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-time-slots-booking-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.82') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-timed-popup-5abf4f5c282834f3798f994f3f36892f.yaml b/nuclei-templates/cve-less/plugins/wp-timed-popup-5abf4f5c282834f3798f994f3f36892f.yaml new file mode 100644 index 0000000000..6205007da3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-timed-popup-5abf4f5c282834f3798f994f3f36892f.yaml @@ -0,0 +1,58 @@ +id: wp-timed-popup-5abf4f5c282834f3798f994f3f36892f + +info: + name: > + Timed Popup WordPress Plugin <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/feb25e04-8cd2-49d8-a459-4302c1ec332c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-timed-popup/" + google-query: inurl:"/wp-content/plugins/wp-timed-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-timed-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-timed-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-timed-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-timed-popup-db2fb4ed164af1282f62f44a0c0e168a.yaml b/nuclei-templates/cve-less/plugins/wp-timed-popup-db2fb4ed164af1282f62f44a0c0e168a.yaml new file mode 100644 index 0000000000..eb182f25ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-timed-popup-db2fb4ed164af1282f62f44a0c0e168a.yaml @@ -0,0 +1,58 @@ +id: wp-timed-popup-db2fb4ed164af1282f62f44a0c0e168a + +info: + name: > + WP Timed Popout <= 1.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2016224c-a9f9-4161-885f-310830f48038?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-timed-popup/" + google-query: inurl:"/wp-content/plugins/wp-timed-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-timed-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-timed-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-timed-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tmkm-amazon-b1af016f9e6a13ef862b57d6918f5436.yaml b/nuclei-templates/cve-less/plugins/wp-tmkm-amazon-b1af016f9e6a13ef862b57d6918f5436.yaml new file mode 100644 index 0000000000..a46aec5d0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tmkm-amazon-b1af016f9e6a13ef862b57d6918f5436.yaml @@ -0,0 +1,58 @@ +id: wp-tmkm-amazon-b1af016f9e6a13ef862b57d6918f5436 + +info: + name: > + wp-tmkm-amazon < 1.5.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13f6bf06-2c24-43ac-9412-08b3d4914a21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tmkm-amazon/" + google-query: inurl:"/wp-content/plugins/wp-tmkm-amazon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tmkm-amazon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tmkm-amazon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tmkm-amazon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-to-buffer-95f254edf062c496895c196beac952e1.yaml b/nuclei-templates/cve-less/plugins/wp-to-buffer-95f254edf062c496895c196beac952e1.yaml new file mode 100644 index 0000000000..4e3e75f9a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-to-buffer-95f254edf062c496895c196beac952e1.yaml @@ -0,0 +1,58 @@ +id: wp-to-buffer-95f254edf062c496895c196beac952e1 + +info: + name: > + WordPress to Buffer <= 3.8.1 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c133c31e-e80a-4293-b19d-22e8bc8f677b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-to-buffer/" + google-query: inurl:"/wp-content/plugins/wp-to-buffer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-to-buffer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-to-buffer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-to-buffer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-to-hootsuite-ed03689d193897df0f01e218797bc0ef.yaml b/nuclei-templates/cve-less/plugins/wp-to-hootsuite-ed03689d193897df0f01e218797bc0ef.yaml new file mode 100644 index 0000000000..e082a6f288 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-to-hootsuite-ed03689d193897df0f01e218797bc0ef.yaml @@ -0,0 +1,58 @@ +id: wp-to-hootsuite-ed03689d193897df0f01e218797bc0ef + +info: + name: > + WordPress to Hootsuite <= 1.4.5 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd93da2b-a64d-45a0-8d6c-e2a93ef20e13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-to-hootsuite/" + google-query: inurl:"/wp-content/plugins/wp-to-hootsuite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-to-hootsuite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-to-hootsuite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-to-hootsuite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-to-twitter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wp-to-twitter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..1af84fff47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-to-twitter-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wp-to-twitter-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-to-twitter/" + google-query: inurl:"/wp-content/plugins/wp-to-twitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-to-twitter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-to-twitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-to-twitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-todo-0c05bed3e63ebe0076e41774e5d167dd.yaml b/nuclei-templates/cve-less/plugins/wp-todo-0c05bed3e63ebe0076e41774e5d167dd.yaml new file mode 100644 index 0000000000..0e689fe8ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-todo-0c05bed3e63ebe0076e41774e5d167dd.yaml @@ -0,0 +1,58 @@ +id: wp-todo-0c05bed3e63ebe0076e41774e5d167dd + +info: + name: > + WP To Do <= 1.2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e5cbe1f-0a16-4301-a83c-af9456afe44d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-todo/" + google-query: inurl:"/wp-content/plugins/wp-todo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-todo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-todo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-todo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tools-divi-blog-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-tools-divi-blog-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c2d8af0848 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tools-divi-blog-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-tools-divi-blog-carousel-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tools-divi-blog-carousel/" + google-query: inurl:"/wp-content/plugins/wp-tools-divi-blog-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tools-divi-blog-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tools-divi-blog-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tools-divi-blog-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tools-divi-product-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-tools-divi-product-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..90338e5747 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tools-divi-product-carousel-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-tools-divi-product-carousel-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tools-divi-product-carousel/" + google-query: inurl:"/wp-content/plugins/wp-tools-divi-product-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tools-divi-product-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tools-divi-product-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tools-divi-product-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tools-gravity-forms-divi-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-tools-gravity-forms-divi-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1762adfe69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tools-gravity-forms-divi-module-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-tools-gravity-forms-divi-module-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tools-gravity-forms-divi-module/" + google-query: inurl:"/wp-content/plugins/wp-tools-gravity-forms-divi-module/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tools-gravity-forms-divi-module,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tools-gravity-forms-divi-module/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tools-gravity-forms-divi-module" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-top-news-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-top-news-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..aeced62062 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-top-news-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-top-news-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-top-news/" + google-query: inurl:"/wp-content/plugins/wp-top-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-top-news,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-top-news/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-top-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-topbar-08fad01812fb757e5dc8ffa5260888ab.yaml b/nuclei-templates/cve-less/plugins/wp-topbar-08fad01812fb757e5dc8ffa5260888ab.yaml new file mode 100644 index 0000000000..16e648102d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-topbar-08fad01812fb757e5dc8ffa5260888ab.yaml @@ -0,0 +1,58 @@ +id: wp-topbar-08fad01812fb757e5dc8ffa5260888ab + +info: + name: > + WP TopBar <= 5.36 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b1242fc-1bbf-4686-ba7d-d948336f65a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-topbar/" + google-query: inurl:"/wp-content/plugins/wp-topbar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-topbar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-topbar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-topbar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-topbar-4813d0bc8d38f259871443d57dcbdad8.yaml b/nuclei-templates/cve-less/plugins/wp-topbar-4813d0bc8d38f259871443d57dcbdad8.yaml new file mode 100644 index 0000000000..299729b10c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-topbar-4813d0bc8d38f259871443d57dcbdad8.yaml @@ -0,0 +1,58 @@ +id: wp-topbar-4813d0bc8d38f259871443d57dcbdad8 + +info: + name: > + WP-TopBar <= 4.02 - Cross-Site Request Forgery to Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aab08c1-20db-46a2-b93a-d864bb57bf4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-topbar/" + google-query: inurl:"/wp-content/plugins/wp-topbar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-topbar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-topbar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-topbar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.02') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-topbar-633e46af2038cc804c4d8333e35d9bb7.yaml b/nuclei-templates/cve-less/plugins/wp-topbar-633e46af2038cc804c4d8333e35d9bb7.yaml new file mode 100644 index 0000000000..1b79892803 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-topbar-633e46af2038cc804c4d8333e35d9bb7.yaml @@ -0,0 +1,58 @@ +id: wp-topbar-633e46af2038cc804c4d8333e35d9bb7 + +info: + name: > + WP-TopBar <= 3.04 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b42c0e51-676f-4f06-9e5c-b6b74bea89b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-topbar/" + google-query: inurl:"/wp-content/plugins/wp-topbar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-topbar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-topbar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-topbar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-topbar-808f401d9d8c5d86d169e876e53df971.yaml b/nuclei-templates/cve-less/plugins/wp-topbar-808f401d9d8c5d86d169e876e53df971.yaml new file mode 100644 index 0000000000..22a71938c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-topbar-808f401d9d8c5d86d169e876e53df971.yaml @@ -0,0 +1,58 @@ +id: wp-topbar-808f401d9d8c5d86d169e876e53df971 + +info: + name: > + WP-TopBar <= 5.36 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b72cfc20-b133-4682-91e1-497236aba035?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-topbar/" + google-query: inurl:"/wp-content/plugins/wp-topbar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-topbar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-topbar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-topbar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-total-hacks-f6fedef4900f687723635382ff2bb4d5.yaml b/nuclei-templates/cve-less/plugins/wp-total-hacks-f6fedef4900f687723635382ff2bb4d5.yaml new file mode 100644 index 0000000000..4356361fb4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-total-hacks-f6fedef4900f687723635382ff2bb4d5.yaml @@ -0,0 +1,58 @@ +id: wp-total-hacks-f6fedef4900f687723635382ff2bb4d5 + +info: + name: > + WP Total Hacks <= 4.7.2 - Authenticated (Subscriber+) Plugin Options Update to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3732bf4c-e5e4-4947-9044-9a49e7547cf3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-total-hacks/" + google-query: inurl:"/wp-content/plugins/wp-total-hacks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-total-hacks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-total-hacks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-total-hacks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tradingview-28c3e191fb5a4aac43fb323a1cacb211.yaml b/nuclei-templates/cve-less/plugins/wp-tradingview-28c3e191fb5a4aac43fb323a1cacb211.yaml new file mode 100644 index 0000000000..caa64d6aa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tradingview-28c3e191fb5a4aac43fb323a1cacb211.yaml @@ -0,0 +1,58 @@ +id: wp-tradingview-28c3e191fb5a4aac43fb323a1cacb211 + +info: + name: > + WP TradingView <= 1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b63a8253-b6cc-4cca-baec-4d0e32e1b8d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tradingview/" + google-query: inurl:"/wp-content/plugins/wp-tradingview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tradingview,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tradingview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tradingview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-translitera-1398c704e82e0c99d9df5d75e0d38bc0.yaml b/nuclei-templates/cve-less/plugins/wp-translitera-1398c704e82e0c99d9df5d75e0d38bc0.yaml new file mode 100644 index 0000000000..4820142569 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-translitera-1398c704e82e0c99d9df5d75e0d38bc0.yaml @@ -0,0 +1,58 @@ +id: wp-translitera-1398c704e82e0c99d9df5d75e0d38bc0 + +info: + name: > + WP Translitera <= p1.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad427bea-1b0e-46bb-85fc-53c51fb40a17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-translitera/" + google-query: inurl:"/wp-content/plugins/wp-translitera/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-translitera,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-translitera/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-translitera" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< p1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-travel-60704cf340adf2f27bf6eb359b29de1e.yaml b/nuclei-templates/cve-less/plugins/wp-travel-60704cf340adf2f27bf6eb359b29de1e.yaml new file mode 100644 index 0000000000..1c647e1400 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-travel-60704cf340adf2f27bf6eb359b29de1e.yaml @@ -0,0 +1,58 @@ +id: wp-travel-60704cf340adf2f27bf6eb359b29de1e + +info: + name: > + WP Travel <= 7.7.0 - Missing Authorization via Multiple AJAX Actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d23d2cdf-206e-4714-9753-198519ba737b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-travel/" + google-query: inurl:"/wp-content/plugins/wp-travel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-travel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-travel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-travel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-travel-b8daa06004410466af99c0f3caa27fee.yaml b/nuclei-templates/cve-less/plugins/wp-travel-b8daa06004410466af99c0f3caa27fee.yaml new file mode 100644 index 0000000000..3eb2bc877b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-travel-b8daa06004410466af99c0f3caa27fee.yaml @@ -0,0 +1,58 @@ +id: wp-travel-b8daa06004410466af99c0f3caa27fee + +info: + name: > + WP Travel <= 4.4.6 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28dea1e9-e772-488e-b98f-93a46ab84581?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-travel/" + google-query: inurl:"/wp-content/plugins/wp-travel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-travel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-travel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-travel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-travel-engine-0345a4f0aab13c10753508309e5ccf34.yaml b/nuclei-templates/cve-less/plugins/wp-travel-engine-0345a4f0aab13c10753508309e5ccf34.yaml new file mode 100644 index 0000000000..743920f991 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-travel-engine-0345a4f0aab13c10753508309e5ccf34.yaml @@ -0,0 +1,58 @@ +id: wp-travel-engine-0345a4f0aab13c10753508309e5ccf34 + +info: + name: > + WP Travel Engine <= 5.7.9 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/659fcb95-9041-443e-9b75-0d2f8c6108aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-travel-engine/" + google-query: inurl:"/wp-content/plugins/wp-travel-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-travel-engine,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-travel-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-travel-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-travel-engine-12373fb4bdec1cf1197ea716e420bdce.yaml b/nuclei-templates/cve-less/plugins/wp-travel-engine-12373fb4bdec1cf1197ea716e420bdce.yaml new file mode 100644 index 0000000000..509d8c6720 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-travel-engine-12373fb4bdec1cf1197ea716e420bdce.yaml @@ -0,0 +1,58 @@ +id: wp-travel-engine-12373fb4bdec1cf1197ea716e420bdce + +info: + name: > + WP Travel Engine <= 5.7.9 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed053a6b-4163-4e82-a180-619a7841899a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-travel-engine/" + google-query: inurl:"/wp-content/plugins/wp-travel-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-travel-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-travel-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-travel-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-travel-engine-615ecebdae8d81f4fc482834631b0455.yaml b/nuclei-templates/cve-less/plugins/wp-travel-engine-615ecebdae8d81f4fc482834631b0455.yaml new file mode 100644 index 0000000000..41ccc651e6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-travel-engine-615ecebdae8d81f4fc482834631b0455.yaml @@ -0,0 +1,58 @@ +id: wp-travel-engine-615ecebdae8d81f4fc482834631b0455 + +info: + name: > + WP Travel Engine <= 5.8.0 - Unauthenticated Price Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a19bd0c-87b3-421b-a7af-c473ac084813?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-travel-engine/" + google-query: inurl:"/wp-content/plugins/wp-travel-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-travel-engine,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-travel-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-travel-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-travel-engine-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-travel-engine-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..bcf95ecbd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-travel-engine-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-travel-engine-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-travel-engine/" + google-query: inurl:"/wp-content/plugins/wp-travel-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-travel-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-travel-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-travel-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-travel-engine-f6c6555824d98b71401c19c502cb055d.yaml b/nuclei-templates/cve-less/plugins/wp-travel-engine-f6c6555824d98b71401c19c502cb055d.yaml new file mode 100644 index 0000000000..ec612ff0c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-travel-engine-f6c6555824d98b71401c19c502cb055d.yaml @@ -0,0 +1,58 @@ +id: wp-travel-engine-f6c6555824d98b71401c19c502cb055d + +info: + name: > + WP Travel Engine <= 5.3.0 - Editor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a107839e-b79b-4868-9232-eca050eb1551?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-travel-engine/" + google-query: inurl:"/wp-content/plugins/wp-travel-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-travel-engine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-travel-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-travel-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-trending-post-slider-and-widget-4c44757f9cbb823ed3a472ca5e2ff612.yaml b/nuclei-templates/cve-less/plugins/wp-trending-post-slider-and-widget-4c44757f9cbb823ed3a472ca5e2ff612.yaml new file mode 100644 index 0000000000..f5dc515011 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-trending-post-slider-and-widget-4c44757f9cbb823ed3a472ca5e2ff612.yaml @@ -0,0 +1,58 @@ +id: wp-trending-post-slider-and-widget-4c44757f9cbb823ed3a472ca5e2ff612 + +info: + name: > + Trending/Popular Post Slider and Widget <= 1.5.7 - Cross-Site Request Forgery via wtpsw_post_view_count + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a0cffca-94d8-46b8-8b84-57e76a5bfd94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-trending-post-slider-and-widget/" + google-query: inurl:"/wp-content/plugins/wp-trending-post-slider-and-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-trending-post-slider-and-widget,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-trending-post-slider-and-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-trending-post-slider-and-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-trending-post-slider-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml b/nuclei-templates/cve-less/plugins/wp-trending-post-slider-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml new file mode 100644 index 0000000000..08737fe45d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-trending-post-slider-and-widget-9f65d6fc085d85b53357bd33fa3d4834.yaml @@ -0,0 +1,58 @@ +id: wp-trending-post-slider-and-widget-9f65d6fc085d85b53357bd33fa3d4834 + +info: + name: > + Multiple WPOnlineSupport Plugins <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2931fda2-edc8-44ea-9fff-ae9d94aa01bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-trending-post-slider-and-widget/" + google-query: inurl:"/wp-content/plugins/wp-trending-post-slider-and-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-trending-post-slider-and-widget,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-trending-post-slider-and-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-trending-post-slider-and-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tripadvisor-review-slider-5aea692cc96187a31807c0f2f26416eb.yaml b/nuclei-templates/cve-less/plugins/wp-tripadvisor-review-slider-5aea692cc96187a31807c0f2f26416eb.yaml new file mode 100644 index 0000000000..a8a0dce01e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tripadvisor-review-slider-5aea692cc96187a31807c0f2f26416eb.yaml @@ -0,0 +1,58 @@ +id: wp-tripadvisor-review-slider-5aea692cc96187a31807c0f2f26416eb + +info: + name: > + WP TripAdvisor Review Slider <= 10.7 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6324795d-3fab-4806-b7d8-f122d31429ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tripadvisor-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-tripadvisor-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tripadvisor-review-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tripadvisor-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tripadvisor-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-tripadvisor-review-slider-60704a9704a6bd75205a7bd8179ee4be.yaml b/nuclei-templates/cve-less/plugins/wp-tripadvisor-review-slider-60704a9704a6bd75205a7bd8179ee4be.yaml new file mode 100644 index 0000000000..70893ada41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-tripadvisor-review-slider-60704a9704a6bd75205a7bd8179ee4be.yaml @@ -0,0 +1,58 @@ +id: wp-tripadvisor-review-slider-60704a9704a6bd75205a7bd8179ee4be + +info: + name: > + WP TripAdvisor Review Slider <= 11.8 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bee43fe3-d39a-475e-90c5-24fa569c646a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-tripadvisor-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-tripadvisor-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-tripadvisor-review-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-tripadvisor-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-tripadvisor-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ttisbdir-d9ebf3668fe7cefc2f8b63111d50df87.yaml b/nuclei-templates/cve-less/plugins/wp-ttisbdir-d9ebf3668fe7cefc2f8b63111d50df87.yaml new file mode 100644 index 0000000000..306abf7c91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ttisbdir-d9ebf3668fe7cefc2f8b63111d50df87.yaml @@ -0,0 +1,58 @@ +id: wp-ttisbdir-d9ebf3668fe7cefc2f8b63111d50df87 + +info: + name: > + WP-Business Directory <= 1.0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a503925-7fbf-42e8-9cee-604858c8ec0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ttisbdir/" + google-query: inurl:"/wp-content/plugins/wp-ttisbdir/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ttisbdir,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ttisbdir/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ttisbdir" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-twilio-core-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-twilio-core-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..58735fc35b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-twilio-core-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-twilio-core-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-twilio-core/" + google-query: inurl:"/wp-content/plugins/wp-twilio-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-twilio-core,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-twilio-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-twilio-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-twitter-feed-455782a485d876c2acfcbf2a3f64d156.yaml b/nuclei-templates/cve-less/plugins/wp-twitter-feed-455782a485d876c2acfcbf2a3f64d156.yaml new file mode 100644 index 0000000000..9d9f1eea56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-twitter-feed-455782a485d876c2acfcbf2a3f64d156.yaml @@ -0,0 +1,58 @@ +id: wp-twitter-feed-455782a485d876c2acfcbf2a3f64d156 + +info: + name: > + Peadig's Twitter Feed: Embedded Timeline WordPress Plugin <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2553a858-bbea-4ef2-8d45-e0a665123065?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-twitter-feed/" + google-query: inurl:"/wp-content/plugins/wp-twitter-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-twitter-feed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-twitter-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-twitter-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-twitter-mega-fan-box-f762f226f7d0453e8c9973d68200bc39.yaml b/nuclei-templates/cve-less/plugins/wp-twitter-mega-fan-box-f762f226f7d0453e8c9973d68200bc39.yaml new file mode 100644 index 0000000000..1649b241ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-twitter-mega-fan-box-f762f226f7d0453e8c9973d68200bc39.yaml @@ -0,0 +1,58 @@ +id: wp-twitter-mega-fan-box-f762f226f7d0453e8c9973d68200bc39 + +info: + name: > + WP Twitter Mega Fan Box Widget <= 1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64225f1c-3981-4bae-bb6a-95d1a27ad6aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-twitter-mega-fan-box/" + google-query: inurl:"/wp-content/plugins/wp-twitter-mega-fan-box/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-twitter-mega-fan-box,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-twitter-mega-fan-box/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-twitter-mega-fan-box" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ulike-18de9e095474a950fd157d62f9dc2e8b.yaml b/nuclei-templates/cve-less/plugins/wp-ulike-18de9e095474a950fd157d62f9dc2e8b.yaml new file mode 100644 index 0000000000..d1766d15dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ulike-18de9e095474a950fd157d62f9dc2e8b.yaml @@ -0,0 +1,58 @@ +id: wp-ulike-18de9e095474a950fd157d62f9dc2e8b + +info: + name: > + WP ULike < 3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/413962b8-09ac-4b5d-a52d-5ca832bba9f2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ulike/" + google-query: inurl:"/wp-content/plugins/wp-ulike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ulike,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ulike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ulike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ulike-4082ebaabfc2d3e63cea9e5b73f5105a.yaml b/nuclei-templates/cve-less/plugins/wp-ulike-4082ebaabfc2d3e63cea9e5b73f5105a.yaml new file mode 100644 index 0000000000..a31565d768 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ulike-4082ebaabfc2d3e63cea9e5b73f5105a.yaml @@ -0,0 +1,58 @@ +id: wp-ulike-4082ebaabfc2d3e63cea9e5b73f5105a + +info: + name: > + WP ULike <= 4.6.4 - Race Condition + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d5ee8f1-8d86-4af0-af01-b31d2ff993d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ulike/" + google-query: inurl:"/wp-content/plugins/wp-ulike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ulike,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ulike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ulike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ulike-44f7bceac9641de69745cf2de93af035.yaml b/nuclei-templates/cve-less/plugins/wp-ulike-44f7bceac9641de69745cf2de93af035.yaml new file mode 100644 index 0000000000..b49ebd2199 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ulike-44f7bceac9641de69745cf2de93af035.yaml @@ -0,0 +1,58 @@ +id: wp-ulike-44f7bceac9641de69745cf2de93af035 + +info: + name: > + WP ULike <= 4.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2f777b6-5872-4196-81fb-82a9b6aaef2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ulike/" + google-query: inurl:"/wp-content/plugins/wp-ulike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ulike,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ulike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ulike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ulike-5e4d2604a5e90cd0dc912e39171976ad.yaml b/nuclei-templates/cve-less/plugins/wp-ulike-5e4d2604a5e90cd0dc912e39171976ad.yaml new file mode 100644 index 0000000000..a374346d66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ulike-5e4d2604a5e90cd0dc912e39171976ad.yaml @@ -0,0 +1,58 @@ +id: wp-ulike-5e4d2604a5e90cd0dc912e39171976ad + +info: + name: > + WP ULike <= 4.6.9 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d844ca83-84e5-4b6c-ae26-f300c7328d78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ulike/" + google-query: inurl:"/wp-content/plugins/wp-ulike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ulike,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ulike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ulike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ulike-9047e8467f610de62edfbde349b606d7.yaml b/nuclei-templates/cve-less/plugins/wp-ulike-9047e8467f610de62edfbde349b606d7.yaml new file mode 100644 index 0000000000..b84ad4af47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ulike-9047e8467f610de62edfbde349b606d7.yaml @@ -0,0 +1,58 @@ +id: wp-ulike-9047e8467f610de62edfbde349b606d7 + +info: + name: > + WP ULike < 3.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/515a6a42-f353-47ae-9e74-4f9b2000bcb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ulike/" + google-query: inurl:"/wp-content/plugins/wp-ulike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ulike,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ulike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ulike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ulike-bd4d77259e44439674b77141abd7a906.yaml b/nuclei-templates/cve-less/plugins/wp-ulike-bd4d77259e44439674b77141abd7a906.yaml new file mode 100644 index 0000000000..f406fdb154 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ulike-bd4d77259e44439674b77141abd7a906.yaml @@ -0,0 +1,58 @@ +id: wp-ulike-bd4d77259e44439674b77141abd7a906 + +info: + name: > + WP ULike <= 4.6.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ulike/" + google-query: inurl:"/wp-content/plugins/wp-ulike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ulike,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ulike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ulike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ulike-dea805289f838218c2f4999e6fa41c84.yaml b/nuclei-templates/cve-less/plugins/wp-ulike-dea805289f838218c2f4999e6fa41c84.yaml new file mode 100644 index 0000000000..264d711f9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ulike-dea805289f838218c2f4999e6fa41c84.yaml @@ -0,0 +1,58 @@ +id: wp-ulike-dea805289f838218c2f4999e6fa41c84 + +info: + name: > + WP ULike – Most Advanced WordPress Marketing Toolkit <= 4.6.9 - Authenticated (Contributor+) SQL Injection via Shortcodes + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d225dee1-305c-4378-bc07-192347a0c838?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ulike/" + google-query: inurl:"/wp-content/plugins/wp-ulike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ulike,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ulike/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ulike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-0d112b75baa32165ac17ae118d62fed2.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-0d112b75baa32165ac17ae118d62fed2.yaml new file mode 100644 index 0000000000..228a8bae9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-0d112b75baa32165ac17ae118d62fed2.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-0d112b75baa32165ac17ae118d62fed2 + +info: + name: > + WP Ultimate CSV Importer <= 7.9.8 - Authenticated (Author+) PHP File Creation to Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4fe8b1f-da1c-4f94-9ab4-272766b488c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-51b67c232457e0e4e3e29917fed2f232.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-51b67c232457e0e4e3e29917fed2f232.yaml new file mode 100644 index 0000000000..490525129d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-51b67c232457e0e4e3e29917fed2f232.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-51b67c232457e0e4e3e29917fed2f232 + +info: + name: > + WP Ultimate CSV Importer <= 7.9.8 - Arbitrary Usermeta Update to Authenticated (Author+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdba41f-daa5-44e8-bc47-aa8b7bd31054?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-592a630a84a40228131a6018242fc7c7.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-592a630a84a40228131a6018242fc7c7.yaml new file mode 100644 index 0000000000..0762ac9a49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-592a630a84a40228131a6018242fc7c7.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-592a630a84a40228131a6018242fc7c7 + +info: + name: > + WP Ultimate CSV Importer <= 3.7 - Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d50f217-7a53-49bf-9ce9-9922d0b3e18b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-72bc0780c4316abe13ceb4d45308b845.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-72bc0780c4316abe13ceb4d45308b845.yaml new file mode 100644 index 0000000000..edea70a2c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-72bc0780c4316abe13ceb4d45308b845.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-72bc0780c4316abe13ceb4d45308b845 + +info: + name: > + Import CSV or XML Datafeed With Ease <= 3.7.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad09e91d-8ef8-49b2-84e8-fdbf28d65a8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-75438814e26aeaea61aafcd29b551852.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-75438814e26aeaea61aafcd29b551852.yaml new file mode 100644 index 0000000000..48e819be70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-75438814e26aeaea61aafcd29b551852.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-75438814e26aeaea61aafcd29b551852 + +info: + name: > + WP Ultimate CSV Importer <= 6.4.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d21bebcc-8dba-407d-8a3a-b91d3cddd38f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-7705126a4ed4d1dc1d9561088cab0d7f.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-7705126a4ed4d1dc1d9561088cab0d7f.yaml new file mode 100644 index 0000000000..b890532b09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-7705126a4ed4d1dc1d9561088cab0d7f.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-7705126a4ed4d1dc1d9561088cab0d7f + +info: + name: > + WP Ultimate CSV Importer <= 7.9.8 - Authenticated (Author+) Remote Code Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db1bad2e-55df-40c5-9a3f-651858a19b42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-87ab1df12e024103ce206734007bad62.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-87ab1df12e024103ce206734007bad62.yaml new file mode 100644 index 0000000000..096d933a58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-87ab1df12e024103ce206734007bad62.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-87ab1df12e024103ce206734007bad62 + +info: + name: > + WP Ultimate CSV Importer <= 6.5.2 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/258177c4-d3d4-4465-8b73-0af1b02485b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-9112916c5852d2f0b814be06e90dc90b.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-9112916c5852d2f0b814be06e90dc90b.yaml new file mode 100644 index 0000000000..0a3e4cc1fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-9112916c5852d2f0b814be06e90dc90b.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-9112916c5852d2f0b814be06e90dc90b + +info: + name: > + Easy Drag And drop All Import : WP Ultimate CSV Importer < 6.4.1 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/391ef7e0-d4e6-4c2e-b15e-65bdba190b69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-944848224aa29d59185411875e6e7a83.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-944848224aa29d59185411875e6e7a83.yaml new file mode 100644 index 0000000000..18cdaba89f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-944848224aa29d59185411875e6e7a83.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-944848224aa29d59185411875e6e7a83 + +info: + name: > + WP Ultimate CSV Importer <= 7.9.8 - Sensitive Information Exposure via Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6404476e-0c32-4f8e-882f-6a1785ba5748?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-ac3eeb7507bcafd357b4a7e25611dbcc.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-ac3eeb7507bcafd357b4a7e25611dbcc.yaml new file mode 100644 index 0000000000..d096e00cf1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-ac3eeb7507bcafd357b4a7e25611dbcc.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-ac3eeb7507bcafd357b4a7e25611dbcc + +info: + name: > + Ultimate CSV Importer < 3.6.75 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a46c049-367d-4a67-9607-c74ef0b96c71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-be9c6bd76ef257817f6a2776deaaac06.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-be9c6bd76ef257817f6a2776deaaac06.yaml new file mode 100644 index 0000000000..e3cfa25f8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-be9c6bd76ef257817f6a2776deaaac06.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-be9c6bd76ef257817f6a2776deaaac06 + +info: + name: > + Import all XML, CSV & TXT into WordPress < 6.4.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69725919-490c-4357-872c-d8112af5fe40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-c5aaff2cbf4515e9a35f03f837f2957f.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-c5aaff2cbf4515e9a35f03f837f2957f.yaml new file mode 100644 index 0000000000..94f9627e63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-c5aaff2cbf4515e9a35f03f837f2957f.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-c5aaff2cbf4515e9a35f03f837f2957f + +info: + name: > + Easy Drag And drop All Import : WP Ultimate CSV Importer < 3.8.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a79c36-8371-4035-8c21-4bc0296fa12a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-c7addb8e32d754a1c27b6eb5611849e7.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-c7addb8e32d754a1c27b6eb5611849e7.yaml new file mode 100644 index 0000000000..f4b0c930ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-c7addb8e32d754a1c27b6eb5611849e7.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-c7addb8e32d754a1c27b6eb5611849e7 + +info: + name: > + Easy Drag And drop All Import : WP Ultimate CSV Importer <= 5.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0eae97c-d7e5-4dde-a323-d90a20826341?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-dc21ebc00161a8071a291b6ff6e22872.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-dc21ebc00161a8071a291b6ff6e22872.yaml new file mode 100644 index 0000000000..a36db39c61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-dc21ebc00161a8071a291b6ff6e22872.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-dc21ebc00161a8071a291b6ff6e22872 + +info: + name: > + WP Ultimate CSV Importer <= 6.5.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9176a81-fe51-48dd-a151-4596443b430f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-e5b4ec8d38e3122f17a3232664bd3572.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-e5b4ec8d38e3122f17a3232664bd3572.yaml new file mode 100644 index 0000000000..89fb5ca77e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-e5b4ec8d38e3122f17a3232664bd3572.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-e5b4ec8d38e3122f17a3232664bd3572 + +info: + name: > + WP Ultimate CSV Importer <= 6.5.7 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04a64a52-f0a0-4559-834d-88d3edd1bb6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-e9ce7b3589ea1d2e769d3fe233efa510.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-e9ce7b3589ea1d2e769d3fe233efa510.yaml new file mode 100644 index 0000000000..94b270ca1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-e9ce7b3589ea1d2e769d3fe233efa510.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-e9ce7b3589ea1d2e769d3fe233efa510 + +info: + name: > + WP Ultimate CSV Importer <= 6.4.2 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b3081ff-9898-46a2-8e02-30cd83f4fbe4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-ef92d81c5e504ad1e37f94f452c8477f.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-ef92d81c5e504ad1e37f94f452c8477f.yaml new file mode 100644 index 0000000000..3626729531 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-csv-importer-ef92d81c5e504ad1e37f94f452c8477f.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-csv-importer-ef92d81c5e504ad1e37f94f452c8477f + +info: + name: > + Import Export All WordPress Images, Users & Post Types <= 3.8.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45ba8203-a8a0-4330-a264-c2f555d09ef0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-csv-importer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-csv-importer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-4abbb6efa9b6eb6c9ea1daf1a46873cb.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-4abbb6efa9b6eb6c9ea1daf1a46873cb.yaml new file mode 100644 index 0000000000..8dd6368ee6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-4abbb6efa9b6eb6c9ea1daf1a46873cb.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-email-marketer-4abbb6efa9b6eb6c9ea1daf1a46873cb + +info: + name: > + WP Ultimate Email Marketer <= 1.2.0 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35806af6-bb63-41c8-a20b-f5e36d2aa515?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-email-marketer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-email-marketer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-email-marketer,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-email-marketer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-email-marketer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-d7975313aa0a75118cad6d46dc36f4d3.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-d7975313aa0a75118cad6d46dc36f4d3.yaml new file mode 100644 index 0000000000..13334cf47d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-d7975313aa0a75118cad6d46dc36f4d3.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-email-marketer-d7975313aa0a75118cad6d46dc36f4d3 + +info: + name: > + WP Ultimate Email Marketer <= 1.2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ea9dda4-d667-46f3-893b-a1ae60b6ba75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-email-marketer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-email-marketer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-email-marketer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-email-marketer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-email-marketer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-fc176b004d2c6f19188839a3973c1a4d.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-fc176b004d2c6f19188839a3973c1a4d.yaml new file mode 100644 index 0000000000..57d7dce359 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-email-marketer-fc176b004d2c6f19188839a3973c1a4d.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-email-marketer-fc176b004d2c6f19188839a3973c1a4d + +info: + name: > + WP Ultimate Email Marketer <= 1.1.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d49a2180-cf3f-4ef9-805f-e7592b793a2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-email-marketer/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-email-marketer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-email-marketer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-email-marketer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-email-marketer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-bcf7bbddbe5644610b151dc0fbb630e1.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-bcf7bbddbe5644610b151dc0fbb630e1.yaml new file mode 100644 index 0000000000..87b7439d95 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-bcf7bbddbe5644610b151dc0fbb630e1.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-exporter-bcf7bbddbe5644610b151dc0fbb630e1 + +info: + name: > + WP Ultimate Exporter < 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b269a5c9-9f0e-4dba-a06e-2d8dd94643b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-exporter/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-exporter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-c50d345162d88814f557da562004033c.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-c50d345162d88814f557da562004033c.yaml new file mode 100644 index 0000000000..cfb8b592f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-c50d345162d88814f557da562004033c.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-exporter-c50d345162d88814f557da562004033c + +info: + name: > + WP Ultimate Exporter <= 2.4.1 - Unauthenticated Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61f7e01e-c9ce-47f6-96d0-de908ce7e90c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-exporter/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-df373c772cbef38a246093f173c5b45a.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-df373c772cbef38a246093f173c5b45a.yaml new file mode 100644 index 0000000000..bc3bfcaa19 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-df373c772cbef38a246093f173c5b45a.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-exporter-df373c772cbef38a246093f173c5b45a + +info: + name: > + Export WordPress Data with Advanced Filters < 1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15deb0db-5a13-4018-88e5-5f5cb61bd495?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-exporter/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-exporter,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-e989541539b3897cd4ab2d9eb3394079.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-e989541539b3897cd4ab2d9eb3394079.yaml new file mode 100644 index 0000000000..8a114dbd14 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-exporter-e989541539b3897cd4ab2d9eb3394079.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-exporter-e989541539b3897cd4ab2d9eb3394079 + +info: + name: > + Export WordPress Data with Advanced Filters <= 1.4.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e8c06c7-dbe0-4b2b-99bc-89f18277e540?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-exporter/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-exporter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-recipe-1e6683ba97d940c27fa31053738ff471.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-recipe-1e6683ba97d940c27fa31053738ff471.yaml new file mode 100644 index 0000000000..734b344b3b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-recipe-1e6683ba97d940c27fa31053738ff471.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-recipe-1e6683ba97d940c27fa31053738ff471 + +info: + name: > + WP Ultimate Recipe < 3.12.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c7d4401-33aa-43c4-8659-a5664b3cf1da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-recipe/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-recipe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-recipe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-recipe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-recipe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-review-101443664a3de2bb124cd3553eeabe4b.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-review-101443664a3de2bb124cd3553eeabe4b.yaml new file mode 100644 index 0000000000..aeb9a9445a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-review-101443664a3de2bb124cd3553eeabe4b.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-review-101443664a3de2bb124cd3553eeabe4b + +info: + name: > + Wp Ultimate Review <= 2.0.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/892372c9-380c-43b2-b928-b5964574c414?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-review/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-review,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-review-60ae23854ab0f767b1c82b0fb6a8dc96.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-review-60ae23854ab0f767b1c82b0fb6a8dc96.yaml new file mode 100644 index 0000000000..1f33b3af97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-review-60ae23854ab0f767b1c82b0fb6a8dc96.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-review-60ae23854ab0f767b1c82b0fb6a8dc96 + +info: + name: > + Wp Ultimate Review <= 2.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c198008f-271e-431e-beb9-3a9f93cbbf8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-review/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-review,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-review-7ec860262e0c4326c23d456dc0dfb1da.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-review-7ec860262e0c4326c23d456dc0dfb1da.yaml new file mode 100644 index 0000000000..bbc84d870c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-review-7ec860262e0c4326c23d456dc0dfb1da.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-review-7ec860262e0c4326c23d456dc0dfb1da + +info: + name: > + Wp Ultimate Review <= 2.2.5 - Unauthenticated Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b813f3d8-b765-4cf5-aec0-786140e2a0ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-review/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-review,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-review-86e49b910c876d1cc23d6f192f89fdb5.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-review-86e49b910c876d1cc23d6f192f89fdb5.yaml new file mode 100644 index 0000000000..40f10b2cdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-review-86e49b910c876d1cc23d6f192f89fdb5.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-review-86e49b910c876d1cc23d6f192f89fdb5 + +info: + name: > + Wp Ultimate Review <= 2.3.0 - Cross-Site Request Forgery via wur_settings_view + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1559fb43-cc5e-4dd2-80d8-06a137c7276d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-review/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-review,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-review-be633c3be5c6aae5c5d02b60c8c542b1.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-review-be633c3be5c6aae5c5d02b60c8c542b1.yaml new file mode 100644 index 0000000000..f12c2114de --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-review-be633c3be5c6aae5c5d02b60c8c542b1.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-review-be633c3be5c6aae5c5d02b60c8c542b1 + +info: + name: > + Wp Ultimate Review <= 2.3.2 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31418a45-7dae-4cd4-8f85-0498a285ef6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-review/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-review,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-review-cc90e11a79b5063f7474d47d11615e6d.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-review-cc90e11a79b5063f7474d47d11615e6d.yaml new file mode 100644 index 0000000000..61d2ddcd57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-review-cc90e11a79b5063f7474d47d11615e6d.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-review-cc90e11a79b5063f7474d47d11615e6d + +info: + name: > + Wp Ultimate Review <= 2.2.5 - Unauthenticated Review Restriction Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8122afe3-35bf-463b-8443-c093f00bf210?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-review/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-review,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultimate-review-f59ad0e4ed3c2f1220e9486cbde45cae.yaml b/nuclei-templates/cve-less/plugins/wp-ultimate-review-f59ad0e4ed3c2f1220e9486cbde45cae.yaml new file mode 100644 index 0000000000..f2ec69a262 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultimate-review-f59ad0e4ed3c2f1220e9486cbde45cae.yaml @@ -0,0 +1,58 @@ +id: wp-ultimate-review-f59ad0e4ed3c2f1220e9486cbde45cae + +info: + name: > + Wp Ultimate Review <= 2.2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15349295-4ee7-4746-ae34-200ffd24aa82?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultimate-review/" + google-query: inurl:"/wp-content/plugins/wp-ultimate-review/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultimate-review,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultimate-review/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultimate-review" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-ultra-simple-paypal-shopping-cart-6ee5c39e29212bcfe2590b9e64dd32ec.yaml b/nuclei-templates/cve-less/plugins/wp-ultra-simple-paypal-shopping-cart-6ee5c39e29212bcfe2590b9e64dd32ec.yaml new file mode 100644 index 0000000000..34e0b986b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-ultra-simple-paypal-shopping-cart-6ee5c39e29212bcfe2590b9e64dd32ec.yaml @@ -0,0 +1,58 @@ +id: wp-ultra-simple-paypal-shopping-cart-6ee5c39e29212bcfe2590b9e64dd32ec + +info: + name: > + WordPress Ultra Simple Paypal Shopping Cart <= 4.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb6ac547-59fd-4d51-a140-06f7f70a43ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-ultra-simple-paypal-shopping-cart/" + google-query: inurl:"/wp-content/plugins/wp-ultra-simple-paypal-shopping-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-ultra-simple-paypal-shopping-cart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-ultra-simple-paypal-shopping-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-ultra-simple-paypal-shopping-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-unique-article-header-image-b96d233c9f831b3a15126c8efb4195dc.yaml b/nuclei-templates/cve-less/plugins/wp-unique-article-header-image-b96d233c9f831b3a15126c8efb4195dc.yaml new file mode 100644 index 0000000000..6f02642ef5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-unique-article-header-image-b96d233c9f831b3a15126c8efb4195dc.yaml @@ -0,0 +1,58 @@ +id: wp-unique-article-header-image-b96d233c9f831b3a15126c8efb4195dc + +info: + name: > + WP Unique Article Header Image <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/444a848d-61bc-4801-815f-d68bea59f5bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-unique-article-header-image/" + google-query: inurl:"/wp-content/plugins/wp-unique-article-header-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-unique-article-header-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-unique-article-header-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-unique-article-header-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-upg-b03939b1629e023f1100df8dea055a3b.yaml b/nuclei-templates/cve-less/plugins/wp-upg-b03939b1629e023f1100df8dea055a3b.yaml new file mode 100644 index 0000000000..751118e363 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-upg-b03939b1629e023f1100df8dea055a3b.yaml @@ -0,0 +1,58 @@ +id: wp-upg-b03939b1629e023f1100df8dea055a3b + +info: + name: > + User Post Gallery - UPG <= 2.19 - Missing Authorization to Remote Command Execution + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19c370f1-322b-4c35-b100-244547373e1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-upg/" + google-query: inurl:"/wp-content/plugins/wp-upg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-upg,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-upg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-upg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-upload-restriction-451bef3a18327362fa560f933f5185ec.yaml b/nuclei-templates/cve-less/plugins/wp-upload-restriction-451bef3a18327362fa560f933f5185ec.yaml new file mode 100644 index 0000000000..f0b776a461 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-upload-restriction-451bef3a18327362fa560f933f5185ec.yaml @@ -0,0 +1,58 @@ +id: wp-upload-restriction-451bef3a18327362fa560f933f5185ec + +info: + name: > + WP Upload Restriction <= 2.2.4 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac7a9adb-4ba1-4194-8218-e81a0fc9b93b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-upload-restriction/" + google-query: inurl:"/wp-content/plugins/wp-upload-restriction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-upload-restriction,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-upload-restriction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-upload-restriction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-upload-restriction-5a577e1325bef2936221483c67cddb03.yaml b/nuclei-templates/cve-less/plugins/wp-upload-restriction-5a577e1325bef2936221483c67cddb03.yaml new file mode 100644 index 0000000000..4aebc0d6cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-upload-restriction-5a577e1325bef2936221483c67cddb03.yaml @@ -0,0 +1,58 @@ +id: wp-upload-restriction-5a577e1325bef2936221483c67cddb03 + +info: + name: > + WP Upload Restriction <= 2.2.4 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/205a6972-b49f-4b6d-b0de-7a047d5ee496?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-upload-restriction/" + google-query: inurl:"/wp-content/plugins/wp-upload-restriction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-upload-restriction,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-upload-restriction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-upload-restriction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-upload-restriction-f55c5d00698b3df2b8933d7fd6999c2a.yaml b/nuclei-templates/cve-less/plugins/wp-upload-restriction-f55c5d00698b3df2b8933d7fd6999c2a.yaml new file mode 100644 index 0000000000..2b1460f25d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-upload-restriction-f55c5d00698b3df2b8933d7fd6999c2a.yaml @@ -0,0 +1,58 @@ +id: wp-upload-restriction-f55c5d00698b3df2b8933d7fd6999c2a + +info: + name: > + WP Upload Restriction <= 2.2.4 – Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1257da54-e008-4e25-bc83-36246f00960e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-upload-restriction/" + google-query: inurl:"/wp-content/plugins/wp-upload-restriction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-upload-restriction,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-upload-restriction/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-upload-restriction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-1a67fea2fb785d012349551999e163de.yaml b/nuclei-templates/cve-less/plugins/wp-user-1a67fea2fb785d012349551999e163de.yaml new file mode 100644 index 0000000000..ff8977f50d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-1a67fea2fb785d012349551999e163de.yaml @@ -0,0 +1,58 @@ +id: wp-user-1a67fea2fb785d012349551999e163de + +info: + name: > + WP User – Custom Registration Forms, Login and User Profile < 7.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0831971-3862-4774-8375-fe5870ef82d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user/" + google-query: inurl:"/wp-content/plugins/wp-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-873b35008af518fb3d54c42d47368243.yaml b/nuclei-templates/cve-less/plugins/wp-user-873b35008af518fb3d54c42d47368243.yaml new file mode 100644 index 0000000000..c9480967ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-873b35008af518fb3d54c42d47368243.yaml @@ -0,0 +1,58 @@ +id: wp-user-873b35008af518fb3d54c42d47368243 + +info: + name: > + WP User <= 7.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ee21796-5340-4f84-b1c4-a95137a27223?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user/" + google-query: inurl:"/wp-content/plugins/wp-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-0698a66e8bb0aa2a8b088a7a1889cbc2.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-0698a66e8bb0aa2a8b088a7a1889cbc2.yaml new file mode 100644 index 0000000000..34505f86a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-0698a66e8bb0aa2a8b088a7a1889cbc2.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-0698a66e8bb0aa2a8b088a7a1889cbc2 + +info: + name: > + ProfilePress <= 4.15.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via profilepress-edit-profile Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3b9d0ab-d785-4e93-9ab8-f75673a27334?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-0e94d67e78f08a20056789a0d440afe2.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-0e94d67e78f08a20056789a0d440afe2.yaml new file mode 100644 index 0000000000..8712087db7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-0e94d67e78f08a20056789a0d440afe2.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-0e94d67e78f08a20056789a0d440afe2 + +info: + name: > + Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.15.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via [reg-select-role] Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53e16bca-7c85-4d56-8233-b3b53f793b39?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-1f71e71cd24bceed84937a152a603cb2.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-1f71e71cd24bceed84937a152a603cb2.yaml new file mode 100644 index 0000000000..406a336cc3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-1f71e71cd24bceed84937a152a603cb2.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-1f71e71cd24bceed84937a152a603cb2 + +info: + name: > + Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.15.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'reg-single-checkbox' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4986bc3-ee34-43a6-bad2-9f6665adb35c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-3eb275ee591fa0c16b66f277e10e13bc.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-3eb275ee591fa0c16b66f277e10e13bc.yaml new file mode 100644 index 0000000000..afe5366257 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-3eb275ee591fa0c16b66f277e10e13bc.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-3eb275ee591fa0c16b66f277e10e13bc + +info: + name: > + ProfilePress <= 4.13.1 - Limited Privilege Escalation via 'acceptable_defined_roles' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b2840ee-3b48-415e-9bed-d34d0b6e36d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-48b606f51693dab11522b09034d3ae96.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-48b606f51693dab11522b09034d3ae96.yaml new file mode 100644 index 0000000000..ee9ee55eb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-48b606f51693dab11522b09034d3ae96.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-48b606f51693dab11522b09034d3ae96 + +info: + name: > + ProfilePress 3.0 - 3.1.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68e838d4-2ff2-4925-b2ff-ba3f7b379010?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-51b25af2629d0400d7625bb870546310.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-51b25af2629d0400d7625bb870546310.yaml new file mode 100644 index 0000000000..8edc62f975 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-51b25af2629d0400d7625bb870546310.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-51b25af2629d0400d7625bb870546310 + +info: + name: > + ProfilePress <= 4.3.2 - Authenticated (Admin+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80127842-a931-41c7-9af8-3f0452a8c1a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-6281ccf1cb45a0f040d0e2c858dca63e.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-6281ccf1cb45a0f040d0e2c858dca63e.yaml new file mode 100644 index 0000000000..c1df737e90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-6281ccf1cb45a0f040d0e2c858dca63e.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-6281ccf1cb45a0f040d0e2c858dca63e + +info: + name: > + ProfilePress <= 4.13.1 Cross-Site Request Forgery via 'admin_notice' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e103f59a-00fa-4d4c-b4fc-834754886d49?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-6587cf615ade25a9efae204930a519bd.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-6587cf615ade25a9efae204930a519bd.yaml new file mode 100644 index 0000000000..c0138f830a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-6587cf615ade25a9efae204930a519bd.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-6587cf615ade25a9efae204930a519bd + +info: + name: > + User Registration, User Profiles, Login & Membership – ProfilePress (Formerly WP User Avatar) 3.0.0 - 3.1.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57531d89-1f54-43f4-a19d-9fda5e69f2ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-6819e71a564d878e4f4419dfc409235b.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-6819e71a564d878e4f4419dfc409235b.yaml new file mode 100644 index 0000000000..01164d8fc8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-6819e71a564d878e4f4419dfc409235b.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-6819e71a564d878e4f4419dfc409235b + +info: + name: > + Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.14.4 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ffd74de-6629-4088-ba5c-ac9dd5c6322c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-72031d703636f4d374acfec2037f647b.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-72031d703636f4d374acfec2037f647b.yaml new file mode 100644 index 0000000000..da1e091059 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-72031d703636f4d374acfec2037f647b.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-72031d703636f4d374acfec2037f647b + +info: + name: > + ProfilePress <= 4.5.3 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c8416840-c022-40a1-bcd3-17b34df11d95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-7433993cea900124b0f7230cf232b44d.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-7433993cea900124b0f7230cf232b44d.yaml new file mode 100644 index 0000000000..5ca62ac99b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-7433993cea900124b0f7230cf232b44d.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-7433993cea900124b0f7230cf232b44d + +info: + name: > + ProfilePress <= 3.1.7 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/179821bb-5b0d-4c41-a410-db433987a870?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-771fb956baaf0127618e8cf00b66b399.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-771fb956baaf0127618e8cf00b66b399.yaml new file mode 100644 index 0000000000..c900826e41 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-771fb956baaf0127618e8cf00b66b399.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-771fb956baaf0127618e8cf00b66b399 + +info: + name: > + ProfilePress <= 4.10.3 - Reflected Cross-Site Scripting via error message + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/041e635a-9f97-4f54-8ecb-57bbbc321cfc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.11.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-77904fe78351f83bbdf488cb644ca3d1.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-77904fe78351f83bbdf488cb644ca3d1.yaml new file mode 100644 index 0000000000..86ded2fcbc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-77904fe78351f83bbdf488cb644ca3d1.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-77904fe78351f83bbdf488cb644ca3d1 + +info: + name: > + Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.15.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eb296af-547a-44aa-b804-833204b75256?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-813e33d3439eeca37bb846e820e1b423.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-813e33d3439eeca37bb846e820e1b423.yaml new file mode 100644 index 0000000000..6559051ccd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-813e33d3439eeca37bb846e820e1b423.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-813e33d3439eeca37bb846e820e1b423 + +info: + name: > + Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.14.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7911c774-3fb0-4d6c-a847-101e5ad8637a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-82bdc31754953bb5cbc55f18a69f9401.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-82bdc31754953bb5cbc55f18a69f9401.yaml new file mode 100644 index 0000000000..545fc61ab5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-82bdc31754953bb5cbc55f18a69f9401.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-82bdc31754953bb5cbc55f18a69f9401 + +info: + name: > + User Registration, User Profiles, Login & Membership – ProfilePress (Formerly WP User Avatar) 3.0.0 - 3.1.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71955ba0-42ba-49a1-8b91-81069c6132ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-88e8a642963113f357e180145695e08e.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-88e8a642963113f357e180145695e08e.yaml new file mode 100644 index 0000000000..ed4ede3e93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-88e8a642963113f357e180145695e08e.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-88e8a642963113f357e180145695e08e + +info: + name: > + ProfilePress <= 4.14.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46d4d573-3845-4d20-8a48-a2f28850383c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-90145687b353ad4682e8d470b00e07e1.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-90145687b353ad4682e8d470b00e07e1.yaml new file mode 100644 index 0000000000..8cb6effcf9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-90145687b353ad4682e8d470b00e07e1.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-90145687b353ad4682e8d470b00e07e1 + +info: + name: > + ProfilePress <= 4.5.4 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4077fda-3f39-4e17-b7b8-3f1b6bf0a9e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-93365cd3a26ee2a497f31876bb4917f2.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-93365cd3a26ee2a497f31876bb4917f2.yaml new file mode 100644 index 0000000000..0d44c09b25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-93365cd3a26ee2a497f31876bb4917f2.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-93365cd3a26ee2a497f31876bb4917f2 + +info: + name: > + ProfilePress <= 4.5.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5201963b-3b30-4e7a-9ad1-d9fa7bf629e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-9e91fef8c5a09e4e777921aa54a9f471.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-9e91fef8c5a09e4e777921aa54a9f471.yaml new file mode 100644 index 0000000000..ef1fe2ed2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-9e91fef8c5a09e4e777921aa54a9f471.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-9e91fef8c5a09e4e777921aa54a9f471 + +info: + name: > + Paid Membership, User Registration, User Profile & Restrict Content Plugin – ProfilePress <= 3.1.10 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/684253b3-0a96-4822-84c8-bde8ed45f35e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-a51251f0d703aa8b0485bf4eda435396.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-a51251f0d703aa8b0485bf4eda435396.yaml new file mode 100644 index 0000000000..1b45983605 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-a51251f0d703aa8b0485bf4eda435396.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-a51251f0d703aa8b0485bf4eda435396 + +info: + name: > + ProfilePress <= 4.5.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/833006a6-462a-4729-8f3e-dca74a3802a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-b376ae9eb5e73985c7b2db36dc58f72f.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-b376ae9eb5e73985c7b2db36dc58f72f.yaml new file mode 100644 index 0000000000..8c2765999e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-b376ae9eb5e73985c7b2db36dc58f72f.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-b376ae9eb5e73985c7b2db36dc58f72f + +info: + name: > + ProfilePress <= 3.2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/746b9ecc-49c1-4f6e-9f86-4147c98fe325?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-b67db9ae21f25fb045ea60943b5dc06e.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-b67db9ae21f25fb045ea60943b5dc06e.yaml new file mode 100644 index 0000000000..9715dd7658 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-b67db9ae21f25fb045ea60943b5dc06e.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-b67db9ae21f25fb045ea60943b5dc06e + +info: + name: > + ProfilePress <= 3.2.2 - Reflected Cross-Site Scripting via ppress_cc_data Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2a87cb3-5cce-4b5a-937d-71e96aeef7c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-c25b123faba0bdec0e1756161a7f2a1e.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-c25b123faba0bdec0e1756161a7f2a1e.yaml new file mode 100644 index 0000000000..ae00a58c25 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-c25b123faba0bdec0e1756161a7f2a1e.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-c25b123faba0bdec0e1756161a7f2a1e + +info: + name: > + ProfilePress <= 4.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d54f585-0116-4517-84f1-271e89a05539?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-c396441598767a6e09e79d93045681a8.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-c396441598767a6e09e79d93045681a8.yaml new file mode 100644 index 0000000000..864a2bb73f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-c396441598767a6e09e79d93045681a8.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-c396441598767a6e09e79d93045681a8 + +info: + name: > + ProfilePress 3.0 - 3.1.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9bb2ae16-7886-4e66-83e0-59806dd67450?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0.0', '<= 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-ce05c14849e5f32e89c54867b5580301.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-ce05c14849e5f32e89c54867b5580301.yaml new file mode 100644 index 0000000000..a8f244c92c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-ce05c14849e5f32e89c54867b5580301.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-ce05c14849e5f32e89c54867b5580301 + +info: + name: > + ProfilePress <= 4.14.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via [edit-profile-text-box] shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e50081f-6658-4cc7-bf0a-d04464820926?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.14.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-d60068516760d7fad3a37219e7d9a9f1.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-d60068516760d7fad3a37219e7d9a9f1.yaml new file mode 100644 index 0000000000..640e5b7951 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-d60068516760d7fad3a37219e7d9a9f1.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-d60068516760d7fad3a37219e7d9a9f1 + +info: + name: > + ProfilePress <= 4.13.2 - Information Disclosure via Debug Log + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f5357e0-1e1b-4090-a6ae-9587c6a8d290?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.13.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-d69cccda2f91ca5cf933845a336f8818.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-d69cccda2f91ca5cf933845a336f8818.yaml new file mode 100644 index 0000000000..ffa7404166 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-d69cccda2f91ca5cf933845a336f8818.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-d69cccda2f91ca5cf933845a336f8818 + +info: + name: > + WordPress Membership, User Registration, Login Form, User Profile & Restrict Content Plugin – ProfilePress <= 3.2.15 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e532a2b4-0fb4-4256-89a9-435b55d9de91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-ea7c82866444834be834917feb8c07e7.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-ea7c82866444834be834917feb8c07e7.yaml new file mode 100644 index 0000000000..4854eb362f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-ea7c82866444834be834917feb8c07e7.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-ea7c82866444834be834917feb8c07e7 + +info: + name: > + ProfilePress <= 4.15.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38ec1a6b-f5ee-446a-9e6c-3485dafb85ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-avatar-faa5c662684f3e34d87e4c432d1f9f4a.yaml b/nuclei-templates/cve-less/plugins/wp-user-avatar-faa5c662684f3e34d87e4c432d1f9f4a.yaml new file mode 100644 index 0000000000..fdbc4bf7d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-avatar-faa5c662684f3e34d87e4c432d1f9f4a.yaml @@ -0,0 +1,58 @@ +id: wp-user-avatar-faa5c662684f3e34d87e4c432d1f9f4a + +info: + name: > + ProfilePress <= 4.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via Form Settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43c9dcec-f769-4c55-93d0-c2aa45a4fa16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-control-833c717ddaa425412e5078aad2dee670.yaml b/nuclei-templates/cve-less/plugins/wp-user-control-833c717ddaa425412e5078aad2dee670.yaml new file mode 100644 index 0000000000..ccd8e8e7d9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-control-833c717ddaa425412e5078aad2dee670.yaml @@ -0,0 +1,58 @@ +id: wp-user-control-833c717ddaa425412e5078aad2dee670 + +info: + name: > + WP User Control <= 1.5.3 - Insecure Password Reset Mechanism + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4ca1736-7b99-49db-9367-586dbc14df41?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-control/" + google-query: inurl:"/wp-content/plugins/wp-user-control/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-control,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-control/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-control" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-dcecbe3ad598b0f09d573e5ce1408664.yaml b/nuclei-templates/cve-less/plugins/wp-user-dcecbe3ad598b0f09d573e5ce1408664.yaml new file mode 100644 index 0000000000..2d86b56de5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-dcecbe3ad598b0f09d573e5ce1408664.yaml @@ -0,0 +1,58 @@ +id: wp-user-dcecbe3ad598b0f09d573e5ce1408664 + +info: + name: > + WP User <= 7.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91a1604c-c729-4c68-90a8-91862a351ecc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user/" + google-query: inurl:"/wp-content/plugins/wp-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-frontend-009b7c3c01cbc1b8e5b1583fe598205f.yaml b/nuclei-templates/cve-less/plugins/wp-user-frontend-009b7c3c01cbc1b8e5b1583fe598205f.yaml new file mode 100644 index 0000000000..30db2066d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-frontend-009b7c3c01cbc1b8e5b1583fe598205f.yaml @@ -0,0 +1,58 @@ +id: wp-user-frontend-009b7c3c01cbc1b8e5b1583fe598205f + +info: + name: > + WP User Frontend <= 3.6.8 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e8e967f-f627-4c0c-ac0f-0a66ae25c602?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-frontend/" + google-query: inurl:"/wp-content/plugins/wp-user-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-frontend,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-frontend-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wp-user-frontend-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..b1f36337c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-frontend-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wp-user-frontend-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-frontend/" + google-query: inurl:"/wp-content/plugins/wp-user-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-frontend,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-frontend-2b0505dcb148063bd28b62fb8d1236a0.yaml b/nuclei-templates/cve-less/plugins/wp-user-frontend-2b0505dcb148063bd28b62fb8d1236a0.yaml new file mode 100644 index 0000000000..2524c87616 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-frontend-2b0505dcb148063bd28b62fb8d1236a0.yaml @@ -0,0 +1,58 @@ +id: wp-user-frontend-2b0505dcb148063bd28b62fb8d1236a0 + +info: + name: > + WP User Frontend < 2.3.11 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a2186c9-fa27-4d7d-be41-c82711c49334?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-frontend/" + google-query: inurl:"/wp-content/plugins/wp-user-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-frontend,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-frontend-36566c3afb06b969f751eee41300c71b.yaml b/nuclei-templates/cve-less/plugins/wp-user-frontend-36566c3afb06b969f751eee41300c71b.yaml new file mode 100644 index 0000000000..abe2848323 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-frontend-36566c3afb06b969f751eee41300c71b.yaml @@ -0,0 +1,58 @@ +id: wp-user-frontend-36566c3afb06b969f751eee41300c71b + +info: + name: > + WP User Frontend <= 3.5.25 - SQL Injection & Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9793793-44d5-4628-a57b-c1254645e648?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-frontend/" + google-query: inurl:"/wp-content/plugins/wp-user-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-frontend,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-frontend-52f719767f15ee080cb75a30bc027c64.yaml b/nuclei-templates/cve-less/plugins/wp-user-frontend-52f719767f15ee080cb75a30bc027c64.yaml new file mode 100644 index 0000000000..d66eec4825 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-frontend-52f719767f15ee080cb75a30bc027c64.yaml @@ -0,0 +1,58 @@ +id: wp-user-frontend-52f719767f15ee080cb75a30bc027c64 + +info: + name: > + WP User Frontend – Membership, Profile, Registration & Post Submission Plugin for WordPress < 3.5.25 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c476263-72b7-48f1-8ba3-91d69eae7b6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-frontend/" + google-query: inurl:"/wp-content/plugins/wp-user-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-frontend,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-frontend-878f413ec190d0a95a0db0404871c06a.yaml b/nuclei-templates/cve-less/plugins/wp-user-frontend-878f413ec190d0a95a0db0404871c06a.yaml new file mode 100644 index 0000000000..a286421a9a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-frontend-878f413ec190d0a95a0db0404871c06a.yaml @@ -0,0 +1,58 @@ +id: wp-user-frontend-878f413ec190d0a95a0db0404871c06a + +info: + name: > + WP User Frontend <= 3.6.5 - Authenticated (Author+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31de3c9b-068d-47d8-9811-feae07f2e9d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-frontend/" + google-query: inurl:"/wp-content/plugins/wp-user-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-frontend,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-frontend-9cdff4661ff94d9ebac19d8fc5548ae6.yaml b/nuclei-templates/cve-less/plugins/wp-user-frontend-9cdff4661ff94d9ebac19d8fc5548ae6.yaml new file mode 100644 index 0000000000..72b1683875 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-frontend-9cdff4661ff94d9ebac19d8fc5548ae6.yaml @@ -0,0 +1,58 @@ +id: wp-user-frontend-9cdff4661ff94d9ebac19d8fc5548ae6 + +info: + name: > + WP User Frontend <= 3.5.28 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a0f77ca-2fb5-4e73-a0fa-dfbeb39fbd84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-frontend/" + google-query: inurl:"/wp-content/plugins/wp-user-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-frontend,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-frontend-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wp-user-frontend-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..40aef7fa30 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-frontend-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wp-user-frontend-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-frontend/" + google-query: inurl:"/wp-content/plugins/wp-user-frontend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-frontend,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-frontend/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-frontend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-groups-bf634e73fd86b893cfe39f853485f27b.yaml b/nuclei-templates/cve-less/plugins/wp-user-groups-bf634e73fd86b893cfe39f853485f27b.yaml new file mode 100644 index 0000000000..01216cee33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-groups-bf634e73fd86b893cfe39f853485f27b.yaml @@ -0,0 +1,58 @@ +id: wp-user-groups-bf634e73fd86b893cfe39f853485f27b + +info: + name: > + WP User Groups <= 2.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cbbce9e-bfb5-49b3-9829-1f90e0d8f517?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-groups/" + google-query: inurl:"/wp-content/plugins/wp-user-groups/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-groups,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-groups/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-groups" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-manager-5acef1bfe4bd1454c852e9b74429a91a.yaml b/nuclei-templates/cve-less/plugins/wp-user-manager-5acef1bfe4bd1454c852e9b74429a91a.yaml new file mode 100644 index 0000000000..297527f787 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-manager-5acef1bfe4bd1454c852e9b74429a91a.yaml @@ -0,0 +1,58 @@ +id: wp-user-manager-5acef1bfe4bd1454c852e9b74429a91a + +info: + name: > + User Registration < 2.0.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b581e866-2b3b-4d6f-8bd3-d370c6482d12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-manager/" + google-query: inurl:"/wp-content/plugins/wp-user-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-manager-966b6ace296100d0ad47e45751a9a6b6.yaml b/nuclei-templates/cve-less/plugins/wp-user-manager-966b6ace296100d0ad47e45751a9a6b6.yaml new file mode 100644 index 0000000000..20c5cd3ea3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-manager-966b6ace296100d0ad47e45751a9a6b6.yaml @@ -0,0 +1,58 @@ +id: wp-user-manager-966b6ace296100d0ad47e45751a9a6b6 + +info: + name: > + WP User Manager <= 2.6.2 - Arbitrary User Password Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8815abff-6bd5-4ce4-9adf-afd699f628c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-manager/" + google-query: inurl:"/wp-content/plugins/wp-user-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-merger-7f2ad53d025d64620bae59b467d70f5b.yaml b/nuclei-templates/cve-less/plugins/wp-user-merger-7f2ad53d025d64620bae59b467d70f5b.yaml new file mode 100644 index 0000000000..c35a3b39cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-merger-7f2ad53d025d64620bae59b467d70f5b.yaml @@ -0,0 +1,58 @@ +id: wp-user-merger-7f2ad53d025d64620bae59b467d70f5b + +info: + name: > + WP User Merger <= 1.5.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aef312be-85d6-45e7-a34f-7f7cc415df3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-merger/" + google-query: inurl:"/wp-content/plugins/wp-user-merger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-merger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-merger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-merger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-merger-9e9c8555eaf480676d3bf05dbd493869.yaml b/nuclei-templates/cve-less/plugins/wp-user-merger-9e9c8555eaf480676d3bf05dbd493869.yaml new file mode 100644 index 0000000000..1d9ec962a9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-merger-9e9c8555eaf480676d3bf05dbd493869.yaml @@ -0,0 +1,58 @@ +id: wp-user-merger-9e9c8555eaf480676d3bf05dbd493869 + +info: + name: > + WP User Merger <= 1.5.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2a6f8ec-6a3e-453d-9ef4-794b5791ac2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-merger/" + google-query: inurl:"/wp-content/plugins/wp-user-merger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-merger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-merger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-merger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-merger-f267d62c47f700236f07eb0616a44f03.yaml b/nuclei-templates/cve-less/plugins/wp-user-merger-f267d62c47f700236f07eb0616a44f03.yaml new file mode 100644 index 0000000000..bf648e4c03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-merger-f267d62c47f700236f07eb0616a44f03.yaml @@ -0,0 +1,58 @@ +id: wp-user-merger-f267d62c47f700236f07eb0616a44f03 + +info: + name: > + WP User Merger <= 1.5.2 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55ed6e73-4e9a-4201-91c2-0f7153ec1cb7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-merger/" + google-query: inurl:"/wp-content/plugins/wp-user-merger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-merger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-merger/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-merger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-8d7a863f5c4efdd21d67e64b56b84820.yaml b/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-8d7a863f5c4efdd21d67e64b56b84820.yaml new file mode 100644 index 0000000000..f5daba7b04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-8d7a863f5c4efdd21d67e64b56b84820.yaml @@ -0,0 +1,58 @@ +id: wp-user-profile-avatar-8d7a863f5c4efdd21d67e64b56b84820 + +info: + name: > + WP User Profile Avatar <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af053fdc-e40c-4dfa-8d16-09c72d839031?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-profile-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-profile-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-profile-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-profile-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-profile-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-af96d1868fb4ef94535942e6a7a96e89.yaml b/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-af96d1868fb4ef94535942e6a7a96e89.yaml new file mode 100644 index 0000000000..1c4027638a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-af96d1868fb4ef94535942e6a7a96e89.yaml @@ -0,0 +1,58 @@ +id: wp-user-profile-avatar-af96d1868fb4ef94535942e6a7a96e89 + +info: + name: > + WP User Profile Avatar <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c291aa80-f1cd-4933-b522-73ec115a3a68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-profile-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-profile-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-profile-avatar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-profile-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-profile-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-ec4121cea31885fa26a199486b7f74e3.yaml b/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-ec4121cea31885fa26a199486b7f74e3.yaml new file mode 100644 index 0000000000..2396c3ea80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-profile-avatar-ec4121cea31885fa26a199486b7f74e3.yaml @@ -0,0 +1,58 @@ +id: wp-user-profile-avatar-ec4121cea31885fa26a199486b7f74e3 + +info: + name: > + WP User Profile Avatar <= 1.0.0 - Authenticated (Author+) Insecure Direct Object Reference to Avatar Deletion/Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75c325a1-1a88-4b67-a5f8-6307627d8c6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-profile-avatar/" + google-query: inurl:"/wp-content/plugins/wp-user-profile-avatar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-profile-avatar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-profile-avatar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-profile-avatar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-user-switch-e3973fedf7a8f63d43b3386884883485.yaml b/nuclei-templates/cve-less/plugins/wp-user-switch-e3973fedf7a8f63d43b3386884883485.yaml new file mode 100644 index 0000000000..32bea094c4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-user-switch-e3973fedf7a8f63d43b3386884883485.yaml @@ -0,0 +1,58 @@ +id: wp-user-switch-e3973fedf7a8f63d43b3386884883485 + +info: + name: > + WP User Switch <= 1.0.2 - Authenticated (Subscriber+) Authentication Bypass via Cookie + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e89d912d-fa7a-4fb1-8872-95fa861c21ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-user-switch/" + google-query: inurl:"/wp-content/plugins/wp-user-switch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-user-switch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-user-switch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-user-switch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-useronline-5b8cbfd6e3ba79c4725fe838c412c514.yaml b/nuclei-templates/cve-less/plugins/wp-useronline-5b8cbfd6e3ba79c4725fe838c412c514.yaml new file mode 100644 index 0000000000..b7cfa0b638 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-useronline-5b8cbfd6e3ba79c4725fe838c412c514.yaml @@ -0,0 +1,58 @@ +id: wp-useronline-5b8cbfd6e3ba79c4725fe838c412c514 + +info: + name: > + WP-UserOnline <= 2.88.0 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c4fb14c-de6d-4247-8f83-050f1350f6a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-useronline/" + google-query: inurl:"/wp-content/plugins/wp-useronline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-useronline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-useronline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-useronline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.88.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-useronline-6232cffe5a9c5f7164bab7ade4dfa253.yaml b/nuclei-templates/cve-less/plugins/wp-useronline-6232cffe5a9c5f7164bab7ade4dfa253.yaml new file mode 100644 index 0000000000..374ea78981 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-useronline-6232cffe5a9c5f7164bab7ade4dfa253.yaml @@ -0,0 +1,58 @@ +id: wp-useronline-6232cffe5a9c5f7164bab7ade4dfa253 + +info: + name: > + WP-UserOnline < 2.70 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c79587d8-56a9-4c1c-99dc-bc66194ffe52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-useronline/" + google-query: inurl:"/wp-content/plugins/wp-useronline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-useronline,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-useronline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-useronline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-useronline-669b73ac27d820ad91a32920ca859ce3.yaml b/nuclei-templates/cve-less/plugins/wp-useronline-669b73ac27d820ad91a32920ca859ce3.yaml new file mode 100644 index 0000000000..57c90a4ee3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-useronline-669b73ac27d820ad91a32920ca859ce3.yaml @@ -0,0 +1,58 @@ +id: wp-useronline-669b73ac27d820ad91a32920ca859ce3 + +info: + name: > + WP-UserOnline <= 2.87.6 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a44a55e-a96a-4698-9948-6ef33138a834?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-useronline/" + google-query: inurl:"/wp-content/plugins/wp-useronline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-useronline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-useronline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-useronline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.87.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-useronline-7db35c118cdf678977312aec08d43ff0.yaml b/nuclei-templates/cve-less/plugins/wp-useronline-7db35c118cdf678977312aec08d43ff0.yaml new file mode 100644 index 0000000000..9cf7886225 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-useronline-7db35c118cdf678977312aec08d43ff0.yaml @@ -0,0 +1,58 @@ +id: wp-useronline-7db35c118cdf678977312aec08d43ff0 + +info: + name: > + WP-UserOnline <= 2.88.2 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e11662b0-5f67-4c27-abdb-522204acb35e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-useronline/" + google-query: inurl:"/wp-content/plugins/wp-useronline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-useronline,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-useronline/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-useronline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.88.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-users-disable-453fdd29f3b3ed3425776068af53e39d.yaml b/nuclei-templates/cve-less/plugins/wp-users-disable-453fdd29f3b3ed3425776068af53e39d.yaml new file mode 100644 index 0000000000..b0fc42d76b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-users-disable-453fdd29f3b3ed3425776068af53e39d.yaml @@ -0,0 +1,58 @@ +id: wp-users-disable-453fdd29f3b3ed3425776068af53e39d + +info: + name: > + Disable User Login <= 1.0.1 - Missing Authorization to Unauthenticated Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/caa2bbdf-353e-49a2-b0e5-d9236848a211?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-users-disable/" + google-query: inurl:"/wp-content/plugins/wp-users-disable/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-users-disable,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-users-disable/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-users-disable" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-users-exporter-5709251856e505a66ad635cfb702132a.yaml b/nuclei-templates/cve-less/plugins/wp-users-exporter-5709251856e505a66ad635cfb702132a.yaml new file mode 100644 index 0000000000..33bd07d6bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-users-exporter-5709251856e505a66ad635cfb702132a.yaml @@ -0,0 +1,58 @@ +id: wp-users-exporter-5709251856e505a66ad635cfb702132a + +info: + name: > + WP Users Exporter <= 1.4.2 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7da1d7cf-e8b5-4b7c-bdc1-13ef8c11b663?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-users-exporter/" + google-query: inurl:"/wp-content/plugins/wp-users-exporter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-users-exporter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-users-exporter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-users-exporter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-users-media-1c4626b1b3d1dd0c219d11001b424f9a.yaml b/nuclei-templates/cve-less/plugins/wp-users-media-1c4626b1b3d1dd0c219d11001b424f9a.yaml new file mode 100644 index 0000000000..8e136818a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-users-media-1c4626b1b3d1dd0c219d11001b424f9a.yaml @@ -0,0 +1,58 @@ +id: wp-users-media-1c4626b1b3d1dd0c219d11001b424f9a + +info: + name: > + WP Users Media <= 4.2.3 - Cross-Site Request Forgery in wpusme_save_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07a82335-d738-4c14-b385-04843f12e4ef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-users-media/" + google-query: inurl:"/wp-content/plugins/wp-users-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-users-media,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-users-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-users-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-users-media-6c042e8ea6605a500a8eb10aee943be3.yaml b/nuclei-templates/cve-less/plugins/wp-users-media-6c042e8ea6605a500a8eb10aee943be3.yaml new file mode 100644 index 0000000000..915ae15350 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-users-media-6c042e8ea6605a500a8eb10aee943be3.yaml @@ -0,0 +1,58 @@ +id: wp-users-media-6c042e8ea6605a500a8eb10aee943be3 + +info: + name: > + WP Users Media <= 4.2.3 - Missing Authorization via wpusme_save_settings + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e125188-4aff-4c64-b4ec-a363db2431b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-users-media/" + google-query: inurl:"/wp-content/plugins/wp-users-media/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-users-media,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-users-media/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-users-media" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vault-adc5003f671700d129ab7c75b33ee75d.yaml b/nuclei-templates/cve-less/plugins/wp-vault-adc5003f671700d129ab7c75b33ee75d.yaml new file mode 100644 index 0000000000..e13e58bbd7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vault-adc5003f671700d129ab7c75b33ee75d.yaml @@ -0,0 +1,58 @@ +id: wp-vault-adc5003f671700d129ab7c75b33ee75d + +info: + name: > + WP Vault <= 0.8.6.6 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33c23ad3-7d4f-4e2d-b28e-a402b1355480?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vault/" + google-query: inurl:"/wp-content/plugins/wp-vault/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vault,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vault/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vault" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.8.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-1c782b4e649e4631f30e49b11990c278.yaml b/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-1c782b4e649e4631f30e49b11990c278.yaml new file mode 100644 index 0000000000..0cd7977711 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-1c782b4e649e4631f30e49b11990c278.yaml @@ -0,0 +1,58 @@ +id: wp-vertical-image-slider-1c782b4e649e4631f30e49b11990c278 + +info: + name: > + wordpress vertical image slider plugin < 1.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7fe772a-542e-4c3e-b1cb-05cce3b2ec3f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vertical-image-slider/" + google-query: inurl:"/wp-content/plugins/wp-vertical-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vertical-image-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vertical-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vertical-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-9ef0672874cd901f6cd102e8cb391c48.yaml b/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-9ef0672874cd901f6cd102e8cb391c48.yaml new file mode 100644 index 0000000000..e3e3b84662 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-9ef0672874cd901f6cd102e8cb391c48.yaml @@ -0,0 +1,58 @@ +id: wp-vertical-image-slider-9ef0672874cd901f6cd102e8cb391c48 + +info: + name: > + wordpress vertical image slider plugin <= 1.2.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9983364-9b52-4acc-91d4-b352c6d24d52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vertical-image-slider/" + google-query: inurl:"/wp-content/plugins/wp-vertical-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vertical-image-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vertical-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vertical-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-ea2ac4bbba26e325b5bfe41be94a548c.yaml b/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-ea2ac4bbba26e325b5bfe41be94a548c.yaml new file mode 100644 index 0000000000..b9f2935bd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-ea2ac4bbba26e325b5bfe41be94a548c.yaml @@ -0,0 +1,58 @@ +id: wp-vertical-image-slider-ea2ac4bbba26e325b5bfe41be94a548c + +info: + name: > + wordpress vertical image slider plugin <= 1.2.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59c40a86-ea1c-4015-ac47-2b7b91cc3519?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vertical-image-slider/" + google-query: inurl:"/wp-content/plugins/wp-vertical-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vertical-image-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vertical-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vertical-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-edc2879e6dbbc4290d65d5576c4e456b.yaml b/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-edc2879e6dbbc4290d65d5576c4e456b.yaml new file mode 100644 index 0000000000..47fdc757e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vertical-image-slider-edc2879e6dbbc4290d65d5576c4e456b.yaml @@ -0,0 +1,58 @@ +id: wp-vertical-image-slider-edc2879e6dbbc4290d65d5576c4e456b + +info: + name: > + wordpress vertical image slider plugin < 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/966b43ea-dbd3-4f1e-b803-08027fff6f8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vertical-image-slider/" + google-query: inurl:"/wp-content/plugins/wp-vertical-image-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vertical-image-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vertical-image-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vertical-image-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-video-gallery-free-259e85ddeb38f519130917626241cfb2.yaml b/nuclei-templates/cve-less/plugins/wp-video-gallery-free-259e85ddeb38f519130917626241cfb2.yaml new file mode 100644 index 0000000000..9fd8bfc0fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-video-gallery-free-259e85ddeb38f519130917626241cfb2.yaml @@ -0,0 +1,58 @@ +id: wp-video-gallery-free-259e85ddeb38f519130917626241cfb2 + +info: + name: > + WP Video Gallery <= 1.7.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53889ac8-a101-4aae-a1d2-f25cbf6f58e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-video-gallery-free/" + google-query: inurl:"/wp-content/plugins/wp-video-gallery-free/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-video-gallery-free,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-video-gallery-free/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-video-gallery-free" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-video-lightbox-92e1a581ed538c56c551dca01e319f17.yaml b/nuclei-templates/cve-less/plugins/wp-video-lightbox-92e1a581ed538c56c551dca01e319f17.yaml new file mode 100644 index 0000000000..5fc97b661a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-video-lightbox-92e1a581ed538c56c551dca01e319f17.yaml @@ -0,0 +1,58 @@ +id: wp-video-lightbox-92e1a581ed538c56c551dca01e319f17 + +info: + name: > + Video Lightbox <= 1.9.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf44a96e-0efb-4363-9f49-ba4a82924569?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-video-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-video-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-video-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-video-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-video-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-video-lightbox-9a15f5067a143fbe0852c7999a453016.yaml b/nuclei-templates/cve-less/plugins/wp-video-lightbox-9a15f5067a143fbe0852c7999a453016.yaml new file mode 100644 index 0000000000..fdbf905daf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-video-lightbox-9a15f5067a143fbe0852c7999a453016.yaml @@ -0,0 +1,58 @@ +id: wp-video-lightbox-9a15f5067a143fbe0852c7999a453016 + +info: + name: > + WP Video Lightbox <= 1.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd3d3fe1-8fdd-404c-a8f7-2b9893ff6c0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-video-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-video-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-video-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-video-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-video-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-video-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/wp-video-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..6206c2ad4f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-video-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: wp-video-lightbox-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-video-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-video-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-video-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-video-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-video-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-video-lightbox-d27fa19d4b96ffbe2e62694bb7f786a1.yaml b/nuclei-templates/cve-less/plugins/wp-video-lightbox-d27fa19d4b96ffbe2e62694bb7f786a1.yaml new file mode 100644 index 0000000000..1023210ecc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-video-lightbox-d27fa19d4b96ffbe2e62694bb7f786a1.yaml @@ -0,0 +1,58 @@ +id: wp-video-lightbox-d27fa19d4b96ffbe2e62694bb7f786a1 + +info: + name: > + WP Video Lightbox <= 1.9.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via width Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da2d8494-aea3-4a1e-9eca-946c0bd390cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-video-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-video-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-video-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-video-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-video-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-video-lightbox-ea22f32ac37f9f8e0f263b4584b31b1a.yaml b/nuclei-templates/cve-less/plugins/wp-video-lightbox-ea22f32ac37f9f8e0f263b4584b31b1a.yaml new file mode 100644 index 0000000000..2c946fb167 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-video-lightbox-ea22f32ac37f9f8e0f263b4584b31b1a.yaml @@ -0,0 +1,58 @@ +id: wp-video-lightbox-ea22f32ac37f9f8e0f263b4584b31b1a + +info: + name: > + WP Video Lightbox <= 1.9.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb68f3b4-b4c7-4e16-bed2-2bd41f1b5a44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-video-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-video-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-video-lightbox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-video-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-video-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-video-lightbox-f81f2c3fb0fd545df0470702817f5fe2.yaml b/nuclei-templates/cve-less/plugins/wp-video-lightbox-f81f2c3fb0fd545df0470702817f5fe2.yaml new file mode 100644 index 0000000000..c1cfbc6a15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-video-lightbox-f81f2c3fb0fd545df0470702817f5fe2.yaml @@ -0,0 +1,58 @@ +id: wp-video-lightbox-f81f2c3fb0fd545df0470702817f5fe2 + +info: + name: > + WP Video Lightbox <= 1.9.2 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4a2c3cf-0785-4bf0-9ad8-0d2479545067?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-video-lightbox/" + google-query: inurl:"/wp-content/plugins/wp-video-lightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-video-lightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-video-lightbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-video-lightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vipergb-f5789b694dfc2fa041ad362aac79382e.yaml b/nuclei-templates/cve-less/plugins/wp-vipergb-f5789b694dfc2fa041ad362aac79382e.yaml new file mode 100644 index 0000000000..8d2c353815 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vipergb-f5789b694dfc2fa041ad362aac79382e.yaml @@ -0,0 +1,58 @@ +id: wp-vipergb-f5789b694dfc2fa041ad362aac79382e + +info: + name: > + Viper GuestBook <= 1.3.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39843d5b-702d-466d-9e17-ccf1c4444220?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vipergb/" + google-query: inurl:"/wp-content/plugins/wp-vipergb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vipergb,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vipergb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vipergb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vipergb-fe07dbc2056b4c877acab0ca5ff47ac2.yaml b/nuclei-templates/cve-less/plugins/wp-vipergb-fe07dbc2056b4c877acab0ca5ff47ac2.yaml new file mode 100644 index 0000000000..54a0a5f9cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vipergb-fe07dbc2056b4c877acab0ca5ff47ac2.yaml @@ -0,0 +1,58 @@ +id: wp-vipergb-fe07dbc2056b4c877acab0ca5ff47ac2 + +info: + name: > + WP-ViperGB <= 1.3.10 - Cross-Site Request Forgery to Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30dda650-3262-4d22-bec7-b6de3bc25381?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vipergb/" + google-query: inurl:"/wp-content/plugins/wp-vipergb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vipergb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vipergb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vipergb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-visited-countries-reloaded-4a0f27da648b505730f70f317974fdf7.yaml b/nuclei-templates/cve-less/plugins/wp-visited-countries-reloaded-4a0f27da648b505730f70f317974fdf7.yaml new file mode 100644 index 0000000000..96766b180b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-visited-countries-reloaded-4a0f27da648b505730f70f317974fdf7.yaml @@ -0,0 +1,58 @@ +id: wp-visited-countries-reloaded-4a0f27da648b505730f70f317974fdf7 + +info: + name: > + WP Visited Countries Reloaded <= 3.1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea24cb9e-88a5-45a2-93f8-544afef5a83b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-visited-countries-reloaded/" + google-query: inurl:"/wp-content/plugins/wp-visited-countries-reloaded/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-visited-countries-reloaded,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-visited-countries-reloaded/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-visited-countries-reloaded" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-visual-slidebox-builder-1302cc789091d34c6db79147cc295acd.yaml b/nuclei-templates/cve-less/plugins/wp-visual-slidebox-builder-1302cc789091d34c6db79147cc295acd.yaml new file mode 100644 index 0000000000..517ef896cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-visual-slidebox-builder-1302cc789091d34c6db79147cc295acd.yaml @@ -0,0 +1,58 @@ +id: wp-visual-slidebox-builder-1302cc789091d34c6db79147cc295acd + +info: + name: > + Visual Slide Box Builder <= 3.2.9 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/38a405f2-344c-4ee1-a67e-5f6afad66b84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-visual-slidebox-builder/" + google-query: inurl:"/wp-content/plugins/wp-visual-slidebox-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-visual-slidebox-builder,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-visual-slidebox-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-visual-slidebox-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vk-82a078e3bdcdcaf8541a885f22c4a7a6.yaml b/nuclei-templates/cve-less/plugins/wp-vk-82a078e3bdcdcaf8541a885f22c4a7a6.yaml new file mode 100644 index 0000000000..d76ffc24d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vk-82a078e3bdcdcaf8541a885f22c4a7a6.yaml @@ -0,0 +1,58 @@ +id: wp-vk-82a078e3bdcdcaf8541a885f22c4a7a6 + +info: + name: > + WP VK-付费内容插件 <= 1.3.3 - Cross-Site Request Forgery via AJAX actions + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c6bc786-341a-4ab6-b86e-d21bb3dbf298?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vk/" + google-query: inurl:"/wp-content/plugins/wp-vk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vk,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-voting-contest-671933c31cfdf22d6690b9521e0d209c.yaml b/nuclei-templates/cve-less/plugins/wp-voting-contest-671933c31cfdf22d6690b9521e0d209c.yaml new file mode 100644 index 0000000000..c7d2f18dbf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-voting-contest-671933c31cfdf22d6690b9521e0d209c.yaml @@ -0,0 +1,58 @@ +id: wp-voting-contest-671933c31cfdf22d6690b9521e0d209c + +info: + name: > + WP Voting Contest < 3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73472066-8e5c-46a4-906d-f459a2ebf40d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-voting-contest/" + google-query: inurl:"/wp-content/plugins/wp-voting-contest/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-voting-contest,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-voting-contest/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-voting-contest" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-vr-view-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml b/nuclei-templates/cve-less/plugins/wp-vr-view-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml new file mode 100644 index 0000000000..3ed0c52561 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-vr-view-5a2127bf03219f3d8bbf0c6e20f59ac5.yaml @@ -0,0 +1,58 @@ +id: wp-vr-view-5a2127bf03219f3d8bbf0c6e20f59ac5 + +info: + name: > + VRView <= 1.1.3 and WP-VR-view <= 1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6c906b3-8819-409c-946a-eeb9d938142d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-vr-view/" + google-query: inurl:"/wp-content/plugins/wp-vr-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-vr-view,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-vr-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-vr-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-webinarsystem-fafafb2a28dce19928fc435ec7cb0821.yaml b/nuclei-templates/cve-less/plugins/wp-webinarsystem-fafafb2a28dce19928fc435ec7cb0821.yaml new file mode 100644 index 0000000000..fc9480ed71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-webinarsystem-fafafb2a28dce19928fc435ec7cb0821.yaml @@ -0,0 +1,58 @@ +id: wp-webinarsystem-fafafb2a28dce19928fc435ec7cb0821 + +info: + name: > + WebinarPress <= 1.33.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca0e51b2-640a-4bd1-b667-74107b7dcc6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-webinarsystem/" + google-query: inurl:"/wp-content/plugins/wp-webinarsystem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-webinarsystem,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-webinarsystem/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-webinarsystem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.33.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-whatsapp-15be6de4677a81d9742115b7d4dbf93c.yaml b/nuclei-templates/cve-less/plugins/wp-whatsapp-15be6de4677a81d9742115b7d4dbf93c.yaml new file mode 100644 index 0000000000..b452c4c43a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-whatsapp-15be6de4677a81d9742115b7d4dbf93c.yaml @@ -0,0 +1,58 @@ +id: wp-whatsapp-15be6de4677a81d9742115b7d4dbf93c + +info: + name: > + WP Chat App <= 3.6.2 - Authenticated(Contributor+) Stored Cross-Site Scripting via Block Image Attribute + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bba2901-55a7-4ef1-ab3c-1415aa99c729?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-whatsapp/" + google-query: inurl:"/wp-content/plugins/wp-whatsapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-whatsapp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-whatsapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-whatsapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-whatsapp-45fa634ab986eb98d5523af1f02322fd.yaml b/nuclei-templates/cve-less/plugins/wp-whatsapp-45fa634ab986eb98d5523af1f02322fd.yaml new file mode 100644 index 0000000000..962d51b66c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-whatsapp-45fa634ab986eb98d5523af1f02322fd.yaml @@ -0,0 +1,58 @@ +id: wp-whatsapp-45fa634ab986eb98d5523af1f02322fd + +info: + name: > + WP Chat App <= 3.6.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc7689ea-3e7b-4367-872d-fa036a29f842?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-whatsapp/" + google-query: inurl:"/wp-content/plugins/wp-whatsapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-whatsapp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-whatsapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-whatsapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-whatsapp-50ffb87c6ba7528dcf0d0be367e8a965.yaml b/nuclei-templates/cve-less/plugins/wp-whatsapp-50ffb87c6ba7528dcf0d0be367e8a965.yaml new file mode 100644 index 0000000000..fa9040eb09 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-whatsapp-50ffb87c6ba7528dcf0d0be367e8a965.yaml @@ -0,0 +1,58 @@ +id: wp-whatsapp-50ffb87c6ba7528dcf0d0be367e8a965 + +info: + name: > + WP Chat App <= 3.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Block Attributes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85a94f32-e1e5-48ea-822e-c54d0592da28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-whatsapp/" + google-query: inurl:"/wp-content/plugins/wp-whatsapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-whatsapp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-whatsapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-whatsapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-whatsapp-b8a0ef29774cb506ae49e9736f363d94.yaml b/nuclei-templates/cve-less/plugins/wp-whatsapp-b8a0ef29774cb506ae49e9736f363d94.yaml new file mode 100644 index 0000000000..f9c633c4f7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-whatsapp-b8a0ef29774cb506ae49e9736f363d94.yaml @@ -0,0 +1,58 @@ +id: wp-whatsapp-b8a0ef29774cb506ae49e9736f363d94 + +info: + name: > + WP Chat App <= 3.4.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73232bff-b11a-4580-8cde-5bf085ba749c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-whatsapp/" + google-query: inurl:"/wp-content/plugins/wp-whatsapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-whatsapp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-whatsapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-whatsapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-whatsapp-chat-a04496fc12c107641a2dfaedc56869ca.yaml b/nuclei-templates/cve-less/plugins/wp-whatsapp-chat-a04496fc12c107641a2dfaedc56869ca.yaml new file mode 100644 index 0000000000..46bd12a625 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-whatsapp-chat-a04496fc12c107641a2dfaedc56869ca.yaml @@ -0,0 +1,58 @@ +id: wp-whatsapp-chat-a04496fc12c107641a2dfaedc56869ca + +info: + name: > + WP Social Chat – Click To Chat App <= 6.0.4 - Administrator+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bff16371-51a9-44c9-ba6f-3680f84b880a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-whatsapp-chat/" + google-query: inurl:"/wp-content/plugins/wp-whatsapp-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-whatsapp-chat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-whatsapp-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-whatsapp-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-whois-domain-a66081067407b18cb9328a87caf935e9.yaml b/nuclei-templates/cve-less/plugins/wp-whois-domain-a66081067407b18cb9328a87caf935e9.yaml new file mode 100644 index 0000000000..1b2ccda6ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-whois-domain-a66081067407b18cb9328a87caf935e9.yaml @@ -0,0 +1,58 @@ +id: wp-whois-domain-a66081067407b18cb9328a87caf935e9 + +info: + name: > + WP Whois Domain <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d7f48a9-07f9-4add-bfa2-7ddbcf2f866f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-whois-domain/" + google-query: inurl:"/wp-content/plugins/wp-whois-domain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-whois-domain,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-whois-domain/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-whois-domain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-whydonate-b4434ce76a215860884d76b7a0613c9a.yaml b/nuclei-templates/cve-less/plugins/wp-whydonate-b4434ce76a215860884d76b7a0613c9a.yaml new file mode 100644 index 0000000000..8cd159c28e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-whydonate-b4434ce76a215860884d76b7a0613c9a.yaml @@ -0,0 +1,58 @@ +id: wp-whydonate-b4434ce76a215860884d76b7a0613c9a + +info: + name: > + Whydonate – FREE Donate button <= 3.12.14 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec1461a9-4504-4e60-9e38-a7257666e699?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-whydonate/" + google-query: inurl:"/wp-content/plugins/wp-whydonate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-whydonate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-whydonate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-whydonate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.12.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-woo-commerce-sync-for-g-sheet-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wp-woo-commerce-sync-for-g-sheet-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7e404fdc6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-woo-commerce-sync-for-g-sheet-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-woo-commerce-sync-for-g-sheet-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-woo-commerce-sync-for-g-sheet/" + google-query: inurl:"/wp-content/plugins/wp-woo-commerce-sync-for-g-sheet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-woo-commerce-sync-for-g-sheet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-woo-commerce-sync-for-g-sheet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-woo-commerce-sync-for-g-sheet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-woocommerce-quickbooks-06af3faa39139877126963434919c510.yaml b/nuclei-templates/cve-less/plugins/wp-woocommerce-quickbooks-06af3faa39139877126963434919c510.yaml new file mode 100644 index 0000000000..3cdd5c0478 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-woocommerce-quickbooks-06af3faa39139877126963434919c510.yaml @@ -0,0 +1,58 @@ +id: wp-woocommerce-quickbooks-06af3faa39139877126963434919c510 + +info: + name: > + CRM Perks - Various Plugins (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc1e9778-2860-4e3c-a2e4-28f10d585fed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-woocommerce-quickbooks/" + google-query: inurl:"/wp-content/plugins/wp-woocommerce-quickbooks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-woocommerce-quickbooks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-woocommerce-quickbooks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-woocommerce-quickbooks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-woocommerce-quickbooks-2f31a15bf76b537432656c32ac9543f6.yaml b/nuclei-templates/cve-less/plugins/wp-woocommerce-quickbooks-2f31a15bf76b537432656c32ac9543f6.yaml new file mode 100644 index 0000000000..936fc36399 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-woocommerce-quickbooks-2f31a15bf76b537432656c32ac9543f6.yaml @@ -0,0 +1,58 @@ +id: wp-woocommerce-quickbooks-2f31a15bf76b537432656c32ac9543f6 + +info: + name: > + Integration for WooCommerce and QuickBooks <= 1.2.3 - Open Redirect via setup_plugin + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8176dd33-80d2-4cc7-9edb-e1d7a1277f28?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-woocommerce-quickbooks/" + google-query: inurl:"/wp-content/plugins/wp-woocommerce-quickbooks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-woocommerce-quickbooks,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-woocommerce-quickbooks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-woocommerce-quickbooks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-word-count-12dbefa5509a29120cd218ac3cfa3bd8.yaml b/nuclei-templates/cve-less/plugins/wp-word-count-12dbefa5509a29120cd218ac3cfa3bd8.yaml new file mode 100644 index 0000000000..2e79525a1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-word-count-12dbefa5509a29120cd218ac3cfa3bd8.yaml @@ -0,0 +1,58 @@ +id: wp-word-count-12dbefa5509a29120cd218ac3cfa3bd8 + +info: + name: > + WP Word Count <= 3.2.4 - Missing Authorization via calculate_statistics + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/55dfd822-9034-4982-bfe7-eb86119e1f07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-word-count/" + google-query: inurl:"/wp-content/plugins/wp-word-count/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-word-count,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-word-count/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-word-count" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-word-count-7fe1343755ae3216e2612ce9dec35f72.yaml b/nuclei-templates/cve-less/plugins/wp-word-count-7fe1343755ae3216e2612ce9dec35f72.yaml new file mode 100644 index 0000000000..dc21d4c16e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-word-count-7fe1343755ae3216e2612ce9dec35f72.yaml @@ -0,0 +1,58 @@ +id: wp-word-count-7fe1343755ae3216e2612ce9dec35f72 + +info: + name: > + WP Word Count <= 3.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f7e632f-eada-4a3f-9e92-ba00c6aa503e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-word-count/" + google-query: inurl:"/wp-content/plugins/wp-word-count/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-word-count,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-word-count/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-word-count" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-worthy-41b9f790801ad7eb3878c73ca1b86fd1.yaml b/nuclei-templates/cve-less/plugins/wp-worthy-41b9f790801ad7eb3878c73ca1b86fd1.yaml new file mode 100644 index 0000000000..b587994205 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-worthy-41b9f790801ad7eb3878c73ca1b86fd1.yaml @@ -0,0 +1,58 @@ +id: wp-worthy-41b9f790801ad7eb3878c73ca1b86fd1 + +info: + name: > + Worthy – VG WORT Integration für WordPress <= 1.6.5-6497609 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7717cd0f-6aac-4cb0-b27e-2517d5d7ecd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-worthy/" + google-query: inurl:"/wp-content/plugins/wp-worthy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-worthy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-worthy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-worthy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5-6497609') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-yelp-review-slider-aea7c598ba9d4fa4ffd8fc15ef6dd40c.yaml b/nuclei-templates/cve-less/plugins/wp-yelp-review-slider-aea7c598ba9d4fa4ffd8fc15ef6dd40c.yaml new file mode 100644 index 0000000000..ab176df079 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-yelp-review-slider-aea7c598ba9d4fa4ffd8fc15ef6dd40c.yaml @@ -0,0 +1,58 @@ +id: wp-yelp-review-slider-aea7c598ba9d4fa4ffd8fc15ef6dd40c + +info: + name: > + WP Yelp Review Slider <= 7.0 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdacd8b2-ef34-424d-bc05-bc059f6ab3b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-yelp-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-yelp-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-yelp-review-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-yelp-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-yelp-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-youtube-live-72dd99a1f42299b6be0b974a6a37581e.yaml b/nuclei-templates/cve-less/plugins/wp-youtube-live-72dd99a1f42299b6be0b974a6a37581e.yaml new file mode 100644 index 0000000000..cef4883255 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-youtube-live-72dd99a1f42299b6be0b974a6a37581e.yaml @@ -0,0 +1,58 @@ +id: wp-youtube-live-72dd99a1f42299b6be0b974a6a37581e + +info: + name: > + WP YouTube Live <= 1.7.21 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d540b53-5c39-43d5-a055-cc5eccfa65b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-youtube-live/" + google-query: inurl:"/wp-content/plugins/wp-youtube-live/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-youtube-live,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-youtube-live/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-youtube-live" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-youtube-live-ed930301ff6966bb2b42fba1c213a244.yaml b/nuclei-templates/cve-less/plugins/wp-youtube-live-ed930301ff6966bb2b42fba1c213a244.yaml new file mode 100644 index 0000000000..83809449c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-youtube-live-ed930301ff6966bb2b42fba1c213a244.yaml @@ -0,0 +1,58 @@ +id: wp-youtube-live-ed930301ff6966bb2b42fba1c213a244 + +info: + name: > + WP YouTube Live <= 1.8.2 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5018aac-59fb-4d95-bbdd-8ceaa4f8fad1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-youtube-live/" + google-query: inurl:"/wp-content/plugins/wp-youtube-live/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-youtube-live,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-youtube-live/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-youtube-live" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-youtube-lyte-762212510e78e95a2afd8767337992cf.yaml b/nuclei-templates/cve-less/plugins/wp-youtube-lyte-762212510e78e95a2afd8767337992cf.yaml new file mode 100644 index 0000000000..b319e32083 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-youtube-lyte-762212510e78e95a2afd8767337992cf.yaml @@ -0,0 +1,58 @@ +id: wp-youtube-lyte-762212510e78e95a2afd8767337992cf + +info: + name: > + WP YouTube Lyte <= 1.7.15 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28d3fe13-20f8-48af-9476-98d2bef467e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-youtube-lyte/" + google-query: inurl:"/wp-content/plugins/wp-youtube-lyte/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-youtube-lyte,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-youtube-lyte/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-youtube-lyte" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp-zillow-review-slider-fd55f9f1199bb3c6e4b47c897716c4d9.yaml b/nuclei-templates/cve-less/plugins/wp-zillow-review-slider-fd55f9f1199bb3c6e4b47c897716c4d9.yaml new file mode 100644 index 0000000000..2eec4b89a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-zillow-review-slider-fd55f9f1199bb3c6e4b47c897716c4d9.yaml @@ -0,0 +1,58 @@ +id: wp-zillow-review-slider-fd55f9f1199bb3c6e4b47c897716c4d9 + +info: + name: > + WP Zillow Review Slider <= 2.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3d52baf-0f2b-4791-96ce-ec57502ed646?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-zillow-review-slider/" + google-query: inurl:"/wp-content/plugins/wp-zillow-review-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-zillow-review-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-zillow-review-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-zillow-review-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp125-498ee45b8c7fc3083e30dce9b4fdf901.yaml b/nuclei-templates/cve-less/plugins/wp125-498ee45b8c7fc3083e30dce9b4fdf901.yaml new file mode 100644 index 0000000000..021e9a69e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp125-498ee45b8c7fc3083e30dce9b4fdf901.yaml @@ -0,0 +1,58 @@ +id: wp125-498ee45b8c7fc3083e30dce9b4fdf901 + +info: + name: > + WP125 <= 1.5.4 - Cross-Site Request Forgery to Arbitrary Ad Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6263e0cd-5843-444d-8d12-61a898a77724?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp125/" + google-query: inurl:"/wp-content/plugins/wp125/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp125,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp125/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp125" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp125-4fb52fd64080462536a5af2ab82cbace.yaml b/nuclei-templates/cve-less/plugins/wp125-4fb52fd64080462536a5af2ab82cbace.yaml new file mode 100644 index 0000000000..bd436a1efe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp125-4fb52fd64080462536a5af2ab82cbace.yaml @@ -0,0 +1,58 @@ +id: wp125-4fb52fd64080462536a5af2ab82cbace + +info: + name: > + WP125 <= 1.4.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83d4f114-c113-4c66-be74-2d438aa00502?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp125/" + google-query: inurl:"/wp-content/plugins/wp125/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp125,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp125/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp125" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp24-domain-check-d62c21a080a1bd7668ca5e7c3c2401ec.yaml b/nuclei-templates/cve-less/plugins/wp24-domain-check-d62c21a080a1bd7668ca5e7c3c2401ec.yaml new file mode 100644 index 0000000000..799c2b5c16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp24-domain-check-d62c21a080a1bd7668ca5e7c3c2401ec.yaml @@ -0,0 +1,58 @@ +id: wp24-domain-check-d62c21a080a1bd7668ca5e7c3c2401ec + +info: + name: > + WP24 Domain Check <= 1.6.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1dcdc7f-ae52-4c76-90db-ea136656bb0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp24-domain-check/" + google-query: inurl:"/wp-content/plugins/wp24-domain-check/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp24-domain-check,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp24-domain-check/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp24-domain-check" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp2android-turn-wp-site-into-android-app-742c9543d814556f22bc231e7b11cfdd.yaml b/nuclei-templates/cve-less/plugins/wp2android-turn-wp-site-into-android-app-742c9543d814556f22bc231e7b11cfdd.yaml new file mode 100644 index 0000000000..443d5e2125 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp2android-turn-wp-site-into-android-app-742c9543d814556f22bc231e7b11cfdd.yaml @@ -0,0 +1,58 @@ +id: wp2android-turn-wp-site-into-android-app-742c9543d814556f22bc231e7b11cfdd + +info: + name: > + Wp2android <= 1.1.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63effbe3-e509-4f62-a7aa-7727e855bebf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp2android-turn-wp-site-into-android-app/" + google-query: inurl:"/wp-content/plugins/wp2android-turn-wp-site-into-android-app/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp2android-turn-wp-site-into-android-app,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp2android-turn-wp-site-into-android-app/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp2android-turn-wp-site-into-android-app" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp2leads-867cda99b5370418b92599a3b962874f.yaml b/nuclei-templates/cve-less/plugins/wp2leads-867cda99b5370418b92599a3b962874f.yaml new file mode 100644 index 0000000000..6209e05e46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp2leads-867cda99b5370418b92599a3b962874f.yaml @@ -0,0 +1,58 @@ +id: wp2leads-867cda99b5370418b92599a3b962874f + +info: + name: > + WP2LEADS <= 3.2.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7f77ca2-c69e-4f59-ad7b-a244863de424?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp2leads/" + google-query: inurl:"/wp-content/plugins/wp2leads/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp2leads,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp2leads/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp2leads" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp2syslog-648a83746134b316901bad2fa3ef15ab.yaml b/nuclei-templates/cve-less/plugins/wp2syslog-648a83746134b316901bad2fa3ef15ab.yaml new file mode 100644 index 0000000000..aa9e1028dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp2syslog-648a83746134b316901bad2fa3ef15ab.yaml @@ -0,0 +1,58 @@ +id: wp2syslog-648a83746134b316901bad2fa3ef15ab + +info: + name: > + wp2syslog <= 1.0.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a7f64e1-c815-426b-99cc-03ab62aaf9de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp2syslog/" + google-query: inurl:"/wp-content/plugins/wp2syslog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp2syslog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp2syslog/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp2syslog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_estimation_form-d691c077b0b5b8af36c29715d058c65d.yaml b/nuclei-templates/cve-less/plugins/wp_estimation_form-d691c077b0b5b8af36c29715d058c65d.yaml new file mode 100644 index 0000000000..9d3e32bd20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_estimation_form-d691c077b0b5b8af36c29715d058c65d.yaml @@ -0,0 +1,58 @@ +id: wp_estimation_form-d691c077b0b5b8af36c29715d058c65d + +info: + name: > + WP Cost Estimation <= 9.642 - Missing Authorization to Arbitrary File Upload/Delete + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae50aa5d-95e3-4650-9dbf-118b4ba3abda?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/WP_Estimation_Form/" + google-query: inurl:"/wp-content/plugins/WP_Estimation_Form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,WP_Estimation_Form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/WP_Estimation_Form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "WP_Estimation_Form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.644') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_estimation_form-fa29e08afa0977392a72c8db3f79a464.yaml b/nuclei-templates/cve-less/plugins/wp_estimation_form-fa29e08afa0977392a72c8db3f79a464.yaml new file mode 100644 index 0000000000..dc81b9713b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_estimation_form-fa29e08afa0977392a72c8db3f79a464.yaml @@ -0,0 +1,58 @@ +id: wp_estimation_form-fa29e08afa0977392a72c8db3f79a464 + +info: + name: > + WP Cost Estimation < 9.660 - Upload Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65a9e877-e870-4e36-985d-c0629abe3f78?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/WP_Estimation_Form/" + google-query: inurl:"/wp-content/plugins/WP_Estimation_Form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,WP_Estimation_Form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/WP_Estimation_Form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "WP_Estimation_Form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.660') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokbox-2942494a90a5b05bbe3fa65ad3543d68.yaml b/nuclei-templates/cve-less/plugins/wp_rokbox-2942494a90a5b05bbe3fa65ad3543d68.yaml new file mode 100644 index 0000000000..7174c9599a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokbox-2942494a90a5b05bbe3fa65ad3543d68.yaml @@ -0,0 +1,58 @@ +id: wp_rokbox-2942494a90a5b05bbe3fa65ad3543d68 + +info: + name: > + WordPress RokBox <= 2.13 - Content Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/366e5302-3edc-4bc8-8d84-9e0ee7abb25a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokbox/" + google-query: inurl:"/wp-content/plugins/wp_rokbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokbox-502a8b74aaac2ce3e991032bf3befa89.yaml b/nuclei-templates/cve-less/plugins/wp_rokbox-502a8b74aaac2ce3e991032bf3befa89.yaml new file mode 100644 index 0000000000..72b29ab36a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokbox-502a8b74aaac2ce3e991032bf3befa89.yaml @@ -0,0 +1,58 @@ +id: wp_rokbox-502a8b74aaac2ce3e991032bf3befa89 + +info: + name: > + WordPress RokBox <= 2.13 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b4e92a1-cac7-445d-a47c-52058e652c09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokbox/" + google-query: inurl:"/wp-content/plugins/wp_rokbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokbox,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokbox-574dc34d30f91def859e09b0a356d889.yaml b/nuclei-templates/cve-less/plugins/wp_rokbox-574dc34d30f91def859e09b0a356d889.yaml new file mode 100644 index 0000000000..5110a0a510 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokbox-574dc34d30f91def859e09b0a356d889.yaml @@ -0,0 +1,58 @@ +id: wp_rokbox-574dc34d30f91def859e09b0a356d889 + +info: + name: > + WordPress RokBox <= 2.13 - Abuse of Functionality + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec2181cb-dfb2-43d5-90e8-c68d0d98c98b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokbox/" + google-query: inurl:"/wp-content/plugins/wp_rokbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokbox-88e8ba621a8292f361dd4b3feafab680.yaml b/nuclei-templates/cve-less/plugins/wp_rokbox-88e8ba621a8292f361dd4b3feafab680.yaml new file mode 100644 index 0000000000..b9aad6877f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokbox-88e8ba621a8292f361dd4b3feafab680.yaml @@ -0,0 +1,58 @@ +id: wp_rokbox-88e8ba621a8292f361dd4b3feafab680 + +info: + name: > + WordPress RokBox <= 2.13 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ef036e-14a5-40df-93c3-ab1a1d9accc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokbox/" + google-query: inurl:"/wp-content/plugins/wp_rokbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokbox-9f14f890fac2e72907737fa43d9ecccc.yaml b/nuclei-templates/cve-less/plugins/wp_rokbox-9f14f890fac2e72907737fa43d9ecccc.yaml new file mode 100644 index 0000000000..aec1250cf4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokbox-9f14f890fac2e72907737fa43d9ecccc.yaml @@ -0,0 +1,58 @@ +id: wp_rokbox-9f14f890fac2e72907737fa43d9ecccc + +info: + name: > + WordPress RokBox <= 2.13 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/581792f3-7b57-418c-802b-2ff04f5b83bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokbox/" + google-query: inurl:"/wp-content/plugins/wp_rokbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokbox-cd0ec18ee2e9c7997945ee9a46aad6fd.yaml b/nuclei-templates/cve-less/plugins/wp_rokbox-cd0ec18ee2e9c7997945ee9a46aad6fd.yaml new file mode 100644 index 0000000000..2fca41189e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokbox-cd0ec18ee2e9c7997945ee9a46aad6fd.yaml @@ -0,0 +1,58 @@ +id: wp_rokbox-cd0ec18ee2e9c7997945ee9a46aad6fd + +info: + name: > + WordPress RokBox <= 2.13 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac27f20a-2048-46f3-b84f-43e2d4a345d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokbox/" + google-query: inurl:"/wp-content/plugins/wp_rokbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokbox-d6f8ecce18e666922944e07fee064cee.yaml b/nuclei-templates/cve-less/plugins/wp_rokbox-d6f8ecce18e666922944e07fee064cee.yaml new file mode 100644 index 0000000000..24c3c8af2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokbox-d6f8ecce18e666922944e07fee064cee.yaml @@ -0,0 +1,58 @@ +id: wp_rokbox-d6f8ecce18e666922944e07fee064cee + +info: + name: > + WordPress RokBox <= 2.13 - Sensitive Data Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a63f0b4b-ad8f-4daf-9450-133bf08c2de1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokbox/" + google-query: inurl:"/wp-content/plugins/wp_rokbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokbox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokintroscroller-597c6e67a31af6c6a7a2d601240421fb.yaml b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-597c6e67a31af6c6a7a2d601240421fb.yaml new file mode 100644 index 0000000000..a5ee109172 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-597c6e67a31af6c6a7a2d601240421fb.yaml @@ -0,0 +1,58 @@ +id: wp_rokintroscroller-597c6e67a31af6c6a7a2d601240421fb + +info: + name: > + RokIntroScroller <= 1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13fb725f-cb16-49e3-b545-14266538c604?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokintroscroller/" + google-query: inurl:"/wp-content/plugins/wp_rokintroscroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokintroscroller,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokintroscroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokintroscroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokintroscroller-7567bf84b12ab943cd6e85c03bb96456.yaml b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-7567bf84b12ab943cd6e85c03bb96456.yaml new file mode 100644 index 0000000000..406ba7278f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-7567bf84b12ab943cd6e85c03bb96456.yaml @@ -0,0 +1,58 @@ +id: wp_rokintroscroller-7567bf84b12ab943cd6e85c03bb96456 + +info: + name: > + RokIntroScroller <= 1.8 - Abuse of Functionality + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3a402f4-3b4d-4397-807b-c5f1c33d52aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokintroscroller/" + google-query: inurl:"/wp-content/plugins/wp_rokintroscroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokintroscroller,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokintroscroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokintroscroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokintroscroller-aac4e5cdebf3c4a9846a05088dd727df.yaml b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-aac4e5cdebf3c4a9846a05088dd727df.yaml new file mode 100644 index 0000000000..07b376b452 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-aac4e5cdebf3c4a9846a05088dd727df.yaml @@ -0,0 +1,58 @@ +id: wp_rokintroscroller-aac4e5cdebf3c4a9846a05088dd727df + +info: + name: > + RokIntroScroller <= 1.8 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5900d571-dc97-4c81-8ff3-7d7350b4c89f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokintroscroller/" + google-query: inurl:"/wp-content/plugins/wp_rokintroscroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokintroscroller,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokintroscroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokintroscroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokintroscroller-c02ce6b402a9605654d5b549b0907636.yaml b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-c02ce6b402a9605654d5b549b0907636.yaml new file mode 100644 index 0000000000..788a6e4b2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-c02ce6b402a9605654d5b549b0907636.yaml @@ -0,0 +1,58 @@ +id: wp_rokintroscroller-c02ce6b402a9605654d5b549b0907636 + +info: + name: > + RokIntroScroller <= 1.8 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99fa7f41-f3ac-435c-af1b-4a965291de37?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokintroscroller/" + google-query: inurl:"/wp-content/plugins/wp_rokintroscroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokintroscroller,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokintroscroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokintroscroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokintroscroller-c818bb92a63c04284d6553cc7b039f4e.yaml b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-c818bb92a63c04284d6553cc7b039f4e.yaml new file mode 100644 index 0000000000..2f2d66c9e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokintroscroller-c818bb92a63c04284d6553cc7b039f4e.yaml @@ -0,0 +1,58 @@ +id: wp_rokintroscroller-c818bb92a63c04284d6553cc7b039f4e + +info: + name: > + RokIntroScroller <= 1.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/205a3e43-8ac6-4a0d-86d3-bb433a992e3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokintroscroller/" + google-query: inurl:"/wp-content/plugins/wp_rokintroscroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokintroscroller,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokintroscroller/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokintroscroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokmicronews-7c6d29a3909e213adc94d309653788e0.yaml b/nuclei-templates/cve-less/plugins/wp_rokmicronews-7c6d29a3909e213adc94d309653788e0.yaml new file mode 100644 index 0000000000..4d3d04db3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokmicronews-7c6d29a3909e213adc94d309653788e0.yaml @@ -0,0 +1,58 @@ +id: wp_rokmicronews-7c6d29a3909e213adc94d309653788e0 + +info: + name: > + RokMicroNews <= 1.5 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60f63cdc-9c19-4f6c-a555-519bdb61ce6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokmicronews/" + google-query: inurl:"/wp-content/plugins/wp_rokmicronews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokmicronews,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokmicronews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokmicronews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_roknewspager-3e0f0262584f8c40d73a496ea910a6ad.yaml b/nuclei-templates/cve-less/plugins/wp_roknewspager-3e0f0262584f8c40d73a496ea910a6ad.yaml new file mode 100644 index 0000000000..36901c934a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_roknewspager-3e0f0262584f8c40d73a496ea910a6ad.yaml @@ -0,0 +1,58 @@ +id: wp_roknewspager-3e0f0262584f8c40d73a496ea910a6ad + +info: + name: > + RokNewsPager <= 1.17 - Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffd1cd48-96dc-4b35-8310-a5eb0a82dc19?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_roknewspager/" + google-query: inurl:"/wp-content/plugins/wp_roknewspager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_roknewspager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_roknewspager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_roknewspager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_roknewspager-3e96a83f9d494e9bb04654bc2cf2b35d.yaml b/nuclei-templates/cve-less/plugins/wp_roknewspager-3e96a83f9d494e9bb04654bc2cf2b35d.yaml new file mode 100644 index 0000000000..b10d19de45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_roknewspager-3e96a83f9d494e9bb04654bc2cf2b35d.yaml @@ -0,0 +1,58 @@ +id: wp_roknewspager-3e96a83f9d494e9bb04654bc2cf2b35d + +info: + name: > + RokNewsPager <= 1.17 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57a81776-643d-4057-9d81-b79ad396cced?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_roknewspager/" + google-query: inurl:"/wp-content/plugins/wp_roknewspager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_roknewspager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_roknewspager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_roknewspager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_roknewspager-72ebb65d1fa3b6166c7e5d318376e5b9.yaml b/nuclei-templates/cve-less/plugins/wp_roknewspager-72ebb65d1fa3b6166c7e5d318376e5b9.yaml new file mode 100644 index 0000000000..557625fec7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_roknewspager-72ebb65d1fa3b6166c7e5d318376e5b9.yaml @@ -0,0 +1,58 @@ +id: wp_roknewspager-72ebb65d1fa3b6166c7e5d318376e5b9 + +info: + name: > + RokNewsPager <= 1.17 - Missing Domain Restriction + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e766de1-10fd-43de-b487-56895a4b8db0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_roknewspager/" + google-query: inurl:"/wp-content/plugins/wp_roknewspager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_roknewspager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_roknewspager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_roknewspager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_roknewspager-bf849da6762c8d33269fd51d7387923f.yaml b/nuclei-templates/cve-less/plugins/wp_roknewspager-bf849da6762c8d33269fd51d7387923f.yaml new file mode 100644 index 0000000000..c1303f2f15 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_roknewspager-bf849da6762c8d33269fd51d7387923f.yaml @@ -0,0 +1,58 @@ +id: wp_roknewspager-bf849da6762c8d33269fd51d7387923f + +info: + name: > + RokNewsPager <= 1.17 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/386eea84-0b86-46c8-99a2-c73696ae09be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_roknewspager/" + google-query: inurl:"/wp-content/plugins/wp_roknewspager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_roknewspager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_roknewspager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_roknewspager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_roknewspager-fa459b52ecf85365dc55ab67da949392.yaml b/nuclei-templates/cve-less/plugins/wp_roknewspager-fa459b52ecf85365dc55ab67da949392.yaml new file mode 100644 index 0000000000..28d76a4a0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_roknewspager-fa459b52ecf85365dc55ab67da949392.yaml @@ -0,0 +1,58 @@ +id: wp_roknewspager-fa459b52ecf85365dc55ab67da949392 + +info: + name: > + RokNewsPager <= 1.17 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92ae6f51-a6cb-46ce-b45b-ca4f12f5a67f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_roknewspager/" + google-query: inurl:"/wp-content/plugins/wp_roknewspager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_roknewspager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_roknewspager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_roknewspager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokstories-0f9befacf85fe32f94dfe927ef9fdeab.yaml b/nuclei-templates/cve-less/plugins/wp_rokstories-0f9befacf85fe32f94dfe927ef9fdeab.yaml new file mode 100644 index 0000000000..e2802c92ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokstories-0f9befacf85fe32f94dfe927ef9fdeab.yaml @@ -0,0 +1,58 @@ +id: wp_rokstories-0f9befacf85fe32f94dfe927ef9fdeab + +info: + name: > + RokStories <= 1.25 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2240b2d3-b4cc-445f-b207-0ccbd527a0f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokstories/" + google-query: inurl:"/wp-content/plugins/wp_rokstories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokstories,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokstories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokstories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokstories-1ef0cef9578e2e2ff5a620bc5688bfde.yaml b/nuclei-templates/cve-less/plugins/wp_rokstories-1ef0cef9578e2e2ff5a620bc5688bfde.yaml new file mode 100644 index 0000000000..2068142bf7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokstories-1ef0cef9578e2e2ff5a620bc5688bfde.yaml @@ -0,0 +1,58 @@ +id: wp_rokstories-1ef0cef9578e2e2ff5a620bc5688bfde + +info: + name: > + RokStories <= 1.25 - Denial of Service + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1612b10d-1ee7-4ea1-93f3-bde2f1667e1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokstories/" + google-query: inurl:"/wp-content/plugins/wp_rokstories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokstories,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokstories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokstories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokstories-3a9858a70aad10ad34f34258734286d8.yaml b/nuclei-templates/cve-less/plugins/wp_rokstories-3a9858a70aad10ad34f34258734286d8.yaml new file mode 100644 index 0000000000..453a4d588a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokstories-3a9858a70aad10ad34f34258734286d8.yaml @@ -0,0 +1,58 @@ +id: wp_rokstories-3a9858a70aad10ad34f34258734286d8 + +info: + name: > + RokStories <= 1.25 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d73ca391-97a3-4701-8429-e73f5914e65e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokstories/" + google-query: inurl:"/wp-content/plugins/wp_rokstories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokstories,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokstories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokstories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokstories-bd3c8934fd0962d780c7ee3f1bf2f569.yaml b/nuclei-templates/cve-less/plugins/wp_rokstories-bd3c8934fd0962d780c7ee3f1bf2f569.yaml new file mode 100644 index 0000000000..222e70a7c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokstories-bd3c8934fd0962d780c7ee3f1bf2f569.yaml @@ -0,0 +1,58 @@ +id: wp_rokstories-bd3c8934fd0962d780c7ee3f1bf2f569 + +info: + name: > + RokStories <= 1.25 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4517bd04-20ce-4686-a933-d34464a5b691?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokstories/" + google-query: inurl:"/wp-content/plugins/wp_rokstories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokstories,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokstories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokstories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wp_rokstories-eefb6b80498f7d564bf268d183ca0c4c.yaml b/nuclei-templates/cve-less/plugins/wp_rokstories-eefb6b80498f7d564bf268d183ca0c4c.yaml new file mode 100644 index 0000000000..78867336b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp_rokstories-eefb6b80498f7d564bf268d183ca0c4c.yaml @@ -0,0 +1,58 @@ +id: wp_rokstories-eefb6b80498f7d564bf268d183ca0c4c + +info: + name: > + RokStories <= 1.25 - Abuse of Functionality + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b8b5363-2450-42b5-8295-78ced3682b14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp_rokstories/" + google-query: inurl:"/wp-content/plugins/wp_rokstories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp_rokstories,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp_rokstories/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp_rokstories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpagecontact-7d9cfe7c7d057a8bbf5fcb3c72a54c2b.yaml b/nuclei-templates/cve-less/plugins/wpagecontact-7d9cfe7c7d057a8bbf5fcb3c72a54c2b.yaml new file mode 100644 index 0000000000..ca61f0bebc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpagecontact-7d9cfe7c7d057a8bbf5fcb3c72a54c2b.yaml @@ -0,0 +1,58 @@ +id: wpagecontact-7d9cfe7c7d057a8bbf5fcb3c72a54c2b + +info: + name: > + WordPress Page Contact <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5361df27-493c-4731-9502-071af4894bbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpagecontact/" + google-query: inurl:"/wp-content/plugins/wpagecontact/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpagecontact,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpagecontact/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpagecontact" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpappninja-5e80d211739bf78fc6d29ff73646a991.yaml b/nuclei-templates/cve-less/plugins/wpappninja-5e80d211739bf78fc6d29ff73646a991.yaml new file mode 100644 index 0000000000..332a884bb8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpappninja-5e80d211739bf78fc6d29ff73646a991.yaml @@ -0,0 +1,58 @@ +id: wpappninja-5e80d211739bf78fc6d29ff73646a991 + +info: + name: > + WPMobile.App — Android and iOS Mobile Application <= 11.13 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/091c6cb3-dc5a-4fb8-a1a5-770b2361401f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpappninja/" + google-query: inurl:"/wp-content/plugins/wpappninja/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpappninja,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpappninja/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpappninja" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpappninja-6481182e7ac4b130cac34d43758d1847.yaml b/nuclei-templates/cve-less/plugins/wpappninja-6481182e7ac4b130cac34d43758d1847.yaml new file mode 100644 index 0000000000..fb66f99354 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpappninja-6481182e7ac4b130cac34d43758d1847.yaml @@ -0,0 +1,58 @@ +id: wpappninja-6481182e7ac4b130cac34d43758d1847 + +info: + name: > + WPMobile.App — Android and iOS Mobile Application <= 11.18 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/355decb2-2667-4056-836c-9ac8897f340e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpappninja/" + google-query: inurl:"/wp-content/plugins/wpappninja/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpappninja,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpappninja/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpappninja" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpappninja-f7b23b7f219bdfa01165ca96135e1423.yaml b/nuclei-templates/cve-less/plugins/wpappninja-f7b23b7f219bdfa01165ca96135e1423.yaml new file mode 100644 index 0000000000..bd227d049c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpappninja-f7b23b7f219bdfa01165ca96135e1423.yaml @@ -0,0 +1,58 @@ +id: wpappninja-f7b23b7f219bdfa01165ca96135e1423 + +info: + name: > + WPMobile.App <= 11.20 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02b5aefe-ba27-4273-927c-7779df83eb18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpappninja/" + google-query: inurl:"/wp-content/plugins/wpappninja/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpappninja,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpappninja/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpappninja" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpaudio-mp3-player-75529ea91935af94487230f89ef485d5.yaml b/nuclei-templates/cve-less/plugins/wpaudio-mp3-player-75529ea91935af94487230f89ef485d5.yaml new file mode 100644 index 0000000000..08378eb791 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpaudio-mp3-player-75529ea91935af94487230f89ef485d5.yaml @@ -0,0 +1,58 @@ +id: wpaudio-mp3-player-75529ea91935af94487230f89ef485d5 + +info: + name: > + WPaudio MP3 Player <= 4.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d19eeb42-2438-4126-8c60-14839baceff0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpaudio-mp3-player/" + google-query: inurl:"/wp-content/plugins/wpaudio-mp3-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpaudio-mp3-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpaudio-mp3-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpaudio-mp3-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpb-advanced-faq-ea35e08ef79a30cf67846c992e562b69.yaml b/nuclei-templates/cve-less/plugins/wpb-advanced-faq-ea35e08ef79a30cf67846c992e562b69.yaml new file mode 100644 index 0000000000..5863f7e4d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpb-advanced-faq-ea35e08ef79a30cf67846c992e562b69.yaml @@ -0,0 +1,58 @@ +id: wpb-advanced-faq-ea35e08ef79a30cf67846c992e562b69 + +info: + name: > + WPB Advanced FAQ <= 1.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2b173e8-5bdd-4048-8201-2d66ce2f2eca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpb-advanced-faq/" + google-query: inurl:"/wp-content/plugins/wpb-advanced-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpb-advanced-faq,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpb-advanced-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpb-advanced-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpb-show-core-27aee4f01d78d059f9dfc206e065e8b8.yaml b/nuclei-templates/cve-less/plugins/wpb-show-core-27aee4f01d78d059f9dfc206e065e8b8.yaml new file mode 100644 index 0000000000..c1ebac6c21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpb-show-core-27aee4f01d78d059f9dfc206e065e8b8.yaml @@ -0,0 +1,58 @@ +id: wpb-show-core-27aee4f01d78d059f9dfc206e065e8b8 + +info: + name: > + WPB Show Core <= 2.2 - Unauthenticated Local File Inlclusion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/845fbf0f-c7c4-483e-b671-1a703d857792?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpb-show-core/" + google-query: inurl:"/wp-content/plugins/wpb-show-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpb-show-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpb-show-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpb-show-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpb-show-core-72aca1ce30687d819e7bbef9469c5435.yaml b/nuclei-templates/cve-less/plugins/wpb-show-core-72aca1ce30687d819e7bbef9469c5435.yaml new file mode 100644 index 0000000000..9795752434 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpb-show-core-72aca1ce30687d819e7bbef9469c5435.yaml @@ -0,0 +1,58 @@ +id: wpb-show-core-72aca1ce30687d819e7bbef9469c5435 + +info: + name: > + WPB Show Core <= 2.2 - Unauthenticated Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dec2e656-8936-43e2-b156-e96718fd7ef4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpb-show-core/" + google-query: inurl:"/wp-content/plugins/wpb-show-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpb-show-core,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpb-show-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpb-show-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpb-show-core-7f6904f57576a4004d7574ed67ed80fe.yaml b/nuclei-templates/cve-less/plugins/wpb-show-core-7f6904f57576a4004d7574ed67ed80fe.yaml new file mode 100644 index 0000000000..86b5b482f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpb-show-core-7f6904f57576a4004d7574ed67ed80fe.yaml @@ -0,0 +1,58 @@ +id: wpb-show-core-7f6904f57576a4004d7574ed67ed80fe + +info: + name: > + WPB Show Core <= 2.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31f72c5b-a99b-48a1-959b-9718b33139b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpb-show-core/" + google-query: inurl:"/wp-content/plugins/wpb-show-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpb-show-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpb-show-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpb-show-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpb-show-core-a601da5135d3caac4f0c675dffcf2dc4.yaml b/nuclei-templates/cve-less/plugins/wpb-show-core-a601da5135d3caac4f0c675dffcf2dc4.yaml new file mode 100644 index 0000000000..2ed3a56a76 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpb-show-core-a601da5135d3caac4f0c675dffcf2dc4.yaml @@ -0,0 +1,58 @@ +id: wpb-show-core-a601da5135d3caac4f0c675dffcf2dc4 + +info: + name: > + WPB Show Core <= 2.6 - Reflected Cross-Site Scripting via 'file' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3438426a-c07d-4aeb-8272-2e13b70419a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpb-show-core/" + google-query: inurl:"/wp-content/plugins/wpb-show-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpb-show-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpb-show-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpb-show-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpb-show-core-e005bf53dd0cb1727a65fdd723c2b325.yaml b/nuclei-templates/cve-less/plugins/wpb-show-core-e005bf53dd0cb1727a65fdd723c2b325.yaml new file mode 100644 index 0000000000..a6923d84ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpb-show-core-e005bf53dd0cb1727a65fdd723c2b325.yaml @@ -0,0 +1,58 @@ +id: wpb-show-core-e005bf53dd0cb1727a65fdd723c2b325 + +info: + name: > + WPB Show Core <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e054485-71cc-47c2-9bd6-4f060dc76738?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpb-show-core/" + google-query: inurl:"/wp-content/plugins/wpb-show-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpb-show-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpb-show-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpb-show-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpb-show-core-f27c27a0d0d7414568ced2d665d44341.yaml b/nuclei-templates/cve-less/plugins/wpb-show-core-f27c27a0d0d7414568ced2d665d44341.yaml new file mode 100644 index 0000000000..00b6760c8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpb-show-core-f27c27a0d0d7414568ced2d665d44341.yaml @@ -0,0 +1,58 @@ +id: wpb-show-core-f27c27a0d0d7414568ced2d665d44341 + +info: + name: > + WPB Show Core <= 2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4460f0a-9417-48bf-b6b3-27a80632dd71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpb-show-core/" + google-query: inurl:"/wp-content/plugins/wpb-show-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpb-show-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpb-show-core/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpb-show-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpbenchmark-5950b11bfaba8d27fdadd77f829d5bd8.yaml b/nuclei-templates/cve-less/plugins/wpbenchmark-5950b11bfaba8d27fdadd77f829d5bd8.yaml new file mode 100644 index 0000000000..906d01a018 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpbenchmark-5950b11bfaba8d27fdadd77f829d5bd8.yaml @@ -0,0 +1,58 @@ +id: wpbenchmark-5950b11bfaba8d27fdadd77f829d5bd8 + +info: + name: > + WordPress Hosting Benchmark tool <= 1.3.6 - Cross-Site Request Forgery via execute_plugin() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f26a6ace-4623-4931-a4e4-8176d799d274?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpbenchmark/" + google-query: inurl:"/wp-content/plugins/wpbenchmark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpbenchmark,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpbenchmark/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpbenchmark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpbits-addons-for-elementor-23e0e7010272bc0edbef97452d9c2437.yaml b/nuclei-templates/cve-less/plugins/wpbits-addons-for-elementor-23e0e7010272bc0edbef97452d9c2437.yaml new file mode 100644 index 0000000000..e3937a697f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpbits-addons-for-elementor-23e0e7010272bc0edbef97452d9c2437.yaml @@ -0,0 +1,58 @@ +id: wpbits-addons-for-elementor-23e0e7010272bc0edbef97452d9c2437 + +info: + name: > + WPBITS Addons For Elementor Page Builder <= 1.3.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05cd8f96-533a-4036-a01f-6ba1ad2d2b5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpbits-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/wpbits-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpbits-addons-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpbits-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpbits-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpbits-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wpbits-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..7effbc5d8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpbits-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wpbits-addons-for-elementor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpbits-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/wpbits-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpbits-addons-for-elementor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpbits-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpbits-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpbook-596940e1ffaab74a13bdb327bf203eca.yaml b/nuclei-templates/cve-less/plugins/wpbook-596940e1ffaab74a13bdb327bf203eca.yaml new file mode 100644 index 0000000000..42f35ee34d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpbook-596940e1ffaab74a13bdb327bf203eca.yaml @@ -0,0 +1,58 @@ +id: wpbook-596940e1ffaab74a13bdb327bf203eca + +info: + name: > + WPBook <= 2.7 - Unauthenticated Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aaeb0df-75e8-44ac-8964-03e3389d202c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpbook/" + google-query: inurl:"/wp-content/plugins/wpbook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpbook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpbook/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpbook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpbrutalai-131875d333b38df6cd9a906f0f1d6d15.yaml b/nuclei-templates/cve-less/plugins/wpbrutalai-131875d333b38df6cd9a906f0f1d6d15.yaml new file mode 100644 index 0000000000..f377bc9d88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpbrutalai-131875d333b38df6cd9a906f0f1d6d15.yaml @@ -0,0 +1,58 @@ +id: wpbrutalai-131875d333b38df6cd9a906f0f1d6d15 + +info: + name: > + WP Brutal AI < 2.06 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/227cf3fe-4e76-4827-ac92-788bca450b52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpbrutalai/" + google-query: inurl:"/wp-content/plugins/wpbrutalai/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpbrutalai,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpbrutalai/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpbrutalai" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.06') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpbrutalai-24f75a43b0feb32392540a8e35cfe74d.yaml b/nuclei-templates/cve-less/plugins/wpbrutalai-24f75a43b0feb32392540a8e35cfe74d.yaml new file mode 100644 index 0000000000..a16e66772f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpbrutalai-24f75a43b0feb32392540a8e35cfe74d.yaml @@ -0,0 +1,58 @@ +id: wpbrutalai-24f75a43b0feb32392540a8e35cfe74d + +info: + name: > + WP Brutal AI < 2.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2aabec9-1968-4c0e-baed-9aa78eb236e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpbrutalai/" + google-query: inurl:"/wp-content/plugins/wpbrutalai/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpbrutalai,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpbrutalai/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpbrutalai" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpbrutalai-55c5d66fcb1a0e14740f101ab90eeba9.yaml b/nuclei-templates/cve-less/plugins/wpbrutalai-55c5d66fcb1a0e14740f101ab90eeba9.yaml new file mode 100644 index 0000000000..f2c9022d2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpbrutalai-55c5d66fcb1a0e14740f101ab90eeba9.yaml @@ -0,0 +1,58 @@ +id: wpbrutalai-55c5d66fcb1a0e14740f101ab90eeba9 + +info: + name: > + WP Brutal AI < 2.0.0 - Cross-Site Request Forgery to SQL Injection + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4eb5833-25cd-4a6c-9240-37a9f8c1b120?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpbrutalai/" + google-query: inurl:"/wp-content/plugins/wpbrutalai/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpbrutalai,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpbrutalai/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpbrutalai" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpbulky-wp-bulk-edit-post-types-e83a61f4951a190bf506663021152379.yaml b/nuclei-templates/cve-less/plugins/wpbulky-wp-bulk-edit-post-types-e83a61f4951a190bf506663021152379.yaml new file mode 100644 index 0000000000..1dd7b820b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpbulky-wp-bulk-edit-post-types-e83a61f4951a190bf506663021152379.yaml @@ -0,0 +1,58 @@ +id: wpbulky-wp-bulk-edit-post-types-e83a61f4951a190bf506663021152379 + +info: + name: > + WPBulky <= 1.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d908e8ac-6864-4951-bbef-8d98ac641912?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpbulky-wp-bulk-edit-post-types/" + google-query: inurl:"/wp-content/plugins/wpbulky-wp-bulk-edit-post-types/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpbulky-wp-bulk-edit-post-types,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpbulky-wp-bulk-edit-post-types/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpbulky-wp-bulk-edit-post-types" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpc-badge-management-0c0c3155e7f5976c6ad290b0d35fa570.yaml b/nuclei-templates/cve-less/plugins/wpc-badge-management-0c0c3155e7f5976c6ad290b0d35fa570.yaml new file mode 100644 index 0000000000..1be5d53165 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpc-badge-management-0c0c3155e7f5976c6ad290b0d35fa570.yaml @@ -0,0 +1,58 @@ +id: wpc-badge-management-0c0c3155e7f5976c6ad290b0d35fa570 + +info: + name: > + WPC Badge Management for WooCommerce <= 2.4.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1db1c415-7c57-47bb-82d9-44168259ae1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpc-badge-management/" + google-query: inurl:"/wp-content/plugins/wpc-badge-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpc-badge-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpc-badge-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpc-badge-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpc-composite-products-7d701d3a30fca3143559ca73fdb370ec.yaml b/nuclei-templates/cve-less/plugins/wpc-composite-products-7d701d3a30fca3143559ca73fdb370ec.yaml new file mode 100644 index 0000000000..70f5eca50e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpc-composite-products-7d701d3a30fca3143559ca73fdb370ec.yaml @@ -0,0 +1,58 @@ +id: wpc-composite-products-7d701d3a30fca3143559ca73fdb370ec + +info: + name: > + WPC Composite Products for WooCommerce <= 7.2.7 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3bea017-9fc3-4e14-97c4-5bb525650cde?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpc-composite-products/" + google-query: inurl:"/wp-content/plugins/wpc-composite-products/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpc-composite-products,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpc-composite-products/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpc-composite-products" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpc-grouped-product-5207af68b5cb6f829d0bffea5881c5d4.yaml b/nuclei-templates/cve-less/plugins/wpc-grouped-product-5207af68b5cb6f829d0bffea5881c5d4.yaml new file mode 100644 index 0000000000..0244687107 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpc-grouped-product-5207af68b5cb6f829d0bffea5881c5d4.yaml @@ -0,0 +1,58 @@ +id: wpc-grouped-product-5207af68b5cb6f829d0bffea5881c5d4 + +info: + name: > + WPC Grouped Product for WooCommerce <= 4.4.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc1abdd7-d563-44af-86d3-58005706d624?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpc-grouped-product/" + google-query: inurl:"/wp-content/plugins/wpc-grouped-product/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpc-grouped-product,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpc-grouped-product/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpc-grouped-product" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcal-8e0c44401a0d94704f78e1b86fc33007.yaml b/nuclei-templates/cve-less/plugins/wpcal-8e0c44401a0d94704f78e1b86fc33007.yaml new file mode 100644 index 0000000000..484580c5c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcal-8e0c44401a0d94704f78e1b86fc33007.yaml @@ -0,0 +1,58 @@ +id: wpcal-8e0c44401a0d94704f78e1b86fc33007 + +info: + name: > + WPCal.io – Easy Meeting Scheduler <= 0.9.5.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/020df8cb-a9ce-4f04-b88f-ceb988beeb75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcal/" + google-query: inurl:"/wp-content/plugins/wpcal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcal/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcalc-8c686690daafe251c11d3b5105b46fb5.yaml b/nuclei-templates/cve-less/plugins/wpcalc-8c686690daafe251c11d3b5105b46fb5.yaml new file mode 100644 index 0000000000..c2e543932f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcalc-8c686690daafe251c11d3b5105b46fb5.yaml @@ -0,0 +1,58 @@ +id: wpcalc-8c686690daafe251c11d3b5105b46fb5 + +info: + name: > + WPcalc – Create any online calculators <= 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5aef1bc6-b155-4a70-9d08-75951e0725ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcalc/" + google-query: inurl:"/wp-content/plugins/wpcalc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcalc,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcalc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcalc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcargo-1a30a24dd5f7f3d1429055cabcbadceb.yaml b/nuclei-templates/cve-less/plugins/wpcargo-1a30a24dd5f7f3d1429055cabcbadceb.yaml new file mode 100644 index 0000000000..a4426c67f4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcargo-1a30a24dd5f7f3d1429055cabcbadceb.yaml @@ -0,0 +1,58 @@ +id: wpcargo-1a30a24dd5f7f3d1429055cabcbadceb + +info: + name: > + WPCargo Track & Trace <= 6.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cc7ec8b-4480-4422-8831-97f20a5d8d67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcargo/" + google-query: inurl:"/wp-content/plugins/wpcargo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcargo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcargo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcargo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcargo-db32a0bf7f699c5e4cc79b9b16676c96.yaml b/nuclei-templates/cve-less/plugins/wpcargo-db32a0bf7f699c5e4cc79b9b16676c96.yaml new file mode 100644 index 0000000000..786d0f902a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcargo-db32a0bf7f699c5e4cc79b9b16676c96.yaml @@ -0,0 +1,58 @@ +id: wpcargo-db32a0bf7f699c5e4cc79b9b16676c96 + +info: + name: > + WPCargo <= 6.8.9 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14a1b8af-bd32-4245-92d6-549cae68c626?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcargo/" + google-query: inurl:"/wp-content/plugins/wpcargo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcargo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcargo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcargo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcargo-f0b2493ebe50f27c282dd108348c8532.yaml b/nuclei-templates/cve-less/plugins/wpcargo-f0b2493ebe50f27c282dd108348c8532.yaml new file mode 100644 index 0000000000..e854d7929c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcargo-f0b2493ebe50f27c282dd108348c8532.yaml @@ -0,0 +1,58 @@ +id: wpcargo-f0b2493ebe50f27c282dd108348c8532 + +info: + name: > + WPCargo Track & Trace <= 6.9.4 - Admin+ Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/510b1390-b8e6-41b5-8691-3043fa3fb47d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcargo/" + google-query: inurl:"/wp-content/plugins/wpcargo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcargo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcargo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcargo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.9.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcb-4295379b4ef5affb647e77f938ae4ec4.yaml b/nuclei-templates/cve-less/plugins/wpcb-4295379b4ef5affb647e77f938ae4ec4.yaml new file mode 100644 index 0000000000..9b605160e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcb-4295379b4ef5affb647e77f938ae4ec4.yaml @@ -0,0 +1,58 @@ +id: wpcb-4295379b4ef5affb647e77f938ae4ec4 + +info: + name: > + WPCB <= 2.4.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7cfbaa87-1af7-4f5d-820b-1f2194765121?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcb/" + google-query: inurl:"/wp-content/plugins/wpcb/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcb,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcb/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcb" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-0446faf7e8a09fe554612052c4885eba.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-0446faf7e8a09fe554612052c4885eba.yaml new file mode 100644 index 0000000000..702bb41083 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-0446faf7e8a09fe554612052c4885eba.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-0446faf7e8a09fe554612052c4885eba + +info: + name: > + Redirection for Contact Form 7 <= 2.3.3 - Authenticated PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/774afb96-4385-4693-a446-c87f81b39feb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-1b89c40965836bd2b2d15087fcdb7314.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-1b89c40965836bd2b2d15087fcdb7314.yaml new file mode 100644 index 0000000000..87af6ec136 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-1b89c40965836bd2b2d15087fcdb7314.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-1b89c40965836bd2b2d15087fcdb7314 + +info: + name: > + Redirection for Contact Form 7 <= 2.3.3 - Unauthenticated Arbitrary Nonce Generation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/773ed184-1478-417d-9a57-93f3971d4bc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-31ee70bfe05643b60268fd1099915dd0.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-31ee70bfe05643b60268fd1099915dd0.yaml new file mode 100644 index 0000000000..f000483d0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-31ee70bfe05643b60268fd1099915dd0.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-31ee70bfe05643b60268fd1099915dd0 + +info: + name: > + Redirection for Contact Form 7 <= 2.3.3 - Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e9823e6-bcd4-4c1e-bf86-caf472748b12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-42471f956508e099a58e2e33212c947e.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-42471f956508e099a58e2e33212c947e.yaml new file mode 100644 index 0000000000..3b9e5e4a80 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-42471f956508e099a58e2e33212c947e.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-42471f956508e099a58e2e33212c947e + +info: + name: > + Redirection for Contact Form 7 <= 2.7.0 - Authenticated(Editor+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/527c344e-870e-4bd9-b111-86cc2821367d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-7cb2e46e237585083f0f410d32da724a.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-7cb2e46e237585083f0f410d32da724a.yaml new file mode 100644 index 0000000000..7cc5f9ef1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-7cb2e46e237585083f0f410d32da724a.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-7cb2e46e237585083f0f410d32da724a + +info: + name: > + Redirection for Contact Form 7 <= 2.3.3 - Authenticated Arbitrary Post Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab8f8370-50bd-48c8-89e1-8b19b51f78b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-8eae6b3d481165727afe77f464d11a2d.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-8eae6b3d481165727afe77f464d11a2d.yaml new file mode 100644 index 0000000000..c85e543f52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-8eae6b3d481165727afe77f464d11a2d.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-8eae6b3d481165727afe77f464d11a2d + +info: + name: > + Redirection for Contact Form 7 <= 2.4.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/752b9c5f-4c36-4182-9dd4-0e840a727ceb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-981460190387e68d2f348e5da885ce72.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-981460190387e68d2f348e5da885ce72.yaml new file mode 100644 index 0000000000..be51f67361 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-981460190387e68d2f348e5da885ce72.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-981460190387e68d2f348e5da885ce72 + +info: + name: > + Redirection for Contact Form 7 <= 2.3.3 - Authenticated Arbitrary Plugin Installation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ee6ffb3-9a4a-4564-bfef-116a12268c3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a6ac234cd3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-c6f31211c94f2b3281ba219f5092b473.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-c6f31211c94f2b3281ba219f5092b473.yaml new file mode 100644 index 0000000000..1acc4bd60c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-c6f31211c94f2b3281ba219f5092b473.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-c6f31211c94f2b3281ba219f5092b473 + +info: + name: > + Redirection for Contact Form 7 <= 2.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ec1ce79-bc10-4b04-8e49-15e16e6730a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcf7-redirect-fc89ed1d43552a7a477f16e3ec9d6e29.yaml b/nuclei-templates/cve-less/plugins/wpcf7-redirect-fc89ed1d43552a7a477f16e3ec9d6e29.yaml new file mode 100644 index 0000000000..c85b7f65d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcf7-redirect-fc89ed1d43552a7a477f16e3ec9d6e29.yaml @@ -0,0 +1,58 @@ +id: wpcf7-redirect-fc89ed1d43552a7a477f16e3ec9d6e29 + +info: + name: > + Redirection for Contact Form 7 <= 2.9.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cf17c08-25b7-450d-acd9-963a1f79e495?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcf7-redirect/" + google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcf7-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcf7-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcf7-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcodefactory-helper-e0c846e88f45df5b86f82a30f1ef58f4.yaml b/nuclei-templates/cve-less/plugins/wpcodefactory-helper-e0c846e88f45df5b86f82a30f1ef58f4.yaml new file mode 100644 index 0000000000..7b66d9a7d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcodefactory-helper-e0c846e88f45df5b86f82a30f1ef58f4.yaml @@ -0,0 +1,58 @@ +id: wpcodefactory-helper-e0c846e88f45df5b86f82a30f1ef58f4 + +info: + name: > + WPFactory Helper <= 1.5.2 - Reflected Cross-Site Scripting via item_slug + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7c77259a-cdf3-4fa0-b468-9e98645293fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcodefactory-helper/" + google-query: inurl:"/wp-content/plugins/wpcodefactory-helper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcodefactory-helper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcodefactory-helper/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcodefactory-helper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcommenttwit-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml b/nuclei-templates/cve-less/plugins/wpcommenttwit-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml new file mode 100644 index 0000000000..9841b70dfd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcommenttwit-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml @@ -0,0 +1,58 @@ +id: wpcommenttwit-aa2e0c1ddafa9b3b45d0cc288ae14d9b + +info: + name: > + wpCommentTwit Plugin <= 0.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc40be19-9256-4c90-8438-b71b9481625d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcommenttwit/" + google-query: inurl:"/wp-content/plugins/wpcommenttwit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcommenttwit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcommenttwit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcommenttwit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpcomplete-22285771e4513b7b2557db1a144305fd.yaml b/nuclei-templates/cve-less/plugins/wpcomplete-22285771e4513b7b2557db1a144305fd.yaml new file mode 100644 index 0000000000..84b9fea9af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpcomplete-22285771e4513b7b2557db1a144305fd.yaml @@ -0,0 +1,58 @@ +id: wpcomplete-22285771e4513b7b2557db1a144305fd + +info: + name: > + WPComplete <= 2.9.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e3adbc2-fa45-4c35-a214-2b101e8c9748?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpcomplete/" + google-query: inurl:"/wp-content/plugins/wpcomplete/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpcomplete,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpcomplete/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpcomplete" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-0c5b7f509db51c1a7230bd37febd24a9.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-0c5b7f509db51c1a7230bd37febd24a9.yaml new file mode 100644 index 0000000000..5ce07d68cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-0c5b7f509db51c1a7230bd37febd24a9.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-0c5b7f509db51c1a7230bd37febd24a9 + +info: + name: > + wpDataTables <= 2.1.27 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bba9e06-4c5b-43e4-a51b-af57c5390c8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-19cf3f1ecae01908df4ff2c886d4fa04.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-19cf3f1ecae01908df4ff2c886d4fa04.yaml new file mode 100644 index 0000000000..afd39142dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-19cf3f1ecae01908df4ff2c886d4fa04.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-19cf3f1ecae01908df4ff2c886d4fa04 + +info: + name: > + wpDataTables (Premium) <= 3.4.1 - Blind SQL Injection via length Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16b407ab-9687-4a10-b458-ad39661e4fb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-1cf3419f9a5e9bc6544a37dc3d117609.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-1cf3419f9a5e9bc6544a37dc3d117609.yaml new file mode 100644 index 0000000000..26eec36343 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-1cf3419f9a5e9bc6544a37dc3d117609.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-1cf3419f9a5e9bc6544a37dc3d117609 + +info: + name: > + wpDataTables (Premium) <= 1.5.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a4ae629-51c8-4acc-bf95-fb0282e88383?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-23d1479acb7980e0e80c8871beec9664.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-23d1479acb7980e0e80c8871beec9664.yaml new file mode 100644 index 0000000000..9e7772b697 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-23d1479acb7980e0e80c8871beec9664.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-23d1479acb7980e0e80c8871beec9664 + +info: + name: > + wpDataTables - Tables & Table Charts <= 2.1.65 - Authenticated(Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c458644-a799-4bea-abcb-06a946dc19df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.66') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-25ab8b4cfcb0262dc70ad0a958834bfd.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-25ab8b4cfcb0262dc70ad0a958834bfd.yaml new file mode 100644 index 0000000000..309effa23b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-25ab8b4cfcb0262dc70ad0a958834bfd.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-25ab8b4cfcb0262dc70ad0a958834bfd + +info: + name: > + wpDataTables (Premium) <= 3.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/775e9f94-b66d-4c22-81ef-c335c0654f08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-3df29a28a26a7ffb43fd457831c6ecb6.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-3df29a28a26a7ffb43fd457831c6ecb6.yaml new file mode 100644 index 0000000000..71af0d9948 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-3df29a28a26a7ffb43fd457831c6ecb6.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-3df29a28a26a7ffb43fd457831c6ecb6 + +info: + name: > + wpDataTables (Premium) <= 3.4.1 - Improper Access Control leading to Table Permission Takeover + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/103b7db9-1571-4fce-852f-68d5df7ee4ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-46151945d00d6bf25de490ff58da7c2c.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-46151945d00d6bf25de490ff58da7c2c.yaml new file mode 100644 index 0000000000..60878d93bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-46151945d00d6bf25de490ff58da7c2c.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-46151945d00d6bf25de490ff58da7c2c + +info: + name: > + wpDataTables (Premium) <= 3.4.1 - Blind SQL Injection via start Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/546bd215-61aa-48bd-915e-7ced0128f53d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-597ddaaf7d3e092f9fab20618eafe4bf.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-597ddaaf7d3e092f9fab20618eafe4bf.yaml new file mode 100644 index 0000000000..b9758b1358 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-597ddaaf7d3e092f9fab20618eafe4bf.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-597ddaaf7d3e092f9fab20618eafe4bf + +info: + name: > + wpDataTables Lite plugin <= 2.0.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb68f328-3090-487e-bb1f-95fe1571abd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-60aa5e34343915a312cec2a9e0258902.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-60aa5e34343915a312cec2a9e0258902.yaml new file mode 100644 index 0000000000..36998550cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-60aa5e34343915a312cec2a9e0258902.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-60aa5e34343915a312cec2a9e0258902 + +info: + name: > + wpDataTables Lite plugin <= 2.0.11 - SQL injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4831a75-9d2b-4808-8b23-f1e9750fd905?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-63badef136741f64fed4a6df28e08497.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-63badef136741f64fed4a6df28e08497.yaml new file mode 100644 index 0000000000..40ccb3cdda --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-63badef136741f64fed4a6df28e08497.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-63badef136741f64fed4a6df28e08497 + +info: + name: > + wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin <= 3.4.2.2 - Reflected Cross-Site Scripting. + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a679863-3c22-4d34-9994-1f8ec121ad86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-983af3d35ec99acfdee458670c0dbf30.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-983af3d35ec99acfdee458670c0dbf30.yaml new file mode 100644 index 0000000000..30b12fe304 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-983af3d35ec99acfdee458670c0dbf30.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-983af3d35ec99acfdee458670c0dbf30 + +info: + name: > + wpDataTables – WordPress Tables & Table Charts Plugin <= 2.1.27 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59b90bf9-c053-4c70-ab30-e1565a65cbce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-bda023c028e1312df3faada5184e3051.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-bda023c028e1312df3faada5184e3051.yaml new file mode 100644 index 0000000000..30387916f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-bda023c028e1312df3faada5184e3051.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-bda023c028e1312df3faada5184e3051 + +info: + name: > + wpDataTables <= 1.5.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ab975b0-4216-46df-bf5e-91e403728e5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-bf60bab5b44140ba04d1559cd2178f30.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-bf60bab5b44140ba04d1559cd2178f30.yaml new file mode 100644 index 0000000000..fdf0a02102 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-bf60bab5b44140ba04d1559cd2178f30.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-bf60bab5b44140ba04d1559cd2178f30 + +info: + name: > + wpDataTables <= 2.1.49 - Authenticated (Contributor+) Stored Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e42831f-844d-40dc-965e-80334aab333c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.49') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdatatables-f804d8bbf28112a85600c922c4860868.yaml b/nuclei-templates/cve-less/plugins/wpdatatables-f804d8bbf28112a85600c922c4860868.yaml new file mode 100644 index 0000000000..22527d1c9d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdatatables-f804d8bbf28112a85600c922c4860868.yaml @@ -0,0 +1,58 @@ +id: wpdatatables-f804d8bbf28112a85600c922c4860868 + +info: + name: > + wpDataTables (Premium) <= 3.4.1 - Improper Access Control leading to Table Data Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/203ba9ca-2054-465f-ad93-ff103cade8aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdatatables/" + google-query: inurl:"/wp-content/plugins/wpdatatables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdatatables,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdatatables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdatatables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdbspringclean-a5e440b48c52ba08f10c05d92c40559d.yaml b/nuclei-templates/cve-less/plugins/wpdbspringclean-a5e440b48c52ba08f10c05d92c40559d.yaml new file mode 100644 index 0000000000..aa9624e732 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdbspringclean-a5e440b48c52ba08f10c05d92c40559d.yaml @@ -0,0 +1,58 @@ +id: wpdbspringclean-a5e440b48c52ba08f10c05d92c40559d + +info: + name: > + WPDBSpringClean <= 1.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6627f96-63d6-4f22-9eb7-fb42e748ae38?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdbspringclean/" + google-query: inurl:"/wp-content/plugins/wpdbspringclean/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdbspringclean,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdbspringclean/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdbspringclean" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdeepl-8452e21745012f33387aa8675156e84d.yaml b/nuclei-templates/cve-less/plugins/wpdeepl-8452e21745012f33387aa8675156e84d.yaml new file mode 100644 index 0000000000..d0949f1680 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdeepl-8452e21745012f33387aa8675156e84d.yaml @@ -0,0 +1,58 @@ +id: wpdeepl-8452e21745012f33387aa8675156e84d + +info: + name: > + DeepL Pro API translation <= 2.1.4 - Cross-Site Request Forgery via saveSettings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fc58078-7520-4ee7-b5a1-d6a362ac1860?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdeepl/" + google-query: inurl:"/wp-content/plugins/wpdeepl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdeepl,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdeepl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdeepl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdeepl-cc7c61101245515951b3119b10be8047.yaml b/nuclei-templates/cve-less/plugins/wpdeepl-cc7c61101245515951b3119b10be8047.yaml new file mode 100644 index 0000000000..ee178b65d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdeepl-cc7c61101245515951b3119b10be8047.yaml @@ -0,0 +1,58 @@ +id: wpdeepl-cc7c61101245515951b3119b10be8047 + +info: + name: > + DeepL Pro API Translation <= 1.7.4 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06f3c08a-9791-4c66-a173-8bbbb38d05ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdeepl/" + google-query: inurl:"/wp-content/plugins/wpdeepl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdeepl,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdeepl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdeepl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdeepl-e18f5ca4b5b5eca3a99631f697d0e3f8.yaml b/nuclei-templates/cve-less/plugins/wpdeepl-e18f5ca4b5b5eca3a99631f697d0e3f8.yaml new file mode 100644 index 0000000000..1c1ad15880 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdeepl-e18f5ca4b5b5eca3a99631f697d0e3f8.yaml @@ -0,0 +1,58 @@ +id: wpdeepl-e18f5ca4b5b5eca3a99631f697d0e3f8 + +info: + name: > + DeepL Pro API translation <= 2.4.1.1 - Cross-Site Request Forgery via wpdeepl_prune_logs + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b60cb1af-c9f3-4cea-9699-d66a52eb87eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdeepl/" + google-query: inurl:"/wp-content/plugins/wpdeepl/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdeepl,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdeepl/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdeepl" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-2af353880436693fc35e39cf38c13b8a.yaml b/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-2af353880436693fc35e39cf38c13b8a.yaml new file mode 100644 index 0000000000..04a0f28121 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-2af353880436693fc35e39cf38c13b8a.yaml @@ -0,0 +1,58 @@ +id: wpdevart-vertical-menu-2af353880436693fc35e39cf38c13b8a + +info: + name: > + Responsive Vertical Icon Menu <= 1.5.8 - Reflected Cross-Site Scripting via 'id' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a999044-5d4a-4415-a3b9-28c564e63a25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdevart-vertical-menu/" + google-query: inurl:"/wp-content/plugins/wpdevart-vertical-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdevart-vertical-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdevart-vertical-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdevart-vertical-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-802460476421cb6c2e180a48c3796054.yaml b/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-802460476421cb6c2e180a48c3796054.yaml new file mode 100644 index 0000000000..1e0574d148 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-802460476421cb6c2e180a48c3796054.yaml @@ -0,0 +1,58 @@ +id: wpdevart-vertical-menu-802460476421cb6c2e180a48c3796054 + +info: + name: > + Responsive Vertical Icon Menu <= 1.5.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe7f75b4-f315-44f7-8e67-1680eeee3942?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdevart-vertical-menu/" + google-query: inurl:"/wp-content/plugins/wpdevart-vertical-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdevart-vertical-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdevart-vertical-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdevart-vertical-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-cfda816b6240f8a3b82f71453a31052b.yaml b/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-cfda816b6240f8a3b82f71453a31052b.yaml new file mode 100644 index 0000000000..5d483f5b3c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdevart-vertical-menu-cfda816b6240f8a3b82f71453a31052b.yaml @@ -0,0 +1,58 @@ +id: wpdevart-vertical-menu-cfda816b6240f8a3b82f71453a31052b + +info: + name: > + Responsive Vertical Icon Menu <= 1.5.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df534aba-242a-45c2-9d1c-6a08b58f8ee7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdevart-vertical-menu/" + google-query: inurl:"/wp-content/plugins/wpdevart-vertical-menu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdevart-vertical-menu,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdevart-vertical-menu/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdevart-vertical-menu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-169725f2f4440d7e4d2c8758f176453b.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-169725f2f4440d7e4d2c8758f176453b.yaml new file mode 100644 index 0000000000..dc86da93a3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-169725f2f4440d7e4d2c8758f176453b.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-169725f2f4440d7e4d2c8758f176453b + +info: + name: > + WP Directory Kit <= 1.2.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60083262-198d-4a7d-bb0a-717a744e20f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-23de0bb4163d3b6bba768143cf2dcf96.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-23de0bb4163d3b6bba768143cf2dcf96.yaml new file mode 100644 index 0000000000..5471b756d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-23de0bb4163d3b6bba768143cf2dcf96.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-23de0bb4163d3b6bba768143cf2dcf96 + +info: + name: > + WP Directory Kit <= 1.2.1 - Cross-Site Request Forgery to Plugin Settings Change/Delete, Demo Import, Directory Kit Modification/Deletion via admin_page_display + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a7a6da3-d67c-42b3-8826-7e7fc9b938b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-4885793b2807286a2196897535bf89a5.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-4885793b2807286a2196897535bf89a5.yaml new file mode 100644 index 0000000000..c227fa8aaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-4885793b2807286a2196897535bf89a5.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-4885793b2807286a2196897535bf89a5 + +info: + name: > + WP Directory Kit <= 1.1.9 - Unauthenticated Local File Inclusion via wdk_public_action + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87399a07-d2d8-42cd-81f0-9060f6cfff48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-4b446531318d71c375cbec3251c138e5.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-4b446531318d71c375cbec3251c138e5.yaml new file mode 100644 index 0000000000..be022ac2e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-4b446531318d71c375cbec3251c138e5.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-4b446531318d71c375cbec3251c138e5 + +info: + name: > + WP Directory Kit <= 1.2.3 - Missing Authorization to Plugin Settings Change/Delete, Demo Import, Directory Kit Deletion via wdk_admin_action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50c5154c-1573-4c2b-85a1-a89bdb22dc7d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-504a39994c84bd2792f780a53fd144b4.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-504a39994c84bd2792f780a53fd144b4.yaml new file mode 100644 index 0000000000..98ae7a35df --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-504a39994c84bd2792f780a53fd144b4.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-504a39994c84bd2792f780a53fd144b4 + +info: + name: > + WP Directory Kit <= 1.2.3 - Reflected Cross-Site Scripting via 'search' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/847f1c00-0e8f-4d38-84af-fe959e2efe5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-6bec264de722325d8055d26873b10d23.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-6bec264de722325d8055d26873b10d23.yaml new file mode 100644 index 0000000000..892756fc79 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-6bec264de722325d8055d26873b10d23.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-6bec264de722325d8055d26873b10d23 + +info: + name: > + WP Directory Kit <= 1.3.0 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09b315e6-d973-467d-8b8d-4b7b4a7ca3f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-85863960848d10abf7509addf7ced106.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-85863960848d10abf7509addf7ced106.yaml new file mode 100644 index 0000000000..a457d99cd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-85863960848d10abf7509addf7ced106.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-85863960848d10abf7509addf7ced106 + +info: + name: > + WP Directory Kit <= 1.2.2 - Missing Authorization to Plugin Installation, Settings Change/Delete, Demo Import, Directory Kit Deletion via wdk_public_action + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abb1a758-5c16-4841-b1c7-0705ab16b328?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-b5f02e86b0a4e22a4260a76da5ba5c23.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-b5f02e86b0a4e22a4260a76da5ba5c23.yaml new file mode 100644 index 0000000000..a791eb1b3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-b5f02e86b0a4e22a4260a76da5ba5c23.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-b5f02e86b0a4e22a4260a76da5ba5c23 + +info: + name: > + WP Directory Kit <= 1.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b40070af-3f2c-4bd1-bd33-1a0aa37c6e62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-de6c40221b62e856a02b07f7a8b63ef2.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-de6c40221b62e856a02b07f7a8b63ef2.yaml new file mode 100644 index 0000000000..d2430d145a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-de6c40221b62e856a02b07f7a8b63ef2.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-de6c40221b62e856a02b07f7a8b63ef2 + +info: + name: > + WP Directory Kit <= 1.1.9 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f01ee24-544b-45cb-9cf3-7db8263d8e54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdirectorykit-f5cbed8041a7afd2170e85e7e9cafc79.yaml b/nuclei-templates/cve-less/plugins/wpdirectorykit-f5cbed8041a7afd2170e85e7e9cafc79.yaml new file mode 100644 index 0000000000..8cd02ab11d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdirectorykit-f5cbed8041a7afd2170e85e7e9cafc79.yaml @@ -0,0 +1,58 @@ +id: wpdirectorykit-f5cbed8041a7afd2170e85e7e9cafc79 + +info: + name: > + WP Directory Kit <= 1.1.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting via wdk_resultitem + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82c6ed2f-20e8-46d1-a460-16d32b7536cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdirectorykit/" + google-query: inurl:"/wp-content/plugins/wpdirectorykit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdirectorykit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdirectorykit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdirectorykit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-0bc93e8d9149869cc1871c88dbbfb381.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-0bc93e8d9149869cc1871c88dbbfb381.yaml new file mode 100644 index 0000000000..77ff95ccef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-0bc93e8d9149869cc1871c88dbbfb381.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-0bc93e8d9149869cc1871c88dbbfb381 + +info: + name: > + Comments - wpDiscuz <= 7.3.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afbf555a-1b70-4966-9b05-46e9de04e660?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-16a0db053a94923b7846b57810e1f6c8.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-16a0db053a94923b7846b57810e1f6c8.yaml new file mode 100644 index 0000000000..b03e206a43 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-16a0db053a94923b7846b57810e1f6c8.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-16a0db053a94923b7846b57810e1f6c8 + +info: + name: > + wpDiscuz <= 7.6.15 - Authenticated (Author+) Stored Cross-Site Scripting via Uploaded Image Alternative Text + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3eddc03d-ecff-4b50-a574-7b6b62e53af0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-1ed3919ab7a486f4e9a15463ad8bff96.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-1ed3919ab7a486f4e9a15463ad8bff96.yaml new file mode 100644 index 0000000000..46b1ef6a0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-1ed3919ab7a486f4e9a15463ad8bff96.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-1ed3919ab7a486f4e9a15463ad8bff96 + +info: + name: > + wpDiscuz <= 7.6.3 - Authenticated(Author+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/359c573f-7031-4f56-b66f-c37339667aca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-223865afe5d53909b5b1a1c4a2e94a6b.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-223865afe5d53909b5b1a1c4a2e94a6b.yaml new file mode 100644 index 0000000000..8dc2ae7b75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-223865afe5d53909b5b1a1c4a2e94a6b.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-223865afe5d53909b5b1a1c4a2e94a6b + +info: + name: > + wpDiscuz <= 7.6.3 - Insecure Direct Object Reference to Post Rating Increase/Decrease + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d09bdab-ffab-44cc-bba2-821b21a8e343?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-51bab80f0c546820e2f032bc9393b40e.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-51bab80f0c546820e2f032bc9393b40e.yaml new file mode 100644 index 0000000000..fa24e835fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-51bab80f0c546820e2f032bc9393b40e.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-51bab80f0c546820e2f032bc9393b40e + +info: + name: > + wpDiscuz <= 7.6.11 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53af9dfd-eb2d-4f6f-b02f-daf790b95f1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-5a55693edc24427d1f47532bb94de1b0.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-5a55693edc24427d1f47532bb94de1b0.yaml new file mode 100644 index 0000000000..3d413f3dc6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-5a55693edc24427d1f47532bb94de1b0.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-5a55693edc24427d1f47532bb94de1b0 + +info: + name: > + Comments - wpDiscuz 7.0 - 7.0.4 - Unauthenticated Arbitrary File Upload leading to Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc3efc42-7cf5-4dcd-9653-891deaae19c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 7.0', '<= 7.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-6c13f07e879053414ff6baeb7933d2d9.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-6c13f07e879053414ff6baeb7933d2d9.yaml new file mode 100644 index 0000000000..5cd5f7696a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-6c13f07e879053414ff6baeb7933d2d9.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-6c13f07e879053414ff6baeb7933d2d9 + +info: + name: > + Comments – wpDiscuz <= 7.4.2 - Insecure Direct Object References + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7782522-78bc-4ad2-997e-81c8870d55fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-6fc4af928f6f064abafe70a5e89e72c3.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-6fc4af928f6f064abafe70a5e89e72c3.yaml new file mode 100644 index 0000000000..7414e17cba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-6fc4af928f6f064abafe70a5e89e72c3.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-6fc4af928f6f064abafe70a5e89e72c3 + +info: + name: > + Comments - wpDiscuz <= 7.3.3 - Arbitrary Comment Addition/Edition/Deletion by Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e641453c-8fa0-4b44-b912-b797aeae1795?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-80cc11249951d77617837d489d137970.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-80cc11249951d77617837d489d137970.yaml new file mode 100644 index 0000000000..897f90260f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-80cc11249951d77617837d489d137970.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-80cc11249951d77617837d489d137970 + +info: + name: > + wpDiscuz <= 7.6.3 - Insecure Direct Object Reference to Comment Rating Increase/Decrease + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b30ac1b0-eae2-4194-bf8e-ae73b4236965?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-8e49820ed6d4efe09269732fec37b1be.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-8e49820ed6d4efe09269732fec37b1be.yaml new file mode 100644 index 0000000000..acaafaa002 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-8e49820ed6d4efe09269732fec37b1be.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-8e49820ed6d4efe09269732fec37b1be + +info: + name: > + wpDiscuz <= 7.6.10 - Insufficient Authorization to Comment Submission on Deleted Posts + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4a1fe36b-75d2-48c3-bfac-af965eb9363f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-a0549630b70baaa25b54d3a02da3e3cd.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-a0549630b70baaa25b54d3a02da3e3cd.yaml new file mode 100644 index 0000000000..e1c0d77513 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-a0549630b70baaa25b54d3a02da3e3cd.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-a0549630b70baaa25b54d3a02da3e3cd + +info: + name: > + Comments - wpDiscuz <= 5.3.5 - Blind SQL Injection via order Parameter + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/79b0a90b-5b75-4757-bd7b-909350f54175?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-a9411edebf4b02260a501cf288486160.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-a9411edebf4b02260a501cf288486160.yaml new file mode 100644 index 0000000000..5e45f9e760 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-a9411edebf4b02260a501cf288486160.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-a9411edebf4b02260a501cf288486160 + +info: + name: > + wpDiscuz <= 7.6.10 - Unauthenticated Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fa1299e-308e-47ea-843c-c76b8a412ce9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-a97759482458c44cbd86520addf0e715.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-a97759482458c44cbd86520addf0e715.yaml new file mode 100644 index 0000000000..cfdb71006f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-a97759482458c44cbd86520addf0e715.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-a97759482458c44cbd86520addf0e715 + +info: + name: > + wpDiscuz <= 7.6.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dd1e52c-83b7-4b3e-a791-a2c0ccd856bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-b26f381c9f7354f3462011430c6f3516.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-b26f381c9f7354f3462011430c6f3516.yaml new file mode 100644 index 0000000000..1b5d52599a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-b26f381c9f7354f3462011430c6f3516.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-b26f381c9f7354f3462011430c6f3516 + +info: + name: > + wpDiscuz <= 7.6.3 - Missing Authorization via AJAX actions + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e8ad3c1-549b-4401-8cf4-a8b7f81fbc11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-bb1322086ee5fb78a847811248987555.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-bb1322086ee5fb78a847811248987555.yaml new file mode 100644 index 0000000000..c6e4ce2df1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-bb1322086ee5fb78a847811248987555.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-bb1322086ee5fb78a847811248987555 + +info: + name: > + wpDiscuz <= 7.6.12 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f68bc7e9-3bfe-4b2f-82a1-92bbde1a133a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-beb4595f765deb10835ff70e19259d4b.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-beb4595f765deb10835ff70e19259d4b.yaml new file mode 100644 index 0000000000..d0bf085f1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-beb4595f765deb10835ff70e19259d4b.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-beb4595f765deb10835ff70e19259d4b + +info: + name: > + Comments - wpDiscuz <= 3.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c8ff308-712b-4cf6-98ea-200d2fed9c43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-d7dc7eb24d3a5429c846eb87b8592531.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-d7dc7eb24d3a5429c846eb87b8592531.yaml new file mode 100644 index 0000000000..a33589b4a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-d7dc7eb24d3a5429c846eb87b8592531.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-d7dc7eb24d3a5429c846eb87b8592531 + +info: + name: > + wpDiscuz <= 7.6.11 - Unauthenticated Stored Cross-Site Scripting via Comment Uploaded Image Filename + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/026ff6f4-077e-4fee-8fbe-8176f8ca5af3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdiscuz-f66d967d74fa7c849a46bb1299b2eece.yaml b/nuclei-templates/cve-less/plugins/wpdiscuz-f66d967d74fa7c849a46bb1299b2eece.yaml new file mode 100644 index 0000000000..34a926b16b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdiscuz-f66d967d74fa7c849a46bb1299b2eece.yaml @@ -0,0 +1,58 @@ +id: wpdiscuz-f66d967d74fa7c849a46bb1299b2eece + +info: + name: > + Comments - wpDiscuz <= 7.3.11 Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d3771ee-b664-4416-93b7-96ab1e3510cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdiscuz/" + google-query: inurl:"/wp-content/plugins/wpdiscuz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdiscuz,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdiscuz/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdiscuz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdm-gutenberg-blocks-5096ea0bd77ac20a45ea75149ea1f0e9.yaml b/nuclei-templates/cve-less/plugins/wpdm-gutenberg-blocks-5096ea0bd77ac20a45ea75149ea1f0e9.yaml new file mode 100644 index 0000000000..bbc7e08602 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdm-gutenberg-blocks-5096ea0bd77ac20a45ea75149ea1f0e9.yaml @@ -0,0 +1,58 @@ +id: wpdm-gutenberg-blocks-5096ea0bd77ac20a45ea75149ea1f0e9 + +info: + name: > + Gutenberge Blocks <= 2.1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f090e1f1-2713-4f3a-b908-9407c242fdf9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdm-gutenberg-blocks/" + google-query: inurl:"/wp-content/plugins/wpdm-gutenberg-blocks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdm-gutenberg-blocks,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdm-gutenberg-blocks/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdm-gutenberg-blocks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdm-premium-packages-1a67baf6167d3af7ea57dc54d855070a.yaml b/nuclei-templates/cve-less/plugins/wpdm-premium-packages-1a67baf6167d3af7ea57dc54d855070a.yaml new file mode 100644 index 0000000000..80d1d866b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdm-premium-packages-1a67baf6167d3af7ea57dc54d855070a.yaml @@ -0,0 +1,58 @@ +id: wpdm-premium-packages-1a67baf6167d3af7ea57dc54d855070a + +info: + name: > + Premium Packages - Sell Digital Products Securely <= 5.7.4 - Arbitrary User Meta Update to Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82137302-60ca-44d5-b087-dc96e2815fca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdm-premium-packages/" + google-query: inurl:"/wp-content/plugins/wpdm-premium-packages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdm-premium-packages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdm-premium-packages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdm-premium-packages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpdm-premium-packages-9cbb5db009f771b1f71dcb8eaf85d7e6.yaml b/nuclei-templates/cve-less/plugins/wpdm-premium-packages-9cbb5db009f771b1f71dcb8eaf85d7e6.yaml new file mode 100644 index 0000000000..4a25d588ce --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpdm-premium-packages-9cbb5db009f771b1f71dcb8eaf85d7e6.yaml @@ -0,0 +1,58 @@ +id: wpdm-premium-packages-9cbb5db009f771b1f71dcb8eaf85d7e6 + +info: + name: > + Premium Packages <= 5.8.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7df2996f-bc0e-4608-a80e-6167ac26469a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpdm-premium-packages/" + google-query: inurl:"/wp-content/plugins/wpdm-premium-packages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpdm-premium-packages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpdm-premium-packages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpdm-premium-packages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpe-indoshipping-a0f96e4b9cfd2e8b1cd4cfaea6299052.yaml b/nuclei-templates/cve-less/plugins/wpe-indoshipping-a0f96e4b9cfd2e8b1cd4cfaea6299052.yaml new file mode 100644 index 0000000000..0fcc78f375 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpe-indoshipping-a0f96e4b9cfd2e8b1cd4cfaea6299052.yaml @@ -0,0 +1,58 @@ +id: wpe-indoshipping-a0f96e4b9cfd2e8b1cd4cfaea6299052 + +info: + name: > + WPE Indoshipping <= 2.5.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/135ab17b-5b91-484a-8bec-6f77d694ae62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpe-indoshipping/" + google-query: inurl:"/wp-content/plugins/wpe-indoshipping/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpe-indoshipping,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpe-indoshipping/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpe-indoshipping" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpematico-ce2aa47cca210105b9ad928ad1c57540.yaml b/nuclei-templates/cve-less/plugins/wpematico-ce2aa47cca210105b9ad928ad1c57540.yaml new file mode 100644 index 0000000000..ffe3803143 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpematico-ce2aa47cca210105b9ad928ad1c57540.yaml @@ -0,0 +1,58 @@ +id: wpematico-ce2aa47cca210105b9ad928ad1c57540 + +info: + name: > + WPeMatico RSS Feed Fetcher <= 2.6.11 - Admin+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a62a3a71-0dbb-48d6-ba1a-f218fefac871?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpematico/" + google-query: inurl:"/wp-content/plugins/wpematico/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpematico,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpematico/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpematico" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-1c7acc022622f36ca344db11dcebaddf.yaml b/nuclei-templates/cve-less/plugins/wpforms-1c7acc022622f36ca344db11dcebaddf.yaml new file mode 100644 index 0000000000..bcb0a64006 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-1c7acc022622f36ca344db11dcebaddf.yaml @@ -0,0 +1,58 @@ +id: wpforms-1c7acc022622f36ca344db11dcebaddf + +info: + name: > + WPForms Pro 1.8.4 - 1.8.5.3 - Unauthenticated Stored Cross-Site Scripting via Form Submission + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31c080b8-ba00-4e96-8961-2a1c3a017004?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms/" + google-query: inurl:"/wp-content/plugins/wpforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.8.4', '<= 1.8.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-4ca7bd0e8f61ffa08f04711e58090827.yaml b/nuclei-templates/cve-less/plugins/wpforms-4ca7bd0e8f61ffa08f04711e58090827.yaml new file mode 100644 index 0000000000..61efd9675e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-4ca7bd0e8f61ffa08f04711e58090827.yaml @@ -0,0 +1,58 @@ +id: wpforms-4ca7bd0e8f61ffa08f04711e58090827 + +info: + name: > + WPForms Pro <= 1.7.6 - CSV Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01cfe0da-0ffc-4046-b58a-a31f5d10d1bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms/" + google-query: inurl:"/wp-content/plugins/wpforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-7a378944e613d1b359a5928a9883a2f4.yaml b/nuclei-templates/cve-less/plugins/wpforms-7a378944e613d1b359a5928a9883a2f4.yaml new file mode 100644 index 0000000000..8222bf09b9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-7a378944e613d1b359a5928a9883a2f4.yaml @@ -0,0 +1,58 @@ +id: wpforms-7a378944e613d1b359a5928a9883a2f4 + +info: + name: > + Contact Form by WPForms (Free and Premium) <= 1.8.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b10303e0-c864-4088-91d1-d38c24094812?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms/" + google-query: inurl:"/wp-content/plugins/wpforms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-lite-0425ae56a9fab522c188634fc2eda86f.yaml b/nuclei-templates/cve-less/plugins/wpforms-lite-0425ae56a9fab522c188634fc2eda86f.yaml new file mode 100644 index 0000000000..638575bff4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-lite-0425ae56a9fab522c188634fc2eda86f.yaml @@ -0,0 +1,58 @@ +id: wpforms-lite-0425ae56a9fab522c188634fc2eda86f + +info: + name: > + Contact Form by WPForms – Drag & Drop Form Builder for WordPress <= 1.4.7.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5caa9c7c-07b3-4288-803f-f60e5b428953?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms-lite/" + google-query: inurl:"/wp-content/plugins/wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-lite-220dd315bf8421f9ddbac8301f226083.yaml b/nuclei-templates/cve-less/plugins/wpforms-lite-220dd315bf8421f9ddbac8301f226083.yaml new file mode 100644 index 0000000000..ff2cd2931b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-lite-220dd315bf8421f9ddbac8301f226083.yaml @@ -0,0 +1,58 @@ +id: wpforms-lite-220dd315bf8421f9ddbac8301f226083 + +info: + name: > + Contact Form by WPForms – Drag & Drop Form Builder for WordPress <= 1.8.7.2 - Unauthenticated Price Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68a509ae-9943-4b9a-8ede-2b5732e96e6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms-lite/" + google-query: inurl:"/wp-content/plugins/wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-lite-316c95f4f3b5891fdd91af058dfb9524.yaml b/nuclei-templates/cve-less/plugins/wpforms-lite-316c95f4f3b5891fdd91af058dfb9524.yaml new file mode 100644 index 0000000000..d39ecc932a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-lite-316c95f4f3b5891fdd91af058dfb9524.yaml @@ -0,0 +1,58 @@ +id: wpforms-lite-316c95f4f3b5891fdd91af058dfb9524 + +info: + name: > + Contact Form by WPForms <= 1.4.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35246286-c0df-4f82-84b8-ebefe966a4dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms-lite/" + google-query: inurl:"/wp-content/plugins/wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-lite-3833fde53c02f881d8b11d577a449782.yaml b/nuclei-templates/cve-less/plugins/wpforms-lite-3833fde53c02f881d8b11d577a449782.yaml new file mode 100644 index 0000000000..8a850480bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-lite-3833fde53c02f881d8b11d577a449782.yaml @@ -0,0 +1,58 @@ +id: wpforms-lite-3833fde53c02f881d8b11d577a449782 + +info: + name: > + Contact Form by WPForms <= 1.5.8.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7633efe4-f914-4683-a79b-baaa60975282?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms-lite/" + google-query: inurl:"/wp-content/plugins/wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-lite-3d5a86cd8278e1869b165a5be40a3baa.yaml b/nuclei-templates/cve-less/plugins/wpforms-lite-3d5a86cd8278e1869b165a5be40a3baa.yaml new file mode 100644 index 0000000000..6d046bbcab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-lite-3d5a86cd8278e1869b165a5be40a3baa.yaml @@ -0,0 +1,58 @@ +id: wpforms-lite-3d5a86cd8278e1869b165a5be40a3baa + +info: + name: > + Contact Form by WPForms <= 1.7.5.3 - Authenticated (Administrator+) Arbitrary File Access via Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2ad2c0d-542e-4b40-91a8-19b27297545e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms-lite/" + google-query: inurl:"/wp-content/plugins/wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-lite-7a378944e613d1b359a5928a9883a2f4.yaml b/nuclei-templates/cve-less/plugins/wpforms-lite-7a378944e613d1b359a5928a9883a2f4.yaml new file mode 100644 index 0000000000..94228f4239 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-lite-7a378944e613d1b359a5928a9883a2f4.yaml @@ -0,0 +1,58 @@ +id: wpforms-lite-7a378944e613d1b359a5928a9883a2f4 + +info: + name: > + Contact Form by WPForms (Free and Premium) <= 1.8.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b10303e0-c864-4088-91d1-d38c24094812?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms-lite/" + google-query: inurl:"/wp-content/plugins/wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforms-lite-a191d4d9963290504268454ad924a754.yaml b/nuclei-templates/cve-less/plugins/wpforms-lite-a191d4d9963290504268454ad924a754.yaml new file mode 100644 index 0000000000..1d1840ed00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforms-lite-a191d4d9963290504268454ad924a754.yaml @@ -0,0 +1,58 @@ +id: wpforms-lite-a191d4d9963290504268454ad924a754 + +info: + name: > + Contact Form by WPForms <= 1.6.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06bc7a24-eafc-4b06-852e-9b596f107805?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforms-lite/" + google-query: inurl:"/wp-content/plugins/wpforms-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforms-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforms-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforms-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-026833d334ad1214ad9b4e4b3b4251a9.yaml b/nuclei-templates/cve-less/plugins/wpforo-026833d334ad1214ad9b4e4b3b4251a9.yaml new file mode 100644 index 0000000000..5b7beb0af3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-026833d334ad1214ad9b4e4b3b4251a9.yaml @@ -0,0 +1,58 @@ +id: wpforo-026833d334ad1214ad9b4e4b3b4251a9 + +info: + name: > + wpForo Forum <= 2.2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/71078aaf-9803-4b46-bc94-dbcb43745629?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-038a878abb8f9607405d070f7e55bf0f.yaml b/nuclei-templates/cve-less/plugins/wpforo-038a878abb8f9607405d070f7e55bf0f.yaml new file mode 100644 index 0000000000..dfed8aca90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-038a878abb8f9607405d070f7e55bf0f.yaml @@ -0,0 +1,58 @@ +id: wpforo-038a878abb8f9607405d070f7e55bf0f + +info: + name: > + wpForo Forum < 1.4.12 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3155f8ba-b50e-490c-81bd-4a63142f164b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-0974ad31ae0ff4ed4780871fa5a19327.yaml b/nuclei-templates/cve-less/plugins/wpforo-0974ad31ae0ff4ed4780871fa5a19327.yaml new file mode 100644 index 0000000000..46d720e5ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-0974ad31ae0ff4ed4780871fa5a19327.yaml @@ -0,0 +1,58 @@ +id: wpforo-0974ad31ae0ff4ed4780871fa5a19327 + +info: + name: > + wpForo Forum <= 1.6.5 - Cross-Site Scripting via wpf-dw-td-value class + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89a6aab0-e85b-4604-b911-03a01c5cca13?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-180565f2bb1ffb1d14acebaf2b798b98.yaml b/nuclei-templates/cve-less/plugins/wpforo-180565f2bb1ffb1d14acebaf2b798b98.yaml new file mode 100644 index 0000000000..c8c293f8aa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-180565f2bb1ffb1d14acebaf2b798b98.yaml @@ -0,0 +1,58 @@ +id: wpforo-180565f2bb1ffb1d14acebaf2b798b98 + +info: + name: > + wpForo Forum <= 2.0.9 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07c01ab7-8bf8-4aa5-b5e6-8e47a3bf1f7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-472cf1af897e591100ceb6b96fb80de8.yaml b/nuclei-templates/cve-less/plugins/wpforo-472cf1af897e591100ceb6b96fb80de8.yaml new file mode 100644 index 0000000000..99e7352fde --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-472cf1af897e591100ceb6b96fb80de8.yaml @@ -0,0 +1,58 @@ +id: wpforo-472cf1af897e591100ceb6b96fb80de8 + +info: + name: > + wpForo Forum <= 1.4.12 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fea6ddd5-f168-471c-99eb-efc46d1bfeb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-51d849db0aa0f9961d0bb5eb2d81e11e.yaml b/nuclei-templates/cve-less/plugins/wpforo-51d849db0aa0f9961d0bb5eb2d81e11e.yaml new file mode 100644 index 0000000000..f2f2556c5f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-51d849db0aa0f9961d0bb5eb2d81e11e.yaml @@ -0,0 +1,58 @@ +id: wpforo-51d849db0aa0f9961d0bb5eb2d81e11e + +info: + name: > + wpForo Forum <= 2.2.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01f4318f-b56b-4a34-987b-05edeee5da69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-5e08a8bcdaa0ffc86e373916165d670a.yaml b/nuclei-templates/cve-less/plugins/wpforo-5e08a8bcdaa0ffc86e373916165d670a.yaml new file mode 100644 index 0000000000..ee324b073f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-5e08a8bcdaa0ffc86e373916165d670a.yaml @@ -0,0 +1,58 @@ +id: wpforo-5e08a8bcdaa0ffc86e373916165d670a + +info: + name: > + wpForo < = 1.5.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44ba3eee-525e-46ba-ae02-6f7a28f80c50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-5fc70b9a54a47a4a18b6ce16ce7c23ba.yaml b/nuclei-templates/cve-less/plugins/wpforo-5fc70b9a54a47a4a18b6ce16ce7c23ba.yaml new file mode 100644 index 0000000000..8788f9e4bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-5fc70b9a54a47a4a18b6ce16ce7c23ba.yaml @@ -0,0 +1,58 @@ +id: wpforo-5fc70b9a54a47a4a18b6ce16ce7c23ba + +info: + name: > + wpForo Forum <= 2.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ce1a40f-1489-42be-963e-052274a56e47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-7796a6543f11d887deb3ec9c31928648.yaml b/nuclei-templates/cve-less/plugins/wpforo-7796a6543f11d887deb3ec9c31928648.yaml new file mode 100644 index 0000000000..f499537d3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-7796a6543f11d887deb3ec9c31928648.yaml @@ -0,0 +1,58 @@ +id: wpforo-7796a6543f11d887deb3ec9c31928648 + +info: + name: > + wpForo Forum <= 2.0.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca46ea28-3115-4db1-8aeb-cbef731b0376?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-86ba8169e30edfd0fbeaaac7e702dfce.yaml b/nuclei-templates/cve-less/plugins/wpforo-86ba8169e30edfd0fbeaaac7e702dfce.yaml new file mode 100644 index 0000000000..1152076b9c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-86ba8169e30edfd0fbeaaac7e702dfce.yaml @@ -0,0 +1,58 @@ +id: wpforo-86ba8169e30edfd0fbeaaac7e702dfce + +info: + name: > + wpForo Forum <= 2.1.7 - Authenticated (Subscriber+) Local File Include, Server-Side Request Forgery, and PHAR Deserialization via file_get_contents + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/800fa098-b29f-4979-b7bd-b1186a4dafcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-b1ced039ec3e12066bd1cc12c97938c8.yaml b/nuclei-templates/cve-less/plugins/wpforo-b1ced039ec3e12066bd1cc12c97938c8.yaml new file mode 100644 index 0000000000..c84ed1c8e4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-b1ced039ec3e12066bd1cc12c97938c8.yaml @@ -0,0 +1,58 @@ +id: wpforo-b1ced039ec3e12066bd1cc12c97938c8 + +info: + name: > + wpForo Forum <= 2.0.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a313f4d0-fd9e-47f1-99eb-351a2aff9bea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-c0b1c2357ac077725cbe857dcad08e43.yaml b/nuclei-templates/cve-less/plugins/wpforo-c0b1c2357ac077725cbe857dcad08e43.yaml new file mode 100644 index 0000000000..97612f18ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-c0b1c2357ac077725cbe857dcad08e43.yaml @@ -0,0 +1,58 @@ +id: wpforo-c0b1c2357ac077725cbe857dcad08e43 + +info: + name: > + wpForo Forum <= 1.9.6 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebf84c6a-fd6c-4113-91ff-27c7564cabdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-c32ce9a33cb4b84bfdebec18aaf08699.yaml b/nuclei-templates/cve-less/plugins/wpforo-c32ce9a33cb4b84bfdebec18aaf08699.yaml new file mode 100644 index 0000000000..ce6ea946f3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-c32ce9a33cb4b84bfdebec18aaf08699.yaml @@ -0,0 +1,58 @@ +id: wpforo-c32ce9a33cb4b84bfdebec18aaf08699 + +info: + name: > + wpForo Forum <= 2.2.5 - Cross-Site Request Forgery via logout() + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bce40ee-c378-4a44-9c5d-d83151975309?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-c9f41d227d49a467420a82298376145f.yaml b/nuclei-templates/cve-less/plugins/wpforo-c9f41d227d49a467420a82298376145f.yaml new file mode 100644 index 0000000000..e95484cbef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-c9f41d227d49a467420a82298376145f.yaml @@ -0,0 +1,58 @@ +id: wpforo-c9f41d227d49a467420a82298376145f + +info: + name: > + wpForo Forum <= 1.6.5 - Cross-Site Scripting via langid parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15967a0f-2512-4418-b503-b9d53032d40f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-cc42a23c3489a21703ade49d1baae26a.yaml b/nuclei-templates/cve-less/plugins/wpforo-cc42a23c3489a21703ade49d1baae26a.yaml new file mode 100644 index 0000000000..84238a1ed1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-cc42a23c3489a21703ade49d1baae26a.yaml @@ -0,0 +1,58 @@ +id: wpforo-cc42a23c3489a21703ade49d1baae26a + +info: + name: > + wpForo Forum <= 2.0.5 - Insecure Direct Object Reference to Forum Privacy Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e35be8ee-81a3-42ce-8304-992bc75663fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-d2f0460858f178a35a9b0566104e93cb.yaml b/nuclei-templates/cve-less/plugins/wpforo-d2f0460858f178a35a9b0566104e93cb.yaml new file mode 100644 index 0000000000..bd7cdf1b49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-d2f0460858f178a35a9b0566104e93cb.yaml @@ -0,0 +1,58 @@ +id: wpforo-d2f0460858f178a35a9b0566104e93cb + +info: + name: > + wpForo Forum <= 2.0.5 - Insecure Direct Object Reference to Forum Status Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee78642c-ad2a-4012-94e8-e01f71863791?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-dcbc26c1e59709ba0a55cede543653d5.yaml b/nuclei-templates/cve-less/plugins/wpforo-dcbc26c1e59709ba0a55cede543653d5.yaml new file mode 100644 index 0000000000..44d815306b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-dcbc26c1e59709ba0a55cede543653d5.yaml @@ -0,0 +1,58 @@ +id: wpforo-dcbc26c1e59709ba0a55cede543653d5 + +info: + name: > + wpForo Forum <= 1.6.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bee82d8-d019-450b-b532-5b3e2e3aff6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-df308cf6b44530f23e6aa9e16f45633a.yaml b/nuclei-templates/cve-less/plugins/wpforo-df308cf6b44530f23e6aa9e16f45633a.yaml new file mode 100644 index 0000000000..197ed534ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-df308cf6b44530f23e6aa9e16f45633a.yaml @@ -0,0 +1,58 @@ +id: wpforo-df308cf6b44530f23e6aa9e16f45633a + +info: + name: > + wpForo Forum <= 2.0.9 - Authenticated (Subscriber+) HTML Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83cb1333-3c74-426d-9838-a5cb90be29b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-e0fff88ad101eb2ee95866f7be5ec00c.yaml b/nuclei-templates/cve-less/plugins/wpforo-e0fff88ad101eb2ee95866f7be5ec00c.yaml new file mode 100644 index 0000000000..0f421eeaeb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-e0fff88ad101eb2ee95866f7be5ec00c.yaml @@ -0,0 +1,58 @@ +id: wpforo-e0fff88ad101eb2ee95866f7be5ec00c + +info: + name: > + wpForo Forum <= 2.1.8 - Reflected Cross-Site Scripting via 'wpforo_debug' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35b6a26a-d7c1-4538-87f3-fcb1095797a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-e5552ad191b551e3319c3d216b7466cf.yaml b/nuclei-templates/cve-less/plugins/wpforo-e5552ad191b551e3319c3d216b7466cf.yaml new file mode 100644 index 0000000000..52bb5c6153 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-e5552ad191b551e3319c3d216b7466cf.yaml @@ -0,0 +1,58 @@ +id: wpforo-e5552ad191b551e3319c3d216b7466cf + +info: + name: > + wpForo Forum <= 1.6.5 - Cross-Site Scripting via s parameter + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c65619-e96c-47e1-b42a-a85d0b5237d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpforo-ee5b4c2ac22e2de04acc625e8a8d31f3.yaml b/nuclei-templates/cve-less/plugins/wpforo-ee5b4c2ac22e2de04acc625e8a8d31f3.yaml new file mode 100644 index 0000000000..ba5da889ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpforo-ee5b4c2ac22e2de04acc625e8a8d31f3.yaml @@ -0,0 +1,58 @@ +id: wpforo-ee5b4c2ac22e2de04acc625e8a8d31f3 + +info: + name: > + wpForo Forum <= 2.2.3 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5607a60e-a04a-4d28-bb04-bdacf8e97c56?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpforo/" + google-query: inurl:"/wp-content/plugins/wpforo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpforo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpforo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpforo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfrom-email-f018dd006c86a273640a9091528e99af.yaml b/nuclei-templates/cve-less/plugins/wpfrom-email-f018dd006c86a273640a9091528e99af.yaml new file mode 100644 index 0000000000..1212cbac37 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfrom-email-f018dd006c86a273640a9091528e99af.yaml @@ -0,0 +1,58 @@ +id: wpfrom-email-f018dd006c86a273640a9091528e99af + +info: + name: > + WPFrom Email <= 1.8.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24a041d0-d443-453d-bd7d-65cceee48b14?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfrom-email/" + google-query: inurl:"/wp-content/plugins/wpfrom-email/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfrom-email,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfrom-email/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfrom-email" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfront-notification-bar-450b5eb205eb4e03e4e00eea052c76d9.yaml b/nuclei-templates/cve-less/plugins/wpfront-notification-bar-450b5eb205eb4e03e4e00eea052c76d9.yaml new file mode 100644 index 0000000000..70b72df896 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfront-notification-bar-450b5eb205eb4e03e4e00eea052c76d9.yaml @@ -0,0 +1,58 @@ +id: wpfront-notification-bar-450b5eb205eb4e03e4e00eea052c76d9 + +info: + name: > + WPFront Notification Bar <= 3.3.2 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16b37992-a87e-42bb-ab0f-cb32506874e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfront-notification-bar/" + google-query: inurl:"/wp-content/plugins/wpfront-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfront-notification-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfront-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfront-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfront-notification-bar-88bd79040ab3368b09f14c252d140de8.yaml b/nuclei-templates/cve-less/plugins/wpfront-notification-bar-88bd79040ab3368b09f14c252d140de8.yaml new file mode 100644 index 0000000000..376632bc23 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfront-notification-bar-88bd79040ab3368b09f14c252d140de8.yaml @@ -0,0 +1,58 @@ +id: wpfront-notification-bar-88bd79040ab3368b09f14c252d140de8 + +info: + name: > + WPFront Notification Bar <= 2.0.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/97396207-4892-4d1a-8740-3000484f1317?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfront-notification-bar/" + google-query: inurl:"/wp-content/plugins/wpfront-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfront-notification-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfront-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfront-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfront-notification-bar-994b2a0046a121a24de62a7ef6f747b0.yaml b/nuclei-templates/cve-less/plugins/wpfront-notification-bar-994b2a0046a121a24de62a7ef6f747b0.yaml new file mode 100644 index 0000000000..c20fce5ee6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfront-notification-bar-994b2a0046a121a24de62a7ef6f747b0.yaml @@ -0,0 +1,58 @@ +id: wpfront-notification-bar-994b2a0046a121a24de62a7ef6f747b0 + +info: + name: > + WPFront Notification Bar <= 1.9.2 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58bdd837-adae-4fa9-9ca3-00633a6a1ede?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfront-notification-bar/" + google-query: inurl:"/wp-content/plugins/wpfront-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfront-notification-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfront-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfront-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfront-notification-bar-b0586fa88a487c798158f25ead9b6004.yaml b/nuclei-templates/cve-less/plugins/wpfront-notification-bar-b0586fa88a487c798158f25ead9b6004.yaml new file mode 100644 index 0000000000..c55812d3d5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfront-notification-bar-b0586fa88a487c798158f25ead9b6004.yaml @@ -0,0 +1,58 @@ +id: wpfront-notification-bar-b0586fa88a487c798158f25ead9b6004 + +info: + name: > + WPFront Notification Bar <= 3.3.2 - Authenticated (Admin+) Stored Cross-Site Scripting via wpfront-notification-bar-options[custom_class] + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19a5a9f3-637c-42af-9775-5651a14cf516?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfront-notification-bar/" + google-query: inurl:"/wp-content/plugins/wpfront-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfront-notification-bar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfront-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfront-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfront-scroll-top-357b47caf5db9e0098a5f7a1e50f8dc7.yaml b/nuclei-templates/cve-less/plugins/wpfront-scroll-top-357b47caf5db9e0098a5f7a1e50f8dc7.yaml new file mode 100644 index 0000000000..3c9502432d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfront-scroll-top-357b47caf5db9e0098a5f7a1e50f8dc7.yaml @@ -0,0 +1,58 @@ +id: wpfront-scroll-top-357b47caf5db9e0098a5f7a1e50f8dc7 + +info: + name: > + WPFront Scroll Top <= 2.0.5 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adb84461-6675-497f-ac53-cf72bd4c17bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfront-scroll-top/" + google-query: inurl:"/wp-content/plugins/wpfront-scroll-top/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfront-scroll-top,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfront-scroll-top/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfront-scroll-top" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-42deb2684c3eba9205d231d5d23306bf.yaml b/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-42deb2684c3eba9205d231d5d23306bf.yaml new file mode 100644 index 0000000000..c92cfd1ffa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-42deb2684c3eba9205d231d5d23306bf.yaml @@ -0,0 +1,58 @@ +id: wpfront-user-role-editor-42deb2684c3eba9205d231d5d23306bf + +info: + name: > + WPFront User Role Editor <= 3.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffd889b0-ff2e-469a-bd0b-f009cf773ade?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfront-user-role-editor/" + google-query: inurl:"/wp-content/plugins/wpfront-user-role-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfront-user-role-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfront-user-role-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfront-user-role-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-4836d612a10fff8d15b3666d7165500a.yaml b/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-4836d612a10fff8d15b3666d7165500a.yaml new file mode 100644 index 0000000000..ecacda0469 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-4836d612a10fff8d15b3666d7165500a.yaml @@ -0,0 +1,58 @@ +id: wpfront-user-role-editor-4836d612a10fff8d15b3666d7165500a + +info: + name: > + WPFront User Role Editor < 3.2.1.11184 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6338620f-925a-4226-9557-313a7f8a6b6a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfront-user-role-editor/" + google-query: inurl:"/wp-content/plugins/wpfront-user-role-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfront-user-role-editor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfront-user-role-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfront-user-role-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1.11184') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-94d9ce1faf35ceff75a34ff49e69f6d9.yaml b/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-94d9ce1faf35ceff75a34ff49e69f6d9.yaml new file mode 100644 index 0000000000..7510045a6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfront-user-role-editor-94d9ce1faf35ceff75a34ff49e69f6d9.yaml @@ -0,0 +1,58 @@ +id: wpfront-user-role-editor-94d9ce1faf35ceff75a34ff49e69f6d9 + +info: + name: > + WPFront User Role Editor <= 3.2.1.11184 - Limited Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/078a0647-fc3a-436c-bf00-8776b16e66ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfront-user-role-editor/" + google-query: inurl:"/wp-content/plugins/wpfront-user-role-editor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfront-user-role-editor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfront-user-role-editor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfront-user-role-editor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1.11184') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfunnels-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wpfunnels-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..7f43483513 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfunnels-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wpfunnels-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfunnels/" + google-query: inurl:"/wp-content/plugins/wpfunnels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfunnels,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfunnels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfunnels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfunnels-6ab516426049dc622ee1b94cc628b61c.yaml b/nuclei-templates/cve-less/plugins/wpfunnels-6ab516426049dc622ee1b94cc628b61c.yaml new file mode 100644 index 0000000000..c733628b8f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfunnels-6ab516426049dc622ee1b94cc628b61c.yaml @@ -0,0 +1,58 @@ +id: wpfunnels-6ab516426049dc622ee1b94cc628b61c + +info: + name: > + WPFunnels <= 3.0.6 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b028923-82fe-4dd6-af77-69d7744f2812?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfunnels/" + google-query: inurl:"/wp-content/plugins/wpfunnels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfunnels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfunnels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfunnels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfunnels-7a5213754c46194429382d819c00f511.yaml b/nuclei-templates/cve-less/plugins/wpfunnels-7a5213754c46194429382d819c00f511.yaml new file mode 100644 index 0000000000..77394c0e12 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfunnels-7a5213754c46194429382d819c00f511.yaml @@ -0,0 +1,58 @@ +id: wpfunnels-7a5213754c46194429382d819c00f511 + +info: + name: > + WPFunnels <= 2.7.16 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c1464ab-217e-4c66-94f8-49376755dba7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfunnels/" + google-query: inurl:"/wp-content/plugins/wpfunnels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfunnels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfunnels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfunnels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfunnels-9e38f58085aab4d926890f7398810c6b.yaml b/nuclei-templates/cve-less/plugins/wpfunnels-9e38f58085aab4d926890f7398810c6b.yaml new file mode 100644 index 0000000000..6862d875f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfunnels-9e38f58085aab4d926890f7398810c6b.yaml @@ -0,0 +1,58 @@ +id: wpfunnels-9e38f58085aab4d926890f7398810c6b + +info: + name: > + WPFunnels <= 2.7.15 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/50b26952-bf59-4236-93b4-6b4928609c15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfunnels/" + google-query: inurl:"/wp-content/plugins/wpfunnels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfunnels,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfunnels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfunnels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfunnels-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wpfunnels-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..95f5b1004c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfunnels-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wpfunnels-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfunnels/" + google-query: inurl:"/wp-content/plugins/wpfunnels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfunnels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfunnels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfunnels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpfunnels-c470f8f5625ce2e9f7a4e073bc31fb3b.yaml b/nuclei-templates/cve-less/plugins/wpfunnels-c470f8f5625ce2e9f7a4e073bc31fb3b.yaml new file mode 100644 index 0000000000..b96d452337 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpfunnels-c470f8f5625ce2e9f7a4e073bc31fb3b.yaml @@ -0,0 +1,58 @@ +id: wpfunnels-c470f8f5625ce2e9f7a4e073bc31fb3b + +info: + name: > + WPFunnels <= 2.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortocde + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ff43e5d-bffd-4e2b-a6de-938559cd6f02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfunnels/" + google-query: inurl:"/wp-content/plugins/wpfunnels/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfunnels,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfunnels/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfunnels" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgateway-e8e4caf35c45fbc7a371f3be1ae5a251.yaml b/nuclei-templates/cve-less/plugins/wpgateway-e8e4caf35c45fbc7a371f3be1ae5a251.yaml new file mode 100644 index 0000000000..fd588a9468 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgateway-e8e4caf35c45fbc7a371f3be1ae5a251.yaml @@ -0,0 +1,58 @@ +id: wpgateway-e8e4caf35c45fbc7a371f3be1ae5a251 + +info: + name: > + WPGateway <= 3.5 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b75c681-ecd2-4603-8819-07b2e9b8d547?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgateway/" + google-query: inurl:"/wp-content/plugins/wpgateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgateway,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgenious-job-listing-17d9d2647ecfd4b0be797349f3817c27.yaml b/nuclei-templates/cve-less/plugins/wpgenious-job-listing-17d9d2647ecfd4b0be797349f3817c27.yaml new file mode 100644 index 0000000000..3267be8d17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgenious-job-listing-17d9d2647ecfd4b0be797349f3817c27.yaml @@ -0,0 +1,58 @@ +id: wpgenious-job-listing-17d9d2647ecfd4b0be797349f3817c27 + +info: + name: > + WpGenius Job Listing <= 1.0.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/821b8ed1-10be-4798-826a-aaaef4888950?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgenious-job-listing/" + google-query: inurl:"/wp-content/plugins/wpgenious-job-listing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgenious-job-listing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgenious-job-listing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgenious-job-listing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgetapi-4c6d6429665eac8877ce0e75f13992a4.yaml b/nuclei-templates/cve-less/plugins/wpgetapi-4c6d6429665eac8877ce0e75f13992a4.yaml new file mode 100644 index 0000000000..737afc58e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgetapi-4c6d6429665eac8877ce0e75f13992a4.yaml @@ -0,0 +1,58 @@ +id: wpgetapi-4c6d6429665eac8877ce0e75f13992a4 + +info: + name: > + WPGetAPI 2.1.0 - 2.2.1 - Authenticated (Subscriber+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39003835-80df-49c7-982a-346bf328565c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgetapi/" + google-query: inurl:"/wp-content/plugins/wpgetapi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgetapi,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgetapi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgetapi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.1.0', '<= 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgform-44fe84770decd19120a8d913bc09bfe5.yaml b/nuclei-templates/cve-less/plugins/wpgform-44fe84770decd19120a8d913bc09bfe5.yaml new file mode 100644 index 0000000000..7a32228cd8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgform-44fe84770decd19120a8d913bc09bfe5.yaml @@ -0,0 +1,58 @@ +id: wpgform-44fe84770decd19120a8d913bc09bfe5 + +info: + name: > + Google Forms <= 0.95 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8035023c-347f-4227-98cb-5b277fba4812?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgform/" + google-query: inurl:"/wp-content/plugins/wpgform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.95') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgform-55aa46c17c94c8921a5e40ecf3701f67.yaml b/nuclei-templates/cve-less/plugins/wpgform-55aa46c17c94c8921a5e40ecf3701f67.yaml new file mode 100644 index 0000000000..7f74724020 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgform-55aa46c17c94c8921a5e40ecf3701f67.yaml @@ -0,0 +1,58 @@ +id: wpgform-55aa46c17c94c8921a5e40ecf3701f67 + +info: + name: > + Google Forms <= 0.90 - Unauthenticated PHP Object injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cadd47e9-1d5b-4f04-8421-7707dad53ea6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgform/" + google-query: inurl:"/wp-content/plugins/wpgform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgform-6647340253053f9bdb1fb3f23b4abe85.yaml b/nuclei-templates/cve-less/plugins/wpgform-6647340253053f9bdb1fb3f23b4abe85.yaml new file mode 100644 index 0000000000..6b1476b64e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgform-6647340253053f9bdb1fb3f23b4abe85.yaml @@ -0,0 +1,58 @@ +id: wpgform-6647340253053f9bdb1fb3f23b4abe85 + +info: + name: > + Google Forms < 0.85 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5394623b-e9ee-4047-bfe3-d7f6374993cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgform/" + google-query: inurl:"/wp-content/plugins/wpgform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.85') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgform-82c5164bc77f066c7a8d33b886720225.yaml b/nuclei-templates/cve-less/plugins/wpgform-82c5164bc77f066c7a8d33b886720225.yaml new file mode 100644 index 0000000000..6995527320 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgform-82c5164bc77f066c7a8d33b886720225.yaml @@ -0,0 +1,58 @@ +id: wpgform-82c5164bc77f066c7a8d33b886720225 + +info: + name: > + Google Forms <= 0.93 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/968ead80-eed6-4a42-a3cd-73cf4cbbb1e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgform/" + google-query: inurl:"/wp-content/plugins/wpgform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgform,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgform-b4ea588ba50958ad00d8b73f87c65822.yaml b/nuclei-templates/cve-less/plugins/wpgform-b4ea588ba50958ad00d8b73f87c65822.yaml new file mode 100644 index 0000000000..ff0a107928 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgform-b4ea588ba50958ad00d8b73f87c65822.yaml @@ -0,0 +1,58 @@ +id: wpgform-b4ea588ba50958ad00d8b73f87c65822 + +info: + name: > + Google Forms < 0.92 - Unauthenticated Server Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0c58c1c6-cdda-463c-9a76-4ace96138dcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgform/" + google-query: inurl:"/wp-content/plugins/wpgform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgform,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.92') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpglobus-3ba8578c9b517b602d4e446e82ee6f17.yaml b/nuclei-templates/cve-less/plugins/wpglobus-3ba8578c9b517b602d4e446e82ee6f17.yaml new file mode 100644 index 0000000000..982ff77546 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpglobus-3ba8578c9b517b602d4e446e82ee6f17.yaml @@ -0,0 +1,58 @@ +id: wpglobus-3ba8578c9b517b602d4e446e82ee6f17 + +info: + name: > + WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[post_type][page] + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c32824cc-8895-462f-bd5b-03b8da4db680?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpglobus/" + google-query: inurl:"/wp-content/plugins/wpglobus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpglobus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpglobus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpglobus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpglobus-485a36eabec5f4b9943990f0033b308d.yaml b/nuclei-templates/cve-less/plugins/wpglobus-485a36eabec5f4b9943990f0033b308d.yaml new file mode 100644 index 0000000000..1b1e194fa2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpglobus-485a36eabec5f4b9943990f0033b308d.yaml @@ -0,0 +1,58 @@ +id: wpglobus-485a36eabec5f4b9943990f0033b308d + +info: + name: > + WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[enabled_languages] + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab3033c5-95c3-44eb-8602-410288fc423f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpglobus/" + google-query: inurl:"/wp-content/plugins/wpglobus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpglobus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpglobus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpglobus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpglobus-83e2358dd513fd53b034068ccf305836.yaml b/nuclei-templates/cve-less/plugins/wpglobus-83e2358dd513fd53b034068ccf305836.yaml new file mode 100644 index 0000000000..706cede77b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpglobus-83e2358dd513fd53b034068ccf305836.yaml @@ -0,0 +1,58 @@ +id: wpglobus-83e2358dd513fd53b034068ccf305836 + +info: + name: > + WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Request Forgery to Cross-Site Scripting via wpglobus_option[selector_wp_list_pages][show_selector] + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b85b1e3-4eb0-4ba1-8d61-ec82fac123ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpglobus/" + google-query: inurl:"/wp-content/plugins/wpglobus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpglobus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpglobus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpglobus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpglobus-c384382f7d3c6321e1b275243f5d2c28.yaml b/nuclei-templates/cve-less/plugins/wpglobus-c384382f7d3c6321e1b275243f5d2c28.yaml new file mode 100644 index 0000000000..d5f983b643 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpglobus-c384382f7d3c6321e1b275243f5d2c28.yaml @@ -0,0 +1,58 @@ +id: wpglobus-c384382f7d3c6321e1b275243f5d2c28 + +info: + name: > + WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[more_languages] + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76b11177-782a-4d9c-a974-4cb9ff55fa99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpglobus/" + google-query: inurl:"/wp-content/plugins/wpglobus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpglobus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpglobus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpglobus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpglobus-ddb8a7f2865d6d7dbea16193f41bd919.yaml b/nuclei-templates/cve-less/plugins/wpglobus-ddb8a7f2865d6d7dbea16193f41bd919.yaml new file mode 100644 index 0000000000..17a5b41040 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpglobus-ddb8a7f2865d6d7dbea16193f41bd919.yaml @@ -0,0 +1,58 @@ +id: wpglobus-ddb8a7f2865d6d7dbea16193f41bd919 + +info: + name: > + WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[browser_redirect][redirect_by_language] + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c09536b3-9f8d-4b11-b69a-684b65078870?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpglobus/" + google-query: inurl:"/wp-content/plugins/wpglobus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpglobus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpglobus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpglobus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpglobus-e95762dedf29574050fd40fac42c78ac.yaml b/nuclei-templates/cve-less/plugins/wpglobus-e95762dedf29574050fd40fac42c78ac.yaml new file mode 100644 index 0000000000..3b3d6f8e58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpglobus-e95762dedf29574050fd40fac42c78ac.yaml @@ -0,0 +1,58 @@ +id: wpglobus-e95762dedf29574050fd40fac42c78ac + +info: + name: > + WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/113dcd4d-e62f-44dc-8087-28d265ef66be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpglobus/" + google-query: inurl:"/wp-content/plugins/wpglobus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpglobus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpglobus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpglobus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpglobus-f4fb22207f3c1928cb95d88c1e1f82b7.yaml b/nuclei-templates/cve-less/plugins/wpglobus-f4fb22207f3c1928cb95d88c1e1f82b7.yaml new file mode 100644 index 0000000000..294e7b9d29 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpglobus-f4fb22207f3c1928cb95d88c1e1f82b7.yaml @@ -0,0 +1,58 @@ +id: wpglobus-f4fb22207f3c1928cb95d88c1e1f82b7 + +info: + name: > + WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[post_type][post] + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90cd3722-c3cb-4ac3-871d-cacda49be294?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpglobus/" + google-query: inurl:"/wp-content/plugins/wpglobus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpglobus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpglobus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpglobus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpglobus-translate-options-db22094eea816af85bb6ec1f6633c114.yaml b/nuclei-templates/cve-less/plugins/wpglobus-translate-options-db22094eea816af85bb6ec1f6633c114.yaml new file mode 100644 index 0000000000..00ee832f03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpglobus-translate-options-db22094eea816af85bb6ec1f6633c114.yaml @@ -0,0 +1,58 @@ +id: wpglobus-translate-options-db22094eea816af85bb6ec1f6633c114 + +info: + name: > + WPGlobus Translate Options <= 2.1.0 - Reflected Cross-Site Scripting via page + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf0a1568-e97c-41ea-b2c3-ba335f0b4360?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpglobus-translate-options/" + google-query: inurl:"/wp-content/plugins/wpglobus-translate-options/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpglobus-translate-options,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpglobus-translate-options/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpglobus-translate-options" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgsi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wpgsi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a325461e5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgsi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wpgsi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgsi/" + google-query: inurl:"/wp-content/plugins/wpgsi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgsi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgsi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgsi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgsi-c60ee47fa89a26e43f0b2e6590ebf383.yaml b/nuclei-templates/cve-less/plugins/wpgsi-c60ee47fa89a26e43f0b2e6590ebf383.yaml new file mode 100644 index 0000000000..9b9699a45e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgsi-c60ee47fa89a26e43f0b2e6590ebf383.yaml @@ -0,0 +1,58 @@ +id: wpgsi-c60ee47fa89a26e43f0b2e6590ebf383 + +info: + name: > + Spreadsheet Integration and Spreadsheet Integration Pro <= 3.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a3dddda-3a65-42b6-9dc8-760bc3a24dcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgsi/" + google-query: inurl:"/wp-content/plugins/wpgsi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgsi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgsi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgsi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgsi-c6d9a7955a97d5139542746523314cb2.yaml b/nuclei-templates/cve-less/plugins/wpgsi-c6d9a7955a97d5139542746523314cb2.yaml new file mode 100644 index 0000000000..f8babf4824 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgsi-c6d9a7955a97d5139542746523314cb2.yaml @@ -0,0 +1,58 @@ +id: wpgsi-c6d9a7955a97d5139542746523314cb2 + +info: + name: > + Spreadsheet Integration and Spreadsheet Integration Pro <= 3.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/014da588-9494-493e-8659-590b8e8c14a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgsi/" + google-query: inurl:"/wp-content/plugins/wpgsi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgsi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgsi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgsi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgsi-professional-c60ee47fa89a26e43f0b2e6590ebf383.yaml b/nuclei-templates/cve-less/plugins/wpgsi-professional-c60ee47fa89a26e43f0b2e6590ebf383.yaml new file mode 100644 index 0000000000..e58702d78e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgsi-professional-c60ee47fa89a26e43f0b2e6590ebf383.yaml @@ -0,0 +1,58 @@ +id: wpgsi-professional-c60ee47fa89a26e43f0b2e6590ebf383 + +info: + name: > + Spreadsheet Integration and Spreadsheet Integration Pro <= 3.5.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a3dddda-3a65-42b6-9dc8-760bc3a24dcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgsi-professional/" + google-query: inurl:"/wp-content/plugins/wpgsi-professional/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgsi-professional,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgsi-professional/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgsi-professional" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgsi-professional-c6d9a7955a97d5139542746523314cb2.yaml b/nuclei-templates/cve-less/plugins/wpgsi-professional-c6d9a7955a97d5139542746523314cb2.yaml new file mode 100644 index 0000000000..defefef585 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgsi-professional-c6d9a7955a97d5139542746523314cb2.yaml @@ -0,0 +1,58 @@ +id: wpgsi-professional-c6d9a7955a97d5139542746523314cb2 + +info: + name: > + Spreadsheet Integration and Spreadsheet Integration Pro <= 3.5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/014da588-9494-493e-8659-590b8e8c14a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgsi-professional/" + google-query: inurl:"/wp-content/plugins/wpgsi-professional/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgsi-professional,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgsi-professional/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgsi-professional" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpgt-google-translate-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wpgt-google-translate-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..68292b9539 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpgt-google-translate-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wpgt-google-translate-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpgt-google-translate/" + google-query: inurl:"/wp-content/plugins/wpgt-google-translate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpgt-google-translate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpgt-google-translate/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpgt-google-translate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpheka-request-for-quote-5e98c4735eb20663ca1067da327e8606.yaml b/nuclei-templates/cve-less/plugins/wpheka-request-for-quote-5e98c4735eb20663ca1067da327e8606.yaml new file mode 100644 index 0000000000..b9da9c7f11 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpheka-request-for-quote-5e98c4735eb20663ca1067da327e8606.yaml @@ -0,0 +1,58 @@ +id: wpheka-request-for-quote-5e98c4735eb20663ca1067da327e8606 + +info: + name: > + Request for Quote < 1.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8429148b-e28e-4bb3-bd18-390216b74dc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpheka-request-for-quote/" + google-query: inurl:"/wp-content/plugins/wpheka-request-for-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpheka-request-for-quote,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpheka-request-for-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpheka-request-for-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wphotfiles-faa612ca5bdaf4285ef55a7ed1d04960.yaml b/nuclei-templates/cve-less/plugins/wphotfiles-faa612ca5bdaf4285ef55a7ed1d04960.yaml new file mode 100644 index 0000000000..1384f36ace --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wphotfiles-faa612ca5bdaf4285ef55a7ed1d04960.yaml @@ -0,0 +1,58 @@ +id: wphotfiles-faa612ca5bdaf4285ef55a7ed1d04960 + +info: + name: > + Hot Files: File Sharing and Download Manager Plugin <= 1.0.0 - Cross-Site scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4ce2353-e4ec-4f55-a341-c1b11be86642?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wphotfiles/" + google-query: inurl:"/wp-content/plugins/wphotfiles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wphotfiles,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wphotfiles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wphotfiles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpide-13d6d07ad8433fc4c13ab399af9c2000.yaml b/nuclei-templates/cve-less/plugins/wpide-13d6d07ad8433fc4c13ab399af9c2000.yaml new file mode 100644 index 0000000000..d3d7444265 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpide-13d6d07ad8433fc4c13ab399af9c2000.yaml @@ -0,0 +1,58 @@ +id: wpide-13d6d07ad8433fc4c13ab399af9c2000 + +info: + name: > + WPIDE – File Manager & Code Editor <= 2.6 - Authenticated (Admininstrator+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/67f143a4-2467-48cf-8024-8529ef4ed449?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpide/" + google-query: inurl:"/wp-content/plugins/wpide/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpide,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpide/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpide" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpide-a281a6daee68ba362dc7d77d71441ffb.yaml b/nuclei-templates/cve-less/plugins/wpide-a281a6daee68ba362dc7d77d71441ffb.yaml new file mode 100644 index 0000000000..4c07386e1c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpide-a281a6daee68ba362dc7d77d71441ffb.yaml @@ -0,0 +1,58 @@ +id: wpide-a281a6daee68ba362dc7d77d71441ffb + +info: + name: > + WPide <= 2.6 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c77db815-e401-4410-b6ec-e6668dd988ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpide/" + google-query: inurl:"/wp-content/plugins/wpide/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpide,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpide/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpide" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpide-ec9c194a00305798df823bbd977744c9.yaml b/nuclei-templates/cve-less/plugins/wpide-ec9c194a00305798df823bbd977744c9.yaml new file mode 100644 index 0000000000..51f7b7f012 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpide-ec9c194a00305798df823bbd977744c9.yaml @@ -0,0 +1,58 @@ +id: wpide-ec9c194a00305798df823bbd977744c9 + +info: + name: > + WPide <= 2.6 - Authenticated (Administrator+) Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63902f5b-98e2-4586-9e20-4b900b6f861a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpide/" + google-query: inurl:"/wp-content/plugins/wpide/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpide,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpide/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpide" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpify-woo-739e325811d595a476c8a9d5ed5b690b.yaml b/nuclei-templates/cve-less/plugins/wpify-woo-739e325811d595a476c8a9d5ed5b690b.yaml new file mode 100644 index 0000000000..2881523943 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpify-woo-739e325811d595a476c8a9d5ed5b690b.yaml @@ -0,0 +1,58 @@ +id: wpify-woo-739e325811d595a476c8a9d5ed5b690b + +info: + name: > + WPify Woo Czech <= 4.0.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/44f691f2-b3f4-49b7-8710-015b5b11db18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpify-woo/" + google-query: inurl:"/wp-content/plugins/wpify-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpify-woo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpify-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpify-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpify-woo-dd0249dc72735c5a5faff42cfa7f7ee0.yaml b/nuclei-templates/cve-less/plugins/wpify-woo-dd0249dc72735c5a5faff42cfa7f7ee0.yaml new file mode 100644 index 0000000000..93afb2750e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpify-woo-dd0249dc72735c5a5faff42cfa7f7ee0.yaml @@ -0,0 +1,58 @@ +id: wpify-woo-dd0249dc72735c5a5faff42cfa7f7ee0 + +info: + name: > + WPify Woo Czech <= 3.5.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a10da173-9b88-4599-928d-71fc42b35c50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpify-woo/" + google-query: inurl:"/wp-content/plugins/wpify-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpify-woo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpify-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpify-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpify-woo-f47e9f4ca218e71c08ad0ae51486eb67.yaml b/nuclei-templates/cve-less/plugins/wpify-woo-f47e9f4ca218e71c08ad0ae51486eb67.yaml new file mode 100644 index 0000000000..2720634d82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpify-woo-f47e9f4ca218e71c08ad0ae51486eb67.yaml @@ -0,0 +1,58 @@ +id: wpify-woo-f47e9f4ca218e71c08ad0ae51486eb67 + +info: + name: > + WPify Woo Czech <= 4.0.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2bafede8-9bd0-4c38-a402-42d419cc03fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpify-woo/" + google-query: inurl:"/wp-content/plugins/wpify-woo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpify-woo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpify-woo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpify-woo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpjam-basic-d8720ff7be23b66bec0bd659c201c502.yaml b/nuclei-templates/cve-less/plugins/wpjam-basic-d8720ff7be23b66bec0bd659c201c502.yaml new file mode 100644 index 0000000000..a0884edc59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpjam-basic-d8720ff7be23b66bec0bd659c201c502.yaml @@ -0,0 +1,58 @@ +id: wpjam-basic-d8720ff7be23b66bec0bd659c201c502 + +info: + name: > + WPJAM Basic <= 6.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a5ccc0b-a80a-41df-991c-5c356eb10512?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpjam-basic/" + google-query: inurl:"/wp-content/plugins/wpjam-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpjam-basic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpjam-basic/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpjam-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpjobboard-15e650b4ee038f777984c647938b664a.yaml b/nuclei-templates/cve-less/plugins/wpjobboard-15e650b4ee038f777984c647938b664a.yaml new file mode 100644 index 0000000000..b085633c74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpjobboard-15e650b4ee038f777984c647938b664a.yaml @@ -0,0 +1,58 @@ +id: wpjobboard-15e650b4ee038f777984c647938b664a + +info: + name: > + WP Job Board <= 4.4.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5bfedb93-76e6-4d3f-bf44-1e6d8947c7d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpjobboard/" + google-query: inurl:"/wp-content/plugins/wpjobboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpjobboard,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpjobboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpjobboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpjobboard-251f38cefaa8d1370dc48f71e7aae210.yaml b/nuclei-templates/cve-less/plugins/wpjobboard-251f38cefaa8d1370dc48f71e7aae210.yaml new file mode 100644 index 0000000000..8ad0ee552f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpjobboard-251f38cefaa8d1370dc48f71e7aae210.yaml @@ -0,0 +1,58 @@ +id: wpjobboard-251f38cefaa8d1370dc48f71e7aae210 + +info: + name: > + WPJobBoard <= 4.5.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fa1a551-36d4-488c-898a-3c13b509b8c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpjobboard/" + google-query: inurl:"/wp-content/plugins/wpjobboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpjobboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpjobboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpjobboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpjobboard-528b7498cac098c3cafe6540ba1e4135.yaml b/nuclei-templates/cve-less/plugins/wpjobboard-528b7498cac098c3cafe6540ba1e4135.yaml new file mode 100644 index 0000000000..6307ee89f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpjobboard-528b7498cac098c3cafe6540ba1e4135.yaml @@ -0,0 +1,58 @@ +id: wpjobboard-528b7498cac098c3cafe6540ba1e4135 + +info: + name: > + WPJobBoard <= 5.9.0 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8cd1d385-001c-4c84-9a80-553315336a63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpjobboard/" + google-query: inurl:"/wp-content/plugins/wpjobboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpjobboard,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpjobboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpjobboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpjobboard-52e9c784ee926500b6a7a44692c6aef8.yaml b/nuclei-templates/cve-less/plugins/wpjobboard-52e9c784ee926500b6a7a44692c6aef8.yaml new file mode 100644 index 0000000000..03d8d47f1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpjobboard-52e9c784ee926500b6a7a44692c6aef8.yaml @@ -0,0 +1,58 @@ +id: wpjobboard-52e9c784ee926500b6a7a44692c6aef8 + +info: + name: > + WPJobBoard <= 5.5.3 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90b97e57-a021-462c-b3d2-49cf959950dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpjobboard/" + google-query: inurl:"/wp-content/plugins/wpjobboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpjobboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpjobboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpjobboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpjobboard-81d15af02efd4bc202d6f72b6e97fc68.yaml b/nuclei-templates/cve-less/plugins/wpjobboard-81d15af02efd4bc202d6f72b6e97fc68.yaml new file mode 100644 index 0000000000..d1b8b6d3b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpjobboard-81d15af02efd4bc202d6f72b6e97fc68.yaml @@ -0,0 +1,58 @@ +id: wpjobboard-81d15af02efd4bc202d6f72b6e97fc68 + +info: + name: > + WPJobBoard <= 5.6.4 - Reflected Cross-Site Scripting & Cross-Frame Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/414013e9-5baa-4f4f-bf67-f0e821ece807?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpjobboard/" + google-query: inurl:"/wp-content/plugins/wpjobboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpjobboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpjobboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpjobboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpjobboard-b36f175e4f497082be7e93c3a08ddc08.yaml b/nuclei-templates/cve-less/plugins/wpjobboard-b36f175e4f497082be7e93c3a08ddc08.yaml new file mode 100644 index 0000000000..61ef2fbfa6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpjobboard-b36f175e4f497082be7e93c3a08ddc08.yaml @@ -0,0 +1,58 @@ +id: wpjobboard-b36f175e4f497082be7e93c3a08ddc08 + +info: + name: > + WPJobBoard <= 5.6.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bec7d613-b1cd-4a4e-bbd9-62bca3a864a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpjobboard/" + google-query: inurl:"/wp-content/plugins/wpjobboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpjobboard,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpjobboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpjobboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpkoi-templates-for-elementor-13b1426aee2c11f321401f7155b3cd3d.yaml b/nuclei-templates/cve-less/plugins/wpkoi-templates-for-elementor-13b1426aee2c11f321401f7155b3cd3d.yaml new file mode 100644 index 0000000000..4a119db4e0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpkoi-templates-for-elementor-13b1426aee2c11f321401f7155b3cd3d.yaml @@ -0,0 +1,58 @@ +id: wpkoi-templates-for-elementor-13b1426aee2c11f321401f7155b3cd3d + +info: + name: > + WPKoi Templates for Elementor <= 2.5.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Advanced Heading Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31f7ae51-2fb2-4311-bc78-7198d6e6b623?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpkoi-templates-for-elementor/" + google-query: inurl:"/wp-content/plugins/wpkoi-templates-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpkoi-templates-for-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpkoi-templates-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpkoi-templates-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wplegalpages-5ab744233de8cca4ab1cbaa602802c09.yaml b/nuclei-templates/cve-less/plugins/wplegalpages-5ab744233de8cca4ab1cbaa602802c09.yaml new file mode 100644 index 0000000000..8a0a4c4bee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wplegalpages-5ab744233de8cca4ab1cbaa602802c09.yaml @@ -0,0 +1,58 @@ +id: wplegalpages-5ab744233de8cca4ab1cbaa602802c09 + +info: + name: > + Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WPLegalPages < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/805e3eba-639e-48a1-a867-a2c56fa01081?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wplegalpages/" + google-query: inurl:"/wp-content/plugins/wplegalpages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wplegalpages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wplegalpages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplegalpages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wplegalpages-7251846dd87f32952c517012f5416bb3.yaml b/nuclei-templates/cve-less/plugins/wplegalpages-7251846dd87f32952c517012f5416bb3.yaml new file mode 100644 index 0000000000..52185a1e7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wplegalpages-7251846dd87f32952c517012f5416bb3.yaml @@ -0,0 +1,58 @@ +id: wplegalpages-7251846dd87f32952c517012f5416bb3 + +info: + name: > + WPLegalPages <= 2.9.2 - Authenticated (Author+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68d7b5d0-c777-4ff9-bdef-a7762cfbdf1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wplegalpages/" + google-query: inurl:"/wp-content/plugins/wplegalpages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wplegalpages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wplegalpages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplegalpages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wplegalpages-aa2d32a6da076063dc14a9036390d1fe.yaml b/nuclei-templates/cve-less/plugins/wplegalpages-aa2d32a6da076063dc14a9036390d1fe.yaml new file mode 100644 index 0000000000..da211602ea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wplegalpages-aa2d32a6da076063dc14a9036390d1fe.yaml @@ -0,0 +1,58 @@ +id: wplegalpages-aa2d32a6da076063dc14a9036390d1fe + +info: + name: > + Privacy Policy Generator, Terms & Conditions Generator - WPLegalPages <= 2.7.0 - Arbitrary Settings Update to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e85adbd-7e82-4949-916b-20aba1f97bf1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wplegalpages/" + google-query: inurl:"/wp-content/plugins/wplegalpages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wplegalpages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wplegalpages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplegalpages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wplite-3910ec4d645c60375887481edfe719b7.yaml b/nuclei-templates/cve-less/plugins/wplite-3910ec4d645c60375887481edfe719b7.yaml new file mode 100644 index 0000000000..a581ad92cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wplite-3910ec4d645c60375887481edfe719b7.yaml @@ -0,0 +1,58 @@ +id: wplite-3910ec4d645c60375887481edfe719b7 + +info: + name: > + WPlite <= 1.3.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3503c7bf-5e96-4033-89c1-b7c13c5489d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wplite/" + google-query: inurl:"/wp-content/plugins/wplite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wplite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wplite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wplocalplus-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wplocalplus-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6d545abde5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wplocalplus-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wplocalplus-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wplocalplus-lite/" + google-query: inurl:"/wp-content/plugins/wplocalplus-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wplocalplus-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wplocalplus-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplocalplus-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wplr-sync-3bdb0d0ea9cf8219d34566c6858ae4f8.yaml b/nuclei-templates/cve-less/plugins/wplr-sync-3bdb0d0ea9cf8219d34566c6858ae4f8.yaml new file mode 100644 index 0000000000..8daccac0bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wplr-sync-3bdb0d0ea9cf8219d34566c6858ae4f8.yaml @@ -0,0 +1,58 @@ +id: wplr-sync-3bdb0d0ea9cf8219d34566c6858ae4f8 + +info: + name: > + Photo Engine <= 6.2.5 - Authenticated (Author+) Insecure Direct Object Reference in ajax_generate_auth_token + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db6bec6c-77d1-4dab-9893-cf33a2fac629?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wplr-sync/" + google-query: inurl:"/wp-content/plugins/wplr-sync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wplr-sync,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wplr-sync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplr-sync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpmailer-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wpmailer-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..47216c052c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpmailer-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wpmailer-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpmailer/" + google-query: inurl:"/wp-content/plugins/wpmailer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpmailer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpmailer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpmailer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpmandrill-12a5a8360002b901fa077eaf0cb0a07a.yaml b/nuclei-templates/cve-less/plugins/wpmandrill-12a5a8360002b901fa077eaf0cb0a07a.yaml new file mode 100644 index 0000000000..3d16a79ecc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpmandrill-12a5a8360002b901fa077eaf0cb0a07a.yaml @@ -0,0 +1,58 @@ +id: wpmandrill-12a5a8360002b901fa077eaf0cb0a07a + +info: + name: > + wpMandrill <= 1.33 - Missing Authorization via getAjaxStats + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b89cf8ef-9fa0-4ede-8ec9-c166d0db74fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpmandrill/" + google-query: inurl:"/wp-content/plugins/wpmandrill/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpmandrill,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpmandrill/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpmandrill" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpmarketplace-1c957d73e722d9ee39589589b266de33.yaml b/nuclei-templates/cve-less/plugins/wpmarketplace-1c957d73e722d9ee39589589b266de33.yaml new file mode 100644 index 0000000000..5193908a1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpmarketplace-1c957d73e722d9ee39589589b266de33.yaml @@ -0,0 +1,58 @@ +id: wpmarketplace-1c957d73e722d9ee39589589b266de33 + +info: + name: > + Marketplace <= 2.4.0 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e834db1-0859-4e58-a11c-96e8f201b097?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpmarketplace/" + google-query: inurl:"/wp-content/plugins/wpmarketplace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpmarketplace,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpmarketplace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpmarketplace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpmarketplace-8cc608a635186c89042b092a2deb5e86.yaml b/nuclei-templates/cve-less/plugins/wpmarketplace-8cc608a635186c89042b092a2deb5e86.yaml new file mode 100644 index 0000000000..0ffdc9de6c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpmarketplace-8cc608a635186c89042b092a2deb5e86.yaml @@ -0,0 +1,58 @@ +id: wpmarketplace-8cc608a635186c89042b092a2deb5e86 + +info: + name: > + WP Marketplace – Complete Shopping Cart / eCommerce Solution <= 2.4.0 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/091b2d1d-983a-45ab-935e-635991e8bc8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpmarketplace/" + google-query: inurl:"/wp-content/plugins/wpmarketplace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpmarketplace,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpmarketplace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpmarketplace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpmarketplace-a7e8497ccc525908d871f8d3891b7252.yaml b/nuclei-templates/cve-less/plugins/wpmarketplace-a7e8497ccc525908d871f8d3891b7252.yaml new file mode 100644 index 0000000000..3635df1805 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpmarketplace-a7e8497ccc525908d871f8d3891b7252.yaml @@ -0,0 +1,58 @@ +id: wpmarketplace-a7e8497ccc525908d871f8d3891b7252 + +info: + name: > + WP Marketplace – Complete Shopping Cart / eCommerce Solution <= 1.2.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d257d0e0-7e42-49d5-83c6-f5c44f2e15fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpmarketplace/" + google-query: inurl:"/wp-content/plugins/wpmarketplace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpmarketplace,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpmarketplace/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpmarketplace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpml-b794db11782c303b2a81b056287603af.yaml b/nuclei-templates/cve-less/plugins/wpml-b794db11782c303b2a81b056287603af.yaml new file mode 100644 index 0000000000..29f5a498ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpml-b794db11782c303b2a81b056287603af.yaml @@ -0,0 +1,58 @@ +id: wpml-b794db11782c303b2a81b056287603af + +info: + name: > + WPML <= 4.6.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5639c00-f34c-45e3-8ff1-dfde7856a80e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpml/" + google-query: inurl:"/wp-content/plugins/wpml/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpml,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpml/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpml" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpml-cb38c4c6a570ec5691624654c5d4d34c.yaml b/nuclei-templates/cve-less/plugins/wpml-cb38c4c6a570ec5691624654c5d4d34c.yaml new file mode 100644 index 0000000000..1126644c69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpml-cb38c4c6a570ec5691624654c5d4d34c.yaml @@ -0,0 +1,58 @@ +id: wpml-cb38c4c6a570ec5691624654c5d4d34c + +info: + name: > + WPML < 3.1.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/884973e2-3836-448f-8c0d-1235fb2c09b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpml/" + google-query: inurl:"/wp-content/plugins/wpml/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpml,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpml/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpml" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpml-string-translation-18e8b80c2622db130ba5596fe32dcfee.yaml b/nuclei-templates/cve-less/plugins/wpml-string-translation-18e8b80c2622db130ba5596fe32dcfee.yaml new file mode 100644 index 0000000000..a76e8c3374 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpml-string-translation-18e8b80c2622db130ba5596fe32dcfee.yaml @@ -0,0 +1,58 @@ +id: wpml-string-translation-18e8b80c2622db130ba5596fe32dcfee + +info: + name: > + WPML String Translation <= 3.2.5 - Authenticated (Administrator+) SQL Injection via 'context' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e8f224c-cd22-4926-be24-9da2f22afa50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpml-string-translation/" + google-query: inurl:"/wp-content/plugins/wpml-string-translation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpml-string-translation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpml-string-translation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpml-string-translation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpo365-login-41c658cc02437ea28ef89a50228368a2.yaml b/nuclei-templates/cve-less/plugins/wpo365-login-41c658cc02437ea28ef89a50228368a2.yaml new file mode 100644 index 0000000000..9ff9a154cc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpo365-login-41c658cc02437ea28ef89a50228368a2.yaml @@ -0,0 +1,58 @@ +id: wpo365-login-41c658cc02437ea28ef89a50228368a2 + +info: + name: > + WordPress + Microsoft Office 365 / Azure AD | LOGIN <= 15.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd552e86-5f0f-4203-b648-f069503b48e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpo365-login/" + google-query: inurl:"/wp-content/plugins/wpo365-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpo365-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpo365-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpo365-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpo365-login-fa8823b3be9be96069014fd7460133fa.yaml b/nuclei-templates/cve-less/plugins/wpo365-login-fa8823b3be9be96069014fd7460133fa.yaml new file mode 100644 index 0000000000..53b8da4498 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpo365-login-fa8823b3be9be96069014fd7460133fa.yaml @@ -0,0 +1,58 @@ +id: wpo365-login-fa8823b3be9be96069014fd7460133fa + +info: + name: > + WPO365 | LOGIN <= 11.6 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d4cf93d-61af-4721-9751-9891e08ce7b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpo365-login/" + google-query: inurl:"/wp-content/plugins/wpo365-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpo365-login,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpo365-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpo365-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpopal-core-features-e2fa4c8a4519773eef901f4abb2bc665.yaml b/nuclei-templates/cve-less/plugins/wpopal-core-features-e2fa4c8a4519773eef901f4abb2bc665.yaml new file mode 100644 index 0000000000..19aea66de0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpopal-core-features-e2fa4c8a4519773eef901f4abb2bc665.yaml @@ -0,0 +1,58 @@ +id: wpopal-core-features-e2fa4c8a4519773eef901f4abb2bc665 + +info: + name: > + CSSTidy - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb534d86-c477-4a9c-b048-2fbc002168b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpopal-core-features/" + google-query: inurl:"/wp-content/plugins/wpopal-core-features/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpopal-core-features,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpopal-core-features/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpopal-core-features" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpoptin-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wpoptin-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0bb2c7a8c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpoptin-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wpoptin-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpoptin/" + google-query: inurl:"/wp-content/plugins/wpoptin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpoptin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpoptin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpoptin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wppageflip-92ae3c7f62669bb059cdddeab166dfdd.yaml b/nuclei-templates/cve-less/plugins/wppageflip-92ae3c7f62669bb059cdddeab166dfdd.yaml new file mode 100644 index 0000000000..d82a5331f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wppageflip-92ae3c7f62669bb059cdddeab166dfdd.yaml @@ -0,0 +1,58 @@ +id: wppageflip-92ae3c7f62669bb059cdddeab166dfdd + +info: + name: > + A Page Flip Book < 3.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b291ed6f-0998-40fc-a628-4df6416c9fc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wppageflip/" + google-query: inurl:"/wp-content/plugins/wppageflip/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wppageflip,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wppageflip/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wppageflip" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wppdf-2bf5272ec6d886fad7b7b1d47db7c04d.yaml b/nuclei-templates/cve-less/plugins/wppdf-2bf5272ec6d886fad7b7b1d47db7c04d.yaml new file mode 100644 index 0000000000..d3b0d98a1d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wppdf-2bf5272ec6d886fad7b7b1d47db7c04d.yaml @@ -0,0 +1,58 @@ +id: wppdf-2bf5272ec6d886fad7b7b1d47db7c04d + +info: + name: > + Responsive flipbook <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3de98970-06a3-4bde-a7cb-42b6456fea6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wppdf/" + google-query: inurl:"/wp-content/plugins/wppdf/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wppdf,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wppdf/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wppdf" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpperformancetester-f14cc7b2edd1a1231a45d376dd4df337.yaml b/nuclei-templates/cve-less/plugins/wpperformancetester-f14cc7b2edd1a1231a45d376dd4df337.yaml new file mode 100644 index 0000000000..8c1bf981d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpperformancetester-f14cc7b2edd1a1231a45d376dd4df337.yaml @@ -0,0 +1,58 @@ +id: wpperformancetester-f14cc7b2edd1a1231a45d376dd4df337 + +info: + name: > + WPPerformanceTester <= 2.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fb35366-b09c-4667-8fb9-6f80ba6d09f0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpperformancetester/" + google-query: inurl:"/wp-content/plugins/wpperformancetester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpperformancetester,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpperformancetester/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpperformancetester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wppizza-32909284311b9711b0c941168cf05813.yaml b/nuclei-templates/cve-less/plugins/wppizza-32909284311b9711b0c941168cf05813.yaml new file mode 100644 index 0000000000..964f680511 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wppizza-32909284311b9711b0c941168cf05813.yaml @@ -0,0 +1,58 @@ +id: wppizza-32909284311b9711b0c941168cf05813 + +info: + name: > + WPPizza <= 3.17.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/225ac126-7448-4faf-92c7-ee96831b272e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wppizza/" + google-query: inurl:"/wp-content/plugins/wppizza/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wppizza,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wppizza/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wppizza" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.17.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wppizza-81f88656b7bb4f363fcac664b1d8935a.yaml b/nuclei-templates/cve-less/plugins/wppizza-81f88656b7bb4f363fcac664b1d8935a.yaml new file mode 100644 index 0000000000..374f99cd33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wppizza-81f88656b7bb4f363fcac664b1d8935a.yaml @@ -0,0 +1,58 @@ +id: wppizza-81f88656b7bb4f363fcac664b1d8935a + +info: + name: > + WPPizza <= 3.18.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccfdb5f5-8417-44a3-a27c-157a9619c68b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wppizza/" + google-query: inurl:"/wp-content/plugins/wppizza/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wppizza,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wppizza/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wppizza" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.18.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wppizza-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/cve-less/plugins/wppizza-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml new file mode 100644 index 0000000000..db80b832f1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wppizza-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -0,0 +1,58 @@ +id: wppizza-af71bdcfe6e10b4aec22bfd701d5b3f4 + +info: + name: > + PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2cc5962f-4d3c-43ea-996b-a5bb3d0dccef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wppizza/" + google-query: inurl:"/wp-content/plugins/wppizza/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wppizza,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wppizza/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wppizza" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.11.8.18') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wppizza-e4bdb79e642b57f61de774ae24d8a0ad.yaml b/nuclei-templates/cve-less/plugins/wppizza-e4bdb79e642b57f61de774ae24d8a0ad.yaml new file mode 100644 index 0000000000..e6365e1523 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wppizza-e4bdb79e642b57f61de774ae24d8a0ad.yaml @@ -0,0 +1,58 @@ +id: wppizza-e4bdb79e642b57f61de774ae24d8a0ad + +info: + name: > + WPPizza <= 3.18.10 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecc00cbc-ec65-4664-8ec6-8cfb47196ec1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wppizza/" + google-query: inurl:"/wp-content/plugins/wppizza/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wppizza,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wppizza/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wppizza" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.18.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wppm-11e0416c47cc399cafbb7b5feca59d4c.yaml b/nuclei-templates/cve-less/plugins/wppm-11e0416c47cc399cafbb7b5feca59d4c.yaml new file mode 100644 index 0000000000..094cdadfd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wppm-11e0416c47cc399cafbb7b5feca59d4c.yaml @@ -0,0 +1,58 @@ +id: wppm-11e0416c47cc399cafbb7b5feca59d4c + +info: + name: > + WP Plugin Manager (wppm) <= 1.6.4.b - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa178e13-b4a5-4847-ac0e-9f14f8c9b446?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wppm/" + google-query: inurl:"/wp-content/plugins/wppm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wppm,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wppm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wppm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4.b') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpqa-399a0cfb0032357f26f899d011d7490f.yaml b/nuclei-templates/cve-less/plugins/wpqa-399a0cfb0032357f26f899d011d7490f.yaml new file mode 100644 index 0000000000..0d964ae3d4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpqa-399a0cfb0032357f26f899d011d7490f.yaml @@ -0,0 +1,58 @@ +id: wpqa-399a0cfb0032357f26f899d011d7490f + +info: + name: > + WPQA - Builder forms Addon For WordPress < 5.2 - Stored Cross-Site Scripting via Profile fields + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/082b57a9-4703-4908-9119-47fc4034c35d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpqa/" + google-query: inurl:"/wp-content/plugins/wpqa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpqa,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpqa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpqa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpqa-5cfa8b6a040b435f7a92a3787291a533.yaml b/nuclei-templates/cve-less/plugins/wpqa-5cfa8b6a040b435f7a92a3787291a533.yaml new file mode 100644 index 0000000000..9639c35aea --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpqa-5cfa8b6a040b435f7a92a3787291a533.yaml @@ -0,0 +1,58 @@ +id: wpqa-5cfa8b6a040b435f7a92a3787291a533 + +info: + name: > + WPQA - Builder forms Addon For WordPress < 5.7 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd7b72bb-2cf7-4a8d-b323-66c94b500cb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpqa/" + google-query: inurl:"/wp-content/plugins/wpqa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpqa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpqa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpqa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpqa-a41befce41d6aff1f7ad093dd0e01517.yaml b/nuclei-templates/cve-less/plugins/wpqa-a41befce41d6aff1f7ad093dd0e01517.yaml new file mode 100644 index 0000000000..2fb658569b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpqa-a41befce41d6aff1f7ad093dd0e01517.yaml @@ -0,0 +1,58 @@ +id: wpqa-a41befce41d6aff1f7ad093dd0e01517 + +info: + name: > + WPQA - Builder forms Addon For WordPress < 5.2 - Insecure Direct Object Reference to Profile Picture Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df0dcdf4-fcb1-4832-b39b-4ec3ee980506?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpqa/" + google-query: inurl:"/wp-content/plugins/wpqa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpqa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpqa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpqa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpqa-c453f0ecd6a4881debc7f71c36086298.yaml b/nuclei-templates/cve-less/plugins/wpqa-c453f0ecd6a4881debc7f71c36086298.yaml new file mode 100644 index 0000000000..e5d9e45981 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpqa-c453f0ecd6a4881debc7f71c36086298.yaml @@ -0,0 +1,58 @@ +id: wpqa-c453f0ecd6a4881debc7f71c36086298 + +info: + name: > + WPQA < 5.9 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a86301cd-1268-4168-a8e7-6946711dc256?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpqa/" + google-query: inurl:"/wp-content/plugins/wpqa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpqa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpqa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpqa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpqa-c890a2d3e19ae2099edf204803cc83b0.yaml b/nuclei-templates/cve-less/plugins/wpqa-c890a2d3e19ae2099edf204803cc83b0.yaml new file mode 100644 index 0000000000..e9395075a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpqa-c890a2d3e19ae2099edf204803cc83b0.yaml @@ -0,0 +1,58 @@ +id: wpqa-c890a2d3e19ae2099edf204803cc83b0 + +info: + name: > + WPQA - Builder forms Addon For WordPress <= 5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b5fb356-df9a-45c1-a663-b762ca1b65c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpqa/" + google-query: inurl:"/wp-content/plugins/wpqa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpqa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpqa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpqa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpqa-dd3fead301df531f0d1ae759b6afb54b.yaml b/nuclei-templates/cve-less/plugins/wpqa-dd3fead301df531f0d1ae759b6afb54b.yaml new file mode 100644 index 0000000000..fce46f385a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpqa-dd3fead301df531f0d1ae759b6afb54b.yaml @@ -0,0 +1,58 @@ +id: wpqa-dd3fead301df531f0d1ae759b6afb54b + +info: + name: > + WPQA - Builder forms Addon For WordPress <= 5.4 - Unauthenticated Private Message Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/048c37c2-0ace-4bf1-8cb8-554c4645be21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpqa/" + google-query: inurl:"/wp-content/plugins/wpqa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpqa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpqa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpqa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpqa-dda12396183ee405a0b6804083230616.yaml b/nuclei-templates/cve-less/plugins/wpqa-dda12396183ee405a0b6804083230616.yaml new file mode 100644 index 0000000000..60168a68bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpqa-dda12396183ee405a0b6804083230616.yaml @@ -0,0 +1,58 @@ +id: wpqa-dda12396183ee405a0b6804083230616 + +info: + name: > + WPQA - Builder forms Addon For WordPress (<= 5.9.2), Himer (<= 1.9.3) and Discy (<= 5.5.3) - Authenticated (Subscriber+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/085da0fa-9487-4938-94ea-c1593be7c023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpqa/" + google-query: inurl:"/wp-content/plugins/wpqa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpqa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpqa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpqa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpqa-dfd03ed6db32c6975ee246c21a630603.yaml b/nuclei-templates/cve-less/plugins/wpqa-dfd03ed6db32c6975ee246c21a630603.yaml new file mode 100644 index 0000000000..10f97d66cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpqa-dfd03ed6db32c6975ee246c21a630603.yaml @@ -0,0 +1,58 @@ +id: wpqa-dfd03ed6db32c6975ee246c21a630603 + +info: + name: > + WPQA - Builder forms Addon For WordPress < 5.2 - Insecure Direct Object Reference to Private Message Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56036bb2-3af3-4f69-ab79-78c5bb266231?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpqa/" + google-query: inurl:"/wp-content/plugins/wpqa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpqa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpqa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpqa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpremote-8861d9073cc3a63b6e47dd25252b2b60.yaml b/nuclei-templates/cve-less/plugins/wpremote-8861d9073cc3a63b6e47dd25252b2b60.yaml new file mode 100644 index 0000000000..911aa9db9b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpremote-8861d9073cc3a63b6e47dd25252b2b60.yaml @@ -0,0 +1,58 @@ +id: wpremote-8861d9073cc3a63b6e47dd25252b2b60 + +info: + name: > + The WP Remote WordPress Plugin <= 4.64 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/769fbe66-fcf5-4b16-8cc3-7c9bc561257a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpremote/" + google-query: inurl:"/wp-content/plugins/wpremote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpremote,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpremote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpremote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.64') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-bidouille-94445150de831d7b0c3c55471e2a0bcf.yaml b/nuclei-templates/cve-less/plugins/wps-bidouille-94445150de831d7b0c3c55471e2a0bcf.yaml new file mode 100644 index 0000000000..cfc53d4bc1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-bidouille-94445150de831d7b0c3c55471e2a0bcf.yaml @@ -0,0 +1,58 @@ +id: wps-bidouille-94445150de831d7b0c3c55471e2a0bcf + +info: + name: > + WPS Bidouille <= 1.12.2 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ddc4593-bdb4-4b01-be28-4317c76ae6b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-bidouille/" + google-query: inurl:"/wp-content/plugins/wps-bidouille/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-bidouille,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-bidouille/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-bidouille" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-child-theme-generator-272502bd23e70077d3c0e25865267220.yaml b/nuclei-templates/cve-less/plugins/wps-child-theme-generator-272502bd23e70077d3c0e25865267220.yaml new file mode 100644 index 0000000000..a148e0d344 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-child-theme-generator-272502bd23e70077d3c0e25865267220.yaml @@ -0,0 +1,58 @@ +id: wps-child-theme-generator-272502bd23e70077d3c0e25865267220 + +info: + name: > + WPS Child Theme Generator < 1.2 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c0bd6ee-da23-4e1e-9dbc-1ee4a111f7f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-child-theme-generator/" + google-query: inurl:"/wp-content/plugins/wps-child-theme-generator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-child-theme-generator,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-child-theme-generator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-child-theme-generator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-cleaner-486e0efe0e6e4cb2a652ed1f5a6563b0.yaml b/nuclei-templates/cve-less/plugins/wps-cleaner-486e0efe0e6e4cb2a652ed1f5a6563b0.yaml new file mode 100644 index 0000000000..a497a9742b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-cleaner-486e0efe0e6e4cb2a652ed1f5a6563b0.yaml @@ -0,0 +1,58 @@ +id: wps-cleaner-486e0efe0e6e4cb2a652ed1f5a6563b0 + +info: + name: > + WPS Cleaner <= 1.4.4 - Arbitrary Media File Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bd04a52-ed59-4305-831e-646ab5801d36?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-cleaner/" + google-query: inurl:"/wp-content/plugins/wps-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-cleaner,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-cleaner-7f379444fd295591b6061598a142cc5d.yaml b/nuclei-templates/cve-less/plugins/wps-cleaner-7f379444fd295591b6061598a142cc5d.yaml new file mode 100644 index 0000000000..2950308188 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-cleaner-7f379444fd295591b6061598a142cc5d.yaml @@ -0,0 +1,58 @@ +id: wps-cleaner-7f379444fd295591b6061598a142cc5d + +info: + name: > + WPS Cleaner <= 1.4.4 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb147a5d-65ad-4304-b13a-670f11398e63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-cleaner/" + google-query: inurl:"/wp-content/plugins/wps-cleaner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-cleaner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-cleaner/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-cleaner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-hide-login-631db0a162eaa0bf7ba9778e5dde5467.yaml b/nuclei-templates/cve-less/plugins/wps-hide-login-631db0a162eaa0bf7ba9778e5dde5467.yaml new file mode 100644 index 0000000000..0f9d2cf45d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-hide-login-631db0a162eaa0bf7ba9778e5dde5467.yaml @@ -0,0 +1,58 @@ +id: wps-hide-login-631db0a162eaa0bf7ba9778e5dde5467 + +info: + name: > + WPS Hide Login <= 1.5.2.2 - Login Page Disclosure via 'action=rp' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d106394-0dad-4d96-9063-6824fce65bdd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-hide-login/" + google-query: inurl:"/wp-content/plugins/wps-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-hide-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-hide-login-7c05693517b55b87f0d7f83514eb2c07.yaml b/nuclei-templates/cve-less/plugins/wps-hide-login-7c05693517b55b87f0d7f83514eb2c07.yaml new file mode 100644 index 0000000000..a89ea369f8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-hide-login-7c05693517b55b87f0d7f83514eb2c07.yaml @@ -0,0 +1,58 @@ +id: wps-hide-login-7c05693517b55b87f0d7f83514eb2c07 + +info: + name: > + WPS Hide Login <= 1.9.11 - Hidden Login Page Location Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb81e90f-8da4-483c-9bc1-18b6c016df5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-hide-login/" + google-query: inurl:"/wp-content/plugins/wps-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-hide-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-hide-login-db674a6de8d9817e777becabcbbc904f.yaml b/nuclei-templates/cve-less/plugins/wps-hide-login-db674a6de8d9817e777becabcbbc904f.yaml new file mode 100644 index 0000000000..ec93fccf96 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-hide-login-db674a6de8d9817e777becabcbbc904f.yaml @@ -0,0 +1,58 @@ +id: wps-hide-login-db674a6de8d9817e777becabcbbc904f + +info: + name: > + WPS Hide Login <= 1.5.2.2 - Login Page Disclosure via 'action=confirmaction' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db3724bf-35bb-4e28-b5e2-1bbc96adc7b6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-hide-login/" + google-query: inurl:"/wp-content/plugins/wps-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-hide-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-hide-login-e36199753fc8222b9a4c8dc023f4878a.yaml b/nuclei-templates/cve-less/plugins/wps-hide-login-e36199753fc8222b9a4c8dc023f4878a.yaml new file mode 100644 index 0000000000..002d6cd919 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-hide-login-e36199753fc8222b9a4c8dc023f4878a.yaml @@ -0,0 +1,58 @@ +id: wps-hide-login-e36199753fc8222b9a4c8dc023f4878a + +info: + name: > + WPS Hide Login <= 1.5.4.2 - Hidden Login Page Location Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7808329f-1688-480c-a83c-c4ab2fa86da6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-hide-login/" + google-query: inurl:"/wp-content/plugins/wps-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-hide-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-hide-login-e8798ed63a85d45d71422ad1f5961970.yaml b/nuclei-templates/cve-less/plugins/wps-hide-login-e8798ed63a85d45d71422ad1f5961970.yaml new file mode 100644 index 0000000000..5eabee476f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-hide-login-e8798ed63a85d45d71422ad1f5961970.yaml @@ -0,0 +1,58 @@ +id: wps-hide-login-e8798ed63a85d45d71422ad1f5961970 + +info: + name: > + WPS Hide Login <= 1.9.0 - Hidden Login Page Location Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e0e503f4-5864-49f0-aa52-6a44af5e8087?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-hide-login/" + google-query: inurl:"/wp-content/plugins/wps-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-hide-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-hide-login-eb378c658d67b036fda08c9801554621.yaml b/nuclei-templates/cve-less/plugins/wps-hide-login-eb378c658d67b036fda08c9801554621.yaml new file mode 100644 index 0000000000..53bb059746 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-hide-login-eb378c658d67b036fda08c9801554621.yaml @@ -0,0 +1,58 @@ +id: wps-hide-login-eb378c658d67b036fda08c9801554621 + +info: + name: > + WPS Hide Login <= 1.5.2.2 - Login Page Disclosure via 'adminhash' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7076c253-91ac-46b4-91ad-89a296408959?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-hide-login/" + google-query: inurl:"/wp-content/plugins/wps-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-hide-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-hide-login-efc5740c90ff0a59809e4e9849d0d149.yaml b/nuclei-templates/cve-less/plugins/wps-hide-login-efc5740c90ff0a59809e4e9849d0d149.yaml new file mode 100644 index 0000000000..311e07a19c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-hide-login-efc5740c90ff0a59809e4e9849d0d149.yaml @@ -0,0 +1,58 @@ +id: wps-hide-login-efc5740c90ff0a59809e4e9849d0d149 + +info: + name: > + WPS Hide Login <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9c7cf6f9-6fd0-487f-93cf-516b52736512?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-hide-login/" + google-query: inurl:"/wp-content/plugins/wps-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-hide-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-hide-login-ffe4a494ba525ff7867c7e82eb26993d.yaml b/nuclei-templates/cve-less/plugins/wps-hide-login-ffe4a494ba525ff7867c7e82eb26993d.yaml new file mode 100644 index 0000000000..fde6886384 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-hide-login-ffe4a494ba525ff7867c7e82eb26993d.yaml @@ -0,0 +1,58 @@ +id: wps-hide-login-ffe4a494ba525ff7867c7e82eb26993d + +info: + name: > + WPS Hide Login <= 1.5.2.2 - Login Page Disclosure via Referer Header + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d94f0347-2167-4840-b21c-3279de0f9325?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-hide-login/" + google-query: inurl:"/wp-content/plugins/wps-hide-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-hide-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-hide-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-limit-login-33ba7ead1d6b53a7bacd0ee1d3cec66a.yaml b/nuclei-templates/cve-less/plugins/wps-limit-login-33ba7ead1d6b53a7bacd0ee1d3cec66a.yaml new file mode 100644 index 0000000000..c4a1b22aa9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-limit-login-33ba7ead1d6b53a7bacd0ee1d3cec66a.yaml @@ -0,0 +1,58 @@ +id: wps-limit-login-33ba7ead1d6b53a7bacd0ee1d3cec66a + +info: + name: > + WPS Limit Login < 1.4.6.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f75424-b9f3-42ee-a96c-ff0ed30cbd2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-limit-login/" + google-query: inurl:"/wp-content/plugins/wps-limit-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-limit-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-limit-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-limit-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-limit-login-ac32a3365dd3ce67be3869f846f1d80e.yaml b/nuclei-templates/cve-less/plugins/wps-limit-login-ac32a3365dd3ce67be3869f846f1d80e.yaml new file mode 100644 index 0000000000..23c8c56a5b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-limit-login-ac32a3365dd3ce67be3869f846f1d80e.yaml @@ -0,0 +1,58 @@ +id: wps-limit-login-ac32a3365dd3ce67be3869f846f1d80e + +info: + name: > + WPS Limit Login < 1.4.6.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28dfc8c9-478c-48b2-8781-7e0787fd50fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-limit-login/" + google-query: inurl:"/wp-content/plugins/wps-limit-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-limit-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-limit-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-limit-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wps-limit-login-e87c9f8090be1d89c33f679b357f6df8.yaml b/nuclei-templates/cve-less/plugins/wps-limit-login-e87c9f8090be1d89c33f679b357f6df8.yaml new file mode 100644 index 0000000000..191e159173 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wps-limit-login-e87c9f8090be1d89c33f679b357f6df8.yaml @@ -0,0 +1,58 @@ +id: wps-limit-login-e87c9f8090be1d89c33f679b357f6df8 + +info: + name: > + WPS Limit Login < 1.4.6.1 - Authorization Bypass via IP Spoofing + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e0ce0dc-34eb-4577-82a5-8ed822847ff4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wps-limit-login/" + google-query: inurl:"/wp-content/plugins/wps-limit-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wps-limit-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wps-limit-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wps-limit-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsc-mijnpress-fbdea8451b311eb4ce44cfe1a03a2154.yaml b/nuclei-templates/cve-less/plugins/wpsc-mijnpress-fbdea8451b311eb4ce44cfe1a03a2154.yaml new file mode 100644 index 0000000000..eee0cf8c2f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsc-mijnpress-fbdea8451b311eb4ce44cfe1a03a2154.yaml @@ -0,0 +1,58 @@ +id: wpsc-mijnpress-fbdea8451b311eb4ce44cfe1a03a2154 + +info: + name: > + WPsc MijnPress <= 0.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83bd221e-7d01-4cba-8577-ce0a69e4a75c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsc-mijnpress/" + google-query: inurl:"/wp-content/plugins/wpsc-mijnpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsc-mijnpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsc-mijnpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsc-mijnpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpschoolpress-40c66d343981decaf1c11e2239adae6e.yaml b/nuclei-templates/cve-less/plugins/wpschoolpress-40c66d343981decaf1c11e2239adae6e.yaml new file mode 100644 index 0000000000..490ca1aeab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpschoolpress-40c66d343981decaf1c11e2239adae6e.yaml @@ -0,0 +1,58 @@ +id: wpschoolpress-40c66d343981decaf1c11e2239adae6e + +info: + name: > + School Management System – WPSchoolPress < 2.1.10 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58a83ec8-e294-4fb6-9f1a-19562b2e499d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpschoolpress/" + google-query: inurl:"/wp-content/plugins/wpschoolpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpschoolpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpschoolpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpschoolpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpschoolpress-806ff64ba5797ae36351687c8c401e27.yaml b/nuclei-templates/cve-less/plugins/wpschoolpress-806ff64ba5797ae36351687c8c401e27.yaml new file mode 100644 index 0000000000..511799142d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpschoolpress-806ff64ba5797ae36351687c8c401e27.yaml @@ -0,0 +1,58 @@ +id: wpschoolpress-806ff64ba5797ae36351687c8c401e27 + +info: + name: > + WPSchoolPress <= 2.2.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a2fb050-1a7c-45cc-86c7-02331d47f780?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpschoolpress/" + google-query: inurl:"/wp-content/plugins/wpschoolpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpschoolpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpschoolpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpschoolpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpschoolpress-a9a638b4142268e1bac6a40ef293c66b.yaml b/nuclei-templates/cve-less/plugins/wpschoolpress-a9a638b4142268e1bac6a40ef293c66b.yaml new file mode 100644 index 0000000000..5a36565852 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpschoolpress-a9a638b4142268e1bac6a40ef293c66b.yaml @@ -0,0 +1,58 @@ +id: wpschoolpress-a9a638b4142268e1bac6a40ef293c66b + +info: + name: > + WPSchoolPress <= 2.2.4 - Authenticated(Teacher+) SQL Injection via ClassID + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d070e12e-ec53-4574-ac37-dc8805d9a553?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpschoolpress/" + google-query: inurl:"/wp-content/plugins/wpschoolpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpschoolpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpschoolpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpschoolpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpschoolpress-b9006062d746b8caf6ca2e15e2892f35.yaml b/nuclei-templates/cve-less/plugins/wpschoolpress-b9006062d746b8caf6ca2e15e2892f35.yaml new file mode 100644 index 0000000000..0ebde775cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpschoolpress-b9006062d746b8caf6ca2e15e2892f35.yaml @@ -0,0 +1,58 @@ +id: wpschoolpress-b9006062d746b8caf6ca2e15e2892f35 + +info: + name: > + School Management System – WPSchoolPress <= 2.1.16 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/850f554f-abb5-4b9f-9b7b-67439abb1a31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpschoolpress/" + google-query: inurl:"/wp-content/plugins/wpschoolpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpschoolpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpschoolpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpschoolpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpschoolpress-f1f206bccc7ec9ca4ed21059b6547361.yaml b/nuclei-templates/cve-less/plugins/wpschoolpress-f1f206bccc7ec9ca4ed21059b6547361.yaml new file mode 100644 index 0000000000..d74bec8038 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpschoolpress-f1f206bccc7ec9ca4ed21059b6547361.yaml @@ -0,0 +1,58 @@ +id: wpschoolpress-f1f206bccc7ec9ca4ed21059b6547361 + +info: + name: > + WPSchoolPress <= 2.2.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1410d37a-fa8d-41e1-bed7-1c1436b52a83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpschoolpress/" + google-query: inurl:"/wp-content/plugins/wpschoolpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpschoolpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpschoolpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpschoolpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpschoolpress-f6bb81d744ef9464f6fccc27a671bc84.yaml b/nuclei-templates/cve-less/plugins/wpschoolpress-f6bb81d744ef9464f6fccc27a671bc84.yaml new file mode 100644 index 0000000000..de5c4b9880 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpschoolpress-f6bb81d744ef9464f6fccc27a671bc84.yaml @@ -0,0 +1,58 @@ +id: wpschoolpress-f6bb81d744ef9464f6fccc27a671bc84 + +info: + name: > + School Management System – WPSchoolPress <= 2.1.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7de51bf2-f3dc-40d7-8d63-c85c267c4e98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpschoolpress/" + google-query: inurl:"/wp-content/plugins/wpschoolpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpschoolpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpschoolpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpschoolpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpseo-local-062a12d42d5fa439eba03cd3a142a5ad.yaml b/nuclei-templates/cve-less/plugins/wpseo-local-062a12d42d5fa439eba03cd3a142a5ad.yaml new file mode 100644 index 0000000000..2692f98327 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpseo-local-062a12d42d5fa439eba03cd3a142a5ad.yaml @@ -0,0 +1,58 @@ +id: wpseo-local-062a12d42d5fa439eba03cd3a142a5ad + +info: + name: > + Yoast SEO: Local <= 14.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b239185f-c368-4768-8f6a-ef9bc593929d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpseo-local/" + google-query: inurl:"/wp-content/plugins/wpseo-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpseo-local,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpseo-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpseo-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpseo-local-559e4b65f535b45dcfe5d339b535e1b8.yaml b/nuclei-templates/cve-less/plugins/wpseo-local-559e4b65f535b45dcfe5d339b535e1b8.yaml new file mode 100644 index 0000000000..66610e69bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpseo-local-559e4b65f535b45dcfe5d339b535e1b8.yaml @@ -0,0 +1,58 @@ +id: wpseo-local-559e4b65f535b45dcfe5d339b535e1b8 + +info: + name: > + Yoast SEO: Local <= 14.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d536acc-b297-4acd-97e2-87eae2e2b95a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpseo-local/" + google-query: inurl:"/wp-content/plugins/wpseo-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpseo-local,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpseo-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpseo-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpseo-local-6f2bfa44316597918db6902f22101641.yaml b/nuclei-templates/cve-less/plugins/wpseo-local-6f2bfa44316597918db6902f22101641.yaml new file mode 100644 index 0000000000..148e8739f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpseo-local-6f2bfa44316597918db6902f22101641.yaml @@ -0,0 +1,58 @@ +id: wpseo-local-6f2bfa44316597918db6902f22101641 + +info: + name: > + Yoast SEO: Local <= 14.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb6457ea-6353-4a69-ad72-cd5acd47ed8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpseo-local/" + google-query: inurl:"/wp-content/plugins/wpseo-local/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpseo-local,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpseo-local/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpseo-local" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 14.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpshop-081f62a87d654a4a56d997452fef47f0.yaml b/nuclei-templates/cve-less/plugins/wpshop-081f62a87d654a4a56d997452fef47f0.yaml new file mode 100644 index 0000000000..24b835875f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpshop-081f62a87d654a4a56d997452fef47f0.yaml @@ -0,0 +1,58 @@ +id: wpshop-081f62a87d654a4a56d997452fef47f0 + +info: + name: > + WPshop 2 – E-Commerce < 1.3.9.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32e8224d-a653-48d7-a3f4-338fc0c1dc77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpshop/" + google-query: inurl:"/wp-content/plugins/wpshop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpshop,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpshop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpshop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpshopgermany-it-recht-kanzlei-8b316c2c5c57a5bec4fddd68dace9cd3.yaml b/nuclei-templates/cve-less/plugins/wpshopgermany-it-recht-kanzlei-8b316c2c5c57a5bec4fddd68dace9cd3.yaml new file mode 100644 index 0000000000..31f99799ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpshopgermany-it-recht-kanzlei-8b316c2c5c57a5bec4fddd68dace9cd3.yaml @@ -0,0 +1,58 @@ +id: wpshopgermany-it-recht-kanzlei-8b316c2c5c57a5bec4fddd68dace9cd3 + +info: + name: > + wpShopGermany IT-RECHT KANZLEI <= 1.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/220766ef-29a6-46f6-8c67-d1879db79400?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpshopgermany-it-recht-kanzlei/" + google-query: inurl:"/wp-content/plugins/wpshopgermany-it-recht-kanzlei/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpshopgermany-it-recht-kanzlei,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpshopgermany-it-recht-kanzlei/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpshopgermany-it-recht-kanzlei" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpshopgermany-protectedshops-c41eb0b63074858e7a2ad3fb4237d823.yaml b/nuclei-templates/cve-less/plugins/wpshopgermany-protectedshops-c41eb0b63074858e7a2ad3fb4237d823.yaml new file mode 100644 index 0000000000..190e7827a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpshopgermany-protectedshops-c41eb0b63074858e7a2ad3fb4237d823.yaml @@ -0,0 +1,58 @@ +id: wpshopgermany-protectedshops-c41eb0b63074858e7a2ad3fb4237d823 + +info: + name: > + wpShopGermany - Protected Shops <= 2.0 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21cc5aec-ab5f-412b-aed0-bb41584a84cf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpshopgermany-protectedshops/" + google-query: inurl:"/wp-content/plugins/wpshopgermany-protectedshops/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpshopgermany-protectedshops,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpshopgermany-protectedshops/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpshopgermany-protectedshops" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpshopify-d58b5b8c1f20223d27dbac48d68ed8bc.yaml b/nuclei-templates/cve-less/plugins/wpshopify-d58b5b8c1f20223d27dbac48d68ed8bc.yaml new file mode 100644 index 0000000000..cb191f1774 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpshopify-d58b5b8c1f20223d27dbac48d68ed8bc.yaml @@ -0,0 +1,58 @@ +id: wpshopify-d58b5b8c1f20223d27dbac48d68ed8bc + +info: + name: > + ShopWP <= 2.0.4 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d04f11b4-ee58-428b-aaa2-dc7d9f3e68e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpshopify/" + google-query: inurl:"/wp-content/plugins/wpshopify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpshopify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpshopify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpshopify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsid-shortcode-556540f24142f2b0189f842b638e3b3b.yaml b/nuclei-templates/cve-less/plugins/wpsid-shortcode-556540f24142f2b0189f842b638e3b3b.yaml new file mode 100644 index 0000000000..0772f2a168 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsid-shortcode-556540f24142f2b0189f842b638e3b3b.yaml @@ -0,0 +1,58 @@ +id: wpsid-shortcode-556540f24142f2b0189f842b638e3b3b + +info: + name: > + WPSID Shortcode <= 1.0.9.2 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8945128b-79b7-46c7-b981-78e6619d3f63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsid-shortcode/" + google-query: inurl:"/wp-content/plugins/wpsid-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsid-shortcode,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsid-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsid-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsimpletools-log-viewer-955bd8a9c17ef8d9a80499ee35d81209.yaml b/nuclei-templates/cve-less/plugins/wpsimpletools-log-viewer-955bd8a9c17ef8d9a80499ee35d81209.yaml new file mode 100644 index 0000000000..ea3a645b82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsimpletools-log-viewer-955bd8a9c17ef8d9a80499ee35d81209.yaml @@ -0,0 +1,58 @@ +id: wpsimpletools-log-viewer-955bd8a9c17ef8d9a80499ee35d81209 + +info: + name: > + Basic Log Viewer <= 1.0.4 - Cross-Site Request Forgery via wpst_lw_viewer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18acd104-a5a5-4811-9aea-abc227a1712c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsimpletools-log-viewer/" + google-query: inurl:"/wp-content/plugins/wpsimpletools-log-viewer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsimpletools-log-viewer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsimpletools-log-viewer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsimpletools-log-viewer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsimpletools-upload-limit-9de482ee3d956ce585f6bd7d5fa3f9c1.yaml b/nuclei-templates/cve-less/plugins/wpsimpletools-upload-limit-9de482ee3d956ce585f6bd7d5fa3f9c1.yaml new file mode 100644 index 0000000000..18ad191a07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsimpletools-upload-limit-9de482ee3d956ce585f6bd7d5fa3f9c1.yaml @@ -0,0 +1,58 @@ +id: wpsimpletools-upload-limit-9de482ee3d956ce585f6bd7d5fa3f9c1 + +info: + name: > + Manage Upload Limit <= 1.0.4 - Reflected Cross-Site Scripting via upload_limit + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b90bf09-639c-497c-a58e-3972250db1e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsimpletools-upload-limit/" + google-query: inurl:"/wp-content/plugins/wpsimpletools-upload-limit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsimpletools-upload-limit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsimpletools-upload-limit/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsimpletools-upload-limit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsite-background-takeover-d2df040b2ddbf2c6a18a499a718c8a17.yaml b/nuclei-templates/cve-less/plugins/wpsite-background-takeover-d2df040b2ddbf2c6a18a499a718c8a17.yaml new file mode 100644 index 0000000000..14ed6f4e74 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsite-background-takeover-d2df040b2ddbf2c6a18a499a718c8a17.yaml @@ -0,0 +1,58 @@ +id: wpsite-background-takeover-d2df040b2ddbf2c6a18a499a718c8a17 + +info: + name: > + WP Background Takeover < 4.1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27eea04f-3f5f-4f13-9553-4fdea9be865b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsite-background-takeover/" + google-query: inurl:"/wp-content/plugins/wpsite-background-takeover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsite-background-takeover,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsite-background-takeover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsite-background-takeover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsite-follow-us-badges-c3fe9adbef48906de6288ff04a6a51a9.yaml b/nuclei-templates/cve-less/plugins/wpsite-follow-us-badges-c3fe9adbef48906de6288ff04a6a51a9.yaml new file mode 100644 index 0000000000..e4eaeab625 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsite-follow-us-badges-c3fe9adbef48906de6288ff04a6a51a9.yaml @@ -0,0 +1,58 @@ +id: wpsite-follow-us-badges-c3fe9adbef48906de6288ff04a6a51a9 + +info: + name: > + Follow Us Badges <= 3.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via wpsite_follow_us_badges Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef1ccef8-9066-4f5c-b5c5-9fa6e54f0e87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsite-follow-us-badges/" + google-query: inurl:"/wp-content/plugins/wpsite-follow-us-badges/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsite-follow-us-badges,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsite-follow-us-badges/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsite-follow-us-badges" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpslacksync-41acc719f07692e44cc41d180d104907.yaml b/nuclei-templates/cve-less/plugins/wpslacksync-41acc719f07692e44cc41d180d104907.yaml new file mode 100644 index 0000000000..191fbca12b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpslacksync-41acc719f07692e44cc41d180d104907.yaml @@ -0,0 +1,58 @@ +id: wpslacksync-41acc719f07692e44cc41d180d104907 + +info: + name: > + WP SlackSync <= 1.8.5 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e005861c-3ca5-4cee-a84b-9ebc095f4a1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpslacksync/" + google-query: inurl:"/wp-content/plugins/wpslacksync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpslacksync,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpslacksync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpslacksync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsnapapp-894d5909f0af3672921ffb2138091248.yaml b/nuclei-templates/cve-less/plugins/wpsnapapp-894d5909f0af3672921ffb2138091248.yaml new file mode 100644 index 0000000000..5f5cfa3664 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsnapapp-894d5909f0af3672921ffb2138091248.yaml @@ -0,0 +1,58 @@ +id: wpsnapapp-894d5909f0af3672921ffb2138091248 + +info: + name: > + WP Snap App <= 1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c17b388-1f9a-473f-a71b-a3f72bdf301b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsnapapp/" + google-query: inurl:"/wp-content/plugins/wpsnapapp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsnapapp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsnapapp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsnapapp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsolr-search-engine-e0c5d4dca3eeae77e08a24a0d2c24dce.yaml b/nuclei-templates/cve-less/plugins/wpsolr-search-engine-e0c5d4dca3eeae77e08a24a0d2c24dce.yaml new file mode 100644 index 0000000000..9d2f651b54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsolr-search-engine-e0c5d4dca3eeae77e08a24a0d2c24dce.yaml @@ -0,0 +1,58 @@ +id: wpsolr-search-engine-e0c5d4dca3eeae77e08a24a0d2c24dce + +info: + name: > + WPSOLR – Elasticsearch and Solr search <= 8.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/048077bc-30da-472c-97ea-24317dbde712?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsolr-search-engine/" + google-query: inurl:"/wp-content/plugins/wpsolr-search-engine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsolr-search-engine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsolr-search-engine/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsolr-search-engine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpss-7cf13e2bb716c26880ecc9fba4b8b446.yaml b/nuclei-templates/cve-less/plugins/wpss-7cf13e2bb716c26880ecc9fba4b8b446.yaml new file mode 100644 index 0000000000..790c187224 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpss-7cf13e2bb716c26880ecc9fba4b8b446.yaml @@ -0,0 +1,58 @@ +id: wpss-7cf13e2bb716c26880ecc9fba4b8b446 + +info: + name: > + WordPress Spreadsheet <= 0.6 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/424ebeb4-eb53-4c87-9a86-aff1c784aa3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpSS/" + google-query: inurl:"/wp-content/plugins/wpSS/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpSS,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpSS/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpSS" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpss-dfc9289a15b5d9ef4c8b8a78a1e983f0.yaml b/nuclei-templates/cve-less/plugins/wpss-dfc9289a15b5d9ef4c8b8a78a1e983f0.yaml new file mode 100644 index 0000000000..8fb4a6b880 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpss-dfc9289a15b5d9ef4c8b8a78a1e983f0.yaml @@ -0,0 +1,58 @@ +id: wpss-dfc9289a15b5d9ef4c8b8a78a1e983f0 + +info: + name: > + WordPress Spreadsheet <= 0.62 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a3c3b3b-7fc9-4586-9a51-33642654dc9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpSS/" + google-query: inurl:"/wp-content/plugins/wpSS/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpSS,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpSS/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpSS" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpss-ee3866229b628cfe3699728232f7f492.yaml b/nuclei-templates/cve-less/plugins/wpss-ee3866229b628cfe3699728232f7f492.yaml new file mode 100644 index 0000000000..1c6f6aada8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpss-ee3866229b628cfe3699728232f7f492.yaml @@ -0,0 +1,58 @@ +id: wpss-ee3866229b628cfe3699728232f7f492 + +info: + name: > + WordPress Spreadsheet (wpSS) <= 0.62 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8650383a-712b-4830-894f-cd7ec7b0d5bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpSS/" + google-query: inurl:"/wp-content/plugins/wpSS/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpSS,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpSS/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpSS" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.62') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpstorecart-1f49340070b07f37e2b631ba71cc0b18.yaml b/nuclei-templates/cve-less/plugins/wpstorecart-1f49340070b07f37e2b631ba71cc0b18.yaml new file mode 100644 index 0000000000..16201c1d04 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpstorecart-1f49340070b07f37e2b631ba71cc0b18.yaml @@ -0,0 +1,58 @@ +id: wpstorecart-1f49340070b07f37e2b631ba71cc0b18 + +info: + name: > + IDB Ecommerce (wpStoreCart 5) < 2.5.30 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0cb0970-7e21-44ff-bbca-4b3e18f4466e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpstorecart/" + google-query: inurl:"/wp-content/plugins/wpstorecart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpstorecart,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpstorecart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpstorecart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.29') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpstream-d011f1f83d77935b57f8c936c3d34792.yaml b/nuclei-templates/cve-less/plugins/wpstream-d011f1f83d77935b57f8c936c3d34792.yaml new file mode 100644 index 0000000000..3f889ca496 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpstream-d011f1f83d77935b57f8c936c3d34792.yaml @@ -0,0 +1,58 @@ +id: wpstream-d011f1f83d77935b57f8c936c3d34792 + +info: + name: > + WpStream – Live Streaming, Video on Demand, Pay Per View <= 4.5.4 - Cross-Site Request Forgery via wpstream_update_local_event_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0c91a58-31e9-4f6e-81fb-0681fb9ce4d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpstream/" + google-query: inurl:"/wp-content/plugins/wpstream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpstream,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpstream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpstream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpstream-d118e9921cdb49f79910263f2b2e7390.yaml b/nuclei-templates/cve-less/plugins/wpstream-d118e9921cdb49f79910263f2b2e7390.yaml new file mode 100644 index 0000000000..a08fa27c05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpstream-d118e9921cdb49f79910263f2b2e7390.yaml @@ -0,0 +1,58 @@ +id: wpstream-d118e9921cdb49f79910263f2b2e7390 + +info: + name: > + WpStream – Live Streaming, Video on Demand, Pay Per View <= 4.4.10 - Cross-Site Request Forgery via wpstream_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0219851f-7fce-42e0-ba82-77af84b17d9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpstream/" + google-query: inurl:"/wp-content/plugins/wpstream/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpstream,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpstream/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpstream" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsynchro-7c11f7c384d9dd8d4651247b810c16b8.yaml b/nuclei-templates/cve-less/plugins/wpsynchro-7c11f7c384d9dd8d4651247b810c16b8.yaml new file mode 100644 index 0000000000..9e1fcb1676 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsynchro-7c11f7c384d9dd8d4651247b810c16b8.yaml @@ -0,0 +1,58 @@ +id: wpsynchro-7c11f7c384d9dd8d4651247b810c16b8 + +info: + name: > + WP Migration Plugin DB & Files – WP Synchro <= 1.11.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe9659ff-7233-44d4-aaff-ad3089511a67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsynchro/" + google-query: inurl:"/wp-content/plugins/wpsynchro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsynchro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsynchro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsynchro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpsynchro-e74a81eb9870251841dabcabe93454ff.yaml b/nuclei-templates/cve-less/plugins/wpsynchro-e74a81eb9870251841dabcabe93454ff.yaml new file mode 100644 index 0000000000..5732fb42b4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpsynchro-e74a81eb9870251841dabcabe93454ff.yaml @@ -0,0 +1,58 @@ +id: wpsynchro-e74a81eb9870251841dabcabe93454ff + +info: + name: > + WP Migration Plugin DB & Files – WP Synchro <= 1.9.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1b6f041-5ea6-48ca-9ca7-4ce96cbfa275?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpsynchro/" + google-query: inurl:"/wp-content/plugins/wpsynchro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpsynchro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpsynchro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpsynchro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptables-81fef267b7d2479d27762ebd528c25d5.yaml b/nuclei-templates/cve-less/plugins/wptables-81fef267b7d2479d27762ebd528c25d5.yaml new file mode 100644 index 0000000000..c792520af9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptables-81fef267b7d2479d27762ebd528c25d5.yaml @@ -0,0 +1,58 @@ +id: wptables-81fef267b7d2479d27762ebd528c25d5 + +info: + name: > + WordPress Tables <= 1.3.9 - Reflected Cross-Site Scripting via error_msg + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/099dfb18-fc73-4a19-b017-1675c9acfa2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptables/" + google-query: inurl:"/wp-content/plugins/wptables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptf-image-gallery-0e5c12aafd12c94fc7a397fbe2697f9a.yaml b/nuclei-templates/cve-less/plugins/wptf-image-gallery-0e5c12aafd12c94fc7a397fbe2697f9a.yaml new file mode 100644 index 0000000000..6483319e4b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptf-image-gallery-0e5c12aafd12c94fc7a397fbe2697f9a.yaml @@ -0,0 +1,58 @@ +id: wptf-image-gallery-0e5c12aafd12c94fc7a397fbe2697f9a + +info: + name: > + wptf-image-gallery <= 1.0.3 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/134e09a8-f89a-4282-b2e8-09b84f04aae7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptf-image-gallery/" + google-query: inurl:"/wp-content/plugins/wptf-image-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptf-image-gallery,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptf-image-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptf-image-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptools-08963ed44b1cea3058d5d701a7dc7bd5.yaml b/nuclei-templates/cve-less/plugins/wptools-08963ed44b1cea3058d5d701a7dc7bd5.yaml new file mode 100644 index 0000000000..ac9a9933b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptools-08963ed44b1cea3058d5d701a7dc7bd5.yaml @@ -0,0 +1,58 @@ +id: wptools-08963ed44b1cea3058d5d701a7dc7bd5 + +info: + name: > + WP Tools <= 3.41 - Missing Authorization leading to Authenticated (Subscriber+) Authorization Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eeed189-3c57-4f23-bb6c-3e84603a83fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptools/" + google-query: inurl:"/wp-content/plugins/wptools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptools,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptools-509c39acb39a633805d6b569fc41a485.yaml b/nuclei-templates/cve-less/plugins/wptools-509c39acb39a633805d6b569fc41a485.yaml new file mode 100644 index 0000000000..0cd348ee77 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptools-509c39acb39a633805d6b569fc41a485.yaml @@ -0,0 +1,58 @@ +id: wptools-509c39acb39a633805d6b569fc41a485 + +info: + name: > + WP Tools <= 3.42 - Missing Authorization to Select Plugin Installation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/668a77e4-9d0a-4835-be5c-4c1acfe7ba43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptools/" + google-query: inurl:"/wp-content/plugins/wptools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptools,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptools-masonry-gallery-posts-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wptools-masonry-gallery-posts-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..8542602daa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptools-masonry-gallery-posts-for-divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wptools-masonry-gallery-posts-for-divi-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptools-masonry-gallery-posts-for-divi/" + google-query: inurl:"/wp-content/plugins/wptools-masonry-gallery-posts-for-divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptools-masonry-gallery-posts-for-divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptools-masonry-gallery-posts-for-divi/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptools-masonry-gallery-posts-for-divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-10e0f566e327669476b16f2a9ebfe55e.yaml b/nuclei-templates/cve-less/plugins/wptouch-10e0f566e327669476b16f2a9ebfe55e.yaml new file mode 100644 index 0000000000..4be2b23bc4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-10e0f566e327669476b16f2a9ebfe55e.yaml @@ -0,0 +1,58 @@ +id: wptouch-10e0f566e327669476b16f2a9ebfe55e + +info: + name: > + WPTouch < 3.7 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0de486b-1ad9-440f-b2f8-b0a2a9af4d0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-1b6d42c938576bb7e9892a86129f9bc5.yaml b/nuclei-templates/cve-less/plugins/wptouch-1b6d42c938576bb7e9892a86129f9bc5.yaml new file mode 100644 index 0000000000..3abec580b6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-1b6d42c938576bb7e9892a86129f9bc5.yaml @@ -0,0 +1,58 @@ +id: wptouch-1b6d42c938576bb7e9892a86129f9bc5 + +info: + name: > + WPtouch <= 4.3.44 - Authenticated (Administrator+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7148e182-858c-42b1-b9db-9b7a267483e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-4578c261077bba561117707849a7d191.yaml b/nuclei-templates/cve-less/plugins/wptouch-4578c261077bba561117707849a7d191.yaml new file mode 100644 index 0000000000..82f427f86c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-4578c261077bba561117707849a7d191.yaml @@ -0,0 +1,58 @@ +id: wptouch-4578c261077bba561117707849a7d191 + +info: + name: > + WPtouch <= 4.3.44 - Authenticated (Administrator+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dad27b29-d106-44f2-9b88-6cce0c0cf4a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.44') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-79ef66275733eff8f488bb76b45e9786.yaml b/nuclei-templates/cve-less/plugins/wptouch-79ef66275733eff8f488bb76b45e9786.yaml new file mode 100644 index 0000000000..8a6cd4157b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-79ef66275733eff8f488bb76b45e9786.yaml @@ -0,0 +1,58 @@ +id: wptouch-79ef66275733eff8f488bb76b45e9786 + +info: + name: > + WPtouch <= 4.3.42 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a0d85e8-33fa-46eb-b71b-d93715bc373e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-92f2fb442048282c27cd8fc5629a2db5.yaml b/nuclei-templates/cve-less/plugins/wptouch-92f2fb442048282c27cd8fc5629a2db5.yaml new file mode 100644 index 0000000000..065aa43213 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-92f2fb442048282c27cd8fc5629a2db5.yaml @@ -0,0 +1,58 @@ +id: wptouch-92f2fb442048282c27cd8fc5629a2db5 + +info: + name: > + WPtouch <= 1.9.8 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8a3e69e-b6d2-495a-878d-1c2329e9e553?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-b8cd38cebac9c7df524c313f084f74d0.yaml b/nuclei-templates/cve-less/plugins/wptouch-b8cd38cebac9c7df524c313f084f74d0.yaml new file mode 100644 index 0000000000..c170d75a17 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-b8cd38cebac9c7df524c313f084f74d0.yaml @@ -0,0 +1,58 @@ +id: wptouch-b8cd38cebac9c7df524c313f084f74d0 + +info: + name: > + WPtouch <= 3.4.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee5acf1d-e405-4aa6-8355-b5aebbbb1d1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-c426bf1b8239d541e948689bf4281f26.yaml b/nuclei-templates/cve-less/plugins/wptouch-c426bf1b8239d541e948689bf4281f26.yaml new file mode 100644 index 0000000000..0a6988bfb7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-c426bf1b8239d541e948689bf4281f26.yaml @@ -0,0 +1,58 @@ +id: wptouch-c426bf1b8239d541e948689bf4281f26 + +info: + name: > + WPtouch < 1.9.20 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f34f98a0-9df4-4b50-ae6a-7912e4b12bb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.20') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-ddef2c9b920afc1274bfc9aad43c2024.yaml b/nuclei-templates/cve-less/plugins/wptouch-ddef2c9b920afc1274bfc9aad43c2024.yaml new file mode 100644 index 0000000000..fc8f27a273 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-ddef2c9b920afc1274bfc9aad43c2024.yaml @@ -0,0 +1,58 @@ +id: wptouch-ddef2c9b920afc1274bfc9aad43c2024 + +info: + name: > + WPtouch <= 3.7.5.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26e7c3fa-7ae7-4343-8494-2955cb755c6d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wptouch-f63166b5a96e6e66374a20ab51c64110.yaml b/nuclei-templates/cve-less/plugins/wptouch-f63166b5a96e6e66374a20ab51c64110.yaml new file mode 100644 index 0000000000..0c6152fed8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wptouch-f63166b5a96e6e66374a20ab51c64110.yaml @@ -0,0 +1,58 @@ +id: wptouch-f63166b5a96e6e66374a20ab51c64110 + +info: + name: > + WPtouch < 1.9.30 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dac38b2e-4d38-4b16-b6a1-ed3c0561e7c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wptouch/" + google-query: inurl:"/wp-content/plugins/wptouch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wptouch,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wptouch/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wptouch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpupper-share-buttons-94f3a814c03c449b36cb253d7f80d949.yaml b/nuclei-templates/cve-less/plugins/wpupper-share-buttons-94f3a814c03c449b36cb253d7f80d949.yaml new file mode 100644 index 0000000000..00f02e2478 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpupper-share-buttons-94f3a814c03c449b36cb253d7f80d949.yaml @@ -0,0 +1,58 @@ +id: wpupper-share-buttons-94f3a814c03c449b36cb253d7f80d949 + +info: + name: > + WPUpper Share Buttons <= 3.42 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eda18b47-1c23-4ef5-9628-d6b5842bca04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpupper-share-buttons/" + google-query: inurl:"/wp-content/plugins/wpupper-share-buttons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpupper-share-buttons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpupper-share-buttons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpupper-share-buttons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpview-0da2272f6fad3d314fe055d518112eb5.yaml b/nuclei-templates/cve-less/plugins/wpview-0da2272f6fad3d314fe055d518112eb5.yaml new file mode 100644 index 0000000000..5e8e9b1e4c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpview-0da2272f6fad3d314fe055d518112eb5.yaml @@ -0,0 +1,58 @@ +id: wpview-0da2272f6fad3d314fe055d518112eb5 + +info: + name: > + wpView <= 1.3.0 - Authenticated(Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4cad108-6574-4f14-8a37-89c4c10279d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpview/" + google-query: inurl:"/wp-content/plugins/wpview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpview,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backup-mainwp-3df45b218aba0e53ba0ae72e9699b2ef.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backup-mainwp-3df45b218aba0e53ba0ae72e9699b2ef.yaml new file mode 100644 index 0000000000..4fdf67ed66 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backup-mainwp-3df45b218aba0e53ba0ae72e9699b2ef.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backup-mainwp-3df45b218aba0e53ba0ae72e9699b2ef + +info: + name: > + WPvivid Backup for MainWP <= 0.9.33 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2083fdf7-e251-4162-b38f-8dab4395a8a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backup-mainwp/" + google-query: inurl:"/wp-content/plugins/wpvivid-backup-mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backup-mainwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backup-mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backup-mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backup-mainwp-a7bf9a411638a6c87526e9cf7c7ea42c.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backup-mainwp-a7bf9a411638a6c87526e9cf7c7ea42c.yaml new file mode 100644 index 0000000000..dbff398f33 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backup-mainwp-a7bf9a411638a6c87526e9cf7c7ea42c.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backup-mainwp-a7bf9a411638a6c87526e9cf7c7ea42c + +info: + name: > + WPvivid Backup for MainWP <= 0.9.32 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a8430ed-6aeb-46a3-8c42-59646845706e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backup-mainwp/" + google-query: inurl:"/wp-content/plugins/wpvivid-backup-mainwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backup-mainwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backup-mainwp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backup-mainwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-02311b741caefd1373a75d8083768696.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-02311b741caefd1373a75d8083768696.yaml new file mode 100644 index 0000000000..dd7b4b12cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-02311b741caefd1373a75d8083768696.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-02311b741caefd1373a75d8083768696 + +info: + name: > + WPvivid Backup and Migration <= 0.9.68 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef8bfb38-4f20-4f9f-bb30-a88f3be2d2d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.9.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-0bef183926021b3705ecb7e440cd2280.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-0bef183926021b3705ecb7e440cd2280.yaml new file mode 100644 index 0000000000..a58c956305 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-0bef183926021b3705ecb7e440cd2280.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-0bef183926021b3705ecb7e440cd2280 + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.68 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15ce5666-f020-4264-989d-713e4520e012?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.69') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-11e9b1d880ea6b9e7b3f23d21ed1379c.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-11e9b1d880ea6b9e7b3f23d21ed1379c.yaml new file mode 100644 index 0000000000..c89fab818c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-11e9b1d880ea6b9e7b3f23d21ed1379c.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-11e9b1d880ea6b9e7b3f23d21ed1379c + +info: + name: > + WPvivid Backup 0.9.76 - Authenticated (Administrator+) Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af7adacf-7189-401f-b7c9-845eb328ca76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.9.76') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-167f863d325454383d95967607b16eaf.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-167f863d325454383d95967607b16eaf.yaml new file mode 100644 index 0000000000..1334d93f00 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-167f863d325454383d95967607b16eaf.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-167f863d325454383d95967607b16eaf + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.91 - Google Drive Client Secret Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4658109d-295c-4a1b-b219-ca1f4664ff1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-21742813963970be1b852e62999d105e.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-21742813963970be1b852e62999d105e.yaml new file mode 100644 index 0000000000..81a57c16dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-21742813963970be1b852e62999d105e.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-21742813963970be1b852e62999d105e + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.74 - Authenticated (Admin+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7e2ca2e-c495-47f8-9c18-da5ba73d9e70?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.74') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-261f8d0d96a6973bf1fe24c56cd5b3ec.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-261f8d0d96a6973bf1fe24c56cd5b3ec.yaml new file mode 100644 index 0000000000..e7a8b565c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-261f8d0d96a6973bf1fe24c56cd5b3ec.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-261f8d0d96a6973bf1fe24c56cd5b3ec + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.70 - Authenticated Arbitrary File Read + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2760587c-78f5-40b1-affd-dfdfb2bc2a68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-549345c10b291ab93f71309abaa38002.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-549345c10b291ab93f71309abaa38002.yaml new file mode 100644 index 0000000000..fd82115335 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-549345c10b291ab93f71309abaa38002.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-549345c10b291ab93f71309abaa38002 + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.89 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/320f4260-20c2-4f27-91ba-d2488b417f62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.89') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-574ff230e2226e2c8ffbb0d383453c99.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-574ff230e2226e2c8ffbb0d383453c99.yaml new file mode 100644 index 0000000000..da9f9b3331 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-574ff230e2226e2c8ffbb0d383453c99.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-574ff230e2226e2c8ffbb0d383453c99 + +info: + name: > + WPvivid Backup Plugin <= 0.9.90 - Missing Authorization via 'start_staging' and 'get_staging_progress' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28e723ee-e99a-4ec4-b492-bfba04d27fd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.91') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-5bf4618f3f911336450f68ac829f8ebb.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-5bf4618f3f911336450f68ac829f8ebb.yaml new file mode 100644 index 0000000000..554a0bf232 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-5bf4618f3f911336450f68ac829f8ebb.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-5bf4618f3f911336450f68ac829f8ebb + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.35 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de1da248-2e03-40fa-8997-7176dc06abc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-66174d632ca5e11403564d89ab52d0f1.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-66174d632ca5e11403564d89ab52d0f1.yaml new file mode 100644 index 0000000000..2828d4d3ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-66174d632ca5e11403564d89ab52d0f1.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-66174d632ca5e11403564d89ab52d0f1 + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.89 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdcac5f9-a744-4853-8a80-ed38fec81dbb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.89') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-6e746242a89a0f0791f490c19cf07982.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-6e746242a89a0f0791f490c19cf07982.yaml new file mode 100644 index 0000000000..2a4f921a9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-6e746242a89a0f0791f490c19cf07982.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-6e746242a89a0f0791f490c19cf07982 + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.55 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/255f0fc4-5023-4039-9418-2f28363dbfc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-6fc26492de3e14b8a03318635a942d46.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-6fc26492de3e14b8a03318635a942d46.yaml new file mode 100644 index 0000000000..9b1dedfa84 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-6fc26492de3e14b8a03318635a942d46.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-6fc26492de3e14b8a03318635a942d46 + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.89 - Authenticated (Administrator+) Arbitrary Directory Deletion via Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d94f38f-4b52-4b0d-800c-a6fca40bda3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '0.9.89') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-70efeee5b28a1c15fdfabb1bea0a8d31.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-70efeee5b28a1c15fdfabb1bea0a8d31.yaml new file mode 100644 index 0000000000..dca3ad7727 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-70efeee5b28a1c15fdfabb1bea0a8d31.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-70efeee5b28a1c15fdfabb1bea0a8d31 + +info: + name: > + WPvivid Backup and Migration <= 0.9.68 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f17976e-d6b9-40fb-b2fb-d60bcfd68d12?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.68') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-92cb4c71463b35b1c480a90397f7eb13.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-92cb4c71463b35b1c480a90397f7eb13.yaml new file mode 100644 index 0000000000..a5518a5bb1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-92cb4c71463b35b1c480a90397f7eb13.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-92cb4c71463b35b1c480a90397f7eb13 + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.69 - Reflected Cross-Site Scripting via sub_page Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec4d807b-7119-40f0-99a8-5df8471c515b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.70') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-a6bc1c4f18d7c787b94d2c3a536d60d6.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-a6bc1c4f18d7c787b94d2c3a536d60d6.yaml new file mode 100644 index 0000000000..4aff44e323 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-a6bc1c4f18d7c787b94d2c3a536d60d6.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-a6bc1c4f18d7c787b94d2c3a536d60d6 + +info: + name: > + WPvivid <= 0.9.94 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bad0bd6b-9c88-4d31-90b5-92d3ceb8c0af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-a88c71a7fe9a31f1969a27de0aeb4145.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-a88c71a7fe9a31f1969a27de0aeb4145.yaml new file mode 100644 index 0000000000..a6452fdab1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-a88c71a7fe9a31f1969a27de0aeb4145.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-a88c71a7fe9a31f1969a27de0aeb4145 + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.35 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90c3f8bc-fc41-4ba7-b9f2-8873203d5794?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.36') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-b070ea085481a5d7bd82f5fd3f416fd0.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-b070ea085481a5d7bd82f5fd3f416fd0.yaml new file mode 100644 index 0000000000..e5df71340c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-b070ea085481a5d7bd82f5fd3f416fd0.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-b070ea085481a5d7bd82f5fd3f416fd0 + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.75 - Authenticated (Admin+) Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dde4850-347f-40e6-9cea-87284aa655e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-c09b3bbf7fa2f9da4c4d07cfecb5595a.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-c09b3bbf7fa2f9da4c4d07cfecb5595a.yaml new file mode 100644 index 0000000000..11512c0011 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-c09b3bbf7fa2f9da4c4d07cfecb5595a.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-c09b3bbf7fa2f9da4c4d07cfecb5595a + +info: + name: > + Migration, Backup, Staging – WPvivid <= 0.9.75 - Authenticated (Administrator+) Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c6c2695-6244-43fa-8920-7dba14668659?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.75') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-ed94652247c936f26c87589210c8b78f.yaml b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-ed94652247c936f26c87589210c8b78f.yaml new file mode 100644 index 0000000000..dce4be085e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvivid-backuprestore-ed94652247c936f26c87589210c8b78f.yaml @@ -0,0 +1,58 @@ +id: wpvivid-backuprestore-ed94652247c936f26c87589210c8b78f + +info: + name: > + WPvivid Backup & Migration Plugin <= 0.9.99 - Authenticated (Admin+) PHAR Deserialization + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf26fc68-9fd4-4e4e-b34f-c947d95891f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvivid-backuprestore/" + google-query: inurl:"/wp-content/plugins/wpvivid-backuprestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvivid-backuprestore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvivid-backuprestore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvivid-backuprestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.99') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvr-0494f8e348129a631af8f56e0ffddc34.yaml b/nuclei-templates/cve-less/plugins/wpvr-0494f8e348129a631af8f56e0ffddc34.yaml new file mode 100644 index 0000000000..9c270e4c86 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvr-0494f8e348129a631af8f56e0ffddc34.yaml @@ -0,0 +1,58 @@ +id: wpvr-0494f8e348129a631af8f56e0ffddc34 + +info: + name: > + WP VR <= 8.2.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/13a0dd72-1124-4b5d-9bad-fe4fea8e3e68?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvr/" + google-query: inurl:"/wp-content/plugins/wpvr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvr-05be7d772f531cd07131df257a1f15a1.yaml b/nuclei-templates/cve-less/plugins/wpvr-05be7d772f531cd07131df257a1f15a1.yaml new file mode 100644 index 0000000000..9e67c62ca6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvr-05be7d772f531cd07131df257a1f15a1.yaml @@ -0,0 +1,58 @@ +id: wpvr-05be7d772f531cd07131df257a1f15a1 + +info: + name: > + WP VR <= 8.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fbde737-0730-49a4-a84e-a9c5e0e32af5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvr/" + google-query: inurl:"/wp-content/plugins/wpvr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvr-05c834cda01a386b0744c30fe4c1b224.yaml b/nuclei-templates/cve-less/plugins/wpvr-05c834cda01a386b0744c30fe4c1b224.yaml new file mode 100644 index 0000000000..20c4861c53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvr-05c834cda01a386b0744c30fe4c1b224.yaml @@ -0,0 +1,58 @@ +id: wpvr-05c834cda01a386b0744c30fe4c1b224 + +info: + name: > + WP VR <= 8.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecb86ea6-2aca-4f7c-be81-a572b53b7953?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvr/" + google-query: inurl:"/wp-content/plugins/wpvr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvr-0e6778305a28eacf186b54844a0e5ea0.yaml b/nuclei-templates/cve-less/plugins/wpvr-0e6778305a28eacf186b54844a0e5ea0.yaml new file mode 100644 index 0000000000..1500d50d99 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvr-0e6778305a28eacf186b54844a0e5ea0.yaml @@ -0,0 +1,58 @@ +id: wpvr-0e6778305a28eacf186b54844a0e5ea0 + +info: + name: > + WP VR <= 8.3.14 - Missing Authorization to Plugin Version Downgrade + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34fcc835-593f-435b-ad00-07ca0cb649fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvr/" + google-query: inurl:"/wp-content/plugins/wpvr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvr,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvr-18966e8228314b8165d39d48519f43cc.yaml b/nuclei-templates/cve-less/plugins/wpvr-18966e8228314b8165d39d48519f43cc.yaml new file mode 100644 index 0000000000..d7322161be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvr-18966e8228314b8165d39d48519f43cc.yaml @@ -0,0 +1,58 @@ +id: wpvr-18966e8228314b8165d39d48519f43cc + +info: + name: > + Appsero <= 1.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84003388-c47c-41db-8d2d-4643aa375a89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvr/" + google-query: inurl:"/wp-content/plugins/wpvr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvr,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvr-30833f7da41d4fcbb3740f51789c1920.yaml b/nuclei-templates/cve-less/plugins/wpvr-30833f7da41d4fcbb3740f51789c1920.yaml new file mode 100644 index 0000000000..bdcf6b41b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvr-30833f7da41d4fcbb3740f51789c1920.yaml @@ -0,0 +1,58 @@ +id: wpvr-30833f7da41d4fcbb3740f51789c1920 + +info: + name: > + WP VR <= 8.3.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc08e4cf-3964-406e-9046-420e749df4b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvr/" + google-query: inurl:"/wp-content/plugins/wpvr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvr-30df02f445ade717ac7c0e2991062171.yaml b/nuclei-templates/cve-less/plugins/wpvr-30df02f445ade717ac7c0e2991062171.yaml new file mode 100644 index 0000000000..ba75d11dfe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvr-30df02f445ade717ac7c0e2991062171.yaml @@ -0,0 +1,58 @@ +id: wpvr-30df02f445ade717ac7c0e2991062171 + +info: + name: > + WP VR <= 8.2.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54b495e8-f641-444d-a3d4-a54bb0836c40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvr/" + google-query: inurl:"/wp-content/plugins/wpvr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvr,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpvr-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/wpvr-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..52f2bdf443 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpvr-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: wpvr-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpvr/" + google-query: inurl:"/wp-content/plugins/wpvr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpvr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpvr/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpvr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpworx-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/plugins/wpworx-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..00e925fb9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpworx-faq-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: wpworx-faq-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpworx-faq/" + google-query: inurl:"/wp-content/plugins/wpworx-faq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpworx-faq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpworx-faq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpworx-faq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-1453924550bc29c555e5d4ba1d470f33.yaml b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-1453924550bc29c555e5d4ba1d470f33.yaml new file mode 100644 index 0000000000..c0da09811e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-1453924550bc29c555e5d4ba1d470f33.yaml @@ -0,0 +1,58 @@ +id: wpzoom-addons-for-beaver-builder-1453924550bc29c555e5d4ba1d470f33 + +info: + name: > + Beaver Builder Addons by WPZOOM <= 1.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Box Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03564cae-df90-454b-8379-6ad9f22b7389?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpzoom-addons-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/wpzoom-addons-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpzoom-addons-for-beaver-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpzoom-addons-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-addons-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-435ab56c3c78663cfa598710697f9daf.yaml b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-435ab56c3c78663cfa598710697f9daf.yaml new file mode 100644 index 0000000000..07f04a3199 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-435ab56c3c78663cfa598710697f9daf.yaml @@ -0,0 +1,58 @@ +id: wpzoom-addons-for-beaver-builder-435ab56c3c78663cfa598710697f9daf + +info: + name: > + Beaver Builder Addons by WPZOOM <= 1.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Testimonials Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02fceb91-7691-4629-b18b-57959e9f3f62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpzoom-addons-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/wpzoom-addons-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpzoom-addons-for-beaver-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpzoom-addons-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-addons-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-46443215df27c06259cb9cb549f79f5d.yaml b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-46443215df27c06259cb9cb549f79f5d.yaml new file mode 100644 index 0000000000..694bf33f20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-46443215df27c06259cb9cb549f79f5d.yaml @@ -0,0 +1,58 @@ +id: wpzoom-addons-for-beaver-builder-46443215df27c06259cb9cb549f79f5d + +info: + name: > + Beaver Builder Addons by WPZOOM <= 1.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6baa44c7-1c13-45ad-9fb5-da06933f3cd0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpzoom-addons-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/wpzoom-addons-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpzoom-addons-for-beaver-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpzoom-addons-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-addons-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-6fe1ccb7efc24357409ad5ff0b713ab1.yaml b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-6fe1ccb7efc24357409ad5ff0b713ab1.yaml new file mode 100644 index 0000000000..5cb5349fd5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-6fe1ccb7efc24357409ad5ff0b713ab1.yaml @@ -0,0 +1,58 @@ +id: wpzoom-addons-for-beaver-builder-6fe1ccb7efc24357409ad5ff0b713ab1 + +info: + name: > + Beaver Builder Addons by WPZOOM <= 1.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Team Members Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/746385e0-6bb9-47f2-a3e7-72f8e28be731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpzoom-addons-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/wpzoom-addons-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpzoom-addons-for-beaver-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpzoom-addons-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-addons-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-c8eb6bc5db7f4876cb01e7f978c6ef1d.yaml b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-c8eb6bc5db7f4876cb01e7f978c6ef1d.yaml new file mode 100644 index 0000000000..7b3790ad45 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpzoom-addons-for-beaver-builder-c8eb6bc5db7f4876cb01e7f978c6ef1d.yaml @@ -0,0 +1,58 @@ +id: wpzoom-addons-for-beaver-builder-c8eb6bc5db7f4876cb01e7f978c6ef1d + +info: + name: > + Beaver Builder Addons by WPZOOM <= 1.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Heading Widget + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/781987af-3753-46ec-9d56-fb8b6ef42277?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpzoom-addons-for-beaver-builder/" + google-query: inurl:"/wp-content/plugins/wpzoom-addons-for-beaver-builder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpzoom-addons-for-beaver-builder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpzoom-addons-for-beaver-builder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-addons-for-beaver-builder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpzoom-elementor-addons-0c1df7bc0f650153d4deab14ee137704.yaml b/nuclei-templates/cve-less/plugins/wpzoom-elementor-addons-0c1df7bc0f650153d4deab14ee137704.yaml new file mode 100644 index 0000000000..741ebcec0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpzoom-elementor-addons-0c1df7bc0f650153d4deab14ee137704.yaml @@ -0,0 +1,58 @@ +id: wpzoom-elementor-addons-0c1df7bc0f650153d4deab14ee137704 + +info: + name: > + WPZOOM Addons for Elementor (Templates, Widgets) <= <=1.1.35 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61589c29-3f81-49e2-b001-c51892141c76?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpzoom-elementor-addons/" + google-query: inurl:"/wp-content/plugins/wpzoom-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpzoom-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpzoom-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpzoom-portfolio-0ee2773c0417239ca9eb51cc09f9c94f.yaml b/nuclei-templates/cve-less/plugins/wpzoom-portfolio-0ee2773c0417239ca9eb51cc09f9c94f.yaml new file mode 100644 index 0000000000..ef22fe63cd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpzoom-portfolio-0ee2773c0417239ca9eb51cc09f9c94f.yaml @@ -0,0 +1,58 @@ +id: wpzoom-portfolio-0ee2773c0417239ca9eb51cc09f9c94f + +info: + name: > + WPZOOM Portfolio <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84cb907c-bd6b-4031-96a1-8a6de71923e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpzoom-portfolio/" + google-query: inurl:"/wp-content/plugins/wpzoom-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpzoom-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpzoom-portfolio/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wpzoom-shortcodes-3b341aa619ead8c67e0c3faf1b78e638.yaml b/nuclei-templates/cve-less/plugins/wpzoom-shortcodes-3b341aa619ead8c67e0c3faf1b78e638.yaml new file mode 100644 index 0000000000..1404c18234 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wpzoom-shortcodes-3b341aa619ead8c67e0c3faf1b78e638.yaml @@ -0,0 +1,58 @@ +id: wpzoom-shortcodes-3b341aa619ead8c67e0c3faf1b78e638 + +info: + name: > + WPZOOM Shortcodes <= 1.0.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d2a95c6f-7248-4805-af86-11fd536b5d8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpzoom-shortcodes/" + google-query: inurl:"/wp-content/plugins/wpzoom-shortcodes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpzoom-shortcodes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpzoom-shortcodes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-shortcodes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wr-age-verification-46269389e3b60bf15a43ac719ab1d96d.yaml b/nuclei-templates/cve-less/plugins/wr-age-verification-46269389e3b60bf15a43ac719ab1d96d.yaml new file mode 100644 index 0000000000..bed28e4947 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wr-age-verification-46269389e3b60bf15a43ac719ab1d96d.yaml @@ -0,0 +1,58 @@ +id: wr-age-verification-46269389e3b60bf15a43ac719ab1d96d + +info: + name: > + Wr Age Verification <= 1.0.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a95cbc9e-146a-4b6d-bfb7-9f7ea5ec394e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wr-age-verification/" + google-query: inurl:"/wp-content/plugins/wr-age-verification/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wr-age-verification,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wr-age-verification/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wr-age-verification" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wr-contactform-cf0536ededa77239ac982d05d856b3db.yaml b/nuclei-templates/cve-less/plugins/wr-contactform-cf0536ededa77239ac982d05d856b3db.yaml new file mode 100644 index 0000000000..f774fd8834 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wr-contactform-cf0536ededa77239ac982d05d856b3db.yaml @@ -0,0 +1,58 @@ +id: wr-contactform-cf0536ededa77239ac982d05d856b3db + +info: + name: > + WR ContactForm < 1.1.10 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dc3cd92-db38-4aa4-8907-9ba7e99380f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wr-contactform/" + google-query: inurl:"/wp-content/plugins/wr-contactform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wr-contactform,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wr-contactform/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wr-contactform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wrc-pricing-tables-b7300a2ec84dffd7f0d27ca9d7ff574b.yaml b/nuclei-templates/cve-less/plugins/wrc-pricing-tables-b7300a2ec84dffd7f0d27ca9d7ff574b.yaml new file mode 100644 index 0000000000..4ea4c3a06d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wrc-pricing-tables-b7300a2ec84dffd7f0d27ca9d7ff574b.yaml @@ -0,0 +1,58 @@ +id: wrc-pricing-tables-b7300a2ec84dffd7f0d27ca9d7ff574b + +info: + name: > + WRC Pricing Tables <= 2.3.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7028184-2b16-45a8-893a-37eb74bab329?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wrc-pricing-tables/" + google-query: inurl:"/wp-content/plugins/wrc-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wrc-pricing-tables,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wrc-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wrc-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wrc-pricing-tables-c3986a6ffb844160a08c3a8660d4bd5e.yaml b/nuclei-templates/cve-less/plugins/wrc-pricing-tables-c3986a6ffb844160a08c3a8660d4bd5e.yaml new file mode 100644 index 0000000000..c457146b64 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wrc-pricing-tables-c3986a6ffb844160a08c3a8660d4bd5e.yaml @@ -0,0 +1,58 @@ +id: wrc-pricing-tables-c3986a6ffb844160a08c3a8660d4bd5e + +info: + name: > + WRC Pricing Tables <= 2.3.7 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/823dc422-12f4-4f7d-a305-2e4db18bafdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wrc-pricing-tables/" + google-query: inurl:"/wp-content/plugins/wrc-pricing-tables/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wrc-pricing-tables,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wrc-pricing-tables/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wrc-pricing-tables" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ws-bootstrap-vc-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/ws-bootstrap-vc-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..70ab9dc3a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ws-bootstrap-vc-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: ws-bootstrap-vc-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-bootstrap-vc/" + google-query: inurl:"/wp-content/plugins/ws-bootstrap-vc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-bootstrap-vc,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-bootstrap-vc/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-bootstrap-vc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ws-facebook-likebox-4ece1b2368b1b6541fd5808b6263c140.yaml b/nuclei-templates/cve-less/plugins/ws-facebook-likebox-4ece1b2368b1b6541fd5808b6263c140.yaml new file mode 100644 index 0000000000..156398921d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ws-facebook-likebox-4ece1b2368b1b6541fd5808b6263c140.yaml @@ -0,0 +1,58 @@ +id: ws-facebook-likebox-4ece1b2368b1b6541fd5808b6263c140 + +info: + name: > + WS Facebook Like Box Widget <= 5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8bebc229-9d15-439f-a8df-f68455bc5193?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-facebook-likebox/" + google-query: inurl:"/wp-content/plugins/ws-facebook-likebox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-facebook-likebox,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-facebook-likebox/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-facebook-likebox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ws-form-7c5b4d9c6aa7181d9617238c12cc19eb.yaml b/nuclei-templates/cve-less/plugins/ws-form-7c5b4d9c6aa7181d9617238c12cc19eb.yaml new file mode 100644 index 0000000000..0750c5eac2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ws-form-7c5b4d9c6aa7181d9617238c12cc19eb.yaml @@ -0,0 +1,58 @@ +id: ws-form-7c5b4d9c6aa7181d9617238c12cc19eb + +info: + name: > + WS Form LITE <= 1.9.117 - CAPTCHA Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d99f81ea-1e74-4b67-a6c5-3dbc7865a68a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-form/" + google-query: inurl:"/wp-content/plugins/ws-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.117') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ws-form-832185af76432ae76d6be1580f0d17e2.yaml b/nuclei-templates/cve-less/plugins/ws-form-832185af76432ae76d6be1580f0d17e2.yaml new file mode 100644 index 0000000000..7b196fb745 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ws-form-832185af76432ae76d6be1580f0d17e2.yaml @@ -0,0 +1,58 @@ +id: ws-form-832185af76432ae76d6be1580f0d17e2 + +info: + name: > + WS Form LITE and WS Form Pro < 1.8.176 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2990ed9-061e-4d35-aae0-99282a4f3737?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-form/" + google-query: inurl:"/wp-content/plugins/ws-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.176') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ws-form-a9651b358db184ef2f9f80cf3ecfa474.yaml b/nuclei-templates/cve-less/plugins/ws-form-a9651b358db184ef2f9f80cf3ecfa474.yaml new file mode 100644 index 0000000000..cf9879327d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ws-form-a9651b358db184ef2f9f80cf3ecfa474.yaml @@ -0,0 +1,58 @@ +id: ws-form-a9651b358db184ef2f9f80cf3ecfa474 + +info: + name: > + WS Form LITE and Pro < 1.8.176 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd650510-2d1c-48a1-a5fa-d4c26f3d030c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-form/" + google-query: inurl:"/wp-content/plugins/ws-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.176') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ws-form-b4ff9a96de0f409f95e972962d7a3e6d.yaml b/nuclei-templates/cve-less/plugins/ws-form-b4ff9a96de0f409f95e972962d7a3e6d.yaml new file mode 100644 index 0000000000..f93bc0ac5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ws-form-b4ff9a96de0f409f95e972962d7a3e6d.yaml @@ -0,0 +1,58 @@ +id: ws-form-b4ff9a96de0f409f95e972962d7a3e6d + +info: + name: > + WS Form LITE <= 1.9.170 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3171015-227d-420a-ba3a-e6e2dc17ba8c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-form/" + google-query: inurl:"/wp-content/plugins/ws-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-form,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.171') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ws-form-pro-832185af76432ae76d6be1580f0d17e2.yaml b/nuclei-templates/cve-less/plugins/ws-form-pro-832185af76432ae76d6be1580f0d17e2.yaml new file mode 100644 index 0000000000..94258f58db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ws-form-pro-832185af76432ae76d6be1580f0d17e2.yaml @@ -0,0 +1,58 @@ +id: ws-form-pro-832185af76432ae76d6be1580f0d17e2 + +info: + name: > + WS Form LITE and WS Form Pro < 1.8.176 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2990ed9-061e-4d35-aae0-99282a4f3737?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-form-pro/" + google-query: inurl:"/wp-content/plugins/ws-form-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-form-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-form-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-form-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.176') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ws-form-pro-a9651b358db184ef2f9f80cf3ecfa474.yaml b/nuclei-templates/cve-less/plugins/ws-form-pro-a9651b358db184ef2f9f80cf3ecfa474.yaml new file mode 100644 index 0000000000..12dd746a1b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ws-form-pro-a9651b358db184ef2f9f80cf3ecfa474.yaml @@ -0,0 +1,58 @@ +id: ws-form-pro-a9651b358db184ef2f9f80cf3ecfa474 + +info: + name: > + WS Form LITE and Pro < 1.8.176 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd650510-2d1c-48a1-a5fa-d4c26f3d030c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-form-pro/" + google-query: inurl:"/wp-content/plugins/ws-form-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-form-pro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-form-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-form-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.176') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wsb-brands-02b515a3d90192b157fb5edc5ea88a55.yaml b/nuclei-templates/cve-less/plugins/wsb-brands-02b515a3d90192b157fb5edc5ea88a55.yaml new file mode 100644 index 0000000000..ad48c6ceb3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wsb-brands-02b515a3d90192b157fb5edc5ea88a55.yaml @@ -0,0 +1,58 @@ +id: wsb-brands-02b515a3d90192b157fb5edc5ea88a55 + +info: + name: > + WSB Brands <= 1.1.8 - Authenticated (Administrator+) Stored Cross-Site Scripting via $logo + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89321887-0116-47fb-b65b-008c9fb01b62?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wsb-brands/" + google-query: inurl:"/wp-content/plugins/wsb-brands/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wsb-brands,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wsb-brands/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wsb-brands" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wsecure-8435cd6b84481f3b14132a8d7f815c94.yaml b/nuclei-templates/cve-less/plugins/wsecure-8435cd6b84481f3b14132a8d7f815c94.yaml new file mode 100644 index 0000000000..60019b1f56 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wsecure-8435cd6b84481f3b14132a8d7f815c94.yaml @@ -0,0 +1,58 @@ +id: wsecure-8435cd6b84481f3b14132a8d7f815c94 + +info: + name: > + wSecure Lite < 2.4 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bac57319-3b0c-4b83-af9e-7b5539ef087a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wsecure/" + google-query: inurl:"/wp-content/plugins/wsecure/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wsecure,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wsecure/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wsecure" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wsecure-9b48b8479f4c58ab28f6369c437cd823.yaml b/nuclei-templates/cve-less/plugins/wsecure-9b48b8479f4c58ab28f6369c437cd823.yaml new file mode 100644 index 0000000000..cc98fb8287 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wsecure-9b48b8479f4c58ab28f6369c437cd823.yaml @@ -0,0 +1,58 @@ +id: wsecure-9b48b8479f4c58ab28f6369c437cd823 + +info: + name: > + wSecure Lite <= 2.5 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05f5addb-ab1d-4b67-b969-3b95d43be790?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wsecure/" + google-query: inurl:"/wp-content/plugins/wsecure/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wsecure,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wsecure/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wsecure" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wsm-downloader-8589ee226f71b9ad4c2ae9aa0680e0d9.yaml b/nuclei-templates/cve-less/plugins/wsm-downloader-8589ee226f71b9ad4c2ae9aa0680e0d9.yaml new file mode 100644 index 0000000000..3522541cdf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wsm-downloader-8589ee226f71b9ad4c2ae9aa0680e0d9.yaml @@ -0,0 +1,58 @@ +id: wsm-downloader-8589ee226f71b9ad4c2ae9aa0680e0d9 + +info: + name: > + WSM Downloader <- 1.4.0 - Domain Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6374cda-5aa2-4a2c-8d20-5641cfc33529?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wsm-downloader/" + google-query: inurl:"/wp-content/plugins/wsm-downloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wsm-downloader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wsm-downloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wsm-downloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wsm-downloader-de76eb4127c4abe851f7593ebf365054.yaml b/nuclei-templates/cve-less/plugins/wsm-downloader-de76eb4127c4abe851f7593ebf365054.yaml new file mode 100644 index 0000000000..33790cf048 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wsm-downloader-de76eb4127c4abe851f7593ebf365054.yaml @@ -0,0 +1,58 @@ +id: wsm-downloader-de76eb4127c4abe851f7593ebf365054 + +info: + name: > + WSM Downloader <= 1.4.0 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/36d3dae0-4705-487a-a4a4-c12280e866a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wsm-downloader/" + google-query: inurl:"/wp-content/plugins/wsm-downloader/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wsm-downloader,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wsm-downloader/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wsm-downloader" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wti-like-post-3324e66b3f1d865a4a88e7aa92b87f29.yaml b/nuclei-templates/cve-less/plugins/wti-like-post-3324e66b3f1d865a4a88e7aa92b87f29.yaml new file mode 100644 index 0000000000..ae618d3277 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wti-like-post-3324e66b3f1d865a4a88e7aa92b87f29.yaml @@ -0,0 +1,58 @@ +id: wti-like-post-3324e66b3f1d865a4a88e7aa92b87f29 + +info: + name: > + WTI Like Post < 1.4.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1800241-802b-4c6a-a9d8-a7cf78450346?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wti-like-post/" + google-query: inurl:"/wp-content/plugins/wti-like-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wti-like-post,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wti-like-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wti-like-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wti-like-post-bea1167e010c002491bae397468a7fde.yaml b/nuclei-templates/cve-less/plugins/wti-like-post-bea1167e010c002491bae397468a7fde.yaml new file mode 100644 index 0000000000..e072498485 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wti-like-post-bea1167e010c002491bae397468a7fde.yaml @@ -0,0 +1,58 @@ +id: wti-like-post-bea1167e010c002491bae397468a7fde + +info: + name: > + WTI Like Post <= 1.4.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21dd21cb-35b7-47df-a9f0-6fd92c45a8ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wti-like-post/" + google-query: inurl:"/wp-content/plugins/wti-like-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wti-like-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wti-like-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wti-like-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wti-like-post-fe235b16e5129f2873d5a71f2024f409.yaml b/nuclei-templates/cve-less/plugins/wti-like-post-fe235b16e5129f2873d5a71f2024f409.yaml new file mode 100644 index 0000000000..b1c3f877a6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wti-like-post-fe235b16e5129f2873d5a71f2024f409.yaml @@ -0,0 +1,58 @@ +id: wti-like-post-fe235b16e5129f2873d5a71f2024f409 + +info: + name: > + WTI Like Post <= 1.4.6 - IP Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6a2580f-4a40-4aed-acbf-afecbd16bbf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wti-like-post/" + google-query: inurl:"/wp-content/plugins/wti-like-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wti-like-post,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wti-like-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wti-like-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wu-rating-530246c3333edec963a6035638964677.yaml b/nuclei-templates/cve-less/plugins/wu-rating-530246c3333edec963a6035638964677.yaml new file mode 100644 index 0000000000..981d3d5e28 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wu-rating-530246c3333edec963a6035638964677.yaml @@ -0,0 +1,58 @@ +id: wu-rating-530246c3333edec963a6035638964677 + +info: + name: > + Wu-Rating <= 1.0 12319 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3abd265-f1b0-49e5-ba50-5af91e855f5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wu-rating/" + google-query: inurl:"/wp-content/plugins/wu-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wu-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wu-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wu-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0 12319') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wufoo-shortcode-e7037db773bf01752d04e36ac2a2c9a0.yaml b/nuclei-templates/cve-less/plugins/wufoo-shortcode-e7037db773bf01752d04e36ac2a2c9a0.yaml new file mode 100644 index 0000000000..84837dcd01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wufoo-shortcode-e7037db773bf01752d04e36ac2a2c9a0.yaml @@ -0,0 +1,58 @@ +id: wufoo-shortcode-e7037db773bf01752d04e36ac2a2c9a0 + +info: + name: > + Wufoo Shortcode <= 1.51 - Authenticated (Contributor+) Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76ccc688-79c0-4b6e-aac9-cf18baf9af46?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wufoo-shortcode/" + google-query: inurl:"/wp-content/plugins/wufoo-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wufoo-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wufoo-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wufoo-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.51') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wupo-group-attributes-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/wupo-group-attributes-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..422e3727be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wupo-group-attributes-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wupo-group-attributes-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wupo-group-attributes/" + google-query: inurl:"/wp-content/plugins/wupo-group-attributes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wupo-group-attributes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wupo-group-attributes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wupo-group-attributes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wwc-amz-aff-c7d33fa41953ee9af357676fb8306244.yaml b/nuclei-templates/cve-less/plugins/wwc-amz-aff-c7d33fa41953ee9af357676fb8306244.yaml new file mode 100644 index 0000000000..437ecff4e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wwc-amz-aff-c7d33fa41953ee9af357676fb8306244.yaml @@ -0,0 +1,58 @@ +id: wwc-amz-aff-c7d33fa41953ee9af357676fb8306244 + +info: + name: > + WooCommerce Amazon Affiliates < 9.0.2.16 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1f64b77-5c8b-44f3-b1a8-6aa9f13624b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wwc-amz-aff/" + google-query: inurl:"/wp-content/plugins/wwc-amz-aff/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wwc-amz-aff,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wwc-amz-aff/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wwc-amz-aff" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.0.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wwm-social-share-on-image-hover-92ee681763fb9cdadb89c1275ea24df6.yaml b/nuclei-templates/cve-less/plugins/wwm-social-share-on-image-hover-92ee681763fb9cdadb89c1275ea24df6.yaml new file mode 100644 index 0000000000..cb93f8d9ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wwm-social-share-on-image-hover-92ee681763fb9cdadb89c1275ea24df6.yaml @@ -0,0 +1,58 @@ +id: wwm-social-share-on-image-hover-92ee681763fb9cdadb89c1275ea24df6 + +info: + name: > + WWM Social Share On Image Hover <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c9ab868b-51ab-4dad-b662-8302cda9c0e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wwm-social-share-on-image-hover/" + google-query: inurl:"/wp-content/plugins/wwm-social-share-on-image-hover/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wwm-social-share-on-image-hover,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wwm-social-share-on-image-hover/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wwm-social-share-on-image-hover" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/www-xml-sitemap-generator-org-c30ecd15c33e495c7a907535cf50c4ac.yaml b/nuclei-templates/cve-less/plugins/www-xml-sitemap-generator-org-c30ecd15c33e495c7a907535cf50c4ac.yaml new file mode 100644 index 0000000000..5ca0d4bbe9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/www-xml-sitemap-generator-org-c30ecd15c33e495c7a907535cf50c4ac.yaml @@ -0,0 +1,58 @@ +id: www-xml-sitemap-generator-org-c30ecd15c33e495c7a907535cf50c4ac + +info: + name: > + XML Sitemap Generator for Google <= 2.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/650dfc4c-d851-481c-af8f-4dfe1e128a1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/www-xml-sitemap-generator-org/" + google-query: inurl:"/wp-content/plugins/www-xml-sitemap-generator-org/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,www-xml-sitemap-generator-org,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/www-xml-sitemap-generator-org/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "www-xml-sitemap-generator-org" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wxsync-506b320d59fe9094f7b88764f2b3b6fd.yaml b/nuclei-templates/cve-less/plugins/wxsync-506b320d59fe9094f7b88764f2b3b6fd.yaml new file mode 100644 index 0000000000..ea4bd6b0cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wxsync-506b320d59fe9094f7b88764f2b3b6fd.yaml @@ -0,0 +1,58 @@ +id: wxsync-506b320d59fe9094f7b88764f2b3b6fd + +info: + name: > + WxSync <= 2.7.24 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c85c13ed-6981-4062-8aca-800721b28b88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wxsync/" + google-query: inurl:"/wp-content/plugins/wxsync/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wxsync,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wxsync/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wxsync" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-0dc627cd120008e5a66c81e20ce78b02.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-0dc627cd120008e5a66c81e20ce78b02.yaml new file mode 100644 index 0000000000..a863b04055 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-0dc627cd120008e5a66c81e20ce78b02.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-0dc627cd120008e5a66c81e20ce78b02 + +info: + name: > + MailPoet Newsletters <= 2.7.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca729178-8df0-437e-82cc-70c4975f7b47?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-149048c8f49646b7cbdd6843761e070a.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-149048c8f49646b7cbdd6843761e070a.yaml new file mode 100644 index 0000000000..769dc47208 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-149048c8f49646b7cbdd6843761e070a.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-149048c8f49646b7cbdd6843761e070a + +info: + name: > + MailPoet Newsletters (Previous) <= 2.1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/401f5d57-ce3d-46c1-bfa9-c8fab99a7e31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-16a2ba366a797ba0d5eb3e8be47b4c59.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-16a2ba366a797ba0d5eb3e8be47b4c59.yaml new file mode 100644 index 0000000000..3aaf95d25c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-16a2ba366a797ba0d5eb3e8be47b4c59.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-16a2ba366a797ba0d5eb3e8be47b4c59 + +info: + name: > + MailPoet Newsletters <= 2.6.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5763e3b-01b3-4541-8fef-80fcb7e7e88e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-568514847d2ecbfcd9be56c047f3a92a.yaml new file mode 100644 index 0000000000..37af7bdfba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-568514847d2ecbfcd9be56c047f3a92a + +info: + name: > + SWFUpload <= 2.2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d311aab4-fca8-4e83-83cf-c4b8350d7dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-7b51f983a57c524a14f0aa93885b9cf0.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-7b51f983a57c524a14f0aa93885b9cf0.yaml new file mode 100644 index 0000000000..9950778c69 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-7b51f983a57c524a14f0aa93885b9cf0.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-7b51f983a57c524a14f0aa93885b9cf0 + +info: + name: > + MailPoet Newsletters <= 2.2 - Multiple SQL Injections + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/289569f5-8a8d-4427-8ad4-e431c955311e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-d6e885fce7f28ee6559b8945eb076a5d.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-d6e885fce7f28ee6559b8945eb076a5d.yaml new file mode 100644 index 0000000000..62d41dfca0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-d6e885fce7f28ee6559b8945eb076a5d.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-d6e885fce7f28ee6559b8945eb076a5d + +info: + name: > + MailPoet Newsletters <= 2.6.7 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2e3194a7-5b3d-4805-9a35-50ebe65aa6ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-eb211f56901dd02ad29cd2f46f132fad.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-eb211f56901dd02ad29cd2f46f132fad.yaml new file mode 100644 index 0000000000..6739f6b9a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-eb211f56901dd02ad29cd2f46f132fad.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-eb211f56901dd02ad29cd2f46f132fad + +info: + name: > + MailPoet Newsletters (Previous) <= 2.6.10 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/557172d0-33ad-427a-b575-df529e2aaab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-edea3de67b57b3e5d091c25ded4c1ae1.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-edea3de67b57b3e5d091c25ded4c1ae1.yaml new file mode 100644 index 0000000000..61ced1d162 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-edea3de67b57b3e5d091c25ded4c1ae1.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-edea3de67b57b3e5d091c25ded4c1ae1 + +info: + name: > + MailPoet Newsletters <= 2.6.19 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14667d93-4fba-4c50-8228-737ae91f2789?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-f7d5e9c6698316d3dbc370fb98b6400f.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-f7d5e9c6698316d3dbc370fb98b6400f.yaml new file mode 100644 index 0000000000..88b5a9d63d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-f7d5e9c6698316d3dbc370fb98b6400f.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-f7d5e9c6698316d3dbc370fb98b6400f + +info: + name: > + MailPoet Newsletters <= 2.8.1 - Spam Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/464a41f6-5569-4306-be99-566e2354c73b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/wysija-newsletters-ff3256f502dbc04fc7eb4fae59537065.yaml b/nuclei-templates/cve-less/plugins/wysija-newsletters-ff3256f502dbc04fc7eb4fae59537065.yaml new file mode 100644 index 0000000000..82c7bf33e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wysija-newsletters-ff3256f502dbc04fc7eb4fae59537065.yaml @@ -0,0 +1,58 @@ +id: wysija-newsletters-ff3256f502dbc04fc7eb4fae59537065 + +info: + name: > + MailPoet Newsletters <= 2.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aff636ac-5bb5-4804-adf4-358ef3158d2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wysija-newsletters/" + google-query: inurl:"/wp-content/plugins/wysija-newsletters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wysija-newsletters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wysija-newsletters/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wysija-newsletters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/x-forms-express-0943806ea17e69fbad3f9008b6d8edaf.yaml b/nuclei-templates/cve-less/plugins/x-forms-express-0943806ea17e69fbad3f9008b6d8edaf.yaml new file mode 100644 index 0000000000..18bb8691c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/x-forms-express-0943806ea17e69fbad3f9008b6d8edaf.yaml @@ -0,0 +1,58 @@ +id: x-forms-express-0943806ea17e69fbad3f9008b6d8edaf + +info: + name: > + NEX-Forms Lite – WordPress Contact Form builder < 3.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93badb2f-bb47-4ae6-a447-d8237cc9237f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/x-forms-express/" + google-query: inurl:"/wp-content/plugins/x-forms-express/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,x-forms-express,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/x-forms-express/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "x-forms-express" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-04c5acbffc68842824e9b1f4759868d3.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-04c5acbffc68842824e9b1f4759868d3.yaml new file mode 100644 index 0000000000..b1e2992804 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-04c5acbffc68842824e9b1f4759868d3.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-04c5acbffc68842824e9b1f4759868d3 + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.2 - Remote Command Execution + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7c763f-5c2b-407e-bdb1-4ea34fac5f4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-10a6f997b77b37003eabf2a216fdeced.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-10a6f997b77b37003eabf2a216fdeced.yaml new file mode 100644 index 0000000000..9cf3cd1f6b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-10a6f997b77b37003eabf2a216fdeced.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-10a6f997b77b37003eabf2a216fdeced + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 4.2.152 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5b7538f-891a-423f-97d1-b0212efcdb98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.153') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-1603594359d529d2b8fdbef947c8f58c.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-1603594359d529d2b8fdbef947c8f58c.yaml new file mode 100644 index 0000000000..2daeccc993 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-1603594359d529d2b8fdbef947c8f58c.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-1603594359d529d2b8fdbef947c8f58c + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin 4.2.1 - 4.2.12 - Unprotected AJAX Actions + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c703856-9519-4181-9312-dcf862840bd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 4.2.1', '<= 4.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-1c3b4e53e5b3379877d01d32e9f8b494.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-1c3b4e53e5b3379877d01d32e9f8b494.yaml new file mode 100644 index 0000000000..43847f2c8e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-1c3b4e53e5b3379877d01d32e9f8b494.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-1c3b4e53e5b3379877d01d32e9f8b494 + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.1 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8cdd8b4-52e6-431b-b2f0-bfe1d0c1dd91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-259f1c198d6aae45fe01969db446735f.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-259f1c198d6aae45fe01969db446735f.yaml new file mode 100644 index 0000000000..84e8c94fd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-259f1c198d6aae45fe01969db446735f.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-259f1c198d6aae45fe01969db446735f + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f06008c0-0ce3-4d78-934e-2a7fa5ce4e98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-34ff52c103b465dd566bb0b7233b8c5c.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-34ff52c103b465dd566bb0b7233b8c5c.yaml new file mode 100644 index 0000000000..5b4c3c37d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-34ff52c103b465dd566bb0b7233b8c5c.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-34ff52c103b465dd566bb0b7233b8c5c + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.1 - Improper Access Control to Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6eab3497-bf77-43a8-962d-d63db7290777?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-614dbc5cead598413ac3ce439b53a52e.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-614dbc5cead598413ac3ce439b53a52e.yaml new file mode 100644 index 0000000000..578bacdca7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-614dbc5cead598413ac3ce439b53a52e.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-614dbc5cead598413ac3ce439b53a52e + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afd05b33-a347-49f6-81f0-879606819ca6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-66945b5d2da91990e6148061d7f22822.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-66945b5d2da91990e6148061d7f22822.yaml new file mode 100644 index 0000000000..5bbec03f03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-66945b5d2da91990e6148061d7f22822.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-66945b5d2da91990e6148061d7f22822 + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15abde72-515a-4e1c-af4c-d9da56a5cbe2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-7d4b923b890bf3599f0fa68ae5f894dc.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-7d4b923b890bf3599f0fa68ae5f894dc.yaml new file mode 100644 index 0000000000..67e192aa07 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-7d4b923b890bf3599f0fa68ae5f894dc.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-7d4b923b890bf3599f0fa68ae5f894dc + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.4 - Path Traversal to Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d2345d2-0bcf-46fc-a857-0ec10a1b1c26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-9584af5b5f010003c1054d63d9d8c800.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-9584af5b5f010003c1054d63d9d8c800.yaml new file mode 100644 index 0000000000..2addff8de6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-9584af5b5f010003c1054d63d9d8c800.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-9584af5b5f010003c1054d63d9d8c800 + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.2 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d19e18d-6f2e-48e7-b8da-1d399dc4d65c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-981dc1dc52b06f3430863bd14410cb31.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-981dc1dc52b06f3430863bd14410cb31.yaml new file mode 100644 index 0000000000..7dff1963ec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-981dc1dc52b06f3430863bd14410cb31.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-981dc1dc52b06f3430863bd14410cb31 + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fae9f282-eb67-4ad9-be2d-677238527934?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-ba15e4c927467d88c6d7ea80fbe845a6.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-ba15e4c927467d88c6d7ea80fbe845a6.yaml new file mode 100644 index 0000000000..1ffccee463 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-ba15e4c927467d88c6d7ea80fbe845a6.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-ba15e4c927467d88c6d7ea80fbe845a6 + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 4.2.16 - Unauthenticated Plugin Settings Reset + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e40a954-53c4-453b-85f0-d3febaa6ae84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-c66baa1c275e274488b7d52e2acbab59.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-c66baa1c275e274488b7d52e2acbab59.yaml new file mode 100644 index 0000000000..6126fcc7d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-c66baa1c275e274488b7d52e2acbab59.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-c66baa1c275e274488b7d52e2acbab59 + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.1 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9bffba4-5bcd-4ef7-a8d8-84ba452827ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-d6467913a640b127b20e07c49e842d3b.yaml b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-d6467913a640b127b20e07c49e842d3b.yaml new file mode 100644 index 0000000000..dd76b993c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xcloner-backup-and-restore-d6467913a640b127b20e07c49e842d3b.yaml @@ -0,0 +1,58 @@ +id: xcloner-backup-and-restore-d6467913a640b127b20e07c49e842d3b + +info: + name: > + Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.0 - Multiple Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/92d59dd4-7338-40ac-9a73-37e9e85351d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" + google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xcloner-backup-and-restore/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xcloner-backup-and-restore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xen-carousel-780fa31d43c1e72887f541f835fe2c28.yaml b/nuclei-templates/cve-less/plugins/xen-carousel-780fa31d43c1e72887f541f835fe2c28.yaml new file mode 100644 index 0000000000..8d27fafe97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xen-carousel-780fa31d43c1e72887f541f835fe2c28.yaml @@ -0,0 +1,58 @@ +id: xen-carousel-780fa31d43c1e72887f541f835fe2c28 + +info: + name: > + XEN Carousel <= 0.12.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25ba4be3-0bcd-41ff-8a7a-fd6ae848afb8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xen-carousel/" + google-query: inurl:"/wp-content/plugins/xen-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xen-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xen-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xen-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.12.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xerte-online-02e1b44167070c59f019d59aa8eb3804.yaml b/nuclei-templates/cve-less/plugins/xerte-online-02e1b44167070c59f019d59aa8eb3804.yaml new file mode 100644 index 0000000000..b05d8ea4d7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xerte-online-02e1b44167070c59f019d59aa8eb3804.yaml @@ -0,0 +1,58 @@ +id: xerte-online-02e1b44167070c59f019d59aa8eb3804 + +info: + name: > + Xerte Online <= 0.35 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b4b0cd0-dcc2-4790-8aeb-a304088dea3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xerte-online/" + google-query: inurl:"/wp-content/plugins/xerte-online/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xerte-online,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xerte-online/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xerte-online" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.35') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xforwoocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml b/nuclei-templates/cve-less/plugins/xforwoocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml new file mode 100644 index 0000000000..3d047145fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xforwoocommerce-05a9cfff31ff66f2865f7b47e03322c5.yaml @@ -0,0 +1,58 @@ +id: xforwoocommerce-05a9cfff31ff66f2865f7b47e03322c5 + +info: + name: > + Multiple XforWooCommerce Add-On Plugins (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xforwoocommerce/" + google-query: inurl:"/wp-content/plugins/xforwoocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xforwoocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xforwoocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xforwoocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xforwoocommerce-ad605f98f0b12012c381eafdf54cfada.yaml b/nuclei-templates/cve-less/plugins/xforwoocommerce-ad605f98f0b12012c381eafdf54cfada.yaml new file mode 100644 index 0000000000..b0d1c59eae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xforwoocommerce-ad605f98f0b12012c381eafdf54cfada.yaml @@ -0,0 +1,58 @@ +id: xforwoocommerce-ad605f98f0b12012c381eafdf54cfada + +info: + name: > + XforWooCommerce <= 2.0.2 - Authenticated (Subscriber+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5de8b93a-d7b1-4679-8c3c-2ac099a1f58f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xforwoocommerce/" + google-query: inurl:"/wp-content/plugins/xforwoocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xforwoocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xforwoocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xforwoocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xhanch-my-twitter-1ce0c9b4a51f3fdac3a650bd3678e546.yaml b/nuclei-templates/cve-less/plugins/xhanch-my-twitter-1ce0c9b4a51f3fdac3a650bd3678e546.yaml new file mode 100644 index 0000000000..1e2ab92f47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xhanch-my-twitter-1ce0c9b4a51f3fdac3a650bd3678e546.yaml @@ -0,0 +1,58 @@ +id: xhanch-my-twitter-1ce0c9b4a51f3fdac3a650bd3678e546 + +info: + name: > + Xhanch – My Twitter <= 2.7.6 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6d394af-67b0-4754-bdec-6ee89b7e8bbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xhanch-my-twitter/" + google-query: inurl:"/wp-content/plugins/xhanch-my-twitter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xhanch-my-twitter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xhanch-my-twitter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xhanch-my-twitter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xili-tidy-tags-ec41c915e32b517417556f61cbbe4554.yaml b/nuclei-templates/cve-less/plugins/xili-tidy-tags-ec41c915e32b517417556f61cbbe4554.yaml new file mode 100644 index 0000000000..b46a4cf156 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xili-tidy-tags-ec41c915e32b517417556f61cbbe4554.yaml @@ -0,0 +1,58 @@ +id: xili-tidy-tags-ec41c915e32b517417556f61cbbe4554 + +info: + name: > + xili-tidy-tags <= 1.12.03 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32fe8a09-b08f-42dc-b436-96a6ea50a439?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xili-tidy-tags/" + google-query: inurl:"/wp-content/plugins/xili-tidy-tags/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xili-tidy-tags,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xili-tidy-tags/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xili-tidy-tags" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.03') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xllentech-english-islamic-calendar-cfbef53d87854aaa058c431289304e79.yaml b/nuclei-templates/cve-less/plugins/xllentech-english-islamic-calendar-cfbef53d87854aaa058c431289304e79.yaml new file mode 100644 index 0000000000..72ba4c9ca9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xllentech-english-islamic-calendar-cfbef53d87854aaa058c431289304e79.yaml @@ -0,0 +1,58 @@ +id: xllentech-english-islamic-calendar-cfbef53d87854aaa058c431289304e79 + +info: + name: > + Xllentech English Islamic Calendar <= 2.6.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a550e489-904b-4785-b6f3-992b7dfe5bd2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xllentech-english-islamic-calendar/" + google-query: inurl:"/wp-content/plugins/xllentech-english-islamic-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xllentech-english-islamic-calendar,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xllentech-english-islamic-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xllentech-english-islamic-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xml-file-export-import-for-stampscom-and-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml b/nuclei-templates/cve-less/plugins/xml-file-export-import-for-stampscom-and-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml new file mode 100644 index 0000000000..8a29e51272 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xml-file-export-import-for-stampscom-and-woocommerce-0088814ed74fd156e9ee132de51ef1d2.yaml @@ -0,0 +1,58 @@ +id: xml-file-export-import-for-stampscom-and-woocommerce-0088814ed74fd156e9ee132de51ef1d2 + +info: + name: > + WebToffee Plugins <= (Various Versions) - Arbitrary User Creation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27ac48a7-52ee-46cb-a6d0-efbd2b516445?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xml-file-export-import-for-stampscom-and-woocommerce/" + google-query: inurl:"/wp-content/plugins/xml-file-export-import-for-stampscom-and-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xml-file-export-import-for-stampscom-and-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xml-file-export-import-for-stampscom-and-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xml-file-export-import-for-stampscom-and-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xml-for-google-merchant-center-ad7168d347e726627d613abda6b471b1.yaml b/nuclei-templates/cve-less/plugins/xml-for-google-merchant-center-ad7168d347e726627d613abda6b471b1.yaml new file mode 100644 index 0000000000..4d60df2081 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xml-for-google-merchant-center-ad7168d347e726627d613abda6b471b1.yaml @@ -0,0 +1,58 @@ +id: xml-for-google-merchant-center-ad7168d347e726627d613abda6b471b1 + +info: + name: > + XML for Google Merchant Center <= 3.0.1 - Reflected Cross-Site Scripting via page parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/16bd14a1-e69b-4b7d-8c0e-a294e120d2a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xml-for-google-merchant-center/" + google-query: inurl:"/wp-content/plugins/xml-for-google-merchant-center/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xml-for-google-merchant-center,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xml-for-google-merchant-center/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xml-for-google-merchant-center" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xml-sitemap-feed-ed9d6de2b2caf08fa88d82aee7a4dacf.yaml b/nuclei-templates/cve-less/plugins/xml-sitemap-feed-ed9d6de2b2caf08fa88d82aee7a4dacf.yaml new file mode 100644 index 0000000000..6575cc54c8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xml-sitemap-feed-ed9d6de2b2caf08fa88d82aee7a4dacf.yaml @@ -0,0 +1,58 @@ +id: xml-sitemap-feed-ed9d6de2b2caf08fa88d82aee7a4dacf + +info: + name: > + XML Sitemap & Google News <= 5.4.8 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87888350-1230-4fec-9de2-c58fa24e6a05?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xml-sitemap-feed/" + google-query: inurl:"/wp-content/plugins/xml-sitemap-feed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xml-sitemap-feed,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xml-sitemap-feed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xml-sitemap-feed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xml-sitemap-generator-for-google-cdde1a134c6ef6b26a1e78ad1a41d56f.yaml b/nuclei-templates/cve-less/plugins/xml-sitemap-generator-for-google-cdde1a134c6ef6b26a1e78ad1a41d56f.yaml new file mode 100644 index 0000000000..c77307052b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xml-sitemap-generator-for-google-cdde1a134c6ef6b26a1e78ad1a41d56f.yaml @@ -0,0 +1,58 @@ +id: xml-sitemap-generator-for-google-cdde1a134c6ef6b26a1e78ad1a41d56f + +info: + name: > + XML Sitemap Generator for Google <= 1.3.3 - Cross-Site Request Forgery to Plugin Settings Changes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b03a9aaa-ce9a-47bf-8574-0eba92fcf0c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xml-sitemap-generator-for-google/" + google-query: inurl:"/wp-content/plugins/xml-sitemap-generator-for-google/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xml-sitemap-generator-for-google,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xml-sitemap-generator-for-google/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xml-sitemap-generator-for-google" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xml-sitemaps-for-videos-a35a0e7274ecf003f21418a2f0fe05e6.yaml b/nuclei-templates/cve-less/plugins/xml-sitemaps-for-videos-a35a0e7274ecf003f21418a2f0fe05e6.yaml new file mode 100644 index 0000000000..c71ba05131 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xml-sitemaps-for-videos-a35a0e7274ecf003f21418a2f0fe05e6.yaml @@ -0,0 +1,58 @@ +id: xml-sitemaps-for-videos-a35a0e7274ecf003f21418a2f0fe05e6 + +info: + name: > + Google XML Sitemap for Videos <= 2.6.1 - Cross-Site Request Forgery via video_sitemap_generate + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/feb4f3dc-9abf-4ee3-834e-e5516652d810?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xml-sitemaps-for-videos/" + google-query: inurl:"/wp-content/plugins/xml-sitemaps-for-videos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xml-sitemaps-for-videos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xml-sitemaps-for-videos/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xml-sitemaps-for-videos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xo-event-calendar-4cf56c133f1db56b8a3cc3b03429bb93.yaml b/nuclei-templates/cve-less/plugins/xo-event-calendar-4cf56c133f1db56b8a3cc3b03429bb93.yaml new file mode 100644 index 0000000000..73352231bf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xo-event-calendar-4cf56c133f1db56b8a3cc3b03429bb93.yaml @@ -0,0 +1,58 @@ +id: xo-event-calendar-4cf56c133f1db56b8a3cc3b03429bb93 + +info: + name: > + XO Event Calendar <= 2.3.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f4e8ad18-fa25-414c-8a94-9ad9bd3c2e31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xo-event-calendar/" + google-query: inurl:"/wp-content/plugins/xo-event-calendar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xo-event-calendar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xo-event-calendar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xo-event-calendar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xo-liteslider-3f7130e05b74b1e5f65b8d9e77a1373e.yaml b/nuclei-templates/cve-less/plugins/xo-liteslider-3f7130e05b74b1e5f65b8d9e77a1373e.yaml new file mode 100644 index 0000000000..1ac92a2c59 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xo-liteslider-3f7130e05b74b1e5f65b8d9e77a1373e.yaml @@ -0,0 +1,58 @@ +id: xo-liteslider-3f7130e05b74b1e5f65b8d9e77a1373e + +info: + name: > + XO Slider <= 3.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/85150a6f-b2f3-4b95-9c9b-78f50cb8468f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xo-liteslider/" + google-query: inurl:"/wp-content/plugins/xo-liteslider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xo-liteslider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xo-liteslider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xo-liteslider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xo-security-0d6d2e1e75a3d7c24aa16b9420abf358.yaml b/nuclei-templates/cve-less/plugins/xo-security-0d6d2e1e75a3d7c24aa16b9420abf358.yaml new file mode 100644 index 0000000000..0652355c6d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xo-security-0d6d2e1e75a3d7c24aa16b9420abf358.yaml @@ -0,0 +1,58 @@ +id: xo-security-0d6d2e1e75a3d7c24aa16b9420abf358 + +info: + name: > + XO Security < 1.5.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/61684e5a-9ee1-4ae9-b26a-4552af957017?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xo-security/" + google-query: inurl:"/wp-content/plugins/xo-security/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xo-security,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xo-security/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xo-security" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xorbin-digital-flash-clock-75fb06485693f13299e4aa42a8ec1d70.yaml b/nuclei-templates/cve-less/plugins/xorbin-digital-flash-clock-75fb06485693f13299e4aa42a8ec1d70.yaml new file mode 100644 index 0000000000..0f55ad5ad2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xorbin-digital-flash-clock-75fb06485693f13299e4aa42a8ec1d70.yaml @@ -0,0 +1,58 @@ +id: xorbin-digital-flash-clock-75fb06485693f13299e4aa42a8ec1d70 + +info: + name: > + Xorbin Digital Flash Clock < 1.0 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9954c283-4dd5-4b78-8c86-97b93a1880b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xorbin-digital-flash-clock/" + google-query: inurl:"/wp-content/plugins/xorbin-digital-flash-clock/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xorbin-digital-flash-clock,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xorbin-digital-flash-clock/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xorbin-digital-flash-clock" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xpinner-lite-68634c1a8c946edc4c46f0185186727b.yaml b/nuclei-templates/cve-less/plugins/xpinner-lite-68634c1a8c946edc4c46f0185186727b.yaml new file mode 100644 index 0000000000..3717710c4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xpinner-lite-68634c1a8c946edc4c46f0185186727b.yaml @@ -0,0 +1,58 @@ +id: xpinner-lite-68634c1a8c946edc4c46f0185186727b + +info: + name: > + XPinner Lite <= 2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a01cdc31-3cab-43b0-a5ef-75fb11eeb621?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xpinner-lite/" + google-query: inurl:"/wp-content/plugins/xpinner-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xpinner-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xpinner-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xpinner-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xpinner-lite-7fd7a99aaec9de09c58a50b6b832a9fa.yaml b/nuclei-templates/cve-less/plugins/xpinner-lite-7fd7a99aaec9de09c58a50b6b832a9fa.yaml new file mode 100644 index 0000000000..23c8d3409c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xpinner-lite-7fd7a99aaec9de09c58a50b6b832a9fa.yaml @@ -0,0 +1,58 @@ +id: xpinner-lite-7fd7a99aaec9de09c58a50b6b832a9fa + +info: + name: > + xPinner Lite <= 2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7392fcb8-f125-4a1e-bb33-5614aeacb4cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xpinner-lite/" + google-query: inurl:"/wp-content/plugins/xpinner-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xpinner-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xpinner-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xpinner-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xpro-elementor-addons-85070818b2a0ed18993539089f99013d.yaml b/nuclei-templates/cve-less/plugins/xpro-elementor-addons-85070818b2a0ed18993539089f99013d.yaml new file mode 100644 index 0000000000..7b12b80adf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xpro-elementor-addons-85070818b2a0ed18993539089f99013d.yaml @@ -0,0 +1,58 @@ +id: xpro-elementor-addons-85070818b2a0ed18993539089f99013d + +info: + name: > + 130+ Widgets | Best Addons For Elementor – FREE <= 1.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07e7f03e-0d5d-4405-a0e7-9547fc762f0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xpro-elementor-addons/" + google-query: inurl:"/wp-content/plugins/xpro-elementor-addons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xpro-elementor-addons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xpro-elementor-addons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xpro-elementor-addons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xqueue-maileon-4589a6370d5dbea689df46df9c5577a1.yaml b/nuclei-templates/cve-less/plugins/xqueue-maileon-4589a6370d5dbea689df46df9c5577a1.yaml new file mode 100644 index 0000000000..1fb4f7b1da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xqueue-maileon-4589a6370d5dbea689df46df9c5577a1.yaml @@ -0,0 +1,58 @@ +id: xqueue-maileon-4589a6370d5dbea689df46df9c5577a1 + +info: + name: > + Maileon <= 2.16.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a67972d7-abfd-4ce3-9e47-30736ab32af5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xqueue-maileon/" + google-query: inurl:"/wp-content/plugins/xqueue-maileon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xqueue-maileon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xqueue-maileon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xqueue-maileon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xserver-migrator-5b3901e02ad2424b1793990cd718f093.yaml b/nuclei-templates/cve-less/plugins/xserver-migrator-5b3901e02ad2424b1793990cd718f093.yaml new file mode 100644 index 0000000000..59d090a36f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xserver-migrator-5b3901e02ad2424b1793990cd718f093.yaml @@ -0,0 +1,58 @@ +id: xserver-migrator-5b3901e02ad2424b1793990cd718f093 + +info: + name: > + Xserver Migrator <= 1.6.1 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bde2a8a5-2d18-4659-bb35-dff4f521dbb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xserver-migrator/" + google-query: inurl:"/wp-content/plugins/xserver-migrator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xserver-migrator,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xserver-migrator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xserver-migrator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xt-woo-ajax-add-to-cart-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/xt-woo-ajax-add-to-cart-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..70d2edaff7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xt-woo-ajax-add-to-cart-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: xt-woo-ajax-add-to-cart-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xt-woo-ajax-add-to-cart/" + google-query: inurl:"/wp-content/plugins/xt-woo-ajax-add-to-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xt-woo-ajax-add-to-cart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xt-woo-ajax-add-to-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xt-woo-ajax-add-to-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xt-woo-points-rewards-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/xt-woo-points-rewards-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dc80cf7a0d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xt-woo-points-rewards-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: xt-woo-points-rewards-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xt-woo-points-rewards/" + google-query: inurl:"/wp-content/plugins/xt-woo-points-rewards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xt-woo-points-rewards,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xt-woo-points-rewards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xt-woo-points-rewards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xt-woo-quick-view-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/xt-woo-quick-view-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..fad110de93 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xt-woo-quick-view-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: xt-woo-quick-view-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xt-woo-quick-view-lite/" + google-query: inurl:"/wp-content/plugins/xt-woo-quick-view-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xt-woo-quick-view-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xt-woo-quick-view-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xt-woo-quick-view-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xt-woo-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/xt-woo-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..c55c2d080a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xt-woo-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: xt-woo-variation-swatches-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xt-woo-variation-swatches/" + google-query: inurl:"/wp-content/plugins/xt-woo-variation-swatches/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xt-woo-variation-swatches,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xt-woo-variation-swatches/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xt-woo-variation-swatches" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/xtremelocator-2adf451d71caa92a7f7c155d4ef7aae4.yaml b/nuclei-templates/cve-less/plugins/xtremelocator-2adf451d71caa92a7f7c155d4ef7aae4.yaml new file mode 100644 index 0000000000..e48faf1828 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/xtremelocator-2adf451d71caa92a7f7c155d4ef7aae4.yaml @@ -0,0 +1,58 @@ +id: xtremelocator-2adf451d71caa92a7f7c155d4ef7aae4 + +info: + name: > + Xtreme Locator Dealer Locator Plugin <= 3.0.1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a09af8e-8da6-46e4-90e5-6ce1f8bfd36b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/xtremelocator/" + google-query: inurl:"/wp-content/plugins/xtremelocator/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,xtremelocator,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/xtremelocator/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xtremelocator" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yabp-474b68fd8dad59276b2b0abb985452ea.yaml b/nuclei-templates/cve-less/plugins/yabp-474b68fd8dad59276b2b0abb985452ea.yaml new file mode 100644 index 0000000000..037501ca53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yabp-474b68fd8dad59276b2b0abb985452ea.yaml @@ -0,0 +1,58 @@ +id: yabp-474b68fd8dad59276b2b0abb985452ea + +info: + name: > + Yet Another bol.com - <= 1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57d2ac19-812a-4a64-815b-bc3fffe8af26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yabp/" + google-query: inurl:"/wp-content/plugins/yabp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yabp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yabp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yabp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yada-wiki-57f13a889e0cffca9cc00946f63d375b.yaml b/nuclei-templates/cve-less/plugins/yada-wiki-57f13a889e0cffca9cc00946f63d375b.yaml new file mode 100644 index 0000000000..5e929cd2a8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yada-wiki-57f13a889e0cffca9cc00946f63d375b.yaml @@ -0,0 +1,58 @@ +id: yada-wiki-57f13a889e0cffca9cc00946f63d375b + +info: + name: > + Yada Wiki <= 3.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63b272f5-08d1-4c5b-a500-d919903793b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yada-wiki/" + google-query: inurl:"/wp-content/plugins/yada-wiki/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yada-wiki,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yada-wiki/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yada-wiki" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yahoo-updates-for-wordpress-489466a4c841b3b26e3fdf281284debf.yaml b/nuclei-templates/cve-less/plugins/yahoo-updates-for-wordpress-489466a4c841b3b26e3fdf281284debf.yaml new file mode 100644 index 0000000000..56e834d430 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yahoo-updates-for-wordpress-489466a4c841b3b26e3fdf281284debf.yaml @@ -0,0 +1,58 @@ +id: yahoo-updates-for-wordpress-489466a4c841b3b26e3fdf281284debf + +info: + name: > + Yahoo Updates For WordPress <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f5ff15d-2436-48d4-a31d-6bfd9704149f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yahoo-updates-for-wordpress/" + google-query: inurl:"/wp-content/plugins/yahoo-updates-for-wordpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yahoo-updates-for-wordpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yahoo-updates-for-wordpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yahoo-updates-for-wordpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yamaps-f801c1aeb4734b7133d474f559fadcb5.yaml b/nuclei-templates/cve-less/plugins/yamaps-f801c1aeb4734b7133d474f559fadcb5.yaml new file mode 100644 index 0000000000..2ce53fd06a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yamaps-f801c1aeb4734b7133d474f559fadcb5.yaml @@ -0,0 +1,58 @@ +id: yamaps-f801c1aeb4734b7133d474f559fadcb5 + +info: + name: > + YaMaps <= 0.6.25 - Authenticaterd (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1056804b-c317-4b9f-85ce-41b4ed0ac40a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yamaps/" + google-query: inurl:"/wp-content/plugins/yamaps/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yamaps,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yamaps/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yamaps" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yampi-checkout-d991553a68fa73bd081b1770dfe6f7af.yaml b/nuclei-templates/cve-less/plugins/yampi-checkout-d991553a68fa73bd081b1770dfe6f7af.yaml new file mode 100644 index 0000000000..6beb391992 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yampi-checkout-d991553a68fa73bd081b1770dfe6f7af.yaml @@ -0,0 +1,58 @@ +id: yampi-checkout-d991553a68fa73bd081b1770dfe6f7af + +info: + name: > + Yampi Checkout < = 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a93f6dce-56e0-4131-ba26-65a0c6b2e9c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yampi-checkout/" + google-query: inurl:"/wp-content/plugins/yampi-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yampi-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yampi-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yampi-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yandex-money-button-480067fff73f218a897f527d009097f5.yaml b/nuclei-templates/cve-less/plugins/yandex-money-button-480067fff73f218a897f527d009097f5.yaml new file mode 100644 index 0000000000..ba83f24118 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yandex-money-button-480067fff73f218a897f527d009097f5.yaml @@ -0,0 +1,58 @@ +id: yandex-money-button-480067fff73f218a897f527d009097f5 + +info: + name: > + Titan Framework <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fcae647f-7eed-4ecd-83b8-482b55b86ec9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yandex-money-button/" + google-query: inurl:"/wp-content/plugins/yandex-money-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yandex-money-button,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yandex-money-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yandex-money-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yandex-money-button-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/yandex-money-button-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..1a0e4c46c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yandex-money-button-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: yandex-money-button-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yandex-money-button/" + google-query: inurl:"/wp-content/plugins/yandex-money-button/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yandex-money-button,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yandex-money-button/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yandex-money-button" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yandexnews-feed-by-teplitsa-0cfa07456732530e831220894e1919de.yaml b/nuclei-templates/cve-less/plugins/yandexnews-feed-by-teplitsa-0cfa07456732530e831220894e1919de.yaml new file mode 100644 index 0000000000..365c290db6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yandexnews-feed-by-teplitsa-0cfa07456732530e831220894e1919de.yaml @@ -0,0 +1,58 @@ +id: yandexnews-feed-by-teplitsa-0cfa07456732530e831220894e1919de + +info: + name: > + Yandex.News Feed by Teplitsa <= 1.12.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/756810c0-d805-4391-a67b-19b40597d219?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yandexnews-feed-by-teplitsa/" + google-query: inurl:"/wp-content/plugins/yandexnews-feed-by-teplitsa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yandexnews-feed-by-teplitsa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yandexnews-feed-by-teplitsa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yandexnews-feed-by-teplitsa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.12.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yatra-3cae7fcdb0832a80c22b613ce2425d20.yaml b/nuclei-templates/cve-less/plugins/yatra-3cae7fcdb0832a80c22b613ce2425d20.yaml new file mode 100644 index 0000000000..7991a29c89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yatra-3cae7fcdb0832a80c22b613ce2425d20.yaml @@ -0,0 +1,58 @@ +id: yatra-3cae7fcdb0832a80c22b613ce2425d20 + +info: + name: > + Yatra <= 2.1.14 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07372843-f7d3-4ae4-96b4-ef3f475504ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yatra/" + google-query: inurl:"/wp-content/plugins/yatra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yatra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yatra/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yatra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yatri-tools-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/yatri-tools-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f57659c75e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yatri-tools-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: yatri-tools-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yatri-tools/" + google-query: inurl:"/wp-content/plugins/yatri-tools/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yatri-tools,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yatri-tools/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yatri-tools" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yawpp-6ef860020cf2393d29a3d4b7f6db6475.yaml b/nuclei-templates/cve-less/plugins/yawpp-6ef860020cf2393d29a3d4b7f6db6475.yaml new file mode 100644 index 0000000000..66603a5ef9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yawpp-6ef860020cf2393d29a3d4b7f6db6475.yaml @@ -0,0 +1,58 @@ +id: yawpp-6ef860020cf2393d29a3d4b7f6db6475 + +info: + name: > + YAWPP (Yet Another WordPress Petition Plugin) <= 1.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/53071503-0edd-458f-a24d-107d576695ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yawpp/" + google-query: inurl:"/wp-content/plugins/yawpp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yawpp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yawpp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yawpp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yawpp-a37629b8951d8dca9eaa0034808a75be.yaml b/nuclei-templates/cve-less/plugins/yawpp-a37629b8951d8dca9eaa0034808a75be.yaml new file mode 100644 index 0000000000..ec10650793 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yawpp-a37629b8951d8dca9eaa0034808a75be.yaml @@ -0,0 +1,58 @@ +id: yawpp-a37629b8951d8dca9eaa0034808a75be + +info: + name: > + YAWPP (Yet Another WordPress Petition Plugin) <= 1.2.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7eed1ae6-ee59-4616-9564-9aa5ec302ea9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yawpp/" + google-query: inurl:"/wp-content/plugins/yawpp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yawpp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yawpp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yawpp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yaysmtp-1880e59c92fe0e79ed53bd8a0e62de6d.yaml b/nuclei-templates/cve-less/plugins/yaysmtp-1880e59c92fe0e79ed53bd8a0e62de6d.yaml new file mode 100644 index 0000000000..82dfd8d72d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yaysmtp-1880e59c92fe0e79ed53bd8a0e62de6d.yaml @@ -0,0 +1,58 @@ +id: yaysmtp-1880e59c92fe0e79ed53bd8a0e62de6d + +info: + name: > + YaySMTP <= 2.4.5 - Unauthenticated Stored Cross-Site Scripting via Email + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68e6ec3a-c5fd-4f63-a9a0-2c9ddfb96e2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yaysmtp/" + google-query: inurl:"/wp-content/plugins/yaysmtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yaysmtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yaysmtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yaysmtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yaysmtp-3dde0f0622765c2ad7f47077755dade6.yaml b/nuclei-templates/cve-less/plugins/yaysmtp-3dde0f0622765c2ad7f47077755dade6.yaml new file mode 100644 index 0000000000..65889d4537 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yaysmtp-3dde0f0622765c2ad7f47077755dade6.yaml @@ -0,0 +1,58 @@ +id: yaysmtp-3dde0f0622765c2ad7f47077755dade6 + +info: + name: > + YaySMTP – Simple WP SMTP Mail <= 2.2 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5da24fa-fc7c-406b-896d-8cb8cc107cff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yaysmtp/" + google-query: inurl:"/wp-content/plugins/yaysmtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yaysmtp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yaysmtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yaysmtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yaysmtp-4d3dbfcfc5bd83e1f32cd6ab14a72545.yaml b/nuclei-templates/cve-less/plugins/yaysmtp-4d3dbfcfc5bd83e1f32cd6ab14a72545.yaml new file mode 100644 index 0000000000..908e4f515e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yaysmtp-4d3dbfcfc5bd83e1f32cd6ab14a72545.yaml @@ -0,0 +1,58 @@ +id: yaysmtp-4d3dbfcfc5bd83e1f32cd6ab14a72545 + +info: + name: > + YaySMTP – Simple WP SMTP Mail <= 2.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba551103-f373-40b0-831f-a1c59bb874ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yaysmtp/" + google-query: inurl:"/wp-content/plugins/yaysmtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yaysmtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yaysmtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yaysmtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yaysmtp-53237b2a666711b5ed5327cacfdd45f6.yaml b/nuclei-templates/cve-less/plugins/yaysmtp-53237b2a666711b5ed5327cacfdd45f6.yaml new file mode 100644 index 0000000000..61ddce923e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yaysmtp-53237b2a666711b5ed5327cacfdd45f6.yaml @@ -0,0 +1,58 @@ +id: yaysmtp-53237b2a666711b5ed5327cacfdd45f6 + +info: + name: > + YaySMTP – Simple WP SMTP Mail <= 2.2 - Missing Authorization to Sensitive Information Exposure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b68e8d4-58d4-4753-bda3-60c0d874f822?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yaysmtp/" + google-query: inurl:"/wp-content/plugins/yaysmtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yaysmtp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yaysmtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yaysmtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yaysmtp-c5709fba92c5e77b429d3d6d877dbdaa.yaml b/nuclei-templates/cve-less/plugins/yaysmtp-c5709fba92c5e77b429d3d6d877dbdaa.yaml new file mode 100644 index 0000000000..1f860b43a4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yaysmtp-c5709fba92c5e77b429d3d6d877dbdaa.yaml @@ -0,0 +1,58 @@ +id: yaysmtp-c5709fba92c5e77b429d3d6d877dbdaa + +info: + name: > + YaySMTP – Simple WP SMTP Mail <= 2.2.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2b1db53-227c-4887-b24d-37c0d2bedf69?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yaysmtp/" + google-query: inurl:"/wp-content/plugins/yaysmtp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yaysmtp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yaysmtp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yaysmtp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yds-support-ticket-system-099d72d33b89027185d04eec96bd1d04.yaml b/nuclei-templates/cve-less/plugins/yds-support-ticket-system-099d72d33b89027185d04eec96bd1d04.yaml new file mode 100644 index 0000000000..a8fd867a88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yds-support-ticket-system-099d72d33b89027185d04eec96bd1d04.yaml @@ -0,0 +1,58 @@ +id: yds-support-ticket-system-099d72d33b89027185d04eec96bd1d04 + +info: + name: > + YDS Support Ticket System <= 1.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8742e30-e49c-46c9-92d5-216d32d00d51?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yds-support-ticket-system/" + google-query: inurl:"/wp-content/plugins/yds-support-ticket-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yds-support-ticket-system,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yds-support-ticket-system/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yds-support-ticket-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-0a6ee246dd7e0fbebdf1fe319b82ca2c.yaml b/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-0a6ee246dd7e0fbebdf1fe319b82ca2c.yaml new file mode 100644 index 0000000000..1474e9e625 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-0a6ee246dd7e0fbebdf1fe319b82ca2c.yaml @@ -0,0 +1,58 @@ +id: yellow-pencil-visual-theme-customizer-0a6ee246dd7e0fbebdf1fe319b82ca2c + +info: + name: > + Visual CSS Style Editor <= 7.2.0 - Unauthenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4b3b4a4-9a56-49b8-b3d3-7e50954b4487?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yellow-pencil-visual-theme-customizer/" + google-query: inurl:"/wp-content/plugins/yellow-pencil-visual-theme-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yellow-pencil-visual-theme-customizer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yellow-pencil-visual-theme-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yellow-pencil-visual-theme-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-7a834f58a606cf067ebc7019fbcc29e8.yaml b/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-7a834f58a606cf067ebc7019fbcc29e8.yaml new file mode 100644 index 0000000000..97eedd6ec3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-7a834f58a606cf067ebc7019fbcc29e8.yaml @@ -0,0 +1,58 @@ +id: yellow-pencil-visual-theme-customizer-7a834f58a606cf067ebc7019fbcc29e8 + +info: + name: > + YellowPencil Visual CSS Style Editor <= 7.5.8 - Reflected Cross-Site Scripting liveLink + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/967ff273-33f3-4580-928a-7764583429aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yellow-pencil-visual-theme-customizer/" + google-query: inurl:"/wp-content/plugins/yellow-pencil-visual-theme-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yellow-pencil-visual-theme-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yellow-pencil-visual-theme-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yellow-pencil-visual-theme-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-bc75273fcc2a01b62e53de804d6a871c.yaml b/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-bc75273fcc2a01b62e53de804d6a871c.yaml new file mode 100644 index 0000000000..64584cb691 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yellow-pencil-visual-theme-customizer-bc75273fcc2a01b62e53de804d6a871c.yaml @@ -0,0 +1,58 @@ +id: yellow-pencil-visual-theme-customizer-bc75273fcc2a01b62e53de804d6a871c + +info: + name: > + Visual CSS Style Editor <= 7.5.3 - Reflected Cross-Site Scripting via wyp_page_type parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2608f894-88ed-4f34-a382-8eab7eaab2e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yellow-pencil-visual-theme-customizer/" + google-query: inurl:"/wp-content/plugins/yellow-pencil-visual-theme-customizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yellow-pencil-visual-theme-customizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yellow-pencil-visual-theme-customizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yellow-pencil-visual-theme-customizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yellow-yard-04f24d8a77ed9613e08490a191c4df98.yaml b/nuclei-templates/cve-less/plugins/yellow-yard-04f24d8a77ed9613e08490a191c4df98.yaml new file mode 100644 index 0000000000..80c0f85895 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yellow-yard-04f24d8a77ed9613e08490a191c4df98.yaml @@ -0,0 +1,58 @@ +id: yellow-yard-04f24d8a77ed9613e08490a191c4df98 + +info: + name: > + Yellow Yard Searchbar <= 2.7.27 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8472cdbe-89a8-49ac-ab7e-065ebf717692?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yellow-yard/" + google-query: inurl:"/wp-content/plugins/yellow-yard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yellow-yard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yellow-yard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yellow-yard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yellow-yard-c5527d6f57853cc49c907b306043f9d1.yaml b/nuclei-templates/cve-less/plugins/yellow-yard-c5527d6f57853cc49c907b306043f9d1.yaml new file mode 100644 index 0000000000..6c012cbd03 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yellow-yard-c5527d6f57853cc49c907b306043f9d1.yaml @@ -0,0 +1,58 @@ +id: yellow-yard-c5527d6f57853cc49c907b306043f9d1 + +info: + name: > + Yellow Yard Searchbar <= 2.7.27 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0c4ef62-1274-4cf3-88fc-ccabedbbe26c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yellow-yard/" + google-query: inurl:"/wp-content/plugins/yellow-yard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yellow-yard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yellow-yard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yellow-yard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yesno-d1fe830178bd836f853d2f1e8ea1327c.yaml b/nuclei-templates/cve-less/plugins/yesno-d1fe830178bd836f853d2f1e8ea1327c.yaml new file mode 100644 index 0000000000..146297af06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yesno-d1fe830178bd836f853d2f1e8ea1327c.yaml @@ -0,0 +1,58 @@ +id: yesno-d1fe830178bd836f853d2f1e8ea1327c + +info: + name: > + Yes/No Chart < 1.0.12 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcbc0ceb-7e23-4475-a138-25dc15ec17f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yesno/" + google-query: inurl:"/wp-content/plugins/yesno/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yesno,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yesno/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yesno" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-6fe67f9ebf1fd28c0850e6428387bc2e.yaml b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-6fe67f9ebf1fd28c0850e6428387bc2e.yaml new file mode 100644 index 0000000000..86a809fbd1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-6fe67f9ebf1fd28c0850e6428387bc2e.yaml @@ -0,0 +1,58 @@ +id: yet-another-related-posts-plugin-6fe67f9ebf1fd28c0850e6428387bc2e + +info: + name: > + YARPP – Yet Another Related Posts Plugin <= 5.30.3 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35bd7462-8dab-43b2-9941-fef6f826cfdc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-related-posts-plugin/" + google-query: inurl:"/wp-content/plugins/yet-another-related-posts-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-related-posts-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-related-posts-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-related-posts-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.30.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-9da0817673d4e46e6fd57b591efba31c.yaml b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-9da0817673d4e46e6fd57b591efba31c.yaml new file mode 100644 index 0000000000..386475546b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-9da0817673d4e46e6fd57b591efba31c.yaml @@ -0,0 +1,58 @@ +id: yet-another-related-posts-plugin-9da0817673d4e46e6fd57b591efba31c + +info: + name: > + YARPP – Yet Another Related Posts Plugin <= 5.30.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de8b14c0-00f8-4c4d-ae78-bc29a1e5007c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-related-posts-plugin/" + google-query: inurl:"/wp-content/plugins/yet-another-related-posts-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-related-posts-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-related-posts-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-related-posts-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.30.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-bff9375a673f8d2d232dddd7e1d5201a.yaml b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-bff9375a673f8d2d232dddd7e1d5201a.yaml new file mode 100644 index 0000000000..7eed6388bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-bff9375a673f8d2d232dddd7e1d5201a.yaml @@ -0,0 +1,58 @@ +id: yet-another-related-posts-plugin-bff9375a673f8d2d232dddd7e1d5201a + +info: + name: > + Yet Another Related Posts Plugin (YARPP) <= 5.30.9 - Authenticated(Administrator+) Stored Cross-Site Scripting via settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/10aa1dd7-f909-4ebe-b29b-2f2743b3e08a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-related-posts-plugin/" + google-query: inurl:"/wp-content/plugins/yet-another-related-posts-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-related-posts-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-related-posts-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-related-posts-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.30.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-c1c98038e2071b40fa92b1876951feb1.yaml b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-c1c98038e2071b40fa92b1876951feb1.yaml new file mode 100644 index 0000000000..64ca286a16 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-c1c98038e2071b40fa92b1876951feb1.yaml @@ -0,0 +1,58 @@ +id: yet-another-related-posts-plugin-c1c98038e2071b40fa92b1876951feb1 + +info: + name: > + YARPP <= 5.30.4 - Authenticated (Subscriber+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1091862b-784b-496f-a951-6784544cb51b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-related-posts-plugin/" + google-query: inurl:"/wp-content/plugins/yet-another-related-posts-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-related-posts-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-related-posts-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-related-posts-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.30.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-f004ce2a754ccfc5988e2e69aed45af9.yaml b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-f004ce2a754ccfc5988e2e69aed45af9.yaml new file mode 100644 index 0000000000..f6d2dd5dd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-f004ce2a754ccfc5988e2e69aed45af9.yaml @@ -0,0 +1,58 @@ +id: yet-another-related-posts-plugin-f004ce2a754ccfc5988e2e69aed45af9 + +info: + name: > + YARPP – Yet Another Related Posts Plugin < 4.2.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78759abf-4584-4beb-9ae7-39a5c3fe4b75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-related-posts-plugin/" + google-query: inurl:"/wp-content/plugins/yet-another-related-posts-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-related-posts-plugin,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-related-posts-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-related-posts-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-f373bbafc03e475d3ffabbbd84f90eda.yaml b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-f373bbafc03e475d3ffabbbd84f90eda.yaml new file mode 100644 index 0000000000..4da87f8653 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-related-posts-plugin-f373bbafc03e475d3ffabbbd84f90eda.yaml @@ -0,0 +1,58 @@ +id: yet-another-related-posts-plugin-f373bbafc03e475d3ffabbbd84f90eda + +info: + name: > + YARPP - Yet Another Related Posts Plugin <= 5.30.2 - Authenticated (Subscriber+) SQL Injection via Shortcode + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bda2f3f6-b036-4feb-bb38-1d4eaf965c24?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-related-posts-plugin/" + google-query: inurl:"/wp-content/plugins/yet-another-related-posts-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-related-posts-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-related-posts-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-related-posts-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.30.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-stars-rating-146da8f6895b52d2f71daced48bc4bb3.yaml b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-146da8f6895b52d2f71daced48bc4bb3.yaml new file mode 100644 index 0000000000..3fdcec0a98 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-146da8f6895b52d2f71daced48bc4bb3.yaml @@ -0,0 +1,58 @@ +id: yet-another-stars-rating-146da8f6895b52d2f71daced48bc4bb3 + +info: + name: > + Yet Another Stars Rating <= 3.1.2 - Authenticated (Subscriber+) Cross-Site Scripting via Shortcodes + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b0781264-ed26-4e4b-a7ab-40e65bc71571?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-stars-rating/" + google-query: inurl:"/wp-content/plugins/yet-another-stars-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-stars-rating,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-stars-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-stars-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-stars-rating-2f087270cc2f0766f3522e85859f5682.yaml b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-2f087270cc2f0766f3522e85859f5682.yaml new file mode 100644 index 0000000000..5e69e66ad8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-2f087270cc2f0766f3522e85859f5682.yaml @@ -0,0 +1,58 @@ +id: yet-another-stars-rating-2f087270cc2f0766f3522e85859f5682 + +info: + name: > + Yasr – Yet Another Stars Rating <= 2.9.9 - Cross-Site Scripting via source + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cabe5d20-710c-47d7-a5a3-562287ab5706?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-stars-rating/" + google-query: inurl:"/wp-content/plugins/yet-another-stars-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-stars-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-stars-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-stars-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-stars-rating-61995cd0cadb8b6360d652af233c94df.yaml b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-61995cd0cadb8b6360d652af233c94df.yaml new file mode 100644 index 0000000000..4fffc70294 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-61995cd0cadb8b6360d652af233c94df.yaml @@ -0,0 +1,58 @@ +id: yet-another-stars-rating-61995cd0cadb8b6360d652af233c94df + +info: + name: > + Yasr – Yet Another Stars Rating < 0.9.1 - Authenticated SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25a25dae-578b-40d6-95c3-8428ca545ac3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-stars-rating/" + google-query: inurl:"/wp-content/plugins/yet-another-stars-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-stars-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-stars-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-stars-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-stars-rating-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..11476a6cec --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: yet-another-stars-rating-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-stars-rating/" + google-query: inurl:"/wp-content/plugins/yet-another-stars-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-stars-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-stars-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-stars-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-stars-rating-c1cf31deca47ab06031c32c6f87e918a.yaml b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-c1cf31deca47ab06031c32c6f87e918a.yaml new file mode 100644 index 0000000000..5f464249f9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-c1cf31deca47ab06031c32c6f87e918a.yaml @@ -0,0 +1,58 @@ +id: yet-another-stars-rating-c1cf31deca47ab06031c32c6f87e918a + +info: + name: > + Yet Another Stars Rating <= 3.4.3 - Missing Authorization via init + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/395b016f-018c-458d-a585-34f3de3eae5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-stars-rating/" + google-query: inurl:"/wp-content/plugins/yet-another-stars-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-stars-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-stars-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-stars-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-stars-rating-efe780e12c2c72ceb89cb957cd97aaac.yaml b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-efe780e12c2c72ceb89cb957cd97aaac.yaml new file mode 100644 index 0000000000..9cf9129d85 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-efe780e12c2c72ceb89cb957cd97aaac.yaml @@ -0,0 +1,58 @@ +id: yet-another-stars-rating-efe780e12c2c72ceb89cb957cd97aaac + +info: + name: > + Yet Another Stars Rating <= 3.3.8 - Missing Authorization to Vote Tampering + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2294251f-ef51-4ef7-ad7a-905cc2bc00b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-stars-rating/" + google-query: inurl:"/wp-content/plugins/yet-another-stars-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-stars-rating,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-stars-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-stars-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yet-another-stars-rating-ffed5a07256deebff2bbee11af3700d2.yaml b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-ffed5a07256deebff2bbee11af3700d2.yaml new file mode 100644 index 0000000000..f89d7a7387 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yet-another-stars-rating-ffed5a07256deebff2bbee11af3700d2.yaml @@ -0,0 +1,58 @@ +id: yet-another-stars-rating-ffed5a07256deebff2bbee11af3700d2 + +info: + name: > + Yet Another Stars Rating <= 1.8.6 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbd1e68f-1f84-40d6-9ecd-34280c3c5099?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yet-another-stars-rating/" + google-query: inurl:"/wp-content/plugins/yet-another-stars-rating/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yet-another-stars-rating,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yet-another-stars-rating/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yet-another-stars-rating" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-custom-woocommerce-product-tabs-6208ba5c5d5d6da9586016ed5d7a8c01.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-custom-woocommerce-product-tabs-6208ba5c5d5d6da9586016ed5d7a8c01.yaml new file mode 100644 index 0000000000..f6c6d4c96f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-custom-woocommerce-product-tabs-6208ba5c5d5d6da9586016ed5d7a8c01.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-custom-woocommerce-product-tabs-6208ba5c5d5d6da9586016ed5d7a8c01 + +info: + name: > + Custom Product Tabs for WooCommerce <= 1.7.7 - Subscriber+ Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e093a923-4b9b-4def-a81b-78584aead5c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-custom-woocommerce-product-tabs/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-custom-woocommerce-product-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-custom-woocommerce-product-tabs,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-custom-woocommerce-product-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-custom-woocommerce-product-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-custom-woocommerce-product-tabs-8d1ec64befa71150df8d15ca9a46e658.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-custom-woocommerce-product-tabs-8d1ec64befa71150df8d15ca9a46e658.yaml new file mode 100644 index 0000000000..74f793da78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-custom-woocommerce-product-tabs-8d1ec64befa71150df8d15ca9a46e658.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-custom-woocommerce-product-tabs-8d1ec64befa71150df8d15ca9a46e658 + +info: + name: > + Custom Product Tabs for WooCommerce <= 1.7.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03cd1f6e-2400-44e7-b2b0-32c9890e1c1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-custom-woocommerce-product-tabs/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-custom-woocommerce-product-tabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-custom-woocommerce-product-tabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-custom-woocommerce-product-tabs/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-custom-woocommerce-product-tabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-03e1e5461591c1057ed60beb9b3bae79.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-03e1e5461591c1057ed60beb9b3bae79.yaml new file mode 100644 index 0000000000..3e216460c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-03e1e5461591c1057ed60beb9b3bae79.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-03e1e5461591c1057ed60beb9b3bae79 + +info: + name: > + Easy Forms for Mailchimp <= 6.8.10 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0926bcf2-9cce-420d-a02f-52675224a71b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-177659464b8d85544069425197c4369a.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-177659464b8d85544069425197c4369a.yaml new file mode 100644 index 0000000000..bf3e04b9c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-177659464b8d85544069425197c4369a.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-177659464b8d85544069425197c4369a + +info: + name: > + Easy Forms for MailChimp <= 6.8.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c30d517b-e051-408c-a022-4399c3d62390?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-1d49f8f287f32ef24b0d6d09efbb3a99.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-1d49f8f287f32ef24b0d6d09efbb3a99.yaml new file mode 100644 index 0000000000..87de2fb44c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-1d49f8f287f32ef24b0d6d09efbb3a99.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-1d49f8f287f32ef24b0d6d09efbb3a99 + +info: + name: > + Easy Forms for Mailchimp < 6.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4bbb00b-4baf-4dc1-85ab-3ca3d59eaf33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-23c724086aac6deded1ebc7c3f6322cf.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-23c724086aac6deded1ebc7c3f6322cf.yaml new file mode 100644 index 0000000000..81f3bc9ab8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-23c724086aac6deded1ebc7c3f6322cf.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-23c724086aac6deded1ebc7c3f6322cf + +info: + name: > + Easy Forms for Mailchimp 3.0 - 5.0.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8877261-c60c-4433-9a4d-f1a99cac66c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.0', '<= 5.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-386a0afabc9239508b641e7c3c487c92.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-386a0afabc9239508b641e7c3c487c92.yaml new file mode 100644 index 0000000000..60d87bc291 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-386a0afabc9239508b641e7c3c487c92.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-386a0afabc9239508b641e7c3c487c92 + +info: + name: > + Easy Forms for Mailchimp <= 6.8.8 - Reflected Cross-Site Scripting via 'sql_error' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4afb25d5-dce1-4a7a-8afe-0fc2a384b945?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-53951cc6c6fc3a1b6dbee499dbf71331.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-53951cc6c6fc3a1b6dbee499dbf71331.yaml new file mode 100644 index 0000000000..d6c52b48bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-53951cc6c6fc3a1b6dbee499dbf71331.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-53951cc6c6fc3a1b6dbee499dbf71331 + +info: + name: > + Easy Forms for Mailchimp <= 6.8.8 - Authenticated (Administrator+) Cross-Site Scripting via Form Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4953e1b6-6ad1-41f5-b50b-43de078008ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-548ea404dc918edae3aacbe70f4f2745.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-548ea404dc918edae3aacbe70f4f2745.yaml new file mode 100644 index 0000000000..ec4251afae --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-548ea404dc918edae3aacbe70f4f2745.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-548ea404dc918edae3aacbe70f4f2745 + +info: + name: > + Easy Forms for Mailchimp <= 6.8.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5f07017-e2b6-4051-8df8-3d0cfa59c7d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-85182e02e56cd4169277eefa805fcb8b.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-85182e02e56cd4169277eefa805fcb8b.yaml new file mode 100644 index 0000000000..9eb568922e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-85182e02e56cd4169277eefa805fcb8b.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-85182e02e56cd4169277eefa805fcb8b + +info: + name: > + Easy Forms for Mailchimp <= 6.5.2 - Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7f1a0d90-2574-4d48-b673-f47c8bc65d21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-92e334f7eff847d619a107f5b6ee2b7d.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-92e334f7eff847d619a107f5b6ee2b7d.yaml new file mode 100644 index 0000000000..67991cfb52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-92e334f7eff847d619a107f5b6ee2b7d.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-92e334f7eff847d619a107f5b6ee2b7d + +info: + name: > + Easy Forms for Mailchimp <= 6.6.2 - Authenticated Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7d0deb3-3d04-4f85-b769-0894d7c6ee7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-b2623a7e77be214a3a6362bd14987ece.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-b2623a7e77be214a3a6362bd14987ece.yaml new file mode 100644 index 0000000000..2048cb34a0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-b2623a7e77be214a3a6362bd14987ece.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-b2623a7e77be214a3a6362bd14987ece + +info: + name: > + Easy Forms for Mailchimp <= 6.8.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/873b6ace-0377-42d8-a6c5-3fe0226cebc5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-cce904a4a7f2d422f5ff2c8c1b3c77b4.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-cce904a4a7f2d422f5ff2c8c1b3c77b4.yaml new file mode 100644 index 0000000000..e1119e21bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-cce904a4a7f2d422f5ff2c8c1b3c77b4.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-cce904a4a7f2d422f5ff2c8c1b3c77b4 + +info: + name: > + Easy Forms for Mailchimp <= 6.8.10 - Sensitive Information Exposure via logfile + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dc07bcec-f822-492a-b73d-79e791907dd1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-fe922fd0e38d640f64cea8429582a5c0.yaml b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-fe922fd0e38d640f64cea8429582a5c0.yaml new file mode 100644 index 0000000000..b8103c3e70 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yikes-inc-easy-mailchimp-extender-fe922fd0e38d640f64cea8429582a5c0.yaml @@ -0,0 +1,58 @@ +id: yikes-inc-easy-mailchimp-extender-fe922fd0e38d640f64cea8429582a5c0 + +info: + name: > + Easy Forms for MailChimp <= 6.8.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1be5da88-723a-4386-a73e-3fe90eefb6ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + google-query: inurl:"/wp-content/plugins/yikes-inc-easy-mailchimp-extender/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yikes-inc-easy-mailchimp-extender,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yikes-inc-easy-mailchimp-extender/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yikes-inc-easy-mailchimp-extender" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-advanced-refund-system-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-advanced-refund-system-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..5e7308bcf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-advanced-refund-system-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-advanced-refund-system-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-advanced-refund-system-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-advanced-refund-system-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-advanced-refund-system-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-advanced-refund-system-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-advanced-refund-system-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..3f692d43c5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-color-and-label-variations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-color-and-label-variations-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-color-and-label-variations-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-color-and-label-variations-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-color-and-label-variations-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-color-and-label-variations-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..ecbd3f1d20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-color-and-label-variations-for-woocommerce-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-color-and-label-variations-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-color-and-label-variations-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-color-and-label-variations-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-color-and-label-variations-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-color-and-label-variations-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..941b3c0c0c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-color-and-label-variations-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-color-and-label-variations-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-color-and-label-variations-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-color-and-label-variations-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-color-and-label-variations-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-color-and-label-variations-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-color-and-label-variations-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..81a3313ab6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-custom-thank-you-page-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-custom-thank-you-page-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-custom-thank-you-page-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..c747f874ad --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-custom-thank-you-page-for-woocommerce-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-custom-thank-you-page-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-custom-thank-you-page-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..1a8d38e038 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-custom-thank-you-page-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-custom-thank-you-page-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-custom-thank-you-page-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-custom-thank-you-page-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-custom-thank-you-page-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-desktop-notifications-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-desktop-notifications-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..f61296fca5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-desktop-notifications-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-desktop-notifications-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-desktop-notifications-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-desktop-notifications-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-desktop-notifications-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-desktop-notifications-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-desktop-notifications-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-donations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-donations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..a434d063fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-donations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-donations-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-donations-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-donations-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-donations-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-donations-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-donations-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-donations-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-donations-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..678b88a21c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-donations-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-donations-for-woocommerce-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-donations-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-donations-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-donations-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-donations-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-donations-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-easy-login-register-popup-for-woocommerce-77b9a05dcc6a23ba6229304e9509d659.yaml b/nuclei-templates/cve-less/plugins/yith-easy-login-register-popup-for-woocommerce-77b9a05dcc6a23ba6229304e9509d659.yaml new file mode 100644 index 0000000000..105192c25f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-easy-login-register-popup-for-woocommerce-77b9a05dcc6a23ba6229304e9509d659.yaml @@ -0,0 +1,58 @@ +id: yith-easy-login-register-popup-for-woocommerce-77b9a05dcc6a23ba6229304e9509d659 + +info: + name: > + YITH Easy Login & Register Popup for WooCommerce <= 1.8.0 - Authentication Bypass via Password Reset + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e186123e-313f-4b0e-9579-135cfdfa4bc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-easy-login-register-popup-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-easy-login-register-popup-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-easy-login-register-popup-for-woocommerce,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-easy-login-register-popup-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-easy-login-register-popup-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-essential-kit-for-woocommerce-1-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-essential-kit-for-woocommerce-1-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..4d4c24d911 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-essential-kit-for-woocommerce-1-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-essential-kit-for-woocommerce-1-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-essential-kit-for-woocommerce-1/" + google-query: inurl:"/wp-content/plugins/yith-essential-kit-for-woocommerce-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-essential-kit-for-woocommerce-1,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-essential-kit-for-woocommerce-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-essential-kit-for-woocommerce-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-essential-kit-for-woocommerce-1-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-essential-kit-for-woocommerce-1-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..47f4462911 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-essential-kit-for-woocommerce-1-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-essential-kit-for-woocommerce-1-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-essential-kit-for-woocommerce-1/" + google-query: inurl:"/wp-content/plugins/yith-essential-kit-for-woocommerce-1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-essential-kit-for-woocommerce-1,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-essential-kit-for-woocommerce-1/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-essential-kit-for-woocommerce-1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.13.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-infinite-scrolling-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-infinite-scrolling-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..9a55d40cf6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-infinite-scrolling-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-infinite-scrolling-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-infinite-scrolling/" + google-query: inurl:"/wp-content/plugins/yith-infinite-scrolling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-infinite-scrolling,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-infinite-scrolling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-infinite-scrolling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-infinite-scrolling-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-infinite-scrolling-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..fa8a6b43cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-infinite-scrolling-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-infinite-scrolling-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-infinite-scrolling/" + google-query: inurl:"/wp-content/plugins/yith-infinite-scrolling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-infinite-scrolling,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-infinite-scrolling/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-infinite-scrolling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-maintenance-mode-47f2a0e84b3d74553b2adb604a344eb0.yaml b/nuclei-templates/cve-less/plugins/yith-maintenance-mode-47f2a0e84b3d74553b2adb604a344eb0.yaml new file mode 100644 index 0000000000..6f16fa69b3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-maintenance-mode-47f2a0e84b3d74553b2adb604a344eb0.yaml @@ -0,0 +1,58 @@ +id: yith-maintenance-mode-47f2a0e84b3d74553b2adb604a344eb0 + +info: + name: > + YITH Maintenance Mode <= 1.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf00d5a9-bf7f-404c-b91f-1d7cf14d883b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/yith-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-maintenance-mode-9e36292a7ac47d63600972695d9e0b66.yaml b/nuclei-templates/cve-less/plugins/yith-maintenance-mode-9e36292a7ac47d63600972695d9e0b66.yaml new file mode 100644 index 0000000000..2d12f21866 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-maintenance-mode-9e36292a7ac47d63600972695d9e0b66.yaml @@ -0,0 +1,58 @@ +id: yith-maintenance-mode-9e36292a7ac47d63600972695d9e0b66 + +info: + name: > + YITH Maintenance Mode <= 1.3.7 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f617090-f2cf-4ac4-8d09-c1d5c21e120d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/yith-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-maintenance-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-maintenance-mode-c63c09dfe0443988600f74c6f35feaf4.yaml b/nuclei-templates/cve-less/plugins/yith-maintenance-mode-c63c09dfe0443988600f74c6f35feaf4.yaml new file mode 100644 index 0000000000..3ab5c2735e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-maintenance-mode-c63c09dfe0443988600f74c6f35feaf4.yaml @@ -0,0 +1,58 @@ +id: yith-maintenance-mode-c63c09dfe0443988600f74c6f35feaf4 + +info: + name: > + YITH Maintenance Mode <= 1.3.8 - Multiple Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3589fd35-df91-48fb-b3be-4954f1e05656?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-maintenance-mode/" + google-query: inurl:"/wp-content/plugins/yith-maintenance-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-maintenance-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-maintenance-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-maintenance-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..402b4fb02a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-paypal-express-checkout-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-paypal-express-checkout-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-paypal-express-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..8e6773c08d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-paypal-express-checkout-for-woocommerce-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-paypal-express-checkout-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-paypal-express-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.20.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..9597142383 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-paypal-express-checkout-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-paypal-express-checkout-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-paypal-express-checkout-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-paypal-express-checkout-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-paypal-express-checkout-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-paypal-payments-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-paypal-payments-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..e7e89a1439 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-paypal-payments-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-paypal-payments-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-paypal-payments-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-paypal-payments-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-paypal-payments-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-paypal-payments-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-paypal-payments-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-paypal-payments-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-paypal-payments-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..5f120b98f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-paypal-payments-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-paypal-payments-for-woocommerce-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-paypal-payments-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-paypal-payments-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-paypal-payments-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-paypal-payments-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-paypal-payments-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..533297d8d2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-pre-order-for-woocommerce-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-pre-order-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-pre-order-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-pre-order-for-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-pre-order-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-pre-order-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..0d8914656d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-pre-order-for-woocommerce-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-pre-order-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-pre-order-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-pre-order-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-pre-order-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-pre-order-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..c70f8fd936 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-pre-order-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-pre-order-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-pre-order-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-pre-order-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-pre-order-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-pre-order-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-pre-order-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-product-size-charts-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-product-size-charts-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..55a2c96c06 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-product-size-charts-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-product-size-charts-for-woocommerce-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-product-size-charts-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yith-product-size-charts-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-product-size-charts-for-woocommerce,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-product-size-charts-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-product-size-charts-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-account-funds-premium-982ffbf6beec794e0b1ae79fe9b1aaa9.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-account-funds-premium-982ffbf6beec794e0b1ae79fe9b1aaa9.yaml new file mode 100644 index 0000000000..55c0d94d21 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-account-funds-premium-982ffbf6beec794e0b1ae79fe9b1aaa9.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-account-funds-premium-982ffbf6beec794e0b1ae79fe9b1aaa9 + +info: + name: > + YITH WooCommerce Account Funds Premium <= 1.33.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bbd0fb22-a39c-43f5-a93c-976b7e49967b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-account-funds-premium/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-account-funds-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-account-funds-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-account-funds-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-account-funds-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.33.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..28741a792b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-added-to-cart-popup-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-added-to-cart-popup/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-added-to-cart-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-added-to-cart-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-added-to-cart-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-added-to-cart-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..14703261da --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-added-to-cart-popup-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-added-to-cart-popup/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-added-to-cart-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-added-to-cart-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-added-to-cart-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-added-to-cart-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..a17c9db6be --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-added-to-cart-popup-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-added-to-cart-popup-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-added-to-cart-popup/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-added-to-cart-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-added-to-cart-popup,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-added-to-cart-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-added-to-cart-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..afb3e22d89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-advanced-reviews-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-advanced-reviews/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-advanced-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-advanced-reviews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-advanced-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-advanced-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..89e57db995 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-advanced-reviews-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-advanced-reviews/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-advanced-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-advanced-reviews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-advanced-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-advanced-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..082a00bd75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-advanced-reviews-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-advanced-reviews-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-advanced-reviews/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-advanced-reviews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-advanced-reviews,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-advanced-reviews/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-advanced-reviews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..abee671bfd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-affiliates-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-affiliates/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-affiliates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-affiliates,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-affiliates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-affiliates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..17c7c8a083 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-affiliates-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-affiliates/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-affiliates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-affiliates,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-affiliates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-affiliates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..dde101f3c3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-affiliates-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-affiliates-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-affiliates/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-affiliates/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-affiliates,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-affiliates/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-affiliates" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..8d590e8a20 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-ajax-navigation-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-ajax-navigation/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-ajax-navigation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-ajax-navigation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-ajax-navigation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-ajax-navigation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..9bdad887cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-ajax-navigation-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-ajax-navigation/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-ajax-navigation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-ajax-navigation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-ajax-navigation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-ajax-navigation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-8e47416ac2dba104b5166ffbff80d7af.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-8e47416ac2dba104b5166ffbff80d7af.yaml new file mode 100644 index 0000000000..0474e34111 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-navigation-8e47416ac2dba104b5166ffbff80d7af.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-ajax-navigation-8e47416ac2dba104b5166ffbff80d7af + +info: + name: > + YITH WooCommerce Ajax Product Filter <= 3.11.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d16f7c33-0e60-43bb-b200-883cced640f3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-ajax-navigation/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-ajax-navigation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-ajax-navigation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-ajax-navigation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-ajax-navigation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..1c5c2a070d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-ajax-search-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-ajax-search/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-ajax-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-ajax-search,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-ajax-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-ajax-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..d218909dd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-ajax-search-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-ajax-search/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-ajax-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-ajax-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-ajax-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-ajax-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.25.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..da24dbf32c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-ajax-search-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-ajax-search-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-ajax-search/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-ajax-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-ajax-search,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-ajax-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-ajax-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..bea71bffd4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-authorizenet-payment-gateway-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-authorizenet-payment-gateway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-authorizenet-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..f3000fd1ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-authorizenet-payment-gateway-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-authorizenet-payment-gateway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-authorizenet-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..67dcef9604 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-authorizenet-payment-gateway-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-authorizenet-payment-gateway-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-authorizenet-payment-gateway,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-authorizenet-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-authorizenet-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..46051473ff --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-badges-management-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-badges-management/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-badges-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-badges-management,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-badges-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-badges-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..6ffa43bcbb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-badges-management-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-badges-management/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-badges-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-badges-management,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-badges-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-badges-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.10.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..d9dd4562f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-badges-management-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-badges-management-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-badges-management/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-badges-management/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-badges-management,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-badges-management/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-badges-management" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-best-sellers-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-best-sellers-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..c730397482 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-best-sellers-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-best-sellers-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-best-sellers/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-best-sellers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-best-sellers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-best-sellers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-best-sellers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..f3bd490d4a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-brands-add-on-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-brands-add-on/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-brands-add-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-brands-add-on,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-brands-add-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-brands-add-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..80c64e531e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-brands-add-on-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-brands-add-on/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-brands-add-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-brands-add-on,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-brands-add-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-brands-add-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..f97e7d0704 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-brands-add-on-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-brands-add-on-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-brands-add-on/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-brands-add-on/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-brands-add-on,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-brands-add-on/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-brands-add-on" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..63c59b3d05 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-bulk-product-editing-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-bulk-product-editing/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-bulk-product-editing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-bulk-product-editing,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-bulk-product-editing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-bulk-product-editing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..026f9e9e4d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-bulk-product-editing-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-bulk-product-editing/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-bulk-product-editing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-bulk-product-editing,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-bulk-product-editing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-bulk-product-editing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..37541da232 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-bulk-product-editing-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-bulk-product-editing-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-bulk-product-editing/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-bulk-product-editing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-bulk-product-editing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-bulk-product-editing/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-bulk-product-editing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..7336193354 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-cart-messages-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-cart-messages/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-cart-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-cart-messages,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-cart-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-cart-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..c74879e773 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-cart-messages-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-cart-messages/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-cart-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-cart-messages,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-cart-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-cart-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..2422d1cd2b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-cart-messages-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-cart-messages-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-cart-messages/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-cart-messages/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-cart-messages,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-cart-messages/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-cart-messages" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-catalog-mode-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-catalog-mode-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..75e81c1ec2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-catalog-mode-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-catalog-mode-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-catalog-mode/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-catalog-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-catalog-mode,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-catalog-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-catalog-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-catalog-mode-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-catalog-mode-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..f6ce1d1d54 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-catalog-mode-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-catalog-mode-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-catalog-mode/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-catalog-mode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-catalog-mode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-catalog-mode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-catalog-mode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-category-accordion-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-category-accordion-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..0c61890f89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-category-accordion-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-category-accordion-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-category-accordion/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-category-accordion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-category-accordion,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-category-accordion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-category-accordion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-category-accordion-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-category-accordion-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..0332ba3046 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-category-accordion-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-category-accordion-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-category-accordion/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-category-accordion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-category-accordion,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-category-accordion/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-category-accordion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..f7f6bb870f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-compare-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-compare/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-compare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-compare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-compare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-compare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-282e251eab336c690b3101edf7ffeddc.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-282e251eab336c690b3101edf7ffeddc.yaml new file mode 100644 index 0000000000..4620870be1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-282e251eab336c690b3101edf7ffeddc.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-compare-282e251eab336c690b3101edf7ffeddc + +info: + name: > + YITH WooCommerce Compare <= 2.37.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f822d5b9-46fb-4910-8d92-8c73e01d7e50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-compare/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-compare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-compare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-compare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-compare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.37.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..8a962ba445 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-compare-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-compare/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-compare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-compare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-compare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-compare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.20.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..899ea51054 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-compare-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-compare/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-compare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-compare,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-compare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-compare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-e5eb957a437ccd71daf2e9f56a4559b2.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-e5eb957a437ccd71daf2e9f56a4559b2.yaml new file mode 100644 index 0000000000..d4c731fb68 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-compare-e5eb957a437ccd71daf2e9f56a4559b2.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-compare-e5eb957a437ccd71daf2e9f56a4559b2 + +info: + name: > + YITH WooCommerce Compare <= 2.0.9 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe02377a-8d09-4d86-a049-3002516cf933?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-compare/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-compare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-compare,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-compare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-compare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-featured-video-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-featured-video-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..94f815111e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-featured-video-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-featured-video-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-featured-video/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-featured-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-featured-video,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-featured-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-featured-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-featured-video-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-featured-video-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..430a869fd9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-featured-video-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-featured-video-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-featured-video/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-featured-video/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-featured-video,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-featured-video/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-featured-video" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..98f3d49b90 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-frequently-bought-together-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-frequently-bought-together/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-frequently-bought-together/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-frequently-bought-together,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-frequently-bought-together/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-frequently-bought-together" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..76253ee350 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-frequently-bought-together-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-frequently-bought-together/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-frequently-bought-together/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-frequently-bought-together,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-frequently-bought-together/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-frequently-bought-together" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.18.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..9942d33036 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-frequently-bought-together-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-frequently-bought-together-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-frequently-bought-together/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-frequently-bought-together/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-frequently-bought-together,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-frequently-bought-together/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-frequently-bought-together" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..4919c01bab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-gift-cards-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-gift-cards/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-gift-cards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-gift-cards,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-gift-cards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-gift-cards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..e9d6b6b28f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-gift-cards-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-gift-cards/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-gift-cards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-gift-cards,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-gift-cards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-gift-cards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..9131c9efa7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-gift-cards-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-gift-cards/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-gift-cards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-gift-cards,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-gift-cards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-gift-cards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-41e80875772903dab5f7014a7dce0bda.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-41e80875772903dab5f7014a7dce0bda.yaml new file mode 100644 index 0000000000..f790c0d5cb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-41e80875772903dab5f7014a7dce0bda.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-gift-cards-premium-41e80875772903dab5f7014a7dce0bda + +info: + name: > + YITH WooCommerce Gift Cards Premium <= 3.3.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b6489f8-061d-4fbd-81f2-9f508dd0e7f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-gift-cards-premium/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-gift-cards-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-gift-cards-premium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-gift-cards-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-gift-cards-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-4a463e7ba518b96c1fea8ec0461b05e3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-4a463e7ba518b96c1fea8ec0461b05e3.yaml new file mode 100644 index 0000000000..c4ae44e285 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-4a463e7ba518b96c1fea8ec0461b05e3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-gift-cards-premium-4a463e7ba518b96c1fea8ec0461b05e3 + +info: + name: > + YITH WooCommerce Gift Cards Premium <= 3.23.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e77760b-4e61-462c-9245-0e40f161d565?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-gift-cards-premium/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-gift-cards-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-gift-cards-premium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-gift-cards-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-gift-cards-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.23.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-83ba46f68dcdc63735fee9175b72793e.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-83ba46f68dcdc63735fee9175b72793e.yaml new file mode 100644 index 0000000000..25b5c370b1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-gift-cards-premium-83ba46f68dcdc63735fee9175b72793e.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-gift-cards-premium-83ba46f68dcdc63735fee9175b72793e + +info: + name: > + Yith WooCommerce Gift Cards Premium <= 3.19.0 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd4f7b73-947b-4962-9880-5f279580f43c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-gift-cards-premium/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-gift-cards-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-gift-cards-premium,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-gift-cards-premium/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-gift-cards-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.19.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..4d916399b7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-mailchimp-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-mailchimp/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-mailchimp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-mailchimp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-mailchimp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-mailchimp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..f78d7e7ad0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-mailchimp-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-mailchimp/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-mailchimp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-mailchimp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-mailchimp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-mailchimp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..05f3dd586b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-mailchimp-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-mailchimp-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-mailchimp/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-mailchimp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-mailchimp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-mailchimp/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-mailchimp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..26212aa19f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-multi-step-checkout-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-multi-step-checkout/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-multi-step-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-multi-step-checkout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-multi-step-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-multi-step-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..715514b407 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-multi-step-checkout-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-multi-step-checkout/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-multi-step-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-multi-step-checkout,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-multi-step-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-multi-step-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..be4ea144ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-multi-step-checkout-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-multi-step-checkout-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-multi-step-checkout/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-multi-step-checkout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-multi-step-checkout,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-multi-step-checkout/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-multi-step-checkout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-name-your-price-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-name-your-price-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..a7108a5c13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-name-your-price-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-name-your-price-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-name-your-price/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-name-your-price/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-name-your-price,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-name-your-price/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-name-your-price" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-name-your-price-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-name-your-price-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..de1be71740 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-name-your-price-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-name-your-price-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-name-your-price/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-name-your-price/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-name-your-price,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-name-your-price/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-name-your-price" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..6e2722b170 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-order-tracking-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-order-tracking/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-order-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-order-tracking,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-order-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-order-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..87ff2cb1a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-order-tracking-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-order-tracking/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-order-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-order-tracking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-order-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-order-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..80a977bbaf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-order-tracking-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-order-tracking-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-order-tracking/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-order-tracking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-order-tracking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-order-tracking/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-order-tracking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..762b41e1fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-pdf-invoice-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-pdf-invoice/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-pdf-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-pdf-invoice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-pdf-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-pdf-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..f65616048b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-pdf-invoice-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-pdf-invoice/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-pdf-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-pdf-invoice,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-pdf-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-pdf-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..aa0ccf6c3f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-pdf-invoice-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-pdf-invoice-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-pdf-invoice/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-pdf-invoice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-pdf-invoice,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-pdf-invoice/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-pdf-invoice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..2af074df3d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-points-and-rewards-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-points-and-rewards/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-points-and-rewards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-points-and-rewards,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-points-and-rewards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-points-and-rewards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..05a0d91a49 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-points-and-rewards-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-points-and-rewards/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-points-and-rewards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-points-and-rewards,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-points-and-rewards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-points-and-rewards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..c4988a5b5a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-points-and-rewards-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-points-and-rewards-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-points-and-rewards/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-points-and-rewards/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-points-and-rewards,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-points-and-rewards/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-points-and-rewards" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-popup-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-popup-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..d05aa940f0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-popup-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-popup-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-popup/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-popup,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-popup-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-popup-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..d54d166883 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-popup-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-popup-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-popup/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-popup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-popup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-popup/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-popup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-255ea4aa4e6fb6ceab7bcf43313eab50.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-255ea4aa4e6fb6ceab7bcf43313eab50.yaml new file mode 100644 index 0000000000..3a94111f75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-255ea4aa4e6fb6ceab7bcf43313eab50.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-add-ons-255ea4aa4e6fb6ceab7bcf43313eab50 + +info: + name: > + YITH WooCommerce Product Add-Ons <= 4.2.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e95773c-b968-47b3-8ae7-9a8d3389666c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-add-ons/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-add-ons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..c6da59b120 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-add-ons-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-add-ons/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-add-ons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-27280f97d7c2f094c66e491abb0e38cf.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-27280f97d7c2f094c66e491abb0e38cf.yaml new file mode 100644 index 0000000000..6193961bac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-27280f97d7c2f094c66e491abb0e38cf.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-add-ons-27280f97d7c2f094c66e491abb0e38cf + +info: + name: > + YITH WooCommerce Product Add-Ons <= 4.5.0 - Unuathenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c3efb7b1-5230-40f9-a8a0-3712916284be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-add-ons/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-add-ons,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..a962adf4ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-add-ons-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-add-ons/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-add-ons,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-61ed528306912302d784398edae3cbb2.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-61ed528306912302d784398edae3cbb2.yaml new file mode 100644 index 0000000000..8f578d0e13 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-61ed528306912302d784398edae3cbb2.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-add-ons-61ed528306912302d784398edae3cbb2 + +info: + name: > + YITH WooCommerce Product Add-Ons <= 4.3.0 - Authenticated(Shop Manager+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7edd06d9-3897-4644-a77e-e58ab6d14c95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-add-ons/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-add-ons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..b3b59abcbd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-add-ons-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-add-ons-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-add-ons/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-add-ons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-add-ons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-add-ons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-add-ons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.21') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..9a2ef7d581 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-bundles-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-bundles/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-bundles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-bundles,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-bundles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-bundles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..392cd4b0a1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-bundles-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-bundles/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-bundles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-bundles,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-bundles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-bundles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..03a22e232f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-bundles-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-bundles-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-bundles/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-bundles/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-bundles,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-bundles/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-bundles" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-slider-carousel-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-slider-carousel-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..9172494f82 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-slider-carousel-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-slider-carousel-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-slider-carousel/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-slider-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-slider-carousel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-slider-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-slider-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-slider-carousel-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-slider-carousel-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..aebbce0b9e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-slider-carousel-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-slider-carousel-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-slider-carousel/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-slider-carousel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-slider-carousel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-slider-carousel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-slider-carousel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..c2d31bf509 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-vendors-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-vendors,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..28d7f01684 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-vendors-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-vendors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-dced2caedbf7a329c1717024ec2a676a.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-dced2caedbf7a329c1717024ec2a676a.yaml new file mode 100644 index 0000000000..7751aad026 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-dced2caedbf7a329c1717024ec2a676a.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-vendors-dced2caedbf7a329c1717024ec2a676a + +info: + name: > + YITH WooCommerce Multi Vendor <= 3.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b924261f-1e1a-4565-a22e-ba592912d270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-vendors,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..72895648bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-product-vendors-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-product-vendors-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-product-vendors/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-product-vendors/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-product-vendors,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-product-vendors/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-product-vendors" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..daac116102 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-questions-and-answers-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-questions-and-answers/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-questions-and-answers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-questions-and-answers,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-questions-and-answers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-questions-and-answers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..2f864de616 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-questions-and-answers-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-questions-and-answers/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-questions-and-answers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-questions-and-answers,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-questions-and-answers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-questions-and-answers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..5a1c1fa5c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-questions-and-answers-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-questions-and-answers-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-questions-and-answers/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-questions-and-answers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-questions-and-answers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-questions-and-answers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-questions-and-answers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..4ea624f293 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-quick-view-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-quick-view/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-quick-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-quick-view,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-quick-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-quick-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..bb2e356952 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-quick-view-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-quick-view/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-quick-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-quick-view,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-quick-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-quick-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..d747d26b6a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-quick-view-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-quick-view-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-quick-view/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-quick-view/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-quick-view,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-quick-view/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-quick-view" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-recover-abandoned-cart-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-recover-abandoned-cart-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..0e689711b0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-recover-abandoned-cart-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-recover-abandoned-cart-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-recover-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-recover-abandoned-cart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-recover-abandoned-cart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-recover-abandoned-cart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-recover-abandoned-cart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..214b954070 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-request-a-quote-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-request-a-quote/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-request-a-quote,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..27c6bad344 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-request-a-quote-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-request-a-quote/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-request-a-quote,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.15.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-cd76dd48c85b587e87acb07c80de397a.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-cd76dd48c85b587e87acb07c80de397a.yaml new file mode 100644 index 0000000000..4bd1c2471c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-cd76dd48c85b587e87acb07c80de397a.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-request-a-quote-cd76dd48c85b587e87acb07c80de397a + +info: + name: > + YITH Request a Quote for WooCommerce <= 1.6.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/190edd82-840d-4468-8f5a-127cce049336?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-request-a-quote/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-request-a-quote,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..d216ac14c0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-request-a-quote-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-request-a-quote-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-request-a-quote/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-request-a-quote/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-request-a-quote,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-request-a-quote/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-request-a-quote" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..2b12d07054 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-social-login-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-social-login/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-social-login,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..495e29ce7b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-social-login-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-social-login/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-social-login,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..59ad773d88 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-social-login-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-social-login-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-social-login/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-social-login,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..4e7de168d6 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-stripe-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-stripe/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-stripe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-stripe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-stripe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-stripe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..bfd26a7abe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-stripe-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-stripe/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-stripe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-stripe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-stripe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-stripe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..4b50c2b6e5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-stripe-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-stripe-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-stripe/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-stripe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-stripe,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-stripe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-stripe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..8671668fb2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-subscription-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-subscription/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-subscription/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-subscription,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-subscription/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-subscription" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..56553820ba --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-subscription-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-subscription/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-subscription/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-subscription,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-subscription/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-subscription" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.16.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..11849aef1f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-subscription-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-subscription-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-subscription/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-subscription/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-subscription,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-subscription/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-subscription" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-tab-manager-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-tab-manager-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..8a77bd05dc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-tab-manager-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-tab-manager-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-tab-manager/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-tab-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-tab-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-tab-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-tab-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-tab-manager-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-tab-manager-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..51ef303587 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-tab-manager-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-tab-manager-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-tab-manager/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-tab-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-tab-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-tab-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-tab-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.17.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..313a80cf57 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-waiting-list-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-waiting-list/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-waiting-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-waiting-list,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-waiting-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-waiting-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..1ff4bbf0ed --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-waiting-list-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-waiting-list/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-waiting-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-waiting-list,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-waiting-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-waiting-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.21.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-bcdc9da8f16c2dd363504b15d634a8b3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-bcdc9da8f16c2dd363504b15d634a8b3.yaml new file mode 100644 index 0000000000..cada536dfb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-bcdc9da8f16c2dd363504b15d634a8b3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-waiting-list-bcdc9da8f16c2dd363504b15d634a8b3 + +info: + name: > + YITH WooCommerce Waiting List <= 2.6.0 - Cross-Site Request forgery via 'save_mail_status' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0bcc1457-abbc-4bd9-a0a8-80e3d5624d95?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-waiting-list/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-waiting-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-waiting-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-waiting-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-waiting-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..6e0d5a515d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-waiting-list-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-waiting-list-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-waiting-list/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-waiting-list/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-waiting-list,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-waiting-list/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-waiting-list" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..3c72c6239e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-wishlist-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-wishlist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-2ae81b909e77b01f5f9d53fd011b14fb.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-2ae81b909e77b01f5f9d53fd011b14fb.yaml new file mode 100644 index 0000000000..507df41a55 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-2ae81b909e77b01f5f9d53fd011b14fb.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-wishlist-2ae81b909e77b01f5f9d53fd011b14fb + +info: + name: > + YITH WooCommerce Wishlist <= 2.1.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3737d7a0-76d6-4292-aa31-6ee2cb0e9575?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-wishlist,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..b5e03274af --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-wishlist-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-wishlist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..a62817766a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-wishlist-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-wishlist-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-wishlist/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-wishlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-wishlist,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-wishlist/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-wishlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-26995bfc01056c81bc6600b718d2f9c3.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-26995bfc01056c81bc6600b718d2f9c3.yaml new file mode 100644 index 0000000000..603ca4d008 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-26995bfc01056c81bc6600b718d2f9c3.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-zoom-magnifier-26995bfc01056c81bc6600b718d2f9c3 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b948574a-0aab-4596-83e6-04be21f78bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-zoom-magnifier/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-zoom-magnifier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-zoom-magnifier,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-zoom-magnifier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-zoom-magnifier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-564f40d4fe0ef114f55053468e52e333.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-564f40d4fe0ef114f55053468e52e333.yaml new file mode 100644 index 0000000000..df177fe4ac --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-564f40d4fe0ef114f55053468e52e333.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-zoom-magnifier-564f40d4fe0ef114f55053468e52e333 + +info: + name: > + YITH plugins by YITHEMES <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f002d061-4e9d-49be-9d4c-c470ec97f653?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-zoom-magnifier/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-zoom-magnifier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-zoom-magnifier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-zoom-magnifier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-zoom-magnifier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.14.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-e1335c6f9c71ba603c44dff8a99e9a32.yaml new file mode 100644 index 0000000000..0280b7bca1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yith-woocommerce-zoom-magnifier-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -0,0 +1,58 @@ +id: yith-woocommerce-zoom-magnifier-e1335c6f9c71ba603c44dff8a99e9a32 + +info: + name: > + YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b34a0c6-3573-48c7-8edb-c9cf9503da06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yith-woocommerce-zoom-magnifier/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-zoom-magnifier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yith-woocommerce-zoom-magnifier,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-zoom-magnifier/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yith-woocommerce-zoom-magnifier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yml-for-yandex-market-2bf6e569a041eba29b626a0e786e076e.yaml b/nuclei-templates/cve-less/plugins/yml-for-yandex-market-2bf6e569a041eba29b626a0e786e076e.yaml new file mode 100644 index 0000000000..c78ebed536 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yml-for-yandex-market-2bf6e569a041eba29b626a0e786e076e.yaml @@ -0,0 +1,58 @@ +id: yml-for-yandex-market-2bf6e569a041eba29b626a0e786e076e + +info: + name: > + YML for Yandex Market <= 4.2.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c343cee6-909d-4c1a-a6e4-f916a2ae223e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yml-for-yandex-market/" + google-query: inurl:"/wp-content/plugins/yml-for-yandex-market/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yml-for-yandex-market,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yml-for-yandex-market/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yml-for-yandex-market" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yml-for-yandex-market-af78913e8aa3b92d3397ebee3054a3e9.yaml b/nuclei-templates/cve-less/plugins/yml-for-yandex-market-af78913e8aa3b92d3397ebee3054a3e9.yaml new file mode 100644 index 0000000000..cddbd7e86e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yml-for-yandex-market-af78913e8aa3b92d3397ebee3054a3e9.yaml @@ -0,0 +1,58 @@ +id: yml-for-yandex-market-af78913e8aa3b92d3397ebee3054a3e9 + +info: + name: > + Yml for Yandex Market <= 3.10.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a823a21e-78b5-4186-bb67-88799509970d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yml-for-yandex-market/" + google-query: inurl:"/wp-content/plugins/yml-for-yandex-market/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yml-for-yandex-market,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yml-for-yandex-market/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yml-for-yandex-market" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.10.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yolink-search-128d5f3d162a44e44f532e8dc2dce7bf.yaml b/nuclei-templates/cve-less/plugins/yolink-search-128d5f3d162a44e44f532e8dc2dce7bf.yaml new file mode 100644 index 0000000000..452cab31db --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yolink-search-128d5f3d162a44e44f532e8dc2dce7bf.yaml @@ -0,0 +1,58 @@ +id: yolink-search-128d5f3d162a44e44f532e8dc2dce7bf + +info: + name: > + yolink Search for WordPress < 2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/41219c9d-a10d-4006-9edc-1387dfdc8b8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yolink-search/" + google-query: inurl:"/wp-content/plugins/yolink-search/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yolink-search,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yolink-search/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yolink-search" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yoo-slider-1327cd5b3a24f53dc0f827abbdb99b36.yaml b/nuclei-templates/cve-less/plugins/yoo-slider-1327cd5b3a24f53dc0f827abbdb99b36.yaml new file mode 100644 index 0000000000..a9f8bd0b63 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yoo-slider-1327cd5b3a24f53dc0f827abbdb99b36.yaml @@ -0,0 +1,58 @@ +id: yoo-slider-1327cd5b3a24f53dc0f827abbdb99b36 + +info: + name: > + Yoo Slider – Image Slider & Video Slider <= 2.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5a3a5dd8-1608-4a73-a571-25da811e4605?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yoo-slider/" + google-query: inurl:"/wp-content/plugins/yoo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yoo-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yoo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yoo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yoo-slider-6496be73d20798eb7af74bf20b42d8fa.yaml b/nuclei-templates/cve-less/plugins/yoo-slider-6496be73d20798eb7af74bf20b42d8fa.yaml new file mode 100644 index 0000000000..1bf8ec2c5c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yoo-slider-6496be73d20798eb7af74bf20b42d8fa.yaml @@ -0,0 +1,58 @@ +id: yoo-slider-6496be73d20798eb7af74bf20b42d8fa + +info: + name: > + Yoo Slider plugin <= 2.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29d112ca-c793-4459-a5a0-7f1a3de9de71?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yoo-slider/" + google-query: inurl:"/wp-content/plugins/yoo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yoo-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yoo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yoo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yoo-slider-7da4dea81c55210aa215efa50cd5e1a7.yaml b/nuclei-templates/cve-less/plugins/yoo-slider-7da4dea81c55210aa215efa50cd5e1a7.yaml new file mode 100644 index 0000000000..3e7f45b30d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yoo-slider-7da4dea81c55210aa215efa50cd5e1a7.yaml @@ -0,0 +1,58 @@ +id: yoo-slider-7da4dea81c55210aa215efa50cd5e1a7 + +info: + name: > + Yoo Slider plugin <= 2.0.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1f643bd-a168-4506-9606-0b8b91573ebb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yoo-slider/" + google-query: inurl:"/wp-content/plugins/yoo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yoo-slider,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yoo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yoo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yoo-slider-7f7eb1234b1c572ad770fcbedeeb7de7.yaml b/nuclei-templates/cve-less/plugins/yoo-slider-7f7eb1234b1c572ad770fcbedeeb7de7.yaml new file mode 100644 index 0000000000..aebd8762dd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yoo-slider-7f7eb1234b1c572ad770fcbedeeb7de7.yaml @@ -0,0 +1,58 @@ +id: yoo-slider-7f7eb1234b1c572ad770fcbedeeb7de7 + +info: + name: > + Yoo Slider <= 2.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4852bd93-032f-4e11-ac30-7268684f08e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yoo-slider/" + google-query: inurl:"/wp-content/plugins/yoo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yoo-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yoo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yoo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yoo-slider-e46bfa26b6acc9d0ed585b68ffa95ec6.yaml b/nuclei-templates/cve-less/plugins/yoo-slider-e46bfa26b6acc9d0ed585b68ffa95ec6.yaml new file mode 100644 index 0000000000..ecb0f0b87b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yoo-slider-e46bfa26b6acc9d0ed585b68ffa95ec6.yaml @@ -0,0 +1,58 @@ +id: yoo-slider-e46bfa26b6acc9d0ed585b68ffa95ec6 + +info: + name: > + Yoo Slider plugin <= 2.0.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9906b19-1ac7-4015-adb3-0674dde0331e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yoo-slider/" + google-query: inurl:"/wp-content/plugins/yoo-slider/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yoo-slider,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yoo-slider/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yoo-slider" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yookassa-10647c17dbf9c37ea854931ce84957f9.yaml b/nuclei-templates/cve-less/plugins/yookassa-10647c17dbf9c37ea854931ce84957f9.yaml new file mode 100644 index 0000000000..89fe02fc58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yookassa-10647c17dbf9c37ea854931ce84957f9.yaml @@ -0,0 +1,58 @@ +id: yookassa-10647c17dbf9c37ea854931ce84957f9 + +info: + name: > + ЮKassa для WooCommerce <= 2.3.0 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a027f8f-bec8-456c-804b-b18fdb9532db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yookassa/" + google-query: inurl:"/wp-content/plugins/yookassa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yookassa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yookassa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yookassa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yookassa-d03a599615f97ee32ed6c9f069046608.yaml b/nuclei-templates/cve-less/plugins/yookassa-d03a599615f97ee32ed6c9f069046608.yaml new file mode 100644 index 0000000000..0f57c0202c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yookassa-d03a599615f97ee32ed6c9f069046608.yaml @@ -0,0 +1,58 @@ +id: yookassa-d03a599615f97ee32ed6c9f069046608 + +info: + name: > + ЮKassa для WooCommerce <= 2.3.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87e32ddb-6f3e-4896-965c-f30b016f9a72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yookassa/" + google-query: inurl:"/wp-content/plugins/yookassa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yookassa,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yookassa/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yookassa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-0779481b7f80c0411ff97013b26aee05.yaml b/nuclei-templates/cve-less/plugins/yop-poll-0779481b7f80c0411ff97013b26aee05.yaml new file mode 100644 index 0000000000..bc741976b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-0779481b7f80c0411ff97013b26aee05.yaml @@ -0,0 +1,58 @@ +id: yop-poll-0779481b7f80c0411ff97013b26aee05 + +info: + name: > + YOP Poll <= 6.3.0 - Author+ Stored Cross-Site Scripting via Options Module + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7edad4f6-e470-4a72-b618-d2dad64e0ac1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-2209fd73f482335c124e2a704dbac383.yaml b/nuclei-templates/cve-less/plugins/yop-poll-2209fd73f482335c124e2a704dbac383.yaml new file mode 100644 index 0000000000..5acaf9efbe --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-2209fd73f482335c124e2a704dbac383.yaml @@ -0,0 +1,58 @@ +id: yop-poll-2209fd73f482335c124e2a704dbac383 + +info: + name: > + YOP Poll <= 6.3.0 - Author+ Stored Cross-Site Scripting via Preview Module + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2f4e5f34-c107-44da-9f73-e7b25f83e803?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-348e9954cde1ddefaa405cdbf442ab7b.yaml b/nuclei-templates/cve-less/plugins/yop-poll-348e9954cde1ddefaa405cdbf442ab7b.yaml new file mode 100644 index 0000000000..ba58dd3859 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-348e9954cde1ddefaa405cdbf442ab7b.yaml @@ -0,0 +1,58 @@ +id: yop-poll-348e9954cde1ddefaa405cdbf442ab7b + +info: + name: > + YOP Poll <= 6.1.4 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e2e8dfb-df74-41b7-9b3b-0f5d7b1c545b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-3ceff14dcfb2e0311d597c89266b0063.yaml b/nuclei-templates/cve-less/plugins/yop-poll-3ceff14dcfb2e0311d597c89266b0063.yaml new file mode 100644 index 0000000000..57aebfed8a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-3ceff14dcfb2e0311d597c89266b0063.yaml @@ -0,0 +1,58 @@ +id: yop-poll-3ceff14dcfb2e0311d597c89266b0063 + +info: + name: > + YOP Poll <= 5.8.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3323b809-b778-48fb-967c-cedba9010495?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-538b036c9b7ca7079f6e2a5cc2642fb5.yaml b/nuclei-templates/cve-less/plugins/yop-poll-538b036c9b7ca7079f6e2a5cc2642fb5.yaml new file mode 100644 index 0000000000..c446c4688f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-538b036c9b7ca7079f6e2a5cc2642fb5.yaml @@ -0,0 +1,58 @@ +id: yop-poll-538b036c9b7ca7079f6e2a5cc2642fb5 + +info: + name: > + YOP Poll <= 6.5.28 - Reusable Captcha via validateImage + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33f8f75d-c57e-456c-a48a-82fa668adb1c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.28') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-570709303e69e8bea02cdb35b74ee58c.yaml b/nuclei-templates/cve-less/plugins/yop-poll-570709303e69e8bea02cdb35b74ee58c.yaml new file mode 100644 index 0000000000..be09a57f9f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-570709303e69e8bea02cdb35b74ee58c.yaml @@ -0,0 +1,58 @@ +id: yop-poll-570709303e69e8bea02cdb35b74ee58c + +info: + name: > + YOP Poll <= 6.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6754c9a-81e1-4b39-a125-5293ee4ff758?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-5cd8506b97bde8d30090476ea4e9f6d6.yaml b/nuclei-templates/cve-less/plugins/yop-poll-5cd8506b97bde8d30090476ea4e9f6d6.yaml new file mode 100644 index 0000000000..4e85b13e75 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-5cd8506b97bde8d30090476ea4e9f6d6.yaml @@ -0,0 +1,58 @@ +id: yop-poll-5cd8506b97bde8d30090476ea4e9f6d6 + +info: + name: > + YOP Poll <= 6.0.2 - Reflected Cross-Site Scripting via poll_id Parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a753b4ba-9223-4eff-95e3-da7a1b2830a6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-7a46739bfced50470df5ec8fce622b5b.yaml b/nuclei-templates/cve-less/plugins/yop-poll-7a46739bfced50470df5ec8fce622b5b.yaml new file mode 100644 index 0000000000..d474dfa6e1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-7a46739bfced50470df5ec8fce622b5b.yaml @@ -0,0 +1,58 @@ +id: yop-poll-7a46739bfced50470df5ec8fce622b5b + +info: + name: > + YOP Poll <= 6.3.4 - Author+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7beaa9e-517b-4717-b896-3e37424e27a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-811602c2462c1ce744a5866bcb3ff2bb.yaml b/nuclei-templates/cve-less/plugins/yop-poll-811602c2462c1ce744a5866bcb3ff2bb.yaml new file mode 100644 index 0000000000..1071d82944 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-811602c2462c1ce744a5866bcb3ff2bb.yaml @@ -0,0 +1,58 @@ +id: yop-poll-811602c2462c1ce744a5866bcb3ff2bb + +info: + name: > + YOP Poll <= 5.7.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b33760d8-323a-4d0b-9a54-b84152bd4367?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-ac4eaf61003a7bcab0c4c83244d45aab.yaml b/nuclei-templates/cve-less/plugins/yop-poll-ac4eaf61003a7bcab0c4c83244d45aab.yaml new file mode 100644 index 0000000000..5224f768ef --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-ac4eaf61003a7bcab0c4c83244d45aab.yaml @@ -0,0 +1,58 @@ +id: yop-poll-ac4eaf61003a7bcab0c4c83244d45aab + +info: + name: > + YOP Poll <= 6.4.2 - IP Spoofing via X-Forwarded-For header + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff840236-4368-45aa-a9a3-7e02f20783d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-cb10630ddc7da513be3fbc863f316ce2.yaml b/nuclei-templates/cve-less/plugins/yop-poll-cb10630ddc7da513be3fbc863f316ce2.yaml new file mode 100644 index 0000000000..3510868697 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-cb10630ddc7da513be3fbc863f316ce2.yaml @@ -0,0 +1,58 @@ +id: yop-poll-cb10630ddc7da513be3fbc863f316ce2 + +info: + name: > + YOP Poll <= 6.2.7 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5df238dd-6269-4ee0-a0f4-12bdb74f74e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yop-poll-dde39ba4d7059070e8dd3bb604ff98da.yaml b/nuclei-templates/cve-less/plugins/yop-poll-dde39ba4d7059070e8dd3bb604ff98da.yaml new file mode 100644 index 0000000000..15ea4b9784 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yop-poll-dde39ba4d7059070e8dd3bb604ff98da.yaml @@ -0,0 +1,58 @@ +id: yop-poll-dde39ba4d7059070e8dd3bb604ff98da + +info: + name: > + YOP Poll <= 6.5.26 - Race Condition to Vote Manipulation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/360b1927-a863-46be-ad11-3f6251c75a3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yop-poll/" + google-query: inurl:"/wp-content/plugins/yop-poll/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yop-poll,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yop-poll/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yop-poll" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.5.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yotpo-reviews-for-woocommerce-2209fd38d31d7045610e08e5a8e2302b.yaml b/nuclei-templates/cve-less/plugins/yotpo-reviews-for-woocommerce-2209fd38d31d7045610e08e5a8e2302b.yaml new file mode 100644 index 0000000000..6f17ddb81c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yotpo-reviews-for-woocommerce-2209fd38d31d7045610e08e5a8e2302b.yaml @@ -0,0 +1,58 @@ +id: yotpo-reviews-for-woocommerce-2209fd38d31d7045610e08e5a8e2302b + +info: + name: > + Yotpo Reviews for WooCommerce (Unofficial) <= 2.0.4 - Cross-Site Request Forgery to Plugin Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6297753c-72c0-4926-9365-d0c760ddfd2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yotpo-reviews-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/yotpo-reviews-for-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yotpo-reviews-for-woocommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yotpo-reviews-for-woocommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yotpo-reviews-for-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-371f210cfb55319010fd16b3a7c4efca.yaml b/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-371f210cfb55319010fd16b3a7c4efca.yaml new file mode 100644 index 0000000000..6bfd60c3ee --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-371f210cfb55319010fd16b3a7c4efca.yaml @@ -0,0 +1,58 @@ +id: yotuwp-easy-youtube-embed-371f210cfb55319010fd16b3a7c4efca + +info: + name: > + Video Gallery – YouTube Playlist, Channel Gallery by YotuWP <= 1.3.8 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91c1100b-be67-4610-947a-c6a010a2757e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yotuwp-easy-youtube-embed/" + google-query: inurl:"/wp-content/plugins/yotuwp-easy-youtube-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yotuwp-easy-youtube-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yotuwp-easy-youtube-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yotuwp-easy-youtube-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-50a6dff0cb336807f517358763e4184a.yaml b/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-50a6dff0cb336807f517358763e4184a.yaml new file mode 100644 index 0000000000..3daeb5a11c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-50a6dff0cb336807f517358763e4184a.yaml @@ -0,0 +1,58 @@ +id: yotuwp-easy-youtube-embed-50a6dff0cb336807f517358763e4184a + +info: + name: > + Video Gallery – YouTube Playlist, Channel Gallery by YotuWP <= 1.3.10 - Authenticated (Admin+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdd14863-5498-4598-8b22-8e5a607869e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yotuwp-easy-youtube-embed/" + google-query: inurl:"/wp-content/plugins/yotuwp-easy-youtube-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yotuwp-easy-youtube-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yotuwp-easy-youtube-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yotuwp-easy-youtube-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-fcbd76097c62e0d5592f5bd058f1a16f.yaml b/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-fcbd76097c62e0d5592f5bd058f1a16f.yaml new file mode 100644 index 0000000000..7d8fd0f219 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yotuwp-easy-youtube-embed-fcbd76097c62e0d5592f5bd058f1a16f.yaml @@ -0,0 +1,58 @@ +id: yotuwp-easy-youtube-embed-fcbd76097c62e0d5592f5bd058f1a16f + +info: + name: > + Video Gallery <= 1.3.12 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93b5bc57-3bfa-4477-a9d4-f0563008cf94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yotuwp-easy-youtube-embed/" + google-query: inurl:"/wp-content/plugins/yotuwp-easy-youtube-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yotuwp-easy-youtube-embed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yotuwp-easy-youtube-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yotuwp-easy-youtube-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/you-shang-43a1e8131c5398f64ddb0148cb86b0fc.yaml b/nuclei-templates/cve-less/plugins/you-shang-43a1e8131c5398f64ddb0148cb86b0fc.yaml new file mode 100644 index 0000000000..3eaf968d8c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/you-shang-43a1e8131c5398f64ddb0148cb86b0fc.yaml @@ -0,0 +1,58 @@ +id: you-shang-43a1e8131c5398f64ddb0148cb86b0fc + +info: + name: > + 有赏 You Shang <= 1.0.1 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5c0ae44-18e5-4fd1-a1a8-b70fc15a8c26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/you-shang/" + google-query: inurl:"/wp-content/plugins/you-shang/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,you-shang,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/you-shang/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "you-shang" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youforms-free-for-copecart-0b4cf00934e898c124e66c8a24ee9c38.yaml b/nuclei-templates/cve-less/plugins/youforms-free-for-copecart-0b4cf00934e898c124e66c8a24ee9c38.yaml new file mode 100644 index 0000000000..cae6c39a89 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youforms-free-for-copecart-0b4cf00934e898c124e66c8a24ee9c38.yaml @@ -0,0 +1,58 @@ +id: youforms-free-for-copecart-0b4cf00934e898c124e66c8a24ee9c38 + +info: + name: > + youForms for WordPress – Creating Forms for CopeCart <= 1.0.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1d67b80-67b7-4194-ab90-e9f8cea1ac33?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youforms-free-for-copecart/" + google-query: inurl:"/wp-content/plugins/youforms-free-for-copecart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youforms-free-for-copecart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youforms-free-for-copecart/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youforms-free-for-copecart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/your-text-manager-882b62316645c3c4ca02d06b90f3ba4c.yaml b/nuclei-templates/cve-less/plugins/your-text-manager-882b62316645c3c4ca02d06b90f3ba4c.yaml new file mode 100644 index 0000000000..6d407479d3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/your-text-manager-882b62316645c3c4ca02d06b90f3ba4c.yaml @@ -0,0 +1,58 @@ +id: your-text-manager-882b62316645c3c4ca02d06b90f3ba4c + +info: + name: > + Your Text Manager <= 0.3.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9dd48d0f-00c2-4f76-923b-eb5c7a2b4468?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/your-text-manager/" + google-query: inurl:"/wp-content/plugins/your-text-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,your-text-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/your-text-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "your-text-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-14a83f20a2e76cecad34b8959bcb030a.yaml b/nuclei-templates/cve-less/plugins/yourchannel-14a83f20a2e76cecad34b8959bcb030a.yaml new file mode 100644 index 0000000000..e835472937 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-14a83f20a2e76cecad34b8959bcb030a.yaml @@ -0,0 +1,58 @@ +id: yourchannel-14a83f20a2e76cecad34b8959bcb030a + +info: + name: > + YourChannel <= 1.2.4 - Cross-Site Request Forgery to Plugin Language Translation Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ae863c-4638-49ab-bb1f-52346884c3aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-3989a9901d352d6a2f1182e6cf00355e.yaml b/nuclei-templates/cve-less/plugins/yourchannel-3989a9901d352d6a2f1182e6cf00355e.yaml new file mode 100644 index 0000000000..4a810a5712 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-3989a9901d352d6a2f1182e6cf00355e.yaml @@ -0,0 +1,58 @@ +id: yourchannel-3989a9901d352d6a2f1182e6cf00355e + +info: + name: > + YourChannel <= 1.2.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'yrc_lang[Videos]' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6ebce82-6260-489e-b0b1-5037a0100626?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-46e730049923010c8fef590481e6af11.yaml b/nuclei-templates/cve-less/plugins/yourchannel-46e730049923010c8fef590481e6af11.yaml new file mode 100644 index 0000000000..65b2b8f390 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-46e730049923010c8fef590481e6af11.yaml @@ -0,0 +1,58 @@ +id: yourchannel-46e730049923010c8fef590481e6af11 + +info: + name: > + YourChannel <= 1.2.4 - Cross-Site Request Forgery to Plugin Settings Change + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c20db2d-f73d-4e52-a275-ab1975ae4b17?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-79b5bcc733210544f6943a7d400a5741.yaml b/nuclei-templates/cve-less/plugins/yourchannel-79b5bcc733210544f6943a7d400a5741.yaml new file mode 100644 index 0000000000..04965fa0fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-79b5bcc733210544f6943a7d400a5741.yaml @@ -0,0 +1,58 @@ +id: yourchannel-79b5bcc733210544f6943a7d400a5741 + +info: + name: > + YourChannel <= 1.2.4 - Cross-Site Request Forgery to Plugin Channel Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45851efe-2584-4b5e-8e4c-24f289d3bc32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-7b03e9c7a48a7a487481072b229c74d2.yaml b/nuclei-templates/cve-less/plugins/yourchannel-7b03e9c7a48a7a487481072b229c74d2.yaml new file mode 100644 index 0000000000..e67859f809 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-7b03e9c7a48a7a487481072b229c74d2.yaml @@ -0,0 +1,58 @@ +id: yourchannel-7b03e9c7a48a7a487481072b229c74d2 + +info: + name: > + YourChannel <= 1.2.2 Authenticated (Contributor+) Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8d18e1c7-65b6-4c1f-88bf-4014418ff920?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-7eee22ee9d7eafb911cff5c522c34cc9.yaml b/nuclei-templates/cve-less/plugins/yourchannel-7eee22ee9d7eafb911cff5c522c34cc9.yaml new file mode 100644 index 0000000000..c16bc17e46 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-7eee22ee9d7eafb911cff5c522c34cc9.yaml @@ -0,0 +1,58 @@ +id: yourchannel-7eee22ee9d7eafb911cff5c522c34cc9 + +info: + name: > + YourChannel <= 1.2.1 - Missing Authorization Checks leading to Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de2c2c90-52b6-4315-a8d1-6519a90f81e7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-874a492260299c7a5afa8a7cc7cbcac9.yaml b/nuclei-templates/cve-less/plugins/yourchannel-874a492260299c7a5afa8a7cc7cbcac9.yaml new file mode 100644 index 0000000000..ba8ae7d70c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-874a492260299c7a5afa8a7cc7cbcac9.yaml @@ -0,0 +1,58 @@ +id: yourchannel-874a492260299c7a5afa8a7cc7cbcac9 + +info: + name: > + YourChannel <= 1.2.3 - Missing Authorization to Plugin Settings Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34817e32-d5a3-403a-85f0-1d60af8945de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-9ffefef754ef7b05c84f3b0ba93de0df.yaml b/nuclei-templates/cve-less/plugins/yourchannel-9ffefef754ef7b05c84f3b0ba93de0df.yaml new file mode 100644 index 0000000000..271ef1ca97 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-9ffefef754ef7b05c84f3b0ba93de0df.yaml @@ -0,0 +1,58 @@ +id: yourchannel-9ffefef754ef7b05c84f3b0ba93de0df + +info: + name: > + YourChannel <= 1.2.3 - Missing Authorization to Plugin Cache Reset + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/541d202b-f3ed-44d8-93a6-e158209db885?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-bda0e76aad71129453d100395876792d.yaml b/nuclei-templates/cve-less/plugins/yourchannel-bda0e76aad71129453d100395876792d.yaml new file mode 100644 index 0000000000..5418acac47 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-bda0e76aad71129453d100395876792d.yaml @@ -0,0 +1,58 @@ +id: yourchannel-bda0e76aad71129453d100395876792d + +info: + name: > + YourChannel <= 1.2.5 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a81d5615-0b96-4d89-a525-7e80a10a9317?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourchannel-c9984a876e871660704819ab2121a5a0.yaml b/nuclei-templates/cve-less/plugins/yourchannel-c9984a876e871660704819ab2121a5a0.yaml new file mode 100644 index 0000000000..0c59549a0f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourchannel-c9984a876e871660704819ab2121a5a0.yaml @@ -0,0 +1,58 @@ +id: yourchannel-c9984a876e871660704819ab2121a5a0 + +info: + name: > + YourChannel <= 1.2.4 - Cross-Site Request Forgery to Plugin Language Translation Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1cec0b1-b77c-4d21-a3d2-c79fd3250bb0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourchannel/" + google-query: inurl:"/wp-content/plugins/yourchannel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourchannel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourchannel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourchannel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yourmembers-4841648779bddf5eb17a1f0352588205.yaml b/nuclei-templates/cve-less/plugins/yourmembers-4841648779bddf5eb17a1f0352588205.yaml new file mode 100644 index 0000000000..bc67777d40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yourmembers-4841648779bddf5eb17a1f0352588205.yaml @@ -0,0 +1,58 @@ +id: yourmembers-4841648779bddf5eb17a1f0352588205 + +info: + name: > + YourMembers <= 3.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/80dbb49d-d21d-41ef-90af-f74f46e5b703?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yourmembers/" + google-query: inurl:"/wp-content/plugins/yourmembers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yourmembers,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yourmembers/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourmembers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yousaytoo-auto-publishing-plugin-4ad999fa82a381d094bc99654eb86aca.yaml b/nuclei-templates/cve-less/plugins/yousaytoo-auto-publishing-plugin-4ad999fa82a381d094bc99654eb86aca.yaml new file mode 100644 index 0000000000..259228b6b5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yousaytoo-auto-publishing-plugin-4ad999fa82a381d094bc99654eb86aca.yaml @@ -0,0 +1,58 @@ +id: yousaytoo-auto-publishing-plugin-4ad999fa82a381d094bc99654eb86aca + +info: + name: > + YouSayToo auto-publishing plugin <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02325b2a-af00-4b99-91ae-64163a8980fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yousaytoo-auto-publishing-plugin/" + google-query: inurl:"/wp-content/plugins/yousaytoo-auto-publishing-plugin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yousaytoo-auto-publishing-plugin,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yousaytoo-auto-publishing-plugin/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yousaytoo-auto-publishing-plugin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-channel-3485e314595e8ba9b90ab54d159e74ca.yaml b/nuclei-templates/cve-less/plugins/youtube-channel-3485e314595e8ba9b90ab54d159e74ca.yaml new file mode 100644 index 0000000000..8653f8bf78 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-channel-3485e314595e8ba9b90ab54d159e74ca.yaml @@ -0,0 +1,58 @@ +id: youtube-channel-3485e314595e8ba9b90ab54d159e74ca + +info: + name: > + My YouTube Channel <= 3.23.3 - Cross-Site Request Forgery to Cache Deletion + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3670665c-0ae1-47d6-b463-581eb195666e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-channel/" + google-query: inurl:"/wp-content/plugins/youtube-channel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-channel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-channel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-channel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.23.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-channel-3f9ac076d173ecd9afccb09cd7195bfc.yaml b/nuclei-templates/cve-less/plugins/youtube-channel-3f9ac076d173ecd9afccb09cd7195bfc.yaml new file mode 100644 index 0000000000..175e17f752 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-channel-3f9ac076d173ecd9afccb09cd7195bfc.yaml @@ -0,0 +1,58 @@ +id: youtube-channel-3f9ac076d173ecd9afccb09cd7195bfc + +info: + name: > + My YouTube Channel <= 3.0.12.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d979f899-8cdc-4230-b1b5-865c025dc86a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-channel/" + google-query: inurl:"/wp-content/plugins/youtube-channel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-channel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-channel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-channel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-channel-8e4fe58479cedd644fbbd3b418e0b682.yaml b/nuclei-templates/cve-less/plugins/youtube-channel-8e4fe58479cedd644fbbd3b418e0b682.yaml new file mode 100644 index 0000000000..0c2b526df4 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-channel-8e4fe58479cedd644fbbd3b418e0b682.yaml @@ -0,0 +1,58 @@ +id: youtube-channel-8e4fe58479cedd644fbbd3b418e0b682 + +info: + name: > + YouTube Channel < 3.0.12.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86e62a7d-53d6-40c8-823d-811cfb3d75b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-channel/" + google-query: inurl:"/wp-content/plugins/youtube-channel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-channel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-channel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-channel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-channel-dd26803b22794f717e5726511579315e.yaml b/nuclei-templates/cve-less/plugins/youtube-channel-dd26803b22794f717e5726511579315e.yaml new file mode 100644 index 0000000000..201f0d732d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-channel-dd26803b22794f717e5726511579315e.yaml @@ -0,0 +1,58 @@ +id: youtube-channel-dd26803b22794f717e5726511579315e + +info: + name: > + My YouTube Channel <= 3.0.12.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/486b6a75-d101-4f3a-8436-6c23dd0ff200?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-channel/" + google-query: inurl:"/wp-content/plugins/youtube-channel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-channel,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-channel/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-channel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.12.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-channel-gallery-b830431516693664401f38e9ff6fdd82.yaml b/nuclei-templates/cve-less/plugins/youtube-channel-gallery-b830431516693664401f38e9ff6fdd82.yaml new file mode 100644 index 0000000000..d0f5802196 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-channel-gallery-b830431516693664401f38e9ff6fdd82.yaml @@ -0,0 +1,58 @@ +id: youtube-channel-gallery-b830431516693664401f38e9ff6fdd82 + +info: + name: > + Youtube Channel Gallery <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/070f6a8e-a06d-4f48-9703-933515a3098c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-channel-gallery/" + google-query: inurl:"/wp-content/plugins/youtube-channel-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-channel-gallery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-channel-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-channel-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-embed-315a019742ffab737ef11e333f6ddf51.yaml b/nuclei-templates/cve-less/plugins/youtube-embed-315a019742ffab737ef11e333f6ddf51.yaml new file mode 100644 index 0000000000..4749075012 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-embed-315a019742ffab737ef11e333f6ddf51.yaml @@ -0,0 +1,58 @@ +id: youtube-embed-315a019742ffab737ef11e333f6ddf51 + +info: + name: > + YouTube Embed <= 5.2.1 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/483564f8-6308-4913-82e2-78d69aebb6dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-embed/" + google-query: inurl:"/wp-content/plugins/youtube-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-embed-b86d996fd3fb32f4d4a2741c181e0be2.yaml b/nuclei-templates/cve-less/plugins/youtube-embed-b86d996fd3fb32f4d4a2741c181e0be2.yaml new file mode 100644 index 0000000000..16558d978a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-embed-b86d996fd3fb32f4d4a2741c181e0be2.yaml @@ -0,0 +1,58 @@ +id: youtube-embed-b86d996fd3fb32f4d4a2741c181e0be2 + +info: + name: > + YouTube Embed <= 3.3.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f95bd2d-c835-4824-b241-f645b4a8fdb2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-embed/" + google-query: inurl:"/wp-content/plugins/youtube-embed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-embed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-embed/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-embed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-embed-plus-ee98789d25d36584b37cbc76b4f1f9c4.yaml b/nuclei-templates/cve-less/plugins/youtube-embed-plus-ee98789d25d36584b37cbc76b4f1f9c4.yaml new file mode 100644 index 0000000000..255553e7a7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-embed-plus-ee98789d25d36584b37cbc76b4f1f9c4.yaml @@ -0,0 +1,58 @@ +id: youtube-embed-plus-ee98789d25d36584b37cbc76b4f1f9c4 + +info: + name: > + Embed Plus Plugin for YouTube <= 11.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/91ebde99-3383-4179-a72b-2709c1db9e53?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-embed-plus/" + google-query: inurl:"/wp-content/plugins/youtube-embed-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-embed-plus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-embed-plus/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-embed-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-feeder-ba80b860d4e6bf99a76e42ede7281809.yaml b/nuclei-templates/cve-less/plugins/youtube-feeder-ba80b860d4e6bf99a76e42ede7281809.yaml new file mode 100644 index 0000000000..b73c42a058 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-feeder-ba80b860d4e6bf99a76e42ede7281809.yaml @@ -0,0 +1,58 @@ +id: youtube-feeder-ba80b860d4e6bf99a76e42ede7281809 + +info: + name: > + Youtube Feeder <= 2.0.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8641aa6d-e865-46cd-91f5-faec81a7bb55?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-feeder/" + google-query: inurl:"/wp-content/plugins/youtube-feeder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-feeder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-feeder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-feeder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-playlist-player-803fd151825baa056b93685e93955a54.yaml b/nuclei-templates/cve-less/plugins/youtube-playlist-player-803fd151825baa056b93685e93955a54.yaml new file mode 100644 index 0000000000..bfeb7402d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-playlist-player-803fd151825baa056b93685e93955a54.yaml @@ -0,0 +1,58 @@ +id: youtube-playlist-player-803fd151825baa056b93685e93955a54 + +info: + name: > + YouTube Playlist Player <= 4.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02cffe63-dad2-4f6b-9530-7f494e3071d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-playlist-player/" + google-query: inurl:"/wp-content/plugins/youtube-playlist-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-playlist-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-playlist-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-playlist-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-playlist-player-a14f62f5c8828736c014cf6f6d52173a.yaml b/nuclei-templates/cve-less/plugins/youtube-playlist-player-a14f62f5c8828736c014cf6f6d52173a.yaml new file mode 100644 index 0000000000..4ac273748c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-playlist-player-a14f62f5c8828736c014cf6f6d52173a.yaml @@ -0,0 +1,58 @@ +id: youtube-playlist-player-a14f62f5c8828736c014cf6f6d52173a + +info: + name: > + YouTube Playlist Player <= 4.6.4 - Cross-Site Request Forgery in ytpp_settings + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39aed7e9-05c6-4251-b489-de7a33ed2c2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-playlist-player/" + google-query: inurl:"/wp-content/plugins/youtube-playlist-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-playlist-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-playlist-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-playlist-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-shortcode-de2bc693a1c312889ab71164989a7177.yaml b/nuclei-templates/cve-less/plugins/youtube-shortcode-de2bc693a1c312889ab71164989a7177.yaml new file mode 100644 index 0000000000..32a7096450 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-shortcode-de2bc693a1c312889ab71164989a7177.yaml @@ -0,0 +1,58 @@ +id: youtube-shortcode-de2bc693a1c312889ab71164989a7177 + +info: + name: > + Youtube Shortcode <= 1.8.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fadfe181-cc30-407c-baec-dc8f70cffe27?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-shortcode/" + google-query: inurl:"/wp-content/plugins/youtube-shortcode/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-shortcode,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-shortcode/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-shortcode" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-showcase-adff1d89188982b4e28e29b803f67a6e.yaml b/nuclei-templates/cve-less/plugins/youtube-showcase-adff1d89188982b4e28e29b803f67a6e.yaml new file mode 100644 index 0000000000..49c72ab9c7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-showcase-adff1d89188982b4e28e29b803f67a6e.yaml @@ -0,0 +1,58 @@ +id: youtube-showcase-adff1d89188982b4e28e29b803f67a6e + +info: + name: > + Video Gallery & Management <= 3.3.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e226d75f-37b2-4af2-bba0-0fd3a96cc1a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-showcase/" + google-query: inurl:"/wp-content/plugins/youtube-showcase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-showcase,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-showcase/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-showcase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-speedload-1850212bc734be4160339a2e211bb5c6.yaml b/nuclei-templates/cve-less/plugins/youtube-speedload-1850212bc734be4160339a2e211bb5c6.yaml new file mode 100644 index 0000000000..83c3ee75c1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-speedload-1850212bc734be4160339a2e211bb5c6.yaml @@ -0,0 +1,58 @@ +id: youtube-speedload-1850212bc734be4160339a2e211bb5c6 + +info: + name: > + Youtube SpeedLoad <= 0.6.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d11c022-9938-4a9e-be16-db986fdfa1c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-speedload/" + google-query: inurl:"/wp-content/plugins/youtube-speedload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-speedload,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-speedload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-speedload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-video-inserter-62d169261c9604e6c54d2dda26a18971.yaml b/nuclei-templates/cve-less/plugins/youtube-video-inserter-62d169261c9604e6c54d2dda26a18971.yaml new file mode 100644 index 0000000000..14fc11f3fc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-video-inserter-62d169261c9604e6c54d2dda26a18971.yaml @@ -0,0 +1,58 @@ +id: youtube-video-inserter-62d169261c9604e6c54d2dda26a18971 + +info: + name: > + YouTube Video Inserter <= 1.2.1.0 Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/391ec941-eb19-4505-b03a-0f4b240e8819?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-video-inserter/" + google-query: inurl:"/wp-content/plugins/youtube-video-inserter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-video-inserter,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-video-inserter/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-video-inserter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-video-player-2b8463e6867dce79ddd40af4dd9780fd.yaml b/nuclei-templates/cve-less/plugins/youtube-video-player-2b8463e6867dce79ddd40af4dd9780fd.yaml new file mode 100644 index 0000000000..b7230951fd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-video-player-2b8463e6867dce79ddd40af4dd9780fd.yaml @@ -0,0 +1,58 @@ +id: youtube-video-player-2b8463e6867dce79ddd40af4dd9780fd + +info: + name: > + YouTube Embed, Playlist and Popup <= 2.3.8 - Contributor+ Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9087b16e-488b-431d-a7f7-ab0d49520756?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-video-player/" + google-query: inurl:"/wp-content/plugins/youtube-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-video-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-video-player-9f08d8940e734966b92051cba3f5ff32.yaml b/nuclei-templates/cve-less/plugins/youtube-video-player-9f08d8940e734966b92051cba3f5ff32.yaml new file mode 100644 index 0000000000..a1c9677a48 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-video-player-9f08d8940e734966b92051cba3f5ff32.yaml @@ -0,0 +1,58 @@ +id: youtube-video-player-9f08d8940e734966b92051cba3f5ff32 + +info: + name: > + YouTube Embed <= 2.6.3 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e374887-0062-4ca2-8e43-13a6c4207f84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-video-player/" + google-query: inurl:"/wp-content/plugins/youtube-video-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-video-player,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-video-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-video-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtube-widget-responsive-d5afc9936d3ec0ef2f1ebf204d2b6f90.yaml b/nuclei-templates/cve-less/plugins/youtube-widget-responsive-d5afc9936d3ec0ef2f1ebf204d2b6f90.yaml new file mode 100644 index 0000000000..e87f9672e2 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtube-widget-responsive-d5afc9936d3ec0ef2f1ebf204d2b6f90.yaml @@ -0,0 +1,58 @@ +id: youtube-widget-responsive-d5afc9936d3ec0ef2f1ebf204d2b6f90 + +info: + name: > + Widget Responsive for Youtube <= 1.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72daa533-8b17-420c-9b51-b5f72da2726c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtube-widget-responsive/" + google-query: inurl:"/wp-content/plugins/youtube-widget-responsive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtube-widget-responsive,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtube-widget-responsive/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtube-widget-responsive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youtubefreedown-db1bfddf516dcb0f89a64dd78526f798.yaml b/nuclei-templates/cve-less/plugins/youtubefreedown-db1bfddf516dcb0f89a64dd78526f798.yaml new file mode 100644 index 0000000000..a82a1948d0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youtubefreedown-db1bfddf516dcb0f89a64dd78526f798.yaml @@ -0,0 +1,58 @@ +id: youtubefreedown-db1bfddf516dcb0f89a64dd78526f798 + +info: + name: > + Youtube Freedown <= 1.0 - Remote Media File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/888877c9-45e1-405a-ac0c-bbe512188141?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youtubefreedown/" + google-query: inurl:"/wp-content/plugins/youtubefreedown/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youtubefreedown,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youtubefreedown/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youtubefreedown" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youzify-0bcd48a3f1b52a4a7092a42bfa6473a6.yaml b/nuclei-templates/cve-less/plugins/youzify-0bcd48a3f1b52a4a7092a42bfa6473a6.yaml new file mode 100644 index 0000000000..babc618cb0 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youzify-0bcd48a3f1b52a4a7092a42bfa6473a6.yaml @@ -0,0 +1,58 @@ +id: youzify-0bcd48a3f1b52a4a7092a42bfa6473a6 + +info: + name: > + Youzify <= 1.2.2 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94c98edf-6f4a-4c23-afa7-d5caaa22397f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youzify/" + google-query: inurl:"/wp-content/plugins/youzify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youzify,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youzify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youzify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youzify-1eaf6ff13c8b718103c9b459aa46b172.yaml b/nuclei-templates/cve-less/plugins/youzify-1eaf6ff13c8b718103c9b459aa46b172.yaml new file mode 100644 index 0000000000..1577eeacdc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youzify-1eaf6ff13c8b718103c9b459aa46b172.yaml @@ -0,0 +1,58 @@ +id: youzify-1eaf6ff13c8b718103c9b459aa46b172 + +info: + name: > + Youzify <= 1.1.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6977a58-cce0-4ae8-abe6-1870bbb2bf06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youzify/" + google-query: inurl:"/wp-content/plugins/youzify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youzify,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youzify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youzify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youzify-87cb25b1c7747f5af4e409cfd05ed832.yaml b/nuclei-templates/cve-less/plugins/youzify-87cb25b1c7747f5af4e409cfd05ed832.yaml new file mode 100644 index 0000000000..e2c9c29010 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youzify-87cb25b1c7747f5af4e409cfd05ed832.yaml @@ -0,0 +1,58 @@ +id: youzify-87cb25b1c7747f5af4e409cfd05ed832 + +info: + name: > + Youzify <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ea4b216-0b29-45eb-bd61-962f76265ba6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youzify/" + google-query: inurl:"/wp-content/plugins/youzify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youzify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youzify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youzify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youzify-8b9fbd031d6f59226821b7faa24713d4.yaml b/nuclei-templates/cve-less/plugins/youzify-8b9fbd031d6f59226821b7faa24713d4.yaml new file mode 100644 index 0000000000..5078356776 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youzify-8b9fbd031d6f59226821b7faa24713d4.yaml @@ -0,0 +1,58 @@ +id: youzify-8b9fbd031d6f59226821b7faa24713d4 + +info: + name: > + Youzify <= 1.0.6 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac8a8698-0f8d-4204-8539-ce129d98b2b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youzify/" + google-query: inurl:"/wp-content/plugins/youzify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youzify,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youzify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youzify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/youzify-moderation-deb298ce4863a239756c2bf229347f46.yaml b/nuclei-templates/cve-less/plugins/youzify-moderation-deb298ce4863a239756c2bf229347f46.yaml new file mode 100644 index 0000000000..cc8c8291d1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/youzify-moderation-deb298ce4863a239756c2bf229347f46.yaml @@ -0,0 +1,58 @@ +id: youzify-moderation-deb298ce4863a239756c2bf229347f46 + +info: + name: > + Buddypress Moderation <= 1.2.5 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c544990-9fd2-4f1b-a02c-a13959d68580?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youzify-moderation/" + google-query: inurl:"/wp-content/plugins/youzify-moderation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youzify-moderation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youzify-moderation/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youzify-moderation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yt-player-3976419442f6726cc8fee397bc7f22ee.yaml b/nuclei-templates/cve-less/plugins/yt-player-3976419442f6726cc8fee397bc7f22ee.yaml new file mode 100644 index 0000000000..cb77fa1b71 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yt-player-3976419442f6726cc8fee397bc7f22ee.yaml @@ -0,0 +1,58 @@ +id: yt-player-3976419442f6726cc8fee397bc7f22ee + +info: + name: > + Video Player for YouTube <= 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0dbed7a2-730d-42f2-9d57-3f07900d33e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yt-player/" + google-query: inurl:"/wp-content/plugins/yt-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yt-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yt-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yt-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yt-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/yt-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a4c88d9575 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yt-player-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: yt-player-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yt-player/" + google-query: inurl:"/wp-content/plugins/yt-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yt-player,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yt-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yt-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yurl-retwitt-76b896e05441bad3b87a1f15a06f97a4.yaml b/nuclei-templates/cve-less/plugins/yurl-retwitt-76b896e05441bad3b87a1f15a06f97a4.yaml new file mode 100644 index 0000000000..f6cd69b5e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yurl-retwitt-76b896e05441bad3b87a1f15a06f97a4.yaml @@ -0,0 +1,58 @@ +id: yurl-retwitt-76b896e05441bad3b87a1f15a06f97a4 + +info: + name: > + yURL ReTwitt <= 1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24d050ad-0816-46a3-a37e-17356acf88d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yurl-retwitt/" + google-query: inurl:"/wp-content/plugins/yurl-retwitt/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yurl-retwitt,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yurl-retwitt/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yurl-retwitt" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/yuzo-related-post-73a2e276237565aa409d25c41f8ca0e2.yaml b/nuclei-templates/cve-less/plugins/yuzo-related-post-73a2e276237565aa409d25c41f8ca0e2.yaml new file mode 100644 index 0000000000..327e70a706 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/yuzo-related-post-73a2e276237565aa409d25c41f8ca0e2.yaml @@ -0,0 +1,58 @@ +id: yuzo-related-post-73a2e276237565aa409d25c41f8ca0e2 + +info: + name: > + Yuzo Related Posts <= 5.12.93 - Missing Authorization to Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d392b84b-2a1f-430c-84a1-22431763a6a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/yuzo-related-post/" + google-query: inurl:"/wp-content/plugins/yuzo-related-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,yuzo-related-post,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/yuzo-related-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yuzo-related-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.12.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/z-url-preview-7afc53a437871814faec30b27e8447a5.yaml b/nuclei-templates/cve-less/plugins/z-url-preview-7afc53a437871814faec30b27e8447a5.yaml new file mode 100644 index 0000000000..b496b7bd40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/z-url-preview-7afc53a437871814faec30b27e8447a5.yaml @@ -0,0 +1,58 @@ +id: z-url-preview-7afc53a437871814faec30b27e8447a5 + +info: + name: > + Z-URL Preview <= 1.6.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5db103a-a823-47ac-a1f4-c297619cf1a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/z-url-preview/" + google-query: inurl:"/wp-content/plugins/z-url-preview/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,z-url-preview,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/z-url-preview/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "z-url-preview" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zarzadzanie_kontem-ef5ed531568c083ac4bd116aef4f2b54.yaml b/nuclei-templates/cve-less/plugins/zarzadzanie_kontem-ef5ed531568c083ac4bd116aef4f2b54.yaml new file mode 100644 index 0000000000..feba7a575a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zarzadzanie_kontem-ef5ed531568c083ac4bd116aef4f2b54.yaml @@ -0,0 +1,58 @@ +id: zarzadzanie_kontem-ef5ed531568c083ac4bd116aef4f2b54 + +info: + name: > + Zarzadzanie Kontem (Unknown Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/580f5cd1-2cda-4e8e-81b5-36ce39ebd907?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zarzadzanie_kontem/" + google-query: inurl:"/wp-content/plugins/zarzadzanie_kontem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zarzadzanie_kontem,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zarzadzanie_kontem/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zarzadzanie_kontem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zd-youtube-flv-player-aa439b9d2e93b6ff2495abedfda870b3.yaml b/nuclei-templates/cve-less/plugins/zd-youtube-flv-player-aa439b9d2e93b6ff2495abedfda870b3.yaml new file mode 100644 index 0000000000..08d4e63311 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zd-youtube-flv-player-aa439b9d2e93b6ff2495abedfda870b3.yaml @@ -0,0 +1,58 @@ +id: zd-youtube-flv-player-aa439b9d2e93b6ff2495abedfda870b3 + +info: + name: > + ZD YouTube FLV Player <= 1.2.6 - Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f26854-7e25-4e64-9f03-916ece6fde03?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zd-youtube-flv-player/" + google-query: inurl:"/wp-content/plugins/zd-youtube-flv-player/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zd-youtube-flv-player,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zd-youtube-flv-player/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zd-youtube-flv-player" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zdstats-e5d3824dce2c042eb639b46cc57ff2d2.yaml b/nuclei-templates/cve-less/plugins/zdstats-e5d3824dce2c042eb639b46cc57ff2d2.yaml new file mode 100644 index 0000000000..d8d86b14ab --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zdstats-e5d3824dce2c042eb639b46cc57ff2d2.yaml @@ -0,0 +1,58 @@ +id: zdstats-e5d3824dce2c042eb639b46cc57ff2d2 + +info: + name: > + ZdStatistics <= 2.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f04166e0-9f43-43ad-9552-618b81ab2d6f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zdstats/" + google-query: inurl:"/wp-content/plugins/zdstats/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zdstats,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zdstats/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zdstats" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zedity-c1b48655787cca8bb98f42a7402e4f5f.yaml b/nuclei-templates/cve-less/plugins/zedity-c1b48655787cca8bb98f42a7402e4f5f.yaml new file mode 100644 index 0000000000..8562776fe9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zedity-c1b48655787cca8bb98f42a7402e4f5f.yaml @@ -0,0 +1,58 @@ +id: zedity-c1b48655787cca8bb98f42a7402e4f5f + +info: + name: > + Zedity – The Layout-Free Content Editor < 2.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa3ff74a-a38e-4cb3-b0b8-99fb16185f42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zedity/" + google-query: inurl:"/wp-content/plugins/zedity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zedity,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zedity/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zedity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zeenshare-09e64e82ae55462158eeb5e726a22311.yaml b/nuclei-templates/cve-less/plugins/zeenshare-09e64e82ae55462158eeb5e726a22311.yaml new file mode 100644 index 0000000000..5d88a8f385 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zeenshare-09e64e82ae55462158eeb5e726a22311.yaml @@ -0,0 +1,58 @@ +id: zeenshare-09e64e82ae55462158eeb5e726a22311 + +info: + name: > + Zeenshare <= 1.0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc4bfa81-c781-42df-91c7-3daed1e6a6f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zeenshare/" + google-query: inurl:"/wp-content/plugins/zeenshare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zeenshare,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zeenshare/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zeenshare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zelist-directory-3ecd9d29be301ddeb0777372578c9ed3.yaml b/nuclei-templates/cve-less/plugins/zelist-directory-3ecd9d29be301ddeb0777372578c9ed3.yaml new file mode 100644 index 0000000000..bc09acb219 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zelist-directory-3ecd9d29be301ddeb0777372578c9ed3.yaml @@ -0,0 +1,58 @@ +id: zelist-directory-3ecd9d29be301ddeb0777372578c9ed3 + +info: + name: > + zeList <= 0.5.11.07 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dba61faf-b7fa-4910-9101-8f2a3dac8dc9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zelist-directory/" + google-query: inurl:"/wp-content/plugins/zelist-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zelist-directory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zelist-directory/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zelist-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.5.11.07') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zen-mobile-app-native-6dca12dc38630f4f9ae87a5c64f8992b.yaml b/nuclei-templates/cve-less/plugins/zen-mobile-app-native-6dca12dc38630f4f9ae87a5c64f8992b.yaml new file mode 100644 index 0000000000..20dc4e1a32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zen-mobile-app-native-6dca12dc38630f4f9ae87a5c64f8992b.yaml @@ -0,0 +1,58 @@ +id: zen-mobile-app-native-6dca12dc38630f4f9ae87a5c64f8992b + +info: + name: > + Wordpress Plugin Mobile App Native 3.0 <= 3.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ad38d18-689c-41ab-9e33-fccbf6791cdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zen-mobile-app-native/" + google-query: inurl:"/wp-content/plugins/zen-mobile-app-native/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zen-mobile-app-native,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zen-mobile-app-native/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zen-mobile-app-native" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zendesk-754636da4394eed1ba762eb903570de0.yaml b/nuclei-templates/cve-less/plugins/zendesk-754636da4394eed1ba762eb903570de0.yaml new file mode 100644 index 0000000000..0706e0df5e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zendesk-754636da4394eed1ba762eb903570de0.yaml @@ -0,0 +1,58 @@ +id: zendesk-754636da4394eed1ba762eb903570de0 + +info: + name: > + Zendesk Support for WordPress <= 1.8.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/212b7da7-bd3e-42df-8b50-a3eb472cf440?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zendesk/" + google-query: inurl:"/wp-content/plugins/zendesk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zendesk,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zendesk/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zendesk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zendesk-help-center-83e7004306bfbb58dbc0b94ba733c14a.yaml b/nuclei-templates/cve-less/plugins/zendesk-help-center-83e7004306bfbb58dbc0b94ba733c14a.yaml new file mode 100644 index 0000000000..619d756e6f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zendesk-help-center-83e7004306bfbb58dbc0b94ba733c14a.yaml @@ -0,0 +1,58 @@ +id: zendesk-help-center-83e7004306bfbb58dbc0b94ba733c14a + +info: + name: > + Help Center by BestWebSoft <= 1.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5ec709c-c67d-4067-a118-166e104d148a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zendesk-help-center/" + google-query: inurl:"/wp-content/plugins/zendesk-help-center/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zendesk-help-center,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zendesk-help-center/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zendesk-help-center" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zendrop-dropshipping-and-fulfillment-1e3f4e1ff5158794a25646563fe28f9d.yaml b/nuclei-templates/cve-less/plugins/zendrop-dropshipping-and-fulfillment-1e3f4e1ff5158794a25646563fe28f9d.yaml new file mode 100644 index 0000000000..8c7437fb91 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zendrop-dropshipping-and-fulfillment-1e3f4e1ff5158794a25646563fe28f9d.yaml @@ -0,0 +1,58 @@ +id: zendrop-dropshipping-and-fulfillment-1e3f4e1ff5158794a25646563fe28f9d + +info: + name: > + Zendrop – Global Dropshipping <= 1.0.0 - SQL Injection in setMetaData + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/153e435b-9986-4242-a89b-12e8f1552803?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zendrop-dropshipping-and-fulfillment/" + google-query: inurl:"/wp-content/plugins/zendrop-dropshipping-and-fulfillment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zendrop-dropshipping-and-fulfillment,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zendrop-dropshipping-and-fulfillment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zendrop-dropshipping-and-fulfillment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zendrop-dropshipping-and-fulfillment-e98f58904228ac7173e5fcfac5af85a6.yaml b/nuclei-templates/cve-less/plugins/zendrop-dropshipping-and-fulfillment-e98f58904228ac7173e5fcfac5af85a6.yaml new file mode 100644 index 0000000000..04afdef0e7 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zendrop-dropshipping-and-fulfillment-e98f58904228ac7173e5fcfac5af85a6.yaml @@ -0,0 +1,58 @@ +id: zendrop-dropshipping-and-fulfillment-e98f58904228ac7173e5fcfac5af85a6 + +info: + name: > + Zendrop – Global Dropshipping <= 1.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a0be61b-a1ee-499f-b991-58d5494bce18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zendrop-dropshipping-and-fulfillment/" + google-query: inurl:"/wp-content/plugins/zendrop-dropshipping-and-fulfillment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zendrop-dropshipping-and-fulfillment,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zendrop-dropshipping-and-fulfillment/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zendrop-dropshipping-and-fulfillment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zengo-custom-thumbnail-image-581a16776001d26901f68412e72a12c5.yaml b/nuclei-templates/cve-less/plugins/zengo-custom-thumbnail-image-581a16776001d26901f68412e72a12c5.yaml new file mode 100644 index 0000000000..8661c1ba72 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zengo-custom-thumbnail-image-581a16776001d26901f68412e72a12c5.yaml @@ -0,0 +1,58 @@ +id: zengo-custom-thumbnail-image-581a16776001d26901f68412e72a12c5 + +info: + name: > + Zengo Custom Thumbnail Image Gallery <= 1.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1fc6a2e-9c91-4517-8f04-fb3ea65413b8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zengo-custom-thumbnail-image/" + google-query: inurl:"/wp-content/plugins/zengo-custom-thumbnail-image/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zengo-custom-thumbnail-image,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zengo-custom-thumbnail-image/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zengo-custom-thumbnail-image" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zeno-font-resizer-230d51cfd302c1eecd4d3a3387befab9.yaml b/nuclei-templates/cve-less/plugins/zeno-font-resizer-230d51cfd302c1eecd4d3a3387befab9.yaml new file mode 100644 index 0000000000..66a730d224 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zeno-font-resizer-230d51cfd302c1eecd4d3a3387befab9.yaml @@ -0,0 +1,58 @@ +id: zeno-font-resizer-230d51cfd302c1eecd4d3a3387befab9 + +info: + name: > + Zeno Font Resizer <= 1.7.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dbba653-e23e-43e6-9dc5-83a6c99f8dc6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zeno-font-resizer/" + google-query: inurl:"/wp-content/plugins/zeno-font-resizer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zeno-font-resizer,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zeno-font-resizer/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zeno-font-resizer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zephyr-project-manager-0683602aa21df3d5a8b5ad8b8d019fd4.yaml b/nuclei-templates/cve-less/plugins/zephyr-project-manager-0683602aa21df3d5a8b5ad8b8d019fd4.yaml new file mode 100644 index 0000000000..f12132b6bd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zephyr-project-manager-0683602aa21df3d5a8b5ad8b8d019fd4.yaml @@ -0,0 +1,58 @@ +id: zephyr-project-manager-0683602aa21df3d5a8b5ad8b8d019fd4 + +info: + name: > + Zephyr Project Manager <= 3.3.93 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/236387f0-b58e-4ef1-b370-a0703a7902eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zephyr-project-manager/" + google-query: inurl:"/wp-content/plugins/zephyr-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zephyr-project-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zephyr-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zephyr-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.93') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zephyr-project-manager-37c471f64e53100c9ad9fb469cb0b5ca.yaml b/nuclei-templates/cve-less/plugins/zephyr-project-manager-37c471f64e53100c9ad9fb469cb0b5ca.yaml new file mode 100644 index 0000000000..59b12aff52 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zephyr-project-manager-37c471f64e53100c9ad9fb469cb0b5ca.yaml @@ -0,0 +1,58 @@ +id: zephyr-project-manager-37c471f64e53100c9ad9fb469cb0b5ca + +info: + name: > + Zephyr Project Manager <= 3.3.9 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9af929a3-6e17-40c7-9fce-1ce0eb72bc7b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zephyr-project-manager/" + google-query: inurl:"/wp-content/plugins/zephyr-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zephyr-project-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zephyr-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zephyr-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zephyr-project-manager-624c5301cd644d9b563918924237400c.yaml b/nuclei-templates/cve-less/plugins/zephyr-project-manager-624c5301cd644d9b563918924237400c.yaml new file mode 100644 index 0000000000..e00796bb53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zephyr-project-manager-624c5301cd644d9b563918924237400c.yaml @@ -0,0 +1,58 @@ +id: zephyr-project-manager-624c5301cd644d9b563918924237400c + +info: + name: > + Zephyr Project Manager <= 3.2.40 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22d50526-e21f-412d-9eed-b9b1f48c3358?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zephyr-project-manager/" + google-query: inurl:"/wp-content/plugins/zephyr-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zephyr-project-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zephyr-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zephyr-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.2.40') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zephyr-project-manager-794b67b62be42f3f8ca1d215c298fa56.yaml b/nuclei-templates/cve-less/plugins/zephyr-project-manager-794b67b62be42f3f8ca1d215c298fa56.yaml new file mode 100644 index 0000000000..62df7b38b8 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zephyr-project-manager-794b67b62be42f3f8ca1d215c298fa56.yaml @@ -0,0 +1,58 @@ +id: zephyr-project-manager-794b67b62be42f3f8ca1d215c298fa56 + +info: + name: > + Zephyr Project Manager <= 3.2.42 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ff83bf5-369f-43b9-b073-daf0de9051c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zephyr-project-manager/" + google-query: inurl:"/wp-content/plugins/zephyr-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zephyr-project-manager,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zephyr-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zephyr-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zephyr-project-manager-dafa2871ae7c93d913fdc3e40139c185.yaml b/nuclei-templates/cve-less/plugins/zephyr-project-manager-dafa2871ae7c93d913fdc3e40139c185.yaml new file mode 100644 index 0000000000..c721e89ba5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zephyr-project-manager-dafa2871ae7c93d913fdc3e40139c185.yaml @@ -0,0 +1,58 @@ +id: zephyr-project-manager-dafa2871ae7c93d913fdc3e40139c185 + +info: + name: > + Zephyr Project Manager <= 3.2.42 - Missing Authorization to Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7082c181-88c7-40f0-b49c-ffc16ab41dcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zephyr-project-manager/" + google-query: inurl:"/wp-content/plugins/zephyr-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zephyr-project-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zephyr-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zephyr-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.2.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zephyr-project-manager-e94377837818e9045e22fcbe33f9af9d.yaml b/nuclei-templates/cve-less/plugins/zephyr-project-manager-e94377837818e9045e22fcbe33f9af9d.yaml new file mode 100644 index 0000000000..502f9bda32 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zephyr-project-manager-e94377837818e9045e22fcbe33f9af9d.yaml @@ -0,0 +1,58 @@ +id: zephyr-project-manager-e94377837818e9045e22fcbe33f9af9d + +info: + name: > + Zephyr Project Manager < 3.2.55 - Missing Authorization to Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74aad4b3-3e35-4abe-ba26-48334da0face?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zephyr-project-manager/" + google-query: inurl:"/wp-content/plugins/zephyr-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zephyr-project-manager,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zephyr-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zephyr-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.55') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zephyr-project-manager-ffa1a3ac7c56aa84edc8d1c4d2786035.yaml b/nuclei-templates/cve-less/plugins/zephyr-project-manager-ffa1a3ac7c56aa84edc8d1c4d2786035.yaml new file mode 100644 index 0000000000..5f64353842 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zephyr-project-manager-ffa1a3ac7c56aa84edc8d1c4d2786035.yaml @@ -0,0 +1,58 @@ +id: zephyr-project-manager-ffa1a3ac7c56aa84edc8d1c4d2786035 + +info: + name: > + Zephyr Project Manager <= 3.2.42 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/baab579f-2d77-4dbe-979a-54956dfdcb77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zephyr-project-manager/" + google-query: inurl:"/wp-content/plugins/zephyr-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zephyr-project-manager,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zephyr-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zephyr-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.2.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-bs-accounting-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml b/nuclei-templates/cve-less/plugins/zero-bs-accounting-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml new file mode 100644 index 0000000000..5af49ce70f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-bs-accounting-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml @@ -0,0 +1,58 @@ +id: zero-bs-accounting-b8a6e7f15ae6e5ea9f7d57f9d81da663 + +info: + name: > + Appsero <= 1.2.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e869800a-6fbc-4a1a-97fd-92ecbf3305ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-bs-accounting/" + google-query: inurl:"/wp-content/plugins/zero-bs-accounting/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-bs-accounting,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-bs-accounting/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-bs-accounting" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-bs-crm-38ff57a3a79c762236aaaeaffc92c374.yaml b/nuclei-templates/cve-less/plugins/zero-bs-crm-38ff57a3a79c762236aaaeaffc92c374.yaml new file mode 100644 index 0000000000..4a0a09611f --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-bs-crm-38ff57a3a79c762236aaaeaffc92c374.yaml @@ -0,0 +1,58 @@ +id: zero-bs-crm-38ff57a3a79c762236aaaeaffc92c374 + +info: + name: > + Jetpack CRM <= 5.4.2 - Authenticated (Administrator+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/de0fbcf0-64c6-4b33-8a9d-9c9c5d826a4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-bs-crm/" + google-query: inurl:"/wp-content/plugins/zero-bs-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-bs-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-bs-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-bs-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-bs-crm-aec751941690d89755638c950f64d01d.yaml b/nuclei-templates/cve-less/plugins/zero-bs-crm-aec751941690d89755638c950f64d01d.yaml new file mode 100644 index 0000000000..1ccec62969 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-bs-crm-aec751941690d89755638c950f64d01d.yaml @@ -0,0 +1,58 @@ +id: zero-bs-crm-aec751941690d89755638c950f64d01d + +info: + name: > + Jetpack CRM <= 5.3.1 - Cross-Site Request Forgery and PHAR Deserialization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98ab264f-b210-41d0-bb6f-b4f31d933f80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-bs-crm/" + google-query: inurl:"/wp-content/plugins/zero-bs-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-bs-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-bs-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-bs-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-bs-crm-b829e9e3bc2e932b44b01c6e5d51daac.yaml b/nuclei-templates/cve-less/plugins/zero-bs-crm-b829e9e3bc2e932b44b01c6e5d51daac.yaml new file mode 100644 index 0000000000..8502ce1550 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-bs-crm-b829e9e3bc2e932b44b01c6e5d51daac.yaml @@ -0,0 +1,58 @@ +id: zero-bs-crm-b829e9e3bc2e932b44b01c6e5d51daac + +info: + name: > + Jetpack CRM <= 5.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32f2fc21-165c-483f-ab81-48d8f221e4be?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-bs-crm/" + google-query: inurl:"/wp-content/plugins/zero-bs-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-bs-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-bs-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-bs-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-bs-crm-e541a07e8afe605f1bf04dc95e06d38b.yaml b/nuclei-templates/cve-less/plugins/zero-bs-crm-e541a07e8afe605f1bf04dc95e06d38b.yaml new file mode 100644 index 0000000000..58dba26a0b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-bs-crm-e541a07e8afe605f1bf04dc95e06d38b.yaml @@ -0,0 +1,58 @@ +id: zero-bs-crm-e541a07e8afe605f1bf04dc95e06d38b + +info: + name: > + Jetpack CRM <= 5.4.4 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20b3cd2a-ee32-49e0-8281-16afb8e42448?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-bs-crm/" + google-query: inurl:"/wp-content/plugins/zero-bs-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-bs-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-bs-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-bs-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-bs-crm-e62802506f71c3511e6c8f20c3c5bc64.yaml b/nuclei-templates/cve-less/plugins/zero-bs-crm-e62802506f71c3511e6c8f20c3c5bc64.yaml new file mode 100644 index 0000000000..9e4b657566 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-bs-crm-e62802506f71c3511e6c8f20c3c5bc64.yaml @@ -0,0 +1,58 @@ +id: zero-bs-crm-e62802506f71c3511e6c8f20c3c5bc64 + +info: + name: > + Jetpack CRM <= 5.5.0 - Authenticated (Client+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e1dbd0e2-8c6c-4127-b37c-269af3b7f71c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-bs-crm/" + google-query: inurl:"/wp-content/plugins/zero-bs-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-bs-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-bs-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-bs-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-bs-crm-ebb8de96320f3c64a91f6dbb13b596fa.yaml b/nuclei-templates/cve-less/plugins/zero-bs-crm-ebb8de96320f3c64a91f6dbb13b596fa.yaml new file mode 100644 index 0000000000..1c589e241d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-bs-crm-ebb8de96320f3c64a91f6dbb13b596fa.yaml @@ -0,0 +1,58 @@ +id: zero-bs-crm-ebb8de96320f3c64a91f6dbb13b596fa + +info: + name: > + Jetpack CRM <= 5.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efacb174-5eb6-4a58-bd76-8111031bbd4d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-bs-crm/" + google-query: inurl:"/wp-content/plugins/zero-bs-crm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-bs-crm,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-bs-crm/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-bs-crm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-spam-4639cf5f39a95924327a8dca4717fa6c.yaml b/nuclei-templates/cve-less/plugins/zero-spam-4639cf5f39a95924327a8dca4717fa6c.yaml new file mode 100644 index 0000000000..2d1478f2e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-spam-4639cf5f39a95924327a8dca4717fa6c.yaml @@ -0,0 +1,58 @@ +id: zero-spam-4639cf5f39a95924327a8dca4717fa6c + +info: + name: > + WordPress Zero Spam <= 2.1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af7345f9-6f62-424b-b02d-c145a90508ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-spam/" + google-query: inurl:"/wp-content/plugins/zero-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-spam,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-spam-76cebc35705efab283512491fbfb5ded.yaml b/nuclei-templates/cve-less/plugins/zero-spam-76cebc35705efab283512491fbfb5ded.yaml new file mode 100644 index 0000000000..182e6cdfb9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-spam-76cebc35705efab283512491fbfb5ded.yaml @@ -0,0 +1,58 @@ +id: zero-spam-76cebc35705efab283512491fbfb5ded + +info: + name: > + Zero Spam <= 5.5.6 - Spam Protection Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48ab8363-bc1c-47b4-8eb4-6093cd7591c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-spam/" + google-query: inurl:"/wp-content/plugins/zero-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-spam,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-spam-8d3590a739a7dcd2c4eca80910f2eb77.yaml b/nuclei-templates/cve-less/plugins/zero-spam-8d3590a739a7dcd2c4eca80910f2eb77.yaml new file mode 100644 index 0000000000..164449b0fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-spam-8d3590a739a7dcd2c4eca80910f2eb77.yaml @@ -0,0 +1,58 @@ +id: zero-spam-8d3590a739a7dcd2c4eca80910f2eb77 + +info: + name: > + Zero Spam <= 5.4.4 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d7576dd9-198b-49a7-950e-fc301e4bc5f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-spam/" + google-query: inurl:"/wp-content/plugins/zero-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-spam,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-spam-da9b182fa6fe344911bcf311918bd2c9.yaml b/nuclei-templates/cve-less/plugins/zero-spam-da9b182fa6fe344911bcf311918bd2c9.yaml new file mode 100644 index 0000000000..ec6ece68fa --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-spam-da9b182fa6fe344911bcf311918bd2c9.yaml @@ -0,0 +1,58 @@ +id: zero-spam-da9b182fa6fe344911bcf311918bd2c9 + +info: + name: > + Zero Spam for WordPress <= 5.4.4 - Authenticated(Administrator+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/03d8b8e7-5702-42d4-8cd9-ae3ff1a74a7e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-spam/" + google-query: inurl:"/wp-content/plugins/zero-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-spam,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zero-spam-e1ad6d026d68d47f5c4c4162b3b2d312.yaml b/nuclei-templates/cve-less/plugins/zero-spam-e1ad6d026d68d47f5c4c4162b3b2d312.yaml new file mode 100644 index 0000000000..cf619540bc --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zero-spam-e1ad6d026d68d47f5c4c4162b3b2d312.yaml @@ -0,0 +1,58 @@ +id: zero-spam-e1ad6d026d68d47f5c4c4162b3b2d312 + +info: + name: > + Zero Spam <= 5.2.10 - Admin+ SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57969f04-4758-4e62-8fbb-7b14629321d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zero-spam/" + google-query: inurl:"/wp-content/plugins/zero-spam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zero-spam,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zero-spam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zero-spam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zerobounce-3b122e7dd636f2979e4419665efeeeb4.yaml b/nuclei-templates/cve-less/plugins/zerobounce-3b122e7dd636f2979e4419665efeeeb4.yaml new file mode 100644 index 0000000000..bf6ef6ca3e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zerobounce-3b122e7dd636f2979e4419665efeeeb4.yaml @@ -0,0 +1,58 @@ +id: zerobounce-3b122e7dd636f2979e4419665efeeeb4 + +info: + name: > + ZeroBounce Email Verification & Validation <= 1.0.11 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7d215e9-e615-46ab-b0b8-b37f10cfae98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zerobounce/" + google-query: inurl:"/wp-content/plugins/zerobounce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zerobounce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zerobounce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zerobounce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zingiri-forum-b3a1763459f84e01883c4eac1864668d.yaml b/nuclei-templates/cve-less/plugins/zingiri-forum-b3a1763459f84e01883c4eac1864668d.yaml new file mode 100644 index 0000000000..d486592094 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zingiri-forum-b3a1763459f84e01883c4eac1864668d.yaml @@ -0,0 +1,58 @@ +id: zingiri-forum-b3a1763459f84e01883c4eac1864668d + +info: + name: > + Forums < 1.4.4 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d791cd67-03a8-4408-8ca7-7b1ea613e660?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zingiri-forum/" + google-query: inurl:"/wp-content/plugins/zingiri-forum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zingiri-forum,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zingiri-forum/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zingiri-forum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zingiri-tickets-189f446d2c45b3b01640096dd0b387b9.yaml b/nuclei-templates/cve-less/plugins/zingiri-tickets-189f446d2c45b3b01640096dd0b387b9.yaml new file mode 100644 index 0000000000..b536c70b51 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zingiri-tickets-189f446d2c45b3b01640096dd0b387b9.yaml @@ -0,0 +1,58 @@ +id: zingiri-tickets-189f446d2c45b3b01640096dd0b387b9 + +info: + name: > + Zingiri Tickets <= 3.0.3 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f004c401-6b71-413c-bbbd-229b6ddfffe4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zingiri-tickets/" + google-query: inurl:"/wp-content/plugins/zingiri-tickets/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zingiri-tickets,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zingiri-tickets/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zingiri-tickets" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zingiri-web-shop-47fb80194f8e9eb6848064791850ac64.yaml b/nuclei-templates/cve-less/plugins/zingiri-web-shop-47fb80194f8e9eb6848064791850ac64.yaml new file mode 100644 index 0000000000..fc80945e8b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zingiri-web-shop-47fb80194f8e9eb6848064791850ac64.yaml @@ -0,0 +1,58 @@ +id: zingiri-web-shop-47fb80194f8e9eb6848064791850ac64 + +info: + name: > + Zingiri Web Shop < 2.4.0 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd5b0c3a-0dd0-440f-b3a5-6d80f70e0f7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zingiri-web-shop/" + google-query: inurl:"/wp-content/plugins/zingiri-web-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zingiri-web-shop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zingiri-web-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zingiri-web-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zingiri-web-shop-f4ee9df210a60a8c7b3151780ca279b1.yaml b/nuclei-templates/cve-less/plugins/zingiri-web-shop-f4ee9df210a60a8c7b3151780ca279b1.yaml new file mode 100644 index 0000000000..4f59c3500b --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zingiri-web-shop-f4ee9df210a60a8c7b3151780ca279b1.yaml @@ -0,0 +1,58 @@ +id: zingiri-web-shop-f4ee9df210a60a8c7b3151780ca279b1 + +info: + name: > + Zingiri Web Shop Plugin <= 2.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a946cca6-670b-4baf-a941-43d0a0261c0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zingiri-web-shop/" + google-query: inurl:"/wp-content/plugins/zingiri-web-shop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zingiri-web-shop,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zingiri-web-shop/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zingiri-web-shop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zionbuilder-c982dae5e8a9922c1cd4de17c56c6264.yaml b/nuclei-templates/cve-less/plugins/zionbuilder-c982dae5e8a9922c1cd4de17c56c6264.yaml new file mode 100644 index 0000000000..44c5432ffd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zionbuilder-c982dae5e8a9922c1cd4de17c56c6264.yaml @@ -0,0 +1,58 @@ +id: zionbuilder-c982dae5e8a9922c1cd4de17c56c6264 + +info: + name: > + WordPress Page Builder – Zion Builder <= 3.6.9 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d8bd9bc-5062-4966-bc44-bfe033d5fc9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zionbuilder/" + google-query: inurl:"/wp-content/plugins/zionbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zionbuilder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zionbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zionbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zip-attachments-0cc87c7e1c569749aff97d224894c613.yaml b/nuclei-templates/cve-less/plugins/zip-attachments-0cc87c7e1c569749aff97d224894c613.yaml new file mode 100644 index 0000000000..07bf2c194c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zip-attachments-0cc87c7e1c569749aff97d224894c613.yaml @@ -0,0 +1,58 @@ +id: zip-attachments-0cc87c7e1c569749aff97d224894c613 + +info: + name: > + Zip Attachments <= 1.5 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b5b5d36d-02de-4569-b2cf-addc122ebe34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zip-attachments/" + google-query: inurl:"/wp-content/plugins/zip-attachments/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zip-attachments,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zip-attachments/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zip-attachments" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zip-codes-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/plugins/zip-codes-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ac37039d40 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zip-codes-redirect-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: zip-codes-redirect-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zip-codes-redirect/" + google-query: inurl:"/wp-content/plugins/zip-codes-redirect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zip-codes-redirect,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zip-codes-redirect/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zip-codes-redirect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zip-recipes-6dd6d330b8c5b9519a5c7e7eb2275f8f.yaml b/nuclei-templates/cve-less/plugins/zip-recipes-6dd6d330b8c5b9519a5c7e7eb2275f8f.yaml new file mode 100644 index 0000000000..8d19b15afd --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zip-recipes-6dd6d330b8c5b9519a5c7e7eb2275f8f.yaml @@ -0,0 +1,58 @@ +id: zip-recipes-6dd6d330b8c5b9519a5c7e7eb2275f8f + +info: + name: > + Recipe Maker For Your Food Blog from Zip Recipes <= 8.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd1483a-949d-4edb-9b86-007879d2d207?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zip-recipes/" + google-query: inurl:"/wp-content/plugins/zip-recipes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zip-recipes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zip-recipes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zip-recipes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zip-recipes-cb09c78d8cbad27edaa184a301bc9557.yaml b/nuclei-templates/cve-less/plugins/zip-recipes-cb09c78d8cbad27edaa184a301bc9557.yaml new file mode 100644 index 0000000000..ba3a850849 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zip-recipes-cb09c78d8cbad27edaa184a301bc9557.yaml @@ -0,0 +1,58 @@ +id: zip-recipes-cb09c78d8cbad27edaa184a301bc9557 + +info: + name: > + Zip Recipes <= 8.0.6 - Reflected Cross-Site Scripting via 's' parameter + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd7d3afd-6648-4ffb-85a9-cd5a6096963e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zip-recipes/" + google-query: inurl:"/wp-content/plugins/zip-recipes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zip-recipes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zip-recipes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zip-recipes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zip-recipes-dafddc9bea1e241db1766d412621b738.yaml b/nuclei-templates/cve-less/plugins/zip-recipes-dafddc9bea1e241db1766d412621b738.yaml new file mode 100644 index 0000000000..bba75a4416 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zip-recipes-dafddc9bea1e241db1766d412621b738.yaml @@ -0,0 +1,58 @@ +id: zip-recipes-dafddc9bea1e241db1766d412621b738 + +info: + name: > + Recipe Maker For Your Food Blog from Zip Recipes <= 8.1.0 - Authenticated(Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01ab2ed8-ff2f-41ac-bbbd-d8878fd067d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zip-recipes/" + google-query: inurl:"/wp-content/plugins/zip-recipes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zip-recipes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zip-recipes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zip-recipes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zip-recipes-f7e8f8b14f258bbc08d845e9a1c78fe8.yaml b/nuclei-templates/cve-less/plugins/zip-recipes-f7e8f8b14f258bbc08d845e9a1c78fe8.yaml new file mode 100644 index 0000000000..102b26b233 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zip-recipes-f7e8f8b14f258bbc08d845e9a1c78fe8.yaml @@ -0,0 +1,58 @@ +id: zip-recipes-f7e8f8b14f258bbc08d845e9a1c78fe8 + +info: + name: > + Zip Recipes <= 8.0.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/727a0649-082f-46d0-8d6f-de53ee7fb18e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zip-recipes/" + google-query: inurl:"/wp-content/plugins/zip-recipes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zip-recipes,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zip-recipes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zip-recipes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zippy-5296c4f305bae7ac7b64bb4111846d67.yaml b/nuclei-templates/cve-less/plugins/zippy-5296c4f305bae7ac7b64bb4111846d67.yaml new file mode 100644 index 0000000000..4ce88226e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zippy-5296c4f305bae7ac7b64bb4111846d67.yaml @@ -0,0 +1,58 @@ +id: zippy-5296c4f305bae7ac7b64bb4111846d67 + +info: + name: > + Zippy <= 1.6.5 - Authenticated(Author+) PHP Object Injection via unzipPosts + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9df75a5c-b70b-452e-a280-29a5005fe60b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zippy/" + google-query: inurl:"/wp-content/plugins/zippy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zippy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zippy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zippy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zippy-79737b0e5975df19862e5152b14611f3.yaml b/nuclei-templates/cve-less/plugins/zippy-79737b0e5975df19862e5152b14611f3.yaml new file mode 100644 index 0000000000..797b885723 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zippy-79737b0e5975df19862e5152b14611f3.yaml @@ -0,0 +1,58 @@ +id: zippy-79737b0e5975df19862e5152b14611f3 + +info: + name: > + Zippy <= 1.6.9 - Authenticated (Editor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1d8c5b14-6a4c-4d66-85cc-b6ab3b886ff7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zippy/" + google-query: inurl:"/wp-content/plugins/zippy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zippy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zippy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zippy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zippy-919cf6f31f29222aa869aeeb40e21222.yaml b/nuclei-templates/cve-less/plugins/zippy-919cf6f31f29222aa869aeeb40e21222.yaml new file mode 100644 index 0000000000..62f0631131 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zippy-919cf6f31f29222aa869aeeb40e21222.yaml @@ -0,0 +1,58 @@ +id: zippy-919cf6f31f29222aa869aeeb40e21222 + +info: + name: > + Zippy <= 1.6.2 - Missing Authorization via adminInit + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ffb078c-2a92-4682-aaa9-c519e28e7e18?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zippy/" + google-query: inurl:"/wp-content/plugins/zippy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zippy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zippy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zippy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zippy-c592d86340244bb94d180507b23fa5a8.yaml b/nuclei-templates/cve-less/plugins/zippy-c592d86340244bb94d180507b23fa5a8.yaml new file mode 100644 index 0000000000..0a16ddc98a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zippy-c592d86340244bb94d180507b23fa5a8.yaml @@ -0,0 +1,58 @@ +id: zippy-c592d86340244bb94d180507b23fa5a8 + +info: + name: > + Zippy <= 1.6.1 - Authenticated (Contributor+) Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c306428-8880-483f-be3a-6f6b87e55eef?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zippy/" + google-query: inurl:"/wp-content/plugins/zippy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zippy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zippy/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zippy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/ziteboard-online-whiteboard-a3ba5f2761ca9302a85775ee3b727b37.yaml b/nuclei-templates/cve-less/plugins/ziteboard-online-whiteboard-a3ba5f2761ca9302a85775ee3b727b37.yaml new file mode 100644 index 0000000000..a903413a61 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/ziteboard-online-whiteboard-a3ba5f2761ca9302a85775ee3b727b37.yaml @@ -0,0 +1,58 @@ +id: ziteboard-online-whiteboard-a3ba5f2761ca9302a85775ee3b727b37 + +info: + name: > + Ziteboard Online Whiteboard <= 2.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via ziteboard Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5608f50-e17a-471f-b644-dceb64d82f0c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ziteboard-online-whiteboard/" + google-query: inurl:"/wp-content/plugins/ziteboard-online-whiteboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ziteboard-online-whiteboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ziteboard-online-whiteboard/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ziteboard-online-whiteboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zlick-paywall-4dd3cd282a5e0a6020901679d8114797.yaml b/nuclei-templates/cve-less/plugins/zlick-paywall-4dd3cd282a5e0a6020901679d8114797.yaml new file mode 100644 index 0000000000..93b806b734 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zlick-paywall-4dd3cd282a5e0a6020901679d8114797.yaml @@ -0,0 +1,58 @@ +id: zlick-paywall-4dd3cd282a5e0a6020901679d8114797 + +info: + name: > + Zlick Paywall < 2.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6b68e35-ecfb-4876-8fee-c389077b2b4a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zlick-paywall/" + google-query: inurl:"/wp-content/plugins/zlick-paywall/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zlick-paywall,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zlick-paywall/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zlick-paywall" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zm-ajax-login-register-bd15ec75a9f06fe35c580f88aeba9b7d.yaml b/nuclei-templates/cve-less/plugins/zm-ajax-login-register-bd15ec75a9f06fe35c580f88aeba9b7d.yaml new file mode 100644 index 0000000000..b0431bc33a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zm-ajax-login-register-bd15ec75a9f06fe35c580f88aeba9b7d.yaml @@ -0,0 +1,58 @@ +id: zm-ajax-login-register-bd15ec75a9f06fe35c580f88aeba9b7d + +info: + name: > + ZM Ajax Login & Register <= 1.0.9 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82b46474-9a32-4d7e-8fa4-91f6465c5fa7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zm-ajax-login-register/" + google-query: inurl:"/wp-content/plugins/zm-ajax-login-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zm-ajax-login-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zm-ajax-login-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zm-ajax-login-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zm-ajax-login-register-c9973ef86938dfe0c48a5abdfafd30a8.yaml b/nuclei-templates/cve-less/plugins/zm-ajax-login-register-c9973ef86938dfe0c48a5abdfafd30a8.yaml new file mode 100644 index 0000000000..0f22f744cf --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zm-ajax-login-register-c9973ef86938dfe0c48a5abdfafd30a8.yaml @@ -0,0 +1,58 @@ +id: zm-ajax-login-register-c9973ef86938dfe0c48a5abdfafd30a8 + +info: + name: > + ZM Ajax Login & Register <= 2.0.2 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b10d01ec-54ef-456b-9410-ed013343a962?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zm-ajax-login-register/" + google-query: inurl:"/wp-content/plugins/zm-ajax-login-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zm-ajax-login-register,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zm-ajax-login-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zm-ajax-login-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zm-ajax-login-register-ffbdefeb8e9807045768193f5cbcf332.yaml b/nuclei-templates/cve-less/plugins/zm-ajax-login-register-ffbdefeb8e9807045768193f5cbcf332.yaml new file mode 100644 index 0000000000..1b158dd0c9 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zm-ajax-login-register-ffbdefeb8e9807045768193f5cbcf332.yaml @@ -0,0 +1,58 @@ +id: zm-ajax-login-register-ffbdefeb8e9807045768193f5cbcf332 + +info: + name: > + zM Ajax Login & Register <= 1.0.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65cb692f-b518-4581-ba63-c43eb450c56e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zm-ajax-login-register/" + google-query: inurl:"/wp-content/plugins/zm-ajax-login-register/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zm-ajax-login-register,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zm-ajax-login-register/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zm-ajax-login-register" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zm-gallery-d6a4a05c68d8a3214ff9eb4a728a2600.yaml b/nuclei-templates/cve-less/plugins/zm-gallery-d6a4a05c68d8a3214ff9eb4a728a2600.yaml new file mode 100644 index 0000000000..a3f9345947 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zm-gallery-d6a4a05c68d8a3214ff9eb4a728a2600.yaml @@ -0,0 +1,58 @@ +id: zm-gallery-d6a4a05c68d8a3214ff9eb4a728a2600 + +info: + name: > + ZM Gallery <= 1.0 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e56e1fe-bb53-422c-9219-b79e24f0f915?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zm-gallery/" + google-query: inurl:"/wp-content/plugins/zm-gallery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zm-gallery,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zm-gallery/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zm-gallery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-campaigns-51be17f4121e81eef8733d9b91f0a025.yaml b/nuclei-templates/cve-less/plugins/zoho-campaigns-51be17f4121e81eef8733d9b91f0a025.yaml new file mode 100644 index 0000000000..ab150a3036 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-campaigns-51be17f4121e81eef8733d9b91f0a025.yaml @@ -0,0 +1,58 @@ +id: zoho-campaigns-51be17f4121e81eef8733d9b91f0a025 + +info: + name: > + Zoho Campaigns <= 2.0.6 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e604979e-81e0-4c9a-844c-381599bf226e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-campaigns/" + google-query: inurl:"/wp-content/plugins/zoho-campaigns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-campaigns,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-campaigns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-campaigns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-campaigns-6dfc8c4749111821f698bf2e3a274663.yaml b/nuclei-templates/cve-less/plugins/zoho-campaigns-6dfc8c4749111821f698bf2e3a274663.yaml new file mode 100644 index 0000000000..fddf6fd76d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-campaigns-6dfc8c4749111821f698bf2e3a274663.yaml @@ -0,0 +1,58 @@ +id: zoho-campaigns-6dfc8c4749111821f698bf2e3a274663 + +info: + name: > + Zoho Campaigns <= 2.0.7 - Cross-Site Request Forgery via zcwc_optin_save + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd784fce-67a1-4740-9b0e-dcf54342f018?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-campaigns/" + google-query: inurl:"/wp-content/plugins/zoho-campaigns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-campaigns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-campaigns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-campaigns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-campaigns-b96f5bf9788a7a3f117bdd9d17e4d783.yaml b/nuclei-templates/cve-less/plugins/zoho-campaigns-b96f5bf9788a7a3f117bdd9d17e4d783.yaml new file mode 100644 index 0000000000..4e99d2439d --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-campaigns-b96f5bf9788a7a3f117bdd9d17e4d783.yaml @@ -0,0 +1,58 @@ +id: zoho-campaigns-b96f5bf9788a7a3f117bdd9d17e4d783 + +info: + name: > + Zoho Campaigns <= 2.0.7 - Cross-Site Request Forgery via zcwc_integration_disconnect + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bb377a9-fd31-4e1e-97d0-b764acba3122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-campaigns/" + google-query: inurl:"/wp-content/plugins/zoho-campaigns/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-campaigns,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-campaigns/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-campaigns" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-crm-forms-16abe83fb7023039495bc71d0e3e2b48.yaml b/nuclei-templates/cve-less/plugins/zoho-crm-forms-16abe83fb7023039495bc71d0e3e2b48.yaml new file mode 100644 index 0000000000..b6d902252c --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-crm-forms-16abe83fb7023039495bc71d0e3e2b48.yaml @@ -0,0 +1,58 @@ +id: zoho-crm-forms-16abe83fb7023039495bc71d0e3e2b48 + +info: + name: > + Zoho CRM Lead Magnet <= 1.6.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9171908-5b6e-44f3-ab93-899932be527f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-crm-forms/" + google-query: inurl:"/wp-content/plugins/zoho-crm-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-crm-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-crm-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-crm-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-crm-forms-8e8dcc759eccd2518e9fba14e695c093.yaml b/nuclei-templates/cve-less/plugins/zoho-crm-forms-8e8dcc759eccd2518e9fba14e695c093.yaml new file mode 100644 index 0000000000..bd0dc3ae01 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-crm-forms-8e8dcc759eccd2518e9fba14e695c093.yaml @@ -0,0 +1,58 @@ +id: zoho-crm-forms-8e8dcc759eccd2518e9fba14e695c093 + +info: + name: > + Zoho CRM Lead Magnet <= 1.7.5.8 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57caddaa-c548-4f07-ab34-327df62951b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-crm-forms/" + google-query: inurl:"/wp-content/plugins/zoho-crm-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-crm-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-crm-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-crm-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.5.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-crm-forms-db1fed2fca8e80d33156bce8fe1dd724.yaml b/nuclei-templates/cve-less/plugins/zoho-crm-forms-db1fed2fca8e80d33156bce8fe1dd724.yaml new file mode 100644 index 0000000000..0e382344f5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-crm-forms-db1fed2fca8e80d33156bce8fe1dd724.yaml @@ -0,0 +1,58 @@ +id: zoho-crm-forms-db1fed2fca8e80d33156bce8fe1dd724 + +info: + name: > + Zoho CRM Lead Magnet <= 1.7.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54a610c6-2615-4900-bf63-8ae93aeabb8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-crm-forms/" + google-query: inurl:"/wp-content/plugins/zoho-crm-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-crm-forms,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-crm-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-crm-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-forms-f34776806e968812940c4c4d5f82b503.yaml b/nuclei-templates/cve-less/plugins/zoho-forms-f34776806e968812940c4c4d5f82b503.yaml new file mode 100644 index 0000000000..aa59c2d057 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-forms-f34776806e968812940c4c4d5f82b503.yaml @@ -0,0 +1,58 @@ +id: zoho-forms-f34776806e968812940c4c4d5f82b503 + +info: + name: > + Zoho Forms <= 3.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/57e9b09c-adfb-4fc2-8d2b-41cfc1f73e22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-forms/" + google-query: inurl:"/wp-content/plugins/zoho-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-forms-fe0f3dd2df39b34940cdb1e352238936.yaml b/nuclei-templates/cve-less/plugins/zoho-forms-fe0f3dd2df39b34940cdb1e352238936.yaml new file mode 100644 index 0000000000..247a915a7e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-forms-fe0f3dd2df39b34940cdb1e352238936.yaml @@ -0,0 +1,58 @@ +id: zoho-forms-fe0f3dd2df39b34940cdb1e352238936 + +info: + name: > + Zoho Forms <= 3.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65db0063-63c4-400b-9192-ddcc16c0a541?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-forms/" + google-query: inurl:"/wp-content/plugins/zoho-forms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-forms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-forms/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-forms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-salesiq-177e4a3cb284ab639d60d2cdc0a716b5.yaml b/nuclei-templates/cve-less/plugins/zoho-salesiq-177e4a3cb284ab639d60d2cdc0a716b5.yaml new file mode 100644 index 0000000000..e3ae8ae8fb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-salesiq-177e4a3cb284ab639d60d2cdc0a716b5.yaml @@ -0,0 +1,58 @@ +id: zoho-salesiq-177e4a3cb284ab639d60d2cdc0a716b5 + +info: + name: > + Zoho SalesIQ <= 1.0.8 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9fba508-9a18-4c02-8d3a-0bcf990c457d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-salesiq/" + google-query: inurl:"/wp-content/plugins/zoho-salesiq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-salesiq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-salesiq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-salesiq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-salesiq-379056d331237206cad69e45d8d3007e.yaml b/nuclei-templates/cve-less/plugins/zoho-salesiq-379056d331237206cad69e45d8d3007e.yaml new file mode 100644 index 0000000000..9e8475cf53 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-salesiq-379056d331237206cad69e45d8d3007e.yaml @@ -0,0 +1,58 @@ +id: zoho-salesiq-379056d331237206cad69e45d8d3007e + +info: + name: > + Zoho SalesIQ <= 1.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b01ee276-baed-4678-894d-1407e538a0a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-salesiq/" + google-query: inurl:"/wp-content/plugins/zoho-salesiq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-salesiq,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-salesiq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-salesiq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-salesiq-4ecc6299ecfad3b8f439662203eb02a8.yaml b/nuclei-templates/cve-less/plugins/zoho-salesiq-4ecc6299ecfad3b8f439662203eb02a8.yaml new file mode 100644 index 0000000000..17e3bd48bb --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-salesiq-4ecc6299ecfad3b8f439662203eb02a8.yaml @@ -0,0 +1,58 @@ +id: zoho-salesiq-4ecc6299ecfad3b8f439662203eb02a8 + +info: + name: > + Zoho SalesIQ <= 1.0.8 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf59f44-356c-4d84-add3-72e8905a80f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-salesiq/" + google-query: inurl:"/wp-content/plugins/zoho-salesiq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-salesiq,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-salesiq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-salesiq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zoho-salesiq-808251beac3177b1d028049231c161e6.yaml b/nuclei-templates/cve-less/plugins/zoho-salesiq-808251beac3177b1d028049231c161e6.yaml new file mode 100644 index 0000000000..e2e52074e3 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zoho-salesiq-808251beac3177b1d028049231c161e6.yaml @@ -0,0 +1,58 @@ +id: zoho-salesiq-808251beac3177b1d028049231c161e6 + +info: + name: > + Zoho SalesIQ <= 1.0.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fd9cfbe-2bf4-4218-a29d-c4b70ed132af?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zoho-salesiq/" + google-query: inurl:"/wp-content/plugins/zoho-salesiq/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zoho-salesiq,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zoho-salesiq/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoho-salesiq" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zopim-live-chat-7727a5f68ed648a5191d57e52492a289.yaml b/nuclei-templates/cve-less/plugins/zopim-live-chat-7727a5f68ed648a5191d57e52492a289.yaml new file mode 100644 index 0000000000..686c69cab1 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zopim-live-chat-7727a5f68ed648a5191d57e52492a289.yaml @@ -0,0 +1,58 @@ +id: zopim-live-chat-7727a5f68ed648a5191d57e52492a289 + +info: + name: > + Zendesk Chat < 1.2.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee1b6961-1453-4f59-b03a-ab78b2e3f9d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zopim-live-chat/" + google-query: inurl:"/wp-content/plugins/zopim-live-chat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zopim-live-chat,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zopim-live-chat/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zopim-live-chat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zotpress-01df5885583291c622278972bf76eb28.yaml b/nuclei-templates/cve-less/plugins/zotpress-01df5885583291c622278972bf76eb28.yaml new file mode 100644 index 0000000000..b58ddbc1a5 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zotpress-01df5885583291c622278972bf76eb28.yaml @@ -0,0 +1,58 @@ +id: zotpress-01df5885583291c622278972bf76eb28 + +info: + name: > + Zotpress <= 7.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/617dcc0e-e212-4da0-8918-e55e6b3895fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zotpress/" + google-query: inurl:"/wp-content/plugins/zotpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zotpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zotpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zotpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zotpress-1c48bf4d484ac338c2e58423c802cdcb.yaml b/nuclei-templates/cve-less/plugins/zotpress-1c48bf4d484ac338c2e58423c802cdcb.yaml new file mode 100644 index 0000000000..84dab4ed3a --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zotpress-1c48bf4d484ac338c2e58423c802cdcb.yaml @@ -0,0 +1,58 @@ +id: zotpress-1c48bf4d484ac338c2e58423c802cdcb + +info: + name: > + Zotpress <= 7.3.7 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/29a2cb14-bf70-4936-a7c9-bf417a403de8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zotpress/" + google-query: inurl:"/wp-content/plugins/zotpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zotpress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zotpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zotpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zotpress-895ca2434557d1111d9453e776e1d9be.yaml b/nuclei-templates/cve-less/plugins/zotpress-895ca2434557d1111d9453e776e1d9be.yaml new file mode 100644 index 0000000000..897cd4b065 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zotpress-895ca2434557d1111d9453e776e1d9be.yaml @@ -0,0 +1,58 @@ +id: zotpress-895ca2434557d1111d9453e776e1d9be + +info: + name: > + Zotpress <= 7.3.4 - Reflected Cross-Site Scripting via 'PHP_SELF' + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/140b1f50-7c04-4396-ab0a-098bd06c80a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zotpress/" + google-query: inurl:"/wp-content/plugins/zotpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zotpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zotpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zotpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zotpress-d38242ac867a6661d41aa63eccb9b83c.yaml b/nuclei-templates/cve-less/plugins/zotpress-d38242ac867a6661d41aa63eccb9b83c.yaml new file mode 100644 index 0000000000..c43cff6f10 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zotpress-d38242ac867a6661d41aa63eccb9b83c.yaml @@ -0,0 +1,58 @@ +id: zotpress-d38242ac867a6661d41aa63eccb9b83c + +info: + name: > + Zotpress < 6.1.3 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b3d9549d-4d75-4b6a-90e2-4d403731d78f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zotpress/" + google-query: inurl:"/wp-content/plugins/zotpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zotpress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zotpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zotpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zx-csv-upload-11b8e915a665a007145e1d71a284462b.yaml b/nuclei-templates/cve-less/plugins/zx-csv-upload-11b8e915a665a007145e1d71a284462b.yaml new file mode 100644 index 0000000000..492e348a58 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zx-csv-upload-11b8e915a665a007145e1d71a284462b.yaml @@ -0,0 +1,58 @@ +id: zx-csv-upload-11b8e915a665a007145e1d71a284462b + +info: + name: > + ZX_CSV Upload <= 1 - Authenticated (Admin+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7804c518-d0d6-474e-9a56-daf6a6eecccc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zx-csv-upload/" + google-query: inurl:"/wp-content/plugins/zx-csv-upload/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zx-csv-upload,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zx-csv-upload/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zx-csv-upload" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/plugins/zynith-seo-f761a34ad9eca6bfb3e6a9ab7b2cb2d8.yaml b/nuclei-templates/cve-less/plugins/zynith-seo-f761a34ad9eca6bfb3e6a9ab7b2cb2d8.yaml new file mode 100644 index 0000000000..62b5d7d16e --- /dev/null +++ b/nuclei-templates/cve-less/plugins/zynith-seo-f761a34ad9eca6bfb3e6a9ab7b2cb2d8.yaml @@ -0,0 +1,58 @@ +id: zynith-seo-f761a34ad9eca6bfb3e6a9ab7b2cb2d8 + +info: + name: > + Zynith SEO <= 7.4.9 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f8e32a0-c67c-41cc-97ba-920f3ea5ea93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zynith-seo/" + google-query: inurl:"/wp-content/plugins/zynith-seo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zynith-seo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zynith-seo/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zynith-seo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/15zine-c8e594cea5366acd20db9ff8e1b21b92.yaml b/nuclei-templates/cve-less/themes/15zine-c8e594cea5366acd20db9ff8e1b21b92.yaml new file mode 100644 index 0000000000..4abfac2119 --- /dev/null +++ b/nuclei-templates/cve-less/themes/15zine-c8e594cea5366acd20db9ff8e1b21b92.yaml @@ -0,0 +1,58 @@ +id: 15zine-c8e594cea5366acd20db9ff8e1b21b92 + +info: + name: > + 15Zine | Magazine Newspaper Blog News WordPress Theme < 3.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad5c8eb8-8e58-4bed-a39c-b54e2cfd9cd3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/15zine/" + google-query: inurl:"/wp-content/themes/15zine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,15zine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/15zine/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "15zine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/5star-a3ed9e76b0fc321cc4d7c1cb9261a2e1.yaml b/nuclei-templates/cve-less/themes/5star-a3ed9e76b0fc321cc4d7c1cb9261a2e1.yaml new file mode 100644 index 0000000000..fee81be775 --- /dev/null +++ b/nuclei-templates/cve-less/themes/5star-a3ed9e76b0fc321cc4d7c1cb9261a2e1.yaml @@ -0,0 +1,58 @@ +id: 5star-a3ed9e76b0fc321cc4d7c1cb9261a2e1 + +info: + name: > + 5 Star (Unspecified Version) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2cea890-b131-47cd-9050-a484fb1895f6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/5star/" + google-query: inurl:"/wp-content/themes/5star/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,5star,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/5star/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "5star" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/aapna-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/aapna-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..8497f3b3ff --- /dev/null +++ b/nuclei-templates/cve-less/themes/aapna-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: aapna-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/aapna/" + google-query: inurl:"/wp-content/themes/aapna/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,aapna,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/aapna/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aapna" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/abundance-9c1002d331f3bfe836a243fd7707a431.yaml b/nuclei-templates/cve-less/themes/abundance-9c1002d331f3bfe836a243fd7707a431.yaml new file mode 100644 index 0000000000..4120123920 --- /dev/null +++ b/nuclei-templates/cve-less/themes/abundance-9c1002d331f3bfe836a243fd7707a431.yaml @@ -0,0 +1,58 @@ +id: abundance-9c1002d331f3bfe836a243fd7707a431 + +info: + name: > + Abundance (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5294f427-738c-444e-acf6-abc452629f64?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/abundance/" + google-query: inurl:"/wp-content/themes/abundance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,abundance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/abundance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "abundance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-basic-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/accesspress-basic-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..8cee4c1072 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-basic-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: accesspress-basic-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-basic/" + google-query: inurl:"/wp-content/themes/accesspress-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-basic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-basic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-basic-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/accesspress-basic-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..be88093cfb --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-basic-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: accesspress-basic-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-basic/" + google-query: inurl:"/wp-content/themes/accesspress-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-basic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-basic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-basic-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/accesspress-basic-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..e12c0e965e --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-basic-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: accesspress-basic-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-basic/" + google-query: inurl:"/wp-content/themes/accesspress-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-basic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-basic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/accesspress-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..6fc789fa75 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: accesspress-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-lite/" + google-query: inurl:"/wp-content/themes/accesspress-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.92') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/accesspress-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..6519f91e13 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: accesspress-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-lite/" + google-query: inurl:"/wp-content/themes/accesspress-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.92') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/accesspress-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..5fe30f510d --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: accesspress-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-lite/" + google-query: inurl:"/wp-content/themes/accesspress-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.92') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-mag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/accesspress-mag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..bb73e8e3dd --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-mag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: accesspress-mag-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-mag/" + google-query: inurl:"/wp-content/themes/accesspress-mag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-mag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-mag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-mag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-mag-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/accesspress-mag-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..236976ff11 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-mag-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: accesspress-mag-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-mag/" + google-query: inurl:"/wp-content/themes/accesspress-mag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-mag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-mag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-mag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-mag-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/accesspress-mag-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..d806521e41 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-mag-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: accesspress-mag-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-mag/" + google-query: inurl:"/wp-content/themes/accesspress-mag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-mag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-mag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-mag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-parallax-new-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/accesspress-parallax-new-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..0e9e370b8f --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-parallax-new-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: accesspress-parallax-new-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-parallax-new/" + google-query: inurl:"/wp-content/themes/accesspress-parallax-new/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-parallax-new,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-parallax-new/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-parallax-new" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-parallax-new-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/accesspress-parallax-new-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..5fa96eb7a5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-parallax-new-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: accesspress-parallax-new-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-parallax-new/" + google-query: inurl:"/wp-content/themes/accesspress-parallax-new/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-parallax-new,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-parallax-new/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-parallax-new" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-parallax-new-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/accesspress-parallax-new-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..66f344024f --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-parallax-new-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: accesspress-parallax-new-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-parallax-new/" + google-query: inurl:"/wp-content/themes/accesspress-parallax-new/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-parallax-new,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-parallax-new/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-parallax-new" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-root-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/accesspress-root-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..9377602cfa --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-root-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: accesspress-root-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-root/" + google-query: inurl:"/wp-content/themes/accesspress-root/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-root,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-root/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-root" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-root-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/accesspress-root-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..daf9d9e80c --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-root-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: accesspress-root-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-root/" + google-query: inurl:"/wp-content/themes/accesspress-root/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-root,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-root/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-root" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-root-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/accesspress-root-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..be941d8cb9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-root-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: accesspress-root-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-root/" + google-query: inurl:"/wp-content/themes/accesspress-root/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-root,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-root/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-root" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-staple-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/accesspress-staple-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..0feccdc6ae --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-staple-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: accesspress-staple-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-staple/" + google-query: inurl:"/wp-content/themes/accesspress-staple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-staple,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-staple/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-staple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-staple-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/accesspress-staple-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..12e790e971 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-staple-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: accesspress-staple-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-staple/" + google-query: inurl:"/wp-content/themes/accesspress-staple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-staple,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-staple/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-staple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-store-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/accesspress-store-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..c74996d822 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-store-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: accesspress-store-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-store/" + google-query: inurl:"/wp-content/themes/accesspress-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-store-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/accesspress-store-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..d9e11b94da --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-store-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: accesspress-store-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-store/" + google-query: inurl:"/wp-content/themes/accesspress-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accesspress-store-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/accesspress-store-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..f9395c9d6e --- /dev/null +++ b/nuclei-templates/cve-less/themes/accesspress-store-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: accesspress-store-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accesspress-store/" + google-query: inurl:"/wp-content/themes/accesspress-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accesspress-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accesspress-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accesspress-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accio-24f878705cb6e0f5cec5d442fe0259a1.yaml b/nuclei-templates/cve-less/themes/accio-24f878705cb6e0f5cec5d442fe0259a1.yaml new file mode 100644 index 0000000000..92566a8d5d --- /dev/null +++ b/nuclei-templates/cve-less/themes/accio-24f878705cb6e0f5cec5d442fe0259a1.yaml @@ -0,0 +1,58 @@ +id: accio-24f878705cb6e0f5cec5d442fe0259a1 + +info: + name: > + Accio | Responsive Onepage Parallax Agency WordPress Theme <= 1.1.0 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a56874fe-cb2b-4024-a8db-9cf6c4d0012a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accio/" + google-query: inurl:"/wp-content/themes/accio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accio,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accio-one-page-32d2ee023e5c98d46821542b46ed3472.yaml b/nuclei-templates/cve-less/themes/accio-one-page-32d2ee023e5c98d46821542b46ed3472.yaml new file mode 100644 index 0000000000..66c0df3833 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accio-one-page-32d2ee023e5c98d46821542b46ed3472.yaml @@ -0,0 +1,58 @@ +id: accio-one-page-32d2ee023e5c98d46821542b46ed3472 + +info: + name: > + Accio | Responsive Onepage Parallax Site Template < 1.1.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0099f55-651c-4997-bf6d-97125c4260e1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accio-one-page/" + google-query: inurl:"/wp-content/themes/accio-one-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accio-one-page,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accio-one-page/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accio-one-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/accountra-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml b/nuclei-templates/cve-less/themes/accountra-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml new file mode 100644 index 0000000000..a7a52c8909 --- /dev/null +++ b/nuclei-templates/cve-less/themes/accountra-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml @@ -0,0 +1,58 @@ +id: accountra-0eadfcaa632fa9ba5901b3c6b61b28a7 + +info: + name: > + Multiple Themes by jegstudio <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edb34ad0-352e-462e-a7f1-64a804a760ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/accountra/" + google-query: inurl:"/wp-content/themes/accountra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,accountra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/accountra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "accountra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/activello-18df9000e9dcd67d242e383e74bea4f4.yaml b/nuclei-templates/cve-less/themes/activello-18df9000e9dcd67d242e383e74bea4f4.yaml new file mode 100644 index 0000000000..9ea6f36b76 --- /dev/null +++ b/nuclei-templates/cve-less/themes/activello-18df9000e9dcd67d242e383e74bea4f4.yaml @@ -0,0 +1,58 @@ +id: activello-18df9000e9dcd67d242e383e74bea4f4 + +info: + name: > + Activello <= 1.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c1add9-2141-4221-889b-f9b0efebd6c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/activello/" + google-query: inurl:"/wp-content/themes/activello/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,activello,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/activello/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activello" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/activello-72ccbc519dc7d87cb6145ad667cfc553.yaml b/nuclei-templates/cve-less/themes/activello-72ccbc519dc7d87cb6145ad667cfc553.yaml new file mode 100644 index 0000000000..7b42b4aed3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/activello-72ccbc519dc7d87cb6145ad667cfc553.yaml @@ -0,0 +1,58 @@ +id: activello-72ccbc519dc7d87cb6145ad667cfc553 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Unauthenticated Plugin Activation/Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e4e989-8e55-4ea7-8f42-9f67cfab1168?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/activello/" + google-query: inurl:"/wp-content/themes/activello/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,activello,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/activello/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activello" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/activello-860fdeef59df60170db304dfbf6f0b2b.yaml b/nuclei-templates/cve-less/themes/activello-860fdeef59df60170db304dfbf6f0b2b.yaml new file mode 100644 index 0000000000..fa84262e3e --- /dev/null +++ b/nuclei-templates/cve-less/themes/activello-860fdeef59df60170db304dfbf6f0b2b.yaml @@ -0,0 +1,58 @@ +id: activello-860fdeef59df60170db304dfbf6f0b2b + +info: + name: > + Activello <= 1.4.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e312db9f-8f02-4c7e-9d49-553a154c95a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/activello/" + google-query: inurl:"/wp-content/themes/activello/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,activello,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/activello/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activello" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/activello-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/activello-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..0255846e16 --- /dev/null +++ b/nuclei-templates/cve-less/themes/activello-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: activello-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/activello/" + google-query: inurl:"/wp-content/themes/activello/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,activello,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/activello/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "activello" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/adifier-b4f8ef061eeaa39684a868f52e5b3f72.yaml b/nuclei-templates/cve-less/themes/adifier-b4f8ef061eeaa39684a868f52e5b3f72.yaml new file mode 100644 index 0000000000..f129bd659e --- /dev/null +++ b/nuclei-templates/cve-less/themes/adifier-b4f8ef061eeaa39684a868f52e5b3f72.yaml @@ -0,0 +1,58 @@ +id: adifier-b4f8ef061eeaa39684a868f52e5b3f72 + +info: + name: > + Adifier (Premium Theme) < 3.1.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2250d512-dfe0-47d3-a61f-4e501d105f30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/adifier/" + google-query: inurl:"/wp-content/themes/adifier/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,adifier,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/adifier/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adifier" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/adifier-system-9ac9653b7778a104c1c015f03f55c35c.yaml b/nuclei-templates/cve-less/themes/adifier-system-9ac9653b7778a104c1c015f03f55c35c.yaml new file mode 100644 index 0000000000..a3dafc70a1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/adifier-system-9ac9653b7778a104c1c015f03f55c35c.yaml @@ -0,0 +1,58 @@ +id: adifier-system-9ac9653b7778a104c1c015f03f55c35c + +info: + name: > + Adifier System < 3.1.4 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e64d865-5acc-419b-8c61-e8fd8207fa94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/adifier-system/" + google-query: inurl:"/wp-content/themes/adifier-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,adifier-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/adifier-system/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adifier-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/adifier-system-fc94e531c85615591e0410bbc642dfdf.yaml b/nuclei-templates/cve-less/themes/adifier-system-fc94e531c85615591e0410bbc642dfdf.yaml new file mode 100644 index 0000000000..7c5e0c7da4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/adifier-system-fc94e531c85615591e0410bbc642dfdf.yaml @@ -0,0 +1,58 @@ +id: adifier-system-fc94e531c85615591e0410bbc642dfdf + +info: + name: > + Adifier System < 3.1.4 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8574ff9-847c-4337-8c0e-2a717b51f66c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/adifier-system/" + google-query: inurl:"/wp-content/themes/adifier-system/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,adifier-system,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/adifier-system/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adifier-system" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/adventure-journal-e75bbb3acde201345699c9ea2b1c0b80.yaml b/nuclei-templates/cve-less/themes/adventure-journal-e75bbb3acde201345699c9ea2b1c0b80.yaml new file mode 100644 index 0000000000..f224a9ec00 --- /dev/null +++ b/nuclei-templates/cve-less/themes/adventure-journal-e75bbb3acde201345699c9ea2b1c0b80.yaml @@ -0,0 +1,58 @@ +id: adventure-journal-e75bbb3acde201345699c9ea2b1c0b80 + +info: + name: > + Adventure Journal <= 1.7.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/965cd061-d34e-4749-85a6-efa2456b1446?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/adventure-journal/" + google-query: inurl:"/wp-content/themes/adventure-journal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,adventure-journal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/adventure-journal/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "adventure-journal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/affluent-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/affluent-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..d2e93d7a94 --- /dev/null +++ b/nuclei-templates/cve-less/themes/affluent-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: affluent-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/affluent/" + google-query: inurl:"/wp-content/themes/affluent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,affluent,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/affluent/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "affluent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/agritourismo-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml b/nuclei-templates/cve-less/themes/agritourismo-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml new file mode 100644 index 0000000000..9c01177025 --- /dev/null +++ b/nuclei-templates/cve-less/themes/agritourismo-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml @@ -0,0 +1,58 @@ +id: agritourismo-theme-d488c88c43dea5d67f8bd9aa864ebfd0 + +info: + name: > + Various Orange themes (Various Unspecified Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6897a8fe-c32e-430a-847c-23d1add2355d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/agritourismo-theme/" + google-query: inurl:"/wp-content/themes/agritourismo-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,agritourismo-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/agritourismo-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "agritourismo-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/aidreform-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/aidreform-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..267181709c --- /dev/null +++ b/nuclei-templates/cve-less/themes/aidreform-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: aidreform-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/aidreform/" + google-query: inurl:"/wp-content/themes/aidreform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,aidreform,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/aidreform/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aidreform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/akal-fe56f2af6a571fb33fc7c4e1b9783967.yaml b/nuclei-templates/cve-less/themes/akal-fe56f2af6a571fb33fc7c4e1b9783967.yaml new file mode 100644 index 0000000000..b0e19d09e4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/akal-fe56f2af6a571fb33fc7c4e1b9783967.yaml @@ -0,0 +1,58 @@ +id: akal-fe56f2af6a571fb33fc7c4e1b9783967 + +info: + name: > + Akal - Multipurpose WordPress Theme (All Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8aec2a8b-c0d7-440f-a389-1d98cef77c2e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/akal/" + google-query: inurl:"/wp-content/themes/akal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,akal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/akal/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "akal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/akita-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/themes/akita-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..eac73ab07a --- /dev/null +++ b/nuclei-templates/cve-less/themes/akita-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: akita-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/akita/" + google-query: inurl:"/wp-content/themes/akita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,akita,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/akita/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "akita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/allegiant-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/allegiant-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..79cc289ad8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/allegiant-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: allegiant-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/allegiant/" + google-query: inurl:"/wp-content/themes/allegiant/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,allegiant,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/allegiant/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "allegiant" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/alltuts-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/alltuts-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..8d23be0f0c --- /dev/null +++ b/nuclei-templates/cve-less/themes/alltuts-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: alltuts-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/alltuts/" + google-query: inurl:"/wp-content/themes/alltuts/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,alltuts,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/alltuts/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alltuts" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/allure-real-estate-theme-for-placester-972c6f275cedbc5b8ff06bc4a592ad76.yaml b/nuclei-templates/cve-less/themes/allure-real-estate-theme-for-placester-972c6f275cedbc5b8ff06bc4a592ad76.yaml new file mode 100644 index 0000000000..ec573af354 --- /dev/null +++ b/nuclei-templates/cve-less/themes/allure-real-estate-theme-for-placester-972c6f275cedbc5b8ff06bc4a592ad76.yaml @@ -0,0 +1,58 @@ +id: allure-real-estate-theme-for-placester-972c6f275cedbc5b8ff06bc4a592ad76 + +info: + name: > + Allure Real Estate Theme for Placester <= 0.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bce11fa-428d-4f44-9ce4-e12e79c43ff1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/allure-real-estate-theme-for-placester/" + google-query: inurl:"/wp-content/themes/allure-real-estate-theme-for-placester/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,allure-real-estate-theme-for-placester,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/allure-real-estate-theme-for-placester/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "allure-real-estate-theme-for-placester" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/allure-real-estate-theme-for-real-estate-aa5567043b1aeefa3498402c7cd8a275.yaml b/nuclei-templates/cve-less/themes/allure-real-estate-theme-for-real-estate-aa5567043b1aeefa3498402c7cd8a275.yaml new file mode 100644 index 0000000000..d4cd29d787 --- /dev/null +++ b/nuclei-templates/cve-less/themes/allure-real-estate-theme-for-real-estate-aa5567043b1aeefa3498402c7cd8a275.yaml @@ -0,0 +1,58 @@ +id: allure-real-estate-theme-for-real-estate-aa5567043b1aeefa3498402c7cd8a275 + +info: + name: > + Allure Real Estate Theme <= 0.1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/88290419-2086-4b43-b2b9-5d8128b208e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/allure-real-estate-theme-for-real-estate/" + google-query: inurl:"/wp-content/themes/allure-real-estate-theme-for-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,allure-real-estate-theme-for-real-estate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/allure-real-estate-theme-for-real-estate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "allure-real-estate-theme-for-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/almera-2df8a8571d64dba2e22b8dd47eadb176.yaml b/nuclei-templates/cve-less/themes/almera-2df8a8571d64dba2e22b8dd47eadb176.yaml new file mode 100644 index 0000000000..41a2ba1f02 --- /dev/null +++ b/nuclei-templates/cve-less/themes/almera-2df8a8571d64dba2e22b8dd47eadb176.yaml @@ -0,0 +1,58 @@ +id: almera-2df8a8571d64dba2e22b8dd47eadb176 + +info: + name: > + Almera Responsive Portfolio Site Template < 1.1.8 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1695816-0f54-4095-8884-bc9856b4dac1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/almera/" + google-query: inurl:"/wp-content/themes/almera/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,almera,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/almera/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "almera" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/almera-b3f6da3b653ea452b8c40472572fa927.yaml b/nuclei-templates/cve-less/themes/almera-b3f6da3b653ea452b8c40472572fa927.yaml new file mode 100644 index 0000000000..d01dc923c2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/almera-b3f6da3b653ea452b8c40472572fa927.yaml @@ -0,0 +1,58 @@ +id: almera-b3f6da3b653ea452b8c40472572fa927 + +info: + name: > + Almera Responsive Portfolio Site Template < 2015-05-15 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b606c7eb-39ce-40a0-b642-6f240f7c8c42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/almera/" + google-query: inurl:"/wp-content/themes/almera/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,almera,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/almera/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "almera" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/althea-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/althea-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..d44821b9ed --- /dev/null +++ b/nuclei-templates/cve-less/themes/althea-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: althea-wp-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/althea-wp/" + google-query: inurl:"/wp-content/themes/althea-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,althea-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/althea-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "althea-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/alyeska-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/themes/alyeska-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..e82131ac44 --- /dev/null +++ b/nuclei-templates/cve-less/themes/alyeska-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: alyeska-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/alyeska/" + google-query: inurl:"/wp-content/themes/alyeska/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,alyeska,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/alyeska/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "alyeska" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ambience-0e4a8af0dcec83139d2c5869dc07116c.yaml b/nuclei-templates/cve-less/themes/ambience-0e4a8af0dcec83139d2c5869dc07116c.yaml new file mode 100644 index 0000000000..1c1faabee8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ambience-0e4a8af0dcec83139d2c5869dc07116c.yaml @@ -0,0 +1,58 @@ +id: ambience-0e4a8af0dcec83139d2c5869dc07116c + +info: + name: > + Ambience (Unspecified Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/971d06e2-29dc-424d-b20e-8ec34990014d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ambience/" + google-query: inurl:"/wp-content/themes/ambience/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ambience,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ambience/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ambience" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/amela-161c9677e95eb847dc432eddc65db142.yaml b/nuclei-templates/cve-less/themes/amela-161c9677e95eb847dc432eddc65db142.yaml new file mode 100644 index 0000000000..d2d124980e --- /dev/null +++ b/nuclei-templates/cve-less/themes/amela-161c9677e95eb847dc432eddc65db142.yaml @@ -0,0 +1,58 @@ +id: amela-161c9677e95eb847dc432eddc65db142 + +info: + name: > + Multiple DeoThemes Themes <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8b0f14-f31a-45cd-bb98-0b717059aa80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/amela/" + google-query: inurl:"/wp-content/themes/amela/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,amela,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/amela/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amela" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/amela-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/amela-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e1397b9345 --- /dev/null +++ b/nuclei-templates/cve-less/themes/amela-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: amela-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/amela/" + google-query: inurl:"/wp-content/themes/amela/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,amela,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/amela/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amela" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/amoveo-fc7e66fb4c7bc293f2767aac95e6ae0a.yaml b/nuclei-templates/cve-less/themes/amoveo-fc7e66fb4c7bc293f2767aac95e6ae0a.yaml new file mode 100644 index 0000000000..67df85c4d3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/amoveo-fc7e66fb4c7bc293f2767aac95e6ae0a.yaml @@ -0,0 +1,58 @@ +id: amoveo-fc7e66fb4c7bc293f2767aac95e6ae0a + +info: + name: > + Amoveo Multipurpose Wordpress Theme <= 2.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5706025-962f-47e2-8d1d-16bafd937c92?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/amoveo/" + google-query: inurl:"/wp-content/themes/amoveo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,amoveo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/amoveo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amoveo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/amplus-da3e281a5f70bba201afb2a0076933cd.yaml b/nuclei-templates/cve-less/themes/amplus-da3e281a5f70bba201afb2a0076933cd.yaml new file mode 100644 index 0000000000..3dc313981e --- /dev/null +++ b/nuclei-templates/cve-less/themes/amplus-da3e281a5f70bba201afb2a0076933cd.yaml @@ -0,0 +1,58 @@ +id: amplus-da3e281a5f70bba201afb2a0076933cd + +info: + name: > + Amplus (Unspecified Version) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c7bb055d-dd43-4c40-be30-325ecb6d7731?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/amplus/" + google-query: inurl:"/wp-content/themes/amplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,amplus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/amplus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "amplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/anand-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/anand-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..c29f1d3e0e --- /dev/null +++ b/nuclei-templates/cve-less/themes/anand-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: anand-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/anand/" + google-query: inurl:"/wp-content/themes/anand/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,anand,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/anand/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anand" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/andyblue-2a9919a2db8ebb02104bc342de5cafa4.yaml b/nuclei-templates/cve-less/themes/andyblue-2a9919a2db8ebb02104bc342de5cafa4.yaml new file mode 100644 index 0000000000..e43753bb2f --- /dev/null +++ b/nuclei-templates/cve-less/themes/andyblue-2a9919a2db8ebb02104bc342de5cafa4.yaml @@ -0,0 +1,58 @@ +id: andyblue-2a9919a2db8ebb02104bc342de5cafa4 + +info: + name: > + AndyBlue Theme < 1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a341bcc4-fe5b-452d-aa93-4e3dd8d42403?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/andyblue/" + google-query: inurl:"/wp-content/themes/andyblue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,andyblue,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/andyblue/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "andyblue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/anfaust-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/anfaust-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..95e76d8b4f --- /dev/null +++ b/nuclei-templates/cve-less/themes/anfaust-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: anfaust-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/anfaust/" + google-query: inurl:"/wp-content/themes/anfaust/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,anfaust,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/anfaust/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anfaust" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/anthology-eec950257920134a1e693aabe46a51ab.yaml b/nuclei-templates/cve-less/themes/anthology-eec950257920134a1e693aabe46a51ab.yaml new file mode 100644 index 0000000000..d587177697 --- /dev/null +++ b/nuclei-templates/cve-less/themes/anthology-eec950257920134a1e693aabe46a51ab.yaml @@ -0,0 +1,58 @@ +id: anthology-eec950257920134a1e693aabe46a51ab + +info: + name: > + Anthology < 1.4.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/373b51f0-92ad-4c9e-87b9-96b4e57cc05d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/anthology/" + google-query: inurl:"/wp-content/themes/anthology/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,anthology,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/anthology/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "anthology" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/antioch-694a19ed51aeba4709fe5b1bfc70368e.yaml b/nuclei-templates/cve-less/themes/antioch-694a19ed51aeba4709fe5b1bfc70368e.yaml new file mode 100644 index 0000000000..c881d1f1da --- /dev/null +++ b/nuclei-templates/cve-less/themes/antioch-694a19ed51aeba4709fe5b1bfc70368e.yaml @@ -0,0 +1,58 @@ +id: antioch-694a19ed51aeba4709fe5b1bfc70368e + +info: + name: > + Antioch <= 1.3 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b826595-c977-4550-aa52-93bcd4a365fe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/antioch/" + google-query: inurl:"/wp-content/themes/antioch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,antioch,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/antioch/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antioch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/antisnews-1eca6946030b47a7e15dbf74278035b1.yaml b/nuclei-templates/cve-less/themes/antisnews-1eca6946030b47a7e15dbf74278035b1.yaml new file mode 100644 index 0000000000..58ce61c018 --- /dev/null +++ b/nuclei-templates/cve-less/themes/antisnews-1eca6946030b47a7e15dbf74278035b1.yaml @@ -0,0 +1,58 @@ +id: antisnews-1eca6946030b47a7e15dbf74278035b1 + +info: + name: > + Antisnews <= 1.09 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa325b30-3799-41b4-bdb8-90f42a659511?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/antisnews/" + google-query: inurl:"/wp-content/themes/antisnews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,antisnews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/antisnews/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antisnews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.09') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/antreas-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/antreas-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..8ecdd83be7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/antreas-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: antreas-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/antreas/" + google-query: inurl:"/wp-content/themes/antreas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,antreas,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/antreas/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "antreas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/appius-3df99e7d9df14f2aba3c8375eecce88f.yaml b/nuclei-templates/cve-less/themes/appius-3df99e7d9df14f2aba3c8375eecce88f.yaml new file mode 100644 index 0000000000..bdd7e13ea6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/appius-3df99e7d9df14f2aba3c8375eecce88f.yaml @@ -0,0 +1,58 @@ +id: appius-3df99e7d9df14f2aba3c8375eecce88f + +info: + name: > + Appius Theme <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efbea599-3d04-42d2-9b91-6b68210d8b01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/appius/" + google-query: inurl:"/wp-content/themes/appius/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,appius,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/appius/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appius" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/appius-5f0f9a2a6cce4ecc1bb938245d0aa8e7.yaml b/nuclei-templates/cve-less/themes/appius-5f0f9a2a6cce4ecc1bb938245d0aa8e7.yaml new file mode 100644 index 0000000000..a1c4966295 --- /dev/null +++ b/nuclei-templates/cve-less/themes/appius-5f0f9a2a6cce4ecc1bb938245d0aa8e7.yaml @@ -0,0 +1,58 @@ +id: appius-5f0f9a2a6cce4ecc1bb938245d0aa8e7 + +info: + name: > + Appius Theme <= 1.0 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f06f0492-c03d-44d7-9441-4d79f89e5c1f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/appius/" + google-query: inurl:"/wp-content/themes/appius/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,appius,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/appius/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appius" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/appointment-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/appointment-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..4b60e917a0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/appointment-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: appointment-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/appointment/" + google-query: inurl:"/wp-content/themes/appointment/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,appointment,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/appointment/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appointment" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/appzend-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/appzend-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..d4945fabfa --- /dev/null +++ b/nuclei-templates/cve-less/themes/appzend-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: appzend-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/appzend/" + google-query: inurl:"/wp-content/themes/appzend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,appzend,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/appzend/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appzend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/appzend-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/appzend-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..4971da387a --- /dev/null +++ b/nuclei-templates/cve-less/themes/appzend-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: appzend-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/appzend/" + google-query: inurl:"/wp-content/themes/appzend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,appzend,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/appzend/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "appzend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/aquarella-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/aquarella-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..dc769fbd0e --- /dev/null +++ b/nuclei-templates/cve-less/themes/aquarella-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: aquarella-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/aquarella-lite/" + google-query: inurl:"/wp-content/themes/aquarella-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,aquarella-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/aquarella-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "aquarella-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arcadian-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/themes/arcadian-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..90ef0e8e40 --- /dev/null +++ b/nuclei-templates/cve-less/themes/arcadian-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: arcadian-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arcadian/" + google-query: inurl:"/wp-content/themes/arcadian/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arcadian,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arcadian/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arcadian" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/area53-5e5beafa47f3eac0bbc5ba2133fe2f0f.yaml b/nuclei-templates/cve-less/themes/area53-5e5beafa47f3eac0bbc5ba2133fe2f0f.yaml new file mode 100644 index 0000000000..f6f743d8d4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/area53-5e5beafa47f3eac0bbc5ba2133fe2f0f.yaml @@ -0,0 +1,58 @@ +id: area53-5e5beafa47f3eac0bbc5ba2133fe2f0f + +info: + name: > + AREA53 <= 1.0.5 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8652b40-480c-4d53-b1c8-e1dcfbd8a4a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/area53/" + google-query: inurl:"/wp-content/themes/area53/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,area53,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/area53/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "area53" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arendelle-161c9677e95eb847dc432eddc65db142.yaml b/nuclei-templates/cve-less/themes/arendelle-161c9677e95eb847dc432eddc65db142.yaml new file mode 100644 index 0000000000..e69130881b --- /dev/null +++ b/nuclei-templates/cve-less/themes/arendelle-161c9677e95eb847dc432eddc65db142.yaml @@ -0,0 +1,58 @@ +id: arendelle-161c9677e95eb847dc432eddc65db142 + +info: + name: > + Multiple DeoThemes Themes <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8b0f14-f31a-45cd-bb98-0b717059aa80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arendelle/" + google-query: inurl:"/wp-content/themes/arendelle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arendelle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arendelle/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arendelle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arendelle-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/arendelle-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..f9fcd083e1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/arendelle-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: arendelle-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arendelle/" + google-query: inurl:"/wp-content/themes/arendelle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arendelle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arendelle/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arendelle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arendelle-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/arendelle-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..e8be4b23e2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/arendelle-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: arendelle-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arendelle/" + google-query: inurl:"/wp-content/themes/arendelle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arendelle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arendelle/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arendelle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arilewp-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/arilewp-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..f8b79d504a --- /dev/null +++ b/nuclei-templates/cve-less/themes/arilewp-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: arilewp-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arilewp/" + google-query: inurl:"/wp-content/themes/arilewp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arilewp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arilewp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arilewp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arrival-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/arrival-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..4123adf7ff --- /dev/null +++ b/nuclei-templates/cve-less/themes/arrival-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: arrival-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arrival/" + google-query: inurl:"/wp-content/themes/arrival/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arrival,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arrival/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arrival" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arrival-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/arrival-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..947e585edc --- /dev/null +++ b/nuclei-templates/cve-less/themes/arrival-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: arrival-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arrival/" + google-query: inurl:"/wp-content/themes/arrival/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arrival,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arrival/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arrival" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arrival-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/arrival-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..8d6ab62ef3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/arrival-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: arrival-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arrival/" + google-query: inurl:"/wp-content/themes/arrival/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arrival,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arrival/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arrival" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/artificial-intelligence-e655964abfea5d2b4e77a9418e2e0409.yaml b/nuclei-templates/cve-less/themes/artificial-intelligence-e655964abfea5d2b4e77a9418e2e0409.yaml new file mode 100644 index 0000000000..d907c1352e --- /dev/null +++ b/nuclei-templates/cve-less/themes/artificial-intelligence-e655964abfea5d2b4e77a9418e2e0409.yaml @@ -0,0 +1,58 @@ +id: artificial-intelligence-e655964abfea5d2b4e77a9418e2e0409 + +info: + name: > + Artificial Intelligence < 1.2.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37cc54a9-a780-42b5-b64d-c47470f17db7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/artificial-intelligence/" + google-query: inurl:"/wp-content/themes/artificial-intelligence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,artificial-intelligence,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/artificial-intelligence/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "artificial-intelligence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arya-multipurpose-60f02b355aaa909eb31e9332ca9f9968.yaml b/nuclei-templates/cve-less/themes/arya-multipurpose-60f02b355aaa909eb31e9332ca9f9968.yaml new file mode 100644 index 0000000000..2d72bca020 --- /dev/null +++ b/nuclei-templates/cve-less/themes/arya-multipurpose-60f02b355aaa909eb31e9332ca9f9968.yaml @@ -0,0 +1,58 @@ +id: arya-multipurpose-60f02b355aaa909eb31e9332ca9f9968 + +info: + name: > + Arya Multipurpose <= 1.0.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d5c4bf6-36f7-4e6d-a012-95594e3d93f8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arya-multipurpose/" + google-query: inurl:"/wp-content/themes/arya-multipurpose/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arya-multipurpose,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arya-multipurpose/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arya-multipurpose" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/arya-multipurpose-pro-6d10f2e1e54180210b870dbff144a87b.yaml b/nuclei-templates/cve-less/themes/arya-multipurpose-pro-6d10f2e1e54180210b870dbff144a87b.yaml new file mode 100644 index 0000000000..e72842b30f --- /dev/null +++ b/nuclei-templates/cve-less/themes/arya-multipurpose-pro-6d10f2e1e54180210b870dbff144a87b.yaml @@ -0,0 +1,58 @@ +id: arya-multipurpose-pro-6d10f2e1e54180210b870dbff144a87b + +info: + name: > + Arya Multipurpose Pro <= 1.0.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22cfbaa1-5412-4944-899c-7ae41d017384?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/arya-multipurpose-pro/" + google-query: inurl:"/wp-content/themes/arya-multipurpose-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,arya-multipurpose-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/arya-multipurpose-pro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "arya-multipurpose-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ask-me-1c2da71dac8a1ffb07f1c87e262b5e0e.yaml b/nuclei-templates/cve-less/themes/ask-me-1c2da71dac8a1ffb07f1c87e262b5e0e.yaml new file mode 100644 index 0000000000..f352cd6c74 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ask-me-1c2da71dac8a1ffb07f1c87e262b5e0e.yaml @@ -0,0 +1,58 @@ +id: ask-me-1c2da71dac8a1ffb07f1c87e262b5e0e + +info: + name: > + Ask Me <= 6.8.3 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5eaac50c-c585-4587-91b7-9d0613345ef2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ask-me/" + google-query: inurl:"/wp-content/themes/ask-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ask-me,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ask-me/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ask-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ask-me-3b38633cbeac82c001940cb4aed44709.yaml b/nuclei-templates/cve-less/themes/ask-me-3b38633cbeac82c001940cb4aed44709.yaml new file mode 100644 index 0000000000..86e081d9f6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ask-me-3b38633cbeac82c001940cb4aed44709.yaml @@ -0,0 +1,58 @@ +id: ask-me-3b38633cbeac82c001940cb4aed44709 + +info: + name: > + Ask Me < 6.8.7 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c18938b-6c0d-461e-b83e-26bc8e7bc1b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ask-me/" + google-query: inurl:"/wp-content/themes/ask-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ask-me,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ask-me/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ask-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ask-me-b27f19c1380e428266833869dc85c54d.yaml b/nuclei-templates/cve-less/themes/ask-me-b27f19c1380e428266833869dc85c54d.yaml new file mode 100644 index 0000000000..21bee2d13c --- /dev/null +++ b/nuclei-templates/cve-less/themes/ask-me-b27f19c1380e428266833869dc85c54d.yaml @@ -0,0 +1,58 @@ +id: ask-me-b27f19c1380e428266833869dc85c54d + +info: + name: > + Ask Me <= 6.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfafdc46-e747-42b4-963b-7b966b1f67a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ask-me/" + google-query: inurl:"/wp-content/themes/ask-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ask-me,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ask-me/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ask-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ask-me-e8eee7b13f0d955b5b5dd5ba7908051b.yaml b/nuclei-templates/cve-less/themes/ask-me-e8eee7b13f0d955b5b5dd5ba7908051b.yaml new file mode 100644 index 0000000000..4166931351 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ask-me-e8eee7b13f0d955b5b5dd5ba7908051b.yaml @@ -0,0 +1,58 @@ +id: ask-me-e8eee7b13f0d955b5b5dd5ba7908051b + +info: + name: > + Ask Me <= 6.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b191a337-ec45-4357-9b37-6ca0af9cb2f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ask-me/" + google-query: inurl:"/wp-content/themes/ask-me/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ask-me,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ask-me/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ask-me" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/astore-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/astore-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..4e121b5286 --- /dev/null +++ b/nuclei-templates/cve-less/themes/astore-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: astore-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/astore/" + google-query: inurl:"/wp-content/themes/astore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,astore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/astore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/astra-069688784bb13290b6aea0da4a233825.yaml b/nuclei-templates/cve-less/themes/astra-069688784bb13290b6aea0da4a233825.yaml new file mode 100644 index 0000000000..2f6aa33fa0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/astra-069688784bb13290b6aea0da4a233825.yaml @@ -0,0 +1,58 @@ +id: astra-069688784bb13290b6aea0da4a233825 + +info: + name: > + Astra <= 4.6.4 - Authenticated (Editor+) Stored Cross-Site Scripting via Theme Header/Footer + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a97b3cf1-e7b7-41c6-8b7a-e06bda77f7f7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/astra/" + google-query: inurl:"/wp-content/themes/astra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,astra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/astra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/astra-4d6ff8c8afd1310bcbc6da555c1c2ca4.yaml b/nuclei-templates/cve-less/themes/astra-4d6ff8c8afd1310bcbc6da555c1c2ca4.yaml new file mode 100644 index 0000000000..871afaac51 --- /dev/null +++ b/nuclei-templates/cve-less/themes/astra-4d6ff8c8afd1310bcbc6da555c1c2ca4.yaml @@ -0,0 +1,58 @@ +id: astra-4d6ff8c8afd1310bcbc6da555c1c2ca4 + +info: + name: > + Astra <= 4.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Display Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed914e67-4cf7-49b1-96be-ed8c604e6dce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/astra/" + google-query: inurl:"/wp-content/themes/astra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,astra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/astra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "astra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/atahualpa-b8aaeac54a85cc121f7aef5c9dc1b9be.yaml b/nuclei-templates/cve-less/themes/atahualpa-b8aaeac54a85cc121f7aef5c9dc1b9be.yaml new file mode 100644 index 0000000000..791a7374f0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/atahualpa-b8aaeac54a85cc121f7aef5c9dc1b9be.yaml @@ -0,0 +1,58 @@ +id: atahualpa-b8aaeac54a85cc121f7aef5c9dc1b9be + +info: + name: > + Atahualpa <= 3.7.24 - Cross-Site Scripting via Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb2fffb1-cc8c-46a4-b3ea-2b1aac684fbd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/atahualpa/" + google-query: inurl:"/wp-content/themes/atahualpa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,atahualpa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/atahualpa/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "atahualpa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7.24') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/atahualpa-e8b1937b8d22149355604761f9e2e597.yaml b/nuclei-templates/cve-less/themes/atahualpa-e8b1937b8d22149355604761f9e2e597.yaml new file mode 100644 index 0000000000..1c72833a26 --- /dev/null +++ b/nuclei-templates/cve-less/themes/atahualpa-e8b1937b8d22149355604761f9e2e597.yaml @@ -0,0 +1,58 @@ +id: atahualpa-e8b1937b8d22149355604761f9e2e597 + +info: + name: > + Atahualpa < 3.6.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56259eda-db70-4a26-a08e-e4d998dbe50d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/atahualpa/" + google-query: inurl:"/wp-content/themes/atahualpa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,atahualpa,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/atahualpa/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "atahualpa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/atlast-business-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/atlast-business-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..e803b15201 --- /dev/null +++ b/nuclei-templates/cve-less/themes/atlast-business-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: atlast-business-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/atlast-business/" + google-query: inurl:"/wp-content/themes/atlast-business/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,atlast-business,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/atlast-business/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "atlast-business" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/attorney-7b1133cf795e5004c4eb6459afb4af96.yaml b/nuclei-templates/cve-less/themes/attorney-7b1133cf795e5004c4eb6459afb4af96.yaml new file mode 100644 index 0000000000..1c22398482 --- /dev/null +++ b/nuclei-templates/cve-less/themes/attorney-7b1133cf795e5004c4eb6459afb4af96.yaml @@ -0,0 +1,58 @@ +id: attorney-7b1133cf795e5004c4eb6459afb4af96 + +info: + name: > + Attorney <= 3 - Missing Authorization to Unauthenticated Arbitrary Content Deletion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7bc875b3-8250-4447-b921-243926849fa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/attorney/" + google-query: inurl:"/wp-content/themes/attorney/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,attorney,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/attorney/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "attorney" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/attorney-ac1c1976acfd0aeffc2f834a988bb3ea.yaml b/nuclei-templates/cve-less/themes/attorney-ac1c1976acfd0aeffc2f834a988bb3ea.yaml new file mode 100644 index 0000000000..d9446d4684 --- /dev/null +++ b/nuclei-templates/cve-less/themes/attorney-ac1c1976acfd0aeffc2f834a988bb3ea.yaml @@ -0,0 +1,58 @@ +id: attorney-ac1c1976acfd0aeffc2f834a988bb3ea + +info: + name: > + Attorney <= 3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/026443b6-4ab5-4f31-8a8d-2019097bde4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/attorney/" + google-query: inurl:"/wp-content/themes/attorney/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,attorney,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/attorney/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "attorney" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/auberge-5d7be31521ee03a3c41d06e3d9d363f9.yaml b/nuclei-templates/cve-less/themes/auberge-5d7be31521ee03a3c41d06e3d9d363f9.yaml new file mode 100644 index 0000000000..5a67b0ca85 --- /dev/null +++ b/nuclei-templates/cve-less/themes/auberge-5d7be31521ee03a3c41d06e3d9d363f9.yaml @@ -0,0 +1,58 @@ +id: auberge-5d7be31521ee03a3c41d06e3d9d363f9 + +info: + name: > + Auberge < 1.4.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22dcdd92-75d1-44aa-aaae-434ec4bdc20f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/auberge/" + google-query: inurl:"/wp-content/themes/auberge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,auberge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/auberge/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auberge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/authentic-4a7a1840571177670b84b0075f0a9a69.yaml b/nuclei-templates/cve-less/themes/authentic-4a7a1840571177670b84b0075f0a9a69.yaml new file mode 100644 index 0000000000..d51246c56b --- /dev/null +++ b/nuclei-templates/cve-less/themes/authentic-4a7a1840571177670b84b0075f0a9a69.yaml @@ -0,0 +1,58 @@ +id: authentic-4a7a1840571177670b84b0075f0a9a69 + +info: + name: > + Authentic <= 2.0.4 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd563af4-b97f-4746-a5e9-8dc5dfda272e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/authentic/" + google-query: inurl:"/wp-content/themes/authentic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,authentic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/authentic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "authentic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/auto-car-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/auto-car-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..4be89ab465 --- /dev/null +++ b/nuclei-templates/cve-less/themes/auto-car-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: auto-car-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/auto-car/" + google-query: inurl:"/wp-content/themes/auto-car/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,auto-car,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/auto-car/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "auto-car" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-003889b218e2b00be9012c017586c0d2.yaml b/nuclei-templates/cve-less/themes/avada-003889b218e2b00be9012c017586c0d2.yaml new file mode 100644 index 0000000000..b961d41221 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-003889b218e2b00be9012c017586c0d2.yaml @@ -0,0 +1,58 @@ +id: avada-003889b218e2b00be9012c017586c0d2 + +info: + name: > + Avada <= 7.11.6 - Authenticated (Contributor+) Server-Side Request Forgery via form_to_url_action + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-45a743f5d162595c13c7d51a595d52ef.yaml b/nuclei-templates/cve-less/themes/avada-45a743f5d162595c13c7d51a595d52ef.yaml new file mode 100644 index 0000000000..cea08f7b6a --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-45a743f5d162595c13c7d51a595d52ef.yaml @@ -0,0 +1,58 @@ +id: avada-45a743f5d162595c13c7d51a595d52ef + +info: + name: > + Avada <= 5.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6781c76b-bfcb-43b3-8275-5b4c2aa1fe07?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-49fe6661a7e83dfa08fd330a80312c71.yaml b/nuclei-templates/cve-less/themes/avada-49fe6661a7e83dfa08fd330a80312c71.yaml new file mode 100644 index 0000000000..c8f52344df --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-49fe6661a7e83dfa08fd330a80312c71.yaml @@ -0,0 +1,58 @@ +id: avada-49fe6661a7e83dfa08fd330a80312c71 + +info: + name: > + Avada | Website Builder For WordPress & WooCommerce <= 7.11.4 - Authenticated (Contributor+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cde6e758-9723-43f2-9972-32be8aeb2b91?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-4a05ae911598dc28de7b72c0be044356.yaml b/nuclei-templates/cve-less/themes/avada-4a05ae911598dc28de7b72c0be044356.yaml new file mode 100644 index 0000000000..25ab73c56c --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-4a05ae911598dc28de7b72c0be044356.yaml @@ -0,0 +1,58 @@ +id: avada-4a05ae911598dc28de7b72c0be044356 + +info: + name: > + Avada <= 7.4.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e9b58db6-4059-4923-b1e3-3321cc7d3573?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-51e019b787984ebb59dc9257a3fe25a4.yaml b/nuclei-templates/cve-less/themes/avada-51e019b787984ebb59dc9257a3fe25a4.yaml new file mode 100644 index 0000000000..6e5691dea5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-51e019b787984ebb59dc9257a3fe25a4.yaml @@ -0,0 +1,58 @@ +id: avada-51e019b787984ebb59dc9257a3fe25a4 + +info: + name: > + Avada <= 6.2.2 - Authenticated (Contributor+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/684a1e8e-30f2-47dd-9df6-145198030c52?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-855366bc54f67a90854fe071e412ecdb.yaml b/nuclei-templates/cve-less/themes/avada-855366bc54f67a90854fe071e412ecdb.yaml new file mode 100644 index 0000000000..e7254c777c --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-855366bc54f67a90854fe071e412ecdb.yaml @@ -0,0 +1,58 @@ +id: avada-855366bc54f67a90854fe071e412ecdb + +info: + name: > + Avada <= 7.11.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfffed4d-dacb-4591-840c-45105a58362a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-907496c3b43ef59b87d499ec04fd4467.yaml b/nuclei-templates/cve-less/themes/avada-907496c3b43ef59b87d499ec04fd4467.yaml new file mode 100644 index 0000000000..6ff0837c29 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-907496c3b43ef59b87d499ec04fd4467.yaml @@ -0,0 +1,58 @@ +id: avada-907496c3b43ef59b87d499ec04fd4467 + +info: + name: > + Avada <= 7.11.6 - Authenticated (Editor+) SQL Injection via entry + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccf0d2ca-2891-45d1-8ea2-90dd435b359f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-9abc850c93257e8269e3f6780cf7c973.yaml b/nuclei-templates/cve-less/themes/avada-9abc850c93257e8269e3f6780cf7c973.yaml new file mode 100644 index 0000000000..cbd5e7f36f --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-9abc850c93257e8269e3f6780cf7c973.yaml @@ -0,0 +1,58 @@ +id: avada-9abc850c93257e8269e3f6780cf7c973 + +info: + name: > + Avada <= 7.11.5 - Authenticated(Contributor+) Sensitive Information Exposure via Form Entries + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd224169-ae51-4af8-b6de-706ed580ff8d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-b6efebccc72344ca35f158202f79667f.yaml b/nuclei-templates/cve-less/themes/avada-b6efebccc72344ca35f158202f79667f.yaml new file mode 100644 index 0000000000..4ce23b3060 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-b6efebccc72344ca35f158202f79667f.yaml @@ -0,0 +1,58 @@ +id: avada-b6efebccc72344ca35f158202f79667f + +info: + name: > + Avada <= 7.11.6 - Unauthenticated Sensitive Information Exposure via Form Uploads Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8db8bbc3-43ca-4ef5-a44d-2987c8597961?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-bb65f92eeb63b478b2f218d634d42a06.yaml b/nuclei-templates/cve-less/themes/avada-bb65f92eeb63b478b2f218d634d42a06.yaml new file mode 100644 index 0000000000..222a4c7328 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-bb65f92eeb63b478b2f218d634d42a06.yaml @@ -0,0 +1,58 @@ +id: avada-bb65f92eeb63b478b2f218d634d42a06 + +info: + name: > + Avada <= 7.11.1 - Authenticated(Author+) Arbitrary File Upload via Zip Extraction + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3b62eb2-6c03-4e24-a454-5de54a4521b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-c75774e4c2c9b9851693b07aeb2b25ad.yaml b/nuclei-templates/cve-less/themes/avada-c75774e4c2c9b9851693b07aeb2b25ad.yaml new file mode 100644 index 0000000000..57c013ee21 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-c75774e4c2c9b9851693b07aeb2b25ad.yaml @@ -0,0 +1,58 @@ +id: avada-c75774e4c2c9b9851693b07aeb2b25ad + +info: + name: > + Avada <= 7.11.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ff6ff104-44c8-49a9-bebd-abb82e8e1cd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-d4d2889c92e76cd2635d3cb3c6eabcdb.yaml b/nuclei-templates/cve-less/themes/avada-d4d2889c92e76cd2635d3cb3c6eabcdb.yaml new file mode 100644 index 0000000000..4044eb2d6c --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-d4d2889c92e76cd2635d3cb3c6eabcdb.yaml @@ -0,0 +1,58 @@ +id: avada-d4d2889c92e76cd2635d3cb3c6eabcdb + +info: + name: > + Avada <= 7.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/11280431-ee39-45da-909a-e9efc0e6266f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-d882958bab372a69d811837406b3986e.yaml b/nuclei-templates/cve-less/themes/avada-d882958bab372a69d811837406b3986e.yaml new file mode 100644 index 0000000000..10caa2b45f --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-d882958bab372a69d811837406b3986e.yaml @@ -0,0 +1,58 @@ +id: avada-d882958bab372a69d811837406b3986e + +info: + name: > + Fusion Builder <= 3.6.1 & Avada <= 7.6.1 - Unauthenticated Server-Side Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad3de7e6-a080-4ce8-aa27-21e7f8fdb2c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-e3ee06b08069cc90d373b87f289545a0.yaml b/nuclei-templates/cve-less/themes/avada-e3ee06b08069cc90d373b87f289545a0.yaml new file mode 100644 index 0000000000..2868916b8b --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-e3ee06b08069cc90d373b87f289545a0.yaml @@ -0,0 +1,58 @@ +id: avada-e3ee06b08069cc90d373b87f289545a0 + +info: + name: > + Avada <= 7.11.1 - Authenticated(Contributor+) Arbitrary File Upload via 'ajax_import_options' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a73f7812-771d-4d9f-9a7c-e4e01ec05023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-e6b2cb8bfdcceb721cbe5b7ffbe02c9a.yaml b/nuclei-templates/cve-less/themes/avada-e6b2cb8bfdcceb721cbe5b7ffbe02c9a.yaml new file mode 100644 index 0000000000..50ef43e0d4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-e6b2cb8bfdcceb721cbe5b7ffbe02c9a.yaml @@ -0,0 +1,58 @@ +id: avada-e6b2cb8bfdcceb721cbe5b7ffbe02c9a + +info: + name: > + Avada <= 7.11.1 - Authenticated(Contributor+) Server Side Request Forgery via 'ajax_import_options' + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/43b11ab0-c7f2-4a7a-aab7-7f9dd58ec1ab?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.11.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml b/nuclei-templates/cve-less/themes/avada-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml new file mode 100644 index 0000000000..396c975252 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml @@ -0,0 +1,58 @@ +id: avada-ed2bbae23b6c0e2ec39d5d24fb1592c1 + +info: + name: > + Avada <= 5.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95624a3b-70cc-4815-a604-c6b19fc84e93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avada-f93d99515ef4e6bdea2dd530448d23e4.yaml b/nuclei-templates/cve-less/themes/avada-f93d99515ef4e6bdea2dd530448d23e4.yaml new file mode 100644 index 0000000000..3e7fc0380b --- /dev/null +++ b/nuclei-templates/cve-less/themes/avada-f93d99515ef4e6bdea2dd530448d23e4.yaml @@ -0,0 +1,58 @@ +id: avada-f93d99515ef4e6bdea2dd530448d23e4 + +info: + name: > + Avada <= 7.8.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef45fa78-7005-483e-a708-5aab0f7ba07b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Avada/" + google-query: inurl:"/wp-content/themes/Avada/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Avada,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Avada/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Avada" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/avanix-153b374358a4469baf0dcf3e128485d7.yaml b/nuclei-templates/cve-less/themes/avanix-153b374358a4469baf0dcf3e128485d7.yaml new file mode 100644 index 0000000000..9f2dbe9292 --- /dev/null +++ b/nuclei-templates/cve-less/themes/avanix-153b374358a4469baf0dcf3e128485d7.yaml @@ -0,0 +1,58 @@ +id: avanix-153b374358a4469baf0dcf3e128485d7 + +info: + name: > + Imediapixel Themes (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a923c84e-3641-45ec-970e-faea803897bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/avanix/" + google-query: inurl:"/wp-content/themes/avanix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,avanix,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/avanix/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "avanix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/awake-6f4ec28d470f70401f41d76af77cb887.yaml b/nuclei-templates/cve-less/themes/awake-6f4ec28d470f70401f41d76af77cb887.yaml new file mode 100644 index 0000000000..63b9a6c11e --- /dev/null +++ b/nuclei-templates/cve-less/themes/awake-6f4ec28d470f70401f41d76af77cb887.yaml @@ -0,0 +1,58 @@ +id: awake-6f4ec28d470f70401f41d76af77cb887 + +info: + name: > + Awake <= 3.3 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/498f7ece-e33a-4489-aeb9-1660abe0b4a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/awake/" + google-query: inurl:"/wp-content/themes/awake/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,awake,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/awake/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awake" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/awake-d6c2e6fd9fd0cfab443b5c0a2bd9f57d.yaml b/nuclei-templates/cve-less/themes/awake-d6c2e6fd9fd0cfab443b5c0a2bd9f57d.yaml new file mode 100644 index 0000000000..a1ae31e59a --- /dev/null +++ b/nuclei-templates/cve-less/themes/awake-d6c2e6fd9fd0cfab443b5c0a2bd9f57d.yaml @@ -0,0 +1,58 @@ +id: awake-d6c2e6fd9fd0cfab443b5c0a2bd9f57d + +info: + name: > + Awake <= 3.3 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2510cee-d9d7-4b30-bf94-254a1dec9bd8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/awake/" + google-query: inurl:"/wp-content/themes/awake/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,awake,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/awake/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awake" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/awpbusinesspress-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/awpbusinesspress-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..2d45248eb2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/awpbusinesspress-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: awpbusinesspress-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/awpbusinesspress/" + google-query: inurl:"/wp-content/themes/awpbusinesspress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,awpbusinesspress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/awpbusinesspress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "awpbusinesspress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/axioma-4dcbb5c4a13afaeaec2eb944e1efc4e0.yaml b/nuclei-templates/cve-less/themes/axioma-4dcbb5c4a13afaeaec2eb944e1efc4e0.yaml new file mode 100644 index 0000000000..e5793e7bae --- /dev/null +++ b/nuclei-templates/cve-less/themes/axioma-4dcbb5c4a13afaeaec2eb944e1efc4e0.yaml @@ -0,0 +1,58 @@ +id: axioma-4dcbb5c4a13afaeaec2eb944e1efc4e0 + +info: + name: > + Axioma Premium Responsive < 1.1.2 - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae74048a-ea29-46cc-913b-86094640e88d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/axioma/" + google-query: inurl:"/wp-content/themes/axioma/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,axioma,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/axioma/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "axioma" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bacola-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml b/nuclei-templates/cve-less/themes/bacola-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml new file mode 100644 index 0000000000..17dd8699df --- /dev/null +++ b/nuclei-templates/cve-less/themes/bacola-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml @@ -0,0 +1,58 @@ +id: bacola-0ed3cd48ec0b8d5d59c0c2a69ba7db3d + +info: + name: > + Multiple Themes by KlbTheme <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d5036a-c756-47a6-b071-c393f8a6ce5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bacola/" + google-query: inurl:"/wp-content/themes/bacola/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bacola,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bacola/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bacola" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/balkon-25caf82ba3c3384a973d48ab8eff05a3.yaml b/nuclei-templates/cve-less/themes/balkon-25caf82ba3c3384a973d48ab8eff05a3.yaml new file mode 100644 index 0000000000..b4546fc2bc --- /dev/null +++ b/nuclei-templates/cve-less/themes/balkon-25caf82ba3c3384a973d48ab8eff05a3.yaml @@ -0,0 +1,58 @@ +id: balkon-25caf82ba3c3384a973d48ab8eff05a3 + +info: + name: > + Balkon <= 1.3.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cfcc1a4d-c6c7-4ca8-afe5-79298e7ad3d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/balkon/" + google-query: inurl:"/wp-content/themes/balkon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,balkon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/balkon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "balkon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bani-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/bani-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..09bce8bd45 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bani-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: bani-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bani/" + google-query: inurl:"/wp-content/themes/bani/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bani,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bani/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bani" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bani-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/themes/bani-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..f1ca04c2ce --- /dev/null +++ b/nuclei-templates/cve-less/themes/bani-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: bani-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bani/" + google-query: inurl:"/wp-content/themes/bani/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bani,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bani/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bani" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/barelycorporate-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/themes/barelycorporate-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..bdddccb239 --- /dev/null +++ b/nuclei-templates/cve-less/themes/barelycorporate-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: barelycorporate-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/barelycorporate/" + google-query: inurl:"/wp-content/themes/barelycorporate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,barelycorporate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/barelycorporate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "barelycorporate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bazaar-lite-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/bazaar-lite-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..818cd66b87 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bazaar-lite-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: bazaar-lite-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bazaar-lite/" + google-query: inurl:"/wp-content/themes/bazaar-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bazaar-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bazaar-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bazaar-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bbe-9d3718684afa0305d0420944743522e1.yaml b/nuclei-templates/cve-less/themes/bbe-9d3718684afa0305d0420944743522e1.yaml new file mode 100644 index 0000000000..a181bb74a1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bbe-9d3718684afa0305d0420944743522e1.yaml @@ -0,0 +1,58 @@ +id: bbe-9d3718684afa0305d0420944743522e1 + +info: + name: > + BBE < 1.53 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/34d5dbd4-5546-439e-a47a-4f9385116adc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bbe/" + google-query: inurl:"/wp-content/themes/bbe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bbe,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bbe/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.53') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/beauty-premium-430614badd7183227eb02d22143e3a52.yaml b/nuclei-templates/cve-less/themes/beauty-premium-430614badd7183227eb02d22143e3a52.yaml new file mode 100644 index 0000000000..09bd7b7d0c --- /dev/null +++ b/nuclei-templates/cve-less/themes/beauty-premium-430614badd7183227eb02d22143e3a52.yaml @@ -0,0 +1,58 @@ +id: beauty-premium-430614badd7183227eb02d22143e3a52 + +info: + name: > + Beauty & Clean <= 1.0.8 - Cross-Site Request Forgery & Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e06c7e0a-f972-430a-9f87-786e0c6e1a84?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/beauty-premium/" + google-query: inurl:"/wp-content/themes/beauty-premium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,beauty-premium,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/beauty-premium/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "beauty-premium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bello-0d1b849fd565592736828b4a54b39135.yaml b/nuclei-templates/cve-less/themes/bello-0d1b849fd565592736828b4a54b39135.yaml new file mode 100644 index 0000000000..72a9aec212 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bello-0d1b849fd565592736828b4a54b39135.yaml @@ -0,0 +1,58 @@ +id: bello-0d1b849fd565592736828b4a54b39135 + +info: + name: > + Bello - Directory & Listing <= 1.5.9 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fa39169-1cba-43ce-aa29-adf7ce09ce75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bello/" + google-query: inurl:"/wp-content/themes/bello/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bello,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bello/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bello" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bello-84b15db6be01953ae7e773bc858c3601.yaml b/nuclei-templates/cve-less/themes/bello-84b15db6be01953ae7e773bc858c3601.yaml new file mode 100644 index 0000000000..f1877134cf --- /dev/null +++ b/nuclei-templates/cve-less/themes/bello-84b15db6be01953ae7e773bc858c3601.yaml @@ -0,0 +1,58 @@ +id: bello-84b15db6be01953ae7e773bc858c3601 + +info: + name: > + Bello - Directory & Listing - < 1.6.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2f10cc4-82a8-4668-b1e5-a08a0f79b59c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bello/" + google-query: inurl:"/wp-content/themes/bello/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bello,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bello/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bello" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bello-a5df397db51ff69150f57b2d7f5c09a8.yaml b/nuclei-templates/cve-less/themes/bello-a5df397db51ff69150f57b2d7f5c09a8.yaml new file mode 100644 index 0000000000..ce9c1fc24d --- /dev/null +++ b/nuclei-templates/cve-less/themes/bello-a5df397db51ff69150f57b2d7f5c09a8.yaml @@ -0,0 +1,58 @@ +id: bello-a5df397db51ff69150f57b2d7f5c09a8 + +info: + name: > + Directory & Listing < 1.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/349e3b4a-c46b-48f6-acf7-bcdc86c13db7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bello/" + google-query: inurl:"/wp-content/themes/bello/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bello,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bello/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bello" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-0eda30de3bc2dbaa94da2af30caf268c.yaml b/nuclei-templates/cve-less/themes/betheme-0eda30de3bc2dbaa94da2af30caf268c.yaml new file mode 100644 index 0000000000..67238b4e31 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-0eda30de3bc2dbaa94da2af30caf268c.yaml @@ -0,0 +1,58 @@ +id: betheme-0eda30de3bc2dbaa94da2af30caf268c + +info: + name: > + Betheme <= 26.6.2 - Missing Authorization to Post Title Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ff3b35c-f7e3-4cae-b7f1-1a0930173ac5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-4177059b270800f6cdd2567297565b05.yaml b/nuclei-templates/cve-less/themes/betheme-4177059b270800f6cdd2567297565b05.yaml new file mode 100644 index 0000000000..ed66abb040 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-4177059b270800f6cdd2567297565b05.yaml @@ -0,0 +1,58 @@ +id: betheme-4177059b270800f6cdd2567297565b05 + +info: + name: > + Betheme <= 26.6.2 - Missing Authorization Checks to Private Page/Post Data Disclosure + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f8068fb3-5a19-4b17-848b-32cebfff2537?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-4248ab6c48d79553c417ff3c6f6afabd.yaml b/nuclei-templates/cve-less/themes/betheme-4248ab6c48d79553c417ff3c6f6afabd.yaml new file mode 100644 index 0000000000..b6ac3bb2a3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-4248ab6c48d79553c417ff3c6f6afabd.yaml @@ -0,0 +1,58 @@ +id: betheme-4248ab6c48d79553c417ff3c6f6afabd + +info: + name: > + Betheme <= 26.6.2 - Missing Authorization Check on Core Functionality + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8eec2f0-1b6f-45cf-8291-019bc1d08f9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-6bcabc3b4e69486405e1172846710922.yaml b/nuclei-templates/cve-less/themes/betheme-6bcabc3b4e69486405e1172846710922.yaml new file mode 100644 index 0000000000..7de742f616 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-6bcabc3b4e69486405e1172846710922.yaml @@ -0,0 +1,58 @@ +id: betheme-6bcabc3b4e69486405e1172846710922 + +info: + name: > + Betheme <= 27.1.1 - Missing Authorization via '_tool_history_delete' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e75bb6-83d9-43db-8c89-0995698ca0ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 27.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-a0089e085e056ad847052764bb440612.yaml b/nuclei-templates/cve-less/themes/betheme-a0089e085e056ad847052764bb440612.yaml new file mode 100644 index 0000000000..907958c909 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-a0089e085e056ad847052764bb440612.yaml @@ -0,0 +1,58 @@ +id: betheme-a0089e085e056ad847052764bb440612 + +info: + name: > + Betheme <= 26.7.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c14b948f-129d-4223-b3ee-0bef1f9fc703?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.7.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-a02d18d0740894600f021e06a20fd2de.yaml b/nuclei-templates/cve-less/themes/betheme-a02d18d0740894600f021e06a20fd2de.yaml new file mode 100644 index 0000000000..c3e618a556 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-a02d18d0740894600f021e06a20fd2de.yaml @@ -0,0 +1,58 @@ +id: betheme-a02d18d0740894600f021e06a20fd2de + +info: + name: > + Betheme <= 26.5.1.4 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe00b89f-b475-4aec-8df8-89d842d92e4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-c3f3aac4022202f47e3ad7f05ff237dd.yaml b/nuclei-templates/cve-less/themes/betheme-c3f3aac4022202f47e3ad7f05ff237dd.yaml new file mode 100644 index 0000000000..dfc99fb4f4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-c3f3aac4022202f47e3ad7f05ff237dd.yaml @@ -0,0 +1,58 @@ +id: betheme-c3f3aac4022202f47e3ad7f05ff237dd + +info: + name: > + Betheme <= 26.5.1.4 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f5e984d5-2537-4a4a-a071-084e0c1c3b5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.5.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-eef54adf293c01cfcd3711ba2746f5e0.yaml b/nuclei-templates/cve-less/themes/betheme-eef54adf293c01cfcd3711ba2746f5e0.yaml new file mode 100644 index 0000000000..9689657195 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-eef54adf293c01cfcd3711ba2746f5e0.yaml @@ -0,0 +1,58 @@ +id: betheme-eef54adf293c01cfcd3711ba2746f5e0 + +info: + name: > + Betheme <= 26.6.2 - Missing Authorization to Post Status Change + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa657530-7c85-4399-94bb-feaa7d21a47a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-f2c966f060ba4e0ec53591e455e174f0.yaml b/nuclei-templates/cve-less/themes/betheme-f2c966f060ba4e0ec53591e455e174f0.yaml new file mode 100644 index 0000000000..4eb9bc5c29 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-f2c966f060ba4e0ec53591e455e174f0.yaml @@ -0,0 +1,58 @@ +id: betheme-f2c966f060ba4e0ec53591e455e174f0 + +info: + name: > + Betheme <= 26.6.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e1d4080-cd8a-455a-85f4-87f195ebe4a2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-f626e9df68cec35c776cf1191c5c3f5d.yaml b/nuclei-templates/cve-less/themes/betheme-f626e9df68cec35c776cf1191c5c3f5d.yaml new file mode 100644 index 0000000000..5fa0346362 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-f626e9df68cec35c776cf1191c5c3f5d.yaml @@ -0,0 +1,58 @@ +id: betheme-f626e9df68cec35c776cf1191c5c3f5d + +info: + name: > + Betheme <= 26.6.2 - Missing Authorization to Theme Settings Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ec44487-7529-46a8-b2eb-cc5fe0f8f062?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 26.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/betheme-f83868d3a00a9fcf53648bc46fb152f1.yaml b/nuclei-templates/cve-less/themes/betheme-f83868d3a00a9fcf53648bc46fb152f1.yaml new file mode 100644 index 0000000000..b89b0dee72 --- /dev/null +++ b/nuclei-templates/cve-less/themes/betheme-f83868d3a00a9fcf53648bc46fb152f1.yaml @@ -0,0 +1,58 @@ +id: betheme-f83868d3a00a9fcf53648bc46fb152f1 + +info: + name: > + Betheme <= 27.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/72bdc81e-1a9d-4dd8-93a5-fb1026d6a2d9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/betheme/" + google-query: inurl:"/wp-content/themes/betheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,betheme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/betheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "betheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 27.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/big-store-b619e22c55f5ef6d348009289f2fb6f6.yaml b/nuclei-templates/cve-less/themes/big-store-b619e22c55f5ef6d348009289f2fb6f6.yaml new file mode 100644 index 0000000000..7c7821ee2b --- /dev/null +++ b/nuclei-templates/cve-less/themes/big-store-b619e22c55f5ef6d348009289f2fb6f6.yaml @@ -0,0 +1,58 @@ +id: big-store-b619e22c55f5ef6d348009289f2fb6f6 + +info: + name: > + Big Store <= 1.9.3 - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a1859dca-d771-470c-ae4a-48246977212c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/big-store/" + google-query: inurl:"/wp-content/themes/big-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,big-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/big-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "big-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bingle-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/bingle-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..563e98d2ac --- /dev/null +++ b/nuclei-templates/cve-less/themes/bingle-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: bingle-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bingle/" + google-query: inurl:"/wp-content/themes/bingle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bingle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bingle/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bingle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bingle-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/bingle-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..3865341419 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bingle-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: bingle-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bingle/" + google-query: inurl:"/wp-content/themes/bingle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bingle,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bingle/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bingle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bingle-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/bingle-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..344c94e424 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bingle-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: bingle-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bingle/" + google-query: inurl:"/wp-content/themes/bingle/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bingle,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bingle/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bingle" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/black-letterhead-530c76ddc7a277b970fa701ca1edf42b.yaml b/nuclei-templates/cve-less/themes/black-letterhead-530c76ddc7a277b970fa701ca1edf42b.yaml new file mode 100644 index 0000000000..6ff3657081 --- /dev/null +++ b/nuclei-templates/cve-less/themes/black-letterhead-530c76ddc7a277b970fa701ca1edf42b.yaml @@ -0,0 +1,58 @@ +id: black-letterhead-530c76ddc7a277b970fa701ca1edf42b + +info: + name: > + Black-Letterhead <= 1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8617dc53-8994-4fab-a3df-27863ad3dd10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/black-letterhead/" + google-query: inurl:"/wp-content/themes/black-letterhead/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,black-letterhead,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/black-letterhead/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "black-letterhead" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blain-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/blain-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..f7b06b8bc7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blain-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: blain-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blain/" + google-query: inurl:"/wp-content/themes/blain/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blain,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blain/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blain" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blaze-902eeda285eff78838cf6ebbc45afd69.yaml b/nuclei-templates/cve-less/themes/blaze-902eeda285eff78838cf6ebbc45afd69.yaml new file mode 100644 index 0000000000..4c643d8d08 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blaze-902eeda285eff78838cf6ebbc45afd69.yaml @@ -0,0 +1,58 @@ +id: blaze-902eeda285eff78838cf6ebbc45afd69 + +info: + name: > + Blaze Theme (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8c74105-3f0c-4322-96f3-e6bf4760cc2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blaze/" + google-query: inurl:"/wp-content/themes/blaze/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blaze,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blaze/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blaze" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blessing-d850c5ed075967896003b1b01706f556.yaml b/nuclei-templates/cve-less/themes/blessing-d850c5ed075967896003b1b01706f556.yaml new file mode 100644 index 0000000000..c41fcdba60 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blessing-d850c5ed075967896003b1b01706f556.yaml @@ -0,0 +1,58 @@ +id: blessing-d850c5ed075967896003b1b01706f556 + +info: + name: > + Blessing Premium Responsive WordPress Theme < 1.3.2.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db0feb49-35c3-4bb1-9ec9-2b5bdbb28189?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blessing/" + google-query: inurl:"/wp-content/themes/blessing/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blessing,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blessing/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blessing" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blix-54409f2bc5984d61c42ec97047d41adc.yaml b/nuclei-templates/cve-less/themes/blix-54409f2bc5984d61c42ec97047d41adc.yaml new file mode 100644 index 0000000000..768d3af89e --- /dev/null +++ b/nuclei-templates/cve-less/themes/blix-54409f2bc5984d61c42ec97047d41adc.yaml @@ -0,0 +1,58 @@ +id: blix-54409f2bc5984d61c42ec97047d41adc + +info: + name: > + Blix <= 0.9.1, Blixed <= 1.0, BlixKrieg <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/928584e5-7391-4442-820e-d5d5fc288572?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blix/" + google-query: inurl:"/wp-content/themes/blix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blix,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blix/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blix-c0b95532030c59fee6c1d3ae2a188201.yaml b/nuclei-templates/cve-less/themes/blix-c0b95532030c59fee6c1d3ae2a188201.yaml new file mode 100644 index 0000000000..569d60bb93 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blix-c0b95532030c59fee6c1d3ae2a188201.yaml @@ -0,0 +1,58 @@ +id: blix-c0b95532030c59fee6c1d3ae2a188201 + +info: + name: > + Blix 0.9.1 and Blix 0.9.1 Rus - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/537b6f36-ae45-465a-b139-6753d50d8e10?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blix/" + google-query: inurl:"/wp-content/themes/blix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blix,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blix/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blixed-54409f2bc5984d61c42ec97047d41adc.yaml b/nuclei-templates/cve-less/themes/blixed-54409f2bc5984d61c42ec97047d41adc.yaml new file mode 100644 index 0000000000..a84ecc2bdb --- /dev/null +++ b/nuclei-templates/cve-less/themes/blixed-54409f2bc5984d61c42ec97047d41adc.yaml @@ -0,0 +1,58 @@ +id: blixed-54409f2bc5984d61c42ec97047d41adc + +info: + name: > + Blix <= 0.9.1, Blixed <= 1.0, BlixKrieg <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/928584e5-7391-4442-820e-d5d5fc288572?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blixed/" + google-query: inurl:"/wp-content/themes/blixed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blixed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blixed/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blixed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blixkrieg-54409f2bc5984d61c42ec97047d41adc.yaml b/nuclei-templates/cve-less/themes/blixkrieg-54409f2bc5984d61c42ec97047d41adc.yaml new file mode 100644 index 0000000000..f9d5bf32cc --- /dev/null +++ b/nuclei-templates/cve-less/themes/blixkrieg-54409f2bc5984d61c42ec97047d41adc.yaml @@ -0,0 +1,58 @@ +id: blixkrieg-54409f2bc5984d61c42ec97047d41adc + +info: + name: > + Blix <= 0.9.1, Blixed <= 1.0, BlixKrieg <= 2.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/928584e5-7391-4442-820e-d5d5fc288572?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blixkrieg/" + google-query: inurl:"/wp-content/themes/blixkrieg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blixkrieg,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blixkrieg/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blixkrieg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blocksy-07a77988897e3af64d686b49eda84d8d.yaml b/nuclei-templates/cve-less/themes/blocksy-07a77988897e3af64d686b49eda84d8d.yaml new file mode 100644 index 0000000000..ce5117eb01 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blocksy-07a77988897e3af64d686b49eda84d8d.yaml @@ -0,0 +1,58 @@ +id: blocksy-07a77988897e3af64d686b49eda84d8d + +info: + name: > + Blocksy <= 2.0.26 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdeab668-9094-485f-aa01-13ba5c10ea89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blocksy/" + google-query: inurl:"/wp-content/themes/blocksy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blocksy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blocksy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.26') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blocksy-0ec4296664350dc8ee374e0d44043428.yaml b/nuclei-templates/cve-less/themes/blocksy-0ec4296664350dc8ee374e0d44043428.yaml new file mode 100644 index 0000000000..504d409af1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blocksy-0ec4296664350dc8ee374e0d44043428.yaml @@ -0,0 +1,58 @@ +id: blocksy-0ec4296664350dc8ee374e0d44043428 + +info: + name: > + Blocksy <= 2.0.22 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f86dd96-fc87-4dc8-8435-f279a8def021?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blocksy/" + google-query: inurl:"/wp-content/themes/blocksy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blocksy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blocksy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blocksy-924efae616f0032d8047ad716d24a484.yaml b/nuclei-templates/cve-less/themes/blocksy-924efae616f0032d8047ad716d24a484.yaml new file mode 100644 index 0000000000..439c0d9c7a --- /dev/null +++ b/nuclei-templates/cve-less/themes/blocksy-924efae616f0032d8047ad716d24a484.yaml @@ -0,0 +1,58 @@ +id: blocksy-924efae616f0032d8047ad716d24a484 + +info: + name: > + Blocksy <= 2.0.42 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22d1ccf3-ac1a-4dfc-81c3-b8eb88795bc1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blocksy/" + google-query: inurl:"/wp-content/themes/blocksy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blocksy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blocksy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.42') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blocksy-9f5f23c716774bbd462d447842ecf871.yaml b/nuclei-templates/cve-less/themes/blocksy-9f5f23c716774bbd462d447842ecf871.yaml new file mode 100644 index 0000000000..a0e8d69c26 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blocksy-9f5f23c716774bbd462d447842ecf871.yaml @@ -0,0 +1,58 @@ +id: blocksy-9f5f23c716774bbd462d447842ecf871 + +info: + name: > + Blocksy <= 2.0.19 - Authenticated (Editor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e781e1aa-7fa2-4cea-913b-4aa582ec6a4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blocksy/" + google-query: inurl:"/wp-content/themes/blocksy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blocksy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blocksy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blocksy-bc2b1b1b8cc260b904b43a53b27b1dc7.yaml b/nuclei-templates/cve-less/themes/blocksy-bc2b1b1b8cc260b904b43a53b27b1dc7.yaml new file mode 100644 index 0000000000..a469124079 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blocksy-bc2b1b1b8cc260b904b43a53b27b1dc7.yaml @@ -0,0 +1,58 @@ +id: blocksy-bc2b1b1b8cc260b904b43a53b27b1dc7 + +info: + name: > + Blocksy <= 2.0.39 - Authenticated (Contributor+) Stored Cross-Site Scripting via About Me block + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e3f71928-3f1d-4c15-8655-41cdfb707370?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blocksy/" + google-query: inurl:"/wp-content/themes/blocksy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blocksy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blocksy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.39') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blocksy-db7f8fed7cd5746da95374c4a1d925a5.yaml b/nuclei-templates/cve-less/themes/blocksy-db7f8fed7cd5746da95374c4a1d925a5.yaml new file mode 100644 index 0000000000..a036908023 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blocksy-db7f8fed7cd5746da95374c4a1d925a5.yaml @@ -0,0 +1,58 @@ +id: blocksy-db7f8fed7cd5746da95374c4a1d925a5 + +info: + name: > + Blocksy <= 2.0.33 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/030ec6bb-f19d-4145-b3fb-bd647c154666?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blocksy/" + google-query: inurl:"/wp-content/themes/blocksy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blocksy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blocksy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blocksy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bloger-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/bloger-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..2462c11e48 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bloger-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: bloger-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bloger/" + google-query: inurl:"/wp-content/themes/bloger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bloger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bloger/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bloger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bloger-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/bloger-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..dcf273eac6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bloger-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: bloger-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bloger/" + google-query: inurl:"/wp-content/themes/bloger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bloger,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bloger/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bloger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bloger-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/bloger-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..43918e1703 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bloger-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: bloger-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bloger/" + google-query: inurl:"/wp-content/themes/bloger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bloger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bloger/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bloger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blogger-buzz-e5b5400c624e25843b2372f9abb89d26.yaml b/nuclei-templates/cve-less/themes/blogger-buzz-e5b5400c624e25843b2372f9abb89d26.yaml new file mode 100644 index 0000000000..5fe69beade --- /dev/null +++ b/nuclei-templates/cve-less/themes/blogger-buzz-e5b5400c624e25843b2372f9abb89d26.yaml @@ -0,0 +1,58 @@ +id: blogger-buzz-e5b5400c624e25843b2372f9abb89d26 + +info: + name: > + Blogger Buzz <= 1.2.4 - Missing Authorization via activate_plugin + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/823dce74-2688-4573-b0c8-353f1789ea48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blogger-buzz/" + google-query: inurl:"/wp-content/themes/blogger-buzz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blogger-buzz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blogger-buzz/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blogger-buzz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blooog-v1.1-e7c3ee180660fac9fead4fadabb98bef.yaml b/nuclei-templates/cve-less/themes/blooog-v1.1-e7c3ee180660fac9fead4fadabb98bef.yaml new file mode 100644 index 0000000000..661920eb85 --- /dev/null +++ b/nuclei-templates/cve-less/themes/blooog-v1.1-e7c3ee180660fac9fead4fadabb98bef.yaml @@ -0,0 +1,58 @@ +id: blooog-v1.1-e7c3ee180660fac9fead4fadabb98bef + +info: + name: > + Bloog <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c49dcb39-7d03-4d7e-9a07-7ac8a6506e7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Blooog-v1.1/" + google-query: inurl:"/wp-content/themes/Blooog-v1.1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Blooog-v1.1,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Blooog-v1.1/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Blooog-v1.1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blossom-spa-a9b48fe75d8b0cb9e851b9c9fd985412.yaml b/nuclei-templates/cve-less/themes/blossom-spa-a9b48fe75d8b0cb9e851b9c9fd985412.yaml new file mode 100644 index 0000000000..bbc36f89ff --- /dev/null +++ b/nuclei-templates/cve-less/themes/blossom-spa-a9b48fe75d8b0cb9e851b9c9fd985412.yaml @@ -0,0 +1,58 @@ +id: blossom-spa-a9b48fe75d8b0cb9e851b9c9fd985412 + +info: + name: > + Blossom Spa <= 1.3.3 - Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5e54dbf9-a5d1-413d-96ac-93dd499c21a4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blossom-spa/" + google-query: inurl:"/wp-content/themes/blossom-spa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blossom-spa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blossom-spa/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blossom-spa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blue-memories-f021202130cf5324996d350595ae862c.yaml b/nuclei-templates/cve-less/themes/blue-memories-f021202130cf5324996d350595ae862c.yaml new file mode 100644 index 0000000000..0a3155e5bd --- /dev/null +++ b/nuclei-templates/cve-less/themes/blue-memories-f021202130cf5324996d350595ae862c.yaml @@ -0,0 +1,58 @@ +id: blue-memories-f021202130cf5324996d350595ae862c + +info: + name: > + Blue Memories <= 1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e292e704-4b98-4e95-ac25-29cedcf005c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/blue-memories/" + google-query: inurl:"/wp-content/themes/blue-memories/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,blue-memories,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/blue-memories/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "blue-memories" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/boldy-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/boldy-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..def3bfd60d --- /dev/null +++ b/nuclei-templates/cve-less/themes/boldy-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: boldy-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/boldy/" + google-query: inurl:"/wp-content/themes/boldy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,boldy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/boldy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "boldy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bolster-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/bolster-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..62b3b4340f --- /dev/null +++ b/nuclei-templates/cve-less/themes/bolster-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: bolster-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bolster/" + google-query: inurl:"/wp-content/themes/bolster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bolster,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bolster/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bolster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bonkers-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/bonkers-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..0c935794da --- /dev/null +++ b/nuclei-templates/cve-less/themes/bonkers-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: bonkers-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bonkers/" + google-query: inurl:"/wp-content/themes/bonkers/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bonkers,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bonkers/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bonkers" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bordeaux-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml b/nuclei-templates/cve-less/themes/bordeaux-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml new file mode 100644 index 0000000000..5c7bce6325 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bordeaux-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml @@ -0,0 +1,58 @@ +id: bordeaux-theme-d488c88c43dea5d67f8bd9aa864ebfd0 + +info: + name: > + Various Orange themes (Various Unspecified Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6897a8fe-c32e-430a-847c-23d1add2355d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bordeaux-theme/" + google-query: inurl:"/wp-content/themes/bordeaux-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bordeaux-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bordeaux-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bordeaux-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brain-power-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/brain-power-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..49cc31db91 --- /dev/null +++ b/nuclei-templates/cve-less/themes/brain-power-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: brain-power-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brain-power/" + google-query: inurl:"/wp-content/themes/brain-power/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brain-power,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brain-power/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brain-power" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brand-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/brand-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ae53a5095b --- /dev/null +++ b/nuclei-templates/cve-less/themes/brand-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: brand-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brand/" + google-query: inurl:"/wp-content/themes/brand/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brand,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brand/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brand" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brand-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/themes/brand-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..971e9a1631 --- /dev/null +++ b/nuclei-templates/cve-less/themes/brand-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: brand-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brand/" + google-query: inurl:"/wp-content/themes/brand/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brand,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brand/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brand" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bricks-006e2e470c53d4a4e5eb56e28322392e.yaml b/nuclei-templates/cve-less/themes/bricks-006e2e470c53d4a4e5eb56e28322392e.yaml new file mode 100644 index 0000000000..1cdc73f701 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bricks-006e2e470c53d4a4e5eb56e28322392e.yaml @@ -0,0 +1,58 @@ +id: bricks-006e2e470c53d4a4e5eb56e28322392e + +info: + name: > + Bricks <= 1.9.6 - Unauthenticated Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b97b1c86-22a4-462b-9140-55139cf02c7a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bricks/" + google-query: inurl:"/wp-content/themes/bricks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bricks,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bricks/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bricks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bricks-76570c8af26fd8add3788aed77d646fa.yaml b/nuclei-templates/cve-less/themes/bricks-76570c8af26fd8add3788aed77d646fa.yaml new file mode 100644 index 0000000000..5165985356 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bricks-76570c8af26fd8add3788aed77d646fa.yaml @@ -0,0 +1,58 @@ +id: bricks-76570c8af26fd8add3788aed77d646fa + +info: + name: > + Bricks 1.0 - 1.5.3 - Missing Authorization to Arbitrary Content Creation/Modification + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a711984-4eb2-4d96-b2b9-0ecd840679b1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bricks/" + google-query: inurl:"/wp-content/themes/bricks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bricks,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bricks/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bricks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0', '<= 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bricks-8d874ea95f55c0ec9bb8e08a17ec4807.yaml b/nuclei-templates/cve-less/themes/bricks-8d874ea95f55c0ec9bb8e08a17ec4807.yaml new file mode 100644 index 0000000000..e6fbffe7a1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bricks-8d874ea95f55c0ec9bb8e08a17ec4807.yaml @@ -0,0 +1,58 @@ +id: bricks-8d874ea95f55c0ec9bb8e08a17ec4807 + +info: + name: > + Bricks 1.2 - 1.5.3 - Remote Code Execution + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2471d06b-7d9a-41b9-b38c-3f40322d8a5b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bricks/" + google-query: inurl:"/wp-content/themes/bricks/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bricks,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bricks/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bricks" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.2', '<= 1.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bridge-24af70f4d05b151741440482fab416b5.yaml b/nuclei-templates/cve-less/themes/bridge-24af70f4d05b151741440482fab416b5.yaml new file mode 100644 index 0000000000..fac5ae22aa --- /dev/null +++ b/nuclei-templates/cve-less/themes/bridge-24af70f4d05b151741440482fab416b5.yaml @@ -0,0 +1,58 @@ +id: bridge-24af70f4d05b151741440482fab416b5 + +info: + name: > + Bridge Theme <= 18.2, Qode Instagram Widget <=2.0.1, Qode Twitter Feed <= 2.0.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1d2015b-86e8-4d0f-b095-f3917480ff15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bridge/" + google-query: inurl:"/wp-content/themes/bridge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bridge,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bridge/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bridge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 18.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bridge-c39e88fb98a263a4718fa22351cd75a3.yaml b/nuclei-templates/cve-less/themes/bridge-c39e88fb98a263a4718fa22351cd75a3.yaml new file mode 100644 index 0000000000..dc4afaef35 --- /dev/null +++ b/nuclei-templates/cve-less/themes/bridge-c39e88fb98a263a4718fa22351cd75a3.yaml @@ -0,0 +1,58 @@ +id: bridge-c39e88fb98a263a4718fa22351cd75a3 + +info: + name: > + Bridge - Creative Multipurpose WordPress Theme < 11.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1a1af528-79c6-4197-b247-9789b290a642?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bridge/" + google-query: inurl:"/wp-content/themes/bridge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bridge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bridge/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bridge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brightbox-de6a8f71d54a21ca8a8ec790aa7c8445.yaml b/nuclei-templates/cve-less/themes/brightbox-de6a8f71d54a21ca8a8ec790aa7c8445.yaml new file mode 100644 index 0000000000..0f83a87f17 --- /dev/null +++ b/nuclei-templates/cve-less/themes/brightbox-de6a8f71d54a21ca8a8ec790aa7c8445.yaml @@ -0,0 +1,58 @@ +id: brightbox-de6a8f71d54a21ca8a8ec790aa7c8445 + +info: + name: > + Brightbox <= (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a193392a-ef6d-4232-a8c9-c980bd369d5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brightbox/" + google-query: inurl:"/wp-content/themes/brightbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brightbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brightbox/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brightbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brilliance-72ccbc519dc7d87cb6145ad667cfc553.yaml b/nuclei-templates/cve-less/themes/brilliance-72ccbc519dc7d87cb6145ad667cfc553.yaml new file mode 100644 index 0000000000..038e88e8cb --- /dev/null +++ b/nuclei-templates/cve-less/themes/brilliance-72ccbc519dc7d87cb6145ad667cfc553.yaml @@ -0,0 +1,58 @@ +id: brilliance-72ccbc519dc7d87cb6145ad667cfc553 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Unauthenticated Plugin Activation/Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e4e989-8e55-4ea7-8f42-9f67cfab1168?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brilliance/" + google-query: inurl:"/wp-content/themes/brilliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brilliance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brilliance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brilliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brilliance-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/brilliance-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..99fe869694 --- /dev/null +++ b/nuclei-templates/cve-less/themes/brilliance-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: brilliance-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brilliance/" + google-query: inurl:"/wp-content/themes/brilliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brilliance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brilliance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brilliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brilliance-ee1a1b54258e473972fcc31462b15e8f.yaml b/nuclei-templates/cve-less/themes/brilliance-ee1a1b54258e473972fcc31462b15e8f.yaml new file mode 100644 index 0000000000..4bacfc2c9e --- /dev/null +++ b/nuclei-templates/cve-less/themes/brilliance-ee1a1b54258e473972fcc31462b15e8f.yaml @@ -0,0 +1,58 @@ +id: brilliance-ee1a1b54258e473972fcc31462b15e8f + +info: + name: > + Brilliance <= 1.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e5726c70-c2c7-45b9-bd03-38cf1320646a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brilliance/" + google-query: inurl:"/wp-content/themes/brilliance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brilliance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brilliance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brilliance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brisk-2ab21e22bdca9635ce4e964a4031d548.yaml b/nuclei-templates/cve-less/themes/brisk-2ab21e22bdca9635ce4e964a4031d548.yaml new file mode 100644 index 0000000000..b9f0ce634a --- /dev/null +++ b/nuclei-templates/cve-less/themes/brisk-2ab21e22bdca9635ce4e964a4031d548.yaml @@ -0,0 +1,58 @@ +id: brisk-2ab21e22bdca9635ce4e964a4031d548 + +info: + name: > + Brisk (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ebf9760d-b7c2-43c7-bfb0-dde96de3dcb9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brisk/" + google-query: inurl:"/wp-content/themes/brisk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brisk,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brisk/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brisk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brite-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/brite-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..2e19dda460 --- /dev/null +++ b/nuclei-templates/cve-less/themes/brite-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: brite-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brite/" + google-query: inurl:"/wp-content/themes/brite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/broadcast-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/broadcast-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..01be95cc6c --- /dev/null +++ b/nuclei-templates/cve-less/themes/broadcast-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: broadcast-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/broadcast-lite/" + google-query: inurl:"/wp-content/themes/broadcast-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,broadcast-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/broadcast-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broadcast-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/broadscope-30fe39ec377fc6748bfe3566282b5413.yaml b/nuclei-templates/cve-less/themes/broadscope-30fe39ec377fc6748bfe3566282b5413.yaml new file mode 100644 index 0000000000..82c74d4478 --- /dev/null +++ b/nuclei-templates/cve-less/themes/broadscope-30fe39ec377fc6748bfe3566282b5413.yaml @@ -0,0 +1,58 @@ +id: broadscope-30fe39ec377fc6748bfe3566282b5413 + +info: + name: > + Broadscope (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/af59102e-f029-4c7d-95ee-16b9dcef4827?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/broadscope/" + google-query: inurl:"/wp-content/themes/broadscope/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,broadscope,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/broadscope/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "broadscope" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brooklyn-145399e0c7a9d439e5ba93f1ed497004.yaml b/nuclei-templates/cve-less/themes/brooklyn-145399e0c7a9d439e5ba93f1ed497004.yaml new file mode 100644 index 0000000000..77d9895a85 --- /dev/null +++ b/nuclei-templates/cve-less/themes/brooklyn-145399e0c7a9d439e5ba93f1ed497004.yaml @@ -0,0 +1,58 @@ +id: brooklyn-145399e0c7a9d439e5ba93f1ed497004 + +info: + name: > + Brooklyn <= 4.9.7.6 - PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5dd962a5-ec0e-415f-8efa-91e78bb80d16?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brooklyn/" + google-query: inurl:"/wp-content/themes/brooklyn/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brooklyn,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brooklyn/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brooklyn" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brooklyn-fb3df7b0090a05c3bb2c9600778e1c86.yaml b/nuclei-templates/cve-less/themes/brooklyn-fb3df7b0090a05c3bb2c9600778e1c86.yaml new file mode 100644 index 0000000000..012b353c91 --- /dev/null +++ b/nuclei-templates/cve-less/themes/brooklyn-fb3df7b0090a05c3bb2c9600778e1c86.yaml @@ -0,0 +1,58 @@ +id: brooklyn-fb3df7b0090a05c3bb2c9600778e1c86 + +info: + name: > + Brooklyn <= 4.9.7.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/724d8382-cef3-4584-a255-c2ecc7c986b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brooklyn/" + google-query: inurl:"/wp-content/themes/brooklyn/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brooklyn,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brooklyn/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brooklyn" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9.7.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brovy-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/brovy-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..679e17f0f2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/brovy-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: brovy-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brovy/" + google-query: inurl:"/wp-content/themes/brovy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brovy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brovy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brovy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brovy-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/brovy-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..083599d2bb --- /dev/null +++ b/nuclei-templates/cve-less/themes/brovy-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: brovy-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brovy/" + google-query: inurl:"/wp-content/themes/brovy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brovy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brovy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brovy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/brovy-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/brovy-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..c7f60b1b4c --- /dev/null +++ b/nuclei-templates/cve-less/themes/brovy-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: brovy-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/brovy/" + google-query: inurl:"/wp-content/themes/brovy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,brovy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/brovy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "brovy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/buddyboss-theme-ab3814e3ae070036041f3fc37ac29f36.yaml b/nuclei-templates/cve-less/themes/buddyboss-theme-ab3814e3ae070036041f3fc37ac29f36.yaml new file mode 100644 index 0000000000..1fb8dfc60b --- /dev/null +++ b/nuclei-templates/cve-less/themes/buddyboss-theme-ab3814e3ae070036041f3fc37ac29f36.yaml @@ -0,0 +1,58 @@ +id: buddyboss-theme-ab3814e3ae070036041f3fc37ac29f36 + +info: + name: > + BuddyBoss Theme <= 2.4.60 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ccbeb69e-6476-42a6-86ac-723947c70301?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/buddyboss-theme/" + google-query: inurl:"/wp-content/themes/buddyboss-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,buddyboss-theme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/buddyboss-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buddyboss-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.60') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/builderchild-depot-2e6c4db554765f15e335810f248cb790.yaml b/nuclei-templates/cve-less/themes/builderchild-depot-2e6c4db554765f15e335810f248cb790.yaml new file mode 100644 index 0000000000..19c548c0ba --- /dev/null +++ b/nuclei-templates/cve-less/themes/builderchild-depot-2e6c4db554765f15e335810f248cb790.yaml @@ -0,0 +1,58 @@ +id: builderchild-depot-2e6c4db554765f15e335810f248cb790 + +info: + name: > + iThemes Builder Depot Theme < 5.0.30 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/063457b6-b02b-4f4c-b746-576b7b919e67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/BuilderChild-Depot/" + google-query: inurl:"/wp-content/themes/BuilderChild-Depot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,BuilderChild-Depot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/BuilderChild-Depot/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "BuilderChild-Depot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/builderchild-market-493e804a1e5431f2ca50d457edc4b8eb.yaml b/nuclei-templates/cve-less/themes/builderchild-market-493e804a1e5431f2ca50d457edc4b8eb.yaml new file mode 100644 index 0000000000..fd97f7fb19 --- /dev/null +++ b/nuclei-templates/cve-less/themes/builderchild-market-493e804a1e5431f2ca50d457edc4b8eb.yaml @@ -0,0 +1,58 @@ +id: builderchild-market-493e804a1e5431f2ca50d457edc4b8eb + +info: + name: > + Market < 5.1.27 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eb329862-8cfa-49a5-b9cb-908acc4182e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/BuilderChild-Market/" + google-query: inurl:"/wp-content/themes/BuilderChild-Market/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,BuilderChild-Market,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/BuilderChild-Market/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "BuilderChild-Market" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.1.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bulteno-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml b/nuclei-templates/cve-less/themes/bulteno-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml new file mode 100644 index 0000000000..7084eb719a --- /dev/null +++ b/nuclei-templates/cve-less/themes/bulteno-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml @@ -0,0 +1,58 @@ +id: bulteno-theme-d488c88c43dea5d67f8bd9aa864ebfd0 + +info: + name: > + Various Orange themes (Various Unspecified Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6897a8fe-c32e-430a-847c-23d1add2355d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bulteno-theme/" + google-query: inurl:"/wp-content/themes/bulteno-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bulteno-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bulteno-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bulteno-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/bunnypresslite-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/bunnypresslite-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..f7005c192e --- /dev/null +++ b/nuclei-templates/cve-less/themes/bunnypresslite-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: bunnypresslite-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bunnypresslite/" + google-query: inurl:"/wp-content/themes/bunnypresslite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bunnypresslite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bunnypresslite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bunnypresslite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/busicare-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/busicare-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..836c2699a2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/busicare-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: busicare-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/busicare/" + google-query: inurl:"/wp-content/themes/busicare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,busicare,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/busicare/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "busicare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/business-pro-958193ceafe9fa46f427a02590b8676e.yaml b/nuclei-templates/cve-less/themes/business-pro-958193ceafe9fa46f427a02590b8676e.yaml new file mode 100644 index 0000000000..e4d51a8b5d --- /dev/null +++ b/nuclei-templates/cve-less/themes/business-pro-958193ceafe9fa46f427a02590b8676e.yaml @@ -0,0 +1,58 @@ +id: business-pro-958193ceafe9fa46f427a02590b8676e + +info: + name: > + Business Pro <= 1.10.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bb97b95-fa6a-4566-b448-b774bb732455?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/business-pro/" + google-query: inurl:"/wp-content/themes/business-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,business-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/business-pro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.10.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/businessexpo-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/businessexpo-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..8e910b8bbc --- /dev/null +++ b/nuclei-templates/cve-less/themes/businessexpo-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: businessexpo-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/businessexpo/" + google-query: inurl:"/wp-content/themes/businessexpo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,businessexpo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/businessexpo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "businessexpo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/businesswp-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/businesswp-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..0a841b54e6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/businesswp-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: businesswp-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/businesswp/" + google-query: inurl:"/wp-content/themes/businesswp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,businesswp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/businesswp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "businesswp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/busiprof-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/busiprof-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..055a6e584c --- /dev/null +++ b/nuclei-templates/cve-less/themes/busiprof-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: busiprof-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/busiprof/" + google-query: inurl:"/wp-content/themes/busiprof/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,busiprof,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/busiprof/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "busiprof" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/buzzstore-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/buzzstore-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..c3f8fdfdc8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/buzzstore-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: buzzstore-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/buzzstore/" + google-query: inurl:"/wp-content/themes/buzzstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,buzzstore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/buzzstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buzzstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/buzzstore-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/buzzstore-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..2a250d4935 --- /dev/null +++ b/nuclei-templates/cve-less/themes/buzzstore-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: buzzstore-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/buzzstore/" + google-query: inurl:"/wp-content/themes/buzzstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,buzzstore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/buzzstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "buzzstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cactus-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/cactus-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..2435d5e683 --- /dev/null +++ b/nuclei-templates/cve-less/themes/cactus-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: cactus-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cactus/" + google-query: inurl:"/wp-content/themes/cactus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cactus,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cactus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cactus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cafe-bistro-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/cafe-bistro-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..db95012c7a --- /dev/null +++ b/nuclei-templates/cve-less/themes/cafe-bistro-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: cafe-bistro-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cafe-bistro/" + google-query: inurl:"/wp-content/themes/cafe-bistro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cafe-bistro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cafe-bistro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cafe-bistro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cakifo-02d6de68e2eb0c0f7215999509c086c8.yaml b/nuclei-templates/cve-less/themes/cakifo-02d6de68e2eb0c0f7215999509c086c8.yaml new file mode 100644 index 0000000000..3cd2cf7598 --- /dev/null +++ b/nuclei-templates/cve-less/themes/cakifo-02d6de68e2eb0c0f7215999509c086c8.yaml @@ -0,0 +1,58 @@ +id: cakifo-02d6de68e2eb0c0f7215999509c086c8 + +info: + name: > + Cakifo 1.0 - 1.6.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3742f2c5-55be-426c-8445-bf58eeebc74b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cakifo/" + google-query: inurl:"/wp-content/themes/cakifo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cakifo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cakifo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cakifo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0', '<= 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/calliope-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/calliope-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..3ce8ee8bee --- /dev/null +++ b/nuclei-templates/cve-less/themes/calliope-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: calliope-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/calliope/" + google-query: inurl:"/wp-content/themes/calliope/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,calliope,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/calliope/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "calliope" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.33') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/canvas-41077f62819cf65dd71bfb4c6e199325.yaml b/nuclei-templates/cve-less/themes/canvas-41077f62819cf65dd71bfb4c6e199325.yaml new file mode 100644 index 0000000000..a4fac213fb --- /dev/null +++ b/nuclei-templates/cve-less/themes/canvas-41077f62819cf65dd71bfb4c6e199325.yaml @@ -0,0 +1,58 @@ +id: canvas-41077f62819cf65dd71bfb4c6e199325 + +info: + name: > + WooThemes WooFramework < 5.3.10 - Remote Code Execution via Shortcodes + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0728e7ac-2091-41de-90a0-e231c4b99ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/canvas/" + google-query: inurl:"/wp-content/themes/canvas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,canvas,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/canvas/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "canvas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/car-repair-service-619d74f5efad50bb0716462ce5537ea9.yaml b/nuclei-templates/cve-less/themes/car-repair-service-619d74f5efad50bb0716462ce5537ea9.yaml new file mode 100644 index 0000000000..bd390efa61 --- /dev/null +++ b/nuclei-templates/cve-less/themes/car-repair-service-619d74f5efad50bb0716462ce5537ea9.yaml @@ -0,0 +1,58 @@ +id: car-repair-service-619d74f5efad50bb0716462ce5537ea9 + +info: + name: > + Car Repair Services & Auto Mechanic < 4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c799a373-3c0e-4b77-9e51-0e6bd2ab4b7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/car-repair-service/" + google-query: inurl:"/wp-content/themes/car-repair-service/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,car-repair-service,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/car-repair-service/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "car-repair-service" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cardealer-77435d9114ce158ef3aadb96d9fd0449.yaml b/nuclei-templates/cve-less/themes/cardealer-77435d9114ce158ef3aadb96d9fd0449.yaml new file mode 100644 index 0000000000..01c1cf0840 --- /dev/null +++ b/nuclei-templates/cve-less/themes/cardealer-77435d9114ce158ef3aadb96d9fd0449.yaml @@ -0,0 +1,58 @@ +id: cardealer-77435d9114ce158ef3aadb96d9fd0449 + +info: + name: > + Car Dealer Automotive WordPress Theme < 1.1.9 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c39fded-8b32-463f-9d22-adb371ca217e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cardealer/" + google-query: inurl:"/wp-content/themes/cardealer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cardealer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cardealer/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cardealer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-0b2658951b7cfc28db2aef3263c845a3.yaml b/nuclei-templates/cve-less/themes/careerfy-0b2658951b7cfc28db2aef3263c845a3.yaml new file mode 100644 index 0000000000..0d75e105b5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-0b2658951b7cfc28db2aef3263c845a3.yaml @@ -0,0 +1,58 @@ +id: careerfy-0b2658951b7cfc28db2aef3263c845a3 + +info: + name: > + Careerfy < 3.9.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e8e42f-8ee5-40ff-934f-b7d580bc5548?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-0cc827bd1e5b71473ebe52fdbadbc377.yaml b/nuclei-templates/cve-less/themes/careerfy-0cc827bd1e5b71473ebe52fdbadbc377.yaml new file mode 100644 index 0000000000..d18cf7b837 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-0cc827bd1e5b71473ebe52fdbadbc377.yaml @@ -0,0 +1,58 @@ +id: careerfy-0cc827bd1e5b71473ebe52fdbadbc377 + +info: + name: > + Careerfy - Job Board WordPress Theme <= 3.9.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23b75226-e7c9-4b22-aa1b-1a7d400856d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-2f7c99cf9aa6337e1f437507a7c03dd4.yaml b/nuclei-templates/cve-less/themes/careerfy-2f7c99cf9aa6337e1f437507a7c03dd4.yaml new file mode 100644 index 0000000000..1a30f7ab73 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-2f7c99cf9aa6337e1f437507a7c03dd4.yaml @@ -0,0 +1,58 @@ +id: careerfy-2f7c99cf9aa6337e1f437507a7c03dd4 + +info: + name: > + Careerfy - Job Board WordPress Theme <= 3.9.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eedada2a-5543-46b1-a3d2-5e5b86a05ff9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-6e465dc97257e1344df72e8224803afb.yaml b/nuclei-templates/cve-less/themes/careerfy-6e465dc97257e1344df72e8224803afb.yaml new file mode 100644 index 0000000000..c922859bc9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-6e465dc97257e1344df72e8224803afb.yaml @@ -0,0 +1,58 @@ +id: careerfy-6e465dc97257e1344df72e8224803afb + +info: + name: > + Careerfy <= 7.0 - Cross-Site Request Forgery and Missing Authorization + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e93ad115-1a0b-4d33-b89f-13e39508c9b0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-70111aaef33d8dec5c55f5b989914270.yaml b/nuclei-templates/cve-less/themes/careerfy-70111aaef33d8dec5c55f5b989914270.yaml new file mode 100644 index 0000000000..538b3125b4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-70111aaef33d8dec5c55f5b989914270.yaml @@ -0,0 +1,58 @@ +id: careerfy-70111aaef33d8dec5c55f5b989914270 + +info: + name: > + Careerfy - Job Board WordPress Theme <= 3.9.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dd6f9d2-e6c2-49fa-a4bb-1f2126809a06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-89809dfbca4560d57d80e19c74e319fc.yaml b/nuclei-templates/cve-less/themes/careerfy-89809dfbca4560d57d80e19c74e319fc.yaml new file mode 100644 index 0000000000..2a017141e8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-89809dfbca4560d57d80e19c74e319fc.yaml @@ -0,0 +1,58 @@ +id: careerfy-89809dfbca4560d57d80e19c74e319fc + +info: + name: > + Careerfy <= 4.2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77b7cf5d-2dad-4a4f-ae48-f1ab86065c2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-93a5155d0c6c821f6dac512fe074d8b8.yaml b/nuclei-templates/cve-less/themes/careerfy-93a5155d0c6c821f6dac512fe074d8b8.yaml new file mode 100644 index 0000000000..610261ed8a --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-93a5155d0c6c821f6dac512fe074d8b8.yaml @@ -0,0 +1,58 @@ +id: careerfy-93a5155d0c6c821f6dac512fe074d8b8 + +info: + name: > + Careerfy <= 4.0.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63df43cc-7f84-4316-80fc-b0242b9f454c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-d814bf89eef506e207923233b9147995.yaml b/nuclei-templates/cve-less/themes/careerfy-d814bf89eef506e207923233b9147995.yaml new file mode 100644 index 0000000000..bfb07e0ec2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-d814bf89eef506e207923233b9147995.yaml @@ -0,0 +1,58 @@ +id: careerfy-d814bf89eef506e207923233b9147995 + +info: + name: > + Careerfy - Job Board WordPress Theme <= 3.9.0 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2002fa81-3a4f-4a88-ba52-ed06969d51a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerfy-f287f6d03ce957fcb674730856528833.yaml b/nuclei-templates/cve-less/themes/careerfy-f287f6d03ce957fcb674730856528833.yaml new file mode 100644 index 0000000000..3f16f20a0c --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerfy-f287f6d03ce957fcb674730856528833.yaml @@ -0,0 +1,58 @@ +id: careerfy-f287f6d03ce957fcb674730856528833 + +info: + name: > + Careerfy <= 4.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d153095-9f72-438e-84bb-07a5ad7bdb48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerfy/" + google-query: inurl:"/wp-content/themes/careerfy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerfy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerfy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerfy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careerup-3dadecf90476b3cb59a265c7ae6d0c01.yaml b/nuclei-templates/cve-less/themes/careerup-3dadecf90476b3cb59a265c7ae6d0c01.yaml new file mode 100644 index 0000000000..e1ecf41180 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careerup-3dadecf90476b3cb59a265c7ae6d0c01.yaml @@ -0,0 +1,58 @@ +id: careerup-3dadecf90476b3cb59a265c7ae6d0c01 + +info: + name: > + CareerUp < 2.3.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a4ef9e6-2299-4024-a6a9-482199ca06db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careerup/" + google-query: inurl:"/wp-content/themes/careerup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careerup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careerup/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careerup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/careplus-ead8215e6f4d6c583e6aa46b74460457.yaml b/nuclei-templates/cve-less/themes/careplus-ead8215e6f4d6c583e6aa46b74460457.yaml new file mode 100644 index 0000000000..c2bf4ae416 --- /dev/null +++ b/nuclei-templates/cve-less/themes/careplus-ead8215e6f4d6c583e6aa46b74460457.yaml @@ -0,0 +1,58 @@ +id: careplus-ead8215e6f4d6c583e6aa46b74460457 + +info: + name: > + CarePlus - Health & Medical Responsive WordPress Theme <= 1.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a514558c-4ccc-42cf-920e-7c73c80df28e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/careplus/" + google-query: inurl:"/wp-content/themes/careplus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,careplus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/careplus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "careplus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/carspot-67f647f4edf0dc956943ef2a579b4258.yaml b/nuclei-templates/cve-less/themes/carspot-67f647f4edf0dc956943ef2a579b4258.yaml new file mode 100644 index 0000000000..78560f5e27 --- /dev/null +++ b/nuclei-templates/cve-less/themes/carspot-67f647f4edf0dc956943ef2a579b4258.yaml @@ -0,0 +1,58 @@ +id: carspot-67f647f4edf0dc956943ef2a579b4258 + +info: + name: > + CarSpot – Dealership Wordpress Classified Theme < 2.1.7 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1ac58649-4c1a-4c2c-a94b-a3cf08ecb4df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/carspot/" + google-query: inurl:"/wp-content/themes/carspot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,carspot,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/carspot/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carspot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/carspot-8b93cde54b567f48c75c8a61eb4877a4.yaml b/nuclei-templates/cve-less/themes/carspot-8b93cde54b567f48c75c8a61eb4877a4.yaml new file mode 100644 index 0000000000..85163fdf16 --- /dev/null +++ b/nuclei-templates/cve-less/themes/carspot-8b93cde54b567f48c75c8a61eb4877a4.yaml @@ -0,0 +1,58 @@ +id: carspot-8b93cde54b567f48c75c8a61eb4877a4 + +info: + name: > + CarSpot – Dealership Wordpress Classified Theme <= 2.2.3 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4eea120e-839e-4b01-a5a8-af21f5ab99f5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/carspot/" + google-query: inurl:"/wp-content/themes/carspot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,carspot,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/carspot/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carspot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/carspot-a1557c2cdb71bc0d86215f36aee8a08b.yaml b/nuclei-templates/cve-less/themes/carspot-a1557c2cdb71bc0d86215f36aee8a08b.yaml new file mode 100644 index 0000000000..7dc3800123 --- /dev/null +++ b/nuclei-templates/cve-less/themes/carspot-a1557c2cdb71bc0d86215f36aee8a08b.yaml @@ -0,0 +1,58 @@ +id: carspot-a1557c2cdb71bc0d86215f36aee8a08b + +info: + name: > + CarSpot – Dealership Wordpress Classified Theme <= 2.2.3 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2767fcd9-dfc0-4dfa-83d0-b97c59c2cac2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/carspot/" + google-query: inurl:"/wp-content/themes/carspot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,carspot,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/carspot/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "carspot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/caulk-d57e6f59d0c7b9d3a924383e2c688a1c.yaml b/nuclei-templates/cve-less/themes/caulk-d57e6f59d0c7b9d3a924383e2c688a1c.yaml new file mode 100644 index 0000000000..4fff86a7fe --- /dev/null +++ b/nuclei-templates/cve-less/themes/caulk-d57e6f59d0c7b9d3a924383e2c688a1c.yaml @@ -0,0 +1,58 @@ +id: caulk-d57e6f59d0c7b9d3a924383e2c688a1c + +info: + name: > + Caulk (Unknown Versions) - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d8ae431-04cd-49e4-a5ea-ea7b1263c836?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/caulk/" + google-query: inurl:"/wp-content/themes/caulk/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,caulk,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/caulk/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "caulk" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/chameleon-39069bbb190265d3be495e952f317246.yaml b/nuclei-templates/cve-less/themes/chameleon-39069bbb190265d3be495e952f317246.yaml new file mode 100644 index 0000000000..9b9e56e743 --- /dev/null +++ b/nuclei-templates/cve-less/themes/chameleon-39069bbb190265d3be495e952f317246.yaml @@ -0,0 +1,58 @@ +id: chameleon-39069bbb190265d3be495e952f317246 + +info: + name: > + Chameleon Theme < 3.9 - Arbitrary File Uploads + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/403c881c-b687-4e7e-8e77-a55203cfde96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/chameleon/" + google-query: inurl:"/wp-content/themes/chameleon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,chameleon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/chameleon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chameleon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/chankhe-cf02434258a49a4a00aa24a96c05817d.yaml b/nuclei-templates/cve-less/themes/chankhe-cf02434258a49a4a00aa24a96c05817d.yaml new file mode 100644 index 0000000000..bab001bd92 --- /dev/null +++ b/nuclei-templates/cve-less/themes/chankhe-cf02434258a49a4a00aa24a96c05817d.yaml @@ -0,0 +1,58 @@ +id: chankhe-cf02434258a49a4a00aa24a96c05817d + +info: + name: > + Chankhe <= 1.0.5 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efa4b67c-1bb8-413a-8cb8-039168b0b586?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/chankhe/" + google-query: inurl:"/wp-content/themes/chankhe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,chankhe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/chankhe/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "chankhe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/choices-8f802c8a8b5a882c2b86d1de293231a6.yaml b/nuclei-templates/cve-less/themes/choices-8f802c8a8b5a882c2b86d1de293231a6.yaml new file mode 100644 index 0000000000..9cb6dd175a --- /dev/null +++ b/nuclei-templates/cve-less/themes/choices-8f802c8a8b5a882c2b86d1de293231a6.yaml @@ -0,0 +1,58 @@ +id: choices-8f802c8a8b5a882c2b86d1de293231a6 + +info: + name: > + Choices (All Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7921c896-dca4-460d-90dc-458eb0d82334?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/choices/" + google-query: inurl:"/wp-content/themes/choices/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,choices,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/choices/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "choices" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/churchope-1a60867207919ae0076f781fa334aeef.yaml b/nuclei-templates/cve-less/themes/churchope-1a60867207919ae0076f781fa334aeef.yaml new file mode 100644 index 0000000000..d2c1534c2e --- /dev/null +++ b/nuclei-templates/cve-less/themes/churchope-1a60867207919ae0076f781fa334aeef.yaml @@ -0,0 +1,58 @@ +id: churchope-1a60867207919ae0076f781fa334aeef + +info: + name: > + ChurcHope <= 2.1 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5c0c64c-7105-4bc3-b42d-89cfa44d02b9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/churchope/" + google-query: inurl:"/wp-content/themes/churchope/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,churchope,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/churchope/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "churchope" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/citybook-17f6998fdf35be8a6349776a3309aedc.yaml b/nuclei-templates/cve-less/themes/citybook-17f6998fdf35be8a6349776a3309aedc.yaml new file mode 100644 index 0000000000..313a91af43 --- /dev/null +++ b/nuclei-templates/cve-less/themes/citybook-17f6998fdf35be8a6349776a3309aedc.yaml @@ -0,0 +1,58 @@ +id: citybook-17f6998fdf35be8a6349776a3309aedc + +info: + name: > + CTHthemes CityBook < 2.3.4, TownHub < 1.0.6, EasyBook < 1.2.2 Themes - Authenticated Post Deleition via IDOR + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08eb1d49-9928-43f8-97fc-14105e3a4a25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,citybook,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/citybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/citybook-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml b/nuclei-templates/cve-less/themes/citybook-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml new file mode 100644 index 0000000000..962e971047 --- /dev/null +++ b/nuclei-templates/cve-less/themes/citybook-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml @@ -0,0 +1,58 @@ +id: citybook-8b6ac4c7233f8f6a37118bbf7ac73ad8 + +info: + name: > + CTHthemes CityBook <= 2.3.3, TownHub <= 1.0.5, and EasyBook <= 1.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/788e1c5c-67a9-4b06-a2cf-15c980e83618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,citybook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/citybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/citybook-a31de8d5a2ca016a785502d82ebaaa83.yaml b/nuclei-templates/cve-less/themes/citybook-a31de8d5a2ca016a785502d82ebaaa83.yaml new file mode 100644 index 0000000000..b423741c3c --- /dev/null +++ b/nuclei-templates/cve-less/themes/citybook-a31de8d5a2ca016a785502d82ebaaa83.yaml @@ -0,0 +1,58 @@ +id: citybook-a31de8d5a2ca016a785502d82ebaaa83 + +info: + name: > + CityBook <= 2.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/722d3a5e-40dc-4153-b8ce-4a94ae391896?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,citybook,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/citybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/citybook-be3f332add5d9ce678efc86e37a29e03.yaml b/nuclei-templates/cve-less/themes/citybook-be3f332add5d9ce678efc86e37a29e03.yaml new file mode 100644 index 0000000000..307ecf03a9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/citybook-be3f332add5d9ce678efc86e37a29e03.yaml @@ -0,0 +1,58 @@ +id: citybook-be3f332add5d9ce678efc86e37a29e03 + +info: + name: > + CTHthemes CityBook <= 2.3.3, TownHub <= 1.0.5, and EasyBook <= 1.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e292a1f-d475-4c52-b790-b5215e1870ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,citybook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/citybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/citybook-f5204789b3d63c1e5dd223fef5d1ac5d.yaml b/nuclei-templates/cve-less/themes/citybook-f5204789b3d63c1e5dd223fef5d1ac5d.yaml new file mode 100644 index 0000000000..e80d03706a --- /dev/null +++ b/nuclei-templates/cve-less/themes/citybook-f5204789b3d63c1e5dd223fef5d1ac5d.yaml @@ -0,0 +1,58 @@ +id: citybook-f5204789b3d63c1e5dd223fef5d1ac5d + +info: + name: > + CTHthemes CityBook Theme < 2.3.4, TownHub Theme < 1.0.6, EasyBook Theme < 1.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b51a7670-9fa6-4df9-bef6-c7ebe6b09c5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,citybook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/citybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/citylogic-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/citylogic-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..3684e809f7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/citylogic-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: citylogic-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/citylogic/" + google-query: inurl:"/wp-content/themes/citylogic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,citylogic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/citylogic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "citylogic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.30') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/classic-7cba36ac5159d909041a39ae02e640fa.yaml b/nuclei-templates/cve-less/themes/classic-7cba36ac5159d909041a39ae02e640fa.yaml new file mode 100644 index 0000000000..b4520f84e6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/classic-7cba36ac5159d909041a39ae02e640fa.yaml @@ -0,0 +1,58 @@ +id: classic-7cba36ac5159d909041a39ae02e640fa + +info: + name: > + Classic <= 1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b44a4d74-5c2b-454a-992a-74a3a71fa5dd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/classic/" + google-query: inurl:"/wp-content/themes/classic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,classic,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/classic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/classima-94f85d394521a13053659cf48cf14634.yaml b/nuclei-templates/cve-less/themes/classima-94f85d394521a13053659cf48cf14634.yaml new file mode 100644 index 0000000000..7a31175add --- /dev/null +++ b/nuclei-templates/cve-less/themes/classima-94f85d394521a13053659cf48cf14634.yaml @@ -0,0 +1,58 @@ +id: classima-94f85d394521a13053659cf48cf14634 + +info: + name: > + Classima < 2.1.11 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4cfee2e2-3486-4be8-954f-6d7f9b6d54ec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/classima/" + google-query: inurl:"/wp-content/themes/classima/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,classima,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/classima/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classima" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/classipress-376edc97e45ef94c79a753de3d636245.yaml b/nuclei-templates/cve-less/themes/classipress-376edc97e45ef94c79a753de3d636245.yaml new file mode 100644 index 0000000000..1e71c4f8d0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/classipress-376edc97e45ef94c79a753de3d636245.yaml @@ -0,0 +1,58 @@ +id: classipress-376edc97e45ef94c79a753de3d636245 + +info: + name: > + Classipress <= 3.1.4 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7af32d7b-3832-4192-bc31-b4ba1f419668?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/classipress/" + google-query: inurl:"/wp-content/themes/classipress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,classipress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/classipress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "classipress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/clockstone-1fd636290ae799c72ab0c32a97e71316.yaml b/nuclei-templates/cve-less/themes/clockstone-1fd636290ae799c72ab0c32a97e71316.yaml new file mode 100644 index 0000000000..9d52e1db07 --- /dev/null +++ b/nuclei-templates/cve-less/themes/clockstone-1fd636290ae799c72ab0c32a97e71316.yaml @@ -0,0 +1,58 @@ +id: clockstone-1fd636290ae799c72ab0c32a97e71316 + +info: + name: > + Clockstone <= 1.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eee9d564-5d52-47fa-a6a5-b908bb64a2ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/clockstone/" + google-query: inurl:"/wp-content/themes/clockstone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,clockstone,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/clockstone/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clockstone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/clotya-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml b/nuclei-templates/cve-less/themes/clotya-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml new file mode 100644 index 0000000000..ff57752a9e --- /dev/null +++ b/nuclei-templates/cve-less/themes/clotya-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml @@ -0,0 +1,58 @@ +id: clotya-0ed3cd48ec0b8d5d59c0c2a69ba7db3d + +info: + name: > + Multiple Themes by KlbTheme <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d5036a-c756-47a6-b071-c393f8a6ce5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/clotya/" + google-query: inurl:"/wp-content/themes/clotya/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,clotya,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/clotya/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "clotya" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cloudpress-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/cloudpress-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..4991d90b4b --- /dev/null +++ b/nuclei-templates/cve-less/themes/cloudpress-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: cloudpress-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cloudpress/" + google-query: inurl:"/wp-content/themes/cloudpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cloudpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cloudpress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cloudpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/club-theme-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/club-theme-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..7f164d0d4a --- /dev/null +++ b/nuclei-templates/cve-less/themes/club-theme-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: club-theme-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/club-theme/" + google-query: inurl:"/wp-content/themes/club-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,club-theme,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/club-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "club-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/coalition-fb64a0398d930ef57cb315100ba26973.yaml b/nuclei-templates/cve-less/themes/coalition-fb64a0398d930ef57cb315100ba26973.yaml new file mode 100644 index 0000000000..fe0fc4969a --- /dev/null +++ b/nuclei-templates/cve-less/themes/coalition-fb64a0398d930ef57cb315100ba26973.yaml @@ -0,0 +1,58 @@ +id: coalition-fb64a0398d930ef57cb315100ba26973 + +info: + name: > + Coalition (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b06667f-cda1-4177-b168-c7d26a0cd815?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/coalition/" + google-query: inurl:"/wp-content/themes/coalition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,coalition,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/coalition/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coalition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/coldfusion-01b7472afbbdd4ea1b26eb8768b12686.yaml b/nuclei-templates/cve-less/themes/coldfusion-01b7472afbbdd4ea1b26eb8768b12686.yaml new file mode 100644 index 0000000000..e7ed2a9ce0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/coldfusion-01b7472afbbdd4ea1b26eb8768b12686.yaml @@ -0,0 +1,58 @@ +id: coldfusion-01b7472afbbdd4ea1b26eb8768b12686 + +info: + name: > + ColdFusion Responsive Fullscreen Video Image Audio Theme < 1.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4b71893-b0fd-476e-aa93-5f0b239e8301?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/coldfusion/" + google-query: inurl:"/wp-content/themes/coldfusion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,coldfusion,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/coldfusion/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "coldfusion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colibri-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/colibri-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..8ace598b0a --- /dev/null +++ b/nuclei-templates/cve-less/themes/colibri-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: colibri-wp-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colibri-wp/" + google-query: inurl:"/wp-content/themes/colibri-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colibri-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colibri-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colibri-wp-7b784615e846271087f6cdcbcbcd3d70.yaml b/nuclei-templates/cve-less/themes/colibri-wp-7b784615e846271087f6cdcbcbcd3d70.yaml new file mode 100644 index 0000000000..a064b822a3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/colibri-wp-7b784615e846271087f6cdcbcbcd3d70.yaml @@ -0,0 +1,58 @@ +id: colibri-wp-7b784615e846271087f6cdcbcbcd3d70 + +info: + name: > + Colibri WP <= 1.0.94 - Cross-Site Request Forgery to Limited Plugin Installation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db56844f-9988-4f6a-ba1d-f190ff009f2b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colibri-wp/" + google-query: inurl:"/wp-content/themes/colibri-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colibri-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colibri-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colibri-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.94') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/college-4790b4ad8b25152cb39533647a69d638.yaml b/nuclei-templates/cve-less/themes/college-4790b4ad8b25152cb39533647a69d638.yaml new file mode 100644 index 0000000000..a09b196240 --- /dev/null +++ b/nuclei-templates/cve-less/themes/college-4790b4ad8b25152cb39533647a69d638.yaml @@ -0,0 +1,58 @@ +id: college-4790b4ad8b25152cb39533647a69d638 + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting via Search Field + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/32253923-ffec-4312-bcdf-06c5aed77d30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/college/" + google-query: inurl:"/wp-content/themes/college/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,college,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/college/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "college" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colorbold-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/colorbold-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..9b2ca87277 --- /dev/null +++ b/nuclei-templates/cve-less/themes/colorbold-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: colorbold-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colorbold/" + google-query: inurl:"/wp-content/themes/colorbold/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colorbold,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colorbold/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colorbold" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colormag-15626a5f31201ec9a6bcc2f5d39038c5.yaml b/nuclei-templates/cve-less/themes/colormag-15626a5f31201ec9a6bcc2f5d39038c5.yaml new file mode 100644 index 0000000000..af40f8f6cb --- /dev/null +++ b/nuclei-templates/cve-less/themes/colormag-15626a5f31201ec9a6bcc2f5d39038c5.yaml @@ -0,0 +1,58 @@ +id: colormag-15626a5f31201ec9a6bcc2f5d39038c5 + +info: + name: > + ColorMag <= 3.1.2 - Missing Authorization to Arbitrary Plugin Installation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e982d457-29db-468f-88c3-5afe04002dcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colormag/" + google-query: inurl:"/wp-content/themes/colormag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colormag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colormag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colormag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colormag-be833eb15318e91b50173179ef1ced63.yaml b/nuclei-templates/cve-less/themes/colormag-be833eb15318e91b50173179ef1ced63.yaml new file mode 100644 index 0000000000..06d474256b --- /dev/null +++ b/nuclei-templates/cve-less/themes/colormag-be833eb15318e91b50173179ef1ced63.yaml @@ -0,0 +1,58 @@ +id: colormag-be833eb15318e91b50173179ef1ced63 + +info: + name: > + ColorMag <= 3.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Display Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4b44d89-6f1e-4a23-91ea-e79fc3221183?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colormag/" + google-query: inurl:"/wp-content/themes/colormag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colormag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colormag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colormag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colormix-b4955c7ae6a4cb6cbe657aa114b2de30.yaml b/nuclei-templates/cve-less/themes/colormix-b4955c7ae6a4cb6cbe657aa114b2de30.yaml new file mode 100644 index 0000000000..f419795f14 --- /dev/null +++ b/nuclei-templates/cve-less/themes/colormix-b4955c7ae6a4cb6cbe657aa114b2de30.yaml @@ -0,0 +1,58 @@ +id: colormix-b4955c7ae6a4cb6cbe657aa114b2de30 + +info: + name: > + Colormix (All Versions) - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b50f98ca-6a51-4de8-9e89-004532ba8f96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colormix/" + google-query: inurl:"/wp-content/themes/colormix/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colormix,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colormix/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colormix" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colornews-a2599bd3c91638fd59172f5a65248fdd.yaml b/nuclei-templates/cve-less/themes/colornews-a2599bd3c91638fd59172f5a65248fdd.yaml new file mode 100644 index 0000000000..5791ecfbd5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/colornews-a2599bd3c91638fd59172f5a65248fdd.yaml @@ -0,0 +1,58 @@ +id: colornews-a2599bd3c91638fd59172f5a65248fdd + +info: + name: > + ColorNews <= 1.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84c74c68-619f-4372-8abe-36c1b8eca858?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colornews/" + google-query: inurl:"/wp-content/themes/colornews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colornews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colornews/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colornews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colorway-0b548a7717c352b81e5b3026850fe79e.yaml b/nuclei-templates/cve-less/themes/colorway-0b548a7717c352b81e5b3026850fe79e.yaml new file mode 100644 index 0000000000..a636f15f01 --- /dev/null +++ b/nuclei-templates/cve-less/themes/colorway-0b548a7717c352b81e5b3026850fe79e.yaml @@ -0,0 +1,58 @@ +id: colorway-0b548a7717c352b81e5b3026850fe79e + +info: + name: > + ColorWay <= 4.2.3 - Cross Site Request Forgery + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ecfa530c-a164-4215-b68a-7be81be3fd48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colorway/" + google-query: inurl:"/wp-content/themes/colorway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colorway,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colorway/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colorway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colorway-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/colorway-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..a237c4f098 --- /dev/null +++ b/nuclei-templates/cve-less/themes/colorway-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: colorway-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colorway/" + google-query: inurl:"/wp-content/themes/colorway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colorway,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colorway/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colorway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/colorway-eec026409b2ce5ae4162f07361f714bc.yaml b/nuclei-templates/cve-less/themes/colorway-eec026409b2ce5ae4162f07361f714bc.yaml new file mode 100644 index 0000000000..9833beb9c0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/colorway-eec026409b2ce5ae4162f07361f714bc.yaml @@ -0,0 +1,58 @@ +id: colorway-eec026409b2ce5ae4162f07361f714bc + +info: + name: > + ColorWay <= 3.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edd1f4f9-c0d7-4b7b-bb5e-7388e0935e32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/colorway/" + google-query: inurl:"/wp-content/themes/colorway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,colorway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/colorway/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "colorway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/commodore-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/themes/commodore-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..8d661097a5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/commodore-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: commodore-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/commodore/" + google-query: inurl:"/wp-content/themes/commodore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,commodore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/commodore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "commodore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/construct-80688e6bb1e67826e5659821551b9b07.yaml b/nuclei-templates/cve-less/themes/construct-80688e6bb1e67826e5659821551b9b07.yaml new file mode 100644 index 0000000000..ac4788fecb --- /dev/null +++ b/nuclei-templates/cve-less/themes/construct-80688e6bb1e67826e5659821551b9b07.yaml @@ -0,0 +1,58 @@ +id: construct-80688e6bb1e67826e5659821551b9b07 + +info: + name: > + Construct <= 1.4 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b9e037d-30bd-479b-9c4f-4c9082a04e08?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/construct/" + google-query: inurl:"/wp-content/themes/construct/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,construct,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/construct/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "construct" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/construct-e0af7f9c14f46c6865579ec474c8422f.yaml b/nuclei-templates/cve-less/themes/construct-e0af7f9c14f46c6865579ec474c8422f.yaml new file mode 100644 index 0000000000..aba71e7372 --- /dev/null +++ b/nuclei-templates/cve-less/themes/construct-e0af7f9c14f46c6865579ec474c8422f.yaml @@ -0,0 +1,58 @@ +id: construct-e0af7f9c14f46c6865579ec474c8422f + +info: + name: > + Construct <= 1.4 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06dcb84f-8293-403d-a3f2-7c5bea7aaae3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/construct/" + google-query: inurl:"/wp-content/themes/construct/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,construct,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/construct/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "construct" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/construction-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/construction-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..da96d382ed --- /dev/null +++ b/nuclei-templates/cve-less/themes/construction-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: construction-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/construction-lite/" + google-query: inurl:"/wp-content/themes/construction-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,construction-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/construction-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "construction-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/construction-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/construction-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..3b27fd5391 --- /dev/null +++ b/nuclei-templates/cve-less/themes/construction-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: construction-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/construction-lite/" + google-query: inurl:"/wp-content/themes/construction-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,construction-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/construction-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "construction-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/construction-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/construction-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..f6b6040c8a --- /dev/null +++ b/nuclei-templates/cve-less/themes/construction-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: construction-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/construction-lite/" + google-query: inurl:"/wp-content/themes/construction-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,construction-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/construction-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "construction-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/consultera-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/consultera-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..39918ade38 --- /dev/null +++ b/nuclei-templates/cve-less/themes/consultera-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: consultera-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/consultera/" + google-query: inurl:"/wp-content/themes/consultera/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,consultera,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/consultera/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "consultera" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/consultpress-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/consultpress-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..4d1b05c417 --- /dev/null +++ b/nuclei-templates/cve-less/themes/consultpress-lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: consultpress-lite-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/consultpress-lite/" + google-query: inurl:"/wp-content/themes/consultpress-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,consultpress-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/consultpress-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "consultpress-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/consultpress-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/themes/consultpress-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..897faa3f34 --- /dev/null +++ b/nuclei-templates/cve-less/themes/consultpress-lite-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: consultpress-lite-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/consultpress-lite/" + google-query: inurl:"/wp-content/themes/consultpress-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,consultpress-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/consultpress-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "consultpress-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/consultstreet-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/consultstreet-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..cd0207d4dd --- /dev/null +++ b/nuclei-templates/cve-less/themes/consultstreet-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: consultstreet-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/consultstreet/" + google-query: inurl:"/wp-content/themes/consultstreet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,consultstreet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/consultstreet/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "consultstreet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cordobo-green-park-c96b02624922c50381a023e57cd89cf7.yaml b/nuclei-templates/cve-less/themes/cordobo-green-park-c96b02624922c50381a023e57cd89cf7.yaml new file mode 100644 index 0000000000..07be92091d --- /dev/null +++ b/nuclei-templates/cve-less/themes/cordobo-green-park-c96b02624922c50381a023e57cd89cf7.yaml @@ -0,0 +1,58 @@ +id: cordobo-green-park-c96b02624922c50381a023e57cd89cf7 + +info: + name: > + Cordobo Green Park (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df9ad765-dc7b-4da6-951e-045274caeaae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cordobo-green-park/" + google-query: inurl:"/wp-content/themes/cordobo-green-park/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cordobo-green-park,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cordobo-green-park/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cordobo-green-park" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/corona-6fd6dbbc58f038d409e478e2b51e5038.yaml b/nuclei-templates/cve-less/themes/corona-6fd6dbbc58f038d409e478e2b51e5038.yaml new file mode 100644 index 0000000000..51c535ff70 --- /dev/null +++ b/nuclei-templates/cve-less/themes/corona-6fd6dbbc58f038d409e478e2b51e5038.yaml @@ -0,0 +1,58 @@ +id: corona-6fd6dbbc58f038d409e478e2b51e5038 + +info: + name: > + Corona (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf2d14ff-d02a-4bed-9604-ff2489d4bef9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/corona/" + google-query: inurl:"/wp-content/themes/corona/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,corona,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/corona/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "corona" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/corsa-32eb01ee606ecc19d89dc769776b1c92.yaml b/nuclei-templates/cve-less/themes/corsa-32eb01ee606ecc19d89dc769776b1c92.yaml new file mode 100644 index 0000000000..2cc22457d4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/corsa-32eb01ee606ecc19d89dc769776b1c92.yaml @@ -0,0 +1,58 @@ +id: corsa-32eb01ee606ecc19d89dc769776b1c92 + +info: + name: > + Corsa Theme <= 1.5 - Authenticated Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6d3089d3-8ea4-47f7-bbcd-3408a099ae94?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/corsa/" + google-query: inurl:"/wp-content/themes/corsa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,corsa,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/corsa/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "corsa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cosmetsy-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml b/nuclei-templates/cve-less/themes/cosmetsy-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml new file mode 100644 index 0000000000..54160524da --- /dev/null +++ b/nuclei-templates/cve-less/themes/cosmetsy-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml @@ -0,0 +1,58 @@ +id: cosmetsy-0ed3cd48ec0b8d5d59c0c2a69ba7db3d + +info: + name: > + Multiple Themes by KlbTheme <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d5036a-c756-47a6-b071-c393f8a6ce5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cosmetsy/" + google-query: inurl:"/wp-content/themes/cosmetsy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cosmetsy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cosmetsy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cosmetsy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/couponis-demo-7ffc401b1ac82b8be2938971d08cc9fb.yaml b/nuclei-templates/cve-less/themes/couponis-demo-7ffc401b1ac82b8be2938971d08cc9fb.yaml new file mode 100644 index 0000000000..e7cb2967e2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/couponis-demo-7ffc401b1ac82b8be2938971d08cc9fb.yaml @@ -0,0 +1,58 @@ +id: couponis-demo-7ffc401b1ac82b8be2938971d08cc9fb + +info: + name: > + Couponis Demo < 2.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fd67a02-b0fb-4c4f-9564-c3ee0180e79c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/couponis-demo/" + google-query: inurl:"/wp-content/themes/couponis-demo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,couponis-demo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/couponis-demo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "couponis-demo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cover-wp-ab5cb4980d96d0502a1385c5c51d0ea4.yaml b/nuclei-templates/cve-less/themes/cover-wp-ab5cb4980d96d0502a1385c5c51d0ea4.yaml new file mode 100644 index 0000000000..8fd96013bf --- /dev/null +++ b/nuclei-templates/cve-less/themes/cover-wp-ab5cb4980d96d0502a1385c5c51d0ea4.yaml @@ -0,0 +1,58 @@ +id: cover-wp-ab5cb4980d96d0502a1385c5c51d0ea4 + +info: + name: > + Cover WP <= 1.6.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3d76a807-d81d-45fc-a571-625a6ecf670b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cover-wp/" + google-query: inurl:"/wp-content/themes/cover-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cover-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cover-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cover-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/covertvideopress-99dafceb50253393d9ffc3281335a6c4.yaml b/nuclei-templates/cve-less/themes/covertvideopress-99dafceb50253393d9ffc3281335a6c4.yaml new file mode 100644 index 0000000000..d8ebcb2d3d --- /dev/null +++ b/nuclei-templates/cve-less/themes/covertvideopress-99dafceb50253393d9ffc3281335a6c4.yaml @@ -0,0 +1,58 @@ +id: covertvideopress-99dafceb50253393d9ffc3281335a6c4 + +info: + name: > + Covert VideoPress (All Known Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6481a6e-5875-44d8-9b24-594fb73e8942?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/covertvideopress/" + google-query: inurl:"/wp-content/themes/covertvideopress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,covertvideopress,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/covertvideopress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "covertvideopress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/craft-blog-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/craft-blog-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..e0091ae840 --- /dev/null +++ b/nuclei-templates/cve-less/themes/craft-blog-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: craft-blog-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/craft-blog/" + google-query: inurl:"/wp-content/themes/craft-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,craft-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/craft-blog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "craft-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/craft-blog-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/craft-blog-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..142e2e35cc --- /dev/null +++ b/nuclei-templates/cve-less/themes/craft-blog-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: craft-blog-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/craft-blog/" + google-query: inurl:"/wp-content/themes/craft-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,craft-blog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/craft-blog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "craft-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cream-blog-3f03bc4b4b5619e488422c5b9dbcc730.yaml b/nuclei-templates/cve-less/themes/cream-blog-3f03bc4b4b5619e488422c5b9dbcc730.yaml new file mode 100644 index 0000000000..e5a7202c8e --- /dev/null +++ b/nuclei-templates/cve-less/themes/cream-blog-3f03bc4b4b5619e488422c5b9dbcc730.yaml @@ -0,0 +1,58 @@ +id: cream-blog-3f03bc4b4b5619e488422c5b9dbcc730 + +info: + name: > + Cream Blog, Fascinate, Glaze Blog Lite, & Everest News (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b97404f-c34d-483d-b11c-03a706306270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cream-blog/" + google-query: inurl:"/wp-content/themes/cream-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cream-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cream-blog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cream-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/crius-d78e7652648c0b8a881a39d5a0a824ec.yaml b/nuclei-templates/cve-less/themes/crius-d78e7652648c0b8a881a39d5a0a824ec.yaml new file mode 100644 index 0000000000..cac842bfa5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/crius-d78e7652648c0b8a881a39d5a0a824ec.yaml @@ -0,0 +1,58 @@ +id: crius-d78e7652648c0b8a881a39d5a0a824ec + +info: + name: > + Crius (All Known Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/35896489-e48c-40f6-8815-9af759e58b44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/crius/" + google-query: inurl:"/wp-content/themes/crius/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,crius,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/crius/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "crius" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cstardesign-8c50ec7bbb214484280a482bec76837e.yaml b/nuclei-templates/cve-less/themes/cstardesign-8c50ec7bbb214484280a482bec76837e.yaml new file mode 100644 index 0000000000..9c2f02061c --- /dev/null +++ b/nuclei-templates/cve-less/themes/cstardesign-8c50ec7bbb214484280a482bec76837e.yaml @@ -0,0 +1,58 @@ +id: cstardesign-8c50ec7bbb214484280a482bec76837e + +info: + name: > + CStar Design WordPress Theme <= 4.9 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64e125c7-3f1e-43ed-8655-e0fbb95bc84b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cstardesign/" + google-query: inurl:"/wp-content/themes/cstardesign/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cstardesign,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cstardesign/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cstardesign" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/cuisine-palace-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/cuisine-palace-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..69a8736f32 --- /dev/null +++ b/nuclei-templates/cve-less/themes/cuisine-palace-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: cuisine-palace-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/cuisine-palace/" + google-query: inurl:"/wp-content/themes/cuisine-palace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,cuisine-palace,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/cuisine-palace/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cuisine-palace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/curvo-d59f1cca77e5c81eb993686d3bfbe443.yaml b/nuclei-templates/cve-less/themes/curvo-d59f1cca77e5c81eb993686d3bfbe443.yaml new file mode 100644 index 0000000000..2ce2f69a2f --- /dev/null +++ b/nuclei-templates/cve-less/themes/curvo-d59f1cca77e5c81eb993686d3bfbe443.yaml @@ -0,0 +1,58 @@ +id: curvo-d59f1cca77e5c81eb993686d3bfbe443 + +info: + name: > + Curvo Theme (All Known Versions) - Cross-Site Request Forgery and Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e8021ef2-e1ce-442a-965a-b2628fe48964?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/curvo/" + google-query: inurl:"/wp-content/themes/curvo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,curvo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/curvo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "curvo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/custom-community-35e7becde59fc0889fa433fc22f8f1b5.yaml b/nuclei-templates/cve-less/themes/custom-community-35e7becde59fc0889fa433fc22f8f1b5.yaml new file mode 100644 index 0000000000..a3908cbea6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/custom-community-35e7becde59fc0889fa433fc22f8f1b5.yaml @@ -0,0 +1,58 @@ +id: custom-community-35e7becde59fc0889fa433fc22f8f1b5 + +info: + name: > + Custom Community 2.0 - 2.0.24 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac45d8fe-4b79-4b2c-998e-e51da7a37e40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/custom-community/" + google-query: inurl:"/wp-content/themes/custom-community/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,custom-community,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/custom-community/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "custom-community" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0', '<= 2.0.25') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/customizr-019dda7346a94447f0c3df91572a74eb.yaml b/nuclei-templates/cve-less/themes/customizr-019dda7346a94447f0c3df91572a74eb.yaml new file mode 100644 index 0000000000..36be9e51ac --- /dev/null +++ b/nuclei-templates/cve-less/themes/customizr-019dda7346a94447f0c3df91572a74eb.yaml @@ -0,0 +1,58 @@ +id: customizr-019dda7346a94447f0c3df91572a74eb + +info: + name: > + Customizr <= 4.3.0 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9f6b600-a35a-49c2-8758-a7cc5c00e947?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/customizr/" + google-query: inurl:"/wp-content/themes/customizr/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,customizr,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/customizr/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "customizr" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dagda-9a0a697c12153160f55b76aada0a723e.yaml b/nuclei-templates/cve-less/themes/dagda-9a0a697c12153160f55b76aada0a723e.yaml new file mode 100644 index 0000000000..4d2c87bb7f --- /dev/null +++ b/nuclei-templates/cve-less/themes/dagda-9a0a697c12153160f55b76aada0a723e.yaml @@ -0,0 +1,58 @@ +id: dagda-9a0a697c12153160f55b76aada0a723e + +info: + name: > + Dagda Theme <= 5.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/908dbe64-e214-4880-a85d-38df4c722a43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dagda/" + google-query: inurl:"/wp-content/themes/dagda/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dagda,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dagda/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dagda" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dailydeal-52cc2ef9a6c2df75495af02a2e660264.yaml b/nuclei-templates/cve-less/themes/dailydeal-52cc2ef9a6c2df75495af02a2e660264.yaml new file mode 100644 index 0000000000..401126b50c --- /dev/null +++ b/nuclei-templates/cve-less/themes/dailydeal-52cc2ef9a6c2df75495af02a2e660264.yaml @@ -0,0 +1,58 @@ +id: dailydeal-52cc2ef9a6c2df75495af02a2e660264 + +info: + name: > + Dailydeal by Templatic < = 3.0.10 - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37f704bf-82bc-44f7-8b3c-cbf117732aaf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dailydeal/" + google-query: inurl:"/wp-content/themes/dailydeal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dailydeal,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dailydeal/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dailydeal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dailydeal-ba59ebce085f3da1439c5ad1f6fdb637.yaml b/nuclei-templates/cve-less/themes/dailydeal-ba59ebce085f3da1439c5ad1f6fdb637.yaml new file mode 100644 index 0000000000..b0ace2a521 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dailydeal-ba59ebce085f3da1439c5ad1f6fdb637.yaml @@ -0,0 +1,58 @@ +id: dailydeal-ba59ebce085f3da1439c5ad1f6fdb637 + +info: + name: > + Daily Deal (Unknown Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea9ee672-76d3-4d6a-b309-cd0023ca6c0d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dailydeal/" + google-query: inurl:"/wp-content/themes/dailydeal/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dailydeal,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dailydeal/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dailydeal" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dailyedition-460c948e3348c2b843b63d20f8149eb1.yaml b/nuclei-templates/cve-less/themes/dailyedition-460c948e3348c2b843b63d20f8149eb1.yaml new file mode 100644 index 0000000000..a7b71a86eb --- /dev/null +++ b/nuclei-templates/cve-less/themes/dailyedition-460c948e3348c2b843b63d20f8149eb1.yaml @@ -0,0 +1,58 @@ +id: dailyedition-460c948e3348c2b843b63d20f8149eb1 + +info: + name: > + Daily Edition <= 1.6.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fac29bb3-e534-4bee-9974-5ccac7d445db?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dailyedition/" + google-query: inurl:"/wp-content/themes/dailyedition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dailyedition,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dailyedition/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dailyedition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dailyedition-6bdfdbb30005886703826f665471e962.yaml b/nuclei-templates/cve-less/themes/dailyedition-6bdfdbb30005886703826f665471e962.yaml new file mode 100644 index 0000000000..1365732de5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dailyedition-6bdfdbb30005886703826f665471e962.yaml @@ -0,0 +1,58 @@ +id: dailyedition-6bdfdbb30005886703826f665471e962 + +info: + name: > + Daily Edition <= 1.6.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24c3d004-da8b-40ec-b52e-6923d4c824e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dailyedition/" + google-query: inurl:"/wp-content/themes/dailyedition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dailyedition,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dailyedition/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dailyedition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dailyedition-c2529ec5eebcb070f1d2933f71c24b9b.yaml b/nuclei-templates/cve-less/themes/dailyedition-c2529ec5eebcb070f1d2933f71c24b9b.yaml new file mode 100644 index 0000000000..1c1e50c17d --- /dev/null +++ b/nuclei-templates/cve-less/themes/dailyedition-c2529ec5eebcb070f1d2933f71c24b9b.yaml @@ -0,0 +1,58 @@ +id: dailyedition-c2529ec5eebcb070f1d2933f71c24b9b + +info: + name: > + Daily Edition <= 1.6.2 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aeb0352-66ab-45d4-ad61-f425d7d41f45?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dailyedition/" + google-query: inurl:"/wp-content/themes/dailyedition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dailyedition,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dailyedition/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dailyedition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/daisho-6c37ed5f01e697fababa0d98a125cf7e.yaml b/nuclei-templates/cve-less/themes/daisho-6c37ed5f01e697fababa0d98a125cf7e.yaml new file mode 100644 index 0000000000..3cb3737d55 --- /dev/null +++ b/nuclei-templates/cve-less/themes/daisho-6c37ed5f01e697fababa0d98a125cf7e.yaml @@ -0,0 +1,58 @@ +id: daisho-6c37ed5f01e697fababa0d98a125cf7e + +info: + name: > + Daisho Theme <= 4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e4731811-23d7-4a8e-8db3-794077720545?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/daisho/" + google-query: inurl:"/wp-content/themes/daisho/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,daisho,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/daisho/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "daisho" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dandelion-186e0de3e300f22fb53b3c68716d1f21.yaml b/nuclei-templates/cve-less/themes/dandelion-186e0de3e300f22fb53b3c68716d1f21.yaml new file mode 100644 index 0000000000..74f3c0f5c9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dandelion-186e0de3e300f22fb53b3c68716d1f21.yaml @@ -0,0 +1,58 @@ +id: dandelion-186e0de3e300f22fb53b3c68716d1f21 + +info: + name: > + Dendelion < 2.6.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d0fb6bf0-48b8-48cc-8080-8fe19c36ce7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dandelion/" + google-query: inurl:"/wp-content/themes/dandelion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dandelion,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dandelion/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dandelion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/darcie-88f76b0fbecb245eab5d377f2510f527.yaml b/nuclei-templates/cve-less/themes/darcie-88f76b0fbecb245eab5d377f2510f527.yaml new file mode 100644 index 0000000000..0c1e87344a --- /dev/null +++ b/nuclei-templates/cve-less/themes/darcie-88f76b0fbecb245eab5d377f2510f527.yaml @@ -0,0 +1,58 @@ +id: darcie-88f76b0fbecb245eab5d377f2510f527 + +info: + name: > + Darcie <= 1.1.5 - Reflected Cross-Site Scripting via JS split + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83d162f9-32a9-4d03-845e-6fc9b8574fb5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/darcie/" + google-query: inurl:"/wp-content/themes/darcie/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,darcie,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/darcie/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "darcie" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/deep-blue-6d8163753ad1f1a6cf7ea136432e8e62.yaml b/nuclei-templates/cve-less/themes/deep-blue-6d8163753ad1f1a6cf7ea136432e8e62.yaml new file mode 100644 index 0000000000..58dfacccae --- /dev/null +++ b/nuclei-templates/cve-less/themes/deep-blue-6d8163753ad1f1a6cf7ea136432e8e62.yaml @@ -0,0 +1,58 @@ +id: deep-blue-6d8163753ad1f1a6cf7ea136432e8e62 + +info: + name: > + Deep Blue <= 1.9.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b78960-51ff-440f-8831-d50c11961d9d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/deep-blue/" + google-query: inurl:"/wp-content/themes/deep-blue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,deep-blue,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/deep-blue/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "deep-blue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/default-mag-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/default-mag-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..405ef53a29 --- /dev/null +++ b/nuclei-templates/cve-less/themes/default-mag-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: default-mag-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/default-mag/" + google-query: inurl:"/wp-content/themes/default-mag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,default-mag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/default-mag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "default-mag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dejavu-76a4f53242c3d8ade723708cc7f5a953.yaml b/nuclei-templates/cve-less/themes/dejavu-76a4f53242c3d8ade723708cc7f5a953.yaml new file mode 100644 index 0000000000..7311ee679c --- /dev/null +++ b/nuclei-templates/cve-less/themes/dejavu-76a4f53242c3d8ade723708cc7f5a953.yaml @@ -0,0 +1,58 @@ +id: dejavu-76a4f53242c3d8ade723708cc7f5a953 + +info: + name: > + DejaVu <= 2.4 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2591af6b-e057-4c17-aeba-5c31efbae622?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dejavu/" + google-query: inurl:"/wp-content/themes/dejavu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dejavu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dejavu/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dejavu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dejavu-be169372bbe2ce4f8eada3564b525f9e.yaml b/nuclei-templates/cve-less/themes/dejavu-be169372bbe2ce4f8eada3564b525f9e.yaml new file mode 100644 index 0000000000..fe6d6ba5ac --- /dev/null +++ b/nuclei-templates/cve-less/themes/dejavu-be169372bbe2ce4f8eada3564b525f9e.yaml @@ -0,0 +1,58 @@ +id: dejavu-be169372bbe2ce4f8eada3564b525f9e + +info: + name: > + DejaVu <= 2.4 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a37478a1-3e3e-4be0-aa96-ddafac0ff6c1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dejavu/" + google-query: inurl:"/wp-content/themes/dejavu/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dejavu,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dejavu/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dejavu" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/designexo-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/designexo-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..3c69c005e8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/designexo-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: designexo-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/designexo/" + google-query: inurl:"/wp-content/themes/designexo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,designexo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/designexo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "designexo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/designfolio-plus-3724085b216ee48b2a3bc8286f400ae9.yaml b/nuclei-templates/cve-less/themes/designfolio-plus-3724085b216ee48b2a3bc8286f400ae9.yaml new file mode 100644 index 0000000000..a64de3b10d --- /dev/null +++ b/nuclei-templates/cve-less/themes/designfolio-plus-3724085b216ee48b2a3bc8286f400ae9.yaml @@ -0,0 +1,58 @@ +id: designfolio-plus-3724085b216ee48b2a3bc8286f400ae9 + +info: + name: > + DesignFolio Plus Theme (Unkown Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20746c92-6e63-47dd-b0f7-9d20bdbdd9cb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/designfolio-plus/" + google-query: inurl:"/wp-content/themes/designfolio-plus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,designfolio-plus,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/designfolio-plus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "designfolio-plus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/designpile-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/designpile-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..5710942766 --- /dev/null +++ b/nuclei-templates/cve-less/themes/designpile-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: designpile-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/designpile/" + google-query: inurl:"/wp-content/themes/designpile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,designpile,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/designpile/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "designpile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/diary-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/diary-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..5d2fa4ce79 --- /dev/null +++ b/nuclei-templates/cve-less/themes/diary-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: diary-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/diary/" + google-query: inurl:"/wp-content/themes/diary/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,diary,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/diary/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "diary" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/digital-agency-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/digital-agency-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..0c4cdf9a3f --- /dev/null +++ b/nuclei-templates/cve-less/themes/digital-agency-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: digital-agency-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/digital-agency-lite/" + google-query: inurl:"/wp-content/themes/digital-agency-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,digital-agency-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/digital-agency-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-agency-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/digital-agency-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/digital-agency-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..b75a364342 --- /dev/null +++ b/nuclei-templates/cve-less/themes/digital-agency-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: digital-agency-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/digital-agency-lite/" + google-query: inurl:"/wp-content/themes/digital-agency-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,digital-agency-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/digital-agency-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-agency-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/digital-agency-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/digital-agency-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..8715f349c4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/digital-agency-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: digital-agency-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/digital-agency-lite/" + google-query: inurl:"/wp-content/themes/digital-agency-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,digital-agency-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/digital-agency-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-agency-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/digital-store-f5fc5bca6e41d90a9454914bbfeeafc7.yaml b/nuclei-templates/cve-less/themes/digital-store-f5fc5bca6e41d90a9454914bbfeeafc7.yaml new file mode 100644 index 0000000000..ba95b09529 --- /dev/null +++ b/nuclei-templates/cve-less/themes/digital-store-f5fc5bca6e41d90a9454914bbfeeafc7.yaml @@ -0,0 +1,58 @@ +id: digital-store-f5fc5bca6e41d90a9454914bbfeeafc7 + +info: + name: > + Easy Digital Downloads (EDD) Digital Store < 1.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ee3d536-6d7b-41dc-9d63-52b9b4facf73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/digital-store/" + google-query: inurl:"/wp-content/themes/digital-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,digital-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/digital-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "digital-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dignitas-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml b/nuclei-templates/cve-less/themes/dignitas-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml new file mode 100644 index 0000000000..bc54876c6c --- /dev/null +++ b/nuclei-templates/cve-less/themes/dignitas-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml @@ -0,0 +1,58 @@ +id: dignitas-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a + +info: + name: > + Ya'aburnee <= 1.0.7 and Dignitas <= 1.1.9 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d8551b8-67b9-45a8-9357-9e42fb451606?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dignitas-themes/" + google-query: inurl:"/wp-content/themes/dignitas-themes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dignitas-themes,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dignitas-themes/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dignitas-themes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dimension-033d028c8d102a833af4770e22a7e5b6.yaml b/nuclei-templates/cve-less/themes/dimension-033d028c8d102a833af4770e22a7e5b6.yaml new file mode 100644 index 0000000000..dff7c5353b --- /dev/null +++ b/nuclei-templates/cve-less/themes/dimension-033d028c8d102a833af4770e22a7e5b6.yaml @@ -0,0 +1,58 @@ +id: dimension-033d028c8d102a833af4770e22a7e5b6 + +info: + name: > + Dimension (Unknown Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/301f455f-1ffe-485a-8473-8a31a0633a5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dimension/" + google-query: inurl:"/wp-content/themes/dimension/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dimension,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dimension/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dimension" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/diplomat-c41f2615174c7d773c4d8f292dfcd2a3.yaml b/nuclei-templates/cve-less/themes/diplomat-c41f2615174c7d773c4d8f292dfcd2a3.yaml new file mode 100644 index 0000000000..fc37295979 --- /dev/null +++ b/nuclei-templates/cve-less/themes/diplomat-c41f2615174c7d773c4d8f292dfcd2a3.yaml @@ -0,0 +1,58 @@ +id: diplomat-c41f2615174c7d773c4d8f292dfcd2a3 + +info: + name: > + Diplomat Theme <= 1.0.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/04f37062-da7e-4c26-ab15-50dcef8ca301?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/diplomat/" + google-query: inurl:"/wp-content/themes/diplomat/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,diplomat,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/diplomat/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "diplomat" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/discy-3cce740c3da6d548d8d19689826c4cf1.yaml b/nuclei-templates/cve-less/themes/discy-3cce740c3da6d548d8d19689826c4cf1.yaml new file mode 100644 index 0000000000..2e689c77a4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/discy-3cce740c3da6d548d8d19689826c4cf1.yaml @@ -0,0 +1,58 @@ +id: discy-3cce740c3da6d548d8d19689826c4cf1 + +info: + name: > + Discy - Social Questions and Answers WordPress Theme <= 4.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19f2fe7c-f702-4db6-9914-2839a62ffdd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/discy/" + google-query: inurl:"/wp-content/themes/discy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,discy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/discy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "discy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/discy-46244fdcad0724fd77e42ba287d7514a.yaml b/nuclei-templates/cve-less/themes/discy-46244fdcad0724fd77e42ba287d7514a.yaml new file mode 100644 index 0000000000..44f76c74b0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/discy-46244fdcad0724fd77e42ba287d7514a.yaml @@ -0,0 +1,58 @@ +id: discy-46244fdcad0724fd77e42ba287d7514a + +info: + name: > + Discy <= 5.1 - Cross-Site Request Forgery to Settings Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f3f821d6-6a4e-4e3b-98e1-e38a34d5c8f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/discy/" + google-query: inurl:"/wp-content/themes/discy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,discy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/discy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "discy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/discy-dda12396183ee405a0b6804083230616.yaml b/nuclei-templates/cve-less/themes/discy-dda12396183ee405a0b6804083230616.yaml new file mode 100644 index 0000000000..625fa7df3b --- /dev/null +++ b/nuclei-templates/cve-less/themes/discy-dda12396183ee405a0b6804083230616.yaml @@ -0,0 +1,58 @@ +id: discy-dda12396183ee405a0b6804083230616 + +info: + name: > + WPQA - Builder forms Addon For WordPress (<= 5.9.2), Himer (<= 1.9.3) and Discy (<= 5.5.3) - Authenticated (Subscriber+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/085da0fa-9487-4938-94ea-c1593be7c023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/discy/" + google-query: inurl:"/wp-content/themes/discy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,discy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/discy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "discy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/discy-e286b3a8935bca8a0217c3e2e8d64e5c.yaml b/nuclei-templates/cve-less/themes/discy-e286b3a8935bca8a0217c3e2e8d64e5c.yaml new file mode 100644 index 0000000000..d2b9359b7e --- /dev/null +++ b/nuclei-templates/cve-less/themes/discy-e286b3a8935bca8a0217c3e2e8d64e5c.yaml @@ -0,0 +1,58 @@ +id: discy-e286b3a8935bca8a0217c3e2e8d64e5c + +info: + name: > + Discy <= 5.1 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9077bdce-31c9-4877-8bb5-db87046125cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/discy/" + google-query: inurl:"/wp-content/themes/discy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,discy,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/discy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "discy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/divi-1ea409fe86fe5baf6c5d95a328e05b6b.yaml b/nuclei-templates/cve-less/themes/divi-1ea409fe86fe5baf6c5d95a328e05b6b.yaml new file mode 100644 index 0000000000..080646bfc1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/divi-1ea409fe86fe5baf6c5d95a328e05b6b.yaml @@ -0,0 +1,58 @@ +id: divi-1ea409fe86fe5baf6c5d95a328e05b6b + +info: + name: > + Divi <= 4.20.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c01cbc25-bdf7-4525-8c7b-194bd0aeb32b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Divi/" + google-query: inurl:"/wp-content/themes/Divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Divi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Divi/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.20.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/divi-344bde3518beec69cf32525065cbb92a.yaml b/nuclei-templates/cve-less/themes/divi-344bde3518beec69cf32525065cbb92a.yaml new file mode 100644 index 0000000000..b1c8152771 --- /dev/null +++ b/nuclei-templates/cve-less/themes/divi-344bde3518beec69cf32525065cbb92a.yaml @@ -0,0 +1,58 @@ +id: divi-344bde3518beec69cf32525065cbb92a + +info: + name: > + Elegant Themes Divi 3.23 - 4.0.9, Divi Extra 2.23 - 4.0.9, Divi Builder 2.23 - 4.0.9 - PHP Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82ce66d0-dc53-4433-b499-30bfd48efaf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Divi/" + google-query: inurl:"/wp-content/themes/Divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Divi,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Divi/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 3.23', '<= 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/divi-4f3dfe26281afe74af18534af8dcf024.yaml b/nuclei-templates/cve-less/themes/divi-4f3dfe26281afe74af18534af8dcf024.yaml new file mode 100644 index 0000000000..4b0065295b --- /dev/null +++ b/nuclei-templates/cve-less/themes/divi-4f3dfe26281afe74af18534af8dcf024.yaml @@ -0,0 +1,58 @@ +id: divi-4f3dfe26281afe74af18534af8dcf024 + +info: + name: > + Elegant Themes Divi Theme, Extra Theme, Divi Page Builder <= 4.25.0 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efac70f6-d959-41f7-bdef-d554f1c9133e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Divi/" + google-query: inurl:"/wp-content/themes/Divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Divi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Divi/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.25.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/divi-aabb704338c74a997901edf2f42d1b76.yaml b/nuclei-templates/cve-less/themes/divi-aabb704338c74a997901edf2f42d1b76.yaml new file mode 100644 index 0000000000..c6dc6543c8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/divi-aabb704338c74a997901edf2f42d1b76.yaml @@ -0,0 +1,58 @@ +id: divi-aabb704338c74a997901edf2f42d1b76 + +info: + name: > + Elegant Themes (Various Versions) - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1295f1a0-1f5a-4707-96cc-c408a6819e87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Divi/" + google-query: inurl:"/wp-content/themes/Divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Divi,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Divi/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.17.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/divi-e37e5d73321c4c6eb17ee3379b565090.yaml b/nuclei-templates/cve-less/themes/divi-e37e5d73321c4c6eb17ee3379b565090.yaml new file mode 100644 index 0000000000..f7d23506b3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/divi-e37e5d73321c4c6eb17ee3379b565090.yaml @@ -0,0 +1,58 @@ +id: divi-e37e5d73321c4c6eb17ee3379b565090 + +info: + name: > + Divi <= 4.23.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/999475c5-5f17-47fa-a0d0-47cb5a8a0eb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Divi/" + google-query: inurl:"/wp-content/themes/Divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Divi,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Divi/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.23.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/divi-ec458e7be91893393a96a7bb4f01d557.yaml b/nuclei-templates/cve-less/themes/divi-ec458e7be91893393a96a7bb4f01d557.yaml new file mode 100644 index 0000000000..ba1bfb1ee2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/divi-ec458e7be91893393a96a7bb4f01d557.yaml @@ -0,0 +1,58 @@ +id: divi-ec458e7be91893393a96a7bb4f01d557 + +info: + name: > + Elegant Themes (Multiple Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e03bc79-b42e-4015-8476-2b0488c71028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Divi/" + google-query: inurl:"/wp-content/themes/Divi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Divi,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Divi/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Divi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/doko-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/doko-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..2d01b1d2c7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/doko-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: doko-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/doko/" + google-query: inurl:"/wp-content/themes/doko/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,doko,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/doko/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doko" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/doko-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/doko-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..2e27b4a5d3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/doko-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: doko-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/doko/" + google-query: inurl:"/wp-content/themes/doko/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,doko,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/doko/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doko" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/doko-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/doko-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..2900492bc7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/doko-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: doko-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/doko/" + google-query: inurl:"/wp-content/themes/doko/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,doko,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/doko/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "doko" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.27') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-chocolate-042613decef34429d197e1051e8a6f20.yaml b/nuclei-templates/cve-less/themes/dt-chocolate-042613decef34429d197e1051e8a6f20.yaml new file mode 100644 index 0000000000..24989fbd37 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-chocolate-042613decef34429d197e1051e8a6f20.yaml @@ -0,0 +1,58 @@ +id: dt-chocolate-042613decef34429d197e1051e8a6f20 + +info: + name: > + DT Chocolate (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe799030-ec9c-45fd-a5a9-6589364b6056?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-chocolate/" + google-query: inurl:"/wp-content/themes/dt-chocolate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-chocolate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-chocolate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-chocolate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-chocolate-42cb0128fedfa4377c3f29de3cf2cb68.yaml b/nuclei-templates/cve-less/themes/dt-chocolate-42cb0128fedfa4377c3f29de3cf2cb68.yaml new file mode 100644 index 0000000000..b013884162 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-chocolate-42cb0128fedfa4377c3f29de3cf2cb68.yaml @@ -0,0 +1,58 @@ +id: dt-chocolate-42cb0128fedfa4377c3f29de3cf2cb68 + +info: + name: > + Chocolate WP – Responsive Photography Theme (All Versions) - Denial of Service and Abuse of Functionality + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a644ac90-6cc4-495c-b880-4ebbc237bb57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-chocolate/" + google-query: inurl:"/wp-content/themes/dt-chocolate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-chocolate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-chocolate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-chocolate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-chocolate-8c6baf342080d67dd1da781b7c2fdff0.yaml b/nuclei-templates/cve-less/themes/dt-chocolate-8c6baf342080d67dd1da781b7c2fdff0.yaml new file mode 100644 index 0000000000..7a1ef83782 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-chocolate-8c6baf342080d67dd1da781b7c2fdff0.yaml @@ -0,0 +1,58 @@ +id: dt-chocolate-8c6baf342080d67dd1da781b7c2fdff0 + +info: + name: > + DT Chocolate <= 1.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f937290-fa45-4ce0-84f0-a42c83cd3bdf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-chocolate/" + google-query: inurl:"/wp-content/themes/dt-chocolate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-chocolate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-chocolate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-chocolate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-chocolate-daa315fbfc85fdf58446d6f8b56cda97.yaml b/nuclei-templates/cve-less/themes/dt-chocolate-daa315fbfc85fdf58446d6f8b56cda97.yaml new file mode 100644 index 0000000000..8576d2bcf6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-chocolate-daa315fbfc85fdf58446d6f8b56cda97.yaml @@ -0,0 +1,58 @@ +id: dt-chocolate-daa315fbfc85fdf58446d6f8b56cda97 + +info: + name: > + Chocolate WP – Responsive Photography Theme (All Versions) - Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0e77557-f377-4752-bc5b-ec00f2520150?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-chocolate/" + google-query: inurl:"/wp-content/themes/dt-chocolate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-chocolate,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-chocolate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-chocolate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-chocolate-dcee3b9f11fc1725f690a44de458561d.yaml b/nuclei-templates/cve-less/themes/dt-chocolate-dcee3b9f11fc1725f690a44de458561d.yaml new file mode 100644 index 0000000000..ce82bcc35c --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-chocolate-dcee3b9f11fc1725f690a44de458561d.yaml @@ -0,0 +1,58 @@ +id: dt-chocolate-dcee3b9f11fc1725f690a44de458561d + +info: + name: > + Chocolate WP – Responsive Photography Theme (All Versions) - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c5dd7a4-0e9c-4e1e-8385-2e76b7b9b02e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-chocolate/" + google-query: inurl:"/wp-content/themes/dt-chocolate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-chocolate,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-chocolate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-chocolate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-chocolate-e1c40eb25b51b97676a5f939865df658.yaml b/nuclei-templates/cve-less/themes/dt-chocolate-e1c40eb25b51b97676a5f939865df658.yaml new file mode 100644 index 0000000000..13644f1464 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-chocolate-e1c40eb25b51b97676a5f939865df658.yaml @@ -0,0 +1,58 @@ +id: dt-chocolate-e1c40eb25b51b97676a5f939865df658 + +info: + name: > + Chocolate WP – Responsive Photography Theme (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06fee60a-e96c-49ce-9007-0d402ef46d72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-chocolate/" + google-query: inurl:"/wp-content/themes/dt-chocolate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-chocolate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-chocolate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-chocolate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-chocolate-fbae7b535aa5c352a8744c22c013bc35.yaml b/nuclei-templates/cve-less/themes/dt-chocolate-fbae7b535aa5c352a8744c22c013bc35.yaml new file mode 100644 index 0000000000..b427504e2c --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-chocolate-fbae7b535aa5c352a8744c22c013bc35.yaml @@ -0,0 +1,58 @@ +id: dt-chocolate-fbae7b535aa5c352a8744c22c013bc35 + +info: + name: > + Chocolate WP – Responsive Photography Theme (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a537f82c-5139-439e-817f-7fd0ece958bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-chocolate/" + google-query: inurl:"/wp-content/themes/dt-chocolate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-chocolate,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-chocolate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-chocolate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-the7-0086334fa92fba62187d0290e70cdbe7.yaml b/nuclei-templates/cve-less/themes/dt-the7-0086334fa92fba62187d0290e70cdbe7.yaml new file mode 100644 index 0000000000..760d0d671d --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-the7-0086334fa92fba62187d0290e70cdbe7.yaml @@ -0,0 +1,58 @@ +id: dt-the7-0086334fa92fba62187d0290e70cdbe7 + +info: + name: > + The7 <= 11.6.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24c67243-0452-4820-bfb4-b7ac4804aa4b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-the7/" + google-query: inurl:"/wp-content/themes/dt-the7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-the7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-the7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-the7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-the7-95d424216e84379eaaf681135f0af62a.yaml b/nuclei-templates/cve-less/themes/dt-the7-95d424216e84379eaaf681135f0af62a.yaml new file mode 100644 index 0000000000..9b4ff5e5c1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-the7-95d424216e84379eaaf681135f0af62a.yaml @@ -0,0 +1,58 @@ +id: dt-the7-95d424216e84379eaaf681135f0af62a + +info: + name: > + The7 — Website and eCommerce Builder for WordPress <= 2.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/81ca577d-5337-4d46-94bb-93c230cf0348?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-the7/" + google-query: inurl:"/wp-content/themes/dt-the7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-the7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-the7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-the7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/dt-the7-c2a573da80f21ade51e0477e5d127224.yaml b/nuclei-templates/cve-less/themes/dt-the7-c2a573da80f21ade51e0477e5d127224.yaml new file mode 100644 index 0000000000..53da63962e --- /dev/null +++ b/nuclei-templates/cve-less/themes/dt-the7-c2a573da80f21ade51e0477e5d127224.yaml @@ -0,0 +1,58 @@ +id: dt-the7-c2a573da80f21ade51e0477e5d127224 + +info: + name: > + The7 <= 11.6.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4f481478-5dc9-4b11-ba3e-1942882a9f43?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/dt-the7/" + google-query: inurl:"/wp-content/themes/dt-the7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,dt-the7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/dt-the7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "dt-the7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.6.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/easybook-17f6998fdf35be8a6349776a3309aedc.yaml b/nuclei-templates/cve-less/themes/easybook-17f6998fdf35be8a6349776a3309aedc.yaml new file mode 100644 index 0000000000..31dde68403 --- /dev/null +++ b/nuclei-templates/cve-less/themes/easybook-17f6998fdf35be8a6349776a3309aedc.yaml @@ -0,0 +1,58 @@ +id: easybook-17f6998fdf35be8a6349776a3309aedc + +info: + name: > + CTHthemes CityBook < 2.3.4, TownHub < 1.0.6, EasyBook < 1.2.2 Themes - Authenticated Post Deleition via IDOR + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08eb1d49-9928-43f8-97fc-14105e3a4a25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/easybook/" + google-query: inurl:"/wp-content/themes/easybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,easybook,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/easybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/easybook-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml b/nuclei-templates/cve-less/themes/easybook-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml new file mode 100644 index 0000000000..de968f618c --- /dev/null +++ b/nuclei-templates/cve-less/themes/easybook-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml @@ -0,0 +1,58 @@ +id: easybook-8b6ac4c7233f8f6a37118bbf7ac73ad8 + +info: + name: > + CTHthemes CityBook <= 2.3.3, TownHub <= 1.0.5, and EasyBook <= 1.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/788e1c5c-67a9-4b06-a2cf-15c980e83618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/easybook/" + google-query: inurl:"/wp-content/themes/easybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,easybook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/easybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/easybook-be3f332add5d9ce678efc86e37a29e03.yaml b/nuclei-templates/cve-less/themes/easybook-be3f332add5d9ce678efc86e37a29e03.yaml new file mode 100644 index 0000000000..401452ac0e --- /dev/null +++ b/nuclei-templates/cve-less/themes/easybook-be3f332add5d9ce678efc86e37a29e03.yaml @@ -0,0 +1,58 @@ +id: easybook-be3f332add5d9ce678efc86e37a29e03 + +info: + name: > + CTHthemes CityBook <= 2.3.3, TownHub <= 1.0.5, and EasyBook <= 1.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e292a1f-d475-4c52-b790-b5215e1870ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/easybook/" + google-query: inurl:"/wp-content/themes/easybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,easybook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/easybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/easybook-f5204789b3d63c1e5dd223fef5d1ac5d.yaml b/nuclei-templates/cve-less/themes/easybook-f5204789b3d63c1e5dd223fef5d1ac5d.yaml new file mode 100644 index 0000000000..bc6bbb4a66 --- /dev/null +++ b/nuclei-templates/cve-less/themes/easybook-f5204789b3d63c1e5dd223fef5d1ac5d.yaml @@ -0,0 +1,58 @@ +id: easybook-f5204789b3d63c1e5dd223fef5d1ac5d + +info: + name: > + CTHthemes CityBook Theme < 2.3.4, TownHub Theme < 1.0.6, EasyBook Theme < 1.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b51a7670-9fa6-4df9-bef6-c7ebe6b09c5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/easybook/" + google-query: inurl:"/wp-content/themes/easybook/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,easybook,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/easybook/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easybook" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ebiz-153b374358a4469baf0dcf3e128485d7.yaml b/nuclei-templates/cve-less/themes/ebiz-153b374358a4469baf0dcf3e128485d7.yaml new file mode 100644 index 0000000000..77dbb4d1e3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ebiz-153b374358a4469baf0dcf3e128485d7.yaml @@ -0,0 +1,58 @@ +id: ebiz-153b374358a4469baf0dcf3e128485d7 + +info: + name: > + Imediapixel Themes (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a923c84e-3641-45ec-970e-faea803897bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ebiz/" + google-query: inurl:"/wp-content/themes/ebiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ebiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ebiz/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ebiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/echelon-61d6bd39a6e6d20f6024207c6900ca16.yaml b/nuclei-templates/cve-less/themes/echelon-61d6bd39a6e6d20f6024207c6900ca16.yaml new file mode 100644 index 0000000000..d28d4ca3ba --- /dev/null +++ b/nuclei-templates/cve-less/themes/echelon-61d6bd39a6e6d20f6024207c6900ca16.yaml @@ -0,0 +1,58 @@ +id: echelon-61d6bd39a6e6d20f6024207c6900ca16 + +info: + name: > + Echelon <= 2.4 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4209eddd-47ac-4802-b309-e42e5907a0cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/echelon/" + google-query: inurl:"/wp-content/themes/echelon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,echelon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/echelon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "echelon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/echelon-9de2929d93f53a09f4c6d8d87f325131.yaml b/nuclei-templates/cve-less/themes/echelon-9de2929d93f53a09f4c6d8d87f325131.yaml new file mode 100644 index 0000000000..c984b4909c --- /dev/null +++ b/nuclei-templates/cve-less/themes/echelon-9de2929d93f53a09f4c6d8d87f325131.yaml @@ -0,0 +1,58 @@ +id: echelon-9de2929d93f53a09f4c6d8d87f325131 + +info: + name: > + Echelon <= 2.4 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f1060875-21dc-41fb-866a-940e6aeb3c22?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/echelon/" + google-query: inurl:"/wp-content/themes/echelon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,echelon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/echelon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "echelon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/echelon-f473a45e54915af6da4e96437d244f3c.yaml b/nuclei-templates/cve-less/themes/echelon-f473a45e54915af6da4e96437d244f3c.yaml new file mode 100644 index 0000000000..3cf10f744c --- /dev/null +++ b/nuclei-templates/cve-less/themes/echelon-f473a45e54915af6da4e96437d244f3c.yaml @@ -0,0 +1,58 @@ +id: echelon-f473a45e54915af6da4e96437d244f3c + +info: + name: > + Echelon (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ca7b2ab-bc01-4fd7-9cee-7cdc5a62177d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/echelon/" + google-query: inurl:"/wp-content/themes/echelon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,echelon,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/echelon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "echelon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ecobiz-153b374358a4469baf0dcf3e128485d7.yaml b/nuclei-templates/cve-less/themes/ecobiz-153b374358a4469baf0dcf3e128485d7.yaml new file mode 100644 index 0000000000..1e47b6567d --- /dev/null +++ b/nuclei-templates/cve-less/themes/ecobiz-153b374358a4469baf0dcf3e128485d7.yaml @@ -0,0 +1,58 @@ +id: ecobiz-153b374358a4469baf0dcf3e128485d7 + +info: + name: > + Imediapixel Themes (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a923c84e-3641-45ec-970e-faea803897bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ecobiz/" + google-query: inurl:"/wp-content/themes/ecobiz/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ecobiz,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ecobiz/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ecobiz" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/edge-48efc81cbefdf18882ef324fd2ff057b.yaml b/nuclei-templates/cve-less/themes/edge-48efc81cbefdf18882ef324fd2ff057b.yaml new file mode 100644 index 0000000000..3f53c0794c --- /dev/null +++ b/nuclei-templates/cve-less/themes/edge-48efc81cbefdf18882ef324fd2ff057b.yaml @@ -0,0 +1,58 @@ +id: edge-48efc81cbefdf18882ef324fd2ff057b + +info: + name: > + Edge <= 2.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Author Display Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/526c45c8-7543-4384-af80-b3798857f79d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/edge/" + google-query: inurl:"/wp-content/themes/edge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,edge,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/edge/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/edict-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/edict-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..33049e2a5f --- /dev/null +++ b/nuclei-templates/cve-less/themes/edict-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: edict-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/edict-lite/" + google-query: inurl:"/wp-content/themes/edict-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,edict-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/edict-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edict-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/edict-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/edict-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..95e6a9f707 --- /dev/null +++ b/nuclei-templates/cve-less/themes/edict-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: edict-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/edict-lite/" + google-query: inurl:"/wp-content/themes/edict-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,edict-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/edict-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edict-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/edict-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/edict-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..115cc1da41 --- /dev/null +++ b/nuclei-templates/cve-less/themes/edict-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: edict-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/edict-lite/" + google-query: inurl:"/wp-content/themes/edict-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,edict-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/edict-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "edict-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/editorialmag-3220945a9ad1b5aa7c5c294cafd443a6.yaml b/nuclei-templates/cve-less/themes/editorialmag-3220945a9ad1b5aa7c5c294cafd443a6.yaml new file mode 100644 index 0000000000..5ee61fb62a --- /dev/null +++ b/nuclei-templates/cve-less/themes/editorialmag-3220945a9ad1b5aa7c5c294cafd443a6.yaml @@ -0,0 +1,58 @@ +id: editorialmag-3220945a9ad1b5aa7c5c294cafd443a6 + +info: + name: > + Editorialmag <= 1.2.0 - Missing Authorization to Authenticated Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5fd470bb-d791-45dc-a743-6f03fc75f00c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/editorialmag/" + google-query: inurl:"/wp-content/themes/editorialmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,editorialmag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/editorialmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "editorialmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/educenter-8b501a3e440ee475a390c14b78d1469e.yaml b/nuclei-templates/cve-less/themes/educenter-8b501a3e440ee475a390c14b78d1469e.yaml new file mode 100644 index 0000000000..6e81e5bc7d --- /dev/null +++ b/nuclei-templates/cve-less/themes/educenter-8b501a3e440ee475a390c14b78d1469e.yaml @@ -0,0 +1,58 @@ +id: educenter-8b501a3e440ee475a390c14b78d1469e + +info: + name: > + Educenter <= 1.5.7 - Missing Authorization via activate_plugin + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/344ad959-038a-46d1-b515-ae3473af8209?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/educenter/" + google-query: inurl:"/wp-content/themes/educenter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,educenter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/educenter/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "educenter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eight-sec-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/eight-sec-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..c05adca1e0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eight-sec-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: eight-sec-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eight-sec/" + google-query: inurl:"/wp-content/themes/eight-sec/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eight-sec,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eight-sec/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eight-sec" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eight-sec-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/eight-sec-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..c728bf4260 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eight-sec-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: eight-sec-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eight-sec/" + google-query: inurl:"/wp-content/themes/eight-sec/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eight-sec,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eight-sec/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eight-sec" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eight-sec-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/eight-sec-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..b74caec347 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eight-sec-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: eight-sec-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eight-sec/" + google-query: inurl:"/wp-content/themes/eight-sec/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eight-sec,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eight-sec/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eight-sec" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightlaw-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/eightlaw-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..907e87f503 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightlaw-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: eightlaw-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightlaw-lite/" + google-query: inurl:"/wp-content/themes/eightlaw-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightlaw-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightlaw-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightlaw-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightlaw-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/eightlaw-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..d65c475bc5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightlaw-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: eightlaw-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightlaw-lite/" + google-query: inurl:"/wp-content/themes/eightlaw-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightlaw-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightlaw-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightlaw-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightlaw-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/eightlaw-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..62d672aaf7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightlaw-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: eightlaw-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightlaw-lite/" + google-query: inurl:"/wp-content/themes/eightlaw-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightlaw-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightlaw-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightlaw-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightmedi-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/eightmedi-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..08f8e9f353 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightmedi-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: eightmedi-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightmedi-lite/" + google-query: inurl:"/wp-content/themes/eightmedi-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightmedi-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightmedi-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightmedi-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightmedi-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/eightmedi-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..5a40310e18 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightmedi-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: eightmedi-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightmedi-lite/" + google-query: inurl:"/wp-content/themes/eightmedi-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightmedi-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightmedi-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightmedi-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightmedi-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/eightmedi-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..59fb7ec5cc --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightmedi-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: eightmedi-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightmedi-lite/" + google-query: inurl:"/wp-content/themes/eightmedi-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightmedi-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightmedi-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightmedi-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightstore-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/eightstore-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..6bb9629b43 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightstore-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: eightstore-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightstore-lite/" + google-query: inurl:"/wp-content/themes/eightstore-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightstore-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightstore-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightstore-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightstore-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/eightstore-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..0dee84f88f --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightstore-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: eightstore-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightstore-lite/" + google-query: inurl:"/wp-content/themes/eightstore-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightstore-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightstore-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightstore-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eightstore-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/eightstore-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..ac853ae0b3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eightstore-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: eightstore-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eightstore-lite/" + google-query: inurl:"/wp-content/themes/eightstore-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eightstore-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eightstore-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eightstore-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/elasta-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/elasta-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..0175d3f4bc --- /dev/null +++ b/nuclei-templates/cve-less/themes/elasta-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: elasta-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/elasta/" + google-query: inurl:"/wp-content/themes/elasta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,elasta,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/elasta/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elasta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/elation-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/elation-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..fc0773d2c3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/elation-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: elation-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/elation/" + google-query: inurl:"/wp-content/themes/elation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,elation,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/elation/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/elegance-2d5cfa75ccec0b7d6ce43b488e635fe7.yaml b/nuclei-templates/cve-less/themes/elegance-2d5cfa75ccec0b7d6ce43b488e635fe7.yaml new file mode 100644 index 0000000000..0e412cba78 --- /dev/null +++ b/nuclei-templates/cve-less/themes/elegance-2d5cfa75ccec0b7d6ce43b488e635fe7.yaml @@ -0,0 +1,58 @@ +id: elegance-2d5cfa75ccec0b7d6ce43b488e635fe7 + +info: + name: > + Elegance <= 2.4 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58e84d8f-a091-493f-8e5d-52c1ad5afcdb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/elegance/" + google-query: inurl:"/wp-content/themes/elegance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,elegance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/elegance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elegance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/elegance-93d95b14737baf6796a29212125f2e59.yaml b/nuclei-templates/cve-less/themes/elegance-93d95b14737baf6796a29212125f2e59.yaml new file mode 100644 index 0000000000..db0def9dad --- /dev/null +++ b/nuclei-templates/cve-less/themes/elegance-93d95b14737baf6796a29212125f2e59.yaml @@ -0,0 +1,58 @@ +id: elegance-93d95b14737baf6796a29212125f2e59 + +info: + name: > + Elegance <= 2.4 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14d84ad4-904b-4000-af82-b1b68c724aa2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/elegance/" + google-query: inurl:"/wp-content/themes/elegance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,elegance,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/elegance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elegance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/elegant-grunge-0aff17e28ef121a8c519ec81ffed16b1.yaml b/nuclei-templates/cve-less/themes/elegant-grunge-0aff17e28ef121a8c519ec81ffed16b1.yaml new file mode 100644 index 0000000000..13773b15eb --- /dev/null +++ b/nuclei-templates/cve-less/themes/elegant-grunge-0aff17e28ef121a8c519ec81ffed16b1.yaml @@ -0,0 +1,58 @@ +id: elegant-grunge-0aff17e28ef121a8c519ec81ffed16b1 + +info: + name: > + Elegant Grunge <= 1.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94dd90ef-d801-4fd6-ade7-e1e7ad2e5fec?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/elegant-grunge/" + google-query: inurl:"/wp-content/themes/elegant-grunge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,elegant-grunge,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/elegant-grunge/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elegant-grunge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/elemin-7b82f3d715a6e6e5e86a24db471b8d19.yaml b/nuclei-templates/cve-less/themes/elemin-7b82f3d715a6e6e5e86a24db471b8d19.yaml new file mode 100644 index 0000000000..109f429936 --- /dev/null +++ b/nuclei-templates/cve-less/themes/elemin-7b82f3d715a6e6e5e86a24db471b8d19.yaml @@ -0,0 +1,58 @@ +id: elemin-7b82f3d715a6e6e5e86a24db471b8d19 + +info: + name: > + Elemin < 1.4.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea3ba0f5-6bc2-455c-b4e3-891ed6b2518c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/elemin/" + google-query: inurl:"/wp-content/themes/elemin/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,elemin,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/elemin/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elemin" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/elevate-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/elevate-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..a880d16bc1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/elevate-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: elevate-wp-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/elevate-wp/" + google-query: inurl:"/wp-content/themes/elevate-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,elevate-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/elevate-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elevate-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/elitepress-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/elitepress-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..350251aa1d --- /dev/null +++ b/nuclei-templates/cve-less/themes/elitepress-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: elitepress-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/elitepress/" + google-query: inurl:"/wp-content/themes/elitepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,elitepress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/elitepress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "elitepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/emmet-lite-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/emmet-lite-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..e1d0d71543 --- /dev/null +++ b/nuclei-templates/cve-less/themes/emmet-lite-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: emmet-lite-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/emmet-lite/" + google-query: inurl:"/wp-content/themes/emmet-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,emmet-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/emmet-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "emmet-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/enfold-1876a4c168f4df4e89e5c4309cb04275.yaml b/nuclei-templates/cve-less/themes/enfold-1876a4c168f4df4e89e5c4309cb04275.yaml new file mode 100644 index 0000000000..af71234b10 --- /dev/null +++ b/nuclei-templates/cve-less/themes/enfold-1876a4c168f4df4e89e5c4309cb04275.yaml @@ -0,0 +1,58 @@ +id: enfold-1876a4c168f4df4e89e5c4309cb04275 + +info: + name: > + Enfold < 3.0.1 - Unspecified Vulnerability + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d4f3d386-98cc-4b5a-b13f-841e812bb37f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/enfold/" + google-query: inurl:"/wp-content/themes/enfold/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,enfold,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/enfold/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enfold" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/enfold-35b352df5d14bf9606b8ec800fc7030c.yaml b/nuclei-templates/cve-less/themes/enfold-35b352df5d14bf9606b8ec800fc7030c.yaml new file mode 100644 index 0000000000..5959f6e787 --- /dev/null +++ b/nuclei-templates/cve-less/themes/enfold-35b352df5d14bf9606b8ec800fc7030c.yaml @@ -0,0 +1,58 @@ +id: enfold-35b352df5d14bf9606b8ec800fc7030c + +info: + name: > + Enfold <= 5.6.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/100b700f-8812-48be-8a04-28f60a57b35f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/enfold/" + google-query: inurl:"/wp-content/themes/enfold/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,enfold,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/enfold/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enfold" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/enfold-4e11cfef06ec2642923cf28426346ef9.yaml b/nuclei-templates/cve-less/themes/enfold-4e11cfef06ec2642923cf28426346ef9.yaml new file mode 100644 index 0000000000..61c82507ec --- /dev/null +++ b/nuclei-templates/cve-less/themes/enfold-4e11cfef06ec2642923cf28426346ef9.yaml @@ -0,0 +1,58 @@ +id: enfold-4e11cfef06ec2642923cf28426346ef9 + +info: + name: > + Enfold - Responsive Multi-Purpose Theme < 4.2.1 - Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d6af3cd-1a92-428f-a51c-f01a3ba6ebae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/enfold/" + google-query: inurl:"/wp-content/themes/enfold/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,enfold,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/enfold/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enfold" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/enfold-ed5e4871114b7f75ca3b625c577f01e9.yaml b/nuclei-templates/cve-less/themes/enfold-ed5e4871114b7f75ca3b625c577f01e9.yaml new file mode 100644 index 0000000000..1b600cc0c4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/enfold-ed5e4871114b7f75ca3b625c577f01e9.yaml @@ -0,0 +1,58 @@ +id: enfold-ed5e4871114b7f75ca3b625c577f01e9 + +info: + name: > + Enfold - Responsive Multi-Purpose Theme < 4.8.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0793db6-5a9b-4726-935e-c8d614443611?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/enfold/" + google-query: inurl:"/wp-content/themes/enfold/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,enfold,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/enfold/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enfold" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/enlighten-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/enlighten-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..a2fa8bcf97 --- /dev/null +++ b/nuclei-templates/cve-less/themes/enlighten-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: enlighten-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/enlighten/" + google-query: inurl:"/wp-content/themes/enlighten/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,enlighten,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/enlighten/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enlighten" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/enlighten-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/enlighten-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..84744da658 --- /dev/null +++ b/nuclei-templates/cve-less/themes/enlighten-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: enlighten-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/enlighten/" + google-query: inurl:"/wp-content/themes/enlighten/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,enlighten,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/enlighten/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enlighten" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/enlighten-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/enlighten-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..025bbc1e6a --- /dev/null +++ b/nuclei-templates/cve-less/themes/enlighten-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: enlighten-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/enlighten/" + google-query: inurl:"/wp-content/themes/enlighten/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,enlighten,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/enlighten/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "enlighten" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/envo-business-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/envo-business-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..c1a45fd75e --- /dev/null +++ b/nuclei-templates/cve-less/themes/envo-business-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: envo-business-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/envo-business/" + google-query: inurl:"/wp-content/themes/envo-business/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,envo-business,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/envo-business/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "envo-business" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/epic-church-7968590f04797f892b64c6624bb7ba86.yaml b/nuclei-templates/cve-less/themes/epic-church-7968590f04797f892b64c6624bb7ba86.yaml new file mode 100644 index 0000000000..58e571bbfe --- /dev/null +++ b/nuclei-templates/cve-less/themes/epic-church-7968590f04797f892b64c6624bb7ba86.yaml @@ -0,0 +1,58 @@ +id: epic-church-7968590f04797f892b64c6624bb7ba86 + +info: + name: > + Epic Church by Organized Themes <= 3.6 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2450277e-589d-4153-bd3f-ffed1a8b4340?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/epic-church/" + google-query: inurl:"/wp-content/themes/epic-church/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,epic-church,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/epic-church/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "epic-church" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eptonic-4d35df14ccd9eab621208a42de471fff.yaml b/nuclei-templates/cve-less/themes/eptonic-4d35df14ccd9eab621208a42de471fff.yaml new file mode 100644 index 0000000000..da0176d9e2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eptonic-4d35df14ccd9eab621208a42de471fff.yaml @@ -0,0 +1,58 @@ +id: eptonic-4d35df14ccd9eab621208a42de471fff + +info: + name: > + Eptonic <= 1.4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e87d7ca0-6fa3-4ca3-b308-d47e1e2e6566?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eptonic/" + google-query: inurl:"/wp-content/themes/eptonic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eptonic,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eptonic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eptonic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/esplanade-a255ef8b2471d464b72404fea528ca4b.yaml b/nuclei-templates/cve-less/themes/esplanade-a255ef8b2471d464b72404fea528ca4b.yaml new file mode 100644 index 0000000000..16cc7bf45a --- /dev/null +++ b/nuclei-templates/cve-less/themes/esplanade-a255ef8b2471d464b72404fea528ca4b.yaml @@ -0,0 +1,58 @@ +id: esplanade-a255ef8b2471d464b72404fea528ca4b + +info: + name: > + Esplanade < 1.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/395ff912-dad7-4dff-8bc4-bc58ecc96a90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/esplanade/" + google-query: inurl:"/wp-content/themes/esplanade/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,esplanade,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/esplanade/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "esplanade" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/essence-cf3f8795f333a75c5fe6e390bdbbdfce.yaml b/nuclei-templates/cve-less/themes/essence-cf3f8795f333a75c5fe6e390bdbbdfce.yaml new file mode 100644 index 0000000000..b85680d26e --- /dev/null +++ b/nuclei-templates/cve-less/themes/essence-cf3f8795f333a75c5fe6e390bdbbdfce.yaml @@ -0,0 +1,58 @@ +id: essence-cf3f8795f333a75c5fe6e390bdbbdfce + +info: + name: > + Essence < 1.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/559b7250-5b10-4a01-925e-73ed4fa7ca3d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/essence/" + google-query: inurl:"/wp-content/themes/essence/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,essence,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/essence/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "essence" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/estrutura-basica-f89b8b2276b119437fe5d13da6f29ea1.yaml b/nuclei-templates/cve-less/themes/estrutura-basica-f89b8b2276b119437fe5d13da6f29ea1.yaml new file mode 100644 index 0000000000..8527decf37 --- /dev/null +++ b/nuclei-templates/cve-less/themes/estrutura-basica-f89b8b2276b119437fe5d13da6f29ea1.yaml @@ -0,0 +1,58 @@ +id: estrutura-basica-f89b8b2276b119437fe5d13da6f29ea1 + +info: + name: > + estrutura-basica (All Known Versions) - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f980e902-820b-43e0-8334-fc70c711a126?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/estrutura-basica/" + google-query: inurl:"/wp-content/themes/estrutura-basica/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,estrutura-basica,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/estrutura-basica/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "estrutura-basica" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/euclid-a6caef4d4eacfb6278b4d425ef54c643.yaml b/nuclei-templates/cve-less/themes/euclid-a6caef4d4eacfb6278b4d425ef54c643.yaml new file mode 100644 index 0000000000..c31e85262f --- /dev/null +++ b/nuclei-templates/cve-less/themes/euclid-a6caef4d4eacfb6278b4d425ef54c643.yaml @@ -0,0 +1,58 @@ +id: euclid-a6caef4d4eacfb6278b4d425ef54c643 + +info: + name: > + Euclid <= All Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1281a4d8-fa77-45b4-b0b4-e3bed1b4a4ea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/euclid/" + google-query: inurl:"/wp-content/themes/euclid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,euclid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/euclid/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "euclid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eunice-cca0a1d963a9d045f5815fda1ac1ee73.yaml b/nuclei-templates/cve-less/themes/eunice-cca0a1d963a9d045f5815fda1ac1ee73.yaml new file mode 100644 index 0000000000..8026219f8d --- /dev/null +++ b/nuclei-templates/cve-less/themes/eunice-cca0a1d963a9d045f5815fda1ac1ee73.yaml @@ -0,0 +1,58 @@ +id: eunice-cca0a1d963a9d045f5815fda1ac1ee73 + +info: + name: > + Eunice (All Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45323807-c347-44ac-bf22-11b4feda02e6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eunice/" + google-query: inurl:"/wp-content/themes/eunice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eunice,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eunice/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eunice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eunoia-457ebe36f8d645741bdfd0b59a49af7e.yaml b/nuclei-templates/cve-less/themes/eunoia-457ebe36f8d645741bdfd0b59a49af7e.yaml new file mode 100644 index 0000000000..b8e079b7d9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eunoia-457ebe36f8d645741bdfd0b59a49af7e.yaml @@ -0,0 +1,58 @@ +id: eunoia-457ebe36f8d645741bdfd0b59a49af7e + +info: + name: > + Eunoia (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/69903c2e-749a-4a7d-99a2-b63c26d4170a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eunoia/" + google-query: inurl:"/wp-content/themes/eunoia/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eunoia,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eunoia/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eunoia" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/eventpress-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/eventpress-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..b8828aa577 --- /dev/null +++ b/nuclei-templates/cve-less/themes/eventpress-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: eventpress-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/eventpress/" + google-query: inurl:"/wp-content/themes/eventpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,eventpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/eventpress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "eventpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/everest-news-3f03bc4b4b5619e488422c5b9dbcc730.yaml b/nuclei-templates/cve-less/themes/everest-news-3f03bc4b4b5619e488422c5b9dbcc730.yaml new file mode 100644 index 0000000000..4b44d515f4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/everest-news-3f03bc4b4b5619e488422c5b9dbcc730.yaml @@ -0,0 +1,58 @@ +id: everest-news-3f03bc4b4b5619e488422c5b9dbcc730 + +info: + name: > + Cream Blog, Fascinate, Glaze Blog Lite, & Everest News (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b97404f-c34d-483d-b11c-03a706306270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/everest-news/" + google-query: inurl:"/wp-content/themes/everest-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,everest-news,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/everest-news/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/everest-news-47a3d5ecf22b909cbf2d50dac0698416.yaml b/nuclei-templates/cve-less/themes/everest-news-47a3d5ecf22b909cbf2d50dac0698416.yaml new file mode 100644 index 0000000000..a2d2234bcc --- /dev/null +++ b/nuclei-templates/cve-less/themes/everest-news-47a3d5ecf22b909cbf2d50dac0698416.yaml @@ -0,0 +1,58 @@ +id: everest-news-47a3d5ecf22b909cbf2d50dac0698416 + +info: + name: > + Everest News <= 1.1.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac96d3c5-1409-47f7-9e8e-0c35aa8199ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/everest-news/" + google-query: inurl:"/wp-content/themes/everest-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,everest-news,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/everest-news/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/everest-news-pro-006ac377302a554decdd04aa7ce724fd.yaml b/nuclei-templates/cve-less/themes/everest-news-pro-006ac377302a554decdd04aa7ce724fd.yaml new file mode 100644 index 0000000000..00145bce08 --- /dev/null +++ b/nuclei-templates/cve-less/themes/everest-news-pro-006ac377302a554decdd04aa7ce724fd.yaml @@ -0,0 +1,58 @@ +id: everest-news-pro-006ac377302a554decdd04aa7ce724fd + +info: + name: > + Everest News Pro <= 1.1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb967453-59d6-4b03-8c75-1906b99bff80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/everest-news-pro/" + google-query: inurl:"/wp-content/themes/everest-news-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,everest-news-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/everest-news-pro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everest-news-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/everse-161c9677e95eb847dc432eddc65db142.yaml b/nuclei-templates/cve-less/themes/everse-161c9677e95eb847dc432eddc65db142.yaml new file mode 100644 index 0000000000..c46a68452f --- /dev/null +++ b/nuclei-templates/cve-less/themes/everse-161c9677e95eb847dc432eddc65db142.yaml @@ -0,0 +1,58 @@ +id: everse-161c9677e95eb847dc432eddc65db142 + +info: + name: > + Multiple DeoThemes Themes <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8b0f14-f31a-45cd-bb98-0b717059aa80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/everse/" + google-query: inurl:"/wp-content/themes/everse/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,everse,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/everse/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everse" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/everse-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/everse-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..296d2272f8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/everse-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: everse-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/everse/" + google-query: inurl:"/wp-content/themes/everse/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,everse,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/everse/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "everse" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/evolve-170bc795059fb0d98227f8d8677e21e8.yaml b/nuclei-templates/cve-less/themes/evolve-170bc795059fb0d98227f8d8677e21e8.yaml new file mode 100644 index 0000000000..3500421b36 --- /dev/null +++ b/nuclei-templates/cve-less/themes/evolve-170bc795059fb0d98227f8d8677e21e8.yaml @@ -0,0 +1,58 @@ +id: evolve-170bc795059fb0d98227f8d8677e21e8 + +info: + name: > + Evolve < 1.2.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d7ea482-c45e-4a73-9e64-4d4438e197b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/evolve/" + google-query: inurl:"/wp-content/themes/evolve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,evolve,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/evolve/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "evolve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/explicit-3af6c2ccbc49fd7ac785ee1caf9ff348.yaml b/nuclei-templates/cve-less/themes/explicit-3af6c2ccbc49fd7ac785ee1caf9ff348.yaml new file mode 100644 index 0000000000..2b31f5d391 --- /dev/null +++ b/nuclei-templates/cve-less/themes/explicit-3af6c2ccbc49fd7ac785ee1caf9ff348.yaml @@ -0,0 +1,58 @@ +id: explicit-3af6c2ccbc49fd7ac785ee1caf9ff348 + +info: + name: > + Explicit (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78b12984-72ce-493f-b1ef-200e96c6eb57?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/explicit/" + google-query: inurl:"/wp-content/themes/explicit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,explicit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/explicit/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "explicit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/expose-f1706f372daa69509bea2f9b5da810d7.yaml b/nuclei-templates/cve-less/themes/expose-f1706f372daa69509bea2f9b5da810d7.yaml new file mode 100644 index 0000000000..3558b7402d --- /dev/null +++ b/nuclei-templates/cve-less/themes/expose-f1706f372daa69509bea2f9b5da810d7.yaml @@ -0,0 +1,58 @@ +id: expose-f1706f372daa69509bea2f9b5da810d7 + +info: + name: > + Expose (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76ac20e0-c4d1-40ad-8f15-70aad547f08f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/expose/" + google-query: inurl:"/wp-content/themes/expose/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,expose,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/expose/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "expose" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/exquisite-wp-4569fe83ce2bb42a6e266298e47ccef7.yaml b/nuclei-templates/cve-less/themes/exquisite-wp-4569fe83ce2bb42a6e266298e47ccef7.yaml new file mode 100644 index 0000000000..1e2c87d8c5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/exquisite-wp-4569fe83ce2bb42a6e266298e47ccef7.yaml @@ -0,0 +1,58 @@ +id: exquisite-wp-4569fe83ce2bb42a6e266298e47ccef7 + +info: + name: > + Exquisite - Ultimate Newspaper Theme <= 1.3.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/238dc80f-0d82-44e2-a950-321defb2361b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/exquisite-wp/" + google-query: inurl:"/wp-content/themes/exquisite-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,exquisite-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/exquisite-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "exquisite-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/extra-1d46fd13f5959cf6806058064008bc68.yaml b/nuclei-templates/cve-less/themes/extra-1d46fd13f5959cf6806058064008bc68.yaml new file mode 100644 index 0000000000..9b5d83d787 --- /dev/null +++ b/nuclei-templates/cve-less/themes/extra-1d46fd13f5959cf6806058064008bc68.yaml @@ -0,0 +1,58 @@ +id: extra-1d46fd13f5959cf6806058064008bc68 + +info: + name: > + ElegantThemes <= 1.2.3 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18b5777c-d176-4214-81ac-b92188704196?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/extra/" + google-query: inurl:"/wp-content/themes/extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,extra,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/extra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/extra-344bde3518beec69cf32525065cbb92a.yaml b/nuclei-templates/cve-less/themes/extra-344bde3518beec69cf32525065cbb92a.yaml new file mode 100644 index 0000000000..894c6448b2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/extra-344bde3518beec69cf32525065cbb92a.yaml @@ -0,0 +1,58 @@ +id: extra-344bde3518beec69cf32525065cbb92a + +info: + name: > + Elegant Themes Divi 3.23 - 4.0.9, Divi Extra 2.23 - 4.0.9, Divi Builder 2.23 - 4.0.9 - PHP Code Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82ce66d0-dc53-4433-b499-30bfd48efaf2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/extra/" + google-query: inurl:"/wp-content/themes/extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,extra,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/extra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.23', '<= 4.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/extra-4f3dfe26281afe74af18534af8dcf024.yaml b/nuclei-templates/cve-less/themes/extra-4f3dfe26281afe74af18534af8dcf024.yaml new file mode 100644 index 0000000000..ece8bf2f5f --- /dev/null +++ b/nuclei-templates/cve-less/themes/extra-4f3dfe26281afe74af18534af8dcf024.yaml @@ -0,0 +1,58 @@ +id: extra-4f3dfe26281afe74af18534af8dcf024 + +info: + name: > + Elegant Themes Divi Theme, Extra Theme, Divi Page Builder <= 4.25.0 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/efac70f6-d959-41f7-bdef-d554f1c9133e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/extra/" + google-query: inurl:"/wp-content/themes/extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,extra,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/extra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.25.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/extra-aabb704338c74a997901edf2f42d1b76.yaml b/nuclei-templates/cve-less/themes/extra-aabb704338c74a997901edf2f42d1b76.yaml new file mode 100644 index 0000000000..94fecd0c6d --- /dev/null +++ b/nuclei-templates/cve-less/themes/extra-aabb704338c74a997901edf2f42d1b76.yaml @@ -0,0 +1,58 @@ +id: extra-aabb704338c74a997901edf2f42d1b76 + +info: + name: > + Elegant Themes (Various Versions) - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1295f1a0-1f5a-4707-96cc-c408a6819e87?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/extra/" + google-query: inurl:"/wp-content/themes/extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,extra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/extra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.17.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/extra-ec458e7be91893393a96a7bb4f01d557.yaml b/nuclei-templates/cve-less/themes/extra-ec458e7be91893393a96a7bb4f01d557.yaml new file mode 100644 index 0000000000..62eb0c995a --- /dev/null +++ b/nuclei-templates/cve-less/themes/extra-ec458e7be91893393a96a7bb4f01d557.yaml @@ -0,0 +1,58 @@ +id: extra-ec458e7be91893393a96a7bb4f01d557 + +info: + name: > + Elegant Themes (Multiple Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e03bc79-b42e-4015-8476-2b0488c71028?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/extra/" + google-query: inurl:"/wp-content/themes/extra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,extra,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/extra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "extra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/f8-lite-e63ed950312b124c0d59757ed157173d.yaml b/nuclei-templates/cve-less/themes/f8-lite-e63ed950312b124c0d59757ed157173d.yaml new file mode 100644 index 0000000000..f52499b6c3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/f8-lite-e63ed950312b124c0d59757ed157173d.yaml @@ -0,0 +1,58 @@ +id: f8-lite-e63ed950312b124c0d59757ed157173d + +info: + name: > + F8 Lite <= 4.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08d18e18-b9f2-4a4d-bf9b-4a64a7881a4f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/f8-lite/" + google-query: inurl:"/wp-content/themes/f8-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,f8-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/f8-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "f8-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/famous-cf7f4b2a43d36048518c3a15a6b1e9fb.yaml b/nuclei-templates/cve-less/themes/famous-cf7f4b2a43d36048518c3a15a6b1e9fb.yaml new file mode 100644 index 0000000000..0916ce025f --- /dev/null +++ b/nuclei-templates/cve-less/themes/famous-cf7f4b2a43d36048518c3a15a6b1e9fb.yaml @@ -0,0 +1,58 @@ +id: famous-cf7f4b2a43d36048518c3a15a6b1e9fb + +info: + name: > + Famous (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a25528b1-28e0-4ac7-a7ab-2568b8349990?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/famous/" + google-query: inurl:"/wp-content/themes/famous/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,famous,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/famous/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "famous" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fascinate-3f03bc4b4b5619e488422c5b9dbcc730.yaml b/nuclei-templates/cve-less/themes/fascinate-3f03bc4b4b5619e488422c5b9dbcc730.yaml new file mode 100644 index 0000000000..a68ef088c1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fascinate-3f03bc4b4b5619e488422c5b9dbcc730.yaml @@ -0,0 +1,58 @@ +id: fascinate-3f03bc4b4b5619e488422c5b9dbcc730 + +info: + name: > + Cream Blog, Fascinate, Glaze Blog Lite, & Everest News (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b97404f-c34d-483d-b11c-03a706306270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fascinate/" + google-query: inurl:"/wp-content/themes/fascinate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fascinate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fascinate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fascinate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/feather12-97973544cebecee841ad830cbe28916b.yaml b/nuclei-templates/cve-less/themes/feather12-97973544cebecee841ad830cbe28916b.yaml new file mode 100644 index 0000000000..0547d887f7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/feather12-97973544cebecee841ad830cbe28916b.yaml @@ -0,0 +1,58 @@ +id: feather12-97973544cebecee841ad830cbe28916b + +info: + name: > + Feather12 (Unkown Versions) - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1261ad29-e4c1-4385-9f41-d3f3eecbb7dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/feather12/" + google-query: inurl:"/wp-content/themes/feather12/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,feather12,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/feather12/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "feather12" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/felici-83462ab31c23510cbb4ed4293c5a8d88.yaml b/nuclei-templates/cve-less/themes/felici-83462ab31c23510cbb4ed4293c5a8d88.yaml new file mode 100644 index 0000000000..dfd7e4078e --- /dev/null +++ b/nuclei-templates/cve-less/themes/felici-83462ab31c23510cbb4ed4293c5a8d88.yaml @@ -0,0 +1,58 @@ +id: felici-83462ab31c23510cbb4ed4293c5a8d88 + +info: + name: > + Felici Premium Magazine Theme <= 1.7 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/983b4fac-cf27-4156-85a0-e4db90aee327?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/felici/" + google-query: inurl:"/wp-content/themes/felici/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,felici,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/felici/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "felici" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/felici-f938ed44289b5e0945ae989fccd9132d.yaml b/nuclei-templates/cve-less/themes/felici-f938ed44289b5e0945ae989fccd9132d.yaml new file mode 100644 index 0000000000..650e781392 --- /dev/null +++ b/nuclei-templates/cve-less/themes/felici-f938ed44289b5e0945ae989fccd9132d.yaml @@ -0,0 +1,58 @@ +id: felici-f938ed44289b5e0945ae989fccd9132d + +info: + name: > + Felici (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a44873c-5f14-4ff5-85ed-a6575aaa9347?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/felici/" + google-query: inurl:"/wp-content/themes/felici/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,felici,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/felici/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "felici" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fifteen-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/fifteen-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..0c80bf813a --- /dev/null +++ b/nuclei-templates/cve-less/themes/fifteen-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: fifteen-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fifteen/" + google-query: inurl:"/wp-content/themes/fifteen/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fifteen,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fifteen/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fifteen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/financio-5f8311aafd1822576a08e6d0d9e190d6.yaml b/nuclei-templates/cve-less/themes/financio-5f8311aafd1822576a08e6d0d9e190d6.yaml new file mode 100644 index 0000000000..be65157e02 --- /dev/null +++ b/nuclei-templates/cve-less/themes/financio-5f8311aafd1822576a08e6d0d9e190d6.yaml @@ -0,0 +1,58 @@ +id: financio-5f8311aafd1822576a08e6d0d9e190d6 + +info: + name: > + Financio <= 1.1.3 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ec03e35-9de7-44e8-88be-5a374edd8984?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/financio/" + google-query: inurl:"/wp-content/themes/financio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,financio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/financio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "financio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/findgo-ea09594aa9ec08768edd559eabb04c79.yaml b/nuclei-templates/cve-less/themes/findgo-ea09594aa9ec08768edd559eabb04c79.yaml new file mode 100644 index 0000000000..bf21ba6963 --- /dev/null +++ b/nuclei-templates/cve-less/themes/findgo-ea09594aa9ec08768edd559eabb04c79.yaml @@ -0,0 +1,58 @@ +id: findgo-ea09594aa9ec08768edd559eabb04c79 + +info: + name: > + Findgo <= 1.3.31 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d4420bf-1095-44ca-8fa6-dd5ea11c7489?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/findgo/" + google-query: inurl:"/wp-content/themes/findgo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,findgo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/findgo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "findgo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/findus-cfc50a0804539ff785925571caba914b.yaml b/nuclei-templates/cve-less/themes/findus-cfc50a0804539ff785925571caba914b.yaml new file mode 100644 index 0000000000..e8747b1055 --- /dev/null +++ b/nuclei-templates/cve-less/themes/findus-cfc50a0804539ff785925571caba914b.yaml @@ -0,0 +1,58 @@ +id: findus-cfc50a0804539ff785925571caba914b + +info: + name: > + Findus - Directory Listing WordPress Theme < 1.1.15 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a7b15ce-ff0e-4693-8ceb-afa341306dc3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/findus/" + google-query: inurl:"/wp-content/themes/findus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,findus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/findus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "findus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fitness-park-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/fitness-park-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..1e0597a33c --- /dev/null +++ b/nuclei-templates/cve-less/themes/fitness-park-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: fitness-park-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fitness-park/" + google-query: inurl:"/wp-content/themes/fitness-park/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fitness-park,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fitness-park/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fitness-park" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fitness-park-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/fitness-park-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..9079e6cea9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fitness-park-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: fitness-park-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fitness-park/" + google-query: inurl:"/wp-content/themes/fitness-park/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fitness-park,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fitness-park/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fitness-park" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/flashlight-9ffe40ed2860214fb806a94be92be5e0.yaml b/nuclei-templates/cve-less/themes/flashlight-9ffe40ed2860214fb806a94be92be5e0.yaml new file mode 100644 index 0000000000..ddd957d990 --- /dev/null +++ b/nuclei-templates/cve-less/themes/flashlight-9ffe40ed2860214fb806a94be92be5e0.yaml @@ -0,0 +1,58 @@ +id: flashlight-9ffe40ed2860214fb806a94be92be5e0 + +info: + name: > + Flashlight <= 2.8.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b722bf4e-1e04-4d80-b359-7d43596751a8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/flashlight/" + google-query: inurl:"/wp-content/themes/flashlight/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,flashlight,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/flashlight/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flashlight" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/flashnews-64c7d7601684303a62306dcc7a67e144.yaml b/nuclei-templates/cve-less/themes/flashnews-64c7d7601684303a62306dcc7a67e144.yaml new file mode 100644 index 0000000000..16e4147e34 --- /dev/null +++ b/nuclei-templates/cve-less/themes/flashnews-64c7d7601684303a62306dcc7a67e144.yaml @@ -0,0 +1,58 @@ +id: flashnews-64c7d7601684303a62306dcc7a67e144 + +info: + name: > + Flash News (All Versions) - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58ea0c9c-f63d-4c31-b02e-a86d5fe732aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/flashnews/" + google-query: inurl:"/wp-content/themes/flashnews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,flashnews,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/flashnews/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flashnews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/flashy-8fedd556095791de1de8cc0522ea9441.yaml b/nuclei-templates/cve-less/themes/flashy-8fedd556095791de1de8cc0522ea9441.yaml new file mode 100644 index 0000000000..ccac84d2f1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/flashy-8fedd556095791de1de8cc0522ea9441.yaml @@ -0,0 +1,58 @@ +id: flashy-8fedd556095791de1de8cc0522ea9441 + +info: + name: > + flashy <= 1.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/78e7d0f7-b588-407b-bb3e-068589114ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/flashy/" + google-query: inurl:"/wp-content/themes/flashy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,flashy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/flashy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flashy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/flatsome-77106c0ccdc78c4aab3d70ea99b49ace.yaml b/nuclei-templates/cve-less/themes/flatsome-77106c0ccdc78c4aab3d70ea99b49ace.yaml new file mode 100644 index 0000000000..34c760b469 --- /dev/null +++ b/nuclei-templates/cve-less/themes/flatsome-77106c0ccdc78c4aab3d70ea99b49ace.yaml @@ -0,0 +1,58 @@ +id: flatsome-77106c0ccdc78c4aab3d70ea99b49ace + +info: + name: > + Flatsome <= 3.16.8 - Reflected Cross-Site Scripting in UX Builder + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c6d0868-e5d6-4497-8967-6af46f4fe7d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/flatsome/" + google-query: inurl:"/wp-content/themes/flatsome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,flatsome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/flatsome/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flatsome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.16.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/flatsome-87cfaaeceb9c0891333268e59bdaed28.yaml b/nuclei-templates/cve-less/themes/flatsome-87cfaaeceb9c0891333268e59bdaed28.yaml new file mode 100644 index 0000000000..844260647c --- /dev/null +++ b/nuclei-templates/cve-less/themes/flatsome-87cfaaeceb9c0891333268e59bdaed28.yaml @@ -0,0 +1,58 @@ +id: flatsome-87cfaaeceb9c0891333268e59bdaed28 + +info: + name: > + Flatsome <= 3.17.5 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bfc4863a-1b8c-4b13-9df1-18f221b40b26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/flatsome/" + google-query: inurl:"/wp-content/themes/flatsome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,flatsome,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/flatsome/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "flatsome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.17.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/focusblog-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/focusblog-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..dd81a23cb5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/focusblog-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: focusblog-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/focusblog/" + google-query: inurl:"/wp-content/themes/focusblog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,focusblog,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/focusblog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "focusblog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/focusblog-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/focusblog-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..816744209b --- /dev/null +++ b/nuclei-templates/cve-less/themes/focusblog-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: focusblog-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/focusblog/" + google-query: inurl:"/wp-content/themes/focusblog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,focusblog,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/focusblog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "focusblog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/folo-50f6ed0722c7403f0c0ea86b6df7e2ff.yaml b/nuclei-templates/cve-less/themes/folo-50f6ed0722c7403f0c0ea86b6df7e2ff.yaml new file mode 100644 index 0000000000..6a8746170a --- /dev/null +++ b/nuclei-templates/cve-less/themes/folo-50f6ed0722c7403f0c0ea86b6df7e2ff.yaml @@ -0,0 +1,58 @@ +id: folo-50f6ed0722c7403f0c0ea86b6df7e2ff + +info: + name: > + Folo (Unknown Versions) - Cross Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd8f348d-07ff-480d-bcc1-fb39aead1b1d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/folo/" + google-query: inurl:"/wp-content/themes/folo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,folo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/folo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "folo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/foodbakery-2687b8db8bc7e715cc5827b0aedae5fd.yaml b/nuclei-templates/cve-less/themes/foodbakery-2687b8db8bc7e715cc5827b0aedae5fd.yaml new file mode 100644 index 0000000000..e70d4dc2d3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/foodbakery-2687b8db8bc7e715cc5827b0aedae5fd.yaml @@ -0,0 +1,58 @@ +id: foodbakery-2687b8db8bc7e715cc5827b0aedae5fd + +info: + name: > + FoodBakery | Delivery Restaurant Directory WordPress Theme <= 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6c9e5cd4-303c-48a7-aef8-20c804aa5985?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/foodbakery/" + google-query: inurl:"/wp-content/themes/foodbakery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,foodbakery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/foodbakery/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foodbakery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/foodbakery-db1c237e9a78f54d168253b3ad75c0f7.yaml b/nuclei-templates/cve-less/themes/foodbakery-db1c237e9a78f54d168253b3ad75c0f7.yaml new file mode 100644 index 0000000000..f79fd31f23 --- /dev/null +++ b/nuclei-templates/cve-less/themes/foodbakery-db1c237e9a78f54d168253b3ad75c0f7.yaml @@ -0,0 +1,58 @@ +id: foodbakery-db1c237e9a78f54d168253b3ad75c0f7 + +info: + name: > + FoodBakery <= 1.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/607d1a6e-2277-4960-a5bd-95e94c510856?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/foodbakery/" + google-query: inurl:"/wp-content/themes/foodbakery/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,foodbakery,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/foodbakery/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "foodbakery" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/footysquare-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/footysquare-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..46afc5c21c --- /dev/null +++ b/nuclei-templates/cve-less/themes/footysquare-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: footysquare-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/footysquare/" + google-query: inurl:"/wp-content/themes/footysquare/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,footysquare,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/footysquare/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "footysquare" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fotography-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/fotography-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..a14be97614 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fotography-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: fotography-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fotography/" + google-query: inurl:"/wp-content/themes/fotography/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fotography,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fotography/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fotography" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fotography-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/fotography-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..dc32f3c059 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fotography-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: fotography-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fotography/" + google-query: inurl:"/wp-content/themes/fotography/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fotography,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fotography/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fotography" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fotography-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/fotography-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..8c334fbb43 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fotography-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: fotography-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fotography/" + google-query: inurl:"/wp-content/themes/fotography/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fotography,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fotography/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fotography" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fraction-theme-57b3e170776f796da541bc1640675353.yaml b/nuclei-templates/cve-less/themes/fraction-theme-57b3e170776f796da541bc1640675353.yaml new file mode 100644 index 0000000000..6684dd8fd4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fraction-theme-57b3e170776f796da541bc1640675353.yaml @@ -0,0 +1,58 @@ +id: fraction-theme-57b3e170776f796da541bc1640675353 + +info: + name: > + Faction <= 1.1.1 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/570f680b-b688-49ad-9eed-0bc966a4cdf7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fraction-theme/" + google-query: inurl:"/wp-content/themes/fraction-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fraction-theme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fraction-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fraction-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/freesia-empire-81558dbfc1c686b52278115bcc212692.yaml b/nuclei-templates/cve-less/themes/freesia-empire-81558dbfc1c686b52278115bcc212692.yaml new file mode 100644 index 0000000000..21e282f1ca --- /dev/null +++ b/nuclei-templates/cve-less/themes/freesia-empire-81558dbfc1c686b52278115bcc212692.yaml @@ -0,0 +1,58 @@ +id: freesia-empire-81558dbfc1c686b52278115bcc212692 + +info: + name: > + Freesia Empire <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4a051e3-4489-4124-abf6-905b7ff7fd3c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/freesia-empire/" + google-query: inurl:"/wp-content/themes/freesia-empire/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,freesia-empire,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/freesia-empire/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "freesia-empire" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fruitful-547ae69e23e79945ee41118869bf3151.yaml b/nuclei-templates/cve-less/themes/fruitful-547ae69e23e79945ee41118869bf3151.yaml new file mode 100644 index 0000000000..5f636bf295 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fruitful-547ae69e23e79945ee41118869bf3151.yaml @@ -0,0 +1,58 @@ +id: fruitful-547ae69e23e79945ee41118869bf3151 + +info: + name: > + Fruitful < 3.8.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/49cf047f-4e8c-4f37-b8c0-d931c02fda7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fruitful/" + google-query: inurl:"/wp-content/themes/fruitful/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fruitful,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fruitful/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fruitful" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fruitful-80477eee43f78931347fee8d51f74e47.yaml b/nuclei-templates/cve-less/themes/fruitful-80477eee43f78931347fee8d51f74e47.yaml new file mode 100644 index 0000000000..78b30a0ad1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fruitful-80477eee43f78931347fee8d51f74e47.yaml @@ -0,0 +1,58 @@ +id: fruitful-80477eee43f78931347fee8d51f74e47 + +info: + name: > + Fruitful < 3.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66ddb0f7-4d4c-4c4f-b766-9a07609cd0e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fruitful/" + google-query: inurl:"/wp-content/themes/fruitful/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fruitful,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fruitful/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fruitful" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/furnob-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml b/nuclei-templates/cve-less/themes/furnob-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml new file mode 100644 index 0000000000..59a7fc2835 --- /dev/null +++ b/nuclei-templates/cve-less/themes/furnob-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml @@ -0,0 +1,58 @@ +id: furnob-0ed3cd48ec0b8d5d59c0c2a69ba7db3d + +info: + name: > + Multiple Themes by KlbTheme <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d5036a-c756-47a6-b071-c393f8a6ce5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/furnob/" + google-query: inurl:"/wp-content/themes/furnob/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,furnob,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/furnob/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "furnob" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fushion-theme-33dcd77e5c96a0f6e337bee86a58383b.yaml b/nuclei-templates/cve-less/themes/fushion-theme-33dcd77e5c96a0f6e337bee86a58383b.yaml new file mode 100644 index 0000000000..393224b8fa --- /dev/null +++ b/nuclei-templates/cve-less/themes/fushion-theme-33dcd77e5c96a0f6e337bee86a58383b.yaml @@ -0,0 +1,58 @@ +id: fushion-theme-33dcd77e5c96a0f6e337bee86a58383b + +info: + name: > + Fusion <= 2.1 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f0ff2cb3-a385-4f5c-b555-b6a3dadfc458?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fushion-theme/" + google-query: inurl:"/wp-content/themes/fushion-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fushion-theme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fushion-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fushion-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fushion-theme-fd188ab37a40c68b931d58403248c27a.yaml b/nuclei-templates/cve-less/themes/fushion-theme-fd188ab37a40c68b931d58403248c27a.yaml new file mode 100644 index 0000000000..b7bfa42bf4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/fushion-theme-fd188ab37a40c68b931d58403248c27a.yaml @@ -0,0 +1,58 @@ +id: fushion-theme-fd188ab37a40c68b931d58403248c27a + +info: + name: > + Fusion <= 2.1 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b5a4289-6228-4b77-9929-864b88c34dbe?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fushion-theme/" + google-query: inurl:"/wp-content/themes/fushion-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fushion-theme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fushion-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fushion-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/fusion-delisted-50500b0da9551f89249fc057d52b16ad.yaml b/nuclei-templates/cve-less/themes/fusion-delisted-50500b0da9551f89249fc057d52b16ad.yaml new file mode 100644 index 0000000000..5717df49ca --- /dev/null +++ b/nuclei-templates/cve-less/themes/fusion-delisted-50500b0da9551f89249fc057d52b16ad.yaml @@ -0,0 +1,58 @@ +id: fusion-delisted-50500b0da9551f89249fc057d52b16ad + +info: + name: > + Fusion <= 3.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1f286857-2fd3-4884-982f-47773f7af636?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/fusion-delisted/" + google-query: inurl:"/wp-content/themes/fusion-delisted/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,fusion-delisted,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/fusion-delisted/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "fusion-delisted" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/gameplan-d95348460c662925b6cdc57ffd4469ba.yaml b/nuclei-templates/cve-less/themes/gameplan-d95348460c662925b6cdc57ffd4469ba.yaml new file mode 100644 index 0000000000..fe06f03beb --- /dev/null +++ b/nuclei-templates/cve-less/themes/gameplan-d95348460c662925b6cdc57ffd4469ba.yaml @@ -0,0 +1,58 @@ +id: gameplan-d95348460c662925b6cdc57ffd4469ba + +info: + name: > + Gameplan - Event and Gym Fitness WordPress Theme <= 1.6.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ac251c8-4ade-4391-aedd-f48b13045a31?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/gameplan/" + google-query: inurl:"/wp-content/themes/gameplan/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,gameplan,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/gameplan/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gameplan" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/gamestheme-999d17b4d58bf12011698692c265aa6e.yaml b/nuclei-templates/cve-less/themes/gamestheme-999d17b4d58bf12011698692c265aa6e.yaml new file mode 100644 index 0000000000..2487a665b9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/gamestheme-999d17b4d58bf12011698692c265aa6e.yaml @@ -0,0 +1,58 @@ +id: gamestheme-999d17b4d58bf12011698692c265aa6e + +info: + name: > + GamesTheme <= 1.0.3 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ad47937-8125-405c-9fd3-9b3b210942fa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/GamesTheme/" + google-query: inurl:"/wp-content/themes/GamesTheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,GamesTheme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/GamesTheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "GamesTheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/geomagazine-f81807c8cf5504e6b638b35df7a4314b.yaml b/nuclei-templates/cve-less/themes/geomagazine-f81807c8cf5504e6b638b35df7a4314b.yaml new file mode 100644 index 0000000000..e81fc4ebc9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/geomagazine-f81807c8cf5504e6b638b35df7a4314b.yaml @@ -0,0 +1,58 @@ +id: geomagazine-f81807c8cf5504e6b638b35df7a4314b + +info: + name: > + Geo Magazine Theme <= 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ddc2f44-e53f-45c2-b293-ad4abc8cff8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/geomagazine/" + google-query: inurl:"/wp-content/themes/geomagazine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,geomagazine,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/geomagazine/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geomagazine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/geoplaces4-2c537d66a4c6bad8d1c1a1ad47705253.yaml b/nuclei-templates/cve-less/themes/geoplaces4-2c537d66a4c6bad8d1c1a1ad47705253.yaml new file mode 100644 index 0000000000..8bfec37627 --- /dev/null +++ b/nuclei-templates/cve-less/themes/geoplaces4-2c537d66a4c6bad8d1c1a1ad47705253.yaml @@ -0,0 +1,58 @@ +id: geoplaces4-2c537d66a4c6bad8d1c1a1ad47705253 + +info: + name: > + GeoPlaces <= 4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02fe4a33-d059-461c-a03f-b7306ce6193f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/geoplaces4/" + google-query: inurl:"/wp-content/themes/geoplaces4/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,geoplaces4,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/geoplaces4/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geoplaces4" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/geoplaces4beta-2c537d66a4c6bad8d1c1a1ad47705253.yaml b/nuclei-templates/cve-less/themes/geoplaces4beta-2c537d66a4c6bad8d1c1a1ad47705253.yaml new file mode 100644 index 0000000000..1481f521c4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/geoplaces4beta-2c537d66a4c6bad8d1c1a1ad47705253.yaml @@ -0,0 +1,58 @@ +id: geoplaces4beta-2c537d66a4c6bad8d1c1a1ad47705253 + +info: + name: > + GeoPlaces <= 4 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02fe4a33-d059-461c-a03f-b7306ce6193f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/geoplaces4beta/" + google-query: inurl:"/wp-content/themes/geoplaces4beta/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,geoplaces4beta,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/geoplaces4beta/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "geoplaces4beta" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4beta') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ghost-0338317a9be20261847acad2da4f5a91.yaml b/nuclei-templates/cve-less/themes/ghost-0338317a9be20261847acad2da4f5a91.yaml new file mode 100644 index 0000000000..23192d139c --- /dev/null +++ b/nuclei-templates/cve-less/themes/ghost-0338317a9be20261847acad2da4f5a91.yaml @@ -0,0 +1,58 @@ +id: ghost-0338317a9be20261847acad2da4f5a91 + +info: + name: > + Ghost (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/75699831-de38-4c3b-840d-82a04fc97048?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ghost/" + google-query: inurl:"/wp-content/themes/ghost/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ghost,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ghost/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ghost" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/glaze-blog-lite-3f03bc4b4b5619e488422c5b9dbcc730.yaml b/nuclei-templates/cve-less/themes/glaze-blog-lite-3f03bc4b4b5619e488422c5b9dbcc730.yaml new file mode 100644 index 0000000000..aeb9b50e2a --- /dev/null +++ b/nuclei-templates/cve-less/themes/glaze-blog-lite-3f03bc4b4b5619e488422c5b9dbcc730.yaml @@ -0,0 +1,58 @@ +id: glaze-blog-lite-3f03bc4b4b5619e488422c5b9dbcc730 + +info: + name: > + Cream Blog, Fascinate, Glaze Blog Lite, & Everest News (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b97404f-c34d-483d-b11c-03a706306270?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/glaze-blog-lite/" + google-query: inurl:"/wp-content/themes/glaze-blog-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,glaze-blog-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/glaze-blog-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "glaze-blog-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/golo-1089e240eda4d80561f1b8e6010e3ce7.yaml b/nuclei-templates/cve-less/themes/golo-1089e240eda4d80561f1b8e6010e3ce7.yaml new file mode 100644 index 0000000000..6e1e9107b6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/golo-1089e240eda4d80561f1b8e6010e3ce7.yaml @@ -0,0 +1,58 @@ +id: golo-1089e240eda4d80561f1b8e6010e3ce7 + +info: + name: > + Golo - City Travel Guide WordPress Theme < 1.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cf037a61-7e4d-4c20-b868-2fa78950bad3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/golo/" + google-query: inurl:"/wp-content/themes/golo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,golo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/golo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "golo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/goodnex-43e8debd4c3b7f8c8ab3ef6be25475c7.yaml b/nuclei-templates/cve-less/themes/goodnex-43e8debd4c3b7f8c8ab3ef6be25475c7.yaml new file mode 100644 index 0000000000..0d921cc3e3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/goodnex-43e8debd4c3b7f8c8ab3ef6be25475c7.yaml @@ -0,0 +1,58 @@ +id: goodnex-43e8debd4c3b7f8c8ab3ef6be25475c7 + +info: + name: > + Goodnex Responsive HTML5/CSS3 Site Template < 1.1.3 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bf658b2c-9c98-47af-abfc-9689cdbfcda3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/goodnex/" + google-query: inurl:"/wp-content/themes/goodnex/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,goodnex,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/goodnex/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goodnex" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/goto-442aecad9b46601423fcf0fe82256c7f.yaml b/nuclei-templates/cve-less/themes/goto-442aecad9b46601423fcf0fe82256c7f.yaml new file mode 100644 index 0000000000..f721f5ee3e --- /dev/null +++ b/nuclei-templates/cve-less/themes/goto-442aecad9b46601423fcf0fe82256c7f.yaml @@ -0,0 +1,58 @@ +id: goto-442aecad9b46601423fcf0fe82256c7f + +info: + name: > + Goto - Tour & Travel WordPress Theme < 2.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/82c3c97d-f9dd-4667-a1a8-94cf12947618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/goto/" + google-query: inurl:"/wp-content/themes/goto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,goto,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/goto/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/goto-4847183a2bd6b773eb419ec6d2799ae7.yaml b/nuclei-templates/cve-less/themes/goto-4847183a2bd6b773eb419ec6d2799ae7.yaml new file mode 100644 index 0000000000..712e534a3f --- /dev/null +++ b/nuclei-templates/cve-less/themes/goto-4847183a2bd6b773eb419ec6d2799ae7.yaml @@ -0,0 +1,58 @@ +id: goto-4847183a2bd6b773eb419ec6d2799ae7 + +info: + name: > + Goto - Tour & Travel WordPress Theme < 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4b2eb0e8-98b6-4a97-9825-0be4032b5d4e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/goto/" + google-query: inurl:"/wp-content/themes/goto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,goto,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/goto/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/goto-e8d662d192f7e80a8946662a46a27738.yaml b/nuclei-templates/cve-less/themes/goto-e8d662d192f7e80a8946662a46a27738.yaml new file mode 100644 index 0000000000..4e4ae3bb0c --- /dev/null +++ b/nuclei-templates/cve-less/themes/goto-e8d662d192f7e80a8946662a46a27738.yaml @@ -0,0 +1,58 @@ +id: goto-e8d662d192f7e80a8946662a46a27738 + +info: + name: > + Goto - Tour & Travel WordPress Theme < 2.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59ada382-5559-49a5-84ea-69201d185829?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/goto/" + google-query: inurl:"/wp-content/themes/goto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,goto,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/goto/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "goto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/graphene-3f304f35d6ee539a7dae259777309bd7.yaml b/nuclei-templates/cve-less/themes/graphene-3f304f35d6ee539a7dae259777309bd7.yaml new file mode 100644 index 0000000000..6a9fc3c466 --- /dev/null +++ b/nuclei-templates/cve-less/themes/graphene-3f304f35d6ee539a7dae259777309bd7.yaml @@ -0,0 +1,58 @@ +id: graphene-3f304f35d6ee539a7dae259777309bd7 + +info: + name: > + Graphene <= 2.9.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2f19051-fe80-469c-a514-ec3a848a4015?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/graphene/" + google-query: inurl:"/wp-content/themes/graphene/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,graphene,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/graphene/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "graphene" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/greenmart-b4cada853b7b3a733e2f6bbdfd522497.yaml b/nuclei-templates/cve-less/themes/greenmart-b4cada853b7b3a733e2f6bbdfd522497.yaml new file mode 100644 index 0000000000..6cce5e82c6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/greenmart-b4cada853b7b3a733e2f6bbdfd522497.yaml @@ -0,0 +1,58 @@ +id: greenmart-b4cada853b7b3a733e2f6bbdfd522497 + +info: + name: > + GreenMart – Organic & Food WooCommerce WordPress Theme < 2.4.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a2f60a9-c061-4ef9-a582-c82eb1311e5a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/greenmart/" + google-query: inurl:"/wp-content/themes/greenmart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,greenmart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/greenmart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greenmart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/greenmart-dd0aba2b8bd6fc74a58e5b1a3acae9cd.yaml b/nuclei-templates/cve-less/themes/greenmart-dd0aba2b8bd6fc74a58e5b1a3acae9cd.yaml new file mode 100644 index 0000000000..5b875e10e2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/greenmart-dd0aba2b8bd6fc74a58e5b1a3acae9cd.yaml @@ -0,0 +1,58 @@ +id: greenmart-dd0aba2b8bd6fc74a58e5b1a3acae9cd + +info: + name: > + Greenmart <= 2.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4d32eae6-f49f-403b-b295-c72b1486c71c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/greenmart/" + google-query: inurl:"/wp-content/themes/greenmart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,greenmart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/greenmart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "greenmart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/gridsby-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/gridsby-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..cb59ec9b1e --- /dev/null +++ b/nuclei-templates/cve-less/themes/gridsby-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: gridsby-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/gridsby/" + google-query: inurl:"/wp-content/themes/gridsby/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,gridsby,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/gridsby/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gridsby" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/grimag-faa38012dd533ba54ed31853b5a52271.yaml b/nuclei-templates/cve-less/themes/grimag-faa38012dd533ba54ed31853b5a52271.yaml new file mode 100644 index 0000000000..23dd4c8ed0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/grimag-faa38012dd533ba54ed31853b5a52271.yaml @@ -0,0 +1,58 @@ +id: grimag-faa38012dd533ba54ed31853b5a52271 + +info: + name: > + Grimag <= 1.1.0 - Open Redirection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d81bc83-9e36-4fe9-8274-c65d17905f6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Grimag/" + google-query: inurl:"/wp-content/themes/Grimag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Grimag,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Grimag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Grimag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/gucherry-blog-48870272d1c6df07d927cc89f91930ec.yaml b/nuclei-templates/cve-less/themes/gucherry-blog-48870272d1c6df07d927cc89f91930ec.yaml new file mode 100644 index 0000000000..6e57356514 --- /dev/null +++ b/nuclei-templates/cve-less/themes/gucherry-blog-48870272d1c6df07d927cc89f91930ec.yaml @@ -0,0 +1,58 @@ +id: gucherry-blog-48870272d1c6df07d927cc89f91930ec + +info: + name: > + GuCherry Blog <= 1.1.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a01ed06-4b48-4958-9990-469bf43d3e00?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/gucherry-blog/" + google-query: inurl:"/wp-content/themes/gucherry-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,gucherry-blog,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/gucherry-blog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "gucherry-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/happenstance-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/happenstance-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..5cbf1df490 --- /dev/null +++ b/nuclei-templates/cve-less/themes/happenstance-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: happenstance-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/happenstance/" + google-query: inurl:"/wp-content/themes/happenstance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,happenstance,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/happenstance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "happenstance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/hashone-06cd0f178ae533c7b94126d052d17b3f.yaml b/nuclei-templates/cve-less/themes/hashone-06cd0f178ae533c7b94126d052d17b3f.yaml new file mode 100644 index 0000000000..49cef7ade3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/hashone-06cd0f178ae533c7b94126d052d17b3f.yaml @@ -0,0 +1,58 @@ +id: hashone-06cd0f178ae533c7b94126d052d17b3f + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3543a39-ad88-40be-93b8-36ec638db4bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/hashone/" + google-query: inurl:"/wp-content/themes/hashone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,hashone,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/hashone/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hashone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/hashone-d566c0816c38ea6ca24760850c1eaf4a.yaml b/nuclei-templates/cve-less/themes/hashone-d566c0816c38ea6ca24760850c1eaf4a.yaml new file mode 100644 index 0000000000..5d20cfd499 --- /dev/null +++ b/nuclei-templates/cve-less/themes/hashone-d566c0816c38ea6ca24760850c1eaf4a.yaml @@ -0,0 +1,58 @@ +id: hashone-d566c0816c38ea6ca24760850c1eaf4a + +info: + name: > + Multiple Themes (Various Versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/154a838c-f8bb-4568-b066-a78264c75eea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/hashone/" + google-query: inurl:"/wp-content/themes/hashone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,hashone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/hashone/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hashone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/hasium-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/hasium-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..9bf5c41f3a --- /dev/null +++ b/nuclei-templates/cve-less/themes/hasium-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: hasium-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/hasium/" + google-query: inurl:"/wp-content/themes/hasium/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,hasium,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/hasium/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hasium" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/hasten-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/hasten-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..d0adfa19aa --- /dev/null +++ b/nuclei-templates/cve-less/themes/hasten-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: hasten-lite-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/hasten-lite/" + google-query: inurl:"/wp-content/themes/hasten-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,hasten-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/hasten-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hasten-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/headway-27ec034aba5d4951c82cebc35f1cf5b5.yaml b/nuclei-templates/cve-less/themes/headway-27ec034aba5d4951c82cebc35f1cf5b5.yaml new file mode 100644 index 0000000000..1c929048d4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/headway-27ec034aba5d4951c82cebc35f1cf5b5.yaml @@ -0,0 +1,58 @@ +id: headway-27ec034aba5d4951c82cebc35f1cf5b5 + +info: + name: > + Headway < 3.8.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77fdfb42-6540-43be-be5c-63dd6e1a34d7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/headway/" + google-query: inurl:"/wp-content/themes/headway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,headway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/headway/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "headway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.8.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/hello-elementor-5aee783cc8ced806fe0ecf20e182e607.yaml b/nuclei-templates/cve-less/themes/hello-elementor-5aee783cc8ced806fe0ecf20e182e607.yaml new file mode 100644 index 0000000000..24bafb115e --- /dev/null +++ b/nuclei-templates/cve-less/themes/hello-elementor-5aee783cc8ced806fe0ecf20e182e607.yaml @@ -0,0 +1,58 @@ +id: hello-elementor-5aee783cc8ced806fe0ecf20e182e607 + +info: + name: > + Hello Elementor <= 3.0.0 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3092a92-db5b-4e22-b4cf-43b773c7eb48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/hello-elementor/" + google-query: inurl:"/wp-content/themes/hello-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,hello-elementor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/hello-elementor/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hello-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/himer-dda12396183ee405a0b6804083230616.yaml b/nuclei-templates/cve-less/themes/himer-dda12396183ee405a0b6804083230616.yaml new file mode 100644 index 0000000000..4d02f815ed --- /dev/null +++ b/nuclei-templates/cve-less/themes/himer-dda12396183ee405a0b6804083230616.yaml @@ -0,0 +1,58 @@ +id: himer-dda12396183ee405a0b6804083230616 + +info: + name: > + WPQA - Builder forms Addon For WordPress (<= 5.9.2), Himer (<= 1.9.3) and Discy (<= 5.5.3) - Authenticated (Subscriber+) Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/085da0fa-9487-4938-94ea-c1593be7c023?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/himer/" + google-query: inurl:"/wp-content/themes/himer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,himer,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/himer/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "himer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/holding_pattern-5970a067cb1dc2fa3e954c8bf2cf2b8e.yaml b/nuclei-templates/cve-less/themes/holding_pattern-5970a067cb1dc2fa3e954c8bf2cf2b8e.yaml new file mode 100644 index 0000000000..39adde7cc1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/holding_pattern-5970a067cb1dc2fa3e954c8bf2cf2b8e.yaml @@ -0,0 +1,58 @@ +id: holding_pattern-5970a067cb1dc2fa3e954c8bf2cf2b8e + +info: + name: > + Holding Pattern <= 0.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/15fecefa-f1f1-47f3-8ad7-ec7772ecafc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/holding_pattern/" + google-query: inurl:"/wp-content/themes/holding_pattern/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,holding_pattern,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/holding_pattern/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "holding_pattern" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/homesweet-5804396a1d6a8f486bc1aec9d443ab22.yaml b/nuclei-templates/cve-less/themes/homesweet-5804396a1d6a8f486bc1aec9d443ab22.yaml new file mode 100644 index 0000000000..d432b6c782 --- /dev/null +++ b/nuclei-templates/cve-less/themes/homesweet-5804396a1d6a8f486bc1aec9d443ab22.yaml @@ -0,0 +1,58 @@ +id: homesweet-5804396a1d6a8f486bc1aec9d443ab22 + +info: + name: > + HomeSweet - Real Estate WordPress Theme <= 1.4 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/422ae683-dbbe-43ef-b902-ae7570495f21?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/homesweet/" + google-query: inurl:"/wp-content/themes/homesweet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,homesweet,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/homesweet/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "homesweet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/homevillas-real-estate-437a2bdda5608892f1a5bb69f6ded0f0.yaml b/nuclei-templates/cve-less/themes/homevillas-real-estate-437a2bdda5608892f1a5bb69f6ded0f0.yaml new file mode 100644 index 0000000000..a1f45dac28 --- /dev/null +++ b/nuclei-templates/cve-less/themes/homevillas-real-estate-437a2bdda5608892f1a5bb69f6ded0f0.yaml @@ -0,0 +1,58 @@ +id: homevillas-real-estate-437a2bdda5608892f1a5bb69f6ded0f0 + +info: + name: > + Home Villas | Real Estate WordPress Theme <= 2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5f7c4c26-ff77-4be0-946c-5480b4a28017?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/homevillas-real-estate/" + google-query: inurl:"/wp-content/themes/homevillas-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,homevillas-real-estate,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/homevillas-real-estate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "homevillas-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/honeypress-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/honeypress-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..367c73a7bf --- /dev/null +++ b/nuclei-templates/cve-less/themes/honeypress-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: honeypress-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/honeypress/" + google-query: inurl:"/wp-content/themes/honeypress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,honeypress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/honeypress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "honeypress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/houzez-7f368981191f0cf6c7a56557a4488185.yaml b/nuclei-templates/cve-less/themes/houzez-7f368981191f0cf6c7a56557a4488185.yaml new file mode 100644 index 0000000000..ef22dcfe7e --- /dev/null +++ b/nuclei-templates/cve-less/themes/houzez-7f368981191f0cf6c7a56557a4488185.yaml @@ -0,0 +1,58 @@ +id: houzez-7f368981191f0cf6c7a56557a4488185 + +info: + name: > + Houzez <= 2.8.2 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64087631-3514-4fec-ad2f-b095d7c727bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/houzez/" + google-query: inurl:"/wp-content/themes/houzez/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,houzez,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/houzez/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "houzez" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/houzez-a707f28c337bd9658c006013182d7d8f.yaml b/nuclei-templates/cve-less/themes/houzez-a707f28c337bd9658c006013182d7d8f.yaml new file mode 100644 index 0000000000..cb0a1c440c --- /dev/null +++ b/nuclei-templates/cve-less/themes/houzez-a707f28c337bd9658c006013182d7d8f.yaml @@ -0,0 +1,58 @@ +id: houzez-a707f28c337bd9658c006013182d7d8f + +info: + name: > + Houzez <= 2.7.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0578f4d1-5953-4fbe-8bc3-0569bee57a1a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/houzez/" + google-query: inurl:"/wp-content/themes/houzez/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,houzez,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/houzez/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "houzez" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/houzez-f04b27db24cc3e0ca67ee5594c5f4107.yaml b/nuclei-templates/cve-less/themes/houzez-f04b27db24cc3e0ca67ee5594c5f4107.yaml new file mode 100644 index 0000000000..4a850411e8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/houzez-f04b27db24cc3e0ca67ee5594c5f4107.yaml @@ -0,0 +1,58 @@ +id: houzez-f04b27db24cc3e0ca67ee5594c5f4107 + +info: + name: > + Houzez <= 1.8.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e54a627-7882-47de-ba36-1c34754bd64a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/houzez/" + google-query: inurl:"/wp-content/themes/houzez/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,houzez,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/houzez/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "houzez" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/hueman-59b839d07dc6fe1d9770afd5dab3f742.yaml b/nuclei-templates/cve-less/themes/hueman-59b839d07dc6fe1d9770afd5dab3f742.yaml new file mode 100644 index 0000000000..aab38e9363 --- /dev/null +++ b/nuclei-templates/cve-less/themes/hueman-59b839d07dc6fe1d9770afd5dab3f742.yaml @@ -0,0 +1,58 @@ +id: hueman-59b839d07dc6fe1d9770afd5dab3f742 + +info: + name: > + Hueman <= 3.6.3 - Cross-Site Request Forgery Bypass + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d54b4dc9-8590-433c-873a-efb49e2e79cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/hueman/" + google-query: inurl:"/wp-content/themes/hueman/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,hueman,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/hueman/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hueman" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/hugo-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/hugo-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..9fe4af7b61 --- /dev/null +++ b/nuclei-templates/cve-less/themes/hugo-wp-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: hugo-wp-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/hugo-wp/" + google-query: inurl:"/wp-content/themes/hugo-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,hugo-wp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/hugo-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hugo-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/hybrid-e0526e94c953cbf63946457c72f3fcad.yaml b/nuclei-templates/cve-less/themes/hybrid-e0526e94c953cbf63946457c72f3fcad.yaml new file mode 100644 index 0000000000..c533b62bfe --- /dev/null +++ b/nuclei-templates/cve-less/themes/hybrid-e0526e94c953cbf63946457c72f3fcad.yaml @@ -0,0 +1,58 @@ +id: hybrid-e0526e94c953cbf63946457c72f3fcad + +info: + name: > + Hybrid < 0.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48e30af6-d28c-4547-aef9-d216064c9829?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/hybrid/" + google-query: inurl:"/wp-content/themes/hybrid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,hybrid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/hybrid/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "hybrid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.10') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/i-excel-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/i-excel-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..2014d35ece --- /dev/null +++ b/nuclei-templates/cve-less/themes/i-excel-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: i-excel-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/i-excel/" + google-query: inurl:"/wp-content/themes/i-excel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,i-excel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/i-excel/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i-excel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/i-max-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/i-max-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..bfe17f75eb --- /dev/null +++ b/nuclei-templates/cve-less/themes/i-max-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: i-max-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/i-max/" + google-query: inurl:"/wp-content/themes/i-max/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,i-max,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/i-max/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "i-max" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ignition-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/ignition-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..106ad7d41d --- /dev/null +++ b/nuclei-templates/cve-less/themes/ignition-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: ignition-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ignition/" + google-query: inurl:"/wp-content/themes/ignition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ignition,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ignition/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ignition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ignition-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/ignition-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..4c405a8437 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ignition-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: ignition-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ignition/" + google-query: inurl:"/wp-content/themes/ignition/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ignition,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ignition/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ignition" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ih-business-pro-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/ih-business-pro-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..01d55e25f5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ih-business-pro-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: ih-business-pro-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ih-business-pro/" + google-query: inurl:"/wp-content/themes/ih-business-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ih-business-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ih-business-pro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ih-business-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/illdy-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/illdy-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..22f56d63d4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/illdy-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: illdy-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/illdy/" + google-query: inurl:"/wp-content/themes/illdy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,illdy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/illdy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "illdy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/iloveit-434d2b681ad27e0586b6012fe3acb7bd.yaml b/nuclei-templates/cve-less/themes/iloveit-434d2b681ad27e0586b6012fe3acb7bd.yaml new file mode 100644 index 0000000000..f0f073753b --- /dev/null +++ b/nuclei-templates/cve-less/themes/iloveit-434d2b681ad27e0586b6012fe3acb7bd.yaml @@ -0,0 +1,58 @@ +id: iloveit-434d2b681ad27e0586b6012fe3acb7bd + +info: + name: > + I LOVE IT! < 2.4 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8205bfe-4586-42e9-b4f7-e46947396b6b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/iloveit/" + google-query: inurl:"/wp-content/themes/iloveit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,iloveit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/iloveit/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "iloveit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/imperial-fairytale-1f96e011e88f8f33ff0ebc9d331187dd.yaml b/nuclei-templates/cve-less/themes/imperial-fairytale-1f96e011e88f8f33ff0ebc9d331187dd.yaml new file mode 100644 index 0000000000..07d4dfbf72 --- /dev/null +++ b/nuclei-templates/cve-less/themes/imperial-fairytale-1f96e011e88f8f33ff0ebc9d331187dd.yaml @@ -0,0 +1,58 @@ +id: imperial-fairytale-1f96e011e88f8f33ff0ebc9d331187dd + +info: + name: > + Imperial Fairytale Theme (All Versions) - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9b41efbd-bd47-415f-8de7-f30b3a7cf326?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/imperial-fairytale/" + google-query: inurl:"/wp-content/themes/imperial-fairytale/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,imperial-fairytale,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/imperial-fairytale/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "imperial-fairytale" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/infocus-c7028a8b7ddad37c6ed248c7eae283ef.yaml b/nuclei-templates/cve-less/themes/infocus-c7028a8b7ddad37c6ed248c7eae283ef.yaml new file mode 100644 index 0000000000..00b0df5c6b --- /dev/null +++ b/nuclei-templates/cve-less/themes/infocus-c7028a8b7ddad37c6ed248c7eae283ef.yaml @@ -0,0 +1,58 @@ +id: infocus-c7028a8b7ddad37c6ed248c7eae283ef + +info: + name: > + InFocus <= 3.3 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25cb57fb-4af5-4f12-a01c-7ffdd8f84219?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/infocus/" + google-query: inurl:"/wp-content/themes/infocus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,infocus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/infocus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infocus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/infocus-e5d8148f1234029a0a9a4eed3ccbe249.yaml b/nuclei-templates/cve-less/themes/infocus-e5d8148f1234029a0a9a4eed3ccbe249.yaml new file mode 100644 index 0000000000..f9399812a9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/infocus-e5d8148f1234029a0a9a4eed3ccbe249.yaml @@ -0,0 +1,58 @@ +id: infocus-e5d8148f1234029a0a9a4eed3ccbe249 + +info: + name: > + InFocus <= 3.3 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2480091f-2b5d-440c-9617-934d097b3a63?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/infocus/" + google-query: inurl:"/wp-content/themes/infocus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,infocus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/infocus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "infocus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/injob-92767dd3ccfd3becf3c7e6ba2eae227b.yaml b/nuclei-templates/cve-less/themes/injob-92767dd3ccfd3becf3c7e6ba2eae227b.yaml new file mode 100644 index 0000000000..739b6e7d20 --- /dev/null +++ b/nuclei-templates/cve-less/themes/injob-92767dd3ccfd3becf3c7e6ba2eae227b.yaml @@ -0,0 +1,58 @@ +id: injob-92767dd3ccfd3becf3c7e6ba2eae227b + +info: + name: > + InJob | Multi features for recruitment WordPress Theme < 3.3.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e99a7d46-a3be-4408-9000-fb43fe397dd9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/injob/" + google-query: inurl:"/wp-content/themes/injob/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,injob,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/injob/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "injob" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/injob-ef882ef3da26fd11db1b83d92b970da3.yaml b/nuclei-templates/cve-less/themes/injob-ef882ef3da26fd11db1b83d92b970da3.yaml new file mode 100644 index 0000000000..1b2889a5b9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/injob-ef882ef3da26fd11db1b83d92b970da3.yaml @@ -0,0 +1,58 @@ +id: injob-ef882ef3da26fd11db1b83d92b970da3 + +info: + name: > + InJob | Multi features for recruitment WordPress Theme <= 3.4.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48c40f60-d919-41d9-a2d9-8dad1f03db5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/injob/" + google-query: inurl:"/wp-content/themes/injob/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,injob,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/injob/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "injob" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/intrace-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml b/nuclei-templates/cve-less/themes/intrace-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml new file mode 100644 index 0000000000..e6284740ae --- /dev/null +++ b/nuclei-templates/cve-less/themes/intrace-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml @@ -0,0 +1,58 @@ +id: intrace-0eadfcaa632fa9ba5901b3c6b61b28a7 + +info: + name: > + Multiple Themes by jegstudio <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edb34ad0-352e-462e-a7f1-64a804a760ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/intrace/" + google-query: inurl:"/wp-content/themes/intrace/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,intrace,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/intrace/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intrace" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/intrepidity-a725115e3c0edf17f7d3885d6b810646.yaml b/nuclei-templates/cve-less/themes/intrepidity-a725115e3c0edf17f7d3885d6b810646.yaml new file mode 100644 index 0000000000..9208bffdab --- /dev/null +++ b/nuclei-templates/cve-less/themes/intrepidity-a725115e3c0edf17f7d3885d6b810646.yaml @@ -0,0 +1,58 @@ +id: intrepidity-a725115e3c0edf17f7d3885d6b810646 + +info: + name: > + Intrepidity <= 1.5.1 - Cross-Site Request Forgery via mytheme_add_admin + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01cc613a-d0b5-4c8f-8961-8f8aaf63b8ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/intrepidity/" + google-query: inurl:"/wp-content/themes/intrepidity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,intrepidity,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/intrepidity/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "intrepidity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/invento-632fa81c7cda7a0da5783abd37b66f4c.yaml b/nuclei-templates/cve-less/themes/invento-632fa81c7cda7a0da5783abd37b66f4c.yaml new file mode 100644 index 0000000000..5d7a0e05b7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/invento-632fa81c7cda7a0da5783abd37b66f4c.yaml @@ -0,0 +1,58 @@ +id: invento-632fa81c7cda7a0da5783abd37b66f4c + +info: + name: > + Invento | Architecture Building Agency Template <= 2015-05-15 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aaf38354-f95a-4bc5-a63e-3774eadf4fcb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/invento/" + google-query: inurl:"/wp-content/themes/invento/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,invento,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/invento/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "invento" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2015-05-15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ithemes-mobile-fa869fa1b9881b5f13b3949335d2518c.yaml b/nuclei-templates/cve-less/themes/ithemes-mobile-fa869fa1b9881b5f13b3949335d2518c.yaml new file mode 100644 index 0000000000..ed4e628606 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ithemes-mobile-fa869fa1b9881b5f13b3949335d2518c.yaml @@ -0,0 +1,58 @@ +id: ithemes-mobile-fa869fa1b9881b5f13b3949335d2518c + +info: + name: > + iThemes Mobile < 1.2.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/64ccf609-5cdf-4f05-ad83-4fb7aa475ba5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ithemes-mobile/" + google-query: inurl:"/wp-content/themes/ithemes-mobile/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ithemes-mobile,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ithemes-mobile/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ithemes-mobile" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ithemes2-896b6e6e64eabb6a52a6556daf8cafc3.yaml b/nuclei-templates/cve-less/themes/ithemes2-896b6e6e64eabb6a52a6556daf8cafc3.yaml new file mode 100644 index 0000000000..f16227827c --- /dev/null +++ b/nuclei-templates/cve-less/themes/ithemes2-896b6e6e64eabb6a52a6556daf8cafc3.yaml @@ -0,0 +1,58 @@ +id: ithemes2-896b6e6e64eabb6a52a6556daf8cafc3 + +info: + name: > + iThemes2 < 1.4.3 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/878420ce-3a39-494d-9169-44220b2c3307?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ithemes2/" + google-query: inurl:"/wp-content/themes/ithemes2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ithemes2,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ithemes2/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ithemes2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jannah-073caac98b397aafa1ef62965d38c4a4.yaml b/nuclei-templates/cve-less/themes/jannah-073caac98b397aafa1ef62965d38c4a4.yaml new file mode 100644 index 0000000000..fdc451b670 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jannah-073caac98b397aafa1ef62965d38c4a4.yaml @@ -0,0 +1,58 @@ +id: jannah-073caac98b397aafa1ef62965d38c4a4 + +info: + name: > + Jannah <= 5.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/40494f1e-d5df-4ed0-b107-aa52cb28bc0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jannah/" + google-query: inurl:"/wp-content/themes/jannah/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jannah,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jannah/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jannah" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jannah-6edf86dbe6ca8c2373758418bafd3a5c.yaml b/nuclei-templates/cve-less/themes/jannah-6edf86dbe6ca8c2373758418bafd3a5c.yaml new file mode 100644 index 0000000000..3c4d9d17a3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jannah-6edf86dbe6ca8c2373758418bafd3a5c.yaml @@ -0,0 +1,58 @@ +id: jannah-6edf86dbe6ca8c2373758418bafd3a5c + +info: + name: > + Jannah - Newspaper Magazine News BuddyPress AMP < 5.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0b04ea62-8e6b-4876-a9f8-7bc342e837f4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jannah/" + google-query: inurl:"/wp-content/themes/jannah/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jannah,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jannah/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jannah" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/javo-spot-f1d47f939b2f1e86782042bfd4182287.yaml b/nuclei-templates/cve-less/themes/javo-spot-f1d47f939b2f1e86782042bfd4182287.yaml new file mode 100644 index 0000000000..324c268816 --- /dev/null +++ b/nuclei-templates/cve-less/themes/javo-spot-f1d47f939b2f1e86782042bfd4182287.yaml @@ -0,0 +1,58 @@ +id: javo-spot-f1d47f939b2f1e86782042bfd4182287 + +info: + name: > + Javo Spot < 3.0.0 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db9cd10e-90c1-48b2-8760-d5fc501fb3ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/javo-spot/" + google-query: inurl:"/wp-content/themes/javo-spot/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,javo-spot,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/javo-spot/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "javo-spot" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jetapo-59597a1103eb0e1b65ccc3450fe7b191.yaml b/nuclei-templates/cve-less/themes/jetapo-59597a1103eb0e1b65ccc3450fe7b191.yaml new file mode 100644 index 0000000000..e013296745 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jetapo-59597a1103eb0e1b65ccc3450fe7b191.yaml @@ -0,0 +1,58 @@ +id: jetapo-59597a1103eb0e1b65ccc3450fe7b191 + +info: + name: > + Jetapo | Jobboard WordPress Theme and Jetapo | Jobboard WordPress Theme with WooCommerce < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86f95721-ff77-4137-adba-61d74373ee06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jetapo/" + google-query: inurl:"/wp-content/themes/jetapo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jetapo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jetapo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetapo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jetapo-with-woocommerce-59597a1103eb0e1b65ccc3450fe7b191.yaml b/nuclei-templates/cve-less/themes/jetapo-with-woocommerce-59597a1103eb0e1b65ccc3450fe7b191.yaml new file mode 100644 index 0000000000..b3464ba2e6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jetapo-with-woocommerce-59597a1103eb0e1b65ccc3450fe7b191.yaml @@ -0,0 +1,58 @@ +id: jetapo-with-woocommerce-59597a1103eb0e1b65ccc3450fe7b191 + +info: + name: > + Jetapo | Jobboard WordPress Theme and Jetapo | Jobboard WordPress Theme with WooCommerce < 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86f95721-ff77-4137-adba-61d74373ee06?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jetapo-with-woocommerce/" + google-query: inurl:"/wp-content/themes/jetapo-with-woocommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jetapo-with-woocommerce,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jetapo-with-woocommerce/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jetapo-with-woocommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jewelry-store-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/jewelry-store-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..b478251c51 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jewelry-store-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: jewelry-store-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jewelry-store/" + google-query: inurl:"/wp-content/themes/jewelry-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jewelry-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jewelry-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jewelry-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jnews-9eec149d26b5525f47c83e62d5178cba.yaml b/nuclei-templates/cve-less/themes/jnews-9eec149d26b5525f47c83e62d5178cba.yaml new file mode 100644 index 0000000000..08d8a7f812 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jnews-9eec149d26b5525f47c83e62d5178cba.yaml @@ -0,0 +1,58 @@ +id: jnews-9eec149d26b5525f47c83e62d5178cba + +info: + name: > + JNews - WordPress Newspaper Magazine Blog AMP Theme < 8.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/400d31ba-2cef-4558-8983-6689f7e4b93c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jnews/" + google-query: inurl:"/wp-content/themes/jnews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jnews,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jnews/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jnews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jobcareer-24ed2c04cbd73f5247d8f86d829c0936.yaml b/nuclei-templates/cve-less/themes/jobcareer-24ed2c04cbd73f5247d8f86d829c0936.yaml new file mode 100644 index 0000000000..47333e4c25 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jobcareer-24ed2c04cbd73f5247d8f86d829c0936.yaml @@ -0,0 +1,58 @@ +id: jobcareer-24ed2c04cbd73f5247d8f86d829c0936 + +info: + name: > + JobCareer <= 3.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6bbb0e81-8edd-44fa-9588-16c163a82ed1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jobcareer/" + google-query: inurl:"/wp-content/themes/jobcareer/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jobcareer,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jobcareer/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobcareer" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jobeleon-wpjobboard-d4c3b2bb6cecd391eb07e1531f6f5e45.yaml b/nuclei-templates/cve-less/themes/jobeleon-wpjobboard-d4c3b2bb6cecd391eb07e1531f6f5e45.yaml new file mode 100644 index 0000000000..9ac4a719d2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jobeleon-wpjobboard-d4c3b2bb6cecd391eb07e1531f6f5e45.yaml @@ -0,0 +1,58 @@ +id: jobeleon-wpjobboard-d4c3b2bb6cecd391eb07e1531f6f5e45 + +info: + name: > + Jobeleon Theme <= 1.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fef2f3fd-d6a3-4cb5-af5f-3fad8a67ca9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jobeleon-wpjobboard/" + google-query: inurl:"/wp-content/themes/jobeleon-wpjobboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jobeleon-wpjobboard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jobeleon-wpjobboard/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobeleon-wpjobboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jobroller-39f6c4b040b9b850cb80b837122e7ddf.yaml b/nuclei-templates/cve-less/themes/jobroller-39f6c4b040b9b850cb80b837122e7ddf.yaml new file mode 100644 index 0000000000..7df2b1377c --- /dev/null +++ b/nuclei-templates/cve-less/themes/jobroller-39f6c4b040b9b850cb80b837122e7ddf.yaml @@ -0,0 +1,58 @@ +id: jobroller-39f6c4b040b9b850cb80b837122e7ddf + +info: + name: > + JobRoller <= 1.7.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6b28908b-ffad-46d5-b6de-6b9c7bbe0134?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jobroller/" + google-query: inurl:"/wp-content/themes/jobroller/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jobroller,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jobroller/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jobroller" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/journalcrunch-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/journalcrunch-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..3ef169cdd4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/journalcrunch-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: journalcrunch-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/journalcrunch/" + google-query: inurl:"/wp-content/themes/journalcrunch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,journalcrunch,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/journalcrunch/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "journalcrunch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jumpstart-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/themes/jumpstart-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..98de3dddff --- /dev/null +++ b/nuclei-templates/cve-less/themes/jumpstart-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: jumpstart-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jumpstart/" + google-query: inurl:"/wp-content/themes/jumpstart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jumpstart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jumpstart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jumpstart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jupiter-25e01eb0a9bc2abfaf531fab30be9b46.yaml b/nuclei-templates/cve-less/themes/jupiter-25e01eb0a9bc2abfaf531fab30be9b46.yaml new file mode 100644 index 0000000000..a710f2e0b6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jupiter-25e01eb0a9bc2abfaf531fab30be9b46.yaml @@ -0,0 +1,58 @@ +id: jupiter-25e01eb0a9bc2abfaf531fab30be9b46 + +info: + name: > + JupiterX Theme <= 2.0.6 and Jupiter Theme <= 6.10.1 - Authenticated Path Traversal and Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/089cde8a-2896-4e4c-90c1-30605ccc919d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jupiter/" + google-query: inurl:"/wp-content/themes/jupiter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jupiter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jupiter/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jupiter-2fbd93f620678f9df8d36f97616c7078.yaml b/nuclei-templates/cve-less/themes/jupiter-2fbd93f620678f9df8d36f97616c7078.yaml new file mode 100644 index 0000000000..822aa8d5f0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jupiter-2fbd93f620678f9df8d36f97616c7078.yaml @@ -0,0 +1,58 @@ +id: jupiter-2fbd93f620678f9df8d36f97616c7078 + +info: + name: > + Jupiter Theme <= 6.10.1 - Authenticated Arbitrary Plugin Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab870fc4-1651-414e-8702-cbe9829a4e75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jupiter/" + google-query: inurl:"/wp-content/themes/jupiter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jupiter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jupiter/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jupiter-f3750481cefda659186282ffd61f21aa.yaml b/nuclei-templates/cve-less/themes/jupiter-f3750481cefda659186282ffd61f21aa.yaml new file mode 100644 index 0000000000..f0e95c7c5a --- /dev/null +++ b/nuclei-templates/cve-less/themes/jupiter-f3750481cefda659186282ffd61f21aa.yaml @@ -0,0 +1,58 @@ +id: jupiter-f3750481cefda659186282ffd61f21aa + +info: + name: > + Jupiter Theme <= 6.10.1 and JupiterX Core Plugin <= 2.0.7 - Authenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b54f38b6-5f98-469c-802a-a4c1e1f2ab0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jupiter/" + google-query: inurl:"/wp-content/themes/jupiter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jupiter,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jupiter/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.10.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jupiterx-0fb4e97ee7da5e51631d72f53857a9d4.yaml b/nuclei-templates/cve-less/themes/jupiterx-0fb4e97ee7da5e51631d72f53857a9d4.yaml new file mode 100644 index 0000000000..aa5f326c1e --- /dev/null +++ b/nuclei-templates/cve-less/themes/jupiterx-0fb4e97ee7da5e51631d72f53857a9d4.yaml @@ -0,0 +1,58 @@ +id: jupiterx-0fb4e97ee7da5e51631d72f53857a9d4 + +info: + name: > + JupiterX Theme <= 2.0.6 and JupiterX Core <= 2.0.6 - Authenticated Arbitrary Plugin Deactivation and Settings Modification + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/147b7be2-8bbe-4e95-bfcb-1c4ff8a41a3b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jupiterx/" + google-query: inurl:"/wp-content/themes/jupiterx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jupiterx,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jupiterx/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jupiterx-25e01eb0a9bc2abfaf531fab30be9b46.yaml b/nuclei-templates/cve-less/themes/jupiterx-25e01eb0a9bc2abfaf531fab30be9b46.yaml new file mode 100644 index 0000000000..32134172ce --- /dev/null +++ b/nuclei-templates/cve-less/themes/jupiterx-25e01eb0a9bc2abfaf531fab30be9b46.yaml @@ -0,0 +1,58 @@ +id: jupiterx-25e01eb0a9bc2abfaf531fab30be9b46 + +info: + name: > + JupiterX Theme <= 2.0.6 and Jupiter Theme <= 6.10.1 - Authenticated Path Traversal and Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/089cde8a-2896-4e4c-90c1-30605ccc919d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jupiterx/" + google-query: inurl:"/wp-content/themes/jupiterx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jupiterx,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jupiterx/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/jupiterx-427edef992d7f7fdd62c26fd579e2341.yaml b/nuclei-templates/cve-less/themes/jupiterx-427edef992d7f7fdd62c26fd579e2341.yaml new file mode 100644 index 0000000000..dd8767ff83 --- /dev/null +++ b/nuclei-templates/cve-less/themes/jupiterx-427edef992d7f7fdd62c26fd579e2341.yaml @@ -0,0 +1,58 @@ +id: jupiterx-427edef992d7f7fdd62c26fd579e2341 + +info: + name: > + JupiterX Theme <= 3.0.0 - Authenticated Local File Inclusion via print_pane + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5abb538-9e69-485e-9389-90a2422510ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/jupiterx/" + google-query: inurl:"/wp-content/themes/jupiterx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,jupiterx,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/jupiterx/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "jupiterx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/kathmag-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/kathmag-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..36ffd75000 --- /dev/null +++ b/nuclei-templates/cve-less/themes/kathmag-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: kathmag-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/kathmag/" + google-query: inurl:"/wp-content/themes/kathmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,kathmag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/kathmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kathmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/kathmag-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/kathmag-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..bbed158f59 --- /dev/null +++ b/nuclei-templates/cve-less/themes/kathmag-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: kathmag-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/kathmag/" + google-query: inurl:"/wp-content/themes/kathmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,kathmag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/kathmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kathmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/kernel-theme-3391cd9b7f891216e1287f590b982c8e.yaml b/nuclei-templates/cve-less/themes/kernel-theme-3391cd9b7f891216e1287f590b982c8e.yaml new file mode 100644 index 0000000000..9978945163 --- /dev/null +++ b/nuclei-templates/cve-less/themes/kernel-theme-3391cd9b7f891216e1287f590b982c8e.yaml @@ -0,0 +1,58 @@ +id: kernel-theme-3391cd9b7f891216e1287f590b982c8e + +info: + name: > + Kernel - Premium WordPress Blog & Magazine Theme | News / Editorial (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45e0664a-385d-4879-acf6-46e837aaa03f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/kernel-theme/" + google-query: inurl:"/wp-content/themes/kernel-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,kernel-theme,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/kernel-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kernel-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/kiddo-02553228cdf9d241cd10c1636838398f.yaml b/nuclei-templates/cve-less/themes/kiddo-02553228cdf9d241cd10c1636838398f.yaml new file mode 100644 index 0000000000..bb33b85402 --- /dev/null +++ b/nuclei-templates/cve-less/themes/kiddo-02553228cdf9d241cd10c1636838398f.yaml @@ -0,0 +1,58 @@ +id: kiddo-02553228cdf9d241cd10c1636838398f + +info: + name: > + Kiddo Theme (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9450e6b-df5e-4265-a3df-08cb10eb8dc0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/kiddo/" + google-query: inurl:"/wp-content/themes/kiddo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,kiddo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/kiddo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kiddo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/kingcabs-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/kingcabs-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..9aff8f8bf8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/kingcabs-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: kingcabs-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/kingcabs/" + google-query: inurl:"/wp-content/themes/kingcabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,kingcabs,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/kingcabs/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/kingcabs-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/kingcabs-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..8c562d4c52 --- /dev/null +++ b/nuclei-templates/cve-less/themes/kingcabs-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: kingcabs-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/kingcabs/" + google-query: inurl:"/wp-content/themes/kingcabs/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,kingcabs,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/kingcabs/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingcabs" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/kingclub-theme-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/kingclub-theme-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..0dc2a4d9c7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/kingclub-theme-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: kingclub-theme-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/kingclub-theme/" + google-query: inurl:"/wp-content/themes/kingclub-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,kingclub-theme,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/kingclub-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kingclub-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/konzept-0f4251fd59b25576860e082b19c2ffec.yaml b/nuclei-templates/cve-less/themes/konzept-0f4251fd59b25576860e082b19c2ffec.yaml new file mode 100644 index 0000000000..49a41528db --- /dev/null +++ b/nuclei-templates/cve-less/themes/konzept-0f4251fd59b25576860e082b19c2ffec.yaml @@ -0,0 +1,58 @@ +id: konzept-0f4251fd59b25576860e082b19c2ffec + +info: + name: > + Konzept (Unknown Version) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6dd6e04c-bac4-49c3-a934-7d3f43767684?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/konzept/" + google-query: inurl:"/wp-content/themes/konzept/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,konzept,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/konzept/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "konzept" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/konzept-181dd35c27fd1dd79209b58840d41cab.yaml b/nuclei-templates/cve-less/themes/konzept-181dd35c27fd1dd79209b58840d41cab.yaml new file mode 100644 index 0000000000..2700f36916 --- /dev/null +++ b/nuclei-templates/cve-less/themes/konzept-181dd35c27fd1dd79209b58840d41cab.yaml @@ -0,0 +1,58 @@ +id: konzept-181dd35c27fd1dd79209b58840d41cab + +info: + name: > + Konzept (Unkown Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f188c032-6f36-45a9-9ca8-39bfe91c97d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/konzept/" + google-query: inurl:"/wp-content/themes/konzept/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,konzept,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/konzept/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "konzept" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/konzept-1af4e5a51ec83381dbc6ba8e121a6437.yaml b/nuclei-templates/cve-less/themes/konzept-1af4e5a51ec83381dbc6ba8e121a6437.yaml new file mode 100644 index 0000000000..7d22c32a7a --- /dev/null +++ b/nuclei-templates/cve-less/themes/konzept-1af4e5a51ec83381dbc6ba8e121a6437.yaml @@ -0,0 +1,58 @@ +id: konzept-1af4e5a51ec83381dbc6ba8e121a6437 + +info: + name: > + Konzept - Fullscreen Portfolio WordPress Theme <= 2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ffe9bfbd-3672-4162-bb1b-675c7eb9e655?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/konzept/" + google-query: inurl:"/wp-content/themes/konzept/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,konzept,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/konzept/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "konzept" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/kormosala-7050f0ff8d99b81263bff6c6e7cb2702.yaml b/nuclei-templates/cve-less/themes/kormosala-7050f0ff8d99b81263bff6c6e7cb2702.yaml new file mode 100644 index 0000000000..a29393d86a --- /dev/null +++ b/nuclei-templates/cve-less/themes/kormosala-7050f0ff8d99b81263bff6c6e7cb2702.yaml @@ -0,0 +1,58 @@ +id: kormosala-7050f0ff8d99b81263bff6c6e7cb2702 + +info: + name: > + Kormosala <= 1.0.22 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/01d0016c-f693-426a-94cb-5611760fd2d0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/kormosala/" + google-query: inurl:"/wp-content/themes/kormosala/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,kormosala,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/kormosala/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "kormosala" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.22') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/lattice-a3693c90a0060afc06ae1758aa95f75e.yaml b/nuclei-templates/cve-less/themes/lattice-a3693c90a0060afc06ae1758aa95f75e.yaml new file mode 100644 index 0000000000..d5012d295e --- /dev/null +++ b/nuclei-templates/cve-less/themes/lattice-a3693c90a0060afc06ae1758aa95f75e.yaml @@ -0,0 +1,58 @@ +id: lattice-a3693c90a0060afc06ae1758aa95f75e + +info: + name: > + Lattice < 1.1.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/74e25ef2-ca4d-416e-8a9b-2ed09a93d1aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/lattice/" + google-query: inurl:"/wp-content/themes/lattice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,lattice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/lattice/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lattice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/lawyerpress-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/lawyerpress-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..7c7705fb54 --- /dev/null +++ b/nuclei-templates/cve-less/themes/lawyerpress-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: lawyerpress-lite-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/lawyerpress-lite/" + google-query: inurl:"/wp-content/themes/lawyerpress-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,lawyerpress-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/lawyerpress-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lawyerpress-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/learnmore-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/learnmore-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..5235a8a3df --- /dev/null +++ b/nuclei-templates/cve-less/themes/learnmore-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: learnmore-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/learnmore/" + google-query: inurl:"/wp-content/themes/learnmore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,learnmore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/learnmore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "learnmore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/lightning-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/lightning-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..622a631829 --- /dev/null +++ b/nuclei-templates/cve-less/themes/lightning-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: lightning-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/lightning/" + google-query: inurl:"/wp-content/themes/lightning/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,lightning,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/lightning/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightning" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 15.19.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/lightspeed-0925bd2ba6dd2e41532d1726d441e4b1.yaml b/nuclei-templates/cve-less/themes/lightspeed-0925bd2ba6dd2e41532d1726d441e4b1.yaml new file mode 100644 index 0000000000..7f39dfc057 --- /dev/null +++ b/nuclei-templates/cve-less/themes/lightspeed-0925bd2ba6dd2e41532d1726d441e4b1.yaml @@ -0,0 +1,58 @@ +id: lightspeed-0925bd2ba6dd2e41532d1726d441e4b1 + +info: + name: > + Lightspeed <= 1.1.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/89620065-b961-49c9-a662-bee300b5da72?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/lightspeed/" + google-query: inurl:"/wp-content/themes/lightspeed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,lightspeed,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/lightspeed/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lightspeed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listeo-27a371efed383b3d1ada42fe51a20c93.yaml b/nuclei-templates/cve-less/themes/listeo-27a371efed383b3d1ada42fe51a20c93.yaml new file mode 100644 index 0000000000..83491a795f --- /dev/null +++ b/nuclei-templates/cve-less/themes/listeo-27a371efed383b3d1ada42fe51a20c93.yaml @@ -0,0 +1,58 @@ +id: listeo-27a371efed383b3d1ada42fe51a20c93 + +info: + name: > + Listeo - Directory & Listings With Booking - WordPress Theme < 1.6.11 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b019499-8edf-4921-9612-12d39c2e8e85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listeo/" + google-query: inurl:"/wp-content/themes/listeo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listeo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listeo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listeo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listeo-328e4f3efad73259f1eb9967e17030cd.yaml b/nuclei-templates/cve-less/themes/listeo-328e4f3efad73259f1eb9967e17030cd.yaml new file mode 100644 index 0000000000..5ad04e72a4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/listeo-328e4f3efad73259f1eb9967e17030cd.yaml @@ -0,0 +1,58 @@ +id: listeo-328e4f3efad73259f1eb9967e17030cd + +info: + name: > + Listeo - Directory & Listings With Booking - WordPress Theme < 1.6.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd22eaa1-e76d-4192-8d08-9bb984b08439?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listeo/" + google-query: inurl:"/wp-content/themes/listeo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listeo,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listeo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listeo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listingo-fa1aa4f0aefa698e79145595ae3e2cba.yaml b/nuclei-templates/cve-less/themes/listingo-fa1aa4f0aefa698e79145595ae3e2cba.yaml new file mode 100644 index 0000000000..5136ec2273 --- /dev/null +++ b/nuclei-templates/cve-less/themes/listingo-fa1aa4f0aefa698e79145595ae3e2cba.yaml @@ -0,0 +1,58 @@ +id: listingo-fa1aa4f0aefa698e79145595ae3e2cba + +info: + name: > + Listingo <= 3.2.5 - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62bc53ae-7cdb-491c-a315-5bf8fa80c27b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listingo/" + google-query: inurl:"/wp-content/themes/listingo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listingo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listingo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listingo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listingpro-150cb95f9f40b2e120f1867ef595a1a2.yaml b/nuclei-templates/cve-less/themes/listingpro-150cb95f9f40b2e120f1867ef595a1a2.yaml new file mode 100644 index 0000000000..ad7607a219 --- /dev/null +++ b/nuclei-templates/cve-less/themes/listingpro-150cb95f9f40b2e120f1867ef595a1a2.yaml @@ -0,0 +1,58 @@ +id: listingpro-150cb95f9f40b2e120f1867ef595a1a2 + +info: + name: > + ListingPro - WordPress Directory & Listing Theme < 2.0.14.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ddb979b5-8fd6-41ed-a535-ad6646a14677?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listingpro/" + google-query: inurl:"/wp-content/themes/listingpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listingpro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listingpro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listingpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listingpro-5ff88083e32bfbabf7c17c2a2829921d.yaml b/nuclei-templates/cve-less/themes/listingpro-5ff88083e32bfbabf7c17c2a2829921d.yaml new file mode 100644 index 0000000000..a54909eb15 --- /dev/null +++ b/nuclei-templates/cve-less/themes/listingpro-5ff88083e32bfbabf7c17c2a2829921d.yaml @@ -0,0 +1,58 @@ +id: listingpro-5ff88083e32bfbabf7c17c2a2829921d + +info: + name: > + ListingPro - WordPress Directory & Listing Theme < 2.0.14.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ad57d0-375b-4a64-a61c-90b72052552f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listingpro/" + google-query: inurl:"/wp-content/themes/listingpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listingpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listingpro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listingpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listingpro-7cb74951ec30df91b0363483bf7bb394.yaml b/nuclei-templates/cve-less/themes/listingpro-7cb74951ec30df91b0363483bf7bb394.yaml new file mode 100644 index 0000000000..68b2d7c712 --- /dev/null +++ b/nuclei-templates/cve-less/themes/listingpro-7cb74951ec30df91b0363483bf7bb394.yaml @@ -0,0 +1,58 @@ +id: listingpro-7cb74951ec30df91b0363483bf7bb394 + +info: + name: > + ListingPro - WordPress Directory & Listing Theme < 2.6.1 - Arbitrary Plugin Installation, Activation and Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a08fa649-3092-4c26-a009-2dd576b9b1ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listingpro/" + google-query: inurl:"/wp-content/themes/listingpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listingpro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listingpro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listingpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listingpro-9db9bcd8fc228077bf75d34eb26eccd1.yaml b/nuclei-templates/cve-less/themes/listingpro-9db9bcd8fc228077bf75d34eb26eccd1.yaml new file mode 100644 index 0000000000..bd2ff6b6c7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/listingpro-9db9bcd8fc228077bf75d34eb26eccd1.yaml @@ -0,0 +1,58 @@ +id: listingpro-9db9bcd8fc228077bf75d34eb26eccd1 + +info: + name: > + ListingPro - WordPress Directory & Listing Theme < 2.6.1 - Sensitive Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b9b21f8e-8d66-4d3e-a383-bea20a3c4498?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listingpro/" + google-query: inurl:"/wp-content/themes/listingpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listingpro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listingpro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listingpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listingpro-a7a54e981c91a31a82ea2b30647ffe08.yaml b/nuclei-templates/cve-less/themes/listingpro-a7a54e981c91a31a82ea2b30647ffe08.yaml new file mode 100644 index 0000000000..aaee3a8ae5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/listingpro-a7a54e981c91a31a82ea2b30647ffe08.yaml @@ -0,0 +1,58 @@ +id: listingpro-a7a54e981c91a31a82ea2b30647ffe08 + +info: + name: > + ListingPro - WordPress Directory & Listing Theme < 2.5.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19fbb332-f660-4572-82a3-c68e0bc7efcf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listingpro/" + google-query: inurl:"/wp-content/themes/listingpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listingpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listingpro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listingpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/listingpro-e612ae5fb8c05a8c56c1d21cf4568559.yaml b/nuclei-templates/cve-less/themes/listingpro-e612ae5fb8c05a8c56c1d21cf4568559.yaml new file mode 100644 index 0000000000..081a417565 --- /dev/null +++ b/nuclei-templates/cve-less/themes/listingpro-e612ae5fb8c05a8c56c1d21cf4568559.yaml @@ -0,0 +1,58 @@ +id: listingpro-e612ae5fb8c05a8c56c1d21cf4568559 + +info: + name: > + ListingPro - WordPress Directory & Listing Theme < 2.0.14.5 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4af4b971-7304-47c9-8d01-eae36e40c45c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/listingpro/" + google-query: inurl:"/wp-content/themes/listingpro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,listingpro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/listingpro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "listingpro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.14.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/lote27-c9225a68a3d87aec89e9b458c0c8c07e.yaml b/nuclei-templates/cve-less/themes/lote27-c9225a68a3d87aec89e9b458c0c8c07e.yaml new file mode 100644 index 0000000000..dacab7fc27 --- /dev/null +++ b/nuclei-templates/cve-less/themes/lote27-c9225a68a3d87aec89e9b458c0c8c07e.yaml @@ -0,0 +1,58 @@ +id: lote27-c9225a68a3d87aec89e9b458c0c8c07e + +info: + name: > + lote27 (All Versions) - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eae1ee2c-1be5-4be5-8873-f99c8fdd41ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/lote27/" + google-query: inurl:"/wp-content/themes/lote27/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,lote27,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/lote27/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lote27" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/lovetravel-5762e5f00074e74d1c85e81e663d8bab.yaml b/nuclei-templates/cve-less/themes/lovetravel-5762e5f00074e74d1c85e81e663d8bab.yaml new file mode 100644 index 0000000000..07fbaf82e8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/lovetravel-5762e5f00074e74d1c85e81e663d8bab.yaml @@ -0,0 +1,58 @@ +id: lovetravel-5762e5f00074e74d1c85e81e663d8bab + +info: + name: > + Love Travel 1.0 - 1.9 - Reflected Cross-Site Scripting and Cross-Frame Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f4aa403-5a8e-4e4d-a009-3f7bfdc7ada3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/lovetravel/" + google-query: inurl:"/wp-content/themes/lovetravel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,lovetravel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/lovetravel/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lovetravel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 1.0', '<= 1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/lovetravel-9bd39b890f49a9e6a22c3a473a09195d.yaml b/nuclei-templates/cve-less/themes/lovetravel-9bd39b890f49a9e6a22c3a473a09195d.yaml new file mode 100644 index 0000000000..e6dec4a8a1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/lovetravel-9bd39b890f49a9e6a22c3a473a09195d.yaml @@ -0,0 +1,58 @@ +id: lovetravel-9bd39b890f49a9e6a22c3a473a09195d + +info: + name: > + Love Travel 2.0 - 3.8 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/387ab7c1-0ca2-41e0-b6a1-ed33e7b02cad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/lovetravel/" + google-query: inurl:"/wp-content/themes/lovetravel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,lovetravel,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/lovetravel/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lovetravel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.0', '<= 3.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/luxe-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/luxe-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..0ef2fd17dc --- /dev/null +++ b/nuclei-templates/cve-less/themes/luxe-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: luxe-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/luxe/" + google-query: inurl:"/wp-content/themes/luxe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,luxe,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/luxe/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "luxe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/luxe-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/luxe-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..d2930cf0bf --- /dev/null +++ b/nuclei-templates/cve-less/themes/luxe-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: luxe-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/luxe/" + google-query: inurl:"/wp-content/themes/luxe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,luxe,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/luxe/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "luxe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/machic-core-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml b/nuclei-templates/cve-less/themes/machic-core-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml new file mode 100644 index 0000000000..18ce7991f4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/machic-core-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml @@ -0,0 +1,58 @@ +id: machic-core-0ed3cd48ec0b8d5d59c0c2a69ba7db3d + +info: + name: > + Multiple Themes by KlbTheme <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d5036a-c756-47a6-b071-c393f8a6ce5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/machic-core/" + google-query: inurl:"/wp-content/themes/machic-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,machic-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/machic-core/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "machic-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/machic-core-126a4deb066c34b8dce5df40cd3bb8ed.yaml b/nuclei-templates/cve-less/themes/machic-core-126a4deb066c34b8dce5df40cd3bb8ed.yaml new file mode 100644 index 0000000000..3524daf664 --- /dev/null +++ b/nuclei-templates/cve-less/themes/machic-core-126a4deb066c34b8dce5df40cd3bb8ed.yaml @@ -0,0 +1,58 @@ +id: machic-core-126a4deb066c34b8dce5df40cd3bb8ed + +info: + name: > + Machic Core <= 1.2.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4fc9628-b254-405b-a7cc-bb955618bc35?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/machic-core/" + google-query: inurl:"/wp-content/themes/machic-core/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,machic-core,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/machic-core/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "machic-core" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/magazine-basic-714780fca2f8a2a618fef942f7783415.yaml b/nuclei-templates/cve-less/themes/magazine-basic-714780fca2f8a2a618fef942f7783415.yaml new file mode 100644 index 0000000000..7561bd36e7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/magazine-basic-714780fca2f8a2a618fef942f7783415.yaml @@ -0,0 +1,58 @@ +id: magazine-basic-714780fca2f8a2a618fef942f7783415 + +info: + name: > + Magazine Basic (Unknown Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d07b5377-ce5f-4faa-ac72-78f5175913c3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/magazine-basic/" + google-query: inurl:"/wp-content/themes/magazine-basic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,magazine-basic,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/magazine-basic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magazine-basic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/magazine-edge-f5a034fa03b4780f360af411f657fb5a.yaml b/nuclei-templates/cve-less/themes/magazine-edge-f5a034fa03b4780f360af411f657fb5a.yaml new file mode 100644 index 0000000000..2e18be1651 --- /dev/null +++ b/nuclei-templates/cve-less/themes/magazine-edge-f5a034fa03b4780f360af411f657fb5a.yaml @@ -0,0 +1,58 @@ +id: magazine-edge-f5a034fa03b4780f360af411f657fb5a + +info: + name: > + Magazine Edge <= 1.13 - Authenticated (Subscriber+) Arbitrary Plugin Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a2a29ea-3ff3-4b80-8a40-1a00491076ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/magazine-edge/" + google-query: inurl:"/wp-content/themes/magazine-edge/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,magazine-edge,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/magazine-edge/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magazine-edge" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/magnitudo-f6413facd40fa44bc0324df507036203.yaml b/nuclei-templates/cve-less/themes/magnitudo-f6413facd40fa44bc0324df507036203.yaml new file mode 100644 index 0000000000..3fb69fdc45 --- /dev/null +++ b/nuclei-templates/cve-less/themes/magnitudo-f6413facd40fa44bc0324df507036203.yaml @@ -0,0 +1,58 @@ +id: magnitudo-f6413facd40fa44bc0324df507036203 + +info: + name: > + Magnitudo (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f28dc553-32de-459e-a0e9-2fd428ef42a0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/magnitudo/" + google-query: inurl:"/wp-content/themes/magnitudo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,magnitudo,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/magnitudo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "magnitudo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/make_a_statement-0cec5a6d0e834430dc98d58d37f70832.yaml b/nuclei-templates/cve-less/themes/make_a_statement-0cec5a6d0e834430dc98d58d37f70832.yaml new file mode 100644 index 0000000000..fd91d2f75d --- /dev/null +++ b/nuclei-templates/cve-less/themes/make_a_statement-0cec5a6d0e834430dc98d58d37f70832.yaml @@ -0,0 +1,58 @@ +id: make_a_statement-0cec5a6d0e834430dc98d58d37f70832 + +info: + name: > + Make A Statement (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebc324a-4858-4502-b962-a4e26ca7445e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/make_a_statement/" + google-query: inurl:"/wp-content/themes/make_a_statement/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,make_a_statement,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/make_a_statement/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "make_a_statement" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/malmonation-4ff647a98759fdf657abd921475d51de.yaml b/nuclei-templates/cve-less/themes/malmonation-4ff647a98759fdf657abd921475d51de.yaml new file mode 100644 index 0000000000..26275b6201 --- /dev/null +++ b/nuclei-templates/cve-less/themes/malmonation-4ff647a98759fdf657abd921475d51de.yaml @@ -0,0 +1,58 @@ +id: malmonation-4ff647a98759fdf657abd921475d51de + +info: + name: > + Malmonation (All Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/851daaab-4509-4a1e-b0bb-f9eda2b801c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/malmonation/" + google-query: inurl:"/wp-content/themes/malmonation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,malmonation,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/malmonation/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "malmonation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/materialis-30dc0670053ac012aae9f0b808f32600.yaml b/nuclei-templates/cve-less/themes/materialis-30dc0670053ac012aae9f0b808f32600.yaml new file mode 100644 index 0000000000..18a6d44993 --- /dev/null +++ b/nuclei-templates/cve-less/themes/materialis-30dc0670053ac012aae9f0b808f32600.yaml @@ -0,0 +1,58 @@ +id: materialis-30dc0670053ac012aae9f0b808f32600 + +info: + name: > + Mesmerize <= 1.6.89 & Materialis <= 1.0.172 - Authenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c9c3302-47cd-4dbe-b79e-5e6032928074?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/materialis/" + google-query: inurl:"/wp-content/themes/materialis/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,materialis,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/materialis/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "materialis" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.172') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/medibazar-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml b/nuclei-templates/cve-less/themes/medibazar-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml new file mode 100644 index 0000000000..f01ef57091 --- /dev/null +++ b/nuclei-templates/cve-less/themes/medibazar-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml @@ -0,0 +1,58 @@ +id: medibazar-0ed3cd48ec0b8d5d59c0c2a69ba7db3d + +info: + name: > + Multiple Themes by KlbTheme <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d5036a-c756-47a6-b071-c393f8a6ce5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/medibazar/" + google-query: inurl:"/wp-content/themes/medibazar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,medibazar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/medibazar/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "medibazar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/medical-heed-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/medical-heed-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..c52bf2c611 --- /dev/null +++ b/nuclei-templates/cve-less/themes/medical-heed-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: medical-heed-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/medical-heed/" + google-query: inurl:"/wp-content/themes/medical-heed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,medical-heed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/medical-heed/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "medical-heed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/medical-heed-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/medical-heed-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..0b12dcc28c --- /dev/null +++ b/nuclei-templates/cve-less/themes/medical-heed-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: medical-heed-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/medical-heed/" + google-query: inurl:"/wp-content/themes/medical-heed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,medical-heed,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/medical-heed/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "medical-heed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/mediciti-lite-90a7b869d3e2a4d7bc3ba6fed7e1b85c.yaml b/nuclei-templates/cve-less/themes/mediciti-lite-90a7b869d3e2a4d7bc3ba6fed7e1b85c.yaml new file mode 100644 index 0000000000..35e6513e76 --- /dev/null +++ b/nuclei-templates/cve-less/themes/mediciti-lite-90a7b869d3e2a4d7bc3ba6fed7e1b85c.yaml @@ -0,0 +1,58 @@ +id: mediciti-lite-90a7b869d3e2a4d7bc3ba6fed7e1b85c + +info: + name: > + Mediciti Lite <= 1.3.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ec2825b2-c8df-40fd-b44d-a840be66446f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/mediciti-lite/" + google-query: inurl:"/wp-content/themes/mediciti-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,mediciti-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/mediciti-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediciti-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/mediciti-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/mediciti-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..98e1df06e0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/mediciti-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: mediciti-lite-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/mediciti-lite/" + google-query: inurl:"/wp-content/themes/mediciti-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,mediciti-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/mediciti-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediciti-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/medikaid-161c9677e95eb847dc432eddc65db142.yaml b/nuclei-templates/cve-less/themes/medikaid-161c9677e95eb847dc432eddc65db142.yaml new file mode 100644 index 0000000000..7d8c29c1af --- /dev/null +++ b/nuclei-templates/cve-less/themes/medikaid-161c9677e95eb847dc432eddc65db142.yaml @@ -0,0 +1,58 @@ +id: medikaid-161c9677e95eb847dc432eddc65db142 + +info: + name: > + Multiple DeoThemes Themes <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8b0f14-f31a-45cd-bb98-0b717059aa80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/medikaid/" + google-query: inurl:"/wp-content/themes/medikaid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,medikaid,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/medikaid/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "medikaid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/mediumishh-8ddcc8df3c11e4879c7d118b2a205450.yaml b/nuclei-templates/cve-less/themes/mediumishh-8ddcc8df3c11e4879c7d118b2a205450.yaml new file mode 100644 index 0000000000..eee335fa4a --- /dev/null +++ b/nuclei-templates/cve-less/themes/mediumishh-8ddcc8df3c11e4879c7d118b2a205450.yaml @@ -0,0 +1,58 @@ +id: mediumishh-8ddcc8df3c11e4879c7d118b2a205450 + +info: + name: > + Mediumish <= 1.0.47 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46e2693a-809f-43f9-b189-35a0c73bf34e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/mediumishh/" + google-query: inurl:"/wp-content/themes/mediumishh/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,mediumishh,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/mediumishh/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mediumishh" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.47') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/medzone-lite-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/medzone-lite-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..6abe752118 --- /dev/null +++ b/nuclei-templates/cve-less/themes/medzone-lite-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: medzone-lite-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/medzone-lite/" + google-query: inurl:"/wp-content/themes/medzone-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,medzone-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/medzone-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "medzone-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/meridia-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/meridia-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..00de5dbb27 --- /dev/null +++ b/nuclei-templates/cve-less/themes/meridia-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: meridia-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/meridia/" + google-query: inurl:"/wp-content/themes/meridia/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,meridia,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/meridia/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meridia" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/meris-7905993a7c5a7f25cd0e632ebe3eba34.yaml b/nuclei-templates/cve-less/themes/meris-7905993a7c5a7f25cd0e632ebe3eba34.yaml new file mode 100644 index 0000000000..5f5a89a22b --- /dev/null +++ b/nuclei-templates/cve-less/themes/meris-7905993a7c5a7f25cd0e632ebe3eba34.yaml @@ -0,0 +1,58 @@ +id: meris-7905993a7c5a7f25cd0e632ebe3eba34 + +info: + name: > + Meris <= 1.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a627f10a-1463-4e4b-98a9-2008fa76e25a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/meris/" + google-query: inurl:"/wp-content/themes/meris/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,meris,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/meris/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meris" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/mesmerize-30dc0670053ac012aae9f0b808f32600.yaml b/nuclei-templates/cve-less/themes/mesmerize-30dc0670053ac012aae9f0b808f32600.yaml new file mode 100644 index 0000000000..4f279c37e2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/mesmerize-30dc0670053ac012aae9f0b808f32600.yaml @@ -0,0 +1,58 @@ +id: mesmerize-30dc0670053ac012aae9f0b808f32600 + +info: + name: > + Mesmerize <= 1.6.89 & Materialis <= 1.0.172 - Authenticated Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8c9c3302-47cd-4dbe-b79e-5e6032928074?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/mesmerize/" + google-query: inurl:"/wp-content/themes/mesmerize/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,mesmerize,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/mesmerize/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mesmerize" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.89') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/method-a68321afd1de998e2bc90487dbfd6089.yaml b/nuclei-templates/cve-less/themes/method-a68321afd1de998e2bc90487dbfd6089.yaml new file mode 100644 index 0000000000..45b9fa6b01 --- /dev/null +++ b/nuclei-templates/cve-less/themes/method-a68321afd1de998e2bc90487dbfd6089.yaml @@ -0,0 +1,58 @@ +id: method-a68321afd1de998e2bc90487dbfd6089 + +info: + name: > + Method <= 2.1 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/77db9906-ff6f-400c-bb02-8c64eb016a77?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/method/" + google-query: inurl:"/wp-content/themes/method/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,method,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/method/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "method" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/method-c6de20b984de470bf1d127432900931e.yaml b/nuclei-templates/cve-less/themes/method-c6de20b984de470bf1d127432900931e.yaml new file mode 100644 index 0000000000..05816c1f69 --- /dev/null +++ b/nuclei-templates/cve-less/themes/method-c6de20b984de470bf1d127432900931e.yaml @@ -0,0 +1,58 @@ +id: method-c6de20b984de470bf1d127432900931e + +info: + name: > + Method <= 2.1 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc42ac65-969a-476d-993e-7d8bc2b4fa96?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/method/" + google-query: inurl:"/wp-content/themes/method/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,method,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/method/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "method" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/metrostore-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/metrostore-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..7b501c8349 --- /dev/null +++ b/nuclei-templates/cve-less/themes/metrostore-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: metrostore-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/metrostore/" + google-query: inurl:"/wp-content/themes/metrostore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,metrostore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/metrostore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metrostore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/metrostore-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/metrostore-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..877e11e89b --- /dev/null +++ b/nuclei-templates/cve-less/themes/metrostore-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: metrostore-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/metrostore/" + google-query: inurl:"/wp-content/themes/metrostore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,metrostore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/metrostore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metrostore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/minus-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/minus-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..3e9414a844 --- /dev/null +++ b/nuclei-templates/cve-less/themes/minus-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: minus-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/minus/" + google-query: inurl:"/wp-content/themes/minus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,minus,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/minus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/minus-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/minus-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..50aff285ef --- /dev/null +++ b/nuclei-templates/cve-less/themes/minus-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: minus-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/minus/" + google-query: inurl:"/wp-content/themes/minus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,minus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/minus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "minus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/mocho-blog-0eeb168325aaf2fd5bb4eb1250e0882d.yaml b/nuclei-templates/cve-less/themes/mocho-blog-0eeb168325aaf2fd5bb4eb1250e0882d.yaml new file mode 100644 index 0000000000..db0fac509c --- /dev/null +++ b/nuclei-templates/cve-less/themes/mocho-blog-0eeb168325aaf2fd5bb4eb1250e0882d.yaml @@ -0,0 +1,58 @@ +id: mocho-blog-0eeb168325aaf2fd5bb4eb1250e0882d + +info: + name: > + Mocho Blog <= 1.0.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f10fd22e-a25b-4f16-ad65-a995559908e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/mocho-blog/" + google-query: inurl:"/wp-content/themes/mocho-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,mocho-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/mocho-blog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mocho-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/modern-51ba94283b04aa5998cb156cf18689aa.yaml b/nuclei-templates/cve-less/themes/modern-51ba94283b04aa5998cb156cf18689aa.yaml new file mode 100644 index 0000000000..6ba0fd3f20 --- /dev/null +++ b/nuclei-templates/cve-less/themes/modern-51ba94283b04aa5998cb156cf18689aa.yaml @@ -0,0 +1,58 @@ +id: modern-51ba94283b04aa5998cb156cf18689aa + +info: + name: > + Modern <= 1.4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ae1820ab-6a24-45b3-801c-34c5515c8868?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/modern/" + google-query: inurl:"/wp-content/themes/modern/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,modern,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/modern/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modern" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/modular-5bcd37ce85991177fef2e23e81673c5b.yaml b/nuclei-templates/cve-less/themes/modular-5bcd37ce85991177fef2e23e81673c5b.yaml new file mode 100644 index 0000000000..aebf0b550f --- /dev/null +++ b/nuclei-templates/cve-less/themes/modular-5bcd37ce85991177fef2e23e81673c5b.yaml @@ -0,0 +1,58 @@ +id: modular-5bcd37ce85991177fef2e23e81673c5b + +info: + name: > + Modular <= 2.4 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/db3594df-8f24-4e24-b960-b13e5bca966e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/modular/" + google-query: inurl:"/wp-content/themes/modular/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,modular,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/modular/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modular" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/modular-77c188b4a0a9e7f3fd38cd17c193fd8f.yaml b/nuclei-templates/cve-less/themes/modular-77c188b4a0a9e7f3fd38cd17c193fd8f.yaml new file mode 100644 index 0000000000..8efe7cc7fe --- /dev/null +++ b/nuclei-templates/cve-less/themes/modular-77c188b4a0a9e7f3fd38cd17c193fd8f.yaml @@ -0,0 +1,58 @@ +id: modular-77c188b4a0a9e7f3fd38cd17c193fd8f + +info: + name: > + Modular <= 2.4 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e2422f54-244c-4e69-8174-ee462a861e98?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/modular/" + google-query: inurl:"/wp-content/themes/modular/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,modular,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/modular/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "modular" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/monalisa-4ce9a104251b3ec9c1a2e0db4f305096.yaml b/nuclei-templates/cve-less/themes/monalisa-4ce9a104251b3ec9c1a2e0db4f305096.yaml new file mode 100644 index 0000000000..ebdc317f8e --- /dev/null +++ b/nuclei-templates/cve-less/themes/monalisa-4ce9a104251b3ec9c1a2e0db4f305096.yaml @@ -0,0 +1,58 @@ +id: monalisa-4ce9a104251b3ec9c1a2e0db4f305096 + +info: + name: > + Mona Lisa <= 2.1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39e77def-8abe-4e62-ad99-a0c1d467aeb1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/monalisa/" + google-query: inurl:"/wp-content/themes/monalisa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,monalisa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/monalisa/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "monalisa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/moneymasters-28442395b27b7c2fb7b0b1c99993c0cc.yaml b/nuclei-templates/cve-less/themes/moneymasters-28442395b27b7c2fb7b0b1c99993c0cc.yaml new file mode 100644 index 0000000000..838c0eb12f --- /dev/null +++ b/nuclei-templates/cve-less/themes/moneymasters-28442395b27b7c2fb7b0b1c99993c0cc.yaml @@ -0,0 +1,58 @@ +id: moneymasters-28442395b27b7c2fb7b0b1c99993c0cc + +info: + name: > + MoneyMasters (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/978d1747-fbcf-4c08-9563-49041f225120?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/moneymasters/" + google-query: inurl:"/wp-content/themes/moneymasters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,moneymasters,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/moneymasters/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moneymasters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/moneytheme-01c4d40fcdab41e37ee61c249a61b9a0.yaml b/nuclei-templates/cve-less/themes/moneytheme-01c4d40fcdab41e37ee61c249a61b9a0.yaml new file mode 100644 index 0000000000..780a5d233c --- /dev/null +++ b/nuclei-templates/cve-less/themes/moneytheme-01c4d40fcdab41e37ee61c249a61b9a0.yaml @@ -0,0 +1,58 @@ +id: moneytheme-01c4d40fcdab41e37ee61c249a61b9a0 + +info: + name: > + MoneyTheme (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83fd4f00-e8a8-4a33-af6b-20ff539fbfeb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/moneytheme/" + google-query: inurl:"/wp-content/themes/moneytheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,moneytheme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/moneytheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moneytheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/moneytheme-4cf0d4bb064447613ec145a23104c84a.yaml b/nuclei-templates/cve-less/themes/moneytheme-4cf0d4bb064447613ec145a23104c84a.yaml new file mode 100644 index 0000000000..6672e50950 --- /dev/null +++ b/nuclei-templates/cve-less/themes/moneytheme-4cf0d4bb064447613ec145a23104c84a.yaml @@ -0,0 +1,58 @@ +id: moneytheme-4cf0d4bb064447613ec145a23104c84a + +info: + name: > + MoneyTheme (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ba1004c7-52f4-4fea-b820-dd11b2264e15?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/moneytheme/" + google-query: inurl:"/wp-content/themes/moneytheme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,moneytheme,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/moneytheme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "moneytheme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/monolit-3b0c578afae8e4197f9fa7776b2f418c.yaml b/nuclei-templates/cve-less/themes/monolit-3b0c578afae8e4197f9fa7776b2f418c.yaml new file mode 100644 index 0000000000..0c9e1283c5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/monolit-3b0c578afae8e4197f9fa7776b2f418c.yaml @@ -0,0 +1,58 @@ +id: monolit-3b0c578afae8e4197f9fa7776b2f418c + +info: + name: > + Monolit <= 2.0.6 - Unauthenticated Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/60a574c7-47de-4427-8d38-d510ea996f75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/monolit/" + google-query: inurl:"/wp-content/themes/monolit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,monolit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/monolit/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "monolit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/montezuma-4261580e84ae15728409e95c26688958.yaml b/nuclei-templates/cve-less/themes/montezuma-4261580e84ae15728409e95c26688958.yaml new file mode 100644 index 0000000000..e669ee20b9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/montezuma-4261580e84ae15728409e95c26688958.yaml @@ -0,0 +1,58 @@ +id: montezuma-4261580e84ae15728409e95c26688958 + +info: + name: > + Montezuma < 1.1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2fad774-f140-4891-8c6f-fbd684e19dc2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/montezuma/" + google-query: inurl:"/wp-content/themes/montezuma/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,montezuma,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/montezuma/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "montezuma" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/morning-coffee-59015ab41c28db2b3674f30b01c20313.yaml b/nuclei-templates/cve-less/themes/morning-coffee-59015ab41c28db2b3674f30b01c20313.yaml new file mode 100644 index 0000000000..38879626ba --- /dev/null +++ b/nuclei-templates/cve-less/themes/morning-coffee-59015ab41c28db2b3674f30b01c20313.yaml @@ -0,0 +1,58 @@ +id: morning-coffee-59015ab41c28db2b3674f30b01c20313 + +info: + name: > + Morning Coffee < 3.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/84ef0f21-74af-4cb7-bab6-47c25df0522e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/morning-coffee/" + google-query: inurl:"/wp-content/themes/morning-coffee/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,morning-coffee,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/morning-coffee/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "morning-coffee" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/motor-cf765c7372b51ee3e57db42cf2ef8936.yaml b/nuclei-templates/cve-less/themes/motor-cf765c7372b51ee3e57db42cf2ef8936.yaml new file mode 100644 index 0000000000..7b33d2c135 --- /dev/null +++ b/nuclei-templates/cve-less/themes/motor-cf765c7372b51ee3e57db42cf2ef8936.yaml @@ -0,0 +1,58 @@ +id: motor-cf765c7372b51ee3e57db42cf2ef8936 + +info: + name: > + Motor – Cars, Parts, Service, Equipments and Accessories WooCommerce Store < 3.1.0 - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b811f085-9374-41e7-a9ab-fecff0b9e19d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/motor/" + google-query: inurl:"/wp-content/themes/motor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,motor,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/motor/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "motor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/mtheme-unus-3ca22e0c044d3496c6201e10375e41b4.yaml b/nuclei-templates/cve-less/themes/mtheme-unus-3ca22e0c044d3496c6201e10375e41b4.yaml new file mode 100644 index 0000000000..897bd197f3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/mtheme-unus-3ca22e0c044d3496c6201e10375e41b4.yaml @@ -0,0 +1,58 @@ +id: mtheme-unus-3ca22e0c044d3496c6201e10375e41b4 + +info: + name: > + mTheme-Unus < 2.3 - Directory Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/df53dea5-4497-45ee-8f5c-e43f19a702f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/mTheme-Unus/" + google-query: inurl:"/wp-content/themes/mTheme-Unus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,mTheme-Unus,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/mTheme-Unus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mTheme-Unus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/mtheme-unus-ebf16930146209f7120ebc7fcbae64e2.yaml b/nuclei-templates/cve-less/themes/mtheme-unus-ebf16930146209f7120ebc7fcbae64e2.yaml new file mode 100644 index 0000000000..bacfd090af --- /dev/null +++ b/nuclei-templates/cve-less/themes/mtheme-unus-ebf16930146209f7120ebc7fcbae64e2.yaml @@ -0,0 +1,58 @@ +id: mtheme-unus-ebf16930146209f7120ebc7fcbae64e2 + +info: + name: > + mTheme-Unus (All Versions) - Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/741915a7-c88d-41e1-9347-1d5d6494d051?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/mTheme-Unus/" + google-query: inurl:"/wp-content/themes/mTheme-Unus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,mTheme-Unus,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/mTheme-Unus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mTheme-Unus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/music-5e8a086d1dfb832a1c846fbcfd72fb75.yaml b/nuclei-templates/cve-less/themes/music-5e8a086d1dfb832a1c846fbcfd72fb75.yaml new file mode 100644 index 0000000000..d7a8482cf2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/music-5e8a086d1dfb832a1c846fbcfd72fb75.yaml @@ -0,0 +1,58 @@ +id: music-5e8a086d1dfb832a1c846fbcfd72fb75 + +info: + name: > + Music <= 1.5 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/712887d9-25fd-4d8f-a2e6-e6f2855f5ddb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/music/" + google-query: inurl:"/wp-content/themes/music/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,music,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/music/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "music" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/myriad-447d4ca1bc9aa4bfb680b8076950e6d4.yaml b/nuclei-templates/cve-less/themes/myriad-447d4ca1bc9aa4bfb680b8076950e6d4.yaml new file mode 100644 index 0000000000..986cdbfa1b --- /dev/null +++ b/nuclei-templates/cve-less/themes/myriad-447d4ca1bc9aa4bfb680b8076950e6d4.yaml @@ -0,0 +1,58 @@ +id: myriad-447d4ca1bc9aa4bfb680b8076950e6d4 + +info: + name: > + Myriad <= 2.0 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/65c8ea6c-85f1-4e96-995f-57200819280e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/myriad/" + google-query: inurl:"/wp-content/themes/myriad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,myriad,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/myriad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myriad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/myriad-a8a6d19e0044050e4db4211aba65994f.yaml b/nuclei-templates/cve-less/themes/myriad-a8a6d19e0044050e4db4211aba65994f.yaml new file mode 100644 index 0000000000..3eea72fd59 --- /dev/null +++ b/nuclei-templates/cve-less/themes/myriad-a8a6d19e0044050e4db4211aba65994f.yaml @@ -0,0 +1,58 @@ +id: myriad-a8a6d19e0044050e4db4211aba65994f + +info: + name: > + Myriad <= 2.0 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/640d36ac-7a25-437e-8b0a-8c5beceb14bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/myriad/" + google-query: inurl:"/wp-content/themes/myriad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,myriad,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/myriad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "myriad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/namaha-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/namaha-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..6b7ef1243d --- /dev/null +++ b/nuclei-templates/cve-less/themes/namaha-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: namaha-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/namaha/" + google-query: inurl:"/wp-content/themes/namaha/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,namaha,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/namaha/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "namaha" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.41') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nativechurch-03d2e78e2f453b5e454ab203f543423b.yaml b/nuclei-templates/cve-less/themes/nativechurch-03d2e78e2f453b5e454ab203f543423b.yaml new file mode 100644 index 0000000000..7702252384 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nativechurch-03d2e78e2f453b5e454ab203f543423b.yaml @@ -0,0 +1,58 @@ +id: nativechurch-03d2e78e2f453b5e454ab203f543423b + +info: + name: > + NativeChurch <= 1.6.1 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6cda1a-e137-4c30-a66b-c10a88070c50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/NativeChurch/" + google-query: inurl:"/wp-content/themes/NativeChurch/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,NativeChurch,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/NativeChurch/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "NativeChurch" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/naturemag-lite-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/naturemag-lite-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..30df49a825 --- /dev/null +++ b/nuclei-templates/cve-less/themes/naturemag-lite-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: naturemag-lite-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/naturemag-lite/" + google-query: inurl:"/wp-content/themes/naturemag-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,naturemag-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/naturemag-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "naturemag-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/neon-ce8dd1af11ff660941fa17a3827331a2.yaml b/nuclei-templates/cve-less/themes/neon-ce8dd1af11ff660941fa17a3827331a2.yaml new file mode 100644 index 0000000000..8cc09c6b4b --- /dev/null +++ b/nuclei-templates/cve-less/themes/neon-ce8dd1af11ff660941fa17a3827331a2.yaml @@ -0,0 +1,58 @@ +id: neon-ce8dd1af11ff660941fa17a3827331a2 + +info: + name: > + Neon - Bootstrap Admin Theme <= 2.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b7b29589-804b-4d37-a3f4-919f0c1126c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/neon/" + google-query: inurl:"/wp-content/themes/neon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,neon,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/neon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "neon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/neosense-c7e8c47233570f8175e41802ba29bf54.yaml b/nuclei-templates/cve-less/themes/neosense-c7e8c47233570f8175e41802ba29bf54.yaml new file mode 100644 index 0000000000..a48552e413 --- /dev/null +++ b/nuclei-templates/cve-less/themes/neosense-c7e8c47233570f8175e41802ba29bf54.yaml @@ -0,0 +1,58 @@ +id: neosense-c7e8c47233570f8175e41802ba29bf54 + +info: + name: > + Neosense - Multipurpose WordPress Theme | WordPress < 1.8 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/da807a8d-56de-494d-9f8a-9f749ab6c90e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/neosense/" + google-query: inurl:"/wp-content/themes/neosense/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,neosense,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/neosense/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "neosense" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/networker-68d0e40bde0f989b020b573553c376d1.yaml b/nuclei-templates/cve-less/themes/networker-68d0e40bde0f989b020b573553c376d1.yaml new file mode 100644 index 0000000000..1bcb8d9837 --- /dev/null +++ b/nuclei-templates/cve-less/themes/networker-68d0e40bde0f989b020b573553c376d1.yaml @@ -0,0 +1,58 @@ +id: networker-68d0e40bde0f989b020b573553c376d1 + +info: + name: > + Networker - Tech News WordPress Theme with Dark Mode <= 1.1.9 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1c2b9858-eb0c-42bd-bc32-c58c0f809fc8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/networker/" + google-query: inurl:"/wp-content/themes/networker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,networker,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/networker/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "networker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/news-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml b/nuclei-templates/cve-less/themes/news-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml new file mode 100644 index 0000000000..4f2da6f6b6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/news-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml @@ -0,0 +1,58 @@ +id: news-6d0c9deb010be5b44d8bbfb44b8f1a81 + +info: + name: > + News <= 0.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8f70c96c-5146-41d8-9d9c-7f2adb336049?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/news/" + google-query: inurl:"/wp-content/themes/news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,news,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/news/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newsmag-4ce967b961dc587fdbeb05e0806627ae.yaml b/nuclei-templates/cve-less/themes/newsmag-4ce967b961dc587fdbeb05e0806627ae.yaml new file mode 100644 index 0000000000..a94703a39b --- /dev/null +++ b/nuclei-templates/cve-less/themes/newsmag-4ce967b961dc587fdbeb05e0806627ae.yaml @@ -0,0 +1,58 @@ +id: newsmag-4ce967b961dc587fdbeb05e0806627ae + +info: + name: > + Newsmag < 5.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9918ffe1-5911-48d7-84ba-8e6568d6f50c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newsmag/" + google-query: inurl:"/wp-content/themes/newsmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newsmag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newsmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newsmag-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/newsmag-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..c31ffd8995 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newsmag-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: newsmag-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newsmag/" + google-query: inurl:"/wp-content/themes/newsmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newsmag,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newsmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newsmag-bff7cd3ae66179edd6f79145d30bd8a6.yaml b/nuclei-templates/cve-less/themes/newsmag-bff7cd3ae66179edd6f79145d30bd8a6.yaml new file mode 100644 index 0000000000..e803ac6e67 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newsmag-bff7cd3ae66179edd6f79145d30bd8a6.yaml @@ -0,0 +1,58 @@ +id: newsmag-bff7cd3ae66179edd6f79145d30bd8a6 + +info: + name: > + tagDiv Composer < 3.5 - Unauthorized Account Access and Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8347b4e-a5ba-49c5-9ae6-690a1a5c9aac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newsmag/" + google-query: inurl:"/wp-content/themes/newsmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newsmag,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newsmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newsmag-eee75ef3c538836fcb67797f819fea53.yaml b/nuclei-templates/cve-less/themes/newsmag-eee75ef3c538836fcb67797f819fea53.yaml new file mode 100644 index 0000000000..821e7413dc --- /dev/null +++ b/nuclei-templates/cve-less/themes/newsmag-eee75ef3c538836fcb67797f819fea53.yaml @@ -0,0 +1,58 @@ +id: newsmag-eee75ef3c538836fcb67797f819fea53 + +info: + name: > + Newsmag <= 2.4.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/debe6f54-0f56-4bc9-a0cd-4f2caa1ed9e3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newsmag/" + google-query: inurl:"/wp-content/themes/newsmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newsmag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newsmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newsmatic-8182d66ef4e973d2ca9cb45d86ff3d4f.yaml b/nuclei-templates/cve-less/themes/newsmatic-8182d66ef4e973d2ca9cb45d86ff3d4f.yaml new file mode 100644 index 0000000000..08f7283108 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newsmatic-8182d66ef4e973d2ca9cb45d86ff3d4f.yaml @@ -0,0 +1,58 @@ +id: newsmatic-8182d66ef4e973d2ca9cb45d86ff3d4f + +info: + name: > + Newsmatic <= 1.3.4 - Unauthenticated Information Exposure via newsmatic_filter_posts_load_tab_content + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd2ea430-48ce-43c3-ba3d-8ef5f91460ce?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newsmatic/" + google-query: inurl:"/wp-content/themes/newsmatic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newsmatic,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newsmatic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsmatic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-6aa028e953687ecd485553c1a3a1d760.yaml b/nuclei-templates/cve-less/themes/newspaper-6aa028e953687ecd485553c1a3a1d760.yaml new file mode 100644 index 0000000000..660645c439 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-6aa028e953687ecd485553c1a3a1d760.yaml @@ -0,0 +1,58 @@ +id: newspaper-6aa028e953687ecd485553c1a3a1d760 + +info: + name: > + Newspaper < 9.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/31c6e07a-3a3a-4295-a86d-79b4ca1a331e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Newspaper/" + google-query: inurl:"/wp-content/themes/Newspaper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Newspaper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Newspaper/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Newspaper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-8196dc2fb2d79f5488f7ada6ad314549.yaml b/nuclei-templates/cve-less/themes/newspaper-8196dc2fb2d79f5488f7ada6ad314549.yaml new file mode 100644 index 0000000000..170437a8cb --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-8196dc2fb2d79f5488f7ada6ad314549.yaml @@ -0,0 +1,58 @@ +id: newspaper-8196dc2fb2d79f5488f7ada6ad314549 + +info: + name: > + Newspaper - News & WooCommerce WordPress Theme <= 6.7 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc742fa0-7d10-4fe4-b95c-7d4ca563d402?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Newspaper/" + google-query: inurl:"/wp-content/themes/Newspaper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Newspaper,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Newspaper/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Newspaper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-9d97e58336af952a45a71932fb959090.yaml b/nuclei-templates/cve-less/themes/newspaper-9d97e58336af952a45a71932fb959090.yaml new file mode 100644 index 0000000000..1641c7fa38 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-9d97e58336af952a45a71932fb959090.yaml @@ -0,0 +1,58 @@ +id: newspaper-9d97e58336af952a45a71932fb959090 + +info: + name: > + Newspaper <= 10.3.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/441f5764-eab6-40fe-80cd-65da327b39b2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Newspaper/" + google-query: inurl:"/wp-content/themes/Newspaper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Newspaper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Newspaper/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Newspaper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-a588607108cf849846e45967a8f41100.yaml b/nuclei-templates/cve-less/themes/newspaper-a588607108cf849846e45967a8f41100.yaml new file mode 100644 index 0000000000..9c2eb39f58 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-a588607108cf849846e45967a8f41100.yaml @@ -0,0 +1,58 @@ +id: newspaper-a588607108cf849846e45967a8f41100 + +info: + name: > + Newspaper <= 11.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6aa43e74-9911-4c7a-b01a-cb77c2c3fe99?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Newspaper/" + google-query: inurl:"/wp-content/themes/Newspaper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Newspaper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Newspaper/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Newspaper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-bff7cd3ae66179edd6f79145d30bd8a6.yaml b/nuclei-templates/cve-less/themes/newspaper-bff7cd3ae66179edd6f79145d30bd8a6.yaml new file mode 100644 index 0000000000..b032c76122 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-bff7cd3ae66179edd6f79145d30bd8a6.yaml @@ -0,0 +1,58 @@ +id: newspaper-bff7cd3ae66179edd6f79145d30bd8a6 + +info: + name: > + tagDiv Composer < 3.5 - Unauthorized Account Access and Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8347b4e-a5ba-49c5-9ae6-690a1a5c9aac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Newspaper/" + google-query: inurl:"/wp-content/themes/Newspaper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Newspaper,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Newspaper/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Newspaper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-c159f842979de9da3050a83cd3188bb4.yaml b/nuclei-templates/cve-less/themes/newspaper-c159f842979de9da3050a83cd3188bb4.yaml new file mode 100644 index 0000000000..1901e222e0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-c159f842979de9da3050a83cd3188bb4.yaml @@ -0,0 +1,58 @@ +id: newspaper-c159f842979de9da3050a83cd3188bb4 + +info: + name: > + Newspaper <= 11.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25cde35e-ba76-4651-8828-71ddd4c8a164?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Newspaper/" + google-query: inurl:"/wp-content/themes/Newspaper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Newspaper,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Newspaper/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Newspaper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 11.5.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-e9eec5a929c2311a5540a7010e91443f.yaml b/nuclei-templates/cve-less/themes/newspaper-e9eec5a929c2311a5540a7010e91443f.yaml new file mode 100644 index 0000000000..b62b5f93fb --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-e9eec5a929c2311a5540a7010e91443f.yaml @@ -0,0 +1,58 @@ +id: newspaper-e9eec5a929c2311a5540a7010e91443f + +info: + name: > + tagDiv Cloud Library < 2.7 - Missing Authorization to Arbitrary User Metadata Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/24e8d1a4-9853-4f60-a371-7fdbe86d554b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Newspaper/" + google-query: inurl:"/wp-content/themes/Newspaper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Newspaper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Newspaper/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Newspaper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 12.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-f7df930f39831ca9c998366434d0f175.yaml b/nuclei-templates/cve-less/themes/newspaper-f7df930f39831ca9c998366434d0f175.yaml new file mode 100644 index 0000000000..1fbe28cd03 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-f7df930f39831ca9c998366434d0f175.yaml @@ -0,0 +1,58 @@ +id: newspaper-f7df930f39831ca9c998366434d0f175 + +info: + name: > + Newspaper - News & WooCommerce WordPress Theme < 6.7.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f6ea94a-c8c7-4ff9-9fdd-a40acd6ec4f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Newspaper/" + google-query: inurl:"/wp-content/themes/Newspaper/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Newspaper,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Newspaper/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Newspaper" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-lite-17b72cbae2806ebc0f250c3c7b56eebd.yaml b/nuclei-templates/cve-less/themes/newspaper-lite-17b72cbae2806ebc0f250c3c7b56eebd.yaml new file mode 100644 index 0000000000..22d551b9aa --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-lite-17b72cbae2806ebc0f250c3c7b56eebd.yaml @@ -0,0 +1,58 @@ +id: newspaper-lite-17b72cbae2806ebc0f250c3c7b56eebd + +info: + name: > + Newspaper Lite < 11.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21dd2899-cb2d-4266-be79-bdf00e60e9a7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newspaper-lite/" + google-query: inurl:"/wp-content/themes/newspaper-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newspaper-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newspaper-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newspaper-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 10.3.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-x-72ccbc519dc7d87cb6145ad667cfc553.yaml b/nuclei-templates/cve-less/themes/newspaper-x-72ccbc519dc7d87cb6145ad667cfc553.yaml new file mode 100644 index 0000000000..1405d693d9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-x-72ccbc519dc7d87cb6145ad667cfc553.yaml @@ -0,0 +1,58 @@ +id: newspaper-x-72ccbc519dc7d87cb6145ad667cfc553 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Unauthenticated Plugin Activation/Deactivation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e4e989-8e55-4ea7-8f42-9f67cfab1168?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newspaper-x/" + google-query: inurl:"/wp-content/themes/newspaper-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newspaper-x,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newspaper-x/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newspaper-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newspaper-x-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/newspaper-x-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..1523769b6f --- /dev/null +++ b/nuclei-templates/cve-less/themes/newspaper-x-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: newspaper-x-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newspaper-x/" + google-query: inurl:"/wp-content/themes/newspaper-x/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newspaper-x,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newspaper-x/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newspaper-x" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/newsxpress-7d03328ac3d4c62cd7bbe97808deaeca.yaml b/nuclei-templates/cve-less/themes/newsxpress-7d03328ac3d4c62cd7bbe97808deaeca.yaml new file mode 100644 index 0000000000..4e53c85e72 --- /dev/null +++ b/nuclei-templates/cve-less/themes/newsxpress-7d03328ac3d4c62cd7bbe97808deaeca.yaml @@ -0,0 +1,58 @@ +id: newsxpress-7d03328ac3d4c62cd7bbe97808deaeca + +info: + name: > + NewsXpress <= 1.0.7 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cd5e9736-e4d9-4730-aaaf-2069a9633f02?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/newsxpress/" + google-query: inurl:"/wp-content/themes/newsxpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,newsxpress,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/newsxpress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "newsxpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nexos-34acc22fa074776c63206475018db5f7.yaml b/nuclei-templates/cve-less/themes/nexos-34acc22fa074776c63206475018db5f7.yaml new file mode 100644 index 0000000000..e0e9b14c66 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nexos-34acc22fa074776c63206475018db5f7.yaml @@ -0,0 +1,58 @@ +id: nexos-34acc22fa074776c63206475018db5f7 + +info: + name: > + Nexos - Real Estate WordPress Theme <= 1.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed3ad791-4d4d-41df-bf14-2aef77d6fecb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nexos/" + google-query: inurl:"/wp-content/themes/nexos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nexos,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nexos/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nexos-42713e2eee178dc417083530771f3ed7.yaml b/nuclei-templates/cve-less/themes/nexos-42713e2eee178dc417083530771f3ed7.yaml new file mode 100644 index 0000000000..ee9edd463d --- /dev/null +++ b/nuclei-templates/cve-less/themes/nexos-42713e2eee178dc417083530771f3ed7.yaml @@ -0,0 +1,58 @@ +id: nexos-42713e2eee178dc417083530771f3ed7 + +info: + name: > + Nexos - Real Estate <= 1.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/18dacb4b-7eb7-4de2-b889-e36c11ad4a04?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nexos/" + google-query: inurl:"/wp-content/themes/nexos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nexos,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nexos/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nexos-89678d145b82686546d5edb88c1716ee.yaml b/nuclei-templates/cve-less/themes/nexos-89678d145b82686546d5edb88c1716ee.yaml new file mode 100644 index 0000000000..6231339a33 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nexos-89678d145b82686546d5edb88c1716ee.yaml @@ -0,0 +1,58 @@ +id: nexos-89678d145b82686546d5edb88c1716ee + +info: + name: > + Nexos - Real Estate WordPress Theme <= 1.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b6b43503-e6f0-4097-9e41-eaae7011b17b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nexos/" + google-query: inurl:"/wp-content/themes/nexos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nexos,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nexos/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nexos-a1ee8803b42d3b197599b6095f91fefd.yaml b/nuclei-templates/cve-less/themes/nexos-a1ee8803b42d3b197599b6095f91fefd.yaml new file mode 100644 index 0000000000..3762f0a545 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nexos-a1ee8803b42d3b197599b6095f91fefd.yaml @@ -0,0 +1,58 @@ +id: nexos-a1ee8803b42d3b197599b6095f91fefd + +info: + name: > + Nexos - Real Estate WordPress Theme < 1.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d6221374-3c0d-4d37-8a27-130c504ea70d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nexos/" + google-query: inurl:"/wp-content/themes/nexos/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nexos,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nexos/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexos" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nexter-4671c56fe35cfb879a2471b3343a30c7.yaml b/nuclei-templates/cve-less/themes/nexter-4671c56fe35cfb879a2471b3343a30c7.yaml new file mode 100644 index 0000000000..eeb8ab311e --- /dev/null +++ b/nuclei-templates/cve-less/themes/nexter-4671c56fe35cfb879a2471b3343a30c7.yaml @@ -0,0 +1,58 @@ +id: nexter-4671c56fe35cfb879a2471b3343a30c7 + +info: + name: > + Nexter <= 2.0.3 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e26d4914-23fd-4e93-a08a-7e9dd5222a73?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nexter/" + google-query: inurl:"/wp-content/themes/nexter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nexter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nexter/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nexter-fad17491d46d93aa052a2c5d2ff91e1e.yaml b/nuclei-templates/cve-less/themes/nexter-fad17491d46d93aa052a2c5d2ff91e1e.yaml new file mode 100644 index 0000000000..99b77ee2bf --- /dev/null +++ b/nuclei-templates/cve-less/themes/nexter-fad17491d46d93aa052a2c5d2ff91e1e.yaml @@ -0,0 +1,58 @@ +id: nexter-fad17491d46d93aa052a2c5d2ff91e1e + +info: + name: > + Nexter <= 2.0.3 - Authenticated (Subscriber+) SQL Injection via 'to' and 'from' + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0164123-11b0-4b3b-bc76-c6aee8ca9d34?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nexter/" + google-query: inurl:"/wp-content/themes/nexter/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nexter,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nexter/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nexter" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ngo-charity-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/ngo-charity-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..e7ad22460f --- /dev/null +++ b/nuclei-templates/cve-less/themes/ngo-charity-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: ngo-charity-lite-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ngo-charity-lite/" + google-query: inurl:"/wp-content/themes/ngo-charity-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ngo-charity-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ngo-charity-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ngo-charity-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nichebase-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/nichebase-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..59139db5c3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nichebase-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: nichebase-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nichebase/" + google-query: inurl:"/wp-content/themes/nichebase/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nichebase,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nichebase/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nichebase" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nictitate-e239f345bc8a481c67e859f476dff343.yaml b/nuclei-templates/cve-less/themes/nictitate-e239f345bc8a481c67e859f476dff343.yaml new file mode 100644 index 0000000000..c6e481b578 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nictitate-e239f345bc8a481c67e859f476dff343.yaml @@ -0,0 +1,58 @@ +id: nictitate-e239f345bc8a481c67e859f476dff343 + +info: + name: > + Nictitate <= 1.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/66a5a011-4c2f-4da9-9b17-96af830ba880?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nictitate/" + google-query: inurl:"/wp-content/themes/nictitate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nictitate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nictitate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nictitate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nightlife-723c4ff79d9f0fe1e4ecde5d53761a98.yaml b/nuclei-templates/cve-less/themes/nightlife-723c4ff79d9f0fe1e4ecde5d53761a98.yaml new file mode 100644 index 0000000000..2f6b506127 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nightlife-723c4ff79d9f0fe1e4ecde5d53761a98.yaml @@ -0,0 +1,58 @@ +id: nightlife-723c4ff79d9f0fe1e4ecde5d53761a98 + +info: + name: > + Nightlife Theme (All Known Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2513a199-30a8-45a9-80b3-1f6e51534c88?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nightlife/" + google-query: inurl:"/wp-content/themes/nightlife/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nightlife,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nightlife/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nightlife" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nokke-161c9677e95eb847dc432eddc65db142.yaml b/nuclei-templates/cve-less/themes/nokke-161c9677e95eb847dc432eddc65db142.yaml new file mode 100644 index 0000000000..8b8738b100 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nokke-161c9677e95eb847dc432eddc65db142.yaml @@ -0,0 +1,58 @@ +id: nokke-161c9677e95eb847dc432eddc65db142 + +info: + name: > + Multiple DeoThemes Themes <= (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8b0f14-f31a-45cd-bb98-0b717059aa80?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nokke/" + google-query: inurl:"/wp-content/themes/nokke/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nokke,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nokke/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nokke" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nokke-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/nokke-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3e33071772 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nokke-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: nokke-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nokke/" + google-query: inurl:"/wp-content/themes/nokke/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nokke,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nokke/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nokke" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/noo-jobmonster-416263074de0ee717fb7c97e5e787220.yaml b/nuclei-templates/cve-less/themes/noo-jobmonster-416263074de0ee717fb7c97e5e787220.yaml new file mode 100644 index 0000000000..976b702cfd --- /dev/null +++ b/nuclei-templates/cve-less/themes/noo-jobmonster-416263074de0ee717fb7c97e5e787220.yaml @@ -0,0 +1,58 @@ +id: noo-jobmonster-416263074de0ee717fb7c97e5e787220 + +info: + name: > + Noo JobMonster <= 4.6.6 - Sensitive Information Disclosure via Directory Listing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07eec594-6c46-4df0-92f1-f090e510d79d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/noo-jobmonster/" + google-query: inurl:"/wp-content/themes/noo-jobmonster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,noo-jobmonster,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/noo-jobmonster/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "noo-jobmonster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.6.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/noo-jobmonster-484e846ac2c2ca29eb31f11236276ff2.yaml b/nuclei-templates/cve-less/themes/noo-jobmonster-484e846ac2c2ca29eb31f11236276ff2.yaml new file mode 100644 index 0000000000..0dd37a417a --- /dev/null +++ b/nuclei-templates/cve-less/themes/noo-jobmonster-484e846ac2c2ca29eb31f11236276ff2.yaml @@ -0,0 +1,58 @@ +id: noo-jobmonster-484e846ac2c2ca29eb31f11236276ff2 + +info: + name: > + Noo JobMonster < 4.5.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a2f646fb-b089-492d-9d90-0f43b18e1a90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/noo-jobmonster/" + google-query: inurl:"/wp-content/themes/noo-jobmonster/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,noo-jobmonster,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/noo-jobmonster/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "noo-jobmonster" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.5.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nova-lite-2cf62694c1273a50c31799d50a62c51a.yaml b/nuclei-templates/cve-less/themes/nova-lite-2cf62694c1273a50c31799d50a62c51a.yaml new file mode 100644 index 0000000000..de22e3a046 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nova-lite-2cf62694c1273a50c31799d50a62c51a.yaml @@ -0,0 +1,58 @@ +id: nova-lite-2cf62694c1273a50c31799d50a62c51a + +info: + name: > + Nova Lite < 1.3.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/46a16b7b-6de4-49a6-83e3-309f8ab43505?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nova-lite/" + google-query: inurl:"/wp-content/themes/nova-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nova-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nova-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nova-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nsc-47b642ac75c1b5d9ea7b88cb11912c96.yaml b/nuclei-templates/cve-less/themes/nsc-47b642ac75c1b5d9ea7b88cb11912c96.yaml new file mode 100644 index 0000000000..dc9b302948 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nsc-47b642ac75c1b5d9ea7b88cb11912c96.yaml @@ -0,0 +1,58 @@ +id: nsc-47b642ac75c1b5d9ea7b88cb11912c96 + +info: + name: > + nsc <= 1.0 - Prototype Pollution to Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5909513d-8877-40ff-bee9-d565141b7ed2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nsc/" + google-query: inurl:"/wp-content/themes/nsc/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nsc,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nsc/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nsc" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/nuance-0327a43feb8609a30501f61830824dfb.yaml b/nuclei-templates/cve-less/themes/nuance-0327a43feb8609a30501f61830824dfb.yaml new file mode 100644 index 0000000000..87937c64d9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/nuance-0327a43feb8609a30501f61830824dfb.yaml @@ -0,0 +1,58 @@ +id: nuance-0327a43feb8609a30501f61830824dfb + +info: + name: > + Nuance <= 1.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/06e90f64-f64e-4871-9106-1d7af02f13d2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/nuance/" + google-query: inurl:"/wp-content/themes/nuance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,nuance,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/nuance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "nuance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/oberliga_theme-aff200e3fd02dd9a3a104f29c0a6659a.yaml b/nuclei-templates/cve-less/themes/oberliga_theme-aff200e3fd02dd9a3a104f29c0a6659a.yaml new file mode 100644 index 0000000000..fa38aa3de5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/oberliga_theme-aff200e3fd02dd9a3a104f29c0a6659a.yaml @@ -0,0 +1,58 @@ +id: oberliga_theme-aff200e3fd02dd9a3a104f29c0a6659a + +info: + name: > + Oberliga Theme (All Versions) - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a0695f66-5932-4ca4-86d3-ef53f1a669b5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/oberliga_theme/" + google-query: inurl:"/wp-content/themes/oberliga_theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,oberliga_theme,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/oberliga_theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oberliga_theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/oceanwp-e5433fd914f5f7bdfa5093c95eaa7f18.yaml b/nuclei-templates/cve-less/themes/oceanwp-e5433fd914f5f7bdfa5093c95eaa7f18.yaml new file mode 100644 index 0000000000..26ddf8e8d2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/oceanwp-e5433fd914f5f7bdfa5093c95eaa7f18.yaml @@ -0,0 +1,58 @@ +id: oceanwp-e5433fd914f5f7bdfa5093c95eaa7f18 + +info: + name: > + OceanWP <= 3.5.4 - Missing Authorization to Sensitive Information Exposure via Limited Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5ec2743d-0d96-4056-8fdf-dc81d4e9b76f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/oceanwp/" + google-query: inurl:"/wp-content/themes/oceanwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,oceanwp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/oceanwp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oceanwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.5.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/oceanwp-edb6cbfc2b955228bcb748bd996c120c.yaml b/nuclei-templates/cve-less/themes/oceanwp-edb6cbfc2b955228bcb748bd996c120c.yaml new file mode 100644 index 0000000000..4d26b1d562 --- /dev/null +++ b/nuclei-templates/cve-less/themes/oceanwp-edb6cbfc2b955228bcb748bd996c120c.yaml @@ -0,0 +1,58 @@ +id: oceanwp-edb6cbfc2b955228bcb748bd996c120c + +info: + name: > + OceanWP <= 3.4.1 - Authenticated (Subscriber+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7fa57b92-3a3e-418c-bfc2-7ed2602004e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/oceanwp/" + google-query: inurl:"/wp-content/themes/oceanwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,oceanwp,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/oceanwp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oceanwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/onair2-3a52346bbe93c0a607f0387208360f6f.yaml b/nuclei-templates/cve-less/themes/onair2-3a52346bbe93c0a607f0387208360f6f.yaml new file mode 100644 index 0000000000..5c609af2e9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/onair2-3a52346bbe93c0a607f0387208360f6f.yaml @@ -0,0 +1,58 @@ +id: onair2-3a52346bbe93c0a607f0387208360f6f + +info: + name: > + QT KenthaRadio < 2.0.2 & OnAir2 < 3.9.9.2 - Server-Side Request Forgery & Remote File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/93b5552e-bb24-4dfb-a779-8451f619ff50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/onair2/" + google-query: inurl:"/wp-content/themes/onair2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,onair2,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/onair2/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onair2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/onepagewebsite-d1d5b5cda2193b27d3a6f40310fec17c.yaml b/nuclei-templates/cve-less/themes/onepagewebsite-d1d5b5cda2193b27d3a6f40310fec17c.yaml new file mode 100644 index 0000000000..85a2215854 --- /dev/null +++ b/nuclei-templates/cve-less/themes/onepagewebsite-d1d5b5cda2193b27d3a6f40310fec17c.yaml @@ -0,0 +1,58 @@ +id: onepagewebsite-d1d5b5cda2193b27d3a6f40310fec17c + +info: + name: > + onepagewebsite (Unknown Versions) - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f72de600-b9d8-4d91-9c80-f2df2a2ef435?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/onepagewebsite/" + google-query: inurl:"/wp-content/themes/onepagewebsite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,onepagewebsite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/onepagewebsite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onepagewebsite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/onetone-161c93480bad1a6fddf7935d08286cca.yaml b/nuclei-templates/cve-less/themes/onetone-161c93480bad1a6fddf7935d08286cca.yaml new file mode 100644 index 0000000000..9f22637517 --- /dev/null +++ b/nuclei-templates/cve-less/themes/onetone-161c93480bad1a6fddf7935d08286cca.yaml @@ -0,0 +1,58 @@ +id: onetone-161c93480bad1a6fddf7935d08286cca + +info: + name: > + OneTone <= 3.0.6 & OneTone Companion <= 1.1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2777158-baa4-4209-ae15-03da5adafc75?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/onetone/" + google-query: inurl:"/wp-content/themes/onetone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,onetone,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/onetone/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onetone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/onetone-95f9bc03677a083bf89832ea0c794033.yaml b/nuclei-templates/cve-less/themes/onetone-95f9bc03677a083bf89832ea0c794033.yaml new file mode 100644 index 0000000000..671c9507ed --- /dev/null +++ b/nuclei-templates/cve-less/themes/onetone-95f9bc03677a083bf89832ea0c794033.yaml @@ -0,0 +1,58 @@ +id: onetone-95f9bc03677a083bf89832ea0c794033 + +info: + name: > + OneTone <= 3.0.6 & OneTone Companion <= 1.1.1 - Unauthenticated Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a8082c60-436d-42e3-8aa5-cd2cb8ce6355?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/onetone/" + google-query: inurl:"/wp-content/themes/onetone/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,onetone,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/onetone/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "onetone" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/online-estore-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/online-estore-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..146951164e --- /dev/null +++ b/nuclei-templates/cve-less/themes/online-estore-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: online-estore-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/online-estore/" + google-query: inurl:"/wp-content/themes/online-estore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,online-estore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/online-estore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "online-estore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/online-estore-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/online-estore-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..84ecf851bc --- /dev/null +++ b/nuclei-templates/cve-less/themes/online-estore-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: online-estore-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/online-estore/" + google-query: inurl:"/wp-content/themes/online-estore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,online-estore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/online-estore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "online-estore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/opstore-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/opstore-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..d6a8aeb4ed --- /dev/null +++ b/nuclei-templates/cve-less/themes/opstore-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: opstore-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/opstore/" + google-query: inurl:"/wp-content/themes/opstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,opstore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/opstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/opstore-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/opstore-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..f979e7cf46 --- /dev/null +++ b/nuclei-templates/cve-less/themes/opstore-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: opstore-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/opstore/" + google-query: inurl:"/wp-content/themes/opstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,opstore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/opstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/opstore-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/opstore-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..76ecd585d3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/opstore-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: opstore-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/opstore/" + google-query: inurl:"/wp-content/themes/opstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,opstore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/opstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "opstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/optimizepress-cc59f91f842a517b5809b79cc65f1b6e.yaml b/nuclei-templates/cve-less/themes/optimizepress-cc59f91f842a517b5809b79cc65f1b6e.yaml new file mode 100644 index 0000000000..bdf4e7e665 --- /dev/null +++ b/nuclei-templates/cve-less/themes/optimizepress-cc59f91f842a517b5809b79cc65f1b6e.yaml @@ -0,0 +1,58 @@ +id: optimizepress-cc59f91f842a517b5809b79cc65f1b6e + +info: + name: > + OptimizePress < 1.6 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b8eeeed6-bb8c-47d3-afa5-84eb7ed2c971?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/optimizepress/" + google-query: inurl:"/wp-content/themes/optimizepress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,optimizepress,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/optimizepress/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "optimizepress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/outdoor-7818a6f8e7606cc76a49355022fa2087.yaml b/nuclei-templates/cve-less/themes/outdoor-7818a6f8e7606cc76a49355022fa2087.yaml new file mode 100644 index 0000000000..7749f16766 --- /dev/null +++ b/nuclei-templates/cve-less/themes/outdoor-7818a6f8e7606cc76a49355022fa2087.yaml @@ -0,0 +1,58 @@ +id: outdoor-7818a6f8e7606cc76a49355022fa2087 + +info: + name: > + Outdoor <= 3.9.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ef60f4c3-e38f-4f95-80cd-5e1f5512ebf5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/outdoor/" + google-query: inurl:"/wp-content/themes/outdoor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,outdoor,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/outdoor/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "outdoor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.9.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ovum-153b374358a4469baf0dcf3e128485d7.yaml b/nuclei-templates/cve-less/themes/ovum-153b374358a4469baf0dcf3e128485d7.yaml new file mode 100644 index 0000000000..5765a99e89 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ovum-153b374358a4469baf0dcf3e128485d7.yaml @@ -0,0 +1,58 @@ +id: ovum-153b374358a4469baf0dcf3e128485d7 + +info: + name: > + Imediapixel Themes (Various Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a923c84e-3641-45ec-970e-faea803897bf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ovum/" + google-query: inurl:"/wp-content/themes/ovum/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ovum,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ovum/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ovum" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/oxygen-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml b/nuclei-templates/cve-less/themes/oxygen-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml new file mode 100644 index 0000000000..316b015f76 --- /dev/null +++ b/nuclei-templates/cve-less/themes/oxygen-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml @@ -0,0 +1,58 @@ +id: oxygen-theme-d488c88c43dea5d67f8bd9aa864ebfd0 + +info: + name: > + Various Orange themes (Various Unspecified Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6897a8fe-c32e-430a-847c-23d1add2355d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/oxygen-theme/" + google-query: inurl:"/wp-content/themes/oxygen-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,oxygen-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/oxygen-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "oxygen-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pagelines-420826a18f17be957cec476d8ddba661.yaml b/nuclei-templates/cve-less/themes/pagelines-420826a18f17be957cec476d8ddba661.yaml new file mode 100644 index 0000000000..1c5f89a5aa --- /dev/null +++ b/nuclei-templates/cve-less/themes/pagelines-420826a18f17be957cec476d8ddba661.yaml @@ -0,0 +1,58 @@ +id: pagelines-420826a18f17be957cec476d8ddba661 + +info: + name: > + Pagelines Theme < 1.4.6 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2b24693f-6b69-4dfb-a18c-e929db09d020?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pagelines/" + google-query: inurl:"/wp-content/themes/pagelines/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pagelines,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pagelines/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pagelines" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/panoramic-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/panoramic-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..f8fd490a33 --- /dev/null +++ b/nuclei-templates/cve-less/themes/panoramic-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: panoramic-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/panoramic/" + google-query: inurl:"/wp-content/themes/panoramic/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,panoramic,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/panoramic/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "panoramic" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.57') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/parallaxsome-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/parallaxsome-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..2dcec429d8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/parallaxsome-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: parallaxsome-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/parallaxsome/" + google-query: inurl:"/wp-content/themes/parallaxsome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,parallaxsome,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/parallaxsome/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallaxsome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/parallaxsome-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/parallaxsome-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..2e8d8153e1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/parallaxsome-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: parallaxsome-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/parallaxsome/" + google-query: inurl:"/wp-content/themes/parallaxsome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,parallaxsome,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/parallaxsome/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallaxsome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/parallaxsome-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/parallaxsome-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..aafd3b6a6a --- /dev/null +++ b/nuclei-templates/cve-less/themes/parallaxsome-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: parallaxsome-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/parallaxsome/" + google-query: inurl:"/wp-content/themes/parallaxsome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,parallaxsome,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/parallaxsome/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallaxsome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/parallelus-intersect-c7556a1caf919c1acc5983a1f0ea7582.yaml b/nuclei-templates/cve-less/themes/parallelus-intersect-c7556a1caf919c1acc5983a1f0ea7582.yaml new file mode 100644 index 0000000000..c0513169f2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/parallelus-intersect-c7556a1caf919c1acc5983a1f0ea7582.yaml @@ -0,0 +1,58 @@ +id: parallelus-intersect-c7556a1caf919c1acc5983a1f0ea7582 + +info: + name: > + Parallelus Unite, Interscet, Traject, & Salutation < 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f88eaf82-e5de-43e2-b998-4a6d33be65ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/parallelus-intersect/" + google-query: inurl:"/wp-content/themes/parallelus-intersect/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,parallelus-intersect,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/parallelus-intersect/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallelus-intersect" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/parallelus-salutation-ab49cd0603fd2aad8bd2addfd19e8e37.yaml b/nuclei-templates/cve-less/themes/parallelus-salutation-ab49cd0603fd2aad8bd2addfd19e8e37.yaml new file mode 100644 index 0000000000..4c0fd20526 --- /dev/null +++ b/nuclei-templates/cve-less/themes/parallelus-salutation-ab49cd0603fd2aad8bd2addfd19e8e37.yaml @@ -0,0 +1,58 @@ +id: parallelus-salutation-ab49cd0603fd2aad8bd2addfd19e8e37 + +info: + name: > + Salutation Responsive WordPress Theme < 3.0.16 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/47f0795c-5a79-47e8-b118-f4f0e95ac53b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/parallelus-salutation/" + google-query: inurl:"/wp-content/themes/parallelus-salutation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,parallelus-salutation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/parallelus-salutation/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallelus-salutation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/parallelus-salutation-c7556a1caf919c1acc5983a1f0ea7582.yaml b/nuclei-templates/cve-less/themes/parallelus-salutation-c7556a1caf919c1acc5983a1f0ea7582.yaml new file mode 100644 index 0000000000..6bd211feae --- /dev/null +++ b/nuclei-templates/cve-less/themes/parallelus-salutation-c7556a1caf919c1acc5983a1f0ea7582.yaml @@ -0,0 +1,58 @@ +id: parallelus-salutation-c7556a1caf919c1acc5983a1f0ea7582 + +info: + name: > + Parallelus Unite, Interscet, Traject, & Salutation < 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f88eaf82-e5de-43e2-b998-4a6d33be65ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/parallelus-salutation/" + google-query: inurl:"/wp-content/themes/parallelus-salutation/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,parallelus-salutation,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/parallelus-salutation/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallelus-salutation" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/parallelus-traject-c7556a1caf919c1acc5983a1f0ea7582.yaml b/nuclei-templates/cve-less/themes/parallelus-traject-c7556a1caf919c1acc5983a1f0ea7582.yaml new file mode 100644 index 0000000000..f88f3d5e3b --- /dev/null +++ b/nuclei-templates/cve-less/themes/parallelus-traject-c7556a1caf919c1acc5983a1f0ea7582.yaml @@ -0,0 +1,58 @@ +id: parallelus-traject-c7556a1caf919c1acc5983a1f0ea7582 + +info: + name: > + Parallelus Unite, Interscet, Traject, & Salutation < 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f88eaf82-e5de-43e2-b998-4a6d33be65ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/parallelus-traject/" + google-query: inurl:"/wp-content/themes/parallelus-traject/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,parallelus-traject,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/parallelus-traject/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallelus-traject" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/parallelus-unite-c7556a1caf919c1acc5983a1f0ea7582.yaml b/nuclei-templates/cve-less/themes/parallelus-unite-c7556a1caf919c1acc5983a1f0ea7582.yaml new file mode 100644 index 0000000000..4a11f0b95e --- /dev/null +++ b/nuclei-templates/cve-less/themes/parallelus-unite-c7556a1caf919c1acc5983a1f0ea7582.yaml @@ -0,0 +1,58 @@ +id: parallelus-unite-c7556a1caf919c1acc5983a1f0ea7582 + +info: + name: > + Parallelus Unite, Interscet, Traject, & Salutation < 2.0 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f88eaf82-e5de-43e2-b998-4a6d33be65ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/parallelus-unite/" + google-query: inurl:"/wp-content/themes/parallelus-unite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,parallelus-unite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/parallelus-unite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "parallelus-unite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/paramount-d272edd7bf2202319b532fbee6ccf813.yaml b/nuclei-templates/cve-less/themes/paramount-d272edd7bf2202319b532fbee6ccf813.yaml new file mode 100644 index 0000000000..b2dd1da606 --- /dev/null +++ b/nuclei-templates/cve-less/themes/paramount-d272edd7bf2202319b532fbee6ccf813.yaml @@ -0,0 +1,58 @@ +id: paramount-d272edd7bf2202319b532fbee6ccf813 + +info: + name: > + Paramount (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/346cc9af-6a1b-444c-9483-94f940cd18ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/paramount/" + google-query: inurl:"/wp-content/themes/paramount/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,paramount,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/paramount/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paramount" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/partdo-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml b/nuclei-templates/cve-less/themes/partdo-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml new file mode 100644 index 0000000000..6b6a76c4c9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/partdo-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml @@ -0,0 +1,58 @@ +id: partdo-0ed3cd48ec0b8d5d59c0c2a69ba7db3d + +info: + name: > + Multiple Themes by KlbTheme <= (Various Versions) - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d5036a-c756-47a6-b071-c393f8a6ce5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/partdo/" + google-query: inurl:"/wp-content/themes/partdo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,partdo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/partdo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "partdo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pathway-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/pathway-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..48eaaec147 --- /dev/null +++ b/nuclei-templates/cve-less/themes/pathway-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: pathway-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pathway/" + google-query: inurl:"/wp-content/themes/pathway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pathway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pathway/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pathway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.15') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/perfect-portfolio-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/perfect-portfolio-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..405f5b29b0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/perfect-portfolio-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: perfect-portfolio-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/perfect-portfolio/" + google-query: inurl:"/wp-content/themes/perfect-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,perfect-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/perfect-portfolio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "perfect-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/performag-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/performag-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..d1d7a16836 --- /dev/null +++ b/nuclei-templates/cve-less/themes/performag-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: performag-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/performag/" + google-query: inurl:"/wp-content/themes/performag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,performag,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/performag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "performag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/performag-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/performag-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..875bd20a59 --- /dev/null +++ b/nuclei-templates/cve-less/themes/performag-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: performag-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/performag/" + google-query: inurl:"/wp-content/themes/performag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,performag,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/performag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "performag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/persuasion-7cbcd3695c9e4a82582727b8bf002ad8.yaml b/nuclei-templates/cve-less/themes/persuasion-7cbcd3695c9e4a82582727b8bf002ad8.yaml new file mode 100644 index 0000000000..96401f2e42 --- /dev/null +++ b/nuclei-templates/cve-less/themes/persuasion-7cbcd3695c9e4a82582727b8bf002ad8.yaml @@ -0,0 +1,58 @@ +id: persuasion-7cbcd3695c9e4a82582727b8bf002ad8 + +info: + name: > + Persuasion <= 2.4 - Arbitrary File Deletion + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aab42989-b928-492f-a610-d2a5546751e0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/persuasion/" + google-query: inurl:"/wp-content/themes/persuasion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,persuasion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/persuasion/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "persuasion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/persuasion-a15ad11bdf9b6729c6b7e6c228643dc4.yaml b/nuclei-templates/cve-less/themes/persuasion-a15ad11bdf9b6729c6b7e6c228643dc4.yaml new file mode 100644 index 0000000000..c1724a2dca --- /dev/null +++ b/nuclei-templates/cve-less/themes/persuasion-a15ad11bdf9b6729c6b7e6c228643dc4.yaml @@ -0,0 +1,58 @@ +id: persuasion-a15ad11bdf9b6729c6b7e6c228643dc4 + +info: + name: > + Persuasion <= 2.4 - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c0377d27-0439-46d3-a02c-a693b1ed0bfd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/persuasion/" + google-query: inurl:"/wp-content/themes/persuasion/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,persuasion,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/persuasion/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "persuasion" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/photocrati-theme-5f8f39bace71e82e660205813ebdbf8f.yaml b/nuclei-templates/cve-less/themes/photocrati-theme-5f8f39bace71e82e660205813ebdbf8f.yaml new file mode 100644 index 0000000000..5ed1e2b7be --- /dev/null +++ b/nuclei-templates/cve-less/themes/photocrati-theme-5f8f39bace71e82e660205813ebdbf8f.yaml @@ -0,0 +1,58 @@ +id: photocrati-theme-5f8f39bace71e82e660205813ebdbf8f + +info: + name: > + PhotoCrati Theme <= 4.0 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/102ab838-9011-4da6-bc24-179be1328bcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/photocrati-theme/" + google-query: inurl:"/wp-content/themes/photocrati-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,photocrati-theme,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/photocrati-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photocrati-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/photocrati-theme-62e00956791226e133fce07bc6049175.yaml b/nuclei-templates/cve-less/themes/photocrati-theme-62e00956791226e133fce07bc6049175.yaml new file mode 100644 index 0000000000..4695ce78e5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/photocrati-theme-62e00956791226e133fce07bc6049175.yaml @@ -0,0 +1,58 @@ +id: photocrati-theme-62e00956791226e133fce07bc6049175 + +info: + name: > + Photocrati (Unknown Versions) - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99746867-597b-49df-aa9e-548456a58542?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/photocrati-theme/" + google-query: inurl:"/wp-content/themes/photocrati-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,photocrati-theme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/photocrati-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photocrati-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/photocrati-theme-95e54f65e6d0b56382227247b6627a71.yaml b/nuclei-templates/cve-less/themes/photocrati-theme-95e54f65e6d0b56382227247b6627a71.yaml new file mode 100644 index 0000000000..924e97d150 --- /dev/null +++ b/nuclei-templates/cve-less/themes/photocrati-theme-95e54f65e6d0b56382227247b6627a71.yaml @@ -0,0 +1,58 @@ +id: photocrati-theme-95e54f65e6d0b56382227247b6627a71 + +info: + name: > + Photocrati <= 4.8.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5ab685c-1e58-43f3-a984-52afcfaa5aca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/photocrati-theme/" + google-query: inurl:"/wp-content/themes/photocrati-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,photocrati-theme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/photocrati-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photocrati-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/photolio-8ef9471efc371c6e5352e86a4f1c97cf.yaml b/nuclei-templates/cve-less/themes/photolio-8ef9471efc371c6e5352e86a4f1c97cf.yaml new file mode 100644 index 0000000000..82754445de --- /dev/null +++ b/nuclei-templates/cve-less/themes/photolio-8ef9471efc371c6e5352e86a4f1c97cf.yaml @@ -0,0 +1,58 @@ +id: photolio-8ef9471efc371c6e5352e86a4f1c97cf + +info: + name: > + Photolio Theme (All Known Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e477f41-8765-472a-b48b-d381cf7de5c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/photolio/" + google-query: inurl:"/wp-content/themes/photolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,photolio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/photolio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/photology-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml b/nuclei-templates/cve-less/themes/photology-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml new file mode 100644 index 0000000000..180785f518 --- /dev/null +++ b/nuclei-templates/cve-less/themes/photology-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml @@ -0,0 +1,58 @@ +id: photology-0eadfcaa632fa9ba5901b3c6b61b28a7 + +info: + name: > + Multiple Themes by jegstudio <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edb34ad0-352e-462e-a7f1-64a804a760ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/photology/" + google-query: inurl:"/wp-content/themes/photology/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,photology,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/photology/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "photology" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/picturefactory-817085c14092d48e41f60bbe2970b571.yaml b/nuclei-templates/cve-less/themes/picturefactory-817085c14092d48e41f60bbe2970b571.yaml new file mode 100644 index 0000000000..660f0c1d73 --- /dev/null +++ b/nuclei-templates/cve-less/themes/picturefactory-817085c14092d48e41f60bbe2970b571.yaml @@ -0,0 +1,58 @@ +id: picturefactory-817085c14092d48e41f60bbe2970b571 + +info: + name: > + Picture Factory (Unspecified Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02ac8b9e-bc59-4c46-9f9c-23e3b6ae615c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/picturefactory/" + google-query: inurl:"/wp-content/themes/picturefactory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,picturefactory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/picturefactory/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "picturefactory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pinboard-da11574313c0b78ab88b69a807dbc63e.yaml b/nuclei-templates/cve-less/themes/pinboard-da11574313c0b78ab88b69a807dbc63e.yaml new file mode 100644 index 0000000000..f6cc64e6e9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/pinboard-da11574313c0b78ab88b69a807dbc63e.yaml @@ -0,0 +1,58 @@ +id: pinboard-da11574313c0b78ab88b69a807dbc63e + +info: + name: > + Pinboard <= 1.1.10 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17f2a0d5-6640-4ef9-a219-93a92571a5d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pinboard/" + google-query: inurl:"/wp-content/themes/pinboard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pinboard,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pinboard/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pinboard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pinfinity-d160b72531c6001a36910570c68caf3f.yaml b/nuclei-templates/cve-less/themes/pinfinity-d160b72531c6001a36910570c68caf3f.yaml new file mode 100644 index 0000000000..20ad0ff17b --- /dev/null +++ b/nuclei-templates/cve-less/themes/pinfinity-d160b72531c6001a36910570c68caf3f.yaml @@ -0,0 +1,58 @@ +id: pinfinity-d160b72531c6001a36910570c68caf3f + +info: + name: > + Pinfinity <= 1.9.2 - Reflected Cross-site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/adbf25c2-b572-4a83-811e-3a5dda1ad8cd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pinfinity/" + google-query: inurl:"/wp-content/themes/pinfinity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pinfinity,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pinfinity/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pinfinity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pixiv-custom-caeb5a0b48102c1758efb7acc2ae32c5.yaml b/nuclei-templates/cve-less/themes/pixiv-custom-caeb5a0b48102c1758efb7acc2ae32c5.yaml new file mode 100644 index 0000000000..676e91e150 --- /dev/null +++ b/nuclei-templates/cve-less/themes/pixiv-custom-caeb5a0b48102c1758efb7acc2ae32c5.yaml @@ -0,0 +1,58 @@ +id: pixiv-custom-caeb5a0b48102c1758efb7acc2ae32c5 + +info: + name: > + Pixiv Custom < 2.1.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7327f439-0088-4ad8-898a-30740fc62d6e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pixiv-custom/" + google-query: inurl:"/wp-content/themes/pixiv-custom/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pixiv-custom,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pixiv-custom/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixiv-custom" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pixova-lite-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/pixova-lite-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..fc5092999a --- /dev/null +++ b/nuclei-templates/cve-less/themes/pixova-lite-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: pixova-lite-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pixova-lite/" + google-query: inurl:"/wp-content/themes/pixova-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pixova-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pixova-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pixova-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/platform-097b177de58f6e0ab66eb9ddb05e4182.yaml b/nuclei-templates/cve-less/themes/platform-097b177de58f6e0ab66eb9ddb05e4182.yaml new file mode 100644 index 0000000000..94eb60755e --- /dev/null +++ b/nuclei-templates/cve-less/themes/platform-097b177de58f6e0ab66eb9ddb05e4182.yaml @@ -0,0 +1,58 @@ +id: platform-097b177de58f6e0ab66eb9ddb05e4182 + +info: + name: > + Platform < 1.4.4 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c16fab08-6b2c-433a-9105-fc15f5c52575?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/platform/" + google-query: inurl:"/wp-content/themes/platform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,platform,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/platform/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "platform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/platform-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml b/nuclei-templates/cve-less/themes/platform-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml new file mode 100644 index 0000000000..c2790c8b7a --- /dev/null +++ b/nuclei-templates/cve-less/themes/platform-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml @@ -0,0 +1,58 @@ +id: platform-39d9e91ebde9c4d0e5ed1e82b99b21f1 + +info: + name: > + Platform 4 <= 1.1.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1a3666b-2329-49c3-b017-9b495d90415e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/platform/" + google-query: inurl:"/wp-content/themes/platform/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,platform,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/platform/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "platform" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pliska-a2a9df8b3604a4aa48635001d225e7fd.yaml b/nuclei-templates/cve-less/themes/pliska-a2a9df8b3604a4aa48635001d225e7fd.yaml new file mode 100644 index 0000000000..0007461f87 --- /dev/null +++ b/nuclei-templates/cve-less/themes/pliska-a2a9df8b3604a4aa48635001d225e7fd.yaml @@ -0,0 +1,58 @@ +id: pliska-a2a9df8b3604a4aa48635001d225e7fd + +info: + name: > + Pliska <= 0.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Author Display Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b4da6327-9ad1-4a53-b2c4-a4c31f56d0e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pliska/" + google-query: inurl:"/wp-content/themes/pliska/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pliska,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pliska/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pliska" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pont-5bbc8aa8376e0b4126beac5ed3fccdfe.yaml b/nuclei-templates/cve-less/themes/pont-5bbc8aa8376e0b4126beac5ed3fccdfe.yaml new file mode 100644 index 0000000000..3a1d785e4e --- /dev/null +++ b/nuclei-templates/cve-less/themes/pont-5bbc8aa8376e0b4126beac5ed3fccdfe.yaml @@ -0,0 +1,58 @@ +id: pont-5bbc8aa8376e0b4126beac5ed3fccdfe + +info: + name: > + Pont <= 1.5 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fe78766-0beb-4d6d-a2e6-92f79f117f50?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pont/" + google-query: inurl:"/wp-content/themes/pont/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pont,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pont/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pont" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pool-7ff920414ab7dcbc44bc64e30066047c.yaml b/nuclei-templates/cve-less/themes/pool-7ff920414ab7dcbc44bc64e30066047c.yaml new file mode 100644 index 0000000000..0be0744880 --- /dev/null +++ b/nuclei-templates/cve-less/themes/pool-7ff920414ab7dcbc44bc64e30066047c.yaml @@ -0,0 +1,58 @@ +id: pool-7ff920414ab7dcbc44bc64e30066047c + +info: + name: > + Pool <= 1.0.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/072fbfe7-37df-412e-bddb-68837473b3d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pool/" + google-query: inurl:"/wp-content/themes/pool/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pool,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pool/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pool" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/popularfx-64d81acfaf286b16665d31bcc42d2bfa.yaml b/nuclei-templates/cve-less/themes/popularfx-64d81acfaf286b16665d31bcc42d2bfa.yaml new file mode 100644 index 0000000000..0eac956dc3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/popularfx-64d81acfaf286b16665d31bcc42d2bfa.yaml @@ -0,0 +1,58 @@ +id: popularfx-64d81acfaf286b16665d31bcc42d2bfa + +info: + name: > + PopularFX <= 1.2.4 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dd248b4b-e7a6-4997-81d8-1d163cd85a9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/popularfx/" + google-query: inurl:"/wp-content/themes/popularfx/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,popularfx,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/popularfx/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "popularfx" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/porto-68e18ce0101bb6035f701d461eb70415.yaml b/nuclei-templates/cve-less/themes/porto-68e18ce0101bb6035f701d461eb70415.yaml new file mode 100644 index 0000000000..bff0375132 --- /dev/null +++ b/nuclei-templates/cve-less/themes/porto-68e18ce0101bb6035f701d461eb70415.yaml @@ -0,0 +1,58 @@ +id: porto-68e18ce0101bb6035f701d461eb70415 + +info: + name: > + Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4bc3da9e-4b5f-4200-9df9-0ae953571377?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/porto/" + google-query: inurl:"/wp-content/themes/porto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,porto,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/porto/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "porto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/porto-a4ba9fcc1f7e22d1ee8a16e40da81130.yaml b/nuclei-templates/cve-less/themes/porto-a4ba9fcc1f7e22d1ee8a16e40da81130.yaml new file mode 100644 index 0000000000..c479e816a1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/porto-a4ba9fcc1f7e22d1ee8a16e40da81130.yaml @@ -0,0 +1,58 @@ +id: porto-a4ba9fcc1f7e22d1ee8a16e40da81130 + +info: + name: > + Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98ccc604-79c6-4be9-acb0-23fc82a31dfa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/porto/" + google-query: inurl:"/wp-content/themes/porto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,porto,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/porto/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "porto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pressive-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/pressive-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..09d4fd28a5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/pressive-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: pressive-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pressive/" + google-query: inurl:"/wp-content/themes/pressive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pressive,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pressive/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pressive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pressive-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/pressive-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..07dfd7a610 --- /dev/null +++ b/nuclei-templates/cve-less/themes/pressive-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: pressive-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pressive/" + google-query: inurl:"/wp-content/themes/pressive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pressive,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pressive/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pressive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/prolist-4c079e7a4ff59ab0c43e5c88ab6d23d3.yaml b/nuclei-templates/cve-less/themes/prolist-4c079e7a4ff59ab0c43e5c88ab6d23d3.yaml new file mode 100644 index 0000000000..3b96cfb62a --- /dev/null +++ b/nuclei-templates/cve-less/themes/prolist-4c079e7a4ff59ab0c43e5c88ab6d23d3.yaml @@ -0,0 +1,58 @@ +id: prolist-4c079e7a4ff59ab0c43e5c88ab6d23d3 + +info: + name: > + Prolisting - Directory Listing <= 1.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e9a8383-7044-484d-8e4a-e9e4171da385?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/prolist/" + google-query: inurl:"/wp-content/themes/prolist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,prolist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/prolist/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prolist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/prostore-68a9180f1b681c9557f7931c761fd8d8.yaml b/nuclei-templates/cve-less/themes/prostore-68a9180f1b681c9557f7931c761fd8d8.yaml new file mode 100644 index 0000000000..f4c7c6e97d --- /dev/null +++ b/nuclei-templates/cve-less/themes/prostore-68a9180f1b681c9557f7931c761fd8d8.yaml @@ -0,0 +1,58 @@ +id: prostore-68a9180f1b681c9557f7931c761fd8d8 + +info: + name: > + Prostore < 1.1.3 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/310d9b83-6511-46be-aead-a0aa067d2c2f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/prostore/" + google-query: inurl:"/wp-content/themes/prostore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,prostore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/prostore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prostore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/prosume-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/prosume-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..0d53bb068c --- /dev/null +++ b/nuclei-templates/cve-less/themes/prosume-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: prosume-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/prosume/" + google-query: inurl:"/wp-content/themes/prosume/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,prosume,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/prosume/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "prosume" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/punte-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/punte-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..9e2bf54dac --- /dev/null +++ b/nuclei-templates/cve-less/themes/punte-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: punte-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/punte/" + google-query: inurl:"/wp-content/themes/punte/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,punte,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/punte/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "punte" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/punte-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/punte-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..24b1cf403b --- /dev/null +++ b/nuclei-templates/cve-less/themes/punte-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: punte-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/punte/" + google-query: inurl:"/wp-content/themes/punte/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,punte,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/punte/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "punte" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/punte-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/punte-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..496455616f --- /dev/null +++ b/nuclei-templates/cve-less/themes/punte-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: punte-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/punte/" + google-query: inurl:"/wp-content/themes/punte/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,punte,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/punte/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "punte" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/purosa-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/purosa-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..f8c86e3abd --- /dev/null +++ b/nuclei-templates/cve-less/themes/purosa-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: purosa-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/purosa/" + google-query: inurl:"/wp-content/themes/purosa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,purosa,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/purosa/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "purosa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/purus-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/purus-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..a96e2eecdf --- /dev/null +++ b/nuclei-templates/cve-less/themes/purus-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: purus-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/purus/" + google-query: inurl:"/wp-content/themes/purus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,purus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/purus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "purus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/purus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/themes/purus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..10a13f83de --- /dev/null +++ b/nuclei-templates/cve-less/themes/purus-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: purus-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/purus/" + google-query: inurl:"/wp-content/themes/purus/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,purus,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/purus/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "purus" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/pyrmont-v2-f10a2f89b43d6c910b6e1605fdde5663.yaml b/nuclei-templates/cve-less/themes/pyrmont-v2-f10a2f89b43d6c910b6e1605fdde5663.yaml new file mode 100644 index 0000000000..f52f3213b3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/pyrmont-v2-f10a2f89b43d6c910b6e1605fdde5663.yaml @@ -0,0 +1,58 @@ +id: pyrmont-v2-f10a2f89b43d6c910b6e1605fdde5663 + +info: + name: > + Pyrmont V2 <= 2.0.7 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d03b4dcd-297d-4361-9cc4-6ccf3d4f0e85?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/pyrmont-v2/" + google-query: inurl:"/wp-content/themes/pyrmont-v2/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,pyrmont-v2,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/pyrmont-v2/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "pyrmont-v2" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/qaengine-51d36380a77053aac089f5606e300111.yaml b/nuclei-templates/cve-less/themes/qaengine-51d36380a77053aac089f5606e300111.yaml new file mode 100644 index 0000000000..5a822088c7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/qaengine-51d36380a77053aac089f5606e300111.yaml @@ -0,0 +1,58 @@ +id: qaengine-51d36380a77053aac089f5606e300111 + +info: + name: > + QAEngine <= 1.4 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2224b17e-e327-4b86-85db-ad878f989839?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/qaengine/" + google-query: inurl:"/wp-content/themes/qaengine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,qaengine,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/qaengine/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "qaengine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/quality-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/quality-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..0bb87d0d18 --- /dev/null +++ b/nuclei-templates/cve-less/themes/quality-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: quality-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/quality/" + google-query: inurl:"/wp-content/themes/quality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,quality,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/quality/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/quasar-8a7f28eb936158f3b884555eebcf14f4.yaml b/nuclei-templates/cve-less/themes/quasar-8a7f28eb936158f3b884555eebcf14f4.yaml new file mode 100644 index 0000000000..df95b180c2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/quasar-8a7f28eb936158f3b884555eebcf14f4.yaml @@ -0,0 +1,58 @@ +id: quasar-8a7f28eb936158f3b884555eebcf14f4 + +info: + name: > + Quasar - WordPress Theme with Animation Builder <= 1.9.2 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/86566819-ec2e-4d56-87f6-4cd4b6de6192?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/quasar/" + google-query: inurl:"/wp-content/themes/quasar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,quasar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/quasar/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quasar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/quota-b91f6a56da52c114b3a84093ea345821.yaml b/nuclei-templates/cve-less/themes/quota-b91f6a56da52c114b3a84093ea345821.yaml new file mode 100644 index 0000000000..9180a2d891 --- /dev/null +++ b/nuclei-templates/cve-less/themes/quota-b91f6a56da52c114b3a84093ea345821.yaml @@ -0,0 +1,58 @@ +id: quota-b91f6a56da52c114b3a84093ea345821 + +info: + name: > + Easy Digital Downloads - Quota < 1.2.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9a13cbc7-fd51-43e6-bf22-4d0510c5a1c7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/quota/" + google-query: inurl:"/wp-content/themes/quota/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,quota,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/quota/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "quota" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/radial-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml b/nuclei-templates/cve-less/themes/radial-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml new file mode 100644 index 0000000000..84cd178d74 --- /dev/null +++ b/nuclei-templates/cve-less/themes/radial-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml @@ -0,0 +1,58 @@ +id: radial-theme-d488c88c43dea5d67f8bd9aa864ebfd0 + +info: + name: > + Various Orange themes (Various Unspecified Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6897a8fe-c32e-430a-847c-23d1add2355d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/radial-theme/" + google-query: inurl:"/wp-content/themes/radial-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,radial-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/radial-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "radial-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/raise-mag-a81a5bf9125eeee92e00bfdaa83c90ee.yaml b/nuclei-templates/cve-less/themes/raise-mag-a81a5bf9125eeee92e00bfdaa83c90ee.yaml new file mode 100644 index 0000000000..bc52c4c756 --- /dev/null +++ b/nuclei-templates/cve-less/themes/raise-mag-a81a5bf9125eeee92e00bfdaa83c90ee.yaml @@ -0,0 +1,58 @@ +id: raise-mag-a81a5bf9125eeee92e00bfdaa83c90ee + +info: + name: > + Wishful Blog <= 2.0.1 & Raise Mag <= 1.0.7 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb33f779-d045-48dd-babe-8b1fab903124?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/raise-mag/" + google-query: inurl:"/wp-content/themes/raise-mag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,raise-mag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/raise-mag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "raise-mag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rambo-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/rambo-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..d6a7f08e6c --- /dev/null +++ b/nuclei-templates/cve-less/themes/rambo-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: rambo-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rambo/" + google-query: inurl:"/wp-content/themes/rambo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rambo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rambo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rambo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rara-business-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/rara-business-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..1d7eb81268 --- /dev/null +++ b/nuclei-templates/cve-less/themes/rara-business-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: rara-business-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rara-business/" + google-query: inurl:"/wp-content/themes/rara-business/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rara-business,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rara-business/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rara-business" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rayoflight-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml b/nuclei-templates/cve-less/themes/rayoflight-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml new file mode 100644 index 0000000000..4c080bbc09 --- /dev/null +++ b/nuclei-templates/cve-less/themes/rayoflight-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml @@ -0,0 +1,58 @@ +id: rayoflight-theme-d488c88c43dea5d67f8bd9aa864ebfd0 + +info: + name: > + Various Orange themes (Various Unspecified Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6897a8fe-c32e-430a-847c-23d1add2355d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rayoflight-theme/" + google-query: inurl:"/wp-content/themes/rayoflight-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rayoflight-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rayoflight-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rayoflight-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/real-estate-directory-0c8164317d8680b32c0889f7b19b5e0b.yaml b/nuclei-templates/cve-less/themes/real-estate-directory-0c8164317d8680b32c0889f7b19b5e0b.yaml new file mode 100644 index 0000000000..4657435316 --- /dev/null +++ b/nuclei-templates/cve-less/themes/real-estate-directory-0c8164317d8680b32c0889f7b19b5e0b.yaml @@ -0,0 +1,58 @@ +id: real-estate-directory-0c8164317d8680b32c0889f7b19b5e0b + +info: + name: > + Real Estate Directory <= 1.0.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17031e21-e697-4e01-8848-c3957f5dac7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/real-estate-directory/" + google-query: inurl:"/wp-content/themes/real-estate-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,real-estate-directory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/real-estate-directory/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-estate-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/real-estate-directory-527c1df8473c8a3efd5589ba81b0395f.yaml b/nuclei-templates/cve-less/themes/real-estate-directory-527c1df8473c8a3efd5589ba81b0395f.yaml new file mode 100644 index 0000000000..d5b49cf6aa --- /dev/null +++ b/nuclei-templates/cve-less/themes/real-estate-directory-527c1df8473c8a3efd5589ba81b0395f.yaml @@ -0,0 +1,58 @@ +id: real-estate-directory-527c1df8473c8a3efd5589ba81b0395f + +info: + name: > + Real Estate Directory <= 1.0.5 - Cross-Site Request Forgery via rdm_activate_plugin + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39a50c49-5c24-4ae7-8f77-4f3d98270f8f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/real-estate-directory/" + google-query: inurl:"/wp-content/themes/real-estate-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,real-estate-directory,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/real-estate-directory/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "real-estate-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-7-024d089f0907af94147d4ffdaa704965.yaml b/nuclei-templates/cve-less/themes/realestate-7-024d089f0907af94147d4ffdaa704965.yaml new file mode 100644 index 0000000000..654184480b --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-7-024d089f0907af94147d4ffdaa704965.yaml @@ -0,0 +1,58 @@ +id: realestate-7-024d089f0907af94147d4ffdaa704965 + +info: + name: > + Real Estate 7 <= 3.3.4 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/007af51b-95b5-4b12-9f74-abf31f6de341?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate-7/" + google-query: inurl:"/wp-content/themes/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate-7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-7-66d97e7594f241334344e22e74a87e0f.yaml b/nuclei-templates/cve-less/themes/realestate-7-66d97e7594f241334344e22e74a87e0f.yaml new file mode 100644 index 0000000000..f3abf45ea8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-7-66d97e7594f241334344e22e74a87e0f.yaml @@ -0,0 +1,58 @@ +id: realestate-7-66d97e7594f241334344e22e74a87e0f + +info: + name: > + Real Estate 7 WordPress < 3.0.6 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e52914cc-da0c-4b79-b378-4ef63e7974bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate-7/" + google-query: inurl:"/wp-content/themes/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate-7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-7-7c80a51dbc178dbba0958056b8c3f2e8.yaml b/nuclei-templates/cve-less/themes/realestate-7-7c80a51dbc178dbba0958056b8c3f2e8.yaml new file mode 100644 index 0000000000..411e14de70 --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-7-7c80a51dbc178dbba0958056b8c3f2e8.yaml @@ -0,0 +1,58 @@ +id: realestate-7-7c80a51dbc178dbba0958056b8c3f2e8 + +info: + name: > + Real Estate 7 WordPress Theme < 2.9.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ed50ad7-a31b-488e-85fc-ff521488f62a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate-7/" + google-query: inurl:"/wp-content/themes/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate-7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-7-8be48b3453eb15360ed107a9ab69d0f6.yaml b/nuclei-templates/cve-less/themes/realestate-7-8be48b3453eb15360ed107a9ab69d0f6.yaml new file mode 100644 index 0000000000..ae34159c1c --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-7-8be48b3453eb15360ed107a9ab69d0f6.yaml @@ -0,0 +1,58 @@ +id: realestate-7-8be48b3453eb15360ed107a9ab69d0f6 + +info: + name: > + Real Estate 7 Theme <= 3.3.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/952aec28-a380-4c6d-8391-b21cddf90a5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate-7/" + google-query: inurl:"/wp-content/themes/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate-7,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate-7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-7-c2afa79da4aeafd15b33b22d1b481661.yaml b/nuclei-templates/cve-less/themes/realestate-7-c2afa79da4aeafd15b33b22d1b481661.yaml new file mode 100644 index 0000000000..37ad670e0c --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-7-c2afa79da4aeafd15b33b22d1b481661.yaml @@ -0,0 +1,58 @@ +id: realestate-7-c2afa79da4aeafd15b33b22d1b481661 + +info: + name: > + Real Estate 7 <= 3.3.4 - Reflected Cross-Site Scripting via ct_additional_features + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/157b3095-b662-465e-a975-5b71b5d4ba2a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate-7/" + google-query: inurl:"/wp-content/themes/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate-7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-7-cc4eb2a8450ba7d1ac65c2f61e0d0cf7.yaml b/nuclei-templates/cve-less/themes/realestate-7-cc4eb2a8450ba7d1ac65c2f61e0d0cf7.yaml new file mode 100644 index 0000000000..98b3e0e45e --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-7-cc4eb2a8450ba7d1ac65c2f61e0d0cf7.yaml @@ -0,0 +1,58 @@ +id: realestate-7-cc4eb2a8450ba7d1ac65c2f61e0d0cf7 + +info: + name: > + Real Estate 7 WordPress < 2.9.5 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5ecb52e-6bf0-4168-b0d7-6972d23c9122?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate-7/" + google-query: inurl:"/wp-content/themes/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate-7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate-7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-7-e4a1be97c16e08b518e98ce4293ed725.yaml b/nuclei-templates/cve-less/themes/realestate-7-e4a1be97c16e08b518e98ce4293ed725.yaml new file mode 100644 index 0000000000..aa338e762b --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-7-e4a1be97c16e08b518e98ce4293ed725.yaml @@ -0,0 +1,58 @@ +id: realestate-7-e4a1be97c16e08b518e98ce4293ed725 + +info: + name: > + Real Estate 7 Theme <= 3.3.4 - Unauthenticated Arbitrary Email Sending + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5778ba3d-6670-47ad-ae65-50b6fb8e5db0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate-7/" + google-query: inurl:"/wp-content/themes/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate-7,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate-7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-7-f1a9fcf69d62e2bfd481e04f939f5821.yaml b/nuclei-templates/cve-less/themes/realestate-7-f1a9fcf69d62e2bfd481e04f939f5821.yaml new file mode 100644 index 0000000000..21b73120ad --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-7-f1a9fcf69d62e2bfd481e04f939f5821.yaml @@ -0,0 +1,58 @@ +id: realestate-7-f1a9fcf69d62e2bfd481e04f939f5821 + +info: + name: > + Real Estate 7 <= 3.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/185f9dc4-39e6-422a-97e2-7e8814ccf64a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate-7/" + google-query: inurl:"/wp-content/themes/realestate-7/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate-7,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate-7/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate-7" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realestate-b65ead0bf4d8e59d495a3f91f757b324.yaml b/nuclei-templates/cve-less/themes/realestate-b65ead0bf4d8e59d495a3f91f757b324.yaml new file mode 100644 index 0000000000..f8b265d1ea --- /dev/null +++ b/nuclei-templates/cve-less/themes/realestate-b65ead0bf4d8e59d495a3f91f757b324.yaml @@ -0,0 +1,58 @@ +id: realestate-b65ead0bf4d8e59d495a3f91f757b324 + +info: + name: > + Real Estate by Templatic (Unknown Version) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1523db36-fdc6-4a9d-bb2c-d9b28668a3fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realestate/" + google-query: inurl:"/wp-content/themes/realestate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realestate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realestate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realestate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realhomes-4a61498f6efba74cb49bf8c1a7045be1.yaml b/nuclei-templates/cve-less/themes/realhomes-4a61498f6efba74cb49bf8c1a7045be1.yaml new file mode 100644 index 0000000000..a7d836c22e --- /dev/null +++ b/nuclei-templates/cve-less/themes/realhomes-4a61498f6efba74cb49bf8c1a7045be1.yaml @@ -0,0 +1,58 @@ +id: realhomes-4a61498f6efba74cb49bf8c1a7045be1 + +info: + name: > + RealHomes <= 4.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3ee6004-03d1-4216-b22e-0aadc1f4d9de?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realhomes/" + google-query: inurl:"/wp-content/themes/realhomes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realhomes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realhomes/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realhomes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/realhomes-d33a8c081c58ee9aa399ed8893b885f0.yaml b/nuclei-templates/cve-less/themes/realhomes-d33a8c081c58ee9aa399ed8893b885f0.yaml new file mode 100644 index 0000000000..0b5d7bab42 --- /dev/null +++ b/nuclei-templates/cve-less/themes/realhomes-d33a8c081c58ee9aa399ed8893b885f0.yaml @@ -0,0 +1,58 @@ +id: realhomes-d33a8c081c58ee9aa399ed8893b885f0 + +info: + name: > + RealHomes <= 4.0.2 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d918b6ae-a72c-48dc-885b-19be49d578dc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/realhomes/" + google-query: inurl:"/wp-content/themes/realhomes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,realhomes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/realhomes/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "realhomes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/reality-3985d2776b3f2339d3a1cdb855d509b4.yaml b/nuclei-templates/cve-less/themes/reality-3985d2776b3f2339d3a1cdb855d509b4.yaml new file mode 100644 index 0000000000..b9131f5c00 --- /dev/null +++ b/nuclei-templates/cve-less/themes/reality-3985d2776b3f2339d3a1cdb855d509b4.yaml @@ -0,0 +1,58 @@ +id: reality-3985d2776b3f2339d3a1cdb855d509b4 + +info: + name: > + Reality <= 2.3.0 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8837e74c-677b-494d-9d7a-4bb166921bbf?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/reality/" + google-query: inurl:"/wp-content/themes/reality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,reality,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/reality/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/reality-3d461e76f68c530821c0137a86bc0253.yaml b/nuclei-templates/cve-less/themes/reality-3d461e76f68c530821c0137a86bc0253.yaml new file mode 100644 index 0000000000..3de0347e7b --- /dev/null +++ b/nuclei-templates/cve-less/themes/reality-3d461e76f68c530821c0137a86bc0253.yaml @@ -0,0 +1,58 @@ +id: reality-3d461e76f68c530821c0137a86bc0253 + +info: + name: > + Reality | Estate Multipurpose WordPress Theme <= 2.5.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/21a15a21-1d35-4fbc-9c01-ded68287fc65?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/reality/" + google-query: inurl:"/wp-content/themes/reality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,reality,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/reality/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/reality-7a0da0352bb71e4b35931b40a5da432b.yaml b/nuclei-templates/cve-less/themes/reality-7a0da0352bb71e4b35931b40a5da432b.yaml new file mode 100644 index 0000000000..089f0f5f4b --- /dev/null +++ b/nuclei-templates/cve-less/themes/reality-7a0da0352bb71e4b35931b40a5da432b.yaml @@ -0,0 +1,58 @@ +id: reality-7a0da0352bb71e4b35931b40a5da432b + +info: + name: > + Reality | Estate Multipurpose WordPress Theme <= 2.5.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/364a9a12-d6d4-4461-b45f-cf7d6ea815ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/reality/" + google-query: inurl:"/wp-content/themes/reality/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,reality,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/reality/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reality" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/redline-6d6ebc25c70df8d2d5941ea4d08ecee0.yaml b/nuclei-templates/cve-less/themes/redline-6d6ebc25c70df8d2d5941ea4d08ecee0.yaml new file mode 100644 index 0000000000..ecc8fda4a4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/redline-6d6ebc25c70df8d2d5941ea4d08ecee0.yaml @@ -0,0 +1,58 @@ +id: redline-6d6ebc25c70df8d2d5941ea4d08ecee0 + +info: + name: > + RedLine < 1.66 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/362fcd02-73c3-413b-8076-694c4d55544d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/redline/" + google-query: inurl:"/wp-content/themes/redline/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,redline,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/redline/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "redline" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.66') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/redsteel-74dd0fb008f6cc6f34e6b30263cedfe1.yaml b/nuclei-templates/cve-less/themes/redsteel-74dd0fb008f6cc6f34e6b30263cedfe1.yaml new file mode 100644 index 0000000000..c308418489 --- /dev/null +++ b/nuclei-templates/cve-less/themes/redsteel-74dd0fb008f6cc6f34e6b30263cedfe1.yaml @@ -0,0 +1,58 @@ +id: redsteel-74dd0fb008f6cc6f34e6b30263cedfe1 + +info: + name: > + RedSteel (All Versions) - File Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6a216505-7ab3-4ec7-bb11-e1c6ceaa2aed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/RedSteel/" + google-query: inurl:"/wp-content/themes/RedSteel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,RedSteel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/RedSteel/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "RedSteel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/refraction-57d8566b3666f1822ca82f2082d046bb.yaml b/nuclei-templates/cve-less/themes/refraction-57d8566b3666f1822ca82f2082d046bb.yaml new file mode 100644 index 0000000000..4c9e534712 --- /dev/null +++ b/nuclei-templates/cve-less/themes/refraction-57d8566b3666f1822ca82f2082d046bb.yaml @@ -0,0 +1,58 @@ +id: refraction-57d8566b3666f1822ca82f2082d046bb + +info: + name: > + Refraction <= 1.3 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7887e0a6-53bf-49c7-a7a6-7c65cec28cae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/refraction/" + google-query: inurl:"/wp-content/themes/refraction/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,refraction,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/refraction/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "refraction" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/reganto-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml b/nuclei-templates/cve-less/themes/reganto-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml new file mode 100644 index 0000000000..860d7d1e6b --- /dev/null +++ b/nuclei-templates/cve-less/themes/reganto-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml @@ -0,0 +1,58 @@ +id: reganto-theme-d488c88c43dea5d67f8bd9aa864ebfd0 + +info: + name: > + Various Orange themes (Various Unspecified Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6897a8fe-c32e-430a-847c-23d1add2355d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/reganto-theme/" + google-query: inurl:"/wp-content/themes/reganto-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,reganto-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/reganto-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "reganto-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/regina-lite-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/regina-lite-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..67cc3d88d3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/regina-lite-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: regina-lite-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/regina-lite/" + google-query: inurl:"/wp-content/themes/regina-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,regina-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/regina-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "regina-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/regina-lite-f1520e7afffb75e51c28f74d7ae1e832.yaml b/nuclei-templates/cve-less/themes/regina-lite-f1520e7afffb75e51c28f74d7ae1e832.yaml new file mode 100644 index 0000000000..1152b50246 --- /dev/null +++ b/nuclei-templates/cve-less/themes/regina-lite-f1520e7afffb75e51c28f74d7ae1e832.yaml @@ -0,0 +1,58 @@ +id: regina-lite-f1520e7afffb75e51c28f74d7ae1e832 + +info: + name: > + Regina Lite <= 2.0.7 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7dcd3452-a340-44e5-b292-347dc69ab863?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/regina-lite/" + google-query: inurl:"/wp-content/themes/regina-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,regina-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/regina-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "regina-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rehub-theme-7848dbbabd9f06e0c602290bde397eb1.yaml b/nuclei-templates/cve-less/themes/rehub-theme-7848dbbabd9f06e0c602290bde397eb1.yaml new file mode 100644 index 0000000000..ca3651a336 --- /dev/null +++ b/nuclei-templates/cve-less/themes/rehub-theme-7848dbbabd9f06e0c602290bde397eb1.yaml @@ -0,0 +1,58 @@ +id: rehub-theme-7848dbbabd9f06e0c602290bde397eb1 + +info: + name: > + Rehub <= 19.6.1 - Authenticated (Subscriber+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b23ab054-11c9-4229-9adc-6eef6f81c3f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rehub-theme/" + google-query: inurl:"/wp-content/themes/rehub-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rehub-theme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rehub-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rehub-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rehub-theme-b4a06dd8a8b5f551ef3c31a46e092a4e.yaml b/nuclei-templates/cve-less/themes/rehub-theme-b4a06dd8a8b5f551ef3c31a46e092a4e.yaml new file mode 100644 index 0000000000..355878c49b --- /dev/null +++ b/nuclei-templates/cve-less/themes/rehub-theme-b4a06dd8a8b5f551ef3c31a46e092a4e.yaml @@ -0,0 +1,58 @@ +id: rehub-theme-b4a06dd8a8b5f551ef3c31a46e092a4e + +info: + name: > + Rehub <= 19.6.1 - Authenticated (Editor+) Local File Inclusion + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d5244db8-86b3-4d1d-8fd6-febfd5a7372e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rehub-theme/" + google-query: inurl:"/wp-content/themes/rehub-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rehub-theme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rehub-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rehub-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rehub-theme-b8220e763aaa4255ba01ed2e30a358fd.yaml b/nuclei-templates/cve-less/themes/rehub-theme-b8220e763aaa4255ba01ed2e30a358fd.yaml new file mode 100644 index 0000000000..e525857b15 --- /dev/null +++ b/nuclei-templates/cve-less/themes/rehub-theme-b8220e763aaa4255ba01ed2e30a358fd.yaml @@ -0,0 +1,58 @@ +id: rehub-theme-b8220e763aaa4255ba01ed2e30a358fd + +info: + name: > + Rehub <= 19.6.1 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e188b3a4-ddb2-405b-840f-4f13db5dbf3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rehub-theme/" + google-query: inurl:"/wp-content/themes/rehub-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rehub-theme,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rehub-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rehub-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/repagent-288eb500b515d4e74eb8cc4150e440e6.yaml b/nuclei-templates/cve-less/themes/repagent-288eb500b515d4e74eb8cc4150e440e6.yaml new file mode 100644 index 0000000000..66e6510ae5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/repagent-288eb500b515d4e74eb8cc4150e440e6.yaml @@ -0,0 +1,58 @@ +id: repagent-288eb500b515d4e74eb8cc4150e440e6 + +info: + name: > + Repagent (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d557ccb4-99c3-4286-91cd-87576a95f179?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/repagent/" + google-query: inurl:"/wp-content/themes/repagent/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,repagent,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/repagent/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "repagent" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/resoto-87e4105fcd662623c87dc5371d2bcde2.yaml b/nuclei-templates/cve-less/themes/resoto-87e4105fcd662623c87dc5371d2bcde2.yaml new file mode 100644 index 0000000000..97266222c0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/resoto-87e4105fcd662623c87dc5371d2bcde2.yaml @@ -0,0 +1,58 @@ +id: resoto-87e4105fcd662623c87dc5371d2bcde2 + +info: + name: > + Resoto <= 1.0.8 - Missing Authorization leading to Authenticated (Subscriber+) Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb5c5e82-d6e5-4237-958f-12fc4698e77e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/resoto/" + google-query: inurl:"/wp-content/themes/resoto/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,resoto,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/resoto/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "resoto" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/responsive-935bd93984704dacecafedc205b598e5.yaml b/nuclei-templates/cve-less/themes/responsive-935bd93984704dacecafedc205b598e5.yaml new file mode 100644 index 0000000000..32675325b9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/responsive-935bd93984704dacecafedc205b598e5.yaml @@ -0,0 +1,58 @@ +id: responsive-935bd93984704dacecafedc205b598e5 + +info: + name: > + Responsive <= 5.0.2 - Missing Authorization to HTML Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbe0cc57-a17d-4f91-887f-fe819b32f6b3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/responsive/" + google-query: inurl:"/wp-content/themes/responsive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,responsive,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/responsive/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "responsive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/restaurant-and-cafe-c69c081915e9f9d8dfc0bc8f1bf2863b.yaml b/nuclei-templates/cve-less/themes/restaurant-and-cafe-c69c081915e9f9d8dfc0bc8f1bf2863b.yaml new file mode 100644 index 0000000000..9e62bc5bf4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/restaurant-and-cafe-c69c081915e9f9d8dfc0bc8f1bf2863b.yaml @@ -0,0 +1,58 @@ +id: restaurant-and-cafe-c69c081915e9f9d8dfc0bc8f1bf2863b + +info: + name: > + Restaurant and Cafe <= 1.2.1 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f4424be-d63d-431d-a237-2bff6c4a647a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/restaurant-and-cafe/" + google-query: inurl:"/wp-content/themes/restaurant-and-cafe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,restaurant-and-cafe,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/restaurant-and-cafe/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restaurant-and-cafe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/restricted-site-access-da96835466676ae365fbd594b9bba421.yaml b/nuclei-templates/cve-less/themes/restricted-site-access-da96835466676ae365fbd594b9bba421.yaml new file mode 100644 index 0000000000..2563922762 --- /dev/null +++ b/nuclei-templates/cve-less/themes/restricted-site-access-da96835466676ae365fbd594b9bba421.yaml @@ -0,0 +1,58 @@ +id: restricted-site-access-da96835466676ae365fbd594b9bba421 + +info: + name: > + Restricted Site Access <= 7.4.1 - IP Spoofing to Protection Mechanism Bypass + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/804169d3-a53a-42ba-821d-e9647ac075c4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/restricted-site-access/" + google-query: inurl:"/wp-content/themes/restricted-site-access/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,restricted-site-access,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/restricted-site-access/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "restricted-site-access" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/revolve-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/revolve-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..5faec86c36 --- /dev/null +++ b/nuclei-templates/cve-less/themes/revolve-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: revolve-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/revolve/" + google-query: inurl:"/wp-content/themes/revolve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,revolve,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/revolve/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revolve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/revolve-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/revolve-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..a348ef1a2b --- /dev/null +++ b/nuclei-templates/cve-less/themes/revolve-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: revolve-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/revolve/" + google-query: inurl:"/wp-content/themes/revolve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,revolve,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/revolve/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revolve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/revolve-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/revolve-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..3b348b7426 --- /dev/null +++ b/nuclei-templates/cve-less/themes/revolve-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: revolve-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/revolve/" + google-query: inurl:"/wp-content/themes/revolve/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,revolve,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/revolve/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "revolve" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rightnow-21873517e62f6eb7a1f45af969de223e.yaml b/nuclei-templates/cve-less/themes/rightnow-21873517e62f6eb7a1f45af969de223e.yaml new file mode 100644 index 0000000000..3708d1a602 --- /dev/null +++ b/nuclei-templates/cve-less/themes/rightnow-21873517e62f6eb7a1f45af969de223e.yaml @@ -0,0 +1,58 @@ +id: rightnow-21873517e62f6eb7a1f45af969de223e + +info: + name: > + Right Now (Unknown Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/407b8568-0b47-48d1-a006-2c42e7cfdec3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rightnow/" + google-query: inurl:"/wp-content/themes/rightnow/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rightnow,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rightnow/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rightnow" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ripple-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/ripple-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..b1a2ae7aa5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ripple-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: ripple-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ripple/" + google-query: inurl:"/wp-content/themes/ripple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ripple,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ripple/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ripple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ripple-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/ripple-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..64eaac84d3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ripple-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: ripple-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ripple/" + google-query: inurl:"/wp-content/themes/ripple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ripple,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ripple/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ripple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ripple-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/ripple-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..05a5baaf94 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ripple-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: ripple-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ripple/" + google-query: inurl:"/wp-content/themes/ripple/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ripple,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ripple/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ripple" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rise-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/rise-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..31b83c5197 --- /dev/null +++ b/nuclei-templates/cve-less/themes/rise-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: rise-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rise/" + google-query: inurl:"/wp-content/themes/rise/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rise,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rise/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rise" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rise-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/rise-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..790cfa2d7b --- /dev/null +++ b/nuclei-templates/cve-less/themes/rise-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: rise-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rise/" + google-query: inurl:"/wp-content/themes/rise/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rise,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rise/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rise" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/robolist-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/robolist-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..59af28b2b3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/robolist-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: robolist-lite-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/robolist-lite/" + google-query: inurl:"/wp-content/themes/robolist-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,robolist-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/robolist-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "robolist-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rockstar-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml b/nuclei-templates/cve-less/themes/rockstar-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml new file mode 100644 index 0000000000..b5de666ae8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/rockstar-theme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml @@ -0,0 +1,58 @@ +id: rockstar-theme-d488c88c43dea5d67f8bd9aa864ebfd0 + +info: + name: > + Various Orange themes (Various Unspecified Versions) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6897a8fe-c32e-430a-847c-23d1add2355d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rockstar-theme/" + google-query: inurl:"/wp-content/themes/rockstar-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rockstar-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rockstar-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rockstar-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rockwell-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/rockwell-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..1da3f66387 --- /dev/null +++ b/nuclei-templates/cve-less/themes/rockwell-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: rockwell-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rockwell/" + google-query: inurl:"/wp-content/themes/rockwell/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rockwell,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rockwell/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rockwell" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/royal-elementor-kit-a2114fc45474e481aea36dcc9b5f1c4d.yaml b/nuclei-templates/cve-less/themes/royal-elementor-kit-a2114fc45474e481aea36dcc9b5f1c4d.yaml new file mode 100644 index 0000000000..f6d6442745 --- /dev/null +++ b/nuclei-templates/cve-less/themes/royal-elementor-kit-a2114fc45474e481aea36dcc9b5f1c4d.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-kit-a2114fc45474e481aea36dcc9b5f1c4d + +info: + name: > + Royal Elementor Kit <= 1.0.116 - Missing Authorization to Arbitrary Transient Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/603b6c52-48eb-4e8c-a2c1-77b12a2b1a2c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/royal-elementor-kit/" + google-query: inurl:"/wp-content/themes/royal-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,royal-elementor-kit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/royal-elementor-kit/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.116') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/royal-elementor-kit-c3f19b4938e0be4a55a8b5f19fc9f5b1.yaml b/nuclei-templates/cve-less/themes/royal-elementor-kit-c3f19b4938e0be4a55a8b5f19fc9f5b1.yaml new file mode 100644 index 0000000000..4f5e778a17 --- /dev/null +++ b/nuclei-templates/cve-less/themes/royal-elementor-kit-c3f19b4938e0be4a55a8b5f19fc9f5b1.yaml @@ -0,0 +1,58 @@ +id: royal-elementor-kit-c3f19b4938e0be4a55a8b5f19fc9f5b1 + +info: + name: > + Royal Elementor Kit <= 1.0.116 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90863334-9464-466b-bb32-870c78095ca4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/royal-elementor-kit/" + google-query: inurl:"/wp-content/themes/royal-elementor-kit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,royal-elementor-kit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/royal-elementor-kit/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "royal-elementor-kit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.116') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/rt_refraction_wp-57d8566b3666f1822ca82f2082d046bb.yaml b/nuclei-templates/cve-less/themes/rt_refraction_wp-57d8566b3666f1822ca82f2082d046bb.yaml new file mode 100644 index 0000000000..37464abb5a --- /dev/null +++ b/nuclei-templates/cve-less/themes/rt_refraction_wp-57d8566b3666f1822ca82f2082d046bb.yaml @@ -0,0 +1,58 @@ +id: rt_refraction_wp-57d8566b3666f1822ca82f2082d046bb + +info: + name: > + Refraction <= 1.3 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7887e0a6-53bf-49c7-a7a6-7c65cec28cae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/rt_refraction_wp/" + google-query: inurl:"/wp-content/themes/rt_refraction_wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,rt_refraction_wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/rt_refraction_wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "rt_refraction_wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sahifa-3d0307222924b1a61871ddfb3612e17b.yaml b/nuclei-templates/cve-less/themes/sahifa-3d0307222924b1a61871ddfb3612e17b.yaml new file mode 100644 index 0000000000..dfc428e87e --- /dev/null +++ b/nuclei-templates/cve-less/themes/sahifa-3d0307222924b1a61871ddfb3612e17b.yaml @@ -0,0 +1,58 @@ +id: sahifa-3d0307222924b1a61871ddfb3612e17b + +info: + name: > + Sahifa <= 2.4.0 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f125a9d4-7399-47ae-9b5d-4cfe12c4c177?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sahifa/" + google-query: inurl:"/wp-content/themes/sahifa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sahifa,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sahifa/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sahifa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sahifa-8f0fce172385265946ed4e8ec3bfed88.yaml b/nuclei-templates/cve-less/themes/sahifa-8f0fce172385265946ed4e8ec3bfed88.yaml new file mode 100644 index 0000000000..99389ac8f0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sahifa-8f0fce172385265946ed4e8ec3bfed88.yaml @@ -0,0 +1,58 @@ +id: sahifa-8f0fce172385265946ed4e8ec3bfed88 + +info: + name: > + Sahifa <= 2.4.0 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9382d94c-3767-4d05-ada7-2857713b9e3a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sahifa/" + google-query: inurl:"/wp-content/themes/sahifa/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sahifa,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sahifa/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sahifa" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/saico-81e1d981b3021dcdf8ad1a9df6d9d51d.yaml b/nuclei-templates/cve-less/themes/saico-81e1d981b3021dcdf8ad1a9df6d9d51d.yaml new file mode 100644 index 0000000000..e3cf78d830 --- /dev/null +++ b/nuclei-templates/cve-less/themes/saico-81e1d981b3021dcdf8ad1a9df6d9d51d.yaml @@ -0,0 +1,58 @@ +id: saico-81e1d981b3021dcdf8ad1a9df6d9d51d + +info: + name: > + SAICO <= 1.0.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/056d26da-6e43-4cc6-b2fd-13a5947a814e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/saico/" + google-query: inurl:"/wp-content/themes/saico/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,saico,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/saico/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "saico" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sakala-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/sakala-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..1486cdc9ba --- /dev/null +++ b/nuclei-templates/cve-less/themes/sakala-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: sakala-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sakala/" + google-query: inurl:"/wp-content/themes/sakala/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sakala,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sakala/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sakala" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sakala-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/sakala-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..1ff2a5c5f1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sakala-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: sakala-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sakala/" + google-query: inurl:"/wp-content/themes/sakala/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sakala,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sakala/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sakala" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sakala-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/sakala-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..3b7ae2e214 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sakala-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: sakala-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sakala/" + google-query: inurl:"/wp-content/themes/sakala/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sakala,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sakala/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sakala" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/salem-25d9dfe9dcb2d90be01a548affeb688f.yaml b/nuclei-templates/cve-less/themes/salem-25d9dfe9dcb2d90be01a548affeb688f.yaml new file mode 100644 index 0000000000..e4073547b1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/salem-25d9dfe9dcb2d90be01a548affeb688f.yaml @@ -0,0 +1,58 @@ +id: salem-25d9dfe9dcb2d90be01a548affeb688f + +info: + name: > + Salem Theme <= 1.5.5 - DOM-based Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c6b95cc2-c40b-40db-abd2-d66978cf55d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/salem/" + google-query: inurl:"/wp-content/themes/salem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,salem,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/salem/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/salient-29b864084c574899fcc996f9b322577a.yaml b/nuclei-templates/cve-less/themes/salient-29b864084c574899fcc996f9b322577a.yaml new file mode 100644 index 0000000000..fabaabaf8b --- /dev/null +++ b/nuclei-templates/cve-less/themes/salient-29b864084c574899fcc996f9b322577a.yaml @@ -0,0 +1,58 @@ +id: salient-29b864084c574899fcc996f9b322577a + +info: + name: > + Salient < 5.5.53 - DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39a74c20-42a2-4099-8e6c-9989a3ba081d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/salient/" + google-query: inurl:"/wp-content/themes/salient/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,salient,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/salient/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salient" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/salutation-wp-26ee088c8368fd2a8bcecfc18ae8bb11.yaml b/nuclei-templates/cve-less/themes/salutation-wp-26ee088c8368fd2a8bcecfc18ae8bb11.yaml new file mode 100644 index 0000000000..ee35755152 --- /dev/null +++ b/nuclei-templates/cve-less/themes/salutation-wp-26ee088c8368fd2a8bcecfc18ae8bb11.yaml @@ -0,0 +1,58 @@ +id: salutation-wp-26ee088c8368fd2a8bcecfc18ae8bb11 + +info: + name: > + Salutation < 3.0.16 - Authenticated Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/895e9ead-14d8-432b-81dd-4d292eee462a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/salutation-wp/" + google-query: inurl:"/wp-content/themes/salutation-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,salutation-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/salutation-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "salutation-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.16') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sandbox-519977ede43c175cac49c012c33ae5bd.yaml b/nuclei-templates/cve-less/themes/sandbox-519977ede43c175cac49c012c33ae5bd.yaml new file mode 100644 index 0000000000..7d60d81ef3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sandbox-519977ede43c175cac49c012c33ae5bd.yaml @@ -0,0 +1,58 @@ +id: sandbox-519977ede43c175cac49c012c33ae5bd + +info: + name: > + Sandbox <= 1.6.1 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3160602-6522-478d-8a99-d097472d10ac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sandbox/" + google-query: inurl:"/wp-content/themes/sandbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sandbox,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sandbox/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sandbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sandbox-989254b568354826202f288242e58427.yaml b/nuclei-templates/cve-less/themes/sandbox-989254b568354826202f288242e58427.yaml new file mode 100644 index 0000000000..8e86bb39b1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sandbox-989254b568354826202f288242e58427.yaml @@ -0,0 +1,58 @@ +id: sandbox-989254b568354826202f288242e58427 + +info: + name: > + Sandbox <= 1.6.1 - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad12941f-8cbf-41c6-a261-b47075198d26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sandbox/" + google-query: inurl:"/wp-content/themes/sandbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sandbox,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sandbox/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sandbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sarada-lite-4dd17e99df33e7a68f2a978cf00a71e1.yaml b/nuclei-templates/cve-less/themes/sarada-lite-4dd17e99df33e7a68f2a978cf00a71e1.yaml new file mode 100644 index 0000000000..2250b30ba8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sarada-lite-4dd17e99df33e7a68f2a978cf00a71e1.yaml @@ -0,0 +1,58 @@ +id: sarada-lite-4dd17e99df33e7a68f2a978cf00a71e1 + +info: + name: > + Sarada Lite <= 1.1.2 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aff013d9-9e0d-42e8-a351-f1278060e649?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sarada-lite/" + google-query: inurl:"/wp-content/themes/sarada-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sarada-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sarada-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sarada-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/satoshi-2cd7c65813d463e1581c58ac5badd893.yaml b/nuclei-templates/cve-less/themes/satoshi-2cd7c65813d463e1581c58ac5badd893.yaml new file mode 100644 index 0000000000..cf1dea800c --- /dev/null +++ b/nuclei-templates/cve-less/themes/satoshi-2cd7c65813d463e1581c58ac5badd893.yaml @@ -0,0 +1,58 @@ +id: satoshi-2cd7c65813d463e1581c58ac5badd893 + +info: + name: > + Satoshi <= 2.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/560b175b-ce2a-4161-aa6b-cd11d1377314?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/satoshi/" + google-query: inurl:"/wp-content/themes/satoshi/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,satoshi,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/satoshi/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "satoshi" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/scarlet-828e17b05d92c010fb7f9a4a0922569b.yaml b/nuclei-templates/cve-less/themes/scarlet-828e17b05d92c010fb7f9a4a0922569b.yaml new file mode 100644 index 0000000000..a3652effcd --- /dev/null +++ b/nuclei-templates/cve-less/themes/scarlet-828e17b05d92c010fb7f9a4a0922569b.yaml @@ -0,0 +1,58 @@ +id: scarlet-828e17b05d92c010fb7f9a4a0922569b + +info: + name: > + Scarlet (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f6d24786-676b-478a-ad9a-5c3f5ca3e85b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/scarlet/" + google-query: inurl:"/wp-content/themes/scarlet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,scarlet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/scarlet/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scarlet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/scoreme-88013bc8aa189f38a19a59f4e02b7e1e.yaml b/nuclei-templates/cve-less/themes/scoreme-88013bc8aa189f38a19a59f4e02b7e1e.yaml new file mode 100644 index 0000000000..573c3c208b --- /dev/null +++ b/nuclei-templates/cve-less/themes/scoreme-88013bc8aa189f38a19a59f4e02b7e1e.yaml @@ -0,0 +1,58 @@ +id: scoreme-88013bc8aa189f38a19a59f4e02b7e1e + +info: + name: > + ScoreMe <= 2016-04-01 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fd671562-adc8-40b0-af26-9daef70effa6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/scoreme/" + google-query: inurl:"/wp-content/themes/scoreme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,scoreme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/scoreme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scoreme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2016-04-01') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/scrollme-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/scrollme-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..9d240fc555 --- /dev/null +++ b/nuclei-templates/cve-less/themes/scrollme-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: scrollme-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/scrollme/" + google-query: inurl:"/wp-content/themes/scrollme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,scrollme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/scrollme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scrollme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/scrollme-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/scrollme-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..d6854de2ac --- /dev/null +++ b/nuclei-templates/cve-less/themes/scrollme-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: scrollme-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/scrollme/" + google-query: inurl:"/wp-content/themes/scrollme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,scrollme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/scrollme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scrollme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/scrollme-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/scrollme-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..79a5c77676 --- /dev/null +++ b/nuclei-templates/cve-less/themes/scrollme-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: scrollme-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/scrollme/" + google-query: inurl:"/wp-content/themes/scrollme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,scrollme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/scrollme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "scrollme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/scv1-b773af1a6c770b410098cbaaaa01e41c.yaml b/nuclei-templates/cve-less/themes/scv1-b773af1a6c770b410098cbaaaa01e41c.yaml new file mode 100644 index 0000000000..74e48a1af9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/scv1-b773af1a6c770b410098cbaaaa01e41c.yaml @@ -0,0 +1,58 @@ +id: scv1-b773af1a6c770b410098cbaaaa01e41c + +info: + name: > + SCv1 Theme (All Known Versions) - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d7dc61-1e28-426b-a9da-3a36134e7821?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/SCv1/" + google-query: inurl:"/wp-content/themes/SCv1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,SCv1,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/SCv1/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "SCv1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/selio-46177c2639c7b5ae832248baa4073a3a.yaml b/nuclei-templates/cve-less/themes/selio-46177c2639c7b5ae832248baa4073a3a.yaml new file mode 100644 index 0000000000..806e3d319d --- /dev/null +++ b/nuclei-templates/cve-less/themes/selio-46177c2639c7b5ae832248baa4073a3a.yaml @@ -0,0 +1,58 @@ +id: selio-46177c2639c7b5ae832248baa4073a3a + +info: + name: > + Selio - Real Estate Directory <= 1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0451a7b8-7657-4b73-9ef1-cc3791349e59?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/selio/" + google-query: inurl:"/wp-content/themes/selio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,selio,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/selio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "selio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/selio-fbaa72caee7c30faff8212706be987c1.yaml b/nuclei-templates/cve-less/themes/selio-fbaa72caee7c30faff8212706be987c1.yaml new file mode 100644 index 0000000000..2e2fd28068 --- /dev/null +++ b/nuclei-templates/cve-less/themes/selio-fbaa72caee7c30faff8212706be987c1.yaml @@ -0,0 +1,58 @@ +id: selio-fbaa72caee7c30faff8212706be987c1 + +info: + name: > + Selio - Real Estate Directory <= 1.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d20eb50-3b54-475f-8a67-8ca61c0474cc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/selio/" + google-query: inurl:"/wp-content/themes/selio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,selio,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/selio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "selio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sensible-wp-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/sensible-wp-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..919134b420 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sensible-wp-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: sensible-wp-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sensible-wp/" + google-query: inurl:"/wp-content/themes/sensible-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sensible-wp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sensible-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sensible-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sentient-41077f62819cf65dd71bfb4c6e199325.yaml b/nuclei-templates/cve-less/themes/sentient-41077f62819cf65dd71bfb4c6e199325.yaml new file mode 100644 index 0000000000..c6d3da4efe --- /dev/null +++ b/nuclei-templates/cve-less/themes/sentient-41077f62819cf65dd71bfb4c6e199325.yaml @@ -0,0 +1,58 @@ +id: sentient-41077f62819cf65dd71bfb4c6e199325 + +info: + name: > + WooThemes WooFramework < 5.3.10 - Remote Code Execution via Shortcodes + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0728e7ac-2091-41de-90a0-e231c4b99ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sentient/" + google-query: inurl:"/wp-content/themes/sentient/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sentient,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sentient/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sentient" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sf-booking-40130dd58c838247ce08e93680f217da.yaml b/nuclei-templates/cve-less/themes/sf-booking-40130dd58c838247ce08e93680f217da.yaml new file mode 100644 index 0000000000..1bc6ef54a2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sf-booking-40130dd58c838247ce08e93680f217da.yaml @@ -0,0 +1,58 @@ +id: sf-booking-40130dd58c838247ce08e93680f217da + +info: + name: > + Service Finder - Provider and Business Listing Theme < 3.2 - Path Traversal + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cdac6080-5e23-488d-8b3c-de0c6c92e344?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sf-booking/" + google-query: inurl:"/wp-content/themes/sf-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sf-booking,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sf-booking/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sf-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/shapeless-6490c018ab51d9b822f80c44c2a4f77f.yaml b/nuclei-templates/cve-less/themes/shapeless-6490c018ab51d9b822f80c44c2a4f77f.yaml new file mode 100644 index 0000000000..b51e4b5cca --- /dev/null +++ b/nuclei-templates/cve-less/themes/shapeless-6490c018ab51d9b822f80c44c2a4f77f.yaml @@ -0,0 +1,58 @@ +id: shapeless-6490c018ab51d9b822f80c44c2a4f77f + +info: + name: > + Shapeless <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a15ee50d-ee64-49b4-bbd2-2d0f3683a4c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/shapeless/" + google-query: inurl:"/wp-content/themes/shapeless/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,shapeless,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/shapeless/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shapeless" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/shapely-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/shapely-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..eec8901b63 --- /dev/null +++ b/nuclei-templates/cve-less/themes/shapely-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: shapely-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/shapely/" + google-query: inurl:"/wp-content/themes/shapely/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,shapely,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/shapely/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shapely" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/shopbiz-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/shopbiz-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..311e75e489 --- /dev/null +++ b/nuclei-templates/cve-less/themes/shopbiz-lite-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: shopbiz-lite-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/shopbiz-lite/" + google-query: inurl:"/wp-content/themes/shopbiz-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,shopbiz-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/shopbiz-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shopbiz-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/shoppette-c5cd64fdc88a18d66954d78adc22f76d.yaml b/nuclei-templates/cve-less/themes/shoppette-c5cd64fdc88a18d66954d78adc22f76d.yaml new file mode 100644 index 0000000000..9f682c9b4e --- /dev/null +++ b/nuclei-templates/cve-less/themes/shoppette-c5cd64fdc88a18d66954d78adc22f76d.yaml @@ -0,0 +1,58 @@ +id: shoppette-c5cd64fdc88a18d66954d78adc22f76d + +info: + name: > + Easy Digital Downloads – Shoppette Theme < 1.0.5 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dcfe3035-db43-499f-b09f-be528725b1d8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/shoppette/" + google-query: inurl:"/wp-content/themes/shoppette/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,shoppette,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/shoppette/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shoppette" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/shopstar-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/shopstar-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..d723f9b3c4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/shopstar-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: shopstar-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/shopstar/" + google-query: inurl:"/wp-content/themes/shopstar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,shopstar,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/shopstar/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shopstar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.34') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/short-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/short-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..7920b6bb46 --- /dev/null +++ b/nuclei-templates/cve-less/themes/short-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: short-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/short/" + google-query: inurl:"/wp-content/themes/short/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,short,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/short/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "short" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/shoutbox-0dec1530fa29f0f3dd02117fbaf12b9a.yaml b/nuclei-templates/cve-less/themes/shoutbox-0dec1530fa29f0f3dd02117fbaf12b9a.yaml new file mode 100644 index 0000000000..e6ad5adebc --- /dev/null +++ b/nuclei-templates/cve-less/themes/shoutbox-0dec1530fa29f0f3dd02117fbaf12b9a.yaml @@ -0,0 +1,58 @@ +id: shoutbox-0dec1530fa29f0f3dd02117fbaf12b9a + +info: + name: > + Shoutbox (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fbda7303-2393-438a-9305-5642975f0419?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/shoutbox/" + google-query: inurl:"/wp-content/themes/shoutbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,shoutbox,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/shoutbox/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shoutbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/shuban-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/shuban-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..42ae3b53a3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/shuban-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: shuban-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/shuban/" + google-query: inurl:"/wp-content/themes/shuban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,shuban,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/shuban/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shuban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/shuban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/themes/shuban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..42eff6506e --- /dev/null +++ b/nuclei-templates/cve-less/themes/shuban-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: shuban-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/shuban/" + google-query: inurl:"/wp-content/themes/shuban/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,shuban,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/shuban/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shuban" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/silverorchid-f668ff84aa12e9412717100f16882a82.yaml b/nuclei-templates/cve-less/themes/silverorchid-f668ff84aa12e9412717100f16882a82.yaml new file mode 100644 index 0000000000..e3d5ffd42f --- /dev/null +++ b/nuclei-templates/cve-less/themes/silverorchid-f668ff84aa12e9412717100f16882a82.yaml @@ -0,0 +1,58 @@ +id: silverorchid-f668ff84aa12e9412717100f16882a82 + +info: + name: > + silverOrchid <= 1.5.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ddc7488-4cc0-4e17-8c81-26cbcbe8bdae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/silverorchid/" + google-query: inurl:"/wp-content/themes/silverorchid/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,silverorchid,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/silverorchid/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "silverorchid" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/simplebalance-36a65684d72ca90db400bc9a48e4b1a7.yaml b/nuclei-templates/cve-less/themes/simplebalance-36a65684d72ca90db400bc9a48e4b1a7.yaml new file mode 100644 index 0000000000..2cdd116b7f --- /dev/null +++ b/nuclei-templates/cve-less/themes/simplebalance-36a65684d72ca90db400bc9a48e4b1a7.yaml @@ -0,0 +1,58 @@ +id: simplebalance-36a65684d72ca90db400bc9a48e4b1a7 + +info: + name: > + Simple Balance <= 2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/711b2889-8d12-4f7c-88e7-d3bb79e9c800?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/simplebalance/" + google-query: inurl:"/wp-content/themes/simplebalance/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,simplebalance,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/simplebalance/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplebalance" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/simpledark-b20cdb3204e221d28ac3a3a0e91939e9.yaml b/nuclei-templates/cve-less/themes/simpledark-b20cdb3204e221d28ac3a3a0e91939e9.yaml new file mode 100644 index 0000000000..f257ce5e04 --- /dev/null +++ b/nuclei-templates/cve-less/themes/simpledark-b20cdb3204e221d28ac3a3a0e91939e9.yaml @@ -0,0 +1,58 @@ +id: simpledark-b20cdb3204e221d28ac3a3a0e91939e9 + +info: + name: > + SimpleDark <= 1.2.11 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1e4d03f0-408c-47da-bae9-38614603f02b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/simpledark/" + google-query: inurl:"/wp-content/themes/simpledark/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,simpledark,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/simpledark/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simpledark" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.11') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/simplo-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/simplo-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..a64a2829e2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/simplo-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: simplo-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/simplo/" + google-query: inurl:"/wp-content/themes/simplo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,simplo,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/simplo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simplo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/simpolio-464f844153534ce96044f5502d947b55.yaml b/nuclei-templates/cve-less/themes/simpolio-464f844153534ce96044f5502d947b55.yaml new file mode 100644 index 0000000000..6e9adeab20 --- /dev/null +++ b/nuclei-templates/cve-less/themes/simpolio-464f844153534ce96044f5502d947b55.yaml @@ -0,0 +1,58 @@ +id: simpolio-464f844153534ce96044f5502d947b55 + +info: + name: > + Simpolio - Fullscreen Portfolio & Blog HTML Theme <= 1.3.2 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/27b9ff55-f2b4-4713-a39d-6f57ee4c229b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/simpolio/" + google-query: inurl:"/wp-content/themes/simpolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,simpolio,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/simpolio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simpolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sirius-b962a43c022ee33e3f132497b433375e.yaml b/nuclei-templates/cve-less/themes/sirius-b962a43c022ee33e3f132497b433375e.yaml new file mode 100644 index 0000000000..65ba69c20c --- /dev/null +++ b/nuclei-templates/cve-less/themes/sirius-b962a43c022ee33e3f132497b433375e.yaml @@ -0,0 +1,58 @@ +id: sirius-b962a43c022ee33e3f132497b433375e + +info: + name: > + Sirius <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/28f08640-cd63-4f2a-a785-1956dc051991?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sirius/" + google-query: inurl:"/wp-content/themes/sirius/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sirius,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sirius/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirius" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sixtees-2cb73a83c44fa300cec02ee7b0e67068.yaml b/nuclei-templates/cve-less/themes/sixtees-2cb73a83c44fa300cec02ee7b0e67068.yaml new file mode 100644 index 0000000000..5cbd95d0f3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sixtees-2cb73a83c44fa300cec02ee7b0e67068.yaml @@ -0,0 +1,58 @@ +id: sixtees-2cb73a83c44fa300cec02ee7b0e67068 + +info: + name: > + Sixtees (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3a325371-e531-4cd9-bc39-d1b8f40a728f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sixtees/" + google-query: inurl:"/wp-content/themes/sixtees/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sixtees,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sixtees/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sixtees" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/slash-wp-db53188989f27ad0f003901fbcf178c9.yaml b/nuclei-templates/cve-less/themes/slash-wp-db53188989f27ad0f003901fbcf178c9.yaml new file mode 100644 index 0000000000..293e3d417a --- /dev/null +++ b/nuclei-templates/cve-less/themes/slash-wp-db53188989f27ad0f003901fbcf178c9.yaml @@ -0,0 +1,58 @@ +id: slash-wp-db53188989f27ad0f003901fbcf178c9 + +info: + name: > + Slash WP (All Versions) - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5432bdd1-9b56-4f74-a468-011f942bdd89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/slash-wp/" + google-query: inurl:"/wp-content/themes/slash-wp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,slash-wp,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/slash-wp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "slash-wp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sliding-door-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/sliding-door-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..4f7b0735fb --- /dev/null +++ b/nuclei-templates/cve-less/themes/sliding-door-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: sliding-door-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sliding-door/" + google-query: inurl:"/wp-content/themes/sliding-door/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sliding-door,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sliding-door/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sliding-door" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/smartit-dc6219f91f46d9292d66b44460a2668b.yaml b/nuclei-templates/cve-less/themes/smartit-dc6219f91f46d9292d66b44460a2668b.yaml new file mode 100644 index 0000000000..b0bc3ca737 --- /dev/null +++ b/nuclei-templates/cve-less/themes/smartit-dc6219f91f46d9292d66b44460a2668b.yaml @@ -0,0 +1,58 @@ +id: smartit-dc6219f91f46d9292d66b44460a2668b + +info: + name: > + SmartIT Premium Responsive (Unspecified Version) - Information Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76bb0578-d562-4612-b7aa-db49c43b2fe1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/smartit/" + google-query: inurl:"/wp-content/themes/smartit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,smartit,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/smartit/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smartit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/smartstart-9ef0d273482df03c9ba3dcd5e27ac8b5.yaml b/nuclei-templates/cve-less/themes/smartstart-9ef0d273482df03c9ba3dcd5e27ac8b5.yaml new file mode 100644 index 0000000000..f177b0da3d --- /dev/null +++ b/nuclei-templates/cve-less/themes/smartstart-9ef0d273482df03c9ba3dcd5e27ac8b5.yaml @@ -0,0 +1,58 @@ +id: smartstart-9ef0d273482df03c9ba3dcd5e27ac8b5 + +info: + name: > + Smart Start <= 1.0.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/76b0c41c-c825-4ac2-8a7f-4b1a54f21f0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/smartstart/" + google-query: inurl:"/wp-content/themes/smartstart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,smartstart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/smartstart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "smartstart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-1e964bc864ca0fa372e686235b23e1f1.yaml b/nuclei-templates/cve-less/themes/soledad-1e964bc864ca0fa372e686235b23e1f1.yaml new file mode 100644 index 0000000000..90a94c17c4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-1e964bc864ca0fa372e686235b23e1f1.yaml @@ -0,0 +1,58 @@ +id: soledad-1e964bc864ca0fa372e686235b23e1f1 + +info: + name: > + Soledad <= 8.4.1 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e954190-7c58-4044-a85e-a188fe5b6d89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-33c4d0a0f515bd1cedf9cdcf55231d10.yaml b/nuclei-templates/cve-less/themes/soledad-33c4d0a0f515bd1cedf9cdcf55231d10.yaml new file mode 100644 index 0000000000..74bce9cc57 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-33c4d0a0f515bd1cedf9cdcf55231d10.yaml @@ -0,0 +1,58 @@ +id: soledad-33c4d0a0f515bd1cedf9cdcf55231d10 + +info: + name: > + Soledad <= 8.2.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ee1ee4c4-871d-4a3d-8ca6-3675d248d5e8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-4f22cc4c7f59ad21868eda159380a421.yaml b/nuclei-templates/cve-less/themes/soledad-4f22cc4c7f59ad21868eda159380a421.yaml new file mode 100644 index 0000000000..56bc1641a9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-4f22cc4c7f59ad21868eda159380a421.yaml @@ -0,0 +1,58 @@ +id: soledad-4f22cc4c7f59ad21868eda159380a421 + +info: + name: > + Soledad <= 8.4.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30881bed-9a5c-4a7f-9065-f11a1b336892?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-6a8cda00f1080a3aa286a272f860fd12.yaml b/nuclei-templates/cve-less/themes/soledad-6a8cda00f1080a3aa286a272f860fd12.yaml new file mode 100644 index 0000000000..edc89273e3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-6a8cda00f1080a3aa286a272f860fd12.yaml @@ -0,0 +1,58 @@ +id: soledad-6a8cda00f1080a3aa286a272f860fd12 + +info: + name: > + Soledad <= 8.4.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3f6412bf-65ec-445f-a1fe-27aeb8330712?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-6b8df25137f38e4882527178954fd3e6.yaml b/nuclei-templates/cve-less/themes/soledad-6b8df25137f38e4882527178954fd3e6.yaml new file mode 100644 index 0000000000..ae87f655dd --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-6b8df25137f38e4882527178954fd3e6.yaml @@ -0,0 +1,58 @@ +id: soledad-6b8df25137f38e4882527178954fd3e6 + +info: + name: > + Soledad <= 8.4.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f83b36fe-4e46-4ab7-a113-6dcfa7cce625?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-7cd3fabdb13125f30851d3aa6b007d33.yaml b/nuclei-templates/cve-less/themes/soledad-7cd3fabdb13125f30851d3aa6b007d33.yaml new file mode 100644 index 0000000000..e54f9205c3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-7cd3fabdb13125f30851d3aa6b007d33.yaml @@ -0,0 +1,58 @@ +id: soledad-7cd3fabdb13125f30851d3aa6b007d33 + +info: + name: > + Soledad <= 8.4.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9454765-f70b-4d8d-a5cc-28bc34375216?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-bca67036ec26c26cd0007b6d8426083e.yaml b/nuclei-templates/cve-less/themes/soledad-bca67036ec26c26cd0007b6d8426083e.yaml new file mode 100644 index 0000000000..d7f76b32e8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-bca67036ec26c26cd0007b6d8426083e.yaml @@ -0,0 +1,58 @@ +id: soledad-bca67036ec26c26cd0007b6d8426083e + +info: + name: > + Soledad <= 8.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1fd566e5-90f5-4f67-8998-85cabea33e93?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-c15a76ab76b6bacb9d3a014790c1e98c.yaml b/nuclei-templates/cve-less/themes/soledad-c15a76ab76b6bacb9d3a014790c1e98c.yaml new file mode 100644 index 0000000000..a0292cbe36 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-c15a76ab76b6bacb9d3a014790c1e98c.yaml @@ -0,0 +1,58 @@ +id: soledad-c15a76ab76b6bacb9d3a014790c1e98c + +info: + name: > + Soledad <= 8.2.5 - Authenticated (Subscriber+) Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4113a88f-5203-4fe6-9fb4-c59a63174418?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.2.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soledad-f1943d1009d5a9a5f1799b0883b7d043.yaml b/nuclei-templates/cve-less/themes/soledad-f1943d1009d5a9a5f1799b0883b7d043.yaml new file mode 100644 index 0000000000..700715f6a1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soledad-f1943d1009d5a9a5f1799b0883b7d043.yaml @@ -0,0 +1,58 @@ +id: soledad-f1943d1009d5a9a5f1799b0883b7d043 + +info: + name: > + Soledad <= 8.4.1 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7a9846c4-4678-4c25-84fd-b05d21ea34fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soledad/" + google-query: inurl:"/wp-content/themes/soledad/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soledad,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soledad/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soledad" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 8.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/soundblast-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/soundblast-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..06f78a0118 --- /dev/null +++ b/nuclei-templates/cve-less/themes/soundblast-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: soundblast-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/soundblast/" + google-query: inurl:"/wp-content/themes/soundblast/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,soundblast,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/soundblast/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "soundblast" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/source-03c4d8dd500314f942cf4bffdc3e3289.yaml b/nuclei-templates/cve-less/themes/source-03c4d8dd500314f942cf4bffdc3e3289.yaml new file mode 100644 index 0000000000..7a2f29b199 --- /dev/null +++ b/nuclei-templates/cve-less/themes/source-03c4d8dd500314f942cf4bffdc3e3289.yaml @@ -0,0 +1,58 @@ +id: source-03c4d8dd500314f942cf4bffdc3e3289 + +info: + name: > + Source (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a7ae4294-3f20-4f97-ae74-858121280c01?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/source/" + google-query: inurl:"/wp-content/themes/source/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,source,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/source/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "source" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spa-and-salon-8605169c0986bc4adffdd4b6cd4bbc09.yaml b/nuclei-templates/cve-less/themes/spa-and-salon-8605169c0986bc4adffdd4b6cd4bbc09.yaml new file mode 100644 index 0000000000..0fef609c15 --- /dev/null +++ b/nuclei-templates/cve-less/themes/spa-and-salon-8605169c0986bc4adffdd4b6cd4bbc09.yaml @@ -0,0 +1,58 @@ +id: spa-and-salon-8605169c0986bc4adffdd4b6cd4bbc09 + +info: + name: > + Spa and Salon <= 1.2.7 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4c6e6335-7f18-425a-bb86-7e4fc09dae86?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spa-and-salon/" + google-query: inurl:"/wp-content/themes/spa-and-salon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spa-and-salon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spa-and-salon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spa-and-salon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sparklestore-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/sparklestore-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..44a7745371 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sparklestore-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: sparklestore-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sparklestore/" + google-query: inurl:"/wp-content/themes/sparklestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sparklestore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sparklestore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sparklestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sparklestore-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/sparklestore-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..62a82ba459 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sparklestore-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: sparklestore-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sparklestore/" + google-query: inurl:"/wp-content/themes/sparklestore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sparklestore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sparklestore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sparklestore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.5.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sparkling-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/sparkling-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..c2b4259416 --- /dev/null +++ b/nuclei-templates/cve-less/themes/sparkling-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: sparkling-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sparkling/" + google-query: inurl:"/wp-content/themes/sparkling/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sparkling,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sparkling/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sparkling" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/sparky-186cdb2704350d8646ad5a58aed89581.yaml b/nuclei-templates/cve-less/themes/sparky-186cdb2704350d8646ad5a58aed89581.yaml new file mode 100644 index 0000000000..638812987a --- /dev/null +++ b/nuclei-templates/cve-less/themes/sparky-186cdb2704350d8646ad5a58aed89581.yaml @@ -0,0 +1,58 @@ +id: sparky-186cdb2704350d8646ad5a58aed89581 + +info: + name: > + Sparky <= 1.0 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d50eda3-20d8-436b-968c-9d8eeccaa0c9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/sparky/" + google-query: inurl:"/wp-content/themes/sparky/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,sparky,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/sparky/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sparky" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spasalon-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/spasalon-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..6a36087985 --- /dev/null +++ b/nuclei-templates/cve-less/themes/spasalon-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: spasalon-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spasalon/" + google-query: inurl:"/wp-content/themes/spasalon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spasalon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spasalon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spasalon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spawp-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/spawp-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..2e1134b571 --- /dev/null +++ b/nuclei-templates/cve-less/themes/spawp-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: spawp-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spawp/" + google-query: inurl:"/wp-content/themes/spawp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spawp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spawp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spawp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/specialist-48124923f45f6ff808c33e2b8fa204cd.yaml b/nuclei-templates/cve-less/themes/specialist-48124923f45f6ff808c33e2b8fa204cd.yaml new file mode 100644 index 0000000000..beae01a4f4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/specialist-48124923f45f6ff808c33e2b8fa204cd.yaml @@ -0,0 +1,58 @@ +id: specialist-48124923f45f6ff808c33e2b8fa204cd + +info: + name: > + Specialist (Unspecified Version) - Cross-Site Request Forgery to Arbitrary File Upload + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ea2d4716-2ae1-45ca-a4b2-4edb4a89d7b4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/specialist/" + google-query: inurl:"/wp-content/themes/specialist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,specialist,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/specialist/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "specialist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/speculor-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/speculor-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..71d5f24be5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/speculor-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: speculor-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/speculor/" + google-query: inurl:"/wp-content/themes/speculor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,speculor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/speculor/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speculor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/speculor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml b/nuclei-templates/cve-less/themes/speculor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml new file mode 100644 index 0000000000..afdc09c154 --- /dev/null +++ b/nuclei-templates/cve-less/themes/speculor-d0a68a8e11c5e55c1e2136e50d6015ad.yaml @@ -0,0 +1,58 @@ +id: speculor-d0a68a8e11c5e55c1e2136e50d6015ad + +info: + name: > + Freemius SDK <= 2.2.3 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3fda31fa-efc9-44b9-99ba-9e3e23aa2ee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/speculor/" + google-query: inurl:"/wp-content/themes/speculor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,speculor,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/speculor/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "speculor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spice-software-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/spice-software-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..fa610d3066 --- /dev/null +++ b/nuclei-templates/cve-less/themes/spice-software-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: spice-software-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spice-software/" + google-query: inurl:"/wp-content/themes/spice-software/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spice-software,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spice-software/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spice-software" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spidermag-4afe438c3219ba223c08f05567ce5890.yaml b/nuclei-templates/cve-less/themes/spidermag-4afe438c3219ba223c08f05567ce5890.yaml new file mode 100644 index 0000000000..47a4be338f --- /dev/null +++ b/nuclei-templates/cve-less/themes/spidermag-4afe438c3219ba223c08f05567ce5890.yaml @@ -0,0 +1,58 @@ +id: spidermag-4afe438c3219ba223c08f05567ce5890 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c37bfdeb-2d0c-4ace-94cc-b85c16985994?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spidermag/" + google-query: inurl:"/wp-content/themes/spidermag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spidermag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spidermag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spidermag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spidermag-57ce58b6230c68936a87b493b14f2285.yaml b/nuclei-templates/cve-less/themes/spidermag-57ce58b6230c68936a87b493b14f2285.yaml new file mode 100644 index 0000000000..c1ddf1c3ea --- /dev/null +++ b/nuclei-templates/cve-less/themes/spidermag-57ce58b6230c68936a87b493b14f2285.yaml @@ -0,0 +1,58 @@ +id: spidermag-57ce58b6230c68936a87b493b14f2285 + +info: + name: > + Multiple sparklewpthemes Themes (Various versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/62e30cef-ce5d-4450-989e-f08f09b7638f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spidermag/" + google-query: inurl:"/wp-content/themes/spidermag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spidermag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spidermag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spidermag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spikes-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/spikes-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..6121c594d8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/spikes-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: spikes-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spikes/" + google-query: inurl:"/wp-content/themes/spikes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spikes,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spikes/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spikes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spikes-black-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/spikes-black-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..ef2fd8c08e --- /dev/null +++ b/nuclei-templates/cve-less/themes/spikes-black-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: spikes-black-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spikes-black/" + google-query: inurl:"/wp-content/themes/spikes-black/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spikes-black,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spikes-black/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spikes-black" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/spiko-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/spiko-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..a8c85e3d60 --- /dev/null +++ b/nuclei-templates/cve-less/themes/spiko-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: spiko-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/spiko/" + google-query: inurl:"/wp-content/themes/spiko/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,spiko,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/spiko/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "spiko" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/square-3715092a367ddcdb9354396fe5cef26a.yaml b/nuclei-templates/cve-less/themes/square-3715092a367ddcdb9354396fe5cef26a.yaml new file mode 100644 index 0000000000..a619f996c7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/square-3715092a367ddcdb9354396fe5cef26a.yaml @@ -0,0 +1,58 @@ +id: square-3715092a367ddcdb9354396fe5cef26a + +info: + name: > + Square <= 2.0.0 - Missing Authorization via activate_plugin + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3ca4c3c-2b20-42d4-8dcf-77f4d52c25a3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/square/" + google-query: inurl:"/wp-content/themes/square/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,square,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/square/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "square" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/squared-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/squared-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..8b9d4a47b2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/squared-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: squared-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/squared/" + google-query: inurl:"/wp-content/themes/squared/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,squared,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/squared/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squared" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/squared-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/squared-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..f6a95ce28c --- /dev/null +++ b/nuclei-templates/cve-less/themes/squared-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: squared-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/squared/" + google-query: inurl:"/wp-content/themes/squared/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,squared,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/squared/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squared" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/squaretype-301d4c247a680f6ce86b39ab492df068.yaml b/nuclei-templates/cve-less/themes/squaretype-301d4c247a680f6ce86b39ab492df068.yaml new file mode 100644 index 0000000000..64d6bf82c6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/squaretype-301d4c247a680f6ce86b39ab492df068.yaml @@ -0,0 +1,58 @@ +id: squaretype-301d4c247a680f6ce86b39ab492df068 + +info: + name: > + Squaretype - Modern Blog WordPress Theme < 3.0.4 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b94202ef-75d6-4b6f-96b5-f9760cc0a628?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/squaretype/" + google-query: inurl:"/wp-content/themes/squaretype/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,squaretype,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/squaretype/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "squaretype" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/startkit-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/startkit-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..8a7cf7f363 --- /dev/null +++ b/nuclei-templates/cve-less/themes/startkit-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: startkit-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/startkit/" + google-query: inurl:"/wp-content/themes/startkit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,startkit,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/startkit/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "startkit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/startupzy-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml b/nuclei-templates/cve-less/themes/startupzy-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml new file mode 100644 index 0000000000..e3c32a5659 --- /dev/null +++ b/nuclei-templates/cve-less/themes/startupzy-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml @@ -0,0 +1,58 @@ +id: startupzy-0eadfcaa632fa9ba5901b3c6b61b28a7 + +info: + name: > + Multiple Themes by jegstudio <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edb34ad0-352e-462e-a7f1-64a804a760ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/startupzy/" + google-query: inurl:"/wp-content/themes/startupzy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,startupzy,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/startupzy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "startupzy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/statfort-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/statfort-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..667d0ab7c5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/statfort-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: statfort-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/statfort/" + google-query: inurl:"/wp-content/themes/statfort/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,statfort,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/statfort/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "statfort" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/storevilla-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/storevilla-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..286b77df44 --- /dev/null +++ b/nuclei-templates/cve-less/themes/storevilla-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: storevilla-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/storevilla/" + google-query: inurl:"/wp-content/themes/storevilla/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,storevilla,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/storevilla/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "storevilla" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/storevilla-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/storevilla-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..e9517ac155 --- /dev/null +++ b/nuclei-templates/cve-less/themes/storevilla-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: storevilla-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/storevilla/" + google-query: inurl:"/wp-content/themes/storevilla/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,storevilla,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/storevilla/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "storevilla" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/storevilla-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/storevilla-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..d2a84cc41d --- /dev/null +++ b/nuclei-templates/cve-less/themes/storevilla-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: storevilla-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/storevilla/" + google-query: inurl:"/wp-content/themes/storevilla/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,storevilla,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/storevilla/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "storevilla" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/storied-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/storied-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..224c57e1a8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/storied-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: storied-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/storied/" + google-query: inurl:"/wp-content/themes/storied/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,storied,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/storied/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "storied" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/storied-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/storied-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..942f634731 --- /dev/null +++ b/nuclei-templates/cve-less/themes/storied-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: storied-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/storied/" + google-query: inurl:"/wp-content/themes/storied/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,storied,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/storied/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "storied" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/studiozen-0aa9e3593c86e4ffacf4528cd86f4af3.yaml b/nuclei-templates/cve-less/themes/studiozen-0aa9e3593c86e4ffacf4528cd86f4af3.yaml new file mode 100644 index 0000000000..f7303546cc --- /dev/null +++ b/nuclei-templates/cve-less/themes/studiozen-0aa9e3593c86e4ffacf4528cd86f4af3.yaml @@ -0,0 +1,58 @@ +id: studiozen-0aa9e3593c86e4ffacf4528cd86f4af3 + +info: + name: > + StudioZen Theme (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/849d0d4a-bc4c-4a45-a2db-0ad12ddcf5e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/studiozen/" + google-query: inurl:"/wp-content/themes/studiozen/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,studiozen,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/studiozen/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "studiozen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/studiozen-c5502df29957af11b4d0db61f979c665.yaml b/nuclei-templates/cve-less/themes/studiozen-c5502df29957af11b4d0db61f979c665.yaml new file mode 100644 index 0000000000..1b9d42831a --- /dev/null +++ b/nuclei-templates/cve-less/themes/studiozen-c5502df29957af11b4d0db61f979c665.yaml @@ -0,0 +1,58 @@ +id: studiozen-c5502df29957af11b4d0db61f979c665 + +info: + name: > + StudioZen <= 1.6 - Multiple Vulnerabilities + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2d9bf916-cdbf-410b-95bb-ca7ce6658e1b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/studiozen/" + google-query: inurl:"/wp-content/themes/studiozen/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,studiozen,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/studiozen/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "studiozen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/superio-cb7c43df76e71bb6d20f5f4c8a5d90eb.yaml b/nuclei-templates/cve-less/themes/superio-cb7c43df76e71bb6d20f5f4c8a5d90eb.yaml new file mode 100644 index 0000000000..c611d10100 --- /dev/null +++ b/nuclei-templates/cve-less/themes/superio-cb7c43df76e71bb6d20f5f4c8a5d90eb.yaml @@ -0,0 +1,58 @@ +id: superio-cb7c43df76e71bb6d20f5f4c8a5d90eb + +info: + name: > + Superio - Job Board <= 1.2.32 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a341a264-0b1a-47a2-8c7e-9a6e10c5ad0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/superio/" + google-query: inurl:"/wp-content/themes/superio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,superio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/superio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/superlist-887e51b7ac6ae9ebfb1f0b6b57330b90.yaml b/nuclei-templates/cve-less/themes/superlist-887e51b7ac6ae9ebfb1f0b6b57330b90.yaml new file mode 100644 index 0000000000..5f2daea444 --- /dev/null +++ b/nuclei-templates/cve-less/themes/superlist-887e51b7ac6ae9ebfb1f0b6b57330b90.yaml @@ -0,0 +1,58 @@ +id: superlist-887e51b7ac6ae9ebfb1f0b6b57330b90 + +info: + name: > + Superlist - Directory WordPress Theme | Directory & Listings <= 2.9.2 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2db0f9b6-fa03-4dea-b47d-ea070e6d1c4c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/superlist/" + google-query: inurl:"/wp-content/themes/superlist/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,superlist,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/superlist/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "superlist" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.9.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/supreme-directory-e1d105a5373862135dae31af977cf05f.yaml b/nuclei-templates/cve-less/themes/supreme-directory-e1d105a5373862135dae31af977cf05f.yaml new file mode 100644 index 0000000000..a863f9ace7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/supreme-directory-e1d105a5373862135dae31af977cf05f.yaml @@ -0,0 +1,58 @@ +id: supreme-directory-e1d105a5373862135dae31af977cf05f + +info: + name: > + Supreme Directory < 1.1.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a068e411-d81f-4162-84e9-f1e9868963f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/supreme-directory/" + google-query: inurl:"/wp-content/themes/supreme-directory/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,supreme-directory,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/supreme-directory/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "supreme-directory" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/swagger-816c00d91c21f41afdfc82cbe3dd6a68.yaml b/nuclei-templates/cve-less/themes/swagger-816c00d91c21f41afdfc82cbe3dd6a68.yaml new file mode 100644 index 0000000000..49e0d90973 --- /dev/null +++ b/nuclei-templates/cve-less/themes/swagger-816c00d91c21f41afdfc82cbe3dd6a68.yaml @@ -0,0 +1,58 @@ +id: swagger-816c00d91c21f41afdfc82cbe3dd6a68 + +info: + name: > + ThemeBlvd Themes/Plugins (Various Versions) - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb5178f4-356b-4352-96ca-500e49006f8a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/swagger/" + google-query: inurl:"/wp-content/themes/swagger/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,swagger,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/swagger/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swagger" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/swape-7ec2393a2db75328cb78362c45e273f6.yaml b/nuclei-templates/cve-less/themes/swape-7ec2393a2db75328cb78362c45e273f6.yaml new file mode 100644 index 0000000000..76d14ba1f9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/swape-7ec2393a2db75328cb78362c45e273f6.yaml @@ -0,0 +1,58 @@ +id: swape-7ec2393a2db75328cb78362c45e273f6 + +info: + name: > + Swape - App Showcase & App Store WordPress Theme < 1.2.1 - Missing Authorization to Arbitrary Options Update + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/be2c1555-4616-4759-bd9b-12f8b3c3a3d4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/swape/" + google-query: inurl:"/wp-content/themes/swape/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,swape,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/swape/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swape" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/swing-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/swing-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..f5950f550c --- /dev/null +++ b/nuclei-templates/cve-less/themes/swing-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: swing-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/swing-lite/" + google-query: inurl:"/wp-content/themes/swing-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,swing-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/swing-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swing-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/swing-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/swing-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..cff7d793db --- /dev/null +++ b/nuclei-templates/cve-less/themes/swing-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: swing-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/swing-lite/" + google-query: inurl:"/wp-content/themes/swing-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,swing-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/swing-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swing-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/swing-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/swing-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..f5c8ed8a98 --- /dev/null +++ b/nuclei-templates/cve-less/themes/swing-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: swing-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/swing-lite/" + google-query: inurl:"/wp-content/themes/swing-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,swing-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/swing-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "swing-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/switchblade-6e394bf087d75cce991df25bc2d90b32.yaml b/nuclei-templates/cve-less/themes/switchblade-6e394bf087d75cce991df25bc2d90b32.yaml new file mode 100644 index 0000000000..2c12ea436d --- /dev/null +++ b/nuclei-templates/cve-less/themes/switchblade-6e394bf087d75cce991df25bc2d90b32.yaml @@ -0,0 +1,58 @@ +id: switchblade-6e394bf087d75cce991df25bc2d90b32 + +info: + name: > + Switchblade - Powerful WordPress Theme <= 1.3.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8114905a-f08c-425f-ae48-06302cfcb20a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/switchblade/" + google-query: inurl:"/wp-content/themes/switchblade/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,switchblade,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/switchblade/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "switchblade" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/t1-51d5d1c24b78c2a34638e1c642bf73fd.yaml b/nuclei-templates/cve-less/themes/t1-51d5d1c24b78c2a34638e1c642bf73fd.yaml new file mode 100644 index 0000000000..2954555b37 --- /dev/null +++ b/nuclei-templates/cve-less/themes/t1-51d5d1c24b78c2a34638e1c642bf73fd.yaml @@ -0,0 +1,58 @@ +id: t1-51d5d1c24b78c2a34638e1c642bf73fd + +info: + name: > + T1 Theme <= 19.0 - Open Redirect + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/901d4e10-06e9-4acd-ba4a-85a537fa10bc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/t1/" + google-query: inurl:"/wp-content/themes/t1/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,t1,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/t1/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "t1" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 19.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/tainacan-interface-72e35bfea95d9e42520259e2f04f4250.yaml b/nuclei-templates/cve-less/themes/tainacan-interface-72e35bfea95d9e42520259e2f04f4250.yaml new file mode 100644 index 0000000000..77dcb5468d --- /dev/null +++ b/nuclei-templates/cve-less/themes/tainacan-interface-72e35bfea95d9e42520259e2f04f4250.yaml @@ -0,0 +1,58 @@ +id: tainacan-interface-72e35bfea95d9e42520259e2f04f4250 + +info: + name: > + Tainacan Interface <= 2.7.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3ffd63ca-5ea4-451c-aa97-092a754ca79f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/tainacan-interface/" + google-query: inurl:"/wp-content/themes/tainacan-interface/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,tainacan-interface,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/tainacan-interface/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tainacan-interface" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/teardrop-aa0917a06c9e064c66e0e15d0b79978d.yaml b/nuclei-templates/cve-less/themes/teardrop-aa0917a06c9e064c66e0e15d0b79978d.yaml new file mode 100644 index 0000000000..6b4be77236 --- /dev/null +++ b/nuclei-templates/cve-less/themes/teardrop-aa0917a06c9e064c66e0e15d0b79978d.yaml @@ -0,0 +1,58 @@ +id: teardrop-aa0917a06c9e064c66e0e15d0b79978d + +info: + name: > + Teardrop - Fullscreen Photography Theme | Portfolio <= 1.8.5 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/63d806ed-2cfc-4ac6-9ebb-75c13d2cfad4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/teardrop/" + google-query: inurl:"/wp-content/themes/teardrop/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,teardrop,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/teardrop/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "teardrop" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/teluro-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/teluro-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..b230b76ea3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/teluro-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: teluro-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/teluro/" + google-query: inurl:"/wp-content/themes/teluro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,teluro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/teluro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "teluro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the-conference-3d5a012eeeb1f6dd0f8bcd44e5b5cd93.yaml b/nuclei-templates/cve-less/themes/the-conference-3d5a012eeeb1f6dd0f8bcd44e5b5cd93.yaml new file mode 100644 index 0000000000..fefbc6f618 --- /dev/null +++ b/nuclei-templates/cve-less/themes/the-conference-3d5a012eeeb1f6dd0f8bcd44e5b5cd93.yaml @@ -0,0 +1,58 @@ +id: the-conference-3d5a012eeeb1f6dd0f8bcd44e5b5cd93 + +info: + name: > + The Conference <= 1.2.0 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/abdd2653-d50c-4eee-9cab-36519fd2b209?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the-conference/" + google-query: inurl:"/wp-content/themes/the-conference/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the-conference,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the-conference/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-conference" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the-erudite-86bc0489b6564a6b791112624ecc4c24.yaml b/nuclei-templates/cve-less/themes/the-erudite-86bc0489b6564a6b791112624ecc4c24.yaml new file mode 100644 index 0000000000..d1644f7353 --- /dev/null +++ b/nuclei-templates/cve-less/themes/the-erudite-86bc0489b6564a6b791112624ecc4c24.yaml @@ -0,0 +1,58 @@ +id: the-erudite-86bc0489b6564a6b791112624ecc4c24 + +info: + name: > + The Erudite <= 2.7.8 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa098919-66ed-41e5-a5f9-291e1859e889?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the-erudite/" + google-query: inurl:"/wp-content/themes/the-erudite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the-erudite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the-erudite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-erudite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the-launcher-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/the-launcher-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..fb5ea4cb62 --- /dev/null +++ b/nuclei-templates/cve-less/themes/the-launcher-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: the-launcher-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the-launcher/" + google-query: inurl:"/wp-content/themes/the-launcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the-launcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the-launcher/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-launcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the-launcher-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/the-launcher-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..c1c20343bd --- /dev/null +++ b/nuclei-templates/cve-less/themes/the-launcher-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: the-launcher-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the-launcher/" + google-query: inurl:"/wp-content/themes/the-launcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the-launcher,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the-launcher/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-launcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the-launcher-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/the-launcher-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..6f941f17fc --- /dev/null +++ b/nuclei-templates/cve-less/themes/the-launcher-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: the-launcher-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the-launcher/" + google-query: inurl:"/wp-content/themes/the-launcher/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the-launcher,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the-launcher/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-launcher" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the-monday-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/the-monday-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..4022dcc9c8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/the-monday-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: the-monday-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the-monday/" + google-query: inurl:"/wp-content/themes/the-monday/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the-monday,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the-monday/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-monday" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the-monday-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/the-monday-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..22d090b125 --- /dev/null +++ b/nuclei-templates/cve-less/themes/the-monday-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: the-monday-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the-monday/" + google-query: inurl:"/wp-content/themes/the-monday/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the-monday,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the-monday/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-monday" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the-monday-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/the-monday-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..35e972d1bb --- /dev/null +++ b/nuclei-templates/cve-less/themes/the-monday-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: the-monday-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the-monday/" + google-query: inurl:"/wp-content/themes/the-monday/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the-monday,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the-monday/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the-monday" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the100-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/the100-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..a87e215096 --- /dev/null +++ b/nuclei-templates/cve-less/themes/the100-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: the100-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the100/" + google-query: inurl:"/wp-content/themes/the100/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the100,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the100/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the100" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the100-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/the100-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..ae1b1c4a39 --- /dev/null +++ b/nuclei-templates/cve-less/themes/the100-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: the100-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the100/" + google-query: inurl:"/wp-content/themes/the100/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the100,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the100/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the100" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/the100-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/the100-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..4ac18b76ae --- /dev/null +++ b/nuclei-templates/cve-less/themes/the100-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: the100-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/the100/" + google-query: inurl:"/wp-content/themes/the100/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,the100,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/the100/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "the100" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/theagency-18e29f581b2b637530caba059b3180e6.yaml b/nuclei-templates/cve-less/themes/theagency-18e29f581b2b637530caba059b3180e6.yaml new file mode 100644 index 0000000000..c7bdd303ae --- /dev/null +++ b/nuclei-templates/cve-less/themes/theagency-18e29f581b2b637530caba059b3180e6.yaml @@ -0,0 +1,58 @@ +id: theagency-18e29f581b2b637530caba059b3180e6 + +info: + name: > + TheAgency (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2ee837fd-a41e-44f2-81e8-258a7d8547bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/theagency/" + google-query: inurl:"/wp-content/themes/theagency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,theagency,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/theagency/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theagency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thecotton_v114-d377235da8e0cc9500eb3b5f44252198.yaml b/nuclei-templates/cve-less/themes/thecotton_v114-d377235da8e0cc9500eb3b5f44252198.yaml new file mode 100644 index 0000000000..2bc4e2c9d4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thecotton_v114-d377235da8e0cc9500eb3b5f44252198.yaml @@ -0,0 +1,58 @@ +id: thecotton_v114-d377235da8e0cc9500eb3b5f44252198 + +info: + name: > + thecotton <= 1.14 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bb979c91-6795-4365-a61b-2cf67a9c8223?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thecotton_v114/" + google-query: inurl:"/wp-content/themes/thecotton_v114/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thecotton_v114,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thecotton_v114/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thecotton_v114" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thegem-0f0ddbff82e7ef39ec0bd688d9ec8fea.yaml b/nuclei-templates/cve-less/themes/thegem-0f0ddbff82e7ef39ec0bd688d9ec8fea.yaml new file mode 100644 index 0000000000..4add588c3b --- /dev/null +++ b/nuclei-templates/cve-less/themes/thegem-0f0ddbff82e7ef39ec0bd688d9ec8fea.yaml @@ -0,0 +1,58 @@ +id: thegem-0f0ddbff82e7ef39ec0bd688d9ec8fea + +info: + name: > + TheGem < 5.8.1.1 - Improper Authentication + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3942bba9-3c3a-47bf-9a53-95376917d6bb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thegem/" + google-query: inurl:"/wp-content/themes/thegem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thegem,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thegem/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thegem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thegem-8d422c3c7895b2b4d7494cb28df2efe5.yaml b/nuclei-templates/cve-less/themes/thegem-8d422c3c7895b2b4d7494cb28df2efe5.yaml new file mode 100644 index 0000000000..5803a13a84 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thegem-8d422c3c7895b2b4d7494cb28df2efe5.yaml @@ -0,0 +1,58 @@ +id: thegem-8d422c3c7895b2b4d7494cb28df2efe5 + +info: + name: > + TheGem < 5.8.1.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6134c76d-754b-4e54-aa4e-b791d9321b8e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thegem/" + google-query: inurl:"/wp-content/themes/thegem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thegem,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thegem/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thegem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thegem-9132b473713ba452ca61cd28b37b6336.yaml b/nuclei-templates/cve-less/themes/thegem-9132b473713ba452ca61cd28b37b6336.yaml new file mode 100644 index 0000000000..efda3bfa02 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thegem-9132b473713ba452ca61cd28b37b6336.yaml @@ -0,0 +1,58 @@ +id: thegem-9132b473713ba452ca61cd28b37b6336 + +info: + name: > + TheGem < 5.8.1.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fc4d4103-a19a-45a5-9059-23eb7f72c84b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thegem/" + google-query: inurl:"/wp-content/themes/thegem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thegem,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thegem/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thegem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thegem-a830a457478521ad7f5b87d39b666bbf.yaml b/nuclei-templates/cve-less/themes/thegem-a830a457478521ad7f5b87d39b666bbf.yaml new file mode 100644 index 0000000000..69d7575975 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thegem-a830a457478521ad7f5b87d39b666bbf.yaml @@ -0,0 +1,58 @@ +id: thegem-a830a457478521ad7f5b87d39b666bbf + +info: + name: > + TheGem <= 5.9.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a243fbde-951b-43e0-a432-c92ae4b04c26?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thegem/" + google-query: inurl:"/wp-content/themes/thegem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thegem,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thegem/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thegem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thegem-e3e7d2debbf761854054ecabf536826d.yaml b/nuclei-templates/cve-less/themes/thegem-e3e7d2debbf761854054ecabf536826d.yaml new file mode 100644 index 0000000000..2e6c1219d4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thegem-e3e7d2debbf761854054ecabf536826d.yaml @@ -0,0 +1,58 @@ +id: thegem-e3e7d2debbf761854054ecabf536826d + +info: + name: > + TheGem < 5.8.1.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/074e8e37-147d-47ea-93ed-652d7de7be9e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thegem/" + google-query: inurl:"/wp-content/themes/thegem/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thegem,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thegem/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thegem" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.8.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/themify-ultra-1e0aaf982b61c73dcc9a05511e801c09.yaml b/nuclei-templates/cve-less/themes/themify-ultra-1e0aaf982b61c73dcc9a05511e801c09.yaml new file mode 100644 index 0000000000..8a9eb4ddf2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/themify-ultra-1e0aaf982b61c73dcc9a05511e801c09.yaml @@ -0,0 +1,58 @@ +id: themify-ultra-1e0aaf982b61c73dcc9a05511e801c09 + +info: + name: > + Themify Ultra <= 7.3.5 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cc994b2a-b3da-4edc-ada3-1150065efd30?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/themify-ultra/" + google-query: inurl:"/wp-content/themes/themify-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,themify-ultra,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/themify-ultra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/themify-ultra-3d30a7e8f0b8f6bc4309468a15c7f314.yaml b/nuclei-templates/cve-less/themes/themify-ultra-3d30a7e8f0b8f6bc4309468a15c7f314.yaml new file mode 100644 index 0000000000..63d66f4658 --- /dev/null +++ b/nuclei-templates/cve-less/themes/themify-ultra-3d30a7e8f0b8f6bc4309468a15c7f314.yaml @@ -0,0 +1,58 @@ +id: themify-ultra-3d30a7e8f0b8f6bc4309468a15c7f314 + +info: + name: > + Themify Ultra <= 7.3.5 - Authenticated (Subscriber+) PHP Object Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17c6a91c-e2a6-4f17-b145-145e9e7a0079?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/themify-ultra/" + google-query: inurl:"/wp-content/themes/themify-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,themify-ultra,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/themify-ultra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/themify-ultra-c842576ba599cc503a47eb67c0e70851.yaml b/nuclei-templates/cve-less/themes/themify-ultra-c842576ba599cc503a47eb67c0e70851.yaml new file mode 100644 index 0000000000..0225fece69 --- /dev/null +++ b/nuclei-templates/cve-less/themes/themify-ultra-c842576ba599cc503a47eb67c0e70851.yaml @@ -0,0 +1,58 @@ +id: themify-ultra-c842576ba599cc503a47eb67c0e70851 + +info: + name: > + Themify Ultra <= 7.3.5 - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed5251e7-64d2-4210-9864-144952a49327?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/themify-ultra/" + google-query: inurl:"/wp-content/themes/themify-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,themify-ultra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/themify-ultra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/themify-ultra-e85a48bb53d03fe4f0288a0ec1595649.yaml b/nuclei-templates/cve-less/themes/themify-ultra-e85a48bb53d03fe4f0288a0ec1595649.yaml new file mode 100644 index 0000000000..c00ec49b21 --- /dev/null +++ b/nuclei-templates/cve-less/themes/themify-ultra-e85a48bb53d03fe4f0288a0ec1595649.yaml @@ -0,0 +1,58 @@ +id: themify-ultra-e85a48bb53d03fe4f0288a0ec1595649 + +info: + name: > + Themify Ultra <= 7.3.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a32f50f7-d271-45f6-9a73-838a8dcb901f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/themify-ultra/" + google-query: inurl:"/wp-content/themes/themify-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,themify-ultra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/themify-ultra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/themify-ultra-f655e8b1894773f9d99ee26fcaeba800.yaml b/nuclei-templates/cve-less/themes/themify-ultra-f655e8b1894773f9d99ee26fcaeba800.yaml new file mode 100644 index 0000000000..906716c095 --- /dev/null +++ b/nuclei-templates/cve-less/themes/themify-ultra-f655e8b1894773f9d99ee26fcaeba800.yaml @@ -0,0 +1,58 @@ +id: themify-ultra-f655e8b1894773f9d99ee26fcaeba800 + +info: + name: > + Themify Ultra <= 7.3.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cf17465-59a9-475d-bd1a-9e3623190926?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/themify-ultra/" + google-query: inurl:"/wp-content/themes/themify-ultra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,themify-ultra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/themify-ultra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "themify-ultra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/theroof-b3e7445697f1970506026aee23a35900.yaml b/nuclei-templates/cve-less/themes/theroof-b3e7445697f1970506026aee23a35900.yaml new file mode 100644 index 0000000000..40e6443260 --- /dev/null +++ b/nuclei-templates/cve-less/themes/theroof-b3e7445697f1970506026aee23a35900.yaml @@ -0,0 +1,58 @@ +id: theroof-b3e7445697f1970506026aee23a35900 + +info: + name: > + TheRoof <= 1.0.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/624d9627-0ffc-409f-beb7-60e80177aa9b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/theroof/" + google-query: inurl:"/wp-content/themes/theroof/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,theroof,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/theroof/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "theroof" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thinkresponsive-744f91815860d793f31d9dcfde87abdc.yaml b/nuclei-templates/cve-less/themes/thinkresponsive-744f91815860d793f31d9dcfde87abdc.yaml new file mode 100644 index 0000000000..12bab33720 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thinkresponsive-744f91815860d793f31d9dcfde87abdc.yaml @@ -0,0 +1,58 @@ +id: thinkresponsive-744f91815860d793f31d9dcfde87abdc + +info: + name: > + Think Responsive <= 1.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/33df72a5-d2bc-4af5-b5bc-f26d7249d238?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thinkresponsive/" + google-query: inurl:"/wp-content/themes/thinkresponsive/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thinkresponsive,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thinkresponsive/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thinkresponsive" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thisway-f7825c5bf409c18daf2cdaf15d281a99.yaml b/nuclei-templates/cve-less/themes/thisway-f7825c5bf409c18daf2cdaf15d281a99.yaml new file mode 100644 index 0000000000..ecc4dc7690 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thisway-f7825c5bf409c18daf2cdaf15d281a99.yaml @@ -0,0 +1,58 @@ +id: thisway-f7825c5bf409c18daf2cdaf15d281a99 + +info: + name: > + ThisWay <= 1.7.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ac1f9d9c-4d4e-4036-95b1-50d09b5cac7c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thisway/" + google-query: inurl:"/wp-content/themes/thisway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thisway,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thisway/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thisway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thrive-theme-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/thrive-theme-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..7185ecc420 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thrive-theme-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: thrive-theme-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thrive-theme/" + google-query: inurl:"/wp-content/themes/thrive-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thrive-theme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thrive-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thrive-theme-c88aacc0c258c2583886d5df08f00e4f.yaml b/nuclei-templates/cve-less/themes/thrive-theme-c88aacc0c258c2583886d5df08f00e4f.yaml new file mode 100644 index 0000000000..be902b9409 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thrive-theme-c88aacc0c258c2583886d5df08f00e4f.yaml @@ -0,0 +1,58 @@ +id: thrive-theme-c88aacc0c258c2583886d5df08f00e4f + +info: + name: > + Thrive Theme Builder < 3.24.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/353c3cd9-5ada-466b-b8e5-d40e0ec4e867?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thrive-theme/" + google-query: inurl:"/wp-content/themes/thrive-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thrive-theme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thrive-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.24.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thrive-theme-ec5c5e05e1261f9960d3089a18968f4c.yaml b/nuclei-templates/cve-less/themes/thrive-theme-ec5c5e05e1261f9960d3089a18968f4c.yaml new file mode 100644 index 0000000000..71ea5b9417 --- /dev/null +++ b/nuclei-templates/cve-less/themes/thrive-theme-ec5c5e05e1261f9960d3089a18968f4c.yaml @@ -0,0 +1,58 @@ +id: thrive-theme-ec5c5e05e1261f9960d3089a18968f4c + +info: + name: > + Thrive Theme Builder < 3.24.0 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4fd6fa4f-8f4d-4d2f-ac67-98124cfa9592?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thrive-theme/" + google-query: inurl:"/wp-content/themes/thrive-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thrive-theme,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thrive-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.24.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/thrive-theme-fece5d89023061344eacddb3239c9c49.yaml b/nuclei-templates/cve-less/themes/thrive-theme-fece5d89023061344eacddb3239c9c49.yaml new file mode 100644 index 0000000000..9113d5c82c --- /dev/null +++ b/nuclei-templates/cve-less/themes/thrive-theme-fece5d89023061344eacddb3239c9c49.yaml @@ -0,0 +1,58 @@ +id: thrive-theme-fece5d89023061344eacddb3239c9c49 + +info: + name: > + Thrive Theme Builder < 3.24.0 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b345dfe-3945-405a-9825-c88816b2adee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/thrive-theme/" + google-query: inurl:"/wp-content/themes/thrive-theme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,thrive-theme,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/thrive-theme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "thrive-theme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.24.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/toolbox-936c77f53a2357ce622711b674cdaed4.yaml b/nuclei-templates/cve-less/themes/toolbox-936c77f53a2357ce622711b674cdaed4.yaml new file mode 100644 index 0000000000..246dad771b --- /dev/null +++ b/nuclei-templates/cve-less/themes/toolbox-936c77f53a2357ce622711b674cdaed4.yaml @@ -0,0 +1,58 @@ +id: toolbox-936c77f53a2357ce622711b674cdaed4 + +info: + name: > + Toolbox <= 1.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8dfa65cb-3d16-471a-8464-b71510d65fd5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/toolbox/" + google-query: inurl:"/wp-content/themes/toolbox/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,toolbox,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/toolbox/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "toolbox" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/total-99f1c42a705f1b7c13a404d5bf315c5f.yaml b/nuclei-templates/cve-less/themes/total-99f1c42a705f1b7c13a404d5bf315c5f.yaml new file mode 100644 index 0000000000..7c732d9e8c --- /dev/null +++ b/nuclei-templates/cve-less/themes/total-99f1c42a705f1b7c13a404d5bf315c5f.yaml @@ -0,0 +1,58 @@ +id: total-99f1c42a705f1b7c13a404d5bf315c5f + +info: + name: > + Total Theme <= 2.1.19 - Authenticated(Subscriber+) Plugin Activation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c4dfd5af-0af0-469c-81ed-52867609550c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/total/" + google-query: inurl:"/wp-content/themes/total/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,total,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/total/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "total" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.19') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/total-e9ad128afe18da7565a18caa795c2ef0.yaml b/nuclei-templates/cve-less/themes/total-e9ad128afe18da7565a18caa795c2ef0.yaml new file mode 100644 index 0000000000..e12a00f0ee --- /dev/null +++ b/nuclei-templates/cve-less/themes/total-e9ad128afe18da7565a18caa795c2ef0.yaml @@ -0,0 +1,58 @@ +id: total-e9ad128afe18da7565a18caa795c2ef0 + +info: + name: > + Total <= 2.1.59 - Missing Authorization to Authenticated (Subscriber+) Sections Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26b64ae3-5839-47d5-9c65-7c595bb18e6c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/total/" + google-query: inurl:"/wp-content/themes/total/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,total,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/total/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "total" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.59') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/townhub-17f6998fdf35be8a6349776a3309aedc.yaml b/nuclei-templates/cve-less/themes/townhub-17f6998fdf35be8a6349776a3309aedc.yaml new file mode 100644 index 0000000000..d8b5880d42 --- /dev/null +++ b/nuclei-templates/cve-less/themes/townhub-17f6998fdf35be8a6349776a3309aedc.yaml @@ -0,0 +1,58 @@ +id: townhub-17f6998fdf35be8a6349776a3309aedc + +info: + name: > + CTHthemes CityBook < 2.3.4, TownHub < 1.0.6, EasyBook < 1.2.2 Themes - Authenticated Post Deleition via IDOR + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/08eb1d49-9928-43f8-97fc-14105e3a4a25?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/townhub/" + google-query: inurl:"/wp-content/themes/townhub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,townhub,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/townhub/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "townhub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/townhub-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml b/nuclei-templates/cve-less/themes/townhub-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml new file mode 100644 index 0000000000..a0e0a2acee --- /dev/null +++ b/nuclei-templates/cve-less/themes/townhub-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml @@ -0,0 +1,58 @@ +id: townhub-8b6ac4c7233f8f6a37118bbf7ac73ad8 + +info: + name: > + CTHthemes CityBook <= 2.3.3, TownHub <= 1.0.5, and EasyBook <= 1.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/788e1c5c-67a9-4b06-a2cf-15c980e83618?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/townhub/" + google-query: inurl:"/wp-content/themes/townhub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,townhub,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/townhub/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "townhub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/townhub-be3f332add5d9ce678efc86e37a29e03.yaml b/nuclei-templates/cve-less/themes/townhub-be3f332add5d9ce678efc86e37a29e03.yaml new file mode 100644 index 0000000000..4f264b1e25 --- /dev/null +++ b/nuclei-templates/cve-less/themes/townhub-be3f332add5d9ce678efc86e37a29e03.yaml @@ -0,0 +1,58 @@ +id: townhub-be3f332add5d9ce678efc86e37a29e03 + +info: + name: > + CTHthemes CityBook <= 2.3.3, TownHub <= 1.0.5, and EasyBook <= 1.2.1 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3e292a1f-d475-4c52-b790-b5215e1870ad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/townhub/" + google-query: inurl:"/wp-content/themes/townhub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,townhub,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/townhub/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "townhub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/townhub-ee94325aa53d1af2c9c7dc7266c2b8f3.yaml b/nuclei-templates/cve-less/themes/townhub-ee94325aa53d1af2c9c7dc7266c2b8f3.yaml new file mode 100644 index 0000000000..283debecf3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/townhub-ee94325aa53d1af2c9c7dc7266c2b8f3.yaml @@ -0,0 +1,58 @@ +id: townhub-ee94325aa53d1af2c9c7dc7266c2b8f3 + +info: + name: > + TownHub <= 1.2.9 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/99df8839-caad-4568-9b05-cb2aea38a051?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/townhub/" + google-query: inurl:"/wp-content/themes/townhub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,townhub,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/townhub/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "townhub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/townhub-f5204789b3d63c1e5dd223fef5d1ac5d.yaml b/nuclei-templates/cve-less/themes/townhub-f5204789b3d63c1e5dd223fef5d1ac5d.yaml new file mode 100644 index 0000000000..aed62ede7d --- /dev/null +++ b/nuclei-templates/cve-less/themes/townhub-f5204789b3d63c1e5dd223fef5d1ac5d.yaml @@ -0,0 +1,58 @@ +id: townhub-f5204789b3d63c1e5dd223fef5d1ac5d + +info: + name: > + CTHthemes CityBook Theme < 2.3.4, TownHub Theme < 1.0.6, EasyBook Theme < 1.2.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b51a7670-9fa6-4df9-bef6-c7ebe6b09c5c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/townhub/" + google-query: inurl:"/wp-content/themes/townhub/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,townhub,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/townhub/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "townhub" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/transcend-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/cve-less/themes/transcend-a746469ba08e7ad3eaafd923d2717c92.yaml new file mode 100644 index 0000000000..82fc817531 --- /dev/null +++ b/nuclei-templates/cve-less/themes/transcend-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -0,0 +1,58 @@ +id: transcend-a746469ba08e7ad3eaafd923d2717c92 + +info: + name: > + Epsilon Framework Themes (Various Versions) - Function Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/transcend/" + google-query: inurl:"/wp-content/themes/transcend/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,transcend,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/transcend/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "transcend" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/travel-agency-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/travel-agency-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..65e0befe35 --- /dev/null +++ b/nuclei-templates/cve-less/themes/travel-agency-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: travel-agency-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/travel-agency/" + google-query: inurl:"/wp-content/themes/travel-agency/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,travel-agency,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/travel-agency/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "travel-agency" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/travel-booking-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/travel-booking-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..33df114d0a --- /dev/null +++ b/nuclei-templates/cve-less/themes/travel-booking-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: travel-booking-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/travel-booking/" + google-query: inurl:"/wp-content/themes/travel-booking/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,travel-booking,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/travel-booking/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "travel-booking" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/traveler-10e06b5ef925da2edfec94c00c6ef59a.yaml b/nuclei-templates/cve-less/themes/traveler-10e06b5ef925da2edfec94c00c6ef59a.yaml new file mode 100644 index 0000000000..52e70f1e32 --- /dev/null +++ b/nuclei-templates/cve-less/themes/traveler-10e06b5ef925da2edfec94c00c6ef59a.yaml @@ -0,0 +1,58 @@ +id: traveler-10e06b5ef925da2edfec94c00c6ef59a + +info: + name: > + Travel Booking WordPress Theme < 2.8.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d524a2c1-43df-4059-b1ec-b0738026158e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/traveler/" + google-query: inurl:"/wp-content/themes/traveler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,traveler,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/traveler/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traveler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/traveler-47edf7b573f3606ae6a648dd78bee5ee.yaml b/nuclei-templates/cve-less/themes/traveler-47edf7b573f3606ae6a648dd78bee5ee.yaml new file mode 100644 index 0000000000..279eb60f7b --- /dev/null +++ b/nuclei-templates/cve-less/themes/traveler-47edf7b573f3606ae6a648dd78bee5ee.yaml @@ -0,0 +1,58 @@ +id: traveler-47edf7b573f3606ae6a648dd78bee5ee + +info: + name: > + Travel Booking WordPress Theme < 2.7.8.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/54044fd7-facf-4ac2-8c87-e30db78eba40?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/traveler/" + google-query: inurl:"/wp-content/themes/traveler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,traveler,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/traveler/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traveler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/traveler-4e8adfcb068bf53ba8223d2136f425a4.yaml b/nuclei-templates/cve-less/themes/traveler-4e8adfcb068bf53ba8223d2136f425a4.yaml new file mode 100644 index 0000000000..173534f6ad --- /dev/null +++ b/nuclei-templates/cve-less/themes/traveler-4e8adfcb068bf53ba8223d2136f425a4.yaml @@ -0,0 +1,58 @@ +id: traveler-4e8adfcb068bf53ba8223d2136f425a4 + +info: + name: > + Traveler – Travel Booking WordPress Theme < 2.8.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6591c2a5-d238-418f-be00-1bb5c2fa77e9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/traveler/" + google-query: inurl:"/wp-content/themes/traveler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,traveler,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/traveler/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traveler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/traveler-ef4958af1c7e13be4b4aa1bba11ecbc2.yaml b/nuclei-templates/cve-less/themes/traveler-ef4958af1c7e13be4b4aa1bba11ecbc2.yaml new file mode 100644 index 0000000000..3ed7cd6ba3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/traveler-ef4958af1c7e13be4b4aa1bba11ecbc2.yaml @@ -0,0 +1,58 @@ +id: traveler-ef4958af1c7e13be4b4aa1bba11ecbc2 + +info: + name: > + Traveler – Travel Booking WordPress Theme < 2.7.8.6 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c824823c-68d0-4f41-ac22-c517763357eb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/traveler/" + google-query: inurl:"/wp-content/themes/traveler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,traveler,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/traveler/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traveler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.7.8.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/traveler-f415db0563c7e2bf116edbc6956f1ae6.yaml b/nuclei-templates/cve-less/themes/traveler-f415db0563c7e2bf116edbc6956f1ae6.yaml new file mode 100644 index 0000000000..2baa73a88b --- /dev/null +++ b/nuclei-templates/cve-less/themes/traveler-f415db0563c7e2bf116edbc6956f1ae6.yaml @@ -0,0 +1,58 @@ +id: traveler-f415db0563c7e2bf116edbc6956f1ae6 + +info: + name: > + Travel Booking WordPress Theme < 2.8.4 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5d875004-a589-4657-953c-ca175e3157c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/traveler/" + google-query: inurl:"/wp-content/themes/traveler/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,traveler,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/traveler/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "traveler" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.8.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/travey-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml b/nuclei-templates/cve-less/themes/travey-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml new file mode 100644 index 0000000000..6e9b1cd626 --- /dev/null +++ b/nuclei-templates/cve-less/themes/travey-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml @@ -0,0 +1,58 @@ +id: travey-0eadfcaa632fa9ba5901b3c6b61b28a7 + +info: + name: > + Multiple Themes by jegstudio <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edb34ad0-352e-462e-a7f1-64a804a760ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/travey/" + google-query: inurl:"/wp-content/themes/travey/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,travey,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/travey/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "travey" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/trending-1def92176b2075addd1971f8bb11410a.yaml b/nuclei-templates/cve-less/themes/trending-1def92176b2075addd1971f8bb11410a.yaml new file mode 100644 index 0000000000..3edd5697fe --- /dev/null +++ b/nuclei-templates/cve-less/themes/trending-1def92176b2075addd1971f8bb11410a.yaml @@ -0,0 +1,58 @@ +id: trending-1def92176b2075addd1971f8bb11410a + +info: + name: > + Trending < 0.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed5d8b70-eb0e-4e5c-a68a-d9bff493c04c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/trending/" + google-query: inurl:"/wp-content/themes/trending/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,trending,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/trending/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "trending" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/truemag-909fb4f06b4694caa086894d4ab6e947.yaml b/nuclei-templates/cve-less/themes/truemag-909fb4f06b4694caa086894d4ab6e947.yaml new file mode 100644 index 0000000000..00498ee470 --- /dev/null +++ b/nuclei-templates/cve-less/themes/truemag-909fb4f06b4694caa086894d4ab6e947.yaml @@ -0,0 +1,58 @@ +id: truemag-909fb4f06b4694caa086894d4ab6e947 + +info: + name: > + Truemag (Unknown Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/25250755-0d22-44f4-8930-3a60efd61e32?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/truemag/" + google-query: inurl:"/wp-content/themes/truemag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,truemag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/truemag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "truemag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/twenty-twelve-edd-b586a8ab64bee13c2ee807e747d50adb.yaml b/nuclei-templates/cve-less/themes/twenty-twelve-edd-b586a8ab64bee13c2ee807e747d50adb.yaml new file mode 100644 index 0000000000..0bfc07c764 --- /dev/null +++ b/nuclei-templates/cve-less/themes/twenty-twelve-edd-b586a8ab64bee13c2ee807e747d50adb.yaml @@ -0,0 +1,58 @@ +id: twenty-twelve-edd-b586a8ab64bee13c2ee807e747d50adb + +info: + name: > + Easy Digital Downloads (EDD) Twenty-Twelve < 1.1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/12946a87-0b61-45ea-aae3-385d860b0db8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/twenty-twelve-edd/" + google-query: inurl:"/wp-content/themes/twenty-twelve-edd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,twenty-twelve-edd,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/twenty-twelve-edd/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twenty-twelve-edd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/u-design-3d5c779f38ece858601f73d1cc738733.yaml b/nuclei-templates/cve-less/themes/u-design-3d5c779f38ece858601f73d1cc738733.yaml new file mode 100644 index 0000000000..c986f79896 --- /dev/null +++ b/nuclei-templates/cve-less/themes/u-design-3d5c779f38ece858601f73d1cc738733.yaml @@ -0,0 +1,58 @@ +id: u-design-3d5c779f38ece858601f73d1cc738733 + +info: + name: > + UDesign <= 4.7.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8a02f5b1-5f0a-45f7-925c-1837a47dd051?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/u-design/" + google-query: inurl:"/wp-content/themes/u-design/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,u-design,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/u-design/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "u-design" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.7.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/u-design-3f3928c6559acc265ac4dc8abe8f4e68.yaml b/nuclei-templates/cve-less/themes/u-design-3f3928c6559acc265ac4dc8abe8f4e68.yaml new file mode 100644 index 0000000000..e01534c992 --- /dev/null +++ b/nuclei-templates/cve-less/themes/u-design-3f3928c6559acc265ac4dc8abe8f4e68.yaml @@ -0,0 +1,58 @@ +id: u-design-3f3928c6559acc265ac4dc8abe8f4e68 + +info: + name: > + uDesign Theme 2.3.0 - 2.7.9 - Unauthenticated DOM Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6ef18e0e-8fad-464b-943b-54fbbe169ce9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/u-design/" + google-query: inurl:"/wp-content/themes/u-design/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,u-design,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/u-design/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "u-design" + part: body + + - type: dsl + dsl: + - compare_versions(version, '>= 2.3.0', '<= 2.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ultra-seven-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/ultra-seven-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..81fa788494 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ultra-seven-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: ultra-seven-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ultra-seven/" + google-query: inurl:"/wp-content/themes/ultra-seven/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ultra-seven,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ultra-seven/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultra-seven" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ultra-seven-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/ultra-seven-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..0b91e70b75 --- /dev/null +++ b/nuclei-templates/cve-less/themes/ultra-seven-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: ultra-seven-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ultra-seven/" + google-query: inurl:"/wp-content/themes/ultra-seven/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ultra-seven,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ultra-seven/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultra-seven" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/ultra-seven-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/ultra-seven-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..bcc196801e --- /dev/null +++ b/nuclei-templates/cve-less/themes/ultra-seven-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: ultra-seven-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/ultra-seven/" + google-query: inurl:"/wp-content/themes/ultra-seven/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,ultra-seven,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/ultra-seven/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultra-seven" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/unakit-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/unakit-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..ea19a188d2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/unakit-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: unakit-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/unakit/" + google-query: inurl:"/wp-content/themes/unakit/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,unakit,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/unakit/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unakit" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/uncode-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/uncode-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..9a3b5dddc5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/uncode-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: uncode-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/uncode-lite/" + google-query: inurl:"/wp-content/themes/uncode-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,uncode-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/uncode-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncode-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/uncode-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/uncode-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..94bfab14ba --- /dev/null +++ b/nuclei-templates/cve-less/themes/uncode-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: uncode-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/uncode-lite/" + google-query: inurl:"/wp-content/themes/uncode-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,uncode-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/uncode-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncode-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/uncode-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/uncode-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..d52fad316e --- /dev/null +++ b/nuclei-templates/cve-less/themes/uncode-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: uncode-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/uncode-lite/" + google-query: inurl:"/wp-content/themes/uncode-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,uncode-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/uncode-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "uncode-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/unique-df4c2356c55ce196a7dc2c935ff36c73.yaml b/nuclei-templates/cve-less/themes/unique-df4c2356c55ce196a7dc2c935ff36c73.yaml new file mode 100644 index 0000000000..3fc801da24 --- /dev/null +++ b/nuclei-templates/cve-less/themes/unique-df4c2356c55ce196a7dc2c935ff36c73.yaml @@ -0,0 +1,58 @@ +id: unique-df4c2356c55ce196a7dc2c935ff36c73 + +info: + name: > + Unique <= 0.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a203577-0ced-4e1e-a7db-e4ca53a5bade?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/unique/" + google-query: inurl:"/wp-content/themes/unique/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,unique,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/unique/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unique" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 0.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/unnamed-babd8720f51cdfc03ee525219e51d67f.yaml b/nuclei-templates/cve-less/themes/unnamed-babd8720f51cdfc03ee525219e51d67f.yaml new file mode 100644 index 0000000000..e6070574d0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/unnamed-babd8720f51cdfc03ee525219e51d67f.yaml @@ -0,0 +1,58 @@ +id: unnamed-babd8720f51cdfc03ee525219e51d67f + +info: + name: > + Unnamed < 1.2.17.1 and Unnamed SE < 1.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/360cb170-a888-4b7f-8ea2-1d74a404f1df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/unnamed/" + google-query: inurl:"/wp-content/themes/unnamed/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,unnamed,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/unnamed/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unnamed" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.17') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/unnamed-se-babd8720f51cdfc03ee525219e51d67f.yaml b/nuclei-templates/cve-less/themes/unnamed-se-babd8720f51cdfc03ee525219e51d67f.yaml new file mode 100644 index 0000000000..c5caf9ea42 --- /dev/null +++ b/nuclei-templates/cve-less/themes/unnamed-se-babd8720f51cdfc03ee525219e51d67f.yaml @@ -0,0 +1,58 @@ +id: unnamed-se-babd8720f51cdfc03ee525219e51d67f + +info: + name: > + Unnamed < 1.2.17.1 and Unnamed SE < 1.0.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/360cb170-a888-4b7f-8ea2-1d74a404f1df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/unnamed-se/" + google-query: inurl:"/wp-content/themes/unnamed-se/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,unnamed-se,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/unnamed-se/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "unnamed-se" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/upfrontwp-4fc88bb474bb1a0cdd35b01d04f15578.yaml b/nuclei-templates/cve-less/themes/upfrontwp-4fc88bb474bb1a0cdd35b01d04f15578.yaml new file mode 100644 index 0000000000..e91de14c82 --- /dev/null +++ b/nuclei-templates/cve-less/themes/upfrontwp-4fc88bb474bb1a0cdd35b01d04f15578.yaml @@ -0,0 +1,58 @@ +id: upfrontwp-4fc88bb474bb1a0cdd35b01d04f15578 + +info: + name: > + Upfrontwp <= 1.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/83ac0dfc-88cd-48f0-9914-2258d5dfe834?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/upfrontwp/" + google-query: inurl:"/wp-content/themes/upfrontwp/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,upfrontwp,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/upfrontwp/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "upfrontwp" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/upscale-5e5f5586f8a04fc7c1bb725c8fd2a8ff.yaml b/nuclei-templates/cve-less/themes/upscale-5e5f5586f8a04fc7c1bb725c8fd2a8ff.yaml new file mode 100644 index 0000000000..b2f325ad27 --- /dev/null +++ b/nuclei-templates/cve-less/themes/upscale-5e5f5586f8a04fc7c1bb725c8fd2a8ff.yaml @@ -0,0 +1,58 @@ +id: upscale-5e5f5586f8a04fc7c1bb725c8fd2a8ff + +info: + name: > + Upscale (Unknown Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/afb3e2f8-ba44-48fc-9882-d9bcd39676ee?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/upscale/" + google-query: inurl:"/wp-content/themes/upscale/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,upscale,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/upscale/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "upscale" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/urbancity-7afac27e2fdaa8f6fe79366afab488a9.yaml b/nuclei-templates/cve-less/themes/urbancity-7afac27e2fdaa8f6fe79366afab488a9.yaml new file mode 100644 index 0000000000..bc4f3f8aab --- /dev/null +++ b/nuclei-templates/cve-less/themes/urbancity-7afac27e2fdaa8f6fe79366afab488a9.yaml @@ -0,0 +1,58 @@ +id: urbancity-7afac27e2fdaa8f6fe79366afab488a9 + +info: + name: > + Urban City (All Versions) - Arbitrary File Download + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f70f3d2-c267-4802-9a54-4f64c4507dba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/urbancity/" + google-query: inurl:"/wp-content/themes/urbancity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,urbancity,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/urbancity/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "urbancity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/velvet-cebcf5c5e3b1d8025e7b39f8bd391a13.yaml b/nuclei-templates/cve-less/themes/velvet-cebcf5c5e3b1d8025e7b39f8bd391a13.yaml new file mode 100644 index 0000000000..af8e193d0c --- /dev/null +++ b/nuclei-templates/cve-less/themes/velvet-cebcf5c5e3b1d8025e7b39f8bd391a13.yaml @@ -0,0 +1,58 @@ +id: velvet-cebcf5c5e3b1d8025e7b39f8bd391a13 + +info: + name: > + Velvet Theme (All Versions) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5569ec0f-eeb6-433f-bb49-336abae2a29a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/velvet/" + google-query: inurl:"/wp-content/themes/velvet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,velvet,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/velvet/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "velvet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vernissage-1f43087f32c2016495bdaad26c9a18a2.yaml b/nuclei-templates/cve-less/themes/vernissage-1f43087f32c2016495bdaad26c9a18a2.yaml new file mode 100644 index 0000000000..34aca0cb52 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vernissage-1f43087f32c2016495bdaad26c9a18a2.yaml @@ -0,0 +1,58 @@ +id: vernissage-1f43087f32c2016495bdaad26c9a18a2 + +info: + name: > + Vernissage <= 1.2.9 - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/56405a91-259c-4700-bbc1-ffe0d77f3974?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vernissage/" + google-query: inurl:"/wp-content/themes/vernissage/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vernissage,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vernissage/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vernissage" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vertice-37917ea4c5b30e9a2f479f087050ff0a.yaml b/nuclei-templates/cve-less/themes/vertice-37917ea4c5b30e9a2f479f087050ff0a.yaml new file mode 100644 index 0000000000..760bf4a7a7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vertice-37917ea4c5b30e9a2f479f087050ff0a.yaml @@ -0,0 +1,58 @@ +id: vertice-37917ea4c5b30e9a2f479f087050ff0a + +info: + name: > + ColibriWP Theme framework <= (Various Versions) - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/890bcce2-18c2-4df8-a945-0c23437534fc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vertice/" + google-query: inurl:"/wp-content/themes/vertice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vertice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vertice/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vertice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/viable-blog-6d87a6f7248c4528f7d5ef6ed7c11eba.yaml b/nuclei-templates/cve-less/themes/viable-blog-6d87a6f7248c4528f7d5ef6ed7c11eba.yaml new file mode 100644 index 0000000000..ea03d1e657 --- /dev/null +++ b/nuclei-templates/cve-less/themes/viable-blog-6d87a6f7248c4528f7d5ef6ed7c11eba.yaml @@ -0,0 +1,58 @@ +id: viable-blog-6d87a6f7248c4528f7d5ef6ed7c11eba + +info: + name: > + Viable blog <= 1.1.4 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/262b5326-a5e6-4063-a345-59dedd14c3c2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/viable-blog/" + google-query: inurl:"/wp-content/themes/viable-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,viable-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/viable-blog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "viable-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/villar-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/villar-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..62d5194f51 --- /dev/null +++ b/nuclei-templates/cve-less/themes/villar-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: villar-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/villar/" + google-query: inurl:"/wp-content/themes/villar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,villar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/villar/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "villar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/viral-06cd0f178ae533c7b94126d052d17b3f.yaml b/nuclei-templates/cve-less/themes/viral-06cd0f178ae533c7b94126d052d17b3f.yaml new file mode 100644 index 0000000000..01676ebf9c --- /dev/null +++ b/nuclei-templates/cve-less/themes/viral-06cd0f178ae533c7b94126d052d17b3f.yaml @@ -0,0 +1,58 @@ +id: viral-06cd0f178ae533c7b94126d052d17b3f + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3543a39-ad88-40be-93b8-36ec638db4bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/viral/" + google-query: inurl:"/wp-content/themes/viral/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,viral,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/viral/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "viral" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/viral-d566c0816c38ea6ca24760850c1eaf4a.yaml b/nuclei-templates/cve-less/themes/viral-d566c0816c38ea6ca24760850c1eaf4a.yaml new file mode 100644 index 0000000000..2df95e8ed8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/viral-d566c0816c38ea6ca24760850c1eaf4a.yaml @@ -0,0 +1,58 @@ +id: viral-d566c0816c38ea6ca24760850c1eaf4a + +info: + name: > + Multiple Themes (Various Versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/154a838c-f8bb-4568-b066-a78264c75eea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/viral/" + google-query: inurl:"/wp-content/themes/viral/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,viral,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/viral/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "viral" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/viral-mag-800d496f51d819e5732256fbd162712b.yaml b/nuclei-templates/cve-less/themes/viral-mag-800d496f51d819e5732256fbd162712b.yaml new file mode 100644 index 0000000000..8d8487576c --- /dev/null +++ b/nuclei-templates/cve-less/themes/viral-mag-800d496f51d819e5732256fbd162712b.yaml @@ -0,0 +1,58 @@ +id: viral-mag-800d496f51d819e5732256fbd162712b + +info: + name: > + Viral Mag <= 1.0.9 - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/48aa5be8-a5d9-4f5e-ba30-d6afb3f0fee0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/viral-mag/" + google-query: inurl:"/wp-content/themes/viral-mag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,viral-mag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/viral-mag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "viral-mag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/viral-news-06cd0f178ae533c7b94126d052d17b3f.yaml b/nuclei-templates/cve-less/themes/viral-news-06cd0f178ae533c7b94126d052d17b3f.yaml new file mode 100644 index 0000000000..840387f656 --- /dev/null +++ b/nuclei-templates/cve-less/themes/viral-news-06cd0f178ae533c7b94126d052d17b3f.yaml @@ -0,0 +1,58 @@ +id: viral-news-06cd0f178ae533c7b94126d052d17b3f + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Arbitrary Plugin Activation + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3543a39-ad88-40be-93b8-36ec638db4bd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/viral-news/" + google-query: inurl:"/wp-content/themes/viral-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,viral-news,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/viral-news/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "viral-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/viral-news-d566c0816c38ea6ca24760850c1eaf4a.yaml b/nuclei-templates/cve-less/themes/viral-news-d566c0816c38ea6ca24760850c1eaf4a.yaml new file mode 100644 index 0000000000..e18653a435 --- /dev/null +++ b/nuclei-templates/cve-less/themes/viral-news-d566c0816c38ea6ca24760850c1eaf4a.yaml @@ -0,0 +1,58 @@ +id: viral-news-d566c0816c38ea6ca24760850c1eaf4a + +info: + name: > + Multiple Themes (Various Versions) - Missing Authorization to Arbitrary Plugin Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/154a838c-f8bb-4568-b066-a78264c75eea?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/viral-news/" + google-query: inurl:"/wp-content/themes/viral-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,viral-news,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/viral-news/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "viral-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/viralike-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/viralike-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..6d877233d7 --- /dev/null +++ b/nuclei-templates/cve-less/themes/viralike-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: viralike-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/viralike/" + google-query: inurl:"/wp-content/themes/viralike/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,viralike,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/viralike/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "viralike" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/virtue-2d42369e26f63aede3d7de3de1ae9995.yaml b/nuclei-templates/cve-less/themes/virtue-2d42369e26f63aede3d7de3de1ae9995.yaml new file mode 100644 index 0000000000..e61f362c75 --- /dev/null +++ b/nuclei-templates/cve-less/themes/virtue-2d42369e26f63aede3d7de3de1ae9995.yaml @@ -0,0 +1,58 @@ +id: virtue-2d42369e26f63aede3d7de3de1ae9995 + +info: + name: > + Virtue <= 3.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Author + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d8272233-afb3-46f1-ab85-189a3923e29d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/virtue/" + google-query: inurl:"/wp-content/themes/virtue/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,virtue,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/virtue/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "virtue" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 3.4.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vistered-little-8fb46ccbfe8eb892f418af64a9d461a7.yaml b/nuclei-templates/cve-less/themes/vistered-little-8fb46ccbfe8eb892f418af64a9d461a7.yaml new file mode 100644 index 0000000000..e99f3a208b --- /dev/null +++ b/nuclei-templates/cve-less/themes/vistered-little-8fb46ccbfe8eb892f418af64a9d461a7.yaml @@ -0,0 +1,58 @@ +id: vistered-little-8fb46ccbfe8eb892f418af64a9d461a7 + +info: + name: > + Vistered Little (Unspecified Version) - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/510ef568-fe5e-427e-a5ab-76c65250ade3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/Vistered-Little/" + google-query: inurl:"/wp-content/themes/Vistered-Little/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,Vistered-Little,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/Vistered-Little/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Vistered-Little" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vithy-72d0f45bd923b7475bc87b8f7146adf8.yaml b/nuclei-templates/cve-less/themes/vithy-72d0f45bd923b7475bc87b8f7146adf8.yaml new file mode 100644 index 0000000000..6f7010aeb9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vithy-72d0f45bd923b7475bc87b8f7146adf8.yaml @@ -0,0 +1,58 @@ +id: vithy-72d0f45bd923b7475bc87b8f7146adf8 + +info: + name: > + Vithy (Unknown Versions) - Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/114ff636-6b51-43a2-b2c8-19e01e94176f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vithy/" + google-query: inurl:"/wp-content/themes/vithy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vithy,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vithy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vithy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vithy-eee162c4e035760d9235de8c731181be.yaml b/nuclei-templates/cve-less/themes/vithy-eee162c4e035760d9235de8c731181be.yaml new file mode 100644 index 0000000000..d1f3792301 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vithy-eee162c4e035760d9235de8c731181be.yaml @@ -0,0 +1,58 @@ +id: vithy-eee162c4e035760d9235de8c731181be + +info: + name: > + Vithy (All Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/20077e55-fe75-49c7-ba3f-ccd683a3f722?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vithy/" + google-query: inurl:"/wp-content/themes/vithy/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vithy,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vithy/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vithy" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/vmag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..81b985f498 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmag-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: vmag-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmag/" + google-query: inurl:"/wp-content/themes/vmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmag-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/vmag-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..9dbee48596 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmag-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: vmag-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmag/" + google-query: inurl:"/wp-content/themes/vmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmag,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmag-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/vmag-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..ca90cf0854 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmag-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: vmag-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmag/" + google-query: inurl:"/wp-content/themes/vmag/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmag,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmag/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmag" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmagazine-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/vmagazine-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..86a321e0f2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmagazine-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: vmagazine-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmagazine-lite/" + google-query: inurl:"/wp-content/themes/vmagazine-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmagazine-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmagazine-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmagazine-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmagazine-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/vmagazine-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..35a59eafe3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmagazine-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: vmagazine-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmagazine-lite/" + google-query: inurl:"/wp-content/themes/vmagazine-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmagazine-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmagazine-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmagazine-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmagazine-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/vmagazine-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..351dd7f575 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmagazine-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: vmagazine-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmagazine-lite/" + google-query: inurl:"/wp-content/themes/vmagazine-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmagazine-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmagazine-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmagazine-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmagazine-news-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/vmagazine-news-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..239780e9ef --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmagazine-news-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: vmagazine-news-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmagazine-news/" + google-query: inurl:"/wp-content/themes/vmagazine-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmagazine-news,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmagazine-news/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmagazine-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmagazine-news-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/vmagazine-news-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..4b7c4f00fd --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmagazine-news-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: vmagazine-news-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmagazine-news/" + google-query: inurl:"/wp-content/themes/vmagazine-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmagazine-news,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmagazine-news/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmagazine-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/vmagazine-news-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/vmagazine-news-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..7d9d5de9c1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/vmagazine-news-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: vmagazine-news-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/vmagazine-news/" + google-query: inurl:"/wp-content/themes/vmagazine-news/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,vmagazine-news,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/vmagazine-news/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "vmagazine-news" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/voice-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/cve-less/themes/voice-09bb804f266b350634cb031ea62ca641.yaml new file mode 100644 index 0000000000..7f3f822b94 --- /dev/null +++ b/nuclei-templates/cve-less/themes/voice-09bb804f266b350634cb031ea62ca641.yaml @@ -0,0 +1,58 @@ +id: voice-09bb804f266b350634cb031ea62ca641 + +info: + name: > + Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e97c652c-f191-493d-9857-acaa4db8a49a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/voice/" + google-query: inurl:"/wp-content/themes/voice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,voice,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/voice/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "voice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/voice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/cve-less/themes/voice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml new file mode 100644 index 0000000000..6ea6846782 --- /dev/null +++ b/nuclei-templates/cve-less/themes/voice-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -0,0 +1,58 @@ +id: voice-bceae5f53d1ac07f2efbd28988c0d5d9 + +info: + name: > + Multiple Thrive Themes and Plugins (Various Versions) - Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c2be56d2-d473-455e-8d6e-d2df6abb19ca?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/voice/" + google-query: inurl:"/wp-content/themes/voice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,voice,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/voice/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "voice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wallstreet-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/wallstreet-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..337af170f2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wallstreet-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: wallstreet-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wallstreet/" + google-query: inurl:"/wp-content/themes/wallstreet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wallstreet,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wallstreet/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wallstreet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/weaver-xtreme-13c73556a747c83cbb4df9719464f4fd.yaml b/nuclei-templates/cve-less/themes/weaver-xtreme-13c73556a747c83cbb4df9719464f4fd.yaml new file mode 100644 index 0000000000..a9f0df365e --- /dev/null +++ b/nuclei-templates/cve-less/themes/weaver-xtreme-13c73556a747c83cbb4df9719464f4fd.yaml @@ -0,0 +1,58 @@ +id: weaver-xtreme-13c73556a747c83cbb4df9719464f4fd + +info: + name: > + Weaver Xtreme Theme <= 5.0.7 - Authenticated(Contributor+) Stored Cross-Site Scripting via Display Name + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b2bef63-c871-45e4-bb05-12bbba20ca5e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/weaver-xtreme/" + google-query: inurl:"/wp-content/themes/weaver-xtreme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,weaver-xtreme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/weaver-xtreme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weaver-xtreme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 5.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/weaver-xtreme-17ab37dbc7beb458edc5925614c59dfa.yaml b/nuclei-templates/cve-less/themes/weaver-xtreme-17ab37dbc7beb458edc5925614c59dfa.yaml new file mode 100644 index 0000000000..b92657b97b --- /dev/null +++ b/nuclei-templates/cve-less/themes/weaver-xtreme-17ab37dbc7beb458edc5925614c59dfa.yaml @@ -0,0 +1,58 @@ +id: weaver-xtreme-17ab37dbc7beb458edc5925614c59dfa + +info: + name: > + Weaver Xtreme <= 6.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc7384d7-c2fd-4d63-9b80-bb5bde9a23d5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/weaver-xtreme/" + google-query: inurl:"/wp-content/themes/weaver-xtreme/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,weaver-xtreme,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/weaver-xtreme/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weaver-xtreme" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 6.3.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/web-minimalist-200901-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml b/nuclei-templates/cve-less/themes/web-minimalist-200901-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml new file mode 100644 index 0000000000..803c7d8426 --- /dev/null +++ b/nuclei-templates/cve-less/themes/web-minimalist-200901-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml @@ -0,0 +1,58 @@ +id: web-minimalist-200901-8cf1ee9f0e6e79fc8ffcfb9414ff6340 + +info: + name: > + Web Minimalist 200901 <= 1.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/90ce0f70-d3a2-48cb-b6f8-7dda7ac25866?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/web-minimalist-200901/" + google-query: inurl:"/wp-content/themes/web-minimalist-200901/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,web-minimalist-200901,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/web-minimalist-200901/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "web-minimalist-200901" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/webfolio-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/webfolio-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..0b38ea7835 --- /dev/null +++ b/nuclei-templates/cve-less/themes/webfolio-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: webfolio-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/webfolio/" + google-query: inurl:"/wp-content/themes/webfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,webfolio,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/webfolio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "webfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/weeklynews-a66c423ab6d157ff18cae8cbb8d16a15.yaml b/nuclei-templates/cve-less/themes/weeklynews-a66c423ab6d157ff18cae8cbb8d16a15.yaml new file mode 100644 index 0000000000..d9966c93f2 --- /dev/null +++ b/nuclei-templates/cve-less/themes/weeklynews-a66c423ab6d157ff18cae8cbb8d16a15.yaml @@ -0,0 +1,58 @@ +id: weeklynews-a66c423ab6d157ff18cae8cbb8d16a15 + +info: + name: > + Weekly News < 2.2.9 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/45c08d51-ed01-4f92-9290-1964c4f3657c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/weeklynews/" + google-query: inurl:"/wp-content/themes/weeklynews/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,weeklynews,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/weeklynews/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "weeklynews" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/westand-5bf9d91713d8c35818245877f73557be.yaml b/nuclei-templates/cve-less/themes/westand-5bf9d91713d8c35818245877f73557be.yaml new file mode 100644 index 0000000000..a8c65109d1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/westand-5bf9d91713d8c35818245877f73557be.yaml @@ -0,0 +1,58 @@ +id: westand-5bf9d91713d8c35818245877f73557be + +info: + name: > + Themes from Chimpstudio and Pixfill (Various Versions) - Unauthenticated Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8e3c45ac-44c0-47e1-81af-65014f064513?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/westand/" + google-query: inurl:"/wp-content/themes/westand/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,westand,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/westand/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "westand" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wibar-8720a886474e9b973346fa40eca70f76.yaml b/nuclei-templates/cve-less/themes/wibar-8720a886474e9b973346fa40eca70f76.yaml new file mode 100644 index 0000000000..4ba2d7f3af --- /dev/null +++ b/nuclei-templates/cve-less/themes/wibar-8720a886474e9b973346fa40eca70f76.yaml @@ -0,0 +1,58 @@ +id: wibar-8720a886474e9b973346fa40eca70f76 + +info: + name: > + Wibar | Wine and Vineyard WooCommerce WordPress Theme < 1.2.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d3b6448-14cc-4146-9a93-98150031fcb6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wibar/" + google-query: inurl:"/wp-content/themes/wibar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wibar,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wibar/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wibar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/winters-1bdc5a83caa0df98ccf44a6fbb6306e2.yaml b/nuclei-templates/cve-less/themes/winters-1bdc5a83caa0df98ccf44a6fbb6306e2.yaml new file mode 100644 index 0000000000..e1ff9bed59 --- /dev/null +++ b/nuclei-templates/cve-less/themes/winters-1bdc5a83caa0df98ccf44a6fbb6306e2.yaml @@ -0,0 +1,58 @@ +id: winters-1bdc5a83caa0df98ccf44a6fbb6306e2 + +info: + name: > + Winters <= 1.4.3 - Prototype Pollution to Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6f8b75a1-f0f2-445b-a1c7-1628916470d3?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/winters/" + google-query: inurl:"/wp-content/themes/winters/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,winters,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/winters/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "winters" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wise-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/wise-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..e289c4e2fc --- /dev/null +++ b/nuclei-templates/cve-less/themes/wise-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: wise-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wise/" + google-query: inurl:"/wp-content/themes/wise/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wise,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wise/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wise" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wishful-blog-a81a5bf9125eeee92e00bfdaa83c90ee.yaml b/nuclei-templates/cve-less/themes/wishful-blog-a81a5bf9125eeee92e00bfdaa83c90ee.yaml new file mode 100644 index 0000000000..6f8c77ca89 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wishful-blog-a81a5bf9125eeee92e00bfdaa83c90ee.yaml @@ -0,0 +1,58 @@ +id: wishful-blog-a81a5bf9125eeee92e00bfdaa83c90ee + +info: + name: > + Wishful Blog <= 2.0.1 & Raise Mag <= 1.0.7 - Unauthenticated Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fb33f779-d045-48dd-babe-8b1fab903124?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wishful-blog/" + google-query: inurl:"/wp-content/themes/wishful-blog/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wishful-blog,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wishful-blog/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wishful-blog" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woffice-b256df5c032ca82a00290c7b34a523e2.yaml b/nuclei-templates/cve-less/themes/woffice-b256df5c032ca82a00290c7b34a523e2.yaml new file mode 100644 index 0000000000..81e4c97fd3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woffice-b256df5c032ca82a00290c7b34a523e2.yaml @@ -0,0 +1,58 @@ +id: woffice-b256df5c032ca82a00290c7b34a523e2 + +info: + name: > + Woffice CRM <= 4.0.1 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/eaf17a09-3e35-4df8-acb9-7829942597c6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woffice/" + google-query: inurl:"/wp-content/themes/woffice/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woffice,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woffice/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woffice" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woodmart-1a6b9215905d609bfa19a88fafbe9af4.yaml b/nuclei-templates/cve-less/themes/woodmart-1a6b9215905d609bfa19a88fafbe9af4.yaml new file mode 100644 index 0000000000..879939f2f0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woodmart-1a6b9215905d609bfa19a88fafbe9af4.yaml @@ -0,0 +1,58 @@ +id: woodmart-1a6b9215905d609bfa19a88fafbe9af4 + +info: + name: > + Woodmart <= 7.1.1 - Cross-Site Request Forgery to License Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/02fde6b1-d709-4329-ae9c-fea444c1aec8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woodmart/" + google-query: inurl:"/wp-content/themes/woodmart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woodmart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woodmart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodmart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woodmart-1d9a2ca68f50fb01ed55a21dfdc7c1dc.yaml b/nuclei-templates/cve-less/themes/woodmart-1d9a2ca68f50fb01ed55a21dfdc7c1dc.yaml new file mode 100644 index 0000000000..8cbbeb0c90 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woodmart-1d9a2ca68f50fb01ed55a21dfdc7c1dc.yaml @@ -0,0 +1,58 @@ +id: woodmart-1d9a2ca68f50fb01ed55a21dfdc7c1dc + +info: + name: > + Woodmart <= 7.0.4 - Unauthenticated Arbitrary Content Injection + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb1db880-0942-4fac-a548-8b6a28dce8c0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woodmart/" + google-query: inurl:"/wp-content/themes/woodmart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woodmart,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woodmart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodmart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.0.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woodmart-27976922dece0aca2bde50f6320bde6f.yaml b/nuclei-templates/cve-less/themes/woodmart-27976922dece0aca2bde50f6320bde6f.yaml new file mode 100644 index 0000000000..de17e3f433 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woodmart-27976922dece0aca2bde50f6320bde6f.yaml @@ -0,0 +1,58 @@ +id: woodmart-27976922dece0aca2bde50f6320bde6f + +info: + name: > + WoodMart <= 7.2.1 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e0e0c15-caf6-4166-a365-a2a73cd9ebc4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woodmart/" + google-query: inurl:"/wp-content/themes/woodmart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woodmart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woodmart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodmart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woodmart-7bd424eb93435e30d87b1474845a32ce.yaml b/nuclei-templates/cve-less/themes/woodmart-7bd424eb93435e30d87b1474845a32ce.yaml new file mode 100644 index 0000000000..a959370180 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woodmart-7bd424eb93435e30d87b1474845a32ce.yaml @@ -0,0 +1,58 @@ +id: woodmart-7bd424eb93435e30d87b1474845a32ce + +info: + name: > + WoodMart <= 7.1.1 - Missing Authorization to Shortcode Injection + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73017e92-d95e-4b9c-a44a-779b498f58b7?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woodmart/" + google-query: inurl:"/wp-content/themes/woodmart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woodmart,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woodmart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodmart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woodmart-9ab86db9ce48449a4c43692df0ff7e17.yaml b/nuclei-templates/cve-less/themes/woodmart-9ab86db9ce48449a4c43692df0ff7e17.yaml new file mode 100644 index 0000000000..28311ee358 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woodmart-9ab86db9ce48449a4c43692df0ff7e17.yaml @@ -0,0 +1,58 @@ +id: woodmart-9ab86db9ce48449a4c43692df0ff7e17 + +info: + name: > + WoodMart <= 7.2.4 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6fc92b8f-6794-461a-b6b6-598de21f5e2d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woodmart/" + google-query: inurl:"/wp-content/themes/woodmart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woodmart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woodmart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodmart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woodmart-a392159f37a0ade5203b528da67d0e66.yaml b/nuclei-templates/cve-less/themes/woodmart-a392159f37a0ade5203b528da67d0e66.yaml new file mode 100644 index 0000000000..7fd5c40073 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woodmart-a392159f37a0ade5203b528da67d0e66.yaml @@ -0,0 +1,58 @@ +id: woodmart-a392159f37a0ade5203b528da67d0e66 + +info: + name: > + WoodMart <= 7.2.1 - Authenticated (Subscriber+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9a60c4e-a524-4a99-858a-14787f37d60c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woodmart/" + google-query: inurl:"/wp-content/themes/woodmart/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woodmart,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woodmart/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woodmart" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woohoo-cc3c8c63ee92500b82ad257317be9d73.yaml b/nuclei-templates/cve-less/themes/woohoo-cc3c8c63ee92500b82ad257317be9d73.yaml new file mode 100644 index 0000000000..9a06f28957 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woohoo-cc3c8c63ee92500b82ad257317be9d73.yaml @@ -0,0 +1,58 @@ +id: woohoo-cc3c8c63ee92500b82ad257317be9d73 + +info: + name: > + WooHoo Newspaper Magazine Theme <= 2.5.3 - Cross-Site Request Forgery to Settings Update + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/2c657483-204c-4117-ac7c-c0522d9c3816?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woohoo/" + google-query: inurl:"/wp-content/themes/woohoo/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woohoo,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woohoo/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woohoo" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.5.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woostify-5a02b0682e7d4b10352df50fd089e856.yaml b/nuclei-templates/cve-less/themes/woostify-5a02b0682e7d4b10352df50fd089e856.yaml new file mode 100644 index 0000000000..ffc8efe885 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woostify-5a02b0682e7d4b10352df50fd089e856.yaml @@ -0,0 +1,58 @@ +id: woostify-5a02b0682e7d4b10352df50fd089e856 + +info: + name: > + Woostify <= 1.9.1 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/09768e37-7ba8-43b6-93df-3d201fe780ba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woostify/" + google-query: inurl:"/wp-content/themes/woostify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woostify,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woostify/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woostify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/woostore-41077f62819cf65dd71bfb4c6e199325.yaml b/nuclei-templates/cve-less/themes/woostore-41077f62819cf65dd71bfb4c6e199325.yaml new file mode 100644 index 0000000000..4c3157f690 --- /dev/null +++ b/nuclei-templates/cve-less/themes/woostore-41077f62819cf65dd71bfb4c6e199325.yaml @@ -0,0 +1,58 @@ +id: woostore-41077f62819cf65dd71bfb4c6e199325 + +info: + name: > + WooThemes WooFramework < 5.3.10 - Remote Code Execution via Shortcodes + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0728e7ac-2091-41de-90a0-e231c4b99ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/woostore/" + google-query: inurl:"/wp-content/themes/woostore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,woostore,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/woostore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woostore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.32') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wootique-41077f62819cf65dd71bfb4c6e199325.yaml b/nuclei-templates/cve-less/themes/wootique-41077f62819cf65dd71bfb4c6e199325.yaml new file mode 100644 index 0000000000..d0681dddbc --- /dev/null +++ b/nuclei-templates/cve-less/themes/wootique-41077f62819cf65dd71bfb4c6e199325.yaml @@ -0,0 +1,58 @@ +id: wootique-41077f62819cf65dd71bfb4c6e199325 + +info: + name: > + WooThemes WooFramework < 5.3.10 - Remote Code Execution via Shortcodes + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0728e7ac-2091-41de-90a0-e231c4b99ab0?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wootique/" + google-query: inurl:"/wp-content/themes/wootique/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wootique,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wootique/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wootique" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/workio-3cfee65e35362bbfc116d2c83a3a30c9.yaml b/nuclei-templates/cve-less/themes/workio-3cfee65e35362bbfc116d2c83a3a30c9.yaml new file mode 100644 index 0000000000..fc60a9237c --- /dev/null +++ b/nuclei-templates/cve-less/themes/workio-3cfee65e35362bbfc116d2c83a3a30c9.yaml @@ -0,0 +1,58 @@ +id: workio-3cfee65e35362bbfc116d2c83a3a30c9 + +info: + name: > + Workio <= 1.0.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/37563f9c-658c-4806-9bd8-a8413e7934fb?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/workio/" + google-query: inurl:"/wp-content/themes/workio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,workio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/workio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/workreap-26b89a3f8ab991ddf909838ee3f83a8f.yaml b/nuclei-templates/cve-less/themes/workreap-26b89a3f8ab991ddf909838ee3f83a8f.yaml new file mode 100644 index 0000000000..119a848ce9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/workreap-26b89a3f8ab991ddf909838ee3f83a8f.yaml @@ -0,0 +1,58 @@ +id: workreap-26b89a3f8ab991ddf909838ee3f83a8f + +info: + name: > + Workreap <= 2.6.3 - Insecure Direct Object Reference + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a9ee90c4-e9ab-426e-8b92-217de43bd2e4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/workreap/" + google-query: inurl:"/wp-content/themes/workreap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,workreap,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/workreap/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workreap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/workreap-5b880f984cc2c6ee6aced998be3c7997.yaml b/nuclei-templates/cve-less/themes/workreap-5b880f984cc2c6ee6aced998be3c7997.yaml new file mode 100644 index 0000000000..c17946fa59 --- /dev/null +++ b/nuclei-templates/cve-less/themes/workreap-5b880f984cc2c6ee6aced998be3c7997.yaml @@ -0,0 +1,58 @@ +id: workreap-5b880f984cc2c6ee6aced998be3c7997 + +info: + name: > + Workreap < 2.6.3 - Insecure Direct Objection Reference to Private Message Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b37766e2-95d2-4a95-9381-ed65ce09b3d6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/workreap/" + google-query: inurl:"/wp-content/themes/workreap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,workreap,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/workreap/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workreap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.6.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/workreap-8b0a78ba7d4de258f1d5d80e510c721b.yaml b/nuclei-templates/cve-less/themes/workreap-8b0a78ba7d4de258f1d5d80e510c721b.yaml new file mode 100644 index 0000000000..9392232b19 --- /dev/null +++ b/nuclei-templates/cve-less/themes/workreap-8b0a78ba7d4de258f1d5d80e510c721b.yaml @@ -0,0 +1,58 @@ +id: workreap-8b0a78ba7d4de258f1d5d80e510c721b + +info: + name: > + Workreap - Freelance Marketplace and Directory WordPress Theme < 2.2.2 - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59a05868-7457-4fb1-845e-bf7044d5cb81?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/workreap/" + google-query: inurl:"/wp-content/themes/workreap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,workreap,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/workreap/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workreap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/workreap-c1a5d94e24ff3bf97db23d2e01bc94ca.yaml b/nuclei-templates/cve-less/themes/workreap-c1a5d94e24ff3bf97db23d2e01bc94ca.yaml new file mode 100644 index 0000000000..f647254beb --- /dev/null +++ b/nuclei-templates/cve-less/themes/workreap-c1a5d94e24ff3bf97db23d2e01bc94ca.yaml @@ -0,0 +1,58 @@ +id: workreap-c1a5d94e24ff3bf97db23d2e01bc94ca + +info: + name: > + Workreap < 2.2.2 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9cfa753b-dbf5-4fe7-be69-fd8972a45e44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/workreap/" + google-query: inurl:"/wp-content/themes/workreap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,workreap,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/workreap/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workreap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/workreap-f3ff7e279524c365a3f486be69df6e9f.yaml b/nuclei-templates/cve-less/themes/workreap-f3ff7e279524c365a3f486be69df6e9f.yaml new file mode 100644 index 0000000000..f5e75a4fa0 --- /dev/null +++ b/nuclei-templates/cve-less/themes/workreap-f3ff7e279524c365a3f486be69df6e9f.yaml @@ -0,0 +1,58 @@ +id: workreap-f3ff7e279524c365a3f486be69df6e9f + +info: + name: > + Workreap Theme < 2.2.2 - Authorization Bypass + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a18963cb-24c7-45b4-987d-5a8789b1ab0a?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/workreap/" + google-query: inurl:"/wp-content/themes/workreap/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,workreap,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/workreap/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workreap" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/workscout-295565d6c00c49b75df12a1f75ae3147.yaml b/nuclei-templates/cve-less/themes/workscout-295565d6c00c49b75df12a1f75ae3147.yaml new file mode 100644 index 0000000000..01ea482452 --- /dev/null +++ b/nuclei-templates/cve-less/themes/workscout-295565d6c00c49b75df12a1f75ae3147.yaml @@ -0,0 +1,58 @@ +id: workscout-295565d6c00c49b75df12a1f75ae3147 + +info: + name: > + WorkScout - Job Board WordPress Theme <= 2.0.31 - Stored Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3785938d-d55a-487d-8709-2d3bdd4b8c0f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/workscout/" + google-query: inurl:"/wp-content/themes/workscout/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,workscout,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/workscout/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workscout" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.31') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/workup-598875fea738a6301ca41e5bba8cb8dc.yaml b/nuclei-templates/cve-less/themes/workup-598875fea738a6301ca41e5bba8cb8dc.yaml new file mode 100644 index 0000000000..9d14ba7f39 --- /dev/null +++ b/nuclei-templates/cve-less/themes/workup-598875fea738a6301ca41e5bba8cb8dc.yaml @@ -0,0 +1,58 @@ +id: workup-598875fea738a6301ca41e5bba8cb8dc + +info: + name: > + Workup – Job Board WordPress Theme <= 2.1.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f9dc401e-0247-4f49-8092-8841ea6c1f90?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/workup/" + google-query: inurl:"/wp-content/themes/workup/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,workup,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/workup/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "workup" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wp-moose-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/wp-moose-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..3e6d774563 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wp-moose-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-moose-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wp-moose/" + google-query: inurl:"/wp-content/themes/wp-moose/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wp-moose,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wp-moose/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-moose" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wp-portfolio-10655f6004e5353e2b6a2b5ad40ac777.yaml b/nuclei-templates/cve-less/themes/wp-portfolio-10655f6004e5353e2b6a2b5ad40ac777.yaml new file mode 100644 index 0000000000..a71604c1c5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wp-portfolio-10655f6004e5353e2b6a2b5ad40ac777.yaml @@ -0,0 +1,58 @@ +id: wp-portfolio-10655f6004e5353e2b6a2b5ad40ac777 + +info: + name: > + WP Portfolio <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1bbba961-a1e6-440a-9b39-919363f7031d?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wp-portfolio/" + google-query: inurl:"/wp-content/themes/wp-portfolio/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wp-portfolio,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wp-portfolio/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-portfolio" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wp-real-estate-9df83661bbe3f56e6da6d47f2ce8176c.yaml b/nuclei-templates/cve-less/themes/wp-real-estate-9df83661bbe3f56e6da6d47f2ce8176c.yaml new file mode 100644 index 0000000000..dfebe4cc85 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wp-real-estate-9df83661bbe3f56e6da6d47f2ce8176c.yaml @@ -0,0 +1,58 @@ +id: wp-real-estate-9df83661bbe3f56e6da6d47f2ce8176c + +info: + name: > + Multiple Themes (Various Versions) - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e09e48db-f74a-4663-a724-24938a6c277c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wp-real-estate/" + google-query: inurl:"/wp-content/themes/wp-real-estate/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wp-real-estate,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wp-real-estate/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-real-estate" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wp-sierra-b9563d9e100a8de4aef6c2ddb59436a7.yaml b/nuclei-templates/cve-less/themes/wp-sierra-b9563d9e100a8de4aef6c2ddb59436a7.yaml new file mode 100644 index 0000000000..418d6b9f70 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wp-sierra-b9563d9e100a8de4aef6c2ddb59436a7.yaml @@ -0,0 +1,58 @@ +id: wp-sierra-b9563d9e100a8de4aef6c2ddb59436a7 + +info: + name: > + Freemius SDK <= 2.4.2 - Missing Authorization Checks + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wp-sierra/" + google-query: inurl:"/wp-content/themes/wp-sierra/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wp-sierra,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wp-sierra/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-sierra" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wp-store-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/wp-store-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..2c51cccf93 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wp-store-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: wp-store-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wp-store/" + google-query: inurl:"/wp-content/themes/wp-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wp-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wp-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wp-store-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/wp-store-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..2f658be089 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wp-store-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: wp-store-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wp-store/" + google-query: inurl:"/wp-content/themes/wp-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wp-store,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wp-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wp-store-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/wp-store-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..4107fdcd35 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wp-store-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: wp-store-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wp-store/" + google-query: inurl:"/wp-content/themes/wp-store/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wp-store,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wp-store/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-store" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wphrm-d1dc7536ba0bbf23ad7893c422769d48.yaml b/nuclei-templates/cve-less/themes/wphrm-d1dc7536ba0bbf23ad7893c422769d48.yaml new file mode 100644 index 0000000000..d0be1bcd60 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wphrm-d1dc7536ba0bbf23ad7893c422769d48.yaml @@ -0,0 +1,58 @@ +id: wphrm-d1dc7536ba0bbf23ad7893c422769d48 + +info: + name: > + WPHRM - Human Resource Management System < 1.1 - SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/94d8211d-4027-4335-8c06-d8080231e511?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wphrm/" + google-query: inurl:"/wp-content/themes/wphrm/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wphrm,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wphrm/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wphrm" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wplms-1a3b140e25db47aa6f5e6de5d03caa41.yaml b/nuclei-templates/cve-less/themes/wplms-1a3b140e25db47aa6f5e6de5d03caa41.yaml new file mode 100644 index 0000000000..f40155916b --- /dev/null +++ b/nuclei-templates/cve-less/themes/wplms-1a3b140e25db47aa6f5e6de5d03caa41.yaml @@ -0,0 +1,58 @@ +id: wplms-1a3b140e25db47aa6f5e6de5d03caa41 + +info: + name: > + WPLMS < 4.900 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9071acdf-8d40-4e8b-8d1f-be2cabf3d66e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wplms/" + google-query: inurl:"/wp-content/themes/wplms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wplms,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wplms/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.900') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wplms-87521cd586bc2f45b279349b97e31c54.yaml b/nuclei-templates/cve-less/themes/wplms-87521cd586bc2f45b279349b97e31c54.yaml new file mode 100644 index 0000000000..5c6be4f883 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wplms-87521cd586bc2f45b279349b97e31c54.yaml @@ -0,0 +1,58 @@ +id: wplms-87521cd586bc2f45b279349b97e31c54 + +info: + name: > + WPLMS Learning Management System for WordPress, WordPress LMS <= 1.8.4.1 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0e8f5f-8216-4276-a810-860f9b52c447?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wplms/" + google-query: inurl:"/wp-content/themes/wplms/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wplms,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wplms/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplms" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.8.4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wplocalplaces-56c321d3601ae77c62688196e1aa61b1.yaml b/nuclei-templates/cve-less/themes/wplocalplaces-56c321d3601ae77c62688196e1aa61b1.yaml new file mode 100644 index 0000000000..77dd21d161 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wplocalplaces-56c321d3601ae77c62688196e1aa61b1.yaml @@ -0,0 +1,58 @@ +id: wplocalplaces-56c321d3601ae77c62688196e1aa61b1 + +info: + name: > + WPLocalPlaces (Unknown Versions) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/73115c27-86f1-4421-9fe5-bf5d8cf54d9f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wplocalplaces/" + google-query: inurl:"/wp-content/themes/wplocalplaces/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wplocalplaces,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wplocalplaces/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wplocalplaces" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wpparallax-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/wpparallax-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..e8849cae01 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wpparallax-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: wpparallax-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wpparallax/" + google-query: inurl:"/wp-content/themes/wpparallax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wpparallax,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wpparallax/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpparallax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wpparallax-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/wpparallax-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..ae98f0efa4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wpparallax-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: wpparallax-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wpparallax/" + google-query: inurl:"/wp-content/themes/wpparallax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wpparallax,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wpparallax/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpparallax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wpparallax-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/wpparallax-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..8eb903e9f3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wpparallax-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: wpparallax-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wpparallax/" + google-query: inurl:"/wp-content/themes/wpparallax/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wpparallax,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wpparallax/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpparallax" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wpzoom-inspiro-pro-0d2429a44660b0fd9009cfc551d51d85.yaml b/nuclei-templates/cve-less/themes/wpzoom-inspiro-pro-0d2429a44660b0fd9009cfc551d51d85.yaml new file mode 100644 index 0000000000..507caaeb38 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wpzoom-inspiro-pro-0d2429a44660b0fd9009cfc551d51d85.yaml @@ -0,0 +1,58 @@ +id: wpzoom-inspiro-pro-0d2429a44660b0fd9009cfc551d51d85 + +info: + name: > + Inspiro Pro <= 7.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/fa15ee50-2cbb-4833-b512-0971eaf12ff2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wpzoom-inspiro-pro/" + google-query: inurl:"/wp-content/themes/wpzoom-inspiro-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wpzoom-inspiro-pro,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wpzoom-inspiro-pro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpzoom-inspiro-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 7.2.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wr-nitro-fe0eedbb007ccace8a4e2ce0abc973e1.yaml b/nuclei-templates/cve-less/themes/wr-nitro-fe0eedbb007ccace8a4e2ce0abc973e1.yaml new file mode 100644 index 0000000000..024c787984 --- /dev/null +++ b/nuclei-templates/cve-less/themes/wr-nitro-fe0eedbb007ccace8a4e2ce0abc973e1.yaml @@ -0,0 +1,58 @@ +id: wr-nitro-fe0eedbb007ccace8a4e2ce0abc973e1 + +info: + name: > + Nitro by WooRockets <= 1.7.9 - Missing Authorization to Arbitrary Plugin Installation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c70ed02e-1183-475b-a110-4a2d8dbe610e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wr-nitro/" + google-query: inurl:"/wp-content/themes/wr-nitro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wr-nitro,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wr-nitro/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wr-nitro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.7.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/wyzi-business-finder-a5fba451ec49e569a6e3b33c31987240.yaml b/nuclei-templates/cve-less/themes/wyzi-business-finder-a5fba451ec49e569a6e3b33c31987240.yaml new file mode 100644 index 0000000000..c755c578bb --- /dev/null +++ b/nuclei-templates/cve-less/themes/wyzi-business-finder-a5fba451ec49e569a6e3b33c31987240.yaml @@ -0,0 +1,58 @@ +id: wyzi-business-finder-a5fba451ec49e569a6e3b33c31987240 + +info: + name: > + Wyzi - Social Directory WordPress Theme <= 2.4.2 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/552d2d0d-1f4a-4557-ba8e-9f63acbfffba?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/wyzi-business-finder/" + google-query: inurl:"/wp-content/themes/wyzi-business-finder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,wyzi-business-finder,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/wyzi-business-finder/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wyzi-business-finder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.4.2') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/x-t9-086335e3764d29c07c7d7cc4e2750c93.yaml b/nuclei-templates/cve-less/themes/x-t9-086335e3764d29c07c7d7cc4e2750c93.yaml new file mode 100644 index 0000000000..66b264ffe5 --- /dev/null +++ b/nuclei-templates/cve-less/themes/x-t9-086335e3764d29c07c7d7cc4e2750c93.yaml @@ -0,0 +1,58 @@ +id: x-t9-086335e3764d29c07c7d7cc4e2750c93 + +info: + name: > + Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b007d8a-3096-42f3-a7be-e0e0d3addf0b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/x-t9/" + google-query: inurl:"/wp-content/themes/x-t9/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,x-t9,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/x-t9/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "x-t9" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.19.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/xenon-809667597aa78113de32ecd2d78b1168.yaml b/nuclei-templates/cve-less/themes/xenon-809667597aa78113de32ecd2d78b1168.yaml new file mode 100644 index 0000000000..45cd9e0ffe --- /dev/null +++ b/nuclei-templates/cve-less/themes/xenon-809667597aa78113de32ecd2d78b1168.yaml @@ -0,0 +1,58 @@ +id: xenon-809667597aa78113de32ecd2d78b1168 + +info: + name: > + Xenon - Bootstrap Admin Theme with AngularJS <= 1.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f2b70e27-87fb-4905-bbfa-62cca3dbb433?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/xenon/" + google-query: inurl:"/wp-content/themes/xenon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,xenon,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/xenon/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xenon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/xmas-920241a52177d01e01f51750db4e9043.yaml b/nuclei-templates/cve-less/themes/xmas-920241a52177d01e01f51750db4e9043.yaml new file mode 100644 index 0000000000..c3f5a368c9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/xmas-920241a52177d01e01f51750db4e9043.yaml @@ -0,0 +1,58 @@ +id: xmas-920241a52177d01e01f51750db4e9043 + +info: + name: > + Site5 Various Affected Themes (Various Versions) - Email Spoofing + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/07bccf56-99b2-42e6-93ab-606af65e6cac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/xmas/" + google-query: inurl:"/wp-content/themes/xmas/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,xmas,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/xmas/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xmas" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/xstore-015cd56d3f2f470971a1fb745e9facf8.yaml b/nuclei-templates/cve-less/themes/xstore-015cd56d3f2f470971a1fb745e9facf8.yaml new file mode 100644 index 0000000000..6dd2120f82 --- /dev/null +++ b/nuclei-templates/cve-less/themes/xstore-015cd56d3f2f470971a1fb745e9facf8.yaml @@ -0,0 +1,58 @@ +id: xstore-015cd56d3f2f470971a1fb745e9facf8 + +info: + name: > + XStore <= 9.3.5 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/aa197b6b-be18-48c2-a7e3-d921b4ef1c54?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/xstore/" + google-query: inurl:"/wp-content/themes/xstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,xstore,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/xstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/xstore-38fb7f7c173d005d7a2c4887d0346c93.yaml b/nuclei-templates/cve-less/themes/xstore-38fb7f7c173d005d7a2c4887d0346c93.yaml new file mode 100644 index 0000000000..25a56d549d --- /dev/null +++ b/nuclei-templates/cve-less/themes/xstore-38fb7f7c173d005d7a2c4887d0346c93.yaml @@ -0,0 +1,58 @@ +id: xstore-38fb7f7c173d005d7a2c4887d0346c93 + +info: + name: > + XStore <= 9.3.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/415d69d9-2afd-41f8-8339-ea32fac3aa48?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/xstore/" + google-query: inurl:"/wp-content/themes/xstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,xstore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/xstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/xstore-5eda4166c53220a4fc1a66df7cda1b76.yaml b/nuclei-templates/cve-less/themes/xstore-5eda4166c53220a4fc1a66df7cda1b76.yaml new file mode 100644 index 0000000000..1f28f6e209 --- /dev/null +++ b/nuclei-templates/cve-less/themes/xstore-5eda4166c53220a4fc1a66df7cda1b76.yaml @@ -0,0 +1,58 @@ +id: xstore-5eda4166c53220a4fc1a66df7cda1b76 + +info: + name: > + XStore <= 9.3.5 - Unauthenticated SQL Injection + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/683cc327-e17e-49f6-a903-f8a40bb832d1?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/xstore/" + google-query: inurl:"/wp-content/themes/xstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,xstore,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/xstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/xstore-8a9cd0a3b3bf0281b86f1864c19141dc.yaml b/nuclei-templates/cve-less/themes/xstore-8a9cd0a3b3bf0281b86f1864c19141dc.yaml new file mode 100644 index 0000000000..8f60bff232 --- /dev/null +++ b/nuclei-templates/cve-less/themes/xstore-8a9cd0a3b3bf0281b86f1864c19141dc.yaml @@ -0,0 +1,58 @@ +id: xstore-8a9cd0a3b3bf0281b86f1864c19141dc + +info: + name: > + XStore <= 9.3.5 - Authenticated (Subscriber+) Arbitrary Options Update + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/19fe28c0-c0ef-49aa-91c1-2e273201babd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/xstore/" + google-query: inurl:"/wp-content/themes/xstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,xstore,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/xstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/xstore-a093f9ab0678625e44f3702b1a154c42.yaml b/nuclei-templates/cve-less/themes/xstore-a093f9ab0678625e44f3702b1a154c42.yaml new file mode 100644 index 0000000000..f62a795ce6 --- /dev/null +++ b/nuclei-templates/cve-less/themes/xstore-a093f9ab0678625e44f3702b1a154c42.yaml @@ -0,0 +1,58 @@ +id: xstore-a093f9ab0678625e44f3702b1a154c42 + +info: + name: > + XStore <= 9.3.5 - Unauthenticated Local File Inclusion + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fb4c58d-321d-453f-92b9-ae409541911b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/xstore/" + google-query: inurl:"/wp-content/themes/xstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,xstore,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/xstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/xstore-bf873db96785a26a3145cbfaa5b26d6e.yaml b/nuclei-templates/cve-less/themes/xstore-bf873db96785a26a3145cbfaa5b26d6e.yaml new file mode 100644 index 0000000000..246c44133b --- /dev/null +++ b/nuclei-templates/cve-less/themes/xstore-bf873db96785a26a3145cbfaa5b26d6e.yaml @@ -0,0 +1,58 @@ +id: xstore-bf873db96785a26a3145cbfaa5b26d6e + +info: + name: > + XStore <= 9.3.5 - Missing Authorization + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0f8cc16d-4e42-47b0-8ba0-df3252071826?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/xstore/" + google-query: inurl:"/wp-content/themes/xstore/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,xstore,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/xstore/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "xstore" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 9.3.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/yaaburnee-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml b/nuclei-templates/cve-less/themes/yaaburnee-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml new file mode 100644 index 0000000000..235c0fcdb4 --- /dev/null +++ b/nuclei-templates/cve-less/themes/yaaburnee-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a.yaml @@ -0,0 +1,58 @@ +id: yaaburnee-themes-ffb4eb5c13075d2e9d07a6dcc5003c7a + +info: + name: > + Ya'aburnee <= 1.0.7 and Dignitas <= 1.1.9 - Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9d8551b8-67b9-45a8-9357-9e42fb451606?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/yaaburnee-themes/" + google-query: inurl:"/wp-content/themes/yaaburnee-themes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,yaaburnee-themes,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/yaaburnee-themes/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yaaburnee-themes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/yourjourney-4eeae71a78a49f8b3e46b309da962e47.yaml b/nuclei-templates/cve-less/themes/yourjourney-4eeae71a78a49f8b3e46b309da962e47.yaml new file mode 100644 index 0000000000..f4c16806e8 --- /dev/null +++ b/nuclei-templates/cve-less/themes/yourjourney-4eeae71a78a49f8b3e46b309da962e47.yaml @@ -0,0 +1,58 @@ +id: yourjourney-4eeae71a78a49f8b3e46b309da962e47 + +info: + name: > + Your Journey <= 1.9.8 - Prototype Pollution to Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c738e051-ad1c-4115-94d3-127dd5dff935?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/yourjourney/" + google-query: inurl:"/wp-content/themes/yourjourney/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,yourjourney,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/yourjourney/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yourjourney" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.9.8') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/yuki-2820877b5dbf766c7f6817fd492690e8.yaml b/nuclei-templates/cve-less/themes/yuki-2820877b5dbf766c7f6817fd492690e8.yaml new file mode 100644 index 0000000000..aaffcf6494 --- /dev/null +++ b/nuclei-templates/cve-less/themes/yuki-2820877b5dbf766c7f6817fd492690e8.yaml @@ -0,0 +1,58 @@ +id: yuki-2820877b5dbf766c7f6817fd492690e8 + +info: + name: > + Yuki <= 1.3.14 - Cross-Site Request Forgery to Theme Setting Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb760fb-f281-4649-9bd3-92f8e281f07e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/yuki/" + google-query: inurl:"/wp-content/themes/yuki/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,yuki,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/yuki/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yuki" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.14') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/yuki-3787d9c397d58c6e8f2c674f16ffe8c1.yaml b/nuclei-templates/cve-less/themes/yuki-3787d9c397d58c6e8f2c674f16ffe8c1.yaml new file mode 100644 index 0000000000..73125d5510 --- /dev/null +++ b/nuclei-templates/cve-less/themes/yuki-3787d9c397d58c6e8f2c674f16ffe8c1.yaml @@ -0,0 +1,58 @@ +id: yuki-3787d9c397d58c6e8f2c674f16ffe8c1 + +info: + name: > + Yuki <= 1.3.13 - Missing Authorization to Authenticated (Subscriber+) Theme Setting Reset + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d964e0ef-f14e-463b-bf4e-3f25788df03c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/yuki/" + google-query: inurl:"/wp-content/themes/yuki/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,yuki,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/yuki/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yuki" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.3.13') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/yvora-af728e68019b9ee6cc8672f7e19f6c44.yaml b/nuclei-templates/cve-less/themes/yvora-af728e68019b9ee6cc8672f7e19f6c44.yaml new file mode 100644 index 0000000000..bf445a61f3 --- /dev/null +++ b/nuclei-templates/cve-less/themes/yvora-af728e68019b9ee6cc8672f7e19f6c44.yaml @@ -0,0 +1,58 @@ +id: yvora-af728e68019b9ee6cc8672f7e19f6c44 + +info: + name: > + Yvora - Premium WordPress Theme | Portfolio (Unspecified Version) - Arbitrary File Upload + author: topscoder + severity: critical + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/370fbe22-df48-4f64-ba7f-5ab98b908f58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/yvora/" + google-query: inurl:"/wp-content/themes/yvora/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,yvora,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/yvora/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "yvora" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< *') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zeever-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml b/nuclei-templates/cve-less/themes/zeever-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml new file mode 100644 index 0000000000..7e30639b9b --- /dev/null +++ b/nuclei-templates/cve-less/themes/zeever-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml @@ -0,0 +1,58 @@ +id: zeever-0eadfcaa632fa9ba5901b3c6b61b28a7 + +info: + name: > + Multiple Themes by jegstudio <= (Various Versions) - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/edb34ad0-352e-462e-a7f1-64a804a760ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zeever/" + google-query: inurl:"/wp-content/themes/zeever/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zeever,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zeever/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zeever" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.1.0') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zenlite-2c9dd1c9df5c34a137e9f118a0781a3d.yaml b/nuclei-templates/cve-less/themes/zenlite-2c9dd1c9df5c34a137e9f118a0781a3d.yaml new file mode 100644 index 0000000000..aaf5fdf882 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zenlite-2c9dd1c9df5c34a137e9f118a0781a3d.yaml @@ -0,0 +1,58 @@ +id: zenlite-2c9dd1c9df5c34a137e9f118a0781a3d + +info: + name: > + ZenLite <= 4.3 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/68042416-efa6-4814-a8d9-c74ab652c4ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zenlite/" + google-query: inurl:"/wp-content/themes/zenlite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zenlite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zenlite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zenlite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.3') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-baby-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/zigcy-baby-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..7880e37341 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-baby-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: zigcy-baby-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-baby/" + google-query: inurl:"/wp-content/themes/zigcy-baby/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-baby,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-baby/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-baby" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-baby-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/zigcy-baby-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..bd31716f7a --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-baby-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: zigcy-baby-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-baby/" + google-query: inurl:"/wp-content/themes/zigcy-baby/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-baby,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-baby/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-baby" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-baby-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/zigcy-baby-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..782c7cd02e --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-baby-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: zigcy-baby-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-baby/" + google-query: inurl:"/wp-content/themes/zigcy-baby/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-baby,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-baby/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-baby" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.6') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-cosmetics-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/zigcy-cosmetics-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..3648a97c25 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-cosmetics-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: zigcy-cosmetics-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-cosmetics/" + google-query: inurl:"/wp-content/themes/zigcy-cosmetics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-cosmetics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-cosmetics/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-cosmetics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-cosmetics-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/zigcy-cosmetics-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..0fe16d9d36 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-cosmetics-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: zigcy-cosmetics-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-cosmetics/" + google-query: inurl:"/wp-content/themes/zigcy-cosmetics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-cosmetics,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-cosmetics/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-cosmetics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-cosmetics-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/zigcy-cosmetics-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..907d1e8da9 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-cosmetics-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: zigcy-cosmetics-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-cosmetics/" + google-query: inurl:"/wp-content/themes/zigcy-cosmetics/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-cosmetics,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-cosmetics/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-cosmetics" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 1.0.5') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml b/nuclei-templates/cve-less/themes/zigcy-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml new file mode 100644 index 0000000000..3f23b1eb50 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-lite-6ca6c33ebd7ae06f9203f7a1178920a1.yaml @@ -0,0 +1,58 @@ +id: zigcy-lite-6ca6c33ebd7ae06f9203f7a1178920a1 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Missing Authorization to Arbitrary Plugin Deactivation/Activation + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9e15727a-35c4-42c0-9997-cdcd40ac8e5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-lite/" + google-query: inurl:"/wp-content/themes/zigcy-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-lite-b05621ef791a4dad965a137ebf6fa48c.yaml b/nuclei-templates/cve-less/themes/zigcy-lite-b05621ef791a4dad965a137ebf6fa48c.yaml new file mode 100644 index 0000000000..a78fb58732 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-lite-b05621ef791a4dad965a137ebf6fa48c.yaml @@ -0,0 +1,58 @@ +id: zigcy-lite-b05621ef791a4dad965a137ebf6fa48c + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-lite/" + google-query: inurl:"/wp-content/themes/zigcy-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-lite,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zigcy-lite-f89ee1fe18d2f93346e76054105f5916.yaml b/nuclei-templates/cve-less/themes/zigcy-lite-f89ee1fe18d2f93346e76054105f5916.yaml new file mode 100644 index 0000000000..7dd47124d1 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zigcy-lite-f89ee1fe18d2f93346e76054105f5916.yaml @@ -0,0 +1,58 @@ +id: zigcy-lite-f89ee1fe18d2f93346e76054105f5916 + +info: + name: > + AccessPress Themes and Plugin <= Various Versions - Authenticated (Subscriber+) Arbitrary File Upload + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ef1a097-955c-4a0e-a1a2-b34ae2903d0e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zigcy-lite/" + google-query: inurl:"/wp-content/themes/zigcy-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zigcy-lite,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zigcy-lite/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zigcy-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 2.0.9') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zoner-4fb619246fc5d2000cab608496d82ce7.yaml b/nuclei-templates/cve-less/themes/zoner-4fb619246fc5d2000cab608496d82ce7.yaml new file mode 100644 index 0000000000..16efacd5ca --- /dev/null +++ b/nuclei-templates/cve-less/themes/zoner-4fb619246fc5d2000cab608496d82ce7.yaml @@ -0,0 +1,58 @@ +id: zoner-4fb619246fc5d2000cab608496d82ce7 + +info: + name: > + Zoner - Real Estate <= 4.1 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d1040d5b-e02d-4762-825f-409c8770c66f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zoner/" + google-query: inurl:"/wp-content/themes/zoner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zoner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zoner/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.1') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/zoner-d7ec4a32cfcc6080d759cea90bff42d1.yaml b/nuclei-templates/cve-less/themes/zoner-d7ec4a32cfcc6080d759cea90bff42d1.yaml new file mode 100644 index 0000000000..33fbd78f61 --- /dev/null +++ b/nuclei-templates/cve-less/themes/zoner-d7ec4a32cfcc6080d759cea90bff42d1.yaml @@ -0,0 +1,58 @@ +id: zoner-d7ec4a32cfcc6080d759cea90bff42d1 + +info: + name: > + Zoner - Real Estate WordPress Theme < 4.2 - Cross-Site Scripting + author: topscoder + severity: high + description: > + + reference: + - https://www.wordfence.com/threat-intel/vulnerabilities/id/58c30b06-3d31-4489-a068-d447042eea58?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zoner/" + google-query: inurl:"/wp-content/themes/zoner/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zoner,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zoner/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zoner" + part: body + + - type: dsl + dsl: + - compare_versions(version, '< 4.2') \ No newline at end of file